(0x7f0000002000)=@ethernet, 0x10) sendmsg$can_bcm(r0, &(0x7f0000000000)={&(0x7f0000004000)={0x1d}, 0x10, &(0x7f0000002ff0)={&(0x7f0000004fb8)={0x5, 0x0, 0x0, {}, {0x0, 0x7530}, {}, 0x1, @can={{}, 0x0, 0x0, 0x0, 0x0, "8e15adecfc04aba1"}}, 0x48}, 0x1}, 0x0) sendmsg$can_bcm(r0, &(0x7f00005e4000)={&(0x7f0000000040)={0x1d}, 0x10, &(0x7f0000000080)={&(0x7f00000aef80)={0x5, 0x0, 0x0, {}, {}, {}, 0x1, @can={{}, 0x0, 0x0, 0x0, 0x0, "e2ba079c66681a29"}}, 0x48}, 0x1}, 0x0) 2018/04/13 21:32:47 executing program 3: perf_event_open(&(0x7f0000348f88)={0x2, 0x70, 0x3e2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000040)='net\x00') fchdir(r0) syz_fuseblk_mount(&(0x7f0000000000)='2/file0\x00', &(0x7f0000dd3ff8)='2/file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) 2018/04/13 21:32:47 executing program 6: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'hash\x00', 0x0, 0x0, 'vmac(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="81081800001d000000010054409d0954", 0x10) r1 = accept(r0, 0x0, &(0x7f00000000c0)) sendmsg$IPVS_CMD_FLUSH(r1, &(0x7f0000000580)={&(0x7f0000000180)={0x10}, 0xc, &(0x7f0000000200)={&(0x7f0000000300)={0x20, 0x0, 0x0, 0x0, 0x0, {0x11}, [@IPVS_CMD_ATTR_DEST={0xc, 0x2, [@IPVS_DEST_ATTR_ACTIVE_CONNS={0x8, 0x7}]}]}, 0x20}, 0x1}, 0x0) 2018/04/13 21:32:47 executing program 1: r0 = semget$private(0x0, 0x7, 0x0) unshare(0x40000) semtimedop(r0, &(0x7f00000a8000)=[{0x0, 0xfffffffffffffff9, 0x1000}], 0x1, &(0x7f0000efe000)={0x2000}) semop(r0, &(0x7f0000000300)=[{0x0, 0x0, 0x1800}], 0x1) semctl$IPC_RMID(r0, 0x0, 0x0) 2018/04/13 21:32:47 executing program 2: r0 = socket$inet_sctp(0x2, 0x1, 0x84) sendto$inet(r0, &(0x7f0000a34fff)='H', 0x1, 0x0, &(0x7f0000030ff0)={0x2, 0x0, @local={0xac, 0x14, 0xffffffffffffffff, 0xaa}}, 0x10) sendto$inet(r0, &(0x7f000026cfff)="c6", 0x1, 0x0, &(0x7f0000033ff0)={0x2, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff, 0xbb}}, 0x10) shutdown(r0, 0x1) getsockopt$inet_sctp_SCTP_STATUS(r0, 0x84, 0xe, &(0x7f0000000200)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, {0x0, @in={{0x2, 0x0, @loopback=0x7f000001}}}}, &(0x7f00000002c0)=0xb0) 2018/04/13 21:32:47 executing program 5: perf_event_open(&(0x7f00000000c0)={0x2, 0x70, 0x3e6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = shmget$private(0x0, 0x1000, 0x0, &(0x7f0000ffc000/0x1000)=nil) shmctl$IPC_RMID(r0, 0x0) 2018/04/13 21:32:47 executing program 7: r0 = socket$inet(0x10, 0x40000000000003, 0x2000000000000c) sendmsg(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000024000)=[{&(0x7f0000000540)="24000000100007031dfffd946fa2830020200a0027000300001d85687f2000000400ff7e28000000030af598fbd6661d47aac420000000000000000000000000000000000000000000000000", 0x4c}], 0x1}, 0x0) 2018/04/13 21:32:47 executing program 5: perf_event_open(&(0x7f00000000c0)={0x2, 0x70, 0x3e6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = shmget$private(0x0, 0x1000, 0x0, &(0x7f0000ffc000/0x1000)=nil) shmctl$IPC_RMID(r0, 0x0) 2018/04/13 21:32:47 executing program 6: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'hash\x00', 0x0, 0x0, 'vmac(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="81081800001d000000010054409d0954", 0x10) r1 = accept(r0, 0x0, &(0x7f00000000c0)) sendmsg$IPVS_CMD_FLUSH(r1, &(0x7f0000000580)={&(0x7f0000000180)={0x10}, 0xc, &(0x7f0000000200)={&(0x7f0000000300)={0x20, 0x0, 0x0, 0x0, 0x0, {0x11}, [@IPVS_CMD_ATTR_DEST={0xc, 0x2, [@IPVS_DEST_ATTR_ACTIVE_CONNS={0x8, 0x7}]}]}, 0x20}, 0x1}, 0x0) 2018/04/13 21:32:47 executing program 4: perf_event_open(&(0x7f0000348f88)={0x2, 0x78, 0x3e2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x5, 0x78, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_bp={&(0x7f0000000000), 0x1}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x3, 0x3a) socketpair$packet(0x11, 0x3, 0x300, &(0x7f0000000080)) setsockopt$inet6_int(r0, 0x29, 0xd0, &(0x7f0000000000)=0xfffffffffffffffd, 0x4) setsockopt$inet6_IPV6_ADDRFORM(r0, 0x29, 0x1, &(0x7f0000000040)=0x2, 0x4) getsockopt$inet_sctp_SCTP_RECONFIG_SUPPORTED(0xffffffffffffffff, 0x84, 0x75, &(0x7f00000000c0)={0x0, 0x7f}, &(0x7f0000000100)=0x8) getsockopt$inet_sctp6_SCTP_RESET_STREAMS(r0, 0x84, 0x77, &(0x7f0000000140)={r1, 0x9, 0x6, [0x0, 0x7fff, 0x0, 0x8001000, 0x9, 0x9]}, &(0x7f0000000180)=0x14) 2018/04/13 21:32:47 executing program 0: r0 = socket$can_bcm(0x1d, 0x2, 0x2) connect(r0, &(0x7f0000002000)=@ethernet, 0x10) sendmsg$can_bcm(r0, &(0x7f0000000000)={&(0x7f0000004000)={0x1d}, 0x10, &(0x7f0000002ff0)={&(0x7f0000004fb8)={0x5, 0x0, 0x0, {}, {0x0, 0x7530}, {}, 0x1, @can={{}, 0x0, 0x0, 0x0, 0x0, "8e15adecfc04aba1"}}, 0x48}, 0x1}, 0x0) sendmsg$can_bcm(r0, &(0x7f00005e4000)={&(0x7f0000000040)={0x1d}, 0x10, &(0x7f0000000080)={&(0x7f00000aef80)={0x5, 0x0, 0x0, {}, {}, {}, 0x1, @can={{}, 0x0, 0x0, 0x0, 0x0, "e2ba079c66681a29"}}, 0x48}, 0x1}, 0x0) 2018/04/13 21:32:47 executing program 3: perf_event_open(&(0x7f0000348f88)={0x2, 0x70, 0x3e2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000040)='net\x00') fchdir(r0) syz_fuseblk_mount(&(0x7f0000000000)='2/file0\x00', &(0x7f0000dd3ff8)='2/file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) [ 248.092584] netlink: 16 bytes leftover after parsing attributes in process `syz-executor7'. 2018/04/13 21:32:47 executing program 6: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'hash\x00', 0x0, 0x0, 'vmac(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="81081800001d000000010054409d0954", 0x10) r1 = accept(r0, 0x0, &(0x7f00000000c0)) sendmsg$IPVS_CMD_FLUSH(r1, &(0x7f0000000580)={&(0x7f0000000180)={0x10}, 0xc, &(0x7f0000000200)={&(0x7f0000000300)={0x20, 0x0, 0x0, 0x0, 0x0, {0x11}, [@IPVS_CMD_ATTR_DEST={0xc, 0x2, [@IPVS_DEST_ATTR_ACTIVE_CONNS={0x8, 0x7}]}]}, 0x20}, 0x1}, 0x0) [ 248.139267] netlink: 20 bytes leftover after parsing attributes in process `syz-executor7'. 2018/04/13 21:32:48 executing program 1: r0 = semget$private(0x0, 0x7, 0x0) unshare(0x40000) semtimedop(r0, &(0x7f00000a8000)=[{0x0, 0xfffffffffffffff9, 0x1000}], 0x1, &(0x7f0000efe000)={0x2000}) semop(r0, &(0x7f0000000300)=[{0x0, 0x0, 0x1800}], 0x1) semctl$IPC_RMID(r0, 0x0, 0x0) 2018/04/13 21:32:48 executing program 5: perf_event_open(&(0x7f00000000c0)={0x2, 0x70, 0x3e6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = shmget$private(0x0, 0x1000, 0x0, &(0x7f0000ffc000/0x1000)=nil) shmctl$IPC_RMID(r0, 0x0) 2018/04/13 21:32:48 executing program 0: r0 = socket$can_bcm(0x1d, 0x2, 0x2) connect(r0, &(0x7f0000002000)=@ethernet, 0x10) sendmsg$can_bcm(r0, &(0x7f0000000000)={&(0x7f0000004000)={0x1d}, 0x10, &(0x7f0000002ff0)={&(0x7f0000004fb8)={0x5, 0x0, 0x0, {}, {0x0, 0x7530}, {}, 0x1, @can={{}, 0x0, 0x0, 0x0, 0x0, "8e15adecfc04aba1"}}, 0x48}, 0x1}, 0x0) sendmsg$can_bcm(r0, &(0x7f00005e4000)={&(0x7f0000000040)={0x1d}, 0x10, &(0x7f0000000080)={&(0x7f00000aef80)={0x5, 0x0, 0x0, {}, {}, {}, 0x1, @can={{}, 0x0, 0x0, 0x0, 0x0, "e2ba079c66681a29"}}, 0x48}, 0x1}, 0x0) 2018/04/13 21:32:48 executing program 6: perf_event_open(&(0x7f00000000c0)={0x2, 0x70, 0x3e6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = shmget$private(0x0, 0x1000, 0x0, &(0x7f0000ffc000/0x1000)=nil) shmctl$IPC_RMID(r0, 0x0) 2018/04/13 21:32:48 executing program 7: r0 = socket$inet(0x10, 0x40000000000003, 0x2000000000000c) sendmsg(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000024000)=[{&(0x7f0000000540)="24000000100007031dfffd946fa2830020200a0027000300001d85687f2000000400ff7e28000000030af598fbd6661d47aac420000000000000000000000000000000000000000000000000", 0x4c}], 0x1}, 0x0) 2018/04/13 21:32:48 executing program 3: perf_event_open(&(0x7f0000348f88)={0x2, 0x70, 0x3e2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000040)='net\x00') fchdir(r0) syz_fuseblk_mount(&(0x7f0000000000)='2/file0\x00', &(0x7f0000dd3ff8)='2/file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) 2018/04/13 21:32:48 executing program 2: r0 = socket$inet_sctp(0x2, 0x1, 0x84) sendto$inet(r0, &(0x7f0000a34fff)='H', 0x1, 0x0, &(0x7f0000030ff0)={0x2, 0x0, @local={0xac, 0x14, 0xffffffffffffffff, 0xaa}}, 0x10) sendto$inet(r0, &(0x7f000026cfff)="c6", 0x1, 0x0, &(0x7f0000033ff0)={0x2, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff, 0xbb}}, 0x10) shutdown(r0, 0x1) getsockopt$inet_sctp_SCTP_STATUS(r0, 0x84, 0xe, &(0x7f0000000200)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, {0x0, @in={{0x2, 0x0, @loopback=0x7f000001}}}}, &(0x7f00000002c0)=0xb0) 2018/04/13 21:32:48 executing program 4: socket$inet6_dccp(0xa, 0x6, 0x0) socket$packet(0x11, 0x2, 0x300) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000000280)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000380)={{{@in=@multicast2, @in6=@remote}}, {{@in6=@local}, 0x0, @in6=@loopback}}, &(0x7f00000002c0)=0xe8) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'hash\x00', 0x0, 0x0, 'vmac(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="81081800001d000000010054409d0954", 0x10) r1 = accept(r0, 0x0, &(0x7f00000000c0)) ioctl$DRM_IOCTL_RES_CTX(0xffffffffffffff9c, 0xc0106426, &(0x7f0000000140)={0x3, &(0x7f0000001280)=[{}, {}, {}]}) sendto$inet(r1, &(0x7f0000000140), 0x334, 0x0, &(0x7f0000000240)={0x2, 0x0, @multicast2=0xe0000002}, 0x10) 2018/04/13 21:32:48 executing program 5: perf_event_open(&(0x7f00000000c0)={0x2, 0x70, 0x3e6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = shmget$private(0x0, 0x1000, 0x0, &(0x7f0000ffc000/0x1000)=nil) shmctl$IPC_RMID(r0, 0x0) 2018/04/13 21:32:48 executing program 0: r0 = socket$can_bcm(0x1d, 0x2, 0x2) connect(r0, &(0x7f0000002000)=@ethernet, 0x10) sendmsg$can_bcm(r0, &(0x7f0000000000)={&(0x7f0000004000)={0x1d}, 0x10, &(0x7f0000002ff0)={&(0x7f0000004fb8)={0x5, 0x0, 0x0, {}, {0x0, 0x7530}, {}, 0x1, @can={{}, 0x0, 0x0, 0x0, 0x0, "8e15adecfc04aba1"}}, 0x48}, 0x1}, 0x0) sendmsg$can_bcm(r0, &(0x7f00005e4000)={&(0x7f0000000040)={0x1d}, 0x10, &(0x7f0000000080)={&(0x7f00000aef80)={0x5, 0x0, 0x0, {}, {}, {}, 0x1, @can={{}, 0x0, 0x0, 0x0, 0x0, "e2ba079c66681a29"}}, 0x48}, 0x1}, 0x0) 2018/04/13 21:32:48 executing program 3: perf_event_open(&(0x7f0000348f88)={0x2, 0x70, 0x3e2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000040)='net\x00') fchdir(r0) syz_fuseblk_mount(&(0x7f0000000000)='2/file0\x00', &(0x7f0000dd3ff8)='2/file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) 2018/04/13 21:32:48 executing program 6: perf_event_open(&(0x7f00000000c0)={0x2, 0x70, 0x3e6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = shmget$private(0x0, 0x1000, 0x0, &(0x7f0000ffc000/0x1000)=nil) shmctl$IPC_RMID(r0, 0x0) 2018/04/13 21:32:48 executing program 4: socket$inet6_dccp(0xa, 0x6, 0x0) socket$packet(0x11, 0x2, 0x300) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000000280)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000380)={{{@in=@multicast2, @in6=@remote}}, {{@in6=@local}, 0x0, @in6=@loopback}}, &(0x7f00000002c0)=0xe8) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'hash\x00', 0x0, 0x0, 'vmac(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="81081800001d000000010054409d0954", 0x10) r1 = accept(r0, 0x0, &(0x7f00000000c0)) ioctl$DRM_IOCTL_RES_CTX(0xffffffffffffff9c, 0xc0106426, &(0x7f0000000140)={0x3, &(0x7f0000001280)=[{}, {}, {}]}) sendto$inet(r1, &(0x7f0000000140), 0x334, 0x0, &(0x7f0000000240)={0x2, 0x0, @multicast2=0xe0000002}, 0x10) [ 249.019570] netlink: 16 bytes leftover after parsing attributes in process `syz-executor7'. [ 249.059167] netlink: 20 bytes leftover after parsing attributes in process `syz-executor7'. 2018/04/13 21:32:48 executing program 7: r0 = socket$inet(0x10, 0x40000000000003, 0x2000000000000c) sendmsg(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000024000)=[{&(0x7f0000000540)="24000000100007031dfffd946fa2830020200a0027000300001d85687f2000000400ff7e28000000030af598fbd6661d47aac420000000000000000000000000000000000000000000000000", 0x4c}], 0x1}, 0x0) 2018/04/13 21:32:48 executing program 6: perf_event_open(&(0x7f00000000c0)={0x2, 0x70, 0x3e6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = shmget$private(0x0, 0x1000, 0x0, &(0x7f0000ffc000/0x1000)=nil) shmctl$IPC_RMID(r0, 0x0) 2018/04/13 21:32:48 executing program 3: r0 = syz_init_net_socket$llc(0x1a, 0x1, 0x0) setsockopt$llc_int(r0, 0x10c, 0x4, &(0x7f0000000000)=0x405, 0x4) [ 249.223984] netlink: 16 bytes leftover after parsing attributes in process `syz-executor7'. [ 249.259459] netlink: 20 bytes leftover after parsing attributes in process `syz-executor7'. 2018/04/13 21:32:49 executing program 4: socket$inet6_dccp(0xa, 0x6, 0x0) socket$packet(0x11, 0x2, 0x300) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000000280)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000380)={{{@in=@multicast2, @in6=@remote}}, {{@in6=@local}, 0x0, @in6=@loopback}}, &(0x7f00000002c0)=0xe8) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'hash\x00', 0x0, 0x0, 'vmac(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="81081800001d000000010054409d0954", 0x10) r1 = accept(r0, 0x0, &(0x7f00000000c0)) ioctl$DRM_IOCTL_RES_CTX(0xffffffffffffff9c, 0xc0106426, &(0x7f0000000140)={0x3, &(0x7f0000001280)=[{}, {}, {}]}) sendto$inet(r1, &(0x7f0000000140), 0x334, 0x0, &(0x7f0000000240)={0x2, 0x0, @multicast2=0xe0000002}, 0x10) 2018/04/13 21:32:49 executing program 5: r0 = socket$can_bcm(0x1d, 0x2, 0x2) connect(r0, &(0x7f0000002000)=@ethernet, 0x10) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f000000ffd8)={'vcan0\x00', 0x0}) sendmsg$can_bcm(r0, &(0x7f000000dfc8)={&(0x7f0000019ff0)={0x1d, r1}, 0x10, &(0x7f000000eff0)={&(0x7f0000019000)={0x1, 0x0, 0x0, {0x0, 0x7530}, {}, {}, 0x1, @can={{}, 0x0, 0x0, 0x0, 0x0, "405e51f3ac446a3e"}}, 0x48}, 0x1}, 0x0) sendmsg$can_bcm(r0, &(0x7f0000000140)={&(0x7f0000000040)={0x1d, r1}, 0x10, &(0x7f0000000100)={&(0x7f0000000080)={0x1, 0x0, 0x0, {0x0, 0x7530}, {0x77359400}, {0x4}, 0x1, @can={{}, 0x0, 0x0, 0x0, 0x0, "58ea10a2d4df2388"}}, 0x48}, 0x1}, 0x0) sendmsg$can_bcm(r0, &(0x7f0000000000)={&(0x7f0000007ff0)={0x1d, r1}, 0x10, &(0x7f0000002ff0)={&(0x7f000000afb8)={0x1, 0x0, 0x0, {0x0, 0x7530}, {}, {}, 0x1, @can={{}, 0x0, 0x0, 0x0, 0x0, "8e15adecfc04aba1"}}, 0x48}, 0x1}, 0x0) 2018/04/13 21:32:49 executing program 0: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f000033efc8)={0x0, 0x0, &(0x7f0000aa8000)={&(0x7f0000000000)={0x2, 0x9, 0x0, 0x7, 0x2}, 0x10}, 0x1}, 0x0) 2018/04/13 21:32:49 executing program 3: r0 = syz_init_net_socket$llc(0x1a, 0x1, 0x0) setsockopt$llc_int(r0, 0x10c, 0x4, &(0x7f0000000000)=0x405, 0x4) 2018/04/13 21:32:49 executing program 6: r0 = socket$inet(0x2, 0x802, 0x0) perf_event_open(&(0x7f0000348f88)={0x2, 0x70, 0x3e2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000580)=@broute={'broute\x00', 0x20, 0x2, 0x230, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000040], 0x0, &(0x7f0000000280), &(0x7f0000000040)=[{0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff, 0x2, [{{{0x11, 0x0, 0x0, 'dummy0\x00', 'vlan0\x00', 'ip6gre0\x00', 'vcan0\x00', @empty, [], @empty, [0x0, 0x0, 0x0, 0x0, 0x0, 0x10], 0x70, 0xa0, 0xe8}, [@common=@CLASSIFY={'CLASSIFY\x00', 0x8}]}, @common=@RATEEST={'RATEEST\x00', 0x20, {{'syz0\x00', 0x3}}}}, {{{0x1d, 0x0, 0x0, 'teql0\x00', 'vcan0\x00', 'vlan0\x00', 'ifb0\x00', @random="56190635f233", [], @random="d238742a69de", [], 0x70, 0x70, 0xb8}}, @common=@RATEEST={'RATEEST\x00', 0x20, {{'syz0\x00', 0x3}}}}]}, {0x0, '\x00', 0x2, 0xfffffffffffffffc}]}, 0x2a8) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000880)=@broute={'broute\x00', 0x20, 0x1, 0x150, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000700], 0x0, &(0x7f00000006c0), &(0x7f0000000700)=[{0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x1b, 0x0, 0x0, 'bcsf0\x00', 'teql0\x00', 'ip_vti0\x00', 'erspan0\x00', @empty, [], @random="c8992de4105a", [], 0x70, 0x70, 0xc0}}, @common=@LED={'LED\x00', 0x28, {{'syz1\x00'}}}}]}]}, 0x1c8) 2018/04/13 21:32:49 executing program 7: r0 = socket$inet(0x10, 0x40000000000003, 0x2000000000000c) sendmsg(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000024000)=[{&(0x7f0000000540)="24000000100007031dfffd946fa2830020200a0027000300001d85687f2000000400ff7e28000000030af598fbd6661d47aac420000000000000000000000000000000000000000000000000", 0x4c}], 0x1}, 0x0) 2018/04/13 21:32:49 executing program 2: r0 = socket$inet_sctp(0x2, 0x1, 0x84) sendto$inet(r0, &(0x7f0000a34fff)='H', 0x1, 0x0, &(0x7f0000030ff0)={0x2, 0x0, @local={0xac, 0x14, 0xffffffffffffffff, 0xaa}}, 0x10) sendto$inet(r0, &(0x7f000026cfff)="c6", 0x1, 0x0, &(0x7f0000033ff0)={0x2, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff, 0xbb}}, 0x10) shutdown(r0, 0x1) getsockopt$inet_sctp_SCTP_STATUS(r0, 0x84, 0xe, &(0x7f0000000200)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, {0x0, @in={{0x2, 0x0, @loopback=0x7f000001}}}}, &(0x7f00000002c0)=0xb0) 2018/04/13 21:32:49 executing program 1: r0 = semget$private(0x0, 0x7, 0x0) unshare(0x40000) semtimedop(r0, &(0x7f00000a8000)=[{0x0, 0xfffffffffffffff9, 0x1000}], 0x1, &(0x7f0000efe000)={0x2000}) semop(r0, &(0x7f0000000300)=[{0x0, 0x0, 0x1800}], 0x1) semctl$IPC_RMID(r0, 0x0, 0x0) 2018/04/13 21:32:49 executing program 5: r0 = socket$can_bcm(0x1d, 0x2, 0x2) connect(r0, &(0x7f0000002000)=@ethernet, 0x10) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f000000ffd8)={'vcan0\x00', 0x0}) sendmsg$can_bcm(r0, &(0x7f000000dfc8)={&(0x7f0000019ff0)={0x1d, r1}, 0x10, &(0x7f000000eff0)={&(0x7f0000019000)={0x1, 0x0, 0x0, {0x0, 0x7530}, {}, {}, 0x1, @can={{}, 0x0, 0x0, 0x0, 0x0, "405e51f3ac446a3e"}}, 0x48}, 0x1}, 0x0) sendmsg$can_bcm(r0, &(0x7f0000000140)={&(0x7f0000000040)={0x1d, r1}, 0x10, &(0x7f0000000100)={&(0x7f0000000080)={0x1, 0x0, 0x0, {0x0, 0x7530}, {0x77359400}, {0x4}, 0x1, @can={{}, 0x0, 0x0, 0x0, 0x0, "58ea10a2d4df2388"}}, 0x48}, 0x1}, 0x0) sendmsg$can_bcm(r0, &(0x7f0000000000)={&(0x7f0000007ff0)={0x1d, r1}, 0x10, &(0x7f0000002ff0)={&(0x7f000000afb8)={0x1, 0x0, 0x0, {0x0, 0x7530}, {}, {}, 0x1, @can={{}, 0x0, 0x0, 0x0, 0x0, "8e15adecfc04aba1"}}, 0x48}, 0x1}, 0x0) 2018/04/13 21:32:49 executing program 4: socket$inet6_dccp(0xa, 0x6, 0x0) socket$packet(0x11, 0x2, 0x300) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000000280)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000380)={{{@in=@multicast2, @in6=@remote}}, {{@in6=@local}, 0x0, @in6=@loopback}}, &(0x7f00000002c0)=0xe8) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'hash\x00', 0x0, 0x0, 'vmac(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="81081800001d000000010054409d0954", 0x10) r1 = accept(r0, 0x0, &(0x7f00000000c0)) ioctl$DRM_IOCTL_RES_CTX(0xffffffffffffff9c, 0xc0106426, &(0x7f0000000140)={0x3, &(0x7f0000001280)=[{}, {}, {}]}) sendto$inet(r1, &(0x7f0000000140), 0x334, 0x0, &(0x7f0000000240)={0x2, 0x0, @multicast2=0xe0000002}, 0x10) [ 249.981468] netlink: 16 bytes leftover after parsing attributes in process `syz-executor7'. 2018/04/13 21:32:49 executing program 3: r0 = syz_init_net_socket$llc(0x1a, 0x1, 0x0) setsockopt$llc_int(r0, 0x10c, 0x4, &(0x7f0000000000)=0x405, 0x4) 2018/04/13 21:32:49 executing program 6: r0 = socket$inet(0x2, 0x802, 0x0) perf_event_open(&(0x7f0000348f88)={0x2, 0x70, 0x3e2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000580)=@broute={'broute\x00', 0x20, 0x2, 0x230, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000040], 0x0, &(0x7f0000000280), &(0x7f0000000040)=[{0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff, 0x2, [{{{0x11, 0x0, 0x0, 'dummy0\x00', 'vlan0\x00', 'ip6gre0\x00', 'vcan0\x00', @empty, [], @empty, [0x0, 0x0, 0x0, 0x0, 0x0, 0x10], 0x70, 0xa0, 0xe8}, [@common=@CLASSIFY={'CLASSIFY\x00', 0x8}]}, @common=@RATEEST={'RATEEST\x00', 0x20, {{'syz0\x00', 0x3}}}}, {{{0x1d, 0x0, 0x0, 'teql0\x00', 'vcan0\x00', 'vlan0\x00', 'ifb0\x00', @random="56190635f233", [], @random="d238742a69de", [], 0x70, 0x70, 0xb8}}, @common=@RATEEST={'RATEEST\x00', 0x20, {{'syz0\x00', 0x3}}}}]}, {0x0, '\x00', 0x2, 0xfffffffffffffffc}]}, 0x2a8) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000880)=@broute={'broute\x00', 0x20, 0x1, 0x150, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000700], 0x0, &(0x7f00000006c0), &(0x7f0000000700)=[{0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x1b, 0x0, 0x0, 'bcsf0\x00', 'teql0\x00', 'ip_vti0\x00', 'erspan0\x00', @empty, [], @random="c8992de4105a", [], 0x70, 0x70, 0xc0}}, @common=@LED={'LED\x00', 0x28, {{'syz1\x00'}}}}]}]}, 0x1c8) 2018/04/13 21:32:49 executing program 0: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f000033efc8)={0x0, 0x0, &(0x7f0000aa8000)={&(0x7f0000000000)={0x2, 0x9, 0x0, 0x7, 0x2}, 0x10}, 0x1}, 0x0) [ 250.026685] netlink: 20 bytes leftover after parsing attributes in process `syz-executor7'. 2018/04/13 21:32:49 executing program 5: r0 = socket$can_bcm(0x1d, 0x2, 0x2) connect(r0, &(0x7f0000002000)=@ethernet, 0x10) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f000000ffd8)={'vcan0\x00', 0x0}) sendmsg$can_bcm(r0, &(0x7f000000dfc8)={&(0x7f0000019ff0)={0x1d, r1}, 0x10, &(0x7f000000eff0)={&(0x7f0000019000)={0x1, 0x0, 0x0, {0x0, 0x7530}, {}, {}, 0x1, @can={{}, 0x0, 0x0, 0x0, 0x0, "405e51f3ac446a3e"}}, 0x48}, 0x1}, 0x0) sendmsg$can_bcm(r0, &(0x7f0000000140)={&(0x7f0000000040)={0x1d, r1}, 0x10, &(0x7f0000000100)={&(0x7f0000000080)={0x1, 0x0, 0x0, {0x0, 0x7530}, {0x77359400}, {0x4}, 0x1, @can={{}, 0x0, 0x0, 0x0, 0x0, "58ea10a2d4df2388"}}, 0x48}, 0x1}, 0x0) sendmsg$can_bcm(r0, &(0x7f0000000000)={&(0x7f0000007ff0)={0x1d, r1}, 0x10, &(0x7f0000002ff0)={&(0x7f000000afb8)={0x1, 0x0, 0x0, {0x0, 0x7530}, {}, {}, 0x1, @can={{}, 0x0, 0x0, 0x0, 0x0, "8e15adecfc04aba1"}}, 0x48}, 0x1}, 0x0) 2018/04/13 21:32:49 executing program 4: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) getsockopt$netrom_NETROM_N2(0xffffffffffffffff, 0x103, 0x3, &(0x7f0000000180)=0xfb32, &(0x7f00000001c0)=0x4) sendmsg$nl_xfrm(r0, &(0x7f0000000100)={&(0x7f0000f4dff4)={0x10}, 0x4d9, &(0x7f0000000040)={&(0x7f0000000080)=@migrate={0x15c, 0x21, 0x1, 0x0, 0x0, {{@in6=@ipv4={[], [0xff, 0xff], @multicast1=0xe0000001}, @in6=@dev={0xfe, 0x80}}}, [@migrate={0x10c, 0x11}]}, 0x15c}, 0x1}, 0x0) 2018/04/13 21:32:49 executing program 7: r0 = socket$inet6(0xa, 0x80803, 0x2f) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f00000003c0)={{{@in=@dev={0xac, 0x14, 0x14}, @in=@dev={0xac, 0x14, 0x14}, 0x0, 0x0, 0x0, 0x0, 0xa, 0x0, 0xfffffffffffffffd}, {}, {}, 0x0, 0x0, 0x10000001}, {{@in6=@loopback={0x0, 0x1}, 0x0, 0x6c}, 0x0, @in=@remote={0xac, 0x14, 0x14, 0xbb}}}, 0xe8) connect$inet6(r0, &(0x7f00000000c0)={0xa}, 0x1c) 2018/04/13 21:32:49 executing program 3: r0 = syz_init_net_socket$llc(0x1a, 0x1, 0x0) setsockopt$llc_int(r0, 0x10c, 0x4, &(0x7f0000000000)=0x405, 0x4) 2018/04/13 21:32:49 executing program 6: r0 = socket$inet(0x2, 0x802, 0x0) perf_event_open(&(0x7f0000348f88)={0x2, 0x70, 0x3e2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000580)=@broute={'broute\x00', 0x20, 0x2, 0x230, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000040], 0x0, &(0x7f0000000280), &(0x7f0000000040)=[{0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff, 0x2, [{{{0x11, 0x0, 0x0, 'dummy0\x00', 'vlan0\x00', 'ip6gre0\x00', 'vcan0\x00', @empty, [], @empty, [0x0, 0x0, 0x0, 0x0, 0x0, 0x10], 0x70, 0xa0, 0xe8}, [@common=@CLASSIFY={'CLASSIFY\x00', 0x8}]}, @common=@RATEEST={'RATEEST\x00', 0x20, {{'syz0\x00', 0x3}}}}, {{{0x1d, 0x0, 0x0, 'teql0\x00', 'vcan0\x00', 'vlan0\x00', 'ifb0\x00', @random="56190635f233", [], @random="d238742a69de", [], 0x70, 0x70, 0xb8}}, @common=@RATEEST={'RATEEST\x00', 0x20, {{'syz0\x00', 0x3}}}}]}, {0x0, '\x00', 0x2, 0xfffffffffffffffc}]}, 0x2a8) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000880)=@broute={'broute\x00', 0x20, 0x1, 0x150, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000700], 0x0, &(0x7f00000006c0), &(0x7f0000000700)=[{0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x1b, 0x0, 0x0, 'bcsf0\x00', 'teql0\x00', 'ip_vti0\x00', 'erspan0\x00', @empty, [], @random="c8992de4105a", [], 0x70, 0x70, 0xc0}}, @common=@LED={'LED\x00', 0x28, {{'syz1\x00'}}}}]}]}, 0x1c8) 2018/04/13 21:32:50 executing program 0: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f000033efc8)={0x0, 0x0, &(0x7f0000aa8000)={&(0x7f0000000000)={0x2, 0x9, 0x0, 0x7, 0x2}, 0x10}, 0x1}, 0x0) 2018/04/13 21:32:50 executing program 5: r0 = socket$can_bcm(0x1d, 0x2, 0x2) connect(r0, &(0x7f0000002000)=@ethernet, 0x10) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f000000ffd8)={'vcan0\x00', 0x0}) sendmsg$can_bcm(r0, &(0x7f000000dfc8)={&(0x7f0000019ff0)={0x1d, r1}, 0x10, &(0x7f000000eff0)={&(0x7f0000019000)={0x1, 0x0, 0x0, {0x0, 0x7530}, {}, {}, 0x1, @can={{}, 0x0, 0x0, 0x0, 0x0, "405e51f3ac446a3e"}}, 0x48}, 0x1}, 0x0) sendmsg$can_bcm(r0, &(0x7f0000000140)={&(0x7f0000000040)={0x1d, r1}, 0x10, &(0x7f0000000100)={&(0x7f0000000080)={0x1, 0x0, 0x0, {0x0, 0x7530}, {0x77359400}, {0x4}, 0x1, @can={{}, 0x0, 0x0, 0x0, 0x0, "58ea10a2d4df2388"}}, 0x48}, 0x1}, 0x0) sendmsg$can_bcm(r0, &(0x7f0000000000)={&(0x7f0000007ff0)={0x1d, r1}, 0x10, &(0x7f0000002ff0)={&(0x7f000000afb8)={0x1, 0x0, 0x0, {0x0, 0x7530}, {}, {}, 0x1, @can={{}, 0x0, 0x0, 0x0, 0x0, "8e15adecfc04aba1"}}, 0x48}, 0x1}, 0x0) 2018/04/13 21:32:50 executing program 4: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) getsockopt$netrom_NETROM_N2(0xffffffffffffffff, 0x103, 0x3, &(0x7f0000000180)=0xfb32, &(0x7f00000001c0)=0x4) sendmsg$nl_xfrm(r0, &(0x7f0000000100)={&(0x7f0000f4dff4)={0x10}, 0x4d9, &(0x7f0000000040)={&(0x7f0000000080)=@migrate={0x15c, 0x21, 0x1, 0x0, 0x0, {{@in6=@ipv4={[], [0xff, 0xff], @multicast1=0xe0000001}, @in6=@dev={0xfe, 0x80}}}, [@migrate={0x10c, 0x11}]}, 0x15c}, 0x1}, 0x0) 2018/04/13 21:32:50 executing program 2: write$cgroup_pid(0xffffffffffffffff, &(0x7f00000012c0)=ANY=[], 0xffffff4b) r0 = userfaultfd(0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000000040)={0xaa, 0xe}) sched_setscheduler(0x0, 0x1, &(0x7f00000005c0)=0x40) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000000580)={{&(0x7f0000ffd000/0x1000)=nil, 0x1000}, 0x1}) clone(0x0, &(0x7f0000001f37), &(0x7f00000000c0), &(0x7f0000001000), &(0x7f0000001000)) read(r0, &(0x7f0000000300)=""/100, 0x64) ioctl$TIOCLINUX7(0xffffffffffffffff, 0x541c, &(0x7f0000000300)={0x7}) 2018/04/13 21:32:50 executing program 3: prctl$intptr(0x1c, 0x64) prctl$intptr(0x8000000000000008, 0x0) 2018/04/13 21:32:50 executing program 7: r0 = socket$inet6(0xa, 0x80803, 0x2f) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f00000003c0)={{{@in=@dev={0xac, 0x14, 0x14}, @in=@dev={0xac, 0x14, 0x14}, 0x0, 0x0, 0x0, 0x0, 0xa, 0x0, 0xfffffffffffffffd}, {}, {}, 0x0, 0x0, 0x10000001}, {{@in6=@loopback={0x0, 0x1}, 0x0, 0x6c}, 0x0, @in=@remote={0xac, 0x14, 0x14, 0xbb}}}, 0xe8) connect$inet6(r0, &(0x7f00000000c0)={0xa}, 0x1c) 2018/04/13 21:32:50 executing program 6: r0 = socket$inet(0x2, 0x802, 0x0) perf_event_open(&(0x7f0000348f88)={0x2, 0x70, 0x3e2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000580)=@broute={'broute\x00', 0x20, 0x2, 0x230, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000040], 0x0, &(0x7f0000000280), &(0x7f0000000040)=[{0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff, 0x2, [{{{0x11, 0x0, 0x0, 'dummy0\x00', 'vlan0\x00', 'ip6gre0\x00', 'vcan0\x00', @empty, [], @empty, [0x0, 0x0, 0x0, 0x0, 0x0, 0x10], 0x70, 0xa0, 0xe8}, [@common=@CLASSIFY={'CLASSIFY\x00', 0x8}]}, @common=@RATEEST={'RATEEST\x00', 0x20, {{'syz0\x00', 0x3}}}}, {{{0x1d, 0x0, 0x0, 'teql0\x00', 'vcan0\x00', 'vlan0\x00', 'ifb0\x00', @random="56190635f233", [], @random="d238742a69de", [], 0x70, 0x70, 0xb8}}, @common=@RATEEST={'RATEEST\x00', 0x20, {{'syz0\x00', 0x3}}}}]}, {0x0, '\x00', 0x2, 0xfffffffffffffffc}]}, 0x2a8) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000880)=@broute={'broute\x00', 0x20, 0x1, 0x150, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000700], 0x0, &(0x7f00000006c0), &(0x7f0000000700)=[{0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x1b, 0x0, 0x0, 'bcsf0\x00', 'teql0\x00', 'ip_vti0\x00', 'erspan0\x00', @empty, [], @random="c8992de4105a", [], 0x70, 0x70, 0xc0}}, @common=@LED={'LED\x00', 0x28, {{'syz1\x00'}}}}]}]}, 0x1c8) 2018/04/13 21:32:50 executing program 1: r0 = semget$private(0x0, 0x7, 0x0) unshare(0x40000) semtimedop(r0, &(0x7f00000a8000)=[{0x0, 0xfffffffffffffff9, 0x1000}], 0x1, &(0x7f0000efe000)={0x2000}) semop(r0, &(0x7f0000000300)=[{0x0, 0x0, 0x1800}], 0x1) semctl$IPC_RMID(r0, 0x0, 0x0) 2018/04/13 21:32:50 executing program 4: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) getsockopt$netrom_NETROM_N2(0xffffffffffffffff, 0x103, 0x3, &(0x7f0000000180)=0xfb32, &(0x7f00000001c0)=0x4) sendmsg$nl_xfrm(r0, &(0x7f0000000100)={&(0x7f0000f4dff4)={0x10}, 0x4d9, &(0x7f0000000040)={&(0x7f0000000080)=@migrate={0x15c, 0x21, 0x1, 0x0, 0x0, {{@in6=@ipv4={[], [0xff, 0xff], @multicast1=0xe0000001}, @in6=@dev={0xfe, 0x80}}}, [@migrate={0x10c, 0x11}]}, 0x15c}, 0x1}, 0x0) 2018/04/13 21:32:50 executing program 3: prctl$intptr(0x1c, 0x64) prctl$intptr(0x8000000000000008, 0x0) 2018/04/13 21:32:50 executing program 5: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) unshare(0x40600) fchmod(r0, 0x0) 2018/04/13 21:32:50 executing program 7: r0 = socket$inet6(0xa, 0x80803, 0x2f) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f00000003c0)={{{@in=@dev={0xac, 0x14, 0x14}, @in=@dev={0xac, 0x14, 0x14}, 0x0, 0x0, 0x0, 0x0, 0xa, 0x0, 0xfffffffffffffffd}, {}, {}, 0x0, 0x0, 0x10000001}, {{@in6=@loopback={0x0, 0x1}, 0x0, 0x6c}, 0x0, @in=@remote={0xac, 0x14, 0x14, 0xbb}}}, 0xe8) connect$inet6(r0, &(0x7f00000000c0)={0xa}, 0x1c) 2018/04/13 21:32:50 executing program 6: r0 = socket$pppoe(0x18, 0x1, 0x0) connect$pppoe(r0, &(0x7f00000001c0)={0x18, 0x0, {0x3, @local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, 'bond0\x00'}}, 0x1e) r1 = socket$pppoe(0x18, 0x1, 0x0) connect$pppoe(r1, &(0x7f00000001c0)={0x18, 0x0, {0x3, @local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, 'ip6_vti0\x00'}}, 0x1e) r2 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000000)={'lo\x00', 0x0}) ioctl$sock_SIOCGIFINDEX(r2, 0x8937, &(0x7f0000000040)={'bond0\x00', r3}) 2018/04/13 21:32:50 executing program 0: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f000033efc8)={0x0, 0x0, &(0x7f0000aa8000)={&(0x7f0000000000)={0x2, 0x9, 0x0, 0x7, 0x2}, 0x10}, 0x1}, 0x0) 2018/04/13 21:32:50 executing program 3: prctl$intptr(0x1c, 0x64) prctl$intptr(0x8000000000000008, 0x0) 2018/04/13 21:32:51 executing program 5: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) unshare(0x40600) fchmod(r0, 0x0) 2018/04/13 21:32:51 executing program 6: r0 = socket$pppoe(0x18, 0x1, 0x0) connect$pppoe(r0, &(0x7f00000001c0)={0x18, 0x0, {0x3, @local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, 'bond0\x00'}}, 0x1e) r1 = socket$pppoe(0x18, 0x1, 0x0) connect$pppoe(r1, &(0x7f00000001c0)={0x18, 0x0, {0x3, @local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, 'ip6_vti0\x00'}}, 0x1e) r2 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000000)={'lo\x00', 0x0}) ioctl$sock_SIOCGIFINDEX(r2, 0x8937, &(0x7f0000000040)={'bond0\x00', r3}) 2018/04/13 21:32:51 executing program 4: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) getsockopt$netrom_NETROM_N2(0xffffffffffffffff, 0x103, 0x3, &(0x7f0000000180)=0xfb32, &(0x7f00000001c0)=0x4) sendmsg$nl_xfrm(r0, &(0x7f0000000100)={&(0x7f0000f4dff4)={0x10}, 0x4d9, &(0x7f0000000040)={&(0x7f0000000080)=@migrate={0x15c, 0x21, 0x1, 0x0, 0x0, {{@in6=@ipv4={[], [0xff, 0xff], @multicast1=0xe0000001}, @in6=@dev={0xfe, 0x80}}}, [@migrate={0x10c, 0x11}]}, 0x15c}, 0x1}, 0x0) 2018/04/13 21:32:51 executing program 7: r0 = socket$inet6(0xa, 0x80803, 0x2f) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f00000003c0)={{{@in=@dev={0xac, 0x14, 0x14}, @in=@dev={0xac, 0x14, 0x14}, 0x0, 0x0, 0x0, 0x0, 0xa, 0x0, 0xfffffffffffffffd}, {}, {}, 0x0, 0x0, 0x10000001}, {{@in6=@loopback={0x0, 0x1}, 0x0, 0x6c}, 0x0, @in=@remote={0xac, 0x14, 0x14, 0xbb}}}, 0xe8) connect$inet6(r0, &(0x7f00000000c0)={0xa}, 0x1c) 2018/04/13 21:32:51 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0xc, 0x3, &(0x7f0000000140)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x14, 0x25}, [], {0x95}}, &(0x7f0000003ff6)='syzkaller\x00', 0x5, 0xc3, &(0x7f000000cf3d)=""/195}, 0x48) 2018/04/13 21:32:51 executing program 3: prctl$intptr(0x1c, 0x64) prctl$intptr(0x8000000000000008, 0x0) 2018/04/13 21:32:51 executing program 2: write$cgroup_pid(0xffffffffffffffff, &(0x7f00000012c0)=ANY=[], 0xffffff4b) r0 = userfaultfd(0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000000040)={0xaa, 0xe}) sched_setscheduler(0x0, 0x1, &(0x7f00000005c0)=0x40) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000000580)={{&(0x7f0000ffd000/0x1000)=nil, 0x1000}, 0x1}) clone(0x0, &(0x7f0000001f37), &(0x7f00000000c0), &(0x7f0000001000), &(0x7f0000001000)) read(r0, &(0x7f0000000300)=""/100, 0x64) ioctl$TIOCLINUX7(0xffffffffffffffff, 0x541c, &(0x7f0000000300)={0x7}) 2018/04/13 21:32:51 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f00008d4000)={0x0}, &(0x7f00008d4000)=0xc) getpriority(0x0, r1) 2018/04/13 21:32:51 executing program 3: r0 = openat$cuse(0xffffffffffffff9c, &(0x7f00005cfff6)='/dev/cuse\x00', 0x8010000080802, 0x0) pread64(r0, &(0x7f0000a4c000)=""/56, 0x38, 0x0) write$fuse(r0, &(0x7f000007c000)={0x58, 0x0, 0x1, @random="07000000000000000000e6065d86a61bf2b3b36e2713546deaa31b55dededda4847ff7bf2b3a8d3b874662bb74e794b2ee47ed46cd5ed34882afb9950b1b3dd332fdbf7b83919045"}, 0x58) 2018/04/13 21:32:51 executing program 5: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) unshare(0x40600) fchmod(r0, 0x0) 2018/04/13 21:32:51 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0xc, 0x3, &(0x7f0000000140)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x14, 0x25}, [], {0x95}}, &(0x7f0000003ff6)='syzkaller\x00', 0x5, 0xc3, &(0x7f000000cf3d)=""/195}, 0x48) 2018/04/13 21:32:51 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f00008d4000)={0x0}, &(0x7f00008d4000)=0xc) getpriority(0x0, r1) 2018/04/13 21:32:51 executing program 4: syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000010000)="eb3c906d6b66732e66617400020401000200027000f801", 0x17}], 0x0, &(0x7f0000000240)=ANY=[]) perf_event_open(&(0x7f0000348f88)={0x2, 0x70, 0x3e6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000480)='./file0\x00', &(0x7f00000028c0)='./file0//ile0\x00', &(0x7f0000002900)='ubifs\x00', 0x0, &(0x7f0000002940)) mkdir(&(0x7f0000000180)='./file0//ile0\x00', 0x0) ioctl$sock_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000240)) 2018/04/13 21:32:51 executing program 7: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00006ee000)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = eventfd2(0x0, 0x0) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) r3 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_IRQFD(r1, 0x4020ae76, &(0x7f00000000c0)={r2, 0x2, 0x2, r2}) ioctl$KVM_CREATE_PIT2(r1, 0x4040ae77, &(0x7f0000000040)) ioctl$KVM_RUN(r3, 0xae80, 0x0) 2018/04/13 21:32:51 executing program 6: r0 = socket$pppoe(0x18, 0x1, 0x0) connect$pppoe(r0, &(0x7f00000001c0)={0x18, 0x0, {0x3, @local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, 'bond0\x00'}}, 0x1e) r1 = socket$pppoe(0x18, 0x1, 0x0) connect$pppoe(r1, &(0x7f00000001c0)={0x18, 0x0, {0x3, @local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, 'ip6_vti0\x00'}}, 0x1e) r2 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000000)={'lo\x00', 0x0}) ioctl$sock_SIOCGIFINDEX(r2, 0x8937, &(0x7f0000000040)={'bond0\x00', r3}) 2018/04/13 21:32:51 executing program 3: r0 = openat$cuse(0xffffffffffffff9c, &(0x7f00005cfff6)='/dev/cuse\x00', 0x8010000080802, 0x0) pread64(r0, &(0x7f0000a4c000)=""/56, 0x38, 0x0) write$fuse(r0, &(0x7f000007c000)={0x58, 0x0, 0x1, @random="07000000000000000000e6065d86a61bf2b3b36e2713546deaa31b55dededda4847ff7bf2b3a8d3b874662bb74e794b2ee47ed46cd5ed34882afb9950b1b3dd332fdbf7b83919045"}, 0x58) 2018/04/13 21:32:51 executing program 5: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) unshare(0x40600) fchmod(r0, 0x0) 2018/04/13 21:32:51 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0xc, 0x3, &(0x7f0000000140)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x14, 0x25}, [], {0x95}}, &(0x7f0000003ff6)='syzkaller\x00', 0x5, 0xc3, &(0x7f000000cf3d)=""/195}, 0x48) 2018/04/13 21:32:52 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f00008d4000)={0x0}, &(0x7f00008d4000)=0xc) getpriority(0x0, r1) 2018/04/13 21:32:52 executing program 6: r0 = socket$pppoe(0x18, 0x1, 0x0) connect$pppoe(r0, &(0x7f00000001c0)={0x18, 0x0, {0x3, @local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, 'bond0\x00'}}, 0x1e) r1 = socket$pppoe(0x18, 0x1, 0x0) connect$pppoe(r1, &(0x7f00000001c0)={0x18, 0x0, {0x3, @local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, 'ip6_vti0\x00'}}, 0x1e) r2 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000000)={'lo\x00', 0x0}) ioctl$sock_SIOCGIFINDEX(r2, 0x8937, &(0x7f0000000040)={'bond0\x00', r3}) 2018/04/13 21:32:52 executing program 5: clock_getres(0xfffffffffffffbfb, &(0x7f00007ef000)) 2018/04/13 21:32:52 executing program 3: r0 = openat$cuse(0xffffffffffffff9c, &(0x7f00005cfff6)='/dev/cuse\x00', 0x8010000080802, 0x0) pread64(r0, &(0x7f0000a4c000)=""/56, 0x38, 0x0) write$fuse(r0, &(0x7f000007c000)={0x58, 0x0, 0x1, @random="07000000000000000000e6065d86a61bf2b3b36e2713546deaa31b55dededda4847ff7bf2b3a8d3b874662bb74e794b2ee47ed46cd5ed34882afb9950b1b3dd332fdbf7b83919045"}, 0x58) 2018/04/13 21:32:52 executing program 4: syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000010000)="eb3c906d6b66732e66617400020401000200027000f801", 0x17}], 0x0, &(0x7f0000000240)=ANY=[]) perf_event_open(&(0x7f0000348f88)={0x2, 0x70, 0x3e6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000480)='./file0\x00', &(0x7f00000028c0)='./file0//ile0\x00', &(0x7f0000002900)='ubifs\x00', 0x0, &(0x7f0000002940)) mkdir(&(0x7f0000000180)='./file0//ile0\x00', 0x0) ioctl$sock_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000240)) 2018/04/13 21:32:52 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0xc, 0x3, &(0x7f0000000140)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x14, 0x25}, [], {0x95}}, &(0x7f0000003ff6)='syzkaller\x00', 0x5, 0xc3, &(0x7f000000cf3d)=""/195}, 0x48) 2018/04/13 21:32:52 executing program 2: write$cgroup_pid(0xffffffffffffffff, &(0x7f00000012c0)=ANY=[], 0xffffff4b) r0 = userfaultfd(0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000000040)={0xaa, 0xe}) sched_setscheduler(0x0, 0x1, &(0x7f00000005c0)=0x40) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000000580)={{&(0x7f0000ffd000/0x1000)=nil, 0x1000}, 0x1}) clone(0x0, &(0x7f0000001f37), &(0x7f00000000c0), &(0x7f0000001000), &(0x7f0000001000)) read(r0, &(0x7f0000000300)=""/100, 0x64) ioctl$TIOCLINUX7(0xffffffffffffffff, 0x541c, &(0x7f0000000300)={0x7}) 2018/04/13 21:32:52 executing program 7: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00006ee000)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = eventfd2(0x0, 0x0) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) r3 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_IRQFD(r1, 0x4020ae76, &(0x7f00000000c0)={r2, 0x2, 0x2, r2}) ioctl$KVM_CREATE_PIT2(r1, 0x4040ae77, &(0x7f0000000040)) ioctl$KVM_RUN(r3, 0xae80, 0x0) 2018/04/13 21:32:52 executing program 5: clock_getres(0xfffffffffffffbfb, &(0x7f00007ef000)) 2018/04/13 21:32:52 executing program 0: r0 = socket(0x40000000015, 0x5, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000000)={'syz_tun\x00', &(0x7f00000001c0)=@ethtool_regs={0x50}}) 2018/04/13 21:32:52 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f00008d4000)={0x0}, &(0x7f00008d4000)=0xc) getpriority(0x0, r1) 2018/04/13 21:32:52 executing program 6: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000616ff8)={0xffffffffffffffff, 0xffffffffffffffff}) recvmmsg(r0, &(0x7f0000003ec0)=[{{&(0x7f0000001200)=@generic, 0x80, &(0x7f0000001440), 0x0, &(0x7f0000001480)=""/163, 0xa3}}, {{&(0x7f0000002ac0)=@l2, 0xe, &(0x7f0000003dc0), 0x0, &(0x7f0000003e00)=""/170, 0xaa}}], 0x2, 0x0, &(0x7f0000004000)={0x77359400}) sendmsg$unix(r1, &(0x7f0000d1d000)={&(0x7f0000b6b000)=@abs, 0x8, &(0x7f0000eeafb0), 0x0, &(0x7f0000072fd8)}, 0x0) sendmsg$unix(r0, &(0x7f000062e000)={&(0x7f0000690ff6)=@abs, 0x8, &(0x7f000000d000), 0x0, &(0x7f0000096fd8)}, 0x0) close(r1) 2018/04/13 21:32:52 executing program 3: r0 = openat$cuse(0xffffffffffffff9c, &(0x7f00005cfff6)='/dev/cuse\x00', 0x8010000080802, 0x0) pread64(r0, &(0x7f0000a4c000)=""/56, 0x38, 0x0) write$fuse(r0, &(0x7f000007c000)={0x58, 0x0, 0x1, @random="07000000000000000000e6065d86a61bf2b3b36e2713546deaa31b55dededda4847ff7bf2b3a8d3b874662bb74e794b2ee47ed46cd5ed34882afb9950b1b3dd332fdbf7b83919045"}, 0x58) 2018/04/13 21:32:52 executing program 5: clock_getres(0xfffffffffffffbfb, &(0x7f00007ef000)) 2018/04/13 21:32:52 executing program 7: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00006ee000)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = eventfd2(0x0, 0x0) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) r3 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_IRQFD(r1, 0x4020ae76, &(0x7f00000000c0)={r2, 0x2, 0x2, r2}) ioctl$KVM_CREATE_PIT2(r1, 0x4040ae77, &(0x7f0000000040)) ioctl$KVM_RUN(r3, 0xae80, 0x0) 2018/04/13 21:32:53 executing program 0: r0 = socket(0x40000000015, 0x5, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000000)={'syz_tun\x00', &(0x7f00000001c0)=@ethtool_regs={0x50}}) 2018/04/13 21:32:53 executing program 4: syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000010000)="eb3c906d6b66732e66617400020401000200027000f801", 0x17}], 0x0, &(0x7f0000000240)=ANY=[]) perf_event_open(&(0x7f0000348f88)={0x2, 0x70, 0x3e6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000480)='./file0\x00', &(0x7f00000028c0)='./file0//ile0\x00', &(0x7f0000002900)='ubifs\x00', 0x0, &(0x7f0000002940)) mkdir(&(0x7f0000000180)='./file0//ile0\x00', 0x0) ioctl$sock_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000240)) 2018/04/13 21:32:53 executing program 5: clock_getres(0xfffffffffffffbfb, &(0x7f00007ef000)) 2018/04/13 21:32:53 executing program 3: r0 = socket$can_raw(0x1d, 0x3, 0x1) bind$can_raw(r0, &(0x7f00000000c0)={0x1d}, 0x10) setsockopt(r0, 0x65, 0x10000000002, &(0x7f0000000000)="c8d63f23", 0x4) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000002000)={'vcan0\x00', 0x0}) bind$can_raw(r0, &(0x7f0000000ff0)={0x1d, r1}, 0x10) 2018/04/13 21:32:53 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000013000)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$lock(r0, 0x7, &(0x7f0000010000)={0x0, 0x0, 0x10001f}) fcntl$lock(r0, 0x7, &(0x7f0000603000)={0x0, 0x0, 0x0, 0x3}) 2018/04/13 21:32:53 executing program 7: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00006ee000)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = eventfd2(0x0, 0x0) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) r3 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_IRQFD(r1, 0x4020ae76, &(0x7f00000000c0)={r2, 0x2, 0x2, r2}) ioctl$KVM_CREATE_PIT2(r1, 0x4040ae77, &(0x7f0000000040)) ioctl$KVM_RUN(r3, 0xae80, 0x0) 2018/04/13 21:32:53 executing program 6: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000616ff8)={0xffffffffffffffff, 0xffffffffffffffff}) recvmmsg(r0, &(0x7f0000003ec0)=[{{&(0x7f0000001200)=@generic, 0x80, &(0x7f0000001440), 0x0, &(0x7f0000001480)=""/163, 0xa3}}, {{&(0x7f0000002ac0)=@l2, 0xe, &(0x7f0000003dc0), 0x0, &(0x7f0000003e00)=""/170, 0xaa}}], 0x2, 0x0, &(0x7f0000004000)={0x77359400}) sendmsg$unix(r1, &(0x7f0000d1d000)={&(0x7f0000b6b000)=@abs, 0x8, &(0x7f0000eeafb0), 0x0, &(0x7f0000072fd8)}, 0x0) sendmsg$unix(r0, &(0x7f000062e000)={&(0x7f0000690ff6)=@abs, 0x8, &(0x7f000000d000), 0x0, &(0x7f0000096fd8)}, 0x0) close(r1) 2018/04/13 21:32:53 executing program 2: write$cgroup_pid(0xffffffffffffffff, &(0x7f00000012c0)=ANY=[], 0xffffff4b) r0 = userfaultfd(0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000000040)={0xaa, 0xe}) sched_setscheduler(0x0, 0x1, &(0x7f00000005c0)=0x40) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000000580)={{&(0x7f0000ffd000/0x1000)=nil, 0x1000}, 0x1}) clone(0x0, &(0x7f0000001f37), &(0x7f00000000c0), &(0x7f0000001000), &(0x7f0000001000)) read(r0, &(0x7f0000000300)=""/100, 0x64) ioctl$TIOCLINUX7(0xffffffffffffffff, 0x541c, &(0x7f0000000300)={0x7}) 2018/04/13 21:32:53 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000013000)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$lock(r0, 0x7, &(0x7f0000010000)={0x0, 0x0, 0x10001f}) fcntl$lock(r0, 0x7, &(0x7f0000603000)={0x0, 0x0, 0x0, 0x3}) 2018/04/13 21:32:53 executing program 0: r0 = socket(0x40000000015, 0x5, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000000)={'syz_tun\x00', &(0x7f00000001c0)=@ethtool_regs={0x50}}) 2018/04/13 21:32:53 executing program 3: r0 = socket$can_raw(0x1d, 0x3, 0x1) bind$can_raw(r0, &(0x7f00000000c0)={0x1d}, 0x10) setsockopt(r0, 0x65, 0x10000000002, &(0x7f0000000000)="c8d63f23", 0x4) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000002000)={'vcan0\x00', 0x0}) bind$can_raw(r0, &(0x7f0000000ff0)={0x1d, r1}, 0x10) 2018/04/13 21:32:53 executing program 5: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000000)={&(0x7f0000000080)={0x10}, 0xc, &(0x7f00000004c0)={&(0x7f0000000180)={0x14, 0x27, 0xffffffffffffffff, 0x0, 0x0, {0x7}}, 0x14}, 0x1}, 0x0) 2018/04/13 21:32:53 executing program 7: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000384ff7)='/dev/ppp\x00', 0x101002, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f0000000000)=""/246) ioctl$PPPIOCSFLAGS(r0, 0x40047459, &(0x7f0000cf1ffc)=0x600210) pwritev(r0, &(0x7f0000ed8f70)=[{&(0x7f00007d7f41)='k', 0x1}], 0x1, 0x0) ppoll(&(0x7f0000000900)=[{r0}], 0x1, &(0x7f0000000a00), &(0x7f0000001d40), 0x8) 2018/04/13 21:32:53 executing program 0: r0 = socket(0x40000000015, 0x5, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000000)={'syz_tun\x00', &(0x7f00000001c0)=@ethtool_regs={0x50}}) 2018/04/13 21:32:53 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000013000)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$lock(r0, 0x7, &(0x7f0000010000)={0x0, 0x0, 0x10001f}) fcntl$lock(r0, 0x7, &(0x7f0000603000)={0x0, 0x0, 0x0, 0x3}) 2018/04/13 21:32:53 executing program 5: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$inet_tcp_buf(r0, 0x6, 0x21, &(0x7f0000000200)=""/133, &(0x7f00000002c0)=0x85) socketpair(0x1f, 0x80805, 0x0, &(0x7f0000000080)) 2018/04/13 21:32:53 executing program 4: syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000010000)="eb3c906d6b66732e66617400020401000200027000f801", 0x17}], 0x0, &(0x7f0000000240)=ANY=[]) perf_event_open(&(0x7f0000348f88)={0x2, 0x70, 0x3e6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000480)='./file0\x00', &(0x7f00000028c0)='./file0//ile0\x00', &(0x7f0000002900)='ubifs\x00', 0x0, &(0x7f0000002940)) mkdir(&(0x7f0000000180)='./file0//ile0\x00', 0x0) ioctl$sock_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000240)) 2018/04/13 21:32:53 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_MSRS(r2, 0xc008ae88, &(0x7f0000000240)={0x1, 0x0, [{0x186}]}) 2018/04/13 21:32:54 executing program 3: r0 = socket$can_raw(0x1d, 0x3, 0x1) bind$can_raw(r0, &(0x7f00000000c0)={0x1d}, 0x10) setsockopt(r0, 0x65, 0x10000000002, &(0x7f0000000000)="c8d63f23", 0x4) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000002000)={'vcan0\x00', 0x0}) bind$can_raw(r0, &(0x7f0000000ff0)={0x1d, r1}, 0x10) 2018/04/13 21:32:54 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000013000)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$lock(r0, 0x7, &(0x7f0000010000)={0x0, 0x0, 0x10001f}) fcntl$lock(r0, 0x7, &(0x7f0000603000)={0x0, 0x0, 0x0, 0x3}) 2018/04/13 21:32:54 executing program 5: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$inet_tcp_buf(r0, 0x6, 0x21, &(0x7f0000000200)=""/133, &(0x7f00000002c0)=0x85) socketpair(0x1f, 0x80805, 0x0, &(0x7f0000000080)) 2018/04/13 21:32:54 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_MSRS(r2, 0xc008ae88, &(0x7f0000000240)={0x1, 0x0, [{0x186}]}) 2018/04/13 21:32:54 executing program 7: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000384ff7)='/dev/ppp\x00', 0x101002, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f0000000000)=""/246) ioctl$PPPIOCSFLAGS(r0, 0x40047459, &(0x7f0000cf1ffc)=0x600210) pwritev(r0, &(0x7f0000ed8f70)=[{&(0x7f00007d7f41)='k', 0x1}], 0x1, 0x0) ppoll(&(0x7f0000000900)=[{r0}], 0x1, &(0x7f0000000a00), &(0x7f0000001d40), 0x8) 2018/04/13 21:32:54 executing program 6: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000616ff8)={0xffffffffffffffff, 0xffffffffffffffff}) recvmmsg(r0, &(0x7f0000003ec0)=[{{&(0x7f0000001200)=@generic, 0x80, &(0x7f0000001440), 0x0, &(0x7f0000001480)=""/163, 0xa3}}, {{&(0x7f0000002ac0)=@l2, 0xe, &(0x7f0000003dc0), 0x0, &(0x7f0000003e00)=""/170, 0xaa}}], 0x2, 0x0, &(0x7f0000004000)={0x77359400}) sendmsg$unix(r1, &(0x7f0000d1d000)={&(0x7f0000b6b000)=@abs, 0x8, &(0x7f0000eeafb0), 0x0, &(0x7f0000072fd8)}, 0x0) sendmsg$unix(r0, &(0x7f000062e000)={&(0x7f0000690ff6)=@abs, 0x8, &(0x7f000000d000), 0x0, &(0x7f0000096fd8)}, 0x0) close(r1) 2018/04/13 21:32:54 executing program 4: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount(&(0x7f0000000300)='./file0\x00', &(0x7f0000000440)='./file0\x00', &(0x7f0000000880)='overlay\x00', 0x8018001, 0x0) r0 = geteuid() r1 = add_key$keyring(&(0x7f0000000200)='keyring\x00', &(0x7f0000000240)={0x73, 0x79, 0x7a, 0x0}, 0x0, 0x0, 0xfffffffffffffffc) r2 = add_key$keyring(&(0x7f00000001c0)='keyring\x00', &(0x7f0000000040)={0x73, 0x79, 0x7a, 0x1}, 0x0, 0x0, r1) r3 = socket$inet_icmp_raw(0x2, 0x3, 0x1) getpeername$packet(0xffffffffffffffff, &(0x7f00000004c0)={0x0, 0x0, 0x0}, &(0x7f0000000500)=0x14) setsockopt$inet_IP_XFRM_POLICY(r3, 0x0, 0x11, &(0x7f0000000540)={{{@in6=@dev={0xfe, 0x80, [], 0x17}, @in=@broadcast=0xffffffff, 0x4e20, 0x0, 0x4e24, 0x1, 0xa, 0x80, 0x0, 0x6e, r4, r0}, {0x8f64, 0xd93, 0x386, 0x8000, 0x5, 0x7, 0x6, 0x5}, {0x2, 0x5, 0x8, 0x1}, 0x80000000, 0x6e6bbc, 0x0, 0x0, 0x2, 0x3}, {{@in6=@dev={0xfe, 0x80, [], 0xf}, 0x4d6, 0xff}, 0xa, @in=@dev={0xac, 0x14, 0x14, 0x15}, 0x3501, 0x2, 0x1, 0x200, 0x4, 0x8000, 0x9}}, 0xe8) accept4$inet(r3, &(0x7f0000000380)={0x0, 0x0, @remote}, &(0x7f0000000480)=0x10, 0x80000) sysfs$2(0x2, 0x10005, &(0x7f0000000180)=""/40) keyctl$get_persistent(0x16, r0, r2) r5 = syz_open_dev$dmmidi(&(0x7f0000000100)='/dev/dmmidi#\x00', 0x9, 0x0) socketpair$unix(0x1, 0x7, 0x0, &(0x7f0000000640)) r6 = openat(0xffffffffffffffff, &(0x7f0000000180)='./file0\x00', 0x101000, 0x40) getsockopt$inet6_tcp_int(r6, 0x6, 0x15, &(0x7f0000000280), &(0x7f00000002c0)=0x4) r7 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0xf, 0x4, &(0x7f0000000000)=@raw=[@jmp={0x5, 0x31b, 0x6, 0x0, 0xf, 0x20, 0xfffffffffffffff9}, @map={0x18, 0x9, 0x1, 0x0, 0xffffffffffffff9c}], &(0x7f0000000040)='GPL\x00', 0x7f, 0x12, &(0x7f0000000080)=""/18, 0x41f00, 0x1}, 0x48) time(&(0x7f0000000240)) write(r7, &(0x7f00000001c0)="5f0c217533389178ce32aa5876702487b6f650188dc2ec57c33650ee1e9c356d12a6604cf8de7a17ff299d9a", 0x2c) memfd_create(&(0x7f0000000340)='/dev/dmmidi#\x00', 0x3) r8 = openat$mixer(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/mixer\x00', 0x0, 0x0) ioctl$VHOST_SET_MEM_TABLE(r8, 0x4008af03, &(0x7f0000000440)={0x80000000000006e, 0x0, [{0x2000, 0x0, &(0x7f00000003c0)=""/111}]}) ioctl$KVM_ASSIGN_PCI_DEVICE(r5, 0x8040ae69, &(0x7f0000000140)={0x6, 0x1, 0x0, 0x2, 0x4}) 2018/04/13 21:32:54 executing program 2: r0 = socket$inet(0x2, 0x6, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000140)=@broute={"62726f7574650500", 0x20, 0x2, 0x260, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000bc0], 0x0, &(0x7f0000000000), &(0x7f0000000bc0)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xfffffffffffffffc, 0x1, [{{{0x19, 0x0, 0x0, 'ip6gretap0\x00', 'ip_vti0\x00', 'rose0\x00', 'bcsh0\x00', @link_local={0x1, 0x80, 0xc2}, [], @local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, [], 0x70, 0xe8, 0x130}, [@common=@CLASSIFY={'CLASSIFY\x00', 0x8}, @common=@RATEEST={'RATEEST\x00', 0x20, {{'syz1\x00'}}}]}, @common=@RATEEST={'RATEEST\x00', 0x20, {{'syz0\x00'}}}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff, 0x1, [{{{0x3, 0x0, 0x0, 'irlan0\x00', 'bcsh0\x00', 'ip6_vti0\x00', 'irlan0\x00', @remote={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xbb}, [], @empty, [], 0x70, 0x70, 0xa0}}, @common=@redirect={'redirect\x00', 0x8}}]}]}, 0x2d8) 2018/04/13 21:32:54 executing program 2: r0 = socket$inet(0x2, 0x6, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000140)=@broute={"62726f7574650500", 0x20, 0x2, 0x260, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000bc0], 0x0, &(0x7f0000000000), &(0x7f0000000bc0)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xfffffffffffffffc, 0x1, [{{{0x19, 0x0, 0x0, 'ip6gretap0\x00', 'ip_vti0\x00', 'rose0\x00', 'bcsh0\x00', @link_local={0x1, 0x80, 0xc2}, [], @local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, [], 0x70, 0xe8, 0x130}, [@common=@CLASSIFY={'CLASSIFY\x00', 0x8}, @common=@RATEEST={'RATEEST\x00', 0x20, {{'syz1\x00'}}}]}, @common=@RATEEST={'RATEEST\x00', 0x20, {{'syz0\x00'}}}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff, 0x1, [{{{0x3, 0x0, 0x0, 'irlan0\x00', 'bcsh0\x00', 'ip6_vti0\x00', 'irlan0\x00', @remote={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xbb}, [], @empty, [], 0x70, 0x70, 0xa0}}, @common=@redirect={'redirect\x00', 0x8}}]}]}, 0x2d8) 2018/04/13 21:32:54 executing program 1: r0 = perf_event_open(&(0x7f000077a000)={0x2, 0x78, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x0, 0x0, 0xffffffffffffffff, 0x0) read(r0, &(0x7f0000000040)=""/4096, 0x1000) 2018/04/13 21:32:54 executing program 3: r0 = socket$can_raw(0x1d, 0x3, 0x1) bind$can_raw(r0, &(0x7f00000000c0)={0x1d}, 0x10) setsockopt(r0, 0x65, 0x10000000002, &(0x7f0000000000)="c8d63f23", 0x4) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000002000)={'vcan0\x00', 0x0}) bind$can_raw(r0, &(0x7f0000000ff0)={0x1d, r1}, 0x10) 2018/04/13 21:32:54 executing program 5: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$inet_tcp_buf(r0, 0x6, 0x21, &(0x7f0000000200)=""/133, &(0x7f00000002c0)=0x85) socketpair(0x1f, 0x80805, 0x0, &(0x7f0000000080)) 2018/04/13 21:32:54 executing program 2: r0 = socket$inet(0x2, 0x6, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000140)=@broute={"62726f7574650500", 0x20, 0x2, 0x260, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000bc0], 0x0, &(0x7f0000000000), &(0x7f0000000bc0)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xfffffffffffffffc, 0x1, [{{{0x19, 0x0, 0x0, 'ip6gretap0\x00', 'ip_vti0\x00', 'rose0\x00', 'bcsh0\x00', @link_local={0x1, 0x80, 0xc2}, [], @local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, [], 0x70, 0xe8, 0x130}, [@common=@CLASSIFY={'CLASSIFY\x00', 0x8}, @common=@RATEEST={'RATEEST\x00', 0x20, {{'syz1\x00'}}}]}, @common=@RATEEST={'RATEEST\x00', 0x20, {{'syz0\x00'}}}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff, 0x1, [{{{0x3, 0x0, 0x0, 'irlan0\x00', 'bcsh0\x00', 'ip6_vti0\x00', 'irlan0\x00', @remote={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xbb}, [], @empty, [], 0x70, 0x70, 0xa0}}, @common=@redirect={'redirect\x00', 0x8}}]}]}, 0x2d8) 2018/04/13 21:32:54 executing program 4: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount(&(0x7f0000000300)='./file0\x00', &(0x7f0000000440)='./file0\x00', &(0x7f0000000880)='overlay\x00', 0x8018001, 0x0) r0 = geteuid() r1 = add_key$keyring(&(0x7f0000000200)='keyring\x00', &(0x7f0000000240)={0x73, 0x79, 0x7a, 0x0}, 0x0, 0x0, 0xfffffffffffffffc) r2 = add_key$keyring(&(0x7f00000001c0)='keyring\x00', &(0x7f0000000040)={0x73, 0x79, 0x7a, 0x1}, 0x0, 0x0, r1) r3 = socket$inet_icmp_raw(0x2, 0x3, 0x1) getpeername$packet(0xffffffffffffffff, &(0x7f00000004c0)={0x0, 0x0, 0x0}, &(0x7f0000000500)=0x14) setsockopt$inet_IP_XFRM_POLICY(r3, 0x0, 0x11, &(0x7f0000000540)={{{@in6=@dev={0xfe, 0x80, [], 0x17}, @in=@broadcast=0xffffffff, 0x4e20, 0x0, 0x4e24, 0x1, 0xa, 0x80, 0x0, 0x6e, r4, r0}, {0x8f64, 0xd93, 0x386, 0x8000, 0x5, 0x7, 0x6, 0x5}, {0x2, 0x5, 0x8, 0x1}, 0x80000000, 0x6e6bbc, 0x0, 0x0, 0x2, 0x3}, {{@in6=@dev={0xfe, 0x80, [], 0xf}, 0x4d6, 0xff}, 0xa, @in=@dev={0xac, 0x14, 0x14, 0x15}, 0x3501, 0x2, 0x1, 0x200, 0x4, 0x8000, 0x9}}, 0xe8) accept4$inet(r3, &(0x7f0000000380)={0x0, 0x0, @remote}, &(0x7f0000000480)=0x10, 0x80000) sysfs$2(0x2, 0x10005, &(0x7f0000000180)=""/40) keyctl$get_persistent(0x16, r0, r2) r5 = syz_open_dev$dmmidi(&(0x7f0000000100)='/dev/dmmidi#\x00', 0x9, 0x0) socketpair$unix(0x1, 0x7, 0x0, &(0x7f0000000640)) r6 = openat(0xffffffffffffffff, &(0x7f0000000180)='./file0\x00', 0x101000, 0x40) getsockopt$inet6_tcp_int(r6, 0x6, 0x15, &(0x7f0000000280), &(0x7f00000002c0)=0x4) r7 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0xf, 0x4, &(0x7f0000000000)=@raw=[@jmp={0x5, 0x31b, 0x6, 0x0, 0xf, 0x20, 0xfffffffffffffff9}, @map={0x18, 0x9, 0x1, 0x0, 0xffffffffffffff9c}], &(0x7f0000000040)='GPL\x00', 0x7f, 0x12, &(0x7f0000000080)=""/18, 0x41f00, 0x1}, 0x48) time(&(0x7f0000000240)) write(r7, &(0x7f00000001c0)="5f0c217533389178ce32aa5876702487b6f650188dc2ec57c33650ee1e9c356d12a6604cf8de7a17ff299d9a", 0x2c) memfd_create(&(0x7f0000000340)='/dev/dmmidi#\x00', 0x3) r8 = openat$mixer(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/mixer\x00', 0x0, 0x0) ioctl$VHOST_SET_MEM_TABLE(r8, 0x4008af03, &(0x7f0000000440)={0x80000000000006e, 0x0, [{0x2000, 0x0, &(0x7f00000003c0)=""/111}]}) ioctl$KVM_ASSIGN_PCI_DEVICE(r5, 0x8040ae69, &(0x7f0000000140)={0x6, 0x1, 0x0, 0x2, 0x4}) 2018/04/13 21:32:54 executing program 7: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000384ff7)='/dev/ppp\x00', 0x101002, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f0000000000)=""/246) ioctl$PPPIOCSFLAGS(r0, 0x40047459, &(0x7f0000cf1ffc)=0x600210) pwritev(r0, &(0x7f0000ed8f70)=[{&(0x7f00007d7f41)='k', 0x1}], 0x1, 0x0) ppoll(&(0x7f0000000900)=[{r0}], 0x1, &(0x7f0000000a00), &(0x7f0000001d40), 0x8) 2018/04/13 21:32:54 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_MSRS(r2, 0xc008ae88, &(0x7f0000000240)={0x1, 0x0, [{0x186}]}) 2018/04/13 21:32:54 executing program 3: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount(&(0x7f0000000300)='./file0\x00', &(0x7f0000000440)='./file0\x00', &(0x7f0000000880)='overlay\x00', 0x8018001, 0x0) r0 = geteuid() r1 = add_key$keyring(&(0x7f0000000200)='keyring\x00', &(0x7f0000000240)={0x73, 0x79, 0x7a, 0x0}, 0x0, 0x0, 0xfffffffffffffffc) r2 = add_key$keyring(&(0x7f00000001c0)='keyring\x00', &(0x7f0000000040)={0x73, 0x79, 0x7a, 0x1}, 0x0, 0x0, r1) r3 = socket$inet_icmp_raw(0x2, 0x3, 0x1) getpeername$packet(0xffffffffffffffff, &(0x7f00000004c0)={0x0, 0x0, 0x0}, &(0x7f0000000500)=0x14) setsockopt$inet_IP_XFRM_POLICY(r3, 0x0, 0x11, &(0x7f0000000540)={{{@in6=@dev={0xfe, 0x80, [], 0x17}, @in=@broadcast=0xffffffff, 0x4e20, 0x0, 0x4e24, 0x1, 0xa, 0x80, 0x0, 0x6e, r4, r0}, {0x8f64, 0xd93, 0x386, 0x8000, 0x5, 0x7, 0x6, 0x5}, {0x2, 0x5, 0x8, 0x1}, 0x80000000, 0x6e6bbc, 0x0, 0x0, 0x2, 0x3}, {{@in6=@dev={0xfe, 0x80, [], 0xf}, 0x4d6, 0xff}, 0xa, @in=@dev={0xac, 0x14, 0x14, 0x15}, 0x3501, 0x2, 0x1, 0x200, 0x4, 0x8000, 0x9}}, 0xe8) accept4$inet(r3, &(0x7f0000000380)={0x0, 0x0, @remote}, &(0x7f0000000480)=0x10, 0x80000) sysfs$2(0x2, 0x10005, &(0x7f0000000180)=""/40) keyctl$get_persistent(0x16, r0, r2) r5 = syz_open_dev$dmmidi(&(0x7f0000000100)='/dev/dmmidi#\x00', 0x9, 0x0) socketpair$unix(0x1, 0x7, 0x0, &(0x7f0000000640)) r6 = openat(0xffffffffffffffff, &(0x7f0000000180)='./file0\x00', 0x101000, 0x40) getsockopt$inet6_tcp_int(r6, 0x6, 0x15, &(0x7f0000000280), &(0x7f00000002c0)=0x4) r7 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0xf, 0x4, &(0x7f0000000000)=@raw=[@jmp={0x5, 0x31b, 0x6, 0x0, 0xf, 0x20, 0xfffffffffffffff9}, @map={0x18, 0x9, 0x1, 0x0, 0xffffffffffffff9c}], &(0x7f0000000040)='GPL\x00', 0x7f, 0x12, &(0x7f0000000080)=""/18, 0x41f00, 0x1}, 0x48) time(&(0x7f0000000240)) write(r7, &(0x7f00000001c0)="5f0c217533389178ce32aa5876702487b6f650188dc2ec57c33650ee1e9c356d12a6604cf8de7a17ff299d9a", 0x2c) memfd_create(&(0x7f0000000340)='/dev/dmmidi#\x00', 0x3) r8 = openat$mixer(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/mixer\x00', 0x0, 0x0) ioctl$VHOST_SET_MEM_TABLE(r8, 0x4008af03, &(0x7f0000000440)={0x80000000000006e, 0x0, [{0x2000, 0x0, &(0x7f00000003c0)=""/111}]}) ioctl$KVM_ASSIGN_PCI_DEVICE(r5, 0x8040ae69, &(0x7f0000000140)={0x6, 0x1, 0x0, 0x2, 0x4}) 2018/04/13 21:32:54 executing program 1: r0 = perf_event_open(&(0x7f000077a000)={0x2, 0x78, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x0, 0x0, 0xffffffffffffffff, 0x0) read(r0, &(0x7f0000000040)=""/4096, 0x1000) 2018/04/13 21:32:54 executing program 6: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000616ff8)={0xffffffffffffffff, 0xffffffffffffffff}) recvmmsg(r0, &(0x7f0000003ec0)=[{{&(0x7f0000001200)=@generic, 0x80, &(0x7f0000001440), 0x0, &(0x7f0000001480)=""/163, 0xa3}}, {{&(0x7f0000002ac0)=@l2, 0xe, &(0x7f0000003dc0), 0x0, &(0x7f0000003e00)=""/170, 0xaa}}], 0x2, 0x0, &(0x7f0000004000)={0x77359400}) sendmsg$unix(r1, &(0x7f0000d1d000)={&(0x7f0000b6b000)=@abs, 0x8, &(0x7f0000eeafb0), 0x0, &(0x7f0000072fd8)}, 0x0) sendmsg$unix(r0, &(0x7f000062e000)={&(0x7f0000690ff6)=@abs, 0x8, &(0x7f000000d000), 0x0, &(0x7f0000096fd8)}, 0x0) close(r1) 2018/04/13 21:32:54 executing program 5: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$inet_tcp_buf(r0, 0x6, 0x21, &(0x7f0000000200)=""/133, &(0x7f00000002c0)=0x85) socketpair(0x1f, 0x80805, 0x0, &(0x7f0000000080)) 2018/04/13 21:32:55 executing program 4: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount(&(0x7f0000000300)='./file0\x00', &(0x7f0000000440)='./file0\x00', &(0x7f0000000880)='overlay\x00', 0x8018001, 0x0) r0 = geteuid() r1 = add_key$keyring(&(0x7f0000000200)='keyring\x00', &(0x7f0000000240)={0x73, 0x79, 0x7a, 0x0}, 0x0, 0x0, 0xfffffffffffffffc) r2 = add_key$keyring(&(0x7f00000001c0)='keyring\x00', &(0x7f0000000040)={0x73, 0x79, 0x7a, 0x1}, 0x0, 0x0, r1) r3 = socket$inet_icmp_raw(0x2, 0x3, 0x1) getpeername$packet(0xffffffffffffffff, &(0x7f00000004c0)={0x0, 0x0, 0x0}, &(0x7f0000000500)=0x14) setsockopt$inet_IP_XFRM_POLICY(r3, 0x0, 0x11, &(0x7f0000000540)={{{@in6=@dev={0xfe, 0x80, [], 0x17}, @in=@broadcast=0xffffffff, 0x4e20, 0x0, 0x4e24, 0x1, 0xa, 0x80, 0x0, 0x6e, r4, r0}, {0x8f64, 0xd93, 0x386, 0x8000, 0x5, 0x7, 0x6, 0x5}, {0x2, 0x5, 0x8, 0x1}, 0x80000000, 0x6e6bbc, 0x0, 0x0, 0x2, 0x3}, {{@in6=@dev={0xfe, 0x80, [], 0xf}, 0x4d6, 0xff}, 0xa, @in=@dev={0xac, 0x14, 0x14, 0x15}, 0x3501, 0x2, 0x1, 0x200, 0x4, 0x8000, 0x9}}, 0xe8) accept4$inet(r3, &(0x7f0000000380)={0x0, 0x0, @remote}, &(0x7f0000000480)=0x10, 0x80000) sysfs$2(0x2, 0x10005, &(0x7f0000000180)=""/40) keyctl$get_persistent(0x16, r0, r2) r5 = syz_open_dev$dmmidi(&(0x7f0000000100)='/dev/dmmidi#\x00', 0x9, 0x0) socketpair$unix(0x1, 0x7, 0x0, &(0x7f0000000640)) r6 = openat(0xffffffffffffffff, &(0x7f0000000180)='./file0\x00', 0x101000, 0x40) getsockopt$inet6_tcp_int(r6, 0x6, 0x15, &(0x7f0000000280), &(0x7f00000002c0)=0x4) r7 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0xf, 0x4, &(0x7f0000000000)=@raw=[@jmp={0x5, 0x31b, 0x6, 0x0, 0xf, 0x20, 0xfffffffffffffff9}, @map={0x18, 0x9, 0x1, 0x0, 0xffffffffffffff9c}], &(0x7f0000000040)='GPL\x00', 0x7f, 0x12, &(0x7f0000000080)=""/18, 0x41f00, 0x1}, 0x48) time(&(0x7f0000000240)) write(r7, &(0x7f00000001c0)="5f0c217533389178ce32aa5876702487b6f650188dc2ec57c33650ee1e9c356d12a6604cf8de7a17ff299d9a", 0x2c) memfd_create(&(0x7f0000000340)='/dev/dmmidi#\x00', 0x3) r8 = openat$mixer(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/mixer\x00', 0x0, 0x0) ioctl$VHOST_SET_MEM_TABLE(r8, 0x4008af03, &(0x7f0000000440)={0x80000000000006e, 0x0, [{0x2000, 0x0, &(0x7f00000003c0)=""/111}]}) ioctl$KVM_ASSIGN_PCI_DEVICE(r5, 0x8040ae69, &(0x7f0000000140)={0x6, 0x1, 0x0, 0x2, 0x4}) 2018/04/13 21:32:55 executing program 1: r0 = perf_event_open(&(0x7f000077a000)={0x2, 0x78, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x0, 0x0, 0xffffffffffffffff, 0x0) read(r0, &(0x7f0000000040)=""/4096, 0x1000) 2018/04/13 21:32:55 executing program 2: r0 = socket$inet(0x2, 0x6, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000140)=@broute={"62726f7574650500", 0x20, 0x2, 0x260, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000bc0], 0x0, &(0x7f0000000000), &(0x7f0000000bc0)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xfffffffffffffffc, 0x1, [{{{0x19, 0x0, 0x0, 'ip6gretap0\x00', 'ip_vti0\x00', 'rose0\x00', 'bcsh0\x00', @link_local={0x1, 0x80, 0xc2}, [], @local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, [], 0x70, 0xe8, 0x130}, [@common=@CLASSIFY={'CLASSIFY\x00', 0x8}, @common=@RATEEST={'RATEEST\x00', 0x20, {{'syz1\x00'}}}]}, @common=@RATEEST={'RATEEST\x00', 0x20, {{'syz0\x00'}}}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff, 0x1, [{{{0x3, 0x0, 0x0, 'irlan0\x00', 'bcsh0\x00', 'ip6_vti0\x00', 'irlan0\x00', @remote={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xbb}, [], @empty, [], 0x70, 0x70, 0xa0}}, @common=@redirect={'redirect\x00', 0x8}}]}]}, 0x2d8) 2018/04/13 21:32:55 executing program 3: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount(&(0x7f0000000300)='./file0\x00', &(0x7f0000000440)='./file0\x00', &(0x7f0000000880)='overlay\x00', 0x8018001, 0x0) r0 = geteuid() r1 = add_key$keyring(&(0x7f0000000200)='keyring\x00', &(0x7f0000000240)={0x73, 0x79, 0x7a, 0x0}, 0x0, 0x0, 0xfffffffffffffffc) r2 = add_key$keyring(&(0x7f00000001c0)='keyring\x00', &(0x7f0000000040)={0x73, 0x79, 0x7a, 0x1}, 0x0, 0x0, r1) r3 = socket$inet_icmp_raw(0x2, 0x3, 0x1) getpeername$packet(0xffffffffffffffff, &(0x7f00000004c0)={0x0, 0x0, 0x0}, &(0x7f0000000500)=0x14) setsockopt$inet_IP_XFRM_POLICY(r3, 0x0, 0x11, &(0x7f0000000540)={{{@in6=@dev={0xfe, 0x80, [], 0x17}, @in=@broadcast=0xffffffff, 0x4e20, 0x0, 0x4e24, 0x1, 0xa, 0x80, 0x0, 0x6e, r4, r0}, {0x8f64, 0xd93, 0x386, 0x8000, 0x5, 0x7, 0x6, 0x5}, {0x2, 0x5, 0x8, 0x1}, 0x80000000, 0x6e6bbc, 0x0, 0x0, 0x2, 0x3}, {{@in6=@dev={0xfe, 0x80, [], 0xf}, 0x4d6, 0xff}, 0xa, @in=@dev={0xac, 0x14, 0x14, 0x15}, 0x3501, 0x2, 0x1, 0x200, 0x4, 0x8000, 0x9}}, 0xe8) accept4$inet(r3, &(0x7f0000000380)={0x0, 0x0, @remote}, &(0x7f0000000480)=0x10, 