INIT: Entering runlevel: 2 [info] Using makefile-style concurrent boot in runlevel 2. [....] Starting enhanced syslogd: rsyslogd[?25l[?1c7[ ok 8[?25h[?0c. [....] Starting periodic command scheduler: cron[?25l[?1c7[ ok 8[?25h[?0c. [....] Starting OpenBSD Secure Shell server: sshd[?25l[?1c7[ ok 8[?25h[?0c. Debian GNU/Linux 7 syzkaller ttyS0 Warning: Permanently added '10.128.0.24' (ECDSA) to the list of known hosts. 2018/04/21 01:43:23 fuzzer started 2018/04/21 01:43:23 dialing manager at 10.128.0.26:39431 syzkaller login: [ 48.708955] can: request_module (can-proto-0) failed. [ 48.718519] can: request_module (can-proto-0) failed. 2018/04/21 01:43:48 kcov=true, comps=true 2018/04/21 01:43:50 executing program 0: bpf$MAP_CREATE(0x0, &(0x7f0000346fd4)={0x0, 0x0, 0x0, 0x10bd}, 0x2c) r0 = bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0x6, 0x5, &(0x7f0000346fc8)=@framed={{0x18}, [@alu={0x8000000201a7f19, 0x0, 0x201a7fa6, 0x0, 0x1}], {0x95}}, &(0x7f0000f6bffb)='GPL\x00', 0x1, 0x3bc, &(0x7f00001a7f05)=""/251}, 0x46) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000200)={r0, 0x0, 0xe, 0xbb, &(0x7f0000000080)="cab5539618c4aa18d5ff1f6015cf", &(0x7f0000000140)=""/187}, 0x28) 2018/04/21 01:43:50 executing program 2: syz_read_part_table(0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="0200a5ffffff01000000ff07000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) 2018/04/21 01:43:50 executing program 7: r0 = socket$inet(0x2, 0x3, 0x800000000000004) sendto$inet(r0, &(0x7f0000edf000), 0x0, 0x0, &(0x7f0000ee9ff0)={0x2}, 0x10) setsockopt$inet_int(r0, 0x0, 0x17, &(0x7f0000000100)=0x5, 0x4) setsockopt$inet_int(r0, 0x0, 0x6, &(0x7f0000000180)=0xfffffffffffffe01, 0x4) recvmsg(r0, &(0x7f0000bd9000)={0x0, 0x0, &(0x7f0000eee000), 0x0, &(0x7f0000b18faf)=""/81, 0x3a}, 0x0) 2018/04/21 01:43:50 executing program 3: pipe(&(0x7f0000000980)={0xffffffffffffffff, 0xffffffffffffffff}) syz_mount_image$vfat(&(0x7f0000000040)='vfat\x00', &(0x7f00000000c0)='./file0\x00', 0x80000000, 0x3, &(0x7f0000000480)=[{&(0x7f0000000100)="23fc382777912e99182f7c4bd7ccc345a053a5734170ff568bfb603f54b57d8510233f8fc079972ea628cd7111a5a765db957053c016afffea9b40", 0x3b}, {&(0x7f0000000200)="de6a2134ebeda958ef7e6f39150e3dd4cd5e75199571835e1a9d69395da34d7e645f0831a8fadcc32d827f8c3c6b0b3a02143b0b9453", 0x36, 0x47a6}, {&(0x7f0000000340)="6ad6ec06187f23750768f21297761c199d455a97d18e2cbaa7d5", 0x1a, 0xde}], 0x10000, &(0x7f00000003c0)={[{@uid={'uid', 0x3d, [0x30, 0x34, 0x31, 0x31, 0x35, 0x30, 0x34]}, 0x2c}, {@debug='debug', 0x2c}, {@umask={'umask', 0x3d, [0x31]}, 0x2c}, {@debug='debug', 0x2c}]}) vmsplice(r0, &(0x7f00000001c0)=[{&(0x7f0000000080)="a2", 0x1}], 0x1, 0x0) close(r1) ioctl$TIOCMBIC(r0, 0x5417, &(0x7f0000000000)=0x4) syz_mount_image$vfat(&(0x7f0000001800)='vfat\x00', &(0x7f0000001840)='./file0\x00', 0x0, 0xaaaaaaaaaaaab46, &(0x7f0000000440)=[{&(0x7f0000000380), 0xffffffffffffffb6}], 0x0, &(0x7f00000000c0)=ANY=[]) setsockopt$inet6_opts(r0, 0x29, 0x0, &(0x7f0000001880)=@dstopts={0x7b, 0x12, [], [@padn={0x1, 0x7, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}, @jumbo={0xc2, 0x4, 0xffffffff80000001}, @hao={0xc9, 0x10, @mcast1={0xff, 0x1, [], 0x1}}, @hao={0xc9, 0x10}, @padn={0x1, 0x2, [0x0, 0x0]}, @hao={0xc9, 0x10, @dev={0xfe, 0x80, [], 0xd}}, @calipso={0x7, 0x40, {0xfffffffffffffff7, 0xe, 0x64d2, 0x0, [0x4d5c, 0x3c1, 0x3, 0x7fffffff, 0x7, 0x4, 0xff]}}, @enc_lim={0x4, 0x1, 0x9}, @enc_lim={0x4, 0x1, 0x1ff}]}, 0xa0) lseek(r1, 0xfffffffffffffffe, 0x4) 2018/04/21 01:43:50 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_buf(r0, 0x29, 0x40000000000036, &(0x7f0000ec9000)="dc13b51a5b31306e78dd580871ab2144ece470e534cf0195f75d34c82d9d233f08008875c432d64ade0e8ce0442fbc50974e8e1195c604f8000000040002663d75dd0500000000000500000000090838a46611f937f96f7d4ff812a8f9fc3f0716e60000000000000000d359bdeb62e18a769c8600000004f8b9f3aee345d79eee7026fe40be9cda06a2f125e2c3525ad0ffffffffffffffff3dcc8501902d973e668fa3f9b8974fec92b836614657ade6035a6ca6556ddfaeda0896440f396f4b9b3e5a2db8352780dff40bb4937883", 0xd0) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet6_buf(r0, 0x29, 0x39, &(0x7f0000000040), 0x0) 2018/04/21 01:43:50 executing program 4: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x802, 0x0) accept(r0, &(0x7f00000001c0)=@generic, &(0x7f0000000000)=0x80) 2018/04/21 01:43:50 executing program 5: unshare(0x8000400) r0 = syz_open_dev$sg(&(0x7f0000cc9000)='/dev/sg#\x00', 0x0, 0x0) ioctl$LOOP_CHANGE_FD(r0, 0x40049409, r0) 2018/04/21 01:43:50 executing program 6: r0 = socket$inet(0x2, 0x8000a, 0x0) getsockopt$sock_buf(r0, 0x1, 0x1c, &(0x7f00000002c0)=""/187, &(0x7f0000000140)=0xbb) [ 52.752963] IPVS: ftp: loaded support on port[0] = 21 [ 52.771554] IPVS: ftp: loaded support on port[0] = 21 [ 52.851505] IPVS: ftp: loaded support on port[0] = 21 [ 52.954673] IPVS: ftp: loaded support on port[0] = 21 [ 52.959386] IPVS: ftp: loaded support on port[0] = 21 [ 52.961630] IPVS: ftp: loaded support on port[0] = 21 [ 52.993865] IPVS: ftp: loaded support on port[0] = 21 [ 53.005748] IPVS: ftp: loaded support on port[0] = 21 [ 55.041215] bridge0: port 1(bridge_slave_0) entered blocking state [ 55.047726] bridge0: port 1(bridge_slave_0) entered disabled state [ 55.061300] device bridge_slave_0 entered promiscuous mode [ 55.185886] bridge0: port 1(bridge_slave_0) entered blocking state [ 55.192322] bridge0: port 1(bridge_slave_0) entered disabled state [ 55.222126] device bridge_slave_0 entered promiscuous mode [ 55.229513] bridge0: port 1(bridge_slave_0) entered blocking state [ 55.235957] bridge0: port 1(bridge_slave_0) entered disabled state [ 55.243925] device bridge_slave_0 entered promiscuous mode [ 55.274848] bridge0: port 2(bridge_slave_1) entered blocking state [ 55.281299] bridge0: port 2(bridge_slave_1) entered disabled state [ 55.307300] device bridge_slave_1 entered promiscuous mode [ 55.323099] bridge0: port 1(bridge_slave_0) entered blocking state [ 55.329505] bridge0: port 1(bridge_slave_0) entered disabled state [ 55.338494] device bridge_slave_0 entered promiscuous mode [ 55.345517] bridge0: port 1(bridge_slave_0) entered blocking state [ 55.351914] bridge0: port 1(bridge_slave_0) entered disabled state [ 55.360729] device bridge_slave_0 entered promiscuous mode [ 55.369569] bridge0: port 2(bridge_slave_1) entered blocking state [ 55.375945] bridge0: port 2(bridge_slave_1) entered disabled state [ 55.397146] device bridge_slave_1 entered promiscuous mode [ 55.405083] bridge0: port 2(bridge_slave_1) entered blocking state [ 55.411493] bridge0: port 2(bridge_slave_1) entered disabled state [ 55.419613] device bridge_slave_1 entered promiscuous mode [ 55.430894] bridge0: port 1(bridge_slave_0) entered blocking state [ 55.437279] bridge0: port 1(bridge_slave_0) entered disabled state [ 55.451917] device bridge_slave_0 entered promiscuous mode [ 55.459983] bridge0: port 1(bridge_slave_0) entered blocking state [ 55.466380] bridge0: port 1(bridge_slave_0) entered disabled state [ 55.479302] device bridge_slave_0 entered promiscuous mode [ 55.488879] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 55.501114] bridge0: port 1(bridge_slave_0) entered blocking state [ 55.507533] bridge0: port 1(bridge_slave_0) entered disabled state [ 55.518845] device bridge_slave_0 entered promiscuous mode [ 55.527687] bridge0: port 2(bridge_slave_1) entered blocking state [ 55.534088] bridge0: port 2(bridge_slave_1) entered disabled state [ 55.551454] device bridge_slave_1 entered promiscuous mode [ 55.561470] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 55.568734] bridge0: port 2(bridge_slave_1) entered blocking state [ 55.575174] bridge0: port 2(bridge_slave_1) entered disabled state [ 55.583618] device bridge_slave_1 entered promiscuous mode [ 55.596337] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 55.606855] bridge0: port 2(bridge_slave_1) entered blocking state [ 55.613313] bridge0: port 2(bridge_slave_1) entered disabled state [ 55.621704] device bridge_slave_1 entered promiscuous mode [ 55.646170] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 55.653504] bridge0: port 2(bridge_slave_1) entered blocking state [ 55.659924] bridge0: port 2(bridge_slave_1) entered disabled state [ 55.681976] device bridge_slave_1 entered promiscuous mode [ 55.701919] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 55.710676] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 55.719497] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 55.732634] bridge0: port 2(bridge_slave_1) entered blocking state [ 55.739096] bridge0: port 2(bridge_slave_1) entered disabled state [ 55.771897] device bridge_slave_1 entered promiscuous mode [ 55.785647] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 55.801506] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 55.810054] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 55.817443] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 55.833715] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 55.890682] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 55.934610] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 55.954544] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 56.042557] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 56.085688] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 56.125732] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 56.198204] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 56.215871] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 56.225789] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 56.260250] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 56.269337] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 56.341627] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 56.353893] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 56.387603] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 56.397747] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 56.417714] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 56.485210] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 56.492189] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 56.514719] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 56.529763] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 56.538054] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 56.544945] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 56.569403] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 56.576619] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 56.606168] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 56.613129] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 56.636681] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 56.662373] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 56.669517] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 56.676551] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 56.687727] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 56.713990] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 56.721979] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 56.732407] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 56.742611] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 56.749589] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 56.773561] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 56.795604] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 56.834274] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 56.842286] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 56.888216] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 56.895615] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 56.902524] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 56.916853] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 56.981946] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 56.994835] team0: Port device team_slave_0 added [ 57.000874] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 57.009068] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 57.022914] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 57.060870] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 57.077558] team0: Port device team_slave_0 added [ 57.092508] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 57.144385] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 57.179630] team0: Port device team_slave_1 added [ 57.198592] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 57.206064] team0: Port device team_slave_0 added [ 57.214596] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 57.227725] team0: Port device team_slave_0 added [ 57.242195] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 57.255980] team0: Port device team_slave_0 added [ 57.273994] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 57.288616] team0: Port device team_slave_1 added [ 57.323418] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 57.345899] team0: Port device team_slave_0 added [ 57.361059] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 57.373942] team0: Port device team_slave_1 added [ 57.396491] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 57.412413] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 57.419908] team0: Port device team_slave_1 added [ 57.427100] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 57.436631] team0: Port device team_slave_1 added [ 57.445899] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 57.463067] team0: Port device team_slave_0 added [ 57.480495] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 57.492944] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 57.504485] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 57.511636] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 57.519502] team0: Port device team_slave_0 added [ 57.532403] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 57.545894] team0: Port device team_slave_1 added [ 57.557768] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 57.577615] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 57.596000] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 57.604508] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 57.613450] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 57.624354] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 57.632120] team0: Port device team_slave_1 added [ 57.639551] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 57.646461] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 57.661973] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 57.678909] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 57.685836] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 57.697698] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 57.709852] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 57.717221] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 57.732005] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 57.742419] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 57.749399] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 57.759096] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 57.768289] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 57.775862] team0: Port device team_slave_1 added [ 57.783844] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 57.793267] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 57.805693] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 57.815193] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 57.824763] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 57.833327] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 57.840836] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 57.850149] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 57.857794] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 57.888468] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 57.895739] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 57.911850] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 57.941842] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 57.965761] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 57.973420] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 57.981225] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 57.988667] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 57.996446] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 58.003831] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 58.011551] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 58.019134] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 58.026848] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 58.034650] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 58.042525] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 58.052454] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 58.059737] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 58.067811] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 58.077772] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 58.087337] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 58.095334] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 58.106364] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 58.115423] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 58.125503] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 58.133740] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 58.145325] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 58.158915] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 58.173244] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 58.180471] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 58.192370] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 58.200625] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 58.209261] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 58.216367] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 58.225751] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 58.233673] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 58.242294] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 58.257363] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 58.268266] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 58.278456] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 58.286111] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 58.305600] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 58.343378] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 58.357639] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 58.365559] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 58.373678] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 58.387227] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 58.397129] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 58.406751] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 58.437137] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 58.453719] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 58.478493] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 58.493420] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 58.502472] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 58.510589] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 58.534178] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 58.552143] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 58.559267] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 58.597904] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 58.631824] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 58.643670] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 59.628671] bridge0: port 2(bridge_slave_1) entered blocking state [ 59.635255] bridge0: port 2(bridge_slave_1) entered forwarding state [ 59.642412] bridge0: port 1(bridge_slave_0) entered blocking state [ 59.648814] bridge0: port 1(bridge_slave_0) entered forwarding state [ 59.675558] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 59.694167] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 59.708162] bridge0: port 2(bridge_slave_1) entered blocking state [ 59.714548] bridge0: port 2(bridge_slave_1) entered forwarding state [ 59.721232] bridge0: port 1(bridge_slave_0) entered blocking state [ 59.727626] bridge0: port 1(bridge_slave_0) entered forwarding state [ 59.761871] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 59.770916] bridge0: port 2(bridge_slave_1) entered blocking state [ 59.777328] bridge0: port 2(bridge_slave_1) entered forwarding state [ 59.784036] bridge0: port 1(bridge_slave_0) entered blocking state [ 59.790426] bridge0: port 1(bridge_slave_0) entered forwarding state [ 59.803609] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 59.821309] bridge0: port 2(bridge_slave_1) entered blocking state [ 59.827739] bridge0: port 2(bridge_slave_1) entered forwarding state [ 59.834435] bridge0: port 1(bridge_slave_0) entered blocking state [ 59.840827] bridge0: port 1(bridge_slave_0) entered forwarding state [ 59.888921] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 59.897397] bridge0: port 2(bridge_slave_1) entered blocking state [ 59.903802] bridge0: port 2(bridge_slave_1) entered forwarding state [ 59.910485] bridge0: port 1(bridge_slave_0) entered blocking state [ 59.916944] bridge0: port 1(bridge_slave_0) entered forwarding state [ 59.932875] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 59.953772] bridge0: port 2(bridge_slave_1) entered blocking state [ 59.960203] bridge0: port 2(bridge_slave_1) entered forwarding state [ 59.966897] bridge0: port 1(bridge_slave_0) entered blocking state [ 59.973332] bridge0: port 1(bridge_slave_0) entered forwarding state [ 60.029702] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 60.037909] bridge0: port 2(bridge_slave_1) entered blocking state [ 60.044291] bridge0: port 2(bridge_slave_1) entered forwarding state [ 60.050916] bridge0: port 1(bridge_slave_0) entered blocking state [ 60.057268] bridge0: port 1(bridge_slave_0) entered forwarding state [ 60.067109] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 60.080515] bridge0: port 2(bridge_slave_1) entered blocking state [ 60.086946] bridge0: port 2(bridge_slave_1) entered forwarding state [ 60.093583] bridge0: port 1(bridge_slave_0) entered blocking state [ 60.099969] bridge0: port 1(bridge_slave_0) entered forwarding state [ 60.107970] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 60.703787] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 60.714605] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 60.738595] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 60.751319] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 60.758551] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 60.766192] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 60.773854] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 64.864076] 8021q: adding VLAN 0 to HW filter on device bond0 [ 64.941624] 8021q: adding VLAN 0 to HW filter on device bond0 [ 64.985094] 8021q: adding VLAN 0 to HW filter on device bond0 [ 65.005924] 8021q: adding VLAN 0 to HW filter on device bond0 [ 65.035682] 8021q: adding VLAN 0 to HW filter on device bond0 [ 65.143207] 8021q: adding VLAN 0 to HW filter on device bond0 [ 65.165261] 8021q: adding VLAN 0 to HW filter on device bond0 [ 65.185484] 8021q: adding VLAN 0 to HW filter on device bond0 [ 65.359889] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 65.429829] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 65.464424] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 65.529203] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 65.546788] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 65.592544] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 65.614349] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 65.633280] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 65.860919] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 65.867166] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 65.874750] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 65.919199] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 65.925433] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 65.935884] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 65.966988] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 65.973205] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 65.985518] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 66.041336] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 66.047593] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 66.055063] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 66.078861] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 66.085363] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 66.099511] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 66.127144] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 66.138779] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 66.162218] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 66.187245] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 66.194961] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 66.206526] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 66.233418] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 66.247275] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 66.268584] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 66.342080] 8021q: adding VLAN 0 to HW filter on device team0 [ 66.463965] 8021q: adding VLAN 0 to HW filter on device team0 [ 66.484931] 8021q: adding VLAN 0 to HW filter on device team0 [ 66.519133] 8021q: adding VLAN 0 to HW filter on device team0 [ 66.628564] 8021q: adding VLAN 0 to HW filter on device team0 [ 66.654121] 8021q: adding VLAN 0 to HW filter on device team0 [ 66.761715] 8021q: adding VLAN 0 to HW filter on device team0 [ 66.778898] 8021q: adding VLAN 0 to HW filter on device team0 [ 69.349936] loop2: p1 [ 69.352642] loop2: partition table partially beyond EOD, truncated 2018/04/21 01:44:07 executing program 7: r0 = socket$inet(0x2, 0x3, 0x800000000000004) sendto$inet(r0, &(0x7f0000edf000), 0x0, 0x0, &(0x7f0000ee9ff0)={0x2}, 0x10) setsockopt$inet_int(r0, 0x0, 0x17, &(0x7f0000000100)=0x5, 0x4) setsockopt$inet_int(r0, 0x0, 0x6, &(0x7f0000000180)=0xfffffffffffffe01, 0x4) recvmsg(r0, &(0x7f0000bd9000)={0x0, 0x0, &(0x7f0000eee000), 0x0, &(0x7f0000b18faf)=""/81, 0x3a}, 0x0) 2018/04/21 01:44:07 executing program 4: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x802, 0x0) accept(r0, &(0x7f00000001c0)=@generic, &(0x7f0000000000)=0x80) [ 69.394443] loop2: p1 start 1 is beyond EOD, truncated 2018/04/21 01:44:07 executing program 5: unshare(0x8000400) r0 = syz_open_dev$sg(&(0x7f0000cc9000)='/dev/sg#\x00', 0x0, 0x0) ioctl$LOOP_CHANGE_FD(r0, 0x40049409, r0) [ 69.467324] loop2: p1 [ 69.469921] loop2: partition table partially beyond EOD, truncated [ 69.502408] syz-executor6 uses obsolete (PF_INET,SOCK_PACKET) [ 69.511697] loop2: p1 start 1 is beyond EOD, truncated 2018/04/21 01:44:07 executing program 4: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x802, 0x0) accept(r0, &(0x7f00000001c0)=@generic, &(0x7f0000000000)=0x80) [ 69.556131] FAT-fs (loop3): invalid media value (0x70) [ 69.561682] FAT-fs (loop3): Can't find a valid FAT filesystem 2018/04/21 01:44:07 executing program 7: r0 = socket$inet(0x2, 0x3, 0x800000000000004) sendto$inet(r0, &(0x7f0000edf000), 0x0, 0x0, &(0x7f0000ee9ff0)={0x2}, 0x10) setsockopt$inet_int(r0, 0x0, 0x17, &(0x7f0000000100)=0x5, 0x4) setsockopt$inet_int(r0, 0x0, 0x6, &(0x7f0000000180)=0xfffffffffffffe01, 0x4) recvmsg(r0, &(0x7f0000bd9000)={0x0, 0x0, &(0x7f0000eee000), 0x0, &(0x7f0000b18faf)=""/81, 0x3a}, 0x0) 2018/04/21 01:44:07 executing program 2: syz_read_part_table(0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="0200a5ffffff01000000ff07000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) 2018/04/21 01:44:07 executing program 6: r0 = socket$inet(0x2, 0x8000a, 0x0) getsockopt$sock_buf(r0, 0x1, 0x1c, &(0x7f00000002c0)=""/187, &(0x7f0000000140)=0xbb) 2018/04/21 01:44:07 executing program 5: unshare(0x8000400) r0 = syz_open_dev$sg(&(0x7f0000cc9000)='/dev/sg#\x00', 0x0, 0x0) ioctl$LOOP_CHANGE_FD(r0, 0x40049409, r0) [ 69.760669] loop2: p1 [ 69.763295] loop2: partition table partially beyond EOD, truncated [ 69.804285] loop2: p1 start 1 is beyond EOD, truncated 2018/04/21 01:44:08 executing program 4: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x802, 0x0) accept(r0, &(0x7f00000001c0)=@generic, &(0x7f0000000000)=0x80) 2018/04/21 01:44:08 executing program 5: unshare(0x8000400) r0 = syz_open_dev$sg(&(0x7f0000cc9000)='/dev/sg#\x00', 0x0, 0x0) ioctl$LOOP_CHANGE_FD(r0, 0x40049409, r0) 2018/04/21 01:44:08 executing program 6: r0 = socket$inet(0x2, 0x8000a, 0x0) getsockopt$sock_buf(r0, 0x1, 0x1c, &(0x7f00000002c0)=""/187, &(0x7f0000000140)=0xbb) 2018/04/21 01:44:08 executing program 7: r0 = socket$inet(0x2, 0x3, 0x800000000000004) sendto$inet(r0, &(0x7f0000edf000), 0x0, 0x0, &(0x7f0000ee9ff0)={0x2}, 0x10) setsockopt$inet_int(r0, 0x0, 0x17, &(0x7f0000000100)=0x5, 0x4) setsockopt$inet_int(r0, 0x0, 0x6, &(0x7f0000000180)=0xfffffffffffffe01, 0x4) recvmsg(r0, &(0x7f0000bd9000)={0x0, 0x0, &(0x7f0000eee000), 0x0, &(0x7f0000b18faf)=""/81, 0x3a}, 0x0) 2018/04/21 01:44:08 executing program 2: syz_read_part_table(0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="0200a5ffffff01000000ff07000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) 2018/04/21 01:44:08 executing program 0: bpf$MAP_CREATE(0x0, &(0x7f0000346fd4)={0x0, 0x0, 0x0, 0x10bd}, 0x2c) r0 = bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0x6, 0x5, &(0x7f0000346fc8)=@framed={{0x18}, [@alu={0x8000000201a7f19, 0x0, 0x201a7fa6, 0x0, 0x1}], {0x95}}, &(0x7f0000f6bffb)='GPL\x00', 0x1, 0x3bc, &(0x7f00001a7f05)=""/251}, 0x46) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000200)={r0, 0x0, 0xe, 0xbb, &(0x7f0000000080)="cab5539618c4aa18d5ff1f6015cf", &(0x7f0000000140)=""/187}, 0x28) 2018/04/21 01:44:08 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_buf(r0, 0x29, 0x40000000000036, &(0x7f0000ec9000)="dc13b51a5b31306e78dd580871ab2144ece470e534cf0195f75d34c82d9d233f08008875c432d64ade0e8ce0442fbc50974e8e1195c604f8000000040002663d75dd0500000000000500000000090838a46611f937f96f7d4ff812a8f9fc3f0716e60000000000000000d359bdeb62e18a769c8600000004f8b9f3aee345d79eee7026fe40be9cda06a2f125e2c3525ad0ffffffffffffffff3dcc8501902d973e668fa3f9b8974fec92b836614657ade6035a6ca6556ddfaeda0896440f396f4b9b3e5a2db8352780dff40bb4937883", 0xd0) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet6_buf(r0, 0x29, 0x39, &(0x7f0000000040), 0x0) 2018/04/21 01:44:08 executing program 3: pipe(&(0x7f0000000980)={0xffffffffffffffff, 0xffffffffffffffff}) syz_mount_image$vfat(&(0x7f0000000040)='vfat\x00', &(0x7f00000000c0)='./file0\x00', 0x80000000, 0x3, &(0x7f0000000480)=[{&(0x7f0000000100)="23fc382777912e99182f7c4bd7ccc345a053a5734170ff568bfb603f54b57d8510233f8fc079972ea628cd7111a5a765db957053c016afffea9b40", 0x3b}, {&(0x7f0000000200)="de6a2134ebeda958ef7e6f39150e3dd4cd5e75199571835e1a9d69395da34d7e645f0831a8fadcc32d827f8c3c6b0b3a02143b0b9453", 0x36, 0x47a6}, {&(0x7f0000000340)="6ad6ec06187f23750768f21297761c199d455a97d18e2cbaa7d5", 0x1a, 0xde}], 0x10000, &(0x7f00000003c0)={[{@uid={'uid', 0x3d, [0x30, 0x34, 0x31, 0x31, 0x35, 0x30, 0x34]}, 0x2c}, {@debug='debug', 0x2c}, {@umask={'umask', 0x3d, [0x31]}, 0x2c}, {@debug='debug', 0x2c}]}) vmsplice(r0, &(0x7f00000001c0)=[{&(0x7f0000000080)="a2", 0x1}], 0x1, 0x0) close(r1) ioctl$TIOCMBIC(r0, 0x5417, &(0x7f0000000000)=0x4) syz_mount_image$vfat(&(0x7f0000001800)='vfat\x00', &(0x7f0000001840)='./file0\x00', 0x0, 0xaaaaaaaaaaaab46, &(0x7f0000000440)=[{&(0x7f0000000380), 0xffffffffffffffb6}], 0x0, &(0x7f00000000c0)=ANY=[]) setsockopt$inet6_opts(r0, 0x29, 0x0, &(0x7f0000001880)=@dstopts={0x7b, 0x12, [], [@padn={0x1, 0x7, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}, @jumbo={0xc2, 0x4, 0xffffffff80000001}, @hao={0xc9, 0x10, @mcast1={0xff, 0x1, [], 0x1}}, @hao={0xc9, 0x10}, @padn={0x1, 0x2, [0x0, 0x0]}, @hao={0xc9, 0x10, @dev={0xfe, 0x80, [], 0xd}}, @calipso={0x7, 0x40, {0xfffffffffffffff7, 0xe, 0x64d2, 0x0, [0x4d5c, 0x3c1, 0x3, 0x7fffffff, 0x7, 0x4, 0xff]}}, @enc_lim={0x4, 0x1, 0x9}, @enc_lim={0x4, 0x1, 0x1ff}]}, 0xa0) lseek(r1, 0xfffffffffffffffe, 0x4) [ 70.420631] loop2: p1 [ 70.423248] loop2: partition table partially beyond EOD, truncated [ 70.466309] loop2: p1 start 1 is beyond EOD, truncated [ 70.506222] FAT-fs (loop3): invalid media value (0x70) [ 70.511620] FAT-fs (loop3): Can't find a valid FAT filesystem 2018/04/21 01:44:09 executing program 3: pipe(&(0x7f0000000980)={0xffffffffffffffff, 0xffffffffffffffff}) syz_mount_image$vfat(&(0x7f0000000040)='vfat\x00', &(0x7f00000000c0)='./file0\x00', 0x80000000, 0x3, &(0x7f0000000480)=[{&(0x7f0000000100)="23fc382777912e99182f7c4bd7ccc345a053a5734170ff568bfb603f54b57d8510233f8fc079972ea628cd7111a5a765db957053c016afffea9b40", 0x3b}, {&(0x7f0000000200)="de6a2134ebeda958ef7e6f39150e3dd4cd5e75199571835e1a9d69395da34d7e645f0831a8fadcc32d827f8c3c6b0b3a02143b0b9453", 0x36, 0x47a6}, {&(0x7f0000000340)="6ad6ec06187f23750768f21297761c199d455a97d18e2cbaa7d5", 0x1a, 0xde}], 0x10000, &(0x7f00000003c0)={[{@uid={'uid', 0x3d, [0x30, 0x34, 0x31, 0x31, 0x35, 0x30, 0x34]}, 0x2c}, {@debug='debug', 0x2c}, {@umask={'umask', 0x3d, [0x31]}, 0x2c}, {@debug='debug', 0x2c}]}) vmsplice(r0, &(0x7f00000001c0)=[{&(0x7f0000000080)="a2", 0x1}], 0x1, 0x0) close(r1) ioctl$TIOCMBIC(r0, 0x5417, &(0x7f0000000000)=0x4) syz_mount_image$vfat(&(0x7f0000001800)='vfat\x00', &(0x7f0000001840)='./file0\x00', 0x0, 0xaaaaaaaaaaaab46, &(0x7f0000000440)=[{&(0x7f0000000380), 0xffffffffffffffb6}], 0x0, &(0x7f00000000c0)=ANY=[]) setsockopt$inet6_opts(r0, 0x29, 0x0, &(0x7f0000001880)=@dstopts={0x7b, 0x12, [], [@padn={0x1, 0x7, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}, @jumbo={0xc2, 0x4, 0xffffffff80000001}, @hao={0xc9, 0x10, @mcast1={0xff, 0x1, [], 0x1}}, @hao={0xc9, 0x10}, @padn={0x1, 0x2, [0x0, 0x0]}, @hao={0xc9, 0x10, @dev={0xfe, 0x80, [], 0xd}}, @calipso={0x7, 0x40, {0xfffffffffffffff7, 0xe, 0x64d2, 0x0, [0x4d5c, 0x3c1, 0x3, 0x7fffffff, 0x7, 0x4, 0xff]}}, @enc_lim={0x4, 0x1, 0x9}, @enc_lim={0x4, 0x1, 0x1ff}]}, 0xa0) lseek(r1, 0xfffffffffffffffe, 0x4) 2018/04/21 01:44:09 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_buf(r0, 0x29, 0x40000000000036, &(0x7f0000ec9000)="dc13b51a5b31306e78dd580871ab2144ece470e534cf0195f75d34c82d9d233f08008875c432d64ade0e8ce0442fbc50974e8e1195c604f8000000040002663d75dd0500000000000500000000090838a46611f937f96f7d4ff812a8f9fc3f0716e60000000000000000d359bdeb62e18a769c8600000004f8b9f3aee345d79eee7026fe40be9cda06a2f125e2c3525ad0ffffffffffffffff3dcc8501902d973e668fa3f9b8974fec92b836614657ade6035a6ca6556ddfaeda0896440f396f4b9b3e5a2db8352780dff40bb4937883", 0xd0) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet6_buf(r0, 0x29, 0x39, &(0x7f0000000040), 0x0) 2018/04/21 01:44:09 executing program 7: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_buf(r0, 0x29, 0x40000000000036, &(0x7f0000ec9000)="dc13b51a5b31306e78dd580871ab2144ece470e534cf0195f75d34c82d9d233f08008875c432d64ade0e8ce0442fbc50974e8e1195c604f8000000040002663d75dd0500000000000500000000090838a46611f937f96f7d4ff812a8f9fc3f0716e60000000000000000d359bdeb62e18a769c8600000004f8b9f3aee345d79eee7026fe40be9cda06a2f125e2c3525ad0ffffffffffffffff3dcc8501902d973e668fa3f9b8974fec92b836614657ade6035a6ca6556ddfaeda0896440f396f4b9b3e5a2db8352780dff40bb4937883", 0xd0) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet6_buf(r0, 0x29, 0x39, &(0x7f0000000040), 0x0) 2018/04/21 01:44:09 executing program 6: r0 = socket$inet(0x2, 0x8000a, 0x0) getsockopt$sock_buf(r0, 0x1, 0x1c, &(0x7f00000002c0)=""/187, &(0x7f0000000140)=0xbb) 2018/04/21 01:44:09 executing program 2: syz_read_part_table(0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="0200a5ffffff01000000ff07000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) 2018/04/21 01:44:09 executing program 0: bpf$MAP_CREATE(0x0, &(0x7f0000346fd4)={0x0, 0x0, 0x0, 0x10bd}, 0x2c) r0 = bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0x6, 0x5, &(0x7f0000346fc8)=@framed={{0x18}, [@alu={0x8000000201a7f19, 0x0, 0x201a7fa6, 0x0, 0x1}], {0x95}}, &(0x7f0000f6bffb)='GPL\x00', 0x1, 0x3bc, &(0x7f00001a7f05)=""/251}, 0x46) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000200)={r0, 0x0, 0xe, 0xbb, &(0x7f0000000080)="cab5539618c4aa18d5ff1f6015cf", &(0x7f0000000140)=""/187}, 0x28) 2018/04/21 01:44:09 executing program 5: pipe(&(0x7f0000000980)={0xffffffffffffffff, 0xffffffffffffffff}) syz_mount_image$vfat(&(0x7f0000000040)='vfat\x00', &(0x7f00000000c0)='./file0\x00', 0x80000000, 0x3, &(0x7f0000000480)=[{&(0x7f0000000100)="23fc382777912e99182f7c4bd7ccc345a053a5734170ff568bfb603f54b57d8510233f8fc079972ea628cd7111a5a765db957053c016afffea9b40", 0x3b}, {&(0x7f0000000200)="de6a2134ebeda958ef7e6f39150e3dd4cd5e75199571835e1a9d69395da34d7e645f0831a8fadcc32d827f8c3c6b0b3a02143b0b9453", 0x36, 0x47a6}, {&(0x7f0000000340)="6ad6ec06187f23750768f21297761c199d455a97d18e2cbaa7d5", 0x1a, 0xde}], 0x10000, &(0x7f00000003c0)={[{@uid={'uid', 0x3d, [0x30, 0x34, 0x31, 0x31, 0x35, 0x30, 0x34]}, 0x2c}, {@debug='debug', 0x2c}, {@umask={'umask', 0x3d, [0x31]}, 0x2c}, {@debug='debug', 0x2c}]}) vmsplice(r0, &(0x7f00000001c0)=[{&(0x7f0000000080)="a2", 0x1}], 0x1, 0x0) close(r1) ioctl$TIOCMBIC(r0, 0x5417, &(0x7f0000000000)=0x4) syz_mount_image$vfat(&(0x7f0000001800)='vfat\x00', &(0x7f0000001840)='./file0\x00', 0x0, 0xaaaaaaaaaaaab46, &(0x7f0000000440)=[{&(0x7f0000000380), 0xffffffffffffffb6}], 0x0, &(0x7f00000000c0)=ANY=[]) setsockopt$inet6_opts(r0, 0x29, 0x0, &(0x7f0000001880)=@dstopts={0x7b, 0x12, [], [@padn={0x1, 0x7, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}, @jumbo={0xc2, 0x4, 0xffffffff80000001}, @hao={0xc9, 0x10, @mcast1={0xff, 0x1, [], 0x1}}, @hao={0xc9, 0x10}, @padn={0x1, 0x2, [0x0, 0x0]}, @hao={0xc9, 0x10, @dev={0xfe, 0x80, [], 0xd}}, @calipso={0x7, 0x40, {0xfffffffffffffff7, 0xe, 0x64d2, 0x0, [0x4d5c, 0x3c1, 0x3, 0x7fffffff, 0x7, 0x4, 0xff]}}, @enc_lim={0x4, 0x1, 0x9}, @enc_lim={0x4, 0x1, 0x1ff}]}, 0xa0) lseek(r1, 0xfffffffffffffffe, 0x4) 2018/04/21 01:44:09 executing program 4: ioprio_set$pid(0x2, 0x0, 0x7eab) ioprio_get$pid(0x3, 0x0) 2018/04/21 01:44:09 executing program 6: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000040)={&(0x7f0000000000)={0x10}, 0xc, &(0x7f0000007000)={&(0x7f00000001c0)={0x20, 0x2d, 0x80010b, 0x0, 0x0, {0x3}, [@nested={0xc, 0x34000, [@typed={0x8, 0x4001, @uid}]}]}, 0x20}, 0x1}, 0x0) [ 71.373964] loop2: p1 [ 71.376824] loop2: partition table partially beyond EOD, truncated [ 71.382312] FAT-fs (loop5): invalid media value (0x70) [ 71.388629] FAT-fs (loop5): Can't find a valid FAT filesystem [ 71.412368] loop2: p1 start 1 is beyond EOD, truncated 2018/04/21 01:44:09 executing program 0: bpf$MAP_CREATE(0x0, &(0x7f0000346fd4)={0x0, 0x0, 0x0, 0x10bd}, 0x2c) r0 = bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0x6, 0x5, &(0x7f0000346fc8)=@framed={{0x18}, [@alu={0x8000000201a7f19, 0x0, 0x201a7fa6, 0x0, 0x1}], {0x95}}, &(0x7f0000f6bffb)='GPL\x00', 0x1, 0x3bc, &(0x7f00001a7f05)=""/251}, 0x46) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000200)={r0, 0x0, 0xe, 0xbb, &(0x7f0000000080)="cab5539618c4aa18d5ff1f6015cf", &(0x7f0000000140)=""/187}, 0x28) 2018/04/21 01:44:09 executing program 4: ioprio_set$pid(0x2, 0x0, 0x7eab) ioprio_get$pid(0x3, 0x0) [ 71.440663] FAT-fs (loop3): invalid media value (0x70) [ 71.446053] FAT-fs (loop3): Can't find a valid FAT filesystem 2018/04/21 01:44:09 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_buf(r0, 0x29, 0x40000000000036, &(0x7f0000ec9000)="dc13b51a5b31306e78dd580871ab2144ece470e534cf0195f75d34c82d9d233f08008875c432d64ade0e8ce0442fbc50974e8e1195c604f8000000040002663d75dd0500000000000500000000090838a46611f937f96f7d4ff812a8f9fc3f0716e60000000000000000d359bdeb62e18a769c8600000004f8b9f3aee345d79eee7026fe40be9cda06a2f125e2c3525ad0ffffffffffffffff3dcc8501902d973e668fa3f9b8974fec92b836614657ade6035a6ca6556ddfaeda0896440f396f4b9b3e5a2db8352780dff40bb4937883", 0xd0) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet6_buf(r0, 0x29, 0x39, &(0x7f0000000040), 0x0) 2018/04/21 01:44:09 executing program 7: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_buf(r0, 0x29, 0x40000000000036, &(0x7f0000ec9000)="dc13b51a5b31306e78dd580871ab2144ece470e534cf0195f75d34c82d9d233f08008875c432d64ade0e8ce0442fbc50974e8e1195c604f8000000040002663d75dd0500000000000500000000090838a46611f937f96f7d4ff812a8f9fc3f0716e60000000000000000d359bdeb62e18a769c8600000004f8b9f3aee345d79eee7026fe40be9cda06a2f125e2c3525ad0ffffffffffffffff3dcc8501902d973e668fa3f9b8974fec92b836614657ade6035a6ca6556ddfaeda0896440f396f4b9b3e5a2db8352780dff40bb4937883", 0xd0) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet6_buf(r0, 0x29, 0x39, &(0x7f0000000040), 0x0) 2018/04/21 01:44:09 executing program 2: mkdir(&(0x7f0000003d00)='./bus\x00', 0x0) syz_mount_image$hfs(&(0x7f0000000000)='hfs\x00', &(0x7f0000000040)='./bus/file0\x00', 0x0, 0x0, &(0x7f0000000500), 0x0, &(0x7f0000000600)=ANY=[@ANYBLOB='gid=1']) mount(&(0x7f0000000340)='./bus/file0\x00', &(0x7f0000001900)='./bus\x00', &(0x7f0000001940)='hugetlbfs\x00', 0x0, &(0x7f0000000600)) [ 71.683814] hfs: can't find a HFS filesystem on dev loop2 [ 71.721846] hfs: can't find a HFS filesystem on dev loop2 2018/04/21 01:44:10 executing program 6: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000040)={&(0x7f0000000000)={0x10}, 0xc, &(0x7f0000007000)={&(0x7f00000001c0)={0x20, 0x2d, 0x80010b, 0x0, 0x0, {0x3}, [@nested={0xc, 0x34000, [@typed={0x8, 0x4001, @uid}]}]}, 0x20}, 0x1}, 0x0) 2018/04/21 01:44:10 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = perf_event_open(&(0x7f0000001f88)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000fff)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000f1f000/0x2000)=nil, 0x2000, 0x0, 0x11, r2, 0x0) mremap(&(0x7f0000f1f000/0x1000)=nil, 0x1000, 0x1000, 0x3, &(0x7f0000000000/0x1000)=nil) r3 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_X86_SETUP_MCE(r3, 0x4008ae9c, &(0x7f0000000300)) 2018/04/21 01:44:10 executing program 4: ioprio_set$pid(0x2, 0x0, 0x7eab) ioprio_get$pid(0x3, 0x0) 2018/04/21 01:44:10 executing program 7: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_buf(r0, 0x29, 0x40000000000036, &(0x7f0000ec9000)="dc13b51a5b31306e78dd580871ab2144ece470e534cf0195f75d34c82d9d233f08008875c432d64ade0e8ce0442fbc50974e8e1195c604f8000000040002663d75dd0500000000000500000000090838a46611f937f96f7d4ff812a8f9fc3f0716e60000000000000000d359bdeb62e18a769c8600000004f8b9f3aee345d79eee7026fe40be9cda06a2f125e2c3525ad0ffffffffffffffff3dcc8501902d973e668fa3f9b8974fec92b836614657ade6035a6ca6556ddfaeda0896440f396f4b9b3e5a2db8352780dff40bb4937883", 0xd0) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet6_buf(r0, 0x29, 0x39, &(0x7f0000000040), 0x0) 2018/04/21 01:44:10 executing program 1: socketpair$inet_udp(0x2, 0x2, 0x0, &(0x7f0000000280)) perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$ntfs(&(0x7f0000000000)='ntfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="eb52904e544653202020200004", 0xd}], 0x0, &(0x7f000007e200)) r0 = memfd_create(&(0x7f0000000100)="7175655502310000476277d200000000f6ffffff00000000000000000000000000000000000400f93700000000000f5200000400", 0x2) getsockopt$inet_buf(r0, 0x0, 0x3f, &(0x7f0000000140)=""/242, &(0x7f0000000240)=0xf2) r1 = syz_open_dev$sndseq(&(0x7f0000f3eff3)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r1, 0xc08c5332, &(0x7f0000933000)={0x0, 0x0, 0x0, 'queue0\x00'}) ioctl$SNDRV_SEQ_IOCTL_SUBSCRIBE_PORT(r1, 0x40505330, &(0x7f00000002c0)={{0x4, 0x8}, {0x314, 0x7}, 0x5, 0x3, 0x5}) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_INFO(r1, 0xc08c5335, &(0x7f0000000040)={0x0, 0x2000000000000080, 0x400000000000000, "7175655502310000476277d200000000f6ffffff00000000000000000000000000000000000400f93700000000000f5200000400"}) 2018/04/21 01:44:10 executing program 2: mkdir(&(0x7f0000003d00)='./bus\x00', 0x0) syz_mount_image$hfs(&(0x7f0000000000)='hfs\x00', &(0x7f0000000040)='./bus/file0\x00', 0x0, 0x0, &(0x7f0000000500), 0x0, &(0x7f0000000600)=ANY=[@ANYBLOB='gid=1']) mount(&(0x7f0000000340)='./bus/file0\x00', &(0x7f0000001900)='./bus\x00', &(0x7f0000001940)='hugetlbfs\x00', 0x0, &(0x7f0000000600)) 2018/04/21 01:44:10 executing program 3: pipe(&(0x7f0000000980)={0xffffffffffffffff, 0xffffffffffffffff}) syz_mount_image$vfat(&(0x7f0000000040)='vfat\x00', &(0x7f00000000c0)='./file0\x00', 0x80000000, 0x3, &(0x7f0000000480)=[{&(0x7f0000000100)="23fc382777912e99182f7c4bd7ccc345a053a5734170ff568bfb603f54b57d8510233f8fc079972ea628cd7111a5a765db957053c016afffea9b40", 0x3b}, {&(0x7f0000000200)="de6a2134ebeda958ef7e6f39150e3dd4cd5e75199571835e1a9d69395da34d7e645f0831a8fadcc32d827f8c3c6b0b3a02143b0b9453", 0x36, 0x47a6}, {&(0x7f0000000340)="6ad6ec06187f23750768f21297761c199d455a97d18e2cbaa7d5", 0x1a, 0xde}], 0x10000, &(0x7f00000003c0)={[{@uid={'uid', 0x3d, [0x30, 0x34, 0x31, 0x31, 0x35, 0x30, 0x34]}, 0x2c}, {@debug='debug', 0x2c}, {@umask={'umask', 0x3d, [0x31]}, 0x2c}, {@debug='debug', 0x2c}]}) vmsplice(r0, &(0x7f00000001c0)=[{&(0x7f0000000080)="a2", 0x1}], 0x1, 0x0) close(r1) ioctl$TIOCMBIC(r0, 0x5417, &(0x7f0000000000)=0x4) syz_mount_image$vfat(&(0x7f0000001800)='vfat\x00', &(0x7f0000001840)='./file0\x00', 0x0, 0xaaaaaaaaaaaab46, &(0x7f0000000440)=[{&(0x7f0000000380), 0xffffffffffffffb6}], 0x0, &(0x7f00000000c0)=ANY=[]) setsockopt$inet6_opts(r0, 0x29, 0x0, &(0x7f0000001880)=@dstopts={0x7b, 0x12, [], [@padn={0x1, 0x7, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}, @jumbo={0xc2, 0x4, 0xffffffff80000001}, @hao={0xc9, 0x10, @mcast1={0xff, 0x1, [], 0x1}}, @hao={0xc9, 0x10}, @padn={0x1, 0x2, [0x0, 0x0]}, @hao={0xc9, 0x10, @dev={0xfe, 0x80, [], 