c5b4cc3291aa1672049cec15d0272d4441cbb2412b4a3456935403429aeb7644edc9ef26a9096c87632c4458335949fd2a27fa89c78353ae5adab7594eff5b7e8cd8bc43cc602f914e61b04d8c6e24bd7ef078e3b1b02f61df5c6e6f1648fa6a6022c045390ba8c61b73538f8975142eeba57a52d0d038014010a05ec1e16691a81a748bb222068f08b593a5b3f421767c6611fd3799794be1b0aa2b4d66f65bb4c6ee7a17c44dca1bd6a3fe2159b0ad427097f63f6f8df4852e66b34bc787dc2e236308e56d70e608f97ee4da5b631eaa26582d9bbc86e9f51554f2eec09bbb497fd114e200465d9fb75426a84f7d1ef4b967763e628774f59eeac514fc0d83e952b54b91696e80ce73c6d8b7ef4cd2225fb5ad6f837fa9ddd5428cfe1b7c8113c5fdec44dfbc08b4dcd8deeb7ee0a20063994de4bbdc2a54b4522fab89f43122becda26248b2fc4c9b40fc772a54405c23d248c228c557f7d6c7829928c908babf440101171defbf93b88b2df9c01402bf7ba72be3c28100a83f747160bf64769155329af77b1588c65e7eb81b45c2341976a003a15477b239601e890fee9b3d03dd6db89bb8e3815fd9d6eae54ec94821dca6a9204a448b1a3e3f95aac1fc2e739cf72c9c2c7e9d718d8f03d00fe4a9c1161d0eb24c46c9f0167b6277854f80a8af9540a8ee3ffa0c8648be1cf9436061a92f4b219eb20647d9ba686ec9abc218aa0a9e6188924929e149564e2fb48df003c3c9f064323a07a4a91b4988e37662a380318add9717c93decccf70540b2fdfeb278c5e9c4b36d50de76cc15f2214cc73f4a70fff7a44cd98d32c5e3b65f60acb8f5ca8cd189e2c8ceb331351af5295663f3d89bc9f4e3eb97a9c66d0ad3", 0x6b6}], 0x1}}], 0x1, 0x4000) recvfrom$inet(r0, &(0x7f00009be000)=""/11, 0xe8, 0x0, 0x0, 0xffffffffffffff4e) bind$bt_l2cap(r4, &(0x7f0000000440)={0x1f, 0x8, {0x6, 0x400, 0x0, 0x2, 0x0, 0x3}, 0x10001, 0x2}, 0xe) setsockopt(r5, 0xb5, 0xffffffff, &(0x7f00000006c0)="0ac385d7ac2ae574baf1b3104b37fd7f20ebca1da5063c612b05a3d56c8b2e413e64bfc3e0bb415e656477eea9c01ad808e74aea23e7e4a07d09f22e69e1ae37fecf707d249ba82f1fc8f4a53558952762a62d5712f7ad3f1e2d51e5e3cf31154625d23de117cbb19fe0379b78ae656d20a1840850e0d1b6f6d94f8c810560030e0ac978d48567edbbb1f79c22a73e5a978f82d9637023d70e36036002", 0x9d) getsockopt$inet_sctp_SCTP_RECVRCVINFO(r0, 0x84, 0x20, &(0x7f0000000180), &(0x7f00000001c0)=0x4) sendmsg$netrom(r3, &(0x7f0000000b00)={&(0x7f0000000780)=@full={{0x3, {"53665db4283e1b"}, 0x3}, [{"d40335b6bcd5d9"}, {"d5952336c520fb"}, {"d326c92416d6ea"}, {"763aea9242214f"}, {"d716c11982a583"}, {"712de86f857435"}, {"1d8bd63f2c431c"}, {"6f5a0b1522aca6"}]}, 0x48, &(0x7f0000000ac0), 0x0, &(0x7f00000017c0)=[{0x10, 0x117, 0x9}], 0x10, 0x8000}, 0x4000840) setsockopt$inet_mtu(r3, 0x0, 0xa, &(0x7f0000000480), 0x4) epoll_ctl$EPOLL_CTL_ADD(r3, 0x1, r3, &(0x7f00000004c0)={0x5}) syz_open_procfs(0x0, &(0x7f00000005c0)='maps\x00') shutdown(r0, 0x1) 2018/03/29 17:34:58 executing program 6: r0 = open(&(0x7f0000000440)='./file0\x00', 0x1ffff, 0x5) ioctl$TIOCLINUX7(0xffffffffffffffff, 0x541c, &(0x7f0000000080)={0x7}) setsockopt$inet_tcp_int(r0, 0x6, 0x0, &(0x7f00000003c0)=0x6, 0xf4) perf_event_open(&(0x7f0000000240)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000180)='/dev/sequencer2\x00', 0x12100, 0x0) clock_gettime(0x0, &(0x7f00000001c0)={0x0, 0x0}) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r1, 0x4040534e, &(0x7f0000000340)={0x124, @time={r2, r3+30000000}, 0x1, {0x8, 0x606}, 0x101, 0x2}) r4 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000040)='/dev/rtc\x00', 0x0, 0x0) r5 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000580)='/dev/sequencer\x00', 0x0, 0x0) ioctl$LOOP_CLR_FD(r4, 0x7003) getsockopt$inet_sctp_SCTP_FRAGMENT_INTERLEAVE(0xffffffffffffffff, 0x84, 0x12, &(0x7f0000000140), &(0x7f00000002c0)=0x4) setsockopt$packet_buf(0xffffffffffffffff, 0x107, 0xd, &(0x7f00000004c0)="d9fb4f1bcfd3e0c1355ea2018b25a4fd911d8abc3f3fd71f4749878ac1fbce6e5d188e078b15be141905d7966406e4f3fb021da63028837a8407bcb3e3a676d251bcd09a04964ed9cd0f6cece267dc4bada0403dcef25dace8875f4a6495eb2e6cc4969e7de83153459b4d", 0x6b) perf_event_open(&(0x7f00000000c0)={0x0, 0x70, 0x0, 0x0, 0x7ff, 0xa1, 0x0, 0x1, 0x200, 0x2, 0x5, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x1, 0x4, 0xb0, 0x5, 0x0, 0x0, 0xcf, 0x0, 0xffffffffffffffff, 0x100000000, 0x3ff, 0x0, 0x0, 0x2, 0x1f, 0x2, 0x5, 0x9, 0x3, 0x0, 0x4, 0x0, 0x20000000, 0x195d678803a3a953, @perf_config_ext={0x9, 0x5}, 0x10, 0x3, 0x8, 0x0, 0x72eb, 0x99, 0x1}, 0x0, 0xd, r4, 0x8) mq_notify(r5, &(0x7f0000000400)) execve(&(0x7f0000000200)='./file0\x00', &(0x7f0000000680)=[&(0x7f0000000600)='\x00', &(0x7f0000000640)='proc\x00'], &(0x7f0000000740)=[&(0x7f00000006c0)='\'\x00', &(0x7f0000000700)='trustedwlan0vmnet0@%\x00']) 2018/03/29 17:34:58 executing program 0: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r0 = memfd_create(&(0x7f0000000240)='vmnet0keyring\x00', 0x2) ioctl$TIOCMBIS(r0, 0x5416, &(0x7f0000000280)=0x5) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)={0xb, 0x7e, 0x3, 0x1, 0x11}, 0x2c) mount(&(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) r2 = socket$kcm(0x29, 0x2, 0x0) sendmsg$kcm(r2, &(0x7f0000000bc0)={&(0x7f00000007c0)=@rc={0x1f, {0x5, 0x50000000, 0xaa2, 0x613, 0x4, 0x1ff}}, 0x80, &(0x7f0000000940)=[{&(0x7f0000000840)="09c9453aa30d8c5fba221fa2413f12c580837b2ae292e3ee8dd00098c404125a1a2e63840f82a2f69c3927af43b828422484aaeeceebcbe76e999bd3930c9b7c2995484407f9166e39c2069a88b63a980b9b5ffc880f4b89dde5adae6c7fb84ed98cbac860214dfb0b28d1b2e2d58aefebdfe515334f2ffa46be22ef7a4b3a276cb70a27c9e9f5de0a20bad24cbe2b89aee9693c2f8f186ea59fcfc4ebec7188cca0418d4583a6f1730f62416d70cd62555eb4f58ea831d1fea9956a2cba0049f23bf0b249f5de2ce0dc303808d70b0ccab3c7f37e949e", 0xd7}], 0x1, &(0x7f0000000980)}, 0x4010) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0xb, 0x9, &(0x7f0000000980)=ANY=[@ANYBLOB="18000000000000000000000000000000181000005047b24e6f204cc4f6155839bb3c336bed96092de2883543140f654cf7b935300bb87725ce1d817a0a0b1ba9c77fcdadd28ffef7263376c2a2c9f142e09eabf898d890f790471d5f327c05d4135604b836f72a5e891c2a857030d84cce", @ANYRES32=r1, @ANYBLOB="0000000000000000fffc0100000000000000000000000000850000000600000000000000000000009500000000000000"], &(0x7f0000000600)='syzkaller\x00', 0x0, 0x30, &(0x7f0000000640)=""/48, 0x41f00, 0x1}, 0x48) ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, r3) accept4$packet(r1, &(0x7f0000000500)={0x0, 0x0, 0x0}, &(0x7f0000000540)=0x14, 0x80800) ioctl$TUNSETIFINDEX(r0, 0x400454da, &(0x7f0000000580)=r4) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000000)={&(0x7f0000000080)='./file0/file0\x00', r1}, 0x10) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000400)=@ax25={0x3, {"02f47b3723e03d"}}, 0x80, &(0x7f00000017c0), 0x0, &(0x7f0000001840)=ANY=[], 0x0, 0x24004044}, 0x4008001) bpf$MAP_CREATE(0x0, &(0x7f0000002cc0)={0x5, 0x100, 0x56c96e7a, 0x2, 0xa, 0xffffffffffffffff, 0x9}, 0x2c) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000480)='rpc_pipefs\x00', 0x200000, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000002d00)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x40082406, &(0x7f00000004c0)='vmnet0keyring\x00') bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000780)={&(0x7f0000000740)='./file0/file0\x00', r5}, 0x10) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, &(0x7f0000000700)='proc!@ppp1!ppp0ppp0#)lo\\lolo{\x00') mount(&(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000200)='fuseblk\x00', 0xa11800, &(0x7f0000000240)) mount(&(0x7f00000002c0)='./file0/file0\x00', &(0x7f0000000300)='./file0/file0\x00', &(0x7f0000000340)='minix\x00', 0x0, &(0x7f0000000380)) 2018/03/29 17:34:58 executing program 4: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)={0xb, 0x7e, 0x3, 0x1, 0x11}, 0x2c) mount(&(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) r1 = socket$kcm(0x29, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000000bc0)={&(0x7f00000007c0)=@rc={0x1f, {0x5, 0x50000000, 0xaa2, 0x613, 0x4, 0x1ff}, 0x3f}, 0x80, &(0x7f0000000940)=[{&(0x7f0000000840)="09c9453aa30d8c5fba221fa2413f12c580837b2ae292e3ee8dd00098c404125a1a2e63840f82a2f69c3927af43b828422484aaeeceebcbe76e999bd3930c9b7c2995484407f9166e39c2069a88b63a980b9b5ffc880f4b89dde5adae6c7fb84ed98cbac860214dfb0b28d1b2e2d58aefebdfe515334f2ffa46be22ef7a4b3a276cb70a27c9e9f5de0a20bad24cbe2b89aee9693c2f8f186ea59fcfc4ebec7188cca0418d4583a6f1730f62416d70cd62555eb4f58ea831d1fea9956a2cba0049f23bf0b249f5de2ce0dc303808d70b0ccab3c7f37e949e", 0xd7}], 0x1, &(0x7f0000000980), 0x0, 0x20004805}, 0x4010) r2 = perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x2367, 0x7fff, 0x1, 0x6, 0x0, 0x78b1, 0x1, 0x0, 0x4992c766, 0xff, 0x81, 0x100, 0x40, 0x3, 0x9, 0x8, 0x1, 0x10000, 0x0, 0x6, 0x90e, 0x9, 0x7ff, 0x0, 0x8, 0x1, 0x30, 0x20, 0x7fffffff, 0x6, 0x401, 0x2, 0x1000, 0x8001, 0x1ff, 0xfffffffffffffff8, 0x0, 0x2, 0x0, @perf_config_ext={0x5, 0x8}, 0x1ab23, 0x0, 0x8, 0x5, 0x6}, 0xffffffffffffffff, 0x10, r0, 0x1) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0xb, 0x9, &(0x7f0000000580)=@framed={{0x18}, [@map={0x18, 0x0, 0x1, 0x0, r0}, @generic={0x3ff, 0xfffffffffffffffc, 0x1}, @call={0x85, 0x0, 0x0, 0x6}], {0x95}}, &(0x7f0000000600)='syzkaller\x00', 0x0, 0x30, &(0x7f0000000640)=""/48, 0x41f00, 0x1}, 0x48) ioctl$PERF_EVENT_IOC_SET_BPF(r2, 0x40042408, r3) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000000)={&(0x7f0000000080)='./file0/file0\x00', r0}, 0x10) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000400)=@ax25={0x3, {"02f47b3723e03d"}}, 0x80, &(0x7f00000017c0), 0x0, &(0x7f0000001840)=ANY=[], 0x0, 0x24004044}, 0x4008001) bpf$MAP_CREATE(0x0, &(0x7f0000002cc0)={0x5, 0x100, 0x56c96e7a, 0x2, 0xa, 0xffffffffffffffff, 0x9}, 0x2c) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000480)='rpc_pipefs\x00', 0x200000, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000002d00)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f00000004c0)='vmnet0keyring\x00') bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000780)={&(0x7f0000000740)='./file0/file0\x00', r4}, 0x10) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x40082406, &(0x7f0000000700)='proc!@ppp1!ppp0ppp0#)lo\\lolo{\x00') mount(&(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000200)='fuseblk\x00', 0xa11800, &(0x7f0000000240)) r5 = syz_open_dev$sg(&(0x7f0000000240)='/dev/sg#\x00', 0xfffffffffffffffa, 0x800) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000280)={r5, r3, 0x5, 0x1}, 0x10) ioctl$TIOCCONS(r5, 0x541d) mount(&(0x7f00000002c0)='./file0/file0\x00', &(0x7f0000000300)='./file0/file0\x00', &(0x7f0000000340)='minix\x00', 0x1000, &(0x7f0000000380)) 2018/03/29 17:34:58 executing program 5: r0 = socket(0xa, 0x2, 0x0) flock(0xffffffffffffffff, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000200)) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000b00)='./cgroup.cpu\x00', 0x200002, 0x0) setsockopt$inet_mreq(r0, 0x0, 0x27, &(0x7f0000000480)={@empty, @remote={0xac, 0x14, 0x14, 0xbb}}, 0x8) fchdir(r1) fstat(0xffffffffffffffff, &(0x7f0000000180)) bind$inet(0xffffffffffffffff, &(0x7f0000000440)={0x2, 0x0, @multicast1=0xe0000001}, 0x10) r2 = creat(&(0x7f0000000100)='./file1\x00', 0x0) fallocate(r2, 0x1, 0x0, 0x20004d2d) ioctl$DRM_IOCTL_SET_VERSION(0xffffffffffffffff, 0xc0106407, &(0x7f00000000c0)={0x0, 0x2}) socket$inet6_icmp(0xa, 0x2, 0x3a) sendmsg$inet_sctp(r0, &(0x7f000050dfc8)={&(0x7f0000000840)=@in6={0xa, 0x4e24, 0x80000001, @mcast1={0xff, 0x1, [], 0x1}}, 0x1c, &(0x7f00000005c0), 0x0, &(0x7f0000576000)}, 0x0) getsockopt$inet_sctp6_SCTP_GET_LOCAL_ADDRS(r1, 0x84, 0x6d, &(0x7f00000002c0)={0x0, 0x7e, "147b31a6c8d04526e5f78a8fe27845051f555f699446cd55da4ba6fc8873a807fa51bb4eab22c5df774cd217b3b2c0af891a34aae4b6aa2b7e16f7b4fd5dcc91ee95c14977580183e86a5e903258265c96396582cadd0075864a1d1b58c4036a1ea7b763df062b4b66c882ba9442bac3b9b6d420938dca4b48c863fb4acd"}, &(0x7f0000000240)=0x86) setsockopt$inet_sctp_SCTP_DEFAULT_PRINFO(r0, 0x84, 0x72, &(0x7f0000000380)={r3, 0x10000, 0x30}, 0xc) sendto$inet6(r0, &(0x7f0000000240), 0x0, 0x0, &(0x7f0000000280)={0xa, 0x4e23, 0x3, @local={0xfe, 0x80, [], 0xaa}, 0x9}, 0x1c) getpeername$packet(0xffffffffffffffff, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @broadcast}, &(0x7f0000000a00)=0x14) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000000)={{{@in=@multicast2, @in6=@dev}}, {{@in=@multicast1}, 0x0, @in6=@ipv4={[], [], @remote}}}, &(0x7f0000000140)=0xe8) 2018/03/29 17:34:58 executing program 6: r0 = socket$nl_generic(0x10, 0x3, 0x10) setsockopt$netlink_NETLINK_TX_RING(0xffffffffffffffff, 0x10e, 0x7, &(0x7f0000000040)={0x0, 0x0, 0x7}, 0x10) r1 = socket(0xa, 0x1, 0x0) ioctl(r1, 0x8912, &(0x7f0000000240)="c6") getsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER(0xffffffffffffffff, 0x84, 0x7b, &(0x7f0000000140), &(0x7f0000000080)=0x8) r2 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000340)={'bcsf0\x00', 0x0}) setsockopt$packet_add_memb(r2, 0x107, 0x1, &(0x7f00000000c0)={r3, 0x1, 0x6, @random="7c2e1626459d"}, 0x10) pipe(&(0x7f0000000700)) ioctl$DRM_IOCTL_ADD_CTX(0xffffffffffffff9c, 0xc0086420, &(0x7f0000000740)) syz_genetlink_get_family_id$fou(&(0x7f0000000100)='fou\x00') setsockopt$packet_drop_memb(0xffffffffffffffff, 0x107, 0x2, &(0x7f0000000080)={0x0, 0x1, 0x6, @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff]}, 0xff54) r4 = socket$inet_smc(0x2b, 0x1, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f00000000c0)={0x0, 'eql\x00'}, 0x18) syz_genetlink_get_family_id$ipvs(&(0x7f0000000500)='IPVS\x00') setsockopt$IP_VS_SO_SET_FLUSH(r4, 0x0, 0x485, 0x0, 0x0) setsockopt$IP_VS_SO_SET_ZERO(r4, 0x0, 0x48f, &(0x7f0000000580)={0x0, @local={0xac, 0x14, 0x14, 0xaa}, 0x4e21, 0x0, 'lblcr\x00', 0x18, 0xab3, 0x6a}, 0x2c) ioctl$sock_inet_SIOCSARP(r4, 0x8955, &(0x7f0000000600)={{0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x13}}, {0x1, @local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}}, 0x24, {0x2, 0x4e23, @remote={0xac, 0x14, 0x14, 0xbb}}, 'ip6gre0\x00'}) ioctl$DRM_IOCTL_ADD_CTX(0xffffffffffffffff, 0xc0086420, &(0x7f00000004c0)) sendmsg$IPVS_CMD_DEL_DEST(r0, &(0x7f0000000480)={&(0x7f0000000300)={0x10}, 0xc, &(0x7f0000000440)={&(0x7f0000000780)=ANY=[@ANYBLOB="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"], 0x1}, 0x1, 0x0, 0x0, 0x4000}, 0x800) setsockopt$IP_VS_SO_SET_STARTDAEMON(r4, 0x0, 0x48b, &(0x7f00000005c0)={0x1, 'vcan0\x00', 0x2}, 0x18) 2018/03/29 17:34:58 executing program 2: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)={0xb, 0x7e, 0x3, 0x1, 0x11}, 0x2c) mount(&(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) r1 = socket$kcm(0x29, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000000bc0)={&(0x7f00000007c0)=@rc={0x1f, {0x5, 0x50000000, 0xaa2, 0x613, 0x4, 0x1ff}, 0x3f}, 0x80, &(0x7f0000000940)=[{&(0x7f0000000840)="09c9453aa30d8c5fba221fa2413f12c580837b2ae292e3ee8dd00098c404125a1a2e63840f82a2f69c3927af43b828422484aaeeceebcbe76e999bd3930c9b7c2995484407f9166e39c2069a88b63a980b9b5ffc880f4b89dde5adae6c7fb84ed98cbac860214dfb0b28d1b2e2d58aefebdfe515334f2ffa46be22ef7a4b3a276cb70a27c9e9f5de0a20bad24cbe2b89aee9693c2f8f186ea59fcfc4ebec7188cca0418d4583a6f1730f62416d70cd62555eb4f58ea831d1fea9956a2cba0049f23bf0b249f5de2ce0dc303808d70b0ccab3c7f37e949e", 0xd7}], 0x1, &(0x7f0000000980), 0x0, 0x20004805}, 0x4010) r2 = perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x2367, 0x7fff, 0x1, 0x6, 0x0, 0x78b1, 0x1, 0x0, 0x4992c766, 0xff, 0x81, 0x100, 0x40, 0x3, 0x9, 0x8, 0x1, 0x10000, 0x0, 0x6, 0x90e, 0x9, 0x7ff, 0x0, 0x8, 0x1, 0x30, 0x20, 0x7fffffff, 0x6, 0x401, 0x2, 0x1000, 0x8001, 0x1ff, 0xfffffffffffffff8, 0x0, 0x2, 0x0, @perf_config_ext={0x5, 0x8}, 0x1ab23, 0x0, 0x8, 0x5, 0x6, 0x0, 0x6}, 0xffffffffffffffff, 0x10, r0, 0x1) bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0xb, 0x9, &(0x7f0000000580)=@framed={{0x18}, [@map={0x18, 0x0, 0x1, 0x0, r0}, @generic={0x3ff, 0xfffffffffffffffc, 0x1}, @call={0x85, 0x0, 0x0, 0x6}], {0x95}}, &(0x7f0000000600)='syzkaller\x00', 0x0, 0x30, &(0x7f0000000640)=""/48, 0x41f00, 0x1}, 0x48) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000000)={&(0x7f0000000080)='./file0/file0\x00', r0}, 0x10) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000400)=@ax25={0x3, {"02f47b3723e03d"}}, 0x80, &(0x7f00000017c0), 0x0, &(0x7f0000001840)=ANY=[], 0x0, 0x24004044}, 0x4008001) bpf$MAP_CREATE(0x0, &(0x7f0000002cc0)={0x5, 0x0, 0x56c96e7a, 0x2, 0xa, 0xffffffffffffffff, 0x9}, 0x2c) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000280)='rpc_pipefs\x00', 0x200000, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000002d00)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f00000004c0)='vmnet0keyring\x00') bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000780)={&(0x7f0000000740)='./file0/file0\x00', r3}, 0x10) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x40082406, &(0x7f0000000700)='proc!@ppp1!ppp0ppp0#)lo\\lolo{\x00') mount(&(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000200)='fuseblk\x00', 0xa11800, &(0x7f0000000240)) mount(&(0x7f00000002c0)='./file0/file0\x00', &(0x7f0000000300)='./file0/file0\x00', &(0x7f0000000340)='minix\x00', 0x1000, &(0x7f0000000380)) 2018/03/29 17:34:58 executing program 4: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)={0xb, 0x7e, 0x3, 0x1, 0x11}, 0x2c) mount(&(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) r1 = socket$kcm(0x29, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000000bc0)={&(0x7f00000007c0)=@rc={0x1f, {0x5, 0x50000000, 0xaa2, 0x613, 0x4, 0x1ff}, 0x3f}, 0x80, &(0x7f0000000940)=[{&(0x7f0000000840)="09c9453aa30d8c5fba221fa2413f12c580837b2ae292e3ee8dd00098c404125a1a2e63840f82a2f69c3927af43b828422484aaeeceebcbe76e999bd3930c9b7c2995484407f9166e39c2069a88b63a980b9b5ffc880f4b89dde5adae6c7fb84ed98cbac860214dfb0b28d1b2e2d58aefebdfe515334f2ffa46be22ef7a4b3a276cb70a27c9e9f5de0a20bad24cbe2b89aee9693c2f8f186ea59fcfc4ebec7188cca0418d4583a6f1730f62416d70cd62555eb4f58ea831d1fea9956a2cba0049f23bf0b249f5de2ce0dc303808d70b0ccab3c7f37e949e", 0xd7}], 0x1, &(0x7f0000000980), 0x0, 0x20004805}, 0x4010) r2 = perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x2367, 0x7fff, 0x1, 0x6, 0x0, 0x78b1, 0x1, 0x0, 0x4992c766, 0xff, 0x81, 0x100, 0x40, 0x3, 0x9, 0x8, 0x1, 0x10000, 0x0, 0x6, 0x90e, 0x9, 0x7ff, 0x0, 0x8, 0x1, 0x30, 0x20, 0x7fffffff, 0x6, 0x401, 0x2, 0x1000, 0x8001, 0x1ff, 0xfffffffffffffff8, 0x0, 0x2, 0x0, @perf_config_ext={0x5, 0x8}, 0x1ab23, 0x0, 0x8, 0x5, 0x6}, 0xffffffffffffffff, 0x10, r0, 0x1) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0xb, 0x9, &(0x7f0000000580)=@framed={{0x18}, [@map={0x18, 0x0, 0x1, 0x0, r0}, @generic={0x3ff, 0xfffffffffffffffc, 0x1}, @call={0x85, 0x0, 0x0, 0x6}], {0x95}}, &(0x7f0000000600)='syzkaller\x00', 0x0, 0x30, &(0x7f0000000640)=""/48, 0x41f00, 0x1}, 0x48) ioctl$PERF_EVENT_IOC_SET_BPF(r2, 0x40042408, r3) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000000)={&(0x7f0000000080)='./file0/file0\x00', r0}, 0x10) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000400)=@ax25={0x3, {"02f47b3723e03d"}}, 0x80, &(0x7f00000017c0), 0x0, &(0x7f0000001840)=ANY=[], 0x0, 0x24004044}, 0x4008001) bpf$MAP_CREATE(0x0, &(0x7f0000002cc0)={0x5, 0x100, 0x56c96e7a, 0x2, 0xa, 0xffffffffffffffff, 0x9}, 0x2c) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000480)='rpc_pipefs\x00', 0x200000, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000002d00)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f00000004c0)='vmnet0keyring\x00') bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000780)={&(0x7f0000000740)='./file0/file0\x00', r4}, 0x10) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x40082406, &(0x7f0000000700)='proc!@ppp1!ppp0ppp0#)lo\\lolo{\x00') mount(&(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000200)='fuseblk\x00', 0xa11800, &(0x7f0000000240)) r5 = syz_open_dev$sg(&(0x7f0000000240)='/dev/sg#\x00', 0xfffffffffffffffa, 0x800) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000280)={r5, r3, 0x5, 0x1}, 0x10) ioctl$TIOCCONS(r5, 0x541d) mount(&(0x7f00000002c0)='./file0/file0\x00', &(0x7f0000000300)='./file0/file0\x00', &(0x7f0000000340)='minix\x00', 0x1000, &(0x7f0000000380)) [ 276.767127] IPVS: set_ctl: invalid protocol: 0 172.20.20.170:20001 lblcr [ 276.795455] IPVS: sync thread started: state = MASTER, mcast_ifn = vcan0, syncid = 2, id = 0 2018/03/29 17:34:58 executing program 6: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000ed4000)=0x78, 0x4) bind$inet(r0, &(0x7f0000deb000)={0x2, 0x4e23, @multicast1=0xe0000001}, 0x10) ioctl$sock_SIOCINQ(r0, 0x541b, &(0x7f0000000500)) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000f40ff8)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) getsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(0xffffffffffffff9c, 0x84, 0x1f, &(0x7f0000000240)={0x0, @in={{0x2, 0x4e23}}, 0x0, 0x3}, &(0x7f0000000000)=0x90) setsockopt$inet_sctp_SCTP_RTOINFO(r0, 0x84, 0x0, &(0x7f0000000040)={r1, 0x81, 0x7, 0x100000000}, 0x10) getsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(r0, 0x84, 0x18, &(0x7f00000003c0)={0x0, 0x7}, &(0x7f0000000400)=0x8) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_INFO(0xffffffffffffffff, 0xc08c5334, &(0x7f0000000600)={0x6, 0x7, 0x2f29fdaf, 'queue0\x00', 0x800}) r2 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000080)='/dev/hwrng\x00', 0x0, 0x0) sendto$inet(r0, &(0x7f0000a88f88), 0x29f, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @loopback=0x7f000001}, 0x10) pipe2(&(0x7f0000000580)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80002) ioctl$EVIOCGBITKEY(0xffffffffffffffff, 0x80404521, &(0x7f00000000c0)=""/160) sendmmsg(r0, &(0x7f00000025c0)=[{{&(0x7f0000000300)=@pppoe={0x18, 0x0, {0x0, @link_local={0x1, 0x80, 0xc2}, 'ip6tnl0\x00'}}, 0x80, &(0x7f0000000380)=[{&(0x7f00000010c0)="9421e5271f45907f567d604a09fe27abfa55e2aebecfe4a0aeda13b3d2418870405797686467855ad166a77fa809f72ab92d438b38975596f98c0c03126989f5a4a3fe4878335988dfb98b11d880cc928c21fccdcf2086d98e2ac4ab265ff234ba0a86ee14bbb2bf4cc210f6ca6a5d3d18d3110ac82704ac8a979bebe6ea1a803cb5a21babf0a28c6741f5493a7189c764564aa039257ce92830f1a25bb6fb553231195be0ff72269d4b8503dbb0bc6c23f0341aa626735a002006f6c2b036efa5d1e087ee6181ffb3d0f5f569629e1691681449dc33e4b96e7d71acec3270c46c74442fbb78a39abcddd7c12b184b60f369e4cbf65bddc6e709130c8664607bf74f8e51b570d3a12155be268339d9e2012ee5e7f8ac4696119e847f2fc96f6006cbda28c502d7ee34fcabbbb5c303f7cd3292aabb74a7bff1f76fce1b1fe13482fda1408973de9868e96c630ff08bd68c3a98d07ce0662997755f039a7ee45bdae739d3f3b1cbd5ecfa8825b540b6417c730ec4a8204ce2ba6ebd0c9452b0cc1273bbd591314867c54abafc48697fed81bfeec349729da076218770bb7ba8a2aedca9000638018a28abcaa3dc6642db8097039f0f9f6fdd1ab481507e5796d65b2a81bd38b11c518feed59fce3147bb2bd31518c6032745185a44a98ec2efe3f8eb27709c2e70cfef9a971f97159e74868d6a55e1a8e6e7b500d7c116f02594a58e3dceb86175af56c7502287ddab530acb67386725e0d6b2e317cb0b87affd30d4ff210024287c19d27033b7a11bf18d1ce1e23f618476b15c3a5574fdc0f238f2ec1c3cd2784fd3d8235278bd957c929021d97da58459f921a47002a4841ff77262b7150c5fbda7f8bf6801c22adfb0bc96f7a2d8527aaf00ae5b663eb0f69914dc722b2d7b1e4861ed66168b7c6afa56fff36de7c842f3d24ecc65d25f24917f0867f6a2fb7c5a02335ff1870d35c3aba978208c118fb5ed56f102cf9bfde60786175bc25ebba02aaa4cbbdc95afa96c3449e53c5ea7e92bdabc8ae8b28370cdefc009698f8f870da37e1b188a5439428b619618179900e03df2d5926bd0a69fe94b5553ce84323a03b371d35d4984daa8e4f52cbc75d05dbd12d3bdcc5125ea53559ae82593a6a8d9812ea99d4166451edc55e5dd97f98b7e5c6527658765d14c9c5be3fc4153881d666dbf5eb45c1cbde2781a985f59e7e5aab7d9398dcc21e1d7495047a5afb84727aadc86854edd5a5a645ca3715b2c78ef32702231aa8be45cf97ac787765bbb631f6a357d292bbe97e7d3ec6d15b82f0985f7c0fe679b9788674b80312b5f365dbcf1a8eb5e295084485dcc92f2b905cdded6e2e81cfc7e9d29ec61fd893d120c31b9101770f4cb2e38a8a518295d373f9e6ba8a7226542c67a2ea423f1a32722260ad533435f903933a70906b10e7e5efac4ba3830e242919997a34044cb831a59186eeb68a93ff9eac431e938b48b810a08aab9730597e196127e4b64a6fd8b431a79f8253b031a59c22e3eeeeb5267441e8c962c8db6ba0bc5b4cc3291aa1672049cec15d0272d4441cbb2412b4a3456935403429aeb7644edc9ef26a9096c87632c4458335949fd2a27fa89c78353ae5adab7594eff5b7e8cd8bc43cc602f914e61b04d8c6e24bd7ef078e3b1b02f61df5c6e6f1648fa6a6022c045390ba8c61b73538f8975142eeba57a52d0d038014010a05ec1e16691a81a748bb222068f08b593a5b3f421767c6611fd3799794be1b0aa2b4d66f65bb4c6ee7a17c44dca1bd6a3fe2159b0ad427097f63f6f8df4852e66b34bc787dc2e236308e56d70e608f97ee4da5b631eaa26582d9bbc86e9f51554f2eec09bbb497fd114e200465d9fb75426a84f7d1ef4b967763e628774f59eeac514fc0d83e952b54b91696e80ce73c6d8b7ef4cd2225fb5ad6f837fa9ddd5428cfe1b7c8113c5fdec44dfbc08b4dcd8deeb7ee0a20063994de4bbdc2a54b4522fab89f43122becda26248b2fc4c9b40fc772a54405c23d248c228c557f7d6c7829928c908babf440101171defbf93b88b2df9c01402bf7ba72be3c28100a83f747160bf64769155329af77b1588c65e7eb81b45c2341976a003a15477b239601e890fee9b3d03dd6db89bb8e3815fd9d6eae54ec94821dca6a9204a448b1a3e3f95aac1fc2e739cf72c9c2c7e9d718d8f03d00fe4a9c1161d0eb24c46c9f0167b6277854f80a8af9540a8ee3ffa0c8648be1cf9436061a92f4b219eb20647d9ba686ec9abc218aa0a9e6188924929e149564e2fb48df003c3c9f064323a07a4a91b4988", 0x664}], 0x1}}], 0x1, 0x4000) recvfrom$inet(r0, &(0x7f00009be000)=""/11, 0xe8, 0x0, 0x0, 0xffffffffffffff4e) bind$bt_l2cap(r3, &(0x7f0000000440)={0x1f, 0x8, {0x6, 0x400, 0x0, 0x2, 0x9, 0x3}, 0x10001, 0x2}, 0xe) setsockopt(r4, 0xb5, 0xffffffff, &(0x7f00000006c0)="0ac385d7ac2ae574baf1b3104b37fd7f20ebca1da5063c612b05a3d56c8b2e413e64bfc3e0bb415e656477eea9c01ad808e74aea23e7e4a07d09f22e69e1ae37fecf707d249ba82f1fc8f4a53558952762a62d5712f7ad3f1e2d51e5e3cf31154625d23de117cbb19fe0379b78ae656d20a1840850e0d1b6f6d94f8c810560030e0ac978d48567edbbb1f79c22a73e5a978f82d9", 0x94) getsockopt$inet_sctp_SCTP_RECVRCVINFO(r0, 0x84, 0x20, &(0x7f0000000180), &(0x7f00000001c0)=0x4) sendmsg$netrom(r2, &(0x7f0000000b00)={&(0x7f0000000780)=@full={{0x3, {"53665db4283e1b"}, 0x3}, [{"d40335b6bcd5d9"}, {"d5952336c520fb"}, {"d326c92416d6ea"}, {"763aea9242214f"}, {"d716c11982a583"}, {"712de86f857435"}, {"1d8bd63f2c431c"}, {"6f5a0b1522aca6"}]}, 0x48, &(0x7f0000000ac0), 0x0, &(0x7f00000017c0)=[{0x10, 0x117, 0x9}], 0x10, 0x8000}, 0x4000840) setsockopt$inet_mtu(r2, 0x0, 0xa, &(0x7f0000000480), 0x4) r5 = getpid() epoll_ctl$EPOLL_CTL_ADD(r2, 0x1, r2, &(0x7f00000004c0)={0x5}) syz_open_procfs(r5, &(0x7f00000005c0)='maps\x00') shutdown(r0, 0x1) 2018/03/29 17:34:58 executing program 1: r0 = open(&(0x7f0000000440)='./file0\x00', 0x1ffff, 0x5) ioctl$TIOCLINUX7(0xffffffffffffffff, 0x541c, &(0x7f0000000080)={0x7}) setsockopt$inet_tcp_int(r0, 0x6, 0x0, &(0x7f00000003c0)=0x6, 0xf4) perf_event_open(&(0x7f0000000240)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000180)='/dev/sequencer2\x00', 0x0, 0x0) clock_gettime(0x0, &(0x7f00000001c0)={0x0, 0x0}) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r1, 0x4040534e, &(0x7f0000000340)={0x124, @time={r2, r3+30000000}, 0x1, {0x8}, 0x101, 0x2}) r4 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000040)='/dev/rtc\x00', 0x0, 0x0) r5 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000580)='/dev/sequencer\x00', 0x0, 0x0) ioctl$LOOP_CLR_FD(r4, 0x7003) getsockopt$inet_sctp_SCTP_FRAGMENT_INTERLEAVE(0xffffffffffffffff, 0x84, 0x12, &(0x7f0000000140), &(0x7f00000002c0)=0x4) setsockopt$packet_buf(0xffffffffffffffff, 0x107, 0xd, &(0x7f00000004c0)="d9fb4f1bcfd3e0c1355ea2018b25a4fd911d8abc3f3fd71f4749878ac1fbce6e5d188e078b15be141905d7966406e4f3fb021da63028837a8407bcb3e3a676d251bcd09a04964ed9cd0f6cece267dc4bada0403dcef25dace8875f4a6495eb2e6cc4969e7de83153459b4d61669ed9eb7567", 0x72) perf_event_open(&(0x7f00000000c0)={0x0, 0x70, 0x0, 0x0, 0x7ff, 0xa1, 0x0, 0x1, 0x200, 0x2, 0x5, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x1, 0x4, 0xb0, 0x5, 0x0, 0x0, 0xcf, 0x0, 0x0, 0x100000000, 0x3ff, 0x0, 0x0, 0x2, 0x1f, 0x2, 0x5, 0x9, 0x3, 0x0, 0x4, 0x0, 0x20000000, 0x195d678803a3a953, @perf_config_ext={0x9, 0x5}, 0x10, 0x3, 0x8, 0x0, 0x72eb, 0x99, 0x1}, 0x0, 0xd, r4, 0x8) mq_notify(r5, &(0x7f0000000400)) execve(&(0x7f0000000200)='./file0\x00', &(0x7f0000000680)=[&(0x7f0000000600)='\x00', &(0x7f0000000640)='proc\x00'], &(0x7f0000000740)=[&(0x7f00000006c0)='\'\x00', &(0x7f0000000700)='trustedwlan0vmnet0@%\x00']) 2018/03/29 17:34:58 executing program 7: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)={0xb, 0x7e, 0x3, 0x1, 0x11}, 0x2c) mount(&(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) r1 = socket$kcm(0x29, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000000bc0)={&(0x7f00000007c0)=@rc={0x1f, {0x5, 0x50000000, 0xaa2, 0x613, 0x4, 0x1ff}, 0x3f}, 0x80, &(0x7f0000000940)=[{&(0x7f0000000840)="09c9453aa30d8c5fba221fa2413f12c580837b2ae292e3ee8dd00098c404125a1a2e63840f82a2f69c3927af43b828422484aaeeceebcbe76e999bd3930c9b7c2995484407f9166e39c2069a88b63a980b9b5ffc880f4b89dde5adae6c7fb84ed98cbac860214dfb0b28d1b2e2d58aefebdfe515334f2ffa46be22ef7a4b3a276cb70a27c9e9f5de0a20bad24cbe2b89aee9693c2f8f186ea59fcfc4ebec7188cca0418d4583a6f1730f62416d70cd62555eb4f58ea831d1fea9956a2cba0049f23bf0b249f5de2ce0dc303808d70b0ccab3c7f37e949e", 0xd7}], 0x1, &(0x7f0000000980), 0x0, 0x20004805}, 0x4010) r2 = perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x2367, 0x7fff, 0x1, 0x6, 0x0, 0x78b1, 0x1, 0x0, 0x4992c766, 0xff, 0x81, 0x100, 0x40, 0x3, 0x9, 0x8, 0x1, 0x10000, 0x0, 0x6, 0x90e, 0x9, 0x7ff, 0x0, 0x8, 0x1, 0x30, 0x20, 0x7fffffff, 0x6, 0x401, 0x2, 0x1000, 0x8001, 0x1ff, 0xfffffffffffffff8, 0x0, 0x2, 0x0, @perf_config_ext={0x5, 0x8}, 0x1ab23, 0x3f, 0x8, 0x5, 0x6, 0x0, 0x6}, 0xffffffffffffffff, 0x10, r0, 0x1) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0xb, 0x9, &(0x7f0000000980)=ANY=[@ANYBLOB="1800000000080000000000000080e80018100000825f621211538b7ffa19c6a677dc9ff2cc111a947724fccb3eabc4da159321ed1674f41e813d1bcc6b7409103d07bc24c2f551c979193e702850b16af84e5ebff3df911c2a0ecf35d2f1f43de186f48e74ab8a94c215e8a04dc3458de1", @ANYRES32=r0, @ANYBLOB="0000000000000000fffc0100000000000000000000000000850000000600000000000000000000009500000000000000"], &(0x7f0000000600)='syzkaller\x00', 0x0, 0x30, &(0x7f0000000640)=""/48, 0x41f00, 0x1}, 0x48) r4 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000240)='/proc/self/net/pfkey\x00', 0x200, 0x0) ioctl$TUNGETSNDBUF(r4, 0x800454d3, &(0x7f0000000280)) ioctl$PERF_EVENT_IOC_SET_BPF(r2, 0x40042408, r3) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000000)={&(0x7f0000000080)='./file0/file0\x00', r0}, 0x10) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000400)=@ax25={0x3, {"02f47b3723e03d"}}, 0x80, &(0x7f00000017c0), 0x0, &(0x7f0000001840)=ANY=[], 0x0, 0x24004044}, 0x4008001) bpf$MAP_CREATE(0x0, &(0x7f0000002cc0)={0x5, 0x0, 0x56c96e7a, 0x6, 0xa, 0xffffffffffffffff, 0x9}, 0x2c) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000480)='rpc_pipefs\x00', 0x200000, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000002d00)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x40082406, &(0x7f0000000580)='vmnet0+eyring\x00') bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000780)={&(0x7f0000000740)='./file0/file0\x00', r5}, 0x10) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x40082406, &(0x7f0000000700)='proc!@ppp1!ppp0ppp0#)lo\\lolo{\x00') mount(&(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000200)='fuseblk\x00', 0xa11800, &(0x7f0000000240)) mount(&(0x7f00000002c0)='./file0/file0\x00', &(0x7f0000000300)='./file0/file0\x00', &(0x7f0000000340)='minix\x00', 0x1000, &(0x7f0000000380)) 2018/03/29 17:34:58 executing program 5: mmap(&(0x7f0000000000/0xef4000)=nil, 0xef4000, 0x3, 0x10, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x2, 0x0, 0x0) socketpair(0x0, 0xf, 0x7ff, &(0x7f0000001700)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$RDS_CANCEL_SENT_TO(r1, 0x114, 0x1, &(0x7f00000017c0)={0x2, 0x4e20, @multicast2=0xe0000002}, 0x10) r2 = accept(r0, &(0x7f0000001b80)=@sco, &(0x7f0000001c00)=0x80) sendto$inet(r0, &(0x7f0000edf000), 0x0, 0x0, &(0x7f0000ee9ff0)={0x2, 0x4e20}, 0x10) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$inet6_tcp_int(r3, 0x6, 0xc, &(0x7f0000001800), &(0x7f0000001a80)=0xfffffcdf) r4 = socket$vsock_stream(0x28, 0x1, 0x0) bind$vsock_stream(r4, &(0x7f0000001a00)={0x28, 0x0, 0x2710, @hyper}, 0x10) r5 = socket(0x8, 0x80802, 0x1200094a00000) ioctl$DRM_IOCTL_PRIME_FD_TO_HANDLE(0xffffffffffffff9c, 0xc00c642e, &(0x7f0000001ac0)={0x0, 0x80000, 0xffffffffffffffff}) ioctl$DRM_IOCTL_ADD_CTX(0xffffffffffffffff, 0xc0086420, &(0x7f0000001b00)={0x0}) ioctl$DRM_IOCTL_NEW_CTX(r6, 0x40086425, &(0x7f0000001b40)={r7, 0x2}) getsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX3(r5, 0x84, 0x6f, &(0x7f0000001c80)={0x0, 0x1c, &(0x7f0000001c40)=[@in6={0xa, 0x4e21, 0x8b, @ipv4={[], [0xff, 0xff], @loopback=0x7f000001}}]}, &(0x7f0000001cc0)=0x10) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r5, 0x84, 0x6f, &(0x7f0000001d80)={r8, 0x4c, &(0x7f0000001d00)=[@in={0x2, 0x4e24, @remote={0xac, 0x14, 0x14, 0xbb}}, @in6={0xa, 0x4e21, 0xfffffffffffffffb, @remote={0xfe, 0x80, [], 0xbb}, 0x3ff}, @in={0x2, 0x4e23, @remote={0xac, 0x14, 0x14, 0xbb}}, @in={0x2, 0x4e20, @rand_addr=0x9}]}, &(0x7f0000001dc0)=0x10) sendmsg$rds(r5, &(0x7f00000019c0)={&(0x7f0000000000)={0x2, 0x4e21, @broadcast=0xffffffff}, 0x10, &(0x7f0000001640)=[{&(0x7f0000000040)=""/4096, 0x1000}, {&(0x7f0000001040)=""/74, 0x4a}, {&(0x7f00000010c0)=""/207, 0xcf}, {&(0x7f00000011c0)=""/253, 0xfd}, {&(0x7f00000012c0)=""/128, 0x80}, {&(0x7f0000001340)=""/71, 0x47}, {&(0x7f00000013c0)=""/76, 0x4c}, {&(0x7f0000001440)=""/244, 0xf4}, {&(0x7f0000001540)=""/211, 0xd3}], 0x9, &(0x7f0000001880)=ANY=[@ANYBLOB="580000000000000014010000060000000100000004000000", @ANYPTR=&(0x7f0000001780)=ANY=[@ANYBLOB='B\x00\x00\x00\x00\x00\x00\x00'], @ANYPTR=&(0x7f0000001840)=ANY=[@ANYBLOB="0200000000000000"]], 0x28, 0x8004}, 0x40084) sendto$inet(r2, &(0x7f0000001e00)="b1c1d6115b632f1c", 0x8, 0x0, &(0x7f0000001e40)={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x15}}, 0x10) 2018/03/29 17:34:58 executing program 0: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)={0xb, 0x7e, 0x3, 0x1, 0x11}, 0x2c) mount(&(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) r1 = socket$kcm(0x29, 0x7, 0x0) sendmsg$kcm(r1, &(0x7f0000000bc0)={&(0x7f00000007c0)=@rc={0x1f, {0x5, 0x50000000, 0xaa2, 0x613, 0x4, 0x1ff}}, 0x80, &(0x7f0000000940)=[{&(0x7f0000000840)="09c9453aa30d8c5fba221fa2413f12c580837b2ae292e3ee8dd00098c404125a1a2e63840f82a2f69c3927af43b828422484aaeeceebcbe76e999bd3930c9b7c2995484407f9166e39c2069a88b63a980b9b5ffc880f4b89dde5adae6c7fb84ed98cbac860214dfb0b28d1b2e2d58aefebdfe515334f2ffa46be22ef7a4b3a276cb70a27c9e9f5de0a20bad24cbe2b89aee9693c2f8f186ea59fcfc4ebec7188cca0418d4583a6f1730f62416d70cd62555eb4f58ea831d1fea9956a2cba0049f23bf0b249f5de2ce0dc303808d70b0ccab3c7f37e949e", 0xd7}], 0x1, &(0x7f0000000980)}, 0x4010) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0xb, 0x9, &(0x7f0000000580)=@framed={{0x18}, [@map={0x18, 0x0, 0x1, 0x0, r0}, @generic={0x3ff, 0xfffffffffffffffc, 0x1}, @call={0x85, 0x0, 0x0, 0x6}], {0x95}}, &(0x7f0000000600)='syzkaller\x00', 0x0, 0x30, &(0x7f0000000640)=""/48, 0x41f00, 0x1}, 0x48) ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, r2) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000000)={&(0x7f0000000080)='./file0/file0\x00', r0}, 0x10) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000400)=@ax25={0x3, {"02f47b3723e03d"}}, 0x80, &(0x7f00000017c0), 0x0, &(0x7f0000001840)=ANY=[], 0x0, 0x24004044}, 0x4008001) bpf$MAP_CREATE(0x0, &(0x7f0000002cc0)={0x5, 0x100, 0x56c96e7a, 0x2, 0xa, 0xffffffffffffffff, 0x9}, 0x2c) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000480)='rpc_pipefs\x00', 0x200000, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000002d00)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f00000004c0)='vmnet0keyring\x00') bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000780)={&(0x7f0000000740)='./file0/file0\x00', r3}, 0x10) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, &(0x7f0000000700)='proc!@ppp1!ppp0ppp0#)lo\\lolo{\x00') mount(&(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000200)='fuseblk\x00', 0xa11800, &(0x7f0000000240)) mount(&(0x7f00000002c0)='./file0/file0\x00', &(0x7f0000000300)='./file0/file0\x00', &(0x7f0000000340)='minix\x00', 0x0, &(0x7f0000000380)) r4 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000240)='/proc/self/net/pfkey\x00', 0x40000, 0x0) setsockopt$inet_tcp_buf(r4, 0x6, 0x1a, &(0x7f0000000980)="8a95acc7ab9b248293a0a5444f74c0bf70ddd7eedeeaefd8280daf5ce339e0a482ee38eae27f924af8a12479410ecbe05efe92b1f2f879465049175be0be6b945221b66a12c5e63a3ea3c112f3c6552ba0fa99056968686a113087d7d5dbf7f73b5ed1f6ffc69a0b017ec973ccd883dadb590875c7bb737c8f6cb7093842bf847a8c091d12e106761611505517b9242d41fb0a72aa9072cd6a86ef1c55e6a79cd665c560c6e857efae0b8bd41530edee12bea90e60014d3cc58b0b07c87fa54ece73b05e2f54d3cb3691ec6b95cdda67b833eaad65cd137211829f86", 0xdc) 2018/03/29 17:34:58 executing program 4: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)={0xb, 0x7e, 0x3, 0x1, 0x11}, 0x2c) mount(&(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) r1 = socket$kcm(0x29, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000000bc0)={&(0x7f00000007c0)=@rc={0x1f, {0x5, 0x50000000, 0xaa2, 0x613, 0x4, 0x1ff}, 0x3f}, 0x80, &(0x7f0000000940)=[{&(0x7f0000000840)="09c9453aa30d8c5fba221fa2413f12c580837b2ae292e3ee8dd00098c404125a1a2e63840f82a2f69c3927af43b828422484aaeeceebcbe76e999bd3930c9b7c2995484407f9166e39c2069a88b63a980b9b5ffc880f4b89dde5adae6c7fb84ed98cbac860214dfb0b28d1b2e2d58aefebdfe515334f2ffa46be22ef7a4b3a276cb70a27c9e9f5de0a20bad24cbe2b89aee9693c2f8f186ea59fcfc4ebec7188cca0418d4583a6f1730f62416d70cd62555eb4f58ea831d1fea9956a2cba0049f23bf0b249f5de2ce0dc303808d70b0ccab3c7f37e949e", 0xd7}], 0x1, &(0x7f0000000980), 0x0, 0x20004805}, 0x4010) r2 = perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x2367, 0x7fff, 0x1, 0x6, 0x0, 0x78b1, 0x1, 0x0, 0x4992c766, 0xff, 0x81, 0x100, 0x40, 0x3, 0x9, 0x8, 0x1, 0x10000, 0x0, 0x6, 0x90e, 0x9, 0x7ff, 0x0, 0x8, 0x1, 0x30, 0x20, 0x7fffffff, 0x6, 0x401, 0x2, 0x1000, 0x8001, 0x1ff, 0xfffffffffffffff8, 0x0, 0x2, 0x0, @perf_config_ext={0x5, 0x8}, 0x1ab23, 0x3f, 0x0, 0x5, 0x6}, 0xffffffffffffffff, 0x10, r0, 0x1) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0xb, 0x9, &(0x7f0000000580)=@framed={{0x18}, [@map={0x18, 0x0, 0x1, 0x0, r0}, @generic={0x3ff, 0xfffffffffffffffc, 0x1}, @call={0x85, 0x0, 0x0, 0x6}], {0x95}}, &(0x7f0000000600)='syzkaller\x00', 0x0, 0x30, &(0x7f0000000640)=""/48, 0x41f00, 0x1}, 0x48) ioctl$PERF_EVENT_IOC_SET_BPF(r2, 0x40042408, r3) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000000)={&(0x7f0000000080)='./file0/file0\x00', r0}, 0x10) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000400)=@ax25={0x3, {"02f47b3723e03d"}}, 0x80, &(0x7f00000017c0), 0x0, &(0x7f0000001840)=ANY=[], 0x0, 0x24004044}, 0x4008001) bpf$MAP_CREATE(0x0, &(0x7f0000002cc0)={0x5, 0x100, 0x56c96e7a, 0x2, 0xa, 0xffffffffffffffff, 0x9}, 0x2c) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000480)='rpc_pipefs\x00', 0x200000, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000002d00)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f00000004c0)='vmnet0keyring\x00') bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000780)={&(0x7f0000000740)='./file0/file0\x00', r4}, 0x10) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x40082406, &(0x7f0000000700)='proc!@ppp1!ppp0ppp0#)lo\\lolo{\x00') mount(&(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000200)='fuseblk\x00', 0xa11800, &(0x7f0000000240)) r5 = syz_open_dev$sg(&(0x7f0000000240)='/dev/sg#\x00', 0xfffffffffffffffa, 0x800) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000280)={r5, r3, 0x5, 0x1}, 0x10) ioctl$TIOCCONS(r5, 0x541d) mount(&(0x7f00000002c0)='./file0/file0\x00', &(0x7f0000000300)='./file0/file0\x00', &(0x7f0000000340)='minix\x00', 0x1000, &(0x7f0000000380)) 2018/03/29 17:34:58 executing program 2: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)={0xb, 0x7e, 0x3, 0x1, 0x11}, 0x2c) mount(&(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) r1 = socket$kcm(0x29, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000000bc0)={&(0x7f00000007c0)=@rc={0x1f, {0x5, 0x50000000, 0xaa2, 0x613, 0x4, 0x1ff}, 0x3f}, 0x80, &(0x7f0000000940)=[{&(0x7f0000000840)="09c9453aa30d8c5fba221fa2413f12c580837b2ae292e3ee8dd00098c404125a1a2e63840f82a2f69c3927af43b828422484aaeeceebcbe76e999bd3930c9b7c2995484407f9166e39c2069a88b63a980b9b5ffc880f4b89dde5adae6c7fb84ed98cbac860214dfb0b28d1b2e2d58aefebdfe515334f2ffa46be22ef7a4b3a276cb70a27c9e9f5de0a20bad24cbe2b89aee9693c2f8f186ea59fcfc4ebec7188cca0418d4583a6f1730f62416d70cd62555eb4f58ea831d1fea9956a2cba0049f23bf0b249f5de2ce0dc303808d70b0ccab3c7f37e949e", 0xd7}], 0x1, &(0x7f0000000980), 0x0, 0x20004805}, 0x4010) r2 = perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x2367, 0x7fff, 0x1, 0x6, 0x0, 0x78b1, 0x1, 0x0, 0x4992c766, 0xff, 0x81, 0x100, 0x40, 0x3, 0x9, 0x8, 0x1, 0x10000, 0x0, 0x6, 0x90e, 0x9, 0x7ff, 0x0, 0x8, 0x1, 0x30, 0x20, 0x7fffffff, 0x6, 0x401, 0x2, 0x1000, 0x8001, 0x1ff, 0xfffffffffffffff8, 0x0, 0x2, 0x0, @perf_config_ext={0x5, 0x8}, 0x1ab23, 0x0, 0x8, 0x5, 0x6, 0x0, 0x6}, 0xffffffffffffffff, 0x10, r0, 0x1) bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0xb, 0x9, &(0x7f0000000580)=@framed={{0x18}, [@map={0x18, 0x0, 0x1, 0x0, r0}, @generic={0x3ff, 0xfffffffffffffffc, 0x1}, @call={0x85, 0x0, 0x0, 0x6}], {0x95}}, &(0x7f0000000600)='syzkaller\x00', 0x0, 0x30, &(0x7f0000000640)=""/48, 0x41f00, 0x1}, 0x48) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000000)={&(0x7f0000000080)='./file0/file0\x00', r0}, 0x10) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000400)=@ax25={0x3, {"02f47b3723e03d"}}, 0x80, &(0x7f00000017c0), 0x0, &(0x7f0000001840)=ANY=[], 0x0, 0x24004044}, 0x4008001) bpf$MAP_CREATE(0x0, &(0x7f0000002cc0)={0x5, 0x0, 0x56c96e7a, 0x2, 0xa, 0xffffffffffffffff, 0x9}, 0x2c) ioctl$sock_kcm_SIOCKCMCLONE(r1, 0x89e2, &(0x7f0000000100)={r1}) bind$netrom(r3, &(0x7f0000000180)=@ax25={0x3, {"4a7e31e05a6d69"}, 0x2}, 0x10) mount(&(0x7f0000000280)='./file0\x00', &(0x7f0000000240)='./file0/file0\x00', &(0x7f0000000480)='rpc_pipefs\x00', 0xa00005, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000002d00)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f00000004c0)='vmnet0keyring\x00') bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000780)={&(0x7f0000000740)='./file0/file0\x00', r4}, 0x10) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x40082406, &(0x7f0000000700)='proc!@ppp1!ppp0ppp0#)lo\\lolo{\x00') mount(&(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000200)='fuseblk\x00', 0xa11800, &(0x7f0000000240)) mount(&(0x7f00000002c0)='./file0/file0\x00', &(0x7f0000000300)='./file0/file0\x00', &(0x7f0000000340)='minix\x00', 0x1000, &(0x7f0000000380)) 2018/03/29 17:34:58 executing program 3: r0 = socket(0xa, 0x2, 0x0) r1 = open(&(0x7f00004b8ff8)='./file0\x00', 0x28042, 0x0) connect$inet6(r0, &(0x7f0000d3cfe4)={0xa, 0x0, 0x0, @mcast2={0xff, 0x2, [], 0x1}, 0x3}, 0x1c) ioctl$DRM_IOCTL_ADD_CTX(r1, 0xc0086420, &(0x7f0000000000)) ioctl$PPPIOCGFLAGS(r1, 0x8004745a, &(0x7f00000000c0)) ioctl$DRM_IOCTL_NEW_CTX(r1, 0x40086425, &(0x7f0000000080)={0x0, 0x3}) fallocate(r1, 0x0, 0xffff, 0x1f) setsockopt$inet6_mtu(0xffffffffffffffff, 0x29, 0x17, &(0x7f0000000100)=0x2, 0x4) connect$inet(r0, &(0x7f0000000040)={0x2, 0x4e22, @multicast1=0xe0000001}, 0x10) sendfile(r0, r1, &(0x7f00005faff8), 0xfffb) [ 276.824802] IPVS: set_ctl: invalid protocol: 0 172.20.20.170:20001 lblcr 2018/03/29 17:34:58 executing program 4: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)={0xb, 0x7e, 0x3, 0x1, 0x11}, 0x2c) mount(&(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) r1 = socket$kcm(0x29, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000000bc0)={&(0x7f00000007c0)=@rc={0x1f, {0x5, 0x50000000, 0xaa2, 0x613, 0x4, 0x1ff}, 0x3f}, 0x80, &(0x7f0000000940)=[{&(0x7f0000000840)="09c9453aa30d8c5fba221fa2413f12c580837b2ae292e3ee8dd00098c404125a1a2e63840f82a2f69c3927af43b828422484aaeeceebcbe76e999bd3930c9b7c2995484407f9166e39c2069a88b63a980b9b5ffc880f4b89dde5adae6c7fb84ed98cbac860214dfb0b28d1b2e2d58aefebdfe515334f2ffa46be22ef7a4b3a276cb70a27c9e9f5de0a20bad24cbe2b89aee9693c2f8f186ea59fcfc4ebec7188cca0418d4583a6f1730f62416d70cd62555eb4f58ea831d1fea9956a2cba0049f23bf0b249f5de2ce0dc303808d70b0ccab3c7f37e949e", 0xd7}], 0x1, &(0x7f0000000980), 0x0, 0x20004805}, 0x4010) r2 = perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x2367, 0x7fff, 0x1, 0x6, 0x0, 0x78b1, 0x1, 0x0, 0x4992c766, 0xff, 0x81, 0x100, 0x40, 0x3, 0x9, 0x8, 0x1, 0x10000, 0x0, 0x6, 0x90e, 0x9, 0x7ff, 0x0, 0x8, 0x1, 0x30, 0x20, 0x7fffffff, 0x6, 0x401, 0x2, 0x1000, 0x8001, 0x1ff, 0xfffffffffffffff8, 0x0, 0x2, 0x0, @perf_config_ext={0x5, 0x8}, 0x1ab23, 0x3f, 0x0, 0x5, 0x6}, 0xffffffffffffffff, 0x10, r0, 0x1) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0xb, 0x9, &(0x7f0000000580)=@framed={{0x18}, [@map={0x18, 0x0, 0x1, 0x0, r0}, @generic={0x3ff, 0xfffffffffffffffc, 0x1}, @call={0x85, 0x0, 0x0, 0x6}], {0x95}}, &(0x7f0000000600)='syzkaller\x00', 0x0, 0x30, &(0x7f0000000640)=""/48, 0x41f00, 0x1}, 0x48) ioctl$PERF_EVENT_IOC_SET_BPF(r2, 0x40042408, r3) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000000)={&(0x7f0000000080)='./file0/file0\x00', r0}, 0x10) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000400)=@ax25={0x3, {"02f47b3723e03d"}}, 0x80, &(0x7f00000017c0), 0x0, &(0x7f0000001840)=ANY=[], 0x0, 0x24004044}, 0x4008001) bpf$MAP_CREATE(0x0, &(0x7f0000002cc0)={0x5, 0x100, 0x56c96e7a, 0x2, 0xa, 0xffffffffffffffff, 0x9}, 0x2c) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000480)='rpc_pipefs\x00', 0x200000, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000002d00)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f00000004c0)='vmnet0keyring\x00') bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000780)={&(0x7f0000000740)='./file0/file0\x00', r4}, 0x10) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x40082406, &(0x7f0000000700)='proc!@ppp1!ppp0ppp0#)lo\\lolo{\x00') mount(&(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000200)='fuseblk\x00', 0xa11800, &(0x7f0000000240)) r5 = syz_open_dev$sg(&(0x7f0000000240)='/dev/sg#\x00', 0xfffffffffffffffa, 0x800) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000280)={r5, r3, 0x5, 0x1}, 0x10) ioctl$TIOCCONS(r5, 0x541d) mount(&(0x7f00000002c0)='./file0/file0\x00', &(0x7f0000000300)='./file0/file0\x00', &(0x7f0000000340)='minix\x00', 0x1000, &(0x7f0000000380)) 2018/03/29 17:34:58 executing program 1: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000ed4000)=0x78, 0x4) bind$inet(r0, &(0x7f0000deb000)={0x2, 0x4e23, @multicast1=0xe0000001}, 0x10) ioctl$sock_SIOCINQ(r0, 0x541b, &(0x7f0000000500)) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000f40ff8)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) getsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(0xffffffffffffff9c, 0x84, 0x1f, &(0x7f0000000240)={0x0, @in={{0x2, 0x4e23}}, 0x0, 0x3}, &(0x7f0000000000)=0x90) setsockopt$inet_sctp_SCTP_RTOINFO(r0, 0x84, 0x0, &(0x7f0000000040)={r1, 0x81, 0x7, 0x100000000}, 0x10) getsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(r0, 0x84, 0x18, &(0x7f00000003c0)={r1, 0x7}, &(0x7f0000000400)=0x8) socketpair(0x11, 0x800, 0x5, &(0x7f0000000200)={0xffffffffffffffff}) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_INFO(r2, 0xc08c5334, &(0x7f0000000600)={0x6, 0x7, 0x2f29fdaf, 'queue0\x00', 0x800}) r3 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000080)='/dev/hwrng\x00', 0x4000, 0x0) sendto$inet(r0, &(0x7f0000a88f88), 0x29f, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @loopback=0x7f000001}, 0x10) pipe2(&(0x7f0000000580)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80002) ioctl$EVIOCGBITKEY(0xffffffffffffffff, 0x80404521, &(0x7f00000000c0)=""/160) sendmmsg(0xffffffffffffffff, &(0x7f00000025c0)=[{{&(0x7f0000000300)=@pppoe={0x18, 0x0, {0x0, @link_local={0x1, 0x80, 0xc2}, 'ip6tnl0\x00'}}, 0x80, &(0x7f0000000380)=[{&(0x7f00000010c0)="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", 0x6d1}], 0x1}}], 0x1, 0x4000) recvfrom$inet(r0, &(0x7f00009be000)=""/11, 0xe8, 0x0, 0x0, 0xffffffffffffff4e) bind$bt_l2cap(r4, &(0x7f0000000440)={0x1f, 0x8, {0x6, 0x400, 0x0, 0x2, 0x0, 0x3}, 0x10001, 0x2}, 0xe) setsockopt(r5, 0xb5, 0xffffffff, &(0x7f00000006c0)="0ac385d7ac2ae574baf1b3104b37fd7f20ebca1da5063c612b05a3d56c8b2e413e64bfc3e0bb415e656477eea9c01ad808e74aea23e7e4a07d09f22e69e1ae37fecf707d249ba82f1fc8f4a53558952762a62d5712f7ad3f1e2d51e5e3cf31154625d23de117cbb19fe0379b78ae656d20a1840850e0d1b6f6d94f8c810560030e0ac978d48567edbbb1f79c22a73e5a978f82d9637023d70e36036002", 0x9d) getsockopt$inet_sctp_SCTP_RECVRCVINFO(r0, 0x84, 0x20, &(0x7f0000000180), &(0x7f00000001c0)=0x4) sendmsg$netrom(r3, &(0x7f0000000b00)={&(0x7f0000000780)=@full={{0x3, {"53665db4283e1b"}, 0x3}, [{"d40335b6bcd5d9"}, {"d5952336c520fb"}, {"d326c92416d6ea"}, {"763aea9242214f"}, {"d716c11982a583"}, {"712de86f857435"}, {"1d8bd63f2c431c"}, {"6f5a0b1522aca6"}]}, 0x48, &(0x7f0000000ac0), 0x0, &(0x7f00000017c0)=[{0x10, 0x117, 0x9}], 0x10, 0x8000}, 0x4000840) setsockopt$inet_mtu(r3, 0x0, 0xa, &(0x7f0000000480), 0x4) r6 = getpid() epoll_ctl$EPOLL_CTL_ADD(r3, 0x1, r3, &(0x7f00000004c0)={0x5}) syz_open_procfs(r6, &(0x7f00000005c0)='maps\x00') shutdown(r0, 0x1) 2018/03/29 17:34:59 executing program 7: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r0 = socket$inet6(0xa, 0x5, 0xff) fcntl$notify(r0, 0x402, 0x80000002) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)={0xb, 0x7e, 0x3, 0x1, 0x11}, 0x2c) mount(&(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) r2 = socket$kcm(0x29, 0x2, 0x0) sendmsg$kcm(r2, &(0x7f0000000bc0)={&(0x7f00000007c0)=@rc={0x1f, {0x5, 0x50000000, 0xaa2, 0x613, 0x4, 0x1ff}, 0x3f}, 0x80, &(0x7f0000000940)=[{&(0x7f0000000840)="09c9453aa30d8c5fba221fa2413f12c580837b2ae292e3ee8dd00098c404125a1a2e63840f82a2f69c3927af43b828422484aaeeceebcbe76e999bd3930c9b7c2995484407f9166e39c2069a88b63a980b9b5ffc880f4b89dde5adae6c7fb84ed98cbac860214dfb0b28d1b2e2d58aefebdfe515334f2ffa46be22ef7a4b3a276cb70a27c9e9f5de0a20bad24cbe2b89aee9693c2f8f186ea59fcfc4ebec7188cca0418d4583a6f1730f62416d70cd62555eb4f58ea831d1fea9956a2cba0049f23bf0b249f5de2ce0dc303808d70b0ccab3c7f37e949e", 0xd7}], 0x1, &(0x7f0000000980), 0x0, 0x20004805}, 0x4010) syz_init_net_socket$llc(0x1a, 0x1, 0x0) r3 = perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x2367, 0x7fff, 0x1, 0x6, 0x0, 0x78b1, 0x1, 0x0, 0x4992c766, 0xff, 0x81, 0x100, 0x40, 0x3, 0x9, 0x8, 0x1, 0x10000, 0x0, 0x6, 0x90e, 0x9, 0x7ff, 0x0, 0x8, 0x1, 0x30, 0x20, 0x7fffffff, 0x6, 0x401, 0x2, 0x1000, 0x8001, 0x1ff, 0xfffffffffffffff8, 0x0, 0x2, 0x0, @perf_config_ext={0x5, 0x8}, 0x1ab23, 0x3f, 0x8, 0x5, 0x6, 0x0, 0x6}, 0xffffffffffffffff, 0x10, r1, 0x1) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0xb, 0x9, &(0x7f0000000580)=ANY=[@ANYBLOB="1808000000040000000000010000000018100000", @ANYRES32=r1, @ANYBLOB="0000000000000000fffc0100000000000000000000000000850000000600000000000000000000009500000000000000"], &(0x7f0000000600)='syzkaller\x00', 0x0, 0x30, &(0x7f0000000640)=""/48, 0x41f00, 0x1}, 0x48) ioctl$PERF_EVENT_IOC_SET_BPF(r3, 0x40042408, r4) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000000)={&(0x7f0000000080)='./file0/file0\x00', r1}, 0x10) writev(r4, &(0x7f0000000a40)=[{&(0x7f0000000240)="2631e45cd32eba52264676b39d53fa866ab2d4cebc591e735f34bbd2d86fcbc10942c6e5a1bb4fdde13325d470a21fe856881fe0383bcf4f9fe2e86d4580275e8546ab787fce5295", 0x48}, {&(0x7f0000000980)="d4ad951465886175ad45f418d39246bd2f457cf7ae4b9a342c21bfcbcff9b791e96123bdecb8201dc5dd2ca59e8992a9cf0779b6bf643c9a103e0a4da077c3c5dcf57058608ade9eddf9b6bc80d9416274bc5953fdfea081256c2b282d1c706e916982b63379baed2adecdf5363f9de46d58a3df13dddbd83c05b0e7b1960c4074bc39c8ade91d6d9e7455ce7e974d89b194c30be066041dfa38d11a6982965aa498dcf2a75ee9564b6765fdc2fe3aab2465cee4ddc36fa55189f084827f", 0xbe}], 0x2) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000400)=@ax25={0x3, {"02f47b3723e03d"}}, 0x80, &(0x7f00000017c0), 0x0, &(0x7f0000001840)=ANY=[], 0x0, 0x24004044}, 0x4008001) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000480)='rpc_pipefs\x00', 0x200000, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000002d00)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x40082406, &(0x7f00000004c0)='vmnet0keyring\x00') bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000780)={&(0x7f0000000740)='./file0/file0\x00', r5}, 0x10) ioctl$PERF_EVENT_IOC_SET_FILTER(r3, 0x40082406, &(0x7f0000000700)='proc!@ppp1!ppp0ppp0#)lo\\lolo{\x00') mount(&(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000200)='fuseblk\x00', 0xa11800, &(0x7f0000000240)) mount(&(0x7f00000002c0)='./file0/file0\x00', &(0x7f0000000300)='./file0/file0\x00', &(0x7f0000000340)='minix\x00', 0x1000, &(0x7f0000000380)) 2018/03/29 17:34:59 executing program 3: r0 = socket(0xa, 0x2, 0x0) r1 = open(&(0x7f00004b8ff8)='./file0\x00', 0x2803f, 0x104) connect$inet6(r0, &(0x7f0000d3cfe4)={0xa, 0x0, 0x0, @mcast2={0xff, 0x2, [], 0x1}, 0x3}, 0x1c) ioctl$DRM_IOCTL_ADD_CTX(r1, 0xc0086420, &(0x7f0000000000)) ioctl$DRM_IOCTL_NEW_CTX(r1, 0x40086425, &(0x7f0000000080)={0x0, 0x3}) fallocate(r1, 0x0, 0xffff, 0x1f) setsockopt$inet6_mtu(r1, 0x29, 0x17, &(0x7f00000000c0)=0x7, 0x4) connect$inet(r0, &(0x7f0000000040)={0x2, 0x4e22, @multicast1=0xe0000001}, 0x10) ioctl$KVM_SMI(r1, 0xaeb7) sendfile(r0, r1, &(0x7f00005faff8)=0x2000, 0xfff) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000140)={r1, 0x0, 0x0, 0x5, &(0x7f00000000c0)}, 0x20) 2018/03/29 17:34:59 executing program 5: r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff7fffffffffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = getpgrp(0xffffffffffffffff) r2 = syz_open_procfs(r1, &(0x7f00000000c0)='stat\x00') ioctl$sock_inet_SIOCSIFBRDADDR(0xffffffffffffffff, 0x891a, &(0x7f00000008c0)={'ip6tnl0\x00', {0x2, 0x4e23, @multicast1=0xe0000001}}) sendfile(r2, r2, &(0x7f0000000040), 0x5) getresuid(&(0x7f0000000480), &(0x7f00000004c0), &(0x7f0000000500)) stat(&(0x7f0000000540)='./file0\x00', &(0x7f0000000580)) geteuid() stat(&(0x7f0000000600)='./file0\x00', &(0x7f0000000640)) stat(&(0x7f00000006c0)='./file0\x00', &(0x7f0000000700)) getegid() stat(&(0x7f0000000780)='./file0\x00', &(0x7f00000007c0)) getgid() r3 = getuid() fstat(r2, &(0x7f0000000840)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) sendmsg$unix(0xffffffffffffffff, &(0x7f00000009c0)={&(0x7f0000000100)=@abs={0x1, 0x0, 0x4e23}, 0x6e, &(0x7f0000000440)=[{&(0x7f0000000180)="f5dc941f4dc3cd9adc57ae91e3dd4343d2d34a84526e7cc2dced527b17e9f844324330a6c4fc95075fc39479fc730a76e14b1c7e042182b78b54fd1112d5d88e0463edf0b527bc60eef252342942a7d15f5dbf3a13deeaef54e8a875bd6393929f9f520c496c5643e469d505dd150b595920", 0x72}], 0x1, &(0x7f0000000ac0)=ANY=[@ANYBLOB="180000000100000002", @ANYRES32=r3, @ANYRES32=r4, @ANYBLOB="300000000100000001000000", @ANYRES32=r2, @ANYRES32=r2, @ANYRES32=r2, @ANYRES32=r0, @ANYRES32=r0, @ANYRES32=r2, @ANYRES32=r0], 0x39}, 0x24008000) getresgid(&(0x7f0000000a00), &(0x7f0000000a40), &(0x7f0000000a80)) 2018/03/29 17:34:59 executing program 4: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)={0xb, 0x7e, 0x3, 0x1, 0x11}, 0x2c) mount(&(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) r1 = socket$kcm(0x29, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000000bc0)={&(0x7f00000007c0)=@rc={0x1f, {0x5, 0x50000000, 0xaa2, 0x613, 0x4, 0x1ff}, 0x3f}, 0x80, &(0x7f0000000940)=[{&(0x7f0000000840)="09c9453aa30d8c5fba221fa2413f12c580837b2ae292e3ee8dd00098c404125a1a2e63840f82a2f69c3927af43b828422484aaeeceebcbe76e999bd3930c9b7c2995484407f9166e39c2069a88b63a980b9b5ffc880f4b89dde5adae6c7fb84ed98cbac860214dfb0b28d1b2e2d58aefebdfe515334f2ffa46be22ef7a4b3a276cb70a27c9e9f5de0a20bad24cbe2b89aee9693c2f8f186ea59fcfc4ebec7188cca0418d4583a6f1730f62416d70cd62555eb4f58ea831d1fea9956a2cba0049f23bf0b249f5de2ce0dc303808d70b0ccab3c7f37e949e", 0xd7}], 0x1, &(0x7f0000000980), 0x0, 0x20004805}, 0x4010) r2 = perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x2367, 0x7fff, 0x1, 0x6, 0x0, 0x78b1, 0x1, 0x0, 0x4992c766, 0xff, 0x81, 0x100, 0x40, 0x3, 0x9, 0x8, 0x1, 0x10000, 0x0, 0x6, 0x90e, 0x9, 0x7ff, 0x0, 0x8, 0x1, 0x30, 0x20, 0x7fffffff, 0x6, 0x401, 0x2, 0x1000, 0x8001, 0x1ff, 0xfffffffffffffff8, 0x0, 0x2, 0x0, @perf_config_ext={0x5, 0x8}, 0x1ab23, 0x3f, 0x0, 0x5, 0x6}, 0xffffffffffffffff, 0x10, r0, 0x1) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0xb, 0x9, &(0x7f0000000580)=@framed={{0x18}, [@map={0x18, 0x0, 0x1, 0x0, r0}, @generic={0x3ff, 0xfffffffffffffffc, 0x1}, @call={0x85, 0x0, 0x0, 0x6}], {0x95}}, &(0x7f0000000600)='syzkaller\x00', 0x0, 0x30, &(0x7f0000000640)=""/48, 0x41f00, 0x1}, 0x48) ioctl$PERF_EVENT_IOC_SET_BPF(r2, 0x40042408, r3) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000000)={&(0x7f0000000080)='./file0/file0\x00', r0}, 0x10) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000400)=@ax25={0x3, {"02f47b3723e03d"}}, 0x80, &(0x7f00000017c0), 0x0, &(0x7f0000001840)=ANY=[], 0x0, 0x24004044}, 0x4008001) bpf$MAP_CREATE(0x0, &(0x7f0000002cc0)={0x5, 0x100, 0x56c96e7a, 0x2, 0xa, 0xffffffffffffffff, 0x9}, 0x2c) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000480)='rpc_pipefs\x00', 0x200000, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000002d00)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f00000004c0)='vmnet0keyring\x00') bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000780)={&(0x7f0000000740)='./file0/file0\x00', r4}, 0x10) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x40082406, &(0x7f0000000700)='proc!@ppp1!ppp0ppp0#)lo\\lolo{\x00') mount(&(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000200)='fuseblk\x00', 0xa11800, &(0x7f0000000240)) r5 = syz_open_dev$sg(&(0x7f0000000240)='/dev/sg#\x00', 0xfffffffffffffffa, 0x800) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000280)={r5, r3, 0x5, 0x1}, 0x10) ioctl$TIOCCONS(r5, 0x541d) mount(&(0x7f00000002c0)='./file0/file0\x00', &(0x7f0000000300)='./file0/file0\x00', &(0x7f0000000340)='minix\x00', 0x1000, &(0x7f0000000380)) 2018/03/29 17:34:59 executing program 0: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)={0xb, 0x7e, 0x3, 0x1, 0x11}, 0x2c) mount(&(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) r1 = socket$kcm(0x29, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000000bc0)={&(0x7f00000007c0)=@rc={0x1f, {0x5, 0x50000000, 0xaa2, 0x613, 0x4, 0x1ff}}, 0x80, &(0x7f0000000940)=[{&(0x7f0000000840)="09c9453aa30d8c5fba221fa2413f12c580837b2ae292e3ee8dd00098c404125a1a2e63840f82a2f69c3927af43b828422484aaeeceebcbe76e999bd3930c9b7c2995484407f9166e39c2069a88b63a980b9b5ffc880f4b89dde5adae6c7fb84ed98cbac860214dfb0b28d1b2e2d58aefebdfe515334f2ffa46be22ef7a4b3a276cb70a27c9e9f5de0a20bad24cbe2b89aee9693c2f8f186ea59fcfc4ebec7188cca0418d4583a6f1730f62416d70cd62555eb4f58ea831d1fea9956a2cba0049f23bf0b249f5de2ce0dc303808d70b0ccab3c7f37e949e", 0xd7}], 0x1, &(0x7f0000000980)}, 0x4010) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0xb, 0x9, &(0x7f0000000580)=@framed={{0x18}, [@map={0x18, 0x0, 0x1, 0x0, r0}, @generic={0x3ff, 0xfffffffffffffffc, 0x1}, @call={0x85, 0x0, 0x0, 0x6}], {0x95}}, &(0x7f0000000600)='syzkaller\x00', 0x0, 0x30, &(0x7f0000000640)=""/48, 0x41f00, 0x1}, 0x48) ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, r2) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000000)={&(0x7f0000000080)='./file0/file0\x00', r0}, 0x10) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000400)=@ax25={0x3, {"02f47b3723e03d"}}, 0x80, &(0x7f00000017c0), 0x0, &(0x7f0000001840)=ANY=[], 0x0, 0x24004044}, 0x4008001) bpf$MAP_CREATE(0x0, &(0x7f0000002cc0)={0x5, 0x100, 0x56c96e7a, 0x2, 0xa, 0xffffffffffffffff, 0x9}, 0x2c) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000480)='rpc_pipefs\x00', 0x200000, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000002d00)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f00000004c0)='vmnet0keyring\x00') bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000780)={&(0x7f0000000740)='./file0/file0\x00', r3}, 0x10) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, &(0x7f0000000700)='proc!@ppp1!ppp0ppp0#)lo\\lolo{\x00') mount(&(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000200)='fuseblk\x00', 0xa11800, &(0x7f0000000240)) mount(&(0x7f00000002c0)='./file0/file0\x00', &(0x7f0000000300)='./file0/file0\x00', &(0x7f0000000340)='minix\x00', 0x0, &(0x7f0000000380)) syz_open_dev$mouse(&(0x7f0000000240)='/dev/input/mouse#\x00', 0x100000000, 0x80100) 2018/03/29 17:34:59 executing program 2: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) mount(&(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) r0 = socket$kcm(0x29, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000bc0)={&(0x7f00000007c0)=@rc={0x1f, {0x5, 0x50000000, 0xaa2, 0x613, 0x4, 0x1ff}, 0x3f}, 0x80, &(0x7f0000000940)=[{&(0x7f0000000840)="09c9453aa30d8c5fba221fa2413f12c580837b2ae292e3ee8dd00098c404125a1a2e63840f82a2f69c3927af43b828422484aaeeceebcbe76e999bd3930c9b7c2995484407f9166e39c2069a88b63a980b9b5ffc880f4b89dde5adae6c7fb84ed98cbac860214dfb0b28d1b2e2d58aefebdfe515334f2ffa46be22ef7a4b3a276cb70a27c9e9f5de0a20bad24cbe2b89aee9693c2f8f186ea59fcfc4ebec7188cca0418d4583a6f1730f62416d70cd62555eb4f58ea831d1fea9956a2cba0049f23bf0b249f5de2ce0dc303808d70b0ccab3c7f37e949e", 0xd7}], 0x1, &(0x7f0000000980), 0x0, 0x20004805}, 0x4010) r1 = perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x2367, 0x7fff, 0x1, 0x6, 0x0, 0x78b1, 0x1, 0x0, 0x4992c766, 0xff, 0x81, 0x100, 0x40, 0x3, 0x9, 0x8, 0x1, 0x10000, 0x0, 0x6, 0x90e, 0x9, 0x7ff, 0x0, 0x8, 0x1, 0x30, 0x20, 0x7fffffff, 0x6, 0x401, 0x2, 0x1000, 0x8001, 0x1ff, 0xfffffffffffffff8, 0x0, 0x2, 0x0, @perf_config_ext={0x5, 0x8}, 0x1ab23, 0x0, 0x8, 0x5, 0x6, 0x0, 0x6}, 0xffffffffffffffff, 0x10, 0xffffffffffffffff, 0x1) bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0xb, 0x9, &(0x7f0000000580)=@framed={{0x18}, [@map={0x18, 0x0, 0x1}, @generic={0x3ff, 0xfffffffffffffffc, 0x1}, @call={0x85, 0x0, 0x0, 0x6}], {0x95}}, &(0x7f0000000600)='syzkaller\x00', 0x0, 0x30, &(0x7f0000000640)=""/48, 0x41f00, 0x1}, 0x48) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000000)={&(0x7f0000000080)='./file0/file0\x00'}, 0x10) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000400)=@ax25={0x3, {"02f47b3723e03d"}}, 0x80, &(0x7f00000017c0), 0x0, &(0x7f0000001840)=ANY=[], 0x0, 0x24004044}, 0x4008001) bpf$MAP_CREATE(0x0, &(0x7f0000002cc0)={0x5, 0x0, 0x56c96e7a, 0x2, 0xa, 0xffffffffffffffff, 0x9}, 0x2c) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000480)='rpc_pipefs\x00', 0x200000, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000002d00)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, &(0x7f00000004c0)='vmnet0keyring\x00') bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000780)={&(0x7f0000000740)='./file0/file0\x00', r2}, 0x10) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x40082406, &(0x7f0000000700)='proc!@ppp1!ppp0ppp0#)lo\\lolo{\x00') mount(&(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000200)='fuseblk\x00', 0xa11800, &(0x7f0000000240)) mount(&(0x7f00000002c0)='./file0/file0\x00', &(0x7f0000000300)='./file0/file0\x00', &(0x7f0000000340)='minix\x00', 0x1000, &(0x7f0000000380)) 2018/03/29 17:34:59 executing program 7: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)={0xb, 0x7e, 0x3, 0x1, 0x11}, 0x2c) mount(&(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) r1 = socket$kcm(0x29, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000000bc0)={&(0x7f00000007c0)=@rc={0x1f, {0x5, 0x50000000, 0xaa2, 0x613, 0x4, 0x1ff}, 0x3f}, 0x80, &(0x7f0000000940)=[{&(0x7f0000000840)="09c9453aa30d8c5fba221fa2413f12c580837b2ae292e3ee8dd00098c404125a1a2e63840f82a2f69c3927af43b828422484aaeeceebcbe76e999bd3930c9b7c2995484407f9166e39c2069a88b63a980b9b5ffc880f4b89dde5adae6c7fb84ed98cbac860214dfb0b28d1b2e2d58aefebdfe515334f2ffa46be22ef7a4b3a276cb70a27c9e9f5de0a20bad24cbe2b89aee9693c2f8f186ea59fcfc4ebec7188cca0418d4583a6f1730f62416d70cd62555eb4f58ea831d1fea9956a2cba0049f23bf0b249f5de2ce0dc303808d70b0ccab3c7f37e949e", 0xd7}], 0x1, &(0x7f0000000980), 0x0, 0x20004805}, 0x4010) r2 = perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x2367, 0x7fff, 0x1, 0x6, 0x0, 0x78b1, 0x1, 0x0, 0x4992c766, 0xff, 0x81, 0x100, 0x40, 0x3, 0x9, 0x8, 0x1, 0x10000, 0x0, 0x6, 0x90e, 0x9, 0x7ff, 0x0, 0x8, 0x1, 0x30, 0x20, 0x7fffffff, 0x6, 0x401, 0x2, 0x1000, 0x8001, 0x1ff, 0xfffffffffffffff8, 0x0, 0x2, 0x0, @perf_config_ext={0x5, 0x8}, 0x1ab23, 0x3f, 0x8, 0x5, 0x6, 0x0, 0x6}, 0xffffffffffffffff, 0x10, r0, 0x1) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0xb, 0x9, &(0x7f0000000580)=@framed={{0x18}, [@map={0x18, 0x0, 0x1, 0x0, r0}, @generic={0x3ff, 0xfffffffffffffffc, 0x1}, @call={0x85, 0x0, 0x0, 0x6}], {0x95}}, &(0x7f0000000600)='syzkaller\x00', 0x0, 0x30, &(0x7f0000000640)=""/48, 0x41f00, 0x1}, 0x48) ioctl$PERF_EVENT_IOC_SET_BPF(r2, 0x40042408, r3) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000000)={&(0x7f0000000080)='./file0/file0\x00', r0}, 0x10) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000400)=@ax25={0x3, {"02f47b3723e03d"}}, 0x80, &(0x7f00000017c0), 0x0, &(0x7f0000001840)=ANY=[], 0x0, 0x24004044}, 0x4008001) bpf$MAP_CREATE(0x0, &(0x7f0000002cc0)={0x5, 0x0, 0x56c96e7a, 0x2, 0xa, 0xffffffffffffffff, 0x9}, 0x2c) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000480)='rpc_pipefs\x00', 0x200000, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000002d00)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f00000004c0)='vmnet0keyring\x00') bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000780)={&(0x7f0000000740)='./file0/file0\x00', r4}, 0x10) r5 = syz_open_dev$admmidi(&(0x7f0000000280)='/dev/admmidi#\x00', 0x33c8ee31, 0x40) ioctl$PERF_EVENT_IOC_SET_FILTER(r5, 0x40082406, &(0x7f0000000240)='proc!@ppp1!ppp0ppp0#)lo\\lolo{\x00') mount(&(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000200)='fuseblk\x00', 0xa11800, &(0x7f0000000240)) mount(&(0x7f00000002c0)='./file0/file0\x00', &(0x7f0000000300)='./file0/file0\x00', &(0x7f0000000340)='minix\x00', 0x1000, &(0x7f0000000380)) 2018/03/29 17:34:59 executing program 3: r0 = socket(0xa, 0x2, 0x0) r1 = open(&(0x7f00004b8ff8)='./file0\x00', 0x28042, 0x0) connect$inet6(r0, &(0x7f0000d3cfe4)={0xa, 0x0, 0x0, @mcast2={0xff, 0x2, [], 0x1}, 0x3}, 0x1c) ioctl$DRM_IOCTL_ADD_CTX(r1, 0xc0086420, &(0x7f0000000000)) ioctl$DRM_IOCTL_NEW_CTX(r1, 0x40086425, &(0x7f0000000080)={0x0, 0x3}) fallocate(r1, 0x0, 0xffff, 0x1f) setsockopt$inet6_mtu(0xffffffffffffffff, 0x29, 0x17, &(0x7f0000000100)=0x2, 0x4) connect$inet(r0, &(0x7f0000000040)={0x2, 0x4e22, @multicast1=0xe0000001}, 0x10) ioctl$ASHMEM_GET_PIN_STATUS(r1, 0x7709, 0x0) sendfile(r0, r1, &(0x7f00005faff8), 0xfffb) 2018/03/29 17:34:59 executing program 6: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000ed4000)=0x78, 0x4) bind$inet(r0, &(0x7f0000deb000)={0x2, 0x4e23, @multicast1=0xe0000001}, 0x10) ioctl$sock_SIOCINQ(r0, 0x541b, &(0x7f0000000500)) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000f40ff8)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) getsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(0xffffffffffffff9c, 0x84, 0x1f, &(0x7f0000000240)={0x0, @in={{0x2, 0x4e23}}, 0x0, 0x3}, &(0x7f0000000000)=0x90) setsockopt$inet_sctp_SCTP_RTOINFO(r0, 0x84, 0x0, &(0x7f0000000040)={r1, 0x81, 0x7, 0x100000000}, 0x10) getsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(r0, 0x84, 0x18, &(0x7f00000003c0)={r1, 0x7}, &(0x7f0000000400)=0x8) socketpair(0x11, 0x800, 0x5, &(0x7f0000000200)={0xffffffffffffffff}) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_INFO(r2, 0xc08c5334, &(0x7f0000000600)={0x6, 0x7, 0x2f29fdaf, 'queue0\x00', 0x800}) r3 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000080)='/dev/hwrng\x00', 0x4000, 0x0) sendto$inet(r0, &(0x7f0000a88f88), 0x29f, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @loopback=0x7f000001}, 0x10) pipe2(&(0x7f0000000580)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80002) ioctl$EVIOCGBITKEY(0xffffffffffffffff, 0x80404521, &(0x7f00000000c0)=""/160) sendmmsg(r0, &(0x7f00000025c0)=[{{&(0x7f0000000300)=@pppoe={0x18, 0x0, {0x0, @link_local={0x1, 0x80, 0xc2}, 'ip6tnl0\x00'}}, 0x80, &(0x7f0000000380)=[{&(0x7f00000010c0)="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", 0x6d1}], 0x1}}], 0x1, 0x4000) recvfrom$inet(r0, &(0x7f00009be000)=""/11, 0xe8, 0x0, 0x0, 0xffffffffffffff4e) bind$bt_l2cap(r4, &(0x7f0000000440)={0x1f, 0x8, {0x6, 0x400, 0x0, 0x2, 0x9, 0x3}, 0x10001, 0x2}, 0xe) setsockopt(r5, 0xb5, 0xffffffff, &(0x7f00000006c0)="0ac385d7ac2ae574baf1b3104b37fd7f20ebca1da5063c612b05a3d56c8b2e413e64bfc3e0bb415e656477eea9c01ad808e74aea23e7e4a07d09f22e69e1ae37fecf707d249ba82f1fc8f4a53558952762a62d5712f7ad3f1e2d51e5e3cf31154625d23de117cbb19fe0379b78ae656d20a1840850e0d1b6f6d94f8c810560030e0ac978d48567edbbb1f79c22a73e5a978f82d9637023d70e36036002", 0x9d) getsockopt$inet_sctp_SCTP_RECVRCVINFO(r0, 0x84, 0x20, &(0x7f0000000180), &(0x7f00000001c0)=0x4) setsockopt$inet_mtu(r3, 0x0, 0xa, &(0x7f0000000480)=0x7, 0x4) r6 = getpid() epoll_ctl$EPOLL_CTL_ADD(r3, 0x1, r3, &(0x7f00000004c0)={0x5}) syz_open_procfs(r6, &(0x7f00000005c0)='maps\x00') shutdown(r0, 0x1) 2018/03/29 17:34:59 executing program 1: r0 = socket(0xa, 0x2, 0x0) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r1 = open(&(0x7f00004b8ff8)='./file0\x00', 0x28042, 0x0) connect$inet6(r0, &(0x7f0000d3cfe4)={0xa, 0x0, 0x0, @mcast2={0xff, 0x2, [], 0x1}, 0x3}, 0x1c) ioctl$DRM_IOCTL_ADD_CTX(r1, 0xc0086420, &(0x7f0000000000)={0x0}) ioctl$DRM_IOCTL_NEW_CTX(r1, 0x40086425, &(0x7f0000000080)={r2}) fallocate(r1, 0x0, 0xffff, 0x1f) setsockopt$inet6_mtu(r0, 0x29, 0x17, &(0x7f0000000100), 0x4) dup(r1) socketpair$inet_dccp(0x2, 0x6, 0x0, &(0x7f0000000240)) sendfile(r0, r1, &(0x7f00005faff8), 0xfffb) unlinkat(r0, &(0x7f0000000140)='./file0/file0\x00', 0x0) accept4$unix(0xffffffffffffffff, &(0x7f0000000180)=@abs, &(0x7f0000000200)=0x6e, 0x800) 2018/03/29 17:34:59 executing program 5: r0 = open(&(0x7f0000000440)='./file0\x00', 0x1ffff, 0x5) ioctl$TIOCLINUX7(0xffffffffffffffff, 0x541c, &(0x7f0000000080)={0x7}) setsockopt$inet_tcp_int(r0, 0x6, 0x0, &(0x7f00000003c0)=0x6, 0xf4) perf_event_open(&(0x7f0000000240)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000180)='/dev/sequencer2\x00', 0x12100, 0x0) clock_gettime(0x0, &(0x7f00000001c0)={0x0, 0x0}) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r1, 0x4040534e, &(0x7f0000000340)={0x124, @time={r2, r3+30000000}, 0x1, {0x8, 0x606}, 0x101, 0x2}) r4 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000040)='/dev/rtc\x00', 0x0, 0x0) r5 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000580)='/dev/sequencer\x00', 0x0, 0x0) ioctl$LOOP_CLR_FD(r4, 0x7003) getsockopt$inet_sctp_SCTP_FRAGMENT_INTERLEAVE(0xffffffffffffffff, 0x84, 0x12, &(0x7f0000000140), &(0x7f00000002c0)=0x4) setsockopt$packet_buf(0xffffffffffffffff, 0x107, 0xd, &(0x7f00000004c0)="d9fb4f1bcfd3e0c1355ea2018b25a4fd911d8abc3f3fd71f4749878ac1fbce6e5d188e078b15be141905d7966406e4f3fb021da63028837a8407bcb3e3a676d251bcd09a04964ed9cd0f6cece267dc4bada0403dcef25dace8875f4a6495eb2e6cc4969e7de83153459b4d61669ed9eb7567", 0x72) perf_event_open(&(0x7f00000000c0)={0x0, 0x70, 0x0, 0x0, 0x7ff, 0xa1, 0x0, 0x1, 0x200, 0x2, 0x5, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x1, 0x4, 0xb0, 0x5, 0x0, 0x0, 0xcf, 0x0, 0xffffffffffffffff, 0x100000000, 0x3ff, 0x0, 0x0, 0x0, 0x1f, 0x2, 0x5, 0x9, 0x3, 0x0, 0x4, 0x0, 0x20000000, 0x195d678803a3a953, @perf_config_ext={0x9, 0x5}, 0x10, 0x3, 0x8, 0x0, 0x72eb, 0x99, 0x1}, 0x0, 0xd, r4, 0x8) mq_notify(r5, &(0x7f0000000400)) execve(&(0x7f0000000200)='./file0\x00', &(0x7f0000000680)=[&(0x7f0000000600)='\x00', &(0x7f0000000640)='proc\x00'], &(0x7f0000000740)=[&(0x7f00000006c0)='\'\x00', &(0x7f0000000700)='trustedwlan0vmnet0@%\x00']) 2018/03/29 17:34:59 executing program 2: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r0 = syz_open_dev$mice(&(0x7f0000001040)='/dev/input/mice\x00', 0x0, 0x200000) ioctl$TUNGETSNDBUF(r0, 0x800454d3, &(0x7f0000001080)) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)={0xb, 0x7e, 0x3, 0x1, 0x11}, 0x2c) r2 = syz_open_dev$sndpcmc(&(0x7f0000000240)='/dev/snd/pcmC#D#c\x00', 0x4, 0x0) sendmmsg(r2, &(0x7f0000000ac0)=[{{&(0x7f0000000980)=@ax25={0x3, {"ca3193d2de97c3"}, 0x4}, 0x80, &(0x7f0000000a80)=[{&(0x7f0000000280)="6e17c7185b1a372c908e19e73afab488bb600f24a78045e50c3f7cd89efc6c", 0x1f}, {&(0x7f0000000a00)="d08fd4e69fb71fee28e65a4baaa8fe870fe52c0941985d254fbd4b65a8021bbc23fd11bd8df88e77a15208ae44bf61c79e0e85f5fe0e72789fffb850918d5e2d72e3c65caf8a98", 0x47}], 0x2, &(0x7f0000000c00)=ANY=[@ANYBLOB="88000000000000000c0100000400000002b7bc84150c0cbd97783ce4903e02eae980bc8b2f2e83f809e21bb3c8a08f9a71a4dab2c3d7430e581ed57e9eaf638f567a1d1232150b79fbc95f989f298cf1f1b614f2a7b31382debdb5d8777caa6875a4cfdcfe052400a679181fb8cc5ea71537f2d62ebaec57a6825ba7c1c0c6c80ec769dffe000000900000000000000011000000008000003552af2af0c9f3a374e797c141e0bd4904b4b493a9f313805c7f3d64fff811f7c628bc383639e48cb04323cd3fdc2d0dd723a4588fe8c67e088432ea77c87d12e336f1f5c93eb4aef2be650d78863b4d25f0e13fa3057bc2d9fe2fa9c7db5f3ee1ff27a7a236ed92a426c682be79eb81d352a6192f4c3ddda13515420b0000002000000000000000ff01000001000000c01a0dc532a24e53a8baa3ab5bf300004800000000000000ff0100000600000092b8ba2315da71f2af04bab3e159768686d1ab724a3734bc92e01d761a4a5c6e77dbe5958b6ee82c3832638009a12fc0a1f3a7ea000000009800000000000000170100000500000088fd68234237749654c948c6431cd76a7201809a99d195f86f00000000000000059758abc1ac660e0a35f9c279b0b4883e62c25207f57bf62d9a06a88f0f41daa5b776e120b759dd4468455db88171eb0f93810a932f6c135900bb85a1cb43fc4f21fafd6921ac3b3c16b2b0837300009bf2506de1f8ce79028f547f2747e34e18dfa3789afc0000"], 0x218, 0x80}, 0xfff}], 0x1, 0x4000) mount(&(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) r3 = socket$kcm(0x29, 0x2, 0x0) sendmsg$kcm(r3, &(0x7f0000000bc0)={&(0x7f00000007c0)=@rc={0x1f, {0x5, 0x50000000, 0xaa2, 0x613, 0x4, 0x1ff}, 0x3f}, 0x80, &(0x7f0000000940)=[{&(0x7f00000010c0)="09c9453aa30d8c5fba221fa2413f12c580837b2ae292e3ee8dd00098c404125a1a2e63840f82a2f69c3927af43b828422484aaeeceebcbe76e999bd3930c9b7c2995484407f9166e39c2069a88b63a980b9b5ffc880f4b89dde5adae6c7fb84ed98cbac860214dfb0b28d1b2e2d58aefebdfe515334f2ffa46be22ef7a4b3a276cb70a27c9e9f5de0a20bad24cbe2b89aee9693c2f8f186ea59fcfc4ebec7188cca0418d4583a6f1730f62416d70cd62555eb4f58ea831d1fea9956a2cba0049f23bf0b249f5de2ce0dc303808d70b0ccab3c7f37e949e", 0xd7}], 0x1, &(0x7f0000000980), 0x0, 0x20004805}, 0x4000) r4 = perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x2367, 0x7fff, 0x1, 0x6, 0x0, 0x78b1, 0x1, 0x0, 0x4992c766, 0xff, 0x81, 0x100, 0x40, 0x3, 0x9, 0x8, 0x1, 0x10000, 0x0, 0x6, 0x90e, 0x9, 0x7ff, 0x0, 0x8, 0x1, 0x30, 0x20, 0x7fffffff, 0x6, 0x401, 0x2, 0x1000, 0x8001, 0x1ff, 0xfffffffffffffff8, 0x0, 0x2, 0x0, @perf_config_ext={0x5, 0x8}, 0x1ab23, 0x0, 0x8, 0x5, 0x6, 0x0, 0x6}, 0xffffffffffffffff, 0x10, r1, 0x1) bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0xb, 0x9, &(0x7f0000000580)=@framed={{0x18}, [@map={0x18, 0x0, 0x1, 0x0, r1}, @generic={0x3ff, 0xfffffffffffffffc, 0x1}, @call={0x85, 0x0, 0x0, 0x6}], {0x95}}, &(0x7f0000000600)='syzkaller\x00', 0x0, 0x30, &(0x7f0000000640)=""/48, 0x41f00, 0x1}, 0x48) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000000)={&(0x7f0000000080)='./file0/file0\x00', r1}, 0x10) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000400)=@ax25={0x3, {"02f47b3723e03d"}}, 0x80, &(0x7f00000017c0), 0x0, &(0x7f0000001840)=ANY=[], 0x0, 0x24004044}, 0x4008001) bpf$MAP_CREATE(0x0, &(0x7f0000002cc0)={0x5, 0x0, 0x56c96e7a, 0x2, 0xa, 0xffffffffffffffff, 0x9}, 0x2c) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000480)='rpc_pipefs\x00', 0x200000, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000002d00)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x40082406, &(0x7f00000004c0)='vmnet0keyring\x00') r6 = syz_open_dev$dspn(&(0x7f0000000000)='/dev/dsp#\x00', 0x1, 0x2) write$rdma_cm(r6, &(0x7f0000001bc0)=@create_id={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000001b80)}}, 0x20) ioctl$int_in(r6, 0x800000c0045006, &(0x7f0000595ff8)=0x3) write(r6, &(0x7f0000000040)="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", 0xfff) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000780)={&(0x7f0000000740)='./file0/file0\x00', r5}, 0x10) ioctl$PERF_EVENT_IOC_SET_FILTER(r4, 0x40082406, &(0x7f0000000700)='bpf\x00') mount(&(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000200)='fuseblk\x00', 0xa11800, &(0x7f0000000240)) mount(&(0x7f00000002c0)='./file0/file0\x00', &(0x7f0000000300)='./file0/file0\x00', &(0x7f0000000340)='minix\x00', 0x1000, &(0x7f0000000380)) 2018/03/29 17:34:59 executing program 4: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)={0xb, 0x7e, 0x3, 0x1, 0x11}, 0x2c) mount(&(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) r1 = socket$kcm(0x29, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000000bc0)={&(0x7f00000007c0)=@rc={0x1f, {0x5, 0x50000000, 0xaa2, 0x613, 0x4, 0x1ff}, 0x3f}, 0x80, &(0x7f0000000940)=[{&(0x7f0000000840)="09c9453aa30d8c5fba221fa2413f12c580837b2ae292e3ee8dd00098c404125a1a2e63840f82a2f69c3927af43b828422484aaeeceebcbe76e999bd3930c9b7c2995484407f9166e39c2069a88b63a980b9b5ffc880f4b89dde5adae6c7fb84ed98cbac860214dfb0b28d1b2e2d58aefebdfe515334f2ffa46be22ef7a4b3a276cb70a27c9e9f5de0a20bad24cbe2b89aee9693c2f8f186ea59fcfc4ebec7188cca0418d4583a6f1730f62416d70cd62555eb4f58ea831d1fea9956a2cba0049f23bf0b249f5de2ce0dc303808d70b0ccab3c7f37e949e", 0xd7}], 0x1, &(0x7f0000000980), 0x0, 0x20004805}, 0x4010) r2 = perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x2367, 0x7fff, 0x1, 0x6, 0x0, 0x78b1, 0x1, 0x0, 0x4992c766, 0xff, 0x81, 0x100, 0x40, 0x3, 0x9, 0x8, 0x1, 0x10000, 0x0, 0x6, 0x90e, 0x9, 0x7ff, 0x0, 0x8, 0x1, 0x30, 0x20, 0x7fffffff, 0x6, 0x401, 0x2, 0x1000, 0x8001, 0x1ff, 0xfffffffffffffff8, 0x0, 0x2, 0x0, @perf_config_ext={0x5, 0x8}, 0x1ab23, 0x3f, 0x8, 0x0, 0x6}, 0xffffffffffffffff, 0x10, r0, 0x1) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0xb, 0x9, &(0x7f0000000580)=@framed={{0x18}, [@map={0x18, 0x0, 0x1, 0x0, r0}, @generic={0x3ff, 0xfffffffffffffffc, 0x1}, @call={0x85, 0x0, 0x0, 0x6}], {0x95}}, &(0x7f0000000600)='syzkaller\x00', 0x0, 0x30, &(0x7f0000000640)=""/48, 0x41f00, 0x1}, 0x48) ioctl$PERF_EVENT_IOC_SET_BPF(r2, 0x40042408, r3) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000000)={&(0x7f0000000080)='./file0/file0\x00', r0}, 0x10) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000400)=@ax25={0x3, {"02f47b3723e03d"}}, 0x80, &(0x7f00000017c0), 0x0, &(0x7f0000001840)=ANY=[], 0x0, 0x24004044}, 0x4008001) bpf$MAP_CREATE(0x0, &(0x7f0000002cc0)={0x5, 0x100, 0x56c96e7a, 0x2, 0xa, 0xffffffffffffffff, 0x9}, 0x2c) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000480)='rpc_pipefs\x00', 0x200000, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000002d00)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f00000004c0)='vmnet0keyring\x00') bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000780)={&(0x7f0000000740)='./file0/file0\x00', r4}, 0x10) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x40082406, &(0x7f0000000700)='proc!@ppp1!ppp0ppp0#)lo\\lolo{\x00') mount(&(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000200)='fuseblk\x00', 0xa11800, &(0x7f0000000240)) r5 = syz_open_dev$sg(&(0x7f0000000240)='/dev/sg#\x00', 0xfffffffffffffffa, 0x800) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000280)={r5, r3, 0x5, 0x1}, 0x10) ioctl$TIOCCONS(r5, 0x541d) mount(&(0x7f00000002c0)='./file0/file0\x00', &(0x7f0000000300)='./file0/file0\x00', &(0x7f0000000340)='minix\x00', 0x1000, &(0x7f0000000380)) 2018/03/29 17:34:59 executing program 3: r0 = socket(0xa, 0x2, 0x0) r1 = open(&(0x7f00004b8ff8)='./file0\x00', 0x28042, 0x0) connect$inet6(r0, &(0x7f0000d3cfe4)={0xa, 0x0, 0x3, @mcast2={0xff, 0x2, [], 0x1}, 0x3}, 0x1c) ioctl$DRM_IOCTL_ADD_CTX(r1, 0xc0086420, &(0x7f0000000000)) ioctl$DRM_IOCTL_NEW_CTX(r1, 0x40086425, &(0x7f0000000080)={0x0, 0x3}) fallocate(r1, 0x0, 0xffff, 0x1f) setsockopt$inet6_mtu(0xffffffffffffffff, 0x29, 0x17, &(0x7f0000000100)=0x2, 0x4) connect$inet(r0, &(0x7f0000000040)={0x2, 0x4e22, @multicast1=0xe0000001}, 0x10) sendfile(r0, r1, &(0x7f00005faff8), 0xfffb) 2018/03/29 17:34:59 executing program 1: getsockopt$inet_sctp6_SCTP_RECVNXTINFO(0xffffffffffffffff, 0x84, 0x21, &(0x7f0000000180), &(0x7f00000001c0)=0x4) ioctl$LOOP_GET_STATUS64(0xffffffffffffffff, 0x4c05, &(0x7f0000000300)) socket$inet(0x2, 0x0, 0x0) r0 = syz_open_dev$sg(&(0x7f0000b7aff7)='/dev/sg#\x00', 0x0, 0x2) ioctl$EVIOCSABS0(0xffffffffffffffff, 0x401845c0, &(0x7f0000007000)={0x0, 0x0, 0x2323, 0x0, 0x0, 0x8020000000}) mq_getsetattr(0xffffffffffffffff, &(0x7f0000000000)={0xab, 0x0, 0x0, 0xffff, 0x6, 0x0, 0x2, 0x7}, &(0x7f00000000c0)) ioctl(r0, 0x2285, &(0x7f0000007000)='S') 2018/03/29 17:34:59 executing program 0: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)={0xb, 0x7e, 0x3, 0x1, 0x11}, 0x2c) mount(&(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) r1 = socket$kcm(0x29, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000000bc0)={&(0x7f00000007c0)=@rc={0x1f, {0x5, 0x50000000, 0xaa2, 0x613, 0x4, 0x1ff}}, 0x80, &(0x7f0000000940)=[{&(0x7f0000000840)="09c9453aa30d8c5fba221fa2413f12c580837b2ae292e3ee8dd00098c404125a1a2e63840f82a2f69c3927af43b828422484aaeeceebcbe76e999bd3930c9b7c2995484407f9166e39c2069a88b63a980b9b5ffc880f4b89dde5adae6c7fb84ed98cbac860214dfb0b28d1b2e2d58aefebdfe515334f2ffa46be22ef7a4b3a276cb70a27c9e9f5de0a20bad24cbe2b89aee9693c2f8f186ea59fcfc4ebec7188cca0418d4583a6f1730f62416d70cd62555eb4f58ea831d1fea9956a2cba0049f23bf0b249f5de2ce0dc303808d70b0ccab3c7f37e949e", 0xd7}], 0x1, &(0x7f0000000980)}, 0x4010) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0xb, 0x9, &(0x7f0000000580)=@framed={{0x18}, [@map={0x18, 0x0, 0x1, 0x0, r0}, @generic={0x3ff, 0xfffffffffffffffc, 0x1}, @call={0x85, 0x0, 0x0, 0x6}], {0x95}}, &(0x7f0000000600)='syzkaller\x00', 0x0, 0x30, &(0x7f0000000640)=""/48, 0x41f00, 0x1}, 0x48) ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, r2) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000000)={&(0x7f0000000080)='./file0/file0\x00', r0}, 0x10) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000400)=@ax25={0x3, {"02f47b3723e03d"}}, 0x80, &(0x7f00000017c0), 0x0, &(0x7f0000001840)=ANY=[], 0x0, 0x24004044}, 0x4008001) bpf$MAP_CREATE(0x0, &(0x7f0000002cc0)={0x5, 0x100, 0x56c96e7a, 0x2, 0xa, 0xffffffffffffffff, 0x9}, 0x2c) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000480)='rpc_pipefs\x00', 0x200000, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000002d00)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000240)='/dev/mixer\x00', 0xa00, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r4, 0x40082406, &(0x7f0000000280)='!\x00') ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f00000004c0)='vmnet0keyring\x00') bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000780)={&(0x7f0000000740)='./file0/file0\x00', r3}, 0x10) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, &(0x7f0000000700)='proc!@ppp1!ppp0ppp0#)lo\\lolo{\x00') mount(&(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000200)='fuseblk\x00', 0xa11800, &(0x7f0000000240)) mount(&(0x7f00000002c0)='./file0/file0\x00', &(0x7f0000000300)='./file0/file0\x00', &(0x7f0000000340)='minix\x00', 0x0, &(0x7f0000000380)) 2018/03/29 17:34:59 executing program 6: getsockopt$inet_mreqsrc(0xffffffffffffffff, 0x0, 0x27, &(0x7f00000002c0)={@remote, @multicast2, @multicast2}, &(0x7f0000000300)=0xc) getsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER_VALUE(0xffffffffffffff9c, 0x84, 0x7c, &(0x7f00000000c0)={0x0, 0x7}, &(0x7f0000000100)) r1 = accept4(0xffffffffffffff9c, 0x0, &(0x7f00000003c0), 0x0) getsockopt$inet_sctp_SCTP_LOCAL_AUTH_CHUNKS(r1, 0x84, 0x1b, &(0x7f00000009c0)=ANY=[@ANYBLOB="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"], &(0x7f00000004c0)=0x1) getsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(0xffffffffffffffff, 0x84, 0x18, &(0x7f0000000140)={r0}, &(0x7f0000000180)=0x8) unshare(0x40000000) ioctl$DRM_IOCTL_GET_MAGIC(0xffffffffffffffff, 0x80046402, &(0x7f0000000040)=0xfffffffffffffffe) r2 = accept4$inet6(0xffffffffffffffff, 0x0, &(0x7f0000000000), 0x800) splice(r2, &(0x7f0000000240), r2, &(0x7f0000000280), 0x5aa9, 0xb) r3 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000580)='IPVS\x00') sendmsg$IPVS_CMD_GET_DEST(0xffffffffffffffff, &(0x7f0000000980)={&(0x7f0000000540)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000940)={&(0x7f0000000880)={0x9c, r3, 0x0, 0x70bd2b, 0x25dfdbfd, {0x8}, [@IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x2}, @IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0x2}, @IPVS_CMD_ATTR_DEST={0x1c, 0x2, [@IPVS_DEST_ATTR_ACTIVE_CONNS={0x8, 0x7, 0x1}, @IPVS_DEST_ATTR_WEIGHT={0x8, 0x4, 0x1}, @IPVS_DEST_ATTR_FWD_METHOD={0x8, 0x3, 0x1}]}, @IPVS_CMD_ATTR_SERVICE={0x5c, 0x1, [@IPVS_SVC_ATTR_PE_NAME={0x8, 0xb, 'sip\x00'}, @IPVS_SVC_ATTR_FWMARK={0x8, 0x5, 0x1}, @IPVS_SVC_ATTR_PROTOCOL={0x8, 0x2}, @IPVS_SVC_ATTR_PORT={0x8, 0x4, 0x4e23}, @IPVS_SVC_ATTR_NETMASK={0x8, 0x9, 0x53}, @IPVS_SVC_ATTR_FLAGS={0xc, 0x7, {0x4, 0x20}}, @IPVS_SVC_ATTR_AF={0x8, 0x1, 0xa}, @IPVS_SVC_ATTR_ADDR={0x14, 0x3, @ipv6=@remote={0xfe, 0x80, [], 0xbb}}, @IPVS_SVC_ATTR_PROTOCOL={0x8, 0x2, 0xff}]}]}, 0x9c}, 0x1, 0x0, 0x0, 0x10}, 0x90) ioctl$sock_FIOSETOWN(r2, 0x8901, &(0x7f0000000500)) getsockopt$inet_sctp_SCTP_RECONFIG_SUPPORTED(0xffffffffffffffff, 0x84, 0x75, &(0x7f0000000340)={r0, 0x1}, &(0x7f0000000380)=0x8) getpeername$packet(r1, &(0x7f00000005c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @random}, &(0x7f0000000600)=0x14) getsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, &(0x7f0000000640)={{{@in, @in6=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@dev}, 0x0, @in6=@loopback}}, &(0x7f0000000740)=0xe8) setsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x11, &(0x7f0000000780)={{{@in=@multicast1=0xe0000001, @in6=@mcast1={0xff, 0x1, [], 0x1}, 0x4e21, 0x7fff, 0x4e21, 0x101, 0xa, 0x0, 0x80, 0x87, r4, r5}, {0x4, 0xffffffff, 0x7, 0x100000001, 0x0, 0x0, 0x8}, {0x4, 0x4, 0x6, 0x9}, 0x6, 0x6e6bba, 0x2, 0x0, 0x1, 0x2}, {{@in=@loopback=0x7f000001, 0x4d5, 0x3c}, 0xa, @in6=@ipv4={[], [0xff, 0xff], @multicast1=0xe0000001}, 0x3502, 0x2, 0x0, 0x7fff, 0x189e, 0xb8, 0x76ad}}, 0xe8) socketpair(0x2, 0x7, 0x38000000000, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r7 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_mreqn(r7, 0x0, 0x27, &(0x7f0000000000)={@multicast2=0xe0000002, @loopback=0x7f000001}, 0xc) setsockopt$inet_msfilter(r7, 0x0, 0x29, &(0x7f0000000040)={@multicast2=0xe0000002, @remote={0xac, 0x14, 0x14, 0xbb}, 0x0, 0x3, [@broadcast=0xffffffff, @multicast2=0xe0000002, @multicast1=0xe0000001]}, 0x1c) setsockopt$inet_msfilter(r7, 0x0, 0x29, &(0x7f00000000c0)={@multicast2=0xe0000002, @loopback=0x7f000001, 0x0, 0x2, [@multicast2=0xe0000002, @broadcast=0xffffffff]}, 0x18) getsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(r6, 0x84, 0x18, &(0x7f00000001c0)={r0, 0x2}, &(0x7f0000000200)=0x8) 2018/03/29 17:34:59 executing program 7: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)={0xb, 0x7e, 0x3, 0x1, 0x11}, 0x2c) mount(&(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) r1 = socket$kcm(0x29, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000000bc0)={&(0x7f00000007c0)=@rc={0x1f, {0x5, 0x50000000, 0xaa2, 0x613, 0x4, 0x1ff}, 0x3f}, 0x80, &(0x7f0000000940)=[{&(0x7f0000000840)="09c9453aa30d8c5fba221fa2413f12c580837b2ae292e3ee8dd00098c404125a1a2e63840f82a2f69c3927af43b828422484aaeeceebcbe76e999bd3930c9b7c2995484407f9166e39c2069a88b63a980b9b5ffc880f4b89dde5adae6c7fb84ed98cbac860214dfb0b28d1b2e2d58aefebdfe515334f2ffa46be22ef7a4b3a276cb70a27c9e9f5de0a20bad24cbe2b89aee9693c2f8f186ea59fcfc4ebec7188cca0418d4583a6f1730f62416d70cd62555eb4f58ea831d1fea9956a2cba0049f23bf0b249f5de2ce0dc303808d70b0ccab3c7f37e949e", 0xd7}], 0x1, &(0x7f0000000980), 0x0, 0x20004805}, 0x4010) r2 = perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x2367, 0x7fff, 0x1, 0x6, 0x0, 0x78b1, 0x1, 0x0, 0x4992c766, 0xff, 0x81, 0x100, 0x40, 0x3, 0x9, 0x8, 0x1, 0x10000, 0x0, 0x6, 0x90e, 0x9, 0x7ff, 0x0, 0x8, 0x1, 0x30, 0x20, 0x7fffffff, 0x6, 0x401, 0x2, 0x1000, 0x8001, 0x1ff, 0xfffffffffffffff8, 0x0, 0x2, 0x0, @perf_config_ext={0x5, 0x8}, 0x1ab23, 0x3f, 0x8, 0x5, 0x6, 0x0, 0x6}, 0xffffffffffffffff, 0x10, r0, 0x1) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0xb, 0x9, &(0x7f0000000580)=ANY=[@ANYBLOB="1800000000000000000000000000000018100000", @ANYRES32=r0, @ANYBLOB="0000000000000000bffc0100000000000000000000000000850000000600000000000000000000009500000000000000"], &(0x7f0000000600)='syzkaller\x00', 0x0, 0x30, &(0x7f0000000640)=""/48, 0x41f00, 0x1}, 0x48) ioctl$PERF_EVENT_IOC_SET_BPF(r2, 0x40042408, r3) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000000)={&(0x7f0000000080)='./file0/file0\x00', r0}, 0x10) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000400)=@ax25={0x3, {"02f47b3723e03d"}}, 0x80, &(0x7f00000017c0), 0x0, &(0x7f0000001840)=ANY=[], 0x0, 0x24004044}, 0x4008001) bpf$MAP_CREATE(0x0, &(0x7f0000002cc0)={0x5, 0x0, 0x56c96e7a, 0x2, 0xa, 0xffffffffffffffff, 0x9}, 0x2c) r4 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$rdma_cm(0xffffffffffffffff, &(0x7f00000009c0)=@create_id={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000980)={0xffffffff}, 0x107}}, 0x20) write$rdma_cm(r4, &(0x7f0000000a00)=@disconnect={0xa, 0x4, 0xfa00, {r5}}, 0xc) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000480)='rpc_pipefs\x00', 0x200000, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000002d00)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f00000004c0)='vmnet0keyring\x00') bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000780)={&(0x7f0000000740)='./file0/file0\x00', r6}, 0x10) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x40082406, &(0x7f0000000700)='proc!@ppp1!ppp0ppp0#)lo\\lolo{\x00') mount(&(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000200)='fuseblk\x00', 0xa11800, &(0x7f0000000240)) mount(&(0x7f00000002c0)='./file0/file0\x00', &(0x7f0000000300)='./file0/file0\x00', &(0x7f0000000340)='minix\x00', 0x1000, &(0x7f0000000380)) 2018/03/29 17:34:59 executing program 5: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000ed4000)=0x78, 0x4) bind$inet(r0, &(0x7f0000deb000)={0x2, 0x4e23, @multicast1=0xe0000001}, 0x10) ioctl$sock_SIOCINQ(r0, 0x541b, &(0x7f0000000500)) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000f40ff8)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) getsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(0xffffffffffffff9c, 0x84, 0x1f, &(0x7f0000000240)={0x0, @in={{0x2, 0x4e23}}, 0x0, 0x3}, &(0x7f0000000000)=0x90) setsockopt$inet_sctp_SCTP_RTOINFO(r0, 0x84, 0x0, &(0x7f0000000040)={r1, 0x81, 0x0, 0x100000000}, 0x10) getsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(r0, 0x84, 0x18, &(0x7f00000003c0)={0x0, 0x7}, &(0x7f0000000400)=0x8) socketpair(0x11, 0x800, 0x5, &(0x7f0000000200)={0xffffffffffffffff}) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_INFO(r2, 0xc08c5334, &(0x7f0000000600)={0x6, 0x7, 0x2f29fdaf, 'queue0\x00', 0x800}) r3 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000080)='/dev/hwrng\x00', 0x4000, 0x0) sendto$inet(r0, &(0x7f0000a88f88), 0x29f, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @loopback=0x7f000001}, 0x10) pipe2(&(0x7f0000000580)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80002) ioctl$EVIOCGBITKEY(0xffffffffffffffff, 0x80404521, &(0x7f00000000c0)=""/160) sendmmsg(r0, &(0x7f00000025c0)=[{{&(0x7f0000000300)=@pppoe={0x18, 0x0, {0x0, @link_local={0x1, 0x80, 0xc2}, 'ip6tnl0\x00'}}, 0x80, &(0x7f0000000380)=[{&(0x7f00000010c0)="9421e5271f45907f567d604a09fe27abfa55e2aebecfe4a0aeda13b3d2418870405797686467855ad166a77fa809f72ab92d438b38975596f98c0c03126989f5a4a3fe4878335988dfb98b11d880cc928c21fccdcf2086d98e2ac4ab265ff234ba0a86ee14bbb2bf4cc210f6ca6a5d3d18d3110ac82704ac8a979bebe6ea1a803cb5a21babf0a28c6741f5493a7189c764564aa039257ce92830f1a25bb6fb553231195be0ff72269d4b8503dbb0bc6c23f0341aa626735a002006f6c2b036efa5d1e087ee6181ffb3d0f5f569629e1691681449dc33e4b96e7d71acec3270c46c74442fbb78a39abcddd7c12b184b60f369e4cbf65bddc6e709130c8664607bf74f8e51b570d3a12155be268339d9e2012ee5e7f8ac4696119e847f2fc96f6006cbda28c502d7ee34fcabbbb5c303f7cd3292aabb74a7bff1f76fce1b1fe13482fda1408973de9868e96c630ff08bd68c3a98d07ce0662997755f039a7ee45bdae739d3f3b1cbd5ecfa8825b540b6417c730ec4a8204ce2ba6ebd0c9452b0cc1273bbd591314867c54abafc48697fed81bfeec349729da076218770bb7ba8a2aedca9000638018a28abcaa3dc6642db8097039f0f9f6fdd1ab481507e5796d65b2a81bd38b11c518feed59fce3147bb2bd31518c6032745185a44a98ec2efe3f8eb27709c2e70cfef9a971f97159e74868d6a55e1a8e6e7b500d7c116f02594a58e3dceb86175af56c7502287ddab530acb67386725e0d6b2e317cb0b87affd30d4ff210024287c19d27033b7a11bf18d1ce1e23f618476b15c3a5574fdc0f238f2ec1c3cd2784fd3d8235278bd957c929021d97da58459f921a47002a4841ff77262b7150c5fbda7f8bf6801c22adfb0bc96f7a2d8527aaf00ae5b663eb0f69914dc722b2d7b1e4861ed66168b7c6afa56fff36de7c842f3d24ecc65d25f24917f0867f6a2fb7c5a02335ff1870d35c3aba978208c118fb5ed56f102cf9bfde60786175bc25ebba02aaa4cbbdc95afa96c3449e53c5ea7e92bdabc8ae8b28370cdefc009698f8f870da37e1b188a5439428b619618179900e03df2d5926bd0a69fe94b5553ce84323a03b371d35d4984daa8e4f52cbc75d05dbd12d3bdcc5125ea53559ae82593a6a8d9812ea99d4166451edc55e5dd97f98b7e5c6527658765d14c9c5be3fc4153881d666dbf5eb45c1cbde2781a985f59e7e5aab7d9398dcc21e1d7495047a5afb84727aadc86854edd5a5a645ca3715b2c78ef32702231aa8be45cf97ac787765bbb631f6a357d292bbe97e7d3ec6d15b82f0985f7c0fe679b9788674b80312b5f365dbcf1a8eb5e295084485dcc92f2b905cdded6e2e81cfc7e9d29ec61fd893d120c31b9101770f4cb2e38a8a518295d373f9e6ba8a7226542c67a2ea423f1a32722260ad533435f903933a70906b10e7e5efac4ba3830e242919997a34044cb831a59186eeb68a93ff9eac431e938b48b810a08aab9730597e196127e4b64a6fd8b431a79f8253b031a59c22e3eeeeb5267441e8c962c8db6ba0bc5b4cc3291aa1672049cec15d0272d4441cbb2412b4a3456935403429aeb7644edc9ef26a9096c87632c4458335949fd2a27fa89c78353ae5adab7594eff5b7e8cd8bc43cc602f914e61b04d8c6e24bd7ef078e3b1b02f61df5c6e6f1648fa6a6022c045390ba8c61b73538f8975142eeba57a52d0d038014010a05ec1e16691a81a748bb222068f08b593a5b3f421767c6611fd3799794be1b0aa2b4d66f65bb4c6ee7a17c44dca1bd6a3fe2159b0ad427097f63f6f8df4852e66b34bc787dc2e236308e56d70e608f97ee4da5b631eaa26582d9bbc86e9f51554f2eec09bbb497fd114e200465d9fb75426a84f7d1ef4b967763e628774f59eeac514fc0d83e952b54b91696e80ce73c6d8b7ef4cd2225fb5ad6f837fa9ddd5428cfe1b7c8113c5fdec44dfbc08b4dcd8deeb7ee0a20063994de4bbdc2a54b4522fab89f43122becda26248b2fc4c9b40fc772a54405c23d248c228c557f7d6c7829928c908babf440101171defbf93b88b2df9c01402bf7ba72be3c28100a83f747160bf64769155329af77b1588c65e7eb81b45c2341976a003a15477b239601e890fee9b3d03dd6db89bb8e3815fd9d6eae54ec94821dca6a9204a448b1a3e3f95aac1fc2e739cf72c9c2c7e9d718d8f03d00fe4a9c1161d0eb24c46c9f0167b6277854f80a8af9540a8ee3ffa0c8648be1cf9436061a92f4b219eb20647d9ba686ec9abc218aa0a9e6188924929e149564e2fb48df003c3c9f064323a07a4a91b4988", 0x664}], 0x1}}], 0x1, 0x4000) recvfrom$inet(r0, &(0x7f00009be000)=""/11, 0xe8, 0x0, 0x0, 0xffffffffffffff4e) bind$bt_l2cap(r4, &(0x7f0000000440)={0x1f, 0x8, {0x6, 0x400, 0x0, 0x2, 0x9, 0x3}, 0x10001, 0x2}, 0xe) setsockopt(r5, 0xb5, 0xffffffff, &(0x7f00000006c0)="0ac385d7ac2ae574baf1b3104b37fd7f20ebca1da5063c612b05a3d56c8b2e413e64bfc3e0bb415e656477eea9c01ad808e74aea23e7e4a07d09f22e69e1ae37fecf707d249ba82f1fc8f4a53558952762a62d5712f7ad3f1e2d51e5e3cf31154625d23de117cbb19fe0379b78ae656d20a1840850e0d1b6f6d94f8c810560030e0ac978d48567edbbb1f79c22a73e5a978f82d9", 0x94) getsockopt$inet_sctp_SCTP_RECVRCVINFO(r0, 0x84, 0x20, &(0x7f0000000180), &(0x7f00000001c0)=0x4) sendmsg$netrom(r3, &(0x7f0000000b00)={&(0x7f0000000780)=@full={{0x3, {"53665db4283e1b"}, 0x3}, [{"d40335b6bcd5d9"}, {"d5952336c520fb"}, {"d326c92416d6ea"}, {"763aea9242214f"}, {"d716c11982a583"}, {"712de86f857435"}, {"1d8bd63f2c431c"}, {"6f5a0b1522aca6"}]}, 0x48, &(0x7f0000000ac0), 0x0, &(0x7f00000017c0)=[{0x10, 0x117, 0x9}], 0x10, 0x8000}, 0x4000840) setsockopt$inet_mtu(r3, 0x0, 0xa, &(0x7f0000000480), 0x4) r6 = getpid() epoll_ctl$EPOLL_CTL_ADD(r3, 0x1, r3, &(0x7f00000004c0)={0x5}) syz_open_procfs(r6, &(0x7f00000005c0)='maps\x00') shutdown(r0, 0x1) 2018/03/29 17:34:59 executing program 4: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)={0xb, 0x7e, 0x3, 0x1, 0x11}, 0x2c) mount(&(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) r1 = socket$kcm(0x29, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000000bc0)={&(0x7f00000007c0)=@rc={0x1f, {0x5, 0x50000000, 0xaa2, 0x613, 0x4, 0x1ff}, 0x3f}, 0x80, &(0x7f0000000940)=[{&(0x7f0000000840)="09c9453aa30d8c5fba221fa2413f12c580837b2ae292e3ee8dd00098c404125a1a2e63840f82a2f69c3927af43b828422484aaeeceebcbe76e999bd3930c9b7c2995484407f9166e39c2069a88b63a980b9b5ffc880f4b89dde5adae6c7fb84ed98cbac860214dfb0b28d1b2e2d58aefebdfe515334f2ffa46be22ef7a4b3a276cb70a27c9e9f5de0a20bad24cbe2b89aee9693c2f8f186ea59fcfc4ebec7188cca0418d4583a6f1730f62416d70cd62555eb4f58ea831d1fea9956a2cba0049f23bf0b249f5de2ce0dc303808d70b0ccab3c7f37e949e", 0xd7}], 0x1, &(0x7f0000000980), 0x0, 0x20004805}, 0x4010) r2 = perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x2367, 0x7fff, 0x1, 0x6, 0x0, 0x78b1, 0x1, 0x0, 0x4992c766, 0xff, 0x81, 0x100, 0x40, 0x3, 0x9, 0x8, 0x1, 0x10000, 0x0, 0x6, 0x90e, 0x9, 0x7ff, 0x0, 0x8, 0x1, 0x30, 0x20, 0x7fffffff, 0x6, 0x401, 0x2, 0x1000, 0x8001, 0x1ff, 0xfffffffffffffff8, 0x0, 0x2, 0x0, @perf_config_ext={0x5, 0x8}, 0x1ab23, 0x3f, 0x8, 0x0, 0x6}, 0xffffffffffffffff, 0x10, r0, 0x1) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0xb, 0x9, &(0x7f0000000580)=@framed={{0x18}, [@map={0x18, 0x0, 0x1, 0x0, r0}, @generic={0x3ff, 0xfffffffffffffffc, 0x1}, @call={0x85, 0x0, 0x0, 0x6}], {0x95}}, &(0x7f0000000600)='syzkaller\x00', 0x0, 0x30, &(0x7f0000000640)=""/48, 0x41f00, 0x1}, 0x48) ioctl$PERF_EVENT_IOC_SET_BPF(r2, 0x40042408, r3) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000000)={&(0x7f0000000080)='./file0/file0\x00', r0}, 0x10) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000400)=@ax25={0x3, {"02f47b3723e03d"}}, 0x80, &(0x7f00000017c0), 0x0, &(0x7f0000001840)=ANY=[], 0x0, 0x24004044}, 0x4008001) bpf$MAP_CREATE(0x0, &(0x7f0000002cc0)={0x5, 0x100, 0x56c96e7a, 0x2, 0xa, 0xffffffffffffffff, 0x9}, 0x2c) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000480)='rpc_pipefs\x00', 0x200000, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000002d00)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f00000004c0)='vmnet0keyring\x00') bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000780)={&(0x7f0000000740)='./file0/file0\x00', r4}, 0x10) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x40082406, &(0x7f0000000700)='proc!@ppp1!ppp0ppp0#)lo\\lolo{\x00') mount(&(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000200)='fuseblk\x00', 0xa11800, &(0x7f0000000240)) r5 = syz_open_dev$sg(&(0x7f0000000240)='/dev/sg#\x00', 0xfffffffffffffffa, 0x800) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000280)={r5, r3, 0x5, 0x1}, 0x10) ioctl$TIOCCONS(r5, 0x541d) mount(&(0x7f00000002c0)='./file0/file0\x00', &(0x7f0000000300)='./file0/file0\x00', &(0x7f0000000340)='minix\x00', 0x1000, &(0x7f0000000380)) 2018/03/29 17:34:59 executing program 1: r0 = open(&(0x7f0000000440)='./file0\x00', 0x1ffff, 0x5) ioctl$TIOCLINUX7(0xffffffffffffffff, 0x541c, &(0x7f0000000080)={0x7, 0x5}) setsockopt$inet_tcp_int(r0, 0x6, 0x0, &(0x7f00000003c0)=0x6, 0xf4) perf_event_open(&(0x7f0000000240)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000180)='/dev/sequencer2\x00', 0x0, 0x0) clock_gettime(0x0, &(0x7f00000001c0)={0x0, 0x0}) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r1, 0x4040534e, &(0x7f0000000340)={0x0, @time={r2, r3+30000000}, 0x1, {0x8, 0x606}, 0x101, 0x0, 0x80000001}) r4 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000040)='/dev/rtc\x00', 0x0, 0x0) r5 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000580)='/dev/sequencer\x00', 0x0, 0x0) ioctl$LOOP_CLR_FD(r4, 0x7003) timerfd_gettime(r1, &(0x7f0000000300)) getsockopt$inet_sctp_SCTP_FRAGMENT_INTERLEAVE(0xffffffffffffffff, 0x84, 0x12, &(0x7f0000000140), &(0x7f00000002c0)=0x4) setsockopt$packet_buf(0xffffffffffffffff, 0x107, 0xd, &(0x7f00000004c0)="d9fb4f1bcfd3e0c1355ea2018b25a4fd911d8abc3f3fd71f4749878ac1fbce6e5d188e078b15be141905d7966406e4f3fb021da63028837a8407bcb3e3a676d251bcd09a04964ed9cd0f6cece267dc4bada0403dcef25dace8875f4a6495eb2e6cc4969e7de83153459b4d61669ed9eb75", 0x71) perf_event_open(&(0x7f00000000c0)={0x0, 0x70, 0x0, 0x0, 0x7ff, 0xa1, 0x0, 0x1, 0x200, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0xb0, 0x5, 0x0, 0x401, 0xcf, 0x0, 0x0, 0x0, 0x3ff, 0x0, 0x8, 0x2, 0x1f, 0x2, 0x5, 0x9, 0x3, 0x0, 0x4, 0x0, 0x20000000, 0x0, @perf_config_ext={0x9}, 0x10, 0x3, 0x8, 0x0, 0x72eb, 0x99, 0x1}, 0x0, 0xd, r4, 0x0) mq_notify(r5, &(0x7f0000000400)={0x0, 0x1f, 0x4}) execve(&(0x7f0000000200)='./file0\x00', &(0x7f0000000680)=[&(0x7f0000000480)='wlan0\x00', &(0x7f0000000540)='/dev/rtc\x00', &(0x7f0000000600)='\x00', &(0x7f0000000640)='proc\x00'], &(0x7f0000000740)=[&(0x7f0000000700)='trustedwlan0vmnet0@%\x00']) [ 277.277113] IPVS: ftp: loaded support on port[0] = 21 2018/03/29 17:34:59 executing program 7: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)={0xb, 0x7e, 0x3, 0x1, 0x11}, 0x2c) mount(&(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) r1 = socket$kcm(0x29, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000000bc0)={&(0x7f00000007c0)=@rc={0x1f, {0x5, 0x50000000, 0xaa2, 0x613, 0x4, 0x1ff}, 0x3f}, 0x80, &(0x7f0000000940)=[{&(0x7f0000000840)="09c9453aa30d8c5fba221fa2413f12c580837b2ae292e3ee8dd00098c404125a1a2e63840f82a2f69c3927af43b828422484aaeeceebcbe76e999bd3930c9b7c2995484407f9166e39c2069a88b63a980b9b5ffc880f4b89dde5adae6c7fb84ed98cbac860214dfb0b28d1b2e2d58aefebdfe515334f2ffa46be22ef7a4b3a276cb70a27c9e9f5de0a20bad24cbe2b89aee9693c2f8f186ea59fcfc4ebec7188cca0418d4583a6f1730f62416d70cd62555eb4f58ea831d1fea9956a2cba0049f23bf0b249f5de2ce0dc303808d70b0ccab3c7f37e949e", 0xd7}], 0x1, &(0x7f0000000980), 0x0, 0x20004805}, 0x4010) r2 = perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x2367, 0x7fff, 0x1, 0x6, 0x0, 0x78b1, 0x1, 0x0, 0x4992c766, 0xff, 0x81, 0x100, 0x40, 0x3, 0x9, 0x8, 0x1, 0x10000, 0x0, 0x6, 0x90e, 0x9, 0x7ff, 0x0, 0x8, 0x1, 0x30, 0x20, 0x7fffffff, 0x6, 0x401, 0x2, 0x1000, 0x8001, 0x1ff, 0xfffffffffffffff8, 0x0, 0x2, 0x0, @perf_config_ext={0x5, 0x8}, 0x1ab23, 0x3f, 0x8, 0x5, 0x6, 0x0, 0x6}, 0xffffffffffffffff, 0x10, r0, 0x1) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0xb, 0x9, &(0x7f0000000580)=ANY=[@ANYBLOB="1800000000000000000000000000000018100000", @ANYRES32=r0, @ANYBLOB="0000000000000000fffc0100000000000000000000000000850000000600000000000000000000009501000000000000"], &(0x7f0000000600)='syzkaller\x00', 0x0, 0x30, &(0x7f0000000640)=""/48, 0x41f00, 0x1}, 0x48) ioctl$PERF_EVENT_IOC_SET_BPF(r2, 0x40042408, r3) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000000)={&(0x7f0000000080)='./file0/file0\x00', r0}, 0x10) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000400)=@ax25={0x3, {"02f47b3723e03d"}}, 0x80, &(0x7f00000017c0), 0x0, &(0x7f0000001840)=ANY=[], 0x0, 0x24004044}, 0x4008001) bpf$MAP_CREATE(0x0, &(0x7f0000002cc0)={0x5, 0x0, 0x56c96e7a, 0x2, 0xa, 0xffffffffffffffff, 0x9}, 0x2c) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000480)='rpc_pipefs\x00', 0x200000, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000002d00)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f00000004c0)='vmnet0keyring\x00') bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000780)={&(0x7f0000000740)='./file0/file0\x00', r4}, 0x10) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x40082406, &(0x7f0000000700)='proc!@ppp1!ppp0ppp0#)lo\\lolo{\x00') mount(&(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000200)='fuseblk\x00', 0xa11800, &(0x7f0000000240)) mount(&(0x7f00000002c0)='./file0/file0\x00', &(0x7f0000000300)='./file0/file0\x00', &(0x7f0000000340)='minix\x00', 0x1000, &(0x7f0000000380)) 2018/03/29 17:34:59 executing program 0: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)={0xb, 0x7e, 0x3, 0x1, 0x11}, 0x2c) mount(&(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) r1 = socket$kcm(0x29, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000000bc0)={&(0x7f00000007c0)=@rc={0x1f, {0x5, 0x50000000, 0xaa2, 0x613, 0x4, 0x1ff}}, 0x80, &(0x7f0000000940)=[{&(0x7f0000000840)="09c9453aa30d8c5fba221fa2413f12c580837b2ae292e3ee8dd00098c404125a1a2e63840f82a2f69c3927af43b828422484aaeeceebcbe76e999bd3930c9b7c2995484407f9166e39c2069a88b63a980b9b5ffc880f4b89dde5adae6c7fb84ed98cbac860214dfb0b28d1b2e2d58aefebdfe515334f2ffa46be22ef7a4b3a276cb70a27c9e9f5de0a20bad24cbe2b89aee9693c2f8f186ea59fcfc4ebec7188cca0418d4583a6f1730f62416d70cd62555eb4f58ea831d1fea9956a2cba0049f23bf0b249f5de2ce0dc303808d70b0ccab3c7f37e949e", 0xd7}], 0x1, &(0x7f0000000980)}, 0x4010) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0xb, 0x9, &(0x7f0000000580)=@framed={{0x18}, [@map={0x18, 0x0, 0x1, 0x0, r0}, @generic={0x3ff, 0xfffffffffffffffc, 0x1}, @call={0x85, 0x0, 0x0, 0x6}], {0x95}}, &(0x7f0000000600)='syzkaller\x00', 0x0, 0x30, &(0x7f0000000640)=""/48, 0x41f00, 0x1}, 0x48) ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, r2) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000000)={&(0x7f0000000080)='./file0/file0\x00', r0}, 0x10) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000400)=@ax25={0x3, {"02f47b3723e03d"}}, 0x80, &(0x7f00000017c0), 0x0, &(0x7f0000001840)=ANY=[], 0x0, 0x24004044}, 0x4008001) bpf$MAP_CREATE(0x0, &(0x7f0000002cc0)={0x5, 0x100, 0x56c96e7a, 0x2, 0xa, 0xffffffffffffffff, 0x9}, 0x2c) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000480)='rpc_pipefs\x00', 0x200000, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000002d00)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f00000004c0)='vmnet0keyring\x00') bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000780)={&(0x7f0000000740)='./file0/file0\x00', r3}, 0x10) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, &(0x7f0000000700)='proc!@ppp1!ppp0ppp0#)lo\\lolo{\x00') mount(&(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000200)='fuseblk\x00', 0xa11800, &(0x7f0000000240)) mount(&(0x7f0000000240)='./file0/file0\x00', &(0x7f0000000280)='./file0\x00', &(0x7f0000000500)='squashfs\x00', 0x10000, &(0x7f0000000980)="0ac4c9162f96d3dfbef300201255b29cbd12e9422e6678787f8fd5512c42d1d161b6ce69be506417511de03bdec33151304969afb0633935046aec972fcc382ae27e724bc7a25661f6c83f818a66a7447131") mount(&(0x7f00000002c0)='./file0/file0\x00', &(0x7f0000000300)='./file0/file0\x00', &(0x7f0000000340)='minix\x00', 0x0, &(0x7f0000000380)) 2018/03/29 17:34:59 executing program 4: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)={0xb, 0x7e, 0x3, 0x1, 0x11}, 0x2c) mount(&(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) r1 = socket$kcm(0x29, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000000bc0)={&(0x7f00000007c0)=@rc={0x1f, {0x5, 0x50000000, 0xaa2, 0x613, 0x4, 0x1ff}, 0x3f}, 0x80, &(0x7f0000000940)=[{&(0x7f0000000840)="09c9453aa30d8c5fba221fa2413f12c580837b2ae292e3ee8dd00098c404125a1a2e63840f82a2f69c3927af43b828422484aaeeceebcbe76e999bd3930c9b7c2995484407f9166e39c2069a88b63a980b9b5ffc880f4b89dde5adae6c7fb84ed98cbac860214dfb0b28d1b2e2d58aefebdfe515334f2ffa46be22ef7a4b3a276cb70a27c9e9f5de0a20bad24cbe2b89aee9693c2f8f186ea59fcfc4ebec7188cca0418d4583a6f1730f62416d70cd62555eb4f58ea831d1fea9956a2cba0049f23bf0b249f5de2ce0dc303808d70b0ccab3c7f37e949e", 0xd7}], 0x1, &(0x7f0000000980), 0x0, 0x20004805}, 0x4010) r2 = perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x2367, 0x7fff, 0x1, 0x6, 0x0, 0x78b1, 0x1, 0x0, 0x4992c766, 0xff, 0x81, 0x100, 0x40, 0x3, 0x9, 0x8, 0x1, 0x10000, 0x0, 0x6, 0x90e, 0x9, 0x7ff, 0x0, 0x8, 0x1, 0x30, 0x20, 0x7fffffff, 0x6, 0x401, 0x2, 0x1000, 0x8001, 0x1ff, 0xfffffffffffffff8, 0x0, 0x2, 0x0, @perf_config_ext={0x5, 0x8}, 0x1ab23, 0x3f, 0x8, 0x0, 0x6}, 0xffffffffffffffff, 0x10, r0, 0x1) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0xb, 0x9, &(0x7f0000000580)=@framed={{0x18}, [@map={0x18, 0x0, 0x1, 0x0, r0}, @generic={0x3ff, 0xfffffffffffffffc, 0x1}, @call={0x85, 0x0, 0x0, 0x6}], {0x95}}, &(0x7f0000000600)='syzkaller\x00', 0x0, 0x30, &(0x7f0000000640)=""/48, 0x41f00, 0x1}, 0x48) ioctl$PERF_EVENT_IOC_SET_BPF(r2, 0x40042408, r3) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000000)={&(0x7f0000000080)='./file0/file0\x00', r0}, 0x10) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000400)=@ax25={0x3, {"02f47b3723e03d"}}, 0x80, &(0x7f00000017c0), 0x0, &(0x7f0000001840)=ANY=[], 0x0, 0x24004044}, 0x4008001) bpf$MAP_CREATE(0x0, &(0x7f0000002cc0)={0x5, 0x100, 0x56c96e7a, 0x2, 0xa, 0xffffffffffffffff, 0x9}, 0x2c) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000480)='rpc_pipefs\x00', 0x200000, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000002d00)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f00000004c0)='vmnet0keyring\x00') bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000780)={&(0x7f0000000740)='./file0/file0\x00', r4}, 0x10) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x40082406, &(0x7f0000000700)='proc!@ppp1!ppp0ppp0#)lo\\lolo{\x00') mount(&(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000200)='fuseblk\x00', 0xa11800, &(0x7f0000000240)) r5 = syz_open_dev$sg(&(0x7f0000000240)='/dev/sg#\x00', 0xfffffffffffffffa, 0x800) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000280)={r5, r3, 0x5, 0x1}, 0x10) ioctl$TIOCCONS(r5, 0x541d) mount(&(0x7f00000002c0)='./file0/file0\x00', &(0x7f0000000300)='./file0/file0\x00', &(0x7f0000000340)='minix\x00', 0x1000, &(0x7f0000000380)) [ 277.440788] IPVS: ftp: loaded support on port[0] = 21 2018/03/29 17:34:59 executing program 4: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)={0xb, 0x7e, 0x3, 0x1, 0x11}, 0x2c) mount(&(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) r1 = socket$kcm(0x29, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000000bc0)={&(0x7f00000007c0)=@rc={0x1f, {0x5, 0x50000000, 0xaa2, 0x613, 0x4, 0x1ff}, 0x3f}, 0x80, &(0x7f0000000940)=[{&(0x7f0000000840)="09c9453aa30d8c5fba221fa2413f12c580837b2ae292e3ee8dd00098c404125a1a2e63840f82a2f69c3927af43b828422484aaeeceebcbe76e999bd3930c9b7c2995484407f9166e39c2069a88b63a980b9b5ffc880f4b89dde5adae6c7fb84ed98cbac860214dfb0b28d1b2e2d58aefebdfe515334f2ffa46be22ef7a4b3a276cb70a27c9e9f5de0a20bad24cbe2b89aee9693c2f8f186ea59fcfc4ebec7188cca0418d4583a6f1730f62416d70cd62555eb4f58ea831d1fea9956a2cba0049f23bf0b249f5de2ce0dc303808d70b0ccab3c7f37e949e", 0xd7}], 0x1, &(0x7f0000000980), 0x0, 0x20004805}, 0x4010) r2 = perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x2367, 0x7fff, 0x1, 0x6, 0x0, 0x78b1, 0x1, 0x0, 0x4992c766, 0xff, 0x81, 0x100, 0x40, 0x3, 0x9, 0x8, 0x1, 0x10000, 0x0, 0x6, 0x90e, 0x9, 0x7ff, 0x0, 0x8, 0x1, 0x30, 0x20, 0x7fffffff, 0x6, 0x401, 0x2, 0x1000, 0x8001, 0x1ff, 0xfffffffffffffff8, 0x0, 0x2, 0x0, @perf_config_ext={0x5, 0x8}, 0x1ab23, 0x3f, 0x8, 0x5}, 0xffffffffffffffff, 0x10, r0, 0x1) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0xb, 0x9, &(0x7f0000000580)=@framed={{0x18}, [@map={0x18, 0x0, 0x1, 0x0, r0}, @generic={0x3ff, 0xfffffffffffffffc, 0x1}, @call={0x85, 0x0, 0x0, 0x6}], {0x95}}, &(0x7f0000000600)='syzkaller\x00', 0x0, 0x30, &(0x7f0000000640)=""/48, 0x41f00, 0x1}, 0x48) ioctl$PERF_EVENT_IOC_SET_BPF(r2, 0x40042408, r3) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000000)={&(0x7f0000000080)='./file0/file0\x00', r0}, 0x10) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000400)=@ax25={0x3, {"02f47b3723e03d"}}, 0x80, &(0x7f00000017c0), 0x0, &(0x7f0000001840)=ANY=[], 0x0, 0x24004044}, 0x4008001) bpf$MAP_CREATE(0x0, &(0x7f0000002cc0)={0x5, 0x100, 0x56c96e7a, 0x2, 0xa, 0xffffffffffffffff, 0x9}, 0x2c) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000480)='rpc_pipefs\x00', 0x200000, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000002d00)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f00000004c0)='vmnet0keyring\x00') bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000780)={&(0x7f0000000740)='./file0/file0\x00', r4}, 0x10) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x40082406, &(0x7f0000000700)='proc!@ppp1!ppp0ppp0#)lo\\lolo{\x00') mount(&(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000200)='fuseblk\x00', 0xa11800, &(0x7f0000000240)) r5 = syz_open_dev$sg(&(0x7f0000000240)='/dev/sg#\x00', 0xfffffffffffffffa, 0x800) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000280)={r5, r3, 0x5, 0x1}, 0x10) ioctl$TIOCCONS(r5, 0x541d) mount(&(0x7f00000002c0)='./file0/file0\x00', &(0x7f0000000300)='./file0/file0\x00', &(0x7f0000000340)='minix\x00', 0x1000, &(0x7f0000000380)) 2018/03/29 17:34:59 executing program 5: r0 = socket(0xa, 0x2, 0x0) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r1 = open(&(0x7f00004b8ff8)='./file0\x00', 0x28042, 0x0) connect$inet6(r0, &(0x7f0000d3cfe4)={0xa, 0x0, 0x0, @mcast2={0xff, 0x2, [], 0x1}, 0x3}, 0x1c) ioctl$DRM_IOCTL_ADD_CTX(r1, 0xc0086420, &(0x7f0000000000)) fallocate(r1, 0x0, 0xffff, 0x1f) setsockopt$inet6_mtu(r0, 0x29, 0x17, &(0x7f0000000100)=0x2, 0x4) connect$inet(r0, &(0x7f0000000040)={0x2, 0x4e22, @multicast1=0xe0000001}, 0x10) socketpair$inet_dccp(0x2, 0x6, 0x0, &(0x7f0000000240)) sendfile(r0, r1, &(0x7f00005faff8)=0x60, 0xfffb) getsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX3(r0, 0x84, 0x6f, &(0x7f00000000c0)={0x0, 0xac, &(0x7f0000000280)=[@in6={0xa, 0x4e24, 0x0, @remote={0xfe, 0x80, [], 0xbb}, 0x2}, @in={0x2, 0x4e22, @rand_addr=0x34800}, @in6={0xa, 0x4e23, 0x200, @empty, 0x9}, @in6={0xa, 0x4e21, 0x8, @local={0xfe, 0x80, [], 0xaa}, 0x8}, @in6={0xa, 0x4e23, 0x2, @dev={0xfe, 0x80, [], 0x14}}, @in={0x2, 0x4e23}, @in6={0xa, 0x4e20, 0x8, @mcast2={0xff, 0x2, [], 0x1}, 0x4}]}, &(0x7f0000000340)=0x10) getsockopt$inet_sctp6_SCTP_PR_SUPPORTED(r0, 0x84, 0x71, &(0x7f0000000380)={0x0, 0x4766}, &(0x7f00000003c0)=0x8) getsockopt$inet_sctp6_SCTP_STATUS(r1, 0x84, 0xe, &(0x7f0000000400)={r2, 0xbbf3, 0xffffffff, 0x0, 0xfffffffffffffffe, 0x200, 0x9, 0x0, {r3, @in={{0x2, 0x4e24, @broadcast=0xffffffff}}, 0x9, 0x7f, 0x6, 0x7, 0xc3}}, &(0x7f00000004c0)=0xb0) unlinkat(0xffffffffffffffff, &(0x7f0000000140)='./file0/file0\x00', 0x0) accept4$unix(r1, &(0x7f0000000180)=@abs, &(0x7f0000000200)=0x6e, 0x800) 2018/03/29 17:34:59 executing program 1: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup.cpu\x00', 0x200002, 0x0) fchdir(r0) r1 = open(&(0x7f0000000280)='./file0\x00', 0x10000000080040, 0x0) fcntl$setlease(r1, 0x400, 0x0) rename(&(0x7f0000000000)='./file0\x00', &(0x7f0000887ff8)='./file1\x00') rt_sigprocmask(0x0, &(0x7f0000032ff8)={0xfffffffffffffffe}, 0x0, 0x8) rt_sigtimedwait(&(0x7f00009ac000)={0xfffffffffffffffd}, &(0x7f0000de0ff0), &(0x7f0000039ff0)={0x0, 0x8000000}, 0x8) add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000180)={0x73, 0x79, 0x7a, 0x2}, &(0x7f0000000240)="ab06fc681c85a5f49d449c43e9bbe5cb740939e9b641db600fd973", 0x1b, 0xfffffffffffffff8) unlink(&(0x7f0000000080)='./file1\x00') symlink(&(0x7f0000000140)='./file1\x00', &(0x7f0000000200)='./file1\x00') setsockopt$SO_VM_SOCKETS_BUFFER_MAX_SIZE(0xffffffffffffffff, 0x28, 0x2, &(0x7f00000001c0), 0x8) r2 = syz_open_dev$sg(&(0x7f0000000040)='/dev/sg#\x00', 0x6, 0x202002) bind$netlink(0xffffffffffffffff, &(0x7f0000000180)={0x10, 0x0, 0x0, 0x802ffffffff}, 0xc) syz_genetlink_get_family_id$ipvs(&(0x7f00000000c0)='IPVS\x00') renameat2(r2, &(0x7f00000002c0)='./file0\x00', r2, &(0x7f0000000340)='./file0\x00', 0x5) sendmsg$IPVS_CMD_NEW_DEST(0xffffffffffffffff, &(0x7f0000000140)={&(0x7f0000000080)={0x10}, 0xc, &(0x7f0000000100)={&(0x7f0000000600)=ANY=[@ANYBLOB="01ec0ad5a3f228ad3201528035fdf304273c8ce0dffaf59f8e7978bd933fe14c91e5d81d3854b1c93ea6720232aed506ce12510dd629c02a896f68ad27e7e9aa861cc12bc85a3cdd60e49f6bd07fdba6409780d8f85f4e7c28ca818e759e0cb0ff68a462934942a461"], 0x1}, 0x1}, 0x93ccaba251633594) ioctl$sock_inet_SIOCADDRT(r2, 0x890b, &(0x7f0000002f00)={0x5, {0x2, 0x4e22}, {0x2, 0x4e22, @broadcast=0xffffffff}, {0x2, 0x0, @multicast1=0xe0000001}, 0x200, 0x2, 0x4, 0xffffffffffffff63, 0x9, &(0x7f0000002ec0)='ip6gretap0\x00', 0x98, 0x8000, 0x1f}) lstat(&(0x7f0000000480)='./file0\x00', &(0x7f00000004c0)) sendmsg$nl_generic(r2, &(0x7f0000002e80)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x2020008}, 0xc, &(0x7f0000002e40)={&(0x7f0000000540)=ANY=[@ANYBLOB="9c0000003800000125bd7000fddbdf250000000008001100040044002dd114a18da106b1c8a9398d013e2fe1a16069e90dc91205920f6bd4e33ef8206d4eaad6120ad0"], 0x1}, 0x1, 0x0, 0x0, 0x4000080}, 0x4040000) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, &(0x7f0000000000), 0x4) socket(0x200000000010, 0x2, 0x0) 2018/03/29 17:34:59 executing program 0: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)={0xb, 0x7e, 0x3, 0x1, 0x11}, 0x2c) mount(&(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) r1 = socket$kcm(0x29, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000000bc0)={&(0x7f00000007c0)=@rc={0x1f, {0x5, 0x50000000, 0xaa2, 0x613, 0x4, 0x1ff}}, 0x80, &(0x7f0000000940)=[{&(0x7f0000000840)="09c9453aa30d8c5fba221fa2413f12c580837b2ae292e3ee8dd00098c404125a1a2e63840f82a2f69c3927af43b828422484aaeeceebcbe76e999bd3930c9b7c2995484407f9166e39c2069a88b63a980b9b5ffc880f4b89dde5adae6c7fb84ed98cbac860214dfb0b28d1b2e2d58aefebdfe515334f2ffa46be22ef7a4b3a276cb70a27c9e9f5de0a20bad24cbe2b89aee9693c2f8f186ea59fcfc4ebec7188cca0418d4583a6f1730f62416d70cd62555eb4f58ea831d1fea9956a2cba0049f23bf0b249f5de2ce0dc303808d70b0ccab3c7f37e949e", 0xd7}], 0x1, &(0x7f0000000980)}, 0x4010) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0xb, 0x9, &(0x7f0000000580)=@framed={{0x18}, [@map={0x18, 0x0, 0x1, 0x0, r0}, @generic={0x3ff, 0xfffffffffffffffc, 0x1}, @call={0x85, 0x0, 0x0, 0x6}], {0x95}}, &(0x7f0000000600)='syzkaller\x00', 0x0, 0x30, &(0x7f0000000640)=""/48, 0x41f00, 0x1}, 0x48) ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, r2) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000000)={&(0x7f0000000080)='./file0/file0\x00', r0}, 0x10) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000400)=@ax25={0x3, {"02f47b3723e03d"}}, 0x80, &(0x7f00000017c0), 0x0, &(0x7f0000001840)=ANY=[], 0x0, 0x24004044}, 0x4008001) bpf$MAP_CREATE(0x0, &(0x7f0000002cc0)={0x5, 0x100, 0x56c96e7a, 0x2, 0xa, 0xffffffffffffffff, 0x9}, 0x2c) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000480)='rpc_pipefs\x00', 0x200000, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000002d00)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f00000004c0)='vmnet0keyring\x00') bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000780)={&(0x7f0000000740)='./file0/file0\x00', r3}, 0x10) ioctl$KVM_SET_SREGS(r2, 0x4138ae84, &(0x7f0000000980)={{0x5000, 0x0, 0xa, 0x0, 0x7a, 0xf43, 0x0, 0xed4, 0x5a, 0x5, 0x10000, 0x7}, {0x16000, 0x0, 0xf, 0x6, 0x81, 0x1, 0x4, 0x20, 0x4, 0xfff, 0x7f, 0x3}, {0x0, 0x0, 0x3, 0x80000000, 0x333b, 0x8000, 0x1, 0xfffffffffffffff7, 0x5, 0x5feba92d, 0x3ff, 0x9}, {0x10000, 0x0, 0x10, 0xdd51, 0x0, 0x3, 0x4, 0x5, 0x6, 0x5, 0x38, 0x401}, {0x0, 0x13001, 0x0, 0xffffffffffffff1a, 0x8001, 0x401, 0x40, 0x5, 0x8, 0x9, 0x61d6, 0xe329}, {0xf000, 0x1000, 0xd, 0x5, 0x0, 0x3, 0x101, 0x8001, 0x1, 0x9, 0xd0, 0xa2}, {0x4, 0x10f000, 0x1b, 0x4, 0x4000000, 0x7, 0x5, 0x6, 0x9bc, 0x5, 0x76, 0x6}, {0x5, 0x6000, 0xaff2ed75803165c8, 0xac4, 0x6, 0x3f, 0x8, 0x2a9c, 0x1, 0x3ff, 0xffffffff, 0x3}, {0x100000, 0x5006}, {0x0, 0x10000}, 0x40000000, 0x0, 0x10f000, 0x40, 0x5, 0xb500, 0x4002, [0x4, 0x3, 0xcc78, 0x3ff0000000000000]}) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, &(0x7f0000000700)='proc!