0x80000) sysfs$2(0x2, 0x10005, &(0x7f0000000180)=""/40) keyctl$get_persistent(0x16, r0, r2) r5 = syz_open_dev$dmmidi(&(0x7f0000000100)='/dev/dmmidi#\x00', 0x9, 0x0) socketpair$unix(0x1, 0x7, 0x0, &(0x7f0000000640)) r6 = openat(0xffffffffffffffff, &(0x7f0000000180)='./file0\x00', 0x101000, 0x40) getsockopt$inet6_tcp_int(r6, 0x6, 0x15, &(0x7f0000000280), &(0x7f00000002c0)=0x4) r7 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0xf, 0x4, &(0x7f0000000000)=@raw=[@jmp={0x5, 0x31b, 0x6, 0x0, 0xf, 0x20, 0xfffffffffffffff9}, @map={0x18, 0x9, 0x1, 0x0, 0xffffffffffffff9c}], &(0x7f0000000040)='GPL\x00', 0x7f, 0x12, &(0x7f0000000080)=""/18, 0x41f00, 0x1}, 0x48) time(&(0x7f0000000240)) write(r7, &(0x7f00000001c0)="5f0c217533389178ce32aa5876702487b6f650188dc2ec57c33650ee1e9c356d12a6604cf8de7a17ff299d9a", 0x2c) memfd_create(&(0x7f0000000340)='/dev/dmmidi#\x00', 0x3) r8 = openat$mixer(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/mixer\x00', 0x0, 0x0) ioctl$VHOST_SET_MEM_TABLE(r8, 0x4008af03, &(0x7f0000000440)={0x80000000000006e, 0x0, [{0x2000, 0x0, &(0x7f00000003c0)=""/111}]}) ioctl$KVM_ASSIGN_PCI_DEVICE(r5, 0x8040ae69, &(0x7f0000000140)={0x6, 0x1, 0x0, 0x2, 0x4}) 2018/04/13 21:32:55 executing program 5: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount(&(0x7f0000000300)='./file0\x00', &(0x7f0000000440)='./file0\x00', &(0x7f0000000880)='overlay\x00', 0x8018001, 0x0) r0 = geteuid() r1 = add_key$keyring(&(0x7f0000000200)='keyring\x00', &(0x7f0000000240)={0x73, 0x79, 0x7a, 0x0}, 0x0, 0x0, 0xfffffffffffffffc) r2 = add_key$keyring(&(0x7f00000001c0)='keyring\x00', &(0x7f0000000040)={0x73, 0x79, 0x7a, 0x1}, 0x0, 0x0, r1) r3 = socket$inet_icmp_raw(0x2, 0x3, 0x1) getpeername$packet(0xffffffffffffffff, &(0x7f00000004c0)={0x0, 0x0, 0x0}, &(0x7f0000000500)=0x14) setsockopt$inet_IP_XFRM_POLICY(r3, 0x0, 0x11, &(0x7f0000000540)={{{@in6=@dev={0xfe, 0x80, [], 0x17}, @in=@broadcast=0xffffffff, 0x4e20, 0x0, 0x4e24, 0x1, 0xa, 0x80, 0x0, 0x6e, r4, r0}, {0x8f64, 0xd93, 0x386, 0x8000, 0x5, 0x7, 0x6, 0x5}, {0x2, 0x5, 0x8, 0x1}, 0x80000000, 0x6e6bbc, 0x0, 0x0, 0x2, 0x3}, {{@in6=@dev={0xfe, 0x80, [], 0xf}, 0x4d6, 0xff}, 0xa, @in=@dev={0xac, 0x14, 0x14, 0x15}, 0x3501, 0x2, 0x1, 0x200, 0x4, 0x8000, 0x9}}, 0xe8) accept4$inet(r3, &(0x7f0000000380)={0x0, 0x0, @remote}, &(0x7f0000000480)=0x10, 0x80000) sysfs$2(0x2, 0x10005, &(0x7f0000000180)=""/40) keyctl$get_persistent(0x16, r0, r2) r5 = syz_open_dev$dmmidi(&(0x7f0000000100)='/dev/dmmidi#\x00', 0x9, 0x0) socketpair$unix(0x1, 0x7, 0x0, &(0x7f0000000640)) r6 = openat(0xffffffffffffffff, &(0x7f0000000180)='./file0\x00', 0x101000, 0x40) getsockopt$inet6_tcp_int(r6, 0x6, 0x15, &(0x7f0000000280), &(0x7f00000002c0)=0x4) r7 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0xf, 0x4, &(0x7f0000000000)=@raw=[@jmp={0x5, 0x31b, 0x6, 0x0, 0xf, 0x20, 0xfffffffffffffff9}, @map={0x18, 0x9, 0x1, 0x0, 0xffffffffffffff9c}], &(0x7f0000000040)='GPL\x00', 0x7f, 0x12, &(0x7f0000000080)=""/18, 0x41f00, 0x1}, 0x48) time(&(0x7f0000000240)) write(r7, &(0x7f00000001c0)="5f0c217533389178ce32aa5876702487b6f650188dc2ec57c33650ee1e9c356d12a6604cf8de7a17ff299d9a", 0x2c) memfd_create(&(0x7f0000000340)='/dev/dmmidi#\x00', 0x3) r8 = openat$mixer(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/mixer\x00', 0x0, 0x0) ioctl$VHOST_SET_MEM_TABLE(r8, 0x4008af03, &(0x7f0000000440)={0x80000000000006e, 0x0, [{0x2000, 0x0, &(0x7f00000003c0)=""/111}]}) ioctl$KVM_ASSIGN_PCI_DEVICE(r5, 0x8040ae69, &(0x7f0000000140)={0x6, 0x1, 0x0, 0x2, 0x4}) 2018/04/13 21:32:55 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_MSRS(r2, 0xc008ae88, &(0x7f0000000240)={0x1, 0x0, [{0x186}]}) 2018/04/13 21:32:55 executing program 7: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000384ff7)='/dev/ppp\x00', 0x101002, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f0000000000)=""/246) ioctl$PPPIOCSFLAGS(r0, 0x40047459, &(0x7f0000cf1ffc)=0x600210) pwritev(r0, &(0x7f0000ed8f70)=[{&(0x7f00007d7f41)='k', 0x1}], 0x1, 0x0) ppoll(&(0x7f0000000900)=[{r0}], 0x1, &(0x7f0000000a00), &(0x7f0000001d40), 0x8) 2018/04/13 21:32:55 executing program 1: r0 = perf_event_open(&(0x7f000077a000)={0x2, 0x78, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x0, 0x0, 0xffffffffffffffff, 0x0) read(r0, &(0x7f0000000040)=""/4096, 0x1000) 2018/04/13 21:32:55 executing program 4: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount(&(0x7f0000000300)='./file0\x00', &(0x7f0000000440)='./file0\x00', &(0x7f0000000880)='overlay\x00', 0x8018001, 0x0) r0 = geteuid() r1 = add_key$keyring(&(0x7f0000000200)='keyring\x00', &(0x7f0000000240)={0x73, 0x79, 0x7a, 0x0}, 0x0, 0x0, 0xfffffffffffffffc) r2 = add_key$keyring(&(0x7f00000001c0)='keyring\x00', &(0x7f0000000040)={0x73, 0x79, 0x7a, 0x1}, 0x0, 0x0, r1) r3 = socket$inet_icmp_raw(0x2, 0x3, 0x1) getpeername$packet(0xffffffffffffffff, &(0x7f00000004c0)={0x0, 0x0, 0x0}, &(0x7f0000000500)=0x14) setsockopt$inet_IP_XFRM_POLICY(r3, 0x0, 0x11, &(0x7f0000000540)={{{@in6=@dev={0xfe, 0x80, [], 0x17}, @in=@broadcast=0xffffffff, 0x4e20, 0x0, 0x4e24, 0x1, 0xa, 0x80, 0x0, 0x6e, r4, r0}, {0x8f64, 0xd93, 0x386, 0x8000, 0x5, 0x7, 0x6, 0x5}, {0x2, 0x5, 0x8, 0x1}, 0x80000000, 0x6e6bbc, 0x0, 0x0, 0x2, 0x3}, {{@in6=@dev={0xfe, 0x80, [], 0xf}, 0x4d6, 0xff}, 0xa, @in=@dev={0xac, 0x14, 0x14, 0x15}, 0x3501, 0x2, 0x1, 0x200, 0x4, 0x8000, 0x9}}, 0xe8) accept4$inet(r3, &(0x7f0000000380)={0x0, 0x0, @remote}, &(0x7f0000000480)=0x10, 0x80000) sysfs$2(0x2, 0x10005, &(0x7f0000000180)=""/40) keyctl$get_persistent(0x16, r0, r2) r5 = syz_open_dev$dmmidi(&(0x7f0000000100)='/dev/dmmidi#\x00', 0x9, 0x0) socketpair$unix(0x1, 0x7, 0x0, &(0x7f0000000640)) r6 = openat(0xffffffffffffffff, &(0x7f0000000180)='./file0\x00', 0x101000, 0x40) getsockopt$inet6_tcp_int(r6, 0x6, 0x15, &(0x7f0000000280), &(0x7f00000002c0)=0x4) r7 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0xf, 0x4, &(0x7f0000000000)=@raw=[@jmp={0x5, 0x31b, 0x6, 0x0, 0xf, 0x20, 0xfffffffffffffff9}, @map={0x18, 0x9, 0x1, 0x0, 0xffffffffffffff9c}], &(0x7f0000000040)='GPL\x00', 0x7f, 0x12, &(0x7f0000000080)=""/18, 0x41f00, 0x1}, 0x48) time(&(0x7f0000000240)) write(r7, &(0x7f00000001c0)="5f0c217533389178ce32aa5876702487b6f650188dc2ec57c33650ee1e9c356d12a6604cf8de7a17ff299d9a", 0x2c) memfd_create(&(0x7f0000000340)='/dev/dmmidi#\x00', 0x3) r8 = openat$mixer(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/mixer\x00', 0x0, 0x0) ioctl$VHOST_SET_MEM_TABLE(r8, 0x4008af03, &(0x7f0000000440)={0x80000000000006e, 0x0, [{0x2000, 0x0, &(0x7f00000003c0)=""/111}]}) ioctl$KVM_ASSIGN_PCI_DEVICE(r5, 0x8040ae69, &(0x7f0000000140)={0x6, 0x1, 0x0, 0x2, 0x4}) 2018/04/13 21:32:55 executing program 5: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount(&(0x7f0000000300)='./file0\x00', &(0x7f0000000440)='./file0\x00', &(0x7f0000000880)='overlay\x00', 0x8018001, 0x0) r0 = geteuid() r1 = add_key$keyring(&(0x7f0000000200)='keyring\x00', &(0x7f0000000240)={0x73, 0x79, 0x7a, 0x0}, 0x0, 0x0, 0xfffffffffffffffc) r2 = add_key$keyring(&(0x7f00000001c0)='keyring\x00', &(0x7f0000000040)={0x73, 0x79, 0x7a, 0x1}, 0x0, 0x0, r1) r3 = socket$inet_icmp_raw(0x2, 0x3, 0x1) getpeername$packet(0xffffffffffffffff, &(0x7f00000004c0)={0x0, 0x0, 0x0}, &(0x7f0000000500)=0x14) setsockopt$inet_IP_XFRM_POLICY(r3, 0x0, 0x11, &(0x7f0000000540)={{{@in6=@dev={0xfe, 0x80, [], 0x17}, @in=@broadcast=0xffffffff, 0x4e20, 0x0, 0x4e24, 0x1, 0xa, 0x80, 0x0, 0x6e, r4, r0}, {0x8f64, 0xd93, 0x386, 0x8000, 0x5, 0x7, 0x6, 0x5}, {0x2, 0x5, 0x8, 0x1}, 0x80000000, 0x6e6bbc, 0x0, 0x0, 0x2, 0x3}, {{@in6=@dev={0xfe, 0x80, [], 0xf}, 0x4d6, 0xff}, 0xa, @in=@dev={0xac, 0x14, 0x14, 0x15}, 0x3501, 0x2, 0x1, 0x200, 0x4, 0x8000, 0x9}}, 0xe8) accept4$inet(r3, &(0x7f0000000380)={0x0, 0x0, @remote}, &(0x7f0000000480)=0x10, 0x80000) sysfs$2(0x2, 0x10005, &(0x7f0000000180)=""/40) keyctl$get_persistent(0x16, r0, r2) r5 = syz_open_dev$dmmidi(&(0x7f0000000100)='/dev/dmmidi#\x00', 0x9, 0x0) socketpair$unix(0x1, 0x7, 0x0, &(0x7f0000000640)) r6 = openat(0xffffffffffffffff, &(0x7f0000000180)='./file0\x00', 0x101000, 0x40) getsockopt$inet6_tcp_int(r6, 0x6, 0x15, &(0x7f0000000280), &(0x7f00000002c0)=0x4) r7 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0xf, 0x4, &(0x7f0000000000)=@raw=[@jmp={0x5, 0x31b, 0x6, 0x0, 0xf, 0x20, 0xfffffffffffffff9}, @map={0x18, 0x9, 0x1, 0x0, 0xffffffffffffff9c}], &(0x7f0000000040)='GPL\x00', 0x7f, 0x12, &(0x7f0000000080)=""/18, 0x41f00, 0x1}, 0x48) time(&(0x7f0000000240)) write(r7, &(0x7f00000001c0)="5f0c217533389178ce32aa5876702487b6f650188dc2ec57c33650ee1e9c356d12a6604cf8de7a17ff299d9a", 0x2c) memfd_create(&(0x7f0000000340)='/dev/dmmidi#\x00', 0x3) r8 = openat$mixer(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/mixer\x00', 0x0, 0x0) ioctl$VHOST_SET_MEM_TABLE(r8, 0x4008af03, &(0x7f0000000440)={0x80000000000006e, 0x0, [{0x2000, 0x0, &(0x7f00000003c0)=""/111}]}) ioctl$KVM_ASSIGN_PCI_DEVICE(r5, 0x8040ae69, &(0x7f0000000140)={0x6, 0x1, 0x0, 0x2, 0x4}) 2018/04/13 21:32:55 executing program 2: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu\x00', 0x200002, 0x0) r1 = openat$cgroup_int(r0, &(0x7f0000000080)='hugetlb.2MB.limit_in_bytes\x00', 0x2, 0x0) write(r1, &(0x7f00000000c0), 0x0) 2018/04/13 21:32:55 executing program 3: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount(&(0x7f0000000300)='./file0\x00', &(0x7f0000000440)='./file0\x00', &(0x7f0000000880)='overlay\x00', 0x8018001, 0x0) r0 = geteuid() r1 = add_key$keyring(&(0x7f0000000200)='keyring\x00', &(0x7f0000000240)={0x73, 0x79, 0x7a, 0x0}, 0x0, 0x0, 0xfffffffffffffffc) r2 = add_key$keyring(&(0x7f00000001c0)='keyring\x00', &(0x7f0000000040)={0x73, 0x79, 0x7a, 0x1}, 0x0, 0x0, r1) r3 = socket$inet_icmp_raw(0x2, 0x3, 0x1) getpeername$packet(0xffffffffffffffff, &(0x7f00000004c0)={0x0, 0x0, 0x0}, &(0x7f0000000500)=0x14) setsockopt$inet_IP_XFRM_POLICY(r3, 0x0, 0x11, &(0x7f0000000540)={{{@in6=@dev={0xfe, 0x80, [], 0x17}, @in=@broadcast=0xffffffff, 0x4e20, 0x0, 0x4e24, 0x1, 0xa, 0x80, 0x0, 0x6e, r4, r0}, {0x8f64, 0xd93, 0x386, 0x8000, 0x5, 0x7, 0x6, 0x5}, {0x2, 0x5, 0x8, 0x1}, 0x80000000, 0x6e6bbc, 0x0, 0x0, 0x2, 0x3}, {{@in6=@dev={0xfe, 0x80, [], 0xf}, 0x4d6, 0xff}, 0xa, @in=@dev={0xac, 0x14, 0x14, 0x15}, 0x3501, 0x2, 0x1, 0x200, 0x4, 0x8000, 0x9}}, 0xe8) accept4$inet(r3, &(0x7f0000000380)={0x0, 0x0, @remote}, &(0x7f0000000480)=0x10, 0x80000) sysfs$2(0x2, 0x10005, &(0x7f0000000180)=""/40) keyctl$get_persistent(0x16, r0, r2) r5 = syz_open_dev$dmmidi(&(0x7f0000000100)='/dev/dmmidi#\x00', 0x9, 0x0) socketpair$unix(0x1, 0x7, 0x0, &(0x7f0000000640)) r6 = openat(0xffffffffffffffff, &(0x7f0000000180)='./file0\x00', 0x101000, 0x40) getsockopt$inet6_tcp_int(r6, 0x6, 0x15, &(0x7f0000000280), &(0x7f00000002c0)=0x4) r7 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0xf, 0x4, &(0x7f0000000000)=@raw=[@jmp={0x5, 0x31b, 0x6, 0x0, 0xf, 0x20, 0xfffffffffffffff9}, @map={0x18, 0x9, 0x1, 0x0, 0xffffffffffffff9c}], &(0x7f0000000040)='GPL\x00', 0x7f, 0x12, &(0x7f0000000080)=""/18, 0x41f00, 0x1}, 0x48) time(&(0x7f0000000240)) write(r7, &(0x7f00000001c0)="5f0c217533389178ce32aa5876702487b6f650188dc2ec57c33650ee1e9c356d12a6604cf8de7a17ff299d9a", 0x2c) memfd_create(&(0x7f0000000340)='/dev/dmmidi#\x00', 0x3) r8 = openat$mixer(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/mixer\x00', 0x0, 0x0) ioctl$VHOST_SET_MEM_TABLE(r8, 0x4008af03, &(0x7f0000000440)={0x80000000000006e, 0x0, [{0x2000, 0x0, &(0x7f00000003c0)=""/111}]}) ioctl$KVM_ASSIGN_PCI_DEVICE(r5, 0x8040ae69, &(0x7f0000000140)={0x6, 0x1, 0x0, 0x2, 0x4}) 2018/04/13 21:32:55 executing program 1: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000d1cff8)={0x5, 0x100, 0x100, 0x2}, 0x2c) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000269fb8)={0x1, 0x5, &(0x7f00000affc8)=@framed={{0x18}, [@map={0x18, 0x0, 0x1, 0x0, r0}], {0x95}}, &(0x7f000039cff6)='syzkaller\x00', 0x8, 0x1000, &(0x7f000039c000)=""/4096}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f000039efd8)={0xffffffffffffffff, 0x0, 0xfffffffffffffda3, 0x33, &(0x7f0000942000), &(0x7f00003a3fcd)=""/51}, 0x28) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f000032a000)={r1, 0x50, &(0x7f000039efb0)}, 0x10) 2018/04/13 21:32:55 executing program 4: bpf$MAP_CREATE(0x0, &(0x7f0000346fd4)={0x0, 0x0, 0x0, 0x101d}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0x1, 0x5, &(0x7f0000346fc8)=@framed={{0x18}, [@alu={0x7, 0x1f, 0x1, 0x0, 0x1}], {0x95}}, &(0x7f0000000000)='syzkaller\x00', 0x5c6e, 0xfb, &(0x7f00001a7f05)=""/251}, 0x48) 2018/04/13 21:32:55 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f0000002180)={&(0x7f0000000040)={0x10}, 0xc, &(0x7f0000002140)={&(0x7f0000000080)={0x18, 0x32, 0xfffffffffffffffd, 0x0, 0x0, {}, [@nested={0x4, 0x1}]}, 0x18}, 0x1}, 0x0) 2018/04/13 21:32:55 executing program 7: r0 = socket$can_bcm(0x1d, 0x2, 0x2) connect(r0, &(0x7f0000002000)=@ethernet, 0x10) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000006000)={'vcan0\x00', 0x0}) sendmsg$can_bcm(r0, &(0x7f0000000000)={&(0x7f0000004000)={0x1d, r1}, 0x10, &(0x7f0000002ff0)={&(0x7f0000001240)={0x1, 0xa64, 0x0, {}, {}, {}, 0x1, @canfd={{}, 0x0, 0x0, 0x0, 0x0, "fec57a703ef06725e974cbb001c587d796ac85e5f49a6e3e5a7c22522585a3e024d300a094ceb94c5f404a89ac331804a69f12e9a40afb854d359198939d4ba0"}}, 0x80}, 0x1}, 0x0) sendmsg$can_bcm(r0, &(0x7f0000012fc8)={&(0x7f0000010ff0)={0x1d}, 0x10, &(0x7f000000eff0)={&(0x7f0000007000)={0x2, 0x0, 0x0, {0x0, 0x2710}, {}, {}, 0x1, @can={{}, 0x0, 0x0, 0x0, 0x0, "e1a77d430f3e98a4"}}, 0x48}, 0x1}, 0x0) 2018/04/13 21:32:55 executing program 6: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x3) r1 = dup2(r0, r0) bind$bt_l2cap(r0, &(0x7f0000000040)={0x1f, 0x0, {0x0, 0x0, 0x0, 0xfffffffffffffffc}}, 0xe) connect$bt_l2cap(r1, &(0x7f0000000000)={0x1f, 0x0, {0x0, 0x0, 0x0, 0x0, 0x3}}, 0xe) 2018/04/13 21:32:55 executing program 4: bpf$MAP_CREATE(0x0, &(0x7f0000346fd4)={0x0, 0x0, 0x0, 0x101d}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0x1, 0x5, &(0x7f0000346fc8)=@framed={{0x18}, [@alu={0x7, 0x1f, 0x1, 0x0, 0x1}], {0x95}}, &(0x7f0000000000)='syzkaller\x00', 0x5c6e, 0xfb, &(0x7f00001a7f05)=""/251}, 0x48) 2018/04/13 21:32:55 executing program 7: r0 = socket$can_bcm(0x1d, 0x2, 0x2) connect(r0, &(0x7f0000002000)=@ethernet, 0x10) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000006000)={'vcan0\x00', 0x0}) sendmsg$can_bcm(r0, &(0x7f0000000000)={&(0x7f0000004000)={0x1d, r1}, 0x10, &(0x7f0000002ff0)={&(0x7f0000001240)={0x1, 0xa64, 0x0, {}, {}, {}, 0x1, @canfd={{}, 0x0, 0x0, 0x0, 0x0, "fec57a703ef06725e974cbb001c587d796ac85e5f49a6e3e5a7c22522585a3e024d300a094ceb94c5f404a89ac331804a69f12e9a40afb854d359198939d4ba0"}}, 0x80}, 0x1}, 0x0) sendmsg$can_bcm(r0, &(0x7f0000012fc8)={&(0x7f0000010ff0)={0x1d}, 0x10, &(0x7f000000eff0)={&(0x7f0000007000)={0x2, 0x0, 0x0, {0x0, 0x2710}, {}, {}, 0x1, @can={{}, 0x0, 0x0, 0x0, 0x0, "e1a77d430f3e98a4"}}, 0x48}, 0x1}, 0x0) 2018/04/13 21:32:55 executing program 5: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount(&(0x7f0000000300)='./file0\x00', &(0x7f0000000440)='./file0\x00', &(0x7f0000000880)='overlay\x00', 0x8018001, 0x0) r0 = geteuid() r1 = add_key$keyring(&(0x7f0000000200)='keyring\x00', &(0x7f0000000240)={0x73, 0x79, 0x7a, 0x0}, 0x0, 0x0, 0xfffffffffffffffc) r2 = add_key$keyring(&(0x7f00000001c0)='keyring\x00', &(0x7f0000000040)={0x73, 0x79, 0x7a, 0x1}, 0x0, 0x0, r1) r3 = socket$inet_icmp_raw(0x2, 0x3, 0x1) getpeername$packet(0xffffffffffffffff, &(0x7f00000004c0)={0x0, 0x0, 0x0}, &(0x7f0000000500)=0x14) setsockopt$inet_IP_XFRM_POLICY(r3, 0x0, 0x11, &(0x7f0000000540)={{{@in6=@dev={0xfe, 0x80, [], 0x17}, @in=@broadcast=0xffffffff, 0x4e20, 0x0, 0x4e24, 0x1, 0xa, 0x80, 0x0, 0x6e, r4, r0}, {0x8f64, 0xd93, 0x386, 0x8000, 0x5, 0x7, 0x6, 0x5}, {0x2, 0x5, 0x8, 0x1}, 0x80000000, 0x6e6bbc, 0x0, 0x0, 0x2, 0x3}, {{@in6=@dev={0xfe, 0x80, [], 0xf}, 0x4d6, 0xff}, 0xa, @in=@dev={0xac, 0x14, 0x14, 0x15}, 0x3501, 0x2, 0x1, 0x200, 0x4, 0x8000, 0x9}}, 0xe8) accept4$inet(r3, &(0x7f0000000380)={0x0, 0x0, @remote}, &(0x7f0000000480)=0x10, 0x80000) sysfs$2(0x2, 0x10005, &(0x7f0000000180)=""/40) keyctl$get_persistent(0x16, r0, r2) r5 = syz_open_dev$dmmidi(&(0x7f0000000100)='/dev/dmmidi#\x00', 0x9, 0x0) socketpair$unix(0x1, 0x7, 0x0, &(0x7f0000000640)) r6 = openat(0xffffffffffffffff, &(0x7f0000000180)='./file0\x00', 0x101000, 0x40) getsockopt$inet6_tcp_int(r6, 0x6, 0x15, &(0x7f0000000280), &(0x7f00000002c0)=0x4) r7 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0xf, 0x4, &(0x7f0000000000)=@raw=[@jmp={0x5, 0x31b, 0x6, 0x0, 0xf, 0x20, 0xfffffffffffffff9}, @map={0x18, 0x9, 0x1, 0x0, 0xffffffffffffff9c}], &(0x7f0000000040)='GPL\x00', 0x7f, 0x12, &(0x7f0000000080)=""/18, 0x41f00, 0x1}, 0x48) time(&(0x7f0000000240)) write(r7, &(0x7f00000001c0)="5f0c217533389178ce32aa5876702487b6f650188dc2ec57c33650ee1e9c356d12a6604cf8de7a17ff299d9a", 0x2c) memfd_create(&(0x7f0000000340)='/dev/dmmidi#\x00', 0x3) r8 = openat$mixer(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/mixer\x00', 0x0, 0x0) ioctl$VHOST_SET_MEM_TABLE(r8, 0x4008af03, &(0x7f0000000440)={0x80000000000006e, 0x0, [{0x2000, 0x0, &(0x7f00000003c0)=""/111}]}) ioctl$KVM_ASSIGN_PCI_DEVICE(r5, 0x8040ae69, &(0x7f0000000140)={0x6, 0x1, 0x0, 0x2, 0x4}) [ 256.276128] tc_dump_action: action bad kind 2018/04/13 21:32:55 executing program 3: r0 = socket(0x10, 0x802, 0x0) write(r0, &(0x7f0000000000)="240000002a0025f000154302180000e4020000000200000000000000cdb0b7ac175d0a00", 0x24) 2018/04/13 21:32:55 executing program 2: syz_mount_image$gfs2(&(0x7f0000000040)='gfs2\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x0, &(0x7f0000000500), 0x0, &(0x7f00000005c0)={[{@data_writeback='data=writeback', 0x2c}]}) 2018/04/13 21:32:55 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f0000002180)={&(0x7f0000000040)={0x10}, 0xc, &(0x7f0000002140)={&(0x7f0000000080)={0x18, 0x32, 0xfffffffffffffffd, 0x0, 0x0, {}, [@nested={0x4, 0x1}]}, 0x18}, 0x1}, 0x0) 2018/04/13 21:32:55 executing program 4: bpf$MAP_CREATE(0x0, &(0x7f0000346fd4)={0x0, 0x0, 0x0, 0x101d}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0x1, 0x5, &(0x7f0000346fc8)=@framed={{0x18}, [@alu={0x7, 0x1f, 0x1, 0x0, 0x1}], {0x95}}, &(0x7f0000000000)='syzkaller\x00', 0x5c6e, 0xfb, &(0x7f00001a7f05)=""/251}, 0x48) 2018/04/13 21:32:55 executing program 6: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x3) r1 = dup2(r0, r0) bind$bt_l2cap(r0, &(0x7f0000000040)={0x1f, 0x0, {0x0, 0x0, 0x0, 0xfffffffffffffffc}}, 0xe) connect$bt_l2cap(r1, &(0x7f0000000000)={0x1f, 0x0, {0x0, 0x0, 0x0, 0x0, 0x3}}, 0xe) 2018/04/13 21:32:55 executing program 5: r0 = syz_open_dev$evdev(&(0x7f0000fc0000)='/dev/input/event#\x00', 0x0, 0x0) ioctl$EVIOCGMASK(r0, 0x80104592, &(0x7f0000dd5000)={0x17, 0x0, &(0x7f0000000080)}) 2018/04/13 21:32:55 executing program 1: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000d1cff8)={0x5, 0x100, 0x100, 0x2}, 0x2c) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000269fb8)={0x1, 0x5, &(0x7f00000affc8)=@framed={{0x18}, [@map={0x18, 0x0, 0x1, 0x0, r0}], {0x95}}, &(0x7f000039cff6)='syzkaller\x00', 0x8, 0x1000, &(0x7f000039c000)=""/4096}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f000039efd8)={0xffffffffffffffff, 0x0, 0xfffffffffffffda3, 0x33, &(0x7f0000942000), &(0x7f00003a3fcd)=""/51}, 0x28) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f000032a000)={r1, 0x50, &(0x7f000039efb0)}, 0x10) 2018/04/13 21:32:55 executing program 7: r0 = socket$can_bcm(0x1d, 0x2, 0x2) connect(r0, &(0x7f0000002000)=@ethernet, 0x10) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000006000)={'vcan0\x00', 0x0}) sendmsg$can_bcm(r0, &(0x7f0000000000)={&(0x7f0000004000)={0x1d, r1}, 0x10, &(0x7f0000002ff0)={&(0x7f0000001240)={0x1, 0xa64, 0x0, {}, {}, {}, 0x1, @canfd={{}, 0x0, 0x0, 0x0, 0x0, "fec57a703ef06725e974cbb001c587d796ac85e5f49a6e3e5a7c22522585a3e024d300a094ceb94c5f404a89ac331804a69f12e9a40afb854d359198939d4ba0"}}, 0x80}, 0x1}, 0x0) sendmsg$can_bcm(r0, &(0x7f0000012fc8)={&(0x7f0000010ff0)={0x1d}, 0x10, &(0x7f000000eff0)={&(0x7f0000007000)={0x2, 0x0, 0x0, {0x0, 0x2710}, {}, {}, 0x1, @can={{}, 0x0, 0x0, 0x0, 0x0, "e1a77d430f3e98a4"}}, 0x48}, 0x1}, 0x0) [ 256.393117] tc_dump_action: action bad kind 2018/04/13 21:32:56 executing program 3: r0 = socket(0x10, 0x802, 0x0) write(r0, &(0x7f0000000000)="240000002a0025f000154302180000e4020000000200000000000000cdb0b7ac175d0a00", 0x24) 2018/04/13 21:32:56 executing program 6: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x3) r1 = dup2(r0, r0) bind$bt_l2cap(r0, &(0x7f0000000040)={0x1f, 0x0, {0x0, 0x0, 0x0, 0xfffffffffffffffc}}, 0xe) connect$bt_l2cap(r1, &(0x7f0000000000)={0x1f, 0x0, {0x0, 0x0, 0x0, 0x0, 0x3}}, 0xe) 2018/04/13 21:32:56 executing program 2: r0 = perf_event_open(&(0x7f0000271000)={0x2, 0x70, 0x0, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000fd9000)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r1, 0x40045431, &(0x7f00003b9fdc)) r2 = syz_open_pts(r1, 0x0) dup3(r0, r1, 0x0) r3 = epoll_create(0x6) epoll_ctl$EPOLL_CTL_ADD(r3, 0x1, r2, &(0x7f0000fdb000)) 2018/04/13 21:32:56 executing program 4: bpf$MAP_CREATE(0x0, &(0x7f0000346fd4)={0x0, 0x0, 0x0, 0x101d}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0x1, 0x5, &(0x7f0000346fc8)=@framed={{0x18}, [@alu={0x7, 0x1f, 0x1, 0x0, 0x1}], {0x95}}, &(0x7f0000000000)='syzkaller\x00', 0x5c6e, 0xfb, &(0x7f00001a7f05)=""/251}, 0x48) 2018/04/13 21:32:56 executing program 7: r0 = socket$can_bcm(0x1d, 0x2, 0x2) connect(r0, &(0x7f0000002000)=@ethernet, 0x10) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000006000)={'vcan0\x00', 0x0}) sendmsg$can_bcm(r0, &(0x7f0000000000)={&(0x7f0000004000)={0x1d, r1}, 0x10, &(0x7f0000002ff0)={&(0x7f0000001240)={0x1, 0xa64, 0x0, {}, {}, {}, 0x1, @canfd={{}, 0x0, 0x0, 0x0, 0x0, "fec57a703ef06725e974cbb001c587d796ac85e5f49a6e3e5a7c22522585a3e024d300a094ceb94c5f404a89ac331804a69f12e9a40afb854d359198939d4ba0"}}, 0x80}, 0x1}, 0x0) sendmsg$can_bcm(r0, &(0x7f0000012fc8)={&(0x7f0000010ff0)={0x1d}, 0x10, &(0x7f000000eff0)={&(0x7f0000007000)={0x2, 0x0, 0x0, {0x0, 0x2710}, {}, {}, 0x1, @can={{}, 0x0, 0x0, 0x0, 0x0, "e1a77d430f3e98a4"}}, 0x48}, 0x1}, 0x0) 2018/04/13 21:32:56 executing program 1: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000d1cff8)={0x5, 0x100, 0x100, 0x2}, 0x2c) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000269fb8)={0x1, 0x5, &(0x7f00000affc8)=@framed={{0x18}, [@map={0x18, 0x0, 0x1, 0x0, r0}], {0x95}}, &(0x7f000039cff6)='syzkaller\x00', 0x8, 0x1000, &(0x7f000039c000)=""/4096}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f000039efd8)={0xffffffffffffffff, 0x0, 0xfffffffffffffda3, 0x33, &(0x7f0000942000), &(0x7f00003a3fcd)=""/51}, 0x28) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f000032a000)={r1, 0x50, &(0x7f000039efb0)}, 0x10) 2018/04/13 21:32:56 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f0000002180)={&(0x7f0000000040)={0x10}, 0xc, &(0x7f0000002140)={&(0x7f0000000080)={0x18, 0x32, 0xfffffffffffffffd, 0x0, 0x0, {}, [@nested={0x4, 0x1}]}, 0x18}, 0x1}, 0x0) 2018/04/13 21:32:56 executing program 5: r0 = syz_open_dev$evdev(&(0x7f0000fc0000)='/dev/input/event#\x00', 0x0, 0x0) ioctl$EVIOCGMASK(r0, 0x80104592, &(0x7f0000dd5000)={0x17, 0x0, &(0x7f0000000080)}) 2018/04/13 21:32:56 executing program 6: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x3) r1 = dup2(r0, r0) bind$bt_l2cap(r0, &(0x7f0000000040)={0x1f, 0x0, {0x0, 0x0, 0x0, 0xfffffffffffffffc}}, 0xe) connect$bt_l2cap(r1, &(0x7f0000000000)={0x1f, 0x0, {0x0, 0x0, 0x0, 0x0, 0x3}}, 0xe) 2018/04/13 21:32:56 executing program 3: r0 = socket(0x10, 0x802, 0x0) write(r0, &(0x7f0000000000)="240000002a0025f000154302180000e4020000000200000000000000cdb0b7ac175d0a00", 0x24) 2018/04/13 21:32:56 executing program 7: perf_event_open(&(0x7f0000348f88)={0x2, 0x70, 0x3e6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount(&(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='bpf\x00', 0x0, &(0x7f0000000140)) syz_fuse_mount(&(0x7f0000000140)='./file0/.ile0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 2018/04/13 21:32:56 executing program 4: r0 = socket$inet_sctp(0x2, 0x5, 0x84) mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp_SCTP_GET_PEER_ADDR_INFO(r0, 0x84, 0xf, &(0x7f0000001500)={0x0, @in={{0x2, 0x0, @rand_addr}}}, &(0x7f00000001c0)=0xa0) 2018/04/13 21:32:56 executing program 5: r0 = syz_open_dev$evdev(&(0x7f0000fc0000)='/dev/input/event#\x00', 0x0, 0x0) ioctl$EVIOCGMASK(r0, 0x80104592, &(0x7f0000dd5000)={0x17, 0x0, &(0x7f0000000080)}) [ 256.520899] tc_dump_action: action bad kind 2018/04/13 21:32:56 executing program 2: r0 = perf_event_open(&(0x7f0000271000)={0x2, 0x70, 0x0, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000fd9000)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r1, 0x40045431, &(0x7f00003b9fdc)) r2 = syz_open_pts(r1, 0x0) dup3(r0, r1, 0x0) r3 = epoll_create(0x6) epoll_ctl$EPOLL_CTL_ADD(r3, 0x1, r2, &(0x7f0000fdb000)) 2018/04/13 21:32:56 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f0000002180)={&(0x7f0000000040)={0x10}, 0xc, &(0x7f0000002140)={&(0x7f0000000080)={0x18, 0x32, 0xfffffffffffffffd, 0x0, 0x0, {}, [@nested={0x4, 0x1}]}, 0x18}, 0x1}, 0x0) [ 256.605395] tc_dump_action: action bad kind 2018/04/13 21:32:56 executing program 0: r0 = socket(0x40000000015, 0x5, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f00000001c0)={0x0, 0x0}, &(0x7f0000000200)=0x5) setresuid(0x0, r1, r1) setuid(r1) 2018/04/13 21:32:56 executing program 1: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000d1cff8)={0x5, 0x100, 0x100, 0x2}, 0x2c) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000269fb8)={0x1, 0x5, &(0x7f00000affc8)=@framed={{0x18}, [@map={0x18, 0x0, 0x1, 0x0, r0}], {0x95}}, &(0x7f000039cff6)='syzkaller\x00', 0x8, 0x1000, &(0x7f000039c000)=""/4096}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f000039efd8)={0xffffffffffffffff, 0x0, 0xfffffffffffffda3, 0x33, &(0x7f0000942000), &(0x7f00003a3fcd)=""/51}, 0x28) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f000032a000)={r1, 0x50, &(0x7f000039efb0)}, 0x10) 2018/04/13 21:32:56 executing program 3: r0 = socket(0x10, 0x802, 0x0) write(r0, &(0x7f0000000000)="240000002a0025f000154302180000e4020000000200000000000000cdb0b7ac175d0a00", 0x24) 2018/04/13 21:32:56 executing program 4: r0 = socket$inet_sctp(0x2, 0x5, 0x84) mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp_SCTP_GET_PEER_ADDR_INFO(r0, 0x84, 0xf, &(0x7f0000001500)={0x0, @in={{0x2, 0x0, @rand_addr}}}, &(0x7f00000001c0)=0xa0) 2018/04/13 21:32:56 executing program 5: r0 = syz_open_dev$evdev(&(0x7f0000fc0000)='/dev/input/event#\x00', 0x0, 0x0) ioctl$EVIOCGMASK(r0, 0x80104592, &(0x7f0000dd5000)={0x17, 0x0, &(0x7f0000000080)}) 2018/04/13 21:32:56 executing program 7: perf_event_open(&(0x7f0000348f88)={0x2, 0x70, 0x3e6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount(&(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='bpf\x00', 0x0, &(0x7f0000000140)) syz_fuse_mount(&(0x7f0000000140)='./file0/.ile0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 2018/04/13 21:32:56 executing program 2: r0 = perf_event_open(&(0x7f0000271000)={0x2, 0x70, 0x0, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000fd9000)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r1, 0x40045431, &(0x7f00003b9fdc)) r2 = syz_open_pts(r1, 0x0) dup3(r0, r1, 0x0) r3 = epoll_create(0x6) epoll_ctl$EPOLL_CTL_ADD(r3, 0x1, r2, &(0x7f0000fdb000)) 2018/04/13 21:32:56 executing program 6: r0 = socket$inet(0x2, 0x1, 0x0) connect$inet(0xffffffffffffffff, &(0x7f00009322c4)={0x2, 0x0, @local={0xac, 0x14, 0xffffffffffffffff, 0xaa}}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000000)='veno\x00', 0x5) connect$inet(r0, &(0x7f00000dcff0)={0x2, 0x0, @loopback=0x7f000001}, 0x10) shutdown(r0, 0x0) 2018/04/13 21:32:56 executing program 4: r0 = socket$inet_sctp(0x2, 0x5, 0x84) mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp_SCTP_GET_PEER_ADDR_INFO(r0, 0x84, 0xf, &(0x7f0000001500)={0x0, @in={{0x2, 0x0, @rand_addr}}}, &(0x7f00000001c0)=0xa0) 2018/04/13 21:32:56 executing program 3: r0 = socket(0x10, 0x8000000000002, 0x0) creat(&(0x7f00000000c0)='./file0\x00', 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000b34ff8)={0x0, 0x0, 0x0}, &(0x7f0000b34ffc)=0xc) chown(&(0x7f0000000340)='./file0\x00', r1, r2) 2018/04/13 21:32:56 executing program 5: perf_event_open(&(0x7f0000348f88)={0x2, 0x70, 0x3e6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = memfd_create(&(0x7f0000000000)="00000000004560f38ad02000000000800000000000000000000000", 0x0) write$binfmt_elf64(r0, &(0x7f0000000340)=ANY=[@ANYBLOB="7f454c46ff000000000000000000000003003e00000000001600000000000000400000000000000000000000000000000000000000003800020000000000000000000000000000000000000000000000000000000000000000000000000000000000080000000000000000000006000000000000000000000300000000000000000000000000000000000000000500000000000000000000000000000000000000000000000000000000000000000000"], 0xb0) execveat(r0, &(0x7f0000ff7000)='./file0\x00', &(0x7f0000d0e000), &(0x7f000034bff8)=[&(0x7f0000ff7000)="00000000000000060804002000fffc0c6565643b799365005f1b76"], 0x1000) 2018/04/13 21:32:56 executing program 0: r0 = socket(0x40000000015, 0x5, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f00000001c0)={0x0, 0x0}, &(0x7f0000000200)=0x5) setresuid(0x0, r1, r1) setuid(r1) 2018/04/13 21:32:56 executing program 6: r0 = socket$unix(0x1, 0x1, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000a92ff7)='net/unix\x00') sendfile(r0, r1, &(0x7f0000000300)=0xfffffc, 0x10ff) 2018/04/13 21:32:56 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) r1 = socket$inet6(0xa, 0x2, 0x0) r2 = socket(0x1, 0xa, 0x9) socket$nl_generic(0x10, 0x3, 0x10) r3 = syz_genetlink_get_family_id$ipvs(&(0x7f00000001c0)='IPVS\x00') r4 = memfd_create(&(0x7f0000d2efff)='\x00', 0x0) r5 = syz_open_dev$sndseq(&(0x7f0000042000)='/dev/snd/seq\x00', 0x0, 0x8000000000102) r6 = dup2(r5, r4) perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r6, 0xc08c5332, &(0x7f0000001000)={0x0, 0x0, 0x0, "9ede7a8c5ae95ec8672c93340f643a664f13eeab65c0322901dc6bd36cde2c51f01b7f0b014f9f91eeb7c37c7240f476c8d753d000aa8faf8fb574dbcfa6dc4d"}) write$sndseq(r5, &(0x7f00000001c0)=[{0x0, 0x0, 0x0, 0x0, @time={0x0, 0x989680}, {}, {}, @control={0x2a}}, {0x0, 0x0, 0x0, 0x0, @time, {}, {}, @addr}], 0x60) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r4, 0x4040534e, &(0x7f0000000040)={0x2}) sendmsg$IPVS_CMD_GET_DAEMON(r2, &(0x7f00000002c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x10000004}, 0xc, &(0x7f0000000280)={&(0x7f0000000200)={0x60, r3, 0x400, 0x70bd2d, 0x25dfdbfe, {0xb}, [@IPVS_CMD_ATTR_DEST={0x14, 0x2, [@IPVS_DEST_ATTR_U_THRESH={0x8, 0x5, 0x5}, @IPVS_DEST_ATTR_FWD_METHOD={0x8, 0x3}]}, @IPVS_CMD_ATTR_DEST={0x38, 0x2, [@IPVS_DEST_ATTR_PERSIST_CONNS={0x8, 0x9, 0x3}, @IPVS_DEST_ATTR_U_THRESH={0x8, 0x5, 0xfffffffffffff98b}, @IPVS_DEST_ATTR_ADDR={0x14, 0x1, @ipv4=@multicast2=0xe0000002}, @IPVS_DEST_ATTR_FWD_METHOD={0x8, 0x3, 0x7}, @IPVS_DEST_ATTR_WEIGHT={0x8, 0x4, 0x4}]}]}, 0x60}, 0x1, 0x0, 0x0, 0x80}, 0x20000000) connect$inet6(r1, &(0x7f000052f000)={0xa, 0x0, 0x0, @mcast2={0xff, 0x2, [], 0x1}, 0x7}, 0x1c) setsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, &(0x7f0000c9af18)={{{@in=@rand_addr, @in6=@dev={0xfe, 0x80}, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@multicast2=0xe0000002, 0x4d3, 0x3c}, 0x0, @in6=@ipv4={[], [0xff, 0xff], @remote={0xac, 0x14, 0xffffffffffffffff, 0xbb}}, 0x0, 0x0, 0x0, 0xfffffffffffffffd}}, 0xe8) r7 = dup2(r1, r2) ioctl$sock_kcm_SIOCKCMATTACH(r2, 0x89e0, &(0x7f0000000300)={r2, r7}) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r1, 0xc08c5332, &(0x7f0000000040)={0x0, 0x0, 0x8000, 'queue0\x00', 0x20}) sendmsg$key(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000180)=ANY=[@ANYBLOB="0207000702000000008000000000000004fde3f4df0088"], 0x17}, 0x1}, 0x0) sendmsg(r1, &(0x7f00000024c0)={0x0, 0x0, &(0x7f0000002400)}, 0x0) 2018/04/13 21:32:56 executing program 2: r0 = perf_event_open(&(0x7f0000271000)={0x2, 0x70, 0x0, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000fd9000)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r1, 0x40045431, &(0x7f00003b9fdc)) r2 = syz_open_pts(r1, 0x0) dup3(r0, r1, 0x0) r3 = epoll_create(0x6) epoll_ctl$EPOLL_CTL_ADD(r3, 0x1, r2, &(0x7f0000fdb000)) 2018/04/13 21:32:56 executing program 7: perf_event_open(&(0x7f0000348f88)={0x2, 0x70, 0x3e6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount(&(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='bpf\x00', 0x0, &(0x7f0000000140)) syz_fuse_mount(&(0x7f0000000140)='./file0/.ile0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 2018/04/13 21:32:56 executing program 4: r0 = socket$inet_sctp(0x2, 0x5, 0x84) mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp_SCTP_GET_PEER_ADDR_INFO(r0, 0x84, 0xf, &(0x7f0000001500)={0x0, @in={{0x2, 0x0, @rand_addr}}}, &(0x7f00000001c0)=0xa0) 2018/04/13 21:32:56 executing program 3: r0 = socket(0x10, 0x8000000000002, 0x0) creat(&(0x7f00000000c0)='./file0\x00', 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000b34ff8)={0x0, 0x0, 0x0}, &(0x7f0000b34ffc)=0xc) chown(&(0x7f0000000340)='./file0\x00', r1, r2) 2018/04/13 21:32:56 executing program 7: perf_event_open(&(0x7f0000348f88)={0x2, 0x70, 0x3e6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount(&(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='bpf\x00', 0x0, &(0x7f0000000140)) syz_fuse_mount(&(0x7f0000000140)='./file0/.ile0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 2018/04/13 21:32:56 executing program 0: r0 = socket(0x40000000015, 0x5, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f00000001c0)={0x0, 0x0}, &(0x7f0000000200)=0x5) setresuid(0x0, r1, r1) setuid(r1) 2018/04/13 21:32:56 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f0000005000)={&(0x7f0000000000)={0x10}, 0xc, &(0x7f0000015ff0)={&(0x7f0000023000)={0x14, 0x21, 0x10000000aff}, 0x14}, 0x1}, 0x0) 2018/04/13 21:32:56 executing program 6: rmdir(&(0x7f00000000c0)='./file0\x00') ioctl$sock_SIOCGPGRP(0xffffffffffffff9c, 0x8904, &(0x7f0000000080)=0x0) r1 = getpgrp(r0) r2 = dup2(0xffffffffffffff9c, 0xffffffffffffff9c) perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x5, 0x4, 0x0, 0x0, 0x80000001, 0xc0012, 0x8, 0x401, 0x4c13, 0xffffffff, 0x3, 0xabb4, 0xffffffff80000001, 0x4, 0x200, 0x40, 0x10001, 0x400, 0x8, 0x8, 0x9, 0x6, 0x7fffffff, 0x7f, 0x1, 0x40, 0x200, 0x5, 0x1846, 0x8, 0x8, 0x3, 0xffffffff, 0x3, 0x0, 0x0, 0x4, 0x1, @perf_bp={&(0x7f0000000040), 0xb}, 0x22000, 0x1, 0x6, 0x0, 0x1, 0x10000, 0xdc3}, r1, 0xb, r2, 0x1) perf_event_open(&(0x7f0000348f88)={0x2, 0x78, 0x3e2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_fuseblk_mount(&(0x7f0000000140)='./file0\x00', &(0x7f0000000440)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) acct(&(0x7f0000000380)='./file0\x00') getsockopt$inet6_IPV6_XFRM_POLICY(r2, 0x29, 0x23, &(0x7f0000000200)={{{@in6=@mcast1, @in=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast2}, 0x0, @in=@multicast1}}, &(0x7f0000000100)=0xe8) r4 = socket$nl_generic(0x10, 0x3, 0x10) msgget$private(0x0, 0x4) r5 = syz_genetlink_get_family_id$fou(&(0x7f0000000040)='fou\x00') sendmsg$FOU_CMD_ADD(r4, &(0x7f0000000100)={&(0x7f0000000000)={0x10}, 0xc, &(0x7f0000000180)={&(0x7f0000000140)={0x1c, r5, 0xc09, 0x0, 0x0, {0x1}, [@FOU_ATTR_TYPE={0x8, 0x4, 0x1}]}, 0x1c}, 0x1}, 0x0) bind$bt_hci(r2, &(0x7f0000000300)={0x1f, r3, 0x1}, 0xc) 2018/04/13 21:32:56 executing program 2: syz_mount_image$xfs(&(0x7f0000000000)='xfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f00000004c0), 0x0, &(0x7f0000000580)={'nouuid,', {[{@swidth={'swidth', 0x3d, [0x38]}, 0x2c}, {@sunit={'sunit', 0x3d, [0x35]}, 0x2c}]}}) 2018/04/13 21:32:56 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) r1 = socket$inet6(0xa, 0x2, 0x0) r2 = socket(0x1, 0xa, 0x9) socket$nl_generic(0x10, 0x3, 0x10) r3 = syz_genetlink_get_family_id$ipvs(&(0x7f00000001c0)='IPVS\x00') r4 = memfd_create(&(0x7f0000d2efff)='\x00', 0x0) r5 = syz_open_dev$sndseq(&(0x7f0000042000)='/dev/snd/seq\x00', 0x0, 0x8000000000102) r6 = dup2(r5, r4) perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r6, 0xc08c5332, &(0x7f0000001000)={0x0, 0x0, 0x0, "9ede7a8c5ae95ec8672c93340f643a664f13eeab65c0322901dc6bd36cde2c51f01b7f0b014f9f91eeb7c37c7240f476c8d753d000aa8faf8fb574dbcfa6dc4d"}) write$sndseq(r5, &(0x7f00000001c0)=[{0x0, 0x0, 0x0, 0x0, @time={0x0, 0x989680}, {}, {}, @control={0x2a}}, {0x0, 0x0, 0x0, 0x0, @time, {}, {}, @addr}], 0x60) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r4, 0x4040534e, &(0x7f0000000040)={0x2}) sendmsg$IPVS_CMD_GET_DAEMON(r2, &(0x7f00000002c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x10000004}, 0xc, &(0x7f0000000280)={&(0x7f0000000200)={0x60, r3, 0x400, 0x70bd2d, 0x25dfdbfe, {0xb}, [@IPVS_CMD_ATTR_DEST={0x14, 0x2, [@IPVS_DEST_ATTR_U_THRESH={0x8, 0x5, 0x5}, @IPVS_DEST_ATTR_FWD_METHOD={0x8, 0x3}]}, @IPVS_CMD_ATTR_DEST={0x38, 0x2, [@IPVS_DEST_ATTR_PERSIST_CONNS={0x8, 0x9, 0x3}, @IPVS_DEST_ATTR_U_THRESH={0x8, 0x5, 0xfffffffffffff98b}, @IPVS_DEST_ATTR_ADDR={0x14, 0x1, @ipv4=@multicast2=0xe0000002}, @IPVS_DEST_ATTR_FWD_METHOD={0x8, 0x3, 0x7}, @IPVS_DEST_ATTR_WEIGHT={0x8, 0x4, 0x4}]}]}, 0x60}, 0x1, 0x0, 0x0, 0x80}, 0x20000000) connect$inet6(r1, &(0x7f000052f000)={0xa, 0x0, 0x0, @mcast2={0xff, 0x2, [], 0x1}, 0x7}, 0x1c) setsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, &(0x7f0000c9af18)={{{@in=@rand_addr, @in6=@dev={0xfe, 0x80}, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@multicast2=0xe0000002, 0x4d3, 0x3c}, 0x0, @in6=@ipv4={[], [0xff, 0xff], @remote={0xac, 0x14, 0xffffffffffffffff, 0xbb}}, 0x0, 0x0, 0x0, 0xfffffffffffffffd}}, 0xe8) r7 = dup2(r1, r2) ioctl$sock_kcm_SIOCKCMATTACH(r2, 0x89e0, &(0x7f0000000300)={r2, r7}) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r1, 0xc08c5332, &(0x7f0000000040)={0x0, 0x0, 0x8000, 'queue0\x00', 0x20}) sendmsg$key(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000180)=ANY=[@ANYBLOB="0207000702000000008000000000000004fde3f4df0088"], 0x17}, 0x1}, 0x0) sendmsg(r1, &(0x7f00000024c0)={0x0, 0x0, &(0x7f0000002400)}, 0x0) 2018/04/13 21:32:56 executing program 5: perf_event_open(&(0x7f0000348f88)={0x2, 0x70, 0x3e6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = memfd_create(&(0x7f0000000000)="00000000004560f38ad02000000000800000000000000000000000", 0x0) write$binfmt_elf64(r0, &(0x7f0000000340)=ANY=[@ANYBLOB="7f454c46ff000000000000000000000003003e00000000001600000000000000400000000000000000000000000000000000000000003800020000000000000000000000000000000000000000000000000000000000000000000000000000000000080000000000000000000006000000000000000000000300000000000000000000000000000000000000000500000000000000000000000000000000000000000000000000000000000000000000"], 0xb0) execveat(r0, &(0x7f0000ff7000)='./file0\x00', &(0x7f0000d0e000), &(0x7f000034bff8)=[&(0x7f0000ff7000)="00000000000000060804002000fffc0c6565643b799365005f1b76"], 0x1000) 2018/04/13 21:32:56 executing program 3: r0 = socket(0x10, 0x8000000000002, 0x0) creat(&(0x7f00000000c0)='./file0\x00', 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000b34ff8)={0x0, 0x0, 0x0}, &(0x7f0000b34ffc)=0xc) chown(&(0x7f0000000340)='./file0\x00', r1, r2) 2018/04/13 21:32:56 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f0000005000)={&(0x7f0000000000)={0x10}, 0xc, &(0x7f0000015ff0)={&(0x7f0000023000)={0x14, 0x21, 0x10000000aff}, 0x14}, 0x1}, 0x0) 2018/04/13 21:32:56 executing program 0: r0 = socket(0x40000000015, 0x5, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f00000001c0)={0x0, 0x0}, &(0x7f0000000200)=0x5) setresuid(0x0, r1, r1) setuid(r1) 2018/04/13 21:32:56 executing program 2: r0 = socket$key(0xf, 0x3, 0x2) r1 = socket$inet6(0xa, 0x2, 0x0) r2 = socket(0x1, 0xa, 0x9) socket$nl_generic(0x10, 0x3, 0x10) r3 = syz_genetlink_get_family_id$ipvs(&(0x7f00000001c0)='IPVS\x00') r4 = memfd_create(&(0x7f0000d2efff)='\x00', 0x0) r5 = syz_open_dev$sndseq(&(0x7f0000042000)='/dev/snd/seq\x00', 0x0, 0x8000000000102) r6 = dup2(r5, r4) perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r6, 0xc08c5332, &(0x7f0000001000)={0x0, 0x0, 0x0, "9ede7a8c5ae95ec8672c93340f643a664f13eeab65c0322901dc6bd36cde2c51f01b7f0b014f9f91eeb7c37c7240f476c8d753d000aa8faf8fb574dbcfa6dc4d"}) write$sndseq(r5, &(0x7f00000001c0)=[{0x0, 0x0, 0x0, 0x0, @time={0x0, 0x989680}, {}, {}, @control={0x2a}}, {0x0, 0x0, 0x0, 0x0, @time, {}, {}, @addr}], 0x60) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r4, 0x4040534e, &(0x7f0000000040)={0x2}) sendmsg$IPVS_CMD_GET_DAEMON(r2, &(0x7f00000002c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x10000004}, 0xc, &(0x7f0000000280)={&(0x7f0000000200)={0x60, r3, 0x400, 0x70bd2d, 0x25dfdbfe, {0xb}, [@IPVS_CMD_ATTR_DEST={0x14, 0x2, [@IPVS_DEST_ATTR_U_THRESH={0x8, 0x5, 0x5}, @IPVS_DEST_ATTR_FWD_METHOD={0x8, 0x3}]}, @IPVS_CMD_ATTR_DEST={0x38, 0x2, [@IPVS_DEST_ATTR_PERSIST_CONNS={0x8, 0x9, 0x3}, @IPVS_DEST_ATTR_U_THRESH={0x8, 0x5, 0xfffffffffffff98b}, @IPVS_DEST_ATTR_ADDR={0x14, 0x1, @ipv4=@multicast2=0xe0000002}, @IPVS_DEST_ATTR_FWD_METHOD={0x8, 0x3, 0x7}, @IPVS_DEST_ATTR_WEIGHT={0x8, 0x4, 0x4}]}]}, 0x60}, 0x1, 0x0, 0x0, 0x80}, 0x20000000) connect$inet6(r1, &(0x7f000052f000)={0xa, 0x0, 0x0, @mcast2={0xff, 0x2, [], 0x1}, 0x7}, 0x1c) setsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, &(0x7f0000c9af18)={{{@in=@rand_addr, @in6=@dev={0xfe, 0x80}, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@multicast2=0xe0000002, 0x4d3, 0x3c}, 0x0, @in6=@ipv4={[], [0xff, 0xff], @remote={0xac, 0x14, 0xffffffffffffffff, 0xbb}}, 0x0, 0x0, 0x0, 0xfffffffffffffffd}}, 0xe8) r7 = dup2(r1, r2) ioctl$sock_kcm_SIOCKCMATTACH(r2, 0x89e0, &(0x7f0000000300)={r2, r7}) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r1, 0xc08c5332, &(0x7f0000000040)={0x0, 0x0, 0x8000, 'queue0\x00', 0x20}) sendmsg$key(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000180)=ANY=[@ANYBLOB="0207000702000000008000000000000004fde3f4df0088"], 0x17}, 0x1}, 0x0) sendmsg(r1, &(0x7f00000024c0)={0x0, 0x0, &(0x7f0000002400)}, 0x0) [ 256.935929] netlink: 'syz-executor6': attribute type 4 has an invalid length. 2018/04/13 21:32:56 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) r1 = socket$inet6(0xa, 0x2, 0x0) r2 = socket(0x1, 0xa, 0x9) socket$nl_generic(0x10, 0x3, 0x10) r3 = syz_genetlink_get_family_id$ipvs(&(0x7f00000001c0)='IPVS\x00') r4 = memfd_create(&(0x7f0000d2efff)='\x00', 0x0) r5 = syz_open_dev$sndseq(&(0x7f0000042000)='/dev/snd/seq\x00', 0x0, 0x8000000000102) r6 = dup2(r5, r4) perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r6, 0xc08c5332, &(0x7f0000001000)={0x0, 0x0, 0x0, "9ede7a8c5ae95ec8672c93340f643a664f13eeab65c0322901dc6bd36cde2c51f01b7f0b014f9f91eeb7c37c7240f476c8d753d000aa8faf8fb574dbcfa6dc4d"}) write$sndseq(r5, &(0x7f00000001c0)=[{0x0, 0x0, 0x0, 0x0, @time={0x0, 0x989680}, {}, {}, @control={0x2a}}, {0x0, 0x0, 0x0, 0x0, @time, {}, {}, @addr}], 0x60) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r4, 0x4040534e, &(0x7f0000000040)={0x2}) sendmsg$IPVS_CMD_GET_DAEMON(r2, &(0x7f00000002c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x10000004}, 0xc, &(0x7f0000000280)={&(0x7f0000000200)={0x60, r3, 0x400, 0x70bd2d, 0x25dfdbfe, {0xb}, [@IPVS_CMD_ATTR_DEST={0x14, 0x2, [@IPVS_DEST_ATTR_U_THRESH={0x8, 0x5, 0x5}, @IPVS_DEST_ATTR_FWD_METHOD={0x8, 0x3}]}, @IPVS_CMD_ATTR_DEST={0x38, 0x2, [@IPVS_DEST_ATTR_PERSIST_CONNS={0x8, 0x9, 0x3}, @IPVS_DEST_ATTR_U_THRESH={0x8, 0x5, 0xfffffffffffff98b}, @IPVS_DEST_ATTR_ADDR={0x14, 0x1, @ipv4=@multicast2=0xe0000002}, @IPVS_DEST_ATTR_FWD_METHOD={0x8, 0x3, 0x7}, @IPVS_DEST_ATTR_WEIGHT={0x8, 0x4, 0x4}]}]}, 0x60}, 0x1, 0x0, 0x0, 0x80}, 0x20000000) connect$inet6(r1, &(0x7f000052f000)={0xa, 0x0, 0x0, @mcast2={0xff, 0x2, [], 0x1}, 0x7}, 0x1c) setsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, &(0x7f0000c9af18)={{{@in=@rand_addr, @in6=@dev={0xfe, 0x80}, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@multicast2=0xe0000002, 0x4d3, 0x3c}, 0x0, @in6=@ipv4={[], [0xff, 0xff], @remote={0xac, 0x14, 0xffffffffffffffff, 0xbb}}, 0x0, 0x0, 0x0, 0xfffffffffffffffd}}, 0xe8) r7 = dup2(r1, r2) ioctl$sock_kcm_SIOCKCMATTACH(r2, 0x89e0, &(0x7f0000000300)={r2, r7}) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r1, 0xc08c5332, &(0x7f0000000040)={0x0, 0x0, 0x8000, 'queue0\x00', 0x20}) sendmsg$key(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000180)=ANY=[@ANYBLOB="0207000702000000008000000000000004fde3f4df0088"], 0x17}, 0x1}, 0x0) sendmsg(r1, &(0x7f00000024c0)={0x0, 0x0, &(0x7f0000002400)}, 0x0) 2018/04/13 21:32:56 executing program 7: mmap(&(0x7f0000000000/0xf9a000)=nil, 0xf9a000, 0x1, 0x32, 0xffffffffffffffff, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) getsockopt$netlink(r0, 0x10e, 0xa, &(0x7f0000000080)=""/203, &(0x7f0000000180)=0xcb) 2018/04/13 21:32:56 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f0000005000)={&(0x7f0000000000)={0x10}, 0xc, &(0x7f0000015ff0)={&(0x7f0000023000)={0x14, 0x21, 0x10000000aff}, 0x14}, 0x1}, 0x0) 2018/04/13 21:32:56 executing program 5: perf_event_open(&(0x7f0000348f88)={0x2, 0x70, 0x3e6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = memfd_create(&(0x7f0000000000)="00000000004560f38ad02000000000800000000000000000000000", 0x0) write$binfmt_elf64(r0, &(0x7f0000000340)=ANY=[@ANYBLOB="7f454c46ff000000000000000000000003003e00000000001600000000000000400000000000000000000000000000000000000000003800020000000000000000000000000000000000000000000000000000000000000000000000000000000000080000000000000000000006000000000000000000000300000000000000000000000000000000000000000500000000000000000000000000000000000000000000000000000000000000000000"], 0xb0) execveat(r0, &(0x7f0000ff7000)='./file0\x00', &(0x7f0000d0e000), &(0x7f000034bff8)=[&(0x7f0000ff7000)="00000000000000060804002000fffc0c6565643b799365005f1b76"], 0x1000) [ 256.998796] netlink: 'syz-executor6': attribute type 4 has an invalid length. 2018/04/13 21:32:56 executing program 3: r0 = socket(0x10, 0x8000000000002, 0x0) creat(&(0x7f00000000c0)='./file0\x00', 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000b34ff8)={0x0, 0x0, 0x0}, &(0x7f0000b34ffc)=0xc) chown(&(0x7f0000000340)='./file0\x00', r1, r2) 2018/04/13 21:32:56 executing program 6: rmdir(&(0x7f00000000c0)='./file0\x00') ioctl$sock_SIOCGPGRP(0xffffffffffffff9c, 0x8904, &(0x7f0000000080)=0x0) r1 = getpgrp(r0) r2 = dup2(0xffffffffffffff9c, 0xffffffffffffff9c) perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x5, 0x4, 0x0, 0x0, 0x80000001, 0xc0012, 0x8, 0x401, 0x4c13, 0xffffffff, 0x3, 0xabb4, 0xffffffff80000001, 0x4, 0x200, 0x40, 0x10001, 0x400, 0x8, 0x8, 0x9, 0x6, 0x7fffffff, 0x7f, 0x1, 0x40, 0x200, 0x5, 0x1846, 0x8, 0x8, 0x3, 0xffffffff, 0x3, 0x0, 0x0, 0x4, 0x1, @perf_bp={&(0x7f0000000040), 0xb}, 0x22000, 0x1, 0x6, 0x0, 0x1, 0x10000, 0xdc3}, r1, 0xb, r2, 0x1) perf_event_open(&(0x7f0000348f88)={0x2, 0x78, 0x3e2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_fuseblk_mount(&(0x7f0000000140)='./file0\x00', &(0x7f0000000440)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) acct(&(0x7f0000000380)='./file0\x00') getsockopt$inet6_IPV6_XFRM_POLICY(r2, 0x29, 0x23, &(0x7f0000000200)={{{@in6=@mcast1, @in=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast2}, 0x0, @in=@multicast1}}, &(0x7f0000000100)=0xe8) r4 = socket$nl_generic(0x10, 0x3, 0x10) msgget$private(0x0, 0x4) r5 = syz_genetlink_get_family_id$fou(&(0x7f0000000040)='fou\x00') sendmsg$FOU_CMD_ADD(r4, &(0x7f0000000100)={&(0x7f0000000000)={0x10}, 0xc, &(0x7f0000000180)={&(0x7f0000000140)={0x1c, r5, 0xc09, 0x0, 0x0, {0x1}, [@FOU_ATTR_TYPE={0x8, 0x4, 0x1}]}, 0x1c}, 0x1}, 0x0) bind$bt_hci(r2, &(0x7f0000000300)={0x1f, r3, 0x1}, 0xc) 2018/04/13 21:32:56 executing program 7: mmap(&(0x7f0000000000/0xf9a000)=nil, 0xf9a000, 0x1, 0x32, 0xffffffffffffffff, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) getsockopt$netlink(r0, 0x10e, 0xa, &(0x7f0000000080)=""/203, &(0x7f0000000180)=0xcb) 2018/04/13 21:32:56 executing program 0: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) rt_sigpending(&(0x7f0000000000), 0x8) 2018/04/13 21:32:56 executing program 2: r0 = socket$key(0xf, 0x3, 0x2) r1 = socket$inet6(0xa, 0x2, 0x0) r2 = socket(0x1, 0xa, 0x9) socket$nl_generic(0x10, 0x3, 0x10) r3 = syz_genetlink_get_family_id$ipvs(&(0x7f00000001c0)='IPVS\x00') r4 = memfd_create(&(0x7f0000d2efff)='\x00', 0x0) r5 = syz_open_dev$sndseq(&(0x7f0000042000)='/dev/snd/seq\x00', 0x0, 0x8000000000102) r6 = dup2(r5, r4) perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r6, 0xc08c5332, &(0x7f0000001000)={0x0, 0x0, 0x0, "9ede7a8c5ae95ec8672c93340f643a664f13eeab65c0322901dc6bd36cde2c51f01b7f0b014f9f91eeb7c37c7240f476c8d753d000aa8faf8fb574dbcfa6dc4d"}) write$sndseq(r5, &(0x7f00000001c0)=[{0x0, 0x0, 0x0, 0x0, @time={0x0, 0x989680}, {}, {}, @control={0x2a}}, {0x0, 0x0, 0x0, 0x0, @time, {}, {}, @addr}], 0x60) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r4, 0x4040534e, &(0x7f0000000040)={0x2}) sendmsg$IPVS_CMD_GET_DAEMON(r2, &(0x7f00000002c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x10000004}, 0xc, &(0x7f0000000280)={&(0x7f0000000200)={0x60, r3, 0x400, 0x70bd2d, 0x25dfdbfe, {0xb}, [@IPVS_CMD_ATTR_DEST={0x14, 0x2, [@IPVS_DEST_ATTR_U_THRESH={0x8, 0x5, 0x5}, @IPVS_DEST_ATTR_FWD_METHOD={0x8, 0x3}]}, @IPVS_CMD_ATTR_DEST={0x38, 0x2, [@IPVS_DEST_ATTR_PERSIST_CONNS={0x8, 0x9, 0x3}, @IPVS_DEST_ATTR_U_THRESH={0x8, 0x5, 0xfffffffffffff98b}, @IPVS_DEST_ATTR_ADDR={0x14, 0x1, @ipv4=@multicast2=0xe0000002}, @IPVS_DEST_ATTR_FWD_METHOD={0x8, 0x3, 0x7}, @IPVS_DEST_ATTR_WEIGHT={0x8, 0x4, 0x4}]}]}, 0x60}, 0x1, 0x0, 0x0, 0x80}, 0x20000000) connect$inet6(r1, &(0x7f000052f000)={0xa, 0x0, 0x0, @mcast2={0xff, 0x2, [], 0x1}, 0x7}, 0x1c) setsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, &(0x7f0000c9af18)={{{@in=@rand_addr, @in6=@dev={0xfe, 0x80}, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@multicast2=0xe0000002, 0x4d3, 0x3c}, 0x0, @in6=@ipv4={[], [0xff, 0xff], @remote={0xac, 0x14, 0xffffffffffffffff, 0xbb}}, 0x0, 0x0, 0x0, 0xfffffffffffffffd}}, 0xe8) r7 = dup2(r1, r2) ioctl$sock_kcm_SIOCKCMATTACH(r2, 0x89e0, &(0x7f0000000300)={r2, r7}) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r1, 0xc08c5332, &(0x7f0000000040)={0x0, 0x0, 0x8000, 'queue0\x00', 0x20}) sendmsg$key(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000180)=ANY=[@ANYBLOB="0207000702000000008000000000000004fde3f4df0088"], 0x17}, 0x1}, 0x0) sendmsg(r1, &(0x7f00000024c0)={0x0, 0x0, &(0x7f0000002400)}, 0x0) 2018/04/13 21:32:56 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f0000005000)={&(0x7f0000000000)={0x10}, 0xc, &(0x7f0000015ff0)={&(0x7f0000023000)={0x14, 0x21, 0x10000000aff}, 0x14}, 0x1}, 0x0) 2018/04/13 21:32:56 executing program 5: perf_event_open(&(0x7f0000348f88)={0x2, 0x70, 0x3e6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = memfd_create(&(0x7f0000000000)="00000000004560f38ad02000000000800000000000000000000000", 0x0) write$binfmt_elf64(r0, &(0x7f0000000340)=ANY=[@ANYBLOB="7f454c46ff000000000000000000000003003e00000000001600000000000000400000000000000000000000000000000000000000003800020000000000000000000000000000000000000000000000000000000000000000000000000000000000080000000000000000000006000000000000000000000300000000000000000000000000000000000000000500000000000000000000000000000000000000000000000000000000000000000000"], 0xb0) execveat(r0, &(0x7f0000ff7000)='./file0\x00', &(0x7f0000d0e000), &(0x7f000034bff8)=[&(0x7f0000ff7000)="00000000000000060804002000fffc0c6565643b799365005f1b76"], 0x1000) 2018/04/13 21:32:56 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) r1 = socket$inet6(0xa, 0x2, 0x0) r2 = socket(0x1, 0xa, 0x9) socket$nl_generic(0x10, 0x3, 0x10) r3 = syz_genetlink_get_family_id$ipvs(&(0x7f00000001c0)='IPVS\x00') r4 = memfd_create(&(0x7f0000d2efff)='\x00', 0x0) r5 = syz_open_dev$sndseq(&(0x7f0000042000)='/dev/snd/seq\x00', 0x0, 0x8000000000102) r6 = dup2(r5, r4) perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r6, 0xc08c5332, &(0x7f0000001000)={0x0, 0x0, 0x0, "9ede7a8c5ae95ec8672c93340f643a664f13eeab65c0322901dc6bd36cde2c51f01b7f0b014f9f91eeb7c37c7240f476c8d753d000aa8faf8fb574dbcfa6dc4d"}) write$sndseq(r5, &(0x7f00000001c0)=[{0x0, 0x0, 0x0, 0x0, @time={0x0, 0x989680}, {}, {}, @control={0x2a}}, {0x0, 0x0, 0x0, 0x0, @time, {}, {}, @addr}], 0x60) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r4, 0x4040534e, &(0x7f0000000040)={0x2}) sendmsg$IPVS_CMD_GET_DAEMON(r2, &(0x7f00000002c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x10000004}, 0xc, &(0x7f0000000280)={&(0x7f0000000200)={0x60, r3, 0x400, 0x70bd2d, 0x25dfdbfe, {0xb}, [@IPVS_CMD_ATTR_DEST={0x14, 0x2, [@IPVS_DEST_ATTR_U_THRESH={0x8, 0x5, 0x5}, @IPVS_DEST_ATTR_FWD_METHOD={0x8, 0x3}]}, @IPVS_CMD_ATTR_DEST={0x38, 0x2, [@IPVS_DEST_ATTR_PERSIST_CONNS={0x8, 0x9, 0x3}, @IPVS_DEST_ATTR_U_THRESH={0x8, 0x5, 0xfffffffffffff98b}, @IPVS_DEST_ATTR_ADDR={0x14, 0x1, @ipv4=@multicast2=0xe0000002}, @IPVS_DEST_ATTR_FWD_METHOD={0x8, 0x3, 0x7}, @IPVS_DEST_ATTR_WEIGHT={0x8, 0x4, 0x4}]}]}, 0x60}, 0x1, 0x0, 0x0, 0x80}, 0x20000000) connect$inet6(r1, &(0x7f000052f000)={0xa, 0x0, 0x0, @mcast2={0xff, 0x2, [], 0x1}, 0x7}, 0x1c) setsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, &(0x7f0000c9af18)={{{@in=@rand_addr, @in6=@dev={0xfe, 0x80}, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@multicast2=0xe0000002, 0x4d3, 0x3c}, 0x0, @in6=@ipv4={[], [0xff, 0xff], @remote={0xac, 0x14, 0xffffffffffffffff, 0xbb}}, 0x0, 0x0, 0x0, 0xfffffffffffffffd}}, 0xe8) r7 = dup2(r1, r2) ioctl$sock_kcm_SIOCKCMATTACH(r2, 0x89e0, &(0x7f0000000300)={r2, r7}) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r1, 0xc08c5332, &(0x7f0000000040)={0x0, 0x0, 0x8000, 'queue0\x00', 0x20}) sendmsg$key(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000180)=ANY=[@ANYBLOB="0207000702000000008000000000000004fde3f4df0088"], 0x17}, 0x1}, 0x0) sendmsg(r1, &(0x7f00000024c0)={0x0, 0x0, &(0x7f0000002400)}, 0x0) 2018/04/13 21:32:56 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000500)={0x26, 'aead\x00', 0x0, 0x0, 'rfc4543(gcm(aes))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="d179f2508fb13583605d0008a230e7a657f9cc6e", 0x14) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000000400)=[{0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000580)="cd", 0x1}], 0x1, &(0x7f0000000680)}], 0x1, 0x0) recvmsg(r1, &(0x7f00000001c0)={&(0x7f0000000140)=@nfc_llcp, 0x80, &(0x7f0000000200)=[{&(0x7f0000000300)=""/88, 0x58}], 0x1, &(0x7f00009f2000)=""/190, 0xbe}, 0x0) 2018/04/13 21:32:56 executing program 7: mmap(&(0x7f0000000000/0xf9a000)=nil, 0xf9a000, 0x1, 0x32, 0xffffffffffffffff, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) getsockopt$netlink(r0, 0x10e, 0xa, &(0x7f0000000080)=""/203, &(0x7f0000000180)=0xcb) 2018/04/13 21:32:56 executing program 4: perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$binder(&(0x7f0000c93000)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) ioctl$BINDER_SET_CONTEXT_MGR(r0, 0x40046207, 0x0) r1 = syz_open_dev$binder(&(0x7f000000fff3)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) ioctl$BINDER_WRITE_READ(r1, 0xc0306201, &(0x7f0000007000)={0x392, 0x0, &(0x7f0000005fd4)=[@acquire={0x40046305}], 0x0, 0x0, &(0x7f0000002000)}) close(r0) ioctl$BINDER_WRITE_READ(r1, 0xc0306201, &(0x7f0000008fd0)={0x8, 0x0, &(0x7f0000008000)=[@release={0x400c630e}], 0x0, 0x0, &(0x7f0000000f4d)}) ioctl$BINDER_WRITE_READ(r1, 0xc0306201, &(0x7f000000dfd0)={0x4, 0x0, &(0x7f000000cf68)=[@enter_looper={0x630c}], 0x1, 0x0, &(0x7f0000008f37)="c2"}) ioctl$BINDER_WRITE_READ(r1, 0xc0306201, &(0x7f0000012fd0)={0xc, 0x0, &(0x7f0000007000)=[@dead_binder_done={0x40086310}], 0x0, 0x0, &(0x7f0000012000)}) 2018/04/13 21:32:56 executing program 2: r0 = socket$key(0xf, 0x3, 0x2) r1 = socket$inet6(0xa, 0x2, 0x0) r2 = socket(0x1, 0xa, 0x9) socket$nl_generic(0x10, 0x3, 0x10) r3 = syz_genetlink_get_family_id$ipvs(&(0x7f00000001c0)='IPVS\x00') r4 = memfd_create(&(0x7f0000d2efff)='\x00', 0x0) r5 = syz_open_dev$sndseq(&(0x7f0000042000)='/dev/snd/seq\x00', 0x0, 0x8000000000102) r6 = dup2(r5, r4) perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r6, 0xc08c5332, &(0x7f0000001000)={0x0, 0x0, 0x0, "9ede7a8c5ae95ec8672c93340f643a664f13eeab65c0322901dc6bd36cde2c51f01b7f0b014f9f91eeb7c37c7240f476c8d753d000aa8faf8fb574dbcfa6dc4d"}) write$sndseq(r5, &(0x7f00000001c0)=[{0x0, 0x0, 0x0, 0x0, @time={0x0, 0x989680}, {}, {}, @control={0x2a}}, {0x0, 0x0, 0x0, 0x0, @time, {}, {}, @addr}], 0x60) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r4, 0x4040534e, &(0x7f0000000040)={0x2}) sendmsg$IPVS_CMD_GET_DAEMON(r2, &(0x7f00000002c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x10000004}, 0xc, &(0x7f0000000280)={&(0x7f0000000200)={0x60, r3, 0x400, 0x70bd2d, 0x25dfdbfe, {0xb}, [@IPVS_CMD_ATTR_DEST={0x14, 0x2, [@IPVS_DEST_ATTR_U_THRESH={0x8, 0x5, 0x5}, @IPVS_DEST_ATTR_FWD_METHOD={0x8, 0x3}]}, @IPVS_CMD_ATTR_DEST={0x38, 0x2, [@IPVS_DEST_ATTR_PERSIST_CONNS={0x8, 0x9, 0x3}, @IPVS_DEST_ATTR_U_THRESH={0x8, 0x5, 0xfffffffffffff98b}, @IPVS_DEST_ATTR_ADDR={0x14, 0x1, @ipv4=@multicast2=0xe0000002}, @IPVS_DEST_ATTR_FWD_METHOD={0x8, 0x3, 0x7}, @IPVS_DEST_ATTR_WEIGHT={0x8, 0x4, 0x4}]}]}, 0x60}, 0x1, 0x0, 0x0, 0x80}, 0x20000000) connect$inet6(r1, &(0x7f000052f000)={0xa, 0x0, 0x0, @mcast2={0xff, 0x2, [], 0x1}, 0x7}, 0x1c) setsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, &(0x7f0000c9af18)={{{@in=@rand_addr, @in6=@dev={0xfe, 0x80}, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@multicast2=0xe0000002, 0x4d3, 0x3c}, 0x0, @in6=@ipv4={[], [0xff, 0xff], @remote={0xac, 0x14, 0xffffffffffffffff, 0xbb}}, 0x0, 0x0, 0x0, 0xfffffffffffffffd}}, 0xe8) r7 = dup2(r1, r2) ioctl$sock_kcm_SIOCKCMATTACH(r2, 0x89e0, &(0x7f0000000300)={r2, r7}) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r1, 0xc08c5332, &(0x7f0000000040)={0x0, 0x0, 0x8000, 'queue0\x00', 0x20}) sendmsg$key(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000180)=ANY=[@ANYBLOB="0207000702000000008000000000000004fde3f4df0088"], 0x17}, 0x1}, 0x0) sendmsg(r1, &(0x7f00000024c0)={0x0, 0x0, &(0x7f0000002400)}, 0x0) 2018/04/13 21:32:56 executing program 0: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) rt_sigpending(&(0x7f0000000000), 0x8) [ 257.149363] netlink: 'syz-executor6': attribute type 4 has an invalid length. 2018/04/13 21:32:56 executing program 1: bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000040)={0xffffffffffffffff, &(0x7f00000000c0)="b82283392dc50ff1fb635a5849d2f5916ae2fdc24e95e12aa8daccf7393e72be9cc66f"}, 0x10) syz_open_dev$sndpcmp(&(0x7f0000000000)='/dev/snd/pcmC#D#p\x00', 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000346fd4)={0x0, 0x0, 0x0, 0x1000000000000004, 0x202}, 0x2c) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x1, 0x5, &(0x7f0000346fc8)=@framed={{0x18}, [@alu={0x8000000201a7f19, 0x0, 0x7, 0x0, 0x1}], {0x95}}, &(0x7f0000f6bffb)='GPL\x00', 0x0, 0x299, &(0x7f00001a7f05)=""/251}, 0x18) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000140)={r0, 0x50, &(0x7f00000000c0)}, 0x10) socketpair$inet_icmp(0x13, 0x40044146, 0x6f2000, &(0x7f00000003c0)) 2018/04/13 21:32:56 executing program 5: perf_event_open(&(0x7f0000ff3f88)={0x1, 0x70, 0xfffffffffffffc01, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0xc}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 2018/04/13 21:32:56 executing program 6: rmdir(&(0x7f00000000c0)='./file0\x00') ioctl$sock_SIOCGPGRP(0xffffffffffffff9c, 0x8904, &(0x7f0000000080)=0x0) r1 = getpgrp(r0) r2 = dup2(0xffffffffffffff9c, 0xffffffffffffff9c) perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x5, 0x4, 0x0, 0x0, 0x80000001, 0xc0012, 0x8, 0x401, 0x4c13, 0xffffffff, 0x3, 0xabb4, 0xffffffff80000001, 0x4, 0x200, 0x40, 0x10001, 0x400, 0x8, 0x8, 0x9, 0x6, 0x7fffffff, 0x7f, 0x1, 0x40, 0x200, 0x5, 0x1846, 0x8, 0x8, 0x3, 0xffffffff, 0x3, 0x0, 0x0, 0x4, 0x1, @perf_bp={&(0x7f0000000040), 0xb}, 0x22000, 0x1, 0x6, 0x0, 0x1, 0x10000, 0xdc3}, r1, 0xb, r2, 0x1) perf_event_open(&(0x7f0000348f88)={0x2, 0x78, 0x3e2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_fuseblk_mount(&(0x7f0000000140)='./file0\x00', &(0x7f0000000440)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) acct(&(0x7f0000000380)='./file0\x00') getsockopt$inet6_IPV6_XFRM_POLICY(r2, 0x29, 0x23, &(0x7f0000000200)={{{@in6=@mcast1, @in=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast2}, 0x0, @in=@multicast1}}, &(0x7f0000000100)=0xe8) r4 = socket$nl_generic(0x10, 0x3, 0x10) msgget$private(0x0, 0x4) r5 = syz_genetlink_get_family_id$fou(&(0x7f0000000040)='fou\x00') sendmsg$FOU_CMD_ADD(r4, &(0x7f0000000100)={&(0x7f0000000000)={0x10}, 0xc, &(0x7f0000000180)={&(0x7f0000000140)={0x1c, r5, 0xc09, 0x0, 0x0, {0x1}, [@FOU_ATTR_TYPE={0x8, 0x4, 0x1}]}, 0x1c}, 0x1}, 0x0) bind$bt_hci(r2, &(0x7f0000000300)={0x1f, r3, 0x1}, 0xc) [ 257.237354] binder: 18650:18651 unknown command 0 [ 257.267258] binder: 18650:18651 ioctl c0306201 20007000 returned -22 [ 257.295833] netlink: 'syz-executor6': attribute type 4 has an invalid length. [ 257.301297] binder: 18650:18663 unknown command 0 [ 257.309179] binder: 18650:18663 ioctl c0306201 20007000 returned -22 2018/04/13 21:32:56 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000500)={0x26, 'aead\x00', 0x0, 0x0, 'rfc4543(gcm(aes))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="d179f2508fb13583605d0008a230e7a657f9cc6e", 0x14) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000000400)=[{0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000580)="cd", 0x1}], 0x1, &(0x7f0000000680)}], 0x1, 0x0) recvmsg(r1, &(0x7f00000001c0)={&(0x7f0000000140)=@nfc_llcp, 0x80, &(0x7f0000000200)=[{&(0x7f0000000300)=""/88, 0x58}], 0x1, &(0x7f00009f2000)=""/190, 0xbe}, 0x0) 2018/04/13 21:32:56 executing program 5: perf_event_open(&(0x7f0000ff3f88)={0x1, 0x70, 0xfffffffffffffc01, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0xc}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 2018/04/13 21:32:56 executing program 7: mmap(&(0x7f0000000000/0xf9a000)=nil, 0xf9a000, 0x1, 0x32, 0xffffffffffffffff, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) getsockopt$netlink(r0, 0x10e, 0xa, &(0x7f0000000080)=""/203, &(0x7f0000000180)=0xcb) 2018/04/13 21:32:56 executing program 0: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) rt_sigpending(&(0x7f0000000000), 0x8) 2018/04/13 21:32:56 executing program 2: mmap(&(0x7f0000001000/0x3000)=nil, 0x3000, 0xfffffffffffffffd, 0x32, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x2, 0x3, 0x1) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000080)=@filter={'filter\x00', 0xe, 0x7, 0x2f8, [0x0, 0x20001080, 0x200012e0, 0x20001508], 0x0, &(0x7f0000000000), &(0x7f0000001080)=[{0x0, '\x00', 0x0, 0x0, 0x1, [{{{0x0, 0x0, 0x0, 'ifb0\x00', 'teql0\x00', 'ifb0\x00', 'ip_vti0\x00', @dev={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa]}, [], @local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, [], 0x70, 0xd8, 0x120}, [@common=@mark={'mark\x00', 0x10}, @common=@CONNSECMARK={'CONNSECMARK\x00', 0x8}]}, @common=@ERROR={'ERROR\x00', 0x20, {"78c94694a5287016c205ea5f09f4b53d89a255e32526df300b8b3bbe408d"}}}]}, {0x0, '\x00', 0x4, 0x0, 0x1, [{{{0x0, 0x78, 0x6000, 'vlan0\x00', 'sit0\x00', 'eql\x00', 'syz_tun\x00', @dev={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0x19}, [0x0, 0xff, 0xff, 0xff, 0xff, 0xff], @local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, [0xff, 0xff, 0x0, 0xff, 0xff], 0xd0, 0x100, 0x148, [@arp={'arp\x00', 0x38, {{0x0, 0x88a8, 0x1, @broadcast=0xffffffff, 0xffffffff, @loopback=0x7f000001, 0xff000000, @empty, [0x0, 0x0, 0xff], @remote={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xbb}, [0xff, 0xff, 0x0, 0x0, 0xff], 0x80, 0x2}}}]}, [@common=@STANDARD={'\x00', 0x8, {0xffffffffffffffff}}]}, @common=@ERROR={'ERROR\x00', 0x20, {"6c023529f80adda9ce2fa5c141a3fff8f0f7f7f8be2b777ed3915e7f6f8f"}}}]}, {0x0, '\x00', 0x6, 0xffffffffffffffff}]}, 0x370) 2018/04/13 21:32:56 executing program 1: bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000040)={0xffffffffffffffff, &(0x7f00000000c0)="b82283392dc50ff1fb635a5849d2f5916ae2fdc24e95e12aa8daccf7393e72be9cc66f"}, 0x10) syz_open_dev$sndpcmp(&(0x7f0000000000)='/dev/snd/pcmC#D#p\x00', 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000346fd4)={0x0, 0x0, 0x0, 0x1000000000000004, 0x202}, 0x2c) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x1, 0x5, &(0x7f0000346fc8)=@framed={{0x18}, [@alu={0x8000000201a7f19, 0x0, 0x7, 0x0, 0x1}], {0x95}}, &(0x7f0000f6bffb)='GPL\x00', 0x0, 0x299, &(0x7f00001a7f05)=""/251}, 0x18) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000140)={r0, 0x50, &(0x7f00000000c0)}, 0x10) socketpair$inet_icmp(0x13, 0x40044146, 0x6f2000, &(0x7f00000003c0)) 2018/04/13 21:32:56 executing program 4: perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$binder(&(0x7f0000c93000)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) ioctl$BINDER_SET_CONTEXT_MGR(r0, 0x40046207, 0x0) r1 = syz_open_dev$binder(&(0x7f000000fff3)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) ioctl$BINDER_WRITE_READ(r1, 0xc0306201, &(0x7f0000007000)={0x392, 0x0, &(0x7f0000005fd4)=[@acquire={0x40046305}], 0x0, 0x0, &(0x7f0000002000)}) close(r0) ioctl$BINDER_WRITE_READ(r1, 0xc0306201, &(0x7f0000008fd0)={0x8, 0x0, &(0x7f0000008000)=[@release={0x400c630e}], 0x0, 0x0, &(0x7f0000000f4d)}) ioctl$BINDER_WRITE_READ(r1, 0xc0306201, &(0x7f000000dfd0)={0x4, 0x0, &(0x7f000000cf68)=[@enter_looper={0x630c}], 0x1, 0x0, &(0x7f0000008f37)="c2"}) ioctl$BINDER_WRITE_READ(r1, 0xc0306201, &(0x7f0000012fd0)={0xc, 0x0, &(0x7f0000007000)=[@dead_binder_done={0x40086310}], 0x0, 0x0, &(0x7f0000012000)}) 2018/04/13 21:32:56 executing program 6: rmdir(&(0x7f00000000c0)='./file0\x00') ioctl$sock_SIOCGPGRP(0xffffffffffffff9c, 0x8904, &(0x7f0000000080)=0x0) r1 = getpgrp(r0) r2 = dup2(0xffffffffffffff9c, 0xffffffffffffff9c) perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x5, 0x4, 0x0, 0x0, 0x80000001, 0xc0012, 0x8, 0x401, 0x4c13, 0xffffffff, 0x3, 0xabb4, 0xffffffff80000001, 0x4, 0x200, 0x40, 0x10001, 0x400, 0x8, 0x8, 0x9, 0x6, 0x7fffffff, 0x7f, 0x1, 0x40, 0x200, 0x5, 0x1846, 0x8, 0x8, 0x3, 0xffffffff, 0x3, 0x0, 0x0, 0x4, 0x1, @perf_bp={&(0x7f0000000040), 0xb}, 0x22000, 0x1, 0x6, 0x0, 0x1, 0x10000, 0xdc3}, r1, 0xb, r2, 0x1) perf_event_open(&(0x7f0000348f88)={0x2, 0x78, 0x3e2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_fuseblk_mount(&(0x7f0000000140)='./file0\x00', &(0x7f0000000440)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) acct(&(0x7f0000000380)='./file0\x00') getsockopt$inet6_IPV6_XFRM_POLICY(r2, 0x29, 0x23, &(0x7f0000000200)={{{@in6=@mcast1, @in=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast2}, 0x0, @in=@multicast1}}, &(0x7f0000000100)=0xe8) r4 = socket$nl_generic(0x10, 0x3, 0x10) msgget$private(0x0, 0x4) r5 = syz_genetlink_get_family_id$fou(&(0x7f0000000040)='fou\x00') sendmsg$FOU_CMD_ADD(r4, &(0x7f0000000100)={&(0x7f0000000000)={0x10}, 0xc, &(0x7f0000000180)={&(0x7f0000000140)={0x1c, r5, 0xc09, 0x0, 0x0, {0x1}, [@FOU_ATTR_TYPE={0x8, 0x4, 0x1}]}, 0x1c}, 0x1}, 0x0) bind$bt_hci(r2, &(0x7f0000000300)={0x1f, r3, 0x1}, 0xc) [ 257.322190] binder: 18650:18663 BC_REQUEST_DEATH_NOTIFICATION invalid ref 0 [ 257.330815] binder: 18650:18663 BC_DEAD_BINDER_DONE 0000000000000000 not found 2018/04/13 21:32:56 executing program 5: perf_event_open(&(0x7f0000ff3f88)={0x1, 0x70, 0xfffffffffffffc01, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0xc}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 2018/04/13 21:32:56 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000500)={0x26, 'aead\x00', 0x0, 0x0, 'rfc4543(gcm(aes))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="d179f2508fb13583605d0008a230e7a657f9cc6e", 0x14) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000000400)=[{0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000580)="cd", 0x1}], 0x1, &(0x7f0000000680)}], 0x1, 0x0) recvmsg(r1, &(0x7f00000001c0)={&(0x7f0000000140)=@nfc_llcp, 0x80, &(0x7f0000000200)=[{&(0x7f0000000300)=""/88, 0x58}], 0x1, &(0x7f00009f2000)=""/190, 0xbe}, 0x0) 2018/04/13 21:32:56 executing program 7: setsockopt$inet_sctp_SCTP_RTOINFO(0xffffffffffffffff, 0x84, 0x0, &(0x7f0000001000)={0x10000, 0x4, 0x100, 0x400}, 0xfffffffffffffd7d) r0 = socket(0x11, 0x4000000000080003, 0x0) setsockopt(r0, 0x107, 0xd, &(0x7f0000001000), 0x47e) mmap(&(0x7f0000399000/0x1000)=nil, 0x40000, 0x0, 0x12, r0, 0x0) clone(0x0, &(0x7f0000fbf000), &(0x7f0000744000), &(0x7f0000f8b000), &(0x7f00000d5000)) [ 257.375485] kernel msg: ebtables bug: please report to author: entries_size too small [ 257.399683] netlink: 'syz-executor6': attribute type 4 has an invalid length. 