0xd}}, @calipso={0x7, 0x40, {0xfffffffffffffff7, 0xe, 0x64d2, 0x0, [0x4d5c, 0x3c1, 0x3, 0x7fffffff, 0x7, 0x4, 0xff]}}, @enc_lim={0x4, 0x1, 0x9}, @enc_lim={0x4, 0x1, 0x1ff}]}, 0xa0) lseek(r1, 0xfffffffffffffffe, 0x4) 2018/04/21 01:44:10 executing program 5: pipe(&(0x7f0000000980)={0xffffffffffffffff, 0xffffffffffffffff}) syz_mount_image$vfat(&(0x7f0000000040)='vfat\x00', &(0x7f00000000c0)='./file0\x00', 0x80000000, 0x3, &(0x7f0000000480)=[{&(0x7f0000000100)="23fc382777912e99182f7c4bd7ccc345a053a5734170ff568bfb603f54b57d8510233f8fc079972ea628cd7111a5a765db957053c016afffea9b40", 0x3b}, {&(0x7f0000000200)="de6a2134ebeda958ef7e6f39150e3dd4cd5e75199571835e1a9d69395da34d7e645f0831a8fadcc32d827f8c3c6b0b3a02143b0b9453", 0x36, 0x47a6}, {&(0x7f0000000340)="6ad6ec06187f23750768f21297761c199d455a97d18e2cbaa7d5", 0x1a, 0xde}], 0x10000, &(0x7f00000003c0)={[{@uid={'uid', 0x3d, [0x30, 0x34, 0x31, 0x31, 0x35, 0x30, 0x34]}, 0x2c}, {@debug='debug', 0x2c}, {@umask={'umask', 0x3d, [0x31]}, 0x2c}, {@debug='debug', 0x2c}]}) vmsplice(r0, &(0x7f00000001c0)=[{&(0x7f0000000080)="a2", 0x1}], 0x1, 0x0) close(r1) ioctl$TIOCMBIC(r0, 0x5417, &(0x7f0000000000)=0x4) syz_mount_image$vfat(&(0x7f0000001800)='vfat\x00', &(0x7f0000001840)='./file0\x00', 0x0, 0xaaaaaaaaaaaab46, &(0x7f0000000440)=[{&(0x7f0000000380), 0xffffffffffffffb6}], 0x0, &(0x7f00000000c0)=ANY=[]) setsockopt$inet6_opts(r0, 0x29, 0x0, &(0x7f0000001880)=@dstopts={0x7b, 0x12, [], [@padn={0x1, 0x7, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}, @jumbo={0xc2, 0x4, 0xffffffff80000001}, @hao={0xc9, 0x10, @mcast1={0xff, 0x1, [], 0x1}}, @hao={0xc9, 0x10}, @padn={0x1, 0x2, [0x0, 0x0]}, @hao={0xc9, 0x10, @dev={0xfe, 0x80, [], 0xd}}, @calipso={0x7, 0x40, {0xfffffffffffffff7, 0xe, 0x64d2, 0x0, [0x4d5c, 0x3c1, 0x3, 0x7fffffff, 0x7, 0x4, 0xff]}}, @enc_lim={0x4, 0x1, 0x9}, @enc_lim={0x4, 0x1, 0x1ff}]}, 0xa0) lseek(r1, 0xfffffffffffffffe, 0x4) [ 72.344792] ntfs: (device loop1): ntfs_fill_super(): Unable to determine device size. [ 72.345167] hfs: can't find a HFS filesystem on dev loop2 [ 72.359175] FAT-fs (loop5): invalid media value (0x70) [ 72.364629] FAT-fs (loop5): Can't find a valid FAT filesystem [ 72.388596] FAT-fs (loop3): invalid media value (0x70) 2018/04/21 01:44:10 executing program 4: ioprio_set$pid(0x2, 0x0, 0x7eab) ioprio_get$pid(0x3, 0x0) [ 72.394008] FAT-fs (loop3): Can't find a valid FAT filesystem 2018/04/21 01:44:10 executing program 6: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000040)={&(0x7f0000000000)={0x10}, 0xc, &(0x7f0000007000)={&(0x7f00000001c0)={0x20, 0x2d, 0x80010b, 0x0, 0x0, {0x3}, [@nested={0xc, 0x34000, [@typed={0x8, 0x4001, @uid}]}]}, 0x20}, 0x1}, 0x0) [ 72.432576] ntfs: (device loop1): ntfs_fill_super(): Unable to determine device size. 2018/04/21 01:44:10 executing program 7: mkdir(&(0x7f0000003d00)='./bus\x00', 0x0) syz_mount_image$hfs(&(0x7f0000000000)='hfs\x00', &(0x7f0000000040)='./bus/file0\x00', 0x0, 0x0, &(0x7f0000000500), 0x0, &(0x7f0000000600)=ANY=[@ANYBLOB='gid=1']) mount(&(0x7f0000000340)='./bus/file0\x00', &(0x7f0000001900)='./bus\x00', &(0x7f0000001940)='hugetlbfs\x00', 0x0, &(0x7f0000000600)) 2018/04/21 01:44:10 executing program 4: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup\x00', 0x200002, 0x0) r1 = openat$cgroup_int(r0, &(0x7f0000000100)='memory.high\x00', 0x2, 0x0) write$cgroup_type(r1, &(0x7f0000000000)='Threaded\x00', 0x1) 2018/04/21 01:44:10 executing program 1: socketpair$inet_udp(0x2, 0x2, 0x0, &(0x7f0000000280)) perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$ntfs(&(0x7f0000000000)='ntfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="eb52904e544653202020200004", 0xd}], 0x0, &(0x7f000007e200)) r0 = memfd_create(&(0x7f0000000100)="7175655502310000476277d200000000f6ffffff00000000000000000000000000000000000400f93700000000000f5200000400", 0x2) getsockopt$inet_buf(r0, 0x0, 0x3f, &(0x7f0000000140)=""/242, &(0x7f0000000240)=0xf2) r1 = syz_open_dev$sndseq(&(0x7f0000f3eff3)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r1, 0xc08c5332, &(0x7f0000933000)={0x0, 0x0, 0x0, 'queue0\x00'}) ioctl$SNDRV_SEQ_IOCTL_SUBSCRIBE_PORT(r1, 0x40505330, &(0x7f00000002c0)={{0x4, 0x8}, {0x314, 0x7}, 0x5, 0x3, 0x5}) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_INFO(r1, 0xc08c5335, &(0x7f0000000040)={0x0, 0x2000000000000080, 0x400000000000000, "7175655502310000476277d200000000f6ffffff00000000000000000000000000000000000400f93700000000000f5200000400"}) 2018/04/21 01:44:10 executing program 6: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000040)={&(0x7f0000000000)={0x10}, 0xc, &(0x7f0000007000)={&(0x7f00000001c0)={0x20, 0x2d, 0x80010b, 0x0, 0x0, {0x3}, [@nested={0xc, 0x34000, [@typed={0x8, 0x4001, @uid}]}]}, 0x20}, 0x1}, 0x0) 2018/04/21 01:44:10 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = perf_event_open(&(0x7f0000001f88)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000fff)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000f1f000/0x2000)=nil, 0x2000, 0x0, 0x11, r2, 0x0) mremap(&(0x7f0000f1f000/0x1000)=nil, 0x1000, 0x1000, 0x3, &(0x7f0000000000/0x1000)=nil) r3 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_X86_SETUP_MCE(r3, 0x4008ae9c, &(0x7f0000000300)) 2018/04/21 01:44:10 executing program 2: mkdir(&(0x7f0000003d00)='./bus\x00', 0x0) syz_mount_image$hfs(&(0x7f0000000000)='hfs\x00', &(0x7f0000000040)='./bus/file0\x00', 0x0, 0x0, &(0x7f0000000500), 0x0, &(0x7f0000000600)=ANY=[@ANYBLOB='gid=1']) mount(&(0x7f0000000340)='./bus/file0\x00', &(0x7f0000001900)='./bus\x00', &(0x7f0000001940)='hugetlbfs\x00', 0x0, &(0x7f0000000600)) [ 72.597955] hfs: can't find a HFS filesystem on dev loop7 [ 72.724700] ntfs: (device loop1): ntfs_fill_super(): Unable to determine device size. [ 72.733959] hfs: can't find a HFS filesystem on dev loop2 2018/04/21 01:44:11 executing program 7: mkdir(&(0x7f0000003d00)='./bus\x00', 0x0) syz_mount_image$hfs(&(0x7f0000000000)='hfs\x00', &(0x7f0000000040)='./bus/file0\x00', 0x0, 0x0, &(0x7f0000000500), 0x0, &(0x7f0000000600)=ANY=[@ANYBLOB='gid=1']) mount(&(0x7f0000000340)='./bus/file0\x00', &(0x7f0000001900)='./bus\x00', &(0x7f0000001940)='hugetlbfs\x00', 0x0, &(0x7f0000000600)) 2018/04/21 01:44:11 executing program 3: socketpair$inet_udp(0x2, 0x2, 0x0, &(0x7f0000000280)) perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$ntfs(&(0x7f0000000000)='ntfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="eb52904e544653202020200004", 0xd}], 0x0, &(0x7f000007e200)) r0 = memfd_create(&(0x7f0000000100)="7175655502310000476277d200000000f6ffffff00000000000000000000000000000000000400f93700000000000f5200000400", 0x2) getsockopt$inet_buf(r0, 0x0, 0x3f, &(0x7f0000000140)=""/242, &(0x7f0000000240)=0xf2) r1 = syz_open_dev$sndseq(&(0x7f0000f3eff3)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r1, 0xc08c5332, &(0x7f0000933000)={0x0, 0x0, 0x0, 'queue0\x00'}) ioctl$SNDRV_SEQ_IOCTL_SUBSCRIBE_PORT(r1, 0x40505330, &(0x7f00000002c0)={{0x4, 0x8}, {0x314, 0x7}, 0x5, 0x3, 0x5}) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_INFO(r1, 0xc08c5335, &(0x7f0000000040)={0x0, 0x2000000000000080, 0x400000000000000, "7175655502310000476277d200000000f6ffffff00000000000000000000000000000000000400f93700000000000f5200000400"}) 2018/04/21 01:44:11 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = perf_event_open(&(0x7f0000001f88)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000fff)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000f1f000/0x2000)=nil, 0x2000, 0x0, 0x11, r2, 0x0) mremap(&(0x7f0000f1f000/0x1000)=nil, 0x1000, 0x1000, 0x3, &(0x7f0000000000/0x1000)=nil) r3 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_X86_SETUP_MCE(r3, 0x4008ae9c, &(0x7f0000000300)) 2018/04/21 01:44:11 executing program 6: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = perf_event_open(&(0x7f0000001f88)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000fff)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000f1f000/0x2000)=nil, 0x2000, 0x0, 0x11, r2, 0x0) mremap(&(0x7f0000f1f000/0x1000)=nil, 0x1000, 0x1000, 0x3, &(0x7f0000000000/0x1000)=nil) r3 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_X86_SETUP_MCE(r3, 0x4008ae9c, &(0x7f0000000300)) 2018/04/21 01:44:11 executing program 4: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup\x00', 0x200002, 0x0) r1 = openat$cgroup_int(r0, &(0x7f0000000100)='memory.high\x00', 0x2, 0x0) write$cgroup_type(r1, &(0x7f0000000000)='Threaded\x00', 0x1) 2018/04/21 01:44:11 executing program 2: mkdir(&(0x7f0000003d00)='./bus\x00', 0x0) syz_mount_image$hfs(&(0x7f0000000000)='hfs\x00', &(0x7f0000000040)='./bus/file0\x00', 0x0, 0x0, &(0x7f0000000500), 0x0, &(0x7f0000000600)=ANY=[@ANYBLOB='gid=1']) mount(&(0x7f0000000340)='./bus/file0\x00', &(0x7f0000001900)='./bus\x00', &(0x7f0000001940)='hugetlbfs\x00', 0x0, &(0x7f0000000600)) 2018/04/21 01:44:11 executing program 1: socketpair$inet_udp(0x2, 0x2, 0x0, &(0x7f0000000280)) perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$ntfs(&(0x7f0000000000)='ntfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="eb52904e544653202020200004", 0xd}], 0x0, &(0x7f000007e200)) r0 = memfd_create(&(0x7f0000000100)="7175655502310000476277d200000000f6ffffff00000000000000000000000000000000000400f93700000000000f5200000400", 0x2) getsockopt$inet_buf(r0, 0x0, 0x3f, &(0x7f0000000140)=""/242, &(0x7f0000000240)=0xf2) r1 = syz_open_dev$sndseq(&(0x7f0000f3eff3)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r1, 0xc08c5332, &(0x7f0000933000)={0x0, 0x0, 0x0, 'queue0\x00'}) ioctl$SNDRV_SEQ_IOCTL_SUBSCRIBE_PORT(r1, 0x40505330, &(0x7f00000002c0)={{0x4, 0x8}, {0x314, 0x7}, 0x5, 0x3, 0x5}) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_INFO(r1, 0xc08c5335, &(0x7f0000000040)={0x0, 0x2000000000000080, 0x400000000000000, "7175655502310000476277d200000000f6ffffff00000000000000000000000000000000000400f93700000000000f5200000400"}) 2018/04/21 01:44:11 executing program 5: pipe(&(0x7f0000000980)={0xffffffffffffffff, 0xffffffffffffffff}) syz_mount_image$vfat(&(0x7f0000000040)='vfat\x00', &(0x7f00000000c0)='./file0\x00', 0x80000000, 0x3, &(0x7f0000000480)=[{&(0x7f0000000100)="23fc382777912e99182f7c4bd7ccc345a053a5734170ff568bfb603f54b57d8510233f8fc079972ea628cd7111a5a765db957053c016afffea9b40", 0x3b}, {&(0x7f0000000200)="de6a2134ebeda958ef7e6f39150e3dd4cd5e75199571835e1a9d69395da34d7e645f0831a8fadcc32d827f8c3c6b0b3a02143b0b9453", 0x36, 0x47a6}, {&(0x7f0000000340)="6ad6ec06187f23750768f21297761c199d455a97d18e2cbaa7d5", 0x1a, 0xde}], 0x10000, &(0x7f00000003c0)={[{@uid={'uid', 0x3d, [0x30, 0x34, 0x31, 0x31, 0x35, 0x30, 0x34]}, 0x2c}, {@debug='debug', 0x2c}, {@umask={'umask', 0x3d, [0x31]}, 0x2c}, {@debug='debug', 0x2c}]}) vmsplice(r0, &(0x7f00000001c0)=[{&(0x7f0000000080)="a2", 0x1}], 0x1, 0x0) close(r1) ioctl$TIOCMBIC(r0, 0x5417, &(0x7f0000000000)=0x4) syz_mount_image$vfat(&(0x7f0000001800)='vfat\x00', &(0x7f0000001840)='./file0\x00', 0x0, 0xaaaaaaaaaaaab46, &(0x7f0000000440)=[{&(0x7f0000000380), 0xffffffffffffffb6}], 0x0, &(0x7f00000000c0)=ANY=[]) setsockopt$inet6_opts(r0, 0x29, 0x0, &(0x7f0000001880)=@dstopts={0x7b, 0x12, [], [@padn={0x1, 0x7, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}, @jumbo={0xc2, 0x4, 0xffffffff80000001}, @hao={0xc9, 0x10, @mcast1={0xff, 0x1, [], 0x1}}, @hao={0xc9, 0x10}, @padn={0x1, 0x2, [0x0, 0x0]}, @hao={0xc9, 0x10, @dev={0xfe, 0x80, [], 0xd}}, @calipso={0x7, 0x40, {0xfffffffffffffff7, 0xe, 0x64d2, 0x0, [0x4d5c, 0x3c1, 0x3, 0x7fffffff, 0x7, 0x4, 0xff]}}, @enc_lim={0x4, 0x1, 0x9}, @enc_lim={0x4, 0x1, 0x1ff}]}, 0xa0) lseek(r1, 0xfffffffffffffffe, 0x4) [ 73.315958] hfs: can't find a HFS filesystem on dev loop2 [ 73.316820] hfs: can't find a HFS filesystem on dev loop7 [ 73.329924] ntfs: (device loop3): ntfs_fill_super(): Unable to determine device size. [ 73.340436] ntfs: (device loop1): ntfs_fill_super(): Unable to determine device size. [ 73.354955] FAT-fs (loop5): invalid media value (0x70) [ 73.360407] FAT-fs (loop5): Can't find a valid FAT filesystem 2018/04/21 01:44:11 executing program 4: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup\x00', 0x200002, 0x0) r1 = openat$cgroup_int(r0, &(0x7f0000000100)='memory.high\x00', 0x2, 0x0) write$cgroup_type(r1, &(0x7f0000000000)='Threaded\x00', 0x1) 2018/04/21 01:44:11 executing program 3: socketpair$inet_udp(0x2, 0x2, 0x0, &(0x7f0000000280)) perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$ntfs(&(0x7f0000000000)='ntfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="eb52904e544653202020200004", 0xd}], 0x0, &(0x7f000007e200)) r0 = memfd_create(&(0x7f0000000100)="7175655502310000476277d200000000f6ffffff00000000000000000000000000000000000400f93700000000000f5200000400", 0x2) getsockopt$inet_buf(r0, 0x0, 0x3f, &(0x7f0000000140)=""/242, &(0x7f0000000240)=0xf2) r1 = syz_open_dev$sndseq(&(0x7f0000f3eff3)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r1, 0xc08c5332, &(0x7f0000933000)={0x0, 0x0, 0x0, 'queue0\x00'}) ioctl$SNDRV_SEQ_IOCTL_SUBSCRIBE_PORT(r1, 0x40505330, &(0x7f00000002c0)={{0x4, 0x8}, {0x314, 0x7}, 0x5, 0x3, 0x5}) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_INFO(r1, 0xc08c5335, &(0x7f0000000040)={0x0, 0x2000000000000080, 0x400000000000000, "7175655502310000476277d200000000f6ffffff00000000000000000000000000000000000400f93700000000000f5200000400"}) 2018/04/21 01:44:11 executing program 6: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = perf_event_open(&(0x7f0000001f88)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000fff)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000f1f000/0x2000)=nil, 0x2000, 0x0, 0x11, r2, 0x0) mremap(&(0x7f0000f1f000/0x1000)=nil, 0x1000, 0x1000, 0x3, &(0x7f0000000000/0x1000)=nil) r3 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_X86_SETUP_MCE(r3, 0x4008ae9c, &(0x7f0000000300)) 2018/04/21 01:44:11 executing program 7: mkdir(&(0x7f0000003d00)='./bus\x00', 0x0) syz_mount_image$hfs(&(0x7f0000000000)='hfs\x00', &(0x7f0000000040)='./bus/file0\x00', 0x0, 0x0, &(0x7f0000000500), 0x0, &(0x7f0000000600)=ANY=[@ANYBLOB='gid=1']) mount(&(0x7f0000000340)='./bus/file0\x00', &(0x7f0000001900)='./bus\x00', &(0x7f0000001940)='hugetlbfs\x00', 0x0, &(0x7f0000000600)) 2018/04/21 01:44:11 executing program 2: socketpair$inet_udp(0x2, 0x2, 0x0, &(0x7f0000000280)) perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$ntfs(&(0x7f0000000000)='ntfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="eb52904e544653202020200004", 0xd}], 0x0, &(0x7f000007e200)) r0 = memfd_create(&(0x7f0000000100)="7175655502310000476277d200000000f6ffffff00000000000000000000000000000000000400f93700000000000f5200000400", 0x2) getsockopt$inet_buf(r0, 0x0, 0x3f, &(0x7f0000000140)=""/242, &(0x7f0000000240)=0xf2) r1 = syz_open_dev$sndseq(&(0x7f0000f3eff3)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r1, 0xc08c5332, &(0x7f0000933000)={0x0, 0x0, 0x0, 'queue0\x00'}) ioctl$SNDRV_SEQ_IOCTL_SUBSCRIBE_PORT(r1, 0x40505330, &(0x7f00000002c0)={{0x4, 0x8}, {0x314, 0x7}, 0x5, 0x3, 0x5}) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_INFO(r1, 0xc08c5335, &(0x7f0000000040)={0x0, 0x2000000000000080, 0x400000000000000, "7175655502310000476277d200000000f6ffffff00000000000000000000000000000000000400f93700000000000f5200000400"}) 2018/04/21 01:44:11 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = perf_event_open(&(0x7f0000001f88)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000fff)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000f1f000/0x2000)=nil, 0x2000, 0x0, 0x11, r2, 0x0) mremap(&(0x7f0000f1f000/0x1000)=nil, 0x1000, 0x1000, 0x3, &(0x7f0000000000/0x1000)=nil) r3 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_X86_SETUP_MCE(r3, 0x4008ae9c, &(0x7f0000000300)) [ 73.556830] ntfs: (device loop3): ntfs_fill_super(): Unable to determine device size. 2018/04/21 01:44:11 executing program 1: socketpair$inet_udp(0x2, 0x2, 0x0, &(0x7f0000000280)) perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$ntfs(&(0x7f0000000000)='ntfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="eb52904e544653202020200004", 0xd}], 0x0, &(0x7f000007e200)) r0 = memfd_create(&(0x7f0000000100)="7175655502310000476277d200000000f6ffffff00000000000000000000000000000000000400f93700000000000f5200000400", 0x2) getsockopt$inet_buf(r0, 0x0, 0x3f, &(0x7f0000000140)=""/242, &(0x7f0000000240)=0xf2) r1 = syz_open_dev$sndseq(&(0x7f0000f3eff3)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r1, 0xc08c5332, &(0x7f0000933000)={0x0, 0x0, 0x0, 'queue0\x00'}) ioctl$SNDRV_SEQ_IOCTL_SUBSCRIBE_PORT(r1, 0x40505330, &(0x7f00000002c0)={{0x4, 0x8}, {0x314, 0x7}, 0x5, 0x3, 0x5}) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_INFO(r1, 0xc08c5335, &(0x7f0000000040)={0x0, 0x2000000000000080, 0x400000000000000, "7175655502310000476277d200000000f6ffffff00000000000000000000000000000000000400f93700000000000f5200000400"}) [ 73.601438] hfs: can't find a HFS filesystem on dev loop7 [ 73.653467] ntfs: (device loop2): ntfs_fill_super(): Unable to determine device size. [ 73.721903] ntfs: (device loop1): ntfs_fill_super(): Unable to determine device size. 2018/04/21 01:44:11 executing program 6: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = perf_event_open(&(0x7f0000001f88)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000fff)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000f1f000/0x2000)=nil, 0x2000, 0x0, 0x11, r2, 0x0) mremap(&(0x7f0000f1f000/0x1000)=nil, 0x1000, 0x1000, 0x3, &(0x7f0000000000/0x1000)=nil) r3 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_X86_SETUP_MCE(r3, 0x4008ae9c, &(0x7f0000000300)) 2018/04/21 01:44:11 executing program 3: socketpair$inet_udp(0x2, 0x2, 0x0, &(0x7f0000000280)) perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$ntfs(&(0x7f0000000000)='ntfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="eb52904e544653202020200004", 0xd}], 0x0, &(0x7f000007e200)) r0 = memfd_create(&(0x7f0000000100)="7175655502310000476277d200000000f6ffffff00000000000000000000000000000000000400f93700000000000f5200000400", 0x2) getsockopt$inet_buf(r0, 0x0, 0x3f, &(0x7f0000000140)=""/242, &(0x7f0000000240)=0xf2) r1 = syz_open_dev$sndseq(&(0x7f0000f3eff3)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r1, 0xc08c5332, &(0x7f0000933000)={0x0, 0x0, 0x0, 'queue0\x00'}) ioctl$SNDRV_SEQ_IOCTL_SUBSCRIBE_PORT(r1, 0x40505330, &(0x7f00000002c0)={{0x4, 0x8}, {0x314, 0x7}, 0x5, 0x3, 0x5}) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_INFO(r1, 0xc08c5335, &(0x7f0000000040)={0x0, 0x2000000000000080, 0x400000000000000, "7175655502310000476277d200000000f6ffffff00000000000000000000000000000000000400f93700000000000f5200000400"}) 2018/04/21 01:44:11 executing program 5: mmap(&(0x7f0000000000/0xd99000)=nil, 0xd99000, 0x4, 0x32, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x2, 0x1, 0x0) r1 = dup(r0) setsockopt$sock_timeval(r1, 0x1, 0x15, &(0x7f0000000000)={0x0, 0x2710}, 0x10) 2018/04/21 01:44:11 executing program 0: syz_emit_ethernet(0x1, &(0x7f0000000000)=ANY=[@ANYBLOB="ffffffff"], 0x0) r0 = socket$packet(0x11, 0x10000000002, 0x300) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f00000000c0)={"74756e6c30000000e5ff00", 0x0}) r2 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) bind$bt_hci(r2, &(0x7f0000000000)={0x1f, r1}, 0xc) write(r2, &(0x7f0000000100)="53d5616b", 0x4) 2018/04/21 01:44:11 executing program 4: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup\x00', 0x200002, 0x0) r1 = openat$cgroup_int(r0, &(0x7f0000000100)='memory.high\x00', 0x2, 0x0) write$cgroup_type(r1, &(0x7f0000000000)='Threaded\x00', 0x1) 2018/04/21 01:44:11 executing program 1: syz_emit_ethernet(0x4e, &(0x7f0000005faa)={@random="ff3997ffcd00", @empty, [], {@ipv6={0x86dd, {0x0, 0x6, "c8fba2", 0x18, 0x40000000003a, 0x0, @empty, @mcast2={0xff, 0x2, [], 0x1}, {[], @icmpv6=@mld={0xffffff8c, 0xd, 0x0, 0x0, 0x0, @mcast2={0xff, 0x2, [], 0x1}}}}}}}, 0x0) 2018/04/21 01:44:11 executing program 7: socketpair$inet_udp(0x2, 0x2, 0x0, &(0x7f0000000280)) perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$ntfs(&(0x7f0000000000)='ntfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="eb52904e544653202020200004", 0xd}], 0x0, &(0x7f000007e200)) r0 = memfd_create(&(0x7f0000000100)="7175655502310000476277d200000000f6ffffff00000000000000000000000000000000000400f93700000000000f5200000400", 0x2) getsockopt$inet_buf(r0, 0x0, 0x3f, &(0x7f0000000140)=""/242, &(0x7f0000000240)=0xf2) r1 = syz_open_dev$sndseq(&(0x7f0000f3eff3)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r1, 0xc08c5332, &(0x7f0000933000)={0x0, 0x0, 0x0, 'queue0\x00'}) ioctl$SNDRV_SEQ_IOCTL_SUBSCRIBE_PORT(r1, 0x40505330, &(0x7f00000002c0)={{0x4, 0x8}, {0x314, 0x7}, 0x5, 0x3, 0x5}) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_INFO(r1, 0xc08c5335, &(0x7f0000000040)={0x0, 0x2000000000000080, 0x400000000000000, "7175655502310000476277d200000000f6ffffff00000000000000000000000000000000000400f93700000000000f5200000400"}) 2018/04/21 01:44:11 executing program 2: socketpair$inet_udp(0x2, 0x2, 0x0, &(0x7f0000000280)) perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$ntfs(&(0x7f0000000000)='ntfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="eb52904e544653202020200004", 0xd}], 0x0, &(0x7f000007e200)) r0 = memfd_create(&(0x7f0000000100)="7175655502310000476277d200000000f6ffffff00000000000000000000000000000000000400f93700000000000f5200000400", 0x2) getsockopt$inet_buf(r0, 0x0, 0x3f, &(0x7f0000000140)=""/242, &(0x7f0000000240)=0xf2) r1 = syz_open_dev$sndseq(&(0x7f0000f3eff3)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r1, 0xc08c5332, &(0x7f0000933000)={0x0, 0x0, 0x0, 'queue0\x00'}) ioctl$SNDRV_SEQ_IOCTL_SUBSCRIBE_PORT(r1, 0x40505330, &(0x7f00000002c0)={{0x4, 0x8}, {0x314, 0x7}, 0x5, 0x3, 0x5}) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_INFO(r1, 0xc08c5335, &(0x7f0000000040)={0x0, 0x2000000000000080, 0x400000000000000, "7175655502310000476277d200000000f6ffffff00000000000000000000000000000000000400f93700000000000f5200000400"}) 2018/04/21 01:44:12 executing program 1: syz_emit_ethernet(0x4e, &(0x7f0000005faa)={@random="ff3997ffcd00", @empty, [], {@ipv6={0x86dd, {0x0, 0x6, "c8fba2", 0x18, 0x40000000003a, 0x0, @empty, @mcast2={0xff, 0x2, [], 0x1}, {[], @icmpv6=@mld={0xffffff8c, 0xd, 0x0, 0x0, 0x0, @mcast2={0xff, 0x2, [], 0x1}}}}}}}, 0x0) [ 74.216873] ntfs: (device loop2): ntfs_fill_super(): Unable to determine device size. [ 74.232918] ntfs: (device loop3): ntfs_fill_super(): Unable to determine device size. 2018/04/21 01:44:12 executing program 0: syz_emit_ethernet(0x1, &(0x7f0000000000)=ANY=[@ANYBLOB="ffffffff"], 0x0) r0 = socket$packet(0x11, 0x10000000002, 0x300) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f00000000c0)={"74756e6c30000000e5ff00", 0x0}) r2 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) bind$bt_hci(r2, &(0x7f0000000000)={0x1f, r1}, 0xc) write(r2, &(0x7f0000000100)="53d5616b", 0x4) 2018/04/21 01:44:12 executing program 7: socketpair$inet_udp(0x2, 0x2, 0x0, &(0x7f0000000280)) perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$ntfs(&(0x7f0000000000)='ntfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="eb52904e544653202020200004", 0xd}], 0x0, &(0x7f000007e200)) r0 = memfd_create(&(0x7f0000000100)="7175655502310000476277d200000000f6ffffff00000000000000000000000000000000000400f93700000000000f5200000400", 0x2) getsockopt$inet_buf(r0, 0x0, 0x3f, &(0x7f0000000140)=""/242, &(0x7f0000000240)=0xf2) r1 = syz_open_dev$sndseq(&(0x7f0000f3eff3)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r1, 0xc08c5332, &(0x7f0000933000)={0x0, 0x0, 0x0, 'queue0\x00'}) ioctl$SNDRV_SEQ_IOCTL_SUBSCRIBE_PORT(r1, 0x40505330, &(0x7f00000002c0)={{0x4, 0x8}, {0x314, 0x7}, 0x5, 0x3, 0x5}) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_INFO(r1, 0xc08c5335, &(0x7f0000000040)={0x0, 0x2000000000000080, 0x400000000000000, "7175655502310000476277d200000000f6ffffff00000000000000000000000000000000000400f93700000000000f5200000400"}) 2018/04/21 01:44:12 executing program 5: mmap(&(0x7f0000000000/0xd99000)=nil, 0xd99000, 0x4, 0x32, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x2, 0x1, 0x0) r1 = dup(r0) setsockopt$sock_timeval(r1, 0x1, 0x15, &(0x7f0000000000)={0x0, 0x2710}, 0x10) 2018/04/21 01:44:12 executing program 6: r0 = socket$inet(0x2, 0x1, 0x0) perf_event_open(&(0x7f00000000c0)={0x2, 0x70, 0x3e6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getsockopt$IP_VS_SO_GET_DESTS(r0, 0x0, 0x482, &(0x7f0000000600)=""/4096, &(0x7f0000000040)=0x1000) 2018/04/21 01:44:12 executing program 4: r0 = inotify_init1(0x0) ioctl$int_in(r0, 0x5452, &(0x7f000001a000)=0x81) 2018/04/21 01:44:12 executing program 3: creat(&(0x7f0000000080)='./file0\x00', 0x0) 2018/04/21 01:44:12 executing program 1: syz_emit_ethernet(0x4e, &(0x7f0000005faa)={@random="ff3997ffcd00", @empty, [], {@ipv6={0x86dd, {0x0, 0x6, "c8fba2", 0x18, 0x40000000003a, 0x0, @empty, @mcast2={0xff, 0x2, [], 0x1}, {[], @icmpv6=@mld={0xffffff8c, 0xd, 0x0, 0x0, 0x0, @mcast2={0xff, 0x2, [], 0x1}}}}}}}, 0x0) 2018/04/21 01:44:12 executing program 2: socketpair$inet_udp(0x2, 0x2, 0x0, &(0x7f0000000280)) perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$ntfs(&(0x7f0000000000)='ntfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="eb52904e544653202020200004", 0xd}], 0x0, &(0x7f000007e200)) r0 = memfd_create(&(0x7f0000000100)="7175655502310000476277d200000000f6ffffff00000000000000000000000000000000000400f93700000000000f5200000400", 0x2) getsockopt$inet_buf(r0, 0x0, 0x3f, &(0x7f0000000140)=""/242, &(0x7f0000000240)=0xf2) r1 = syz_open_dev$sndseq(&(0x7f0000f3eff3)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r1, 0xc08c5332, &(0x7f0000933000)={0x0, 0x0, 0x0, 'queue0\x00'}) ioctl$SNDRV_SEQ_IOCTL_SUBSCRIBE_PORT(r1, 0x40505330, &(0x7f00000002c0)={{0x4, 0x8}, {0x314, 0x7}, 0x5, 0x3, 0x5}) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_INFO(r1, 0xc08c5335, &(0x7f0000000040)={0x0, 0x2000000000000080, 0x400000000000000, "7175655502310000476277d200000000f6ffffff00000000000000000000000000000000000400f93700000000000f5200000400"}) [ 74.447464] IPVS: length: 4096 != 8 [ 74.481667] IPVS: length: 4096 != 8 2018/04/21 01:44:12 executing program 5: mmap(&(0x7f0000000000/0xd99000)=nil, 0xd99000, 0x4, 0x32, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x2, 0x1, 0x0) r1 = dup(r0) setsockopt$sock_timeval(r1, 0x1, 0x15, &(0x7f0000000000)={0x0, 0x2710}, 0x10) 2018/04/21 01:44:12 executing program 0: syz_emit_ethernet(0x1, &(0x7f0000000000)=ANY=[@ANYBLOB="ffffffff"], 0x0) r0 = socket$packet(0x11, 0x10000000002, 0x300) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f00000000c0)={"74756e6c30000000e5ff00", 0x0}) r2 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) bind$bt_hci(r2, &(0x7f0000000000)={0x1f, r1}, 0xc) write(r2, &(0x7f0000000100)="53d5616b", 0x4) 2018/04/21 01:44:12 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000780)={0x26, 'hash\x00', 0x0, 0x0, 'cbcmac(des-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000af2000)="8be3000000010000", 0x8) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f0000000500)={0x0, 0x0, &(0x7f0000000680)=[{&(0x7f0000000200)="f8", 0x1}], 0x1}, 0x0) 2018/04/21 01:44:12 executing program 1: syz_emit_ethernet(0x4e, &(0x7f0000005faa)={@random="ff3997ffcd00", @empty, [], {@ipv6={0x86dd, {0x0, 0x6, "c8fba2", 0x18, 0x40000000003a, 0x0, @empty, @mcast2={0xff, 0x2, [], 0x1}, {[], @icmpv6=@mld={0xffffff8c, 0xd, 0x0, 0x0, 0x0, @mcast2={0xff, 0x2, [], 0x1}}}}}}}, 0x0) 2018/04/21 01:44:12 executing program 7: socketpair$inet_udp(0x2, 0x2, 0x0, &(0x7f0000000280)) perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$ntfs(&(0x7f0000000000)='ntfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="eb52904e544653202020200004", 0xd}], 0x0, &(0x7f000007e200)) r0 = memfd_create(&(0x7f0000000100)="7175655502310000476277d200000000f6ffffff00000000000000000000000000000000000400f93700000000000f5200000400", 0x2) getsockopt$inet_buf(r0, 0x0, 0x3f, &(0x7f0000000140)=""/242, &(0x7f0000000240)=0xf2) r1 = syz_open_dev$sndseq(&(0x7f0000f3eff3)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r1, 0xc08c5332, &(0x7f0000933000)={0x0, 0x0, 0x0, 'queue0\x00'}) ioctl$SNDRV_SEQ_IOCTL_SUBSCRIBE_PORT(r1, 0x40505330, &(0x7f00000002c0)={{0x4, 0x8}, {0x314, 0x7}, 0x5, 0x3, 0x5}) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_INFO(r1, 0xc08c5335, &(0x7f0000000040)={0x0, 0x2000000000000080, 0x400000000000000, "7175655502310000476277d200000000f6ffffff00000000000000000000000000000000000400f93700000000000f5200000400"}) 2018/04/21 01:44:12 executing program 6: r0 = socket$inet(0x2, 0x1, 0x0) perf_event_open(&(0x7f00000000c0)={0x2, 0x70, 0x3e6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getsockopt$IP_VS_SO_GET_DESTS(r0, 0x0, 0x482, &(0x7f0000000600)=""/4096, &(0x7f0000000040)=0x1000) 2018/04/21 01:44:12 executing program 4: r0 = inotify_init1(0x0) ioctl$int_in(r0, 0x5452, &(0x7f000001a000)=0x81) 2018/04/21 01:44:12 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = syz_open_dev$tun(&(0x7f0000000180)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000200)={'syzkaller0\x00', 0x3}) ioctl$sock_inet_SIOCSARP(r0, 0x8955, &(0x7f0000000240)={{0x2, 0x0, @rand_addr}, {}, 0x8, {0x2, 0x0, @multicast2=0xe0000002}, 'syzkaller0\x00'}) r2 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSARP(r2, 0x8955, &(0x7f0000000240)={{0x2, 0x0, @rand_addr}, {}, 0x8, {0x2, 0x0, @multicast2=0xe0000002}, 'syzkaller0\x00'}) [ 74.696802] IPVS: length: 4096 != 8 2018/04/21 01:44:12 executing program 1: setsockopt$inet6_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, &(0x7f0000002000)="0d57e67fc730ffffffff00000000125e", 0x10) r0 = socket(0x18, 0x0, 0x1) connect(r0, &(0x7f0000002000)=@sco={0x1f, {0x1}}, 0x3a) 2018/04/21 01:44:12 executing program 5: mmap(&(0x7f0000000000/0xd99000)=nil, 0xd99000, 0x4, 0x32, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x2, 0x1, 0x0) r1 = dup(r0) setsockopt$sock_timeval(r1, 0x1, 0x15, &(0x7f0000000000)={0x0, 0x2710}, 0x10) 2018/04/21 01:44:12 executing program 0: syz_emit_ethernet(0x1, &(0x7f0000000000)=ANY=[@ANYBLOB="ffffffff"], 0x0) r0 = socket$packet(0x11, 0x10000000002, 0x300) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f00000000c0)={"74756e6c30000000e5ff00", 0x0}) r2 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) bind$bt_hci(r2, &(0x7f0000000000)={0x1f, r1}, 0xc) write(r2, &(0x7f0000000100)="53d5616b", 0x4) 2018/04/21 01:44:12 executing program 6: r0 = socket$inet(0x2, 0x1, 0x0) perf_event_open(&(0x7f00000000c0)={0x2, 0x70, 0x3e6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getsockopt$IP_VS_SO_GET_DESTS(r0, 0x0, 0x482, &(0x7f0000000600)=""/4096, &(0x7f0000000040)=0x1000) 2018/04/21 01:44:12 executing program 7: r0 = semget$private(0x0, 0x4000, 0x0) perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) semctl$GETALL(r0, 0x0, 0xd, &(0x7f00000002c0)=""/17) 2018/04/21 01:44:12 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000780)={0x26, 'hash\x00', 0x0, 0x0, 'cbcmac(des-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000af2000)="8be3000000010000", 0x8) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f0000000500)={0x0, 0x0, &(0x7f0000000680)=[{&(0x7f0000000200)="f8", 0x1}], 0x1}, 0x0) 2018/04/21 01:44:12 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = syz_open_dev$tun(&(0x7f0000000180)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000200)={'syzkaller0\x00', 0x3}) ioctl$sock_inet_SIOCSARP(r0, 0x8955, &(0x7f0000000240)={{0x2, 0x0, @rand_addr}, {}, 0x8, {0x2, 0x0, @multicast2=0xe0000002}, 'syzkaller0\x00'}) r2 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSARP(r2, 0x8955, &(0x7f0000000240)={{0x2, 0x0, @rand_addr}, {}, 0x8, {0x2, 0x0, @multicast2=0xe0000002}, 'syzkaller0\x00'}) 2018/04/21 01:44:12 executing program 1: setsockopt$inet6_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, &(0x7f0000002000)="0d57e67fc730ffffffff00000000125e", 0x10) r0 = socket(0x18, 0x0, 0x1) connect(r0, &(0x7f0000002000)=@sco={0x1f, {0x1}}, 0x3a) 2018/04/21 01:44:12 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000780)={0x26, 'hash\x00', 0x0, 0x0, 'cbcmac(des-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000af2000)="8be3000000010000", 0x8) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f0000000500)={0x0, 0x0, &(0x7f0000000680)=[{&(0x7f0000000200)="f8", 0x1}], 0x1}, 0x0) [ 74.908853] IPVS: length: 4096 != 8 2018/04/21 01:44:12 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000780)={0x26, 'hash\x00', 0x0, 0x0, 'cbcmac(des-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000af2000)="8be3000000010000", 0x8) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f0000000500)={0x0, 0x0, &(0x7f0000000680)=[{&(0x7f0000000200)="f8", 0x1}], 0x1}, 0x0) 2018/04/21 01:44:12 executing program 4: r0 = inotify_init1(0x0) ioctl$int_in(r0, 0x5452, &(0x7f000001a000)=0x81) 2018/04/21 01:44:12 executing program 6: r0 = socket$inet(0x2, 0x1, 0x0) perf_event_open(&(0x7f00000000c0)={0x2, 0x70, 0x3e6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getsockopt$IP_VS_SO_GET_DESTS(r0, 0x0, 0x482, &(0x7f0000000600)=""/4096, &(0x7f0000000040)=0x1000) 2018/04/21 01:44:12 executing program 7: r0 = semget$private(0x0, 0x4000, 0x0) perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) semctl$GETALL(r0, 0x0, 0xd, &(0x7f00000002c0)=""/17) 2018/04/21 01:44:12 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000780)={0x26, 'hash\x00', 0x0, 0x0, 'cbcmac(des-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000af2000)="8be3000000010000", 0x8) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f0000000500)={0x0, 0x0, &(0x7f0000000680)=[{&(0x7f0000000200)="f8", 0x1}], 0x1}, 0x0) 2018/04/21 01:44:12 executing program 1: setsockopt$inet6_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, &(0x7f0000002000)="0d57e67fc730ffffffff00000000125e", 0x10) r0 = socket(0x18, 0x0, 0x1) connect(r0, &(0x7f0000002000)=@sco={0x1f, {0x1}}, 0x3a) 2018/04/21 01:44:12 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = syz_open_dev$tun(&(0x7f0000000180)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000200)={'syzkaller0\x00', 0x3}) ioctl$sock_inet_SIOCSARP(r0, 0x8955, &(0x7f0000000240)={{0x2, 0x0, @rand_addr}, {}, 0x8, {0x2, 0x0, @multicast2=0xe0000002}, 'syzkaller0\x00'}) r2 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSARP(r2, 0x8955, &(0x7f0000000240)={{0x2, 0x0, @rand_addr}, {}, 0x8, {0x2, 0x0, @multicast2=0xe0000002}, 'syzkaller0\x00'}) 2018/04/21 01:44:12 executing program 0: perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0xc1f000)=nil, 0xc1f000, 0x0, 0x71, 0xffffffffffffffff, 0x0) remap_file_pages(&(0x7f0000670000/0x2000)=nil, 0x2000, 0x0, 0x0, 0x10100) syz_init_net_socket$nfc_llcp(0x27, 0x0, 0x1) mprotect(&(0x7f0000721000/0x2000)=nil, 0x2000, 0x0) [ 75.108783] IPVS: length: 4096 != 8 [ 75.129252] mmap: syz-executor0 (7037) uses deprecated remap_file_pages() syscall. See Documentation/vm/remap_file_pages.txt. 2018/04/21 01:44:12 executing program 6: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000100)={@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x2c, 0x0, @local={0xfe, 0x80, [], 0xaa}, @local={0xfe, 0x80, [], 0xaa}, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, &(0x7f00000002c0)) 2018/04/21 01:44:12 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000780)={0x26, 'hash\x00', 0x0, 0x0, 'cbcmac(des-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000af2000)="8be3000000010000", 0x8) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f0000000500)={0x0, 0x0, &(0x7f0000000680)=[{&(0x7f0000000200)="f8", 0x1}], 0x1}, 0x0) 2018/04/21 01:44:12 executing program 1: setsockopt$inet6_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, &(0x7f0000002000)="0d57e67fc730ffffffff00000000125e", 0x10) r0 = socket(0x18, 0x0, 0x1) connect(r0, &(0x7f0000002000)=@sco={0x1f, {0x1}}, 0x3a) 2018/04/21 01:44:13 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000780)={0x26, 'hash\x00', 0x0, 0x0, 'cbcmac(des-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000af2000)="8be3000000010000", 0x8) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f0000000500)={0x0, 0x0, &(0x7f0000000680)=[{&(0x7f0000000200)="f8", 0x1}], 0x1}, 0x0) 2018/04/21 01:44:13 executing program 7: r0 = semget$private(0x0, 0x4000, 0x0) perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) semctl$GETALL(r0, 0x0, 0xd, &(0x7f00000002c0)=""/17) 2018/04/21 01:44:13 executing program 4: r0 = inotify_init1(0x0) ioctl$int_in(r0, 0x5452, &(0x7f000001a000)=0x81) 2018/04/21 01:44:13 executing program 0: perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0xc1f000)=nil, 0xc1f000, 0x0, 0x71, 0xffffffffffffffff, 0x0) remap_file_pages(&(0x7f0000670000/0x2000)=nil, 0x2000, 0x0, 0x0, 0x10100) syz_init_net_socket$nfc_llcp(0x27, 0x0, 0x1) mprotect(&(0x7f0000721000/0x2000)=nil, 0x2000, 0x0) 2018/04/21 01:44:13 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = syz_open_dev$tun(&(0x7f0000000180)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000200)={'syzkaller0\x00', 0x3}) ioctl$sock_inet_SIOCSARP(r0, 0x8955, &(0x7f0000000240)={{0x2, 0x0, @rand_addr}, {}, 0x8, {0x2, 0x0, @multicast2=0xe0000002}, 'syzkaller0\x00'}) r2 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSARP(r2, 0x8955, &(0x7f0000000240)={{0x2, 0x0, @rand_addr}, {}, 0x8, {0x2, 0x0, @multicast2=0xe0000002}, 'syzkaller0\x00'}) 2018/04/21 01:44:13 executing program 1: perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0xc1f000)=nil, 0xc1f000, 0x0, 0x71, 0xffffffffffffffff, 0x0) remap_file_pages(&(0x7f0000670000/0x2000)=nil, 0x2000, 0x0, 0x0, 0x10100) syz_init_net_socket$nfc_llcp(0x27, 0x0, 0x1) mprotect(&(0x7f0000721000/0x2000)=nil, 0x2000, 0x0) 2018/04/21 01:44:13 executing program 5: perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0xc1f000)=nil, 0xc1f000, 0x0, 0x71, 0xffffffffffffffff, 0x0) remap_file_pages(&(0x7f0000670000/0x2000)=nil, 0x2000, 0x0, 0x0, 0x10100) syz_init_net_socket$nfc_llcp(0x27, 0x0, 0x1) mprotect(&(0x7f0000721000/0x2000)=nil, 0x2000, 0x0) 2018/04/21 01:44:13 executing program 1: perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0xc1f000)=nil, 0xc1f000, 0x0, 0x71, 0xffffffffffffffff, 0x0) remap_file_pages(&(0x7f0000670000/0x2000)=nil, 0x2000, 0x0, 0x0, 0x10100) syz_init_net_socket$nfc_llcp(0x27, 0x0, 0x1) mprotect(&(0x7f0000721000/0x2000)=nil, 0x2000, 0x0) 2018/04/21 01:44:13 executing program 0: perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0xc1f000)=nil, 0xc1f000, 0x0, 0x71, 0xffffffffffffffff, 0x0) remap_file_pages(&(0x7f0000670000/0x2000)=nil, 0x2000, 0x0, 0x0, 0x10100) syz_init_net_socket$nfc_llcp(0x27, 0x0, 0x1) mprotect(&(0x7f0000721000/0x2000)=nil, 0x2000, 0x0) 2018/04/21 01:44:13 executing program 6: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000100)={@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x2c, 0x0, @local={0xfe, 0x80, [], 0xaa}, @local={0xfe, 0x80, [], 0xaa}, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, &(0x7f00000002c0)) 2018/04/21 01:44:13 executing program 3: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000ff5ffc), 0x4) setsockopt$packet_buf(r0, 0x107, 0x16, &(0x7f0000000000), 0x0) 2018/04/21 01:44:13 executing program 7: r0 = semget$private(0x0, 0x4000, 0x0) perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) semctl$GETALL(r0, 0x0, 0xd, &(0x7f00000002c0)=""/17) 2018/04/21 01:44:13 executing program 4: r0 = socket$inet6(0xa, 0x80003, 0xff) getsockopt$sock_int(r0, 0x1, 0x2f, &(0x7f00000000c0), &(0x7f0000000080)=0x4) 2018/04/21 01:44:13 executing program 2: syz_emit_ethernet(0x7e, &(0x7f0000000080)={@broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], @empty, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x70, 0x0, 0x0, 0x0, 0x1, 0x0, @remote={0xac, 0x14, 0x14, 0xbb}, @dev={0xac, 0x14, 0x14, 0x11}}, @icmp=@parameter_prob={0xc, 0x0, 0x0, 0x0, 0x0, 0x0, {0x15, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, @local={0xac, 0x14, 0x14, 0xaa}, @dev={0xac, 0x14, 0x14}, {[@timestamp={0x44, 0x40, 0x0, 0x0, 0x0, [{[@rand_addr]}, {[@multicast2=0xe0000002]}, {[@multicast1=0xe0000001]}, {}, {[@loopback=0x7f000001]}, {[@broadcast=0xffffffff]}, {[@multicast1=0xe0000001]}, {[@dev={0xac, 0x14, 0x14}]}]}]}}}}}}}, &(0x7f0000000200)) 2018/04/21 01:44:13 executing program 5: perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0xc1f000)=nil, 0xc1f000, 0x0, 0x71, 0xffffffffffffffff, 0x0) remap_file_pages(&(0x7f0000670000/0x2000)=nil, 0x2000, 0x0, 0x0, 0x10100) syz_init_net_socket$nfc_llcp(0x27, 0x0, 0x1) mprotect(&(0x7f0000721000/0x2000)=nil, 0x2000, 0x0) 2018/04/21 01:44:13 executing program 3: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000ff5ffc), 0x4) setsockopt$packet_buf(r0, 0x107, 0x16, &(0x7f0000000000), 0x0) 2018/04/21 01:44:13 executing program 2: syz_emit_ethernet(0x7e, &(0x7f0000000080)={@broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], @empty, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x70, 0x0, 0x0, 0x0, 0x1, 0x0, @remote={0xac, 0x14, 0x14, 0xbb}, @dev={0xac, 0x14, 0x14, 0x11}}, @icmp=@parameter_prob={0xc, 0x0, 0x0, 0x0, 0x0, 0x0, {0x15, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, @local={0xac, 0x14, 0x14, 0xaa}, @dev={0xac, 0x14, 0x14}, {[@timestamp={0x44, 0x40, 0x0, 0x0, 0x0, [{[@rand_addr]}, {[@multicast2=0xe0000002]}, {[@multicast1=0xe0000001]}, {}, {[@loopback=0x7f000001]}, {[@broadcast=0xffffffff]}, {[@multicast1=0xe0000001]}, {[@dev={0xac, 0x14, 0x14}]}]}]}}}}}}}, &(0x7f0000000200)) 2018/04/21 01:44:13 executing program 0: perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0xc1f000)=nil, 0xc1f000, 0x0, 0x71, 0xffffffffffffffff, 0x0) remap_file_pages(&(0x7f0000670000/0x2000)=nil, 0x2000, 0x0, 0x0, 0x10100) syz_init_net_socket$nfc_llcp(0x27, 0x0, 0x1) mprotect(&(0x7f0000721000/0x2000)=nil, 0x2000, 0x0) 2018/04/21 01:44:13 executing program 5: perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0xc1f000)=nil, 0xc1f000, 0x0, 0x71, 0xffffffffffffffff, 0x0) remap_file_pages(&(0x7f0000670000/0x2000)=nil, 0x2000, 0x0, 0x0, 0x10100) syz_init_net_socket$nfc_llcp(0x27, 0x0, 0x1) mprotect(&(0x7f0000721000/0x2000)=nil, 0x2000, 0x0) 2018/04/21 01:44:13 executing program 4: r0 = socket$inet6(0xa, 0x80003, 0xff) getsockopt$sock_int(r0, 0x1, 0x2f, &(0x7f00000000c0), &(0x7f0000000080)=0x4) 2018/04/21 01:44:13 executing program 6: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000100)={@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x2c, 0x0, @local={0xfe, 0x80, [], 0xaa}, @local={0xfe, 0x80, [], 0xaa}, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, &(0x7f00000002c0)) 2018/04/21 01:44:13 executing program 1: perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0xc1f000)=nil, 0xc1f000, 0x0, 0x71, 0xffffffffffffffff, 0x0) remap_file_pages(&(0x7f0000670000/0x2000)=nil, 0x2000, 0x0, 0x0, 0x10100) syz_init_net_socket$nfc_llcp(0x27, 0x0, 0x1) mprotect(&(0x7f0000721000/0x2000)=nil, 0x2000, 0x0) 2018/04/21 01:44:13 executing program 7: r0 = add_key$keyring(&(0x7f0000000240)='keyring\x00', &(0x7f0000000380)={0x73, 0x79, 0x7a}, 0x0, 0x0, 0xfffffffffffffffe) r1 = add_key$keyring(&(0x7f0000000400)='keyring\x00', &(0x7f0000000000)={0x73, 0x79, 0x7a}, 0x0, 0x0, r0) r2 = add_key$keyring(&(0x7f00000000c0)='keyring\x00', &(0x7f0000000180)={0x73, 0x79, 0x7a}, 0x0, 0x0, r1) r3 = add_key$user(&(0x7f00003bd000)='user\x00', &(0x7f0000000b00)={0x73, 0x79, 0x7a}, &(0x7f0000000440)='\x00\x00\x00\x00\x00\x00\x00X', 0x8, r2) r4 = add_key$user(&(0x7f0000000140)='user\x00', &(0x7f00000001c0)={0x73, 0x79, 0x7a}, &(0x7f0000000280), 0x169, r1) keyctl$dh_compute(0x17, &(0x7f0000000100)={r3, r4, r4}, &(0x7f0000a53ffb)=""/5, 0x68, &(0x7f0000c61fc8)={&(0x7f0000a3dffa)={'rmd256-generic\x00'}}) 2018/04/21 01:44:13 executing program 3: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000ff5ffc), 0x4) setsockopt$packet_buf(r0, 0x107, 0x16, &(0x7f0000000000), 0x0) 2018/04/21 01:44:13 executing program 2: syz_emit_ethernet(0x7e, &(0x7f0000000080)={@broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], @empty, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x70, 0x0, 0x0, 0x0, 0x1, 0x0, @remote={0xac, 0x14, 0x14, 0xbb}, @dev={0xac, 0x14, 0x14, 0x11}}, @icmp=@parameter_prob={0xc, 0x0, 0x0, 0x0, 0x0, 0x0, {0x15, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, @local={0xac, 0x14, 0x14, 0xaa}, @dev={0xac, 0x14, 0x14}, {[@timestamp={0x44, 0x40, 0x0, 0x0, 0x0, [{[@rand_addr]}, {[@multicast2=0xe0000002]}, {[@multicast1=0xe0000001]}, {}, {[@loopback=0x7f000001]}, {[@broadcast=0xffffffff]}, {[@multicast1=0xe0000001]}, {[@dev={0xac, 0x14, 0x14}]}]}]}}}}}}}, &(0x7f0000000200)) 2018/04/21 01:44:13 executing program 0: syz_emit_ethernet(0x32, &(0x7f0000000040)={@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, @dev={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa]}, [], {@arp={0x806, @generic={0x0, 0x0, 0x6, 0x0, 0x0, @empty, "", @dev={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa]}, "92b10c0cb4fcd14dc568857c14264b05"}}}}, &(0x7f00000000c0)={0x0, 0x2, [0x0, 0x82a]}) 2018/04/21 01:44:13 executing program 3: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000ff5ffc), 0x4) setsockopt$packet_buf(r0, 0x107, 0x16, &(0x7f0000000000), 0x0) 2018/04/21 01:44:13 executing program 2: syz_emit_ethernet(0x7e, &(0x7f0000000080)={@broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], @empty, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x70, 0x0, 0x0, 0x0, 0x1, 0x0, @remote={0xac, 0x14, 0x14, 0xbb}, @dev={0xac, 0x14, 0x14, 0x11}}, @icmp=@parameter_prob={0xc, 0x0, 0x0, 0x0, 0x0, 0x0, {0x15, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, @local={0xac, 0x14, 0x14, 0xaa}, @dev={0xac, 0x14, 0x14}, {[@timestamp={0x44, 0x40, 0x0, 0x0, 0x0, [{[@rand_addr]}, {[@multicast2=0xe0000002]}, {[@multicast1=0xe0000001]}, {}, {[@loopback=0x7f000001]}, {[@broadcast=0xffffffff]}, {[@multicast1=0xe0000001]}, {[@dev={0xac, 0x14, 0x14}]}]}]}}}}}}}, &(0x7f0000000200)) 2018/04/21 01:44:13 executing program 5: r0 = socket$inet(0x2, 0x2, 0x0) setsockopt$inet_udp_encap(r0, 0x11, 