@ppp1!ppp0ppp0#)lo\\lolo{\x00') mount(&(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000200)='fuseblk\x00', 0xa11800, &(0x7f0000000240)) mount(&(0x7f00000002c0)='./file0/file0\x00', &(0x7f0000000300)='./file0/file0\x00', &(0x7f0000000340)='minix\x00', 0x0, &(0x7f0000000380)) 2018/03/29 17:34:59 executing program 7: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)={0xb, 0x7e, 0x3, 0x1, 0x11}, 0x2c) open(&(0x7f0000000240)='./file0\x00', 0x10000, 0xd) mount(&(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) r1 = socket$kcm(0x29, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000000bc0)={&(0x7f00000007c0)=@rc={0x1f, {0x5, 0x50000000, 0xaa2, 0x613, 0x4, 0x1ff}, 0x3f}, 0x80, &(0x7f0000000940)=[{&(0x7f0000000840)="09c9453aa30d8c5fba221fa2413f12c580837b2ae292e3ee8dd00098c404125a1a2e63840f82a2f69c3927af43b828422484aaeeceebcbe76e999bd3930c9b7c2995484407f9166e39c2069a88b63a980b9b5ffc880f4b89dde5adae6c7fb84ed98cbac860214dfb0b28d1b2e2d58aefebdfe515334f2ffa46be22ef7a4b3a276cb70a27c9e9f5de0a20bad24cbe2b89aee9693c2f8f186ea59fcfc4ebec7188cca0418d4583a6f1730f62416d70cd62555eb4f58ea831d1fea9956a2cba0049f23bf0b249f5de2ce0dc303808d70b0ccab3c7f37e949e", 0xd7}], 0x1, &(0x7f0000000980), 0x0, 0x20004805}, 0x4010) r2 = perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x2367, 0x7fff, 0x1, 0x6, 0x0, 0x78b1, 0x1, 0x0, 0x4992c766, 0xff, 0x81, 0x100, 0x40, 0x3, 0x9, 0x8, 0x1, 0x10000, 0x0, 0x6, 0x90e, 0x9, 0x7ff, 0x0, 0x8, 0x1, 0x30, 0x20, 0x7fffffff, 0x6, 0x401, 0x2, 0x1000, 0x8001, 0x1ff, 0xfffffffffffffff8, 0x0, 0x2, 0x0, @perf_config_ext={0x5, 0x8}, 0x1ab23, 0x3f, 0x8, 0x5, 0x6, 0x0, 0x6}, 0xffffffffffffffff, 0x10, r0, 0x1) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0xb, 0x9, &(0x7f0000000580)=@framed={{0x18}, [@map={0x18, 0x0, 0x1, 0x0, r0}, @generic={0x3ff, 0xfffffffffffffffc, 0x1}, @call={0x85, 0x0, 0x0, 0x6}], {0x95}}, &(0x7f0000000600)='syzkaller\x00', 0x0, 0x30, &(0x7f0000000640)=""/48, 0x41f00, 0x1}, 0x48) ioctl$PERF_EVENT_IOC_SET_BPF(r2, 0x40042408, r3) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000000)={&(0x7f0000000080)='./file0/file0\x00', r0}, 0x10) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000400)=@ax25={0x3, {"02f47b3723e03d"}}, 0x80, &(0x7f00000017c0), 0x0, &(0x7f0000001840)=ANY=[], 0x0, 0x24004044}, 0x4008001) bpf$MAP_CREATE(0x0, &(0x7f0000002cc0)={0x5, 0x0, 0x56c96e7a, 0x2, 0xa, 0xffffffffffffffff, 0x9}, 0x2c) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000480)='rpc_pipefs\x00', 0x200000, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000002d00)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f00000004c0)='vmnet0keyring\x00') bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000780)={&(0x7f0000000740)='./file0/file0\x00', r4}, 0x10) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x40082406, &(0x7f0000000700)='proc!@ppp1!ppp0ppp0#)lo\\lolo{\x00') mount(&(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000200)='fuseblk\x00', 0xa11800, &(0x7f0000000240)) mount(&(0x7f00000002c0)='./file0/file0\x00', &(0x7f0000000300)='./file0/file0\x00', &(0x7f0000000340)='minix\x00', 0x1000, &(0x7f0000000380)) 2018/03/29 17:34:59 executing program 2: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)={0xb, 0x7e, 0x3, 0x1, 0x11}, 0x2c) mount(&(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) r1 = socket$kcm(0x29, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000000bc0)={&(0x7f00000007c0)=@rc={0x1f, {0x5, 0x50000000, 0xaa2, 0x613, 0x4, 0x1ff}, 0x3f}, 0x80, &(0x7f0000000940)=[{&(0x7f0000000840)="09c9453aa30d8c5fba221fa2413f12c580837b2ae292e3ee8dd00098c404125a1a2e63840f82a2f69c3927af43b828422484aaeeceebcbe76e999bd3930c9b7c2995484407f9166e39c2069a88b63a980b9b5ffc880f4b89dde5adae6c7fb84ed98cbac860214dfb0b28d1b2e2d58aefebdfe515334f2ffa46be22ef7a4b3a276cb70a27c9e9f5de0a20bad24cbe2b89aee9693c2f8f186ea59fcfc4ebec7188cca0418d4583a6f1730f62416d70cd62555eb4f58ea831d1fea9956a2cba0049f23bf0b249f5de2ce0dc303808d70b0ccab3c7f37e949e", 0xd7}], 0x1, &(0x7f0000000980), 0x0, 0x20004805}, 0x4010) r2 = perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x2367, 0x7fff, 0x1, 0x6, 0x0, 0x78b1, 0x1, 0x0, 0x4992c766, 0xff, 0x81, 0x100, 0x40, 0x3, 0x9, 0x8, 0x1, 0x10000, 0x0, 0x6, 0x90e, 0x9, 0x7ff, 0x0, 0x8, 0x1, 0x30, 0x20, 0x7fffffff, 0x6, 0x401, 0x2, 0x1000, 0x8001, 0x1ff, 0xfffffffffffffff8, 0x0, 0x2, 0x0, @perf_config_ext={0x5, 0x8}, 0x1ab23, 0x0, 0x8, 0x5, 0x6, 0x0, 0x6}, 0xffffffffffffffff, 0x10, r0, 0x1) bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0xb, 0x9, &(0x7f0000000580)=@framed={{0x18}, [@map={0x18, 0x0, 0x1, 0x0, r0}, @generic={0x3ff, 0xfffffffffffffffc, 0x1}, @call={0x85, 0x0, 0x0, 0x6}], {0x95}}, &(0x7f0000000600)='syzkaller\x00', 0x0, 0x30, &(0x7f0000000640)=""/48, 0x41f00, 0x1}, 0x48) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000000)={&(0x7f0000000080)='./file0/file0\x00', r0}, 0x10) openat$dir(0xffffffffffffff9c, &(0x7f0000000a00)='./file0\x00', 0x2000, 0x22) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000400)=@ax25={0x3, {"02f47b3723e03d"}}, 0x80, &(0x7f00000017c0), 0x0, &(0x7f0000001840)=ANY=[], 0x0, 0x24004044}, 0x4008001) bpf$MAP_CREATE(0x0, &(0x7f0000000240)={0x5, 0x0, 0x56c96e7a, 0x800002, 0xa, 0xffffffffffffffff, 0x10000}, 0x2c) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000480)='rpc_pipefs\x00', 0x200000, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000002d00)={0xffffffffffffffff, 0xffffffffffffffff}) sendto(r3, &(0x7f00000002c0)="9a751ad591d714b7e3c80e7a0a3eef34cd0345df894a61d69f", 0x19, 0x8000, &(0x7f0000000980)=@ethernet={0x306, @random="37f7d6d17afb"}, 0x80) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f0000000a40)='vmnet0keyring\x00') bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000780)={&(0x7f0000000740)='./file0/file0\x00', r4}, 0x10) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x40082406, &(0x7f0000000700)='proc!@ppp1!ppp0ppp0#)lo\\lolo{\x00') mount(&(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000200)='fuseblk\x00', 0xa11800, &(0x7f0000000240)) mount(&(0x7f0000000280)='./file0/file0\x00', &(0x7f0000000300)='./file0/file0\x00', &(0x7f0000000340)='minix\x00', 0x8000000001000, &(0x7f0000000380)) 2018/03/29 17:34:59 executing program 6: r0 = open(&(0x7f0000000440)='./file0\x00', 0x1ffff, 0x5) ioctl$TIOCLINUX7(0xffffffffffffffff, 0x541c, &(0x7f0000000080)={0x7, 0x5}) setsockopt$inet_tcp_int(r0, 0x6, 0x0, &(0x7f00000003c0), 0xf4) r1 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000180)='/dev/sequencer2\x00', 0x0, 0x0) clock_gettime(0x0, &(0x7f00000001c0)={0x0, 0x0}) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r1, 0x4040534e, &(0x7f0000000340)={0x124, @time={r2, r3+30000000}, 0x1, {0x8}, 0x0, 0x2}) r4 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000040)='/dev/rtc\x00', 0x0, 0x0) r5 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000580)='/dev/sequencer\x00', 0x0, 0x0) ioctl$LOOP_CLR_FD(0xffffffffffffffff, 0x7003) timerfd_gettime(r1, &(0x7f0000000300)) getsockopt$inet_sctp_SCTP_FRAGMENT_INTERLEAVE(0xffffffffffffffff, 0x84, 0x12, &(0x7f0000000140), &(0x7f00000002c0)=0x4) setsockopt$packet_buf(0xffffffffffffffff, 0x107, 0xd, &(0x7f00000004c0)="d9fb4f1bcfd3e0c1355ea2018b25a4fd911d8abc3f3fd71f4749878ac1fbce6e5d188e078b15be141905d7966406e4f3fb021da63028837a8407bcb3e3a676d251bcd09a04964ed9cd0f6cece267dc4bada0403dcef25dace8875f4a6495eb2e6cc4969e7de83153459b4d61669e", 0x6e) perf_event_open(&(0x7f00000000c0)={0x0, 0x70, 0x0, 0x0, 0x7ff, 0xa1, 0x0, 0x1, 0x200, 0x2, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x4, 0xb0, 0x5, 0x0, 0x401, 0xcf, 0x0, 0xffffffffffffffff, 0x100000000, 0x3ff, 0x0, 0x8, 0x2, 0x0, 0x2, 0x5, 0x0, 0x3, 0x0, 0x0, 0x0, 0x20000000, 0x195d678803a3a953, @perf_config_ext, 0x10, 0x3, 0x8, 0x0, 0x72eb, 0x99}, 0x0, 0xd, r4, 0x8) mq_notify(r5, &(0x7f0000000400)={0x0, 0x1f, 0x4}) execve(&(0x7f0000000200)='./file0\x00', &(0x7f0000000680)=[&(0x7f0000000540)='/dev/rtc\x00', &(0x7f0000000600)='\x00', &(0x7f0000000640)='proc\x00'], &(0x7f0000000740)=[&(0x7f00000006c0)='\'\x00', &(0x7f0000000700)='trustedwlan0vmnet0@%\x00']) 2018/03/29 17:34:59 executing program 3: getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffff9c, 0x0, 0x10, &(0x7f0000000140)={{{@in6=@mcast2, @in=@local, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@loopback}, 0x0, @in6=@local}}, &(0x7f0000000240)=0xe8) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000280)={0x0, 0x0, 0x0}, &(0x7f00000002c0)=0xc) syz_fuse_mount(&(0x7f00000000c0)='./file0/file0\x00', 0x5001, r0, r1, 0xff, 0x1) r2 = socket(0xa, 0x2, 0x0) r3 = open(&(0x7f00004b8ff8)='./file0\x00', 0x28042, 0x0) connect$inet6(r2, &(0x7f0000d3cfe4)={0xa, 0x0, 0x0, @mcast2={0xff, 0x2, [], 0x1}, 0x3}, 0x12) ioctl$DRM_IOCTL_ADD_CTX(r3, 0xc0086420, &(0x7f0000000000)) ioctl$DRM_IOCTL_NEW_CTX(r3, 0x40086425, &(0x7f0000000080)={0x0, 0x3}) fallocate(r3, 0x0, 0xffff, 0x1f) setsockopt$inet6_mtu(0xffffffffffffffff, 0x29, 0x17, &(0x7f0000000100)=0x2, 0x4) connect$inet(r2, &(0x7f0000000040)={0x2, 0x4e22, @multicast1=0xe0000001}, 0x10) getsockopt$ARPT_SO_GET_REVISION_TARGET(r2, 0x0, 0x63, &(0x7f0000000300)={'TPROXY\x00'}, &(0x7f0000000340)=0x1e) sendfile(r2, r3, &(0x7f00005faff8), 0xfffb) 2018/03/29 17:34:59 executing program 4: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)={0xb, 0x7e, 0x3, 0x1, 0x11}, 0x2c) mount(&(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) r1 = socket$kcm(0x29, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000000bc0)={&(0x7f00000007c0)=@rc={0x1f, {0x5, 0x50000000, 0xaa2, 0x613, 0x4, 0x1ff}, 0x3f}, 0x80, &(0x7f0000000940)=[{&(0x7f0000000840)="09c9453aa30d8c5fba221fa2413f12c580837b2ae292e3ee8dd00098c404125a1a2e63840f82a2f69c3927af43b828422484aaeeceebcbe76e999bd3930c9b7c2995484407f9166e39c2069a88b63a980b9b5ffc880f4b89dde5adae6c7fb84ed98cbac860214dfb0b28d1b2e2d58aefebdfe515334f2ffa46be22ef7a4b3a276cb70a27c9e9f5de0a20bad24cbe2b89aee9693c2f8f186ea59fcfc4ebec7188cca0418d4583a6f1730f62416d70cd62555eb4f58ea831d1fea9956a2cba0049f23bf0b249f5de2ce0dc303808d70b0ccab3c7f37e949e", 0xd7}], 0x1, &(0x7f0000000980), 0x0, 0x20004805}, 0x4010) r2 = perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x2367, 0x7fff, 0x1, 0x6, 0x0, 0x78b1, 0x1, 0x0, 0x4992c766, 0xff, 0x81, 0x100, 0x40, 0x3, 0x9, 0x8, 0x1, 0x10000, 0x0, 0x6, 0x90e, 0x9, 0x7ff, 0x0, 0x8, 0x1, 0x30, 0x20, 0x7fffffff, 0x6, 0x401, 0x2, 0x1000, 0x8001, 0x1ff, 0xfffffffffffffff8, 0x0, 0x2, 0x0, @perf_config_ext={0x5, 0x8}, 0x1ab23, 0x3f, 0x8, 0x5}, 0xffffffffffffffff, 0x10, r0, 0x1) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0xb, 0x9, &(0x7f0000000580)=@framed={{0x18}, [@map={0x18, 0x0, 0x1, 0x0, r0}, @generic={0x3ff, 0xfffffffffffffffc, 0x1}, @call={0x85, 0x0, 0x0, 0x6}], {0x95}}, &(0x7f0000000600)='syzkaller\x00', 0x0, 0x30, &(0x7f0000000640)=""/48, 0x41f00, 0x1}, 0x48) ioctl$PERF_EVENT_IOC_SET_BPF(r2, 0x40042408, r3) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000000)={&(0x7f0000000080)='./file0/file0\x00', r0}, 0x10) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000400)=@ax25={0x3, {"02f47b3723e03d"}}, 0x80, &(0x7f00000017c0), 0x0, &(0x7f0000001840)=ANY=[], 0x0, 0x24004044}, 0x4008001) bpf$MAP_CREATE(0x0, &(0x7f0000002cc0)={0x5, 0x100, 0x56c96e7a, 0x2, 0xa, 0xffffffffffffffff, 0x9}, 0x2c) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000480)='rpc_pipefs\x00', 0x200000, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000002d00)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f00000004c0)='vmnet0keyring\x00') bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000780)={&(0x7f0000000740)='./file0/file0\x00', r4}, 0x10) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x40082406, &(0x7f0000000700)='proc!@ppp1!ppp0ppp0#)lo\\lolo{\x00') mount(&(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000200)='fuseblk\x00', 0xa11800, &(0x7f0000000240)) r5 = syz_open_dev$sg(&(0x7f0000000240)='/dev/sg#\x00', 0xfffffffffffffffa, 0x800) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000280)={r5, r3, 0x5, 0x1}, 0x10) ioctl$TIOCCONS(r5, 0x541d) mount(&(0x7f00000002c0)='./file0/file0\x00', &(0x7f0000000300)='./file0/file0\x00', &(0x7f0000000340)='minix\x00', 0x1000, &(0x7f0000000380)) 2018/03/29 17:34:59 executing program 6: r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff7fffffffffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = getpgrp(0xffffffffffffffff) r2 = syz_open_procfs(r1, &(0x7f00000000c0)='stat\x00') ioctl$sock_inet_SIOCSIFBRDADDR(r2, 0x891a, &(0x7f00000008c0)={'ip6tnl0\x00', {0x2, 0x4e23, @multicast1=0xe0000001}}) sendfile(r2, r2, &(0x7f0000000040)=0xffffffff77fffffe, 0x5) getresuid(&(0x7f0000000480), &(0x7f00000004c0), &(0x7f0000000500)) stat(&(0x7f0000000540)='./file0\x00', &(0x7f0000000580)) geteuid() stat(&(0x7f0000000600)='./file0\x00', &(0x7f0000000640)) stat(&(0x7f00000006c0)='./file0\x00', &(0x7f0000000700)) getegid() stat(&(0x7f0000000780)='./file0\x00', &(0x7f00000007c0)) getgid() getuid() fstat(r2, &(0x7f0000000840)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) sendmsg$unix(0xffffffffffffffff, &(0x7f00000009c0)={&(0x7f0000000100)=@abs={0x1, 0x0, 0x4e23}, 0x6e, &(0x7f0000000440)=[{&(0x7f0000000180)="f5dc941f4dc3cd9adc57ae91e3dd4343d2d34a84526e7cc2dced527b17e9f844324330a6c4fc95075fc39479fc730a76e14b1c7e042182b78b54fd1112d5d88e0463edf0b527bc60eef252342942a7d15f5dbf3a13deeaef54e8a875bd6393929f9f520c496c5643e469d505dd150b595920", 0x72}], 0x1, &(0x7f0000000ac0)=ANY=[@ANYBLOB="1800000001000000020000", @ANYBLOB="180000000100000002", @ANYBLOB="1800000001000200000000003b807f0af037927569073608982ff4048a7ecfa7a1c67509e2d123a2b26f36835b10059f7a10eb109d87fc6064da955f7e7f205180a40f55cbeb36713ac27eb87fbecffcbff26a930baf2e9c2ef6884dac58f0a50bb630", @ANYRES32=r3, @ANYBLOB="300000000100000001000000", @ANYRES32=r2, @ANYRES32=r2, @ANYRES32=r2, @ANYRES32=r0, @ANYRES32=r0, @ANYRES32=r2, @ANYRES32=r0], 0xa3}, 0x24008000) getresgid(&(0x7f0000000a00), &(0x7f0000000a40), &(0x7f0000000a80)) 2018/03/29 17:34:59 executing program 7: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)={0xb, 0x7e, 0x3, 0x1, 0x11}, 0x2c) mount(&(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) r1 = socket$kcm(0x29, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000000bc0)={&(0x7f00000007c0)=@rc={0x1f, {0x5, 0x50000000, 0xaa2, 0x613, 0x4, 0x1ff}, 0x3f}, 0x80, &(0x7f0000000940)=[{&(0x7f0000000840)="09c9453aa30d8c5fba221fa2413f12c580837b2ae292e3ee8dd00098c404125a1a2e63840f82a2f69c3927af43b828422484aaeeceebcbe76e999bd3930c9b7c2995484407f9166e39c2069a88b63a980b9b5ffc880f4b89dde5adae6c7fb84ed98cbac860214dfb0b28d1b2e2d58aefebdfe515334f2ffa46be22ef7a4b3a276cb70a27c9e9f5de0a20bad24cbe2b89aee9693c2f8f186ea59fcfc4ebec7188cca0418d4583a6f1730f62416d70cd62555eb4f58ea831d1fea9956a2cba0049f23bf0b249f5de2ce0dc303808d70b0ccab3c7f37e949e", 0xd7}], 0x1, &(0x7f0000000980), 0x0, 0x20004805}, 0x4010) r2 = perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x2367, 0x7fff, 0x1, 0x6, 0x0, 0x78b1, 0x1, 0x0, 0x4992c766, 0xff, 0x81, 0x100, 0x40, 0x3, 0x9, 0x8, 0x1, 0x10000, 0x0, 0x6, 0x90e, 0x9, 0x7ff, 0x0, 0x8, 0x1, 0x30, 0x20, 0x7fffffff, 0x6, 0x401, 0x2, 0x1000, 0x8001, 0x1ff, 0xfffffffffffffff8, 0x0, 0x2, 0x0, @perf_config_ext={0x5, 0x8}, 0x1ab23, 0x3f, 0x8, 0x5, 0x6, 0x0, 0x6}, 0xffffffffffffffff, 0x10, r0, 0x1) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0xb, 0x9, &(0x7f0000000580)=ANY=[@ANYBLOB="1800000000000000000000000000000018100000", @ANYRES32=r0, @ANYBLOB="0000000000000000fffc0100000000000000000000000000850000000600000000a98ec4b7d5b53ac500000000000000"], &(0x7f0000000600)='syzkaller\x00', 0x0, 0x30, &(0x7f0000000640)=""/48, 0x41f00, 0x1}, 0x48) ioctl$PERF_EVENT_IOC_SET_BPF(r2, 0x40042408, r3) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000000)={&(0x7f0000000080)='./file0/file0\x00', r0}, 0x10) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000400)=@ax25={0x3, {"02f47b3723e03d"}}, 0x80, &(0x7f00000017c0), 0x0, &(0x7f0000001840)=ANY=[], 0x0, 0x24004044}, 0x4008001) bpf$MAP_CREATE(0x0, &(0x7f0000002cc0)={0x5, 0x0, 0x56c96e7a, 0x2, 0xa, 0xffffffffffffffff, 0x9}, 0x2c) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000480)='rpc_pipefs\x00', 0x200000, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000002d00)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f00000004c0)='vmnet0keyring\x00') bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000780)={&(0x7f0000000740)='./file0/file0\x00', r4}, 0x10) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x40082406, &(0x7f0000000700)='proc!@ppp1!ppp0ppp0#)lo\\lolo{\x00') mount(&(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000200)='fuseblk\x00', 0xa11800, &(0x7f0000000240)) mount(&(0x7f00000002c0)='./file0/file0\x00', &(0x7f0000000300)='./file0/file0\x00', &(0x7f0000000340)='minix\x00', 0x1000, &(0x7f0000000380)) 2018/03/29 17:34:59 executing program 3: r0 = socket(0xa, 0x2, 0x0) r1 = open(&(0x7f00004b8ff8)='./file0\x00', 0x28042, 0x0) connect$inet6(r0, &(0x7f0000d3cfe4)={0xa, 0x0, 0x0, @mcast2={0xff, 0x2, [], 0x1}, 0x3}, 0x1c) ioctl$DRM_IOCTL_ADD_CTX(r1, 0xc0086420, &(0x7f0000000140)) ioctl$DRM_IOCTL_NEW_CTX(r1, 0x40086425, &(0x7f0000000080)={0x0, 0x3}) fallocate(r1, 0x0, 0xffff, 0x1f) ioctl$DRM_IOCTL_IRQ_BUSID(r1, 0xc0106403, &(0x7f0000000000)={0x5, 0x8001, 0x7fff, 0x1ff}) setsockopt$inet6_mtu(0xffffffffffffffff, 0x29, 0x17, &(0x7f0000000100)=0x2, 0x4) connect$inet(r0, &(0x7f0000000040)={0x2, 0x4e22, @multicast1=0xe0000001}, 0x10) sendfile(r0, r1, &(0x7f00005faff8), 0xfffb) 2018/03/29 17:34:59 executing program 1: r0 = open(&(0x7f0000000440)='./file0\x00', 0x1ffff, 0x5) ioctl$TIOCLINUX7(0xffffffffffffffff, 0x541c, &(0x7f0000000080)={0x7, 0x5}) setsockopt$inet_tcp_int(r0, 0x6, 0x0, &(0x7f00000003c0)=0x6, 0xf4) perf_event_open(&(0x7f0000000240)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000180)='/dev/sequencer2\x00', 0x12100, 0x0) clock_gettime(0x0, &(0x7f00000001c0)={0x0, 0x0}) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(0xffffffffffffffff, 0x4040534e, &(0x7f0000000340)={0x124, @time={r2, r3+30000000}, 0x1, {0x8, 0x606}, 0x101, 0x2}) r4 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000040)='/dev/rtc\x00', 0x0, 0x0) r5 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000580)='/dev/sequencer\x00', 0x0, 0x0) ioctl$LOOP_CLR_FD(r4, 0x7003) timerfd_gettime(r1, &(0x7f0000000300)) getsockopt$inet_sctp_SCTP_FRAGMENT_INTERLEAVE(0xffffffffffffffff, 0x84, 0x12, &(0x7f0000000140), &(0x7f00000002c0)=0x4) perf_event_open(&(0x7f00000000c0)={0x0, 0x70, 0x0, 0x0, 0x7ff, 0xa1, 0x0, 0x1, 0x200, 0x2, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x4, 0x0, 0x5, 0x0, 0x401, 0x0, 0x0, 0xffffffffffffffff, 0x100000000, 0x3ff, 0x0, 0x8, 0x2, 0x1f, 0x0, 0x5, 0x9, 0x3, 0x0, 0x4, 0x0, 0x0, 0x195d678803a3a953, @perf_config_ext, 0x10, 0x3, 0x8, 0x0, 0x0, 0x99, 0x1}, 0x0, 0xd, r4, 0x8) mq_notify(r5, &(0x7f0000000400)={0x0, 0x1f, 0x4}) execve(&(0x7f0000000200)='./file0\x00', &(0x7f0000000680)=[&(0x7f0000000540)='/dev/rtc\x00', &(0x7f0000000600)='\x00', &(0x7f0000000640)='proc\x00'], &(0x7f0000000740)=[&(0x7f00000006c0)='\'\x00', &(0x7f0000000700)='trustedwlan0vmnet0@%\x00']) 2018/03/29 17:34:59 executing program 0: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) symlink(&(0x7f0000000280)='./file0/file0\x00', &(0x7f0000000580)='./file0\x00') r0 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)={0xb, 0x7e, 0x3, 0x1, 0x11}, 0x2c) mount(&(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) r1 = socket$kcm(0x29, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000000bc0)={&(0x7f00000007c0)=@rc={0x1f, {0x5, 0x50000000, 0xaa2, 0x613, 0x4, 0x1ff}}, 0x80, &(0x7f0000000940)=[{&(0x7f0000000840)="09c9453aa30d8c5fba221fa2413f12c580837b2ae292e3ee8dd00098c404125a1a2e63840f82a2f69c3927af43b828422484aaeeceebcbe76e999bd3930c9b7c2995484407f9166e39c2069a88b63a980b9b5ffc880f4b89dde5adae6c7fb84ed98cbac860214dfb0b28d1b2e2d58aefebdfe515334f2ffa46be22ef7a4b3a276cb70a27c9e9f5de0a20bad24cbe2b89aee9693c2f8f186ea59fcfc4ebec7188cca0418d4583a6f1730f62416d70cd62555eb4f58ea831d1fea9956a2cba0049f23bf0b249f5de2ce0dc303808d70b0ccab3c7f37e949e", 0xd7}], 0x1, &(0x7f0000000980)}, 0x4010) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0xb, 0x9, &(0x7f0000000500)=ANY=[@ANYBLOB="18000000dee4e529ab00000000000000000000000018100000", @ANYRES32=r0, @ANYBLOB="000000bce60000000000edfc01800000000000ec00000000000085000000060000000000000000ac30f622b575dab9000000"], &(0x7f0000000600)='syzkaller\x00', 0x0, 0x30, &(0x7f0000000640)=""/48, 0x41f00, 0x1}, 0x48) ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, r2) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000000)={&(0x7f0000000080)='./file0/file0\x00', r0}, 0x10) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000400)=@ax25={0x3, {"02f47b3723e03d"}}, 0x80, &(0x7f00000017c0), 0x0, &(0x7f0000001840)=ANY=[], 0x0, 0x24004044}, 0x4008001) bpf$MAP_CREATE(0x0, &(0x7f0000002cc0)={0x5, 0x100, 0x56c96e7a, 0x2, 0xa, 0xffffffffffffffff, 0x9}, 0x2c) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000480)='rpc_pipefs\x00', 0x200000, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000002d00)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f00000004c0)='vmnet0keyring\x00') bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000780)={&(0x7f0000000740)='./file0/file0\x00', r3}, 0x10) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, &(0x7f0000000700)='proc!@ppp1!ppp0ppp0#)lo\\lolo{\x00') mount(&(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000200)='fuseblk\x00', 0xa11800, &(0x7f0000000240)) setsockopt$inet_sctp6_SCTP_HMAC_IDENT(r2, 0x84, 0x16, &(0x7f0000000240)={0x1, [0x100000000]}, 0x6) mount(&(0x7f00000002c0)='./file0/file0\x00', &(0x7f0000000300)='./file0/file0\x00', &(0x7f0000000340)='minix\x00', 0x0, &(0x7f0000000380)) r4 = fcntl$dupfd(r3, 0x406, r0) ioctl$KVM_REGISTER_COALESCED_MMIO(r4, 0x4010ae67, &(0x7f00000005c0)={0x0, 0x8000}) r5 = request_key(&(0x7f0000000980)='cifs.idmap\x00', &(0x7f00000009c0)={0x73, 0x79, 0x7a, 0x2}, &(0x7f0000000a00)='proc!@ppp1!ppp0ppp0#)lo\\lolo{\x00', 0x0) r6 = request_key(&(0x7f0000000a40)='rxrpc_s\x00', &(0x7f0000000a80)={0x73, 0x79, 0x7a, 0x2}, &(0x7f0000000ac0)='{&\x00', 0xffffffffffffffff) keyctl$negate(0xd, r5, 0x4, r6) 2018/03/29 17:34:59 executing program 2: r0 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000240)='/dev/vga_arbiter\x00', 0x80000, 0x0) ioctl$PIO_FONTX(r0, 0x4b6c, &(0x7f0000000980)="184c9c052fb927981b34a4ce593b5422958c776c160fb0fe64ace2472ad76aa157356c8d1dbd0019ef6c1a2a6b2b5f34cdac2874ebedd09aaf8819f507ee61a697553a3996048c5cc61da52649847b") mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)={0xb, 0x7e, 0x3, 0x1, 0x11}, 0x2c) mount(&(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) r2 = socket$kcm(0x29, 0x2, 0x0) sendmsg$kcm(r2, &(0x7f0000000bc0)={&(0x7f00000007c0)=@rc={0x1f, {0x5, 0x50000000, 0xaa2, 0x613, 0x4, 0x1ff}, 0x3f}, 0x80, &(0x7f0000000940)=[{&(0x7f0000000840)="09c9453aa30d8c5fba221fa2413f12c580837b2ae292e3ee8dd00098c404125a1a2e63840f82a2f69c3927af43b828422484aaeeceebcbe76e999bd3930c9b7c2995484407f9166e39c2069a88b63a980b9b5ffc880f4b89dde5adae6c7fb84ed98cbac860214dfb0b28d1b2e2d58aefebdfe515334f2ffa46be22ef7a4b3a276cb70a27c9e9f5de0a20bad24cbe2b89aee9693c2f8f186ea59fcfc4ebec7188cca0418d4583a6f1730f62416d70cd62555eb4f58ea831d1fea9956a2cba0049f23bf0b249f5de2ce0dc303808d70b0ccab3c7f37e949e", 0xd7}], 0x1, &(0x7f0000000980), 0x0, 0x20004805}, 0x4010) r3 = perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x2367, 0x7fff, 0x1, 0x6, 0x0, 0x78b1, 0x1, 0x0, 0x4992c766, 0xff, 0x81, 0x100, 0x40, 0x3, 0x9, 0x8, 0x1, 0x10000, 0x0, 0x6, 0x90e, 0x9, 0x7ff, 0x0, 0x8, 0x1, 0x30, 0x20, 0x7fffffff, 0x6, 0x401, 0x2, 0x1000, 0x8001, 0x1ff, 0xfffffffffffffff8, 0x0, 0x2, 0x0, @perf_config_ext={0x5, 0x8}, 0x1ab23, 0x0, 0x8, 0x5, 0x6, 0x0, 0x6}, 0xffffffffffffffff, 0x10, r1, 0x1) bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0xb, 0x9, &(0x7f0000000580)=@framed={{0x18}, [@map={0x18, 0x0, 0x1, 0x0, r1}, @generic={0x3ff, 0xfffffffffffffffc, 0x1}, @call={0x85, 0x0, 0x0, 0x6}], {0x95}}, &(0x7f0000000600)='syzkaller\x00', 0x0, 0x30, &(0x7f0000000640)=""/48, 0x41f00, 0x1}, 0x48) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000000)={&(0x7f0000000080)='./file0/file0\x00', r1}, 0x10) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000400)=@ax25={0x3, {"02f47b3723e03d"}}, 0x80, &(0x7f00000017c0), 0x0, &(0x7f0000001840)=ANY=[], 0x0, 0x24004044}, 0x4008001) bpf$MAP_CREATE(0x0, &(0x7f0000002cc0)={0x5, 0x0, 0x56c96e7a, 0x2, 0xa, 0xffffffffffffffff, 0x9}, 0x2c) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000480)='rpc_pipefs\x00', 0x200000, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000002d00)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x40082406, &(0x7f00000004c0)='vmnet0keyring\x00') bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000780)={&(0x7f0000000740)='./file0/file0\x00', r4}, 0x10) ioctl$PERF_EVENT_IOC_SET_FILTER(r3, 0x40082406, &(0x7f0000000700)='proc!@ppp1!ppp0ppp0#)lo\\lolo{\x00') mount(&(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000200)='fuseblk\x00', 0xa11800, &(0x7f0000000240)) mount(&(0x7f00000002c0)='./file0/file0\x00', &(0x7f0000000300)='./file0/file0\x00', &(0x7f0000000340)='minix\x00', 0x1000, &(0x7f0000000380)) 2018/03/29 17:34:59 executing program 4: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)={0xb, 0x7e, 0x3, 0x1, 0x11}, 0x2c) mount(&(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) r1 = socket$kcm(0x29, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000000bc0)={&(0x7f00000007c0)=@rc={0x1f, {0x5, 0x50000000, 0xaa2, 0x613, 0x4, 0x1ff}, 0x3f}, 0x80, &(0x7f0000000940)=[{&(0x7f0000000840)="09c9453aa30d8c5fba221fa2413f12c580837b2ae292e3ee8dd00098c404125a1a2e63840f82a2f69c3927af43b828422484aaeeceebcbe76e999bd3930c9b7c2995484407f9166e39c2069a88b63a980b9b5ffc880f4b89dde5adae6c7fb84ed98cbac860214dfb0b28d1b2e2d58aefebdfe515334f2ffa46be22ef7a4b3a276cb70a27c9e9f5de0a20bad24cbe2b89aee9693c2f8f186ea59fcfc4ebec7188cca0418d4583a6f1730f62416d70cd62555eb4f58ea831d1fea9956a2cba0049f23bf0b249f5de2ce0dc303808d70b0ccab3c7f37e949e", 0xd7}], 0x1, &(0x7f0000000980), 0x0, 0x20004805}, 0x4010) r2 = perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x2367, 0x7fff, 0x1, 0x6, 0x0, 0x78b1, 0x1, 0x0, 0x4992c766, 0xff, 0x81, 0x100, 0x40, 0x3, 0x9, 0x8, 0x1, 0x10000, 0x0, 0x6, 0x90e, 0x9, 0x7ff, 0x0, 0x8, 0x1, 0x30, 0x20, 0x7fffffff, 0x6, 0x401, 0x2, 0x1000, 0x8001, 0x1ff, 0xfffffffffffffff8, 0x0, 0x2, 0x0, @perf_config_ext={0x5, 0x8}, 0x1ab23, 0x3f, 0x8, 0x5}, 0xffffffffffffffff, 0x10, r0, 0x1) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0xb, 0x9, &(0x7f0000000580)=@framed={{0x18}, [@map={0x18, 0x0, 0x1, 0x0, r0}, @generic={0x3ff, 0xfffffffffffffffc, 0x1}, @call={0x85, 0x0, 0x0, 0x6}], {0x95}}, &(0x7f0000000600)='syzkaller\x00', 0x0, 0x30, &(0x7f0000000640)=""/48, 0x41f00, 0x1}, 0x48) ioctl$PERF_EVENT_IOC_SET_BPF(r2, 0x40042408, r3) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000000)={&(0x7f0000000080)='./file0/file0\x00', r0}, 0x10) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000400)=@ax25={0x3, {"02f47b3723e03d"}}, 0x80, &(0x7f00000017c0), 0x0, &(0x7f0000001840)=ANY=[], 0x0, 0x24004044}, 0x4008001) bpf$MAP_CREATE(0x0, &(0x7f0000002cc0)={0x5, 0x100, 0x56c96e7a, 0x2, 0xa, 0xffffffffffffffff, 0x9}, 0x2c) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000480)='rpc_pipefs\x00', 0x200000, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000002d00)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f00000004c0)='vmnet0keyring\x00') bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000780)={&(0x7f0000000740)='./file0/file0\x00', r4}, 0x10) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x40082406, &(0x7f0000000700)='proc!@ppp1!ppp0ppp0#)lo\\lolo{\x00') mount(&(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000200)='fuseblk\x00', 0xa11800, &(0x7f0000000240)) r5 = syz_open_dev$sg(&(0x7f0000000240)='/dev/sg#\x00', 0xfffffffffffffffa, 0x800) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000280)={r5, r3, 0x5, 0x1}, 0x10) ioctl$TIOCCONS(r5, 0x541d) mount(&(0x7f00000002c0)='./file0/file0\x00', &(0x7f0000000300)='./file0/file0\x00', &(0x7f0000000340)='minix\x00', 0x1000, &(0x7f0000000380)) 2018/03/29 17:34:59 executing program 5: r0 = socket(0xa, 0x2, 0x0) flock(0xffffffffffffffff, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000200)) sendto$inet(r0, &(0x7f0000509f92), 0xff77, 0x8000, &(0x7f000055fff0)={0x2, 0x4e23, @loopback=0x7f000001}, 0x10) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000b00)='./cgroup.cpu\x00', 0x200002, 0x0) setsockopt$inet_mreq(r0, 0x0, 0x27, &(0x7f0000000480)={@empty, @remote={0xac, 0x14, 0x14, 0xbb}}, 0x8) fchdir(r1) bind$inet(0xffffffffffffffff, &(0x7f0000000440)={0x2, 0x0, @multicast1=0xe0000001}, 0x10) r2 = creat(&(0x7f0000000100)='./file1\x00', 0x0) fallocate(r2, 0x1, 0x0, 0x20004d2d) ioctl$DRM_IOCTL_SET_VERSION(0xffffffffffffffff, 0xc0106407, &(0x7f00000000c0)={0x0, 0x2}) socket$inet6_icmp(0xa, 0x2, 0x3a) sendmsg$inet_sctp(r0, &(0x7f000050dfc8)={&(0x7f0000000840)=@in6={0xa, 0x4e24, 0x80000001, @mcast1={0xff, 0x1, [], 0x1}}, 0x1c, &(0x7f00000005c0), 0x0, &(0x7f0000576000)}, 0x0) ioctl$EVIOCGPROP(0xffffffffffffffff, 0x80404509, &(0x7f00000003c0)=""/25) getsockopt$inet_sctp6_SCTP_GET_LOCAL_ADDRS(r1, 0x84, 0x6d, &(0x7f00000002c0)={0x0, 0x7e, "147b31a6c8d04526e5f78a8fe27845051f555f699446cd55da4ba6fc8873a807fa51bb4eab22c5df774cd217b3b2c0af891a34aae4b6aa2b7e16f7b4fd5dcc91ee95c14977580183e86a5e903258265c96396582cadd0075864a1d1b58c4036a1ea7b763df062b4b66c882ba9442bac3b9b6d420938dca4b48c863fb4acd"}, &(0x7f0000000240)=0x86) setsockopt$inet_sctp_SCTP_DEFAULT_PRINFO(r0, 0x84, 0x72, &(0x7f0000000380)={r3, 0x10000, 0x30}, 0xc) sendto$inet6(r0, &(0x7f0000000240), 0x0, 0x0, &(0x7f0000000280)={0xa, 0x4e23, 0x3, @local={0xfe, 0x80, [], 0xaa}, 0x9}, 0x1c) getpeername$packet(0xffffffffffffffff, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @broadcast}, &(0x7f0000000a00)=0x14) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000000)={{{@in=@multicast2, @in6=@dev}}, {{@in=@multicast1}, 0x0, @in6=@ipv4={[], [], @remote}}}, &(0x7f0000000140)=0xe8) 2018/03/29 17:34:59 executing program 6: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000ed4000)=0x78, 0x4) bind$inet(r0, &(0x7f0000deb000)={0x2, 0x4e23, @multicast1=0xe0000001}, 0x10) ioctl$sock_SIOCINQ(r0, 0x541b, &(0x7f0000000500)) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000f40ff8)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) getsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(0xffffffffffffff9c, 0x84, 0x1f, &(0x7f0000000240)={0x0, @in={{0x2, 0x4e23}}, 0x0, 0x3}, &(0x7f0000000000)=0x90) setsockopt$inet_sctp_SCTP_RTOINFO(r0, 0x84, 0x0, &(0x7f0000000040)={r1, 0x81, 0x7, 0x100000000}, 0x10) getsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(r0, 0x84, 0x18, &(0x7f00000003c0)={0x0, 0x7}, &(0x7f0000000400)=0x8) socketpair(0x11, 0x800, 0x5, &(0x7f0000000200)={0xffffffffffffffff}) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_INFO(r2, 0xc08c5334, &(0x7f0000000600)={0x6, 0x7, 0x2f29fdaf, 'queue0\x00', 0x800}) r3 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000080)='/dev/hwrng\x00', 0x4000, 0x0) sendto$inet(r0, &(0x7f0000a88f88), 0x29f, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @loopback=0x7f000001}, 0x10) pipe2(&(0x7f0000000580)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80002) ioctl$EVIOCGBITKEY(0xffffffffffffffff, 0x80404521, &(0x7f00000000c0)=""/160) sendmmsg(r0, &(0x7f00000025c0)=[{{&(0x7f0000000300)=@pppoe={0x18, 0x0, {0x0, @link_local={0x1, 0x80, 0xc2}, 'ip6tnl0\x00'}}, 0x80, &(0x7f0000000380)=[{&(0x7f00000010c0)="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", 0x664}], 0x1}}], 0x1, 0x4000) recvfrom$inet(r0, &(0x7f00009be000)=""/11, 0xe8, 0x0, 0x0, 0xffffffffffffff4e) bind$bt_l2cap(r4, &(0x7f0000000440)={0x1f, 0x8, {0x6, 0x400, 0x0, 0x2, 0x9, 0x3}, 0x10001, 0x2}, 0xe) setsockopt(r5, 0xb5, 0xffffffff, &(0x7f00000006c0)="0ac385d7ac2ae574baf1b3104b37fd7f20ebca1da5063c612b05a3d56c8b2e413e64bfc3e0bb415e656477eea9c01ad808e74aea23e7e4a07d09f22e69e1ae37fecf707d249ba82f1fc8f4a53558952762a62d5712f7ad3f1e2d51e5e3cf31154625d23de117cbb19fe0379b78ae656d20a1840850e0d1b6f6d94f8c810560030e0ac978d48567edbbb1f79c22a73e5a978f82d9", 0x94) getsockopt$inet_sctp_SCTP_RECVRCVINFO(r0, 0x84, 0x20, &(0x7f0000000180), &(0x7f00000001c0)=0x4) sendmsg$netrom(r3, &(0x7f0000000b00)={&(0x7f0000000780)=@full={{0x3, {"53665db4283e1b"}, 0x3}, [{"d40335b6bcd5d9"}, {"d5952336c520fb"}, {"d326c92416d6ea"}, {"763aea9242214f"}, {"d716c11982a583"}, {"712de86f857435"}, {"1d8bd63f2c431c"}, {"6f5a0b1522aca6"}]}, 0x48, &(0x7f0000000ac0), 0x0, &(0x7f00000017c0)=[{0x10, 0x117, 0x9}], 0x10, 0x8000}, 0x4000840) r6 = getpid() epoll_ctl$EPOLL_CTL_ADD(r3, 0x1, r3, &(0x7f00000004c0)={0x5}) syz_open_procfs(r6, &(0x7f00000005c0)='maps\x00') shutdown(r0, 0x1) 2018/03/29 17:34:59 executing program 3: r0 = socket(0xa, 0x2, 0x0) r1 = open(&(0x7f00004b8ff8)='./file0\x00', 0x28042, 0x0) connect$inet6(r0, &(0x7f0000d3cfe4)={0xa, 0x0, 0x0, @mcast2={0xff, 0x2, [], 0x1}, 0x3}, 0x1c) ioctl$DRM_IOCTL_ADD_CTX(r1, 0xc0086420, &(0x7f0000000000)) ioctl$DRM_IOCTL_NEW_CTX(r1, 0x40086425, &(0x7f0000000080)={0x0, 0x3}) fallocate(r1, 0x0, 0xffff, 0x1f) setsockopt$inet6_mtu(0xffffffffffffffff, 0x29, 0x17, &(0x7f0000000180)=0x2, 0xfffffffffffffef6) connect$inet(r0, &(0x7f0000000040)={0x2, 0x4e22, @multicast1=0xe0000001}, 0x10) sendfile(r0, r1, &(0x7f00005faff8), 0xfffb) 2018/03/29 17:34:59 executing program 7: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)={0xb, 0x7e, 0x3, 0x1, 0x11}, 0x2c) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000580)='cpuacct.usage_sys\x00', 0x0, 0x0) ioctl$EVIOCSABS20(r1, 0x401845e0, &(0x7f00000005c0)={0x6, 0x100000000, 0x9, 0x101, 0x83, 0x7}) mount(&(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) r2 = socket$kcm(0x29, 0x2, 0x0) sendmsg$kcm(r2, &(0x7f0000000bc0)={&(0x7f00000007c0)=@rc={0x1f, {0x5, 0x50000000, 0xaa2, 0x613, 0x4, 0x1ff}, 0x3f}, 0x80, &(0x7f0000000940)=[{&(0x7f0000000840)="09c9453aa30d8c5fba221fa2413f12c580837b2ae292e3ee8dd00098c404125a1a2e63840f82a2f69c3927af43b828422484aaeeceebcbe76e999bd3930c9b7c2995484407f9166e39c2069a88b63a980b9b5ffc880f4b89dde5adae6c7fb84ed98cbac860214dfb0b28d1b2e2d58aefebdfe515334f2ffa46be22ef7a4b3a276cb70a27c9e9f5de0a20bad24cbe2b89aee9693c2f8f186ea59fcfc4ebec7188cca0418d4583a6f1730f62416d70cd62555eb4f58ea831d1fea9956a2cba0049f23bf0b249f5de2ce0dc303808d70b0ccab3c7f37e949e", 0xd7}], 0x1, &(0x7f0000000980), 0x0, 0x20004805}, 0x4010) r3 = perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x2367, 0x7fff, 0x1, 0x6, 0x0, 0x78b1, 0x1, 0x0, 0x4992c766, 0xff, 0x81, 0x100, 0x40, 0x3, 0x9, 0x8, 0x1, 0x10000, 0x0, 0x6, 0x90e, 0x9, 0x7ff, 0x0, 0x8, 0x1, 0x30, 0x20, 0x7fffffff, 0x6, 0x401, 0x2, 0x1000, 0x8001, 0x1ff, 0xfffffffffffffff8, 0x0, 0x2, 0x0, @perf_config_ext={0x5, 0x8}, 0x1ab23, 0x3f, 0x8, 0x5, 0x6, 0x0, 0x6}, 0xffffffffffffffff, 0x10, r0, 0x1) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0xb, 0x9, &(0x7f0000000240)=@framed={{0x18}, [@map={0x18, 0x0, 0x1, 0x0, r0}, @generic={0x3ff, 0xfffffffffffffffc, 0x1}, @call={0x85, 0x0, 0x0, 0x6}], {0x95}}, &(0x7f0000000600)='syzkaller\x00', 0x0, 0x30, &(0x7f0000000640)=""/48, 0x41f00, 0x1}, 0x48) ioctl$PERF_EVENT_IOC_SET_BPF(r3, 0x40042408, r4) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000000)={&(0x7f0000000080)='./file0/file0\x00', r0}, 0x10) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000400)=@ax25={0x3, {"02f47b3723e03d"}}, 0x80, &(0x7f00000017c0), 0x0, &(0x7f0000001840)=ANY=[], 0x0, 0x24004044}, 0x4008001) bpf$MAP_CREATE(0x0, &(0x7f0000002cc0)={0x5, 0x0, 0x56c96e7a, 0x2, 0xa, 0xffffffffffffffff, 0x9}, 0x2c) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000480)='rpc_pipefs\x00', 0x200000, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000002d00)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f00000004c0)='vmnet0keyring\x00') bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000780)={&(0x7f0000000740)='./file0/file0\x00', r5}, 0x10) ioctl$PERF_EVENT_IOC_SET_FILTER(r3, 0x40082406, &(0x7f0000000700)='proc!@ppp1!ppp0ppp0#)lo\\lolo{\x00') mount(&(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000200)='fuseblk\x00', 0xa11800, &(0x7f0000000240)) mount(&(0x7f00000002c0)='./file0/file0\x00', &(0x7f0000000300)='./file0/file0\x00', &(0x7f0000000340)='minix\x00', 0x1000, &(0x7f0000000380)) 2018/03/29 17:34:59 executing program 1: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000ed4000)=0x78, 0x4) bind$inet(r0, &(0x7f0000deb000)={0x2, 0x4e23, @multicast1=0xe0000001}, 0x10) ioctl$sock_SIOCINQ(r0, 0x541b, &(0x7f0000000500)) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000f40ff8)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) getsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(0xffffffffffffff9c, 0x84, 0x1f, &(0x7f0000000240)={0x0, @in={{0x2, 0x4e23}}, 0x0, 0x3}, &(0x7f0000000000)=0x90) setsockopt$inet_sctp_SCTP_RTOINFO(0xffffffffffffffff, 0x84, 0x0, &(0x7f0000000040)={r1, 0x81, 0x7, 0x100000000}, 0x10) getsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(r0, 0x84, 0x18, &(0x7f00000003c0)={r1, 0x7}, &(0x7f0000000400)=0x8) socketpair(0x11, 0x800, 0x5, &(0x7f0000000200)={0xffffffffffffffff}) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_INFO(r2, 0xc08c5334, &(0x7f0000000600)={0x6, 0x7, 0x2f29fdaf, 'queue0\x00', 0x800}) r3 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000080)='/dev/hwrng\x00', 0x4000, 0x0) sendto$inet(r0, &(0x7f0000a88f88), 0x29f, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @loopback=0x7f000001}, 0x10) pipe2(&(0x7f0000000580)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80002) ioctl$EVIOCGBITKEY(0xffffffffffffffff, 0x80404521, &(0x7f00000000c0)=""/160) sendmmsg(r0, &(0x7f00000025c0)=[{{&(0x7f0000000300)=@pppoe={0x18, 0x0, {0x0, @link_local={0x1, 0x80, 0xc2}, 'ip6tnl0\x00'}}, 0x80, &(0x7f0000000380)=[{&(0x7f00000010c0)="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", 0x6cb}], 0x1}}], 0x1, 0x4000) recvfrom$inet(r0, &(0x7f00009be000)=""/11, 0xe8, 0x0, 0x0, 0xffffffffffffff4e) bind$bt_l2cap(r4, &(0x7f0000000440)={0x1f, 0x8, {0x6, 0x400, 0x0, 0x2, 0x9, 0x3}, 0x10001, 0x2}, 0xe) setsockopt(r5, 0xb5, 0xffffffff, &(0x7f00000006c0)="0ac385d7ac2ae574baf1b3104b37fd7f20ebca1da5063c612b05a3d56c8b2e413e64bfc3e0bb415e656477eea9c01ad808e74aea23e7e4a07d09f22e69e1ae37fecf707d249ba82f1fc8f4", 0x4b) getsockopt$inet_sctp_SCTP_RECVRCVINFO(r0, 0x84, 0x20, &(0x7f0000000180), &(0x7f00000001c0)=0x4) sendmsg$netrom(r3, &(0x7f0000000b00)={&(0x7f0000000780)=@full={{0x3, {"53665db4283e1b"}, 0x3}, [{"d40335b6bcd5d9"}, {"d5952336c520fb"}, {"d326c92416d6ea"}, {"763aea9242214f"}, {"d716c11982a583"}, {"712de86f857435"}, {"1d8bd63f2c431c"}, {"6f5a0b1522aca6"}]}, 0x48, &(0x7f0000000ac0), 0x0, &(0x7f00000017c0), 0x0, 0x8000}, 0x4000840) setsockopt$inet_mtu(r3, 0x0, 0xa, &(0x7f0000000480)=0x7, 0x4) r6 = getpid() epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, r3, &(0x7f00000004c0)={0x5}) syz_open_procfs(r6, &(0x7f00000005c0)='maps\x00') shutdown(r0, 0x1) 2018/03/29 17:35:00 executing program 0: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)={0xb, 0x7e, 0x3, 0x1, 0x11}, 0x2c) mount(&(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) r1 = socket$kcm(0x29, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000000bc0)={&(0x7f00000007c0)=@rc={0x1f, {0x5, 0x50000000, 0xaa2, 0x613, 0x4, 0x1ff}}, 0x80, &(0x7f0000000940)=[{&(0x7f0000000840)="09c9453aa30d8c5fba221fa2413f12c580837b2ae292e3ee8dd00098c404125a1a2e63840f82a2f69c3927af43b828422484aaeeceebcbe76e999bd3930c9b7c2995484407f9166e39c2069a88b63a980b9b5ffc880f4b89dde5adae6c7fb84ed98cbac860214dfb0b28d1b2e2d58aefebdfe515334f2ffa46be22ef7a4b3a276cb70a27c9e9f5de0a20bad24cbe2b89aee9693c2f8f186ea59fcfc4ebec7188cca0418d4583a6f1730f62416d70cd62555eb4f58ea831d1fea9956a2cba0049f23bf0b249f5de2ce0dc303808d70b0ccab3c7f37e949e", 0xd7}], 0x1, &(0x7f0000000980)}, 0x4010) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0xb, 0x9, &(0x7f0000000580)=@framed={{0x18}, [@map={0x18, 0x0, 0x1, 0x0, r0}, @generic={0x3ff, 0xfffffffffffffffc, 0x1}, @call={0x85, 0x0, 0x0, 0x6}], {0x95}}, &(0x7f0000000600)='syzkaller\x00', 0x0, 0x30, &(0x7f0000000640)=""/48, 0x41f00, 0x1}, 0x48) ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, r2) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000000)={&(0x7f0000000080)='./file0/file0\x00', r0}, 0x10) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000400)=@ax25={0x3, {"02f47b3723e03d"}}, 0x80, &(0x7f00000017c0), 0x0, &(0x7f0000001840)=ANY=[], 0x0, 0x24004044}, 0x4008001) bpf$MAP_CREATE(0x0, &(0x7f0000002cc0)={0x5, 0x100, 0x56c96e7a, 0x2, 0xa, 0xffffffffffffffff, 0x9}, 0x2c) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000480)='rpc_pipefs\x00', 0x200000, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000002d00)={0xffffffffffffffff, 0xffffffffffffffff}) unlink(&(0x7f0000000240)='./file0/file0\x00') ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f00000004c0)='vmnet0keyring\x00') bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000780)={&(0x7f0000000740)='./file0/file0\x00', r3}, 0x10) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, &(0x7f0000000700)='proc!@ppp1!ppp0ppp0#)lo\\lolo{\x00') mount(&(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000200)='fuseblk\x00', 0xa11800, &(0x7f0000000240)) mount(&(0x7f00000002c0)='./file0/file0\x00', &(0x7f0000000300)='./file0/file0\x00', &(0x7f0000000340)='minix\x00', 0x0, &(0x7f0000000380)) 2018/03/29 17:35:00 executing program 4: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)={0xb, 0x7e, 0x3, 0x1, 0x11}, 0x2c) mount(&(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) r1 = socket$kcm(0x29, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000000bc0)={&(0x7f00000007c0)=@rc={0x1f, {0x5, 0x50000000, 0xaa2, 0x613, 0x4, 0x1ff}, 0x3f}, 0x80, &(0x7f0000000940)=[{&(0x7f0000000840)="09c9453aa30d8c5fba221fa2413f12c580837b2ae292e3ee8dd00098c404125a1a2e63840f82a2f69c3927af43b828422484aaeeceebcbe76e999bd3930c9b7c2995484407f9166e39c2069a88b63a980b9b5ffc880f4b89dde5adae6c7fb84ed98cbac860214dfb0b28d1b2e2d58aefebdfe515334f2ffa46be22ef7a4b3a276cb70a27c9e9f5de0a20bad24cbe2b89aee9693c2f8f186ea59fcfc4ebec7188cca0418d4583a6f1730f62416d70cd62555eb4f58ea831d1fea9956a2cba0049f23bf0b249f5de2ce0dc303808d70b0ccab3c7f37e949e", 0xd7}], 0x1, &(0x7f0000000980), 0x0, 0x20004805}, 0x4010) r2 = perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x2367, 0x7fff, 0x1, 0x6, 0x0, 0x78b1, 0x1, 0x0, 0x4992c766, 0xff, 0x81, 0x100, 0x40, 0x3, 0x9, 0x8, 0x1, 0x10000, 0x0, 0x6, 0x90e, 0x9, 0x7ff, 0x0, 0x8, 0x1, 0x30, 0x20, 0x7fffffff, 0x6, 0x401, 0x2, 0x1000, 0x8001, 0x1ff, 0xfffffffffffffff8, 0x0, 0x2, 0x0, @perf_config_ext={0x5, 0x8}, 0x1ab23, 0x3f, 0x8, 0x5, 0x6}, 0xffffffffffffffff, 0x0, r0, 0x1) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0xb, 0x9, &(0x7f0000000580)=@framed={{0x18}, [@map={0x18, 0x0, 0x1, 0x0, r0}, @generic={0x3ff, 0xfffffffffffffffc, 0x1}, @call={0x85, 0x0, 0x0, 0x6}], {0x95}}, &(0x7f0000000600)='syzkaller\x00', 0x0, 0x30, &(0x7f0000000640)=""/48, 0x41f00, 0x1}, 0x48) ioctl$PERF_EVENT_IOC_SET_BPF(r2, 0x40042408, r3) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000000)={&(0x7f0000000080)='./file0/file0\x00', r0}, 0x10) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000400)=@ax25={0x3, {"02f47b3723e03d"}}, 0x80, &(0x7f00000017c0), 0x0, &(0x7f0000001840)=ANY=[], 0x0, 0x24004044}, 0x4008001) bpf$MAP_CREATE(0x0, &(0x7f0000002cc0)={0x5, 0x100, 0x56c96e7a, 0x2, 0xa, 0xffffffffffffffff, 0x9}, 0x2c) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000480)='rpc_pipefs\x00', 0x200000, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000002d00)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f00000004c0)='vmnet0keyring\x00') bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000780)={&(0x7f0000000740)='./file0/file0\x00', r4}, 0x10) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x40082406, &(0x7f0000000700)='proc!@ppp1!ppp0ppp0#)lo\\lolo{\x00') mount(&(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000200)='fuseblk\x00', 0xa11800, &(0x7f0000000240)) r5 = syz_open_dev$sg(&(0x7f0000000240)='/dev/sg#\x00', 0xfffffffffffffffa, 0x800) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000280)={r5, r3, 0x5, 0x1}, 0x10) ioctl$TIOCCONS(r5, 0x541d) mount(&(0x7f00000002c0)='./file0/file0\x00', &(0x7f0000000300)='./file0/file0\x00', &(0x7f0000000340)='minix\x00', 0x1000, &(0x7f0000000380)) 2018/03/29 17:35:00 executing program 5: r0 = socket(0xa, 0x2, 0x0) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r1 = open(&(0x7f00004b8ff8)='./file0\x00', 0x28042, 0x0) connect$inet6(r0, &(0x7f0000d3cfe4)={0xa, 0x0, 0x0, @mcast2={0xff, 0x2, [], 0x1}, 0x3}, 0x1c) ioctl$DRM_IOCTL_ADD_CTX(r1, 0xc0086420, &(0x7f0000000000)) fallocate(r1, 0x0, 0xffff, 0x1f) setsockopt$inet6_mtu(r0, 0x29, 0x17, &(0x7f0000000100)=0x2, 0x4) connect$inet(r0, &(0x7f0000000040)={0x2, 0x4e22, @multicast1=0xe0000001}, 0x10) socketpair$inet_dccp(0x2, 0x6, 0x0, &(0x7f0000000240)) sendfile(r0, r1, &(0x7f00005faff8)=0x60, 0xfffb) getsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX3(r0, 0x84, 0x6f, &(0x7f00000000c0)={0x0, 0xac, &(0x7f0000000280)=[@in6={0xa, 0x4e24, 0x1e, @remote={0xfe, 0x80, [], 0xbb}, 0x2}, @in={0x2, 0x4e22, @rand_addr=0x34800}, @in6={0xa, 0x4e23, 0x200}, @in6={0xa, 0x0, 0x8, @local={0xfe, 0x80, [], 0xaa}, 0x8}, @in6={0xa, 0x4e23, 0x2, @dev={0xfe, 0x80, [], 0x14}}, @in={0x2, 0x4e23}, @in6={0xa, 0x4e20, 0x8, @mcast2={0xff, 0x2, [], 0x1}, 0x4}]}, &(0x7f0000000340)=0x10) getsockopt$inet_sctp6_SCTP_PR_SUPPORTED(r0, 0x84, 0x71, &(0x7f0000000380)={0x0, 0x4766}, &(0x7f00000003c0)=0x8) getsockopt$inet_sctp6_SCTP_STATUS(r1, 0x84, 0xe, &(0x7f0000000400)={r2, 0xbbf3, 0xffffffff, 0x0, 0xfffffffffffffffe, 0x200, 0x9, 0x0, {r3, @in={{0x2, 0x4e24, @broadcast=0xffffffff}}, 0x9, 0x7f, 0x6, 0x7, 0xc3}}, &(0x7f00000004c0)=0xb0) unlinkat(0xffffffffffffffff, &(0x7f0000000140)='./file0/file0\x00', 0x0) accept4$unix(r1, &(0x7f0000000180)=@abs, &(0x7f0000000200)=0x6e, 0x800) 2018/03/29 17:35:00 executing program 7: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)={0xb, 0x7e, 0x3, 0x1, 0x11}, 0x2c) mkdir(&(0x7f0000000240)='./file0\x00', 0x28) mount(&(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) r1 = socket$kcm(0x29, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000000bc0)={&(0x7f00000007c0)=@rc={0x1f, {0x5, 0x50000000, 0xaa2, 0x613, 0x4, 0x1ff}, 0x3f}, 0x80, &(0x7f0000000940)=[{&(0x7f0000000840)="09c9453aa30d8c5fba221fa2413f12c580837b2ae292e3ee8dd00098c404125a1a2e63840f82a2f69c3927af43b828422484aaeeceebcbe76e999bd3930c9b7c2995484407f9166e39c2069a88b63a980b9b5ffc880f4b89dde5adae6c7fb84ed98cbac860214dfb0b28d1b2e2d58aefebdfe515334f2ffa46be22ef7a4b3a276cb70a27c9e9f5de0a20bad24cbe2b89aee9693c2f8f186ea59fcfc4ebec7188cca0418d4583a6f1730f62416d70cd62555eb4f58ea831d1fea9956a2cba0049f23bf0b249f5de2ce0dc303808d70b0ccab3c7f37e949e", 0xd7}], 0x1, &(0x7f0000000980), 0x0, 0x20004805}, 0x4010) r2 = perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x2367, 0x7fff, 0x1, 0x6, 0x0, 0x78b1, 0x1, 0x0, 0x4992c766, 0xff, 0x81, 0x100, 0x40, 0x3, 0x9, 0x8, 0x1, 0x10000, 0x0, 0x6, 0x90e, 0x9, 0x7ff, 0x0, 0x8, 0x1, 0x30, 0x20, 0x7fffffff, 0x6, 0x401, 0x2, 0x1000, 0x8001, 0x1ff, 0xfffffffffffffff8, 0x0, 0x2, 0x0, @perf_config_ext={0x5, 0x8}, 0x1ab23, 0x3f, 0x8, 0x5, 0x6, 0x0, 0x6}, 0xffffffffffffffff, 0x10, r0, 0x1) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0xb, 0x9, &(0x7f0000000580)=@framed={{0x18}, [@map={0x18, 0x0, 0x1, 0x0, r0}, @generic={0x3ff, 0xfffffffffffffffc, 0x1}, @call={0x85, 0x0, 0x0, 0x6}], {0x95}}, &(0x7f0000000600)='syzkaller\x00', 0x0, 0x30, &(0x7f0000000640)=""/48, 0x41f00, 0x1}, 0x48) ioctl$PERF_EVENT_IOC_SET_BPF(r2, 0x40042408, r3) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000000)={&(0x7f0000000080)='./file0/file0\x00', r0}, 0x10) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000400)=@ax25={0x3, {"02f47b3723e03d"}}, 0x80, &(0x7f00000017c0), 0x0, &(0x7f0000001840)=ANY=[], 0x0, 0x24004044}, 0x4008001) bpf$MAP_CREATE(0x0, &(0x7f0000002cc0)={0x5, 0x0, 0x56c96e7a, 0x2, 0xa, 0xffffffffffffffff, 0x9}, 0x2c) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000480)='rpc_pipefs\x00', 0x200000, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000002d00)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f00000004c0)='vmnet0keyring\x00') bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000780)={&(0x7f0000000740)='./file0/file0\x00', r4}, 0x10) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x40082406, &(0x7f0000000700)='proc!@ppp1!ppp0ppp0#)lo\\lolo{\x00') mount(&(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000200)='fuseblk\x00', 0xa11800, &(0x7f0000000240)) mount(&(0x7f00000002c0)='./file0/file0\x00', &(0x7f0000000300)='./file0/file0\x00', &(0x7f0000000340)='minix\x00', 0x1000, &(0x7f0000000380)) 2018/03/29 17:35:00 executing program 2: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)={0xb, 0x7e, 0x3, 0x1, 0x11}, 0x2c) mount(&(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) r1 = socket$kcm(0x29, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000000bc0)={&(0x7f00000007c0)=@rc={0x1f, {0x5, 0x50000000, 0xaa2, 0x613, 0x4, 0x1ff}, 0x3f}, 0x80, &(0x7f0000000940)=[{&(0x7f0000000840)="09c9453aa30d8c5fba221fa2413f12c580837b2ae292e3ee8dd00098c404125a1a2e63840f82a2f69c3927af43b828422484aaeeceebcbe76e999bd3930c9b7c2995484407f9166e39c2069a88b63a980b9b5ffc880f4b89dde5adae6c7fb84ed98cbac860214dfb0b28d1b2e2d58aefebdfe515334f2ffa46be22ef7a4b3a276cb70a27c9e9f5de0a20bad24cbe2b89aee9693c2f8f186ea59fcfc4ebec7188cca0418d4583a6f1730f62416d70cd62555eb4f58ea831d1fea9956a2cba0049f23bf0b249f5de2ce0dc303808d70b0ccab3c7f37e949e", 0xd7}], 0x1, &(0x7f0000000980), 0x0, 0x20004805}, 0x4010) socketpair(0x11, 0x803, 0x6, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = syz_open_dev$sndpcmp(&(0x7f0000000980)='/dev/snd/pcmC#D#p\x00', 0x9, 0x200) linkat(r2, &(0x7f0000000280)='./file0\x00', r3, &(0x7f00000009c0)='./file0/file0\x00', 0x400) r4 = perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x2367, 0x7fff, 0x1, 0x6, 0x0, 0x78b1, 0x1, 0x0, 0x4992c766, 0xff, 0x81, 0x100, 0x40, 0x3, 0x9, 0x8, 0x1, 0x10000, 0x0, 0x6, 0x90e, 0x9, 0x7ff, 0x0, 0x8, 0x1, 0x30, 0x20, 0x7fffffff, 0x6, 0x401, 0x2, 0x1000, 0x8001, 0x1ff, 0xfffffffffffffff8, 0x0, 0x2, 0x0, @perf_config_ext={0x5, 0x8}, 0x1ab23, 0x0, 0x8, 0x5, 0x6, 0x0, 0x6}, 0xffffffffffffffff, 0x10, r0, 0x1) bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0xb, 0x9, &(0x7f0000000580)=@framed={{0x18}, [@map={0x18, 0x0, 0x1, 0x0, r0}, @generic={0x3ff, 0xfffffffffffffffc, 0x1}, @call={0x85, 0x0, 0x0, 0x6}], {0x95}}, &(0x7f0000000600)='syzkaller\x00', 0x0, 0x30, &(0x7f0000000640)=""/48, 0x41f00, 0x1}, 0x48) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000000)={&(0x7f0000000080)='./file0/file0\x00', r0}, 0x10) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000400)=@ax25={0x3, {"02f47b3723e03d"}}, 0x80, &(0x7f00000017c0), 0x0, &(0x7f0000001840)=ANY=[], 0x0, 0x24004044}, 0x4008001) bpf$MAP_CREATE(0x0, &(0x7f0000002cc0)={0x5, 0x0, 0x56c96e7a, 0x2, 0xa, 0xffffffffffffffff, 0x9}, 0x2c) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000480)='rpc_pipefs\x00', 0x200000, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000002d00)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f00000004c0)='vmnet0keyring\x00') bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000780)={&(0x7f0000000740)='./file0/file0\x00', r5}, 0x10) ioctl$PERF_EVENT_IOC_SET_FILTER(r4, 0x40082406, &(0x7f0000000700)='proc!@ppp1!ppp0ppp0#)lo\\lolo{\x00') mount(&(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000200)='fuseblk\x00', 0xa11800, &(0x7f0000000240)) mount(&(0x7f00000002c0)='./file0/file0\x00', &(0x7f0000000300)='./file0/file0\x00', &(0x7f0000000340)='minix\x00', 0x1000, &(0x7f0000000380)) 2018/03/29 17:35:00 executing program 3: r0 = socket(0xa, 0x2, 0x0) r1 = open(&(0x7f00004b8ff8)='./file0\x00', 0x28042, 0x0) connect$inet6(r0, &(0x7f0000d3cfe4)={0xa, 0x0, 0x0, @mcast2={0xff, 0x2, [], 0x1}, 0x3}, 0x1c) ioctl$DRM_IOCTL_ADD_CTX(r1, 0xc0086420, &(0x7f0000000000)) ioctl$DRM_IOCTL_NEW_CTX(r1, 0x40086425, &(0x7f0000000080)={0x0, 0x3}) fallocate(r1, 0x0, 0xffff, 0x1f) setsockopt$inet6_mtu(0xffffffffffffffff, 0x29, 0x17, &(0x7f0000000100)=0x2, 0x4) r2 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000140)='IPVS\x00') sendmsg$IPVS_CMD_GET_INFO(r0, &(0x7f0000000240)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x8004000}, 0xc, &(0x7f0000000200)={&(0x7f0000000180)={0x58, r2, 0x323, 0x70bd25, 0x25dfdbfe, {0xf}, [@IPVS_CMD_ATTR_SERVICE={0x24, 0x1, [@IPVS_SVC_ATTR_FLAGS={0xc, 0x7, {0x8}}, @IPVS_SVC_ATTR_FLAGS={0xc, 0x7, {0x20, 0x10}}, @IPVS_SVC_ATTR_NETMASK={0x8, 0x9, 0x21}]}, @IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0x1}, @IPVS_CMD_ATTR_SERVICE={0x18, 0x1, [@IPVS_SVC_ATTR_TIMEOUT={0x8, 0x8, 0x6c}, @IPVS_SVC_ATTR_FLAGS={0xc, 0x7, {0x32, 0x20}}]}]}, 0x58}, 0x1, 0x0, 0x0, 0x4}, 0x0) connect$inet(r0, &(0x7f0000000040)={0x2, 0x4e22, @multicast1=0xe0000001}, 0x10) sendfile(r0, r1, &(0x7f00005faff8), 0xfffb) 2018/03/29 17:35:00 executing program 6: poll(&(0x7f0000000000), 0x2bd, 0x1) r0 = accept4(0xffffffffffffffff, &(0x7f00000000c0)=@llc={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @broadcast}, &(0x7f0000000040)=0x80, 0x80800) getsockopt$inet_sctp6_SCTP_AUTO_ASCONF(r0, 0x84, 0x1e, &(0x7f0000000140), &(0x7f0000000180)=0x4) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_inet_SIOCGIFADDR(r1, 0x8915, &(0x7f0000000080)={'syzkaller1\x00', {0x2, 0x4e22}}) ioctl$sock_inet_SIOCSIFPFLAGS(0xffffffffffffffff, 0x8934, &(0x7f0000000000)={'sit0\x00'}) 2018/03/29 17:35:00 executing program 4: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)={0xb, 0x7e, 0x3, 0x1, 0x11}, 0x2c) mount(&(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) r1 = socket$kcm(0x29, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000000bc0)={&(0x7f00000007c0)=@rc={0x1f, {0x5, 0x50000000, 0xaa2, 0x613, 0x4, 0x1ff}, 0x3f}, 0x80, &(0x7f0000000940)=[{&(0x7f0000000840)="09c9453aa30d8c5fba221fa2413f12c580837b2ae292e3ee8dd00098c404125a1a2e63840f82a2f69c3927af43b828422484aaeeceebcbe76e999bd3930c9b7c2995484407f9166e39c2069a88b63a980b9b5ffc880f4b89dde5adae6c7fb84ed98cbac860214dfb0b28d1b2e2d58aefebdfe515334f2ffa46be22ef7a4b3a276cb70a27c9e9f5de0a20bad24cbe2b89aee9693c2f8f186ea59fcfc4ebec7188cca0418d4583a6f1730f62416d70cd62555eb4f58ea831d1fea9956a2cba0049f23bf0b249f5de2ce0dc303808d70b0ccab3c7f37e949e", 0xd7}], 0x1, &(0x7f0000000980), 0x0, 0x20004805}, 0x4010) r2 = perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x2367, 0x7fff, 0x1, 0x6, 0x0, 0x78b1, 0x1, 0x0, 0x4992c766, 0xff, 0x81, 0x100, 0x40, 0x3, 0x9, 0x8, 0x1, 0x10000, 0x0, 0x6, 0x90e, 0x9, 0x7ff, 0x0, 0x8, 0x1, 0x30, 0x20, 0x7fffffff, 0x6, 0x401, 0x2, 0x1000, 0x8001, 0x1ff, 0xfffffffffffffff8, 0x0, 0x2, 0x0, @perf_config_ext={0x5, 0x8}, 0x1ab23, 0x3f, 0x8, 0x5, 0x6}, 0xffffffffffffffff, 0x0, r0, 0x1) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0xb, 0x9, &(0x7f0000000580)=@framed={{0x18}, [@map={0x18, 0x0, 0x1, 0x0, r0}, @generic={0x3ff, 0xfffffffffffffffc, 0x1}, @call={0x85, 0x0, 0x0, 0x6}], {0x95}}, &(0x7f0000000600)='syzkaller\x00', 0x0, 0x30, &(0x7f0000000640)=""/48, 0x41f00, 0x1}, 0x48) ioctl$PERF_EVENT_IOC_SET_BPF(r2, 0x40042408, r3) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000000)={&(0x7f0000000080)='./file0/file0\x00', r0}, 0x10) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000400)=@ax25={0x3, {"02f47b3723e03d"}}, 0x80, &(0x7f00000017c0), 0x0, &(0x7f0000001840)=ANY=[], 0x0, 0x24004044}, 0x4008001) bpf$MAP_CREATE(0x0, &(0x7f0000002cc0)={0x5, 0x100, 0x56c96e7a, 0x2, 0xa, 0xffffffffffffffff, 0x9}, 0x2c) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000480)='rpc_pipefs\x00', 0x200000, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000002d00)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f00000004c0)='vmnet0keyring\x00') bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000780)={&(0x7f0000000740)='./file0/file0\x00', r4}, 0x10) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x40082406, &(0x7f0000000700)='proc!@ppp1!ppp0ppp0#)lo\\lolo{\x00') mount(&(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000200)='fuseblk\x00', 0xa11800, &(0x7f0000000240)) r5 = syz_open_dev$sg(&(0x7f0000000240)='/dev/sg#\x00', 0xfffffffffffffffa, 0x800) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000280)={r5, r3, 0x5, 0x1}, 0x10) ioctl$TIOCCONS(r5, 0x541d) mount(&(0x7f00000002c0)='./file0/file0\x00', &(0x7f0000000300)='./file0/file0\x00', &(0x7f0000000340)='minix\x00', 0x1000, &(0x7f0000000380)) 2018/03/29 17:35:00 executing program 1: getsockopt$inet_mreqsrc(0xffffffffffffffff, 0x0, 0x27, &(0x7f00000002c0)={@remote, @multicast2, @multicast2}, &(0x7f0000000300)=0xc) getsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER_VALUE(0xffffffffffffff9c, 0x84, 0x7c, &(0x7f00000000c0)={0x0, 0x7, 0x5}, &(0x7f0000000100)) getsockopt$inet_sctp_SCTP_LOCAL_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1b, &(0x7f00000009c0)=ANY=[@ANYBLOB="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"], &(0x7f00000004c0)=0x1) getsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(0xffffffffffffffff, 0x84, 0x18, &(0x7f0000000140)={r0, 0x1}, &(0x7f0000000180)=0x8) unshare(0x40000000) ioctl$DRM_IOCTL_GET_MAGIC(0xffffffffffffffff, 0x80046402, &(0x7f0000000040)=0xfffffffffffffffe) r1 = accept4$inet6(0xffffffffffffffff, 0x0, &(0x7f0000000000), 0x800) splice(r1, &(0x7f0000000240), r1, &(0x7f0000000280), 0x5aa9, 0xb) r2 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000580)='IPVS\x00') sendmsg$IPVS_CMD_GET_DEST(0xffffffffffffffff, &(0x7f0000000980)={&(0x7f0000000540)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000940)={&(0x7f0000000880)={0x9c, r2, 0x19, 0x70bd2b, 0x25dfdbfd, {0x8}, [@IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x2}, @IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0x2}, @IPVS_CMD_ATTR_DEST={0x1c, 0x2, [@IPVS_DEST_ATTR_ACTIVE_CONNS={0x8, 0x7, 0x1}, @IPVS_DEST_ATTR_WEIGHT={0x8, 0x4, 0x1}, @IPVS_DEST_ATTR_FWD_METHOD={0x8, 0x3, 0x1}]}, @IPVS_CMD_ATTR_SERVICE={0x5c, 0x1, [@IPVS_SVC_ATTR_PE_NAME={0x8, 0xb, 'sip\x00'}, @IPVS_SVC_ATTR_FWMARK={0x8, 0x5, 0x1}, @IPVS_SVC_ATTR_PROTOCOL={0x8, 0x2}, @IPVS_SVC_ATTR_PORT={0x8, 0x4, 0x4e23}, @IPVS_SVC_ATTR_NETMASK={0x8, 0x9, 0x53}, @IPVS_SVC_ATTR_FLAGS={0xc, 0x7, {0x4, 0x20}}, @IPVS_SVC_ATTR_AF={0x8, 0x1, 0xa}, @IPVS_SVC_ATTR_ADDR={0x14, 0x3, @ipv6=@remote={0xfe, 0x80, [], 0xbb}}, @IPVS_SVC_ATTR_PROTOCOL={0x8, 0x2, 0xff}]}]}, 0x9c}, 0x1, 0x0, 0x0, 0x10}, 0x90) r3 = gettid() ioctl$sock_FIOSETOWN(r1, 0x8901, &(0x7f0000000500)=r3) getsockopt$inet_sctp_SCTP_RECONFIG_SUPPORTED(0xffffffffffffffff, 0x84, 0x75, &(0x7f0000000340)={r0, 0x1}, &(0x7f0000000380)=0x8) getpeername$packet(0xffffffffffffffff, &(0x7f00000005c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @random}, &(0x7f0000000600)=0x14) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000640)={{{@in, @in6=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@dev}, 0x0, @in6=@loopback}}, &(0x7f0000000740)=0xe8) setsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000780)={{{@in=@multicast1=0xe0000001, @in6=@mcast1={0xff, 0x1, [], 0x1}, 0x4e21, 0x7fff, 0x4e21, 0x101, 0xa, 0x0, 0x80, 0x87, r4, r5}, {0x4, 0xffffffff, 0x7, 0x100000001, 0x0, 0x3, 0x8}, {0x4, 0x4, 0x6, 0x9}, 0x6, 0x6e6bba, 0x2, 0x0, 0x1, 0x2}, {{@in=@loopback=0x7f000001, 0x4d5, 0x3c}, 0xa, @in6=@ipv4={[], [0xff, 0xff], @multicast1=0xe0000001}, 0x3502, 0x2, 0x0, 0x7fff, 0x189e, 0xb8, 0x76ad}}, 0xe8) socketpair(0x2, 0x0, 0x38000000000, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r7 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_mreqn(r7, 0x0, 0x27, &(0x7f0000000000)={@multicast2=0xe0000002, @loopback=0x7f000001}, 0xc) setsockopt$inet_msfilter(r7, 0x0, 0x29, &(0x7f0000000040)={@multicast2=0xe0000002, @remote={0xac, 0x14, 0x14, 0xbb}, 0x0, 0x2, [@broadcast=0xffffffff, @multicast1=0xe0000001]}, 0x18) setsockopt$inet_msfilter(r7, 0x0, 0x29, &(0x7f00000000c0)={@multicast2=0xe0000002, @loopback=0x7f000001, 0x0, 0x2, [@multicast2=0xe0000002, @broadcast=0xffffffff]}, 0x18) getsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(r6, 0x84, 0x18, &(0x7f00000001c0)={r0, 0x2}, &(0x7f0000000200)=0x8) 2018/03/29 17:35:00 executing program 7: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)={0xb, 0x7e, 0x3, 0x1, 0x11}, 0x2c) mount(&(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) r1 = socket$kcm(0x29, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000000bc0)={&(0x7f00000007c0)=@rc={0x1f, {0x5, 0x50000000, 0xaa2, 0x613, 0x4, 0x1ff}, 0x3f}, 0x80, &(0x7f0000000940)=[{&(0x7f0000000840)="09c9453aa30d8c5fba221fa2413f12c580837b2ae292e3ee8dd00098c404125a1a2e63840f82a2f69c3927af43b828422484aaeeceebcbe76e999bd3930c9b7c2995484407f9166e39c2069a88b63a980b9b5ffc880f4b89dde5adae6c7fb84ed98cbac860214dfb0b28d1b2e2d58aefebdfe515334f2ffa46be22ef7a4b3a276cb70a27c9e9f5de0a20bad24cbe2b89aee9693c2f8f186ea59fcfc4ebec7188cca0418d4583a6f1730f62416d70cd62555eb4f58ea831d1fea9956a2cba0049f23bf0b249f5de2ce0dc303808d70b0ccab3c7f37e949e", 0xd7}], 0x1, &(0x7f0000000980), 0x0, 0x20004805}, 0x4010) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f00000009c0)={0x0, 0x0}, &(0x7f0000000a00)=0xc) stat(&(0x7f0000000a40)='./file0\x00', &(0x7f0000000a80)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) chown(&(0x7f0000000980)='./file0/file0\x00', r2, r3) r4 = perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x2367, 0x7fff, 0x1, 0x6, 0x0, 0x78b1, 0x1, 0x0, 0x4992c766, 0xff, 0x81, 0x100, 0x40, 0x3, 0x9, 0x8, 0x1, 0x10000, 0x0, 0x6, 0x90e, 0x9, 0x7ff, 0x0, 0x8, 0x1, 0x30, 0x20, 0x7fffffff, 0x6, 0x401, 0x2, 0x1000, 0x8001, 0x1ff, 0xfffffffffffffff8, 0x0, 0x2, 0x0, @perf_config_ext={0x5, 0x8}, 0x1ab23, 0x3f, 0x8, 0x5, 0x6, 0x0, 0x6}, 0xffffffffffffffff, 0x10, r0, 0x1) r5 = bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0xb, 0x9, &(0x7f0000000580)=ANY=[@ANYBLOB="18000000000000000000000000000000182f0000", @ANYRES32=r0, @ANYBLOB="0000000000000000fffc0100000000000000000000000000850000000600000000000000000000009500000000000000"], &(0x7f0000000600)='syzkaller\x00', 0x0, 0x30, &(0x7f0000000640)=""/48, 0x41f00, 0x1}, 0x48) ioctl$PERF_EVENT_IOC_SET_BPF(r4, 0x40042408, r5) r6 = open(&(0x7f0000000240)='./file0\x00', 0x80000, 0x10) ioctl$VHOST_SET_VRING_ERR(r6, 0x4008af22, &(0x7f0000000280)={0x3}) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000000)={&(0x7f0000000080)='./file0/file0\x00', r0}, 0x10) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000400)=@ax25={0x3, {"02f47b3723e03d"}}, 0x80, &(0x7f00000017c0), 0x0, &(0x7f0000001840)=ANY=[], 0x0, 0x24004044}, 0x4008001) bpf$MAP_CREATE(0x0, &(0x7f0000002cc0)={0x5, 0x0, 0x56c96e7a, 0x2, 0xa, 0xffffffffffffffff, 0x9}, 0x2c) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000480)='rpc_pipefs\x00', 0x200000, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000002d00)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f00000004c0)='vmnet0keyring\x00') bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000780)={&(0x7f0000000740)='./file0/file0\x00', r7}, 0x10) lgetxattr(&(0x7f0000000b00)='./file0/file0\x00', &(0x7f0000000b40)=@known='trusted.syz\x00', &(0x7f0000000b80)=""/16, 0x10) ioctl$PERF_EVENT_IOC_SET_FILTER(r4, 0x40082406, &(0x7f0000000700)='proc!@ppp1!ppp0ppp0#)lo\\lolo{\x00') mount(&(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000200)='fuseblk\x00', 0xa11800, &(0x7f0000000240)) mount(&(0x7f00000002c0)='./file0/file0\x00', &(0x7f0000000300)='./file0/file0\x00', &(0x7f0000000340)='minix\x00', 0x1000, &(0x7f0000000380)) 2018/03/29 17:35:00 executing program 5: r0 = socket(0xa, 0x2, 0x0) flock(0xffffffffffffffff, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000200)) sendto$inet(r0, &(0x7f0000509f92), 0xff77, 0x8000, &(0x7f000055fff0)={0x2, 0x4e23, @loopback=0x7f000001}, 0x10) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000b00)='./cgroup.cpu\x00', 0x200002, 0x0) setsockopt$inet_mreq(0xffffffffffffffff, 0x0, 0x27, &(0x7f0000000480)={@empty, @remote={0xac, 0x14, 0x14, 0xbb}}, 0x8) fchdir(r1) fstat(0xffffffffffffffff, &(0x7f0000000180)) bind$inet(0xffffffffffffffff, &(0x7f0000000440)={0x2, 0x0, @multicast1=0xe0000001}, 0x10) r2 = creat(&(0x7f0000000100)='./file1\x00', 0x0) fallocate(r2, 0x1, 0x0, 0x20004d2d) ioctl$DRM_IOCTL_SET_VERSION(0xffffffffffffffff, 0xc0106407, &(0x7f00000000c0)={0x0, 0x2}) socket$inet6_icmp(0xa, 0x2, 0x3a) sendmsg$inet_sctp(r0, &(0x7f000050dfc8)={&(0x7f0000000840)=@in6={0xa, 0x4e24, 0x80000001, @mcast1={0xff, 0x1, [], 0x1}}, 0x1c, &(0x7f00000005c0), 0x0, &(0x7f0000576000)}, 0x0) ioctl$EVIOCGPROP(0xffffffffffffffff, 0x80404509, &(0x7f00000003c0)=""/25) getsockopt$inet_sctp6_SCTP_GET_LOCAL_ADDRS(r1, 0x84, 0x6d, &(0x7f00000002c0)={0x0, 0x7e, "147b31a6c8d04526e5f78a8fe27845051f555f699446cd55da4ba6fc8873a807fa51bb4eab22c5df774cd217b3b2c0af891a34aae4b6aa2b7e16f7b4fd5dcc91ee95c14977580183e86a5e903258265c96396582cadd0075864a1d1b58c4036a1ea7b763df062b4b66c882ba9442bac3b9b6d420938dca4b48c863fb4acd"}, &(0x7f0000000240)=0x86) setsockopt$inet_sctp_SCTP_DEFAULT_PRINFO(r0, 0x84, 0x72, &(0x7f0000000380)={r3, 0x10000, 0x30}, 0xc) sendto$inet6(r0, &(0x7f0000000240), 0x0, 0x0, &(0x7f0000000280)={0xa, 0x4e23, 0x3, @local={0xfe, 0x80, [], 0xaa}, 0x9}, 0x1c) getpeername$packet(0xffffffffffffffff, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @broadcast}, &(0x7f0000000a00)=0x14) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000000)={{{@in=@multicast2, @in6=@dev}}, {{@in=@multicast1}, 0x0, @in6=@ipv4={[], [], @remote}}}, &(0x7f0000000140)=0xe8) 2018/03/29 17:35:00 executing program 2: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000000c40)={0xffffffffffffffff}) getsockopt$IPT_SO_GET_REVISION_MATCH(r0, 0x0, 0x42, &(0x7f0000000c80)={'icmp6\x00'}, &(0x7f0000000cc0)=0x1e) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)={0xb, 0x7e, 0x3, 0x1, 0x11}, 0x2c) mount(&(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) r2 = socket$kcm(0x29, 0x2, 0x0) sendmsg$kcm(r2, &(0x7f0000000bc0)={&(0x7f00000007c0)=@rc={0x1f, {0x5, 0x50000000, 0xaa2, 0x613, 0x4, 0x1ff}, 0x3f}, 0x80, &(0x7f0000000940)=[{&(0x7f0000000840)="09c9453aa30d8c5fba221fa2413f12c580837b2ae292e3ee8dd00098c404125a1a2e63840f82a2f69c3927af43b828422484aaeeceebcbe76e999bd3930c9b7c2995484407f9166e39c2069a88b63a980b9b5ffc880f4b89dde5adae6c7fb84ed98cbac860214dfb0b28d1b2e2d58aefebdfe515334f2ffa46be22ef7a4b3a276cb70a27c9e9f5de0a20bad24cbe2b89aee9693c2f8f186ea59fcfc4ebec7188cca0418d4583a6f1730f62416d70cd62555eb4f58ea831d1fea9956a2cba0049f23bf0b249f5de2ce0dc303808d70b0ccab3c7f37e949e", 0xd7}], 0x1, &(0x7f0000000980), 0x0, 0x20004805}, 0x4010) r3 = perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x2367, 0x7fff, 0x1, 0x6, 0x0, 0x78b1, 0x1, 0x0, 0x4992c766, 0xff, 0x81, 0x100, 0x40, 0x3, 0x9, 0x8, 0x1, 0x10000, 0x0, 0x6, 0x90e, 0x9, 0x7ff, 0x0, 0x8, 0x1, 0x30, 0x20, 0x7fffffff, 0x6, 0x401, 0x2, 0x1000, 0x8001, 0x1ff, 0xfffffffffffffff8, 0x0, 0x2, 0x0, @perf_config_ext={0x5, 0x8}, 0x1ab23, 0x0, 0x8, 0x5, 0x6, 0x0, 0x6}, 0xffffffffffffffff, 0x10, r1, 0x1) bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0xb, 0x9, &(0x7f0000000580)=@framed={{0x18}, [@map={0x18, 0x0, 0x1, 0x0, r1}, @generic={0x3ff, 0xfffffffffffffffc, 0x1}, @call={0x85, 0x0, 0x0, 0x6}], {0x95}}, &(0x7f0000000600)='syzkaller\x00', 0x0, 0x30, &(0x7f0000000640)=""/48, 0x41f00, 0x1}, 0x48) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000000)={&(0x7f0000000080)='./file0/file0\x00', r1}, 0x10) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000400)=@ax25={0x3, {"02f47b3723e03d"}}, 0x80, &(0x7f00000017c0), 0x0, &(0x7f0000001840)=ANY=[], 0x0, 0x24004044}, 0x4008001) bpf$MAP_CREATE(0x0, &(0x7f0000002cc0)={0x5, 0x0, 0x56c96e7a, 0x2, 0xa, 0xffffffffffffffff, 0x9}, 0x2c) r4 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000240)='/proc/self/net/pfkey\x00', 0x620004, 0x0) getsockopt$sock_int(r4, 0x1, 0x1b, &(0x7f0000000280), &(0x7f0000000980)=0x4) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000480)='rpc_pipefs\x00', 0x200000, 0x0) mount(&(0x7f0000000a80)='./file0\x00', &(0x7f0000000ac0)='./file0/file0\x00', &(0x7f0000000b00)='securityfs\x00', 0x8000, &(0x7f0000000b40)="7861dcb62756d2fef233d74da3730790ab42499e8bba1272be9ebf403e529abe0bf721fa347ad4d37a76828adb7caeab75bf8ea1e1062830718e9cdeabd83bf004") socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000002d00)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x40082406, &(0x7f00000004c0)='vmnet0keyring\x00') bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000780)={&(0x7f0000000740)='./file0/file0\x00', r5}, 0x10) ioctl$PERF_EVENT_IOC_SET_FILTER(r3, 0x40082406, &(0x7f0000000700)='proc!@ppp1!ppp0ppp0#)lo\\lolo{\x00') mount(&(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000200)='fuseblk\x00', 0xa11800, &(0x7f0000000240)) mount(&(0x7f00000002c0)='./file0/file0\x00', &(0x7f0000000300)='./file0/file0\x00', &(0x7f0000000340)='minix\x00', 0x1000, &(0x7f0000000380)) getgroups(0x6, &(0x7f00000009c0)=[0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0xffffffffffffffff]) fstat(r4, &(0x7f0000000a00)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) setregid(r6, r7) setsockopt$SO_VM_SOCKETS_BUFFER_MIN_SIZE(r4, 0x28, 0x1, &(0x7f0000000c00)=0x40, 0x8) 2018/03/29 17:35:00 executing program 3: r0 = socket(0xa, 0x2, 0x0) r1 = open(&(0x7f00004b8ff8)='./file0\x00', 0x28042, 0x0) connect$inet6(r0, &(0x7f0000d3cfe4)={0xa, 0x0, 0x0, @mcast2={0xff, 0x2, [], 0x1}, 0x3}, 0x1c) ioctl$DRM_IOCTL_ADD_CTX(r1, 0xc0086420, &(0x7f0000000000)) ioctl$DRM_IOCTL_NEW_CTX(r1, 0x40086425, &(0x7f0000000080)={0x0, 0x3}) fallocate(r1, 0x0, 0xffff, 0x1f) setsockopt$inet6_mtu(0xffffffffffffffff, 0x29, 0x17, &(0x7f0000000100)=0x2, 0x4) connect$inet(r0, &(0x7f0000000040)={0x2, 0x4e22, @multicast1=0xe0000001}, 0x10) sendfile(r0, r1, &(0x7f00005faff8), 0xfffb) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000000c0)={r1, 0x50, &(0x7f0000000140)}, 0x10) 2018/03/29 17:35:00 executing program 0: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)={0xb, 0x7e, 0x3, 0x1, 0x11}, 0x2c) mount(&(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) r1 = socket$kcm(0x29, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000000bc0)={&(0x7f00000007c0)=@rc={0x1f, {0x5, 0x50000000, 0xaa2, 0x613, 0x4, 0x1ff}}, 0x80, &(0x7f0000000940)=[{&(0x7f0000000840)="09c9453aa30d8c5fba221fa2413f12c580837b2ae292e3ee8dd00098c404125a1a2e63840f82a2f69c3927af43b828422484aaeeceebcbe76e999bd3930c9b7c2995484407f9166e39c2069a88b63a980b9b5ffc880f4b89dde5adae6c7fb84ed98cbac860214dfb0b28d1b2e2d58aefebdfe515334f2ffa46be22ef7a4b3a276cb70a27c9e9f5de0a20bad24cbe2b89aee9693c2f8f186ea59fcfc4ebec7188cca0418d4583a6f1730f62416d70cd62555eb4f58ea831d1fea9956a2cba0049f23bf0b249f5de2ce0dc303808d70b0ccab3c7f37e949e", 0xd7}], 0x1, &(0x7f0000000980)}, 0x4010) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0xb, 0x9, &(0x7f0000000580)=@framed={{0x18}, [@map={0x18, 0x0, 0x1, 0x0, r0}, @generic={0x3ff, 0xfffffffffffffffc, 0x1}, @call={0x85, 0x0, 0x0, 0x6}], {0x95}}, &(0x7f0000000600)='syzkaller\x00', 0x0, 0x30, &(0x7f0000000640)=""/48, 0x41f00, 0x1}, 0x48) recvmsg(r1, &(0x7f0000001ec0)={&(0x7f0000000a40)=@pppol2tp={0x0, 0x0, {0x0, 0xffffffffffffffff, {0x0, 0x0, @multicast1}}}, 0x80, &(0x7f0000001e00)=[{&(0x7f0000000c80)=""/4096, 0x1000}, {&(0x7f0000000ac0)=""/92, 0x5c}, {&(0x7f0000001c80)=""/244, 0xf4}, {&(0x7f0000002d40)=""/4096, 0x1000}, {&(0x7f0000001d80)=""/84, 0x54}], 0x5, &(0x7f0000001e80)=""/10, 0xa, 0x100}, 0x41) connect$unix(r3, &(0x7f0000001f00)=@file={0x1, './file0\x00'}, 0x6e) ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, r2) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000000)={&(0x7f0000000080)='./file0/file0\x00', r0}, 0x10) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000400)=@ax25={0x3, {"02f47b3723e03d"}}, 0x80, &(0x7f00000017c0), 0x0, &(0x7f0000001840)=ANY=[], 0x0, 0x24004044}, 0x4008001) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000002cc0)={0x5, 0x100, 0x56c96e7a, 0x2, 0xa, 0xffffffffffffffff, 0x9}, 0x2c) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000480)='rpc_pipefs\x00', 0x200000, 0x0) mknod(&(0x7f0000000a00)='./file0\x00', 0x900c, 0x2) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000002d00)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f00000004c0)='vmnet0keyring\x00') bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000780)={&(0x7f0000000740)='./file0/file0\x00', r5}, 0x10) r6 = syz_open_dev$sg(&(0x7f0000000240)='/dev/sg#\x00', 0xfff1, 0x10000) getsockopt$inet_pktinfo(r6, 0x0, 0x8, &(0x7f0000000b40)={0x0, @empty, @remote}, &(0x7f0000000b80)=0xc) bpf$PROG_LOAD(0x5, &(0x7f0000000c00)={0xf, 0xe, &(0x7f0000000500)=@raw=[@map={0x18, 0x0, 0x1, 0x0, r4}, @generic={0x6, 0x9, 0x6, 0x200}, @call={0x85, 0x0, 0x0, 0xc}, @generic={0x4, 0x7fff, 0x0, 0xffffffffffff367a}, @exit={0x95}, @ldst={0x2, 0x1, 0x3, 0x7, 0x0, 0x44, 0xffffffffffffffff}, @map={0x18, 0x585bd785993a9176, 0x1, 0x0, r0}], &(0x7f0000000280)='GPL\x00', 0x1, 0x59, &(0x7f0000000980)=""/89, 0x41000, 0x1, [], r7}, 0x48) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, &(0x7f0000000700)='proc!@ppp1!ppp0ppp0#)lo\\lolo{\x00') mount(&(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000200)='fuseblk\x00', 0xa11800, &(0x7f0000000240)) mount(&(0x7f00000002c0)='./file0/file0\x00', &(0x7f0000000300)='./file0/file0\x00', &(0x7f0000000340)='minix\x00', 0x0, &(0x7f0000000380)) 2018/03/29 17:35:00 executing program 6: r0 = socket(0xa, 0x2, 0x0) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r1 = open(&(0x7f00004b8ff8)='./file0\x00', 0x28042, 0x0) connect$inet6(r0, &(0x7f0000d3cfe4)={0xa, 0x0, 0x0, @mcast2={0xff, 0x2, [], 0x1}, 0x3}, 0x1c) ioctl$DRM_IOCTL_ADD_CTX(r1, 0xc0086420, &(0x7f0000000000)) fallocate(r1, 0x0, 0xffff, 0x1f) setsockopt$inet6_mtu(r0, 0x29, 0x17, &(0x7f0000000100)=0x2, 0x4) connect$inet(r0, &(0x7f0000000040)={0x2, 0x4e22, @multicast1=0xe0000001}, 0x10) socketpair$inet_dccp(0x2, 0x6, 0x0, &(0x7f0000000240)) sendfile(r0, r1, &(0x7f00005faff8)=0x60, 0xfffb) getsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX3(r0, 0x84, 0x6f, &(0x7f00000000c0)={0x0, 0xac, &(0x7f0000000280)=[@in6={0xa, 0x4e24, 0x1e, @remote={0xfe, 0x80, [], 0xbb}, 0x2}, @in={0x2, 0x4e22, @rand_addr=0x34800}, @in6={0xa, 0x4e23, 0x200, @empty, 0x9}, @in6={0xa, 0x4e21, 0x8, @local={0xfe, 0x80, [], 0xaa}, 0x8}, @in6={0xa, 0x4e23, 0x2, @dev={0xfe, 0x80, [], 0x14}, 0x3f}, @in={0x2, 0x4e23}, @in6={0xa, 0x4e20, 0x8, @mcast2={0xff, 0x2, [], 0x1}, 0x4}]}, &(0x7f0000000340)=0x10) getsockopt$inet_sctp6_SCTP_PR_SUPPORTED(r0, 0x84, 0x71, &(0x7f0000000380)={0x0, 0x4766}, &(0x7f00000003c0)=0x8) getsockopt$inet_sctp6_SCTP_STATUS(r1, 0x84, 0xe, &(0x7f0000000400)={r2, 0xbbf3, 0xffffffff, 0x0, 0xfffffffffffffffe, 0x200, 0x9, 0x0, {r3, @in={{0x2, 0x4e24, @broadcast=0xffffffff}}, 0x9, 0x7f, 0x6, 0x7, 0xc3}}, &(0x7f00000004c0)=0xb0) unlinkat(r0, &(0x7f0000000140)='./file0/file0\x00', 0x0) accept4$unix(r1, &(0x7f0000000180)=@abs, &(0x7f0000000200)=0x6e, 0x800) 2018/03/29 17:35:00 executing program 5: r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff7fffffffffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = getpgrp(0xffffffffffffffff) r2 = syz_open_procfs(r1, &(0x7f00000000c0)='stat\x00') ioctl$sock_inet_SIOCSIFBRDADDR(r2, 0x891a, &(0x7f00000008c0)={'ip6tnl0\x00', {0x2, 0x4e23, @multicast1=0xe0000001}}) sendfile(r2, r2, &(0x7f0000000040)=0xffffffff77fffffe, 0x5) getresuid(&(0x7f0000000480), &(0x7f00000004c0), &(0x7f0000000500)) stat(&(0x7f0000000540)='./file0\x00', &(0x7f0000000580)) geteuid() stat(&(0x7f0000000600)='./file0\x00', &(0x7f0000000640)) stat(&(0x7f00000006c0)='./file0\x00', &(0x7f0000000700)) getegid() stat(&(0x7f0000000780)='./file0\x00', &(0x7f00000007c0)) r3 = getgid() getuid() fstat(r2, &(0x7f0000000840)) sendmsg$unix(0xffffffffffffffff, &(0x7f00000009c0)={&(0x7f0000000100)=@abs={0x1, 0x0, 0x4e23}, 0x6e, &(0x7f0000000440)=[{&(0x7f0000000180)="f5dc941f4dc3cd9adc57ae91e3dd4343d2d34a84526e7cc2dced527b17e9f844324330a6c4fc95075fc39479fc730a76e14b1c7e042182b78b54fd1112d5d88e0463edf0b527bc60eef252342942a7d15f5dbf3a13deeaef54e8a875bd6393929f9f520c496c5643e469d505", 0x6c}], 0x1, &(0x7f0000000ac0)=ANY=[@ANYBLOB="100000000100", @ANYBLOB="1800000001000000020000", @ANYBLOB="180000000100000002000000", @ANYBLOB="180000000100000002", @ANYRES32=r3, @ANYBLOB="1800000001000200000000003b807f0af037927569073608982ff4048a7ecfa7a1c67509e2d123a2b26f36835b10059f7a10eb109d87fc6064da955f7e7f205180a40f55cbeb36713ac27eb87fbecffcbff26a930baf2e9c2ef6884dac58f0a50bb630bd5b40ae09ab39821a7438e4933f62cb131b62df345d2bf2ad49b098c04953df23", @ANYRES32, @ANYBLOB="300000000100000001000000", @ANYRES32=r2, @ANYRES32=r2, @ANYRES32=r2, @ANYRES32=r2, @ANYRES32=r0, @ANYRES32=r0, @ANYRES32=r2, @ANYRES32=r0], 0xde, 0x91}, 0x24008000) getresgid(&(0x7f0000000a00), &(0x7f0000000a40), &(0x7f0000000a80)) 2018/03/29 17:35:00 executing program 4: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)={0xb, 0x7e, 0x3, 0x1, 0x11}, 0x2c) mount(&(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) r1 = socket$kcm(0x29, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000000bc0)={&(0x7f00000007c0)=@rc={0x1f, {0x5, 0x50000000, 0xaa2, 0x613, 0x4, 0x1ff}, 0x3f}, 0x80, &(0x7f0000000940)=[{&(0x7f0000000840)="09c9453aa30d8c5fba221fa2413f12c580837b2ae292e3ee8dd00098c404125a1a2e63840f82a2f69c3927af43b828422484aaeeceebcbe76e999bd3930c9b7c2995484407f9166e39c2069a88b63a980b9b5ffc880f4b89dde5adae6c7fb84ed98cbac860214dfb0b28d1b2e2d58aefebdfe515334f2ffa46be22ef7a4b3a276cb70a27c9e9f5de0a20bad24cbe2b89aee9693c2f8f186ea59fcfc4ebec7188cca0418d4583a6f1730f62416d70cd62555eb4f58ea831d1fea9956a2cba0049f23bf0b249f5de2ce0dc303808d70b0ccab3c7f37e949e", 0xd7}], 0x1, &(0x7f0000000980), 0x0, 0x20004805}, 0x4010) r2 = perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x2367, 0x7fff, 0x1, 0x6, 0x0, 0x78b1, 0x1, 0x0, 0x4992c766, 0xff, 0x81, 0x100, 0x40, 0x3, 0x9, 0x8, 0x1, 0x10000, 0x0, 0x6, 0x90e, 0x9, 0x7ff, 0x0, 0x8, 0x1, 0x30, 0x20, 0x7fffffff, 0x6, 0x401, 0x2, 0x1000, 0x8001, 0x1ff, 0xfffffffffffffff8, 0x0, 0x2, 0x0, @perf_config_ext={0x5, 0x8}, 0x1ab23, 0x3f, 0x8, 0x5, 0x6}, 0xffffffffffffffff, 0x0, r0, 0x1) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0xb, 0x9, &(0x7f0000000580)=@framed={{0x18}, [@map={0x18, 0x0, 0x1, 0x0, r0}, @generic={0x3ff, 0xfffffffffffffffc, 0x1}, @call={0x85, 0x0, 0x0, 0x6}], {0x95}}, &(0x7f0000000600)='syzkaller\x00', 0x0, 0x30, &(0x7f0000000640)=""/48, 0x41f00, 0x1}, 0x48) ioctl$PERF_EVENT_IOC_SET_BPF(r2, 0x40042408, r3) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000000)={&(0x7f0000000080)='./file0/file0\x00', r0}, 0x10) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000400)=@ax25={0x3, {"02f47b3723e03d"}}, 0x80, &(0x7f00000017c0), 0x0, &(0x7f0000001840)=ANY=[], 0x0, 0x24004044}, 0x4008001) bpf$MAP_CREATE(0x0, &(0x7f0000002cc0)={0x5, 0x100, 0x56c96e7a, 0x2, 0xa, 0xffffffffffffffff, 0x9}, 0x2c) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000480)='rpc_pipefs\x00', 0x200000, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000002d00)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f00000004c0)='vmnet0keyring\x00') bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000780)={&(0x7f0000000740)='./file0/file0\x00', r4}, 0x10) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x40082406, &(0x7f0000000700)='proc!@ppp1!ppp0ppp0#)lo\\lolo{\x00') mount(&(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000200)='fuseblk\x00', 0xa11800, &(0x7f0000000240)) r5 = syz_open_dev$sg(&(0x7f0000000240)='/dev/sg#\x00', 0xfffffffffffffffa, 0x800) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000280)={r5, r3, 0x5, 0x1}, 0x10) ioctl$TIOCCONS(r5, 0x541d) mount(&(0x7f00000002c0)='./file0/file0\x00', &(0x7f0000000300)='./file0/file0\x00', &(0x7f0000000340)='minix\x00', 0x1000, &(0x7f0000000380)) 2018/03/29 17:35:00 executing program 7: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000240)={0x4, 0x107c, 0xffffffffffffffff, 0x1, 0xf}, 0x2c) mount(&(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) r1 = socket$kcm(0x29, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000000bc0)={&(0x7f00000007c0)=@rc={0x1f, {0x5, 0x50000000, 0xaa2, 0x613, 0x4, 0x1ff}, 0x3f}, 0x80, &(0x7f0000000940)=[{&(0x7f0000000840)="09c9453aa30d8c5fba221fa2413f12c580837b2ae292e3ee8dd00098c404125a1a2e63840f82a2f69c3927af43b828422484aaeeceebcbe76e999bd3930c9b7c2995484407f9166e39c2069a88b63a980b9b5ffc880f4b89dde5adae6c7fb84ed98cbac860214dfb0b28d1b2e2d58aefebdfe515334f2ffa46be22ef7a4b3a276cb70a27c9e9f5de0a20bad24cbe2b89aee9693c2f8f186ea59fcfc4ebec7188cca0418d4583a6f1730f62416d70cd62555eb4f58ea831d1fea9956a2cba0049f23bf0b249f5de2ce0dc303808d70b0ccab3c7f37e949e", 0xd7}], 0x1, &(0x7f0000000980), 0x0, 0x20004805}, 0x4010) r2 = perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x2367, 0x7fff, 0x1, 0x6, 0x0, 0x78b1, 0x1, 0x0, 0x4992c766, 0xff, 0x81, 0x100, 0x40, 0x3, 0x9, 0x8, 0x1, 0x10000, 0x0, 0x6, 0x90e, 0x9, 0x7ff, 0x0, 0x8, 0x1, 0x30, 0x20, 0x7fffffff, 0x6, 0x401, 0x2, 0x1000, 0x8001, 0x1ff, 0xfffffffffffffff8, 0x0, 0x2, 0x0, @perf_config_ext={0x5, 0x8}, 0x1ab23, 0x3f, 0x8, 0x5, 0x6, 0x0, 0x6}, 0xffffffffffffffff, 0x10, r0, 0x1) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0xb, 0x9, &(0x7f0000000580)=@framed={{0x18}, [@map={0x18, 0x0, 0x1, 0x0, r0}, @generic={0x3ff, 0xfffffffffffffffc, 0x1}, @call={0x85, 0x0, 0x0, 0x6}], {0x95}}, &(0x7f0000000600)='syzkaller\x00', 0x0, 0x30, &(0x7f0000000640)=""/48, 0x41f00, 0x1}, 0x48) ioctl$PERF_EVENT_IOC_SET_BPF(r2, 0x40042408, r3) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000000)={&(0x7f0000000080)='./file0/file0\x00', r0}, 0x10) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000400)=@ax25={0x3, {"02f47b3723e03d"}}, 0x80, &(0x7f00000017c0), 0x0, &(0x7f0000001840)=ANY=[], 0x0, 0x24004044}, 0x4008001) bpf$MAP_CREATE(0x0, &(0x7f0000002cc0)={0x5, 0x0, 0x56c96e7a, 0x2, 0xa, 0xffffffffffffffff, 0x9}, 0x2c) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000480)='rpc_pipefs\x00', 0x200000, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000002d00)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f00000004c0)='vmnet0keyring\x00') bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000780)={&(0x7f0000000740)='./file0/file0\x00', r4}, 0x10) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x40082406, &(0x7f0000000700)='minix\x00') mount(&(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000200)='fuseblk\x00', 0xa11800, &(0x7f0000000240)) mount(&(0x7f00000002c0)='./file0/file0\x00', &(0x7f0000000300)='./file0/file0\x00', &(0x7f0000000340)='minix\x00', 0x1000, &(0x7f0000000380)) 2018/03/29 17:35:00 executing program 0: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)={0xb, 0x7e, 0x3, 0x1, 0x11}, 0x2c) mount(&(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) r1 = socket$kcm(0x29, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000000bc0)={&(0x7f00000007c0)=@rc={0x1f, {0x5, 0x50000000, 0xaa2, 0x613, 0x4, 0x1ff}}, 0x80, &(0x7f0000000940)=[{&(0x7f0000000840)="09c9453aa30d8c5fba221fa2413f12c580837b2ae292e3ee8dd00098c404125a1a2e63840f82a2f69c3927af43b828422484aaeeceebcbe76e999bd3930c9b7c2995484407f9166e39c2069a88b63a980b9b5ffc880f4b89dde5adae6c7fb84ed98cbac860214dfb0b28d1b2e2d58aefebdfe515334f2ffa46be22ef7a4b3a276cb70a27c9e9f5de0a20bad24cbe2b89aee9693c2f8f186ea59fcfc4ebec7188cca0418d4583a6f1730f62416d70cd62555eb4f58ea831d1fea9956a2cba0049f23bf0b249f5de2ce0dc303808d70b0ccab3c7f37e949e", 0xd7}], 0x1, &(0x7f0000000980)}, 0x4010) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0xb, 0x9, &(0x7f0000000980)=ANY=[@ANYBLOB="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", @ANYRES32=r0, @ANYBLOB="0000000000000000fffc0100000000000000000000000000850000000600000000000000000000009500000000000000"], &(0x7f0000000600)='syzkaller\x00', 0x0, 0x30, &(0x7f0000000640)=""/48, 0x41f00, 0x1}, 0x48) ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, r2) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000000)={&(0x7f0000000080)='./file0/file0\x00', r0}, 0x10) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000400)=@ax25={0x3, {"02f47b3723e03d"}}, 0x80, &(0x7f00000017c0), 0x0, &(0x7f0000001840)=ANY=[], 0x0, 0x24004044}, 0x4008001) bpf$MAP_CREATE(0x0, &(0x7f0000002cc0)={0x5, 0x100, 0x56c96e7a, 0x2, 0xa, 0xffffffffffffffff, 0x9}, 0x2c) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000480)='rpc_pipefs\x00', 0x200000, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000002d00)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f00000004c0)='vmnet0keyring\x00') bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000780)={&(0x7f0000000740)='./file0/file0\x00', r3}, 0x10) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, &(0x7f0000000700)='proc!@ppp1!ppp0ppp0#)lo\\lolo{\x00') mount(&(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000200)='fuseblk\x00', 0xa11800, &(0x7f0000000240)) mount(&(0x7f00000002c0)='./file0/file0\x00', &(0x7f0000000300)='./file0/file0\x00', &(0x7f0000000340)='minix\x00', 0x0, &(0x7f0000000380)) 2018/03/29 17:35:00 executing program 5: r0 = open(&(0x7f0000000440)='./file0\x00', 0x1ffff, 0x5) ioctl$TIOCLINUX7(0xffffffffffffffff, 0x541c, &(0x7f0000000080)={0x7, 0x5}) setsockopt$inet_tcp_int(r0, 0x6, 0x0, &(0x7f00000003c0)=0x6, 0xf4) perf_event_open(&(0x7f0000000240)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000180)='/dev/sequencer2\x00', 0x0, 0x0) clock_gettime(0x0, &(0x7f00000001c0)={0x0, 0x0}) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r1, 0x4040534e, &(0x7f0000000340)={0x124, @time={r2, r3+30000000}, 0x1, {0x8, 0x606}, 0x101, 0x0, 0x80000001}) r4 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000040)='/dev/rtc\x00', 0x0, 0x0) r5 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000580)='/dev/sequencer\x00', 0x0, 0x0) ioctl$LOOP_CLR_FD(r4, 0x7003) timerfd_gettime(r1, &(0x7f0000000300)) getsockopt$inet_sctp_SCTP_FRAGMENT_INTERLEAVE(0xffffffffffffffff, 0x84, 0x12, &(0x7f0000000140), &(0x7f00000002c0)=0x4) setsockopt$packet_buf(0xffffffffffffffff, 0x107, 0xd, &(0x7f00000004c0)="d9fb4f1bcfd3e0c1355ea2018b25a4fd911d8abc3f3fd71f4749878ac1fbce6e5d188e078b15be141905d7966406e4f3fb021da63028837a8407bcb3e3a676d251bcd09a04964ed9cd0f6cece267dc4bada0403dcef25dace8875f4a6495eb2e6cc4969e7de83153459b4d61669ed9eb75", 0x71) perf_event_open(&(0x7f00000000c0)={0x0, 0x70, 0x0, 0x0, 0x7ff, 0xa1, 0x0, 0x1, 0x200, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0xb0, 0x5, 0x0, 0x401, 0xcf, 0x0, 0x0, 0x0, 0x3ff, 0x0, 0x8, 0x2, 0x1f, 0x2, 0x5, 0x9, 0x3, 0x0, 0x4, 0x0, 0x20000000, 0x0, @perf_config_ext={0x9}, 0x10, 0x3, 0x8, 0x0, 0x72eb, 0x99, 0x1}, 0x0, 0xd, r4, 0x0) mq_notify(r5, &(0x7f0000000400)={0x0, 0x1f, 0x4}) execve(&(0x7f0000000200)='./file0\x00', &(0x7f0000000680)=[&(0x7f0000000480)='wlan0\x00', &(0x7f0000000540)='/dev/rtc\x00', &(0x7f0000000600)='\x00', &(0x7f0000000640)='proc\x00'], &(0x7f0000000740)=[&(0x7f0000000700)='trustedwlan0vmnet0@%\x00']) 2018/03/29 17:35:00 executing program 3: r0 = socket(0xa, 0x2, 0x0) r1 = open(&(0x7f00004b8ff8)='./file0\x00', 0x28042, 0x0) connect$inet6(r0, &(0x7f0000d3cfe4)={0xa, 0x0, 0x0, @mcast2={0xff, 0x2, [], 0x1}, 0x3}, 0x1c) ioctl$DRM_IOCTL_ADD_CTX(r1, 0xc0086420, &(0x7f0000000000)) ioctl$DRM_IOCTL_NEW_CTX(r1, 0x40086425, &(0x7f0000000080)={0x0, 0x3}) fallocate(r1, 0x0, 0xffff, 0x1f) setsockopt$inet6_mtu(0xffffffffffffffff, 0x29, 0x17, &(0x7f0000000100)=0x2, 0x4) connect$inet(r0, &(0x7f0000000040)={0x2, 0x4e22, @multicast1=0xe0000001}, 0x10) sendfile(r0, r1, &(0x7f00005faff8), 0xfffb) socket$can_raw(0x1d, 0x3, 0x1) 2018/03/29 17:35:00 executing program 1: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000ed4000)=0x78, 0x4) bind$inet(r0, &(0x7f0000deb000)={0x2, 0x4e23, @multicast1=0xe0000001}, 0x10) ioctl$sock_SIOCINQ(r0, 0x541b, &(0x7f0000000500)) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000f40ff8)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) getsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(0xffffffffffffff9c, 0x84, 0x1f, &(0x7f0000000240)={0x0, @in={{0x2, 0x4e23}}, 0x0, 0x3}, &(0x7f0000000000)=0x90) setsockopt$inet_sctp_SCTP_RTOINFO(0xffffffffffffffff, 0x84, 0x0, &(0x7f0000000040)={r1, 0x81, 0x7, 0x100000000}, 0x10) getsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(r0, 0x84, 0x18, &(0x7f00000003c0)={r1, 0x7}, &(0x7f0000000400)=0x8) socketpair(0x11, 0x800, 0x5, &(0x7f0000000200)={0xffffffffffffffff}) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_INFO(r2, 0xc08c5334, &(0x7f0000000600)={0x6, 0x7, 0x2f29fdaf, 'queue0\x00', 0x800}) r3 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000080)='/dev/hwrng\x00', 0x4000, 0x0) sendto$inet(r0, &(0x7f0000a88f88), 0x29f, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @loopback=0x7f000001}, 0x10) pipe2(&(0x7f0000000580)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80002) ioctl$EVIOCGBITKEY(0xffffffffffffffff, 0x80404521, &(0x7f00000000c0)=""/160) sendmmsg(r0, &(0x7f00000025c0)=[{{&(0x7f0000000300)=@pppoe={0x18, 0x0, {0x0, @link_local={0x1, 0x80, 0xc2}, 'ip6tnl0\x00'}}, 0x80, &(0x7f0000000380)=[{&(0x7f00000010c0)="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", 0x6cb}], 0x1}}], 0x1, 0x4000) recvfrom$inet(r0, &(0x7f00009be000)=""/11, 0xe8, 0x0, 0x0, 0xffffffffffffff4e) bind$bt_l2cap(r4, &(0x7f0000000440)={0x1f, 0x8, {0x6, 0x400, 0x0, 0x2, 0x9, 0x3}, 0x10001, 0x2}, 0xe) setsockopt(r5, 0xb5, 0xffffffff, &(0x7f00000006c0)="0ac385d7ac2ae574baf1b3104b37fd7f20ebca1da5063c612b05a3d56c8b2e413e64bfc3e0bb415e656477eea9c01ad808e74aea23e7e4a07d09f22e69e1ae37fecf707d249ba82f1fc8f4", 0x4b) getsockopt$inet_sctp_SCTP_RECVRCVINFO(r0, 0x84, 0x20, &(0x7f0000000180), &(0x7f00000001c0)=0x4) setsockopt$inet_mtu(r3, 0x0, 0xa, &(0x7f0000000480)=0x7, 0x4) epoll_ctl$EPOLL_CTL_ADD(r3, 0x1, 0xffffffffffffffff, &(0x7f00000004c0)={0x5}) syz_open_procfs(0x0, &(0x7f00000005c0)='maps\x00') shutdown(r0, 0x1) 2018/03/29 17:35:00 executing program 2: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)={0xb, 0x7e, 0x3, 0x1, 0x11}, 0x2c) mount(&(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) r1 = socket$kcm(0x29, 0x100000000000002, 0x0) sendmsg$kcm(r1, &(0x7f0000000bc0)={&(0x7f00000007c0)=@rc={0x1f, {0x5, 0x50000000, 0xaa2, 0x613, 0x4, 0x1ff}, 0x3f}, 0x80, &(0x7f0000000940)=[{&(0x7f0000000840)="09c9453aa30d8c5fba221fa2413f12c580837b2ae292e3ee8dd00098c404125a1a2e63840f82a2f69c3927af43b828422484aaeeceebcbe76e999bd3930c9b7c2995484407f9166e39c2069a88b63a980b9b5ffc880f4b89dde5adae6c7fb84ed98cbac860214dfb0b28d1b2e2d58aefebdfe515334f2ffa46be22ef7a4b3a276cb70a27c9e9f5de0a20bad24cbe2b89aee9693c2f8f186ea59fcfc4ebec7188cca0418d4583a6f1730f62416d70cd62555eb4f58ea831d1fea9956a2cba0049f23bf0b249f5de2ce0dc303808d70b0ccab3c7f37e949e", 0xd7}], 0x1, &(0x7f0000000980), 0x0, 0x20004805}, 0x4010) r2 = perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x2367, 0x7fff, 0x1, 0x6, 0x0, 0x78b1, 0x1, 0x0, 0x4992c766, 0xff, 0x81, 0x100, 0x40, 0x3, 0x9, 0x8, 0x1, 0x10000, 0x0, 0x6, 0x90e, 0x9, 0x7ff, 0x0, 0x8, 0x1, 0x30, 0x20, 0x7fffffff, 0x6, 0x401, 0x2, 0x1000, 0x8001, 0x1ff, 0xfffffffffffffff8, 0x0, 0x2, 0x0, @perf_config_ext={0x5, 0x8}, 0x1ab23, 0x0, 0x8, 0x5, 0x6, 0x0, 0x6}, 0xffffffffffffffff, 0x10, r0, 0x1) bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0xb, 0x9, &(0x7f0000000580)=@framed={{0x18}, [@map={0x18, 0x0, 0x1, 0x0, r0}, @generic={0x3ff, 0xfffffffffffffffc, 0x1}, @call={0x85, 0x0, 0x0, 0x6}], {0x95}}, &(0x7f0000000600)='syzkaller\x00', 0x0, 0x30, &(0x7f0000000640)=""/48, 0x41f00, 0x1}, 0x48) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000000)={&(0x7f0000000080)='./file0/file0\x00', r0}, 0x10) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000400)=@ax25={0x3, {"02f47b3723e03d"}}, 0x80, &(0x7f00000017c0), 0x0, &(0x7f0000001840)=ANY=[], 0x0, 0x24004044}, 0x4008001) bpf$MAP_CREATE(0x0, &(0x7f0000002cc0)={0x5, 0x0, 0x56c96e7a, 0x2, 0xa, 0xffffffffffffffff, 0x9}, 0x2c) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000480)='rpc_pipefs\x00', 0x200000, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000002d00)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f00000004c0)='vmnet0keyring\x00') bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000780)={&(0x7f0000000740)='./file0/file0\x00', r3}, 0x10) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x40082406, &(0x7f0000000700)='proc!@ppp1!ppp0ppp0#)lo\\lolo{\x00') mount(&(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000200)='sysv\x00', 0xa11800, &(0x7f0000000240)) mount(&(0x7f00000002c0)='./file0/file0\x00', &(0x7f0000000300)='./file0/file0\x00', &(0x7f0000000340)='minix\x00', 0x1000, &(0x7f0000000380)) 2018/03/29 17:35:00 executing program 5: r0 = open(&(0x7f0000000440)='./file0\x00', 0x1ffff, 0x5) ioctl$TIOCLINUX7(0xffffffffffffffff, 0x541c, &(0x7f0000000080)={0x7}) setsockopt$inet_tcp_int(r0, 0x6, 0x0, &(0x7f00000003c0)=0x6, 0xf4) perf_event_open(&(0x7f0000000240)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000180)='/dev/sequencer2\x00', 0x12100, 0x0) clock_gettime(0x0, &(0x7f00000001c0)={0x0}) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r1, 0x4040534e, &(0x7f0000000340)={0x0, @time={r2}, 0x1, {0x8, 0x606}, 0x101, 0x2}) r3 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000040)='/dev/rtc\x00', 0x0, 0x0) r4 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000580)='/dev/sequencer\x00', 0x0, 0x0) ioctl$LOOP_CLR_FD(r3, 0x7003) getsockopt$inet_sctp_SCTP_FRAGMENT_INTERLEAVE(0xffffffffffffffff, 0x84, 0x12, &(0x7f0000000140), &(0x7f00000002c0)=0x4) setsockopt$packet_buf(0xffffffffffffffff, 0x107, 0xd, &(0x7f00000004c0)="d9fb4f1bcfd3e0c1355ea2018b25a4fd911d8abc3f3fd71f4749878ac1fbce6e5d188e078b15be141905d7966406e4f3fb021da63028837a8407bcb3e3a676d251bcd09a04964ed9cd0f6cece267dc4bada0403dcef25dace8875f4a6495eb2e6cc4969e7de83153459b4d61669ed9eb7567", 0x72) perf_event_open(&(0x7f00000000c0)={0x0, 0x70, 0x0, 0x0, 0x7ff, 0xa1, 0x0, 0x0, 0x200, 0x2, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x5, 0x0, 0x401, 0xcf, 0x0, 0xffffffffffffffff, 0x100000000, 0x3ff, 0x0, 0x8, 0x2, 0x1f, 0x2, 0x5, 0x9, 0x3, 0x0, 0x4, 0x0, 0x20000000, 0x195d678803a3a953, @perf_config_ext={0x9, 0x5}, 0x10, 0x3, 0x8, 0x0, 0x72eb, 0x99, 0x1}, 0x0, 0xd, r3, 0x8) mq_notify(r4, &(0x7f0000000400)={0x0, 0x0, 0x4}) execve(&(0x7f0000000200)='./file0\x00', &(0x7f0000000680)=[&(0x7f0000000480)='wlan0\x00', &(0x7f0000000600)='\x00', &(0x7f0000000640)='proc\x00'], &(0x7f0000000740)=[&(0x7f00000006c0)='\'\x00', &(0x7f0000000700)='trustedwlan0vmnet0@%\x00']) 2018/03/29 17:35:00 executing program 6: mmap(&(0x7f0000c96000/0x3000)=nil, 0x3000, 0x3, 0x32, 0xffffffffffffffff, 0x0) r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$sock_timeval(r0, 0x1, 0x15, &(0x7f00000000c0)={0x77359400}, 0x8) r1 = socket$l2tp(0x18, 0x1, 0x1) ftruncate(r0, 0x1e8) r2 = syz_open_dev$mice(&(0x7f00000001c0)='/dev/input/mice\x00', 0x0, 0x40) getsockopt$inet_sctp6_SCTP_PARTIAL_DELIVERY_POINT(r2, 0x84, 0x13, &(0x7f00000008c0)={0x0, 0x6}, &(0x7f0000003bc0)=0x8) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(r2, 0x84, 0x1a, &(0x7f0000003c00)={r3, 0x52, "f90f4b780cc72b15d7d6406a79d432bc5f7a6bd84eaee9a0e3352fb76dbcff5a181c91bda2a917714742a3830c8a8e1da99600ad306941187ef582e9c79a0d4491cda6d0f5a6edcd465538e0c3f5d7b758a3"}, &(0x7f0000003c80)=0x5a) setsockopt$inet6_udp_encap(r0, 0x11, 0x64, &(0x7f0000000080)=0x1, 0x4) sendmmsg(r2, &(0x7f0000003ac0)=[{{0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000200)="976c7eddb6ebb53ea0ee7b8bd712a924fb744acdd281616cd42fc07c6265a66d7af0b742c20b18c76c9e494c920bade520b6550469abf9adbc65356f0d9cc638cb65ec", 0x43}], 0x1, &(0x7f00000002c0), 0x0, 0x40010}, 0xa2}, {{&(0x7f0000003800)=@nfc={0x27}, 0x80, &(0x7f00000038c0)=[{&(0x7f0000003880)="01998b5df351d2c2f0b037efb912285c1c89557ee78c160ffe6b8ad9558083ae3f63c3f7a9e0f5d3311a10b1726d0b9e1eac324035e1312683714a84", 0x3c}], 0x1, &(0x7f0000003900)=[{0x74, 0x112, 0x100, "1e71f97613cd170fc24ee4a9ae8780c10ed97d910f7bf8614db96e52246c30ba21a7f0cf9e5e3540323f8cbac398d18ad44897b19616c68a423f23f05b5397fa26a4ab63b967faa4afc802ff2b546bfe811260ffb5a8600414be1b5245912f8abc7bb3f7dc8d1a8a"}], 0x74, 0x8000}, 0x401}], 0x2, 0x20004000) connect$l2tp(r1, &(0x7f00005fafd2)=@pppol2tp={0x18, 0x1, {0x0, r0, {0x2, 0x4e21, @multicast1=0xe0000001}, 0x2}}, 0x26) 2018/03/29 17:35:00 executing program 7: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r0 = syz_open_dev$mouse(&(0x7f0000000240)='/dev/input/mouse#\x00', 0x3f, 0x20000) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000280)={0xb, 0x7e, 0x3, 0x1, 0x16, r0}, 0x2c) r2 = socket$kcm(0x29, 0x2, 0x0) sendmsg$kcm(r2, &(0x7f0000000bc0)={&(0x7f00000007c0)=@rc={0x1f, {0x5, 0x50000000, 0xaa2, 0x613, 0x4, 0x1ff}, 0x3f}, 0x80, &(0x7f0000000940)=[{&(0x7f0000000840)="09c9453aa30d8c5fba221fa2413f12c580837b2ae292e3ee8dd00098c404125a1a2e63840f82a2f69c3927af43b828422484aaeeceebcbe76e999bd3930c9b7c2995484407f9166e39c2069a88b63a980b9b5ffc880f4b89dde5adae6c7fb84ed98cbac860214dfb0b28d1b2e2d58aefebdfe515334f2ffa46be22ef7a4b3a276cb70a27c9e9f5de0a20bad24cbe2b89aee9693c2f8f186ea59fcfc4ebec7188cca0418d4583a6f1730f62416d70cd62555eb4f58ea831d1fea9956a2cba0049f23bf0b249f5de2ce0dc303808d70b0ccab3c7f37e949e", 0xd7}], 0x1, &(0x7f0000000980), 0x0, 0x20004805}, 0x4010) r3 = perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x2367, 0x7fff, 0x1, 0x6, 0x0, 0x78b1, 0x1, 0x0, 0x4992c766, 0xff, 0x81, 0x100, 0x40, 0x3, 0x9, 0x8, 0x1, 0x10000, 0x0, 0x6, 0x90e, 0x9, 0x7ff, 0x0, 0x8, 0x1, 0x30, 0x20, 0x7fffffff, 0x6, 0x401, 0x2, 0x1000, 0x8001, 0x1ff, 0xfffffffffffffff8, 0x0, 0x2, 0x0, @perf_config_ext={0x5, 0x8}, 0x1ab23, 0x3f, 0x8, 0x5, 0x6, 0x0, 0x6}, 0xffffffffffffffff, 0x10, r1, 0x1) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0xb, 0x2000017f, &(0x7f0000000580)=@framed={{0x18}, [@map={0x18, 0x0, 0x1, 0x0, r1}, @generic={0x3ff, 0xfffffffffffffffc, 0x1}, @call={0x85, 0x0, 0x0, 0x6}], {0x95}}, &(0x7f0000000600)='syzkaller\x00', 0x0, 0x30, &(0x7f0000000640)=""/48, 0x41efe, 0x1}, 0x48) ioctl$PERF_EVENT_IOC_SET_BPF(r3, 0x40042408, r4) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000000)={&(0x7f0000000080)='./file0/file0\x00', r1}, 0x10) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000400)=@ax25={0x3, {"02f47b3723e03d"}}, 0x80, &(0x7f00000017c0), 0x0, &(0x7f0000001840)=ANY=[], 0x0, 0x24004044}, 0x4008001) bpf$MAP_CREATE(0x0, &(0x7f0000002cc0)={0x5, 0x0, 0x56c96e7a, 0x2, 0xa, 0xffffffffffffffff, 0x9}, 0x2c) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000480)='rpc_pipefs\x00', 0x200000, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000002d00)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x40082406, &(0x7f00000004c0)='vmnet0keyring\x00') bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000780)={&(0x7f0000000740)='./file0/file0\x00', r5}, 0x10) ioctl$PERF_EVENT_IOC_SET_FILTER(r3, 0x40082406, &(0x7f0000000700)='proc!@ppp1!ppp0ppp0#)lo\\lolo{\x00') setsockopt$inet6_dccp_int(r0, 0x21, 0x1, &(0x7f0000000140)=0x6, 0x4) mount(&(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000200)='fuseblk\x00', 0xa11800, &(0x7f0000000240)) mount(&(0x7f00000002c0)='./file0/file0\x00', &(0x7f0000000300)='./file0/file0\x00', &(0x7f0000000340)='minix\x00', 0x1000, &(0x7f0000000380)) 2018/03/29 17:35:00 executing program 2: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)={0xb, 0x7e, 0x3, 0x1, 0x11}, 0x2c) mount(&(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) r1 = socket$kcm(0x29, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000000bc0)={&(0x7f00000007c0)=@rc={0x1f, {0x5, 0x50000000, 0xaa2, 0x613, 0x4, 0x1ff}, 0x3f}, 0x80, &(0x7f0000000940)=[{&(0x7f0000000840)="09c9453aa30d8c5fba221fa2413f12c580837b2ae292e3ee8dd00098c404125a1a2e63840f82a2f69c3927af43b828422484aaeeceebcbe76e999bd3930c9b7c2995484407f9166e39c2069a88b63a980b9b5ffc880f4b89dde5adae6c7fb84ed98cbac860214dfb0b28d1b2e2d58aefebdfe515334f2ffa46be22ef7a4b3a276cb70a27c9e9f5de0a20bad24cbe2b89aee9693c2f8f186ea59fcfc4ebec7188cca0418d4583a6f1730f62416d70cd62555eb4f58ea831d1fea9956a2cba0049f23bf0b249f5de2ce0dc303808d70b0ccab3c7f37e949e", 0xd7}], 0x1, &(0x7f0000000980), 0x0, 0x20004805}, 0x4010) r2 = perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x2367, 0x7fff, 0x1, 0x6, 0x0, 0x78b1, 0x1, 0x0, 0x4992c766, 0xff, 0x81, 0x100, 0x40, 0x3, 0x9, 0x8, 0x1, 0x10000, 0x0, 0x6, 0x90e, 0x9, 0x7ff, 0x0, 0x8, 0x1, 0x30, 0x20, 0x7fffffff, 0x6, 0x401, 0x2, 0x1000, 0x8001, 0x1ff, 0xfffffffffffffff8, 0x0, 0x2, 0x0, @perf_config_ext={0x5, 0x8}, 0x1ab23, 0x0, 0x8, 0x5, 0x6, 0x0, 0x6}, 0xffffffffffffffff, 0x10, r0, 0x1) bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0xb, 0x9, &(0x7f0000000240)=ANY=[@ANYBLOB="37001000000800000000000000000018100000c56eec0be378030000e2ff00000033075e80bf3e1a0a4673a32808c044ed3efc634e", @ANYRES32=r0, @ANYBLOB="0000000000000000fffc0100000000000000000000000000850000000600000000000000000000009500000000000000"], &(0x7f0000000600)='syzkaller\x00', 0x0, 0x30, &(0x7f0000000640)=""/48, 0x41f00, 0x1}, 0x48) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000000)={&(0x7f0000000080)='./file0/file0\x00', r0}, 0x10) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000400)=@ax25={0x3, {"02f47b3723e03d"}}, 0x80, &(0x7f00000017c0), 0x0, &(0x7f0000001840)=ANY=[], 0x0, 0x24004044}, 0x4008001) bpf$MAP_CREATE(0x0, &(0x7f0000002cc0)={0x5, 0x0, 0x56c96e7a, 0x2, 0xa, 0xffffffffffffffff, 0x9}, 0x2c) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000480)='rpc_pipefs\x00', 0x200000, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000002d00)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f00000004c0)='vmnet0keyring\x00') bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000780)={&(0x7f0000000740)='./file0/file0\x00', r3}, 0x10) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x40082406, &(0x7f0000000700)='proc!@ppp1!ppp0ppp0#)lo\\lolo{\x00') mount(&(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000200)='fuseblk\x00', 0xa11800, &(0x7f0000000240)) mount(&(0x7f00000002c0)='./file0/file0\x00', &(0x7f0000000300)='./file0/file0\x00', &(0x7f0000000340)='minix\x00', 0x1000, &(0x7f0000000380)) 2018/03/29 17:35:00 executing program 0: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)={0xb, 0x7e, 0x3, 0x1, 0x11}, 0x2c) mount(&(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) r1 = socket$kcm(0x29, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000000bc0)={&(0x7f00000007c0)=@rc={0x1f, {0x5, 0x50000000, 0xaa2, 0x613, 0x4, 0x1ff}}, 0x80, &(0x7f0000000940)=[{&(0x7f0000000840)="09c9453aa30d8c5fba221fa2413f12c580837b2ae292e3ee8dd00098c404125a1a2e63840f82a2f69c3927af43b828422484aaeeceebcbe76e999bd3930c9b7c2995484407f9166e39c2069a88b63a980b9b5ffc880f4b89dde5adae6c7fb84ed98cbac860214dfb0b28d1b2e2d58aefebdfe515334f2ffa46be22ef7a4b3a276cb70a27c9e9f5de0a20bad24cbe2b89aee9693c2f8f186ea59fcfc4ebec7188cca0418d4583a6f1730f62416d70cd62555eb4f58ea831d1fea9956a2cba0049f23bf0b249f5de2ce0dc303808d70b0ccab3c7f37e949e", 0xd7}], 0x1, &(0x7f0000000980)}, 0x4010) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0xb, 0x9, &(0x7f0000000580)=@framed={{0x18}, [@map={0x18, 0x0, 0x1, 0x0, r0}, @generic={0x3ff, 0xfffffffffffffffc, 0x1}, @call={0x85, 0x0, 0x0, 0x6}], {0x95}}, &(0x7f0000000600)='syzkaller\x00', 0x0, 0x30, &(0x7f0000000640)=""/48, 0x41f00, 0x1}, 0x48) ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, r2) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000000)={&(0x7f0000000080)='./file0/file0\x00', r0}, 0x10) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000400)=@ax25={0x3, {"02f47b3723e03d"}}, 0x80, &(0x7f00000017c0), 0x0, &(0x7f0000001840)=ANY=[], 0x0, 0x24004044}, 0x4008001) bpf$MAP_CREATE(0x0, &(0x7f0000002cc0)={0x5, 0x100, 0x56c96e7a, 0x2, 0xa, 0xffffffffffffffff, 0x9}, 0x2c) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000480)='rpc_pipefs\x00', 0x200000, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000002d00)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f00000004c0)='vmnet0keyring\x00') r4 = socket$bt_cmtp(0x1f, 0x3, 0x5) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000780)={&(0x7f0000000740)='./file0/file0\x00', r3}, 0x10) r5 = syz_open_dev$sndpcmc(&(0x7f0000000500)='/dev/snd/pcmC#D#c\x00', 0x1, 0x20040) r6 = fcntl$dupfd(r4, 0x0, r2) ioctl$PERF_EVENT_IOC_SET_FILTER(r6, 0x40082406, &(0x7f0000000540)='proc!@ppp1!ppp0ppp0#)lo\\lolo{\x00') ioctl$EVIOCSMASK(r5, 0x40104593, &(0x7f0000000280)={0x5, 0xc6, &(0x7f0000000a40)="d1de7f6bed63c9bedfbc4f9f728d0a0162a5510aa8cc112a906614d9b7c8870ef3285b9017db5b6b71d1235ef96e2dd1ed0b6949fcd9d9c5d33ce8f1344a2b34e84c764fef7bab4689fd411eedb4373799a2661e65d0574b23bac2701ace56d5635e2314064defe6de544f75901849f93ff2c7f581f54fe16de8622646a3ed63b51433d6ce6490a4f737ddc12d249dbb5078eed6104e87251bcd6ccd6d644bbdc70138ed11009db77ee8e8cf85927a54ea423d152519ac7dc3dcff24d7d006f4cf6aa8269227"}) mount(&(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000200)='fuseblk\x00', 0xa11800, &(0x7f0000000240)) socketpair(0x1, 0x1, 0x0, &(0x7f0000000240)={0xffffffffffffffff}) ioctl$EVIOCGLED(r7, 0x80404519, &(0x7f0000000980)=""/184) 2018/03/29 17:35:00 executing program 4: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)={0xb, 0x7e, 0x3, 0x1, 0x11}, 0x2c) mount(&(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) r1 = socket$kcm(0x29, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000000bc0)={&(0x7f00000007c0)=@rc={0x1f, {0x5, 0x50000000, 0xaa2, 0x613, 0x4, 0x1ff}, 0x3f}, 0x80, &(0x7f0000000940)=[{&(0x7f0000000840)="09c9453aa30d8c5fba221fa2413f12c580837b2ae292e3ee8dd00098c404125a1a2e63840f82a2f69c3927af43b828422484aaeeceebcbe76e999bd3930c9b7c2995484407f9166e39c2069a88b63a980b9b5ffc880f4b89dde5adae6c7fb84ed98cbac860214dfb0b28d1b2e2d58aefebdfe515334f2ffa46be22ef7a4b3a276cb70a27c9e9f5de0a20bad24cbe2b89aee9693c2f8f186ea59fcfc4ebec7188cca0418d4583a6f1730f62416d70cd62555eb4f58ea831d1fea9956a2cba0049f23bf0b249f5de2ce0dc303808d70b0ccab3c7f37e949e", 0xd7}], 0x1, &(0x7f0000000980), 0x0, 0x20004805}, 0x4010) r2 = perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x2367, 0x7fff, 0x1, 0x6, 0x0, 0x78b1, 0x1, 0x0, 0x4992c766, 0xff, 0x81, 0x100, 0x40, 0x3, 0x9, 0x8, 0x1, 0x10000, 0x0, 0x6, 0x90e, 0x9, 0x7ff, 0x0, 0x8, 0x1, 0x30, 0x20, 0x7fffffff, 0x6, 0x401, 0x2, 0x1000, 0x8001, 0x1ff, 0xfffffffffffffff8, 0x0, 0x2, 0x0, @perf_config_ext={0x5, 0x8}, 0x1ab23, 0x3f, 0x8, 0x5, 0x6}, 0xffffffffffffffff, 0x10, 0xffffffffffffffff, 0x1) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0xb, 0x9, &(0x7f0000000580)=@framed={{0x18}, [@map={0x18, 0x0, 0x1, 0x0, r0}, @generic={0x3ff, 0xfffffffffffffffc, 0x1}, @call={0x85, 0x0, 0x0, 0x6}], {0x95}}, &(0x7f0000000600)='syzkaller\x00', 0x0, 0x30, &(0x7f0000000640)=""/48, 0x41f00, 0x1}, 0x48) ioctl$PERF_EVENT_IOC_SET_BPF(r2, 0x40042408, r3) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000000)={&(0x7f0000000080)='./file0/file0\x00', r0}, 0x10) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000400)=@ax25={0x3, {"02f47b3723e03d"}}, 0x80, &(0x7f00000017c0), 0x0, &(0x7f0000001840)=ANY=[], 0x0, 0x24004044}, 0x4008001) bpf$MAP_CREATE(0x0, &(0x7f0000002cc0)={0x5, 0x100, 0x56c96e7a, 0x2, 0xa, 0xffffffffffffffff, 0x9}, 0x2c) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000480)='rpc_pipefs\x00', 0x200000, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000002d00)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f00000004c0)='vmnet0keyring\x00') bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000780)={&(0x7f0000000740)='./file0/file0\x00', r4}, 0x10) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x40082406, &(0x7f0000000700)='proc!@ppp1!ppp0ppp0#)lo\\lolo{\x00') mount(&(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000200)='fuseblk\x00', 0xa11800, &(0x7f0000000240)) r5 = syz_open_dev$sg(&(0x7f0000000240)='/dev/sg#\x00', 0xfffffffffffffffa, 0x800) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000280)={r5, r3, 0x5, 0x1}, 0x10) ioctl$TIOCCONS(r5, 0x541d) mount(&(0x7f00000002c0)='./file0/file0\x00', &(0x7f0000000300)='./file0/file0\x00', &(0x7f0000000340)='minix\x00', 0x1000, &(0x7f0000000380)) 2018/03/29 17:35:00 executing program 1: r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @local={0xfe, 0x80, [], 0xaa}, 0x8956}, 0x1c) 2018/03/29 17:35:00 executing program 3: r0 = socket(0xa, 0x2, 0x0) r1 = open(&(0x7f00004b8ff8)='./file0\x00', 0x28042, 0x0) connect$inet6(r0, &(0x7f0000d3cfe4)={0xa, 0x0, 0x0, @mcast2={0xff, 0x2, [], 0x1}, 0x3}, 0x1c) ioctl$DRM_IOCTL_ADD_CTX(r1, 0xc0086420, &(0x7f0000000000)) ioctl$DRM_IOCTL_NEW_CTX(r1, 0x40086425, &(0x7f0000000080)={0x0, 0x3}) ioctl$VHOST_SET_VRING_ENDIAN(r1, 0x4008af13, &(0x7f0000000180)={0x1, 0xfffffffffffffff8}) fallocate(r1, 0x0, 0xffff, 0x1f) setsockopt$inet6_mtu(0xffffffffffffffff, 0x29, 0x17, &(0x7f0000000100)=0x2, 0x4) uname(&(0x7f00000001c0)=""/222) getsockopt$inet_sctp6_SCTP_INITMSG(r0, 0x84, 0x2, &(0x7f00000000c0), &(0x7f0000000140)=0x8) connect$inet(r0, &(0x7f0000000040)={0x2, 0x4e22, @multicast1=0xe0000001}, 0x10) sendfile(r0, r1, &(0x7f00005faff8), 0xfffb) 2018/03/29 17:35:00 executing program 1: r0 = getpgrp(0xffffffffffffffff) r1 = syz_open_procfs(r0, &(0x7f00000000c0)='stat\x00') ioctl$sock_inet_SIOCSIFBRDADDR(r1, 0x891a, &(0x7f00000008c0)={'ip6tnl0\x00', {0x2, 0x4e23, @multicast1=0xe0000001}}) sendfile(r1, r1, &(0x7f0000000040)=0xffffffff77fffffe, 0x5) getresuid(&(0x7f0000000480), &(0x7f00000004c0), &(0x7f0000000500)) stat(&(0x7f0000000540)='./file0\x00', &(0x7f0000000580)) geteuid() stat(&(0x7f0000000600)='./file0\x00', &(0x7f0000000640)) stat(&(0x7f00000006c0)='./file0\x00', &(0x7f0000000700)) r2 = getegid() stat(&(0x7f0000000780)='./file0\x00', &(0x7f00000007c0)) r3 = getgid() getuid() fstat(r1, &(0x7f0000000840)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) sendmsg$unix(0xffffffffffffffff, &(0x7f00000009c0)={&(0x7f0000000100)=@abs={0x1, 0x0, 0x4e23}, 0x6e, &(0x7f0000000440)=[{&(0x7f0000000180)="f5dc941f4dc3cd9adc57ae91e3dd4343d2d34a84526e7cc2dced527b17e9f844324330a6c4fc95075fc39479fc730a76e14b1c7e042182b78b54fd1112d5d88e0463edf0b527bc60eef252342942a7d15f5dbf3a13deeaef54e8a875bd6393929f9f520c496c5643e469d505dd150b595920", 0x72}], 0x1, &(0x7f0000000ac0)=ANY=[@ANYBLOB="18000000010000000200", @ANYBLOB, @ANYRES32=r2, @ANYBLOB="180000000100000002000000", @ANYRES32=r3, @ANYBLOB="1800000001000200000000003b807f0af037927569073608982ff4048a7ecfa7a1c67509e2d123a2b26f36835b10059f7a10eb109d87fc6064da955f7e7f205180a40f55cbeb36713ac27eb87fbecffcbff26a930baf2e9c2ef6884dac58f0a50bb630bd5b40ae09ab39821a7438e4933f62cb131b62df345d2bf2ad49b098c04953df23", @ANYRES32=r4, @ANYBLOB="300000000100000001000000", @ANYRES32=r1, @ANYRES32=r1, @ANYRES32=r1, @ANYRES32, @ANYRES32, @ANYRES32=r1, @ANYRES32], 0xce, 0x91}, 0x24008000) getresgid(&(0x7f0000000a00), &(0x7f0000000a40), &(0x7f0000000a80)) 2018/03/29 17:35:00 executing program 7: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)={0xb, 0x7e, 0x9, 0x1, 0x11}, 0x2c) mount(&(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) r1 = socket$kcm(0x29, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000000bc0)={&(0x7f00000007c0)=@rc={0x1f, {0x5, 0x50000000, 0xaa2, 0x613, 0x4, 0x1ff}, 0x3f}, 0x80, &(0x7f0000000940)=[{&(0x7f0000000840)="09c9453aa30d8c5fba221fa2413f12c580837b2ae292e3ee8dd00098c404125a1a2e63840f82a2f69c3927af43b828422484aaeeceebcbe76e999bd3930c9b7c2995484407f9166e39c2069a88b63a980b9b5ffc880f4b89dde5adae6c7fb84ed98cbac860214dfb0b28d1b2e2d58aefebdfe515334f2ffa46be22ef7a4b3a276cb70a27c9e9f5de0a20bad24cbe2b89aee9693c2f8f186ea59fcfc4ebec7188cca0418d4583a6f1730f62416d70cd62555eb4f58ea831d1fea9956a2cba0049f23bf0b249f5de2ce0dc303808d70b0ccab3c7f37e949e", 0xd7}], 0x1, &(0x7f0000000980), 0x0, 0x20004805}, 0x4010) r2 = perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x2367, 0x7fff, 0x1, 0x6, 0x0, 0x78b1, 0x1, 0x0, 0x4992c766, 0xff, 0x81, 0x100, 0x40, 0x3, 0x9, 0x8, 0x1, 0x10000, 0x0, 0x6, 0x90e, 0x9, 0x7ff, 0x0, 0x8, 0x1, 0x30, 0x20, 0x7fffffff, 0x6, 0x401, 0x2, 0x1000, 0x8001, 0x1ff, 0xfffffffffffffff8, 0x0, 0x2, 0x0, @perf_config_ext={0x5, 0x8}, 0x1ab23, 0x3f, 0x8, 0x5, 0x6, 0x0, 0x6}, 0xffffffffffffffff, 0x10, r0, 0x1) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0xb, 0x9, &(0x7f0000000580)=@framed={{0x18}, [@map={0x18, 0x0, 0x1, 0x0, r0}, @generic={0x3ff, 0xfffffffffffffffc, 0x1}, @call={0x85, 0x0, 0x0, 0x6}], {0x95}}, &(0x7f0000000600)='syzkaller\x00', 0x0, 0x30, &(0x7f0000000640)=""/48, 0x41f00, 0x1}, 0x48) ioctl$PERF_EVENT_IOC_SET_BPF(r2, 0x40042408, r3) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000000)={&(0x7f0000000080)='./file0/file0\x00', r0}, 0x10) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000400)=@ax25={0x3, {"02f47b3723e03d"}}, 0x80, &(0x7f00000017c0), 0x0, &(0x7f0000001840)=ANY=[], 0x0, 0x24004044}, 0x4008001) bpf$MAP_CREATE(0x0, &(0x7f0000002cc0)={0x5, 0x0, 0x56c96e7a, 0x2, 0xa, 0xffffffffffffffff, 0x9}, 0x2c) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000002d00)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f00000004c0)='vmnet0keyring\x00') bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000780)={&(0x7f0000000740)='./file0/file0\x00', r4}, 0x10) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x40082406, &(0x7f0000000700)='proc!