2018/04/13 21:32:57 executing program 1: bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000040)={0xffffffffffffffff, &(0x7f00000000c0)="b82283392dc50ff1fb635a5849d2f5916ae2fdc24e95e12aa8daccf7393e72be9cc66f"}, 0x10) syz_open_dev$sndpcmp(&(0x7f0000000000)='/dev/snd/pcmC#D#p\x00', 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000346fd4)={0x0, 0x0, 0x0, 0x1000000000000004, 0x202}, 0x2c) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x1, 0x5, &(0x7f0000346fc8)=@framed={{0x18}, [@alu={0x8000000201a7f19, 0x0, 0x7, 0x0, 0x1}], {0x95}}, &(0x7f0000f6bffb)='GPL\x00', 0x0, 0x299, &(0x7f00001a7f05)=""/251}, 0x18) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000140)={r0, 0x50, &(0x7f00000000c0)}, 0x10) socketpair$inet_icmp(0x13, 0x40044146, 0x6f2000, &(0x7f00000003c0)) [ 257.423438] binder: 18678:18679 unknown command 0 [ 257.429377] kernel msg: ebtables bug: please report to author: entries_size too small [ 257.455273] binder: 18678:18679 ioctl c0306201 20007000 returned -22 2018/04/13 21:32:57 executing program 5: perf_event_open(&(0x7f0000ff3f88)={0x1, 0x70, 0xfffffffffffffc01, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0xc}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 2018/04/13 21:32:57 executing program 0: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) rt_sigpending(&(0x7f0000000000), 0x8) 2018/04/13 21:32:57 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000500)={0x26, 'aead\x00', 0x0, 0x0, 'rfc4543(gcm(aes))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="d179f2508fb13583605d0008a230e7a657f9cc6e", 0x14) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000000400)=[{0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000580)="cd", 0x1}], 0x1, &(0x7f0000000680)}], 0x1, 0x0) recvmsg(r1, &(0x7f00000001c0)={&(0x7f0000000140)=@nfc_llcp, 0x80, &(0x7f0000000200)=[{&(0x7f0000000300)=""/88, 0x58}], 0x1, &(0x7f00009f2000)=""/190, 0xbe}, 0x0) 2018/04/13 21:32:57 executing program 2: mmap(&(0x7f0000001000/0x3000)=nil, 0x3000, 0xfffffffffffffffd, 0x32, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x2, 0x3, 0x1) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000080)=@filter={'filter\x00', 0xe, 0x7, 0x2f8, [0x0, 0x20001080, 0x200012e0, 0x20001508], 0x0, &(0x7f0000000000), &(0x7f0000001080)=[{0x0, '\x00', 0x0, 0x0, 0x1, [{{{0x0, 0x0, 0x0, 'ifb0\x00', 'teql0\x00', 'ifb0\x00', 'ip_vti0\x00', @dev={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa]}, [], @local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, [], 0x70, 0xd8, 0x120}, [@common=@mark={'mark\x00', 0x10}, @common=@CONNSECMARK={'CONNSECMARK\x00', 0x8}]}, @common=@ERROR={'ERROR\x00', 0x20, {"78c94694a5287016c205ea5f09f4b53d89a255e32526df300b8b3bbe408d"}}}]}, {0x0, '\x00', 0x4, 0x0, 0x1, [{{{0x0, 0x78, 0x6000, 'vlan0\x00', 'sit0\x00', 'eql\x00', 'syz_tun\x00', @dev={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0x19}, [0x0, 0xff, 0xff, 0xff, 0xff, 0xff], @local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, [0xff, 0xff, 0x0, 0xff, 0xff], 0xd0, 0x100, 0x148, [@arp={'arp\x00', 0x38, {{0x0, 0x88a8, 0x1, @broadcast=0xffffffff, 0xffffffff, @loopback=0x7f000001, 0xff000000, @empty, [0x0, 0x0, 0xff], @remote={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xbb}, [0xff, 0xff, 0x0, 0x0, 0xff], 0x80, 0x2}}}]}, [@common=@STANDARD={'\x00', 0x8, {0xffffffffffffffff}}]}, @common=@ERROR={'ERROR\x00', 0x20, {"6c023529f80adda9ce2fa5c141a3fff8f0f7f7f8be2b777ed3915e7f6f8f"}}}]}, {0x0, '\x00', 0x6, 0xffffffffffffffff}]}, 0x370) 2018/04/13 21:32:57 executing program 6: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x10000000000, 0x0, 0x0, 0x0, 0x0, 0x200}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$sg(&(0x7f0000000000)='/dev/sg#\x00', 0x0, 0x81) syz_open_dev$sg(&(0x7f0000000040)='/dev/sg#\x00', 0x0, 0x0) close(r0) 2018/04/13 21:32:57 executing program 1: bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000040)={0xffffffffffffffff, &(0x7f00000000c0)="b82283392dc50ff1fb635a5849d2f5916ae2fdc24e95e12aa8daccf7393e72be9cc66f"}, 0x10) syz_open_dev$sndpcmp(&(0x7f0000000000)='/dev/snd/pcmC#D#p\x00', 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000346fd4)={0x0, 0x0, 0x0, 0x1000000000000004, 0x202}, 0x2c) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x1, 0x5, &(0x7f0000346fc8)=@framed={{0x18}, [@alu={0x8000000201a7f19, 0x0, 0x7, 0x0, 0x1}], {0x95}}, &(0x7f0000f6bffb)='GPL\x00', 0x0, 0x299, &(0x7f00001a7f05)=""/251}, 0x18) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000140)={r0, 0x50, &(0x7f00000000c0)}, 0x10) socketpair$inet_icmp(0x13, 0x40044146, 0x6f2000, &(0x7f00000003c0)) 2018/04/13 21:32:57 executing program 7: setsockopt$inet_sctp_SCTP_RTOINFO(0xffffffffffffffff, 0x84, 0x0, &(0x7f0000001000)={0x10000, 0x4, 0x100, 0x400}, 0xfffffffffffffd7d) r0 = socket(0x11, 0x4000000000080003, 0x0) setsockopt(r0, 0x107, 0xd, &(0x7f0000001000), 0x47e) mmap(&(0x7f0000399000/0x1000)=nil, 0x40000, 0x0, 0x12, r0, 0x0) clone(0x0, &(0x7f0000fbf000), &(0x7f0000744000), &(0x7f0000f8b000), &(0x7f00000d5000)) 2018/04/13 21:32:57 executing program 4: perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$binder(&(0x7f0000c93000)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) ioctl$BINDER_SET_CONTEXT_MGR(r0, 0x40046207, 0x0) r1 = syz_open_dev$binder(&(0x7f000000fff3)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) ioctl$BINDER_WRITE_READ(r1, 0xc0306201, &(0x7f0000007000)={0x392, 0x0, &(0x7f0000005fd4)=[@acquire={0x40046305}], 0x0, 0x0, &(0x7f0000002000)}) close(r0) ioctl$BINDER_WRITE_READ(r1, 0xc0306201, &(0x7f0000008fd0)={0x8, 0x0, &(0x7f0000008000)=[@release={0x400c630e}], 0x0, 0x0, &(0x7f0000000f4d)}) ioctl$BINDER_WRITE_READ(r1, 0xc0306201, &(0x7f000000dfd0)={0x4, 0x0, &(0x7f000000cf68)=[@enter_looper={0x630c}], 0x1, 0x0, &(0x7f0000008f37)="c2"}) ioctl$BINDER_WRITE_READ(r1, 0xc0306201, &(0x7f0000012fd0)={0xc, 0x0, &(0x7f0000007000)=[@dead_binder_done={0x40086310}], 0x0, 0x0, &(0x7f0000012000)}) 2018/04/13 21:32:57 executing program 3: r0 = openat$rtc(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/rtc\x00', 0x0, 0x0) ioctl$LOOP_CLR_FD(r0, 0x7001) 2018/04/13 21:32:57 executing program 1: r0 = socket$inet(0x2, 0x80000000003, 0x2) r1 = perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$SO_TIMESTAMPING(r0, 0x1, 0x25, &(0x7f0000000040)=0x7fc, 0x2e0) r2 = fcntl$dupfd(r0, 0x0, r1) recvmsg$kcm(r2, &(0x7f0000000600)={&(0x7f0000000240)=@alg, 0x80, &(0x7f00000004c0), 0x0, &(0x7f0000000500)=""/197, 0xc5}, 0x0) sendto$inet(r0, &(0x7f0000000100), 0x0, 0x0, &(0x7f0000000080)={0x2, 0x0, @rand_addr}, 0x10) 2018/04/13 21:32:57 executing program 5: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x6) ioctl$sock_SIOCGIFINDEX(r0, 0x800448d3, &(0x7f0000000280)={'vlan0\x00'}) 2018/04/13 21:32:57 executing program 2: mmap(&(0x7f0000001000/0x3000)=nil, 0x3000, 0xfffffffffffffffd, 0x32, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x2, 0x3, 0x1) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000080)=@filter={'filter\x00', 0xe, 0x7, 0x2f8, [0x0, 0x20001080, 0x200012e0, 0x20001508], 0x0, &(0x7f0000000000), &(0x7f0000001080)=[{0x0, '\x00', 0x0, 0x0, 0x1, [{{{0x0, 0x0, 0x0, 'ifb0\x00', 'teql0\x00', 'ifb0\x00', 'ip_vti0\x00', @dev={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa]}, [], @local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, [], 0x70, 0xd8, 0x120}, [@common=@mark={'mark\x00', 0x10}, @common=@CONNSECMARK={'CONNSECMARK\x00', 0x8}]}, @common=@ERROR={'ERROR\x00', 0x20, {"78c94694a5287016c205ea5f09f4b53d89a255e32526df300b8b3bbe408d"}}}]}, {0x0, '\x00', 0x4, 0x0, 0x1, [{{{0x0, 0x78, 0x6000, 'vlan0\x00', 'sit0\x00', 'eql\x00', 'syz_tun\x00', @dev={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0x19}, [0x0, 0xff, 0xff, 0xff, 0xff, 0xff], @local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, [0xff, 0xff, 0x0, 0xff, 0xff], 0xd0, 0x100, 0x148, [@arp={'arp\x00', 0x38, {{0x0, 0x88a8, 0x1, @broadcast=0xffffffff, 0xffffffff, @loopback=0x7f000001, 0xff000000, @empty, [0x0, 0x0, 0xff], @remote={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xbb}, [0xff, 0xff, 0x0, 0x0, 0xff], 0x80, 0x2}}}]}, [@common=@STANDARD={'\x00', 0x8, {0xffffffffffffffff}}]}, @common=@ERROR={'ERROR\x00', 0x20, {"6c023529f80adda9ce2fa5c141a3fff8f0f7f7f8be2b777ed3915e7f6f8f"}}}]}, {0x0, '\x00', 0x6, 0xffffffffffffffff}]}, 0x370) 2018/04/13 21:32:57 executing program 0: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140)='/dev/ptmx\x00', 0x0, 0x0) poll(&(0x7f00006affd0)=[{r0}], 0x1, 0xfffffffffffffeff) ioctl$TCSETS(r0, 0x40045431, &(0x7f00003b9fdc)) ioctl$TIOCPKT(r0, 0x5420, &(0x7f0000000080)=0x7f) r1 = syz_open_pts(r0, 0x0) ioctl$TCFLSH(r1, 0x540b, 0x2) [ 257.570931] kernel msg: ebtables bug: please report to author: entries_size too small [ 257.581710] binder: 18710:18711 unknown command 0 [ 257.592730] binder: 18710:18711 ioctl c0306201 20007000 returned -22 2018/04/13 21:32:57 executing program 3: r0 = syz_open_dev$sndctrl(&(0x7f0000000040)='/dev/snd/controlC#\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_WRITE(r0, 0xc4c85513, &(0x7f0000000440)={{0x2, 0x0, 0x0, 0x0, "9fd3328c6806cd857c4224c4c7523532d6ea77a9c90c483fab2f01ef644b3e60d2df8b44e2f9664e0d3b08e4"}}) 2018/04/13 21:32:57 executing program 2: mmap(&(0x7f0000001000/0x3000)=nil, 0x3000, 0xfffffffffffffffd, 0x32, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x2, 0x3, 0x1) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000080)=@filter={'filter\x00', 0xe, 0x7, 0x2f8, [0x0, 0x20001080, 0x200012e0, 0x20001508], 0x0, &(0x7f0000000000), &(0x7f0000001080)=[{0x0, '\x00', 0x0, 0x0, 0x1, [{{{0x0, 0x0, 0x0, 'ifb0\x00', 'teql0\x00', 'ifb0\x00', 'ip_vti0\x00', @dev={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa]}, [], @local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, [], 0x70, 0xd8, 0x120}, [@common=@mark={'mark\x00', 0x10}, @common=@CONNSECMARK={'CONNSECMARK\x00', 0x8}]}, @common=@ERROR={'ERROR\x00', 0x20, {"78c94694a5287016c205ea5f09f4b53d89a255e32526df300b8b3bbe408d"}}}]}, {0x0, '\x00', 0x4, 0x0, 0x1, [{{{0x0, 0x78, 0x6000, 'vlan0\x00', 'sit0\x00', 'eql\x00', 'syz_tun\x00', @dev={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0x19}, [0x0, 0xff, 0xff, 0xff, 0xff, 0xff], @local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, [0xff, 0xff, 0x0, 0xff, 0xff], 0xd0, 0x100, 0x148, [@arp={'arp\x00', 0x38, {{0x0, 0x88a8, 0x1, @broadcast=0xffffffff, 0xffffffff, @loopback=0x7f000001, 0xff000000, @empty, [0x0, 0x0, 0xff], @remote={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xbb}, [0xff, 0xff, 0x0, 0x0, 0xff], 0x80, 0x2}}}]}, [@common=@STANDARD={'\x00', 0x8, {0xffffffffffffffff}}]}, @common=@ERROR={'ERROR\x00', 0x20, {"6c023529f80adda9ce2fa5c141a3fff8f0f7f7f8be2b777ed3915e7f6f8f"}}}]}, {0x0, '\x00', 0x6, 0xffffffffffffffff}]}, 0x370) 2018/04/13 21:32:57 executing program 4: perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$binder(&(0x7f0000c93000)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) ioctl$BINDER_SET_CONTEXT_MGR(r0, 0x40046207, 0x0) r1 = syz_open_dev$binder(&(0x7f000000fff3)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) ioctl$BINDER_WRITE_READ(r1, 0xc0306201, &(0x7f0000007000)={0x392, 0x0, &(0x7f0000005fd4)=[@acquire={0x40046305}], 0x0, 0x0, &(0x7f0000002000)}) close(r0) ioctl$BINDER_WRITE_READ(r1, 0xc0306201, &(0x7f0000008fd0)={0x8, 0x0, &(0x7f0000008000)=[@release={0x400c630e}], 0x0, 0x0, &(0x7f0000000f4d)}) ioctl$BINDER_WRITE_READ(r1, 0xc0306201, &(0x7f000000dfd0)={0x4, 0x0, &(0x7f000000cf68)=[@enter_looper={0x630c}], 0x1, 0x0, &(0x7f0000008f37)="c2"}) ioctl$BINDER_WRITE_READ(r1, 0xc0306201, &(0x7f0000012fd0)={0xc, 0x0, &(0x7f0000007000)=[@dead_binder_done={0x40086310}], 0x0, 0x0, &(0x7f0000012000)}) 2018/04/13 21:32:57 executing program 2: perf_event_open(&(0x7f0000d2af88)={0x2, 0x70, 0xe2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000240)={&(0x7f0000000000)={0x10}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)=@ipv4_newroute={0x1c, 0x18, 0x101, 0x0, 0x0, {0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}}, 0x1c}, 0x1}, 0x0) 2018/04/13 21:32:57 executing program 3: r0 = syz_open_dev$sndctrl(&(0x7f0000000040)='/dev/snd/controlC#\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_WRITE(r0, 0xc4c85513, &(0x7f0000000440)={{0x2, 0x0, 0x0, 0x0, "9fd3328c6806cd857c4224c4c7523532d6ea77a9c90c483fab2f01ef644b3e60d2df8b44e2f9664e0d3b08e4"}}) [ 257.648614] kernel msg: ebtables bug: please report to author: entries_size too small [ 257.686855] kernel msg: ebtables bug: please report to author: entries_size too small 2018/04/13 21:32:57 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f00005a5000)={&(0x7f0000000000)={0x10}, 0xc, &(0x7f0000000080)={&(0x7f00000005c0)={0x1c, 0x26, 0x109, 0x0, 0x0, {0x44000002}, [@typed={0x8, 0x7, @ipv4=@remote={0xac, 0x14, 0x14, 0xbb}}]}, 0x1c}, 0x1}, 0x0) 2018/04/13 21:32:57 executing program 7: setsockopt$inet_sctp_SCTP_RTOINFO(0xffffffffffffffff, 0x84, 0x0, &(0x7f0000001000)={0x10000, 0x4, 0x100, 0x400}, 0xfffffffffffffd7d) r0 = socket(0x11, 0x4000000000080003, 0x0) setsockopt(r0, 0x107, 0xd, &(0x7f0000001000), 0x47e) mmap(&(0x7f0000399000/0x1000)=nil, 0x40000, 0x0, 0x12, r0, 0x0) clone(0x0, &(0x7f0000fbf000), &(0x7f0000744000), &(0x7f0000f8b000), &(0x7f00000d5000)) [ 257.724923] binder: 18733:18734 unknown command 0 [ 257.749579] netlink: 'syz-executor5': attribute type 7 has an invalid length. [ 257.752303] binder: 18733:18734 ioctl c0306201 20007000 returned -22 2018/04/13 21:32:57 executing program 2: perf_event_open(&(0x7f0000d2af88)={0x2, 0x70, 0xe2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000240)={&(0x7f0000000000)={0x10}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)=@ipv4_newroute={0x1c, 0x18, 0x101, 0x0, 0x0, {0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}}, 0x1c}, 0x1}, 0x0) 2018/04/13 21:32:57 executing program 3: r0 = syz_open_dev$sndctrl(&(0x7f0000000040)='/dev/snd/controlC#\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_WRITE(r0, 0xc4c85513, &(0x7f0000000440)={{0x2, 0x0, 0x0, 0x0, "9fd3328c6806cd857c4224c4c7523532d6ea77a9c90c483fab2f01ef644b3e60d2df8b44e2f9664e0d3b08e4"}}) 2018/04/13 21:32:57 executing program 6: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x10000000000, 0x0, 0x0, 0x0, 0x0, 0x200}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$sg(&(0x7f0000000000)='/dev/sg#\x00', 0x0, 0x81) syz_open_dev$sg(&(0x7f0000000040)='/dev/sg#\x00', 0x0, 0x0) close(r0) 2018/04/13 21:32:57 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f00005a5000)={&(0x7f0000000000)={0x10}, 0xc, &(0x7f0000000080)={&(0x7f00000005c0)={0x1c, 0x26, 0x109, 0x0, 0x0, {0x44000002}, [@typed={0x8, 0x7, @ipv4=@remote={0xac, 0x14, 0x14, 0xbb}}]}, 0x1c}, 0x1}, 0x0) 2018/04/13 21:32:57 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f00000000c0)={&(0x7f0000000000)={0x10}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)=@ipv4_getroute={0x14, 0x1a, 0x1, 0x0, 0x0, {0x2}}, 0x14}, 0x1}, 0x0) [ 258.375727] netlink: 'syz-executor5': attribute type 7 has an invalid length. 2018/04/13 21:32:58 executing program 6: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x10000000000, 0x0, 0x0, 0x0, 0x0, 0x200}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$sg(&(0x7f0000000000)='/dev/sg#\x00', 0x0, 0x81) syz_open_dev$sg(&(0x7f0000000040)='/dev/sg#\x00', 0x0, 0x0) close(r0) 2018/04/13 21:32:58 executing program 0: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000fc9000)={0x1, 0x6, 0x209e1f, 0x8000000001, 0x1}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000100)={r0, &(0x7f0000000000), &(0x7f0000000040)}, 0x20) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000140)={r0, &(0x7f0000000040)}, 0x20) 2018/04/13 21:32:58 executing program 1: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) getsockopt$inet_tcp_int(r0, 0x6, 0x12, &(0x7f0000000000), &(0x7f0000000040)=0x4) 2018/04/13 21:32:58 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f00000000c0)={&(0x7f0000000000)={0x10}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)=@ipv4_getroute={0x14, 0x1a, 0x1, 0x0, 0x0, {0x2}}, 0x14}, 0x1}, 0x0) 2018/04/13 21:32:58 executing program 7: setsockopt$inet_sctp_SCTP_RTOINFO(0xffffffffffffffff, 0x84, 0x0, &(0x7f0000001000)={0x10000, 0x4, 0x100, 0x400}, 0xfffffffffffffd7d) r0 = socket(0x11, 0x4000000000080003, 0x0) setsockopt(r0, 0x107, 0xd, &(0x7f0000001000), 0x47e) mmap(&(0x7f0000399000/0x1000)=nil, 0x40000, 0x0, 0x12, r0, 0x0) clone(0x0, &(0x7f0000fbf000), &(0x7f0000744000), &(0x7f0000f8b000), &(0x7f00000d5000)) 2018/04/13 21:32:58 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f00005a5000)={&(0x7f0000000000)={0x10}, 0xc, &(0x7f0000000080)={&(0x7f00000005c0)={0x1c, 0x26, 0x109, 0x0, 0x0, {0x44000002}, [@typed={0x8, 0x7, @ipv4=@remote={0xac, 0x14, 0x14, 0xbb}}]}, 0x1c}, 0x1}, 0x0) 2018/04/13 21:32:58 executing program 2: perf_event_open(&(0x7f0000d2af88)={0x2, 0x70, 0xe2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000240)={&(0x7f0000000000)={0x10}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)=@ipv4_newroute={0x1c, 0x18, 0x101, 0x0, 0x0, {0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}}, 0x1c}, 0x1}, 0x0) 2018/04/13 21:32:58 executing program 3: r0 = syz_open_dev$sndctrl(&(0x7f0000000040)='/dev/snd/controlC#\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_WRITE(r0, 0xc4c85513, &(0x7f0000000440)={{0x2, 0x0, 0x0, 0x0, "9fd3328c6806cd857c4224c4c7523532d6ea77a9c90c483fab2f01ef644b3e60d2df8b44e2f9664e0d3b08e4"}}) [ 259.235264] netlink: 'syz-executor5': attribute type 7 has an invalid length. 2018/04/13 21:32:59 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f00000000c0)={&(0x7f0000000000)={0x10}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)=@ipv4_getroute={0x14, 0x1a, 0x1, 0x0, 0x0, {0x2}}, 0x14}, 0x1}, 0x0) 2018/04/13 21:32:59 executing program 1: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) getsockopt$inet_tcp_int(r0, 0x6, 0x12, &(0x7f0000000000), &(0x7f0000000040)=0x4) 2018/04/13 21:32:59 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00006a4ff7)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) ioctl$KVM_SMI(r2, 0xaeb7) ioctl$KVM_RUN(r2, 0xae80, 0x0) ioctl$KVM_SET_MP_STATE(r2, 0x4004ae99, &(0x7f0000000180)) 2018/04/13 21:32:59 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f00005a5000)={&(0x7f0000000000)={0x10}, 0xc, &(0x7f0000000080)={&(0x7f00000005c0)={0x1c, 0x26, 0x109, 0x0, 0x0, {0x44000002}, [@typed={0x8, 0x7, @ipv4=@remote={0xac, 0x14, 0x14, 0xbb}}]}, 0x1c}, 0x1}, 0x0) 2018/04/13 21:32:59 executing program 2: perf_event_open(&(0x7f0000d2af88)={0x2, 0x70, 0xe2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000240)={&(0x7f0000000000)={0x10}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)=@ipv4_newroute={0x1c, 0x18, 0x101, 0x0, 0x0, {0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}}, 0x1c}, 0x1}, 0x0) 2018/04/13 21:32:59 executing program 0: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000fc9000)={0x1, 0x6, 0x209e1f, 0x8000000001, 0x1}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000100)={r0, &(0x7f0000000000), &(0x7f0000000040)}, 0x20) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000140)={r0, &(0x7f0000000040)}, 0x20) 2018/04/13 21:32:59 executing program 6: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x10000000000, 0x0, 0x0, 0x0, 0x0, 0x200}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$sg(&(0x7f0000000000)='/dev/sg#\x00', 0x0, 0x81) syz_open_dev$sg(&(0x7f0000000040)='/dev/sg#\x00', 0x0, 0x0) close(r0) 2018/04/13 21:32:59 executing program 7: pselect6(0x40, &(0x7f0000005000), &(0x7f0000005fc0), &(0x7f0000000000), &(0x7f0000005ff8), &(0x7f0000000000)={&(0x7f0000005ff8)={0xffffffffffffff7f}, 0x8}) 2018/04/13 21:32:59 executing program 1: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) getsockopt$inet_tcp_int(r0, 0x6, 0x12, &(0x7f0000000000), &(0x7f0000000040)=0x4) 2018/04/13 21:32:59 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f00000000c0)={&(0x7f0000000000)={0x10}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)=@ipv4_getroute={0x14, 0x1a, 0x1, 0x0, 0x0, {0x2}}, 0x14}, 0x1}, 0x0) [ 260.109492] netlink: 'syz-executor5': attribute type 7 has an invalid length. 2018/04/13 21:32:59 executing program 7: pselect6(0x40, &(0x7f0000005000), &(0x7f0000005fc0), &(0x7f0000000000), &(0x7f0000005ff8), &(0x7f0000000000)={&(0x7f0000005ff8)={0xffffffffffffff7f}, 0x8}) 2018/04/13 21:32:59 executing program 2: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg(0xffffffffffffffff, &(0x7f0000000a40)={&(0x7f00000002c0)=@in6={0xa, 0x4e24, 0x0, @mcast1={0xff, 0x1, [], 0x1}}, 0x80, &(0x7f0000000000), 0x100000000000026d, &(0x7f0000000440)}, 0x0) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x1000, &(0x7f0000a98000/0x1000)=nil}) ioctl$KVM_SET_SREGS(0xffffffffffffffff, 0x4138ae84, &(0x7f0000c9bec8)) ioctl$KVM_TRANSLATE(r2, 0xc018ae85, &(0x7f00000001c0)) 2018/04/13 21:32:59 executing program 0: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000fc9000)={0x1, 0x6, 0x209e1f, 0x8000000001, 0x1}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000100)={r0, &(0x7f0000000000), &(0x7f0000000040)}, 0x20) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000140)={r0, &(0x7f0000000040)}, 0x20) 2018/04/13 21:32:59 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f00000000c0)={&(0x7f0000000440)={0x10}, 0xc, &(0x7f0000000080)={&(0x7f0000000140)={0x18, 0x27, 0x331, 0x0, 0x0, {0x13}, [@typed={0x4, 0x9, @binary}]}, 0x18}, 0x1}, 0x0) 2018/04/13 21:32:59 executing program 1: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) getsockopt$inet_tcp_int(r0, 0x6, 0x12, &(0x7f0000000000), &(0x7f0000000040)=0x4) 2018/04/13 21:32:59 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00006a4ff7)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) ioctl$KVM_SMI(r2, 0xaeb7) ioctl$KVM_RUN(r2, 0xae80, 0x0) ioctl$KVM_SET_MP_STATE(r2, 0x4004ae99, &(0x7f0000000180)) 2018/04/13 21:32:59 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f000001bfc8)={&(0x7f0000db4000)={0x10}, 0xc, &(0x7f00006bcff0)={&(0x7f000075b000)=@ipv6_newroute={0x2c, 0x18, 0x301, 0x0, 0x0, {0xa}, [@RTA_ENCAP_TYPE={0x8, 0x15, 0x6}, @RTA_ENCAP={0x8, 0x16, @nested={0x4, 0x2}}]}, 0x2c}, 0x1}, 0x0) 2018/04/13 21:32:59 executing program 7: pselect6(0x40, &(0x7f0000005000), &(0x7f0000005fc0), &(0x7f0000000000), &(0x7f0000005ff8), &(0x7f0000000000)={&(0x7f0000005ff8)={0xffffffffffffff7f}, 0x8}) 2018/04/13 21:32:59 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f00000000c0)={&(0x7f0000000440)={0x10}, 0xc, &(0x7f0000000080)={&(0x7f0000000140)={0x18, 0x27, 0x331, 0x0, 0x0, {0x13}, [@typed={0x4, 0x9, @binary}]}, 0x18}, 0x1}, 0x0) 2018/04/13 21:32:59 executing program 0: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000fc9000)={0x1, 0x6, 0x209e1f, 0x8000000001, 0x1}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000100)={r0, &(0x7f0000000000), &(0x7f0000000040)}, 0x20) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000140)={r0, &(0x7f0000000040)}, 0x20) 2018/04/13 21:32:59 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000f56000)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f0000000080)=ANY=[@ANYBLOB="020300020e00000000000001020000000400080005000000000000000000001c00000000000000000000000000000000030006000000000002000000000000000000000000e1000002000100000000000006000000000000030005000000000002000000e00000010001000000000000"], 0x70}, 0x1}, 0x0) 2018/04/13 21:33:00 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00006a4ff7)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) ioctl$KVM_SMI(r2, 0xaeb7) ioctl$KVM_RUN(r2, 0xae80, 0x0) ioctl$KVM_SET_MP_STATE(r2, 0x4004ae99, &(0x7f0000000180)) [ 260.391435] netlink: 'syz-executor4': attribute type 21 has an invalid length. 2018/04/13 21:33:00 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00006a4ff7)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) ioctl$KVM_SMI(r2, 0xaeb7) ioctl$KVM_RUN(r2, 0xae80, 0x0) ioctl$KVM_SET_MP_STATE(r2, 0x4004ae99, &(0x7f0000000180)) 2018/04/13 21:33:00 executing program 0: r0 = syz_open_dev$usbmon(&(0x7f000014a000)='/dev/usbmon#\x00', 0x0, 0x0) ioctl$sock_netrom_SIOCADDRT(r0, 0x80089203, &(0x7f0000000080)) 2018/04/13 21:33:00 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f000001bfc8)={&(0x7f0000db4000)={0x10}, 0xc, &(0x7f00006bcff0)={&(0x7f000075b000)=@ipv6_newroute={0x2c, 0x18, 0x301, 0x0, 0x0, {0xa}, [@RTA_ENCAP_TYPE={0x8, 0x15, 0x6}, @RTA_ENCAP={0x8, 0x16, @nested={0x4, 0x2}}]}, 0x2c}, 0x1}, 0x0) 2018/04/13 21:33:00 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000f56000)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f0000000080)=ANY=[@ANYBLOB="020300020e00000000000001020000000400080005000000000000000000001c00000000000000000000000000000000030006000000000002000000000000000000000000e1000002000100000000000006000000000000030005000000000002000000e00000010001000000000000"], 0x70}, 0x1}, 0x0) 2018/04/13 21:33:00 executing program 7: pselect6(0x40, &(0x7f0000005000), &(0x7f0000005fc0), &(0x7f0000000000), &(0x7f0000005ff8), &(0x7f0000000000)={&(0x7f0000005ff8)={0xffffffffffffff7f}, 0x8}) 2018/04/13 21:33:00 executing program 2: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg(0xffffffffffffffff, &(0x7f0000000a40)={&(0x7f00000002c0)=@in6={0xa, 0x4e24, 0x0, @mcast1={0xff, 0x1, [], 0x1}}, 0x80, &(0x7f0000000000), 0x100000000000026d, &(0x7f0000000440)}, 0x0) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x1000, &(0x7f0000a98000/0x1000)=nil}) ioctl$KVM_SET_SREGS(0xffffffffffffffff, 0x4138ae84, &(0x7f0000c9bec8)) ioctl$KVM_TRANSLATE(r2, 0xc018ae85, &(0x7f00000001c0)) 2018/04/13 21:33:00 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f00000000c0)={&(0x7f0000000440)={0x10}, 0xc, &(0x7f0000000080)={&(0x7f0000000140)={0x18, 0x27, 0x331, 0x0, 0x0, {0x13}, [@typed={0x4, 0x9, @binary}]}, 0x18}, 0x1}, 0x0) 2018/04/13 21:33:00 executing program 6: r0 = getpid() sched_setattr(r0, &(0x7f0000000080)={0x0, 0x2, 0x0, 0x0, 0x3}, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) readv(r1, &(0x7f00003fd000)=[{&(0x7f0000853000)=""/255, 0xffffff1f}], 0x1) pipe(&(0x7f0000ef1000)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r2, &(0x7f00005e5fd0)=[{&(0x7f00005e5000)='r', 0x1}], 0x1, 0x0) vmsplice(r3, &(0x7f00005d8000)=[{&(0x7f00005d7000)="ab", 0x1}], 0x1, 0x0) 2018/04/13 21:33:00 executing program 0: r0 = syz_open_dev$usbmon(&(0x7f000014a000)='/dev/usbmon#\x00', 0x0, 0x0) ioctl$sock_netrom_SIOCADDRT(r0, 0x80089203, &(0x7f0000000080)) 2018/04/13 21:33:00 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f00000000c0)={&(0x7f0000000440)={0x10}, 0xc, &(0x7f0000000080)={&(0x7f0000000140)={0x18, 0x27, 0x331, 0x0, 0x0, {0x13}, [@typed={0x4, 0x9, @binary}]}, 0x18}, 0x1}, 0x0) 2018/04/13 21:33:00 executing program 7: pipe(&(0x7f00005db000)={0xffffffffffffffff}) vmsplice(0xffffffffffffffff, &(0x7f0000000200)=[{&(0x7f0000000180)="595c4fcaa4768d", 0x7}], 0x1, 0x0) vmsplice(r0, &(0x7f0000000080), 0x14f, 0x0) 2018/04/13 21:33:00 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000f56000)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f0000000080)=ANY=[@ANYBLOB="020300020e00000000000001020000000400080005000000000000000000001c00000000000000000000000000000000030006000000000002000000000000000000000000e1000002000100000000000006000000000000030005000000000002000000e00000010001000000000000"], 0x70}, 0x1}, 0x0) 2018/04/13 21:33:00 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f000001bfc8)={&(0x7f0000db4000)={0x10}, 0xc, &(0x7f00006bcff0)={&(0x7f000075b000)=@ipv6_newroute={0x2c, 0x18, 0x301, 0x0, 0x0, {0xa}, [@RTA_ENCAP_TYPE={0x8, 0x15, 0x6}, @RTA_ENCAP={0x8, 0x16, @nested={0x4, 0x2}}]}, 0x2c}, 0x1}, 0x0) 2018/04/13 21:33:00 executing program 3: r0 = socket$netlink(0x10, 0x3, 0xc) writev(r0, &(0x7f0000fb5ff0)=[{&(0x7f0000000080)="1f00000002031900000007000000068100023b0509000100010100ff3ffe58", 0x1f}], 0x1) writev(r0, &(0x7f0000000240)=[{&(0x7f0000000180)="1f0000000203193b000007000000068100023b050900020000004000020058", 0x1f}], 0x1) 2018/04/13 21:33:00 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'skcipher\x00', 0x0, 0x0, 'pcbc(cipher_null)\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000002680)=[{0x0, 0x0, &(0x7f0000000140)=[{&(0x7f0000001580)="f4", 0x1}], 0x1, &(0x7f0000000200)}], 0x1, 0x0) recvmsg(r1, &(0x7f0000001440)={&(0x7f0000000280)=@sco, 0x80, &(0x7f0000000000)=[{&(0x7f00000003c0)=""/4096, 0x1000}], 0x1, &(0x7f0000001400)=""/6, 0x6}, 0x0) 2018/04/13 21:33:01 executing program 2: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg(0xffffffffffffffff, &(0x7f0000000a40)={&(0x7f00000002c0)=@in6={0xa, 0x4e24, 0x0, @mcast1={0xff, 0x1, [], 0x1}}, 0x80, &(0x7f0000000000), 0x100000000000026d, &(0x7f0000000440)}, 0x0) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x1000, &(0x7f0000a98000/0x1000)=nil}) ioctl$KVM_SET_SREGS(0xffffffffffffffff, 0x4138ae84, &(0x7f0000c9bec8)) ioctl$KVM_TRANSLATE(r2, 0xc018ae85, &(0x7f00000001c0)) 2018/04/13 21:33:01 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000f56000)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f0000000080)=ANY=[@ANYBLOB="020300020e00000000000001020000000400080005000000000000000000001c00000000000000000000000000000000030006000000000002000000000000000000000000e1000002000100000000000006000000000000030005000000000002000000e00000010001000000000000"], 0x70}, 0x1}, 0x0) 2018/04/13 21:33:01 executing program 7: pipe(&(0x7f00005db000)={0xffffffffffffffff}) vmsplice(0xffffffffffffffff, &(0x7f0000000200)=[{&(0x7f0000000180)="595c4fcaa4768d", 0x7}], 0x1, 0x0) vmsplice(r0, &(0x7f0000000080), 0x14f, 0x0) 2018/04/13 21:33:01 executing program 0: r0 = syz_open_dev$usbmon(&(0x7f000014a000)='/dev/usbmon#\x00', 0x0, 0x0) ioctl$sock_netrom_SIOCADDRT(r0, 0x80089203, &(0x7f0000000080)) 2018/04/13 21:33:01 executing program 3: r0 = socket$netlink(0x10, 0x3, 0xc) writev(r0, &(0x7f0000fb5ff0)=[{&(0x7f0000000080)="1f00000002031900000007000000068100023b0509000100010100ff3ffe58", 0x1f}], 0x1) writev(r0, &(0x7f0000000240)=[{&(0x7f0000000180)="1f0000000203193b000007000000068100023b050900020000004000020058", 0x1f}], 0x1) 2018/04/13 21:33:01 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f000001bfc8)={&(0x7f0000db4000)={0x10}, 0xc, &(0x7f00006bcff0)={&(0x7f000075b000)=@ipv6_newroute={0x2c, 0x18, 0x301, 0x0, 0x0, {0xa}, [@RTA_ENCAP_TYPE={0x8, 0x15, 0x6}, @RTA_ENCAP={0x8, 0x16, @nested={0x4, 0x2}}]}, 0x2c}, 0x1}, 0x0) 2018/04/13 21:33:01 executing program 6: r0 = getpid() sched_setattr(r0, &(0x7f0000000080)={0x0, 0x2, 0x0, 0x0, 0x3}, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) readv(r1, &(0x7f00003fd000)=[{&(0x7f0000853000)=""/255, 0xffffff1f}], 0x1) pipe(&(0x7f0000ef1000)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r2, &(0x7f00005e5fd0)=[{&(0x7f00005e5000)='r', 0x1}], 0x1, 0x0) vmsplice(r3, &(0x7f00005d8000)=[{&(0x7f00005d7000)="ab", 0x1}], 0x1, 0x0) 2018/04/13 21:33:01 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'skcipher\x00', 0x0, 0x0, 'pcbc(cipher_null)\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000002680)=[{0x0, 0x0, &(0x7f0000000140)=[{&(0x7f0000001580)="f4", 0x1}], 0x1, &(0x7f0000000200)}], 0x1, 0x0) recvmsg(r1, &(0x7f0000001440)={&(0x7f0000000280)=@sco, 0x80, &(0x7f0000000000)=[{&(0x7f00000003c0)=""/4096, 0x1000}], 0x1, &(0x7f0000001400)=""/6, 0x6}, 0x0) 2018/04/13 21:33:01 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'skcipher\x00', 0x0, 0x0, 'pcbc(cipher_null)\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000002680)=[{0x0, 0x0, &(0x7f0000000140)=[{&(0x7f0000001580)="f4", 0x1}], 0x1, &(0x7f0000000200)}], 0x1, 0x0) recvmsg(r1, &(0x7f0000001440)={&(0x7f0000000280)=@sco, 0x80, &(0x7f0000000000)=[{&(0x7f00000003c0)=""/4096, 0x1000}], 0x1, &(0x7f0000001400)=""/6, 0x6}, 0x0) 2018/04/13 21:33:01 executing program 3: r0 = socket$netlink(0x10, 0x3, 0xc) writev(r0, &(0x7f0000fb5ff0)=[{&(0x7f0000000080)="1f00000002031900000007000000068100023b0509000100010100ff3ffe58", 0x1f}], 0x1) writev(r0, &(0x7f0000000240)=[{&(0x7f0000000180)="1f0000000203193b000007000000068100023b050900020000004000020058", 0x1f}], 0x1) [ 262.071878] validate_nla: 2 callbacks suppressed [ 262.071889] netlink: 'syz-executor4': attribute type 21 has an invalid length. 2018/04/13 21:33:01 executing program 0: r0 = syz_open_dev$usbmon(&(0x7f000014a000)='/dev/usbmon#\x00', 0x0, 0x0) ioctl$sock_netrom_SIOCADDRT(r0, 0x80089203, &(0x7f0000000080)) 2018/04/13 21:33:01 executing program 7: pipe(&(0x7f00005db000)={0xffffffffffffffff}) vmsplice(0xffffffffffffffff, &(0x7f0000000200)=[{&(0x7f0000000180)="595c4fcaa4768d", 0x7}], 0x1, 0x0) vmsplice(r0, &(0x7f0000000080), 0x14f, 0x0) 2018/04/13 21:33:01 executing program 1: r0 = semget$private(0x0, 0x7, 0x0) semtimedop(r0, &(0x7f0000000040)=[{0x3, 0x4}, {0x3}], 0x2, &(0x7f0000000080)={0x77359400}) semtimedop(r0, &(0x7f00000a8000)=[{0x3, 0xfffffffffffffff9}], 0x1, &(0x7f0000efe000)={0x2000}) semctl$SETALL(r0, 0x0, 0x11, &(0x7f0000003000)=[0x0, 0x0, 0x0, 0x7fff]) 2018/04/13 21:33:01 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'skcipher\x00', 0x0, 0x0, 'pcbc(cipher_null)\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000002680)=[{0x0, 0x0, &(0x7f0000000140)=[{&(0x7f0000001580)="f4", 0x1}], 0x1, &(0x7f0000000200)}], 0x1, 0x0) recvmsg(r1, &(0x7f0000001440)={&(0x7f0000000280)=@sco, 0x80, &(0x7f0000000000)=[{&(0x7f00000003c0)=""/4096, 0x1000}], 0x1, &(0x7f0000001400)=""/6, 0x6}, 0x0) 2018/04/13 21:33:01 executing program 2: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg(0xffffffffffffffff, &(0x7f0000000a40)={&(0x7f00000002c0)=@in6={0xa, 0x4e24, 0x0, @mcast1={0xff, 0x1, [], 0x1}}, 0x80, &(0x7f0000000000), 0x100000000000026d, &(0x7f0000000440)}, 0x0) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x1000, &(0x7f0000a98000/0x1000)=nil}) ioctl$KVM_SET_SREGS(0xffffffffffffffff, 0x4138ae84, &(0x7f0000c9bec8)) ioctl$KVM_TRANSLATE(r2, 0xc018ae85, &(0x7f00000001c0)) 2018/04/13 21:33:01 executing program 4: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000002ff7)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f0000001000)=""/246) ioctl$EVIOCGREP(r0, 0x4008744b, &(0x7f00000000c0)=""/174) 2018/04/13 21:33:01 executing program 7: pipe(&(0x7f00005db000)={0xffffffffffffffff}) vmsplice(0xffffffffffffffff, &(0x7f0000000200)=[{&(0x7f0000000180)="595c4fcaa4768d", 0x7}], 0x1, 0x0) vmsplice(r0, &(0x7f0000000080), 0x14f, 0x0) 2018/04/13 21:33:01 executing program 3: r0 = socket$netlink(0x10, 0x3, 0xc) writev(r0, &(0x7f0000fb5ff0)=[{&(0x7f0000000080)="1f00000002031900000007000000068100023b0509000100010100ff3ffe58", 0x1f}], 0x1) writev(r0, &(0x7f0000000240)=[{&(0x7f0000000180)="1f0000000203193b000007000000068100023b050900020000004000020058", 0x1f}], 0x1) 2018/04/13 21:33:01 executing program 0: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xf, 0x4, 0x4, 0x9}, 0x11) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000080)={r0, 0xffffffffffffffff, 0x5}, 0x10) 2018/04/13 21:33:01 executing program 5: mkdir(&(0x7f00000001c0)='./control\x00', 0x0) r0 = open(&(0x7f0000000140)='./control\x00', 0x0, 0x0) perf_event_open(&(0x7f0000348f88)={0x2, 0x70, 0x3e6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdirat(r0, &(0x7f0000000080)='./control\x00', 0x0) mkdirat(r0, &(0x7f0000000200)='./file0\x00', 0x0) r1 = openat(r0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0) mkdirat(r1, &(0x7f0000000640)='./control\x00', 0x0) mknodat(r0, &(0x7f0000000040)='./control/file0\x00', 0x0, 0x0) renameat2(r1, &(0x7f000003aff6)='./control\x00', r0, &(0x7f0000000180)='./control/file0\x00', 0x2) 2018/04/13 21:33:01 executing program 0: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xf, 0x4, 0x4, 0x9}, 0x11) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000080)={r0, 0xffffffffffffffff, 0x5}, 0x10) 2018/04/13 21:33:01 executing program 4: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000002ff7)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f0000001000)=""/246) ioctl$EVIOCGREP(r0, 0x4008744b, &(0x7f00000000c0)=""/174) 2018/04/13 21:33:02 executing program 6: r0 = getpid() sched_setattr(r0, &(0x7f0000000080)={0x0, 0x2, 0x0, 0x0, 0x3}, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) readv(r1, &(0x7f00003fd000)=[{&(0x7f0000853000)=""/255, 0xffffff1f}], 0x1) pipe(&(0x7f0000ef1000)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r2, &(0x7f00005e5fd0)=[{&(0x7f00005e5000)='r', 0x1}], 0x1, 0x0) vmsplice(r3, &(0x7f00005d8000)=[{&(0x7f00005d7000)="ab", 0x1}], 0x1, 0x0) 2018/04/13 21:33:02 executing program 7: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000240)='./cgroup.net\x00', 0x200002, 0x0) fchdir(r0) r1 = syz_open_dev$sg(&(0x7f00000024c0)='/dev/sg#\x00', 0x0, 0x88400) ioctl$KVM_SET_FPU(r1, 0x41a0ae8d, &(0x7f0000002500)={[], 0x4b9, 0x7f910fbf, 0x6640, 0x0, 0x0, 0x4, 0xd000, [], 0x7}) mkdir(&(0x7f0000002700)='./file0\x00', 0x2000000000) unlink(&(0x7f0000000080)='./file0/file0\x00') r2 = syz_open_dev$usbmon(&(0x7f0000000100)='/dev/usbmon#\x00', 0x9e9a, 0x204200) setrlimit(0x1000000000000007, &(0x7f000068d000)) acct(&(0x7f0000002740)='./file0/file0\x00') bpf$MAP_CREATE(0x0, &(0x7f00000001c0)={0x5, 0x1, 0xc32, 0x8}, 0x2c) setsockopt$nfc_llcp_NFC_LLCP_RW(r2, 0x118, 0x0, &(0x7f0000000180), 0x4) mknod$loop(&(0x7f0000000200)='./file0/file0\x00', 0x100, 0x0) pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg$kcm(r3, &(0x7f0000002480)={0x0, 0x0, &(0x7f0000001400)=[{&(0x7f0000000140)=""/9, 0x9}, {&(0x7f0000000280)=""/36, 0x24}, {&(0x7f00000002c0)=""/150, 0x96}, {&(0x7f0000000380)=""/4096, 0x1000}, {&(0x7f0000001380)=""/72, 0x48}], 0x5, &(0x7f0000001480)=""/4096, 0x1000, 0x5}, 0x40000021) ioctl$EVIOCGABS20(0xffffffffffffffff, 0x80184560, &(0x7f0000000080)) rmdir(&(0x7f00000000c0)='./file0\x00') unlink(&(0x7f0000000000)='./file1\x00') ioctl$sock_bt_cmtp_CMTPCONNADD(r4, 0x400443c8, &(0x7f00000026c0)={r0, 0x9}) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r5, 0x6, 0x7, &(0x7f0000d17ffc)=0x5, 0x4) getsockopt$inet6_tcp_int(r5, 0x6, 0x7, &(0x7f00001dcffc), &(0x7f0000d21ffc)=0x4) inotify_init() 2018/04/13 21:33:02 executing program 3: r0 = socket$kcm(0x29, 0x2, 0x0) getsockopt$kcm_KCM_RECV_DISABLE(r0, 0x119, 0x1, &(0x7f0000000040), 0xfffffffffffffe76) 2018/04/13 21:33:02 executing program 2: perf_event_open(&(0x7f000001d000)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_bp={&(0x7f0000000000), 0x1}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$autofs(0xffffffffffffff9c, &(0x7f0000000100)='/dev/autofs\x00', 0x0, 0x0) mknod(&(0x7f0000f80000)='./file0\x00', 0x0, 0x0) open$dir(&(0x7f00003e8ff8)='./file0\x00', 0x0, 0x0) syz_open_dev$tun(&(0x7f0000589000)='/dev/net/tun\x00', 0x0, 0x0) pipe(&(0x7f0000000040)) socket$inet6_udp(0xa, 0x2, 0x0) timerfd_create(0x0, 0x0) syz_open_procfs(0x0, &(0x7f00006c6ff7)='net/igmp\x00') syz_open_procfs(0x0, &(0x7f0000000080)='attr\x00') socket$inet6_tcp(0xa, 0x1, 0x0) socket$unix(0x1, 0x200000000005, 0x0) pselect6(0x40, &(0x7f00003e0000), &(0x7f0000000000), &(0x7f0000e90000), &(0x7f0000000000)={0x77359400}, &(0x7f0000e85ff0)={&(0x7f0000c71ff8), 0x8}) 2018/04/13 21:33:02 executing program 4: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000002ff7)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f0000001000)=""/246) ioctl$EVIOCGREP(r0, 0x4008744b, &(0x7f00000000c0)=""/174) 2018/04/13 21:33:02 executing program 0: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xf, 0x4, 0x4, 0x9}, 0x11) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000080)={r0, 0xffffffffffffffff, 0x5}, 0x10) 2018/04/13 21:33:02 executing program 5: mkdir(&(0x7f00000001c0)='./control\x00', 0x0) r0 = open(&(0x7f0000000140)='./control\x00', 0x0, 0x0) perf_event_open(&(0x7f0000348f88)={0x2, 0x70, 0x3e6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdirat(r0, &(0x7f0000000080)='./control\x00', 0x0) mkdirat(r0, &(0x7f0000000200)='./file0\x00', 0x0) r1 = openat(r0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0) mkdirat(r1, &(0x7f0000000640)='./control\x00', 0x0) mknodat(r0, &(0x7f0000000040)='./control/file0\x00', 0x0, 0x0) renameat2(r1, &(0x7f000003aff6)='./control\x00', r0, &(0x7f0000000180)='./control/file0\x00', 0x2) 2018/04/13 21:33:02 executing program 1: r0 = semget$private(0x0, 0x7, 0x0) semtimedop(r0, &(0x7f0000000040)=[{0x3, 0x4}, {0x3}], 0x2, &(0x7f0000000080)={0x77359400}) semtimedop(r0, &(0x7f00000a8000)=[{0x3, 0xfffffffffffffff9}], 0x1, &(0x7f0000efe000)={0x2000}) semctl$SETALL(r0, 0x0, 0x11, &(0x7f0000003000)=[0x0, 0x0, 0x0, 0x7fff]) 2018/04/13 21:33:02 executing program 3: r0 = socket$kcm(0x29, 0x2, 0x0) getsockopt$kcm_KCM_RECV_DISABLE(r0, 0x119, 0x1, &(0x7f0000000040), 0xfffffffffffffe76) 2018/04/13 21:33:02 executing program 0: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xf, 0x4, 0x4, 0x9}, 0x11) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000080)={r0, 0xffffffffffffffff, 0x5}, 0x10) 2018/04/13 21:33:02 executing program 3: r0 = socket$kcm(0x29, 0x2, 0x0) getsockopt$kcm_KCM_RECV_DISABLE(r0, 0x119, 0x1, &(0x7f0000000040), 0xfffffffffffffe76) 2018/04/13 21:33:02 executing program 7: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000240)='./cgroup.net\x00', 0x200002, 0x0) fchdir(r0) r1 = syz_open_dev$sg(&(0x7f00000024c0)='/dev/sg#\x00', 0x0, 0x88400) ioctl$KVM_SET_FPU(r1, 0x41a0ae8d, &(0x7f0000002500)={[], 0x4b9, 0x7f910fbf, 0x6640, 0x0, 0x0, 0x4, 0xd000, [], 0x7}) mkdir(&(0x7f0000002700)='./file0\x00', 0x2000000000) unlink(&(0x7f0000000080)='./file0/file0\x00') r2 = syz_open_dev$usbmon(&(0x7f0000000100)='/dev/usbmon#\x00', 0x9e9a, 0x204200) setrlimit(0x1000000000000007, &(0x7f000068d000)) acct(&(0x7f0000002740)='./file0/file0\x00') bpf$MAP_CREATE(0x0, &(0x7f00000001c0)={0x5, 0x1, 0xc32, 0x8}, 0x2c) setsockopt$nfc_llcp_NFC_LLCP_RW(r2, 0x118, 0x0, &(0x7f0000000180), 0x4) mknod$loop(&(0x7f0000000200)='./file0/file0\x00', 0x100, 0x0) pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg$kcm(r3, &(0x7f0000002480)={0x0, 0x0, &(0x7f0000001400)=[{&(0x7f0000000140)=""/9, 0x9}, {&(0x7f0000000280)=""/36, 0x24}, {&(0x7f00000002c0)=""/150, 0x96}, {&(0x7f0000000380)=""/4096, 0x1000}, {&(0x7f0000001380)=""/72, 0x48}], 0x5, &(0x7f0000001480)=""/4096, 0x1000, 0x5}, 0x40000021) ioctl$EVIOCGABS20(0xffffffffffffffff, 0x80184560, &(0x7f0000000080)) rmdir(&(0x7f00000000c0)='./file0\x00') unlink(&(0x7f0000000000)='./file1\x00') ioctl$sock_bt_cmtp_CMTPCONNADD(r4, 0x400443c8, &(0x7f00000026c0)={r0, 0x9}) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r5, 0x6, 0x7, &(0x7f0000d17ffc)=0x5, 0x4) getsockopt$inet6_tcp_int(r5, 0x6, 0x7, &(0x7f00001dcffc), &(0x7f0000d21ffc)=0x4) inotify_init() 2018/04/13 21:33:02 executing program 5: mkdir(&(0x7f00000001c0)='./control\x00', 0x0) r0 = open(&(0x7f0000000140)='./control\x00', 0x0, 0x0) perf_event_open(&(0x7f0000348f88)={0x2, 0x70, 0x3e6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdirat(r0, &(0x7f0000000080)='./control\x00', 0x0) mkdirat(r0, &(0x7f0000000200)='./file0\x00', 0x0) r1 = openat(r0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0) mkdirat(r1, &(0x7f0000000640)='./control\x00', 0x0) mknodat(r0, &(0x7f0000000040)='./control/file0\x00', 0x0, 0x0) renameat2(r1, &(0x7f000003aff6)='./control\x00', r0, &(0x7f0000000180)='./control/file0\x00', 0x2) 2018/04/13 21:33:02 executing program 0: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000240)='./cgroup.net\x00', 0x200002, 0x0) fchdir(r0) r1 = syz_open_dev$sg(&(0x7f00000024c0)='/dev/sg#\x00', 0x0, 0x88400) ioctl$KVM_SET_FPU(r1, 0x41a0ae8d, &(0x7f0000002500)={[], 0x4b9, 0x7f910fbf, 0x6640, 0x0, 0x0, 0x4, 0xd000, [], 0x7}) mkdir(&(0x7f0000002700)='./file0\x00', 0x2000000000) unlink(&(0x7f0000000080)='./file0/file0\x00') r2 = syz_open_dev$usbmon(&(0x7f0000000100)='/dev/usbmon#\x00', 0x9e9a, 0x204200) setrlimit(0x1000000000000007, &(0x7f000068d000)) acct(&(0x7f0000002740)='./file0/file0\x00') bpf$MAP_CREATE(0x0, &(0x7f00000001c0)={0x5, 0x1, 0xc32, 0x8}, 0x2c) setsockopt$nfc_llcp_NFC_LLCP_RW(r2, 0x118, 0x0, &(0x7f0000000180), 0x4) mknod$loop(&(0x7f0000000200)='./file0/file0\x00', 0x100, 0x0) pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg$kcm(r3, &(0x7f0000002480)={0x0, 0x0, &(0x7f0000001400)=[{&(0x7f0000000140)=""/9, 0x9}, {&(0x7f0000000280)=""/36, 0x24}, {&(0x7f00000002c0)=""/150, 0x96}, {&(0x7f0000000380)=""/4096, 0x1000}, {&(0x7f0000001380)=""/72, 0x48}], 0x5, &(0x7f0000001480)=""/4096, 0x1000, 0x5}, 0x40000021) ioctl$EVIOCGABS20(0xffffffffffffffff, 0x80184560, &(0x7f0000000080)) rmdir(&(0x7f00000000c0)='./file0\x00') unlink(&(0x7f0000000000)='./file1\x00') ioctl$sock_bt_cmtp_CMTPCONNADD(r4, 0x400443c8, &(0x7f00000026c0)={r0, 0x9}) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r5, 0x6, 0x7, &(0x7f0000d17ffc)=0x5, 0x4) getsockopt$inet6_tcp_int(r5, 0x6, 0x7, &(0x7f00001dcffc), &(0x7f0000d21ffc)=0x4) inotify_init() 2018/04/13 21:33:02 executing program 2: perf_event_open(&(0x7f000001d000)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_bp={&(0x7f0000000000), 0x1}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$autofs(0xffffffffffffff9c, &(0x7f0000000100)='/dev/autofs\x00', 0x0, 0x0) mknod(&(0x7f0000f80000)='./file0\x00', 0x0, 0x0) open$dir(&(0x7f00003e8ff8)='./file0\x00', 0x0, 0x0) syz_open_dev$tun(&(0x7f0000589000)='/dev/net/tun\x00', 0x0, 0x0) pipe(&(0x7f0000000040)) socket$inet6_udp(0xa, 0x2, 0x0) timerfd_create(0x0, 0x0) syz_open_procfs(0x0, &(0x7f00006c6ff7)='net/igmp\x00') syz_open_procfs(0x0, &(0x7f0000000080)='attr\x00') socket$inet6_tcp(0xa, 0x1, 0x0) socket$unix(0x1, 0x200000000005, 0x0) pselect6(0x40, &(0x7f00003e0000), &(0x7f0000000000), &(0x7f0000e90000), &(0x7f0000000000)={0x77359400}, &(0x7f0000e85ff0)={&(0x7f0000c71ff8), 0x8}) 2018/04/13 21:33:02 executing program 4: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000002ff7)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f0000001000)=""/246) ioctl$EVIOCGREP(r0, 0x4008744b, &(0x7f00000000c0)=""/174) 2018/04/13 21:33:03 executing program 6: r0 = getpid() sched_setattr(r0, &(0x7f0000000080)={0x0, 0x2, 0x0, 0x0, 0x3}, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) readv(r1, &(0x7f00003fd000)=[{&(0x7f0000853000)=""/255, 0xffffff1f}], 0x1) pipe(&(0x7f0000ef1000)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r2, &(0x7f00005e5fd0)=[{&(0x7f00005e5000)='r', 0x1}], 0x1, 0x0) vmsplice(r3, &(0x7f00005d8000)=[{&(0x7f00005d7000)="ab", 0x1}], 0x1, 0x0) 2018/04/13 21:33:03 executing program 3: r0 = socket$kcm(0x29, 0x2, 0x0) getsockopt$kcm_KCM_RECV_DISABLE(r0, 0x119, 0x1, &(0x7f0000000040), 0xfffffffffffffe76) 2018/04/13 21:33:03 executing program 7: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000240)='./cgroup.net\x00', 0x200002, 0x0) fchdir(r0) r1 = syz_open_dev$sg(&(0x7f00000024c0)='/dev/sg#\x00', 0x0, 0x88400) ioctl$KVM_SET_FPU(r1, 0x41a0ae8d, &(0x7f0000002500)={[], 0x4b9, 0x7f910fbf, 0x6640, 0x0, 0x0, 0x4, 0xd000, [], 0x7}) mkdir(&(0x7f0000002700)='./file0\x00', 0x2000000000) unlink(&(0x7f0000000080)='./file0/file0\x00') r2 = syz_open_dev$usbmon(&(0x7f0000000100)='/dev/usbmon#\x00', 0x9e9a, 0x204200) setrlimit(0x1000000000000007, &(0x7f000068d000)) acct(&(0x7f0000002740)='./file0/file0\x00') bpf$MAP_CREATE(0x0, &(0x7f00000001c0)={0x5, 0x1, 0xc32, 0x8}, 0x2c) setsockopt$nfc_llcp_NFC_LLCP_RW(r2, 0x118, 0x0, &(0x7f0000000180), 0x4) mknod$loop(&(0x7f0000000200)='./file0/file0\x00', 0x100, 0x0) pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg$kcm(r3, &(0x7f0000002480)={0x0, 0x0, &(0x7f0000001400)=[{&(0x7f0000000140)=""/9, 0x9}, {&(0x7f0000000280)=""/36, 0x24}, {&(0x7f00000002c0)=""/150, 0x96}, {&(0x7f0000000380)=""/4096, 0x1000}, {&(0x7f0000001380)=""/72, 0x48}], 0x5, &(0x7f0000001480)=""/4096, 0x1000, 0x5}, 0x40000021) ioctl$EVIOCGABS20(0xffffffffffffffff, 0x80184560, &(0x7f0000000080)) rmdir(&(0x7f00000000c0)='./file0\x00') unlink(&(0x7f0000000000)='./file1\x00') ioctl$sock_bt_cmtp_CMTPCONNADD(r4, 0x400443c8, &(0x7f00000026c0)={r0, 0x9}) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r5, 0x6, 0x7, &(0x7f0000d17ffc)=0x5, 0x4) getsockopt$inet6_tcp_int(r5, 0x6, 0x7, &(0x7f00001dcffc), &(0x7f0000d21ffc)=0x4) inotify_init() 2018/04/13 21:33:03 executing program 0: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000240)='./cgroup.net\x00', 0x200002, 0x0) fchdir(r0) r1 = syz_open_dev$sg(&(0x7f00000024c0)='/dev/sg#\x00', 0x0, 0x88400) ioctl$KVM_SET_FPU(r1, 0x41a0ae8d, &(0x7f0000002500)={[], 0x4b9, 0x7f910fbf, 0x6640, 0x0, 0x0, 0x4, 0xd000, [], 0x7}) mkdir(&(0x7f0000002700)='./file0\x00', 0x2000000000) unlink(&(0x7f0000000080)='./file0/file0\x00') r2 = syz_open_dev$usbmon(&(0x7f0000000100)='/dev/usbmon#\x00', 0x9e9a, 0x204200) setrlimit(0x1000000000000007, &(0x7f000068d000)) acct(&(0x7f0000002740)='./file0/file0\x00') bpf$MAP_CREATE(0x0, &(0x7f00000001c0)={0x5, 0x1, 0xc32, 0x8}, 0x2c) setsockopt$nfc_llcp_NFC_LLCP_RW(r2, 0x118, 0x0, &(0x7f0000000180), 0x4) mknod$loop(&(0x7f0000000200)='./file0/file0\x00', 0x100, 0x0) pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg$kcm(r3, &(0x7f0000002480)={0x0, 0x0, &(0x7f0000001400)=[{&(0x7f0000000140)=""/9, 0x9}, {&(0x7f0000000280)=""/36, 0x24}, {&(0x7f00000002c0)=""/150, 0x96}, {&(0x7f0000000380)=""/4096, 0x1000}, {&(0x7f0000001380)=""/72, 0x48}], 0x5, &(0x7f0000001480)=""/4096, 0x1000, 0x5}, 0x40000021) ioctl$EVIOCGABS20(0xffffffffffffffff, 0x80184560, &(0x7f0000000080)) rmdir(&(0x7f00000000c0)='./file0\x00') unlink(&(0x7f0000000000)='./file1\x00') ioctl$sock_bt_cmtp_CMTPCONNADD(r4, 0x400443c8, &(0x7f00000026c0)={r0, 0x9}) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r5, 0x6, 0x7, &(0x7f0000d17ffc)=0x5, 0x4) getsockopt$inet6_tcp_int(r5, 0x6, 0x7, &(0x7f00001dcffc), &(0x7f0000d21ffc)=0x4) inotify_init() 2018/04/13 21:33:03 executing program 5: mkdir(&(0x7f00000001c0)='./control\x00', 0x0) r0 = open(&(0x7f0000000140)='./control\x00', 0x0, 0x0) perf_event_open(&(0x7f0000348f88)={0x2, 0x70, 0x3e6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdirat(r0, &(0x7f0000000080)='./control\x00', 0x0) mkdirat(r0, &(0x7f0000000200)='./file0\x00', 0x0) r1 = openat(r0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0) mkdirat(r1, &(0x7f0000000640)='./control\x00', 0x0) mknodat(r0, &(0x7f0000000040)='./control/file0\x00', 0x0, 0x0) renameat2(r1, &(0x7f000003aff6)='./control\x00', r0, &(0x7f0000000180)='./control/file0\x00', 0x2) 2018/04/13 21:33:03 executing program 2: perf_event_open(&(0x7f000001d000)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_bp={&(0x7f0000000000), 0x1}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$autofs(0xffffffffffffff9c, &(0x7f0000000100)='/dev/autofs\x00', 0x0, 0x0) mknod(&(0x7f0000f80000)='./file0\x00', 0x0, 0x0) open$dir(&(0x7f00003e8ff8)='./file0\x00', 0x0, 0x0) syz_open_dev$tun(&(0x7f0000589000)='/dev/net/tun\x00', 0x0, 0x0) pipe(&(0x7f0000000040)) socket$inet6_udp(0xa, 0x2, 0x0) timerfd_create(0x0, 0x0) syz_open_procfs(0x0, &(0x7f00006c6ff7)='net/igmp\x00') syz_open_procfs(0x0, &(0x7f0000000080)='attr\x00') socket$inet6_tcp(0xa, 0x1, 0x0) socket$unix(0x1, 0x200000000005, 0x0) pselect6(0x40, &(0x7f00003e0000), &(0x7f0000000000), &(0x7f0000e90000), &(0x7f0000000000)={0x77359400}, &(0x7f0000e85ff0)={&(0x7f0000c71ff8), 0x8}) 2018/04/13 21:33:03 executing program 4: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000240)='./cgroup.net\x00', 0x200002, 0x0) fchdir(r0) r1 = syz_open_dev$sg(&(0x7f00000024c0)='/dev/sg#\x00', 0x0, 0x88400) ioctl$KVM_SET_FPU(r1, 0x41a0ae8d, &(0x7f0000002500)={[], 0x4b9, 0x7f910fbf, 0x6640, 0x0, 0x0, 0x4, 0xd000, [], 0x7}) mkdir(&(0x7f0000002700)='./file0\x00', 0x2000000000) unlink(&(0x7f0000000080)='./file0/file0\x00') r2 = syz_open_dev$usbmon(&(0x7f0000000100)='/dev/usbmon#\x00', 0x9e9a, 0x204200) setrlimit(0x1000000000000007, &(0x7f000068d000)) acct(&(0x7f0000002740)='./file0/file0\x00') bpf$MAP_CREATE(0x0, &(0x7f00000001c0)={0x5, 0x1, 0xc32, 0x8}, 0x2c) setsockopt$nfc_llcp_NFC_LLCP_RW(r2, 0x118, 0x0, &(0x7f0000000180), 0x4) mknod$loop(&(0x7f0000000200)='./file0/file0\x00', 0x100, 0x0) pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg$kcm(r3, &(0x7f0000002480)={0x0, 0x0, &(0x7f0000001400)=[{&(0x7f0000000140)=""/9, 0x9}, {&(0x7f0000000280)=""/36, 0x24}, {&(0x7f00000002c0)=""/150, 0x96}, {&(0x7f0000000380)=""/4096, 0x1000}, {&(0x7f0000001380)=""/72, 0x48}], 0x5, &(0x7f0000001480)=""/4096, 0x1000, 0x5}, 0x40000021) ioctl$EVIOCGABS20(0xffffffffffffffff, 0x80184560, &(0x7f0000000080)) rmdir(&(0x7f00000000c0)='./file0\x00') unlink(&(0x7f0000000000)='./file1\x00') ioctl$sock_bt_cmtp_CMTPCONNADD(r4, 0x400443c8, &(0x7f00000026c0)={r0, 0x9}) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r5, 0x6, 0x7, &(0x7f0000d17ffc)=0x5, 0x4) getsockopt$inet6_tcp_int(r5, 0x6, 0x7, &(0x7f00001dcffc), &(0x7f0000d21ffc)=0x4) inotify_init() 2018/04/13 21:33:03 executing program 1: r0 = semget$private(0x0, 0x7, 0x0) semtimedop(r0, &(0x7f0000000040)=[{0x3, 0x4}, {0x3}], 0x2, &(0x7f0000000080)={0x77359400}) semtimedop(r0, &(0x7f00000a8000)=[{0x3, 0xfffffffffffffff9}], 0x1, &(0x7f0000efe000)={0x2000}) semctl$SETALL(r0, 0x0, 0x11, &(0x7f0000003000)=[0x0, 0x0, 0x0, 0x7fff]) 2018/04/13 21:33:03 executing program 3: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000240)='./cgroup.net\x00', 0x200002, 0x0) fchdir(r0) r1 = syz_open_dev$sg(&(0x7f00000024c0)='/dev/sg#\x00', 0x0, 0x88400) ioctl$KVM_SET_FPU(r1, 0x41a0ae8d, &(0x7f0000002500)={[], 0x4b9, 0x7f910fbf, 0x6640, 0x0, 0x0, 0x4, 0xd000, [], 0x7}) mkdir(&(0x7f0000002700)='./file0\x00', 0x2000000000) unlink(&(0x7f0000000080)='./file0/file0\x00') r2 = syz_open_dev$usbmon(&(0x7f0000000100)='/dev/usbmon#\x00', 0x9e9a, 0x204200) setrlimit(0x1000000000000007, &(0x7f000068d000)) acct(&(0x7f0000002740)='./file0/file0\x00') bpf$MAP_CREATE(0x0, &(0x7f00000001c0)={0x5, 0x1, 0xc32, 0x8}, 0x2c) setsockopt$nfc_llcp_NFC_LLCP_RW(r2, 0x118, 0x0, &(0x7f0000000180), 0x4) mknod$loop(&(0x7f0000000200)='./file0/file0\x00', 0x100, 0x0) pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg$kcm(r3, &(0x7f0000002480)={0x0, 0x0, &(0x7f0000001400)=[{&(0x7f0000000140)=""/9, 0x9}, {&(0x7f0000000280)=""/36, 0x24}, {&(0x7f00000002c0)=""/150, 0x96}, {&(0x7f0000000380)=""/4096, 0x1000}, {&(0x7f0000001380)=""/72, 0x48}], 0x5, &(0x7f0000001480)=""/4096, 0x1000, 0x5}, 0x40000021) ioctl$EVIOCGABS20(0xffffffffffffffff, 0x80184560, &(0x7f0000000080)) rmdir(&(0x7f00000000c0)='./file0\x00') unlink(&(0x7f0000000000)='./file1\x00') ioctl$sock_bt_cmtp_CMTPCONNADD(r4, 0x400443c8, &(0x7f00000026c0)={r0, 0x9}) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r5, 0x6, 0x7, &(0x7f0000d17ffc)=0x5, 0x4) getsockopt$inet6_tcp_int(r5, 0x6, 0x7, &(0x7f00001dcffc), &(0x7f0000d21ffc)=0x4) inotify_init() 2018/04/13 21:33:03 executing program 4: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000240)='./cgroup.net\x00', 0x200002, 0x0) fchdir(r0) r1 = syz_open_dev$sg(&(0x7f00000024c0)='/dev/sg#\x00', 0x0, 0x88400) ioctl$KVM_SET_FPU(r1, 0x41a0ae8d, &(0x7f0000002500)={[], 0x4b9, 0x7f910fbf, 0x6640, 0x0, 0x0, 0x4, 0xd000, [], 0x7}) mkdir(&(0x7f0000002700)='./file0\x00', 0x2000000000) unlink(&(0x7f0000000080)='./file0/file0\x00') r2 = syz_open_dev$usbmon(&(0x7f0000000100)='/dev/usbmon#\x00', 0x9e9a, 0x204200) setrlimit(0x1000000000000007, &(0x7f000068d000)) acct(&(0x7f0000002740)='./file0/file0\x00') bpf$MAP_CREATE(0x0, &(0x7f00000001c0)={0x5, 0x1, 0xc32, 0x8}, 0x2c) setsockopt$nfc_llcp_NFC_LLCP_RW(r2, 0x118, 0x0, &(0x7f0000000180), 0x4) mknod$loop(&(0x7f0000000200)='./file0/file0\x00', 0x100, 0x0) pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg$kcm(r3, &(0x7f0000002480)={0x0, 0x0, &(0x7f0000001400)=[{&(0x7f0000000140)=""/9, 0x9}, {&(0x7f0000000280)=""/36, 0x24}, {&(0x7f00000002c0)=""/150, 0x96}, {&(0x7f0000000380)=""/4096, 0x1000}, {&(0x7f0000001380)=""/72, 0x48}], 0x5, &(0x7f0000001480)=""/4096, 0x1000, 0x5}, 0x40000021) ioctl$EVIOCGABS20(0xffffffffffffffff, 0x80184560, &(0x7f0000000080)) rmdir(&(0x7f00000000c0)='./file0\x00') unlink(&(0x7f0000000000)='./file1\x00') ioctl$sock_bt_cmtp_CMTPCONNADD(r4, 0x400443c8, &(0x7f00000026c0)={r0, 0x9}) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r5, 0x6, 0x7, &(0x7f0000d17ffc)=0x5, 0x4) getsockopt$inet6_tcp_int(r5, 0x6, 0x7, &(0x7f00001dcffc), &(0x7f0000d21ffc)=0x4) inotify_init() 2018/04/13 21:33:03 executing program 5: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000240)='./cgroup.net\x00', 0x200002, 0x0) fchdir(r0) r1 = syz_open_dev$sg(&(0x7f00000024c0)='/dev/sg#\x00', 0x0, 0x88400) ioctl$KVM_SET_FPU(r1, 0x41a0ae8d, &(0x7f0000002500)={[], 0x4b9, 0x7f910fbf, 0x6640, 0x0, 0x0, 0x4, 0xd000, [], 0x7}) mkdir(&(0x7f0000002700)='./file0\x00', 0x2000000000) unlink(&(0x7f0000000080)='./file0/file0\x00') r2 = syz_open_dev$usbmon(&(0x7f0000000100)='/dev/usbmon#\x00', 0x9e9a, 0x204200) setrlimit(0x1000000000000007, &(0x7f000068d000)) acct(&(0x7f0000002740)='./file0/file0\x00') bpf$MAP_CREATE(0x0, &(0x7f00000001c0)={0x5, 0x1, 0xc32, 0x8}, 0x2c) setsockopt$nfc_llcp_NFC_LLCP_RW(r2, 0x118, 0x0, &(0x7f0000000180), 0x4) mknod$loop(&(0x7f0000000200)='./file0/file0\x00', 0x100, 0x0) pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg$kcm(r3, &(0x7f0000002480)={0x0, 0x0, &(0x7f0000001400)=[{&(0x7f0000000140)=""/9, 0x9}, {&(0x7f0000000280)=""/36, 0x24}, {&(0x7f00000002c0)=""/150, 0x96}, {&(0x7f0000000380)=""/4096, 0x1000}, {&(0x7f0000001380)=""/72, 0x48}], 0x5, &(0x7f0000001480)=""/4096, 0x1000, 0x5}, 0x40000021) ioctl$EVIOCGABS20(0xffffffffffffffff, 0x80184560, &(0x7f0000000080)) rmdir(&(0x7f00000000c0)='./file0\x00') unlink(&(0x7f0000000000)='./file1\x00') ioctl$sock_bt_cmtp_CMTPCONNADD(r4, 0x400443c8, &(0x7f00000026c0)={r0, 0x9}) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r5, 0x6, 0x7, &(0x7f0000d17ffc)=0x5, 0x4) getsockopt$inet6_tcp_int(r5, 0x6, 0x7, &(0x7f00001dcffc), &(0x7f0000d21ffc)=0x4) inotify_init() 2018/04/13 21:33:03 executing program 7: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000240)='./cgroup.net\x00', 0x200002, 0x0) fchdir(r0) r1 = syz_open_dev$sg(&(0x7f00000024c0)='/dev/sg#\x00', 0x0, 0x88400) ioctl$KVM_SET_FPU(r1, 0x41a0ae8d, &(0x7f0000002500)={[], 0x4b9, 0x7f910fbf, 0x6640, 0x0, 0x0, 0x4, 0xd000, [], 0x7}) mkdir(&(0x7f0000002700)='./file0\x00', 0x2000000000) unlink(&(0x7f0000000080)='./file0/file0\x00') r2 = syz_open_dev$usbmon(&(0x7f0000000100)='/dev/usbmon#\x00', 0x9e9a, 0x204200) setrlimit(0x1000000000000007, &(0x7f000068d000)) acct(&(0x7f0000002740)='./file0/file0\x00') bpf$MAP_CREATE(0x0, &(0x7f00000001c0)={0x5, 0x1, 0xc32, 0x8}, 0x2c) setsockopt$nfc_llcp_NFC_LLCP_RW(r2, 0x118, 0x0, &(0x7f0000000180), 0x4) mknod$loop(&(0x7f0000000200)='./file0/file0\x00', 0x100, 0x0) pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg$kcm(r3, &(0x7f0000002480)={0x0, 0x0, &(0x7f0000001400)=[{&(0x7f0000000140)=""/9, 0x9}, {&(0x7f0000000280)=""/36, 0x24}, {&(0x7f00000002c0)=""/150, 0x96}, {&(0x7f0000000380)=""/4096, 0x1000}, {&(0x7f0000001380)=""/72, 0x48}], 0x5, &(0x7f0000001480)=""/4096, 0x1000, 0x5}, 0x40000021) ioctl$EVIOCGABS20(0xffffffffffffffff, 0x80184560, &(0x7f0000000080)) rmdir(&(0x7f00000000c0)='./file0\x00') unlink(&(0x7f0000000000)='./file1\x00') ioctl$sock_bt_cmtp_CMTPCONNADD(r4, 0x400443c8, &(0x7f00000026c0)={r0, 0x9}) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r5, 0x6, 0x7, &(0x7f0000d17ffc)=0x5, 0x4) getsockopt$inet6_tcp_int(r5, 0x6, 0x7, &(0x7f00001dcffc), &(0x7f0000d21ffc)=0x4) inotify_init() 2018/04/13 21:33:03 executing program 0: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000240)='./cgroup.net\x00', 0x200002, 0x0) fchdir(r0) r1 = syz_open_dev$sg(&(0x7f00000024c0)='/dev/sg#\x00', 0x0, 0x88400) ioctl$KVM_SET_FPU(r1, 0x41a0ae8d, &(0x7f0000002500)={[], 0x4b9, 0x7f910fbf, 0x6640, 0x0, 0x0, 0x4, 0xd000, [], 0x7}) mkdir(&(0x7f0000002700)='./file0\x00', 0x2000000000) unlink(&(0x7f0000000080)='./file0/file0\x00') r2 = syz_open_dev$usbmon(&(0x7f0000000100)='/dev/usbmon#\x00', 0x9e9a, 0x204200) setrlimit(0x1000000000000007, &(0x7f000068d000)) acct(&(0x7f0000002740)='./file0/file0\x00') bpf$MAP_CREATE(0x0, &(0x7f00000001c0)={0x5, 0x1, 0xc32, 0x8}, 0x2c) setsockopt$nfc_llcp_NFC_LLCP_RW(r2, 0x118, 0x0, &(0x7f0000000180), 0x4) mknod$loop(&(0x7f0000000200)='./file0/file0\x00', 0x100, 0x0) pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg$kcm(r3, &(0x7f0000002480)={0x0, 0x0, &(0x7f0000001400)=[{&(0x7f0000000140)=""/9, 0x9}, {&(0x7f0000000280)=""/36, 0x24}, {&(0x7f00000002c0)=""/150, 0x96}, {&(0x7f0000000380)=""/4096, 0x1000}, {&(0x7f0000001380)=""/72, 0x48}], 0x5, &(0x7f0000001480)=""/4096, 0x1000, 0x5}, 0x40000021) ioctl$EVIOCGABS20(0xffffffffffffffff, 0x80184560, &(0x7f0000000080)) rmdir(&(0x7f00000000c0)='./file0\x00') unlink(&(0x7f0000000000)='./file1\x00') ioctl$sock_bt_cmtp_CMTPCONNADD(r4, 0x400443c8, &(0x7f00000026c0)={r0, 0x9}) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r5, 0x6, 0x7, &(0x7f0000d17ffc)=0x5, 0x4) getsockopt$inet6_tcp_int(r5, 0x6, 0x7, &(0x7f00001dcffc), &(0x7f0000d21ffc)=0x4) inotify_init() 2018/04/13 21:33:03 executing program 2: perf_event_open(&(0x7f000001d000)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_bp={&(0x7f0000000000), 0x1}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$autofs(0xffffffffffffff9c, &(0x7f0000000100)='/dev/autofs\x00', 0x0, 0x0) mknod(&(0x7f0000f80000)='./file0\x00', 0x0, 0x0) open$dir(&(0x7f00003e8ff8)='./file0\x00', 0x0, 0x0) syz_open_dev$tun(&(0x7f0000589000)='/dev/net/tun\x00', 0x0, 0x0) pipe(&(0x7f0000000040)) socket$inet6_udp(0xa, 0x2, 0x0) timerfd_create(0x0, 0x0) syz_open_procfs(0x0, &(0x7f00006c6ff7)='net/igmp\x00') syz_open_procfs(0x0, &(0x7f0000000080)='attr\x00') socket$inet6_tcp(0xa, 0x1, 0x0) socket$unix(0x1, 0x200000000005, 0x0) pselect6(0x40, &(0x7f00003e0000), &(0x7f0000000000), &(0x7f0000e90000), &(0x7f0000000000)={0x77359400}, &(0x7f0000e85ff0)={&(0x7f0000c71ff8), 0x8}) 2018/04/13 21:33:03 executing program 3: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000240)='./cgroup.net\x00', 0x200002, 0x0) fchdir(r0) r1 = syz_open_dev$sg(&(0x7f00000024c0)='/dev/sg#\x00', 0x0, 0x88400) ioctl$KVM_SET_FPU(r1, 0x41a0ae8d, &(0x7f0000002500)={[], 0x4b9, 0x7f910fbf, 0x6640, 0x0, 0x0, 0x4, 0xd000, [], 0x7}) mkdir(&(0x7f0000002700)='./file0\x00', 0x2000000000) unlink(&(0x7f0000000080)='./file0/file0\x00') r2 = syz_open_dev$usbmon(&(0x7f0000000100)='/dev/usbmon#\x00', 0x9e9a, 0x204200) setrlimit(0x1000000000000007, &(0x7f000068d000)) acct(&(0x7f0000002740)='./file0/file0\x00') bpf$MAP_CREATE(0x0, &(0x7f00000001c0)={0x5, 0x1, 0xc32, 0x8}, 0x2c) setsockopt$nfc_llcp_NFC_LLCP_RW(r2, 0x118, 0x0, &(0x7f0000000180), 0x4) mknod$loop(&(0x7f0000000200)='./file0/file0\x00', 0x100, 0x0) pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg$kcm(r3, &(0x7f0000002480)={0x0, 0x0, &(0x7f0000001400)=[{&(0x7f0000000140)=""/9, 0x9}, {&(0x7f0000000280)=""/36, 0x24}, {&(0x7f00000002c0)=""/150, 0x96}, {&(0x7f0000000380)=""/4096, 0x1000}, {&(0x7f0000001380)=""/72, 0x48}], 0x5, &(0x7f0000001480)=""/4096, 0x1000, 0x5}, 0x40000021) ioctl$EVIOCGABS20(0xffffffffffffffff, 0x80184560, &(0x7f0000000080)) rmdir(&(0x7f00000000c0)='./file0\x00') unlink(&(0x7f0000000000)='./file1\x00') ioctl$sock_bt_cmtp_CMTPCONNADD(r4, 0x400443c8, &(0x7f00000026c0)={r0, 0x9}) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r5, 0x6, 0x7, &(0x7f0000d17ffc)=0x5, 0x4) getsockopt$inet6_tcp_int(r5, 0x6, 0x7, &(0x7f00001dcffc), &(0x7f0000d21ffc)=0x4) inotify_init() 2018/04/13 21:33:03 executing program 4: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000240)='./cgroup.net\x00', 0x200002, 0x0) fchdir(r0) r1 = syz_open_dev$sg(&(0x7f00000024c0)='/dev/sg#\x00', 0x0, 0x88400) ioctl$KVM_SET_FPU(r1, 0x41a0ae8d, &(0x7f0000002500)={[], 0x4b9, 0x7f910fbf, 