0x64, &(0x7f0000d09ffc)=0x1, 0x4) bind$inet(r0, &(0x7f0000eed000)={0x2, 0x1}, 0x10) syz_emit_ethernet(0x2a, &(0x7f00000bb000)={@broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x0, 0x11, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff, 0xbb}, @multicast1=0xe0000001}, @udp={0x0, 0x1, 0x8}}}}}, 0x0) 2018/04/21 01:44:13 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0x0, 0x0}) socket$kcm(0x29, 0x2, 0x0) socket$kcm(0x2, 0x2, 0x0) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000040)={0xffffffffffffffff, &(0x7f00000000c0)="b82283392dc50ff1fb635a5849d2f5916ae2fdc24e95e12aa8daccf7393e72be9cc66f"}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f0000346fd4)={0x0, 0x0, 0x0, 0x1000000000000004, 0x202}, 0x2c) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x1, 0x5, &(0x7f0000346fc8)=@framed={{0x18}, [@alu={0x8000000201a7f19, 0x0, 0x7, 0x0, 0x1}], {0x95}}, &(0x7f0000f6bffb)='GPL\x00', 0x0, 0x299, &(0x7f00001a7f05)=""/251}, 0x18) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000140)={r0, 0x50, &(0x7f00000000c0)}, 0x10) socketpair$inet(0x16, 0x541f, 0x0, &(0x7f0000000080)) 2018/04/21 01:44:13 executing program 0: syz_emit_ethernet(0x32, &(0x7f0000000040)={@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, @dev={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa]}, [], {@arp={0x806, @generic={0x0, 0x0, 0x6, 0x0, 0x0, @empty, "", @dev={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa]}, "92b10c0cb4fcd14dc568857c14264b05"}}}}, &(0x7f00000000c0)={0x0, 0x2, [0x0, 0x82a]}) 2018/04/21 01:44:13 executing program 7: r0 = add_key$keyring(&(0x7f0000000240)='keyring\x00', &(0x7f0000000380)={0x73, 0x79, 0x7a}, 0x0, 0x0, 0xfffffffffffffffe) r1 = add_key$keyring(&(0x7f0000000400)='keyring\x00', &(0x7f0000000000)={0x73, 0x79, 0x7a}, 0x0, 0x0, r0) r2 = add_key$keyring(&(0x7f00000000c0)='keyring\x00', &(0x7f0000000180)={0x73, 0x79, 0x7a}, 0x0, 0x0, r1) r3 = add_key$user(&(0x7f00003bd000)='user\x00', &(0x7f0000000b00)={0x73, 0x79, 0x7a}, &(0x7f0000000440)='\x00\x00\x00\x00\x00\x00\x00X', 0x8, r2) r4 = add_key$user(&(0x7f0000000140)='user\x00', &(0x7f00000001c0)={0x73, 0x79, 0x7a}, &(0x7f0000000280), 0x169, r1) keyctl$dh_compute(0x17, &(0x7f0000000100)={r3, r4, r4}, &(0x7f0000a53ffb)=""/5, 0x68, &(0x7f0000c61fc8)={&(0x7f0000a3dffa)={'rmd256-generic\x00'}}) 2018/04/21 01:44:13 executing program 4: r0 = socket$inet6(0xa, 0x80003, 0xff) getsockopt$sock_int(r0, 0x1, 0x2f, &(0x7f00000000c0), &(0x7f0000000080)=0x4) 2018/04/21 01:44:13 executing program 6: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000100)={@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x2c, 0x0, @local={0xfe, 0x80, [], 0xaa}, @local={0xfe, 0x80, [], 0xaa}, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, &(0x7f00000002c0)) 2018/04/21 01:44:13 executing program 5: r0 = socket$inet(0x2, 0x2, 0x0) setsockopt$inet_udp_encap(r0, 0x11, 0x64, &(0x7f0000d09ffc)=0x1, 0x4) bind$inet(r0, &(0x7f0000eed000)={0x2, 0x1}, 0x10) syz_emit_ethernet(0x2a, &(0x7f00000bb000)={@broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x0, 0x11, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff, 0xbb}, @multicast1=0xe0000001}, @udp={0x0, 0x1, 0x8}}}}}, 0x0) 2018/04/21 01:44:13 executing program 3: r0 = socket$inet(0x2, 0x840000000003, 0x2) setsockopt$inet_int(r0, 0x0, 0xc8, &(0x7f0000000140), 0x4) setsockopt$inet_int(r0, 0x0, 0xc8, &(0x7f0000000040), 0x4) 2018/04/21 01:44:13 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_int(r0, 0x29, 0x48, &(0x7f0000000140)=0x4000406, 0x4) 2018/04/21 01:44:13 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0x0, 0x0}) socket$kcm(0x29, 0x2, 0x0) socket$kcm(0x2, 0x2, 0x0) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000040)={0xffffffffffffffff, &(0x7f00000000c0)="b82283392dc50ff1fb635a5849d2f5916ae2fdc24e95e12aa8daccf7393e72be9cc66f"}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f0000346fd4)={0x0, 0x0, 0x0, 0x1000000000000004, 0x202}, 0x2c) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x1, 0x5, &(0x7f0000346fc8)=@framed={{0x18}, [@alu={0x8000000201a7f19, 0x0, 0x7, 0x0, 0x1}], {0x95}}, &(0x7f0000f6bffb)='GPL\x00', 0x0, 0x299, &(0x7f00001a7f05)=""/251}, 0x18) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000140)={r0, 0x50, &(0x7f00000000c0)}, 0x10) socketpair$inet(0x16, 0x541f, 0x0, &(0x7f0000000080)) 2018/04/21 01:44:14 executing program 0: syz_emit_ethernet(0x32, &(0x7f0000000040)={@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, @dev={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa]}, [], {@arp={0x806, @generic={0x0, 0x0, 0x6, 0x0, 0x0, @empty, "", @dev={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa]}, "92b10c0cb4fcd14dc568857c14264b05"}}}}, &(0x7f00000000c0)={0x0, 0x2, [0x0, 0x82a]}) 2018/04/21 01:44:14 executing program 7: r0 = add_key$keyring(&(0x7f0000000240)='keyring\x00', &(0x7f0000000380)={0x73, 0x79, 0x7a}, 0x0, 0x0, 0xfffffffffffffffe) r1 = add_key$keyring(&(0x7f0000000400)='keyring\x00', &(0x7f0000000000)={0x73, 0x79, 0x7a}, 0x0, 0x0, r0) r2 = add_key$keyring(&(0x7f00000000c0)='keyring\x00', &(0x7f0000000180)={0x73, 0x79, 0x7a}, 0x0, 0x0, r1) r3 = add_key$user(&(0x7f00003bd000)='user\x00', &(0x7f0000000b00)={0x73, 0x79, 0x7a}, &(0x7f0000000440)='\x00\x00\x00\x00\x00\x00\x00X', 0x8, r2) r4 = add_key$user(&(0x7f0000000140)='user\x00', &(0x7f00000001c0)={0x73, 0x79, 0x7a}, &(0x7f0000000280), 0x169, r1) keyctl$dh_compute(0x17, &(0x7f0000000100)={r3, r4, r4}, &(0x7f0000a53ffb)=""/5, 0x68, &(0x7f0000c61fc8)={&(0x7f0000a3dffa)={'rmd256-generic\x00'}}) 2018/04/21 01:44:14 executing program 5: r0 = socket$inet(0x2, 0x2, 0x0) setsockopt$inet_udp_encap(r0, 0x11, 0x64, &(0x7f0000d09ffc)=0x1, 0x4) bind$inet(r0, &(0x7f0000eed000)={0x2, 0x1}, 0x10) syz_emit_ethernet(0x2a, &(0x7f00000bb000)={@broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x0, 0x11, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff, 0xbb}, @multicast1=0xe0000001}, @udp={0x0, 0x1, 0x8}}}}}, 0x0) 2018/04/21 01:44:14 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_int(r0, 0x29, 0x48, &(0x7f0000000140)=0x4000406, 0x4) 2018/04/21 01:44:14 executing program 4: r0 = socket$inet6(0xa, 0x80003, 0xff) getsockopt$sock_int(r0, 0x1, 0x2f, &(0x7f00000000c0), &(0x7f0000000080)=0x4) 2018/04/21 01:44:14 executing program 3: r0 = socket$inet(0x2, 0x840000000003, 0x2) setsockopt$inet_int(r0, 0x0, 0xc8, &(0x7f0000000140), 0x4) setsockopt$inet_int(r0, 0x0, 0xc8, &(0x7f0000000040), 0x4) 2018/04/21 01:44:14 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0x0, 0x0}) socket$kcm(0x29, 0x2, 0x0) socket$kcm(0x2, 0x2, 0x0) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000040)={0xffffffffffffffff, &(0x7f00000000c0)="b82283392dc50ff1fb635a5849d2f5916ae2fdc24e95e12aa8daccf7393e72be9cc66f"}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f0000346fd4)={0x0, 0x0, 0x0, 0x1000000000000004, 0x202}, 0x2c) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x1, 0x5, &(0x7f0000346fc8)=@framed={{0x18}, [@alu={0x8000000201a7f19, 0x0, 0x7, 0x0, 0x1}], {0x95}}, &(0x7f0000f6bffb)='GPL\x00', 0x0, 0x299, &(0x7f00001a7f05)=""/251}, 0x18) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000140)={r0, 0x50, &(0x7f00000000c0)}, 0x10) socketpair$inet(0x16, 0x541f, 0x0, &(0x7f0000000080)) 2018/04/21 01:44:14 executing program 6: r0 = socket$inet6(0xa, 0x3, 0x3a) setsockopt$inet6_MRT6_ADD_MFC(r0, 0x29, 0xd1, &(0x7f0000000200)={{0xa, 0x4e20, 0x0, @ipv4={[], [0xff, 0xff], @multicast1=0xe0000001}}, {0xa, 0x0, 0x0, @dev={0xfe, 0x80}}}, 0x4) 2018/04/21 01:44:14 executing program 6: r0 = socket$inet6(0xa, 0x3, 0x3a) setsockopt$inet6_MRT6_ADD_MFC(r0, 0x29, 0xd1, &(0x7f0000000200)={{0xa, 0x4e20, 0x0, @ipv4={[], [0xff, 0xff], @multicast1=0xe0000001}}, {0xa, 0x0, 0x0, @dev={0xfe, 0x80}}}, 0x4) 2018/04/21 01:44:14 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_int(r0, 0x29, 0x48, &(0x7f0000000140)=0x4000406, 0x4) 2018/04/21 01:44:14 executing program 0: syz_emit_ethernet(0x32, &(0x7f0000000040)={@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, @dev={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa]}, [], {@arp={0x806, @generic={0x0, 0x0, 0x6, 0x0, 0x0, @empty, "", @dev={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa]}, "92b10c0cb4fcd14dc568857c14264b05"}}}}, &(0x7f00000000c0)={0x0, 0x2, [0x0, 0x82a]}) 2018/04/21 01:44:14 executing program 3: r0 = socket$inet(0x2, 0x840000000003, 0x2) setsockopt$inet_int(r0, 0x0, 0xc8, &(0x7f0000000140), 0x4) setsockopt$inet_int(r0, 0x0, 0xc8, &(0x7f0000000040), 0x4) 2018/04/21 01:44:14 executing program 7: r0 = add_key$keyring(&(0x7f0000000240)='keyring\x00', &(0x7f0000000380)={0x73, 0x79, 0x7a}, 0x0, 0x0, 0xfffffffffffffffe) r1 = add_key$keyring(&(0x7f0000000400)='keyring\x00', &(0x7f0000000000)={0x73, 0x79, 0x7a}, 0x0, 0x0, r0) r2 = add_key$keyring(&(0x7f00000000c0)='keyring\x00', &(0x7f0000000180)={0x73, 0x79, 0x7a}, 0x0, 0x0, r1) r3 = add_key$user(&(0x7f00003bd000)='user\x00', &(0x7f0000000b00)={0x73, 0x79, 0x7a}, &(0x7f0000000440)='\x00\x00\x00\x00\x00\x00\x00X', 0x8, r2) r4 = add_key$user(&(0x7f0000000140)='user\x00', &(0x7f00000001c0)={0x73, 0x79, 0x7a}, &(0x7f0000000280), 0x169, r1) keyctl$dh_compute(0x17, &(0x7f0000000100)={r3, r4, r4}, &(0x7f0000a53ffb)=""/5, 0x68, &(0x7f0000c61fc8)={&(0x7f0000a3dffa)={'rmd256-generic\x00'}}) 2018/04/21 01:44:14 executing program 5: r0 = socket$inet(0x2, 0x2, 0x0) setsockopt$inet_udp_encap(r0, 0x11, 0x64, &(0x7f0000d09ffc)=0x1, 0x4) bind$inet(r0, &(0x7f0000eed000)={0x2, 0x1}, 0x10) syz_emit_ethernet(0x2a, &(0x7f00000bb000)={@broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x0, 0x11, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff, 0xbb}, @multicast1=0xe0000001}, @udp={0x0, 0x1, 0x8}}}}}, 0x0) 2018/04/21 01:44:14 executing program 4: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000300)='./cgroup\x00', 0x200002, 0x0) r1 = openat$cgroup_int(r0, &(0x7f0000000200)='memory.low\x00', 0x2, 0x0) writev(r1, &(0x7f00000005c0)=[{&(0x7f0000000040)='3', 0x1}], 0x1) 2018/04/21 01:44:14 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0x0, 0x0}) socket$kcm(0x29, 0x2, 0x0) socket$kcm(0x2, 0x2, 0x0) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000040)={0xffffffffffffffff, &(0x7f00000000c0)="b82283392dc50ff1fb635a5849d2f5916ae2fdc24e95e12aa8daccf7393e72be9cc66f"}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f0000346fd4)={0x0, 0x0, 0x0, 0x1000000000000004, 0x202}, 0x2c) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x1, 0x5, &(0x7f0000346fc8)=@framed={{0x18}, [@alu={0x8000000201a7f19, 0x0, 0x7, 0x0, 0x1}], {0x95}}, &(0x7f0000f6bffb)='GPL\x00', 0x0, 0x299, &(0x7f00001a7f05)=""/251}, 0x18) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000140)={r0, 0x50, &(0x7f00000000c0)}, 0x10) socketpair$inet(0x16, 0x541f, 0x0, &(0x7f0000000080)) 2018/04/21 01:44:14 executing program 6: r0 = socket$inet6(0xa, 0x3, 0x3a) setsockopt$inet6_MRT6_ADD_MFC(r0, 0x29, 0xd1, &(0x7f0000000200)={{0xa, 0x4e20, 0x0, @ipv4={[], [0xff, 0xff], @multicast1=0xe0000001}}, {0xa, 0x0, 0x0, @dev={0xfe, 0x80}}}, 0x4) 2018/04/21 01:44:14 executing program 0: perf_event_open(&(0x7f0000348f88)={0x2, 0x70, 0x3e2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$vnet(0xffffffffffffff9c, &(0x7f0000e2d000)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$VHOST_SET_FEATURES(r0, 0x4008af00, &(0x7f0000e4e000)=0x200000000) write$vnet(r0, &(0x7f0000000140)={0x1, {&(0x7f0000000100)=""/24, 0x18, &(0x7f00000001c0)=""/101, 0x0, 0x3}}, 0x68) 2018/04/21 01:44:14 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_int(r0, 0x29, 0x48, &(0x7f0000000140)=0x4000406, 0x4) 2018/04/21 01:44:14 executing program 3: r0 = socket$inet(0x2, 0x840000000003, 0x2) setsockopt$inet_int(r0, 0x0, 0xc8, &(0x7f0000000140), 0x4) setsockopt$inet_int(r0, 0x0, 0xc8, &(0x7f0000000040), 0x4) 2018/04/21 01:44:14 executing program 7: perf_event_open(&(0x7f0000348f88)={0x2, 0x70, 0x3e6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x40000000015, 0x5, 0x0) setsockopt$RDS_CONG_MONITOR(r0, 0x114, 0x6, &(0x7f00000000c0)=0x1, 0x4) poll(&(0x7f0000000100)=[{r0}], 0x1, 0x0) 2018/04/21 01:44:14 executing program 5: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000fc7000)={0x5, 0x20, 0x4000000000080, 0x2}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000fcb000)={r0, &(0x7f0000000100), &(0x7f0000000380)}, 0x20) 2018/04/21 01:44:14 executing program 4: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000300)='./cgroup\x00', 0x200002, 0x0) r1 = openat$cgroup_int(r0, &(0x7f0000000200)='memory.low\x00', 0x2, 0x0) writev(r1, &(0x7f00000005c0)=[{&(0x7f0000000040)='3', 0x1}], 0x1) 2018/04/21 01:44:14 executing program 1: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00003e0000)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f00003b9fdc)) r1 = syz_open_pts(r0, 0x0) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000fdd000)=0x3) ioctl$TCSETSF(r1, 0x5404, &(0x7f0000000040)) 2018/04/21 01:44:14 executing program 6: r0 = socket$inet6(0xa, 0x3, 0x3a) setsockopt$inet6_MRT6_ADD_MFC(r0, 0x29, 0xd1, &(0x7f0000000200)={{0xa, 0x4e20, 0x0, @ipv4={[], [0xff, 0xff], @multicast1=0xe0000001}}, {0xa, 0x0, 0x0, @dev={0xfe, 0x80}}}, 0x4) 2018/04/21 01:44:14 executing program 2: r0 = socket$inet(0x2, 0x806, 0x0) setsockopt$inet_opts(r0, 0x0, 0x4, &(0x7f0000704ffb)="8907040400", 0x5) connect$inet(r0, &(0x7f0000000000)={0x2}, 0x10) 2018/04/21 01:44:14 executing program 3: perf_event_open(&(0x7f000001d000)={0x100000005, 0x78, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_bp={&(0x7f0000000000), 0x1}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x3, 0xe2) getsockopt$inet6_int(r0, 0x29, 0x7, &(0x7f0000004000), &(0x7f0000000000)=0x4) 2018/04/21 01:44:14 executing program 5: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000fc7000)={0x5, 0x20, 0x4000000000080, 0x2}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000fcb000)={r0, &(0x7f0000000100), &(0x7f0000000380)}, 0x20) 2018/04/21 01:44:14 executing program 1: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00003e0000)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f00003b9fdc)) r1 = syz_open_pts(r0, 0x0) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000fdd000)=0x3) ioctl$TCSETSF(r1, 0x5404, &(0x7f0000000040)) 2018/04/21 01:44:14 executing program 7: perf_event_open(&(0x7f0000348f88)={0x2, 0x70, 0x3e6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x40000000015, 0x5, 0x0) setsockopt$RDS_CONG_MONITOR(r0, 0x114, 0x6, &(0x7f00000000c0)=0x1, 0x4) poll(&(0x7f0000000100)=[{r0}], 0x1, 0x0) 2018/04/21 01:44:14 executing program 0: perf_event_open(&(0x7f0000348f88)={0x2, 0x70, 0x3e2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$vnet(0xffffffffffffff9c, &(0x7f0000e2d000)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$VHOST_SET_FEATURES(r0, 0x4008af00, &(0x7f0000e4e000)=0x200000000) write$vnet(r0, &(0x7f0000000140)={0x1, {&(0x7f0000000100)=""/24, 0x18, &(0x7f00000001c0)=""/101, 0x0, 0x3}}, 0x68) 2018/04/21 01:44:14 executing program 3: perf_event_open(&(0x7f000001d000)={0x100000005, 0x78, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_bp={&(0x7f0000000000), 0x1}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x3, 0xe2) getsockopt$inet6_int(r0, 0x29, 0x7, &(0x7f0000004000), &(0x7f0000000000)=0x4) 2018/04/21 01:44:14 executing program 1: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00003e0000)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f00003b9fdc)) r1 = syz_open_pts(r0, 0x0) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000fdd000)=0x3) ioctl$TCSETSF(r1, 0x5404, &(0x7f0000000040)) 2018/04/21 01:44:14 executing program 2: r0 = socket$inet(0x2, 0x806, 0x0) setsockopt$inet_opts(r0, 0x0, 0x4, &(0x7f0000704ffb)="8907040400", 0x5) connect$inet(r0, &(0x7f0000000000)={0x2}, 0x10) 2018/04/21 01:44:14 executing program 4: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000300)='./cgroup\x00', 0x200002, 0x0) r1 = openat$cgroup_int(r0, &(0x7f0000000200)='memory.low\x00', 0x2, 0x0) writev(r1, &(0x7f00000005c0)=[{&(0x7f0000000040)='3', 0x1}], 0x1) 2018/04/21 01:44:14 executing program 7: perf_event_open(&(0x7f0000348f88)={0x2, 0x70, 0x3e6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x40000000015, 0x5, 0x0) setsockopt$RDS_CONG_MONITOR(r0, 0x114, 0x6, &(0x7f00000000c0)=0x1, 0x4) poll(&(0x7f0000000100)=[{r0}], 0x1, 0x0) 2018/04/21 01:44:14 executing program 3: perf_event_open(&(0x7f000001d000)={0x100000005, 0x78, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_bp={&(0x7f0000000000), 0x1}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x3, 0xe2) getsockopt$inet6_int(r0, 0x29, 0x7, &(0x7f0000004000), &(0x7f0000000000)=0x4) 2018/04/21 01:44:14 executing program 6: perf_event_open(&(0x7f0000348f88)={0x2, 0x70, 0x3e6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x40000000015, 0x5, 0x0) setsockopt$RDS_CONG_MONITOR(r0, 0x114, 0x6, &(0x7f00000000c0)=0x1, 0x4) poll(&(0x7f0000000100)=[{r0}], 0x1, 0x0) 2018/04/21 01:44:14 executing program 5: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000fc7000)={0x5, 0x20, 0x4000000000080, 0x2}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000fcb000)={r0, &(0x7f0000000100), &(0x7f0000000380)}, 0x20) 2018/04/21 01:44:14 executing program 0: perf_event_open(&(0x7f0000348f88)={0x2, 0x70, 0x3e2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$vnet(0xffffffffffffff9c, &(0x7f0000e2d000)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$VHOST_SET_FEATURES(r0, 0x4008af00, &(0x7f0000e4e000)=0x200000000) write$vnet(r0, &(0x7f0000000140)={0x1, {&(0x7f0000000100)=""/24, 0x18, &(0x7f00000001c0)=""/101, 0x0, 0x3}}, 0x68) 2018/04/21 01:44:14 executing program 2: r0 = socket$inet(0x2, 0x806, 0x0) setsockopt$inet_opts(r0, 0x0, 0x4, &(0x7f0000704ffb)="8907040400", 0x5) connect$inet(r0, &(0x7f0000000000)={0x2}, 0x10) 2018/04/21 01:44:14 executing program 6: perf_event_open(&(0x7f0000348f88)={0x2, 0x70, 0x3e6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x40000000015, 0x5, 0x0) setsockopt$RDS_CONG_MONITOR(r0, 0x114, 0x6, &(0x7f00000000c0)=0x1, 0x4) poll(&(0x7f0000000100)=[{r0}], 0x1, 0x0) 2018/04/21 01:44:15 executing program 1: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00003e0000)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f00003b9fdc)) r1 = syz_open_pts(r0, 0x0) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000fdd000)=0x3) ioctl$TCSETSF(r1, 0x5404, &(0x7f0000000040)) 2018/04/21 01:44:15 executing program 3: perf_event_open(&(0x7f000001d000)={0x100000005, 0x78, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_bp={&(0x7f0000000000), 0x1}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x3, 0xe2) getsockopt$inet6_int(r0, 0x29, 0x7, &(0x7f0000004000), &(0x7f0000000000)=0x4) 2018/04/21 01:44:15 executing program 5: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000fc7000)={0x5, 0x20, 0x4000000000080, 0x2}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000fcb000)={r0, &(0x7f0000000100), &(0x7f0000000380)}, 0x20) 2018/04/21 01:44:15 executing program 0: perf_event_open(&(0x7f0000348f88)={0x2, 0x70, 0x3e2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$vnet(0xffffffffffffff9c, &(0x7f0000e2d000)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$VHOST_SET_FEATURES(r0, 0x4008af00, &(0x7f0000e4e000)=0x200000000) write$vnet(r0, &(0x7f0000000140)={0x1, {&(0x7f0000000100)=""/24, 0x18, &(0x7f00000001c0)=""/101, 0x0, 0x3}}, 0x68) 2018/04/21 01:44:15 executing program 7: perf_event_open(&(0x7f0000348f88)={0x2, 0x70, 0x3e6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x40000000015, 0x5, 0x0) setsockopt$RDS_CONG_MONITOR(r0, 0x114, 0x6, &(0x7f00000000c0)=0x1, 0x4) poll(&(0x7f0000000100)=[{r0}], 0x1, 0x0) 2018/04/21 01:44:15 executing program 2: r0 = socket$inet(0x2, 0x806, 0x0) setsockopt$inet_opts(r0, 0x0, 0x4, &(0x7f0000704ffb)="8907040400", 0x5) connect$inet(r0, &(0x7f0000000000)={0x2}, 0x10) 2018/04/21 01:44:15 executing program 4: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000300)='./cgroup\x00', 0x200002, 0x0) r1 = openat$cgroup_int(r0, &(0x7f0000000200)='memory.low\x00', 0x2, 0x0) writev(r1, &(0x7f00000005c0)=[{&(0x7f0000000040)='3', 0x1}], 0x1) 2018/04/21 01:44:15 executing program 3: mkdir(&(0x7f0000cb3ff8)='./file0\x00', 0x0) chroot(&(0x7f0000000040)='./file0\x00') mount(&(0x7f00005b9ff8)='./file0\x00', &(0x7f0000000080)='./file0\x00', &(0x7f0000000040)='sockfs\x00', 0x1000, 0x0) chdir(&(0x7f0000cd2ff8)='./file0\x00') symlink(&(0x7f0000ed6ffe)='..', &(0x7f0000000040)='../file0\x00') umount2(&(0x7f0000000000)='../file0\x00', 0x2) chroot(&(0x7f00000000c0)='./file0\x00') mount(&(0x7f0000000340)='./file0\x00', &(0x7f0000000380)='/./file0/file0\x00', &(0x7f00000003c0)='nfs4\x00', 0x1002000, &(0x7f0000000400)) 2018/04/21 01:44:15 executing program 1: r0 = syz_init_net_socket$nfc_llcp(0x27, 0x1, 0x1) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) connect$nfc_llcp(r0, &(0x7f0000000040)={0x27, 0x0, 0x0, 0x0, 0x0, 0x0, "d5e03eb5f683b6f216a898c4d34ab03dba348c57e5859f5f5955aa5047d220d5047a38bd289ccbcc61a14a91a679711c1fea3d6a1a1741acd590e49c665a72", 0x3c}, 0x60) 2018/04/21 01:44:15 executing program 0: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup\x00', 0x200002, 0x0) r1 = openat$cgroup_subtree(r0, &(0x7f0000000000)='cgroup.subtree_control\x00', 0x2, 0x0) write$cgroup_subtree(r1, &(0x7f0000000140)={[{0x2b, 'rdma', 0x20}]}, 0x6) 2018/04/21 01:44:15 executing program 7: r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e2}, 0x0, 0xffffffffffffffff, r0, 0x2) 2018/04/21 01:44:15 executing program 6: perf_event_open(&(0x7f0000348f88)={0x2, 0x70, 0x3e6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x40000000015, 0x5, 0x0) setsockopt$RDS_CONG_MONITOR(r0, 0x114, 0x6, &(0x7f00000000c0)=0x1, 0x4) poll(&(0x7f0000000100)=[{r0}], 0x1, 0x0) 2018/04/21 01:44:15 executing program 5: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000400)={0xa, 0x5, 0x914, 0x4000000005}, 0x2c) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xd, 0x81, 0x4, 0x4, 0x0, r0}, 0x2c) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f00000000c0)={r0, &(0x7f0000000040), &(0x7f0000000140)=""/78}, 0x18) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f00000001c0)={r1, &(0x7f0000000040), &(0x7f00000000c0), 0xffffffffffffffff}, 0x20) 2018/04/21 01:44:15 executing program 0: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup\x00', 0x200002, 0x0) r1 = openat$cgroup_subtree(r0, &(0x7f0000000000)='cgroup.subtree_control\x00', 0x2, 0x0) write$cgroup_subtree(r1, &(0x7f0000000140)={[{0x2b, 'rdma', 0x20}]}, 0x6) 2018/04/21 01:44:15 executing program 3: mkdir(&(0x7f0000cb3ff8)='./file0\x00', 0x0) chroot(&(0x7f0000000040)='./file0\x00') mount(&(0x7f00005b9ff8)='./file0\x00', &(0x7f0000000080)='./file0\x00', &(0x7f0000000040)='sockfs\x00', 0x1000, 0x0) chdir(&(0x7f0000cd2ff8)='./file0\x00') symlink(&(0x7f0000ed6ffe)='..', &(0x7f0000000040)='../file0\x00') umount2(&(0x7f0000000000)='../file0\x00', 0x2) chroot(&(0x7f00000000c0)='./file0\x00') mount(&(0x7f0000000340)='./file0\x00', &(0x7f0000000380)='/./file0/file0\x00', &(0x7f00000003c0)='nfs4\x00', 0x1002000, &(0x7f0000000400)) 2018/04/21 01:44:15 executing program 2: mkdir(&(0x7f0000cb3ff8)='./file0\x00', 0x0) chroot(&(0x7f0000000040)='./file0\x00') mount(&(0x7f00005b9ff8)='./file0\x00', &(0x7f0000000080)='./file0\x00', &(0x7f0000000040)='sockfs\x00', 0x1000, 0x0) chdir(&(0x7f0000cd2ff8)='./file0\x00') symlink(&(0x7f0000ed6ffe)='..', &(0x7f0000000040)='../file0\x00') umount2(&(0x7f0000000000)='../file0\x00', 0x2) chroot(&(0x7f00000000c0)='./file0\x00') mount(&(0x7f0000000340)='./file0\x00', &(0x7f0000000380)='/./file0/file0\x00', &(0x7f00000003c0)='nfs4\x00', 0x1002000, &(0x7f0000000400)) 2018/04/21 01:44:15 executing program 5: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000400)={0xa, 0x5, 0x914, 0x4000000005}, 0x2c) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xd, 0x81, 0x4, 0x4, 0x0, r0}, 0x2c) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f00000000c0)={r0, &(0x7f0000000040), &(0x7f0000000140)=""/78}, 0x18) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f00000001c0)={r1, &(0x7f0000000040), &(0x7f00000000c0), 0xffffffffffffffff}, 0x20) 2018/04/21 01:44:15 executing program 7: r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e2}, 0x0, 0xffffffffffffffff, r0, 0x2) 2018/04/21 01:44:15 executing program 1: r0 = syz_init_net_socket$nfc_llcp(0x27, 0x1, 0x1) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) connect$nfc_llcp(r0, &(0x7f0000000040)={0x27, 0x0, 0x0, 0x0, 0x0, 0x0, "d5e03eb5f683b6f216a898c4d34ab03dba348c57e5859f5f5955aa5047d220d5047a38bd289ccbcc61a14a91a679711c1fea3d6a1a1741acd590e49c665a72", 0x3c}, 0x60) 2018/04/21 01:44:15 executing program 4: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000400)={0xa, 0x5, 0x914, 0x4000000005}, 0x2c) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xd, 0x81, 0x4, 0x4, 0x0, r0}, 0x2c) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f00000000c0)={r0, &(0x7f0000000040), &(0x7f0000000140)=""/78}, 0x18) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f00000001c0)={r1, &(0x7f0000000040), &(0x7f00000000c0), 0xffffffffffffffff}, 0x20) 2018/04/21 01:44:15 executing program 6: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000400)={0xa, 0x5, 0x914, 0x4000000005}, 0x2c) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xd, 0x81, 0x4, 0x4, 0x0, r0}, 0x2c) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f00000000c0)={r0, &(0x7f0000000040), &(0x7f0000000140)=""/78}, 0x18) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f00000001c0)={r1, &(0x7f0000000040), &(0x7f00000000c0), 0xffffffffffffffff}, 0x20) 2018/04/21 01:44:15 executing program 5: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000400)={0xa, 0x5, 0x914, 0x4000000005}, 0x2c) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xd, 0x81, 0x4, 0x4, 0x0, r0}, 0x2c) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f00000000c0)={r0, &(0x7f0000000040), &(0x7f0000000140)=""/78}, 0x18) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f00000001c0)={r1, &(0x7f0000000040), &(0x7f00000000c0), 0xffffffffffffffff}, 0x20) 2018/04/21 01:44:15 executing program 0: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup\x00', 0x200002, 0x0) r1 = openat$cgroup_subtree(r0, &(0x7f0000000000)='cgroup.subtree_control\x00', 0x2, 0x0) write$cgroup_subtree(r1, &(0x7f0000000140)={[{0x2b, 'rdma', 0x20}]}, 0x6) 2018/04/21 01:44:15 executing program 7: r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e2}, 0x0, 0xffffffffffffffff, r0, 0x2) 2018/04/21 01:44:15 executing program 3: mkdir(&(0x7f0000cb3ff8)='./file0\x00', 0x0) chroot(&(0x7f0000000040)='./file0\x00') mount(&(0x7f00005b9ff8)='./file0\x00', &(0x7f0000000080)='./file0\x00', &(0x7f0000000040)='sockfs\x00', 0x1000, 0x0) chdir(&(0x7f0000cd2ff8)='./file0\x00') symlink(&(0x7f0000ed6ffe)='..', &(0x7f0000000040)='../file0\x00') umount2(&(0x7f0000000000)='../file0\x00', 0x2) chroot(&(0x7f00000000c0)='./file0\x00') mount(&(0x7f0000000340)='./file0\x00', &(0x7f0000000380)='/./file0/file0\x00', &(0x7f00000003c0)='nfs4\x00', 0x1002000, &(0x7f0000000400)) 2018/04/21 01:44:15 executing program 2: mkdir(&(0x7f0000cb3ff8)='./file0\x00', 0x0) chroot(&(0x7f0000000040)='./file0\x00') mount(&(0x7f00005b9ff8)='./file0\x00', &(0x7f0000000080)='./file0\x00', &(0x7f0000000040)='sockfs\x00', 0x1000, 0x0) chdir(&(0x7f0000cd2ff8)='./file0\x00') symlink(&(0x7f0000ed6ffe)='..', &(0x7f0000000040)='../file0\x00') umount2(&(0x7f0000000000)='../file0\x00', 0x2) chroot(&(0x7f00000000c0)='./file0\x00') mount(&(0x7f0000000340)='./file0\x00', &(0x7f0000000380)='/./file0/file0\x00', &(0x7f00000003c0)='nfs4\x00', 0x1002000, &(0x7f0000000400)) 2018/04/21 01:44:15 executing program 1: r0 = syz_init_net_socket$nfc_llcp(0x27, 0x1, 0x1) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) connect$nfc_llcp(r0, &(0x7f0000000040)={0x27, 0x0, 0x0, 0x0, 0x0, 0x0, "d5e03eb5f683b6f216a898c4d34ab03dba348c57e5859f5f5955aa5047d220d5047a38bd289ccbcc61a14a91a679711c1fea3d6a1a1741acd590e49c665a72", 0x3c}, 0x60) 2018/04/21 01:44:15 executing program 6: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000400)={0xa, 0x5, 0x914, 0x4000000005}, 0x2c) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xd, 0x81, 0x4, 0x4, 0x0, r0}, 0x2c) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f00000000c0)={r0, &(0x7f0000000040), &(0x7f0000000140)=""/78}, 0x18) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f00000001c0)={r1, &(0x7f0000000040), &(0x7f00000000c0), 0xffffffffffffffff}, 0x20) 2018/04/21 01:44:15 executing program 4: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000400)={0xa, 0x5, 0x914, 0x4000000005}, 0x2c) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xd, 0x81, 0x4, 0x4, 0x0, r0}, 0x2c) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f00000000c0)={r0, &(0x7f0000000040), &(0x7f0000000140)=""/78}, 0x18) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f00000001c0)={r1, &(0x7f0000000040), &(0x7f00000000c0), 0xffffffffffffffff}, 0x20) 2018/04/21 01:44:15 executing program 7: r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e2}, 0x0, 0xffffffffffffffff, r0, 0x2) 2018/04/21 01:44:15 executing program 5: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000400)={0xa, 0x5, 0x914, 0x4000000005}, 0x2c) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xd, 0x81, 0x4, 0x4, 0x0, r0}, 0x2c) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f00000000c0)={r0, &(0x7f0000000040), &(0x7f0000000140)=""/78}, 0x18) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f00000001c0)={r1, &(0x7f0000000040), &(0x7f00000000c0), 0xffffffffffffffff}, 0x20) 2018/04/21 01:44:15 executing program 0: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup\x00', 0x200002, 0x0) r1 = openat$cgroup_subtree(r0, &(0x7f0000000000)='cgroup.subtree_control\x00', 0x2, 0x0) write$cgroup_subtree(r1, &(0x7f0000000140)={[{0x2b, 'rdma', 0x20}]}, 0x6) 2018/04/21 01:44:15 executing program 1: r0 = syz_init_net_socket$nfc_llcp(0x27, 0x1, 0x1) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) connect$nfc_llcp(r0, &(0x7f0000000040)={0x27, 0x0, 0x0, 0x0, 0x0, 0x0, "d5e03eb5f683b6f216a898c4d34ab03dba348c57e5859f5f5955aa5047d220d5047a38bd289ccbcc61a14a91a679711c1fea3d6a1a1741acd590e49c665a72", 0x3c}, 0x60) 2018/04/21 01:44:15 executing program 0: syz_read_part_table(0x0, 0x1, &(0x7f00000000c0)=[{&(0x7f0000000100)="0200eeffffff01000000ff87315336f70000000000000000000000010000000000000000000000000000fffffff5", 0x2e, 0x1c0}]) [ 78.157754] Dev loop0: unable to read RDB block 1 [ 78.162767] loop0: AHDI p1 p4 [ 78.166109] loop0: partition table partially beyond EOD, truncated [ 78.185872] loop0: p1 start 4287050067 is beyond EOD, truncated 2018/04/21 01:44:16 executing program 3: mkdir(&(0x7f0000cb3ff8)='./file0\x00', 0x0) chroot(&(0x7f0000000040)='./file0\x00') mount(&(0x7f00005b9ff8)='./file0\x00', &(0x7f0000000080)='./file0\x00', &(0x7f0000000040)='sockfs\x00', 0x1000, 0x0) chdir(&(0x7f0000cd2ff8)='./file0\x00') symlink(&(0x7f0000ed6ffe)='..', &(0x7f0000000040)='../file0\x00') umount2(&(0x7f0000000000)='../file0\x00', 0x2) chroot(&(0x7f00000000c0)='./file0\x00') mount(&(0x7f0000000340)='./file0\x00', &(0x7f0000000380)='/./file0/file0\x00', &(0x7f00000003c0)='nfs4\x00', 0x1002000, &(0x7f0000000400)) 2018/04/21 01:44:16 executing program 6: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000400)={0xa, 0x5, 0x914, 0x4000000005}, 0x2c) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xd, 0x81, 0x4, 0x4, 0x0, r0}, 0x2c) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f00000000c0)={r0, &(0x7f0000000040), &(0x7f0000000140)=""/78}, 0x18) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f00000001c0)={r1, &(0x7f0000000040), &(0x7f00000000c0), 0xffffffffffffffff}, 0x20) 2018/04/21 01:44:16 executing program 2: mkdir(&(0x7f0000cb3ff8)='./file0\x00', 0x0) chroot(&(0x7f0000000040)='./file0\x00') mount(&(0x7f00005b9ff8)='./file0\x00', &(0x7f0000000080)='./file0\x00', &(0x7f0000000040)='sockfs\x00', 0x1000, 0x0) chdir(&(0x7f0000cd2ff8)='./file0\x00') symlink(&(0x7f0000ed6ffe)='..', &(0x7f0000000040)='../file0\x00') umount2(&(0x7f0000000000)='../file0\x00', 0x2) chroot(&(0x7f00000000c0)='./file0\x00') mount(&(0x7f0000000340)='./file0\x00', &(0x7f0000000380)='/./file0/file0\x00', &(0x7f00000003c0)='nfs4\x00', 0x1002000, &(0x7f0000000400)) 2018/04/21 01:44:16 executing program 7: r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000ff5ffc), 0x4) r1 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000000)={'gre0\x00'}) bind$packet(r1, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}}, 0x14) r2 = socket$inet(0x2, 0x5, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r2, 0x0, 0x80, &(0x7f00000008c0)=@broute={'broute\x00', 0x20, 0x2, 0x3e8, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000280], 0x0, &(0x7f0000000240), &(0x7f0000000280)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x11, 0x0, 0x0, 'ip6gretap0\x00', 'syz_tun\x00', 'ip6tnl0\x00', 'syz_tun\x00', @link_local={0x1, 0x80, 0xc2}, [0x0, 0x1000], @remote={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xbb}, [], 0x70, 0x108, 0x158}, [@common=@RATEEST={'RATEEST\x00', 0x20, {{'syz0\x00'}}}, @common=@LED={'LED\x00', 0x28, {{'syz0\x00'}}}]}, @common=@IDLETIMER={'IDLETIMER\x00', 0x28, {{0x10000, 'syz0\x00'}}}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff, 0x1, [{{{0xd, 0x0, 0x86dd, 'syzkaller0\x00', 'tunl0\x00', 'sit0\x00', 'ifb0\x00', @empty, [], @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [], 0x130, 0x1b0, 0x200, [@ip6={'ip6\x00', 0x50, {{@empty, @ipv4={[], [0xff, 0xff], @local={0xac, 0x14, 0x14, 0xaa}}}}}, @limit={'limit\x00', 0x20}]}, [@common=@IDLETIMER={'IDLETIMER\x00', 0x28, {{0x81, 'syz1\x00'}}}, @common=@NFQUEUE0={'NFQUEUE\x00', 0x8}]}, @common=@LED={'LED\x00', 0x28, {{'syz0\x00'}}}}]}]}, 0x460) getsockopt$inet_sctp6_SCTP_CONTEXT(0xffffffffffffff9c, 0x84, 0x11, &(0x7f0000000000)={0x0, 0x7}, &(0x7f0000000040)=0x8) getsockopt$inet_sctp_SCTP_DEFAULT_SEND_PARAM(r2, 0x84, 0xa, &(0x7f0000000140)={0x2, 0xa2b, 0x4, 0x7, 0x2, 0x20, 0x10000, 0x8a82, r3}, &(0x7f0000000180)=0x20) r5 = socket(0xf, 0x7ff, 0x6f) setsockopt$inet_group_source_req(r5, 0x0, 0xfe0d64ad1c6cb9f1, &(0x7f0000000680)={0x1000, {{0x2, 0x4e23, @multicast1=0xe0000001}}, {{0x2, 0x4e22, @broadcast=0xffffffff}}}, 0x108) setsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(r5, 0x84, 0x6, &(0x7f0000000940)={r4, @in={{0x2, 0x4e23, @multicast1=0xe0000001}}}, 0x84) ioctl$DRM_IOCTL_AGP_ENABLE(r5, 0x40086432, &(0x7f0000000100)) r6 = socket$inet6(0x10, 0x2, 0x0) sendmsg(r6, &(0x7f0000000080)={&(0x7f0000000240)=@nl=@kern={0x10}, 0x80, &(0x7f0000000040)=[{&(0x7f00000001c0)="5500000018007f04002d1cb2a4a280930a0600007da843cf19d0f869390009402f002100040000001900050000fc1700000000dc1338d54400009b84136ef75afb83de448daa7227c43ab8220000060cec4fab91d4", 0x55}], 0x1, &(0x7f00000000c0)}, 0x0) setsockopt$inet6_tcp_TCP_ULP(r5, 0x6, 0x1f, &(0x7f00000007c0)='tls\x00', 0x4) getsockopt$inet6_mtu(r5, 0x29, 0x17, &(0x7f0000000800), &(0x7f0000000840)=0x4) setsockopt$bt_hci_HCI_FILTER(0xffffffffffffffff, 0x0, 0x2, &(0x7f00000000c0)={0x2, 0x8, 0x7, 0x3}, 0x10) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000240)={0x0, 0x6, 0xfffffffffffffffd}, 0x4) ioctl$DRM_IOCTL_MARK_BUFS(0xffffffffffffffff, 0x40206417, &(0x7f0000000080)={0xb6, 0x8, 0x7f, 0x8000, 0x3, 0x1}) r7 = socket$vsock_stream(0x28, 0x1, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r7, 0x28, 0x6, &(0x7f0000581000)={{{@in=@rand_addr, @in6=@mcast2}}, {{}, 0x0, @in=@rand_addr}}, &(0x7f0000000000)=0xe8) 2018/04/21 01:44:16 executing program 4: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000400)={0xa, 0x5, 0x914, 0x4000000005}, 0x2c) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xd, 0x81, 0x4, 0x4, 0x0, r0}, 0x2c) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f00000000c0)={r0, &(0x7f0000000040), &(0x7f0000000140)=""/78}, 0x18) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f00000001c0)={r1, &(0x7f0000000040), &(0x7f00000000c0), 0xffffffffffffffff}, 0x20) 2018/04/21 01:44:16 executing program 0: syz_read_part_table(0x0, 0x1, &(0x7f00000000c0)=[{&(0x7f0000000100)="0200eeffffff01000000ff87315336f70000000000000000000000010000000000000000000000000000fffffff5", 0x2e, 0x1c0}]) 2018/04/21 01:44:16 executing program 1: r0 = syz_open_dev$sndctrl(&(0x7f0000006000)='/dev/snd/controlC#\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_PCM_NEXT_DEVICE(r0, 0x40045532, &(0x7f0000006000)=""/136) syz_open_dev$sndpcmp(&(0x7f000000afee)='/dev/snd/pcmC#D#p\x00', 0x0, 0x400) 2018/04/21 01:44:16 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSARP(r0, 0x8955, &(0x7f0000000000)={{0x2, 0x0, @rand_addr=0xfffffffffffffff9}, {0x0, @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff]}, 0x0, {0x2, 0x0, @multicast1=0xe0000001}, "00080700000400a0b22c582bf3aed17d"}) [ 78.222548] Dev loop0: unable to read RDB block 1 [ 78.227489] loop0: AHDI p1 p4 [ 78.230717] loop0: partition table partially beyond EOD, truncated [ 78.237359] loop0: p1 start 4287050067 is beyond EOD, truncated 2018/04/21 01:44:16 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSARP(r0, 0x8955, &(0x7f0000000000)={{0x2, 0x0, @rand_addr=0xfffffffffffffff9}, {0x0, @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff]}, 0x0, {0x2, 0x0, @multicast1=0xe0000001}, "00080700000400a0b22c582bf3aed17d"}) [ 78.309120] ebt_limit: overflow, try lower: 0/0 2018/04/21 01:44:16 executing program 6: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$evdev(&(0x7f0000000040)='/dev/input/event#\x00', 0x0, 0x0) ioctl$EVIOCGRAB(r0, 0x80284504, &(0x7f00000000c0)) 2018/04/21 01:44:16 executing program 4: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000ff7)='/dev/ppp\x00', 0x0, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000001000)=[{&(0x7f0000007ffe)='0', 0x1}], 0x1, 0x0) setsockopt$netlink_NETLINK_BROADCAST_ERROR(0xffffffffffffffff, 0x10e, 0x4, &(0x7f0000001000), 0x4) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f0000001000)=""/246) ioctl$EVIOCGREP(r0, 0x4010744d, &(0x7f0000001000)=""/174) [ 78.338114] Dev loop0: unable to read RDB block 1 [ 78.343075] loop0: AHDI p1 p4 [ 78.346324] loop0: partition table partially beyond EOD, truncated 2018/04/21 01:44:16 executing program 1: r0 = syz_open_dev$sndctrl(&(0x7f0000006000)='/dev/snd/controlC#\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_PCM_NEXT_DEVICE(r0, 0x40045532, &(0x7f0000006000)=""/136) syz_open_dev$sndpcmp(&(0x7f000000afee)='/dev/snd/pcmC#D#p\x00', 0x0, 0x400) 2018/04/21 01:44:16 executing program 2: r0 = open$dir(&(0x7f00000001c0)='./file0\x00', 0x1fffe, 0x0) perf_event_open(&(0x7f00000000c0)={0x2, 0x70, 0x3e6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fallocate(r0, 0x10, 0x0, 0x8000) 2018/04/21 01:44:16 executing program 3: sched_setaffinity(0x0, 0xffffffffffffff36, &(0x7f0000000140)=0x2) socket$inet_udp(0x2, 0x2, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f0000000080)) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000fcbff7)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_MP_STATE(r2, 0x4004ae99, &(0x7f00000000c0)=0xb) ioctl$KVM_RUN(r2, 0xae80, 0x0) ioctl$KVM_SET_IRQCHIP(r1, 0x4030ae7b, &(0x7f0000000240)=@ioapic) [ 78.382538] ebt_limit: overflow, try lower: 0/0 2018/04/21 01:44:16 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSARP(r0, 0x8955, &(0x7f0000000000)={{0x2, 0x0, @rand_addr=0xfffffffffffffff9}, {0x0, @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff]}, 0x0, {0x2, 0x0, @multicast1=0xe0000001}, "00080700000400a0b22c582bf3aed17d"}) [ 78.447286] loop0: p1 start 4287050067 is beyond EOD, truncated 2018/04/21 01:44:16 executing program 6: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$evdev(&(0x7f0000000040)='/dev/input/event#\x00', 0x0, 0x0) ioctl$EVIOCGRAB(r0, 0x80284504, &(0x7f00000000c0)) 2018/04/21 01:44:16 executing program 1: r0 = syz_open_dev$sndctrl(&(0x7f0000006000)='/dev/snd/controlC#\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_PCM_NEXT_DEVICE(r0, 0x40045532, &(0x7f0000006000)=""/136) syz_open_dev$sndpcmp(&(0x7f000000afee)='/dev/snd/pcmC#D#p\x00', 0x0, 0x400) 2018/04/21 01:44:16 executing program 7: r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000ff5ffc), 0x4) r1 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000000)={'gre0\x00'}) bind$packet(r1, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}}, 0x14) r2 = socket$inet(0x2, 0x5, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r2, 0x0, 0x80, &(0x7f00000008c0)=@broute={'broute\x00', 0x20, 0x2, 0x3e8, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000280], 0x0, &(0x7f0000000240), &(0x7f0000000280)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x11, 0x0, 0x0, 'ip6gretap0\x00', 'syz_tun\x00', 'ip6tnl0\x00', 'syz_tun\x00', @link_local={0x1, 0x80, 0xc2}, [0x0, 0x1000], @remote={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xbb}, [], 0x70, 0x108, 0x158}, [@common=@RATEEST={'RATEEST\x00', 0x20, {{'syz0\x00'}}}, @common=@LED={'LED\x00', 0x28, {{'syz0\x00'}}}]}, @common=@IDLETIMER={'IDLETIMER\x00', 0x28, {{0x10000, 'syz0\x00'}}}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff, 0x1, [{{{0xd, 0x0, 0x86dd, 'syzkaller0\x00', 'tunl0\x00', 'sit0\x00', 'ifb0\x00', @empty, [], @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [], 0x130, 0x1b0, 0x200, [@ip6={'ip6\x00', 0x50, {{@empty, @ipv4={[], [0xff, 0xff], @local={0xac, 0x14, 0x14, 0xaa}}}}}, @limit={'limit\x00', 0x20}]}, [@common=@IDLETIMER={'IDLETIMER\x00', 0x28, {{0x81, 'syz1\x00'}}}, @common=@NFQUEUE0={'NFQUEUE\x00', 0x8}]}, @common=@LED={'LED\x00', 0x28, {{'syz0\x00'}}}}]}]}, 0x460) getsockopt$inet_sctp6_SCTP_CONTEXT(0xffffffffffffff9c, 0x84, 0x11, &(0x7f0000000000)={0x0, 0x7}, &(0x7f0000000040)=0x8) getsockopt$inet_sctp_SCTP_DEFAULT_SEND_PARAM(r2, 0x84, 0xa, &(0x7f0000000140)={0x2, 0xa2b, 0x4, 0x7, 0x2, 0x20, 0x10000, 0x8a82, r3}, &(0x7f0000000180)=0x20) r5 = socket(0xf, 0x7ff, 0x6f) setsockopt$inet_group_source_req(r5, 0x0, 0xfe0d64ad1c6cb9f1, &(0x7f0000000680)={0x1000, {{0x2, 0x4e23, @multicast1=0xe0000001}}, {{0x2, 0x4e22, @broadcast=0xffffffff}}}, 0x108) setsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(r5, 0x84, 0x6, &(0x7f0000000940)={r4, @in={{0x2, 0x4e23, @multicast1=0xe0000001}}}, 0x84) ioctl$DRM_IOCTL_AGP_ENABLE(r5, 0x40086432, &(0x7f0000000100)) r6 = socket$inet6(0x10, 0x2, 0x0) sendmsg(r6, &(0x7f0000000080)={&(0x7f0000000240)=@nl=@kern={0x10}, 0x80, &(0x7f0000000040)=[{&(0x7f00000001c0)="5500000018007f04002d1cb2a4a280930a0600007da843cf19d0f869390009402f002100040000001900050000fc1700000000dc1338d54400009b84136ef75afb83de448daa7227c43ab8220000060cec4fab91d4", 0x55}], 0x1, &(0x7f00000000c0)}, 0x0) setsockopt$inet6_tcp_TCP_ULP(r5, 0x6, 0x1f, &(0x7f00000007c0)='tls\x00', 0x4) getsockopt$inet6_mtu(r5, 0x29, 0x17, &(0x7f0000000800), &(0x7f0000000840)=0x4) setsockopt$bt_hci_HCI_FILTER(0xffffffffffffffff, 0x0, 0x2, &(0x7f00000000c0)={0x2, 0x8, 0x7, 0x3}, 0x10) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000240)={0x0, 0x6, 0xfffffffffffffffd}, 0x4) ioctl$DRM_IOCTL_MARK_BUFS(0xffffffffffffffff, 0x40206417, &(0x7f0000000080)={0xb6, 0x8, 0x7f, 0x8000, 0x3, 0x1}) r7 = socket$vsock_stream(0x28, 0x1, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r7, 0x28, 0x6, &(0x7f0000581000)={{{@in=@rand_addr, @in6=@mcast2}}, {{}, 0x0, @in=@rand_addr}}, &(0x7f0000000000)=0xe8) 2018/04/21 01:44:16 executing program 0: syz_read_part_table(0x0, 0x1, &(0x7f00000000c0)=[{&(0x7f0000000100)="0200eeffffff01000000ff87315336f70000000000000000000000010000000000000000000000000000fffffff5", 0x2e, 0x1c0}]) [ 78.630693] ebt_limit: overflow, try lower: 0/0 [ 78.742542] Dev loop0: unable to read RDB block 1 [ 78.747539] loop0: AHDI p1 p4 [ 78.750868] loop0: partition table partially beyond EOD, truncated [ 78.757465] loop0: p1 start 4287050067 is beyond EOD, truncated 2018/04/21 01:44:17 executing program 2: r0 = open$dir(&(0x7f00000001c0)='./file0\x00', 0x1fffe, 0x0) perf_event_open(&(0x7f00000000c0)={0x2, 0x70, 0x3e6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fallocate(r0, 0x10, 0x0, 0x8000) 2018/04/21 01:44:17 executing program 0: syz_read_part_table(0x0, 0x1, &(0x7f00000000c0)=[{&(0x7f0000000100)="0200eeffffff01000000ff87315336f70000000000000000000000010000000000000000000000000000fffffff5", 0x2e, 0x1c0}]) 2018/04/21 01:44:17 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSARP(r0, 0x8955, &(0x7f0000000000)={{0x2, 0x0, @rand_addr=0xfffffffffffffff9}, {0x0, @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff]}, 0x0, {0x2, 0x0, @multicast1=0xe0000001}, "00080700000400a0b22c582bf3aed17d"}) 2018/04/21 01:44:17 executing program 1: r0 = syz_open_dev$sndctrl(&(0x7f0000006000)='/dev/snd/controlC#\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_PCM_NEXT_DEVICE(r0, 0x40045532, &(0x7f0000006000)=""/136) syz_open_dev$sndpcmp(&(0x7f000000afee)='/dev/snd/pcmC#D#p\x00', 0x0, 0x400) 2018/04/21 01:44:17 executing program 6: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$evdev(&(0x7f0000000040)='/dev/input/event#\x00', 0x0, 0x0) ioctl$EVIOCGRAB(r0, 0x80284504, &(0x7f00000000c0)) 2018/04/21 01:44:17 executing program 4: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000ff7)='/dev/ppp\x00', 0x0, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000001000)=[{&(0x7f0000007ffe)='0', 0x1}], 0x1, 0x0) setsockopt$netlink_NETLINK_BROADCAST_ERROR(0xffffffffffffffff, 0x10e, 0x4, &(0x7f0000001000), 0x4) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f0000001000)=""/246) ioctl$EVIOCGREP(r0, 0x4010744d, &(0x7f0000001000)=""/174) 2018/04/21 01:44:17 executing program 3: sched_setaffinity(0x0, 0xffffffffffffff36, &(0x7f0000000140)=0x2) socket$inet_udp(0x2, 0x2, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f0000000080)) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000fcbff7)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_MP_STATE(r2, 