@ppp1!ppp0ppp0#)lo\\lolo{\x00') mount(&(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000200)='fuseblk\x00', 0xa11800, &(0x7f0000000240)) mount(&(0x7f00000002c0)='./file0/file0\x00', &(0x7f0000000300)='./file0/file0\x00', &(0x7f0000000340)='minix\x00', 0x1000, &(0x7f0000000380)) 2018/03/29 17:35:00 executing program 6: r0 = socket(0xa, 0x1, 0x0) ioctl$fiemap(0xffffffffffffffff, 0xc020660b, &(0x7f0000000000)=ANY=[@ANYBLOB="00004000feffffffcb0d25cd1163b5630700000001"]) ioctl(r0, 0x8916, &(0x7f0000000000)) ioctl(r0, 0x8936, &(0x7f0000000000)) fcntl$F_SET_FILE_RW_HINT(r0, 0x40e, &(0x7f0000000240)) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1a, &(0x7f0000000280)=ANY=[@ANYBLOB], &(0x7f0000000100)=0x1) getsockopt$inet_sctp_SCTP_PEER_ADDR_THLDS(0xffffffffffffffff, 0x84, 0x1f, &(0x7f0000000140)={0x0, @in6={{0xa, 0x4e21, 0x0, @local={0xfe, 0x80, [], 0xaa}, 0x8e8d}}}, &(0x7f0000000200)=0x90) 2018/03/29 17:35:00 executing program 5: msgget$private(0x0, 0x0) msgrcv(0x0, &(0x7f0000000200)=ANY=[], 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000271000)={0x2, 0x70, 0x4a, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000240)=@raw={'raw\x00', 0x9, 0x3, 0x320, 0x0, 0xffffffff, 0xffffffff, 0x160, 0xffffffff, 0x250, 0xffffffff, 0xffffffff, 0x250, 0xffffffff, 0x3, &(0x7f0000000200), {[{{@uncond, 0x0, 0x120, 0x160, 0x0, {}, [@common=@frag={0x30, 'frag\x00', 0x0, {0x9, 0x20, 0x84c, 0x1c, 0x1}}, @inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0x2}}]}, @common=@inet=@LOG={0x40, 'LOG\x00', 0x0, {0x5, 0x10, "9d82960beb5fb0a7caa298f4c7765f2d19cfc4b03a02816d7942d47c05d1"}}}, {{@uncond, 0x0, 0xc8, 0xf0}, @common=@inet=@SET1={0x28, 'SET\x00', 0x1, {{0x9, 0xb70d, 0x2}, {0x6, 0x1, 0x7ff}}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28, '\x00', 0x0, 0xfffffffffffffffe}}}}, 0x380) msgsnd(0x0, &(0x7f0000000700)={0x1, "8fcde6702e1cd02a5fda34130e1a93d69410f66dc46c026b1107c236fdef83bbd675c5b8c5052a73766b8a212e9698f5ce380fe24137c2a56ecd06dbc2a55ca3a896173746a9330c64e56ad801ffa8d1c507874ff089c0494c1d4184af417d95cbd661045eae67a2c89a1f23bd1f9cadf13290834c0e01ea2ea9ec57cad6fd8ab9b3f08e0dead8fe9e0ec9f324daed15c67388069b9be486ac64fde5854b536104d785e45e369b5b34c37dd8822b04c4d0bc989dc50e87e05b783fcb23af"}, 0xc6, 0x800) r1 = syz_open_procfs(0x0, &(0x7f0000000180)='comm\x00') connect$ax25(r1, &(0x7f00000001c0)={0x3, {"31447f4c1aa7fe"}, 0x4}, 0x10) 2018/03/29 17:35:00 executing program 0: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r0 = open(&(0x7f0000000500)='./file0\x00', 0x40, 0x40) ioctl$KVM_SIGNAL_MSI(r0, 0x4020aea5, &(0x7f0000000540)={0x3000, 0x0, 0x20, 0x6, 0xfff}) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)={0xb, 0x7e, 0x3, 0x1, 0x11}, 0x2c) mount(&(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) r2 = socket$kcm(0x29, 0x2, 0x0) sendmsg$kcm(r2, &(0x7f0000000bc0)={&(0x7f00000007c0)=@rc={0x1f, {0x5, 0x50000000, 0xaa2, 0x613, 0x4, 0x1ff}}, 0x80, &(0x7f0000000940)=[{&(0x7f0000000840)="09c9453aa30d8c5fba221fa2413f12c580837b2ae292e3ee8dd00098c404125a1a2e63840f82a2f69c3927af43b828422484aaeeceebcbe76e999bd3930c9b7c2995484407f9166e39c2069a88b63a980b9b5ffc880f4b89dde5adae6c7fb84ed98cbac860214dfb0b28d1b2e2d58aefebdfe515334f2ffa46be22ef7a4b3a276cb70a27c9e9f5de0a20bad24cbe2b89aee9693c2f8f186ea59fcfc4ebec7188cca0418d4583a6f1730f62416d70cd62555eb4f58ea831d1fea9956a2cba0049f23bf0b249f5de2ce0dc303808d70b0ccab3c7f37e949e", 0xd7}], 0x1, &(0x7f0000000980)}, 0x4010) r3 = syz_open_dev$sg(&(0x7f0000000240)='/dev/sg#\x00', 0x6, 0x4000) ioctl$SNDRV_TIMER_IOCTL_SELECT(r3, 0x40345410, &(0x7f0000000280)={{0x2, 0x1, 0x5, 0x0, 0x8}}) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0xb, 0x9, &(0x7f0000000580)=@framed={{0x18}, [@map={0x18, 0x0, 0x1, 0x0, r1}, @generic={0x3ff, 0xfffffffffffffffc, 0x1}, @call={0x85, 0x0, 0x0, 0x6}], {0x95}}, &(0x7f0000000600)='syzkaller\x00', 0x0, 0x30, &(0x7f0000000640)=""/48, 0x41f00, 0x1}, 0x48) ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, r4) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000000)={&(0x7f0000000080)='./file0/file0\x00', r1}, 0x10) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000400)=@ax25={0x3, {"02f47b3723e03d"}}, 0x80, &(0x7f00000017c0), 0x0, &(0x7f0000001840)=ANY=[], 0x0, 0x24004044}, 0x4008001) bpf$MAP_CREATE(0x0, &(0x7f0000002cc0)={0x5, 0x100, 0x56c96e7a, 0x2, 0xa, 0xffffffffffffffff, 0x9}, 0x2c) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000480)='rpc_pipefs\x00', 0x200000, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000002d00)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x40082406, &(0x7f00000004c0)='vmnet0keyring\x00') bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000780)={&(0x7f0000000740)='./file0/file0\x00', r5}, 0x10) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, &(0x7f0000000700)='proc!@ppp1!ppp0ppp0#)lo\\lolo{\x00') mount(&(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000200)='fuseblk\x00', 0xa11800, &(0x7f0000000240)) mount(&(0x7f00000002c0)='./file0/file0\x00', &(0x7f0000000300)='./file0/file0\x00', &(0x7f0000000340)='minix\x00', 0x0, &(0x7f0000000380)) 2018/03/29 17:35:00 executing program 4: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)={0xb, 0x7e, 0x3, 0x1, 0x11}, 0x2c) mount(&(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) r1 = socket$kcm(0x29, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000000bc0)={&(0x7f00000007c0)=@rc={0x1f, {0x5, 0x50000000, 0xaa2, 0x613, 0x4, 0x1ff}, 0x3f}, 0x80, &(0x7f0000000940)=[{&(0x7f0000000840)="09c9453aa30d8c5fba221fa2413f12c580837b2ae292e3ee8dd00098c404125a1a2e63840f82a2f69c3927af43b828422484aaeeceebcbe76e999bd3930c9b7c2995484407f9166e39c2069a88b63a980b9b5ffc880f4b89dde5adae6c7fb84ed98cbac860214dfb0b28d1b2e2d58aefebdfe515334f2ffa46be22ef7a4b3a276cb70a27c9e9f5de0a20bad24cbe2b89aee9693c2f8f186ea59fcfc4ebec7188cca0418d4583a6f1730f62416d70cd62555eb4f58ea831d1fea9956a2cba0049f23bf0b249f5de2ce0dc303808d70b0ccab3c7f37e949e", 0xd7}], 0x1, &(0x7f0000000980), 0x0, 0x20004805}, 0x4010) r2 = perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x2367, 0x7fff, 0x1, 0x6, 0x0, 0x78b1, 0x1, 0x0, 0x4992c766, 0xff, 0x81, 0x100, 0x40, 0x3, 0x9, 0x8, 0x1, 0x10000, 0x0, 0x6, 0x90e, 0x9, 0x7ff, 0x0, 0x8, 0x1, 0x30, 0x20, 0x7fffffff, 0x6, 0x401, 0x2, 0x1000, 0x8001, 0x1ff, 0xfffffffffffffff8, 0x0, 0x2, 0x0, @perf_config_ext={0x5, 0x8}, 0x1ab23, 0x3f, 0x8, 0x5, 0x6}, 0xffffffffffffffff, 0x10, 0xffffffffffffffff, 0x1) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0xb, 0x9, &(0x7f0000000580)=@framed={{0x18}, [@map={0x18, 0x0, 0x1, 0x0, r0}, @generic={0x3ff, 0xfffffffffffffffc, 0x1}, @call={0x85, 0x0, 0x0, 0x6}], {0x95}}, &(0x7f0000000600)='syzkaller\x00', 0x0, 0x30, &(0x7f0000000640)=""/48, 0x41f00, 0x1}, 0x48) ioctl$PERF_EVENT_IOC_SET_BPF(r2, 0x40042408, r3) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000000)={&(0x7f0000000080)='./file0/file0\x00', r0}, 0x10) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000400)=@ax25={0x3, {"02f47b3723e03d"}}, 0x80, &(0x7f00000017c0), 0x0, &(0x7f0000001840)=ANY=[], 0x0, 0x24004044}, 0x4008001) bpf$MAP_CREATE(0x0, &(0x7f0000002cc0)={0x5, 0x100, 0x56c96e7a, 0x2, 0xa, 0xffffffffffffffff, 0x9}, 0x2c) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000480)='rpc_pipefs\x00', 0x200000, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000002d00)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f00000004c0)='vmnet0keyring\x00') bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000780)={&(0x7f0000000740)='./file0/file0\x00', r4}, 0x10) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x40082406, &(0x7f0000000700)='proc!@ppp1!ppp0ppp0#)lo\\lolo{\x00') mount(&(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000200)='fuseblk\x00', 0xa11800, &(0x7f0000000240)) r5 = syz_open_dev$sg(&(0x7f0000000240)='/dev/sg#\x00', 0xfffffffffffffffa, 0x800) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000280)={r5, r3, 0x5, 0x1}, 0x10) ioctl$TIOCCONS(r5, 0x541d) mount(&(0x7f00000002c0)='./file0/file0\x00', &(0x7f0000000300)='./file0/file0\x00', &(0x7f0000000340)='minix\x00', 0x1000, &(0x7f0000000380)) 2018/03/29 17:35:00 executing program 1: socketpair$inet_icmp(0x2, 0x2, 0x1, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000040)='erspan0\x00', 0x10) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(0xffffffffffffffff, 0x6, 0x1d, &(0x7f00000016c0)={0x800040, 0x3e0000000, 0x0, 0x5, 0x1b}, 0x14) r1 = syz_open_dev$sndtimer(&(0x7f00001f1000)='/dev/snd/timer\x00', 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_SELECT(r1, 0x40345410, &(0x7f00007e5fcc)={{0x100000001}}) keyctl$session_to_parent(0x12) r2 = syz_open_procfs(0x0, &(0x7f0000939f01)='net/ip_vs\x00') sendmsg$unix(r2, &(0x7f0000000240)={&(0x7f0000000040)=@abs={0x1, 0x0, 0x4e23}, 0x6e, &(0x7f0000000200)=[{&(0x7f00000000c0)}], 0x1, 0x0, 0x0, 0x4000}, 0x81) getsockopt$inet_sctp_SCTP_GET_ASSOC_STATS(0xffffffffffffffff, 0x84, 0x70, &(0x7f0000000380)={0x0, @in6={{0xa, 0x0, 0x0, @mcast1={0xff, 0x1, [], 0x1}}}, [0x4, 0x100000001, 0x100000001, 0x2, 0xbf5, 0x400, 0x10000, 0x100000000000007, 0x5, 0x4, 0x6, 0x2, 0x1000000000000, 0x1600cbf6, 0x8]}, &(0x7f0000000480)=0x100) getsockopt$inet_sctp_SCTP_ASSOCINFO(0xffffffffffffffff, 0x84, 0x1, &(0x7f00000002c0)={r3, 0x0, 0x7, 0x0, 0x2c8cb13f, 0x6}, &(0x7f0000000300)=0x14) getsockopt$inet_sctp_SCTP_GET_LOCAL_ADDRS(r2, 0x84, 0x6d, &(0x7f0000000b80)=ANY=[@ANYBLOB="e10000003916f8e85b7ab93a2ae879b371ac6dc798fc9cb936fff93f0853daa40238e5f79def20410d3e02584118ab47aebf3692ed084d3bbd6cdf6d3a9d7dfd7da4664b9bd6f9bfa05bb0c81c08e9ca303c7783f41aad074dcafe2fcb5ba017d5ee17e3f241374512b25666b8abfdaa59a2a08f990354e457c0ae9c8f7768658ffff257c6fa8f274de687af5b3dc8065d289d9df705897cb6846aefdcae7e"], &(0x7f00000005c0)=0x1) getsockopt$inet_sctp6_SCTP_CONTEXT(r2, 0x84, 0x11, &(0x7f0000000600)={r3, 0x10000}, &(0x7f0000000640)=0x8) getsockopt$inet_sctp_SCTP_MAX_BURST(r2, 0x84, 0x14, &(0x7f00000004c0), &(0x7f0000000500)=0x4) preadv(r2, &(0x7f0000000000), 0x0, 0x0) r4 = syz_open_dev$sndseq(&(0x7f00000000c0)='/dev/snd/seq\x00', 0x0, 0x4000) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r4, 0xc0a85320, &(0x7f0000000100)={{0x80000001, 0x4}, 'port0\x00', 0x80, 0x43781877a2144564, 0x0, 0x80000000000, 0xfffffffffffffffb, 0x7, 0x7c, 0x0, 0x1, 0x10000}) getdents64(r2, &(0x7f0000000840)=""/1, 0x1) chroot(&(0x7f0000000700)='./file0\x00') getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000a00)={{{@in6=@remote, @in=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@loopback}, 0x0, @in6}}, &(0x7f0000000b00)=0xe8) syz_fuseblk_mount(&(0x7f0000000980)='./file0\x00', &(0x7f00000009c0)='./file0\x00', 0x0, r5, 0x0, 0x9, 0xfff, 0x8000) vmsplice(r4, &(0x7f0000000740)=[{&(0x7f0000000680)="f0f299c3ae1c8ddd0bb313045d279104b1ea6581b98e9a486061ea1e717e204d133fbdf5bebc57721bbc60dcdeb8a4e750185ad250db3b4cfcf636fbcd14fdd3f6afa31c47c5cd60a88da23c76527968c77509588e9a30f0c2f5bfcc0b42c2a09afa5ced47109f8a660e70", 0x6b}], 0x1, 0x4) ioctl$SNDRV_TIMER_IOCTL_PARAMS(r1, 0x40505412, &(0x7f000001cfb0)={0xfefffffffffffffc}) readv(r1, &(0x7f0000000240)=[{&(0x7f0000000140)=""/230, 0xe6}], 0x1) 2018/03/29 17:35:00 executing program 2: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)={0xb, 0x7e, 0x3, 0x1, 0x11}, 0x2c) mount(&(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) r1 = socket$kcm(0x29, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000000bc0)={&(0x7f00000007c0)=@rc={0x1f, {0x5, 0x50000000, 0xaa2, 0x613, 0x4, 0x1ff}, 0x3f}, 0x80, &(0x7f0000000940)=[{&(0x7f0000000840)="09c9453aa30d8c5fba221fa2413f12c580837b2ae292e3ee8dd00098c404125a1a2e63840f82a2f69c3927af43b828422484aaeeceebcbe76e999bd3930c9b7c2995484407f9166e39c2069a88b63a980b9b5ffc880f4b89dde5adae6c7fb84ed98cbac860214dfb0b28d1b2e2d58aefebdfe515334f2ffa46be22ef7a4b3a276cb70a27c9e9f5de0a20bad24cbe2b89aee9693c2f8f186ea59fcfc4ebec7188cca0418d4583a6f1730f62416d70cd62555eb4f58ea831d1fea9956a2cba0049f23bf0b249f5de2ce0dc303808d70b0ccab3c7f37e949e", 0xd7}], 0x1, &(0x7f0000000980), 0x0, 0x20004805}, 0x4010) r2 = perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x2367, 0x7fff, 0x1, 0x6, 0x0, 0x78b1, 0x1, 0x0, 0x4992c766, 0xff, 0x81, 0x100, 0x40, 0x3, 0x9, 0x8, 0x1, 0x10000, 0x0, 0x6, 0x90e, 0x9, 0x7ff, 0x0, 0x8, 0x1, 0x30, 0x20, 0x7fffffff, 0x6, 0x401, 0x2, 0x1000, 0x8001, 0x1ff, 0xfffffffffffffff8, 0x0, 0x2, 0x0, @perf_config_ext={0x5, 0x8}, 0x1ab23, 0x0, 0x8, 0x5, 0x6, 0x0, 0x6}, 0xffffffffffffffff, 0x10, r0, 0x1) bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0xb, 0x9, &(0x7f0000000580)=@framed={{0x18}, [@map={0x18, 0x0, 0x1, 0x0, r0}, @generic={0x3ff, 0xfffffffffffffffc, 0x1}, @call={0x85, 0x0, 0x0, 0x6}], {0x95}}, &(0x7f0000000600)='syzkaller\x00', 0x0, 0x30, &(0x7f0000000640)=""/48, 0x41f00, 0x1}, 0x48) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000000)={&(0x7f0000000080)='./file0/file0\x00', r0}, 0x10) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000400)=@ax25={0x3, {"02f47b3723e03d"}}, 0x80, &(0x7f00000017c0), 0x0, &(0x7f0000001840)=ANY=[], 0x0, 0x24004044}, 0x4008001) bpf$MAP_CREATE(0x0, &(0x7f0000002cc0)={0x5, 0x0, 0x56c96e7a, 0x2, 0xa, 0xffffffffffffffff, 0x9}, 0x2c) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffff9c, 0x29, 0x22, &(0x7f0000000980)={{{@in=@multicast2, @in=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@local}, 0x0, @in6=@mcast2}}, &(0x7f0000000240)=0xe8) getresgid(&(0x7f0000000280)=0x0, &(0x7f0000000a80), &(0x7f0000000ac0)) fchown(r0, r3, r4) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000480)='rpc_pipefs\x00', 0x200000, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000002d00)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f00000004c0)='vmnet0keyring\x00') bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000780)={&(0x7f0000000740)='./file0/file0\x00', r5}, 0x10) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x40082406, &(0x7f0000000700)='proc!@ppp1!ppp0ppp0#)lo\\lolo{\x00') mount(&(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000200)='fuseblk\x00', 0xa11800, &(0x7f0000000240)) mount(&(0x7f00000002c0)='./file0/file0\x00', &(0x7f0000000300)='./file0/file0\x00', &(0x7f0000000340)='minix\x00', 0x1000, &(0x7f0000000380)) 2018/03/29 17:35:00 executing program 5: r0 = socket(0xa, 0x2, 0x0) flock(0xffffffffffffffff, 0x6) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000200)) sendto$inet(r0, &(0x7f0000509f92), 0xff77, 0x8000, &(0x7f000055fff0)={0x2, 0x4e23, @loopback=0x7f000001}, 0x10) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000b00)='./cgroup.cpu\x00', 0x200002, 0x0) setsockopt$inet_mreq(r0, 0x0, 0x27, &(0x7f0000000480)={@empty, @remote={0xac, 0x14, 0x14, 0xbb}}, 0x8) fchdir(r1) fstat(0xffffffffffffffff, &(0x7f0000000180)) bind$inet(0xffffffffffffffff, &(0x7f0000000440)={0x2, 0x0, @multicast1=0xe0000001}, 0x10) r2 = creat(&(0x7f0000000100)='./file1\x00', 0x0) fallocate(r2, 0x1, 0x0, 0x20004d2d) ioctl$DRM_IOCTL_SET_VERSION(0xffffffffffffffff, 0xc0106407, &(0x7f00000000c0)={0x0, 0x2}) socket$inet6_icmp(0xa, 0x2, 0x3a) sendmsg$inet_sctp(r0, &(0x7f000050dfc8)={&(0x7f0000000840)=@in6={0xa, 0x4e24, 0x80000001, @mcast1={0xff, 0x1, [], 0x1}}, 0x1c, &(0x7f00000005c0), 0x0, &(0x7f0000576000)}, 0x0) ioctl$EVIOCGPROP(0xffffffffffffffff, 0x80404509, &(0x7f00000003c0)=""/25) getsockopt$inet_sctp6_SCTP_GET_LOCAL_ADDRS(r1, 0x84, 0x6d, &(0x7f00000002c0)={0x0, 0x7e, "147b31a6c8d04526e5f78a8fe27845051f555f699446cd55da4ba6fc8873a807fa51bb4eab22c5df774cd217b3b2c0af891a34aae4b6aa2b7e16f7b4fd5dcc91ee95c14977580183e86a5e903258265c96396582cadd0075864a1d1b58c4036a1ea7b763df062b4b66c882ba9442bac3b9b6d420938dca4b48c863fb4acd"}, &(0x7f0000000240)=0x86) setsockopt$inet_sctp_SCTP_DEFAULT_PRINFO(r0, 0x84, 0x72, &(0x7f0000000380)={r3, 0x10000, 0x30}, 0xc) sendto$inet6(r0, &(0x7f0000000240), 0x0, 0x0, &(0x7f0000000280)={0xa, 0x4e23, 0x3, @local={0xfe, 0x80, [], 0xaa}, 0x9}, 0x1c) getpeername$packet(0xffffffffffffffff, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @broadcast}, &(0x7f0000000a00)=0x14) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000000)={{{@in=@multicast2, @in6=@dev}}, {{@in=@multicast1}, 0x0, @in6=@ipv4={[], [], @remote}}}, &(0x7f0000000140)=0xe8) 2018/03/29 17:35:00 executing program 6: r0 = open(&(0x7f0000000440)='./file0\x00', 0x1ffff, 0x5) ioctl$TIOCLINUX7(0xffffffffffffffff, 0x541c, &(0x7f0000000080)={0x7}) setsockopt$inet_tcp_int(r0, 0x6, 0x0, &(0x7f00000003c0)=0x6, 0xf4) perf_event_open(&(0x7f0000000240)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000180)='/dev/sequencer2\x00', 0x12100, 0x0) clock_gettime(0x0, &(0x7f00000001c0)={0x0, 0x0}) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r1, 0x4040534e, &(0x7f0000000340)={0x124, @time={r2, r3+30000000}, 0x1, {0x8}, 0x101, 0x2}) r4 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000040)='/dev/rtc\x00', 0x0, 0x0) r5 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000580)='/dev/sequencer\x00', 0x0, 0x0) ioctl$LOOP_CLR_FD(r4, 0x7003) getsockopt$inet_sctp_SCTP_FRAGMENT_INTERLEAVE(0xffffffffffffffff, 0x84, 0x12, &(0x7f0000000140), &(0x7f00000002c0)=0x4) setsockopt$packet_buf(0xffffffffffffffff, 0x107, 0xd, &(0x7f00000004c0)="d9fb4f1bcfd3e0c1355ea2018b25a4fd911d8abc3f3fd71f4749878ac1fbce6e5d188e078b15be141905d7966406e4f3fb021da63028837a8407bcb3e3a676d251bcd09a04964ed9cd0f6cece267dc4bada0403dcef25dace8875f4a6495eb2e6cc4969e7de83153459b4d61669ed9eb7567", 0x72) perf_event_open(&(0x7f00000000c0)={0x0, 0x70, 0x0, 0x0, 0x7ff, 0xa1, 0x0, 0x1, 0x200, 0x2, 0x5, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x1, 0x4, 0xb0, 0x5, 0x0, 0x0, 0xcf, 0x0, 0xffffffffffffffff, 0x100000000, 0x3ff, 0x0, 0x0, 0x2, 0x1f, 0x2, 0x5, 0x9, 0x3, 0x0, 0x4, 0x0, 0x20000000, 0x195d678803a3a953, @perf_config_ext={0x9, 0x5}, 0x10, 0x3, 0x8, 0x0, 0x72eb, 0x99, 0x1}, 0x0, 0xd, r4, 0x8) mq_notify(r5, &(0x7f0000000400)) execve(&(0x7f0000000200)='./file0\x00', &(0x7f0000000680)=[&(0x7f0000000600)='\x00', &(0x7f0000000640)='proc\x00'], &(0x7f0000000740)=[&(0x7f00000006c0)='\'\x00', &(0x7f0000000700)='trustedwlan0vmnet0@%\x00']) 2018/03/29 17:35:00 executing program 3: r0 = socket(0xa, 0x2, 0x0) r1 = open(&(0x7f00004b8ff8)='./file0\x00', 0x28042, 0x0) connect$inet6(r0, &(0x7f0000d3cfe4)={0xa, 0x0, 0x0, @mcast2={0xff, 0x2, [], 0x1}, 0x3}, 0x1c) ioctl$DRM_IOCTL_ADD_CTX(r1, 0xc0086420, &(0x7f00000000c0)) ioctl$DRM_IOCTL_NEW_CTX(r1, 0x40086425, &(0x7f0000000080)={0x0, 0x3}) fallocate(r1, 0x0, 0xffff, 0x1f) setsockopt$inet6_mtu(0xffffffffffffffff, 0x29, 0x17, &(0x7f0000000100)=0x2, 0x4) connect$inet(r0, &(0x7f0000000040)={0x2, 0x4e22, @multicast1=0xe0000001}, 0x10) sendfile(r0, r1, &(0x7f00005faff8), 0xfffb) 2018/03/29 17:35:00 executing program 7: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)={0xb, 0x7e, 0x3, 0x1, 0x11}, 0x2c) mount(&(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) r1 = socket$kcm(0x29, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000000bc0)={&(0x7f00000007c0)=@rc={0x1f, {0x5, 0x50000000, 0xaa2, 0x613, 0x4, 0x1ff}, 0x3f}, 0x80, &(0x7f0000000940)=[{&(0x7f0000000840)="09c9453aa30d8c5fba221fa2413f12c580837b2ae292e3ee8dd00098c404125a1a2e63840f82a2f69c3927af43b828422484aaeeceebcbe76e999bd3930c9b7c2995484407f9166e39c2069a88b63a980b9b5ffc880f4b89dde5adae6c7fb84ed98cbac860214dfb0b28d1b2e2d58aefebdfe515334f2ffa46be22ef7a4b3a276cb70a27c9e9f5de0a20bad24cbe2b89aee9693c2f8f186ea59fcfc4ebec7188cca0418d4583a6f1730f62416d70cd62555eb4f58ea831d1fea9956a2cba0049f23bf0b249f5de2ce0dc303808d70b0ccab3c7f37e949e", 0xd7}], 0x1, &(0x7f0000000980), 0x0, 0x20004805}, 0x4010) r2 = perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x2367, 0x7fff, 0x1, 0x6, 0x0, 0x78b1, 0x1, 0x0, 0x4992c766, 0xff, 0x81, 0x100, 0x40, 0x3, 0x9, 0x8, 0x1, 0x10000, 0x0, 0x6, 0x90e, 0x9, 0x7ff, 0x0, 0x8, 0x1, 0x30, 0x20, 0x7fffffff, 0x6, 0x401, 0x2, 0x1000, 0x8001, 0x1ff, 0xfffffffffffffff8, 0x0, 0x2, 0x0, @perf_config_ext={0x5, 0x8}, 0x1ab23, 0x3f, 0x8, 0x5, 0x6, 0x0, 0x6}, 0xffffffffffffffff, 0x10, r0, 0x1) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0xb, 0x9, &(0x7f0000000580)=ANY=[@ANYBLOB="1800000000000000000000000000000018100000", @ANYRES32=r0, @ANYBLOB="0000000000000000fffc010000000000000000000000d306850000000600000000000000000000009500000000000000"], &(0x7f0000000600)='syzkaller\x00', 0x0, 0x30, &(0x7f0000000640)=""/48, 0x41f00, 0x1}, 0x48) ioctl$PERF_EVENT_IOC_SET_BPF(r2, 0x40042408, r3) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000000)={&(0x7f0000000080)='./file0/file0\x00', r0}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f0000002cc0)={0x5, 0x0, 0x56c96e7a, 0x2, 0xa, 0xffffffffffffffff, 0x9}, 0x2c) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000480)='rpc_pipefs\x00', 0x200000, 0x0) r4 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000280)='/dev/vcs\x00', 0x2, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000002d00)={0xffffffffffffffff, 0xffffffffffffffff}) openat$cgroup_ro(r0, &(0x7f0000000240)='cgroup.stat\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f00000004c0)='vmnet0keyring\x00') bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000780)={&(0x7f0000000740)='./file0/file0\x00', r5}, 0x10) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x40082406, &(0x7f0000000700)='proc!@ppp1!ppp0ppp0#)lo\\lolo{\x00') ioctl$PERF_EVENT_IOC_DISABLE(r4, 0x2401, 0x1f) mount(&(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000200)='fuseblk\x00', 0xa11800, &(0x7f0000000240)) mount(&(0x7f00000002c0)='./file0/file0\x00', &(0x7f0000000300)='./file0/file0\x00', &(0x7f0000000340)='minix\x00', 0x1000, &(0x7f0000000380)) 2018/03/29 17:35:00 executing program 2: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)={0xb, 0x7e, 0x3, 0x1, 0x11}, 0x2c) mount(&(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) r1 = socket$kcm(0x29, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000000bc0)={&(0x7f00000007c0)=@rc={0x1f, {0x5, 0x50000000, 0xaa2, 0x613, 0x4, 0x1ff}, 0x3f}, 0x80, &(0x7f0000000940)=[{&(0x7f0000000840)="09c9453aa30d8c5fba221fa2413f12c580837b2ae292e3ee8dd00098c404125a1a2e63840f82a2f69c3927af43b828422484aaeeceebcbe76e999bd3930c9b7c2995484407f9166e39c2069a88b63a980b9b5ffc880f4b89dde5adae6c7fb84ed98cbac860214dfb0b28d1b2e2d58aefebdfe515334f2ffa46be22ef7a4b3a276cb70a27c9e9f5de0a20bad24cbe2b89aee9693c2f8f186ea59fcfc4ebec7188cca0418d4583a6f1730f62416d70cd62555eb4f58ea831d1fea9956a2cba0049f23bf0b249f5de2ce0dc303808d70b0ccab3c7f37e949e", 0xd7}], 0x1, &(0x7f0000000980), 0x0, 0x20004805}, 0x4010) setxattr(&(0x7f0000000980)='./file0/file1\x00', &(0x7f00000009c0)=@known='trusted.syz\x00', &(0x7f0000000a00)='#\x00', 0x2, 0x2) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0xb, 0x9, &(0x7f0000000580)=@framed={{0x18}, [@map={0x18, 0x0, 0x1, 0x0, r0}, @generic={0x3ff, 0xfffffffffffffffc, 0x1}, @call={0x85, 0x0, 0x0, 0x6}], {0x95}}, &(0x7f0000000600)='syzkaller\x00', 0x0, 0x30, &(0x7f0000000640)=""/48, 0x41f00, 0x1}, 0x48) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000000)={&(0x7f0000000080)='./file0/file0\x00', r0}, 0x10) r3 = dup2(r1, r1) r4 = request_key(&(0x7f0000000a80)='ceph\x00', &(0x7f0000002a40)={0x73, 0x79, 0x7a, 0x0}, &(0x7f0000002a80)='&selinuxuservboxnet0\x00', 0xfffffffffffffff9) keyctl$revoke(0x3, r4) ioctl$KDSKBMETA(r3, 0x4b63, &(0x7f0000000a40)=0x5) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000400)=@ax25={0x3, {"02f47b3723e03d"}}, 0x80, &(0x7f00000017c0), 0x0, &(0x7f0000001840)=ANY=[], 0x0, 0x24004044}, 0x4008001) bpf$MAP_CREATE(0x0, &(0x7f0000002cc0)={0x5, 0x0, 0x56c96e7a, 0x2, 0xa, 0xffffffffffffffff, 0x9}, 0x2c) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000480)='rpc_pipefs\x00', 0x200000, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000002d00)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f00000004c0)='vmnet0keyring\x00') bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000780)={&(0x7f0000000740)='./file0/file0\x00', r5}, 0x10) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, &(0x7f0000000700)='proc!@ppp1!ppp0ppp0#)lo\\lolo{\x00') r6 = syz_open_dev$midi(&(0x7f0000000ac0)='/dev/midi#\x00', 0x7, 0x2000) sendmsg$rds(r6, &(0x7f0000002a00)={&(0x7f0000000b00)={0x2, 0x4e20, @broadcast=0xffffffff}, 0x10, &(0x7f0000001f80)=[{&(0x7f0000000c00)=""/4096, 0x1000}, {&(0x7f0000000b40)=""/29, 0x1d}, {&(0x7f0000001c00)=""/191, 0xbf}, {&(0x7f0000001cc0)=""/206, 0xce}, {&(0x7f0000001dc0)=""/241, 0xf1}, {&(0x7f0000001ec0)=""/189, 0xbd}], 0x6, &(0x7f0000002d40)=[@rdma_map={0x30, 0x114, 0x3, {{&(0x7f0000002000)=""/230, 0xe6}, &(0x7f0000000b80), 0x4}}, @rdma_map={0x30, 0x114, 0x3, {{&(0x7f0000002100)=""/144, 0x90}, &(0x7f00000021c0), 0x50}}, @cswp={0x58, 0x114, 0x7, {{0x9, 0x7ff}, &(0x7f0000002200)=0x9, &(0x7f0000002240)=0x7, 0x3, 0x2, 0x0, 0x0, 0x40, 0x400}}, @cswp={0x58, 0x114, 0x7, {{0x9d, 0x1}, &(0x7f0000002280), &(0x7f00000022c0)=0x100000001, 0x8, 0x20, 0x1b, 0x7f, 0x0, 0x3}}, @cswp={0x58, 0x114, 0x7, {{0x4}, &(0x7f0000002300)=0x9, &(0x7f0000002340)=0x9, 0xfc2, 0x1, 0x5, 0x20, 0x45, 0xa1}}, @cswp={0x58, 0x114, 0x7, {{0x8, 0x3}, &(0x7f0000002380)=0x1ee9, &(0x7f00000023c0)=0x10000, 0x100000001, 0x8, 0x0, 0x8, 0x28, 0x7}}, @rdma_args={0x48, 0x114, 0x1, {{0x8, 0x1a}, {&(0x7f0000002400)=""/163, 0xa3}, &(0x7f0000002800)=[{&(0x7f00000024c0)=""/239, 0xef}, {&(0x7f00000025c0)=""/207, 0xcf}, {&(0x7f00000026c0)=""/43, 0x2b}, {&(0x7f0000002700)=""/228, 0xe4}], 0x4, 0x35, 0x1}}, @cswp={0x58, 0x114, 0x7, {{0x4, 0x394e}, &(0x7f0000002840)=0x5, &(0x7f0000002880)=0x1, 0x100000000, 0x3, 0x6, 0x3, 0x55, 0x1}}, @rdma_map={0x30, 0x114, 0x3, {{&(0x7f00000028c0)=""/118, 0x76}, &(0x7f0000002940), 0x4c}}, @cswp={0x58, 0x114, 0x7, {{0x0, 0x40}, &(0x7f0000002980)=0x1, &(0x7f00000029c0)=0x4, 0x3, 0x9, 0x17b, 0x4, 0x18, 0x4}}], 0x2e8, 0x20000090}, 0x0) mount(&(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000200)='fuseblk\x00', 0xa11800, &(0x7f0000000240)) mount(&(0x7f00000002c0)='./file0/file0\x00', &(0x7f0000000300)='./file0/file0\x00', &(0x7f0000000340)='minix\x00', 0x1000, &(0x7f0000000380)) getsockopt$SO_COOKIE(r2, 0x1, 0x39, &(0x7f0000000500), &(0x7f0000000540)=0x8) syz_open_dev$mice(&(0x7f0000000240)='/dev/input/mice\x00', 0x0, 0x100) ioctl$sock_ipx_SIOCAIPXITFCRT(r6, 0x89e0, &(0x7f0000000280)=0x20) 2018/03/29 17:35:00 executing program 4: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)={0xb, 0x7e, 0x3, 0x1, 0x11}, 0x2c) mount(&(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) r1 = socket$kcm(0x29, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000000bc0)={&(0x7f00000007c0)=@rc={0x1f, {0x5, 0x50000000, 0xaa2, 0x613, 0x4, 0x1ff}, 0x3f}, 0x80, &(0x7f0000000940)=[{&(0x7f0000000840)="09c9453aa30d8c5fba221fa2413f12c580837b2ae292e3ee8dd00098c404125a1a2e63840f82a2f69c3927af43b828422484aaeeceebcbe76e999bd3930c9b7c2995484407f9166e39c2069a88b63a980b9b5ffc880f4b89dde5adae6c7fb84ed98cbac860214dfb0b28d1b2e2d58aefebdfe515334f2ffa46be22ef7a4b3a276cb70a27c9e9f5de0a20bad24cbe2b89aee9693c2f8f186ea59fcfc4ebec7188cca0418d4583a6f1730f62416d70cd62555eb4f58ea831d1fea9956a2cba0049f23bf0b249f5de2ce0dc303808d70b0ccab3c7f37e949e", 0xd7}], 0x1, &(0x7f0000000980), 0x0, 0x20004805}, 0x4010) r2 = perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x2367, 0x7fff, 0x1, 0x6, 0x0, 0x78b1, 0x1, 0x0, 0x4992c766, 0xff, 0x81, 0x100, 0x40, 0x3, 0x9, 0x8, 0x1, 0x10000, 0x0, 0x6, 0x90e, 0x9, 0x7ff, 0x0, 0x8, 0x1, 0x30, 0x20, 0x7fffffff, 0x6, 0x401, 0x2, 0x1000, 0x8001, 0x1ff, 0xfffffffffffffff8, 0x0, 0x2, 0x0, @perf_config_ext={0x5, 0x8}, 0x1ab23, 0x3f, 0x8, 0x5, 0x6}, 0xffffffffffffffff, 0x10, 0xffffffffffffffff, 0x1) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0xb, 0x9, &(0x7f0000000580)=@framed={{0x18}, [@map={0x18, 0x0, 0x1, 0x0, r0}, @generic={0x3ff, 0xfffffffffffffffc, 0x1}, @call={0x85, 0x0, 0x0, 0x6}], {0x95}}, &(0x7f0000000600)='syzkaller\x00', 0x0, 0x30, &(0x7f0000000640)=""/48, 0x41f00, 0x1}, 0x48) ioctl$PERF_EVENT_IOC_SET_BPF(r2, 0x40042408, r3) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000000)={&(0x7f0000000080)='./file0/file0\x00', r0}, 0x10) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000400)=@ax25={0x3, {"02f47b3723e03d"}}, 0x80, &(0x7f00000017c0), 0x0, &(0x7f0000001840)=ANY=[], 0x0, 0x24004044}, 0x4008001) bpf$MAP_CREATE(0x0, &(0x7f0000002cc0)={0x5, 0x100, 0x56c96e7a, 0x2, 0xa, 0xffffffffffffffff, 0x9}, 0x2c) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000480)='rpc_pipefs\x00', 0x200000, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000002d00)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f00000004c0)='vmnet0keyring\x00') bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000780)={&(0x7f0000000740)='./file0/file0\x00', r4}, 0x10) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x40082406, &(0x7f0000000700)='proc!@ppp1!ppp0ppp0#)lo\\lolo{\x00') mount(&(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000200)='fuseblk\x00', 0xa11800, &(0x7f0000000240)) r5 = syz_open_dev$sg(&(0x7f0000000240)='/dev/sg#\x00', 0xfffffffffffffffa, 0x800) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000280)={r5, r3, 0x5, 0x1}, 0x10) ioctl$TIOCCONS(r5, 0x541d) mount(&(0x7f00000002c0)='./file0/file0\x00', &(0x7f0000000300)='./file0/file0\x00', &(0x7f0000000340)='minix\x00', 0x1000, &(0x7f0000000380)) 2018/03/29 17:35:00 executing program 6: socketpair$inet_icmp(0x2, 0x2, 0x1, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000040)='erspan0\x00', 0x10) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(0xffffffffffffffff, 0x6, 0x1d, &(0x7f00000016c0)={0x800040, 0x3e0000000, 0x0, 0x5, 0x1b}, 0x14) r1 = syz_open_dev$sndtimer(&(0x7f00001f1000)='/dev/snd/timer\x00', 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_SELECT(r1, 0x40345410, &(0x7f00007e5fcc)={{0x100000001}}) keyctl$session_to_parent(0x12) r2 = syz_open_procfs(0x0, &(0x7f0000939f01)='net/ip_vs\x00') sendmsg$unix(r2, &(0x7f0000000240)={&(0x7f0000000040)=@abs={0x1, 0x0, 0x4e23}, 0x6e, &(0x7f0000000200)=[{&(0x7f00000000c0)}], 0x1, 0x0, 0x0, 0x4000}, 0x81) getsockopt$inet_sctp_SCTP_GET_ASSOC_STATS(0xffffffffffffffff, 0x84, 0x70, &(0x7f0000000380)={0x0, @in6={{0xa, 0x0, 0x4, @mcast1={0xff, 0x1, [], 0x1}}}, [0x4, 0x100000001, 0x100000001, 0x2, 0xbf5, 0x400, 0x10000, 0x100000000000007, 0x5, 0x4, 0x6, 0x2, 0x1000000000000, 0x1600cbf6, 0x8]}, &(0x7f0000000480)=0x100) getsockopt$inet_sctp_SCTP_ASSOCINFO(0xffffffffffffffff, 0x84, 0x1, &(0x7f00000002c0)={r3, 0x0, 0x7, 0x800, 0x2c8cb13f, 0x6}, &(0x7f0000000300)=0x14) getsockopt$inet_sctp_SCTP_GET_LOCAL_ADDRS(r2, 0x84, 0x6d, &(0x7f0000000b80)=ANY=[@ANYRES32, @ANYBLOB="e10000003916f8e85b7ab93a2ae879b371ac6dc798fc9cb936fff93f0853daa40238e5f79def20410d3e02584118ab47aebf3692ed084d3bbd6cdf6d3a9d7dfd7da4664b9bd6f9bfa05b"], &(0x7f00000005c0)=0x2) getsockopt$inet_sctp6_SCTP_STATUS(r2, 0x84, 0xe, &(0x7f0000000880)={r3, 0xf1, 0x401, 0x100000000, 0x0, 0x4, 0xffffffffffffffe1, 0x2, {r3, @in6={{0xa, 0x4e23, 0x4, @dev={0xfe, 0x80}, 0x4}}, 0x6, 0x2, 0x3, 0x1, 0x1116}}, &(0x7f0000000940)=0xb0) getsockopt$inet_sctp_SCTP_MAX_BURST(r2, 0x84, 0x14, &(0x7f00000004c0), &(0x7f0000000500)=0x4) preadv(r2, &(0x7f0000000000), 0x0, 0x0) r4 = syz_open_dev$sndseq(&(0x7f00000000c0)='/dev/snd/seq\x00', 0x0, 0x4000) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r4, 0xc0a85320, &(0x7f0000000100)={{0x80000001, 0x4}, 'port0\x00', 0x80, 0x43781877a2144564, 0x0, 0x80000000000, 0x0, 0x7, 0x0, 0x0, 0x1}) getdents64(r2, &(0x7f0000000840)=""/1, 0x1) chroot(&(0x7f0000000700)='./file0\x00') getsockopt$inet6_IPV6_XFRM_POLICY(r2, 0x29, 0x23, &(0x7f0000000a00)={{{@in6=@remote, @in=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@loopback}, 0x0, @in6}}, &(0x7f0000000b00)=0xe8) getgroups(0x7, &(0x7f0000000b40)=[0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x0]) syz_fuseblk_mount(&(0x7f0000000980)='./file0\x00', &(0x7f00000009c0)='./file0\x00', 0x8000, r5, 0x0, 0x9, 0xfff, 0x8000) vmsplice(r4, &(0x7f0000000740)=[{&(0x7f0000000680)="f0f299c3ae1c8ddd0bb313045d279104b1ea6581b98e9a486061ea1e717e204d133fbdf5bebc57721bbc60dcdeb8a4e750185ad250db3b4cfcf636fbcd14fdd3f6afa31c47c5cd60a88da23c76527968c77509588e9a30f0c2f5bfcc0b42c2a09afa5ced47109f8a660e70bc83e021b5bf8b", 0x72}], 0x1, 0x4) ioctl$SNDRV_TIMER_IOCTL_PARAMS(r1, 0x40505412, &(0x7f000001cfb0)={0xfefffffffffffffc, 0xb}) readv(r1, &(0x7f0000000240)=[{&(0x7f0000000140)=""/230, 0xe6}], 0x1) 2018/03/29 17:35:00 executing program 1: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000ed4000)=0x78, 0x4) bind$inet(r0, &(0x7f0000deb000)={0x2, 0x4e23, @multicast1=0xe0000001}, 0x10) ioctl$sock_SIOCINQ(r0, 0x541b, &(0x7f0000000500)) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000f40ff8)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) setsockopt$inet_sctp_SCTP_RTOINFO(r0, 0x84, 0x0, &(0x7f0000000040)={0x0, 0x81, 0x0, 0x100000000}, 0x10) getsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(r0, 0x84, 0x18, &(0x7f00000003c0)={0x0, 0x7}, &(0x7f0000000400)=0x8) socketpair(0x11, 0x0, 0x5, &(0x7f0000000200)={0xffffffffffffffff}) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_INFO(r1, 0xc08c5334, &(0x7f0000000600)={0x6, 0x7, 0x2f29fdaf, 'queue0\x00', 0x800}) r2 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000080)='/dev/hwrng\x00', 0x4000, 0x0) sendto$inet(r0, &(0x7f0000a88f88), 0x29f, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @loopback=0x7f000001}, 0x10) pipe2(&(0x7f0000000580)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80002) ioctl$EVIOCGBITKEY(0xffffffffffffffff, 0x80404521, &(0x7f00000000c0)=""/160) sendmmsg(r0, &(0x7f00000025c0)=[{{&(0x7f0000000300)=@pppoe={0x18, 0x0, {0x0, @link_local={0x1, 0x80, 0xc2}, 'ip6tnl0\x00'}}, 0x80, &(0x7f0000000380)=[{&(0x7f00000010c0)="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", 0x598}], 0x1}}], 0x1, 0x4000) recvfrom$inet(r0, &(0x7f00009be000)=""/11, 0xe8, 0x0, 0x0, 0xffffffffffffff4e) bind$bt_l2cap(r3, &(0x7f0000000440)={0x1f, 0x8, {0x6, 0x400, 0x0, 0x2, 0x9, 0x3}, 0x10001, 0x2}, 0xe) setsockopt(r4, 0xb5, 0xffffffff, &(0x7f00000006c0), 0x0) getsockopt$inet_sctp_SCTP_RECVRCVINFO(r0, 0x84, 0x20, &(0x7f0000000180), &(0x7f00000001c0)=0x4) fcntl$getflags(r0, 0x3) sendmsg$netrom(r2, &(0x7f0000000b00)={&(0x7f0000000780)=@full={{0x3, {"53665db4283e1b"}, 0x3}, [{"d40335b6bcd5d9"}, {"d5952336c520fb"}, {"d326c92416d6ea"}, {"763aea9242214f"}, {"d716c11982a583"}, {"712de86f857435"}, {"1d8bd63f2c431c"}, {"6f5a0b1522aca6"}]}, 0x48, &(0x7f0000000ac0), 0x0, &(0x7f00000017c0), 0x0, 0x8000}, 0x4000840) setsockopt$inet_mtu(r2, 0x0, 0xa, &(0x7f0000000480)=0x7, 0x4) r5 = getpid() epoll_ctl$EPOLL_CTL_ADD(r2, 0x1, r2, &(0x7f00000004c0)={0x5}) syz_open_procfs(r5, &(0x7f00000005c0)='maps\x00') shutdown(r0, 0x1) 2018/03/29 17:35:00 executing program 0: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)={0xb, 0x7e, 0x3, 0x1, 0x11}, 0x2c) mount(&(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) r1 = getpgid(0xffffffffffffffff) r2 = syz_open_procfs(r1, &(0x7f000072d000)='smaps\x00') readv(r2, &(0x7f00009a5f80)=[{&(0x7f0000214000)=""/4096, 0x1000}], 0x100000000000021a) r3 = openat$ptmx(0xffffffffffffff9c, &(0x7f00003e0000)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r3, 0x40045431, &(0x7f00003b9fdc)) r4 = syz_open_pts(r3, 0x0) read(r4, &(0x7f000066b000)=""/1, 0x1) syz_open_pts(r3, 0x0) r5 = openat$rfkill(0xffffffffffffff9c, &(0x7f0000000180)='/dev/rfkill\x00', 0x0, 0x0) r6 = dup3(r4, r3, 0x0) sendmmsg(r2, &(0x7f00000027c0)=[{{&(0x7f0000000080)=@ll={0x11, 0x14, 0x0, 0x1, 0x0, 0x6, @local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}}, 0x80, &(0x7f0000000300)=[{&(0x7f0000000100)="9bbc52a640e64057ab53ca8249aef4401f72c2e579d355fa28b7e10e70a2", 0x1e}], 0x1, &(0x7f0000000340)=ANY=[], 0x0, 0x840}, 0x7}], 0x1, 0x4008050) readv(r2, &(0x7f0000f5c000)=[{&(0x7f0000002840)=""/4096, 0x1000}], 0x1) getsockopt$inet_sctp_SCTP_PR_SUPPORTED(r2, 0x84, 0x71, &(0x7f0000000040)={0x0, 0x2}, &(0x7f00000001c0)=0x8) setsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(r6, 0x84, 0x1f, &(0x7f0000000200)={r7, @in6={{0xa, 0x4e22, 0x3, @remote={0xfe, 0x80, [], 0xbb}, 0x80000001}}, 0x5, 0x17}, 0x90) ioctl$KVM_S390_UCAS_UNMAP(r5, 0x4018ae51, &(0x7f0000000000)={0x100000003ff, 0x0, 0x8000000000005e7}) ioctl$sock_inet6_SIOCSIFDSTADDR(r2, 0x8918, &(0x7f0000000140)={@local={0xfe, 0x80, [], 0xaa}, 0x2d}) r8 = socket$kcm(0x29, 0x2, 0x0) sendmsg$kcm(r8, &(0x7f0000000bc0)={&(0x7f00000007c0)=@rc={0x1f, {0x5, 0x50000000, 0xaa2, 0x613, 0x4, 0x1ff}}, 0x80, &(0x7f0000000940)=[{&(0x7f0000000840)="09c9453aa30d8c5fba221fa2413f12c580837b2ae292e3ee8dd00098c404125a1a2e63840f82a2f69c3927af43b828422484aaeeceebcbe76e999bd3930c9b7c2995484407f9166e39c2069a88b63a980b9b5ffc880f4b89dde5adae6c7fb84ed98cbac860214dfb0b28d1b2e2d58aefebdfe515334f2ffa46be22ef7a4b3a276cb70a27c9e9f5de0a20bad24cbe2b89aee9693c2f8f186ea59fcfc4ebec7188cca0418d4583a6f1730f62416d70cd62555eb4f58ea831d1fea9956a2cba0049f23bf0b249f5de2ce0dc303808d70b0ccab3c7f37e949e", 0xd7}], 0x1, &(0x7f0000000980)}, 0x4010) r9 = bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0xb, 0x9, &(0x7f0000000580)=@framed={{0x18}, [@map={0x18, 0x0, 0x1, 0x0, r0}, @generic={0x3ff, 0xfffffffffffffffc, 0x1}, @call={0x85, 0x0, 0x0, 0x6}], {0x95}}, &(0x7f0000000600)='syzkaller\x00', 0x0, 0x30, &(0x7f0000000640)=""/48, 0x41f00, 0x1}, 0x48) ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, r9) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000000)={&(0x7f0000000080)='./file0/file0\x00', r0}, 0x10) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000400)=@ax25={0x3, {"02f47b3723e03d"}}, 0x80, &(0x7f00000017c0), 0x0, &(0x7f0000001840)=ANY=[], 0x0, 0x24004044}, 0x4008001) bpf$MAP_CREATE(0x0, &(0x7f0000002cc0)={0x5, 0x100, 0x56c96e7a, 0x2, 0xa, 0xffffffffffffffff, 0x9}, 0x2c) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000480)='rpc_pipefs\x00', 0x200000, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000002d00)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f00000004c0)='vmnet0keyring\x00') bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000780)={&(0x7f0000000740)='./file0/file0\x00', r10}, 0x10) 2018/03/29 17:35:00 executing program 5: mq_open(&(0x7f0000000000)='-$\x00', 0x6e93ebbbcc0884f2, 0x0, &(0x7f0000664fc0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000}) memfd_create(&(0x7f00000001c0)='\x00', 0x0) syz_genetlink_get_family_id$ipvs(&(0x7f0000000280)='IPVS\x00') sendmsg$IPVS_CMD_GET_DAEMON(0xffffffffffffffff, &(0x7f0000000480)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x1082a0}, 0xc, &(0x7f0000000440)={&(0x7f0000000500)=ANY=[]}, 0x1}, 0x0) fchdir(0xffffffffffffffff) setxattr(&(0x7f00000003c0)='./file1\x00', &(0x7f0000000400)=@random={'user.', '{/\x00'}, &(0x7f00000004c0)='{\x00', 0x2, 0x0) syslog(0x0, &(0x7f00000000c0)=""/215, 0xd7) pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$UFFDIO_UNREGISTER(0xffffffffffffffff, 0x8010aa01, &(0x7f0000000080)={&(0x7f0000ffc000/0x2000)=nil, 0x2000}) r1 = creat(&(0x7f0000000000)='./file1\x00', 0x0) creat(&(0x7f0000000380)='./file1\x00', 0x0) write$evdev(r1, &(0x7f0000000280), 0xffffffffffffffd4) fsync(0xffffffffffffffff) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x3, 0x10, 0xffffffffffffffff, 0x0) add_key$user(&(0x7f0000000000)='user\x00', &(0x7f0000000040)={0x73, 0x79, 0x7a, 0x3}, &(0x7f0000000080), 0x0, 0x0) keyctl$assume_authority(0x10, 0x0) socket$inet6_udp(0xa, 0x2, 0x0) socket$l2tp(0x18, 0x1, 0x1) mq_timedsend(0xffffffffffffffff, &(0x7f0000000240)="37e6f77a3795ab4b8e0d35892dea11513cf71c63", 0x14, 0x0, &(0x7f0000000040)={0x77359400}) mq_timedreceive(0xffffffffffffffff, &(0x7f0000be2f7d)=""/131, 0xfffffffffffffffd, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_LOCAL_AUTH_CHUNKS(r0, 0x84, 0x1b, &(0x7f00000007c0)={0x0, 0x2e2, "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"}, &(0x7f00000002c0)=0x2ea) setsockopt$inet_sctp6_SCTP_DELAYED_SACK(r0, 0x84, 0x10, &(0x7f0000000500)=@assoc_value={0x0, 0x2b}, 0x8) request_key(&(0x7f0000000700)='ceph\x00', &(0x7f0000000740)={0x73, 0x79, 0x7a, 0x3}, &(0x7f0000000780)='^vboxnet0selinuxmd5sumvboxnet0self^cgroup^securitykeyring\x00', 0xfffffffffffffff8) keyctl$instantiate_iov(0x14, 0x0, &(0x7f00000006c0), 0x0, 0x0) ioctl$sock_inet_SIOCDARP(0xffffffffffffffff, 0x8953, &(0x7f0000000100)={{0x2, 0x0, @broadcast=0xffffffff}, {0x0, @remote={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xbb}}, 0x0, {0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x10}}, 'irlan0\x00'}) 2018/03/29 17:35:00 executing program 3: r0 = socket(0xa, 0x2, 0x0) r1 = open(&(0x7f00004b8ff8)='./file0\x00', 0x28042, 0x0) connect$inet6(r0, &(0x7f0000d3cfe4)={0xa, 0x0, 0x0, @mcast2={0xff, 0x2, [], 0x1}, 0x3}, 0x1c) ioctl$DRM_IOCTL_ADD_CTX(r1, 0xc0086420, &(0x7f0000000000)) ioctl$DRM_IOCTL_NEW_CTX(r1, 0x40086425, &(0x7f0000000080)={0x0, 0x3}) fallocate(r1, 0x0, 0xffff, 0x1f) setsockopt$inet6_mtu(0xffffffffffffffff, 0x29, 0x17, &(0x7f0000000100)=0x2, 0x4) connect$inet(r0, &(0x7f0000000040)={0x2, 0x4e22, @multicast1=0xe0000001}, 0x10) sendfile(r0, r1, &(0x7f00005faff8), 0xfffb) listen(r1, 0xffffffff) 2018/03/29 17:35:00 executing program 4: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)={0xb, 0x7e, 0x3, 0x1, 0x11}, 0x2c) mount(&(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) r1 = socket$kcm(0x29, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000000bc0)={&(0x7f00000007c0)=@rc={0x1f, {0x5, 0x50000000, 0xaa2, 0x613, 0x4, 0x1ff}, 0x3f}, 0x80, &(0x7f0000000940)=[{&(0x7f0000000840)="09c9453aa30d8c5fba221fa2413f12c580837b2ae292e3ee8dd00098c404125a1a2e63840f82a2f69c3927af43b828422484aaeeceebcbe76e999bd3930c9b7c2995484407f9166e39c2069a88b63a980b9b5ffc880f4b89dde5adae6c7fb84ed98cbac860214dfb0b28d1b2e2d58aefebdfe515334f2ffa46be22ef7a4b3a276cb70a27c9e9f5de0a20bad24cbe2b89aee9693c2f8f186ea59fcfc4ebec7188cca0418d4583a6f1730f62416d70cd62555eb4f58ea831d1fea9956a2cba0049f23bf0b249f5de2ce0dc303808d70b0ccab3c7f37e949e", 0xd7}], 0x1, &(0x7f0000000980), 0x0, 0x20004805}, 0x4010) r2 = perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x2367, 0x7fff, 0x1, 0x6, 0x0, 0x78b1, 0x1, 0x0, 0x4992c766, 0xff, 0x81, 0x100, 0x40, 0x3, 0x9, 0x8, 0x1, 0x10000, 0x0, 0x6, 0x90e, 0x9, 0x7ff, 0x0, 0x8, 0x1, 0x30, 0x20, 0x7fffffff, 0x6, 0x401, 0x2, 0x1000, 0x8001, 0x1ff, 0xfffffffffffffff8, 0x0, 0x2, 0x0, @perf_config_ext={0x5, 0x8}, 0x1ab23, 0x3f, 0x8, 0x5, 0x6}, 0xffffffffffffffff, 0x10, r0, 0x0) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0xb, 0x9, &(0x7f0000000580)=@framed={{0x18}, [@map={0x18, 0x0, 0x1, 0x0, r0}, @generic={0x3ff, 0xfffffffffffffffc, 0x1}, @call={0x85, 0x0, 0x0, 0x6}], {0x95}}, &(0x7f0000000600)='syzkaller\x00', 0x0, 0x30, &(0x7f0000000640)=""/48, 0x41f00, 0x1}, 0x48) ioctl$PERF_EVENT_IOC_SET_BPF(r2, 0x40042408, r3) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000000)={&(0x7f0000000080)='./file0/file0\x00', r0}, 0x10) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000400)=@ax25={0x3, {"02f47b3723e03d"}}, 0x80, &(0x7f00000017c0), 0x0, &(0x7f0000001840)=ANY=[], 0x0, 0x24004044}, 0x4008001) bpf$MAP_CREATE(0x0, &(0x7f0000002cc0)={0x5, 0x100, 0x56c96e7a, 0x2, 0xa, 0xffffffffffffffff, 0x9}, 0x2c) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000480)='rpc_pipefs\x00', 0x200000, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000002d00)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f00000004c0)='vmnet0keyring\x00') bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000780)={&(0x7f0000000740)='./file0/file0\x00', r4}, 0x10) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x40082406, &(0x7f0000000700)='proc!@ppp1!ppp0ppp0#)lo\\lolo{\x00') mount(&(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000200)='fuseblk\x00', 0xa11800, &(0x7f0000000240)) r5 = syz_open_dev$sg(&(0x7f0000000240)='/dev/sg#\x00', 0xfffffffffffffffa, 0x800) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000280)={r5, r3, 0x5, 0x1}, 0x10) ioctl$TIOCCONS(r5, 0x541d) mount(&(0x7f00000002c0)='./file0/file0\x00', &(0x7f0000000300)='./file0/file0\x00', &(0x7f0000000340)='minix\x00', 0x1000, &(0x7f0000000380)) 2018/03/29 17:35:00 executing program 5: perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8931, &(0x7f0000000000)={'bond0\x00'}) mmap(&(0x7f000092d000/0x400000)=nil, 0x400000, 0x7fffffff, 0x2000000208972, 0xffffffffffffffff, 0x0) syz_open_dev$sndpcmc(&(0x7f0000000000)='/dev/snd/pcmC#D#c\x00', 0x0, 0x101) madvise(&(0x7f000092d000/0x400000)=nil, 0x400000, 0x0) ioctl$DRM_IOCTL_AGP_ACQUIRE(0xffffffffffffffff, 0x6430) ioctl$KVM_IRQ_LINE(0xffffffffffffffff, 0x4008ae61, &(0x7f0000000100)={0x5}) clone(0x0, &(0x7f0000000000), &(0x7f0000000ffc), &(0x7f0000000ffc), &(0x7f0000000000)) mlock(&(0x7f0000a67000/0x2000)=nil, 0x2000) 2018/03/29 17:35:00 executing program 7: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)={0xb, 0x7e, 0x3, 0x1, 0x11}, 0x2c) mount(&(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) r1 = accept(0xffffffffffffff9c, &(0x7f0000000240)=@ethernet={0x0, @remote}, &(0x7f0000000980)=0x80) getpeername$netlink(r1, &(0x7f00000009c0), &(0x7f0000000a00)=0xc) r2 = socket$kcm(0x29, 0x2, 0x0) sendmsg$kcm(r2, &(0x7f0000000bc0)={&(0x7f00000007c0)=@rc={0x1f, {0x5, 0x50000000, 0xaa2, 0x613, 0x4, 0x1ff}, 0x3f}, 0x80, &(0x7f0000000940)=[{&(0x7f0000000840)="09c9453aa30d8c5fba221fa2413f12c580837b2ae292e3ee8dd00098c404125a1a2e63840f82a2f69c3927af43b828422484aaeeceebcbe76e999bd3930c9b7c2995484407f9166e39c2069a88b63a980b9b5ffc880f4b89dde5adae6c7fb84ed98cbac860214dfb0b28d1b2e2d58aefebdfe515334f2ffa46be22ef7a4b3a276cb70a27c9e9f5de0a20bad24cbe2b89aee9693c2f8f186ea59fcfc4ebec7188cca0418d4583a6f1730f62416d70cd62555eb4f58ea831d1fea9956a2cba0049f23bf0b249f5de2ce0dc303808d70b0ccab3c7f37e949e", 0xd7}], 0x1, &(0x7f0000000980), 0x0, 0x20004805}, 0x4010) r3 = perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x2367, 0x7fff, 0x1, 0x6, 0x0, 0x78b1, 0x1, 0x0, 0x4992c766, 0xff, 0x81, 0x100, 0x40, 0x3, 0x9, 0x8, 0x1, 0x10000, 0x0, 0x6, 0x90e, 0x9, 0x7ff, 0x0, 0x8, 0x1, 0x30, 0x20, 0x7fffffff, 0x6, 0x401, 0x2, 0x1000, 0x8001, 0x1ff, 0xfffffffffffffff8, 0x0, 0x2, 0x0, @perf_config_ext={0x5, 0x8}, 0x1ab23, 0x3f, 0x8, 0x5, 0x6, 0x0, 0x6}, 0xffffffffffffffff, 0x10, r0, 0x1) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0xb, 0x9, &(0x7f0000000580)=@framed={{0x18}, [@map={0x18, 0x0, 0x1, 0x0, r0}, @generic={0x3ff, 0xfffffffffffffffc, 0x1}, @call={0x85, 0x0, 0x0, 0x6}], {0x95}}, &(0x7f0000000600)='syzkaller\x00', 0x0, 0x30, &(0x7f0000000640)=""/48, 0x41f00, 0x1}, 0x48) ioctl$PERF_EVENT_IOC_SET_BPF(r3, 0x40042408, r4) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000000)={&(0x7f0000000080)='./file0/file0\x00', r0}, 0x10) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000400)=@ax25={0x3, {"02f47b3723e03d"}}, 0x80, &(0x7f00000017c0), 0x0, &(0x7f0000001840)=ANY=[], 0x0, 0x24004044}, 0x4008001) bpf$MAP_CREATE(0x0, &(0x7f0000002cc0)={0x5, 0x0, 0x56c96e7a, 0x2, 0xa, 0xffffffffffffffff, 0x9}, 0x2c) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000480)='rpc_pipefs\x00', 0x200000, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000002d00)) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f00000004c0)='vmnet0keyring\x00') ioctl$PERF_EVENT_IOC_SET_FILTER(r3, 0x40082406, &(0x7f0000000700)='proc!@ppp1!ppp0ppp0#)lo\\lolo{\x00') mount(&(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000200)='fuseblk\x00', 0xa11800, &(0x7f0000000240)) mount(&(0x7f00000002c0)='./file0/file0\x00', &(0x7f0000000300)='./file0/file0\x00', &(0x7f0000000340)='minix\x00', 0x1000, &(0x7f0000000380)) 2018/03/29 17:35:00 executing program 6: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000ed4000)=0x78, 0x4) bind$inet(r0, &(0x7f0000deb000)={0x2, 0x4e23, @multicast1=0xe0000001}, 0x10) ioctl$sock_SIOCINQ(r0, 0x541b, &(0x7f0000000500)) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000f40ff8)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) getsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(0xffffffffffffff9c, 0x84, 0x1f, &(0x7f0000000240)={0x0, @in={{0x2, 0x4e23}}, 0x0, 0x3}, &(0x7f0000000000)=0x90) setsockopt$inet_sctp_SCTP_RTOINFO(r0, 0x84, 0x0, &(0x7f0000000040)={r1, 0x81, 0x7, 0x100000000}, 0x10) getsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(r0, 0x84, 0x18, &(0x7f00000003c0)={r1, 0x7}, &(0x7f0000000400)=0x8) socketpair(0x11, 0x800, 0x5, &(0x7f0000000200)={0xffffffffffffffff}) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_INFO(r2, 0xc08c5334, &(0x7f0000000600)={0x0, 0x7, 0x2f29fdaf, 'queue0\x00', 0x800}) r3 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000080)='/dev/hwrng\x00', 0x4000, 0x0) sendto$inet(r0, &(0x7f0000a88f88), 0x29f, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @loopback=0x7f000001}, 0x10) pipe2(&(0x7f0000000580)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80002) ioctl$EVIOCGBITKEY(0xffffffffffffffff, 0x80404521, &(0x7f00000000c0)=""/160) sendmmsg(r0, &(0x7f00000025c0)=[{{&(0x7f0000000300)=@pppoe={0x18, 0x0, {0x0, @link_local={0x1, 0x80, 0xc2}, 'ip6tnl0\x00'}}, 0x80, &(0x7f0000000380)=[{&(0x7f00000010c0)="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", 0x6b6}], 0x1}}], 0x1, 0x4000) recvfrom$inet(r0, &(0x7f00009be000)=""/11, 0xe8, 0x0, 0x0, 0xffffffffffffff4e) bind$bt_l2cap(r4, &(0x7f0000000440)={0x1f, 0x8, {0x6, 0x400, 0x0, 0x2, 0x0, 0x3}, 0x10001, 0x2}, 0xe) setsockopt(r5, 0xb5, 0xffffffff, &(0x7f00000006c0)="0ac385d7ac2ae574baf1b3104b37fd7f20ebca1da5063c612b05a3d56c8b2e413e64bfc3e0bb415e656477eea9c01ad808e74aea23e7e4a07d09f22e69e1ae37fecf707d249ba82f1fc8f4a53558952762a62d5712f7ad3f1e2d51e5e3cf31154625d23de117cbb19fe0379b78ae656d20a1840850e0d1b6f6d94f8c810560030e0ac978d48567edbbb1f79c22a73e5a978f82d9637023d70e36036002", 0x9d) getsockopt$inet_sctp_SCTP_RECVRCVINFO(r0, 0x84, 0x20, &(0x7f0000000180), &(0x7f00000001c0)=0x4) sendmsg$netrom(r3, &(0x7f0000000b00)={&(0x7f0000000780)=@full={{0x3, {"53665db4283e1b"}, 0x3}, [{"d40335b6bcd5d9"}, {"d5952336c520fb"}, {"d326c92416d6ea"}, {"763aea9242214f"}, {"d716c11982a583"}, {"712de86f857435"}, {"1d8bd63f2c431c"}, {"6f5a0b1522aca6"}]}, 0x48, &(0x7f0000000ac0), 0x0, &(0x7f00000017c0)=[{0x10, 0x117, 0x9}], 0x10, 0x8000}, 0x4000840) setsockopt$inet_mtu(r3, 0x0, 0xa, &(0x7f0000000480), 0x4) r6 = getpid() epoll_ctl$EPOLL_CTL_ADD(r3, 0x1, r3, &(0x7f00000004c0)={0x5}) syz_open_procfs(r6, &(0x7f00000005c0)='maps\x00') shutdown(r0, 0x1) 2018/03/29 17:35:00 executing program 2: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)={0xb, 0x7e, 0x3, 0x1, 0x11}, 0x2c) mount(&(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) r1 = socket$kcm(0x29, 0x7, 0x0) sendmsg$kcm(r1, &(0x7f0000000bc0)={&(0x7f00000007c0)=@rc={0x1f, {0x5, 0x50000000, 0xaa2, 0x613, 0x4, 0x1ff}, 0x3f}, 0x80, &(0x7f0000000940)=[{&(0x7f0000000840)="09c9453aa30d8c5fba221fa2413f12c580837b2ae292e3ee8dd00098c404125a1a2e63840f82a2f69c3927af43b828422484aaeeceebcbe76e999bd3930c9b7c2995484407f9166e39c2069a88b63a980b9b5ffc880f4b89dde5adae6c7fb84ed98cbac860214dfb0b28d1b2e2d58aefebdfe515334f2ffa46be22ef7a4b3a276cb70a27c9e9f5de0a20bad24cbe2b89aee9693c2f8f186ea59fcfc4ebec7188cca0418d4583a6f1730f62416d70cd62555eb4f58ea831d1fea9956a2cba0049f23bf0b249f5de2ce0dc303808d70b0ccab3c7f37e949e", 0xd7}], 0x1, &(0x7f0000000980), 0x0, 0x20004805}, 0x4010) r2 = perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x2367, 0x7fff, 0x1, 0x6, 0x0, 0x78b1, 0x1, 0x0, 0x4992c766, 0xff, 0x81, 0x100, 0x40, 0x3, 0x9, 0x8, 0x1, 0x10000, 0x0, 0x6, 0x90e, 0x9, 0x7ff, 0x0, 0x8, 0x1, 0x30, 0x20, 0x7fffffff, 0x6, 0x401, 0x2, 0x1000, 0x8001, 0x1ff, 0xfffffffffffffff8, 0x0, 0x2, 0x0, @perf_config_ext={0x5, 0x8}, 0x1ab23, 0x0, 0x8, 0x5, 0x6, 0x0, 0x6}, 0xffffffffffffffff, 0x10, r0, 0x1) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0xb, 0x9, &(0x7f0000000580)=@framed={{0x18}, [@map={0x18, 0x0, 0x1, 0x0, r0}, @generic={0x3ff, 0xfffffffffffffffc, 0x1}, @call={0x85, 0x0, 0x0, 0x6}], {0x95}}, &(0x7f0000000600)='syzkaller\x00', 0x0, 0x30, &(0x7f0000000640)=""/48, 0x41f00, 0x1}, 0x48) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000000)={&(0x7f0000000080)='./file0/file0\x00', r0}, 0x10) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000400)=@ax25={0x3, {"02f47b3723e03d"}}, 0x80, &(0x7f00000017c0), 0x0, &(0x7f0000001840)=ANY=[], 0x0, 0x24004044}, 0x4008001) r4 = openat$rfkill(0xffffffffffffff9c, &(0x7f0000000980)='/dev/rfkill\x00', 0x0, 0x0) ioctl$EVIOCREVOKE(r4, 0x40044591, &(0x7f00000009c0)=0x4) bpf$MAP_CREATE(0x0, &(0x7f0000000a00)={0x5, 0x0, 0x56c96e7a, 0x2, 0xa, 0xffffffffffffffff, 0x9}, 0x2c) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000480)='rpc_pipefs\x00', 0x200000, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000002d00)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f00000004c0)='vmnet0keyring\x00') accept$packet(r3, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @remote}, &(0x7f0000000280)=0x14) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000780)={&(0x7f0000000740)='./file0/file0\x00', r5}, 0x10) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x40082406, &(0x7f0000000700)='proc!@ppp1!ppp0ppp0#)lo\\lolo{\x00') ioctl$KVM_GET_DIRTY_LOG(r4, 0x4010ae42, &(0x7f0000000a40)={0x101ff, 0x0, &(0x7f0000ffc000/0x2000)=nil}) mount(&(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000200)='fuseblk\x00', 0xa11800, &(0x7f0000000240)) mount(&(0x7f00000002c0)='./file0/file0\x00', &(0x7f0000000300)='./file0/file0\x00', &(0x7f0000000340)='minix\x00', 0x1000, &(0x7f0000000380)) 2018/03/29 17:35:00 executing program 4: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)={0xb, 0x7e, 0x3, 0x1, 0x11}, 0x2c) mount(&(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) r1 = socket$kcm(0x29, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000000bc0)={&(0x7f00000007c0)=@rc={0x1f, {0x5, 0x50000000, 0xaa2, 0x613, 0x4, 0x1ff}, 0x3f}, 0x80, &(0x7f0000000940)=[{&(0x7f0000000840)="09c9453aa30d8c5fba221fa2413f12c580837b2ae292e3ee8dd00098c404125a1a2e63840f82a2f69c3927af43b828422484aaeeceebcbe76e999bd3930c9b7c2995484407f9166e39c2069a88b63a980b9b5ffc880f4b89dde5adae6c7fb84ed98cbac860214dfb0b28d1b2e2d58aefebdfe515334f2ffa46be22ef7a4b3a276cb70a27c9e9f5de0a20bad24cbe2b89aee9693c2f8f186ea59fcfc4ebec7188cca0418d4583a6f1730f62416d70cd62555eb4f58ea831d1fea9956a2cba0049f23bf0b249f5de2ce0dc303808d70b0ccab3c7f37e949e", 0xd7}], 0x1, &(0x7f0000000980), 0x0, 0x20004805}, 0x4010) r2 = perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x2367, 0x7fff, 0x1, 0x6, 0x0, 0x78b1, 0x1, 0x0, 0x4992c766, 0xff, 0x81, 0x100, 0x40, 0x3, 0x9, 0x8, 0x1, 0x10000, 0x0, 0x6, 0x90e, 0x9, 0x7ff, 0x0, 0x8, 0x1, 0x30, 0x20, 0x7fffffff, 0x6, 0x401, 0x2, 0x1000, 0x8001, 0x1ff, 0xfffffffffffffff8, 0x0, 0x2, 0x0, @perf_config_ext={0x5, 0x8}, 0x1ab23, 0x3f, 0x8, 0x5, 0x6}, 0xffffffffffffffff, 0x10, r0, 0x0) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0xb, 0x9, &(0x7f0000000580)=@framed={{0x18}, [@map={0x18, 0x0, 0x1, 0x0, r0}, @generic={0x3ff, 0xfffffffffffffffc, 0x1}, @call={0x85, 0x0, 0x0, 0x6}], {0x95}}, &(0x7f0000000600)='syzkaller\x00', 0x0, 0x30, &(0x7f0000000640)=""/48, 0x41f00, 0x1}, 0x48) ioctl$PERF_EVENT_IOC_SET_BPF(r2, 0x40042408, r3) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000000)={&(0x7f0000000080)='./file0/file0\x00', r0}, 0x10) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000400)=@ax25={0x3, {"02f47b3723e03d"}}, 0x80, &(0x7f00000017c0), 0x0, &(0x7f0000001840)=ANY=[], 0x0, 0x24004044}, 0x4008001) bpf$MAP_CREATE(0x0, &(0x7f0000002cc0)={0x5, 0x100, 0x56c96e7a, 0x2, 0xa, 0xffffffffffffffff, 0x9}, 0x2c) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000480)='rpc_pipefs\x00', 0x200000, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000002d00)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f00000004c0)='vmnet0keyring\x00') bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000780)={&(0x7f0000000740)='./file0/file0\x00', r4}, 0x10) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x40082406, &(0x7f0000000700)='proc!@ppp1!ppp0ppp0#)lo\\lolo{\x00') mount(&(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000200)='fuseblk\x00', 0xa11800, &(0x7f0000000240)) r5 = syz_open_dev$sg(&(0x7f0000000240)='/dev/sg#\x00', 0xfffffffffffffffa, 0x800) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000280)={r5, r3, 0x5, 0x1}, 0x10) ioctl$TIOCCONS(r5, 0x541d) mount(&(0x7f00000002c0)='./file0/file0\x00', &(0x7f0000000300)='./file0/file0\x00', &(0x7f0000000340)='minix\x00', 0x1000, &(0x7f0000000380)) 2018/03/29 17:35:01 executing program 1: r0 = open(&(0x7f0000000440)='./file0\x00', 0x1ffff, 0x5) ioctl$TIOCLINUX7(0xffffffffffffffff, 0x541c, &(0x7f0000000080)={0x7}) setsockopt$inet_tcp_int(r0, 0x6, 0x0, &(0x7f00000003c0)=0x6, 0xf4) perf_event_open(&(0x7f0000000240)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000180)='/dev/sequencer2\x00', 0x12100, 0x0) clock_gettime(0x0, &(0x7f00000001c0)={0x0}) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r1, 0x4040534e, &(0x7f0000000340)={0x0, @time={r2}, 0x1, {0x8, 0x606}, 0x101}) r3 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000040)='/dev/rtc\x00', 0x0, 0x0) r4 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000580)='/dev/sequencer\x00', 0x0, 0x0) ioctl$LOOP_CLR_FD(r3, 0x7003) getsockopt$inet_sctp_SCTP_FRAGMENT_INTERLEAVE(0xffffffffffffffff, 0x84, 0x12, &(0x7f0000000140), &(0x7f00000002c0)=0x4) setsockopt$packet_buf(0xffffffffffffffff, 0x107, 0xd, &(0x7f00000004c0)="d9fb4f1bcfd3e0c1355ea2018b25a4fd911d8abc3f3fd71f4749878ac1fbce6e5d188e078b15be141905d7966406e4f3fb021da63028837a8407bcb3e3a676d251bcd09a04964ed9cd0f6cece267dc4bada0403dcef25dace8875f4a6495eb2e6cc4969e7de83153459b4d61669ed9eb7567", 0x72) perf_event_open(&(0x7f00000000c0)={0x0, 0x70, 0x0, 0x0, 0x7ff, 0xa1, 0x0, 0x1, 0x200, 0x2, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0xb0, 0x5, 0x0, 0x401, 0xcf, 0x0, 0xffffffffffffffff, 0x100000000, 0x3ff, 0x0, 0x8, 0x2, 0x1f, 0x2, 0x5, 0x9, 0x3, 0x0, 0x4, 0x0, 0x20000000, 0x195d678803a3a953, @perf_config_ext={0x9, 0x5}, 0x10, 0x3, 0x8, 0x0, 0x72eb, 0x99, 0x1}, 0x0, 0xd, r3, 0x8) mq_notify(r4, &(0x7f0000000400)={0x0, 0x0, 0x4}) execve(&(0x7f0000000200)='./file0\x00', &(0x7f0000000680)=[&(0x7f0000000480)='wlan0\x00', &(0x7f0000000600)='\x00', &(0x7f0000000640)='proc\x00'], &(0x7f0000000740)=[&(0x7f00000006c0)='\'\x00', &(0x7f0000000700)='trustedwlan0vmnet0@%\x00']) 2018/03/29 17:35:01 executing program 3: r0 = socket(0xa, 0x2, 0x0) r1 = open(&(0x7f00004b8ff8)='./file0\x00', 0x28042, 0x0) connect$inet6(r0, &(0x7f0000d3cfe4)={0xa, 0x0, 0x0, @mcast2={0xff, 0x2, [], 0x1}, 0x3}, 0x1c) ioctl$DRM_IOCTL_ADD_CTX(r1, 0xc0086420, &(0x7f0000000000)) bpf$MAP_CREATE(0x0, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x5}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x1, 0x5, &(0x7f0000000100)=ANY=[@ANYBLOB="b400000048000000250061eee099e37701ca00000000000000000000000000009500000000000000"], &(0x7f0000003ff6)='syzkaller\x00', 0x5, 0xfdbb, &(0x7f000000cf3d)=""/195}, 0x48) ioctl$TIOCGPGRP(r1, 0x540f, &(0x7f00000000c0)=0x0) sched_setaffinity(r2, 0x8, &(0x7f0000000140)=0xfff) ioctl$DRM_IOCTL_NEW_CTX(r1, 0x40086425, &(0x7f0000000080)={0x0, 0x3}) fallocate(r1, 0x0, 0xffff, 0x1f) setsockopt$inet6_mtu(0xffffffffffffffff, 0x29, 0x17, &(0x7f0000000100)=0x2, 0x4) connect$inet(r0, &(0x7f0000000040)={0x2, 0x4e22, @multicast1=0xe0000001}, 0x10) sendfile(r0, r1, &(0x7f00005faff8), 0xfffb) 2018/03/29 17:35:01 executing program 2: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)={0xb, 0x7e, 0x3, 0x1, 0x11}, 0x2c) r1 = socket$kcm(0x29, 0x400000000002, 0x0) sendmsg$kcm(r1, &(0x7f0000000bc0)={&(0x7f00000007c0)=@rc={0x1f, {0x5, 0x50000000, 0xaa2, 0x613, 0x4, 0x1ff}, 0x3f}, 0x80, &(0x7f0000000940)=[{&(0x7f0000000840)="09c9453aa30d8c5fba221fa2413f12c580837b2ae292e3ee8dd00098c404125a1a2e63840f82a2f69c3927af43b828422484aaeeceebcbe76e999bd3930c9b7c2995484407f9166e39c2069a88b63a980b9b5ffc880f4b89dde5adae6c7fb84ed98cbac860214dfb0b28d1b2e2d58aefebdfe515334f2ffa46be22ef7a4b3a276cb70a27c9e9f5de0a20bad24cbe2b89aee9693c2f8f186ea59fcfc4ebec7188cca0418d4583a6f1730f62416d70cd62555eb4f58ea831d1fea9956a2cba0049f23bf0b249f5de2ce0dc303808d70b0ccab3c7f37e949e", 0xd7}], 0x1, &(0x7f0000000980), 0x0, 0x20004805}, 0x4010) r2 = perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x2367, 0x7fff, 0x1, 0x6, 0x0, 0x78b1, 0x1, 0x0, 0x4992c766, 0xff, 0x81, 0x100, 0x40, 0x3, 0x9, 0x8, 0x1, 0x10000, 0x0, 0x6, 0x90e, 0x9, 0x7ff, 0x0, 0x8, 0x1, 0x30, 0x20, 0x7fffffff, 0x6, 0x401, 0x2, 0x1000, 0x8001, 0x1ff, 0xfffffffffffffff8, 0x0, 0x2, 0x0, @perf_config_ext={0x5, 0x8}, 0x1ab23, 0x0, 0x8, 0x5, 0x6, 0x0, 0x6}, 0xffffffffffffffff, 0x10, r0, 0x1) bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0xb, 0x9, &(0x7f0000000580)=ANY=[@ANYBLOB="1800000000000000000000000000000018100000", @ANYRES32=r0, @ANYBLOB="0000000008000000fffc0900ffffffff0000000000000000850000000600000000000000000000009500000000000000"], &(0x7f0000000600)='syzkaller\x00', 0x0, 0x30, &(0x7f0000000640)=""/48, 0x41f00, 0x1}, 0x48) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000000)={&(0x7f0000000080)='./file0/file0\x00', r0}, 0x10) r3 = socket$l2tp(0x18, 0x1, 0x1) connect$l2tp(r3, &(0x7f0000000240)=@pppol2tpin6={0x18, 0x1, {0x0, r2, 0x3, 0x2, 0x4, 0x4, {0xa, 0x4e22, 0x0, @mcast2={0xff, 0x2, [], 0x1}, 0x1}}}, 0x32) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000400)=@ax25={0x3, {"02f47b3723e03d"}}, 0x80, &(0x7f00000017c0), 0x0, &(0x7f0000001840)=ANY=[], 0x0, 0x24004044}, 0x4008001) bpf$MAP_CREATE(0x0, &(0x7f0000002cc0)={0x5, 0x0, 0x400000056c96e7a, 0x2, 0xa, 0xffffffffffffffff, 0x9}, 0x2c) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000480)='rpc_pipefs\x00', 0x200000, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000002d00)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f00000004c0)='vmnet0keyring\x00') bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000780)={&(0x7f0000000740)='./file0/file0\x00', r4}, 0x10) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x40082406, &(0x7f0000000700)='proc!@ppp1!ppp0ppp0#)lo\\lolo{\x00') mount(&(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000200)='fuseblk\x00', 0xa11800, &(0x7f0000000240)) mount(&(0x7f00000002c0)='./file0/file0\x00', &(0x7f0000000300)='./file0/file0\x00', &(0x7f0000000340)='minix\x00', 0x1000, &(0x7f0000000380)) 2018/03/29 17:35:01 executing program 7: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)={0xb, 0x7e, 0x3, 0x1, 0x11}, 0x2c) mount(&(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) lstat(&(0x7f0000000980)='./file0/file0\x00', &(0x7f00000009c0)={0x0, 0x0, 0x0, 0x0, 0x0}) getgroups(0x4, &(0x7f0000000a40)=[0x0, 0x0, 0x0, 0x0]) syz_fuseblk_mount(&(0x7f0000000240)='./file0/file0\x00', &(0x7f0000000280)='./file0/file0\x00', 0x2, r1, r2, 0x5, 0x92, 0x8) r3 = socket$kcm(0x29, 0x2, 0x0) sendmsg$kcm(r3, &(0x7f0000000bc0)={&(0x7f00000007c0)=@rc={0x1f, {0x5, 0x50000000, 0xaa2, 0x613, 0x4, 0x1ff}, 0x3f}, 0x80, &(0x7f0000000940)=[{&(0x7f0000000840)="09c9453aa30d8c5fba221fa2413f12c580837b2ae292e3ee8dd00098c404125a1a2e63840f82a2f69c3927af43b828422484aaeeceebcbe76e999bd3930c9b7c2995484407f9166e39c2069a88b63a980b9b5ffc880f4b89dde5adae6c7fb84ed98cbac860214dfb0b28d1b2e2d58aefebdfe515334f2ffa46be22ef7a4b3a276cb70a27c9e9f5de0a20bad24cbe2b89aee9693c2f8f186ea59fcfc4ebec7188cca0418d4583a6f1730f62416d70cd62555eb4f58ea831d1fea9956a2cba0049f23bf0b249f5de2ce0dc303808d70b0ccab3c7f37e949e", 0xd7}], 0x1, &(0x7f0000000980), 0x0, 0x20004805}, 0x4010) r4 = perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x2367, 0x7fff, 0x1, 0x6, 0x0, 0x78b1, 0x1, 0x0, 0x4992c766, 0xff, 0x81, 0x100, 0x40, 0x3, 0x9, 0x8, 0x1, 0x10000, 0x0, 0x6, 0x90e, 0x9, 0x7ff, 0x0, 0x8, 0x1, 0x30, 0x20, 0x7fffffff, 0x6, 0x401, 0x2, 0x1000, 0x8001, 0x1ff, 0xfffffffffffffff8, 0x0, 0x2, 0x0, @perf_config_ext={0x5, 0x8}, 0x1ab23, 0x3f, 0x8, 0x5, 0x6, 0x0, 0x6}, 0xffffffffffffffff, 0x10, r0, 0x1) bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0xb, 0x9, &(0x7f0000000c00)=ANY=[@ANYBLOB="18000000000000000000000000000000181000007dfa43cf90e2ff6119a745e8fa0205d9aafc870609bc2706e0a254bda769353adf4dc2643fa8f17c7501c026b950d8c1c582bb737ef7530a37609762611024078fdb7f2b206c596faedc5e72237d36483fe7d1fcc47ac98a70ad079865ba9f635840aab70a2002152ba92fc6e25f35d1ad38ff00a6a9f0de2ee06f1763eb6062aa517345a8e9fab67cbee0314054ebdf561d3a66b255e8588d6b0dbe2e7bbcde9642d3de0ed464fd1ea08582a0762a43239ca9ee2e8189ac4b648257bc87c4bbb4ca31279a36f1f01f33bebb2d499f2fe0489458", @ANYRES32=r0, @ANYBLOB="0000000000000000fffc0100000000000000000000000000850000000600000000000000000000009500000000000000"], &(0x7f0000000600)='syzkaller\x00', 0x0, 0x30, &(0x7f0000000640)=""/48, 0x41f00, 0x1}, 0x48) ioctl$sock_FIOGETOWN(r3, 0x8903, &(0x7f0000000b40)=0x0) perf_event_open(&(0x7f0000000ac0)={0x0, 0x70, 0x9, 0x2a, 0x7, 0x400, 0x0, 0x0, 0x10000, 0x6, 0x100000001, 0x2, 0x80000001, 0xcd64, 0x6, 0x80000001, 0x5, 0x3ff, 0x10001, 0x100000001, 0x7fff, 0x8, 0x5, 0xd3b4, 0x5, 0x15, 0x0, 0x7, 0x2, 0x81, 0x8150, 0x81, 0x3, 0x3, 0x0, 0xfae0, 0xfff, 0x6, 0x0, 0x5, 0x4, @perf_bp={&(0x7f0000000a80), 0x8}, 0x1402, 0x7, 0x81, 0x0, 0x2, 0x7, 0x4}, r5, 0x7, r4, 0x1) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000000)={&(0x7f0000000080)='./file0/file0\x00', r0}, 0x10) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000400)=@ax25={0x3, {"02f47b3723e03d"}}, 0x80, &(0x7f00000017c0), 0x0, &(0x7f0000001840)=ANY=[], 0x0, 0x24004044}, 0x4008001) bpf$MAP_CREATE(0x0, &(0x7f0000002cc0)={0x5, 0x0, 0x56c96e7a, 0x2, 0xa, 0xffffffffffffffff, 0x9}, 0x2c) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000480)='rpc_pipefs\x00', 0x200000, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000002d00)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f00000004c0)='vmnet0keyring\x00') bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000780)={&(0x7f0000000740)='./file0/file0\x00', r6}, 0x10) ioctl$PERF_EVENT_IOC_SET_FILTER(r4, 0x40082406, &(0x7f0000000700)='proc!@ppp1!ppp0ppp0#)lo\\lolo{\x00') r7 = creat(&(0x7f0000000b80)='./file0\x00', 0x80) getsockopt$inet_sctp_SCTP_PARTIAL_DELIVERY_POINT(r4, 0x84, 0x13, &(0x7f0000000580)={0x0, 0x1}, &(0x7f00000005c0)=0x8) getsockopt$inet_sctp6_SCTP_ASSOCINFO(r7, 0x84, 0x1, &(0x7f0000000d40)={0x0, 0x6, 0x0, 0x2, 0x800, 0xdcf}, &(0x7f0000000d80)=0x14) getsockopt$inet_sctp6_SCTP_STATUS(r7, 0x84, 0xe, &(0x7f0000000dc0)={r8, 0x40, 0xfffffffffffffffc, 0x100000001, 0x1, 0x1, 0x2, 0x7, {r9, @in6={{0xa, 0x4e21, 0x101}}, 0x7, 0xaa, 0x3, 0xcc9, 0x1ff}}, &(0x7f0000000e80)=0xb0) ioctl$TCFLSH(r7, 0x540b, 0x0) mount(&(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000200)='fuseblk\x00', 0xa11800, &(0x7f0000000240)) mount(&(0x7f00000002c0)='./file0/file0\x00', &(0x7f0000000300)='./file0/file0\x00', &(0x7f0000000340)='minix\x00', 0x1000, &(0x7f0000000380)) 2018/03/29 17:35:01 executing program 4: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)={0xb, 0x7e, 0x3, 0x1, 0x11}, 0x2c) mount(&(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) r1 = socket$kcm(0x29, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000000bc0)={&(0x7f00000007c0)=@rc={0x1f, {0x5, 0x50000000, 0xaa2, 0x613, 0x4, 0x1ff}, 0x3f}, 0x80, &(0x7f0000000940)=[{&(0x7f0000000840)="09c9453aa30d8c5fba221fa2413f12c580837b2ae292e3ee8dd00098c404125a1a2e63840f82a2f69c3927af43b828422484aaeeceebcbe76e999bd3930c9b7c2995484407f9166e39c2069a88b63a980b9b5ffc880f4b89dde5adae6c7fb84ed98cbac860214dfb0b28d1b2e2d58aefebdfe515334f2ffa46be22ef7a4b3a276cb70a27c9e9f5de0a20bad24cbe2b89aee9693c2f8f186ea59fcfc4ebec7188cca0418d4583a6f1730f62416d70cd62555eb4f58ea831d1fea9956a2cba0049f23bf0b249f5de2ce0dc303808d70b0ccab3c7f37e949e", 0xd7}], 0x1, &(0x7f0000000980), 0x0, 0x20004805}, 0x4010) r2 = perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x2367, 0x7fff, 0x1, 0x6, 0x0, 0x78b1, 0x1, 0x0, 0x4992c766, 0xff, 0x81, 0x100, 0x40, 0x3, 0x9, 0x8, 0x1, 0x10000, 0x0, 0x6, 0x90e, 0x9, 0x7ff, 0x0, 0x8, 0x1, 0x30, 0x20, 0x7fffffff, 0x6, 0x401, 0x2, 0x1000, 0x8001, 0x1ff, 0xfffffffffffffff8, 0x0, 0x2, 0x0, @perf_config_ext={0x5, 0x8}, 0x1ab23, 0x3f, 0x8, 0x5, 0x6}, 0xffffffffffffffff, 0x10, r0, 0x0) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0xb, 0x9, &(0x7f0000000580)=@framed={{0x18}, [@map={0x18, 0x0, 0x1, 0x0, r0}, @generic={0x3ff, 0xfffffffffffffffc, 0x1}, @call={0x85, 0x0, 0x0, 0x6}], {0x95}}, &(0x7f0000000600)='syzkaller\x00', 0x0, 0x30, &(0x7f0000000640)=""/48, 0x41f00, 0x1}, 0x48) ioctl$PERF_EVENT_IOC_SET_BPF(r2, 0x40042408, r3) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000000)={&(0x7f0000000080)='./file0/file0\x00', r0}, 0x10) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000400)=@ax25={0x3, {"02f47b3723e03d"}}, 0x80, &(0x7f00000017c0), 0x0, &(0x7f0000001840)=ANY=[], 0x0, 0x24004044}, 0x4008001) bpf$MAP_CREATE(0x0, &(0x7f0000002cc0)={0x5, 0x100, 0x56c96e7a, 0x2, 0xa, 0xffffffffffffffff, 0x9}, 0x2c) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000480)='rpc_pipefs\x00', 0x200000, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000002d00)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f00000004c0)='vmnet0keyring\x00') bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000780)={&(0x7f0000000740)='./file0/file0\x00', r4}, 0x10) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x40082406, &(0x7f0000000700)='proc!@ppp1!ppp0ppp0#)lo\\lolo{\x00') mount(&(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000200)='fuseblk\x00', 0xa11800, &(0x7f0000000240)) r5 = syz_open_dev$sg(&(0x7f0000000240)='/dev/sg#\x00', 0xfffffffffffffffa, 0x800) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000280)={r5, r3, 0x5, 0x1}, 0x10) ioctl$TIOCCONS(r5, 0x541d) mount(&(0x7f00000002c0)='./file0/file0\x00', &(0x7f0000000300)='./file0/file0\x00', &(0x7f0000000340)='minix\x00', 0x1000, &(0x7f0000000380)) 2018/03/29 17:35:01 executing program 1: openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000140)='./cgroup.net\x00', 0x200002, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x2000) r0 = syz_open_dev$tun(&(0x7f00000004c0)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000080)={'ip6tnl0\x00', 0x9516}) close(r0) capset(&(0x7f0000000000), &(0x7f0000000040)={0x0, 0x0, 0x2}) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000044ff8)) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000c80)='/proc/sys/net/ipv4/vs/drop_entry\x00', 0x2, 0x0) sendmmsg$unix(0xffffffffffffffff, &(0x7f00000bd000), 0x80, 0x0) poll(&(0x7f0000084ff0), 0x0, 0x3ff) openat$sequencer(0xffffffffffffff9c, &(0x7f0000000180)='/dev/sequencer\x00', 0x0, 0x0) syz_open_procfs(0x0, &(0x7f0000000280)='net/wireless\x00') getxattr(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000cc0)=ANY=[@ANYBLOB="876bd419d04c67a0a47ca18e2c847b2353b8f9c858a20e643e4396d97a32d56167cc3f29b6a12907bf69ff07b91e4ab5a091a80aab7be6434c40296362c4d6a01430def2e0eb4802806576a5522ddcd2fa5a038c4603470d0ac3c11bfe2290ab107f416351d636887586ab3da512acde0e6f17f9868846c45be7"], &(0x7f00000002c0)=""/152, 0x98) pipe2(&(0x7f0000000480), 0x7) setsockopt$nfc_llcp_NFC_LLCP_RW(0xffffffffffffffff, 0x118, 0x0, &(0x7f0000000180)=0x8000, 0x4) getsockopt$inet_sctp6_SCTP_HMAC_IDENT(0xffffffffffffffff, 0x84, 0x16, &(0x7f0000000240)={0x4, [0x7, 0x20, 0x0, 0x3f]}, &(0x7f0000000280)=0xc) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000380)={[{0x32, 'emory\x00', 0x20}, {0x0, 'cpu', 0x20}]}, 0x3) mknod$loop(&(0x7f0000000200)='./file0/file0\x00', 0x100, 0xffffffffffffffff) rmdir(&(0x7f00000000c0)='./file0\x00') 2018/03/29 17:35:01 executing program 6: perf_event_open(&(0x7f0000aaa000)={0x2, 0x70, 0x4a, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x100000001, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x5, 0x1, 0x0) setsockopt$inet_sctp_SCTP_DEFAULT_SEND_PARAM(0xffffffffffffffff, 0x84, 0xa, &(0x7f0000de8000)={0x2, 0x0, 0x0, 0x0, 0x0, 0x2, 0xfffffffffffffffb}, 0x20) uselib(&(0x7f0000000040)='./file0\x00') ioctl$sock_netrom_SIOCADDRT(r0, 0x890b, &(0x7f0000de7ffc)) 2018/03/29 17:35:01 executing program 3: r0 = openat$dsp(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/dsp\x00', 0x80200, 0x0) ioctl$PIO_UNIMAPCLR(r0, 0x4b68, &(0x7f0000000200)={0x853, 0x8, 0x1}) r1 = socket(0xa, 0x2, 0x0) r2 = open(&(0x7f00004b8ff8)='./file0\x00', 0x28042, 0x0) connect$inet6(r2, &(0x7f0000000280)={0xa, 0x0, 0x80000000, @mcast2={0xff, 0x2, [], 0x1}, 0x3}, 0x1c) ioctl$VT_RELDISP(r0, 0x5605) ioctl$DRM_IOCTL_ADD_CTX(r0, 0xc0086420, &(0x7f0000000440)) mq_timedsend(r0, &(0x7f0000000480)="c9f373fcc71cd36879b6016ce02e81cdd6daa0b25c50d0575031e2e615da809f36aa4957bcecda4823b3edca50c555b7b0d8d41eb9a3451053a36ade85a698e02a3e0f48ffd14b90b547", 0x4a, 0x9, &(0x7f0000000000)) getsockopt$inet_sctp6_SCTP_ASSOCINFO(r1, 0x84, 0x1, &(0x7f00000000c0)={0x0, 0x2e, 0x7fff, 0x9e1, 0x800, 0x7ff}, &(0x7f0000000140)=0x14) setsockopt$inet_sctp_SCTP_RECONFIG_SUPPORTED(r2, 0x84, 0x75, &(0x7f0000000180)={r3, 0x6d2}, 0x8) ioctl$DRM_IOCTL_NEW_CTX(r2, 0x40086425, &(0x7f0000000080)={0x0, 0x3}) fallocate(r2, 0x0, 0xffff, 0x1f) setsockopt$inet6_mtu(0xffffffffffffffff, 0x29, 0x17, &(0x7f0000000100)=0x6, 0xfffffffffffffd4c) connect$inet(r1, &(0x7f0000000040)={0x2, 0x4e22, @multicast1=0xe0000001}, 0x10) sendfile(r1, r2, &(0x7f00005faff8), 0xfffb) setsockopt$inet_sctp6_SCTP_AUTO_ASCONF(r1, 0x84, 0x1e, &(0x7f00000003c0)=0x3, 0x4) ioctl$KVM_PPC_GET_SMMU_INFO(r2, 0x8250aea6, &(0x7f00000002c0)=""/233) mkdir(&(0x7f0000000240)='./file0\x00', 0x4) eventfd2(0x2, 0x80801) 2018/03/29 17:35:01 executing program 5: perf_event_open(&(0x7f0000aaa000)={0x2, 0x70, 0x49, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x80001, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f00003e0000)='/dev/ptmx\x00', 0x200, 0x0) ioctl$TCSETS(r1, 0x40045431, &(0x7f00003b9fdc)) r2 = fcntl$dupfd(r1, 0x406, r1) ioctl$TUNGETIFF(r2, 0x800454d2, &(0x7f0000000000)) r3 = syz_open_pts(r1, 0x0) read(r3, &(0x7f000066b000)=""/1, 0x1) ioctl$TIOCSETD(r3, 0x5423, &(0x7f0000fd0ffc)) syz_open_pts(r1, 0x0) getsockopt$inet_mreqn(r2, 0x0, 0x20, &(0x7f0000000180)={@multicast1, @broadcast}, &(0x7f00000001c0)=0xc) r4 = gettid() timer_create(0x0, &(0x7f0000066000)={0x0, 0x12}, &(0x7f00009b1ffc)) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x989680}, {0x0, 0x9}}, &(0x7f0000040000)) tkill(r4, 0x1000000000016) gettid() r5 = add_key$user(&(0x7f0000000040)='user\x00', &(0x7f0000000080)={0x73, 0x79, 0x7a, 0x1}, &(0x7f00000000c0)="3f89a560192f606d0b8171f51ba4c1c4778ef2133b017561370ef6adb5b7c6e41ab029dbc758d9f67f9bb0891af528d7a9f107b28c6c254dddfb97725056d0f9048a994f00cbd8b9699acf16d4990fa73f91fd448ed5a9bd4ba55a3d42c1e59df9bb3166b6e1b23d5a4f2608f8519e1307777afb8481ee1c92f15293cbe5c81297e22cf10fca2ab93050aa7eaf45274d", 0x90, 0xfffffffffffffffa) keyctl$invalidate(0x15, r5) setsockopt$inet6_MCAST_JOIN_GROUP(r0, 0x29, 0x2a, &(0x7f0000fca000)={0x100000001, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x1, [], 0x1}}}}, 0x88) setsockopt$inet6_group_source_req(r0, 0x29, 0x2f, &(0x7f0000420000)={0x1, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x1, [], 0x1}}}, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x1, [], 0x1}}}}, 0x108) setsockopt$inet6_group_source_req(r0, 0x29, 0x2b, &(0x7f0000a83000)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x1, [], 0x1}}}, {{0xa, 0x0, 0x0, @loopback={0x0, 0x1}}}}, 0x108) 2018/03/29 17:35:01 executing program 0: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)={0xb, 0x7e, 0x3, 0x1, 0x11}, 0x2c) mount(&(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) r1 = socket$kcm(0x29, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000000bc0)={&(0x7f00000007c0)=@rc={0x1f, {0x5, 0x50000000, 0xaa2, 0x613, 0x4, 0x1ff}}, 0x80, &(0x7f0000000940)=[{&(0x7f0000000840)="09c9453aa30d8c5fba221fa2413f12c580837b2ae292e3ee8dd00098c404125a1a2e63840f82a2f69c3927af43b828422484aaeeceebcbe76e999bd3930c9b7c2995484407f9166e39c2069a88b63a980b9b5ffc880f4b89dde5adae6c7fb84ed98cbac860214dfb0b28d1b2e2d58aefebdfe515334f2ffa46be22ef7a4b3a276cb70a27c9e9f5de0a20bad24cbe2b89aee9693c2f8f186ea59fcfc4ebec7188cca0418d4583a6f1730f62416d70cd62555eb4f58ea831d1fea9956a2cba0049f23bf0b249f5de2ce0dc303808d70b0ccab3c7f37e949e", 0xd7}], 0x1, &(0x7f0000000980)}, 0x4010) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0xb, 0x9, &(0x7f0000000580)=@framed={{0x18}, [@map={0x18, 0x0, 0x1, 0x0, r0}, @generic={0x3ff, 0xfffffffffffffffc, 0x1}, @call={0x85, 0x0, 0x0, 0x6}], {0x95}}, &(0x7f0000000600)='syzkaller\x00', 0x0, 0x30, &(0x7f0000000640)=""/48, 0x41f00, 0x1}, 0x48) ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, r2) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000000)={&(0x7f0000000080)='./file0/file0\x00', r0}, 0x10) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000400)=@ax25={0x3, {"02f47b3723e03d"}}, 0x80, &(0x7f00000017c0), 0x0, &(0x7f0000001840)=ANY=[], 0x0, 0x24004044}, 0x4008001) bpf$MAP_CREATE(0x0, &(0x7f0000002cc0)={0x5, 0x100, 0x56c96e7a, 0x2, 0xa, 0xffffffffffffffff, 0x9}, 0x2c) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000480)='rpc_pipefs\x00', 0x200000, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000002d00)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f00000004c0)='vmnet0keyring\x00') r4 = memfd_create(&(0x7f0000000240)='/+keyring\x00', 0x2) ioctl$GIO_SCRNMAP(r4, 0x4b40, &(0x7f00000002c0)=""/56) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000780)={&(0x7f0000000740)='./file0/file0\x00', r3}, 0x10) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, &(0x7f0000000700)='proc!@ppp1!ppp0ppp0#)lo\\lolo{\x00') mount(&(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000200)='fuseblk\x00', 0xa11800, &(0x7f0000000240)) mount(&(0x7f0000000280)='./file0/file0\x00', &(0x7f0000000300)='./file0/file0\x00', &(0x7f0000000340)='romfs\x00', 0x0, &(0x7f0000000240)) 2018/03/29 17:35:01 executing program 4: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)={0xb, 0x7e, 0x3, 0x1, 0x11}, 0x2c) mount(&(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) r1 = socket$kcm(0x29, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000000bc0)={&(0x7f00000007c0)=@rc={0x1f, {0x5, 0x50000000, 0xaa2, 0x613, 0x4, 0x1ff}, 0x3f}, 0x80, &(0x7f0000000940)=[{&(0x7f0000000840)="09c9453aa30d8c5fba221fa2413f12c580837b2ae292e3ee8dd00098c404125a1a2e63840f82a2f69c3927af43b828422484aaeeceebcbe76e999bd3930c9b7c2995484407f9166e39c2069a88b63a980b9b5ffc880f4b89dde5adae6c7fb84ed98cbac860214dfb0b28d1b2e2d58aefebdfe515334f2ffa46be22ef7a4b3a276cb70a27c9e9f5de0a20bad24cbe2b89aee9693c2f8f186ea59fcfc4ebec7188cca0418d4583a6f1730f62416d70cd62555eb4f58ea831d1fea9956a2cba0049f23bf0b249f5de2ce0dc303808d70b0ccab3c7f37e949e", 0xd7}], 0x1, &(0x7f0000000980), 0x0, 0x20004805}, 0x4010) r2 = perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x2367, 0x7fff, 0x1, 0x6, 0x0, 0x78b1, 0x1, 0x0, 0x4992c766, 0xff, 0x81, 0x100, 0x40, 0x3, 0x9, 0x8, 0x1, 0x10000, 0x0, 0x6, 0x90e, 0x9, 0x7ff, 0x0, 0x8, 0x1, 0x30, 0x20, 0x7fffffff, 0x6, 0x401, 0x2, 0x1000, 0x8001, 0x1ff, 0xfffffffffffffff8, 0x0, 0x2, 0x0, @perf_config_ext={0x5, 0x8}, 0x1ab23, 0x3f, 0x8, 0x5, 0x6}, 0xffffffffffffffff, 0x10, r0, 0x1) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x0, 0x9, &(0x7f0000000580)=@framed={{0x18}, [@map={0x18, 0x0, 0x1, 0x0, r0}, @generic={0x3ff, 0xfffffffffffffffc, 0x1}, @call={0x85, 0x0, 0x0, 0x6}], {0x95}}, &(0x7f0000000600)='syzkaller\x00', 0x0, 0x30, &(0x7f0000000640)=""/48, 0x41f00, 0x1}, 0x48) ioctl$PERF_EVENT_IOC_SET_BPF(r2, 0x40042408, r3) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000000)={&(0x7f0000000080)='./file0/file0\x00', r0}, 0x10) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000400)=@ax25={0x3, {"02f47b3723e03d"}}, 0x80, &(0x7f00000017c0), 0x0, &(0x7f0000001840)=ANY=[], 0x0, 0x24004044}, 0x4008001) bpf$MAP_CREATE(0x0, &(0x7f0000002cc0)={0x5, 0x100, 0x56c96e7a, 0x2, 0xa, 0xffffffffffffffff, 0x9}, 0x2c) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000480)='rpc_pipefs\x00', 0x200000, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000002d00)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f00000004c0)='vmnet0keyring\x00') bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000780)={&(0x7f0000000740)='./file0/file0\x00', r4}, 0x10) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x40082406, &(0x7f0000000700)='proc!@ppp1!ppp0ppp0#)lo\\lolo{\x00') mount(&(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000200)='fuseblk\x00', 0xa11800, &(0x7f0000000240)) r5 = syz_open_dev$sg(&(0x7f0000000240)='/dev/sg#\x00', 0xfffffffffffffffa, 0x800) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000280)={r5, r3, 0x5, 0x1}, 0x10) ioctl$TIOCCONS(r5, 0x541d) mount(&(0x7f00000002c0)='./file0/file0\x00', &(0x7f0000000300)='./file0/file0\x00', &(0x7f0000000340)='minix\x00', 0x1000, &(0x7f0000000380)) 2018/03/29 17:35:01 executing program 7: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)={0xb, 0x7e, 0x3, 0x1, 0x11}, 0x2c) mount(&(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) r1 = socket$kcm(0x29, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000000bc0)={&(0x7f00000007c0)=@rc={0x1f, {0x5, 0x50000000, 0xaa2, 0x613, 0x4, 0x1ff}, 0x3f}, 0x80, &(0x7f0000000940)=[{&(0x7f0000000840)="09c9453aa30d8c5fba221fa2413f12c580837b2ae292e3ee8dd00098c404125a1a2e63840f82a2f69c3927af43b828422484aaeeceebcbe76e999bd3930c9b7c2995484407f9166e39c2069a88b63a980b9b5ffc880f4b89dde5adae6c7fb84ed98cbac860214dfb0b28d1b2e2d58aefebdfe515334f2ffa46be22ef7a4b3a276cb70a27c9e9f5de0a20bad24cbe2b89aee9693c2f8f186ea59fcfc4ebec7188cca0418d4583a6f1730f62416d70cd62555eb4f58ea831d1fea9956a2cba0049f23bf0b249f5de2ce0dc303808d70b0ccab3c7f37e949e", 0xd7}], 0x1, &(0x7f0000000980), 0x0, 0x20004805}, 0x4010) r2 = perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x2367, 0x7fff, 0x1, 0x6, 0x0, 0x78b1, 0x1, 0x0, 0x4992c766, 0xff, 0x81, 0x100, 0x40, 0x3, 0x9, 0x8, 0x1, 0x10000, 0x0, 0x6, 0x90e, 0x9, 0x7ff, 0x0, 0x8, 0x1, 0x30, 0x20, 0x7fffffff, 0x6, 0x401, 0x2, 0x1000, 0x8001, 0x1ff, 0xfffffffffffffff8, 0x0, 0x2, 0x0, @perf_config_ext={0x5, 0x8}, 0x1ab23, 0x3f, 0x8, 0x5, 0x6, 0x0, 0x6}, 0xffffffffffffffff, 0x10, r0, 0x1) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0xb, 0x9, &(0x7f0000000980)=ANY=[@ANYBLOB="1800000000000000000000000000000018100000e90c806c4a7c43350e18f2bf086062f6452af106e345511346cf35893653ba3dc80f8640d9e969d187bc02f93dd8d45f4c5a50251488da2f891d6ebb5f0e606b7afa178b100b716a31d3d2d15dace848c3c624f253939ccc089b9ebdce0a5db703226362f003c818209970f38e4b9929bade3d67f485df51994702edca96ad2b02953213835f8dc21d16ff70ad967c73b4cda8121f152d9650dc5282f72007d09d21ca412aa4ddf22ac5ef5f06c4c0558db01dff7e73ac21ed26e4eab9c0d387334c15ce0b42d1e47f8a424da599d8bc75c0a5bece4e06", @ANYRES32=r0, @ANYBLOB="0000000000000000fffc0100000000000000000000000000850000000600000000000000000000009500000000000000"], &(0x7f0000000600)='syzkaller\x00', 0x0, 0x30, &(0x7f0000000640)=""/48, 0x41f00, 0x1}, 0x48) ioctl$PERF_EVENT_IOC_SET_BPF(r2, 0x40042408, r3) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000000)={&(0x7f0000000080)='./file0/file0\x00', r0}, 0x10) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000400)=@ax25={0x3, {"02f47b3723e03d"}}, 0x80, &(0x7f00000017c0), 0x0, &(0x7f0000001840)=ANY=[], 0x0, 0x24004044}, 0x4008001) bpf$MAP_CREATE(0x0, &(0x7f0000002cc0)={0x5, 0x0, 0x56c96e7a, 0x2, 0xa, 0xffffffffffffffff, 0x9}, 0x2c) r4 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000240)='/proc/self/net/pfkey\x00', 0x4001, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_REMOVE(r4, 0xc0405519, &(0x7f0000000280)={0x9, 0x7, 0xfffffffffffffff9, 0x9, "76e0331800bbc7e9e380646066810245cbbda4caa86019052883e6dfb726e533c9d7a6a53aee7ddee634d65d", 0xfffffffffffffff8}) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000480)='rpc_pipefs\x00', 0x200000, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000002d00)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r2) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f00000004c0)='vmnet0keyring\x00') bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000780)={&(0x7f0000000740)='./file0/file0\x00', r5}, 0x10) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x40082406, &(0x7f0000000700)='proc!@ppp1!ppp0ppp0#)lo\\lolo{\x00') mount(&(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000200)='fuseblk\x00', 0xa11800, &(0x7f0000000240)) mount(&(0x7f00000002c0)='./file0/file0\x00', &(0x7f0000000300)='./file0/file0\x00', &(0x7f0000000340)='minix\x00', 0x1000, &(0x7f0000000380)) 2018/03/29 17:35:01 executing program 6: r0 = socket(0x11, 0x100000802, 0x0) r1 = syz_open_dev$tun(&(0x7f0000000040)='/dev/net/tun\x00', 0x0, 0x0) fcntl$setsig(r0, 0xa, 0x39) fcntl$setflags(r1, 0x2, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f00000000c0)={'ifb0\x00', 0xe86824d2c1c833cb}) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000000)={'ifb0\x00', 0xa201}) fstatfs(r1, &(0x7f0000000380)=""/233) preadv(0xffffffffffffffff, &(0x7f0000000340), 0x0, 0x0) mount(&(0x7f0000000300)='./file0\x00', &(0x7f0000000480)='./file0\x00', &(0x7f00000004c0)='rpc_pipefs\x00', 0x4000, &(0x7f0000000500)="df06a530e9f537f13d567ed465f087aff3294dad4fd84b235c5cee8bc41d01db22ec879081e71f8e61ea5174b3d2f7abe85a05cff9ce93c1c80c441bdf7d55dd4a383405a0f1d7f7c2b8d22b4e2dc05bba") socket$inet6_sctp(0xa, 0x0, 0x84) r2 = syz_open_dev$loop(&(0x7f0000000100)='/dev/loop#\x00', 0x0, 0x0) openat$autofs(0xffffffffffffff9c, &(0x7f0000000280)='/dev/autofs\x00', 0x40, 0x0) ioctl$DRM_IOCTL_WAIT_VBLANK(0xffffffffffffffff, 0xc018643a, &(0x7f00000002c0)={0x0, 0x8001, 0x1c}) r3 = openat$sequencer(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/sequencer\x00', 0x2, 0x0) bind$nfc_llcp(r0, &(0x7f0000000140)={0x27, 0x1, 0x2, 0x5, 0x4, 0x100000001, "4e2a96e0562564904ea130673b2fd7ff5191f48133af7ba3e7e61a8950d0d06bf214594cb76890c5fea5c2231f4c1edaba98bf6e7f1b82aa1a09dfb1d90f73", 0x11}, 0x60) setsockopt$inet_sctp_SCTP_AUTO_ASCONF(0xffffffffffffffff, 0x84, 0x1e, &(0x7f0000000080)=0x800, 0x4) fsync(r3) close(r2) 2018/03/29 17:35:01 executing program 2: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)={0xb, 0x7e, 0x3, 0x1, 0x11}, 0x2c) mount(&(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) r1 = socket$kcm(0x29, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000000bc0)={&(0x7f00000007c0)=@rc={0x1f, {0x5, 0x50000000, 0xaa2, 0x613, 0x4, 0x1ff}, 0x3f}, 0x80, &(0x7f0000000940)=[{&(0x7f0000000840)="09c9453aa30d8c5fba221fa2413f12c580837b2ae292e3ee8dd00098c404125a1a2e63840f82a2f69c3927af43b828422484aaeeceebcbe76e999bd3930c9b7c2995484407f9166e39c2069a88b63a980b9b5ffc880f4b89dde5adae6c7fb84ed98cbac860214dfb0b28d1b2e2d58aefebdfe515334f2ffa46be22ef7a4b3a276cb70a27c9e9f5de0a20bad24cbe2b89aee9693c2f8f186ea59fcfc4ebec7188cca0418d4583a6f1730f62416d70cd62555eb4f58ea831d1fea9956a2cba0049f23bf0b249f5de2ce0dc303808d70b0ccab3c7f37e949e", 0xd7}], 0x1, &(0x7f0000000980), 0x0, 0x20004805}, 0x4010) r2 = perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x2367, 0x7fff, 0x1, 0x6, 0x0, 0x78b1, 0x1, 0x0, 0x4992c766, 0xff, 0x81, 0x100, 0x40, 0x3, 0x9, 0x8, 0x1, 0x10000, 0x0, 0x6, 0x90e, 0x9, 0x7ff, 0x0, 0x8, 0x1, 0x30, 0x20, 0x7fffffff, 0x6, 0x401, 0x2, 0x1000, 0x8001, 0x1ff, 0xfffffffffffffff8, 0x0, 0x2, 0x0, @perf_config_ext={0x5, 0x8}, 0x1ab23, 0x0, 0x8, 0x5, 0x6, 0x0, 0x6}, 0xffffffffffffffff, 0x10, r0, 0x1) bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0xb, 0x9, &(0x7f0000000240)=ANY=[@ANYBLOB="1800c90257dd85e03f565a400c871c000000000000000008000000000018100001", @ANYRES32=r0, @ANYBLOB="0000000000000000fffc0100000000000000000000000000850000000600000000000000000000009500000000000000"], &(0x7f0000000600)='syzkaller\x00', 0x0, 0x30, &(0x7f0000000640)=""/48, 0x41f00, 0x1}, 0x48) symlink(&(0x7f0000000580)='./file0\x00', &(0x7f00000005c0)='./file0\x00') bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000000)={&(0x7f0000000080)='./file0/file0\x00', r0}, 0x10) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000400)=@ax25={0x3, {"02f47b3723e03d"}}, 0x80, &(0x7f00000017c0), 0x0, &(0x7f0000001840)=ANY=[], 0x0, 0x24004044}, 0x4008001) bpf$MAP_CREATE(0x0, &(0x7f0000002cc0)={0x5, 0x0, 0x56c96e7a, 0x2, 0xa, 0xffffffffffffffff, 0x9}, 0x2c) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000480)='rpc_pipefs\x00', 0x200000, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000002d00)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f00000004c0)='vmnet0keyring\x00') bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000780)={&(0x7f0000000740)='./file0/file0\x00', r3}, 0x10) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x40082406, &(0x7f0000000700)='proc!@ppp1!ppp0ppp0#)lo\\lolo{\x00') mount(&(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000200)='fuseblk\x00', 0xa11800, &(0x7f0000000240)) mount(&(0x7f00000002c0)='./file0/file0\x00', &(0x7f0000000300)='./file0/file0\x00', &(0x7f0000000340)='minix\x00', 0x1000, &(0x7f0000000380)) 2018/03/29 17:35:01 executing program 1: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000ed4000)=0x78, 0x4) bind$inet(r0, &(0x7f0000deb000)={0x2, 0x4e23, @multicast1=0xe0000001}, 0x10) ioctl$sock_SIOCINQ(r0, 0x541b, &(0x7f0000000500)) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000f40ff8)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) getsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(0xffffffffffffff9c, 0x84, 0x1f, &(0x7f0000000240)={0x0, @in={{0x2, 0x4e23}}, 0x0, 0x3}, &(0x7f0000000000)=0x90) setsockopt$inet_sctp_SCTP_RTOINFO(r0, 0x84, 0x0, &(0x7f0000000040)={r1, 0x81, 0x7, 0x100000000}, 0x10) getsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(r0, 0x84, 0x18, &(0x7f00000003c0)={0x0, 0x7}, &(0x7f0000000400)=0x8) socketpair(0x11, 0x800, 0x5, &(0x7f0000000200)={0xffffffffffffffff}) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_INFO(r2, 0xc08c5334, &(0x7f0000000600)={0x6, 0x7, 0x2f29fdaf, 'queue0\x00', 0x800}) r3 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000080)='/dev/hwrng\x00', 0x4000, 0x0) sendto$inet(r0, &(0x7f0000a88f88), 0x29f, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @loopback=0x7f000001}, 0x10) pipe2(&(0x7f0000000580)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80002) ioctl$EVIOCGBITKEY(0xffffffffffffffff, 0x80404521, &(0x7f00000000c0)=""/160) sendmmsg(r0, &(0x7f00000025c0)=[{{&(0x7f0000000300)=@pppoe={0x18, 0x0, {0x0, @link_local={0x1, 0x80, 0xc2}, 'ip6tnl0\x00'}}, 0x80, &(0x7f0000000380)=[{&(0x7f00000010c0)="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", 0x664}], 0x1}}], 0x1, 0x4000) recvfrom$inet(r0, &(0x7f00009be000)=""/11, 0xe8, 0x0, 0x0, 0xffffffffffffff4e) bind$bt_l2cap(r4, &(0x7f0000000440)={0x1f, 0x8, {0x6, 0x400, 0x0, 0x2, 0x9, 0x3}, 0x10001, 0x2}, 0xe) setsockopt(r5, 0xb5, 0xffffffff, &(0x7f00000006c0)="0ac385d7ac2ae574baf1b3104b37fd7f20ebca1da5063c612b05a3d56c8b2e413e64bfc3e0bb415e656477eea9c01ad808e74aea23e7e4a07d09f22e69e1ae37fecf707d249ba82f1fc8f4a53558952762a62d5712f7ad3f1e2d51e5e3cf31154625d23de117cbb19fe0379b78ae656d20a1840850e0d1b6f6d94f8c810560030e0ac978d48567edbbb1f79c22a73e5a978f82d9637023d70e36036002", 0x9d) getsockopt$inet_sctp_SCTP_RECVRCVINFO(r0, 0x84, 0x20, &(0x7f0000000180), &(0x7f00000001c0)=0x4) sendmsg$netrom(r3, &(0x7f0000000b00)={&(0x7f0000000780)=@full={{0x3, {"53665db4283e1b"}, 0x3}, [{"d40335b6bcd5d9"}, {"d5952336c520fb"}, {"d326c92416d6ea"}, {"763aea9242214f"}, {"d716c11982a583"}, {"712de86f857435"}, {"1d8bd63f2c431c"}, {"6f5a0b1522aca6"}]}, 0x48, &(0x7f0000000ac0), 0x0, &(0x7f00000017c0)=[{0x10, 0x117, 0x9}], 0x10, 0x8000}, 0x4000840) setsockopt$inet_mtu(r3, 0x0, 0xa, &(0x7f0000000480), 0x4) r6 = getpid() epoll_ctl$EPOLL_CTL_ADD(r3, 0x1, r3, &(0x7f00000004c0)={0x5}) syz_open_procfs(r6, &(0x7f00000005c0)='maps\x00') shutdown(r0, 0x1) 2018/03/29 17:35:01 executing program 0: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)={0xb, 0x7e, 0x3, 0x1, 0x11}, 0x2c) mount(&(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) r1 = socket$kcm(0x29, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000000bc0)={&(0x7f00000007c0)=@rc={0x1f, {0x5, 0x50000000, 0xaa2, 0x613, 0x4, 0x1ff}}, 0x80, &(0x7f0000000940)=[{&(0x7f0000000840)="09c9453aa30d8c5fba221fa2413f12c580837b2ae292e3ee8dd00098c404125a1a2e63840f82a2f69c3927af43b828422484aaeeceebcbe76e999bd3930c9b7c2995484407f9166e39c2069a88b63a980b9b5ffc880f4b89dde5adae6c7fb84ed98cbac860214dfb0b28d1b2e2d58aefebdfe515334f2ffa46be22ef7a4b3a276cb70a27c9e9f5de0a20bad24cbe2b89aee9693c2f8f186ea59fcfc4ebec7188cca0418d4583a6f1730f62416d70cd62555eb4f58ea831d1fea9956a2cba0049f23bf0b249f5de2ce0dc303808d70b0ccab3c7f37e949e", 0xd7}], 0x1, &(0x7f0000000980)}, 0x4010) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0xb, 0x9, &(0x7f0000000580)=@framed={{0x18}, [@map={0x18, 0x0, 0x1, 0x0, r0}, @generic={0x3ff, 0xfffffffffffffffc, 0x1}, @call={0x85, 0x0, 0x0, 0x6}], {0x95}}, &(0x7f0000000600)='syzkaller\x00', 0x0, 0x30, &(0x7f0000000640)=""/48, 0x41f00, 0x1}, 0x48) ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, r2) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000000)={&(0x7f0000000080)='./file0/file0\x00', r0}, 0x10) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000400)=@ax25={0x3, {"02f47b3723e03d"}}, 0x80, &(0x7f00000017c0), 0x0, &(0x7f0000001840)=ANY=[], 0x0, 0x24004044}, 0x4008001) bpf$MAP_CREATE(0x0, &(0x7f0000002cc0)={0x5, 0x100, 0x56c96e7a, 0x2, 0xa, 0xffffffffffffffff, 0x9}, 0x2c) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000480)='rpc_pipefs\x00', 0x200000, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000002d00)={0xffffffffffffffff, 0xffffffffffffffff}) openat$ppp(0xffffffffffffff9c, &(0x7f0000000240)='/dev/ppp\x00', 0x10002, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f00000004c0)='vmnet0keyring\x00') bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000780)={&(0x7f0000000740)='./file0/file0\x00', r3}, 0x10) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, &(0x7f0000000700)='proc!@ppp1!ppp0ppp0#)lo\\lolo{\x00') mount(&(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000200)='fuseblk\x00', 0xa11800, &(0x7f0000000240)) mount(&(0x7f00000002c0)='./file0/file0\x00', &(0x7f0000000300)='./file0/file0\x00', &(0x7f0000000340)='minix\x00', 0x0, &(0x7f0000000380)) 2018/03/29 17:35:01 executing program 4: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)={0xb, 0x7e, 0x3, 0x1, 0x11}, 0x2c) mount(&(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) r1 = socket$kcm(0x29, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000000bc0)={&(0x7f00000007c0)=@rc={0x1f, {0x5, 0x50000000, 0xaa2, 0x613, 0x4, 0x1ff}, 0x3f}, 0x80, &(0x7f0000000940)=[{&(0x7f0000000840)="09c9453aa30d8c5fba221fa2413f12c580837b2ae292e3ee8dd00098c404125a1a2e63840f82a2f69c3927af43b828422484aaeeceebcbe76e999bd3930c9b7c2995484407f9166e39c2069a88b63a980b9b5ffc880f4b89dde5adae6c7fb84ed98cbac860214dfb0b28d1b2e2d58aefebdfe515334f2ffa46be22ef7a4b3a276cb70a27c9e9f5de0a20bad24cbe2b89aee9693c2f8f186ea59fcfc4ebec7188cca0418d4583a6f1730f62416d70cd62555eb4f58ea831d1fea9956a2cba0049f23bf0b249f5de2ce0dc303808d70b0ccab3c7f37e949e", 0xd7}], 0x1, &(0x7f0000000980), 0x0, 0x20004805}, 0x4010) r2 = perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x2367, 0x7fff, 0x1, 0x6, 0x0, 0x78b1, 0x1, 0x0, 0x4992c766, 0xff, 0x81, 0x100, 0x40, 0x3, 0x9, 0x8, 0x1, 0x10000, 0x0, 0x6, 0x90e, 0x9, 0x7ff, 0x0, 0x8, 0x1, 0x30, 0x20, 0x7fffffff, 0x6, 0x401, 0x2, 0x1000, 0x8001, 0x1ff, 0xfffffffffffffff8, 0x0, 0x2, 0x0, @perf_config_ext={0x5, 0x8}, 0x1ab23, 0x3f, 0x8, 0x5, 0x6}, 0xffffffffffffffff, 0x10, r0, 0x1) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x0, 0x9, &(0x7f0000000580)=@framed={{0x18}, [@map={0x18, 0x0, 0x1, 0x0, r0}, @generic={0x3ff, 0xfffffffffffffffc, 0x1}, @call={0x85, 0x0, 0x0, 0x6}], {0x95}}, &(0x7f0000000600)='syzkaller\x00', 0x0, 0x30, &(0x7f0000000640)=""/48, 0x41f00, 0x1}, 0x48) ioctl$PERF_EVENT_IOC_SET_BPF(r2, 0x40042408, r3) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000000)={&(0x7f0000000080)='./file0/file0\x00', r0}, 0x10) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000400)=@ax25={0x3, {"02f47b3723e03d"}}, 0x80, &(0x7f00000017c0), 0x0, &(0x7f0000001840)=ANY=[], 0x0, 0x24004044}, 0x4008001) bpf$MAP_CREATE(0x0, &(0x7f0000002cc0)={0x5, 0x100, 0x56c96e7a, 0x2, 0xa, 0xffffffffffffffff, 0x9}, 0x2c) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000480)='rpc_pipefs\x00', 0x200000, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000002d00)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f00000004c0)='vmnet0keyring\x00') bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000780)={&(0x7f0000000740)='./file0/file0\x00', r4}, 0x10) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x40082406, &(0x7f0000000700)='proc!@ppp1!ppp0ppp0#)lo\\lolo{\x00') mount(&(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000200)='fuseblk\x00', 0xa11800, &(0x7f0000000240)) r5 = syz_open_dev$sg(&(0x7f0000000240)='/dev/sg#\x00', 0xfffffffffffffffa, 0x800) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000280)={r5, r3, 0x5, 0x1}, 0x10) ioctl$TIOCCONS(r5, 0x541d) mount(&(0x7f00000002c0)='./file0/file0\x00', &(0x7f0000000300)='./file0/file0\x00', &(0x7f0000000340)='minix\x00', 0x1000, &(0x7f0000000380)) 2018/03/29 17:35:01 executing program 3: r0 = socket(0xa, 0x2, 0x0) r1 = open(&(0x7f00004b8ff8)='./file0\x00', 0x28042, 0x0) connect$inet6(r0, &(0x7f0000d3cfe4)={0xa, 0x0, 0x0, @mcast2={0xff, 0x2, [], 0x1}, 0x3}, 0x1c) ioctl$DRM_IOCTL_ADD_CTX(r1, 0xc0086420, &(0x7f0000000000)) ioctl$DRM_IOCTL_NEW_CTX(r1, 0x40086425, &(0x7f0000000080)={0x0, 0x3}) fallocate(r1, 0x0, 0xffff, 0x1f) setsockopt$inet6_mtu(0xffffffffffffffff, 0x29, 0x17, &(0x7f0000000100)=0x2, 0x4) connect$inet(r0, &(0x7f0000000040)={0x2, 0x4e22, @multicast1=0xe0000001}, 0x10) sendfile(r0, r1, &(0x7f00005faff8), 0xfffb) ioctl$KVM_RUN(r1, 0xae80, 0x0) 2018/03/29 17:35:01 executing program 4: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)={0xb, 0x7e, 0x3, 0x1, 0x11}, 0x2c) mount(&(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) r1 = socket$kcm(0x29, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000000bc0)={&(0x7f00000007c0)=@rc={0x1f, {0x5, 0x50000000, 0xaa2, 0x613, 0x4, 0x1ff}, 0x3f}, 0x80, &(0x7f0000000940)=[{&(0x7f0000000840)="09c9453aa30d8c5fba221fa2413f12c580837b2ae292e3ee8dd00098c404125a1a2e63840f82a2f69c3927af43b828422484aaeeceebcbe76e999bd3930c9b7c2995484407f9166e39c2069a88b63a980b9b5ffc880f4b89dde5adae6c7fb84ed98cbac860214dfb0b28d1b2e2d58aefebdfe515334f2ffa46be22ef7a4b3a276cb70a27c9e9f5de0a20bad24cbe2b89aee9693c2f8f186ea59fcfc4ebec7188cca0418d4583a6f1730f62416d70cd62555eb4f58ea831d1fea9956a2cba0049f23bf0b249f5de2ce0dc303808d70b0ccab3c7f37e949e", 0xd7}], 0x1, &(0x7f0000000980), 0x0, 0x20004805}, 0x4010) r2 = perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x2367, 0x7fff, 0x1, 0x6, 0x0, 0x78b1, 0x1, 0x0, 0x4992c766, 0xff, 0x81, 0x100, 0x40, 0x3, 0x9, 0x8, 0x1, 0x10000, 0x0, 0x6, 0x90e, 0x9, 0x7ff, 0x0, 0x8, 0x1, 0x30, 0x20, 0x7fffffff, 0x6, 0x401, 0x2, 0x1000, 0x8001, 0x1ff, 0xfffffffffffffff8, 0x0, 0x2, 0x0, @perf_config_ext={0x5, 0x8}, 0x1ab23, 0x3f, 0x8, 0x5, 0x6}, 0xffffffffffffffff, 0x10, r0, 0x1) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x0, 0x9, &(0x7f0000000580)=@framed={{0x18}, [@map={0x18, 0x0, 0x1, 0x0, r0}, @generic={0x3ff, 0xfffffffffffffffc, 0x1}, @call={0x85, 0x0, 0x0, 0x6}], {0x95}}, &(0x7f0000000600)='syzkaller\x00', 0x0, 0x30, &(0x7f0000000640)=""/48, 0x41f00, 0x1}, 0x48) ioctl$PERF_EVENT_IOC_SET_BPF(r2, 0x40042408, r3) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000000)={&(0x7f0000000080)='./file0/file0\x00', r0}, 0x10) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000400)=@ax25={0x3, {"02f47b3723e03d"}}, 0x80, &(0x7f00000017c0), 0x0, &(0x7f0000001840)=ANY=[], 0x0, 0x24004044}, 0x4008001) bpf$MAP_CREATE(0x0, &(0x7f0000002cc0)={0x5, 0x100, 0x56c96e7a, 0x2, 0xa, 0xffffffffffffffff, 0x9}, 0x2c) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000480)='rpc_pipefs\x00', 0x200000, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000002d00)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f00000004c0)='vmnet0keyring\x00') bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000780)={&(0x7f0000000740)='./file0/file0\x00', r4}, 0x10) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x40082406, &(0x7f0000000700)='proc!@ppp1!ppp0ppp0#)lo\\lolo{\x00') mount(&(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000200)='fuseblk\x00', 0xa11800, &(0x7f0000000240)) r5 = syz_open_dev$sg(&(0x7f0000000240)='/dev/sg#\x00', 0xfffffffffffffffa, 0x800) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000280)={r5, r3, 0x5, 0x1}, 0x10) ioctl$TIOCCONS(r5, 0x541d) mount(&(0x7f00000002c0)='./file0/file0\x00', &(0x7f0000000300)='./file0/file0\x00', &(0x7f0000000340)='minix\x00', 0x1000, &(0x7f0000000380)) 2018/03/29 17:35:01 executing program 2: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)={0xb, 0x7e, 0x3, 0x1, 0x11}, 0x2c) mount(&(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) r1 = socket$kcm(0x29, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000000bc0)={&(0x7f00000007c0)=@rc={0x1f, {0x5, 0x50000000, 0xaa2, 0x613, 0x4, 0x1ff}, 0x3f}, 0x80, &(0x7f0000000940)=[{&(0x7f0000000840)="09c9453aa30d8c5fba221fa2413f12c580837b2ae292e3ee8dd00098c404125a1a2e63840f82a2f69c3927af43b828422484aaeeceebcbe76e999bd3930c9b7c2995484407f9166e39c2069a88b63a980b9b5ffc880f4b89dde5adae6c7fb84ed98cbac860214dfb0b28d1b2e2d58aefebdfe515334f2ffa46be22ef7a4b3a276cb70a27c9e9f5de0a20bad24cbe2b89aee9693c2f8f186ea59fcfc4ebec7188cca0418d4583a6f1730f62416d70cd62555eb4f58ea831d1fea9956a2cba0049f23bf0b249f5de2ce0dc303808d70b0ccab3c7f37e949e", 0xd7}], 0x1, &(0x7f0000000980), 0x0, 0x20004805}, 0x4010) r2 = perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x2367, 0x7fff, 0x1, 0x6, 0x0, 0x78b1, 0x1, 0x0, 0x4992c766, 0xff, 0x81, 0x100, 0x40, 0x3, 0x9, 0x8, 0x1, 0x10000, 0x0, 0x6, 0x90e, 0x9, 0x7ff, 0x0, 0x8, 0x1, 0x30, 0x20, 0x7fffffff, 0x6, 0x401, 0x2, 0x1000, 0x8001, 0x1ff, 0xfffffffffffffff8, 0x0, 0x2, 0x0, @perf_config_ext={0x5, 0x8}, 0x1ab23, 0x0, 0x8, 0x5, 0x6, 0x0, 0x6}, 0xffffffffffffffff, 0x10, r0, 0x1) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0xb, 0x9, &(0x7f0000000580)=@framed={{0x18}, [@map={0x18, 0x0, 0x1, 0x0, r0}, @generic={0x3ff, 0xfffffffffffffffc, 0x1}, @call={0x85, 0x0, 0x0, 0x6}], {0x95}}, &(0x7f0000000600)='syzkaller\x00', 0x0, 0x30, &(0x7f0000000640)=""/48, 0x41f00, 0x1}, 0x48) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000000)={&(0x7f0000000080)='./file0/file0\x00', r0}, 0x10) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000400)=@ax25={0x3, {"02f47b3723e03d"}}, 0x80, &(0x7f00000017c0), 0x0, &(0x7f0000001840)=ANY=[], 0x0, 0x24004044}, 0x4008001) bpf$MAP_CREATE(0x0, &(0x7f0000002cc0)={0x5, 0x0, 0x56c96e7a, 0x2, 0xa, 0xffffffffffffffff, 0x9}, 0x2c) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000480)='rpc_pipefs\x00', 0x200000, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000002d00)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$inet6_udp_int(r3, 0x11, 0x1, &(0x7f0000000240)=0x4, 0x4) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f00000004c0)='vmnet0keyring\x00') prctl$getreaper(0x19, &(0x7f0000000c00)) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000780)={&(0x7f0000000740)='./file0/file0\x00', r4}, 0x10) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x40082406, &(0x7f0000000700)='proc!@ppp1!ppp0ppp0#)lo\\lolo{\x00') mount(&(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000200)='fuseblk\x00', 0xa11800, &(0x7f0000000240)) mount(&(0x7f00000002c0)='./file0/file0\x00', &(0x7f0000000300)='./file0/file0\x00', &(0x7f0000000340)='minix\x00', 0x1000, &(0x7f0000000380)) openat$hwrng(0xffffffffffffff9c, &(0x7f0000000b00)='/dev/hwrng\x00', 0x305000, 0x0) openat$dsp(0xffffffffffffff9c, &(0x7f0000000b40)='/dev/dsp\x00', 0x202103, 0x0) r5 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000b80)='rdma.current\x00', 0x0, 0x0) r6 = openat(r5, &(0x7f0000000280)='./file0/file0\x00', 0x42, 0x80) getsockopt$inet_sctp_SCTP_RTOINFO(r3, 0x84, 0x0, &(0x7f0000000a40)={0x0, 0x1000, 0x0, 0x3}, &(0x7f0000000a80)=0x10) setsockopt$inet_sctp6_SCTP_RECONFIG_SUPPORTED(r6, 0x84, 0x75, &(0x7f0000000ac0)={r7, 0x4}, 0x8) ioctl$KVM_SET_XCRS(r6, 0x4188aea7, &(0x7f0000000980)={0xa, 0xffffffff, [{0x40, 0x0, 0x5}, {0x0, 0x0, 0x2988}, {0x1, 0x0, 0x1}, {0x6}, {0x9, 0x0, 0x5}, {0x6, 0x0, 0x6}, {0x6, 0x0, 0x4c6}, {0x3f, 0x0, 0x200}, {0x4, 0x0, 0x1}, {0x4e0, 0x0, 0x2}]}) 2018/03/29 17:35:01 executing program 7: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)={0xb, 0x7e, 0x3, 0x1, 0x11}, 0x2c) mount(&(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) r1 = socket$kcm(0x29, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000000bc0)={&(0x7f00000007c0)=@rc={0x1f, {0x5, 0x50000000, 0xaa2, 0x613, 0x4, 0x1ff}, 0x3f}, 0x80, &(0x7f0000000940)=[{&(0x7f0000000840)="09c9453aa30d8c5fba221fa2413f12c580837b2ae292e3ee8dd00098c404125a1a2e63840f82a2f69c3927af43b828422484aaeeceebcbe76e999bd3930c9b7c2995484407f9166e39c2069a88b63a980b9b5ffc880f4b89dde5adae6c7fb84ed98cbac860214dfb0b28d1b2e2d58aefebdfe515334f2ffa46be22ef7a4b3a276cb70a27c9e9f5de0a20bad24cbe2b89aee9693c2f8f186ea59fcfc4ebec7188cca0418d4583a6f1730f62416d70cd62555eb4f58ea831d1fea9956a2cba0049f23bf0b249f5de2ce0dc303808d70b0ccab3c7f37e949e", 0xd7}], 0x1, &(0x7f0000000980), 0x0, 0x20004805}, 0x4010) r2 = perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x2367, 0x7fff, 0x1, 0x6, 0x0, 0x78b1, 0x1, 0x0, 0x4992c766, 0xff, 0x81, 0x100, 0x40, 0x3, 0x9, 0x8, 0x1, 0x10000, 0x0, 0x6, 0x90e, 0x9, 0x7ff, 0x0, 0x8, 0x1, 0x30, 0x20, 0x7fffffff, 0x6, 0x401, 0x2, 0x1000, 0x8001, 0x1ff, 0xfffffffffffffff8, 0x0, 0x2, 0x0, @perf_config_ext={0x5, 0x8}, 0x1ab23, 0x3f, 0x8, 0x5, 0x6, 0x0, 0x6}, 0xffffffffffffffff, 0x10, r0, 0x1) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0xb, 0x9, &(0x7f0000000580)=@framed={{0x18}, [@map={0x18, 0x0, 0x1, 0x0, r0}, @generic={0x3ff, 0xfffffffffffffffc, 0x1}, @call={0x85, 0x0, 0x0, 0x6}], {0x95}}, &(0x7f0000000600)='syzkaller\x00', 0x0, 0x30, &(0x7f0000000640)=""/48, 0x41f00, 0x1}, 0x48) ioctl$PERF_EVENT_IOC_SET_BPF(r2, 0x40042408, r3) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000000)={&(0x7f0000000080)='./file0/file0\x00', r0}, 0x10) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000400)=@ax25={0x3, {"02f47b3723e03d"}}, 0x80, &(0x7f00000017c0), 0x0, &(0x7f0000001840)=ANY=[], 0x0, 0x24004044}, 0x4008001) bpf$MAP_CREATE(0x0, &(0x7f0000002cc0)={0x5, 0x0, 0x56c96e7a, 0x2, 0xa, 0xffffffffffffffff, 0x9}, 0x2c) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000480)='rpc_pipefs\x00', 0x200000, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000002d00)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f00000004c0)='vmnet0keyring\x00') bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000780)={&(0x7f0000000740)='./file0/file0\x00', r4}, 0x10) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x40082406, &(0x7f0000000700)='proc!@ppp1!ppp0ppp0#)lo\\lolo{\x00') mount(&(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000200)='fuseblk\x00', 0xa11800, &(0x7f0000000240)) mount(&(0x7f00000002c0)='./file0/file0\x00', &(0x7f0000000300)='./file0/file0\x00', &(0x7f0000000340)='minix\x00', 0x1000, &(0x7f0000000380)) r5 = shmget$private(0x0, 0x4000, 0x10a0, &(0x7f0000ffa000/0x4000)=nil) getsockopt$inet_IP_XFRM_POLICY(r3, 0x0, 0x11, &(0x7f0000000980)={{{@in=@rand_addr, @in, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@local}, 0x0, @in6}}, &(0x7f0000000240)=0xe8) getgroups(0x2, &(0x7f0000000280)=[0xffffffffffffffff, 0xffffffffffffffff]) preadv(r2, &(0x7f0000001140)=[{&(0x7f0000000dc0)=""/159, 0x9f}, {&(0x7f0000000e80)=""/70, 0x46}, {&(0x7f0000000f00)=""/239, 0xef}, {&(0x7f0000001000)=""/178, 0xb2}, {&(0x7f00000010c0)=""/105, 0x69}], 0x5, 0x3f) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000a80)={{{@in6=@loopback, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast2}, 0x0, @in=@local}}, &(0x7f0000000b80)=0xe8) lstat(&(0x7f0000000c00)='./file0\x00', &(0x7f0000000c40)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000cc0)=0x0) fcntl$getownex(r1, 0x10, &(0x7f0000000d00)={0x0, 0x0}) shmctl$IPC_SET(r5, 0x1, &(0x7f0000000d40)={{0x0, r6, r7, r8, r9, 0x1c6, 0x8b}, 0x7, 0x5986, 0x10000, 0x3f, r10, r11, 0x1}) 2018/03/29 17:35:01 executing program 1: r0 = syz_open_dev$binder(&(0x7f0000002000)='/dev/binder#\x00', 0x0, 0x0) ioctl$BINDER_SET_CONTEXT_MGR(r0, 0x40046207, 0x0) r1 = syz_open_dev$binder(&(0x7f000000fff3)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) ioctl$BINDER_WRITE_READ(r1, 0xc0306201, &(0x7f0000012000)={0x8, 0x0, &(0x7f0000005fd4)=[@acquire={0x40046305}], 0x0, 0x0, &(0x7f0000012fc7)}) r2 = creat(&(0x7f0000000080)='./file0\x00', 0x4) ioctl$KDGKBMETA(r2, 0x4b62, &(0x7f0000000040)) ftruncate(r0, 0x0) ioctl$BINDER_WRITE_READ(r1, 0xc0306201, &(0x7f0000008fd0)={0x8, 0x0, &(0x7f000000dff8)=[@release={0x400c630e}], 0x0, 0x0, &(0x7f0000000f4d)}) ioctl$BINDER_WRITE_READ(r1, 0xc0306201, &(0x7f000000dfd0)={0x33, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="0f630c40000000010069aaa07fb06e0000000000f2141d6beefc9401b9d458d1eba4d1e68880bbb695d7821bbf63b644780a0b"], 0x0, 0x0, &(0x7f0000008f37)}) syz_open_dev$binder(&(0x7f0000000000)='/dev/binder#\x00', 0x0, 0x800) 2018/03/29 17:35:01 executing program 0: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)={0xb, 0x7e, 0x3, 0x1, 0x11}, 0x2c) mount(&(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) r1 = socket$kcm(0x29, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000000bc0)={&(0x7f00000007c0)=@rc={0x1f, {0x5, 0x50000000, 0xaa2, 0x613, 0x4, 0x1ff}}, 0x80, &(0x7f0000000940)=[{&(0x7f0000000840)="09c9453aa30d8c5fba221fa2413f12c580837b2ae292e3ee8dd00098c404125a1a2e63840f82a2f69c3927af43b828422484aaeeceebcbe76e999bd3930c9b7c2995484407f9166e39c2069a88b63a980b9b5ffc880f4b89dde5adae6c7fb84ed98cbac860214dfb0b28d1b2e2d58aefebdfe515334f2ffa46be22ef7a4b3a276cb70a27c9e9f5de0a20bad24cbe2b89aee9693c2f8f186ea59fcfc4ebec7188cca0418d4583a6f1730f62416d70cd62555eb4f58ea831d1fea9956a2cba0049f23bf0b249f5de2ce0dc303808d70b0ccab3c7f37e949e", 0xd7}], 0x1, &(0x7f0000000980)}, 0x4010) ioctl$sock_proto_private(r1, 0x89ea, &(0x7f0000000500)="db032a3cbb312ee0ab3f58b02c33cdde523098c8df0009e263a1cad5952f4085ad2aaa5f3b8406251f8de143a8878c3d9856e52941d63c26a63ae1727b1ad20040032e9046ed12e5ad40c7908d692b6977e12669f6809834fed55c600a4ec78d2dc01d407197c215f2e8a6d253570875eca35dd381a529c8a3a02be170c1d85e") r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0xb, 0x9, &(0x7f0000000580)=@framed={{0x18}, [@map={0x18, 0x0, 0x1, 0x0, r0}, @generic={0x3ff, 0xfffffffffffffffc, 0x1}, @call={0x85, 0x0, 0x0, 0x6}], {0x95}}, &(0x7f0000000600)='syzkaller\x00', 0x0, 0x30, &(0x7f0000000640)=""/48, 0x41f00, 0x1}, 0x48) ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, r2) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000000)={&(0x7f0000000080)='./file0/file0\x00', r0}, 0x10) syz_init_net_socket$nfc_llcp(0x27, 0x1, 0x1) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000400)=@ax25={0x3, {"02f47b3723e03d"}}, 0x80, &(0x7f00000017c0), 0x0, &(0x7f0000001840)=ANY=[], 0x0, 0x24004044}, 0x4008001) bpf$MAP_CREATE(0x0, &(0x7f0000002cc0)={0x5, 0x100, 0x56c96e7a, 0x2, 0xa, 0xffffffffffffffff, 0x9}, 0x2c) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000480)='rpc_pipefs\x00', 0x200000, 0x0) syz_open_dev$vcsn(&(0x7f0000000280)='/dev/vcs#\x00', 0x1, 0x482080) r3 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000a40)='/dev/autofs\x00', 0x200000, 0x0) ioctl$sock_netrom_SIOCADDRT(r3, 0x890b, &(0x7f0000000a80)) r4 = semget(0x3, 0x0, 0x44) semctl$SEM_INFO(r4, 0x7, 0x13, &(0x7f0000000980)=""/187) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000002d00)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f00000004c0)='vmnet0keyring\x00') bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000780)={&(0x7f0000000740)='./file0/file0\x00', r5}, 0x10) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, &(0x7f0000000700)='proc!@ppp1!ppp0ppp0#)lo\\lolo{\x00') mount(&(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000200)='fuseblk\x00', 0xa11800, &(0x7f0000000240)) mount(&(0x7f00000002c0)='./file0/file0\x00', &(0x7f0000000300)='./file0/file0\x00', &(0x7f0000000340)='minix\x00', 0x0, &(0x7f0000000380)) [ 279.415679] binder: 31465:31467 Acquire 1 refcount change on invalid ref 0 ret -22 [ 279.443901] binder: 31465:31467 BC_REQUEST_DEATH_NOTIFICATION invalid ref 0 [ 279.455933] binder: 31465:31467 BC_CLEAR_DEATH_NOTIFICATION invalid ref 16777216 [ 279.463591] binder: 31465:31467 unknown command 0 [ 279.476336] binder: 31465:31467 ioctl c0306201 2000dfd0 returned -22 [ 279.499173] binder: BINDER_SET_CONTEXT_MGR already set [ 279.507362] binder: 31465:31467 ioctl 40046207 0 returned -16 2018/03/29 17:35:01 executing program 5: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000ed4000)=0x78, 0x4) bind$inet(r0, &(0x7f0000deb000)={0x2, 0x4e23, @multicast1=0xe0000001}, 0x10) ioctl$sock_SIOCINQ(r0, 0x541b, &(0x7f0000000500)) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000f40ff8)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) getsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(0xffffffffffffff9c, 0x84, 0x1f, &(0x7f0000000240)={0x0, @in={{0x2, 0x4e23}}, 0x0, 0x3}, &(0x7f0000000000)=0x90) setsockopt$inet_sctp_SCTP_RTOINFO(0xffffffffffffffff, 0x84, 0x0, &(0x7f0000000040)={r1, 0x81, 0x7, 0x100000000}, 0x10) getsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(r0, 0x84, 0x18, &(0x7f00000003c0)={r1, 0x7}, &(0x7f0000000400)=0x8) socketpair(0x11, 0x800, 0x5, &(0x7f0000000200)={0xffffffffffffffff}) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_INFO(r2, 0xc08c5334, &(0x7f0000000600)={0x6, 0x7, 0x2f29fdaf, 'queue0\x00', 0x800}) r3 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000080)='/dev/hwrng\x00', 0x4000, 0x0) sendto$inet(r0, &(0x7f0000a88f88), 0x29f, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @loopback=0x7f000001}, 0x10) pipe2(&(0x7f0000000580)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80002) ioctl$EVIOCGBITKEY(0xffffffffffffffff, 0x80404521, &(0x7f00000000c0)=""/160) sendmmsg(r0, &(0x7f00000025c0)=[{{&(0x7f0000000300)=@pppoe={0x18, 0x0, {0x0, @link_local={0x1, 0x80, 0xc2}, 'ip6tnl0\x00'}}, 0x80, &(0x7f0000000380)=[{&(0x7f00000010c0)="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", 0x6cb}], 0x1}}], 0x1, 0x4000) recvfrom$inet(r0, &(0x7f00009be000)=""/11, 0xe8, 0x0, 0x0, 0xffffffffffffff4e) bind$bt_l2cap(r4, &(0x7f0000000440)={0x1f, 0x8, {0x6, 0x400, 0x0, 0x2, 0x9, 0x3}, 0x10001, 0x2}, 0xe) setsockopt(r5, 0xb5, 0xffffffff, &(0x7f00000006c0)="0ac385d7ac2ae574baf1b3104b37fd7f20ebca1da5063c612b05a3d56c8b2e413e64bfc3e0bb415e656477eea9c01ad808e74aea23e7e4a07d09f22e69e1ae37fecf707d249ba82f1fc8f4", 0x4b) getsockopt$inet_sctp_SCTP_RECVRCVINFO(r0, 0x84, 0x20, &(0x7f0000000180), &(0x7f00000001c0)=0x4) setsockopt$inet_mtu(r3, 0x0, 0xa, &(0x7f0000000480)=0x7, 0x4) r6 = getpid() epoll_ctl$EPOLL_CTL_ADD(r3, 0x1, r3, &(0x7f00000004c0)) syz_open_procfs(r6, &(0x7f00000005c0)='maps\x00') shutdown(r0, 0x1) 2018/03/29 17:35:01 executing program 2: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)={0xb, 0x7e, 0x3, 0x1, 0x11}, 0x2c) mount(&(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) r1 = socket$kcm(0x29, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000000bc0)={&(0x7f00000007c0)=@rc={0x1f, {0x5, 0x50000000, 0xaa2, 0x613, 0x4, 0x1ff}, 0x3f}, 0x80, &(0x7f0000000940)=[{&(0x7f0000000840)="09c9453aa30d8c5fba221fa2413f12c580837b2ae292e3ee8dd00098c404125a1a2e63840f82a2f69c3927af43b828422484aaeeceebcbe76e999bd3930c9b7c2995484407f9166e39c2069a88b63a980b9b5ffc880f4b89dde5adae6c7fb84ed98cbac860214dfb0b28d1b2e2d58aefebdfe515334f2ffa46be22ef7a4b3a276cb70a27c9e9f5de0a20bad24cbe2b89aee9693c2f8f186ea59fcfc4ebec7188cca0418d4583a6f1730f62416d70cd62555eb4f58ea831d1fea9956a2cba0049f23bf0b249f5de2ce0dc303808d70b0ccab3c7f37e949e", 0xd7}], 0x1, &(0x7f0000000980), 0x0, 0x20004805}, 0x4010) r2 = perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x2367, 0x7fff, 0x1, 0x6, 0x0, 0x78b1, 0x1, 0x0, 0x4992c766, 0xff, 0x81, 0x100, 0x40, 0x3, 0x9, 0x8, 0x1, 0x10000, 0x0, 0x6, 0x90e, 0x9, 0x7ff, 0x0, 0x8, 0x1, 0x30, 0x20, 0x7fffffff, 0x6, 0x401, 0x2, 0x1000, 0x8001, 0x1ff, 0xfffffffffffffff8, 0x0, 0x2, 0x0, @perf_config_ext={0x5, 0x8}, 0x1ab23, 0x0, 0x8, 0x5, 0x6, 0x0, 0x6}, 0xffffffffffffffff, 0x10, r0, 0x1) bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0xb, 0x9, &(0x7f0000000580)=@framed={{0x18}, [@map={0x18, 0x0, 0x1, 0x0, r0}, @generic={0x3ff, 0xfffffffffffffffc, 0x1}, @call={0x85, 0x0, 0x0, 0x6}], {0x95}}, &(0x7f0000000600)='syzkaller\x00', 0x0, 0x30, &(0x7f0000000640)=""/48, 0x41f00, 0x1}, 0x48) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000000)={&(0x7f0000000080)='./file0/file0\x00', r0}, 0x10) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000400)=@ax25={0x3, {"02f47b3723e03d"}}, 0x80, &(0x7f00000017c0), 0x0, &(0x7f0000001840)=ANY=[], 0x0, 0x24004044}, 0x4008001) bpf$MAP_CREATE(0x0, &(0x7f0000002cc0)={0x5, 0x0, 0x56c96e7a, 0x2, 0xa, 0xffffffffffffffff, 0x9}, 0x2c) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000480)='rpc_pipefs\x00', 0x200000, 0x0) r3 = openat$rfkill(0xffffffffffffff9c, &(0x7f0000000240)='/dev/rfkill\x00', 0x408000, 0x0) ioctl$DRM_IOCTL_INFO_BUFS(r3, 0xc0106418, &(0x7f0000000280)={0x2, 0x7, 0x7b, 0x24c0, 0x8, 0x1}) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000002d00)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f00000004c0)='vmnet0keyring\x00') bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000780)={&(0x7f0000000740)='./file0/file0\x00', r4}, 0x10) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x40082406, &(0x7f0000000700)='proc!