0x6640, 0x0, 0x0, 0x4, 0xd000, [], 0x7}) mkdir(&(0x7f0000002700)='./file0\x00', 0x2000000000) unlink(&(0x7f0000000080)='./file0/file0\x00') r2 = syz_open_dev$usbmon(&(0x7f0000000100)='/dev/usbmon#\x00', 0x9e9a, 0x204200) setrlimit(0x1000000000000007, &(0x7f000068d000)) acct(&(0x7f0000002740)='./file0/file0\x00') bpf$MAP_CREATE(0x0, &(0x7f00000001c0)={0x5, 0x1, 0xc32, 0x8}, 0x2c) setsockopt$nfc_llcp_NFC_LLCP_RW(r2, 0x118, 0x0, &(0x7f0000000180), 0x4) mknod$loop(&(0x7f0000000200)='./file0/file0\x00', 0x100, 0x0) pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg$kcm(r3, &(0x7f0000002480)={0x0, 0x0, &(0x7f0000001400)=[{&(0x7f0000000140)=""/9, 0x9}, {&(0x7f0000000280)=""/36, 0x24}, {&(0x7f00000002c0)=""/150, 0x96}, {&(0x7f0000000380)=""/4096, 0x1000}, {&(0x7f0000001380)=""/72, 0x48}], 0x5, &(0x7f0000001480)=""/4096, 0x1000, 0x5}, 0x40000021) ioctl$EVIOCGABS20(0xffffffffffffffff, 0x80184560, &(0x7f0000000080)) rmdir(&(0x7f00000000c0)='./file0\x00') unlink(&(0x7f0000000000)='./file1\x00') ioctl$sock_bt_cmtp_CMTPCONNADD(r4, 0x400443c8, &(0x7f00000026c0)={r0, 0x9}) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r5, 0x6, 0x7, &(0x7f0000d17ffc)=0x5, 0x4) getsockopt$inet6_tcp_int(r5, 0x6, 0x7, &(0x7f00001dcffc), &(0x7f0000d21ffc)=0x4) inotify_init() 2018/04/13 21:33:04 executing program 1: r0 = semget$private(0x0, 0x7, 0x0) semtimedop(r0, &(0x7f0000000040)=[{0x3, 0x4}, {0x3}], 0x2, &(0x7f0000000080)={0x77359400}) semtimedop(r0, &(0x7f00000a8000)=[{0x3, 0xfffffffffffffff9}], 0x1, &(0x7f0000efe000)={0x2000}) semctl$SETALL(r0, 0x0, 0x11, &(0x7f0000003000)=[0x0, 0x0, 0x0, 0x7fff]) 2018/04/13 21:33:04 executing program 5: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000240)='./cgroup.net\x00', 0x200002, 0x0) fchdir(r0) r1 = syz_open_dev$sg(&(0x7f00000024c0)='/dev/sg#\x00', 0x0, 0x88400) ioctl$KVM_SET_FPU(r1, 0x41a0ae8d, &(0x7f0000002500)={[], 0x4b9, 0x7f910fbf, 0x6640, 0x0, 0x0, 0x4, 0xd000, [], 0x7}) mkdir(&(0x7f0000002700)='./file0\x00', 0x2000000000) unlink(&(0x7f0000000080)='./file0/file0\x00') r2 = syz_open_dev$usbmon(&(0x7f0000000100)='/dev/usbmon#\x00', 0x9e9a, 0x204200) setrlimit(0x1000000000000007, &(0x7f000068d000)) acct(&(0x7f0000002740)='./file0/file0\x00') bpf$MAP_CREATE(0x0, &(0x7f00000001c0)={0x5, 0x1, 0xc32, 0x8}, 0x2c) setsockopt$nfc_llcp_NFC_LLCP_RW(r2, 0x118, 0x0, &(0x7f0000000180), 0x4) mknod$loop(&(0x7f0000000200)='./file0/file0\x00', 0x100, 0x0) pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg$kcm(r3, &(0x7f0000002480)={0x0, 0x0, &(0x7f0000001400)=[{&(0x7f0000000140)=""/9, 0x9}, {&(0x7f0000000280)=""/36, 0x24}, {&(0x7f00000002c0)=""/150, 0x96}, {&(0x7f0000000380)=""/4096, 0x1000}, {&(0x7f0000001380)=""/72, 0x48}], 0x5, &(0x7f0000001480)=""/4096, 0x1000, 0x5}, 0x40000021) ioctl$EVIOCGABS20(0xffffffffffffffff, 0x80184560, &(0x7f0000000080)) rmdir(&(0x7f00000000c0)='./file0\x00') unlink(&(0x7f0000000000)='./file1\x00') ioctl$sock_bt_cmtp_CMTPCONNADD(r4, 0x400443c8, &(0x7f00000026c0)={r0, 0x9}) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r5, 0x6, 0x7, &(0x7f0000d17ffc)=0x5, 0x4) getsockopt$inet6_tcp_int(r5, 0x6, 0x7, &(0x7f00001dcffc), &(0x7f0000d21ffc)=0x4) inotify_init() 2018/04/13 21:33:04 executing program 0: r0 = semget$private(0x0, 0x7, 0x0) semtimedop(r0, &(0x7f0000000040)=[{0x3, 0x4}, {0x3}], 0x2, &(0x7f0000000080)={0x77359400}) semtimedop(r0, &(0x7f00000a8000)=[{0x3, 0xfffffffffffffff9}], 0x1, &(0x7f0000efe000)={0x2000}) semctl$SETALL(r0, 0x0, 0x11, &(0x7f0000003000)=[0x0, 0x0, 0x0, 0x7fff]) 2018/04/13 21:33:04 executing program 7: bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000040)={0xffffffffffffffff, &(0x7f00000000c0)="b82283392dc50ff1fb635a5849d2f5916ae2fdc24e95e12aa8daccf7393e72be9cc66f"}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f0000346fd4)={0x0, 0x0, 0x0, 0x1000000000000004, 0x202}, 0x2c) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x1, 0x5, &(0x7f0000346fc8)=@framed={{0x18}, [@alu={0x8000000201a7f19, 0x0, 0x7, 0x0, 0x1}], {0x95}}, &(0x7f0000f6bffb)='GPL\x00', 0x0, 0x299, &(0x7f00001a7f05)=""/251}, 0x18) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000140)={r0, 0x50, &(0x7f00000000c0)}, 0x10) socketpair$inet_icmp(0x2, 0x40106f33, 0x400000, &(0x7f00000001c0)) 2018/04/13 21:33:04 executing program 4: r0 = socket(0x1e, 0x4, 0x0) setsockopt$packet_tx_ring(r0, 0x10f, 0x87, &(0x7f0000265000)=@req={0x3fc, 0x0, 0x1}, 0x10) getsockopt$inet_mreqn(r0, 0x0, 0x0, &(0x7f00000001c0)={@broadcast, @broadcast, 0x0}, &(0x7f0000000200)=0xc) bind$packet(r0, &(0x7f0000000240)={0x11, 0x0, r1, 0x1, 0xde, 0x6, @remote={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xbb}}, 0x14) read(r0, &(0x7f0000000000)=""/7, 0x7) r2 = socket(0x1e, 0x4, 0x0) setsockopt$packet_tx_ring(r2, 0x10f, 0x87, &(0x7f0000265000)=@req={0x3fc, 0x0, 0x1}, 0x10) writev(r2, &(0x7f000069c000)=[{&(0x7f0000dbd000)='T', 0x1}], 0x1) close(0xffffffffffffffff) 2018/04/13 21:33:04 executing program 3: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000240)='./cgroup.net\x00', 0x200002, 0x0) fchdir(r0) r1 = syz_open_dev$sg(&(0x7f00000024c0)='/dev/sg#\x00', 0x0, 0x88400) ioctl$KVM_SET_FPU(r1, 0x41a0ae8d, &(0x7f0000002500)={[], 0x4b9, 0x7f910fbf, 0x6640, 0x0, 0x0, 0x4, 0xd000, [], 0x7}) mkdir(&(0x7f0000002700)='./file0\x00', 0x2000000000) unlink(&(0x7f0000000080)='./file0/file0\x00') r2 = syz_open_dev$usbmon(&(0x7f0000000100)='/dev/usbmon#\x00', 0x9e9a, 0x204200) setrlimit(0x1000000000000007, &(0x7f000068d000)) acct(&(0x7f0000002740)='./file0/file0\x00') bpf$MAP_CREATE(0x0, &(0x7f00000001c0)={0x5, 0x1, 0xc32, 0x8}, 0x2c) setsockopt$nfc_llcp_NFC_LLCP_RW(r2, 0x118, 0x0, &(0x7f0000000180), 0x4) mknod$loop(&(0x7f0000000200)='./file0/file0\x00', 0x100, 0x0) pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg$kcm(r3, &(0x7f0000002480)={0x0, 0x0, &(0x7f0000001400)=[{&(0x7f0000000140)=""/9, 0x9}, {&(0x7f0000000280)=""/36, 0x24}, {&(0x7f00000002c0)=""/150, 0x96}, {&(0x7f0000000380)=""/4096, 0x1000}, {&(0x7f0000001380)=""/72, 0x48}], 0x5, &(0x7f0000001480)=""/4096, 0x1000, 0x5}, 0x40000021) ioctl$EVIOCGABS20(0xffffffffffffffff, 0x80184560, &(0x7f0000000080)) rmdir(&(0x7f00000000c0)='./file0\x00') unlink(&(0x7f0000000000)='./file1\x00') ioctl$sock_bt_cmtp_CMTPCONNADD(r4, 0x400443c8, &(0x7f00000026c0)={r0, 0x9}) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r5, 0x6, 0x7, &(0x7f0000d17ffc)=0x5, 0x4) getsockopt$inet6_tcp_int(r5, 0x6, 0x7, &(0x7f00001dcffc), &(0x7f0000d21ffc)=0x4) inotify_init() 2018/04/13 21:33:04 executing program 2: r0 = syz_open_dev$tun(&(0x7f0000000000)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f00000000c0)={'ifb0\x00', 0x6d01}) ioctl$TUNSETGROUP(r0, 0x400454ce, 0x0) close(r0) 2018/04/13 21:33:04 executing program 6: r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000ff4)='/dev/ashmem\x00', 0x0, 0x0) ioctl$ASHMEM_SET_SIZE(r0, 0x40087703, 0x400) mmap(&(0x7f0000447000/0x4000)=nil, 0x4000, 0x0, 0x13, r0, 0x0) ioctl$ASHMEM_GET_PIN_STATUS(r0, 0x40087703, 0x910000) 2018/04/13 21:33:04 executing program 3: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) kexec_load(0x0, 0x0, &(0x7f00000016c0), 0x0) 2018/04/13 21:33:04 executing program 6: r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000ff4)='/dev/ashmem\x00', 0x0, 0x0) ioctl$ASHMEM_SET_SIZE(r0, 0x40087703, 0x400) mmap(&(0x7f0000447000/0x4000)=nil, 0x4000, 0x0, 0x13, r0, 0x0) ioctl$ASHMEM_GET_PIN_STATUS(r0, 0x40087703, 0x910000) 2018/04/13 21:33:04 executing program 5: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000240)='./cgroup.net\x00', 0x200002, 0x0) fchdir(r0) r1 = syz_open_dev$sg(&(0x7f00000024c0)='/dev/sg#\x00', 0x0, 0x88400) ioctl$KVM_SET_FPU(r1, 0x41a0ae8d, &(0x7f0000002500)={[], 0x4b9, 0x7f910fbf, 0x6640, 0x0, 0x0, 0x4, 0xd000, [], 0x7}) mkdir(&(0x7f0000002700)='./file0\x00', 0x2000000000) unlink(&(0x7f0000000080)='./file0/file0\x00') r2 = syz_open_dev$usbmon(&(0x7f0000000100)='/dev/usbmon#\x00', 0x9e9a, 0x204200) setrlimit(0x1000000000000007, &(0x7f000068d000)) acct(&(0x7f0000002740)='./file0/file0\x00') bpf$MAP_CREATE(0x0, &(0x7f00000001c0)={0x5, 0x1, 0xc32, 0x8}, 0x2c) setsockopt$nfc_llcp_NFC_LLCP_RW(r2, 0x118, 0x0, &(0x7f0000000180), 0x4) mknod$loop(&(0x7f0000000200)='./file0/file0\x00', 0x100, 0x0) pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg$kcm(r3, &(0x7f0000002480)={0x0, 0x0, &(0x7f0000001400)=[{&(0x7f0000000140)=""/9, 0x9}, {&(0x7f0000000280)=""/36, 0x24}, {&(0x7f00000002c0)=""/150, 0x96}, {&(0x7f0000000380)=""/4096, 0x1000}, {&(0x7f0000001380)=""/72, 0x48}], 0x5, &(0x7f0000001480)=""/4096, 0x1000, 0x5}, 0x40000021) ioctl$EVIOCGABS20(0xffffffffffffffff, 0x80184560, &(0x7f0000000080)) rmdir(&(0x7f00000000c0)='./file0\x00') unlink(&(0x7f0000000000)='./file1\x00') ioctl$sock_bt_cmtp_CMTPCONNADD(r4, 0x400443c8, &(0x7f00000026c0)={r0, 0x9}) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r5, 0x6, 0x7, &(0x7f0000d17ffc)=0x5, 0x4) getsockopt$inet6_tcp_int(r5, 0x6, 0x7, &(0x7f00001dcffc), &(0x7f0000d21ffc)=0x4) inotify_init() 2018/04/13 21:33:04 executing program 2: r0 = syz_open_dev$tun(&(0x7f0000000000)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f00000000c0)={'ifb0\x00', 0x6d01}) ioctl$TUNSETGROUP(r0, 0x400454ce, 0x0) close(r0) 2018/04/13 21:33:04 executing program 7: bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000040)={0xffffffffffffffff, &(0x7f00000000c0)="b82283392dc50ff1fb635a5849d2f5916ae2fdc24e95e12aa8daccf7393e72be9cc66f"}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f0000346fd4)={0x0, 0x0, 0x0, 0x1000000000000004, 0x202}, 0x2c) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x1, 0x5, &(0x7f0000346fc8)=@framed={{0x18}, [@alu={0x8000000201a7f19, 0x0, 0x7, 0x0, 0x1}], {0x95}}, &(0x7f0000f6bffb)='GPL\x00', 0x0, 0x299, &(0x7f00001a7f05)=""/251}, 0x18) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000140)={r0, 0x50, &(0x7f00000000c0)}, 0x10) socketpair$inet_icmp(0x2, 0x40106f33, 0x400000, &(0x7f00000001c0)) 2018/04/13 21:33:04 executing program 6: r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000ff4)='/dev/ashmem\x00', 0x0, 0x0) ioctl$ASHMEM_SET_SIZE(r0, 0x40087703, 0x400) mmap(&(0x7f0000447000/0x4000)=nil, 0x4000, 0x0, 0x13, r0, 0x0) ioctl$ASHMEM_GET_PIN_STATUS(r0, 0x40087703, 0x910000) 2018/04/13 21:33:04 executing program 3: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) kexec_load(0x0, 0x0, &(0x7f00000016c0), 0x0) 2018/04/13 21:33:04 executing program 2: r0 = syz_open_dev$tun(&(0x7f0000000000)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f00000000c0)={'ifb0\x00', 0x6d01}) ioctl$TUNSETGROUP(r0, 0x400454ce, 0x0) close(r0) 2018/04/13 21:33:05 executing program 4: r0 = socket(0x1e, 0x4, 0x0) setsockopt$packet_tx_ring(r0, 0x10f, 0x87, &(0x7f0000265000)=@req={0x3fc, 0x0, 0x1}, 0x10) getsockopt$inet_mreqn(r0, 0x0, 0x0, &(0x7f00000001c0)={@broadcast, @broadcast, 0x0}, &(0x7f0000000200)=0xc) bind$packet(r0, &(0x7f0000000240)={0x11, 0x0, r1, 0x1, 0xde, 0x6, @remote={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xbb}}, 0x14) read(r0, &(0x7f0000000000)=""/7, 0x7) r2 = socket(0x1e, 0x4, 0x0) setsockopt$packet_tx_ring(r2, 0x10f, 0x87, &(0x7f0000265000)=@req={0x3fc, 0x0, 0x1}, 0x10) writev(r2, &(0x7f000069c000)=[{&(0x7f0000dbd000)='T', 0x1}], 0x1) close(0xffffffffffffffff) 2018/04/13 21:33:05 executing program 2: r0 = syz_open_dev$tun(&(0x7f0000000000)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f00000000c0)={'ifb0\x00', 0x6d01}) ioctl$TUNSETGROUP(r0, 0x400454ce, 0x0) close(r0) 2018/04/13 21:33:05 executing program 7: bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000040)={0xffffffffffffffff, &(0x7f00000000c0)="b82283392dc50ff1fb635a5849d2f5916ae2fdc24e95e12aa8daccf7393e72be9cc66f"}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f0000346fd4)={0x0, 0x0, 0x0, 0x1000000000000004, 0x202}, 0x2c) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x1, 0x5, &(0x7f0000346fc8)=@framed={{0x18}, [@alu={0x8000000201a7f19, 0x0, 0x7, 0x0, 0x1}], {0x95}}, &(0x7f0000f6bffb)='GPL\x00', 0x0, 0x299, &(0x7f00001a7f05)=""/251}, 0x18) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000140)={r0, 0x50, &(0x7f00000000c0)}, 0x10) socketpair$inet_icmp(0x2, 0x40106f33, 0x400000, &(0x7f00000001c0)) 2018/04/13 21:33:05 executing program 3: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) kexec_load(0x0, 0x0, &(0x7f00000016c0), 0x0) 2018/04/13 21:33:05 executing program 5: syz_init_net_socket$bt_hci(0x1f, 0x2, 0x1) 2018/04/13 21:33:05 executing program 0: r0 = semget$private(0x0, 0x7, 0x0) semtimedop(r0, &(0x7f0000000040)=[{0x3, 0x4}, {0x3}], 0x2, &(0x7f0000000080)={0x77359400}) semtimedop(r0, &(0x7f00000a8000)=[{0x3, 0xfffffffffffffff9}], 0x1, &(0x7f0000efe000)={0x2000}) semctl$SETALL(r0, 0x0, 0x11, &(0x7f0000003000)=[0x0, 0x0, 0x0, 0x7fff]) 2018/04/13 21:33:05 executing program 6: r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000ff4)='/dev/ashmem\x00', 0x0, 0x0) ioctl$ASHMEM_SET_SIZE(r0, 0x40087703, 0x400) mmap(&(0x7f0000447000/0x4000)=nil, 0x4000, 0x0, 0x13, r0, 0x0) ioctl$ASHMEM_GET_PIN_STATUS(r0, 0x40087703, 0x910000) 2018/04/13 21:33:05 executing program 1: r0 = socket$inet_dccp(0x2, 0x6, 0x0) setsockopt(r0, 0x2000000000010d, 0x4000800000000b, &(0x7f0000000000)='\x00\x00\x00n', 0x4) 2018/04/13 21:33:05 executing program 5: syz_init_net_socket$bt_hci(0x1f, 0x2, 0x1) 2018/04/13 21:33:05 executing program 1: r0 = socket$inet_dccp(0x2, 0x6, 0x0) setsockopt(r0, 0x2000000000010d, 0x4000800000000b, &(0x7f0000000000)='\x00\x00\x00n', 0x4) 2018/04/13 21:33:05 executing program 6: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000080)='IPVS\x00') sendmsg$IPVS_CMD_DEL_DAEMON(r0, &(0x7f0000000140)={&(0x7f0000000000)={0x10}, 0xc, &(0x7f0000000180)={&(0x7f00000011c0)={0x18, r1, 0x1, 0x0, 0x0, {0xa}, [@IPVS_CMD_ATTR_DAEMON={0x4, 0x3}]}, 0x18}, 0x1}, 0x0) 2018/04/13 21:33:05 executing program 7: bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000040)={0xffffffffffffffff, &(0x7f00000000c0)="b82283392dc50ff1fb635a5849d2f5916ae2fdc24e95e12aa8daccf7393e72be9cc66f"}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f0000346fd4)={0x0, 0x0, 0x0, 0x1000000000000004, 0x202}, 0x2c) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x1, 0x5, &(0x7f0000346fc8)=@framed={{0x18}, [@alu={0x8000000201a7f19, 0x0, 0x7, 0x0, 0x1}], {0x95}}, &(0x7f0000f6bffb)='GPL\x00', 0x0, 0x299, &(0x7f00001a7f05)=""/251}, 0x18) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000140)={r0, 0x50, &(0x7f00000000c0)}, 0x10) socketpair$inet_icmp(0x2, 0x40106f33, 0x400000, &(0x7f00000001c0)) 2018/04/13 21:33:05 executing program 3: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) kexec_load(0x0, 0x0, &(0x7f00000016c0), 0x0) 2018/04/13 21:33:05 executing program 2: r0 = socket(0x11, 0x4000000000080002, 0x0) sendmmsg(r0, &(0x7f0000000100)=[{{&(0x7f0000000040)=@l2={0x1f, 0x5865}, 0x80, &(0x7f0000000300), 0x0, &(0x7f0000000340)}}, {{&(0x7f0000000040)=@nfc={0x27, 0x9}, 0x80, &(0x7f00000000c0)=[{&(0x7f0000000180)="314b9a1ea0a6169d6e1fce90d5ac", 0xe}], 0x1, &(0x7f0000002a00)}}], 0x2, 0x0) 2018/04/13 21:33:05 executing program 5: syz_init_net_socket$bt_hci(0x1f, 0x2, 0x1) 2018/04/13 21:33:05 executing program 1: r0 = socket$inet_dccp(0x2, 0x6, 0x0) setsockopt(r0, 0x2000000000010d, 0x4000800000000b, &(0x7f0000000000)='\x00\x00\x00n', 0x4) 2018/04/13 21:33:06 executing program 4: r0 = socket(0x1e, 0x4, 0x0) setsockopt$packet_tx_ring(r0, 0x10f, 0x87, &(0x7f0000265000)=@req={0x3fc, 0x0, 0x1}, 0x10) getsockopt$inet_mreqn(r0, 0x0, 0x0, &(0x7f00000001c0)={@broadcast, @broadcast, 0x0}, &(0x7f0000000200)=0xc) bind$packet(r0, &(0x7f0000000240)={0x11, 0x0, r1, 0x1, 0xde, 0x6, @remote={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xbb}}, 0x14) read(r0, &(0x7f0000000000)=""/7, 0x7) r2 = socket(0x1e, 0x4, 0x0) setsockopt$packet_tx_ring(r2, 0x10f, 0x87, &(0x7f0000265000)=@req={0x3fc, 0x0, 0x1}, 0x10) writev(r2, &(0x7f000069c000)=[{&(0x7f0000dbd000)='T', 0x1}], 0x1) close(0xffffffffffffffff) 2018/04/13 21:33:06 executing program 6: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000080)='IPVS\x00') sendmsg$IPVS_CMD_DEL_DAEMON(r0, &(0x7f0000000140)={&(0x7f0000000000)={0x10}, 0xc, &(0x7f0000000180)={&(0x7f00000011c0)={0x18, r1, 0x1, 0x0, 0x0, {0xa}, [@IPVS_CMD_ATTR_DAEMON={0x4, 0x3}]}, 0x18}, 0x1}, 0x0) 2018/04/13 21:33:06 executing program 7: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = request_key(&(0x7f0000000040)='trusted\x00', &(0x7f00000000c0)={0x73, 0x79, 0x7a}, &(0x7f0000000100)='/dev/snd/seq\x00', 0xfffffffffffffffe) keyctl$link(0x8, r0, 0x0) syz_open_dev$sndseq(&(0x7f00000001c0)='/dev/snd/seq\x00', 0x0, 0x0) socket$inet_icmp_raw(0x2, 0x3, 0x1) 2018/04/13 21:33:06 executing program 3: r0 = syz_open_dev$sndpcmc(&(0x7f0000001fee)='/dev/snd/pcmC#D#c\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0xf000)=nil, 0xf000, 0x0, 0x32, 0xffffffffffffffff, 0x0) ioctl(r0, 0xc0884123, &(0x7f0000000000)) 2018/04/13 21:33:06 executing program 1: r0 = socket$inet_dccp(0x2, 0x6, 0x0) setsockopt(r0, 0x2000000000010d, 0x4000800000000b, &(0x7f0000000000)='\x00\x00\x00n', 0x4) 2018/04/13 21:33:06 executing program 5: syz_init_net_socket$bt_hci(0x1f, 0x2, 0x1) 2018/04/13 21:33:06 executing program 2: r0 = socket(0x11, 0x4000000000080002, 0x0) sendmmsg(r0, &(0x7f0000000100)=[{{&(0x7f0000000040)=@l2={0x1f, 0x5865}, 0x80, &(0x7f0000000300), 0x0, &(0x7f0000000340)}}, {{&(0x7f0000000040)=@nfc={0x27, 0x9}, 0x80, &(0x7f00000000c0)=[{&(0x7f0000000180)="314b9a1ea0a6169d6e1fce90d5ac", 0xe}], 0x1, &(0x7f0000002a00)}}], 0x2, 0x0) 2018/04/13 21:33:06 executing program 0: r0 = semget$private(0x0, 0x7, 0x0) semtimedop(r0, &(0x7f0000000040)=[{0x3, 0x4}, {0x3}], 0x2, &(0x7f0000000080)={0x77359400}) semtimedop(r0, &(0x7f00000a8000)=[{0x3, 0xfffffffffffffff9}], 0x1, &(0x7f0000efe000)={0x2000}) semctl$SETALL(r0, 0x0, 0x11, &(0x7f0000003000)=[0x0, 0x0, 0x0, 0x7fff]) 2018/04/13 21:33:06 executing program 5: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x3) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) connect$bt_l2cap(r0, &(0x7f0000000040)={0x1f, 0x0, {0x0, 0x0, 0x0, 0xfffffffffffffff8, 0x8}}, 0xe) 2018/04/13 21:33:06 executing program 2: r0 = socket(0x11, 0x4000000000080002, 0x0) sendmmsg(r0, &(0x7f0000000100)=[{{&(0x7f0000000040)=@l2={0x1f, 0x5865}, 0x80, &(0x7f0000000300), 0x0, &(0x7f0000000340)}}, {{&(0x7f0000000040)=@nfc={0x27, 0x9}, 0x80, &(0x7f00000000c0)=[{&(0x7f0000000180)="314b9a1ea0a6169d6e1fce90d5ac", 0xe}], 0x1, &(0x7f0000002a00)}}], 0x2, 0x0) 2018/04/13 21:33:06 executing program 6: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000080)='IPVS\x00') sendmsg$IPVS_CMD_DEL_DAEMON(r0, &(0x7f0000000140)={&(0x7f0000000000)={0x10}, 0xc, &(0x7f0000000180)={&(0x7f00000011c0)={0x18, r1, 0x1, 0x0, 0x0, {0xa}, [@IPVS_CMD_ATTR_DAEMON={0x4, 0x3}]}, 0x18}, 0x1}, 0x0) 2018/04/13 21:33:06 executing program 7: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = request_key(&(0x7f0000000040)='trusted\x00', &(0x7f00000000c0)={0x73, 0x79, 0x7a}, &(0x7f0000000100)='/dev/snd/seq\x00', 0xfffffffffffffffe) keyctl$link(0x8, r0, 0x0) syz_open_dev$sndseq(&(0x7f00000001c0)='/dev/snd/seq\x00', 0x0, 0x0) socket$inet_icmp_raw(0x2, 0x3, 0x1) 2018/04/13 21:33:06 executing program 1: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = request_key(&(0x7f0000000040)='trusted\x00', &(0x7f00000000c0)={0x73, 0x79, 0x7a}, &(0x7f0000000100)='/dev/snd/seq\x00', 0xfffffffffffffffe) keyctl$link(0x8, r0, 0x0) syz_open_dev$sndseq(&(0x7f00000001c0)='/dev/snd/seq\x00', 0x0, 0x0) socket$inet_icmp_raw(0x2, 0x3, 0x1) 2018/04/13 21:33:06 executing program 3: r0 = syz_open_dev$sndpcmc(&(0x7f0000001fee)='/dev/snd/pcmC#D#c\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0xf000)=nil, 0xf000, 0x0, 0x32, 0xffffffffffffffff, 0x0) ioctl(r0, 0xc0884123, &(0x7f0000000000)) 2018/04/13 21:33:06 executing program 2: r0 = socket(0x11, 0x4000000000080002, 0x0) sendmmsg(r0, &(0x7f0000000100)=[{{&(0x7f0000000040)=@l2={0x1f, 0x5865}, 0x80, &(0x7f0000000300), 0x0, &(0x7f0000000340)}}, {{&(0x7f0000000040)=@nfc={0x27, 0x9}, 0x80, &(0x7f00000000c0)=[{&(0x7f0000000180)="314b9a1ea0a6169d6e1fce90d5ac", 0xe}], 0x1, &(0x7f0000002a00)}}], 0x2, 0x0) 2018/04/13 21:33:06 executing program 6: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000080)='IPVS\x00') sendmsg$IPVS_CMD_DEL_DAEMON(r0, &(0x7f0000000140)={&(0x7f0000000000)={0x10}, 0xc, &(0x7f0000000180)={&(0x7f00000011c0)={0x18, r1, 0x1, 0x0, 0x0, {0xa}, [@IPVS_CMD_ATTR_DAEMON={0x4, 0x3}]}, 0x18}, 0x1}, 0x0) 2018/04/13 21:33:07 executing program 4: r0 = socket(0x1e, 0x4, 0x0) setsockopt$packet_tx_ring(r0, 0x10f, 0x87, &(0x7f0000265000)=@req={0x3fc, 0x0, 0x1}, 0x10) getsockopt$inet_mreqn(r0, 0x0, 0x0, &(0x7f00000001c0)={@broadcast, @broadcast, 0x0}, &(0x7f0000000200)=0xc) bind$packet(r0, &(0x7f0000000240)={0x11, 0x0, r1, 0x1, 0xde, 0x6, @remote={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xbb}}, 0x14) read(r0, &(0x7f0000000000)=""/7, 0x7) r2 = socket(0x1e, 0x4, 0x0) setsockopt$packet_tx_ring(r2, 0x10f, 0x87, &(0x7f0000265000)=@req={0x3fc, 0x0, 0x1}, 0x10) writev(r2, &(0x7f000069c000)=[{&(0x7f0000dbd000)='T', 0x1}], 0x1) close(0xffffffffffffffff) 2018/04/13 21:33:07 executing program 5: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x3) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) connect$bt_l2cap(r0, &(0x7f0000000040)={0x1f, 0x0, {0x0, 0x0, 0x0, 0xfffffffffffffff8, 0x8}}, 0xe) 2018/04/13 21:33:07 executing program 3: r0 = syz_open_dev$sndpcmc(&(0x7f0000001fee)='/dev/snd/pcmC#D#c\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0xf000)=nil, 0xf000, 0x0, 0x32, 0xffffffffffffffff, 0x0) ioctl(r0, 0xc0884123, &(0x7f0000000000)) 2018/04/13 21:33:07 executing program 2: syz_mount_image$msdos(&(0x7f0000000000)='msdos\x00', &(0x7f0000000100)='./file0\x00', 0xe800, 0x1, &(0x7f00000000c0)=[{&(0x7f0000010000)="eb3c906d6b66732e66617400100401000200027400f8", 0x16}], 0x0, &(0x7f0000000040)=ANY=[]) open$dir(&(0x7f0000000340)='./file0/f.le.\x00', 0x40, 0x0) r0 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) getdents64(r0, &(0x7f0000000640)=""/70, 0x46) 2018/04/13 21:33:07 executing program 1: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = request_key(&(0x7f0000000040)='trusted\x00', &(0x7f00000000c0)={0x73, 0x79, 0x7a}, &(0x7f0000000100)='/dev/snd/seq\x00', 0xfffffffffffffffe) keyctl$link(0x8, r0, 0x0) syz_open_dev$sndseq(&(0x7f00000001c0)='/dev/snd/seq\x00', 0x0, 0x0) socket$inet_icmp_raw(0x2, 0x3, 0x1) 2018/04/13 21:33:07 executing program 7: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = request_key(&(0x7f0000000040)='trusted\x00', &(0x7f00000000c0)={0x73, 0x79, 0x7a}, &(0x7f0000000100)='/dev/snd/seq\x00', 0xfffffffffffffffe) keyctl$link(0x8, r0, 0x0) syz_open_dev$sndseq(&(0x7f00000001c0)='/dev/snd/seq\x00', 0x0, 0x0) socket$inet_icmp_raw(0x2, 0x3, 0x1) 2018/04/13 21:33:07 executing program 6: mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$sock_inet6_SIOCDIFADDR(r0, 0x8936, &(0x7f00000000c0)={@dev={0xfe, 0x80}}) 2018/04/13 21:33:07 executing program 0: recvmmsg(0xffffffffffffffff, &(0x7f0000976da8)=[{{&(0x7f00005e9000)=@ethernet={0x0, @remote}, 0x80, &(0x7f0000007000)=[{&(0x7f000096af42)=""/190, 0xbe}, {&(0x7f0000000100)=""/32, 0x20}, {&(0x7f0000eb6fc3)=""/61, 0xfffffffffffffee7}], 0x3, &(0x7f0000940f43)=""/189, 0xbd}}], 0x1, 0x0, &(0x7f0000b9dff0)={0x0, 0x1c9c380}) r0 = syz_open_dev$sg(&(0x7f0000afa000)='/dev/sg#\x00', 0x0, 0x0) ioctl$EVIOCSABS0(0xffffffffffffffff, 0x401845c0, &(0x7f0000007000)) ioctl(r0, 0x2285, &(0x7f0000007000)='S') 2018/04/13 21:33:07 executing program 0: recvmmsg(0xffffffffffffffff, &(0x7f0000976da8)=[{{&(0x7f00005e9000)=@ethernet={0x0, @remote}, 0x80, &(0x7f0000007000)=[{&(0x7f000096af42)=""/190, 0xbe}, {&(0x7f0000000100)=""/32, 0x20}, {&(0x7f0000eb6fc3)=""/61, 0xfffffffffffffee7}], 0x3, &(0x7f0000940f43)=""/189, 0xbd}}], 0x1, 0x0, &(0x7f0000b9dff0)={0x0, 0x1c9c380}) r0 = syz_open_dev$sg(&(0x7f0000afa000)='/dev/sg#\x00', 0x0, 0x0) ioctl$EVIOCSABS0(0xffffffffffffffff, 0x401845c0, &(0x7f0000007000)) ioctl(r0, 0x2285, &(0x7f0000007000)='S') 2018/04/13 21:33:07 executing program 5: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x3) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) connect$bt_l2cap(r0, &(0x7f0000000040)={0x1f, 0x0, {0x0, 0x0, 0x0, 0xfffffffffffffff8, 0x8}}, 0xe) 2018/04/13 21:33:07 executing program 6: mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$sock_inet6_SIOCDIFADDR(r0, 0x8936, &(0x7f00000000c0)={@dev={0xfe, 0x80}}) 2018/04/13 21:33:07 executing program 2: r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r0, &(0x7f00000001c0)={0xa, 0x0, 0x0, @ipv4={[], [0xff, 0xff]}}, 0xa) 2018/04/13 21:33:07 executing program 7: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = request_key(&(0x7f0000000040)='trusted\x00', &(0x7f00000000c0)={0x73, 0x79, 0x7a}, &(0x7f0000000100)='/dev/snd/seq\x00', 0xfffffffffffffffe) keyctl$link(0x8, r0, 0x0) syz_open_dev$sndseq(&(0x7f00000001c0)='/dev/snd/seq\x00', 0x0, 0x0) socket$inet_icmp_raw(0x2, 0x3, 0x1) 2018/04/13 21:33:07 executing program 1: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = request_key(&(0x7f0000000040)='trusted\x00', &(0x7f00000000c0)={0x73, 0x79, 0x7a}, &(0x7f0000000100)='/dev/snd/seq\x00', 0xfffffffffffffffe) keyctl$link(0x8, r0, 0x0) syz_open_dev$sndseq(&(0x7f00000001c0)='/dev/snd/seq\x00', 0x0, 0x0) socket$inet_icmp_raw(0x2, 0x3, 0x1) 2018/04/13 21:33:07 executing program 3: r0 = syz_open_dev$sndpcmc(&(0x7f0000001fee)='/dev/snd/pcmC#D#c\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0xf000)=nil, 0xf000, 0x0, 0x32, 0xffffffffffffffff, 0x0) ioctl(r0, 0xc0884123, &(0x7f0000000000)) 2018/04/13 21:33:07 executing program 6: mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$sock_inet6_SIOCDIFADDR(r0, 0x8936, &(0x7f00000000c0)={@dev={0xfe, 0x80}}) 2018/04/13 21:33:08 executing program 1: r0 = socket$inet6(0xa, 0x1, 0x8010000400000084) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e20}, 0x1c) sendto$inet6(r0, &(0x7f00009f1000)='G', 0x1, 0x0, &(0x7f0000108fe4)={0xa, 0x4e20, 0x0, @loopback={0x0, 0x1}}, 0x1c) close(r0) 2018/04/13 21:33:08 executing program 0: recvmmsg(0xffffffffffffffff, &(0x7f0000976da8)=[{{&(0x7f00005e9000)=@ethernet={0x0, @remote}, 0x80, &(0x7f0000007000)=[{&(0x7f000096af42)=""/190, 0xbe}, {&(0x7f0000000100)=""/32, 0x20}, {&(0x7f0000eb6fc3)=""/61, 0xfffffffffffffee7}], 0x3, &(0x7f0000940f43)=""/189, 0xbd}}], 0x1, 0x0, &(0x7f0000b9dff0)={0x0, 0x1c9c380}) r0 = syz_open_dev$sg(&(0x7f0000afa000)='/dev/sg#\x00', 0x0, 0x0) ioctl$EVIOCSABS0(0xffffffffffffffff, 0x401845c0, &(0x7f0000007000)) ioctl(r0, 0x2285, &(0x7f0000007000)='S') 2018/04/13 21:33:08 executing program 2: r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r0, &(0x7f00000001c0)={0xa, 0x0, 0x0, @ipv4={[], [0xff, 0xff]}}, 0xa) 2018/04/13 21:33:08 executing program 3: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_FIOGETOWN(r0, 0x8903, &(0x7f0000000040)) 2018/04/13 21:33:08 executing program 6: mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$sock_inet6_SIOCDIFADDR(r0, 0x8936, &(0x7f00000000c0)={@dev={0xfe, 0x80}}) 2018/04/13 21:33:08 executing program 5: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x3) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) connect$bt_l2cap(r0, &(0x7f0000000040)={0x1f, 0x0, {0x0, 0x0, 0x0, 0xfffffffffffffff8, 0x8}}, 0xe) 2018/04/13 21:33:08 executing program 7: r0 = socket(0x1000000000010, 0x802, 0x0) write(r0, &(0x7f0000000180)="240000001a0025f0806bd104feff001c020b49ff6e10b500000700eb0800090001000000", 0x24) 2018/04/13 21:33:08 executing program 4: bpf$MAP_CREATE(0x0, &(0x7f0000346fd4)={0x0, 0x0, 0x0, 0x1085, 0xfffffffffffffffc}, 0x495) bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0x1, 0x5, &(0x7f0000346fc8)=@framed={{0x18}, [@alu={0x8000000201a7f19, 0x0, 0x7}], {0x95}}, &(0x7f0000000000)='syzkaller\x00', 0xffffffffffffffff, 0xfb, &(0x7f00001a7f05)=""/251}, 0x48) 2018/04/13 21:33:08 executing program 6: r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000340)='/dev/ashmem\x00', 0x0, 0x0) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) seccomp(0x0, 0x0, &(0x7f0000000200)={0x2, &(0x7f00000001c0)=[{}, {}]}) ioctl$ASHMEM_SET_NAME(r0, 0x41007701, &(0x7f0000000180)='/dev/ashmem\x00') ioctl$ASHMEM_GET_NAME(r0, 0x81007702, &(0x7f0000000040)=""/189) 2018/04/13 21:33:08 executing program 4: bpf$MAP_CREATE(0x0, &(0x7f0000346fd4)={0x0, 0x0, 0x0, 0x1085, 0xfffffffffffffffc}, 0x495) bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0x1, 0x5, &(0x7f0000346fc8)=@framed={{0x18}, [@alu={0x8000000201a7f19, 0x0, 0x7}], {0x95}}, &(0x7f0000000000)='syzkaller\x00', 0xffffffffffffffff, 0xfb, &(0x7f00001a7f05)=""/251}, 0x48) 2018/04/13 21:33:08 executing program 3: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_FIOGETOWN(r0, 0x8903, &(0x7f0000000040)) 2018/04/13 21:33:08 executing program 0: recvmmsg(0xffffffffffffffff, &(0x7f0000976da8)=[{{&(0x7f00005e9000)=@ethernet={0x0, @remote}, 0x80, &(0x7f0000007000)=[{&(0x7f000096af42)=""/190, 0xbe}, {&(0x7f0000000100)=""/32, 0x20}, {&(0x7f0000eb6fc3)=""/61, 0xfffffffffffffee7}], 0x3, &(0x7f0000940f43)=""/189, 0xbd}}], 0x1, 0x0, &(0x7f0000b9dff0)={0x0, 0x1c9c380}) r0 = syz_open_dev$sg(&(0x7f0000afa000)='/dev/sg#\x00', 0x0, 0x0) ioctl$EVIOCSABS0(0xffffffffffffffff, 0x401845c0, &(0x7f0000007000)) ioctl(r0, 0x2285, &(0x7f0000007000)='S') 2018/04/13 21:33:08 executing program 2: r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r0, &(0x7f00000001c0)={0xa, 0x0, 0x0, @ipv4={[], [0xff, 0xff]}}, 0xa) 2018/04/13 21:33:08 executing program 5: kexec_load(0x0, 0x0, &(0x7f00000005c0), 0x1) 2018/04/13 21:33:08 executing program 7: r0 = socket(0x1000000000010, 0x802, 0x0) write(r0, &(0x7f0000000180)="240000001a0025f0806bd104feff001c020b49ff6e10b500000700eb0800090001000000", 0x24) 2018/04/13 21:33:08 executing program 5: kexec_load(0x0, 0x0, &(0x7f00000005c0), 0x1) 2018/04/13 21:33:09 executing program 1: sched_setattr(0x0, &(0x7f0000000000)={0x0, 0x6, 0x0, 0x0, 0x0, 0x9917, 0xffff}, 0x0) sync() 2018/04/13 21:33:09 executing program 4: bpf$MAP_CREATE(0x0, &(0x7f0000346fd4)={0x0, 0x0, 0x0, 0x1085, 0xfffffffffffffffc}, 0x495) bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0x1, 0x5, &(0x7f0000346fc8)=@framed={{0x18}, [@alu={0x8000000201a7f19, 0x0, 0x7}], {0x95}}, &(0x7f0000000000)='syzkaller\x00', 0xffffffffffffffff, 0xfb, &(0x7f00001a7f05)=""/251}, 0x48) 2018/04/13 21:33:09 executing program 0: r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0x40082404, 0xffffffffffffffff) 2018/04/13 21:33:09 executing program 7: r0 = socket(0x1000000000010, 0x802, 0x0) write(r0, &(0x7f0000000180)="240000001a0025f0806bd104feff001c020b49ff6e10b500000700eb0800090001000000", 0x24) 2018/04/13 21:33:09 executing program 5: kexec_load(0x0, 0x0, &(0x7f00000005c0), 0x1) 2018/04/13 21:33:09 executing program 6: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000018000)={&(0x7f0000a4c000)={0x10}, 0xc, &(0x7f000000e000)={&(0x7f00002a0e50)={0x14, 0x29, 0xffffffffffffffff, 0x0, 0x0, {0x1}}, 0x14}, 0x1}, 0x0) semget$private(0x0, 0x0, 0x0) 2018/04/13 21:33:09 executing program 2: r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r0, &(0x7f00000001c0)={0xa, 0x0, 0x0, @ipv4={[], [0xff, 0xff]}}, 0xa) 2018/04/13 21:33:09 executing program 3: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_FIOGETOWN(r0, 0x8903, &(0x7f0000000040)) 2018/04/13 21:33:09 executing program 5: kexec_load(0x0, 0x0, &(0x7f00000005c0), 0x1) 2018/04/13 21:33:09 executing program 1: sched_setattr(0x0, &(0x7f0000000000)={0x0, 0x6, 0x0, 0x0, 0x0, 0x9917, 0xffff}, 0x0) sync() 2018/04/13 21:33:09 executing program 2: r0 = openat$sequencer2(0xffffffffffffff9c, &(0x7f00006f3ff0)='/dev/sequencer2\x00', 0x0, 0x0) ioctl$KDGKBLED(r0, 0x80045105, &(0x7f0000000000)) 2018/04/13 21:33:09 executing program 6: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) prlimit64(0x0, 0x0, &(0x7f0000000000)={0x79}, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000780)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x40000002}, 0xb, &(0x7f0000000740)={&(0x7f0000000680)=ANY=[]}, 0x1}, 0x0) ioctl$KVM_GET_MSRS(r2, 0xc008ae88, &(0x7f0000000000)) 2018/04/13 21:33:09 executing program 7: r0 = socket(0x1000000000010, 0x802, 0x0) write(r0, &(0x7f0000000180)="240000001a0025f0806bd104feff001c020b49ff6e10b500000700eb0800090001000000", 0x24) 2018/04/13 21:33:09 executing program 4: bpf$MAP_CREATE(0x0, &(0x7f0000346fd4)={0x0, 0x0, 0x0, 0x1085, 0xfffffffffffffffc}, 0x495) bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0x1, 0x5, &(0x7f0000346fc8)=@framed={{0x18}, [@alu={0x8000000201a7f19, 0x0, 0x7}], {0x95}}, &(0x7f0000000000)='syzkaller\x00', 0xffffffffffffffff, 0xfb, &(0x7f00001a7f05)=""/251}, 0x48) 2018/04/13 21:33:09 executing program 0: r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0x40082404, 0xffffffffffffffff) 2018/04/13 21:33:09 executing program 3: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_FIOGETOWN(r0, 0x8903, &(0x7f0000000040)) 2018/04/13 21:33:09 executing program 5: perf_event_open(&(0x7f000001d000)={0x2, 0x78, 0xe2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_SET_IDENTITY_MAP_ADDR(r1, 0x4008ae48, &(0x7f0000000140)) 2018/04/13 21:33:09 executing program 7: r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$vsock_dgram(0x28, 0x2, 0x0) syz_open_dev$admmidi(&(0x7f00000001c0)='/dev/admmidi#\x00', 0x0, 0x0) ioctl$sock_SIOCADDDLCI(r1, 0x8980, &(0x7f0000000080)={'ip6gretap0\x00'}) syz_open_dev$sndmidi(&(0x7f00000000c0)='/dev/snd/midiC#D#\x00', 0x100000000, 0x2) getsockname$netlink(r0, &(0x7f0000000380), &(0x7f0000000340)=0x3b1) fchdir(0xffffffffffffffff) 2018/04/13 21:33:09 executing program 1: sched_setattr(0x0, &(0x7f0000000000)={0x0, 0x6, 0x0, 0x0, 0x0, 0x9917, 0xffff}, 0x0) sync() [ 270.134311] sched: DL replenish lagged too much 2018/04/13 21:33:09 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000001c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(cipher_null)\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f0000f75fc8)={0x0, 0x0, &(0x7f0000805000), 0x0, &(0x7f00002e7000)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) io_setup(0x1, &(0x7f0000f7e000)=0x0) io_submit(r2, 0x1, &(0x7f0000738000)=[&(0x7f0000f73fc0)={0x0, 0x0, 0x0, 0x0, 0x0, r1, &(0x7f000079a000)="16", 0x1}]) 2018/04/13 21:33:09 executing program 2: r0 = openat$sequencer2(0xffffffffffffff9c, &(0x7f00006f3ff0)='/dev/sequencer2\x00', 0x0, 0x0) ioctl$KDGKBLED(r0, 0x80045105, &(0x7f0000000000)) 2018/04/13 21:33:09 executing program 0: r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0x40082404, 0xffffffffffffffff) 2018/04/13 21:33:09 executing program 1: sched_setattr(0x0, &(0x7f0000000000)={0x0, 0x6, 0x0, 0x0, 0x0, 0x9917, 0xffff}, 0x0) sync() 2018/04/13 21:33:09 executing program 3: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x5, 0x0) bind$bt_l2cap(r0, &(0x7f00000000c0)={0x1f, 0x3, {0x1}}, 0xe) 2018/04/13 21:33:09 executing program 6: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) prlimit64(0x0, 0x0, &(0x7f0000000000)={0x79}, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000780)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x40000002}, 0xb, &(0x7f0000000740)={&(0x7f0000000680)=ANY=[]}, 0x1}, 0x0) ioctl$KVM_GET_MSRS(r2, 0xc008ae88, &(0x7f0000000000)) 2018/04/13 21:33:09 executing program 5: perf_event_open(&(0x7f000001d000)={0x2, 0x78, 0xe2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_SET_IDENTITY_MAP_ADDR(r1, 0x4008ae48, &(0x7f0000000140)) 2018/04/13 21:33:09 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000001c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(cipher_null)\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f0000f75fc8)={0x0, 0x0, &(0x7f0000805000), 0x0, &(0x7f00002e7000)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) io_setup(0x1, &(0x7f0000f7e000)=0x0) io_submit(r2, 0x1, &(0x7f0000738000)=[&(0x7f0000f73fc0)={0x0, 0x0, 0x0, 0x0, 0x0, r1, &(0x7f000079a000)="16", 0x1}]) 2018/04/13 21:33:09 executing program 0: r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0x40082404, 0xffffffffffffffff) 2018/04/13 21:33:09 executing program 1: perf_event_open(&(0x7f00000017c0)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_init_net_socket$llc(0x1a, 0x2, 0x0) getsockopt$llc_int(r0, 0x10c, 0x7, &(0x7f0000000140), &(0x7f0000000100)=0x4) 2018/04/13 21:33:09 executing program 7: r0 = socket$inet_sctp(0x2, 0x800000000001, 0x84) connect$inet(r0, &(0x7f0000f66ff0)={0x2, 0x4e23, @local={0xac, 0x14, 0xffffffffffffffff, 0xaa}}, 0x10) listen(r0, 0x4000000000000004) r1 = accept4(r0, &(0x7f00000d3ff0)=ANY=[], &(0x7f0000eab000), 0x0) listen$netrom(r1, 0x0) 2018/04/13 21:33:09 executing program 3: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x5, 0x0) bind$bt_l2cap(r0, &(0x7f00000000c0)={0x1f, 0x3, {0x1}}, 0xe) 2018/04/13 21:33:09 executing program 6: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) prlimit64(0x0, 0x0, &(0x7f0000000000)={0x79}, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000780)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x40000002}, 0xb, &(0x7f0000000740)={&(0x7f0000000680)=ANY=[]}, 0x1}, 0x0) ioctl$KVM_GET_MSRS(r2, 0xc008ae88, &(0x7f0000000000)) 2018/04/13 21:33:09 executing program 2: r0 = openat$sequencer2(0xffffffffffffff9c, &(0x7f00006f3ff0)='/dev/sequencer2\x00', 0x0, 0x0) ioctl$KDGKBLED(r0, 0x80045105, &(0x7f0000000000)) 2018/04/13 21:33:09 executing program 3: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x5, 0x0) bind$bt_l2cap(r0, &(0x7f00000000c0)={0x1f, 0x3, {0x1}}, 0xe) 2018/04/13 21:33:09 executing program 0: r0 = socket$inet_sctp(0x2, 0x1, 0x84) sendto$inet(r0, &(0x7f0000a34fff)='H', 0x1, 0x0, &(0x7f0000030ff0)={0x2, 0x0, @local={0xac, 0x14, 0xffffffffffffffff, 0xaa}}, 0x10) sendto$inet(r0, &(0x7f000026cfff)="c6", 0x1, 0x0, &(0x7f0000033ff0)={0x2, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff, 0xbb}}, 0x10) shutdown(r0, 0x1) setsockopt$inet_sctp_SCTP_RTOINFO(r0, 0x84, 0x0, &(0x7f0000000180)={0x0, 0x0, 0x0, 0xffff}, 0x10) 2018/04/13 21:33:09 executing program 1: perf_event_open(&(0x7f00000017c0)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_init_net_socket$llc(0x1a, 0x2, 0x0) getsockopt$llc_int(r0, 0x10c, 0x7, &(0x7f0000000140), &(0x7f0000000100)=0x4) 2018/04/13 21:33:11 executing program 2: r0 = openat$sequencer2(0xffffffffffffff9c, &(0x7f00006f3ff0)='/dev/sequencer2\x00', 0x0, 0x0) ioctl$KDGKBLED(r0, 0x80045105, &(0x7f0000000000)) 2018/04/13 21:33:11 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000001c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(cipher_null)\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f0000f75fc8)={0x0, 0x0, &(0x7f0000805000), 0x0, &(0x7f00002e7000)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) io_setup(0x1, &(0x7f0000f7e000)=0x0) io_submit(r2, 0x1, &(0x7f0000738000)=[&(0x7f0000f73fc0)={0x0, 0x0, 0x0, 0x0, 0x0, r1, &(0x7f000079a000)="16", 0x1}]) 2018/04/13 21:33:11 executing program 5: perf_event_open(&(0x7f000001d000)={0x2, 0x78, 0xe2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_SET_IDENTITY_MAP_ADDR(r1, 0x4008ae48, &(0x7f0000000140)) 2018/04/13 21:33:11 executing program 6: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) prlimit64(0x0, 0x0, &(0x7f0000000000)={0x79}, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000780)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x40000002}, 0xb, &(0x7f0000000740)={&(0x7f0000000680)=ANY=[]}, 0x1}, 0x0) ioctl$KVM_GET_MSRS(r2, 0xc008ae88, &(0x7f0000000000)) 2018/04/13 21:33:11 executing program 3: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x5, 0x0) bind$bt_l2cap(r0, &(0x7f00000000c0)={0x1f, 0x3, {0x1}}, 0xe) 2018/04/13 21:33:11 executing program 1: perf_event_open(&(0x7f00000017c0)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_init_net_socket$llc(0x1a, 0x2, 0x0) getsockopt$llc_int(r0, 0x10c, 0x7, &(0x7f0000000140), &(0x7f0000000100)=0x4) 2018/04/13 21:33:11 executing program 0: r0 = socket$inet_sctp(0x2, 0x1, 0x84) sendto$inet(r0, &(0x7f0000a34fff)='H', 0x1, 0x0, &(0x7f0000030ff0)={0x2, 0x0, @local={0xac, 0x14, 0xffffffffffffffff, 0xaa}}, 0x10) sendto$inet(r0, &(0x7f000026cfff)="c6", 0x1, 0x0, &(0x7f0000033ff0)={0x2, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff, 0xbb}}, 0x10) shutdown(r0, 0x1) setsockopt$inet_sctp_SCTP_RTOINFO(r0, 0x84, 0x0, &(0x7f0000000180)={0x0, 0x0, 0x0, 0xffff}, 0x10) 2018/04/13 21:33:11 executing program 7: r0 = socket$inet_sctp(0x2, 0x800000000001, 0x84) connect$inet(r0, &(0x7f0000f66ff0)={0x2, 0x4e23, @local={0xac, 0x14, 0xffffffffffffffff, 0xaa}}, 0x10) listen(r0, 0x4000000000000004) r1 = accept4(r0, &(0x7f00000d3ff0)=ANY=[], &(0x7f0000eab000), 0x0) listen$netrom(r1, 0x0) 2018/04/13 21:33:11 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000001c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(cipher_null)\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f0000f75fc8)={0x0, 0x0, &(0x7f0000805000), 0x0, &(0x7f00002e7000)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) io_setup(0x1, &(0x7f0000f7e000)=0x0) io_submit(r2, 0x1, &(0x7f0000738000)=[&(0x7f0000f73fc0)={0x0, 0x0, 0x0, 0x0, 0x0, r1, &(0x7f000079a000)="16", 0x1}]) 2018/04/13 21:33:11 executing program 2: mmap(&(0x7f0000000000/0xb3c000)=nil, 0xb3c000, 0x9, 0x32, 0xffffffffffffffff, 0x0) r0 = syz_fuseblk_mount(&(0x7f00000d4000)='./file0\x00', &(0x7f00006f0ff8)='./file0\x00', 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$FUSE_DEV_IOC_CLONE(r0, 0x8004e500, &(0x7f0000000000)) 2018/04/13 21:33:11 executing program 5: perf_event_open(&(0x7f000001d000)={0x2, 0x78, 0xe2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_SET_IDENTITY_MAP_ADDR(r1, 0x4008ae48, &(0x7f0000000140)) 2018/04/13 21:33:11 executing program 6: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000dfdfa8)={0x26, 'hash\x00', 0x0, 0x0, 'rmd128-generic\x00'}, 0x58) r1 = accept4$alg(r0, 0x0, 0x0, 0x0) sendto$inet6(r1, &(0x7f000056cf87)="b912239005d527c4cfac287122a3c59606fd2fbff8c1edb19391a2e9593ff9a4a2c99509edb380a0676e65c376eefe34c58d3f81ebe1e086", 0x38, 0x0, &(0x7f0000d5ffe4)={0xa, 0x0, 0x0, @loopback={0x0, 0x1}}, 0x1c) 2018/04/13 21:33:11 executing program 3: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000300)='./file0\x00', &(0x7f0000000380)='proc\x00', 0x0, &(0x7f00000005c0)) syz_fuseblk_mount(&(0x7f00000002c0)='./file0\x00', &(0x7f00000004c0)='./file0/file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) 2018/04/13 21:33:11 executing program 1: perf_event_open(&(0x7f00000017c0)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_init_net_socket$llc(0x1a, 0x2, 0x0) getsockopt$llc_int(r0, 0x10c, 0x7, &(0x7f0000000140), &(0x7f0000000100)=0x4) 2018/04/13 21:33:11 executing program 2: mmap(&(0x7f0000000000/0xb3c000)=nil, 0xb3c000, 0x9, 0x32, 0xffffffffffffffff, 0x0) r0 = syz_fuseblk_mount(&(0x7f00000d4000)='./file0\x00', &(0x7f00006f0ff8)='./file0\x00', 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$FUSE_DEV_IOC_CLONE(r0, 0x8004e500, &(0x7f0000000000)) 2018/04/13 21:33:11 executing program 4: mmap(&(0x7f0000000000/0xb3c000)=nil, 0xb3c000, 0x9, 0x32, 0xffffffffffffffff, 0x0) r0 = syz_fuseblk_mount(&(0x7f00000d4000)='./file0\x00', &(0x7f00006f0ff8)='./file0\x00', 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$FUSE_DEV_IOC_CLONE(r0, 0x8004e500, &(0x7f0000000000)) 2018/04/13 21:33:12 executing program 3: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000300)='./file0\x00', &(0x7f0000000380)='proc\x00', 0x0, &(0x7f00000005c0)) syz_fuseblk_mount(&(0x7f00000002c0)='./file0\x00', &(0x7f00000004c0)='./file0/file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) 2018/04/13 21:33:12 executing program 6: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000dfdfa8)={0x26, 'hash\x00', 0x0, 0x0, 'rmd128-generic\x00'}, 0x58) r1 = accept4$alg(r0, 0x0, 0x0, 0x0) sendto$inet6(r1, &(0x7f000056cf87)="b912239005d527c4cfac287122a3c59606fd2fbff8c1edb19391a2e9593ff9a4a2c99509edb380a0676e65c376eefe34c58d3f81ebe1e086", 0x38, 0x0, &(0x7f0000d5ffe4)={0xa, 0x0, 0x0, @loopback={0x0, 0x1}}, 0x1c) 2018/04/13 21:33:12 executing program 2: mmap(&(0x7f0000000000/0xb3c000)=nil, 0xb3c000, 0x9, 0x32, 0xffffffffffffffff, 0x0) r0 = syz_fuseblk_mount(&(0x7f00000d4000)='./file0\x00', &(0x7f00006f0ff8)='./file0\x00', 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$FUSE_DEV_IOC_CLONE(r0, 0x8004e500, &(0x7f0000000000)) 2018/04/13 21:33:12 executing program 1: r0 = gettid() r1 = getpid() sched_setattr(r1, &(0x7f0000000080)={0x0, 0x2, 0x0, 0x0, 0x3}, 0x0) timer_create(0x0, &(0x7f0000044000)={0x0, 0x12}, &(0x7f0000044000)) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) r3 = ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r3, 0xae60) r4 = ioctl$KVM_CREATE_VCPU(r3, 0xae41, 0x2) ioctl$KVM_RUN(r4, 0xae80, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r4, &(0x7f0000fe6000/0x18000)=nil, &(0x7f0000000040)=[@text64={0x40, &(0x7f00000000c0)="440f01c8f2430f58f20f20a40f01ca0f9e2d008000000f01cb48b805700000000000000f23d80f21f835800000900f23f8f3af64363e2e430f01cf66ba410066b8101966ef", 0x45}], 0x1, 0x0, &(0x7f0000000140), 0x0) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x8}, {0x0, 0x9}}, &(0x7f0000040000)) ioctl$KVM_TRANSLATE(r4, 0xc018ae85, &(0x7f0000000000)) tkill(r0, 0x15) 2018/04/13 21:33:12 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x10000000013, &(0x7f0000d06000)=0x1, 0x4) setsockopt$inet_tcp_int(r0, 0x6, 0x14, &(0x7f0000788ffc)=0x100000001, 0xfdf6) bind$inet(r0, &(0x7f0000738ff0)={0x2, 0x4e21, @multicast1=0xe0000001}, 0x10) sendto$inet(r0, &(0x7f0000000b40)="ac", 0x1, 0x20020003, &(0x7f0000000b00)={0x2, 0x4e21, @loopback=0x7f000001}, 0x10) setsockopt$inet_tcp_int(r0, 0x6, 0x14, &(0x7f0000f43ffc)=0xfffffffffffffffc, 0x4) sendto$inet(r0, &(0x7f0000000dc0)="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", 0x219, 0x0, 0x0, 0x0) sendto$inet(r0, &(0x7f0000000b80)="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", 0x217, 0x8041, &(0x7f0000000200)={0x2, 0x0, @broadcast=0xffffffff}, 0x10) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(r0, 0x6, 0x1d, &(0x7f0000000080)={0x0, 0x7fff, 0x80000001}, 0x14) setsockopt$inet_tcp_int(r0, 0x6, 0xa, &(0x7f0000000000)=0xfffffffffffff001, 0x4) sendto$inet(r0, &(0x7f00000000c0)="92f4", 0x2, 0x0, &(0x7f0000000040)={0x2, 0x0, @dev={0xac, 0x14}}, 0x10) 2018/04/13 21:33:12 executing program 4: mmap(&(0x7f0000000000/0xb3c000)=nil, 0xb3c000, 0x9, 0x32, 0xffffffffffffffff, 0x0) r0 = syz_fuseblk_mount(&(0x7f00000d4000)='./file0\x00', &(0x7f00006f0ff8)='./file0\x00', 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$FUSE_DEV_IOC_CLONE(r0, 0x8004e500, &(0x7f0000000000)) 2018/04/13 21:33:12 executing program 0: r0 = socket$inet_sctp(0x2, 0x1, 0x84) sendto$inet(r0, &(0x7f0000a34fff)='H', 0x1, 0x0, &(0x7f0000030ff0)={0x2, 0x0, @local={0xac, 0x14, 0xffffffffffffffff, 0xaa}}, 0x10) sendto$inet(r0, &(0x7f000026cfff)="c6", 0x1, 0x0, &(0x7f0000033ff0)={0x2, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff, 0xbb}}, 0x10) shutdown(r0, 0x1) setsockopt$inet_sctp_SCTP_RTOINFO(r0, 0x84, 0x0, &(0x7f0000000180)={0x0, 0x0, 0x0, 0xffff}, 0x10) 2018/04/13 21:33:12 executing program 7: r0 = socket$inet_sctp(0x2, 0x800000000001, 0x84) connect$inet(r0, &(0x7f0000f66ff0)={0x2, 0x4e23, @local={0xac, 0x14, 0xffffffffffffffff, 0xaa}}, 0x10) listen(r0, 0x4000000000000004) r1 = accept4(r0, &(0x7f00000d3ff0)=ANY=[], &(0x7f0000eab000), 0x0) listen$netrom(r1, 0x0) 2018/04/13 21:33:12 executing program 4: mmap(&(0x7f0000000000/0xb3c000)=nil, 0xb3c000, 0x9, 0x32, 0xffffffffffffffff, 0x0) r0 = syz_fuseblk_mount(&(0x7f00000d4000)='./file0\x00', &(0x7f00006f0ff8)='./file0\x00', 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$FUSE_DEV_IOC_CLONE(r0, 0x8004e500, &(0x7f0000000000)) 2018/04/13 21:33:12 executing program 3: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000300)='./file0\x00', &(0x7f0000000380)='proc\x00', 0x0, &(0x7f00000005c0)) syz_fuseblk_mount(&(0x7f00000002c0)='./file0\x00', &(0x7f00000004c0)='./file0/file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) 2018/04/13 21:33:12 executing program 6: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000dfdfa8)={0x26, 'hash\x00', 0x0, 0x0, 'rmd128-generic\x00'}, 0x58) r1 = accept4$alg(r0, 0x0, 0x0, 0x0) sendto$inet6(r1, &(0x7f000056cf87)="b912239005d527c4cfac287122a3c59606fd2fbff8c1edb19391a2e9593ff9a4a2c99509edb380a0676e65c376eefe34c58d3f81ebe1e086", 0x38, 0x0, &(0x7f0000d5ffe4)={0xa, 0x0, 0x0, @loopback={0x0, 0x1}}, 0x1c) 2018/04/13 21:33:12 executing program 2: mmap(&(0x7f0000000000/0xb3c000)=nil, 0xb3c000, 0x9, 0x32, 0xffffffffffffffff, 0x0) r0 = syz_fuseblk_mount(&(0x7f00000d4000)='./file0\x00', &(0x7f00006f0ff8)='./file0\x00', 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$FUSE_DEV_IOC_CLONE(r0, 0x8004e500, &(0x7f0000000000)) 2018/04/13 21:33:12 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x10000000013, &(0x7f0000d06000)=0x1, 0x4) setsockopt$inet_tcp_int(r0, 0x6, 0x14, &(0x7f0000788ffc)=0x100000001, 0xfdf6) bind$inet(r0, &(0x7f0000738ff0)={0x2, 0x4e21, @multicast1=0xe0000001}, 0x10) sendto$inet(r0, &(0x7f0000000b40)="ac", 0x1, 0x20020003, &(0x7f0000000b00)={0x2, 0x4e21, @loopback=0x7f000001}, 0x10) setsockopt$inet_tcp_int(r0, 0x6, 0x14, &(0x7f0000f43ffc)=0xfffffffffffffffc, 0x4) sendto$inet(r0, &(0x7f0000000dc0)="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", 0x219, 0x0, 0x0, 0x0) sendto$inet(r0, &(0x7f0000000b80)="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", 0x217, 0x8041, &(0x7f0000000200)={0x2, 0x0, @broadcast=0xffffffff}, 0x10) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(r0, 0x6, 0x1d, &(0x7f0000000080)={0x0, 0x7fff, 0x80000001}, 0x14) setsockopt$inet_tcp_int(r0, 0x6, 0xa, &(0x7f0000000000)=0xfffffffffffff001, 0x4) sendto$inet(r0, &(0x7f00000000c0)="92f4", 0x2, 0x0, &(0x7f0000000040)={0x2, 0x0, @dev={0xac, 0x14}}, 0x10) 2018/04/13 21:33:12 executing program 3: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000300)='./file0\x00', &(0x7f0000000380)='proc\x00', 0x0, &(0x7f00000005c0)) syz_fuseblk_mount(&(0x7f00000002c0)='./file0\x00', &(0x7f00000004c0)='./file0/file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) 2018/04/13 21:33:12 executing program 6: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000dfdfa8)={0x26, 'hash\x00', 0x0, 0x0, 'rmd128-generic\x00'}, 0x58) r1 = accept4$alg(r0, 0x0, 0x0, 0x0) sendto$inet6(r1, &(0x7f000056cf87)="b912239005d527c4cfac287122a3c59606fd2fbff8c1edb19391a2e9593ff9a4a2c99509edb380a0676e65c376eefe34c58d3f81ebe1e086", 0x38, 0x0, &(0x7f0000d5ffe4)={0xa, 0x0, 0x0, @loopback={0x0, 0x1}}, 0x1c) 2018/04/13 21:33:12 executing program 2: syz_read_part_table(0x0, 0x2, &(0x7f0000003e80)=[{&(0x7f0000003c80)="3ba340d848cbd5f8f097f83e26f2d3e354ee3fdf15481ca2ea40a9ee14a3d3a2ec6b0620f7b613175e011d1394740a12399ead065eeaf9d1a3c19290b75878cab4fe2c9d44446be874d6cf6ad236e3a862116c9bf0535f12d394cfcbdccc17a2b816f29e5137537151926de8567d7d80864f47835625ffdb933f4f0a16c6070bfd003112adfcf88d24d5e8db08b54f5d34b89d70ceec3ed5555a06acb192e7ec2666b40310374f17cc9189fc7fa3982ccc624c3d473f18a788141a72644f4827554f052260430ccb3d214333d41134611f30feac4c7da4d964439e5eb2fe30", 0xdf, 0x2}, {&(0x7f0000003f00)="0231aef54e2036a810f5ad52703d027b54101eaa436d900d466661264bf463b077d7206982eff6c009a17f688119abc0b27debb8461d7d1f88578f8d35e1b35dd7f0392f04e98774603fe4a016d8674851757a1140f68e1289eef3446c2c39750f320d03b02f2d70a01f8b0946ab3ada74e000836fa9bb6dc7053e3bca15093020f0e78a4b693da200888905bb8a2728f7ac9225227029ca808a7fb371454df3b9f55de3a851505349f73709193164ea3e", 0xb1, 0x7}]) 2018/04/13 21:33:12 executing program 4: init_module(&(0x7f0000000140)="70703085e3", 0xfffffffffffffcf9, &(0x7f0000000180)='selinux{\x00') 2018/04/13 21:33:12 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x10000000013, &(0x7f0000d06000)=0x1, 0x4) setsockopt$inet_tcp_int(r0, 0x6, 0x14, &(0x7f0000788ffc)=0x100000001, 0xfdf6) bind$inet(r0, &(0x7f0000738ff0)={0x2, 0x4e21, @multicast1=0xe0000001}, 0x10) sendto$inet(r0, &(0x7f0000000b40)="ac", 0x1, 0x20020003, &(0x7f0000000b00)={0x2, 0x4e21, @loopback=0x7f000001}, 0x10) setsockopt$inet_tcp_int(r0, 0x6, 0x14, &(0x7f0000f43ffc)=0xfffffffffffffffc, 0x4) sendto$inet(r0, &(0x7f0000000dc0)="9a06ac42afee253140fed88b03cdc9d30224a0e6fd2e83b04e6c11d4893edcb09ba740bab1e35217bb94c21d1aea3bb70b876b050a63e1ecdab6bac700feb887551849aad39aa63be6259f6204d10aaede72bacbda0bcf0b80e92d370d3f1b08c17a73e8f9bca9f1e1d23ad5d57d2acfe7139f14a96685a9c33592e8a650b8e42d8710faec9be060496a11c63071f8847efea22e2a6ad4919d944124bbe01e108e8f442c5da2d9ac12ca8f547b8fc9d1a44db3288cde39d9188da405e6f939e00b4734229568ae92010d251ab1ec30774b2344d06989acd94abf2076f86b54d1d622f810e6f3128f1a0b334ce5c18ea6cc668c3feb4c2e2c7b90ee6d1a9196164e7e33239d9cfcb53160a8a80058248754ce8a45fb281e8351fba27decc1ae191ad735a6e0544d7bf98740ba661380ef0983d3e59a2375056e960ecc72bedd2c1225902ffcefb975fe1dc79caf88331ce4844659241804ca9e910cd91281c4b488e64ea9fea6a481ef9ab43e39f6b3eddae2e0b7d6695a071ed9be3573ad917f83dad89e050d6a313df63640e28407b56da0bf299683dd20f8ded01611ebc78f7929aa6816e957cf9201117f2f15af0e9a4cb2913789dcdc646c51ac6130ec32cc4d8a5ad86799ea0840a5fca4e7a08b39096bd57fab468aac886cefc2f0526b97e0b1121a72b33638940181f23b717f38ccf53d5fb41a9ba3e135fae7c02d64aaa8f857aa1a1ebbc3330821c514e85e7f29c85fa471cca434", 0x219, 0x0, 0x0, 0x0) sendto$inet(r0, &(0x7f0000000b80)="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", 0x217, 0x8041, &(0x7f0000000200)={0x2, 0x0, @broadcast=0xffffffff}, 0x10) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(r0, 0x6, 0x1d, &(0x7f0000000080)={0x0, 0x7fff, 0x80000001}, 0x14) setsockopt$inet_tcp_int(r0, 0x6, 0xa, &(0x7f0000000000)=0xfffffffffffff001, 0x4) sendto$inet(r0, &(0x7f00000000c0)="92f4", 0x2, 0x0, &(0x7f0000000040)={0x2, 0x0, @dev={0xac, 0x14}}, 0x10) 2018/04/13 21:33:12 executing program 3: perf_event_open(&(0x7f0000348f88)={0x2, 0x70, 0x3e6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) msgctl$IPC_SET(0x0, 0x1, &(0x7f0000000500)={{}, 0x9b2}) 2018/04/13 21:33:12 executing program 6: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000200)={&(0x7f0000de2ff4)={0x10}, 0xc, &(0x7f00008b7ff0)={&(0x7f0000000180)={0x14, 0x1, 0x8, 0x800000005}, 0x14}, 0x1}, 0x0) 2018/04/13 21:33:12 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_MSRS(r2, 0x4008ae89, &(0x7f00000000c0)={0x1, 0x0, [{0x277, 0x0, 0x80000000}]}) 2018/04/13 21:33:12 executing program 4: init_module(&(0x7f0000000140)="70703085e3", 0xfffffffffffffcf9, &(0x7f0000000180)='selinux{\x00') 2018/04/13 21:33:12 executing program 7: r0 = socket$inet_sctp(0x2, 0x800000000001, 0x84) connect$inet(r0, &(0x7f0000f66ff0)={0x2, 0x4e23, @local={0xac, 0x14, 0xffffffffffffffff, 0xaa}}, 0x10) listen(r0, 0x4000000000000004) r1 = accept4(r0, &(0x7f00000d3ff0)=ANY=[], &(0x7f0000eab000), 0x0) listen$netrom(r1, 0x0) 2018/04/13 21:33:12 executing program 0: r0 = socket$inet_sctp(0x2, 0x1, 0x84) sendto$inet(r0, &(0x7f0000a34fff)='H', 0x1, 0x0, &(0x7f0000030ff0)={0x2, 0x0, @local={0xac, 0x14, 0xffffffffffffffff, 0xaa}}, 0x10) sendto$inet(r0, &(0x7f000026cfff)="c6", 0x1, 0x0, &(0x7f0000033ff0)={0x2, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff, 0xbb}}, 0x10) shutdown(r0, 0x1) setsockopt$inet_sctp_SCTP_RTOINFO(r0, 0x84, 0x0, &(0x7f0000000180)={0x0, 0x0, 0x0, 0xffff}, 0x10) 2018/04/13 21:33:12 executing program 1: r0 = gettid() r1 = getpid() sched_setattr(r1, &(0x7f0000000080)={0x0, 0x2, 0x0, 0x0, 0x3}, 0x0) timer_create(0x0, &(0x7f0000044000)={0x0, 0x12}, &(0x7f0000044000)) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) r3 = ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r3, 0xae60) r4 = ioctl$KVM_CREATE_VCPU(r3, 0xae41, 0x2) ioctl$KVM_RUN(r4, 0xae80, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r4, &(0x7f0000fe6000/0x18000)=nil, &(0x7f0000000040)=[@text64={0x40, &(0x7f00000000c0)="440f01c8f2430f58f20f20a40f01ca0f9e2d008000000f01cb48b805700000000000000f23d80f21f835800000900f23f8f3af64363e2e430f01cf66ba410066b8101966ef", 0x45}], 0x1, 0x0, &(0x7f0000000140), 0x0) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x8}, {0x0, 0x9}}, &(0x7f0000040000)) ioctl$KVM_TRANSLATE(r4, 0xc018ae85, &(0x7f0000000000)) tkill(r0, 0x15) 2018/04/13 21:33:13 executing program 4: init_module(&(0x7f0000000140)="70703085e3", 0xfffffffffffffcf9, &(0x7f0000000180)='selinux{\x00') 2018/04/13 21:33:13 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x10000000013, &(0x7f0000d06000)=0x1, 0x4) setsockopt$inet_tcp_int(r0, 0x6, 0x14, &(0x7f0000788ffc)=0x100000001, 0xfdf6) bind$inet(r0, &(0x7f0000738ff0)={0x2, 0x4e21, @multicast1=0xe0000001}, 0x10) sendto$inet(r0, &(0x7f0000000b40)="ac", 0x1, 0x20020003, &(0x7f0000000b00)={0x2, 0x4e21, @loopback=0x7f000001}, 0x10) setsockopt$inet_tcp_int(r0, 0x6, 0x14, &(0x7f0000f43ffc)=0xfffffffffffffffc, 0x4) sendto$inet(r0, &(0x7f0000000dc0)="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", 0x219, 0x0, 0x0, 0x0) sendto$inet(r0, &(0x7f0000000b80)="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", 0x217, 0x8041, &(0x7f0000000200)={0x2, 0x0, @broadcast=0xffffffff}, 0x10) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(r0, 0x6, 0x1d, &(0x7f0000000080)={0x0, 0x7fff, 0x80000001}, 0x14) setsockopt$inet_tcp_int(r0, 0x6, 0xa, &(0x7f0000000000)=0xfffffffffffff001, 0x4) sendto$inet(r0, &(0x7f00000000c0)="92f4", 0x2, 0x0, &(0x7f0000000040)={0x2, 0x0, @dev={0xac, 0x14}}, 0x10) 2018/04/13 21:33:13 executing program 3: r0 = gettid() r1 = getpid() sched_setattr(r1, &(0x7f0000000080)={0x0, 0x2, 0x0, 0x0, 0x3}, 0x0) timer_create(0x0, &(0x7f0000044000)={0x0, 0x12}, &(0x7f0000044000)) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) r3 = ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r3, 0xae60) r4 = ioctl$KVM_CREATE_VCPU(r3, 0xae41, 0x2) ioctl$KVM_RUN(r4, 0xae80, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r4, &(0x7f0000fe6000/0x18000)=nil, &(0x7f0000000040)=[@text64={0x40, &(0x7f00000000c0)="440f01c8f2430f58f20f20a40f01ca0f9e2d008000000f01cb48b805700000000000000f23d80f21f835800000900f23f8f3af64363e2e430f01cf66ba410066b8101966ef", 0x45}], 0x1, 0x0, &(0x7f0000000140), 0x0) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x8}, {0x0, 0x9}}, &(0x7f0000040000)) ioctl$KVM_TRANSLATE(r4, 0xc018ae85, &(0x7f0000000000)) tkill(r0, 0x15) 2018/04/13 21:33:13 executing program 6: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000200)={&(0x7f0000de2ff4)={0x10}, 0xc, &(0x7f00008b7ff0)={&(0x7f0000000180)={0x14, 0x1, 0x8, 0x800000005}, 0x14}, 0x1}, 0x0) 2018/04/13 21:33:13 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_MSRS(r2, 0x4008ae89, &(0x7f00000000c0)={0x1, 0x0, [{0x277, 0x0, 0x80000000}]}) 2018/04/13 21:33:13 executing program 4: init_module(&(0x7f0000000140)="70703085e3", 0xfffffffffffffcf9, &(0x7f0000000180)='selinux{\x00') 2018/04/13 21:33:13 executing program 6: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000200)={&(0x7f0000de2ff4)={0x10}, 0xc, &(0x7f00008b7ff0)={&(0x7f0000000180)={0x14, 0x1, 0x8, 0x800000005}, 0x14}, 0x1}, 0x0) 2018/04/13 21:33:13 executing program 3: r0 = gettid() r1 = getpid() sched_setattr(r1, &(0x7f0000000080)={0x0, 0x2, 0x0, 0x0, 0x3}, 0x0) timer_create(0x0, &(0x7f0000044000)={0x0, 0x12}, &(0x7f0000044000)) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) r3 = ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r3, 0xae60) r4 = ioctl$KVM_CREATE_VCPU(r3, 0xae41, 0x2) ioctl$KVM_RUN(r4, 0xae80, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r4, &(0x7f0000fe6000/0x18000)=nil, &(0x7f0000000040)=[@text64={0x40, &(0x7f00000000c0)="440f01c8f2430f58f20f20a40f01ca0f9e2d008000000f01cb48b805700000000000000f23d80f21f835800000900f23f8f3af64363e2e430f01cf66ba410066b8101966ef", 0x45}], 0x1, 0x0, &(0x7f0000000140), 0x0) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x8}, {0x0, 0x9}}, &(0x7f0000040000)) ioctl$KVM_TRANSLATE(r4, 0xc018ae85, &(0x7f0000000000)) tkill(r0, 0x15) 2018/04/13 21:33:13 executing program 5: mkdir(&(0x7f000082f000)='./control\x00', 0x0) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x1, 0x32, 0xffffffffffffffff, 0x0) r0 = userfaultfd(0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000000000)={0xaa}) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000d62fe0)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r1 = creat(&(0x7f000078dff8)='./file0\x00', 0x0) write$sndseq(r1, &(0x7f0000011fd2)=[{0x0, 0x0, 0x0, 0x0, @time, {}, {}, @time=@time={0x77359400}}], 0x1c) link(&(0x7f0000f3bff8)='./file0\x00', &(0x7f00009db000)='./file1\x00') rename(&(0x7f0000000180)='./file1\x00', &(0x7f00000001c0)='./control/file0\x00') rename(&(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='./control/file0\x00') dup2(r1, r0) 2018/04/13 21:33:13 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_MSRS(r2, 0x4008ae89, &(0x7f00000000c0)={0x1, 0x0, [{0x277, 0x0, 0x80000000}]}) 2018/04/13 21:33:13 executing program 4: r0 = socket$inet(0x2, 0x3, 0x2) setsockopt$inet_int(r0, 0x0, 0xcc, &(0x7f0000002000), 0x3c) 2018/04/13 21:33:13 executing program 7: r0 = socket$inet_dccp(0x2, 0x6, 0x0) setsockopt(r0, 0x800000010d, 0x0, &(0x7f0000d14ffc), 0x0) 2018/04/13 21:33:13 executing program 1: r0 = gettid() r1 = getpid() sched_setattr(r1, &(0x7f0000000080)={0x0, 0x2, 0x0, 0x0, 0x3}, 0x0) timer_create(0x0, &(0x7f0000044000)={0x0, 0x12}, &(0x7f0000044000)) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) r3 = ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r3, 0xae60) r4 = ioctl$KVM_CREATE_VCPU(r3, 0xae41, 0x2) ioctl$KVM_RUN(r4, 0xae80, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r4, &(0x7f0000fe6000/0x18000)=nil, &(0x7f0000000040)=[@text64={0x40, &(0x7f00000000c0)="440f01c8f2430f58f20f20a40f01ca0f9e2d008000000f01cb48b805700000000000000f23d80f21f835800000900f23f8f3af64363e2e430f01cf66ba410066b8101966ef", 0x45}], 0x1, 0x0, &(0x7f0000000140), 0x0) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x8}, {0x0, 0x9}}, &(0x7f0000040000)) ioctl$KVM_TRANSLATE(r4, 0xc018ae85, &(0x7f0000000000)) tkill(r0, 0x15) 2018/04/13 21:33:13 executing program 0: socketpair$unix(0x1, 0x200000000001, 0x0, &(0x7f000001b000)={0xffffffffffffffff}) getsockopt$sock_int(r0, 0x1, 0x3b, &(0x7f000004a000), &(0x7f0000061ffc)) 2018/04/13 21:33:13 executing program 4: r0 = socket$inet(0x2, 0x3, 0x2) setsockopt$inet_int(r0, 0x0, 0xcc, &(0x7f0000002000), 0x3c) 2018/04/13 21:33:13 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_MSRS(r2, 0x4008ae89, &(0x7f00000000c0)={0x1, 0x0, [{0x277, 0x0, 0x80000000}]}) 2018/04/13 21:33:13 executing program 7: r0 = socket$inet_dccp(0x2, 0x6, 0x0) setsockopt(r0, 0x800000010d, 0x0, &(0x7f0000d14ffc), 0x0) 2018/04/13 21:33:13 executing program 6: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000200)={&(0x7f0000de2ff4)={0x10}, 0xc, &(0x7f00008b7ff0)={&(0x7f0000000180)={0x14, 0x1, 0x8, 0x800000005}, 0x14}, 0x1}, 0x0) 2018/04/13 21:33:14 executing program 0: socketpair$unix(0x1, 0x200000000001, 0x0, &(0x7f000001b000)={0xffffffffffffffff}) getsockopt$sock_int(r0, 0x1, 0x3b, &(0x7f000004a000), &(0x7f0000061ffc)) 2018/04/13 21:33:14 executing program 4: r0 = socket$inet(0x2, 0x3, 0x2) setsockopt$inet_int(r0, 0x0, 0xcc, &(0x7f0000002000), 0x3c) 2018/04/13 21:33:14 executing program 7: r0 = socket$inet_dccp(0x2, 0x6, 0x0) setsockopt(r0, 0x800000010d, 0x0, &(0x7f0000d14ffc), 0x0) 2018/04/13 21:33:14 executing program 0: socketpair$unix(0x1, 0x200000000001, 0x0, &(0x7f000001b000)={0xffffffffffffffff}) getsockopt$sock_int(r0, 0x1, 0x3b, &(0x7f000004a000), &(0x7f0000061ffc)) 2018/04/13 21:33:14 executing program 2: r0 = socket$inet6(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000000)={&(0x7f0000000000)=@nl=@unspec, 0x80, &(0x7f000000b000)=[{&(0x7f0000010000)="5500000021007fafb72d00b2a4a2809302000000030343ee6b2623692500180000000a00130000008848a3c728f1c46b7b31afdc1338d5440000000000000000000000088daa7227c43ab8220000bf0c00000000d4", 0x55}], 0x1, &(0x7f0000016000)}, 0x0) [ 274.533257] netlink: 17 bytes leftover after parsing attributes in process `syz-executor2'. 