0x4004ae99, &(0x7f00000000c0)=0xb) ioctl$KVM_RUN(r2, 0xae80, 0x0) ioctl$KVM_SET_IRQCHIP(r1, 0x4030ae7b, &(0x7f0000000240)=@ioapic) 2018/04/21 01:44:17 executing program 7: r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000ff5ffc), 0x4) r1 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000000)={'gre0\x00'}) bind$packet(r1, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}}, 0x14) r2 = socket$inet(0x2, 0x5, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r2, 0x0, 0x80, &(0x7f00000008c0)=@broute={'broute\x00', 0x20, 0x2, 0x3e8, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000280], 0x0, &(0x7f0000000240), &(0x7f0000000280)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x11, 0x0, 0x0, 'ip6gretap0\x00', 'syz_tun\x00', 'ip6tnl0\x00', 'syz_tun\x00', @link_local={0x1, 0x80, 0xc2}, [0x0, 0x1000], @remote={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xbb}, [], 0x70, 0x108, 0x158}, [@common=@RATEEST={'RATEEST\x00', 0x20, {{'syz0\x00'}}}, @common=@LED={'LED\x00', 0x28, {{'syz0\x00'}}}]}, @common=@IDLETIMER={'IDLETIMER\x00', 0x28, {{0x10000, 'syz0\x00'}}}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff, 0x1, [{{{0xd, 0x0, 0x86dd, 'syzkaller0\x00', 'tunl0\x00', 'sit0\x00', 'ifb0\x00', @empty, [], @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [], 0x130, 0x1b0, 0x200, [@ip6={'ip6\x00', 0x50, {{@empty, @ipv4={[], [0xff, 0xff], @local={0xac, 0x14, 0x14, 0xaa}}}}}, @limit={'limit\x00', 0x20}]}, [@common=@IDLETIMER={'IDLETIMER\x00', 0x28, {{0x81, 'syz1\x00'}}}, @common=@NFQUEUE0={'NFQUEUE\x00', 0x8}]}, @common=@LED={'LED\x00', 0x28, {{'syz0\x00'}}}}]}]}, 0x460) getsockopt$inet_sctp6_SCTP_CONTEXT(0xffffffffffffff9c, 0x84, 0x11, &(0x7f0000000000)={0x0, 0x7}, &(0x7f0000000040)=0x8) getsockopt$inet_sctp_SCTP_DEFAULT_SEND_PARAM(r2, 0x84, 0xa, &(0x7f0000000140)={0x2, 0xa2b, 0x4, 0x7, 0x2, 0x20, 0x10000, 0x8a82, r3}, &(0x7f0000000180)=0x20) r5 = socket(0xf, 0x7ff, 0x6f) setsockopt$inet_group_source_req(r5, 0x0, 0xfe0d64ad1c6cb9f1, &(0x7f0000000680)={0x1000, {{0x2, 0x4e23, @multicast1=0xe0000001}}, {{0x2, 0x4e22, @broadcast=0xffffffff}}}, 0x108) setsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(r5, 0x84, 0x6, &(0x7f0000000940)={r4, @in={{0x2, 0x4e23, @multicast1=0xe0000001}}}, 0x84) ioctl$DRM_IOCTL_AGP_ENABLE(r5, 0x40086432, &(0x7f0000000100)) r6 = socket$inet6(0x10, 0x2, 0x0) sendmsg(r6, &(0x7f0000000080)={&(0x7f0000000240)=@nl=@kern={0x10}, 0x80, &(0x7f0000000040)=[{&(0x7f00000001c0)="5500000018007f04002d1cb2a4a280930a0600007da843cf19d0f869390009402f002100040000001900050000fc1700000000dc1338d54400009b84136ef75afb83de448daa7227c43ab8220000060cec4fab91d4", 0x55}], 0x1, &(0x7f00000000c0)}, 0x0) setsockopt$inet6_tcp_TCP_ULP(r5, 0x6, 0x1f, &(0x7f00000007c0)='tls\x00', 0x4) getsockopt$inet6_mtu(r5, 0x29, 0x17, &(0x7f0000000800), &(0x7f0000000840)=0x4) setsockopt$bt_hci_HCI_FILTER(0xffffffffffffffff, 0x0, 0x2, &(0x7f00000000c0)={0x2, 0x8, 0x7, 0x3}, 0x10) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000240)={0x0, 0x6, 0xfffffffffffffffd}, 0x4) ioctl$DRM_IOCTL_MARK_BUFS(0xffffffffffffffff, 0x40206417, &(0x7f0000000080)={0xb6, 0x8, 0x7f, 0x8000, 0x3, 0x1}) r7 = socket$vsock_stream(0x28, 0x1, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r7, 0x28, 0x6, &(0x7f0000581000)={{{@in=@rand_addr, @in6=@mcast2}}, {{}, 0x0, @in=@rand_addr}}, &(0x7f0000000000)=0xe8) [ 79.453504] ebt_limit: overflow, try lower: 0/0 [ 79.462634] Dev loop0: unable to read RDB block 1 [ 79.467606] loop0: AHDI p1 p4 [ 79.470869] loop0: partition table partially beyond EOD, truncated 2018/04/21 01:44:17 executing program 6: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$evdev(&(0x7f0000000040)='/dev/input/event#\x00', 0x0, 0x0) ioctl$EVIOCGRAB(r0, 0x80284504, &(0x7f00000000c0)) 2018/04/21 01:44:17 executing program 7: r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000ff5ffc), 0x4) r1 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000000)={'gre0\x00'}) bind$packet(r1, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}}, 0x14) r2 = socket$inet(0x2, 0x5, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r2, 0x0, 0x80, &(0x7f00000008c0)=@broute={'broute\x00', 0x20, 0x2, 0x3e8, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000280], 0x0, &(0x7f0000000240), &(0x7f0000000280)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x11, 0x0, 0x0, 'ip6gretap0\x00', 'syz_tun\x00', 'ip6tnl0\x00', 'syz_tun\x00', @link_local={0x1, 0x80, 0xc2}, [0x0, 0x1000], @remote={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xbb}, [], 0x70, 0x108, 0x158}, [@common=@RATEEST={'RATEEST\x00', 0x20, {{'syz0\x00'}}}, @common=@LED={'LED\x00', 0x28, {{'syz0\x00'}}}]}, @common=@IDLETIMER={'IDLETIMER\x00', 0x28, {{0x10000, 'syz0\x00'}}}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff, 0x1, [{{{0xd, 0x0, 0x86dd, 'syzkaller0\x00', 'tunl0\x00', 'sit0\x00', 'ifb0\x00', @empty, [], @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [], 0x130, 0x1b0, 0x200, [@ip6={'ip6\x00', 0x50, {{@empty, @ipv4={[], [0xff, 0xff], @local={0xac, 0x14, 0x14, 0xaa}}}}}, @limit={'limit\x00', 0x20}]}, [@common=@IDLETIMER={'IDLETIMER\x00', 0x28, {{0x81, 'syz1\x00'}}}, @common=@NFQUEUE0={'NFQUEUE\x00', 0x8}]}, @common=@LED={'LED\x00', 0x28, {{'syz0\x00'}}}}]}]}, 0x460) getsockopt$inet_sctp6_SCTP_CONTEXT(0xffffffffffffff9c, 0x84, 0x11, &(0x7f0000000000)={0x0, 0x7}, &(0x7f0000000040)=0x8) getsockopt$inet_sctp_SCTP_DEFAULT_SEND_PARAM(r2, 0x84, 0xa, &(0x7f0000000140)={0x2, 0xa2b, 0x4, 0x7, 0x2, 0x20, 0x10000, 0x8a82, r3}, &(0x7f0000000180)=0x20) r5 = socket(0xf, 0x7ff, 0x6f) setsockopt$inet_group_source_req(r5, 0x0, 0xfe0d64ad1c6cb9f1, &(0x7f0000000680)={0x1000, {{0x2, 0x4e23, @multicast1=0xe0000001}}, {{0x2, 0x4e22, @broadcast=0xffffffff}}}, 0x108) setsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(r5, 0x84, 0x6, &(0x7f0000000940)={r4, @in={{0x2, 0x4e23, @multicast1=0xe0000001}}}, 0x84) ioctl$DRM_IOCTL_AGP_ENABLE(r5, 0x40086432, &(0x7f0000000100)) r6 = socket$inet6(0x10, 0x2, 0x0) sendmsg(r6, &(0x7f0000000080)={&(0x7f0000000240)=@nl=@kern={0x10}, 0x80, &(0x7f0000000040)=[{&(0x7f00000001c0)="5500000018007f04002d1cb2a4a280930a0600007da843cf19d0f869390009402f002100040000001900050000fc1700000000dc1338d54400009b84136ef75afb83de448daa7227c43ab8220000060cec4fab91d4", 0x55}], 0x1, &(0x7f00000000c0)}, 0x0) setsockopt$inet6_tcp_TCP_ULP(r5, 0x6, 0x1f, &(0x7f00000007c0)='tls\x00', 0x4) getsockopt$inet6_mtu(r5, 0x29, 0x17, &(0x7f0000000800), &(0x7f0000000840)=0x4) setsockopt$bt_hci_HCI_FILTER(0xffffffffffffffff, 0x0, 0x2, &(0x7f00000000c0)={0x2, 0x8, 0x7, 0x3}, 0x10) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000240)={0x0, 0x6, 0xfffffffffffffffd}, 0x4) ioctl$DRM_IOCTL_MARK_BUFS(0xffffffffffffffff, 0x40206417, &(0x7f0000000080)={0xb6, 0x8, 0x7f, 0x8000, 0x3, 0x1}) r7 = socket$vsock_stream(0x28, 0x1, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r7, 0x28, 0x6, &(0x7f0000581000)={{{@in=@rand_addr, @in6=@mcast2}}, {{}, 0x0, @in=@rand_addr}}, &(0x7f0000000000)=0xe8) [ 79.527451] loop0: p1 start 4287050067 is beyond EOD, truncated 2018/04/21 01:44:17 executing program 2: r0 = open$dir(&(0x7f00000001c0)='./file0\x00', 0x1fffe, 0x0) perf_event_open(&(0x7f00000000c0)={0x2, 0x70, 0x3e6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fallocate(r0, 0x10, 0x0, 0x8000) [ 79.625675] ebt_limit: overflow, try lower: 0/0 2018/04/21 01:44:17 executing program 4: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000ff7)='/dev/ppp\x00', 0x0, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000001000)=[{&(0x7f0000007ffe)='0', 0x1}], 0x1, 0x0) setsockopt$netlink_NETLINK_BROADCAST_ERROR(0xffffffffffffffff, 0x10e, 0x4, &(0x7f0000001000), 0x4) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f0000001000)=""/246) ioctl$EVIOCGREP(r0, 0x4010744d, &(0x7f0000001000)=""/174) 2018/04/21 01:44:17 executing program 2: r0 = open$dir(&(0x7f00000001c0)='./file0\x00', 0x1fffe, 0x0) perf_event_open(&(0x7f00000000c0)={0x2, 0x70, 0x3e6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fallocate(r0, 0x10, 0x0, 0x8000) 2018/04/21 01:44:18 executing program 5: r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000ff5ffc), 0x4) r1 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000000)={'gre0\x00'}) bind$packet(r1, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}}, 0x14) r2 = socket$inet(0x2, 0x5, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r2, 0x0, 0x80, &(0x7f00000008c0)=@broute={'broute\x00', 0x20, 0x2, 0x3e8, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000280], 0x0, &(0x7f0000000240), &(0x7f0000000280)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x11, 0x0, 0x0, 'ip6gretap0\x00', 'syz_tun\x00', 'ip6tnl0\x00', 'syz_tun\x00', @link_local={0x1, 0x80, 0xc2}, [0x0, 0x1000], @remote={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xbb}, [], 0x70, 0x108, 0x158}, [@common=@RATEEST={'RATEEST\x00', 0x20, {{'syz0\x00'}}}, @common=@LED={'LED\x00', 0x28, {{'syz0\x00'}}}]}, @common=@IDLETIMER={'IDLETIMER\x00', 0x28, {{0x10000, 'syz0\x00'}}}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff, 0x1, [{{{0xd, 0x0, 0x86dd, 'syzkaller0\x00', 'tunl0\x00', 'sit0\x00', 'ifb0\x00', @empty, [], @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [], 0x130, 0x1b0, 0x200, [@ip6={'ip6\x00', 0x50, {{@empty, @ipv4={[], [0xff, 0xff], @local={0xac, 0x14, 0x14, 0xaa}}}}}, @limit={'limit\x00', 0x20}]}, [@common=@IDLETIMER={'IDLETIMER\x00', 0x28, {{0x81, 'syz1\x00'}}}, @common=@NFQUEUE0={'NFQUEUE\x00', 0x8}]}, @common=@LED={'LED\x00', 0x28, {{'syz0\x00'}}}}]}]}, 0x460) getsockopt$inet_sctp6_SCTP_CONTEXT(0xffffffffffffff9c, 0x84, 0x11, &(0x7f0000000000)={0x0, 0x7}, &(0x7f0000000040)=0x8) getsockopt$inet_sctp_SCTP_DEFAULT_SEND_PARAM(r2, 0x84, 0xa, &(0x7f0000000140)={0x2, 0xa2b, 0x4, 0x7, 0x2, 0x20, 0x10000, 0x8a82, r3}, &(0x7f0000000180)=0x20) r5 = socket(0xf, 0x7ff, 0x6f) setsockopt$inet_group_source_req(r5, 0x0, 0xfe0d64ad1c6cb9f1, &(0x7f0000000680)={0x1000, {{0x2, 0x4e23, @multicast1=0xe0000001}}, {{0x2, 0x4e22, @broadcast=0xffffffff}}}, 0x108) setsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(r5, 0x84, 0x6, &(0x7f0000000940)={r4, @in={{0x2, 0x4e23, @multicast1=0xe0000001}}}, 0x84) ioctl$DRM_IOCTL_AGP_ENABLE(r5, 0x40086432, &(0x7f0000000100)) r6 = socket$inet6(0x10, 0x2, 0x0) sendmsg(r6, &(0x7f0000000080)={&(0x7f0000000240)=@nl=@kern={0x10}, 0x80, &(0x7f0000000040)=[{&(0x7f00000001c0)="5500000018007f04002d1cb2a4a280930a0600007da843cf19d0f869390009402f002100040000001900050000fc1700000000dc1338d54400009b84136ef75afb83de448daa7227c43ab8220000060cec4fab91d4", 0x55}], 0x1, &(0x7f00000000c0)}, 0x0) setsockopt$inet6_tcp_TCP_ULP(r5, 0x6, 0x1f, &(0x7f00000007c0)='tls\x00', 0x4) getsockopt$inet6_mtu(r5, 0x29, 0x17, &(0x7f0000000800), &(0x7f0000000840)=0x4) setsockopt$bt_hci_HCI_FILTER(0xffffffffffffffff, 0x0, 0x2, &(0x7f00000000c0)={0x2, 0x8, 0x7, 0x3}, 0x10) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000240)={0x0, 0x6, 0xfffffffffffffffd}, 0x4) ioctl$DRM_IOCTL_MARK_BUFS(0xffffffffffffffff, 0x40206417, &(0x7f0000000080)={0xb6, 0x8, 0x7f, 0x8000, 0x3, 0x1}) r7 = socket$vsock_stream(0x28, 0x1, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r7, 0x28, 0x6, &(0x7f0000581000)={{{@in=@rand_addr, @in6=@mcast2}}, {{}, 0x0, @in=@rand_addr}}, &(0x7f0000000000)=0xe8) 2018/04/21 01:44:18 executing program 6: process_vm_writev(0x0, &(0x7f000000e000), 0x0, &(0x7f0000003fd0), 0x0, 0x2000e000) 2018/04/21 01:44:18 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x1004000000004) writev(r0, &(0x7f0000000700)=[{&(0x7f0000000740)="580000001400192340a14b80fd0d8c560a0600000000e076000543d8d8fe5800040024ca7f4f643e8900050028635a000510f5100002000000000000001c04ed5dfffff500002f000d00010004040800b400000009000005", 0x58}], 0x1) 2018/04/21 01:44:18 executing program 0: r0 = memfd_create(&(0x7f0000000000)="00000000004560f38ad02000000000800000000000000000000000", 0x0) write$binfmt_elf64(r0, &(0x7f0000000340)=ANY=[@ANYBLOB="7f454c46ff000000000000000000000003003e0000000000160000000000000040000000000000000000000000000000000000000000380002"], 0x39) execveat(r0, &(0x7f0000ff7000)='./file0\x00', &(0x7f0000d0e000), &(0x7f000034bff8)=[&(0x7f0000ff7000)="00000000000000060804002000fffc0c6565643b799365005f1b76"], 0x1000) 2018/04/21 01:44:18 executing program 3: sched_setaffinity(0x0, 0xffffffffffffff36, &(0x7f0000000140)=0x2) socket$inet_udp(0x2, 0x2, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f0000000080)) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000fcbff7)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_MP_STATE(r2, 0x4004ae99, &(0x7f00000000c0)=0xb) ioctl$KVM_RUN(r2, 0xae80, 0x0) ioctl$KVM_SET_IRQCHIP(r1, 0x4030ae7b, &(0x7f0000000240)=@ioapic) 2018/04/21 01:44:18 executing program 4: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000ff7)='/dev/ppp\x00', 0x0, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000001000)=[{&(0x7f0000007ffe)='0', 0x1}], 0x1, 0x0) setsockopt$netlink_NETLINK_BROADCAST_ERROR(0xffffffffffffffff, 0x10e, 0x4, &(0x7f0000001000), 0x4) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f0000001000)=""/246) ioctl$EVIOCGREP(r0, 0x4010744d, &(0x7f0000001000)=""/174) 2018/04/21 01:44:18 executing program 1: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000ff7)='/dev/ppp\x00', 0x0, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000001000)=[{&(0x7f0000007ffe)='0', 0x1}], 0x1, 0x0) setsockopt$netlink_NETLINK_BROADCAST_ERROR(0xffffffffffffffff, 0x10e, 0x4, &(0x7f0000001000), 0x4) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f0000001000)=""/246) ioctl$EVIOCGREP(r0, 0x4010744d, &(0x7f0000001000)=""/174) 2018/04/21 01:44:18 executing program 7: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = memfd_create(&(0x7f0000000000)="17", 0x0) write$binfmt_elf32(r0, &(0x7f0000000300)=ANY=[@ANYBLOB="7f454c460000000000000000000000000200060000000000000000003800000000000000eaffffff0000200001"], 0x2d) execveat(r0, &(0x7f0000ff7000)='./file0\x00', &(0x7f0000000580), &(0x7f000034bff8)=[&(0x7f0000ff7000)="00000000000000060804002000fffc0c6565643b799365005f1b76"], 0x1000) 2018/04/21 01:44:18 executing program 6: process_vm_writev(0x0, &(0x7f000000e000), 0x0, &(0x7f0000003fd0), 0x0, 0x2000e000) [ 80.441728] ebt_limit: overflow, try lower: 0/0 2018/04/21 01:44:18 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x1004000000004) writev(r0, &(0x7f0000000700)=[{&(0x7f0000000740)="580000001400192340a14b80fd0d8c560a0600000000e076000543d8d8fe5800040024ca7f4f643e8900050028635a000510f5100002000000000000001c04ed5dfffff500002f000d00010004040800b400000009000005", 0x58}], 0x1) 2018/04/21 01:44:18 executing program 5: r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000ff5ffc), 0x4) r1 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000000)={'gre0\x00'}) bind$packet(r1, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}}, 0x14) r2 = socket$inet(0x2, 0x5, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r2, 0x0, 0x80, &(0x7f00000008c0)=@broute={'broute\x00', 0x20, 0x2, 0x3e8, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000280], 0x0, &(0x7f0000000240), &(0x7f0000000280)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x11, 0x0, 0x0, 'ip6gretap0\x00', 'syz_tun\x00', 'ip6tnl0\x00', 'syz_tun\x00', @link_local={0x1, 0x80, 0xc2}, [0x0, 0x1000], @remote={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xbb}, [], 0x70, 0x108, 0x158}, [@common=@RATEEST={'RATEEST\x00', 0x20, {{'syz0\x00'}}}, @common=@LED={'LED\x00', 0x28, {{'syz0\x00'}}}]}, @common=@IDLETIMER={'IDLETIMER\x00', 0x28, {{0x10000, 'syz0\x00'}}}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff, 0x1, [{{{0xd, 0x0, 0x86dd, 'syzkaller0\x00', 'tunl0\x00', 'sit0\x00', 'ifb0\x00', @empty, [], @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [], 0x130, 0x1b0, 0x200, [@ip6={'ip6\x00', 0x50, {{@empty, @ipv4={[], [0xff, 0xff], @local={0xac, 0x14, 0x14, 0xaa}}}}}, @limit={'limit\x00', 0x20}]}, [@common=@IDLETIMER={'IDLETIMER\x00', 0x28, {{0x81, 'syz1\x00'}}}, @common=@NFQUEUE0={'NFQUEUE\x00', 0x8}]}, @common=@LED={'LED\x00', 0x28, {{'syz0\x00'}}}}]}]}, 0x460) getsockopt$inet_sctp6_SCTP_CONTEXT(0xffffffffffffff9c, 0x84, 0x11, &(0x7f0000000000)={0x0, 0x7}, &(0x7f0000000040)=0x8) getsockopt$inet_sctp_SCTP_DEFAULT_SEND_PARAM(r2, 0x84, 0xa, &(0x7f0000000140)={0x2, 0xa2b, 0x4, 0x7, 0x2, 0x20, 0x10000, 0x8a82, r3}, &(0x7f0000000180)=0x20) r5 = socket(0xf, 0x7ff, 0x6f) setsockopt$inet_group_source_req(r5, 0x0, 0xfe0d64ad1c6cb9f1, &(0x7f0000000680)={0x1000, {{0x2, 0x4e23, @multicast1=0xe0000001}}, {{0x2, 0x4e22, @broadcast=0xffffffff}}}, 0x108) setsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(r5, 0x84, 0x6, &(0x7f0000000940)={r4, @in={{0x2, 0x4e23, @multicast1=0xe0000001}}}, 0x84) ioctl$DRM_IOCTL_AGP_ENABLE(r5, 0x40086432, &(0x7f0000000100)) r6 = socket$inet6(0x10, 0x2, 0x0) sendmsg(r6, &(0x7f0000000080)={&(0x7f0000000240)=@nl=@kern={0x10}, 0x80, &(0x7f0000000040)=[{&(0x7f00000001c0)="5500000018007f04002d1cb2a4a280930a0600007da843cf19d0f869390009402f002100040000001900050000fc1700000000dc1338d54400009b84136ef75afb83de448daa7227c43ab8220000060cec4fab91d4", 0x55}], 0x1, &(0x7f00000000c0)}, 0x0) setsockopt$inet6_tcp_TCP_ULP(r5, 0x6, 0x1f, &(0x7f00000007c0)='tls\x00', 0x4) getsockopt$inet6_mtu(r5, 0x29, 0x17, &(0x7f0000000800), &(0x7f0000000840)=0x4) setsockopt$bt_hci_HCI_FILTER(0xffffffffffffffff, 0x0, 0x2, &(0x7f00000000c0)={0x2, 0x8, 0x7, 0x3}, 0x10) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000240)={0x0, 0x6, 0xfffffffffffffffd}, 0x4) ioctl$DRM_IOCTL_MARK_BUFS(0xffffffffffffffff, 0x40206417, &(0x7f0000000080)={0xb6, 0x8, 0x7f, 0x8000, 0x3, 0x1}) r7 = socket$vsock_stream(0x28, 0x1, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r7, 0x28, 0x6, &(0x7f0000581000)={{{@in=@rand_addr, @in6=@mcast2}}, {{}, 0x0, @in=@rand_addr}}, &(0x7f0000000000)=0xe8) 2018/04/21 01:44:18 executing program 0: r0 = memfd_create(&(0x7f0000000000)="00000000004560f38ad02000000000800000000000000000000000", 0x0) write$binfmt_elf64(r0, &(0x7f0000000340)=ANY=[@ANYBLOB="7f454c46ff000000000000000000000003003e0000000000160000000000000040000000000000000000000000000000000000000000380002"], 0x39) execveat(r0, &(0x7f0000ff7000)='./file0\x00', &(0x7f0000d0e000), &(0x7f000034bff8)=[&(0x7f0000ff7000)="00000000000000060804002000fffc0c6565643b799365005f1b76"], 0x1000) 2018/04/21 01:44:18 executing program 7: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = memfd_create(&(0x7f0000000000)="17", 0x0) write$binfmt_elf32(r0, &(0x7f0000000300)=ANY=[@ANYBLOB="7f454c460000000000000000000000000200060000000000000000003800000000000000eaffffff0000200001"], 0x2d) execveat(r0, &(0x7f0000ff7000)='./file0\x00', &(0x7f0000000580), &(0x7f000034bff8)=[&(0x7f0000ff7000)="00000000000000060804002000fffc0c6565643b799365005f1b76"], 0x1000) 2018/04/21 01:44:18 executing program 6: process_vm_writev(0x0, &(0x7f000000e000), 0x0, &(0x7f0000003fd0), 0x0, 0x2000e000) 2018/04/21 01:44:18 executing program 1: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000ff7)='/dev/ppp\x00', 0x0, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000001000)=[{&(0x7f0000007ffe)='0', 0x1}], 0x1, 0x0) setsockopt$netlink_NETLINK_BROADCAST_ERROR(0xffffffffffffffff, 0x10e, 0x4, &(0x7f0000001000), 0x4) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f0000001000)=""/246) ioctl$EVIOCGREP(r0, 0x4010744d, &(0x7f0000001000)=""/174) 2018/04/21 01:44:18 executing program 4: perf_event_open(&(0x7f0000348f88)={0x2, 0x70, 0x3e6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_init_net_socket$nfc_llcp(0x27, 0x3, 0x1) r1 = syz_init_net_socket$nfc_llcp(0x27, 0x3, 0x1) dup2(r0, r1) 2018/04/21 01:44:18 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x1004000000004) writev(r0, &(0x7f0000000700)=[{&(0x7f0000000740)="580000001400192340a14b80fd0d8c560a0600000000e076000543d8d8fe5800040024ca7f4f643e8900050028635a000510f5100002000000000000001c04ed5dfffff500002f000d00010004040800b400000009000005", 0x58}], 0x1) 2018/04/21 01:44:18 executing program 6: process_vm_writev(0x0, &(0x7f000000e000), 0x0, &(0x7f0000003fd0), 0x0, 0x2000e000) [ 80.671742] ebt_limit: overflow, try lower: 0/0 2018/04/21 01:44:19 executing program 7: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = memfd_create(&(0x7f0000000000)="17", 0x0) write$binfmt_elf32(r0, &(0x7f0000000300)=ANY=[@ANYBLOB="7f454c460000000000000000000000000200060000000000000000003800000000000000eaffffff0000200001"], 0x2d) execveat(r0, &(0x7f0000ff7000)='./file0\x00', &(0x7f0000000580), &(0x7f000034bff8)=[&(0x7f0000ff7000)="00000000000000060804002000fffc0c6565643b799365005f1b76"], 0x1000) 2018/04/21 01:44:19 executing program 0: r0 = memfd_create(&(0x7f0000000000)="00000000004560f38ad02000000000800000000000000000000000", 0x0) write$binfmt_elf64(r0, &(0x7f0000000340)=ANY=[@ANYBLOB="7f454c46ff000000000000000000000003003e0000000000160000000000000040000000000000000000000000000000000000000000380002"], 0x39) execveat(r0, &(0x7f0000ff7000)='./file0\x00', &(0x7f0000d0e000), &(0x7f000034bff8)=[&(0x7f0000ff7000)="00000000000000060804002000fffc0c6565643b799365005f1b76"], 0x1000) 2018/04/21 01:44:19 executing program 6: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x13, &(0x7f0000ffbffc)=0x1, 0x4) setsockopt$inet_tcp_int(r0, 0x6, 0x14, &(0x7f00005e3ffc)=0x2, 0x4) getsockopt$inet_tcp_int(r0, 0x6, 0x15, &(0x7f0000000000), &(0x7f0000000040)=0x4) 2018/04/21 01:44:19 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x1004000000004) writev(r0, &(0x7f0000000700)=[{&(0x7f0000000740)="580000001400192340a14b80fd0d8c560a0600000000e076000543d8d8fe5800040024ca7f4f643e8900050028635a000510f5100002000000000000001c04ed5dfffff500002f000d00010004040800b400000009000005", 0x58}], 0x1) 2018/04/21 01:44:19 executing program 5: r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000ff5ffc), 0x4) r1 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000000)={'gre0\x00'}) bind$packet(r1, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}}, 0x14) r2 = socket$inet(0x2, 0x5, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r2, 0x0, 0x80, &(0x7f00000008c0)=@broute={'broute\x00', 0x20, 0x2, 0x3e8, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000280], 0x0, &(0x7f0000000240), &(0x7f0000000280)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x11, 0x0, 0x0, 'ip6gretap0\x00', 'syz_tun\x00', 'ip6tnl0\x00', 'syz_tun\x00', @link_local={0x1, 0x80, 0xc2}, [0x0, 0x1000], @remote={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xbb}, [], 0x70, 0x108, 0x158}, [@common=@RATEEST={'RATEEST\x00', 0x20, {{'syz0\x00'}}}, @common=@LED={'LED\x00', 0x28, {{'syz0\x00'}}}]}, @common=@IDLETIMER={'IDLETIMER\x00', 0x28, {{0x10000, 'syz0\x00'}}}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff, 0x1, [{{{0xd, 0x0, 0x86dd, 'syzkaller0\x00', 'tunl0\x00', 'sit0\x00', 'ifb0\x00', @empty, [], @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [], 0x130, 0x1b0, 0x200, [@ip6={'ip6\x00', 0x50, {{@empty, @ipv4={[], [0xff, 0xff], @local={0xac, 0x14, 0x14, 0xaa}}}}}, @limit={'limit\x00', 0x20}]}, [@common=@IDLETIMER={'IDLETIMER\x00', 0x28, {{0x81, 'syz1\x00'}}}, @common=@NFQUEUE0={'NFQUEUE\x00', 0x8}]}, @common=@LED={'LED\x00', 0x28, {{'syz0\x00'}}}}]}]}, 0x460) getsockopt$inet_sctp6_SCTP_CONTEXT(0xffffffffffffff9c, 0x84, 0x11, &(0x7f0000000000)={0x0, 0x7}, &(0x7f0000000040)=0x8) getsockopt$inet_sctp_SCTP_DEFAULT_SEND_PARAM(r2, 0x84, 0xa, &(0x7f0000000140)={0x2, 0xa2b, 0x4, 0x7, 0x2, 0x20, 0x10000, 0x8a82, r3}, &(0x7f0000000180)=0x20) r5 = socket(0xf, 0x7ff, 0x6f) setsockopt$inet_group_source_req(r5, 0x0, 0xfe0d64ad1c6cb9f1, &(0x7f0000000680)={0x1000, {{0x2, 0x4e23, @multicast1=0xe0000001}}, {{0x2, 0x4e22, @broadcast=0xffffffff}}}, 0x108) setsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(r5, 0x84, 0x6, &(0x7f0000000940)={r4, @in={{0x2, 0x4e23, @multicast1=0xe0000001}}}, 0x84) ioctl$DRM_IOCTL_AGP_ENABLE(r5, 0x40086432, &(0x7f0000000100)) r6 = socket$inet6(0x10, 0x2, 0x0) sendmsg(r6, &(0x7f0000000080)={&(0x7f0000000240)=@nl=@kern={0x10}, 0x80, &(0x7f0000000040)=[{&(0x7f00000001c0)="5500000018007f04002d1cb2a4a280930a0600007da843cf19d0f869390009402f002100040000001900050000fc1700000000dc1338d54400009b84136ef75afb83de448daa7227c43ab8220000060cec4fab91d4", 0x55}], 0x1, &(0x7f00000000c0)}, 0x0) setsockopt$inet6_tcp_TCP_ULP(r5, 0x6, 0x1f, &(0x7f00000007c0)='tls\x00', 0x4) getsockopt$inet6_mtu(r5, 0x29, 0x17, &(0x7f0000000800), &(0x7f0000000840)=0x4) setsockopt$bt_hci_HCI_FILTER(0xffffffffffffffff, 0x0, 0x2, &(0x7f00000000c0)={0x2, 0x8, 0x7, 0x3}, 0x10) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000240)={0x0, 0x6, 0xfffffffffffffffd}, 0x4) ioctl$DRM_IOCTL_MARK_BUFS(0xffffffffffffffff, 0x40206417, &(0x7f0000000080)={0xb6, 0x8, 0x7f, 0x8000, 0x3, 0x1}) r7 = socket$vsock_stream(0x28, 0x1, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r7, 0x28, 0x6, &(0x7f0000581000)={{{@in=@rand_addr, @in6=@mcast2}}, {{}, 0x0, @in=@rand_addr}}, &(0x7f0000000000)=0xe8) 2018/04/21 01:44:19 executing program 3: sched_setaffinity(0x0, 0xffffffffffffff36, &(0x7f0000000140)=0x2) socket$inet_udp(0x2, 0x2, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f0000000080)) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000fcbff7)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_MP_STATE(r2, 0x4004ae99, &(0x7f00000000c0)=0xb) ioctl$KVM_RUN(r2, 0xae80, 0x0) ioctl$KVM_SET_IRQCHIP(r1, 0x4030ae7b, &(0x7f0000000240)=@ioapic) 2018/04/21 01:44:19 executing program 1: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000ff7)='/dev/ppp\x00', 0x0, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000001000)=[{&(0x7f0000007ffe)='0', 0x1}], 0x1, 0x0) setsockopt$netlink_NETLINK_BROADCAST_ERROR(0xffffffffffffffff, 0x10e, 0x4, &(0x7f0000001000), 0x4) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f0000001000)=""/246) ioctl$EVIOCGREP(r0, 0x4010744d, &(0x7f0000001000)=""/174) 2018/04/21 01:44:19 executing program 4: perf_event_open(&(0x7f0000348f88)={0x2, 0x70, 0x3e6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_init_net_socket$nfc_llcp(0x27, 0x3, 0x1) r1 = syz_init_net_socket$nfc_llcp(0x27, 0x3, 0x1) dup2(r0, r1) [ 81.434775] ebt_limit: overflow, try lower: 0/0 2018/04/21 01:44:19 executing program 2: perf_event_open(&(0x7f00000017c0)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$key(0xf, 0x3, 0x2) close(r0) 2018/04/21 01:44:19 executing program 6: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x13, &(0x7f0000ffbffc)=0x1, 0x4) setsockopt$inet_tcp_int(r0, 0x6, 0x14, &(0x7f00005e3ffc)=0x2, 0x4) getsockopt$inet_tcp_int(r0, 0x6, 0x15, &(0x7f0000000000), &(0x7f0000000040)=0x4) 2018/04/21 01:44:19 executing program 0: r0 = memfd_create(&(0x7f0000000000)="00000000004560f38ad02000000000800000000000000000000000", 0x0) write$binfmt_elf64(r0, &(0x7f0000000340)=ANY=[@ANYBLOB="7f454c46ff000000000000000000000003003e0000000000160000000000000040000000000000000000000000000000000000000000380002"], 0x39) execveat(r0, &(0x7f0000ff7000)='./file0\x00', &(0x7f0000d0e000), &(0x7f000034bff8)=[&(0x7f0000ff7000)="00000000000000060804002000fffc0c6565643b799365005f1b76"], 0x1000) 2018/04/21 01:44:19 executing program 1: r0 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/sys/net/ipv4/vs/sync_retries\x00', 0x2, 0x0) write(r0, &(0x7f0000000000)='0', 0x1) 2018/04/21 01:44:19 executing program 7: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = memfd_create(&(0x7f0000000000)="17", 0x0) write$binfmt_elf32(r0, &(0x7f0000000300)=ANY=[@ANYBLOB="7f454c460000000000000000000000000200060000000000000000003800000000000000eaffffff0000200001"], 0x2d) execveat(r0, &(0x7f0000ff7000)='./file0\x00', &(0x7f0000000580), &(0x7f000034bff8)=[&(0x7f0000ff7000)="00000000000000060804002000fffc0c6565643b799365005f1b76"], 0x1000) 2018/04/21 01:44:19 executing program 5: bpf$PROG_LOAD(0x5, &(0x7f00002a0fb8)={0xf, 0x3, &(0x7f0000dbc000)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x1, 0xffffffb5}, [], {0x95}}, &(0x7f0000000000)="47ff3300", 0x2, 0x99, &(0x7f0000000000)=""/153}, 0x48) 2018/04/21 01:44:19 executing program 4: perf_event_open(&(0x7f0000348f88)={0x2, 0x70, 0x3e6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_init_net_socket$nfc_llcp(0x27, 0x3, 0x1) r1 = syz_init_net_socket$nfc_llcp(0x27, 0x3, 0x1) dup2(r0, r1) 2018/04/21 01:44:19 executing program 1: r0 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/sys/net/ipv4/vs/sync_retries\x00', 0x2, 0x0) write(r0, &(0x7f0000000000)='0', 0x1) 2018/04/21 01:44:19 executing program 6: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x13, &(0x7f0000ffbffc)=0x1, 0x4) setsockopt$inet_tcp_int(r0, 0x6, 0x14, &(0x7f00005e3ffc)=0x2, 0x4) getsockopt$inet_tcp_int(r0, 0x6, 0x15, &(0x7f0000000000), &(0x7f0000000040)=0x4) 2018/04/21 01:44:19 executing program 2: perf_event_open(&(0x7f00000017c0)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$key(0xf, 0x3, 0x2) close(r0) 2018/04/21 01:44:20 executing program 2: perf_event_open(&(0x7f00000017c0)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$key(0xf, 0x3, 0x2) close(r0) 2018/04/21 01:44:20 executing program 7: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet_smc(0x2b, 0x1, 0x0) close(r0) 2018/04/21 01:44:20 executing program 0: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f0000deb000)={0x2, 0x4e23, @broadcast=0xffffffff}, 0x25) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f00006dc000)=[{0x6, 0x0, 0x0, 0xa1}]}, 0x10) sendto$inet(r0, &(0x7f0000000140), 0x0, 0x200007ff, &(0x7f0000deaff0)={0x2, 0x4e23}, 0x10) sendto$inet(r0, &(0x7f00006fd000)="c3a646401c344654f3c7d9b41ba48c8e399aa4eedc3d6bd8ebd65c856a27d61154adc2b2a9763ae0201c0d32e11f38e9dd18c58f6bd779650fc30f93653bdaecf323c9f6502ceab47e58114347b289546465a5eb278de12b1989f64cc99412e36880d20c34d91055f39486b43f4cc639f92b5040d69e51b22f6c8acc9d082b7bcdec", 0x82, 0x8000, &(0x7f0000e66000)={0x2, 0x0, @rand_addr}, 0x10) shutdown(r0, 0x1) 2018/04/21 01:44:20 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$fou(&(0x7f00000001c0)='fou\x00') sendmsg$FOU_CMD_GET(r0, &(0x7f0000000000)={&(0x7f00000002c0)={0x10}, 0xc, &(0x7f0000000040)={&(0x7f0000000580)={0x14, r1, 0xfffffffffffffffd, 0x0, 0x0, {0x3}}, 0x14}, 0x1}, 0x0) 2018/04/21 01:44:20 executing program 4: perf_event_open(&(0x7f0000348f88)={0x2, 0x70, 0x3e6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_init_net_socket$nfc_llcp(0x27, 0x3, 0x1) r1 = syz_init_net_socket$nfc_llcp(0x27, 0x3, 0x1) dup2(r0, r1) 2018/04/21 01:44:20 executing program 5: bpf$PROG_LOAD(0x5, &(0x7f00002a0fb8)={0xf, 0x3, &(0x7f0000dbc000)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x1, 0xffffffb5}, [], {0x95}}, &(0x7f0000000000)="47ff3300", 0x2, 0x99, &(0x7f0000000000)=""/153}, 0x48) 2018/04/21 01:44:20 executing program 6: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x13, &(0x7f0000ffbffc)=0x1, 0x4) setsockopt$inet_tcp_int(r0, 0x6, 0x14, &(0x7f00005e3ffc)=0x2, 0x4) getsockopt$inet_tcp_int(r0, 0x6, 0x15, &(0x7f0000000000), &(0x7f0000000040)=0x4) 2018/04/21 01:44:20 executing program 1: r0 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/sys/net/ipv4/vs/sync_retries\x00', 0x2, 0x0) write(r0, &(0x7f0000000000)='0', 0x1) 2018/04/21 01:44:20 executing program 1: r0 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/sys/net/ipv4/vs/sync_retries\x00', 0x2, 0x0) write(r0, &(0x7f0000000000)='0', 0x1) 2018/04/21 01:44:20 executing program 5: bpf$PROG_LOAD(0x5, &(0x7f00002a0fb8)={0xf, 0x3, &(0x7f0000dbc000)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x1, 0xffffffb5}, [], {0x95}}, &(0x7f0000000000)="47ff3300", 0x2, 0x99, &(0x7f0000000000)=""/153}, 0x48) 2018/04/21 01:44:20 executing program 3: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x3) shutdown(r0, 0x0) r1 = dup2(r0, r0) sendmsg$IPVS_CMD_SET_INFO(r1, &(0x7f0000000140)={&(0x7f0000000000)={0x10}, 0xc, &(0x7f0000000100)={&(0x7f0000000080)={0x14, 0x0, 0x0, 0x0, 0x0, {0xe}}, 0x14}, 0x1}, 0x0) 2018/04/21 01:44:20 executing program 7: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet_smc(0x2b, 0x1, 0x0) close(r0) 2018/04/21 01:44:20 executing program 6: socketpair(0x8000000000001e, 0x805, 0x0, &(0x7f0000d24ff8)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$key(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000001140)={&(0x7f0000000080)=ANY=[]}, 0x1}, 0x0) write$tun(r1, &(0x7f0000000380)={@pi, @hdr, @ipv4={{0x5, 0x4, 0x0, 0x0, 0x58, 0x0, 0x0, 0x0, 0x0, 0x0, @multicast2=0xe0000002, @local={0xac, 0x14, 0x14, 0xaa}}, @gre={{0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x880b}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x86dd}, {0x8, 0x88be, 0x0, {{0x0, 0x1}, 0x1}}, {0x8, 0x22eb, 0x0, {{0x0, 0x2}, 0x2}}, {0x8, 0x6558}}}}, 0x66) recvmsg(r0, &(0x7f0000000e00)={&(0x7f00004afff8)=@sco, 0x80, &(0x7f000020ff70)=[{&(0x7f0000359f45)=""/187, 0xbb}], 0x1, &(0x7f00002d0000)=""/4096, 0xffffffffffffff8f}, 0x0) 2018/04/21 01:44:20 executing program 2: perf_event_open(&(0x7f00000017c0)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$key(0xf, 0x3, 0x2) close(r0) 2018/04/21 01:44:20 executing program 6: socketpair(0x8000000000001e, 0x805, 0x0, &(0x7f0000d24ff8)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$key(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000001140)={&(0x7f0000000080)=ANY=[]}, 0x1}, 0x0) write$tun(r1, &(0x7f0000000380)={@pi, @hdr, @ipv4={{0x5, 0x4, 0x0, 0x0, 0x58, 0x0, 0x0, 0x0, 0x0, 0x0, @multicast2=0xe0000002, @local={0xac, 0x14, 0x14, 0xaa}}, @gre={{0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x880b}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x86dd}, {0x8, 0x88be, 0x0, {{0x0, 0x1}, 0x1}}, {0x8, 0x22eb, 0x0, {{0x0, 0x2}, 0x2}}, {0x8, 0x6558}}}}, 0x66) recvmsg(r0, &(0x7f0000000e00)={&(0x7f00004afff8)=@sco, 0x80, &(0x7f000020ff70)=[{&(0x7f0000359f45)=""/187, 0xbb}], 0x1, &(0x7f00002d0000)=""/4096, 0xffffffffffffff8f}, 0x0) 2018/04/21 01:44:20 executing program 0: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f0000deb000)={0x2, 0x4e23, @broadcast=0xffffffff}, 0x25) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f00006dc000)=[{0x6, 0x0, 0x0, 0xa1}]}, 0x10) sendto$inet(r0, &(0x7f0000000140), 0x0, 0x200007ff, &(0x7f0000deaff0)={0x2, 0x4e23}, 0x10) sendto$inet(r0, &(0x7f00006fd000)="c3a646401c344654f3c7d9b41ba48c8e399aa4eedc3d6bd8ebd65c856a27d61154adc2b2a9763ae0201c0d32e11f38e9dd18c58f6bd779650fc30f93653bdaecf323c9f6502ceab47e58114347b289546465a5eb278de12b1989f64cc99412e36880d20c34d91055f39486b43f4cc639f92b5040d69e51b22f6c8acc9d082b7bcdec", 0x82, 0x8000, &(0x7f0000e66000)={0x2, 0x0, @rand_addr}, 0x10) shutdown(r0, 0x1) 2018/04/21 01:44:20 executing program 5: bpf$PROG_LOAD(0x5, &(0x7f00002a0fb8)={0xf, 0x3, &(0x7f0000dbc000)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x1, 0xffffffb5}, [], {0x95}}, &(0x7f0000000000)="47ff3300", 0x2, 0x99, &(0x7f0000000000)=""/153}, 0x48) 2018/04/21 01:44:20 executing program 3: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x3) shutdown(r0, 0x0) r1 = dup2(r0, r0) sendmsg$IPVS_CMD_SET_INFO(r1, &(0x7f0000000140)={&(0x7f0000000000)={0x10}, 0xc, &(0x7f0000000100)={&(0x7f0000000080)={0x14, 0x0, 0x0, 0x0, 0x0, {0xe}}, 0x14}, 0x1}, 0x0) 2018/04/21 01:44:20 executing program 1: r0 = socket$inet(0x10, 0x3, 0x0) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg(r0, &(0x7f0000004fc8)={0x0, 0x0, &(0x7f0000003000)=[{&(0x7f0000000000)="240000004a00030207fffd946fb983bc0a00800002000000031d8568791ba3a2d188737e", 0x24}], 0x1}, 0x0) 2018/04/21 01:44:20 executing program 4: r0 = socket$inet(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000004c0)=@broute={'broute\x00', 0x20, 0x1, 0x240, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000280], 0x0, &(0x7f0000000240), &(0x7f0000000280)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xfffffffffffffffe, 0x1, [{{{0x5, 0x0, 0x86dd, 'syzkaller0\x00', 'tunl0\x00', 'sit0\x00', 'ifb0\x00', @empty, [], @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [], 0x128, 0x160, 0x1b0, [@ip6={'ip6\x00', 0x50, {{@empty, @ipv4={[], [0xff, 0xff], @local={0xac, 0x14, 0x14, 0xaa}}, [], [], 0x0, 0x0, 0x7fffffe}}}, @mark_m={'mark_m\x00', 0x18}]}, [@common=@dnat={'dnat\x00', 0x10, {{@broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff]}}}]}, @common=@LED={'LED\x00', 0x28, {{'syz0\x00'}}}}]}]}, 0x2b8) 2018/04/21 01:44:20 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000180)={0x26, 'skcipher\x00', 0x0, 0x0, 'chacha20\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00003bcfd0)="d3ab27191a01002356ba602dff05000bfef9b9d2a4b20079fffffffffffffe00", 0x20) sendmsg$inet_sctp(r1, &(0x7f0000001680)={&(0x7f00000000c0)=@in={0x2}, 0x10, &(0x7f0000001540)=[{&(0x7f0000000540)="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", 0x3f3}], 0x1, &(0x7f0000001640)=[@sndrcv={0x30, 0x84, 0x1, {0x4, 0x3, 0x2, 0xb51e, 0x1f, 0x9, 0xfffffffffffffe00, 0x2}}], 0x30, 0x10}, 0x20000000) recvmsg(r1, &(0x7f0000000480)={&(0x7f0000000040)=@nfc_llcp, 0x1e, &(0x7f0000b9c000)=[{&(0x7f000080f000)=""/4096, 0x1000}], 0x1, &(0x7f0000da2000)}, 0x0) 2018/04/21 01:44:20 executing program 7: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet_smc(0x2b, 0x1, 0x0) close(r0) 2018/04/21 01:44:20 executing program 3: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x3) shutdown(r0, 0x0) r1 = dup2(r0, r0) sendmsg$IPVS_CMD_SET_INFO(r1, &(0x7f0000000140)={&(0x7f0000000000)={0x10}, 0xc, &(0x7f0000000100)={&(0x7f0000000080)={0x14, 0x0, 0x0, 0x0, 0x0, {0xe}}, 0x14}, 0x1}, 0x0) 2018/04/21 01:44:20 executing program 5: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$packet(0x11, 0x10000000002, 0x300) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000040)={'ip6tnl0\x00', 0x0}) sendmmsg(r0, &(0x7f0000003080)=[{{&(0x7f0000001380)=@ll={0x11, 0x0, r1, 0x1, 0x0, 0x6, @local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}}, 0x80, &(0x7f0000000480), 0x0, &(0x7f0000000500)}}, {{0x0, 0x0, &(0x7f0000000000), 0x0, &(0x7f0000000780)=[{0x10}], 0x10}}], 0x2, 0x0) 2018/04/21 01:44:20 executing program 1: r0 = socket$inet(0x10, 0x3, 0x0) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg(r0, &(0x7f0000004fc8)={0x0, 0x0, &(0x7f0000003000)=[{&(0x7f0000000000)="240000004a00030207fffd946fb983bc0a00800002000000031d8568791ba3a2d188737e", 0x24}], 0x1}, 0x0) 2018/04/21 01:44:20 executing program 7: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet_smc(0x2b, 0x1, 0x0) close(r0) 2018/04/21 01:44:20 executing program 0: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f0000deb000)={0x2, 0x4e23, @broadcast=0xffffffff}, 0x25) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f00006dc000)=[{0x6, 0x0, 0x0, 0xa1}]}, 0x10) sendto$inet(r0, &(0x7f0000000140), 0x0, 0x200007ff, &(0x7f0000deaff0)={0x2, 0x4e23}, 0x10) sendto$inet(r0, &(0x7f00006fd000)="c3a646401c344654f3c7d9b41ba48c8e399aa4eedc3d6bd8ebd65c856a27d61154adc2b2a9763ae0201c0d32e11f38e9dd18c58f6bd779650fc30f93653bdaecf323c9f6502ceab47e58114347b289546465a5eb278de12b1989f64cc99412e36880d20c34d91055f39486b43f4cc639f92b5040d69e51b22f6c8acc9d082b7bcdec", 0x82, 0x8000, &(0x7f0000e66000)={0x2, 0x0, @rand_addr}, 0x10) shutdown(r0, 0x1) 2018/04/21 01:44:20 executing program 6: socketpair(0x8000000000001e, 0x805, 0x0, &(0x7f0000d24ff8)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$key(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000001140)={&(0x7f0000000080)=ANY=[]}, 0x1}, 0x0) write$tun(r1, &(0x7f0000000380)={@pi, @hdr, @ipv4={{0x5, 0x4, 0x0, 0x0, 0x58, 0x0, 0x0, 0x0, 0x0, 0x0, @multicast2=0xe0000002, @local={0xac, 0x14, 0x14, 0xaa}}, @gre={{0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x880b}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x86dd}, {0x8, 0x88be, 0x0, {{0x0, 0x1}, 0x1}}, {0x8, 0x22eb, 0x0, {{0x0, 0x2}, 0x2}}, {0x8, 0x6558}}}}, 0x66) recvmsg(r0, &(0x7f0000000e00)={&(0x7f00004afff8)=@sco, 0x80, &(0x7f000020ff70)=[{&(0x7f0000359f45)=""/187, 0xbb}], 0x1, &(0x7f00002d0000)=""/4096, 0xffffffffffffff8f}, 0x0) 2018/04/21 01:44:20 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000180)={0x26, 'skcipher\x00', 0x0, 0x0, 'chacha20\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00003bcfd0)="d3ab27191a01002356ba602dff05000bfef9b9d2a4b20079fffffffffffffe00", 0x20) sendmsg$inet_sctp(r1, &(0x7f0000001680)={&(0x7f00000000c0)=@in={0x2}, 0x10, &(0x7f0000001540)=[{&(0x7f0000000540)="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", 0x3f3}], 0x1, &(0x7f0000001640)=[@sndrcv={0x30, 0x84, 0x1, {0x4, 0x3, 0x2, 0xb51e, 0x1f, 0x9, 0xfffffffffffffe00, 0x2}}], 0x30, 0x10}, 0x20000000) recvmsg(r1, &(0x7f0000000480)={&(0x7f0000000040)=@nfc_llcp, 0x1e, &(0x7f0000b9c000)=[{&(0x7f000080f000)=""/4096, 0x1000}], 0x1, &(0x7f0000da2000)}, 0x0) 2018/04/21 01:44:20 executing program 3: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x3) shutdown(r0, 0x0) r1 = dup2(r0, r0) sendmsg$IPVS_CMD_SET_INFO(r1, &(0x7f0000000140)={&(0x7f0000000000)={0x10}, 0xc, &(0x7f0000000100)={&(0x7f0000000080)={0x14, 0x0, 0x0, 0x0, 0x0, {0xe}}, 0x14}, 0x1}, 0x0) 2018/04/21 01:44:20 executing program 4: r0 = socket$inet(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000004c0)=@broute={'broute\x00', 0x20, 0x1, 0x240, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000280], 0x0, &(0x7f0000000240), &(0x7f0000000280)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xfffffffffffffffe, 0x1, [{{{0x5, 0x0, 0x86dd, 'syzkaller0\x00', 'tunl0\x00', 'sit0\x00', 'ifb0\x00', @empty, [], @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [], 0x128, 0x160, 0x1b0, [@ip6={'ip6\x00', 0x50, {{@empty, @ipv4={[], [0xff, 0xff], @local={0xac, 0x14, 0x14, 0xaa}}, [], [], 0x0, 0x0, 0x7fffffe}}}, @mark_m={'mark_m\x00', 0x18}]}, [@common=@dnat={'dnat\x00', 0x10, {{@broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff]}}}]}, @common=@LED={'LED\x00', 0x28, {{'syz0\x00'}}}}]}]}, 0x2b8) 2018/04/21 01:44:20 executing program 5: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$packet(0x11, 0x10000000002, 0x300) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000040)={'ip6tnl0\x00', 0x0}) sendmmsg(r0, &(0x7f0000003080)=[{{&(0x7f0000001380)=@ll={0x11, 0x0, r1, 0x1, 0x0, 0x6, @local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}}, 0x80, &(0x7f0000000480), 0x0, &(0x7f0000000500)}}, {{0x0, 0x0, &(0x7f0000000000), 0x0, &(0x7f0000000780)=[{0x10}], 0x10}}], 0x2, 0x0) 2018/04/21 01:44:20 executing program 6: socketpair(0x8000000000001e, 0x805, 0x0, &(0x7f0000d24ff8)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$key(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000001140)={&(0x7f0000000080)=ANY=[]}, 0x1}, 0x0) write$tun(r1, &(0x7f0000000380)={@pi, @hdr, @ipv4={{0x5, 0x4, 0x0, 0x0, 0x58, 0x0, 0x0, 0x0, 0x0, 0x0, @multicast2=0xe0000002, @local={0xac, 0x14, 0x14, 0xaa}}, @gre={{0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x880b}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x86dd}, {0x8, 0x88be, 0x0, {{0x0, 0x1}, 0x1}}, {0x8, 0x22eb, 0x0, {{0x0, 0x2}, 0x2}}, {0x8, 0x6558}}}}, 0x66) recvmsg(r0, &(0x7f0000000e00)={&(0x7f00004afff8)=@sco, 0x80, &(0x7f000020ff70)=[{&(0x7f0000359f45)=""/187, 0xbb}], 0x1, &(0x7f00002d0000)=""/4096, 0xffffffffffffff8f}, 0x0) 2018/04/21 01:44:20 executing program 7: mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0x2000000000000001, 0x31, 0xffffffffffffffff, 0x0) futex(&(0x7f0000000000), 0x5, 0x0, &(0x7f0000000000)={0x77359400}, &(0x7f0000000ffc), 0x0) 2018/04/21 01:44:20 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000180)={0x26, 'skcipher\x00', 0x0, 0x0, 'chacha20\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00003bcfd0)="d3ab27191a01002356ba602dff05000bfef9b9d2a4b20079fffffffffffffe00", 0x20) sendmsg$inet_sctp(r1, &(0x7f0000001680)={&(0x7f00000000c0)=@in={0x2}, 0x10, &(0x7f0000001540)=[{&(0x7f0000000540)="5155de77dc492cdc5bcf9e77fcdca16aa4dd1530359eacae68be3f3dafca548791c00137cd4dcc904a225e8e0da13684f006ad4bed205d12ec43dc78a8df1eecabc4358bf2df2c27c749fd1c1b50ee214c056c618a4a94015903140e78739fad3b848dbd333ac06fd50b6c6335c4b703646a398a1ef06b2ea8cf47351cfc08956988329145a2386b874dc7a2246df2dab76900cfd5687a72faf918838edfb5c85c237b425b66b4a2078648d5658ec7d11bbe1ae7bb5b567acc5c3e8804f98fe6b3df72ff1929420042e5796e82ef665b71facdf00e3add9f5ac2572ac40e0e824f329033a45112bd1e498de8c62ae0037a3b46e055cf2ac47bd900198869dd29574de107452f62e83c4a723126b16fc6d3335596bcccaa6037e57f1dff10dea39f4babf5ffb8fe706cc3eecd3d69f7e6e7467effcf56c7cc211be98b83356c488748c5f0ce0735cc210a20a68d555666aefb1350ff9815bc6769f7232a4dce4574b1a8dc42a33b82b6315585ab2ef0e539e9e31b9d4a986e295f796d236e25ebee0f6830095e7e1c7d027ffe12eee896dcf88a3cbe8588521077478829d0b8e0b7ae53e7c311e05dca18b4fe222cc44bd5f5fa94b6dc9a29e7ed1cb3750ea425abd15a0f7dd88790541cb66826db779296310bea8524e23ad2b3ba6f3d122dca0a5e78cc42958f31f6b51eb6086d04b8e88a57992121abd71f4b9699b4b8f0a53be894ad0aacefe5d89bfb567a1dddb28def1e26d01c2d66306a283e26175a1e0e81ef366cc50c36d991653d28d1784b6a92365a3dbf813e85a436dd917bdabe649e2e3ad8f7253209214e8ad08bd33450a71aa065b7d6d3fa47a76ff3441fa8bb8c73ef992b74708c05e0f3ffccb772228ae2dd7aee52a341f56f054f00b682a63a21b06869dbe29188ed870e59f215f19b5a555166716a5f597a27de30da945b12847c1ceaac509b0e9463d917f205e6230fde3258133a60df272c72c2da00d063b32ece774c7035545152782d12098fe55b79ffe8072f609c51d2652f70e01bc9c2508cbd8f69889955dfdd2fede4340a2d4e35bc088a2b0f38ad95be3661db64ccb3ffd5c4b25e6821fc287c8a0c6455cf4f096127bc411624004f0a03909100ef374f121d704caad9aa2e8d72cb19db72fd70496566f830bb294b3754c87dfac5dbac4f7ca087138dfd08717e54f9aa7f840902bba10b093bd7f4adb52a8131af60cfc8a0131d6c79cd20620af2db11222fbb438cac550b23e003de6f56bece7fe196795ebe672fc2ac6e46e79ec9243af1072f36fdfd7b1370bc7ba1795eb68c295d863392758000077c3596888f6e62831431a714b99331bfb1a85d67b68f0052816ddbc96bb664d25b62a813eab37f507967e576d0aec174c09e180018f81565d87d048432df9b63c04ec64dd9a505", 0x3f3}], 0x1, &(0x7f0000001640)=[@sndrcv={0x30, 0x84, 0x1, {0x4, 0x3, 0x2, 0xb51e, 0x1f, 0x9, 0xfffffffffffffe00, 0x2}}], 0x30, 0x10}, 0x20000000) recvmsg(r1, &(0x7f0000000480)={&(0x7f0000000040)=@nfc_llcp, 0x1e, &(0x7f0000b9c000)=[{&(0x7f000080f000)=""/4096, 