@ppp1!ppp0ppp0#)lo\\lolo{\x00') mount(&(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000200)='fuseblk\x00', 0xa11800, &(0x7f0000000240)) mount(&(0x7f00000002c0)='./file0/file0\x00', &(0x7f0000000300)='./file0/file0\x00', &(0x7f0000000340)='minix\x00', 0x1000, &(0x7f0000000380)) ioctl$TIOCCBRK(r3, 0x5428) 2018/03/29 17:35:01 executing program 4: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)={0xb, 0x7e, 0x3, 0x1, 0x11}, 0x2c) mount(&(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) r1 = socket$kcm(0x29, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000000bc0)={&(0x7f00000007c0)=@rc={0x1f, {0x5, 0x50000000, 0xaa2, 0x613, 0x4, 0x1ff}, 0x3f}, 0x80, &(0x7f0000000940)=[{&(0x7f0000000840)="09c9453aa30d8c5fba221fa2413f12c580837b2ae292e3ee8dd00098c404125a1a2e63840f82a2f69c3927af43b828422484aaeeceebcbe76e999bd3930c9b7c2995484407f9166e39c2069a88b63a980b9b5ffc880f4b89dde5adae6c7fb84ed98cbac860214dfb0b28d1b2e2d58aefebdfe515334f2ffa46be22ef7a4b3a276cb70a27c9e9f5de0a20bad24cbe2b89aee9693c2f8f186ea59fcfc4ebec7188cca0418d4583a6f1730f62416d70cd62555eb4f58ea831d1fea9956a2cba0049f23bf0b249f5de2ce0dc303808d70b0ccab3c7f37e949e", 0xd7}], 0x1, &(0x7f0000000980), 0x0, 0x20004805}, 0x4010) r2 = perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x2367, 0x7fff, 0x1, 0x6, 0x0, 0x78b1, 0x1, 0x0, 0x4992c766, 0xff, 0x81, 0x100, 0x40, 0x3, 0x9, 0x8, 0x1, 0x10000, 0x0, 0x6, 0x90e, 0x9, 0x7ff, 0x0, 0x8, 0x1, 0x30, 0x20, 0x7fffffff, 0x6, 0x401, 0x2, 0x1000, 0x8001, 0x1ff, 0xfffffffffffffff8, 0x0, 0x2, 0x0, @perf_config_ext={0x5, 0x8}, 0x1ab23, 0x3f, 0x8, 0x5, 0x6}, 0xffffffffffffffff, 0x10, r0, 0x1) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0xb, 0x7, &(0x7f0000000580)=@framed={{0x18}, [@generic={0x3ff, 0xfffffffffffffffc, 0x1}, @call={0x85, 0x0, 0x0, 0x6}], {0x95}}, &(0x7f0000000600)='syzkaller\x00', 0x0, 0x30, &(0x7f0000000640)=""/48, 0x41f00, 0x1}, 0x48) ioctl$PERF_EVENT_IOC_SET_BPF(r2, 0x40042408, r3) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000000)={&(0x7f0000000080)='./file0/file0\x00', r0}, 0x10) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000400)=@ax25={0x3, {"02f47b3723e03d"}}, 0x80, &(0x7f00000017c0), 0x0, &(0x7f0000001840)=ANY=[], 0x0, 0x24004044}, 0x4008001) bpf$MAP_CREATE(0x0, &(0x7f0000002cc0)={0x5, 0x100, 0x56c96e7a, 0x2, 0xa, 0xffffffffffffffff, 0x9}, 0x2c) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000480)='rpc_pipefs\x00', 0x200000, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000002d00)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f00000004c0)='vmnet0keyring\x00') bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000780)={&(0x7f0000000740)='./file0/file0\x00', r4}, 0x10) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x40082406, &(0x7f0000000700)='proc!@ppp1!ppp0ppp0#)lo\\lolo{\x00') mount(&(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000200)='fuseblk\x00', 0xa11800, &(0x7f0000000240)) r5 = syz_open_dev$sg(&(0x7f0000000240)='/dev/sg#\x00', 0xfffffffffffffffa, 0x800) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000280)={r5, r3, 0x5, 0x1}, 0x10) ioctl$TIOCCONS(r5, 0x541d) mount(&(0x7f00000002c0)='./file0/file0\x00', &(0x7f0000000300)='./file0/file0\x00', &(0x7f0000000340)='minix\x00', 0x1000, &(0x7f0000000380)) 2018/03/29 17:35:01 executing program 3: r0 = socket(0xa, 0x2, 0x0) r1 = open(&(0x7f00004b8ff8)='./file0\x00', 0x28042, 0x0) connect$inet6(r0, &(0x7f0000d3cfe4)={0xa, 0x0, 0x4, @loopback={0x0, 0x1}, 0x979}, 0x1c) ioctl$DRM_IOCTL_ADD_CTX(r1, 0xc0086420, &(0x7f0000000000)) getsockopt$inet_sctp6_SCTP_HMAC_IDENT(r1, 0x84, 0x16, &(0x7f00000002c0)={0x7, [0x3, 0x5, 0x92, 0xfffffffffffffffd, 0x2, 0x81, 0x7f]}, &(0x7f0000000300)=0x12) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_INFO(r1, 0xc08c5335, &(0x7f00000001c0)={0x4, 0x2, 0x8, 'queue0\x00', 0x7fffffff}) ioctl$DRM_IOCTL_NEW_CTX(r1, 0x40086425, &(0x7f0000000080)={0x0, 0x3}) fallocate(r1, 0x0, 0xffff, 0x1f) setsockopt$inet6_mtu(0xffffffffffffffff, 0x29, 0x17, &(0x7f0000000100)=0x2, 0x4) connect$inet(r0, &(0x7f0000000040)={0x2, 0x4e22, @multicast1=0xe0000001}, 0x10) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r0, 0x84, 0x8, &(0x7f0000000280)=0x7, 0x4) ioctl$DRM_IOCTL_AGP_ALLOC(0xffffffffffffff9c, 0xc0206434, &(0x7f0000000140)={0x9, 0x0, 0x0, 0x8000}) ioctl$DRM_IOCTL_SG_ALLOC(r1, 0xc0106438, &(0x7f0000000180)={0x8, r2}) ioctl$DRM_IOCTL_AGP_ALLOC(r1, 0xc0206434, &(0x7f0000000340)={0x2, r2, 0x0, 0x6}) ioctl$TIOCSTI(r1, 0x5412, 0x7) sendfile(r0, r1, &(0x7f00000000c0)=0x400000, 0xfffb) 2018/03/29 17:35:01 executing program 7: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)={0xb, 0x7e, 0x3, 0x1, 0x11}, 0x2c) mount(&(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) r1 = socket$kcm(0x29, 0x5, 0x0) sendmsg$kcm(r1, &(0x7f0000000bc0)={&(0x7f00000007c0)=@rc={0x1f, {0x5, 0x50000000, 0xaa2, 0x613, 0x4, 0x1ff}, 0x3f}, 0x80, &(0x7f0000000940)=[{&(0x7f0000000840)="09c9453aa30d8c5fba221fa2413f12c580837b2ae292e3ee8dd00098c404125a1a2e63840f82a2f69c3927af43b828422484aaeeceebcbe76e999bd3930c9b7c2995484407f9166e39c2069a88b63a980b9b5ffc880f4b89dde5adae6c7fb84ed98cbac860214dfb0b28d1b2e2d58aefebdfe515334f2ffa46be22ef7a4b3a276cb70a27c9e9f5de0a20bad24cbe2b89aee9693c2f8f186ea59fcfc4ebec7188cca0418d4583a6f1730f62416d70cd62555eb4f58ea831d1fea9956a2cba0049f23bf0b249f5de2ce0dc303808d70b0ccab3c7f37e949e", 0xd7}], 0x1, &(0x7f0000000980), 0x0, 0x20004805}, 0x4010) r2 = perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x2367, 0x7fff, 0x1, 0x6, 0x0, 0x78b1, 0x1, 0x0, 0x4992c766, 0xff, 0x81, 0x100, 0x40, 0x3, 0x9, 0x3, 0x1, 0x10000, 0x0, 0x6, 0x90e, 0x9, 0x7ff, 0x1, 0x8, 0x1, 0x30, 0x20, 0x7fffffff, 0x6, 0x401, 0x2, 0x3ff, 0x8001, 0x1ff, 0xfffffffffffffff8, 0x0, 0x2, 0x0, @perf_config_ext={0x5, 0x8}, 0x1ab25, 0x3f, 0x8, 0x5, 0x6, 0x1000000, 0x6}, 0xffffffffffffffff, 0x10, r0, 0x1) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0xb, 0x9, &(0x7f0000000580)=ANY=[@ANYBLOB="1800000000000000000000000000000018100000", @ANYRES32=r0, @ANYBLOB="00000000fd8bee57d5eca985496696086725000000000000000000000085000000060000000000000000000000000000"], &(0x7f0000000600)='syzkaller\x00', 0x0, 0x30, &(0x7f0000000640)=""/48, 0x41f00, 0x1}, 0x48) ioctl$PERF_EVENT_IOC_SET_BPF(r2, 0x40042408, r3) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000000)={&(0x7f0000000080)='./file0/file0\x00', r0}, 0x10) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000400)=@ax25={0x3, {"02f47b3723e03d"}}, 0x80, &(0x7f00000017c0), 0x0, &(0x7f0000001840)=ANY=[], 0x0, 0x24004044}, 0x4008001) bpf$MAP_CREATE(0x0, &(0x7f0000002cc0)={0x5, 0x0, 0x56c96e7a, 0x2, 0xa, 0xffffffffffffffff, 0x9}, 0x2c) pipe(&(0x7f0000000240)={0xffffffffffffffff}) getsockopt$inet_sctp6_SCTP_FRAGMENT_INTERLEAVE(r4, 0x84, 0x12, &(0x7f0000000280), &(0x7f0000000980)=0x4) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000480)='rpc_pipefs\x00', 0x200000, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000002d00)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f00000004c0)='vmnet0keyring\x00') bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000780)={&(0x7f0000000740)='./file0/file0\x00', r5}, 0x10) getsockopt$llc_int(r2, 0x10c, 0x9, &(0x7f0000000a00), &(0x7f0000000a40)=0x4) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x40082406, &(0x7f0000000700)='proc!@ppp1!ppp0ppp0#)lo\\lolo{\x00') mount(&(0x7f0000000040)='./file0/file0\x00', &(0x7f00000009c0)='./file0/file0\x00', &(0x7f0000000200)='fuseblk\x00', 0xa11800, &(0x7f0000000240)) mount(&(0x7f00000002c0)='./file0/file0\x00', &(0x7f0000000300)='./file0/file0\x00', &(0x7f0000000340)='minix\x00', 0x1000, &(0x7f0000000380)) 2018/03/29 17:35:01 executing program 0: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)={0xb, 0x7e, 0x3, 0x1, 0x11}, 0x2c) mount(&(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) r1 = socket$kcm(0x29, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000000bc0)={&(0x7f00000007c0)=@rc={0x1f, {0x5, 0x50000000, 0xaa2, 0x613, 0x4, 0x1ff}}, 0x80, &(0x7f0000000940)=[{&(0x7f0000000840)="09c9453aa30d8c5fba221fa2413f12c580837b2ae292e3ee8dd00098c404125a1a2e63840f82a2f69c3927af43b828422484aaeeceebcbe76e999bd3930c9b7c2995484407f9166e39c2069a88b63a980b9b5ffc880f4b89dde5adae6c7fb84ed98cbac860214dfb0b28d1b2e2d58aefebdfe515334f2ffa46be22ef7a4b3a276cb70a27c9e9f5de0a20bad24cbe2b89aee9693c2f8f186ea59fcfc4ebec7188cca0418d4583a6f1730f62416d70cd62555eb4f58ea831d1fea9956a2cba0049f23bf0b249f5de2ce0dc303808d70b0ccab3c7f37e949e", 0xd7}], 0x1, &(0x7f0000000980)}, 0x4010) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0xb, 0x9, &(0x7f0000000580)=@framed={{0x18}, [@map={0x18, 0x0, 0x1, 0x0, r0}, @generic={0x3ff, 0xfffffffffffffffc, 0x1}, @call={0x85, 0x0, 0x0, 0x6}], {0x95}}, &(0x7f0000000600)='syzkaller\x00', 0x0, 0x30, &(0x7f0000000640)=""/48, 0x41f00, 0x1}, 0x48) ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, r2) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000000)={&(0x7f0000000080)='./file0/file0\x00', r0}, 0x10) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000400)=@ax25={0x3, {"02f47b3723e03d"}}, 0x80, &(0x7f00000017c0), 0x0, &(0x7f0000001840)=ANY=[], 0x0, 0x24004044}, 0x4008001) socket$vsock_dgram(0x28, 0x2, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000002cc0)={0x5, 0x100, 0x56c96e7a, 0x2, 0xa, 0xffffffffffffffff, 0x9}, 0x2c) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000480)='rpc_pipefs\x00', 0x200000, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000002d00)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f00000004c0)='vmnet0keyring\x00') bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000780)={&(0x7f0000000740)='./file0/file0\x00', r3}, 0x10) pkey_alloc(0x0, 0x1) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, &(0x7f0000000700)='proc!@ppp1!ppp0ppp0#)lo\\lolo{\x00') r4 = getpgrp(0x0) setpriority(0x3, r4, 0xd3da) mount(&(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000200)='fuseblk\x00', 0xa11800, &(0x7f0000000240)) mount(&(0x7f0000000240)='./file0/file0\x00', &(0x7f0000000300)='./file0/file0\x00', &(0x7f0000000340)='minix\x00', 0x1, &(0x7f0000000380)) 2018/03/29 17:35:01 executing program 1: r0 = open(&(0x7f0000000440)='./file0\x00', 0x1ffff, 0x5) ioctl$TIOCLINUX7(0xffffffffffffffff, 0x541c, &(0x7f0000000080)={0x7}) setsockopt$inet_tcp_int(r0, 0x6, 0x0, &(0x7f00000003c0)=0x6, 0xf4) perf_event_open(&(0x7f0000000240)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000180)='/dev/sequencer2\x00', 0x12100, 0x0) clock_gettime(0x0, &(0x7f00000001c0)={0x0}) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r1, 0x4040534e, &(0x7f0000000340)={0x0, @time={r2}, 0x1, {0x8, 0x606}, 0x101, 0x2}) r3 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000040)='/dev/rtc\x00', 0x0, 0x0) r4 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000580)='/dev/sequencer\x00', 0x0, 0x0) ioctl$LOOP_CLR_FD(r3, 0x7003) setsockopt$packet_buf(0xffffffffffffffff, 0x107, 0xd, &(0x7f00000004c0)="d9fb4f1bcfd3e0c1355ea2018b25a4fd911d8abc3f3fd71f4749878ac1fbce6e5d188e078b15be141905d7966406e4f3fb021da63028837a8407bcb3e3a676d251bcd09a04964ed9cd0f6cece267dc4bada0403dcef25dace8875f4a6495eb2e6cc4969e7de83153459b4d61669ed9eb7567", 0x72) perf_event_open(&(0x7f00000000c0)={0x0, 0x70, 0x0, 0x0, 0x7ff, 0xa1, 0x0, 0x0, 0x200, 0x2, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x5, 0x0, 0x401, 0xcf, 0x0, 0xffffffffffffffff, 0x100000000, 0x3ff, 0x0, 0x8, 0x2, 0x1f, 0x2, 0x5, 0x9, 0x3, 0x0, 0x4, 0x0, 0x20000000, 0x195d678803a3a953, @perf_config_ext={0x9, 0x5}, 0x10, 0x3, 0x8, 0x0, 0x72eb, 0x99, 0x1}, 0x0, 0xd, r3, 0x0) mq_notify(r4, &(0x7f0000000400)={0x0, 0x0, 0x4}) execve(&(0x7f0000000200)='./file0\x00', &(0x7f0000000680)=[&(0x7f0000000480)='wlan0\x00', &(0x7f0000000600)='\x00', &(0x7f0000000640)='proc\x00'], &(0x7f0000000740)=[&(0x7f00000006c0)='\'\x00', &(0x7f0000000700)='trustedwlan0vmnet0@%\x00']) 2018/03/29 17:35:01 executing program 6: r0 = signalfd4(0xffffffffffffffff, &(0x7f0000006000)={0x7fffffff}, 0x8, 0x0) readv(r0, &(0x7f0000000000)=[{&(0x7f000004f000)=""/128, 0x467}], 0x1) timer_create(0x3, &(0x7f000004c000)={0x0, 0x16}, &(0x7f000004cffc)) timer_settime(0x0, 0x1, &(0x7f000004a000)={{0x0, 0x989680}, {0x0, 0x7}}, &(0x7f000004afe0)) ioctl$sock_FIOGETOWN(0xffffffffffffff9c, 0x8903, &(0x7f0000000040)=0x0) timer_create(0x7, &(0x7f0000000080)={0x0, 0x1c, 0x3, @tid=r1}, &(0x7f00000000c0)) [ 279.513751] binder: 31465:31473 Acquire 1 refcount change on invalid ref 0 ret -22 [ 279.530311] binder: 31465:31467 unknown command 536907575 [ 279.535975] binder: 31465:31473 BC_CLEAR_DEATH_NOTIFICATION invalid ref 16777216 [ 279.543567] binder: 31465:31473 unknown command 0 [ 279.548957] binder: 31465:31467 ioctl c0306201 20008fd0 returned -22 [ 279.556660] binder: 31465:31473 ioctl c0306201 2000dfd0 returned -22 2018/03/29 17:35:01 executing program 4: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)={0xb, 0x7e, 0x3, 0x1, 0x11}, 0x2c) mount(&(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) r1 = socket$kcm(0x29, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000000bc0)={&(0x7f00000007c0)=@rc={0x1f, {0x5, 0x50000000, 0xaa2, 0x613, 0x4, 0x1ff}, 0x3f}, 0x80, &(0x7f0000000940)=[{&(0x7f0000000840)="09c9453aa30d8c5fba221fa2413f12c580837b2ae292e3ee8dd00098c404125a1a2e63840f82a2f69c3927af43b828422484aaeeceebcbe76e999bd3930c9b7c2995484407f9166e39c2069a88b63a980b9b5ffc880f4b89dde5adae6c7fb84ed98cbac860214dfb0b28d1b2e2d58aefebdfe515334f2ffa46be22ef7a4b3a276cb70a27c9e9f5de0a20bad24cbe2b89aee9693c2f8f186ea59fcfc4ebec7188cca0418d4583a6f1730f62416d70cd62555eb4f58ea831d1fea9956a2cba0049f23bf0b249f5de2ce0dc303808d70b0ccab3c7f37e949e", 0xd7}], 0x1, &(0x7f0000000980), 0x0, 0x20004805}, 0x4010) r2 = perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x2367, 0x7fff, 0x1, 0x6, 0x0, 0x78b1, 0x1, 0x0, 0x4992c766, 0xff, 0x81, 0x100, 0x40, 0x3, 0x9, 0x8, 0x1, 0x10000, 0x0, 0x6, 0x90e, 0x9, 0x7ff, 0x0, 0x8, 0x1, 0x30, 0x20, 0x7fffffff, 0x6, 0x401, 0x2, 0x1000, 0x8001, 0x1ff, 0xfffffffffffffff8, 0x0, 0x2, 0x0, @perf_config_ext={0x5, 0x8}, 0x1ab23, 0x3f, 0x8, 0x5, 0x6}, 0xffffffffffffffff, 0x10, r0, 0x1) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0xb, 0x7, &(0x7f0000000580)=@framed={{0x18}, [@generic={0x3ff, 0xfffffffffffffffc, 0x1}, @call={0x85, 0x0, 0x0, 0x6}], {0x95}}, &(0x7f0000000600)='syzkaller\x00', 0x0, 0x30, &(0x7f0000000640)=""/48, 0x41f00, 0x1}, 0x48) ioctl$PERF_EVENT_IOC_SET_BPF(r2, 0x40042408, r3) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000000)={&(0x7f0000000080)='./file0/file0\x00', r0}, 0x10) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000400)=@ax25={0x3, {"02f47b3723e03d"}}, 0x80, &(0x7f00000017c0), 0x0, &(0x7f0000001840)=ANY=[], 0x0, 0x24004044}, 0x4008001) bpf$MAP_CREATE(0x0, &(0x7f0000002cc0)={0x5, 0x100, 0x56c96e7a, 0x2, 0xa, 0xffffffffffffffff, 0x9}, 0x2c) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000480)='rpc_pipefs\x00', 0x200000, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000002d00)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f00000004c0)='vmnet0keyring\x00') bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000780)={&(0x7f0000000740)='./file0/file0\x00', r4}, 0x10) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x40082406, &(0x7f0000000700)='proc!@ppp1!ppp0ppp0#)lo\\lolo{\x00') mount(&(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000200)='fuseblk\x00', 0xa11800, &(0x7f0000000240)) r5 = syz_open_dev$sg(&(0x7f0000000240)='/dev/sg#\x00', 0xfffffffffffffffa, 0x800) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000280)={r5, r3, 0x5, 0x1}, 0x10) ioctl$TIOCCONS(r5, 0x541d) mount(&(0x7f00000002c0)='./file0/file0\x00', &(0x7f0000000300)='./file0/file0\x00', &(0x7f0000000340)='minix\x00', 0x1000, &(0x7f0000000380)) 2018/03/29 17:35:02 executing program 2: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)={0xb, 0x7e, 0x3, 0x1, 0x11}, 0x2c) mount(&(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) r1 = socket$kcm(0x29, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000000bc0)={&(0x7f00000007c0)=@rc={0x1f, {0x5, 0x50000000, 0xaa2, 0x613, 0x4, 0x1ff}, 0x3f}, 0x80, &(0x7f0000000940)=[{&(0x7f0000000840)="09c9453aa30d8c5fba221fa2413f12c580837b2ae292e3ee8dd00098c404125a1a2e63840f82a2f69c3927af43b828422484aaeeceebcbe76e999bd3930c9b7c2995484407f9166e39c2069a88b63a980b9b5ffc880f4b89dde5adae6c7fb84ed98cbac860214dfb0b28d1b2e2d58aefebdfe515334f2ffa46be22ef7a4b3a276cb70a27c9e9f5de0a20bad24cbe2b89aee9693c2f8f186ea59fcfc4ebec7188cca0418d4583a6f1730f62416d70cd62555eb4f58ea831d1fea9956a2cba0049f23bf0b249f5de2ce0dc303808d70b0ccab3c7f37e949e", 0xd7}], 0x1, &(0x7f0000000980), 0x0, 0x20004805}, 0x4010) r2 = perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x2367, 0x7fff, 0x1, 0x6, 0x0, 0x78b1, 0x1, 0x0, 0x4992c766, 0xff, 0x81, 0x100, 0x40, 0x3, 0x9, 0x8, 0x1, 0x10000, 0x0, 0x6, 0x90e, 0x9, 0x7ff, 0x0, 0x8, 0x1, 0x30, 0x20, 0x7fffffff, 0x6, 0x401, 0x2, 0x1000, 0x8001, 0x1ff, 0xfffffffffffffff8, 0x0, 0x2, 0x0, @perf_config_ext={0x5, 0x8}, 0x1ab23, 0x0, 0x8, 0x5, 0x6, 0x0, 0x6}, 0xffffffffffffffff, 0x10, r0, 0x1) bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0xb, 0x9, &(0x7f0000000580)=@framed={{0x18}, [@map={0x18, 0x0, 0x1, 0x0, r0}, @generic={0x3ff, 0xfffffffffffffffc, 0x1}, @call={0x85, 0x0, 0x0, 0x6}], {0x95}}, &(0x7f0000000600)='syzkaller\x00', 0x0, 0x30, &(0x7f0000000640)=""/48, 0x41f00, 0x1}, 0x48) inotify_init() bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000000)={&(0x7f0000000080)='./file0/file0\x00', r0}, 0x10) sendmsg$kcm(r1, &(0x7f0000000380)={&(0x7f0000000400)=@ax25={0x3, {"02f47b3723e03d"}}, 0x80, &(0x7f00000017c0), 0x0, &(0x7f0000001840)=ANY=[], 0x0, 0x24004044}, 0x4000000) bpf$MAP_CREATE(0x0, &(0x7f0000002cc0)={0x5, 0x0, 0x56c96e7a, 0x2, 0xa, 0xffffffffffffffff, 0x9}, 0x2c) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000480)='rpc_pipefs\x00', 0x200000, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000002d00)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f00000004c0)='vmnet0keyring\x00') bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000780)={&(0x7f0000000740)='./file0/file0\x00', r3}, 0x10) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x40082406, &(0x7f0000000700)='proc!@ppp1!ppp0ppp0#)lo\\lolo{\x00') mount(&(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000200)='fuseblk\x00', 0xa11800, &(0x7f0000000240)) mount(&(0x7f00000002c0)='./file0/file0\x00', &(0x7f0000000300)='./file0/file0\x00', &(0x7f0000000340)='minix\x00', 0x1000, &(0x7f0000000380)) 2018/03/29 17:35:02 executing program 7: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)={0xb, 0x7e, 0x3, 0x1, 0x11}, 0x2c) mount(&(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) r1 = socket$kcm(0x29, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000000bc0)={&(0x7f00000007c0)=@rc={0x1f, {0x5, 0x50000000, 0xaa2, 0x613, 0x4, 0x1ff}, 0x3f}, 0x80, &(0x7f0000000940)=[{&(0x7f0000000840)="09c9453aa30d8c5fba221fa2413f12c580837b2ae292e3ee8dd00098c404125a1a2e63840f82a2f69c3927af43b828422484aaeeceebcbe76e999bd3930c9b7c2995484407f9166e39c2069a88b63a980b9b5ffc880f4b89dde5adae6c7fb84ed98cbac860214dfb0b28d1b2e2d58aefebdfe515334f2ffa46be22ef7a4b3a276cb70a27c9e9f5de0a20bad24cbe2b89aee9693c2f8f186ea59fcfc4ebec7188cca0418d4583a6f1730f62416d70cd62555eb4f58ea831d1fea9956a2cba0049f23bf0b249f5de2ce0dc303808d70b0ccab3c7f37e949e", 0xd7}], 0x1, &(0x7f0000000980), 0x0, 0x20004805}, 0x4010) r2 = perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x2367, 0x7fff, 0x1, 0x6, 0x0, 0x78b1, 0x1, 0x0, 0x4992c766, 0xff, 0x81, 0x100, 0x40, 0x3, 0x9, 0x8, 0x1, 0x10000, 0x0, 0x6, 0x90e, 0x9, 0x7ff, 0x0, 0x8, 0x1, 0x30, 0x20, 0x7fffffff, 0x6, 0x401, 0x2, 0x1000, 0x8001, 0x1ff, 0xfffffffffffffff8, 0x0, 0x2, 0x0, @perf_config_ext={0x5, 0x8}, 0x1ab23, 0x3f, 0x8, 0x5, 0x6, 0x0, 0x6}, 0xffffffffffffffff, 0x10, r0, 0x1) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0xb, 0x9, &(0x7f0000000580)=ANY=[@ANYBLOB="1800000000000000000000000000000018100000", @ANYRES32=r0, @ANYBLOB="0000000000000020b5fc0100000000000000000000000000850000004b3a000000000000000000009500200000000000"], &(0x7f0000000600)='syzkaller\x00', 0x0, 0x30, &(0x7f0000000640)=""/48, 0x41f00, 0x1}, 0x48) ioctl$PERF_EVENT_IOC_SET_BPF(r2, 0x40042408, r3) mount(&(0x7f0000000980)='./file0/file0\x00', &(0x7f00000009c0)='./file0\x00', &(0x7f0000000a00)='ntfs\x00', 0x3, &(0x7f0000000a40)="dffd720732548206f8436500d48a27459817ea7cbf6ae802c861e6b48d") bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000000)={&(0x7f0000000080)='./file0/file0\x00', r0}, 0x10) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000400)=@ax25={0x3, {"02f47b3723e03d"}}, 0x80, &(0x7f00000017c0), 0x0, &(0x7f0000001840)=ANY=[], 0x0, 0x24004044}, 0x4008001) bpf$MAP_CREATE(0x0, &(0x7f0000002cc0)={0x5, 0x0, 0x56c96e7a, 0x2, 0xa, 0xffffffffffffffff, 0x9}, 0x2c) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000480)='rpc_pipefs\x00', 0x200000, 0x0) rename(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='./file0/file0\x00') ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f00000004c0)='vmnet0keyring\x00') bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000780)={&(0x7f0000000740)='./file0/file0\x00'}, 0x10) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x40082406, &(0x7f0000000700)='proc!@ppp1!ppp0ppp0#)lo\\lolo{\x00') mount(&(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000200)='fuseblk\x00', 0xa11800, &(0x7f0000000240)) mount(&(0x7f00000002c0)='./file0/file0\x00', &(0x7f0000000300)='./file0/file0\x00', &(0x7f0000000340)='minix\x00', 0x1000, &(0x7f0000000380)) mount(&(0x7f0000000a80)='./file0\x00', &(0x7f0000000ac0)='./file0\x00', &(0x7f0000000b00)='anon_inodefs\x00', 0x50004, &(0x7f0000000c00)="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") 2018/03/29 17:35:02 executing program 3: r0 = socket(0xa, 0x2, 0x0) r1 = open(&(0x7f00004b8ff8)='./file0\x00', 0x28042, 0x0) connect$inet6(r0, &(0x7f0000d3cfe4)={0xa, 0x0, 0x0, @mcast2={0xff, 0x2, [], 0x1}, 0x3}, 0x1c) ioctl$DRM_IOCTL_ADD_CTX(r1, 0xc0086420, &(0x7f0000000000)) ioctl$DRM_IOCTL_NEW_CTX(r1, 0x40086425, &(0x7f0000000080)={0x0, 0x3}) fallocate(r1, 0x0, 0xffff, 0x1f) getsockopt$inet_sctp_SCTP_STREAM_SCHEDULER(r1, 0x84, 0x7b, &(0x7f00000000c0)={0x0, 0x800}, &(0x7f0000000140)=0x8) setsockopt$inet_sctp_SCTP_RESET_ASSOC(r1, 0x84, 0x78, &(0x7f00000001c0)=r2, 0x4) setsockopt$inet6_mtu(0xffffffffffffffff, 0x29, 0x17, &(0x7f0000000100)=0x2, 0x4) connect$inet(r0, &(0x7f0000000040)={0x2, 0x4e22, @multicast1=0xe0000001}, 0x10) sendfile(r0, r1, &(0x7f00005faff8), 0xfffb) 2018/03/29 17:35:02 executing program 5: setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(0xffffffffffffffff, 0x84, 0x64, &(0x7f0000000180)=[@in6={0xa, 0x0, 0x0, @mcast1={0xff, 0x1, [], 0x1}}, @in6={0xa, 0x0, 0x0, @dev={0xfe, 0x80}}, @in6={0xa, 0x0, 0x0, @ipv4={[], [0xff, 0xff], @multicast2=0xe0000002}}, @in={0x2, 0x0, @loopback=0x7f000001}], 0x64) pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x0, 0xb7c, 0x5, 0x3, 0x0, r0, 0x80}, 0x2c) socket(0x1e, 0x2000000000000005, 0x0) getsockopt$inet_sctp_SCTP_MAXSEG(r1, 0x84, 0xd, &(0x7f0000000080)=@assoc_id=0x0, &(0x7f00000000c0)=0x4) r3 = socket$inet6(0xa, 0x3, 0x8010000400000081) sendmsg$rds(0xffffffffffffffff, &(0x7f0000000600)={&(0x7f0000000100)={0x2, 0x0, @multicast1=0xe0000001}, 0x10, &(0x7f0000000540), 0x0, &(0x7f00000005c0)}, 0x0) r4 = socket$nl_generic(0x10, 0x3, 0x10) setsockopt$netlink_NETLINK_TX_RING(0xffffffffffffffff, 0x10e, 0x7, &(0x7f0000000040)={0x0, 0x0, 0x7}, 0x10) socket$packet(0x11, 0x3, 0x300) setsockopt$packet_add_memb(0xffffffffffffffff, 0x107, 0x1, &(0x7f00000000c0)={0x0, 0x1, 0x6, @random="7c2e1626459d"}, 0x10) ioctl$sock_SIOCBRADDBR(r4, 0x89a0, &(0x7f0000000980)='bcsf0\x00') ioctl$sock_SIOCBRDELBR(r4, 0x89a1, &(0x7f0000000000)='bcsf0\x00') accept$packet(0xffffffffffffffff, 0x0, &(0x7f0000000040)) getsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, &(0x7f0000000080), 0x10) socket$packet(0x11, 0x3, 0x300) setsockopt$packet_add_memb(0xffffffffffffffff, 0x107, 0x1, &(0x7f00000000c0)={0x0, 0x1, 0xac, @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff]}, 0x10) r5 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r5, &(0x7f00000001c0)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0xffffffffffffffff}, 0xc, &(0x7f00000000c0)={&(0x7f0000000140)=@newlink={0x40, 0x10, 0x1, 0x0, 0x0, {}, [@IFLA_BROADCAST={0xc, 0x2, @remote={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xbb}}, @IFLA_IFNAME={0x14, 0x3, 'lo\x00'}]}, 0x40}, 0x1, 0x0, 0x0, 0x4000804}, 0x90) setsockopt$packet_add_memb(0xffffffffffffffff, 0x107, 0x1, &(0x7f0000000080)={0x0, 0x1, 0x6}, 0x10) socket$inet_icmp_raw(0x2, 0x3, 0x1) getsockopt$inet_sctp6_SCTP_PR_ASSOC_STATUS(0xffffffffffffffff, 0x84, 0x73, &(0x7f0000000200)={0x0, 0xe807, 0x20, 0xfb, 0x7}, &(0x7f0000000240)=0x18) getsockopt$inet_sctp_SCTP_DEFAULT_PRINFO(0xffffffffffffffff, 0x84, 0x72, &(0x7f0000000280)={0x0, 0x7f, 0x10}, &(0x7f00000002c0)=0xc) setsockopt$EBT_SO_SET_ENTRIES(0xffffffffffffffff, 0x0, 0x80, &(0x7f0000000440)=@broute={'broute\x00', 0x20, 0x2, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000180], 0x0, &(0x7f0000000000), &(0x7f0000000100)=ANY=[]}, 0x78) pipe(&(0x7f0000000540)) sendmmsg(r3, &(0x7f0000003f00)=[{{&(0x7f0000000080)=@in6={0xa, 0x0, 0x0, @dev={0xfe, 0x80}}, 0x80, &(0x7f0000000780)}}, {{&(0x7f0000000840)=@in6={0xa, 0x0, 0x0, @local={0xfe, 0x80, [], 0xaa}, 0xb25}, 0x80, &(0x7f0000001b80), 0x0, &(0x7f0000001c00)}}], 0x2, 0x0) setsockopt$inet_sctp_SCTP_STREAM_SCHEDULER_VALUE(r0, 0x84, 0x7c, &(0x7f0000000340)={r2, 0x0, 0x100}, 0x8) 2018/03/29 17:35:02 executing program 1: r0 = getpgrp(0xffffffffffffffff) r1 = syz_open_procfs(r0, &(0x7f00000000c0)='stat\x00') ioctl$sock_inet_SIOCSIFBRDADDR(r1, 0x891a, &(0x7f00000008c0)={'ip6tnl0\x00', {0x2, 0x4e23, @multicast1=0xe0000001}}) sendfile(r1, r1, &(0x7f0000000040)=0xffffffff77fffffe, 0x5) getresuid(&(0x7f0000000480), &(0x7f00000004c0), &(0x7f0000000500)) stat(&(0x7f0000000540)='./file0\x00', &(0x7f0000000580)) geteuid() stat(&(0x7f0000000600)='./file0\x00', &(0x7f0000000640)) stat(&(0x7f00000006c0)='./file0\x00', &(0x7f0000000700)) r2 = getegid() stat(&(0x7f0000000780)='./file0\x00', &(0x7f00000007c0)) r3 = getgid() getuid() fstat(r1, &(0x7f0000000840)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) sendmsg$unix(0xffffffffffffffff, &(0x7f00000009c0)={&(0x7f0000000100)=@abs={0x0, 0x0, 0x4e23}, 0x6e, &(0x7f0000000440)=[{&(0x7f0000000180)="f5dc941f4dc3cd9adc57ae91e3dd4343d2d34a84526e7cc2dced527b17e9f844324330a6c4fc95075fc39479fc730a76e14b1c7e042182b78b54fd1112d5d88e0463edf0b527bc60eef252342942a7d15f5dbf3a13deeaef54e8a875bd6393929f9f520c496c5643e469d505dd150b595920", 0x72}], 0x1, &(0x7f0000000ac0)=ANY=[@ANYBLOB="18000000010000000200", @ANYBLOB, @ANYRES32=r2, @ANYBLOB="180000000100000002000000", @ANYRES32=r3, @ANYBLOB="1800000001000200000000003b807f0af037927569073608982ff4048a7ecfa7a1c67509e2d123a2b26f36835b10059f7a10eb109d87fc6064da955f7e7f205180a40f55cbeb36713ac27eb87fbecffcbff26a930baf2e9c2ef6884dac58f0a50bb630bd5b40ae09ab39821a7438e4933f62cb131b62df345d2bf2ad49b098c04953df23", @ANYRES32=r4, @ANYBLOB="300000000100000001000000", @ANYRES32=r1, @ANYRES32=r1, @ANYRES32=r1, @ANYRES32, @ANYRES32, @ANYRES32=r1, @ANYRES32], 0xce, 0x91}, 0x24008000) getresgid(&(0x7f0000000a00), &(0x7f0000000a40), &(0x7f0000000a80)) 2018/03/29 17:35:02 executing program 4: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)={0xb, 0x7e, 0x3, 0x1, 0x11}, 0x2c) mount(&(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) r1 = socket$kcm(0x29, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000000bc0)={&(0x7f00000007c0)=@rc={0x1f, {0x5, 0x50000000, 0xaa2, 0x613, 0x4, 0x1ff}, 0x3f}, 0x80, &(0x7f0000000940)=[{&(0x7f0000000840)="09c9453aa30d8c5fba221fa2413f12c580837b2ae292e3ee8dd00098c404125a1a2e63840f82a2f69c3927af43b828422484aaeeceebcbe76e999bd3930c9b7c2995484407f9166e39c2069a88b63a980b9b5ffc880f4b89dde5adae6c7fb84ed98cbac860214dfb0b28d1b2e2d58aefebdfe515334f2ffa46be22ef7a4b3a276cb70a27c9e9f5de0a20bad24cbe2b89aee9693c2f8f186ea59fcfc4ebec7188cca0418d4583a6f1730f62416d70cd62555eb4f58ea831d1fea9956a2cba0049f23bf0b249f5de2ce0dc303808d70b0ccab3c7f37e949e", 0xd7}], 0x1, &(0x7f0000000980), 0x0, 0x20004805}, 0x4010) r2 = perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x2367, 0x7fff, 0x1, 0x6, 0x0, 0x78b1, 0x1, 0x0, 0x4992c766, 0xff, 0x81, 0x100, 0x40, 0x3, 0x9, 0x8, 0x1, 0x10000, 0x0, 0x6, 0x90e, 0x9, 0x7ff, 0x0, 0x8, 0x1, 0x30, 0x20, 0x7fffffff, 0x6, 0x401, 0x2, 0x1000, 0x8001, 0x1ff, 0xfffffffffffffff8, 0x0, 0x2, 0x0, @perf_config_ext={0x5, 0x8}, 0x1ab23, 0x3f, 0x8, 0x5, 0x6}, 0xffffffffffffffff, 0x10, r0, 0x1) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0xb, 0x7, &(0x7f0000000580)=@framed={{0x18}, [@generic={0x3ff, 0xfffffffffffffffc, 0x1}, @call={0x85, 0x0, 0x0, 0x6}], {0x95}}, &(0x7f0000000600)='syzkaller\x00', 0x0, 0x30, &(0x7f0000000640)=""/48, 0x41f00, 0x1}, 0x48) ioctl$PERF_EVENT_IOC_SET_BPF(r2, 0x40042408, r3) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000000)={&(0x7f0000000080)='./file0/file0\x00', r0}, 0x10) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000400)=@ax25={0x3, {"02f47b3723e03d"}}, 0x80, &(0x7f00000017c0), 0x0, &(0x7f0000001840)=ANY=[], 0x0, 0x24004044}, 0x4008001) bpf$MAP_CREATE(0x0, &(0x7f0000002cc0)={0x5, 0x100, 0x56c96e7a, 0x2, 0xa, 0xffffffffffffffff, 0x9}, 0x2c) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000480)='rpc_pipefs\x00', 0x200000, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000002d00)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f00000004c0)='vmnet0keyring\x00') bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000780)={&(0x7f0000000740)='./file0/file0\x00', r4}, 0x10) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x40082406, &(0x7f0000000700)='proc!@ppp1!ppp0ppp0#)lo\\lolo{\x00') mount(&(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000200)='fuseblk\x00', 0xa11800, &(0x7f0000000240)) r5 = syz_open_dev$sg(&(0x7f0000000240)='/dev/sg#\x00', 0xfffffffffffffffa, 0x800) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000280)={r5, r3, 0x5, 0x1}, 0x10) ioctl$TIOCCONS(r5, 0x541d) mount(&(0x7f00000002c0)='./file0/file0\x00', &(0x7f0000000300)='./file0/file0\x00', &(0x7f0000000340)='minix\x00', 0x1000, &(0x7f0000000380)) 2018/03/29 17:35:02 executing program 6: r0 = open(&(0x7f0000000440)='./file0\x00', 0x1ffff, 0x5) ioctl$TIOCLINUX7(0xffffffffffffffff, 0x541c, &(0x7f0000000080)={0x7}) setsockopt$inet_tcp_int(r0, 0x6, 0x0, &(0x7f00000003c0)=0x6, 0xf4) perf_event_open(&(0x7f0000000240)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000180)='/dev/sequencer2\x00', 0x12100, 0x0) clock_gettime(0x0, &(0x7f00000001c0)={0x0}) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r1, 0x4040534e, &(0x7f0000000340)={0x0, @time={r2}, 0x1, {0x8, 0x606}, 0x101, 0x2}) r3 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000040)='/dev/rtc\x00', 0x0, 0x0) r4 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000580)='/dev/sequencer\x00', 0x0, 0x0) ioctl$LOOP_CLR_FD(r3, 0x7003) setsockopt$packet_buf(0xffffffffffffffff, 0x107, 0xd, &(0x7f00000004c0)="d9fb4f1bcfd3e0c1355ea2018b25a4fd911d8abc3f3fd71f4749878ac1fbce6e5d188e078b15be141905d7966406e4f3fb021da63028837a8407bcb3e3a676d251bcd09a04964ed9cd0f6cece267dc4bada0403dcef25dace8875f4a6495eb2e6cc4969e7de83153459b4d61669ed9eb7567", 0x72) perf_event_open(&(0x7f00000000c0)={0x0, 0x70, 0x0, 0x0, 0x7ff, 0xa1, 0x0, 0x0, 0x200, 0x2, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x5, 0x0, 0x401, 0xcf, 0x0, 0xffffffffffffffff, 0x100000000, 0x3ff, 0x0, 0x8, 0x2, 0x1f, 0x2, 0x5, 0x9, 0x3, 0x0, 0x4, 0x0, 0x20000000, 0x195d678803a3a953, @perf_config_ext={0x9, 0x5}, 0x10, 0x3, 0x8, 0x0, 0x72eb, 0x99, 0x1}, 0x0, 0xd, r3, 0x8) mq_notify(r4, &(0x7f0000000400)={0x0, 0x0, 0x4}) execve(&(0x7f0000000200)='./file0\x00', &(0x7f0000000680)=[&(0x7f0000000480)='wlan0\x00', &(0x7f0000000600)='\x00', &(0x7f0000000640)='proc\x00'], &(0x7f0000000740)=[&(0x7f00000006c0)='\'\x00', &(0x7f0000000700)='trustedwlan0vmnet0@%\x00']) 2018/03/29 17:35:02 executing program 0: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)={0xb, 0x7e, 0x3, 0x1, 0x11}, 0x2c) mount(&(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) r1 = socket$kcm(0x29, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000000bc0)={&(0x7f00000007c0)=@rc={0x1f, {0x5, 0x50000000, 0xaa2, 0x613, 0x4, 0x1ff}}, 0x80, &(0x7f0000000940)=[{&(0x7f0000000840)="09c9453aa30d8c5fba221fa2413f12c580837b2ae292e3ee8dd00098c404125a1a2e63840f82a2f69c3927af43b828422484aaeeceebcbe76e999bd3930c9b7c2995484407f9166e39c2069a88b63a980b9b5ffc880f4b89dde5adae6c7fb84ed98cbac860214dfb0b28d1b2e2d58aefebdfe515334f2ffa46be22ef7a4b3a276cb70a27c9e9f5de0a20bad24cbe2b89aee9693c2f8f186ea59fcfc4ebec7188cca0418d4583a6f1730f62416d70cd62555eb4f58ea831d1fea9956a2cba0049f23bf0b249f5de2ce0dc303808d70b0ccab3c7f37e949e", 0xd7}], 0x1, &(0x7f0000000980)}, 0x4010) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0xb, 0x9, &(0x7f0000000500)=ANY=[@ANYBLOB="1800000000b308000000560000181000000000000000f9ffffff00", @ANYRES32=r0, @ANYBLOB="0000000000000000fffc0100000000000000000000000000850000000600000000000000000000009500000000000000"], &(0x7f0000000600)='syzkaller\x00', 0x0, 0x30, &(0x7f0000000640)=""/48, 0x41f00, 0x1}, 0x48) ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, r2) r3 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000280)='/dev/vga_arbiter\x00', 0x8000, 0x0) setsockopt$inet_sctp_SCTP_NODELAY(r3, 0x84, 0x3, &(0x7f0000000580)=0x6, 0x4) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000000)={&(0x7f0000000080)='./file0/file0\x00', r0}, 0x10) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_INFO(r1, 0xc08c5334, &(0x7f0000000980)={0x800, 0x1, 0x80, 'queue1\x00', 0x80000001}) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000400)=@ax25={0x3, {"02f47b3723e03d"}}, 0x80, &(0x7f00000017c0), 0x0, &(0x7f0000001840)=ANY=[], 0x0, 0x24004044}, 0x4008001) bpf$MAP_CREATE(0x0, &(0x7f0000002cc0)={0x5, 0x100, 0x56c96e7a, 0x2, 0xa, 0xffffffffffffffff, 0x9}, 0x2c) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000480)='rpc_pipefs\x00', 0x200000, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000002d00)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f00000004c0)='vmnet0keyring\x00') bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000780)={&(0x7f0000000740)='./file0/file0\x00', r4}, 0x10) recvfrom(r4, &(0x7f0000000c00)=""/4096, 0x1000, 0x1, 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, &(0x7f0000000240)='proc!@ppp1!ppp0ppp0#)lo\\lolo{\x00') mount(&(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000200)='fuseblk\x00', 0xa11800, &(0x7f0000000240)) mount(&(0x7f00000002c0)='./file0/file0\x00', &(0x7f0000000300)='./file0/file0\x00', &(0x7f0000000340)='minix\x00', 0x0, &(0x7f0000000380)) 2018/03/29 17:35:02 executing program 1: r0 = memfd_create(&(0x7f00000003c0)='\'@^!)posix_acl_access\x00', 0x0) r1 = syz_open_dev$dspn(&(0x7f0000000400)='/dev/dsp#\x00', 0x3f, 0x101000) ioctl$VHOST_SET_VRING_ERR(r0, 0x4008af22, &(0x7f0000000440)={0x0, r1}) r2 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000100)='ns/pid\x00') bind$netrom(0xffffffffffffffff, &(0x7f0000000000)=@full={{0x3, {"ca39d3a6aaf1ea"}, 0x7}, [{"9466da9f9b9c34"}, {"bf630ee589192b"}, {"a87c1ff7d40d3a"}, {"146ad28c233047"}, {"ccdf8179897ff9"}, {"d5e34e54557076"}, {"3f85aad50a1b3a"}, {"81e97fa888125b"}]}, 0x48) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDR_INFO(0xffffffffffffff9c, 0x84, 0xf, &(0x7f0000000140)={0x0, @in6={{0xa, 0x0, 0x5, @remote={0xfe, 0x80, [], 0xbb}, 0x8}}, 0x4, 0x4, 0x7, 0xdc, 0x5}, &(0x7f0000000200)=0x98) sendmsg$nl_route(r2, &(0x7f00000005c0)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000580)={&(0x7f0000000340)=ANY=[]}, 0x1, 0x0, 0x0, 0x4000005}, 0x5) ioctl$sock_netrom_SIOCGSTAMPNS(r2, 0x8907, &(0x7f00000002c0)) setsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(r2, 0x84, 0x18, &(0x7f0000000240)={r3}, 0x8) r4 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000bbfff6)='/dev/ptmx\x00', 0x0, 0x0) ioctl$VT_RESIZE(r2, 0x5609, &(0x7f0000000380)={0x8, 0x0, 0x8ce}) ioctl$TCSETS(r4, 0x40045431, &(0x7f00003b9fdc)) setsockopt$inet6_tcp_buf(r2, 0x6, 0x1c, &(0x7f0000000280)="51a306f3f51c67789602d7a2b2b329f6b0c3419231426efcff62a4c36225136e5414a7f01c0aa199fa4fee907ad1dffd3bea74c6", 0x34) r5 = syz_open_pts(r4, 0x11) ioctl$sock_inet6_SIOCSIFDSTADDR(r2, 0x8918, &(0x7f0000000500)={@mcast2={0xff, 0x2, [], 0x1}, 0x36}) getsockopt$inet_sctp6_SCTP_DEFAULT_SNDINFO(r2, 0x84, 0x22, &(0x7f0000000080)={0x2, 0x2000000008005, 0x3, 0x8, r3}, &(0x7f0000000340)=0x10) write(r5, &(0x7f0000fd6000)='z', 0x1) ioctl$TIOCSETD(r5, 0x5423, &(0x7f00000000c0)=0x3) dup2(r5, r4) 2018/03/29 17:35:02 executing program 4: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)={0xb, 0x7e, 0x3, 0x1, 0x11}, 0x2c) mount(&(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) r1 = socket$kcm(0x29, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000000bc0)={&(0x7f00000007c0)=@rc={0x1f, {0x5, 0x50000000, 0xaa2, 0x613, 0x4, 0x1ff}, 0x3f}, 0x80, &(0x7f0000000940)=[{&(0x7f0000000840)="09c9453aa30d8c5fba221fa2413f12c580837b2ae292e3ee8dd00098c404125a1a2e63840f82a2f69c3927af43b828422484aaeeceebcbe76e999bd3930c9b7c2995484407f9166e39c2069a88b63a980b9b5ffc880f4b89dde5adae6c7fb84ed98cbac860214dfb0b28d1b2e2d58aefebdfe515334f2ffa46be22ef7a4b3a276cb70a27c9e9f5de0a20bad24cbe2b89aee9693c2f8f186ea59fcfc4ebec7188cca0418d4583a6f1730f62416d70cd62555eb4f58ea831d1fea9956a2cba0049f23bf0b249f5de2ce0dc303808d70b0ccab3c7f37e949e", 0xd7}], 0x1, &(0x7f0000000980), 0x0, 0x20004805}, 0x4010) r2 = perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x2367, 0x7fff, 0x1, 0x6, 0x0, 0x78b1, 0x1, 0x0, 0x4992c766, 0xff, 0x81, 0x100, 0x40, 0x3, 0x9, 0x8, 0x1, 0x10000, 0x0, 0x6, 0x90e, 0x9, 0x7ff, 0x0, 0x8, 0x1, 0x30, 0x20, 0x7fffffff, 0x6, 0x401, 0x2, 0x1000, 0x8001, 0x1ff, 0xfffffffffffffff8, 0x0, 0x2, 0x0, @perf_config_ext={0x5, 0x8}, 0x1ab23, 0x3f, 0x8, 0x5, 0x6}, 0xffffffffffffffff, 0x10, r0, 0x1) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0xb, 0x9, &(0x7f0000000580)=@framed={{0x18}, [@map={0x18, 0x0, 0x1}, @generic={0x3ff, 0xfffffffffffffffc, 0x1}, @call={0x85, 0x0, 0x0, 0x6}], {0x95}}, &(0x7f0000000600)='syzkaller\x00', 0x0, 0x30, &(0x7f0000000640)=""/48, 0x41f00, 0x1}, 0x48) ioctl$PERF_EVENT_IOC_SET_BPF(r2, 0x40042408, r3) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000000)={&(0x7f0000000080)='./file0/file0\x00', r0}, 0x10) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000400)=@ax25={0x3, {"02f47b3723e03d"}}, 0x80, &(0x7f00000017c0), 0x0, &(0x7f0000001840)=ANY=[], 0x0, 0x24004044}, 0x4008001) bpf$MAP_CREATE(0x0, &(0x7f0000002cc0)={0x5, 0x100, 0x56c96e7a, 0x2, 0xa, 0xffffffffffffffff, 0x9}, 0x2c) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000480)='rpc_pipefs\x00', 0x200000, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000002d00)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f00000004c0)='vmnet0keyring\x00') bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000780)={&(0x7f0000000740)='./file0/file0\x00', r4}, 0x10) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x40082406, &(0x7f0000000700)='proc!@ppp1!ppp0ppp0#)lo\\lolo{\x00') mount(&(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000200)='fuseblk\x00', 0xa11800, &(0x7f0000000240)) r5 = syz_open_dev$sg(&(0x7f0000000240)='/dev/sg#\x00', 0xfffffffffffffffa, 0x800) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000280)={r5, r3, 0x5, 0x1}, 0x10) ioctl$TIOCCONS(r5, 0x541d) mount(&(0x7f00000002c0)='./file0/file0\x00', &(0x7f0000000300)='./file0/file0\x00', &(0x7f0000000340)='minix\x00', 0x1000, &(0x7f0000000380)) 2018/03/29 17:35:02 executing program 2: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)={0xb, 0x7e, 0x3, 0x1, 0x11}, 0x2c) r1 = syz_open_dev$mice(&(0x7f0000000240)='/dev/input/mice\x00', 0x0, 0x200) ioctl$SNDRV_SEQ_IOCTL_GET_CLIENT_POOL(r1, 0xc058534b, &(0x7f0000000980)={0x7, 0xffffffffffffff48, 0x8, 0x2, 0x0, 0x40}) mount(&(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) r2 = socket$kcm(0x29, 0x2, 0x0) sendmsg$kcm(r2, &(0x7f0000000bc0)={&(0x7f00000007c0)=@rc={0x1f, {0x5, 0x50000000, 0xaa2, 0x613, 0x4, 0x1ff}, 0x3f}, 0x80, &(0x7f0000000940)=[{&(0x7f0000000840)="09c9453aa30d8c5fba221fa2413f12c580837b2ae292e3ee8dd00098c404125a1a2e63840f82a2f69c3927af43b828422484aaeeceebcbe76e999bd3930c9b7c2995484407f9166e39c2069a88b63a980b9b5ffc880f4b89dde5adae6c7fb84ed98cbac860214dfb0b28d1b2e2d58aefebdfe515334f2ffa46be22ef7a4b3a276cb70a27c9e9f5de0a20bad24cbe2b89aee9693c2f8f186ea59fcfc4ebec7188cca0418d4583a6f1730f62416d70cd62555eb4f58ea831d1fea9956a2cba0049f23bf0b249f5de2ce0dc303808d70b0ccab3c7f37e949e", 0xd7}], 0x1, &(0x7f0000000980), 0x0, 0x20004805}, 0x4010) r3 = perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x2367, 0x7fff, 0x1, 0x6, 0x0, 0x78b1, 0x1, 0x0, 0x4992c766, 0xff, 0x81, 0x100, 0x40, 0x3, 0x9, 0x8, 0x1, 0x10000, 0x0, 0x6, 0x90e, 0x9, 0x7ff, 0x0, 0x8, 0x1, 0x30, 0x20, 0x7fffffff, 0x6, 0x401, 0x2, 0x1000, 0x8001, 0x1ff, 0xfffffffffffffff8, 0x0, 0x2, 0x0, @perf_config_ext={0x5, 0x8}, 0x1ab23, 0x0, 0x8, 0x5, 0x6, 0x0, 0x6}, 0xffffffffffffffff, 0x10, r0, 0x1) bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0xb, 0x9, &(0x7f0000000580)=@framed={{0x18}, [@map={0x18, 0x0, 0x1, 0x0, r0}, @generic={0x3ff, 0xfffffffffffffffc, 0x1}, @call={0x85, 0x0, 0x0, 0x6}], {0x95}}, &(0x7f0000000600)='syzkaller\x00', 0x0, 0x30, &(0x7f0000000640)=""/48, 0x41f00, 0x1}, 0x48) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000000)={&(0x7f0000000080)='./file0/file0\x00', r0}, 0x10) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000400)=@ax25={0x3, {"02f47b3723e03d"}}, 0x80, &(0x7f00000017c0), 0x0, &(0x7f0000001840)=ANY=[], 0x0, 0x24004044}, 0x4008001) bpf$MAP_CREATE(0x0, &(0x7f0000002cc0)={0x5, 0x0, 0x56c96e7a, 0x2, 0xa, 0xffffffffffffffff, 0x9}, 0x2c) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000480)='rpc_pipefs\x00', 0x200000, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000002d00)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f00000004c0)='vmnet0keyring\x00') bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000780)={&(0x7f0000000740)='./file0/file0\x00', r4}, 0x10) ioctl$PERF_EVENT_IOC_SET_FILTER(r3, 0x40082406, &(0x7f0000000700)='proc!@ppp1!ppp0ppp0#)lo\\lolo{\x00') mount(&(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000200)='fuseblk\x00', 0xa11800, &(0x7f0000000240)) mount(&(0x7f00000002c0)='./file0/file0\x00', &(0x7f0000000300)='./file0/file0\x00', &(0x7f0000000340)='minix\x00', 0x1000, &(0x7f0000000380)) 2018/03/29 17:35:02 executing program 0: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)={0xb, 0x7e, 0x3, 0x1, 0x11}, 0x2c) mount(&(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) r1 = socket$kcm(0x29, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000000bc0)={&(0x7f00000007c0)=@rc={0x1f, {0x5, 0x50000000, 0xaa2, 0x613, 0x4, 0x1ff}}, 0x80, &(0x7f0000000940)=[{&(0x7f0000000840)="09c9453aa30d8c5fba221fa2413f12c580837b2ae292e3ee8dd00098c404125a1a2e63840f82a2f69c3927af43b828422484aaeeceebcbe76e999bd3930c9b7c2995484407f9166e39c2069a88b63a980b9b5ffc880f4b89dde5adae6c7fb84ed98cbac860214dfb0b28d1b2e2d58aefebdfe515334f2ffa46be22ef7a4b3a276cb70a27c9e9f5de0a20bad24cbe2b89aee9693c2f8f186ea59fcfc4ebec7188cca0418d4583a6f1730f62416d70cd62555eb4f58ea831d1fea9956a2cba0049f23bf0b249f5de2ce0dc303808d70b0ccab3c7f37e949e", 0xd7}], 0x1, &(0x7f0000000980)}, 0x4010) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0xb, 0x9, &(0x7f0000000580)=@framed={{0x18}, [@map={0x18, 0x0, 0x1, 0x0, r0}, @generic={0x3ff, 0xfffffffffffffffc, 0x1}, @call={0x85, 0x0, 0x0, 0x6}], {0x95}}, &(0x7f0000000600)='syzkaller\x00', 0x0, 0x30, &(0x7f0000000640)=""/48, 0x41f00, 0x1}, 0x48) ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, r2) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000000)={&(0x7f0000000080)='./file0/file0\x00', r0}, 0x10) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000400)=@ax25={0x3, {"02f47b3723e03d"}}, 0x80, &(0x7f00000017c0), 0x0, &(0x7f0000001840)=ANY=[], 0x0, 0x24004044}, 0x4008001) bpf$MAP_CREATE(0x0, &(0x7f0000002cc0)={0x5, 0x100, 0x56c96e7a, 0x2, 0xa, 0xffffffffffffffff, 0x9}, 0x2c) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000480)='rpc_pipefs\x00', 0x200000, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000002d00)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f00000004c0)='vmnet0keyring\x00') bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000780)={&(0x7f0000000740)='./file0/file0\x00', r3}, 0x10) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, &(0x7f0000000700)='proc!@ppp1!ppp0ppp0#)lo\\lolo{\x00') mount(&(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000200)='fuseblk\x00', 0xbc8480, &(0x7f0000000240)) mount(&(0x7f00000002c0)='./file0/file0\x00', &(0x7f0000000300)='./file0/file0\x00', &(0x7f0000000340)='minix\x00', 0x0, &(0x7f0000000380)) 2018/03/29 17:35:02 executing program 6: r0 = socket(0xa, 0x2, 0x0) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r1 = open(&(0x7f00004b8ff8)='./file0\x00', 0x28042, 0x0) connect$inet6(r0, &(0x7f0000d3cfe4)={0xa, 0x0, 0x0, @mcast2={0xff, 0x2, [], 0x1}, 0x3}, 0x1c) ioctl$DRM_IOCTL_NEW_CTX(r1, 0x40086425, &(0x7f0000000080)) fallocate(r1, 0x0, 0xffff, 0x1f) setsockopt$inet6_mtu(r0, 0x29, 0x17, &(0x7f0000000100)=0x2, 0x4) connect$inet(r0, &(0x7f0000000040)={0x2, 0x4e22, @multicast1=0xe0000001}, 0x10) sendfile(r0, r1, &(0x7f00005faff8)=0x60, 0xfffb) getsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX3(r0, 0x84, 0x6f, &(0x7f00000000c0)={0x0, 0xac, &(0x7f0000000280)=[@in6={0xa, 0x4e24, 0x1e, @remote={0xfe, 0x80, [], 0xbb}, 0x2}, @in={0x2, 0x4e22, @rand_addr=0x34800}, @in6={0xa, 0x4e23, 0x200, @empty, 0x9}, @in6={0xa, 0x4e21, 0x8, @local={0xfe, 0x80, [], 0xaa}, 0x8}, @in6={0xa, 0x4e23, 0x2, @dev={0xfe, 0x80, [], 0x14}, 0x3f}, @in={0x2, 0x4e23}, @in6={0xa, 0x4e20, 0x8, @mcast2={0xff, 0x2, [], 0x1}, 0x4}]}, &(0x7f0000000340)=0x10) getsockopt$inet_sctp6_SCTP_PR_SUPPORTED(r0, 0x84, 0x71, &(0x7f0000000380)={0x0, 0x4766}, &(0x7f00000003c0)=0x8) getsockopt$inet_sctp6_SCTP_STATUS(r1, 0x84, 0xe, &(0x7f0000000400)={r2, 0xbbf3, 0xffffffff, 0x0, 0xfffffffffffffffe, 0x200, 0x9, 0xfff, {r3, @in={{0x2, 0x4e24, @broadcast=0xffffffff}}, 0x9, 0x7f, 0x6, 0x7, 0xc3}}, &(0x7f00000004c0)=0xb0) unlinkat(r0, &(0x7f0000000140)='./file0/file0\x00', 0x0) accept4$unix(r1, &(0x7f0000000180)=@abs, &(0x7f0000000200)=0x6e, 0x800) 2018/03/29 17:35:02 executing program 7: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)={0xb, 0x7e, 0x3, 0x1, 0x11}, 0x2c) mount(&(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) r1 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000280)='/dev/sequencer2\x00', 0x4400, 0x0) ioctl$SNDRV_CTL_IOCTL_HWDEP_INFO(r1, 0x80dc5521, &(0x7f0000000980)=""/204) r2 = socket$kcm(0x29, 0x2, 0x0) sendmsg$kcm(r2, &(0x7f0000000bc0)={&(0x7f00000007c0)=@rc={0x1f, {0x5, 0x50000000, 0xaa2, 0x613, 0x4, 0x1ff}, 0x3f}, 0x80, &(0x7f0000000940)=[{&(0x7f0000000840)="09c9453aa30d8c5fba221fa2413f12c580837b2ae292e3ee8dd00098c404125a1a2e63840f82a2f69c3927af43b828422484aaeeceebcbe76e999bd3930c9b7c2995484407f9166e39c2069a88b63a980b9b5ffc880f4b89dde5adae6c7fb84ed98cbac860214dfb0b28d1b2e2d58aefebdfe515334f2ffa46be22ef7a4b3a276cb70a27c9e9f5de0a20bad24cbe2b89aee9693c2f8f186ea59fcfc4ebec7188cca0418d4583a6f1730f62416d70cd62555eb4f58ea831d1fea9956a2cba0049f23bf0b249f5de2ce0dc303808d70b0ccab3c7f37e949e", 0xd7}], 0x1, &(0x7f0000000980), 0x0, 0x20004805}, 0x4010) r3 = perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x2367, 0x7fff, 0x1, 0x6, 0x0, 0x78b1, 0x1, 0x0, 0x4992c766, 0xff, 0x81, 0x100, 0x40, 0x3, 0x9, 0x8, 0x1, 0x10000, 0x0, 0x6, 0x90e, 0x9, 0x7ff, 0x0, 0x8, 0x1, 0x30, 0x20, 0x7fffffff, 0x6, 0x401, 0x2, 0x1000, 0x8001, 0x1ff, 0xfffffffffffffff8, 0x0, 0x2, 0x0, @perf_config_ext={0x5, 0x8}, 0x1ab23, 0x3f, 0x8, 0x5, 0x6, 0x0, 0x6}, 0xffffffffffffffff, 0x10, r0, 0x1) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0xb, 0x9, &(0x7f0000000580)=ANY=[@ANYBLOB="1800000000000000000000000000000018100000", @ANYRES32=r0, @ANYBLOB="0000000000000000fffc010000000000000000009658c79f6dbdf9e279528afa77000000008500000006000000000000"], &(0x7f0000000600)='syzkaller\x00', 0x0, 0x30, &(0x7f0000000640)=""/48, 0x41f00, 0x1}, 0x48) ioctl$PERF_EVENT_IOC_SET_BPF(r3, 0x40042408, r4) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000000)={&(0x7f0000000080)='./file0/file0\x00', r0}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f0000002cc0)={0x5, 0x0, 0x56c96e7a, 0x2, 0xa, 0xffffffffffffffff, 0x9}, 0x2c) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000480)='rpc_pipefs\x00', 0x200000, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000002d00)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f00000004c0)='system\x00') bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000780)={&(0x7f0000000740)='./file0/file0\x00', r5}, 0x10) ioctl$PERF_EVENT_IOC_SET_FILTER(r3, 0x40082406, &(0x7f0000000700)='proc!@ppp1!ppp0ppp0#)lo\\lolo{\x00') mount(&(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000200)='fuseblk\x00', 0xa11800, &(0x7f0000000240)) mount(&(0x7f00000002c0)='./file0/file0\x00', &(0x7f0000000300)='./file0/file0\x00', &(0x7f0000000340)='minix\x00', 0x1000, &(0x7f0000000380)) 2018/03/29 17:35:02 executing program 3: r0 = socket(0x18, 0x80000, 0xffff) r1 = open(&(0x7f00004b8ff8)='./file0\x00', 0x28042, 0x0) connect$inet6(r0, &(0x7f0000d3cfe4)={0xa, 0x0, 0x0, @mcast2={0xff, 0x2, [], 0x1}, 0x3}, 0x1c) ioctl$DRM_IOCTL_ADD_CTX(r1, 0xc0086420, &(0x7f00000001c0)) sendto$inet(r0, &(0x7f00000000c0)="f9f413cd9d0429a7e9392289fde63afa46d82997d55ae4c70b0cef7375550494a293354583f7f6a38c5679c560305c34", 0x30, 0x0, &(0x7f0000000140)={0x2, 0x4e24}, 0x10) ioctl$DRM_IOCTL_NEW_CTX(r1, 0x40086425, &(0x7f0000000080)={0x0, 0x3}) fallocate(r1, 0x0, 0xffff, 0x1f) io_setup(0x6, &(0x7f0000000000)=0x0) io_cancel(r2, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x2, 0x40, r0, &(0x7f0000000200)="274e5f1fd7aa097aa3b817a287cfb4ff02644c4b9e709e51471a91ef7098d2ad834576937624e019442f882a36ca5438f33adf93dd508544eeedb9eeec9bff457e1b2b2639b5c49545e183232bcbf2edf39e69ae4828aa38bdaedeab07ded126797c149e8201b029ce041fe33e8d17cd341c3bb26a8e2c6443145a1603e456d4100674567d2bd1a431cbedaadbb58ae65d8d337e368f5458847e4e1f5085d64ad18b094266c39ad97e560590494bfe663fd8f86bea34ffcf34342d1b4f56e44a635d666c0e3a08503f0410f027450c", 0xcf, 0x3, 0x0, 0x1, r1}, &(0x7f0000000300)) setsockopt$inet6_mtu(0xffffffffffffffff, 0x29, 0x17, &(0x7f0000000100)=0x2, 0x4) connect$inet(r0, &(0x7f0000000040)={0x2, 0x4e22, @multicast1=0xe0000001}, 0x10) sendfile(r0, r1, &(0x7f00005faff8), 0xfffb) 2018/03/29 17:35:02 executing program 4: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)={0xb, 0x7e, 0x3, 0x1, 0x11}, 0x2c) mount(&(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) r1 = socket$kcm(0x29, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000000bc0)={&(0x7f00000007c0)=@rc={0x1f, {0x5, 0x50000000, 0xaa2, 0x613, 0x4, 0x1ff}, 0x3f}, 0x80, &(0x7f0000000940)=[{&(0x7f0000000840)="09c9453aa30d8c5fba221fa2413f12c580837b2ae292e3ee8dd00098c404125a1a2e63840f82a2f69c3927af43b828422484aaeeceebcbe76e999bd3930c9b7c2995484407f9166e39c2069a88b63a980b9b5ffc880f4b89dde5adae6c7fb84ed98cbac860214dfb0b28d1b2e2d58aefebdfe515334f2ffa46be22ef7a4b3a276cb70a27c9e9f5de0a20bad24cbe2b89aee9693c2f8f186ea59fcfc4ebec7188cca0418d4583a6f1730f62416d70cd62555eb4f58ea831d1fea9956a2cba0049f23bf0b249f5de2ce0dc303808d70b0ccab3c7f37e949e", 0xd7}], 0x1, &(0x7f0000000980), 0x0, 0x20004805}, 0x4010) r2 = perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x2367, 0x7fff, 0x1, 0x6, 0x0, 0x78b1, 0x1, 0x0, 0x4992c766, 0xff, 0x81, 0x100, 0x40, 0x3, 0x9, 0x8, 0x1, 0x10000, 0x0, 0x6, 0x90e, 0x9, 0x7ff, 0x0, 0x8, 0x1, 0x30, 0x20, 0x7fffffff, 0x6, 0x401, 0x2, 0x1000, 0x8001, 0x1ff, 0xfffffffffffffff8, 0x0, 0x2, 0x0, @perf_config_ext={0x5, 0x8}, 0x1ab23, 0x3f, 0x8, 0x5, 0x6}, 0xffffffffffffffff, 0x10, r0, 0x1) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0xb, 0x9, &(0x7f0000000580)=@framed={{0x18}, [@map={0x18, 0x0, 0x1}, @generic={0x3ff, 0xfffffffffffffffc, 0x1}, @call={0x85, 0x0, 0x0, 0x6}], {0x95}}, &(0x7f0000000600)='syzkaller\x00', 0x0, 0x30, &(0x7f0000000640)=""/48, 0x41f00, 0x1}, 0x48) ioctl$PERF_EVENT_IOC_SET_BPF(r2, 0x40042408, r3) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000000)={&(0x7f0000000080)='./file0/file0\x00', r0}, 0x10) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000400)=@ax25={0x3, {"02f47b3723e03d"}}, 0x80, &(0x7f00000017c0), 0x0, &(0x7f0000001840)=ANY=[], 0x0, 0x24004044}, 0x4008001) bpf$MAP_CREATE(0x0, &(0x7f0000002cc0)={0x5, 0x100, 0x56c96e7a, 0x2, 0xa, 0xffffffffffffffff, 0x9}, 0x2c) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000480)='rpc_pipefs\x00', 0x200000, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000002d00)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f00000004c0)='vmnet0keyring\x00') bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000780)={&(0x7f0000000740)='./file0/file0\x00', r4}, 0x10) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x40082406, &(0x7f0000000700)='proc!@ppp1!ppp0ppp0#)lo\\lolo{\x00') mount(&(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000200)='fuseblk\x00', 0xa11800, &(0x7f0000000240)) r5 = syz_open_dev$sg(&(0x7f0000000240)='/dev/sg#\x00', 0xfffffffffffffffa, 0x800) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000280)={r5, r3, 0x5, 0x1}, 0x10) ioctl$TIOCCONS(r5, 0x541d) mount(&(0x7f00000002c0)='./file0/file0\x00', &(0x7f0000000300)='./file0/file0\x00', &(0x7f0000000340)='minix\x00', 0x1000, &(0x7f0000000380)) 2018/03/29 17:35:02 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000100), 0x1ec) sendmsg$key(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000080)={0x2, 0xa, 0x0, 0x0, 0x2}, 0x10}, 0x1}, 0x0) sendmsg$key(r0, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000180)=ANY=[@ANYBLOB="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"], 0x180}, 0x1}, 0x0) 2018/03/29 17:35:02 executing program 1: r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff7fffffffffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = syz_open_procfs(0x0, &(0x7f00000000c0)='stat\x00') ioctl$sock_inet_SIOCSIFBRDADDR(r1, 0x891a, &(0x7f00000008c0)={'ip6tnl0\x00', {0x2, 0x4e23, @multicast1=0xe0000001}}) sendfile(r1, r1, &(0x7f0000000040)=0xffffffff77fffffe, 0x5) getresuid(&(0x7f0000000480), &(0x7f00000004c0), &(0x7f0000000500)) stat(&(0x7f0000000540)='./file0\x00', &(0x7f0000000580)) geteuid() stat(&(0x7f0000000600)='./file0\x00', &(0x7f0000000640)) stat(&(0x7f00000006c0)='./file0\x00', &(0x7f0000000700)) getegid() stat(&(0x7f0000000780)='./file0\x00', &(0x7f00000007c0)) r2 = getgid() getuid() fstat(r1, &(0x7f0000000840)) sendmsg$unix(0xffffffffffffffff, &(0x7f00000009c0)={&(0x7f0000000100)=@abs={0x1, 0x0, 0x4e23}, 0x6e, &(0x7f0000000440)=[{&(0x7f0000000180)="f5dc941f4dc3cd9adc57ae91e3dd4343d2d34a84526e7cc2dced527b17e9f844324330a6c4fc95075fc39479fc730a76e14b1c7e042182b78b54fd1112d5d88e0463edf0b527bc60eef252342942a7d15f5dbf3a13deeaef54e8a875bd6393929f9f520c496c5643e469d505dd150b", 0x6f}], 0x1, &(0x7f0000000ac0)=ANY=[@ANYRES32=r0, @ANYBLOB="100000000100000001000000", @ANYBLOB="1800000001000000020000", @ANYBLOB="180000000100000002000000", @ANYBLOB="180000000100000002", @ANYRES32=r2, @ANYBLOB="1800000001000200000000003b807f0af037927569073608982ff4048a7ecfa7a1c67509e2d123a2b26f36835b10059f7a10eb109d87fc6064da955f7e7f205180a40f55cbeb36713ac27eb87fbecffcbff26a930baf2e9c2ef6884dac58f0a50bb630bd5b40ae09ab39821a7438e4933f62cb131b62df345d2bf2ad49b098c04953df23", @ANYRES32, @ANYBLOB="300000000100000001000000", @ANYRES32=r1, @ANYRES32=r1, @ANYRES32=r1, @ANYRES32=r1, @ANYRES32=r0, @ANYRES32=r0, @ANYRES32=r1, @ANYRES32=r0], 0xe8, 0x91}, 0x24008000) getresgid(&(0x7f0000000a00), &(0x7f0000000a40), &(0x7f0000000a80)) 2018/03/29 17:35:02 executing program 3: r0 = socket(0xa, 0x2, 0x0) r1 = open(&(0x7f00004b8ff8)='./file0\x00', 0x28042, 0x0) getsockopt$IPT_SO_GET_REVISION_MATCH(r0, 0x0, 0x42, &(0x7f00000000c0)={'NETMAP\x00'}, &(0x7f0000000140)=0x1e) connect$inet6(r0, &(0x7f0000d3cfe4)={0xa, 0x0, 0x0, @mcast2={0xff, 0x2, [], 0x1}, 0x3}, 0x1c) ioctl$DRM_IOCTL_ADD_CTX(r1, 0xc0086420, &(0x7f0000000000)) ioctl$DRM_IOCTL_NEW_CTX(r1, 0x40086425, &(0x7f0000000080)={0x0, 0x3}) fallocate(r1, 0x0, 0xffff, 0x1f) setsockopt$inet6_mtu(0xffffffffffffffff, 0x29, 0x17, &(0x7f0000000100)=0x2, 0x4) connect$inet(r0, &(0x7f0000000040)={0x2, 0x4e22, @multicast1=0xe0000001}, 0x10) sendfile(r0, r1, &(0x7f00005faff8), 0xfffb) ioctl$ASHMEM_SET_SIZE(r1, 0x40087703, 0x401) 2018/03/29 17:35:02 executing program 0: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)={0xb, 0x7e, 0x3, 0x1, 0x11}, 0x2c) mount(&(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) r1 = socket$kcm(0x29, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000000bc0)={&(0x7f00000007c0)=@rc={0x1f, {0x5, 0x50000000, 0xaa2, 0x613, 0x4, 0x1ff}}, 0x80, &(0x7f0000000940)=[{&(0x7f0000000840)="09c9453aa30d8c5fba221fa2413f12c580837b2ae292e3ee8dd00098c404125a1a2e63840f82a2f69c3927af43b828422484aaeeceebcbe76e999bd3930c9b7c2995484407f9166e39c2069a88b63a980b9b5ffc880f4b89dde5adae6c7fb84ed98cbac860214dfb0b28d1b2e2d58aefebdfe515334f2ffa46be22ef7a4b3a276cb70a27c9e9f5de0a20bad24cbe2b89aee9693c2f8f186ea59fcfc4ebec7188cca0418d4583a6f1730f62416d70cd62555eb4f58ea831d1fea9956a2cba0049f23bf0b249f5de2ce0dc303808d70b0ccab3c7f37e949e", 0xd7}], 0x1, &(0x7f0000000980)}, 0x4010) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0xb, 0x9, &(0x7f0000000580)=@framed={{0x18}, [@map={0x18, 0x0, 0x1, 0x0, r0}, @generic={0x3ff, 0xfffffffffffffffc, 0x1}, @call={0x85, 0x0, 0x0, 0x6}], {0x95}}, &(0x7f0000000600)='syzkaller\x00', 0x0, 0x30, &(0x7f0000000640)=""/48, 0x41f00, 0x1}, 0x48) ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, r2) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000000)={&(0x7f0000000080)='./file0/file0\x00', r0}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f0000002cc0)={0x5, 0x100, 0x56c96e7a, 0x2, 0xa, 0xffffffffffffffff, 0x9}, 0x2c) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000480)='rpc_pipefs\x00', 0x200000, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000002d00)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f00000004c0)='vmnet0keyring\x00') bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000780)={&(0x7f0000000740)='./file0/file0\x00', r3}, 0x10) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, &(0x7f0000000700)='proc!@ppp1!ppp0ppp0#)lo\\lolo{\x00') mount(&(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000200)='fuseblk\x00', 0xa11800, &(0x7f0000000240)) mount(&(0x7f00000002c0)='./file0/file0\x00', &(0x7f0000000300)='./file0/file0\x00', &(0x7f0000000340)='minix\x00', 0x0, &(0x7f0000000380)) 2018/03/29 17:35:02 executing program 6: r0 = getpgrp(0xffffffffffffffff) r1 = syz_open_procfs(r0, &(0x7f00000000c0)='stat\x00') ioctl$sock_inet_SIOCSIFBRDADDR(r1, 0x891a, &(0x7f00000008c0)={'ip6tnl0\x00', {0x2, 0x4e23, @multicast1=0xe0000001}}) sendfile(r1, r1, &(0x7f0000000040)=0xffffffff77fffffe, 0x5) getresuid(&(0x7f0000000480), &(0x7f00000004c0), &(0x7f0000000500)) stat(&(0x7f0000000540)='./file0\x00', &(0x7f0000000580)) geteuid() stat(&(0x7f0000000600)='./file0\x00', &(0x7f0000000640)) stat(&(0x7f00000006c0)='./file0\x00', &(0x7f0000000700)) r2 = getegid() stat(&(0x7f0000000780)='./file0\x00', &(0x7f00000007c0)) r3 = getgid() getuid() fstat(r1, &(0x7f0000000840)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) sendmsg$unix(0xffffffffffffffff, &(0x7f00000009c0)={&(0x7f0000000100)=@abs={0x1, 0x0, 0x4e23}, 0x6e, &(0x7f0000000440)=[{&(0x7f0000000180)="f5dc941f4dc3cd9adc57ae91e3dd4343d2d34a84526e7cc2dced527b17e9f844324330a6c4fc95075fc39479fc730a76e14b1c7e042182b78b54fd1112d5d88e0463edf0b527bc60eef252342942a7d15f5dbf3a13deeaef54e8a875bd6393929f9f520c496c5643e469d505dd150b", 0x6f}], 0x1, &(0x7f0000000ac0)=ANY=[@ANYBLOB="18000000010000000200", @ANYBLOB, @ANYRES32=r2, @ANYBLOB="180000000100000002000000", @ANYRES32=r3, @ANYBLOB="1800000001000200000000003b807f0af037927569073608982ff4048a7ecfa7a1c67509e2d123a2b26f36835b10059f7a10eb109d87fc6064da955f7e7f205180a40f55cbeb36713ac27eb87fbecffcbff26a930baf2e9c2ef6884dac58f0a50bb630bd5b40ae09ab39821a7438e4933f62cb131b62df345d2bf2ad49b098c04953df23", @ANYRES32=r4, @ANYBLOB="300000000100000001000000", @ANYRES32=r1, @ANYRES32=r1, @ANYRES32=r1, @ANYRES32, @ANYRES32, @ANYRES32=r1, @ANYRES32], 0xce, 0x91}, 0x24008000) getresgid(&(0x7f0000000a00), &(0x7f0000000a40), &(0x7f0000000a80)) 2018/03/29 17:35:02 executing program 5: mq_open(&(0x7f0000000000)='-$\x00', 0x6e93ebbbcc0884f2, 0x0, &(0x7f0000664fc0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000}) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000200)='./cgroup.cpu\x00', 0x200002, 0x0) memfd_create(&(0x7f00000001c0)='\x00', 0x0) syz_genetlink_get_family_id$ipvs(&(0x7f0000000280)='IPVS\x00') sendmsg$IPVS_CMD_GET_DAEMON(0xffffffffffffffff, &(0x7f0000000480)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x1082a0}, 0xc, &(0x7f0000000440)={&(0x7f0000000500)=ANY=[]}, 0x1}, 0x0) fchdir(r0) setxattr(&(0x7f00000003c0)='./file1\x00', &(0x7f0000000400)=@random={'user.', '{/\x00'}, &(0x7f00000004c0)='{\x00', 0x2, 0x0) syslog(0x0, &(0x7f00000000c0)=""/215, 0xd7) pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$UFFDIO_UNREGISTER(0xffffffffffffffff, 0x8010aa01, &(0x7f0000000080)={&(0x7f0000ffc000/0x2000)=nil, 0x2000}) r2 = creat(&(0x7f0000000000)='./file1\x00', 0x0) creat(&(0x7f0000000380)='./file1\x00', 0x0) write$evdev(r2, &(0x7f0000000280), 0xffffffffffffffd4) fsync(0xffffffffffffffff) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x3, 0x10, 0xffffffffffffffff, 0x0) add_key$user(&(0x7f0000000000)='user\x00', &(0x7f0000000040)={0x73, 0x79, 0x7a, 0x3}, &(0x7f0000000080), 0x0, 0x0) keyctl$assume_authority(0x10, 0x0) socket$inet6_udp(0xa, 0x2, 0x0) socket$l2tp(0x18, 0x1, 0x1) mq_timedsend(0xffffffffffffffff, &(0x7f0000000240)="37e6f77a3795ab4b8e0d35892dea11513cf71c63ac4349d20b0950239d14de892933caa0e1d4ab8b", 0x28, 0x0, &(0x7f0000000040)={0x77359400}) mq_timedreceive(0xffffffffffffffff, &(0x7f0000be2f7d)=""/131, 0xfffffffffffffffd, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_LOCAL_AUTH_CHUNKS(r1, 0x84, 0x1b, &(0x7f00000007c0)={0x0, 0x3d7, "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"}, &(0x7f00000002c0)=0x3df) setsockopt$inet_sctp6_SCTP_DELAYED_SACK(r1, 0x84, 0x10, &(0x7f0000000500)=@assoc_value={0x0, 0x2b}, 0x8) request_key(&(0x7f0000000700)='ceph\x00', &(0x7f0000000740)={0x73, 0x79, 0x7a, 0x3}, &(0x7f0000000780)='^vboxnet0selinuxmd5sumvboxnet0self^cgroup^securitykeyring\x00', 0xfffffffffffffff8) keyctl$instantiate_iov(0x14, 0x0, &(0x7f00000006c0), 0x0, 0x0) ioctl$sock_inet_SIOCDARP(0xffffffffffffffff, 0x8953, &(0x7f0000000100)={{0x2, 0x0, @broadcast=0xffffffff}, {0x0, @remote={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xbb}}, 0x0, {0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x10}}, 'irlan0\x00'}) 2018/03/29 17:35:02 executing program 7: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)={0xb, 0x7e, 0x3, 0x1, 0x11}, 0x2c) mount(&(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) r1 = socket$kcm(0x29, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000000bc0)={&(0x7f00000007c0)=@rc={0x1f, {0x5, 0x50000000, 0xaa2, 0x613, 0x4, 0x1ff}, 0x3f}, 0x80, &(0x7f0000000940)=[{&(0x7f0000000840)="09c9453aa30d8c5fba221fa2413f12c580837b2ae292e3ee8dd00098c404125a1a2e63840f82a2f69c3927af43b828422484aaeeceebcbe76e999bd3930c9b7c2995484407f9166e39c2069a88b63a980b9b5ffc880f4b89dde5adae6c7fb84ed98cbac860214dfb0b28d1b2e2d58aefebdfe515334f2ffa46be22ef7a4b3a276cb70a27c9e9f5de0a20bad24cbe2b89aee9693c2f8f186ea59fcfc4ebec7188cca0418d4583a6f1730f62416d70cd62555eb4f58ea831d1fea9956a2cba0049f23bf0b249f5de2ce0dc303808d70b0ccab3c7f37e949e", 0xd7}], 0x1, &(0x7f0000000980), 0x0, 0x20004805}, 0x4010) r2 = perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x2367, 0x7fff, 0x1, 0x6, 0x0, 0x78b1, 0x1, 0x0, 0x4992c766, 0xff, 0x81, 0x100, 0x40, 0x3, 0x9, 0x8, 0x1, 0x10000, 0x0, 0x6, 0x90e, 0x9, 0x7ff, 0x0, 0x8, 0x1, 0x30, 0x20, 0x7fffffff, 0x6, 0x401, 0x2, 0x1000, 0x8001, 0x1ff, 0xfffffffffffffff8, 0x0, 0x2, 0x0, @perf_config_ext={0x5, 0x8}, 0x1ab23, 0x3f, 0x8, 0x5, 0x6, 0x0, 0x6}, 0xffffffffffffffff, 0x10, r0, 0x1) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0xb, 0x9, &(0x7f0000000240)=ANY=[@ANYBLOB="18000000010000000000000000000000181000008d6f4e3b9be57c255ede900edd6ee8ae7d1dbc0052d943a4c292691ef4461733ad5998b81ee17770a297c79fe1721e9d3935eec2dd8fa469", @ANYRES32=r0, @ANYBLOB="0000000000000000fffc0100000000000000000000000000850000000600000000000000000000009500000000000000"], &(0x7f0000000600)='syzkaller\x00', 0x0, 0x30, &(0x7f0000000640)=""/48, 0x41f00, 0x1}, 0x48) ioctl$PERF_EVENT_IOC_SET_BPF(r2, 0x40042408, r3) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000000)={&(0x7f0000000080)='./file0/file0\x00', r0}, 0x10) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000400)=@ax25={0x3, {"02f47b3723e03d"}}, 0x80, &(0x7f00000017c0), 0x0, &(0x7f0000001840)=ANY=[], 0x0, 0x24004044}, 0x4008001) bpf$MAP_CREATE(0x0, &(0x7f0000002cc0)={0x5, 0x0, 0x56c96e7a, 0x2, 0xa, 0xffffffffffffffff, 0x9}, 0x2c) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000480)='rpc_pipefs\x00', 0x200000, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000002d00)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f00000004c0)='vmnet0keyring\x00') bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000780)={&(0x7f0000000740)='./file0/file0\x00', r4}, 0x10) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x40082406, &(0x7f0000000700)='proc!@ppp1!ppp0ppp0#)lo\\lolo{\x00') mount(&(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000200)='fuseblk\x00', 0xa11800, &(0x7f0000000240)) mount(&(0x7f00000002c0)='./file0/file0\x00', &(0x7f0000000300)='./file0/file0\x00', &(0x7f0000000340)='minix\x00', 0x1000, &(0x7f0000000380)) 2018/03/29 17:35:02 executing program 2: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000240)={0x20000000b, 0x7e, 0x3, 0x1, 0x1}, 0x2c) mount(&(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) r1 = socket$kcm(0x29, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000000bc0)={&(0x7f00000007c0)=@rc={0x1f, {0x5, 0x50000000, 0xaa2, 0x613, 0x4, 0x1ff}, 0x3f}, 0x80, &(0x7f0000000940)=[{&(0x7f0000000840)="09c9453aa30d8c5fba221fa2413f12c580837b2ae292e3ee8dd00098c404125a1a2e63840f82a2f69c3927af43b828422484aaeeceebcbe76e999bd3930c9b7c2995484407f9166e39c2069a88b63a980b9b5ffc880f4b89dde5adae6c7fb84ed98cbac860214dfb0b28d1b2e2d58aefebdfe515334f2ffa46be22ef7a4b3a276cb70a27c9e9f5de0a20bad24cbe2b89aee9693c2f8f186ea59fcfc4ebec7188cca0418d4583a6f1730f62416d70cd62555eb4f58ea831d1fea9956a2cba0049f23bf0b249f5de2ce0dc303808d70b0ccab3c7f37e949e", 0xd7}], 0x1, &(0x7f0000000980), 0x0, 0x20004805}, 0x4010) r2 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000280)='/proc/sys/net/ipv4/vs/sync_persist_mode\x00', 0x2, 0x0) r3 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000980)='IPVS\x00') sendmsg$IPVS_CMD_SET_SERVICE(r2, &(0x7f0000000b40)={&(0x7f00000003c0)={0x10, 0x0, 0x0, 0x104}, 0xc, &(0x7f0000000b00)={&(0x7f00000009c0)={0x104, r3, 0x20, 0x70bd2c, 0x25dfdbfc, {0x2}, [@IPVS_CMD_ATTR_DAEMON={0x20, 0x3, [@IPVS_DAEMON_ATTR_STATE={0x8, 0x1, 0x2}, @IPVS_DAEMON_ATTR_MCAST_IFN={0x14, 0x2, 'gretap0\x00'}]}, @IPVS_CMD_ATTR_DEST={0x2c, 0x2, [@IPVS_DEST_ATTR_FWD_METHOD={0x8, 0x3, 0x4}, @IPVS_DEST_ATTR_PORT={0x8, 0x2, 0x4e21}, @IPVS_DEST_ATTR_PORT={0x8, 0x2, 0x4e20}, @IPVS_DEST_ATTR_PERSIST_CONNS={0x8, 0x9}, @IPVS_DEST_ATTR_PORT={0x8, 0x2, 0x4e21}]}, @IPVS_CMD_ATTR_SERVICE={0x20, 0x1, [@IPVS_SVC_ATTR_PROTOCOL={0x8, 0x2, 0x87}, @IPVS_SVC_ATTR_FLAGS={0xc, 0x7, {0x8, 0x8}}, @IPVS_SVC_ATTR_NETMASK={0x8, 0x9, 0x56}]}, @IPVS_CMD_ATTR_SERVICE={0x24, 0x1, [@IPVS_SVC_ATTR_PROTOCOL={0x8, 0x2}, @IPVS_SVC_ATTR_TIMEOUT={0x8, 0x8, 0x8}, @IPVS_SVC_ATTR_SCHED_NAME={0x8, 0x6, 'rr\x00'}, @IPVS_SVC_ATTR_AF={0x8, 0x1, 0x2}]}, @IPVS_CMD_ATTR_SERVICE={0x1c, 0x1, [@IPVS_SVC_ATTR_NETMASK={0x8, 0x9, 0x7a}, @IPVS_SVC_ATTR_NETMASK={0x8, 0x9, 0x58}, @IPVS_SVC_ATTR_PE_NAME={0x8, 0xb, 'sip\x00'}]}, @IPVS_CMD_ATTR_SERVICE={0x38, 0x1, [@IPVS_SVC_ATTR_TIMEOUT={0x8, 0x8, 0x1}, @IPVS_SVC_ATTR_PORT={0x8, 0x4, 0x4e23}, @IPVS_SVC_ATTR_ADDR={0x14, 0x3, @ipv4=@loopback=0x7f000001}, @IPVS_SVC_ATTR_PE_NAME={0x8, 0xb, 'sip\x00'}, @IPVS_SVC_ATTR_TIMEOUT={0x8, 0x8, 0x7ff}]}, @IPVS_CMD_ATTR_DAEMON={0xc, 0x3, [@IPVS_DAEMON_ATTR_STATE={0x8, 0x1}]}]}, 0x104}, 0x1, 0x0, 0x0, 0x10}, 0xc0) r4 = perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x2367, 0x7fff, 0x1, 0x6, 0x0, 0x78b1, 0x1, 0x0, 0x4992c766, 0xff, 0x81, 0x100, 0x40, 0x3, 0x9, 0x8, 0x1, 0x10000, 0x0, 0x6, 0x90e, 0x9, 0x7ff, 0x0, 0x8, 0x1, 0x30, 0x20, 0x7fffffff, 0x6, 0x401, 0x2, 0x1000, 0x8001, 0x1ff, 0xfffffffffffffff8, 0x0, 0x2, 0x0, @perf_config_ext={0x5, 0x8}, 0x1ab23, 0x0, 0x8, 0x5, 0x6, 0x0, 0x6}, 0xffffffffffffffff, 0x10, r0, 0x1) bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0xb, 0x9, &(0x7f0000000580)=@framed={{0x18}, [@map={0x18, 0x0, 0x1, 0x0, r0}, @generic={0x3ff, 0xfffffffffffffffc, 0x1}, @call={0x85, 0x0, 0x0, 0x6}], {0x95}}, &(0x7f0000000600)='syzkaller\x00', 0x0, 0x30, &(0x7f0000000640)=""/48, 0x41f00, 0x1}, 0x48) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000000)={&(0x7f0000000080)='./file0/file0\x00', r0}, 0x10) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000400)=@ax25={0x3, {"02f47b3723e03d"}}, 0x80, &(0x7f00000017c0), 0x0, &(0x7f0000001840)=ANY=[], 0x0, 0x24004044}, 0x4008001) bpf$MAP_CREATE(0x0, &(0x7f0000002cc0)={0x5, 0x0, 0x56c96e7a, 0x2, 0xa, 0xffffffffffffffff, 0x9}, 0x2c) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000480)='rpc_pipefs\x00', 0x200000, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000002d00)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f00000004c0)='vmnet0keyring\x00') bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000780)={&(0x7f0000000740)='./file0/file0\x00', r5}, 0x10) ioctl$PERF_EVENT_IOC_SET_FILTER(r4, 0x40082406, &(0x7f0000000700)='proc!@ppp1!ppp0ppp0#)lo\\lolo{\x00') mount(&(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000200)='fuseblk\x00', 0xa11800, &(0x7f0000000240)) mount(&(0x7f00000002c0)='./file0/file0\x00', &(0x7f0000000300)='./file0/file0\x00', &(0x7f0000000340)='minix\x00', 0x1000, &(0x7f0000000380)) 2018/03/29 17:35:02 executing program 4: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)={0xb, 0x7e, 0x3, 0x1, 0x11}, 0x2c) mount(&(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) r1 = socket$kcm(0x29, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000000bc0)={&(0x7f00000007c0)=@rc={0x1f, {0x5, 0x50000000, 0xaa2, 0x613, 0x4, 0x1ff}, 0x3f}, 0x80, &(0x7f0000000940)=[{&(0x7f0000000840)="09c9453aa30d8c5fba221fa2413f12c580837b2ae292e3ee8dd00098c404125a1a2e63840f82a2f69c3927af43b828422484aaeeceebcbe76e999bd3930c9b7c2995484407f9166e39c2069a88b63a980b9b5ffc880f4b89dde5adae6c7fb84ed98cbac860214dfb0b28d1b2e2d58aefebdfe515334f2ffa46be22ef7a4b3a276cb70a27c9e9f5de0a20bad24cbe2b89aee9693c2f8f186ea59fcfc4ebec7188cca0418d4583a6f1730f62416d70cd62555eb4f58ea831d1fea9956a2cba0049f23bf0b249f5de2ce0dc303808d70b0ccab3c7f37e949e", 0xd7}], 0x1, &(0x7f0000000980), 0x0, 0x20004805}, 0x4010) r2 = perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x2367, 0x7fff, 0x1, 0x6, 0x0, 0x78b1, 0x1, 0x0, 0x4992c766, 0xff, 0x81, 0x100, 0x40, 0x3, 0x9, 0x8, 0x1, 0x10000, 0x0, 0x6, 0x90e, 0x9, 0x7ff, 0x0, 0x8, 0x1, 0x30, 0x20, 0x7fffffff, 0x6, 0x401, 0x2, 0x1000, 0x8001, 0x1ff, 0xfffffffffffffff8, 0x0, 0x2, 0x0, @perf_config_ext={0x5, 0x8}, 0x1ab23, 0x3f, 0x8, 0x5, 0x6}, 0xffffffffffffffff, 0x10, r0, 0x1) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0xb, 0x9, &(0x7f0000000580)=@framed={{0x18}, [@map={0x18, 0x0, 0x1}, @generic={0x3ff, 0xfffffffffffffffc, 0x1}, @call={0x85, 0x0, 0x0, 0x6}], {0x95}}, &(0x7f0000000600)='syzkaller\x00', 0x0, 0x30, &(0x7f0000000640)=""/48, 0x41f00, 0x1}, 0x48) ioctl$PERF_EVENT_IOC_SET_BPF(r2, 0x40042408, r3) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000000)={&(0x7f0000000080)='./file0/file0\x00', r0}, 0x10) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000400)=@ax25={0x3, {"02f47b3723e03d"}}, 0x80, &(0x7f00000017c0), 0x0, &(0x7f0000001840)=ANY=[], 0x0, 0x24004044}, 0x4008001) bpf$MAP_CREATE(0x0, &(0x7f0000002cc0)={0x5, 0x100, 0x56c96e7a, 0x2, 0xa, 0xffffffffffffffff, 0x9}, 0x2c) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000480)='rpc_pipefs\x00', 0x200000, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000002d00)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f00000004c0)='vmnet0keyring\x00') bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000780)={&(0x7f0000000740)='./file0/file0\x00', r4}, 0x10) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x40082406, &(0x7f0000000700)='proc!@ppp1!ppp0ppp0#)lo\\lolo{\x00') mount(&(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000200)='fuseblk\x00', 0xa11800, &(0x7f0000000240)) r5 = syz_open_dev$sg(&(0x7f0000000240)='/dev/sg#\x00', 0xfffffffffffffffa, 0x800) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000280)={r5, r3, 0x5, 0x1}, 0x10) ioctl$TIOCCONS(r5, 0x541d) mount(&(0x7f00000002c0)='./file0/file0\x00', &(0x7f0000000300)='./file0/file0\x00', &(0x7f0000000340)='minix\x00', 0x1000, &(0x7f0000000380)) 2018/03/29 17:35:02 executing program 5: r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff7fffffffffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = getpgrp(0xffffffffffffffff) r2 = syz_open_procfs(r1, &(0x7f00000000c0)='stat\x00') ioctl$sock_inet_SIOCSIFBRDADDR(r2, 0x891a, &(0x7f00000008c0)={'ip6tnl0\x00', {0x2, 0x4e23, @multicast1=0xe0000001}}) sendfile(r2, r2, &(0x7f0000000040)=0xffffffff77fffffe, 0x5) getresuid(&(0x7f0000000480), &(0x7f00000004c0), &(0x7f0000000500)) stat(&(0x7f0000000540)='./file0\x00', &(0x7f0000000580)) geteuid() stat(&(0x7f0000000600)='./file0\x00', &(0x7f0000000640)) stat(&(0x7f00000006c0)='./file0\x00', &(0x7f0000000700)) getegid() stat(&(0x7f0000000780)='./file0\x00', &(0x7f00000007c0)) r3 = getgid() getuid() fstat(r2, &(0x7f0000000840)) sendmsg$unix(0xffffffffffffffff, &(0x7f00000009c0)={&(0x7f0000000100)=@abs={0x1, 0x0, 0x4e23}, 0x6e, &(0x7f0000000440)=[{&(0x7f0000000180)="f5dc941f4dc3cd9adc57ae91e3dd4343d2d34a84526e7cc2dced527b17e9f844324330a6c4fc95075fc39479fc730a76e14b1c7e042182b78b54fd1112d5d88e0463edf0b527bc60eef252342942a7d15f5dbf3a13deeaef54e8a875bd6393929f9f520c496c5643e469d505dd150b", 0x6f}], 0x1, &(0x7f0000000ac0)=ANY=[@ANYRES32=r0, @ANYBLOB="100000000100000001000000", @ANYBLOB="1800000001000000020000", @ANYBLOB="180000000100000002000000", @ANYBLOB="180000000100000002", @ANYRES32=r3, @ANYBLOB="1800000001000200000000003b807f0af037927569073608982ff4048a7ecfa7a1c67509e2d123a2b26f36835b10059f7a10eb109d87fc6064da955f7e7f205180a40f55cbeb36713ac27eb87fbecffcbff26a930baf2e9c2ef6884dac58f0a50bb630bd5b40ae09ab39821a7438e4933f62cb131b62df345d2bf2ad49b098c04953df23", @ANYRES32, @ANYBLOB="300000000100000001000000", @ANYRES32=r2, @ANYRES32=r2, @ANYRES32=r2, @ANYRES32=r2, @ANYRES32=r0, @ANYRES32=r0, @ANYRES32=r2, @ANYRES32=r0], 0xe8, 0x91}, 0x24008000) getresgid(&(0x7f0000000a00), &(0x7f0000000a40), &(0x7f0000000a80)) 2018/03/29 17:35:02 executing program 6: r0 = socket(0xa, 0x2, 0x0) flock(0xffffffffffffffff, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000200)) sendto$inet(r0, &(0x7f0000509f92), 0xff77, 0x8000, &(0x7f000055fff0)={0x2, 0x4e23, @loopback=0x7f000001}, 0x10) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000b00)='./cgroup.cpu\x00', 0x200002, 0x0) setsockopt$inet_mreq(r0, 0x0, 0x27, &(0x7f0000000480)={@empty, @remote={0xac, 0x14, 0x14, 0xbb}}, 0x8) fchdir(r1) bind$inet(0xffffffffffffffff, &(0x7f0000000440)={0x2, 0x0, @multicast1=0xe0000001}, 0x10) r2 = creat(&(0x7f0000000100)='./file1\x00', 0x0) fallocate(r2, 0x1, 0x0, 0x20004d2d) ioctl$DRM_IOCTL_SET_VERSION(0xffffffffffffffff, 0xc0106407, &(0x7f00000000c0)={0x0, 0x2}) sendmsg$inet_sctp(r0, &(0x7f000050dfc8)={&(0x7f0000000840)=@in6={0xa, 0x4e24, 0x80000001, @mcast1={0xff, 0x1, [], 0x1}}, 0x1c, &(0x7f00000005c0), 0x0, &(0x7f0000576000)}, 0x0) ioctl$EVIOCGPROP(0xffffffffffffffff, 0x80404509, &(0x7f00000003c0)=""/25) getsockopt$inet_sctp6_SCTP_GET_LOCAL_ADDRS(r1, 0x84, 0x6d, &(0x7f00000002c0)={0x0, 0x7e, "147b31a6c8d04526e5f78a8fe27845051f555f699446cd55da4ba6fc8873a807fa51bb4eab22c5df774cd217b3b2c0af891a34aae4b6aa2b7e16f7b4fd5dcc91ee95c14977580183e86a5e903258265c96396582cadd0075864a1d1b58c4036a1ea7b763df062b4b66c882ba9442bac3b9b6d420938dca4b48c863fb4acd"}, &(0x7f0000000240)=0x86) setsockopt$inet_sctp_SCTP_DEFAULT_PRINFO(r0, 0x84, 0x72, &(0x7f0000000380)={r3, 0x10000, 0x30}, 0xc) sendto$inet6(r0, &(0x7f0000000240), 0x0, 0x0, &(0x7f0000000280)={0xa, 0x4e23, 0x3, @local={0xfe, 0x80, [], 0xaa}, 0x9}, 0x1c) getpeername$packet(0xffffffffffffffff, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @broadcast}, &(0x7f0000000a00)=0x14) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000000)={{{@in=@multicast2, @in6=@dev}}, {{@in=@multicast1}, 0x0, @in6=@ipv4={[], [], @remote}}}, &(0x7f0000000140)=0xe8) 2018/03/29 17:35:02 executing program 4: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)={0xb, 0x7e, 0x3, 0x1, 0x11}, 0x2c) mount(&(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) r1 = socket$kcm(0x29, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000000bc0)={&(0x7f00000007c0)=@rc={0x1f, {0x5, 0x50000000, 0xaa2, 0x613, 0x4, 0x1ff}, 0x3f}, 0x80, &(0x7f0000000940)=[{&(0x7f0000000840)="09c9453aa30d8c5fba221fa2413f12c580837b2ae292e3ee8dd00098c404125a1a2e63840f82a2f69c3927af43b828422484aaeeceebcbe76e999bd3930c9b7c2995484407f9166e39c2069a88b63a980b9b5ffc880f4b89dde5adae6c7fb84ed98cbac860214dfb0b28d1b2e2d58aefebdfe515334f2ffa46be22ef7a4b3a276cb70a27c9e9f5de0a20bad24cbe2b89aee9693c2f8f186ea59fcfc4ebec7188cca0418d4583a6f1730f62416d70cd62555eb4f58ea831d1fea9956a2cba0049f23bf0b249f5de2ce0dc303808d70b0ccab3c7f37e949e", 0xd7}], 0x1, &(0x7f0000000980), 0x0, 0x20004805}, 0x4010) r2 = perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x2367, 0x7fff, 0x1, 0x6, 0x0, 0x78b1, 0x1, 0x0, 0x4992c766, 0xff, 0x81, 0x100, 0x40, 0x3, 0x9, 0x8, 0x1, 0x10000, 0x0, 0x6, 0x90e, 0x9, 0x7ff, 0x0, 0x8, 0x1, 0x30, 0x20, 0x7fffffff, 0x6, 0x401, 0x2, 0x1000, 0x8001, 0x1ff, 0xfffffffffffffff8, 0x0, 0x2, 0x0, @perf_config_ext={0x5, 0x8}, 0x1ab23, 0x3f, 0x8, 0x5, 0x6}, 0xffffffffffffffff, 0x10, r0, 0x1) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0xb, 0x7, &(0x7f0000000580)=@framed={{0x18}, [@map={0x18, 0x0, 0x1, 0x0, r0}, @call={0x85, 0x0, 0x0, 0x6}], {0x95}}, &(0x7f0000000600)='syzkaller\x00', 0x0, 0x30, &(0x7f0000000640)=""/48, 0x41f00, 0x1}, 0x48) ioctl$PERF_EVENT_IOC_SET_BPF(r2, 0x40042408, r3) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000000)={&(0x7f0000000080)='./file0/file0\x00', r0}, 0x10) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000400)=@ax25={0x3, {"02f47b3723e03d"}}, 0x80, &(0x7f00000017c0), 0x0, &(0x7f0000001840)=ANY=[], 0x0, 0x24004044}, 0x4008001) bpf$MAP_CREATE(0x0, &(0x7f0000002cc0)={0x5, 0x100, 0x56c96e7a, 0x2, 0xa, 0xffffffffffffffff, 0x9}, 0x2c) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000480)='rpc_pipefs\x00', 0x200000, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000002d00)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f00000004c0)='vmnet0keyring\x00') bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000780)={&(0x7f0000000740)='./file0/file0\x00', r4}, 0x10) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x40082406, &(0x7f0000000700)='proc!@ppp1!ppp0ppp0#)lo\\lolo{\x00') mount(&(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000200)='fuseblk\x00', 0xa11800, &(0x7f0000000240)) r5 = syz_open_dev$sg(&(0x7f0000000240)='/dev/sg#\x00', 0xfffffffffffffffa, 0x800) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000280)={r5, r3, 0x5, 0x1}, 0x10) ioctl$TIOCCONS(r5, 0x541d) mount(&(0x7f00000002c0)='./file0/file0\x00', &(0x7f0000000300)='./file0/file0\x00', &(0x7f0000000340)='minix\x00', 0x1000, &(0x7f0000000380)) 2018/03/29 17:35:02 executing program 0: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)={0xb, 0x7e, 0x3, 0x1, 0x11}, 0x2c) mount(&(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) r1 = socket$kcm(0x29, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000000bc0)={&(0x7f00000007c0)=@rc={0x1f, {0x5, 0x50000000, 0xaa2, 0x613, 0x4, 0x1ff}}, 0x80, &(0x7f0000000940)=[{&(0x7f0000000840)="09c9453aa30d8c5fba221fa2413f12c580837b2ae292e3ee8dd00098c404125a1a2e63840f82a2f69c3927af43b828422484aaeeceebcbe76e999bd3930c9b7c2995484407f9166e39c2069a88b63a980b9b5ffc880f4b89dde5adae6c7fb84ed98cbac860214dfb0b28d1b2e2d58aefebdfe515334f2ffa46be22ef7a4b3a276cb70a27c9e9f5de0a20bad24cbe2b89aee9693c2f8f186ea59fcfc4ebec7188cca0418d4583a6f1730f62416d70cd62555eb4f58ea831d1fea9956a2cba0049f23bf0b249f5de2ce0dc303808d70b0ccab3c7f37e949e", 0xd7}], 0x1, &(0x7f0000000980)}, 0x4010) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0xb, 0x9, &(0x7f0000000580)=ANY=[@ANYBLOB="1800010000000100000000000000000018100080", @ANYRES32=r0, @ANYBLOB="0000000000000000fffc0100000000000000000000000000850000000600000000000000000000009500000000000000"], &(0x7f0000000600)='syzkaller\x00', 0x0, 0x30, &(0x7f0000000640)=""/48, 0x41f00, 0x1}, 0x48) ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, r2) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000000)={&(0x7f0000000080)='./file0/file0\x00', r0}, 0x10) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000400)=@ax25={0x3, {"02f47b3723e03d"}}, 0x80, &(0x7f00000017c0), 0x0, &(0x7f0000001840)=ANY=[], 0x0, 0x24004044}, 0x4008001) bpf$MAP_CREATE(0x0, &(0x7f0000002cc0)={0x5, 0x100, 0x56c96e7a, 0x2, 0xa, 0xffffffffffffffff, 0x9}, 0x2c) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000480)='rpc_pipefs\x00', 0x200000, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000002d00)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f00000004c0)='vmnet0keyring\x00') bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000780)={&(0x7f0000000740)='./file0/file0\x00', r3}, 0x10) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, &(0x7f0000000700)='proc!@ppp1!ppp0ppp0#)lo\\lolo{\x00') mkdir(&(0x7f0000000240)='./file0/file1\x00', 0x8) mount(&(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000200)='fuseblk\x00', 0xa11800, &(0x7f0000000240)) mount(&(0x7f00000002c0)='./file0/file0\x00', &(0x7f0000000300)='./file0/file0\x00', &(0x7f0000000340)='minix\x00', 0x0, &(0x7f0000000380)) 2018/03/29 17:35:02 executing program 1: mkdir(&(0x7f000082f000)='./control\x00', 0x0) mmap(&(0x7f0000011000/0x2000)=nil, 0x2000, 0x1, 0x32, 0xffffffffffffffff, 0x0) r0 = userfaultfd(0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000e4c000)={0xaa}) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f00000003c0)={0x0, 0x0}, &(0x7f0000000400)=0xc) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000440)) r2 = accept4$ax25(0xffffffffffffff9c, &(0x7f0000000380), &(0x7f0000000480)=0x10, 0x80000) fcntl$addseals(r0, 0x409, 0x1) fcntl$getown(0xffffffffffffffff, 0x9) ioctl$TIOCGSID(0xffffffffffffff9c, 0x5429, &(0x7f0000000300)) r3 = syz_open_procfs(0x0, &(0x7f0000000040)="2f65786500000000000090d8b75e67e16b394342abb5158df87ea8984e79c93df7498b2b34796068700e29fbd789f9a031f23e16c96e30baed2961953b057f7a3222943acc4b8cfa4de553f8276731ddeb811efd44ea011e1a0db9074a28a826c88566b89c57cc3cca4aec41d37fa27c8daa19030d03139d0aea71d509d9a20ba7deceb656cc1308d9d1f111b6bd1595486f55e229923be4ed8cbfb78e86280b4cacf386bfa8840afb312a4c520a03b27f805d181bd09ea208931a36e888060a2d") syz_extract_tcp_res$synack(&(0x7f00000004c0), 0x1, 0x0) fsetxattr(r3, &(0x7f0000000140)=@known='user.syz\x00', &(0x7f0000000180)="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", 0x137, 0x0) fremovexattr(r3, &(0x7f0000000000)=@known='user.syz\x00') ioctl$DRM_IOCTL_GET_CAP(0xffffffffffffffff, 0xc010640c, &(0x7f0000000340)={0x9}) r4 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000580)='IPVS\x00') sendmsg$IPVS_CMD_GET_INFO(r2, &(0x7f0000000700)={&(0x7f0000000540)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f00000006c0)={&(0x7f00000005c0)={0xb8, r4, 0xa10, 0x70bd2d, 0x25dfdbff, {0xf}, [@IPVS_CMD_ATTR_SERVICE={0x30, 0x1, [@IPVS_SVC_ATTR_AF={0x8, 0x1}, @IPVS_SVC_ATTR_AF={0x8, 0x1, 0xa}, @IPVS_SVC_ATTR_NETMASK={0x8, 0x9, 0x32}, @IPVS_SVC_ATTR_FLAGS={0xc, 0x7, {0x8}}, @IPVS_SVC_ATTR_PROTOCOL={0x8, 0x2, 0x21}]}, @IPVS_CMD_ATTR_DAEMON={0x18, 0x3, [@IPVS_DAEMON_ATTR_MCAST_GROUP6={0x14, 0x6}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0x80f}, @IPVS_CMD_ATTR_SERVICE={0x1c, 0x1, [@IPVS_SVC_ATTR_PE_NAME={0x8, 0xb, 'sip\x00'}, @IPVS_SVC_ATTR_FWMARK={0x8, 0x5, 0x3}, @IPVS_SVC_ATTR_TIMEOUT={0x8, 0x8}]}, @IPVS_CMD_ATTR_DAEMON={0x38, 0x3, [@IPVS_DAEMON_ATTR_STATE={0x8, 0x1}, @IPVS_DAEMON_ATTR_MCAST_GROUP6={0x14, 0x6, @mcast2={0xff, 0x2, [], 0x1}}, @IPVS_DAEMON_ATTR_SYNC_MAXLEN={0x8, 0x4, 0x40}, @IPVS_DAEMON_ATTR_MCAST_PORT={0x8, 0x7, 0x4e22}, @IPVS_DAEMON_ATTR_SYNC_MAXLEN={0x8, 0x4, 0x2}]}]}, 0xb8}, 0x1, 0x0, 0x0, 0x80}, 0x40000) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f00000002c0)) r5 = creat(&(0x7f0000000000)='./control/file0\x00', 0x0) write$sndseq(r5, &(0x7f0000011fd2)=[{0x0, 0x0, 0x0, 0x0, @time, {}, {}, @time=@time={0x77359400}}], 0x30) rename(&(0x7f0000000240)='./control/file0\x00', &(0x7f00000001c0)='./file0\x00') syz_fuse_mount(&(0x7f0000000080)='./file0\x00', 0x0, r1, 0x0, 0x0, 0x0) 2018/03/29 17:35:02 executing program 3: r0 = socket(0xa, 0x2, 0x0) userfaultfd(0x800) r1 = open(&(0x7f00004b8ff8)='./file0\x00', 0x28042, 0x0) connect$inet6(r0, &(0x7f0000d3cfe4)={0xa, 0x0, 0x0, @mcast2={0xff, 0x2, [], 0x1}, 0x3}, 0x1c) ioctl$DRM_IOCTL_ADD_CTX(r1, 0xc0086420, &(0x7f0000000000)={0x0}) ioctl$DRM_IOCTL_NEW_CTX(r1, 0x40086425, &(0x7f0000000080)={r2, 0x3}) fallocate(r1, 0x0, 0x400000002, 0x1f) setsockopt$inet6_mtu(0xffffffffffffffff, 0x29, 0x17, &(0x7f0000000100)=0x2, 0x4) connect$inet(r0, &(0x7f0000000040)={0x2, 0x4e22, @multicast1=0xe0000001}, 0x10) sendfile(r0, r1, &(0x7f00005faff8), 0xfffb) setsockopt$sock_void(r0, 0x1, 0x24, 0x0, 0x0) 2018/03/29 17:35:02 executing program 7: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)={0xb, 0x7e, 0x3, 0x1, 0x11}, 0x2c) mount(&(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) r1 = socket$kcm(0x29, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000000bc0)={&(0x7f00000007c0)=@rc={0x1f, {0x5, 0x50000000, 0xaa2, 0x613, 0x4, 0x1ff}, 0x3f}, 0x80, &(0x7f0000000940)=[{&(0x7f0000000840)="09c9453aa30d8c5fba221fa2413f12c580837b2ae292e3ee8dd00098c404125a1a2e63840f82a2f69c3927af43b828422484aaeeceebcbe76e999bd3930c9b7c2995484407f9166e39c2069a88b63a980b9b5ffc880f4b89dde5adae6c7fb84ed98cbac860214dfb0b28d1b2e2d58aefebdfe515334f2ffa46be22ef7a4b3a276cb70a27c9e9f5de0a20bad24cbe2b89aee9693c2f8f186ea59fcfc4ebec7188cca0418d4583a6f1730f62416d70cd62555eb4f58ea831d1fea9956a2cba0049f23bf0b249f5de2ce0dc303808d70b0ccab3c7f37e949e", 0xd7}], 0x1, &(0x7f0000000980), 0x0, 0x20004805}, 0x4010) r2 = perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x2367, 0x7fff, 0x1, 0x6, 0x0, 0x78b1, 0x1, 0x0, 0x4992c766, 0xff, 0x81, 0x100, 0x40, 0x3, 0x9, 0x8, 0x1, 0x10000, 0x0, 0x6, 0x90e, 0x9, 0x7ff, 0x0, 0x8, 0x1, 0x30, 0x20, 0x7fffffff, 0x6, 0x401, 0x2, 0x1000, 0x8001, 0x1ff, 0xfffffffffffffff8, 0x0, 0x2, 0x0, @perf_config_ext={0x5, 0x8}, 0x1ab23, 0x3f, 0x8, 0x5, 0x6, 0x0, 0x6}, 0xffffffffffffffff, 0x10, r0, 0x1) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0xb, 0x9, &(0x7f0000000580)=@framed={{0x18}, [@map={0x18, 0x0, 0x1, 0x0, r0}, @generic={0x3ff, 0xfffffffffffffffc, 0x1}, @call={0x85, 0x0, 0x0, 0x6}], {0x95}}, &(0x7f0000000600)='syzkaller\x00', 0x0, 0x30, &(0x7f0000000640)=""/48, 0x41f00, 0x1}, 0x48) ioctl$PERF_EVENT_IOC_SET_BPF(r2, 0x40042408, r3) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000000)={&(0x7f0000000080)='./file0/file0\x00', r0}, 0x10) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000400)=@ax25={0x3, {"02f47b3723e03d"}}, 0x80, &(0x7f00000017c0), 0x0, &(0x7f0000001840)=ANY=[], 0x0, 0x24004044}, 0x4008001) bpf$MAP_CREATE(0x0, &(0x7f0000002cc0)={0x5, 0x0, 0x56c96e7a, 0x2, 0xa, 0xffffffffffffffff, 0x9}, 0x2c) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000240)={0x0}, &(0x7f0000000280)=0xc) ioprio_set$pid(0x1, r4, 0x7f) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000480)='rpc_pipefs\x00', 0x200000, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000002d00)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f00000004c0)='vmnet0keyring\x00') bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000780)={&(0x7f0000000740)='./file0/file0\x00', r5}, 0x10) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x40082406, &(0x7f0000000700)='proc!@ppp1!ppp0ppp0#)lo\\lolo{\x00') mount(&(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000200)='fuseblk\x00', 0xa11800, &(0x7f0000000240)) mount(&(0x7f00000002c0)='./file0/file0\x00', &(0x7f0000000300)='./file0/file0\x00', &(0x7f0000000340)='minix\x00', 0x1000, &(0x7f0000000380)) 2018/03/29 17:35:02 executing program 6: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000ed4000)=0x78, 0x4) bind$inet(r0, &(0x7f0000deb000)={0x2, 0x4e23, @multicast1=0xe0000001}, 0x10) ioctl$sock_SIOCINQ(r0, 0x541b, &(0x7f0000000500)) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000f40ff8)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) getsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(0xffffffffffffff9c, 0x84, 0x1f, &(0x7f0000000240)={0x0, @in={{0x2, 0x4e23}}, 0x0, 0x3}, &(0x7f0000000000)=0x90) setsockopt$inet_sctp_SCTP_RTOINFO(0xffffffffffffffff, 0x84, 0x0, &(0x7f0000000040)={r1, 0x81, 0x7, 0x100000000}, 0x10) getsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(r0, 0x84, 0x18, &(0x7f00000003c0)={r1, 0x7}, &(0x7f0000000400)=0x8) socketpair(0x11, 0x800, 0x5, &(0x7f0000000200)={0xffffffffffffffff}) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_INFO(r2, 0xc08c5334, &(0x7f0000000600)={0x6, 0x7, 0x2f29fdaf, 'queue0\x00', 0x800}) r3 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000080)='/dev/hwrng\x00', 0x4000, 0x0) sendto$inet(r0, &(0x7f0000a88f88), 0x29f, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @loopback=0x7f000001}, 0x10) pipe2(&(0x7f0000000580)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80002) ioctl$EVIOCGBITKEY(0xffffffffffffffff, 0x80404521, &(0x7f00000000c0)=""/160) sendmmsg(r0, &(0x7f00000025c0)=[{{&(0x7f0000000300)=@pppoe={0x18, 0x0, {0x0, @link_local={0x1, 0x80, 0xc2}, 'ip6tnl0\x00'}}, 0x80, &(0x7f0000000380)=[{&(0x7f00000010c0)="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", 0x6cb}], 0x1}}], 0x1, 0x4000) recvfrom$inet(r0, &(0x7f00009be000)=""/11, 0xe8, 0x0, 0x0, 0xffffffffffffff4e) bind$bt_l2cap(r4, &(0x7f0000000440)={0x1f, 0x8, {0x6, 0x400, 0x0, 0x2, 0x9, 0x3}, 0x10001, 0x2}, 0xe) setsockopt(r5, 0xb5, 0xffffffff, &(0x7f00000006c0)="0ac385d7ac2ae574baf1b3104b37fd7f20ebca1da5063c612b05a3d56c8b2e413e64bfc3e0bb415e656477eea9c01ad808e74aea23e7e4a07d09f22e69e1ae37fecf707d249ba82f1fc8f4", 0x4b) getsockopt$inet_sctp_SCTP_RECVRCVINFO(r0, 0x84, 0x20, &(0x7f0000000180), &(0x7f00000001c0)=0x4) sendmsg$netrom(r3, &(0x7f0000000b00)={&(0x7f0000000780)=@full={{0x3, {"53665db4283e1b"}, 0x3}, [{"d40335b6bcd5d9"}, {"d5952336c520fb"}, {"d326c92416d6ea"}, {"763aea9242214f"}, {"d716c11982a583"}, {"712de86f857435"}, {"1d8bd63f2c431c"}, {"6f5a0b1522aca6"}]}, 0x48, &(0x7f0000000ac0), 0x0, &(0x7f00000017c0), 0x0, 0x8000}, 0x4000840) setsockopt$inet_mtu(r3, 0x0, 0xa, &(0x7f0000000480)=0x7, 0x4) r6 = getpid() epoll_ctl$EPOLL_CTL_ADD(r3, 0x1, r3, &(0x7f00000004c0)={0x5}) syz_open_procfs(r6, &(0x7f00000005c0)='maps\x00') shutdown(r0, 0x1) 2018/03/29 17:35:02 executing program 5: r0 = socket(0xa, 0x2, 0x0) flock(0xffffffffffffffff, 0x6) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000200)) setsockopt$inet_sctp_SCTP_STREAM_SCHEDULER(0xffffffffffffffff, 0x84, 0x7b, &(0x7f0000000400), 0x3ba) sendto$inet(r0, &(0x7f0000509f92), 0xff77, 0x8000, &(0x7f000055fff0)={0x2, 0x4e23, @loopback=0x7f000001}, 0x10) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000b00)='./cgroup.cpu\x00', 0x200002, 0x0) setsockopt$inet_mreq(r0, 0x0, 0x27, &(0x7f0000000480)={@empty, @remote={0xac, 0x14, 0x14, 0xbb}}, 0x8) fchdir(r1) fstat(0xffffffffffffffff, &(0x7f0000000180)) bind$inet(0xffffffffffffffff, &(0x7f0000000440)={0x2, 0x0, @multicast1=0xe0000001}, 0x10) r2 = creat(&(0x7f0000000100)='./file1\x00', 0x0) fallocate(r2, 0x1, 0x0, 0x20004d2d) ioctl$DRM_IOCTL_SET_VERSION(0xffffffffffffffff, 0xc0106407, &(0x7f00000000c0)={0x0, 0x2}) socket$inet6_icmp(0xa, 0x2, 0x3a) sendmsg$inet_sctp(r0, &(0x7f000050dfc8)={&(0x7f0000000840)=@in6={0xa, 0x4e24, 0x0, @mcast1={0xff, 0x1, [], 0x1}}, 0x1c, &(0x7f00000005c0), 0x0, &(0x7f0000576000)}, 0x0) ioctl$EVIOCGPROP(0xffffffffffffffff, 0x80404509, &(0x7f00000003c0)=""/25) getsockopt$inet_sctp6_SCTP_GET_LOCAL_ADDRS(r1, 0x84, 0x6d, &(0x7f00000002c0)={0x0, 0x7e, "147b31a6c8d04526e5f78a8fe27845051f555f699446cd55da4ba6fc8873a807fa51bb4eab22c5df774cd217b3b2c0af891a34aae4b6aa2b7e16f7b4fd5dcc91ee95c14977580183e86a5e903258265c96396582cadd0075864a1d1b58c4036a1ea7b763df062b4b66c882ba9442bac3b9b6d420938dca4b48c863fb4acd"}, &(0x7f0000000240)=0x86) setsockopt$inet_sctp_SCTP_DEFAULT_PRINFO(0xffffffffffffffff, 0x84, 0x72, &(0x7f0000000380)={r3, 0x10000, 0x30}, 0xc) sendto$inet6(r0, &(0x7f0000000240), 0x0, 0x0, &(0x7f0000000280)={0xa, 0x4e23, 0x0, @local={0xfe, 0x80, [], 0xaa}, 0x9}, 0x1c) getpeername$packet(0xffffffffffffffff, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @broadcast}, &(0x7f0000000a00)=0x14) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000000)={{{@in=@multicast2, @in6=@dev}}, {{@in=@multicast1}, 0x0, @in6=@ipv4={[], [], @remote}}}, &(0x7f0000000140)=0xe8) 2018/03/29 17:35:03 executing program 2: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)={0xb, 0x7e, 0x3, 0x1, 0x11}, 0x2c) mount(&(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) r1 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000240)='/dev/cuse\x00', 0x2280c2, 0x0) ioctl$VHOST_SET_OWNER(r1, 0xaf01, 0x0) r2 = socket$kcm(0x29, 0x2, 0x0) sendmsg$kcm(r2, &(0x7f0000000bc0)={&(0x7f00000007c0)=@rc={0x1f, {0x5, 0x50000000, 0xaa2, 0x613, 0x4, 0x1ff}, 0x3f}, 0x80, &(0x7f0000000940)=[{&(0x7f0000000840)="09c9453aa30d8c5fba221fa2413f12c580837b2ae292e3ee8dd00098c404125a1a2e63840f82a2f69c3927af43b828422484aaeeceebcbe76e999bd3930c9b7c2995484407f9166e39c2069a88b63a980b9b5ffc880f4b89dde5adae6c7fb84ed98cbac860214dfb0b28d1b2e2d58aefebdfe515334f2ffa46be22ef7a4b3a276cb70a27c9e9f5de0a20bad24cbe2b89aee9693c2f8f186ea59fcfc4ebec7188cca0418d4583a6f1730f62416d70cd62555eb4f58ea831d1fea9956a2cba0049f23bf0b249f5de2ce0dc303808d70b0ccab3c7f37e949e", 0xd7}], 0x1, &(0x7f0000000980), 0x0, 0x20004805}, 0x4010) r3 = perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x2367, 0x7fff, 0x1, 0x6, 0x0, 0x78b1, 0x20000, 0x0, 0x4992c766, 0xff, 0x81, 0x100, 0x40, 0x3, 0x9, 0x40000008, 0x1, 0x10000, 0xfffffffffffffffe, 0x6, 0x90e, 0x7f2b5b75, 0x7ff, 0x0, 0x8, 0x1, 0x30, 0x20, 0x7fffffff, 0x6, 0x401, 0x2, 0x1000, 0x8001, 0x40000000000001ff, 0xfffffffffffffff8, 0x0, 0x2, 0x0, @perf_config_ext={0x5, 0x8}, 0x1ab23, 0x0, 0x8, 0x5, 0x6, 0x0, 0x6}, 0xffffffffffffffff, 0x10, r0, 0x1) bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0xb, 0x9, &(0x7f0000000a40)=ANY=[@ANYBLOB="1800000000000000000000000000000018100000", @ANYRES32=r0, @ANYBLOB="0000000000000000fffc010000000000ce700675dc000000000000000085000000060000000000000000000000950000eaac000000f953bc05c0bc8f8a3570d64ac6c43b87d4dcd85829d2d8bb0836bfa6c05422fda55466047af98cac9b44d77ea2e178d5e20a531f49635d38c3156481f80f4e423325c15ec42cc7c2ec2ac9"], &(0x7f0000000600)='syzkaller\x00', 0x0, 0x30, &(0x7f0000000640)=""/48, 0x41f00, 0x1}, 0x48) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000000)={&(0x7f0000000080)='./file0/file0\x00', r0}, 0x10) r4 = shmget(0x0, 0x2000, 0x842, &(0x7f0000ffd000/0x2000)=nil) shmctl$IPC_RMID(r4, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000400)=@ax25={0x3, {"02f47b3723e03d"}}, 0x80, &(0x7f00000017c0), 0x0, &(0x7f0000001840)=ANY=[], 0x0, 0x24004044}, 0x4008001) bpf$MAP_CREATE(0x0, &(0x7f0000002cc0)={0x5, 0x0, 0x56c96e7a, 0x2, 0xa, 0xffffffffffffffff, 0x9}, 0x2c) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000480)='rpc_pipefs\x00', 0x200000, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000002d00)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f00000004c0)='vmnet0keyring\x00') bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000780)={&(0x7f0000000740)='./file0/file0\x00', r5}, 0x10) ioctl$PERF_EVENT_IOC_SET_FILTER(r3, 0x40082406, &(0x7f0000000700)='proc!@ppp1!ppp0ppp0#)lo\\lolo{\x00') mount(&(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000200)='fuseblk\x00', 0xa11800, &(0x7f0000000240)) mount(&(0x7f00000002c0)='./file0/file0\x00', &(0x7f0000000300)='./file0/file0\x00', &(0x7f0000000340)='minix\x00', 0x1000, &(0x7f0000000380)) 2018/03/29 17:35:03 executing program 0: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r0 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000240)='/dev/qat_adf_ctl\x00', 0x10000, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_CLIENT(r0, 0xc04c5349, &(0x7f0000000500)={0x5, 0xfffffffffffffffd, 0x10000}) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)={0xb, 0x7e, 0x3, 0x1, 0x11}, 0x2c) mount(&(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) r2 = socket$kcm(0x29, 0x2, 0x0) sendmsg$kcm(r2, &(0x7f0000000bc0)={&(0x7f00000007c0)=@rc={0x1f, {0x5, 0x50000000, 0xaa2, 0x613, 0x4, 0x1ff}}, 0x80, &(0x7f0000000940)=[{&(0x7f0000000840)="09c9453aa30d8c5fba221fa2413f12c580837b2ae292e3ee8dd00098c404125a1a2e63840f82a2f69c3927af43b828422484aaeeceebcbe76e999bd3930c9b7c2995484407f9166e39c2069a88b63a980b9b5ffc880f4b89dde5adae6c7fb84ed98cbac860214dfb0b28d1b2e2d58aefebdfe515334f2ffa46be22ef7a4b3a276cb70a27c9e9f5de0a20bad24cbe2b89aee9693c2f8f186ea59fcfc4ebec7188cca0418d4583a6f1730f62416d70cd62555eb4f58ea831d1fea9956a2cba0049f23bf0b249f5de2ce0dc303808d70b0ccab3c7f37e949e", 0xd7}], 0x1, &(0x7f0000000980)}, 0x4010) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0xb, 0x9, &(0x7f0000000580)=@framed={{0x18}, [@map={0x18, 0x0, 0x1, 0x0, r1}, @generic={0x3ff, 0xfffffffffffffffc, 0x1}, @call={0x85, 0x0, 0x0, 0x6}], {0x95}}, &(0x7f0000000600)='syzkaller\x00', 0x0, 0x30, &(0x7f0000000640)=""/48, 0x41f00, 0x1}, 0x48) ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, r3) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000000)={&(0x7f0000000080)='./file0/file0\x00', r1}, 0x10) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000400)=@ax25={0x3, {"02f47b3723e03d"}}, 0x5a, &(0x7f00000017c0), 0x0, &(0x7f0000001840)=ANY=[], 0x0, 0x24004044}, 0x4008001) bpf$MAP_CREATE(0x0, &(0x7f0000002cc0)={0x5, 0x100, 0x56c96e7a, 0x2, 0xa, 0xffffffffffffffff, 0x9}, 0x2c) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000480)='rpc_pipefs\x00', 0x200000, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000002d00)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x40082406, &(0x7f00000004c0)='vmnet0keyring\x00') bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000780)={&(0x7f0000000740)='./file0/file0\x00', r4}, 0x10) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, &(0x7f0000000700)='proc!@ppp1!ppp0ppp0#)lo\\lolo{\x00') mount(&(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000200)='fuseblk\x00', 0xa11800, &(0x7f0000000240)) mount(&(0x7f00000002c0)='./file0/file0\x00', &(0x7f0000000300)='./file0/file0\x00', &(0x7f0000000340)='minix\x00', 0x0, &(0x7f0000000380)) 2018/03/29 17:35:03 executing program 4: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)={0xb, 0x7e, 0x3, 0x1, 0x11}, 0x2c) mount(&(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) r1 = socket$kcm(0x29, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000000bc0)={&(0x7f00000007c0)=@rc={0x1f, {0x5, 0x50000000, 0xaa2, 0x613, 0x4, 0x1ff}, 0x3f}, 0x80, &(0x7f0000000940)=[{&(0x7f0000000840)="09c9453aa30d8c5fba221fa2413f12c580837b2ae292e3ee8dd00098c404125a1a2e63840f82a2f69c3927af43b828422484aaeeceebcbe76e999bd3930c9b7c2995484407f9166e39c2069a88b63a980b9b5ffc880f4b89dde5adae6c7fb84ed98cbac860214dfb0b28d1b2e2d58aefebdfe515334f2ffa46be22ef7a4b3a276cb70a27c9e9f5de0a20bad24cbe2b89aee9693c2f8f186ea59fcfc4ebec7188cca0418d4583a6f1730f62416d70cd62555eb4f58ea831d1fea9956a2cba0049f23bf0b249f5de2ce0dc303808d70b0ccab3c7f37e949e", 0xd7}], 0x1, &(0x7f0000000980), 0x0, 0x20004805}, 0x4010) r2 = perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x2367, 0x7fff, 0x1, 0x6, 0x0, 0x78b1, 0x1, 0x0, 0x4992c766, 0xff, 0x81, 0x100, 0x40, 0x3, 0x9, 0x8, 0x1, 0x10000, 0x0, 0x6, 0x90e, 0x9, 0x7ff, 0x0, 0x8, 0x1, 0x30, 0x20, 0x7fffffff, 0x6, 0x401, 0x2, 0x1000, 0x8001, 0x1ff, 0xfffffffffffffff8, 0x0, 0x2, 0x0, @perf_config_ext={0x5, 0x8}, 0x1ab23, 0x3f, 0x8, 0x5, 0x6}, 0xffffffffffffffff, 0x10, r0, 0x1) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0xb, 0x7, &(0x7f0000000580)=@framed={{0x18}, [@map={0x18, 0x0, 0x1, 0x0, r0}, @call={0x85, 0x0, 0x0, 0x6}], {0x95}}, &(0x7f0000000600)='syzkaller\x00', 0x0, 0x30, &(0x7f0000000640)=""/48, 0x41f00, 0x1}, 0x48) ioctl$PERF_EVENT_IOC_SET_BPF(r2, 0x40042408, r3) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000000)={&(0x7f0000000080)='./file0/file0\x00', r0}, 0x10) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000400)=@ax25={0x3, {"02f47b3723e03d"}}, 0x80, &(0x7f00000017c0), 0x0, &(0x7f0000001840)=ANY=[], 0x0, 0x24004044}, 0x4008001) bpf$MAP_CREATE(0x0, &(0x7f0000002cc0)={0x5, 0x100, 0x56c96e7a, 0x2, 0xa, 0xffffffffffffffff, 0x9}, 0x2c) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000480)='rpc_pipefs\x00', 0x200000, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000002d00)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f00000004c0)='vmnet0keyring\x00') bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000780)={&(0x7f0000000740)='./file0/file0\x00', r4}, 0x10) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x40082406, &(0x7f0000000700)='proc!@ppp1!ppp0ppp0#)lo\\lolo{\x00') mount(&(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000200)='fuseblk\x00', 0xa11800, &(0x7f0000000240)) r5 = syz_open_dev$sg(&(0x7f0000000240)='/dev/sg#\x00', 0xfffffffffffffffa, 0x800) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000280)={r5, r3, 0x5, 0x1}, 0x10) ioctl$TIOCCONS(r5, 0x541d) mount(&(0x7f00000002c0)='./file0/file0\x00', &(0x7f0000000300)='./file0/file0\x00', &(0x7f0000000340)='minix\x00', 0x1000, &(0x7f0000000380)) 2018/03/29 17:35:03 executing program 1: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000ed4000)=0x78, 0x4) bind$inet(r0, &(0x7f0000deb000)={0x2, 0x4e23, @multicast1=0xe0000001}, 0x10) ioctl$sock_SIOCINQ(r0, 0x541b, &(0x7f0000000500)) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000f40ff8)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) getsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(0xffffffffffffff9c, 0x84, 0x1f, &(0x7f0000000240)={0x0, @in={{0x2, 0x4e23}}, 0x0, 0x3}, &(0x7f0000000000)=0x90) setsockopt$inet_sctp_SCTP_RTOINFO(r0, 0x84, 0x0, &(0x7f0000000040)={r1, 0x81, 0x7, 0x100000000}, 0x10) getsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(r0, 0x84, 0x18, &(0x7f00000003c0)={0x0, 0x7}, &(0x7f0000000400)=0x8) socketpair(0x11, 0x800, 0x5, &(0x7f0000000200)={0xffffffffffffffff}) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_INFO(r2, 0xc08c5334, &(0x7f0000000600)={0x6, 0x7, 0x2f29fdaf, 'queue0\x00', 0x800}) r3 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000080)='/dev/hwrng\x00', 0x4000, 0x0) sendto$inet(r0, &(0x7f0000a88f88), 0x29f, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @loopback=0x7f000001}, 0x10) pipe2(&(0x7f0000000580)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80002) ioctl$EVIOCGBITKEY(0xffffffffffffffff, 0x80404521, &(0x7f00000000c0)=""/160) sendmmsg(r0, &(0x7f00000025c0)=[{{&(0x7f0000000300)=@pppoe={0x18, 0x0, {0x0, @link_local={0x1, 0x80, 0xc2}, 'ip6tnl0\x00'}}, 0x80, &(0x7f0000000380)=[{&(0x7f00000010c0)="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", 0x664}], 0x1}}], 0x1, 0x4000) recvfrom$inet(r0, &(0x7f00009be000)=""/11, 0xe8, 0x0, 0x0, 0xffffffffffffff4e) bind$bt_l2cap(r4, &(0x7f0000000440)={0x1f, 0x8, {0x6, 0x400, 0x0, 0x2, 0x9, 0x3}, 0x10001, 0x2}, 0xe) setsockopt(r5, 0xb5, 0xffffffff, &(0x7f00000006c0)="0ac385d7ac2ae574baf1b3104b37fd7f20ebca1da5063c612b05a3d56c8b2e413e64bfc3e0bb415e656477eea9c01ad808e74aea23e7e4a07d09f22e69e1ae37fecf707d249ba82f1fc8f4a53558952762a62d5712f7ad3f1e2d51e5e3cf31154625d23de117cbb19fe0379b78ae656d20a1840850e0d1b6f6d94f8c810560030e0ac978d48567edbbb1f79c22a73e5a978f82d9637023d70e36036002", 0x9d) getsockopt$inet_sctp_SCTP_RECVRCVINFO(r0, 0x84, 0x20, &(0x7f0000000180), &(0x7f00000001c0)=0x4) sendmsg$netrom(r3, &(0x7f0000000b00)={&(0x7f0000000780)=@full={{0x3, {"53665db4283e1b"}, 0x3}, [{"d40335b6bcd5d9"}, {"d5952336c520fb"}, {"d326c92416d6ea"}, {"763aea9242214f"}, {"d716c11982a583"}, {"712de86f857435"}, {"1d8bd63f2c431c"}, {"6f5a0b1522aca6"}]}, 0x48, &(0x7f0000000ac0), 0x0, &(0x7f00000017c0), 0x0, 0x8000}, 0x4000840) setsockopt$inet_mtu(r3, 0x0, 0xa, &(0x7f0000000480), 0x4) r6 = getpid() epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, r3, &(0x7f00000004c0)={0x5}) syz_open_procfs(r6, &(0x7f00000005c0)='maps\x00') shutdown(r0, 0x1) 2018/03/29 17:35:03 executing program 3: r0 = socket(0xa, 0x2, 0x0) r1 = open(&(0x7f00004b8ff8)='./file0\x00', 0x28042, 0x0) connect$inet6(r0, &(0x7f0000d3cfe4)={0xa, 0x0, 0x0, @mcast2={0xff, 0x2, [], 0x1}, 0x3}, 0x1c) socket$bt_cmtp(0x1f, 0x3, 0x5) ioctl$DRM_IOCTL_ADD_CTX(r1, 0xc0086420, &(0x7f0000000000)) getsockopt$EBT_SO_GET_ENTRIES(r1, 0x0, 0x81, &(0x7f0000000200)={'nat\x00', 0x0, 0x4, 0x26, [], 0x8, &(0x7f0000000140)=[{}, {}, {}, {}, {}, {}, {}, {}], &(0x7f00000001c0)=""/38}, &(0x7f0000000280)=0x78) ioctl$DRM_IOCTL_NEW_CTX(r1, 0x40086425, &(0x7f0000000080)={0x0, 0x3}) socketpair$packet(0x11, 0x2, 0x300, &(0x7f00000000c0)) fallocate(r1, 0x0, 0xffff, 0x1f) setsockopt$inet6_mtu(0xffffffffffffffff, 0x29, 0x17, &(0x7f0000000100)=0x2, 0x4) connect$inet(r0, &(0x7f0000000040)={0x2, 0x4e22, @multicast1=0xe0000001}, 0x10) sendfile(r0, r1, &(0x7f00005faff8), 0xfffb) 2018/03/29 17:35:03 executing program 5: r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff7fffffffffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = getpgrp(0xffffffffffffffff) r2 = syz_open_procfs(r1, &(0x7f00000000c0)='stat\x00') ioctl$sock_inet_SIOCSIFBRDADDR(r2, 0x891a, &(0x7f00000008c0)={'ip6tnl0\x00', {0x2, 0x4e23, @multicast1=0xe0000001}}) sendfile(r2, r2, &(0x7f0000000040)=0xffffffff77fffffe, 0x5) getresuid(&(0x7f0000000480), &(0x7f00000004c0), &(0x7f0000000500)) stat(&(0x7f0000000540)='./file0\x00', &(0x7f0000000580)) geteuid() stat(&(0x7f0000000600)='./file0\x00', &(0x7f0000000640)) stat(&(0x7f00000006c0)='./file0\x00', &(0x7f0000000700)) getegid() stat(&(0x7f0000000780)='./file0\x00', &(0x7f00000007c0)) r3 = getgid() getuid() fstat(r2, &(0x7f0000000840)) sendmsg$unix(0xffffffffffffffff, &(0x7f00000009c0)={&(0x7f0000000100)=@abs={0x1, 0x0, 0x4e23}, 0x6e, &(0x7f0000000440)=[{&(0x7f0000000180)="f5dc941f4dc3cd9adc57ae91e3dd4343d2d34a84526e7cc2dced527b17e9f844324330a6c4fc95075fc39479fc730a76e14b1c7e042182b78b54fd1112d5d88e0463edf0b527bc60eef252342942a7d15f5dbf3a13deeaef54e8a875bd6393929f9f520c496c5643e469d505", 0x6c}], 0x1, &(0x7f0000000ac0)=ANY=[@ANYBLOB="1800000001000000020000", @ANYBLOB="180000000100000002000000", @ANYBLOB="180000000100000002", @ANYRES32=r3, @ANYBLOB="1800000001000200000000003b807f0af037927569073608982ff4048a7ecfa7a1c67509e2d123a2b26f36835b10059f7a10eb109d87fc6064da955f7e7f205180a40f55cbeb36713ac27eb87fbecffcbff26a930baf2e9c2ef6884dac58f0a50bb630bd5b40ae09ab39821a7438e4933f62cb131b62df345d2bf2ad49b098c04953df23", @ANYRES32, @ANYBLOB="300000000100000001000000", @ANYRES32=r2, @ANYRES32=r2, @ANYRES32=r2, @ANYRES32=r2, @ANYRES32=r0, @ANYRES32=r0, @ANYRES32=r2, @ANYRES32=r0], 0xd8, 0x91}, 0x24008000) getresgid(&(0x7f0000000a00), &(0x7f0000000a40), &(0x7f0000000a80)) 2018/03/29 17:35:03 executing program 7: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)={0xb, 0x7e, 0x3, 0x1, 0x11}, 0x2c) mount(&(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) r1 = socket$kcm(0x29, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000000bc0)={&(0x7f00000007c0)=@rc={0x1f, {0x5, 0x50000000, 0xaa2, 0x613, 0x4, 0x1ff}, 0x3f}, 0x80, &(0x7f0000000940)=[{&(0x7f0000000840)="09c9453aa30d8c5fba221fa2413f12c580837b2ae292e3ee8dd00098c404125a1a2e63840f82a2f69c3927af43b828422484aaeeceebcbe76e999bd3930c9b7c2995484407f9166e39c2069a88b63a980b9b5ffc880f4b89dde5adae6c7fb84ed98cbac860214dfb0b28d1b2e2d58aefebdfe515334f2ffa46be22ef7a4b3a276cb70a27c9e9f5de0a20bad24cbe2b89aee9693c2f8f186ea59fcfc4ebec7188cca0418d4583a6f1730f62416d70cd62555eb4f58ea831d1fea9956a2cba0049f23bf0b249f5de2ce0dc303808d70b0ccab3c7f37e949e", 0xd7}], 0x1, &(0x7f0000000980), 0x0, 0x20004805}, 0x4010) r2 = perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x2367, 0x7fff, 0x1, 0x6, 0x0, 0x78b1, 0x1, 0x0, 0x4992c766, 0xff, 0x81, 0x100, 0x40, 0x3, 0x9, 0x8, 0x1, 0x10000, 0x0, 0x6, 0x90e, 0x9, 0x7ff, 0x0, 0x8, 0x1, 0x30, 0x20, 0x7fffffff, 0x6, 0x401, 0x2, 0x1000, 0x8001, 0x1ff, 0xfffffffffffffff8, 0x0, 0x2, 0x0, @perf_config_ext={0x5, 0x8}, 0x1ab23, 0x3f, 0x8, 0x5, 0x6, 0x0, 0x6}, 0xffffffffffffffff, 0x10, r0, 0x1) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0xb, 0x9, &(0x7f0000000980)=ANY=[@ANYBLOB="18efee753e27e337320b94e100000000000000006fbedb09952279fbc073ede9c2f1b9ab5ce9ed1be9cdc77343b6da8da4c0cb6e14ec606f3f4e47ffff15912367a37b851976bb9984e9f6d2a1291034fbbcf703fdbb62bf2775900f2badbb50d93c624d716e8a7729a017b67ff58809d53c33b33fca5a86c22cbb6ccf223c3b3079f8209607bfcbfb474ec478a353ca47da0c1c9aec86496a29b36bba0c150000000000000000", @ANYRES32=r0, @ANYBLOB="0000000000000000fffc0100000000000000000000000000850000000600000000000000000000009500000000000000"], &(0x7f0000000600)='syzkaller\x00', 0x0, 0x30, &(0x7f0000000640)=""/48, 0x41f00, 0x1}, 0x48) ioctl$PERF_EVENT_IOC_SET_BPF(r2, 0x40042408, r3) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000000)={&(0x7f0000000080)='./file0/file0\x00', r0}, 0x10) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000400)=@ax25={0x3, {"02f47b3723e03d"}}, 0x80, &(0x7f00000017c0), 0x0, &(0x7f0000001840)=ANY=[], 0x0, 0x24004044}, 0x4008001) bpf$MAP_CREATE(0x0, &(0x7f0000002cc0)={0x5, 0x0, 0x56c96e7a, 0x2, 0xa, 0xffffffffffffffff, 0x9}, 0x2c) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000480)='rpc_pipefs\x00', 0x200000, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000002d00)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f00000004c0)='vmnet0keyring\x00') bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000780)={&(0x7f0000000740)='./file0/file0\x00', r4}, 0x10) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x40082406, &(0x7f0000000700)='proc!@ppp1!ppp0ppp0#)lo\\lolo{\x00') mount(&(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000200)='fuseblk\x00', 0xa11800, &(0x7f0000000240)) mount(&(0x7f00000002c0)='./file0/file0\x00', &(0x7f0000000300)='./file0/file0\x00', &(0x7f0000000340)='minix\x00', 0x1000, &(0x7f0000000380)) 2018/03/29 17:35:03 executing program 6: perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff7fffffffffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x1e, 0x4, 0x0) setsockopt$packet_tx_ring(r0, 0x10f, 0x87, &(0x7f00004ee000)=@req3={0x6000, 0x0, 0x1, 0x7ff}, 0x1c) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000040), 0x4) sendmsg$key(r0, &(0x7f00005af000)={0x0, 0x0, &(0x7f00003f1000)={&(0x7f00007b1000)={0x2, 0x0, 0x0, 0x0, 0xffffffffffffff26}, 0xffe2}, 0x1}, 0x0) 2018/03/29 17:35:03 executing program 4: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)={0xb, 0x7e, 0x3, 0x1, 0x11}, 0x2c) mount(&(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) r1 = socket$kcm(0x29, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000000bc0)={&(0x7f00000007c0)=@rc={0x1f, {0x5, 0x50000000, 0xaa2, 0x613, 0x4, 0x1ff}, 0x3f}, 0x80, &(0x7f0000000940)=[{&(0x7f0000000840)="09c9453aa30d8c5fba221fa2413f12c580837b2ae292e3ee8dd00098c404125a1a2e63840f82a2f69c3927af43b828422484aaeeceebcbe76e999bd3930c9b7c2995484407f9166e39c2069a88b63a980b9b5ffc880f4b89dde5adae6c7fb84ed98cbac860214dfb0b28d1b2e2d58aefebdfe515334f2ffa46be22ef7a4b3a276cb70a27c9e9f5de0a20bad24cbe2b89aee9693c2f8f186ea59fcfc4ebec7188cca0418d4583a6f1730f62416d70cd62555eb4f58ea831d1fea9956a2cba0049f23bf0b249f5de2ce0dc303808d70b0ccab3c7f37e949e", 0xd7}], 0x1, &(0x7f0000000980), 0x0, 0x20004805}, 0x4010) r2 = perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x2367, 0x7fff, 0x1, 0x6, 0x0, 0x78b1, 0x1, 0x0, 0x4992c766, 0xff, 0x81, 0x100, 0x40, 0x3, 0x9, 0x8, 0x1, 0x10000, 0x0, 0x6, 0x90e, 0x9, 0x7ff, 0x0, 0x8, 0x1, 0x30, 0x20, 0x7fffffff, 0x6, 0x401, 0x2, 0x1000, 0x8001, 0x1ff, 0xfffffffffffffff8, 0x0, 0x2, 0x0, @perf_config_ext={0x5, 0x8}, 0x1ab23, 0x3f, 0x8, 0x5, 0x6}, 0xffffffffffffffff, 0x10, r0, 0x1) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0xb, 0x7, &(0x7f0000000580)=@framed={{0x18}, [@map={0x18, 0x0, 0x1, 0x0, r0}, @call={0x85, 0x0, 0x0, 0x6}], {0x95}}, &(0x7f0000000600)='syzkaller\x00', 0x0, 0x30, &(0x7f0000000640)=""/48, 0x41f00, 0x1}, 0x48) ioctl$PERF_EVENT_IOC_SET_BPF(r2, 0x40042408, r3) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000000)={&(0x7f0000000080)='./file0/file0\x00', r0}, 0x10) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000400)=@ax25={0x3, {"02f47b3723e03d"}}, 0x80, &(0x7f00000017c0), 0x0, &(0x7f0000001840)=ANY=[], 0x0, 0x24004044}, 0x4008001) bpf$MAP_CREATE(0x0, &(0x7f0000002cc0)={0x5, 0x100, 0x56c96e7a, 0x2, 0xa, 0xffffffffffffffff, 0x9}, 0x2c) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000480)='rpc_pipefs\x00', 0x200000, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000002d00)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f00000004c0)='vmnet0keyring\x00') bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000780)={&(0x7f0000000740)='./file0/file0\x00', r4}, 0x10) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x40082406, &(0x7f0000000700)='proc!