2018/04/13 21:33:14 executing program 4: r0 = socket$inet(0x2, 0x3, 0x2) setsockopt$inet_int(r0, 0x0, 0xcc, &(0x7f0000002000), 0x3c) 2018/04/13 21:33:14 executing program 7: r0 = socket$inet_dccp(0x2, 0x6, 0x0) setsockopt(r0, 0x800000010d, 0x0, &(0x7f0000d14ffc), 0x0) 2018/04/13 21:33:14 executing program 2: r0 = socket$inet6(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000000)={&(0x7f0000000000)=@nl=@unspec, 0x80, &(0x7f000000b000)=[{&(0x7f0000010000)="5500000021007fafb72d00b2a4a2809302000000030343ee6b2623692500180000000a00130000008848a3c728f1c46b7b31afdc1338d5440000000000000000000000088daa7227c43ab8220000bf0c00000000d4", 0x55}], 0x1, &(0x7f0000016000)}, 0x0) 2018/04/13 21:33:14 executing program 1: r0 = gettid() r1 = getpid() sched_setattr(r1, &(0x7f0000000080)={0x0, 0x2, 0x0, 0x0, 0x3}, 0x0) timer_create(0x0, &(0x7f0000044000)={0x0, 0x12}, &(0x7f0000044000)) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) r3 = ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r3, 0xae60) r4 = ioctl$KVM_CREATE_VCPU(r3, 0xae41, 0x2) ioctl$KVM_RUN(r4, 0xae80, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r4, &(0x7f0000fe6000/0x18000)=nil, &(0x7f0000000040)=[@text64={0x40, &(0x7f00000000c0)="440f01c8f2430f58f20f20a40f01ca0f9e2d008000000f01cb48b805700000000000000f23d80f21f835800000900f23f8f3af64363e2e430f01cf66ba410066b8101966ef", 0x45}], 0x1, 0x0, &(0x7f0000000140), 0x0) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x8}, {0x0, 0x9}}, &(0x7f0000040000)) ioctl$KVM_TRANSLATE(r4, 0xc018ae85, &(0x7f0000000000)) tkill(r0, 0x15) 2018/04/13 21:33:14 executing program 5: mkdir(&(0x7f000082f000)='./control\x00', 0x0) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x1, 0x32, 0xffffffffffffffff, 0x0) r0 = userfaultfd(0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000000000)={0xaa}) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000d62fe0)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r1 = creat(&(0x7f000078dff8)='./file0\x00', 0x0) write$sndseq(r1, &(0x7f0000011fd2)=[{0x0, 0x0, 0x0, 0x0, @time, {}, {}, @time=@time={0x77359400}}], 0x1c) link(&(0x7f0000f3bff8)='./file0\x00', &(0x7f00009db000)='./file1\x00') rename(&(0x7f0000000180)='./file1\x00', &(0x7f00000001c0)='./control/file0\x00') rename(&(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='./control/file0\x00') dup2(r1, r0) 2018/04/13 21:33:14 executing program 3: r0 = gettid() r1 = getpid() sched_setattr(r1, &(0x7f0000000080)={0x0, 0x2, 0x0, 0x0, 0x3}, 0x0) timer_create(0x0, &(0x7f0000044000)={0x0, 0x12}, &(0x7f0000044000)) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) r3 = ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r3, 0xae60) r4 = ioctl$KVM_CREATE_VCPU(r3, 0xae41, 0x2) ioctl$KVM_RUN(r4, 0xae80, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r4, &(0x7f0000fe6000/0x18000)=nil, &(0x7f0000000040)=[@text64={0x40, &(0x7f00000000c0)="440f01c8f2430f58f20f20a40f01ca0f9e2d008000000f01cb48b805700000000000000f23d80f21f835800000900f23f8f3af64363e2e430f01cf66ba410066b8101966ef", 0x45}], 0x1, 0x0, &(0x7f0000000140), 0x0) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x8}, {0x0, 0x9}}, &(0x7f0000040000)) ioctl$KVM_TRANSLATE(r4, 0xc018ae85, &(0x7f0000000000)) tkill(r0, 0x15) 2018/04/13 21:33:14 executing program 0: socketpair$unix(0x1, 0x200000000001, 0x0, &(0x7f000001b000)={0xffffffffffffffff}) getsockopt$sock_int(r0, 0x1, 0x3b, &(0x7f000004a000), &(0x7f0000061ffc)) 2018/04/13 21:33:14 executing program 6: mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x3, 0x32, 0xffffffffffffffff, 0x0) r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x4e20, 0xb9, @remote={0xfe, 0x80, [], 0xbb}}, 0x1c) r1 = socket$inet6_udp(0xa, 0x2, 0x0) r2 = socket$l2tp(0x18, 0x1, 0x1) connect$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e23, 0x0, @loopback={0x0, 0x1}, 0x4}, 0x1c) connect$l2tp(r2, &(0x7f00005fafd2)=@pppol2tpv3={0x18, 0x1, {0x0, r1, {0x2, 0x4e21, @multicast2=0xe0000002}, 0x4, 0x0, 0x2}}, 0x2e) sendmsg$nl_crypto(r2, &(0x7f000037ffc8)={&(0x7f00009dd000)={0x10, 0x0, 0x0, 0x2}, 0xc, &(0x7f00002ceff0)={&(0x7f000097b000)=@delrng={0x10, 0x14, 0x200, 0x1, 0x3}, 0xfff1}, 0x1, 0x0, 0x0, 0x8820}, 0x81) 2018/04/13 21:33:14 executing program 0: mkdir(&(0x7f000082f000)='./control\x00', 0x0) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x1, 0x32, 0xffffffffffffffff, 0x0) r0 = userfaultfd(0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000000000)={0xaa}) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000d62fe0)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r1 = creat(&(0x7f000078dff8)='./file0\x00', 0x0) write$sndseq(r1, &(0x7f0000011fd2)=[{0x0, 0x0, 0x0, 0x0, @time, {}, {}, @time=@time={0x77359400}}], 0x1c) link(&(0x7f0000f3bff8)='./file0\x00', &(0x7f00009db000)='./file1\x00') rename(&(0x7f0000000180)='./file1\x00', &(0x7f00000001c0)='./control/file0\x00') rename(&(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='./control/file0\x00') dup2(r1, r0) 2018/04/13 21:33:14 executing program 4: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) bind$inet6(r0, &(0x7f0000fa8fe4)={0xa, 0x4e23}, 0x1c) setsockopt$SO_TIMESTAMPING(r0, 0x1, 0x25, &(0x7f0000000480)=0x40, 0x4) sendto$inet6(r0, &(0x7f0000ab4f8e)="97", 0x1, 0x0, &(0x7f0000aaa000)={0xa, 0x4e23, 0x0, @loopback={0x0, 0x1}}, 0x1c) recvfrom(r0, &(0x7f00001b4f1e)=""/226, 0xfffffffffffffe49, 0x0, 0x0, 0x0) 2018/04/13 21:33:14 executing program 7: bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000040)={0xffffffffffffffff, &(0x7f00000000c0)="b82283392dc50ff1fb635a5849d2f5916ae2fdc24e95e12aa8daccf7393e72be9cc66f"}, 0x10) syz_open_dev$sndpcmp(&(0x7f0000000000)='/dev/snd/pcmC#D#p\x00', 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000346fd4)={0x0, 0x0, 0x0, 0x1000000000000004, 0x202}, 0x2c) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x1, 0x5, &(0x7f0000346fc8)=@framed={{0x18}, [@alu={0x8000000201a7f19, 0x0, 0x7, 0x0, 0x1}], {0x95}}, &(0x7f0000f6bffb)='GPL\x00', 0x0, 0x299, &(0x7f00001a7f05)=""/251}, 0x18) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000140)={r0, 0x50, &(0x7f00000000c0)}, 0x10) socketpair$inet_icmp(0x13, 0x400c4150, 0x6f2000, &(0x7f00000003c0)) 2018/04/13 21:33:14 executing program 6: mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x3, 0x32, 0xffffffffffffffff, 0x0) r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x4e20, 0xb9, @remote={0xfe, 0x80, [], 0xbb}}, 0x1c) r1 = socket$inet6_udp(0xa, 0x2, 0x0) r2 = socket$l2tp(0x18, 0x1, 0x1) connect$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e23, 0x0, @loopback={0x0, 0x1}, 0x4}, 0x1c) connect$l2tp(r2, &(0x7f00005fafd2)=@pppol2tpv3={0x18, 0x1, {0x0, r1, {0x2, 0x4e21, @multicast2=0xe0000002}, 0x4, 0x0, 0x2}}, 0x2e) sendmsg$nl_crypto(r2, &(0x7f000037ffc8)={&(0x7f00009dd000)={0x10, 0x0, 0x0, 0x2}, 0xc, &(0x7f00002ceff0)={&(0x7f000097b000)=@delrng={0x10, 0x14, 0x200, 0x1, 0x3}, 0xfff1}, 0x1, 0x0, 0x0, 0x8820}, 0x81) [ 275.368886] netlink: 17 bytes leftover after parsing attributes in process `syz-executor2'. 2018/04/13 21:33:15 executing program 2: r0 = socket$inet6(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000000)={&(0x7f0000000000)=@nl=@unspec, 0x80, &(0x7f000000b000)=[{&(0x7f0000010000)="5500000021007fafb72d00b2a4a2809302000000030343ee6b2623692500180000000a00130000008848a3c728f1c46b7b31afdc1338d5440000000000000000000000088daa7227c43ab8220000bf0c00000000d4", 0x55}], 0x1, &(0x7f0000016000)}, 0x0) 2018/04/13 21:33:15 executing program 6: mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x3, 0x32, 0xffffffffffffffff, 0x0) r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x4e20, 0xb9, @remote={0xfe, 0x80, [], 0xbb}}, 0x1c) r1 = socket$inet6_udp(0xa, 0x2, 0x0) r2 = socket$l2tp(0x18, 0x1, 0x1) connect$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e23, 0x0, @loopback={0x0, 0x1}, 0x4}, 0x1c) connect$l2tp(r2, &(0x7f00005fafd2)=@pppol2tpv3={0x18, 0x1, {0x0, r1, {0x2, 0x4e21, @multicast2=0xe0000002}, 0x4, 0x0, 0x2}}, 0x2e) sendmsg$nl_crypto(r2, &(0x7f000037ffc8)={&(0x7f00009dd000)={0x10, 0x0, 0x0, 0x2}, 0xc, &(0x7f00002ceff0)={&(0x7f000097b000)=@delrng={0x10, 0x14, 0x200, 0x1, 0x3}, 0xfff1}, 0x1, 0x0, 0x0, 0x8820}, 0x81) [ 275.465965] netlink: 17 bytes leftover after parsing attributes in process `syz-executor2'. 2018/04/13 21:33:15 executing program 2: r0 = socket$inet6(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000000)={&(0x7f0000000000)=@nl=@unspec, 0x80, &(0x7f000000b000)=[{&(0x7f0000010000)="5500000021007fafb72d00b2a4a2809302000000030343ee6b2623692500180000000a00130000008848a3c728f1c46b7b31afdc1338d5440000000000000000000000088daa7227c43ab8220000bf0c00000000d4", 0x55}], 0x1, &(0x7f0000016000)}, 0x0) 2018/04/13 21:33:15 executing program 7: bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000040)={0xffffffffffffffff, &(0x7f00000000c0)="b82283392dc50ff1fb635a5849d2f5916ae2fdc24e95e12aa8daccf7393e72be9cc66f"}, 0x10) syz_open_dev$sndpcmp(&(0x7f0000000000)='/dev/snd/pcmC#D#p\x00', 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000346fd4)={0x0, 0x0, 0x0, 0x1000000000000004, 0x202}, 0x2c) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x1, 0x5, &(0x7f0000346fc8)=@framed={{0x18}, [@alu={0x8000000201a7f19, 0x0, 0x7, 0x0, 0x1}], {0x95}}, &(0x7f0000f6bffb)='GPL\x00', 0x0, 0x299, &(0x7f00001a7f05)=""/251}, 0x18) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000140)={r0, 0x50, &(0x7f00000000c0)}, 0x10) socketpair$inet_icmp(0x13, 0x400c4150, 0x6f2000, &(0x7f00000003c0)) 2018/04/13 21:33:15 executing program 4: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) bind$inet6(r0, &(0x7f0000fa8fe4)={0xa, 0x4e23}, 0x1c) setsockopt$SO_TIMESTAMPING(r0, 0x1, 0x25, &(0x7f0000000480)=0x40, 0x4) sendto$inet6(r0, &(0x7f0000ab4f8e)="97", 0x1, 0x0, &(0x7f0000aaa000)={0xa, 0x4e23, 0x0, @loopback={0x0, 0x1}}, 0x1c) recvfrom(r0, &(0x7f00001b4f1e)=""/226, 0xfffffffffffffe49, 0x0, 0x0, 0x0) 2018/04/13 21:33:15 executing program 6: mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x3, 0x32, 0xffffffffffffffff, 0x0) r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x4e20, 0xb9, @remote={0xfe, 0x80, [], 0xbb}}, 0x1c) r1 = socket$inet6_udp(0xa, 0x2, 0x0) r2 = socket$l2tp(0x18, 0x1, 0x1) connect$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e23, 0x0, @loopback={0x0, 0x1}, 0x4}, 0x1c) connect$l2tp(r2, &(0x7f00005fafd2)=@pppol2tpv3={0x18, 0x1, {0x0, r1, {0x2, 0x4e21, @multicast2=0xe0000002}, 0x4, 0x0, 0x2}}, 0x2e) sendmsg$nl_crypto(r2, &(0x7f000037ffc8)={&(0x7f00009dd000)={0x10, 0x0, 0x0, 0x2}, 0xc, &(0x7f00002ceff0)={&(0x7f000097b000)=@delrng={0x10, 0x14, 0x200, 0x1, 0x3}, 0xfff1}, 0x1, 0x0, 0x0, 0x8820}, 0x81) 2018/04/13 21:33:15 executing program 3: clock_nanosleep(0x2, 0x0, &(0x7f0000000140)={0x0, 0x1c9c380}, &(0x7f0000000180)) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) shmget$private(0x0, 0x4000, 0x0, &(0x7f0000432000/0x4000)=nil) shmat(0x0, &(0x7f0000597000/0x3000)=nil, 0x4000) shmat(0x0, &(0x7f0000a2f000/0x3000)=nil, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$BINDER_GET_NODE_DEBUG_INFO(0xffffffffffffffff, 0xc018620b, &(0x7f0000000040)) ioctl$BINDER_GET_NODE_DEBUG_INFO(0xffffffffffffffff, 0xc018620b, &(0x7f0000000080)) 2018/04/13 21:33:15 executing program 1: perf_event_open(&(0x7f0000220000)={0x2, 0x78, 0x3e3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x10, 0x2, 0xc) ioctl$TIOCLINUX3(0xffffffffffffffff, 0x541c, &(0x7f0000000180)=0x3) write(r0, &(0x7f0000594000)="1f0000000104ff00fd4354c007110000f305010008000100010423dcffdf00", 0x1f) write(r0, &(0x7f0000000100)="1f0000000104fffffd3b54c007110000f30501000b000200000010d10200cf", 0x1f) 2018/04/13 21:33:15 executing program 0: mkdir(&(0x7f000082f000)='./control\x00', 0x0) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x1, 0x32, 0xffffffffffffffff, 0x0) r0 = userfaultfd(0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000000000)={0xaa}) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000d62fe0)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r1 = creat(&(0x7f000078dff8)='./file0\x00', 0x0) write$sndseq(r1, &(0x7f0000011fd2)=[{0x0, 0x0, 0x0, 0x0, @time, {}, {}, @time=@time={0x77359400}}], 0x1c) link(&(0x7f0000f3bff8)='./file0\x00', &(0x7f00009db000)='./file1\x00') rename(&(0x7f0000000180)='./file1\x00', &(0x7f00000001c0)='./control/file0\x00') rename(&(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='./control/file0\x00') dup2(r1, r0) 2018/04/13 21:33:15 executing program 5: mkdir(&(0x7f000082f000)='./control\x00', 0x0) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x1, 0x32, 0xffffffffffffffff, 0x0) r0 = userfaultfd(0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000000000)={0xaa}) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000d62fe0)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r1 = creat(&(0x7f000078dff8)='./file0\x00', 0x0) write$sndseq(r1, &(0x7f0000011fd2)=[{0x0, 0x0, 0x0, 0x0, @time, {}, {}, @time=@time={0x77359400}}], 0x1c) link(&(0x7f0000f3bff8)='./file0\x00', &(0x7f00009db000)='./file1\x00') rename(&(0x7f0000000180)='./file1\x00', &(0x7f00000001c0)='./control/file0\x00') rename(&(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='./control/file0\x00') dup2(r1, r0) 2018/04/13 21:33:15 executing program 6: r0 = dup(0xffffffffffffff9c) setsockopt$inet_sctp_SCTP_EVENTS(r0, 0x84, 0xb, &(0x7f0000000640)={0x0, 0x2, 0x2, 0x4, 0x388aa0ca, 0x1f, 0x9, 0x0, 0x0, 0x5, 0x3}, 0xb) setsockopt$inet_int(0xffffffffffffffff, 0x0, 0x0, &(0x7f00000002c0)=0x1000000, 0x4) syz_open_dev$sndctrl(&(0x7f0000000180)='/dev/snd/controlC#\x00', 0x7ca, 0x44000) r1 = perf_event_open(&(0x7f000025c000)={0x0, 0x70, 0x0, 0x0, 0xfffffffffffffffe}, 0x0, 0x0, 0xffffffffffffffff, 0x2) r2 = dup3(0xffffffffffffffff, r1, 0x80000) keyctl$chown(0x4, 0x0, 0x0, 0x0) setsockopt$inet6_MRT6_ADD_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd2, &(0x7f0000000400)={{0xa, 0x0, 0x0, @ipv4={[], [0xff, 0xff], @multicast1=0xe0000001}}, {0xa, 0x0, 0x0, @mcast1={0xff, 0x1, [], 0x1}}}, 0x5c) ioctl$UFFDIO_COPY(r2, 0xc028aa03, &(0x7f0000000800)={&(0x7f0000ff9000/0x4000)=nil, 0x4000}) r3 = openat$vsock(0xffffffffffffff9c, &(0x7f00001b3000)='/dev/vhost-vsock\x00', 0x2, 0x0) bind$vsock_stream(r2, &(0x7f0000000340)={0x28, 0x0, 0x0, @my}, 0x10) ioctl$VHOST_SET_LOG_BASE(r3, 0xaf01, &(0x7f0000000280)=&(0x7f0000989fff)) fcntl$getown(0xffffffffffffffff, 0x9) writev(0xffffffffffffffff, &(0x7f0000fb5ff0), 0x0) perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x0, 0x3, &(0x7f0000000040)=ANY=[@ANYBLOB="180000000000000000000000028000007a0a00fffffffffd6301"], &(0x7f0000000000)="47504c00bc3047eb525f484f89fc96dd6ca64da40ff023122e66f6", 0x0, 0xce, &(0x7f0000000300)=""/206}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0xe, 0x5, &(0x7f0000000040)=@framed={{0x18}, [@jmp={0x5}], {0x95}}, &(0x7f00000004c0)="73797a6b584e3e2f9afed6d0ee3d5d5de2f791e4545b69c564e359a02949ab535c1b25caa665b968d2f1a32e3febe4189befa5f044722bae83e5b6959e392e8d24e41b4ce153c97b5a23e135e38d3b1d14ad7a9eeb7069347fee053569544f1a0000000000000000", 0x80000001, 0x466, &(0x7f0000000300)=""/187}, 0x48) openat$sequencer(0xffffffffffffff9c, &(0x7f00005d6000)='/dev/sequencer\x00', 0x0, 0x0) r4 = syz_open_dev$sndtimer(&(0x7f00004f6000)='/dev/snd/timer\x00', 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_SELECT(r4, 0x40345410, &(0x7f0000029fcc)={{0x0, 0x2, 0x0, 0xffefffffffffffff}}) ioctl$SNDRV_TIMER_IOCTL_START(r4, 0x54a0) syz_open_dev$sndtimer(&(0x7f0000000000)='/dev/snd/timer\x00', 0x0, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$SNDRV_CTL_IOCTL_RAWMIDI_PREFER_SUBDEVICE(0xffffffffffffffff, 0x40045542, &(0x7f0000000100)) clone(0xa0718a6924206ffc, &(0x7f0000163000), &(0x7f00001a6000), &(0x7f0000e05ffc), &(0x7f00007c4000)) ioctl$VHOST_SET_MEM_TABLE(r3, 0x4008af03, &(0x7f0000000000)=ANY=[]) r5 = eventfd2(0x0, 0x0) ioctl$VHOST_SET_LOG_FD(r3, 0x4004af07, &(0x7f0000000000)=r5) 2018/04/13 21:33:15 executing program 7: bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000040)={0xffffffffffffffff, &(0x7f00000000c0)="b82283392dc50ff1fb635a5849d2f5916ae2fdc24e95e12aa8daccf7393e72be9cc66f"}, 0x10) syz_open_dev$sndpcmp(&(0x7f0000000000)='/dev/snd/pcmC#D#p\x00', 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000346fd4)={0x0, 0x0, 0x0, 0x1000000000000004, 0x202}, 0x2c) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x1, 0x5, &(0x7f0000346fc8)=@framed={{0x18}, [@alu={0x8000000201a7f19, 0x0, 0x7, 0x0, 0x1}], {0x95}}, &(0x7f0000f6bffb)='GPL\x00', 0x0, 0x299, &(0x7f00001a7f05)=""/251}, 0x18) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000140)={r0, 0x50, &(0x7f00000000c0)}, 0x10) socketpair$inet_icmp(0x13, 0x400c4150, 0x6f2000, &(0x7f00000003c0)) 2018/04/13 21:33:15 executing program 2: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write(r0, &(0x7f0000000000)="1500000000009c9c000000000000000002", 0x11) [ 276.335809] netlink: 3 bytes leftover after parsing attributes in process `syz-executor1'. [ 276.344381] netlink: 17 bytes leftover after parsing attributes in process `syz-executor2'. [ 276.366675] netlink: 3 bytes leftover after parsing attributes in process `syz-executor1'. 2018/04/13 21:33:15 executing program 1: perf_event_open(&(0x7f0000220000)={0x2, 0x78, 0x3e3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x10, 0x2, 0xc) ioctl$TIOCLINUX3(0xffffffffffffffff, 0x541c, &(0x7f0000000180)=0x3) write(r0, &(0x7f0000594000)="1f0000000104ff00fd4354c007110000f305010008000100010423dcffdf00", 0x1f) write(r0, &(0x7f0000000100)="1f0000000104fffffd3b54c007110000f30501000b000200000010d10200cf", 0x1f) 2018/04/13 21:33:16 executing program 4: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) bind$inet6(r0, &(0x7f0000fa8fe4)={0xa, 0x4e23}, 0x1c) setsockopt$SO_TIMESTAMPING(r0, 0x1, 0x25, &(0x7f0000000480)=0x40, 0x4) sendto$inet6(r0, &(0x7f0000ab4f8e)="97", 0x1, 0x0, &(0x7f0000aaa000)={0xa, 0x4e23, 0x0, @loopback={0x0, 0x1}}, 0x1c) recvfrom(r0, &(0x7f00001b4f1e)=""/226, 0xfffffffffffffe49, 0x0, 0x0, 0x0) 2018/04/13 21:33:16 executing program 2: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write(r0, &(0x7f0000000000)="1500000000009c9c000000000000000002", 0x11) 2018/04/13 21:33:16 executing program 7: bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000040)={0xffffffffffffffff, &(0x7f00000000c0)="b82283392dc50ff1fb635a5849d2f5916ae2fdc24e95e12aa8daccf7393e72be9cc66f"}, 0x10) syz_open_dev$sndpcmp(&(0x7f0000000000)='/dev/snd/pcmC#D#p\x00', 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000346fd4)={0x0, 0x0, 0x0, 0x1000000000000004, 0x202}, 0x2c) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x1, 0x5, &(0x7f0000346fc8)=@framed={{0x18}, [@alu={0x8000000201a7f19, 0x0, 0x7, 0x0, 0x1}], {0x95}}, &(0x7f0000f6bffb)='GPL\x00', 0x0, 0x299, &(0x7f00001a7f05)=""/251}, 0x18) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000140)={r0, 0x50, &(0x7f00000000c0)}, 0x10) socketpair$inet_icmp(0x13, 0x400c4150, 0x6f2000, &(0x7f00000003c0)) 2018/04/13 21:33:16 executing program 6: r0 = dup(0xffffffffffffff9c) setsockopt$inet_sctp_SCTP_EVENTS(r0, 0x84, 0xb, &(0x7f0000000640)={0x0, 0x2, 0x2, 0x4, 0x388aa0ca, 0x1f, 0x9, 0x0, 0x0, 0x5, 0x3}, 0xb) setsockopt$inet_int(0xffffffffffffffff, 0x0, 0x0, &(0x7f00000002c0)=0x1000000, 0x4) syz_open_dev$sndctrl(&(0x7f0000000180)='/dev/snd/controlC#\x00', 0x7ca, 0x44000) r1 = perf_event_open(&(0x7f000025c000)={0x0, 0x70, 0x0, 0x0, 0xfffffffffffffffe}, 0x0, 0x0, 0xffffffffffffffff, 0x2) r2 = dup3(0xffffffffffffffff, r1, 0x80000) keyctl$chown(0x4, 0x0, 0x0, 0x0) setsockopt$inet6_MRT6_ADD_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd2, &(0x7f0000000400)={{0xa, 0x0, 0x0, @ipv4={[], [0xff, 0xff], @multicast1=0xe0000001}}, {0xa, 0x0, 0x0, @mcast1={0xff, 0x1, [], 0x1}}}, 0x5c) ioctl$UFFDIO_COPY(r2, 0xc028aa03, &(0x7f0000000800)={&(0x7f0000ff9000/0x4000)=nil, 0x4000}) r3 = openat$vsock(0xffffffffffffff9c, &(0x7f00001b3000)='/dev/vhost-vsock\x00', 0x2, 0x0) bind$vsock_stream(r2, &(0x7f0000000340)={0x28, 0x0, 0x0, @my}, 0x10) ioctl$VHOST_SET_LOG_BASE(r3, 0xaf01, &(0x7f0000000280)=&(0x7f0000989fff)) fcntl$getown(0xffffffffffffffff, 0x9) writev(0xffffffffffffffff, &(0x7f0000fb5ff0), 0x0) perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x0, 0x3, &(0x7f0000000040)=ANY=[@ANYBLOB="180000000000000000000000028000007a0a00fffffffffd6301"], &(0x7f0000000000)="47504c00bc3047eb525f484f89fc96dd6ca64da40ff023122e66f6", 0x0, 0xce, &(0x7f0000000300)=""/206}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0xe, 0x5, &(0x7f0000000040)=@framed={{0x18}, [@jmp={0x5}], {0x95}}, &(0x7f00000004c0)="73797a6b584e3e2f9afed6d0ee3d5d5de2f791e4545b69c564e359a02949ab535c1b25caa665b968d2f1a32e3febe4189befa5f044722bae83e5b6959e392e8d24e41b4ce153c97b5a23e135e38d3b1d14ad7a9eeb7069347fee053569544f1a0000000000000000", 0x80000001, 0x466, &(0x7f0000000300)=""/187}, 0x48) openat$sequencer(0xffffffffffffff9c, &(0x7f00005d6000)='/dev/sequencer\x00', 0x0, 0x0) r4 = syz_open_dev$sndtimer(&(0x7f00004f6000)='/dev/snd/timer\x00', 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_SELECT(r4, 0x40345410, &(0x7f0000029fcc)={{0x0, 0x2, 0x0, 0xffefffffffffffff}}) ioctl$SNDRV_TIMER_IOCTL_START(r4, 0x54a0) syz_open_dev$sndtimer(&(0x7f0000000000)='/dev/snd/timer\x00', 0x0, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$SNDRV_CTL_IOCTL_RAWMIDI_PREFER_SUBDEVICE(0xffffffffffffffff, 0x40045542, &(0x7f0000000100)) clone(0xa0718a6924206ffc, &(0x7f0000163000), &(0x7f00001a6000), &(0x7f0000e05ffc), &(0x7f00007c4000)) ioctl$VHOST_SET_MEM_TABLE(r3, 0x4008af03, &(0x7f0000000000)=ANY=[]) r5 = eventfd2(0x0, 0x0) ioctl$VHOST_SET_LOG_FD(r3, 0x4004af07, &(0x7f0000000000)=r5) 2018/04/13 21:33:16 executing program 2: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write(r0, &(0x7f0000000000)="1500000000009c9c000000000000000002", 0x11) 2018/04/13 21:33:16 executing program 1: perf_event_open(&(0x7f0000220000)={0x2, 0x78, 0x3e3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x10, 0x2, 0xc) ioctl$TIOCLINUX3(0xffffffffffffffff, 0x541c, &(0x7f0000000180)=0x3) write(r0, &(0x7f0000594000)="1f0000000104ff00fd4354c007110000f305010008000100010423dcffdf00", 0x1f) write(r0, &(0x7f0000000100)="1f0000000104fffffd3b54c007110000f30501000b000200000010d10200cf", 0x1f) [ 276.446243] netlink: 3 bytes leftover after parsing attributes in process `syz-executor1'. [ 276.517041] netlink: 3 bytes leftover after parsing attributes in process `syz-executor1'. 2018/04/13 21:33:16 executing program 0: mkdir(&(0x7f000082f000)='./control\x00', 0x0) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x1, 0x32, 0xffffffffffffffff, 0x0) r0 = userfaultfd(0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000000000)={0xaa}) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000d62fe0)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r1 = creat(&(0x7f000078dff8)='./file0\x00', 0x0) write$sndseq(r1, &(0x7f0000011fd2)=[{0x0, 0x0, 0x0, 0x0, @time, {}, {}, @time=@time={0x77359400}}], 0x1c) link(&(0x7f0000f3bff8)='./file0\x00', &(0x7f00009db000)='./file1\x00') rename(&(0x7f0000000180)='./file1\x00', &(0x7f00000001c0)='./control/file0\x00') rename(&(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='./control/file0\x00') dup2(r1, r0) 2018/04/13 21:33:16 executing program 2: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write(r0, &(0x7f0000000000)="1500000000009c9c000000000000000002", 0x11) 2018/04/13 21:33:16 executing program 6: r0 = dup(0xffffffffffffff9c) setsockopt$inet_sctp_SCTP_EVENTS(r0, 0x84, 0xb, &(0x7f0000000640)={0x0, 0x2, 0x2, 0x4, 0x388aa0ca, 0x1f, 0x9, 0x0, 0x0, 0x5, 0x3}, 0xb) setsockopt$inet_int(0xffffffffffffffff, 0x0, 0x0, &(0x7f00000002c0)=0x1000000, 0x4) syz_open_dev$sndctrl(&(0x7f0000000180)='/dev/snd/controlC#\x00', 0x7ca, 0x44000) r1 = perf_event_open(&(0x7f000025c000)={0x0, 0x70, 0x0, 0x0, 0xfffffffffffffffe}, 0x0, 0x0, 0xffffffffffffffff, 0x2) r2 = dup3(0xffffffffffffffff, r1, 0x80000) keyctl$chown(0x4, 0x0, 0x0, 0x0) setsockopt$inet6_MRT6_ADD_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd2, &(0x7f0000000400)={{0xa, 0x0, 0x0, @ipv4={[], [0xff, 0xff], @multicast1=0xe0000001}}, {0xa, 0x0, 0x0, @mcast1={0xff, 0x1, [], 0x1}}}, 0x5c) ioctl$UFFDIO_COPY(r2, 0xc028aa03, &(0x7f0000000800)={&(0x7f0000ff9000/0x4000)=nil, 0x4000}) r3 = openat$vsock(0xffffffffffffff9c, &(0x7f00001b3000)='/dev/vhost-vsock\x00', 0x2, 0x0) bind$vsock_stream(r2, &(0x7f0000000340)={0x28, 0x0, 0x0, @my}, 0x10) ioctl$VHOST_SET_LOG_BASE(r3, 0xaf01, &(0x7f0000000280)=&(0x7f0000989fff)) fcntl$getown(0xffffffffffffffff, 0x9) writev(0xffffffffffffffff, &(0x7f0000fb5ff0), 0x0) perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x0, 0x3, &(0x7f0000000040)=ANY=[@ANYBLOB="180000000000000000000000028000007a0a00fffffffffd6301"], &(0x7f0000000000)="47504c00bc3047eb525f484f89fc96dd6ca64da40ff023122e66f6", 0x0, 0xce, &(0x7f0000000300)=""/206}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0xe, 0x5, &(0x7f0000000040)=@framed={{0x18}, [@jmp={0x5}], {0x95}}, &(0x7f00000004c0)="73797a6b584e3e2f9afed6d0ee3d5d5de2f791e4545b69c564e359a02949ab535c1b25caa665b968d2f1a32e3febe4189befa5f044722bae83e5b6959e392e8d24e41b4ce153c97b5a23e135e38d3b1d14ad7a9eeb7069347fee053569544f1a0000000000000000", 0x80000001, 0x466, &(0x7f0000000300)=""/187}, 0x48) openat$sequencer(0xffffffffffffff9c, &(0x7f00005d6000)='/dev/sequencer\x00', 0x0, 0x0) r4 = syz_open_dev$sndtimer(&(0x7f00004f6000)='/dev/snd/timer\x00', 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_SELECT(r4, 0x40345410, &(0x7f0000029fcc)={{0x0, 0x2, 0x0, 0xffefffffffffffff}}) ioctl$SNDRV_TIMER_IOCTL_START(r4, 0x54a0) syz_open_dev$sndtimer(&(0x7f0000000000)='/dev/snd/timer\x00', 0x0, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$SNDRV_CTL_IOCTL_RAWMIDI_PREFER_SUBDEVICE(0xffffffffffffffff, 0x40045542, &(0x7f0000000100)) clone(0xa0718a6924206ffc, &(0x7f0000163000), &(0x7f00001a6000), &(0x7f0000e05ffc), &(0x7f00007c4000)) ioctl$VHOST_SET_MEM_TABLE(r3, 0x4008af03, &(0x7f0000000000)=ANY=[]) r5 = eventfd2(0x0, 0x0) ioctl$VHOST_SET_LOG_FD(r3, 0x4004af07, &(0x7f0000000000)=r5) 2018/04/13 21:33:16 executing program 4: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) bind$inet6(r0, &(0x7f0000fa8fe4)={0xa, 0x4e23}, 0x1c) setsockopt$SO_TIMESTAMPING(r0, 0x1, 0x25, &(0x7f0000000480)=0x40, 0x4) sendto$inet6(r0, &(0x7f0000ab4f8e)="97", 0x1, 0x0, &(0x7f0000aaa000)={0xa, 0x4e23, 0x0, @loopback={0x0, 0x1}}, 0x1c) recvfrom(r0, &(0x7f00001b4f1e)=""/226, 0xfffffffffffffe49, 0x0, 0x0, 0x0) 2018/04/13 21:33:16 executing program 1: perf_event_open(&(0x7f0000220000)={0x2, 0x78, 0x3e3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x10, 0x2, 0xc) ioctl$TIOCLINUX3(0xffffffffffffffff, 0x541c, &(0x7f0000000180)=0x3) write(r0, &(0x7f0000594000)="1f0000000104ff00fd4354c007110000f305010008000100010423dcffdf00", 0x1f) write(r0, &(0x7f0000000100)="1f0000000104fffffd3b54c007110000f30501000b000200000010d10200cf", 0x1f) 2018/04/13 21:33:16 executing program 3: r0 = dup(0xffffffffffffff9c) setsockopt$inet_sctp_SCTP_EVENTS(r0, 0x84, 0xb, &(0x7f0000000640)={0x0, 0x2, 0x2, 0x4, 0x388aa0ca, 0x1f, 0x9, 0x0, 0x0, 0x5, 0x3}, 0xb) setsockopt$inet_int(0xffffffffffffffff, 0x0, 0x0, &(0x7f00000002c0)=0x1000000, 0x4) syz_open_dev$sndctrl(&(0x7f0000000180)='/dev/snd/controlC#\x00', 0x7ca, 0x44000) r1 = perf_event_open(&(0x7f000025c000)={0x0, 0x70, 0x0, 0x0, 0xfffffffffffffffe}, 0x0, 0x0, 0xffffffffffffffff, 0x2) r2 = dup3(0xffffffffffffffff, r1, 0x80000) keyctl$chown(0x4, 0x0, 0x0, 0x0) setsockopt$inet6_MRT6_ADD_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd2, &(0x7f0000000400)={{0xa, 0x0, 0x0, @ipv4={[], [0xff, 0xff], @multicast1=0xe0000001}}, {0xa, 0x0, 0x0, @mcast1={0xff, 0x1, [], 0x1}}}, 0x5c) ioctl$UFFDIO_COPY(r2, 0xc028aa03, &(0x7f0000000800)={&(0x7f0000ff9000/0x4000)=nil, 0x4000}) r3 = openat$vsock(0xffffffffffffff9c, &(0x7f00001b3000)='/dev/vhost-vsock\x00', 0x2, 0x0) bind$vsock_stream(r2, &(0x7f0000000340)={0x28, 0x0, 0x0, @my}, 0x10) ioctl$VHOST_SET_LOG_BASE(r3, 0xaf01, &(0x7f0000000280)=&(0x7f0000989fff)) fcntl$getown(0xffffffffffffffff, 0x9) writev(0xffffffffffffffff, &(0x7f0000fb5ff0), 0x0) perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x0, 0x3, &(0x7f0000000040)=ANY=[@ANYBLOB="180000000000000000000000028000007a0a00fffffffffd6301"], &(0x7f0000000000)="47504c00bc3047eb525f484f89fc96dd6ca64da40ff023122e66f6", 0x0, 0xce, &(0x7f0000000300)=""/206}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0xe, 0x5, &(0x7f0000000040)=@framed={{0x18}, [@jmp={0x5}], {0x95}}, &(0x7f00000004c0)="73797a6b584e3e2f9afed6d0ee3d5d5de2f791e4545b69c564e359a02949ab535c1b25caa665b968d2f1a32e3febe4189befa5f044722bae83e5b6959e392e8d24e41b4ce153c97b5a23e135e38d3b1d14ad7a9eeb7069347fee053569544f1a0000000000000000", 0x80000001, 0x466, &(0x7f0000000300)=""/187}, 0x48) openat$sequencer(0xffffffffffffff9c, &(0x7f00005d6000)='/dev/sequencer\x00', 0x0, 0x0) r4 = syz_open_dev$sndtimer(&(0x7f00004f6000)='/dev/snd/timer\x00', 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_SELECT(r4, 0x40345410, &(0x7f0000029fcc)={{0x0, 0x2, 0x0, 0xffefffffffffffff}}) ioctl$SNDRV_TIMER_IOCTL_START(r4, 0x54a0) syz_open_dev$sndtimer(&(0x7f0000000000)='/dev/snd/timer\x00', 0x0, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$SNDRV_CTL_IOCTL_RAWMIDI_PREFER_SUBDEVICE(0xffffffffffffffff, 0x40045542, &(0x7f0000000100)) clone(0xa0718a6924206ffc, &(0x7f0000163000), &(0x7f00001a6000), &(0x7f0000e05ffc), &(0x7f00007c4000)) ioctl$VHOST_SET_MEM_TABLE(r3, 0x4008af03, &(0x7f0000000000)=ANY=[]) r5 = eventfd2(0x0, 0x0) ioctl$VHOST_SET_LOG_FD(r3, 0x4004af07, &(0x7f0000000000)=r5) 2018/04/13 21:33:16 executing program 5: mkdir(&(0x7f000082f000)='./control\x00', 0x0) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x1, 0x32, 0xffffffffffffffff, 0x0) r0 = userfaultfd(0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000000000)={0xaa}) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000d62fe0)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r1 = creat(&(0x7f000078dff8)='./file0\x00', 0x0) write$sndseq(r1, &(0x7f0000011fd2)=[{0x0, 0x0, 0x0, 0x0, @time, {}, {}, @time=@time={0x77359400}}], 0x1c) link(&(0x7f0000f3bff8)='./file0\x00', &(0x7f00009db000)='./file1\x00') rename(&(0x7f0000000180)='./file1\x00', &(0x7f00000001c0)='./control/file0\x00') rename(&(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='./control/file0\x00') dup2(r1, r0) 2018/04/13 21:33:16 executing program 6: r0 = dup(0xffffffffffffff9c) setsockopt$inet_sctp_SCTP_EVENTS(r0, 0x84, 0xb, &(0x7f0000000640)={0x0, 0x2, 0x2, 0x4, 0x388aa0ca, 0x1f, 0x9, 0x0, 0x0, 0x5, 0x3}, 0xb) setsockopt$inet_int(0xffffffffffffffff, 0x0, 0x0, &(0x7f00000002c0)=0x1000000, 0x4) syz_open_dev$sndctrl(&(0x7f0000000180)='/dev/snd/controlC#\x00', 0x7ca, 0x44000) r1 = perf_event_open(&(0x7f000025c000)={0x0, 0x70, 0x0, 0x0, 0xfffffffffffffffe}, 0x0, 0x0, 0xffffffffffffffff, 0x2) r2 = dup3(0xffffffffffffffff, r1, 0x80000) keyctl$chown(0x4, 0x0, 0x0, 0x0) setsockopt$inet6_MRT6_ADD_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd2, &(0x7f0000000400)={{0xa, 0x0, 0x0, @ipv4={[], [0xff, 0xff], @multicast1=0xe0000001}}, {0xa, 0x0, 0x0, @mcast1={0xff, 0x1, [], 0x1}}}, 0x5c) ioctl$UFFDIO_COPY(r2, 0xc028aa03, &(0x7f0000000800)={&(0x7f0000ff9000/0x4000)=nil, 0x4000}) r3 = openat$vsock(0xffffffffffffff9c, &(0x7f00001b3000)='/dev/vhost-vsock\x00', 0x2, 0x0) bind$vsock_stream(r2, &(0x7f0000000340)={0x28, 0x0, 0x0, @my}, 0x10) ioctl$VHOST_SET_LOG_BASE(r3, 0xaf01, &(0x7f0000000280)=&(0x7f0000989fff)) fcntl$getown(0xffffffffffffffff, 0x9) writev(0xffffffffffffffff, &(0x7f0000fb5ff0), 0x0) perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x0, 0x3, &(0x7f0000000040)=ANY=[@ANYBLOB="180000000000000000000000028000007a0a00fffffffffd6301"], &(0x7f0000000000)="47504c00bc3047eb525f484f89fc96dd6ca64da40ff023122e66f6", 0x0, 0xce, &(0x7f0000000300)=""/206}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0xe, 0x5, &(0x7f0000000040)=@framed={{0x18}, [@jmp={0x5}], {0x95}}, &(0x7f00000004c0)="73797a6b584e3e2f9afed6d0ee3d5d5de2f791e4545b69c564e359a02949ab535c1b25caa665b968d2f1a32e3febe4189befa5f044722bae83e5b6959e392e8d24e41b4ce153c97b5a23e135e38d3b1d14ad7a9eeb7069347fee053569544f1a0000000000000000", 0x80000001, 0x466, &(0x7f0000000300)=""/187}, 0x48) openat$sequencer(0xffffffffffffff9c, &(0x7f00005d6000)='/dev/sequencer\x00', 0x0, 0x0) r4 = syz_open_dev$sndtimer(&(0x7f00004f6000)='/dev/snd/timer\x00', 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_SELECT(r4, 0x40345410, &(0x7f0000029fcc)={{0x0, 0x2, 0x0, 0xffefffffffffffff}}) ioctl$SNDRV_TIMER_IOCTL_START(r4, 0x54a0) syz_open_dev$sndtimer(&(0x7f0000000000)='/dev/snd/timer\x00', 0x0, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$SNDRV_CTL_IOCTL_RAWMIDI_PREFER_SUBDEVICE(0xffffffffffffffff, 0x40045542, &(0x7f0000000100)) clone(0xa0718a6924206ffc, &(0x7f0000163000), &(0x7f00001a6000), &(0x7f0000e05ffc), &(0x7f00007c4000)) ioctl$VHOST_SET_MEM_TABLE(r3, 0x4008af03, &(0x7f0000000000)=ANY=[]) r5 = eventfd2(0x0, 0x0) ioctl$VHOST_SET_LOG_FD(r3, 0x4004af07, &(0x7f0000000000)=r5) 2018/04/13 21:33:16 executing program 3: r0 = dup(0xffffffffffffff9c) setsockopt$inet_sctp_SCTP_EVENTS(r0, 0x84, 0xb, &(0x7f0000000640)={0x0, 0x2, 0x2, 0x4, 0x388aa0ca, 0x1f, 0x9, 0x0, 0x0, 0x5, 0x3}, 0xb) setsockopt$inet_int(0xffffffffffffffff, 0x0, 0x0, &(0x7f00000002c0)=0x1000000, 0x4) syz_open_dev$sndctrl(&(0x7f0000000180)='/dev/snd/controlC#\x00', 0x7ca, 0x44000) r1 = perf_event_open(&(0x7f000025c000)={0x0, 0x70, 0x0, 0x0, 0xfffffffffffffffe}, 0x0, 0x0, 0xffffffffffffffff, 0x2) r2 = dup3(0xffffffffffffffff, r1, 0x80000) keyctl$chown(0x4, 0x0, 0x0, 0x0) setsockopt$inet6_MRT6_ADD_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd2, &(0x7f0000000400)={{0xa, 0x0, 0x0, @ipv4={[], [0xff, 0xff], @multicast1=0xe0000001}}, {0xa, 0x0, 0x0, @mcast1={0xff, 0x1, [], 0x1}}}, 0x5c) ioctl$UFFDIO_COPY(r2, 0xc028aa03, &(0x7f0000000800)={&(0x7f0000ff9000/0x4000)=nil, 0x4000}) r3 = openat$vsock(0xffffffffffffff9c, &(0x7f00001b3000)='/dev/vhost-vsock\x00', 0x2, 0x0) bind$vsock_stream(r2, &(0x7f0000000340)={0x28, 0x0, 0x0, @my}, 0x10) ioctl$VHOST_SET_LOG_BASE(r3, 0xaf01, &(0x7f0000000280)=&(0x7f0000989fff)) fcntl$getown(0xffffffffffffffff, 0x9) writev(0xffffffffffffffff, &(0x7f0000fb5ff0), 0x0) perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x0, 0x3, &(0x7f0000000040)=ANY=[@ANYBLOB="180000000000000000000000028000007a0a00fffffffffd6301"], &(0x7f0000000000)="47504c00bc3047eb525f484f89fc96dd6ca64da40ff023122e66f6", 0x0, 0xce, &(0x7f0000000300)=""/206}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0xe, 0x5, &(0x7f0000000040)=@framed={{0x18}, [@jmp={0x5}], {0x95}}, &(0x7f00000004c0)="73797a6b584e3e2f9afed6d0ee3d5d5de2f791e4545b69c564e359a02949ab535c1b25caa665b968d2f1a32e3febe4189befa5f044722bae83e5b6959e392e8d24e41b4ce153c97b5a23e135e38d3b1d14ad7a9eeb7069347fee053569544f1a0000000000000000", 0x80000001, 0x466, &(0x7f0000000300)=""/187}, 0x48) openat$sequencer(0xffffffffffffff9c, &(0x7f00005d6000)='/dev/sequencer\x00', 0x0, 0x0) r4 = syz_open_dev$sndtimer(&(0x7f00004f6000)='/dev/snd/timer\x00', 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_SELECT(r4, 0x40345410, &(0x7f0000029fcc)={{0x0, 0x2, 0x0, 0xffefffffffffffff}}) ioctl$SNDRV_TIMER_IOCTL_START(r4, 0x54a0) syz_open_dev$sndtimer(&(0x7f0000000000)='/dev/snd/timer\x00', 0x0, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$SNDRV_CTL_IOCTL_RAWMIDI_PREFER_SUBDEVICE(0xffffffffffffffff, 0x40045542, &(0x7f0000000100)) clone(0xa0718a6924206ffc, &(0x7f0000163000), &(0x7f00001a6000), &(0x7f0000e05ffc), &(0x7f00007c4000)) ioctl$VHOST_SET_MEM_TABLE(r3, 0x4008af03, &(0x7f0000000000)=ANY=[]) r5 = eventfd2(0x0, 0x0) ioctl$VHOST_SET_LOG_FD(r3, 0x4004af07, &(0x7f0000000000)=r5) [ 277.312485] netlink: 3 bytes leftover after parsing attributes in process `syz-executor1'. 2018/04/13 21:33:16 executing program 3: r0 = dup(0xffffffffffffff9c) setsockopt$inet_sctp_SCTP_EVENTS(r0, 0x84, 0xb, &(0x7f0000000640)={0x0, 0x2, 0x2, 0x4, 0x388aa0ca, 0x1f, 0x9, 0x0, 0x0, 0x5, 0x3}, 0xb) setsockopt$inet_int(0xffffffffffffffff, 0x0, 0x0, &(0x7f00000002c0)=0x1000000, 0x4) syz_open_dev$sndctrl(&(0x7f0000000180)='/dev/snd/controlC#\x00', 0x7ca, 0x44000) r1 = perf_event_open(&(0x7f000025c000)={0x0, 0x70, 0x0, 0x0, 0xfffffffffffffffe}, 0x0, 0x0, 0xffffffffffffffff, 0x2) r2 = dup3(0xffffffffffffffff, r1, 0x80000) keyctl$chown(0x4, 0x0, 0x0, 0x0) setsockopt$inet6_MRT6_ADD_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd2, &(0x7f0000000400)={{0xa, 0x0, 0x0, @ipv4={[], [0xff, 0xff], @multicast1=0xe0000001}}, {0xa, 0x0, 0x0, @mcast1={0xff, 0x1, [], 0x1}}}, 0x5c) ioctl$UFFDIO_COPY(r2, 0xc028aa03, &(0x7f0000000800)={&(0x7f0000ff9000/0x4000)=nil, 0x4000}) r3 = openat$vsock(0xffffffffffffff9c, &(0x7f00001b3000)='/dev/vhost-vsock\x00', 0x2, 0x0) bind$vsock_stream(r2, &(0x7f0000000340)={0x28, 0x0, 0x0, @my}, 0x10) ioctl$VHOST_SET_LOG_BASE(r3, 0xaf01, &(0x7f0000000280)=&(0x7f0000989fff)) fcntl$getown(0xffffffffffffffff, 0x9) writev(0xffffffffffffffff, &(0x7f0000fb5ff0), 0x0) perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x0, 0x3, &(0x7f0000000040)=ANY=[@ANYBLOB="180000000000000000000000028000007a0a00fffffffffd6301"], &(0x7f0000000000)="47504c00bc3047eb525f484f89fc96dd6ca64da40ff023122e66f6", 0x0, 0xce, &(0x7f0000000300)=""/206}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0xe, 0x5, &(0x7f0000000040)=@framed={{0x18}, [@jmp={0x5}], {0x95}}, &(0x7f00000004c0)="73797a6b584e3e2f9afed6d0ee3d5d5de2f791e4545b69c564e359a02949ab535c1b25caa665b968d2f1a32e3febe4189befa5f044722bae83e5b6959e392e8d24e41b4ce153c97b5a23e135e38d3b1d14ad7a9eeb7069347fee053569544f1a0000000000000000", 0x80000001, 0x466, &(0x7f0000000300)=""/187}, 0x48) openat$sequencer(0xffffffffffffff9c, &(0x7f00005d6000)='/dev/sequencer\x00', 0x0, 0x0) r4 = syz_open_dev$sndtimer(&(0x7f00004f6000)='/dev/snd/timer\x00', 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_SELECT(r4, 0x40345410, &(0x7f0000029fcc)={{0x0, 0x2, 0x0, 0xffefffffffffffff}}) ioctl$SNDRV_TIMER_IOCTL_START(r4, 0x54a0) syz_open_dev$sndtimer(&(0x7f0000000000)='/dev/snd/timer\x00', 0x0, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$SNDRV_CTL_IOCTL_RAWMIDI_PREFER_SUBDEVICE(0xffffffffffffffff, 0x40045542, &(0x7f0000000100)) clone(0xa0718a6924206ffc, &(0x7f0000163000), &(0x7f00001a6000), &(0x7f0000e05ffc), &(0x7f00007c4000)) ioctl$VHOST_SET_MEM_TABLE(r3, 0x4008af03, &(0x7f0000000000)=ANY=[]) r5 = eventfd2(0x0, 0x0) ioctl$VHOST_SET_LOG_FD(r3, 0x4004af07, &(0x7f0000000000)=r5) 2018/04/13 21:33:17 executing program 4: r0 = dup(0xffffffffffffff9c) setsockopt$inet_sctp_SCTP_EVENTS(r0, 0x84, 0xb, &(0x7f0000000640)={0x0, 0x2, 0x2, 0x4, 0x388aa0ca, 0x1f, 0x9, 0x0, 0x0, 0x5, 0x3}, 0xb) setsockopt$inet_int(0xffffffffffffffff, 0x0, 0x0, &(0x7f00000002c0)=0x1000000, 0x4) syz_open_dev$sndctrl(&(0x7f0000000180)='/dev/snd/controlC#\x00', 0x7ca, 0x44000) r1 = perf_event_open(&(0x7f000025c000)={0x0, 0x70, 0x0, 0x0, 0xfffffffffffffffe}, 0x0, 0x0, 0xffffffffffffffff, 0x2) r2 = dup3(0xffffffffffffffff, r1, 0x80000) keyctl$chown(0x4, 0x0, 0x0, 0x0) setsockopt$inet6_MRT6_ADD_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd2, &(0x7f0000000400)={{0xa, 0x0, 0x0, @ipv4={[], [0xff, 0xff], @multicast1=0xe0000001}}, {0xa, 0x0, 0x0, @mcast1={0xff, 0x1, [], 0x1}}}, 0x5c) ioctl$UFFDIO_COPY(r2, 0xc028aa03, &(0x7f0000000800)={&(0x7f0000ff9000/0x4000)=nil, 0x4000}) r3 = openat$vsock(0xffffffffffffff9c, &(0x7f00001b3000)='/dev/vhost-vsock\x00', 0x2, 0x0) bind$vsock_stream(r2, &(0x7f0000000340)={0x28, 0x0, 0x0, @my}, 0x10) ioctl$VHOST_SET_LOG_BASE(r3, 0xaf01, &(0x7f0000000280)=&(0x7f0000989fff)) fcntl$getown(0xffffffffffffffff, 0x9) writev(0xffffffffffffffff, &(0x7f0000fb5ff0), 0x0) perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x0, 0x3, &(0x7f0000000040)=ANY=[@ANYBLOB="180000000000000000000000028000007a0a00fffffffffd6301"], &(0x7f0000000000)="47504c00bc3047eb525f484f89fc96dd6ca64da40ff023122e66f6", 0x0, 0xce, &(0x7f0000000300)=""/206}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0xe, 0x5, &(0x7f0000000040)=@framed={{0x18}, [@jmp={0x5}], {0x95}}, &(0x7f00000004c0)="73797a6b584e3e2f9afed6d0ee3d5d5de2f791e4545b69c564e359a02949ab535c1b25caa665b968d2f1a32e3febe4189befa5f044722bae83e5b6959e392e8d24e41b4ce153c97b5a23e135e38d3b1d14ad7a9eeb7069347fee053569544f1a0000000000000000", 0x80000001, 0x466, &(0x7f0000000300)=""/187}, 0x48) openat$sequencer(0xffffffffffffff9c, &(0x7f00005d6000)='/dev/sequencer\x00', 0x0, 0x0) r4 = syz_open_dev$sndtimer(&(0x7f00004f6000)='/dev/snd/timer\x00', 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_SELECT(r4, 0x40345410, &(0x7f0000029fcc)={{0x0, 0x2, 0x0, 0xffefffffffffffff}}) ioctl$SNDRV_TIMER_IOCTL_START(r4, 0x54a0) syz_open_dev$sndtimer(&(0x7f0000000000)='/dev/snd/timer\x00', 0x0, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$SNDRV_CTL_IOCTL_RAWMIDI_PREFER_SUBDEVICE(0xffffffffffffffff, 0x40045542, &(0x7f0000000100)) clone(0xa0718a6924206ffc, &(0x7f0000163000), &(0x7f00001a6000), &(0x7f0000e05ffc), &(0x7f00007c4000)) ioctl$VHOST_SET_MEM_TABLE(r3, 0x4008af03, &(0x7f0000000000)=ANY=[]) r5 = eventfd2(0x0, 0x0) ioctl$VHOST_SET_LOG_FD(r3, 0x4004af07, &(0x7f0000000000)=r5) 2018/04/13 21:33:17 executing program 2: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$evdev(&(0x7f0000000180)='/dev/input/event#\x00', 0x2, 0x0) ioctl$EVIOCGRAB(r0, 0x40044590, &(0x7f0000000000)) 2018/04/13 21:33:17 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f000000a000)='./file0\x00', &(0x7f0000014ff8)='./file0\x00', &(0x7f0000014000)='proc\x00', 0x1, &(0x7f0000fc9000)) r0 = open(&(0x7f0000032ff8)='./file0\x00', 0x0, 0x0) unlinkat(r0, &(0x7f0000000180)='./file0\x00', 0x0) 2018/04/13 21:33:17 executing program 1: r0 = socket$inet6_dccp(0xa, 0x6, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f00000000c0)={'team_slave_0\x00', &(0x7f0000000000)=@ethtool_cmd={0x24}}) 2018/04/13 21:33:17 executing program 7: r0 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000080)={'bridge0\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f0000000240)={&(0x7f0000000040)={0x10}, 0xc, &(0x7f0000000200)={&(0x7f0000000180)=@bridge_delneigh={0x28, 0x1d, 0xf07, 0x0, 0x0, {0x7, 0x0, 0x0, r1}, [@NDA_LLADDR={0xa, 0x2, @local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}}]}, 0x28}, 0x1}, 0x0) 2018/04/13 21:33:17 executing program 6: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) utime(&(0x7f0000000080)='./file0\x00', &(0x7f0000a98000)={0x80000000000edf2}) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000100)={0x10004, 0x0, 0x0, 0x1000, &(0x7f0000a98000/0x1000)=nil}) ioctl$KVM_SMI(r2, 0xaeb7) ioctl$KVM_RUN(r2, 0xae80, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f00000b1000/0x18000)=nil, &(0x7f000052c000)=[@text64={0x40, &(0x7f0000159000)="c4e379150e00470fc71b0f23d9b9360900000f32b9530b0000b80f000000ba000000000f30f20f35c421f81748f9460f2395c42251afeb4fdbf4", 0x3a}], 0x1, 0x0, &(0x7f00006edfe0), 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) clone(0x0, &(0x7f0000000000), &(0x7f0000000140), &(0x7f0000000080), &(0x7f0000000280)) ioctl$KVM_RUN(r2, 0xae80, 0x0) 2018/04/13 21:33:17 executing program 0: futex(&(0x7f000000cffc)=0x4, 0x80000000000b, 0x4, &(0x7f0000d8d000)={0x77359400}, &(0x7f0000048000), 0x0) futex(&(0x7f000000cffc), 0x5, 0x0, &(0x7f0000000000)={0x0, 0x989680}, &(0x7f00000000c0), 0x0) 2018/04/13 21:33:17 executing program 5: r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r0, &(0x7f00004c0000)={0xa, 0x3, 0x0, @ipv4={[], [0xff, 0xff]}}, 0x1c) listen(r0, 0x43) r1 = socket$inet6_sctp(0xa, 0x4000000000000001, 0x84) sendto$inet6(r1, &(0x7f0000847fff)='X', 0x1, 0x0, &(0x7f000005ffe4)={0xa, 0x3, 0x0, @loopback={0x0, 0x1}}, 0x1c) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f0000b20000)={0x1, &(0x7f0000d39000)=[{0x6, 0x0, 0x0, 0x3}]}, 0x10) sendmmsg(r1, &(0x7f000070b000)=[{{0x0, 0x0, &(0x7f00007ed000)=[{&(0x7f0000000080)='u', 0x1}], 0x1, &(0x7f0000275000)}}], 0x1, 0x48084) shutdown(r1, 0x1) 2018/04/13 21:33:18 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f000000a000)='./file0\x00', &(0x7f0000014ff8)='./file0\x00', &(0x7f0000014000)='proc\x00', 0x1, &(0x7f0000fc9000)) r0 = open(&(0x7f0000032ff8)='./file0\x00', 0x0, 0x0) unlinkat(r0, &(0x7f0000000180)='./file0\x00', 0x0) 2018/04/13 21:33:18 executing program 7: r0 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000080)={'bridge0\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f0000000240)={&(0x7f0000000040)={0x10}, 0xc, &(0x7f0000000200)={&(0x7f0000000180)=@bridge_delneigh={0x28, 0x1d, 0xf07, 0x0, 0x0, {0x7, 0x0, 0x0, r1}, [@NDA_LLADDR={0xa, 0x2, @local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}}]}, 0x28}, 0x1}, 0x0) 2018/04/13 21:33:18 executing program 1: r0 = socket$inet6_dccp(0xa, 0x6, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f00000000c0)={'team_slave_0\x00', &(0x7f0000000000)=@ethtool_cmd={0x24}}) 2018/04/13 21:33:18 executing program 4: r0 = dup(0xffffffffffffff9c) setsockopt$inet_sctp_SCTP_EVENTS(r0, 0x84, 0xb, &(0x7f0000000640)={0x0, 0x2, 0x2, 0x4, 0x388aa0ca, 0x1f, 0x9, 0x0, 0x0, 0x5, 0x3}, 0xb) setsockopt$inet_int(0xffffffffffffffff, 0x0, 0x0, &(0x7f00000002c0)=0x1000000, 0x4) syz_open_dev$sndctrl(&(0x7f0000000180)='/dev/snd/controlC#\x00', 0x7ca, 0x44000) r1 = perf_event_open(&(0x7f000025c000)={0x0, 0x70, 0x0, 0x0, 0xfffffffffffffffe}, 0x0, 0x0, 0xffffffffffffffff, 0x2) r2 = dup3(0xffffffffffffffff, r1, 0x80000) keyctl$chown(0x4, 0x0, 0x0, 0x0) setsockopt$inet6_MRT6_ADD_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd2, &(0x7f0000000400)={{0xa, 0x0, 0x0, @ipv4={[], [0xff, 0xff], @multicast1=0xe0000001}}, {0xa, 0x0, 0x0, @mcast1={0xff, 0x1, [], 0x1}}}, 0x5c) ioctl$UFFDIO_COPY(r2, 0xc028aa03, &(0x7f0000000800)={&(0x7f0000ff9000/0x4000)=nil, 0x4000}) r3 = openat$vsock(0xffffffffffffff9c, &(0x7f00001b3000)='/dev/vhost-vsock\x00', 0x2, 0x0) bind$vsock_stream(r2, &(0x7f0000000340)={0x28, 0x0, 0x0, @my}, 0x10) ioctl$VHOST_SET_LOG_BASE(r3, 0xaf01, &(0x7f0000000280)=&(0x7f0000989fff)) fcntl$getown(0xffffffffffffffff, 0x9) writev(0xffffffffffffffff, &(0x7f0000fb5ff0), 0x0) perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x0, 0x3, &(0x7f0000000040)=ANY=[@ANYBLOB="180000000000000000000000028000007a0a00fffffffffd6301"], &(0x7f0000000000)="47504c00bc3047eb525f484f89fc96dd6ca64da40ff023122e66f6", 0x0, 0xce, &(0x7f0000000300)=""/206}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0xe, 0x5, &(0x7f0000000040)=@framed={{0x18}, [@jmp={0x5}], {0x95}}, &(0x7f00000004c0)="73797a6b584e3e2f9afed6d0ee3d5d5de2f791e4545b69c564e359a02949ab535c1b25caa665b968d2f1a32e3febe4189befa5f044722bae83e5b6959e392e8d24e41b4ce153c97b5a23e135e38d3b1d14ad7a9eeb7069347fee053569544f1a0000000000000000", 0x80000001, 0x466, &(0x7f0000000300)=""/187}, 0x48) openat$sequencer(0xffffffffffffff9c, &(0x7f00005d6000)='/dev/sequencer\x00', 0x0, 0x0) r4 = syz_open_dev$sndtimer(&(0x7f00004f6000)='/dev/snd/timer\x00', 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_SELECT(r4, 0x40345410, &(0x7f0000029fcc)={{0x0, 0x2, 0x0, 0xffefffffffffffff}}) ioctl$SNDRV_TIMER_IOCTL_START(r4, 0x54a0) syz_open_dev$sndtimer(&(0x7f0000000000)='/dev/snd/timer\x00', 0x0, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$SNDRV_CTL_IOCTL_RAWMIDI_PREFER_SUBDEVICE(0xffffffffffffffff, 0x40045542, &(0x7f0000000100)) clone(0xa0718a6924206ffc, &(0x7f0000163000), &(0x7f00001a6000), &(0x7f0000e05ffc), &(0x7f00007c4000)) ioctl$VHOST_SET_MEM_TABLE(r3, 0x4008af03, &(0x7f0000000000)=ANY=[]) r5 = eventfd2(0x0, 0x0) ioctl$VHOST_SET_LOG_FD(r3, 0x4004af07, &(0x7f0000000000)=r5) 2018/04/13 21:33:18 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f000000a000)='./file0\x00', &(0x7f0000014ff8)='./file0\x00', &(0x7f0000014000)='proc\x00', 0x1, &(0x7f0000fc9000)) r0 = open(&(0x7f0000032ff8)='./file0\x00', 0x0, 0x0) unlinkat(r0, &(0x7f0000000180)='./file0\x00', 0x0) 2018/04/13 21:33:18 executing program 2: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$evdev(&(0x7f0000000180)='/dev/input/event#\x00', 0x2, 0x0) ioctl$EVIOCGRAB(r0, 0x40044590, &(0x7f0000000000)) 2018/04/13 21:33:18 executing program 6: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) utime(&(0x7f0000000080)='./file0\x00', &(0x7f0000a98000)={0x80000000000edf2}) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000100)={0x10004, 0x0, 0x0, 0x1000, &(0x7f0000a98000/0x1000)=nil}) ioctl$KVM_SMI(r2, 0xaeb7) ioctl$KVM_RUN(r2, 0xae80, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f00000b1000/0x18000)=nil, &(0x7f000052c000)=[@text64={0x40, &(0x7f0000159000)="c4e379150e00470fc71b0f23d9b9360900000f32b9530b0000b80f000000ba000000000f30f20f35c421f81748f9460f2395c42251afeb4fdbf4", 0x3a}], 0x1, 0x0, &(0x7f00006edfe0), 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) clone(0x0, &(0x7f0000000000), &(0x7f0000000140), &(0x7f0000000080), &(0x7f0000000280)) ioctl$KVM_RUN(r2, 0xae80, 0x0) 2018/04/13 21:33:18 executing program 0: futex(&(0x7f000000cffc)=0x4, 0x80000000000b, 0x4, &(0x7f0000d8d000)={0x77359400}, &(0x7f0000048000), 0x0) futex(&(0x7f000000cffc), 0x5, 0x0, &(0x7f0000000000)={0x0, 0x989680}, &(0x7f00000000c0), 0x0) 2018/04/13 21:33:18 executing program 5: r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r0, &(0x7f00004c0000)={0xa, 0x3, 0x0, @ipv4={[], [0xff, 0xff]}}, 0x1c) listen(r0, 0x43) r1 = socket$inet6_sctp(0xa, 0x4000000000000001, 0x84) sendto$inet6(r1, &(0x7f0000847fff)='X', 0x1, 0x0, &(0x7f000005ffe4)={0xa, 0x3, 0x0, @loopback={0x0, 0x1}}, 0x1c) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f0000b20000)={0x1, &(0x7f0000d39000)=[{0x6, 0x0, 0x0, 0x3}]}, 0x10) sendmmsg(r1, &(0x7f000070b000)=[{{0x0, 0x0, &(0x7f00007ed000)=[{&(0x7f0000000080)='u', 0x1}], 0x1, &(0x7f0000275000)}}], 0x1, 0x48084) shutdown(r1, 0x1) 2018/04/13 21:33:19 executing program 1: r0 = socket$inet6_dccp(0xa, 0x6, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f00000000c0)={'team_slave_0\x00', &(0x7f0000000000)=@ethtool_cmd={0x24}}) 2018/04/13 21:33:19 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f000000a000)='./file0\x00', &(0x7f0000014ff8)='./file0\x00', &(0x7f0000014000)='proc\x00', 0x1, &(0x7f0000fc9000)) r0 = open(&(0x7f0000032ff8)='./file0\x00', 0x0, 0x0) unlinkat(r0, &(0x7f0000000180)='./file0\x00', 0x0) 2018/04/13 21:33:19 executing program 7: r0 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000080)={'bridge0\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f0000000240)={&(0x7f0000000040)={0x10}, 0xc, &(0x7f0000000200)={&(0x7f0000000180)=@bridge_delneigh={0x28, 0x1d, 0xf07, 0x0, 0x0, {0x7, 0x0, 0x0, r1}, [@NDA_LLADDR={0xa, 0x2, @local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}}]}, 0x28}, 0x1}, 0x0) 2018/04/13 21:33:19 executing program 2: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$evdev(&(0x7f0000000180)='/dev/input/event#\x00', 0x2, 0x0) ioctl$EVIOCGRAB(r0, 0x40044590, &(0x7f0000000000)) 2018/04/13 21:33:19 executing program 4: r0 = dup(0xffffffffffffff9c) setsockopt$inet_sctp_SCTP_EVENTS(r0, 0x84, 0xb, &(0x7f0000000640)={0x0, 0x2, 0x2, 0x4, 0x388aa0ca, 0x1f, 0x9, 0x0, 0x0, 0x5, 0x3}, 0xb) setsockopt$inet_int(0xffffffffffffffff, 0x0, 0x0, &(0x7f00000002c0)=0x1000000, 0x4) syz_open_dev$sndctrl(&(0x7f0000000180)='/dev/snd/controlC#\x00', 0x7ca, 0x44000) r1 = perf_event_open(&(0x7f000025c000)={0x0, 0x70, 0x0, 0x0, 0xfffffffffffffffe}, 0x0, 0x0, 0xffffffffffffffff, 0x2) r2 = dup3(0xffffffffffffffff, r1, 0x80000) keyctl$chown(0x4, 0x0, 0x0, 0x0) setsockopt$inet6_MRT6_ADD_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd2, &(0x7f0000000400)={{0xa, 0x0, 0x0, @ipv4={[], [0xff, 0xff], @multicast1=0xe0000001}}, {0xa, 0x0, 0x0, @mcast1={0xff, 0x1, [], 0x1}}}, 0x5c) ioctl$UFFDIO_COPY(r2, 0xc028aa03, &(0x7f0000000800)={&(0x7f0000ff9000/0x4000)=nil, 0x4000}) r3 = openat$vsock(0xffffffffffffff9c, &(0x7f00001b3000)='/dev/vhost-vsock\x00', 0x2, 0x0) bind$vsock_stream(r2, &(0x7f0000000340)={0x28, 0x0, 0x0, @my}, 0x10) ioctl$VHOST_SET_LOG_BASE(r3, 0xaf01, &(0x7f0000000280)=&(0x7f0000989fff)) fcntl$getown(0xffffffffffffffff, 0x9) writev(0xffffffffffffffff, &(0x7f0000fb5ff0), 0x0) perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x0, 0x3, &(0x7f0000000040)=ANY=[@ANYBLOB="180000000000000000000000028000007a0a00fffffffffd6301"], &(0x7f0000000000)="47504c00bc3047eb525f484f89fc96dd6ca64da40ff023122e66f6", 0x0, 0xce, &(0x7f0000000300)=""/206}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0xe, 0x5, &(0x7f0000000040)=@framed={{0x18}, [@jmp={0x5}], {0x95}}, &(0x7f00000004c0)="73797a6b584e3e2f9afed6d0ee3d5d5de2f791e4545b69c564e359a02949ab535c1b25caa665b968d2f1a32e3febe4189befa5f044722bae83e5b6959e392e8d24e41b4ce153c97b5a23e135e38d3b1d14ad7a9eeb7069347fee053569544f1a0000000000000000", 0x80000001, 0x466, &(0x7f0000000300)=""/187}, 0x48) openat$sequencer(0xffffffffffffff9c, &(0x7f00005d6000)='/dev/sequencer\x00', 0x0, 0x0) r4 = syz_open_dev$sndtimer(&(0x7f00004f6000)='/dev/snd/timer\x00', 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_SELECT(r4, 0x40345410, &(0x7f0000029fcc)={{0x0, 0x2, 0x0, 0xffefffffffffffff}}) ioctl$SNDRV_TIMER_IOCTL_START(r4, 0x54a0) syz_open_dev$sndtimer(&(0x7f0000000000)='/dev/snd/timer\x00', 0x0, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$SNDRV_CTL_IOCTL_RAWMIDI_PREFER_SUBDEVICE(0xffffffffffffffff, 0x40045542, &(0x7f0000000100)) clone(0xa0718a6924206ffc, &(0x7f0000163000), &(0x7f00001a6000), &(0x7f0000e05ffc), &(0x7f00007c4000)) ioctl$VHOST_SET_MEM_TABLE(r3, 0x4008af03, &(0x7f0000000000)=ANY=[]) r5 = eventfd2(0x0, 0x0) ioctl$VHOST_SET_LOG_FD(r3, 0x4004af07, &(0x7f0000000000)=r5) 2018/04/13 21:33:19 executing program 0: futex(&(0x7f000000cffc)=0x4, 0x80000000000b, 0x4, &(0x7f0000d8d000)={0x77359400}, &(0x7f0000048000), 0x0) futex(&(0x7f000000cffc), 0x5, 0x0, &(0x7f0000000000)={0x0, 0x989680}, &(0x7f00000000c0), 0x0) 2018/04/13 21:33:19 executing program 6: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) utime(&(0x7f0000000080)='./file0\x00', &(0x7f0000a98000)={0x80000000000edf2}) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000100)={0x10004, 0x0, 0x0, 0x1000, &(0x7f0000a98000/0x1000)=nil}) ioctl$KVM_SMI(r2, 0xaeb7) ioctl$KVM_RUN(r2, 0xae80, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f00000b1000/0x18000)=nil, &(0x7f000052c000)=[@text64={0x40, &(0x7f0000159000)="c4e379150e00470fc71b0f23d9b9360900000f32b9530b0000b80f000000ba000000000f30f20f35c421f81748f9460f2395c42251afeb4fdbf4", 0x3a}], 0x1, 0x0, &(0x7f00006edfe0), 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) clone(0x0, &(0x7f0000000000), &(0x7f0000000140), &(0x7f0000000080), &(0x7f0000000280)) ioctl$KVM_RUN(r2, 0xae80, 0x0) 2018/04/13 21:33:19 executing program 5: r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r0, &(0x7f00004c0000)={0xa, 0x3, 0x0, @ipv4={[], [0xff, 0xff]}}, 0x1c) listen(r0, 0x43) r1 = socket$inet6_sctp(0xa, 0x4000000000000001, 0x84) sendto$inet6(r1, &(0x7f0000847fff)='X', 0x1, 0x0, &(0x7f000005ffe4)={0xa, 0x3, 0x0, @loopback={0x0, 0x1}}, 0x1c) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f0000b20000)={0x1, &(0x7f0000d39000)=[{0x6, 0x0, 0x0, 0x3}]}, 0x10) sendmmsg(r1, &(0x7f000070b000)=[{{0x0, 0x0, &(0x7f00007ed000)=[{&(0x7f0000000080)='u', 0x1}], 0x1, &(0x7f0000275000)}}], 0x1, 0x48084) shutdown(r1, 0x1) 2018/04/13 21:33:19 executing program 7: r0 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000080)={'bridge0\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f0000000240)={&(0x7f0000000040)={0x10}, 0xc, &(0x7f0000000200)={&(0x7f0000000180)=@bridge_delneigh={0x28, 0x1d, 0xf07, 0x0, 0x0, {0x7, 0x0, 0x0, r1}, [@NDA_LLADDR={0xa, 0x2, @local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}}]}, 0x28}, 0x1}, 0x0) 2018/04/13 21:33:19 executing program 2: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$evdev(&(0x7f0000000180)='/dev/input/event#\x00', 0x2, 0x0) ioctl$EVIOCGRAB(r0, 0x40044590, &(0x7f0000000000)) 2018/04/13 21:33:19 executing program 4: syz_mount_image$ntfs(&(0x7f0000000000)='ntfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f00000002c0), 0x0, &(0x7f0000001d80)=ANY=[@ANYBLOB='show_sys_files']) 2018/04/13 21:33:19 executing program 1: r0 = socket$inet6_dccp(0xa, 0x6, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f00000000c0)={'team_slave_0\x00', &(0x7f0000000000)=@ethtool_cmd={0x24}}) 2018/04/13 21:33:19 executing program 3: r0 = getpid() sched_setattr(r0, &(0x7f0000000080)={0x0, 0x2, 0x0, 0x0, 0x3}, 0x0) mkdir(&(0x7f000082f000)='./control\x00', 0x0) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x1, 0x32, 0xffffffffffffffff, 0x0) r1 = userfaultfd(0x0) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000e4c000)={0xaa}) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000043fe0)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r2 = creat(&(0x7f0000000000)='./control/file0\x00', 0x0) write$sndseq(r2, &(0x7f0000011fd2)=[{0x0, 0x0, 0x0, 0x0, @time, {}, {}, @time=@time={0x77359400}}], 0x30) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x8b, 0x93e, 0x0, 0xfffffffffffff800, 0x0, 0x2, 0x0, 0x0, 0x0, 0x401, 0x7, 0x3ff, 0x40, 0x7f, 0x80008000000000, 0x800, 0x9, 0x7ff, 0x100000000, 0x9, 0x80, 0x9, 0x86, 0x200, 0x5, 0x678c, 0x22a7, 0x1, 0x9, 0x28000, 0x1000, 0x5b62, 0x4bb98695, 0x0, 0x7f, 0x7, 0x0, 0x4d, 0x0, @perf_bp={&(0x7f00000000c0), 0x8}, 0x4, 0x1000, 0x80000000, 0x3, 0xd3c8, 0x0, 0x506}, r0, 0xb, r2, 0x3) rename(&(0x7f0000000040)='./control/file0\x00', &(0x7f0000000080)='./file0\x00') rmdir(&(0x7f0000000100)='./control/file0\x00') close(r1) 2018/04/13 21:33:19 executing program 7: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pipe(&(0x7f0000815000)={0x0, 0x0}) fcntl$setpipe(r0, 0x407, 0x0) 2018/04/13 21:33:19 executing program 1: r0 = syz_open_dev$sndtimer(&(0x7f0000014000)='/dev/snd/timer\x00', 0x0, 0x0) fcntl$setstatus(r0, 0x4, 0x2800) 2018/04/13 21:33:20 executing program 7: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pipe(&(0x7f0000815000)={0x0, 0x0}) fcntl$setpipe(r0, 0x407, 0x0) [ 280.387010] ntfs: (device loop4): ntfs_fill_super(): Unable to determine device size. 2018/04/13 21:33:20 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f0000005000)={&(0x7f0000000000)={0x10}, 0xc, &(0x7f0000000040)={&(0x7f00000000c0)={0x14, 0x14, 0x301, 0x0, 0x0, {0xa}}, 0x14}, 0x1}, 0x0) 2018/04/13 21:33:20 executing program 1: r0 = syz_open_dev$sndtimer(&(0x7f0000014000)='/dev/snd/timer\x00', 0x0, 0x0) fcntl$setstatus(r0, 0x4, 0x2800) 2018/04/13 21:33:20 executing program 4: syz_mount_image$ntfs(&(0x7f0000000000)='ntfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f00000002c0), 0x0, &(0x7f0000001d80)=ANY=[@ANYBLOB='show_sys_files']) [ 280.454826] ntfs: (device loop4): ntfs_fill_super(): Unable to determine device size. 2018/04/13 21:33:20 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f0000005000)={&(0x7f0000000000)={0x10}, 0xc, &(0x7f0000000040)={&(0x7f00000000c0)={0x14, 0x14, 0x301, 0x0, 0x0, {0xa}}, 0x14}, 0x1}, 0x0) 2018/04/13 21:33:20 executing program 7: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pipe(&(0x7f0000815000)={0x0, 0x0}) fcntl$setpipe(r0, 0x407, 0x0) [ 280.536110] ntfs: (device loop4): ntfs_fill_super(): Unable to determine device size. 2018/04/13 21:33:20 executing program 1: r0 = syz_open_dev$sndtimer(&(0x7f0000014000)='/dev/snd/timer\x00', 0x0, 0x0) fcntl$setstatus(r0, 0x4, 0x2800) 2018/04/13 21:33:20 executing program 5: r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r0, &(0x7f00004c0000)={0xa, 0x3, 0x0, @ipv4={[], [0xff, 0xff]}}, 0x1c) listen(r0, 0x43) r1 = socket$inet6_sctp(0xa, 0x4000000000000001, 0x84) sendto$inet6(r1, &(0x7f0000847fff)='X', 0x1, 0x0, &(0x7f000005ffe4)={0xa, 0x3, 0x0, @loopback={0x0, 0x1}}, 0x1c) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f0000b20000)={0x1, &(0x7f0000d39000)=[{0x6, 0x0, 0x0, 0x3}]}, 0x10) sendmmsg(r1, &(0x7f000070b000)=[{{0x0, 0x0, &(0x7f00007ed000)=[{&(0x7f0000000080)='u', 0x1}], 0x1, &(0x7f0000275000)}}], 0x1, 0x48084) shutdown(r1, 0x1) 2018/04/13 21:33:20 executing program 6: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) utime(&(0x7f0000000080)='./file0\x00', &(0x7f0000a98000)={0x80000000000edf2}) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000100)={0x10004, 0x0, 0x0, 0x1000, &(0x7f0000a98000/0x1000)=nil}) ioctl$KVM_SMI(r2, 0xaeb7) ioctl$KVM_RUN(r2, 0xae80, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f00000b1000/0x18000)=nil, &(0x7f000052c000)=[@text64={0x40, &(0x7f0000159000)="c4e379150e00470fc71b0f23d9b9360900000f32b9530b0000b80f000000ba000000000f30f20f35c421f81748f9460f2395c42251afeb4fdbf4", 0x3a}], 0x1, 0x0, &(0x7f00006edfe0), 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) clone(0x0, &(0x7f0000000000), &(0x7f0000000140), &(0x7f0000000080), &(0x7f0000000280)) ioctl$KVM_RUN(r2, 0xae80, 0x0) 2018/04/13 21:33:20 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f0000005000)={&(0x7f0000000000)={0x10}, 0xc, &(0x7f0000000040)={&(0x7f00000000c0)={0x14, 0x14, 0x301, 0x0, 0x0, {0xa}}, 0x14}, 0x1}, 0x0) 2018/04/13 21:33:20 executing program 4: syz_mount_image$ntfs(&(0x7f0000000000)='ntfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f00000002c0), 0x0, &(0x7f0000001d80)=ANY=[@ANYBLOB='show_sys_files']) 2018/04/13 21:33:20 executing program 7: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pipe(&(0x7f0000815000)={0x0, 0x0}) fcntl$setpipe(r0, 0x407, 0x0) 2018/04/13 21:33:20 executing program 0: futex(&(0x7f000000cffc)=0x4, 0x80000000000b, 0x4, &(0x7f0000d8d000)={0x77359400}, &(0x7f0000048000), 0x0) futex(&(0x7f000000cffc), 0x5, 0x0, &(0x7f0000000000)={0x0, 0x989680}, &(0x7f00000000c0), 0x0) 2018/04/13 21:33:20 executing program 3: r0 = getpid() sched_setattr(r0, &(0x7f0000000080)={0x0, 0x2, 0x0, 0x0, 0x3}, 0x0) mkdir(&(0x7f000082f000)='./control\x00', 0x0) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x1, 0x32, 0xffffffffffffffff, 0x0) r1 = userfaultfd(0x0) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000e4c000)={0xaa}) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000043fe0)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r2 = creat(&(0x7f0000000000)='./control/file0\x00', 0x0) write$sndseq(r2, &(0x7f0000011fd2)=[{0x0, 0x0, 0x0, 0x0, @time, {}, {}, @time=@time={0x77359400}}], 0x30) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x8b, 0x93e, 0x0, 0xfffffffffffff800, 0x0, 0x2, 0x0, 0x0, 0x0, 0x401, 0x7, 0x3ff, 0x40, 0x7f, 0x80008000000000, 0x800, 0x9, 0x7ff, 0x100000000, 0x9, 0x80, 0x9, 0x86, 0x200, 0x5, 0x678c, 0x22a7, 0x1, 0x9, 0x28000, 0x1000, 0x5b62, 0x4bb98695, 0x0, 0x7f, 0x7, 0x0, 0x4d, 0x0, @perf_bp={&(0x7f00000000c0), 0x8}, 0x4, 0x1000, 0x80000000, 0x3, 0xd3c8, 0x0, 0x506}, r0, 0xb, r2, 0x3) rename(&(0x7f0000000040)='./control/file0\x00', &(0x7f0000000080)='./file0\x00') rmdir(&(0x7f0000000100)='./control/file0\x00') close(r1) 2018/04/13 21:33:20 executing program 1: r0 = syz_open_dev$sndtimer(&(0x7f0000014000)='/dev/snd/timer\x00', 0x0, 0x0) fcntl$setstatus(r0, 0x4, 0x2800) 2018/04/13 21:33:20 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f0000005000)={&(0x7f0000000000)={0x10}, 0xc, &(0x7f0000000040)={&(0x7f00000000c0)={0x14, 0x14, 0x301, 0x0, 0x0, {0xa}}, 0x14}, 0x1}, 0x0) 2018/04/13 21:33:20 executing program 4: syz_mount_image$ntfs(&(0x7f0000000000)='ntfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f00000002c0), 0x0, &(0x7f0000001d80)=ANY=[@ANYBLOB='show_sys_files']) [ 281.321718] ntfs: (device loop4): ntfs_fill_super(): Unable to determine device size. 2018/04/13 21:33:20 executing program 7: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000f4eff8)='./file0\x00', 0x0) mount(&(0x7f0000001180)='./file0\x00', &(0x7f00000000c0)='./file0\x00', &(0x7f00000011c0)='autofs\x00', 0x0, &(0x7f0000000040)) 2018/04/13 21:33:20 executing program 1: syz_open_dev$sndtimer(&(0x7f0000014000)='/dev/snd/timer\x00', 0x0, 0x0) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000040)={0xffffffffffffffff, &(0x7f00000000c0)="b82283392dc50ff1fb635a5849d2f5916ae2fdc24e95e12aa8daccf7393e72be9cc66f"}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f0000346fd4)={0x0, 0x0, 0x0, 0x1000000000000004, 0x202}, 0x2c) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x1, 0x5, &(0x7f0000346fc8)=@framed={{0x18}, [@alu={0x8000000201a7f19, 0x0, 0x7, 0x0, 0x1}], {0x95}}, &(0x7f0000f6bffb)='GPL\x00', 0x0, 0x299, &(0x7f00001a7f05)=""/251}, 0x18) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000140)={r0, 0x50, &(0x7f00000000c0)}, 0x10) socketpair$inet_icmp(0x13, 0x4004092b, 0xfffffffe, &(0x7f0000000380)) 2018/04/13 21:33:20 executing program 2: mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0x7, 0x31, 0xffffffffffffffff, 0x0) mbind(&(0x7f0000024000/0xc00000)=nil, 0xc00000, 0x3, &(0x7f0000c28000)=0x800003f, 0xf0, 0x0) openat$sequencer(0xffffffffffffff9c, &(0x7f0000234ff1)='/dev/sequencer\x00', 0x0, 0x0) 2018/04/13 21:33:20 executing program 6: r0 = socket$inet(0x2, 0x2, 0x0) setsockopt$inet_int(r0, 0x0, 0x7, &(0x7f0000000000)=0xff, 0x4) setsockopt$SO_TIMESTAMPING(r0, 0x1, 0x25, &(0x7f0000469ffc)=0x7fe, 0x4) sendto$inet(r0, &(0x7f0000edf000), 0x0, 0x0, &(0x7f0000ee9ff0)={0x2, 0x4e20}, 0x10) setsockopt$inet_opts(r0, 0x0, 0x6, &(0x7f0000000140)="0f", 0x1) recvmsg(r0, &(0x7f0000bd9000)={0x0, 0x0, &(0x7f0000000000), 0x0, &(0x7f00009fdfaf)=""/81, 0x51}, 0x40002106) [ 281.411078] ntfs: (device loop4): ntfs_fill_super(): Unable to determine device size. 2018/04/13 21:33:21 executing program 4: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_sctp(0x2, 0x1, 0x84) setsockopt$inet_sctp_SCTP_MAXSEG(r0, 0x84, 0xd, &(0x7f00000001c0)=@assoc_value={0x0, 0x4}, 0x8) [ 281.454891] autofs4:pid:19859:autofs4_fill_super: called with bogus options [ 281.494241] autofs4:pid:19870:autofs4_fill_super: called with bogus options 2018/04/13 21:33:21 executing program 1: syz_open_dev$sndtimer(&(0x7f0000014000)='/dev/snd/timer\x00', 0x0, 0x0) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000040)={0xffffffffffffffff, &(0x7f00000000c0)="b82283392dc50ff1fb635a5849d2f5916ae2fdc24e95e12aa8daccf7393e72be9cc66f"}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f0000346fd4)={0x0, 0x0, 0x0, 0x1000000000000004, 0x202}, 0x2c) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x1, 0x5, &(0x7f0000346fc8)=@framed={{0x18}, [@alu={0x8000000201a7f19, 0x0, 0x7, 0x0, 0x1}], {0x95}}, &(0x7f0000f6bffb)='GPL\x00', 0x0, 0x299, &(0x7f00001a7f05)=""/251}, 0x18) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000140)={r0, 0x50, &(0x7f00000000c0)}, 0x10) socketpair$inet_icmp(0x13, 0x4004092b, 0xfffffffe, &(0x7f0000000380)) 2018/04/13 21:33:21 executing program 5: r0 = syz_open_dev$vcsa(&(0x7f0000000000)='/dev/vcsa#\x00', 0x8dc, 0x8040) r1 = open(&(0x7f0000000140)='./file0\x00', 0x2200, 0x154) connect$pptp(r1, &(0x7f0000000180)={0x18, 0x2, {0x0, @dev={0xac, 0x14, 0x14, 0x18}}}, 0x1e) ioctl$LOOP_CHANGE_FD(r0, 0x4c06, r1) r2 = syz_open_dev$evdev(&(0x7f0000057fee)='/dev/input/event#\x00', 0xafd, 0x8000040000001) ioctl$EVIOCSMASK(r2, 0x40104593, &(0x7f0000000040)={0x0, 0xa8, &(0x7f0000000080)="86f7b87354686156f65402007141d61cb010b71aa365b23148bb1100984f836f909e811d0000007e50000000000000b31eaf108100000000000000331d4482a58207f82cd83d02d2ad4f6e16cd44a89fd9160654e1e5a973419ce0f9c558858aad53fb2f3fa5a0f072cc3e2cc463dbb943880e430a01e4c0faa1da0200000000000000848c600665a70391a4b0fc9c3e6698f0e89f33b022cae8aa1f565de3858eeab392fcada143"}) write$evdev(r2, &(0x7f00008c1fd0)=[{{}, 0x2, 0x0, 0x40c}, {}], 0x30) 2018/04/13 21:33:21 executing program 2: mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0x7, 0x31, 0xffffffffffffffff, 0x0) mbind(&(0x7f0000024000/0xc00000)=nil, 0xc00000, 0x3, &(0x7f0000c28000)=0x800003f, 0xf0, 0x0) openat$sequencer(0xffffffffffffff9c, &(0x7f0000234ff1)='/dev/sequencer\x00', 0x0, 0x0) 2018/04/13 21:33:21 executing program 6: r0 = socket$inet(0x2, 0x2, 0x0) setsockopt$inet_int(r0, 0x0, 0x7, &(0x7f0000000000)=0xff, 0x4) setsockopt$SO_TIMESTAMPING(r0, 0x1, 0x25, &(0x7f0000469ffc)=0x7fe, 0x4) sendto$inet(r0, &(0x7f0000edf000), 0x0, 0x0, &(0x7f0000ee9ff0)={0x2, 0x4e20}, 0x10) setsockopt$inet_opts(r0, 0x0, 0x6, &(0x7f0000000140)="0f", 0x1) recvmsg(r0, &(0x7f0000bd9000)={0x0, 0x0, &(0x7f0000000000), 0x0, &(0x7f00009fdfaf)=""/81, 0x51}, 0x40002106) 2018/04/13 21:33:21 