0x1000}], 0x1, &(0x7f0000da2000)}, 0x0) 2018/04/21 01:44:20 executing program 3: r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) mmap(&(0x7f0000000000/0xb3c000)=nil, 0xb3c000, 0x1, 0x32, 0xffffffffffffffff, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) setsockopt$inet_sctp_SCTP_FRAGMENT_INTERLEAVE(r1, 0x84, 0x12, &(0x7f0000000000), 0x4) 2018/04/21 01:44:20 executing program 0: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f0000deb000)={0x2, 0x4e23, @broadcast=0xffffffff}, 0x25) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f00006dc000)=[{0x6, 0x0, 0x0, 0xa1}]}, 0x10) sendto$inet(r0, &(0x7f0000000140), 0x0, 0x200007ff, &(0x7f0000deaff0)={0x2, 0x4e23}, 0x10) sendto$inet(r0, &(0x7f00006fd000)="c3a646401c344654f3c7d9b41ba48c8e399aa4eedc3d6bd8ebd65c856a27d61154adc2b2a9763ae0201c0d32e11f38e9dd18c58f6bd779650fc30f93653bdaecf323c9f6502ceab47e58114347b289546465a5eb278de12b1989f64cc99412e36880d20c34d91055f39486b43f4cc639f92b5040d69e51b22f6c8acc9d082b7bcdec", 0x82, 0x8000, &(0x7f0000e66000)={0x2, 0x0, @rand_addr}, 0x10) shutdown(r0, 0x1) 2018/04/21 01:44:21 executing program 1: r0 = socket$inet(0x10, 0x3, 0x0) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg(r0, &(0x7f0000004fc8)={0x0, 0x0, &(0x7f0000003000)=[{&(0x7f0000000000)="240000004a00030207fffd946fb983bc0a00800002000000031d8568791ba3a2d188737e", 0x24}], 0x1}, 0x0) 2018/04/21 01:44:21 executing program 7: mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0x2000000000000001, 0x31, 0xffffffffffffffff, 0x0) futex(&(0x7f0000000000), 0x5, 0x0, &(0x7f0000000000)={0x77359400}, &(0x7f0000000ffc), 0x0) 2018/04/21 01:44:21 executing program 6: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) setsockopt$sock_void(0xffffffffffffffff, 0x1, 0x1b, 0x0, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f00000001c0)={0x0, @multicast2, @local}, &(0x7f0000000200)=0xc) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000fe7000/0x18000)=nil, &(0x7f0000de9000)=[@text32={0x20, &(0x7f0000f59fc6)="0fc75fedc4c3c968fb6c0f9cfbb9040100c00f3266b842008ee80f230064672ec015dec4e245bea5d41e6082f9440f20c03506000000440f22c0", 0x3a}], 0x1, 0x0, &(0x7f0000000180), 0x1ba) add_key$keyring(&(0x7f0000000240)='keyring\x00', &(0x7f0000000340)={0x73, 0x79, 0x7a, 0x1}, 0x0, 0x0, 0xfffffffffffffff8) keyctl$instantiate(0xc, 0x0, &(0x7f0000000380)="c6d39111f1", 0x5, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) 2018/04/21 01:44:21 executing program 3: r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) mmap(&(0x7f0000000000/0xb3c000)=nil, 0xb3c000, 0x1, 0x32, 0xffffffffffffffff, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) setsockopt$inet_sctp_SCTP_FRAGMENT_INTERLEAVE(r1, 0x84, 0x12, &(0x7f0000000000), 0x4) 2018/04/21 01:44:21 executing program 5: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$packet(0x11, 0x10000000002, 0x300) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000040)={'ip6tnl0\x00', 0x0}) sendmmsg(r0, &(0x7f0000003080)=[{{&(0x7f0000001380)=@ll={0x11, 0x0, r1, 0x1, 0x0, 0x6, @local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}}, 0x80, &(0x7f0000000480), 0x0, &(0x7f0000000500)}}, {{0x0, 0x0, &(0x7f0000000000), 0x0, &(0x7f0000000780)=[{0x10}], 0x10}}], 0x2, 0x0) 2018/04/21 01:44:21 executing program 0: mlock2(&(0x7f0000a93000/0x4000)=nil, 0x4000, 0x1) mremap(&(0x7f0000a93000/0x3000)=nil, 0x3000, 0xe000, 0x3, &(0x7f0000b18000/0xe000)=nil) ioctl$DRM_IOCTL_RM_MAP(0xffffffffffffffff, 0x4028641b, &(0x7f0000b1d000)={&(0x7f0000a93000/0x3000)=nil, 0x0, 0x0, 0x0, &(0x7f0000b1b000/0x3000)=nil}) mprotect(&(0x7f0000b1d000/0x2000)=nil, 0x2000, 0x5) epoll_ctl$EPOLL_CTL_MOD(0xffffffffffffffff, 0x3, 0xffffffffffffffff, &(0x7f0000b1eff4)) munlockall() 2018/04/21 01:44:21 executing program 4: r0 = socket$inet(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000004c0)=@broute={'broute\x00', 0x20, 0x1, 0x240, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000280], 0x0, &(0x7f0000000240), &(0x7f0000000280)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xfffffffffffffffe, 0x1, [{{{0x5, 0x0, 0x86dd, 'syzkaller0\x00', 'tunl0\x00', 'sit0\x00', 'ifb0\x00', @empty, [], @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [], 0x128, 0x160, 0x1b0, [@ip6={'ip6\x00', 0x50, {{@empty, @ipv4={[], [0xff, 0xff], @local={0xac, 0x14, 0x14, 0xaa}}, [], [], 0x0, 0x0, 0x7fffffe}}}, @mark_m={'mark_m\x00', 0x18}]}, [@common=@dnat={'dnat\x00', 0x10, {{@broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff]}}}]}, @common=@LED={'LED\x00', 0x28, {{'syz0\x00'}}}}]}]}, 0x2b8) 2018/04/21 01:44:21 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000180)={0x26, 'skcipher\x00', 0x0, 0x0, 'chacha20\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00003bcfd0)="d3ab27191a01002356ba602dff05000bfef9b9d2a4b20079fffffffffffffe00", 0x20) sendmsg$inet_sctp(r1, &(0x7f0000001680)={&(0x7f00000000c0)=@in={0x2}, 0x10, &(0x7f0000001540)=[{&(0x7f0000000540)="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", 0x3f3}], 0x1, &(0x7f0000001640)=[@sndrcv={0x30, 0x84, 0x1, {0x4, 0x3, 0x2, 0xb51e, 0x1f, 0x9, 0xfffffffffffffe00, 0x2}}], 0x30, 0x10}, 0x20000000) recvmsg(r1, &(0x7f0000000480)={&(0x7f0000000040)=@nfc_llcp, 0x1e, &(0x7f0000b9c000)=[{&(0x7f000080f000)=""/4096, 0x1000}], 0x1, &(0x7f0000da2000)}, 0x0) 2018/04/21 01:44:21 executing program 3: r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) mmap(&(0x7f0000000000/0xb3c000)=nil, 0xb3c000, 0x1, 0x32, 0xffffffffffffffff, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) setsockopt$inet_sctp_SCTP_FRAGMENT_INTERLEAVE(r1, 0x84, 0x12, &(0x7f0000000000), 0x4) 2018/04/21 01:44:21 executing program 7: mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0x2000000000000001, 0x31, 0xffffffffffffffff, 0x0) futex(&(0x7f0000000000), 0x5, 0x0, &(0x7f0000000000)={0x77359400}, &(0x7f0000000ffc), 0x0) 2018/04/21 01:44:21 executing program 2: mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0x7, 0x31, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000348f88)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) remap_file_pages(&(0x7f0000461000/0x4000)=nil, 0x4000, 0x0, 0x0, 0x0) 2018/04/21 01:44:21 executing program 0: mlock2(&(0x7f0000a93000/0x4000)=nil, 0x4000, 0x1) mremap(&(0x7f0000a93000/0x3000)=nil, 0x3000, 0xe000, 0x3, &(0x7f0000b18000/0xe000)=nil) ioctl$DRM_IOCTL_RM_MAP(0xffffffffffffffff, 0x4028641b, &(0x7f0000b1d000)={&(0x7f0000a93000/0x3000)=nil, 0x0, 0x0, 0x0, &(0x7f0000b1b000/0x3000)=nil}) mprotect(&(0x7f0000b1d000/0x2000)=nil, 0x2000, 0x5) epoll_ctl$EPOLL_CTL_MOD(0xffffffffffffffff, 0x3, 0xffffffffffffffff, &(0x7f0000b1eff4)) munlockall() 2018/04/21 01:44:21 executing program 1: r0 = socket$inet(0x10, 0x3, 0x0) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg(r0, &(0x7f0000004fc8)={0x0, 0x0, &(0x7f0000003000)=[{&(0x7f0000000000)="240000004a00030207fffd946fb983bc0a00800002000000031d8568791ba3a2d188737e", 0x24}], 0x1}, 0x0) 2018/04/21 01:44:21 executing program 4: r0 = socket$inet(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000004c0)=@broute={'broute\x00', 0x20, 0x1, 0x240, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000280], 0x0, &(0x7f0000000240), &(0x7f0000000280)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xfffffffffffffffe, 0x1, [{{{0x5, 0x0, 0x86dd, 'syzkaller0\x00', 'tunl0\x00', 'sit0\x00', 'ifb0\x00', @empty, [], @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [], 0x128, 0x160, 0x1b0, [@ip6={'ip6\x00', 0x50, {{@empty, @ipv4={[], [0xff, 0xff], @local={0xac, 0x14, 0x14, 0xaa}}, [], [], 0x0, 0x0, 0x7fffffe}}}, @mark_m={'mark_m\x00', 0x18}]}, [@common=@dnat={'dnat\x00', 0x10, {{@broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff]}}}]}, @common=@LED={'LED\x00', 0x28, {{'syz0\x00'}}}}]}]}, 0x2b8) 2018/04/21 01:44:21 executing program 5: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$packet(0x11, 0x10000000002, 0x300) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000040)={'ip6tnl0\x00', 0x0}) sendmmsg(r0, &(0x7f0000003080)=[{{&(0x7f0000001380)=@ll={0x11, 0x0, r1, 0x1, 0x0, 0x6, @local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}}, 0x80, &(0x7f0000000480), 0x0, &(0x7f0000000500)}}, {{0x0, 0x0, &(0x7f0000000000), 0x0, &(0x7f0000000780)=[{0x10}], 0x10}}], 0x2, 0x0) 2018/04/21 01:44:21 executing program 6: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) setsockopt$sock_void(0xffffffffffffffff, 0x1, 0x1b, 0x0, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f00000001c0)={0x0, @multicast2, @local}, &(0x7f0000000200)=0xc) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000fe7000/0x18000)=nil, &(0x7f0000de9000)=[@text32={0x20, &(0x7f0000f59fc6)="0fc75fedc4c3c968fb6c0f9cfbb9040100c00f3266b842008ee80f230064672ec015dec4e245bea5d41e6082f9440f20c03506000000440f22c0", 0x3a}], 0x1, 0x0, &(0x7f0000000180), 0x1ba) add_key$keyring(&(0x7f0000000240)='keyring\x00', &(0x7f0000000340)={0x73, 0x79, 0x7a, 0x1}, 0x0, 0x0, 0xfffffffffffffff8) keyctl$instantiate(0xc, 0x0, &(0x7f0000000380)="c6d39111f1", 0x5, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) 2018/04/21 01:44:21 executing program 3: r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) mmap(&(0x7f0000000000/0xb3c000)=nil, 0xb3c000, 0x1, 0x32, 0xffffffffffffffff, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) setsockopt$inet_sctp_SCTP_FRAGMENT_INTERLEAVE(r1, 0x84, 0x12, &(0x7f0000000000), 0x4) 2018/04/21 01:44:21 executing program 7: mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0x2000000000000001, 0x31, 0xffffffffffffffff, 0x0) futex(&(0x7f0000000000), 0x5, 0x0, &(0x7f0000000000)={0x77359400}, &(0x7f0000000ffc), 0x0) 2018/04/21 01:44:21 executing program 0: mlock2(&(0x7f0000a93000/0x4000)=nil, 0x4000, 0x1) mremap(&(0x7f0000a93000/0x3000)=nil, 0x3000, 0xe000, 0x3, &(0x7f0000b18000/0xe000)=nil) ioctl$DRM_IOCTL_RM_MAP(0xffffffffffffffff, 0x4028641b, &(0x7f0000b1d000)={&(0x7f0000a93000/0x3000)=nil, 0x0, 0x0, 0x0, &(0x7f0000b1b000/0x3000)=nil}) mprotect(&(0x7f0000b1d000/0x2000)=nil, 0x2000, 0x5) epoll_ctl$EPOLL_CTL_MOD(0xffffffffffffffff, 0x3, 0xffffffffffffffff, &(0x7f0000b1eff4)) munlockall() 2018/04/21 01:44:21 executing program 2: mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0x7, 0x31, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000348f88)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) remap_file_pages(&(0x7f0000461000/0x4000)=nil, 0x4000, 0x0, 0x0, 0x0) 2018/04/21 01:44:21 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) setsockopt$sock_void(0xffffffffffffffff, 0x1, 0x1b, 0x0, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f00000001c0)={0x0, @multicast2, @local}, &(0x7f0000000200)=0xc) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000fe7000/0x18000)=nil, &(0x7f0000de9000)=[@text32={0x20, &(0x7f0000f59fc6)="0fc75fedc4c3c968fb6c0f9cfbb9040100c00f3266b842008ee80f230064672ec015dec4e245bea5d41e6082f9440f20c03506000000440f22c0", 0x3a}], 0x1, 0x0, &(0x7f0000000180), 0x1ba) add_key$keyring(&(0x7f0000000240)='keyring\x00', &(0x7f0000000340)={0x73, 0x79, 0x7a, 0x1}, 0x0, 0x0, 0xfffffffffffffff8) keyctl$instantiate(0xc, 0x0, &(0x7f0000000380)="c6d39111f1", 0x5, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) 2018/04/21 01:44:21 executing program 1: r0 = socket(0x10, 0x3, 0x0) write(r0, &(0x7f0000000080)="240000004e001f0014f9f4fb00762608f91a1f10080000deffffecff0800120000000000", 0x24) 2018/04/21 01:44:21 executing program 3: r0 = socket(0x10, 0x802, 0x0) write(r0, &(0x7f0000000040)="220000001800070700ba0000090007000a00001e00000009fdb2bf291205d194f48a", 0x22) 2018/04/21 01:44:21 executing program 4: r0 = socket$inet6(0xa, 0x3, 0x1) connect$inet6(r0, &(0x7f000000cfe4)={0xa}, 0x1c) sendmmsg(r0, &(0x7f0000008a00)=[{{0x0, 0x0, &(0x7f0000000480), 0x0, &(0x7f0000000500)=[{0x60, 0x29, 0x3, "e10984fa3279d7a9e03a22b169d736c06ab11a96f7d25adf9166e34ba01ef80187324065bcda06ab9013268169230973698dc95dde627650790df783841dcbb38ed04b54d5375b9d6a"}], 0x60}}], 0x1, 0x0) 2018/04/21 01:44:21 executing program 6: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) setsockopt$sock_void(0xffffffffffffffff, 0x1, 0x1b, 0x0, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f00000001c0)={0x0, @multicast2, @local}, &(0x7f0000000200)=0xc) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000fe7000/0x18000)=nil, &(0x7f0000de9000)=[@text32={0x20, &(0x7f0000f59fc6)="0fc75fedc4c3c968fb6c0f9cfbb9040100c00f3266b842008ee80f230064672ec015dec4e245bea5d41e6082f9440f20c03506000000440f22c0", 0x3a}], 0x1, 0x0, &(0x7f0000000180), 0x1ba) add_key$keyring(&(0x7f0000000240)='keyring\x00', &(0x7f0000000340)={0x73, 0x79, 0x7a, 0x1}, 0x0, 0x0, 0xfffffffffffffff8) keyctl$instantiate(0xc, 0x0, &(0x7f0000000380)="c6d39111f1", 0x5, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) 2018/04/21 01:44:21 executing program 7: socketpair(0x8000000000001e, 0x1, 0x0, &(0x7f0000a77ff8)={0xffffffffffffffff, 0xffffffffffffffff}) recvmmsg(r1, &(0x7f0000002e00)=[{{&(0x7f0000002280)=@alg, 0x58, &(0x7f0000002440)=[{&(0x7f00000023c0)=""/76, 0x4c}], 0x1, &(0x7f0000002480)=""/137, 0x89}}, {{&(0x7f0000002540)=@nfc, 0x10, &(0x7f0000002a80)=[{&(0x7f0000002980)=""/212, 0xd4}], 0x1, &(0x7f0000002b00)=""/73, 0x49}}], 0x2, 0x2, &(0x7f0000172ff0)={0x77359400}) r2 = dup2(r0, r0) dup3(r1, r2, 0x0) 2018/04/21 01:44:21 executing program 0: mlock2(&(0x7f0000a93000/0x4000)=nil, 0x4000, 0x1) mremap(&(0x7f0000a93000/0x3000)=nil, 0x3000, 0xe000, 0x3, &(0x7f0000b18000/0xe000)=nil) ioctl$DRM_IOCTL_RM_MAP(0xffffffffffffffff, 0x4028641b, &(0x7f0000b1d000)={&(0x7f0000a93000/0x3000)=nil, 0x0, 0x0, 0x0, &(0x7f0000b1b000/0x3000)=nil}) mprotect(&(0x7f0000b1d000/0x2000)=nil, 0x2000, 0x5) epoll_ctl$EPOLL_CTL_MOD(0xffffffffffffffff, 0x3, 0xffffffffffffffff, &(0x7f0000b1eff4)) munlockall() [ 83.851412] netlink: 6 bytes leftover after parsing attributes in process `syz-executor3'. 2018/04/21 01:44:22 executing program 2: mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0x7, 0x31, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000348f88)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) remap_file_pages(&(0x7f0000461000/0x4000)=nil, 0x4000, 0x0, 0x0, 0x0) 2018/04/21 01:44:22 executing program 1: r0 = socket(0x10, 0x3, 0x0) write(r0, &(0x7f0000000080)="240000004e001f0014f9f4fb00762608f91a1f10080000deffffecff0800120000000000", 0x24) 2018/04/21 01:44:22 executing program 6: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) setsockopt$sock_void(0xffffffffffffffff, 0x1, 0x1b, 0x0, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f00000001c0)={0x0, @multicast2, @local}, &(0x7f0000000200)=0xc) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000fe7000/0x18000)=nil, &(0x7f0000de9000)=[@text32={0x20, &(0x7f0000f59fc6)="0fc75fedc4c3c968fb6c0f9cfbb9040100c00f3266b842008ee80f230064672ec015dec4e245bea5d41e6082f9440f20c03506000000440f22c0", 0x3a}], 0x1, 0x0, &(0x7f0000000180), 0x1ba) add_key$keyring(&(0x7f0000000240)='keyring\x00', &(0x7f0000000340)={0x73, 0x79, 0x7a, 0x1}, 0x0, 0x0, 0xfffffffffffffff8) keyctl$instantiate(0xc, 0x0, &(0x7f0000000380)="c6d39111f1", 0x5, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) 2018/04/21 01:44:22 executing program 0: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$binder(&(0x7f0000000000)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) r1 = syz_open_dev$binder(&(0x7f0000001000)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x0, 0x20011, r1, 0x0) r2 = epoll_create(0x4000000010011) epoll_ctl$EPOLL_CTL_ADD(r2, 0x1, r1, &(0x7f0000336ff4)) dup3(r0, r2, 0x0) ioctl$BINDER_SET_CONTEXT_MGR(r1, 0x40046207, 0x0) ioctl$BINDER_WRITE_READ(r1, 0xc0306201, &(0x7f0000008fd0)={0x4, 0x0, &(0x7f000000a000)=[@register_looper={0x630b}], 0x0, 0x0, &(0x7f000000affc)}) ioctl$BINDER_WRITE_READ(r0, 0xc0306201, &(0x7f0000007000)={0x4, 0x0, &(0x7f0000005fd4)=[@acquire_done={0x40486311}], 0x0, 0x0, &(0x7f0000002000)}) 2018/04/21 01:44:22 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) setsockopt$sock_void(0xffffffffffffffff, 0x1, 0x1b, 0x0, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f00000001c0)={0x0, @multicast2, @local}, &(0x7f0000000200)=0xc) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000fe7000/0x18000)=nil, &(0x7f0000de9000)=[@text32={0x20, &(0x7f0000f59fc6)="0fc75fedc4c3c968fb6c0f9cfbb9040100c00f3266b842008ee80f230064672ec015dec4e245bea5d41e6082f9440f20c03506000000440f22c0", 0x3a}], 0x1, 0x0, &(0x7f0000000180), 0x1ba) add_key$keyring(&(0x7f0000000240)='keyring\x00', &(0x7f0000000340)={0x73, 0x79, 0x7a, 0x1}, 0x0, 0x0, 0xfffffffffffffff8) keyctl$instantiate(0xc, 0x0, &(0x7f0000000380)="c6d39111f1", 0x5, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) 2018/04/21 01:44:22 executing program 7: socketpair(0x8000000000001e, 0x1, 0x0, &(0x7f0000a77ff8)={0xffffffffffffffff, 0xffffffffffffffff}) recvmmsg(r1, &(0x7f0000002e00)=[{{&(0x7f0000002280)=@alg, 0x58, &(0x7f0000002440)=[{&(0x7f00000023c0)=""/76, 0x4c}], 0x1, &(0x7f0000002480)=""/137, 0x89}}, {{&(0x7f0000002540)=@nfc, 0x10, &(0x7f0000002a80)=[{&(0x7f0000002980)=""/212, 0xd4}], 0x1, &(0x7f0000002b00)=""/73, 0x49}}], 0x2, 0x2, &(0x7f0000172ff0)={0x77359400}) r2 = dup2(r0, r0) dup3(r1, r2, 0x0) 2018/04/21 01:44:22 executing program 4: r0 = socket$inet6(0xa, 0x3, 0x1) connect$inet6(r0, &(0x7f000000cfe4)={0xa}, 0x1c) sendmmsg(r0, &(0x7f0000008a00)=[{{0x0, 0x0, &(0x7f0000000480), 0x0, &(0x7f0000000500)=[{0x60, 0x29, 0x3, "e10984fa3279d7a9e03a22b169d736c06ab11a96f7d25adf9166e34ba01ef80187324065bcda06ab9013268169230973698dc95dde627650790df783841dcbb38ed04b54d5375b9d6a"}], 0x60}}], 0x1, 0x0) 2018/04/21 01:44:22 executing program 3: r0 = socket(0x10, 0x802, 0x0) write(r0, &(0x7f0000000040)="220000001800070700ba0000090007000a00001e00000009fdb2bf291205d194f48a", 0x22) [ 84.696122] netlink: 6 bytes leftover after parsing attributes in process `syz-executor3'. 2018/04/21 01:44:22 executing program 1: r0 = socket(0x10, 0x3, 0x0) write(r0, &(0x7f0000000080)="240000004e001f0014f9f4fb00762608f91a1f10080000deffffecff0800120000000000", 0x24) 2018/04/21 01:44:22 executing program 3: r0 = socket(0x10, 0x802, 0x0) write(r0, &(0x7f0000000040)="220000001800070700ba0000090007000a00001e00000009fdb2bf291205d194f48a", 0x22) [ 84.744367] binder: 7884:7892 ERROR: BC_REGISTER_LOOPER called without request [ 84.776943] binder_alloc: binder_alloc_mmap_handler: 7884 20000000-20002000 already mapped failed -16 2018/04/21 01:44:22 executing program 4: r0 = socket$inet6(0xa, 0x3, 0x1) connect$inet6(r0, &(0x7f000000cfe4)={0xa}, 0x1c) sendmmsg(r0, &(0x7f0000008a00)=[{{0x0, 0x0, &(0x7f0000000480), 0x0, &(0x7f0000000500)=[{0x60, 0x29, 0x3, "e10984fa3279d7a9e03a22b169d736c06ab11a96f7d25adf9166e34ba01ef80187324065bcda06ab9013268169230973698dc95dde627650790df783841dcbb38ed04b54d5375b9d6a"}], 0x60}}], 0x1, 0x0) 2018/04/21 01:44:22 executing program 2: mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0x7, 0x31, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000348f88)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) remap_file_pages(&(0x7f0000461000/0x4000)=nil, 0x4000, 0x0, 0x0, 0x0) [ 84.814737] binder: 7884:7895 ERROR: BC_REGISTER_LOOPER called without request [ 84.845781] binder: BINDER_SET_CONTEXT_MGR already set [ 84.879838] binder: 7884:7892 ioctl 40046207 0 returned -16 [ 84.895549] netlink: 6 bytes leftover after parsing attributes in process `syz-executor3'. [ 85.010208] binder: release 7884:7892 transaction 2 out, still active [ 85.017075] binder: undelivered TRANSACTION_COMPLETE [ 85.057129] binder: send failed reply for transaction 2, target dead 2018/04/21 01:44:23 executing program 1: r0 = socket(0x10, 0x3, 0x0) write(r0, &(0x7f0000000080)="240000004e001f0014f9f4fb00762608f91a1f10080000deffffecff0800120000000000", 0x24) 2018/04/21 01:44:23 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) setsockopt$sock_void(0xffffffffffffffff, 0x1, 0x1b, 0x0, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f00000001c0)={0x0, @multicast2, @local}, &(0x7f0000000200)=0xc) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000fe7000/0x18000)=nil, &(0x7f0000de9000)=[@text32={0x20, &(0x7f0000f59fc6)="0fc75fedc4c3c968fb6c0f9cfbb9040100c00f3266b842008ee80f230064672ec015dec4e245bea5d41e6082f9440f20c03506000000440f22c0", 0x3a}], 0x1, 0x0, &(0x7f0000000180), 0x1ba) add_key$keyring(&(0x7f0000000240)='keyring\x00', &(0x7f0000000340)={0x73, 0x79, 0x7a, 0x1}, 0x0, 0x0, 0xfffffffffffffff8) keyctl$instantiate(0xc, 0x0, &(0x7f0000000380)="c6d39111f1", 0x5, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) 2018/04/21 01:44:23 executing program 6: r0 = socket$netlink(0x10, 0x3, 0x4) sendmsg$nl_generic(r0, &(0x7f0000001540)={&(0x7f0000000000)={0x10}, 0xc, &(0x7f00000000c0)={&(0x7f0000001580)={0x18, 0x14, 0x101, 0x0, 0x0, {0x1e, 0xffffff7f}, [@generic="03"]}, 0x18}, 0x1}, 0x0) 2018/04/21 01:44:23 executing program 4: r0 = socket$inet6(0xa, 0x3, 0x1) connect$inet6(r0, &(0x7f000000cfe4)={0xa}, 0x1c) sendmmsg(r0, &(0x7f0000008a00)=[{{0x0, 0x0, &(0x7f0000000480), 0x0, &(0x7f0000000500)=[{0x60, 0x29, 0x3, "e10984fa3279d7a9e03a22b169d736c06ab11a96f7d25adf9166e34ba01ef80187324065bcda06ab9013268169230973698dc95dde627650790df783841dcbb38ed04b54d5375b9d6a"}], 0x60}}], 0x1, 0x0) 2018/04/21 01:44:23 executing program 3: r0 = socket(0x10, 0x802, 0x0) write(r0, &(0x7f0000000040)="220000001800070700ba0000090007000a00001e00000009fdb2bf291205d194f48a", 0x22) 2018/04/21 01:44:23 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, &(0x7f0000000480)=[@textreal={0x8, &(0x7f0000000400)="26660f38381e3219660f759b00000f302e0f01cbf081a70c000800660ffc9608000f09ba2100ed0f352c78"}], 0x1, 0x0, &(0x7f0000000100), 0x96) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SMI(r2, 0xaeb7) ioctl$KVM_REGISTER_COALESCED_MMIO(r1, 0x4010ae67, &(0x7f00000002c0)={0x0, 0x105000}) ioctl$KVM_SET_GUEST_DEBUG(r2, 0x4048ae9b, &(0x7f0000000000)={0x10003}) ioctl$KVM_RUN(r2, 0xae80, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) 2018/04/21 01:44:23 executing program 7: socketpair(0x8000000000001e, 0x1, 0x0, &(0x7f0000a77ff8)={0xffffffffffffffff, 0xffffffffffffffff}) recvmmsg(r1, &(0x7f0000002e00)=[{{&(0x7f0000002280)=@alg, 0x58, &(0x7f0000002440)=[{&(0x7f00000023c0)=""/76, 0x4c}], 0x1, &(0x7f0000002480)=""/137, 0x89}}, {{&(0x7f0000002540)=@nfc, 0x10, &(0x7f0000002a80)=[{&(0x7f0000002980)=""/212, 0xd4}], 0x1, &(0x7f0000002b00)=""/73, 0x49}}], 0x2, 0x2, &(0x7f0000172ff0)={0x77359400}) r2 = dup2(r0, r0) dup3(r1, r2, 0x0) 2018/04/21 01:44:23 executing program 0: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$binder(&(0x7f0000000000)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) r1 = syz_open_dev$binder(&(0x7f0000001000)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x0, 0x20011, r1, 0x0) r2 = epoll_create(0x4000000010011) epoll_ctl$EPOLL_CTL_ADD(r2, 0x1, r1, &(0x7f0000336ff4)) dup3(r0, r2, 0x0) ioctl$BINDER_SET_CONTEXT_MGR(r1, 0x40046207, 0x0) ioctl$BINDER_WRITE_READ(r1, 0xc0306201, &(0x7f0000008fd0)={0x4, 0x0, &(0x7f000000a000)=[@register_looper={0x630b}], 0x0, 0x0, &(0x7f000000affc)}) ioctl$BINDER_WRITE_READ(r0, 0xc0306201, &(0x7f0000007000)={0x4, 0x0, &(0x7f0000005fd4)=[@acquire_done={0x40486311}], 0x0, 0x0, &(0x7f0000002000)}) 2018/04/21 01:44:23 executing program 1: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000005c40)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(ecb-serpent-avx)\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00003bcfd0)="d3ab27191a01002356ba602dff05000b", 0x10) sendmmsg$alg(r1, &(0x7f0000001880)=[{0x0, 0x0, &(0x7f00000001c0)=[{&(0x7f0000000240)="24bb0988ec6fc4727f7724d5600a62fce7200373a18c6bcaa94fdd2d33359d68930bfe332d7644a83e25535be77b1c0086f3e043f81bd7041cb4d0cb125af232b231c0a269d872031a47bcc405a0b02bdba2ccaa470d1353fb9d3fbc45d18ea39e8897310b05a395ea8d364edfe252fe0b53882ef709a0fcef8473a818f6529ca965b4fff9a82661da200988217fab1c", 0x90}], 0x1, &(0x7f0000001240)}], 0x1, 0x0) recvmsg(r1, &(0x7f0000000500)={&(0x7f00002fffa0)=@nfc_llcp, 0x80, &(0x7f0000000000)=[{&(0x7f000080f000)=""/4096, 0x1000}], 0x1, &(0x7f0000da2000)}, 0x0) [ 85.572469] netlink: 6 bytes leftover after parsing attributes in process `syz-executor3'. [ 85.592969] binder: 7918:7928 ERROR: BC_REGISTER_LOOPER called without request 2018/04/21 01:44:23 executing program 6: r0 = socket$netlink(0x10, 0x3, 0x4) sendmsg$nl_generic(r0, &(0x7f0000001540)={&(0x7f0000000000)={0x10}, 0xc, &(0x7f00000000c0)={&(0x7f0000001580)={0x18, 0x14, 0x101, 0x0, 0x0, {0x1e, 0xffffff7f}, [@generic="03"]}, 0x18}, 0x1}, 0x0) 2018/04/21 01:44:23 executing program 3: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$vsock_stream(0x28, 0x1, 0x0) setsockopt$SO_VM_SOCKETS_BUFFER_SIZE(r0, 0x28, 0x0, &(0x7f0000000040)=0x977, 0x8) 2018/04/21 01:44:23 executing program 4: perf_event_open(&(0x7f00000000c0)={0x2, 0x70, 0x3e6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000000c0)="2f65786500000000000409004bddd9de91be10eebf000ee9a90f798058439ed554fa07424adee901d2da75af1f0200f5ab26d7a071fb35331ce39c5a") open(&(0x7f0000000000)='./bus\x00', 0x100000141842, 0x0) syz_mount_image$ntfs(&(0x7f0000000440)='ntfs\x00', &(0x7f0000000480)='./bus\x00', 0x0, 0x0, &(0x7f00000006c0), 0x1000, &(0x7f0000000740)=ANY=[]) r1 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000006000/0x3000)=nil, 0x3000, 0x7, 0x11, r1, 0x0) syz_mount_image$hfs(&(0x7f0000000040)='hfs\x00', &(0x7f0000000100)='./bus\x00', 0x0, 0x1, &(0x7f00000002c0)=[{&(0x7f0000000300), 0x0, 0x55c3}], 0x0, &(0x7f0000000140)=ANY=[]) read$eventfd(r0, &(0x7f0000000200), 0xfffffe08) mbind(&(0x7f0000006000/0x2000)=nil, 0x2000, 0x4002, &(0x7f0000000080)=0x4, 0x4, 0x4) 2018/04/21 01:44:23 executing program 5: r0 = socket(0x40000000015, 0x5, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f00000001c0)={0x0, 0x0}, &(0x7f0000000200)=0x5) setreuid(0x0, r1) perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 2018/04/21 01:44:23 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, &(0x7f0000000480)=[@textreal={0x8, &(0x7f0000000400)="26660f38381e3219660f759b00000f302e0f01cbf081a70c000800660ffc9608000f09ba2100ed0f352c78"}], 0x1, 0x0, &(0x7f0000000100), 0x96) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SMI(r2, 0xaeb7) ioctl$KVM_REGISTER_COALESCED_MMIO(r1, 0x4010ae67, &(0x7f00000002c0)={0x0, 0x105000}) ioctl$KVM_SET_GUEST_DEBUG(r2, 0x4048ae9b, &(0x7f0000000000)={0x10003}) ioctl$KVM_RUN(r2, 0xae80, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) 2018/04/21 01:44:23 executing program 0: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$binder(&(0x7f0000000000)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) r1 = syz_open_dev$binder(&(0x7f0000001000)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x0, 0x20011, r1, 0x0) r2 = epoll_create(0x4000000010011) epoll_ctl$EPOLL_CTL_ADD(r2, 0x1, r1, &(0x7f0000336ff4)) dup3(r0, r2, 0x0) ioctl$BINDER_SET_CONTEXT_MGR(r1, 0x40046207, 0x0) ioctl$BINDER_WRITE_READ(r1, 0xc0306201, &(0x7f0000008fd0)={0x4, 0x0, &(0x7f000000a000)=[@register_looper={0x630b}], 0x0, 0x0, &(0x7f000000affc)}) ioctl$BINDER_WRITE_READ(r0, 0xc0306201, &(0x7f0000007000)={0x4, 0x0, &(0x7f0000005fd4)=[@acquire_done={0x40486311}], 0x0, 0x0, &(0x7f0000002000)}) 2018/04/21 01:44:23 executing program 6: r0 = socket$netlink(0x10, 0x3, 0x4) sendmsg$nl_generic(r0, &(0x7f0000001540)={&(0x7f0000000000)={0x10}, 0xc, &(0x7f00000000c0)={&(0x7f0000001580)={0x18, 0x14, 0x101, 0x0, 0x0, {0x1e, 0xffffff7f}, [@generic="03"]}, 0x18}, 0x1}, 0x0) [ 85.791887] binder: release 7918:7928 transaction 4 out, still active [ 85.798663] binder: undelivered TRANSACTION_COMPLETE [ 85.819237] binder: send failed reply for transaction 4, target dead 2018/04/21 01:44:23 executing program 3: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$vsock_stream(0x28, 0x1, 0x0) setsockopt$SO_VM_SOCKETS_BUFFER_SIZE(r0, 0x28, 0x0, &(0x7f0000000040)=0x977, 0x8) [ 85.912792] binder: 7964:7965 ERROR: BC_REGISTER_LOOPER called without request [ 85.989390] hfs: can't find a HFS filesystem on dev loop4 [ 86.062081] binder: release 7964:7965 transaction 6 out, still active [ 86.068787] binder: undelivered TRANSACTION_COMPLETE [ 86.110150] binder: send failed reply for transaction 6, target dead 2018/04/21 01:44:24 executing program 7: socketpair(0x8000000000001e, 0x1, 0x0, &(0x7f0000a77ff8)={0xffffffffffffffff, 0xffffffffffffffff}) recvmmsg(r1, &(0x7f0000002e00)=[{{&(0x7f0000002280)=@alg, 0x58, &(0x7f0000002440)=[{&(0x7f00000023c0)=""/76, 0x4c}], 0x1, &(0x7f0000002480)=""/137, 0x89}}, {{&(0x7f0000002540)=@nfc, 0x10, &(0x7f0000002a80)=[{&(0x7f0000002980)=""/212, 0xd4}], 0x1, &(0x7f0000002b00)=""/73, 0x49}}], 0x2, 0x2, &(0x7f0000172ff0)={0x77359400}) r2 = dup2(r0, r0) dup3(r1, r2, 0x0) 2018/04/21 01:44:24 executing program 1: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000005c40)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(ecb-serpent-avx)\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00003bcfd0)="d3ab27191a01002356ba602dff05000b", 0x10) sendmmsg$alg(r1, &(0x7f0000001880)=[{0x0, 0x0, &(0x7f00000001c0)=[{&(0x7f0000000240)="24bb0988ec6fc4727f7724d5600a62fce7200373a18c6bcaa94fdd2d33359d68930bfe332d7644a83e25535be77b1c0086f3e043f81bd7041cb4d0cb125af232b231c0a269d872031a47bcc405a0b02bdba2ccaa470d1353fb9d3fbc45d18ea39e8897310b05a395ea8d364edfe252fe0b53882ef709a0fcef8473a818f6529ca965b4fff9a82661da200988217fab1c", 0x90}], 0x1, &(0x7f0000001240)}], 0x1, 0x0) recvmsg(r1, &(0x7f0000000500)={&(0x7f00002fffa0)=@nfc_llcp, 0x80, &(0x7f0000000000)=[{&(0x7f000080f000)=""/4096, 0x1000}], 0x1, &(0x7f0000da2000)}, 0x0) 2018/04/21 01:44:24 executing program 5: r0 = socket(0x40000000015, 0x5, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f00000001c0)={0x0, 0x0}, &(0x7f0000000200)=0x5) setreuid(0x0, r1) perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 2018/04/21 01:44:24 executing program 6: r0 = socket$netlink(0x10, 0x3, 0x4) sendmsg$nl_generic(r0, &(0x7f0000001540)={&(0x7f0000000000)={0x10}, 0xc, &(0x7f00000000c0)={&(0x7f0000001580)={0x18, 0x14, 0x101, 0x0, 0x0, {0x1e, 0xffffff7f}, [@generic="03"]}, 0x18}, 0x1}, 0x0) 2018/04/21 01:44:24 executing program 0: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$binder(&(0x7f0000000000)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) r1 = syz_open_dev$binder(&(0x7f0000001000)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x0, 0x20011, r1, 0x0) r2 = epoll_create(0x4000000010011) epoll_ctl$EPOLL_CTL_ADD(r2, 0x1, r1, &(0x7f0000336ff4)) dup3(r0, r2, 0x0) ioctl$BINDER_SET_CONTEXT_MGR(r1, 0x40046207, 0x0) ioctl$BINDER_WRITE_READ(r1, 0xc0306201, &(0x7f0000008fd0)={0x4, 0x0, &(0x7f000000a000)=[@register_looper={0x630b}], 0x0, 0x0, &(0x7f000000affc)}) ioctl$BINDER_WRITE_READ(r0, 0xc0306201, &(0x7f0000007000)={0x4, 0x0, &(0x7f0000005fd4)=[@acquire_done={0x40486311}], 0x0, 0x0, &(0x7f0000002000)}) 2018/04/21 01:44:24 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, &(0x7f0000000480)=[@textreal={0x8, &(0x7f0000000400)="26660f38381e3219660f759b00000f302e0f01cbf081a70c000800660ffc9608000f09ba2100ed0f352c78"}], 0x1, 0x0, &(0x7f0000000100), 0x96) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SMI(r2, 0xaeb7) ioctl$KVM_REGISTER_COALESCED_MMIO(r1, 0x4010ae67, &(0x7f00000002c0)={0x0, 0x105000}) ioctl$KVM_SET_GUEST_DEBUG(r2, 0x4048ae9b, &(0x7f0000000000)={0x10003}) ioctl$KVM_RUN(r2, 0xae80, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) 2018/04/21 01:44:24 executing program 3: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$vsock_stream(0x28, 0x1, 0x0) setsockopt$SO_VM_SOCKETS_BUFFER_SIZE(r0, 0x28, 0x0, &(0x7f0000000040)=0x977, 0x8) 2018/04/21 01:44:24 executing program 4: perf_event_open(&(0x7f00000000c0)={0x2, 0x70, 0x3e6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000000c0)="2f65786500000000000409004bddd9de91be10eebf000ee9a90f798058439ed554fa07424adee901d2da75af1f0200f5ab26d7a071fb35331ce39c5a") open(&(0x7f0000000000)='./bus\x00', 0x100000141842, 0x0) syz_mount_image$ntfs(&(0x7f0000000440)='ntfs\x00', &(0x7f0000000480)='./bus\x00', 0x0, 0x0, &(0x7f00000006c0), 0x1000, &(0x7f0000000740)=ANY=[]) r1 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000006000/0x3000)=nil, 0x3000, 0x7, 0x11, r1, 0x0) syz_mount_image$hfs(&(0x7f0000000040)='hfs\x00', &(0x7f0000000100)='./bus\x00', 0x0, 0x1, &(0x7f00000002c0)=[{&(0x7f0000000300), 0x0, 0x55c3}], 0x0, &(0x7f0000000140)=ANY=[]) read$eventfd(r0, &(0x7f0000000200), 0xfffffe08) mbind(&(0x7f0000006000/0x2000)=nil, 0x2000, 0x4002, &(0x7f0000000080)=0x4, 0x4, 0x4) 2018/04/21 01:44:24 executing program 5: r0 = socket(0x40000000015, 0x5, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f00000001c0)={0x0, 0x0}, &(0x7f0000000200)=0x5) setreuid(0x0, r1) perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 86.488721] binder: 7995:8002 ERROR: BC_REGISTER_LOOPER called without request 2018/04/21 01:44:24 executing program 6: perf_event_open(&(0x7f00000000c0)={0x2, 0x70, 0x3e6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000000c0)="2f65786500000000000409004bddd9de91be10eebf000ee9a90f798058439ed554fa07424adee901d2da75af1f0200f5ab26d7a071fb35331ce39c5a") open(&(0x7f0000000000)='./bus\x00', 0x100000141842, 0x0) syz_mount_image$ntfs(&(0x7f0000000440)='ntfs\x00', &(0x7f0000000480)='./bus\x00', 0x0, 0x0, &(0x7f00000006c0), 0x1000, &(0x7f0000000740)=ANY=[]) r1 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000006000/0x3000)=nil, 0x3000, 0x7, 0x11, r1, 0x0) syz_mount_image$hfs(&(0x7f0000000040)='hfs\x00', &(0x7f0000000100)='./bus\x00', 0x0, 0x1, &(0x7f00000002c0)=[{&(0x7f0000000300), 0x0, 0x55c3}], 0x0, &(0x7f0000000140)=ANY=[]) read$eventfd(r0, &(0x7f0000000200), 0xfffffe08) mbind(&(0x7f0000006000/0x2000)=nil, 0x2000, 0x4002, &(0x7f0000000080)=0x4, 0x4, 0x4) 2018/04/21 01:44:24 executing program 3: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$vsock_stream(0x28, 0x1, 0x0) setsockopt$SO_VM_SOCKETS_BUFFER_SIZE(r0, 0x28, 0x0, &(0x7f0000000040)=0x977, 0x8) 2018/04/21 01:44:24 executing program 0: perf_event_open(&(0x7f00000000c0)={0x2, 0x70, 0x3e6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000000c0)="2f65786500000000000409004bddd9de91be10eebf000ee9a90f798058439ed554fa07424adee901d2da75af1f0200f5ab26d7a071fb35331ce39c5a") open(&(0x7f0000000000)='./bus\x00', 0x100000141842, 0x0) syz_mount_image$ntfs(&(0x7f0000000440)='ntfs\x00', &(0x7f0000000480)='./bus\x00', 0x0, 0x0, &(0x7f00000006c0), 0x1000, &(0x7f0000000740)=ANY=[]) r1 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000006000/0x3000)=nil, 0x3000, 0x7, 0x11, r1, 0x0) syz_mount_image$hfs(&(0x7f0000000040)='hfs\x00', &(0x7f0000000100)='./bus\x00', 0x0, 0x1, &(0x7f00000002c0)=[{&(0x7f0000000300), 0x0, 0x55c3}], 0x0, &(0x7f0000000140)=ANY=[]) read$eventfd(r0, &(0x7f0000000200), 0xfffffe08) mbind(&(0x7f0000006000/0x2000)=nil, 0x2000, 0x4002, &(0x7f0000000080)=0x4, 0x4, 0x4) [ 86.592363] hfs: can't find a HFS filesystem on dev loop4 [ 86.617373] binder: release 7995:8002 transaction 8 out, still active [ 86.624110] binder: undelivered TRANSACTION_COMPLETE 2018/04/21 01:44:24 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, &(0x7f0000000480)=[@textreal={0x8, &(0x7f0000000400)="26660f38381e3219660f759b00000f302e0f01cbf081a70c000800660ffc9608000f09ba2100ed0f352c78"}], 0x1, 0x0, &(0x7f0000000100), 0x96) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SMI(r2, 0xaeb7) ioctl$KVM_REGISTER_COALESCED_MMIO(r1, 0x4010ae67, &(0x7f00000002c0)={0x0, 0x105000}) ioctl$KVM_SET_GUEST_DEBUG(r2, 0x4048ae9b, &(0x7f0000000000)={0x10003}) ioctl$KVM_RUN(r2, 0xae80, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) 2018/04/21 01:44:24 executing program 1: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000005c40)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(ecb-serpent-avx)\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00003bcfd0)="d3ab27191a01002356ba602dff05000b", 0x10) sendmmsg$alg(r1, &(0x7f0000001880)=[{0x0, 0x0, &(0x7f00000001c0)=[{&(0x7f0000000240)="24bb0988ec6fc4727f7724d5600a62fce7200373a18c6bcaa94fdd2d33359d68930bfe332d7644a83e25535be77b1c0086f3e043f81bd7041cb4d0cb125af232b231c0a269d872031a47bcc405a0b02bdba2ccaa470d1353fb9d3fbc45d18ea39e8897310b05a395ea8d364edfe252fe0b53882ef709a0fcef8473a818f6529ca965b4fff9a82661da200988217fab1c", 0x90}], 0x1, &(0x7f0000001240)}], 0x1, 0x0) recvmsg(r1, &(0x7f0000000500)={&(0x7f00002fffa0)=@nfc_llcp, 0x80, &(0x7f0000000000)=[{&(0x7f000080f000)=""/4096, 0x1000}], 0x1, &(0x7f0000da2000)}, 0x0) 2018/04/21 01:44:24 executing program 3: perf_event_open(&(0x7f00000000c0)={0x2, 0x70, 0x3e6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000000c0)="2f65786500000000000409004bddd9de91be10eebf000ee9a90f798058439ed554fa07424adee901d2da75af1f0200f5ab26d7a071fb35331ce39c5a") open(&(0x7f0000000000)='./bus\x00', 0x100000141842, 0x0) syz_mount_image$ntfs(&(0x7f0000000440)='ntfs\x00', &(0x7f0000000480)='./bus\x00', 0x0, 0x0, &(0x7f00000006c0), 0x1000, &(0x7f0000000740)=ANY=[]) r1 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000006000/0x3000)=nil, 0x3000, 0x7, 0x11, r1, 0x0) syz_mount_image$hfs(&(0x7f0000000040)='hfs\x00', &(0x7f0000000100)='./bus\x00', 0x0, 0x1, &(0x7f00000002c0)=[{&(0x7f0000000300), 0x0, 0x55c3}], 0x0, &(0x7f0000000140)=ANY=[]) read$eventfd(r0, &(0x7f0000000200), 0xfffffe08) mbind(&(0x7f0000006000/0x2000)=nil, 0x2000, 0x4002, &(0x7f0000000080)=0x4, 0x4, 0x4) [ 86.678146] binder: send failed reply for transaction 8, target dead [ 86.703489] hfs: can't find a HFS filesystem on dev loop6 2018/04/21 01:44:24 executing program 5: r0 = socket(0x40000000015, 0x5, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f00000001c0)={0x0, 0x0}, &(0x7f0000000200)=0x5) setreuid(0x0, r1) perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 86.815177] hfs: can't find a HFS filesystem on dev loop0 [ 86.906302] hfs: can't find a HFS filesystem on dev loop3 [ 87.156562] syz-executor3 (8036) used greatest stack depth: 16512 bytes left 2018/04/21 01:44:25 executing program 1: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000005c40)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(ecb-serpent-avx)\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00003bcfd0)="d3ab27191a01002356ba602dff05000b", 0x10) sendmmsg$alg(r1, &(0x7f0000001880)=[{0x0, 0x0, &(0x7f00000001c0)=[{&(0x7f0000000240)="24bb0988ec6fc4727f7724d5600a62fce7200373a18c6bcaa94fdd2d33359d68930bfe332d7644a83e25535be77b1c0086f3e043f81bd7041cb4d0cb125af232b231c0a269d872031a47bcc405a0b02bdba2ccaa470d1353fb9d3fbc45d18ea39e8897310b05a395ea8d364edfe252fe0b53882ef709a0fcef8473a818f6529ca965b4fff9a82661da200988217fab1c", 0x90}], 0x1, &(0x7f0000001240)}], 0x1, 0x0) recvmsg(r1, &(0x7f0000000500)={&(0x7f00002fffa0)=@nfc_llcp, 0x80, &(0x7f0000000000)=[{&(0x7f000080f000)=""/4096, 0x1000}], 0x1, &(0x7f0000da2000)}, 0x0) 2018/04/21 01:44:25 executing program 6: perf_event_open(&(0x7f00000000c0)={0x2, 0x70, 0x3e6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000000c0)="2f65786500000000000409004bddd9de91be10eebf000ee9a90f798058439ed554fa07424adee901d2da75af1f0200f5ab26d7a071fb35331ce39c5a") open(&(0x7f0000000000)='./bus\x00', 0x100000141842, 0x0) syz_mount_image$ntfs(&(0x7f0000000440)='ntfs\x00', &(0x7f0000000480)='./bus\x00', 0x0, 0x0, &(0x7f00000006c0), 0x1000, &(0x7f0000000740)=ANY=[]) r1 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000006000/0x3000)=nil, 0x3000, 0x7, 0x11, r1, 0x0) syz_mount_image$hfs(&(0x7f0000000040)='hfs\x00', &(0x7f0000000100)='./bus\x00', 0x0, 0x1, &(0x7f00000002c0)=[{&(0x7f0000000300), 0x0, 0x55c3}], 0x0, &(0x7f0000000140)=ANY=[]) read$eventfd(r0, &(0x7f0000000200), 0xfffffe08) mbind(&(0x7f0000006000/0x2000)=nil, 0x2000, 0x4002, &(0x7f0000000080)=0x4, 0x4, 0x4) 2018/04/21 01:44:25 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, &(0x7f0000000480)=[@textreal={0x8, &(0x7f0000000400)="26660f38381e3219660f759b00000f302e0f01cbf081a70c000800660ffc9608000f09ba2100ed0f352c78"}], 0x1, 0x0, &(0x7f0000000100), 0x96) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SMI(r2, 0xaeb7) ioctl$KVM_REGISTER_COALESCED_MMIO(r1, 0x4010ae67, &(0x7f00000002c0)={0x0, 0x105000}) ioctl$KVM_SET_GUEST_DEBUG(r2, 0x4048ae9b, &(0x7f0000000000)={0x10003}) ioctl$KVM_RUN(r2, 0xae80, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) 2018/04/21 01:44:25 executing program 0: perf_event_open(&(0x7f00000000c0)={0x2, 0x70, 0x3e6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000000c0)="2f65786500000000000409004bddd9de91be10eebf000ee9a90f798058439ed554fa07424adee901d2da75af1f0200f5ab26d7a071fb35331ce39c5a") open(&(0x7f0000000000)='./bus\x00', 0x100000141842, 0x0) syz_mount_image$ntfs(&(0x7f0000000440)='ntfs\x00', &(0x7f0000000480)='./bus\x00', 0x0, 0x0, &(0x7f00000006c0), 0x1000, &(0x7f0000000740)=ANY=[]) r1 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000006000/0x3000)=nil, 0x3000, 0x7, 0x11, r1, 0x0) syz_mount_image$hfs(&(0x7f0000000040)='hfs\x00', &(0x7f0000000100)='./bus\x00', 0x0, 0x1, &(0x7f00000002c0)=[{&(0x7f0000000300), 0x0, 0x55c3}], 0x0, &(0x7f0000000140)=ANY=[]) read$eventfd(r0, &(0x7f0000000200), 0xfffffe08) mbind(&(0x7f0000006000/0x2000)=nil, 0x2000, 0x4002, &(0x7f0000000080)=0x4, 0x4, 0x4) 2018/04/21 01:44:25 executing program 3: perf_event_open(&(0x7f00000000c0)={0x2, 0x70, 0x3e6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000000c0)="2f65786500000000000409004bddd9de91be10eebf000ee9a90f798058439ed554fa07424adee901d2da75af1f0200f5ab26d7a071fb35331ce39c5a") open(&(0x7f0000000000)='./bus\x00', 0x100000141842, 0x0) syz_mount_image$ntfs(&(0x7f0000000440)='ntfs\x00', &(0x7f0000000480)='./bus\x00', 0x0, 0x0, &(0x7f00000006c0), 0x1000, &(0x7f0000000740)=ANY=[]) r1 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000006000/0x3000)=nil, 0x3000, 0x7, 0x11, r1, 0x0) syz_mount_image$hfs(&(0x7f0000000040)='hfs\x00', &(0x7f0000000100)='./bus\x00', 0x0, 0x1, &(0x7f00000002c0)=[{&(0x7f0000000300), 0x0, 0x55c3}], 0x0, &(0x7f0000000140)=ANY=[]) read$eventfd(r0, &(0x7f0000000200), 0xfffffe08) mbind(&(0x7f0000006000/0x2000)=nil, 0x2000, 0x4002, &(0x7f0000000080)=0x4, 0x4, 0x4) 2018/04/21 01:44:25 executing program 7: r0 = socket$inet6(0xa, 0x1, 0x8010000400000084) bind$inet6(r0, &(0x7f00001c1000)={0xa, 0x4e20}, 0x1c) setsockopt$inet_sctp6_SCTP_MAXSEG(r0, 0x84, 0xd, &(0x7f0000dacff8)=@assoc_value={0x0, 0x200}, 0x8) sendto$inet6(r0, &(0x7f00009f1000)='G', 0x1, 0x0, &(0x7f0000108fe4)={0xa, 0x4e20, 0x0, @loopback={0x0, 0x1}}, 0x1c) writev(r0, &(0x7f00007f2000)=[{&(0x7f0000001f40)="b6", 0x1}], 0x1) setsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(r0, 0x84, 0x72, &(0x7f00000001c0)={0x0, 0x0, 0x20}, 0xc) writev(r0, &(0x7f0000000140)=[{&(0x7f00000006c0)="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", 0x201}], 0x1) 2018/04/21 01:44:25 executing program 4: perf_event_open(&(0x7f00000000c0)={0x2, 0x70, 0x3e6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000000c0)="2f65786500000000000409004bddd9de91be10eebf000ee9a90f798058439ed554fa07424adee901d2da75af1f0200f5ab26d7a071fb35331ce39c5a") open(&(0x7f0000000000)='./bus\x00', 0x100000141842, 0x0) syz_mount_image$ntfs(&(0x7f0000000440)='ntfs\x00', &(0x7f0000000480)='./bus\x00', 0x0, 0x0, &(0x7f00000006c0), 0x1000, &(0x7f0000000740)=ANY=[]) r1 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000006000/0x3000)=nil, 0x3000, 0x7, 0x11, r1, 0x0) syz_mount_image$hfs(&(0x7f0000000040)='hfs\x00', &(0x7f0000000100)='./bus\x00', 0x0, 0x1, &(0x7f00000002c0)=[{&(0x7f0000000300), 0x0, 0x55c3}], 0x0, &(0x7f0000000140)=ANY=[]) read$eventfd(r0, &(0x7f0000000200), 0xfffffe08) mbind(&(0x7f0000006000/0x2000)=nil, 0x2000, 0x4002, &(0x7f0000000080)=0x4, 0x4, 0x4) 2018/04/21 01:44:25 executing program 5: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000005c40)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(ecb-serpent-avx)\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00003bcfd0)="d3ab27191a01002356ba602dff05000b", 0x10) sendmmsg$alg(r1, &(0x7f0000001880)=[{0x0, 0x0, &(0x7f00000001c0)=[{&(0x7f0000000240)="24bb0988ec6fc4727f7724d5600a62fce7200373a18c6bcaa94fdd2d33359d68930bfe332d7644a83e25535be77b1c0086f3e043f81bd7041cb4d0cb125af232b231c0a269d872031a47bcc405a0b02bdba2ccaa470d1353fb9d3fbc45d18ea39e8897310b05a395ea8d364edfe252fe0b53882ef709a0fcef8473a818f6529ca965b4fff9a82661da200988217fab1c", 0x90}], 0x1, &(0x7f0000001240)}], 0x1, 0x0) recvmsg(r1, &(0x7f0000000500)={&(0x7f00002fffa0)=@nfc_llcp, 0x80, &(0x7f0000000000)=[{&(0x7f000080f000)=""/4096, 0x1000}], 0x1, &(0x7f0000da2000)}, 0x0) [ 87.410324] hfs: can't find a HFS filesystem on dev loop0 [ 87.411415] hfs: can't find a HFS filesystem on dev loop3 [ 87.433268] hfs: can't find a HFS filesystem on dev loop6 2018/04/21 01:44:25 executing program 1: mkdir(&(0x7f00002b2000)='./file0\x00', 0x0) mount(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00', &(0x7f0000000040)='mqueue\x00', 0x0, &(0x7f0000000000)) r0 = open(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) lseek(r0, 0xfffffffffffffffe, 0x0) [ 87.523544] hfs: can't find a HFS filesystem on dev loop4 2018/04/21 01:44:25 executing program 5: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000005c40)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(ecb-serpent-avx)\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00003bcfd0)="d3ab27191a01002356ba602dff05000b", 0x10) sendmmsg$alg(r1, &(0x7f0000001880)=[{0x0, 0x0, &(0x7f00000001c0)=[{&(0x7f0000000240)="24bb0988ec6fc4727f7724d5600a62fce7200373a18c6bcaa94fdd2d33359d68930bfe332d7644a83e25535be77b1c0086f3e043f81bd7041cb4d0cb125af232b231c0a269d872031a47bcc405a0b02bdba2ccaa470d1353fb9d3fbc45d18ea39e8897310b05a395ea8d364edfe252fe0b53882ef709a0fcef8473a818f6529ca965b4fff9a82661da200988217fab1c", 0x90}], 0x1, &(0x7f0000001240)}], 0x1, 0x0) recvmsg(r1, &(0x7f0000000500)={&(0x7f00002fffa0)=@nfc_llcp, 0x80, &(0x7f0000000000)=[{&(0x7f000080f000)=""/4096, 0x1000}], 0x1, &(0x7f0000da2000)}, 0x0) 2018/04/21 01:44:25 executing program 6: perf_event_open(&(0x7f00000000c0)={0x2, 0x70, 0x3e6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000000c0)="2f65786500000000000409004bddd9de91be10eebf000ee9a90f798058439ed554fa07424adee901d2da75af1f0200f5ab26d7a071fb35331ce39c5a") open(&(0x7f0000000000)='./bus\x00', 