@ppp1!ppp0ppp0#)lo\\lolo{\x00') mount(&(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000200)='fuseblk\x00', 0xa11800, &(0x7f0000000240)) r5 = syz_open_dev$sg(&(0x7f0000000240)='/dev/sg#\x00', 0xfffffffffffffffa, 0x800) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000280)={r5, r3, 0x5, 0x1}, 0x10) ioctl$TIOCCONS(r5, 0x541d) mount(&(0x7f00000002c0)='./file0/file0\x00', &(0x7f0000000300)='./file0/file0\x00', &(0x7f0000000340)='minix\x00', 0x1000, &(0x7f0000000380)) 2018/03/29 17:35:03 executing program 2: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)={0xb, 0x7e, 0x3, 0x1, 0x11}, 0x2c) mount(&(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) r1 = socket$kcm(0x29, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000000bc0)={&(0x7f00000007c0)=@rc={0x1f, {0x5, 0x50000000, 0xaa2, 0x613, 0x4, 0x1ff}, 0x3f}, 0x80, &(0x7f0000000940)=[{&(0x7f0000000840)="09c9453aa30d8c5fba221fa2413f12c580837b2ae292e3ee8dd00098c404125a1a2e63840f82a2f69c3927af43b828422484aaeeceebcbe76e999bd3930c9b7c2995484407f9166e39c2069a88b63a980b9b5ffc880f4b89dde5adae6c7fb84ed98cbac860214dfb0b28d1b2e2d58aefebdfe515334f2ffa46be22ef7a4b3a276cb70a27c9e9f5de0a20bad24cbe2b89aee9693c2f8f186ea59fcfc4ebec7188cca0418d4583a6f1730f62416d70cd62555eb4f58ea831d1fea9956a2cba0049f23bf0b249f5de2ce0dc303808d70b0ccab3c7f37e949e", 0xd7}], 0x1, &(0x7f0000000980), 0x0, 0x20004805}, 0x4010) r2 = perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x2367, 0x7fff, 0x1, 0x6, 0x0, 0x78b1, 0x1, 0x0, 0x4992c766, 0xff, 0x81, 0x100, 0x40, 0x3, 0x9, 0x8, 0x1, 0x10000, 0x0, 0x6, 0x90e, 0x9, 0x7ff, 0x0, 0x8, 0x1, 0x30, 0x20, 0x7fffffff, 0x6, 0x401, 0x2, 0x1000, 0x8001, 0x1ff, 0xfffffffffffffff8, 0x0, 0x2, 0x0, @perf_config_ext={0x5, 0x8}, 0x1ab23, 0x0, 0x8, 0x5, 0x6, 0x0, 0x6}, 0xffffffffffffffff, 0x10, r0, 0x1) r3 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000d80)='/proc/sys/net/ipv4/vs/drop_packet\x00', 0x2, 0x0) ioctl$sock_bt_bnep_BNEPCONNADD(r3, 0x400442c8, &(0x7f0000000dc0)={r2, 0x7, 0x7fff, "ab715cf0bc495a77a38249647e6fa3327fbff29f5c8b8d8048bae035226fdc2b604bb4390c31f73091767e2049fee2989c08c505e580515b73393131a9e55d290f3cd8681099965c2e8dddcc7da091d34d0bda8ef111fb6d56c7cd72b616f4b4e02fd841907aa63da5e2c1788af6eb8e7dbc0bf8ea54f9b3759d29d81d9b83fd46f126b1f448df8f2720d94cea0ddc6fa3b3d33d7cd2700d193710b1ee202b5524231be26ca07fdb5b23c0f7fb7c1f60fe1b354a1ce4f2cdae43d161d261dafb890f403b3cb2efe57e12bd7d"}) bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0xb, 0x9, &(0x7f0000000580)=@framed={{0x18}, [@map={0x18, 0x0, 0x1, 0x0, r0}, @generic={0x3ff, 0xfffffffffffffffc, 0x1}, @call={0x85, 0x0, 0x0, 0x6}], {0x95}}, &(0x7f0000000600)='syzkaller\x00', 0x0, 0x30, &(0x7f0000000640)=""/48, 0x41f00, 0x1}, 0x48) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000000)={&(0x7f0000000080)='./file0/file0\x00', r0}, 0x10) mount(&(0x7f0000000b00)='./file0/file0\x00', &(0x7f0000000b40)='./file0\x00', &(0x7f0000000b80)='fuse\x00', 0x4000, &(0x7f0000000c00)="a74f1e5a3ef95ea45df85661591b1a0dfd64f018b2005748640860c721bc867943500091b508f977989df3e9d1645a19e2c467f9d7781757145e7e637664e90e4b8bb37a8b304ab516c49c59960081ef62945c478284a5df8c3e2a9b0fac15fa7b81a03685858ab5eaae1bac50a2402f2653f5e82e20922a26daba94f21877db2edb494bd14aefcee5027b8594756b6bfbf7ced0c9ea5d890d") sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000400)=@ax25={0x3, {"02f47b3723e03d"}}, 0x80, &(0x7f00000017c0), 0x0, &(0x7f0000001840)=ANY=[], 0x0, 0x24004044}, 0x4008001) bpf$MAP_CREATE(0x0, &(0x7f0000002cc0)={0x5, 0x0, 0x56c96e7a, 0x2, 0xa, 0xffffffffffffffff, 0x9}, 0x2c) ioctl$sock_inet_SIOCDELRT(r3, 0x890c, &(0x7f0000000f00)={0xfffffffffffffff7, {0x2, 0x4e20, @broadcast=0xffffffff}, {0x2, 0x4e22, @dev={0xac, 0x14, 0x14, 0xf}}, {0x2, 0x4e21, @loopback=0x7f000001}, 0x40, 0x6, 0x5, 0x9e3, 0x3, &(0x7f0000000ec0)='syzkaller1\x00', 0x7, 0x7, 0x1}) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000480)='rpc_pipefs\x00', 0x200000, 0x0) ioctl$sock_inet_SIOCSIFNETMASK(r1, 0x891c, &(0x7f0000000280)={'vcan0\x00', {0x2, 0x4e22, @broadcast=0xffffffff}}) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000002d00)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f00000004c0)='vmnet0keyring\x00') r5 = syz_open_dev$dspn(&(0x7f0000000cc0)='/dev/dsp#\x00', 0x1, 0x80) setsockopt$IP_VS_SO_SET_DELDEST(r5, 0x0, 0x488, &(0x7f0000000d00)={{0x3b, @dev={0xac, 0x14, 0x14, 0x12}, 0x4e20, 0x3, 'none\x00', 0x32, 0x1, 0x5e}, {@multicast2=0xe0000002, 0x4e21, 0x4, 0xffffffffffffffff, 0x100000000, 0x7}}, 0x44) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000780)={&(0x7f0000000740)='./file0/file0\x00', r4}, 0x10) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x40082406, &(0x7f0000000700)='proc!@ppp1!ppp0ppp0#)lo\\lolo{\x00') r6 = add_key$keyring(&(0x7f0000000980)='keyring\x00', &(0x7f00000009c0)={0x73, 0x79, 0x7a, 0x0}, 0x0, 0x0, 0xfffffffffffffffe) r7 = add_key$keyring(&(0x7f0000000a80)='keyring\x00', &(0x7f0000000ac0)={0x73, 0x79, 0x7a, 0x3}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$search(0xa, r6, &(0x7f0000000a00)='.dead\x00', &(0x7f0000000a40)={0x73, 0x79, 0x7a, 0x0}, r7) mount(&(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000200)='fuseblk\x00', 0xa11800, &(0x7f0000000240)) mkdir(&(0x7f0000000240)='./file0\x00', 0x10) mount(&(0x7f00000002c0)='./file0/file0\x00', &(0x7f0000000300)='./file0/file0\x00', &(0x7f0000000340)='minix\x00', 0x1000, &(0x7f0000000380)) 2018/03/29 17:35:03 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000490000)={0x2, 0x4e22, @loopback=0x7f000001}, 0x10) sendto$inet(r0, &(0x7f0000482000)="be", 0x1, 0x800000120000001, &(0x7f0000e45ff0)={0x2, 0x4e22, @loopback=0x7f000001}, 0x10) recvfrom(r0, &(0x7f0000000340)=""/48, 0x30, 0x123, &(0x7f0000000380)=@pppol2tpin6={0x18, 0x1, {0x0, r0, 0x1, 0x1, 0x2, 0x3, {0xa, 0x4e21, 0x1800000000000000, @mcast1={0xff, 0x1, [], 0x1}, 0x400}}}, 0x80) 2018/03/29 17:35:03 executing program 1: r0 = socket(0xa, 0x2, 0x0) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r1 = open(&(0x7f00004b8ff8)='./file0\x00', 0x28042, 0x0) connect$inet6(r0, &(0x7f0000d3cfe4)={0xa, 0x0, 0x0, @mcast2={0xff, 0x2, [], 0x1}, 0x3}, 0x1c) ioctl$DRM_IOCTL_ADD_CTX(r1, 0xc0086420, &(0x7f0000000000)={0x0}) ioctl$DRM_IOCTL_NEW_CTX(r1, 0x40086425, &(0x7f0000000080)={r2}) fallocate(r1, 0x0, 0xffff, 0x1f) setsockopt$inet6_mtu(r0, 0x29, 0x17, &(0x7f0000000100), 0x4) dup(0xffffffffffffffff) socketpair$inet_dccp(0x2, 0x6, 0x0, &(0x7f0000000240)) sendfile(r0, r1, &(0x7f00005faff8), 0xfffb) unlinkat(r0, &(0x7f0000000140)='./file0/file0\x00', 0x0) accept4$unix(0xffffffffffffffff, &(0x7f0000000180)=@abs, &(0x7f0000000200)=0x6e, 0x800) 2018/03/29 17:35:03 executing program 3: r0 = socket(0xa, 0x2, 0x0) r1 = open(&(0x7f00004b8ff8)='./file0\x00', 0x28042, 0x0) connect$inet6(r0, &(0x7f0000d3cfe4)={0xa, 0x0, 0x0, @mcast2={0xff, 0x2, [], 0x1}, 0x3}, 0x1c) ioctl$DRM_IOCTL_ADD_CTX(r1, 0xc0086420, &(0x7f0000000000)) ioctl$DRM_IOCTL_NEW_CTX(r1, 0x40086425, &(0x7f0000000080)={0x0, 0x3}) fallocate(r1, 0x0, 0xffff, 0x1f) setsockopt$inet6_mtu(0xffffffffffffffff, 0x29, 0x17, &(0x7f0000000100)=0x2, 0x4) connect$inet(r0, &(0x7f0000000040)={0x2, 0x4e22, @multicast1=0xe0000001}, 0x10) sendfile(r0, r1, &(0x7f00005faff8), 0xfffb) 2018/03/29 17:35:03 executing program 4: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)={0xb, 0x7e, 0x3, 0x1, 0x11}, 0x2c) mount(&(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) r1 = socket$kcm(0x29, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000000bc0)={&(0x7f00000007c0)=@rc={0x1f, {0x5, 0x50000000, 0xaa2, 0x613, 0x4, 0x1ff}, 0x3f}, 0x80, &(0x7f0000000940)=[{&(0x7f0000000840)="09c9453aa30d8c5fba221fa2413f12c580837b2ae292e3ee8dd00098c404125a1a2e63840f82a2f69c3927af43b828422484aaeeceebcbe76e999bd3930c9b7c2995484407f9166e39c2069a88b63a980b9b5ffc880f4b89dde5adae6c7fb84ed98cbac860214dfb0b28d1b2e2d58aefebdfe515334f2ffa46be22ef7a4b3a276cb70a27c9e9f5de0a20bad24cbe2b89aee9693c2f8f186ea59fcfc4ebec7188cca0418d4583a6f1730f62416d70cd62555eb4f58ea831d1fea9956a2cba0049f23bf0b249f5de2ce0dc303808d70b0ccab3c7f37e949e", 0xd7}], 0x1, &(0x7f0000000980), 0x0, 0x20004805}, 0x4010) r2 = perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x2367, 0x7fff, 0x1, 0x6, 0x0, 0x78b1, 0x1, 0x0, 0x4992c766, 0xff, 0x81, 0x100, 0x40, 0x3, 0x9, 0x8, 0x1, 0x10000, 0x0, 0x6, 0x90e, 0x9, 0x7ff, 0x0, 0x8, 0x1, 0x30, 0x20, 0x7fffffff, 0x6, 0x401, 0x2, 0x1000, 0x8001, 0x1ff, 0xfffffffffffffff8, 0x0, 0x2, 0x0, @perf_config_ext={0x5, 0x8}, 0x1ab23, 0x3f, 0x8, 0x5, 0x6}, 0xffffffffffffffff, 0x10, r0, 0x1) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0xb, 0x9, &(0x7f0000000580)=@framed={{0x18}, [@map={0x18, 0x0, 0x1, 0x0, r0}, @generic={0x0, 0xfffffffffffffffc, 0x1}, @call={0x85, 0x0, 0x0, 0x6}], {0x95}}, &(0x7f0000000600)='syzkaller\x00', 0x0, 0x30, &(0x7f0000000640)=""/48, 0x41f00, 0x1}, 0x48) ioctl$PERF_EVENT_IOC_SET_BPF(r2, 0x40042408, r3) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000000)={&(0x7f0000000080)='./file0/file0\x00', r0}, 0x10) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000400)=@ax25={0x3, {"02f47b3723e03d"}}, 0x80, &(0x7f00000017c0), 0x0, &(0x7f0000001840)=ANY=[], 0x0, 0x24004044}, 0x4008001) bpf$MAP_CREATE(0x0, &(0x7f0000002cc0)={0x5, 0x100, 0x56c96e7a, 0x2, 0xa, 0xffffffffffffffff, 0x9}, 0x2c) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000480)='rpc_pipefs\x00', 0x200000, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000002d00)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f00000004c0)='vmnet0keyring\x00') bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000780)={&(0x7f0000000740)='./file0/file0\x00', r4}, 0x10) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x40082406, &(0x7f0000000700)='proc!@ppp1!ppp0ppp0#)lo\\lolo{\x00') mount(&(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000200)='fuseblk\x00', 0xa11800, &(0x7f0000000240)) r5 = syz_open_dev$sg(&(0x7f0000000240)='/dev/sg#\x00', 0xfffffffffffffffa, 0x800) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000280)={r5, r3, 0x5, 0x1}, 0x10) ioctl$TIOCCONS(r5, 0x541d) mount(&(0x7f00000002c0)='./file0/file0\x00', &(0x7f0000000300)='./file0/file0\x00', &(0x7f0000000340)='minix\x00', 0x1000, &(0x7f0000000380)) 2018/03/29 17:35:03 executing program 0: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)={0xb, 0x7e, 0x3, 0x1, 0x11}, 0x2c) mount(&(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) r1 = socket$kcm(0x29, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000000bc0)={&(0x7f00000007c0)=@rc={0x1f, {0x5, 0x50000000, 0xaa2, 0x613, 0x4, 0x1ff}}, 0x80, &(0x7f0000000940)=[{&(0x7f0000000840)="09c9453aa30d8c5fba221fa2413f12c580837b2ae292e3ee8dd00098c404125a1a2e63840f82a2f69c3927af43b828422484aaeeceebcbe76e999bd3930c9b7c2995484407f9166e39c2069a88b63a980b9b5ffc880f4b89dde5adae6c7fb84ed98cbac860214dfb0b28d1b2e2d58aefebdfe515334f2ffa46be22ef7a4b3a276cb70a27c9e9f5de0a20bad24cbe2b89aee9693c2f8f186ea59fcfc4ebec7188cca0418d4583a6f1730f62416d70cd62555eb4f58ea831d1fea9956a2cba0049f23bf0b249f5de2ce0dc303808d70b0ccab3c7f37e949e", 0xd7}], 0x1, &(0x7f0000000980)}, 0x4010) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0xb, 0x9, &(0x7f0000000580)=@framed={{0x18}, [@map={0x18, 0x0, 0x1, 0x0, r0}, @generic={0x3ff, 0xfffffffffffffffc, 0x1}, @call={0x85, 0x0, 0x0, 0x6}], {0x95}}, &(0x7f0000000600)='syzkaller\x00', 0x0, 0x30, &(0x7f0000000640)=""/48, 0x41f00, 0x1}, 0x48) ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, r2) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000000)={&(0x7f0000000080)='./file0/file0\x00', r0}, 0x10) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000400)=@ax25={0x3, {"02f47b3723e03d"}}, 0x80, &(0x7f00000017c0), 0x0, &(0x7f0000001840)=ANY=[], 0x0, 0x24004044}, 0x4008001) bpf$MAP_CREATE(0x0, &(0x7f0000002cc0)={0x5, 0x100, 0x56c96e7a, 0x2, 0xa, 0xffffffffffffffff, 0x9}, 0x2c) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000480)='rpc_pipefs\x00', 0x200000, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000002d00)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f00000004c0)='vmnet0keyring\x00') bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000780)={&(0x7f0000000740)='./file0/file0\x00', r3}, 0x10) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, &(0x7f0000000700)='proc!@ppp1!ppp0ppp0#)lo\\lolo{\x00') r4 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000240)='/dev/sequencer\x00', 0x2c242, 0x0) ioctl$KVM_ASSIGN_SET_INTX_MASK(r1, 0x4040aea4, &(0x7f0000000500)={0x200000, 0x7, 0x80000000000005, 0x2, 0x1}) setsockopt$IP_VS_SO_SET_ADD(r4, 0x0, 0x482, &(0x7f0000000280)={0x78, @empty, 0x4e22, 0x4, 'lblcr\x00', 0x21, 0x1, 0x400000000011}, 0xfffffffffffffdaa) mount(&(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000200)='fuseblk\x00', 0xa11800, &(0x7f0000000240)) ioctl$KVM_CHECK_EXTENSION_VM(r4, 0xae03, 0x62a2) mount(&(0x7f00000002c0)='./file0/file0\x00', &(0x7f0000000300)='./file0/file0\x00', &(0x7f0000000340)='minix\x00', 0x0, &(0x7f0000000380)) 2018/03/29 17:35:03 executing program 6: r0 = open(&(0x7f0000000440)='./file0\x00', 0x1ffff, 0x5) ioctl$TIOCLINUX7(0xffffffffffffffff, 0x541c, &(0x7f0000000080)={0x7}) setsockopt$inet_tcp_int(r0, 0x6, 0x0, &(0x7f00000003c0)=0x6, 0xf4) perf_event_open(&(0x7f0000000240)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000180)='/dev/sequencer2\x00', 0x12100, 0x0) clock_gettime(0x0, &(0x7f00000001c0)={0x0, 0x0}) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r1, 0x4040534e, &(0x7f0000000340)={0x124, @time={r2, r3+30000000}, 0x1, {0x8}, 0x101, 0x2}) r4 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000040)='/dev/rtc\x00', 0x0, 0x0) r5 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000580)='/dev/sequencer\x00', 0x0, 0x0) ioctl$LOOP_CLR_FD(r4, 0x7003) getsockopt$inet_sctp_SCTP_FRAGMENT_INTERLEAVE(0xffffffffffffffff, 0x84, 0x12, &(0x7f0000000140), &(0x7f00000002c0)=0x4) setsockopt$packet_buf(0xffffffffffffffff, 0x107, 0xd, &(0x7f00000004c0)="d9fb4f1bcfd3e0c1355ea2018b25a4fd911d8abc3f3fd71f4749878ac1fbce6e5d188e078b15be141905d7966406e4f3fb021da63028837a8407bcb3e3a676d251bcd09a04964ed9cd0f6cece267dc4bada0403dcef25dace8875f4a6495eb2e6cc4969e7de83153459b4d61669ed9eb7567", 0x72) perf_event_open(&(0x7f00000000c0)={0x0, 0x70, 0x0, 0x0, 0x7ff, 0xa1, 0x0, 0x1, 0x200, 0x2, 0x5, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x1, 0x4, 0xb0, 0x5, 0x0, 0x0, 0xcf, 0x0, 0x0, 0x100000000, 0x3ff, 0x0, 0x0, 0x2, 0x1f, 0x2, 0x5, 0x9, 0x3, 0x0, 0x4, 0x0, 0x20000000, 0x195d678803a3a953, @perf_config_ext={0x9, 0x5}, 0x10, 0x3, 0x8, 0x0, 0x72eb, 0x99, 0x1}, 0x0, 0xd, r4, 0x8) mq_notify(r5, &(0x7f0000000400)) execve(&(0x7f0000000200)='./file0\x00', &(0x7f0000000680)=[&(0x7f0000000600)='\x00', &(0x7f0000000640)='proc\x00'], &(0x7f0000000740)=[&(0x7f00000006c0)='\'\x00', &(0x7f0000000700)='trustedwlan0vmnet0@%\x00']) 2018/03/29 17:35:03 executing program 2: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)={0xb, 0x7e, 0x3, 0x1, 0x11}, 0x2c) mount(&(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) r1 = socket$kcm(0x29, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000000bc0)={&(0x7f00000007c0)=@rc={0x1f, {0x5, 0x50000000, 0xaa2, 0x613, 0x4, 0x1ff}, 0x3f}, 0x80, &(0x7f0000000940)=[{&(0x7f0000000840)="09c9453aa30d8c5fba221fa2413f12c580837b2ae292e3ee8dd00098c404125a1a2e63840f82a2f69c3927af43b828422484aaeeceebcbe76e999bd3930c9b7c2995484407f9166e39c2069a88b63a980b9b5ffc880f4b89dde5adae6c7fb84ed98cbac860214dfb0b28d1b2e2d58aefebdfe515334f2ffa46be22ef7a4b3a276cb70a27c9e9f5de0a20bad24cbe2b89aee9693c2f8f186ea59fcfc4ebec7188cca0418d4583a6f1730f62416d70cd62555eb4f58ea831d1fea9956a2cba0049f23bf0b249f5de2ce0dc303808d70b0ccab3c7f37e949e", 0xd7}], 0x1, &(0x7f0000000980), 0x0, 0x20004805}, 0x4010) r2 = perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x2367, 0x7fff, 0x1, 0x6, 0x0, 0x78b1, 0x1, 0x0, 0x4992c766, 0xff, 0x81, 0x100, 0x40, 0x3, 0x9, 0x8, 0x1, 0x10000, 0x0, 0x6, 0x90e, 0x9, 0x7ff, 0x0, 0x8, 0x1, 0x30, 0x20, 0x7fffffff, 0x6, 0x401, 0x2, 0x1000, 0x8001, 0x1ff, 0xfffffffffffffff8, 0x0, 0x2, 0x0, @perf_config_ext={0x5, 0x8}, 0x1ab23, 0x0, 0x8, 0x5, 0x6, 0x0, 0x6}, 0xffffffffffffffff, 0x10, r0, 0x1) bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0xb, 0x9, &(0x7f0000000580)=@framed={{0x18}, [@map={0x18, 0x0, 0x1, 0x0, r0}, @generic={0x3ff, 0xfffffffffffffffc, 0x1}, @call={0x85, 0x0, 0x0, 0x6}], {0x95}}, &(0x7f0000000600)='syzkaller\x00', 0x0, 0x30, &(0x7f0000000640)=""/48, 0x41f00, 0x1}, 0x48) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000000)={&(0x7f0000000080)='./file0/file0\x00', r0}, 0x10) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000400)=@ax25={0x3, {"02f47b3723e03d"}}, 0x80, &(0x7f00000017c0), 0x0, &(0x7f0000001840)=ANY=[], 0x0, 0x24004044}, 0x4008001) bpf$MAP_CREATE(0x0, &(0x7f0000002cc0)={0x5, 0x0, 0x56c96e7a, 0x2, 0xa, 0xffffffffffffffff, 0x9}, 0x2c) socketpair$ipx(0x4, 0x2, 0x0, &(0x7f0000000240)) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000480)='rpc_pipefs\x00', 0x200000, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000002d00)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f00000004c0)='vmnet0keyring\x00') bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000780)={&(0x7f0000000740)='./file0/file0\x00', r3}, 0x10) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x40082406, &(0x7f0000000700)='proc!@ppp1!ppp0ppp0#)lo\\lolo{\x00') mount(&(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000200)='fuseblk\x00', 0xa11800, &(0x7f0000000240)) mount(&(0x7f00000002c0)='./file0/file0\x00', &(0x7f0000000300)='./file0/file0\x00', &(0x7f0000000340)='minix\x00', 0x1000, &(0x7f0000000380)) 2018/03/29 17:35:03 executing program 5: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000ed4000)=0x78, 0x4) bind$inet(r0, &(0x7f0000deb000)={0x2, 0x4e23, @multicast1=0xe0000001}, 0x10) ioctl$sock_SIOCINQ(r0, 0x541b, &(0x7f0000000500)) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000f40ff8)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) setsockopt$inet_sctp_SCTP_RTOINFO(r0, 0x84, 0x0, &(0x7f0000000040)={0x0, 0x81, 0x0, 0x100000000}, 0x10) getsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(r0, 0x84, 0x18, &(0x7f00000003c0)={0x0, 0x7}, &(0x7f0000000400)=0x8) socketpair(0x11, 0x0, 0x5, &(0x7f0000000200)={0xffffffffffffffff}) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_INFO(r1, 0xc08c5334, &(0x7f0000000600)={0x0, 0x7, 0x2f29fdaf, 'queue0\x00', 0x800}) r2 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000080)='/dev/hwrng\x00', 0x4000, 0x0) sendto$inet(r0, &(0x7f0000a88f88), 0x29f, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @loopback=0x7f000001}, 0x10) pipe2(&(0x7f0000000580)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80002) ioctl$EVIOCGBITKEY(0xffffffffffffffff, 0x80404521, &(0x7f00000000c0)=""/160) sendmmsg(r0, &(0x7f00000025c0)=[{{&(0x7f0000000300)=@pppoe={0x18, 0x0, {0x0, @link_local={0x1, 0x80, 0xc2}, 'ip6tnl0\x00'}}, 0x80, &(0x7f0000000380)=[{&(0x7f00000010c0)="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", 0x598}], 0x1}}], 0x1, 0x4000) recvfrom$inet(r0, &(0x7f00009be000)=""/11, 0xe8, 0x0, 0x0, 0xffffffffffffff4e) bind$bt_l2cap(r3, &(0x7f0000000440)={0x1f, 0x8, {0x6, 0x400, 0x0, 0x2, 0x9, 0x3}, 0x10001, 0x2}, 0xe) setsockopt(r4, 0xb5, 0xffffffff, &(0x7f00000006c0), 0x0) getsockopt$inet_sctp_SCTP_RECVRCVINFO(r0, 0x84, 0x20, &(0x7f0000000180), &(0x7f00000001c0)=0x4) fcntl$getflags(r0, 0x3) sendmsg$netrom(r2, &(0x7f0000000b00)={&(0x7f0000000780)=@full={{0x3, {"53665db4283e1b"}, 0x3}, [{"d40335b6bcd5d9"}, {"d5952336c520fb"}, {"d326c92416d6ea"}, {"763aea9242214f"}, {"d716c11982a583"}, {"712de86f857435"}, {"1d8bd63f2c431c"}, {"6f5a0b1522aca6"}]}, 0x48, &(0x7f0000000ac0), 0x0, &(0x7f00000017c0), 0x0, 0x8000}, 0x4000840) setsockopt$inet_mtu(r2, 0x0, 0xa, &(0x7f0000000480)=0x7, 0x4) r5 = getpid() epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, r2, &(0x7f00000004c0)={0x5}) syz_open_procfs(r5, &(0x7f00000005c0)='maps\x00') shutdown(r0, 0x1) 2018/03/29 17:35:03 executing program 7: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)={0xb, 0x7e, 0x3, 0x1, 0x11}, 0x2c) mount(&(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) r1 = socket$kcm(0x29, 0x2, 0x0) r2 = getpgrp(0x0) ptrace$getenv(0x4201, r2, 0x9, &(0x7f00000009c0)) sendmsg$kcm(r1, &(0x7f0000000bc0)={&(0x7f00000007c0)=@rc={0x1f, {0x5, 0x50000000, 0xaa2, 0x613, 0x4, 0x1ff}, 0x3f}, 0x80, &(0x7f0000000940)=[{&(0x7f0000000840)="09c9453aa30d8c5fba221fa2413f12c580837b2ae292e3ee8dd00098c404125a1a2e63840f82a2f69c3927af43b828422484aaeeceebcbe76e999bd3930c9b7c2995484407f9166e39c2069a88b63a980b9b5ffc880f4b89dde5adae6c7fb84ed98cbac860214dfb0b28d1b2e2d58aefebdfe515334f2ffa46be22ef7a4b3a276cb70a27c9e9f5de0a20bad24cbe2b89aee9693c2f8f186ea59fcfc4ebec7188cca0418d4583a6f1730f62416d70cd62555eb4f58ea831d1fea9956a2cba0049f23bf0b249f5de2ce0dc303808d70b0ccab3c7f37e949e", 0xd7}], 0x1, &(0x7f0000000980), 0x0, 0x20004805}, 0x4010) r3 = perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x2367, 0x7fff, 0x1, 0x6, 0x0, 0x78b1, 0x1, 0x0, 0x4992c766, 0xff, 0x81, 0x100, 0x40, 0x3, 0x9, 0x8, 0x1, 0x10000, 0x0, 0x6, 0x90e, 0x9, 0x7ff, 0x0, 0x8, 0x1, 0x30, 0x20, 0x7fffffff, 0x6, 0x401, 0x2, 0x1000, 0x8001, 0x1ff, 0xfffffffffffffff8, 0x0, 0x2, 0x0, @perf_config_ext={0x5, 0x8}, 0x1ab23, 0x3f, 0x8, 0x5, 0x6, 0x0, 0x6}, 0xffffffffffffffff, 0x10, r0, 0x1) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0xb, 0x9, &(0x7f0000000580)=@framed={{0x18}, [@map={0x18, 0x0, 0x1, 0x0, r0}, @generic={0x3ff, 0xfffffffffffffffc, 0x1}, @call={0x85, 0x0, 0x0, 0x6}], {0x95}}, &(0x7f0000000600)='syzkaller\x00', 0x0, 0x30, &(0x7f0000000640)=""/48, 0x41f00, 0x1}, 0x48) ioctl$PERF_EVENT_IOC_SET_BPF(r3, 0x40042408, r4) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000280)={&(0x7f0000000240)='./file0/file0\x00', r0}, 0x8b) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000400)=@ax25={0x3, {"02f47b3723e03d"}}, 0x80, &(0x7f00000017c0), 0x0, &(0x7f0000001840)=ANY=[], 0x0, 0x24004044}, 0x4008001) bpf$MAP_CREATE(0x0, &(0x7f0000002cc0)={0x5, 0x0, 0x56c96e7a, 0x2, 0xa, 0xffffffffffffffff, 0x9}, 0x2c) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000480)='rpc_pipefs\x00', 0x200000, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000002d00)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f00000004c0)='vmnet0keyring\x00') bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000780)={&(0x7f0000000740)='./file0/file0\x00', r5}, 0x10) link(&(0x7f0000000000)='./file0\x00', &(0x7f0000000980)='./file0/file0\x00') ioctl$PERF_EVENT_IOC_SET_FILTER(r3, 0x40082406, &(0x7f0000000700)='proc!@ppp1!ppp0ppp0#)lo\\lolo{\x00') mount(&(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000200)='fuseblk\x00', 0xa11800, &(0x7f0000000240)) mount(&(0x7f00000002c0)='./file0/file0\x00', &(0x7f0000000300)='./file0/file0\x00', &(0x7f0000000340)='minix\x00', 0x1000, &(0x7f0000000380)) 2018/03/29 17:35:03 executing program 1: 2018/03/29 17:35:03 executing program 4: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)={0xb, 0x7e, 0x3, 0x1, 0x11}, 0x2c) mount(&(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) r1 = socket$kcm(0x29, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000000bc0)={&(0x7f00000007c0)=@rc={0x1f, {0x5, 0x50000000, 0xaa2, 0x613, 0x4, 0x1ff}, 0x3f}, 0x80, &(0x7f0000000940)=[{&(0x7f0000000840)="09c9453aa30d8c5fba221fa2413f12c580837b2ae292e3ee8dd00098c404125a1a2e63840f82a2f69c3927af43b828422484aaeeceebcbe76e999bd3930c9b7c2995484407f9166e39c2069a88b63a980b9b5ffc880f4b89dde5adae6c7fb84ed98cbac860214dfb0b28d1b2e2d58aefebdfe515334f2ffa46be22ef7a4b3a276cb70a27c9e9f5de0a20bad24cbe2b89aee9693c2f8f186ea59fcfc4ebec7188cca0418d4583a6f1730f62416d70cd62555eb4f58ea831d1fea9956a2cba0049f23bf0b249f5de2ce0dc303808d70b0ccab3c7f37e949e", 0xd7}], 0x1, &(0x7f0000000980), 0x0, 0x20004805}, 0x4010) r2 = perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x2367, 0x7fff, 0x1, 0x6, 0x0, 0x78b1, 0x1, 0x0, 0x4992c766, 0xff, 0x81, 0x100, 0x40, 0x3, 0x9, 0x8, 0x1, 0x10000, 0x0, 0x6, 0x90e, 0x9, 0x7ff, 0x0, 0x8, 0x1, 0x30, 0x20, 0x7fffffff, 0x6, 0x401, 0x2, 0x1000, 0x8001, 0x1ff, 0xfffffffffffffff8, 0x0, 0x2, 0x0, @perf_config_ext={0x5, 0x8}, 0x1ab23, 0x3f, 0x8, 0x5, 0x6}, 0xffffffffffffffff, 0x10, r0, 0x1) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0xb, 0x9, &(0x7f0000000580)=@framed={{0x18}, [@map={0x18, 0x0, 0x1, 0x0, r0}, @generic={0x0, 0xfffffffffffffffc, 0x1}, @call={0x85, 0x0, 0x0, 0x6}], {0x95}}, &(0x7f0000000600)='syzkaller\x00', 0x0, 0x30, &(0x7f0000000640)=""/48, 0x41f00, 0x1}, 0x48) ioctl$PERF_EVENT_IOC_SET_BPF(r2, 0x40042408, r3) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000000)={&(0x7f0000000080)='./file0/file0\x00', r0}, 0x10) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000400)=@ax25={0x3, {"02f47b3723e03d"}}, 0x80, &(0x7f00000017c0), 0x0, &(0x7f0000001840)=ANY=[], 0x0, 0x24004044}, 0x4008001) bpf$MAP_CREATE(0x0, &(0x7f0000002cc0)={0x5, 0x100, 0x56c96e7a, 0x2, 0xa, 0xffffffffffffffff, 0x9}, 0x2c) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000480)='rpc_pipefs\x00', 0x200000, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000002d00)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f00000004c0)='vmnet0keyring\x00') bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000780)={&(0x7f0000000740)='./file0/file0\x00', r4}, 0x10) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x40082406, &(0x7f0000000700)='proc!@ppp1!ppp0ppp0#)lo\\lolo{\x00') mount(&(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000200)='fuseblk\x00', 0xa11800, &(0x7f0000000240)) r5 = syz_open_dev$sg(&(0x7f0000000240)='/dev/sg#\x00', 0xfffffffffffffffa, 0x800) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000280)={r5, r3, 0x5, 0x1}, 0x10) ioctl$TIOCCONS(r5, 0x541d) mount(&(0x7f00000002c0)='./file0/file0\x00', &(0x7f0000000300)='./file0/file0\x00', &(0x7f0000000340)='minix\x00', 0x1000, &(0x7f0000000380)) 2018/03/29 17:35:03 executing program 6: 2018/03/29 17:35:03 executing program 7: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)={0xb, 0x7e, 0x3, 0x1, 0x11}, 0x2c) mount(&(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) r1 = socket$kcm(0x29, 0x4002, 0x0) sendmsg$kcm(r1, &(0x7f0000000bc0)={&(0x7f00000007c0)=@rc={0x1f, {0x5, 0x50000000, 0xaa2, 0x613, 0x4, 0x1ff}, 0x3f}, 0x80, &(0x7f0000000940)=[{&(0x7f0000000840)="09c9453aa30d8c5fba221fa2413f12c580837b2ae292e3ee8dd00098c404125a1a2e63840f82a2f69c3927af43b828422484aaeeceebcbe76e999bd3930c9b7c2995484407f9166e39c2069a88b63a980b9b5ffc880f4b89dde5adae6c7fb84ed98cbac860214dfb0b28d1b2e2d58aefebdfe515334f2ffa46be22ef7a4b3a276cb70a27c9e9f5de0a20bad24cbe2b89aee9693c2f8f186ea59fcfc4ebec7188cca0418d4583a6f1730f62416d70cd62555eb4f58ea831d1fea9956a2cba0049f23bf0b249f5de2ce0dc303808d70b0ccab3c7f37e949e", 0xd7}], 0x1, &(0x7f0000000980), 0x0, 0x20004805}, 0x4010) r2 = perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x2367, 0x7fff, 0x1, 0x6, 0x0, 0x78b1, 0x1, 0x0, 0x4992c766, 0xff, 0x81, 0x100, 0x40, 0x3, 0x9, 0x8, 0x1, 0x10000, 0x0, 0x6, 0x90e, 0x9, 0x7ff, 0x0, 0x8, 0x1, 0x30, 0x20, 0x7fffffff, 0x6, 0x401, 0x2, 0x1000, 0x8001, 0x1ff, 0xfffffffffffffff8, 0x0, 0x2, 0x0, @perf_config_ext={0x5, 0x8}, 0x1ab23, 0x3f, 0x8, 0x5, 0x6, 0x0, 0x6}, 0xffffffffffffffff, 0x10, r0, 0x1) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0xb, 0x9, &(0x7f0000000580)=@framed={{0x18}, [@map={0x18, 0x0, 0x1, 0x0, r0}, @generic={0x3ff, 0xfffffffffffffffc, 0x1}, @call={0x85, 0x0, 0x0, 0x6}], {0x95}}, &(0x7f0000000600)='syzkaller\x00', 0x0, 0x30, &(0x7f0000000640)=""/48, 0x41f00, 0x1}, 0x48) ioctl$PERF_EVENT_IOC_SET_BPF(r2, 0x40042408, r3) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000000)={&(0x7f0000000280)='./file0/file0\x00', r0}, 0x10) ioctl$PERF_EVENT_IOC_RESET(r2, 0x2403, 0xffffffffffffffff) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000400)=@ax25={0x3, {"02f47b3723e03d"}}, 0x80, &(0x7f00000017c0), 0x0, &(0x7f0000001840)=ANY=[], 0x0, 0x24004044}, 0x4008001) bpf$MAP_CREATE(0x0, &(0x7f0000002cc0)={0x5, 0x0, 0x56c96e7a, 0x2, 0xa, 0xffffffffffffffff, 0x9}, 0x2c) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000480)='rpc_pipefs\x00', 0x200000, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x40082406, &(0x7f0000000240)='fuseblk\x00') socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000002d00)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f00000004c0)='vmnet0keyring\x00') bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000780)={&(0x7f0000000740)='./file0/file0\x00', r4}, 0x10) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x40082406, &(0x7f0000000700)='proc!@ppp1!ppp0ppp0#)lo\\lolo{\x00') mount(&(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000200)='fuseblk\x00', 0xa11800, &(0x7f0000000240)) open$dir(&(0x7f0000000980)='./file0\x00', 0x0, 0x100) mount(&(0x7f00000002c0)='./file0/file0\x00', &(0x7f0000000300)='./file0/file0\x00', &(0x7f0000000340)='minix\x00', 0x1000, &(0x7f0000000380)) 2018/03/29 17:35:03 executing program 0: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)={0xb, 0x7e, 0x3, 0x1, 0x11}, 0x2c) mount(&(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) r1 = socket$kcm(0x29, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000000bc0)={&(0x7f00000007c0)=@rc={0x1f, {0x5, 0x50000000, 0xaa2, 0x613, 0x4, 0x1ff}}, 0x80, &(0x7f0000000940)=[{&(0x7f0000000840)="09c9453aa30d8c5fba221fa2413f12c580837b2ae292e3ee8dd00098c404125a1a2e63840f82a2f69c3927af43b828422484aaeeceebcbe76e999bd3930c9b7c2995484407f9166e39c2069a88b63a980b9b5ffc880f4b89dde5adae6c7fb84ed98cbac860214dfb0b28d1b2e2d58aefebdfe515334f2ffa46be22ef7a4b3a276cb70a27c9e9f5de0a20bad24cbe2b89aee9693c2f8f186ea59fcfc4ebec7188cca0418d4583a6f1730f62416d70cd62555eb4f58ea831d1fea9956a2cba0049f23bf0b249f5de2ce0dc303808d70b0ccab3c7f37e949e", 0xd7}], 0x1, &(0x7f0000000980)}, 0x4010) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0xb, 0x9, &(0x7f0000000580)=ANY=[@ANYBLOB="1800000000000000000000000000000018100000", @ANYRES32=r0, @ANYBLOB="00000000e7920000fffc0100000000000000000000000000850000000600000000000000000000009500000000000000"], &(0x7f0000000600)='syzkaller\x00', 0x0, 0x30, &(0x7f0000000640)=""/48, 0x41f00, 0x1}, 0x48) ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, r2) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000000)={&(0x7f0000000080)='./file0/file0\x00', r0}, 0x10) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000400)=@ax25={0x3, {"02f47b3723e03d"}}, 0x80, &(0x7f00000017c0), 0x0, &(0x7f0000001840)=ANY=[], 0x0, 0x24004044}, 0x4008001) bpf$MAP_CREATE(0x0, &(0x7f0000002cc0)={0x5, 0x100, 0x56c96e7a, 0x2, 0xa, 0xffffffffffffffff, 0x9}, 0x2c) r3 = msgget$private(0x0, 0x245) msgrcv(r3, &(0x7f0000000500)={0x0, ""/105}, 0x71, 0x3, 0x0) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000480)='rpc_pipefs\x00', 0x200000, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000002d00)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f00000004c0)='vmnet0keyring\x00') bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000780)={&(0x7f0000000740)='./file0/file0\x00', r4}, 0x10) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, &(0x7f0000000700)='proc!@ppp1!ppp0ppp0#)lo\\lolo{\x00') mount(&(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000200)='fuseblk\x00', 0xa11800, &(0x7f0000000240)) mkdir(&(0x7f0000000240)='./file0\x00', 0x2) mount(&(0x7f00000002c0)='./file0/file0\x00', &(0x7f0000000300)='./file0/file0\x00', &(0x7f0000000340)='minix\x00', 0x0, &(0x7f0000000380)) 2018/03/29 17:35:03 executing program 6: 2018/03/29 17:35:03 executing program 1: 2018/03/29 17:35:03 executing program 3: r0 = socket(0xa, 0x2, 0x0) r1 = open(&(0x7f00004b8ff8)='./file0\x00', 0x28042, 0x0) connect$inet6(r0, &(0x7f0000d3cfe4)={0xa, 0x0, 0x0, @mcast2={0xff, 0x2, [], 0x1}, 0x3}, 0x1c) ioctl$DRM_IOCTL_ADD_CTX(r1, 0xc0086420, &(0x7f0000000000)) ioctl$DRM_IOCTL_NEW_CTX(r1, 0x40086425, &(0x7f0000000080)={0x0, 0x3}) fallocate(r1, 0x0, 0xffff, 0x1f) setsockopt$inet6_mtu(r0, 0x29, 0x17, &(0x7f0000000100)=0x4, 0xfffffffffffffd09) syz_open_dev$mice(&(0x7f0000000140)='/dev/input/mice\x00', 0x0, 0x400002) connect$inet(r0, &(0x7f0000000040)={0x2, 0x4e22, @multicast1=0xe0000001}, 0x10) sendfile(r0, r1, &(0x7f00005faff8), 0xfffb) setsockopt$inet6_opts(r1, 0x29, 0x3f, &(0x7f00000000c0)=@fragment={0x2e, 0x0, 0x1, 0x94e5, 0x0, 0x10001, 0x67}, 0x8) 2018/03/29 17:35:03 executing program 6: 2018/03/29 17:35:03 executing program 1: 2018/03/29 17:35:03 executing program 6: 2018/03/29 17:35:03 executing program 4: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)={0xb, 0x7e, 0x3, 0x1, 0x11}, 0x2c) mount(&(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) r1 = socket$kcm(0x29, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000000bc0)={&(0x7f00000007c0)=@rc={0x1f, {0x5, 0x50000000, 0xaa2, 0x613, 0x4, 0x1ff}, 0x3f}, 0x80, &(0x7f0000000940)=[{&(0x7f0000000840)="09c9453aa30d8c5fba221fa2413f12c580837b2ae292e3ee8dd00098c404125a1a2e63840f82a2f69c3927af43b828422484aaeeceebcbe76e999bd3930c9b7c2995484407f9166e39c2069a88b63a980b9b5ffc880f4b89dde5adae6c7fb84ed98cbac860214dfb0b28d1b2e2d58aefebdfe515334f2ffa46be22ef7a4b3a276cb70a27c9e9f5de0a20bad24cbe2b89aee9693c2f8f186ea59fcfc4ebec7188cca0418d4583a6f1730f62416d70cd62555eb4f58ea831d1fea9956a2cba0049f23bf0b249f5de2ce0dc303808d70b0ccab3c7f37e949e", 0xd7}], 0x1, &(0x7f0000000980), 0x0, 0x20004805}, 0x4010) r2 = perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x2367, 0x7fff, 0x1, 0x6, 0x0, 0x78b1, 0x1, 0x0, 0x4992c766, 0xff, 0x81, 0x100, 0x40, 0x3, 0x9, 0x8, 0x1, 0x10000, 0x0, 0x6, 0x90e, 0x9, 0x7ff, 0x0, 0x8, 0x1, 0x30, 0x20, 0x7fffffff, 0x6, 0x401, 0x2, 0x1000, 0x8001, 0x1ff, 0xfffffffffffffff8, 0x0, 0x2, 0x0, @perf_config_ext={0x5, 0x8}, 0x1ab23, 0x3f, 0x8, 0x5, 0x6}, 0xffffffffffffffff, 0x10, r0, 0x1) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0xb, 0x9, &(0x7f0000000580)=@framed={{0x18}, [@map={0x18, 0x0, 0x1, 0x0, r0}, @generic={0x0, 0xfffffffffffffffc, 0x1}, @call={0x85, 0x0, 0x0, 0x6}], {0x95}}, &(0x7f0000000600)='syzkaller\x00', 0x0, 0x30, &(0x7f0000000640)=""/48, 0x41f00, 0x1}, 0x48) ioctl$PERF_EVENT_IOC_SET_BPF(r2, 0x40042408, r3) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000000)={&(0x7f0000000080)='./file0/file0\x00', r0}, 0x10) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000400)=@ax25={0x3, {"02f47b3723e03d"}}, 0x80, &(0x7f00000017c0), 0x0, &(0x7f0000001840)=ANY=[], 0x0, 0x24004044}, 0x4008001) bpf$MAP_CREATE(0x0, &(0x7f0000002cc0)={0x5, 0x100, 0x56c96e7a, 0x2, 0xa, 0xffffffffffffffff, 0x9}, 0x2c) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000480)='rpc_pipefs\x00', 0x200000, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000002d00)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f00000004c0)='vmnet0keyring\x00') bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000780)={&(0x7f0000000740)='./file0/file0\x00', r4}, 0x10) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x40082406, &(0x7f0000000700)='proc!@ppp1!ppp0ppp0#)lo\\lolo{\x00') mount(&(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000200)='fuseblk\x00', 0xa11800, &(0x7f0000000240)) r5 = syz_open_dev$sg(&(0x7f0000000240)='/dev/sg#\x00', 0xfffffffffffffffa, 0x800) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000280)={r5, r3, 0x5, 0x1}, 0x10) ioctl$TIOCCONS(r5, 0x541d) mount(&(0x7f00000002c0)='./file0/file0\x00', &(0x7f0000000300)='./file0/file0\x00', &(0x7f0000000340)='minix\x00', 0x1000, &(0x7f0000000380)) 2018/03/29 17:35:03 executing program 5: 2018/03/29 17:35:03 executing program 7: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)={0xb, 0x7e, 0x3, 0x1, 0x11}, 0x2c) mount(&(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) r1 = socket$kcm(0x29, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000000bc0)={&(0x7f00000007c0)=@rc={0x1f, {0x5, 0x50000000, 0xaa2, 0x613, 0x4, 0x1ff}, 0x3f}, 0x80, &(0x7f0000000940)=[{&(0x7f0000000840)="09c9453aa30d8c5fba221fa2413f12c580837b2ae292e3ee8dd00098c404125a1a2e63840f82a2f69c3927af43b828422484aaeeceebcbe76e999bd3930c9b7c2995484407f9166e39c2069a88b63a980b9b5ffc880f4b89dde5adae6c7fb84ed98cbac860214dfb0b28d1b2e2d58aefebdfe515334f2ffa46be22ef7a4b3a276cb70a27c9e9f5de0a20bad24cbe2b89aee9693c2f8f186ea59fcfc4ebec7188cca0418d4583a6f1730f62416d70cd62555eb4f58ea831d1fea9956a2cba0049f23bf0b249f5de2ce0dc303808d70b0ccab3c7f37e949e", 0xd7}], 0x1, &(0x7f0000000980), 0x0, 0x20004805}, 0x4010) r2 = perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x2367, 0x7fff, 0x1, 0x6, 0x0, 0x78b1, 0x1, 0x0, 0x4992c766, 0xff, 0x81, 0x100, 0x40, 0x3, 0x9, 0x8, 0x1, 0x10000, 0x0, 0x6, 0x90e, 0x9, 0x7ff, 0x0, 0x8, 0x1, 0x30, 0x20, 0x7fffffff, 0x6, 0x401, 0x2, 0x1000, 0x8001, 0x1ff, 0xfffffffffffffff8, 0x0, 0x2, 0x0, @perf_config_ext={0x5, 0x8}, 0x1ab23, 0x3f, 0x8, 0x5, 0x6, 0x0, 0x6}, 0xffffffffffffffff, 0x10, r0, 0x1) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0xb, 0x9, &(0x7f0000000580)=ANY=[@ANYBLOB="8bc25826661a02d5a2eb34445a2fc69218000000", @ANYRES32=r0, @ANYBLOB="0000000000000000fffc0100000000000000000000000000850000000600000000000000000000009500000000000000"], &(0x7f0000000600)='syzkaller\x00', 0x0, 0x30, &(0x7f0000000640)=""/48, 0x41f00, 0x1}, 0x48) ioctl$PERF_EVENT_IOC_SET_BPF(r2, 0x40042408, r3) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000000)={&(0x7f0000000080)='./file0/file0\x00', r0}, 0x10) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000400)=@ax25={0x3, {"02f47b3723e03d"}}, 0x80, &(0x7f00000017c0), 0x0, &(0x7f0000001840)=ANY=[], 0x0, 0x24004044}, 0x4008001) bpf$MAP_CREATE(0x0, &(0x7f0000002cc0)={0x5, 0x0, 0x56c96e7a, 0x2, 0xa, 0xffffffffffffffff, 0x9}, 0x2c) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000480)='rpc_pipefs\x00', 0x200000, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000002d00)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f00000004c0)='vmnet0keyring\x00') syz_open_dev$usbmon(&(0x7f0000000240)='/dev/usbmon#\x00', 0x6, 0x200000) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000780)={&(0x7f0000000740)='./file0/file0\x00', r4}, 0x10) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x40082406, &(0x7f0000000700)='proc!@ppp1!ppp0ppp0#)lo\\lolo{\x00') mount(&(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000200)='fuseblk\x00', 0xa11800, &(0x7f0000000240)) mount(&(0x7f00000002c0)='./file0/file0\x00', &(0x7f0000000300)='./file0/file0\x00', &(0x7f0000000340)='minix\x00', 0x1000, &(0x7f0000000380)) 2018/03/29 17:35:03 executing program 3: r0 = socket(0xa, 0x2, 0x0) r1 = open(&(0x7f00004b8ff8)='./file0\x00', 0x28042, 0x0) connect$inet6(r0, &(0x7f0000d3cfe4)={0xa, 0x0, 0x0, @mcast2={0xff, 0x2, [], 0x1}, 0x3}, 0x1c) ioctl$DRM_IOCTL_ADD_CTX(r1, 0xc0086420, &(0x7f0000000000)) ioctl$DRM_IOCTL_NEW_CTX(r1, 0x40086425, &(0x7f0000000080)={0x0, 0x3}) fallocate(r1, 0x0, 0xffff, 0x1f) setsockopt$inet6_mtu(0xffffffffffffffff, 0x29, 0x17, &(0x7f0000000100)=0x2, 0x4) connect$inet(r0, &(0x7f0000000040)={0x2, 0x4e22, @multicast1=0xe0000001}, 0x10) ioctl$sock_SIOCSIFBR(r0, 0x8941, &(0x7f0000000300)=@add_del={0x2, &(0x7f00000002c0)='rose0\x00', 0x10000}) getsockopt$inet_sctp_SCTP_GET_LOCAL_ADDRS(r0, 0x84, 0x6d, &(0x7f0000000140)={0x0, 0xc5, "43caa47a981ea0fe920cdb108ba9bc5955dd0a624800d6e950de78fb634d200f81b66497d24ff3b7a3cfdf340d5032c60d65ccde6081bf1e2370d49d89949704fcd80ec50a394fc80b8fb8261c812e650021f844e2947fbba8d6ade4f03372e99088dae95edfd2a25e3b7c90a5777f583c864922b11b331249f2daf3c1da96242830d0e175f2d3dc743b1231e8331286a4a869fb69160a427b0e56c1031ca95fd81cec848894396d83f2618c4f51f1d54207e94cef31ef563663667e80421f65152233b67e"}, &(0x7f00000000c0)=0xcd) getsockopt$inet_sctp_SCTP_PR_SUPPORTED(r0, 0x84, 0x71, &(0x7f0000000240)={r2, 0x85e}, &(0x7f0000000280)=0x8) sendfile(r0, r1, &(0x7f00005faff8), 0xfffb) 2018/03/29 17:35:03 executing program 5: 2018/03/29 17:35:03 executing program 2: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)={0xb, 0x7e, 0x3, 0x1, 0x11}, 0x2c) mount(&(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) r1 = socket$kcm(0x29, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000000bc0)={&(0x7f00000007c0)=@rc={0x1f, {0x5, 0x50000000, 0xaa2, 0x613, 0x4, 0x1ff}, 0x3f}, 0x80, &(0x7f0000000940)=[{&(0x7f0000000840)="09c9453aa30d8c5fba221fa2413f12c580837b2ae292e3ee8dd00098c404125a1a2e63840f82a2f69c3927af43b828422484aaeeceebcbe76e999bd3930c9b7c2995484407f9166e39c2069a88b63a980b9b5ffc880f4b89dde5adae6c7fb84ed98cbac860214dfb0b28d1b2e2d58aefebdfe515334f2ffa46be22ef7a4b3a276cb70a27c9e9f5de0a20bad24cbe2b89aee9693c2f8f186ea59fcfc4ebec7188cca0418d4583a6f1730f62416d70cd62555eb4f58ea831d1fea9956a2cba0049f23bf0b249f5de2ce0dc303808d70b0ccab3c7f37e949e", 0xd7}], 0x1, &(0x7f0000000980), 0x0, 0x20004805}, 0x4010) r2 = perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x2367, 0x7fff, 0x1, 0x6, 0x0, 0x78b1, 0x1, 0x0, 0x4992c766, 0xff, 0x81, 0x100, 0x40, 0x3, 0x9, 0x8, 0x1, 0x10000, 0x0, 0x6, 0x90e, 0x9, 0x7ff, 0x0, 0x8, 0x1, 0x30, 0x20, 0x7fffffff, 0x6, 0x401, 0x2, 0x1000, 0x8001, 0x1ff, 0xfffffffffffffff8, 0x0, 0x2, 0x0, @perf_config_ext={0x5, 0x8}, 0x1ab23, 0x0, 0x8, 0x5, 0x6, 0x0, 0x6}, 0xffffffffffffffff, 0x10, r0, 0x1) bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0xb, 0x9, &(0x7f0000000580)=@framed={{0x18}, [@map={0x18, 0x0, 0x1, 0x0, r0}, @generic={0x3ff, 0xfffffffffffffffc, 0x1}, @call={0x85, 0x0, 0x0, 0x6}], {0x95}}, &(0x7f0000000600)='syzkaller\x00', 0x0, 0x30, &(0x7f0000000640)=""/48, 0x41f00, 0x1}, 0x48) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000000)={&(0x7f0000000080)='./file0/file0\x00', r0}, 0x10) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000400)=@ax25={0x3, {"02f47b3723e03d"}}, 0x80, &(0x7f00000017c0), 0x0, &(0x7f0000001840)=ANY=[], 0x0, 0x24004044}, 0x4008001) bpf$MAP_CREATE(0x0, &(0x7f0000002cc0)={0x5, 0x0, 0x56c96e7a, 0x2, 0xa, 0xffffffffffffffff, 0x9}, 0x2c) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000480)='rpc_pipefs\x00', 0x200000, 0x0) socketpair$unix(0x1, 0xffffffffffffffff, 0x0, &(0x7f0000002d00)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f00000004c0)='vmnet0keyring\x00') bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000780)={&(0x7f0000000740)='./file0/file0\x00', r3}, 0x10) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x40082406, &(0x7f0000000700)='proc!@ppp1!ppp0ppp0#)lo\\lolo{\x00') mount(&(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000200)='fuseblk\x00', 0xa11800, &(0x7f0000000240)) mount(&(0x7f00000002c0)='./file0/file0\x00', &(0x7f0000000300)='./file0/file0\x00', &(0x7f0000000340)='minix\x00', 0x1000, &(0x7f0000000380)) 2018/03/29 17:35:03 executing program 0: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)={0xb, 0x7e, 0x3, 0x1, 0x11}, 0x2c) mount(&(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) r1 = socket$kcm(0x29, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000000bc0)={&(0x7f00000007c0)=@rc={0x1f, {0x5, 0x50000000, 0xaa2, 0x613, 0x4, 0x1ff}}, 0x80, &(0x7f0000000940)=[{&(0x7f0000000840)="09c9453aa30d8c5fba221fa2413f12c580837b2ae292e3ee8dd00098c404125a1a2e63840f82a2f69c3927af43b828422484aaeeceebcbe76e999bd3930c9b7c2995484407f9166e39c2069a88b63a980b9b5ffc880f4b89dde5adae6c7fb84ed98cbac860214dfb0b28d1b2e2d58aefebdfe515334f2ffa46be22ef7a4b3a276cb70a27c9e9f5de0a20bad24cbe2b89aee9693c2f8f186ea59fcfc4ebec7188cca0418d4583a6f1730f62416d70cd62555eb4f58ea831d1fea9956a2cba0049f23bf0b249f5de2ce0dc303808d70b0ccab3c7f37e949e", 0xd7}], 0x1, &(0x7f0000000980)}, 0x4010) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0xb, 0x9, &(0x7f0000000580)=@framed={{0x18}, [@map={0x18, 0x0, 0x1, 0x0, r0}, @generic={0x3ff, 0xfffffffffffffffc, 0x1}, @call={0x85, 0x0, 0x0, 0x6}], {0x95}}, &(0x7f0000000600)='syzkaller\x00', 0x0, 0x30, &(0x7f0000000640)=""/48, 0x41f00, 0x1}, 0x48) ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, r2) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000000)={&(0x7f0000000080)='./file0/file0\x00', r0}, 0x10) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000400)=@ax25={0x3, {"02f47b3723e03d"}}, 0x80, &(0x7f00000017c0), 0x0, &(0x7f0000001840)=ANY=[], 0x0, 0x24004044}, 0x4008001) bpf$MAP_CREATE(0x0, &(0x7f0000002cc0)={0x5, 0x100, 0x56c96e7a, 0x2, 0xa, 0xffffffffffffffff, 0x9}, 0x2c) r3 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000240)='/proc/self/net/pfkey\x00', 0x400, 0x0) ioctl$EVIOCGSND(r3, 0x8040451a, &(0x7f0000000280)=""/18) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000480)='rpc_pipefs\x00', 0x200000, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000002d00)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f00000004c0)='vmnet0keyring\x00') bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000780)={&(0x7f0000000740)='./file0/file0\x00', r4}, 0x10) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, &(0x7f0000000700)='proc!@ppp1!ppp0ppp0#)lo\\lolo{\x00') mount(&(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000200)='fuseblk\x00', 0xa11800, &(0x7f0000000240)) mount(&(0x7f00000002c0)='./file0/file0\x00', &(0x7f0000000300)='./file0/file0\x00', &(0x7f0000000340)='minix\x00', 0x0, &(0x7f0000000380)) 2018/03/29 17:35:03 executing program 4: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)={0xb, 0x7e, 0x3, 0x1, 0x11}, 0x2c) mount(&(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) r1 = socket$kcm(0x29, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000000bc0)={&(0x7f00000007c0)=@rc={0x1f, {0x5, 0x50000000, 0xaa2, 0x613, 0x4, 0x1ff}, 0x3f}, 0x80, &(0x7f0000000940)=[{&(0x7f0000000840)="09c9453aa30d8c5fba221fa2413f12c580837b2ae292e3ee8dd00098c404125a1a2e63840f82a2f69c3927af43b828422484aaeeceebcbe76e999bd3930c9b7c2995484407f9166e39c2069a88b63a980b9b5ffc880f4b89dde5adae6c7fb84ed98cbac860214dfb0b28d1b2e2d58aefebdfe515334f2ffa46be22ef7a4b3a276cb70a27c9e9f5de0a20bad24cbe2b89aee9693c2f8f186ea59fcfc4ebec7188cca0418d4583a6f1730f62416d70cd62555eb4f58ea831d1fea9956a2cba0049f23bf0b249f5de2ce0dc303808d70b0ccab3c7f37e949e", 0xd7}], 0x1, &(0x7f0000000980), 0x0, 0x20004805}, 0x4010) r2 = perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x2367, 0x7fff, 0x1, 0x6, 0x0, 0x78b1, 0x1, 0x0, 0x4992c766, 0xff, 0x81, 0x100, 0x40, 0x3, 0x9, 0x8, 0x1, 0x10000, 0x0, 0x6, 0x90e, 0x9, 0x7ff, 0x0, 0x8, 0x1, 0x30, 0x20, 0x7fffffff, 0x6, 0x401, 0x2, 0x1000, 0x8001, 0x1ff, 0xfffffffffffffff8, 0x0, 0x2, 0x0, @perf_config_ext={0x5, 0x8}, 0x1ab23, 0x3f, 0x8, 0x5, 0x6}, 0xffffffffffffffff, 0x10, r0, 0x1) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0xb, 0x9, &(0x7f0000000580)=@framed={{0x18}, [@map={0x18, 0x0, 0x1, 0x0, r0}, @generic={0x3ff, 0x0, 0x1}, @call={0x85, 0x0, 0x0, 0x6}], {0x95}}, &(0x7f0000000600)='syzkaller\x00', 0x0, 0x30, &(0x7f0000000640)=""/48, 0x41f00, 0x1}, 0x48) ioctl$PERF_EVENT_IOC_SET_BPF(r2, 0x40042408, r3) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000000)={&(0x7f0000000080)='./file0/file0\x00', r0}, 0x10) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000400)=@ax25={0x3, {"02f47b3723e03d"}}, 0x80, &(0x7f00000017c0), 0x0, &(0x7f0000001840)=ANY=[], 0x0, 0x24004044}, 0x4008001) bpf$MAP_CREATE(0x0, &(0x7f0000002cc0)={0x5, 0x100, 0x56c96e7a, 0x2, 0xa, 0xffffffffffffffff, 0x9}, 0x2c) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000480)='rpc_pipefs\x00', 0x200000, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000002d00)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f00000004c0)='vmnet0keyring\x00') bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000780)={&(0x7f0000000740)='./file0/file0\x00', r4}, 0x10) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x40082406, &(0x7f0000000700)='proc!@ppp1!ppp0ppp0#)lo\\lolo{\x00') mount(&(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000200)='fuseblk\x00', 0xa11800, &(0x7f0000000240)) r5 = syz_open_dev$sg(&(0x7f0000000240)='/dev/sg#\x00', 0xfffffffffffffffa, 0x800) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000280)={r5, r3, 0x5, 0x1}, 0x10) ioctl$TIOCCONS(r5, 0x541d) mount(&(0x7f00000002c0)='./file0/file0\x00', &(0x7f0000000300)='./file0/file0\x00', &(0x7f0000000340)='minix\x00', 0x1000, &(0x7f0000000380)) 2018/03/29 17:35:03 executing program 1: 2018/03/29 17:35:03 executing program 6: 2018/03/29 17:35:03 executing program 1: 2018/03/29 17:35:03 executing program 4: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)={0xb, 0x7e, 0x3, 0x1, 0x11}, 0x2c) mount(&(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) r1 = socket$kcm(0x29, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000000bc0)={&(0x7f00000007c0)=@rc={0x1f, {0x5, 0x50000000, 0xaa2, 0x613, 0x4, 0x1ff}, 0x3f}, 0x80, &(0x7f0000000940)=[{&(0x7f0000000840)="09c9453aa30d8c5fba221fa2413f12c580837b2ae292e3ee8dd00098c404125a1a2e63840f82a2f69c3927af43b828422484aaeeceebcbe76e999bd3930c9b7c2995484407f9166e39c2069a88b63a980b9b5ffc880f4b89dde5adae6c7fb84ed98cbac860214dfb0b28d1b2e2d58aefebdfe515334f2ffa46be22ef7a4b3a276cb70a27c9e9f5de0a20bad24cbe2b89aee9693c2f8f186ea59fcfc4ebec7188cca0418d4583a6f1730f62416d70cd62555eb4f58ea831d1fea9956a2cba0049f23bf0b249f5de2ce0dc303808d70b0ccab3c7f37e949e", 0xd7}], 0x1, &(0x7f0000000980), 0x0, 0x20004805}, 0x4010) r2 = perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x2367, 0x7fff, 0x1, 0x6, 0x0, 0x78b1, 0x1, 0x0, 0x4992c766, 0xff, 0x81, 0x100, 0x40, 0x3, 0x9, 0x8, 0x1, 0x10000, 0x0, 0x6, 0x90e, 0x9, 0x7ff, 0x0, 0x8, 0x1, 0x30, 0x20, 0x7fffffff, 0x6, 0x401, 0x2, 0x1000, 0x8001, 0x1ff, 0xfffffffffffffff8, 0x0, 0x2, 0x0, @perf_config_ext={0x5, 0x8}, 0x1ab23, 0x3f, 0x8, 0x5, 0x6}, 0xffffffffffffffff, 0x10, r0, 0x1) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0xb, 0x9, &(0x7f0000000580)=@framed={{0x18}, [@map={0x18, 0x0, 0x1, 0x0, r0}, @generic={0x3ff, 0x0, 0x1}, @call={0x85, 0x0, 0x0, 0x6}], {0x95}}, &(0x7f0000000600)='syzkaller\x00', 0x0, 0x30, &(0x7f0000000640)=""/48, 0x41f00, 0x1}, 0x48) ioctl$PERF_EVENT_IOC_SET_BPF(r2, 0x40042408, r3) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000000)={&(0x7f0000000080)='./file0/file0\x00', r0}, 0x10) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000400)=@ax25={0x3, {"02f47b3723e03d"}}, 0x80, &(0x7f00000017c0), 0x0, &(0x7f0000001840)=ANY=[], 0x0, 0x24004044}, 0x4008001) bpf$MAP_CREATE(0x0, &(0x7f0000002cc0)={0x5, 0x100, 0x56c96e7a, 0x2, 0xa, 0xffffffffffffffff, 0x9}, 0x2c) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000480)='rpc_pipefs\x00', 0x200000, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000002d00)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f00000004c0)='vmnet0keyring\x00') bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000780)={&(0x7f0000000740)='./file0/file0\x00', r4}, 0x10) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x40082406, &(0x7f0000000700)='proc!@ppp1!ppp0ppp0#)lo\\lolo{\x00') mount(&(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000200)='fuseblk\x00', 0xa11800, &(0x7f0000000240)) r5 = syz_open_dev$sg(&(0x7f0000000240)='/dev/sg#\x00', 0xfffffffffffffffa, 0x800) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000280)={r5, r3, 0x5, 0x1}, 0x10) ioctl$TIOCCONS(r5, 0x541d) mount(&(0x7f00000002c0)='./file0/file0\x00', &(0x7f0000000300)='./file0/file0\x00', &(0x7f0000000340)='minix\x00', 0x1000, &(0x7f0000000380)) 2018/03/29 17:35:03 executing program 6: 2018/03/29 17:35:03 executing program 5: 2018/03/29 17:35:03 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)={0xb, 0x7e, 0x3, 0x1, 0x11}, 0x2c) mount(&(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) r1 = socket$kcm(0x29, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000000bc0)={&(0x7f00000007c0)=@rc={0x1f, {0x5, 0x50000000, 0xaa2, 0x613, 0x4, 0x1ff}, 0x3f}, 0x80, &(0x7f0000000940)=[{&(0x7f0000000840)="09c9453aa30d8c5fba221fa2413f12c580837b2ae292e3ee8dd00098c404125a1a2e63840f82a2f69c3927af43b828422484aaeeceebcbe76e999bd3930c9b7c2995484407f9166e39c2069a88b63a980b9b5ffc880f4b89dde5adae6c7fb84ed98cbac860214dfb0b28d1b2e2d58aefebdfe515334f2ffa46be22ef7a4b3a276cb70a27c9e9f5de0a20bad24cbe2b89aee9693c2f8f186ea59fcfc4ebec7188cca0418d4583a6f1730f62416d70cd62555eb4f58ea831d1fea9956a2cba0049f23bf0b249f5de2ce0dc303808d70b0ccab3c7f37e949e", 0xd7}], 0x1, &(0x7f0000000980), 0x0, 0x20004805}, 0x4010) r2 = perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x2367, 0x7fff, 0x1, 0x6, 0x0, 0x78b1, 0x1, 0x0, 0x4992c766, 0xff, 0x81, 0x100, 0x40, 0x3, 0x9, 0x8, 0x1, 0x10000, 0x0, 0x6, 0x90e, 0x9, 0x7ff, 0x0, 0x8, 0x1, 0x30, 0x20, 0x7fffffff, 0x6, 0x401, 0x2, 0x1000, 0x8001, 0x1ff, 0xfffffffffffffff8, 0x0, 0x2, 0x0, @perf_config_ext={0x5, 0x8}, 0x1ab23, 0x0, 0x8, 0x5, 0x6, 0x0, 0x6}, 0xffffffffffffffff, 0x10, r0, 0x1) bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0xb, 0x9, &(0x7f0000000580)=@framed={{0x18}, [@map={0x18, 0x0, 0x1, 0x0, r0}, @generic={0x3ff, 0xfffffffffffffffc, 0x1}, @call={0x85, 0x0, 0x0, 0x6}], {0x95}}, &(0x7f0000000600)='syzkaller\x00', 0x0, 0x30, &(0x7f0000000640)=""/48, 0x41f00, 0x1}, 0x48) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000000)={&(0x7f0000000080)='./file0/file0\x00', r0}, 0x10) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000400)=@ax25={0x3, {"02f47b3723e03d"}}, 0x80, &(0x7f00000017c0), 0x0, &(0x7f0000001840)=ANY=[], 0x0, 0x24004044}, 0x4008001) bpf$MAP_CREATE(0x0, &(0x7f0000002cc0)={0x5, 0x0, 0x56c96e7a, 0x2, 0xa, 0xffffffffffffffff, 0x9}, 0x2c) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000480)='rpc_pipefs\x00', 0x200000, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000002d00)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f00000004c0)='vmnet0keyring\x00') bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000780)={&(0x7f0000000740)='./file0/file0\x00', r3}, 0x10) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x40082406, &(0x7f0000000700)='proc!@ppp1!ppp0ppp0#)lo\\lolo{\x00') mount(&(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000200)='fuseblk\x00', 0xa11800, &(0x7f0000000240)) mount(&(0x7f00000002c0)='./file0/file0\x00', &(0x7f0000000300)='./file0/file0\x00', &(0x7f0000000340)='minix\x00', 0x1000, &(0x7f0000000380)) r4 = syz_open_dev$sg(&(0x7f00000000c0)='/dev/sg#\x00', 0x80000000, 0x2) getsockopt$inet_mreq(r4, 0x0, 0x23, &(0x7f0000000240)={@multicast1, @rand_addr}, &(0x7f0000000280)=0x8) 2018/03/29 17:35:03 executing program 7: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)={0xb, 0x7e, 0x3, 0x1, 0x11}, 0x2c) mount(&(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) r1 = socket$kcm(0x29, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000000bc0)={&(0x7f00000007c0)=@rc={0x1f, {0x5, 0x50000000, 0xaa2, 0x613, 0x4, 0x1ff}, 0x3f}, 0x80, &(0x7f0000000940)=[{&(0x7f0000000840)="09c9453aa30d8c5fba221fa2413f12c580837b2ae292e3ee8dd00098c404125a1a2e63840f82a2f69c3927af43b828422484aaeeceebcbe76e999bd3930c9b7c2995484407f9166e39c2069a88b63a980b9b5ffc880f4b89dde5adae6c7fb84ed98cbac860214dfb0b28d1b2e2d58aefebdfe515334f2ffa46be22ef7a4b3a276cb70a27c9e9f5de0a20bad24cbe2b89aee9693c2f8f186ea59fcfc4ebec7188cca0418d4583a6f1730f62416d70cd62555eb4f58ea831d1fea9956a2cba0049f23bf0b249f5de2ce0dc303808d70b0ccab3c7f37e949e", 0xd7}], 0x1, &(0x7f0000000980), 0x0, 0x20004805}, 0x4010) r2 = perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x2367, 0x7fff, 0x1, 0x6, 0x0, 0x78b1, 0x1, 0x0, 0x4992c766, 0xff, 0x81, 0x100, 0x40, 0x3, 0x9, 0x8, 0x1, 0x10000, 0x0, 0x6, 0x4, 0x9, 0x7ff, 0x0, 0x8, 0x1, 0x30, 0x20, 0x7fffffff, 0x6, 0x401, 0x2, 0x1000, 0x8001, 0x1ff, 0xfffffffffffffff8, 0x0, 0x2, 0x0, @perf_config_ext={0x5, 0x8}, 0x1ab23, 0x1ff, 0x8, 0x5, 0x6, 0x0, 0x6}, 0xffffffffffffffff, 0x10, r0, 0x1) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0xb, 0x9, &(0x7f0000000580)=@framed={{0x18}, [@map={0x18, 0x0, 0x1, 0x0, r0}, @generic={0x3ff, 0xfffffffffffffffc, 0x1}, @call={0x85, 0x0, 0x0, 0x6}], {0x95}}, &(0x7f0000000600)='syzkaller\x00', 0x0, 0x30, &(0x7f0000000640)=""/48, 0x41f00, 0x1}, 0x48) ioctl$PERF_EVENT_IOC_SET_BPF(r2, 0x40042408, r3) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000000)={&(0x7f0000000080)='./file0/file0\x00', r0}, 0x10) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000400)=@ax25={0x3, {"02f47b3723e03d"}}, 0x80, &(0x7f00000017c0), 0x0, &(0x7f0000001840)=ANY=[], 0x0, 0x24004044}, 0x4008001) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000002cc0)={0x5, 0x0, 0x56c96e7a, 0x2, 0xa, 0xffffffffffffffff, 0x9}, 0x2c) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000480)='rpc_pipefs\x00', 0x200000, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000002d00)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f00000004c0)='vmnet0keyring\x00') bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000780)={&(0x7f0000000740)='./file0/file0\x00', r5}, 0x10) fcntl$getflags(r4, 0x409) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x40082406, &(0x7f0000000700)='proc!@ppp1!ppp0ppp0#)lo\\lolo{\x00') mount(&(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000200)='fuseblk\x00', 0xa11800, &(0x7f0000000240)) mount(&(0x7f00000002c0)='./file0/file0\x00', &(0x7f0000000300)='./file0/file0\x00', &(0x7f0000000340)='minix\x00', 0x1000, &(0x7f0000000380)) 2018/03/29 17:35:03 executing program 0: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)={0xb, 0x7e, 0x3, 0x1, 0x11}, 0x2c) mount(&(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) r1 = socket$kcm(0x29, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000000bc0)={&(0x7f00000007c0)=@rc={0x1f, {0x5, 0x50000000, 0xaa2, 0x613, 0x4, 0x1ff}}, 0x80, &(0x7f0000000940)=[{&(0x7f0000000840)="09c9453aa30d8c5fba221fa2413f12c580837b2ae292e3ee8dd00098c404125a1a2e63840f82a2f69c3927af43b828422484aaeeceebcbe76e999bd3930c9b7c2995484407f9166e39c2069a88b63a980b9b5ffc880f4b89dde5adae6c7fb84ed98cbac860214dfb0b28d1b2e2d58aefebdfe515334f2ffa46be22ef7a4b3a276cb70a27c9e9f5de0a20bad24cbe2b89aee9693c2f8f186ea59fcfc4ebec7188cca0418d4583a6f1730f62416d70cd62555eb4f58ea831d1fea9956a2cba0049f23bf0b249f5de2ce0dc303808d70b0ccab3c7f37e949e", 0xd7}], 0x1, &(0x7f0000000980)}, 0x4010) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0xb, 0x9, &(0x7f0000000580)=@framed={{0x18}, [@map={0x18, 0x0, 0x1, 0x0, r0}, @generic={0x3ff, 0xfffffffffffffffc, 0x1}, @call={0x85, 0x0, 0x0, 0x6}], {0x95}}, &(0x7f0000000600)='syzkaller\x00', 0x0, 0x30, &(0x7f0000000640)=""/48, 0x41f00, 0x1}, 0x48) ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, r2) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000000)={&(0x7f0000000080)='./file0/file0\x00', r0}, 0x10) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000400)=@ax25={0x3, {"02f47b3723e03d"}}, 0x80, &(0x7f00000017c0), 0x0, &(0x7f0000001840)=ANY=[], 0x0, 0x24004044}, 0x4008001) bpf$MAP_CREATE(0x0, &(0x7f0000002cc0)={0x5, 0x100, 0x56c96e7a, 0x2, 0xa, 0xffffffffffffffff, 0x9}, 0x2c) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000480)='rpc_pipefs\x00', 0x200000, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) syz_open_dev$usbmon(&(0x7f0000000280)='/dev/usbmon#\x00', 0x9, 0x1) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f0000000e00)="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") bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000780)={&(0x7f0000000740)='./file0/file0\x00', r3}, 0x10) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, &(0x7f0000000700)='proc!@ppp1!ppp0ppp0#)lo\\lolo{\x00') mount(&(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000200)='fuseblk\x00', 0xa11800, &(0x7f0000000240)) mount(&(0x7f00000002c0)='./file0/file0\x00', &(0x7f0000000240)='./file0/file0\x00', &(0x7f0000000340)='ufs\x00', 0x0, &(0x7f0000000980)="cd86de36754784418d972ca07c78a1b9c19386a1a9884f2cbe3bfe18ce1bf22f93f24b7ef3ec84b89471ad3ce6e397d32fb5742e9928a02a99d8c968a54a034610446f5616759750086490e8f1ee64167aea822903cea308a47821b6183614618170d6e560f32194313a2fdb1a93ff0000000000000000000000000000") 2018/03/29 17:35:03 executing program 3: r0 = socket(0xa, 0x2, 0x0) r1 = open(&(0x7f00004b8ff8)='./file0\x00', 0x28042, 0x0) connect$inet6(r0, &(0x7f0000d3cfe4)={0xa, 0x0, 0x0, @mcast2={0xff, 0x2, [], 0x1}, 0x3}, 0x1c) ioctl$DRM_IOCTL_ADD_CTX(r1, 0xc0086420, &(0x7f0000000000)) ioctl$DRM_IOCTL_NEW_CTX(r1, 0x40086425, &(0x7f0000000080)={0x0, 0x3}) fallocate(r1, 0x0, 0xffff, 0x1f) setsockopt$inet6_mtu(0xffffffffffffffff, 0x29, 0x17, &(0x7f00000000c0)=0x2, 0x315ba84df29b8963) connect$inet(r0, &(0x7f0000000040)={0x2, 0x4e22, @multicast1=0xe0000001}, 0x10) sendfile(r0, r1, &(0x7f00005faff8), 0xfffb) 2018/03/29 17:35:03 executing program 6: 2018/03/29 17:35:03 executing program 5: 2018/03/29 17:35:03 executing program 1: 2018/03/29 17:35:03 executing program 6: 2018/03/29 17:35:03 executing program 5: 2018/03/29 17:35:03 executing program 4: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)={0xb, 0x7e, 0x3, 0x1, 0x11}, 0x2c) mount(&(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) r1 = socket$kcm(0x29, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000000bc0)={&(0x7f00000007c0)=@rc={0x1f, {0x5, 0x50000000, 0xaa2, 0x613, 0x4, 0x1ff}, 0x3f}, 0x80, &(0x7f0000000940)=[{&(0x7f0000000840)="09c9453aa30d8c5fba221fa2413f12c580837b2ae292e3ee8dd00098c404125a1a2e63840f82a2f69c3927af43b828422484aaeeceebcbe76e999bd3930c9b7c2995484407f9166e39c2069a88b63a980b9b5ffc880f4b89dde5adae6c7fb84ed98cbac860214dfb0b28d1b2e2d58aefebdfe515334f2ffa46be22ef7a4b3a276cb70a27c9e9f5de0a20bad24cbe2b89aee9693c2f8f186ea59fcfc4ebec7188cca0418d4583a6f1730f62416d70cd62555eb4f58ea831d1fea9956a2cba0049f23bf0b249f5de2ce0dc303808d70b0ccab3c7f37e949e", 0xd7}], 0x1, &(0x7f0000000980), 0x0, 0x20004805}, 0x4010) r2 = perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x2367, 0x7fff, 0x1, 0x6, 0x0, 0x78b1, 0x1, 0x0, 0x4992c766, 0xff, 0x81, 0x100, 0x40, 0x3, 0x9, 0x8, 0x1, 0x10000, 0x0, 0x6, 0x90e, 0x9, 0x7ff, 0x0, 0x8, 0x1, 0x30, 0x20, 0x7fffffff, 0x6, 0x401, 0x2, 0x1000, 0x8001, 0x1ff, 0xfffffffffffffff8, 0x0, 0x2, 0x0, @perf_config_ext={0x5, 0x8}, 0x1ab23, 0x3f, 0x8, 0x5, 0x6}, 0xffffffffffffffff, 0x10, r0, 0x1) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0xb, 0x9, &(0x7f0000000580)=@framed={{0x18}, [@map={0x18, 0x0, 0x1, 0x0, r0}, @generic={0x3ff, 0x0, 0x1}, @call={0x85, 0x0, 0x0, 0x6}], {0x95}}, &(0x7f0000000600)='syzkaller\x00', 0x0, 0x30, &(0x7f0000000640)=""/48, 0x41f00, 0x1}, 0x48) ioctl$PERF_EVENT_IOC_SET_BPF(r2, 0x40042408, r3) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000000)={&(0x7f0000000080)='./file0/file0\x00', r0}, 0x10) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000400)=@ax25={0x3, {"02f47b3723e03d"}}, 0x80, &(0x7f00000017c0), 0x0, &(0x7f0000001840)=ANY=[], 0x0, 0x24004044}, 0x4008001) bpf$MAP_CREATE(0x0, &(0x7f0000002cc0)={0x5, 0x100, 0x56c96e7a, 0x2, 0xa, 0xffffffffffffffff, 0x9}, 0x2c) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000480)='rpc_pipefs\x00', 0x200000, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000002d00)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f00000004c0)='vmnet0keyring\x00') bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000780)={&(0x7f0000000740)='./file0/file0\x00', r4}, 0x10) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x40082406, &(0x7f0000000700)='proc!@ppp1!ppp0ppp0#)lo\\lolo{\x00') mount(&(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000200)='fuseblk\x00', 0xa11800, &(0x7f0000000240)) r5 = syz_open_dev$sg(&(0x7f0000000240)='/dev/sg#\x00', 0xfffffffffffffffa, 0x800) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000280)={r5, r3, 0x5, 0x1}, 0x10) ioctl$TIOCCONS(r5, 0x541d) mount(&(0x7f00000002c0)='./file0/file0\x00', &(0x7f0000000300)='./file0/file0\x00', &(0x7f0000000340)='minix\x00', 0x1000, &(0x7f0000000380)) 2018/03/29 17:35:03 executing program 1: 2018/03/29 17:35:03 executing program 2: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)={0xb, 0x7e, 0x3, 0x1, 0x11}, 0x2c) mount(&(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) r1 = socket$kcm(0x29, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000000bc0)={&(0x7f00000007c0)=@rc={0x1f, {0x5, 0x50000000, 0xaa2, 0x613, 0x4, 0x1ff}, 0x3f}, 0x80, &(0x7f0000000940)=[{&(0x7f0000000840)="09c9453aa30d8c5fba221fa2413f12c580837b2ae292e3ee8dd00098c404125a1a2e63840f82a2f69c3927af43b828422484aaeeceebcbe76e999bd3930c9b7c2995484407f9166e39c2069a88b63a980b9b5ffc880f4b89dde5adae6c7fb84ed98cbac860214dfb0b28d1b2e2d58aefebdfe515334f2ffa46be22ef7a4b3a276cb70a27c9e9f5de0a20bad24cbe2b89aee9693c2f8f186ea59fcfc4ebec7188cca0418d4583a6f1730f62416d70cd62555eb4f58ea831d1fea9956a2cba0049f23bf0b249f5de2ce0dc303808d70b0ccab3c7f37e949e", 0xd7}], 0x1, &(0x7f0000000980), 0x0, 0x20004805}, 0x4010) r2 = perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x2367, 0x7fff, 0x1, 0x6, 0x0, 0x78b1, 0x1, 0x0, 0x4992c766, 0xff, 0x81, 0x100, 0x40, 0x3, 0x9, 0x8, 0x1, 0x10000, 0x0, 0x6, 0x90e, 0x9, 0x7ff, 0x0, 0x8, 0x1, 0x30, 0x20, 0x7fffffff, 0x6, 0x401, 0x2, 0x1000, 0x8001, 0x1ff, 0xfffffffffffffff8, 0x0, 0x2, 0x0, @perf_config_ext={0x5, 0x8}, 0x1ab23, 0x0, 0x8, 0x5, 0x6, 0x0, 0x6}, 0xffffffffffffffff, 0x10, r0, 0x1) bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0xb, 0x9, &(0x7f0000000580)=@framed={{0x18}, [@map={0x18, 0x0, 0x1, 0x0, r0}, @generic={0x3ff, 0xfffffffffffffffc, 0x1}, @call={0x85, 0x0, 0x0, 0x6}], {0x95}}, &(0x7f0000000600)='syzkaller\x00', 0x0, 0x30, &(0x7f0000000640)=""/48, 0x41f00, 0x1}, 0x48) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000000)={&(0x7f0000000080)='./file0/file0\x00', r0}, 0x10) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000400)=@ax25={0x3, {"02f47b3723e03d"}}, 0x80, &(0x7f00000017c0), 0x0, &(0x7f0000001840)=ANY=[], 0x0, 0x24004044}, 0x4008001) bpf$MAP_CREATE(0x0, &(0x7f0000002cc0)={0x5, 0x0, 0x56c96e7a, 0x2, 0xa, 0xffffffffffffffff, 0x9}, 0x2c) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000480)='rpc_pipefs\x00', 0x200000, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000002d00)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f00000004c0)='vmnet0keyring\x00') bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000780)={&(0x7f0000000740)='./file0/file0\x00', r3}, 0x10) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x40082406, &(0x7f0000000700)='proc!@ppp1!ppp0ppp0#)lo\\lolo{\x00') mount(&(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000200)='fuseblk\x00', 0xa11800, &(0x7f0000000240)) mount(&(0x7f00000002c0)='./file0/file0\x00', &(0x7f0000000300)='./file0/file0\x00', &(0x7f0000000340)='minix\x00', 0x1000, &(0x7f0000000380)) socketpair(0x1b, 0x801, 0x7fff, &(0x7f0000000b80)={0xffffffffffffffff}) getsockopt$inet_sctp_SCTP_CONTEXT(0xffffffffffffff9c, 0x84, 0x11, &(0x7f0000000c00)={0x0, 0x7}, &(0x7f0000000c40)=0x8) getsockopt$inet_sctp_SCTP_RTOINFO(r4, 0x84, 0x0, &(0x7f0000000c80)={r5, 0x0, 0xffffffffffffffff, 0x7015}, &(0x7f0000000cc0)=0x10) 2018/03/29 17:35:03 executing program 6: 2018/03/29 17:35:03 executing program 7: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)={0xb, 0x7e, 0x3, 0x1, 0x11}, 0x2c) mount(&(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) r1 = socket$kcm(0x29, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000000bc0)={&(0x7f00000007c0)=@rc={0x1f, {0x5, 0x50000000, 0xaa2, 0x613, 0x4, 0x1ff}, 0x3f}, 0x80, &(0x7f0000000940)=[{&(0x7f0000000840)="09c9453aa30d8c5fba221fa2413f12c580837b2ae292e3ee8dd00098c404125a1a2e63840f82a2f69c3927af43b828422484aaeeceebcbe76e999bd3930c9b7c2995484407f9166e39c2069a88b63a980b9b5ffc880f4b89dde5adae6c7fb84ed98cbac860214dfb0b28d1b2e2d58aefebdfe515334f2ffa46be22ef7a4b3a276cb70a27c9e9f5de0a20bad24cbe2b89aee9693c2f8f186ea59fcfc4ebec7188cca0418d4583a6f1730f62416d70cd62555eb4f58ea831d1fea9956a2cba0049f23bf0b249f5de2ce0dc303808d70b0ccab3c7f37e949e", 0xd7}], 0x1, &(0x7f0000000980), 0x0, 0x20004805}, 0x4010) r2 = perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x2367, 0x7fff, 0x1, 0x6, 0x0, 0x78b1, 0x1, 0x0, 0x4992c766, 0xff, 0x81, 0x100, 0x40, 0x3, 0x9, 0x8, 0x1, 0x10000, 0x0, 0x6, 0x90e, 0x9, 0x7ff, 0x0, 0x8, 0x1, 0x30, 0x20, 0x7fffffff, 0x6, 0x401, 0x2, 0x1000, 0x8001, 0x1ff, 0xfffffffffffffff8, 0x0, 0x2, 0x0, @perf_config_ext={0x5, 0x8}, 0x1ab23, 0x3f, 0x8, 0x5, 0x6, 0x0, 0x6}, 0xffffffffffffffff, 0x10, r0, 0x1) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0xb, 0x9, &(0x7f0000000580)=ANY=[@ANYBLOB="180000000000000000000000000000480c10007f", @ANYRES32=r0, @ANYBLOB="0000000000000000fffc0100000000000000000000000000850000000600000000000000000000009500000000000000"], &(0x7f0000000600)='syzkaller\x00', 0x0, 0x30, &(0x7f0000000640)=""/48, 0x41f00, 0x1}, 0x48) ioctl$PERF_EVENT_IOC_SET_BPF(r2, 0x40042408, r3) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000000)={&(0x7f0000000080)='./file0/file0\x00', r0}, 0x10) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000400)=@ax25={0x3, {"02f47b3723e03d"}}, 0x80, &(0x7f00000017c0), 0x0, &(0x7f0000001840)=ANY=[], 0x0, 0x24004044}, 0x4008001) bpf$MAP_CREATE(0x0, &(0x7f0000002cc0)={0x5, 0x0, 0x56c96e7a, 0x2, 0xa, 0xffffffffffffffff, 0x9}, 0x2c) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000480)='rpc_pipefs\x00', 0x200000, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000002d00)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f00000004c0)='vmnet0keyring\x00') bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000780)={&(0x7f0000000740)='./file0/file0\x00', r4}, 0x10) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x40082406, &(0x7f0000000700)='proc!@ppp1!ppp0ppp0#)lo\\lolo{\x00') mount(&(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000200)='fuseblk\x00', 0xa11800, &(0x7f0000000240)) mount(&(0x7f00000002c0)='./file0/file0\x00', &(0x7f0000000300)='./file0/file0\x00', &(0x7f0000000340)='minix\x00', 0x1000, &(0x7f0000000380)) 2018/03/29 17:35:03 executing program 5: 2018/03/29 17:35:03 executing program 3: r0 = socket(0xa, 0x2, 0x0) r1 = open(&(0x7f0000000200)='./file0\x00', 0x28042, 0x0) connect$inet6(r0, &(0x7f0000d3cfe4)={0xa, 0x0, 0x0, @mcast2={0xff, 0x2, [], 0x1}, 0x3}, 0x1c) ioctl$DRM_IOCTL_ADD_CTX(r1, 0xc0086420, &(0x7f0000000000)) r2 = request_key(&(0x7f00000000c0)='ceph\x00', &(0x7f0000000140)={0x73, 0x79, 0x7a, 0x3}, &(0x7f0000000180)="6d696d655f7479706525d17b00", 0xfffffffffffffffe) keyctl$invalidate(0x15, r2) ioctl$DRM_IOCTL_NEW_CTX(r1, 0x40086425, &(0x7f0000000080)={0x0, 0x3}) fallocate(r1, 0x0, 0xffff, 0x1f) setsockopt$inet6_mtu(0xffffffffffffffff, 0x29, 0x17, &(0x7f0000000100)=0x2, 0x3) connect$inet(r0, &(0x7f0000000040)={0x2, 0x4e22, @multicast1=0xe0000001}, 0x10) sendfile(r0, r1, &(0x7f00000001c0), 0xfffa) 2018/03/29 17:35:03 executing program 0: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)={0xb, 0x7e, 0x3, 0x1, 0x11}, 0x2c) mount(&(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) r1 = socket$kcm(0x29, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000000bc0)={&(0x7f00000007c0)=@rc={0x1f, {0x5, 0x50000000, 0xaa2, 0x613, 0x4, 0x1ff}}, 0x80, &(0x7f0000000940)=[{&(0x7f0000000840)="09c9453aa30d8c5fba221fa2413f12c580837b2ae292e3ee8dd00098c404125a1a2e63840f82a2f69c3927af43b828422484aaeeceebcbe76e999bd3930c9b7c2995484407f9166e39c2069a88b63a980b9b5ffc880f4b89dde5adae6c7fb84ed98cbac860214dfb0b28d1b2e2d58aefebdfe515334f2ffa46be22ef7a4b3a276cb70a27c9e9f5de0a20bad24cbe2b89aee9693c2f8f186ea59fcfc4ebec7188cca0418d4583a6f1730f62416d70cd62555eb4f58ea831d1fea9956a2cba0049f23bf0b249f5de2ce0dc303808d70b0ccab3c7f37e949e", 0xd7}], 0x1, &(0x7f0000000980)}, 0x4010) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0xb, 0x9, &(0x7f0000000580)=@framed={{0x18}, [@map={0x18, 0x0, 0x1, 0x0, r0}, @generic={0x3ff, 0xfffffffffffffffc, 0x1}, @call={0x85, 0x0, 0x0, 0x6}], {0x95}}, &(0x7f0000000600)='syzkaller\x00', 0x0, 0x30, &(0x7f0000000640)=""/48, 0x41f00, 0x1}, 0x48) ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, r2) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000000)={&(0x7f0000000080)='./file0/file0\x00', r0}, 0x10) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000400)=@ax25={0x3, {"02f47b3723e03d"}}, 0x80, &(0x7f00000017c0), 0x0, &(0x7f0000001840)=ANY=[], 0x0, 0x24004044}, 0x4008001) sendmsg(r1, &(0x7f0000001c00)={&(0x7f0000000240)=@l2={0x1f, 0x7, {0x5, 0x6, 0x7fffffff, 0x1ff, 0x80000001, 0x7}, 0x75, 0xfffffffffffffffd}, 0x80, &(0x7f0000000b40)=[{&(0x7f0000000500)="04fbe609146498ceb7f152c981329905b273c52dbf6423108615a943a06ee766f0fc048d2e30b0a6f9d01e87d15b33afe3fc585ddc9e914549ea20e718", 0x3d}, {&(0x7f0000000540)="7d20026b5bd52634f438af93204b549a", 0x10}, {&(0x7f0000000980)="69b0b100f3149666b9fea8d547a9ed37ea74e7955183d1634d7371ee88b5b4c32ce0c31e43c6c68734cf8eb2e6571d1e12db9dcc0a539076a6c94f7b6b6ab74e25f9d3cd4544ad15bac0184706750d5e780fd58f588f55bb43fcbc867249535073fa6f5b55a4c0f80e05a29fd3e184d26aa0f908f41d544edb11d3d41b8d88c277462b0070f0ee4e", 0x88}, {&(0x7f0000000c00)="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", 0x1000}, {&(0x7f0000000a40)="7a917b31348f17f78b687561dc93584038b0f9ce3890acf2b345667cda011b9eed74d7c2bad1cb8523", 0x29}, {&(0x7f0000000a80)="221099c76e2b1906ff8e5cc89de4ad757830093cc4ba1753ca39e1f83cb94bc15d71", 0x22}, {&(0x7f0000000ac0)="7fa5774e289f395873167954e50fa679c459522ab8d8dd66dcf95b62d27ccd6419a44e38117e9c035603e1e6a93c5ccec425b1df85d47140ed51b8e06b4a138d77c238bc905ae38ca08dd52194ce2f2fb73b29c8ec8370305207fa993b2d2c", 0x5f}], 0x7, &(0x7f0000002d40)=[{0xc8, 0x11f, 0x6, "834a7faa7491f7f324d0724eb82faf258e4021fbee206cc329ee0e8f4dd26cdf0f83b3bbc25f10c4daf2ea7fcbee8709291c7f7519005ca7290cb20d5e5f5828bbaef85851f8bb4156285edcc1358dc8101d27c91a570a6f5ebfe67d26a955e1754232d68b8421ac8c0e0b1f76fc565c5a94e6875b1ee4f91ddddadbf50e869bd92db0ed5592331f8635610381d6b402111a08ed86d05b33e15e0ad11512360773d791737b04232f20d95329c86de14e87b2"}, {0x1010, 0x11f, 0x1000, "9f5a3a1ea958552b44b959f0d81562d56434d87eaeba5d368c14f78cbb3d2a528a04e7513e06521afb05c354fb10d62cfccbf19eca5d9db52b79e05ef63925ddc75b32f7f0065f4353674a1c0c7956bf0ae39d875ecf56fec452398f5bd044766a72d6c4e4e2436f28b2cf47ff8f2b3b0cfe4b5cec056c3b2ded2b54b70df27eb7cb5758331fe1d4e8a3cf32ad9d3133414e29a0b0ba3b519dc0680a07a8689ab1bc65a4bb5ca2aa5a57e98936f1c8355da8c22b252b26cf07eaa73a00152d992fd3ed12253bd2006acbff09bed48f2785bd149240cecc58712d3280a9effa703a959a68b705eb4ad9e9724777efca60b40f426d493cb3dc138d98904447e26926a04f552ac6f91e40d45e87f4e45dd675cb74411e38b51ec82967ce69091e9f991e4b2b48e79c5672465fb8e92c2589d2307b3579dd40aa8e127e18390ab64ff1561d1c56a33a049125d5423073068af66ca96a086ea26299564831c548d5248330947d0d324196eb150b1afaa5e4d2ee2cab93543ec6cf10b588f0dbcdbe5bf2472713496f759c8e34e8c590e53a830be920a87e48c5c24d8fac5c6760207cb3ecc2ba98a4df0bc4ec7898ba2d37a8bbacaa86117f8590b9eaa5bcf515004be8186b213cea0518ba87b595c1093e4a19a5ecee6fcd65deb278295f61e78f3d1fde0f0c4d8124f4b64dee680e7200179703aff1732663ab3156101c9d58640c938a9bc78ef6c9c2e7320394e6a1a27750adfb6e3a23e3d7f91cca6d0e8fbd8b87622006743dbeea7fccab3d836b1b39a887a41c877bc9fa60445b71eff1a0fd1b46ab7f59a9fe19fdb8daecf98892692b6ebe2943a95eeb19f7f6a9063f79a6e4318a53c35e99e71cf3472147281d3a585bae42386b68cdaae3a2c65824f86ed7d57de999a759c1d4d30a8301b1fabb26e3e6f271e624a1166e93dffeb5c201de3de110aedd8c192997abb9d5bd1f2b5f5073218aeea2a35dfd7bd468ffa3a11b92708e6854eead438831a44c21510d4a33755727a9253206e6db6da2b488f61570fe200d51a14d8281aad7fd921ad18c497ec0c688d3c1b41f58f611760db1d3fda86b4e15d1be021adf460d658ec2b555b6c1f2b5c6d1ad8e6c04aa133ad24a3dc020aa0c234ea2f82589419eb643489bf460d541962f17b24c552d7ddb56ce42f05c2172c6a2e4d38bd261ba51550d5eb3f5bb0c8511a796481f34dcf1b8097ac4e8ef3cc89fc0777fea8d6416ef715973a88b787d621083c2b02b66c8b759a387f72ad4c1db13099b8cf37eaeca9e520bf7c7d952e8d353eb438eb801eb1244003d96abebb6c7ecb1c452053fb86e88a7ea7f513f266f71c97101abe2a25cf4ce8153cb848eb9681876794cd291cec725c5cd2e23fe63cb790d710b7c43557147bec69d46b467eeab6c52dd3893e035187c69d313eedc2fdd12371d0ecdbd4e041664a69497ae2db81323491fc95e7e83b9ead3a68aa8a7d7d55c0eb176da2077f2abf8ce815863232e0de85e5377372c30ed0febd5c6cc578770d1dbd62257a842e2fa364c7d061b5bc72e95735a7e346383841ef7f9f4ef282bc6c7e5dfa92542ec84cf6d44ab2a2fc0d753416604e9fe0bd213c1bb8ae48d7a4bef9d519160e8e64a63fc2ebcc1461b469f703efdbf0e73f3cf211f6f7b8b7e937bc9104ad164a1c5f350a0ae40e5cc21212d59d06e43e7f49704aebd95b703ccab24e9f9db6a4919395c1ab69210991fe63bfe0b3606ecbc982e715b2f709b72bba9674bb1be6c27f0f8d26d4f7abf6bc6a3273b64b8a5eb3e5c23facdaa2214df17d0c146c759f5ec3c8687e8b3d056496e1e306f8e040749f19529012012c6eb3b5bcf0deb0ed981e912da4b23f6ad1bfbaa50779f9bd12ad46734d0c6e395df73c4755739828f5d6e5771a3541a8ba2671fa0176fcbb5bbeb6cd5fc2dd2d4df697003e9837954422012d93bfd8eb9887c3b966a18f7b2557cfcb1afd443fba99e7f2725930b2f20b6bae113262c318f373846f235297c7a7baf7b11eec4f79d6eb32e5ae1813a96b3f4ab42dc46d0e88928c43f8d7127d69ae6e9cd75c1bed92ba71db95d80af94577b2da8221c1abb1c7e5da167e3c67c4adfdc66bd7662d63fde860261daad97ac380de822ee4a3c5afb72437898be0fc34cbdb1de32c156d9e82778fa6490a20548d4be20af62cd4d9f78acc618991b5cae4ff8ea5eb2f9a562ecb2c3598995025aada07b6de558b9038094da1a32d8e5b58be7bd2e73f1716df10e3e3ce28692c313a023a41c29bfa9dcf1c00d957d3a9d3583db7229585fb623b77c155f4c6a1824e91f76f19d3ee7f4bdd3561fdeeac8e9ae980b3f30639db2891610c634aedf20e0bcbda14e20d5ab5713a3f605e782126884f70707b18fe089d42f5fc9f781cad6d81d596af7ece891dd659f3290a8e4d46ea20db5c8324d062b1240941b4610188e4c15003f30901cc53094704fe260bb236d0bb70daede4588b147c3ab06a023820415d2143d9e957654a9cfb71cb49966b66a144da4cdd6e43d8c0fb0718da37dff53eeb0a9566b5feffc9450c3de8cc2ec5b87b7467be3f5e051f53612405f920945edf8b199f39e7ff2b8075e8a1e3ced298ebf04b43f01020a2aaa520405a728f51618acd1aab42a7a3ea98d91bec3388333fa81efa44bb6f9d203c186e85332bc97779026b1bc835e51e2931a45fbe6612df80df4e0cbacd808f1c4130da546273adbb3155125e73b9a9ce2b0e6c4529c1512962ce5daa200645c582667820f9a6f2652a7505489eb4a35cd7df7a8acfcc2dafbd56b0a31a7c04469e4e162282b8af05f9c66fede68bc91cdf5e45c89f5b37f66552427f4514a2b30f686e754fc43f054a0146e052bc27226178fe779a1838643978016b0eb5dc3625e91df369ff33c12e35b470c1427f5993f02643cd87e96cd63b4eb0f8353107d6c00a8dda8770514e8e2c7bc5c9bd51279fed5f4df84cc7fb3facd4b169ff01446ad0c862a838a31482cd8c011ce776804e238687eceff4025cc0f45cc80877e4cb16e2605d1d2722eb6bce4d1558053ba7047062c62f96442ea0b451861ab903496b2e13f1a3079a1cffafd84bdbe7cacd03b183798a8ccc2548d076ece5eaf83d48be07c5cbfef88edf26f1f3a0291dc01daab68fa2649092365b3d6556359b69d6e9a4a3baacfb8a8c22a0f92882e187ceda2588f27a3e8b376c412169cb1adb2a2fed816882bbe68c71efa39cd3d987a7eef5caed3d1dd7543cecf23443cfdefac41e499706fd574e5b6e27c05a837cc33eceb682589180f6e87a12f6d05b2cd4f7a3c18af27ea28e57f80d33671398f6eb494b626e45971940f7f07a17536fc02ebc7f4c16b142a4f771acdbba5adad63779a782758082d6964cfc140040b82e28c562e7855ab85bb0bd91c44660b0f9ec9adbd174d5623960eda0868c1b24d798cf324139257e169fefd20c036ae7084db6ffe1fe4b8a2d105282f10c28253f9312f50457a77777e0846185bef6e460c0f1376deaf93d3a3ec4123fc887a30349642df8b4dfbc6a7c405b9e97e9fb283cfc843489faf83559a3300579c3cbdc314dd33433df50d9ab15faef94d9871043f13ebacb511980ac8835692f4a41b89185f82007a2132ff2f1904f1c134a69ca903bf9446dae0a68c7627e5e98999f45f77dbc7c2ef17edd74432fc62ea0e57442dbb7e044b111c37c9ab032cf721e46bf7850ac7f8c876c0d1f12eb9051d76a46f4e3759eb2bdb3ad4de301a368de3036ad68a0bb34f397d8bc45b7f0770beba0bedfcdb0a96943f5eea9ab066b3ec4741b3d100301ee0f2aaaf1ae2bf88425910bfa3c78c252d809dee3407e3bbf6af5ffa3068119062e3d3a09715a5bbbc78ff2e916a4686bc4b89ce96a7a1dc6c12e0e5e90c6550b87542c276b7f9c13660f83c44ce37060bc025b0491d145194c2eaf9bcea6ea981d958f17d036d78d6faad8500059183140980bd5e7c212351819bd2da34a203082a0285e86ef67ec6f11286cc099e86e6d5847d5ea85ea241e7e4ae8e4cee9c0ab51fff56fe66763c4dee9e7fb07566db00ede1e3aa148d0d2f5bb6e73d6d1230167097e89ca775104019ca56e83c3b9745e3162e2ca8b15e5a3edfbd0dced0e1beb6da8767e76a7ace6c9060a31a22d7daadf8ca0e4d56eafad2ba14e703f0161412955bd440d56881fd67972b71c42d5ffa4c2450dec273094dd22bb8f1dc9c484e5993e2b446329027865338957bf532a513a4a297884713a677843cef02919667ce34a1b740a51acff7333f30fb5f927dab832904724d29850ccf9bafa10509e0e6e6f78d982d04c10add758c40afaa0968b4005766a9054bf2ff787d108c5a21dbadcdc32d3265f77a816e0845f04a4eff0e629f2a1509d19ed3c8cf454aeb8e6efbfd5be2720a2a2c4d3dd044373db6769c93bc298b198131dc74bd10183bafe72e7b1b19cc201a076bf8d578dab36d038b8db8318e70c31945781a3b6bb14ad5d863d2455b6219d22597ed745d58e59cc41001dbc9f1aa34534fba08f91c0caa5bb51da49a17b651be5ff92027dfbf15c253f525406006082e8ff4e884ff5128052a6e5467e258852b16e3cc1671267e73ca6f974a9d66b2920688cff980f60193ab1356425200a3538fd38441f080027f9b55a387e6cda1f8635d10ee0a41978d42b147cb5ee929d35cc0dc21a2f715edcab283478cfef172ef06ef24824aa07d59bb13dea834dd5d46fe395b1629b7834ea92f3f124be086e7bfc0ba330cc4b60724d58a0e45156c0bcfdb05709cd78b0f4fefa55c03e616bce7521e8f2f347a090b9224389e81376df7d21998f80e634f9f6d9a68f3f53c0efcdea3dd385671810b7e23a1f69023e3ff0011ef2ea97d3705142c3f10a81f1434f82a7c583c9a2a873d29b8902ae4c9b69609e7fdf0546f422ad3f5ce9d8e2c7229379877a8b269c90665592a5df06acb8b2d68158054aedbcdafa5c21592f9e7c58acd4baee65a34e966b62ec755ac295fa9a679c10fe001fd51150c148a567fe9985385dcd6c070be24854e64cc69278b70e85666e86c052450193114e1c5385d2470fb8bf7a110e5146f13512a086afb22c996ef4315e102268520b8194d4890cfc2e45d593a8e4f490e0a7f20b7e21e5237de8fedbb7971ff0f1a15b11bacd4e4e65683cf19a87df36667e15ca3fc96fc27f8e335d170b498702b9ef9b47e832d3b73a5db267dd1d392e275634453ec28f1dd47b811ab2188f43fca58f2294aeba05d29a6d919781e566c5ee5f0586c36e1f3f4cf56541256aaea6c9ea2daced1b8ce2c6b70890f4bedfd399564a44ddca49b02356a9a5777297270d50ba6363c783dede327f3372fc977e7ad806e441e706a10bee836fddb11ea811710b5227bb650d4762c849c150767ca748377a6c95869482fcbe5b01e2b8e7cf4c051ac8ac1105c9057c16c07a99e5d2bc5924fcf4bef6f5567385b827b21a558b2d7637c18ca299b566c245426297348edd18a8050c563f8afde163517af02e27ec8d02894cf6cd29e0245d0e938ee7172f7ce76dcfb434d819def09f257dad06293201947c7763df0e44f5dcc4d88e4f8edd99956f3f7f48556bce41e72695c22040e2034b5934edce6352fcd0aabd527ce2fba8778e939f6c8bed5213d831acd4277fc65156dfedbe9784bf52c21da9675f366cac7317b0ade24773ee239489142472b15fa0d8341e9bdf96dba9554d50cb7266a21bb24e93c2076407197fce17898c176ad053b46255fb66b3bcf4b"}, {0xd0, 0x100, 0x5, "565792e3a5f6f6e6adae3e40011cb1f8d24a0949897fe7bf4c7f149f42650a6c247011c9be3057128a1d1d1bf9d5c98a519f12b042775281118109f6dad9099d54bd3a603bb4cac7d76add062c9b23686d039b847b7c6c0a0938b87ffbb8d8d8c3535e01fd1ab4a9cf1c3f7268f2e55e66b15f1d4382e33a5eb5eaaf370b8c1ff30bd57d8567d62d88bd9c7eb44d3182d4a0cbef9d92213f415746fec4a34fc84ee6454ae2bcc782fbb315110a4702e173bc243c0399261763"}, {0x88, 0x117, 0x2, "9426d65819a32fda70a258f9dcb1b65ab4467e9b7e6b38085cb31e2f6371b2393812887d1ff7588394c8953d615b77e39f5787554eae79b56b7d5c8f587c0aa0d7da72259b7877d7a51215cec8a145901d3b5b9b348953d94337874c5049747cb95f8a8ef689f7528c258cfea3543989b16bb0c556a88e"}, {0x70, 0x1, 0x8000, "8807a38d385aca51068d3a69c5a22baf37416da1c2474e5c6708188b2e29006f3dbeb693fac9db8c109944cafcfd5e28df46f89f672ee1be591db9e92c81c29c34ba9ddaceb4d8d361f8444732fef1cd54a7b7090e61e2acfc"}], 0x12a0}, 0x20000000) bpf$MAP_CREATE(0x0, &(0x7f0000002cc0)={0x5, 0x100, 0x56c96e7a, 0x2, 0xa, 0xffffffffffffffff, 0x9}, 0x2c) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000480)='rpc_pipefs\x00', 0x200000, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000002d00)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f00000004c0)='vmnet0keyring\x00') bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000780)={&(0x7f0000000740)='./file0/file0\x00', r3}, 0x10) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, &(0x7f0000000700)='proc!@ppp1!ppp0ppp0#)lo\\lolo{\x00') mount(&(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000200)='fuseblk\x00', 0xa11800, &(0x7f0000000240)) mount(&(0x7f00000002c0)='./file0/file0\x00', &(0x7f0000000300)='./file0/file0\x00', &(0x7f0000000340)='minix\x00', 0x0, &(0x7f0000000380)) 2018/03/29 17:35:03 executing program 5: 2018/03/29 17:35:03 executing program 4: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)={0xb, 0x7e, 0x3, 0x1, 0x11}, 0x2c) mount(&(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) r1 = socket$kcm(0x29, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000000bc0)={&(0x7f00000007c0)=@rc={0x1f, {0x5, 0x50000000, 0xaa2, 0x613, 0x4, 0x1ff}, 0x3f}, 0x80, &(0x7f0000000940)=[{&(0x7f0000000840)="09c9453aa30d8c5fba221fa2413f12c580837b2ae292e3ee8dd00098c404125a1a2e63840f82a2f69c3927af43b828422484aaeeceebcbe76e999bd3930c9b7c2995484407f9166e39c2069a88b63a980b9b5ffc880f4b89dde5adae6c7fb84ed98cbac860214dfb0b28d1b2e2d58aefebdfe515334f2ffa46be22ef7a4b3a276cb70a27c9e9f5de0a20bad24cbe2b89aee9693c2f8f186ea59fcfc4ebec7188cca0418d4583a6f1730f62416d70cd62555eb4f58ea831d1fea9956a2cba0049f23bf0b249f5de2ce0dc303808d70b0ccab3c7f37e949e", 0xd7}], 0x1, &(0x7f0000000980), 0x0, 0x20004805}, 0x4010) r2 = perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x2367, 0x7fff, 0x1, 0x6, 0x0, 0x78b1, 0x1, 0x0, 0x4992c766, 0xff, 0x81, 0x100, 0x40, 0x3, 0x9, 0x8, 0x1, 0x10000, 0x0, 0x6, 0x90e, 0x9, 0x7ff, 0x0, 0x8, 0x1, 0x30, 0x20, 0x7fffffff, 0x6, 0x401, 0x2, 0x1000, 0x8001, 0x1ff, 0xfffffffffffffff8, 0x0, 0x2, 0x0, @perf_config_ext={0x5, 0x8}, 0x1ab23, 0x3f, 0x8, 0x5, 0x6}, 0xffffffffffffffff, 0x10, r0, 0x1) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0xb, 0x9, &(0x7f0000000580)=@framed={{0x18}, [@map={0x18, 0x0, 0x1, 0x0, r0}, @generic={0x3ff, 0xfffffffffffffffc}, @call={0x85, 0x0, 0x0, 0x6}], {0x95}}, &(0x7f0000000600)='syzkaller\x00', 0x0, 0x30, &(0x7f0000000640)=""/48, 0x41f00, 0x1}, 0x48) ioctl$PERF_EVENT_IOC_SET_BPF(r2, 0x40042408, r3) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000000)={&(0x7f0000000080)='./file0/file0\x00', r0}, 0x10) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000400)=@ax25={0x3, {"02f47b3723e03d"}}, 0x80, &(0x7f00000017c0), 0x0, &(0x7f0000001840)=ANY=[], 0x0, 0x24004044}, 0x4008001) bpf$MAP_CREATE(0x0, &(0x7f0000002cc0)={0x5, 0x100, 0x56c96e7a, 0x2, 0xa, 0xffffffffffffffff, 0x9}, 0x2c) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000480)='rpc_pipefs\x00', 0x200000, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000002d00)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f00000004c0)='vmnet0keyring\x00') bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000780)={&(0x7f0000000740)='./file0/file0\x00', r4}, 0x10) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x40082406, &(0x7f0000000700)='proc!@ppp1!ppp0ppp0#)lo\\lolo{\x00') mount(&(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000200)='fuseblk\x00', 0xa11800, &(0x7f0000000240)) r5 = syz_open_dev$sg(&(0x7f0000000240)='/dev/sg#\x00', 0xfffffffffffffffa, 0x800) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000280)={r5, r3, 0x5, 0x1}, 0x10) ioctl$TIOCCONS(r5, 0x541d) mount(&(0x7f00000002c0)='./file0/file0\x00', &(0x7f0000000300)='./file0/file0\x00', &(0x7f0000000340)='minix\x00', 0x1000, &(0x7f0000000380)) 2018/03/29 17:35:03 executing program 1: 2018/03/29 17:35:03 executing program 6: 2018/03/29 17:35:03 executing program 7: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)={0xb, 0x7e, 0x3, 0x1, 0x11}, 0x2c) mount(&(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) r1 = socket$kcm(0x29, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000000bc0)={&(0x7f00000007c0)=@rc={0x1f, {0x5, 0x50000000, 0xaa2, 0x613, 0x4, 0x1ff}, 0x3f}, 0x80, &(0x7f0000000940)=[{&(0x7f0000000840)="09c9453aa30d8c5fba221fa2413f12c580837b2ae292e3ee8dd00098c404125a1a2e63840f82a2f69c3927af43b828422484aaeeceebcbe76e999bd3930c9b7c2995484407f9166e39c2069a88b63a980b9b5ffc880f4b89dde5adae6c7fb84ed98cbac860214dfb0b28d1b2e2d58aefebdfe515334f2ffa46be22ef7a4b3a276cb70a27c9e9f5de0a20bad24cbe2b89aee9693c2f8f186ea59fcfc4ebec7188cca0418d4583a6f1730f62416d70cd62555eb4f58ea831d1fea9956a2cba0049f23bf0b249f5de2ce0dc303808d70b0ccab3c7f37e949e", 0xd7}], 0x1, &(0x7f0000000980), 0x0, 0x20004805}, 0x4010) r2 = perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x2367, 0x7fff, 0x1, 0x6, 0x0, 0x78b1, 0x1, 0x0, 0x4992c766, 0xff, 0x81, 0x100, 0x40, 0x3, 0x9, 0x8, 0x1, 0x10000, 0x0, 0x6, 0x90e, 0x9, 0x7ff, 0x0, 0x8, 0x1, 0x30, 0x20, 0x7fffffff, 0x6, 0x401, 0x2, 0x1000, 0x8001, 0x1ff, 0xfffffffffffffff8, 0x0, 0x2, 0x0, @perf_config_ext={0x5, 0x8}, 0x1ab23, 0x3f, 0x8, 0x5, 0x6, 0x0, 0x6}, 0xffffffffffffffff, 0x10, r0, 0x1) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0xb, 0x9, &(0x7f0000000580)=@framed={{0x18}, [@map={0x18, 0x0, 0x1, 0x0, r0}, @generic={0x3ff, 0xfffffffffffffffc, 0x1}, @call={0x85, 0x0, 0x0, 0x6}], {0x95}}, &(0x7f0000000600)='syzkaller\x00', 0x0, 0x30, &(0x7f0000000640)=""/48, 0x41f00, 0x1}, 0x48) ioctl$PERF_EVENT_IOC_SET_BPF(r2, 0x40042408, r3) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000000)={&(0x7f0000000240)='./file0/file0\x00', r0}, 0xffffff44) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000400)=@ax25={0x3, {"02f47b3723e03d"}}, 0x80, &(0x7f00000017c0), 0x0, &(0x7f0000001840)=ANY=[], 0x0, 0x24004044}, 0x4008001) bpf$MAP_CREATE(0x0, &(0x7f0000002cc0)={0x5, 0x0, 0x56c96e7a, 0x2, 0xa, 0xffffffffffffffff, 0x9}, 0x2c) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000480)='rpc_pipefs\x00', 0x200000, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000002d00)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f00000004c0)='vmnet0keyring\x00') bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000780)={&(0x7f0000000740)='./file0/file0\x00', r4}, 0x10) acct(&(0x7f0000000280)='./file0/file0\x00') ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x40082406, &(0x7f0000000700)='proc!@ppp1!ppp0ppp0#)lo\\lolo{\x00') mount(&(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000200)='fuseblk\x00', 0xa11800, &(0x7f0000000240)) mount(&(0x7f00000002c0)='./file0/file0\x00', &(0x7f0000000300)='./file0/file0\x00', &(0x7f0000000340)='minix\x00', 0x1000, &(0x7f0000000380)) 2018/03/29 17:35:03 executing program 4: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)={0xb, 0x7e, 0x3, 0x1, 0x11}, 0x2c) mount(&(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) r1 = socket$kcm(0x29, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000000bc0)={&(0x7f00000007c0)=@rc={0x1f, {0x5, 0x50000000, 0xaa2, 0x613, 0x4, 0x1ff}, 0x3f}, 0x80, &(0x7f0000000940)=[{&(0x7f0000000840)="09c9453aa30d8c5fba221fa2413f12c580837b2ae292e3ee8dd00098c404125a1a2e63840f82a2f69c3927af43b828422484aaeeceebcbe76e999bd3930c9b7c2995484407f9166e39c2069a88b63a980b9b5ffc880f4b89dde5adae6c7fb84ed98cbac860214dfb0b28d1b2e2d58aefebdfe515334f2ffa46be22ef7a4b3a276cb70a27c9e9f5de0a20bad24cbe2b89aee9693c2f8f186ea59fcfc4ebec7188cca0418d4583a6f1730f62416d70cd62555eb4f58ea831d1fea9956a2cba0049f23bf0b249f5de2ce0dc303808d70b0ccab3c7f37e949e", 0xd7}], 0x1, &(0x7f0000000980), 0x0, 0x20004805}, 0x4010) r2 = perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x2367, 0x7fff, 0x1, 0x6, 0x0, 0x78b1, 0x1, 0x0, 0x4992c766, 0xff, 0x81, 0x100, 0x40, 0x3, 0x9, 0x8, 0x1, 0x10000, 0x0, 0x6, 0x90e, 0x9, 0x7ff, 0x0, 0x8, 0x1, 0x30, 0x20, 0x7fffffff, 0x6, 0x401, 0x2, 0x1000, 0x8001, 0x1ff, 0xfffffffffffffff8, 0x0, 0x2, 0x0, @perf_config_ext={0x5, 0x8}, 0x1ab23, 0x3f, 0x8, 0x5, 0x6}, 0xffffffffffffffff, 0x10, r0, 0x1) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0xb, 0x9, &(0x7f0000000580)=@framed={{0x18}, [@map={0x18, 0x0, 0x1, 0x0, r0}, @generic={0x3ff, 0xfffffffffffffffc}, @call={0x85, 0x0, 0x0, 0x6}], {0x95}}, &(0x7f0000000600)='syzkaller\x00', 0x0, 0x30, &(0x7f0000000640)=""/48, 0x41f00, 0x1}, 0x48) ioctl$PERF_EVENT_IOC_SET_BPF(r2, 0x40042408, r3) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000000)={&(0x7f0000000080)='./file0/file0\x00', r0}, 0x10) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000400)=@ax25={0x3, {"02f47b3723e03d"}}, 0x80, &(0x7f00000017c0), 0x0, &(0x7f0000001840)=ANY=[], 0x0, 0x24004044}, 0x4008001) bpf$MAP_CREATE(0x0, &(0x7f0000002cc0)={0x5, 0x100, 0x56c96e7a, 0x2, 0xa, 0xffffffffffffffff, 0x9}, 0x2c) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000480)='rpc_pipefs\x00', 0x200000, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000002d00)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f00000004c0)='vmnet0keyring\x00') bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000780)={&(0x7f0000000740)='./file0/file0\x00', r4}, 0x10) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x40082406, &(0x7f0000000700)='proc!@ppp1!ppp0ppp0#)lo\\lolo{\x00') mount(&(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000200)='fuseblk\x00', 0xa11800, &(0x7f0000000240)) r5 = syz_open_dev$sg(&(0x7f0000000240)='/dev/sg#\x00', 0xfffffffffffffffa, 0x800) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000280)={r5, r3, 0x5, 0x1}, 0x10) ioctl$TIOCCONS(r5, 0x541d) mount(&(0x7f00000002c0)='./file0/file0\x00', &(0x7f0000000300)='./file0/file0\x00', &(0x7f0000000340)='minix\x00', 0x1000, &(0x7f0000000380)) 2018/03/29 17:35:03 executing program 5: 2018/03/29 17:35:03 executing program 0: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)={0xb, 0x7e, 0x3, 0x1, 0x11}, 0x2c) mount(&(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) r1 = socket$kcm(0x29, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000000bc0)={&(0x7f00000007c0)=@rc={0x1f, {0x5, 0x50000000, 0xaa2, 0x613, 0x4, 0x1ff}}, 0x80, &(0x7f0000000940)=[{&(0x7f0000000840)="09c9453aa30d8c5fba221fa2413f12c580837b2ae292e3ee8dd00098c404125a1a2e63840f82a2f69c3927af43b828422484aaeeceebcbe76e999bd3930c9b7c2995484407f9166e39c2069a88b63a980b9b5ffc880f4b89dde5adae6c7fb84ed98cbac860214dfb0b28d1b2e2d58aefebdfe515334f2ffa46be22ef7a4b3a276cb70a27c9e9f5de0a20bad24cbe2b89aee9693c2f8f186ea59fcfc4ebec7188cca0418d4583a6f1730f62416d70cd62555eb4f58ea831d1fea9956a2cba0049f23bf0b249f5de2ce0dc303808d70b0ccab3c7f37e949e", 0xd7}], 0x1, &(0x7f0000000980)}, 0x4010) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0xb, 0x9, &(0x7f0000000580)=@framed={{0x18}, [@map={0x18, 0x0, 0x1, 0x0, r0}, @generic={0x3ff, 0xfffffffffffffffc, 0x1}, @call={0x85, 0x0, 0x0, 0x6}], {0x95}}, &(0x7f0000000600)='syzkaller\x00', 0x0, 0x30, &(0x7f0000000640)=""/48, 0x41f00, 0x1}, 0x48) ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, r2) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000000)={&(0x7f0000000080)='./file0/file0\x00', r0}, 0x10) sendmsg(r1, &(0x7f0000000540)={&(0x7f0000000240)=@llc={0x1a, 0x204, 0x0, 0x4, 0xfffffffffffffffd, 0x20, @remote={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xbb}}, 0x80, &(0x7f0000000500)=[{&(0x7f0000000c00)="24bdec4e3600791ec431b3f922d16528aeb6c0d028c3106883aa9ea0ee9cab900465923fbde50e3a56add97fd06dcdbe5dfc367cb466ba24cacc4a138e2269584508a47237c2b170e71902433f09211df4f240e028ca65cc9de25f9e4ee6c779700a4ab72e110d3496451cf4190eb00fc81e1a95ab21ad4d295d181f3b8d66fee3603e97eccc7e262fc6ad06de000f0a5ce5cc4d6a982295e4f0ace2c46300553a5322d4b8a8e82f893dcb333c2ee6f9340a5693ba2db53a696315ba6003ab48abbccb9a6ff9141e463ca7d0a88ee170b5b67fa86db2bc952c11950f3bfd06156a13348e33f85e8b1a21c8e9e6ce436f05a46c20cc98ecfdfeda90e5f8043ab52f50309af2fff90d5a70222bbe71f8a52f2f926ad49dd6a6a781cd31ae6f03e7fc4e82af6ebbe44faadaf09d6491eb73deeaaadc2279ac90360ac3eb8a176fae32192173804e8dd187096a405cd961d7e8c7f11b065d98098a8a48dcb4e2611af9a5a99a946e48014b091b67fb0105f6dce2bc83ef419a8b538e9ea088e1a3ee712395fd3402a8029bd7d6cd8ab9e9f557606bde6ec63ea3c2a73e84acf116ded3fe2b5d6ba5f3bdc96e438625fbea4ca683c89e8e1733762512351ebf61bbe49c8944df4526de7a9112f29de518c1acd0d76dc9cdc8811cc1d474029bf9946faa1f7b21d41ceafe02cdd4dd5e97640f2ef6425e8fa3351c42ae1b91c472dfddb3d0a1697ff57733f69d42bec7b65e586f197db15c8e33b4ab353ed70492d2f0ea7661915ba2f27d5eb0902f135a6b13810605fda2eecdce5f14c50708fcd43c81feba281576a76be1a899d440e2e00e7fafc89e8a534b470a0491d0abe2158695d416271c7f7c5c3b3d846aae190a0fd0ba75d15ea4d7cbace9a90903a692095b6e217a68fd7bf1382d0e6e0d56a000eba8a04a64ee2673cee6eb65f0f3122ffdfbd2a2a1203626bdc4eb7d8ecd0e0ad013de5327d07291a0290d916dec745b56f03af7b09b4bcabc42074e2c70718403b71eef01f27308d8a9322d2a4c17a50c0e6e59964befb0e36fdb5302ab04f155776ce6baf6b2cfeeaeaf98405eed9f6250cbfa0777d2bf5a0de157c0ab6b14e70a645b973530e1970b57a2c272ff09153bb3ecaa71ac7af15206e766e60288a6691fcf4317371e8ff3c0cb2c1a70d627b69438f60079e7ef27fdacd64b6bd9e1ee1e87c10174a646728d92d87a98105fb049ba9d8460a6b72c305041a38844b5283febc4f22623de096f32d9b101065e536ae38d43f482a59c860d9bee1a71f4054b44f3158eb2fbfc1898857d05d31a0c1b2199f1c0ae7c3926473f51cafaf7ee17d900392ac0b005a19f5fefe808af79ae72c270d2bd9abb90089372e2513d13732a384b279e585ae28f30cf5fe2a898b553f1aaf40edfae77bce713416e0577eddc1fd4efb15821f487441889d8ef80d4d78cadb37b3d3134d4932baa93222bef59113beef8d28f2ba1b97b8f089d2be9a98176b0c2f489a93dbb841fcfe0820480b52c8e6e4f6555a2e1fa55ada7228af3eb2e153aeb63d01e6391299ecd691424dc2b1dbb950bb9c21fb5291faa82589e7c38356a438830544936d30729dd61a649d1380bdcf60434e2149472bb17b99a8eb77084d36f38838d45c5820d64500cd25a1153966ba38f096f2b9c6fae2e60bb9b80705a95d0597b668c8482e3aaa574e439cab30e09d22a54d860cf0e1633597c9665fe34704fb869ffb9c2254b0c179a3b7ea743c594af257b3dc05f8ddc28b43c60cb66c8f0e6d1d04a8a49e31942181dc3f5ca1467aff9433f69d81a8efd56faac76439f825553225aebcdd4fca8ff3f54a44ac2a2c0088701835d22a0f55d05ab3ad9de57112aff92c0bc1beb9bf57e886b26b7d389d2292cde4edc9acca4dc72dd2ab8584de6ecab25140845ea9dfd04e99afb117d50308cef98641c9baeeb77c97762796d8bc910290edef0d3ad1acc769b2bf3c7483fe843ddca0c18f64b2a5ee2de6a1ae49c3bdcdbe6fdb2c6d5ff78933a649dfd1bec38a29d470d4b42007b941879db75490d8b8d35ef622f41c6e2e827a9d41376eb35cc9d472ad48af1f7e35e4b76b3998d880ef9db267fa0756e6d664901b9705d0c2d09d94f0b1ce11b2e516183ca9670430ba380f1b666385ce4ff4e6deba5eb56a66a7c0b03c79afc1c1253b87af33a2e81b11ac82716abb117e3fe713e5bd2d49a40966c7bbcda1035535614a35ac414f7885aeb1dfb5d051d690e27710da72b76100c9590045e37e2e29ee7cb402ea3cb2bfb6fbb553494d2b2fd70d7bedb2bfaec95f29e193a351e6f8f3d28e353b7def276578aa7bd06f4181cf4fd94673c13b86067836f0e551fd8e677e7181f6a475e7f38a6649b8fb485c0657092445d67ced22bc800c06249b29df6c69be9564dc679732a07d80c3456382f0494f390e32bb2289799854e133d71e0a71ba0c99673e71863e067e8fc18405f0b2654a542a98792960473e4a6f1f48fc73b7dc15d39dc34615eb24dbfbd5bd0ae66051f726c5e1c7226c1cd2d3d7ab4f96f27ce004cde6044ce7aa806ee3ca791dbc24845b50b975f8c14df21679b6871f71ef820a65731a8f9641dd5c9037b90e11a24a1d4b00f277dc7c4ce0d4fe0f7bb98f00e905225b254f9294b4992972a0baa07be5a28516a67cc78335408509332aaa900f6959432f2be85f8c03098c52967b1d97ee8d35c35e197e44c2a47f490552357fe5455e60cdb340cf361b9a113f66e46e22a23151842c5480cd3a6511bb75966acb86f29cce95b5e5b2fee26528a81bb6962275ea1d04f6eadc4c3f815be026fd4ff6042641020790605b9208f5e7e93a38bdd648d3f4ac6663325fc46022f8c405b4e67957c071f0b8ef1abb4741f5ea447287662d946663998d01abcf1935461cf8d5d3808aaf5d7118d2be5a4f46c4876b3eb35c55e065165f0401e64d14220db8a37d5fb82466b6955d8ce044b02f9f6624d8a15926f374dcd11002426c722c566755fdaacc31c7a3a85e2123e5a8b9b55ec4c51153b9e020d8a65392cb8d8234f681519e45b32c646ab660644e9966210510c02f3d94ed4d3f28a3e5e39346905cfba3afe00f3739b549bbbcb336493e5594443be16aadb2dfad0b7c2994251e5794aad1478457caa652d47b146fc9f5689640207cbed9857d17a09697431c1eccf1ca8c5688ba2c2585f52d1bbcf3b82cf51ba30f8607eecd13ffaa6dc12dc3241ff1cf3cf87cca4b740a369fe5e6c244e28f7c5babd01548d940bc1e5d717712f4f6e0e9d9e689c650e4cd5bf078a6727e2871be866b7b9a9ccae3b675360d994531dc27747b1701695c4a67acab2718fabbaa2733afa319155906185de2d57c100d7d44fca07fc34171f9792263e378d362d07e93ed173aaadb1128b39ebe02367f45704784694e84dae7ee1c36f83dc7df53b4cf79b373ec95e26eb41c80b0ab62ad8bdddc964b50caedf33ea439183967e090b50d46b56ed8cca5b86894539536e8e08a9420638a5d7751cc294bc4d45c3e068809610dc0fd647a7db91d14947e9fbc8fb865d81392ce3e85c051e21b0b48c1192d29652ad83a9d00f25218fab85c7245a1a1fffc8ae40880736f24a84c565ffa22d1dc06f9a0a15b7ce95f138845621e9ab28a71715c62a47ff7612ff9eddbc626161b22410bba9be67cdcb38020122ed20d748074a42dff230c566d39de428aa6cadb719c450e6d61819060bb2d9ad012ca5e50575ef06cc06a4ba9b473d0ee89b22b825aa74f961b49c7095e022defbcbfd594fa21d5b01ecd715e9c5fba96a6887b24c1ef09fbc4ea758d7ff3ca6b54c730642156020e2a315951f489a0f0babdb65da337602f951b8f15d424226868a5a4d682ce755f7dc76928a69a92d0bb7cc6b72d18f4e4012fcd1662a1e132fc64176e353c0de0aece2de4b3bc3499ccf78e8bf9865185262d4d85cafb580852d27320e78b70e63f47f66d2699c71ff8714efb68a4783daecb03cf7993daa7c4d924a0721e006b50d57f9f4404f43b9417da3b1818af8ec33ce93bac506685e24bac104f6cc8be541371e8568fb61a0daf21742ad2754bc2472c483c76c6bf54e24ee5a82c3ae52fa6642fed16d96af56b939f1c65ac71e3d35f328a9e4dc7684013004fb697c83c8dc7ef7b1c98996b574c9078a0971bcdb802a33ab3c425adb7f1c77f398ba512edd5213797277a1e7dec996a49a3e4e3a65166cf498641707dff28471c59c4131deef1e652c80f8fa3507fe7bb72041d7ffdd86e26e22739f9f1a1af1b253bec3ee79c7a27616ae66050bd5093f01a615f6990923f9a113018485969fcb505be3e66b5765bb0555f08414bfd8d43d98a92ed3d4607245b405c0bac62ca70917963af6ffd802bd408d2aa2214fc9bc9786579ee3ef084aca17c3b6cf9569e7fd0a557f4747d6993af5776744aec6dbb107d0e2a34c8c567cc0dabac583362e8bae6ff789e8c70f99120e938865987a7ce7ec9fc654f25642d8fed14fb8f1a2c7945035920565463ed8372541c0a427e351941481f8d4b6a96dfd7c14496afca1814254c718d4e7ae079298e1c7da6fd36b35e904ec2774a347cde33f85aa6745f2f4005daa02800039bf059cf96a2751dda173d04044284cf55384aa1cd6b90c19ede9a3818cd88bfa52ec380a906fa2651cc67904492b63226c4721362a21a5bcaa16e1a333044cef665eb80ca1c4a114d443ae998c4190af3dec41a62ecc190e3bb93c7e8d7dfc8070328b567ae71b1468a0201eeb318482040ef6e22dd3a87a65a2daa639a41a43ff824e35adbb49d2e2b12efcc85bc6622885e0fbbc2ad0306da24c40be8cde91b091440d06101b3beb6790c793435c2c5d16b4696b4d88d4e1e0df1598ac98bf7baf52d9b0ddd595280bfa996dc46bf8993b1b0d4c89691a6f1a7d7d5a75919c8540293c9e26211446c51b3483c936d2f6ed1ba5762c693aad34bb7283d6cb5c80bea9994cc9a57ae61ca9418679050269c4000675eef02d5c982599cadaddc1bf5a0fb38d93958d442195e0c3e6b30a17c9e0d1c5e19d7fb72f3feb7bea1341ec03ecbb75785c0ad2170b7a084a0b2be1ebcf7ea9e2f57f04f2a9db1a843bc5b73c68f8c66fa419ecc29baaa0011d9c9b8b233da938aa0a8e304396359997898eda1835e3d4e99f136ec6d3474da59ec896211985099e303d3a17ea021d4c4a76e75eb43955d3fe044203bf8672919e4b76bdeb171ea75532eb409284d4d187ce7f657d2503d4df73c4cfe76063c45b754b44bbc0aee72b156f53d132a8bae25fdde9e2e8fd9039fd13670ad3d6356b564ac3606b2ad5900bd0aee2431ddc45667f52b41ff31455d97488aec9c5afc92dd0769a3c135ef6b078210e88c5513c27aa85a52e593f8442de91f9507448db3dd4a479b02f14d7e10c3969c772ee46a2f991ba40984cd269bc1c67601e31e0242b889723ba6b500a2fc20efa0883cb317ee43aa6fbc096f3d533ed0466798e4961593fb2d3899203904328832bfc6f89d395b4ac4b9dc6d007348cc298bc04d1af104257899094b6f511f9d7943c0bfd81a3c3dd271e7374ecd4a32b92cd8a37b88d8c8153640fb741c1913d83f302d1d6cc38d3323210f6520a2bc30857d595c4619251cd7e39814d6b088b7aa6c4dec480f2770a80cadc446c1b2df90ae2683fd9a60cb92efedc4a532596b267e5fc9b57ca708665c0f89b974226a04a3a5b1be8be01a7c8f636b88a215b61852b7980aa277711a98601ab128fd3f4bdeb7743b8d1", 0x1000}], 0x1, 0x0, 0x0, 0x4000000}, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000400)=@ax25={0x3, {"02f47b3723e03d"}}, 0x80, &(0x7f00000017c0), 0x0, &(0x7f0000001840)=ANY=[], 0x0, 0x24004044}, 0x4008001) bpf$MAP_CREATE(0x0, &(0x7f0000002cc0)={0x5, 0x100, 0x56c96e7a, 0x2, 0xa, 0xffffffffffffffff, 0x9}, 0x2c) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000480)='rpc_pipefs\x00', 0x200000, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000002d00)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f00000004c0)='vmnet0keyring\x00') bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000780)={&(0x7f0000000740)='./file0/file0\x00', r3}, 0x10) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, &(0x7f0000000700)='proc!@ppp1!ppp0ppp0#)lo\\lolo{\x00') mount(&(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000200)='fuseblk\x00', 0xa11800, &(0x7f0000000240)) mount(&(0x7f00000002c0)='./file0/file0\x00', &(0x7f0000000300)='./file0/file0\x00', &(0x7f0000000340)='minix\x00', 0x0, &(0x7f0000000380)) 2018/03/29 17:35:03 executing program 3: r0 = socket(0xa, 0x2, 0x0) r1 = open(&(0x7f00004b8ff8)='./file0\x00', 0x28042, 0x0) connect$inet6(r0, &(0x7f0000d3cfe4)={0xa, 0x0, 0x0, @mcast2={0xff, 0x2, [], 0x1}, 0x3}, 0x1c) ioctl$DRM_IOCTL_ADD_CTX(r1, 0xc0086420, &(0x7f0000000000)) ioctl$DRM_IOCTL_NEW_CTX(r1, 0x40086425, &(0x7f00000000c0)={0x0, 0x3}) fallocate(r1, 0x0, 0xffff, 0x1f) setsockopt$inet6_mtu(0xffffffffffffffff, 0x29, 0x17, &(0x7f0000000100)=0x2, 0x4) connect$inet(r0, &(0x7f0000000040)={0x2, 0x4e22, @multicast1=0xe0000001}, 0x10) sendfile(r0, r1, &(0x7f00005faff8), 0xfffb) 2018/03/29 17:35:03 executing program 2: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)={0xb, 0x7e, 0x3, 0x1, 0x11}, 0x2c) mount(&(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) r1 = socket$kcm(0x29, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000000bc0)={&(0x7f00000007c0)=@rc={0x1f, {0x5, 0x50000000, 0xaa2, 0x613, 0x4, 0x1ff}, 0x3f}, 0x80, &(0x7f0000000940)=[{&(0x7f0000000840)="09c9453aa30d8c5fba221fa2413f12c580837b2ae292e3ee8dd00098c404125a1a2e63840f82a2f69c3927af43b828422484aaeeceebcbe76e999bd3930c9b7c2995484407f9166e39c2069a88b63a980b9b5ffc880f4b89dde5adae6c7fb84ed98cbac860214dfb0b28d1b2e2d58aefebdfe515334f2ffa46be22ef7a4b3a276cb70a27c9e9f5de0a20bad24cbe2b89aee9693c2f8f186ea59fcfc4ebec7188cca0418d4583a6f1730f62416d70cd62555eb4f58ea831d1fea9956a2cba0049f23bf0b249f5de2ce0dc303808d70b0ccab3c7f37e949e", 0xd7}], 0x1, &(0x7f0000000980), 0x0, 0x20004805}, 0x4010) r2 = perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x2367, 0x7fff, 0x1, 0x6, 0x0, 0x78b1, 0x1, 0x0, 0x4992c766, 0xff, 0x81, 0x100, 0x40, 0x3, 0x9, 0x8, 0x1, 0x10000, 0x0, 0x6, 0x90e, 0x9, 0x7ff, 0x0, 0x8, 0x1, 0x30, 0x20, 0x7fffffff, 0x6, 0x401, 0x2, 0x1000, 0x8001, 0x1ff, 0xfffffffffffffff8, 0x0, 0x2, 0x0, @perf_config_ext={0x5, 0x8}, 0x1ab23, 0x0, 0x8, 0x5, 0x6, 0x0, 0x6}, 0xffffffffffffffff, 0x10, r0, 0x1) bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0xb, 0x9, &(0x7f0000000580)=@framed={{0x18}, [@map={0x18, 0x0, 0x1, 0x0, r0}, @generic={0x3ff, 0xfffffffffffffffc, 0x1}, @call={0x85, 0x0, 0x0, 0x6}], {0x95}}, &(0x7f0000000600)='syzkaller\x00', 0x0, 0x30, &(0x7f0000000640)=""/48, 0x41f00, 0x1}, 0x48) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000000)={&(0x7f0000000080)='./file0/file0\x00', r0}, 0x10) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000400)=@ax25={0x3, {"02f47b3723e03d"}}, 0x80, &(0x7f00000017c0), 0x0, &(0x7f0000001840)=ANY=[], 0x0, 0x24004044}, 0x4008001) bpf$MAP_CREATE(0x0, &(0x7f0000002cc0)={0x5, 0x0, 0x56c96e7a, 0x2, 0xa, 0xffffffffffffffff, 0x9}, 0x2c) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000480)='rpc_pipefs\x00', 0x200000, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000002d00)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f00000004c0)='vmnet0keyring\x00') bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000780)={&(0x7f0000000740)='./file0/file0\x00', r3}, 0x10) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x40082406, &(0x7f0000000700)='proc!@ppp1!ppp0ppp0#)lo\\lolo{\x00') mount(&(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000200)='fuseblk\x00', 0x80000, &(0x7f0000000240)) mount(&(0x7f00000002c0)='./file0/file0\x00', &(0x7f0000000300)='./file0/file0\x00', &(0x7f0000000340)='minix\x00', 0x1000, &(0x7f0000000380)) 2018/03/29 17:35:03 executing program 1: 2018/03/29 17:35:03 executing program 6: 2018/03/29 17:35:03 executing program 5: 2018/03/29 17:35:03 executing program 4: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)={0xb, 0x7e, 0x3, 0x1, 0x11}, 0x2c) mount(&(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) r1 = socket$kcm(0x29, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000000bc0)={&(0x7f00000007c0)=@rc={0x1f, {0x5, 0x50000000, 0xaa2, 0x613, 0x4, 0x1ff}, 0x3f}, 0x80, &(0x7f0000000940)=[{&(0x7f0000000840)="09c9453aa30d8c5fba221fa2413f12c580837b2ae292e3ee8dd00098c404125a1a2e63840f82a2f69c3927af43b828422484aaeeceebcbe76e999bd3930c9b7c2995484407f9166e39c2069a88b63a980b9b5ffc880f4b89dde5adae6c7fb84ed98cbac860214dfb0b28d1b2e2d58aefebdfe515334f2ffa46be22ef7a4b3a276cb70a27c9e9f5de0a20bad24cbe2b89aee9693c2f8f186ea59fcfc4ebec7188cca0418d4583a6f1730f62416d70cd62555eb4f58ea831d1fea9956a2cba0049f23bf0b249f5de2ce0dc303808d70b0ccab3c7f37e949e", 0xd7}], 0x1, &(0x7f0000000980), 0x0, 0x20004805}, 0x4010) r2 = perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x2367, 0x7fff, 0x1, 0x6, 0x0, 0x78b1, 0x1, 0x0, 0x4992c766, 0xff, 0x81, 0x100, 0x40, 0x3, 0x9, 0x8, 0x1, 0x10000, 0x0, 0x6, 0x90e, 0x9, 0x7ff, 0x0, 0x8, 0x1, 0x30, 0x20, 0x7fffffff, 0x6, 0x401, 0x2, 0x1000, 0x8001, 0x1ff, 0xfffffffffffffff8, 0x0, 0x2, 0x0, @perf_config_ext={0x5, 0x8}, 0x1ab23, 0x3f, 0x8, 0x5, 0x6}, 0xffffffffffffffff, 0x10, r0, 0x1) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0xb, 0x9, &(0x7f0000000580)=@framed={{0x18}, [@map={0x18, 0x0, 0x1, 0x0, r0}, @generic={0x3ff, 0xfffffffffffffffc}, @call={0x85, 0x0, 0x0, 0x6}], {0x95}}, &(0x7f0000000600)='syzkaller\x00', 0x0, 0x30, &(0x7f0000000640)=""/48, 0x41f00, 0x1}, 0x48) ioctl$PERF_EVENT_IOC_SET_BPF(r2, 0x40042408, r3) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000000)={&(0x7f0000000080)='./file0/file0\x00', r0}, 0x10) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000400)=@ax25={0x3, {"02f47b3723e03d"}}, 0x80, &(0x7f00000017c0), 0x0, &(0x7f0000001840)=ANY=[], 0x0, 0x24004044}, 0x4008001) bpf$MAP_CREATE(0x0, &(0x7f0000002cc0)={0x5, 0x100, 0x56c96e7a, 0x2, 0xa, 0xffffffffffffffff, 0x9}, 0x2c) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000480)='rpc_pipefs\x00', 0x200000, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000002d00)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f00000004c0)='vmnet0keyring\x00') bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000780)={&(0x7f0000000740)='./file0/file0\x00', r4}, 0x10) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x40082406, &(0x7f0000000700)='proc!@ppp1!ppp0ppp0#)lo\\lolo{\x00') mount(&(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000200)='fuseblk\x00', 0xa11800, &(0x7f0000000240)) r5 = syz_open_dev$sg(&(0x7f0000000240)='/dev/sg#\x00', 0xfffffffffffffffa, 0x800) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000280)={r5, r3, 0x5, 0x1}, 0x10) ioctl$TIOCCONS(r5, 0x541d) mount(&(0x7f00000002c0)='./file0/file0\x00', &(0x7f0000000300)='./file0/file0\x00', &(0x7f0000000340)='minix\x00', 0x1000, &(0x7f0000000380)) 2018/03/29 17:35:03 executing program 5: 2018/03/29 17:35:04 executing program 1: 2018/03/29 17:35:04 executing program 6: 2018/03/29 17:35:04 executing program 7: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)={0xb, 0x7e, 0x3, 0x1, 0x11}, 0x2c) mount(&(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) r1 = socket$kcm(0x29, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000000bc0)={&(0x7f00000007c0)=@rc={0x1f, {0x5, 0x50000000, 0xaa2, 0x613, 0x4, 0x1ff}, 0x3f}, 0x80, &(0x7f0000000940)=[{&(0x7f0000000840)="09c9453aa30d8c5fba221fa2413f12c580837b2ae292e3ee8dd00098c404125a1a2e63840f82a2f69c3927af43b828422484aaeeceebcbe76e999bd3930c9b7c2995484407f9166e39c2069a88b63a980b9b5ffc880f4b89dde5adae6c7fb84ed98cbac860214dfb0b28d1b2e2d58aefebdfe515334f2ffa46be22ef7a4b3a276cb70a27c9e9f5de0a20bad24cbe2b89aee9693c2f8f186ea59fcfc4ebec7188cca0418d4583a6f1730f62416d70cd62555eb4f58ea831d1fea9956a2cba0049f23bf0b249f5de2ce0dc303808d70b0ccab3c7f37e949e", 0xd7}], 0x1, &(0x7f0000000980), 0x0, 0x20004805}, 0x4010) r2 = perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x2367, 0x7fff, 0x1, 0x6, 0x0, 0x78b1, 0x1, 0x0, 0x4992c766, 0xff, 0x81, 0x100, 0x40, 0x3, 0x9, 0x8, 0x1, 0x10000, 0x0, 0x6, 0x90e, 0x9, 0x7ff, 0x0, 0x8, 0x1, 0x30, 0x20, 0x7fffffff, 0x6, 0x401, 0x2, 0x1000, 0x8001, 0x1ff, 0xfffffffffffffff8, 0x0, 0x2, 0x0, @perf_config_ext={0x5, 0x8}, 0x1ab23, 0x3f, 0x8, 0x5, 0x6, 0x0, 0x6}, 0xffffffffffffffff, 0x10, r0, 0x1) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0xb, 0x9, &(0x7f0000000580)=@framed={{0x18}, [@map={0x18, 0x0, 0x1, 0x0, r0}, @generic={0x3ff, 0xfffffffffffffffc, 0x1}, @call={0x85, 0x0, 0x0, 0x6}], {0x95}}, &(0x7f0000000600)='syzkaller\x00', 0x0, 0x30, &(0x7f0000000640)=""/48, 0x41f00, 0x1}, 0x48) ioctl$PERF_EVENT_IOC_SET_BPF(r2, 0x40042408, r3) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000000)={&(0x7f0000000080)='./file0/file0\x00', r0}, 0x10) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000400)=@ax25={0x3, {"02f47b3723e03d"}}, 0x80, &(0x7f00000017c0), 0x0, &(0x7f0000001840)=ANY=[], 0x0, 0x24004044}, 0x4008001) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000002cc0)={0x5, 0x0, 0x56c96e7a, 0x2, 0xa, 0xffffffffffffffff, 0x9}, 0x2c) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000480)='rpc_pipefs\x00', 0x200000, 0x0) r5 = epoll_create(0x7f) epoll_ctl$EPOLL_CTL_MOD(r5, 0x3, r4, &(0x7f0000000a00)) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000002d00)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f00000004c0)='vmnet0keyring\x00') ioctl$TUNSETIFF(r3, 0x400454ca, &(0x7f0000000240)={'\x00', 0x210}) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000780)={&(0x7f0000000740)='./file0/file0\x00', r6}, 0x10) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x40082406, &(0x7f0000000700)='proc!@ppp1!ppp0ppp0#)lo\\lolo{\x00') mount(&(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000200)='fuseblk\x00', 0xa11800, &(0x7f0000000240)) mount(&(0x7f00000002c0)='./file0/file0\x00', &(0x7f0000000300)='./file0/file0\x00', &(0x7f0000000340)='minix\x00', 0x1000, &(0x7f0000000380)) r7 = syz_open_dev$midi(&(0x7f0000000280)='/dev/midi#\x00', 0x6, 0x8000) getsockopt$IPT_SO_GET_REVISION_MATCH(r7, 0x0, 0x42, &(0x7f0000000980)={'ipvs\x00'}, &(0x7f00000009c0)=0x1e) 2018/03/29 17:35:04 executing program 1: 2018/03/29 17:35:04 executing program 2: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) ioctl$KVM_CREATE_DEVICE(0xffffffffffffffff, 0xc00caee0, &(0x7f0000000580)={0x3, 0xffffffffffffff9c, 0x1}) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40042409, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)={0xb, 0x7e, 0x3, 0x1, 0x11}, 0x2c) mount(&(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) r2 = socket$kcm(0x29, 0x2, 0x0) sendmsg$kcm(r2, &(0x7f0000000bc0)={&(0x7f00000007c0)=@rc={0x1f, {0x5, 0x50000000, 0xaa2, 0x613, 0x4, 0x1ff}, 0x3f}, 0x80, &(0x7f0000000940)=[{&(0x7f0000000840)="09c9453aa30d8c5fba221fa2413f12c580837b2ae292e3ee8dd00098c404125a1a2e63840f82a2f69c3927af43b828422484aaeeceebcbe76e999bd3930c9b7c2995484407f9166e39c2069a88b63a980b9b5ffc880f4b89dde5adae6c7fb84ed98cbac860214dfb0b28d1b2e2d58aefebdfe515334f2ffa46be22ef7a4b3a276cb70a27c9e9f5de0a20bad24cbe2b89aee9693c2f8f186ea59fcfc4ebec7188cca0418d4583a6f1730f62416d70cd62555eb4f58ea831d1fea9956a2cba0049f23bf0b249f5de2ce0dc303808d70b0ccab3c7f37e949e", 0xd7}], 0x1, &(0x7f0000000980), 0x0, 0x20004805}, 0x4010) r3 = perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x2367, 0x7fff, 0x1, 0x6, 0x0, 0x78b1, 0x1, 0x0, 0x4992c766, 0xff, 0x81, 0x100, 0x40, 0x3, 0x9, 0x8, 0x1, 0x10000, 0x0, 0x6, 0x90e, 0x9, 0x7ff, 0x0, 0x8, 0x1, 0x30, 0x20, 0x7fffffff, 0x6, 0x401, 0x2, 0x1000, 0x8001, 0x1ff, 0xfffffffffffffff8, 0x0, 0x2, 0x0, @perf_config_ext={0x5, 0x8}, 0x1ab23, 0x0, 0x8, 0x5, 0x6, 0x0, 0x6}, 0xffffffffffffffff, 0x10, r1, 0x1) bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0xb, 0x2, &(0x7f00000009c0)=ANY=[@ANYBLOB="180000008d000000000000000500000018000000518400000000000003000000fdf0010010000000000000000000000000000000000600000000000000000000181a00005e3961de4c745d1513c602f41f684153b82fccb64ac5c52953d3ea3703212123a192b2eb3d4b7459610eec75eee608deeec49a1798b56aaa1425e99fd84713acf118f286f45700ce56955241693655c4ef02fa84eb2ed8a8eb5fe39ec58f64e4904b010384d4d1738948d800123621c380ba921a1d22e36c3e95b9e7d23675036865eaafd0c1cdbe82cbc5e306bcee9bb51ea44df0faa5fc07ac2f990476191f4726abdfb477d532b9a473f6cacf9a388e0a4de3", @ANYRES32=r2, @ANYBLOB="00000000000000009500000000000000"], &(0x7f0000000980)='Syzkalwer\x00', 0x0, 0xffffffffffffff71, &(0x7f0000000640)=""/48, 0x41f00, 0x1}, 0x48) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000000)={&(0x7f0000000080)='./file0/file0\x00', r1}, 0x10) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000400)=@ax25={0x3, {"02f47b3723e03d"}}, 0x80, &(0x7f00000017c0), 0x0, &(0x7f0000001840)=ANY=[], 0x0, 0x24004044}, 0x4008001) bpf$MAP_CREATE(0x0, &(0x7f0000002cc0)={0x5, 0x0, 0x56c96e7a, 0x2, 0xa, 0xffffffffffffffff, 0x9}, 0x2c) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000480)='rpc_pipefs\x00', 0x200000, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000002d00)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x40082406, &(0x7f00000004c0)='vmnet0keyring\x00') bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000780)={&(0x7f0000000740)='./file0/file0\x00', r4}, 0x10) ioctl$PERF_EVENT_IOC_SET_FILTER(r3, 0x40082406, &(0x7f0000000700)='proc!