executing program 7: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000f4eff8)='./file0\x00', 0x0) mount(&(0x7f0000001180)='./file0\x00', &(0x7f00000000c0)='./file0\x00', &(0x7f00000011c0)='autofs\x00', 0x0, &(0x7f0000000040)) 2018/04/13 21:33:21 executing program 4: r0 = socket$inet(0x2, 0x2, 0x0) setsockopt$inet_int(r0, 0x0, 0x7, &(0x7f0000000000)=0xff, 0x4) setsockopt$SO_TIMESTAMPING(r0, 0x1, 0x25, &(0x7f0000469ffc)=0x7fe, 0x4) sendto$inet(r0, &(0x7f0000edf000), 0x0, 0x0, &(0x7f0000ee9ff0)={0x2, 0x4e20}, 0x10) setsockopt$inet_opts(r0, 0x0, 0x6, &(0x7f0000000140)="0f", 0x1) recvmsg(r0, &(0x7f0000bd9000)={0x0, 0x0, &(0x7f0000000000), 0x0, &(0x7f00009fdfaf)=""/81, 0x51}, 0x40002106) 2018/04/13 21:33:21 executing program 0: r0 = socket$inet(0x2, 0x2, 0x0) setsockopt$inet_int(r0, 0x0, 0x7, &(0x7f0000000000)=0xff, 0x4) setsockopt$SO_TIMESTAMPING(r0, 0x1, 0x25, &(0x7f0000469ffc)=0x7fe, 0x4) sendto$inet(r0, &(0x7f0000edf000), 0x0, 0x0, &(0x7f0000ee9ff0)={0x2, 0x4e20}, 0x10) setsockopt$inet_opts(r0, 0x0, 0x6, &(0x7f0000000140)="0f", 0x1) recvmsg(r0, &(0x7f0000bd9000)={0x0, 0x0, &(0x7f0000000000), 0x0, &(0x7f00009fdfaf)=""/81, 0x51}, 0x40002106) 2018/04/13 21:33:21 executing program 3: r0 = getpid() sched_setattr(r0, &(0x7f0000000080)={0x0, 0x2, 0x0, 0x0, 0x3}, 0x0) mkdir(&(0x7f000082f000)='./control\x00', 0x0) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x1, 0x32, 0xffffffffffffffff, 0x0) r1 = userfaultfd(0x0) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000e4c000)={0xaa}) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000043fe0)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r2 = creat(&(0x7f0000000000)='./control/file0\x00', 0x0) write$sndseq(r2, &(0x7f0000011fd2)=[{0x0, 0x0, 0x0, 0x0, @time, {}, {}, @time=@time={0x77359400}}], 0x30) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x8b, 0x93e, 0x0, 0xfffffffffffff800, 0x0, 0x2, 0x0, 0x0, 0x0, 0x401, 0x7, 0x3ff, 0x40, 0x7f, 0x80008000000000, 0x800, 0x9, 0x7ff, 0x100000000, 0x9, 0x80, 0x9, 0x86, 0x200, 0x5, 0x678c, 0x22a7, 0x1, 0x9, 0x28000, 0x1000, 0x5b62, 0x4bb98695, 0x0, 0x7f, 0x7, 0x0, 0x4d, 0x0, @perf_bp={&(0x7f00000000c0), 0x8}, 0x4, 0x1000, 0x80000000, 0x3, 0xd3c8, 0x0, 0x506}, r0, 0xb, r2, 0x3) rename(&(0x7f0000000040)='./control/file0\x00', &(0x7f0000000080)='./file0\x00') rmdir(&(0x7f0000000100)='./control/file0\x00') close(r1) 2018/04/13 21:33:21 executing program 0: r0 = socket$inet(0x2, 0x2, 0x0) setsockopt$inet_int(r0, 0x0, 0x7, &(0x7f0000000000)=0xff, 0x4) setsockopt$SO_TIMESTAMPING(r0, 0x1, 0x25, &(0x7f0000469ffc)=0x7fe, 0x4) sendto$inet(r0, &(0x7f0000edf000), 0x0, 0x0, &(0x7f0000ee9ff0)={0x2, 0x4e20}, 0x10) setsockopt$inet_opts(r0, 0x0, 0x6, &(0x7f0000000140)="0f", 0x1) recvmsg(r0, &(0x7f0000bd9000)={0x0, 0x0, &(0x7f0000000000), 0x0, &(0x7f00009fdfaf)=""/81, 0x51}, 0x40002106) 2018/04/13 21:33:21 executing program 2: mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0x7, 0x31, 0xffffffffffffffff, 0x0) mbind(&(0x7f0000024000/0xc00000)=nil, 0xc00000, 0x3, &(0x7f0000c28000)=0x800003f, 0xf0, 0x0) openat$sequencer(0xffffffffffffff9c, &(0x7f0000234ff1)='/dev/sequencer\x00', 0x0, 0x0) 2018/04/13 21:33:21 executing program 6: r0 = socket$inet(0x2, 0x2, 0x0) setsockopt$inet_int(r0, 0x0, 0x7, &(0x7f0000000000)=0xff, 0x4) setsockopt$SO_TIMESTAMPING(r0, 0x1, 0x25, &(0x7f0000469ffc)=0x7fe, 0x4) sendto$inet(r0, &(0x7f0000edf000), 0x0, 0x0, &(0x7f0000ee9ff0)={0x2, 0x4e20}, 0x10) setsockopt$inet_opts(r0, 0x0, 0x6, &(0x7f0000000140)="0f", 0x1) recvmsg(r0, &(0x7f0000bd9000)={0x0, 0x0, &(0x7f0000000000), 0x0, &(0x7f00009fdfaf)=""/81, 0x51}, 0x40002106) 2018/04/13 21:33:21 executing program 5: r0 = syz_open_dev$vcsa(&(0x7f0000000000)='/dev/vcsa#\x00', 0x8dc, 0x8040) r1 = open(&(0x7f0000000140)='./file0\x00', 0x2200, 0x154) connect$pptp(r1, &(0x7f0000000180)={0x18, 0x2, {0x0, @dev={0xac, 0x14, 0x14, 0x18}}}, 0x1e) ioctl$LOOP_CHANGE_FD(r0, 0x4c06, r1) r2 = syz_open_dev$evdev(&(0x7f0000057fee)='/dev/input/event#\x00', 0xafd, 0x8000040000001) ioctl$EVIOCSMASK(r2, 0x40104593, &(0x7f0000000040)={0x0, 0xa8, &(0x7f0000000080)="86f7b87354686156f65402007141d61cb010b71aa365b23148bb1100984f836f909e811d0000007e50000000000000b31eaf108100000000000000331d4482a58207f82cd83d02d2ad4f6e16cd44a89fd9160654e1e5a973419ce0f9c558858aad53fb2f3fa5a0f072cc3e2cc463dbb943880e430a01e4c0faa1da0200000000000000848c600665a70391a4b0fc9c3e6698f0e89f33b022cae8aa1f565de3858eeab392fcada143"}) write$evdev(r2, &(0x7f00008c1fd0)=[{{}, 0x2, 0x0, 0x40c}, {}], 0x30) 2018/04/13 21:33:21 executing program 4: r0 = socket$inet(0x2, 0x2, 0x0) setsockopt$inet_int(r0, 0x0, 0x7, &(0x7f0000000000)=0xff, 0x4) setsockopt$SO_TIMESTAMPING(r0, 0x1, 0x25, &(0x7f0000469ffc)=0x7fe, 0x4) sendto$inet(r0, &(0x7f0000edf000), 0x0, 0x0, &(0x7f0000ee9ff0)={0x2, 0x4e20}, 0x10) setsockopt$inet_opts(r0, 0x0, 0x6, &(0x7f0000000140)="0f", 0x1) recvmsg(r0, &(0x7f0000bd9000)={0x0, 0x0, &(0x7f0000000000), 0x0, &(0x7f00009fdfaf)=""/81, 0x51}, 0x40002106) [ 282.246688] autofs4:pid:19895:autofs4_fill_super: called with bogus options 2018/04/13 21:33:21 executing program 1: syz_open_dev$sndtimer(&(0x7f0000014000)='/dev/snd/timer\x00', 0x0, 0x0) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000040)={0xffffffffffffffff, &(0x7f00000000c0)="b82283392dc50ff1fb635a5849d2f5916ae2fdc24e95e12aa8daccf7393e72be9cc66f"}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f0000346fd4)={0x0, 0x0, 0x0, 0x1000000000000004, 0x202}, 0x2c) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x1, 0x5, &(0x7f0000346fc8)=@framed={{0x18}, [@alu={0x8000000201a7f19, 0x0, 0x7, 0x0, 0x1}], {0x95}}, &(0x7f0000f6bffb)='GPL\x00', 0x0, 0x299, &(0x7f00001a7f05)=""/251}, 0x18) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000140)={r0, 0x50, &(0x7f00000000c0)}, 0x10) socketpair$inet_icmp(0x13, 0x4004092b, 0xfffffffe, &(0x7f0000000380)) 2018/04/13 21:33:21 executing program 2: mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0x7, 0x31, 0xffffffffffffffff, 0x0) mbind(&(0x7f0000024000/0xc00000)=nil, 0xc00000, 0x3, &(0x7f0000c28000)=0x800003f, 0xf0, 0x0) openat$sequencer(0xffffffffffffff9c, &(0x7f0000234ff1)='/dev/sequencer\x00', 0x0, 0x0) 2018/04/13 21:33:21 executing program 6: r0 = socket$inet(0x2, 0x2, 0x0) setsockopt$inet_int(r0, 0x0, 0x7, &(0x7f0000000000)=0xff, 0x4) setsockopt$SO_TIMESTAMPING(r0, 0x1, 0x25, &(0x7f0000469ffc)=0x7fe, 0x4) sendto$inet(r0, &(0x7f0000edf000), 0x0, 0x0, &(0x7f0000ee9ff0)={0x2, 0x4e20}, 0x10) setsockopt$inet_opts(r0, 0x0, 0x6, &(0x7f0000000140)="0f", 0x1) recvmsg(r0, &(0x7f0000bd9000)={0x0, 0x0, &(0x7f0000000000), 0x0, &(0x7f00009fdfaf)=""/81, 0x51}, 0x40002106) 2018/04/13 21:33:21 executing program 7: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000f4eff8)='./file0\x00', 0x0) mount(&(0x7f0000001180)='./file0\x00', &(0x7f00000000c0)='./file0\x00', &(0x7f00000011c0)='autofs\x00', 0x0, &(0x7f0000000040)) 2018/04/13 21:33:21 executing program 1: syz_open_dev$sndtimer(&(0x7f0000014000)='/dev/snd/timer\x00', 0x0, 0x0) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000040)={0xffffffffffffffff, &(0x7f00000000c0)="b82283392dc50ff1fb635a5849d2f5916ae2fdc24e95e12aa8daccf7393e72be9cc66f"}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f0000346fd4)={0x0, 0x0, 0x0, 0x1000000000000004, 0x202}, 0x2c) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x1, 0x5, &(0x7f0000346fc8)=@framed={{0x18}, [@alu={0x8000000201a7f19, 0x0, 0x7, 0x0, 0x1}], {0x95}}, &(0x7f0000f6bffb)='GPL\x00', 0x0, 0x299, &(0x7f00001a7f05)=""/251}, 0x18) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000140)={r0, 0x50, &(0x7f00000000c0)}, 0x10) socketpair$inet_icmp(0x13, 0x4004092b, 0xfffffffe, &(0x7f0000000380)) [ 282.398891] autofs4:pid:19919:autofs4_fill_super: called with bogus options 2018/04/13 21:33:22 executing program 4: r0 = socket$inet(0x2, 0x2, 0x0) setsockopt$inet_int(r0, 0x0, 0x7, &(0x7f0000000000)=0xff, 0x4) setsockopt$SO_TIMESTAMPING(r0, 0x1, 0x25, &(0x7f0000469ffc)=0x7fe, 0x4) sendto$inet(r0, &(0x7f0000edf000), 0x0, 0x0, &(0x7f0000ee9ff0)={0x2, 0x4e20}, 0x10) setsockopt$inet_opts(r0, 0x0, 0x6, &(0x7f0000000140)="0f", 0x1) recvmsg(r0, &(0x7f0000bd9000)={0x0, 0x0, &(0x7f0000000000), 0x0, &(0x7f00009fdfaf)=""/81, 0x51}, 0x40002106) 2018/04/13 21:33:22 executing program 0: r0 = socket$inet(0x2, 0x2, 0x0) setsockopt$inet_int(r0, 0x0, 0x7, &(0x7f0000000000)=0xff, 0x4) setsockopt$SO_TIMESTAMPING(r0, 0x1, 0x25, &(0x7f0000469ffc)=0x7fe, 0x4) sendto$inet(r0, &(0x7f0000edf000), 0x0, 0x0, &(0x7f0000ee9ff0)={0x2, 0x4e20}, 0x10) setsockopt$inet_opts(r0, 0x0, 0x6, &(0x7f0000000140)="0f", 0x1) recvmsg(r0, &(0x7f0000bd9000)={0x0, 0x0, &(0x7f0000000000), 0x0, &(0x7f00009fdfaf)=""/81, 0x51}, 0x40002106) 2018/04/13 21:33:22 executing program 5: r0 = syz_open_dev$vcsa(&(0x7f0000000000)='/dev/vcsa#\x00', 0x8dc, 0x8040) r1 = open(&(0x7f0000000140)='./file0\x00', 0x2200, 0x154) connect$pptp(r1, &(0x7f0000000180)={0x18, 0x2, {0x0, @dev={0xac, 0x14, 0x14, 0x18}}}, 0x1e) ioctl$LOOP_CHANGE_FD(r0, 0x4c06, r1) r2 = syz_open_dev$evdev(&(0x7f0000057fee)='/dev/input/event#\x00', 0xafd, 0x8000040000001) ioctl$EVIOCSMASK(r2, 0x40104593, &(0x7f0000000040)={0x0, 0xa8, &(0x7f0000000080)="86f7b87354686156f65402007141d61cb010b71aa365b23148bb1100984f836f909e811d0000007e50000000000000b31eaf108100000000000000331d4482a58207f82cd83d02d2ad4f6e16cd44a89fd9160654e1e5a973419ce0f9c558858aad53fb2f3fa5a0f072cc3e2cc463dbb943880e430a01e4c0faa1da0200000000000000848c600665a70391a4b0fc9c3e6698f0e89f33b022cae8aa1f565de3858eeab392fcada143"}) write$evdev(r2, &(0x7f00008c1fd0)=[{{}, 0x2, 0x0, 0x40c}, {}], 0x30) 2018/04/13 21:33:22 executing program 2: r0 = syz_open_dev$vcsa(&(0x7f0000000000)='/dev/vcsa#\x00', 0x8dc, 0x8040) r1 = open(&(0x7f0000000140)='./file0\x00', 0x2200, 0x154) connect$pptp(r1, &(0x7f0000000180)={0x18, 0x2, {0x0, @dev={0xac, 0x14, 0x14, 0x18}}}, 0x1e) ioctl$LOOP_CHANGE_FD(r0, 0x4c06, r1) r2 = syz_open_dev$evdev(&(0x7f0000057fee)='/dev/input/event#\x00', 0xafd, 0x8000040000001) ioctl$EVIOCSMASK(r2, 0x40104593, &(0x7f0000000040)={0x0, 0xa8, &(0x7f0000000080)="86f7b87354686156f65402007141d61cb010b71aa365b23148bb1100984f836f909e811d0000007e50000000000000b31eaf108100000000000000331d4482a58207f82cd83d02d2ad4f6e16cd44a89fd9160654e1e5a973419ce0f9c558858aad53fb2f3fa5a0f072cc3e2cc463dbb943880e430a01e4c0faa1da0200000000000000848c600665a70391a4b0fc9c3e6698f0e89f33b022cae8aa1f565de3858eeab392fcada143"}) write$evdev(r2, &(0x7f00008c1fd0)=[{{}, 0x2, 0x0, 0x40c}, {}], 0x30) 2018/04/13 21:33:22 executing program 6: r0 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) setsockopt$bt_BT_VOICE(r0, 0x112, 0xb, &(0x7f0000000000)=0x3, 0x2) 2018/04/13 21:33:22 executing program 1: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$rdma_cm(0xffffffffffffffff, &(0x7f0000003e00)=ANY=[@ANYBLOB="fbffffe9070000fa"], 0x8) r1 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000100)='/dev/mixer\x00', 0x10080, 0x0) write$rdma_cm(r1, &(0x7f0000000640)=@create_id={0x0, 0x18, 0xfa00, {0x3, &(0x7f0000000600)={0xffffffff}, 0x1, 0x1000}}, 0x20) write$rdma_cm(r0, &(0x7f0000000680)=@disconnect={0xa, 0x4, 0xfa00, {r2}}, 0xc) setsockopt$RDS_GET_MR(r1, 0x114, 0x2, &(0x7f0000000440)={{&(0x7f0000000380)=""/116, 0x74}, &(0x7f0000000400), 0x40}, 0x20) write$rdma_cm(r0, &(0x7f0000000040)=ANY=[@ANYBLOB='\a\x00\x00\x00\b\x00'], 0x6) mmap(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x0, 0x10, r0, 0x0) write$rdma_cm(r0, &(0x7f0000000ac0)=@create_id={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000a80)={0xffffffff}, 0x13f, 0x6}}, 0x20) write$rdma_cm(r0, &(0x7f0000000300)=@destroy_id={0x1, 0x0, 0xfa00, {&(0x7f0000000340), r3}}, 0x9) r4 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r4, &(0x7f0000005000)={&(0x7f0000000000)={0x10}, 0xc, &(0x7f000000d379)={&(0x7f0000013db4)={0x14, 0x1e, 0x2ff}, 0x14}, 0x1}, 0x0) sendto$inet(r1, &(0x7f0000000480)="86f38271ee42f2d63f6466b2c3a1bbc5f4848750ad5bcaed34c125dce4a1f81ce7270ebb92f430f2ef7186e9f921989fcebb4f37dd1866ffe3739f8de119ba76fed4e211541a3d1cebecce9e1e021773d5463b2605f41c7bbf258b6e51128b6d93041a8599cd28e9c2a387b82defeb471deb16ab05fe7e14a9aa55723fc59f6e32a3d1e9454c00b73b99511b5368dbd11fd671d9f83c53bb837e9d84b4e81ad78e0d4b1f61349a1eecc3d80d60fb3f5d6da6182b044b4110c072", 0xba, 0x4008044, &(0x7f00000001c0)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x13}}, 0x10) r5 = syz_open_dev$vcsn(&(0x7f0000000040)='/dev/vcs#\x00', 0x2, 0x400040) r6 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000280)='IPVS\x00') sendmsg$IPVS_CMD_SET_INFO(r4, &(0x7f0000000380)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x30080000}, 0xc, &(0x7f0000000340)={&(0x7f00000002c0)={0x7c, r6, 0x100, 0x70bd25, 0x25dfdbfb, {0xe}, [@IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0x3f}, @IPVS_CMD_ATTR_DEST={0x1c, 0x2, [@IPVS_DEST_ATTR_WEIGHT={0x8, 0x4, 0x8}, @IPVS_DEST_ATTR_ACTIVE_CONNS={0x8, 0x7, 0x493}, @IPVS_DEST_ATTR_FWD_METHOD={0x8, 0x3, 0x6}]}, @IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0x3}, @IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0x5}, @IPVS_CMD_ATTR_SERVICE={0x34, 0x1, [@IPVS_SVC_ATTR_PE_NAME={0x8, 0xb, 'sip\x00'}, @IPVS_SVC_ATTR_SCHED_NAME={0x8, 0x6, 'wlc\x00'}, @IPVS_SVC_ATTR_FWMARK={0x8, 0x5}, @IPVS_SVC_ATTR_SCHED_NAME={0x8, 0x6, 'nq\x00'}, @IPVS_SVC_ATTR_NETMASK={0x8, 0x9, 0x67}, @IPVS_SVC_ATTR_AF={0x8, 0x1, 0x2}]}]}, 0x7c}, 0x1, 0x0, 0x0, 0x24040040}, 0x4040) getsockopt$inet_sctp6_SCTP_RESET_STREAMS(r5, 0x84, 0x77, &(0x7f0000000200)={0x0, 0xfffffffffffffffb, 0x5, [0x8, 0x2, 0x4, 0x1f, 0x5]}, &(0x7f0000000540)=0x12) getsockopt$inet_sctp_SCTP_LOCAL_AUTH_CHUNKS(r1, 0x84, 0x1b, &(0x7f00000006c0)={r7, 0xe3, "f155dbb1bb41f85392c17dc56db6c711f6f1f23bd73b67e1705a499e4509f6a8a8d0915a7c39e745231272f4eb7599c1c368eaae71d19111e419391e192f2ca61d8cbe2a8ce9d44f3ea3ad10778e8b00147adb8e7f50196a5fae7486ab84f19d9d1a1a08bcd89dda55b9c0455d4482d81982bac5e8ffda71251c6057dd841032d9418f3fa42f7f2e2b3798d1e434ceec0feb6e9b01140c568b5e8e1ad3e700dbd0d2bcc7e45f44f0050b9ec54b261c69cb0ef8ebbb1ebde5dde3cc7d7df324f939398f6cc386eac0511d1e101de0a98667d6898035782432b7c1df01a415e53a9c2cc1"}, &(0x7f0000000580)=0xeb) getsockopt$inet6_dccp_buf(r5, 0x21, 0xf, &(0x7f0000000080)=""/200, &(0x7f0000000180)=0xc8) 2018/04/13 21:33:22 executing program 3: r0 = getpid() sched_setattr(r0, &(0x7f0000000080)={0x0, 0x2, 0x0, 0x0, 0x3}, 0x0) mkdir(&(0x7f000082f000)='./control\x00', 0x0) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x1, 0x32, 0xffffffffffffffff, 0x0) r1 = userfaultfd(0x0) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000e4c000)={0xaa}) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000043fe0)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r2 = creat(&(0x7f0000000000)='./control/file0\x00', 0x0) write$sndseq(r2, &(0x7f0000011fd2)=[{0x0, 0x0, 0x0, 0x0, @time, {}, {}, @time=@time={0x77359400}}], 0x30) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x8b, 0x93e, 0x0, 0xfffffffffffff800, 0x0, 0x2, 0x0, 0x0, 0x0, 0x401, 0x7, 0x3ff, 0x40, 0x7f, 0x80008000000000, 0x800, 0x9, 0x7ff, 0x100000000, 0x9, 0x80, 0x9, 0x86, 0x200, 0x5, 0x678c, 0x22a7, 0x1, 0x9, 0x28000, 0x1000, 0x5b62, 0x4bb98695, 0x0, 0x7f, 0x7, 0x0, 0x4d, 0x0, @perf_bp={&(0x7f00000000c0), 0x8}, 0x4, 0x1000, 0x80000000, 0x3, 0xd3c8, 0x0, 0x506}, r0, 0xb, r2, 0x3) rename(&(0x7f0000000040)='./control/file0\x00', &(0x7f0000000080)='./file0\x00') rmdir(&(0x7f0000000100)='./control/file0\x00') close(r1) 2018/04/13 21:33:22 executing program 7: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000f4eff8)='./file0\x00', 0x0) mount(&(0x7f0000001180)='./file0\x00', &(0x7f00000000c0)='./file0\x00', &(0x7f00000011c0)='autofs\x00', 0x0, &(0x7f0000000040)) 2018/04/13 21:33:22 executing program 6: r0 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) setsockopt$bt_BT_VOICE(r0, 0x112, 0xb, &(0x7f0000000000)=0x3, 0x2) 2018/04/13 21:33:22 executing program 5: r0 = syz_open_dev$vcsa(&(0x7f0000000000)='/dev/vcsa#\x00', 0x8dc, 0x8040) r1 = open(&(0x7f0000000140)='./file0\x00', 0x2200, 0x154) connect$pptp(r1, &(0x7f0000000180)={0x18, 0x2, {0x0, @dev={0xac, 0x14, 0x14, 0x18}}}, 0x1e) ioctl$LOOP_CHANGE_FD(r0, 0x4c06, r1) r2 = syz_open_dev$evdev(&(0x7f0000057fee)='/dev/input/event#\x00', 0xafd, 0x8000040000001) ioctl$EVIOCSMASK(r2, 0x40104593, &(0x7f0000000040)={0x0, 0xa8, &(0x7f0000000080)="86f7b87354686156f65402007141d61cb010b71aa365b23148bb1100984f836f909e811d0000007e50000000000000b31eaf108100000000000000331d4482a58207f82cd83d02d2ad4f6e16cd44a89fd9160654e1e5a973419ce0f9c558858aad53fb2f3fa5a0f072cc3e2cc463dbb943880e430a01e4c0faa1da0200000000000000848c600665a70391a4b0fc9c3e6698f0e89f33b022cae8aa1f565de3858eeab392fcada143"}) write$evdev(r2, &(0x7f00008c1fd0)=[{{}, 0x2, 0x0, 0x40c}, {}], 0x30) 2018/04/13 21:33:22 executing program 2: r0 = syz_open_dev$vcsa(&(0x7f0000000000)='/dev/vcsa#\x00', 0x8dc, 0x8040) r1 = open(&(0x7f0000000140)='./file0\x00', 0x2200, 0x154) connect$pptp(r1, &(0x7f0000000180)={0x18, 0x2, {0x0, @dev={0xac, 0x14, 0x14, 0x18}}}, 0x1e) ioctl$LOOP_CHANGE_FD(r0, 0x4c06, r1) r2 = syz_open_dev$evdev(&(0x7f0000057fee)='/dev/input/event#\x00', 0xafd, 0x8000040000001) ioctl$EVIOCSMASK(r2, 0x40104593, &(0x7f0000000040)={0x0, 0xa8, &(0x7f0000000080)="86f7b87354686156f65402007141d61cb010b71aa365b23148bb1100984f836f909e811d0000007e50000000000000b31eaf108100000000000000331d4482a58207f82cd83d02d2ad4f6e16cd44a89fd9160654e1e5a973419ce0f9c558858aad53fb2f3fa5a0f072cc3e2cc463dbb943880e430a01e4c0faa1da0200000000000000848c600665a70391a4b0fc9c3e6698f0e89f33b022cae8aa1f565de3858eeab392fcada143"}) write$evdev(r2, &(0x7f00008c1fd0)=[{{}, 0x2, 0x0, 0x40c}, {}], 0x30) 2018/04/13 21:33:22 executing program 0: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) getsockopt$inet_sctp6_SCTP_AUTO_ASCONF(r0, 0x84, 0x1e, &(0x7f0000000040), &(0x7f0000000080)=0x4) 2018/04/13 21:33:22 executing program 4: socket$packet(0x11, 0x0, 0x300) r0 = socket$packet(0x11, 0x2, 0x300) r1 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dsp\x00', 0x40, 0x0) ioctl$sock_inet6_tcp_SIOCINQ(r1, 0x541b, &(0x7f0000000040)) setsockopt$packet_int(r0, 0x107, 0x14, &(0x7f0000010ffc)=0x5, 0x4) sendto$inet6(r0, &(0x7f0000003fd9), 0x0, 0x0, &(0x7f0000008000)={0xa, 0x0, 0x7}, 0x1c) setsockopt$netlink_NETLINK_NO_ENOBUFS(r1, 0x10e, 0x5, &(0x7f0000000080)=0x2, 0x4) [ 283.151085] autofs4:pid:19944:autofs4_fill_super: called with bogus options 2018/04/13 21:33:22 executing program 1: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$rdma_cm(0xffffffffffffffff, &(0x7f0000003e00)=ANY=[@ANYBLOB="fbffffe9070000fa"], 0x8) r1 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000100)='/dev/mixer\x00', 0x10080, 0x0) write$rdma_cm(r1, &(0x7f0000000640)=@create_id={0x0, 0x18, 0xfa00, {0x3, &(0x7f0000000600)={0xffffffff}, 0x1, 0x1000}}, 0x20) write$rdma_cm(r0, &(0x7f0000000680)=@disconnect={0xa, 0x4, 0xfa00, {r2}}, 0xc) setsockopt$RDS_GET_MR(r1, 0x114, 0x2, &(0x7f0000000440)={{&(0x7f0000000380)=""/116, 0x74}, &(0x7f0000000400), 0x40}, 0x20) write$rdma_cm(r0, &(0x7f0000000040)=ANY=[@ANYBLOB='\a\x00\x00\x00\b\x00'], 0x6) mmap(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x0, 0x10, r0, 0x0) write$rdma_cm(r0, &(0x7f0000000ac0)=@create_id={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000a80)={0xffffffff}, 0x13f, 0x6}}, 0x20) write$rdma_cm(r0, &(0x7f0000000300)=@destroy_id={0x1, 0x0, 0xfa00, {&(0x7f0000000340), r3}}, 0x9) r4 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r4, &(0x7f0000005000)={&(0x7f0000000000)={0x10}, 0xc, &(0x7f000000d379)={&(0x7f0000013db4)={0x14, 0x1e, 0x2ff}, 0x14}, 0x1}, 0x0) sendto$inet(r1, &(0x7f0000000480)="86f38271ee42f2d63f6466b2c3a1bbc5f4848750ad5bcaed34c125dce4a1f81ce7270ebb92f430f2ef7186e9f921989fcebb4f37dd1866ffe3739f8de119ba76fed4e211541a3d1cebecce9e1e021773d5463b2605f41c7bbf258b6e51128b6d93041a8599cd28e9c2a387b82defeb471deb16ab05fe7e14a9aa55723fc59f6e32a3d1e9454c00b73b99511b5368dbd11fd671d9f83c53bb837e9d84b4e81ad78e0d4b1f61349a1eecc3d80d60fb3f5d6da6182b044b4110c072", 0xba, 0x4008044, &(0x7f00000001c0)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x13}}, 0x10) r5 = syz_open_dev$vcsn(&(0x7f0000000040)='/dev/vcs#\x00', 0x2, 0x400040) r6 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000280)='IPVS\x00') sendmsg$IPVS_CMD_SET_INFO(r4, &(0x7f0000000380)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x30080000}, 0xc, &(0x7f0000000340)={&(0x7f00000002c0)={0x7c, r6, 0x100, 0x70bd25, 0x25dfdbfb, {0xe}, [@IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0x3f}, @IPVS_CMD_ATTR_DEST={0x1c, 0x2, [@IPVS_DEST_ATTR_WEIGHT={0x8, 0x4, 0x8}, @IPVS_DEST_ATTR_ACTIVE_CONNS={0x8, 0x7, 0x493}, @IPVS_DEST_ATTR_FWD_METHOD={0x8, 0x3, 0x6}]}, @IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0x3}, @IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0x5}, @IPVS_CMD_ATTR_SERVICE={0x34, 0x1, [@IPVS_SVC_ATTR_PE_NAME={0x8, 0xb, 'sip\x00'}, @IPVS_SVC_ATTR_SCHED_NAME={0x8, 0x6, 'wlc\x00'}, @IPVS_SVC_ATTR_FWMARK={0x8, 0x5}, @IPVS_SVC_ATTR_SCHED_NAME={0x8, 0x6, 'nq\x00'}, @IPVS_SVC_ATTR_NETMASK={0x8, 0x9, 0x67}, @IPVS_SVC_ATTR_AF={0x8, 0x1, 0x2}]}]}, 0x7c}, 0x1, 0x0, 0x0, 0x24040040}, 0x4040) getsockopt$inet_sctp6_SCTP_RESET_STREAMS(r5, 0x84, 0x77, &(0x7f0000000200)={0x0, 0xfffffffffffffffb, 0x5, [0x8, 0x2, 0x4, 0x1f, 0x5]}, &(0x7f0000000540)=0x12) getsockopt$inet_sctp_SCTP_LOCAL_AUTH_CHUNKS(r1, 0x84, 0x1b, &(0x7f00000006c0)={r7, 0xe3, "f155dbb1bb41f85392c17dc56db6c711f6f1f23bd73b67e1705a499e4509f6a8a8d0915a7c39e745231272f4eb7599c1c368eaae71d19111e419391e192f2ca61d8cbe2a8ce9d44f3ea3ad10778e8b00147adb8e7f50196a5fae7486ab84f19d9d1a1a08bcd89dda55b9c0455d4482d81982bac5e8ffda71251c6057dd841032d9418f3fa42f7f2e2b3798d1e434ceec0feb6e9b01140c568b5e8e1ad3e700dbd0d2bcc7e45f44f0050b9ec54b261c69cb0ef8ebbb1ebde5dde3cc7d7df324f939398f6cc386eac0511d1e101de0a98667d6898035782432b7c1df01a415e53a9c2cc1"}, &(0x7f0000000580)=0xeb) getsockopt$inet6_dccp_buf(r5, 0x21, 0xf, &(0x7f0000000080)=""/200, &(0x7f0000000180)=0xc8) 2018/04/13 21:33:22 executing program 7: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$rdma_cm(0xffffffffffffffff, &(0x7f0000003e00)=ANY=[@ANYBLOB="fbffffe9070000fa"], 0x8) r1 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000100)='/dev/mixer\x00', 0x10080, 0x0) write$rdma_cm(r1, &(0x7f0000000640)=@create_id={0x0, 0x18, 0xfa00, {0x3, &(0x7f0000000600)={0xffffffff}, 0x1, 0x1000}}, 0x20) write$rdma_cm(r0, &(0x7f0000000680)=@disconnect={0xa, 0x4, 0xfa00, {r2}}, 0xc) setsockopt$RDS_GET_MR(r1, 0x114, 0x2, &(0x7f0000000440)={{&(0x7f0000000380)=""/116, 0x74}, &(0x7f0000000400), 0x40}, 0x20) write$rdma_cm(r0, &(0x7f0000000040)=ANY=[@ANYBLOB='\a\x00\x00\x00\b\x00'], 0x6) mmap(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x0, 0x10, r0, 0x0) write$rdma_cm(r0, &(0x7f0000000ac0)=@create_id={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000a80)={0xffffffff}, 0x13f, 0x6}}, 0x20) write$rdma_cm(r0, &(0x7f0000000300)=@destroy_id={0x1, 0x0, 0xfa00, {&(0x7f0000000340), r3}}, 0x9) r4 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r4, &(0x7f0000005000)={&(0x7f0000000000)={0x10}, 0xc, &(0x7f000000d379)={&(0x7f0000013db4)={0x14, 0x1e, 0x2ff}, 0x14}, 0x1}, 0x0) sendto$inet(r1, &(0x7f0000000480)="86f38271ee42f2d63f6466b2c3a1bbc5f4848750ad5bcaed34c125dce4a1f81ce7270ebb92f430f2ef7186e9f921989fcebb4f37dd1866ffe3739f8de119ba76fed4e211541a3d1cebecce9e1e021773d5463b2605f41c7bbf258b6e51128b6d93041a8599cd28e9c2a387b82defeb471deb16ab05fe7e14a9aa55723fc59f6e32a3d1e9454c00b73b99511b5368dbd11fd671d9f83c53bb837e9d84b4e81ad78e0d4b1f61349a1eecc3d80d60fb3f5d6da6182b044b4110c072", 0xba, 0x4008044, &(0x7f00000001c0)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x13}}, 0x10) r5 = syz_open_dev$vcsn(&(0x7f0000000040)='/dev/vcs#\x00', 0x2, 0x400040) r6 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000280)='IPVS\x00') sendmsg$IPVS_CMD_SET_INFO(r4, &(0x7f0000000380)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x30080000}, 0xc, &(0x7f0000000340)={&(0x7f00000002c0)={0x7c, r6, 0x100, 0x70bd25, 0x25dfdbfb, {0xe}, [@IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0x3f}, @IPVS_CMD_ATTR_DEST={0x1c, 0x2, [@IPVS_DEST_ATTR_WEIGHT={0x8, 0x4, 0x8}, @IPVS_DEST_ATTR_ACTIVE_CONNS={0x8, 0x7, 0x493}, @IPVS_DEST_ATTR_FWD_METHOD={0x8, 0x3, 0x6}]}, @IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0x3}, @IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0x5}, @IPVS_CMD_ATTR_SERVICE={0x34, 0x1, [@IPVS_SVC_ATTR_PE_NAME={0x8, 0xb, 'sip\x00'}, @IPVS_SVC_ATTR_SCHED_NAME={0x8, 0x6, 'wlc\x00'}, @IPVS_SVC_ATTR_FWMARK={0x8, 0x5}, @IPVS_SVC_ATTR_SCHED_NAME={0x8, 0x6, 'nq\x00'}, @IPVS_SVC_ATTR_NETMASK={0x8, 0x9, 0x67}, @IPVS_SVC_ATTR_AF={0x8, 0x1, 0x2}]}]}, 0x7c}, 0x1, 0x0, 0x0, 0x24040040}, 0x4040) getsockopt$inet_sctp6_SCTP_RESET_STREAMS(r5, 0x84, 0x77, &(0x7f0000000200)={0x0, 0xfffffffffffffffb, 0x5, [0x8, 0x2, 0x4, 0x1f, 0x5]}, &(0x7f0000000540)=0x12) getsockopt$inet_sctp_SCTP_LOCAL_AUTH_CHUNKS(r1, 0x84, 0x1b, &(0x7f00000006c0)={r7, 0xe3, "f155dbb1bb41f85392c17dc56db6c711f6f1f23bd73b67e1705a499e4509f6a8a8d0915a7c39e745231272f4eb7599c1c368eaae71d19111e419391e192f2ca61d8cbe2a8ce9d44f3ea3ad10778e8b00147adb8e7f50196a5fae7486ab84f19d9d1a1a08bcd89dda55b9c0455d4482d81982bac5e8ffda71251c6057dd841032d9418f3fa42f7f2e2b3798d1e434ceec0feb6e9b01140c568b5e8e1ad3e700dbd0d2bcc7e45f44f0050b9ec54b261c69cb0ef8ebbb1ebde5dde3cc7d7df324f939398f6cc386eac0511d1e101de0a98667d6898035782432b7c1df01a415e53a9c2cc1"}, &(0x7f0000000580)=0xeb) getsockopt$inet6_dccp_buf(r5, 0x21, 0xf, &(0x7f0000000080)=""/200, &(0x7f0000000180)=0xc8) 2018/04/13 21:33:22 executing program 5: syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000240)=[{&(0x7f0000000000)="400000000002000019000000dc0100002c00000001000000000000000000000000040000000000001f000000000000003d5ca35a0000ffff53efaf87e92499469587ddb30e8444da417412a63d265b6c8528326bf9bbd558d4e51fea188e9a6bc8d5", 0x62, 0x400}], 0x0, &(0x7f0000000400)) 2018/04/13 21:33:22 executing program 6: r0 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) setsockopt$bt_BT_VOICE(r0, 0x112, 0xb, &(0x7f0000000000)=0x3, 0x2) 2018/04/13 21:33:22 executing program 6: r0 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) setsockopt$bt_BT_VOICE(r0, 0x112, 0xb, &(0x7f0000000000)=0x3, 0x2) 2018/04/13 21:33:22 executing program 7: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$rdma_cm(0xffffffffffffffff, &(0x7f0000003e00)=ANY=[@ANYBLOB="fbffffe9070000fa"], 0x8) r1 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000100)='/dev/mixer\x00', 0x10080, 0x0) write$rdma_cm(r1, &(0x7f0000000640)=@create_id={0x0, 0x18, 0xfa00, {0x3, &(0x7f0000000600)={0xffffffff}, 0x1, 0x1000}}, 0x20) write$rdma_cm(r0, &(0x7f0000000680)=@disconnect={0xa, 0x4, 0xfa00, {r2}}, 0xc) setsockopt$RDS_GET_MR(r1, 0x114, 0x2, &(0x7f0000000440)={{&(0x7f0000000380)=""/116, 0x74}, &(0x7f0000000400), 0x40}, 0x20) write$rdma_cm(r0, &(0x7f0000000040)=ANY=[@ANYBLOB='\a\x00\x00\x00\b\x00'], 0x6) mmap(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x0, 0x10, r0, 0x0) write$rdma_cm(r0, &(0x7f0000000ac0)=@create_id={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000a80)={0xffffffff}, 0x13f, 0x6}}, 0x20) write$rdma_cm(r0, &(0x7f0000000300)=@destroy_id={0x1, 0x0, 0xfa00, {&(0x7f0000000340), r3}}, 0x9) r4 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r4, &(0x7f0000005000)={&(0x7f0000000000)={0x10}, 0xc, &(0x7f000000d379)={&(0x7f0000013db4)={0x14, 0x1e, 0x2ff}, 0x14}, 0x1}, 0x0) sendto$inet(r1, &(0x7f0000000480)="86f38271ee42f2d63f6466b2c3a1bbc5f4848750ad5bcaed34c125dce4a1f81ce7270ebb92f430f2ef7186e9f921989fcebb4f37dd1866ffe3739f8de119ba76fed4e211541a3d1cebecce9e1e021773d5463b2605f41c7bbf258b6e51128b6d93041a8599cd28e9c2a387b82defeb471deb16ab05fe7e14a9aa55723fc59f6e32a3d1e9454c00b73b99511b5368dbd11fd671d9f83c53bb837e9d84b4e81ad78e0d4b1f61349a1eecc3d80d60fb3f5d6da6182b044b4110c072", 0xba, 0x4008044, &(0x7f00000001c0)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x13}}, 0x10) r5 = syz_open_dev$vcsn(&(0x7f0000000040)='/dev/vcs#\x00', 0x2, 0x400040) r6 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000280)='IPVS\x00') sendmsg$IPVS_CMD_SET_INFO(r4, &(0x7f0000000380)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x30080000}, 0xc, &(0x7f0000000340)={&(0x7f00000002c0)={0x7c, r6, 0x100, 0x70bd25, 0x25dfdbfb, {0xe}, [@IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0x3f}, @IPVS_CMD_ATTR_DEST={0x1c, 0x2, [@IPVS_DEST_ATTR_WEIGHT={0x8, 0x4, 0x8}, @IPVS_DEST_ATTR_ACTIVE_CONNS={0x8, 0x7, 0x493}, @IPVS_DEST_ATTR_FWD_METHOD={0x8, 0x3, 0x6}]}, @IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0x3}, @IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0x5}, @IPVS_CMD_ATTR_SERVICE={0x34, 0x1, [@IPVS_SVC_ATTR_PE_NAME={0x8, 0xb, 'sip\x00'}, @IPVS_SVC_ATTR_SCHED_NAME={0x8, 0x6, 'wlc\x00'}, @IPVS_SVC_ATTR_FWMARK={0x8, 0x5}, @IPVS_SVC_ATTR_SCHED_NAME={0x8, 0x6, 'nq\x00'}, @IPVS_SVC_ATTR_NETMASK={0x8, 0x9, 0x67}, @IPVS_SVC_ATTR_AF={0x8, 0x1, 0x2}]}]}, 0x7c}, 0x1, 0x0, 0x0, 0x24040040}, 0x4040) getsockopt$inet_sctp6_SCTP_RESET_STREAMS(r5, 0x84, 0x77, &(0x7f0000000200)={0x0, 0xfffffffffffffffb, 0x5, [0x8, 0x2, 0x4, 0x1f, 0x5]}, &(0x7f0000000540)=0x12) getsockopt$inet_sctp_SCTP_LOCAL_AUTH_CHUNKS(r1, 0x84, 0x1b, &(0x7f00000006c0)={r7, 0xe3, "f155dbb1bb41f85392c17dc56db6c711f6f1f23bd73b67e1705a499e4509f6a8a8d0915a7c39e745231272f4eb7599c1c368eaae71d19111e419391e192f2ca61d8cbe2a8ce9d44f3ea3ad10778e8b00147adb8e7f50196a5fae7486ab84f19d9d1a1a08bcd89dda55b9c0455d4482d81982bac5e8ffda71251c6057dd841032d9418f3fa42f7f2e2b3798d1e434ceec0feb6e9b01140c568b5e8e1ad3e700dbd0d2bcc7e45f44f0050b9ec54b261c69cb0ef8ebbb1ebde5dde3cc7d7df324f939398f6cc386eac0511d1e101de0a98667d6898035782432b7c1df01a415e53a9c2cc1"}, &(0x7f0000000580)=0xeb) getsockopt$inet6_dccp_buf(r5, 0x21, 0xf, &(0x7f0000000080)=""/200, &(0x7f0000000180)=0xc8) 2018/04/13 21:33:22 executing program 5: r0 = socket$inet6(0xa, 0x2100000000000002, 0x0) perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f00000001c0)={{{@in6=@ipv4={[], [0xff, 0xff], @rand_addr}, @in=@broadcast=0xffffffff, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {}, 0x0, 0x0, 0x800000000000001}, {{@in6=@loopback={0x0, 0x1}, 0x0, 0x2b}, 0x0, @in, 0x0, 0x4, 0x0, 0x401}}, 0xe8) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @local={0xfe, 0x80, [], 0xaa}, 0x2}, 0x1c) 2018/04/13 21:33:22 executing program 1: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$rdma_cm(0xffffffffffffffff, &(0x7f0000003e00)=ANY=[@ANYBLOB="fbffffe9070000fa"], 0x8) r1 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000100)='/dev/mixer\x00', 0x10080, 0x0) write$rdma_cm(r1, &(0x7f0000000640)=@create_id={0x0, 0x18, 0xfa00, {0x3, &(0x7f0000000600)={0xffffffff}, 0x1, 0x1000}}, 0x20) write$rdma_cm(r0, &(0x7f0000000680)=@disconnect={0xa, 0x4, 0xfa00, {r2}}, 0xc) setsockopt$RDS_GET_MR(r1, 0x114, 0x2, &(0x7f0000000440)={{&(0x7f0000000380)=""/116, 0x74}, &(0x7f0000000400), 0x40}, 0x20) write$rdma_cm(r0, &(0x7f0000000040)=ANY=[@ANYBLOB='\a\x00\x00\x00\b\x00'], 0x6) mmap(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x0, 0x10, r0, 0x0) write$rdma_cm(r0, &(0x7f0000000ac0)=@create_id={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000a80)={0xffffffff}, 0x13f, 0x6}}, 0x20) write$rdma_cm(r0, &(0x7f0000000300)=@destroy_id={0x1, 0x0, 0xfa00, {&(0x7f0000000340), r3}}, 0x9) r4 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r4, &(0x7f0000005000)={&(0x7f0000000000)={0x10}, 0xc, &(0x7f000000d379)={&(0x7f0000013db4)={0x14, 0x1e, 0x2ff}, 0x14}, 0x1}, 0x0) sendto$inet(r1, &(0x7f0000000480)="86f38271ee42f2d63f6466b2c3a1bbc5f4848750ad5bcaed34c125dce4a1f81ce7270ebb92f430f2ef7186e9f921989fcebb4f37dd1866ffe3739f8de119ba76fed4e211541a3d1cebecce9e1e021773d5463b2605f41c7bbf258b6e51128b6d93041a8599cd28e9c2a387b82defeb471deb16ab05fe7e14a9aa55723fc59f6e32a3d1e9454c00b73b99511b5368dbd11fd671d9f83c53bb837e9d84b4e81ad78e0d4b1f61349a1eecc3d80d60fb3f5d6da6182b044b4110c072", 0xba, 0x4008044, &(0x7f00000001c0)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x13}}, 0x10) r5 = syz_open_dev$vcsn(&(0x7f0000000040)='/dev/vcs#\x00', 0x2, 0x400040) r6 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000280)='IPVS\x00') sendmsg$IPVS_CMD_SET_INFO(r4, &(0x7f0000000380)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x30080000}, 0xc, &(0x7f0000000340)={&(0x7f00000002c0)={0x7c, r6, 0x100, 0x70bd25, 0x25dfdbfb, {0xe}, [@IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0x3f}, @IPVS_CMD_ATTR_DEST={0x1c, 0x2, [@IPVS_DEST_ATTR_WEIGHT={0x8, 0x4, 0x8}, @IPVS_DEST_ATTR_ACTIVE_CONNS={0x8, 0x7, 0x493}, @IPVS_DEST_ATTR_FWD_METHOD={0x8, 0x3, 0x6}]}, @IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0x3}, @IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0x5}, @IPVS_CMD_ATTR_SERVICE={0x34, 0x1, [@IPVS_SVC_ATTR_PE_NAME={0x8, 0xb, 'sip\x00'}, @IPVS_SVC_ATTR_SCHED_NAME={0x8, 0x6, 'wlc\x00'}, @IPVS_SVC_ATTR_FWMARK={0x8, 0x5}, @IPVS_SVC_ATTR_SCHED_NAME={0x8, 0x6, 'nq\x00'}, @IPVS_SVC_ATTR_NETMASK={0x8, 0x9, 0x67}, @IPVS_SVC_ATTR_AF={0x8, 0x1, 0x2}]}]}, 0x7c}, 0x1, 0x0, 0x0, 0x24040040}, 0x4040) getsockopt$inet_sctp6_SCTP_RESET_STREAMS(r5, 0x84, 0x77, &(0x7f0000000200)={0x0, 0xfffffffffffffffb, 0x5, [0x8, 0x2, 0x4, 0x1f, 0x5]}, &(0x7f0000000540)=0x12) getsockopt$inet_sctp_SCTP_LOCAL_AUTH_CHUNKS(r1, 0x84, 0x1b, &(0x7f00000006c0)={r7, 0xe3, "f155dbb1bb41f85392c17dc56db6c711f6f1f23bd73b67e1705a499e4509f6a8a8d0915a7c39e745231272f4eb7599c1c368eaae71d19111e419391e192f2ca61d8cbe2a8ce9d44f3ea3ad10778e8b00147adb8e7f50196a5fae7486ab84f19d9d1a1a08bcd89dda55b9c0455d4482d81982bac5e8ffda71251c6057dd841032d9418f3fa42f7f2e2b3798d1e434ceec0feb6e9b01140c568b5e8e1ad3e700dbd0d2bcc7e45f44f0050b9ec54b261c69cb0ef8ebbb1ebde5dde3cc7d7df324f939398f6cc386eac0511d1e101de0a98667d6898035782432b7c1df01a415e53a9c2cc1"}, &(0x7f0000000580)=0xeb) getsockopt$inet6_dccp_buf(r5, 0x21, 0xf, &(0x7f0000000080)=""/200, &(0x7f0000000180)=0xc8) 2018/04/13 21:33:22 executing program 0: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) getsockopt$inet_sctp6_SCTP_AUTO_ASCONF(r0, 0x84, 0x1e, &(0x7f0000000040), &(0x7f0000000080)=0x4) 2018/04/13 21:33:23 executing program 2: r0 = syz_open_dev$vcsa(&(0x7f0000000000)='/dev/vcsa#\x00', 0x8dc, 0x8040) r1 = open(&(0x7f0000000140)='./file0\x00', 0x2200, 0x154) connect$pptp(r1, &(0x7f0000000180)={0x18, 0x2, {0x0, @dev={0xac, 0x14, 0x14, 0x18}}}, 0x1e) ioctl$LOOP_CHANGE_FD(r0, 0x4c06, r1) r2 = syz_open_dev$evdev(&(0x7f0000057fee)='/dev/input/event#\x00', 0xafd, 0x8000040000001) ioctl$EVIOCSMASK(r2, 0x40104593, &(0x7f0000000040)={0x0, 0xa8, &(0x7f0000000080)="86f7b87354686156f65402007141d61cb010b71aa365b23148bb1100984f836f909e811d0000007e50000000000000b31eaf108100000000000000331d4482a58207f82cd83d02d2ad4f6e16cd44a89fd9160654e1e5a973419ce0f9c558858aad53fb2f3fa5a0f072cc3e2cc463dbb943880e430a01e4c0faa1da0200000000000000848c600665a70391a4b0fc9c3e6698f0e89f33b022cae8aa1f565de3858eeab392fcada143"}) write$evdev(r2, &(0x7f00008c1fd0)=[{{}, 0x2, 0x0, 0x40c}, {}], 0x30) 2018/04/13 21:33:23 executing program 4: socket$packet(0x11, 0x0, 0x300) r0 = socket$packet(0x11, 0x2, 0x300) r1 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dsp\x00', 0x40, 0x0) ioctl$sock_inet6_tcp_SIOCINQ(r1, 0x541b, &(0x7f0000000040)) setsockopt$packet_int(r0, 0x107, 0x14, &(0x7f0000010ffc)=0x5, 0x4) sendto$inet6(r0, &(0x7f0000003fd9), 0x0, 0x0, &(0x7f0000008000)={0xa, 0x0, 0x7}, 0x1c) setsockopt$netlink_NETLINK_NO_ENOBUFS(r1, 0x10e, 0x5, &(0x7f0000000080)=0x2, 0x4) 2018/04/13 21:33:23 executing program 6: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00007a0000)={0xffffffffffffffff, 0xffffffffffffffff}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000616ff8)={0xffffffffffffffff, 0xffffffffffffffff}) perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) dup3(r1, r0, 0x0) sendmsg$unix(r2, &(0x7f0000bba000)={&(0x7f00003a2000)=@abs, 0x8, &(0x7f00006c6ff0), 0x0, &(0x7f00009dffb8)=[@rights={0x18, 0x1, 0x1, [r0]}], 0x18}, 0x0) close(r2) close(r1) 2018/04/13 21:33:23 executing program 1: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$rdma_cm(0xffffffffffffffff, &(0x7f0000003e00)=ANY=[@ANYBLOB="fbffffe9070000fa"], 0x8) r1 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000100)='/dev/mixer\x00', 0x10080, 0x0) write$rdma_cm(r1, &(0x7f0000000640)=@create_id={0x0, 0x18, 0xfa00, {0x3, &(0x7f0000000600)={0xffffffff}, 0x1, 0x1000}}, 0x20) write$rdma_cm(r0, &(0x7f0000000680)=@disconnect={0xa, 0x4, 0xfa00, {r2}}, 0xc) setsockopt$RDS_GET_MR(r1, 0x114, 0x2, &(0x7f0000000440)={{&(0x7f0000000380)=""/116, 0x74}, &(0x7f0000000400), 0x40}, 0x20) write$rdma_cm(r0, &(0x7f0000000040)=ANY=[@ANYBLOB='\a\x00\x00\x00\b\x00'], 0x6) mmap(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x0, 0x10, r0, 0x0) write$rdma_cm(r0, &(0x7f0000000ac0)=@create_id={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000a80)={0xffffffff}, 0x13f, 0x6}}, 0x20) write$rdma_cm(r0, &(0x7f0000000300)=@destroy_id={0x1, 0x0, 0xfa00, {&(0x7f0000000340), r3}}, 0x9) r4 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r4, &(0x7f0000005000)={&(0x7f0000000000)={0x10}, 0xc, &(0x7f000000d379)={&(0x7f0000013db4)={0x14, 0x1e, 0x2ff}, 0x14}, 0x1}, 0x0) sendto$inet(r1, &(0x7f0000000480)="86f38271ee42f2d63f6466b2c3a1bbc5f4848750ad5bcaed34c125dce4a1f81ce7270ebb92f430f2ef7186e9f921989fcebb4f37dd1866ffe3739f8de119ba76fed4e211541a3d1cebecce9e1e021773d5463b2605f41c7bbf258b6e51128b6d93041a8599cd28e9c2a387b82defeb471deb16ab05fe7e14a9aa55723fc59f6e32a3d1e9454c00b73b99511b5368dbd11fd671d9f83c53bb837e9d84b4e81ad78e0d4b1f61349a1eecc3d80d60fb3f5d6da6182b044b4110c072", 0xba, 0x4008044, &(0x7f00000001c0)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x13}}, 0x10) r5 = syz_open_dev$vcsn(&(0x7f0000000040)='/dev/vcs#\x00', 0x2, 0x400040) r6 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000280)='IPVS\x00') sendmsg$IPVS_CMD_SET_INFO(r4, &(0x7f0000000380)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x30080000}, 0xc, &(0x7f0000000340)={&(0x7f00000002c0)={0x7c, r6, 0x100, 0x70bd25, 0x25dfdbfb, {0xe}, [@IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0x3f}, @IPVS_CMD_ATTR_DEST={0x1c, 0x2, [@IPVS_DEST_ATTR_WEIGHT={0x8, 0x4, 0x8}, @IPVS_DEST_ATTR_ACTIVE_CONNS={0x8, 0x7, 0x493}, @IPVS_DEST_ATTR_FWD_METHOD={0x8, 0x3, 0x6}]}, @IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0x3}, @IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0x5}, @IPVS_CMD_ATTR_SERVICE={0x34, 0x1, [@IPVS_SVC_ATTR_PE_NAME={0x8, 0xb, 'sip\x00'}, @IPVS_SVC_ATTR_SCHED_NAME={0x8, 0x6, 'wlc\x00'}, @IPVS_SVC_ATTR_FWMARK={0x8, 0x5}, @IPVS_SVC_ATTR_SCHED_NAME={0x8, 0x6, 'nq\x00'}, @IPVS_SVC_ATTR_NETMASK={0x8, 0x9, 0x67}, @IPVS_SVC_ATTR_AF={0x8, 0x1, 0x2}]}]}, 0x7c}, 0x1, 0x0, 0x0, 0x24040040}, 0x4040) getsockopt$inet_sctp6_SCTP_RESET_STREAMS(r5, 0x84, 0x77, &(0x7f0000000200)={0x0, 0xfffffffffffffffb, 0x5, [0x8, 0x2, 0x4, 0x1f, 0x5]}, &(0x7f0000000540)=0x12) getsockopt$inet_sctp_SCTP_LOCAL_AUTH_CHUNKS(r1, 0x84, 0x1b, &(0x7f00000006c0)={r7, 0xe3, "f155dbb1bb41f85392c17dc56db6c711f6f1f23bd73b67e1705a499e4509f6a8a8d0915a7c39e745231272f4eb7599c1c368eaae71d19111e419391e192f2ca61d8cbe2a8ce9d44f3ea3ad10778e8b00147adb8e7f50196a5fae7486ab84f19d9d1a1a08bcd89dda55b9c0455d4482d81982bac5e8ffda71251c6057dd841032d9418f3fa42f7f2e2b3798d1e434ceec0feb6e9b01140c568b5e8e1ad3e700dbd0d2bcc7e45f44f0050b9ec54b261c69cb0ef8ebbb1ebde5dde3cc7d7df324f939398f6cc386eac0511d1e101de0a98667d6898035782432b7c1df01a415e53a9c2cc1"}, &(0x7f0000000580)=0xeb) getsockopt$inet6_dccp_buf(r5, 0x21, 0xf, &(0x7f0000000080)=""/200, &(0x7f0000000180)=0xc8) 2018/04/13 21:33:23 executing program 5: r0 = socket$inet6(0xa, 0x2100000000000002, 0x0) perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f00000001c0)={{{@in6=@ipv4={[], [0xff, 0xff], @rand_addr}, @in=@broadcast=0xffffffff, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {}, 0x0, 0x0, 0x800000000000001}, {{@in6=@loopback={0x0, 0x1}, 0x0, 0x2b}, 0x0, @in, 0x0, 0x4, 0x0, 0x401}}, 0xe8) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @local={0xfe, 0x80, [], 0xaa}, 0x2}, 0x1c) 2018/04/13 21:33:23 executing program 3: mmap(&(0x7f0000cb1000/0x3000)=nil, 0x3000, 0x80008, 0x32, 0xffffffffffffffff, 0x10000003ffe) r0 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e23}, 0x1c) r1 = syz_open_dev$dspn(&(0x7f0000000040)='/dev/dsp#\x00', 0x6, 0x0) bind$can_raw(r1, &(0x7f0000000080)={0x1d}, 0x10) listen(r0, 0x5eb857) r2 = socket$inet_dccp(0x2, 0x6, 0x0) connect$inet(r2, &(0x7f0000772000)={0x2, 0x4e23}, 0x10) r3 = accept4(r0, &(0x7f0000975000)=@can, &(0x7f0000752ffc)=0x10, 0x0) r4 = dup2(r3, r0) syz_open_dev$audion(&(0x7f0000000440)='/dev/audio#\x00', 0x7, 0x20000) renameat2(r4, &(0x7f0000000400)='./file0\x00', r2, &(0x7f0000000100)='./file0\x00', 0x3) sendto$inet(r2, &(0x7f0000531fff), 0x0, 0x0, 0x0, 0x0) sendmsg$nl_netfilter(r3, &(0x7f0000b76fc8)={&(0x7f0000715000)={0x10}, 0xc, &(0x7f000066f000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="35000000ffffff7f00000000ffff00000080000012ef79d6f30fd2a4987a1e2f2fc269ec"], 0x24}, 0x1}, 0x0) sendmmsg(r0, &(0x7f000000b880)=[{{0x0, 0x0, &(0x7f0000002140)=[{&(0x7f0000002100)="8b557b6d36259e2ddb7c8962f9e22c53ed1e43c6", 0x14}], 0x1, &(0x7f0000002180)}}], 0x1, 0x0) perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$DRM_IOCTL_AGP_ALLOC(r4, 0xc0206434, &(0x7f0000000140)={0x438, 0x0, 0x0, 0x9}) ioctl$DRM_IOCTL_AGP_FREE(r4, 0x40206435, &(0x7f0000000180)={0x7fff, r5, 0x10001}) r6 = socket(0x10, 0x20000000802, 0x0) write(r6, &(0x7f0000000080)="1f000000520007f2000094fef5000f430700000000000000000100ffffb92b", 0x1f) recvmmsg(r6, &(0x7f0000002500)=[{{0x0, 0x0, &(0x7f0000002080), 0x0, &(0x7f0000002100)=""/121, 0x79}}], 0x1, 0x0, &(0x7f0000005400)={0x0, 0x1c9c380}) ioctl$sock_inet_SIOCGIFDSTADDR(r0, 0x8917, &(0x7f00000001c0)={'ip_vti0\x00', {0x2, 0x4e22, @remote={0xac, 0x14, 0x14, 0xbb}}}) sendmsg$alg(r4, &(0x7f0000000800)={0x0, 0x0, &(0x7f0000000500)=[{&(0x7f0000000200)="d2a181944e3b7f0ddf469dc6fd079040f22fea65e9ec3b2b7a4dff8526f32b9ffbacf7ad8a543a8ac6428cc2841371a28c73ad080418857e2fc9ac1fbe92337006ea2366d92c3e6e359b39d07552875b4a72ca19c24cd98b303a2b5b79c74abf14b3fc4e8c484f0733dbc782d006a7b13e3d417ba2da26424d4e251d16dee4098d10f2b858311155f24408aba6613df2dc16183c134310b08eef730c83b008c05243ba499048684cd3d47c777807661ab7ff7d2978f37c29", 0xb8}], 0x1, &(0x7f0000000540)=ANY=[@ANYBLOB="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"], 0x2a8, 0x4000}, 0x1) setsockopt$inet6_tcp_buf(0xffffffffffffffff, 0x6, 0x0, &(0x7f0000141000), 0x0) write(r2, &(0x7f0000f8aff1), 0xff8f) sendto$inet(r2, &(0x7f0000494f01), 0x0, 0x0, &(0x7f0000198ff0)={0x2, 0x4e20, @multicast1=0xe0000001}, 0x10) 2018/04/13 21:33:23 executing program 0: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) getsockopt$inet_sctp6_SCTP_AUTO_ASCONF(r0, 0x84, 0x1e, &(0x7f0000000040), &(0x7f0000000080)=0x4) 2018/04/13 21:33:23 executing program 7: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$rdma_cm(0xffffffffffffffff, &(0x7f0000003e00)=ANY=[@ANYBLOB="fbffffe9070000fa"], 0x8) r1 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000100)='/dev/mixer\x00', 0x10080, 0x0) write$rdma_cm(r1, &(0x7f0000000640)=@create_id={0x0, 0x18, 0xfa00, {0x3, &(0x7f0000000600)={0xffffffff}, 0x1, 0x1000}}, 0x20) write$rdma_cm(r0, &(0x7f0000000680)=@disconnect={0xa, 0x4, 0xfa00, {r2}}, 0xc) setsockopt$RDS_GET_MR(r1, 0x114, 0x2, &(0x7f0000000440)={{&(0x7f0000000380)=""/116, 0x74}, &(0x7f0000000400), 0x40}, 0x20) write$rdma_cm(r0, &(0x7f0000000040)=ANY=[@ANYBLOB='\a\x00\x00\x00\b\x00'], 0x6) mmap(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x0, 0x10, r0, 0x0) write$rdma_cm(r0, &(0x7f0000000ac0)=@create_id={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000a80)={0xffffffff}, 0x13f, 0x6}}, 0x20) write$rdma_cm(r0, &(0x7f0000000300)=@destroy_id={0x1, 0x0, 0xfa00, {&(0x7f0000000340), r3}}, 0x9) r4 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r4, &(0x7f0000005000)={&(0x7f0000000000)={0x10}, 0xc, &(0x7f000000d379)={&(0x7f0000013db4)={0x14, 0x1e, 0x2ff}, 0x14}, 0x1}, 0x0) sendto$inet(r1, &(0x7f0000000480)="86f38271ee42f2d63f6466b2c3a1bbc5f4848750ad5bcaed34c125dce4a1f81ce7270ebb92f430f2ef7186e9f921989fcebb4f37dd1866ffe3739f8de119ba76fed4e211541a3d1cebecce9e1e021773d5463b2605f41c7bbf258b6e51128b6d93041a8599cd28e9c2a387b82defeb471deb16ab05fe7e14a9aa55723fc59f6e32a3d1e9454c00b73b99511b5368dbd11fd671d9f83c53bb837e9d84b4e81ad78e0d4b1f61349a1eecc3d80d60fb3f5d6da6182b044b4110c072", 0xba, 0x4008044, &(0x7f00000001c0)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x13}}, 0x10) r5 = syz_open_dev$vcsn(&(0x7f0000000040)='/dev/vcs#\x00', 0x2, 0x400040) r6 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000280)='IPVS\x00') sendmsg$IPVS_CMD_SET_INFO(r4, &(0x7f0000000380)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x30080000}, 0xc, &(0x7f0000000340)={&(0x7f00000002c0)={0x7c, r6, 0x100, 0x70bd25, 0x25dfdbfb, {0xe}, [@IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0x3f}, @IPVS_CMD_ATTR_DEST={0x1c, 0x2, [@IPVS_DEST_ATTR_WEIGHT={0x8, 0x4, 0x8}, @IPVS_DEST_ATTR_ACTIVE_CONNS={0x8, 0x7, 0x493}, @IPVS_DEST_ATTR_FWD_METHOD={0x8, 0x3, 0x6}]}, @IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0x3}, @IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0x5}, @IPVS_CMD_ATTR_SERVICE={0x34, 0x1, [@IPVS_SVC_ATTR_PE_NAME={0x8, 0xb, 'sip\x00'}, @IPVS_SVC_ATTR_SCHED_NAME={0x8, 0x6, 'wlc\x00'}, @IPVS_SVC_ATTR_FWMARK={0x8, 0x5}, @IPVS_SVC_ATTR_SCHED_NAME={0x8, 0x6, 'nq\x00'}, @IPVS_SVC_ATTR_NETMASK={0x8, 0x9, 0x67}, @IPVS_SVC_ATTR_AF={0x8, 0x1, 0x2}]}]}, 0x7c}, 0x1, 0x0, 0x0, 0x24040040}, 0x4040) getsockopt$inet_sctp6_SCTP_RESET_STREAMS(r5, 0x84, 0x77, &(0x7f0000000200)={0x0, 0xfffffffffffffffb, 0x5, [0x8, 0x2, 0x4, 0x1f, 0x5]}, &(0x7f0000000540)=0x12) getsockopt$inet_sctp_SCTP_LOCAL_AUTH_CHUNKS(r1, 0x84, 0x1b, &(0x7f00000006c0)={r7, 0xe3, "f155dbb1bb41f85392c17dc56db6c711f6f1f23bd73b67e1705a499e4509f6a8a8d0915a7c39e745231272f4eb7599c1c368eaae71d19111e419391e192f2ca61d8cbe2a8ce9d44f3ea3ad10778e8b00147adb8e7f50196a5fae7486ab84f19d9d1a1a08bcd89dda55b9c0455d4482d81982bac5e8ffda71251c6057dd841032d9418f3fa42f7f2e2b3798d1e434ceec0feb6e9b01140c568b5e8e1ad3e700dbd0d2bcc7e45f44f0050b9ec54b261c69cb0ef8ebbb1ebde5dde3cc7d7df324f939398f6cc386eac0511d1e101de0a98667d6898035782432b7c1df01a415e53a9c2cc1"}, &(0x7f0000000580)=0xeb) getsockopt$inet6_dccp_buf(r5, 0x21, 0xf, &(0x7f0000000080)=""/200, &(0x7f0000000180)=0xc8) 2018/04/13 21:33:23 executing program 0: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) getsockopt$inet_sctp6_SCTP_AUTO_ASCONF(r0, 0x84, 0x1e, &(0x7f0000000040), &(0x7f0000000080)=0x4) 2018/04/13 21:33:23 executing program 1: syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000200), 0x0, &(0x7f0000000240)={[{@loccookie='loccookie', 0x2c}, {@meta='meta', 0x2c}, {@nodiscard='nodiscard', 0x2c}]}) 2018/04/13 21:33:23 executing program 2: mmap(&(0x7f000092d000/0x400000)=nil, 0x400000, 0x7fffffff, 0x2000000208972, 0xffffffffffffffff, 0x0) madvise(&(0x7f0000b80000/0x2000)=nil, 0x2000, 0x0) ioctl$SNDRV_SEQ_IOCTL_SYSTEM_INFO(0xffffffffffffffff, 0xc0305302, &(0x7f0000000000)={0xdbc, 0x0, 0x80, 0x9d7b, 0x400, 0xfffffffffffff000}) madvise(&(0x7f000092d000/0x400000)=nil, 0x400000, 0x10200000008) ioctl$TIOCGWINSZ(0xffffffffffffffff, 0x5413, &(0x7f00000000c0)) r0 = socket(0x10, 0x2, 0x0) sendmsg$nl_route(r0, &(0x7f0000504000)={&(0x7f0000c27000)={0x10}, 0xc, &(0x7f0000434ff0)={&(0x7f00000003c0)=ANY=[@ANYRES32=0x0, @ANYBLOB="b5cda83fcf5c6f5965c1673031f1cce2890bbde355fe5489f4c1e296c617a04add6934693319f697b5740e5504b4790f9fda75cbfff5d3facf7eab5ecc1d421fde19f2355c89eea17f9743eb3a1093e1b2cfe686152a091b126312b998845945021ffa5e00eb8d393ddbfa91dcf730dead0886b411a42251dbb5ec71ed1dca13899c5c6765c478c63154a9b123bdf9e8869246eff7c026a019899827ddd6d22ce6f3a204b39c33a7c3b07541aa1878463ed5a06415e65a5623001ee241edb513db8eba60c9f296d8bf81d041aab550e0df64c814b76bd8e3db89186a509ac09d0000000000000000000000000000000da9915746cd9dc453f7d05e6fdf0e2d688b8ec2863a6442d176031500052bc42837be36ee443e8bcfa1a58b58373c094df7b113e4355f2b6c1ff232088d026cf6ac08bfcaceb04de68808cd6c388990ac2202bb230a7106da980f8ff02ad26565cc3c9687edef528972870d3196355adbb26bff2d5edb1486649f4cbc9d20852d72b341ca2463170f0586d8a403ad31cdae27dedbcf14f20a535c178f7adea35e02e3a8"], 0x2}, 0x1}, 0x0) getsockopt$inet_sctp6_SCTP_HMAC_IDENT(r0, 0x84, 0x16, &(0x7f0000000180)=ANY=[], &(0x7f0000000080)) r1 = dup(0xffffffffffffff9c) clone(0x0, &(0x7f0000000000), &(0x7f0000000ffc), &(0x7f0000000ffc), &(0x7f0000000000)) mlock(&(0x7f0000a67000/0x2000)=nil, 0x2000) r2 = inotify_init() mkdir(&(0x7f0000042ff6)='./control\x00', 0x0) creat(&(0x7f0000fc7000)='./control/file0\x00', 0x0) r3 = inotify_init1(0x0) inotify_add_watch(r3, &(0x7f0000fc7000)='./control\x00', 0x86000006) inotify_add_watch(r2, &(0x7f0000fc8000)='./control\x00', 0x2000000) creat(&(0x7f0000000000)='./control/file0\x00', 0x0) lstat(&(0x7f0000000040)='./control/file0\x00', &(0x7f0000000080)) mremap(&(0x7f0000c73000/0x2000)=nil, 0x2000, 0x3000, 0x3, &(0x7f0000ffc000/0x3000)=nil) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000000140)={{&(0x7f0000b75000/0x2000)=nil, 0x2000}, 0x1}) 2018/04/13 21:33:23 executing program 5: r0 = socket$inet6(0xa, 0x2100000000000002, 0x0) perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f00000001c0)={{{@in6=@ipv4={[], [0xff, 0xff], @rand_addr}, @in=@broadcast=0xffffffff, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {}, 0x0, 0x0, 0x800000000000001}, {{@in6=@loopback={0x0, 0x1}, 0x0, 0x2b}, 0x0, @in, 0x0, 0x4, 0x0, 0x401}}, 0xe8) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @local={0xfe, 0x80, [], 0xaa}, 0x2}, 0x1c) 2018/04/13 21:33:23 executing program 7: openat$sequencer(0xffffffffffffff9c, &(0x7f00007a8000)='/dev/sequencer\x00', 0x0, 0x0) r0 = syz_open_dev$sndtimer(&(0x7f0000000040)='/dev/snd/timer\x00', 0x0, 0x82800) ioctl$SNDRV_TIMER_IOCTL_SELECT(r0, 0x40345410, &(0x7f0000029fcc)={{0x0, 0x2, 0x0, 0xffefffffffffffff}}) ioctl$SNDRV_TIMER_IOCTL_PARAMS(r0, 0x40505412, &(0x7f0000d97000)={0xffffffffffffffff, 0x1000000200007d}) readv(r0, &(0x7f0000d48fc0)=[{&(0x7f00003effa9)=""/87, 0x57}], 0x1) 2018/04/13 21:33:23 executing program 4: socket$packet(0x11, 0x0, 0x300) r0 = socket$packet(0x11, 0x2, 0x300) r1 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dsp\x00', 0x40, 0x0) ioctl$sock_inet6_tcp_SIOCINQ(r1, 0x541b, &(0x7f0000000040)) setsockopt$packet_int(r0, 0x107, 0x14, &(0x7f0000010ffc)=0x5, 0x4) sendto$inet6(r0, &(0x7f0000003fd9), 0x0, 0x0, &(0x7f0000008000)={0xa, 0x0, 0x7}, 0x1c) setsockopt$netlink_NETLINK_NO_ENOBUFS(r1, 0x10e, 0x5, &(0x7f0000000080)=0x2, 0x4) 2018/04/13 21:33:23 executing program 6: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00007a0000)={0xffffffffffffffff, 0xffffffffffffffff}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000616ff8)={0xffffffffffffffff, 0xffffffffffffffff}) perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) dup3(r1, r0, 0x0) sendmsg$unix(r2, &(0x7f0000bba000)={&(0x7f00003a2000)=@abs, 0x8, &(0x7f00006c6ff0), 0x0, &(0x7f00009dffb8)=[@rights={0x18, 0x1, 0x1, [r0]}], 0x18}, 0x0) close(r2) close(r1) 2018/04/13 21:33:23 executing program 1: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000080)={&(0x7f0000000040)={0x10}, 0xc, &(0x7f0000000000)={&(0x7f00000000c0)=@acquire={0x16c, 0x17, 0x1, 0x0, 0x0, {{@in=@multicast1=0xe0000001}, @in6=@ipv4={[], [0xff, 0xff], @dev={0xac, 0x14, 0x14}}, {@in=@loopback=0x7f000001, @in6=@local={0xfe, 0x80, [], 0xaa}}, {{@in=@rand_addr, @in=@multicast1=0xe0000001, 0x0, 0x0, 0x0, 0x0, 0x2}}, 0x9}, [@tmpl={0x44, 0x5, [{{@in6=@mcast1={0xff, 0x1, [], 0x1}, 0x0, 0x33}, 0x0, @in=@multicast1=0xe0000001}]}]}, 0x16c}, 0x1}, 0x0) 2018/04/13 21:33:23 executing program 3: mmap(&(0x7f0000cb1000/0x3000)=nil, 0x3000, 0x80008, 0x32, 0xffffffffffffffff, 0x10000003ffe) r0 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e23}, 0x1c) r1 = syz_open_dev$dspn(&(0x7f0000000040)='/dev/dsp#\x00', 0x6, 0x0) bind$can_raw(r1, &(0x7f0000000080)={0x1d}, 0x10) listen(r0, 0x5eb857) r2 = socket$inet_dccp(0x2, 0x6, 0x0) connect$inet(r2, &(0x7f0000772000)={0x2, 0x4e23}, 0x10) r3 = accept4(r0, &(0x7f0000975000)=@can, &(0x7f0000752ffc)=0x10, 0x0) r4 = dup2(r3, r0) syz_open_dev$audion(&(0x7f0000000440)='/dev/audio#\x00', 0x7, 0x20000) renameat2(r4, &(0x7f0000000400)='./file0\x00', r2, &(0x7f0000000100)='./file0\x00', 0x3) sendto$inet(r2, &(0x7f0000531fff), 0x0, 0x0, 0x0, 0x0) sendmsg$nl_netfilter(r3, &(0x7f0000b76fc8)={&(0x7f0000715000)={0x10}, 0xc, &(0x7f000066f000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="35000000ffffff7f00000000ffff00000080000012ef79d6f30fd2a4987a1e2f2fc269ec"], 0x24}, 0x1}, 0x0) sendmmsg(r0, &(0x7f000000b880)=[{{0x0, 0x0, &(0x7f0000002140)=[{&(0x7f0000002100)="8b557b6d36259e2ddb7c8962f9e22c53ed1e43c6", 0x14}], 0x1, &(0x7f0000002180)}}], 0x1, 0x0) perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$DRM_IOCTL_AGP_ALLOC(r4, 0xc0206434, &(0x7f0000000140)={0x438, 0x0, 0x0, 0x9}) ioctl$DRM_IOCTL_AGP_FREE(r4, 0x40206435, &(0x7f0000000180)={0x7fff, r5, 0x10001}) r6 = socket(0x10, 0x20000000802, 0x0) write(r6, &(0x7f0000000080)="1f000000520007f2000094fef5000f430700000000000000000100ffffb92b", 0x1f) recvmmsg(r6, &(0x7f0000002500)=[{{0x0, 0x0, &(0x7f0000002080), 0x0, &(0x7f0000002100)=""/121, 0x79}}], 0x1, 0x0, &(0x7f0000005400)={0x0, 0x1c9c380}) ioctl$sock_inet_SIOCGIFDSTADDR(r0, 0x8917, &(0x7f00000001c0)={'ip_vti0\x00', {0x2, 0x4e22, @remote={0xac, 0x14, 0x14, 0xbb}}}) sendmsg$alg(r4, &(0x7f0000000800)={0x0, 0x0, &(0x7f0000000500)=[{&(0x7f0000000200)="d2a181944e3b7f0ddf469dc6fd079040f22fea65e9ec3b2b7a4dff8526f32b9ffbacf7ad8a543a8ac6428cc2841371a28c73ad080418857e2fc9ac1fbe92337006ea2366d92c3e6e359b39d07552875b4a72ca19c24cd98b303a2b5b79c74abf14b3fc4e8c484f0733dbc782d006a7b13e3d417ba2da26424d4e251d16dee4098d10f2b858311155f24408aba6613df2dc16183c134310b08eef730c83b008c05243ba499048684cd3d47c777807661ab7ff7d2978f37c29", 0xb8}], 0x1, &(0x7f0000000540)=ANY=[@ANYBLOB="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"], 0x2a8, 0x4000}, 0x1) setsockopt$inet6_tcp_buf(0xffffffffffffffff, 0x6, 0x0, &(0x7f0000141000), 0x0) write(r2, &(0x7f0000f8aff1), 0xff8f) sendto$inet(r2, &(0x7f0000494f01), 0x0, 0x0, &(0x7f0000198ff0)={0x2, 0x4e20, @multicast1=0xe0000001}, 0x10) 2018/04/13 21:33:23 executing program 0: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00001b4ff6)='/dev/ptmx\x00', 0x106, 0x0) ioctl$TCSETA(r0, 0x5406, &(0x7f0000000040)={0xfffffffffffffc01, 0x0, 0x0, 0xfff, 0x0, 0x0, 0x0, 0x0, 0x4}) writev(r0, &(0x7f00000b5000)=[{&(0x7f0000b51000)="ebb29c2aa804af648d63b2908439b40213", 0x11}], 0x1) ioctl$TCSETA(r0, 0x5402, &(0x7f00000018c0)) 2018/04/13 21:33:23 executing program 2: mmap(&(0x7f000092d000/0x400000)=nil, 0x400000, 0x7fffffff, 0x2000000208972, 0xffffffffffffffff, 0x0) madvise(&(0x7f0000b80000/0x2000)=nil, 0x2000, 0x0) ioctl$SNDRV_SEQ_IOCTL_SYSTEM_INFO(0xffffffffffffffff, 0xc0305302, &(0x7f0000000000)={0xdbc, 0x0, 0x80, 0x9d7b, 0x400, 0xfffffffffffff000}) madvise(&(0x7f000092d000/0x400000)=nil, 0x400000, 0x10200000008) ioctl$TIOCGWINSZ(0xffffffffffffffff, 0x5413, &(0x7f00000000c0)) r0 = socket(0x10, 0x2, 0x0) sendmsg$nl_route(r0, &(0x7f0000504000)={&(0x7f0000c27000)={0x10}, 0xc, &(0x7f0000434ff0)={&(0x7f00000003c0)=ANY=[@ANYRES32=0x0, @ANYBLOB="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"], 0x2}, 0x1}, 0x0) getsockopt$inet_sctp6_SCTP_HMAC_IDENT(r0, 0x84, 0x16, &(0x7f0000000180)=ANY=[], &(0x7f0000000080)) r1 = dup(0xffffffffffffff9c) clone(0x0, &(0x7f0000000000), &(0x7f0000000ffc), &(0x7f0000000ffc), &(0x7f0000000000)) mlock(&(0x7f0000a67000/0x2000)=nil, 0x2000) r2 = inotify_init() mkdir(&(0x7f0000042ff6)='./control\x00', 0x0) creat(&(0x7f0000fc7000)='./control/file0\x00', 0x0) r3 = inotify_init1(0x0) inotify_add_watch(r3, &(0x7f0000fc7000)='./control\x00', 0x86000006) inotify_add_watch(r2, &(0x7f0000fc8000)='./control\x00', 0x2000000) creat(&(0x7f0000000000)='./control/file0\x00', 0x0) lstat(&(0x7f0000000040)='./control/file0\x00', &(0x7f0000000080)) mremap(&(0x7f0000c73000/0x2000)=nil, 0x2000, 0x3000, 0x3, &(0x7f0000ffc000/0x3000)=nil) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000000140)={{&(0x7f0000b75000/0x2000)=nil, 0x2000}, 0x1}) [ 284.191725] dccp_close: ABORT with 65423 bytes unread 2018/04/13 21:33:23 executing program 1: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000080)={&(0x7f0000000040)={0x10}, 0xc, &(0x7f0000000000)={&(0x7f00000000c0)=@acquire={0x16c, 0x17, 0x1, 0x0, 0x0, {{@in=@multicast1=0xe0000001}, @in6=@ipv4={[], [0xff, 0xff], @dev={0xac, 0x14, 0x14}}, {@in=@loopback=0x7f000001, @in6=@local={0xfe, 0x80, [], 0xaa}}, {{@in=@rand_addr, @in=@multicast1=0xe0000001, 0x0, 0x0, 0x0, 0x0, 0x2}}, 0x9}, [@tmpl={0x44, 0x5, [{{@in6=@mcast1={0xff, 0x1, [], 0x1}, 0x0, 0x33}, 0x0, @in=@multicast1=0xe0000001}]}]}, 0x16c}, 0x1}, 0x0) 2018/04/13 21:33:23 executing program 4: socket$packet(0x11, 0x0, 0x300) r0 = socket$packet(0x11, 0x2, 0x300) r1 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dsp\x00', 0x40, 0x0) ioctl$sock_inet6_tcp_SIOCINQ(r1, 0x541b, &(0x7f0000000040)) setsockopt$packet_int(r0, 0x107, 0x14, &(0x7f0000010ffc)=0x5, 0x4) sendto$inet6(r0, &(0x7f0000003fd9), 0x0, 0x0, &(0x7f0000008000)={0xa, 0x0, 0x7}, 0x1c) setsockopt$netlink_NETLINK_NO_ENOBUFS(r1, 0x10e, 0x5, &(0x7f0000000080)=0x2, 0x4) 2018/04/13 21:33:23 executing program 6: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00007a0000)={0xffffffffffffffff, 0xffffffffffffffff}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000616ff8)={0xffffffffffffffff, 0xffffffffffffffff}) perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) dup3(r1, r0, 0x0) sendmsg$unix(r2, &(0x7f0000bba000)={&(0x7f00003a2000)=@abs, 0x8, &(0x7f00006c6ff0), 0x0, &(0x7f00009dffb8)=[@rights={0x18, 0x1, 0x1, [r0]}], 0x18}, 0x0) close(r2) close(r1) 2018/04/13 21:33:23 executing program 5: r0 = socket$inet6(0xa, 0x2100000000000002, 0x0) perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f00000001c0)={{{@in6=@ipv4={[], [0xff, 0xff], @rand_addr}, @in=@broadcast=0xffffffff, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {}, 0x0, 0x0, 0x800000000000001}, {{@in6=@loopback={0x0, 0x1}, 0x0, 0x2b}, 0x0, @in, 0x0, 0x4, 0x0, 0x401}}, 0xe8) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @local={0xfe, 0x80, [], 0xaa}, 0x2}, 0x1c) 2018/04/13 21:33:23 executing program 7: openat$sequencer(0xffffffffffffff9c, &(0x7f00007a8000)='/dev/sequencer\x00', 0x0, 0x0) r0 = syz_open_dev$sndtimer(&(0x7f0000000040)='/dev/snd/timer\x00', 0x0, 0x82800) ioctl$SNDRV_TIMER_IOCTL_SELECT(r0, 0x40345410, &(0x7f0000029fcc)={{0x0, 0x2, 0x0, 0xffefffffffffffff}}) ioctl$SNDRV_TIMER_IOCTL_PARAMS(r0, 0x40505412, &(0x7f0000d97000)={0xffffffffffffffff, 0x1000000200007d}) readv(r0, &(0x7f0000d48fc0)=[{&(0x7f00003effa9)=""/87, 0x57}], 0x1) 2018/04/13 21:33:23 executing program 0: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00001b4ff6)='/dev/ptmx\x00', 0x106, 0x0) ioctl$TCSETA(r0, 0x5406, &(0x7f0000000040)={0xfffffffffffffc01, 0x0, 0x0, 0xfff, 0x0, 0x0, 0x0, 0x0, 0x4}) writev(r0, &(0x7f00000b5000)=[{&(0x7f0000b51000)="ebb29c2aa804af648d63b2908439b40213", 0x11}], 0x1) ioctl$TCSETA(r0, 0x5402, &(0x7f00000018c0)) 2018/04/13 21:33:23 executing program 5: openat$sequencer(0xffffffffffffff9c, &(0x7f00007a8000)='/dev/sequencer\x00', 0x0, 0x0) r0 = syz_open_dev$sndtimer(&(0x7f0000000040)='/dev/snd/timer\x00', 0x0, 0x82800) ioctl$SNDRV_TIMER_IOCTL_SELECT(r0, 0x40345410, &(0x7f0000029fcc)={{0x0, 0x2, 0x0, 0xffefffffffffffff}}) ioctl$SNDRV_TIMER_IOCTL_PARAMS(r0, 0x40505412, &(0x7f0000d97000)={0xffffffffffffffff, 0x1000000200007d}) readv(r0, &(0x7f0000d48fc0)=[{&(0x7f00003effa9)=""/87, 0x57}], 0x1) [ 284.320509] dccp_close: ABORT with 65423 bytes unread 2018/04/13 21:33:23 executing program 5: openat$sequencer(0xffffffffffffff9c, &(0x7f00007a8000)='/dev/sequencer\x00', 0x0, 0x0) r0 = syz_open_dev$sndtimer(&(0x7f0000000040)='/dev/snd/timer\x00', 0x0, 0x82800) ioctl$SNDRV_TIMER_IOCTL_SELECT(r0, 0x40345410, &(0x7f0000029fcc)={{0x0, 0x2, 0x0, 0xffefffffffffffff}}) ioctl$SNDRV_TIMER_IOCTL_PARAMS(r0, 0x40505412, &(0x7f0000d97000)={0xffffffffffffffff, 0x1000000200007d}) readv(r0, &(0x7f0000d48fc0)=[{&(0x7f00003effa9)=""/87, 0x57}], 0x1) 2018/04/13 21:33:23 executing program 3: mmap(&(0x7f0000cb1000/0x3000)=nil, 0x3000, 0x80008, 0x32, 0xffffffffffffffff, 0x10000003ffe) r0 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e23}, 0x1c) r1 = syz_open_dev$dspn(&(0x7f0000000040)='/dev/dsp#\x00', 0x6, 0x0) bind$can_raw(r1, &(0x7f0000000080)={0x1d}, 0x10) listen(r0, 0x5eb857) r2 = socket$inet_dccp(0x2, 0x6, 0x0) connect$inet(r2, &(0x7f0000772000)={0x2, 0x4e23}, 0x10) r3 = accept4(r0, &(0x7f0000975000)=@can, &(0x7f0000752ffc)=0x10, 0x0) r4 = dup2(r3, r0) syz_open_dev$audion(&(0x7f0000000440)='/dev/audio#\x00', 0x7, 0x20000) renameat2(r4, &(0x7f0000000400)='./file0\x00', r2, &(0x7f0000000100)='./file0\x00', 0x3) sendto$inet(r2, &(0x7f0000531fff), 0x0, 0x0, 0x0, 0x0) sendmsg$nl_netfilter(r3, &(0x7f0000b76fc8)={&(0x7f0000715000)={0x10}, 0xc, &(0x7f000066f000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="35000000ffffff7f00000000ffff00000080000012ef79d6f30fd2a4987a1e2f2fc269ec"], 0x24}, 0x1}, 0x0) sendmmsg(r0, &(0x7f000000b880)=[{{0x0, 0x0, &(0x7f0000002140)=[{&(0x7f0000002100)="8b557b6d36259e2ddb7c8962f9e22c53ed1e43c6", 0x14}], 0x1, &(0x7f0000002180)}}], 0x1, 0x0) perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$DRM_IOCTL_AGP_ALLOC(r4, 0xc0206434, &(0x7f0000000140)={0x438, 0x0, 0x0, 0x9}) ioctl$DRM_IOCTL_AGP_FREE(r4, 0x40206435, &(0x7f0000000180)={0x7fff, r5, 0x10001}) r6 = socket(0x10, 0x20000000802, 0x0) write(r6, &(0x7f0000000080)="1f000000520007f2000094fef5000f430700000000000000000100ffffb92b", 0x1f) recvmmsg(r6, &(0x7f0000002500)=[{{0x0, 0x0, &(0x7f0000002080), 0x0, &(0x7f0000002100)=""/121, 0x79}}], 0x1, 0x0, &(0x7f0000005400)={0x0, 0x1c9c380}) ioctl$sock_inet_SIOCGIFDSTADDR(r0, 0x8917, &(0x7f00000001c0)={'ip_vti0\x00', {0x2, 0x4e22, @remote={0xac, 0x14, 0x14, 0xbb}}}) sendmsg$alg(r4, &(0x7f0000000800)={0x0, 0x0, &(0x7f0000000500)=[{&(0x7f0000000200)="d2a181944e3b7f0ddf469dc6fd079040f22fea65e9ec3b2b7a4dff8526f32b9ffbacf7ad8a543a8ac6428cc2841371a28c73ad080418857e2fc9ac1fbe92337006ea2366d92c3e6e359b39d07552875b4a72ca19c24cd98b303a2b5b79c74abf14b3fc4e8c484f0733dbc782d006a7b13e3d417ba2da26424d4e251d16dee4098d10f2b858311155f24408aba6613df2dc16183c134310b08eef730c83b008c05243ba499048684cd3d47c777807661ab7ff7d2978f37c29", 0xb8}], 0x1, &(0x7f0000000540)=ANY=[@ANYBLOB="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"], 0x2a8, 0x4000}, 0x1) setsockopt$inet6_tcp_buf(0xffffffffffffffff, 0x6, 0x0, &(0x7f0000141000), 0x0) write(r2, &(0x7f0000f8aff1), 0xff8f) sendto$inet(r2, &(0x7f0000494f01), 0x0, 0x0, &(0x7f0000198ff0)={0x2, 0x4e20, @multicast1=0xe0000001}, 0x10) 2018/04/13 21:33:23 executing program 1: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000080)={&(0x7f0000000040)={0x10}, 0xc, &(0x7f0000000000)={&(0x7f00000000c0)=@acquire={0x16c, 0x17, 0x1, 0x0, 0x0, {{@in=@multicast1=0xe0000001}, @in6=@ipv4={[], [0xff, 0xff], @dev={0xac, 0x14, 0x14}}, {@in=@loopback=0x7f000001, @in6=@local={0xfe, 0x80, [], 0xaa}}, {{@in=@rand_addr, @in=@multicast1=0xe0000001, 0x0, 0x0, 0x0, 0x0, 0x2}}, 0x9}, [@tmpl={0x44, 0x5, [{{@in6=@mcast1={0xff, 0x1, [], 0x1}, 0x0, 0x33}, 0x0, @in=@multicast1=0xe0000001}]}]}, 0x16c}, 0x1}, 0x0) 2018/04/13 21:33:23 executing program 6: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00007a0000)={0xffffffffffffffff, 0xffffffffffffffff}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000616ff8)={0xffffffffffffffff, 0xffffffffffffffff}) perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) dup3(r1, r0, 0x0) sendmsg$unix(r2, &(0x7f0000bba000)={&(0x7f00003a2000)=@abs, 0x8, &(0x7f00006c6ff0), 0x0, &(0x7f00009dffb8)=[@rights={0x18, 0x1, 0x1, [r0]}], 0x18}, 0x0) close(r2) close(r1) 2018/04/13 21:33:23 executing program 0: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00001b4ff6)='/dev/ptmx\x00', 0x106, 0x0) ioctl$TCSETA(r0, 0x5406, &(0x7f0000000040)={0xfffffffffffffc01, 0x0, 0x0, 0xfff, 0x0, 0x0, 0x0, 0x0, 0x4}) writev(r0, &(0x7f00000b5000)=[{&(0x7f0000b51000)="ebb29c2aa804af648d63b2908439b40213", 0x11}], 0x1) ioctl$TCSETA(r0, 0x5402, &(0x7f00000018c0)) 2018/04/13 21:33:23 executing program 7: openat$sequencer(0xffffffffffffff9c, &(0x7f00007a8000)='/dev/sequencer\x00', 0x0, 0x0) r0 = syz_open_dev$sndtimer(&(0x7f0000000040)='/dev/snd/timer\x00', 0x0, 0x82800) ioctl$SNDRV_TIMER_IOCTL_SELECT(r0, 0x40345410, &(0x7f0000029fcc)={{0x0, 0x2, 0x0, 0xffefffffffffffff}}) ioctl$SNDRV_TIMER_IOCTL_PARAMS(r0, 0x40505412, &(0x7f0000d97000)={0xffffffffffffffff, 0x1000000200007d}) readv(r0, &(0x7f0000d48fc0)=[{&(0x7f00003effa9)=""/87, 0x57}], 0x1) 2018/04/13 21:33:23 executing program 2: mmap(&(0x7f000092d000/0x400000)=nil, 0x400000, 0x7fffffff, 0x2000000208972, 0xffffffffffffffff, 0x0) madvise(&(0x7f0000b80000/0x2000)=nil, 0x2000, 0x0) ioctl$SNDRV_SEQ_IOCTL_SYSTEM_INFO(0xffffffffffffffff, 0xc0305302, &(0x7f0000000000)={0xdbc, 0x0, 0x80, 0x9d7b, 0x400, 0xfffffffffffff000}) madvise(&(0x7f000092d000/0x400000)=nil, 0x400000, 0x10200000008) ioctl$TIOCGWINSZ(0xffffffffffffffff, 0x5413, &(0x7f00000000c0)) r0 = socket(0x10, 0x2, 0x0) sendmsg$nl_route(r0, &(0x7f0000504000)={&(0x7f0000c27000)={0x10}, 0xc, &(0x7f0000434ff0)={&(0x7f00000003c0)=ANY=[@ANYRES32=0x0, @ANYBLOB="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"], 0x2}, 0x1}, 0x0) getsockopt$inet_sctp6_SCTP_HMAC_IDENT(r0, 0x84, 0x16, &(0x7f0000000180)=ANY=[], &(0x7f0000000080)) r1 = dup(0xffffffffffffff9c) clone(0x0, &(0x7f0000000000), &(0x7f0000000ffc), &(0x7f0000000ffc), &(0x7f0000000000)) mlock(&(0x7f0000a67000/0x2000)=nil, 0x2000) r2 = inotify_init() mkdir(&(0x7f0000042ff6)='./control\x00', 0x0) creat(&(0x7f0000fc7000)='./control/file0\x00', 0x0) r3 = inotify_init1(0x0) inotify_add_watch(r3, &(0x7f0000fc7000)='./control\x00', 0x86000006) inotify_add_watch(r2, &(0x7f0000fc8000)='./control\x00', 0x2000000) creat(&(0x7f0000000000)='./control/file0\x00', 0x0) lstat(&(0x7f0000000040)='./control/file0\x00', &(0x7f0000000080)) mremap(&(0x7f0000c73000/0x2000)=nil, 