0x100000141842, 0x0) syz_mount_image$ntfs(&(0x7f0000000440)='ntfs\x00', &(0x7f0000000480)='./bus\x00', 0x0, 0x0, &(0x7f00000006c0), 0x1000, &(0x7f0000000740)=ANY=[]) r1 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000006000/0x3000)=nil, 0x3000, 0x7, 0x11, r1, 0x0) syz_mount_image$hfs(&(0x7f0000000040)='hfs\x00', &(0x7f0000000100)='./bus\x00', 0x0, 0x1, &(0x7f00000002c0)=[{&(0x7f0000000300), 0x0, 0x55c3}], 0x0, &(0x7f0000000140)=ANY=[]) read$eventfd(r0, &(0x7f0000000200), 0xfffffe08) mbind(&(0x7f0000006000/0x2000)=nil, 0x2000, 0x4002, &(0x7f0000000080)=0x4, 0x4, 0x4) 2018/04/21 01:44:25 executing program 0: perf_event_open(&(0x7f00000000c0)={0x2, 0x70, 0x3e6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000000c0)="2f65786500000000000409004bddd9de91be10eebf000ee9a90f798058439ed554fa07424adee901d2da75af1f0200f5ab26d7a071fb35331ce39c5a") open(&(0x7f0000000000)='./bus\x00', 0x100000141842, 0x0) syz_mount_image$ntfs(&(0x7f0000000440)='ntfs\x00', &(0x7f0000000480)='./bus\x00', 0x0, 0x0, &(0x7f00000006c0), 0x1000, &(0x7f0000000740)=ANY=[]) r1 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000006000/0x3000)=nil, 0x3000, 0x7, 0x11, r1, 0x0) syz_mount_image$hfs(&(0x7f0000000040)='hfs\x00', &(0x7f0000000100)='./bus\x00', 0x0, 0x1, &(0x7f00000002c0)=[{&(0x7f0000000300), 0x0, 0x55c3}], 0x0, &(0x7f0000000140)=ANY=[]) read$eventfd(r0, &(0x7f0000000200), 0xfffffe08) mbind(&(0x7f0000006000/0x2000)=nil, 0x2000, 0x4002, &(0x7f0000000080)=0x4, 0x4, 0x4) 2018/04/21 01:44:25 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, &(0x7f0000000480)=[@textreal={0x8, &(0x7f0000000400)="26660f38381e3219660f759b00000f302e0f01cbf081a70c000800660ffc9608000f09ba2100ed0f352c78"}], 0x1, 0x0, &(0x7f0000000100), 0x96) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SMI(r2, 0xaeb7) ioctl$KVM_REGISTER_COALESCED_MMIO(r1, 0x4010ae67, &(0x7f00000002c0)={0x0, 0x105000}) ioctl$KVM_SET_GUEST_DEBUG(r2, 0x4048ae9b, &(0x7f0000000000)={0x10003}) ioctl$KVM_RUN(r2, 0xae80, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) 2018/04/21 01:44:25 executing program 1: mkdir(&(0x7f00002b2000)='./file0\x00', 0x0) mount(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00', &(0x7f0000000040)='mqueue\x00', 0x0, &(0x7f0000000000)) r0 = open(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) lseek(r0, 0xfffffffffffffffe, 0x0) 2018/04/21 01:44:25 executing program 3: perf_event_open(&(0x7f00000000c0)={0x2, 0x70, 0x3e6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000000c0)="2f65786500000000000409004bddd9de91be10eebf000ee9a90f798058439ed554fa07424adee901d2da75af1f0200f5ab26d7a071fb35331ce39c5a") open(&(0x7f0000000000)='./bus\x00', 0x100000141842, 0x0) syz_mount_image$ntfs(&(0x7f0000000440)='ntfs\x00', &(0x7f0000000480)='./bus\x00', 0x0, 0x0, &(0x7f00000006c0), 0x1000, &(0x7f0000000740)=ANY=[]) r1 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000006000/0x3000)=nil, 0x3000, 0x7, 0x11, r1, 0x0) syz_mount_image$hfs(&(0x7f0000000040)='hfs\x00', &(0x7f0000000100)='./bus\x00', 0x0, 0x1, &(0x7f00000002c0)=[{&(0x7f0000000300), 0x0, 0x55c3}], 0x0, &(0x7f0000000140)=ANY=[]) read$eventfd(r0, &(0x7f0000000200), 0xfffffe08) mbind(&(0x7f0000006000/0x2000)=nil, 0x2000, 0x4002, &(0x7f0000000080)=0x4, 0x4, 0x4) 2018/04/21 01:44:25 executing program 7: r0 = socket$inet6(0xa, 0x1, 0x8010000400000084) bind$inet6(r0, &(0x7f00001c1000)={0xa, 0x4e20}, 0x1c) setsockopt$inet_sctp6_SCTP_MAXSEG(r0, 0x84, 0xd, &(0x7f0000dacff8)=@assoc_value={0x0, 0x200}, 0x8) sendto$inet6(r0, &(0x7f00009f1000)='G', 0x1, 0x0, &(0x7f0000108fe4)={0xa, 0x4e20, 0x0, @loopback={0x0, 0x1}}, 0x1c) writev(r0, &(0x7f00007f2000)=[{&(0x7f0000001f40)="b6", 0x1}], 0x1) setsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(r0, 0x84, 0x72, &(0x7f00000001c0)={0x0, 0x0, 0x20}, 0xc) writev(r0, &(0x7f0000000140)=[{&(0x7f00000006c0)="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", 0x201}], 0x1) [ 87.839868] hfs: can't find a HFS filesystem on dev loop6 2018/04/21 01:44:25 executing program 5: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000005c40)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(ecb-serpent-avx)\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00003bcfd0)="d3ab27191a01002356ba602dff05000b", 0x10) sendmmsg$alg(r1, &(0x7f0000001880)=[{0x0, 0x0, &(0x7f00000001c0)=[{&(0x7f0000000240)="24bb0988ec6fc4727f7724d5600a62fce7200373a18c6bcaa94fdd2d33359d68930bfe332d7644a83e25535be77b1c0086f3e043f81bd7041cb4d0cb125af232b231c0a269d872031a47bcc405a0b02bdba2ccaa470d1353fb9d3fbc45d18ea39e8897310b05a395ea8d364edfe252fe0b53882ef709a0fcef8473a818f6529ca965b4fff9a82661da200988217fab1c", 0x90}], 0x1, &(0x7f0000001240)}], 0x1, 0x0) recvmsg(r1, &(0x7f0000000500)={&(0x7f00002fffa0)=@nfc_llcp, 0x80, &(0x7f0000000000)=[{&(0x7f000080f000)=""/4096, 0x1000}], 0x1, &(0x7f0000da2000)}, 0x0) [ 87.902558] hfs: can't find a HFS filesystem on dev loop0 2018/04/21 01:44:25 executing program 1: mkdir(&(0x7f00002b2000)='./file0\x00', 0x0) mount(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00', &(0x7f0000000040)='mqueue\x00', 0x0, &(0x7f0000000000)) r0 = open(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) lseek(r0, 0xfffffffffffffffe, 0x0) 2018/04/21 01:44:25 executing program 6: bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x0, 0x3, &(0x7f0000000040)=ANY=[@ANYBLOB="896300000000000000000000028000007a0a00fffffffffd630148"], &(0x7f0000000000)="47504c00bc3047eb525f484f89fc96dd6ca64da40ff023122e66f6", 0x0, 0xce, &(0x7f0000000300)=""/206}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x5, 0x5, &(0x7f0000000040)=@framed={{0x18}, [@jmp={0x5}], {0x95}}, &(0x7f0000000200)='syzkaller\x00', 0x84000001, 0xbb, &(0x7f00000004c0)=""/187}, 0x48) [ 88.061487] hfs: can't find a HFS filesystem on dev loop3 2018/04/21 01:44:25 executing program 4: perf_event_open(&(0x7f00000000c0)={0x2, 0x70, 0x3e6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000000c0)="2f65786500000000000409004bddd9de91be10eebf000ee9a90f798058439ed554fa07424adee901d2da75af1f0200f5ab26d7a071fb35331ce39c5a") open(&(0x7f0000000000)='./bus\x00', 0x100000141842, 0x0) syz_mount_image$ntfs(&(0x7f0000000440)='ntfs\x00', &(0x7f0000000480)='./bus\x00', 0x0, 0x0, &(0x7f00000006c0), 0x1000, &(0x7f0000000740)=ANY=[]) r1 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000006000/0x3000)=nil, 0x3000, 0x7, 0x11, r1, 0x0) syz_mount_image$hfs(&(0x7f0000000040)='hfs\x00', &(0x7f0000000100)='./bus\x00', 0x0, 0x1, &(0x7f00000002c0)=[{&(0x7f0000000300), 0x0, 0x55c3}], 0x0, &(0x7f0000000140)=ANY=[]) read$eventfd(r0, &(0x7f0000000200), 0xfffffe08) mbind(&(0x7f0000006000/0x2000)=nil, 0x2000, 0x4002, &(0x7f0000000080)=0x4, 0x4, 0x4) [ 88.350524] hfs: can't find a HFS filesystem on dev loop4 2018/04/21 01:44:26 executing program 7: r0 = socket$inet6(0xa, 0x1, 0x8010000400000084) bind$inet6(r0, &(0x7f00001c1000)={0xa, 0x4e20}, 0x1c) setsockopt$inet_sctp6_SCTP_MAXSEG(r0, 0x84, 0xd, &(0x7f0000dacff8)=@assoc_value={0x0, 0x200}, 0x8) sendto$inet6(r0, &(0x7f00009f1000)='G', 0x1, 0x0, &(0x7f0000108fe4)={0xa, 0x4e20, 0x0, @loopback={0x0, 0x1}}, 0x1c) writev(r0, &(0x7f00007f2000)=[{&(0x7f0000001f40)="b6", 0x1}], 0x1) setsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(r0, 0x84, 0x72, &(0x7f00000001c0)={0x0, 0x0, 0x20}, 0xc) writev(r0, &(0x7f0000000140)=[{&(0x7f00000006c0)="23884051f454d47608e4b1090f80d95221b6e30fcf924f381763c3291d452c9b7e024e9d7fde15423fb3af6700990fc5a9fed35ec9f0e60001000020298b435477abc3051d2a0cf1635a19e6333dddbf0ab7c74c430052eb5d6462237cb7f46bef2de05d50ce84e3db9633fdcba5790fa2f6cac36aa0d4193cd4378d549630f8824d66cd5a9188ae787bae990eb1dd9a4f28a6a76b08de68af3568e1e617a9c00c95b77724c9d4ff2d6e0b7adeed4707c6207f5294f1f2f6dfa79d3f76085850ac27eb5c746393708e39c3e45b83a58355250d16b2468fc7ae93d93a5b0a3a829897d5bd21092bde88e239316216523c38ae6d2c480a5765dc0526b654db60fd50b16354926904b552a00e6ea5aafc4f5fbeebb920e130ed470990bdbfb6b765f6c80bcf1ebbd32f4dea95de8877b96e08f5ad2f977956f3b8c5a03fbd96df247f068b05d55905774f98b860c9d2b25872ad2af0f5425849ce2cd4a95a048c578048066862676b1159e5ed30acab882e5a3ffc848dcb359935fac9ae756bd9f79f2981063ce72a0419912acf3c79421a0b900b053404b22347eeeeb57b48d32f05eedbe38546cfb8600eac7e472db3610925310f7dab706a61fef9412f111c904e8bb18366bee4a6e91d7a60260ee02a961d4b40e57175bbc6b64fd682a88916bf0700000000000000713781b678a1000000000000000000000040009084b57aa9", 0x201}], 0x1) 2018/04/21 01:44:26 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, &(0x7f0000000480)=[@textreal={0x8, &(0x7f0000000400)="26660f38381e3219660f759b00000f302e0f01cbf081a70c000800660ffc9608000f09ba2100ed0f352c78"}], 0x1, 0x0, &(0x7f0000000100), 0x96) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SMI(r2, 0xaeb7) ioctl$KVM_REGISTER_COALESCED_MMIO(r1, 0x4010ae67, &(0x7f00000002c0)={0x0, 0x105000}) ioctl$KVM_SET_GUEST_DEBUG(r2, 0x4048ae9b, &(0x7f0000000000)={0x10003}) ioctl$KVM_RUN(r2, 0xae80, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) 2018/04/21 01:44:26 executing program 1: mkdir(&(0x7f00002b2000)='./file0\x00', 0x0) mount(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00', &(0x7f0000000040)='mqueue\x00', 0x0, &(0x7f0000000000)) r0 = open(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) lseek(r0, 0xfffffffffffffffe, 0x0) 2018/04/21 01:44:26 executing program 5: mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x1, 0x32, 0xffffffffffffffff, 0x0) r0 = userfaultfd(0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000002fe8)={0xaa}) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000000fe0)={{&(0x7f0000013000/0xe000)=nil, 0xe000}, 0x1}) pselect6(0x40, &(0x7f0000011fc0), &(0x7f0000011000), &(0x7f0000003000), &(0x7f0000013000), &(0x7f0000001ff8)={&(0x7f0000012000), 0x8}) socket$can_bcm(0x1d, 0x2, 0x2) ioctl$UFFDIO_ZEROPAGE(r0, 0x8010aa02, &(0x7f0000004ff0)={&(0x7f0000011000/0x3000)=nil, 0x3000}) close(r0) setsockopt$inet6_MRT6_DEL_MFC(0xffffffffffffffff, 0x29, 0xcd, &(0x7f00000002c0)={{0xa, 0x0, 0x0, @ipv4={[], [0xff, 0xff], @rand_addr}}, {0xa, 0x0, 0x0, @loopback={0x0, 0x1}}}, 0x5c) 2018/04/21 01:44:26 executing program 6: bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x0, 0x3, &(0x7f0000000040)=ANY=[@ANYBLOB="896300000000000000000000028000007a0a00fffffffffd630148"], &(0x7f0000000000)="47504c00bc3047eb525f484f89fc96dd6ca64da40ff023122e66f6", 0x0, 0xce, &(0x7f0000000300)=""/206}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x5, 0x5, &(0x7f0000000040)=@framed={{0x18}, [@jmp={0x5}], {0x95}}, &(0x7f0000000200)='syzkaller\x00', 0x84000001, 0xbb, &(0x7f00000004c0)=""/187}, 0x48) 2018/04/21 01:44:26 executing program 3: mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount(&(0x7f0000000500)='./file0\x00', &(0x7f00000004c0)='./file0\x00', &(0x7f000000c000)='ramfs\x00', 0x0, &(0x7f0000000440)) mount(&(0x7f0000d04000)='./file0\x00', &(0x7f0000000000)='./file0\x00', &(0x7f0000811ffa)='bdev\x00', 0x100000, &(0x7f0000000040)) mount(&(0x7f0000000080)='./file0\x00', &(0x7f0000d78000)='.', &(0x7f0000fdb000)='hpfs\x00', 0x1000, 0x0) mount(&(0x7f00002b9ff8)='./file0\x00', &(0x7f0000cbeff8)='./file0\x00', &(0x7f00005f7ffa)='ramfs\x00', 0x80000, &(0x7f000002f000)) mount(&(0x7f0000377ff8)='.', &(0x7f0000187ff8)='.', &(0x7f0000753000)='mslos\x00', 0x5010, &(0x7f00000e7000)) mount(&(0x7f0000adcff8)='./file0\x00', &(0x7f0000e08fff)='.', &(0x7f00005e9000)='cifs\x00', 0x2000, &(0x7f0000ad5000)) umount2(&(0x7f000075e000)='.', 0x0) 2018/04/21 01:44:26 executing program 0: r0 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer2\x00', 0x3, 0x0) ioctl$KDGETMODE(r0, 0x4004510d, &(0x7f0000007ff8)) 2018/04/21 01:44:26 executing program 4: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$packet(0x11, 0x200000003, 0x300) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000040)={'syz_tun\x00', 0x0}) r2 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f00000001c0)={&(0x7f00000000c0)={0x10}, 0xc, &(0x7f0000000180)={&(0x7f0000000240)=@ipv6_newaddr={0x2c, 0x14, 0x203, 0x0, 0x0, {0xa, 0x0, 0x0, 0x0, r1}, [@IFA_LOCAL={0x14, 0x2, @local={0xfe, 0x80, [], 0xaa}}]}, 0x2c}, 0x1}, 0x0) 2018/04/21 01:44:26 executing program 6: bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x0, 0x3, &(0x7f0000000040)=ANY=[@ANYBLOB="896300000000000000000000028000007a0a00fffffffffd630148"], &(0x7f0000000000)="47504c00bc3047eb525f484f89fc96dd6ca64da40ff023122e66f6", 0x0, 0xce, &(0x7f0000000300)=""/206}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x5, 0x5, &(0x7f0000000040)=@framed={{0x18}, [@jmp={0x5}], {0x95}}, &(0x7f0000000200)='syzkaller\x00', 0x84000001, 0xbb, &(0x7f00000004c0)=""/187}, 0x48) 2018/04/21 01:44:26 executing program 0: r0 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer2\x00', 0x3, 0x0) ioctl$KDGETMODE(r0, 0x4004510d, &(0x7f0000007ff8)) 2018/04/21 01:44:26 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000000040)={0xa, 0x3, &(0x7f00000000c0)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x8, 0x45}, [], {0x95}}, &(0x7f0000000000)='@pH \x00', 0x10000002, 0x35b, &(0x7f0000000000)=""/153}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x3, 0x5, &(0x7f0000000100)=@framed={{0x18, 0x2, 0x0, 0x0, 0xb3040000}, [@call={0x85, 0x0, 0x0, 0x1e}], {0x95}}, &(0x7f000000c8c0)='syzkaller\x00', 0xd1b, 0x4b4, &(0x7f00000001c0)=""/228}, 0x48) 2018/04/21 01:44:26 executing program 3: mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount(&(0x7f0000000500)='./file0\x00', &(0x7f00000004c0)='./file0\x00', &(0x7f000000c000)='ramfs\x00', 0x0, &(0x7f0000000440)) mount(&(0x7f0000d04000)='./file0\x00', &(0x7f0000000000)='./file0\x00', &(0x7f0000811ffa)='bdev\x00', 0x100000, &(0x7f0000000040)) mount(&(0x7f0000000080)='./file0\x00', &(0x7f0000d78000)='.', &(0x7f0000fdb000)='hpfs\x00', 0x1000, 0x0) mount(&(0x7f00002b9ff8)='./file0\x00', &(0x7f0000cbeff8)='./file0\x00', &(0x7f00005f7ffa)='ramfs\x00', 0x80000, &(0x7f000002f000)) mount(&(0x7f0000377ff8)='.', &(0x7f0000187ff8)='.', &(0x7f0000753000)='mslos\x00', 0x5010, &(0x7f00000e7000)) mount(&(0x7f0000adcff8)='./file0\x00', &(0x7f0000e08fff)='.', &(0x7f00005e9000)='cifs\x00', 0x2000, &(0x7f0000ad5000)) umount2(&(0x7f000075e000)='.', 0x0) [ 89.245746] handle_userfault: 4 callbacks suppressed [ 89.245753] FAULT_FLAG_ALLOW_RETRY missing 30 [ 89.255499] CPU: 1 PID: 8174 Comm: syz-executor5 Not tainted 4.17.0-rc1+ #10 [ 89.262692] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 89.272063] Call Trace: [ 89.274656] dump_stack+0x1b9/0x294 [ 89.278303] ? dump_stack_print_info.cold.2+0x52/0x52 [ 89.283506] ? kasan_check_write+0x14/0x20 [ 89.287744] ? do_raw_spin_lock+0xc1/0x200 [ 89.291967] handle_userfault.cold.32+0x44/0x5a [ 89.296629] ? finish_task_switch+0x1ca/0x810 [ 89.301114] ? handle_userfault+0x16c6/0x2760 [ 89.305601] ? userfaultfd_ioctl+0x4d10/0x4d10 [ 89.310171] ? debug_check_no_locks_freed+0x310/0x310 [ 89.315377] ? __schedule+0x809/0x1e30 [ 89.319255] ? print_usage_bug+0xc0/0xc0 [ 89.323315] ? print_usage_bug+0xc0/0xc0 [ 89.327363] ? __sched_text_start+0x8/0x8 [ 89.331495] ? plist_check_list+0x7e/0xa0 [ 89.335630] ? graph_lock+0x170/0x170 [ 89.339413] ? plist_check_list+0xa0/0xa0 [ 89.343633] ? __lock_acquire+0x7f5/0x5140 [ 89.347851] ? graph_lock+0x170/0x170 [ 89.351658] ? find_held_lock+0x36/0x1c0 [ 89.355715] ? lock_downgrade+0x8e0/0x8e0 [ 89.359849] ? kasan_check_read+0x11/0x20 [ 89.363983] ? do_raw_spin_unlock+0x9e/0x2e0 [ 89.368383] ? do_raw_spin_trylock+0x1b0/0x1b0 [ 89.372954] ? kasan_check_write+0x14/0x20 [ 89.377170] ? do_raw_spin_lock+0xc1/0x200 [ 89.381392] __handle_mm_fault+0x38d8/0x4310 [ 89.385789] ? vm_insert_mixed_mkwrite+0x40/0x40 [ 89.390538] ? graph_lock+0x170/0x170 [ 89.394333] ? futex_wake+0x750/0x750 [ 89.398123] ? find_held_lock+0x36/0x1c0 [ 89.402186] ? lock_downgrade+0x8e0/0x8e0 [ 89.406324] ? handle_mm_fault+0x8c0/0xc70 [ 89.410557] handle_mm_fault+0x53a/0xc70 [ 89.414614] ? __handle_mm_fault+0x4310/0x4310 [ 89.419187] ? find_vma+0x34/0x190 [ 89.422729] __do_page_fault+0x60b/0xe40 [ 89.426776] ? mm_fault_error+0x380/0x380 [ 89.430904] ? graph_lock+0x170/0x170 [ 89.434688] ? graph_lock+0x170/0x170 [ 89.438467] ? debug_mutex_init+0x1c/0x60 [ 89.442600] do_page_fault+0xee/0x8a7 [ 89.446384] ? exit_robust_list+0x290/0x290 [ 89.450696] ? vmalloc_sync_all+0x30/0x30 [ 89.454828] ? find_held_lock+0x36/0x1c0 [ 89.458877] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 89.463708] page_fault+0x1e/0x30 [ 89.467147] RIP: 0010:copy_user_generic_unrolled+0x86/0xc0 [ 89.472753] RSP: 0018:ffff8801bc57fb68 EFLAGS: 00010202 [ 89.478102] RAX: ffffed00378aff7d RBX: 0000000000000010 RCX: 0000000000000002 [ 89.485361] RDX: 0000000000000000 RSI: 0000000020013000 RDI: ffff8801bc57fbd8 [ 89.492614] RBP: ffff8801bc57fba0 R08: ffffed00378aff7d R09: ffffed00378aff7b [ 89.499865] R10: ffffed00378aff7c R11: ffff8801bc57fbe7 R12: 0000000020013010 [ 89.507117] R13: 0000000020013000 R14: ffff8801bc57fbd8 R15: 00007ffffffff000 [ 89.514386] ? _copy_from_user+0x10d/0x150 [ 89.518604] get_timespec64+0x75/0x180 [ 89.522471] ? timespec_trunc+0x170/0x170 [ 89.526602] ? get_unused_fd_flags+0x190/0x190 [ 89.531167] ? userfaultfd_read+0x290/0x290 [ 89.535470] do_pselect+0xd3/0x4d0 [ 89.538999] ? kern_select+0x250/0x250 [ 89.542881] ? fget_raw+0x20/0x20 [ 89.546323] ? __alloc_fd+0x700/0x700 [ 89.550108] ? __x64_sys_futex+0x477/0x680 [ 89.554325] ? do_futex+0x27d0/0x27d0 [ 89.558108] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 89.563624] __x64_sys_pselect6+0x1f7/0x280 [ 89.567947] do_syscall_64+0x1b1/0x800 [ 89.571814] ? finish_task_switch+0x1ca/0x810 [ 89.576289] ? syscall_return_slowpath+0x5c0/0x5c0 [ 89.581198] ? syscall_return_slowpath+0x30f/0x5c0 [ 89.586109] ? entry_SYSCALL_64_after_hwframe+0x59/0xbe [ 89.591464] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 89.596291] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 89.601460] RIP: 0033:0x455389 [ 89.604629] RSP: 002b:00007f8a6bb60c68 EFLAGS: 00000246 ORIG_RAX: 000000000000010e [ 89.612322] RAX: ffffffffffffffda RBX: 00007f8a6bb616d4 RCX: 0000000000455389 [ 89.619572] RDX: 0000000020011000 RSI: 0000000020011fc0 RDI: 0000000000000040 [ 89.626821] RBP: 000000000072bea0 R08: 0000000020013000 R09: 0000000020001ff8 [ 89.634069] R10: 0000000020003000 R11: 0000000000000246 R12: 00000000ffffffff 2018/04/21 01:44:27 executing program 4: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$packet(0x11, 0x200000003, 0x300) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000040)={'syz_tun\x00', 0x0}) r2 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f00000001c0)={&(0x7f00000000c0)={0x10}, 0xc, &(0x7f0000000180)={&(0x7f0000000240)=@ipv6_newaddr={0x2c, 0x14, 0x203, 0x0, 0x0, {0xa, 0x0, 0x0, 0x0, r1}, [@IFA_LOCAL={0x14, 0x2, @local={0xfe, 0x80, [], 0xaa}}]}, 0x2c}, 0x1}, 0x0) 2018/04/21 01:44:27 executing program 6: bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x0, 0x3, &(0x7f0000000040)=ANY=[@ANYBLOB="896300000000000000000000028000007a0a00fffffffffd630148"], &(0x7f0000000000)="47504c00bc3047eb525f484f89fc96dd6ca64da40ff023122e66f6", 0x0, 0xce, &(0x7f0000000300)=""/206}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x5, 0x5, &(0x7f0000000040)=@framed={{0x18}, [@jmp={0x5}], {0x95}}, &(0x7f0000000200)='syzkaller\x00', 0x84000001, 0xbb, &(0x7f00000004c0)=""/187}, 0x48) 2018/04/21 01:44:27 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000000040)={0xa, 0x3, &(0x7f00000000c0)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x8, 0x45}, [], {0x95}}, &(0x7f0000000000)='@pH \x00', 0x10000002, 0x35b, &(0x7f0000000000)=""/153}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x3, 0x5, &(0x7f0000000100)=@framed={{0x18, 0x2, 0x0, 0x0, 0xb3040000}, [@call={0x85, 0x0, 0x0, 0x1e}], {0x95}}, &(0x7f000000c8c0)='syzkaller\x00', 0xd1b, 0x4b4, &(0x7f00000001c0)=""/228}, 0x48) 2018/04/21 01:44:27 executing program 2: mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount(&(0x7f0000000500)='./file0\x00', &(0x7f00000004c0)='./file0\x00', &(0x7f000000c000)='ramfs\x00', 0x0, &(0x7f0000000440)) mount(&(0x7f0000d04000)='./file0\x00', &(0x7f0000000000)='./file0\x00', &(0x7f0000811ffa)='bdev\x00', 0x100000, &(0x7f0000000040)) mount(&(0x7f0000000080)='./file0\x00', &(0x7f0000d78000)='.', &(0x7f0000fdb000)='hpfs\x00', 0x1000, 0x0) mount(&(0x7f00002b9ff8)='./file0\x00', &(0x7f0000cbeff8)='./file0\x00', &(0x7f00005f7ffa)='ramfs\x00', 0x80000, &(0x7f000002f000)) mount(&(0x7f0000377ff8)='.', &(0x7f0000187ff8)='.', &(0x7f0000753000)='mslos\x00', 0x5010, &(0x7f00000e7000)) mount(&(0x7f0000adcff8)='./file0\x00', &(0x7f0000e08fff)='.', &(0x7f00005e9000)='cifs\x00', 0x2000, &(0x7f0000ad5000)) umount2(&(0x7f000075e000)='.', 0x0) 2018/04/21 01:44:27 executing program 0: r0 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer2\x00', 0x3, 0x0) ioctl$KDGETMODE(r0, 0x4004510d, &(0x7f0000007ff8)) 2018/04/21 01:44:27 executing program 5: mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x1, 0x32, 0xffffffffffffffff, 0x0) r0 = userfaultfd(0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000002fe8)={0xaa}) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000000fe0)={{&(0x7f0000013000/0xe000)=nil, 0xe000}, 0x1}) pselect6(0x40, &(0x7f0000011fc0), &(0x7f0000011000), &(0x7f0000003000), &(0x7f0000013000), &(0x7f0000001ff8)={&(0x7f0000012000), 0x8}) socket$can_bcm(0x1d, 0x2, 0x2) ioctl$UFFDIO_ZEROPAGE(r0, 0x8010aa02, &(0x7f0000004ff0)={&(0x7f0000011000/0x3000)=nil, 0x3000}) close(r0) setsockopt$inet6_MRT6_DEL_MFC(0xffffffffffffffff, 0x29, 0xcd, &(0x7f00000002c0)={{0xa, 0x0, 0x0, @ipv4={[], [0xff, 0xff], @rand_addr}}, {0xa, 0x0, 0x0, @loopback={0x0, 0x1}}}, 0x5c) 2018/04/21 01:44:27 executing program 7: r0 = socket$inet6(0xa, 0x1, 0x8010000400000084) bind$inet6(r0, &(0x7f00001c1000)={0xa, 0x4e20}, 0x1c) setsockopt$inet_sctp6_SCTP_MAXSEG(r0, 0x84, 0xd, &(0x7f0000dacff8)=@assoc_value={0x0, 0x200}, 0x8) sendto$inet6(r0, &(0x7f00009f1000)='G', 0x1, 0x0, &(0x7f0000108fe4)={0xa, 0x4e20, 0x0, @loopback={0x0, 0x1}}, 0x1c) writev(r0, &(0x7f00007f2000)=[{&(0x7f0000001f40)="b6", 0x1}], 0x1) setsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(r0, 0x84, 0x72, &(0x7f00000001c0)={0x0, 0x0, 0x20}, 0xc) writev(r0, &(0x7f0000000140)=[{&(0x7f00000006c0)="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", 0x201}], 0x1) 2018/04/21 01:44:27 executing program 3: mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount(&(0x7f0000000500)='./file0\x00', &(0x7f00000004c0)='./file0\x00', &(0x7f000000c000)='ramfs\x00', 0x0, &(0x7f0000000440)) mount(&(0x7f0000d04000)='./file0\x00', &(0x7f0000000000)='./file0\x00', &(0x7f0000811ffa)='bdev\x00', 0x100000, &(0x7f0000000040)) mount(&(0x7f0000000080)='./file0\x00', &(0x7f0000d78000)='.', &(0x7f0000fdb000)='hpfs\x00', 0x1000, 0x0) mount(&(0x7f00002b9ff8)='./file0\x00', &(0x7f0000cbeff8)='./file0\x00', &(0x7f00005f7ffa)='ramfs\x00', 0x80000, &(0x7f000002f000)) mount(&(0x7f0000377ff8)='.', &(0x7f0000187ff8)='.', &(0x7f0000753000)='mslos\x00', 0x5010, &(0x7f00000e7000)) mount(&(0x7f0000adcff8)='./file0\x00', &(0x7f0000e08fff)='.', &(0x7f00005e9000)='cifs\x00', 0x2000, &(0x7f0000ad5000)) umount2(&(0x7f000075e000)='.', 0x0) [ 89.641323] R13: 000000000000047c R14: 00000000006f9c40 R15: 0000000000000000 2018/04/21 01:44:27 executing program 0: r0 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer2\x00', 0x3, 0x0) ioctl$KDGETMODE(r0, 0x4004510d, &(0x7f0000007ff8)) 2018/04/21 01:44:27 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000000040)={0xa, 0x3, &(0x7f00000000c0)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x8, 0x45}, [], {0x95}}, &(0x7f0000000000)='@pH \x00', 0x10000002, 0x35b, &(0x7f0000000000)=""/153}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x3, 0x5, &(0x7f0000000100)=@framed={{0x18, 0x2, 0x0, 0x0, 0xb3040000}, [@call={0x85, 0x0, 0x0, 0x1e}], {0x95}}, &(0x7f000000c8c0)='syzkaller\x00', 0xd1b, 0x4b4, &(0x7f00000001c0)=""/228}, 0x48) 2018/04/21 01:44:27 executing program 6: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000389000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000040)={0xffffffffffffffff, &(0x7f00000000c0)="b82283392dc50ff1fb635a5849d2f5916ae2fdc24e95e12aa8daccf7393e72be9cc66f"}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f0000346fd4)={0x0, 0x0, 0x0, 0x4, 0x209}, 0x2c) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x1, 0x5, &(0x7f0000346fc8)=@framed={{0x18}, [@alu={0x8000000201a7f19, 0x0, 0x7, 0x0, 0x1}], {0x95}}, &(0x7f0000f6bffb)='GPL\x00', 0x0, 0xffffffffffffffcc, &(0x7f0000001300)=""/251}, 0x14) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000140)={r0, 0x50, &(0x7f00000000c0)}, 0x10) socketpair$inet(0x8, 0x1, 0x0, &(0x7f0000000080)) 2018/04/21 01:44:27 executing program 2: mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount(&(0x7f0000000500)='./file0\x00', &(0x7f00000004c0)='./file0\x00', &(0x7f000000c000)='ramfs\x00', 0x0, &(0x7f0000000440)) mount(&(0x7f0000d04000)='./file0\x00', &(0x7f0000000000)='./file0\x00', &(0x7f0000811ffa)='bdev\x00', 0x100000, &(0x7f0000000040)) mount(&(0x7f0000000080)='./file0\x00', &(0x7f0000d78000)='.', &(0x7f0000fdb000)='hpfs\x00', 0x1000, 0x0) mount(&(0x7f00002b9ff8)='./file0\x00', &(0x7f0000cbeff8)='./file0\x00', &(0x7f00005f7ffa)='ramfs\x00', 0x80000, &(0x7f000002f000)) mount(&(0x7f0000377ff8)='.', &(0x7f0000187ff8)='.', &(0x7f0000753000)='mslos\x00', 0x5010, &(0x7f00000e7000)) mount(&(0x7f0000adcff8)='./file0\x00', &(0x7f0000e08fff)='.', &(0x7f00005e9000)='cifs\x00', 0x2000, &(0x7f0000ad5000)) umount2(&(0x7f000075e000)='.', 0x0) 2018/04/21 01:44:27 executing program 4: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$packet(0x11, 0x200000003, 0x300) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000040)={'syz_tun\x00', 0x0}) r2 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f00000001c0)={&(0x7f00000000c0)={0x10}, 0xc, &(0x7f0000000180)={&(0x7f0000000240)=@ipv6_newaddr={0x2c, 0x14, 0x203, 0x0, 0x0, {0xa, 0x0, 0x0, 0x0, r1}, [@IFA_LOCAL={0x14, 0x2, @local={0xfe, 0x80, [], 0xaa}}]}, 0x2c}, 0x1}, 0x0) 2018/04/21 01:44:27 executing program 3: mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount(&(0x7f0000000500)='./file0\x00', &(0x7f00000004c0)='./file0\x00', &(0x7f000000c000)='ramfs\x00', 0x0, &(0x7f0000000440)) mount(&(0x7f0000d04000)='./file0\x00', &(0x7f0000000000)='./file0\x00', &(0x7f0000811ffa)='bdev\x00', 0x100000, &(0x7f0000000040)) mount(&(0x7f0000000080)='./file0\x00', &(0x7f0000d78000)='.', &(0x7f0000fdb000)='hpfs\x00', 0x1000, 0x0) mount(&(0x7f00002b9ff8)='./file0\x00', &(0x7f0000cbeff8)='./file0\x00', &(0x7f00005f7ffa)='ramfs\x00', 0x80000, &(0x7f000002f000)) mount(&(0x7f0000377ff8)='.', &(0x7f0000187ff8)='.', &(0x7f0000753000)='mslos\x00', 0x5010, &(0x7f00000e7000)) mount(&(0x7f0000adcff8)='./file0\x00', &(0x7f0000e08fff)='.', &(0x7f00005e9000)='cifs\x00', 0x2000, &(0x7f0000ad5000)) umount2(&(0x7f000075e000)='.', 0x0) 2018/04/21 01:44:27 executing program 0: r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) ioctl$sock_SIOCGIFINDEX(r0, 0x800448d2, &(0x7f0000000000)={"06000000e60c9b2f85651ad4ffb13500"}) 2018/04/21 01:44:27 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000000040)={0xa, 0x3, &(0x7f00000000c0)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x8, 0x45}, [], {0x95}}, &(0x7f0000000000)='@pH \x00', 0x10000002, 0x35b, &(0x7f0000000000)=""/153}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x3, 0x5, &(0x7f0000000100)=@framed={{0x18, 0x2, 0x0, 0x0, 0xb3040000}, [@call={0x85, 0x0, 0x0, 0x1e}], {0x95}}, &(0x7f000000c8c0)='syzkaller\x00', 0xd1b, 0x4b4, &(0x7f00000001c0)=""/228}, 0x48) 2018/04/21 01:44:27 executing program 7: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000000800)={0x2, 0x4e20, @multicast1=0xe0000001}, 0x10) connect$inet(r0, &(0x7f0000000440)={0x2, 0x4e20}, 0x10) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000eb0fb8)={0x1, 0x3, &(0x7f00009ff000)=@framed={{0x18}, [], {0x95}}, &(0x7f00002bf000)='syzkaller\x00', 0x4, 0xb7, &(0x7f00006ab000)=""/183}, 0x48) r2 = socket$kcm(0x29, 0x1000000000000005, 0x0) sendmmsg(r2, &(0x7f0000002b00)=[{{&(0x7f0000002a00)=@un=@abs, 0x80, &(0x7f0000001880)=[{&(0x7f0000002a80)="8e", 0x1}], 0x1, 0x0, 0x0, 0x80}}], 0x1, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r2, 0x89e0, &(0x7f000031aff8)={r0, r1}) close(r2) 2018/04/21 01:44:27 executing program 6: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000389000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000040)={0xffffffffffffffff, &(0x7f00000000c0)="b82283392dc50ff1fb635a5849d2f5916ae2fdc24e95e12aa8daccf7393e72be9cc66f"}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f0000346fd4)={0x0, 0x0, 0x0, 0x4, 0x209}, 0x2c) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x1, 0x5, &(0x7f0000346fc8)=@framed={{0x18}, [@alu={0x8000000201a7f19, 0x0, 0x7, 0x0, 0x1}], {0x95}}, &(0x7f0000f6bffb)='GPL\x00', 0x0, 0xffffffffffffffcc, &(0x7f0000001300)=""/251}, 0x14) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000140)={r0, 0x50, &(0x7f00000000c0)}, 0x10) socketpair$inet(0x8, 0x1, 0x0, &(0x7f0000000080)) 2018/04/21 01:44:27 executing program 0: r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) ioctl$sock_SIOCGIFINDEX(r0, 0x800448d2, &(0x7f0000000000)={"06000000e60c9b2f85651ad4ffb13500"}) 2018/04/21 01:44:27 executing program 4: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$packet(0x11, 0x200000003, 0x300) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000040)={'syz_tun\x00', 0x0}) r2 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f00000001c0)={&(0x7f00000000c0)={0x10}, 0xc, &(0x7f0000000180)={&(0x7f0000000240)=@ipv6_newaddr={0x2c, 0x14, 0x203, 0x0, 0x0, {0xa, 0x0, 0x0, 0x0, r1}, [@IFA_LOCAL={0x14, 0x2, @local={0xfe, 0x80, [], 0xaa}}]}, 0x2c}, 0x1}, 0x0) 2018/04/21 01:44:27 executing program 1: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x3, 0x0, @loopback={0x0, 0x1}}], 0x1c) connect$inet6(r0, &(0x7f00008c0000)={0xa, 0x3, 0x0, @loopback={0x0, 0x1}}, 0x1c) getsockopt$inet_sctp6_SCTP_PR_SUPPORTED(r0, 0x84, 0x7d, &(0x7f0000000140), &(0x7f0000000180)=0x8) [ 90.249485] syz-executor1 (8272) used greatest stack depth: 12376 bytes left [ 90.529796] FAULT_FLAG_ALLOW_RETRY missing 30 [ 90.534404] CPU: 1 PID: 8227 Comm: syz-executor5 Not tainted 4.17.0-rc1+ #10 [ 90.541578] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 90.550916] Call Trace: [ 90.553494] dump_stack+0x1b9/0x294 [ 90.557108] ? dump_stack_print_info.cold.2+0x52/0x52 [ 90.562292] ? kasan_check_write+0x14/0x20 [ 90.566513] ? do_raw_spin_lock+0xc1/0x200 [ 90.570744] handle_userfault.cold.32+0x44/0x5a [ 90.575413] ? finish_task_switch+0x1ca/0x810 [ 90.579904] ? handle_userfault+0x16c6/0x2760 [ 90.584399] ? userfaultfd_ioctl+0x4d10/0x4d10 [ 90.588967] ? debug_check_no_locks_freed+0x310/0x310 [ 90.594153] ? __schedule+0x809/0x1e30 [ 90.598030] ? print_usage_bug+0xc0/0xc0 [ 90.602083] ? print_usage_bug+0xc0/0xc0 [ 90.606128] ? __sched_text_start+0x8/0x8 [ 90.610258] ? plist_check_list+0x7e/0xa0 [ 90.614393] ? graph_lock+0x170/0x170 [ 90.618179] ? plist_check_list+0xa0/0xa0 [ 90.622323] ? __lock_acquire+0x7f5/0x5140 [ 90.626548] ? graph_lock+0x170/0x170 [ 90.630339] ? find_held_lock+0x36/0x1c0 [ 90.634415] ? lock_downgrade+0x8e0/0x8e0 [ 90.638558] ? kasan_check_read+0x11/0x20 [ 90.642689] ? do_raw_spin_unlock+0x9e/0x2e0 [ 90.647086] ? do_raw_spin_trylock+0x1b0/0x1b0 [ 90.651655] ? kasan_check_write+0x14/0x20 [ 90.655876] ? do_raw_spin_lock+0xc1/0x200 [ 90.660109] __handle_mm_fault+0x38d8/0x4310 [ 90.664507] ? vm_insert_mixed_mkwrite+0x40/0x40 [ 90.669246] ? graph_lock+0x170/0x170 [ 90.673043] ? futex_wake+0x750/0x750 [ 90.676835] ? find_held_lock+0x36/0x1c0 [ 90.680886] ? lock_downgrade+0x8e0/0x8e0 [ 90.685043] ? handle_mm_fault+0x8c0/0xc70 [ 90.689263] handle_mm_fault+0x53a/0xc70 [ 90.693317] ? __handle_mm_fault+0x4310/0x4310 [ 90.697891] ? find_vma+0x34/0x190 [ 90.701420] __do_page_fault+0x60b/0xe40 [ 90.705469] ? mm_fault_error+0x380/0x380 [ 90.709598] ? graph_lock+0x170/0x170 [ 90.713387] ? graph_lock+0x170/0x170 [ 90.717171] ? debug_mutex_init+0x1c/0x60 [ 90.721305] do_page_fault+0xee/0x8a7 [ 90.725091] ? exit_robust_list+0x290/0x290 [ 90.729392] ? vmalloc_sync_all+0x30/0x30 [ 90.733526] ? find_held_lock+0x36/0x1c0 [ 90.737578] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 90.742412] page_fault+0x1e/0x30 [ 90.745849] RIP: 0010:copy_user_generic_unrolled+0x86/0xc0 [ 90.751449] RSP: 0018:ffff8801978efb68 EFLAGS: 00010202 [ 90.756792] RAX: ffffed0032f1df7d RBX: 0000000000000010 RCX: 0000000000000002 [ 90.764047] RDX: 0000000000000000 RSI: 0000000020013000 RDI: ffff8801978efbd8 [ 90.771308] RBP: ffff8801978efba0 R08: ffffed0032f1df7d R09: ffffed0032f1df7b [ 90.778559] R10: ffffed0032f1df7c R11: ffff8801978efbe7 R12: 0000000020013010 [ 90.785819] R13: 0000000020013000 R14: ffff8801978efbd8 R15: 00007ffffffff000 [ 90.793094] ? _copy_from_user+0x10d/0x150 [ 90.797313] get_timespec64+0x75/0x180 [ 90.801189] ? timespec_trunc+0x170/0x170 [ 90.805323] ? get_unused_fd_flags+0x190/0x190 [ 90.809902] ? userfaultfd_read+0x290/0x290 [ 90.814205] do_pselect+0xd3/0x4d0 [ 90.817728] ? kern_select+0x250/0x250 [ 90.821596] ? fget_raw+0x20/0x20 [ 90.825036] ? __alloc_fd+0x700/0x700 [ 90.828823] ? __x64_sys_futex+0x477/0x680 [ 90.833042] ? do_futex+0x27d0/0x27d0 [ 90.836827] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 90.842347] __x64_sys_pselect6+0x1f7/0x280 [ 90.846667] do_syscall_64+0x1b1/0x800 [ 90.850538] ? finish_task_switch+0x1ca/0x810 [ 90.855024] ? syscall_return_slowpath+0x5c0/0x5c0 [ 90.859946] ? syscall_return_slowpath+0x30f/0x5c0 [ 90.864945] ? entry_SYSCALL_64_after_hwframe+0x59/0xbe [ 90.870290] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 90.875118] entry_SYSCALL_64_after_hwframe+0x49/0xbe 2018/04/21 01:44:28 executing program 2: mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount(&(0x7f0000000500)='./file0\x00', &(0x7f00000004c0)='./file0\x00', &(0x7f000000c000)='ramfs\x00', 0x0, &(0x7f0000000440)) mount(&(0x7f0000d04000)='./file0\x00', &(0x7f0000000000)='./file0\x00', &(0x7f0000811ffa)='bdev\x00', 0x100000, &(0x7f0000000040)) mount(&(0x7f0000000080)='./file0\x00', &(0x7f0000d78000)='.', &(0x7f0000fdb000)='hpfs\x00', 0x1000, 0x0) mount(&(0x7f00002b9ff8)='./file0\x00', &(0x7f0000cbeff8)='./file0\x00', &(0x7f00005f7ffa)='ramfs\x00', 0x80000, &(0x7f000002f000)) mount(&(0x7f0000377ff8)='.', &(0x7f0000187ff8)='.', &(0x7f0000753000)='mslos\x00', 0x5010, &(0x7f00000e7000)) mount(&(0x7f0000adcff8)='./file0\x00', &(0x7f0000e08fff)='.', &(0x7f00005e9000)='cifs\x00', 0x2000, &(0x7f0000ad5000)) umount2(&(0x7f000075e000)='.', 0x0) 2018/04/21 01:44:28 executing program 0: r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) ioctl$sock_SIOCGIFINDEX(r0, 0x800448d2, &(0x7f0000000000)={"06000000e60c9b2f85651ad4ffb13500"}) 2018/04/21 01:44:28 executing program 7: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000000800)={0x2, 0x4e20, @multicast1=0xe0000001}, 0x10) connect$inet(r0, &(0x7f0000000440)={0x2, 0x4e20}, 0x10) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000eb0fb8)={0x1, 0x3, &(0x7f00009ff000)=@framed={{0x18}, [], {0x95}}, &(0x7f00002bf000)='syzkaller\x00', 0x4, 0xb7, &(0x7f00006ab000)=""/183}, 0x48) r2 = socket$kcm(0x29, 0x1000000000000005, 0x0) sendmmsg(r2, &(0x7f0000002b00)=[{{&(0x7f0000002a00)=@un=@abs, 0x80, &(0x7f0000001880)=[{&(0x7f0000002a80)="8e", 0x1}], 0x1, 0x0, 0x0, 0x80}}], 0x1, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r2, 0x89e0, &(0x7f000031aff8)={r0, r1}) close(r2) 2018/04/21 01:44:28 executing program 6: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000389000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000040)={0xffffffffffffffff, &(0x7f00000000c0)="b82283392dc50ff1fb635a5849d2f5916ae2fdc24e95e12aa8daccf7393e72be9cc66f"}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f0000346fd4)={0x0, 0x0, 0x0, 0x4, 0x209}, 0x2c) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x1, 0x5, &(0x7f0000346fc8)=@framed={{0x18}, [@alu={0x8000000201a7f19, 0x0, 0x7, 0x0, 0x1}], {0x95}}, &(0x7f0000f6bffb)='GPL\x00', 0x0, 0xffffffffffffffcc, &(0x7f0000001300)=""/251}, 0x14) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000140)={r0, 0x50, &(0x7f00000000c0)}, 0x10) socketpair$inet(0x8, 0x1, 0x0, &(0x7f0000000080)) 2018/04/21 01:44:28 executing program 1: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x3, 0x0, @loopback={0x0, 0x1}}], 0x1c) connect$inet6(r0, &(0x7f00008c0000)={0xa, 0x3, 0x0, @loopback={0x0, 0x1}}, 0x1c) getsockopt$inet_sctp6_SCTP_PR_SUPPORTED(r0, 0x84, 0x7d, &(0x7f0000000140), &(0x7f0000000180)=0x8) 2018/04/21 01:44:28 executing program 5: mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x1, 0x32, 0xffffffffffffffff, 0x0) r0 = userfaultfd(0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000002fe8)={0xaa}) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000000fe0)={{&(0x7f0000013000/0xe000)=nil, 0xe000}, 0x1}) pselect6(0x40, &(0x7f0000011fc0), &(0x7f0000011000), &(0x7f0000003000), &(0x7f0000013000), &(0x7f0000001ff8)={&(0x7f0000012000), 0x8}) socket$can_bcm(0x1d, 0x2, 0x2) ioctl$UFFDIO_ZEROPAGE(r0, 0x8010aa02, &(0x7f0000004ff0)={&(0x7f0000011000/0x3000)=nil, 0x3000}) close(r0) setsockopt$inet6_MRT6_DEL_MFC(0xffffffffffffffff, 0x29, 0xcd, &(0x7f00000002c0)={{0xa, 0x0, 0x0, @ipv4={[], [0xff, 0xff], @rand_addr}}, {0xa, 0x0, 0x0, @loopback={0x0, 0x1}}}, 0x5c) 2018/04/21 01:44:28 executing program 4: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x3, 0x0, @loopback={0x0, 0x1}}], 0x1c) connect$inet6(r0, &(0x7f00008c0000)={0xa, 0x3, 0x0, @loopback={0x0, 0x1}}, 0x1c) getsockopt$inet_sctp6_SCTP_PR_SUPPORTED(r0, 0x84, 0x7d, &(0x7f0000000140), &(0x7f0000000180)=0x8) 2018/04/21 01:44:28 executing program 3: setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_REM(0xffffffffffffffff, 0x84, 0x65, &(0x7f0000000040)=[@in6={0xa, 0x0, 0x0, @mcast2={0xff, 0x2, [], 0x1}}], 0x1c) r0 = socket$inet_tcp(0x2, 0x1, 0x0) pselect6(0x40, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, &(0x7f0000000080), &(0x7f00000000c0), &(0x7f0000000140), &(0x7f00000001c0)={&(0x7f0000000180), 0x8}) setsockopt$inet_buf(r0, 0x0, 0x40, &(0x7f0000000000), 0x0) [ 90.880295] RIP: 0033:0x455389 [ 90.883481] RSP: 002b:00007f8a6bb60c68 EFLAGS: 00000246 ORIG_RAX: 000000000000010e [ 90.891170] RAX: ffffffffffffffda RBX: 00007f8a6bb616d4 RCX: 0000000000455389 [ 90.898420] RDX: 0000000020011000 RSI: 0000000020011fc0 RDI: 0000000000000040 [ 90.905670] RBP: 000000000072bea0 R08: 0000000020013000 R09: 0000000020001ff8 [ 90.912921] R10: 0000000020003000 R11: 0000000000000246 R12: 00000000ffffffff [ 90.920184] R13: 000000000000047c R14: 00000000006f9c40 R15: 0000000000000000 2018/04/21 01:44:28 executing program 0: r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) ioctl$sock_SIOCGIFINDEX(r0, 0x800448d2, &(0x7f0000000000)={"06000000e60c9b2f85651ad4ffb13500"}) 2018/04/21 01:44:28 executing program 3: setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_REM(0xffffffffffffffff, 0x84, 0x65, &(0x7f0000000040)=[@in6={0xa, 0x0, 0x0, @mcast2={0xff, 0x2, [], 0x1}}], 0x1c) r0 = socket$inet_tcp(0x2, 0x1, 0x0) pselect6(0x40, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, &(0x7f0000000080), &(0x7f00000000c0), &(0x7f0000000140), &(0x7f00000001c0)={&(0x7f0000000180), 0x8}) setsockopt$inet_buf(r0, 0x0, 0x40, &(0x7f0000000000), 0x0) 2018/04/21 01:44:28 executing program 1: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x3, 0x0, @loopback={0x0, 0x1}}], 0x1c) connect$inet6(r0, &(0x7f00008c0000)={0xa, 0x3, 0x0, @loopback={0x0, 0x1}}, 0x1c) getsockopt$inet_sctp6_SCTP_PR_SUPPORTED(r0, 0x84, 0x7d, &(0x7f0000000140), &(0x7f0000000180)=0x8) 2018/04/21 01:44:28 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000000800)={0x2, 0x4e20, @multicast1=0xe0000001}, 0x10) connect$inet(r0, &(0x7f0000000440)={0x2, 0x4e20}, 0x10) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000eb0fb8)={0x1, 0x3, &(0x7f00009ff000)=@framed={{0x18}, [], {0x95}}, &(0x7f00002bf000)='syzkaller\x00', 0x4, 0xb7, &(0x7f00006ab000)=""/183}, 0x48) r2 = socket$kcm(0x29, 0x1000000000000005, 0x0) sendmmsg(r2, &(0x7f0000002b00)=[{{&(0x7f0000002a00)=@un=@abs, 0x80, &(0x7f0000001880)=[{&(0x7f0000002a80)="8e", 0x1}], 0x1, 0x0, 0x0, 0x80}}], 0x1, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r2, 0x89e0, &(0x7f000031aff8)={r0, r1}) close(r2) 2018/04/21 01:44:28 executing program 6: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000389000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000040)={0xffffffffffffffff, &(0x7f00000000c0)="b82283392dc50ff1fb635a5849d2f5916ae2fdc24e95e12aa8daccf7393e72be9cc66f"}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f0000346fd4)={0x0, 0x0, 0x0, 0x4, 0x209}, 0x2c) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x1, 0x5, &(0x7f0000346fc8)=@framed={{0x18}, [@alu={0x8000000201a7f19, 0x0, 0x7, 0x0, 0x1}], {0x95}}, &(0x7f0000f6bffb)='GPL\x00', 0x0, 0xffffffffffffffcc, &(0x7f0000001300)=""/251}, 0x14) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000140)={r0, 0x50, &(0x7f00000000c0)}, 0x10) socketpair$inet(0x8, 0x1, 0x0, &(0x7f0000000080)) [ 91.817141] FAULT_FLAG_ALLOW_RETRY missing 30 [ 91.821707] CPU: 0 PID: 8298 Comm: syz-executor5 Not tainted 4.17.0-rc1+ #10 [ 91.828877] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 91.838218] Call Trace: [ 91.840794] dump_stack+0x1b9/0x294 [ 91.844405] ? dump_stack_print_info.cold.2+0x52/0x52 [ 91.849582] ? kasan_check_write+0x14/0x20 [ 91.853806] ? do_raw_spin_lock+0xc1/0x200 [ 91.858080] handle_userfault.cold.32+0x44/0x5a [ 91.862732] ? finish_task_switch+0x1ca/0x810 [ 91.867218] ? handle_userfault+0x16c6/0x2760 [ 91.871702] ? userfaultfd_ioctl+0x4d10/0x4d10 [ 91.876266] ? debug_check_no_locks_freed+0x310/0x310 [ 91.881439] ? __schedule+0x809/0x1e30 [ 91.885315] ? print_usage_bug+0xc0/0xc0 [ 91.889356] ? print_usage_bug+0xc0/0xc0 [ 91.893398] ? __sched_text_start+0x8/0x8 [ 91.897558] ? plist_check_list+0x7e/0xa0 [ 91.901697] ? perf_trace_lock+0xd6/0x900 [ 91.905822] ? graph_lock+0x170/0x170 [ 91.909604] ? plist_check_list+0xa0/0xa0 [ 91.913750] ? wakeup_preempt_entity.isra.63+0x7b/0xb0 [ 91.919030] ? __lock_acquire+0x7f5/0x5140 [ 91.923249] ? graph_lock+0x170/0x170 [ 91.927046] ? find_held_lock+0x36/0x1c0 [ 91.931094] ? lock_downgrade+0x8e0/0x8e0 [ 91.935226] ? kasan_check_read+0x11/0x20 [ 91.939361] ? do_raw_spin_unlock+0x9e/0x2e0 [ 91.943752] ? do_raw_spin_trylock+0x1b0/0x1b0 [ 91.948320] ? kasan_check_write+0x14/0x20 [ 91.952537] ? do_raw_spin_lock+0xc1/0x200 [ 91.956768] __handle_mm_fault+0x38d8/0x4310 [ 91.961162] ? vm_insert_mixed_mkwrite+0x40/0x40 [ 91.965898] ? graph_lock+0x170/0x170 [ 91.969678] ? futex_wake+0x750/0x750 [ 91.973460] ? find_held_lock+0x36/0x1c0 [ 91.977507] ? lock_downgrade+0x8e0/0x8e0 [ 91.981651] ? handle_mm_fault+0x8c0/0xc70 [ 91.985879] handle_mm_fault+0x53a/0xc70 [ 91.989921] ? __handle_mm_fault+0x4310/0x4310 [ 91.994485] ? find_vma+0x34/0x190 [ 91.998015] __do_page_fault+0x60b/0xe40 [ 92.002079] ? mm_fault_error+0x380/0x380 [ 92.006306] ? graph_lock+0x170/0x170 [ 92.010094] ? graph_lock+0x170/0x170 [ 92.013874] ? debug_mutex_init+0x1c/0x60 [ 92.018028] do_page_fault+0xee/0x8a7 [ 92.021822] ? exit_robust_list+0x290/0x290 [ 92.026124] ? vmalloc_sync_all+0x30/0x30 [ 92.030262] ? find_held_lock+0x36/0x1c0 [ 92.034314] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 92.039142] page_fault+0x1e/0x30 [ 92.042578] RIP: 0010:copy_user_generic_unrolled+0x86/0xc0 [ 92.048180] RSP: 0018:ffff8801978efb68 EFLAGS: 00010202 [ 92.053532] RAX: ffffed0032f1df7d RBX: 0000000000000010 RCX: 0000000000000002 [ 92.060783] RDX: 0000000000000000 RSI: 0000000020013000 RDI: ffff8801978efbd8 [ 92.068059] RBP: ffff8801978efba0 R08: ffffed0032f1df7d R09: ffffed0032f1df7b [ 92.075312] R10: ffffed0032f1df7c R11: ffff8801978efbe7 R12: 0000000020013010 [ 92.082561] R13: 0000000020013000 R14: ffff8801978efbd8 R15: 00007ffffffff000 [ 92.089831] ? _copy_from_user+0x10d/0x150 [ 92.094050] get_timespec64+0x75/0x180 [ 92.097918] ? timespec_trunc+0x170/0x170 [ 92.102057] ? get_unused_fd_flags+0x190/0x190 [ 92.106640] ? userfaultfd_read+0x290/0x290 [ 92.110942] do_pselect+0xd3/0x4d0 [ 92.114463] ? kern_select+0x250/0x250 [ 92.118334] ? fget_raw+0x20/0x20 [ 92.121768] ? __alloc_fd+0x700/0x700 [ 92.125552] ? __x64_sys_futex+0x477/0x680 [ 92.129766] ? do_futex+0x27d0/0x27d0 [ 92.133562] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 92.139085] __x64_sys_pselect6+0x1f7/0x280 [ 92.143389] do_syscall_64+0x1b1/0x800 [ 92.147258] ? finish_task_switch+0x1ca/0x810 [ 92.151737] ? syscall_return_slowpath+0x5c0/0x5c0 [ 92.156647] ? syscall_return_slowpath+0x30f/0x5c0 [ 92.161561] ? entry_SYSCALL_64_after_hwframe+0x59/0xbe [ 92.166909] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 92.171734] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 92.176907] RIP: 0033:0x455389 [ 92.180078] RSP: 002b:00007f8a6bb60c68 EFLAGS: 00000246 ORIG_RAX: 000000000000010e [ 92.187769] RAX: ffffffffffffffda RBX: 00007f8a6bb616d4 RCX: 0000000000455389 [ 92.195027] RDX: 0000000020011000 RSI: 0000000020011fc0 RDI: 0000000000000040 [ 92.202283] RBP: 000000000072bea0 R08: 0000000020013000 R09: 0000000020001ff8 [ 92.209534] R10: 0000000020003000 R11: 0000000000000246 R12: 00000000ffffffff 2018/04/21 01:44:30 executing program 4: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x3, 0x0, @loopback={0x0, 0x1}}], 0x1c) connect$inet6(r0, &(0x7f00008c0000)={0xa, 0x3, 0x0, @loopback={0x0, 0x1}}, 0x1c) getsockopt$inet_sctp6_SCTP_PR_SUPPORTED(r0, 0x84, 0x7d, &(0x7f0000000140), &(0x7f0000000180)=0x8) 2018/04/21 01:44:30 executing program 7: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000000800)={0x2, 0x4e20, @multicast1=0xe0000001}, 0x10) connect$inet(r0, &(0x7f0000000440)={0x2, 0x4e20}, 0x10) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000eb0fb8)={0x1, 0x3, &(0x7f00009ff000)=@framed={{0x18}, [], {0x95}}, &(0x7f00002bf000)='syzkaller\x00', 