@ppp1!ppp0ppp0#)lo\\lolo{\x00') mount(&(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000200)='fuseblk\x00', 0xa11800, &(0x7f0000000240)) mount(&(0x7f00000002c0)='./file0/file0\x00', &(0x7f0000000300)='./file0/file0\x00', &(0x7f0000000340)='minix\x00', 0x1000, &(0x7f0000000380)) 2018/03/29 17:35:04 executing program 5: 2018/03/29 17:35:04 executing program 1: 2018/03/29 17:35:04 executing program 6: 2018/03/29 17:35:04 executing program 3: r0 = socket(0xa, 0x2, 0x0) r1 = open(&(0x7f00004b8ff8)='./file0\x00', 0x28042, 0x0) connect$inet6(r0, &(0x7f0000000140)={0xa, 0xfffffffffffffffe, 0x0, @mcast2={0xff, 0x2, [], 0x1}, 0x3}, 0x1c) ioctl$DRM_IOCTL_ADD_CTX(r1, 0xc0086420, &(0x7f0000000000)) ioctl$DRM_IOCTL_NEW_CTX(r1, 0x40086425, &(0x7f0000000080)={0x0, 0x3}) fallocate(r1, 0x0, 0xffff, 0x1f) setsockopt$inet6_mtu(0xffffffffffffffff, 0x29, 0x17, &(0x7f0000000100)=0x2, 0x4) connect$inet(r0, &(0x7f0000000040)={0x2, 0x4e22, @multicast1=0xe0000001}, 0x10) setsockopt$inet6_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f00000001c0)={@in6={{0xa, 0x4e22, 0x6, @mcast2={0xff, 0x2, [], 0x1}, 0x79f8}}, 0xffffffff, 0x8, 0x6, "4b422cf42720b2215df979ca3ef2da75ca4b9115dee2ecab0916ef6ab58ba0b2b6a267305b31f5be1de5073c2443058045665dae18b39a9964c423fe9f426d4d01ca70a975d79c9f388882884fe2bbc5"}, 0xd8) getsockopt$inet6_int(r1, 0x29, 0xdf, &(0x7f00000000c0), &(0x7f0000000180)=0x4) sendfile(r0, r1, &(0x7f00005faff8), 0xfffb) 2018/03/29 17:35:04 executing program 4: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)={0xb, 0x7e, 0x3, 0x1, 0x11}, 0x2c) mount(&(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) r1 = socket$kcm(0x29, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000000bc0)={&(0x7f00000007c0)=@rc={0x1f, {0x5, 0x50000000, 0xaa2, 0x613, 0x4, 0x1ff}, 0x3f}, 0x80, &(0x7f0000000940)=[{&(0x7f0000000840)="09c9453aa30d8c5fba221fa2413f12c580837b2ae292e3ee8dd00098c404125a1a2e63840f82a2f69c3927af43b828422484aaeeceebcbe76e999bd3930c9b7c2995484407f9166e39c2069a88b63a980b9b5ffc880f4b89dde5adae6c7fb84ed98cbac860214dfb0b28d1b2e2d58aefebdfe515334f2ffa46be22ef7a4b3a276cb70a27c9e9f5de0a20bad24cbe2b89aee9693c2f8f186ea59fcfc4ebec7188cca0418d4583a6f1730f62416d70cd62555eb4f58ea831d1fea9956a2cba0049f23bf0b249f5de2ce0dc303808d70b0ccab3c7f37e949e", 0xd7}], 0x1, &(0x7f0000000980), 0x0, 0x20004805}, 0x4010) r2 = perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x2367, 0x7fff, 0x1, 0x6, 0x0, 0x78b1, 0x1, 0x0, 0x4992c766, 0xff, 0x81, 0x100, 0x40, 0x3, 0x9, 0x8, 0x1, 0x10000, 0x0, 0x6, 0x90e, 0x9, 0x7ff, 0x0, 0x8, 0x1, 0x30, 0x20, 0x7fffffff, 0x6, 0x401, 0x2, 0x1000, 0x8001, 0x1ff, 0xfffffffffffffff8, 0x0, 0x2, 0x0, @perf_config_ext={0x5, 0x8}, 0x1ab23, 0x3f, 0x8, 0x5, 0x6}, 0xffffffffffffffff, 0x10, r0, 0x1) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0xb, 0x7, &(0x7f0000000580)=@framed={{0x18}, [@map={0x18, 0x0, 0x1, 0x0, r0}, @generic={0x3ff, 0xfffffffffffffffc, 0x1}], {0x95}}, &(0x7f0000000600)='syzkaller\x00', 0x0, 0x30, &(0x7f0000000640)=""/48, 0x41f00, 0x1}, 0x48) ioctl$PERF_EVENT_IOC_SET_BPF(r2, 0x40042408, r3) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000000)={&(0x7f0000000080)='./file0/file0\x00', r0}, 0x10) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000400)=@ax25={0x3, {"02f47b3723e03d"}}, 0x80, &(0x7f00000017c0), 0x0, &(0x7f0000001840)=ANY=[], 0x0, 0x24004044}, 0x4008001) bpf$MAP_CREATE(0x0, &(0x7f0000002cc0)={0x5, 0x100, 0x56c96e7a, 0x2, 0xa, 0xffffffffffffffff, 0x9}, 0x2c) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000480)='rpc_pipefs\x00', 0x200000, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000002d00)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f00000004c0)='vmnet0keyring\x00') bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000780)={&(0x7f0000000740)='./file0/file0\x00', r4}, 0x10) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x40082406, &(0x7f0000000700)='proc!@ppp1!ppp0ppp0#)lo\\lolo{\x00') mount(&(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000200)='fuseblk\x00', 0xa11800, &(0x7f0000000240)) r5 = syz_open_dev$sg(&(0x7f0000000240)='/dev/sg#\x00', 0xfffffffffffffffa, 0x800) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000280)={r5, r3, 0x5, 0x1}, 0x10) ioctl$TIOCCONS(r5, 0x541d) mount(&(0x7f00000002c0)='./file0/file0\x00', &(0x7f0000000300)='./file0/file0\x00', &(0x7f0000000340)='minix\x00', 0x1000, &(0x7f0000000380)) 2018/03/29 17:35:04 executing program 5: 2018/03/29 17:35:04 executing program 6: 2018/03/29 17:35:04 executing program 1: 2018/03/29 17:35:04 executing program 0: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)={0xb, 0x7e, 0x3, 0x1, 0x11}, 0x2c) fcntl$setpipe(r0, 0x407, 0x79ec) mount(&(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) r1 = socket$kcm(0x29, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000000bc0)={&(0x7f00000007c0)=@rc={0x1f, {0x5, 0x50000000, 0xaa2, 0x613, 0x4, 0x1ff}}, 0x80, &(0x7f0000000940)=[{&(0x7f0000000840)="09c9453aa30d8c5fba221fa2413f12c580837b2ae292e3ee8dd00098c404125a1a2e63840f82a2f69c3927af43b828422484aaeeceebcbe76e999bd3930c9b7c2995484407f9166e39c2069a88b63a980b9b5ffc880f4b89dde5adae6c7fb84ed98cbac860214dfb0b28d1b2e2d58aefebdfe515334f2ffa46be22ef7a4b3a276cb70a27c9e9f5de0a20bad24cbe2b89aee9693c2f8f186ea59fcfc4ebec7188cca0418d4583a6f1730f62416d70cd62555eb4f58ea831d1fea9956a2cba0049f23bf0b249f5de2ce0dc303808d70b0ccab3c7f37e949e", 0xd7}], 0x1, &(0x7f0000000980)}, 0x4010) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0xb, 0x9, &(0x7f0000000580)=@framed={{0x18}, [@map={0x18, 0x0, 0x1, 0x0, r0}, @generic={0x3ff, 0xfffffffffffffffc, 0x1}, @call={0x85, 0x0, 0x0, 0x6}], {0x95}}, &(0x7f0000000600)='syzkaller\x00', 0x0, 0x30, &(0x7f0000000640)=""/48, 0x41f00, 0x1}, 0x48) ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, r2) ioctl$fiemap(r2, 0xc020660b, &(0x7f0000000980)={0x3, 0x2, 0x4, 0x3ff, 0x3, [{0x3, 0x5, 0x5f2, 0x0, 0x0, 0x2100}, {0x7, 0x9, 0xffffffffa990c756}, {0x862, 0x100000000, 0x2, 0x0, 0x0, 0x1000}]}) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000000)={&(0x7f0000000080)='./file0/file0\x00', r0}, 0x10) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000400)=@ax25={0x3, {"02f47b3723e03d"}}, 0x80, &(0x7f00000017c0), 0x0, &(0x7f0000001840)=ANY=[], 0x0, 0x24004044}, 0x4008001) bpf$MAP_CREATE(0x0, &(0x7f0000002cc0)={0x5, 0x100, 0x56c96e7a, 0x2, 0xa, 0xffffffffffffffff, 0x9}, 0x2c) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000480)='rpc_pipefs\x00', 0x200000, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000002d00)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f00000004c0)='vmnet0keyring\x00') bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000780)={&(0x7f0000000740)='./file0/file0\x00', r3}, 0x10) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, &(0x7f0000000700)='proc!@ppp1!ppp0ppp0#)lo\\lolo{\x00') mount(&(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000200)='fuseblk\x00', 0xa11800, &(0x7f0000000240)) mount(&(0x7f00000002c0)='./file0/file0\x00', &(0x7f0000000300)='./file0/file0\x00', &(0x7f0000000340)='minix\x00', 0x0, &(0x7f0000000380)) 2018/03/29 17:35:04 executing program 2: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)={0xb, 0x7e, 0x3, 0x1, 0x11}, 0x2c) mount(&(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) r1 = socket$kcm(0x29, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000000bc0)={&(0x7f00000007c0)=@rc={0x1f, {0x5, 0x50000000, 0xaa2, 0x613, 0x4, 0x1ff}, 0x3f}, 0x80, &(0x7f0000000940)=[{&(0x7f0000000840)="09c9453aa30d8c5fba221fa2413f12c580837b2ae292e3ee8dd00098c404125a1a2e63840f82a2f69c3927af43b828422484aaeeceebcbe76e999bd3930c9b7c2995484407f9166e39c2069a88b63a980b9b5ffc880f4b89dde5adae6c7fb84ed98cbac860214dfb0b28d1b2e2d58aefebdfe515334f2ffa46be22ef7a4b3a276cb70a27c9e9f5de0a20bad24cbe2b89aee9693c2f8f186ea59fcfc4ebec7188cca0418d4583a6f1730f62416d70cd62555eb4f58ea831d1fea9956a2cba0049f23bf0b249f5de2ce0dc303808d70b0ccab3c7f37e949e", 0xd7}], 0x1, &(0x7f0000000980), 0x0, 0x20004805}, 0x4010) r2 = perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x2367, 0x7fff, 0x1, 0x6, 0x0, 0x78b1, 0x1, 0x0, 0x4992c766, 0xff, 0x81, 0x100, 0x40, 0x3, 0x9, 0x8, 0x1, 0x10000, 0x0, 0x6, 0x90e, 0x9, 0x7ff, 0x0, 0x8, 0x1, 0x30, 0x20, 0x7fffffff, 0x6, 0x401, 0x2, 0x1000, 0x8001, 0x1ff, 0xfffffffffffffff8, 0x0, 0x2, 0x0, @perf_config_ext={0x5, 0x8}, 0x1ab23, 0x0, 0x8, 0x5, 0x6, 0x0, 0x6}, 0xffffffffffffffff, 0x10, r0, 0x1) bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0xb, 0x9, &(0x7f0000000580)=@framed={{0x18}, [@map={0x18, 0x0, 0x1, 0x0, r0}, @generic={0x3ff, 0xfffffffffffffffc, 0x1}, @call={0x85, 0x0, 0x0, 0x6}], {0x95}}, &(0x7f0000000600)='syzkaller\x00', 0x0, 0x30, &(0x7f0000000640)=""/48, 0x41f00, 0x1}, 0x48) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000000)={&(0x7f0000000080)='./file0/file0\x00', r0}, 0x10) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000400)=@ax25={0x3, {"02f47b3723e03d"}}, 0x80, &(0x7f00000017c0), 0x0, &(0x7f0000001840)=ANY=[], 0x0, 0x24004044}, 0x4008001) bpf$MAP_CREATE(0x0, &(0x7f0000002cc0)={0x5, 0x0, 0x56c96e7a, 0x2, 0xa, 0xffffffffffffffff, 0x9}, 0x2c) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000480)='rpc_pipefs\x00', 0x200000, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000002d00)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f00000004c0)='vmnet0keyring\x00') bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000780)={&(0x7f0000000740)='./file0/file0\x00', r3}, 0x10) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x40082406, &(0x7f0000000700)="70726f6321407070703121707070307070923023296c6f5c6c6f6c6f7b00") mount(&(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000200)='fuseblk\x00', 0xa11800, &(0x7f0000000240)) mount(&(0x7f00000002c0)='./file0/file0\x00', &(0x7f0000000300)='./file0/file0\x00', &(0x7f0000000340)='minix\x00', 0x1000, &(0x7f0000000380)) 2018/03/29 17:35:04 executing program 7: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)={0xb, 0x7e, 0x3, 0x1, 0x11}, 0x2c) mount(&(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) r1 = socket$kcm(0x29, 0x2, 0x0) r2 = socket$inet_smc(0x2b, 0x1, 0x0) ioctl$sock_inet_tcp_SIOCATMARK(r2, 0x8905, &(0x7f00000009c0)) sendmsg$kcm(r1, &(0x7f0000000bc0)={&(0x7f00000007c0)=@rc={0x1f, {0x5, 0x50000000, 0xaa2, 0x613, 0x4, 0x1ff}, 0x3f}, 0x80, &(0x7f0000000940)=[{&(0x7f0000000840)="09c9453aa30d8c5fba221fa2413f12c580837b2ae292e3ee8dd00098c404125a1a2e63840f82a2f69c3927af43b828422484aaeeceebcbe76e999bd3930c9b7c2995484407f9166e39c2069a88b63a980b9b5ffc880f4b89dde5adae6c7fb84ed98cbac860214dfb0b28d1b2e2d58aefebdfe515334f2ffa46be22ef7a4b3a276cb70a27c9e9f5de0a20bad24cbe2b89aee9693c2f8f186ea59fcfc4ebec7188cca0418d4583a6f1730f62416d70cd62555eb4f58ea831d1fea9956a2cba0049f23bf0b249f5de2ce0dc303808d70b0ccab3c7f37e949e", 0xd7}], 0x1, &(0x7f0000000980), 0x0, 0x20004805}, 0x4010) exit(0x9) r3 = perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x2367, 0x7fff, 0x1, 0x6, 0x0, 0x78b1, 0x1, 0x0, 0x4992c766, 0xff, 0x81, 0x100, 0x40, 0x3, 0x9, 0x8, 0x1, 0x10000, 0x0, 0x6, 0x90e, 0x9, 0x7ff, 0x0, 0x8, 0x1, 0x30, 0x20, 0x7fffffff, 0x6, 0x401, 0x2, 0x1000, 0x8001, 0x1ff, 0xfffffffffffffff8, 0x0, 0x2, 0x0, @perf_config_ext={0x5, 0x8}, 0x1ab23, 0x3f, 0x8, 0x5, 0x6, 0x0, 0x6}, 0xffffffffffffffff, 0x10, r0, 0x1) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0xb, 0x9, &(0x7f0000000580)=ANY=[@ANYBLOB="1800060000000000000053cb26e54de724ca0000", @ANYRES32=r0, @ANYBLOB="0000000000000000fffc0100000000000000000000000000850000000600000000000000000000009500000000000000"], &(0x7f0000000600)='syzkaller\x00', 0x0, 0x30, &(0x7f0000000640)=""/48, 0x41f00, 0x1}, 0x48) chdir(&(0x7f00000004c0)='./file0/file0\x00') ioctl$PERF_EVENT_IOC_SET_BPF(r3, 0x40042408, r4) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000000)={&(0x7f0000000080)='./file0/file0\x00', r0}, 0x10) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000400)=@ax25={0x3, {"02f47b3723e03d"}}, 0x80, &(0x7f00000017c0), 0x0, &(0x7f0000001840)=ANY=[], 0x0, 0x24004044}, 0x4008001) bpf$MAP_CREATE(0x0, &(0x7f0000002cc0)={0x5, 0x0, 0x56c96e7a, 0x2, 0xa, 0xffffffffffffffff, 0x9}, 0x2c) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000480)="7270e35f70697065667300", 0x200003, 0x0) fchmod(r0, 0x80) r5 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000240)='/dev/qat_adf_ctl\x00', 0x410000, 0x0) setsockopt$inet_tcp_TCP_REPAIR_OPTIONS(r5, 0x6, 0x16, &(0x7f0000000280)=[{0x8, 0xfffffffffffffffd}, {0x8, 0x9}, {0x4, 0xffffffffffffffe1}, {0xb}, {0x8, 0x4}, {0x3, 0xffffffffffffff58}, {0x3, 0x3}], 0x7) clock_gettime(0x0, &(0x7f0000000a40)={0x0, 0x0}) ioctl$sock_inet6_tcp_SIOCINQ(r5, 0x541b, &(0x7f0000000ac0)) utimes(&(0x7f0000000a00)='./file0\x00', &(0x7f0000000a80)={{0x77359400}, {r6, r7/1000+30000}}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000002d00)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f0000000980)="766d6c6574196b6579026d6e6700") bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000780)={&(0x7f0000000740)='./file0/file0\x00', r8}, 0x10) ioctl$PERF_EVENT_IOC_SET_FILTER(r3, 0x40082406, &(0x7f0000000700)='proc!@ppp1!ppp0ppp0#)lo\\lolo{\x00') mount(&(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000200)='fuseblk\x00', 0xa11800, &(0x7f0000000240)) mount(&(0x7f00000002c0)='./file0/file0\x00', &(0x7f0000000300)='./file0/file0\x00', &(0x7f0000000340)='minix\x00', 0x1000, &(0x7f0000000b00)="886ca046e6956429f5de068d2f9b203eb077f0e72bdea21c9e0c38ef1261fa00f2e21650e7c7b455e774544e1fbb74dbe0b9c7195bbb02eaa140920690") 2018/03/29 17:35:04 executing program 5: 2018/03/29 17:35:04 executing program 1: 2018/03/29 17:35:04 executing program 6: 2018/03/29 17:35:04 executing program 3: r0 = socket(0xa, 0x2, 0x0) r1 = open(&(0x7f0000000140)='./file0\x00', 0xffff, 0x0) connect$inet6(r0, &(0x7f0000d3cfe4)={0xa, 0x0, 0x0, @mcast2={0xff, 0x2, [], 0x1}, 0x3}, 0x1c) ioctl$DRM_IOCTL_ADD_CTX(r1, 0xc0086420, &(0x7f0000000000)) ioctl$DRM_IOCTL_NEW_CTX(r1, 0x40086425, &(0x7f0000000080)={0x0, 0x3}) ioctl$DRM_IOCTL_ADD_CTX(r1, 0xc0086420, &(0x7f00000000c0)) fallocate(r1, 0x0, 0xffff, 0x1f) setsockopt$inet6_mtu(0xffffffffffffffff, 0x29, 0x17, &(0x7f0000000100)=0x2, 0x4) connect$inet(r0, &(0x7f0000000040)={0x2, 0x4e22, @multicast1=0xe0000001}, 0x10) sendfile(r0, r1, &(0x7f00005faff8), 0xfffb) 2018/03/29 17:35:04 executing program 4: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)={0xb, 0x7e, 0x3, 0x1, 0x11}, 0x2c) mount(&(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) r1 = socket$kcm(0x29, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000000bc0)={&(0x7f00000007c0)=@rc={0x1f, {0x5, 0x50000000, 0xaa2, 0x613, 0x4, 0x1ff}, 0x3f}, 0x80, &(0x7f0000000940)=[{&(0x7f0000000840)="09c9453aa30d8c5fba221fa2413f12c580837b2ae292e3ee8dd00098c404125a1a2e63840f82a2f69c3927af43b828422484aaeeceebcbe76e999bd3930c9b7c2995484407f9166e39c2069a88b63a980b9b5ffc880f4b89dde5adae6c7fb84ed98cbac860214dfb0b28d1b2e2d58aefebdfe515334f2ffa46be22ef7a4b3a276cb70a27c9e9f5de0a20bad24cbe2b89aee9693c2f8f186ea59fcfc4ebec7188cca0418d4583a6f1730f62416d70cd62555eb4f58ea831d1fea9956a2cba0049f23bf0b249f5de2ce0dc303808d70b0ccab3c7f37e949e", 0xd7}], 0x1, &(0x7f0000000980), 0x0, 0x20004805}, 0x4010) r2 = perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x2367, 0x7fff, 0x1, 0x6, 0x0, 0x78b1, 0x1, 0x0, 0x4992c766, 0xff, 0x81, 0x100, 0x40, 0x3, 0x9, 0x8, 0x1, 0x10000, 0x0, 0x6, 0x90e, 0x9, 0x7ff, 0x0, 0x8, 0x1, 0x30, 0x20, 0x7fffffff, 0x6, 0x401, 0x2, 0x1000, 0x8001, 0x1ff, 0xfffffffffffffff8, 0x0, 0x2, 0x0, @perf_config_ext={0x5, 0x8}, 0x1ab23, 0x3f, 0x8, 0x5, 0x6}, 0xffffffffffffffff, 0x10, r0, 0x1) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0xb, 0x7, &(0x7f0000000580)=@framed={{0x18}, [@map={0x18, 0x0, 0x1, 0x0, r0}, @generic={0x3ff, 0xfffffffffffffffc, 0x1}], {0x95}}, &(0x7f0000000600)='syzkaller\x00', 0x0, 0x30, &(0x7f0000000640)=""/48, 0x41f00, 0x1}, 0x48) ioctl$PERF_EVENT_IOC_SET_BPF(r2, 0x40042408, r3) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000000)={&(0x7f0000000080)='./file0/file0\x00', r0}, 0x10) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000400)=@ax25={0x3, {"02f47b3723e03d"}}, 0x80, &(0x7f00000017c0), 0x0, &(0x7f0000001840)=ANY=[], 0x0, 0x24004044}, 0x4008001) bpf$MAP_CREATE(0x0, &(0x7f0000002cc0)={0x5, 0x100, 0x56c96e7a, 0x2, 0xa, 0xffffffffffffffff, 0x9}, 0x2c) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000480)='rpc_pipefs\x00', 0x200000, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000002d00)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f00000004c0)='vmnet0keyring\x00') bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000780)={&(0x7f0000000740)='./file0/file0\x00', r4}, 0x10) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x40082406, &(0x7f0000000700)='proc!@ppp1!ppp0ppp0#)lo\\lolo{\x00') mount(&(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000200)='fuseblk\x00', 0xa11800, &(0x7f0000000240)) r5 = syz_open_dev$sg(&(0x7f0000000240)='/dev/sg#\x00', 0xfffffffffffffffa, 0x800) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000280)={r5, r3, 0x5, 0x1}, 0x10) ioctl$TIOCCONS(r5, 0x541d) mount(&(0x7f00000002c0)='./file0/file0\x00', &(0x7f0000000300)='./file0/file0\x00', &(0x7f0000000340)='minix\x00', 0x1000, &(0x7f0000000380)) 2018/03/29 17:35:04 executing program 2: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)={0xb, 0x7e, 0x3, 0x1, 0x11}, 0x2c) mount(&(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) r1 = socket$kcm(0x29, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000000bc0)={&(0x7f00000007c0)=@rc={0x1f, {0x5, 0x50000000, 0xaa2, 0x613, 0x4, 0x1ff}, 0x3f}, 0x80, &(0x7f0000000940)=[{&(0x7f0000000840)="09c9453aa30d8c5fba221fa2413f12c580837b2ae292e3ee8dd00098c404125a1a2e63840f82a2f69c3927af43b828422484aaeeceebcbe76e999bd3930c9b7c2995484407f9166e39c2069a88b63a980b9b5ffc880f4b89dde5adae6c7fb84ed98cbac860214dfb0b28d1b2e2d58aefebdfe515334f2ffa46be22ef7a4b3a276cb70a27c9e9f5de0a20bad24cbe2b89aee9693c2f8f186ea59fcfc4ebec7188cca0418d4583a6f1730f62416d70cd62555eb4f58ea831d1fea9956a2cba0049f23bf0b249f5de2ce0dc303808d70b0ccab3c7f37e949e", 0xd7}], 0x1, &(0x7f0000000980), 0x0, 0x20004805}, 0x4010) r2 = perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x2367, 0x7fff, 0x1, 0x6, 0x0, 0x78b1, 0x1, 0x0, 0x4992c766, 0xff, 0x81, 0x100, 0x40, 0x3, 0x9, 0x8, 0x1, 0x10000, 0x0, 0x6, 0x90e, 0x9, 0x7ff, 0x0, 0x8, 0x1, 0x30, 0x20, 0x7fffffff, 0x6, 0x401, 0x2, 0x1000, 0x8001, 0x1ff, 0xfffffffffffffff8, 0x0, 0x2, 0x0, @perf_config_ext={0x5, 0x8}, 0x1ab23, 0x0, 0x8, 0x5, 0x6, 0x0, 0x6}, 0xffffffffffffffff, 0x10, r0, 0x1) bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0xb, 0x9, &(0x7f0000000580)=@framed={{0x18}, [@map={0x18, 0x0, 0x1, 0x0, r0}, @generic={0x3ff, 0xfffffffffffffffc, 0x1}, @call={0x85, 0x0, 0x0, 0x6}], {0x95}}, &(0x7f0000000600)='syzkaller\x00', 0x0, 0x30, &(0x7f0000000640)=""/48, 0x41f00, 0x1}, 0x48) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000000)={&(0x7f0000000080)='./file0/file0\x00', r0}, 0x10) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000400)=@ax25={0x3, {"02f47b3723e03d"}}, 0x80, &(0x7f00000017c0), 0x0, &(0x7f0000001840)=ANY=[], 0x0, 0x24004044}, 0x4008001) bpf$MAP_CREATE(0x0, &(0x7f0000002cc0)={0x5, 0x0, 0x56c96e7a, 0x2, 0xa, 0xffffffffffffffff, 0x9}, 0x2c) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000480)='rpc_pipefs\x00', 0x200000, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000002d00)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f00000004c0)='vmnet0keyring\x00') bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000780)={&(0x7f0000000740)='./file0/file0\x00', r3}, 0x10) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x40082406, &(0x7f0000000240)='proc!@ppp1!ppp0ppp0#)lo\\lolo{\x00') mount(&(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000200)='fuseblk\x00', 0xa11800, &(0x7f0000000240)) mount(&(0x7f00000002c0)='./file0/file0\x00', &(0x7f0000000300)='./file0/file0\x00', &(0x7f0000000340)='minix\x00', 0x1000, &(0x7f0000000380)) 2018/03/29 17:35:04 executing program 0: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)={0xb, 0x7e, 0x3, 0x1, 0x11}, 0x2c) mount(&(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) r1 = socket$kcm(0x29, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000000bc0)={&(0x7f00000007c0)=@rc={0x1f, {0x5, 0x50000000, 0xaa2, 0x613, 0x4, 0x1ff}}, 0x80, &(0x7f0000000940)=[{&(0x7f0000000840)="09c9453aa30d8c5fba221fa2413f12c580837b2ae292e3ee8dd00098c404125a1a2e63840f82a2f69c3927af43b828422484aaeeceebcbe76e999bd3930c9b7c2995484407f9166e39c2069a88b63a980b9b5ffc880f4b89dde5adae6c7fb84ed98cbac860214dfb0b28d1b2e2d58aefebdfe515334f2ffa46be22ef7a4b3a276cb70a27c9e9f5de0a20bad24cbe2b89aee9693c2f8f186ea59fcfc4ebec7188cca0418d4583a6f1730f62416d70cd62555eb4f58ea831d1fea9956a2cba0049f23bf0b249f5de2ce0dc303808d70b0ccab3c7f37e949e", 0xd7}], 0x1, &(0x7f0000000980)}, 0x4010) pkey_alloc(0x0, 0x3) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0xb, 0x9, &(0x7f0000000580)=ANY=[@ANYBLOB="000000000000000018100040", @ANYRES32=r0, @ANYBLOB="0000000000000000fffc0100000000000000000000000000850000000600000000000000000000009500000000000000"], &(0x7f0000000600)='syzkaller\x00', 0x0, 0x30, &(0x7f0000000640)=""/48, 0x41f00, 0x1}, 0x48) ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, r2) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000000)={&(0x7f0000000080)='./file0/file0\x00', r0}, 0x10) r3 = syz_open_dev$vcsn(&(0x7f0000000500)='/dev/vcs#\x00', 0xfffffffffffffffb, 0x40) getsockopt$inet_sctp_SCTP_GET_PEER_ADDR_INFO(r3, 0x84, 0xf, &(0x7f00000009c0)={0x0, @in={{0x2, 0x4e20, @multicast2=0xe0000002}}, 0x8, 0xfffffffffffffff7, 0xfffffffffffffffa, 0x5}, &(0x7f0000000a80)=0x98) setsockopt$inet_sctp6_SCTP_AUTH_KEY(r3, 0x84, 0x17, &(0x7f0000000ac0)={r4, 0x20, 0x6a, "d55e3dbff6557c44388dd61cc86125a0cebfd172c206cb2fc2a44d6618dfc77b6d75624f2b4cdf84db0f43ac648672befcfb00ac6e8fd3f765edf5a983156901e9bebee6ca8ec2fa0ed93c329814d7b2b4671b6bfac012bf7211bd660d8ed3c515e61f42d9ed023879fd"}, 0x72) ioctl$VHOST_RESET_OWNER(r3, 0xaf02, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000400)=@ax25={0x3, {"02f47b3723e03d"}}, 0x80, &(0x7f00000017c0), 0x0, &(0x7f0000001840)=ANY=[], 0x0, 0x24004044}, 0x4008001) bpf$MAP_CREATE(0x0, &(0x7f0000002cc0)={0x40000000000f, 0x100, 0x56c96e7a, 0x2, 0xa, r0, 0x9}, 0xffffffffffffff05) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000480)='rpc_pipefs\x00', 0x200000, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000002d00)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f00000004c0)='vmnet0keyring\x00') statfs(&(0x7f0000000540)='./file1\x00', &(0x7f0000000980)=""/33) r6 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000240)='cpuacct.stat\x00', 0x0, 0x0) bind$rds(r6, &(0x7f0000000280)={0x2, 0x4e21}, 0x10) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000780)={&(0x7f0000000740)='./file0/file0\x00', r5}, 0x10) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, &(0x7f0000000700)='proc!@ppp1!ppp0ppp0#)lo\\lolo{\x00') creat(&(0x7f0000000b40)='./file0/file0\x00', 0x60) mount(&(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000200)='fuseblk\x00', 0xa11800, &(0x7f0000000240)) mount(&(0x7f00000002c0)='./file0/file0\x00', &(0x7f0000000300)='./file0/file0\x00', &(0x7f0000000340)='minix\x00', 0x0, &(0x7f0000000380)) 2018/03/29 17:35:04 executing program 7: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)={0xb, 0x7e, 0x3, 0x1, 0x11}, 0x2c) mount(&(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) r1 = syz_open_dev$audion(&(0x7f0000000240)='/dev/audio#\x00', 0x200, 0x440) accept4$unix(r1, &(0x7f0000000980)=@abs, &(0x7f0000000280)=0x6e, 0x80800) r2 = socket$kcm(0x29, 0x2, 0x0) sendmsg$kcm(r2, &(0x7f0000000bc0)={&(0x7f00000007c0)=@rc={0x1f, {0x5, 0x50000000, 0xaa2, 0x613, 0x4, 0x1ff}, 0x3f}, 0x80, &(0x7f0000000940)=[{&(0x7f0000000840)="09c9453aa30d8c5fba221fa2413f12c580837b2ae292e3ee8dd00098c404125a1a2e63840f82a2f69c3927af43b828422484aaeeceebcbe76e999bd3930c9b7c2995484407f9166e39c2069a88b63a980b9b5ffc880f4b89dde5adae6c7fb84ed98cbac860214dfb0b28d1b2e2d58aefebdfe515334f2ffa46be22ef7a4b3a276cb70a27c9e9f5de0a20bad24cbe2b89aee9693c2f8f186ea59fcfc4ebec7188cca0418d4583a6f1730f62416d70cd62555eb4f58ea831d1fea9956a2cba0049f23bf0b249f5de2ce0dc303808d70b0ccab3c7f37e949e", 0xd7}], 0x1, &(0x7f0000000980), 0x0, 0x20004805}, 0x4010) r3 = perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x2367, 0x7fff, 0x1, 0x6, 0x0, 0x78b1, 0x1, 0x0, 0x4992c766, 0xff, 0x81, 0x100, 0x40, 0x3, 0x9, 0x8, 0x1, 0x10000, 0x0, 0x6, 0x90e, 0x9, 0x7ff, 0x0, 0x8, 0x1, 0x30, 0x20, 0x7fffffff, 0x6, 0x401, 0x2, 0x1000, 0x8001, 0x1ff, 0xfffffffffffffff8, 0x0, 0x2, 0x0, @perf_config_ext={0x5, 0x8}, 0x1ab23, 0x3f, 0x8, 0x5, 0x6, 0x0, 0x6}, 0xffffffffffffffff, 0x10, r0, 0x1) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0xb, 0x9, &(0x7f0000000a00)=ANY=[@ANYBLOB="18000000000000000000000000000000181000008c1894f7b992360a491092461536b4afa386e5994c2c09b41ecdb756a0d7c622056afe054f9ba6a76747fc6abb71633a35bb577605a928adebc4f47469dd69be7c21d24716e3be7b1bc3deb58f03fa13e08b263034a79ffc95325fa583eb54361044e7c2500e4f32d8fea4842d5d12", @ANYRES32=r0, @ANYBLOB="0000000000000000fffc0100000000000000000000000000850000000600000000000000000000009500000000000000"], &(0x7f0000000600)='syzkaller\x00', 0x0, 0x30, &(0x7f0000000640)=""/48, 0x41f00, 0x1}, 0x48) ioctl$PERF_EVENT_IOC_SET_BPF(r3, 0x40042408, r4) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000000)={&(0x7f0000000080)='./file0/file0\x00', r0}, 0x10) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000400)=@ax25={0x3, {"02f47b3723e03d"}}, 0x80, &(0x7f00000017c0), 0x0, &(0x7f0000001840)=ANY=[], 0x0, 0x24004044}, 0x4008001) bpf$MAP_CREATE(0x0, &(0x7f0000002cc0)={0x5, 0x0, 0x56c96e7a, 0x2, 0xa, 0xffffffffffffffff, 0x9}, 0x2c) fdatasync(r0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000002d00)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f00000004c0)='vmnet0keyring\x00') bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000780)={&(0x7f0000000740)='./file0/file0\x00', r5}, 0x10) ioctl$PERF_EVENT_IOC_SET_FILTER(r3, 0x40082406, &(0x7f0000000700)='proc!@ppp1!ppp0ppp0#)lo\\lolo{\x00') mount(&(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000200)='fuseblk\x00', 0xa11800, &(0x7f0000000240)) mount(&(0x7f00000002c0)='./file0/file0\x00', &(0x7f0000000300)='./file0/file0\x00', &(0x7f0000000340)='minix\x00', 0x1000, &(0x7f0000000380)) 2018/03/29 17:35:04 executing program 5: 2018/03/29 17:35:04 executing program 6: 2018/03/29 17:35:04 executing program 1: 2018/03/29 17:35:04 executing program 5: 2018/03/29 17:35:04 executing program 4: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)={0xb, 0x7e, 0x3, 0x1, 0x11}, 0x2c) mount(&(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) r1 = socket$kcm(0x29, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000000bc0)={&(0x7f00000007c0)=@rc={0x1f, {0x5, 0x50000000, 0xaa2, 0x613, 0x4, 0x1ff}, 0x3f}, 0x80, &(0x7f0000000940)=[{&(0x7f0000000840)="09c9453aa30d8c5fba221fa2413f12c580837b2ae292e3ee8dd00098c404125a1a2e63840f82a2f69c3927af43b828422484aaeeceebcbe76e999bd3930c9b7c2995484407f9166e39c2069a88b63a980b9b5ffc880f4b89dde5adae6c7fb84ed98cbac860214dfb0b28d1b2e2d58aefebdfe515334f2ffa46be22ef7a4b3a276cb70a27c9e9f5de0a20bad24cbe2b89aee9693c2f8f186ea59fcfc4ebec7188cca0418d4583a6f1730f62416d70cd62555eb4f58ea831d1fea9956a2cba0049f23bf0b249f5de2ce0dc303808d70b0ccab3c7f37e949e", 0xd7}], 0x1, &(0x7f0000000980), 0x0, 0x20004805}, 0x4010) r2 = perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x2367, 0x7fff, 0x1, 0x6, 0x0, 0x78b1, 0x1, 0x0, 0x4992c766, 0xff, 0x81, 0x100, 0x40, 0x3, 0x9, 0x8, 0x1, 0x10000, 0x0, 0x6, 0x90e, 0x9, 0x7ff, 0x0, 0x8, 0x1, 0x30, 0x20, 0x7fffffff, 0x6, 0x401, 0x2, 0x1000, 0x8001, 0x1ff, 0xfffffffffffffff8, 0x0, 0x2, 0x0, @perf_config_ext={0x5, 0x8}, 0x1ab23, 0x3f, 0x8, 0x5, 0x6}, 0xffffffffffffffff, 0x10, r0, 0x1) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0xb, 0x7, &(0x7f0000000580)=@framed={{0x18}, [@map={0x18, 0x0, 0x1, 0x0, r0}, @generic={0x3ff, 0xfffffffffffffffc, 0x1}], {0x95}}, &(0x7f0000000600)='syzkaller\x00', 0x0, 0x30, &(0x7f0000000640)=""/48, 0x41f00, 0x1}, 0x48) ioctl$PERF_EVENT_IOC_SET_BPF(r2, 0x40042408, r3) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000000)={&(0x7f0000000080)='./file0/file0\x00', r0}, 0x10) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000400)=@ax25={0x3, {"02f47b3723e03d"}}, 0x80, &(0x7f00000017c0), 0x0, &(0x7f0000001840)=ANY=[], 0x0, 0x24004044}, 0x4008001) bpf$MAP_CREATE(0x0, &(0x7f0000002cc0)={0x5, 0x100, 0x56c96e7a, 0x2, 0xa, 0xffffffffffffffff, 0x9}, 0x2c) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000480)='rpc_pipefs\x00', 0x200000, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000002d00)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f00000004c0)='vmnet0keyring\x00') bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000780)={&(0x7f0000000740)='./file0/file0\x00', r4}, 0x10) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x40082406, &(0x7f0000000700)='proc!@ppp1!ppp0ppp0#)lo\\lolo{\x00') mount(&(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000200)='fuseblk\x00', 0xa11800, &(0x7f0000000240)) r5 = syz_open_dev$sg(&(0x7f0000000240)='/dev/sg#\x00', 0xfffffffffffffffa, 0x800) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000280)={r5, r3, 0x5, 0x1}, 0x10) ioctl$TIOCCONS(r5, 0x541d) mount(&(0x7f00000002c0)='./file0/file0\x00', &(0x7f0000000300)='./file0/file0\x00', &(0x7f0000000340)='minix\x00', 0x1000, &(0x7f0000000380)) 2018/03/29 17:35:04 executing program 6: 2018/03/29 17:35:04 executing program 1: 2018/03/29 17:35:04 executing program 4: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)={0xb, 0x7e, 0x3, 0x1, 0x11}, 0x2c) mount(&(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) r1 = socket$kcm(0x29, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000000bc0)={&(0x7f00000007c0)=@rc={0x1f, {0x5, 0x50000000, 0xaa2, 0x613, 0x4, 0x1ff}, 0x3f}, 0x80, &(0x7f0000000940)=[{&(0x7f0000000840)="09c9453aa30d8c5fba221fa2413f12c580837b2ae292e3ee8dd00098c404125a1a2e63840f82a2f69c3927af43b828422484aaeeceebcbe76e999bd3930c9b7c2995484407f9166e39c2069a88b63a980b9b5ffc880f4b89dde5adae6c7fb84ed98cbac860214dfb0b28d1b2e2d58aefebdfe515334f2ffa46be22ef7a4b3a276cb70a27c9e9f5de0a20bad24cbe2b89aee9693c2f8f186ea59fcfc4ebec7188cca0418d4583a6f1730f62416d70cd62555eb4f58ea831d1fea9956a2cba0049f23bf0b249f5de2ce0dc303808d70b0ccab3c7f37e949e", 0xd7}], 0x1, &(0x7f0000000980), 0x0, 0x20004805}, 0x4010) r2 = perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x2367, 0x7fff, 0x1, 0x6, 0x0, 0x78b1, 0x1, 0x0, 0x4992c766, 0xff, 0x81, 0x100, 0x40, 0x3, 0x9, 0x8, 0x1, 0x10000, 0x0, 0x6, 0x90e, 0x9, 0x7ff, 0x0, 0x8, 0x1, 0x30, 0x20, 0x7fffffff, 0x6, 0x401, 0x2, 0x1000, 0x8001, 0x1ff, 0xfffffffffffffff8, 0x0, 0x2, 0x0, @perf_config_ext={0x5, 0x8}, 0x1ab23, 0x3f, 0x8, 0x5, 0x6}, 0xffffffffffffffff, 0x10, r0, 0x1) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0xb, 0x9, &(0x7f0000000580)=@framed={{0x18}, [@map={0x18, 0x0, 0x1, 0x0, r0}, @generic={0x3ff, 0xfffffffffffffffc, 0x1}, @call={0x85}], {0x95}}, &(0x7f0000000600)='syzkaller\x00', 0x0, 0x30, &(0x7f0000000640)=""/48, 0x41f00, 0x1}, 0x48) ioctl$PERF_EVENT_IOC_SET_BPF(r2, 0x40042408, r3) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000000)={&(0x7f0000000080)='./file0/file0\x00', r0}, 0x10) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000400)=@ax25={0x3, {"02f47b3723e03d"}}, 0x80, &(0x7f00000017c0), 0x0, &(0x7f0000001840)=ANY=[], 0x0, 0x24004044}, 0x4008001) bpf$MAP_CREATE(0x0, &(0x7f0000002cc0)={0x5, 0x100, 0x56c96e7a, 0x2, 0xa, 0xffffffffffffffff, 0x9}, 0x2c) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000480)='rpc_pipefs\x00', 0x200000, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000002d00)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f00000004c0)='vmnet0keyring\x00') bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000780)={&(0x7f0000000740)='./file0/file0\x00', r4}, 0x10) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x40082406, &(0x7f0000000700)='proc!@ppp1!ppp0ppp0#)lo\\lolo{\x00') mount(&(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000200)='fuseblk\x00', 0xa11800, &(0x7f0000000240)) r5 = syz_open_dev$sg(&(0x7f0000000240)='/dev/sg#\x00', 0xfffffffffffffffa, 0x800) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000280)={r5, r3, 0x5, 0x1}, 0x10) ioctl$TIOCCONS(r5, 0x541d) mount(&(0x7f00000002c0)='./file0/file0\x00', &(0x7f0000000300)='./file0/file0\x00', &(0x7f0000000340)='minix\x00', 0x1000, &(0x7f0000000380)) 2018/03/29 17:35:04 executing program 3: r0 = open(&(0x7f00004b8ff8)='./file0\x00', 0x28042, 0x0) connect$inet6(0xffffffffffffffff, &(0x7f0000d3cfe4)={0xa, 0x0, 0x0, @mcast2={0xff, 0x2, [], 0x1}, 0x3}, 0x1c) ioctl$DRM_IOCTL_ADD_CTX(r0, 0xc0086420, &(0x7f00000000c0)) ioctl$DRM_IOCTL_NEW_CTX(r0, 0x40086425, &(0x7f0000000080)={0x0, 0x3}) ioctl$sock_netdev_private(r0, 0x89f4, &(0x7f0000000140)="824cc879f030c1ce499fb5d429c2ec5cb7a402f3283ec70f8b2bdd7e393e4ebe0ec74314c3b726e453010b70cee4efc0a946125f18d9fb") fallocate(r0, 0x0, 0xffff, 0x1f) setsockopt$inet6_mtu(0xffffffffffffffff, 0x29, 0x17, &(0x7f0000000100)=0x2, 0x4) connect$inet(0xffffffffffffffff, &(0x7f0000000040)={0x2, 0x4e22, @multicast1=0xe0000001}, 0x10) sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f00005faff8), 0xfffb) openat$cgroup_type(r0, &(0x7f0000000000)='cgroup.type\x00', 0x2, 0x0) 2018/03/29 17:35:04 executing program 2: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) ioctl$KVM_CREATE_DEVICE(0xffffffffffffffff, 0xc00caee0, &(0x7f0000000980)={0x6, 0xffffffffffffff9c, 0x1}) openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000009c0)='cgroup.events\x00', 0x0, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000a00)={0xa, 0x2, 0xffffffffffffffff, 0x80000000, 0x7, 0xffffffffffffffff, 0xf2e5}, 0x2c) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000a40)={0x5, 0x7e, 0x3, 0x100000000, 0x11, r0, 0x2}, 0x2c) mount(&(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) r2 = socket$kcm(0x29, 0x2, 0x0) sendmsg$kcm(r2, &(0x7f0000000bc0)={&(0x7f00000007c0)=@rc={0x1f, {0x5, 0x50000000, 0xaa2, 0x613, 0x4, 0x1ff}, 0x3f}, 0x80, &(0x7f0000000940)=[{&(0x7f0000000840)="09c9453aa30d8c5fba221fa2413f12c580837b2ae292e3ee8dd00098c404125a1a2e63840f82a2f69c3927af43b828422484aaeeceebcbe76e999bd3930c9b7c2995484407f9166e39c2069a88b63a980b9b5ffc880f4b89dde5adae6c7fb84ed98cbac860214dfb0b28d1b2e2d58aefebdfe515334f2ffa46be22ef7a4b3a276cb70a27c9e9f5de0a20bad24cbe2b89aee9693c2f8f186ea59fcfc4ebec7188cca0418d4583a6f1730f62416d70cd62555eb4f58ea831d1fea9956a2cba0049f23bf0b249f5de2ce0dc303808d70b0ccab3c7f37e949e", 0xd7}], 0x1, &(0x7f0000000980), 0x0, 0x20004805}, 0x4010) r3 = perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x2367, 0x7fff, 0x1, 0x6, 0x0, 0x78b1, 0x1, 0x0, 0x4992c766, 0xff, 0x81, 0x100, 0x40, 0x3, 0x9, 0x8, 0x1, 0x10000, 0x0, 0x6, 0x90e, 0x9, 0x7ff, 0x0, 0x8, 0x1, 0x30, 0x20, 0x7fffffff, 0x6, 0x401, 0x2, 0x1000, 0x8001, 0x1ff, 0xfffffffffffffff8, 0x0, 0x2, 0x0, @perf_config_ext={0x5, 0x8}, 0x1ab23, 0x0, 0x8, 0x5, 0x6, 0x0, 0x6}, 0xffffffffffffffff, 0x10, r1, 0x1) bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0xb, 0x9, &(0x7f0000000580)=@framed={{0x18}, [@map={0x18, 0x0, 0x1, 0x0, r1}, @generic={0x3ff, 0xfffffffffffffffc, 0x1}, @call={0x85, 0x0, 0x0, 0x6}], {0x95}}, &(0x7f0000000600)='syzkaller\x00', 0x0, 0x30, &(0x7f0000000640)=""/48, 0x41f00, 0x1}, 0x48) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000000)={&(0x7f0000000080)='./file0/file0\x00', r1}, 0x10) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000400)=@ax25={0x3, {"02f47b3723e03d"}}, 0x80, &(0x7f00000017c0), 0x0, &(0x7f0000001840)=ANY=[], 0x0, 0x24004044}, 0x4008001) bpf$MAP_CREATE(0x0, &(0x7f0000002cc0)={0x5, 0xc5, 0x56c96e7a, 0x2, 0xa, 0xffffffffffffffff, 0x9}, 0x2c) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000480)='rpc_pipefs\x00', 0x200000, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000002d00)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x40082406, &(0x7f00000004c0)='vmnet0keyring\x00') bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000780)={&(0x7f0000000280)='./file0\x00', r4}, 0x10) ioctl$PERF_EVENT_IOC_SET_FILTER(r3, 0x40082406, &(0x7f0000000700)='proc!@ppp1!ppp0ppp0#)lo\\lolo{\x00') ioctl$sock_SIOCGIFBR(r2, 0x8940, &(0x7f0000000740)=@add_del={0x2, &(0x7f0000000240)='bond0\x00', 0x2}) mount(&(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000200)='fuseblk\x00', 0xa11800, &(0x7f0000000240)) mount(&(0x7f00000002c0)='./file0/file0\x00', &(0x7f0000000300)='./file0/file0\x00', &(0x7f0000000340)='minix\x00', 0x1000, &(0x7f0000000380)) 2018/03/29 17:35:04 executing program 6: 2018/03/29 17:35:04 executing program 5: 2018/03/29 17:35:04 executing program 0: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)={0xb, 0x7e, 0x3, 0x1, 0x11}, 0x2c) mount(&(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) r1 = socket$kcm(0x29, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000000bc0)={&(0x7f00000007c0)=@rc={0x1f, {0x5, 0x50000000, 0xaa2, 0x613, 0x4, 0x1ff}}, 0x80, &(0x7f0000000940)=[{&(0x7f0000000840)="09c9453aa30d8c5fba221fa2413f12c580837b2ae292e3ee8dd00098c404125a1a2e63840f82a2f69c3927af43b828422484aaeeceebcbe76e999bd3930c9b7c2995484407f9166e39c2069a88b63a980b9b5ffc880f4b89dde5adae6c7fb84ed98cbac860214dfb0b28d1b2e2d58aefebdfe515334f2ffa46be22ef7a4b3a276cb70a27c9e9f5de0a20bad24cbe2b89aee9693c2f8f186ea59fcfc4ebec7188cca0418d4583a6f1730f62416d70cd62555eb4f58ea831d1fea9956a2cba0049f23bf0b249f5de2ce0dc303808d70b0ccab3c7f37e949e", 0xd7}], 0x1, &(0x7f0000000980)}, 0x4010) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0xb, 0x9, &(0x7f0000000580)=@framed={{0x18}, [@map={0x18, 0x0, 0x1, 0x0, r0}, @generic={0x3ff, 0xfffffffffffffffc, 0x1}, @call={0x85, 0x0, 0x0, 0x6}], {0x95}}, &(0x7f0000000600)='syzkaller\x00', 0x0, 0x30, &(0x7f0000000640)=""/48, 0x41f00, 0x1}, 0x48) r3 = syz_open_dev$audion(&(0x7f0000000240)='/dev/audio#\x00', 0x1, 0x10041) ioctl$KVM_CHECK_EXTENSION(r3, 0xae03, 0x200) ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, r2) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000000)={&(0x7f0000000080)='./file0/file0\x00', r0}, 0x10) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000400)=@ax25={0x3, {"02f47b3723e03d"}}, 0x80, &(0x7f00000017c0), 0x0, &(0x7f0000001840)=ANY=[], 0x0, 0x24004044}, 0x4008001) bpf$MAP_CREATE(0x0, &(0x7f0000002cc0)={0x5, 0x100, 0x56c96e7a, 0x2, 0xa, 0xffffffffffffffff, 0x9}, 0x2c) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000480)='rpc_pipefs\x00', 0x200000, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000002d00)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f00000004c0)='vmnet0keyring\x00') bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000780)={&(0x7f0000000740)='./file0/file0\x00', r4}, 0x10) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, &(0x7f0000000700)='proc!@ppp1!ppp0ppp0#)lo\\lolo{\x00') ioctl$EVIOCGEFFECTS(r3, 0x80044584, &(0x7f0000000a40)=""/180) mount(&(0x7f0000000500)='./file0/file0\x00', &(0x7f0000000200)='./file0/file0\x00', &(0x7f0000000b00)="66757365626c6b002a228928f25aa11a28d3eab565f2246ecdbddd1b53ebdb40100888080e2b652be49cbef7b0b375562919036271a93e426f3e5ba2073159fcbeaebc164462e12a89490170a93802d3355bebc28e062425499ec74c4474010100000000000059ea196e2a2d3ce0129345c091dd1e95eecbc4b37550e5064a2816bb2c56ac81a182ded9cd1ed173965941bd3f1aaa3536bee2", 0x8000000a11800, &(0x7f0000000280)) mount(&(0x7f00000002c0)='./file0/file0\x00', &(0x7f0000000300)='./file0/file0\x00', &(0x7f0000000340)='minix\x00', 0x0, &(0x7f0000000380)) 2018/03/29 17:35:04 executing program 7: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)={0xb, 0x7e, 0x3, 0x1, 0x11}, 0x2c) mount(&(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) r1 = socket$kcm(0x29, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000000bc0)={&(0x7f00000007c0)=@rc={0x1f, {0x5, 0x50000000, 0xaa2, 0x613, 0x4, 0x1ff}, 0x3f}, 0x80, &(0x7f0000000940)=[{&(0x7f0000000840)="09c9453aa30d8c5fba221fa2413f12c580837b2ae292e3ee8dd00098c404125a1a2e63840f82a2f69c3927af43b828422484aaeeceebcbe76e999bd3930c9b7c2995484407f9166e39c2069a88b63a980b9b5ffc880f4b89dde5adae6c7fb84ed98cbac860214dfb0b28d1b2e2d58aefebdfe515334f2ffa46be22ef7a4b3a276cb70a27c9e9f5de0a20bad24cbe2b89aee9693c2f8f186ea59fcfc4ebec7188cca0418d4583a6f1730f62416d70cd62555eb4f58ea831d1fea9956a2cba0049f23bf0b249f5de2ce0dc303808d70b0ccab3c7f37e949e", 0xd7}], 0x1, &(0x7f0000000980), 0x0, 0x20004805}, 0x4010) r2 = perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x2367, 0x7fff, 0x1, 0x6, 0x0, 0x78b1, 0x1, 0x0, 0x4992c766, 0xff, 0x81, 0x100, 0x40, 0x3, 0x9, 0x8, 0x1, 0x10000, 0x0, 0x6, 0x90e, 0x9, 0x7ff, 0x0, 0x8, 0x1, 0x30, 0x20, 0x7fffffff, 0x6, 0x401, 0x2, 0x1000, 0x8001, 0x1ff, 0xfffffffffffffff8, 0x0, 0x2, 0x0, @perf_config_ext={0x5, 0x8}, 0x1ab23, 0x3f, 0x8, 0x5, 0x6, 0x0, 0x6}, 0xffffffffffffffff, 0x10, r0, 0x1) ioctl$PERF_EVENT_IOC_SET_BPF(r2, 0x40042408, 0xffffffffffffffff) r3 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000240)='/dev/autofs\x00', 0x1, 0x0) ioctl$RNDADDENTROPY(r3, 0x40085203, &(0x7f0000000280)={0x7, 0x36, "9617ee2f6e280a8d848e28e98308bd9c04747b164966ad75f0f45f61dd5625fb53dcae04342d11355d25ecac17ac12c9490fc186bb89"}) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000000)={&(0x7f0000000080)='./file0/file0\x00', r0}, 0x10) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000400)=@ax25={0x3, {"02f47b3723e03d"}}, 0x80, &(0x7f00000017c0), 0x0, &(0x7f0000001840)=ANY=[], 0x0, 0x24004044}, 0x4008001) bpf$MAP_CREATE(0x0, &(0x7f0000002cc0)={0x5, 0x0, 0x56c96e7a, 0x2, 0xa, 0xffffffffffffffff, 0x9}, 0x2c) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000480)='rpc_pipefs\x00', 0x200000, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000002d00)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f00000004c0)='vmnet0keyring\x00') bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000780)={&(0x7f0000000740)='./file0/file0\x00', r4}, 0x10) getsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(r3, 0x84, 0x72, &(0x7f00000005c0)={0x0}, &(0x7f0000000600)=0xc) getsockopt$inet_sctp_SCTP_PEER_AUTH_CHUNKS(r3, 0x84, 0x1a, &(0x7f0000000640)={r5, 0x17, "cf463d65cee0d725c65561c095c37e94967cbd44756249"}, &(0x7f0000000680)=0x1f) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x40082406, &(0x7f0000000700)='proc!@ppp1!ppp0ppp0#)lo\\lolo{\x00') mount(&(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000200)='ncpfs\x00', 0xa11800, &(0x7f0000000240)) mount(&(0x7f00000002c0)='./file0/file0\x00', &(0x7f0000000300)='./file0/file0\x00', &(0x7f0000000340)='minix\x00', 0x1000, &(0x7f0000000380)) setsockopt$netrom_NETROM_IDLE(r3, 0x103, 0x7, &(0x7f0000000580)=0x401, 0x4) 2018/03/29 17:35:04 executing program 5: 2018/03/29 17:35:04 executing program 6: 2018/03/29 17:35:04 executing program 1: 2018/03/29 17:35:04 executing program 1: 2018/03/29 17:35:04 executing program 3: r0 = socket(0xa, 0x2, 0x0) getsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000280), 0x1fd) r1 = open(&(0x7f00004b8ff8)='./file0\x00', 0x28042, 0x0) connect$inet6(r0, &(0x7f0000d3cfe4)={0xa, 0x0, 0x0, @mcast2={0xff, 0x2, [], 0x1}, 0x3}, 0x1c) ioctl$DRM_IOCTL_ADD_CTX(r1, 0xc0086420, &(0x7f0000000000)={0x0}) ioctl$DRM_IOCTL_NEW_CTX(r1, 0x40086425, &(0x7f0000000080)={r2, 0x42}) fallocate(r1, 0x0, 0xffff, 0x1f) setsockopt$inet6_mtu(0xffffffffffffffff, 0x29, 0x17, &(0x7f0000000100)=0x2, 0x4) connect$inet(r0, &(0x7f0000000040)={0x2, 0x4e22, @multicast1=0xe0000001}, 0x10) ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) getsockopt$inet6_tcp_buf(r1, 0x6, 0x1f, &(0x7f0000000140)=""/218, &(0x7f0000000240)=0xda) sendfile(r0, r1, &(0x7f00005faff8), 0xfffb) 2018/03/29 17:35:04 executing program 5: 2018/03/29 17:35:04 executing program 2: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)={0xb, 0x7e, 0x3, 0x1, 0x11}, 0x2c) mount(&(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) r1 = socket$kcm(0x29, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000000bc0)={&(0x7f00000007c0)=@rc={0x1f, {0x5, 0x50000000, 0xaa2, 0x613, 0x4, 0x1ff}, 0x3f}, 0x80, &(0x7f0000000940)=[{&(0x7f0000000840)="09c9453aa30d8c5fba221fa2413f12c580837b2ae292e3ee8dd00098c404125a1a2e63840f82a2f69c3927af43b828422484aaeeceebcbe76e999bd3930c9b7c2995484407f9166e39c2069a88b63a980b9b5ffc880f4b89dde5adae6c7fb84ed98cbac860214dfb0b28d1b2e2d58aefebdfe515334f2ffa46be22ef7a4b3a276cb70a27c9e9f5de0a20bad24cbe2b89aee9693c2f8f186ea59fcfc4ebec7188cca0418d4583a6f1730f62416d70cd62555eb4f58ea831d1fea9956a2cba0049f23bf0b249f5de2ce0dc303808d70b0ccab3c7f37e949e", 0xd7}], 0x1, &(0x7f0000000980), 0x0, 0x20004805}, 0x4010) r2 = perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x2367, 0x7fff, 0x1, 0x6, 0x0, 0x78b1, 0x1, 0x0, 0x4992c766, 0xff, 0x81, 0x100, 0x40, 0x3, 0x9, 0x8, 0x1, 0x10000, 0x0, 0x6, 0x90e, 0x9, 0x7ff, 0x0, 0x8, 0x1, 0x30, 0x20, 0x7fffffff, 0x6, 0x401, 0x2, 0x1000, 0x8001, 0x1ff, 0xfffffffffffffff8, 0x0, 0x2, 0x0, @perf_config_ext={0x5, 0x8}, 0x1ab23, 0x0, 0x8, 0x5, 0x6, 0x0, 0x6}, 0xffffffffffffffff, 0x10, r0, 0x1) bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0xb, 0x9, &(0x7f0000000580)=@framed={{0x18}, [@map={0x18, 0x0, 0x1, 0x0, r0}, @generic={0x3ff, 0xfffffffffffffffc, 0x1}, @call={0x85, 0x0, 0x0, 0x6}], {0x95}}, &(0x7f0000000600)='syzkaller\x00', 0x0, 0x30, &(0x7f0000000640)=""/48, 0x41f00, 0x1}, 0x48) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000000)={&(0x7f0000000080)='./file0/file0\x00', r0}, 0x10) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000400)=@ax25={0x3, {"02f47b3723e03d"}}, 0x80, &(0x7f00000017c0), 0x0, &(0x7f0000001840)=ANY=[], 0x0, 0x24004044}, 0x4008001) bpf$MAP_CREATE(0x0, &(0x7f0000002cc0)={0x5, 0x0, 0x56c96e7a, 0x2, 0xa, 0xffffffffffffffff, 0x9}, 0x2c) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000480)='rpc_pipefs\x00', 0x200000, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000002d00)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f00000004c0)='vmnet0keyring\x00') bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000780)={&(0x7f0000000740)='./file0/file0\x00', r3}, 0x10) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x40082406, &(0x7f0000000700)='proc!@ppp1!ppp0ppp0#)lo\\lolo{\x00') mount(&(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000200)='fuseblk\x00', 0xa11800, &(0x7f0000000240)) uselib(&(0x7f0000000240)='./file0\x00') mount(&(0x7f00000002c0)='./file0/file0\x00', &(0x7f0000000300)='./file0/file0\x00', &(0x7f0000000340)='minix\x00', 0x1000, &(0x7f0000000380)) 2018/03/29 17:35:04 executing program 6: 2018/03/29 17:35:04 executing program 1: 2018/03/29 17:35:04 executing program 4: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)={0xb, 0x7e, 0x3, 0x1, 0x11}, 0x2c) mount(&(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) r1 = socket$kcm(0x29, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000000bc0)={&(0x7f00000007c0)=@rc={0x1f, {0x5, 0x50000000, 0xaa2, 0x613, 0x4, 0x1ff}, 0x3f}, 0x80, &(0x7f0000000940)=[{&(0x7f0000000840)="09c9453aa30d8c5fba221fa2413f12c580837b2ae292e3ee8dd00098c404125a1a2e63840f82a2f69c3927af43b828422484aaeeceebcbe76e999bd3930c9b7c2995484407f9166e39c2069a88b63a980b9b5ffc880f4b89dde5adae6c7fb84ed98cbac860214dfb0b28d1b2e2d58aefebdfe515334f2ffa46be22ef7a4b3a276cb70a27c9e9f5de0a20bad24cbe2b89aee9693c2f8f186ea59fcfc4ebec7188cca0418d4583a6f1730f62416d70cd62555eb4f58ea831d1fea9956a2cba0049f23bf0b249f5de2ce0dc303808d70b0ccab3c7f37e949e", 0xd7}], 0x1, &(0x7f0000000980), 0x0, 0x20004805}, 0x4010) r2 = perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x2367, 0x7fff, 0x1, 0x6, 0x0, 0x78b1, 0x1, 0x0, 0x4992c766, 0xff, 0x81, 0x100, 0x40, 0x3, 0x9, 0x8, 0x1, 0x10000, 0x0, 0x6, 0x90e, 0x9, 0x7ff, 0x0, 0x8, 0x1, 0x30, 0x20, 0x7fffffff, 0x6, 0x401, 0x2, 0x1000, 0x8001, 0x1ff, 0xfffffffffffffff8, 0x0, 0x2, 0x0, @perf_config_ext={0x5, 0x8}, 0x1ab23, 0x3f, 0x8, 0x5, 0x6}, 0xffffffffffffffff, 0x10, r0, 0x1) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0xb, 0x9, &(0x7f0000000580)=@framed={{0x18}, [@map={0x18, 0x0, 0x1, 0x0, r0}, @generic={0x3ff, 0xfffffffffffffffc, 0x1}, @call={0x85}], {0x95}}, &(0x7f0000000600)='syzkaller\x00', 0x0, 0x30, &(0x7f0000000640)=""/48, 0x41f00, 0x1}, 0x48) ioctl$PERF_EVENT_IOC_SET_BPF(r2, 0x40042408, r3) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000000)={&(0x7f0000000080)='./file0/file0\x00', r0}, 0x10) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000400)=@ax25={0x3, {"02f47b3723e03d"}}, 0x80, &(0x7f00000017c0), 0x0, &(0x7f0000001840)=ANY=[], 0x0, 0x24004044}, 0x4008001) bpf$MAP_CREATE(0x0, &(0x7f0000002cc0)={0x5, 0x100, 0x56c96e7a, 0x2, 0xa, 0xffffffffffffffff, 0x9}, 0x2c) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000480)='rpc_pipefs\x00', 0x200000, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000002d00)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f00000004c0)='vmnet0keyring\x00') bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000780)={&(0x7f0000000740)='./file0/file0\x00', r4}, 0x10) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x40082406, &(0x7f0000000700)='proc!@ppp1!ppp0ppp0#)lo\\lolo{\x00') mount(&(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000200)='fuseblk\x00', 0xa11800, &(0x7f0000000240)) r5 = syz_open_dev$sg(&(0x7f0000000240)='/dev/sg#\x00', 0xfffffffffffffffa, 0x800) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000280)={r5, r3, 0x5, 0x1}, 0x10) ioctl$TIOCCONS(r5, 0x541d) mount(&(0x7f00000002c0)='./file0/file0\x00', &(0x7f0000000300)='./file0/file0\x00', &(0x7f0000000340)='minix\x00', 0x1000, &(0x7f0000000380)) 2018/03/29 17:35:04 executing program 5: 2018/03/29 17:35:04 executing program 6: 2018/03/29 17:35:04 executing program 0: mkdir(&(0x7f0000000240)='./file0\x00', 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)={0xb, 0x7e, 0x3, 0x1, 0x11}, 0x2c) mount(&(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f0000000ac0)='\x00', 0x1000000, &(0x7f0000000200)) r1 = socket$kcm(0x29, 0x2, 0x0) getpid() sendmsg$kcm(r1, &(0x7f0000000bc0)={&(0x7f00000007c0)=@rc={0x1f, {0x5, 0x50000000, 0xaa2, 0x613, 0x4, 0x1ff}}, 0x80, &(0x7f0000000940)=[{&(0x7f0000000840)="09c9453aa30d8c5fba221fa2413f12c580837b2ae292e3ee8dd00098c404125a1a2e63840f82a2f69c3927af43b828422484aaeeceebcbe76e999bd3930c9b7c2995484407f9166e39c2069a88b63a980b9b5ffc880f4b89dde5adae6c7fb84ed98cbac860214dfb0b28d1b2e2d58aefebdfe515334f2ffa46be22ef7a4b3a276cb70a27c9e9f5de0a20bad24cbe2b89aee9693c2f8f186ea59fcfc4ebec7188cca0418d4583a6f1730f62416d70cd62555eb4f58ea831d1fea9956a2cba0049f23bf0b249f5de2ce0dc303808d70b0ccab3c7f37e949e", 0xd7}], 0x1, &(0x7f00000001c0), 0x258}, 0x4000800) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0xb, 0x9, &(0x7f0000000580)=@framed={{0x18}, [@map={0x18, 0x0, 0x1, 0x0, r0}, @generic={0x3ff, 0xfffffffffffffffc, 0x1}, @call={0x85, 0x0, 0x0, 0x6}], {0x95}}, &(0x7f0000000600)='syzkaller\x00', 0x0, 0x30, &(0x7f0000000640)=""/48, 0x41f00, 0x1}, 0x48) ioctl$PERF_EVENT_IOC_SET_BPF(r1, 0x40042408, r2) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000000)={&(0x7f0000000080)='./file0/file0\x00', r0}, 0x10) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000400)=@ax25={0x3, {"02f47b3723e03d"}}, 0x80, &(0x7f00000017c0), 0x0, &(0x7f0000001840)=ANY=[], 0x0, 0x24004044}, 0x4008001) bpf$MAP_CREATE(0x0, &(0x7f0000002cc0)={0x5, 0x100, 0x56c96e7a, 0x2, 0xa, 0xffffffffffffffff, 0x9}, 0x2c) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000480)='rpc_pipefs\x00', 0x200000, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000002d00)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = syz_open_dev$mice(&(0x7f0000000280)='/dev/input/mice\x00', 0x0, 0x8040) getsockopt$bt_BT_CHANNEL_POLICY(r4, 0x112, 0xa, &(0x7f0000000500)=0x8, &(0x7f0000000540)=0x4) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f00000004c0)='vmnet0keyring\x00') bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000780)={&(0x7f0000000740)='./file0/file0\x00', r3}, 0x10) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, &(0x7f0000000700)='proc!@ppp1!ppp0ppp0#)lo\\lolo{\x00') mount(&(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000200)='fuseblk\x00', 0xa11800, &(0x7f0000000240)) chmod(&(0x7f00000000c0)='./file0\x00', 0x80) mount(&(0x7f00000002c0)='./file0/file0\x00', &(0x7f0000000300)='./file0/file0\x00', &(0x7f0000000340)='minix\x00', 0x0, &(0x7f0000000380)) statx(r4, &(0x7f0000000980)='./file0/file0\x00', 0x4000, 0x100, &(0x7f00000009c0)) mprotect(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x4) 2018/03/29 17:35:04 executing program 1: 2018/03/29 17:35:04 executing program 3: r0 = socket(0xa, 0x2, 0x0) r1 = open(&(0x7f00004b8ff8)='./file0\x00', 0x28042, 0x0) connect$inet6(r0, &(0x7f0000d3cfe4)={0xa, 0x1000000000000000, 0x40000, @mcast1={0xff, 0x1, [], 0x1}, 0x100000003}, 0x1c) ioctl$DRM_IOCTL_ADD_CTX(r1, 0xc0086420, &(0x7f0000000000)) ioctl$DRM_IOCTL_NEW_CTX(r1, 0x40086425, &(0x7f0000000080)={0x0, 0x3}) fallocate(r1, 0x0, 0xffff, 0x1f) setsockopt$inet6_mtu(0xffffffffffffffff, 0x29, 0x17, &(0x7f0000000100)=0x2, 0x4) connect$inet(r0, &(0x7f0000000040)={0x2, 0x4e22, @multicast1=0xe0000001}, 0x10) sendfile(r0, r1, &(0x7f00005faff8), 0xfffb) ioctl$UFFDIO_COPY(r1, 0xc028aa03, &(0x7f00000000c0)={&(0x7f0000ffb000/0x3000)=nil, 0x3000}) 2018/03/29 17:35:04 executing program 5: 2018/03/29 17:35:04 executing program 4: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)={0xb, 0x7e, 0x3, 0x1, 0x11}, 0x2c) mount(&(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) r1 = socket$kcm(0x29, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000000bc0)={&(0x7f00000007c0)=@rc={0x1f, {0x5, 0x50000000, 0xaa2, 0x613, 0x4, 0x1ff}, 0x3f}, 0x80, &(0x7f0000000940)=[{&(0x7f0000000840)="09c9453aa30d8c5fba221fa2413f12c580837b2ae292e3ee8dd00098c404125a1a2e63840f82a2f69c3927af43b828422484aaeeceebcbe76e999bd3930c9b7c2995484407f9166e39c2069a88b63a980b9b5ffc880f4b89dde5adae6c7fb84ed98cbac860214dfb0b28d1b2e2d58aefebdfe515334f2ffa46be22ef7a4b3a276cb70a27c9e9f5de0a20bad24cbe2b89aee9693c2f8f186ea59fcfc4ebec7188cca0418d4583a6f1730f62416d70cd62555eb4f58ea831d1fea9956a2cba0049f23bf0b249f5de2ce0dc303808d70b0ccab3c7f37e949e", 0xd7}], 0x1, &(0x7f0000000980), 0x0, 0x20004805}, 0x4010) r2 = perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x2367, 0x7fff, 0x1, 0x6, 0x0, 0x78b1, 0x1, 0x0, 0x4992c766, 0xff, 0x81, 0x100, 0x40, 0x3, 0x9, 0x8, 0x1, 0x10000, 0x0, 0x6, 0x90e, 0x9, 0x7ff, 0x0, 0x8, 0x1, 0x30, 0x20, 0x7fffffff, 0x6, 0x401, 0x2, 0x1000, 0x8001, 0x1ff, 0xfffffffffffffff8, 0x0, 0x2, 0x0, @perf_config_ext={0x5, 0x8}, 0x1ab23, 0x3f, 0x8, 0x5, 0x6}, 0xffffffffffffffff, 0x10, r0, 0x1) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0xb, 0x9, &(0x7f0000000580)=@framed={{0x18}, [@map={0x18, 0x0, 0x1, 0x0, r0}, @generic={0x3ff, 0xfffffffffffffffc, 0x1}, @call={0x85}], {0x95}}, &(0x7f0000000600)='syzkaller\x00', 0x0, 0x30, &(0x7f0000000640)=""/48, 0x41f00, 0x1}, 0x48) ioctl$PERF_EVENT_IOC_SET_BPF(r2, 0x40042408, r3) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000000)={&(0x7f0000000080)='./file0/file0\x00', r0}, 0x10) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000400)=@ax25={0x3, {"02f47b3723e03d"}}, 0x80, &(0x7f00000017c0), 0x0, &(0x7f0000001840)=ANY=[], 0x0, 0x24004044}, 0x4008001) bpf$MAP_CREATE(0x0, &(0x7f0000002cc0)={0x5, 0x100, 0x56c96e7a, 0x2, 0xa, 0xffffffffffffffff, 0x9}, 0x2c) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000480)='rpc_pipefs\x00', 0x200000, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000002d00)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f00000004c0)='vmnet0keyring\x00') bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000780)={&(0x7f0000000740)='./file0/file0\x00', r4}, 0x10) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x40082406, &(0x7f0000000700)='proc!@ppp1!ppp0ppp0#)lo\\lolo{\x00') mount(&(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000200)='fuseblk\x00', 0xa11800, &(0x7f0000000240)) r5 = syz_open_dev$sg(&(0x7f0000000240)='/dev/sg#\x00', 0xfffffffffffffffa, 0x800) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000280)={r5, r3, 0x5, 0x1}, 0x10) ioctl$TIOCCONS(r5, 0x541d) mount(&(0x7f00000002c0)='./file0/file0\x00', &(0x7f0000000300)='./file0/file0\x00', &(0x7f0000000340)='minix\x00', 0x1000, &(0x7f0000000380)) 2018/03/29 17:35:04 executing program 6: 2018/03/29 17:35:04 executing program 1: 2018/03/29 17:35:04 executing program 7: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)={0xb, 0x7e, 0x3, 0x1, 0x11}, 0x2c) mount(&(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) r1 = socket$kcm(0x29, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000000bc0)={&(0x7f00000007c0)=@rc={0x1f, {0x5, 0x50000000, 0xaa2, 0x613, 0x4, 0x1ff}, 0x3f}, 0x80, &(0x7f0000000940)=[{&(0x7f0000000840)="09c9453aa30d8c5fba221fa2413f12c580837b2ae292e3ee8dd00098c404125a1a2e63840f82a2f69c3927af43b828422484aaeeceebcbe76e999bd3930c9b7c2995484407f9166e39c2069a88b63a980b9b5ffc880f4b89dde5adae6c7fb84ed98cbac860214dfb0b28d1b2e2d58aefebdfe515334f2ffa46be22ef7a4b3a276cb70a27c9e9f5de0a20bad24cbe2b89aee9693c2f8f186ea59fcfc4ebec7188cca0418d4583a6f1730f62416d70cd62555eb4f58ea831d1fea9956a2cba0049f23bf0b249f5de2ce0dc303808d70b0ccab3c7f37e949e", 0xd7}], 0x1, &(0x7f0000000980), 0x0, 0x20004805}, 0x4010) r2 = perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x2367, 0x7fff, 0x1, 0x6, 0x0, 0x78b1, 0x1, 0x0, 0x4992c766, 0xff, 0x81, 0x100, 0x40, 0x3, 0x9, 0x8, 0x1, 0x10000, 0x0, 0x6, 0x90e, 0x9, 0x7ff, 0x0, 0x8, 0x1, 0x30, 0x20, 0x7fffffff, 0x6, 0x401, 0x2, 0x1000, 0x8001, 0x1ff, 0xfffffffffffffff8, 0x0, 0x2, 0x0, @perf_config_ext={0x5, 0x8}, 0x1ab23, 0x3f, 0x8, 0x5, 0x6, 0x0, 0x6}, 0xffffffffffffffff, 0x10, r0, 0x1) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0xb, 0x9, &(0x7f0000000240)=ANY=[@ANYBLOB="1800000000000000000000000000000018100000", @ANYRES32=r0, @ANYBLOB="0000000000000000fffc0100000000000000000037fd8e42e3620698733b62fa66808200000000850000000600000000000000000012009500000000000000"], &(0x7f0000000600)='syzkaller\x00', 0x0, 0x30, &(0x7f0000000640)=""/48, 0x41f00, 0x1}, 0x48) ioctl$PERF_EVENT_IOC_SET_BPF(r2, 0x40042408, r3) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000000)={&(0x7f0000000080)='./file0/file0\x00', r0}, 0x10) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000400)=@ax25={0x3, {"02f47b3723e03d"}}, 0x80, &(0x7f00000017c0), 0x0, &(0x7f0000001840)=ANY=[], 0x0, 0x24004044}, 0x4008001) bpf$MAP_CREATE(0x0, &(0x7f0000002cc0)={0x5, 0x0, 0x56c96e7a, 0x2, 0xa, 0xffffffffffffffff, 0x9}, 0x2c) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000480)='rpc_pipefs\x00', 0x200000, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000002d00)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x40082406, &(0x7f00000004c0)='vmnet0keyring\x00') bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000780)={&(0x7f0000000740)='./file0/file0\x00', r4}, 0x10) r5 = syz_open_dev$vcsn(&(0x7f0000000580)='/dev/vcs#\x00', 0x9, 0x20400) connect$ipx(r5, &(0x7f00000005c0)={0x4, 0x9, 0x3, "86831add9f3e", 0x8000}, 0x10) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x40082406, &(0x7f0000000700)='proc!@ppp1!ppp0ppp0#)lo\\lolo{\x00') mount(&(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000200)='fuseblk\x00', 0xa11800, &(0x7f0000000240)) mount(&(0x7f00000002c0)='./file0/file0\x00', &(0x7f0000000300)='./file0/file0\x00', &(0x7f0000000340)='minix\x00', 0x1000, &(0x7f0000000380)) 2018/03/29 17:35:04 executing program 0: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)={0xb, 0x7e, 0x3, 0x1, 0x11}, 0x2c) mount(&(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) r1 = socket$kcm(0x29, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000000bc0)={&(0x7f00000007c0)=@rc={0x1f, {0x5, 0x50000000, 0xaa2, 0x613, 0x4, 0x1ff}}, 0x80, &(0x7f0000000940)=[{&(0x7f0000000840)="09c9453aa30d8c5fba221fa2413f12c580837b2ae292e3ee8dd00098c404125a1a2e63840f82a2f69c3927af43b828422484aaeeceebcbe76e999bd3930c9b7c2995484407f9166e39c2069a88b63a980b9b5ffc880f4b89dde5adae6c7fb84ed98cbac860214dfb0b28d1b2e2d58aefebdfe515334f2ffa46be22ef7a4b3a276cb70a27c9e9f5de0a20bad24cbe2b89aee9693c2f8f186ea59fcfc4ebec7188cca0418d4583a6f1730f62416d70cd62555eb4f58ea831d1fea9956a2cba0049f23bf0b249f5de2ce0dc303808d70b0ccab3c7f37e949e", 0xd7}], 0x1, &(0x7f0000000980)}, 0x4010) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0xb, 0x9, &(0x7f0000000980)=ANY=[@ANYBLOB="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", @ANYRES32=r0, @ANYBLOB="0000000000000000fffc0100000000000000000000000000850000000600000000000000000000009500000000000000"], &(0x7f0000000600)='syzkaller\x00', 0x0, 0x30, &(0x7f0000000640)=""/48, 0x41f00, 0x1}, 0x48) ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, r2) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000000)={&(0x7f0000000080)='./file0/file0\x00', r0}, 0x10) umount2(&(0x7f0000000280)='./file0\x00', 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000400)=@ax25={0x3, {"02f47b3723e03d"}}, 0x80, &(0x7f00000017c0), 0x0, &(0x7f0000001840)=ANY=[], 0x0, 0x24004044}, 0x4008001) r3 = openat$rfkill(0xffffffffffffff9c, &(0x7f0000000240)='/dev/rfkill\x00', 0x240100, 0x0) ioctl$ASHMEM_GET_PIN_STATUS(r3, 0x7709, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000002cc0)={0x5, 0x100, 0x56c96e7a, 0x2, 0xa, 0xffffffffffffffff, 0x9}, 0x2c) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000480)='rpc_pipefs\x00', 0x200000, 0x0) ioctl$KVM_SET_NR_MMU_PAGES(r3, 0xae44, 0x3) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000002d00)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f00000004c0)='vmnet0keyring\x00') bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000780)={&(0x7f0000000740)='./file0/file0\x00', r4}, 0x10) ioctl$PERF_EVENT_IOC_SET_FILTER(r3, 0x40082406, &(0x7f0000000c00)="7270635f70697065667300190d68686a569d86b76099920444301ccd4bb084c957eeed5a6798af38ea6762cd9d0000000000007fffab8e1932080000000000000045635d0ba60000000000") mount(&(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000200)='fuseblk\x00', 0xa11800, &(0x7f0000000240)) mount(&(0x7f00000002c0)='./file0/file0\x00', &(0x7f0000000300)='./file0/file0\x00', &(0x7f0000000340)='minix\x00', 0x0, &(0x7f0000000380)) 2018/03/29 17:35:04 executing program 2: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)={0xb, 0x7e, 0x3, 0x1, 0x11}, 0x2c) mount(&(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) r1 = socket$kcm(0x29, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000000bc0)={&(0x7f00000007c0)=@rc={0x1f, {0x5, 0x50000000, 0xaa2, 0x613, 0x4, 0x1ff}, 0x3f}, 0x80, &(0x7f0000000940)=[{&(0x7f0000000840)="09c9453aa30d8c5fba221fa2413f12c580837b2ae292e3ee8dd00098c404125a1a2e63840f82a2f69c3927af43b828422484aaeeceebcbe76e999bd3930c9b7c2995484407f9166e39c2069a88b63a980b9b5ffc880f4b89dde5adae6c7fb84ed98cbac860214dfb0b28d1b2e2d58aefebdfe515334f2ffa46be22ef7a4b3a276cb70a27c9e9f5de0a20bad24cbe2b89aee9693c2f8f186ea59fcfc4ebec7188cca0418d4583a6f1730f62416d70cd62555eb4f58ea831d1fea9956a2cba0049f23bf0b249f5de2ce0dc303808d70b0ccab3c7f37e949e", 0xd7}], 0x1, &(0x7f0000000980), 0x0, 0x20004805}, 0x4010) r2 = perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x2367, 0x7fff, 0x1, 0x6, 0x0, 0x78b1, 0x1, 0x0, 0x4992c766, 0xff, 0x81, 0x100, 0x40, 0x3, 0x9, 0x8, 0x1, 0x10000, 0x0, 0x6, 0x90e, 0x9, 0x7ff, 0x0, 0x8, 0x1, 0x30, 0x20, 0x7fffffff, 0x6, 0x401, 0x2, 0x1000, 0x8001, 0x1ff, 0xfffffffffffffff8, 0x0, 0x2, 0x0, @perf_config_ext={0x5, 0x8}, 0x1ab23, 0x0, 0x8, 0x5, 0x6, 0x0, 0x6}, 0xffffffffffffffff, 0x10, r0, 0x1) bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0xb, 0x9, &(0x7f0000000580)=ANY=[@ANYBLOB="1800000000000000000000000000000018100000", @ANYRES32=r0, @ANYBLOB="0000000000000000fffc0100000000000000f87725b100008500cccdcff4839900000600000000000000000000009500"], &(0x7f0000000600)='syzkaller\x00', 0x0, 0x30, &(0x7f0000000640)=""/48, 0x41f00, 0x1}, 0x48) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000000)={&(0x7f0000000080)='./file0/file0\x00', r0}, 0x10) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000400)=@ax25={0x3, {"02f47b3723e03d"}}, 0x80, &(0x7f00000017c0), 0x0, &(0x7f0000001840)=ANY=[], 0x0, 0x24004044}, 0x4008001) bpf$MAP_CREATE(0x0, &(0x7f0000002cc0)={0x2000000000000005, 0x0, 0xfffffffffffffffd, 0x2, 0xa, 0xffffffffffffffff, 0x3}, 0x2c) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000480)='rpc_pipefs\x00', 0x200000, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000002d00)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f00000004c0)='vmnet0keyring\x00') bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000780)={&(0x7f0000000740)='./file0/file0\x00', r3}, 0x10) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x40082406, &(0x7f0000000700)='proc!@ppp1!ppp0ppp0#)lo\\lolo{\x00') mount(&(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000200)='fuseblk\x00', 0xa11800, &(0x7f0000000240)) mount(&(0x7f00000002c0)='./file0/file0\x00', &(0x7f0000000300)='./file0/file0\x00', &(0x7f0000000340)='minix\x00', 0x1000, &(0x7f0000000380)) 2018/03/29 17:35:04 executing program 6: 2018/03/29 17:35:04 executing program 5: 2018/03/29 17:35:04 executing program 1: 2018/03/29 17:35:04 executing program 6: 2018/03/29 17:35:04 executing program 1: 2018/03/29 17:35:04 executing program 5: 2018/03/29 17:35:04 executing program 4: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)={0xb, 0x7e, 0x3, 0x1, 0x11}, 0x2c) mount(&(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) r1 = socket$kcm(0x29, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000000bc0)={&(0x7f00000007c0)=@rc={0x1f, {0x5, 0x50000000, 0xaa2, 0x613, 0x4, 0x1ff}, 0x3f}, 0x80, &(0x7f0000000940)=[{&(0x7f0000000840)="09c9453aa30d8c5fba221fa2413f12c580837b2ae292e3ee8dd00098c404125a1a2e63840f82a2f69c3927af43b828422484aaeeceebcbe76e999bd3930c9b7c2995484407f9166e39c2069a88b63a980b9b5ffc880f4b89dde5adae6c7fb84ed98cbac860214dfb0b28d1b2e2d58aefebdfe515334f2ffa46be22ef7a4b3a276cb70a27c9e9f5de0a20bad24cbe2b89aee9693c2f8f186ea59fcfc4ebec7188cca0418d4583a6f1730f62416d70cd62555eb4f58ea831d1fea9956a2cba0049f23bf0b249f5de2ce0dc303808d70b0ccab3c7f37e949e", 0xd7}], 0x1, &(0x7f0000000980), 0x0, 0x20004805}, 0x4010) r2 = perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x2367, 0x7fff, 0x1, 0x6, 0x0, 0x78b1, 0x1, 0x0, 0x4992c766, 0xff, 0x81, 0x100, 0x40, 0x3, 0x9, 0x8, 0x1, 0x10000, 0x0, 0x6, 0x90e, 0x9, 0x7ff, 0x0, 0x8, 0x1, 0x30, 0x20, 0x7fffffff, 0x6, 0x401, 0x2, 0x1000, 0x8001, 0x1ff, 0xfffffffffffffff8, 0x0, 0x2, 0x0, @perf_config_ext={0x5, 0x8}, 0x1ab23, 0x3f, 0x8, 0x5, 0x6}, 0xffffffffffffffff, 0x10, r0, 0x1) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0xb, 0x9, &(0x7f0000000580)=@framed={{0x18}, [@map={0x18, 0x0, 0x1, 0x0, r0}, @generic={0x3ff, 0xfffffffffffffffc, 0x1}, @call={0x85, 0x0, 0x0, 0x6}], {0x95}}, &(0x7f0000000600)='syzkaller\x00', 0x0, 0x30, &(0x7f0000000640)=""/48, 0x0, 0x1}, 0x48) ioctl$PERF_EVENT_IOC_SET_BPF(r2, 0x40042408, r3) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000000)={&(0x7f0000000080)='./file0/file0\x00', r0}, 0x10) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000400)=@ax25={0x3, {"02f47b3723e03d"}}, 0x80, &(0x7f00000017c0), 0x0, &(0x7f0000001840)=ANY=[], 0x0, 0x24004044}, 0x4008001) bpf$MAP_CREATE(0x0, &(0x7f0000002cc0)={0x5, 0x100, 0x56c96e7a, 0x2, 0xa, 0xffffffffffffffff, 0x9}, 0x2c) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000480)='rpc_pipefs\x00', 0x200000, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000002d00)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f00000004c0)='vmnet0keyring\x00') bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000780)={&(0x7f0000000740)='./file0/file0\x00', r4}, 0x10) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x40082406, &(0x7f0000000700)='proc!@ppp1!ppp0ppp0#)lo\\lolo{\x00') mount(&(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000200)='fuseblk\x00', 0xa11800, &(0x7f0000000240)) r5 = syz_open_dev$sg(&(0x7f0000000240)='/dev/sg#\x00', 0xfffffffffffffffa, 0x800) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000280)={r5, r3, 0x5, 0x1}, 0x10) ioctl$TIOCCONS(r5, 0x541d) mount(&(0x7f00000002c0)='./file0/file0\x00', &(0x7f0000000300)='./file0/file0\x00', &(0x7f0000000340)='minix\x00', 0x1000, &(0x7f0000000380)) 2018/03/29 17:35:04 executing program 2: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)={0xb, 0x7e, 0x3, 0x1, 0x11}, 0x2c) mount(&(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) r1 = socket$kcm(0x29, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000000bc0)={&(0x7f00000007c0)=@rc={0x1f, {0x5, 0x50000000, 0xaa2, 0x613, 0x4, 0x1ff}, 0x3f}, 0x80, &(0x7f0000000940)=[{&(0x7f0000000840)="09c9453aa30d8c5fba221fa2413f12c580837b2ae292e3ee8dd00098c404125a1a2e63840f82a2f69c3927af43b828422484aaeeceebcbe76e999bd3930c9b7c2995484407f9166e39c2069a88b63a980b9b5ffc880f4b89dde5adae6c7fb84ed98cbac860214dfb0b28d1b2e2d58aefebdfe515334f2ffa46be22ef7a4b3a276cb70a27c9e9f5de0a20bad24cbe2b89aee9693c2f8f186ea59fcfc4ebec7188cca0418d4583a6f1730f62416d70cd62555eb4f58ea831d1fea9956a2cba0049f23bf0b249f5de2ce0dc303808d70b0ccab3c7f37e949e", 0xd7}], 0x1, &(0x7f0000000980), 0x0, 0x20004805}, 0x4010) r2 = perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x2367, 0x7fff, 0x1, 0x6, 0x0, 0x78b1, 0x1, 0x0, 0x4992c766, 0xff, 0x81, 0x100, 0x40, 0x3, 0x9, 0x8, 0x1, 0x10000, 0x0, 0x6, 0x90e, 0x9, 0x7ff, 0x0, 0x8, 0x1, 0x30, 0x20, 0x7fffffff, 0x6, 0x401, 0x2, 0x1000, 0x8001, 0x1ff, 0xfffffffffffffff8, 0x0, 0x2, 0x0, @perf_config_ext={0x5, 0x8}, 0x1ab23, 0x0, 0x8, 0x5, 0x6, 0x0, 0x6}, 0xffffffffffffffff, 0x10, r0, 0x1) bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0xb, 0x9, &(0x7f0000000580)=@framed={{0x18}, [@map={0x18, 0x0, 0x1, 0x0, r0}, @generic={0x3ff, 0xfffffffffffffffc, 0x1}, @call={0x85, 0x0, 0x0, 0x6}], {0x95}}, &(0x7f0000000600)='syzkaller\x00', 0x0, 0x30, &(0x7f0000000640)=""/48, 0x41f00, 0x1}, 0x48) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000000)={&(0x7f0000000080)='./file0/file0\x00', r0}, 0x10) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000400)=@ax25={0x3, {"02f47b3723e03d"}}, 0x80, &(0x7f00000017c0), 0x0, &(0x7f0000001840)=ANY=[], 0x0, 0x24004044}, 0x4008001) bpf$MAP_CREATE(0x0, &(0x7f0000002cc0)={0x5, 0x0, 0x56c96e7a, 0x2, 0xa, 0xffffffffffffffff, 0x9}, 0x2c) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000480)='rpc_pipefs\x00', 0x200000, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000002d00)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x40082406, &(0x7f0000000240)='vmnet0keyring\x00') bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000780)={&(0x7f0000000740)='./file0/file0\x00', r3}, 0x10) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x40082406, &(0x7f0000000700)='proc!@ppp1!ppp0ppp0#)lo\\lolo{\x00') mount(&(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000200)='fuseblk\x00', 0xa11800, &(0x7f0000000240)) mount(&(0x7f00000002c0)='./file0/file0\x00', &(0x7f0000000300)='./file0/file0\x00', &(0x7f0000000340)='minix\x00', 0x1000, &(0x7f0000000380)) 2018/03/29 17:35:04 executing program 2: mkdir(&(0x7f00000000c0)='./file0\x00', 0x12) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)={0xb, 0x7e, 0x3, 0x1, 0x11}, 0x2c) mount(&(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) r1 = socket$kcm(0x29, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000000bc0)={&(0x7f00000007c0)=@rc={0x1f, {0x5, 0x50000000, 0xaa2, 0x613, 0x4, 0x1ff}, 0x3f}, 0x80, &(0x7f0000000940)=[{&(0x7f0000000840)="09c9453aa30d8c5fba221fa2413f12c580837b2ae292e3ee8dd00098c404125a1a2e63840f82a2f69c3927af43b828422484aaeeceebcbe76e999bd3930c9b7c2995484407f9166e39c2069a88b63a980b9b5ffc880f4b89dde5adae6c7fb84ed98cbac860214dfb0b28d1b2e2d58aefebdfe515334f2ffa46be22ef7a4b3a276cb70a27c9e9f5de0a20bad24cbe2b89aee9693c2f8f186ea59fcfc4ebec7188cca0418d4583a6f1730f62416d70cd62555eb4f58ea831d1fea9956a2cba0049f23bf0b249f5de2ce0dc303808d70b0ccab3c7f37e949e", 0xd7}], 0x1, &(0x7f0000000980), 0x0, 0x20004805}, 0x4010) r2 = perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x2367, 0x7fff, 0x1, 0x6, 0x0, 0x78b1, 0x1, 0x0, 0x4992c766, 0xff, 0x81, 0x100, 0x40, 0x3, 0x9, 0x8, 0x1, 0x10000, 0x0, 0x6, 0x90e, 0x9, 0x7ff, 0x0, 0x8, 0x1, 0x30, 0x20, 0x7fffffff, 0x6, 0x401, 0x2, 0x1000, 0x8001, 0x1ff, 0xfffffffffffffff8, 0x0, 0x2, 0x0, @perf_config_ext={0x5, 0x8}, 0x1ab23, 0x0, 0x8, 0x5, 0x6, 0x0, 0x6}, 0xffffffffffffffff, 0x10, r0, 0x1) bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0xb, 0x9, &(0x7f0000000580)=@framed={{0x18}, [@map={0x18, 0x0, 0x1, 0x0, r0}, @generic={0x3ff, 0xfffffffffffffffc, 0x1}, @call={0x85, 0x0, 0x0, 0x6}], {0x95}}, &(0x7f0000000600)='syzkaller\x00', 0x0, 0x30, &(0x7f0000000640)=""/48, 0x41f00, 0x1}, 0x48) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000000)={&(0x7f0000000080)='./file0/file0\x00', r0}, 0x10) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000400)=@ax25={0x3, {"02f47b3723e03d"}}, 0x80, &(0x7f00000017c0), 0x0, &(0x7f0000001840)=ANY=[], 0x0, 0x24004044}, 0x4008001) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000002cc0)={0x5, 0x0, 0x56c96e7a, 0x2, 0xa, 0xffffffffffffffff, 0x9}, 0x2c) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000480)='rpc_pipefs\x00', 0x200000, 0x0) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000980)={r3, 0x28, &(0x7f0000000280)}, 0x10) socketpair$unix(0x1, 0xfffffffffffffffe, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f00000004c0)='vmnet0keyring\x00') bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000780)={&(0x7f0000000740)='./file0/file0\x00', r4}, 0xfffffffffffffe98) r5 = openat$hwrng(0xffffffffffffff9c, &(0x7f00000009c0)='/dev/hwrng\x00', 0x0, 0x0) ioctl$KVM_GET_CLOCK(r5, 0x8030ae7c, &(0x7f0000000a00)) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x40082406, &(0x7f0000000700)='proc!@ppp1!ppp0ppp0#)lo\\lolo{\x00') mount(&(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000200)='fuseblk\x00', 0xa11800, &(0x7f0000000240)) mount(&(0x7f00000002c0)='./file0/file0\x00', &(0x7f0000000300)='./file0/file0\x00', &(0x7f0000000340)='minix\x00', 0x1000, &(0x7f0000000380)) 2018/03/29 17:35:04 executing program 0: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)={0xb, 0x7e, 0x3, 0x1, 0x11}, 0x2c) mount(&(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) r1 = creat(&(0x7f0000000240)='./file0\x00', 0x180) ioctl$EVIOCGABS20(r1, 0x80184560, &(0x7f0000000c00)=""/4096) r2 = socket$kcm(0x29, 0x2, 0x0) sendmsg$kcm(r2, &(0x7f0000000bc0)={&(0x7f00000007c0)=@rc={0x1f, {0x5, 0x50000000, 0xaa2, 0x613, 0x4, 0x1ff}}, 0x80, &(0x7f0000000940)=[{&(0x7f0000000840)="09c9453aa30d8c5fba221fa2413f12c580837b2ae292e3ee8dd00098c404125a1a2e63840f82a2f69c3927af43b828422484aaeeceebcbe76e999bd3930c9b7c2995484407f9166e39c2069a88b63a980b9b5ffc880f4b89dde5adae6c7fb84ed98cbac860214dfb0b28d1b2e2d58aefebdfe515334f2ffa46be22ef7a4b3a276cb70a27c9e9f5de0a20bad24cbe2b89aee9693c2f8f186ea59fcfc4ebec7188cca0418d4583a6f1730f62416d70cd62555eb4f58ea831d1fea9956a2cba0049f23bf0b249f5de2ce0dc303808d70b0ccab3c7f37e949e", 0xd7}], 0x1, &(0x7f0000000980)}, 0x4010) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0xb, 0x9, &(0x7f0000000580)=@framed={{0x18}, [@map={0x18, 0x0, 0x1, 0x0, r0}, @generic={0x3ff, 0xfffffffffffffffc, 0x1}, @call={0x85, 0x0, 0x0, 0x6}], {0x95}}, &(0x7f0000000600)='syzkaller\x00', 0x0, 0x30, &(0x7f0000000640)=""/48, 0x41f00, 0x1}, 0x48) ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, r3) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000000)={&(0x7f0000000080)='./file0/file0\x00', r0}, 0x10) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000400)=@ax25={0x3, {"02f47b3723e03d"}}, 0x80, &(0x7f00000017c0), 0x0, &(0x7f0000001840)=ANY=[], 0x0, 0x24004044}, 0x4008001) bpf$MAP_CREATE(0x0, &(0x7f0000002cc0)={0x5, 0x100, 0x56c96e7a, 0x2, 0xa, 0xffffffffffffffff, 0x9}, 0x2c) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000480)='rpc_pipefs\x00', 0x200000, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000002d00)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f00000004c0)='vmnet0keyring\x00') bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000780)={&(0x7f0000000740)='./file0/file0\x00', r4}, 0x10) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, &(0x7f0000000700)='proc!@ppp1!ppp0ppp0#)lo\\lolo{\x00') mount(&(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000200)='fuseblk\x00', 0xa11800, &(0x7f0000000240)) setns(r1, 0x40000000) mount(&(0x7f00000002c0)='./file0/file0\x00', &(0x7f0000000300)='./file0/file0\x00', &(0x7f0000000340)='minix\x00', 0x0, &(0x7f0000000380)) 2018/03/29 17:35:04 executing program 7: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)={0xb, 0x7e, 0x3, 0x1, 0x11}, 0x2c) mount(&(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) r1 = socket$kcm(0x29, 0x5, 0x0) sendmsg$kcm(r1, &(0x7f0000000bc0)={&(0x7f00000007c0)=@rc={0x1f, {0x5, 0x50000000, 0xaa2, 0x613, 0x4, 0x1ff}, 0x3f}, 0x80, &(0x7f0000000940)=[{&(0x7f0000000840)="09c9453aa30d8c5fba221fa2413f12c580837b2ae292e3ee8dd00098c404125a1a2e63840f82a2f69c3927af43b828422484aaeeceebcbe76e999bd3930c9b7c2995484407f9166e39c2069a88b63a980b9b5ffc880f4b89dde5adae6c7fb84ed98cbac860214dfb0b28d1b2e2d58aefebdfe515334f2ffa46be22ef7a4b3a276cb70a27c9e9f5de0a20bad24cbe2b89aee9693c2f8f186ea59fcfc4ebec7188cca0418d4583a6f1730f62416d70cd62555eb4f58ea831d1fea9956a2cba0049f23bf0b249f5de2ce0dc303808d70b0ccab3c7f37e949e", 0xd7}], 0x1, &(0x7f0000000980), 0x0, 0x20004805}, 0x4010) r2 = perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x2367, 0x7fff, 0x1, 0x6, 0x0, 0x78b1, 0x1, 0x0, 0x4992c766, 0xff, 0x81, 0x100, 0x40, 0x3, 0x9, 0x8, 0x1, 0x10000, 0x0, 0x6, 0x90e, 0x9, 0x7ff, 0x0, 0x8, 0x1, 0x30, 0x20, 0x7fffffff, 0x6, 0x401, 0x2, 0x1000, 0x8001, 0x1ff, 0xfffffffffffffff8, 0x0, 0x2, 0x0, @perf_config_ext={0x5, 0x8}, 0x1ab23, 0x3f, 0x8, 0x5, 0x6, 0x0, 0x6}, 0xffffffffffffffff, 0x10, r0, 0x1) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0xb, 0x9, &(0x7f0000000580)=@framed={{0x18}, [@map={0x18, 0x0, 0x1, 0x0, r0}, @generic={0x3ff, 0xfffffffffffffffc, 0x1}, @call={0x85, 0x0, 0x0, 0x6}], {0x95}}, &(0x7f0000000600)='syzkaller\x00', 0x0, 0x30, &(0x7f0000000640)=""/48, 0x41f00, 0x1}, 0x48) ioctl$PERF_EVENT_IOC_SET_BPF(r2, 0x40042408, r3) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000000)={&(0x7f0000000080)='./file0/file0\x00', r0}, 0x10) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000400)=@ax25={0x3, {"02f47b3723e03d"}}, 0x80, &(0x7f00000017c0), 0x0, &(0x7f0000001840)=ANY=[], 0x0, 0x24004044}, 0x4008001) bpf$MAP_CREATE(0x0, &(0x7f0000002cc0)={0x5, 0x0, 0x56c96e7a, 0x2, 0xa, 0xffffffffffffffff, 0x9}, 0x2c) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000480)='rpc_pipefs\x00', 0x200000, 0x0) setsockopt$SO_TIMESTAMPING(r1, 0x1, 0x25, &(0x7f0000000980)=0x10, 0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000002d00)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f00000004c0)='vmnet0keyring\x00') bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000780)={&(0x7f0000000740)='./file0/file0\x00', r4}, 0x10) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x40082406, &(0x7f0000000700)='proc!@ppp1!ppp0ppp0#)lo\\lolo{\x00') mount(&(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000200)='fuseblk\x00', 0xa11800, &(0x7f0000000240)) r5 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000240)='/dev/mixer\x00', 0x400401, 0x0) ioctl$TIOCLINUX5(r5, 0x541c, &(0x7f0000000280)={0x5, 0x5, 0x8, 0x400}) mount(&(0x7f00000002c0)='./file0/file0\x00', &(0x7f0000000300)='./file0/file0\x00', &(0x7f0000000340)='minix\x00', 0x1000, &(0x7f0000000380)) ioctl$sock_netrom_TIOCOUTQ(r5, 0x5411, &(0x7f00000009c0)) 2018/03/29 17:35:04 executing program 1: 2018/03/29 17:35:04 executing program 5: 2018/03/29 17:35:04 executing program 4: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)={0xb, 0x7e, 0x3, 0x1, 0x11}, 0x2c) mount(&(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) r1 = socket$kcm(0x29, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000000bc0)={&(0x7f00000007c0)=@rc={0x1f, {0x5, 0x50000000, 0xaa2, 0x613, 0x4, 0x1ff}, 0x3f}, 0x80, &(0x7f0000000940)=[{&(0x7f0000000840)="09c9453aa30d8c5fba221fa2413f12c580837b2ae292e3ee8dd00098c404125a1a2e63840f82a2f69c3927af43b828422484aaeeceebcbe76e999bd3930c9b7c2995484407f9166e39c2069a88b63a980b9b5ffc880f4b89dde5adae6c7fb84ed98cbac860214dfb0b28d1b2e2d58aefebdfe515334f2ffa46be22ef7a4b3a276cb70a27c9e9f5de0a20bad24cbe2b89aee9693c2f8f186ea59fcfc4ebec7188cca0418d4583a6f1730f62416d70cd62555eb4f58ea831d1fea9956a2cba0049f23bf0b249f5de2ce0dc303808d70b0ccab3c7f37e949e", 0xd7}], 0x1, &(0x7f0000000980), 0x0, 0x20004805}, 0x4010) r2 = perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x2367, 0x7fff, 0x1, 0x6, 0x0, 0x78b1, 0x1, 0x0, 0x4992c766, 0xff, 0x81, 0x100, 0x40, 0x3, 0x9, 0x8, 0x1, 0x10000, 0x0, 0x6, 0x90e, 0x9, 0x7ff, 0x0, 0x8, 0x1, 0x30, 0x20, 0x7fffffff, 0x6, 0x401, 0x2, 0x1000, 0x8001, 0x1ff, 0xfffffffffffffff8, 0x0, 0x2, 0x0, @perf_config_ext={0x5, 0x8}, 0x1ab23, 0x3f, 0x8, 0x5, 0x6}, 0xffffffffffffffff, 0x10, r0, 0x1) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0xb, 0x9, &(0x7f0000000580)=@framed={{0x18}, [@map={0x18, 0x0, 0x1, 0x0, r0}, @generic={0x3ff, 0xfffffffffffffffc, 0x1}, @call={0x85, 0x0, 0x0, 0x6}], {0x95}}, &(0x7f0000000600)='syzkaller\x00', 0x0, 0x30, &(0x7f0000000640)=""/48, 0x0, 0x1}, 0x48) ioctl$PERF_EVENT_IOC_SET_BPF(r2, 0x40042408, r3) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000000)={&(0x7f0000000080)='./file0/file0\x00', r0}, 0x10) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000400)=@ax25={0x3, {"02f47b3723e03d"}}, 0x80, &(0x7f00000017c0), 0x0, &(0x7f0000001840)=ANY=[], 0x0, 0x24004044}, 0x4008001) bpf$MAP_CREATE(0x0, &(0x7f0000002cc0)={0x5, 0x100, 0x56c96e7a, 0x2, 0xa, 0xffffffffffffffff, 0x9}, 0x2c) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000480)='rpc_pipefs\x00', 0x200000, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000002d00)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f00000004c0)='vmnet0keyring\x00') bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000780)={&(0x7f0000000740)='./file0/file0\x00', r4}, 0x10) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x40082406, &(0x7f0000000700)='proc!@ppp1!ppp0ppp0#)lo\\lolo{\x00') mount(&(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000200)='fuseblk\x00', 0xa11800, &(0x7f0000000240)) r5 = syz_open_dev$sg(&(0x7f0000000240)='/dev/sg#\x00', 0xfffffffffffffffa, 0x800) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000280)={r5, r3, 0x5, 0x1}, 0x10) ioctl$TIOCCONS(r5, 0x541d) mount(&(0x7f00000002c0)='./file0/file0\x00', &(0x7f0000000300)='./file0/file0\x00', &(0x7f0000000340)='minix\x00', 0x1000, &(0x7f0000000380)) 2018/03/29 17:35:04 executing program 3: r0 = socket(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000d3cfe4)={0xa, 0x0, 0x0, @mcast2={0xff, 0x2, [], 0x1}, 0x3}, 0x1c) sendto$inet6(r0, &(0x7f0000000140)="3fc469027001a9a48d2cb971603d4ca944c144ae7ea292ba61328ce3a4abf84896", 0x21, 0x40040c1, 0x0, 0x0) ioctl$DRM_IOCTL_ADD_CTX(0xffffffffffffffff, 0xc0086420, &(0x7f0000000000)={0x0}) mlock(&(0x7f0000ffb000/0x4000)=nil, 0x4000) semget$private(0x0, 0x3, 0x2) syz_open_dev$adsp(&(0x7f0000000200)='/dev/adsp#\x00', 0x0, 0x48000) r2 = syz_open_dev$sndpcmc(&(0x7f0000000300)='/dev/snd/pcmC#D#c\x00', 0x0, 0x101000) ioctl$DRM_IOCTL_NEW_CTX(r2, 0x40086425, &(0x7f00000002c0)={r1, 0x2}) fallocate(0xffffffffffffffff, 0x0, 0xffff, 0x1f) ioctl$KVM_SET_CLOCK(0xffffffffffffffff, 0x4030ae7b, &(0x7f00000000c0)={0x10000, 0x9}) setsockopt$inet6_mtu(0xffffffffffffffff, 0x29, 0x17, &(0x7f0000000100)=0x2, 0x4) connect(r0, &(0x7f0000000180)=@llc={0x1a, 0x207, 0x1f, 0x2, 0xad, 0x8001, @random="1dec47273c63"}, 0x80) connect$inet(r0, &(0x7f0000000040)={0x2, 0x4e22, @multicast1=0xe0000001}, 0x10) sendfile(r0, 0xffffffffffffffff, &(0x7f00005faff8), 0xfffb) ioctl$KVM_SET_VAPIC_ADDR(0xffffffffffffffff, 0x4008ae93, &(0x7f0000000240)=0x6000) 2018/03/29 17:35:04 executing program 6: 2018/03/29 17:35:04 executing program 5: 2018/03/29 17:35:04 executing program 1: 2018/03/29 17:35:04 executing program 6: 2018/03/29 17:35:04 executing program 6: 2018/03/29 17:35:04 executing program 5: 2018/03/29 17:35:04 executing program 1: 2018/03/29 17:35:04 executing program 4: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)={0xb, 0x7e, 0x3, 0x1, 0x11}, 0x2c) mount(&(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) r1 = socket$kcm(0x29, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000000bc0)={&(0x7f00000007c0)=@rc={0x1f, {0x5, 0x50000000, 0xaa2, 0x613, 0x4, 0x1ff}, 0x3f}, 0x80, &(0x7f0000000940)=[{&(0x7f0000000840)="09c9453aa30d8c5fba221fa2413f12c580837b2ae292e3ee8dd00098c404125a1a2e63840f82a2f69c3927af43b828422484aaeeceebcbe76e999bd3930c9b7c2995484407f9166e39c2069a88b63a980b9b5ffc880f4b89dde5adae6c7fb84ed98cbac860214dfb0b28d1b2e2d58aefebdfe515334f2ffa46be22ef7a4b3a276cb70a27c9e9f5de0a20bad24cbe2b89aee9693c2f8f186ea59fcfc4ebec7188cca0418d4583a6f1730f62416d70cd62555eb4f58ea831d1fea9956a2cba0049f23bf0b249f5de2ce0dc303808d70b0ccab3c7f37e949e", 0xd7}], 0x1, &(0x7f0000000980), 0x0, 0x20004805}, 0x4010) r2 = perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x2367, 0x7fff, 0x1, 0x6, 0x0, 0x78b1, 0x1, 0x0, 0x4992c766, 0xff, 0x81, 0x100, 0x40, 0x3, 0x9, 0x8, 0x1, 0x10000, 0x0, 0x6, 0x90e, 0x9, 0x7ff, 0x0, 0x8, 0x1, 0x30, 0x20, 0x7fffffff, 0x6, 0x401, 0x2, 0x1000, 0x8001, 0x1ff, 0xfffffffffffffff8, 0x0, 0x2, 0x0, @perf_config_ext={0x5, 0x8}, 0x1ab23, 0x3f, 0x8, 0x5, 0x6}, 0xffffffffffffffff, 0x10, r0, 0x1) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0xb, 0x9, &(0x7f0000000580)=@framed={{0x18}, [@map={0x18, 0x0, 0x1, 0x0, r0}, @generic={0x3ff, 0xfffffffffffffffc, 0x1}, @call={0x85, 0x0, 0x0, 0x6}], {0x95}}, &(0x7f0000000600)='syzkaller\x00', 0x0, 0x30, &(0x7f0000000640)=""/48, 0x0, 0x1}, 0x48) ioctl$PERF_EVENT_IOC_SET_BPF(r2, 0x40042408, r3) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000000)={&(0x7f0000000080)='./file0/file0\x00', r0}, 0x10) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000400)=@ax25={0x3, {"02f47b3723e03d"}}, 0x80, &(0x7f00000017c0), 0x0, &(0x7f0000001840)=ANY=[], 0x0, 0x24004044}, 0x4008001) bpf$MAP_CREATE(0x0, &(0x7f0000002cc0)={0x5, 0x100, 0x56c96e7a, 0x2, 0xa, 0xffffffffffffffff, 0x9}, 0x2c) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000480)='rpc_pipefs\x00', 0x200000, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000002d00)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f00000004c0)='vmnet0keyring\x00') bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000780)={&(0x7f0000000740)='./file0/file0\x00', r4}, 0x10) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x40082406, &(0x7f0000000700)='proc!@ppp1!ppp0ppp0#)lo\\lolo{\x00') mount(&(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000200)='fuseblk\x00', 0xa11800, &(0x7f0000000240)) r5 = syz_open_dev$sg(&(0x7f0000000240)='/dev/sg#\x00', 0xfffffffffffffffa, 0x800) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000280)={r5, r3, 0x5, 0x1}, 0x10) ioctl$TIOCCONS(r5, 0x541d) mount(&(0x7f00000002c0)='./file0/file0\x00', &(0x7f0000000300)='./file0/file0\x00', &(0x7f0000000340)='minix\x00', 0x1000, &(0x7f0000000380)) 2018/03/29 17:35:04 executing program 4: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)={0xb, 0x7e, 0x3, 0x1, 0x11}, 0x2c) mount(&(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) r1 = socket$kcm(0x29, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000000bc0)={&(0x7f00000007c0)=@rc={0x1f, {0x5, 0x50000000, 0xaa2, 0x613, 0x4, 0x1ff}, 0x3f}, 0x80, &(0x7f0000000940)=[{&(0x7f0000000840)="09c9453aa30d8c5fba221fa2413f12c580837b2ae292e3ee8dd00098c404125a1a2e63840f82a2f69c3927af43b828422484aaeeceebcbe76e999bd3930c9b7c2995484407f9166e39c2069a88b63a980b9b5ffc880f4b89dde5adae6c7fb84ed98cbac860214dfb0b28d1b2e2d58aefebdfe515334f2ffa46be22ef7a4b3a276cb70a27c9e9f5de0a20bad24cbe2b89aee9693c2f8f186ea59fcfc4ebec7188cca0418d4583a6f1730f62416d70cd62555eb4f58ea831d1fea9956a2cba0049f23bf0b249f5de2ce0dc303808d70b0ccab3c7f37e949e", 0xd7}], 0x1, &(0x7f0000000980), 0x0, 0x20004805}, 0x4010) r2 = perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x2367, 0x7fff, 0x1, 0x6, 0x0, 0x78b1, 0x1, 0x0, 0x4992c766, 0xff, 0x81, 0x100, 0x40, 0x3, 0x9, 0x8, 0x1, 0x10000, 0x0, 0x6, 0x90e, 0x9, 0x7ff, 0x0, 0x8, 0x1, 0x30, 0x20, 0x7fffffff, 0x6, 0x401, 0x2, 0x1000, 0x8001, 0x1ff, 0xfffffffffffffff8, 0x0, 0x2, 0x0, @perf_config_ext={0x5, 0x8}, 0x1ab23, 0x3f, 0x8, 0x5, 0x6}, 0xffffffffffffffff, 0x10, r0, 0x1) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0xb, 0x9, &(0x7f0000000580)=@framed={{0x18}, [@map={0x18, 0x0, 0x1, 0x0, r0}, @generic={0x3ff, 0xfffffffffffffffc, 0x1}, @call={0x85, 0x0, 0x0, 0x6}], {0x95}}, &(0x7f0000000600)='syzkaller\x00', 0x0, 0x30, &(0x7f0000000640)=""/48, 0x41f00}, 0x48) ioctl$PERF_EVENT_IOC_SET_BPF(r2, 0x40042408, r3) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000000)={&(0x7f0000000080)='./file0/file0\x00', r0}, 0x10) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000400)=@ax25={0x3, {"02f47b3723e03d"}}, 0x80, &(0x7f00000017c0), 0x0, &(0x7f0000001840)=ANY=[], 0x0, 0x24004044}, 0x4008001) bpf$MAP_CREATE(0x0, &(0x7f0000002cc0)={0x5, 0x100, 0x56c96e7a, 0x2, 0xa, 0xffffffffffffffff, 0x9}, 0x2c) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000480)='rpc_pipefs\x00', 0x200000, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000002d00)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f00000004c0)='vmnet0keyring\x00') bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000780)={&(0x7f0000000740)='./file0/file0\x00', r4}, 0x10) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x40082406, &(0x7f0000000700)='proc!@ppp1!ppp0ppp0#)lo\\lolo{\x00') mount(&(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000200)='fuseblk\x00', 0xa11800, &(0x7f0000000240)) r5 = syz_open_dev$sg(&(0x7f0000000240)='/dev/sg#\x00', 0xfffffffffffffffa, 0x800) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000280)={r5, r3, 0x5, 0x1}, 0x10) ioctl$TIOCCONS(r5, 0x541d) mount(&(0x7f00000002c0)='./file0/file0\x00', &(0x7f0000000300)='./file0/file0\x00', &(0x7f0000000340)='minix\x00', 0x1000, &(0x7f0000000380)) 2018/03/29 17:35:04 executing program 7: mincore(&(0x7f0000ff9000/0x4000)=nil, 0x4000, &(0x7f0000000980)=""/200) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)={0xb, 0x7e, 0x3, 0x1, 0x11}, 0x2c) mount(&(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) r1 = socket$kcm(0x29, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000000bc0)={&(0x7f00000007c0)=@rc={0x1f, {0x5, 0x50000000, 0xaa2, 0x613, 0x4, 0x1ff}, 0x3f}, 0x80, &(0x7f0000000940)=[{&(0x7f0000000840)="09c9453aa30d8c5fba221fa2413f12c580837b2ae292e3ee8dd00098c404125a1a2e63840f82a2f69c3927af43b828422484aaeeceebcbe76e999bd3930c9b7c2995484407f9166e39c2069a88b63a980b9b5ffc880f4b89dde5adae6c7fb84ed98cbac860214dfb0b28d1b2e2d58aefebdfe515334f2ffa46be22ef7a4b3a276cb70a27c9e9f5de0a20bad24cbe2b89aee9693c2f8f186ea59fcfc4ebec7188cca0418d4583a6f1730f62416d70cd62555eb4f58ea831d1fea9956a2cba0049f23bf0b249f5de2ce0dc303808d70b0ccab3c7f37e949e", 0xd7}], 0x1, &(0x7f0000000980), 0x0, 0x20004805}, 0x4010) r2 = perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x2367, 0x7fff, 0x1, 0x6, 0x0, 0x78b1, 0x1, 0x0, 0x4992c766, 0xff, 0x81, 0x100, 0x40, 0x3, 0x9, 0x8, 0x1, 0x10000, 0x0, 0x6, 0x90e, 0x9, 0x7ff, 0x0, 0x8, 0x1, 0x30, 0x20, 0x7fffffff, 0x6, 0x401, 0x2, 0x1000, 0x8001, 0x1ff, 0xfffffffffffffff8, 0x0, 0x2, 0x0, @perf_config_ext={0x5, 0x8}, 0x1ab23, 0x3f, 0x8, 0x5, 0x6, 0x0, 0x6}, 0xffffffffffffffff, 0x10, r0, 0x1) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0xb, 0x9, &(0x7f0000000580)=@framed={{0x18}, [@map={0x18, 0x0, 0x1, 0x0, r0}, @generic={0x3ff, 0xfffffffffffffffc, 0x1}, @call={0x85, 0x0, 0x0, 0x6}], {0x95}}, &(0x7f0000000600)='syzkaller\x00', 0x0, 0x30, &(0x7f0000000640)=""/48, 0x41f00, 0x1}, 0x48) ioctl$PERF_EVENT_IOC_SET_BPF(r2, 0x40042408, r3) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000000)={&(0x7f0000000080)='./file0/file0\x00', r0}, 0x10) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000400)=@ax25={0x3, {"02f47b3723e03d"}}, 0x80, &(0x7f00000017c0), 0x0, &(0x7f0000001840)=ANY=[], 0x0, 0x24004044}, 0x4008001) bpf$MAP_CREATE(0x0, &(0x7f0000002cc0)={0x5, 0x0, 0x56c96e7a, 0x2, 0xa, 0xffffffffffffffff, 0x9}, 0x2c) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000480)='rpc_pipefs\x00', 0x200000, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000002d00)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f00000004c0)='vmnet0keyring\x00') bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000780)={&(0x7f0000000740)='./file0/file0\x00', r4}, 0x10) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x40082406, &(0x7f0000000700)='proc!@ppp1!ppp0ppp0#)lo\\lolo{\x00') mount(&(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000200)='fuseblk\x00', 0xa11800, &(0x7f0000000240)) mount(&(0x7f00000002c0)='./file0/file0\x00', &(0x7f0000000300)='./file0/file0\x00', &(0x7f0000000340)='minix\x00', 0x1000, &(0x7f0000000380)) 2018/03/29 17:35:04 executing program 3: r0 = socket(0xa, 0x2, 0x0) r1 = open(&(0x7f00004b8ff8)='./file0\x00', 0x28042, 0x0) connect$inet6(r0, &(0x7f0000d3cfe4)={0xa, 0x0, 0x0, @mcast2={0xff, 0x2, [], 0x1}, 0x3}, 0x1c) ioctl$DRM_IOCTL_ADD_CTX(r1, 0xc0086420, &(0x7f0000000000)) ioctl$DRM_IOCTL_NEW_CTX(r1, 0x40086425, &(0x7f0000000080)={0x0, 0x3}) ioctl$DRM_IOCTL_ADD_CTX(r1, 0xc0086420, &(0x7f0000000140)) ioctl$sock_SIOCGIFCONF(r0, 0x8910, &(0x7f0000000300)=@req={0x28, &(0x7f0000000340)={'eql\x00', @ifru_map={0x0, 0xfffffffffffffffd, 0x2b, 0x4, 0xab6, 0x100000001}}}) sendfile(r1, r1, &(0x7f00000000c0), 0x80) fallocate(r1, 0x0, 0xffff, 0x1f) setsockopt$inet6_mtu(0xffffffffffffffff, 0x29, 0x17, &(0x7f0000000100)=0x2, 0x4) socketpair$inet6_tcp(0xa, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) accept4$packet(r1, &(0x7f00000001c0)={0x0, 0x0, 0x0}, &(0x7f0000000200)=0x14, 0x800) stat(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0}) setsockopt$inet6_IPV6_XFRM_POLICY(r2, 0x29, 0x23, &(0x7f0000000380)={{{@in6=@loopback={0x0, 0x1}, @in6=@loopback={0x0, 0x1}, 0x4e22, 0x9, 0x4e20, 0x1, 0xa, 0xa0, 0x20, 0x73, r3, r4}, {0x2f6a, 0x2, 0x88a, 0x6bf57398, 0x8000, 0x2, 0x2, 0x8}, {0x8000, 0x7f, 0x8, 0x13c000000}, 0x639, 0x0, 0x0, 0x1, 0x2, 0x3}, {{@in=@multicast1=0xe0000001, 0x4d4, 0xff}, 0x2, @in6=@local={0xfe, 0x80, [], 0xaa}, 0x0, 0x7, 0x3, 0x6, 0x400, 0x4, 0x1ff}}, 0xe8) connect$inet(r0, &(0x7f0000000040)={0x2, 0x4e22, @multicast1=0xe0000001}, 0x10) sendfile(r0, r1, &(0x7f00005faff8), 0xfffb) 2018/03/29 17:35:04 executing program 2: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)={0xb, 0x7e, 0x3, 0x1, 0x11}, 0x2c) mount(&(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) r1 = socket$kcm(0x29, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000000bc0)={&(0x7f00000007c0)=@rc={0x1f, {0x5, 0x50000000, 0xaa2, 0x613, 0x4, 0x1ff}, 0x3f}, 0x80, &(0x7f0000000940)=[{&(0x7f0000000840)="09c9453aa30d8c5fba221fa2413f12c580837b2ae292e3ee8dd00098c404125a1a2e63840f82a2f69c3927af43b828422484aaeeceebcbe76e999bd3930c9b7c2995484407f9166e39c2069a88b63a980b9b5ffc880f4b89dde5adae6c7fb84ed98cbac860214dfb0b28d1b2e2d58aefebdfe515334f2ffa46be22ef7a4b3a276cb70a27c9e9f5de0a20bad24cbe2b89aee9693c2f8f186ea59fcfc4ebec7188cca0418d4583a6f1730f62416d70cd62555eb4f58ea831d1fea9956a2cba0049f23bf0b249f5de2ce0dc303808d70b0ccab3c7f37e949e", 0xd7}], 0x1, &(0x7f0000000980), 0x0, 0x20004805}, 0x4010) r2 = perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x2367, 0x7fff, 0x1, 0x6, 0x0, 0x78b1, 0x1, 0x0, 0x4992c766, 0xff, 0x81, 0x100, 0x40, 0x3, 0x9, 0x8, 0x1, 0x10000, 0x0, 0x6, 0x90e, 0x9, 0x7ff, 0x0, 0x8, 0x1, 0x30, 0x20, 0x7fffffff, 0x6, 0x401, 0x2, 0x1000, 0x8001, 0x1ff, 0xfffffffffffffff8, 0x0, 0x2, 0x0, @perf_config_ext={0x5, 0x8}, 0x1ab23, 0x0, 0x8, 0x5, 0x6, 0x0, 0x6}, 0xffffffffffffffff, 0x10, r0, 0x1) bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0xb, 0x9, &(0x7f0000000580)=@framed={{0x18}, [@map={0x18, 0x0, 0x1, 0x0, r0}, @generic={0x3ff, 0xfffffffffffffffc, 0x1}, @call={0x85, 0x0, 0x0, 0x6}], {0x95}}, &(0x7f0000000600)='syzkaller\x00', 0x0, 0x30, &(0x7f0000000640)=""/48, 0x41f00, 0x1}, 0x48) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000000)={&(0x7f0000000080)='./file0/file0\x00', r0}, 0x10) r3 = syz_open_dev$vcsn(&(0x7f0000000240)='/dev/vcs#\x00', 0x7, 0x80) setsockopt$ARPT_SO_SET_REPLACE(r3, 0x0, 0x60, &(0x7f0000000c00)={'filter\x00', 0x7, 0x4, 0x480, 0x118, 0x0, 0x258, 0x398, 0x398, 0x398, 0x4, &(0x7f0000000280), {[{{@arp={@remote={0xac, 0x14, 0x14, 0xbb}, @dev={0xac, 0x14, 0x14, 0x16}, 0xffffffff, 0xffffffff, @mac=@link_local={0x1, 0x80, 0xc2}, {[0xff, 0xff, 0x0, 0xff, 0x0, 0xff]}, @empty, {[0x0, 0xff, 0xff, 0xff, 0xff]}, 0xb84, 0x1, 0x100, 0x0, 0x80, 0x20f, 'gretap0\x00', 'lo\x00', {0xff}, {0xff}, 0x0, 0x10}, 0xf0, 0x118}, @unspec=@CONNSECMARK={0x28, 'CONNSECMARK\x00', 0x0, {0x2}}}, {{@uncond, 0xf0, 0x140}, @mangle={0x50, 'mangle\x00', 0x0, {@empty, @empty, @empty, @local={0xac, 0x14, 0x14, 0xaa}, 0xf, 0xffffffff}}}, {{@arp={@local={0xac, 0x14, 0x14, 0xaa}, @local={0xac, 0x14, 0x14, 0xaa}, 0xff000000, 0xffffffff, @empty, {[0x0, 0xff, 0xff, 0xff, 0xff, 0xff]}, @mac=@link_local={0x1, 0x80, 0xc2}, {[0xff, 0x0, 0xff, 0xff, 0x0, 0xff]}, 0x10000, 0x3ff, 0x2, 0x8000, 0x7f, 0x0, 'bridge0\x00', 'bpq0\x00', {0xff}, {0xff}, 0x0, 0x8}, 0xf0, 0x140}, @mangle={0x50, 'mangle\x00', 0x0, {@empty, @empty, @empty, @local={0xac, 0x14, 0x14, 0xaa}, 0xf, 0x1}}}], {{[], 0xc0, 0xe8}, {0x28, '\x00', 0x0, 0xfffffffffffffffe}}}}, 0x4d0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000400)=@ax25={0x3, {"02f47b3723e03d"}}, 0x80, &(0x7f00000017c0), 0x0, &(0x7f0000001840)=ANY=[], 0x0, 0x24004044}, 0x4008001) bpf$MAP_CREATE(0x0, &(0x7f0000002cc0)={0x5, 0x0, 0x56c96e7a, 0x2, 0xa, 0xffffffffffffffff, 0x9}, 0x2c) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000480)='rpc_pipefs\x00', 0x200000, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000002d00)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f00000004c0)='vmnet0keyring\x00') getsockopt$IPT_SO_GET_REVISION_TARGET(r3, 0x0, 0x43, &(0x7f00000009c0)={'icmp\x00'}, &(0x7f0000000a00)=0x1e) open(&(0x7f0000000980)='./file0/file0\x00', 0x42000, 0x114) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000780)={&(0x7f0000000740)='./file0/file0\x00', r4}, 0x10) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x40082406, &(0x7f0000000700)='proc!@ppp1!ppp0ppp0#)lo\\lolo{\x00') mount(&(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000200)='fuseblk\x00', 0xa11800, &(0x7f0000000240)) mount(&(0x7f00000002c0)='./file0/file0\x00', &(0x7f0000000300)='./file0/file0\x00', &(0x7f0000000340)='minix\x00', 0x1000, &(0x7f0000000380)) 2018/03/29 17:35:04 executing program 0: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)={0xb, 0x7e, 0x3, 0x1, 0x11}, 0x2c) mount(&(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) r1 = socket$kcm(0x29, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000000bc0)={&(0x7f00000007c0)=@rc={0x1f, {0x5, 0x50000000, 0xaa2, 0x613, 0x4, 0x1ff}}, 0x80, &(0x7f0000000940)=[{&(0x7f0000000840)="09c9453aa30d8c5fba221fa2413f12c580837b2ae292e3ee8dd00098c404125a1a2e63840f82a2f69c3927af43b828422484aaeeceebcbe76e999bd3930c9b7c2995484407f9166e39c2069a88b63a980b9b5ffc880f4b89dde5adae6c7fb84ed98cbac860214dfb0b28d1b2e2d58aefebdfe515334f2ffa46be22ef7a4b3a276cb70a27c9e9f5de0a20bad24cbe2b89aee9693c2f8f186ea59fcfc4ebec7188cca0418d4583a6f1730f62416d70cd62555eb4f58ea831d1fea9956a2cba0049f23bf0b249f5de2ce0dc303808d70b0ccab3c7f37e949e", 0xd7}], 0x1, &(0x7f0000000980)}, 0x4010) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0xb, 0x9, &(0x7f0000000580)=@framed={{0x18}, [@map={0x18, 0x0, 0x1, 0x0, r0}, @generic={0x3ff, 0xfffffffffffffffc, 0x1}, @call={0x85, 0x0, 0x0, 0x6}], {0x95}}, &(0x7f0000000600)='syzkaller\x00', 0x0, 0x30, &(0x7f0000000640)=""/48, 0x41f00, 0x1}, 0x48) r3 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000240)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$VHOST_GET_VRING_ENDIAN(r3, 0x4008af14, &(0x7f0000000280)={0x1, 0xc5}) ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, r2) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000000)={&(0x7f0000000080)='./file0/file0\x00', r0}, 0x10) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000400)=@ax25={0x3, {"02f47b3723e03d"}}, 0x80, &(0x7f00000017c0), 0x0, &(0x7f0000001840)=ANY=[], 0x0, 0x24004044}, 0x4008001) bpf$MAP_CREATE(0x0, &(0x7f0000002cc0)={0x5, 0x100, 0x56c96e7a, 0x2, 0xa, 0xffffffffffffffff, 0x9}, 0x2c) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000480)='rpc_pipefs\x00', 0x200000, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000002d00)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f00000004c0)='vmnet0keyring\x00') bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000780)={&(0x7f0000000740)='./file0/file0\x00', r4}, 0x10) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, &(0x7f0000000700)='proc!@ppp1!ppp0ppp0#)lo\\lolo{\x00') mount(&(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000200)='fuseblk\x00', 0xa11800, &(0x7f0000000240)) mount(&(0x7f00000002c0)='./file0/file0\x00', &(0x7f0000000300)='./file0/file0\x00', &(0x7f0000000340)='minix\x00', 0x0, &(0x7f0000000380)) 2018/03/29 17:35:04 executing program 6: 2018/03/29 17:35:04 executing program 1: 2018/03/29 17:35:04 executing program 5: 2018/03/29 17:35:04 executing program 6: 2018/03/29 17:35:04 executing program 5: 2018/03/29 17:35:04 executing program 1: 2018/03/29 17:35:04 executing program 6: 2018/03/29 17:35:04 executing program 4: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)={0xb, 0x7e, 0x3, 0x1, 0x11}, 0x2c) mount(&(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) r1 = socket$kcm(0x29, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000000bc0)={&(0x7f00000007c0)=@rc={0x1f, {0x5, 0x50000000, 0xaa2, 0x613, 0x4, 0x1ff}, 0x3f}, 0x80, &(0x7f0000000940)=[{&(0x7f0000000840)="09c9453aa30d8c5fba221fa2413f12c580837b2ae292e3ee8dd00098c404125a1a2e63840f82a2f69c3927af43b828422484aaeeceebcbe76e999bd3930c9b7c2995484407f9166e39c2069a88b63a980b9b5ffc880f4b89dde5adae6c7fb84ed98cbac860214dfb0b28d1b2e2d58aefebdfe515334f2ffa46be22ef7a4b3a276cb70a27c9e9f5de0a20bad24cbe2b89aee9693c2f8f186ea59fcfc4ebec7188cca0418d4583a6f1730f62416d70cd62555eb4f58ea831d1fea9956a2cba0049f23bf0b249f5de2ce0dc303808d70b0ccab3c7f37e949e", 0xd7}], 0x1, &(0x7f0000000980), 0x0, 0x20004805}, 0x4010) r2 = perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x2367, 0x7fff, 0x1, 0x6, 0x0, 0x78b1, 0x1, 0x0, 0x4992c766, 0xff, 0x81, 0x100, 0x40, 0x3, 0x9, 0x8, 0x1, 0x10000, 0x0, 0x6, 0x90e, 0x9, 0x7ff, 0x0, 0x8, 0x1, 0x30, 0x20, 0x7fffffff, 0x6, 0x401, 0x2, 0x1000, 0x8001, 0x1ff, 0xfffffffffffffff8, 0x0, 0x2, 0x0, @perf_config_ext={0x5, 0x8}, 0x1ab23, 0x3f, 0x8, 0x5, 0x6}, 0xffffffffffffffff, 0x10, r0, 0x1) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0xb, 0x9, &(0x7f0000000580)=@framed={{0x18}, [@map={0x18, 0x0, 0x1, 0x0, r0}, @generic={0x3ff, 0xfffffffffffffffc, 0x1}, @call={0x85, 0x0, 0x0, 0x6}], {0x95}}, &(0x7f0000000600)='syzkaller\x00', 0x0, 0x30, &(0x7f0000000640)=""/48, 0x41f00}, 0x48) ioctl$PERF_EVENT_IOC_SET_BPF(r2, 0x40042408, r3) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000000)={&(0x7f0000000080)='./file0/file0\x00', r0}, 0x10) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000400)=@ax25={0x3, {"02f47b3723e03d"}}, 0x80, &(0x7f00000017c0), 0x0, &(0x7f0000001840)=ANY=[], 0x0, 0x24004044}, 0x4008001) bpf$MAP_CREATE(0x0, &(0x7f0000002cc0)={0x5, 0x100, 0x56c96e7a, 0x2, 0xa, 0xffffffffffffffff, 0x9}, 0x2c) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000480)='rpc_pipefs\x00', 0x200000, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000002d00)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f00000004c0)='vmnet0keyring\x00') bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000780)={&(0x7f0000000740)='./file0/file0\x00', r4}, 0x10) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x40082406, &(0x7f0000000700)='proc!@ppp1!ppp0ppp0#)lo\\lolo{\x00') mount(&(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000200)='fuseblk\x00', 0xa11800, &(0x7f0000000240)) r5 = syz_open_dev$sg(&(0x7f0000000240)='/dev/sg#\x00', 0xfffffffffffffffa, 0x800) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000280)={r5, r3, 0x5, 0x1}, 0x10) ioctl$TIOCCONS(r5, 0x541d) mount(&(0x7f00000002c0)='./file0/file0\x00', &(0x7f0000000300)='./file0/file0\x00', &(0x7f0000000340)='minix\x00', 0x1000, &(0x7f0000000380)) 2018/03/29 17:35:04 executing program 7: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)={0xb, 0x7e, 0x3, 0x1, 0x11}, 0x2c) mount(&(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) r1 = socket$kcm(0x29, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000000bc0)={&(0x7f00000007c0)=@rc={0x1f, {0x5, 0x50000000, 0xaa2, 0x613, 0x4, 0x1ff}, 0x3f}, 0x80, &(0x7f0000000940)=[{&(0x7f0000000840)="09c9453aa30d8c5fba221fa2413f12c580837b2ae292e3ee8dd00098c404125a1a2e63840f82a2f69c3927af43b828422484aaeeceebcbe76e999bd3930c9b7c2995484407f9166e39c2069a88b63a980b9b5ffc880f4b89dde5adae6c7fb84ed98cbac860214dfb0b28d1b2e2d58aefebdfe515334f2ffa46be22ef7a4b3a276cb70a27c9e9f5de0a20bad24cbe2b89aee9693c2f8f186ea59fcfc4ebec7188cca0418d4583a6f1730f62416d70cd62555eb4f58ea831d1fea9956a2cba0049f23bf0b249f5de2ce0dc303808d70b0ccab3c7f37e949e", 0xd7}], 0x1, &(0x7f0000000980), 0x0, 0x20004805}, 0x4010) r2 = perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x2367, 0x7fff, 0x1, 0x6, 0x0, 0x78b1, 0x1, 0x0, 0x4992c766, 0xff, 0x81, 0x100, 0x40, 0x3, 0x9, 0x8, 0x1, 0x10000, 0x0, 0x6, 0x90e, 0x9, 0x7ff, 0x0, 0x8, 0x1, 0x30, 0x20, 0x7fffffff, 0x6, 0x401, 0x2, 0x1000, 0x8001, 0x1ff, 0xfffffffffffffff8, 0x0, 0x2, 0x0, @perf_config_ext={0x5, 0x8}, 0x1ab23, 0x3f, 0x8, 0x5, 0x6, 0x0, 0x6}, 0xffffffffffffffff, 0x10, r0, 0x1) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0xb, 0x9, &(0x7f0000000580)=ANY=[@ANYBLOB="1800000000000000000000000000000018100000", @ANYRES32=r0, @ANYBLOB="0000000000000000fffcea056ced377d7042010000580000000000000000000085000000060000000000000000000000"], &(0x7f0000000600)='syzkaller\x00', 0x0, 0x30, &(0x7f0000000640)=""/48, 0x41f00, 0x1}, 0x48) ioctl$PERF_EVENT_IOC_SET_BPF(r2, 0x40042408, r3) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000000)={&(0x7f0000000080)='./file0/file0\x00', r0}, 0x10) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000400)=@ax25={0x3, {"02f47b3723e03d"}}, 0x80, &(0x7f00000017c0), 0x0, &(0x7f0000001840)=ANY=[], 0x0, 0x24004044}, 0x4008001) bpf$MAP_CREATE(0x0, &(0x7f0000002cc0)={0x5, 0x0, 0x56c96e7a, 0x2, 0xa, 0xffffffffffffffff, 0x9}, 0x2c) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000480)='rpc_pipefs\x00', 0x200000, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000002d00)={0xffffffffffffffff, 0xffffffffffffffff}) syz_open_dev$audion(&(0x7f0000000240)='/dev/audio#\x00', 0x31c7, 0x200000) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f00000004c0)='vmnet0keyring\x00') bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000780)={&(0x7f0000000740)='./file0/file0\x00', r4}, 0x10) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x40082406, &(0x7f0000000700)='proc!@ppp1!ppp0ppp0#)lo\\lolo{\x00') mount(&(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000200)='fuseblk\x00', 0xa11800, &(0x7f0000000240)) mount(&(0x7f00000002c0)='./file0/file0\x00', &(0x7f0000000300)='./file0/file0\x00', &(0x7f0000000340)='minix\x00', 0x1000, &(0x7f0000000380)) 2018/03/29 17:35:04 executing program 2: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)={0xb, 0x7e, 0x3, 0x1, 0x11}, 0x2c) mount(&(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) r1 = socket$kcm(0x29, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000000bc0)={&(0x7f00000007c0)=@rc={0x1f, {0x5, 0x50000000, 0xaa2, 0x613, 0x4, 0x1ff}, 0x3f}, 0x80, &(0x7f0000000940)=[{&(0x7f0000000840)="09c9453aa30d8c5fba221fa2413f12c580837b2ae292e3ee8dd00098c404125a1a2e63840f82a2f69c3927af43b828422484aaeeceebcbe76e999bd3930c9b7c2995484407f9166e39c2069a88b63a980b9b5ffc880f4b89dde5adae6c7fb84ed98cbac860214dfb0b28d1b2e2d58aefebdfe515334f2ffa46be22ef7a4b3a276cb70a27c9e9f5de0a20bad24cbe2b89aee9693c2f8f186ea59fcfc4ebec7188cca0418d4583a6f1730f62416d70cd62555eb4f58ea831d1fea9956a2cba0049f23bf0b249f5de2ce0dc303808d70b0ccab3c7f37e949e", 0xd7}], 0x1, &(0x7f0000000980), 0x0, 0x20004805}, 0x4010) r2 = perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x2367, 0x7fff, 0x1, 0x6, 0x0, 0x78b1, 0x1, 0x0, 0x4992c766, 0xff, 0x81, 0x100, 0x40, 0x3, 0x9, 0x8, 0x1, 0x10000, 0x0, 0x6, 0x90e, 0x9, 0x7ff, 0x0, 0x8, 0x1, 0x30, 0x20, 0x7fffffff, 0x6, 0x401, 0x2, 0x1000, 0x8001, 0x1ff, 0xfffffffffffffff8, 0x0, 0x2, 0x0, @perf_config_ext={0x5, 0x8}, 0x1ab23, 0x0, 0x8, 0x5, 0x6, 0x0, 0x6}, 0xffffffffffffffff, 0x10, r0, 0x1) bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0xb, 0x9, &(0x7f0000000580)=ANY=[@ANYBLOB="180010903f", @ANYRES32=r0, @ANYBLOB="0000000000000000fffc0100000000000000000000000000850000000600000000000000000000009500000000000000"], &(0x7f0000000600)='syzkaller\x00', 0x0, 0x30, &(0x7f0000000640)=""/48, 0x41f00, 0x1}, 0x48) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000000)={&(0x7f0000000080)='./file0/file0\x00', r0}, 0x10) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000400)=@ax25={0x3, {"02f47b3723e03d"}}, 0x80, &(0x7f00000017c0), 0x0, &(0x7f0000001840)=ANY=[], 0x0, 0x24004044}, 0x4008001) bpf$MAP_CREATE(0x0, &(0x7f0000002cc0)={0x5, 0x0, 0x56c96e7a, 0x2, 0xa, 0xffffffffffffffff, 0x9}, 0x2c) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000480)='rpc_pipefs\x00', 0x200000, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000002d00)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f00000004c0)='vmnet0keyring\x00') bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000780)={&(0x7f0000000740)='./file0/file0\x00', r3}, 0x10) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x40082406, &(0x7f0000000700)='proc!@ppp1!ppp0ppp0#)lo\\lolo{\x00') mount(&(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000200)='fuseblk\x00', 0xa11800, &(0x7f0000000240)) mount(&(0x7f00000002c0)='./file0/file0\x00', &(0x7f0000000300)='./file0/file0\x00', &(0x7f0000000340)='minix\x00', 0x1000, &(0x7f0000000380)) ioctl$TIOCSSOFTCAR(r0, 0x541a, &(0x7f0000000240)=0x4) 2018/03/29 17:35:04 executing program 0: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)={0xb, 0x7e, 0x3, 0x1, 0x11}, 0x2c) mount(&(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) r1 = socket$kcm(0x29, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000000bc0)={&(0x7f00000007c0)=@rc={0x1f, {0x5, 0x50000000, 0xaa2, 0x613, 0x4, 0x1ff}}, 0x80, &(0x7f0000000940)=[{&(0x7f0000000840)="09c9453aa30d8c5fba221fa2413f12c580837b2ae292e3ee8dd00098c404125a1a2e63840f82a2f69c3927af43b828422484aaeeceebcbe76e999bd3930c9b7c2995484407f9166e39c2069a88b63a980b9b5ffc880f4b89dde5adae6c7fb84ed98cbac860214dfb0b28d1b2e2d58aefebdfe515334f2ffa46be22ef7a4b3a276cb70a27c9e9f5de0a20bad24cbe2b89aee9693c2f8f186ea59fcfc4ebec7188cca0418d4583a6f1730f62416d70cd62555eb4f58ea831d1fea9956a2cba0049f23bf0b249f5de2ce0dc303808d70b0ccab3c7f37e949e", 0xd7}], 0x1, &(0x7f0000000980)}, 0x4010) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0xb, 0x9, &(0x7f0000000580)=@framed={{0x18}, [@map={0x18, 0x0, 0x1, 0x0, r0}, @generic={0x3ff, 0xfffffffffffffffc, 0x1}, @call={0x85, 0x0, 0x0, 0x6}], {0x95}}, &(0x7f0000000600)='syzkaller\x00', 0x0, 0x30, &(0x7f0000000640)=""/48, 0x41f00, 0x1}, 0x48) r3 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000980)='/dev/mixer\x00', 0x101000, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(r3, 0x40042408, r2) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000000)={&(0x7f0000000080)='./file0/file0\x00', r0}, 0x10) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000400)=@ax25={0x3, {"02f47b3723e03d"}}, 0x80, &(0x7f00000017c0), 0x0, &(0x7f0000001840)=ANY=[], 0x0, 0x24004044}, 0x4008001) bpf$MAP_CREATE(0x0, &(0x7f0000002cc0)={0x5, 0x100, 0x56c96e7a, 0x2, 0xa, 0xffffffffffffffff, 0x9}, 0x2c) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000480)='rpc_pipefs\x00', 0x200000, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000002d00)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r3, 0x40082406, &(0x7f00000004c0)='vmnet0keyring\x00') bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000780)={&(0x7f0000000740)='./file0/file0\x00', r4}, 0x10) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, &(0x7f0000000700)='proc!@ppp1!ppp0ppp0#)lo\\lolo{\x00') mount(&(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000200)='fuseblk\x00', 0xa11800, &(0x7f0000000240)) r5 = syz_open_dev$sndpcmp(&(0x7f0000000240)='/dev/snd/pcmC#D#p\x00', 0x5, 0x244001) getsockopt$inet_sctp6_SCTP_RECONFIG_SUPPORTED(0xffffffffffffff9c, 0x84, 0x75, &(0x7f0000000280)={0x0, 0x2}, &(0x7f0000000500)=0x8) setsockopt$inet_sctp_SCTP_PR_SUPPORTED(r5, 0x84, 0x71, &(0x7f0000000540)={r6, 0x1000}, 0x8) mount(&(0x7f00000002c0)='./file0/file0\x00', &(0x7f0000000300)='./file0/file0\x00', &(0x7f0000000340)='minix\x00', 0x0, &(0x7f0000000380)) 2018/03/29 17:35:04 executing program 3: r0 = socket(0xa, 0x2, 0x0) r1 = open(&(0x7f00004b8ff8)='./file0\x00', 0x28042, 0x0) connect$inet6(r0, &(0x7f0000d3cfe4)={0xa, 0x0, 0x0, @mcast2={0xff, 0x2, [], 0x1}, 0x3}, 0x1c) ioctl$DRM_IOCTL_ADD_CTX(r1, 0xc0086420, &(0x7f0000000000)) fsetxattr(r1, &(0x7f00000000c0)=@known='security.selinux\x00', &(0x7f0000000140)='lo[', 0x3, 0x3) ioctl$DRM_IOCTL_NEW_CTX(r1, 0x40086425, &(0x7f0000000080)={0x0, 0x3}) fallocate(r1, 0x0, 0xffff, 0x1f) setsockopt$inet6_mtu(0xffffffffffffffff, 0x29, 0x17, &(0x7f0000000100)=0x2, 0x4) connect$inet(r0, &(0x7f0000000040)={0x2, 0x4e22, @multicast1=0xe0000001}, 0x10) sendfile(r0, r1, &(0x7f00005faff8), 0xfffb) 2018/03/29 17:35:04 executing program 1: 2018/03/29 17:35:04 executing program 5: 2018/03/29 17:35:05 executing program 6: 2018/03/29 17:35:05 executing program 1: 2018/03/29 17:35:05 executing program 5: 2018/03/29 17:35:05 executing program 6: 2018/03/29 17:35:05 executing program 1: 2018/03/29 17:35:05 executing program 4: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)={0xb, 0x7e, 0x3, 0x1, 0x11}, 0x2c) mount(&(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) r1 = socket$kcm(0x29, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000000bc0)={&(0x7f00000007c0)=@rc={0x1f, {0x5, 0x50000000, 0xaa2, 0x613, 0x4, 0x1ff}, 0x3f}, 0x80, &(0x7f0000000940)=[{&(0x7f0000000840)="09c9453aa30d8c5fba221fa2413f12c580837b2ae292e3ee8dd00098c404125a1a2e63840f82a2f69c3927af43b828422484aaeeceebcbe76e999bd3930c9b7c2995484407f9166e39c2069a88b63a980b9b5ffc880f4b89dde5adae6c7fb84ed98cbac860214dfb0b28d1b2e2d58aefebdfe515334f2ffa46be22ef7a4b3a276cb70a27c9e9f5de0a20bad24cbe2b89aee9693c2f8f186ea59fcfc4ebec7188cca0418d4583a6f1730f62416d70cd62555eb4f58ea831d1fea9956a2cba0049f23bf0b249f5de2ce0dc303808d70b0ccab3c7f37e949e", 0xd7}], 0x1, &(0x7f0000000980), 0x0, 0x20004805}, 0x4010) r2 = perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x2367, 0x7fff, 0x1, 0x6, 0x0, 0x78b1, 0x1, 0x0, 0x4992c766, 0xff, 0x81, 0x100, 0x40, 0x3, 0x9, 0x8, 0x1, 0x10000, 0x0, 0x6, 0x90e, 0x9, 0x7ff, 0x0, 0x8, 0x1, 0x30, 0x20, 0x7fffffff, 0x6, 0x401, 0x2, 0x1000, 0x8001, 0x1ff, 0xfffffffffffffff8, 0x0, 0x2, 0x0, @perf_config_ext={0x5, 0x8}, 0x1ab23, 0x3f, 0x8, 0x5, 0x6}, 0xffffffffffffffff, 0x10, r0, 0x1) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0xb, 0x9, &(0x7f0000000580)=@framed={{0x18}, [@map={0x18, 0x0, 0x1, 0x0, r0}, @generic={0x3ff, 0xfffffffffffffffc, 0x1}, @call={0x85, 0x0, 0x0, 0x6}], {0x95}}, &(0x7f0000000600)='syzkaller\x00', 0x0, 0x30, &(0x7f0000000640)=""/48, 0x41f00}, 0x48) ioctl$PERF_EVENT_IOC_SET_BPF(r2, 0x40042408, r3) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000000)={&(0x7f0000000080)='./file0/file0\x00', r0}, 0x10) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000400)=@ax25={0x3, {"02f47b3723e03d"}}, 0x80, &(0x7f00000017c0), 0x0, &(0x7f0000001840)=ANY=[], 0x0, 0x24004044}, 0x4008001) bpf$MAP_CREATE(0x0, &(0x7f0000002cc0)={0x5, 0x100, 0x56c96e7a, 0x2, 0xa, 0xffffffffffffffff, 0x9}, 0x2c) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000480)='rpc_pipefs\x00', 0x200000, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000002d00)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f00000004c0)='vmnet0keyring\x00') bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000780)={&(0x7f0000000740)='./file0/file0\x00', r4}, 0x10) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x40082406, &(0x7f0000000700)='proc!