0x2000, 0x3000, 0x3, &(0x7f0000ffc000/0x3000)=nil) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000000140)={{&(0x7f0000b75000/0x2000)=nil, 0x2000}, 0x1}) 2018/04/13 21:33:23 executing program 4: mmap(&(0x7f0000cb1000/0x3000)=nil, 0x3000, 0x80008, 0x32, 0xffffffffffffffff, 0x10000003ffe) r0 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e23}, 0x1c) r1 = syz_open_dev$dspn(&(0x7f0000000040)='/dev/dsp#\x00', 0x6, 0x0) bind$can_raw(r1, &(0x7f0000000080)={0x1d}, 0x10) listen(r0, 0x5eb857) r2 = socket$inet_dccp(0x2, 0x6, 0x0) connect$inet(r2, &(0x7f0000772000)={0x2, 0x4e23}, 0x10) r3 = accept4(r0, &(0x7f0000975000)=@can, &(0x7f0000752ffc)=0x10, 0x0) r4 = dup2(r3, r0) syz_open_dev$audion(&(0x7f0000000440)='/dev/audio#\x00', 0x7, 0x20000) renameat2(r4, &(0x7f0000000400)='./file0\x00', r2, &(0x7f0000000100)='./file0\x00', 0x3) sendto$inet(r2, &(0x7f0000531fff), 0x0, 0x0, 0x0, 0x0) sendmsg$nl_netfilter(r3, &(0x7f0000b76fc8)={&(0x7f0000715000)={0x10}, 0xc, &(0x7f000066f000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="35000000ffffff7f00000000ffff00000080000012ef79d6f30fd2a4987a1e2f2fc269ec"], 0x24}, 0x1}, 0x0) sendmmsg(r0, &(0x7f000000b880)=[{{0x0, 0x0, &(0x7f0000002140)=[{&(0x7f0000002100)="8b557b6d36259e2ddb7c8962f9e22c53ed1e43c6", 0x14}], 0x1, &(0x7f0000002180)}}], 0x1, 0x0) perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$DRM_IOCTL_AGP_ALLOC(r4, 0xc0206434, &(0x7f0000000140)={0x438, 0x0, 0x0, 0x9}) ioctl$DRM_IOCTL_AGP_FREE(r4, 0x40206435, &(0x7f0000000180)={0x7fff, r5, 0x10001}) r6 = socket(0x10, 0x20000000802, 0x0) write(r6, &(0x7f0000000080)="1f000000520007f2000094fef5000f430700000000000000000100ffffb92b", 0x1f) recvmmsg(r6, &(0x7f0000002500)=[{{0x0, 0x0, &(0x7f0000002080), 0x0, &(0x7f0000002100)=""/121, 0x79}}], 0x1, 0x0, &(0x7f0000005400)={0x0, 0x1c9c380}) ioctl$sock_inet_SIOCGIFDSTADDR(r0, 0x8917, &(0x7f00000001c0)={'ip_vti0\x00', {0x2, 0x4e22, @remote={0xac, 0x14, 0x14, 0xbb}}}) sendmsg$alg(r4, &(0x7f0000000800)={0x0, 0x0, &(0x7f0000000500)=[{&(0x7f0000000200)="d2a181944e3b7f0ddf469dc6fd079040f22fea65e9ec3b2b7a4dff8526f32b9ffbacf7ad8a543a8ac6428cc2841371a28c73ad080418857e2fc9ac1fbe92337006ea2366d92c3e6e359b39d07552875b4a72ca19c24cd98b303a2b5b79c74abf14b3fc4e8c484f0733dbc782d006a7b13e3d417ba2da26424d4e251d16dee4098d10f2b858311155f24408aba6613df2dc16183c134310b08eef730c83b008c05243ba499048684cd3d47c777807661ab7ff7d2978f37c29", 0xb8}], 0x1, &(0x7f0000000540)=ANY=[@ANYBLOB="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"], 0x2a8, 0x4000}, 0x1) setsockopt$inet6_tcp_buf(0xffffffffffffffff, 0x6, 0x0, &(0x7f0000141000), 0x0) write(r2, &(0x7f0000f8aff1), 0xff8f) sendto$inet(r2, &(0x7f0000494f01), 0x0, 0x0, &(0x7f0000198ff0)={0x2, 0x4e20, @multicast1=0xe0000001}, 0x10) 2018/04/13 21:33:24 executing program 1: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000080)={&(0x7f0000000040)={0x10}, 0xc, &(0x7f0000000000)={&(0x7f00000000c0)=@acquire={0x16c, 0x17, 0x1, 0x0, 0x0, {{@in=@multicast1=0xe0000001}, @in6=@ipv4={[], [0xff, 0xff], @dev={0xac, 0x14, 0x14}}, {@in=@loopback=0x7f000001, @in6=@local={0xfe, 0x80, [], 0xaa}}, {{@in=@rand_addr, @in=@multicast1=0xe0000001, 0x0, 0x0, 0x0, 0x0, 0x2}}, 0x9}, [@tmpl={0x44, 0x5, [{{@in6=@mcast1={0xff, 0x1, [], 0x1}, 0x0, 0x33}, 0x0, @in=@multicast1=0xe0000001}]}]}, 0x16c}, 0x1}, 0x0) 2018/04/13 21:33:24 executing program 6: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x2000000000000022, &(0x7f0000356000)=0x1, 0x4) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000480)='syz_tun\x00', 0x25) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$inet6_IPV6_PKTINFO(r0, 0x29, 0x32, &(0x7f0000000140)={@mcast1={0xff, 0x1, [], 0x1}}, 0x14) bind$inet6(r0, &(0x7f0000000080)={0xa}, 0x1c) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000040), &(0x7f00000000c0)=0xc) sendto$inet6(r0, &(0x7f0000000000)="15", 0x1, 0x200408d6, &(0x7f00000011c0)={0xa, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xbb}}, 0x1c) 2018/04/13 21:33:24 executing program 7: openat$sequencer(0xffffffffffffff9c, &(0x7f00007a8000)='/dev/sequencer\x00', 0x0, 0x0) r0 = syz_open_dev$sndtimer(&(0x7f0000000040)='/dev/snd/timer\x00', 0x0, 0x82800) ioctl$SNDRV_TIMER_IOCTL_SELECT(r0, 0x40345410, &(0x7f0000029fcc)={{0x0, 0x2, 0x0, 0xffefffffffffffff}}) ioctl$SNDRV_TIMER_IOCTL_PARAMS(r0, 0x40505412, &(0x7f0000d97000)={0xffffffffffffffff, 0x1000000200007d}) readv(r0, &(0x7f0000d48fc0)=[{&(0x7f00003effa9)=""/87, 0x57}], 0x1) 2018/04/13 21:33:24 executing program 5: openat$sequencer(0xffffffffffffff9c, &(0x7f00007a8000)='/dev/sequencer\x00', 0x0, 0x0) r0 = syz_open_dev$sndtimer(&(0x7f0000000040)='/dev/snd/timer\x00', 0x0, 0x82800) ioctl$SNDRV_TIMER_IOCTL_SELECT(r0, 0x40345410, &(0x7f0000029fcc)={{0x0, 0x2, 0x0, 0xffefffffffffffff}}) ioctl$SNDRV_TIMER_IOCTL_PARAMS(r0, 0x40505412, &(0x7f0000d97000)={0xffffffffffffffff, 0x1000000200007d}) readv(r0, &(0x7f0000d48fc0)=[{&(0x7f00003effa9)=""/87, 0x57}], 0x1) 2018/04/13 21:33:24 executing program 0: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00001b4ff6)='/dev/ptmx\x00', 0x106, 0x0) ioctl$TCSETA(r0, 0x5406, &(0x7f0000000040)={0xfffffffffffffc01, 0x0, 0x0, 0xfff, 0x0, 0x0, 0x0, 0x0, 0x4}) writev(r0, &(0x7f00000b5000)=[{&(0x7f0000b51000)="ebb29c2aa804af648d63b2908439b40213", 0x11}], 0x1) ioctl$TCSETA(r0, 0x5402, &(0x7f00000018c0)) 2018/04/13 21:33:24 executing program 1: r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_int(r0, 0x107, 0x14, &(0x7f0000000040)=0x3, 0x4) sendto$inet6(r0, &(0x7f0000000100), 0x0, 0x0, &(0x7f0000000000)={0xa, 0x0, 0xc, @local={0xfe, 0x80, [], 0xaa}}, 0x1c) 2018/04/13 21:33:24 executing program 3: mmap(&(0x7f0000cb1000/0x3000)=nil, 0x3000, 0x80008, 0x32, 0xffffffffffffffff, 0x10000003ffe) r0 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e23}, 0x1c) r1 = syz_open_dev$dspn(&(0x7f0000000040)='/dev/dsp#\x00', 0x6, 0x0) bind$can_raw(r1, &(0x7f0000000080)={0x1d}, 0x10) listen(r0, 0x5eb857) r2 = socket$inet_dccp(0x2, 0x6, 0x0) connect$inet(r2, &(0x7f0000772000)={0x2, 0x4e23}, 0x10) r3 = accept4(r0, &(0x7f0000975000)=@can, &(0x7f0000752ffc)=0x10, 0x0) r4 = dup2(r3, r0) syz_open_dev$audion(&(0x7f0000000440)='/dev/audio#\x00', 0x7, 0x20000) renameat2(r4, &(0x7f0000000400)='./file0\x00', r2, &(0x7f0000000100)='./file0\x00', 0x3) sendto$inet(r2, &(0x7f0000531fff), 0x0, 0x0, 0x0, 0x0) sendmsg$nl_netfilter(r3, &(0x7f0000b76fc8)={&(0x7f0000715000)={0x10}, 0xc, &(0x7f000066f000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="35000000ffffff7f00000000ffff00000080000012ef79d6f30fd2a4987a1e2f2fc269ec"], 0x24}, 0x1}, 0x0) sendmmsg(r0, &(0x7f000000b880)=[{{0x0, 0x0, &(0x7f0000002140)=[{&(0x7f0000002100)="8b557b6d36259e2ddb7c8962f9e22c53ed1e43c6", 0x14}], 0x1, &(0x7f0000002180)}}], 0x1, 0x0) perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$DRM_IOCTL_AGP_ALLOC(r4, 0xc0206434, &(0x7f0000000140)={0x438, 0x0, 0x0, 0x9}) ioctl$DRM_IOCTL_AGP_FREE(r4, 0x40206435, &(0x7f0000000180)={0x7fff, r5, 0x10001}) r6 = socket(0x10, 0x20000000802, 0x0) write(r6, &(0x7f0000000080)="1f000000520007f2000094fef5000f430700000000000000000100ffffb92b", 0x1f) recvmmsg(r6, &(0x7f0000002500)=[{{0x0, 0x0, &(0x7f0000002080), 0x0, &(0x7f0000002100)=""/121, 0x79}}], 0x1, 0x0, &(0x7f0000005400)={0x0, 0x1c9c380}) ioctl$sock_inet_SIOCGIFDSTADDR(r0, 0x8917, &(0x7f00000001c0)={'ip_vti0\x00', {0x2, 0x4e22, @remote={0xac, 0x14, 0x14, 0xbb}}}) sendmsg$alg(r4, &(0x7f0000000800)={0x0, 0x0, &(0x7f0000000500)=[{&(0x7f0000000200)="d2a181944e3b7f0ddf469dc6fd079040f22fea65e9ec3b2b7a4dff8526f32b9ffbacf7ad8a543a8ac6428cc2841371a28c73ad080418857e2fc9ac1fbe92337006ea2366d92c3e6e359b39d07552875b4a72ca19c24cd98b303a2b5b79c74abf14b3fc4e8c484f0733dbc782d006a7b13e3d417ba2da26424d4e251d16dee4098d10f2b858311155f24408aba6613df2dc16183c134310b08eef730c83b008c05243ba499048684cd3d47c777807661ab7ff7d2978f37c29", 0xb8}], 0x1, &(0x7f0000000540)=ANY=[@ANYBLOB="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"], 0x2a8, 0x4000}, 0x1) setsockopt$inet6_tcp_buf(0xffffffffffffffff, 0x6, 0x0, &(0x7f0000141000), 0x0) write(r2, &(0x7f0000f8aff1), 0xff8f) sendto$inet(r2, &(0x7f0000494f01), 0x0, 0x0, &(0x7f0000198ff0)={0x2, 0x4e20, @multicast1=0xe0000001}, 0x10) [ 284.528233] dccp_close: ABORT with 65423 bytes unread [ 284.541758] dccp_close: ABORT with 65423 bytes unread [ 284.640655] dccp_close: ABORT with 65423 bytes unread 2018/04/13 21:33:24 executing program 3: r0 = socket$inet6(0xa, 0x5, 0x0) getsockopt$inet_sctp6_SCTP_HMAC_IDENT(r0, 0x84, 0x16, &(0x7f0000000100), &(0x7f0000000140)=0x4) 2018/04/13 21:33:24 executing program 4: mmap(&(0x7f0000cb1000/0x3000)=nil, 0x3000, 0x80008, 0x32, 0xffffffffffffffff, 0x10000003ffe) r0 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e23}, 0x1c) r1 = syz_open_dev$dspn(&(0x7f0000000040)='/dev/dsp#\x00', 0x6, 0x0) bind$can_raw(r1, &(0x7f0000000080)={0x1d}, 0x10) listen(r0, 0x5eb857) r2 = socket$inet_dccp(0x2, 0x6, 0x0) connect$inet(r2, &(0x7f0000772000)={0x2, 0x4e23}, 0x10) r3 = accept4(r0, &(0x7f0000975000)=@can, &(0x7f0000752ffc)=0x10, 0x0) r4 = dup2(r3, r0) syz_open_dev$audion(&(0x7f0000000440)='/dev/audio#\x00', 0x7, 0x20000) renameat2(r4, &(0x7f0000000400)='./file0\x00', r2, &(0x7f0000000100)='./file0\x00', 0x3) sendto$inet(r2, &(0x7f0000531fff), 0x0, 0x0, 0x0, 0x0) sendmsg$nl_netfilter(r3, &(0x7f0000b76fc8)={&(0x7f0000715000)={0x10}, 0xc, &(0x7f000066f000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="35000000ffffff7f00000000ffff00000080000012ef79d6f30fd2a4987a1e2f2fc269ec"], 0x24}, 0x1}, 0x0) sendmmsg(r0, &(0x7f000000b880)=[{{0x0, 0x0, &(0x7f0000002140)=[{&(0x7f0000002100)="8b557b6d36259e2ddb7c8962f9e22c53ed1e43c6", 0x14}], 0x1, &(0x7f0000002180)}}], 0x1, 0x0) perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$DRM_IOCTL_AGP_ALLOC(r4, 0xc0206434, &(0x7f0000000140)={0x438, 0x0, 0x0, 0x9}) ioctl$DRM_IOCTL_AGP_FREE(r4, 0x40206435, &(0x7f0000000180)={0x7fff, r5, 0x10001}) r6 = socket(0x10, 0x20000000802, 0x0) write(r6, &(0x7f0000000080)="1f000000520007f2000094fef5000f430700000000000000000100ffffb92b", 0x1f) recvmmsg(r6, &(0x7f0000002500)=[{{0x0, 0x0, &(0x7f0000002080), 0x0, &(0x7f0000002100)=""/121, 0x79}}], 0x1, 0x0, &(0x7f0000005400)={0x0, 0x1c9c380}) ioctl$sock_inet_SIOCGIFDSTADDR(r0, 0x8917, &(0x7f00000001c0)={'ip_vti0\x00', {0x2, 0x4e22, @remote={0xac, 0x14, 0x14, 0xbb}}}) sendmsg$alg(r4, &(0x7f0000000800)={0x0, 0x0, &(0x7f0000000500)=[{&(0x7f0000000200)="d2a181944e3b7f0ddf469dc6fd079040f22fea65e9ec3b2b7a4dff8526f32b9ffbacf7ad8a543a8ac6428cc2841371a28c73ad080418857e2fc9ac1fbe92337006ea2366d92c3e6e359b39d07552875b4a72ca19c24cd98b303a2b5b79c74abf14b3fc4e8c484f0733dbc782d006a7b13e3d417ba2da26424d4e251d16dee4098d10f2b858311155f24408aba6613df2dc16183c134310b08eef730c83b008c05243ba499048684cd3d47c777807661ab7ff7d2978f37c29", 0xb8}], 0x1, &(0x7f0000000540)=ANY=[@ANYBLOB="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"], 0x2a8, 0x4000}, 0x1) setsockopt$inet6_tcp_buf(0xffffffffffffffff, 0x6, 0x0, &(0x7f0000141000), 0x0) write(r2, &(0x7f0000f8aff1), 0xff8f) sendto$inet(r2, &(0x7f0000494f01), 0x0, 0x0, &(0x7f0000198ff0)={0x2, 0x4e20, @multicast1=0xe0000001}, 0x10) 2018/04/13 21:33:24 executing program 7: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000646000)={&(0x7f000059cff4)={0x10}, 0xc, &(0x7f0000f9bff0)={&(0x7f0000efe000)=@updpolicy={0xc4, 0x19, 0x401, 0x0, 0x0, {{@in6=@mcast2={0xff, 0x2, [], 0x1}, @in=@dev={0xac, 0x14}, 0x0, 0x0, 0x0, 0x0, 0xa}}, [@sec_ctx={0xc, 0x8, {0x8, 0x8}}]}, 0xc4}, 0x1}, 0x0) 2018/04/13 21:33:24 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x2000000000000022, &(0x7f0000356000)=0x1, 0x4) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000480)='syz_tun\x00', 0x25) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$inet6_IPV6_PKTINFO(r0, 0x29, 0x32, &(0x7f0000000140)={@mcast1={0xff, 0x1, [], 0x1}}, 0x14) bind$inet6(r0, &(0x7f0000000080)={0xa}, 0x1c) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000040), &(0x7f00000000c0)=0xc) sendto$inet6(r0, &(0x7f0000000000)="15", 0x1, 0x200408d6, &(0x7f00000011c0)={0xa, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xbb}}, 0x1c) 2018/04/13 21:33:24 executing program 5: r0 = socket$inet6(0xa, 0x80002, 0x100000000000088) poll(&(0x7f0000c58000)=[{r0, 0x2b}], 0x1, 0xade) bind$inet6(r0, &(0x7f0000d85fe4)={0xa, 0x4e23}, 0x1c) r1 = socket$inet6(0xa, 0x802, 0x88) setsockopt$inet6_udp_int(r1, 0x11, 0x100000000a, &(0x7f00005b1ffc)=0x1, 0x4) sendto$inet6(r1, &(0x7f0000000000)="96", 0x1, 0x0, &(0x7f0000001000)={0xa, 0x4e23, 0x0, @dev={0xfe, 0x80, [], 0x16}}, 0x1c) 2018/04/13 21:33:24 executing program 6: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x2000000000000022, &(0x7f0000356000)=0x1, 0x4) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000480)='syz_tun\x00', 0x25) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$inet6_IPV6_PKTINFO(r0, 0x29, 0x32, &(0x7f0000000140)={@mcast1={0xff, 0x1, [], 0x1}}, 0x14) bind$inet6(r0, &(0x7f0000000080)={0xa}, 0x1c) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000040), &(0x7f00000000c0)=0xc) sendto$inet6(r0, &(0x7f0000000000)="15", 0x1, 0x200408d6, &(0x7f00000011c0)={0xa, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xbb}}, 0x1c) 2018/04/13 21:33:24 executing program 1: r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_int(r0, 0x107, 0x14, &(0x7f0000000040)=0x3, 0x4) sendto$inet6(r0, &(0x7f0000000100), 0x0, 0x0, &(0x7f0000000000)={0xa, 0x0, 0xc, @local={0xfe, 0x80, [], 0xaa}}, 0x1c) 2018/04/13 21:33:24 executing program 2: mmap(&(0x7f000092d000/0x400000)=nil, 0x400000, 0x7fffffff, 0x2000000208972, 0xffffffffffffffff, 0x0) madvise(&(0x7f0000b80000/0x2000)=nil, 0x2000, 0x0) ioctl$SNDRV_SEQ_IOCTL_SYSTEM_INFO(0xffffffffffffffff, 0xc0305302, &(0x7f0000000000)={0xdbc, 0x0, 0x80, 0x9d7b, 0x400, 0xfffffffffffff000}) madvise(&(0x7f000092d000/0x400000)=nil, 0x400000, 0x10200000008) ioctl$TIOCGWINSZ(0xffffffffffffffff, 0x5413, &(0x7f00000000c0)) r0 = socket(0x10, 0x2, 0x0) sendmsg$nl_route(r0, &(0x7f0000504000)={&(0x7f0000c27000)={0x10}, 0xc, &(0x7f0000434ff0)={&(0x7f00000003c0)=ANY=[@ANYRES32=0x0, @ANYBLOB="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"], 0x2}, 0x1}, 0x0) getsockopt$inet_sctp6_SCTP_HMAC_IDENT(r0, 0x84, 0x16, &(0x7f0000000180)=ANY=[], &(0x7f0000000080)) r1 = dup(0xffffffffffffff9c) clone(0x0, &(0x7f0000000000), &(0x7f0000000ffc), &(0x7f0000000ffc), &(0x7f0000000000)) mlock(&(0x7f0000a67000/0x2000)=nil, 0x2000) r2 = inotify_init() mkdir(&(0x7f0000042ff6)='./control\x00', 0x0) creat(&(0x7f0000fc7000)='./control/file0\x00', 0x0) r3 = inotify_init1(0x0) inotify_add_watch(r3, &(0x7f0000fc7000)='./control\x00', 0x86000006) inotify_add_watch(r2, &(0x7f0000fc8000)='./control\x00', 0x2000000) creat(&(0x7f0000000000)='./control/file0\x00', 0x0) lstat(&(0x7f0000000040)='./control/file0\x00', &(0x7f0000000080)) mremap(&(0x7f0000c73000/0x2000)=nil, 0x2000, 0x3000, 0x3, &(0x7f0000ffc000/0x3000)=nil) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000000140)={{&(0x7f0000b75000/0x2000)=nil, 0x2000}, 0x1}) 2018/04/13 21:33:24 executing program 3: r0 = socket$inet6(0xa, 0x5, 0x0) getsockopt$inet_sctp6_SCTP_HMAC_IDENT(r0, 0x84, 0x16, &(0x7f0000000100), &(0x7f0000000140)=0x4) 2018/04/13 21:33:24 executing program 7: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000646000)={&(0x7f000059cff4)={0x10}, 0xc, &(0x7f0000f9bff0)={&(0x7f0000efe000)=@updpolicy={0xc4, 0x19, 0x401, 0x0, 0x0, {{@in6=@mcast2={0xff, 0x2, [], 0x1}, @in=@dev={0xac, 0x14}, 0x0, 0x0, 0x0, 0x0, 0xa}}, [@sec_ctx={0xc, 0x8, {0x8, 0x8}}]}, 0xc4}, 0x1}, 0x0) 2018/04/13 21:33:24 executing program 1: r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_int(r0, 0x107, 0x14, &(0x7f0000000040)=0x3, 0x4) sendto$inet6(r0, &(0x7f0000000100), 0x0, 0x0, &(0x7f0000000000)={0xa, 0x0, 0xc, @local={0xfe, 0x80, [], 0xaa}}, 0x1c) 2018/04/13 21:33:24 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x2000000000000022, &(0x7f0000356000)=0x1, 0x4) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000480)='syz_tun\x00', 0x25) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$inet6_IPV6_PKTINFO(r0, 0x29, 0x32, &(0x7f0000000140)={@mcast1={0xff, 0x1, [], 0x1}}, 0x14) bind$inet6(r0, &(0x7f0000000080)={0xa}, 0x1c) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000040), &(0x7f00000000c0)=0xc) sendto$inet6(r0, &(0x7f0000000000)="15", 0x1, 0x200408d6, &(0x7f00000011c0)={0xa, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xbb}}, 0x1c) 2018/04/13 21:33:24 executing program 6: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x2000000000000022, &(0x7f0000356000)=0x1, 0x4) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000480)='syz_tun\x00', 0x25) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$inet6_IPV6_PKTINFO(r0, 0x29, 0x32, &(0x7f0000000140)={@mcast1={0xff, 0x1, [], 0x1}}, 0x14) bind$inet6(r0, &(0x7f0000000080)={0xa}, 0x1c) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000040), &(0x7f00000000c0)=0xc) sendto$inet6(r0, &(0x7f0000000000)="15", 0x1, 0x200408d6, &(0x7f00000011c0)={0xa, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xbb}}, 0x1c) 2018/04/13 21:33:24 executing program 4: mmap(&(0x7f0000cb1000/0x3000)=nil, 0x3000, 0x80008, 0x32, 0xffffffffffffffff, 0x10000003ffe) r0 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e23}, 0x1c) r1 = syz_open_dev$dspn(&(0x7f0000000040)='/dev/dsp#\x00', 0x6, 0x0) bind$can_raw(r1, &(0x7f0000000080)={0x1d}, 0x10) listen(r0, 0x5eb857) r2 = socket$inet_dccp(0x2, 0x6, 0x0) connect$inet(r2, &(0x7f0000772000)={0x2, 0x4e23}, 0x10) r3 = accept4(r0, &(0x7f0000975000)=@can, &(0x7f0000752ffc)=0x10, 0x0) r4 = dup2(r3, r0) syz_open_dev$audion(&(0x7f0000000440)='/dev/audio#\x00', 0x7, 0x20000) renameat2(r4, &(0x7f0000000400)='./file0\x00', r2, &(0x7f0000000100)='./file0\x00', 0x3) sendto$inet(r2, &(0x7f0000531fff), 0x0, 0x0, 0x0, 0x0) sendmsg$nl_netfilter(r3, &(0x7f0000b76fc8)={&(0x7f0000715000)={0x10}, 0xc, &(0x7f000066f000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="35000000ffffff7f00000000ffff00000080000012ef79d6f30fd2a4987a1e2f2fc269ec"], 0x24}, 0x1}, 0x0) sendmmsg(r0, &(0x7f000000b880)=[{{0x0, 0x0, &(0x7f0000002140)=[{&(0x7f0000002100)="8b557b6d36259e2ddb7c8962f9e22c53ed1e43c6", 0x14}], 0x1, &(0x7f0000002180)}}], 0x1, 0x0) perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$DRM_IOCTL_AGP_ALLOC(r4, 0xc0206434, &(0x7f0000000140)={0x438, 0x0, 0x0, 0x9}) ioctl$DRM_IOCTL_AGP_FREE(r4, 0x40206435, &(0x7f0000000180)={0x7fff, r5, 0x10001}) r6 = socket(0x10, 0x20000000802, 0x0) write(r6, &(0x7f0000000080)="1f000000520007f2000094fef5000f430700000000000000000100ffffb92b", 0x1f) recvmmsg(r6, &(0x7f0000002500)=[{{0x0, 0x0, &(0x7f0000002080), 0x0, &(0x7f0000002100)=""/121, 0x79}}], 0x1, 0x0, &(0x7f0000005400)={0x0, 0x1c9c380}) ioctl$sock_inet_SIOCGIFDSTADDR(r0, 0x8917, &(0x7f00000001c0)={'ip_vti0\x00', {0x2, 0x4e22, @remote={0xac, 0x14, 0x14, 0xbb}}}) sendmsg$alg(r4, &(0x7f0000000800)={0x0, 0x0, &(0x7f0000000500)=[{&(0x7f0000000200)="d2a181944e3b7f0ddf469dc6fd079040f22fea65e9ec3b2b7a4dff8526f32b9ffbacf7ad8a543a8ac6428cc2841371a28c73ad080418857e2fc9ac1fbe92337006ea2366d92c3e6e359b39d07552875b4a72ca19c24cd98b303a2b5b79c74abf14b3fc4e8c484f0733dbc782d006a7b13e3d417ba2da26424d4e251d16dee4098d10f2b858311155f24408aba6613df2dc16183c134310b08eef730c83b008c05243ba499048684cd3d47c777807661ab7ff7d2978f37c29", 0xb8}], 0x1, &(0x7f0000000540)=ANY=[@ANYBLOB="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"], 0x2a8, 0x4000}, 0x1) setsockopt$inet6_tcp_buf(0xffffffffffffffff, 0x6, 0x0, &(0x7f0000141000), 0x0) write(r2, &(0x7f0000f8aff1), 0xff8f) sendto$inet(r2, &(0x7f0000494f01), 0x0, 0x0, &(0x7f0000198ff0)={0x2, 0x4e20, @multicast1=0xe0000001}, 0x10) 2018/04/13 21:33:24 executing program 3: r0 = socket$inet6(0xa, 0x5, 0x0) getsockopt$inet_sctp6_SCTP_HMAC_IDENT(r0, 0x84, 0x16, &(0x7f0000000100), &(0x7f0000000140)=0x4) [ 284.804905] dccp_close: ABORT with 65423 bytes unread 2018/04/13 21:33:24 executing program 1: r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_int(r0, 0x107, 0x14, &(0x7f0000000040)=0x3, 0x4) sendto$inet6(r0, &(0x7f0000000100), 0x0, 0x0, &(0x7f0000000000)={0xa, 0x0, 0xc, @local={0xfe, 0x80, [], 0xaa}}, 0x1c) 2018/04/13 21:33:24 executing program 7: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000646000)={&(0x7f000059cff4)={0x10}, 0xc, &(0x7f0000f9bff0)={&(0x7f0000efe000)=@updpolicy={0xc4, 0x19, 0x401, 0x0, 0x0, {{@in6=@mcast2={0xff, 0x2, [], 0x1}, @in=@dev={0xac, 0x14}, 0x0, 0x0, 0x0, 0x0, 0xa}}, [@sec_ctx={0xc, 0x8, {0x8, 0x8}}]}, 0xc4}, 0x1}, 0x0) [ 284.950189] dccp_close: ABORT with 65423 bytes unread 2018/04/13 21:33:25 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x2000000000000022, &(0x7f0000356000)=0x1, 0x4) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000480)='syz_tun\x00', 0x25) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$inet6_IPV6_PKTINFO(r0, 0x29, 0x32, &(0x7f0000000140)={@mcast1={0xff, 0x1, [], 0x1}}, 0x14) bind$inet6(r0, &(0x7f0000000080)={0xa}, 0x1c) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000040), &(0x7f00000000c0)=0xc) sendto$inet6(r0, &(0x7f0000000000)="15", 0x1, 0x200408d6, &(0x7f00000011c0)={0xa, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xbb}}, 0x1c) 2018/04/13 21:33:25 executing program 3: r0 = socket$inet6(0xa, 0x5, 0x0) getsockopt$inet_sctp6_SCTP_HMAC_IDENT(r0, 0x84, 0x16, &(0x7f0000000100), &(0x7f0000000140)=0x4) 2018/04/13 21:33:25 executing program 6: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x2000000000000022, &(0x7f0000356000)=0x1, 0x4) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000480)='syz_tun\x00', 0x25) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$inet6_IPV6_PKTINFO(r0, 0x29, 0x32, &(0x7f0000000140)={@mcast1={0xff, 0x1, [], 0x1}}, 0x14) bind$inet6(r0, &(0x7f0000000080)={0xa}, 0x1c) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000040), &(0x7f00000000c0)=0xc) sendto$inet6(r0, &(0x7f0000000000)="15", 0x1, 0x200408d6, &(0x7f00000011c0)={0xa, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xbb}}, 0x1c) 2018/04/13 21:33:25 executing program 1: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000001500)='./cgroup.cpu\x00', 0x200002, 0x0) r1 = openat$cgroup_ro(r0, &(0x7f0000000040)='cpuacct.usage_percpu\x00', 0x0, 0x0) read$eventfd(r1, &(0x7f00000000c0), 0x8) 2018/04/13 21:33:25 executing program 7: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000646000)={&(0x7f000059cff4)={0x10}, 0xc, &(0x7f0000f9bff0)={&(0x7f0000efe000)=@updpolicy={0xc4, 0x19, 0x401, 0x0, 0x0, {{@in6=@mcast2={0xff, 0x2, [], 0x1}, @in=@dev={0xac, 0x14}, 0x0, 0x0, 0x0, 0x0, 0xa}}, [@sec_ctx={0xc, 0x8, {0x8, 0x8}}]}, 0xc4}, 0x1}, 0x0) 2018/04/13 21:33:25 executing program 4: r0 = syz_open_procfs(0x0, &(0x7f0000000180)='net/ptype\x00') readv(r0, &(0x7f00000014c0)=[{&(0x7f0000001280)=""/208, 0xd0}], 0x1) readv(r0, &(0x7f0000d3bff0)=[{&(0x7f00003ce000)=""/4096, 0x1000}], 0x1) 2018/04/13 21:33:25 executing program 5: r0 = socket$inet6(0xa, 0x80002, 0x100000000000088) poll(&(0x7f0000c58000)=[{r0, 0x2b}], 0x1, 0xade) bind$inet6(r0, &(0x7f0000d85fe4)={0xa, 0x4e23}, 0x1c) r1 = socket$inet6(0xa, 0x802, 0x88) setsockopt$inet6_udp_int(r1, 0x11, 0x100000000a, &(0x7f00005b1ffc)=0x1, 0x4) sendto$inet6(r1, &(0x7f0000000000)="96", 0x1, 0x0, &(0x7f0000001000)={0xa, 0x4e23, 0x0, @dev={0xfe, 0x80, [], 0x16}}, 0x1c) 2018/04/13 21:33:25 executing program 2: mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0x0, 0x31, 0xffffffffffffffff, 0x0) r0 = socket(0x11, 0x4000000000080003, 0x0) setsockopt(r0, 0x107, 0xd, &(0x7f0000001000), 0x1fd) 2018/04/13 21:33:25 executing program 4: r0 = syz_open_procfs(0x0, &(0x7f0000000180)='net/ptype\x00') readv(r0, &(0x7f00000014c0)=[{&(0x7f0000001280)=""/208, 0xd0}], 0x1) readv(r0, &(0x7f0000d3bff0)=[{&(0x7f00003ce000)=""/4096, 0x1000}], 0x1) 2018/04/13 21:33:25 executing program 7: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f000042ffa8)={0x26, 'hash\x00', 0x0, 0x0, 'sha384-generic\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) r2 = open(&(0x7f00004b8ff8)='./file0\x00', 0x28042, 0x0) fallocate(r2, 0x0, 0x0, 0x73e0) sendfile(r1, r2, &(0x7f00007ed000), 0x2b) 2018/04/13 21:33:25 executing program 3: syz_mount_image$msdos(&(0x7f0000000000)='msdos\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f0000000240), 0x0, &(0x7f0000000280)={[{@dos1xfloppy='dos1xfloppy', 0x2c}]}) 2018/04/13 21:33:25 executing program 2: mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0x0, 0x31, 0xffffffffffffffff, 0x0) r0 = socket(0x11, 0x4000000000080003, 0x0) setsockopt(r0, 0x107, 0xd, &(0x7f0000001000), 0x1fd) 2018/04/13 21:33:25 executing program 1: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000001500)='./cgroup.cpu\x00', 0x200002, 0x0) r1 = openat$cgroup_ro(r0, &(0x7f0000000040)='cpuacct.usage_percpu\x00', 0x0, 0x0) read$eventfd(r1, &(0x7f00000000c0), 0x8) 2018/04/13 21:33:25 executing program 6: r0 = socket$inet6(0xa, 0x806, 0x0) connect$inet6(r0, &(0x7f000000cfe4)={0xa}, 0x1c) openat$rtc(0xffffffffffffff9c, &(0x7f0000000380)='/dev/rtc\x00', 0x0, 0x0) syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x0, 0x0) pselect6(0x40, &(0x7f00000abfc0)={0x3ffffd}, &(0x7f0000768000), &(0x7f00007fbfc0), &(0x7f0000000040)={0x0, 0x989680}, &(0x7f0000f14000)={&(0x7f0000553ff8), 0x8}) 2018/04/13 21:33:25 executing program 0: perf_event_open(&(0x7f000001d000)={0x2, 0x78, 0xe2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000580)={'bridge0\x00', 0x0}) r2 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000200)='sched\x00') syz_open_dev$sndmidi(&(0x7f0000000500)='/dev/snd/midiC#D#\x00', 0x4b0f, 0x40000) getsockopt$IPT_SO_GET_ENTRIES(r2, 0x0, 0x41, &(0x7f0000000240)=ANY=[@ANYBLOB="6e61740000000000000000000000000000000000000000000000000000000000b4000000a7744bee0fa426c86b896158b537d8f5bcc4684660454418cdf96a94d5b0c00b3d4a6f13fa71a592e8f2ddbb47764a28a64d0722b2ec07b655d53451e429b11091ccb68dc5a36b3904cb8bd5487a74186f2a6b380aa443cb53d6eba300ab0bc4a08fe10832272ffe89a4ed079fa03b59f70a76d1b82e04c8cf9dc7628e34732fb4eb6cf5ca2787da9057cd5c760d823528744326b1eeee7428eecc500a5c93abae9cf7646e8199748fd7243931f03d67a951d5a6"], &(0x7f0000000340)=0x1) sendmsg$nl_route(r0, &(0x7f0000000180)={&(0x7f0000000080)={0x10}, 0xc, &(0x7f0000000140)={&(0x7f0000000100)=@dellink={0x20, 0x11, 0x21, 0x0, 0x0, {0x0, 0x0, 0x0, r1}}, 0x1a1}, 0x1}, 0x24044014) r3 = syz_open_dev$admmidi(&(0x7f0000000040)='/dev/admmidi#\x00', 0x9, 0x80) getsockopt$inet_sctp6_SCTP_CONTEXT(r2, 0x84, 0x11, &(0x7f0000000400)={0x0, 0x4}, &(0x7f0000000440)=0x8) getsockopt$inet_sctp_SCTP_ASSOCINFO(r2, 0x84, 0x1, &(0x7f0000000480)={r4, 0xf78e, 0x7, 0x5, 0xffff, 0x4}, &(0x7f00000004c0)=0x8e) accept4$inet6(r3, &(0x7f0000000380), &(0x7f00000003c0)=0x1c, 0x800) getsockopt$inet_mreqsrc(r3, 0x0, 0x2f, &(0x7f00000000c0)={@multicast1, @multicast2, @multicast2}, &(0x7f00000001c0)=0xc) 2018/04/13 21:33:25 executing program 4: r0 = syz_open_procfs(0x0, &(0x7f0000000180)='net/ptype\x00') readv(r0, &(0x7f00000014c0)=[{&(0x7f0000001280)=""/208, 0xd0}], 0x1) readv(r0, &(0x7f0000d3bff0)=[{&(0x7f00003ce000)=""/4096, 0x1000}], 0x1) 2018/04/13 21:33:25 executing program 1: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000001500)='./cgroup.cpu\x00', 0x200002, 0x0) r1 = openat$cgroup_ro(r0, &(0x7f0000000040)='cpuacct.usage_percpu\x00', 0x0, 0x0) read$eventfd(r1, &(0x7f00000000c0), 0x8) 2018/04/13 21:33:25 executing program 7: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f000042ffa8)={0x26, 'hash\x00', 0x0, 0x0, 'sha384-generic\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) r2 = open(&(0x7f00004b8ff8)='./file0\x00', 0x28042, 0x0) fallocate(r2, 0x0, 0x0, 0x73e0) sendfile(r1, r2, &(0x7f00007ed000), 0x2b) 2018/04/13 21:33:25 executing program 2: mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0x0, 0x31, 0xffffffffffffffff, 0x0) r0 = socket(0x11, 0x4000000000080003, 0x0) setsockopt(r0, 0x107, 0xd, &(0x7f0000001000), 0x1fd) [ 285.706758] FAT-fs (loop3): bogus number of reserved sectors [ 285.712947] FAT-fs (loop3): This doesn't look like a DOS 1.x volume; no bootstrapping code [ 285.721402] FAT-fs (loop3): Can't find a valid FAT filesystem [ 285.737349] device bridge_slave_1 left promiscuous mode [ 285.743117] bridge0: port 2(bridge_slave_1) entered disabled state 2018/04/13 21:33:25 executing program 6: r0 = socket$inet6(0xa, 0x806, 0x0) connect$inet6(r0, &(0x7f000000cfe4)={0xa}, 0x1c) openat$rtc(0xffffffffffffff9c, &(0x7f0000000380)='/dev/rtc\x00', 0x0, 0x0) syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x0, 0x0) pselect6(0x40, &(0x7f00000abfc0)={0x3ffffd}, &(0x7f0000768000), &(0x7f00007fbfc0), &(0x7f0000000040)={0x0, 0x989680}, &(0x7f0000f14000)={&(0x7f0000553ff8), 0x8}) [ 285.778487] device bridge_slave_0 left promiscuous mode [ 285.784148] bridge0: port 1(bridge_slave_0) entered disabled state [ 285.806931] FAT-fs (loop3): bogus number of reserved sectors [ 285.812844] FAT-fs (loop3): This doesn't look like a DOS 1.x volume; no bootstrapping code [ 285.821286] FAT-fs (loop3): Can't find a valid FAT filesystem 2018/04/13 21:33:25 executing program 4: r0 = syz_open_procfs(0x0, &(0x7f0000000180)='net/ptype\x00') readv(r0, &(0x7f00000014c0)=[{&(0x7f0000001280)=""/208, 0xd0}], 0x1) readv(r0, &(0x7f0000d3bff0)=[{&(0x7f00003ce000)=""/4096, 0x1000}], 0x1) 2018/04/13 21:33:25 executing program 2: mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0x0, 0x31, 0xffffffffffffffff, 0x0) r0 = socket(0x11, 0x4000000000080003, 0x0) setsockopt(r0, 0x107, 0xd, &(0x7f0000001000), 0x1fd) 2018/04/13 21:33:25 executing program 5: r0 = socket$inet6(0xa, 0x80002, 0x100000000000088) poll(&(0x7f0000c58000)=[{r0, 0x2b}], 0x1, 0xade) bind$inet6(r0, &(0x7f0000d85fe4)={0xa, 0x4e23}, 0x1c) r1 = socket$inet6(0xa, 0x802, 0x88) setsockopt$inet6_udp_int(r1, 0x11, 0x100000000a, &(0x7f00005b1ffc)=0x1, 0x4) sendto$inet6(r1, &(0x7f0000000000)="96", 0x1, 0x0, &(0x7f0000001000)={0xa, 0x4e23, 0x0, @dev={0xfe, 0x80, [], 0x16}}, 0x1c) 2018/04/13 21:33:25 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSARP(r0, 0x8955, &(0x7f0000000000)={{0x2, 0x0, @broadcast=0xffffffff}, {0x1, @local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}}, 0xe, {0x2, 0x0, @broadcast=0xffffffff}, "00080700000400a0b22c582bf3aed17d"}) 2018/04/13 21:33:25 executing program 6: r0 = socket$inet6(0xa, 0x806, 0x0) connect$inet6(r0, &(0x7f000000cfe4)={0xa}, 0x1c) openat$rtc(0xffffffffffffff9c, &(0x7f0000000380)='/dev/rtc\x00', 0x0, 0x0) syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x0, 0x0) pselect6(0x40, &(0x7f00000abfc0)={0x3ffffd}, &(0x7f0000768000), &(0x7f00007fbfc0), &(0x7f0000000040)={0x0, 0x989680}, &(0x7f0000f14000)={&(0x7f0000553ff8), 0x8}) 2018/04/13 21:33:25 executing program 0: perf_event_open(&(0x7f000001d000)={0x2, 0x78, 0xe2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000580)={'bridge0\x00', 0x0}) r2 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000200)='sched\x00') syz_open_dev$sndmidi(&(0x7f0000000500)='/dev/snd/midiC#D#\x00', 0x4b0f, 0x40000) getsockopt$IPT_SO_GET_ENTRIES(r2, 0x0, 0x41, &(0x7f0000000240)=ANY=[@ANYBLOB="6e61740000000000000000000000000000000000000000000000000000000000b4000000a7744bee0fa426c86b896158b537d8f5bcc4684660454418cdf96a94d5b0c00b3d4a6f13fa71a592e8f2ddbb47764a28a64d0722b2ec07b655d53451e429b11091ccb68dc5a36b3904cb8bd5487a74186f2a6b380aa443cb53d6eba300ab0bc4a08fe10832272ffe89a4ed079fa03b59f70a76d1b82e04c8cf9dc7628e34732fb4eb6cf5ca2787da9057cd5c760d823528744326b1eeee7428eecc500a5c93abae9cf7646e8199748fd7243931f03d67a951d5a6"], &(0x7f0000000340)=0x1) sendmsg$nl_route(r0, &(0x7f0000000180)={&(0x7f0000000080)={0x10}, 0xc, &(0x7f0000000140)={&(0x7f0000000100)=@dellink={0x20, 0x11, 0x21, 0x0, 0x0, {0x0, 0x0, 0x0, r1}}, 0x1a1}, 0x1}, 0x24044014) r3 = syz_open_dev$admmidi(&(0x7f0000000040)='/dev/admmidi#\x00', 0x9, 0x80) getsockopt$inet_sctp6_SCTP_CONTEXT(r2, 0x84, 0x11, &(0x7f0000000400)={0x0, 0x4}, &(0x7f0000000440)=0x8) getsockopt$inet_sctp_SCTP_ASSOCINFO(r2, 0x84, 0x1, &(0x7f0000000480)={r4, 0xf78e, 0x7, 0x5, 0xffff, 0x4}, &(0x7f00000004c0)=0x8e) accept4$inet6(r3, &(0x7f0000000380), &(0x7f00000003c0)=0x1c, 0x800) getsockopt$inet_mreqsrc(r3, 0x0, 0x2f, &(0x7f00000000c0)={@multicast1, @multicast2, @multicast2}, &(0x7f00000001c0)=0xc) 2018/04/13 21:33:25 executing program 2: syz_mount_image$jfs(&(0x7f00000002c0)='jfs\x00', &(0x7f0000000300)='./file0\x00', 0x0, 0x0, &(0x7f0000000600), 0x0, &(0x7f0000000680)={[{@umask={'umask', 0x3d, [0x31, 0x33, 0x30, 0x31]}, 0x2c}]}) 2018/04/13 21:33:25 executing program 7: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f000042ffa8)={0x26, 'hash\x00', 0x0, 0x0, 'sha384-generic\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) r2 = open(&(0x7f00004b8ff8)='./file0\x00', 0x28042, 0x0) fallocate(r2, 0x0, 0x0, 0x73e0) sendfile(r1, r2, &(0x7f00007ed000), 0x2b) 2018/04/13 21:33:25 executing program 3: syz_mount_image$msdos(&(0x7f0000000000)='msdos\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f0000000240), 0x0, &(0x7f0000000280)={[{@dos1xfloppy='dos1xfloppy', 0x2c}]}) 2018/04/13 21:33:25 executing program 1: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000001500)='./cgroup.cpu\x00', 0x200002, 0x0) r1 = openat$cgroup_ro(r0, &(0x7f0000000040)='cpuacct.usage_percpu\x00', 0x0, 0x0) read$eventfd(r1, &(0x7f00000000c0), 0x8) 2018/04/13 21:33:26 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSARP(r0, 0x8955, &(0x7f0000000000)={{0x2, 0x0, @broadcast=0xffffffff}, {0x1, @local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}}, 0xe, {0x2, 0x0, @broadcast=0xffffffff}, "00080700000400a0b22c582bf3aed17d"}) 2018/04/13 21:33:26 executing program 1: r0 = socket(0x100000001e, 0x1, 0x0) setsockopt(r0, 0x10f, 0x0, &(0x7f0000000100), 0x0) [ 286.460142] FAT-fs (loop3): bogus number of reserved sectors [ 286.466047] FAT-fs (loop3): This doesn't look like a DOS 1.x volume; no bootstrapping code [ 286.474501] FAT-fs (loop3): Can't find a valid FAT filesystem 2018/04/13 21:33:26 executing program 5: r0 = socket$inet6(0xa, 0x80002, 0x100000000000088) poll(&(0x7f0000c58000)=[{r0, 0x2b}], 0x1, 0xade) bind$inet6(r0, &(0x7f0000d85fe4)={0xa, 0x4e23}, 0x1c) r1 = socket$inet6(0xa, 0x802, 0x88) setsockopt$inet6_udp_int(r1, 0x11, 0x100000000a, &(0x7f00005b1ffc)=0x1, 0x4) sendto$inet6(r1, &(0x7f0000000000)="96", 0x1, 0x0, &(0x7f0000001000)={0xa, 0x4e23, 0x0, @dev={0xfe, 0x80, [], 0x16}}, 0x1c) 2018/04/13 21:33:26 executing program 1: r0 = socket(0x100000001e, 0x1, 0x0) setsockopt(r0, 0x10f, 0x0, &(0x7f0000000100), 0x0) 2018/04/13 21:33:26 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSARP(r0, 0x8955, &(0x7f0000000000)={{0x2, 0x0, @broadcast=0xffffffff}, {0x1, @local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}}, 0xe, {0x2, 0x0, @broadcast=0xffffffff}, "00080700000400a0b22c582bf3aed17d"}) 2018/04/13 21:33:26 executing program 2: r0 = socket$pppoe(0x18, 0x1, 0x0) connect$pppoe(r0, &(0x7f0000000080)={0x18, 0x0, {0x4, @dev={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xa}, 'lo\x00'}}, 0x1e) ioctl$PPPIOCGCHAN(r0, 0x80047437, &(0x7f0000000200)) sendmsg(r0, &(0x7f0000001600)={&(0x7f0000000400)=@llc={0x1a}, 0x80, &(0x7f0000001580)=[{&(0x7f0000001540)="02aa", 0x2}], 0x1, &(0x7f0000001900)}, 0x0) 2018/04/13 21:33:26 executing program 0: perf_event_open(&(0x7f000001d000)={0x2, 0x78, 0xe2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000580)={'bridge0\x00', 0x0}) r2 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000200)='sched\x00') syz_open_dev$sndmidi(&(0x7f0000000500)='/dev/snd/midiC#D#\x00', 0x4b0f, 0x40000) getsockopt$IPT_SO_GET_ENTRIES(r2, 0x0, 0x41, &(0x7f0000000240)=ANY=[@ANYBLOB="6e61740000000000000000000000000000000000000000000000000000000000b4000000a7744bee0fa426c86b896158b537d8f5bcc4684660454418cdf96a94d5b0c00b3d4a6f13fa71a592e8f2ddbb47764a28a64d0722b2ec07b655d53451e429b11091ccb68dc5a36b3904cb8bd5487a74186f2a6b380aa443cb53d6eba300ab0bc4a08fe10832272ffe89a4ed079fa03b59f70a76d1b82e04c8cf9dc7628e34732fb4eb6cf5ca2787da9057cd5c760d823528744326b1eeee7428eecc500a5c93abae9cf7646e8199748fd7243931f03d67a951d5a6"], &(0x7f0000000340)=0x1) sendmsg$nl_route(r0, &(0x7f0000000180)={&(0x7f0000000080)={0x10}, 0xc, &(0x7f0000000140)={&(0x7f0000000100)=@dellink={0x20, 0x11, 0x21, 0x0, 0x0, {0x0, 0x0, 0x0, r1}}, 0x1a1}, 0x1}, 0x24044014) r3 = syz_open_dev$admmidi(&(0x7f0000000040)='/dev/admmidi#\x00', 0x9, 0x80) getsockopt$inet_sctp6_SCTP_CONTEXT(r2, 0x84, 0x11, &(0x7f0000000400)={0x0, 0x4}, &(0x7f0000000440)=0x8) getsockopt$inet_sctp_SCTP_ASSOCINFO(r2, 0x84, 0x1, &(0x7f0000000480)={r4, 0xf78e, 0x7, 0x5, 0xffff, 0x4}, &(0x7f00000004c0)=0x8e) accept4$inet6(r3, &(0x7f0000000380), &(0x7f00000003c0)=0x1c, 0x800) getsockopt$inet_mreqsrc(r3, 0x0, 0x2f, &(0x7f00000000c0)={@multicast1, @multicast2, @multicast2}, &(0x7f00000001c0)=0xc) 2018/04/13 21:33:26 executing program 6: r0 = socket$inet6(0xa, 0x806, 0x0) connect$inet6(r0, &(0x7f000000cfe4)={0xa}, 0x1c) openat$rtc(0xffffffffffffff9c, &(0x7f0000000380)='/dev/rtc\x00', 0x0, 0x0) syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x0, 0x0) pselect6(0x40, &(0x7f00000abfc0)={0x3ffffd}, &(0x7f0000768000), &(0x7f00007fbfc0), &(0x7f0000000040)={0x0, 0x989680}, &(0x7f0000f14000)={&(0x7f0000553ff8), 0x8}) 2018/04/13 21:33:26 executing program 3: syz_mount_image$msdos(&(0x7f0000000000)='msdos\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f0000000240), 0x0, &(0x7f0000000280)={[{@dos1xfloppy='dos1xfloppy', 0x2c}]}) 2018/04/13 21:33:26 executing program 7: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f000042ffa8)={0x26, 'hash\x00', 0x0, 0x0, 'sha384-generic\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) r2 = open(&(0x7f00004b8ff8)='./file0\x00', 0x28042, 0x0) fallocate(r2, 0x0, 0x0, 0x73e0) sendfile(r1, r2, &(0x7f00007ed000), 0x2b) 2018/04/13 21:33:26 executing program 6: syz_mount_image$ntfs(&(0x7f0000000040)='ntfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f00000001c0), 0x0, &(0x7f0000000380)={[{@umask={'umask', 0x3d}, 0x2c}]}) 2018/04/13 21:33:26 executing program 7: mlock2(&(0x7f0000a93000/0x4000)=nil, 0x4000, 0x1) mremap(&(0x7f0000a93000/0x3000)=nil, 0x3000, 0xe000, 0x3, &(0x7f0000b18000/0xe000)=nil) ioctl$DRM_IOCTL_RM_MAP(0xffffffffffffffff, 0x4028641b, &(0x7f0000b1d000)={&(0x7f0000a93000/0x3000)=nil, 0x0, 0x0, 0x0, &(0x7f0000b1b000/0x3000)=nil}) mprotect(&(0x7f0000b1d000/0x2000)=nil, 0x2000, 0x5) epoll_ctl$EPOLL_CTL_MOD(0xffffffffffffffff, 0x3, 0xffffffffffffffff, &(0x7f0000b1eff4)) munlockall() 2018/04/13 21:33:26 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSARP(r0, 0x8955, &(0x7f0000000000)={{0x2, 0x0, @broadcast=0xffffffff}, {0x1, @local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}}, 0xe, {0x2, 0x0, @broadcast=0xffffffff}, "00080700000400a0b22c582bf3aed17d"}) 2018/04/13 21:33:27 executing program 1: r0 = socket(0x100000001e, 0x1, 0x0) setsockopt(r0, 0x10f, 0x0, &(0x7f0000000100), 0x0) [ 287.379936] FAT-fs (loop3): bogus number of reserved sectors [ 287.385859] FAT-fs (loop3): This doesn't look like a DOS 1.x volume; no bootstrapping code [ 287.394313] FAT-fs (loop3): Can't find a valid FAT filesystem 2018/04/13 21:33:27 executing program 2: r0 = socket$pppoe(0x18, 0x1, 0x0) connect$pppoe(r0, &(0x7f0000000080)={0x18, 0x0, {0x4, @dev={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xa}, 'lo\x00'}}, 0x1e) ioctl$PPPIOCGCHAN(r0, 0x80047437, &(0x7f0000000200)) sendmsg(r0, &(0x7f0000001600)={&(0x7f0000000400)=@llc={0x1a}, 0x80, &(0x7f0000001580)=[{&(0x7f0000001540)="02aa", 0x2}], 0x1, &(0x7f0000001900)}, 0x0) 2018/04/13 21:33:27 executing program 0: perf_event_open(&(0x7f000001d000)={0x2, 0x78, 0xe2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000580)={'bridge0\x00', 0x0}) r2 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000200)='sched\x00') syz_open_dev$sndmidi(&(0x7f0000000500)='/dev/snd/midiC#D#\x00', 0x4b0f, 0x40000) getsockopt$IPT_SO_GET_ENTRIES(r2, 0x0, 0x41, &(0x7f0000000240)=ANY=[@ANYBLOB="6e61740000000000000000000000000000000000000000000000000000000000b4000000a7744bee0fa426c86b896158b537d8f5bcc4684660454418cdf96a94d5b0c00b3d4a6f13fa71a592e8f2ddbb47764a28a64d0722b2ec07b655d53451e429b11091ccb68dc5a36b3904cb8bd5487a74186f2a6b380aa443cb53d6eba300ab0bc4a08fe10832272ffe89a4ed079fa03b59f70a76d1b82e04c8cf9dc7628e34732fb4eb6cf5ca2787da9057cd5c760d823528744326b1eeee7428eecc500a5c93abae9cf7646e8199748fd7243931f03d67a951d5a6"], &(0x7f0000000340)=0x1) sendmsg$nl_route(r0, &(0x7f0000000180)={&(0x7f0000000080)={0x10}, 0xc, &(0x7f0000000140)={&(0x7f0000000100)=@dellink={0x20, 0x11, 0x21, 0x0, 0x0, {0x0, 0x0, 0x0, r1}}, 0x1a1}, 0x1}, 0x24044014) r3 = syz_open_dev$admmidi(&(0x7f0000000040)='/dev/admmidi#\x00', 0x9, 0x80) getsockopt$inet_sctp6_SCTP_CONTEXT(r2, 0x84, 0x11, &(0x7f0000000400)={0x0, 0x4}, &(0x7f0000000440)=0x8) getsockopt$inet_sctp_SCTP_ASSOCINFO(r2, 0x84, 0x1, &(0x7f0000000480)={r4, 0xf78e, 0x7, 0x5, 0xffff, 0x4}, &(0x7f00000004c0)=0x8e) accept4$inet6(r3, &(0x7f0000000380), &(0x7f00000003c0)=0x1c, 0x800) getsockopt$inet_mreqsrc(r3, 0x0, 0x2f, &(0x7f00000000c0)={@multicast1, @multicast2, @multicast2}, &(0x7f00000001c0)=0xc) 2018/04/13 21:33:27 executing program 3: syz_mount_image$msdos(&(0x7f0000000000)='msdos\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f0000000240), 0x0, &(0x7f0000000280)={[{@dos1xfloppy='dos1xfloppy', 0x2c}]}) 2018/04/13 21:33:27 executing program 7: mlock2(&(0x7f0000a93000/0x4000)=nil, 0x4000, 0x1) mremap(&(0x7f0000a93000/0x3000)=nil, 0x3000, 0xe000, 0x3, &(0x7f0000b18000/0xe000)=nil) ioctl$DRM_IOCTL_RM_MAP(0xffffffffffffffff, 0x4028641b, &(0x7f0000b1d000)={&(0x7f0000a93000/0x3000)=nil, 0x0, 0x0, 0x0, &(0x7f0000b1b000/0x3000)=nil}) mprotect(&(0x7f0000b1d000/0x2000)=nil, 0x2000, 0x5) epoll_ctl$EPOLL_CTL_MOD(0xffffffffffffffff, 0x3, 0xffffffffffffffff, &(0x7f0000b1eff4)) munlockall() [ 287.577879] FAT-fs (loop3): bogus number of reserved sectors [ 287.583788] FAT-fs (loop3): This doesn't look like a DOS 1.x volume; no bootstrapping code [ 287.592263] FAT-fs (loop3): Can't find a valid FAT filesystem 2018/04/13 21:33:27 executing program 1: r0 = socket(0x100000001e, 0x1, 0x0) setsockopt(r0, 0x10f, 0x0, &(0x7f0000000100), 0x0) 2018/04/13 21:33:27 executing program 6: r0 = signalfd(0xffffffffffffffff, &(0x7f0000e7d000), 0x8) read(r0, &(0x7f000062f000)=""/179, 0xb3) unshare(0x40600) signalfd(r0, &(0x7f0000000700), 0x8) 2018/04/13 21:33:27 executing program 2: r0 = socket$pppoe(0x18, 0x1, 0x0) connect$pppoe(r0, &(0x7f0000000080)={0x18, 0x0, {0x4, @dev={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xa}, 'lo\x00'}}, 0x1e) ioctl$PPPIOCGCHAN(r0, 0x80047437, &(0x7f0000000200)) sendmsg(r0, &(0x7f0000001600)={&(0x7f0000000400)=@llc={0x1a}, 0x80, &(0x7f0000001580)=[{&(0x7f0000001540)="02aa", 0x2}], 0x1, &(0x7f0000001900)}, 0x0) 2018/04/13 21:33:27 executing program 7: mlock2(&(0x7f0000a93000/0x4000)=nil, 0x4000, 0x1) mremap(&(0x7f0000a93000/0x3000)=nil, 0x3000, 0xe000, 0x3, &(0x7f0000b18000/0xe000)=nil) ioctl$DRM_IOCTL_RM_MAP(0xffffffffffffffff, 0x4028641b, &(0x7f0000b1d000)={&(0x7f0000a93000/0x3000)=nil, 0x0, 0x0, 0x0, &(0x7f0000b1b000/0x3000)=nil}) mprotect(&(0x7f0000b1d000/0x2000)=nil, 0x2000, 0x5) epoll_ctl$EPOLL_CTL_MOD(0xffffffffffffffff, 0x3, 0xffffffffffffffff, &(0x7f0000b1eff4)) munlockall() 2018/04/13 21:33:27 executing program 3: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000300)='/dev/ptmx\x00', 0x0, 0x0) readv(r0, &(0x7f00003fd000)=[{&(0x7f0000853000)=""/255, 0xffffff1f}], 0x1) r1 = syz_open_dev$evdev(&(0x7f0000d09000)='/dev/input/event#\x00', 0x0, 0x0) r2 = epoll_create1(0x0) epoll_pwait(r2, &(0x7f0000000000)=[{}], 0x1, 0xa7, &(0x7f0000000040), 0x8) epoll_ctl$EPOLL_CTL_ADD(r2, 0x1, r1, &(0x7f00000000c0)={0x10000000}) r3 = dup(r1) ioctl$TIOCSBRK(r3, 0x40044591) 2018/04/13 21:33:27 executing program 0: r0 = syz_open_dev$sndpcmc(&(0x7f0000004fee)='/dev/snd/pcmC#D#c\x00', 0x0, 0x0) ioctl(r0, 0x40044102, &(0x7f0000001f64)) 2018/04/13 21:33:27 executing program 5: r0 = syz_open_dev$sndctrl(&(0x7f0000006000)='/dev/snd/controlC#\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_PCM_PREFER_SUBDEVICE(r0, 0x40045532, &(0x7f000000affc)) openat$audio(0xffffffffffffff9c, &(0x7f0000009000)='/dev/audio\x00', 0x0, 0x0) r1 = syz_open_dev$sndpcmc(&(0x7f00006a6fee)='/dev/snd/pcmC#D#c\x00', 0x0, 0x40400) io_setup(0x4, &(0x7f0000000000)=0x0) io_submit(r2, 0x1, &(0x7f0000001440)=[&(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0, r1, &(0x7f0000000040)}]) 2018/04/13 21:33:27 executing program 4: r0 = socket$inet(0x2, 0x6, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000380)=@broute={'broute\x00', 0x20, 0x1, 0x1d0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000880], 0x0, &(0x7f00000000c0), &(0x7f0000000880)=[{0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xfffffffffffffffe, 0x1, [{{{0x9, 0x0, 0x0, 'gretap0\x00', 'eql\x00', 'bcsf0\x00', 'nr0\x00', @local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, [], @empty, [], 0x70, 0xf0, 0x140}, [@common=@CLASSIFY={'CLASSIFY\x00', 0x8}, @common=@LED={'LED\x00', 0x28, {{'syz0\x00'}}}]}, @common=@LED={'LED\x00', 0x28, {{'syz1\x00'}}}}]}]}, 0x248) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000280)=@broute={'broute\x00', 0x20, 0x1, 0x200, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000680], 0x0, &(0x7f0000000000), &(0x7f0000000680)=[{0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xfffffffffffffffe, 0x1, [{{{0x3, 0x0, 0x0, 'nr0\x00', 'irlan0\x00', "73797a80616c6cf58400", 'eql\x00', @link_local={0x1, 0x80, 0xc2}, [], @local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, [], 0x70, 0x108, 0x140}, [@common=@LED={'LED\x00', 0x28, {{'syz1\x00'}}}, @common=@RATEEST={'RATEEST\x00', 0x20, {{'syz0\x00'}}}]}, @common=@dnat={'dnat\x00', 0x10, {{@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, 0xffffffffffffffff}}}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff}]}, 0x278) 2018/04/13 21:33:27 executing program 1: perf_event_open(&(0x7f0000348f88)={0x2, 0x70, 0x3e6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pipe(&(0x7f0000000100)={0x0, 0x0}) fcntl$setpipe(r1, 0x407, 0x0) vmsplice(r1, &(0x7f0000eacfd0)=[{&(0x7f0000493f7e)="ac", 0x1}], 0x1, 0x0) pipe2(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) vmsplice(r3, &(0x7f0000f14000)=[{&(0x7f0000853fde)="8d", 0x1}], 0x1, 0x0) tee(r2, r1, 0x3c, 0x0) vmsplice(r0, &(0x7f0000002400)=[{&(0x7f0000002380)="7013", 0x2}], 0x1, 0x0) 2018/04/13 21:33:27 executing program 7: mlock2(&(0x7f0000a93000/0x4000)=nil, 0x4000, 0x1) mremap(&(0x7f0000a93000/0x3000)=nil, 0x3000, 0xe000, 0x3, &(0x7f0000b18000/0xe000)=nil) ioctl$DRM_IOCTL_RM_MAP(0xffffffffffffffff, 0x4028641b, &(0x7f0000b1d000)={&(0x7f0000a93000/0x3000)=nil, 0x0, 0x0, 0x0, &(0x7f0000b1b000/0x3000)=nil}) mprotect(&(0x7f0000b1d000/0x2000)=nil, 0x2000, 0x5) epoll_ctl$EPOLL_CTL_MOD(0xffffffffffffffff, 0x3, 0xffffffffffffffff, &(0x7f0000b1eff4)) munlockall() 2018/04/13 21:33:27 executing program 2: r0 = socket$pppoe(0x18, 0x1, 0x0) connect$pppoe(r0, &(0x7f0000000080)={0x18, 0x0, {0x4, @dev={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xa}, 'lo\x00'}}, 0x1e) ioctl$PPPIOCGCHAN(r0, 0x80047437, &(0x7f0000000200)) sendmsg(r0, &(0x7f0000001600)={&(0x7f0000000400)=@llc={0x1a}, 0x80, &(0x7f0000001580)=[{&(0x7f0000001540)="02aa", 0x2}], 0x1, &(0x7f0000001900)}, 0x0) 2018/04/13 21:33:27 executing program 4: r0 = socket$inet(0x2, 0x6, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000380)=@broute={'broute\x00', 0x20, 0x1, 0x1d0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000880], 0x0, &(0x7f00000000c0), &(0x7f0000000880)=[{0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xfffffffffffffffe, 0x1, [{{{0x9, 0x0, 0x0, 'gretap0\x00', 'eql\x00', 'bcsf0\x00', 'nr0\x00', @local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, [], @empty, [], 0x70, 0xf0, 0x140}, [@common=@CLASSIFY={'CLASSIFY\x00', 0x8}, @common=@LED={'LED\x00', 0x28, {{'syz0\x00'}}}]}, @common=@LED={'LED\x00', 0x28, {{'syz1\x00'}}}}]}]}, 0x248) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000280)=@broute={'broute\x00', 0x20, 0x1, 0x200, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000680], 0x0, &(0x7f0000000000), &(0x7f0000000680)=[{0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xfffffffffffffffe, 0x1, [{{{0x3, 0x0, 0x0, 'nr0\x00', 'irlan0\x00', "73797a80616c6cf58400", 'eql\x00', @link_local={0x1, 0x80, 0xc2}, [], @local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, [], 0x70, 0x108, 0x140}, [@common=@LED={'LED\x00', 0x28, {{'syz1\x00'}}}, @common=@RATEEST={'RATEEST\x00', 0x20, {{'syz0\x00'}}}]}, @common=@dnat={'dnat\x00', 0x10, {{@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, 0xffffffffffffffff}}}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff}]}, 0x278) 2018/04/13 21:33:27 executing program 0: r0 = syz_open_dev$sndpcmc(&(0x7f0000004fee)='/dev/snd/pcmC#D#c\x00', 0x0, 0x0) ioctl(r0, 0x40044102, &(0x7f0000001f64)) 2018/04/13 21:33:27 executing program 7: r0 = socket$inet(0x2, 0x6, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000380)=@broute={'broute\x00', 0x20, 0x1, 0x1d0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000880], 0x0, &(0x7f00000000c0), &(0x7f0000000880)=[{0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xfffffffffffffffe, 0x1, [{{{0x9, 0x0, 0x0, 'gretap0\x00', 'eql\x00', 'bcsf0\x00', 'nr0\x00', @local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, [], @empty, [], 0x70, 0xf0, 0x140}, [@common=@CLASSIFY={'CLASSIFY\x00', 0x8}, @common=@LED={'LED\x00', 0x28, {{'syz0\x00'}}}]}, @common=@LED={'LED\x00', 0x28, {{'syz1\x00'}}}}]}]}, 0x248) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000280)=@broute={'broute\x00', 0x20, 0x1, 0x200, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000680], 0x0, &(0x7f0000000000), &(0x7f0000000680)=[{0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xfffffffffffffffe, 0x1, [{{{0x3, 0x0, 0x0, 'nr0\x00', 'irlan0\x00', "73797a80616c6cf58400", 'eql\x00', @link_local={0x1, 0x80, 0xc2}, [], @local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, [], 0x70, 0x108, 0x140}, [@common=@LED={'LED\x00', 0x28, {{'syz1\x00'}}}, @common=@RATEEST={'RATEEST\x00', 0x20, {{'syz0\x00'}}}]}, @common=@dnat={'dnat\x00', 0x10, {{@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, 0xffffffffffffffff}}}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff}]}, 0x278) 2018/04/13 21:33:27 executing program 5: r0 = syz_open_dev$sndctrl(&(0x7f0000006000)='/dev/snd/controlC#\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_PCM_PREFER_SUBDEVICE(r0, 0x40045532, &(0x7f000000affc)) openat$audio(0xffffffffffffff9c, &(0x7f0000009000)='/dev/audio\x00', 0x0, 0x0) r1 = syz_open_dev$sndpcmc(&(0x7f00006a6fee)='/dev/snd/pcmC#D#c\x00', 0x0, 0x40400) io_setup(0x4, &(0x7f0000000000)=0x0) io_submit(r2, 0x1, &(0x7f0000001440)=[&(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0, r1, &(0x7f0000000040)}]) 2018/04/13 21:33:28 executing program 5: r0 = syz_open_dev$sndctrl(&(0x7f0000006000)='/dev/snd/controlC#\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_PCM_PREFER_SUBDEVICE(r0, 0x40045532, &(0x7f000000affc)) openat$audio(0xffffffffffffff9c, &(0x7f0000009000)='/dev/audio\x00', 0x0, 0x0) r1 = syz_open_dev$sndpcmc(&(0x7f00006a6fee)='/dev/snd/pcmC#D#c\x00', 0x0, 0x40400) io_setup(0x4, &(0x7f0000000000)=0x0) io_submit(r2, 0x1, &(0x7f0000001440)=[&(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0, r1, &(0x7f0000000040)}]) 2018/04/13 21:33:28 executing program 0: r0 = syz_open_dev$sndpcmc(&(0x7f0000004fee)='/dev/snd/pcmC#D#c\x00', 0x0, 0x0) ioctl(r0, 0x40044102, &(0x7f0000001f64)) 2018/04/13 21:33:28 executing program 4: r0 = socket$inet(0x2, 0x6, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000380)=@broute={'broute\x00', 0x20, 0x1, 0x1d0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000880], 0x0, &(0x7f00000000c0), &(0x7f0000000880)=[{0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xfffffffffffffffe, 0x1, [{{{0x9, 0x0, 0x0, 'gretap0\x00', 'eql\x00', 'bcsf0\x00', 'nr0\x00', @local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, [], @empty, [], 0x70, 0xf0, 0x140}, [@common=@CLASSIFY={'CLASSIFY\x00', 0x8}, @common=@LED={'LED\x00', 0x28, {{'syz0\x00'}}}]}, @common=@LED={'LED\x00', 0x28, {{'syz1\x00'}}}}]}]}, 0x248) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000280)=@broute={'broute\x00', 0x20, 0x1, 0x200, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000680], 0x0, &(0x7f0000000000), &(0x7f0000000680)=[{0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xfffffffffffffffe, 0x1, [{{{0x3, 0x0, 0x0, 'nr0\x00', 'irlan0\x00', "73797a80616c6cf58400", 'eql\x00', @link_local={0x1, 0x80, 0xc2}, [], @local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, [], 0x70, 0x108, 0x140}, [@common=@LED={'LED\x00', 0x28, {{'syz1\x00'}}}, @common=@RATEEST={'RATEEST\x00', 0x20, {{'syz0\x00'}}}]}, @common=@dnat={'dnat\x00', 0x10, {{@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, 0xffffffffffffffff}}}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff}]}, 0x278) 2018/04/13 21:33:28 executing program 2: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000300)='/dev/ptmx\x00', 0x0, 0x0) readv(r0, &(0x7f00003fd000)=[{&(0x7f0000853000)=""/255, 0xffffff1f}], 0x1) r1 = syz_open_dev$evdev(&(0x7f0000d09000)='/dev/input/event#\x00', 0x0, 0x0) r2 = epoll_create1(0x0) epoll_pwait(r2, &(0x7f0000000000)=[{}], 0x1, 0xa7, &(0x7f0000000040), 0x8) epoll_ctl$EPOLL_CTL_ADD(r2, 0x1, r1, &(0x7f00000000c0)={0x10000000}) r3 = dup(r1) ioctl$TIOCSBRK(r3, 0x40044591) 2018/04/13 21:33:28 executing program 6: r0 = signalfd(0xffffffffffffffff, &(0x7f0000e7d000), 0x8) read(r0, &(0x7f000062f000)=""/179, 0xb3) unshare(0x40600) signalfd(r0, &(0x7f0000000700), 0x8) 2018/04/13 21:33:28 executing program 7: r0 = socket$inet(0x2, 0x6, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000380)=@broute={'broute\x00', 0x20, 0x1, 0x1d0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000880], 0x0, &(0x7f00000000c0), &(0x7f0000000880)=[{0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xfffffffffffffffe, 0x1, [{{{0x9, 0x0, 0x0, 'gretap0\x00', 'eql\x00', 'bcsf0\x00', 'nr0\x00', @local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, [], @empty, [], 0x70, 0xf0, 0x140}, [@common=@CLASSIFY={'CLASSIFY\x00', 0x8}, @common=@LED={'LED\x00', 0x28, {{'syz0\x00'}}}]}, @common=@LED={'LED\x00', 0x28, {{'syz1\x00'}}}}]}]}, 0x248) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000280)=@broute={'broute\x00', 0x20, 0x1, 0x200, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000680], 0x0, &(0x7f0000000000), &(0x7f0000000680)=[{0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xfffffffffffffffe, 0x1, [{{{0x3, 0x0, 0x0, 'nr0\x00', 'irlan0\x00', "73797a80616c6cf58400", 'eql\x00', @link_local={0x1, 0x80, 0xc2}, [], @local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, [], 0x70, 0x108, 0x140}, [@common=@LED={'LED\x00', 0x28, {{'syz1\x00'}}}, @common=@RATEEST={'RATEEST\x00', 0x20, {{'syz0\x00'}}}]}, @common=@dnat={'dnat\x00', 0x10, {{@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, 0xffffffffffffffff}}}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff}]}, 0x278) 2018/04/13 21:33:28 executing program 1: perf_event_open(&(0x7f0000348f88)={0x2, 0x70, 0x3e6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pipe(&(0x7f0000000100)={0x0, 0x0}) fcntl$setpipe(r1, 0x407, 0x0) vmsplice(r1, &(0x7f0000eacfd0)=[{&(0x7f0000493f7e)="ac", 0x1}], 0x1, 0x0) pipe2(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) vmsplice(r3, &(0x7f0000f14000)=[{&(0x7f0000853fde)="8d", 0x1}], 0x1, 0x0) tee(r2, r1, 0x3c, 0x0) vmsplice(r0, &(0x7f0000002400)=[{&(0x7f0000002380)="7013", 0x2}], 0x1, 0x0) 2018/04/13 21:33:28 executing program 3: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000300)='/dev/ptmx\x00', 0x0, 0x0) readv(r0, &(0x7f00003fd000)=[{&(0x7f0000853000)=""/255, 0xffffff1f}], 0x1) r1 = syz_open_dev$evdev(&(0x7f0000d09000)='/dev/input/event#\x00', 0x0, 0x0) r2 = epoll_create1(0x0) epoll_pwait(r2, &(0x7f0000000000)=[{}], 0x1, 0xa7, &(0x7f0000000040), 0x8) epoll_ctl$EPOLL_CTL_ADD(r2, 0x1, r1, &(0x7f00000000c0)={0x10000000}) r3 = dup(r1) ioctl$TIOCSBRK(r3, 0x40044591) 2018/04/13 21:33:28 executing program 0: r0 = syz_open_dev$sndpcmc(&(0x7f0000004fee)='/dev/snd/pcmC#D#c\x00', 0x0, 0x0) ioctl(r0, 0x40044102, &(0x7f0000001f64)) 2018/04/13 21:33:28 executing program 5: r0 = syz_open_dev$sndctrl(&(0x7f0000006000)='/dev/snd/controlC#\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_PCM_PREFER_SUBDEVICE(r0, 0x40045532, &(0x7f000000affc)) openat$audio(0xffffffffffffff9c, &(0x7f0000009000)='/dev/audio\x00', 0x0, 0x0) r1 = syz_open_dev$sndpcmc(&(0x7f00006a6fee)='/dev/snd/pcmC#D#c\x00', 0x0, 0x40400) io_setup(0x4, &(0x7f0000000000)=0x0) io_submit(r2, 0x1, &(0x7f0000001440)=[&(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0, r1, &(0x7f0000000040)}]) 2018/04/13 21:33:28 executing program 4: r0 = socket$inet(0x2, 0x6, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000380)=@broute={'broute\x00', 0x20, 0x1, 0x1d0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000880], 0x0, &(0x7f00000000c0), &(0x7f0000000880)=[{0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xfffffffffffffffe, 0x1, [{{{0x9, 0x0, 0x0, 'gretap0\x00', 'eql\x00', 'bcsf0\x00', 'nr0\x00', @local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, [], @empty, [], 0x70, 0xf0, 0x140}, [@common=@CLASSIFY={'CLASSIFY\x00', 0x8}, @common=@LED={'LED\x00', 0x28, {{'syz0\x00'}}}]}, @common=@LED={'LED\x00', 0x28, {{'syz1\x00'}}}}]}]}, 0x248) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000280)=@broute={'broute\x00', 0x20, 0x1, 0x200, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000680], 0x0, &(0x7f0000000000), &(0x7f0000000680)=[{0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xfffffffffffffffe, 0x1, [{{{0x3, 0x0, 0x0, 'nr0\x00', 'irlan0\x00', "73797a80616c6cf58400", 'eql\x00', @link_local={0x1, 0x80, 0xc2}, [], @local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, [], 0x70, 0x108, 0x140}, [@common=@LED={'LED\x00', 0x28, {{'syz1\x00'}}}, @common=@RATEEST={'RATEEST\x00', 0x20, {{'syz0\x00'}}}]}, @common=@dnat={'dnat\x00', 0x10, {{@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, 0xffffffffffffffff}}}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff}]}, 0x278) 2018/04/13 21:33:28 executing program 7: r0 = socket$inet(0x2, 0x6, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000380)=@broute={'broute\x00', 0x20, 0x1, 0x1d0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000880], 0x0, &(0x7f00000000c0), &(0x7f0000000880)=[{0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xfffffffffffffffe, 0x1, [{{{0x9, 0x0, 0x0, 'gretap0\x00', 'eql\x00', 'bcsf0\x00', 'nr0\x00', @local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, [], @empty, [], 0x70, 0xf0, 0x140}, [@common=@CLASSIFY={'CLASSIFY\x00', 0x8}, @common=@LED={'LED\x00', 0x28, {{'syz0\x00'}}}]}, @common=@LED={'LED\x00', 0x28, {{'syz1\x00'}}}}]}]}, 0x248) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000280)=@broute={'broute\x00', 0x20, 0x1, 0x200, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000680], 0x0, &(0x7f0000000000), &(0x7f0000000680)=[{0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xfffffffffffffffe, 0x1, [{{{0x3, 0x0, 0x0, 'nr0\x00', 'irlan0\x00', "73797a80616c6cf58400", 'eql\x00', @link_local={0x1, 0x80, 0xc2}, [], @local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, [], 0x70, 0x108, 0x140}, [@common=@LED={'LED\x00', 0x28, {{'syz1\x00'}}}, @common=@RATEEST={'RATEEST\x00', 0x20, {{'syz0\x00'}}}]}, @common=@dnat={'dnat\x00', 0x10, {{@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, 0xffffffffffffffff}}}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff}]}, 0x278) 2018/04/13 21:33:29 executing program 2: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000300)='/dev/ptmx\x00', 0x0, 0x0) readv(r0, &(0x7f00003fd000)=[{&(0x7f0000853000)=""/255, 0xffffff1f}], 0x1) r1 = syz_open_dev$evdev(&(0x7f0000d09000)='/dev/input/event#\x00', 0x0, 0x0) r2 = epoll_create1(0x0) epoll_pwait(r2, &(0x7f0000000000)=[{}], 0x1, 0xa7, &(0x7f0000000040), 0x8) epoll_ctl$EPOLL_CTL_ADD(r2, 0x1, r1, &(0x7f00000000c0)={0x10000000}) r3 = dup(r1) ioctl$TIOCSBRK(r3, 0x40044591) 2018/04/13 21:33:29 executing program 5: r0 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer\x00', 0x4000000a202, 0x0) write$sndseq(r0, &(0x7f00000001c0)=[{0x81, 0x100000002, 0x0, 0x0, @time={0x0, 0x989680}, {}, {}, @control={0x0, 0x0, 0x4}}], 0x30) 2018/04/13 21:33:29 executing program 4: bpf$MAP_CREATE(0x0, &(0x7f0000c47fec)={0x4000000000000006, 0x4, 0x6879, 0x100000b, 0x0, 0xffffffffffffffff, 0x0, [0x4]}, 0x2c) 2018/04/13 21:33:29 executing program 0: r0 = socket(0x10, 0x3, 0x0) ioctl$sock_ifreq(r0, 0x894a, &(0x7f0000000080)={'ip_vti0\x00', @ifru_data=&(0x7f0000000040)="bd88734f5826f5d69c93dbe59e97b3afe49f25753542bacee7dc85b715c64775"}) 2018/04/13 21:33:29 executing program 1: perf_event_open(&(0x7f0000348f88)={0x2, 0x70, 0x3e6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pipe(&(0x7f0000000100)={0x0, 0x0}) fcntl$setpipe(r1, 0x407, 0x0) vmsplice(r1, &(0x7f0000eacfd0)=[{&(0x7f0000493f7e)="ac", 0x1}], 0x1, 0x0) pipe2(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) vmsplice(r3, &(0x7f0000f14000)=[{&(0x7f0000853fde)="8d", 0x1}], 0x1, 0x0) tee(r2, r1, 0x3c, 0x0) vmsplice(r0, &(0x7f0000002400)=[{&(0x7f0000002380)="7013", 0x2}], 0x1, 0x0) 2018/04/13 21:33:29 executing program 6: r0 = signalfd(0xffffffffffffffff, &(0x7f0000e7d000), 0x8) read(r0, &(0x7f000062f000)=""/179, 0xb3) unshare(0x40600) signalfd(r0, &(0x7f0000000700), 0x8) 2018/04/13 21:33:29 executing program 3: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000300)='/dev/ptmx\x00', 0x0, 0x0) readv(r0, &(0x7f00003fd000)=[{&(0x7f0000853000)=""/255, 0xffffff1f}], 0x1) r1 = syz_open_dev$evdev(&(0x7f0000d09000)='/dev/input/event#\x00', 0x0, 0x0) r2 = epoll_create1(0x0) epoll_pwait(r2, &(0x7f0000000000)=[{}], 0x1, 0xa7, &(0x7f0000000040), 0x8) epoll_ctl$EPOLL_CTL_ADD(r2, 0x1, r1, &(0x7f00000000c0)={0x10000000}) r3 = dup(r1) ioctl$TIOCSBRK(r3, 0x40044591) 2018/04/13 21:33:29 executing program 7: perf_event_open(&(0x7f000001d000)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_bp={&(0x7f0000000000), 0x1}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) futex(&(0x7f0000000040), 0x400000085, 0x0, &(0x7f0000004000)={0x0, 0x1c9c380}, &(0x7f0000000000), 0x2) 2018/04/13 21:33:29 executing program 4: bpf$MAP_CREATE(0x0, &(0x7f0000c47fec)={0x4000000000000006, 0x4, 0x6879, 0x100000b, 0x0, 0xffffffffffffffff, 0x0, [0x4]}, 0x2c) 2018/04/13 21:33:29 executing program 7: perf_event_open(&(0x7f000001d000)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_bp={&(0x7f0000000000), 0x1}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) futex(&(0x7f0000000040), 0x400000085, 0x0, &(0x7f0000004000)={0x0, 0x1c9c380}, &(0x7f0000000000), 0x2) 2018/04/13 21:33:29 executing program 0: r0 = socket(0x10, 0x3, 0x0) ioctl$sock_ifreq(r0, 0x894a, &(0x7f0000000080)={'ip_vti0\x00', @ifru_data=&(0x7f0000000040)="bd88734f5826f5d69c93dbe59e97b3afe49f25753542bacee7dc85b715c64775"}) 2018/04/13 21:33:29 executing program 5: r0 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer\x00', 0x4000000a202, 0x0) write$sndseq(r0, &(0x7f00000001c0)=[{0x81, 0x100000002, 0x0, 0x0, @time={0x0, 0x989680}, {}, {}, @control={0x0, 0x0, 0x4}}], 0x30) 2018/04/13 21:33:29 executing program 0: r0 = socket(0x10, 0x3, 0x0) ioctl$sock_ifreq(r0, 0x894a, &(0x7f0000000080)={'ip_vti0\x00', @ifru_data=&(0x7f0000000040)="bd88734f5826f5d69c93dbe59e97b3afe49f25753542bacee7dc85b715c64775"}) 2018/04/13 21:33:29 executing program 4: bpf$MAP_CREATE(0x0, &(0x7f0000c47fec)={0x4000000000000006, 0x4, 0x6879, 0x100000b, 0x0, 0xffffffffffffffff, 0x0, [0x4]}, 0x2c) 2018/04/13 21:33:29 executing program 7: perf_event_open(&(0x7f000001d000)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_bp={&(0x7f0000000000), 0x1}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) futex(&(0x7f0000000040), 0x400000085, 0x0, &(0x7f0000004000)={0x0, 0x1c9c380}, &(0x7f0000000000), 0x2) 2018/04/13 21:33:29 executing program 5: r0 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer\x00', 0x4000000a202, 0x0) write$sndseq(r0, &(0x7f00000001c0)=[{0x81, 0x100000002, 0x0, 0x0, @time={0x0, 0x989680}, {}, {}, @control={0x0, 0x0, 0x4}}], 0x30) 2018/04/13 21:33:30 executing program 3: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000300)='/dev/ptmx\x00', 0x0, 0x0) readv(r0, &(0x7f00003fd000)=[{&(0x7f0000853000)=""/255, 0xffffff1f}], 0x1) r1 = syz_open_dev$evdev(&(0x7f0000d09000)='/dev/input/event#\x00', 0x0, 0x0) r2 = epoll_create1(0x0) epoll_pwait(r2, &(0x7f0000000000)=[{}], 0x1, 0xa7, &(0x7f0000000040), 0x8) epoll_ctl$EPOLL_CTL_ADD(r2, 0x1, r1, &(0x7f00000000c0)={0x10000000}) r3 = dup(r1) ioctl$TIOCSBRK(r3, 0x40044591) 2018/04/13 21:33:30 executing program 1: perf_event_open(&(0x7f0000348f88)={0x2, 0x70, 0x3e6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pipe(&(0x7f0000000100)={0x0, 0x0}) fcntl$setpipe(r1, 0x407, 0x0) vmsplice(r1, &(0x7f0000eacfd0)=[{&(0x7f0000493f7e)="ac", 0x1}], 0x1, 0x0) pipe2(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) vmsplice(r3, &(0x7f0000f14000)=[{&(0x7f0000853fde)="8d", 0x1}], 0x1, 0x0) tee(r2, r1, 0x3c, 0x0) vmsplice(r0, &(0x7f0000002400)=[{&(0x7f0000002380)="7013", 0x2}], 0x1, 0x0) 2018/04/13 21:33:30 executing program 6: r0 = signalfd(0xffffffffffffffff, &(0x7f0000e7d000), 0x8) read(r0, &(0x7f000062f000)=""/179, 0xb3) unshare(0x40600) signalfd(r0, &(0x7f0000000700), 0x8) 2018/04/13 21:33:30 executing program 2: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000300)='/dev/ptmx\x00', 0x0, 0x0) readv(r0, &(0x7f00003fd000)=[{&(0x7f0000853000)=""/255, 0xffffff1f}], 0x1) r1 = syz_open_dev$evdev(&(0x7f0000d09000)='/dev/input/event#\x00', 0x0, 0x0) r2 = epoll_create1(0x0) epoll_pwait(r2, &(0x7f0000000000)=[{}], 0x1, 0xa7, &(0x7f0000000040), 0x8) epoll_ctl$EPOLL_CTL_ADD(r2, 0x1, r1, &(0x7f00000000c0)={0x10000000}) r3 = dup(r1) ioctl$TIOCSBRK(r3, 0x40044591) 2018/04/13 21:33:30 executing program 0: r0 = socket(0x10, 0x3, 0x0) ioctl$sock_ifreq(r0, 0x894a, &(0x7f0000000080)={'ip_vti0\x00', @ifru_data=&(0x7f0000000040)="bd88734f5826f5d69c93dbe59e97b3afe49f25753542bacee7dc85b715c64775"}) 2018/04/13 21:33:30 executing program 5: r0 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer\x00', 0x4000000a202, 0x0) write$sndseq(r0, &(0x7f00000001c0)=[{0x81, 0x100000002, 0x0, 0x0, @time={0x0, 0x989680}, {}, {}, @control={0x0, 0x0, 0x4}}], 0x30) 2018/04/13 21:33:30 executing program 4: bpf$MAP_CREATE(0x0, &(0x7f0000c47fec)={0x4000000000000006, 0x4, 0x6879, 0x100000b, 0x0, 0xffffffffffffffff, 0x0, [0x4]}, 0x2c) 2018/04/13 21:33:30 executing program 7: perf_event_open(&(0x7f000001d000)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_bp={&(0x7f0000000000), 0x1}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) futex(&(0x7f0000000040), 0x400000085, 0x0, &(0x7f0000004000)={0x0, 0x1c9c380}, &(0x7f0000000000), 0x2) 2018/04/13 21:33:30 executing program 5: r0 = socket(0x10, 0x803, 0x0) write(r0, &(0x7f0000000000)="2400000020002553075f01880272fc0202000000001000220ee1000c08001600f0ffff00", 0x24) 2018/04/13 21:33:30 executing program 7: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount(&(0x7f0000000080)='./file0\x00', &(0x7f0000000180)='./file0\x00', &(0x7f0000000100)='devtmpfs\x00', 0x0, &(0x7f00000001c0)="5249bbb7e5133d556c1fb0f5d2dd4d0abae41b3c58ba2df02d3c2ecce9eb9668919186a1f86ea63268d5999c4c564be49666bc7a8826027c8dcf1e4aa6b53a56cbf8d32c") 2018/04/13 21:33:30 executing program 4: r0 = getpid() sched_setattr(r0, &(0x7f0000000080)={0x0, 0x1, 0x0, 0x0, 0x3}, 0x0) pipe2(&(0x7f0000989000)={0xffffffffffffffff}, 0x0) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x1, 0x32, 0xffffffffffffffff, 0x0) r2 = userfaultfd(0x0) ioctl$UFFDIO_API(r2, 0xc018aa3f, &(0x7f0000bc8000)={0xaa}) ioctl$UFFDIO_REGISTER(r2, 0xc020aa00, &(0x7f0000d62fe0)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r3 = creat(&(0x7f000009aff8)='./file0\x00', 0x0) write$sndseq(r3, &(0x7f0000011fd2)=[{0x0, 0x0, 0x0, 0x0, @time, {}, {}, @time=@time={0x77359400}}], 0x30) read$eventfd(r3, &(0x7f0000000040), 0x8) lseek(r3, 0x0, 0x0) dup2(r1, r2) 2018/04/13 21:33:30 executing program 0: r0 = openat$rtc(0xffffffffffffff9c, &(0x7f00000adff7)='/dev/rtc\x00', 0x0, 0x0) ioctl$TUNGETFEATURES(r0, 0x80247009, &(0x7f0000000000)) 2018/04/13 21:33:30 executing program 0: r0 = openat$rtc(0xffffffffffffff9c, &(0x7f00000adff7)='/dev/rtc\x00', 0x0, 0x0) ioctl$TUNGETFEATURES(r0, 0x80247009, &(0x7f0000000000)) [ 291.345982] netlink: 'syz-executor5': attribute type 22 has an invalid length. [ 291.360988] tmpfs: Bad mount option RI»·å 2018/04/13 21:33:30 executing program 7: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount(&(0x7f0000000080)='./file0\x00', &(0x7f0000000180)='./file0\x00', &(0x7f0000000100)='devtmpfs\x00', 0x0, &(0x7f00000001c0)="5249bbb7e5133d556c1fb0f5d2dd4d0abae41b3c58ba2df02d3c2ecce9eb9668919186a1f86ea63268d5999c4c564be49666bc7a8826027c8dcf1e4aa6b53a56cbf8d32c") 2018/04/13 21:33:30 executing program 5: r0 = socket(0x10, 0x803, 0x0) write(r0, &(0x7f0000000000)="2400000020002553075f01880272fc0202000000001000220ee1000c08001600f0ffff00", 0x24) 2018/04/13 21:33:31 executing program 7: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount(&(0x7f0000000080)='./file0\x00', &(0x7f0000000180)='./file0\x00', &(0x7f0000000100)='devtmpfs\x00', 0x0, &(0x7f00000001c0)="5249bbb7e5133d556c1fb0f5d2dd4d0abae41b3c58ba2df02d3c2ecce9eb9668919186a1f86ea63268d5999c4c564be49666bc7a8826027c8dcf1e4aa6b53a56cbf8d32c") [ 291.441714] tmpfs: Bad mount option RI»·å [ 291.447866] netlink: 'syz-executor5': attribute type 22 has an invalid length. [ 291.500713] tmpfs: Bad mount option RI»·å 2018/04/13 21:33:31 executing program 7: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount(&(0x7f0000000080)='./file0\x00', &(0x7f0000000180)='./file0\x00', &(0x7f0000000100)='devtmpfs\x00', 0x0, &(0x7f00000001c0)="5249bbb7e5133d556c1fb0f5d2dd4d0abae41b3c58ba2df02d3c2ecce9eb9668919186a1f86ea63268d5999c4c564be49666bc7a8826027c8dcf1e4aa6b53a56cbf8d32c") 2018/04/13 21:33:31 executing program 5: r0 = socket(0x10, 0x803, 0x0) write(r0, &(0x7f0000000000)="2400000020002553075f01880272fc0202000000001000220ee1000c08001600f0ffff00", 0x24) 2018/04/13 21:33:31 executing program 1: r0 = syz_init_net_socket$nfc_llcp(0x27, 0x1, 0x1) bind$nfc_llcp(r0, &(0x7f0000000000)={0x27, 0x0, 0x0, 0x0, 0x0, 0x0, "6cb782e4ad88b89d1fd309169f44812107130ee55db70510420aaa96759ecbc36eb9bb12b6124793608dd0e7316d1d4f4dbac39806e4ac714b7ecefa8a934a", 0xb}, 0x60) listen(r0, 0x0) setsockopt$nfc_llcp_NFC_LLCP_MIUX(r0, 0x118, 0x1, &(0x7f0000000080), 0x4) 2018/04/13 21:33:31 executing program 6: perf_event_open(&(0x7f00000000c0)={0x2, 0x70, 0x3e6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) userfaultfd(0x80800) r0 = openat$audio(0xffffffffffffff9c, &(0x7f0000001180)='/dev/audio\x00', 0x20000, 0x0) r1 = msgget(0x3, 0x4) msgget$private(0x0, 0x8) r2 = msgget(0x2, 0x142) ioctl$int_in(r0, 0x0, &(0x7f0000000040)=0x1) msgrcv(r2, &(0x7f0000000140)={0x0, ""/4096}, 0xffffffffffffff4c, 0x3, 0xfffffffffdfffffc) msgctl$IPC_RMID(r1, 0x0) r3 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000001240)='/proc/sys/net/ipv4/vs/sync_version\x00', 0x2, 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f00000011c0)='/proc/self/net/pfkey\x00', 0x10000, 0x0) connect$netrom(r3, &(0x7f0000000080)=@ax25={0x3, {"8f3a5a3564d52f"}}, 0x10) 2018/04/13 21:33:31 executing program 2: writev(0xffffffffffffffff, &(0x7f0000fb5ff0)=[{&(0x7f00004eb000)="1f0000000203190000000700000002000000020509000100040580ff3ffe58", 0x1f}], 0x1) r0 = socket$netlink(0x10, 0x3, 0xc) writev(r0, &(0x7f0000fb5ff0), 0x36a) 2018/04/13 21:33:31 executing program 4: r0 = getpid() sched_setattr(r0, &(0x7f0000000080)={0x0, 0x1, 0x0, 0x0, 0x3}, 0x0) pipe2(&(0x7f0000989000)={0xffffffffffffffff}, 0x0) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x1, 0x32, 0xffffffffffffffff, 0x0) r2 = userfaultfd(0x0) ioctl$UFFDIO_API(r2, 0xc018aa3f, &(0x7f0000bc8000)={0xaa}) ioctl$UFFDIO_REGISTER(r2, 0xc020aa00, &(0x7f0000d62fe0)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r3 = creat(&(0x7f000009aff8)='./file0\x00', 0x0) write$sndseq(r3, &(0x7f0000011fd2)=[{0x0, 0x0, 0x0, 0x0, @time, {}, {}, @time=@time={0x77359400}}], 0x30) read$eventfd(r3, &(0x7f0000000040), 0x8) lseek(r3, 0x0, 0x0) dup2(r1, r2) 2018/04/13 21:33:31 executing program 3: r0 = socket(0x40000000015, 0x5, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f00000001c0)={0x0, 0x0}, &(0x7f0000000200)=0x5) setresuid(0x0, r1, 0x0) r2 = add_key$keyring(&(0x7f00000002c0)='keyring\x00', &(0x7f0000000300)={0x73, 0x79, 0x7a}, 0x0, 0x0, 0xfffffffffffffffd) setresuid(r1, r1, r1) keyctl$get_persistent(0x16, r1, r2) 2018/04/13 21:33:31 executing program 0: r0 = openat$rtc(0xffffffffffffff9c, &(0x7f00000adff7)='/dev/rtc\x00', 0x0, 0x0) ioctl$TUNGETFEATURES(r0, 0x80247009, &(0x7f0000000000)) [ 292.333495] tmpfs: Bad mount option RI»·å [ 292.341145] netlink: 'syz-executor5': attribute type 22 has an invalid length. 