0x4, 0xb7, &(0x7f00006ab000)=""/183}, 0x48) r2 = socket$kcm(0x29, 0x1000000000000005, 0x0) sendmmsg(r2, &(0x7f0000002b00)=[{{&(0x7f0000002a00)=@un=@abs, 0x80, &(0x7f0000001880)=[{&(0x7f0000002a80)="8e", 0x1}], 0x1, 0x0, 0x0, 0x80}}], 0x1, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r2, 0x89e0, &(0x7f000031aff8)={r0, r1}) close(r2) 2018/04/21 01:44:30 executing program 3: setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_REM(0xffffffffffffffff, 0x84, 0x65, &(0x7f0000000040)=[@in6={0xa, 0x0, 0x0, @mcast2={0xff, 0x2, [], 0x1}}], 0x1c) r0 = socket$inet_tcp(0x2, 0x1, 0x0) pselect6(0x40, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, &(0x7f0000000080), &(0x7f00000000c0), &(0x7f0000000140), &(0x7f00000001c0)={&(0x7f0000000180), 0x8}) setsockopt$inet_buf(r0, 0x0, 0x40, &(0x7f0000000000), 0x0) 2018/04/21 01:44:30 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000000800)={0x2, 0x4e20, @multicast1=0xe0000001}, 0x10) connect$inet(r0, &(0x7f0000000440)={0x2, 0x4e20}, 0x10) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000eb0fb8)={0x1, 0x3, &(0x7f00009ff000)=@framed={{0x18}, [], {0x95}}, &(0x7f00002bf000)='syzkaller\x00', 0x4, 0xb7, &(0x7f00006ab000)=""/183}, 0x48) r2 = socket$kcm(0x29, 0x1000000000000005, 0x0) sendmmsg(r2, &(0x7f0000002b00)=[{{&(0x7f0000002a00)=@un=@abs, 0x80, &(0x7f0000001880)=[{&(0x7f0000002a80)="8e", 0x1}], 0x1, 0x0, 0x0, 0x80}}], 0x1, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r2, 0x89e0, &(0x7f000031aff8)={r0, r1}) close(r2) 2018/04/21 01:44:30 executing program 1: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x3, 0x0, @loopback={0x0, 0x1}}], 0x1c) connect$inet6(r0, &(0x7f00008c0000)={0xa, 0x3, 0x0, @loopback={0x0, 0x1}}, 0x1c) getsockopt$inet_sctp6_SCTP_PR_SUPPORTED(r0, 0x84, 0x7d, &(0x7f0000000140), &(0x7f0000000180)=0x8) 2018/04/21 01:44:30 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000000800)={0x2, 0x4e20, @multicast1=0xe0000001}, 0x10) connect$inet(r0, &(0x7f0000000440)={0x2, 0x4e20}, 0x10) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000eb0fb8)={0x1, 0x3, &(0x7f00009ff000)=@framed={{0x18}, [], {0x95}}, &(0x7f00002bf000)='syzkaller\x00', 0x4, 0xb7, &(0x7f00006ab000)=""/183}, 0x48) r2 = socket$kcm(0x29, 0x1000000000000005, 0x0) sendmmsg(r2, &(0x7f0000002b00)=[{{&(0x7f0000002a00)=@un=@abs, 0x80, &(0x7f0000001880)=[{&(0x7f0000002a80)="8e", 0x1}], 0x1, 0x0, 0x0, 0x80}}], 0x1, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r2, 0x89e0, &(0x7f000031aff8)={r0, r1}) close(r2) 2018/04/21 01:44:30 executing program 5: mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x1, 0x32, 0xffffffffffffffff, 0x0) r0 = userfaultfd(0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000002fe8)={0xaa}) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000000fe0)={{&(0x7f0000013000/0xe000)=nil, 0xe000}, 0x1}) pselect6(0x40, &(0x7f0000011fc0), &(0x7f0000011000), &(0x7f0000003000), &(0x7f0000013000), &(0x7f0000001ff8)={&(0x7f0000012000), 0x8}) socket$can_bcm(0x1d, 0x2, 0x2) ioctl$UFFDIO_ZEROPAGE(r0, 0x8010aa02, &(0x7f0000004ff0)={&(0x7f0000011000/0x3000)=nil, 0x3000}) close(r0) setsockopt$inet6_MRT6_DEL_MFC(0xffffffffffffffff, 0x29, 0xcd, &(0x7f00000002c0)={{0xa, 0x0, 0x0, @ipv4={[], [0xff, 0xff], @rand_addr}}, {0xa, 0x0, 0x0, @loopback={0x0, 0x1}}}, 0x5c) 2018/04/21 01:44:30 executing program 6: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000000800)={0x2, 0x4e20, @multicast1=0xe0000001}, 0x10) connect$inet(r0, &(0x7f0000000440)={0x2, 0x4e20}, 0x10) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000eb0fb8)={0x1, 0x3, &(0x7f00009ff000)=@framed={{0x18}, [], {0x95}}, &(0x7f00002bf000)='syzkaller\x00', 0x4, 0xb7, &(0x7f00006ab000)=""/183}, 0x48) r2 = socket$kcm(0x29, 0x1000000000000005, 0x0) sendmmsg(r2, &(0x7f0000002b00)=[{{&(0x7f0000002a00)=@un=@abs, 0x80, &(0x7f0000001880)=[{&(0x7f0000002a80)="8e", 0x1}], 0x1, 0x0, 0x0, 0x80}}], 0x1, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r2, 0x89e0, &(0x7f000031aff8)={r0, r1}) close(r2) [ 92.216786] R13: 000000000000047c R14: 00000000006f9c40 R15: 0000000000000000 2018/04/21 01:44:30 executing program 3: setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_REM(0xffffffffffffffff, 0x84, 0x65, &(0x7f0000000040)=[@in6={0xa, 0x0, 0x0, @mcast2={0xff, 0x2, [], 0x1}}], 0x1c) r0 = socket$inet_tcp(0x2, 0x1, 0x0) pselect6(0x40, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, &(0x7f0000000080), &(0x7f00000000c0), &(0x7f0000000140), &(0x7f00000001c0)={&(0x7f0000000180), 0x8}) setsockopt$inet_buf(r0, 0x0, 0x40, &(0x7f0000000000), 0x0) 2018/04/21 01:44:30 executing program 6: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000000800)={0x2, 0x4e20, @multicast1=0xe0000001}, 0x10) connect$inet(r0, &(0x7f0000000440)={0x2, 0x4e20}, 0x10) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000eb0fb8)={0x1, 0x3, &(0x7f00009ff000)=@framed={{0x18}, [], {0x95}}, &(0x7f00002bf000)='syzkaller\x00', 0x4, 0xb7, &(0x7f00006ab000)=""/183}, 0x48) r2 = socket$kcm(0x29, 0x1000000000000005, 0x0) sendmmsg(r2, &(0x7f0000002b00)=[{{&(0x7f0000002a00)=@un=@abs, 0x80, &(0x7f0000001880)=[{&(0x7f0000002a80)="8e", 0x1}], 0x1, 0x0, 0x0, 0x80}}], 0x1, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r2, 0x89e0, &(0x7f000031aff8)={r0, r1}) close(r2) 2018/04/21 01:44:30 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000300)={&(0x7f0000000000)={0x10}, 0xc, &(0x7f00000002c0)={&(0x7f0000000040)={0x1c, 0x9, 0x6, 0x201, 0x0, 0x0, {}, [@typed={0x8, 0x1, @uid}]}, 0x1c}, 0x1}, 0x0) 2018/04/21 01:44:30 executing program 7: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000000800)={0x2, 0x4e20, @multicast1=0xe0000001}, 0x10) connect$inet(r0, &(0x7f0000000440)={0x2, 0x4e20}, 0x10) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000eb0fb8)={0x1, 0x3, &(0x7f00009ff000)=@framed={{0x18}, [], {0x95}}, &(0x7f00002bf000)='syzkaller\x00', 0x4, 0xb7, &(0x7f00006ab000)=""/183}, 0x48) r2 = socket$kcm(0x29, 0x1000000000000005, 0x0) sendmmsg(r2, &(0x7f0000002b00)=[{{&(0x7f0000002a00)=@un=@abs, 0x80, &(0x7f0000001880)=[{&(0x7f0000002a80)="8e", 0x1}], 0x1, 0x0, 0x0, 0x80}}], 0x1, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r2, 0x89e0, &(0x7f000031aff8)={r0, r1}) close(r2) 2018/04/21 01:44:30 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000000800)={0x2, 0x4e20, @multicast1=0xe0000001}, 0x10) connect$inet(r0, &(0x7f0000000440)={0x2, 0x4e20}, 0x10) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000eb0fb8)={0x1, 0x3, &(0x7f00009ff000)=@framed={{0x18}, [], {0x95}}, &(0x7f00002bf000)='syzkaller\x00', 0x4, 0xb7, &(0x7f00006ab000)=""/183}, 0x48) r2 = socket$kcm(0x29, 0x1000000000000005, 0x0) sendmmsg(r2, &(0x7f0000002b00)=[{{&(0x7f0000002a00)=@un=@abs, 0x80, &(0x7f0000001880)=[{&(0x7f0000002a80)="8e", 0x1}], 0x1, 0x0, 0x0, 0x80}}], 0x1, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r2, 0x89e0, &(0x7f000031aff8)={r0, r1}) close(r2) 2018/04/21 01:44:30 executing program 4: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x3, 0x0, @loopback={0x0, 0x1}}], 0x1c) connect$inet6(r0, &(0x7f00008c0000)={0xa, 0x3, 0x0, @loopback={0x0, 0x1}}, 0x1c) getsockopt$inet_sctp6_SCTP_PR_SUPPORTED(r0, 0x84, 0x7d, &(0x7f0000000140), &(0x7f0000000180)=0x8) 2018/04/21 01:44:30 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000000800)={0x2, 0x4e20, @multicast1=0xe0000001}, 0x10) connect$inet(r0, &(0x7f0000000440)={0x2, 0x4e20}, 0x10) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000eb0fb8)={0x1, 0x3, &(0x7f00009ff000)=@framed={{0x18}, [], {0x95}}, &(0x7f00002bf000)='syzkaller\x00', 0x4, 0xb7, &(0x7f00006ab000)=""/183}, 0x48) r2 = socket$kcm(0x29, 0x1000000000000005, 0x0) sendmmsg(r2, &(0x7f0000002b00)=[{{&(0x7f0000002a00)=@un=@abs, 0x80, &(0x7f0000001880)=[{&(0x7f0000002a80)="8e", 0x1}], 0x1, 0x0, 0x0, 0x80}}], 0x1, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r2, 0x89e0, &(0x7f000031aff8)={r0, r1}) close(r2) 2018/04/21 01:44:30 executing program 3: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000140)) setsockopt$netlink_NETLINK_RX_RING(0xffffffffffffffff, 0x10e, 0x6, &(0x7f0000017000)={0x0, 0x0, 0x0, 0x158}, 0x10) r0 = openat$autofs(0xffffffffffffff9c, &(0x7f0000ca3000)='/dev/autofs\x00', 0x0, 0x0) ioctl(r0, 0x800000000000937e, &(0x7f0000017000)="010000000000000018") [ 92.466482] netlink: 'syz-executor1': attribute type 1 has an invalid length. 2018/04/21 01:44:30 executing program 2: r0 = memfd_create(&(0x7f000003affa)='posix_acl_access{Y\x00', 0x0) lseek(r0, 0x7ffffffffffffffb, 0x0) read(r0, &(0x7f0000000080)=""/241, 0xf1) [ 93.109404] FAULT_FLAG_ALLOW_RETRY missing 30 [ 93.114054] CPU: 1 PID: 8339 Comm: syz-executor5 Not tainted 4.17.0-rc1+ #10 [ 93.121235] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 93.130571] Call Trace: [ 93.133157] dump_stack+0x1b9/0x294 [ 93.136769] ? dump_stack_print_info.cold.2+0x52/0x52 [ 93.141944] ? kasan_check_write+0x14/0x20 [ 93.146165] ? do_raw_spin_lock+0xc1/0x200 [ 93.150394] handle_userfault.cold.32+0x44/0x5a [ 93.155053] ? finish_task_switch+0x1ca/0x810 [ 93.159532] ? handle_userfault+0x16c6/0x2760 [ 93.164018] ? userfaultfd_ioctl+0x4d10/0x4d10 [ 93.168591] ? debug_check_no_locks_freed+0x310/0x310 [ 93.173768] ? __schedule+0x809/0x1e30 [ 93.177641] ? print_usage_bug+0xc0/0xc0 [ 93.181689] ? print_usage_bug+0xc0/0xc0 [ 93.185762] ? __sched_text_start+0x8/0x8 [ 93.189891] ? plist_check_list+0x7e/0xa0 [ 93.194046] ? graph_lock+0x170/0x170 [ 93.197835] ? plist_check_list+0xa0/0xa0 [ 93.201968] ? __lock_acquire+0x7f5/0x5140 [ 93.206184] ? graph_lock+0x170/0x170 [ 93.209972] ? find_held_lock+0x36/0x1c0 [ 93.214031] ? lock_downgrade+0x8e0/0x8e0 [ 93.218171] ? kasan_check_read+0x11/0x20 [ 93.222302] ? do_raw_spin_unlock+0x9e/0x2e0 [ 93.226695] ? do_raw_spin_trylock+0x1b0/0x1b0 [ 93.231264] ? kasan_check_write+0x14/0x20 [ 93.235478] ? do_raw_spin_lock+0xc1/0x200 [ 93.239700] __handle_mm_fault+0x38d8/0x4310 [ 93.244107] ? vm_insert_mixed_mkwrite+0x40/0x40 [ 93.248841] ? graph_lock+0x170/0x170 [ 93.252635] ? futex_wake+0x750/0x750 [ 93.256424] ? find_held_lock+0x36/0x1c0 [ 93.260480] ? lock_downgrade+0x8e0/0x8e0 [ 93.264633] ? handle_mm_fault+0x8c0/0xc70 [ 93.268865] handle_mm_fault+0x53a/0xc70 [ 93.272913] ? __handle_mm_fault+0x4310/0x4310 [ 93.277477] ? find_vma+0x34/0x190 [ 93.281002] __do_page_fault+0x60b/0xe40 [ 93.285056] ? mm_fault_error+0x380/0x380 [ 93.289186] ? graph_lock+0x170/0x170 [ 93.292966] ? graph_lock+0x170/0x170 [ 93.296744] ? debug_mutex_init+0x1c/0x60 [ 93.300877] do_page_fault+0xee/0x8a7 [ 93.304660] ? exit_robust_list+0x290/0x290 [ 93.308962] ? vmalloc_sync_all+0x30/0x30 [ 93.313101] ? find_held_lock+0x36/0x1c0 [ 93.317157] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 93.321992] page_fault+0x1e/0x30 [ 93.325446] RIP: 0010:copy_user_generic_unrolled+0x86/0xc0 [ 93.331050] RSP: 0018:ffff880197dc7b68 EFLAGS: 00010202 [ 93.336400] RAX: ffffed0032fb8f7d RBX: 0000000000000010 RCX: 0000000000000002 [ 93.343653] RDX: 0000000000000000 RSI: 0000000020013000 RDI: ffff880197dc7bd8 [ 93.350910] RBP: ffff880197dc7ba0 R08: ffffed0032fb8f7d R09: ffffed0032fb8f7b [ 93.358166] R10: ffffed0032fb8f7c R11: ffff880197dc7be7 R12: 0000000020013010 [ 93.365417] R13: 0000000020013000 R14: ffff880197dc7bd8 R15: 00007ffffffff000 [ 93.372697] ? _copy_from_user+0x10d/0x150 [ 93.376919] get_timespec64+0x75/0x180 [ 93.380800] ? timespec_trunc+0x170/0x170 [ 93.384930] ? get_unused_fd_flags+0x190/0x190 [ 93.389505] ? userfaultfd_read+0x290/0x290 [ 93.393813] do_pselect+0xd3/0x4d0 [ 93.397335] ? kern_select+0x250/0x250 [ 93.401212] ? fget_raw+0x20/0x20 [ 93.404650] ? __alloc_fd+0x700/0x700 [ 93.408440] ? __x64_sys_futex+0x477/0x680 [ 93.412664] ? do_futex+0x27d0/0x27d0 [ 93.416453] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 93.421980] __x64_sys_pselect6+0x1f7/0x280 [ 93.426289] do_syscall_64+0x1b1/0x800 [ 93.430158] ? finish_task_switch+0x1ca/0x810 [ 93.434633] ? syscall_return_slowpath+0x5c0/0x5c0 [ 93.439551] ? syscall_return_slowpath+0x30f/0x5c0 [ 93.444473] ? entry_SYSCALL_64_after_hwframe+0x59/0xbe [ 93.449823] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 93.454660] entry_SYSCALL_64_after_hwframe+0x49/0xbe 2018/04/21 01:44:31 executing program 6: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000000800)={0x2, 0x4e20, @multicast1=0xe0000001}, 0x10) connect$inet(r0, &(0x7f0000000440)={0x2, 0x4e20}, 0x10) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000eb0fb8)={0x1, 0x3, &(0x7f00009ff000)=@framed={{0x18}, [], {0x95}}, &(0x7f00002bf000)='syzkaller\x00', 0x4, 0xb7, &(0x7f00006ab000)=""/183}, 0x48) r2 = socket$kcm(0x29, 0x1000000000000005, 0x0) sendmmsg(r2, &(0x7f0000002b00)=[{{&(0x7f0000002a00)=@un=@abs, 0x80, &(0x7f0000001880)=[{&(0x7f0000002a80)="8e", 0x1}], 0x1, 0x0, 0x0, 0x80}}], 0x1, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r2, 0x89e0, &(0x7f000031aff8)={r0, r1}) close(r2) 2018/04/21 01:44:31 executing program 3: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000140)) setsockopt$netlink_NETLINK_RX_RING(0xffffffffffffffff, 0x10e, 0x6, &(0x7f0000017000)={0x0, 0x0, 0x0, 0x158}, 0x10) r0 = openat$autofs(0xffffffffffffff9c, &(0x7f0000ca3000)='/dev/autofs\x00', 0x0, 0x0) ioctl(r0, 0x800000000000937e, &(0x7f0000017000)="010000000000000018") 2018/04/21 01:44:31 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000300)={&(0x7f0000000000)={0x10}, 0xc, &(0x7f00000002c0)={&(0x7f0000000040)={0x1c, 0x9, 0x6, 0x201, 0x0, 0x0, {}, [@typed={0x8, 0x1, @uid}]}, 0x1c}, 0x1}, 0x0) 2018/04/21 01:44:31 executing program 7: perf_event_open(&(0x7f000000a000)={0x2, 0x70, 0xfffffffffffffff6, 0x20000000000004, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair(0x18, 0x0, 0x3, &(0x7f0000000000)) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000300), 0xc) 2018/04/21 01:44:31 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000000800)={0x2, 0x4e20, @multicast1=0xe0000001}, 0x10) connect$inet(r0, &(0x7f0000000440)={0x2, 0x4e20}, 0x10) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000eb0fb8)={0x1, 0x3, &(0x7f00009ff000)=@framed={{0x18}, [], {0x95}}, &(0x7f00002bf000)='syzkaller\x00', 0x4, 0xb7, &(0x7f00006ab000)=""/183}, 0x48) r2 = socket$kcm(0x29, 0x1000000000000005, 0x0) sendmmsg(r2, &(0x7f0000002b00)=[{{&(0x7f0000002a00)=@un=@abs, 0x80, &(0x7f0000001880)=[{&(0x7f0000002a80)="8e", 0x1}], 0x1, 0x0, 0x0, 0x80}}], 0x1, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r2, 0x89e0, &(0x7f000031aff8)={r0, r1}) close(r2) 2018/04/21 01:44:31 executing program 4: r0 = socket$inet6(0xa, 0x3, 0x2) preadv(0xffffffffffffffff, &(0x7f00000001c0)=[{&(0x7f0000000080)=""/242, 0xf2}, {&(0x7f0000000000)=""/16, 0x10}], 0x100000000000003b, 0x0) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @empty, 0x2}, 0x1c) sendmmsg(r0, &(0x7f0000000140), 0x1f8aeba99eb8f3e, 0x13ff000) 2018/04/21 01:44:31 executing program 2: r0 = memfd_create(&(0x7f000003affa)='posix_acl_access{Y\x00', 0x0) lseek(r0, 0x7ffffffffffffffb, 0x0) read(r0, &(0x7f0000000080)=""/241, 0xf1) 2018/04/21 01:44:31 executing program 5: r0 = memfd_create(&(0x7f000003affa)='posix_acl_access{Y\x00', 0x0) lseek(r0, 0x7ffffffffffffffb, 0x0) read(r0, &(0x7f0000000080)=""/241, 0xf1) [ 93.459828] RIP: 0033:0x455389 [ 93.462997] RSP: 002b:00007f8a6bb60c68 EFLAGS: 00000246 ORIG_RAX: 000000000000010e [ 93.470698] RAX: ffffffffffffffda RBX: 00007f8a6bb616d4 RCX: 0000000000455389 [ 93.477946] RDX: 0000000020011000 RSI: 0000000020011fc0 RDI: 0000000000000040 [ 93.485195] RBP: 000000000072bea0 R08: 0000000020013000 R09: 0000000020001ff8 [ 93.492445] R10: 0000000020003000 R11: 0000000000000246 R12: 00000000ffffffff [ 93.499696] R13: 000000000000047c R14: 00000000006f9c40 R15: 0000000000000000 2018/04/21 01:44:31 executing program 5: r0 = memfd_create(&(0x7f000003affa)='posix_acl_access{Y\x00', 0x0) lseek(r0, 0x7ffffffffffffffb, 0x0) read(r0, &(0x7f0000000080)=""/241, 0xf1) [ 93.564309] netlink: 'syz-executor1': attribute type 1 has an invalid length. 2018/04/21 01:44:31 executing program 3: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000140)) setsockopt$netlink_NETLINK_RX_RING(0xffffffffffffffff, 0x10e, 0x6, &(0x7f0000017000)={0x0, 0x0, 0x0, 0x158}, 0x10) r0 = openat$autofs(0xffffffffffffff9c, &(0x7f0000ca3000)='/dev/autofs\x00', 0x0, 0x0) ioctl(r0, 0x800000000000937e, &(0x7f0000017000)="010000000000000018") 2018/04/21 01:44:31 executing program 2: r0 = memfd_create(&(0x7f000003affa)='posix_acl_access{Y\x00', 0x0) lseek(r0, 0x7ffffffffffffffb, 0x0) read(r0, &(0x7f0000000080)=""/241, 0xf1) 2018/04/21 01:44:31 executing program 6: perf_event_open(&(0x7f000001d000)={0x5, 0x78, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_bp={&(0x7f0000000000), 0x1}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x3, 0x3a) setsockopt$inet6_int(r0, 0x29, 0xd1, &(0x7f0000000000), 0x4) 2018/04/21 01:44:31 executing program 0: r0 = socket$can_bcm(0x1d, 0x2, 0x2) connect(r0, &(0x7f0000002000)=@ethernet, 0x10) sendmsg$can_bcm(r0, &(0x7f0000000000)={&(0x7f0000004000)={0x1d}, 0x10, &(0x7f0000002ff0)={&(0x7f0000004fb8)={0x5, 0x0, 0x0, {}, {}, {}, 0x1, @can={{}, 0x0, 0x0, 0x0, 0x0, "b100"}}, 0x48}, 0x1}, 0x0) sendmsg$can_bcm(r0, &(0x7f00005e4000)={&(0x7f00002ccff0)={0x1d}, 0x10, &(0x7f0000728000)={&(0x7f00000aef80)={0x5, 0x900, 0x0, {}, {}, {}, 0x1, @canfd={{}, 0x0, 0x0, 0x0, 0x0, "260503dd3e3c0a6afe3f7b377378f2e013e66ff1bf538a0f1abc5b8beb605be3d9448c99787c873249ed9c34e040a29606427925d8dd9065c240a288783179ce"}}, 0x80}, 0x1}, 0x0) sendmsg$can_bcm(r0, &(0x7f0000000180)={&(0x7f0000000080)={0x1d}, 0x10, &(0x7f0000000140)={&(0x7f00000000c0)={0x6, 0x0, 0x0, {0x0, 0x7530}, {}, {}, 0x1, @can={{}, 0x0, 0x0, 0x0, 0x0, "d300692ddfae1e24"}}, 0x48}, 0x1}, 0x0) 2018/04/21 01:44:31 executing program 5: r0 = memfd_create(&(0x7f000003affa)='posix_acl_access{Y\x00', 0x0) lseek(r0, 0x7ffffffffffffffb, 0x0) read(r0, &(0x7f0000000080)=""/241, 0xf1) 2018/04/21 01:44:31 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000300)={&(0x7f0000000000)={0x10}, 0xc, &(0x7f00000002c0)={&(0x7f0000000040)={0x1c, 0x9, 0x6, 0x201, 0x0, 0x0, {}, [@typed={0x8, 0x1, @uid}]}, 0x1c}, 0x1}, 0x0) 2018/04/21 01:44:31 executing program 4: r0 = socket$inet6(0xa, 0x3, 0x2) preadv(0xffffffffffffffff, &(0x7f00000001c0)=[{&(0x7f0000000080)=""/242, 0xf2}, {&(0x7f0000000000)=""/16, 0x10}], 0x100000000000003b, 0x0) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @empty, 0x2}, 0x1c) sendmmsg(r0, &(0x7f0000000140), 0x1f8aeba99eb8f3e, 0x13ff000) 2018/04/21 01:44:31 executing program 7: perf_event_open(&(0x7f000000a000)={0x2, 0x70, 0xfffffffffffffff6, 0x20000000000004, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair(0x18, 0x0, 0x3, &(0x7f0000000000)) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000300), 0xc) 2018/04/21 01:44:31 executing program 2: r0 = memfd_create(&(0x7f000003affa)='posix_acl_access{Y\x00', 0x0) lseek(r0, 0x7ffffffffffffffb, 0x0) read(r0, &(0x7f0000000080)=""/241, 0xf1) 2018/04/21 01:44:31 executing program 3: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000140)) setsockopt$netlink_NETLINK_RX_RING(0xffffffffffffffff, 0x10e, 0x6, &(0x7f0000017000)={0x0, 0x0, 0x0, 0x158}, 0x10) r0 = openat$autofs(0xffffffffffffff9c, &(0x7f0000ca3000)='/dev/autofs\x00', 0x0, 0x0) ioctl(r0, 0x800000000000937e, &(0x7f0000017000)="010000000000000018") 2018/04/21 01:44:31 executing program 6: r0 = socket$can_bcm(0x1d, 0x2, 0x2) connect(r0, &(0x7f0000002000)=@ethernet, 0x10) sendmsg$can_bcm(r0, &(0x7f0000000000)={&(0x7f0000004000)={0x1d}, 0x10, &(0x7f0000002ff0)={&(0x7f0000004fb8)={0x5, 0x0, 0x0, {}, {}, {}, 0x1, @can={{}, 0x0, 0x0, 0x0, 0x0, "b100"}}, 0x48}, 0x1}, 0x0) sendmsg$can_bcm(r0, &(0x7f00005e4000)={&(0x7f00002ccff0)={0x1d}, 0x10, &(0x7f0000728000)={&(0x7f00000aef80)={0x5, 0x900, 0x0, {}, {}, {}, 0x1, @canfd={{}, 0x0, 0x0, 0x0, 0x0, "260503dd3e3c0a6afe3f7b377378f2e013e66ff1bf538a0f1abc5b8beb605be3d9448c99787c873249ed9c34e040a29606427925d8dd9065c240a288783179ce"}}, 0x80}, 0x1}, 0x0) sendmsg$can_bcm(r0, &(0x7f0000000180)={&(0x7f0000000080)={0x1d}, 0x10, &(0x7f0000000140)={&(0x7f00000000c0)={0x6, 0x0, 0x0, {0x0, 0x7530}, {}, {}, 0x1, @can={{}, 0x0, 0x0, 0x0, 0x0, "d300692ddfae1e24"}}, 0x48}, 0x1}, 0x0) 2018/04/21 01:44:31 executing program 0: r0 = socket$can_bcm(0x1d, 0x2, 0x2) connect(r0, &(0x7f0000002000)=@ethernet, 0x10) sendmsg$can_bcm(r0, &(0x7f0000000000)={&(0x7f0000004000)={0x1d}, 0x10, &(0x7f0000002ff0)={&(0x7f0000004fb8)={0x5, 0x0, 0x0, {}, {}, {}, 0x1, @can={{}, 0x0, 0x0, 0x0, 0x0, "b100"}}, 0x48}, 0x1}, 0x0) sendmsg$can_bcm(r0, &(0x7f00005e4000)={&(0x7f00002ccff0)={0x1d}, 0x10, &(0x7f0000728000)={&(0x7f00000aef80)={0x5, 0x900, 0x0, {}, {}, {}, 0x1, @canfd={{}, 0x0, 0x0, 0x0, 0x0, "260503dd3e3c0a6afe3f7b377378f2e013e66ff1bf538a0f1abc5b8beb605be3d9448c99787c873249ed9c34e040a29606427925d8dd9065c240a288783179ce"}}, 0x80}, 0x1}, 0x0) sendmsg$can_bcm(r0, &(0x7f0000000180)={&(0x7f0000000080)={0x1d}, 0x10, &(0x7f0000000140)={&(0x7f00000000c0)={0x6, 0x0, 0x0, {0x0, 0x7530}, {}, {}, 0x1, @can={{}, 0x0, 0x0, 0x0, 0x0, "d300692ddfae1e24"}}, 0x48}, 0x1}, 0x0) [ 93.874226] netlink: 'syz-executor1': attribute type 1 has an invalid length. 2018/04/21 01:44:31 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000aabff1)='net/xfrm_stat\x00') bind$alg(r0, &(0x7f0000000080)={0x26, 'hash\x00', 0x0, 0x0, 'wp256-generic\x00'}, 0x58) r2 = accept4$alg(r0, 0x0, 0x0, 0x0) sendfile(r2, r1, &(0x7f0000a2effc), 0x7f) 2018/04/21 01:44:31 executing program 2: sched_setattr(0x0, &(0x7f0000000000)={0x0, 0x6, 0x0, 0x0, 0x0, 0x9917, 0xff80}, 0x0) sched_setattr(0x0, &(0x7f0000000040)={0x0, 0x1, 0x0, 0x0, 0x8}, 0x0) 2018/04/21 01:44:31 executing program 7: perf_event_open(&(0x7f000000a000)={0x2, 0x70, 0xfffffffffffffff6, 0x20000000000004, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair(0x18, 0x0, 0x3, &(0x7f0000000000)) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000300), 0xc) 2018/04/21 01:44:31 executing program 6: r0 = socket$can_bcm(0x1d, 0x2, 0x2) connect(r0, &(0x7f0000002000)=@ethernet, 0x10) sendmsg$can_bcm(r0, &(0x7f0000000000)={&(0x7f0000004000)={0x1d}, 0x10, &(0x7f0000002ff0)={&(0x7f0000004fb8)={0x5, 0x0, 0x0, {}, {}, {}, 0x1, @can={{}, 0x0, 0x0, 0x0, 0x0, "b100"}}, 0x48}, 0x1}, 0x0) sendmsg$can_bcm(r0, &(0x7f00005e4000)={&(0x7f00002ccff0)={0x1d}, 0x10, &(0x7f0000728000)={&(0x7f00000aef80)={0x5, 0x900, 0x0, {}, {}, {}, 0x1, @canfd={{}, 0x0, 0x0, 0x0, 0x0, "260503dd3e3c0a6afe3f7b377378f2e013e66ff1bf538a0f1abc5b8beb605be3d9448c99787c873249ed9c34e040a29606427925d8dd9065c240a288783179ce"}}, 0x80}, 0x1}, 0x0) sendmsg$can_bcm(r0, &(0x7f0000000180)={&(0x7f0000000080)={0x1d}, 0x10, &(0x7f0000000140)={&(0x7f00000000c0)={0x6, 0x0, 0x0, {0x0, 0x7530}, {}, {}, 0x1, @can={{}, 0x0, 0x0, 0x0, 0x0, "d300692ddfae1e24"}}, 0x48}, 0x1}, 0x0) 2018/04/21 01:44:31 executing program 4: r0 = socket$inet6(0xa, 0x3, 0x2) preadv(0xffffffffffffffff, &(0x7f00000001c0)=[{&(0x7f0000000080)=""/242, 0xf2}, {&(0x7f0000000000)=""/16, 0x10}], 0x100000000000003b, 0x0) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @empty, 0x2}, 0x1c) sendmmsg(r0, &(0x7f0000000140), 0x1f8aeba99eb8f3e, 0x13ff000) 2018/04/21 01:44:31 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000300)={&(0x7f0000000000)={0x10}, 0xc, &(0x7f00000002c0)={&(0x7f0000000040)={0x1c, 0x9, 0x6, 0x201, 0x0, 0x0, {}, [@typed={0x8, 0x1, @uid}]}, 0x1c}, 0x1}, 0x0) 2018/04/21 01:44:31 executing program 3: mkdir(&(0x7f000000dff6)='./control\x00', 0x0) r0 = open(&(0x7f0000028000)='./control\x00', 0x0, 0x0) chmod(&(0x7f000000e000)='./control\x00', 0x40f152a1a03d37a7) mkdirat(r0, &(0x7f0000016ff8)='./file0\x00', 0x0) [ 94.013347] sched: DL replenish lagged too much 2018/04/21 01:44:31 executing program 0: r0 = socket$can_bcm(0x1d, 0x2, 0x2) connect(r0, &(0x7f0000002000)=@ethernet, 0x10) sendmsg$can_bcm(r0, &(0x7f0000000000)={&(0x7f0000004000)={0x1d}, 0x10, &(0x7f0000002ff0)={&(0x7f0000004fb8)={0x5, 0x0, 0x0, {}, {}, {}, 0x1, @can={{}, 0x0, 0x0, 0x0, 0x0, "b100"}}, 0x48}, 0x1}, 0x0) sendmsg$can_bcm(r0, &(0x7f00005e4000)={&(0x7f00002ccff0)={0x1d}, 0x10, &(0x7f0000728000)={&(0x7f00000aef80)={0x5, 0x900, 0x0, {}, {}, {}, 0x1, @canfd={{}, 0x0, 0x0, 0x0, 0x0, "260503dd3e3c0a6afe3f7b377378f2e013e66ff1bf538a0f1abc5b8beb605be3d9448c99787c873249ed9c34e040a29606427925d8dd9065c240a288783179ce"}}, 0x80}, 0x1}, 0x0) sendmsg$can_bcm(r0, &(0x7f0000000180)={&(0x7f0000000080)={0x1d}, 0x10, &(0x7f0000000140)={&(0x7f00000000c0)={0x6, 0x0, 0x0, {0x0, 0x7530}, {}, {}, 0x1, @can={{}, 0x0, 0x0, 0x0, 0x0, "d300692ddfae1e24"}}, 0x48}, 0x1}, 0x0) 2018/04/21 01:44:31 executing program 2: sched_setattr(0x0, &(0x7f0000000000)={0x0, 0x6, 0x0, 0x0, 0x0, 0x9917, 0xff80}, 0x0) sched_setattr(0x0, &(0x7f0000000040)={0x0, 0x1, 0x0, 0x0, 0x8}, 0x0) [ 94.092435] netlink: 'syz-executor1': attribute type 1 has an invalid length. 2018/04/21 01:44:31 executing program 7: perf_event_open(&(0x7f000000a000)={0x2, 0x70, 0xfffffffffffffff6, 0x20000000000004, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair(0x18, 0x0, 0x3, &(0x7f0000000000)) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000300), 0xc) 2018/04/21 01:44:31 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000aabff1)='net/xfrm_stat\x00') bind$alg(r0, &(0x7f0000000080)={0x26, 'hash\x00', 0x0, 0x0, 'wp256-generic\x00'}, 0x58) r2 = accept4$alg(r0, 0x0, 0x0, 0x0) sendfile(r2, r1, &(0x7f0000a2effc), 0x7f) 2018/04/21 01:44:31 executing program 4: r0 = socket$inet6(0xa, 0x3, 0x2) preadv(0xffffffffffffffff, &(0x7f00000001c0)=[{&(0x7f0000000080)=""/242, 0xf2}, {&(0x7f0000000000)=""/16, 0x10}], 0x100000000000003b, 0x0) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @empty, 0x2}, 0x1c) sendmmsg(r0, &(0x7f0000000140), 0x1f8aeba99eb8f3e, 0x13ff000) 2018/04/21 01:44:32 executing program 6: r0 = socket$can_bcm(0x1d, 0x2, 0x2) connect(r0, &(0x7f0000002000)=@ethernet, 0x10) sendmsg$can_bcm(r0, &(0x7f0000000000)={&(0x7f0000004000)={0x1d}, 0x10, &(0x7f0000002ff0)={&(0x7f0000004fb8)={0x5, 0x0, 0x0, {}, {}, {}, 0x1, @can={{}, 0x0, 0x0, 0x0, 0x0, "b100"}}, 0x48}, 0x1}, 0x0) sendmsg$can_bcm(r0, &(0x7f00005e4000)={&(0x7f00002ccff0)={0x1d}, 0x10, &(0x7f0000728000)={&(0x7f00000aef80)={0x5, 0x900, 0x0, {}, {}, {}, 0x1, @canfd={{}, 0x0, 0x0, 0x0, 0x0, "260503dd3e3c0a6afe3f7b377378f2e013e66ff1bf538a0f1abc5b8beb605be3d9448c99787c873249ed9c34e040a29606427925d8dd9065c240a288783179ce"}}, 0x80}, 0x1}, 0x0) sendmsg$can_bcm(r0, &(0x7f0000000180)={&(0x7f0000000080)={0x1d}, 0x10, &(0x7f0000000140)={&(0x7f00000000c0)={0x6, 0x0, 0x0, {0x0, 0x7530}, {}, {}, 0x1, @can={{}, 0x0, 0x0, 0x0, 0x0, "d300692ddfae1e24"}}, 0x48}, 0x1}, 0x0) 2018/04/21 01:44:32 executing program 3: mkdir(&(0x7f000000dff6)='./control\x00', 0x0) r0 = open(&(0x7f0000028000)='./control\x00', 0x0, 0x0) chmod(&(0x7f000000e000)='./control\x00', 0x40f152a1a03d37a7) mkdirat(r0, &(0x7f0000016ff8)='./file0\x00', 0x0) 2018/04/21 01:44:32 executing program 0: r0 = socket$can_bcm(0x1d, 0x2, 0x2) connect(r0, &(0x7f0000002000)=@ethernet, 0x10) sendmsg$can_bcm(r0, &(0x7f0000000000)={&(0x7f0000004000)={0x1d}, 0x10, &(0x7f0000002ff0)={&(0x7f0000004fb8)={0x5, 0x0, 0x0, {}, {}, {}, 0x1, @can={{}, 0x0, 0x0, 0x0, 0x0, "b100"}}, 0x48}, 0x1}, 0x0) sendmsg$can_bcm(r0, &(0x7f00005e4000)={&(0x7f00002ccff0)={0x1d}, 0x10, &(0x7f0000728000)={&(0x7f00000aef80)={0x5, 0x900, 0x0, {}, {}, {}, 0x1, @canfd={{}, 0x0, 0x0, 0x0, 0x0, "260503dd3e3c0a6afe3f7b377378f2e013e66ff1bf538a0f1abc5b8beb605be3d9448c99787c873249ed9c34e040a29606427925d8dd9065c240a288783179ce"}}, 0x80}, 0x1}, 0x0) sendmsg$can_bcm(r0, &(0x7f0000000180)={&(0x7f0000000080)={0x1d}, 0x10, &(0x7f0000000140)={&(0x7f00000000c0)={0x6, 0x0, 0x0, {0x0, 0x7530}, {}, {}, 0x1, @can={{}, 0x0, 0x0, 0x0, 0x0, "d300692ddfae1e24"}}, 0x48}, 0x1}, 0x0) 2018/04/21 01:44:32 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000aabff1)='net/xfrm_stat\x00') bind$alg(r0, &(0x7f0000000080)={0x26, 'hash\x00', 0x0, 0x0, 'wp256-generic\x00'}, 0x58) r2 = accept4$alg(r0, 0x0, 0x0, 0x0) sendfile(r2, r1, &(0x7f0000a2effc), 0x7f) 2018/04/21 01:44:32 executing program 2: sched_setattr(0x0, &(0x7f0000000000)={0x0, 0x6, 0x0, 0x0, 0x0, 0x9917, 0xff80}, 0x0) sched_setattr(0x0, &(0x7f0000000040)={0x0, 0x1, 0x0, 0x0, 0x8}, 0x0) 2018/04/21 01:44:32 executing program 7: r0 = syz_open_dev$binder(&(0x7f0000f5b000)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffb000/0x3000)=nil, 0x3000, 0x0, 0x20011, r0, 0x0) ioctl$BINDER_SET_CONTEXT_MGR(r0, 0x40046207, 0x0) ioctl$BINDER_WRITE_READ(r0, 0xc0306201, &(0x7f0000000240)={0x44, 0x0, &(0x7f0000000380)=[@transaction={0x40406300, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x28, 0x8, &(0x7f000026c000)=[@ptr={0x73622a85, 0x0, &(0x7f00004edf8a), 0x1}], &(0x7f000000afd0)=[0x0]}}], 0x0, 0x0, &(0x7f00000002c0)}) ioctl$BINDER_WRITE_READ(r0, 0xc0306201, &(0x7f0000000280)={0x8, 0x0, &(0x7f0000000180)=[@acquire={0x40046305}], 0x0, 0x0, &(0x7f0000000240)}) ioctl$BINDER_WRITE_READ(r0, 0xc0306201, &(0x7f0000000100)={0x10, 0x0, &(0x7f0000000080)=[@clear_death={0x400c630f}], 0x0, 0x0, &(0x7f00000002c0)}) 2018/04/21 01:44:32 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000aabff1)='net/xfrm_stat\x00') bind$alg(r0, &(0x7f0000000080)={0x26, 'hash\x00', 0x0, 0x0, 'wp256-generic\x00'}, 0x58) r2 = accept4$alg(r0, 0x0, 0x0, 0x0) sendfile(r2, r1, &(0x7f0000a2effc), 0x7f) 2018/04/21 01:44:32 executing program 4: r0 = open$dir(&(0x7f0000000340)='./file0\x00', 0x1fffd, 0x0) r1 = open$dir(&(0x7f0000000500)='./file0\x00', 0x2, 0x0) write(r1, &(0x7f0000000300)="d8", 0x1) sendfile(r1, r1, &(0x7f0000000040), 0x7527fb3200000000) fallocate(r0, 0x8, 0x0, 0x8000) [ 94.370345] binder: 8490:8495 BC_CLEAR_DEATH_NOTIFICATION death notification not active 2018/04/21 01:44:32 executing program 2: sched_setattr(0x0, &(0x7f0000000000)={0x0, 0x6, 0x0, 0x0, 0x0, 0x9917, 0xff80}, 0x0) sched_setattr(0x0, &(0x7f0000000040)={0x0, 0x1, 0x0, 0x0, 0x8}, 0x0) 2018/04/21 01:44:32 executing program 0: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x10, 0x2, 0x0) sendmsg$nl_route(r0, &(0x7f0000504000)={&(0x7f0000ba2ff4)={0x10}, 0xc, &(0x7f0000812ff0)={&(0x7f000047c000)=@newlink={0x34, 0x10, 0x9, 0x0, 0x0, {}, [@IFLA_GROUP={0x8, 0x1b}, @IFLA_ADDRESS={0xc, 0x1, @empty=[0xfffffff0]}]}, 0x34}, 0x1}, 0x0) 2018/04/21 01:44:32 executing program 6: socketpair$unix(0x1, 0x1, 0x0, &(0x7f000007d000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = memfd_create(&(0x7f00005f8ffe)='#}\x00', 0x0) ftruncate(r2, 0x40001) setsockopt$sock_int(r1, 0x1, 0x10, &(0x7f0000000400)=0x4, 0x4) sendfile(r0, r2, &(0x7f0000000000), 0x4) 2018/04/21 01:44:32 executing program 3: mkdir(&(0x7f000000dff6)='./control\x00', 0x0) r0 = open(&(0x7f0000028000)='./control\x00', 0x0, 0x0) chmod(&(0x7f000000e000)='./control\x00', 0x40f152a1a03d37a7) mkdirat(r0, &(0x7f0000016ff8)='./file0\x00', 0x0) 2018/04/21 01:44:32 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000aabff1)='net/xfrm_stat\x00') bind$alg(r0, &(0x7f0000000080)={0x26, 'hash\x00', 0x0, 0x0, 'wp256-generic\x00'}, 0x58) r2 = accept4$alg(r0, 0x0, 0x0, 0x0) sendfile(r2, r1, &(0x7f0000a2effc), 0x7f) [ 94.431623] binder: BINDER_SET_CONTEXT_MGR already set [ 94.456066] binder: 8490:8505 ioctl 40046207 0 returned -16 2018/04/21 01:44:32 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000aabff1)='net/xfrm_stat\x00') bind$alg(r0, &(0x7f0000000080)={0x26, 'hash\x00', 0x0, 0x0, 'wp256-generic\x00'}, 0x58) r2 = accept4$alg(r0, 0x0, 0x0, 0x0) sendfile(r2, r1, &(0x7f0000a2effc), 0x7f) [ 94.495225] binder_alloc: 8490: binder_alloc_buf, no vma [ 94.501075] binder: 8490:8495 transaction failed 29189/-3, size 40-8 line 2963 2018/04/21 01:44:32 executing program 6: socketpair$unix(0x1, 0x1, 0x0, &(0x7f000007d000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = memfd_create(&(0x7f00005f8ffe)='#}\x00', 0x0) ftruncate(r2, 0x40001) setsockopt$sock_int(r1, 0x1, 0x10, &(0x7f0000000400)=0x4, 0x4) sendfile(r0, r2, &(0x7f0000000000), 0x4) 2018/04/21 01:44:32 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000aabff1)='net/xfrm_stat\x00') bind$alg(r0, &(0x7f0000000080)={0x26, 'hash\x00', 0x0, 0x0, 'wp256-generic\x00'}, 0x58) r2 = accept4$alg(r0, 0x0, 0x0, 0x0) sendfile(r2, r1, &(0x7f0000a2effc), 0x7f) 2018/04/21 01:44:32 executing program 2: openat$cuse(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/cuse\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x2, 0x78, 0xe2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x2, 0x3, 0x20000000084) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000140)=@filter={'filter\x00', 0xe, 0x3, 0x378, [0x0, 0x200012c0, 0x200012f0, 0x20001430], 0x0, &(0x7f0000000100), &(0x7f00000012c0)=[{0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xfffffffffffffffe, 0x1, [{{{0xd, 0x0, 0x0, 'erspan0\x00', 'ip6gre0\x00', 'yam0\x00', 'bridge0\x00', @local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, [], @link_local={0x1, 0x80, 0xc2}, [], 0xe0, 0xe0, 0x110, [@quota={'quota\x00', 0x18}, @cpu={'cpu\x00', 0x8}]}}, @common=@NFQUEUE0={'NFQUEUE\x00', 0x8}}]}, {0x0, '\x00', 0x1, 0xfffffffffffffffe, 0x2, [{{{0x9, 0x0, 0x0, 'lo\x00', 'erspan0\x00', 'ipddp0\x00', 'yam0\x00', @local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, [], @remote={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xbb}, [], 0x70, 0xe0, 0x118}, [@common=@dnat={'dnat\x00', 0x10, {{@broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff]}}}, @common=@mark={'mark\x00', 0x10}]}, @common=@dnat={'dnat\x00', 0x10, {{@link_local={0x1, 0x80, 0xc2}}}}}, {{{0x7, 0x0, 0x0, 'nr0\x00', 'ip_vti0\x00', 'teql0\x00', 'bridge0\x00', @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [], @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [0x0, 0xff], 0x70, 0x70, 0xc0}}, @common=@LED={'LED\x00', 0x28, {{'syz0\x00', 0x0, 0x0, 0x40}}}}]}]}, 0x3f0) ioctl$SNDRV_CTL_IOCTL_PCM_INFO(0xffffffffffffffff, 0xc1205531, &(0x7f0000000300)={0x0, 0x0, 0x0, 0x5, [], [], [], 0x0, 0x0, 0x0, 0x0, "f0e1c74155da9d2c132dffbf3e0dfc7f"}) 2018/04/21 01:44:32 executing program 3: mkdir(&(0x7f000000dff6)='./control\x00', 0x0) r0 = open(&(0x7f0000028000)='./control\x00', 0x0, 0x0) chmod(&(0x7f000000e000)='./control\x00', 0x40f152a1a03d37a7) mkdirat(r0, &(0x7f0000016ff8)='./file0\x00', 0x0) 2018/04/21 01:44:32 executing program 7: r0 = syz_open_dev$binder(&(0x7f0000f5b000)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffb000/0x3000)=nil, 0x3000, 0x0, 0x20011, r0, 0x0) ioctl$BINDER_SET_CONTEXT_MGR(r0, 0x40046207, 0x0) ioctl$BINDER_WRITE_READ(r0, 0xc0306201, &(0x7f0000000240)={0x44, 0x0, &(0x7f0000000380)=[@transaction={0x40406300, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x28, 0x8, &(0x7f000026c000)=[@ptr={0x73622a85, 0x0, &(0x7f00004edf8a), 0x1}], &(0x7f000000afd0)=[0x0]}}], 0x0, 0x0, &(0x7f00000002c0)}) ioctl$BINDER_WRITE_READ(r0, 0xc0306201, &(0x7f0000000280)={0x8, 0x0, &(0x7f0000000180)=[@acquire={0x40046305}], 0x0, 0x0, &(0x7f0000000240)}) ioctl$BINDER_WRITE_READ(r0, 0xc0306201, &(0x7f0000000100)={0x10, 0x0, &(0x7f0000000080)=[@clear_death={0x400c630f}], 0x0, 0x0, &(0x7f00000002c0)}) [ 94.613974] binder: undelivered TRANSACTION_ERROR: 29189 [ 94.629007] binder: release 8490:8495 transaction 10 out, still active [ 94.635867] binder: unexpected work type, 4, not freed [ 94.641202] binder: undelivered TRANSACTION_COMPLETE [ 94.646650] binder: send failed reply for transaction 10, target dead 2018/04/21 01:44:32 executing program 0: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x10, 0x2, 0x0) sendmsg$nl_route(r0, &(0x7f0000504000)={&(0x7f0000ba2ff4)={0x10}, 0xc, &(0x7f0000812ff0)={&(0x7f000047c000)=@newlink={0x34, 0x10, 0x9, 0x0, 0x0, {}, [@IFLA_GROUP={0x8, 0x1b}, @IFLA_ADDRESS={0xc, 0x1, @empty=[0xfffffff0]}]}, 0x34}, 0x1}, 0x0) 2018/04/21 01:44:32 executing program 5: r0 = syz_open_dev$binder(&(0x7f0000f5b000)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffb000/0x3000)=nil, 0x3000, 0x0, 0x20011, r0, 0x0) ioctl$BINDER_SET_CONTEXT_MGR(r0, 0x40046207, 0x0) ioctl$BINDER_WRITE_READ(r0, 0xc0306201, &(0x7f0000000240)={0x44, 0x0, &(0x7f0000000380)=[@transaction={0x40406300, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x28, 0x8, &(0x7f000026c000)=[@ptr={0x73622a85, 0x0, &(0x7f00004edf8a), 0x1}], &(0x7f000000afd0)=[0x0]}}], 0x0, 0x0, &(0x7f00000002c0)}) ioctl$BINDER_WRITE_READ(r0, 0xc0306201, &(0x7f0000000280)={0x8, 0x0, &(0x7f0000000180)=[@acquire={0x40046305}], 0x0, 0x0, &(0x7f0000000240)}) ioctl$BINDER_WRITE_READ(r0, 0xc0306201, &(0x7f0000000100)={0x10, 0x0, &(0x7f0000000080)=[@clear_death={0x400c630f}], 0x0, 0x0, &(0x7f00000002c0)}) 2018/04/21 01:44:32 executing program 1: r0 = syz_open_dev$binder(&(0x7f0000c93000)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) ioctl$BINDER_SET_CONTEXT_MGR(r0, 0x40046207, 0x0) r1 = syz_open_dev$binder(&(0x7f000000fff3)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) ioctl$BINDER_WRITE_READ(r1, 0xc0306201, &(0x7f0000007000)={0x8, 0x0, &(0x7f0000005fd4)=[@acquire={0x40046305}], 0x0, 0x0, &(0x7f0000002000)}) close(r0) ioctl$BINDER_WRITE_READ(r1, 0xc0306201, &(0x7f0000008fd0)={0x8, 0x0, &(0x7f0000008000)=[@release={0x400c630e}], 0x0, 0x0, &(0x7f0000000f4d)}) ioctl$BINDER_WRITE_READ(r1, 0xc0306201, &(0x7f000000dfd0)={0x14, 0x0, &(0x7f000000cf68)=[@request_death={0x400c630f}, @enter_looper={0x630c}], 0x1, 0x0, &(0x7f0000008f37)="c2"}) socketpair$ipx(0x4, 0x2, 0x0, &(0x7f0000000180)) ioctl$BINDER_WRITE_READ(r1, 0xc0306201, &(0x7f0000012fd0)={0xc, 0x0, &(0x7f0000007000)=[@dead_binder_done={0x40086310}], 0x0, 0x0, &(0x7f0000012000)}) 2018/04/21 01:44:32 executing program 6: socketpair$unix(0x1, 0x1, 0x0, &(0x7f000007d000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = memfd_create(&(0x7f00005f8ffe)='#}\x00', 0x0) ftruncate(r2, 0x40001) setsockopt$sock_int(r1, 0x1, 0x10, &(0x7f0000000400)=0x4, 0x4) sendfile(r0, r2, &(0x7f0000000000), 0x4) [ 94.785397] binder: 8542:8544 BC_CLEAR_DEATH_NOTIFICATION death notification not active [ 94.787985] binder: BINDER_SET_CONTEXT_MGR already set [ 94.851652] binder: BINDER_SET_CONTEXT_MGR already set [ 94.861199] binder: 8546:8547 ioctl 40046207 0 returned -16 [ 94.870223] binder: 8554:8555 ioctl 40046207 0 returned -16 [ 94.901067] binder: release 8542:8544 transaction 17 out, still active [ 94.907914] binder: unexpected work type, 4, not freed [ 94.913263] binder: undelivered TRANSACTION_COMPLETE [ 94.918468] binder: send failed reply for transaction 17, target dead [ 94.928634] binder: 8554:8555 Acquire 1 refcount change on invalid ref 0 ret -22 [ 94.929366] binder: 8546:8547 transaction failed 29189/-22, size 40-8 line 2848 [ 94.951451] binder: 8554:8555 BC_REQUEST_DEATH_NOTIFICATION invalid ref 0 [ 94.990377] binder: 8554:8555 BC_CLEAR_DEATH_NOTIFICATION invalid ref 0 [ 95.015228] binder: undelivered TRANSACTION_ERROR: 29189 [ 95.652648] binder: 8554:8566 BC_DEAD_BINDER_DONE 0000000000000000 not found 2018/04/21 01:44:33 executing program 4: r0 = open$dir(&(0x7f0000000340)='./file0\x00', 0x1fffd, 0x0) r1 = open$dir(&(0x7f0000000500)='./file0\x00', 0x2, 0x0) write(r1, &(0x7f0000000300)="d8", 0x1) sendfile(r1, r1, &(0x7f0000000040), 0x7527fb3200000000) fallocate(r0, 0x8, 0x0, 0x8000) 2018/04/21 01:44:33 executing program 3: mkdir(&(0x7f00007ef000)='./file0\x00', 0x0) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='./file0\x00', &(0x7f0000000000)='securityfs\x00', 0x0, &(0x7f0000000a00)) 2018/04/21 01:44:33 executing program 7: r0 = syz_open_dev$binder(&(0x7f0000f5b000)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffb000/0x3000)=nil, 0x3000, 0x0, 0x20011, r0, 0x0) ioctl$BINDER_SET_CONTEXT_MGR(r0, 0x40046207, 0x0) ioctl$BINDER_WRITE_READ(r0, 0xc0306201, &(0x7f0000000240)={0x44, 0x0, &(0x7f0000000380)=[@transaction={0x40406300, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x28, 0x8, &(0x7f000026c000)=[@ptr={0x73622a85, 0x0, &(0x7f00004edf8a), 0x1}], &(0x7f000000afd0)=[0x0]}}], 0x0, 0x0, &(0x7f00000002c0)}) ioctl$BINDER_WRITE_READ(r0, 0xc0306201, &(0x7f0000000280)={0x8, 0x0, &(0x7f0000000180)=[@acquire={0x40046305}], 0x0, 0x0, &(0x7f0000000240)}) ioctl$BINDER_WRITE_READ(r0, 0xc0306201, &(0x7f0000000100)={0x10, 0x0, &(0x7f0000000080)=[@clear_death={0x400c630f}], 0x0, 0x0, &(0x7f00000002c0)}) 2018/04/21 01:44:33 executing program 6: socketpair$unix(0x1, 0x1, 0x0, &(0x7f000007d000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = memfd_create(&(0x7f00005f8ffe)='#}\x00', 0x0) ftruncate(r2, 0x40001) setsockopt$sock_int(r1, 0x1, 0x10, &(0x7f0000000400)=0x4, 0x4) sendfile(r0, r2, &(0x7f0000000000), 0x4) 2018/04/21 01:44:33 executing program 5: r0 = syz_open_dev$binder(&(0x7f0000f5b000)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffb000/0x3000)=nil, 0x3000, 0x0, 0x20011, r0, 0x0) ioctl$BINDER_SET_CONTEXT_MGR(r0, 0x40046207, 0x0) ioctl$BINDER_WRITE_READ(r0, 0xc0306201, &(0x7f0000000240)={0x44, 0x0, &(0x7f0000000380)=[@transaction={0x40406300, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x28, 0x8, &(0x7f000026c000)=[@ptr={0x73622a85, 0x0, &(0x7f00004edf8a), 0x1}], &(0x7f000000afd0)=[0x0]}}], 0x0, 0x0, &(0x7f00000002c0)}) ioctl$BINDER_WRITE_READ(r0, 0xc0306201, &(0x7f0000000280)={0x8, 0x0, &(0x7f0000000180)=[@acquire={0x40046305}], 0x0, 0x0, &(0x7f0000000240)}) ioctl$BINDER_WRITE_READ(r0, 0xc0306201, &(0x7f0000000100)={0x10, 0x0, &(0x7f0000000080)=[@clear_death={0x400c630f}], 0x0, 0x0, &(0x7f00000002c0)}) 2018/04/21 01:44:33 executing program 0: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x10, 0x2, 0x0) sendmsg$nl_route(r0, &(0x7f0000504000)={&(0x7f0000ba2ff4)={0x10}, 0xc, &(0x7f0000812ff0)={&(0x7f000047c000)=@newlink={0x34, 0x10, 0x9, 0x0, 0x0, {}, [@IFLA_GROUP={0x8, 0x1b}, @IFLA_ADDRESS={0xc, 0x1, @empty=[0xfffffff0]}]}, 0x34}, 0x1}, 0x0) 2018/04/21 01:44:33 executing program 1: r0 = syz_open_dev$binder(&(0x7f0000c93000)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) ioctl$BINDER_SET_CONTEXT_MGR(r0, 0x40046207, 0x0) r1 = syz_open_dev$binder(&(0x7f000000fff3)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) ioctl$BINDER_WRITE_READ(r1, 0xc0306201, &(0x7f0000007000)={0x8, 0x0, &(0x7f0000005fd4)=[@acquire={0x40046305}], 0x0, 0x0, &(0x7f0000002000)}) close(r0) ioctl$BINDER_WRITE_READ(r1, 0xc0306201, &(0x7f0000008fd0)={0x8, 0x0, &(0x7f0000008000)=[@release={0x400c630e}], 0x0, 0x0, &(0x7f0000000f4d)}) ioctl$BINDER_WRITE_READ(r1, 0xc0306201, &(0x7f000000dfd0)={0x14, 0x0, &(0x7f000000cf68)=[@request_death={0x400c630f}, @enter_looper={0x630c}], 0x1, 0x0, &(0x7f0000008f37)="c2"}) socketpair$ipx(0x4, 0x2, 0x0, &(0x7f0000000180)) ioctl$BINDER_WRITE_READ(r1, 0xc0306201, &(0x7f0000012fd0)={0xc, 0x0, &(0x7f0000007000)=[@dead_binder_done={0x40086310}], 0x0, 0x0, &(0x7f0000012000)}) 2018/04/21 01:44:33 executing program 2: openat$cuse(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/cuse\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x2, 0x78, 0xe2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x2, 0x3, 0x20000000084) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000140)=@filter={'filter\x00', 0xe, 0x3, 0x378, [0x0, 0x200012c0, 0x200012f0, 0x20001430], 0x0, &(0x7f0000000100), &(0x7f00000012c0)=[{0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xfffffffffffffffe, 0x1, [{{{0xd, 0x0, 0x0, 'erspan0\x00', 'ip6gre0\x00', 'yam0\x00', 'bridge0\x00', @local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, [], @link_local={0x1, 0x80, 0xc2}, [], 0xe0, 0xe0, 0x110, [@quota={'quota\x00', 0x18}, @cpu={'cpu\x00', 0x8}]}}, @common=@NFQUEUE0={'NFQUEUE\x00', 0x8}}]}, {0x0, '\x00', 0x1, 0xfffffffffffffffe, 0x2, [{{{0x9, 0x0, 0x0, 'lo\x00', 'erspan0\x00', 'ipddp0\x00', 'yam0\x00', @local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, [], @remote={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xbb}, [], 0x70, 0xe0, 0x118}, [@common=@dnat={'dnat\x00', 0x10, {{@broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff]}}}, @common=@mark={'mark\x00', 0x10}]}, @common=@dnat={'dnat\x00', 0x10, {{@link_local={0x1, 0x80, 0xc2}}}}}, {{{0x7, 0x0, 0x0, 'nr0\x00', 'ip_vti0\x00', 'teql0\x00', 'bridge0\x00', @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [], @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [0x0, 0xff], 0x70, 0x70, 0xc0}}, @common=@LED={'LED\x00', 0x28, {{'syz0\x00', 0x0, 0x0, 0x40}}}}]}]}, 0x3f0) ioctl$SNDRV_CTL_IOCTL_PCM_INFO(0xffffffffffffffff, 0xc1205531, &(0x7f0000000300)={0x0, 0x0, 0x0, 0x5, [], [], [], 0x0, 0x0, 0x0, 0x0, "f0e1c74155da9d2c132dffbf3e0dfc7f"}) [ 95.883977] binder: undelivered death notification, 0000000000000000 [ 95.922392] binder: BINDER_SET_CONTEXT_MGR already set 2018/04/21 01:44:33 executing program 6: perf_event_open(&(0x7f00000000c0)={0x2, 0x70, 0x3e6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap$binder(&(0x7f0000001000/0x4000)=nil, 0x4000, 0x2, 0x100000002132, 0xffffffffffffffff, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) mmap(&(0x7f0000000000/0x4000)=nil, 0x4000, 0x0, 0xc812, r0, 0x0) r1 = syz_init_net_socket$bt_l2cap(0x1f, 0x5, 0x0) getsockopt$bt_l2cap_L2CAP_OPTIONS(r1, 0x6, 0x3, &(0x7f0000000140), &(0x7f0000000180)=0xc) [ 95.955675] binder: 8572:8577 BC_CLEAR_DEATH_NOTIFICATION death notification not active [ 95.968658] binder: 8578:8580 ioctl 40046207 0 returned -16 [ 95.969749] binder: BINDER_SET_CONTEXT_MGR already set 2018/04/21 01:44:33 executing program 3: mkdir(&(0x7f00007ef000)='./file0\x00', 0x0) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='./file0\x00', &(0x7f0000000000)='securityfs\x00', 0x0, &(0x7f0000000a00)) 2018/04/21 01:44:33 executing program 2: openat$cuse(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/cuse\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x2, 0x78, 0xe2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x2, 0x3, 0x20000000084) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000140)=@filter={'filter\x00', 0xe, 0x3, 0x378, [0x0, 0x200012c0, 0x200012f0, 0x20001430], 0x0, &(0x7f0000000100), &(0x7f00000012c0)=[{0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xfffffffffffffffe, 0x1, [{{{0xd, 0x0, 0x0, 'erspan0\x00', 