@ppp1!ppp0ppp0#)lo\\lolo{\x00') mount(&(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000200)='fuseblk\x00', 0xa11800, &(0x7f0000000240)) r5 = syz_open_dev$sg(&(0x7f0000000240)='/dev/sg#\x00', 0xfffffffffffffffa, 0x800) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000280)={r5, r3, 0x5, 0x1}, 0x10) ioctl$TIOCCONS(r5, 0x541d) mount(&(0x7f00000002c0)='./file0/file0\x00', &(0x7f0000000300)='./file0/file0\x00', &(0x7f0000000340)='minix\x00', 0x1000, &(0x7f0000000380)) 2018/03/29 17:35:05 executing program 6: 2018/03/29 17:35:05 executing program 7: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)={0xb, 0x7e, 0x3, 0x1, 0x11}, 0x2c) mount(&(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) r1 = socket$kcm(0x29, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000000bc0)={&(0x7f00000007c0)=@rc={0x1f, {0x5, 0x50000000, 0xaa2, 0x613, 0x4, 0x1ff}, 0x3f}, 0x80, &(0x7f0000000940)=[{&(0x7f0000000840)="09c9453aa30d8c5fba221fa2413f12c580837b2ae292e3ee8dd00098c404125a1a2e63840f82a2f69c3927af43b828422484aaeeceebcbe76e999bd3930c9b7c2995484407f9166e39c2069a88b63a980b9b5ffc880f4b89dde5adae6c7fb84ed98cbac860214dfb0b28d1b2e2d58aefebdfe515334f2ffa46be22ef7a4b3a276cb70a27c9e9f5de0a20bad24cbe2b89aee9693c2f8f186ea59fcfc4ebec7188cca0418d4583a6f1730f62416d70cd62555eb4f58ea831d1fea9956a2cba0049f23bf0b249f5de2ce0dc303808d70b0ccab3c7f37e949e", 0xd7}], 0x1, &(0x7f0000000980), 0x0, 0x20004805}, 0x4010) r2 = perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x2367, 0x7fff, 0x1, 0x6, 0x0, 0x78b1, 0x1, 0x0, 0x4992c766, 0xff, 0x81, 0x100, 0x40, 0x3, 0x9, 0x8, 0x1, 0x10000, 0x0, 0x6, 0x90e, 0x9, 0x7ff, 0x0, 0x8, 0x1, 0x30, 0x20, 0x7fffffff, 0x6, 0x401, 0x2, 0x1000, 0x8001, 0x1ff, 0xfffffffffffffff8, 0x0, 0x2, 0x0, @perf_config_ext={0x5, 0x8}, 0x1ab23, 0x3f, 0x8, 0x5, 0x6, 0x0, 0x6}, 0xffffffffffffffff, 0x10, r0, 0x1) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0xb, 0x9, &(0x7f0000000240)=ANY=[@ANYBLOB="180000000000000000000000000000001810000071c733557dc4364d7519879c5dfe78", @ANYRES32=r0, @ANYBLOB="0000000000000000fffc0100000000000000000000000000850000000600000000000000000000009500000000000000"], &(0x7f0000000600)='syzkaller\x00', 0x0, 0x30, &(0x7f0000000640)=""/48, 0x41f00, 0x1}, 0x48) ioctl$PERF_EVENT_IOC_SET_BPF(r2, 0x40042408, r3) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000000)={&(0x7f0000000080)='./file0/file0\x00', r0}, 0x10) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000400)=@ax25={0x3, {"02f47b3723e03d"}}, 0x80, &(0x7f00000017c0), 0x0, &(0x7f0000001840)=ANY=[], 0x0, 0x24004044}, 0x4008001) bpf$MAP_CREATE(0x0, &(0x7f0000002cc0)={0x5, 0x0, 0x56c96e7a, 0x2, 0xa, 0xffffffffffffffff, 0x9}, 0x2c) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000480)='rpc_pipefs\x00', 0x200000, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000002d00)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f00000004c0)='vmnet0keyring\x00') bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000780)={&(0x7f0000000740)='./file0/file0\x00', r4}, 0x10) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x40082406, &(0x7f0000000700)='proc!@ppp1!ppp0ppp0#)lo\\lolo{\x00') mount(&(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000200)='fuseblk\x00', 0xa11800, &(0x7f0000000240)) mount(&(0x7f00000002c0)='./file0/file0\x00', &(0x7f0000000300)='./file0/file0\x00', &(0x7f0000000340)='minix\x00', 0x1000, &(0x7f0000000380)) 2018/03/29 17:35:05 executing program 5: 2018/03/29 17:35:05 executing program 3: r0 = socket(0xa, 0x2, 0x0) r1 = open(&(0x7f00000001c0)='./file0\x00', 0x28042, 0x103) connect$inet6(r0, &(0x7f0000d3cfe4)={0xa, 0x0, 0x0, @mcast2={0xff, 0x2, [], 0x1}, 0x3}, 0x1c) ioctl$DRM_IOCTL_ADD_CTX(r1, 0xc0086420, &(0x7f0000000000)) ioctl$DRM_IOCTL_NEW_CTX(r1, 0x40086425, &(0x7f0000000080)={0x0, 0x3}) fallocate(r1, 0x0, 0xffff, 0x1f) setsockopt$inet6_mtu(0xffffffffffffffff, 0x29, 0x17, &(0x7f00000000c0)=0x2, 0x4) connect$inet(r0, &(0x7f0000000040)={0x2, 0x4e22, @multicast1=0xe0000001}, 0x10) sendfile(r0, r1, &(0x7f00005faff8), 0xfffb) 2018/03/29 17:35:05 executing program 2: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)={0xb, 0x7e, 0x3, 0x1, 0x11}, 0x2c) mount(&(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) r1 = socket$kcm(0x29, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000000bc0)={&(0x7f00000007c0)=@rc={0x1f, {0x5, 0x50000000, 0xaa2, 0x613, 0x4, 0x1ff}, 0x3f}, 0x80, &(0x7f0000000940)=[{&(0x7f0000000840)="09c9453aa30d8c5fba221fa2413f12c580837b2ae292e3ee8dd00098c404125a1a2e63840f82a2f69c3927af43b828422484aaeeceebcbe76e999bd3930c9b7c2995484407f9166e39c2069a88b63a980b9b5ffc880f4b89dde5adae6c7fb84ed98cbac860214dfb0b28d1b2e2d58aefebdfe515334f2ffa46be22ef7a4b3a276cb70a27c9e9f5de0a20bad24cbe2b89aee9693c2f8f186ea59fcfc4ebec7188cca0418d4583a6f1730f62416d70cd62555eb4f58ea831d1fea9956a2cba0049f23bf0b249f5de2ce0dc303808d70b0ccab3c7f37e949e", 0xd7}], 0x1, &(0x7f0000000980), 0x0, 0x20004805}, 0x4010) r2 = perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x2367, 0x7fff, 0x1, 0x6, 0x0, 0x78b1, 0x1, 0x0, 0x4992c766, 0xff, 0x81, 0x100, 0x40, 0x3, 0x9, 0x8, 0x1, 0x10000, 0x0, 0x6, 0x90e, 0x9, 0x7ff, 0x0, 0x8, 0x1, 0x30, 0x20, 0x7fffffff, 0x6, 0x401, 0x2, 0x1000, 0x8001, 0x1ff, 0xfffffffffffffff8, 0x0, 0x2, 0x0, @perf_config_ext={0x5, 0x8}, 0x1ab23, 0x0, 0x8, 0x5, 0x6, 0x0, 0x6}, 0xffffffffffffffff, 0x10, r0, 0x1) bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0xb, 0x9, &(0x7f0000000580)=@framed={{0x18}, [@map={0x18, 0x0, 0x1, 0x0, r0}, @generic={0x3ff, 0xfffffffffffffffc, 0x1}, @call={0x85, 0x0, 0x0, 0x6}], {0x95}}, &(0x7f0000000600)='syzkaller\x00', 0x0, 0x30, &(0x7f0000000640)=""/48, 0x41f00, 0x1}, 0x48) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000000)={&(0x7f0000000080)='./file0/file0\x00', r0}, 0x10) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000400)=@ax25={0x3, {"02f47b3723e03d"}}, 0x80, &(0x7f00000017c0), 0x0, &(0x7f0000001840)=ANY=[], 0x0, 0x24004044}, 0x4008001) bpf$MAP_CREATE(0x0, &(0x7f0000002cc0)={0x5, 0x0, 0x56c96e7a, 0x2, 0xa, 0xffffffffffffffff, 0x9}, 0x2c) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000480)='rpc_pipefs\x00', 0x200000, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f00000004c0)='vmnet0keyring\x00') bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000780)={&(0x7f0000000740)='./file0/file0\x00'}, 0x10) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x40082406, &(0x7f0000000700)='proc!@ppp1!ppp0ppp0#)lo\\lolo{\x00') mount(&(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000200)='fuseblk\x00', 0xa11800, &(0x7f0000000240)) open(&(0x7f0000000240)='./file0\x00', 0x18000, 0x11) mount(&(0x7f00000002c0)='./file0/file0\x00', &(0x7f0000000300)='./file0/file0\x00', &(0x7f0000000340)='minix\x00', 0x1000, &(0x7f0000000380)) socket$can_raw(0x1d, 0x3, 0x1) 2018/03/29 17:35:05 executing program 5: 2018/03/29 17:35:05 executing program 1: 2018/03/29 17:35:05 executing program 6: 2018/03/29 17:35:05 executing program 7: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)={0xb, 0x7e, 0x3, 0x1, 0x11}, 0x2c) mount(&(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) r1 = socket$kcm(0x29, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000000bc0)={&(0x7f00000007c0)=@rc={0x1f, {0x5, 0x50000000, 0xaa2, 0x613, 0x4, 0x1ff}, 0x3f}, 0x80, &(0x7f0000000940)=[{&(0x7f0000000840)="09c9453aa30d8c5fba221fa2413f12c580837b2ae292e3ee8dd00098c404125a1a2e63840f82a2f69c3927af43b828422484aaeeceebcbe76e999bd3930c9b7c2995484407f9166e39c2069a88b63a980b9b5ffc880f4b89dde5adae6c7fb84ed98cbac860214dfb0b28d1b2e2d58aefebdfe515334f2ffa46be22ef7a4b3a276cb70a27c9e9f5de0a20bad24cbe2b89aee9693c2f8f186ea59fcfc4ebec7188cca0418d4583a6f1730f62416d70cd62555eb4f58ea831d1fea9956a2cba0049f23bf0b249f5de2ce0dc303808d70b0ccab3c7f37e949e", 0xd7}], 0x1, &(0x7f0000000980), 0x0, 0x20004805}, 0x4010) r2 = perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x2367, 0x7fff, 0x1, 0x6, 0x0, 0x78b1, 0x1, 0x0, 0x4992c766, 0xff, 0x81, 0x100, 0x40, 0x3, 0x9, 0x8, 0x1, 0x10000, 0x0, 0x6, 0x90e, 0x9, 0x7ff, 0x0, 0x8, 0x1, 0x30, 0x20, 0x7fffffff, 0x6, 0x401, 0x2, 0x1000, 0x8001, 0x1ff, 0xfffffffffffffff8, 0x0, 0x2, 0x0, @perf_config_ext={0x5, 0x8}, 0x1ab23, 0x3f, 0x8, 0x5, 0x6, 0x0, 0x6}, 0xffffffffffffffff, 0x10, r0, 0x1) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0xb, 0x9, &(0x7f0000000580)=ANY=[@ANYBLOB="1800000000000000000000000000000018100000", @ANYRES32=r0, @ANYBLOB="00e9ffffff000000fffc01000000000000000000000000008500000006000000ffffffff020000000000000000000000"], &(0x7f0000000600)='syzkaller\x00', 0x0, 0x30, &(0x7f0000000240)=""/48, 0x41f00, 0x1}, 0xfffffe7a) ioctl$PERF_EVENT_IOC_SET_BPF(r2, 0x40042408, r3) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000000)={&(0x7f0000000080)='./file0/file0\x00', r0}, 0x10) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000400)=@ax25={0x3, {"02f47b3723e03d"}}, 0x80, &(0x7f00000017c0), 0x0, &(0x7f0000001840)=ANY=[], 0x0, 0x24004044}, 0x4008001) bpf$MAP_CREATE(0x0, &(0x7f0000002cc0)={0x5, 0x0, 0x56c96e7a, 0x2, 0xa, 0xffffffffffffffff, 0x9}, 0x2c) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000480)='rpc_pipefs\x00', 0x200000, 0x0) sendmsg(r1, &(0x7f0000002100)={&(0x7f0000000a80)=@un=@file={0x0, './file0\x00'}, 0x80, &(0x7f0000000b40)=[{&(0x7f0000000c00)="733142dcb27d209b611e1e60bcf3e4c823e22cb1ce1ee3f6e30e7a769379eb8085a474d2c9a2ee98b9c6a84d9d2697fb374a166cecce3ac266970eff8f35e08eaa3feb5f30cb962e6fdc517282a2b2f6a0c8b58d909ed7a820bdbec385c67a6547d7e8e6af1571fba7854e498e029166be63c6b487ef25d766a9013dcd9a28ce7234d9f5e5cc9590db962cb65c8aafefd6300aac4fd1249cfb0fadcf92967176f61c2fc75380bc4d9ef79c26e88eddda8a006d69505e50774211bc4fa2280fdd7b4a5ff165a318d1ccf6da153bbe127ec2ab40143635cc0ccd0e5732eeff3e678a50268d25a2f76a1fb1", 0xea}, {&(0x7f0000000b00)="6abfcef47f236ce507", 0x9}, {&(0x7f0000000d00)="cd5ffe93ecf0ffd876ec7633ed6d2702d36bc62f0a9a317f05c8dd4b3388f0f298a75fa3e86c5c6443250bd05baca329979e3d2696afdfbb72ece64c1fa61d0459fb255fa97e524bef9511ee480a4cbe94db5077d1f51faeeb9af0db794f5e04a9bf4c0b1c6ec6bdd7864c22585b3d1b38ada65cd84d28f6f8dec6c4dcd013a1256e97fd8833718cc9b3e140d3678dccf9abdb4805f9e463f620c03df9a61f7f82c7c9c39b7049203b9fa34d1f0409bc2a08e9472b40d4ac7b2767419a3ca250251dff8cb4c09430f4d1f951c59a31418f81b4d8efa41fec462af1", 0xdb}, {&(0x7f0000000e00)="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", 0x1000}, {&(0x7f0000001e00)="4090ffb22caea9bb693a3472a307a0c22d723dd1d6f830e5ec60a9f0c731a12f8a78a07df7ccbe352f0e51f2c45b3aa38e151308f20dc0c1a999cb0284f7eea72defaf75ffc271ac611a6257d556931b383d5a3292ecf4b5221c448e2bbbe1ea0a81fc6f91f71259b85fc9adf5aa713b4bd1c8fa8a5625690e404f71f56e98ef0e10be9ef85b6b391ff75905fe31edf11f9b7975196c", 0x96}, {&(0x7f0000002d40)="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", 0x1000}], 0x6, &(0x7f0000001ec0)=[{0x40, 0x11b, 0x99d, "a25a26e3cf4fa6bd614a7cdacb3494876216b2d3745264d1eb8d027650d49605b7a26bf8c9f973628a"}, {0xe0, 0x117, 0x6, "33eb972f462e6f145f400090b8aa6db1938a09d4b77099bd726d50a72f515d6b56070510430f4ea47d1cb520478aeaaaf4483d90295e73dc95fdec5495ad63ae8f4c00bdbc405a34a61705d0c0719a722afbe43302051cd7415928dc70c1ce43fc6e3943171e27610366c0d73796ab7f4affd6f70be8b00386688f667861079b5cc73824269bf766b0eed66f3293dbfae9c1361eabbce8f7320dc637e605fd02942b0ecc95d65a378b43d3f09040e0aa8d4ee64c7dd73e7df756b72995cdbb51b248048865cb122c7fe1135e7d"}, {0xd0, 0x0, 0x1, "4c624dd2d15a767062d79ba288854f2e11664a200b5f8ab169bab96e5e01eef318cb3f1d366471fbcc2b824edb033b1a2d69dab64011729b4ac75783210955efbef4c107c9e22828fe60a43848d016bee93089e544bd94cf1cf79e09027f6ce01746d8d82fe2c3d6de4196e704aa16be97f54f833c4099206681d83a3718665190836960a2162e1fc38b8f59d1effb5578ec1e3ef2a7ea683c5b2d8765e54d24e511259001ed370cec168f30cc5514ab99402b7abd8166d72674a5"}, {0x50, 0x10b, 0x4, "6990b5251cb734cbbba7ba238b35511d26749ab73c029f20d7cc0a31593453a64caa48e28591562504542a82d29fe9a9e82bfbfcea6f902860e77a"}], 0x240, 0x40}, 0x40001) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000002d00)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f00000004c0)='vmnet0keyring\x00') bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000780)={&(0x7f0000000740)='./file0/file0\x00', r4}, 0x10) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x40082406, &(0x7f0000000700)="70726f6321405070703121707070307098b04bf7ddb2df956c6f6c6f7b00") mount(&(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000200)='fuseblk\x00', 0xa11800, &(0x7f0000000240)) mount(&(0x7f00000002c0)='./file0/file0\x00', &(0x7f0000000300)='./file0/file0\x00', &(0x7f0000000340)='minix\x00', 0x1000, &(0x7f0000000380)) r5 = openat$audio(0xffffffffffffff9c, &(0x7f00000009c0)='/dev/audio\x00', 0x80000, 0x0) getsockopt$inet_sctp6_SCTP_FRAGMENT_INTERLEAVE(r5, 0x84, 0x12, &(0x7f0000000a00), &(0x7f0000000a40)=0x4) r6 = syz_open_dev$mouse(&(0x7f0000000280)='/dev/input/mouse#\x00', 0x7, 0x4000) getsockopt$netrom_NETROM_T1(r6, 0x103, 0x1, &(0x7f0000000640), &(0x7f0000000980)=0x4) 2018/03/29 17:35:05 executing program 0: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)={0xb, 0x7e, 0x3, 0x1, 0x11}, 0x2c) mount(&(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) r1 = socket$kcm(0x29, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000000bc0)={&(0x7f00000007c0)=@rc={0x1f, {0x5, 0x50000000, 0xaa2, 0x613, 0x4, 0x1ff}}, 0x80, &(0x7f0000000940)=[{&(0x7f0000000840)="09c9453aa30d8c5fba221fa2413f12c580837b2ae292e3ee8dd00098c404125a1a2e63840f82a2f69c3927af43b828422484aaeeceebcbe76e999bd3930c9b7c2995484407f9166e39c2069a88b63a980b9b5ffc880f4b89dde5adae6c7fb84ed98cbac860214dfb0b28d1b2e2d58aefebdfe515334f2ffa46be22ef7a4b3a276cb70a27c9e9f5de0a20bad24cbe2b89aee9693c2f8f186ea59fcfc4ebec7188cca0418d4583a6f1730f62416d70cd62555eb4f58ea831d1fea9956a2cba0049f23bf0b249f5de2ce0dc303808d70b0ccab3c7f37e949e", 0xd7}], 0x1, &(0x7f0000000980)}, 0x4010) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0xb, 0x9, &(0x7f0000000580)=@framed={{0x18}, [@map={0x18, 0x0, 0x1, 0x0, r0}, @generic={0x3ff, 0xfffffffffffffffc, 0x1}, @call={0x85, 0x0, 0x0, 0x6}], {0x95}}, &(0x7f0000000600)='syzkaller\x00', 0x0, 0x30, &(0x7f0000000640)=""/48, 0x41f00, 0x1}, 0x48) ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, r2) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000000)={&(0x7f0000000080)='./file0/file0\x00', r0}, 0x10) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000400)=@ax25={0x3, {"02f47b3723e03d"}}, 0x80, &(0x7f00000017c0), 0x0, &(0x7f0000001840)=ANY=[], 0x0, 0x24004044}, 0x4008001) bpf$MAP_CREATE(0x0, &(0x7f0000002cc0)={0x5, 0x100, 0x56c96e7a, 0x2, 0xa, 0xffffffffffffffff, 0x9}, 0x2c) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000480)='rpc_pipefs\x00', 0x200000, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000002d00)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f00000004c0)='vmnet0keyring\x00') bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000780)={&(0x7f0000000740)='./file0/file0\x00', r3}, 0x10) getsockopt$inet6_udp_int(r1, 0x11, 0x66, &(0x7f0000000240), &(0x7f0000000280)=0x4) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, &(0x7f0000000700)='proc!@ppp1!ppp0ppp0#)lo\\lolo{\x00') mount(&(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000200)='fuseblk\x00', 0xa11800, &(0x7f0000000240)) mount(&(0x7f00000002c0)='./file0/file0\x00', &(0x7f0000000300)='./file0/file0\x00', &(0x7f0000000340)='minix\x00', 0x0, &(0x7f0000000380)) 2018/03/29 17:35:05 executing program 4: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)={0xb, 0x7e, 0x3, 0x1, 0x11}, 0x2c) mount(&(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) r1 = socket$kcm(0x29, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000000bc0)={&(0x7f00000007c0)=@rc={0x1f, {0x5, 0x50000000, 0xaa2, 0x613, 0x4, 0x1ff}, 0x3f}, 0x80, &(0x7f0000000940)=[{&(0x7f0000000840)="09c9453aa30d8c5fba221fa2413f12c580837b2ae292e3ee8dd00098c404125a1a2e63840f82a2f69c3927af43b828422484aaeeceebcbe76e999bd3930c9b7c2995484407f9166e39c2069a88b63a980b9b5ffc880f4b89dde5adae6c7fb84ed98cbac860214dfb0b28d1b2e2d58aefebdfe515334f2ffa46be22ef7a4b3a276cb70a27c9e9f5de0a20bad24cbe2b89aee9693c2f8f186ea59fcfc4ebec7188cca0418d4583a6f1730f62416d70cd62555eb4f58ea831d1fea9956a2cba0049f23bf0b249f5de2ce0dc303808d70b0ccab3c7f37e949e", 0xd7}], 0x1, &(0x7f0000000980), 0x0, 0x20004805}, 0x4010) r2 = perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x2367, 0x7fff, 0x1, 0x6, 0x0, 0x78b1, 0x1, 0x0, 0x4992c766, 0xff, 0x81, 0x100, 0x40, 0x3, 0x9, 0x8, 0x1, 0x10000, 0x0, 0x6, 0x90e, 0x9, 0x7ff, 0x0, 0x8, 0x1, 0x30, 0x20, 0x7fffffff, 0x6, 0x401, 0x2, 0x1000, 0x8001, 0x1ff, 0xfffffffffffffff8, 0x0, 0x2, 0x0, @perf_config_ext={0x5, 0x8}, 0x1ab23, 0x3f, 0x8, 0x5, 0x6}, 0xffffffffffffffff, 0x10, r0, 0x1) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0xb, 0x9, &(0x7f0000000580)=@framed={{0x18}, [@map={0x18, 0x0, 0x1, 0x0, r0}, @generic={0x3ff, 0xfffffffffffffffc, 0x1}, @call={0x85, 0x0, 0x0, 0x6}], {0x95}}, &(0x7f0000000600)='syzkaller\x00', 0x0, 0x30, &(0x7f0000000640)=""/48, 0x41f00, 0x1}, 0x48) ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, r3) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000000)={&(0x7f0000000080)='./file0/file0\x00', r0}, 0x10) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000400)=@ax25={0x3, {"02f47b3723e03d"}}, 0x80, &(0x7f00000017c0), 0x0, &(0x7f0000001840)=ANY=[], 0x0, 0x24004044}, 0x4008001) bpf$MAP_CREATE(0x0, &(0x7f0000002cc0)={0x5, 0x100, 0x56c96e7a, 0x2, 0xa, 0xffffffffffffffff, 0x9}, 0x2c) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000480)='rpc_pipefs\x00', 0x200000, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000002d00)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f00000004c0)='vmnet0keyring\x00') bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000780)={&(0x7f0000000740)='./file0/file0\x00', r4}, 0x10) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x40082406, &(0x7f0000000700)='proc!@ppp1!ppp0ppp0#)lo\\lolo{\x00') mount(&(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000200)='fuseblk\x00', 0xa11800, &(0x7f0000000240)) r5 = syz_open_dev$sg(&(0x7f0000000240)='/dev/sg#\x00', 0xfffffffffffffffa, 0x800) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000280)={r5, r3, 0x5, 0x1}, 0x10) ioctl$TIOCCONS(r5, 0x541d) mount(&(0x7f00000002c0)='./file0/file0\x00', &(0x7f0000000300)='./file0/file0\x00', &(0x7f0000000340)='minix\x00', 0x1000, &(0x7f0000000380)) 2018/03/29 17:35:05 executing program 5: 2018/03/29 17:35:05 executing program 3: r0 = socket(0xa, 0x2, 0x0) r1 = open(&(0x7f00004b8ff8)='./file0\x00', 0x28042, 0x0) connect$inet6(r0, &(0x7f0000d3cfe4)={0xa, 0x0, 0x0, @mcast2={0xff, 0x2, [], 0x1}, 0x3}, 0x1c) ioctl$DRM_IOCTL_ADD_CTX(r1, 0xc0086420, &(0x7f0000000000)) ioctl$DRM_IOCTL_NEW_CTX(r1, 0x40086425, &(0x7f0000000080)={0x0, 0x3}) getsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x22, &(0x7f0000000140)={{{@in=@multicast2, @in=@loopback}}, {{@in=@loopback}, 0x0, @in=@rand_addr}}, &(0x7f00000000c0)=0xe8) fallocate(r1, 0x0, 0xffff, 0x1f) setsockopt$inet6_mtu(0xffffffffffffffff, 0x29, 0x17, &(0x7f0000000100)=0x2, 0x4) connect$inet(r0, &(0x7f0000000040)={0x2, 0x4e22, @multicast1=0xe0000001}, 0x10) sendfile(r0, r1, &(0x7f00005faff8), 0xfffb) 2018/03/29 17:35:05 executing program 2: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)={0xb, 0x7e, 0x3, 0x1, 0x11}, 0x2c) mount(&(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) r1 = socket$kcm(0x29, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000000bc0)={&(0x7f00000007c0)=@rc={0x1f, {0x5, 0x50000000, 0xaa2, 0x613, 0x4, 0x1ff}, 0x3f}, 0x80, &(0x7f0000000940)=[{&(0x7f0000000840)="09c9453aa30d8c5fba221fa2413f12c580837b2ae292e3ee8dd00098c404125a1a2e63840f82a2f69c3927af43b828422484aaeeceebcbe76e999bd3930c9b7c2995484407f9166e39c2069a88b63a980b9b5ffc880f4b89dde5adae6c7fb84ed98cbac860214dfb0b28d1b2e2d58aefebdfe515334f2ffa46be22ef7a4b3a276cb70a27c9e9f5de0a20bad24cbe2b89aee9693c2f8f186ea59fcfc4ebec7188cca0418d4583a6f1730f62416d70cd62555eb4f58ea831d1fea9956a2cba0049f23bf0b249f5de2ce0dc303808d70b0ccab3c7f37e949e", 0xd7}], 0x1, &(0x7f0000000980), 0x0, 0x20004805}, 0x4010) r2 = perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x2367, 0x7fff, 0x1, 0x6, 0x0, 0x78b1, 0x1, 0x0, 0x4992c766, 0xff, 0x81, 0x100, 0x40, 0x3, 0x9, 0x8, 0x1, 0x10000, 0x0, 0x6, 0x90e, 0x9, 0x7ff, 0x0, 0x8, 0x1, 0x30, 0x20, 0x7fffffff, 0x6, 0x401, 0x2, 0x1000, 0x8001, 0x1ff, 0xfffffffffffffff8, 0x0, 0x2, 0x0, @perf_config_ext={0x5, 0x8}, 0x1ab23, 0x0, 0x8, 0x5, 0x6, 0x0, 0x6}, 0xffffffffffffffff, 0x10, r0, 0x1) bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0xb, 0x9, &(0x7f0000000580)=@framed={{0x18}, [@map={0x18, 0x0, 0x1, 0x0, r0}, @generic={0x3ff, 0xfffffffffffffffc, 0x1}, @call={0x85, 0x0, 0x0, 0x6}], {0x95}}, &(0x7f0000000600)='syzkaller\x00', 0x0, 0x30, &(0x7f0000000640)=""/48, 0x41f00, 0x1}, 0x48) r3 = syz_open_dev$sndpcmp(&(0x7f0000000280)='/dev/snd/pcmC#D#p\x00', 0x1, 0x8000) connect$unix(r3, &(0x7f0000000980)=@file={0x0, './file0/file0\x00'}, 0x6e) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000000)={&(0x7f0000000080)='./file0/file0\x00', r0}, 0x10) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000400)=@ax25={0x3, {"02f47b3723e03d"}}, 0x80, &(0x7f00000017c0), 0x0, &(0x7f0000001840)=ANY=[], 0x0, 0x24004044}, 0x4008001) bpf$MAP_CREATE(0x0, &(0x7f0000002cc0)={0x5, 0x0, 0x56c96e7a, 0x2, 0xa, 0xffffffffffffffff, 0x9}, 0x2c) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000480)='rpc_pipefs\x00', 0x200000, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000002d00)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f00000004c0)='vmnet0keyring\x00') bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000780)={&(0x7f0000000740)='./file0/file0\x00', r4}, 0x10) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x40082406, &(0x7f0000000700)='proc!@ppp1!ppp0ppp0#)lo\\lolo{\x00') socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000000240)) mount(&(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000200)='fuseblk\x00', 0xa11800, &(0x7f0000000240)) mount(&(0x7f00000002c0)='./file0/file0\x00', &(0x7f0000000300)='./file0/file0\x00', &(0x7f0000000340)='minix\x00', 0x1000, &(0x7f0000000380)) 2018/03/29 17:35:05 executing program 5: 2018/03/29 17:35:05 executing program 6: 2018/03/29 17:35:05 executing program 1: 2018/03/29 17:35:05 executing program 1: 2018/03/29 17:35:05 executing program 4: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)={0xb, 0x7e, 0x3, 0x1, 0x11}, 0x2c) mount(&(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) r1 = socket$kcm(0x29, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000000bc0)={&(0x7f00000007c0)=@rc={0x1f, {0x5, 0x50000000, 0xaa2, 0x613, 0x4, 0x1ff}, 0x3f}, 0x80, &(0x7f0000000940)=[{&(0x7f0000000840)="09c9453aa30d8c5fba221fa2413f12c580837b2ae292e3ee8dd00098c404125a1a2e63840f82a2f69c3927af43b828422484aaeeceebcbe76e999bd3930c9b7c2995484407f9166e39c2069a88b63a980b9b5ffc880f4b89dde5adae6c7fb84ed98cbac860214dfb0b28d1b2e2d58aefebdfe515334f2ffa46be22ef7a4b3a276cb70a27c9e9f5de0a20bad24cbe2b89aee9693c2f8f186ea59fcfc4ebec7188cca0418d4583a6f1730f62416d70cd62555eb4f58ea831d1fea9956a2cba0049f23bf0b249f5de2ce0dc303808d70b0ccab3c7f37e949e", 0xd7}], 0x1, &(0x7f0000000980), 0x0, 0x20004805}, 0x4010) r2 = perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x2367, 0x7fff, 0x1, 0x6, 0x0, 0x78b1, 0x1, 0x0, 0x4992c766, 0xff, 0x81, 0x100, 0x40, 0x3, 0x9, 0x8, 0x1, 0x10000, 0x0, 0x6, 0x90e, 0x9, 0x7ff, 0x0, 0x8, 0x1, 0x30, 0x20, 0x7fffffff, 0x6, 0x401, 0x2, 0x1000, 0x8001, 0x1ff, 0xfffffffffffffff8, 0x0, 0x2, 0x0, @perf_config_ext={0x5, 0x8}, 0x1ab23, 0x3f, 0x8, 0x5, 0x6}, 0xffffffffffffffff, 0x10, r0, 0x1) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0xb, 0x9, &(0x7f0000000580)=@framed={{0x18}, [@map={0x18, 0x0, 0x1, 0x0, r0}, @generic={0x3ff, 0xfffffffffffffffc, 0x1}, @call={0x85, 0x0, 0x0, 0x6}], {0x95}}, &(0x7f0000000600)='syzkaller\x00', 0x0, 0x30, &(0x7f0000000640)=""/48, 0x41f00, 0x1}, 0x48) ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, r3) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000000)={&(0x7f0000000080)='./file0/file0\x00', r0}, 0x10) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000400)=@ax25={0x3, {"02f47b3723e03d"}}, 0x80, &(0x7f00000017c0), 0x0, &(0x7f0000001840)=ANY=[], 0x0, 0x24004044}, 0x4008001) bpf$MAP_CREATE(0x0, &(0x7f0000002cc0)={0x5, 0x100, 0x56c96e7a, 0x2, 0xa, 0xffffffffffffffff, 0x9}, 0x2c) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000480)='rpc_pipefs\x00', 0x200000, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000002d00)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f00000004c0)='vmnet0keyring\x00') bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000780)={&(0x7f0000000740)='./file0/file0\x00', r4}, 0x10) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x40082406, &(0x7f0000000700)='proc!@ppp1!ppp0ppp0#)lo\\lolo{\x00') mount(&(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000200)='fuseblk\x00', 0xa11800, &(0x7f0000000240)) r5 = syz_open_dev$sg(&(0x7f0000000240)='/dev/sg#\x00', 0xfffffffffffffffa, 0x800) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000280)={r5, r3, 0x5, 0x1}, 0x10) ioctl$TIOCCONS(r5, 0x541d) mount(&(0x7f00000002c0)='./file0/file0\x00', &(0x7f0000000300)='./file0/file0\x00', &(0x7f0000000340)='minix\x00', 0x1000, &(0x7f0000000380)) 2018/03/29 17:35:05 executing program 5: 2018/03/29 17:35:05 executing program 6: 2018/03/29 17:35:05 executing program 7: r0 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000980)='/dev/sequencer\x00', 0xa80, 0x0) r1 = openat$vcs(0xffffffffffffff9c, &(0x7f00000009c0)='/dev/vcs\x00', 0x80200, 0x0) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000a00)='cpuacct.usage_user\x00', 0x0, 0x0) ioctl$KVM_IRQFD(r0, 0x4020ae76, &(0x7f0000000a40)={r1, 0x1, 0x3ff, r2}) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r3 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)={0xb, 0x7e, 0x3, 0x1, 0x11}, 0x2c) mount(&(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) r4 = socket$kcm(0x29, 0x2, 0x0) sendmsg$kcm(r4, &(0x7f0000000bc0)={&(0x7f00000007c0)=@rc={0x1f, {0x5, 0x50000000, 0xaa2, 0x613, 0x4, 0x1ff}, 0x3f}, 0x80, &(0x7f0000000940)=[{&(0x7f0000000840)="09c9453aa30d8c5fba221fa2413f12c580837b2ae292e3ee8dd00098c404125a1a2e63840f82a2f69c3927af43b828422484aaeeceebcbe76e999bd3930c9b7c2995484407f9166e39c2069a88b63a980b9b5ffc880f4b89dde5adae6c7fb84ed98cbac860214dfb0b28d1b2e2d58aefebdfe515334f2ffa46be22ef7a4b3a276cb70a27c9e9f5de0a20bad24cbe2b89aee9693c2f8f186ea59fcfc4ebec7188cca0418d4583a6f1730f62416d70cd62555eb4f58ea831d1fea9956a2cba0049f23bf0b249f5de2ce0dc303808d70b0ccab3c7f37e949e", 0xd7}], 0x1, &(0x7f0000000980), 0x0, 0x20004805}, 0x4010) r5 = perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x2367, 0x7fff, 0x1, 0x6, 0x0, 0x78b1, 0x1, 0x0, 0x4992c766, 0xff, 0x81, 0x100, 0x40, 0x3, 0x9, 0x8, 0x1, 0x10000, 0x0, 0x6, 0x90e, 0x9, 0x7ff, 0x0, 0x8, 0x1, 0x30, 0x20, 0x7fffffff, 0x6, 0x401, 0x2, 0x1000, 0x8001, 0x1ff, 0xfffffffffffffff8, 0x0, 0x2, 0x0, @perf_config_ext={0x5, 0x8}, 0x1ab23, 0x3f, 0x8, 0x5, 0x6, 0x0, 0x6}, 0xffffffffffffffff, 0x10, r3, 0x1) r6 = bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0xb, 0x9, &(0x7f0000000580)=@framed={{0x18}, [@map={0x18, 0x0, 0x1, 0x0, r3}, @generic={0x3ff, 0xfffffffffffffffc, 0x1}, @call={0x85, 0x0, 0x0, 0x6}], {0x95}}, &(0x7f0000000600)='syzkaller\x00', 0x0, 0x30, &(0x7f0000000640)=""/48, 0x41f00, 0x1}, 0x48) ioctl$PERF_EVENT_IOC_SET_BPF(r5, 0x40042408, r6) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000000)={&(0x7f0000000080)='./file0/file0\x00', r3}, 0x10) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000400)=@ax25={0x3, {"02f47b3723e03d"}}, 0x80, &(0x7f00000017c0), 0x0, &(0x7f0000001840)=ANY=[], 0x0, 0x24004044}, 0x4008001) bpf$MAP_CREATE(0x0, &(0x7f0000002cc0)={0x5, 0x0, 0x56c96e7a, 0x2, 0xa, 0xffffffffffffffff, 0x9}, 0x2c) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000480)='rpc_pipefs\x00', 0x200000, 0x0) fsetxattr(r2, &(0x7f0000000a80)=@random={'btrfs.', 'rpc_pipefs\x00'}, &(0x7f0000000ac0)='}\x00', 0x2, 0x8444901a698479f0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000002d00)={0xffffffffffffffff, 0xffffffffffffffff}) writev(r3, &(0x7f0000000f00)=[{&(0x7f0000000b00)="a10ef98ac90137e030ee9a6d", 0xc}, {&(0x7f0000000b40)="7d46d665efc46af05bc09cd05716992e88609513ea596fe622f947d392623298a9f49cc8632edbb1497822b6e15fccc1f5b387882e3d18cf522eca85b6c0a6cdc0128cc1bea2040b2a01509846b219ffbeacd7facd8f79f9973568fa3870d863eeea32935c9a147d8440", 0x6a}, {&(0x7f0000000c00)="cf912d1c0f3ddb8558077910618c02974637c94d8683724af01ee29bf6a9908b72f5f4671950f5a26293b0f4c657d3e2b0b2b2accda4608555dad209f067528d6d9f2658eccc18d8ab7ad98ea23698db9d3e3b994ff1e3f3986ae3302c4821e19efb", 0x62}, {&(0x7f0000000c80)="4725c43f3b905db4247e6ea21fc8ccf9d61ea0de538615b4a589aeb19e3d2a134a5a6923ad37f38d1ec1b5a7fb9814641c923a0be8b0cbda73d32bf8451e8e79c06d05ca26f78e4c1983bffd758f5e6944474ac59dd09e2d7bf2163f719c64b2058a0ce2a03c5dbd752056634dc96376d8b34a7dd7b17a586973954b5df1f8be3411a3102b1e451a", 0x88}, {&(0x7f0000000d40)="c5dc28a08308fb1424c4190b8221e4ff72c328c0d6beb112d044b8ed9c02b5902d0af1005d8231bbd61bb1d3c4fa7638b3773d573b9b7f139bfd492b8873501cc647c03db19c223cdc2b", 0x4a}, {&(0x7f0000000dc0)="ba248e7d94d581d1897eb7fefe94d9fc277d51d3ece4e492a37a826f9eb7c1556204899f20086cc59f231332321400c42df9e6bed055a0e768e496f2544a28f870b08a049af54500009bff25e837dd6ce73c278869fff0aaad1eeda50e8d4412445c6aa9acabdf0c823b35e3acc2dab95f449f49002c2b7ff2f8f19d5ac256", 0x7f}, {&(0x7f0000000e40)="9c59e407e441e9164ef8bb50b0d0f2eb767272d8e60b83f8cb035df9279fc9e923a6f1999f9caeaadb8379c14407a1b3b2389a6130b8ce5c76050a7792d4950fa1dbd61b1cf2c1ce0c6990280f1e89f2a41b2bd304265a5980b34eda3472939fe57ad7470f69bdc15235b9430559c9a3162941bd6a38e324fbae0cd5599f4d36b275a1b40cfad93c6f49f937a9ba6d78515af778cd465a357769ea925b2fee79abbd4535", 0xa4}], 0x7) ioctl$PERF_EVENT_IOC_SET_FILTER(r3, 0x40082406, &(0x7f00000004c0)='vmnet0keyring\x00') bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000280)={&(0x7f0000000240)='./file0/file0\x00', r3}, 0x10) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000780)={&(0x7f0000000740)='./file0/file0\x00', r7}, 0x10) ioctl$PERF_EVENT_IOC_SET_FILTER(r5, 0x40082406, &(0x7f0000000700)='proc!@ppp1!ppp0ppp0#)lo\\lolo{\x00') mount(&(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000200)='fuseblk\x00', 0xa11800, &(0x7f0000000240)) mount(&(0x7f00000002c0)='./file0/file0\x00', &(0x7f0000000300)='./file0/file0\x00', &(0x7f0000000340)='minix\x00', 0x1000, &(0x7f0000000380)) 2018/03/29 17:35:05 executing program 3: r0 = socket(0xa, 0x2, 0x0) r1 = open(&(0x7f00004b8ff8)='./file0\x00', 0x28042, 0x0) connect$inet6(r0, &(0x7f0000d3cfe4)={0xa, 0x0, 0x0, @mcast2={0xff, 0x2, [], 0x1}, 0x3}, 0x1c) ioctl$DRM_IOCTL_ADD_CTX(r1, 0xc0086420, &(0x7f0000000000)) ioctl$DRM_IOCTL_NEW_CTX(r1, 0x40086425, &(0x7f0000000080)={0x0, 0x3}) fallocate(r1, 0x0, 0xffff, 0x1f) setsockopt$inet6_mtu(0xffffffffffffffff, 0x29, 0x17, &(0x7f0000000100)=0x2, 0x4) connect$inet(r0, &(0x7f0000000040)={0x2, 0x4e22, @multicast1=0xe0000001}, 0x10) perf_event_open(&(0x7f0000348f88)={0x2, 0x70, 0x3e2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) umount2(&(0x7f0000001f80)='./file0\x00', 0x0) sendfile(r0, r0, &(0x7f00000001c0), 0xca) 2018/03/29 17:35:05 executing program 6: 2018/03/29 17:35:05 executing program 2: r0 = dup2(0xffffffffffffff9c, 0xffffffffffffff9c) accept4$packet(0xffffffffffffffff, &(0x7f00000004c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @dev}, &(0x7f00000009c0)=0x14, 0x80800) sendmsg$kcm(r0, &(0x7f0000001e80)={&(0x7f0000000a00)=@ll={0x11, 0x19, r1, 0x1, 0x80000000, 0x6, @random="f8d9053de7ac"}, 0x80, &(0x7f0000001e00)=[{&(0x7f0000000a80)="8e59f3f32ddd8dbe4a1bb0cca0d059bb012c5e6d877567538c0d9fa89ea2b29368c855f6f90f912906f9816e92565af32bf4d9ff31eef35ad8ca6067ff1bc3bc1876acfd39e7fa80a7d3bcc8dd0ac837642adbd81fd45adc42dfe2f0db2aa85289b04bd76b59a9d2bef9825c340feab489990a70a12f31265bc1fbfb42b3fe5a97d1f1e95008cf47617142ecb839e35c224e3146d20fcfba95a1f258d7cf797568468733b9227d29e71ea08d507fd49b7e9259ace25910bbdf1e2e1012dbac3bc0031b57c067ae216f367af0", 0xcc}, {&(0x7f0000000c00)="204ec9ae6b55e564496aba5a422b82df159cec25aceebc9123b9f8f28d173e856d51bf3596f8106134dc41672242e1a12b1509362f12643e7bfe47dbaf58971c42091daebe014fa18dcaf7f76fea0841a27ce95a18172f30ec41cd5b4d7c640c2484193fdc0c71de6e82abd9ce40ef0d4f6503ef45206725c4603c7491f42bf2b9199c1dd5298b9506716c9d7bbd568c78ac6abba8f9ec7f0fcb522b8b7e7ac1028a2843f8e0bde86f1fbc62d2cdbf91683d80628c1ef51cb41b023df2ba8f05ef36c240168d4c8a0f605867ff4dbd7d478a05be145d1de0ac3a89b4fd655042a81ad3e7bf866b66aa58664a61a2", 0xee}, {&(0x7f0000000d00)="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", 0x1000}, {&(0x7f0000001d00)="8f1ba18759d4249d32256e40c938d207a170da57c68274342375dc54ce2f8ca48d544d341cdae917b96c64e098d86a0eb818864866f060aa298b1cba52b138fdd6b87d0cc7afe35498816c21cc8ee0", 0x4f}, {&(0x7f0000000b80)="969032", 0x3}, {&(0x7f0000001d80)="bdbabfd744f0867b92efe377e68874ce5b03135135b7bdab91bfcd72151274d42587e5ebadd9148b01bdfef766945d043dc5955fe40da6cceece7d512e46af9cc07e8be52df8c7de2407e470ec7399fc2758", 0x52}], 0x6, &(0x7f0000002d40)=[{0x40, 0x11b, 0x80000001, "42b5c3687f98c4fb6d9ca76c2828bcea2e08e1ebbd79051045b3215100d09c574d941a36992ad61436c93b5db4"}, {0x1010, 0x107, 0x0, "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"}, {0xd8, 0x0, 0x3f, "6471bfb14edcee2adc8a2b0ad625a736c41225560e61f3c9d258b585c45d80ab411a40de4921f2585179ffc43cad9edf6fd27ebe810fddad308f089d2f13283ff75b486a86c1356edabfe180f0f0cd8eee560c16b2d5369112d7642096dd9213ce515208251d8d191f7b7840df828e5718ee6f51b2b431aa19ba9b3c8fedf0b9c15338b7a95df5d7692ee90555a9165f94bbb0b09af4c398cad1308419ba0f4b2469b5039de283aacf76c7bd131751baf4ca3a69621f882454516e7eea68bdd4c8"}, {0x70, 0x1ff, 0xb9, "ae8a0395a52b20182923c0b11010b361e387d6a334b5feb73fb1dbd96a5b1112bb84aebb535b210f65b3fd633a88fcf793bf8dba1d875ee7c3b6c409a96f5affa77eaf730c3c8abe4505f6bdbb1890f47b2c93a949d36515ec4f16594d5a"}], 0x1198, 0x1}, 0x0) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)={0xb, 0x7e, 0x3, 0x1, 0x11}, 0x2c) mount(&(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) r3 = socket$kcm(0x29, 0x2, 0x0) sendmsg$kcm(r3, &(0x7f0000000bc0)={&(0x7f00000007c0)=@rc={0x1f, {0x5, 0x50000000, 0xaa2, 0x613, 0x4, 0x1ff}, 0x3f}, 0x80, &(0x7f0000000940)=[{&(0x7f0000000840)="09c9453aa30d8c5fba221fa2413f12c580837b2ae292e3ee8dd00098c404125a1a2e63840f82a2f69c3927af43b828422484aaeeceebcbe76e999bd3930c9b7c2995484407f9166e39c2069a88b63a980b9b5ffc880f4b89dde5adae6c7fb84ed98cbac860214dfb0b28d1b2e2d58aefebdfe515334f2ffa46be22ef7a4b3a276cb70a27c9e9f5de0a20bad24cbe2b89aee9693c2f8f186ea59fcfc4ebec7188cca0418d4583a6f1730f62416d70cd62555eb4f58ea831d1fea9956a2cba0049f23bf0b249f5de2ce0dc303808d70b0ccab3c7f37e949e", 0xd7}], 0x1, &(0x7f0000000980), 0x0, 0x20004805}, 0x4010) r4 = perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x2367, 0x7fff, 0x1, 0x6, 0x0, 0x78b1, 0x1, 0x0, 0x4992c766, 0xff, 0x81, 0x100, 0x40, 0x3, 0x9, 0x8, 0x1, 0x10000, 0x0, 0x6, 0x90e, 0x9, 0x7ff, 0x0, 0x8, 0x1, 0x30, 0x20, 0x7fffffff, 0x6, 0x401, 0x2, 0x1000, 0x8001, 0x1ff, 0xfffffffffffffff8, 0x0, 0x2, 0x0, @perf_config_ext={0x5, 0x8}, 0x1ab23, 0x0, 0x8, 0x5, 0x6, 0x0, 0x6}, 0xffffffffffffffff, 0x10, r2, 0x1) bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0xb, 0x9, &(0x7f0000000580)=@framed={{0x18}, [@map={0x18, 0x0, 0x1, 0x0, r2}, @generic={0x3ff, 0xfffffffffffffffc, 0x1}, @call={0x85, 0x0, 0x0, 0x6}], {0x95}}, &(0x7f0000000600)='syzkaller\x00', 0x0, 0x30, &(0x7f0000000640)=""/48, 0x41f00, 0x1}, 0x48) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000000)={&(0x7f0000000080)='./file0/file0\x00', r2}, 0x10) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000400)=@ax25={0x3, {"02f47b3723e03d"}}, 0x80, &(0x7f00000017c0), 0x0, &(0x7f0000001840)=ANY=[], 0x0, 0x24004044}, 0x4008001) bpf$MAP_CREATE(0x0, &(0x7f0000002cc0)={0x5, 0x0, 0x56c96e7a, 0x2, 0xa, 0xffffffffffffffff, 0x9}, 0x2c) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000480)='rpc_pipefs\x00', 0x200000, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000002d00)={0xffffffffffffffff, 0xffffffffffffffff}) readlink(&(0x7f0000001ec0)='./file1\x00', &(0x7f0000001f00)=""/2, 0x2) ioctl$PERF_EVENT_IOC_SET_FILTER(r4, 0x40082406, &(0x7f0000000980)='vmnet0keyring\x00') bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000780)={&(0x7f0000000740)='./file0/file0\x00', r5}, 0x10) ioctl$PERF_EVENT_IOC_SET_FILTER(r4, 0x40082406, &(0x7f0000000700)='proc!@ppp1!ppp0ppp0#)lo\\lolo{\x00') mount(&(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000200)='fuseblk\x00', 0xa11800, &(0x7f0000000240)) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000280)={r2, 0x28, &(0x7f0000000240)}, 0x10) mount(&(0x7f00000002c0)='./file0/file0\x00', &(0x7f0000000300)='./file0/file0\x00', &(0x7f0000000340)='minix\x00', 0x1000, &(0x7f0000000380)) 2018/03/29 17:35:05 executing program 5: 2018/03/29 17:35:05 executing program 4: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)={0xb, 0x7e, 0x3, 0x1, 0x11}, 0x2c) mount(&(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) r1 = socket$kcm(0x29, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000000bc0)={&(0x7f00000007c0)=@rc={0x1f, {0x5, 0x50000000, 0xaa2, 0x613, 0x4, 0x1ff}, 0x3f}, 0x80, &(0x7f0000000940)=[{&(0x7f0000000840)="09c9453aa30d8c5fba221fa2413f12c580837b2ae292e3ee8dd00098c404125a1a2e63840f82a2f69c3927af43b828422484aaeeceebcbe76e999bd3930c9b7c2995484407f9166e39c2069a88b63a980b9b5ffc880f4b89dde5adae6c7fb84ed98cbac860214dfb0b28d1b2e2d58aefebdfe515334f2ffa46be22ef7a4b3a276cb70a27c9e9f5de0a20bad24cbe2b89aee9693c2f8f186ea59fcfc4ebec7188cca0418d4583a6f1730f62416d70cd62555eb4f58ea831d1fea9956a2cba0049f23bf0b249f5de2ce0dc303808d70b0ccab3c7f37e949e", 0xd7}], 0x1, &(0x7f0000000980), 0x0, 0x20004805}, 0x4010) r2 = perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x2367, 0x7fff, 0x1, 0x6, 0x0, 0x78b1, 0x1, 0x0, 0x4992c766, 0xff, 0x81, 0x100, 0x40, 0x3, 0x9, 0x8, 0x1, 0x10000, 0x0, 0x6, 0x90e, 0x9, 0x7ff, 0x0, 0x8, 0x1, 0x30, 0x20, 0x7fffffff, 0x6, 0x401, 0x2, 0x1000, 0x8001, 0x1ff, 0xfffffffffffffff8, 0x0, 0x2, 0x0, @perf_config_ext={0x5, 0x8}, 0x1ab23, 0x3f, 0x8, 0x5, 0x6}, 0xffffffffffffffff, 0x10, r0, 0x1) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0xb, 0x9, &(0x7f0000000580)=@framed={{0x18}, [@map={0x18, 0x0, 0x1, 0x0, r0}, @generic={0x3ff, 0xfffffffffffffffc, 0x1}, @call={0x85, 0x0, 0x0, 0x6}], {0x95}}, &(0x7f0000000600)='syzkaller\x00', 0x0, 0x30, &(0x7f0000000640)=""/48, 0x41f00, 0x1}, 0x48) ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, r3) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000000)={&(0x7f0000000080)='./file0/file0\x00', r0}, 0x10) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000400)=@ax25={0x3, {"02f47b3723e03d"}}, 0x80, &(0x7f00000017c0), 0x0, &(0x7f0000001840)=ANY=[], 0x0, 0x24004044}, 0x4008001) bpf$MAP_CREATE(0x0, &(0x7f0000002cc0)={0x5, 0x100, 0x56c96e7a, 0x2, 0xa, 0xffffffffffffffff, 0x9}, 0x2c) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000480)='rpc_pipefs\x00', 0x200000, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000002d00)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f00000004c0)='vmnet0keyring\x00') bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000780)={&(0x7f0000000740)='./file0/file0\x00', r4}, 0x10) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x40082406, &(0x7f0000000700)='proc!@ppp1!ppp0ppp0#)lo\\lolo{\x00') mount(&(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000200)='fuseblk\x00', 0xa11800, &(0x7f0000000240)) r5 = syz_open_dev$sg(&(0x7f0000000240)='/dev/sg#\x00', 0xfffffffffffffffa, 0x800) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000280)={r5, r3, 0x5, 0x1}, 0x10) ioctl$TIOCCONS(r5, 0x541d) mount(&(0x7f00000002c0)='./file0/file0\x00', &(0x7f0000000300)='./file0/file0\x00', &(0x7f0000000340)='minix\x00', 0x1000, &(0x7f0000000380)) 2018/03/29 17:35:05 executing program 6: 2018/03/29 17:35:05 executing program 0: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)={0xb, 0x7e, 0x3, 0x1, 0x11}, 0x2c) mount(&(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) r1 = socket$kcm(0x29, 0x1, 0x0) sendmsg$kcm(r1, &(0x7f0000000bc0)={&(0x7f00000007c0)=@rc={0x1f, {0x5, 0x50000000, 0xaa2, 0x613, 0x4, 0x1ff}}, 0x80, &(0x7f0000000940)=[{&(0x7f0000000840)="09c9453aa30d8c5fba221fa2413f12c580837b2ae292e3ee8dd00098c404125a1a2e63840f82a2f69c3927af43b828422484aaeeceebcbe76e999bd3930c9b7c2995484407f9166e39c2069a88b63a980b9b5ffc880f4b89dde5adae6c7fb84ed98cbac860214dfb0b28d1b2e2d58aefebdfe515334f2ffa46be22ef7a4b3a276cb70a27c9e9f5de0a20bad24cbe2b89aee9693c2f8f186ea59fcfc4ebec7188cca0418d4583a6f1730f62416d70cd62555eb4f58ea831d1fea9956a2cba0049f23bf0b249f5de2ce0dc303808d70b0ccab3c7f37e949e", 0xd7}], 0x1, &(0x7f0000000980)}, 0x4010) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0xb, 0x9, &(0x7f0000000580)=@framed={{0x18}, [@map={0x18, 0x0, 0x1, 0x0, r0}, @generic={0x3ff, 0xfffffffffffffffc, 0x1}, @call={0x85, 0x0, 0x0, 0x6}], {0x95}}, &(0x7f0000000600)='syzkaller\x00', 0x0, 0x30, &(0x7f0000000640)=""/48, 0x41f00, 0x1}, 0x48) ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, r2) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000000)={&(0x7f0000000080)='./file0/file0\x00', r0}, 0x10) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000400)=@ax25={0x3, {"02f47b3723e03d"}}, 0x80, &(0x7f00000017c0), 0x0, &(0x7f0000001840)=ANY=[], 0x0, 0x24004044}, 0x4008001) bpf$MAP_CREATE(0x0, &(0x7f0000002cc0)={0x5, 0x100, 0x56c96e7a, 0x2, 0xa, 0xffffffffffffffff, 0x9}, 0x2c) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000480)='rpc_pipefs\x00', 0x200000, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000002d00)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f00000004c0)='vmnet0keyring\x00') bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000780)={&(0x7f0000000740)='./file0/file0\x00', r3}, 0x10) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, &(0x7f0000000700)='proc!@ppp1!ppp0ppp0#)lo\\lolo{\x00') mount(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000240)='mqueue\x00', 0xa117fc, &(0x7f0000000980)="cffea2ebf93235c6ad6b6ce15d091fb5e8ebfe10785e6ad03f62257eec23f06f98d4edaf598503981d17cec03171a87283878f4e4612cd8b2d6fa22cd2fea22f5786c1a1acd7a81c13370dd323a92dda38c1cbf254f64bf5d8063b7c80b550754b6d6984606b1ef4fb459a0bbbf493a52384ee5cd9f86e0859e3518e13262678ecfd220613ceb7398cf9309a54a0e436f84f22fe9a3cf854aace59747f709d55df1500a38d866c2cc0539baa1c") mount(&(0x7f00000002c0)='./file0/file0\x00', &(0x7f0000000300)='./file0/file0\x00', &(0x7f0000000340)='minix\x00', 0x0, &(0x7f0000000380)) 2018/03/29 17:35:05 executing program 6: 2018/03/29 17:35:05 executing program 1: 2018/03/29 17:35:05 executing program 3: r0 = socket(0xa, 0x2, 0x0) r1 = open(&(0x7f00004b8ff8)='./file0\x00', 0x28042, 0x0) connect$inet6(r0, &(0x7f0000d3cfe4)={0xa, 0x0, 0x0, @mcast2={0xff, 0x2, [], 0x1}, 0x3}, 0x1c) ioctl$DRM_IOCTL_ADD_CTX(r1, 0xc0086420, &(0x7f0000000000)) ioctl$DRM_IOCTL_NEW_CTX(r1, 0x40086425, &(0x7f0000000080)={0x0, 0x3}) fallocate(r1, 0x0, 0xffff, 0x1f) setsockopt$inet6_mtu(0xffffffffffffffff, 0x29, 0x17, &(0x7f0000000100)=0x2, 0x4) ioctl$SNDRV_SEQ_IOCTL_CLIENT_ID(r1, 0x80045301, &(0x7f00000000c0)) connect$inet(r0, &(0x7f0000000040)={0x2, 0x4e22, @multicast1=0xe0000001}, 0x10) sendfile(r0, r1, &(0x7f00005faff8), 0xfffb) 2018/03/29 17:35:05 executing program 1: 2018/03/29 17:35:05 executing program 5: 2018/03/29 17:35:05 executing program 7: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)={0xb, 0x7e, 0x3, 0x1, 0x11}, 0x2c) mount(&(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) r1 = socket$kcm(0x29, 0x2, 0x0) getsockname(r1, &(0x7f0000000240)=@pppol2tp={0x0, 0x0, {0x0, 0xffffffffffffffff, {0x0, 0x0, @local}}}, &(0x7f0000000980)=0x80) sendmsg$kcm(r1, &(0x7f0000000bc0)={&(0x7f00000007c0)=@rc={0x1f, {0x5, 0x50000000, 0xaa2, 0x613, 0x4, 0x1ff}, 0x3f}, 0x80, &(0x7f0000000940)=[{&(0x7f0000000840)="09c9453aa30d8c5fba221fa2413f12c580837b2ae292e3ee8dd00098c404125a1a2e63840f82a2f69c3927af43b828422484aaeeceebcbe76e999bd3930c9b7c2995484407f9166e39c2069a88b63a980b9b5ffc880f4b89dde5adae6c7fb84ed98cbac860214dfb0b28d1b2e2d58aefebdfe515334f2ffa46be22ef7a4b3a276cb70a27c9e9f5de0a20bad24cbe2b89aee9693c2f8f186ea59fcfc4ebec7188cca0418d4583a6f1730f62416d70cd62555eb4f58ea831d1fea9956a2cba0049f23bf0b249f5de2ce0dc303808d70b0ccab3c7f37e949e", 0xd7}], 0x1, &(0x7f0000000980), 0x0, 0x20004805}, 0x4010) r2 = perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x2367, 0x7fff, 0x1, 0x6, 0x0, 0x78b1, 0x1, 0x0, 0x4992c766, 0xff, 0x81, 0x100, 0x40, 0x3, 0x9, 0x8, 0x1, 0x10000, 0x0, 0x6, 0x90e, 0x9, 0x7ff, 0x0, 0x8, 0x1, 0x30, 0x20, 0x7fffffff, 0x6, 0x401, 0x2, 0x1000, 0x8001, 0x1ff, 0xfffffffffffffff8, 0x0, 0x2, 0x0, @perf_config_ext={0x5, 0x8}, 0x1ab23, 0x3f, 0x8, 0x5, 0x6, 0x0, 0x6}, 0xffffffffffffffff, 0x10, r0, 0x1) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0xb, 0x9, &(0x7f0000000580)=@framed={{0x18}, [@map={0x18, 0x0, 0x1, 0x0, r0}, @generic={0x3ff, 0xfffffffffffffffc, 0x1}, @call={0x85, 0x0, 0x0, 0x6}], {0x95}}, &(0x7f0000000600)='syzkaller\x00', 0x0, 0x30, &(0x7f0000000640)=""/48, 0x41f00, 0x1}, 0x48) ioctl$PERF_EVENT_IOC_SET_BPF(r2, 0x40042408, r3) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000000)={&(0x7f0000000080)='./file0/file0\x00', r0}, 0x10) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000400)=@ax25={0x3, {"02f47b3723e03d"}}, 0x80, &(0x7f00000017c0), 0x0, &(0x7f0000001840)=ANY=[], 0x0, 0x24004044}, 0x4008001) bpf$MAP_CREATE(0x0, &(0x7f0000002cc0)={0x5, 0x0, 0x56c96e7a, 0x2, 0xa, 0xffffffffffffffff, 0x9}, 0x2c) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000480)='rpc_pipefs\x00', 0x200000, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000002d00)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f00000004c0)='vmnet0keyring\x00') bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000780)={&(0x7f0000000740)='./file0/file0\x00', r4}, 0x10) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x40082406, &(0x7f0000000700)='proc!@ppp1!ppp0ppp0#)lo\\lolo{\x00') mount(&(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000200)='fuseblk\x00', 0xa11800, &(0x7f0000000240)) mount(&(0x7f00000002c0)='./file0/file0\x00', &(0x7f0000000300)='./file0/file0\x00', &(0x7f0000000340)='minix\x00', 0x1000, &(0x7f0000000380)) 2018/03/29 17:35:05 executing program 4: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)={0xb, 0x7e, 0x3, 0x1, 0x11}, 0x2c) mount(&(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) r1 = socket$kcm(0x29, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000000bc0)={&(0x7f00000007c0)=@rc={0x1f, {0x5, 0x50000000, 0xaa2, 0x613, 0x4, 0x1ff}, 0x3f}, 0x80, &(0x7f0000000940)=[{&(0x7f0000000840)="09c9453aa30d8c5fba221fa2413f12c580837b2ae292e3ee8dd00098c404125a1a2e63840f82a2f69c3927af43b828422484aaeeceebcbe76e999bd3930c9b7c2995484407f9166e39c2069a88b63a980b9b5ffc880f4b89dde5adae6c7fb84ed98cbac860214dfb0b28d1b2e2d58aefebdfe515334f2ffa46be22ef7a4b3a276cb70a27c9e9f5de0a20bad24cbe2b89aee9693c2f8f186ea59fcfc4ebec7188cca0418d4583a6f1730f62416d70cd62555eb4f58ea831d1fea9956a2cba0049f23bf0b249f5de2ce0dc303808d70b0ccab3c7f37e949e", 0xd7}], 0x1, &(0x7f0000000980), 0x0, 0x20004805}, 0x4010) r2 = perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x2367, 0x7fff, 0x1, 0x6, 0x0, 0x78b1, 0x1, 0x0, 0x4992c766, 0xff, 0x81, 0x100, 0x40, 0x3, 0x9, 0x8, 0x1, 0x10000, 0x0, 0x6, 0x90e, 0x9, 0x7ff, 0x0, 0x8, 0x1, 0x30, 0x20, 0x7fffffff, 0x6, 0x401, 0x2, 0x1000, 0x8001, 0x1ff, 0xfffffffffffffff8, 0x0, 0x2, 0x0, @perf_config_ext={0x5, 0x8}, 0x1ab23, 0x3f, 0x8, 0x5, 0x6}, 0xffffffffffffffff, 0x10, r0, 0x1) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0xb, 0x9, &(0x7f0000000580)=@framed={{0x18}, [@map={0x18, 0x0, 0x1, 0x0, r0}, @generic={0x3ff, 0xfffffffffffffffc, 0x1}, @call={0x85, 0x0, 0x0, 0x6}], {0x95}}, &(0x7f0000000600)='syzkaller\x00', 0x0, 0x30, &(0x7f0000000640)=""/48, 0x41f00, 0x1}, 0x48) ioctl$PERF_EVENT_IOC_SET_BPF(r2, 0x40042408, 0xffffffffffffffff) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000000)={&(0x7f0000000080)='./file0/file0\x00', r0}, 0x10) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000400)=@ax25={0x3, {"02f47b3723e03d"}}, 0x80, &(0x7f00000017c0), 0x0, &(0x7f0000001840)=ANY=[], 0x0, 0x24004044}, 0x4008001) bpf$MAP_CREATE(0x0, &(0x7f0000002cc0)={0x5, 0x100, 0x56c96e7a, 0x2, 0xa, 0xffffffffffffffff, 0x9}, 0x2c) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000480)='rpc_pipefs\x00', 0x200000, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000002d00)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f00000004c0)='vmnet0keyring\x00') bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000780)={&(0x7f0000000740)='./file0/file0\x00', r4}, 0x10) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x40082406, &(0x7f0000000700)='proc!@ppp1!ppp0ppp0#)lo\\lolo{\x00') mount(&(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000200)='fuseblk\x00', 0xa11800, &(0x7f0000000240)) r5 = syz_open_dev$sg(&(0x7f0000000240)='/dev/sg#\x00', 0xfffffffffffffffa, 0x800) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000280)={r5, r3, 0x5, 0x1}, 0x10) ioctl$TIOCCONS(r5, 0x541d) mount(&(0x7f00000002c0)='./file0/file0\x00', &(0x7f0000000300)='./file0/file0\x00', &(0x7f0000000340)='minix\x00', 0x1000, &(0x7f0000000380)) 2018/03/29 17:35:05 executing program 1: 2018/03/29 17:35:05 executing program 6: 2018/03/29 17:35:05 executing program 2: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)={0xb, 0x7e, 0x3, 0x1, 0x11}, 0x2c) mount(&(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) r1 = socket$kcm(0x29, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000000bc0)={&(0x7f00000007c0)=@rc={0x1f, {0x5, 0x50000000, 0xaa2, 0x613, 0x4, 0x1ff}, 0x3f}, 0x80, &(0x7f0000000940)=[{&(0x7f0000000840)="09c9453aa30d8c5fba221fa2413f12c580837b2ae292e3ee8dd00098c404125a1a2e63840f82a2f69c3927af43b828422484aaeeceebcbe76e999bd3930c9b7c2995484407f9166e39c2069a88b63a980b9b5ffc880f4b89dde5adae6c7fb84ed98cbac860214dfb0b28d1b2e2d58aefebdfe515334f2ffa46be22ef7a4b3a276cb70a27c9e9f5de0a20bad24cbe2b89aee9693c2f8f186ea59fcfc4ebec7188cca0418d4583a6f1730f62416d70cd62555eb4f58ea831d1fea9956a2cba0049f23bf0b249f5de2ce0dc303808d70b0ccab3c7f37e949e", 0xd7}], 0x1, &(0x7f0000000980), 0x0, 0x20004805}, 0x4010) r2 = perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x2367, 0x7fff, 0x1, 0x6, 0x0, 0x78b1, 0x1, 0x0, 0x4992c766, 0xff, 0x81, 0x100, 0x40, 0x3, 0x9, 0x8, 0x1, 0x10000, 0x0, 0x6, 0x90e, 0x9, 0x7ff, 0x0, 0x8, 0x1, 0x30, 0x20, 0x7fffffff, 0x6, 0x401, 0x2, 0x1000, 0x8001, 0x1ff, 0xfffffffffffffff8, 0x0, 0x2, 0x0, @perf_config_ext={0x5, 0x8}, 0x1ab23, 0x0, 0x8, 0x5, 0x6, 0x0, 0x6}, 0xffffffffffffffff, 0x10, r0, 0x1) bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0xb, 0x9, &(0x7f0000000580)=@framed={{0x18}, [@map={0x18, 0x0, 0x1, 0x0, r0}, @generic={0x3ff, 0xfffffffffffffffc, 0x1}, @call={0x85, 0x0, 0x0, 0x6}], {0x95}}, &(0x7f0000000600)='syzkaller\x00', 0x0, 0x30, &(0x7f0000000640)=""/48, 0x41f00, 0x1}, 0x48) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000000)={&(0x7f0000000080)='./file0/file0\x00', r0}, 0x10) pwritev(r2, &(0x7f0000000280)=[{&(0x7f0000000980)="38b8f2c5cb10edff01df95c24c41d0e4e52f984cea01fc54085fe2161f670f5cce5d58bb5a9bd977440ba9365a10581c75c13f7165bb13ebf3663cc82b49f4244ae0cdc2647d7bbefbd1d81f99a481adaee592511946a81297577087e48c4ba8c906016117b025c0852f57738d561863efd2789cdbb1386834d54cb2e57e574032e3e4f7bfe350d1cf6cbce110467cb6c23d8e391f1e7aee94dd798578a09cc1ff172fe364bbb764a0dca8f53c733df31402b5e928ccd795a7ecb7a8e458ce7291c1a7f46352495bf46fe10b4b45924f2557ad00c391de3c410598fb02f9b53361f5eb", 0xe3}, {&(0x7f0000000240)="96098d5ab0e221029954c22342c136db9fcd", 0x12}], 0x2, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000400)=@ax25={0x3, {"02f47b3723e03d"}}, 0x80, &(0x7f00000017c0), 0x0, &(0x7f0000001840)=ANY=[], 0x0, 0x24004044}, 0x4008001) bpf$MAP_CREATE(0x0, &(0x7f0000002cc0)={0x5, 0x0, 0x56c96e7a, 0x2, 0xa, 0xffffffffffffffff, 0x9}, 0x2c) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000480)='rpc_pipefs\x00', 0x200000, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000002d00)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f00000004c0)='vmnet0keyring\x00') bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000780)={&(0x7f0000000740)='./file0/file0\x00', r3}, 0x10) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x40082406, &(0x7f0000000700)='proc!@ppp1!ppp0ppp0#)lo\\lolo{\x00') mount(&(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000200)='fuseblk\x00', 0xa11800, &(0x7f0000000240)) mount(&(0x7f00000002c0)='./file0/file0\x00', &(0x7f0000000300)='./file0/file0\x00', &(0x7f0000000340)='minix\x00', 0x1000, &(0x7f0000000380)) 2018/03/29 17:35:05 executing program 5: r0 = socket(0xa, 0x2, 0x0) flock(0xffffffffffffffff, 0x6) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000200)) setsockopt$inet_sctp_SCTP_STREAM_SCHEDULER(0xffffffffffffffff, 0x84, 0x7b, &(0x7f0000000400), 0x3ba) sendto$inet(r0, &(0x7f0000509f92), 0xff77, 0x0, &(0x7f000055fff0)={0x2, 0x4e23, @loopback=0x7f000001}, 0x10) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000b00)='./cgroup.cpu\x00', 0x200002, 0x0) setsockopt$inet_mreq(r0, 0x0, 0x0, &(0x7f0000000480)={@empty, @remote={0xac, 0x14, 0x14, 0xbb}}, 0x8) fchdir(r1) fstat(0xffffffffffffffff, &(0x7f0000000180)) bind$inet(0xffffffffffffffff, &(0x7f0000000440)={0x2, 0x0, @multicast1=0xe0000001}, 0x10) r2 = creat(&(0x7f0000000100)='./file1\x00', 0x0) fallocate(r2, 0x1, 0x0, 0x20004d2d) ioctl$DRM_IOCTL_SET_VERSION(0xffffffffffffffff, 0xc0106407, &(0x7f00000000c0)={0x0, 0x2}) socket$inet6_icmp(0xa, 0x2, 0x3a) sendmsg$inet_sctp(r0, &(0x7f000050dfc8)={&(0x7f0000000840)=@in6={0xa, 0x4e24, 0x80000001, @mcast1={0xff, 0x1, [], 0x1}}, 0x1c, &(0x7f00000005c0), 0x0, &(0x7f0000576000)}, 0x0) getsockopt$inet_sctp6_SCTP_GET_LOCAL_ADDRS(r1, 0x84, 0x6d, &(0x7f00000002c0)={0x0, 0x7e, "147b31a6c8d04526e5f78a8fe27845051f555f699446cd55da4ba6fc8873a807fa51bb4eab22c5df774cd217b3b2c0af891a34aae4b6aa2b7e16f7b4fd5dcc91ee95c14977580183e86a5e903258265c96396582cadd0075864a1d1b58c4036a1ea7b763df062b4b66c882ba9442bac3b9b6d420938dca4b48c863fb4acd"}, &(0x7f0000000240)=0x86) setsockopt$inet_sctp_SCTP_DEFAULT_PRINFO(r0, 0x84, 0x72, &(0x7f0000000380)={r3, 0x10000, 0x30}, 0xc) sendto$inet6(r0, &(0x7f0000000240), 0x0, 0x0, &(0x7f0000000280)={0xa, 0x4e23, 0x3, @local={0xfe, 0x80, [], 0xaa}, 0x9}, 0x1c) getpeername$packet(0xffffffffffffffff, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @broadcast}, &(0x7f0000000a00)=0x14) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000000)={{{@in=@multicast2, @in6=@dev}}, {{@in=@multicast1}, 0x0, @in6=@ipv4={[], [], @remote}}}, &(0x7f0000000140)=0xe8) 2018/03/29 17:35:05 executing program 1: r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff7fffffffffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = getpgrp(0xffffffffffffffff) r2 = syz_open_procfs(r1, &(0x7f00000000c0)='stat\x00') ioctl$sock_inet_SIOCSIFBRDADDR(0xffffffffffffffff, 0x891a, &(0x7f00000008c0)={'ip6tnl0\x00', {0x2, 0x4e23, @multicast1=0xe0000001}}) sendfile(r2, r2, &(0x7f0000000040)=0xffffffff77fffffe, 0x5) getresuid(&(0x7f0000000480), &(0x7f00000004c0), &(0x7f0000000500)) stat(&(0x7f0000000540)='./file0\x00', &(0x7f0000000580)) geteuid() stat(&(0x7f0000000600)='./file0\x00', &(0x7f0000000640)) stat(&(0x7f00000006c0)='./file0\x00', &(0x7f0000000700)) getegid() stat(&(0x7f0000000780)='./file0\x00', &(0x7f00000007c0)) getgid() r3 = getuid() fstat(r2, &(0x7f0000000840)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) sendmsg$unix(0xffffffffffffffff, &(0x7f00000009c0)={&(0x7f0000000100)=@abs={0x1, 0x0, 0x4e23}, 0x6e, &(0x7f0000000440)=[{&(0x7f0000000180)="f5dc941f4dc3cd9adc57ae91e3dd4343d2d34a84526e7cc2dced527b17e9f844324330a6c4fc95075fc39479fc730a76e14b1c7e042182b78b54fd1112d5d88e0463edf0b527bc60eef252342942a7d15f5dbf3a13deeaef54e8a875bd6393929f9f520c496c5643e469d505dd150b595920", 0x72}], 0x1, &(0x7f0000000ac0)=ANY=[@ANYBLOB="180000000100000002", @ANYRES32=r3, @ANYRES32=r4, @ANYBLOB="300000000100000001000000", @ANYRES32=r2, @ANYRES32=r2, @ANYRES32=r2, @ANYRES32=r0, @ANYRES32=r0, @ANYRES32=r2, @ANYRES32=r0], 0x39}, 0x24008000) getresgid(&(0x7f0000000a00), &(0x7f0000000a40), &(0x7f0000000a80)) 2018/03/29 17:35:05 executing program 0: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)={0xb, 0x7e, 0x3, 0x1, 0x11}, 0x2c) mount(&(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) r1 = socket$kcm(0x29, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000000bc0)={&(0x7f00000007c0)=@rc={0x1f, {0x5, 0x50000000, 0xaa2, 0x613, 0x4, 0x1ff}}, 0x80, &(0x7f0000000940)=[{&(0x7f0000000840)="09c9453aa30d8c5fba221fa2413f12c580837b2ae292e3ee8dd00098c404125a1a2e63840f82a2f69c3927af43b828422484aaeeceebcbe76e999bd3930c9b7c2995484407f9166e39c2069a88b63a980b9b5ffc880f4b89dde5adae6c7fb84ed98cbac860214dfb0b28d1b2e2d58aefebdfe515334f2ffa46be22ef7a4b3a276cb70a27c9e9f5de0a20bad24cbe2b89aee9693c2f8f186ea59fcfc4ebec7188cca0418d4583a6f1730f62416d70cd62555eb4f58ea831d1fea9956a2cba0049f23bf0b249f5de2ce0dc303808d70b0ccab3c7f37e949e", 0xd7}], 0x1, &(0x7f0000000980)}, 0x4010) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0xb, 0x9, &(0x7f0000000580)=@framed={{0x18}, [@map={0x18, 0x0, 0x1, 0x0, r0}, @generic={0x3ff, 0xfffffffffffffffc, 0x1}, @call={0x85, 0x0, 0x0, 0x6}], {0x95}}, &(0x7f0000000600)='syzkaller\x00', 0x0, 0x30, &(0x7f0000000640)=""/48, 0x41f00, 0x1}, 0x48) ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, r2) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000000)={&(0x7f0000000080)='./file0/file0\x00', r0}, 0x10) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000400)=@ax25={0x3, {"02f47b3723e03d"}}, 0x80, &(0x7f00000017c0), 0x0, &(0x7f0000001840)=ANY=[], 0x0, 0x24004044}, 0x4008001) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000002cc0)={0x5, 0x100, 0x56c96e7a, 0x2, 0xa, 0xffffffffffffffff, 0x9}, 0x2c) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000480)='rpc_pipefs\x00', 0x200000, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000002d00)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f00000004c0)='vmnet0keyring\x00') bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000780)={&(0x7f0000000740)='./file0/file0\x00', r5}, 0x10) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, &(0x7f0000000700)='proc!@ppp1!ppp0ppp0#)lo\\lolo{\x00') mount(&(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000200)='fuseblk\x00', 0xa11800, &(0x7f0000000240)) mount(&(0x7f00000002c0)='./file0/file0\x00', &(0x7f0000000300)='./file0/file0\x00', &(0x7f0000000340)='minix\x00', 0x0, &(0x7f0000000380)) getsockopt$inet_sctp6_SCTP_AUTH_ACTIVE_KEY(r3, 0x84, 0x18, &(0x7f0000000240)={0x0, 0x3}, &(0x7f0000000280)=0x8) getsockopt$inet_sctp_SCTP_GET_PEER_ADDR_INFO(r4, 0x84, 0xf, &(0x7f0000000980)={r6, @in={{0x2, 0x4e23, @multicast1=0xe0000001}}, 0x5, 0x55, 0x2, 0x1, 0x5}, &(0x7f0000000500)=0x98) 2018/03/29 17:35:05 executing program 6: 2018/03/29 17:35:05 executing program 4: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)={0xb, 0x7e, 0x3, 0x1, 0x11}, 0x2c) mount(&(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) r1 = socket$kcm(0x29, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000000bc0)={&(0x7f00000007c0)=@rc={0x1f, {0x5, 0x50000000, 0xaa2, 0x613, 0x4, 0x1ff}, 0x3f}, 0x80, &(0x7f0000000940)=[{&(0x7f0000000840)="09c9453aa30d8c5fba221fa2413f12c580837b2ae292e3ee8dd00098c404125a1a2e63840f82a2f69c3927af43b828422484aaeeceebcbe76e999bd3930c9b7c2995484407f9166e39c2069a88b63a980b9b5ffc880f4b89dde5adae6c7fb84ed98cbac860214dfb0b28d1b2e2d58aefebdfe515334f2ffa46be22ef7a4b3a276cb70a27c9e9f5de0a20bad24cbe2b89aee9693c2f8f186ea59fcfc4ebec7188cca0418d4583a6f1730f62416d70cd62555eb4f58ea831d1fea9956a2cba0049f23bf0b249f5de2ce0dc303808d70b0ccab3c7f37e949e", 0xd7}], 0x1, &(0x7f0000000980), 0x0, 0x20004805}, 0x4010) r2 = perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x2367, 0x7fff, 0x1, 0x6, 0x0, 0x78b1, 0x1, 0x0, 0x4992c766, 0xff, 0x81, 0x100, 0x40, 0x3, 0x9, 0x8, 0x1, 0x10000, 0x0, 0x6, 0x90e, 0x9, 0x7ff, 0x0, 0x8, 0x1, 0x30, 0x20, 0x7fffffff, 0x6, 0x401, 0x2, 0x1000, 0x8001, 0x1ff, 0xfffffffffffffff8, 0x0, 0x2, 0x0, @perf_config_ext={0x5, 0x8}, 0x1ab23, 0x3f, 0x8, 0x5, 0x6}, 0xffffffffffffffff, 0x10, r0, 0x1) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0xb, 0x9, &(0x7f0000000580)=@framed={{0x18}, [@map={0x18, 0x0, 0x1, 0x0, r0}, @generic={0x3ff, 0xfffffffffffffffc, 0x1}, @call={0x85, 0x0, 0x0, 0x6}], {0x95}}, &(0x7f0000000600)='syzkaller\x00', 0x0, 0x30, &(0x7f0000000640)=""/48, 0x41f00, 0x1}, 0x48) ioctl$PERF_EVENT_IOC_SET_BPF(r2, 0x40042408, 0xffffffffffffffff) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000000)={&(0x7f0000000080)='./file0/file0\x00', r0}, 0x10) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000400)=@ax25={0x3, {"02f47b3723e03d"}}, 0x80, &(0x7f00000017c0), 0x0, &(0x7f0000001840)=ANY=[], 0x0, 0x24004044}, 0x4008001) bpf$MAP_CREATE(0x0, &(0x7f0000002cc0)={0x5, 0x100, 0x56c96e7a, 0x2, 0xa, 0xffffffffffffffff, 0x9}, 0x2c) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000480)='rpc_pipefs\x00', 0x200000, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000002d00)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f00000004c0)='vmnet0keyring\x00') bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000780)={&(0x7f0000000740)='./file0/file0\x00', r4}, 0x10) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x40082406, &(0x7f0000000700)='proc!@ppp1!ppp0ppp0#)lo\\lolo{\x00') mount(&(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000200)='fuseblk\x00', 0xa11800, &(0x7f0000000240)) r5 = syz_open_dev$sg(&(0x7f0000000240)='/dev/sg#\x00', 0xfffffffffffffffa, 0x800) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000280)={r5, r3, 0x5, 0x1}, 0x10) ioctl$TIOCCONS(r5, 0x541d) mount(&(0x7f00000002c0)='./file0/file0\x00', &(0x7f0000000300)='./file0/file0\x00', &(0x7f0000000340)='minix\x00', 0x1000, &(0x7f0000000380)) 2018/03/29 17:35:05 executing program 5: 2018/03/29 17:35:05 executing program 7: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)={0xb, 0x7e, 0x3, 0x1, 0x11}, 0x2c) mount(&(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) r1 = socket$kcm(0x29, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000000bc0)={&(0x7f00000007c0)=@rc={0x1f, {0x5, 0x50000000, 0xaa2, 0x613, 0x4, 0x1ff}, 0x3f}, 0x80, &(0x7f0000000940)=[{&(0x7f0000000840)="09c9453aa30d8c5fba221fa2413f12c580837b2ae292e3ee8dd00098c404125a1a2e63840f82a2f69c3927af43b828422484aaeeceebcbe76e999bd3930c9b7c2995484407f9166e39c2069a88b63a980b9b5ffc880f4b89dde5adae6c7fb84ed98cbac860214dfb0b28d1b2e2d58aefebdfe515334f2ffa46be22ef7a4b3a276cb70a27c9e9f5de0a20bad24cbe2b89aee9693c2f8f186ea59fcfc4ebec7188cca0418d4583a6f1730f62416d70cd62555eb4f58ea831d1fea9956a2cba0049f23bf0b249f5de2ce0dc303808d70b0ccab3c7f37e949e", 0xd7}], 0x1, &(0x7f0000000980), 0x0, 0x20004805}, 0x4010) r2 = perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x2367, 0x7fff, 0x1, 0x6, 0x0, 0x78b1, 0x1, 0x0, 0x4992c766, 0xff, 0x81, 0x100, 0x40, 0x3, 0x9, 0x8, 0x1, 0x10000, 0x0, 0x6, 0x90e, 0x9, 0x7ff, 0x0, 0x8, 0x1, 0x30, 0x20, 0x7fffffff, 0x6, 0x401, 0x2, 0x1000, 0x8001, 0x1ff, 0xfffffffffffffff8, 0x0, 0x2, 0x0, @perf_config_ext={0x5, 0x8}, 0x1ab23, 0x3f, 0x8, 0x5, 0x6, 0x0, 0x6}, 0xffffffffffffffff, 0x10, r0, 0x1) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0xb, 0x9, &(0x7f0000000580)=@framed={{0x18}, [@map={0x18, 0x0, 0x1, 0x0, r0}, @generic={0x3ff, 0xfffffffffffffffc, 0x1}, @call={0x85, 0x0, 0x0, 0x6}], {0x95}}, &(0x7f0000000600)='syzkaller\x00', 0x0, 0x30, &(0x7f0000000640)=""/48, 0x41f00, 0x1}, 0x48) ioctl$PERF_EVENT_IOC_SET_BPF(r2, 0x40042408, r3) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000000)={&(0x7f0000000080)='./file0/file0\x00', r0}, 0x10) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000400)=@ax25={0x3, {"02f47b3723e03d"}}, 0x80, &(0x7f00000017c0), 0x0, &(0x7f0000001840)=ANY=[], 0x0, 0x24004044}, 0x4008001) bpf$MAP_CREATE(0x0, &(0x7f0000002cc0)={0x5, 0x0, 0x56c96e7a, 0x2, 0xa, 0xffffffffffffffff, 0x9}, 0x2c) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000480)='rpc_pipefs\x00', 0x200000, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000002d00)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f00000004c0)='vmnet0keyring\x00') bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000780)={&(0x7f0000000740)='./file0/file0\x00', r4}, 0x10) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x40082406, &(0x7f0000000700)='proc!@ppp1!ppp0ppp0#)lo\\lolo{\x00') getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f0000000dc0)={0x0, 0x0}, &(0x7f0000000e00)=0xc) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000e40)={0x0, 0x0, 0x0}, &(0x7f0000000e80)=0xc) syz_fuse_mount(&(0x7f0000000d80)='./file2\x00', 0x1000, r5, r6, 0xfc1, 0x10080) mount(&(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000200)='fuseblk\x00', 0xa11800, &(0x7f0000000240)) mount(&(0x7f00000002c0)='./file0/file0\x00', &(0x7f0000000300)='./file0/file0\x00', &(0x7f0000000340)='minix\x00', 0x1000, &(0x7f0000000380)) execve(&(0x7f0000000240)='./file1\x00', &(0x7f0000000ac0)=[&(0x7f0000000280)='syzkaller\x00', &(0x7f0000000980)='\x00', &(0x7f00000009c0)='(@selinux:%/\x00', &(0x7f0000000a00)='fuseblk\x00', &(0x7f0000000a40)='minix\x00', &(0x7f0000000a80)='minix\x00'], &(0x7f0000000d40)=[&(0x7f0000000b00)='minix\x00', &(0x7f0000000b40)='\x00', &(0x7f0000000b80)='bpf\x00', &(0x7f0000000c00)="657468312e1a637075736574656d307d2800", &(0x7f0000000c40)='fuseblk\x00', &(0x7f0000000c80)=')proctrustedcpuset\x00', &(0x7f0000000cc0)='minix\x00', &(0x7f0000000d00)='vmnet0keyring\x00']) 2018/03/29 17:35:05 executing program 6: 2018/03/29 17:35:05 executing program 6: 2018/03/29 17:35:05 executing program 3: r0 = socket(0xa, 0x2, 0x0) r1 = open(&(0x7f00004b8ff8)='./file0\x00', 0x28042, 0x0) ioctl$KVM_GET_LAPIC(r1, 0x8400ae8e, &(0x7f0000000140)={"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"}) connect$inet6(r0, &(0x7f0000d3cfe4)={0xa, 0x0, 0x0, @mcast2={0xff, 0x2, [], 0x1}, 0x3}, 0x1c) ioctl$DRM_IOCTL_ADD_CTX(r1, 0xc0086420, &(0x7f0000000000)) ioctl$DRM_IOCTL_NEW_CTX(r1, 0x40086425, &(0x7f0000000080)={0x0, 0x3}) fallocate(r1, 0x0, 0xffff, 0x1f) setsockopt$inet6_mtu(0xffffffffffffffff, 0x29, 0x17, &(0x7f0000000100)=0x2, 0x4) setsockopt$inet_sctp6_SCTP_AUTOCLOSE(r1, 0x84, 0x4, &(0x7f00000000c0)=0xc7c2, 0x4) connect$inet(r0, &(0x7f0000000040)={0x2, 0x4e22, @multicast1=0xe0000001}, 0x10) sendfile(r0, r1, &(0x7f00005faff8), 0xfffb) 2018/03/29 17:35:05 executing program 1: 2018/03/29 17:35:05 executing program 4: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)={0xb, 0x7e, 0x3, 0x1, 0x11}, 0x2c) mount(&(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) r1 = socket$kcm(0x29, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000000bc0)={&(0x7f00000007c0)=@rc={0x1f, {0x5, 0x50000000, 0xaa2, 0x613, 0x4, 0x1ff}, 0x3f}, 0x80, &(0x7f0000000940)=[{&(0x7f0000000840)="09c9453aa30d8c5fba221fa2413f12c580837b2ae292e3ee8dd00098c404125a1a2e63840f82a2f69c3927af43b828422484aaeeceebcbe76e999bd3930c9b7c2995484407f9166e39c2069a88b63a980b9b5ffc880f4b89dde5adae6c7fb84ed98cbac860214dfb0b28d1b2e2d58aefebdfe515334f2ffa46be22ef7a4b3a276cb70a27c9e9f5de0a20bad24cbe2b89aee9693c2f8f186ea59fcfc4ebec7188cca0418d4583a6f1730f62416d70cd62555eb4f58ea831d1fea9956a2cba0049f23bf0b249f5de2ce0dc303808d70b0ccab3c7f37e949e", 0xd7}], 0x1, &(0x7f0000000980), 0x0, 0x20004805}, 0x4010) r2 = perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x2367, 0x7fff, 0x1, 0x6, 0x0, 0x78b1, 0x1, 0x0, 0x4992c766, 0xff, 0x81, 0x100, 0x40, 0x3, 0x9, 0x8, 0x1, 0x10000, 0x0, 0x6, 0x90e, 0x9, 0x7ff, 0x0, 0x8, 0x1, 0x30, 0x20, 0x7fffffff, 0x6, 0x401, 0x2, 0x1000, 0x8001, 0x1ff, 0xfffffffffffffff8, 0x0, 0x2, 0x0, @perf_config_ext={0x5, 0x8}, 0x1ab23, 0x3f, 0x8, 0x5, 0x6}, 0xffffffffffffffff, 0x10, r0, 0x1) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0xb, 0x9, &(0x7f0000000580)=@framed={{0x18}, [@map={0x18, 0x0, 0x1, 0x0, r0}, @generic={0x3ff, 0xfffffffffffffffc, 0x1}, @call={0x85, 0x0, 0x0, 0x6}], {0x95}}, &(0x7f0000000600)='syzkaller\x00', 0x0, 0x30, &(0x7f0000000640)=""/48, 0x41f00, 0x1}, 0x48) ioctl$PERF_EVENT_IOC_SET_BPF(r2, 0x40042408, 0xffffffffffffffff) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000000)={&(0x7f0000000080)='./file0/file0\x00', r0}, 0x10) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000400)=@ax25={0x3, {"02f47b3723e03d"}}, 0x80, &(0x7f00000017c0), 0x0, &(0x7f0000001840)=ANY=[], 0x0, 0x24004044}, 0x4008001) bpf$MAP_CREATE(0x0, &(0x7f0000002cc0)={0x5, 0x100, 0x56c96e7a, 0x2, 0xa, 0xffffffffffffffff, 0x9}, 0x2c) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000480)='rpc_pipefs\x00', 0x200000, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000002d00)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f00000004c0)='vmnet0keyring\x00') bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000780)={&(0x7f0000000740)='./file0/file0\x00', r4}, 0x10) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x40082406, &(0x7f0000000700)='proc!@ppp1!ppp0ppp0#)lo\\lolo{\x00') mount(&(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000200)='fuseblk\x00', 0xa11800, &(0x7f0000000240)) r5 = syz_open_dev$sg(&(0x7f0000000240)='/dev/sg#\x00', 0xfffffffffffffffa, 0x800) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000280)={r5, r3, 0x5, 0x1}, 0x10) ioctl$TIOCCONS(r5, 0x541d) mount(&(0x7f00000002c0)='./file0/file0\x00', &(0x7f0000000300)='./file0/file0\x00', &(0x7f0000000340)='minix\x00', 0x1000, &(0x7f0000000380)) 2018/03/29 17:35:05 executing program 2: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)={0xb, 0x7e, 0x3, 0x1, 0x11}, 0x2c) mount(&(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) r1 = socket$kcm(0x29, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000000bc0)={&(0x7f00000007c0)=@rc={0x1f, {0x5, 0x50000000, 0xaa2, 0x613, 0x4, 0x1ff}, 0x3f}, 0x80, &(0x7f0000000940)=[{&(0x7f0000000840)="09c9453aa30d8c5fba221fa2413f12c580837b2ae292e3ee8dd00098c404125a1a2e63840f82a2f69c3927af43b828422484aaeeceebcbe76e999bd3930c9b7c2995484407f9166e39c2069a88b63a980b9b5ffc880f4b89dde5adae6c7fb84ed98cbac860214dfb0b28d1b2e2d58aefebdfe515334f2ffa46be22ef7a4b3a276cb70a27c9e9f5de0a20bad24cbe2b89aee9693c2f8f186ea59fcfc4ebec7188cca0418d4583a6f1730f62416d70cd62555eb4f58ea831d1fea9956a2cba0049f23bf0b249f5de2ce0dc303808d70b0ccab3c7f37e949e", 0xd7}], 0x1, &(0x7f0000000980), 0x0, 0x20004805}, 0x4010) r2 = perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x2367, 0x7fff, 0x1, 0x6, 0x0, 0x78b1, 0x1, 0x0, 0x4992c766, 0xff, 0x81, 0x100, 0x40, 0x3, 0x9, 0x8, 0x1, 0x10000, 0x0, 0x6, 0x90e, 0x9, 0x7ff, 0x0, 0x8, 0x1, 0x30, 0x20, 0x7fffffff, 0x6, 0x401, 0x2, 0x1000, 0x8001, 0x1ff, 0xfffffffffffffff8, 0x0, 0x2, 0x0, @perf_config_ext={0x5, 0x8}, 0x1ab23, 0x0, 0x8, 0x5, 0x6, 0x0, 0x6}, 0xffffffffffffffff, 0x10, r0, 0x1) bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0xb, 0x9, &(0x7f0000000580)=@framed={{0x18}, [@map={0x18, 0x0, 0x1, 0x0, r0}, @generic={0x3ff, 0xfffffffffffffffc, 0x1}, @call={0x85, 0x0, 0x0, 0x6}], {0x95}}, &(0x7f0000000600)='syzkaller\x00', 0x0, 0x30, &(0x7f0000000640)=""/48, 0x41f00, 0x1}, 0x48) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000000)={&(0x7f0000000080)='./file0/file0\x00', r0}, 0x10) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000400)=@ax25={0x3, {"02f47b3723e03d"}}, 0x80, &(0x7f00000017c0), 0x0, &(0x7f0000001840)=ANY=[], 0x0, 0x24004044}, 0x4008001) bpf$MAP_CREATE(0x0, &(0x7f0000002cc0)={0x5, 0x0, 0x56c96e7a, 0x2, 0xa, 0xffffffffffffffff, 0x9}, 0x2c) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000480)='rpc_pipefs\x00', 0x200000, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000002d00)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f00000004c0)='vmnet0keyring\x00') bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000780)={&(0x7f0000000740)='./file0/file0\x00', r3}, 0x10) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x40082406, &(0x7f0000000700)='proc!@ppp1!ppp0ppp0#)lo\\lolo{\x00') mount(&(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000200)='fuseblk\x00', 0xa11800, &(0x7f0000000240)) mount(&(0x7f00000002c0)='./file0/file0\x00', &(0x7f0000000300)='./file0/file0\x00', &(0x7f0000000980)='minix\x00', 0x1000, &(0x7f0000000380)) 2018/03/29 17:35:05 executing program 6: 2018/03/29 17:35:05 executing program 5: 2018/03/29 17:35:05 executing program 1: 2018/03/29 17:35:05 executing program 3: r0 = socket(0xa, 0x2, 0x0) r1 = open(&(0x7f00004b8ff8)='./file0\x00', 0x28042, 0x0) connect$inet6(r0, &(0x7f0000d3cfe4)={0xa, 0x0, 0x0, @mcast2={0xff, 0x2, [], 0x1}, 0x3}, 0x1c) ioctl$DRM_IOCTL_ADD_CTX(r1, 0xc0086420, &(0x7f0000000000)) ioctl$DRM_IOCTL_NEW_CTX(r1, 0x40086425, &(0x7f0000000080)={0x0, 0x3}) fallocate(r1, 0x0, 0xffff, 0x1f) setsockopt$inet6_mtu(0xffffffffffffffff, 0x29, 0x17, &(0x7f0000000140)=0x2, 0x4) setsockopt$inet6_MRT6_DEL_MFC(r0, 0x29, 0xcd, &(0x7f00000000c0)={{0xa, 0x4e24, 0x7d, @empty, 0x9}, {0xa, 0x4e23, 0x6f, @loopback={0x0, 0x1}, 0x7}, 0x6, [0x7, 0x100000001, 0xf5, 0x1, 0x5, 0x2, 0xc2, 0x526]}, 0x5c) connect$inet(r0, &(0x7f0000000040)={0x2, 0x4e22, @multicast1=0xe0000001}, 0x10) sendfile(r0, r1, &(0x7f00005faff8), 0xfffb) 2018/03/29 17:35:05 executing program 6: 2018/03/29 17:35:05 executing program 0: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)={0xb, 0x7e, 0x3, 0x1, 0x11}, 0x2c) mount(&(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) r1 = socket$kcm(0x29, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000000bc0)={&(0x7f00000007c0)=@rc={0x1f, {0x5, 0x50000000, 0xaa2, 0x613, 0x4, 0x1ff}}, 0x80, &(0x7f0000000940)=[{&(0x7f0000000840)="09c9453aa30d8c5fba221fa2413f12c580837b2ae292e3ee8dd00098c404125a1a2e63840f82a2f69c3927af43b828422484aaeeceebcbe76e999bd3930c9b7c2995484407f9166e39c2069a88b63a980b9b5ffc880f4b89dde5adae6c7fb84ed98cbac860214dfb0b28d1b2e2d58aefebdfe515334f2ffa46be22ef7a4b3a276cb70a27c9e9f5de0a20bad24cbe2b89aee9693c2f8f186ea59fcfc4ebec7188cca0418d4583a6f1730f62416d70cd62555eb4f58ea831d1fea9956a2cba0049f23bf0b249f5de2ce0dc303808d70b0ccab3c7f37e949e", 0xd7}], 0x1, &(0x7f0000000980)}, 0x4010) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0xb, 0x9, &(0x7f0000000580)=@framed={{0x18}, [@map={0x18, 0x0, 0x1, 0x0, r0}, @generic={0x3ff, 0xfffffffffffffffc, 0x1}, @call={0x85, 0x0, 0x0, 0x6}], {0x95}}, &(0x7f0000000600)='syzkaller\x00', 0x0, 0x30, &(0x7f0000000640)=""/48, 0x41f00, 0x1}, 0x48) ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, r2) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000000)={&(0x7f0000000080)='./file0/file0\x00', r0}, 0x10) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000400)=@ax25={0x3, {"02f47b3723e03d"}}, 0x80, &(0x7f00000017c0), 0x0, &(0x7f0000001840)=ANY=[], 0x0, 0x24004044}, 0x4008001) bpf$MAP_CREATE(0x0, &(0x7f0000002cc0)={0x5, 0x100, 0x56c96e7a, 0x2, 0xa, 0xffffffffffffffff, 0x9}, 0x2c) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000480)='rpc_pipefs\x00', 0x200000, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000002d00)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f00000004c0)='vmnet0keyring\x00') bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000780)={&(0x7f0000000740)='./file0/file0\x00', r3}, 0x10) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, &(0x7f0000000700)='proc!@ppp1!ppp0ppp0#)lo\\lolo{\x00') r4 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000240)='/proc/sys/net/ipv4/vs/sync_qlen_max\x00', 0x2, 0x0) ioctl$EVIOCGPHYS(r4, 0x80404507, &(0x7f0000000500)=""/87) mount(&(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000200)='fuseblk\x00', 0xa11800, &(0x7f0000000240)) mount(&(0x7f00000002c0)='./file0/file0\x00', &(0x7f0000000300)='./file0/file0\x00', &(0x7f0000000340)='minix\x00', 0x0, &(0x7f0000000380)) 2018/03/29 17:35:05 executing program 1: 2018/03/29 17:35:05 executing program 7: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)={0xb, 0x7e, 0x3, 0x1, 0x11}, 0x2c) mount(&(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) r1 = socket$kcm(0x29, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000000bc0)={&(0x7f00000007c0)=@rc={0x1f, {0x5, 0x50000000, 0xaa2, 0x613, 0x4, 0x1ff}, 0x3f}, 0x80, &(0x7f0000000940)=[{&(0x7f0000000840)="09c9453aa30d8c5fba221fa2413f12c580837b2ae292e3ee8dd00098c404125a1a2e63840f82a2f69c3927af43b828422484aaeeceebcbe76e999bd3930c9b7c2995484407f9166e39c2069a88b63a980b9b5ffc880f4b89dde5adae6c7fb84ed98cbac860214dfb0b28d1b2e2d58aefebdfe515334f2ffa46be22ef7a4b3a276cb70a27c9e9f5de0a20bad24cbe2b89aee9693c2f8f186ea59fcfc4ebec7188cca0418d4583a6f1730f62416d70cd62555eb4f58ea831d1fea9956a2cba0049f23bf0b249f5de2ce0dc303808d70b0ccab3c7f37e949e", 0xd7}], 0x1, &(0x7f0000000980), 0x0, 0x20004805}, 0x4010) r2 = perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x2367, 0x7fff, 0x1, 0x6, 0x0, 0x78b1, 0x1, 0x0, 0x4992c766, 0xff, 0x81, 0x100, 0x40, 0x3, 0x9, 0x8, 0x1, 0x10000, 0x0, 0x6, 0x90e, 0x9, 0x7ff, 0x0, 0x8, 0x1, 0x30, 0x20, 0x7fffffff, 0x6, 0x401, 0x2, 0x1000, 0x8001, 0x1ff, 0xfffffffffffffff8, 0x0, 0x2, 0x0, @perf_config_ext={0x5, 0x8}, 0x1ab23, 0x3f, 0x8, 0x5, 0x6, 0x0, 0x6}, 0xffffffffffffffff, 0x10, r0, 0x1) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0xb, 0x9, &(0x7f0000000580)=ANY=[@ANYBLOB="18000010000018100000", @ANYRES32=r0, @ANYBLOB="0000000000000000fffc0100000000000000000000000000850000000600000000000000000000009500000000000000"], &(0x7f0000000600)='syzkaller\x00', 0x0, 0x30, &(0x7f0000000640)=""/48, 0x41f00, 0x1}, 0x48) ioctl$PERF_EVENT_IOC_SET_BPF(r2, 0x40042408, r3) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000000)={&(0x7f0000000080)='./file0/file0\x00', r0}, 0x10) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000240)={0x8, 0x9, 0x2, 0x6, 0x5, r0, 0xde9}, 0x2c) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000400)=@ax25={0x3, {"02f47b3723e03d"}}, 0x80, &(0x7f00000017c0), 0x0, &(0x7f0000001840)=ANY=[], 0x0, 0x24004044}, 0x4008001) bpf$MAP_CREATE(0x0, &(0x7f0000002cc0)={0x5, 0xffffffffffffffe, 0x40000056c96e7a, 0x2, 0x4, r4, 0x9}, 0x2c) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000480)='rpc_pipefs\x00', 0x200000, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000002d00)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f00000004c0)='vmnet0keyring\x00') bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000780)={&(0x7f0000000740)='./file0/file0\x00', r5}, 0x10) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x40082406, &(0x7f0000000700)='proc!@ppp1!ppp0ppp0#)lo\\lolo{\x00') r6 = semget(0x2, 0x0, 0x441) semctl$IPC_RMID(r6, 0x0, 0x0) mount(&(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000200)='fuseblk\x00', 0xa11800, &(0x7f0000000240)) mount(&(0x7f00000002c0)='./file0/file0\x00', &(0x7f0000000300)='./file0/file0\x00', &(0x7f0000000340)='minix\x00', 0x1000, &(0x7f0000000380)) 2018/03/29 17:35:05 executing program 2: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)={0xb, 0x7e, 0x3, 0x1, 0x11}, 0x2c) mount(&(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) r1 = socket$kcm(0x29, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000000bc0)={&(0x7f00000007c0)=@rc={0x1f, {0x5, 0x50000000, 0xaa2, 0x613, 0x4, 0x1ff}, 0x3f}, 0x80, &(0x7f0000000940)=[{&(0x7f0000000840)="09c9453aa30d8c5fba221fa2413f12c580837b2ae292e3ee8dd00098c404125a1a2e63840f82a2f69c3927af43b828422484aaeeceebcbe76e999bd3930c9b7c2995484407f9166e39c2069a88b63a980b9b5ffc880f4b89dde5adae6c7fb84ed98cbac860214dfb0b28d1b2e2d58aefebdfe515334f2ffa46be22ef7a4b3a276cb70a27c9e9f5de0a20bad24cbe2b89aee9693c2f8f186ea59fcfc4ebec7188cca0418d4583a6f1730f62416d70cd62555eb4f58ea831d1fea9956a2cba0049f23bf0b249f5de2ce0dc303808d70b0ccab3c7f37e949e", 0xd7}], 0x1, &(0x7f0000000980), 0x0, 0x20004805}, 0x4010) r2 = dup3(r1, r1, 0x0) ioctl$TIOCMSET(r2, 0x5418, &(0x7f0000000240)=0x9) r3 = perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x2367, 0x7fff, 0x1, 0x6, 0x0, 0x78b1, 0x1, 0x0, 0x4992c766, 0xff, 0x81, 0x100, 0x40, 0x3, 0x9, 0x8, 0x1, 0x10000, 0x0, 0x6, 0x90e, 0x9, 0x7ff, 0x0, 0x8, 0x1, 0x30, 0x20, 0x7fffffff, 0x6, 0x401, 0x2, 0x1000, 0x8001, 0x1ff, 0xfffffffffffffff8, 0x0, 0x2, 0x0, @perf_config_ext={0x5, 0x8}, 0x1ab23, 0x0, 0x8, 0x5, 0x6, 0x0, 0x6}, 0xffffffffffffffff, 0x10, r0, 0x1) bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0xb, 0x9, &(0x7f0000000580)=@framed={{0x18}, [@map={0x18, 0x0, 0x1, 0x0, r0}, @generic={0x3ff, 0xfffffffffffffffc, 0x1}, @call={0x85, 0x0, 0x0, 0x6}], {0x95}}, &(0x7f0000000600)='syzkaller\x00', 0x0, 0x30, &(0x7f0000000640)=""/48, 0x41f00, 0x1}, 0x48) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000000)={&(0x7f0000000080)='./file0/file0\x00', r0}, 0x10) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000400)=@ax25={0x3, {"02f47b3723e03d"}}, 0x80, &(0x7f00000017c0), 0x0, &(0x7f0000001840)=ANY=[], 0x0, 0x24004044}, 0x4008001) bpf$MAP_CREATE(0x0, &(0x7f0000002cc0)={0x5, 0x0, 0x56c96e7a, 0x2, 0xa, 0xffffffffffffffff, 0x9}, 0x2c) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000480)='rpc_pipefs\x00', 0x200000, 0x0) ioctl$KIOCSOUND(r1, 0x4b2f, 0x1) keyctl$session_to_parent(0x12) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000002d00)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TIOCGPTPEER(r2, 0x5441, 0x1) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f00000004c0)='vmnet0keyring\x00') bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000780)={&(0x7f0000000740)='./file0/file0\x00', r4}, 0x10) ioctl$PERF_EVENT_IOC_SET_FILTER(r3, 0x40082406, &(0x7f0000000700)='proc!@ppp1!ppp0ppp0#)lo\\lolo{\x00') mount(&(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000200)='fuseblk\x00', 0xa11800, &(0x7f0000000240)) mount(&(0x7f00000002c0)='./file0/file0\x00', &(0x7f0000000300)='./file0/file0\x00', &(0x7f0000000340)='minix\x00', 0x1000, &(0x7f0000000380)) 2018/03/29 17:35:05 executing program 5: 2018/03/29 17:35:05 executing program 1: 2018/03/29 17:35:05 executing program 6: 2018/03/29 17:35:05 executing program 4: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)={0xb, 0x7e, 0x3, 0x1, 0x11}, 0x2c) mount(&(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) r1 = socket$kcm(0x29, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000000bc0)={&(0x7f00000007c0)=@rc={0x1f, {0x5, 0x50000000, 0xaa2, 0x613, 0x4, 0x1ff}, 0x3f}, 0x80, &(0x7f0000000940)=[{&(0x7f0000000840)="09c9453aa30d8c5fba221fa2413f12c580837b2ae292e3ee8dd00098c404125a1a2e63840f82a2f69c3927af43b828422484aaeeceebcbe76e999bd3930c9b7c2995484407f9166e39c2069a88b63a980b9b5ffc880f4b89dde5adae6c7fb84ed98cbac860214dfb0b28d1b2e2d58aefebdfe515334f2ffa46be22ef7a4b3a276cb70a27c9e9f5de0a20bad24cbe2b89aee9693c2f8f186ea59fcfc4ebec7188cca0418d4583a6f1730f62416d70cd62555eb4f58ea831d1fea9956a2cba0049f23bf0b249f5de2ce0dc303808d70b0ccab3c7f37e949e", 0xd7}], 0x1, &(0x7f0000000980), 0x0, 0x20004805}, 0x4010) r2 = perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x2367, 0x7fff, 0x1, 0x6, 0x0, 0x78b1, 0x1, 0x0, 0x4992c766, 0xff, 0x81, 0x100, 0x40, 0x3, 0x9, 0x8, 0x1, 0x10000, 0x0, 0x6, 0x90e, 0x9, 0x7ff, 0x0, 0x8, 0x1, 0x30, 0x20, 0x7fffffff, 0x6, 0x401, 0x2, 0x1000, 0x8001, 0x1ff, 0xfffffffffffffff8, 0x0, 0x2, 0x0, @perf_config_ext={0x5, 0x8}, 0x1ab23, 0x3f, 0x8, 0x5, 0x6}, 0xffffffffffffffff, 0x10, r0, 0x1) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0xb, 0x9, &(0x7f0000000580)=@framed={{0x18}, [@map={0x18, 0x0, 0x1, 0x0, r0}, @generic={0x3ff, 0xfffffffffffffffc, 0x1}, @call={0x85, 0x0, 0x0, 0x6}], {0x95}}, &(0x7f0000000600)='syzkaller\x00', 0x0, 0x30, &(0x7f0000000640)=""/48, 0x41f00, 0x1}, 0x48) ioctl$PERF_EVENT_IOC_SET_BPF(r2, 0x40042408, r3) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000000)={&(0x7f0000000080)='./file0/file0\x00'}, 0x10) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000400)=@ax25={0x3, {"02f47b3723e03d"}}, 0x80, &(0x7f00000017c0), 0x0, &(0x7f0000001840)=ANY=[], 0x0, 0x24004044}, 0x4008001) bpf$MAP_CREATE(0x0, &(0x7f0000002cc0)={0x5, 0x100, 0x56c96e7a, 0x2, 0xa, 0xffffffffffffffff, 0x9}, 0x2c) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000480)='rpc_pipefs\x00', 0x200000, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000002d00)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f00000004c0)='vmnet0keyring\x00') bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000780)={&(0x7f0000000740)='./file0/file0\x00', r4}, 0x10) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x40082406, &(0x7f0000000700)='proc!@ppp1!ppp0ppp0#)lo\\lolo{\x00') mount(&(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000200)='fuseblk\x00', 0xa11800, &(0x7f0000000240)) r5 = syz_open_dev$sg(&(0x7f0000000240)='/dev/sg#\x00', 0xfffffffffffffffa, 0x800) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000280)={r5, r3, 0x5, 0x1}, 0x10) ioctl$TIOCCONS(r5, 0x541d) mount(&(0x7f00000002c0)='./file0/file0\x00', &(0x7f0000000300)='./file0/file0\x00', &(0x7f0000000340)='minix\x00', 0x1000, &(0x7f0000000380)) 2018/03/29 17:35:05 executing program 5: 2018/03/29 17:35:05 executing program 6: 2018/03/29 17:35:05 executing program 5: 2018/03/29 17:35:05 executing program 4: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)={0xb, 0x7e, 0x3, 0x1, 0x11}, 0x2c) mount(&(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) r1 = socket$kcm(0x29, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000000bc0)={&(0x7f00000007c0)=@rc={0x1f, {0x5, 0x50000000, 0xaa2, 0x613, 0x4, 0x1ff}, 0x3f}, 0x80, &(0x7f0000000940)=[{&(0x7f0000000840)="09c9453aa30d8c5fba221fa2413f12c580837b2ae292e3ee8dd00098c404125a1a2e63840f82a2f69c3927af43b828422484aaeeceebcbe76e999bd3930c9b7c2995484407f9166e39c2069a88b63a980b9b5ffc880f4b89dde5adae6c7fb84ed98cbac860214dfb0b28d1b2e2d58aefebdfe515334f2ffa46be22ef7a4b3a276cb70a27c9e9f5de0a20bad24cbe2b89aee9693c2f8f186ea59fcfc4ebec7188cca0418d4583a6f1730f62416d70cd62555eb4f58ea831d1fea9956a2cba0049f23bf0b249f5de2ce0dc303808d70b0ccab3c7f37e949e", 0xd7}], 0x1, &(0x7f0000000980), 0x0, 0x20004805}, 0x4010) r2 = perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x2367, 0x7fff, 0x1, 0x6, 0x0, 0x78b1, 0x1, 0x0, 0x4992c766, 0xff, 0x81, 0x100, 0x40, 0x3, 0x9, 0x8, 0x1, 0x10000, 0x0, 0x6, 0x90e, 0x9, 0x7ff, 0x0, 0x8, 0x1, 0x30, 0x20, 0x7fffffff, 0x6, 0x401, 0x2, 0x1000, 0x8001, 0x1ff, 0xfffffffffffffff8, 0x0, 0x2, 0x0, @perf_config_ext={0x5, 0x8}, 0x1ab23, 0x3f, 0x8, 0x5, 0x6}, 0xffffffffffffffff, 0x10, r0, 0x1) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0xb, 0x9, &(0x7f0000000580)=@framed={{0x18}, [@map={0x18, 0x0, 0x1, 0x0, r0}, @generic={0x3ff, 0xfffffffffffffffc, 0x1}, @call={0x85, 0x0, 0x0, 0x6}], {0x95}}, &(0x7f0000000600)='syzkaller\x00', 0x0, 0x30, &(0x7f0000000640)=""/48, 0x41f00, 0x1}, 0x48) ioctl$PERF_EVENT_IOC_SET_BPF(r2, 0x40042408, r3) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000000)={&(0x7f0000000080)='./file0/file0\x00'}, 0x10) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000400)=@ax25={0x3, {"02f47b3723e03d"}}, 0x80, &(0x7f00000017c0), 0x0, &(0x7f0000001840)=ANY=[], 0x0, 0x24004044}, 0x4008001) bpf$MAP_CREATE(0x0, &(0x7f0000002cc0)={0x5, 0x100, 0x56c96e7a, 0x2, 0xa, 0xffffffffffffffff, 0x9}, 0x2c) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000480)='rpc_pipefs\x00', 0x200000, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000002d00)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f00000004c0)='vmnet0keyring\x00') bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000780)={&(0x7f0000000740)='./file0/file0\x00', r4}, 0x10) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x40082406, &(0x7f0000000700)='proc!@ppp1!ppp0ppp0#)lo\\lolo{\x00') mount(&(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000200)='fuseblk\x00', 0xa11800, &(0x7f0000000240)) r5 = syz_open_dev$sg(&(0x7f0000000240)='/dev/sg#\x00', 0xfffffffffffffffa, 0x800) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000280)={r5, r3, 0x5, 0x1}, 0x10) ioctl$TIOCCONS(r5, 0x541d) mount(&(0x7f00000002c0)='./file0/file0\x00', &(0x7f0000000300)='./file0/file0\x00', &(0x7f0000000340)='minix\x00', 0x1000, &(0x7f0000000380)) 2018/03/29 17:35:05 executing program 3: r0 = socket(0xa, 0x2, 0x0) r1 = open(&(0x7f00004b8ff8)='./file0\x00', 0x28042, 0x0) ioctl$KVM_GET_DEBUGREGS(r1, 0x8080aea1, &(0x7f0000000200)) connect$inet6(r0, &(0x7f0000d3cfe4)={0xa, 0x0, 0x0, @mcast2={0xff, 0x2, [], 0x1}, 0x3}, 0x1c) getsockopt$inet6_mtu(r1, 0x29, 0x17, &(0x7f00000000c0), &(0x7f0000000280)=0x4) ioctl$DRM_IOCTL_ADD_CTX(r1, 0xc0086420, &(0x7f0000000000)) ioctl$DRM_IOCTL_NEW_CTX(r1, 0x40086425, &(0x7f0000000080)={0x0, 0x3}) fallocate(r1, 0x6, 0x10003, 0xd) setsockopt$inet6_mtu(0xffffffffffffffff, 0x29, 0x17, &(0x7f0000000100)=0x2, 0x4) fcntl$getflags(r1, 0x0) ioctl$EVIOCGSND(r1, 0x8040451a, &(0x7f0000000140)=""/168) connect$inet(r0, &(0x7f0000000040)={0x2, 0x4e22, @multicast1=0xe0000001}, 0x10) sendfile(r0, r1, &(0x7f00005faff8), 0xfffb) 2018/03/29 17:35:05 executing program 1: 2018/03/29 17:35:05 executing program 5: 2018/03/29 17:35:05 executing program 7: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)={0xb, 0x7e, 0x3, 0x1, 0x11}, 0x2c) mount(&(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) r1 = socket$kcm(0x29, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000000bc0)={&(0x7f00000007c0)=@rc={0x1f, {0x5, 0x50000000, 0xaa2, 0x613, 0x4, 0x1ff}, 0x3f}, 0x80, &(0x7f0000000940)=[{&(0x7f0000000840)="09c9453aa30d8c5fba221fa2413f12c580837b2ae292e3ee8dd00098c404125a1a2e63840f82a2f69c3927af43b828422484aaeeceebcbe76e999bd3930c9b7c2995484407f9166e39c2069a88b63a980b9b5ffc880f4b89dde5adae6c7fb84ed98cbac860214dfb0b28d1b2e2d58aefebdfe515334f2ffa46be22ef7a4b3a276cb70a27c9e9f5de0a20bad24cbe2b89aee9693c2f8f186ea59fcfc4ebec7188cca0418d4583a6f1730f62416d70cd62555eb4f58ea831d1fea9956a2cba0049f23bf0b249f5de2ce0dc303808d70b0ccab3c7f37e949e", 0xd7}], 0x1, &(0x7f0000000980), 0x0, 0x20004805}, 0x4010) r2 = perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x2367, 0x7fff, 0x1, 0x6, 0x0, 0x78b1, 0x1, 0x0, 0x4992c766, 0xff, 0x81, 0x100, 0x40, 0x3, 0x9, 0x8, 0x1, 0x10000, 0x0, 0x6, 0x90e, 0x9, 0x7ff, 0x0, 0x8, 0x1, 0x30, 0x20, 0x7fffffff, 0x6, 0x401, 0x2, 0x1000, 0x8001, 0x1ff, 0xfffffffffffffff8, 0x0, 0x2, 0x0, @perf_config_ext={0x5, 0x8}, 0x1ab23, 0x3f, 0x8, 0x5, 0x6, 0x0, 0x6}, 0xffffffffffffffff, 0x10, r0, 0x1) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0xb, 0x9, &(0x7f0000000580)=@framed={{0x18}, [@map={0x18, 0x0, 0x1, 0x0, r0}, @generic={0x3ff, 0xfffffffffffffffc, 0x1}, @call={0x85, 0x0, 0x0, 0x6}], {0x95}}, &(0x7f0000000600)='syzkaller\x00', 0x0, 0x30, &(0x7f0000000640)=""/48, 0x41f00, 0x1}, 0x48) ioctl$PERF_EVENT_IOC_SET_BPF(r2, 0x40042408, r3) r4 = syz_open_dev$vcsa(&(0x7f0000000240)='/dev/vcsa#\x00', 0x0, 0x800) ioctl$TCSETS(r4, 0x5402, &(0x7f0000000280)={0x2e, 0x2, 0x4, 0x1000, 0x4, 0x8275, 0x101, 0x480000, 0x3, 0x1, 0x1f, 0x1}) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000000)={&(0x7f0000000080)='./file0/file0\x00', r0}, 0x10) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000400)=@ax25={0x3, {"02f47b3723e03d"}}, 0x80, &(0x7f00000017c0), 0x0, &(0x7f0000001840)=ANY=[], 0x0, 0x24004044}, 0x4008001) bpf$MAP_CREATE(0x0, &(0x7f0000002cc0)={0x5, 0x0, 0x56c96e7a, 0x2, 0xa, 0xffffffffffffffff, 0x9}, 0x2c) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000480)='rpc_pipefs\x00', 0x200000, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000002d00)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f00000004c0)='vmnet0keyring\x00') bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000780)={&(0x7f0000000740)='./file0/file0\x00', r5}, 0x10) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x40082406, &(0x7f0000000700)='proc!@ppp1!ppp0ppp0#)lo\\lolo{\x00') mount(&(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000200)='fuseblk\x00', 0xa11800, &(0x7f0000000240)) mount(&(0x7f00000002c0)='./file0/file0\x00', &(0x7f0000000300)='./file0/file0\x00', &(0x7f0000000340)='minix\x00', 0x1000, &(0x7f0000000380)) 2018/03/29 17:35:05 executing program 6: 2018/03/29 17:35:05 executing program 1: 2018/03/29 17:35:05 executing program 5: 2018/03/29 17:35:05 executing program 2: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)={0xb, 0x7e, 0x3, 0x1, 0x11}, 0x2c) mount(&(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) r1 = socket$kcm(0x29, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000000bc0)={&(0x7f00000007c0)=@rc={0x1f, {0x5, 0x50000000, 0xaa2, 0x613, 0x4, 0x1ff}, 0x3f}, 0x80, &(0x7f0000000940)=[{&(0x7f0000000840)="09c9453aa30d8c5fba221fa2413f12c580837b2ae292e3ee8dd00098c404125a1a2e63840f82a2f69c3927af43b828422484aaeeceebcbe76e999bd3930c9b7c2995484407f9166e39c2069a88b63a980b9b5ffc880f4b89dde5adae6c7fb84ed98cbac860214dfb0b28d1b2e2d58aefebdfe515334f2ffa46be22ef7a4b3a276cb70a27c9e9f5de0a20bad24cbe2b89aee9693c2f8f186ea59fcfc4ebec7188cca0418d4583a6f1730f62416d70cd62555eb4f58ea831d1fea9956a2cba0049f23bf0b249f5de2ce0dc303808d70b0ccab3c7f37e949e", 0xd7}], 0x1, &(0x7f0000000980), 0x0, 0x20004805}, 0x4010) r2 = perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x2367, 0x7fff, 0x1, 0x6, 0x0, 0x78b1, 0x1, 0x0, 0x4992c766, 0xff, 0x81, 0x100, 0x40, 0x3, 0x9, 0x8, 0x1, 0x10000, 0x0, 0x6, 0x90e, 0x9, 0x7ff, 0x0, 0x8, 0x1, 0x30, 0x20, 0x7fffffff, 0x6, 0x401, 0x2, 0x1000, 0x8001, 0x1ff, 0xfffffffffffffff8, 0x0, 0x2, 0x0, @perf_config_ext={0x5, 0x8}, 0x1ab23, 0x0, 0x8, 0x5, 0x6, 0x0, 0x6}, 0xffffffffffffffff, 0x10, r0, 0x1) bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0xb, 0x9, &(0x7f0000000580)=@framed={{0x18}, [@map={0x18, 0x0, 0x1, 0x0, r0}, @generic={0x3ff, 0xfffffffffffffffc, 0x1}, @call={0x85, 0x0, 0x0, 0x6}], {0x95}}, &(0x7f0000000600)='syzkaller\x00', 0x0, 0x30, &(0x7f0000000640)=""/48, 0x41f00, 0x1}, 0x48) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000000)={&(0x7f0000000080)='./file0/file0\x00', r0}, 0x10) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000400)=@ax25={0x3, {"02f47b3723e03d"}}, 0x80, &(0x7f00000017c0), 0x0, &(0x7f0000001840)=ANY=[], 0x0, 0x24004044}, 0x4008001) bpf$MAP_CREATE(0x0, &(0x7f0000002cc0)={0x5, 0x0, 0x56c96e7a, 0x2, 0xa, 0xffffffffffffffff, 0x9}, 0x2c) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000480)='rpc_pipefs\x00', 0x200000, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000002d00)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f00000004c0)='vmnet0keyring\x00') openat$vnet(0xffffffffffffff9c, &(0x7f0000000240)='/dev/vhost-net\x00', 0x2, 0x0) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000780)={&(0x7f0000000740)='./file0/file0\x00', r3}, 0x10) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x40082406, &(0x7f0000000700)='proc!@ppp1!ppp0ppp0#)lo\\lolo{\x00') mount(&(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000200)='fuseblk\x00', 0xa11800, &(0x7f0000000240)) mount(&(0x7f00000002c0)='./file0/file0\x00', &(0x7f0000000300)='./file0/file0\x00', &(0x7f0000000340)='minix\x00', 0x1000, &(0x7f0000000380)) 2018/03/29 17:35:05 executing program 0: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)={0xb, 0x7e, 0x3, 0x1, 0x11}, 0x2c) mount(&(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) r1 = socket$kcm(0x29, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000000bc0)={&(0x7f00000007c0)=@rc={0x1f, {0x5, 0x50000000, 0xaa2, 0x613, 0x4, 0x1ff}}, 0x80, &(0x7f0000000940)=[{&(0x7f0000000840)="09c9453aa30d8c5fba221fa2413f12c580837b2ae292e3ee8dd00098c404125a1a2e63840f82a2f69c3927af43b828422484aaeeceebcbe76e999bd3930c9b7c2995484407f9166e39c2069a88b63a980b9b5ffc880f4b89dde5adae6c7fb84ed98cbac860214dfb0b28d1b2e2d58aefebdfe515334f2ffa46be22ef7a4b3a276cb70a27c9e9f5de0a20bad24cbe2b89aee9693c2f8f186ea59fcfc4ebec7188cca0418d4583a6f1730f62416d70cd62555eb4f58ea831d1fea9956a2cba0049f23bf0b249f5de2ce0dc303808d70b0ccab3c7f37e949e", 0xd7}], 0x1, &(0x7f0000000980)}, 0x4010) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0xb, 0x9, &(0x7f0000000240)=ANY=[@ANYBLOB="1800000004f69bff00000000000000000000000018100000", @ANYRES32=r0, @ANYBLOB="0000000000000000fffc0100000000000000000000000000850000000600000000000000000000009500000000000000"], &(0x7f0000000600)='syzkaller\x00', 0x0, 0x30, &(0x7f0000000640)=""/48, 0x41f00, 0x1}, 0x48) ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, r2) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000000)={&(0x7f0000000080)='./file0/file0\x00', r0}, 0x10) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000400)=@ax25={0x3, {"02f47b3723e03d"}}, 0x80, &(0x7f00000017c0), 0x0, &(0x7f0000001840)=ANY=[], 0x0, 0x24004044}, 0x4008001) bpf$MAP_CREATE(0x0, &(0x7f0000002cc0)={0x5, 0x100, 0x56c96e7a, 0x2, 0xd, 0xffffffffffffffff, 0x9}, 0x2c) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000480)='rpc_pipefs\x00', 0x200000, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000002d00)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f00000004c0)='vmnet0keyring\x00') bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000780)={&(0x7f0000000740)='./file0/file0\x00', r3}, 0x10) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, &(0x7f0000000700)='proc!@ppp1!ppp0ppp0#)lo\\lolo{\x00') mount(&(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000200)='fuseblk\x00', 0xa11800, &(0x7f0000000240)) mount(&(0x7f00000002c0)='./file0/file0\x00', &(0x7f0000000300)='./file0/file0\x00', &(0x7f0000000340)='minix\x00', 0x0, &(0x7f0000000380)) 2018/03/29 17:35:05 executing program 6: 2018/03/29 17:35:05 executing program 1: 2018/03/29 17:35:05 executing program 5: 2018/03/29 17:35:05 executing program 3: r0 = socket(0xa, 0x2, 0x0) r1 = open(&(0x7f00004b8ff8)='./file0\x00', 0x28042, 0x0) connect$inet6(r0, &(0x7f0000d3cfe4)={0xa, 0x0, 0x0, @mcast2={0xff, 0x2, [], 0x1}, 0x3}, 0x1c) ioctl$DRM_IOCTL_ADD_CTX(r1, 0xc0086420, &(0x7f0000000000)) ioctl$DRM_IOCTL_NEW_CTX(r1, 0x40086425, &(0x7f0000000080)={0x0, 0x3}) ioctl$SNDRV_TIMER_IOCTL_START(r1, 0x54a0) fallocate(r1, 0x0, 0xffff, 0x1f) setsockopt$inet6_mtu(0xffffffffffffffff, 0x29, 0x17, &(0x7f0000000100)=0x2, 0x4) connect$inet(r0, &(0x7f0000000040)={0x2, 0x4e22, @multicast1=0xe0000001}, 0x10) sendfile(r0, r1, &(0x7f00005faff8), 0xfffb) 2018/03/29 17:35:05 executing program 4: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)={0xb, 0x7e, 0x3, 0x1, 0x11}, 0x2c) mount(&(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) r1 = socket$kcm(0x29, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000000bc0)={&(0x7f00000007c0)=@rc={0x1f, {0x5, 0x50000000, 0xaa2, 0x613, 0x4, 0x1ff}, 0x3f}, 0x80, &(0x7f0000000940)=[{&(0x7f0000000840)="09c9453aa30d8c5fba221fa2413f12c580837b2ae292e3ee8dd00098c404125a1a2e63840f82a2f69c3927af43b828422484aaeeceebcbe76e999bd3930c9b7c2995484407f9166e39c2069a88b63a980b9b5ffc880f4b89dde5adae6c7fb84ed98cbac860214dfb0b28d1b2e2d58aefebdfe515334f2ffa46be22ef7a4b3a276cb70a27c9e9f5de0a20bad24cbe2b89aee9693c2f8f186ea59fcfc4ebec7188cca0418d4583a6f1730f62416d70cd62555eb4f58ea831d1fea9956a2cba0049f23bf0b249f5de2ce0dc303808d70b0ccab3c7f37e949e", 0xd7}], 0x1, &(0x7f0000000980), 0x0, 0x20004805}, 0x4010) r2 = perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x2367, 0x7fff, 0x1, 0x6, 0x0, 0x78b1, 0x1, 0x0, 0x4992c766, 0xff, 0x81, 0x100, 0x40, 0x3, 0x9, 0x8, 0x1, 0x10000, 0x0, 0x6, 0x90e, 0x9, 0x7ff, 0x0, 0x8, 0x1, 0x30, 0x20, 0x7fffffff, 0x6, 0x401, 0x2, 0x1000, 0x8001, 0x1ff, 0xfffffffffffffff8, 0x0, 0x2, 0x0, @perf_config_ext={0x5, 0x8}, 0x1ab23, 0x3f, 0x8, 0x5, 0x6}, 0xffffffffffffffff, 0x10, r0, 0x1) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0xb, 0x9, &(0x7f0000000580)=@framed={{0x18}, [@map={0x18, 0x0, 0x1, 0x0, r0}, @generic={0x3ff, 0xfffffffffffffffc, 0x1}, @call={0x85, 0x0, 0x0, 0x6}], {0x95}}, &(0x7f0000000600)='syzkaller\x00', 0x0, 0x30, &(0x7f0000000640)=""/48, 0x41f00, 0x1}, 0x48) ioctl$PERF_EVENT_IOC_SET_BPF(r2, 0x40042408, r3) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000000)={&(0x7f0000000080)='./file0/file0\x00'}, 0x10) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000400)=@ax25={0x3, {"02f47b3723e03d"}}, 0x80, &(0x7f00000017c0), 0x0, &(0x7f0000001840)=ANY=[], 0x0, 0x24004044}, 0x4008001) bpf$MAP_CREATE(0x0, &(0x7f0000002cc0)={0x5, 0x100, 0x56c96e7a, 0x2, 0xa, 0xffffffffffffffff, 0x9}, 0x2c) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000480)='rpc_pipefs\x00', 0x200000, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000002d00)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f00000004c0)='vmnet0keyring\x00') bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000780)={&(0x7f0000000740)='./file0/file0\x00', r4}, 0x10) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x40082406, &(0x7f0000000700)='proc!@ppp1!ppp0ppp0#)lo\\lolo{\x00') mount(&(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000200)='fuseblk\x00', 0xa11800, &(0x7f0000000240)) r5 = syz_open_dev$sg(&(0x7f0000000240)='/dev/sg#\x00', 0xfffffffffffffffa, 0x800) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000280)={r5, r3, 0x5, 0x1}, 0x10) ioctl$TIOCCONS(r5, 0x541d) mount(&(0x7f00000002c0)='./file0/file0\x00', &(0x7f0000000300)='./file0/file0\x00', &(0x7f0000000340)='minix\x00', 0x1000, &(0x7f0000000380)) 2018/03/29 17:35:06 executing program 6: 2018/03/29 17:35:06 executing program 5: 2018/03/29 17:35:06 executing program 4: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)={0xb, 0x7e, 0x3, 0x1, 0x11}, 0x2c) mount(&(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) r1 = socket$kcm(0x29, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000000bc0)={&(0x7f00000007c0)=@rc={0x1f, {0x5, 0x50000000, 0xaa2, 0x613, 0x4, 0x1ff}, 0x3f}, 0x80, &(0x7f0000000940)=[{&(0x7f0000000840)="09c9453aa30d8c5fba221fa2413f12c580837b2ae292e3ee8dd00098c404125a1a2e63840f82a2f69c3927af43b828422484aaeeceebcbe76e999bd3930c9b7c2995484407f9166e39c2069a88b63a980b9b5ffc880f4b89dde5adae6c7fb84ed98cbac860214dfb0b28d1b2e2d58aefebdfe515334f2ffa46be22ef7a4b3a276cb70a27c9e9f5de0a20bad24cbe2b89aee9693c2f8f186ea59fcfc4ebec7188cca0418d4583a6f1730f62416d70cd62555eb4f58ea831d1fea9956a2cba0049f23bf0b249f5de2ce0dc303808d70b0ccab3c7f37e949e", 0xd7}], 0x1, &(0x7f0000000980), 0x0, 0x20004805}, 0x4010) r2 = perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x2367, 0x7fff, 0x1, 0x6, 0x0, 0x78b1, 0x1, 0x0, 0x4992c766, 0xff, 0x81, 0x100, 0x40, 0x3, 0x9, 0x8, 0x1, 0x10000, 0x0, 0x6, 0x90e, 0x9, 0x7ff, 0x0, 0x8, 0x1, 0x30, 0x20, 0x7fffffff, 0x6, 0x401, 0x2, 0x1000, 0x8001, 0x1ff, 0xfffffffffffffff8, 0x0, 0x2, 0x0, @perf_config_ext={0x5, 0x8}, 0x1ab23, 0x3f, 0x8, 0x5, 0x6}, 0xffffffffffffffff, 0x10, r0, 0x1) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0xb, 0x9, &(0x7f0000000580)=@framed={{0x18}, [@map={0x18, 0x0, 0x1, 0x0, r0}, @generic={0x3ff, 0xfffffffffffffffc, 0x1}, @call={0x85, 0x0, 0x0, 0x6}], {0x95}}, &(0x7f0000000600)='syzkaller\x00', 0x0, 0x30, &(0x7f0000000640)=""/48, 0x41f00, 0x1}, 0x48) ioctl$PERF_EVENT_IOC_SET_BPF(r2, 0x40042408, r3) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000000)={&(0x7f0000000080)='./file0/file0\x00', r0}, 0x10) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000400)=@ax25={0x3, {"02f47b3723e03d"}}, 0x80, &(0x7f00000017c0), 0x0, &(0x7f0000001840)=ANY=[]}, 0x4008001) bpf$MAP_CREATE(0x0, &(0x7f0000002cc0)={0x5, 0x100, 0x56c96e7a, 0x2, 0xa, 0xffffffffffffffff, 0x9}, 0x2c) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000480)='rpc_pipefs\x00', 0x200000, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000002d00)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f00000004c0)='vmnet0keyring\x00') bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000780)={&(0x7f0000000740)='./file0/file0\x00', r4}, 0x10) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x40082406, &(0x7f0000000700)='proc!@ppp1!ppp0ppp0#)lo\\lolo{\x00') mount(&(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000200)='fuseblk\x00', 0xa11800, &(0x7f0000000240)) r5 = syz_open_dev$sg(&(0x7f0000000240)='/dev/sg#\x00', 0xfffffffffffffffa, 0x800) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000280)={r5, r3, 0x5, 0x1}, 0x10) ioctl$TIOCCONS(r5, 0x541d) mount(&(0x7f00000002c0)='./file0/file0\x00', &(0x7f0000000300)='./file0/file0\x00', &(0x7f0000000340)='minix\x00', 0x1000, &(0x7f0000000380)) 2018/03/29 17:35:06 executing program 2: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)={0xb, 0x7e, 0x3, 0x1, 0x11}, 0x2c) mount(&(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) r1 = socket$kcm(0x29, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000000bc0)={&(0x7f00000007c0)=@rc={0x1f, {0x5, 0x50000000, 0xaa2, 0x613, 0x4, 0x1ff}, 0x3f}, 0x80, &(0x7f0000000940)=[{&(0x7f0000000840)="09c9453aa30d8c5fba221fa2413f12c580837b2ae292e3ee8dd00098c404125a1a2e63840f82a2f69c3927af43b828422484aaeeceebcbe76e999bd3930c9b7c2995484407f9166e39c2069a88b63a980b9b5ffc880f4b89dde5adae6c7fb84ed98cbac860214dfb0b28d1b2e2d58aefebdfe515334f2ffa46be22ef7a4b3a276cb70a27c9e9f5de0a20bad24cbe2b89aee9693c2f8f186ea59fcfc4ebec7188cca0418d4583a6f1730f62416d70cd62555eb4f58ea831d1fea9956a2cba0049f23bf0b249f5de2ce0dc303808d70b0ccab3c7f37e949e", 0xd7}], 0x1, &(0x7f0000000980), 0x0, 0x20004805}, 0x4010) r2 = perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x2367, 0x7fff, 0x1, 0x6, 0x0, 0x78b1, 0x1, 0x0, 0x4992c766, 0xff, 0x81, 0x100, 0x40, 0x3, 0x9, 0x8, 0x1, 0x10000, 0x0, 0x6, 0x90e, 0x9, 0x7ff, 0x0, 0x8, 0x1, 0x30, 0x20, 0x7fffffff, 0x6, 0x401, 0x2, 0x1000, 0x8001, 0x1ff, 0xfffffffffffffff8, 0x0, 0x2, 0x0, @perf_config_ext={0x5, 0x8}, 0x1ab23, 0x0, 0x8, 0x5, 0x6, 0x0, 0x6}, 0xffffffffffffffff, 0x10, r0, 0x1) bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0xb, 0x9, &(0x7f0000000580)=@framed={{0x18}, [@map={0x18, 0x0, 0x1, 0x0, r0}, @generic={0x3ff, 0xfffffffffffffffc, 0x1}, @call={0x85, 0x0, 0x0, 0x6}], {0x95}}, &(0x7f0000000600)='syzkaller\x00', 0x0, 0x30, &(0x7f0000000640)=""/48, 0x41f00, 0x1}, 0x48) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000000)={&(0x7f0000000080)='./file0/file0\x00', r0}, 0x10) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000400)=@ax25={0x3, {"02f47b3723e03d"}}, 0x80, &(0x7f00000017c0), 0x0, &(0x7f0000001840)=ANY=[], 0x0, 0x24004044}, 0x4008001) bpf$MAP_CREATE(0x0, &(0x7f0000002cc0)={0x5, 0x0, 0x56c96e7a, 0x2, 0xa, 0xffffffffffffffff, 0x9}, 0x2c) r3 = syz_open_dev$mice(&(0x7f0000000240)='/dev/input/mice\x00', 0x0, 0x400) ioctl$DRM_IOCTL_GET_UNIQUE(r3, 0xc0106401, &(0x7f0000000280)={0x53, &(0x7f0000000980)=""/83}) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000480)='rpc_pipefs\x00', 0x200000, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000002d00)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f00000004c0)='vmnet0keyring\x00') bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000780)={&(0x7f0000000740)='./file0/file0\x00', r4}, 0x10) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x40082406, &(0x7f0000000700)='proc!@ppp1!ppp0ppp0#)lo\\lolo{\x00') mount(&(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000200)='fuseblk\x00', 0xa11800, &(0x7f0000000240)) mount(&(0x7f00000002c0)='./file0/file0\x00', &(0x7f0000000300)='./file0/file0\x00', &(0x7f0000000340)='minix\x00', 0x1000, &(0x7f0000000380)) 2018/03/29 17:35:06 executing program 1: 2018/03/29 17:35:06 executing program 7: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)={0xb, 0x7e, 0x3, 0x1, 0x11}, 0x2c) mount(&(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) r1 = syz_open_dev$sndmidi(&(0x7f0000000240)='/dev/snd/midiC#D#\x00', 0x1ff, 0x400000) r2 = syz_open_dev$mice(&(0x7f0000000280)='/dev/input/mice\x00', 0x0, 0x200) r3 = syz_open_dev$sg(&(0x7f0000000980)='/dev/sg#\x00', 0x2495, 0x20000) ioctl$sock_kcm_SIOCKCMATTACH(r1, 0x89e0, &(0x7f00000009c0)={r2, r3}) r4 = socket$kcm(0x29, 0x2, 0x0) sendmsg$kcm(r4, &(0x7f0000000bc0)={&(0x7f00000007c0)=@rc={0x1f, {0x5, 0x50000000, 0xaa2, 0x613, 0x4, 0x1ff}, 0x3f}, 0x80, &(0x7f0000000940)=[{&(0x7f0000000840)="09c9453aa30d8c5fba221fa2413f12c580837b2ae292e3ee8dd00098c404125a1a2e63840f82a2f69c3927af43b828422484aaeeceebcbe76e999bd3930c9b7c2995484407f9166e39c2069a88b63a980b9b5ffc880f4b89dde5adae6c7fb84ed98cbac860214dfb0b28d1b2e2d58aefebdfe515334f2ffa46be22ef7a4b3a276cb70a27c9e9f5de0a20bad24cbe2b89aee9693c2f8f186ea59fcfc4ebec7188cca0418d4583a6f1730f62416d70cd62555eb4f58ea831d1fea9956a2cba0049f23bf0b249f5de2ce0dc303808d70b0ccab3c7f37e949e", 0xd7}], 0x1, &(0x7f0000000980), 0x0, 0x20004805}, 0x4010) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r2, 0x84, 0x64, &(0x7f0000000a00)=[@in6={0xa, 0x4e20, 0x80000000, @mcast2={0xff, 0x2, [], 0x1}, 0x1}, @in6={0xa, 0x4e24, 0x9, @remote={0xfe, 0x80, [], 0xbb}, 0x7c}], 0x38) r5 = perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x2367, 0x7fff, 0x1, 0x6, 0x0, 0x78b1, 0x1, 0x0, 0x4992c766, 0xff, 0x81, 0x100, 0x40, 0x3, 0x9, 0x8, 0x1, 0x10000, 0x0, 0x6, 0x90e, 0x9, 0x7ff, 0x0, 0x8, 0x1, 0x30, 0x20, 0x7fffffff, 0x6, 0x401, 0x2, 0x1000, 0x8001, 0x1ff, 0xfffffffffffffff8, 0x0, 0x2, 0x0, @perf_config_ext={0x5, 0x8}, 0x1ab23, 0x3f, 0x8, 0x5, 0x6, 0x0, 0x6}, 0xffffffffffffffff, 0x10, r0, 0x1) r6 = bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0xb, 0x9, &(0x7f0000000580)=@framed={{0x18}, [@map={0x18, 0x0, 0x1, 0x0, r0}, @generic={0x3ff, 0xfffffffffffffffc, 0x1}, @call={0x85, 0x0, 0x0, 0x6}], {0x95}}, &(0x7f0000000600)='syzkaller\x00', 0x0, 0x30, &(0x7f0000000640)=""/48, 0x41f00, 0x1}, 0x48) ioctl$PERF_EVENT_IOC_SET_BPF(r5, 0x40042408, r6) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000000)={&(0x7f0000000080)='./file0/file0\x00', r0}, 0x10) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000400)=@ax25={0x3, {"02f47b3723e03d"}}, 0x80, &(0x7f00000017c0), 0x0, &(0x7f0000001840)=ANY=[], 0x0, 0x24004044}, 0x4008001) bpf$MAP_CREATE(0x0, &(0x7f0000002cc0)={0x5, 0x0, 0x56c96e7a, 0x2, 0xa, 0xffffffffffffffff, 0x9}, 0x2c) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000480)='rpc_pipefs\x00', 0x200000, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000002d00)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f00000004c0)='vmnet0keyring\x00') bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000780)={&(0x7f0000000740)='./file0/file0\x00', r7}, 0x10) ioctl$PERF_EVENT_IOC_SET_FILTER(r5, 0x40082406, &(0x7f0000000700)='proc!@ppp1!ppp0ppp0#)lo\\lolo{\x00') mount(&(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000200)='fuseblk\x00', 0xa11800, &(0x7f0000000240)) mount(&(0x7f00000002c0)='./file0/file0\x00', &(0x7f0000000300)='./file0/file0\x00', &(0x7f0000000340)='minix\x00', 0x1000, &(0x7f0000000380)) 2018/03/29 17:35:06 executing program 3: r0 = socket(0xa, 0x2, 0x0) r1 = open(&(0x7f00004b8ff8)='./file0\x00', 0x28042, 0x0) connect$inet6(r0, &(0x7f0000d3cfe4)={0xa, 0x0, 0x0, @mcast2={0xff, 0x2, [], 0x1}, 0x3}, 0x1c) ioctl$DRM_IOCTL_ADD_CTX(r1, 0xc0086420, &(0x7f0000000000)) ioctl$DRM_IOCTL_NEW_CTX(r1, 0x40086425, &(0x7f0000000080)={0x0, 0x3}) fallocate(r1, 0x0, 0xffff, 0x1f) setsockopt$inet6_mtu(0xffffffffffffffff, 0x29, 0x17, &(0x7f0000000100)=0x2, 0x4) connect$inet(r0, &(0x7f0000000040)={0x2, 0x4e22, @multicast1=0xe0000001}, 0x10) sendfile(r0, r1, &(0x7f00005faff8), 0xfffb) creat(&(0x7f00000000c0)='./file0\x00', 0x1) 2018/03/29 17:35:06 executing program 0: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)={0xb, 0x7e, 0x3, 0x1, 0x11}, 0x2c) r1 = dup(r0) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_PORT(r1, 0xc0a85352, &(0x7f0000000980)={{0x6}, 'port0\x00', 0xd0, 0x800, 0x3, 0x8000, 0x10000, 0x1, 0x800, 0x0, 0x7, 0x60}) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup.cpu\x00', 0x200002, 0x0) mount(&(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) r2 = socket$kcm(0x29, 0x2, 0x0) sendmsg$kcm(r2, &(0x7f0000000bc0)={&(0x7f00000007c0)=@rc={0x1f, {0x5, 0x50000000, 0xaa2, 0x613, 0x4, 0x1ff}}, 0x80, &(0x7f0000000940)=[{&(0x7f0000000840)="09c9453aa30d8c5fba221fa2413f12c580837b2ae292e3ee8dd00098c404125a1a2e63840f82a2f69c3927af43b828422484aaeeceebcbe76e999bd3930c9b7c2995484407f9166e39c2069a88b63a980b9b5ffc880f4b89dde5adae6c7fb84ed98cbac860214dfb0b28d1b2e2d58aefebdfe515334f2ffa46be22ef7a4b3a276cb70a27c9e9f5de0a20bad24cbe2b89aee9693c2f8f186ea59fcfc4ebec7188cca0418d4583a6f1730f62416d70cd62555eb4f58ea831d1fea9956a2cba0049f23bf0b249f5de2ce0dc303808d70b0ccab3c7f37e949e", 0xd7}], 0x1, &(0x7f0000000980)}, 0x4010) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0xb, 0x9, &(0x7f0000000580)=@framed={{0x18}, [@map={0x18, 0x0, 0x1, 0x0, r0}, @generic={0x3ff, 0xfffffffffffffffc, 0x1}, @call={0x85, 0x0, 0x0, 0x6}], {0x95}}, &(0x7f0000000600)='syzkaller\x00', 0x0, 0x30, &(0x7f0000000640)=""/48, 0x41f00, 0x1}, 0x48) ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, r3) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000000)={&(0x7f0000000080)='./file0/file0\x00', r0}, 0x10) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000400)=@ax25={0x3, {"02f47b3723e03d"}}, 0x80, &(0x7f00000017c0), 0x0, &(0x7f0000001840)=ANY=[], 0x0, 0x24004044}, 0x4008001) bpf$MAP_CREATE(0x0, &(0x7f0000002cc0)={0x5, 0x100, 0x56c96e7a, 0x2, 0xa, 0xffffffffffffffff, 0x9}, 0x2c) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000480)='rpc_pipefs\x00', 0x200000, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000002d00)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f00000004c0)='vmnet0keyring\x00') bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000780)={&(0x7f0000000740)='./file0/file0\x00', r4}, 0x10) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, &(0x7f0000000700)='proc!