'ip6gre0\x00', 'yam0\x00', 'bridge0\x00', @local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, [], @link_local={0x1, 0x80, 0xc2}, [], 0xe0, 0xe0, 0x110, [@quota={'quota\x00', 0x18}, @cpu={'cpu\x00', 0x8}]}}, @common=@NFQUEUE0={'NFQUEUE\x00', 0x8}}]}, {0x0, '\x00', 0x1, 0xfffffffffffffffe, 0x2, [{{{0x9, 0x0, 0x0, 'lo\x00', 'erspan0\x00', 'ipddp0\x00', 'yam0\x00', @local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, [], @remote={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xbb}, [], 0x70, 0xe0, 0x118}, [@common=@dnat={'dnat\x00', 0x10, {{@broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff]}}}, @common=@mark={'mark\x00', 0x10}]}, @common=@dnat={'dnat\x00', 0x10, {{@link_local={0x1, 0x80, 0xc2}}}}}, {{{0x7, 0x0, 0x0, 'nr0\x00', 'ip_vti0\x00', 'teql0\x00', 'bridge0\x00', @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [], @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [0x0, 0xff], 0x70, 0x70, 0xc0}}, @common=@LED={'LED\x00', 0x28, {{'syz0\x00', 0x0, 0x0, 0x40}}}}]}]}, 0x3f0) ioctl$SNDRV_CTL_IOCTL_PCM_INFO(0xffffffffffffffff, 0xc1205531, &(0x7f0000000300)={0x0, 0x0, 0x0, 0x5, [], [], [], 0x0, 0x0, 0x0, 0x0, "f0e1c74155da9d2c132dffbf3e0dfc7f"}) [ 96.010395] binder: 8578:8580 BC_CLEAR_DEATH_NOTIFICATION death notification not active 2018/04/21 01:44:33 executing program 0: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x10, 0x2, 0x0) sendmsg$nl_route(r0, &(0x7f0000504000)={&(0x7f0000ba2ff4)={0x10}, 0xc, &(0x7f0000812ff0)={&(0x7f000047c000)=@newlink={0x34, 0x10, 0x9, 0x0, 0x0, {}, [@IFLA_GROUP={0x8, 0x1b}, @IFLA_ADDRESS={0xc, 0x1, @empty=[0xfffffff0]}]}, 0x34}, 0x1}, 0x0) [ 96.058628] binder: 8585:8586 ioctl 40046207 0 returned -16 2018/04/21 01:44:33 executing program 5: r0 = syz_open_dev$binder(&(0x7f0000f5b000)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffb000/0x3000)=nil, 0x3000, 0x0, 0x20011, r0, 0x0) ioctl$BINDER_SET_CONTEXT_MGR(r0, 0x40046207, 0x0) ioctl$BINDER_WRITE_READ(r0, 0xc0306201, &(0x7f0000000240)={0x44, 0x0, &(0x7f0000000380)=[@transaction={0x40406300, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x28, 0x8, &(0x7f000026c000)=[@ptr={0x73622a85, 0x0, &(0x7f00004edf8a), 0x1}], &(0x7f000000afd0)=[0x0]}}], 0x0, 0x0, &(0x7f00000002c0)}) ioctl$BINDER_WRITE_READ(r0, 0xc0306201, &(0x7f0000000280)={0x8, 0x0, &(0x7f0000000180)=[@acquire={0x40046305}], 0x0, 0x0, &(0x7f0000000240)}) ioctl$BINDER_WRITE_READ(r0, 0xc0306201, &(0x7f0000000100)={0x10, 0x0, &(0x7f0000000080)=[@clear_death={0x400c630f}], 0x0, 0x0, &(0x7f00000002c0)}) 2018/04/21 01:44:33 executing program 3: mkdir(&(0x7f00007ef000)='./file0\x00', 0x0) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='./file0\x00', &(0x7f0000000000)='securityfs\x00', 0x0, &(0x7f0000000a00)) 2018/04/21 01:44:33 executing program 7: r0 = syz_open_dev$binder(&(0x7f0000f5b000)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffb000/0x3000)=nil, 0x3000, 0x0, 0x20011, r0, 0x0) ioctl$BINDER_SET_CONTEXT_MGR(r0, 0x40046207, 0x0) ioctl$BINDER_WRITE_READ(r0, 0xc0306201, &(0x7f0000000240)={0x44, 0x0, &(0x7f0000000380)=[@transaction={0x40406300, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x28, 0x8, &(0x7f000026c000)=[@ptr={0x73622a85, 0x0, &(0x7f00004edf8a), 0x1}], &(0x7f000000afd0)=[0x0]}}], 0x0, 0x0, &(0x7f00000002c0)}) ioctl$BINDER_WRITE_READ(r0, 0xc0306201, &(0x7f0000000280)={0x8, 0x0, &(0x7f0000000180)=[@acquire={0x40046305}], 0x0, 0x0, &(0x7f0000000240)}) ioctl$BINDER_WRITE_READ(r0, 0xc0306201, &(0x7f0000000100)={0x10, 0x0, &(0x7f0000000080)=[@clear_death={0x400c630f}], 0x0, 0x0, &(0x7f00000002c0)}) [ 96.128203] binder: release 8572:8577 transaction 25 out, still active [ 96.130285] binder: 8585:8586 Acquire 1 refcount change on invalid ref 0 ret -22 [ 96.135041] binder: unexpected work type, 4, not freed [ 96.147919] binder: undelivered TRANSACTION_COMPLETE [ 96.153177] binder: send failed reply for transaction 25, target dead [ 96.159816] binder: send failed reply for transaction 29 to 8578:8580 2018/04/21 01:44:34 executing program 6: perf_event_open(&(0x7f00000000c0)={0x2, 0x70, 0x3e6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap$binder(&(0x7f0000001000/0x4000)=nil, 0x4000, 0x2, 0x100000002132, 0xffffffffffffffff, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) mmap(&(0x7f0000000000/0x4000)=nil, 0x4000, 0x0, 0xc812, r0, 0x0) r1 = syz_init_net_socket$bt_l2cap(0x1f, 0x5, 0x0) getsockopt$bt_l2cap_L2CAP_OPTIONS(r1, 0x6, 0x3, &(0x7f0000000140), &(0x7f0000000180)=0xc) [ 96.187799] binder: 8585:8586 BC_REQUEST_DEATH_NOTIFICATION invalid ref 0 [ 96.203687] binder: undelivered TRANSACTION_COMPLETE [ 96.208914] binder: undelivered TRANSACTION_ERROR: 29189 [ 96.240606] binder: 8585:8586 BC_CLEAR_DEATH_NOTIFICATION invalid ref 0 [ 96.265969] binder: BINDER_SET_CONTEXT_MGR already set [ 96.278456] binder: 8607:8610 BC_CLEAR_DEATH_NOTIFICATION death notification not active [ 96.294735] binder: 8611:8612 ioctl 40046207 0 returned -16 [ 96.336073] binder: 8611:8612 BC_CLEAR_DEATH_NOTIFICATION death notification not active [ 96.357858] binder: release 8607:8610 transaction 34 out, still active [ 96.364687] binder: unexpected work type, 4, not freed [ 96.370038] binder: undelivered TRANSACTION_COMPLETE [ 96.375248] binder: send failed reply for transaction 34, target dead [ 96.381921] binder: send failed reply for transaction 38 to 8611:8612 [ 96.459481] binder: undelivered TRANSACTION_COMPLETE [ 96.464716] binder: undelivered TRANSACTION_ERROR: 29189 [ 96.768130] binder: 8585:8622 BC_DEAD_BINDER_DONE 0000000000000000 not found 2018/04/21 01:44:34 executing program 4: r0 = open$dir(&(0x7f0000000340)='./file0\x00', 0x1fffd, 0x0) r1 = open$dir(&(0x7f0000000500)='./file0\x00', 0x2, 0x0) write(r1, &(0x7f0000000300)="d8", 0x1) sendfile(r1, r1, &(0x7f0000000040), 0x7527fb3200000000) fallocate(r0, 0x8, 0x0, 0x8000) 2018/04/21 01:44:34 executing program 0: perf_event_open(&(0x7f00000000c0)={0x2, 0x70, 0x3e6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap$binder(&(0x7f0000001000/0x4000)=nil, 0x4000, 0x2, 0x100000002132, 0xffffffffffffffff, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) mmap(&(0x7f0000000000/0x4000)=nil, 0x4000, 0x0, 0xc812, r0, 0x0) r1 = syz_init_net_socket$bt_l2cap(0x1f, 0x5, 0x0) getsockopt$bt_l2cap_L2CAP_OPTIONS(r1, 0x6, 0x3, &(0x7f0000000140), &(0x7f0000000180)=0xc) 2018/04/21 01:44:34 executing program 3: mkdir(&(0x7f00007ef000)='./file0\x00', 0x0) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='./file0\x00', &(0x7f0000000000)='securityfs\x00', 0x0, &(0x7f0000000a00)) 2018/04/21 01:44:34 executing program 2: openat$cuse(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/cuse\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x2, 0x78, 0xe2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x2, 0x3, 0x20000000084) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000140)=@filter={'filter\x00', 0xe, 0x3, 0x378, [0x0, 0x200012c0, 0x200012f0, 0x20001430], 0x0, &(0x7f0000000100), &(0x7f00000012c0)=[{0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xfffffffffffffffe, 0x1, [{{{0xd, 0x0, 0x0, 'erspan0\x00', 'ip6gre0\x00', 'yam0\x00', 'bridge0\x00', @local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, [], @link_local={0x1, 0x80, 0xc2}, [], 0xe0, 0xe0, 0x110, [@quota={'quota\x00', 0x18}, @cpu={'cpu\x00', 0x8}]}}, @common=@NFQUEUE0={'NFQUEUE\x00', 0x8}}]}, {0x0, '\x00', 0x1, 0xfffffffffffffffe, 0x2, [{{{0x9, 0x0, 0x0, 'lo\x00', 'erspan0\x00', 'ipddp0\x00', 'yam0\x00', @local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, [], @remote={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xbb}, [], 0x70, 0xe0, 0x118}, [@common=@dnat={'dnat\x00', 0x10, {{@broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff]}}}, @common=@mark={'mark\x00', 0x10}]}, @common=@dnat={'dnat\x00', 0x10, {{@link_local={0x1, 0x80, 0xc2}}}}}, {{{0x7, 0x0, 0x0, 'nr0\x00', 'ip_vti0\x00', 'teql0\x00', 'bridge0\x00', @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [], @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [0x0, 0xff], 0x70, 0x70, 0xc0}}, @common=@LED={'LED\x00', 0x28, {{'syz0\x00', 0x0, 0x0, 0x40}}}}]}]}, 0x3f0) ioctl$SNDRV_CTL_IOCTL_PCM_INFO(0xffffffffffffffff, 0xc1205531, &(0x7f0000000300)={0x0, 0x0, 0x0, 0x5, [], [], [], 0x0, 0x0, 0x0, 0x0, "f0e1c74155da9d2c132dffbf3e0dfc7f"}) 2018/04/21 01:44:34 executing program 6: perf_event_open(&(0x7f00000000c0)={0x2, 0x70, 0x3e6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap$binder(&(0x7f0000001000/0x4000)=nil, 0x4000, 0x2, 0x100000002132, 0xffffffffffffffff, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) mmap(&(0x7f0000000000/0x4000)=nil, 0x4000, 0x0, 0xc812, r0, 0x0) r1 = syz_init_net_socket$bt_l2cap(0x1f, 0x5, 0x0) getsockopt$bt_l2cap_L2CAP_OPTIONS(r1, 0x6, 0x3, &(0x7f0000000140), &(0x7f0000000180)=0xc) 2018/04/21 01:44:34 executing program 7: perf_event_open(&(0x7f00000000c0)={0x2, 0x70, 0x3e6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap$binder(&(0x7f0000001000/0x4000)=nil, 0x4000, 0x2, 0x100000002132, 0xffffffffffffffff, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) mmap(&(0x7f0000000000/0x4000)=nil, 0x4000, 0x0, 0xc812, r0, 0x0) r1 = syz_init_net_socket$bt_l2cap(0x1f, 0x5, 0x0) getsockopt$bt_l2cap_L2CAP_OPTIONS(r1, 0x6, 0x3, &(0x7f0000000140), &(0x7f0000000180)=0xc) 2018/04/21 01:44:34 executing program 5: perf_event_open(&(0x7f00000000c0)={0x2, 0x70, 0x3e6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap$binder(&(0x7f0000001000/0x4000)=nil, 0x4000, 0x2, 0x100000002132, 0xffffffffffffffff, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) mmap(&(0x7f0000000000/0x4000)=nil, 0x4000, 0x0, 0xc812, r0, 0x0) r1 = syz_init_net_socket$bt_l2cap(0x1f, 0x5, 0x0) getsockopt$bt_l2cap_L2CAP_OPTIONS(r1, 0x6, 0x3, &(0x7f0000000140), &(0x7f0000000180)=0xc) 2018/04/21 01:44:34 executing program 1: r0 = syz_open_dev$binder(&(0x7f0000c93000)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) ioctl$BINDER_SET_CONTEXT_MGR(r0, 0x40046207, 0x0) r1 = syz_open_dev$binder(&(0x7f000000fff3)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) ioctl$BINDER_WRITE_READ(r1, 0xc0306201, &(0x7f0000007000)={0x8, 0x0, &(0x7f0000005fd4)=[@acquire={0x40046305}], 0x0, 0x0, &(0x7f0000002000)}) close(r0) ioctl$BINDER_WRITE_READ(r1, 0xc0306201, &(0x7f0000008fd0)={0x8, 0x0, &(0x7f0000008000)=[@release={0x400c630e}], 0x0, 0x0, &(0x7f0000000f4d)}) ioctl$BINDER_WRITE_READ(r1, 0xc0306201, &(0x7f000000dfd0)={0x14, 0x0, &(0x7f000000cf68)=[@request_death={0x400c630f}, @enter_looper={0x630c}], 0x1, 0x0, &(0x7f0000008f37)="c2"}) socketpair$ipx(0x4, 0x2, 0x0, &(0x7f0000000180)) ioctl$BINDER_WRITE_READ(r1, 0xc0306201, &(0x7f0000012fd0)={0xc, 0x0, &(0x7f0000007000)=[@dead_binder_done={0x40086310}], 0x0, 0x0, &(0x7f0000012000)}) 2018/04/21 01:44:34 executing program 6: perf_event_open(&(0x7f00000000c0)={0x2, 0x70, 0x3e6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap$binder(&(0x7f0000001000/0x4000)=nil, 0x4000, 0x2, 0x100000002132, 0xffffffffffffffff, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) mmap(&(0x7f0000000000/0x4000)=nil, 0x4000, 0x0, 0xc812, r0, 0x0) r1 = syz_init_net_socket$bt_l2cap(0x1f, 0x5, 0x0) getsockopt$bt_l2cap_L2CAP_OPTIONS(r1, 0x6, 0x3, &(0x7f0000000140), &(0x7f0000000180)=0xc) 2018/04/21 01:44:34 executing program 1: r0 = syz_open_dev$binder(&(0x7f0000c93000)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) ioctl$BINDER_SET_CONTEXT_MGR(r0, 0x40046207, 0x0) r1 = syz_open_dev$binder(&(0x7f000000fff3)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) ioctl$BINDER_WRITE_READ(r1, 0xc0306201, &(0x7f0000007000)={0x8, 0x0, &(0x7f0000005fd4)=[@acquire={0x40046305}], 0x0, 0x0, &(0x7f0000002000)}) close(r0) ioctl$BINDER_WRITE_READ(r1, 0xc0306201, &(0x7f0000008fd0)={0x8, 0x0, &(0x7f0000008000)=[@release={0x400c630e}], 0x0, 0x0, &(0x7f0000000f4d)}) ioctl$BINDER_WRITE_READ(r1, 0xc0306201, &(0x7f000000dfd0)={0x14, 0x0, &(0x7f000000cf68)=[@request_death={0x400c630f}, @enter_looper={0x630c}], 0x1, 0x0, &(0x7f0000008f37)="c2"}) socketpair$ipx(0x4, 0x2, 0x0, &(0x7f0000000180)) ioctl$BINDER_WRITE_READ(r1, 0xc0306201, &(0x7f0000012fd0)={0xc, 0x0, &(0x7f0000007000)=[@dead_binder_done={0x40086310}], 0x0, 0x0, &(0x7f0000012000)}) 2018/04/21 01:44:34 executing program 3: mkdir(&(0x7f00007ef000)='./file0\x00', 0x0) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='./file0\x00', &(0x7f0000000000)='securityfs\x00', 0x0, &(0x7f0000000a00)) 2018/04/21 01:44:34 executing program 0: perf_event_open(&(0x7f00000000c0)={0x2, 0x70, 0x3e6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap$binder(&(0x7f0000001000/0x4000)=nil, 0x4000, 0x2, 0x100000002132, 0xffffffffffffffff, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) mmap(&(0x7f0000000000/0x4000)=nil, 0x4000, 0x0, 0xc812, r0, 0x0) r1 = syz_init_net_socket$bt_l2cap(0x1f, 0x5, 0x0) getsockopt$bt_l2cap_L2CAP_OPTIONS(r1, 0x6, 0x3, &(0x7f0000000140), &(0x7f0000000180)=0xc) 2018/04/21 01:44:34 executing program 5: perf_event_open(&(0x7f00000000c0)={0x2, 0x70, 0x3e6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap$binder(&(0x7f0000001000/0x4000)=nil, 0x4000, 0x2, 0x100000002132, 0xffffffffffffffff, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) mmap(&(0x7f0000000000/0x4000)=nil, 0x4000, 0x0, 0xc812, r0, 0x0) r1 = syz_init_net_socket$bt_l2cap(0x1f, 0x5, 0x0) getsockopt$bt_l2cap_L2CAP_OPTIONS(r1, 0x6, 0x3, &(0x7f0000000140), &(0x7f0000000180)=0xc) 2018/04/21 01:44:34 executing program 7: perf_event_open(&(0x7f00000000c0)={0x2, 0x70, 0x3e6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap$binder(&(0x7f0000001000/0x4000)=nil, 0x4000, 0x2, 0x100000002132, 0xffffffffffffffff, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) mmap(&(0x7f0000000000/0x4000)=nil, 0x4000, 0x0, 0xc812, r0, 0x0) r1 = syz_init_net_socket$bt_l2cap(0x1f, 0x5, 0x0) getsockopt$bt_l2cap_L2CAP_OPTIONS(r1, 0x6, 0x3, &(0x7f0000000140), &(0x7f0000000180)=0xc) 2018/04/21 01:44:34 executing program 2: capset(&(0x7f0000000000)={0x19980330}, &(0x7f0000001fe8)) open_by_handle_at(0xffffffffffffffff, &(0x7f0000000300)={0x8}, 0x0) [ 97.030431] binder: undelivered death notification, 0000000000000000 [ 97.115287] capability: warning: `syz-executor2' uses 32-bit capabilities (legacy support in use) 2018/04/21 01:44:34 executing program 6: r0 = socket(0x1e, 0x2, 0x0) bind(r0, &(0x7f00008a1f80)=@generic={0x42001e, "01030000000000b9000000004700000000a979f321b30c7bc8790405c7bad62e0a63a632ed4938d36d64fb8f8401a3ff59829a2b0afe7ce43a5b2470a0c5216669ca021f6f65dcf160e7e58f358c0002f0000158d19bcb31510000500000000000bdb9c8ea31000077aeb81c90001d6f7c980400000000f70dc136cb184a"}, 0x80) r1 = socket(0x1e, 0x1, 0x0) sendmsg(r1, &(0x7f0000000000)={&(0x7f00000000c0)=@generic={0x10000000001e, "0100000000001e0000000001e526cc573c5bf86c483724c71e14dd6a739effea1b48006be61ffe06d79f00000000000000076c3f010039d8f986ff03000000000000af50d5fe32c419d67bcbc7e3ad316a198356ed0008341c1fd45624280027800ece70b076cf979ac40000bd767e2e78a1dfd300981a1565b3b16d7436"}, 0x80, &(0x7f0000000980)=[{&(0x7f0000001200)="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", 0x401}], 0x1, &(0x7f0000000040)}, 0x0) close(r0) [ 97.236527] binder: undelivered death notification, 0000000000000000 2018/04/21 01:44:35 executing program 4: r0 = open$dir(&(0x7f0000000340)='./file0\x00', 0x1fffd, 0x0) r1 = open$dir(&(0x7f0000000500)='./file0\x00', 0x2, 0x0) write(r1, &(0x7f0000000300)="d8", 0x1) sendfile(r1, r1, &(0x7f0000000040), 0x7527fb3200000000) fallocate(r0, 0x8, 0x0, 0x8000) 2018/04/21 01:44:35 executing program 3: mkdir(&(0x7f00007ef000)='./file0\x00', 0x0) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='./file0\x00', &(0x7f0000000000)='securityfs\x00', 0x0, &(0x7f0000000a00)) 2018/04/21 01:44:35 executing program 1: r0 = socket$rds(0x15, 0x5, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000700)={'erspan0\x00', &(0x7f00000006c0)=@ethtool_sset_info={0x37}}) 2018/04/21 01:44:35 executing program 0: perf_event_open(&(0x7f00000000c0)={0x2, 0x70, 0x3e6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap$binder(&(0x7f0000001000/0x4000)=nil, 0x4000, 0x2, 0x100000002132, 0xffffffffffffffff, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) mmap(&(0x7f0000000000/0x4000)=nil, 0x4000, 0x0, 0xc812, r0, 0x0) r1 = syz_init_net_socket$bt_l2cap(0x1f, 0x5, 0x0) getsockopt$bt_l2cap_L2CAP_OPTIONS(r1, 0x6, 0x3, &(0x7f0000000140), &(0x7f0000000180)=0xc) 2018/04/21 01:44:35 executing program 2: capset(&(0x7f0000000000)={0x19980330}, &(0x7f0000001fe8)) open_by_handle_at(0xffffffffffffffff, &(0x7f0000000300)={0x8}, 0x0) 2018/04/21 01:44:35 executing program 5: perf_event_open(&(0x7f00000000c0)={0x2, 0x70, 0x3e6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap$binder(&(0x7f0000001000/0x4000)=nil, 0x4000, 0x2, 0x100000002132, 0xffffffffffffffff, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) mmap(&(0x7f0000000000/0x4000)=nil, 0x4000, 0x0, 0xc812, r0, 0x0) r1 = syz_init_net_socket$bt_l2cap(0x1f, 0x5, 0x0) getsockopt$bt_l2cap_L2CAP_OPTIONS(r1, 0x6, 0x3, &(0x7f0000000140), &(0x7f0000000180)=0xc) 2018/04/21 01:44:35 executing program 7: perf_event_open(&(0x7f00000000c0)={0x2, 0x70, 0x3e6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap$binder(&(0x7f0000001000/0x4000)=nil, 0x4000, 0x2, 0x100000002132, 0xffffffffffffffff, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) mmap(&(0x7f0000000000/0x4000)=nil, 0x4000, 0x0, 0xc812, r0, 0x0) r1 = syz_init_net_socket$bt_l2cap(0x1f, 0x5, 0x0) getsockopt$bt_l2cap_L2CAP_OPTIONS(r1, 0x6, 0x3, &(0x7f0000000140), &(0x7f0000000180)=0xc) 2018/04/21 01:44:35 executing program 6: r0 = socket(0x1e, 0x2, 0x0) bind(r0, &(0x7f00008a1f80)=@generic={0x42001e, "01030000000000b9000000004700000000a979f321b30c7bc8790405c7bad62e0a63a632ed4938d36d64fb8f8401a3ff59829a2b0afe7ce43a5b2470a0c5216669ca021f6f65dcf160e7e58f358c0002f0000158d19bcb31510000500000000000bdb9c8ea31000077aeb81c90001d6f7c980400000000f70dc136cb184a"}, 0x80) r1 = socket(0x1e, 0x1, 0x0) sendmsg(r1, &(0x7f0000000000)={&(0x7f00000000c0)=@generic={0x10000000001e, "0100000000001e0000000001e526cc573c5bf86c483724c71e14dd6a739effea1b48006be61ffe06d79f00000000000000076c3f010039d8f986ff03000000000000af50d5fe32c419d67bcbc7e3ad316a198356ed0008341c1fd45624280027800ece70b076cf979ac40000bd767e2e78a1dfd300981a1565b3b16d7436"}, 0x80, &(0x7f0000000980)=[{&(0x7f0000001200)="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", 0x401}], 0x1, &(0x7f0000000040)}, 0x0) close(r0) 2018/04/21 01:44:35 executing program 1: r0 = socket$rds(0x15, 0x5, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000700)={'erspan0\x00', &(0x7f00000006c0)=@ethtool_sset_info={0x37}}) 2018/04/21 01:44:35 executing program 6: r0 = socket(0x1e, 0x2, 0x0) bind(r0, &(0x7f00008a1f80)=@generic={0x42001e, "01030000000000b9000000004700000000a979f321b30c7bc8790405c7bad62e0a63a632ed4938d36d64fb8f8401a3ff59829a2b0afe7ce43a5b2470a0c5216669ca021f6f65dcf160e7e58f358c0002f0000158d19bcb31510000500000000000bdb9c8ea31000077aeb81c90001d6f7c980400000000f70dc136cb184a"}, 0x80) r1 = socket(0x1e, 0x1, 0x0) sendmsg(r1, &(0x7f0000000000)={&(0x7f00000000c0)=@generic={0x10000000001e, "0100000000001e0000000001e526cc573c5bf86c483724c71e14dd6a739effea1b48006be61ffe06d79f00000000000000076c3f010039d8f986ff03000000000000af50d5fe32c419d67bcbc7e3ad316a198356ed0008341c1fd45624280027800ece70b076cf979ac40000bd767e2e78a1dfd300981a1565b3b16d7436"}, 0x80, &(0x7f0000000980)=[{&(0x7f0000001200)="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", 0x401}], 0x1, &(0x7f0000000040)}, 0x0) close(r0) 2018/04/21 01:44:35 executing program 2: capset(&(0x7f0000000000)={0x19980330}, &(0x7f0000001fe8)) open_by_handle_at(0xffffffffffffffff, &(0x7f0000000300)={0x8}, 0x0) 2018/04/21 01:44:35 executing program 5: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x5, 0x0) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000389000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x0, 0x3, &(0x7f0000346fc8)=@framed={{0x18}, [], {0x95}}, &(0x7f00000001c0)='GPL\x00', 0x0, 0xfb, &(0x7f0000000080)=""/251}, 0x48) openat$sequencer(0xffffffffffffff9c, &(0x7f0000001380)='/dev/sequencer\x00', 0x0, 0x0) bind$bt_l2cap(r0, &(0x7f00000000c0)={0x1f, 0x3}, 0xe) 2018/04/21 01:44:35 executing program 3: mkdir(&(0x7f00007ef000)='./file0\x00', 0x0) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='./file0\x00', &(0x7f0000000000)='securityfs\x00', 0x0, &(0x7f0000000a00)) 2018/04/21 01:44:35 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x0, 0x3, &(0x7f0000000040)=ANY=[@ANYBLOB="180000000000000000100000028000007a0a00fffffffffd6301"], &(0x7f0000000000)="47504c00bc3047eb525f484f89fc96dd6ca64da40ff023122e66f6", 0x0, 0xce, &(0x7f0000000300)=""/206}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x9, 0x5, &(0x7f0000000040)=@framed={{0x18}, [@jmp={0x5}], {0x95}}, &(0x7f0000000200)='syzkaller\x00', 0x80000001, 0x2b6, &(0x7f0000000300)=""/187}, 0x48) 2018/04/21 01:44:35 executing program 7: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_NODELAY(r0, 0x84, 0x3, &(0x7f0000de0000), 0x1) 2018/04/21 01:44:35 executing program 1: r0 = socket$rds(0x15, 0x5, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000700)={'erspan0\x00', &(0x7f00000006c0)=@ethtool_sset_info={0x37}}) 2018/04/21 01:44:36 executing program 3: bpf$MAP_CREATE(0x0, &(0x7f0000346fd4)={0x0, 0x0, 0x0, 0x4, 0x48}, 0x2c) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x1, 0x5, &(0x7f0000346fc8)=@framed={{0x18}, [@alu={0x8000000201a7f19, 0x0, 0x7, 0x0, 0x1}], {0x95}}, &(0x7f0000f6bffb)='GPL\x00', 0x0, 0xffffffffffffff11, &(0x7f00001a7f05)=""/251}, 0x18) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000040)={0xffffffffffffffff, &(0x7f00000000c0)="b82283392dc50ff1fb635a5849d2f5916ae2fdc24e95e12aa8daccf7393e72be9cc66f"}, 0x10) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000140)={r0, 0x50, &(0x7f00000000c0)}, 0x10) socketpair$inet(0x2, 0x11, 0x704ffc, &(0x7f0000000d00)) 2018/04/21 01:44:36 executing program 7: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_NODELAY(r0, 0x84, 0x3, &(0x7f0000de0000), 0x1) 2018/04/21 01:44:36 executing program 6: r0 = socket(0x1e, 0x2, 0x0) bind(r0, &(0x7f00008a1f80)=@generic={0x42001e, "01030000000000b9000000004700000000a979f321b30c7bc8790405c7bad62e0a63a632ed4938d36d64fb8f8401a3ff59829a2b0afe7ce43a5b2470a0c5216669ca021f6f65dcf160e7e58f358c0002f0000158d19bcb31510000500000000000bdb9c8ea31000077aeb81c90001d6f7c980400000000f70dc136cb184a"}, 0x80) r1 = socket(0x1e, 0x1, 0x0) sendmsg(r1, &(0x7f0000000000)={&(0x7f00000000c0)=@generic={0x10000000001e, "0100000000001e0000000001e526cc573c5bf86c483724c71e14dd6a739effea1b48006be61ffe06d79f00000000000000076c3f010039d8f986ff03000000000000af50d5fe32c419d67bcbc7e3ad316a198356ed0008341c1fd45624280027800ece70b076cf979ac40000bd767e2e78a1dfd300981a1565b3b16d7436"}, 0x80, &(0x7f0000000980)=[{&(0x7f0000001200)="e4ab71c72d9ff2c1347b258f933b191d6165e677bcce14b835923cf471faabd356b48be94eb4cea422250f3067624c1003a4d7b59a1656de15b33e215f86dc1a07622217daba166093cf9a74bd332c955678294386b26b02435db1d0e378bed909494bfaddfdc5b1e580bab1b0b01af9b6f7602dd9a0cd616a734a0f2194baa27de89e72275dfe92c56999a73bc3dfb2cd9f2068b66d12efdd2adeab3df36c91ba0fb78c6110d8cb91feb8b8488b911b96074a1ac5c0f8239cffdfac73dcc6d3aabe89dc10757e4d3f46285d718cd34f698196979d0c0f488c516dac44af538ed38aadba3d45561780c854b25d8907e7db052e85fb06e1a29d4c1a3b58bc52edbf4fd7e23e7e9cf94e8272d92e69355ed093cb3bde5377e47e8f78a0cef9af8d9e3f557eea9f121b726a27c89d32586f7fc8e66becc83e71d6c7e95db4481a846a03e9dd7105141b7e5c3bcd65d75096ddbec970aa5f09be54e448d056f84959c7fa634dff2d971cfa371be4a219098109f8a2c85231afc697e39fba5b825ad398e5f5d12b238315a1d436bfd91971d2f2b39dc36815223485bcdc2b93494ce36efb53ec529669d960719317b5e84a505a5a9f23cab8e3eaa6753283fe40d8091d1645f07c177bc4e801c062c6e60a4967ee5e048c2f9ad67a5804cc70ec263e230b107918c8d4be5f2f5b8d33f68d7877203c2e040cbaec02347f3f638c5b6c92399e4c34538eebe4c3cd5b80878279e0b3b835cb7dbb14513d4ca6ea1972f2348d07b21920d585e1ec5405423ae20f039787c780ba7d77c6449d7e03c53a10226309b9507c61ef0c1c0be0616b95012260a5d3238d1cb8a38f64b04f84c935414e86f6109d203d3a7a74dc0c7016abbeae711f1b14e5cdaf372b8ddf4ded5f3594e2f07d20d6d1eca614071ca8925e77709b90e8820199c9dff59546b534793514cb777e7e76b5031f30995ec0dea25b983ed99ebd98ac361142778f74c25399a5547c219069c96a6126e234193a8e017e441f914a78e5383311e1f780888731056186618bc15f4013ff3f8f4f9ef4dd4473c6e72bb8b1e83eda99809f8847872fad9d3fddd84cebbbecc8caf5a8f274dc53630c2d762aeac4704037465a2d386a90c9ab49cbfb5b7a9bbd32bd68db73cb25a5bf286961d64f9999b595c9b59ab151c40dd7d1fe401bf7fa080aad151550e804bf311efe3c2657649db4595451fa42e452bf876a3b1669931a84e39ac80c8a644a87829fcdb21a42d5bcfdb5eb142d5bbf2d2f5738d6ffc8bf38bc6d281c00ceb9bb92ac99d503c84f362cfc62604d0c95fc9d80f504ac5a6c974b1137ff8575d6883dca9a4cef8792a819a69cbee53e0636d993e452f6e49099f5cb4c3b6ea6aed15700ac091b82648fecd374f74f6f42156019ba6ff3eafa69537a3bcec9c99b83bf471b1c3e9388db330cf0", 0x401}], 0x1, &(0x7f0000000040)}, 0x0) close(r0) 2018/04/21 01:44:36 executing program 1: r0 = socket$rds(0x15, 0x5, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000700)={'erspan0\x00', &(0x7f00000006c0)=@ethtool_sset_info={0x37}}) 2018/04/21 01:44:36 executing program 4: r0 = socket$inet6(0xa, 0x1, 0x0) setsockopt$sock_int(r0, 0x1, 0x4000000000000002, &(0x7f0000ff8ffc)=0x8005, 0x115168ef5b0da2d5) bind$inet6(r0, &(0x7f0000d1a000)={0xa, 0x4e20}, 0x1c) sendto$inet6(r0, &(0x7f00007a8fff), 0x0, 0xfffffefffffffffe, &(0x7f0000f62fe4)={0xa, 0x4e20, 0x0, @loopback={0x0, 0x1}}, 0x1c) r1 = socket$inet6(0xa, 0x1, 0x0) setsockopt$sock_int(r1, 0x1, 0x4000000000000002, &(0x7f00000000c0)=0x8, 0x4) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendto$inet6(r1, &(0x7f0000000040), 0x0, 0x20040000, &(0x7f0000f62fe4)={0xa, 0x4e20, 0x0, @loopback={0x0, 0x1}}, 0x1c) 2018/04/21 01:44:36 executing program 5: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x5, 0x0) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000389000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x0, 0x3, &(0x7f0000346fc8)=@framed={{0x18}, [], {0x95}}, &(0x7f00000001c0)='GPL\x00', 0x0, 0xfb, &(0x7f0000000080)=""/251}, 0x48) openat$sequencer(0xffffffffffffff9c, &(0x7f0000001380)='/dev/sequencer\x00', 0x0, 0x0) bind$bt_l2cap(r0, &(0x7f00000000c0)={0x1f, 0x3}, 0xe) 2018/04/21 01:44:36 executing program 2: capset(&(0x7f0000000000)={0x19980330}, &(0x7f0000001fe8)) open_by_handle_at(0xffffffffffffffff, &(0x7f0000000300)={0x8}, 0x0) 2018/04/21 01:44:36 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x0, 0x3, &(0x7f0000000040)=ANY=[@ANYBLOB="180000000000000000100000028000007a0a00fffffffffd6301"], &(0x7f0000000000)="47504c00bc3047eb525f484f89fc96dd6ca64da40ff023122e66f6", 0x0, 0xce, &(0x7f0000000300)=""/206}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x9, 0x5, &(0x7f0000000040)=@framed={{0x18}, [@jmp={0x5}], {0x95}}, &(0x7f0000000200)='syzkaller\x00', 0x80000001, 0x2b6, &(0x7f0000000300)=""/187}, 0x48) 2018/04/21 01:44:36 executing program 7: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_NODELAY(r0, 0x84, 0x3, &(0x7f0000de0000), 0x1) 2018/04/21 01:44:36 executing program 6: mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000080)='./file0//./..\x00', &(0x7f000000c000)='ramfs\x00', 0x0, &(0x7f000000a000)) open(&(0x7f0000002800)='./file0//./..\x00', 0x0, 0x0) 2018/04/21 01:44:36 executing program 3: bpf$MAP_CREATE(0x0, &(0x7f0000346fd4)={0x0, 0x0, 0x0, 0x4, 0x48}, 0x2c) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x1, 0x5, &(0x7f0000346fc8)=@framed={{0x18}, [@alu={0x8000000201a7f19, 0x0, 0x7, 0x0, 0x1}], {0x95}}, &(0x7f0000f6bffb)='GPL\x00', 0x0, 0xffffffffffffff11, &(0x7f00001a7f05)=""/251}, 0x18) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000040)={0xffffffffffffffff, &(0x7f00000000c0)="b82283392dc50ff1fb635a5849d2f5916ae2fdc24e95e12aa8daccf7393e72be9cc66f"}, 0x10) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000140)={r0, 0x50, &(0x7f00000000c0)}, 0x10) socketpair$inet(0x2, 0x11, 0x704ffc, &(0x7f0000000d00)) 2018/04/21 01:44:36 executing program 1: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000100)='IPVS\x00') sendmsg$IPVS_CMD_NEW_DAEMON(r0, &(0x7f00000002c0)={&(0x7f0000000000)={0x10}, 0xc, &(0x7f0000000200)={&(0x7f0000000140)={0x14, r1, 0x503, 0x0, 0x0, {0x10}}, 0x14}, 0x1}, 0x0) 2018/04/21 01:44:36 executing program 2: r0 = msgget$private(0x0, 0x0) msgsnd(r0, &(0x7f0000292ff8)={0x10000000000002}, 0x8, 0x0) msgsnd(r0, &(0x7f00003ecff8)={0x1}, 0x34b, 0x0) msgrcv(r0, &(0x7f0000000140)={0x0, ""/79}, 0x57, 0x1, 0xa4a3ad41a879dde0) 2018/04/21 01:44:36 executing program 5: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x5, 0x0) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000389000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x0, 0x3, &(0x7f0000346fc8)=@framed={{0x18}, [], {0x95}}, &(0x7f00000001c0)='GPL\x00', 0x0, 0xfb, &(0x7f0000000080)=""/251}, 0x48) openat$sequencer(0xffffffffffffff9c, &(0x7f0000001380)='/dev/sequencer\x00', 0x0, 0x0) bind$bt_l2cap(r0, &(0x7f00000000c0)={0x1f, 0x3}, 0xe) 2018/04/21 01:44:36 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x0, 0x3, &(0x7f0000000040)=ANY=[@ANYBLOB="180000000000000000100000028000007a0a00fffffffffd6301"], &(0x7f0000000000)="47504c00bc3047eb525f484f89fc96dd6ca64da40ff023122e66f6", 0x0, 0xce, &(0x7f0000000300)=""/206}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x9, 0x5, &(0x7f0000000040)=@framed={{0x18}, [@jmp={0x5}], {0x95}}, &(0x7f0000000200)='syzkaller\x00', 0x80000001, 0x2b6, &(0x7f0000000300)=""/187}, 0x48) 2018/04/21 01:44:36 executing program 7: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_NODELAY(r0, 0x84, 0x3, &(0x7f0000de0000), 0x1) 2018/04/21 01:44:36 executing program 6: mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000080)='./file0//./..\x00', &(0x7f000000c000)='ramfs\x00', 0x0, &(0x7f000000a000)) open(&(0x7f0000002800)='./file0//./..\x00', 0x0, 0x0) 2018/04/21 01:44:36 executing program 4: r0 = socket$inet6(0xa, 0x1, 0x0) setsockopt$sock_int(r0, 0x1, 0x4000000000000002, &(0x7f0000ff8ffc)=0x8005, 0x115168ef5b0da2d5) bind$inet6(r0, &(0x7f0000d1a000)={0xa, 0x4e20}, 0x1c) sendto$inet6(r0, &(0x7f00007a8fff), 0x0, 0xfffffefffffffffe, &(0x7f0000f62fe4)={0xa, 0x4e20, 0x0, @loopback={0x0, 0x1}}, 0x1c) r1 = socket$inet6(0xa, 0x1, 0x0) setsockopt$sock_int(r1, 0x1, 0x4000000000000002, &(0x7f00000000c0)=0x8, 0x4) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendto$inet6(r1, &(0x7f0000000040), 0x0, 0x20040000, &(0x7f0000f62fe4)={0xa, 0x4e20, 0x0, @loopback={0x0, 0x1}}, 0x1c) 2018/04/21 01:44:37 executing program 7: setsockopt$inet_sctp_SCTP_RTOINFO(0xffffffffffffffff, 0x84, 0x0, &(0x7f0000001000)={0x10000, 0x4, 0x100, 0x400}, 0x10) r0 = socket(0x11, 0x4000000000080003, 0x0) setsockopt(r0, 0x107, 0xd, &(0x7f0000001000), 0x47e) mmap(&(0x7f0000399000/0x1000)=nil, 0x1000, 0x0, 0x12, r0, 0x0) 2018/04/21 01:44:37 executing program 2: r0 = msgget$private(0x0, 0x0) msgsnd(r0, &(0x7f0000292ff8)={0x10000000000002}, 0x8, 0x0) msgsnd(r0, &(0x7f00003ecff8)={0x1}, 0x34b, 0x0) msgrcv(r0, &(0x7f0000000140)={0x0, ""/79}, 0x57, 0x1, 0xa4a3ad41a879dde0) 2018/04/21 01:44:37 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x0, 0x3, &(0x7f0000000040)=ANY=[@ANYBLOB="180000000000000000100000028000007a0a00fffffffffd6301"], &(0x7f0000000000)="47504c00bc3047eb525f484f89fc96dd6ca64da40ff023122e66f6", 0x0, 0xce, &(0x7f0000000300)=""/206}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x9, 0x5, &(0x7f0000000040)=@framed={{0x18}, [@jmp={0x5}], {0x95}}, &(0x7f0000000200)='syzkaller\x00', 0x80000001, 0x2b6, &(0x7f0000000300)=""/187}, 0x48) 2018/04/21 01:44:37 executing program 5: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x5, 0x0) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000389000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x0, 0x3, &(0x7f0000346fc8)=@framed={{0x18}, [], {0x95}}, &(0x7f00000001c0)='GPL\x00', 0x0, 0xfb, &(0x7f0000000080)=""/251}, 0x48) openat$sequencer(0xffffffffffffff9c, &(0x7f0000001380)='/dev/sequencer\x00', 0x0, 0x0) bind$bt_l2cap(r0, &(0x7f00000000c0)={0x1f, 0x3}, 0xe) 2018/04/21 01:44:37 executing program 3: bpf$MAP_CREATE(0x0, &(0x7f0000346fd4)={0x0, 0x0, 0x0, 0x4, 0x48}, 0x2c) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x1, 0x5, &(0x7f0000346fc8)=@framed={{0x18}, [@alu={0x8000000201a7f19, 0x0, 0x7, 0x0, 0x1}], {0x95}}, &(0x7f0000f6bffb)='GPL\x00', 0x0, 0xffffffffffffff11, &(0x7f00001a7f05)=""/251}, 0x18) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000040)={0xffffffffffffffff, &(0x7f00000000c0)="b82283392dc50ff1fb635a5849d2f5916ae2fdc24e95e12aa8daccf7393e72be9cc66f"}, 0x10) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000140)={r0, 0x50, &(0x7f00000000c0)}, 0x10) socketpair$inet(0x2, 0x11, 0x704ffc, &(0x7f0000000d00)) 2018/04/21 01:44:37 executing program 1: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000100)='IPVS\x00') sendmsg$IPVS_CMD_NEW_DAEMON(r0, &(0x7f00000002c0)={&(0x7f0000000000)={0x10}, 0xc, &(0x7f0000000200)={&(0x7f0000000140)={0x14, r1, 0x503, 0x0, 0x0, {0x10}}, 0x14}, 0x1}, 0x0) 2018/04/21 01:44:37 executing program 6: mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000080)='./file0//./..\x00', &(0x7f000000c000)='ramfs\x00', 0x0, &(0x7f000000a000)) open(&(0x7f0000002800)='./file0//./..\x00', 0x0, 0x0) 2018/04/21 01:44:37 executing program 2: r0 = msgget$private(0x0, 0x0) msgsnd(r0, &(0x7f0000292ff8)={0x10000000000002}, 0x8, 0x0) msgsnd(r0, &(0x7f00003ecff8)={0x1}, 0x34b, 0x0) msgrcv(r0, &(0x7f0000000140)={0x0, ""/79}, 0x57, 0x1, 0xa4a3ad41a879dde0) 2018/04/21 01:44:37 executing program 5: r0 = syz_init_net_socket$llc(0x1a, 0x2, 0x0) setsockopt$llc_int(r0, 0x10c, 0x2, &(0x7f0000000080)=0x9ed1, 0x4) 2018/04/21 01:44:37 executing program 4: r0 = socket$inet6(0xa, 0x1, 0x0) setsockopt$sock_int(r0, 0x1, 0x4000000000000002, &(0x7f0000ff8ffc)=0x8005, 0x115168ef5b0da2d5) bind$inet6(r0, &(0x7f0000d1a000)={0xa, 0x4e20}, 0x1c) sendto$inet6(r0, &(0x7f00007a8fff), 0x0, 0xfffffefffffffffe, &(0x7f0000f62fe4)={0xa, 0x4e20, 0x0, @loopback={0x0, 0x1}}, 0x1c) r1 = socket$inet6(0xa, 0x1, 0x0) setsockopt$sock_int(r1, 0x1, 0x4000000000000002, &(0x7f00000000c0)=0x8, 0x4) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendto$inet6(r1, &(0x7f0000000040), 0x0, 0x20040000, &(0x7f0000f62fe4)={0xa, 0x4e20, 0x0, @loopback={0x0, 0x1}}, 0x1c) 2018/04/21 01:44:37 executing program 7: setsockopt$inet_sctp_SCTP_RTOINFO(0xffffffffffffffff, 0x84, 0x0, &(0x7f0000001000)={0x10000, 0x4, 0x100, 0x400}, 0x10) r0 = socket(0x11, 0x4000000000080003, 0x0) setsockopt(r0, 0x107, 0xd, &(0x7f0000001000), 0x47e) mmap(&(0x7f0000399000/0x1000)=nil, 0x1000, 0x0, 0x12, r0, 0x0) 2018/04/21 01:44:37 executing program 3: bpf$MAP_CREATE(0x0, &(0x7f0000346fd4)={0x0, 0x0, 0x0, 0x4, 0x48}, 0x2c) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x1, 0x5, &(0x7f0000346fc8)=@framed={{0x18}, [@alu={0x8000000201a7f19, 0x0, 0x7, 0x0, 0x1}], {0x95}}, &(0x7f0000f6bffb)='GPL\x00', 0x0, 0xffffffffffffff11, &(0x7f00001a7f05)=""/251}, 0x18) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000040)={0xffffffffffffffff, &(0x7f00000000c0)="b82283392dc50ff1fb635a5849d2f5916ae2fdc24e95e12aa8daccf7393e72be9cc66f"}, 0x10) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000140)={r0, 0x50, &(0x7f00000000c0)}, 0x10) socketpair$inet(0x2, 0x11, 0x704ffc, &(0x7f0000000d00)) 2018/04/21 01:44:37 executing program 1: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000100)='IPVS\x00') sendmsg$IPVS_CMD_NEW_DAEMON(r0, &(0x7f00000002c0)={&(0x7f0000000000)={0x10}, 0xc, &(0x7f0000000200)={&(0x7f0000000140)={0x14, r1, 0x503, 0x0, 0x0, {0x10}}, 0x14}, 0x1}, 0x0) 2018/04/21 01:44:37 executing program 0: mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0) r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x5, 0x0) setsockopt$bt_l2cap_L2CAP_LM(r0, 0x6, 0x3, &(0x7f0000000000), 0x4) 2018/04/21 01:44:37 executing program 0: mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0) r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x5, 0x0) setsockopt$bt_l2cap_L2CAP_LM(r0, 0x6, 0x3, &(0x7f0000000000), 0x4) 2018/04/21 01:44:37 executing program 6: mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000080)='./file0//./..\x00', &(0x7f000000c000)='ramfs\x00', 0x0, &(0x7f000000a000)) open(&(0x7f0000002800)='./file0//./..\x00', 0x0, 0x0) [ 99.593353] ================================================================== [ 99.600985] BUG: KASAN: null-ptr-deref in refcount_inc_not_zero+0x8f/0x2d0 [ 99.608007] Read of size 4 at addr 0000000000000004 by task syz-executor5/8809 [ 99.615365] [ 99.617036] CPU: 1 PID: 8809 Comm: syz-executor5 Not tainted 4.17.0-rc1+ #10 [ 99.624228] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 99.633588] Call Trace: [ 99.636189] dump_stack+0x1b9/0x294 [ 99.639829] ? dump_stack_print_info.cold.2+0x52/0x52 [ 99.645031] ? kasan_check_write+0x14/0x20 [ 99.649275] ? do_raw_spin_lock+0xc1/0x200 [ 99.653524] ? vprintk_func+0x81/0xe7 [ 99.657861] ? refcount_inc_not_zero+0x8f/0x2d0 [ 99.662544] kasan_report.cold.7+0x6d/0x2fe [ 99.666882] check_memory_region+0x13e/0x1b0 [ 99.671310] kasan_check_read+0x11/0x20 [ 99.675294] refcount_inc_not_zero+0x8f/0x2d0 [ 99.679800] ? refcount_add_not_zero+0x320/0x320 [ 99.684622] ? trace_hardirqs_on_caller+0x421/0x5c0 [ 99.689647] ? lock_sock_nested+0x9f/0x120 [ 99.693898] refcount_inc+0x15/0x70 [ 99.697532] llc_ui_release+0xba/0x2b0 [ 99.701428] ? fsnotify_first_mark+0x330/0x330 [ 99.706026] sock_release+0x96/0x1b0 [ 99.709769] ? sock_alloc_file+0x4e0/0x4e0 [ 99.714009] sock_close+0x16/0x20 [ 99.717470] __fput+0x34d/0x890 [ 99.720759] ? fput+0x1a0/0x1a0 [ 99.724038] ? _raw_spin_unlock_irq+0x27/0x70 [ 99.728532] ____fput+0x15/0x20 [ 99.731802] task_work_run+0x1e4/0x290 [ 99.735683] ? task_work_cancel+0x240/0x240 [ 99.739999] ? switch_task_namespaces+0xbd/0xd0 [ 99.744668] do_exit+0x1aee/0x2730 [ 99.748193] ? find_held_lock+0x36/0x1c0 [ 99.752250] ? mm_update_next_owner+0x980/0x980 [ 99.756913] ? print_usage_bug+0xc0/0xc0 [ 99.760964] ? lock_downgrade+0x8e0/0x8e0 [ 99.765109] ? __lock_acquire+0x7f5/0x5140 [ 99.769334] ? graph_lock+0x170/0x170 [ 99.773133] ? __lock_acquire+0x7f5/0x5140 [ 99.777356] ? debug_check_no_locks_freed+0x310/0x310 [ 99.782533] ? graph_lock+0x170/0x170 [ 99.786317] ? __lock_is_held+0xb5/0x140 [ 99.790378] ? debug_check_no_locks_freed+0x310/0x310 [ 99.795564] ? __lock_is_held+0xb5/0x140 [ 99.799625] ? set_next_entity+0x2ae/0xaf0 [ 99.803848] ? debug_check_no_locks_freed+0x310/0x310 [ 99.809037] ? update_load_avg+0x2570/0x2570 [ 99.813434] ? graph_lock+0x170/0x170 [ 99.817220] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 99.822749] ? __perf_event_task_sched_out+0x2cc/0x1470 [ 99.828103] ? graph_lock+0x170/0x170 [ 99.831904] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 99.837457] ? graph_lock+0x170/0x170 [ 99.841245] ? find_held_lock+0x36/0x1c0 [ 99.845299] ? memset+0x31/0x40 [ 99.848570] ? find_held_lock+0x36/0x1c0 [ 99.852631] ? lock_downgrade+0x8e0/0x8e0 [ 99.856790] do_group_exit+0x16f/0x430 [ 99.860670] ? do_raw_spin_trylock+0x1b0/0x1b0 [ 99.865240] ? __ia32_sys_exit+0x50/0x50 [ 99.869299] ? _raw_spin_unlock_irq+0x27/0x70 [ 99.873787] ? trace_hardirqs_on_caller+0x421/0x5c0 [ 99.878815] get_signal+0x886/0x1960 [ 99.882527] ? ptrace_notify+0x130/0x130 [ 99.886582] ? __schedule+0x809/0x1e30 [ 99.890464] ? rcu_is_watching+0x85/0x140 [ 99.894613] ? __sched_text_start+0x8/0x8 [ 99.898748] ? mnt_get_count+0x150/0x150 [ 99.902803] ? find_held_lock+0x36/0x1c0 [ 99.906859] do_signal+0x98/0x2040 [ 99.910414] ? lock_downgrade+0x8e0/0x8e0 [ 99.914563] ? setup_sigcontext+0x7d0/0x7d0 [ 99.918915] ? kasan_check_read+0x11/0x20 [ 99.923071] ? do_raw_spin_unlock+0x9e/0x2e0 [ 99.927477] ? schedule+0xef/0x430 [ 99.931022] ? _raw_spin_unlock_irq+0x27/0x70 [ 99.935513] ? __schedule+0x1e30/0x1e30 [ 99.939514] ? exit_to_usermode_loop+0x87/0x310 [ 99.944201] exit_to_usermode_loop+0x28a/0x310 [ 99.948790] ? syscall_slow_exit_work+0x4f0/0x4f0 [ 99.953625] ? fput+0x130/0x1a0 [ 99.956892] ? do_syscall_64+0x92/0x800 [ 99.960864] do_syscall_64+0x6ac/0x800 [ 99.964743] ? finish_task_switch+0x1ca/0x810 [ 99.969226] ? syscall_return_slowpath+0x5c0/0x5c0 [ 99.974166] ? syscall_return_slowpath+0x30f/0x5c0 [ 99.979092] ? entry_SYSCALL_64_after_hwframe+0x59/0xbe [ 99.984448] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 99.989282] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 99.994457] RIP: 0033:0x455389 [ 99.997630] RSP: 002b:00007f8a6bb60c88 EFLAGS: 00000246 ORIG_RAX: 00000000000000ca [ 100.005328] RAX: 0000000000000001 RBX: 00007f8a6bb616d4 RCX: 0000000000455389 [ 100.012584] RDX: 0000000000000015 RSI: 0000000000000001 RDI: 000000000072becc [ 100.019841] RBP: 000000000072bea0 R08: 00007f8a6bb61700 R09: 0000000000000000 [ 100.027093] R10: 0000000000000000 R11: 0000000000000246 R12: 00000000ffffffff [ 100.034350] R13: 000000000000066c R14: 00000000006fcac0 R15: 0000000000000000 [ 100.041619] ================================================================== [ 100.048956] Disabling lock debugging due to kernel taint [ 100.054631] Kernel panic - not syncing: panic_on_warn set ... [ 100.054631] [ 100.062002] CPU: 1 PID: 8809 Comm: syz-executor5 Tainted: G B 4.17.0-rc1+ #10 [ 100.070574] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 100.079924] Call Trace: [ 100.082516] dump_stack+0x1b9/0x294 [ 100.086143] ? dump_stack_print_info.cold.2+0x52/0x52 [ 100.091337] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 100.096096] ? refcount_add_not_zero+0x300/0x320 [ 100.100855] panic+0x22f/0x4de [ 100.104056] ? add_taint.cold.5+0x16/0x16 [ 100.108208] ? do_raw_spin_unlock+0x9e/0x2e0 [ 100.112620] ? do_raw_spin_unlock+0x9e/0x2e0 [ 100.117031] ? refcount_inc_not_zero+0x8f/0x2d0 [ 100.121702] kasan_end_report+0x47/0x4f [ 100.125673] kasan_report.cold.7+0x76/0x2fe [ 100.129992] check_memory_region+0x13e/0x1b0 [ 100.134389] kasan_check_read+0x11/0x20 [ 100.138349] refcount_inc_not_zero+0x8f/0x2d0 [ 100.142835] ? refcount_add_not_zero+0x320/0x320 [ 100.147576] ? trace_hardirqs_on_caller+0x421/0x5c0 [ 100.152577] ? lock_sock_nested+0x9f/0x120 [ 100.156801] refcount_inc+0x15/0x70 [ 100.160414] llc_ui_release+0xba/0x2b0 [ 100.164285] ? fsnotify_first_mark+0x330/0x330 [ 100.168853] sock_release+0x96/0x1b0 [ 100.172553] ? sock_alloc_file+0x4e0/0x4e0 [ 100.176780] sock_close+0x16/0x20 [ 100.180219] __fput+0x34d/0x890 [ 100.183486] ? fput+0x1a0/0x1a0 [ 100.186756] ? _raw_spin_unlock_irq+0x27/0x70 [ 100.191246] ____fput+0x15/0x20 [ 100.194508] task_work_run+0x1e4/0x290 [ 100.198382] ? task_work_cancel+0x240/0x240 [ 100.202692] ? switch_task_namespaces+0xbd/0xd0 [ 100.207349] do_exit+0x1aee/0x2730 [ 100.210872] ? find_held_lock+0x36/0x1c0 [ 100.214923] ? mm_update_next_owner+0x980/0x980 [ 100.219575] ? print_usage_bug+0xc0/0xc0 [ 100.223619] ? lock_downgrade+0x8e0/0x8e0 [ 100.227756] ? __lock_acquire+0x7f5/0x5140 [ 100.231971] ? graph_lock+0x170/0x170 [ 100.235763] ? __lock_acquire+0x7f5/0x5140 [ 100.239985] ? debug_check_no_locks_freed+0x310/0x310 [ 100.245156] ? graph_lock+0x170/0x170 [ 100.248940] ? __lock_is_held+0xb5/0x140 [ 100.252991] ? debug_check_no_locks_freed+0x310/0x310 [ 100.258167] ? __lock_is_held+0xb5/0x140 [ 100.262223] ? set_next_entity+0x2ae/0xaf0 [ 100.266442] ? debug_check_no_locks_freed+0x310/0x310 [ 100.271619] ? update_load_avg+0x2570/0x2570 [ 100.276013] ? graph_lock+0x170/0x170 [ 100.279806] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 100.285328] ? __perf_event_task_sched_out+0x2cc/0x1470 [ 100.290678] ? graph_lock+0x170/0x170 [ 100.294465] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 100.299986] ? graph_lock+0x170/0x170 [ 100.303774] ? find_held_lock+0x36/0x1c0 [ 100.307821] ? memset+0x31/0x40 [ 100.311088] ? find_held_lock+0x36/0x1c0 [ 100.315139] ? lock_downgrade+0x8e0/0x8e0 [ 100.319276] do_group_exit+0x16f/0x430 [ 100.323150] ? do_raw_spin_trylock+0x1b0/0x1b0 [ 100.327716] ? __ia32_sys_exit+0x50/0x50 [ 100.331764] ? _raw_spin_unlock_irq+0x27/0x70 [ 100.336244] ? trace_hardirqs_on_caller+0x421/0x5c0 [ 100.341248] get_signal+0x886/0x1960 [ 100.344952] ? ptrace_notify+0x130/0x130 [ 100.349001] ? __schedule+0x809/0x1e30 [ 100.352880] ? rcu_is_watching+0x85/0x140 [ 100.357021] ? __sched_text_start+0x8/0x8 [ 100.361164] ? mnt_get_count+0x150/0x150 [ 100.365210] ? find_held_lock+0x36/0x1c0 [ 100.369261] do_signal+0x98/0x2040 [ 100.372794] ? lock_downgrade+0x8e0/0x8e0 [ 100.376928] ? setup_sigcontext+0x7d0/0x7d0 [ 100.381233] ? kasan_check_read+0x11/0x20 [ 100.385365] ? do_raw_spin_unlock+0x9e/0x2e0 [ 100.389757] ? schedule+0xef/0x430 [ 100.393280] ? _raw_spin_unlock_irq+0x27/0x70 [ 100.397759] ? __schedule+0x1e30/0x1e30 [ 100.401735] ? exit_to_usermode_loop+0x87/0x310 [ 100.406389] exit_to_usermode_loop+0x28a/0x310 [ 100.410954] ? syscall_slow_exit_work+0x4f0/0x4f0 [ 100.415812] ? fput+0x130/0x1a0 [ 100.419079] ? do_syscall_64+0x92/0x800 [ 100.423046] do_syscall_64+0x6ac/0x800 [ 100.426922] ? finish_task_switch+0x1ca/0x810 [ 100.431413] ? syscall_return_slowpath+0x5c0/0x5c0 [ 100.436332] ? syscall_return_slowpath+0x30f/0x5c0 [ 100.441253] ? entry_SYSCALL_64_after_hwframe+0x59/0xbe [ 100.446604] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 100.451436] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 100.457099] RIP: 0033:0x455389 [ 100.460274] RSP: 002b:00007f8a6bb60c88 EFLAGS: 00000246 ORIG_RAX: 00000000000000ca [ 100.467982] RAX: 0000000000000001 RBX: 00007f8a6bb616d4 RCX: 0000000000455389 [ 100.475244] RDX: 0000000000000015 RSI: 0000000000000001 RDI: 000000000072becc [ 100.482510] RBP: 000000000072bea0 R08: 00007f8a6bb61700 R09: 0000000000000000 [ 100.489762] R10: 0000000000000000 R11: 0000000000000246 R12: 00000000ffffffff [ 100.497022] R13: 000000000000066c R14: 00000000006fcac0 R15: 0000000000000000 [ 100.504735] Dumping ftrace buffer: [ 100.508253] (ftrace buffer empty) [ 100.511941] Kernel Offset: disabled [ 100.515552] Rebooting in 86400 seconds..