@ppp1!ppp0ppp0#)lo\\lolo{\x00') mount(&(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000200)='fuseblk\x00', 0xa11800, &(0x7f0000000240)) mount(&(0x7f00000002c0)='./file0/file0\x00', &(0x7f0000000300)='./file0/file0\x00', &(0x7f0000000340)='minix\x00', 0x0, &(0x7f0000000380)) 2018/03/29 17:35:06 executing program 5: 2018/03/29 17:35:06 executing program 6: 2018/03/29 17:35:06 executing program 6: 2018/03/29 17:35:06 executing program 1: 2018/03/29 17:35:06 executing program 5: r0 = socket$inet6_udp(0xa, 0x2, 0x0) r1 = perf_event_open(&(0x7f0000940000)={0x2, 0x78, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mq_timedreceive(r1, &(0x7f00000002c0)=""/15, 0xf, 0x5, &(0x7f0000000380)={0x77359400}) r2 = fcntl$dupfd(r0, 0x0, r1) setsockopt$inet_sctp6_SCTP_RECVNXTINFO(r2, 0x84, 0x21, &(0x7f0000000080)=0x300000000000000, 0x4) r3 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_group_source_req(r3, 0x29, 0x2e, &(0x7f0000001000)={0x1, {{0xa, 0x4e20, 0x0, @mcast2={0xff, 0x2, [], 0x1}}}, {{0xa, 0x4e20, 0x0, @loopback={0x0, 0x1}}}}, 0x108) r4 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000240)='IPVS\x00') sendmsg$IPVS_CMD_SET_INFO(r2, &(0x7f0000000300)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0xffffffffffffffff}, 0xfffffffffffffe5e, &(0x7f0000000340)={&(0x7f0000000280)={0x28, r4, 0x9, 0x70bd25, 0x25dfdbfe, {0xe}, [@IPVS_CMD_ATTR_DAEMON={0x14, 0x3, [@IPVS_DAEMON_ATTR_SYNC_MAXLEN={0x8, 0x4, 0x5470}, @IPVS_DAEMON_ATTR_STATE={0x8, 0x1}]}]}, 0x28}, 0x1, 0x0, 0x0, 0x10}, 0x20004840) writev(r1, &(0x7f0000000180)=[{&(0x7f00000000c0)="1e5b7b1d30859a82aa0b7eb4ad6ebf0634b21e3b0fbbf9b86bbbf64f4ca8d1e3f171e7ec690d308028b3b56716", 0x2d}], 0x1) setsockopt$IP_VS_SO_SET_STARTDAEMON(r2, 0x0, 0x48b, &(0x7f0000000100)={0x2, 'lo\x00', 0x3}, 0x18) ioctl$sock_ifreq(r3, 0x8922, &(0x7f0000000400)={'lo\x00', @ifru_ivalue}) r5 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000440)='/dev/rtc\x00', 0x10000, 0x0) r6 = socket$nl_generic(0x10, 0x3, 0x10) getsockopt$inet_mreqn(r5, 0x0, 0x27, &(0x7f00000001c0)={@multicast1}, &(0x7f0000000200)=0xfffffffffffffcc3) setsockopt$netlink_NETLINK_BROADCAST_ERROR(r6, 0x10e, 0x4, &(0x7f0000000000)=0x5, 0x4) 2018/03/29 17:35:06 executing program 1: r0 = socket(0xa, 0x2, 0x0) flock(0xffffffffffffffff, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000200)) setsockopt$inet_sctp_SCTP_STREAM_SCHEDULER(0xffffffffffffffff, 0x84, 0x7b, &(0x7f0000000400), 0x3ba) sendto$inet(r0, &(0x7f0000509f92), 0xff77, 0x8000, &(0x7f000055fff0)={0x2, 0x4e23, @loopback=0x7f000001}, 0x10) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000b00)='./cgroup.cpu\x00', 0x200002, 0x0) setsockopt$inet_mreq(r0, 0x0, 0x27, &(0x7f0000000480)={@empty, @remote={0xac, 0x14, 0x14, 0xbb}}, 0x8) fchdir(r1) fstat(0xffffffffffffffff, &(0x7f0000000180)) bind$inet(0xffffffffffffffff, &(0x7f0000000440)={0x2, 0x0, @multicast1=0xe0000001}, 0x10) r2 = creat(&(0x7f0000000100)='./file1\x00', 0x0) fallocate(r2, 0x1, 0x0, 0x20004d2d) ioctl$DRM_IOCTL_SET_VERSION(0xffffffffffffffff, 0xc0106407, &(0x7f00000000c0)={0x0, 0x2}) socket$inet6_icmp(0xa, 0x2, 0x3a) sendmsg$inet_sctp(r0, &(0x7f000050dfc8)={&(0x7f0000000840)=@in6={0xa, 0x4e24, 0x0, @mcast1={0xff, 0x1, [], 0x1}}, 0x1c, &(0x7f00000005c0), 0x0, &(0x7f0000576000)}, 0x0) ioctl$EVIOCGPROP(0xffffffffffffffff, 0x80404509, &(0x7f00000003c0)=""/25) getsockopt$inet_sctp6_SCTP_GET_LOCAL_ADDRS(r1, 0x84, 0x6d, &(0x7f00000002c0)={0x0, 0x7e, "147b31a6c8d04526e5f78a8fe27845051f555f699446cd55da4ba6fc8873a807fa51bb4eab22c5df774cd217b3b2c0af891a34aae4b6aa2b7e16f7b4fd5dcc91ee95c14977580183e86a5e903258265c96396582cadd0075864a1d1b58c4036a1ea7b763df062b4b66c882ba9442bac3b9b6d420938dca4b48c863fb4acd"}, &(0x7f0000000240)=0x86) setsockopt$inet_sctp_SCTP_DEFAULT_PRINFO(0xffffffffffffffff, 0x84, 0x72, &(0x7f0000000380)={r3, 0x10000, 0x30}, 0xc) sendto$inet6(r0, &(0x7f0000000240), 0x0, 0x0, &(0x7f0000000280)={0xa, 0x4e23, 0x3, @local={0xfe, 0x80, [], 0xaa}, 0x9}, 0x1c) getpeername$packet(0xffffffffffffffff, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @broadcast}, &(0x7f0000000a00)=0x14) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000000)={{{@in=@multicast2, @in6=@dev}}, {{@in=@multicast1}, 0x0, @in6=@ipv4={[], [], @remote}}}, &(0x7f0000000140)=0xe8) 2018/03/29 17:35:06 executing program 6: r0 = socket(0xa, 0x2, 0x0) flock(0xffffffffffffffff, 0x6) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000200)) setsockopt$inet_sctp_SCTP_STREAM_SCHEDULER(0xffffffffffffffff, 0x84, 0x7b, &(0x7f0000000400), 0x3ba) sendto$inet(r0, &(0x7f0000509f92), 0xff77, 0x0, &(0x7f000055fff0)={0x2, 0x4e23, @loopback=0x7f000001}, 0x10) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000b00)='./cgroup.cpu\x00', 0x200002, 0x0) setsockopt$inet_mreq(r0, 0x0, 0x27, &(0x7f0000000480)={@empty, @remote={0xac, 0x14, 0x14, 0xbb}}, 0x8) fchdir(r1) fstat(0xffffffffffffffff, &(0x7f0000000180)) bind$inet(0xffffffffffffffff, &(0x7f0000000440)={0x2, 0x0, @multicast1=0xe0000001}, 0x10) r2 = creat(&(0x7f0000000100)='./file1\x00', 0x0) fallocate(r2, 0x1, 0x0, 0x20004d2d) ioctl$DRM_IOCTL_SET_VERSION(0xffffffffffffffff, 0xc0106407, &(0x7f00000000c0)={0x0, 0x2}) socket$inet6_icmp(0xa, 0x2, 0x3a) sendmsg$inet_sctp(r0, &(0x7f000050dfc8)={&(0x7f0000000840)=@in6={0xa, 0x4e24, 0x80000001, @mcast1={0xff, 0x1, [], 0x1}}, 0x1c, &(0x7f00000005c0), 0x0, &(0x7f0000576000)}, 0x0) ioctl$EVIOCGPROP(0xffffffffffffffff, 0x80404509, &(0x7f00000003c0)=""/25) getsockopt$inet_sctp6_SCTP_GET_LOCAL_ADDRS(r1, 0x84, 0x6d, &(0x7f00000002c0)={0x0, 0x7e, "147b31a6c8d04526e5f78a8fe27845051f555f699446cd55da4ba6fc8873a807fa51bb4eab22c5df774cd217b3b2c0af891a34aae4b6aa2b7e16f7b4fd5dcc91ee95c14977580183e86a5e903258265c96396582cadd0075864a1d1b58c4036a1ea7b763df062b4b66c882ba9442bac3b9b6d420938dca4b48c863fb4acd"}, &(0x7f0000000240)=0x86) setsockopt$inet_sctp_SCTP_DEFAULT_PRINFO(0xffffffffffffffff, 0x84, 0x72, &(0x7f0000000380)={r3, 0x10000, 0x30}, 0xc) sendto$inet6(r0, &(0x7f0000000240), 0x0, 0x0, &(0x7f0000000280)={0xa, 0x4e23, 0x3, @local={0xfe, 0x80, [], 0xaa}, 0x9}, 0x1c) getpeername$packet(0xffffffffffffffff, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @broadcast}, &(0x7f0000000a00)=0x14) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000000)={{{@in=@multicast2, @in6=@dev}}, {{@in=@multicast1}, 0x0, @in6=@ipv4={[], [], @remote}}}, &(0x7f0000000140)=0xe8) 2018/03/29 17:35:06 executing program 2: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)={0xb, 0x7e, 0x3, 0x1, 0x11}, 0x2c) mount(&(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) r1 = socket$kcm(0x29, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000000bc0)={&(0x7f00000007c0)=@rc={0x1f, {0x5, 0x50000000, 0xaa2, 0x613, 0x4, 0x1ff}, 0x3f}, 0x80, &(0x7f0000000940)=[{&(0x7f0000000840)="09c9453aa30d8c5fba221fa2413f12c580837b2ae292e3ee8dd00098c404125a1a2e63840f82a2f69c3927af43b828422484aaeeceebcbe76e999bd3930c9b7c2995484407f9166e39c2069a88b63a980b9b5ffc880f4b89dde5adae6c7fb84ed98cbac860214dfb0b28d1b2e2d58aefebdfe515334f2ffa46be22ef7a4b3a276cb70a27c9e9f5de0a20bad24cbe2b89aee9693c2f8f186ea59fcfc4ebec7188cca0418d4583a6f1730f62416d70cd62555eb4f58ea831d1fea9956a2cba0049f23bf0b249f5de2ce0dc303808d70b0ccab3c7f37e949e", 0xd7}], 0x1, &(0x7f0000000980), 0x0, 0x20004805}, 0x4010) r2 = perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x2367, 0x7fff, 0x1, 0x6, 0x0, 0x78b1, 0x1, 0x0, 0x4992c766, 0xff, 0x81, 0x100, 0x40, 0x3, 0x9, 0x8, 0x1, 0x10000, 0x0, 0x6, 0x90e, 0x9, 0x7ff, 0x0, 0x8, 0x1, 0x30, 0x20, 0x7fffffff, 0x6, 0x401, 0x2, 0x1000, 0x8001, 0x1ff, 0xfffffffffffffff8, 0x0, 0x2, 0x0, @perf_config_ext={0x5, 0x8}, 0x1ab23, 0x0, 0x8, 0x5, 0x6, 0x0, 0x6}, 0xffffffffffffffff, 0x10, r0, 0x1) bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0xb, 0x9, &(0x7f0000000580)=@framed={{0x18}, [@map={0x18, 0x0, 0x1, 0x0, r0}, @generic={0x3ff, 0xfffffffffffffffc, 0x1}, @call={0x85, 0x0, 0x0, 0x6}], {0x95}}, &(0x7f0000000600)='syzkaller\x00', 0x0, 0x30, &(0x7f0000000640)=""/48, 0x41f00, 0x1}, 0x48) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000000)={&(0x7f0000000080)='./file0/file0\x00', r0}, 0x10) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000400)=@ax25={0x3, {"02f47b3723e03d"}}, 0x80, &(0x7f00000017c0), 0x0, &(0x7f0000001840)=ANY=[], 0x0, 0x24004044}, 0x4008001) bpf$MAP_CREATE(0x0, &(0x7f0000002cc0)={0x5, 0x0, 0x56c96e7a, 0x2, 0xa, 0xffffffffffffffff, 0x9}, 0x2c) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000480)='rpc_pipefs\x00', 0x200000, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000002d00)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x40082406, &(0x7f0000000280)='(-\x00') bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000780)={&(0x7f0000000740)='./file0/file0\x00', r3}, 0x10) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x40082406, &(0x7f0000000700)='proc!@ppp1!ppp0ppp0#)lo\\lolo{\x00') mount(&(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000200)='fuseblk\x00', 0xa11800, &(0x7f0000000240)) mount(&(0x7f00000002c0)='./file0/file0\x00', &(0x7f0000000300)='./file0/file0\x00', &(0x7f0000000340)='minix\x00', 0x1000, &(0x7f0000000380)) 2018/03/29 17:35:06 executing program 3: r0 = socket(0xa, 0x5, 0x0) r1 = open(&(0x7f00004b8ff8)='./file0\x00', 0x28042, 0x0) connect$inet6(r0, &(0x7f0000d3cfe4)={0xa, 0x0, 0x0, @mcast2={0xff, 0x2, [], 0x1}, 0x3}, 0x1c) ioctl$DRM_IOCTL_ADD_CTX(r1, 0xc0086420, &(0x7f0000000000)) ioctl$DRM_IOCTL_NEW_CTX(r1, 0x40086425, &(0x7f0000000080)={0x0, 0x3}) ioctl$VT_GETSTATE(r1, 0x5603, &(0x7f00000000c0)={0x101, 0x5351, 0x3f000}) fallocate(r1, 0x0, 0xffff, 0x1f) setsockopt$inet6_mtu(0xffffffffffffffff, 0x29, 0x17, &(0x7f0000000100)=0x2, 0x4) connect$inet(r0, &(0x7f0000000040)={0x2, 0x4e22, @multicast1=0xe0000001}, 0x10) sendfile(r0, r1, &(0x7f00005faff8), 0xfffb) 2018/03/29 17:35:06 executing program 7: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)={0xb, 0x7e, 0x3, 0x1, 0x11}, 0x2c) mount(&(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) r1 = socket$kcm(0x29, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000000bc0)={&(0x7f00000007c0)=@rc={0x1f, {0x5, 0x50000000, 0xaa2, 0x613, 0x4, 0x1ff}, 0x3f}, 0x80, &(0x7f0000000940)=[{&(0x7f0000000840)="09c9453aa30d8c5fba221fa2413f12c580837b2ae292e3ee8dd00098c404125a1a2e63840f82a2f69c3927af43b828422484aaeeceebcbe76e999bd3930c9b7c2995484407f9166e39c2069a88b63a980b9b5ffc880f4b89dde5adae6c7fb84ed98cbac860214dfb0b28d1b2e2d58aefebdfe515334f2ffa46be22ef7a4b3a276cb70a27c9e9f5de0a20bad24cbe2b89aee9693c2f8f186ea59fcfc4ebec7188cca0418d4583a6f1730f62416d70cd62555eb4f58ea831d1fea9956a2cba0049f23bf0b249f5de2ce0dc303808d70b0ccab3c7f37e949e", 0xd7}], 0x1, &(0x7f0000000980), 0x0, 0x20004805}, 0x4010) r2 = perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x2367, 0x7fff, 0x1, 0x6, 0x0, 0x78b1, 0x1, 0x0, 0x4992c766, 0xff, 0x81, 0x100, 0x40, 0x3, 0x9, 0x8, 0x1, 0x10000, 0x0, 0x6, 0x90e, 0x9, 0x7ff, 0x0, 0x8, 0x1, 0x30, 0x20, 0x7fffffff, 0x6, 0x401, 0x2, 0x1000, 0x8001, 0x1ff, 0xfffffffffffffff8, 0x0, 0x2, 0x0, @perf_config_ext={0x5, 0x8}, 0x1ab23, 0x3f, 0x8, 0x5, 0x6, 0x0, 0x6}, 0xffffffffffffffff, 0x10, r0, 0x1) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0xb, 0x9, &(0x7f0000000580)=@framed={{0x18}, [@map={0x18, 0x0, 0x1, 0x0, r0}, @generic={0x3ff, 0xfffffffffffffffc, 0x1}, @call={0x85, 0x0, 0x0, 0x6}], {0x95}}, &(0x7f0000000600)='syzkaller\x00', 0x0, 0x30, &(0x7f0000000640)=""/48, 0x41f00, 0x1}, 0x48) ioctl$PERF_EVENT_IOC_SET_BPF(r2, 0x40042408, r3) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000000)={&(0x7f0000000080)='./file0/file0\x00', r0}, 0x10) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000400)=@ax25={0x3, {"02f47b3723e03d"}}, 0x80, &(0x7f00000017c0), 0x0, &(0x7f0000001840)=ANY=[], 0x0, 0x24004044}, 0x4008001) bpf$MAP_CREATE(0x0, &(0x7f0000002cc0)={0x5, 0x0, 0x56c96e7a, 0x2, 0xa, 0xffffffffffffffff, 0x9}, 0x2c) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000480)='rpc_pipefs\x00', 0x200000, 0x0) r4 = memfd_create(&(0x7f0000000240)='eth1em0.selfeth1\x00', 0x1) r5 = openat(0xffffffffffffffff, &(0x7f0000000280)='./file0/file0\x00', 0x10100, 0x117) syz_kvm_setup_cpu$x86(r4, r5, &(0x7f0000fe5000/0x18000)=nil, &(0x7f0000000a00)=[@textreal={0x8, &(0x7f0000000980)="3e643e660fd9d7baf80c66b8d0cb5e8366efbafc0cb80000ef1e2eca05000f38013a66b94a06000066b88100000066ba000000000f30660ff3d8c7465800a00fc79a008067f2af", 0x47}], 0x1, 0x11, &(0x7f0000000a40)=[@cr0={0x0, 0x1}, @cr4={0x1, 0x4008}], 0x2) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000002d00)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f00000004c0)='vmnet0keyring\x00') bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000780)={&(0x7f0000000740)='./file0/file0\x00', r6}, 0x10) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x40082406, &(0x7f0000000700)='proc!@ppp1!ppp0ppp0#)lo\\lolo{\x00') mount(&(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000200)='fuseblk\x00', 0xa11800, &(0x7f0000000240)) mount(&(0x7f00000002c0)='./file0/file0\x00', &(0x7f0000000300)='./file0/file0\x00', &(0x7f0000000340)='minix\x00', 0x1000, &(0x7f0000000380)) [ 284.110707] IPVS: sync thread started: state = BACKUP, mcast_ifn = lo, syncid = 3, id = 0 2018/03/29 17:35:06 executing program 5: mkdir(&(0x7f000082f000)='./control\x00', 0x0) mmap(&(0x7f0000011000/0x2000)=nil, 0x2000, 0x1, 0x32, 0xffffffffffffffff, 0x0) r0 = userfaultfd(0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000e4c000)={0xaa}) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f00000003c0)={0x0, 0x0}, &(0x7f0000000400)=0xc) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000440)) r2 = accept4$ax25(0xffffffffffffff9c, &(0x7f0000000380), &(0x7f0000000480)=0x10, 0x80000) fcntl$addseals(r0, 0x409, 0x1) fcntl$getown(0xffffffffffffffff, 0x9) ioctl$TIOCGSID(0xffffffffffffff9c, 0x5429, &(0x7f0000000300)) r3 = syz_open_procfs(0x0, &(0x7f0000000040)="2f65786500000000000090d8b75e67e16b394342abb5158df87ea8984e79c93df7498b2b34796068700e29fbd789f9a031f23e16c96e30baed2961953b057f7a3222943acc4b8cfa4de553f8276731ddeb811efd44ea011e1a0db9074a28a826c88566b89c57cc3cca4aec41d37fa27c8daa19030d03139d0aea71d509d9a20ba7deceb656cc1308d9d1f111b6bd1595486f55e229923be4ed8cbfb78e86280b4cacf386bfa8840afb312a4c520a03b27f805d181bd09ea208931a36e888060a2d") syz_extract_tcp_res$synack(&(0x7f00000004c0), 0x1, 0x0) ioctl$DRM_IOCTL_WAIT_VBLANK(0xffffffffffffffff, 0xc018643a, &(0x7f0000000500)={0x10000000, 0x363, 0x3}) fsetxattr(r3, &(0x7f0000000140)=@known='user.syz\x00', &(0x7f0000000180)="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", 0x137, 0x0) fremovexattr(r3, &(0x7f0000000000)=@known='user.syz\x00') ioctl$DRM_IOCTL_GET_CAP(0xffffffffffffffff, 0xc010640c, &(0x7f0000000340)={0x9}) r4 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000580)='IPVS\x00') sendmsg$IPVS_CMD_GET_INFO(r2, &(0x7f0000000700)={&(0x7f0000000540)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f00000006c0)={&(0x7f00000005c0)={0xc0, r4, 0xa10, 0x70bd2d, 0x25dfdbff, {0xf}, [@IPVS_CMD_ATTR_SERVICE={0x38, 0x1, [@IPVS_SVC_ATTR_AF={0x8, 0x1}, @IPVS_SVC_ATTR_AF={0x8, 0x1, 0xa}, @IPVS_SVC_ATTR_NETMASK={0x8, 0x9, 0x32}, @IPVS_SVC_ATTR_NETMASK={0x8, 0x9, 0x41}, @IPVS_SVC_ATTR_FLAGS={0xc, 0x7, {0x8}}, @IPVS_SVC_ATTR_PROTOCOL={0x8, 0x2, 0x21}]}, @IPVS_CMD_ATTR_DAEMON={0x18, 0x3, [@IPVS_DAEMON_ATTR_MCAST_GROUP6={0x14, 0x6}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0x80f}, @IPVS_CMD_ATTR_SERVICE={0x1c, 0x1, [@IPVS_SVC_ATTR_PE_NAME={0x8, 0xb, 'sip\x00'}, @IPVS_SVC_ATTR_FWMARK={0x8, 0x5, 0x3}, @IPVS_SVC_ATTR_TIMEOUT={0x8, 0x8}]}, @IPVS_CMD_ATTR_DAEMON={0x38, 0x3, [@IPVS_DAEMON_ATTR_STATE={0x8, 0x1}, @IPVS_DAEMON_ATTR_MCAST_GROUP6={0x14, 0x6, @mcast2={0xff, 0x2, [], 0x1}}, @IPVS_DAEMON_ATTR_SYNC_MAXLEN={0x8, 0x4, 0x40}, @IPVS_DAEMON_ATTR_MCAST_PORT={0x8, 0x7, 0x4e22}, @IPVS_DAEMON_ATTR_SYNC_MAXLEN={0x8, 0x4, 0x2}]}]}, 0xc0}, 0x1, 0x0, 0x0, 0x80}, 0x40000) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f00000002c0)) creat(&(0x7f0000000000)='./control/file0\x00', 0x0) write$sndseq(0xffffffffffffffff, &(0x7f0000011fd2)=[{0x0, 0x0, 0x0, 0x0, @time, {}, {}, @time=@time={0x77359400}}], 0x30) rename(&(0x7f0000000240)='./control/file0\x00', &(0x7f00000001c0)='./file0\x00') syz_fuse_mount(&(0x7f0000000080)='./file0\x00', 0x0, r1, 0x0, 0x0, 0x0) 2018/03/29 17:35:06 executing program 4: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)={0xb, 0x7e, 0x3, 0x1, 0x11}, 0x2c) mount(&(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) r1 = socket$kcm(0x29, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000000bc0)={&(0x7f00000007c0)=@rc={0x1f, {0x5, 0x50000000, 0xaa2, 0x613, 0x4, 0x1ff}, 0x3f}, 0x80, &(0x7f0000000940)=[{&(0x7f0000000840)="09c9453aa30d8c5fba221fa2413f12c580837b2ae292e3ee8dd00098c404125a1a2e63840f82a2f69c3927af43b828422484aaeeceebcbe76e999bd3930c9b7c2995484407f9166e39c2069a88b63a980b9b5ffc880f4b89dde5adae6c7fb84ed98cbac860214dfb0b28d1b2e2d58aefebdfe515334f2ffa46be22ef7a4b3a276cb70a27c9e9f5de0a20bad24cbe2b89aee9693c2f8f186ea59fcfc4ebec7188cca0418d4583a6f1730f62416d70cd62555eb4f58ea831d1fea9956a2cba0049f23bf0b249f5de2ce0dc303808d70b0ccab3c7f37e949e", 0xd7}], 0x1, &(0x7f0000000980), 0x0, 0x20004805}, 0x4010) r2 = perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x2367, 0x7fff, 0x1, 0x6, 0x0, 0x78b1, 0x1, 0x0, 0x4992c766, 0xff, 0x81, 0x100, 0x40, 0x3, 0x9, 0x8, 0x1, 0x10000, 0x0, 0x6, 0x90e, 0x9, 0x7ff, 0x0, 0x8, 0x1, 0x30, 0x20, 0x7fffffff, 0x6, 0x401, 0x2, 0x1000, 0x8001, 0x1ff, 0xfffffffffffffff8, 0x0, 0x2, 0x0, @perf_config_ext={0x5, 0x8}, 0x1ab23, 0x3f, 0x8, 0x5, 0x6}, 0xffffffffffffffff, 0x10, r0, 0x1) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0xb, 0x9, &(0x7f0000000580)=@framed={{0x18}, [@map={0x18, 0x0, 0x1, 0x0, r0}, @generic={0x3ff, 0xfffffffffffffffc, 0x1}, @call={0x85, 0x0, 0x0, 0x6}], {0x95}}, &(0x7f0000000600)='syzkaller\x00', 0x0, 0x30, &(0x7f0000000640)=""/48, 0x41f00, 0x1}, 0x48) ioctl$PERF_EVENT_IOC_SET_BPF(r2, 0x40042408, r3) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000000)={&(0x7f0000000080)='./file0/file0\x00', r0}, 0x10) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000400)=@ax25={0x3, {"02f47b3723e03d"}}, 0x80, &(0x7f00000017c0), 0x0, &(0x7f0000001840)=ANY=[]}, 0x4008001) bpf$MAP_CREATE(0x0, &(0x7f0000002cc0)={0x5, 0x100, 0x56c96e7a, 0x2, 0xa, 0xffffffffffffffff, 0x9}, 0x2c) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000480)='rpc_pipefs\x00', 0x200000, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000002d00)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f00000004c0)='vmnet0keyring\x00') bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000780)={&(0x7f0000000740)='./file0/file0\x00', r4}, 0x10) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x40082406, &(0x7f0000000700)='proc!@ppp1!ppp0ppp0#)lo\\lolo{\x00') mount(&(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000200)='fuseblk\x00', 0xa11800, &(0x7f0000000240)) r5 = syz_open_dev$sg(&(0x7f0000000240)='/dev/sg#\x00', 0xfffffffffffffffa, 0x800) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000280)={r5, r3, 0x5, 0x1}, 0x10) ioctl$TIOCCONS(r5, 0x541d) mount(&(0x7f00000002c0)='./file0/file0\x00', &(0x7f0000000300)='./file0/file0\x00', &(0x7f0000000340)='minix\x00', 0x1000, &(0x7f0000000380)) 2018/03/29 17:35:06 executing program 0: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r0 = openat$audio(0xffffffffffffff9c, &(0x7f0000000240)='/dev/audio\x00', 0x10000, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000280)='cpu.stat\x00', 0x0, 0x0) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)={0xf, 0x7e, 0x3, 0x0, 0x11, r1}, 0x2c) mount(&(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) r3 = socket$kcm(0x29, 0x2, 0x0) sendmsg$kcm(r3, &(0x7f0000000bc0)={&(0x7f00000007c0)=@rc={0x1f, {0x5, 0x50000000, 0xaa2, 0x613, 0x4, 0x1ff}}, 0x80, &(0x7f0000000940)=[{&(0x7f0000000840)="09c9453aa30d8c5fba221fa2413f12c580837b2ae292e3ee8dd00098c404125a1a2e63840f82a2f69c3927af43b828422484aaeeceebcbe76e999bd3930c9b7c2995484407f9166e39c2069a88b63a980b9b5ffc880f4b89dde5adae6c7fb84ed98cbac860214dfb0b28d1b2e2d58aefebdfe515334f2ffa46be22ef7a4b3a276cb70a27c9e9f5de0a20bad24cbe2b89aee9693c2f8f186ea59fcfc4ebec7188cca0418d4583a6f1730f62416d70cd62555eb4f58ea831d1fea9956a2cba0049f23bf0b249f5de2ce0dc303808d70b0ccab3c7f37e949e", 0xd7}], 0x1, &(0x7f0000000980)}, 0x4010) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0xb, 0x9, &(0x7f0000000580)=@framed={{0x18}, [@map={0x18, 0x0, 0x1, 0x0, r2}, @generic={0x3ff, 0xfffffffffffffffc, 0x1}, @call={0x85, 0x0, 0x0, 0x6}], {0x95}}, &(0x7f0000000600)='syzkaller\x00', 0x0, 0x30, &(0x7f0000000640)=""/48, 0x41f00, 0x1}, 0x48) setsockopt$inet_sctp6_SCTP_ADAPTATION_LAYER(r0, 0x84, 0x7, &(0x7f0000000500)={0x2}, 0x4) ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, r4) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000000)={&(0x7f0000000080)='./file0/file0\x00', r2}, 0x10) sendmsg$kcm(r3, &(0x7f0000000980)={&(0x7f0000000400)=@ax25={0x3, {"02f47b3723e03d"}}, 0x3e, &(0x7f0000000540), 0x0, &(0x7f0000000ac0)=ANY=[], 0xffffffffffffffaf, 0x4}, 0x4008001) bpf$MAP_CREATE(0x0, &(0x7f0000002cc0)={0x5, 0x100, 0x56c96e7a, 0x2, 0xa, 0xffffffffffffffff, 0x9}, 0x2c) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000480)='rpc_pipefs\x00', 0x200000, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f00000009c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x40082406, &(0x7f00000004c0)='vmnet0keyring\x00') bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000780)={&(0x7f0000000740)='./file0/file0\x00', r5}, 0x10) setsockopt$IP_VS_SO_SET_DELDEST(r0, 0x0, 0x488, &(0x7f0000000a00)={{0x5e, @remote={0xac, 0x14, 0x14, 0xbb}, 0x4e23, 0x2, 'lc\x00', 0x30, 0x1000, 0x7d}, {@empty, 0x4e21, 0x0, 0x5, 0x81, 0x6}}, 0x44) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, &(0x7f0000000700)='proc!@ppp1!ppp0ppp0#)lo\\lolo{\x00') mount(&(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000200)='fuseblk\x00', 0xa11800, &(0x7f0000000240)) mount(&(0x7f00000002c0)='./file0/file0\x00', &(0x7f0000000300)='./file0/file0\x00', &(0x7f0000000340)='minix\x00', 0x0, &(0x7f0000000380)) 2018/03/29 17:35:06 executing program 3: r0 = socket(0xa, 0x2, 0x0) r1 = open(&(0x7f00004b8ff8)='./file0\x00', 0x28042, 0x0) connect$inet6(r0, &(0x7f0000d3cfe4)={0xa, 0x0, 0x0, @mcast2={0xff, 0x2, [], 0x1}, 0x3}, 0x1c) ioctl$DRM_IOCTL_ADD_CTX(r1, 0xc0086420, &(0x7f0000000000)) ioctl$DRM_IOCTL_NEW_CTX(r1, 0x40086425, &(0x7f0000000080)={0x0, 0x3}) fallocate(r1, 0x0, 0xffff, 0x1f) r2 = msgget$private(0x0, 0x400) msgctl$IPC_INFO(r2, 0x3, &(0x7f0000000140)=""/188) setsockopt$inet6_mtu(0xffffffffffffffff, 0x29, 0x17, &(0x7f0000000100)=0x2, 0x4) connect$inet(r0, &(0x7f0000000040)={0x2, 0x4e22, @multicast1=0xe0000001}, 0x10) sendfile(r0, r1, &(0x7f00005faff8), 0xfffb) 2018/03/29 17:35:06 executing program 1: r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff7fffffffffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = getpgrp(0xffffffffffffffff) r2 = syz_open_procfs(r1, &(0x7f00000000c0)='stat\x00') ioctl$sock_inet_SIOCSIFBRDADDR(r2, 0x891a, &(0x7f00000008c0)={'ip6tnl0\x00', {0x2, 0x4e23, @multicast1=0xe0000001}}) sendfile(r2, r2, &(0x7f0000000040)=0xffffffff77fffffe, 0x5) getresuid(&(0x7f0000000480), &(0x7f00000004c0), &(0x7f0000000500)) stat(&(0x7f0000000540)='./file0\x00', &(0x7f0000000580)) geteuid() stat(&(0x7f0000000600)='./file0\x00', &(0x7f0000000640)) stat(&(0x7f00000006c0)='./file0\x00', &(0x7f0000000700)) getegid() stat(&(0x7f0000000780)='./file0\x00', &(0x7f00000007c0)) getgid() getuid() fstat(r2, &(0x7f0000000840)) sendmsg$unix(0xffffffffffffffff, &(0x7f00000009c0)={&(0x7f0000000100)=@abs={0x1, 0x0, 0x4e23}, 0x6e, &(0x7f0000000440)=[{&(0x7f0000000180)="f5dc941f4dc3cd9adc57ae91e3dd4343d2d34a84526e7cc2dced527b17e9f844324330a6c4fc95075fc39479fc730a76e14b1c7e042182b78b54fd1112d5d88e0463edf0b527bc60eef252342942a7d15f5dbf3a13deeaef54e8a875bd6393929f9f520c496c5643e469d505dd150b595920", 0x72}], 0x1, &(0x7f0000000ac0)=ANY=[@ANYBLOB="1800000001000000020000", @ANYBLOB="180000000100000002", @ANYBLOB="1800000001000200000000003b807f0af037927569073608982ff4048a7ecfa7a1c67509e2d123a2b26f36835b10059f7a10eb109d87fc6064da955f7e7f205180a40f55cbeb36713ac27eb87fbecffcbff26a930baf2e9c2ef6884dac58f0a50bb630", @ANYBLOB="300000000100000001000000", @ANYRES32=r2, @ANYRES32=r2, @ANYRES32=r2, @ANYRES32=r2, @ANYRES32=r0, @ANYRES32=r0, @ANYRES32=r2, @ANYRES32=r0], 0xa3, 0x91}, 0x24008000) getresgid(&(0x7f0000000a00), &(0x7f0000000a40), &(0x7f0000000a80)) 2018/03/29 17:35:06 executing program 2: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)={0xb, 0x7e, 0x3, 0x1, 0x11}, 0x2c) mount(&(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) r1 = socket$kcm(0x29, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000000bc0)={&(0x7f00000007c0)=@rc={0x1f, {0x5, 0x50000000, 0xaa2, 0x613, 0x4, 0x1ff}, 0x3f}, 0x80, &(0x7f0000000940)=[{&(0x7f0000000840)="09c9453aa30d8c5fba221fa2413f12c580837b2ae292e3ee8dd00098c404125a1a2e63840f82a2f69c3927af43b828422484aaeeceebcbe76e999bd3930c9b7c2995484407f9166e39c2069a88b63a980b9b5ffc880f4b89dde5adae6c7fb84ed98cbac860214dfb0b28d1b2e2d58aefebdfe515334f2ffa46be22ef7a4b3a276cb70a27c9e9f5de0a20bad24cbe2b89aee9693c2f8f186ea59fcfc4ebec7188cca0418d4583a6f1730f62416d70cd62555eb4f58ea831d1fea9956a2cba0049f23bf0b249f5de2ce0dc303808d70b0ccab3c7f37e949e", 0xd7}], 0x1, &(0x7f0000000980), 0x0, 0x20004805}, 0x4010) r2 = perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x2367, 0x7fff, 0x1, 0x6, 0x0, 0x78b1, 0x1, 0x0, 0x4992c766, 0xff, 0x81, 0x100, 0x40, 0x3, 0x9, 0x8, 0x1, 0x10000, 0x0, 0x6, 0x90e, 0x9, 0x7ff, 0x0, 0x8, 0x1, 0x30, 0x20, 0x7fffffff, 0x6, 0x401, 0x2, 0x1000, 0x8001, 0x1ff, 0xfffffffffffffff8, 0x0, 0x2, 0x0, @perf_config_ext={0x5, 0x8}, 0x1ab23, 0x0, 0x8, 0x5, 0x6, 0x0, 0x6}, 0xffffffffffffffff, 0x10, r0, 0x1) bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0xb, 0x9, &(0x7f0000000240)=ANY=[@ANYBLOB="18007ef20100b453274e000018100000", @ANYRES32=r0, @ANYBLOB="000000000000fffc01000000000000000070904d06533e38d2da8bd00f3f24a8d3f1bf2c47864c1bd92483567795d5d567edccc79a70e30000000000000000000000000000000000"], &(0x7f0000000600)='syzkaller\x00', 0x0, 0x30, &(0x7f0000000640)=""/48, 0x41f00, 0x1}, 0x48) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000000)={&(0x7f0000000080)='./file0/file0\x00', r0}, 0x10) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000400)=@ax25={0x3, {"02f47b3723e03d"}}, 0x80, &(0x7f00000017c0), 0x0, &(0x7f0000001840)=ANY=[], 0x0, 0x24004044}, 0x4008001) bpf$MAP_CREATE(0x0, &(0x7f0000002cc0)={0x5, 0x0, 0x56c96e7a, 0x2, 0xa, 0xffffffffffffffff, 0x9}, 0x2c) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000480)='rpc_pipefs\x00', 0x200000, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000002d00)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f00000004c0)='vmnet0keyring\x00') bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000780)={&(0x7f0000000740)='./file0/file0\x00', r3}, 0x10) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x40082406, &(0x7f0000000700)='proc!@ppp1!ppp0ppp0#)lo\\lolo{\x00') mount(&(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000200)='fuseblk\x00', 0xa11800, &(0x7f0000000240)) mount(&(0x7f00000002c0)='./file0/file0\x00', &(0x7f0000000300)='./file0/file0\x00', &(0x7f0000000340)='minix\x00', 0x1000, &(0x7f0000000380)) 2018/03/29 17:35:06 executing program 4: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)={0xb, 0x7e, 0x3, 0x1, 0x11}, 0x2c) mount(&(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) r1 = socket$kcm(0x29, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000000bc0)={&(0x7f00000007c0)=@rc={0x1f, {0x5, 0x50000000, 0xaa2, 0x613, 0x4, 0x1ff}, 0x3f}, 0x80, &(0x7f0000000940)=[{&(0x7f0000000840)="09c9453aa30d8c5fba221fa2413f12c580837b2ae292e3ee8dd00098c404125a1a2e63840f82a2f69c3927af43b828422484aaeeceebcbe76e999bd3930c9b7c2995484407f9166e39c2069a88b63a980b9b5ffc880f4b89dde5adae6c7fb84ed98cbac860214dfb0b28d1b2e2d58aefebdfe515334f2ffa46be22ef7a4b3a276cb70a27c9e9f5de0a20bad24cbe2b89aee9693c2f8f186ea59fcfc4ebec7188cca0418d4583a6f1730f62416d70cd62555eb4f58ea831d1fea9956a2cba0049f23bf0b249f5de2ce0dc303808d70b0ccab3c7f37e949e", 0xd7}], 0x1, &(0x7f0000000980), 0x0, 0x20004805}, 0x4010) r2 = perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x2367, 0x7fff, 0x1, 0x6, 0x0, 0x78b1, 0x1, 0x0, 0x4992c766, 0xff, 0x81, 0x100, 0x40, 0x3, 0x9, 0x8, 0x1, 0x10000, 0x0, 0x6, 0x90e, 0x9, 0x7ff, 0x0, 0x8, 0x1, 0x30, 0x20, 0x7fffffff, 0x6, 0x401, 0x2, 0x1000, 0x8001, 0x1ff, 0xfffffffffffffff8, 0x0, 0x2, 0x0, @perf_config_ext={0x5, 0x8}, 0x1ab23, 0x3f, 0x8, 0x5, 0x6}, 0xffffffffffffffff, 0x10, r0, 0x1) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0xb, 0x9, &(0x7f0000000580)=@framed={{0x18}, [@map={0x18, 0x0, 0x1, 0x0, r0}, @generic={0x3ff, 0xfffffffffffffffc, 0x1}, @call={0x85, 0x0, 0x0, 0x6}], {0x95}}, &(0x7f0000000600)='syzkaller\x00', 0x0, 0x30, &(0x7f0000000640)=""/48, 0x41f00, 0x1}, 0x48) ioctl$PERF_EVENT_IOC_SET_BPF(r2, 0x40042408, r3) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000000)={&(0x7f0000000080)='./file0/file0\x00', r0}, 0x10) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000400)=@ax25={0x3, {"02f47b3723e03d"}}, 0x80, &(0x7f00000017c0), 0x0, &(0x7f0000001840)=ANY=[]}, 0x4008001) bpf$MAP_CREATE(0x0, &(0x7f0000002cc0)={0x5, 0x100, 0x56c96e7a, 0x2, 0xa, 0xffffffffffffffff, 0x9}, 0x2c) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000480)='rpc_pipefs\x00', 0x200000, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000002d00)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f00000004c0)='vmnet0keyring\x00') bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000780)={&(0x7f0000000740)='./file0/file0\x00', r4}, 0x10) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x40082406, &(0x7f0000000700)='proc!@ppp1!ppp0ppp0#)lo\\lolo{\x00') mount(&(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000200)='fuseblk\x00', 0xa11800, &(0x7f0000000240)) r5 = syz_open_dev$sg(&(0x7f0000000240)='/dev/sg#\x00', 0xfffffffffffffffa, 0x800) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000280)={r5, r3, 0x5, 0x1}, 0x10) ioctl$TIOCCONS(r5, 0x541d) mount(&(0x7f00000002c0)='./file0/file0\x00', &(0x7f0000000300)='./file0/file0\x00', &(0x7f0000000340)='minix\x00', 0x1000, &(0x7f0000000380)) 2018/03/29 17:35:06 executing program 6: r0 = socket(0xa, 0x2, 0x0) r1 = open(&(0x7f00004b8ff8)='./file0\x00', 0x28042, 0x0) connect$inet6(r0, &(0x7f0000d3cfe4)={0xa, 0x0, 0x0, @mcast2={0xff, 0x2, [], 0x1}, 0x3}, 0x1c) ioctl$DRM_IOCTL_ADD_CTX(r1, 0xc0086420, &(0x7f0000000000)) ioctl$DRM_IOCTL_NEW_CTX(r1, 0x40086425, &(0x7f0000000080)={0x0, 0x3}) ioctl$SNDRV_TIMER_IOCTL_START(r1, 0x54a0) fallocate(r1, 0x0, 0xffff, 0x1f) setsockopt$inet6_mtu(0xffffffffffffffff, 0x29, 0x17, &(0x7f0000000100)=0x2, 0x4) connect$inet(r0, &(0x7f0000000040)={0x2, 0x4e22, @multicast1=0xe0000001}, 0x10) sendfile(r0, r1, &(0x7f00005faff8), 0xfffb) 2018/03/29 17:35:06 executing program 5: r0 = socket(0xa, 0x2, 0x0) r1 = open(&(0x7f0000000200)='./file0\x00', 0x28042, 0x0) connect$inet6(r0, &(0x7f0000d3cfe4)={0xa, 0x0, 0x0, @mcast2={0xff, 0x2, [], 0x1}, 0x3}, 0x1c) ioctl$DRM_IOCTL_ADD_CTX(r1, 0xc0086420, &(0x7f0000000000)) r2 = request_key(&(0x7f00000000c0)='ceph\x00', &(0x7f0000000140)={0x73, 0x79, 0x7a, 0x3}, &(0x7f0000000180)="6d696d655f7479706525d17b00", 0xfffffffffffffffe) keyctl$invalidate(0x15, r2) ioctl$DRM_IOCTL_NEW_CTX(r1, 0x40086425, &(0x7f0000000080)={0x0, 0x3}) fallocate(r1, 0x0, 0xffff, 0x1f) setsockopt$inet6_mtu(0xffffffffffffffff, 0x29, 0x17, &(0x7f0000000100)=0x2, 0x3) connect$inet(r0, &(0x7f0000000040)={0x2, 0x4e22, @multicast1=0xe0000001}, 0x10) sendfile(r0, r1, &(0x7f00000001c0), 0xfffa) 2018/03/29 17:35:06 executing program 3: r0 = socket(0xa, 0x2, 0x0) r1 = open(&(0x7f00004b8ff8)='./file0\x00', 0x28042, 0x0) connect$inet6(r0, &(0x7f0000d3cfe4)={0xa, 0x0, 0x0, @mcast2={0xff, 0x2, [], 0x1}, 0x3}, 0x1c) getsockopt$inet_sctp6_SCTP_PR_SUPPORTED(r0, 0x84, 0x71, &(0x7f00000000c0)={0x0, 0x8}, &(0x7f0000000140)=0x8) setsockopt$inet_sctp6_SCTP_RECONFIG_SUPPORTED(r1, 0x84, 0x75, &(0x7f0000000180)={r2, 0xffffffff}, 0x8) ioctl$DRM_IOCTL_ADD_CTX(r1, 0xc0086420, &(0x7f0000000000)) ioctl$DRM_IOCTL_NEW_CTX(r1, 0x40086425, &(0x7f0000000080)={0x0, 0x3}) fallocate(r1, 0x0, 0xffff, 0x1f) setsockopt$inet6_mtu(0xffffffffffffffff, 0x29, 0x17, &(0x7f0000000100)=0x2, 0x4) connect$inet(r0, &(0x7f0000000040)={0x2, 0x4e22, @multicast1=0xe0000001}, 0x10) sendfile(r0, r1, &(0x7f00005faff8), 0xfffb) 2018/03/29 17:35:06 executing program 6: r0 = socket(0xa, 0x2, 0x0) r1 = open(&(0x7f00004b8ff8)='./file0\x00', 0x28042, 0x0) connect$inet6(r0, &(0x7f0000d3cfe4)={0xa, 0x0, 0x0, @mcast2={0xff, 0x2, [], 0x1}, 0x3}, 0x1c) ioctl$DRM_IOCTL_ADD_CTX(r1, 0xc0086420, &(0x7f0000000000)) ioctl$DRM_IOCTL_NEW_CTX(r1, 0x40086425, &(0x7f0000000080)={0x0, 0x3}) ioctl$SNDRV_TIMER_IOCTL_START(r1, 0x54a0) fallocate(r1, 0x0, 0xffff, 0x1f) setsockopt$inet6_mtu(0xffffffffffffffff, 0x29, 0x17, &(0x7f0000000100)=0x2, 0x4) connect$inet(r0, &(0x7f0000000040)={0x2, 0x4e22, @multicast1=0xe0000001}, 0x10) sendfile(r0, r1, &(0x7f00005faff8), 0xfffb) 2018/03/29 17:35:06 executing program 7: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)={0xb, 0x7e, 0x3, 0x1, 0x11}, 0x2c) mount(&(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) r1 = socket$kcm(0x29, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000000bc0)={&(0x7f00000007c0)=@rc={0x1f, {0x5, 0x50000000, 0xaa2, 0x613, 0x4, 0x1ff}, 0x3f}, 0x80, &(0x7f0000000940)=[{&(0x7f0000000840)="09c9453aa30d8c5fba221fa2413f12c580837b2ae292e3ee8dd00098c404125a1a2e63840f82a2f69c3927af43b828422484aaeeceebcbe76e999bd3930c9b7c2995484407f9166e39c2069a88b63a980b9b5ffc880f4b89dde5adae6c7fb84ed98cbac860214dfb0b28d1b2e2d58aefebdfe515334f2ffa46be22ef7a4b3a276cb70a27c9e9f5de0a20bad24cbe2b89aee9693c2f8f186ea59fcfc4ebec7188cca0418d4583a6f1730f62416d70cd62555eb4f58ea831d1fea9956a2cba0049f23bf0b249f5de2ce0dc303808d70b0ccab3c7f37e949e", 0xd7}], 0x1, &(0x7f0000000980), 0x0, 0x20004805}, 0x4010) r2 = perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x2367, 0x7fff, 0x1, 0x6, 0x0, 0x78b1, 0x1, 0x0, 0x4992c766, 0xff, 0x81, 0x100, 0x40, 0x3, 0x9, 0x8, 0x1, 0x10000, 0x0, 0x6, 0x90e, 0x9, 0x7ff, 0x0, 0x8, 0x1, 0x30, 0x20, 0x7fffffff, 0x6, 0x401, 0x2, 0x1000, 0x8001, 0x1ff, 0xfffffffffffffff8, 0x0, 0x2, 0x0, @perf_config_ext={0x5, 0x8}, 0x1ab23, 0x3f, 0x8, 0x5, 0x6, 0x0, 0x6}, 0xffffffffffffffff, 0x10, r0, 0x1) r3 = syz_open_dev$dmmidi(&(0x7f0000000280)='/dev/dmmidi#\x00', 0xfffffffffffffff8, 0x4000) ioctl$DRM_IOCTL_GET_UNIQUE(r3, 0xc0106401, &(0x7f0000000a00)={0x5b, &(0x7f0000000980)=""/91}) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0xb, 0x9, &(0x7f0000000580)=@framed={{0x18}, [@map={0x18, 0x0, 0x1, 0x0, r0}, @generic={0x3ff, 0xfffffffffffffffc, 0x1}, @call={0x85, 0x0, 0x0, 0x6}], {0x95}}, &(0x7f0000000600)='syzkaller\x00', 0x0, 0x30, &(0x7f0000000640)=""/48, 0x41f00, 0x1}, 0x48) ioctl$PERF_EVENT_IOC_SET_BPF(r2, 0x40042408, r4) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000000)={&(0x7f0000000080)='./file0/file0\x00', r0}, 0x10) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000400)=@ax25={0x3, {"02f47b3723e03d"}}, 0x80, &(0x7f00000017c0), 0x0, &(0x7f0000001840)=ANY=[], 0x0, 0x24004044}, 0x4008001) bpf$MAP_CREATE(0x0, &(0x7f0000002cc0)={0x5, 0x0, 0x56c96e7a, 0x2, 0xa, 0xffffffffffffffff, 0x9}, 0x2c) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000480)='rpc_pipefs\x00', 0x200000, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000002d00)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f00000004c0)='vmnet0keyring\x00') bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000780)={&(0x7f0000000740)='./file0/file0\x00', r5}, 0x10) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x40082406, &(0x7f0000000700)='proc!@ppp1!ppp0ppp0#)lo\\lolo{\x00') mount(&(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000200)='fuseblk\x00', 0xa11800, &(0x7f0000000240)) setsockopt$inet_sctp_SCTP_FRAGMENT_INTERLEAVE(r2, 0x84, 0x12, &(0x7f0000000240)=0xfffffffffffffffc, 0x4) mount(&(0x7f00000002c0)='./file0/file0\x00', &(0x7f0000000300)='./file0/file0\x00', &(0x7f0000000340)='minix\x00', 0x1000, &(0x7f0000000380)) 2018/03/29 17:35:06 executing program 1: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)={0xb, 0x7e, 0x3, 0x1, 0x11}, 0x2c) mount(&(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) r1 = socket$kcm(0x29, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000000bc0)={&(0x7f00000007c0)=@rc={0x1f, {0x5, 0x50000000, 0xaa2, 0x613, 0x4, 0x1ff}, 0x3f}, 0x80, &(0x7f0000000940)=[{&(0x7f0000000840)="09c9453aa30d8c5fba221fa2413f12c580837b2ae292e3ee8dd00098c404125a1a2e63840f82a2f69c3927af43b828422484aaeeceebcbe76e999bd3930c9b7c2995484407f9166e39c2069a88b63a980b9b5ffc880f4b89dde5adae6c7fb84ed98cbac860214dfb0b28d1b2e2d58aefebdfe515334f2ffa46be22ef7a4b3a276cb70a27c9e9f5de0a20bad24cbe2b89aee9693c2f8f186ea59fcfc4ebec7188cca0418d4583a6f1730f62416d70cd62555eb4f58ea831d1fea9956a2cba0049f23bf0b249f5de2ce0dc303808d70b0ccab3c7f37e949e", 0xd7}], 0x1, &(0x7f0000000980), 0x0, 0x20004805}, 0x4010) r2 = perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x2367, 0x7fff, 0x1, 0x6, 0x0, 0x78b1, 0x1, 0x0, 0x4992c766, 0xff, 0x81, 0x100, 0x40, 0x3, 0x9, 0x8, 0x1, 0x10000, 0x0, 0x6, 0x90e, 0x9, 0x7ff, 0x0, 0x8, 0x1, 0x30, 0x20, 0x7fffffff, 0x6, 0x401, 0x2, 0x1000, 0x8001, 0x1ff, 0xfffffffffffffff8, 0x0, 0x2, 0x0, @perf_config_ext={0x5, 0x8}, 0x1ab23, 0x3f, 0x8, 0x5, 0x6, 0x0, 0x6}, 0xffffffffffffffff, 0x10, r0, 0x1) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0xb, 0x9, &(0x7f0000000240)=ANY=[@ANYBLOB="18000000010000000000000000000000181000008d6f4e3b9be57c255ede900edd6ee8ae7d1dbc0052d943a4c292691ef4461733ad5998b81ee17770a297c79fe1721e9d3935eec2dd8fa469", @ANYRES32=r0, @ANYBLOB="0000000000000000fffc0100000000000000000000000000850000000600000000000000000000009500000000000000"], &(0x7f0000000600)='syzkaller\x00', 0x0, 0x30, &(0x7f0000000640)=""/48, 0x41f00, 0x1}, 0x48) ioctl$PERF_EVENT_IOC_SET_BPF(r2, 0x40042408, r3) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000000)={&(0x7f0000000080)='./file0/file0\x00', r0}, 0x10) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000400)=@ax25={0x3, {"02f47b3723e03d"}}, 0x80, &(0x7f00000017c0), 0x0, &(0x7f0000001840)=ANY=[], 0x0, 0x24004044}, 0x4008001) bpf$MAP_CREATE(0x0, &(0x7f0000002cc0)={0x5, 0x0, 0x56c96e7a, 0x2, 0xa, 0xffffffffffffffff, 0x9}, 0x2c) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000480)='rpc_pipefs\x00', 0x200000, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000002d00)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f00000004c0)='vmnet0keyring\x00') bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000780)={&(0x7f0000000740)='./file0/file0\x00', r4}, 0x10) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x40082406, &(0x7f0000000700)='proc!@ppp1!ppp0ppp0#)lo\\lolo{\x00') mount(&(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000200)='fuseblk\x00', 0xa11800, &(0x7f0000000240)) mount(&(0x7f00000002c0)='./file0/file0\x00', &(0x7f0000000300)='./file0/file0\x00', &(0x7f0000000340)='minix\x00', 0x1000, &(0x7f0000000380)) 2018/03/29 17:35:06 executing program 4: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)={0xb, 0x7e, 0x3, 0x1, 0x11}, 0x2c) mount(&(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) r1 = socket$kcm(0x29, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000000bc0)={&(0x7f00000007c0)=@rc={0x1f, {0x5, 0x50000000, 0xaa2, 0x613, 0x4, 0x1ff}, 0x3f}, 0x80, &(0x7f0000000940)=[{&(0x7f0000000840)="09c9453aa30d8c5fba221fa2413f12c580837b2ae292e3ee8dd00098c404125a1a2e63840f82a2f69c3927af43b828422484aaeeceebcbe76e999bd3930c9b7c2995484407f9166e39c2069a88b63a980b9b5ffc880f4b89dde5adae6c7fb84ed98cbac860214dfb0b28d1b2e2d58aefebdfe515334f2ffa46be22ef7a4b3a276cb70a27c9e9f5de0a20bad24cbe2b89aee9693c2f8f186ea59fcfc4ebec7188cca0418d4583a6f1730f62416d70cd62555eb4f58ea831d1fea9956a2cba0049f23bf0b249f5de2ce0dc303808d70b0ccab3c7f37e949e", 0xd7}], 0x1, &(0x7f0000000980), 0x0, 0x20004805}, 0x4010) r2 = perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x2367, 0x7fff, 0x1, 0x6, 0x0, 0x78b1, 0x1, 0x0, 0x4992c766, 0xff, 0x81, 0x100, 0x40, 0x3, 0x9, 0x8, 0x1, 0x10000, 0x0, 0x6, 0x90e, 0x9, 0x7ff, 0x0, 0x8, 0x1, 0x30, 0x20, 0x7fffffff, 0x6, 0x401, 0x2, 0x1000, 0x8001, 0x1ff, 0xfffffffffffffff8, 0x0, 0x2, 0x0, @perf_config_ext={0x5, 0x8}, 0x1ab23, 0x3f, 0x8, 0x5, 0x6}, 0xffffffffffffffff, 0x10, r0, 0x1) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0xb, 0x9, &(0x7f0000000580)=@framed={{0x18}, [@map={0x18, 0x0, 0x1, 0x0, r0}, @generic={0x3ff, 0xfffffffffffffffc, 0x1}, @call={0x85, 0x0, 0x0, 0x6}], {0x95}}, &(0x7f0000000600)='syzkaller\x00', 0x0, 0x30, &(0x7f0000000640)=""/48, 0x41f00, 0x1}, 0x48) ioctl$PERF_EVENT_IOC_SET_BPF(r2, 0x40042408, r3) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000000)={&(0x7f0000000080)='./file0/file0\x00', r0}, 0x10) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000400)=@ax25={0x3, {"02f47b3723e03d"}}, 0x80, &(0x7f00000017c0), 0x0, &(0x7f0000001840)=ANY=[], 0x0, 0x24004044}, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000002cc0)={0x5, 0x100, 0x56c96e7a, 0x2, 0xa, 0xffffffffffffffff, 0x9}, 0x2c) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000480)='rpc_pipefs\x00', 0x200000, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000002d00)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f00000004c0)='vmnet0keyring\x00') bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000780)={&(0x7f0000000740)='./file0/file0\x00', r4}, 0x10) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x40082406, &(0x7f0000000700)='proc!@ppp1!ppp0ppp0#)lo\\lolo{\x00') mount(&(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000200)='fuseblk\x00', 0xa11800, &(0x7f0000000240)) r5 = syz_open_dev$sg(&(0x7f0000000240)='/dev/sg#\x00', 0xfffffffffffffffa, 0x800) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000280)={r5, r3, 0x5, 0x1}, 0x10) ioctl$TIOCCONS(r5, 0x541d) mount(&(0x7f00000002c0)='./file0/file0\x00', &(0x7f0000000300)='./file0/file0\x00', &(0x7f0000000340)='minix\x00', 0x1000, &(0x7f0000000380)) 2018/03/29 17:35:06 executing program 0: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)={0xb, 0x7e, 0x3, 0x1, 0x11}, 0x2c) mount(&(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) r1 = socket$kcm(0x29, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000000bc0)={&(0x7f00000007c0)=@rc={0x1f, {0x5, 0x50000000, 0xaa2, 0x613, 0x4, 0x1ff}}, 0x80, &(0x7f0000000940)=[{&(0x7f0000000840)="09c9453aa30d8c5fba221fa2413f12c580837b2ae292e3ee8dd00098c404125a1a2e63840f82a2f69c3927af43b828422484aaeeceebcbe76e999bd3930c9b7c2995484407f9166e39c2069a88b63a980b9b5ffc880f4b89dde5adae6c7fb84ed98cbac860214dfb0b28d1b2e2d58aefebdfe515334f2ffa46be22ef7a4b3a276cb70a27c9e9f5de0a20bad24cbe2b89aee9693c2f8f186ea59fcfc4ebec7188cca0418d4583a6f1730f62416d70cd62555eb4f58ea831d1fea9956a2cba0049f23bf0b249f5de2ce0dc303808d70b0ccab3c7f37e949e", 0xd7}], 0x1, &(0x7f0000000980)}, 0x4010) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0xb, 0x9, &(0x7f0000000580)=@framed={{0x18}, [@map={0x18, 0x0, 0x1, 0x0, r0}, @generic={0x3ff, 0xfffffffffffffffc, 0x1}, @call={0x85, 0x0, 0x0, 0x6}], {0x95}}, &(0x7f0000000600)='syzkaller\x00', 0x0, 0x30, &(0x7f0000000640)=""/48, 0x41f00, 0x1}, 0x48) ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, r2) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000000)={&(0x7f0000000080)='./file0/file0\x00', r0}, 0x10) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000400)=@ax25={0x3, {"02f47b3723e03d"}}, 0x80, &(0x7f00000017c0), 0x0, &(0x7f0000001840)=ANY=[], 0x0, 0x24004044}, 0x4008001) bpf$MAP_CREATE(0x0, &(0x7f0000002cc0)={0x5, 0x100, 0x56c96e7a, 0x2, 0xa, 0xffffffffffffffff, 0x9}, 0x2c) r3 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000240)='/dev/dsp\x00', 0x200000, 0x0) setsockopt$IP_VS_SO_SET_ZERO(r3, 0x0, 0x48f, &(0x7f0000000280)={0x29, @local={0xac, 0x14, 0x14, 0xaa}, 0x4e21, 0x0, 'dh\x00', 0x2, 0x8, 0x74}, 0x2c) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000480)='rpc_pipefs\x00', 0x200000, 0x0) ioctl$SNDRV_SEQ_IOCTL_DELETE_PORT(r3, 0x40a85321, &(0x7f0000000980)={{0x5, 0x5}, 'port1\x00', 0x20, 0x40010, 0xfffffffffffffffe, 0x2, 0x80000000, 0x0, 0x7, 0x0, 0x1, 0xffffffffffffffff}) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000002d00)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f00000004c0)='vmnet0keyring\x00') bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000780)={&(0x7f0000000740)='./file0/file0\x00', r4}, 0x10) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, &(0x7f0000000700)='proc!@ppp1!ppp0ppp0#)lo\\lolo{\x00') mount(&(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000200)='fuseblk\x00', 0xa11800, &(0x7f0000000240)) mount(&(0x7f00000002c0)='./file0/file0\x00', &(0x7f0000000300)='./file0/file0\x00', &(0x7f0000000340)='minix\x00', 0x0, &(0x7f0000000380)) 2018/03/29 17:35:06 executing program 3: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)={0xb, 0x7e, 0x3, 0x1, 0x11}, 0x2c) mount(&(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) r1 = socket$kcm(0x29, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000000bc0)={&(0x7f00000007c0)=@rc={0x1f, {0x5, 0x50000000, 0xaa2, 0x613, 0x4, 0x1ff}, 0x3f}, 0x80, &(0x7f0000000940)=[{&(0x7f0000000840)="09c9453aa30d8c5fba221fa2413f12c580837b2ae292e3ee8dd00098c404125a1a2e63840f82a2f69c3927af43b828422484aaeeceebcbe76e999bd3930c9b7c2995484407f9166e39c2069a88b63a980b9b5ffc880f4b89dde5adae6c7fb84ed98cbac860214dfb0b28d1b2e2d58aefebdfe515334f2ffa46be22ef7a4b3a276cb70a27c9e9f5de0a20bad24cbe2b89aee9693c2f8f186ea59fcfc4ebec7188cca0418d4583a6f1730f62416d70cd62555eb4f58ea831d1fea9956a2cba0049f23bf0b249f5de2ce0dc303808d70b0ccab3c7f37e949e", 0xd7}], 0x1, &(0x7f0000000980), 0x0, 0x20004805}, 0x4010) r2 = perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x2367, 0x7fff, 0x1, 0x6, 0x0, 0x78b1, 0x1, 0x0, 0x4992c766, 0xff, 0x81, 0x100, 0x40, 0x3, 0x9, 0x8, 0x1, 0x10000, 0x0, 0x6, 0x90e, 0x9, 0x7ff, 0x0, 0x8, 0x1, 0x30, 0x20, 0x7fffffff, 0x6, 0x0, 0x2, 0x1000, 0x8001, 0x1ff, 0xfffffffffffffff8, 0x0, 0x2, 0x0, @perf_config_ext={0x5, 0x8}, 0x1ab23, 0x3f, 0x8, 0x5, 0x6}, 0xffffffffffffffff, 0x10, r0, 0x1) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0xb, 0x9, &(0x7f0000000580)=@framed={{0x18}, [@map={0x18, 0x0, 0x1, 0x0, r0}, @generic={0x3ff, 0xfffffffffffffffc, 0x1}, @call={0x85, 0x0, 0x0, 0x6}], {0x95}}, &(0x7f0000000600)='syzkaller\x00', 0x0, 0x30, &(0x7f0000000640)=""/48, 0x41f00, 0x1}, 0x48) ioctl$PERF_EVENT_IOC_SET_BPF(r2, 0x40042408, r3) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000000)={&(0x7f0000000080)='./file0/file0\x00', r0}, 0x10) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000400)=@ax25={0x3, {"02f47b3723e03d"}}, 0x80, &(0x7f00000017c0), 0x0, &(0x7f0000001840)=ANY=[], 0x0, 0x24004044}, 0x4008001) bpf$MAP_CREATE(0x0, &(0x7f0000002cc0)={0x5, 0x100, 0x56c96e7a, 0x2, 0xa, 0xffffffffffffffff, 0x9}, 0x2c) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000480)='rpc_pipefs\x00', 0x200000, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000002d00)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f00000004c0)='vmnet0keyring\x00') bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000780)={&(0x7f0000000740)='./file0/file0\x00', r4}, 0x10) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x40082406, &(0x7f0000000700)='proc!@ppp1!ppp0ppp0#)lo\\lolo{\x00') mount(&(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000200)='fuseblk\x00', 0xa11800, &(0x7f0000000240)) r5 = syz_open_dev$sg(&(0x7f0000000240)='/dev/sg#\x00', 0xfffffffffffffffa, 0x800) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000280)={r5, r3, 0x5, 0x1}, 0x10) ioctl$TIOCCONS(r5, 0x541d) mount(&(0x7f00000002c0)='./file0/file0\x00', &(0x7f0000000300)='./file0/file0\x00', &(0x7f0000000340)='minix\x00', 0x1000, &(0x7f0000000380)) 2018/03/29 17:35:06 executing program 4: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)={0xb, 0x7e, 0x3, 0x1, 0x11}, 0x2c) mount(&(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) r1 = socket$kcm(0x29, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000000bc0)={&(0x7f00000007c0)=@rc={0x1f, {0x5, 0x50000000, 0xaa2, 0x613, 0x4, 0x1ff}, 0x3f}, 0x80, &(0x7f0000000940)=[{&(0x7f0000000840)="09c9453aa30d8c5fba221fa2413f12c580837b2ae292e3ee8dd00098c404125a1a2e63840f82a2f69c3927af43b828422484aaeeceebcbe76e999bd3930c9b7c2995484407f9166e39c2069a88b63a980b9b5ffc880f4b89dde5adae6c7fb84ed98cbac860214dfb0b28d1b2e2d58aefebdfe515334f2ffa46be22ef7a4b3a276cb70a27c9e9f5de0a20bad24cbe2b89aee9693c2f8f186ea59fcfc4ebec7188cca0418d4583a6f1730f62416d70cd62555eb4f58ea831d1fea9956a2cba0049f23bf0b249f5de2ce0dc303808d70b0ccab3c7f37e949e", 0xd7}], 0x1, &(0x7f0000000980), 0x0, 0x20004805}, 0x4010) r2 = perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x2367, 0x7fff, 0x1, 0x6, 0x0, 0x78b1, 0x1, 0x0, 0x4992c766, 0xff, 0x81, 0x100, 0x40, 0x3, 0x9, 0x8, 0x1, 0x10000, 0x0, 0x6, 0x90e, 0x9, 0x7ff, 0x0, 0x8, 0x1, 0x30, 0x20, 0x7fffffff, 0x6, 0x401, 0x2, 0x1000, 0x8001, 0x1ff, 0xfffffffffffffff8, 0x0, 0x2, 0x0, @perf_config_ext={0x5, 0x8}, 0x1ab23, 0x3f, 0x8, 0x5, 0x6}, 0xffffffffffffffff, 0x10, r0, 0x1) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0xb, 0x9, &(0x7f0000000580)=@framed={{0x18}, [@map={0x18, 0x0, 0x1, 0x0, r0}, @generic={0x3ff, 0xfffffffffffffffc, 0x1}, @call={0x85, 0x0, 0x0, 0x6}], {0x95}}, &(0x7f0000000600)='syzkaller\x00', 0x0, 0x30, &(0x7f0000000640)=""/48, 0x41f00, 0x1}, 0x48) ioctl$PERF_EVENT_IOC_SET_BPF(r2, 0x40042408, r3) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000000)={&(0x7f0000000080)='./file0/file0\x00', r0}, 0x10) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000400)=@ax25={0x3, {"02f47b3723e03d"}}, 0x80, &(0x7f00000017c0), 0x0, &(0x7f0000001840)=ANY=[], 0x0, 0x24004044}, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000002cc0)={0x5, 0x100, 0x56c96e7a, 0x2, 0xa, 0xffffffffffffffff, 0x9}, 0x2c) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000480)='rpc_pipefs\x00', 0x200000, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000002d00)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f00000004c0)='vmnet0keyring\x00') bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000780)={&(0x7f0000000740)='./file0/file0\x00', r4}, 0x10) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x40082406, &(0x7f0000000700)='proc!@ppp1!ppp0ppp0#)lo\\lolo{\x00') mount(&(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000200)='fuseblk\x00', 0xa11800, &(0x7f0000000240)) r5 = syz_open_dev$sg(&(0x7f0000000240)='/dev/sg#\x00', 0xfffffffffffffffa, 0x800) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000280)={r5, r3, 0x5, 0x1}, 0x10) ioctl$TIOCCONS(r5, 0x541d) mount(&(0x7f00000002c0)='./file0/file0\x00', &(0x7f0000000300)='./file0/file0\x00', &(0x7f0000000340)='minix\x00', 0x1000, &(0x7f0000000380)) 2018/03/29 17:35:06 executing program 5: r0 = socket(0xa, 0x2, 0x0) r1 = open(&(0x7f0000000200)='./file0\x00', 0x28042, 0x0) connect$inet6(r0, &(0x7f0000d3cfe4)={0xa, 0x0, 0x0, @mcast2={0xff, 0x2, [], 0x1}, 0x3}, 0x1c) ioctl$DRM_IOCTL_ADD_CTX(r1, 0xc0086420, &(0x7f0000000000)) r2 = request_key(&(0x7f00000000c0)='ceph\x00', &(0x7f0000000140)={0x73, 0x79, 0x7a, 0x3}, &(0x7f0000000180)="6d696d655f7479706525d17b00", 0xfffffffffffffffe) keyctl$invalidate(0x15, r2) ioctl$DRM_IOCTL_NEW_CTX(r1, 0x40086425, &(0x7f0000000080)={0x0, 0x3}) fallocate(r1, 0x0, 0xffff, 0x1f) setsockopt$inet6_mtu(0xffffffffffffffff, 0x29, 0x17, &(0x7f0000000100)=0x2, 0x3) connect$inet(r0, &(0x7f0000000040)={0x2, 0x4e22, @multicast1=0xe0000001}, 0x10) sendfile(r0, r1, &(0x7f00000001c0), 0xfffa) 2018/03/29 17:35:06 executing program 0: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)={0xb, 0x7e, 0x3, 0x1, 0x11}, 0x2c) mount(&(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) r1 = socket$kcm(0x29, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000000bc0)={&(0x7f00000007c0)=@rc={0x1f, {0x5, 0x50000000, 0xaa2, 0x613, 0x4, 0x1ff}}, 0x80, &(0x7f0000000940)=[{&(0x7f0000000840)="09c9453aa30d8c5fba221fa2413f12c580837b2ae292e3ee8dd00098c404125a1a2e63840f82a2f69c3927af43b828422484aaeeceebcbe76e999bd3930c9b7c2995484407f9166e39c2069a88b63a980b9b5ffc880f4b89dde5adae6c7fb84ed98cbac860214dfb0b28d1b2e2d58aefebdfe515334f2ffa46be22ef7a4b3a276cb70a27c9e9f5de0a20bad24cbe2b89aee9693c2f8f186ea59fcfc4ebec7188cca0418d4583a6f1730f62416d70cd62555eb4f58ea831d1fea9956a2cba0049f23bf0b249f5de2ce0dc303808d70b0ccab3c7f37e949e", 0xd7}], 0x1, &(0x7f0000000980)}, 0x4010) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0xb, 0x9, &(0x7f0000000240)=ANY=[@ANYBLOB="1800000000000000000000000000000018100000", @ANYRES32=r0, @ANYBLOB="0000000000000000fffc01000000000000000000000000000000009500000000000000af538b1af8735e64994cbec758c903b7616e24e0f5d78d1ce00f09f3fe1bc2a1b73a1b86d37ad7894baf4e4f762feaed49d44847d93beafe297c"], &(0x7f0000000600)='syzkaller\x00', 0x0, 0x30, &(0x7f0000000640)=""/48, 0x41f00, 0x1}, 0x48) ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, r2) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000000)={&(0x7f0000000080)='./file0/file0\x00', r0}, 0x10) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000400)=@ax25={0x3, {"02f47b3723e03d"}}, 0x80, &(0x7f00000017c0), 0x0, &(0x7f0000001840)=ANY=[], 0x0, 0x24004044}, 0x4008001) bpf$MAP_CREATE(0x0, &(0x7f0000002cc0)={0x5, 0x100, 0x56c96e7a, 0x2, 0xa, 0xffffffffffffffff, 0x9}, 0x2c) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000480)='rpc_pipefs\x00', 0x200000, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000002d00)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f00000004c0)='vmnet0keyring\x00') bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000780)={&(0x7f0000000740)='./file0/file0\x00', r3}, 0x10) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, &(0x7f0000000700)='proc!@ppp1!ppp0ppp0#)lo\\lolo{\x00') mount(&(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000200)='fuseblk\x00', 0xa11800, &(0x7f0000000240)) mount(&(0x7f00000002c0)='./file0/file0\x00', &(0x7f0000000300)='./file0/file0\x00', &(0x7f0000000340)='minix\x00', 0x0, &(0x7f0000000380)) 2018/03/29 17:35:06 executing program 6: r0 = socket(0xa, 0x2, 0x0) r1 = open(&(0x7f00004b8ff8)='./file0\x00', 0x28042, 0x0) connect$inet6(r0, &(0x7f0000d3cfe4)={0xa, 0x0, 0x0, @mcast2={0xff, 0x2, [], 0x1}, 0x3}, 0x1c) ioctl$DRM_IOCTL_ADD_CTX(r1, 0xc0086420, &(0x7f0000000000)) ioctl$DRM_IOCTL_NEW_CTX(r1, 0x40086425, &(0x7f0000000080)={0x0, 0x3}) ioctl$SNDRV_TIMER_IOCTL_START(r1, 0x54a0) fallocate(r1, 0x0, 0xffff, 0x1f) setsockopt$inet6_mtu(0xffffffffffffffff, 0x29, 0x17, &(0x7f0000000100)=0x2, 0x4) connect$inet(r0, &(0x7f0000000040)={0x2, 0x4e22, @multicast1=0xe0000001}, 0x10) sendfile(r0, r1, &(0x7f00005faff8), 0xfffb) 2018/03/29 17:35:06 executing program 7: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)={0xb, 0x7e, 0x3, 0x1, 0x11}, 0x2c) mount(&(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) r1 = socket$kcm(0x29, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000000bc0)={&(0x7f00000007c0)=@rc={0x1f, {0x5, 0x50000000, 0xaa2, 0x613, 0x4, 0x1ff}, 0x3f}, 0x80, &(0x7f0000000940)=[{&(0x7f0000000840)="09c9453aa30d8c5fba221fa2413f12c580837b2ae292e3ee8dd00098c404125a1a2e63840f82a2f69c3927af43b828422484aaeeceebcbe76e999bd3930c9b7c2995484407f9166e39c2069a88b63a980b9b5ffc880f4b89dde5adae6c7fb84ed98cbac860214dfb0b28d1b2e2d58aefebdfe515334f2ffa46be22ef7a4b3a276cb70a27c9e9f5de0a20bad24cbe2b89aee9693c2f8f186ea59fcfc4ebec7188cca0418d4583a6f1730f62416d70cd62555eb4f58ea831d1fea9956a2cba0049f23bf0b249f5de2ce0dc303808d70b0ccab3c7f37e949e", 0xd7}], 0x1, &(0x7f0000000980), 0x0, 0x20004805}, 0x4010) r2 = perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x2367, 0x7fff, 0x1, 0x6, 0x0, 0x78b1, 0x1, 0x0, 0x4992c766, 0xff, 0x81, 0x100, 0x40, 0x3, 0x9, 0x8, 0x1, 0x10000, 0x0, 0x6, 0x90e, 0x9, 0x7ff, 0x0, 0x8, 0x1, 0x30, 0x20, 0x7fffffff, 0x6, 0x401, 0x2, 0x1000, 0x8001, 0x1ff, 0xfffffffffffffff8, 0x0, 0x2, 0x0, @perf_config_ext={0x5, 0x8}, 0x1ab23, 0x3f, 0x8, 0x5, 0x6, 0x0, 0x6}, 0xffffffffffffffff, 0x10, r0, 0x1) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0xb, 0x9, &(0x7f0000000580)=@framed={{0x18}, [@map={0x18, 0x0, 0x1, 0x0, r0}, @generic={0x3ff, 0xfffffffffffffffc, 0x1}, @call={0x85, 0x0, 0x0, 0x6}], {0x95}}, &(0x7f0000000600)='syzkaller\x00', 0x0, 0x30, &(0x7f0000000640)=""/48, 0x41f00, 0x1}, 0x48) ioctl$PERF_EVENT_IOC_SET_BPF(r2, 0x40042408, r3) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000000)={&(0x7f0000000080)='./file0/file0\x00', r0}, 0x10) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000980)=@ax25={0x3, {"02f47b3723e03d"}}, 0x80, &(0x7f0000000240), 0x100000000000004c, &(0x7f0000001840)=ANY=[], 0x0, 0x24004044}, 0x4008001) bpf$MAP_CREATE(0x0, &(0x7f0000002cc0)={0x5, 0x0, 0x56c96e7a, 0x2, 0xa, 0xffffffffffffffff, 0x9}, 0x2c) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000480)='rpc_pipefs\x00', 0x200000, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000002d00)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f00000004c0)='vmnet0keyring\x00') bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000780)={&(0x7f0000000740)='./file0/file0\x00', r4}, 0x10) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x40082406, &(0x7f0000000700)='proc!@ppp1!ppp0ppp0#)lo\\lolo{\x00') mount(&(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000200)='fuseblk\x00', 0xa11800, &(0x7f0000000240)) mount(&(0x7f00000002c0)='./file0/file0\x00', &(0x7f0000000300)='./file0/file0\x00', &(0x7f0000000340)='minix\x00', 0x1000, &(0x7f0000000380)) 2018/03/29 17:35:06 executing program 2: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)={0xb, 0x7e, 0x3, 0x1, 0x11}, 0x2c) mount(&(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) r1 = socket$kcm(0x29, 0x2, 0x0) accept4(r1, &(0x7f0000000a40)=@ll={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @dev}, &(0x7f0000000ac0)=0x80, 0x800) bpf$PROG_LOAD(0x5, &(0x7f0000000b00)={0xa, 0xc, &(0x7f0000000240)=@raw=[@jmp={0x5, 0x8, 0x2, 0xf, 0xa, 0xffffffff, 0xfffffffffffffffc}, @jmp={0x5, 0x0, 0xf, 0x3, 0xf, 0xfffffffe, 0xfffffffffffffff4}, @initr0={0x18, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x3}, @generic={0x9, 0xcb2, 0x0, 0x1000}, @jmp={0x5, 0x100000001, 0x2, 0xf, 0x0, 0x10, 0x10}, @initr0={0x18, 0x0, 0x0, 0x0, 0x20, 0x0, 0x0, 0x0, 0xfffffffffffffffb}], &(0x7f0000000980)='GPL\x00', 0x80000001, 0x6c, &(0x7f00000009c0)=""/108, 0x41100, 0x1, [], r2}, 0x48) sendmsg$kcm(r1, &(0x7f0000000bc0)={&(0x7f00000007c0)=@rc={0x1f, {0x5, 0x50000000, 0xaa2, 0x613, 0x4, 0x1ff}, 0x3f}, 0x80, &(0x7f0000000940)=[{&(0x7f0000000840)="09c9453aa30d8c5fba221fa2413f12c580837b2ae292e3ee8dd00098c404125a1a2e63840f82a2f69c3927af43b828422484aaeeceebcbe76e999bd3930c9b7c2995484407f9166e39c2069a88b63a980b9b5ffc880f4b89dde5adae6c7fb84ed98cbac860214dfb0b28d1b2e2d58aefebdfe515334f2ffa46be22ef7a4b3a276cb70a27c9e9f5de0a20bad24cbe2b89aee9693c2f8f186ea59fcfc4ebec7188cca0418d4583a6f1730f62416d70cd62555eb4f58ea831d1fea9956a2cba0049f23bf0b249f5de2ce0dc303808d70b0ccab3c7f37e949e", 0xd7}], 0x1, &(0x7f0000000980), 0x0, 0x20004805}, 0x4010) r3 = perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x2367, 0x7fff, 0x1, 0x6, 0x0, 0x78b1, 0x1, 0x0, 0x4992c766, 0xff, 0x81, 0x100, 0x40, 0x3, 0x9, 0x8, 0x1, 0x10000, 0x0, 0x6, 0x90e, 0x9, 0x7ff, 0x0, 0x8, 0x1, 0x30, 0x20, 0x7fffffff, 0x6, 0x401, 0x2, 0x1000, 0x8001, 0x1ff, 0xfffffffffffffff8, 0x0, 0x2, 0x0, @perf_config_ext={0x5, 0x8}, 0x1ab23, 0x0, 0x8, 0x5, 0x6, 0x0, 0x6}, 0xffffffffffffffff, 0x10, r0, 0x1) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0xb, 0x9, &(0x7f0000000580)=@framed={{0x18}, [@map={0x18, 0x0, 0x1, 0x0, r0}, @generic={0x3ff, 0xfffffffffffffffc, 0x1}, @call={0x85, 0x0, 0x0, 0x6}], {0x95}}, &(0x7f0000000600)='syzkaller\x00', 0x0, 0x30, &(0x7f0000000640)=""/48, 0x41f00, 0x1}, 0x48) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000000)={&(0x7f0000000080)='./file0/file0\x00', r0}, 0x10) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000400)=@ax25={0x3, {"02f47b3723e03d"}}, 0x80, &(0x7f00000017c0), 0x0, &(0x7f0000001840)=ANY=[], 0x0, 0x24004044}, 0x4008001) bpf$MAP_CREATE(0x0, &(0x7f0000002cc0)={0x5, 0x0, 0x56c96e7a, 0x2, 0xa, 0xffffffffffffffff, 0x9}, 0x2c) mount(&(0x7f0000000d80)='./file0\x00', &(0x7f0000000c40)='./file0/file0\x00', &(0x7f0000000c80)="f30000000000001c0000000e84a7432bd59b9e048532fcb8a90c6ef1127dc6947d158efffcf864dde385d8db5311a93bf8bddfb54e3ab3470fde9f717052c3ca8e0ea233f5bc0a62eed563bf9cc81436974d9f726e81220e943607f4066ec4ee9c9810c608e7a647014dd7df9618338bba90b9ecbbfebe7af8bae24ddeb18b79fa3254f6e22c00aa0ee31c5cbb5c375d41edbbc60e11357a1b7a28287d9e1990085d1b344837eeae7cb8355010b8992b000000a002b580e6e14729011403a48b19f8619b50e1691ac72fb878bec0d9a5269a5cac82416f8e59a1", 0x1000003, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000002d00)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f00000004c0)='vmnet0keyring\x00') bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000780)={&(0x7f0000000740)='./file0/file0\x00', r5}, 0x10) ioctl$PERF_EVENT_IOC_SET_FILTER(r3, 0x40082406, &(0x7f0000000700)='proc!@ppp1!ppp0ppp0#)lo\\lolo{\x00') mount(&(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000200)='fuseblk\x00', 0xa11800, &(0x7f0000000240)) mount(&(0x7f00000002c0)='./file0/file0\x00', &(0x7f0000000300)='./file0/file0\x00', &(0x7f0000000340)='minix\x00', 0x1000, &(0x7f0000000380)) getsockopt$netrom_NETROM_N2(r4, 0x103, 0x3, &(0x7f0000000b80)=0xb0c, &(0x7f0000000c00)=0x4) 2018/03/29 17:35:06 executing program 1: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)={0xb, 0x7e, 0x3, 0x1, 0x11}, 0x2c) mount(&(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) r1 = socket$kcm(0x29, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000000bc0)={&(0x7f00000007c0)=@rc={0x1f, {0x5, 0x50000000, 0xaa2, 0x613, 0x4, 0x1ff}, 0x3f}, 0x80, &(0x7f0000000940)=[{&(0x7f0000000840)="09c9453aa30d8c5fba221fa2413f12c580837b2ae292e3ee8dd00098c404125a1a2e63840f82a2f69c3927af43b828422484aaeeceebcbe76e999bd3930c9b7c2995484407f9166e39c2069a88b63a980b9b5ffc880f4b89dde5adae6c7fb84ed98cbac860214dfb0b28d1b2e2d58aefebdfe515334f2ffa46be22ef7a4b3a276cb70a27c9e9f5de0a20bad24cbe2b89aee9693c2f8f186ea59fcfc4ebec7188cca0418d4583a6f1730f62416d70cd62555eb4f58ea831d1fea9956a2cba0049f23bf0b249f5de2ce0dc303808d70b0ccab3c7f37e949e", 0xd7}], 0x1, &(0x7f0000000980), 0x0, 0x20004805}, 0x4010) r2 = perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x2367, 0x7fff, 0x1, 0x6, 0x0, 0x78b1, 0x1, 0x0, 0x4992c766, 0xff, 0x81, 0x100, 0x40, 0x3, 0x9, 0x8, 0x1, 0x10000, 0x0, 0x6, 0x90e, 0x9, 0x7ff, 0x0, 0x8, 0x1, 0x30, 0x20, 0x7fffffff, 0x6, 0x401, 0x2, 0x1000, 0x8001, 0x1ff, 0xfffffffffffffff8, 0x0, 0x2, 0x0, @perf_config_ext={0x5, 0x8}, 0x1ab23, 0x3f, 0x8, 0x5, 0x6, 0x0, 0x6}, 0xffffffffffffffff, 0x10, r0, 0x1) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0xb, 0x9, &(0x7f0000000240)=ANY=[@ANYBLOB="18000000010000000000000000000000181000008d6f4e3b9be57c255ede900edd6ee8ae7d1dbc0052d943a4c292691ef4461733ad5998b81ee17770a297c79fe1721e9d3935eec2dd8fa469", @ANYRES32=r0, @ANYBLOB="0000000000000000fffc0100000000000000000000000000850000000600000000000000000000009500000000000000"], &(0x7f0000000600)='syzkaller\x00', 0x0, 0x30, &(0x7f0000000640)=""/48, 0x41f00, 0x1}, 0x48) ioctl$PERF_EVENT_IOC_SET_BPF(r2, 0x40042408, r3) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000000)={&(0x7f0000000080)='./file0/file0\x00', r0}, 0x10) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000400)=@ax25={0x3, {"02f47b3723e03d"}}, 0x80, &(0x7f00000017c0), 0x0, &(0x7f0000001840)=ANY=[], 0x0, 0x24004044}, 0x4008001) bpf$MAP_CREATE(0x0, &(0x7f0000002cc0)={0x5, 0x0, 0x56c96e7a, 0x2, 0xa, 0xffffffffffffffff, 0x9}, 0x2c) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000480)='rpc_pipefs\x00', 0x200000, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000002d00)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f00000004c0)='vmnet0keyring\x00') bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000780)={&(0x7f0000000740)='./file0/file0\x00', r4}, 0x10) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x40082406, &(0x7f0000000700)='proc!@ppp1!ppp0ppp0#)lo\\lolo{\x00') mount(&(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000200)='fuseblk\x00', 0xa11800, &(0x7f0000000240)) mount(&(0x7f00000002c0)='./file0/file0\x00', &(0x7f0000000300)='./file0/file0\x00', &(0x7f0000000340)='minix\x00', 0x1000, &(0x7f0000000380)) 2018/03/29 17:35:06 executing program 3: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)={0xb, 0x7e, 0x3, 0x1, 0x11}, 0x2c) mount(&(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) r1 = socket$kcm(0x29, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000000bc0)={&(0x7f00000007c0)=@rc={0x1f, {0x5, 0x50000000, 0xaa2, 0x613, 0x4, 0x1ff}, 0x3f}, 0x80, &(0x7f0000000940)=[{&(0x7f0000000840)="09c9453aa30d8c5fba221fa2413f12c580837b2ae292e3ee8dd00098c404125a1a2e63840f82a2f69c3927af43b828422484aaeeceebcbe76e999bd3930c9b7c2995484407f9166e39c2069a88b63a980b9b5ffc880f4b89dde5adae6c7fb84ed98cbac860214dfb0b28d1b2e2d58aefebdfe515334f2ffa46be22ef7a4b3a276cb70a27c9e9f5de0a20bad24cbe2b89aee9693c2f8f186ea59fcfc4ebec7188cca0418d4583a6f1730f62416d70cd62555eb4f58ea831d1fea9956a2cba0049f23bf0b249f5de2ce0dc303808d70b0ccab3c7f37e949e", 0xd7}], 0x1, &(0x7f0000000980), 0x0, 0x20004805}, 0x4010) r2 = perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x2367, 0x7fff, 0x1, 0x6, 0x0, 0x78b1, 0x1, 0x0, 0x4992c766, 0xff, 0x81, 0x100, 0x40, 0x3, 0x9, 0x8, 0x1, 0x10000, 0x0, 0x6, 0x90e, 0x9, 0x7ff, 0x0, 0x8, 0x1, 0x30, 0x20, 0x7fffffff, 0x6, 0x0, 0x2, 0x1000, 0x8001, 0x1ff, 0xfffffffffffffff8, 0x0, 0x2, 0x0, @perf_config_ext={0x5, 0x8}, 0x1ab23, 0x3f, 0x8, 0x5, 0x6}, 0xffffffffffffffff, 0x10, r0, 0x1) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0xb, 0x9, &(0x7f0000000580)=@framed={{0x18}, [@map={0x18, 0x0, 0x1, 0x0, r0}, @generic={0x3ff, 0xfffffffffffffffc, 0x1}, @call={0x85, 0x0, 0x0, 0x6}], {0x95}}, &(0x7f0000000600)='syzkaller\x00', 0x0, 0x30, &(0x7f0000000640)=""/48, 0x41f00, 0x1}, 0x48) ioctl$PERF_EVENT_IOC_SET_BPF(r2, 0x40042408, r3) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000000)={&(0x7f0000000080)='./file0/file0\x00', r0}, 0x10) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000400)=@ax25={0x3, {"02f47b3723e03d"}}, 0x80, &(0x7f00000017c0), 0x0, &(0x7f0000001840)=ANY=[], 0x0, 0x24004044}, 0x4008001) bpf$MAP_CREATE(0x0, &(0x7f0000002cc0)={0x5, 0x100, 0x56c96e7a, 0x2, 0xa, 0xffffffffffffffff, 0x9}, 0x2c) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000480)='rpc_pipefs\x00', 0x200000, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000002d00)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f00000004c0)='vmnet0keyring\x00') bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000780)={&(0x7f0000000740)='./file0/file0\x00', r4}, 0x10) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x40082406, &(0x7f0000000700)='proc!@ppp1!ppp0ppp0#)lo\\lolo{\x00') mount(&(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000200)='fuseblk\x00', 0xa11800, &(0x7f0000000240)) r5 = syz_open_dev$sg(&(0x7f0000000240)='/dev/sg#\x00', 0xfffffffffffffffa, 0x800) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000280)={r5, r3, 0x5, 0x1}, 0x10) ioctl$TIOCCONS(r5, 0x541d) mount(&(0x7f00000002c0)='./file0/file0\x00', &(0x7f0000000300)='./file0/file0\x00', &(0x7f0000000340)='minix\x00', 0x1000, &(0x7f0000000380)) 2018/03/29 17:35:06 executing program 4: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)={0xb, 0x7e, 0x3, 0x1, 0x11}, 0x2c) mount(&(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) r1 = socket$kcm(0x29, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000000bc0)={&(0x7f00000007c0)=@rc={0x1f, {0x5, 0x50000000, 0xaa2, 0x613, 0x4, 0x1ff}, 0x3f}, 0x80, &(0x7f0000000940)=[{&(0x7f0000000840)="09c9453aa30d8c5fba221fa2413f12c580837b2ae292e3ee8dd00098c404125a1a2e63840f82a2f69c3927af43b828422484aaeeceebcbe76e999bd3930c9b7c2995484407f9166e39c2069a88b63a980b9b5ffc880f4b89dde5adae6c7fb84ed98cbac860214dfb0b28d1b2e2d58aefebdfe515334f2ffa46be22ef7a4b3a276cb70a27c9e9f5de0a20bad24cbe2b89aee9693c2f8f186ea59fcfc4ebec7188cca0418d4583a6f1730f62416d70cd62555eb4f58ea831d1fea9956a2cba0049f23bf0b249f5de2ce0dc303808d70b0ccab3c7f37e949e", 0xd7}], 0x1, &(0x7f0000000980), 0x0, 0x20004805}, 0x4010) r2 = perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x2367, 0x7fff, 0x1, 0x6, 0x0, 0x78b1, 0x1, 0x0, 0x4992c766, 0xff, 0x81, 0x100, 0x40, 0x3, 0x9, 0x8, 0x1, 0x10000, 0x0, 0x6, 0x90e, 0x9, 0x7ff, 0x0, 0x8, 0x1, 0x30, 0x20, 0x7fffffff, 0x6, 0x401, 0x2, 0x1000, 0x8001, 0x1ff, 0xfffffffffffffff8, 0x0, 0x2, 0x0, @perf_config_ext={0x5, 0x8}, 0x1ab23, 0x3f, 0x8, 0x5, 0x6}, 0xffffffffffffffff, 0x10, r0, 0x1) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0xb, 0x9, &(0x7f0000000580)=@framed={{0x18}, [@map={0x18, 0x0, 0x1, 0x0, r0}, @generic={0x3ff, 0xfffffffffffffffc, 0x1}, @call={0x85, 0x0, 0x0, 0x6}], {0x95}}, &(0x7f0000000600)='syzkaller\x00', 0x0, 0x30, &(0x7f0000000640)=""/48, 0x41f00, 0x1}, 0x48) ioctl$PERF_EVENT_IOC_SET_BPF(r2, 0x40042408, r3) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000000)={&(0x7f0000000080)='./file0/file0\x00', r0}, 0x10) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000400)=@ax25={0x3, {"02f47b3723e03d"}}, 0x80, &(0x7f00000017c0), 0x0, &(0x7f0000001840)=ANY=[], 0x0, 0x24004044}, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000002cc0)={0x5, 0x100, 0x56c96e7a, 0x2, 0xa, 0xffffffffffffffff, 0x9}, 0x2c) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000480)='rpc_pipefs\x00', 0x200000, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000002d00)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f00000004c0)='vmnet0keyring\x00') bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000780)={&(0x7f0000000740)='./file0/file0\x00', r4}, 0x10) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x40082406, &(0x7f0000000700)='proc!@ppp1!ppp0ppp0#)lo\\lolo{\x00') mount(&(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000200)='fuseblk\x00', 0xa11800, &(0x7f0000000240)) r5 = syz_open_dev$sg(&(0x7f0000000240)='/dev/sg#\x00', 0xfffffffffffffffa, 0x800) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000280)={r5, r3, 0x5, 0x1}, 0x10) ioctl$TIOCCONS(r5, 0x541d) mount(&(0x7f00000002c0)='./file0/file0\x00', &(0x7f0000000300)='./file0/file0\x00', &(0x7f0000000340)='minix\x00', 0x1000, &(0x7f0000000380)) 2018/03/29 17:35:06 executing program 7: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)={0xb, 0x7e, 0x3, 0x1, 0x11}, 0x2c) mount(&(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) r1 = socket$kcm(0x29, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000000bc0)={&(0x7f00000007c0)=@rc={0x1f, {0x5, 0x50000000, 0xaa2, 0x613, 0x4, 0x1ff}, 0x3f}, 0x80, &(0x7f0000000940)=[{&(0x7f0000000840)="09c9453aa30d8c5fba221fa2413f12c580837b2ae292e3ee8dd00098c404125a1a2e63840f82a2f69c3927af43b828422484aaeeceebcbe76e999bd3930c9b7c2995484407f9166e39c2069a88b63a980b9b5ffc880f4b89dde5adae6c7fb84ed98cbac860214dfb0b28d1b2e2d58aefebdfe515334f2ffa46be22ef7a4b3a276cb70a27c9e9f5de0a20bad24cbe2b89aee9693c2f8f186ea59fcfc4ebec7188cca0418d4583a6f1730f62416d70cd62555eb4f58ea831d1fea9956a2cba0049f23bf0b249f5de2ce0dc303808d70b0ccab3c7f37e949e", 0xd7}], 0x1, &(0x7f0000000980), 0x0, 0x20004805}, 0x4010) r2 = perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x2367, 0x7fff, 0x1, 0x6, 0x0, 0x78b1, 0x1, 0x0, 0x4992c766, 0xff, 0x81, 0x100, 0x40, 0x3, 0x9, 0x8, 0x1, 0x10000, 0x0, 0x6, 0x90e, 0x9, 0x7ff, 0x0, 0x8, 0x1, 0x30, 0x20, 0x7fffffff, 0x6, 0x401, 0x2, 0x1000, 0x8001, 0x1ff, 0xfffffffffffffff8, 0x0, 0x2, 0x0, @perf_config_ext={0x5, 0x8}, 0x1ab23, 0x3f, 0x8, 0x5, 0x6, 0x0, 0x6}, 0xffffffffffffffff, 0x10, r0, 0x1) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0xb, 0x9, &(0x7f0000000580)=@framed={{0x18}, [@map={0x18, 0x0, 0x1, 0x0, r0}, @generic={0x3ff, 0xfffffffffffffffc, 0x1}, @call={0x85, 0x0, 0x0, 0x6}], {0x95}}, &(0x7f0000000600)='syzkaller\x00', 0x0, 0x30, &(0x7f0000000640)=""/48, 0x41f00, 0x1}, 0x48) ioctl$PERF_EVENT_IOC_SET_BPF(r2, 0x40042408, r3) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000000)={&(0x7f0000000080)='./file0/file0\x00', r0}, 0x10) recvmsg(r1, &(0x7f0000000b00)={&(0x7f0000000240)=@ipx, 0x80, &(0x7f0000000ac0)=[{&(0x7f0000000980)=""/61, 0x3d}, {&(0x7f00000009c0)=""/48, 0x30}, {&(0x7f0000000a00)=""/138, 0x8a}], 0x3, 0x0, 0x0, 0x1}, 0x40000100) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000400)=@ax25={0x3, {"02f47b3723e03d"}}, 0x80, &(0x7f00000017c0), 0x0, &(0x7f0000001840)=ANY=[], 0x0, 0x24004044}, 0x4008001) bpf$MAP_CREATE(0x0, &(0x7f0000002cc0)={0x5, 0x0, 0x56c96e7a, 0x2, 0xa, 0xffffffffffffffff, 0x9}, 0x2c) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000480)='rpc_pipefs\x00', 0x200000, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000002d00)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f00000004c0)='vmnet0keyring\x00') bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000780)={&(0x7f0000000740)='./file0/file0\x00', r4}, 0x10) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x40082406, &(0x7f0000000700)='proc!@ppp1!ppp0ppp0#)lo\\lolo{\x00') mount(&(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000200)='fuseblk\x00', 0xa11800, &(0x7f0000000240)) mount(&(0x7f00000002c0)='./file0/file0\x00', &(0x7f0000000300)='./file0/file0\x00', &(0x7f0000000340)='minix\x00', 0x1000, &(0x7f0000000380)) 2018/03/29 17:35:06 executing program 1: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)={0xb, 0x7e, 0x3, 0x1, 0x11}, 0x2c) mount(&(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) r1 = socket$kcm(0x29, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000000bc0)={&(0x7f00000007c0)=@rc={0x1f, {0x5, 0x50000000, 0xaa2, 0x613, 0x4, 0x1ff}, 0x3f}, 0x80, &(0x7f0000000940)=[{&(0x7f0000000840)="09c9453aa30d8c5fba221fa2413f12c580837b2ae292e3ee8dd00098c404125a1a2e63840f82a2f69c3927af43b828422484aaeeceebcbe76e999bd3930c9b7c2995484407f9166e39c2069a88b63a980b9b5ffc880f4b89dde5adae6c7fb84ed98cbac860214dfb0b28d1b2e2d58aefebdfe515334f2ffa46be22ef7a4b3a276cb70a27c9e9f5de0a20bad24cbe2b89aee9693c2f8f186ea59fcfc4ebec7188cca0418d4583a6f1730f62416d70cd62555eb4f58ea831d1fea9956a2cba0049f23bf0b249f5de2ce0dc303808d70b0ccab3c7f37e949e", 0xd7}], 0x1, &(0x7f0000000980), 0x0, 0x20004805}, 0x4010) r2 = perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x2367, 0x7fff, 0x1, 0x6, 0x0, 0x78b1, 0x1, 0x0, 0x4992c766, 0xff, 0x81, 0x100, 0x40, 0x3, 0x9, 0x8, 0x1, 0x10000, 0x0, 0x6, 0x90e, 0x9, 0x7ff, 0x0, 0x8, 0x1, 0x30, 0x20, 0x7fffffff, 0x6, 0x401, 0x2, 0x1000, 0x8001, 0x1ff, 0xfffffffffffffff8, 0x0, 0x2, 0x0, @perf_config_ext={0x5, 0x8}, 0x1ab23, 0x3f, 0x8, 0x5, 0x6, 0x0, 0x6}, 0xffffffffffffffff, 0x10, r0, 0x1) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0xb, 0x9, &(0x7f0000000240)=ANY=[@ANYBLOB="18000000010000000000000000000000181000008d6f4e3b9be57c255ede900edd6ee8ae7d1dbc0052d943a4c292691ef4461733ad5998b81ee17770a297c79fe1721e9d3935eec2dd8fa469", @ANYRES32=r0, @ANYBLOB="0000000000000000fffc0100000000000000000000000000850000000600000000000000000000009500000000000000"], &(0x7f0000000600)='syzkaller\x00', 0x0, 0x30, &(0x7f0000000640)=""/48, 0x41f00, 0x1}, 0x48) ioctl$PERF_EVENT_IOC_SET_BPF(r2, 0x40042408, r3) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000000)={&(0x7f0000000080)='./file0/file0\x00', r0}, 0x10) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000400)=@ax25={0x3, {"02f47b3723e03d"}}, 0x80, &(0x7f00000017c0), 0x0, &(0x7f0000001840)=ANY=[], 0x0, 0x24004044}, 0x4008001) bpf$MAP_CREATE(0x0, &(0x7f0000002cc0)={0x5, 0x0, 0x56c96e7a, 0x2, 0xa, 0xffffffffffffffff, 0x9}, 0x2c) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000480)='rpc_pipefs\x00', 0x200000, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000002d00)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f00000004c0)='vmnet0keyring\x00') bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000780)={&(0x7f0000000740)='./file0/file0\x00', r4}, 0x10) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x40082406, &(0x7f0000000700)='proc!@ppp1!ppp0ppp0#)lo\\lolo{\x00') mount(&(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000200)='fuseblk\x00', 0xa11800, &(0x7f0000000240)) mount(&(0x7f00000002c0)='./file0/file0\x00', &(0x7f0000000300)='./file0/file0\x00', &(0x7f0000000340)='minix\x00', 0x1000, &(0x7f0000000380)) 2018/03/29 17:35:06 executing program 6: r0 = socket(0xa, 0x2, 0x0) r1 = open(&(0x7f00004b8ff8)='./file0\x00', 0x28042, 0x0) connect$inet6(r0, &(0x7f0000d3cfe4)={0xa, 0x0, 0x0, @mcast2={0xff, 0x2, [], 0x1}, 0x3}, 0x1c) ioctl$DRM_IOCTL_ADD_CTX(r1, 0xc0086420, &(0x7f0000000000)) ioctl$DRM_IOCTL_NEW_CTX(r1, 0x40086425, &(0x7f0000000080)={0x0, 0x3}) ioctl$SNDRV_TIMER_IOCTL_START(r1, 0x54a0) fallocate(r1, 0x0, 0xffff, 0x1f) setsockopt$inet6_mtu(0xffffffffffffffff, 0x29, 0x17, &(0x7f0000000100)=0x2, 0x4) sendfile(r0, r1, &(0x7f00005faff8), 0xfffb) 2018/03/29 17:35:06 executing program 5: r0 = socket(0xa, 0x2, 0x0) r1 = open(&(0x7f0000000200)='./file0\x00', 0x28042, 0x0) connect$inet6(r0, &(0x7f0000d3cfe4)={0xa, 0x0, 0x0, @mcast2={0xff, 0x2, [], 0x1}, 0x3}, 0x1c) ioctl$DRM_IOCTL_ADD_CTX(r1, 0xc0086420, &(0x7f0000000000)) r2 = request_key(&(0x7f00000000c0)='ceph\x00', &(0x7f0000000140)={0x73, 0x79, 0x7a, 0x3}, &(0x7f0000000180)="6d696d655f7479706525d17b00", 0xfffffffffffffffe) keyctl$invalidate(0x15, r2) ioctl$DRM_IOCTL_NEW_CTX(r1, 0x40086425, &(0x7f0000000080)={0x0, 0x3}) fallocate(r1, 0x0, 0xffff, 0x1f) setsockopt$inet6_mtu(0xffffffffffffffff, 0x29, 0x17, &(0x7f0000000100)=0x2, 0x3) connect$inet(r0, &(0x7f0000000040)={0x2, 0x4e22, @multicast1=0xe0000001}, 0x10) sendfile(r0, r1, &(0x7f00000001c0), 0xfffa) 2018/03/29 17:35:06 executing program 2: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)={0xb, 0x7e, 0x3, 0x1, 0x11}, 0x2c) mount(&(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) r1 = socket$kcm(0x29, 0x3, 0x0) sendmsg$kcm(r1, &(0x7f0000000bc0)={&(0x7f00000007c0)=@rc={0x1f, {0x5, 0x50000000, 0xaa2, 0x613, 0x4, 0x1ff}, 0x3f}, 0x38f, &(0x7f00000009c0)=[{&(0x7f0000000c00)="09c9453aa30d8c5fba221fa2000000000000000312c58006002ae292e3ee8dd00098c404125a1a2e63840f82a2f69c3927af43b828422484aaeeceebcbe76e999bd3930c9b7c2995484407f9166e39c2069a88b63a980b9b5ffc880fb62189ec6e28b4b26d34d8044b89dde5adae6c7fb84ed98cbac870214dfb0b28d1b2e2d58aefebdfe515334f2ffa46be22ef7a4b3a276cb70a27c9e9f5de0a20bad24cbe2b89aee9693c2f8f186ea59fcfc4ebec7188cca0418d4583a6f1730f62416d70cd62555eb4f58ea831d1fea995e0dc303808d70b0ccab3c7f37e949e", 0xd7}], 0x1, &(0x7f0000000a00)=[{0x0, 0xff, 0x200, "c46c678aec663fc381b5f19f7bdee2f4458463cd6a1b15094b98e9dba45dab4f77d65efb65140d0a5fcb226429d2054a78935aa801ab522519d8fcc782ef8afb8c600ddc58bf687c2a442ec00f07c4f1e7b033a8d845ac7be1016af413434175562e58f2d10dc57a532bef14e0367bc07d2ada8357b080606f8dcaa6f65d687e2af4584f3854d35a7d8b17f486"}, {0x0, 0x110, 0xa95b, "ebc73fc2a7176e42088ec52323b6fc13fe3f0e1dc1551f87c2dd8be90395ad7e2ebf53ad80c7b907c725a1530000b4d7f29118abb5b09ffcf7dfa6a1262e52846234b254a06ea3da4308da58d766c2800fb74a424b15239b74b82171e8d5454d75f64aba89201df53d2d1c814855255346eb25babb3c983f7d2d6a5cef78d95ab0971bc0182fb44596009408916592250a76498725daf34ae1c7ec9553d5ae8ff0389a00a1d10d4cd73b892d0970a5adde0e3f4e5e726e30d513ac500ae012cef9baafc74311bae3b2d31de79bf18a0475137d53d4f4b2e6ad4920b572244dbdda482e3339504b3a10c1f66875b36c79"}], 0x23f, 0x20004805}, 0x4010) r2 = perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x2367, 0x7fff, 0x1, 0x6, 0x0, 0x78b1, 0x1, 0x0, 0x4992c766, 0xff, 0x81, 0x100, 0x40, 0x3, 0x9, 0x8, 0x1, 0x10000, 0x0, 0x6, 0x90e, 0x9, 0x7ff, 0x0, 0x8, 0x1, 0x30, 0x20, 0x7fffffff, 0x6, 0x401, 0x2, 0x1000, 0x8001, 0x1ff, 0xfffffffffffffff8, 0x0, 0x2, 0x0, @perf_config_ext={0x5, 0x8}, 0x1ab23, 0x0, 0x8, 0x5, 0x6, 0x0, 0x6}, 0xffffffffffffffff, 0x10, r0, 0x1) bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0xc, 0x7, &(0x7f0000000580)=ANY=[@ANYPTR, @ANYRES32=r0, @ANYBLOB="0000000000000000fffc0100000000000000000000000000850000000600000000000000000000009500000000000000"], &(0x7f0000000600)='GPL\x00', 0x0, 0x30, &(0x7f0000000640)=""/48, 0x41f00, 0x1}, 0x48) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000000)={&(0x7f0000000080)='./file0/file0\x00', r0}, 0x10) r3 = syz_open_dev$sndpcmc(&(0x7f00000005c0)='/dev/snd/pcmC#D#c\x00', 0x80000000, 0x101a00) ioctl$PIO_UNIMAPCLR(r3, 0x4b68, &(0x7f0000000880)={0xc5b, 0x5, 0x4}) socket$key(0xf, 0x3, 0x2) setsockopt$inet_sctp_SCTP_I_WANT_MAPPED_V4_ADDR(r3, 0x84, 0xc, &(0x7f0000000840)=0x3, 0x4) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000400)=@ax25={0x3, {"02f47b3723e03d"}}, 0x80, &(0x7f00000017c0), 0x0, &(0x7f0000001840)=ANY=[], 0x0, 0x24004044}, 0x4008001) bpf$MAP_CREATE(0x0, &(0x7f0000002cc0)={0x5, 0x0, 0x56c96e7a, 0x2, 0xa, 0xffffffffffffffff, 0x9}, 0x2c) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000480)='rpc_pipefs\x00', 0x200000, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f00000004c0)='vmnet0keyring\x00') r5 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000280)='/dev/rtc\x00', 0x400000, 0x0) ioctl$TIOCGETD(r5, 0x5424, &(0x7f0000000980)) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000780)={&(0x7f0000000740)='./file0/file0\x00', r4}, 0x10) ioctl$SNDRV_TIMER_IOCTL_CONTINUE(r5, 0x54a2) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x40082406, &(0x7f0000000700)='proc!@ppp1!ppp0ppp0#)lo\\lolo{\x00') mount(&(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000200)='fuseblk\x00', 0xa11800, &(0x7f0000000240)) mount(&(0x7f00000002c0)='./file0/file0\x00', &(0x7f0000000300)='./file0/file0\x00', &(0x7f0000000340)='minix\x00', 0x1000, &(0x7f0000000380)) 2018/03/29 17:35:06 executing program 0: mkdir(&(0x7f0000000280)='./file1\x00', 0x10) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)={0xb, 0x7e, 0x3, 0x1, 0x11}, 0x2c) mount(&(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) r1 = socket$kcm(0x29, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000000bc0)={&(0x7f00000007c0)=@rc={0x1f, {0x5, 0x50000000, 0xaa2, 0x613, 0x4, 0x1ff}}, 0x80, &(0x7f0000000940)=[{&(0x7f0000000840)="09c9453aa30d8c5fba221fa2413f12c580837b2ae292e3ee8dd00098c404125a1a2e63840f82a2f69c3927af43b828422484aaeeceebcbe76e999bd3930c9b7c2995484407f9166e39c2069a88b63a980b9b5ffc880f4b89dde5adae6c7fb84ed98cbac860214dfb0b28d1b2e2d58aefebdfe515334f2ffa46be22ef7a4b3a276cb70a27c9e9f5de0a20bad24cbe2b89aee9693c2f8f186ea59fcfc4ebec7188cca0418d4583a6f1730f62416d70cd62555eb4f58ea831d1fea9956a2cba0049f23bf0b249f5de2ce0dc303808d70b0ccab3c7f37e949e", 0xd7}], 0x1, &(0x7f0000000980)}, 0x4010) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0xb, 0x9, &(0x7f0000000980)=ANY=[@ANYBLOB="1800000000000000000000000000000018100000", @ANYRES32=r0, @ANYBLOB="0000000000000000ff7c010000000000000000000000000085000000060000000000000000000000950017000000e74caf464fec2581cc2a46f44a3de6de779691257dd5a5b9326b88b4ea977cc3764db8ab64028410e9efc3c7aeb63c58fe617fedead7f2fa0ecffe8a8d1ed5002e8ab0a49af148e9996b2a24afceed3e6f"], &(0x7f0000000600)='syzkaller\x00', 0x0, 0x30, &(0x7f0000000640)=""/48, 0x41f00, 0x1}, 0x48) ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, r2) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000000)={&(0x7f0000000080)='./file0/file0\x00', r0}, 0x10) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000400)=@ax25={0x3, {"02f47b3723e03d"}}, 0x80, &(0x7f00000017c0), 0x0, &(0x7f0000001840)=ANY=[], 0x0, 0x24004044}, 0x4008001) bpf$MAP_CREATE(0x0, &(0x7f0000002cc0)={0x5, 0x100, 0x56c96e7a, 0x2, 0xa, 0xffffffffffffffff, 0x9}, 0x2c) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='./file1\x00', &(0x7f0000000240)='rpc_pipefs\x00', 0x200000, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000002d00)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f00000004c0)='vmnet0keyring\x00') bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000780)={&(0x7f0000000740)='./file0/file0\x00', r3}, 0x10) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, &(0x7f0000000700)='proc!@ppp1!ppp0ppp0#)lo\\lolo{\x00') mount(&(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000200)='fuseblk\x00', 0xa11800, &(0x7f0000000240)) mount(&(0x7f00000002c0)='./file0/file0\x00', &(0x7f0000000300)='./file0/file0\x00', &(0x7f0000000340)='minix\x00', 0x0, &(0x7f0000000380)) 2018/03/29 17:35:06 executing program 3: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)={0xb, 0x7e, 0x3, 0x1, 0x11}, 0x2c) mount(&(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) r1 = socket$kcm(0x29, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000000bc0)={&(0x7f00000007c0)=@rc={0x1f, {0x5, 0x50000000, 0xaa2, 0x613, 0x4, 0x1ff}, 0x3f}, 0x80, &(0x7f0000000940)=[{&(0x7f0000000840)="09c9453aa30d8c5fba221fa2413f12c580837b2ae292e3ee8dd00098c404125a1a2e63840f82a2f69c3927af43b828422484aaeeceebcbe76e999bd3930c9b7c2995484407f9166e39c2069a88b63a980b9b5ffc880f4b89dde5adae6c7fb84ed98cbac860214dfb0b28d1b2e2d58aefebdfe515334f2ffa46be22ef7a4b3a276cb70a27c9e9f5de0a20bad24cbe2b89aee9693c2f8f186ea59fcfc4ebec7188cca0418d4583a6f1730f62416d70cd62555eb4f58ea831d1fea9956a2cba0049f23bf0b249f5de2ce0dc303808d70b0ccab3c7f37e949e", 0xd7}], 0x1, &(0x7f0000000980), 0x0, 0x20004805}, 0x4010) r2 = perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x2367, 0x7fff, 0x1, 0x6, 0x0, 0x78b1, 0x1, 0x0, 0x4992c766, 0xff, 0x81, 0x100, 0x40, 0x3, 0x9, 0x8, 0x1, 0x10000, 0x0, 0x6, 0x90e, 0x9, 0x7ff, 0x0, 0x8, 0x1, 0x30, 0x20, 0x7fffffff, 0x6, 0x0, 0x2, 0x1000, 0x8001, 0x1ff, 0xfffffffffffffff8, 0x0, 0x2, 0x0, @perf_config_ext={0x5, 0x8}, 0x1ab23, 0x3f, 0x8, 0x5, 0x6}, 0xffffffffffffffff, 0x10, r0, 0x1) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0xb, 0x9, &(0x7f0000000580)=@framed={{0x18}, [@map={0x18, 0x0, 0x1, 0x0, r0}, @generic={0x3ff, 0xfffffffffffffffc, 0x1}, @call={0x85, 0x0, 0x0, 0x6}], {0x95}}, &(0x7f0000000600)='syzkaller\x00', 0x0, 0x30, &(0x7f0000000640)=""/48, 0x41f00, 0x1}, 0x48) ioctl$PERF_EVENT_IOC_SET_BPF(r2, 0x40042408, r3) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000000)={&(0x7f0000000080)='./file0/file0\x00', r0}, 0x10) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000400)=@ax25={0x3, {"02f47b3723e03d"}}, 0x80, &(0x7f00000017c0), 0x0, &(0x7f0000001840)=ANY=[], 0x0, 0x24004044}, 0x4008001) bpf$MAP_CREATE(0x0, &(0x7f0000002cc0)={0x5, 0x100, 0x56c96e7a, 0x2, 0xa, 0xffffffffffffffff, 0x9}, 0x2c) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000480)='rpc_pipefs\x00', 0x200000, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000002d00)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f00000004c0)='vmnet0keyring\x00') bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000780)={&(0x7f0000000740)='./file0/file0\x00', r4}, 0x10) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x40082406, &(0x7f0000000700)='proc!@ppp1!ppp0ppp0#)lo\\lolo{\x00') mount(&(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000200)='fuseblk\x00', 0xa11800, &(0x7f0000000240)) r5 = syz_open_dev$sg(&(0x7f0000000240)='/dev/sg#\x00', 0xfffffffffffffffa, 0x800) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000280)={r5, r3, 0x5, 0x1}, 0x10) ioctl$TIOCCONS(r5, 0x541d) mount(&(0x7f00000002c0)='./file0/file0\x00', &(0x7f0000000300)='./file0/file0\x00', &(0x7f0000000340)='minix\x00', 0x1000, &(0x7f0000000380)) 2018/03/29 17:35:06 executing program 4: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)={0xb, 0x7e, 0x3, 0x1, 0x11}, 0x2c) mount(&(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) r1 = socket$kcm(0x29, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000000bc0)={&(0x7f00000007c0)=@rc={0x1f, {0x5, 0x50000000, 0xaa2, 0x613, 0x4, 0x1ff}, 0x3f}, 0x80, &(0x7f0000000940)=[{&(0x7f0000000840)="09c9453aa30d8c5fba221fa2413f12c580837b2ae292e3ee8dd00098c404125a1a2e63840f82a2f69c3927af43b828422484aaeeceebcbe76e999bd3930c9b7c2995484407f9166e39c2069a88b63a980b9b5ffc880f4b89dde5adae6c7fb84ed98cbac860214dfb0b28d1b2e2d58aefebdfe515334f2ffa46be22ef7a4b3a276cb70a27c9e9f5de0a20bad24cbe2b89aee9693c2f8f186ea59fcfc4ebec7188cca0418d4583a6f1730f62416d70cd62555eb4f58ea831d1fea9956a2cba0049f23bf0b249f5de2ce0dc303808d70b0ccab3c7f37e949e", 0xd7}], 0x1, &(0x7f0000000980), 0x0, 0x20004805}, 0x4010) r2 = perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x2367, 0x7fff, 0x1, 0x6, 0x0, 0x78b1, 0x1, 0x0, 0x4992c766, 0xff, 0x81, 0x100, 0x40, 0x3, 0x9, 0x8, 0x1, 0x10000, 0x0, 0x6, 0x90e, 0x9, 0x7ff, 0x0, 0x8, 0x1, 0x30, 0x20, 0x7fffffff, 0x6, 0x401, 0x2, 0x1000, 0x8001, 0x1ff, 0xfffffffffffffff8, 0x0, 0x2, 0x0, @perf_config_ext={0x5, 0x8}, 0x1ab23, 0x3f, 0x8, 0x5, 0x6}, 0xffffffffffffffff, 0x10, r0, 0x1) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0xb, 0x9, &(0x7f0000000580)=@framed={{0x18}, [@map={0x18, 0x0, 0x1, 0x0, r0}, @generic={0x3ff, 0xfffffffffffffffc, 0x1}, @call={0x85, 0x0, 0x0, 0x6}], {0x95}}, &(0x7f0000000600)='syzkaller\x00', 0x0, 0x30, &(0x7f0000000640)=""/48, 0x41f00, 0x1}, 0x48) ioctl$PERF_EVENT_IOC_SET_BPF(r2, 0x40042408, r3) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000000)={&(0x7f0000000080)='./file0/file0\x00', r0}, 0x10) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000400)=@ax25={0x3, {"02f47b3723e03d"}}, 0x80, &(0x7f00000017c0), 0x0, &(0x7f0000001840)=ANY=[], 0x0, 0x24004044}, 0x4008001) bpf$MAP_CREATE(0x0, &(0x7f0000002cc0)={0x0, 0x100, 0x56c96e7a, 0x2, 0xa, 0xffffffffffffffff, 0x9}, 0x2c) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000480)='rpc_pipefs\x00', 0x200000, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000002d00)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f00000004c0)='vmnet0keyring\x00') bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000780)={&(0x7f0000000740)='./file0/file0\x00', r4}, 0x10) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x40082406, &(0x7f0000000700)='proc!@ppp1!ppp0ppp0#)lo\\lolo{\x00') mount(&(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000200)='fuseblk\x00', 0xa11800, &(0x7f0000000240)) r5 = syz_open_dev$sg(&(0x7f0000000240)='/dev/sg#\x00', 0xfffffffffffffffa, 0x800) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000280)={r5, r3, 0x5, 0x1}, 0x10) ioctl$TIOCCONS(r5, 0x541d) mount(&(0x7f00000002c0)='./file0/file0\x00', &(0x7f0000000300)='./file0/file0\x00', &(0x7f0000000340)='minix\x00', 0x1000, &(0x7f0000000380)) 2018/03/29 17:35:06 executing program 6: r0 = socket(0xa, 0x2, 0x0) r1 = open(&(0x7f00004b8ff8)='./file0\x00', 0x28042, 0x0) connect$inet6(r0, &(0x7f0000d3cfe4)={0xa, 0x0, 0x0, @mcast2={0xff, 0x2, [], 0x1}, 0x3}, 0x1c) ioctl$DRM_IOCTL_ADD_CTX(r1, 0xc0086420, &(0x7f0000000000)) ioctl$DRM_IOCTL_NEW_CTX(r1, 0x40086425, &(0x7f0000000080)={0x0, 0x3}) ioctl$SNDRV_TIMER_IOCTL_START(r1, 0x54a0) fallocate(r1, 0x0, 0xffff, 0x1f) connect$inet(r0, &(0x7f0000000040)={0x2, 0x4e22, @multicast1=0xe0000001}, 0x10) sendfile(r0, r1, &(0x7f00005faff8), 0xfffb) 2018/03/29 17:35:06 executing program 1: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)={0xb, 0x7e, 0x3, 0x1, 0x11}, 0x2c) mount(&(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) r1 = socket$kcm(0x29, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000000bc0)={&(0x7f00000007c0)=@rc={0x1f, {0x5, 0x50000000, 0xaa2, 0x613, 0x4, 0x1ff}, 0x3f}, 0x80, &(0x7f0000000940)=[{&(0x7f0000000840)="09c9453aa30d8c5fba221fa2413f12c580837b2ae292e3ee8dd00098c404125a1a2e63840f82a2f69c3927af43b828422484aaeeceebcbe76e999bd3930c9b7c2995484407f9166e39c2069a88b63a980b9b5ffc880f4b89dde5adae6c7fb84ed98cbac860214dfb0b28d1b2e2d58aefebdfe515334f2ffa46be22ef7a4b3a276cb70a27c9e9f5de0a20bad24cbe2b89aee9693c2f8f186ea59fcfc4ebec7188cca0418d4583a6f1730f62416d70cd62555eb4f58ea831d1fea9956a2cba0049f23bf0b249f5de2ce0dc303808d70b0ccab3c7f37e949e", 0xd7}], 0x1, &(0x7f0000000980), 0x0, 0x20004805}, 0x4010) r2 = perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x2367, 0x7fff, 0x1, 0x6, 0x0, 0x78b1, 0x1, 0x0, 0x4992c766, 0xff, 0x81, 0x100, 0x40, 0x3, 0x9, 0x8, 0x1, 0x10000, 0x0, 0x6, 0x90e, 0x9, 0x7ff, 0x0, 0x8, 0x1, 0x30, 0x20, 0x7fffffff, 0x6, 0x401, 0x2, 0x1000, 0x8001, 0x1ff, 0xfffffffffffffff8, 0x0, 0x2, 0x0, @perf_config_ext={0x5, 0x8}, 0x1ab23, 0x3f, 0x8, 0x5, 0x6, 0x0, 0x6}, 0xffffffffffffffff, 0x10, r0, 0x1) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0xb, 0x9, &(0x7f0000000240)=ANY=[@ANYBLOB="18000000010000000000000000000000181000008d6f4e3b9be57c255ede900edd6ee8ae7d1dbc0052d943a4c292691ef4461733ad5998b81ee17770a297c79fe1721e9d3935eec2dd8fa469", @ANYRES32=r0, @ANYBLOB="0000000000000000fffc0100000000000000000000000000850000000600000000000000000000009500000000000000"], &(0x7f0000000600)='syzkaller\x00', 0x0, 0x30, &(0x7f0000000640)=""/48, 0x41f00, 0x1}, 0x48) ioctl$PERF_EVENT_IOC_SET_BPF(r2, 0x40042408, r3) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000000)={&(0x7f0000000080)='./file0/file0\x00', r0}, 0x10) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000400)=@ax25={0x3, {"02f47b3723e03d"}}, 0x80, &(0x7f00000017c0), 0x0, &(0x7f0000001840)=ANY=[], 0x0, 0x24004044}, 0x4008001) bpf$MAP_CREATE(0x0, &(0x7f0000002cc0)={0x5, 0x0, 0x56c96e7a, 0x2, 0xa, 0xffffffffffffffff, 0x9}, 0x2c) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000480)='rpc_pipefs\x00', 0x200000, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000002d00)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f00000004c0)='vmnet0keyring\x00') bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000780)={&(0x7f0000000740)='./file0/file0\x00', r4}, 0x10) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x40082406, &(0x7f0000000700)='proc!@ppp1!ppp0ppp0#)lo\\lolo{\x00') mount(&(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000200)='fuseblk\x00', 0xa11800, &(0x7f0000000240)) 2018/03/29 17:35:06 executing program 0: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)={0xb, 0x7e, 0x3, 0x1, 0x11}, 0x2c) mount(&(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) r1 = socket$kcm(0x29, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000000bc0)={&(0x7f00000007c0)=@rc={0x1f, {0x5, 0x50000000, 0xaa2, 0x613, 0x4, 0x1ff}}, 0x80, &(0x7f0000000940)=[{&(0x7f0000000840)="09c9453aa30d8c5fba221fa2413f12c580837b2ae292e3ee8dd00098c404125a1a2e63840f82a2f69c3927af43b828422484aaeeceebcbe76e999bd3930c9b7c2995484407f9166e39c2069a88b63a980b9b5ffc880f4b89dde5adae6c7fb84ed98cbac860214dfb0b28d1b2e2d58aefebdfe515334f2ffa46be22ef7a4b3a276cb70a27c9e9f5de0a20bad24cbe2b89aee9693c2f8f186ea59fcfc4ebec7188cca0418d4583a6f1730f62416d70cd62555eb4f58ea831d1fea9956a2cba0049f23bf0b249f5de2ce0dc303808d70b0ccab3c7f37e949e", 0xd7}], 0x1, &(0x7f0000000980)}, 0x4010) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0xb, 0x9, &(0x7f0000000580)=@framed={{0x18}, [@map={0x18, 0x0, 0x1, 0x0, r0}, @generic={0x3ff, 0xfffffffffffffffc, 0x1}, @call={0x85, 0x0, 0x0, 0x6}], {0x95}}, &(0x7f0000000600)='syzkaller\x00', 0x0, 0x30, &(0x7f0000000640)=""/48, 0x41f00, 0x1}, 0x48) ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, r2) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000000)={&(0x7f0000000080)='./file0/file0\x00', r0}, 0x10) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000400)=@ax25={0x3, {"02f47b3723e03d"}}, 0x80, &(0x7f00000017c0), 0x0, &(0x7f0000001840)=ANY=[], 0x0, 0x24004044}, 0x4008001) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000002cc0)={0x5, 0x100, 0x56c96e7a, 0x2, 0xa, 0xffffffffffffffff, 0x9}, 0x2c) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000480)='rpc_pipefs\x00', 0x200000, 0x0) fcntl$setstatus(r3, 0x4, 0x46c00) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000002d00)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f00000004c0)='vmnet0keyring\x00') bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000780)={&(0x7f0000000740)='./file0/file0\x00', r4}, 0x10) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, &(0x7f0000000700)='proc!@ppp1!ppp0ppp0#)lo\\lolo{\x00') mount(&(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000200)='fuseblk\x00', 0xa11800, &(0x7f0000000240)) mount(&(0x7f00000002c0)='./file0/file0\x00', &(0x7f0000000300)='./file0/file0\x00', &(0x7f0000000340)='minix\x00', 0x0, &(0x7f0000000380)) 2018/03/29 17:35:06 executing program 2: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)={0xb, 0x7e, 0x3, 0x1, 0x11}, 0x2c) mount(&(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) r1 = socket$kcm(0x29, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000000bc0)={&(0x7f00000007c0)=@rc={0x1f, {0x5, 0x50000000, 0xaa2, 0x613, 0x4, 0x1ff}, 0x3f}, 0x80, &(0x7f0000000940)=[{&(0x7f0000000840)="09c9453aa30d8c5fba221fa2413f12c580837b2ae292e3ee8dd00098c404125a1a2e63840f82a2f69c3927af43b828422484aaeeceebcbe76e999bd3930c9b7c2995484407f9166e39c2069a88b63a980b9b5ffc880f4b89dde5adae6c7fb84ed98cbac860214dfb0b28d1b2e2d58aefebdfe515334f2ffa46be22ef7a4b3a276cb70a27c9e9f5de0a20bad24cbe2b89aee9693c2f8f186ea59fcfc4ebec7188cca0418d4583a6f1730f62416d70cd62555eb4f58ea831d1fea9956a2cba0049f23bf0b249f5de2ce0dc303808d70b0ccab3c7f37e949e", 0xd7}], 0x1, &(0x7f0000000980), 0x0, 0x20004805}, 0x4010) r2 = perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x2367, 0x7fff, 0x1, 0x6, 0x0, 0x78b1, 0x1, 0x0, 0x4992c766, 0xff, 0x81, 0x100, 0x40, 0x3, 0x9, 0x8, 0x1, 0x10000, 0x0, 0x6, 0x90e, 0x9, 0x7ff, 0x0, 0x8, 0x1, 0x30, 0x20, 0x7fffffff, 0x6, 0x401, 0x2, 0x1000, 0x8001, 0x1ff, 0xfffffffffffffff8, 0x0, 0x2, 0x0, @perf_config_ext={0x5, 0x8}, 0x1ab23, 0x0, 0x8, 0x5, 0x6, 0x0, 0x6}, 0xffffffffffffffff, 0x10, r0, 0x1) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0xb, 0x9, &(0x7f0000000580)=@framed={{0x18}, [@map={0x18, 0x0, 0x1, 0x0, r0}, @generic={0x3ff, 0xfffffffffffffffc, 0x1}, @call={0x85, 0x0, 0x0, 0x6}], {0x95}}, &(0x7f0000000600)='syzkaller\x00', 0x0, 0x30, &(0x7f0000000640)=""/48, 0x41f00, 0x1}, 0x48) r4 = fcntl$getown(r3, 0x9) fcntl$setown(r2, 0x8, r4) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000000)={&(0x7f0000000080)='./file0/file0\x00', r0}, 0x10) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000400)=@ax25={0x3, {"02f47b3723e03d"}}, 0x80, &(0x7f00000017c0), 0x0, &(0x7f0000001840)=ANY=[], 0x0, 0x24004044}, 0x4008001) bpf$MAP_CREATE(0x0, &(0x7f0000002cc0)={0x5, 0x0, 0x56c96e7a, 0x2, 0xa, 0xffffffffffffffff, 0x9}, 0x2c) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000480)='rpc_pipefs\x00', 0x200000, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000002d00)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f00000004c0)='vmnet0keyring\x00') bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000780)={&(0x7f0000000740)='./file0/file0\x00', r5}, 0x10) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x40082406, &(0x7f0000000700)='proc!@ppp1!ppp0ppp0#)lo\\lolo{\x00') mount(&(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000200)='fuseblk\x00', 0xa11800, &(0x7f0000000240)) mount(&(0x7f00000002c0)='./file0/file0\x00', &(0x7f0000000300)='./file0/file0\x00', &(0x7f0000000340)='minix\x00', 0x1000, &(0x7f0000000380)) 2018/03/29 17:35:06 executing program 5: r0 = socket(0xa, 0x2, 0x0) r1 = open(&(0x7f0000000200)='./file0\x00', 0x28042, 0x0) connect$inet6(r0, &(0x7f0000d3cfe4)={0xa, 0x0, 0x0, @mcast2={0xff, 0x2, [], 0x1}, 0x3}, 0x1c) ioctl$DRM_IOCTL_ADD_CTX(r1, 0xc0086420, &(0x7f0000000000)) r2 = request_key(&(0x7f00000000c0)='ceph\x00', &(0x7f0000000140)={0x73, 0x79, 0x7a, 0x3}, &(0x7f0000000180)="6d696d655f7479706525d17b00", 0xfffffffffffffffe) keyctl$invalidate(0x15, r2) ioctl$DRM_IOCTL_NEW_CTX(r1, 0x40086425, &(0x7f0000000080)={0x0, 0x3}) fallocate(r1, 0x0, 0xffff, 0x1f) setsockopt$inet6_mtu(0xffffffffffffffff, 0x29, 0x17, &(0x7f0000000100)=0x2, 0x3) sendfile(r0, r1, &(0x7f00000001c0), 0xfffa) 2018/03/29 17:35:06 executing program 1: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)={0xb, 0x7e, 0x3, 0x1, 0x11}, 0x2c) mount(&(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) r1 = socket$kcm(0x29, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000000bc0)={&(0x7f00000007c0)=@rc={0x1f, {0x5, 0x50000000, 0xaa2, 0x613, 0x4, 0x1ff}, 0x3f}, 0x80, &(0x7f0000000940)=[{&(0x7f0000000840)="09c9453aa30d8c5fba221fa2413f12c580837b2ae292e3ee8dd00098c404125a1a2e63840f82a2f69c3927af43b828422484aaeeceebcbe76e999bd3930c9b7c2995484407f9166e39c2069a88b63a980b9b5ffc880f4b89dde5adae6c7fb84ed98cbac860214dfb0b28d1b2e2d58aefebdfe515334f2ffa46be22ef7a4b3a276cb70a27c9e9f5de0a20bad24cbe2b89aee9693c2f8f186ea59fcfc4ebec7188cca0418d4583a6f1730f62416d70cd62555eb4f58ea831d1fea9956a2cba0049f23bf0b249f5de2ce0dc303808d70b0ccab3c7f37e949e", 0xd7}], 0x1, &(0x7f0000000980), 0x0, 0x20004805}, 0x4010) r2 = perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x2367, 0x7fff, 0x1, 0x6, 0x0, 0x78b1, 0x1, 0x0, 0x4992c766, 0xff, 0x81, 0x100, 0x40, 0x3, 0x9, 0x8, 0x1, 0x10000, 0x0, 0x6, 0x90e, 0x9, 0x7ff, 0x0, 0x8, 0x1, 0x30, 0x20, 0x7fffffff, 0x6, 0x401, 0x2, 0x1000, 0x8001, 0x1ff, 0xfffffffffffffff8, 0x0, 0x2, 0x0, @perf_config_ext={0x5, 0x8}, 0x1ab23, 0x3f, 0x8, 0x5, 0x6, 0x0, 0x6}, 0xffffffffffffffff, 0x10, r0, 0x1) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0xb, 0x9, &(0x7f0000000240)=ANY=[@ANYBLOB="18000000010000000000000000000000181000008d6f4e3b9be57c255ede900edd6ee8ae7d1dbc0052d943a4c292691ef4461733ad5998b81ee17770a297c79fe1721e9d3935eec2dd8fa469", @ANYRES32=r0, @ANYBLOB="0000000000000000fffc0100000000000000000000000000850000000600000000000000000000009500000000000000"], &(0x7f0000000600)='syzkaller\x00', 0x0, 0x30, &(0x7f0000000640)=""/48, 0x41f00, 0x1}, 0x48) ioctl$PERF_EVENT_IOC_SET_BPF(r2, 0x40042408, r3) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000000)={&(0x7f0000000080)='./file0/file0\x00', r0}, 0x10) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000400)=@ax25={0x3, {"02f47b3723e03d"}}, 0x80, &(0x7f00000017c0), 0x0, &(0x7f0000001840)=ANY=[], 0x0, 0x24004044}, 0x4008001) bpf$MAP_CREATE(0x0, &(0x7f0000002cc0)={0x5, 0x0, 0x56c96e7a, 0x2, 0xa, 0xffffffffffffffff, 0x9}, 0x2c) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000480)='rpc_pipefs\x00', 0x200000, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000002d00)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f00000004c0)='vmnet0keyring\x00') bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000780)={&(0x7f0000000740)='./file0/file0\x00', r4}, 0x10) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x40082406, &(0x7f0000000700)='proc!@ppp1!ppp0ppp0#)lo\\lolo{\x00') mount(&(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000200)='fuseblk\x00', 0xa11800, &(0x7f0000000240)) 2018/03/29 17:35:06 executing program 4: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)={0xb, 0x7e, 0x3, 0x1, 0x11}, 0x2c) mount(&(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) r1 = socket$kcm(0x29, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000000bc0)={&(0x7f00000007c0)=@rc={0x1f, {0x5, 0x50000000, 0xaa2, 0x613, 0x4, 0x1ff}, 0x3f}, 0x80, &(0x7f0000000940)=[{&(0x7f0000000840)="09c9453aa30d8c5fba221fa2413f12c580837b2ae292e3ee8dd00098c404125a1a2e63840f82a2f69c3927af43b828422484aaeeceebcbe76e999bd3930c9b7c2995484407f9166e39c2069a88b63a980b9b5ffc880f4b89dde5adae6c7fb84ed98cbac860214dfb0b28d1b2e2d58aefebdfe515334f2ffa46be22ef7a4b3a276cb70a27c9e9f5de0a20bad24cbe2b89aee9693c2f8f186ea59fcfc4ebec7188cca0418d4583a6f1730f62416d70cd62555eb4f58ea831d1fea9956a2cba0049f23bf0b249f5de2ce0dc303808d70b0ccab3c7f37e949e", 0xd7}], 0x1, &(0x7f0000000980), 0x0, 0x20004805}, 0x4010) r2 = perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x2367, 0x7fff, 0x1, 0x6, 0x0, 0x78b1, 0x1, 0x0, 0x4992c766, 0xff, 0x81, 0x100, 0x40, 0x3, 0x9, 0x8, 0x1, 0x10000, 0x0, 0x6, 0x90e, 0x9, 0x7ff, 0x0, 0x8, 0x1, 0x30, 0x20, 0x7fffffff, 0x6, 0x401, 0x2, 0x1000, 0x8001, 0x1ff, 0xfffffffffffffff8, 0x0, 0x2, 0x0, @perf_config_ext={0x5, 0x8}, 0x1ab23, 0x3f, 0x8, 0x5, 0x6}, 0xffffffffffffffff, 0x10, r0, 0x1) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0xb, 0x9, &(0x7f0000000580)=@framed={{0x18}, [@map={0x18, 0x0, 0x1, 0x0, r0}, @generic={0x3ff, 0xfffffffffffffffc, 0x1}, @call={0x85, 0x0, 0x0, 0x6}], {0x95}}, &(0x7f0000000600)='syzkaller\x00', 0x0, 0x30, &(0x7f0000000640)=""/48, 0x41f00, 0x1}, 0x48) ioctl$PERF_EVENT_IOC_SET_BPF(r2, 0x40042408, r3) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000000)={&(0x7f0000000080)='./file0/file0\x00', r0}, 0x10) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000400)=@ax25={0x3, {"02f47b3723e03d"}}, 0x80, &(0x7f00000017c0), 0x0, &(0x7f0000001840)=ANY=[], 0x0, 0x24004044}, 0x4008001) bpf$MAP_CREATE(0x0, &(0x7f0000002cc0)={0x0, 0x100, 0x56c96e7a, 0x2, 0xa, 0xffffffffffffffff, 0x9}, 0x2c) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000480)='rpc_pipefs\x00', 0x200000, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000002d00)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f00000004c0)='vmnet0keyring\x00') bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000780)={&(0x7f0000000740)='./file0/file0\x00', r4}, 0x10) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x40082406, &(0x7f0000000700)='proc!@ppp1!ppp0ppp0#)lo\\lolo{\x00') mount(&(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000200)='fuseblk\x00', 0xa11800, &(0x7f0000000240)) r5 = syz_open_dev$sg(&(0x7f0000000240)='/dev/sg#\x00', 0xfffffffffffffffa, 0x800) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000280)={r5, r3, 0x5, 0x1}, 0x10) ioctl$TIOCCONS(r5, 0x541d) mount(&(0x7f00000002c0)='./file0/file0\x00', &(0x7f0000000300)='./file0/file0\x00', &(0x7f0000000340)='minix\x00', 0x1000, &(0x7f0000000380)) 2018/03/29 17:35:06 executing program 3: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)={0xb, 0x7e, 0x3, 0x1, 0x11}, 0x2c) mount(&(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) r1 = socket$kcm(0x29, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000000bc0)={&(0x7f00000007c0)=@rc={0x1f, {0x5, 0x50000000, 0xaa2, 0x613, 0x4, 0x1ff}, 0x3f}, 0x80, &(0x7f0000000940)=[{&(0x7f0000000840)="09c9453aa30d8c5fba221fa2413f12c580837b2ae292e3ee8dd00098c404125a1a2e63840f82a2f69c3927af43b828422484aaeeceebcbe76e999bd3930c9b7c2995484407f9166e39c2069a88b63a980b9b5ffc880f4b89dde5adae6c7fb84ed98cbac860214dfb0b28d1b2e2d58aefebdfe515334f2ffa46be22ef7a4b3a276cb70a27c9e9f5de0a20bad24cbe2b89aee9693c2f8f186ea59fcfc4ebec7188cca0418d4583a6f1730f62416d70cd62555eb4f58ea831d1fea9956a2cba0049f23bf0b249f5de2ce0dc303808d70b0ccab3c7f37e949e", 0xd7}], 0x1, &(0x7f0000000980), 0x0, 0x20004805}, 0x4010) r2 = perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x2367, 0x7fff, 0x1, 0x6, 0x0, 0x78b1, 0x1, 0x0, 0x4992c766, 0xff, 0x81, 0x100, 0x40, 0x3, 0x9, 0x8, 0x1, 0x10000, 0x0, 0x6, 0x90e, 0x9, 0x7ff, 0x0, 0x8, 0x1, 0x30, 0x20, 0x7fffffff, 0x6, 0x0, 0x2, 0x1000, 0x8001, 0x1ff, 0xfffffffffffffff8, 0x0, 0x2, 0x0, @perf_config_ext={0x5, 0x8}, 0x1ab23, 0x3f, 0x8, 0x5, 0x6}, 0xffffffffffffffff, 0x10, r0, 0x1) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0xb, 0x9, &(0x7f0000000580)=@framed={{0x18}, [@map={0x18, 0x0, 0x1, 0x0, r0}, @generic={0x3ff, 0xfffffffffffffffc, 0x1}, @call={0x85, 0x0, 0x0, 0x6}], {0x95}}, &(0x7f0000000600)='syzkaller\x00', 0x0, 0x30, &(0x7f0000000640)=""/48, 0x41f00, 0x1}, 0x48) ioctl$PERF_EVENT_IOC_SET_BPF(r2, 0x40042408, r3) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000000)={&(0x7f0000000080)='./file0/file0\x00', r0}, 0x10) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000400)=@ax25={0x3, {"02f47b3723e03d"}}, 0x80, &(0x7f00000017c0), 0x0, &(0x7f0000001840)=ANY=[], 0x0, 0x24004044}, 0x4008001) bpf$MAP_CREATE(0x0, &(0x7f0000002cc0)={0x5, 0x100, 0x56c96e7a, 0x2, 0xa, 0xffffffffffffffff, 0x9}, 0x2c) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000480)='rpc_pipefs\x00', 0x200000, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000002d00)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f00000004c0)='vmnet0keyring\x00') bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000780)={&(0x7f0000000740)='./file0/file0\x00', r4}, 0x10) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x40082406, &(0x7f0000000700)='proc!@ppp1!ppp0ppp0#)lo\\lolo{\x00') mount(&(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000200)='fuseblk\x00', 0xa11800, &(0x7f0000000240)) r5 = syz_open_dev$sg(&(0x7f0000000240)='/dev/sg#\x00', 0xfffffffffffffffa, 0x800) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000280)={r5, r3, 0x5, 0x1}, 0x10) ioctl$TIOCCONS(r5, 0x541d) 2018/03/29 17:35:06 executing program 6: r0 = socket(0xa, 0x2, 0x0) r1 = open(&(0x7f00004b8ff8)='./file0\x00', 0x28042, 0x0) connect$inet6(r0, &(0x7f0000d3cfe4)={0xa, 0x0, 0x0, @mcast2={0xff, 0x2, [], 0x1}, 0x3}, 0x1c) ioctl$DRM_IOCTL_ADD_CTX(r1, 0xc0086420, &(0x7f0000000000)) ioctl$DRM_IOCTL_NEW_CTX(r1, 0x40086425, &(0x7f0000000080)={0x0, 0x3}) ioctl$SNDRV_TIMER_IOCTL_START(r1, 0x54a0) fallocate(r1, 0x0, 0xffff, 0x1f) connect$inet(r0, &(0x7f0000000040)={0x2, 0x4e22, @multicast1=0xe0000001}, 0x10) sendfile(r0, r1, &(0x7f00005faff8), 0xfffb) 2018/03/29 17:35:06 executing program 7: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)={0xb, 0x7e, 0x3, 0x1, 0x11}, 0x2c) mount(&(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) r1 = socket$kcm(0x29, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000000bc0)={&(0x7f00000007c0)=@rc={0x1f, {0x5, 0x50000000, 0xaa2, 0x613, 0x4, 0x1ff}, 0x3f}, 0x80, &(0x7f0000000940)=[{&(0x7f0000000840)="09c9453aa30d8c5fba221fa2413f12c580837b2ae292e3ee8dd00098c404125a1a2e63840f82a2f69c3927af43b828422484aaeeceebcbe76e999bd3930c9b7c2995484407f9166e39c2069a88b63a980b9b5ffc880f4b89dde5adae6c7fb84ed98cbac860214dfb0b28d1b2e2d58aefebdfe515334f2ffa46be22ef7a4b3a276cb70a27c9e9f5de0a20bad24cbe2b89aee9693c2f8f186ea59fcfc4ebec7188cca0418d4583a6f1730f62416d70cd62555eb4f58ea831d1fea9956a2cba0049f23bf0b249f5de2ce0dc303808d70b0ccab3c7f37e949e", 0xd7}], 0x1, &(0x7f0000000980), 0x0, 0x20004805}, 0x4010) r2 = perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x2367, 0x7fff, 0x1, 0x6, 0x0, 0x78b1, 0x1, 0x0, 0x4992c766, 0xff, 0x81, 0x100, 0x40, 0x3, 0x9, 0x8, 0x1, 0x10000, 0x0, 0x6, 0x90e, 0x9, 0x7ff, 0x0, 0x8, 0x1, 0x30, 0x20, 0x7fffffff, 0x6, 0x401, 0x2, 0x1000, 0x8001, 0x1ff, 0xfffffffffffffff8, 0x0, 0x2, 0x0, @perf_config_ext={0x5, 0x8}, 0x1ab23, 0x3f, 0x8, 0x5, 0x6, 0x0, 0x6}, 0xffffffffffffffff, 0x10, r0, 0x1) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0xb, 0x9, &(0x7f0000000580)=@framed={{0x18}, [@map={0x18, 0x0, 0x1, 0x0, r0}, @generic={0x3ff, 0xfffffffffffffffc, 0x1}, @call={0x85, 0x0, 0x0, 0x6}], {0x95}}, &(0x7f0000000600)='syzkaller\x00', 0x0, 0x30, &(0x7f0000000640)=""/48, 0x41f00, 0x1}, 0x48) ioctl$PERF_EVENT_IOC_SET_BPF(r2, 0x40042408, r3) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000000)={&(0x7f0000000080)='./file0/file0\x00', r0}, 0x10) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000400)=@ax25={0x3, {"02f47b3723e03d"}}, 0x80, &(0x7f00000017c0), 0x0, &(0x7f0000001840)=ANY=[], 0x0, 0x24004044}, 0x4008001) bpf$MAP_CREATE(0x0, &(0x7f0000002cc0)={0x5, 0x0, 0x56c96e7a, 0x2, 0xa, 0xffffffffffffffff, 0x9}, 0x2c) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000480)='rpc_pipefs\x00', 0x200000, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000002d00)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f00000004c0)='vmnet0keyring\x00') bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000780)={&(0x7f0000000740)='./file0/file0\x00', r4}, 0x10) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x40082406, &(0x7f0000000700)='proc!@ppp1!ppp0ppp0#)lo\\lolo{\x00') mount(&(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000240)='./file0/file0\x00', &(0x7f0000000200)='fuseblk\x00', 0xa11800, &(0x7f0000000240)) mount(&(0x7f00000002c0)='./file0/file0\x00', &(0x7f0000000300)='./file0/file0\x00', &(0x7f0000000340)='minix\x00', 0x1000, &(0x7f0000000380)) 2018/03/29 17:35:06 executing program 5: r0 = socket(0xa, 0x2, 0x0) r1 = open(&(0x7f0000000200)='./file0\x00', 0x28042, 0x0) connect$inet6(r0, &(0x7f0000d3cfe4)={0xa, 0x0, 0x0, @mcast2={0xff, 0x2, [], 0x1}, 0x3}, 0x1c) ioctl$DRM_IOCTL_ADD_CTX(r1, 0xc0086420, &(0x7f0000000000)) r2 = request_key(&(0x7f00000000c0)='ceph\x00', &(0x7f0000000140)={0x73, 0x79, 0x7a, 0x3}, &(0x7f0000000180)="6d696d655f7479706525d17b00", 0xfffffffffffffffe) keyctl$invalidate(0x15, r2) ioctl$DRM_IOCTL_NEW_CTX(r1, 0x40086425, &(0x7f0000000080)={0x0, 0x3}) fallocate(r1, 0x0, 0xffff, 0x1f) connect$inet(r0, &(0x7f0000000040)={0x2, 0x4e22, @multicast1=0xe0000001}, 0x10) sendfile(r0, r1, &(0x7f00000001c0), 0xfffa) [ 284.854114] ------------[ cut here ]------------ [ 284.859103] refcount_t: underflow; use-after-free. [ 284.864167] WARNING: CPU: 1 PID: 4488 at lib/refcount.c:187 refcount_sub_and_test+0x167/0x1b0 [ 284.872821] Kernel panic - not syncing: panic_on_warn set ... [ 284.872821] [ 284.880180] CPU: 1 PID: 4488 Comm: syz-executor0 Not tainted 4.16.0-rc7+ #5 [ 284.887270] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 284.896619] Call Trace: [ 284.899214] dump_stack+0x194/0x24d [ 284.902841] ? arch_local_irq_restore+0x53/0x53 [ 284.907514] ? vsnprintf+0x1ed/0x1900 [ 284.911324] panic+0x1e4/0x41c [ 284.914517] ? refcount_error_report+0x214/0x214 [ 284.919271] ? show_regs_print_info+0x18/0x18 [ 284.923774] ? __warn+0x1c1/0x200 [ 284.927227] ? refcount_sub_and_test+0x167/0x1b0 [ 284.931974] __warn+0x1dc/0x200 [ 284.935248] ? refcount_sub_and_test+0x167/0x1b0 [ 284.939997] report_bug+0x1f4/0x2b0 [ 284.943620] fixup_bug.part.11+0x37/0x80 [ 284.947659] do_error_trap+0x2d7/0x3e0 [ 284.951519] ? vprintk_default+0x28/0x30 [ 284.955557] ? math_error+0x400/0x400 [ 284.959329] ? printk+0xaa/0xca [ 284.962584] ? show_regs_print_info+0x18/0x18 [ 284.967061] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 284.971882] do_invalid_op+0x1b/0x20 [ 284.975571] invalid_op+0x1b/0x40 [ 284.978997] RIP: 0010:refcount_sub_and_test+0x167/0x1b0 [ 284.984334] RSP: 0018:ffff8801ad46f620 EFLAGS: 00010286 [ 284.989675] RAX: dffffc0000000008 RBX: 0000000000000000 RCX: ffffffff815b7bde [ 284.996916] RDX: 0000000000000000 RSI: 1ffff10035a8de74 RDI: 1ffff10035a8de49 [ 285.004158] RBP: ffff8801ad46f6b0 R08: 0000000000000000 R09: 0000000000000000 [ 285.011402] R10: ffff8801ad46f558 R11: 0000000000000000 R12: 1ffff10035a8dec5 [ 285.018645] R13: 00000000ffffffff R14: 0000000000000001 R15: ffff8801cdbdc044 [ 285.025912] ? vprintk_func+0x5e/0xc0 [ 285.029697] ? refcount_inc+0x50/0x50 [ 285.033475] ? _raw_spin_unlock+0x22/0x30 [ 285.037599] refcount_dec_and_test+0x1a/0x20 [ 285.041984] rpc_kill_sb+0x253/0x3c0 [ 285.045674] ? rpc_put_sb_net+0x330/0x330 [ 285.049794] ? down_write+0x87/0x120 [ 285.053480] ? down_read+0x150/0x150 [ 285.057174] deactivate_locked_super+0x88/0xd0 [ 285.061731] deactivate_super+0x141/0x1b0 [ 285.065852] ? __sb_start_write+0x2a0/0x2a0 [ 285.070158] cleanup_mnt+0xb2/0x150 [ 285.073760] __cleanup_mnt+0x16/0x20 [ 285.077445] task_work_run+0x199/0x270 [ 285.081308] ? task_work_cancel+0x210/0x210 [ 285.085604] ? free_nsproxy+0x18b/0x1f0 [ 285.089552] ? switch_task_namespaces+0xa2/0xc0 [ 285.094200] do_exit+0x9bb/0x1ad0 [ 285.097633] ? mm_update_next_owner+0x930/0x930 [ 285.102279] ? pipe_write+0x730/0xd60 [ 285.106062] ? lock_downgrade+0x980/0x980 [ 285.110194] ? __lock_is_held+0xb6/0x140 [ 285.114259] ? __sb_end_write+0xa0/0xd0 [ 285.118208] ? pipe_write+0x5d8/0xd60 [ 285.121991] ? __vfs_write+0xf7/0x970 [ 285.125771] ? kernel_read+0x120/0x120 [ 285.129630] ? __do_page_fault+0x5f7/0xc90 [ 285.133840] ? lock_downgrade+0x980/0x980 [ 285.137973] ? fsnotify+0x7b3/0x1140 [ 285.141671] ? fsnotify_first_mark+0x2b0/0x2b0 [ 285.146229] ? rw_verify_area+0xe5/0x2b0 [ 285.150278] ? vfs_write+0x224/0x510 [ 285.153981] do_group_exit+0x149/0x400 [ 285.157841] ? SyS_write+0x184/0x220 [ 285.161528] ? SyS_exit+0x30/0x30 [ 285.164952] ? SyS_read+0x220/0x220 [ 285.168555] ? getname_flags+0x256/0x580 [ 285.172590] ? do_syscall_64+0xb7/0x940 [ 285.176538] ? do_group_exit+0x400/0x400 [ 285.180573] SyS_exit_group+0x1d/0x20 [ 285.184349] do_syscall_64+0x281/0x940 [ 285.188207] ? __do_page_fault+0xc90/0xc90 [ 285.192416] ? trace_event_raw_event_sys_exit+0x260/0x260 [ 285.197927] ? syscall_return_slowpath+0x550/0x550 [ 285.202836] ? entry_SYSCALL_64_after_hwframe+0x52/0xb7 [ 285.208176] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 285.212997] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 285.218162] RIP: 0033:0x4548b9 [ 285.221326] RSP: 002b:00007ffc1f7b7ad8 EFLAGS: 00000246 ORIG_RAX: 00000000000000e7 [ 285.229006] RAX: ffffffffffffffda RBX: 0000000000000001 RCX: 00000000004548b9 [ 285.236256] RDX: 000000000040e930 RSI: 0000000000a44bd0 RDI: 0000000000000045 [ 285.243502] RBP: 00000000004b9416 R08: 000000000000000b R09: 0000000000000000 [ 285.250746] R10: 0000000002037940 R11: 0000000000000246 R12: 0000000002050a00 [ 285.257994] R13: 0000000000000000 R14: 0000000000000011 R15: 0000000000045824 [ 285.265754] Dumping ftrace buffer: [ 285.269452] (ftrace buffer empty) [ 285.273137] Kernel Offset: disabled [ 285.276738] Rebooting in 86400 seconds..