2018/04/13 21:33:31 executing program 0: r0 = openat$rtc(0xffffffffffffff9c, &(0x7f00000adff7)='/dev/rtc\x00', 0x0, 0x0) ioctl$TUNGETFEATURES(r0, 0x80247009, &(0x7f0000000000)) 2018/04/13 21:33:31 executing program 7: r0 = open(&(0x7f000000fffa)='./bus\x00', 0x141042, 0x0) fallocate(r0, 0x0, 0xffff, 0x4) r1 = open(&(0x7f000000fffa)='./bus\x00', 0x0, 0x0) r2 = open(&(0x7f0000002000)='./bus\x00', 0x4002, 0x0) sendfile(r2, r0, &(0x7f0000000040), 0x1000000000000) sendfile(r2, r1, &(0x7f0000000080), 0x80000) 2018/04/13 21:33:31 executing program 6: r0 = perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0xe2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fstat(r0, &(0x7f0000000200)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000280), &(0x7f00000002c0)=0xc) unshare(0x28060400) r1 = syz_open_procfs(0x0, &(0x7f0000864ff6)='ns/pid\x00') setns(r1, 0x0) 2018/04/13 21:33:32 executing program 3: r0 = socket(0x40000000015, 0x5, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f00000001c0)={0x0, 0x0}, &(0x7f0000000200)=0x5) setresuid(0x0, r1, 0x0) r2 = add_key$keyring(&(0x7f00000002c0)='keyring\x00', &(0x7f0000000300)={0x73, 0x79, 0x7a}, 0x0, 0x0, 0xfffffffffffffffd) setresuid(r1, r1, r1) keyctl$get_persistent(0x16, r1, r2) 2018/04/13 21:33:32 executing program 2: writev(0xffffffffffffffff, &(0x7f0000fb5ff0)=[{&(0x7f00004eb000)="1f0000000203190000000700000002000000020509000100040580ff3ffe58", 0x1f}], 0x1) r0 = socket$netlink(0x10, 0x3, 0xc) writev(r0, &(0x7f0000fb5ff0), 0x36a) 2018/04/13 21:33:32 executing program 1: r0 = syz_init_net_socket$nfc_llcp(0x27, 0x1, 0x1) bind$nfc_llcp(r0, &(0x7f0000000000)={0x27, 0x0, 0x0, 0x0, 0x0, 0x0, "6cb782e4ad88b89d1fd309169f44812107130ee55db70510420aaa96759ecbc36eb9bb12b6124793608dd0e7316d1d4f4dbac39806e4ac714b7ecefa8a934a", 0xb}, 0x60) listen(r0, 0x0) setsockopt$nfc_llcp_NFC_LLCP_MIUX(r0, 0x118, 0x1, &(0x7f0000000080), 0x4) 2018/04/13 21:33:32 executing program 5: r0 = socket(0x10, 0x803, 0x0) write(r0, &(0x7f0000000000)="2400000020002553075f01880272fc0202000000001000220ee1000c08001600f0ffff00", 0x24) 2018/04/13 21:33:32 executing program 0: r0 = socket(0x40000000015, 0x5, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f00000001c0)={0x0, 0x0}, &(0x7f0000000200)=0x5) setresuid(0x0, r1, 0x0) r2 = add_key$keyring(&(0x7f00000002c0)='keyring\x00', &(0x7f0000000300)={0x73, 0x79, 0x7a}, 0x0, 0x0, 0xfffffffffffffffd) setresuid(r1, r1, r1) keyctl$get_persistent(0x16, r1, r2) 2018/04/13 21:33:32 executing program 3: r0 = socket(0x40000000015, 0x5, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f00000001c0)={0x0, 0x0}, &(0x7f0000000200)=0x5) setresuid(0x0, r1, 0x0) r2 = add_key$keyring(&(0x7f00000002c0)='keyring\x00', &(0x7f0000000300)={0x73, 0x79, 0x7a}, 0x0, 0x0, 0xfffffffffffffffd) setresuid(r1, r1, r1) keyctl$get_persistent(0x16, r1, r2) 2018/04/13 21:33:32 executing program 6: r0 = perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0xe2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fstat(r0, &(0x7f0000000200)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000280), &(0x7f00000002c0)=0xc) unshare(0x28060400) r1 = syz_open_procfs(0x0, &(0x7f0000864ff6)='ns/pid\x00') setns(r1, 0x0) 2018/04/13 21:33:32 executing program 1: r0 = syz_init_net_socket$nfc_llcp(0x27, 0x1, 0x1) bind$nfc_llcp(r0, &(0x7f0000000000)={0x27, 0x0, 0x0, 0x0, 0x0, 0x0, "6cb782e4ad88b89d1fd309169f44812107130ee55db70510420aaa96759ecbc36eb9bb12b6124793608dd0e7316d1d4f4dbac39806e4ac714b7ecefa8a934a", 0xb}, 0x60) listen(r0, 0x0) setsockopt$nfc_llcp_NFC_LLCP_MIUX(r0, 0x118, 0x1, &(0x7f0000000080), 0x4) [ 292.506722] netlink: 'syz-executor5': attribute type 22 has an invalid length. 2018/04/13 21:33:32 executing program 0: r0 = socket(0x40000000015, 0x5, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f00000001c0)={0x0, 0x0}, &(0x7f0000000200)=0x5) setresuid(0x0, r1, 0x0) r2 = add_key$keyring(&(0x7f00000002c0)='keyring\x00', &(0x7f0000000300)={0x73, 0x79, 0x7a}, 0x0, 0x0, 0xfffffffffffffffd) setresuid(r1, r1, r1) keyctl$get_persistent(0x16, r1, r2) 2018/04/13 21:33:32 executing program 2: writev(0xffffffffffffffff, &(0x7f0000fb5ff0)=[{&(0x7f00004eb000)="1f0000000203190000000700000002000000020509000100040580ff3ffe58", 0x1f}], 0x1) r0 = socket$netlink(0x10, 0x3, 0xc) writev(r0, &(0x7f0000fb5ff0), 0x36a) 2018/04/13 21:33:32 executing program 5: r0 = socket(0x40000000015, 0x5, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f00000001c0)={0x0, 0x0}, &(0x7f0000000200)=0x5) setresuid(0x0, r1, 0x0) r2 = add_key$keyring(&(0x7f00000002c0)='keyring\x00', &(0x7f0000000300)={0x73, 0x79, 0x7a}, 0x0, 0x0, 0xfffffffffffffffd) setresuid(r1, r1, r1) keyctl$get_persistent(0x16, r1, r2) 2018/04/13 21:33:32 executing program 3: r0 = socket(0x40000000015, 0x5, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f00000001c0)={0x0, 0x0}, &(0x7f0000000200)=0x5) setresuid(0x0, r1, 0x0) r2 = add_key$keyring(&(0x7f00000002c0)='keyring\x00', &(0x7f0000000300)={0x73, 0x79, 0x7a}, 0x0, 0x0, 0xfffffffffffffffd) setresuid(r1, r1, r1) keyctl$get_persistent(0x16, r1, r2) 2018/04/13 21:33:32 executing program 1: r0 = syz_init_net_socket$nfc_llcp(0x27, 0x1, 0x1) bind$nfc_llcp(r0, &(0x7f0000000000)={0x27, 0x0, 0x0, 0x0, 0x0, 0x0, "6cb782e4ad88b89d1fd309169f44812107130ee55db70510420aaa96759ecbc36eb9bb12b6124793608dd0e7316d1d4f4dbac39806e4ac714b7ecefa8a934a", 0xb}, 0x60) listen(r0, 0x0) setsockopt$nfc_llcp_NFC_LLCP_MIUX(r0, 0x118, 0x1, &(0x7f0000000080), 0x4) 2018/04/13 21:33:32 executing program 7: r0 = open(&(0x7f000000fffa)='./bus\x00', 0x141042, 0x0) fallocate(r0, 0x0, 0xffff, 0x4) r1 = open(&(0x7f000000fffa)='./bus\x00', 0x0, 0x0) r2 = open(&(0x7f0000002000)='./bus\x00', 0x4002, 0x0) sendfile(r2, r0, &(0x7f0000000040), 0x1000000000000) sendfile(r2, r1, &(0x7f0000000080), 0x80000) 2018/04/13 21:33:32 executing program 4: r0 = getpid() sched_setattr(r0, &(0x7f0000000080)={0x0, 0x1, 0x0, 0x0, 0x3}, 0x0) pipe2(&(0x7f0000989000)={0xffffffffffffffff}, 0x0) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x1, 0x32, 0xffffffffffffffff, 0x0) r2 = userfaultfd(0x0) ioctl$UFFDIO_API(r2, 0xc018aa3f, &(0x7f0000bc8000)={0xaa}) ioctl$UFFDIO_REGISTER(r2, 0xc020aa00, &(0x7f0000d62fe0)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r3 = creat(&(0x7f000009aff8)='./file0\x00', 0x0) write$sndseq(r3, &(0x7f0000011fd2)=[{0x0, 0x0, 0x0, 0x0, @time, {}, {}, @time=@time={0x77359400}}], 0x30) read$eventfd(r3, &(0x7f0000000040), 0x8) lseek(r3, 0x0, 0x0) dup2(r1, r2) 2018/04/13 21:33:32 executing program 6: r0 = perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0xe2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fstat(r0, &(0x7f0000000200)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000280), &(0x7f00000002c0)=0xc) unshare(0x28060400) r1 = syz_open_procfs(0x0, &(0x7f0000864ff6)='ns/pid\x00') setns(r1, 0x0) 2018/04/13 21:33:32 executing program 5: r0 = socket(0x40000000015, 0x5, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f00000001c0)={0x0, 0x0}, &(0x7f0000000200)=0x5) setresuid(0x0, r1, 0x0) r2 = add_key$keyring(&(0x7f00000002c0)='keyring\x00', &(0x7f0000000300)={0x73, 0x79, 0x7a}, 0x0, 0x0, 0xfffffffffffffffd) setresuid(r1, r1, r1) keyctl$get_persistent(0x16, r1, r2) 2018/04/13 21:33:32 executing program 0: r0 = socket(0x40000000015, 0x5, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f00000001c0)={0x0, 0x0}, &(0x7f0000000200)=0x5) setresuid(0x0, r1, 0x0) r2 = add_key$keyring(&(0x7f00000002c0)='keyring\x00', &(0x7f0000000300)={0x73, 0x79, 0x7a}, 0x0, 0x0, 0xfffffffffffffffd) setresuid(r1, r1, r1) keyctl$get_persistent(0x16, r1, r2) 2018/04/13 21:33:32 executing program 1: r0 = socket$inet6(0xa, 0x2000000802, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f0000f68000)={@loopback={0x0, 0x1}, 0x800, 0x0, 0xff, 0x1}, 0x20) setsockopt$inet6_int(r0, 0x29, 0x21, &(0x7f000089b000)=0x1, 0x4) sendmsg(r0, &(0x7f00000003c0)={&(0x7f0000000100)=@in6={0xa, 0x4e24, 0x800, @dev={0xfe, 0x80}}, 0x80, &(0x7f0000000180), 0x0, &(0x7f0000000400)=[{0xc0, 0x0, 0x0, "fa754e0099e0a779fc7721e26b6dbfb0754d20fed680b22b9cc754eba759bce1ee035ade0a2f0255496187718f75dc89dbf7d8f51e9c2d3bce4da14a1d05f809483e06c83a8c6b0f0d9b78a3825064b9144369ef3848f2e39960141983cf5e6c5208b30df39804bb49b67706d775ed2cd22244477a9aedf73183ae464a7730530c74972e1a2085e8993d4cb4abae5cf2574f4d3ff410833be78e5777773fc255e9690f5b69e35e15a4aeec6937"}, {0x100, 0x0, 0x5a00, "fefeb8cef5c26035706454ba24155813f0c54847571ccd495185362607a92df31df0c75ba34b69ca0b107c278375991360fd241466cf0980b045c0ce4271b1e55657ebf16b7d0360a781addcd791617b759c74ec643eaad1474c049a7acd40def4c69e3bc7ca070f39e92bb3dc0deb30ec4f0e29110df73eef07dd0c15447f4aa46cc3812fdd5172dfb0cca425cf3709a70d18672772823c186417fa47ac86fc1f2e4b7c89201c4f32dba585f38d2aa7c0b48bfb0dd7e7dd5de50098d7ddf2fdf9b9cdb964f379721c30c3f63001114f5812aea8d75096e5e7c6f9c4d1ffd662ceaa3475563d02acf6"}], 0x1c0}, 0x4) 2018/04/13 21:33:32 executing program 3: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$tun(&(0x7f0000000040)='/dev/net/tun\x00', 0x0, 0x0) ioctl$SIOCSIFHWADDR(r0, 0x5452, &(0x7f0000000080)={'vcan0\x00', @random="2ed6b10020fa"}) 2018/04/13 21:33:32 executing program 2: writev(0xffffffffffffffff, &(0x7f0000fb5ff0)=[{&(0x7f00004eb000)="1f0000000203190000000700000002000000020509000100040580ff3ffe58", 0x1f}], 0x1) r0 = socket$netlink(0x10, 0x3, 0xc) writev(r0, &(0x7f0000fb5ff0), 0x36a) 2018/04/13 21:33:32 executing program 6: r0 = perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0xe2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fstat(r0, &(0x7f0000000200)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000280), &(0x7f00000002c0)=0xc) unshare(0x28060400) r1 = syz_open_procfs(0x0, &(0x7f0000864ff6)='ns/pid\x00') setns(r1, 0x0) 2018/04/13 21:33:33 executing program 0: ioctl$DRM_IOCTL_AGP_FREE(0xffffffffffffffff, 0x40206435, &(0x7f0000002000)={0x0, 0x0, 0x0, 0xc1372}) bpf$PROG_LOAD(0x5, &(0x7f00007c9000)={0x1, 0x5, &(0x7f0000002000)=@framed={{0x18}, [@jmp={0x5}], {0x95}}, &(0x7f0000003ff6)='syzkaller\x00', 0xea5c, 0x2c5, &(0x7f000000a000)=""/195}, 0x48) 2018/04/13 21:33:33 executing program 5: r0 = socket(0x40000000015, 0x5, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f00000001c0)={0x0, 0x0}, &(0x7f0000000200)=0x5) setresuid(0x0, r1, 0x0) r2 = add_key$keyring(&(0x7f00000002c0)='keyring\x00', &(0x7f0000000300)={0x73, 0x79, 0x7a}, 0x0, 0x0, 0xfffffffffffffffd) setresuid(r1, r1, r1) keyctl$get_persistent(0x16, r1, r2) 2018/04/13 21:33:33 executing program 1: r0 = socket$inet6(0xa, 0x2000000802, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f0000f68000)={@loopback={0x0, 0x1}, 0x800, 0x0, 0xff, 0x1}, 0x20) setsockopt$inet6_int(r0, 0x29, 0x21, &(0x7f000089b000)=0x1, 0x4) sendmsg(r0, &(0x7f00000003c0)={&(0x7f0000000100)=@in6={0xa, 0x4e24, 0x800, @dev={0xfe, 0x80}}, 0x80, &(0x7f0000000180), 0x0, &(0x7f0000000400)=[{0xc0, 0x0, 0x0, "fa754e0099e0a779fc7721e26b6dbfb0754d20fed680b22b9cc754eba759bce1ee035ade0a2f0255496187718f75dc89dbf7d8f51e9c2d3bce4da14a1d05f809483e06c83a8c6b0f0d9b78a3825064b9144369ef3848f2e39960141983cf5e6c5208b30df39804bb49b67706d775ed2cd22244477a9aedf73183ae464a7730530c74972e1a2085e8993d4cb4abae5cf2574f4d3ff410833be78e5777773fc255e9690f5b69e35e15a4aeec6937"}, {0x100, 0x0, 0x5a00, "fefeb8cef5c26035706454ba24155813f0c54847571ccd495185362607a92df31df0c75ba34b69ca0b107c278375991360fd241466cf0980b045c0ce4271b1e55657ebf16b7d0360a781addcd791617b759c74ec643eaad1474c049a7acd40def4c69e3bc7ca070f39e92bb3dc0deb30ec4f0e29110df73eef07dd0c15447f4aa46cc3812fdd5172dfb0cca425cf3709a70d18672772823c186417fa47ac86fc1f2e4b7c89201c4f32dba585f38d2aa7c0b48bfb0dd7e7dd5de50098d7ddf2fdf9b9cdb964f379721c30c3f63001114f5812aea8d75096e5e7c6f9c4d1ffd662ceaa3475563d02acf6"}], 0x1c0}, 0x4) 2018/04/13 21:33:33 executing program 3: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$tun(&(0x7f0000000040)='/dev/net/tun\x00', 0x0, 0x0) ioctl$SIOCSIFHWADDR(r0, 0x5452, &(0x7f0000000080)={'vcan0\x00', @random="2ed6b10020fa"}) 2018/04/13 21:33:33 executing program 3: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$tun(&(0x7f0000000040)='/dev/net/tun\x00', 0x0, 0x0) ioctl$SIOCSIFHWADDR(r0, 0x5452, &(0x7f0000000080)={'vcan0\x00', @random="2ed6b10020fa"}) 2018/04/13 21:33:33 executing program 7: r0 = open(&(0x7f000000fffa)='./bus\x00', 0x141042, 0x0) fallocate(r0, 0x0, 0xffff, 0x4) r1 = open(&(0x7f000000fffa)='./bus\x00', 0x0, 0x0) r2 = open(&(0x7f0000002000)='./bus\x00', 0x4002, 0x0) sendfile(r2, r0, &(0x7f0000000040), 0x1000000000000) sendfile(r2, r1, &(0x7f0000000080), 0x80000) 2018/04/13 21:33:33 executing program 6: syz_mount_image$xfs(&(0x7f0000000000)='xfs\x00', &(0x7f00000000c0)='./file0\x00', 0x1000000, 0x1, &(0x7f0000000480)=[{&(0x7f0000000100)="58465342000002000000000000008000000000000000000000000000000000005bfc2f1a415c41dab49211bccbd5f4cb000000000000000700000000000025a000000000000025a100000000000025a200000008000080000000000100000000000012c0b4a4020001000002000000000000000000000000090908010f0000190000000000000040000000000000003d0000000000006db0054b4c7f6fc09a753dfe4db6153311190000000000000000000000000000000000000000000000000000000000000010", 0xc8}], 0x0, &(0x7f0000000040)=ANY=[]) 2018/04/13 21:33:33 executing program 0: ioctl$DRM_IOCTL_AGP_FREE(0xffffffffffffffff, 0x40206435, &(0x7f0000002000)={0x0, 0x0, 0x0, 0xc1372}) bpf$PROG_LOAD(0x5, &(0x7f00007c9000)={0x1, 0x5, &(0x7f0000002000)=@framed={{0x18}, [@jmp={0x5}], {0x95}}, &(0x7f0000003ff6)='syzkaller\x00', 0xea5c, 0x2c5, &(0x7f000000a000)=""/195}, 0x48) 2018/04/13 21:33:33 executing program 5: open(&(0x7f0000000280)='./file0\x00', 0x0, 0x0) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000240)={0xffffffffffffffff, &(0x7f0000000000), &(0x7f0000000200)}, 0x2cb) 2018/04/13 21:33:33 executing program 1: r0 = socket$inet6(0xa, 0x2000000802, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f0000f68000)={@loopback={0x0, 0x1}, 0x800, 0x0, 0xff, 0x1}, 0x20) setsockopt$inet6_int(r0, 0x29, 0x21, &(0x7f000089b000)=0x1, 0x4) sendmsg(r0, &(0x7f00000003c0)={&(0x7f0000000100)=@in6={0xa, 0x4e24, 0x800, @dev={0xfe, 0x80}}, 0x80, &(0x7f0000000180), 0x0, &(0x7f0000000400)=[{0xc0, 0x0, 0x0, "fa754e0099e0a779fc7721e26b6dbfb0754d20fed680b22b9cc754eba759bce1ee035ade0a2f0255496187718f75dc89dbf7d8f51e9c2d3bce4da14a1d05f809483e06c83a8c6b0f0d9b78a3825064b9144369ef3848f2e39960141983cf5e6c5208b30df39804bb49b67706d775ed2cd22244477a9aedf73183ae464a7730530c74972e1a2085e8993d4cb4abae5cf2574f4d3ff410833be78e5777773fc255e9690f5b69e35e15a4aeec6937"}, {0x100, 0x0, 0x5a00, "fefeb8cef5c26035706454ba24155813f0c54847571ccd495185362607a92df31df0c75ba34b69ca0b107c278375991360fd241466cf0980b045c0ce4271b1e55657ebf16b7d0360a781addcd791617b759c74ec643eaad1474c049a7acd40def4c69e3bc7ca070f39e92bb3dc0deb30ec4f0e29110df73eef07dd0c15447f4aa46cc3812fdd5172dfb0cca425cf3709a70d18672772823c186417fa47ac86fc1f2e4b7c89201c4f32dba585f38d2aa7c0b48bfb0dd7e7dd5de50098d7ddf2fdf9b9cdb964f379721c30c3f63001114f5812aea8d75096e5e7c6f9c4d1ffd662ceaa3475563d02acf6"}], 0x1c0}, 0x4) 2018/04/13 21:33:33 executing program 4: r0 = getpid() sched_setattr(r0, &(0x7f0000000080)={0x0, 0x1, 0x0, 0x0, 0x3}, 0x0) pipe2(&(0x7f0000989000)={0xffffffffffffffff}, 0x0) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x1, 0x32, 0xffffffffffffffff, 0x0) r2 = userfaultfd(0x0) ioctl$UFFDIO_API(r2, 0xc018aa3f, &(0x7f0000bc8000)={0xaa}) ioctl$UFFDIO_REGISTER(r2, 0xc020aa00, &(0x7f0000d62fe0)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r3 = creat(&(0x7f000009aff8)='./file0\x00', 0x0) write$sndseq(r3, &(0x7f0000011fd2)=[{0x0, 0x0, 0x0, 0x0, @time, {}, {}, @time=@time={0x77359400}}], 0x30) read$eventfd(r3, &(0x7f0000000040), 0x8) lseek(r3, 0x0, 0x0) dup2(r1, r2) 2018/04/13 21:33:33 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r1, r2, &(0x7f0000011000/0x18000)=nil, &(0x7f0000000280)=[@text16={0x10, &(0x7f00000001c0)="24d26766c74424000d0000006766c7442402940000006766c744240600000000670f0114240f20e06635000200000f22e066b8002000000f23d80f21f86635400000500f23f82e660f21570f01790a0f0056d26766c7442400864300006766c7442402fbffffff6766c744240600000000670f011c249af3f2150066650fb24fc8", 0x81}], 0xaaaaaaaaaaaaaeb, 0x0, &(0x7f00000000c0), 0x1) ioctl$KVM_RUN(r2, 0xae80, 0x0) 2018/04/13 21:33:33 executing program 5: open(&(0x7f0000000280)='./file0\x00', 0x0, 0x0) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000240)={0xffffffffffffffff, &(0x7f0000000000), &(0x7f0000000200)}, 0x2cb) 2018/04/13 21:33:33 executing program 1: r0 = socket$inet6(0xa, 0x2000000802, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f0000f68000)={@loopback={0x0, 0x1}, 0x800, 0x0, 0xff, 0x1}, 0x20) setsockopt$inet6_int(r0, 0x29, 0x21, &(0x7f000089b000)=0x1, 0x4) sendmsg(r0, &(0x7f00000003c0)={&(0x7f0000000100)=@in6={0xa, 0x4e24, 0x800, @dev={0xfe, 0x80}}, 0x80, &(0x7f0000000180), 0x0, &(0x7f0000000400)=[{0xc0, 0x0, 0x0, "fa754e0099e0a779fc7721e26b6dbfb0754d20fed680b22b9cc754eba759bce1ee035ade0a2f0255496187718f75dc89dbf7d8f51e9c2d3bce4da14a1d05f809483e06c83a8c6b0f0d9b78a3825064b9144369ef3848f2e39960141983cf5e6c5208b30df39804bb49b67706d775ed2cd22244477a9aedf73183ae464a7730530c74972e1a2085e8993d4cb4abae5cf2574f4d3ff410833be78e5777773fc255e9690f5b69e35e15a4aeec6937"}, {0x100, 0x0, 0x5a00, "fefeb8cef5c26035706454ba24155813f0c54847571ccd495185362607a92df31df0c75ba34b69ca0b107c278375991360fd241466cf0980b045c0ce4271b1e55657ebf16b7d0360a781addcd791617b759c74ec643eaad1474c049a7acd40def4c69e3bc7ca070f39e92bb3dc0deb30ec4f0e29110df73eef07dd0c15447f4aa46cc3812fdd5172dfb0cca425cf3709a70d18672772823c186417fa47ac86fc1f2e4b7c89201c4f32dba585f38d2aa7c0b48bfb0dd7e7dd5de50098d7ddf2fdf9b9cdb964f379721c30c3f63001114f5812aea8d75096e5e7c6f9c4d1ffd662ceaa3475563d02acf6"}], 0x1c0}, 0x4) 2018/04/13 21:33:33 executing program 6: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = gettid() socketpair$unix(0x1, 0x5, 0x0, &(0x7f000053b000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$int_in(r1, 0x2000000005452, &(0x7f0000008ff8)=0x3f) fcntl$setown(r1, 0x8, r0) fcntl$setsig(r1, 0xa, 0x12) poll(&(0x7f0000027ff8)=[{r2}], 0x1, 0x8000) dup3(r1, r2, 0x0) tkill(r0, 0x16) 2018/04/13 21:33:33 executing program 0: ioctl$DRM_IOCTL_AGP_FREE(0xffffffffffffffff, 0x40206435, &(0x7f0000002000)={0x0, 0x0, 0x0, 0xc1372}) bpf$PROG_LOAD(0x5, &(0x7f00007c9000)={0x1, 0x5, &(0x7f0000002000)=@framed={{0x18}, [@jmp={0x5}], {0x95}}, &(0x7f0000003ff6)='syzkaller\x00', 0xea5c, 0x2c5, &(0x7f000000a000)=""/195}, 0x48) 2018/04/13 21:33:33 executing program 3: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$tun(&(0x7f0000000040)='/dev/net/tun\x00', 0x0, 0x0) ioctl$SIOCSIFHWADDR(r0, 0x5452, &(0x7f0000000080)={'vcan0\x00', @random="2ed6b10020fa"}) 2018/04/13 21:33:33 executing program 5: open(&(0x7f0000000280)='./file0\x00', 0x0, 0x0) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000240)={0xffffffffffffffff, &(0x7f0000000000), &(0x7f0000000200)}, 0x2cb) 2018/04/13 21:33:33 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r1, r2, &(0x7f0000011000/0x18000)=nil, &(0x7f0000000280)=[@text16={0x10, &(0x7f00000001c0)="24d26766c74424000d0000006766c7442402940000006766c744240600000000670f0114240f20e06635000200000f22e066b8002000000f23d80f21f86635400000500f23f82e660f21570f01790a0f0056d26766c7442400864300006766c7442402fbffffff6766c744240600000000670f011c249af3f2150066650fb24fc8", 0x81}], 0xaaaaaaaaaaaaaeb, 0x0, &(0x7f00000000c0), 0x1) ioctl$KVM_RUN(r2, 0xae80, 0x0) 2018/04/13 21:33:33 executing program 1: perf_event_open(&(0x7f000001d000)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x7fe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_bp={&(0x7f0000000000), 0x1}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_emit_ethernet(0x3e, &(0x7f00000000c0)={@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, @dev={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa]}, [], {@ipv6={0x86dd, {0x0, 0x6, "f920ce", 0x8, 0x0, 0x0, @ipv4={[], [0xff, 0xff], @multicast1=0xe0000001}, @local={0xfe, 0x80, [], 0xaa}, {[], @icmpv6=@echo_request={0x80}}}}}}, &(0x7f0000000000)) 2018/04/13 21:33:33 executing program 5: open(&(0x7f0000000280)='./file0\x00', 0x0, 0x0) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000240)={0xffffffffffffffff, &(0x7f0000000000), &(0x7f0000000200)}, 0x2cb) 2018/04/13 21:33:33 executing program 7: r0 = open(&(0x7f000000fffa)='./bus\x00', 0x141042, 0x0) fallocate(r0, 0x0, 0xffff, 0x4) r1 = open(&(0x7f000000fffa)='./bus\x00', 0x0, 0x0) r2 = open(&(0x7f0000002000)='./bus\x00', 0x4002, 0x0) sendfile(r2, r0, &(0x7f0000000040), 0x1000000000000) sendfile(r2, r1, &(0x7f0000000080), 0x80000) 2018/04/13 21:33:33 executing program 0: ioctl$DRM_IOCTL_AGP_FREE(0xffffffffffffffff, 0x40206435, &(0x7f0000002000)={0x0, 0x0, 0x0, 0xc1372}) bpf$PROG_LOAD(0x5, &(0x7f00007c9000)={0x1, 0x5, &(0x7f0000002000)=@framed={{0x18}, [@jmp={0x5}], {0x95}}, &(0x7f0000003ff6)='syzkaller\x00', 0xea5c, 0x2c5, &(0x7f000000a000)=""/195}, 0x48) 2018/04/13 21:33:33 executing program 3: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f000014f000)={&(0x7f00003c7ff4)={0x10}, 0xc, &(0x7f0000bd7000)={&(0x7f0000c07e98)=@newsa={0x138, 0x10, 0x713, 0x0, 0x0, {{@in=@rand_addr, @in6=@dev={0xfe, 0x80}}, {@in6, 0x0, 0x33}, @in=@broadcast=0xffffffff, {}, {}, {}, 0xffffffffffffffff, 0x0, 0xa}, [@algo_auth={0x48, 0x1, {{'md5\x00'}}}]}, 0x138}, 0x1}, 0x0) 2018/04/13 21:33:34 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000001680)=@nat={'nat\x00', 0x19, 0x1, 0x1d8, [0x20001480, 0x0, 0x0, 0x200014b0, 0x200014e0], 0x0, &(0x7f0000001040), &(0x7f0000001480)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xfffffffffffffffc, 0x1, [{{{0x9, 0x0, 0x0, 'eql\x00', 'gre0\x00', 'gre0\x00', 'eql\x00', @empty, [], @link_local={0x1, 0x80, 0xc2}, [], 0xe0, 0xe0, 0x118, [@quota={'quota\x00', 0x18}, @connlabel={'connlabel\x00', 0x8}]}}, @arpreply={'arpreply\x00', 0x10, {{@random="4cbeaac68aad"}}}}]}]}, 0x250) 2018/04/13 21:33:34 executing program 5: mkdir(&(0x7f0000000640)='./file0\x00', 0x0) mount(&(0x7f0000000080)='./file0\x00', &(0x7f0000000040)='./file0\x00', &(0x7f00000000c0)='selinuxfs\x00', 0x1000, &(0x7f0000000100)) mount(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)='squashfs\x00', 0x20, 0x0) [ 294.544916] cannot load conntrack support for proto=7 [ 294.627263] EXT4-fs: 1 callbacks suppressed [ 294.627270] EXT4-fs (sda1): re-mounted. Opts: (null) [ 294.642088] EXT4-fs (sda1): re-mounted. Opts: (null) 2018/04/13 21:33:34 executing program 3: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f000014f000)={&(0x7f00003c7ff4)={0x10}, 0xc, &(0x7f0000bd7000)={&(0x7f0000c07e98)=@newsa={0x138, 0x10, 0x713, 0x0, 0x0, {{@in=@rand_addr, @in6=@dev={0xfe, 0x80}}, {@in6, 0x0, 0x33}, @in=@broadcast=0xffffffff, {}, {}, {}, 0xffffffffffffffff, 0x0, 0xa}, [@algo_auth={0x48, 0x1, {{'md5\x00'}}}]}, 0x138}, 0x1}, 0x0) 2018/04/13 21:33:34 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r1, r2, &(0x7f0000011000/0x18000)=nil, &(0x7f0000000280)=[@text16={0x10, &(0x7f00000001c0)="24d26766c74424000d0000006766c7442402940000006766c744240600000000670f0114240f20e06635000200000f22e066b8002000000f23d80f21f86635400000500f23f82e660f21570f01790a0f0056d26766c7442400864300006766c7442402fbffffff6766c744240600000000670f011c249af3f2150066650fb24fc8", 0x81}], 0xaaaaaaaaaaaaaeb, 0x0, &(0x7f00000000c0), 0x1) ioctl$KVM_RUN(r2, 0xae80, 0x0) 2018/04/13 21:33:34 executing program 0: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff7fffffffffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6_dccp(0xa, 0x6, 0x0) getsockopt$IP_VS_SO_GET_VERSION(r0, 0x0, 0xe, &(0x7f0000000040), &(0x7f0000000080)=0x40) 2018/04/13 21:33:34 executing program 4: r0 = syz_open_dev$binder(&(0x7f0000236ff3)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x0, 0x20011, r0, 0x0) ioctl$BINDER_SET_CONTEXT_MGR(r0, 0x40046207, 0x0) ioctl$BINDER_WRITE_READ(r0, 0xc0306201, &(0x7f0000008000)={0x44, 0x0, &(0x7f0000004fbc)=[@transaction={0x40406300, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50, 0x10, &(0x7f000026c000)=[@ptr={0x73622a85, 0x0, &(0x7f00004edf8a)}, @ptr={0x77622a85, 0x0, &(0x7f0000007f72)}], &(0x7f000000afd0)=[0x0, 0x28]}}], 0x0, 0x0, &(0x7f0000009000)}) ioctl$BINDER_WRITE_READ(r0, 0xc0306201, &(0x7f0000004580)={0x1c, 0x0, &(0x7f0000003500)=[@increfs_done={0x40106308}, @decrefs={0x40046307, 0x3}], 0x0, 0x0, &(0x7f0000003580)}) [ 295.075141] binder: 20631:20633 BC_INCREFS_DONE node 51 has no pending increfs request [ 295.083312] binder: 20631:20633 DecRefs 0 refcount change on invalid ref 3 ret -22 [ 295.118129] binder: BINDER_SET_CONTEXT_MGR already set [ 295.123653] binder: 20631:20635 ioctl 40046207 0 returned -16 [ 295.133360] binder_alloc: 20631: binder_alloc_buf, no vma [ 295.139181] binder: 20631:20633 transaction failed 29189/-3, size 80-16 line 2963 [ 295.150566] binder: 20631:20635 BC_INCREFS_DONE u0000000000000000 no match [ 295.157787] binder: 20631:20635 DecRefs 0 refcount change on invalid ref 3 ret -22 2018/04/13 21:33:34 executing program 6: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = gettid() socketpair$unix(0x1, 0x5, 0x0, &(0x7f000053b000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$int_in(r1, 0x2000000005452, &(0x7f0000008ff8)=0x3f) fcntl$setown(r1, 0x8, r0) fcntl$setsig(r1, 0xa, 0x12) poll(&(0x7f0000027ff8)=[{r2}], 0x1, 0x8000) dup3(r1, r2, 0x0) tkill(r0, 0x16) 2018/04/13 21:33:34 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000001680)=@nat={'nat\x00', 0x19, 0x1, 0x1d8, [0x20001480, 0x0, 0x0, 0x200014b0, 0x200014e0], 0x0, &(0x7f0000001040), &(0x7f0000001480)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xfffffffffffffffc, 0x1, [{{{0x9, 0x0, 0x0, 'eql\x00', 'gre0\x00', 'gre0\x00', 'eql\x00', @empty, [], @link_local={0x1, 0x80, 0xc2}, [], 0xe0, 0xe0, 0x118, [@quota={'quota\x00', 0x18}, @connlabel={'connlabel\x00', 0x8}]}}, @arpreply={'arpreply\x00', 0x10, {{@random="4cbeaac68aad"}}}}]}]}, 0x250) 2018/04/13 21:33:34 executing program 7: r0 = getpgid(0x0) sched_setaffinity(r0, 0x8, &(0x7f00009ad000)=0x1) pipe2(&(0x7f0000f61000)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4800) mmap(&(0x7f0000011000/0x2000)=nil, 0x2000, 0x1, 0x32, 0xffffffffffffffff, 0x0) r3 = userfaultfd(0x0) ioctl$UFFDIO_API(r3, 0xc018aa3f, &(0x7f0000bc8000)={0xaa}) ioctl$UFFDIO_REGISTER(r3, 0xc020aa00, &(0x7f0000d62fe0)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) write$sndseq(r2, &(0x7f0000011fd2)=[{0x0, 0x0, 0x0, 0x0, @time, {}, {}, @time=@time={0x77359400}}], 0x1c) read(r1, &(0x7f0000000000)=""/126, 0x7e) ioctl$FIONREAD(r1, 0x541b, &(0x7f0000000100)) dup2(r1, r3) 2018/04/13 21:33:34 executing program 3: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f000014f000)={&(0x7f00003c7ff4)={0x10}, 0xc, &(0x7f0000bd7000)={&(0x7f0000c07e98)=@newsa={0x138, 0x10, 0x713, 0x0, 0x0, {{@in=@rand_addr, @in6=@dev={0xfe, 0x80}}, {@in6, 0x0, 0x33}, @in=@broadcast=0xffffffff, {}, {}, {}, 0xffffffffffffffff, 0x0, 0xa}, [@algo_auth={0x48, 0x1, {{'md5\x00'}}}]}, 0x138}, 0x1}, 0x0) 2018/04/13 21:33:34 executing program 5: prctl$seccomp(0x2f, 0x0, &(0x7f0000000000)={0x1ffffffffffffe67, &(0x7f0000000080)}) 2018/04/13 21:33:34 executing program 0: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff7fffffffffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6_dccp(0xa, 0x6, 0x0) getsockopt$IP_VS_SO_GET_VERSION(r0, 0x0, 0xe, &(0x7f0000000040), &(0x7f0000000080)=0x40) 2018/04/13 21:33:34 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r1, r2, &(0x7f0000011000/0x18000)=nil, &(0x7f0000000280)=[@text16={0x10, &(0x7f00000001c0)="24d26766c74424000d0000006766c7442402940000006766c744240600000000670f0114240f20e06635000200000f22e066b8002000000f23d80f21f86635400000500f23f82e660f21570f01790a0f0056d26766c7442400864300006766c7442402fbffffff6766c744240600000000670f011c249af3f2150066650fb24fc8", 0x81}], 0xaaaaaaaaaaaaaeb, 0x0, &(0x7f00000000c0), 0x1) ioctl$KVM_RUN(r2, 0xae80, 0x0) 2018/04/13 21:33:34 executing program 4: r0 = syz_open_dev$binder(&(0x7f0000236ff3)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x0, 0x20011, r0, 0x0) ioctl$BINDER_SET_CONTEXT_MGR(r0, 0x40046207, 0x0) ioctl$BINDER_WRITE_READ(r0, 0xc0306201, &(0x7f0000008000)={0x44, 0x0, &(0x7f0000004fbc)=[@transaction={0x40406300, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50, 0x10, &(0x7f000026c000)=[@ptr={0x73622a85, 0x0, &(0x7f00004edf8a)}, @ptr={0x77622a85, 0x0, &(0x7f0000007f72)}], &(0x7f000000afd0)=[0x0, 0x28]}}], 0x0, 0x0, &(0x7f0000009000)}) ioctl$BINDER_WRITE_READ(r0, 0xc0306201, &(0x7f0000004580)={0x1c, 0x0, &(0x7f0000003500)=[@increfs_done={0x40106308}, @decrefs={0x40046307, 0x3}], 0x0, 0x0, &(0x7f0000003580)}) [ 295.182925] binder: undelivered TRANSACTION_ERROR: 29189 [ 295.216227] binder: release 20631:20633 transaction 52 out, still active [ 295.223366] binder: unexpected work type, 4, not freed [ 295.228693] binder: unexpected work type, 4, not freed [ 295.234006] binder: undelivered TRANSACTION_COMPLETE [ 295.239239] binder: send failed reply for transaction 52, target dead 2018/04/13 21:33:34 executing program 5: prctl$seccomp(0x2f, 0x0, &(0x7f0000000000)={0x1ffffffffffffe67, &(0x7f0000000080)}) 2018/04/13 21:33:34 executing program 0: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff7fffffffffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6_dccp(0xa, 0x6, 0x0) getsockopt$IP_VS_SO_GET_VERSION(r0, 0x0, 0xe, &(0x7f0000000040), &(0x7f0000000080)=0x40) 2018/04/13 21:33:34 executing program 3: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f000014f000)={&(0x7f00003c7ff4)={0x10}, 0xc, &(0x7f0000bd7000)={&(0x7f0000c07e98)=@newsa={0x138, 0x10, 0x713, 0x0, 0x0, {{@in=@rand_addr, @in6=@dev={0xfe, 0x80}}, {@in6, 0x0, 0x33}, @in=@broadcast=0xffffffff, {}, {}, {}, 0xffffffffffffffff, 0x0, 0xa}, [@algo_auth={0x48, 0x1, {{'md5\x00'}}}]}, 0x138}, 0x1}, 0x0) [ 295.278491] binder: 20652:20655 BC_INCREFS_DONE node 58 has no pending increfs request [ 295.286700] binder: 20652:20655 DecRefs 0 refcount change on invalid ref 3 ret -22 2018/04/13 21:33:34 executing program 5: prctl$seccomp(0x2f, 0x0, &(0x7f0000000000)={0x1ffffffffffffe67, &(0x7f0000000080)}) 2018/04/13 21:33:34 executing program 2: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = gettid() socketpair$unix(0x1, 0x5, 0x0, &(0x7f000053b000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$int_in(r1, 0x2000000005452, &(0x7f0000008ff8)=0x3f) fcntl$setown(r1, 0x8, r0) fcntl$setsig(r1, 0xa, 0x12) poll(&(0x7f0000027ff8)=[{r2}], 0x1, 0x8000) dup3(r1, r2, 0x0) tkill(r0, 0x16) [ 295.351391] cannot load conntrack support for proto=7 2018/04/13 21:33:34 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000001680)=@nat={'nat\x00', 0x19, 0x1, 0x1d8, [0x20001480, 0x0, 0x0, 0x200014b0, 0x200014e0], 0x0, &(0x7f0000001040), &(0x7f0000001480)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xfffffffffffffffc, 0x1, [{{{0x9, 0x0, 0x0, 'eql\x00', 'gre0\x00', 'gre0\x00', 'eql\x00', @empty, [], @link_local={0x1, 0x80, 0xc2}, [], 0xe0, 0xe0, 0x118, [@quota={'quota\x00', 0x18}, @connlabel={'connlabel\x00', 0x8}]}}, @arpreply={'arpreply\x00', 0x10, {{@random="4cbeaac68aad"}}}}]}]}, 0x250) 2018/04/13 21:33:34 executing program 4: r0 = syz_open_dev$binder(&(0x7f0000236ff3)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x0, 0x20011, r0, 0x0) ioctl$BINDER_SET_CONTEXT_MGR(r0, 0x40046207, 0x0) ioctl$BINDER_WRITE_READ(r0, 0xc0306201, &(0x7f0000008000)={0x44, 0x0, &(0x7f0000004fbc)=[@transaction={0x40406300, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50, 0x10, &(0x7f000026c000)=[@ptr={0x73622a85, 0x0, &(0x7f00004edf8a)}, @ptr={0x77622a85, 0x0, &(0x7f0000007f72)}], &(0x7f000000afd0)=[0x0, 0x28]}}], 0x0, 0x0, &(0x7f0000009000)}) ioctl$BINDER_WRITE_READ(r0, 0xc0306201, &(0x7f0000004580)={0x1c, 0x0, &(0x7f0000003500)=[@increfs_done={0x40106308}, @decrefs={0x40046307, 0x3}], 0x0, 0x0, &(0x7f0000003580)}) [ 295.382491] binder: release 20652:20655 transaction 59 out, still active [ 295.389489] binder: unexpected work type, 4, not freed [ 295.394825] binder: unexpected work type, 4, not freed [ 295.400138] binder: undelivered TRANSACTION_COMPLETE [ 295.405357] binder: send failed reply for transaction 59, target dead 2018/04/13 21:33:35 executing program 0: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff7fffffffffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6_dccp(0xa, 0x6, 0x0) getsockopt$IP_VS_SO_GET_VERSION(r0, 0x0, 0xe, &(0x7f0000000040), &(0x7f0000000080)=0x40) [ 295.450626] binder: 20669:20671 BC_INCREFS_DONE node 64 has no pending increfs request [ 295.459015] binder: 20669:20671 DecRefs 0 refcount change on invalid ref 3 ret -22 [ 295.541476] binder: release 20669:20671 transaction 65 out, still active [ 295.548465] binder: unexpected work type, 4, not freed [ 295.553602] cannot load conntrack support for proto=7 [ 295.553785] binder: unexpected work type, 4, not freed [ 295.564247] binder: undelivered TRANSACTION_COMPLETE [ 295.569490] binder: send failed reply for transaction 65, target dead 2018/04/13 21:33:35 executing program 6: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = gettid() socketpair$unix(0x1, 0x5, 0x0, &(0x7f000053b000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$int_in(r1, 0x2000000005452, &(0x7f0000008ff8)=0x3f) fcntl$setown(r1, 0x8, r0) fcntl$setsig(r1, 0xa, 0x12) poll(&(0x7f0000027ff8)=[{r2}], 0x1, 0x8000) dup3(r1, r2, 0x0) tkill(r0, 0x16) 2018/04/13 21:33:35 executing program 2: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = gettid() socketpair$unix(0x1, 0x5, 0x0, &(0x7f000053b000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$int_in(r1, 0x2000000005452, &(0x7f0000008ff8)=0x3f) fcntl$setown(r1, 0x8, r0) fcntl$setsig(r1, 0xa, 0x12) poll(&(0x7f0000027ff8)=[{r2}], 0x1, 0x8000) dup3(r1, r2, 0x0) tkill(r0, 0x16) 2018/04/13 21:33:35 executing program 7: r0 = getpgid(0x0) sched_setaffinity(r0, 0x8, &(0x7f00009ad000)=0x1) pipe2(&(0x7f0000f61000)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4800) mmap(&(0x7f0000011000/0x2000)=nil, 0x2000, 0x1, 0x32, 0xffffffffffffffff, 0x0) r3 = userfaultfd(0x0) ioctl$UFFDIO_API(r3, 0xc018aa3f, &(0x7f0000bc8000)={0xaa}) ioctl$UFFDIO_REGISTER(r3, 0xc020aa00, &(0x7f0000d62fe0)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) write$sndseq(r2, &(0x7f0000011fd2)=[{0x0, 0x0, 0x0, 0x0, @time, {}, {}, @time=@time={0x77359400}}], 0x1c) read(r1, &(0x7f0000000000)=""/126, 0x7e) ioctl$FIONREAD(r1, 0x541b, &(0x7f0000000100)) dup2(r1, r3) 2018/04/13 21:33:35 executing program 5: prctl$seccomp(0x2f, 0x0, &(0x7f0000000000)={0x1ffffffffffffe67, &(0x7f0000000080)}) 2018/04/13 21:33:35 executing program 3: r0 = syz_open_dev$binder(&(0x7f0000236ff3)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x0, 0x20011, r0, 0x0) ioctl$BINDER_SET_CONTEXT_MGR(r0, 0x40046207, 0x0) ioctl$BINDER_WRITE_READ(r0, 0xc0306201, &(0x7f0000008000)={0x44, 0x0, &(0x7f0000004fbc)=[@transaction={0x40406300, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50, 0x10, &(0x7f000026c000)=[@ptr={0x73622a85, 0x0, &(0x7f00004edf8a)}, @ptr={0x77622a85, 0x0, &(0x7f0000007f72)}], &(0x7f000000afd0)=[0x0, 0x28]}}], 0x0, 0x0, &(0x7f0000009000)}) ioctl$BINDER_WRITE_READ(r0, 0xc0306201, &(0x7f0000004580)={0x1c, 0x0, &(0x7f0000003500)=[@increfs_done={0x40106308}, @decrefs={0x40046307, 0x3}], 0x0, 0x0, &(0x7f0000003580)}) 2018/04/13 21:33:35 executing program 4: r0 = syz_open_dev$binder(&(0x7f0000236ff3)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x0, 0x20011, r0, 0x0) ioctl$BINDER_SET_CONTEXT_MGR(r0, 0x40046207, 0x0) ioctl$BINDER_WRITE_READ(r0, 0xc0306201, &(0x7f0000008000)={0x44, 0x0, &(0x7f0000004fbc)=[@transaction={0x40406300, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50, 0x10, &(0x7f000026c000)=[@ptr={0x73622a85, 0x0, &(0x7f00004edf8a)}, @ptr={0x77622a85, 0x0, &(0x7f0000007f72)}], &(0x7f000000afd0)=[0x0, 0x28]}}], 0x0, 0x0, &(0x7f0000009000)}) ioctl$BINDER_WRITE_READ(r0, 0xc0306201, &(0x7f0000004580)={0x1c, 0x0, &(0x7f0000003500)=[@increfs_done={0x40106308}, @decrefs={0x40046307, 0x3}], 0x0, 0x0, &(0x7f0000003580)}) 2018/04/13 21:33:35 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000001680)=@nat={'nat\x00', 0x19, 0x1, 0x1d8, [0x20001480, 0x0, 0x0, 0x200014b0, 0x200014e0], 0x0, &(0x7f0000001040), &(0x7f0000001480)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xfffffffffffffffc, 0x1, [{{{0x9, 0x0, 0x0, 'eql\x00', 'gre0\x00', 'gre0\x00', 'eql\x00', @empty, [], @link_local={0x1, 0x80, 0xc2}, [], 0xe0, 0xe0, 0x118, [@quota={'quota\x00', 0x18}, @connlabel={'connlabel\x00', 0x8}]}}, @arpreply={'arpreply\x00', 0x10, {{@random="4cbeaac68aad"}}}}]}]}, 0x250) 2018/04/13 21:33:35 executing program 0: r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r0, &(0x7f00004c0000)={0xa, 0x4e23, 0x0, @ipv4={[], [0xff, 0xff]}}, 0x1c) listen(r0, 0x43) setsockopt$inet_sctp6_SCTP_RTOINFO(r0, 0x84, 0x0, &(0x7f0000000100)={0x0, 0x1}, 0x10) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffff9c, 0x89e2, &(0x7f0000000000)={0xffffffffffffff9c}) bind$inet(0xffffffffffffffff, &(0x7f00000000c0)={0x2, 0x4e22, @rand_addr=0x396aa24c}, 0x10) r2 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r2, &(0x7f00001edff0)={0x2, 0x0, @multicast1=0xe0000001}, 0x10) setsockopt$inet_opts(r2, 0x0, 0x4, &(0x7f0000aa8000)="070a0722084fff", 0x7) connect$inet(r2, &(0x7f0000000080)={0x2, 0x0, @loopback=0x7f000001}, 0x10) readv(0xffffffffffffffff, &(0x7f0000001280)=[{&(0x7f0000001180)=""/249, 0xf9}], 0x1) getsockopt$inet_sctp6_SCTP_DELAYED_SACK(r1, 0x84, 0x10, &(0x7f0000000340)=@assoc_value={0x0, 0x800}, &(0x7f0000000400)=0x8) setsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER_VALUE(r0, 0x84, 0x7c, &(0x7f0000000440)={r3, 0x1, 0x8000}, 0x8) getsockopt$inet_sctp_SCTP_GET_LOCAL_ADDRS(0xffffffffffffffff, 0x84, 0x6d, &(0x7f0000000040)=ANY=[@ANYRES32=0x0], &(0x7f0000000180)=0x1) getsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x22, &(0x7f00000001c0)={{{@in=@local, @in=@multicast1}}, {{@in=@broadcast}, 0x0, @in=@local}}, &(0x7f0000000140)=0xe8) prctl$getreaper(0x1b, &(0x7f00000004c0)) recvfrom$inet(r2, &(0x7f0000000380)=""/116, 0xffffffffffffff47, 0x20, &(0x7f00000002c0)={0x2, 0x84e22, @dev={0xac, 0x14, 0x14, 0x17}}, 0xc) r4 = socket$inet6_sctp(0xa, 0x4000000000000001, 0x84) sendto$inet6(r4, &(0x7f000087dffe)='F', 0x1, 0x0, &(0x7f000005ffe4)={0xa, 0x4e23, 0x0, @loopback={0x0, 0x1}}, 0x1c) sendmsg$netlink(r4, &(0x7f00009f3fc8)={0x0, 0x0, &(0x7f000070f000)=[{&(0x7f0000000480)=ANY=[@ANYBLOB="00000000000000000330f85849ff64dbad369a38d9a6964886343cf2bd5205154ed85feaa3cc08e4be1a25ae18eabd56"], 0x1}], 0x1, &(0x7f0000414000)}, 0x0) 2018/04/13 21:33:35 executing program 5: r0 = getpgid(0x0) sched_setaffinity(r0, 0x8, &(0x7f00009ad000)=0x1) pipe2(&(0x7f0000f61000)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4800) mmap(&(0x7f0000011000/0x2000)=nil, 0x2000, 0x1, 0x32, 0xffffffffffffffff, 0x0) r3 = userfaultfd(0x0) ioctl$UFFDIO_API(r3, 0xc018aa3f, &(0x7f0000bc8000)={0xaa}) ioctl$UFFDIO_REGISTER(r3, 0xc020aa00, &(0x7f0000d62fe0)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) write$sndseq(r2, &(0x7f0000011fd2)=[{0x0, 0x0, 0x0, 0x0, @time, {}, {}, @time=@time={0x77359400}}], 0x1c) read(r1, &(0x7f0000000000)=""/126, 0x7e) ioctl$FIONREAD(r1, 0x541b, &(0x7f0000000100)) dup2(r1, r3) [ 296.249961] binder: 20688:20693 BC_INCREFS_DONE node 70 has no pending increfs request [ 296.258162] binder: 20688:20693 DecRefs 0 refcount change on invalid ref 3 ret -22 [ 296.269904] binder: BINDER_SET_CONTEXT_MGR already set [ 296.279379] binder: 20694:20699 ioctl 40046207 0 returned -16 2018/04/13 21:33:35 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_VCPU_EVENTS(r2, 0x4040aea0, &(0x7f0000000000)={0xea, 0x2}) [ 296.297720] binder: 20694:20699 BC_INCREFS_DONE u0000000000000000 no match [ 296.304899] binder: 20694:20699 DecRefs 0 refcount change on invalid ref 3 ret -22 [ 296.333227] binder: release 20688:20693 transaction 71 out, still active [ 296.340114] cannot load conntrack support for proto=7 2018/04/13 21:33:35 executing program 3: r0 = syz_open_dev$binder(&(0x7f0000236ff3)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x0, 0x20011, r0, 0x0) ioctl$BINDER_SET_CONTEXT_MGR(r0, 0x40046207, 0x0) ioctl$BINDER_WRITE_READ(r0, 0xc0306201, &(0x7f0000008000)={0x44, 0x0, &(0x7f0000004fbc)=[@transaction={0x40406300, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50, 0x10, &(0x7f000026c000)=[@ptr={0x73622a85, 0x0, &(0x7f00004edf8a)}, @ptr={0x77622a85, 0x0, &(0x7f0000007f72)}], &(0x7f000000afd0)=[0x0, 0x28]}}], 0x0, 0x0, &(0x7f0000009000)}) ioctl$BINDER_WRITE_READ(r0, 0xc0306201, &(0x7f0000004580)={0x1c, 0x0, &(0x7f0000003500)=[@increfs_done={0x40106308}, @decrefs={0x40046307, 0x3}], 0x0, 0x0, &(0x7f0000003580)}) [ 296.345522] binder: unexpected work type, 4, not freed [ 296.350867] binder: unexpected work type, 4, not freed [ 296.356169] binder: undelivered TRANSACTION_COMPLETE [ 296.361390] binder: send failed reply for transaction 71, target dead [ 296.368071] binder: send failed reply for transaction 76 to 20694:20699 2018/04/13 21:33:35 executing program 1: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000040)={'syz_tun\x00', 0x0}) setsockopt$packet_add_memb(r0, 0x107, 0x1, &(0x7f0000000180)={r1, 0x1, 0x3, @link_local={0x1, 0x80, 0xc2}}, 0x10) setsockopt$packet_drop_memb(r0, 0x107, 0x2, &(0x7f0000000000)={r1, 0x1, 0x6}, 0x10) [ 296.411069] binder: 20712:20713 BC_INCREFS_DONE node 81 has no pending increfs request [ 296.419274] binder: 20712:20713 DecRefs 0 refcount change on invalid ref 3 ret -22 2018/04/13 21:33:36 executing program 3: r0 = syz_open_dev$binder(&(0x7f0000236ff3)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x0, 0x20011, r0, 0x0) ioctl$BINDER_SET_CONTEXT_MGR(r0, 0x40046207, 0x0) ioctl$BINDER_WRITE_READ(r0, 0xc0306201, &(0x7f0000008000)={0x44, 0x0, &(0x7f0000004fbc)=[@transaction={0x40406300, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50, 0x10, &(0x7f000026c000)=[@ptr={0x73622a85, 0x0, &(0x7f00004edf8a)}, @ptr={0x77622a85, 0x0, &(0x7f0000007f72)}], &(0x7f000000afd0)=[0x0, 0x28]}}], 0x0, 0x0, &(0x7f0000009000)}) ioctl$BINDER_WRITE_READ(r0, 0xc0306201, &(0x7f0000004580)={0x1c, 0x0, &(0x7f0000003500)=[@increfs_done={0x40106308}, @decrefs={0x40046307, 0x3}], 0x0, 0x0, &(0x7f0000003580)}) [ 296.454272] binder: undelivered TRANSACTION_COMPLETE [ 296.459488] binder: undelivered TRANSACTION_ERROR: 29189 [ 296.477507] device syz_tun entered promiscuous mode [ 296.486531] binder: release 20712:20713 transaction 82 out, still active [ 296.493518] binder: unexpected work type, 4, not freed [ 296.498836] binder: unexpected work type, 4, not freed 2018/04/13 21:33:36 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_VCPU_EVENTS(r2, 0x4040aea0, &(0x7f0000000000)={0xea, 0x2}) [ 296.504139] binder: undelivered TRANSACTION_COMPLETE [ 296.509339] binder: send failed reply for transaction 82, target dead [ 296.529970] binder: 20719:20720 BC_INCREFS_DONE node 87 has no pending increfs request [ 296.538158] binder: 20719:20720 DecRefs 0 refcount change on invalid ref 3 ret -22 2018/04/13 21:33:36 executing program 1: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000040)={'syz_tun\x00', 0x0}) setsockopt$packet_add_memb(r0, 0x107, 0x1, &(0x7f0000000180)={r1, 0x1, 0x3, @link_local={0x1, 0x80, 0xc2}}, 0x10) setsockopt$packet_drop_memb(r0, 0x107, 0x2, &(0x7f0000000000)={r1, 0x1, 0x6}, 0x10) [ 296.568203] device syz_tun left promiscuous mode 2018/04/13 21:33:36 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_VCPU_EVENTS(r2, 0x4040aea0, &(0x7f0000000000)={0xea, 0x2}) [ 296.594669] binder: release 20719:20720 transaction 88 out, still active [ 296.601668] binder: unexpected work type, 4, not freed [ 296.606989] binder: unexpected work type, 4, not freed [ 296.612303] binder: undelivered TRANSACTION_COMPLETE [ 296.617528] binder: send failed reply for transaction 88, target dead [ 296.618732] device syz_tun entered promiscuous mode [ 296.672065] device syz_tun left promiscuous mode 2018/04/13 21:33:36 executing program 6: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = gettid() socketpair$unix(0x1, 0x5, 0x0, &(0x7f000053b000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$int_in(r1, 0x2000000005452, &(0x7f0000008ff8)=0x3f) fcntl$setown(r1, 0x8, r0) fcntl$setsig(r1, 0xa, 0x12) poll(&(0x7f0000027ff8)=[{r2}], 0x1, 0x8000) dup3(r1, r2, 0x0) tkill(r0, 0x16) 2018/04/13 21:33:36 executing program 2: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = gettid() socketpair$unix(0x1, 0x5, 0x0, &(0x7f000053b000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$int_in(r1, 0x2000000005452, &(0x7f0000008ff8)=0x3f) fcntl$setown(r1, 0x8, r0) fcntl$setsig(r1, 0xa, 0x12) poll(&(0x7f0000027ff8)=[{r2}], 0x1, 0x8000) dup3(r1, r2, 0x0) tkill(r0, 0x16) 2018/04/13 21:33:36 executing program 7: r0 = getpgid(0x0) sched_setaffinity(r0, 0x8, &(0x7f00009ad000)=0x1) pipe2(&(0x7f0000f61000)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4800) mmap(&(0x7f0000011000/0x2000)=nil, 0x2000, 0x1, 0x32, 0xffffffffffffffff, 0x0) r3 = userfaultfd(0x0) ioctl$UFFDIO_API(r3, 0xc018aa3f, &(0x7f0000bc8000)={0xaa}) ioctl$UFFDIO_REGISTER(r3, 0xc020aa00, &(0x7f0000d62fe0)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) write$sndseq(r2, &(0x7f0000011fd2)=[{0x0, 0x0, 0x0, 0x0, @time, {}, {}, @time=@time={0x77359400}}], 0x1c) read(r1, &(0x7f0000000000)=""/126, 0x7e) ioctl$FIONREAD(r1, 0x541b, &(0x7f0000000100)) dup2(r1, r3) 2018/04/13 21:33:36 executing program 0: r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r0, &(0x7f00004c0000)={0xa, 0x4e23, 0x0, @ipv4={[], [0xff, 0xff]}}, 0x1c) listen(r0, 0x43) setsockopt$inet_sctp6_SCTP_RTOINFO(r0, 0x84, 0x0, &(0x7f0000000100)={0x0, 0x1}, 0x10) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffff9c, 0x89e2, &(0x7f0000000000)={0xffffffffffffff9c}) bind$inet(0xffffffffffffffff, &(0x7f00000000c0)={0x2, 0x4e22, @rand_addr=0x396aa24c}, 0x10) r2 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r2, &(0x7f00001edff0)={0x2, 0x0, @multicast1=0xe0000001}, 0x10) setsockopt$inet_opts(r2, 0x0, 0x4, &(0x7f0000aa8000)="070a0722084fff", 0x7) connect$inet(r2, &(0x7f0000000080)={0x2, 0x0, @loopback=0x7f000001}, 0x10) readv(0xffffffffffffffff, &(0x7f0000001280)=[{&(0x7f0000001180)=""/249, 0xf9}], 0x1) getsockopt$inet_sctp6_SCTP_DELAYED_SACK(r1, 0x84, 0x10, &(0x7f0000000340)=@assoc_value={0x0, 0x800}, &(0x7f0000000400)=0x8) setsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER_VALUE(r0, 0x84, 0x7c, &(0x7f0000000440)={r3, 0x1, 0x8000}, 0x8) getsockopt$inet_sctp_SCTP_GET_LOCAL_ADDRS(0xffffffffffffffff, 0x84, 0x6d, &(0x7f0000000040)=ANY=[@ANYRES32=0x0], &(0x7f0000000180)=0x1) getsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x22, &(0x7f00000001c0)={{{@in=@local, @in=@multicast1}}, {{@in=@broadcast}, 0x0, @in=@local}}, &(0x7f0000000140)=0xe8) prctl$getreaper(0x1b, &(0x7f00000004c0)) recvfrom$inet(r2, &(0x7f0000000380)=""/116, 0xffffffffffffff47, 0x20, &(0x7f00000002c0)={0x2, 0x84e22, @dev={0xac, 0x14, 0x14, 0x17}}, 0xc) r4 = socket$inet6_sctp(0xa, 0x4000000000000001, 0x84) sendto$inet6(r4, &(0x7f000087dffe)='F', 0x1, 0x0, &(0x7f000005ffe4)={0xa, 0x4e23, 0x0, @loopback={0x0, 0x1}}, 0x1c) sendmsg$netlink(r4, &(0x7f00009f3fc8)={0x0, 0x0, &(0x7f000070f000)=[{&(0x7f0000000480)=ANY=[@ANYBLOB="00000000000000000330f85849ff64dbad369a38d9a6964886343cf2bd5205154ed85feaa3cc08e4be1a25ae18eabd56"], 0x1}], 0x1, &(0x7f0000414000)}, 0x0) 2018/04/13 21:33:36 executing program 5: r0 = getpgid(0x0) sched_setaffinity(r0, 0x8, &(0x7f00009ad000)=0x1) pipe2(&(0x7f0000f61000)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4800) mmap(&(0x7f0000011000/0x2000)=nil, 0x2000, 0x1, 0x32, 0xffffffffffffffff, 0x0) r3 = userfaultfd(0x0) ioctl$UFFDIO_API(r3, 0xc018aa3f, &(0x7f0000bc8000)={0xaa}) ioctl$UFFDIO_REGISTER(r3, 0xc020aa00, &(0x7f0000d62fe0)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) write$sndseq(r2, &(0x7f0000011fd2)=[{0x0, 0x0, 0x0, 0x0, @time, {}, {}, @time=@time={0x77359400}}], 0x1c) read(r1, &(0x7f0000000000)=""/126, 0x7e) ioctl$FIONREAD(r1, 0x541b, &(0x7f0000000100)) dup2(r1, r3) 2018/04/13 21:33:36 executing program 1: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000040)={'syz_tun\x00', 0x0}) setsockopt$packet_add_memb(r0, 0x107, 0x1, &(0x7f0000000180)={r1, 0x1, 0x3, @link_local={0x1, 0x80, 0xc2}}, 0x10) setsockopt$packet_drop_memb(r0, 0x107, 0x2, &(0x7f0000000000)={r1, 0x1, 0x6}, 0x10) 2018/04/13 21:33:36 executing program 3: syz_open_procfs(0x0, &(0x7f0000000080)='net/sockstat6\x00') r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_CHECK_EXTENSION_VM(r1, 0xae03, 0x3) 2018/04/13 21:33:36 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_VCPU_EVENTS(r2, 0x4040aea0, &(0x7f0000000000)={0xea, 0x2}) [ 297.293483] device syz_tun entered promiscuous mode 2018/04/13 21:33:36 executing program 3: syz_open_procfs(0x0, &(0x7f0000000080)='net/sockstat6\x00') r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_CHECK_EXTENSION_VM(r1, 0xae03, 0x3) 2018/04/13 21:33:36 executing program 1: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000040)={'syz_tun\x00', 0x0}) setsockopt$packet_add_memb(r0, 0x107, 0x1, &(0x7f0000000180)={r1, 0x1, 0x3, @link_local={0x1, 0x80, 0xc2}}, 0x10) setsockopt$packet_drop_memb(r0, 0x107, 0x2, &(0x7f0000000000)={r1, 0x1, 0x6}, 0x10) 2018/04/13 21:33:36 executing program 4: r0 = semget$private(0x0, 0x5, 0x0) semop(r0, &(0x7f000002efe2)=[{0x0, 0x6}], 0x1) semop(r0, &(0x7f000001a000)=[{}], 0x1) semctl$IPC_RMID(r0, 0x0, 0x0) [ 297.342916] device syz_tun left promiscuous mode 2018/04/13 21:33:36 executing program 3: syz_open_procfs(0x0, &(0x7f0000000080)='net/sockstat6\x00') r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_CHECK_EXTENSION_VM(r1, 0xae03, 0x3) [ 297.389971] device syz_tun entered promiscuous mode 2018/04/13 21:33:37 executing program 1: mmap$binder(&(0x7f0000001000/0x4000)=nil, 0x4000, 0x2, 0x100000002132, 0xffffffffffffffff, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_init_net_socket$bt_l2cap(0x1f, 0x5, 0x0) mmap(&(0x7f0000000000/0x4000)=nil, 0x4000, 0x0, 0xc812, r0, 0x0) getsockopt$bt_BT_CHANNEL_POLICY(r1, 0x112, 0xa, &(0x7f0000000140), &(0x7f0000000180)=0x4) [ 297.429568] device syz_tun left promiscuous mode 2018/04/13 21:33:37 executing program 3: syz_open_procfs(0x0, &(0x7f0000000080)='net/sockstat6\x00') r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_CHECK_EXTENSION_VM(r1, 0xae03, 0x3) 2018/04/13 21:33:37 executing program 1: mmap$binder(&(0x7f0000001000/0x4000)=nil, 0x4000, 0x2, 0x100000002132, 0xffffffffffffffff, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_init_net_socket$bt_l2cap(0x1f, 0x5, 0x0) mmap(&(0x7f0000000000/0x4000)=nil, 0x4000, 0x0, 0xc812, r0, 0x0) getsockopt$bt_BT_CHANNEL_POLICY(r1, 0x112, 0xa, &(0x7f0000000140), &(0x7f0000000180)=0x4) 2018/04/13 21:33:37 executing program 1: mmap$binder(&(0x7f0000001000/0x4000)=nil, 0x4000, 0x2, 0x100000002132, 0xffffffffffffffff, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_init_net_socket$bt_l2cap(0x1f, 0x5, 0x0) mmap(&(0x7f0000000000/0x4000)=nil, 0x4000, 0x0, 0xc812, r0, 0x0) getsockopt$bt_BT_CHANNEL_POLICY(r1, 0x112, 0xa, &(0x7f0000000140), &(0x7f0000000180)=0x4) 2018/04/13 21:33:37 executing program 2: bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000040)={0xffffffffffffffff, &(0x7f00000000c0)="b82283392dc50ff1fb635a5849d2f5916ae2fdc24e95e12aa8daccf7393e72be9cc66f"}, 0x10) syz_open_dev$loop(&(0x7f0000000000)='/dev/loop#\x00', 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000346fd4)={0x0, 0x0, 0x0, 0x1000000000000004, 0x202}, 0x2c) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x1, 0x5, &(0x7f0000346fc8)=@framed={{0x18}, [@alu={0x8000000201a7f19, 0x0, 0x7, 0x0, 0x1}], {0x95}}, &(0x7f0000f6bffb)='GPL\x00', 0x0, 0x299, &(0x7f00001a7f05)=""/251}, 0x18) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000140)={r0, 0x50, &(0x7f00000000c0)}, 0x10) socketpair$inet_icmp(0x13, 0x1265, 0x6f2000, &(0x7f00000003c0)) 2018/04/13 21:33:37 executing program 7: r0 = getpgid(0x0) sched_setaffinity(r0, 0x8, &(0x7f00009ad000)=0x1) pipe2(&(0x7f0000f61000)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4800) mmap(&(0x7f0000011000/0x2000)=nil, 0x2000, 0x1, 0x32, 0xffffffffffffffff, 0x0) r3 = userfaultfd(0x0) ioctl$UFFDIO_API(r3, 0xc018aa3f, &(0x7f0000bc8000)={0xaa}) ioctl$UFFDIO_REGISTER(r3, 0xc020aa00, &(0x7f0000d62fe0)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) write$sndseq(r2, &(0x7f0000011fd2)=[{0x0, 0x0, 0x0, 0x0, @time, {}, {}, @time=@time={0x77359400}}], 0x1c) read(r1, &(0x7f0000000000)=""/126, 0x7e) ioctl$FIONREAD(r1, 0x541b, &(0x7f0000000100)) dup2(r1, r3) 2018/04/13 21:33:37 executing program 5: r0 = getpgid(0x0) sched_setaffinity(r0, 0x8, &(0x7f00009ad000)=0x1) pipe2(&(0x7f0000f61000)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4800) mmap(&(0x7f0000011000/0x2000)=nil, 0x2000, 0x1, 0x32, 0xffffffffffffffff, 0x0) r3 = userfaultfd(0x0) ioctl$UFFDIO_API(r3, 0xc018aa3f, &(0x7f0000bc8000)={0xaa}) ioctl$UFFDIO_REGISTER(r3, 0xc020aa00, &(0x7f0000d62fe0)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) write$sndseq(r2, &(0x7f0000011fd2)=[{0x0, 0x0, 0x0, 0x0, @time, {}, {}, @time=@time={0x77359400}}], 0x1c) read(r1, &(0x7f0000000000)=""/126, 0x7e) ioctl$FIONREAD(r1, 0x541b, &(0x7f0000000100)) dup2(r1, r3) 2018/04/13 21:33:37 executing program 0: r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r0, &(0x7f00004c0000)={0xa, 0x4e23, 0x0, @ipv4={[], [0xff, 0xff]}}, 0x1c) listen(r0, 0x43) setsockopt$inet_sctp6_SCTP_RTOINFO(r0, 0x84, 0x0, &(0x7f0000000100)={0x0, 0x1}, 0x10) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffff9c, 0x89e2, &(0x7f0000000000)={0xffffffffffffff9c}) bind$inet(0xffffffffffffffff, &(0x7f00000000c0)={0x2, 0x4e22, @rand_addr=0x396aa24c}, 0x10) r2 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r2, &(0x7f00001edff0)={0x2, 0x0, @multicast1=0xe0000001}, 0x10) setsockopt$inet_opts(r2, 0x0, 0x4, &(0x7f0000aa8000)="070a0722084fff", 0x7) connect$inet(r2, &(0x7f0000000080)={0x2, 0x0, @loopback=0x7f000001}, 0x10) readv(0xffffffffffffffff, &(0x7f0000001280)=[{&(0x7f0000001180)=""/249, 0xf9}], 0x1) getsockopt$inet_sctp6_SCTP_DELAYED_SACK(r1, 0x84, 0x10, &(0x7f0000000340)=@assoc_value={0x0, 0x800}, &(0x7f0000000400)=0x8) setsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER_VALUE(r0, 0x84, 0x7c, &(0x7f0000000440)={r3, 0x1, 0x8000}, 0x8) getsockopt$inet_sctp_SCTP_GET_LOCAL_ADDRS(0xffffffffffffffff, 0x84, 0x6d, &(0x7f0000000040)=ANY=[@ANYRES32=0x0], &(0x7f0000000180)=0x1) getsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x22, &(0x7f00000001c0)={{{@in=@local, @in=@multicast1}}, {{@in=@broadcast}, 0x0, @in=@local}}, &(0x7f0000000140)=0xe8) prctl$getreaper(0x1b, &(0x7f00000004c0)) recvfrom$inet(r2, &(0x7f0000000380)=""/116, 0xffffffffffffff47, 0x20, &(0x7f00000002c0)={0x2, 0x84e22, @dev={0xac, 0x14, 0x14, 0x17}}, 0xc) r4 = socket$inet6_sctp(0xa, 0x4000000000000001, 0x84) sendto$inet6(r4, &(0x7f000087dffe)='F', 0x1, 0x0, &(0x7f000005ffe4)={0xa, 0x4e23, 0x0, @loopback={0x0, 0x1}}, 0x1c) sendmsg$netlink(r4, &(0x7f00009f3fc8)={0x0, 0x0, &(0x7f000070f000)=[{&(0x7f0000000480)=ANY=[@ANYBLOB="00000000000000000330f85849ff64dbad369a38d9a6964886343cf2bd5205154ed85feaa3cc08e4be1a25ae18eabd56"], 0x1}], 0x1, &(0x7f0000414000)}, 0x0) 2018/04/13 21:33:37 executing program 4: r0 = semget$private(0x0, 0x5, 0x0) semop(r0, &(0x7f000002efe2)=[{0x0, 0x6}], 0x1) semop(r0, &(0x7f000001a000)=[{}], 0x1) semctl$IPC_RMID(r0, 0x0, 0x0) 2018/04/13 21:33:37 executing program 3: r0 = memfd_create(&(0x7f0000000140)='dev ', 0x0) write(r0, &(0x7f0000000040)="164690f91220", 0x6) sendfile(r0, r0, &(0x7f0000001000), 0xffff) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x4, 0x11, r0, 0x0) nanosleep(&(0x7f0000000000), &(0x7f0000000080)) 2018/04/13 21:33:37 executing program 6: mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x3, 0x32, 0xffffffffffffffff, 0x0) r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x4e20, 0xb9, @remote={0xfe, 0x80, [], 0xbb}}, 0x1c) r1 = socket$inet6_udp(0xa, 0x2, 0x0) r2 = socket$l2tp(0x18, 0x1, 0x1) connect$inet6(r1, &(0x7f00000000c0)={0xa, 0x10000004e20, 0x0, @mcast2={0xff, 0x2, [], 0x1}, 0xa}, 0x1c) connect$l2tp(r2, &(0x7f00005fafd2)=@pppol2tpv3={0x18, 0x1, {0x0, r1, {0x2, 0x4e21, @multicast2=0xe0000002}, 0x4, 0x0, 0x2}}, 0x2e) sendmsg$nl_crypto(r2, &(0x7f000037ffc8)={&(0x7f00009dd000)={0x10, 0x0, 0x0, 0x2}, 0xc, &(0x7f00002ceff0)={&(0x7f000097b000)=@delrng={0x10, 0x14, 0x200, 0x1, 0x3}, 0xfff1}, 0x1, 0x0, 0x0, 0x8820}, 0x81) 2018/04/13 21:33:37 executing program 1: mmap$binder(&(0x7f0000001000/0x4000)=nil, 0x4000, 0x2, 0x100000002132, 0xffffffffffffffff, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_init_net_socket$bt_l2cap(0x1f, 0x5, 0x0) mmap(&(0x7f0000000000/0x4000)=nil, 0x4000, 0x0, 0xc812, r0, 0x0) getsockopt$bt_BT_CHANNEL_POLICY(r1, 0x112, 0xa, &(0x7f0000000140), &(0x7f0000000180)=0x4) 2018/04/13 21:33:37 executing program 1: r0 = syz_open_dev$evdev(&(0x7f0000000340)='/dev/input/event#\x00', 0x0, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$TIOCSBRK(r1, 0x40284504) 2018/04/13 21:33:38 executing program 6: mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x3, 0x32, 0xffffffffffffffff, 0x0) r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x4e20, 0xb9, @remote={0xfe, 0x80, [], 0xbb}}, 0x1c) r1 = socket$inet6_udp(0xa, 0x2, 0x0) r2 = socket$l2tp(0x18, 0x1, 0x1) connect$inet6(r1, &(0x7f00000000c0)={0xa, 0x10000004e20, 0x0, @mcast2={0xff, 0x2, [], 0x1}, 0xa}, 0x1c) connect$l2tp(r2, &(0x7f00005fafd2)=@pppol2tpv3={0x18, 0x1, {0x0, r1, {0x2, 0x4e21, @multicast2=0xe0000002}, 0x4, 0x0, 0x2}}, 0x2e) sendmsg$nl_crypto(r2, &(0x7f000037ffc8)={&(0x7f00009dd000)={0x10, 0x0, 0x0, 0x2}, 0xc, &(0x7f00002ceff0)={&(0x7f000097b000)=@delrng={0x10, 0x14, 0x200, 0x1, 0x3}, 0xfff1}, 0x1, 0x0, 0x0, 0x8820}, 0x81) 2018/04/13 21:33:38 executing program 1: r0 = syz_open_dev$evdev(&(0x7f0000000340)='/dev/input/event#\x00', 0x0, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$TIOCSBRK(r1, 0x40284504) 2018/04/13 21:33:38 executing program 2: r0 = memfd_create(&(0x7f0000000000)="5b80f2feffffff", 0x7) fcntl$addseals(r0, 0x409, 0x6) fallocate(r0, 0x0, 0x0, 0x2) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) 2018/04/13 21:33:38 executing program 6: mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x3, 0x32, 0xffffffffffffffff, 0x0) r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x4e20, 0xb9, @remote={0xfe, 0x80, [], 0xbb}}, 0x1c) r1 = socket$inet6_udp(0xa, 0x2, 0x0) r2 = socket$l2tp(0x18, 0x1, 0x1) connect$inet6(r1, &(0x7f00000000c0)={0xa, 0x10000004e20, 0x0, @mcast2={0xff, 0x2, [], 0x1}, 0xa}, 0x1c) connect$l2tp(r2, &(0x7f00005fafd2)=@pppol2tpv3={0x18, 0x1, {0x0, r1, {0x2, 0x4e21, @multicast2=0xe0000002}, 0x4, 0x0, 0x2}}, 0x2e) sendmsg$nl_crypto(r2, &(0x7f000037ffc8)={&(0x7f00009dd000)={0x10, 0x0, 0x0, 0x2}, 0xc, &(0x7f00002ceff0)={&(0x7f000097b000)=@delrng={0x10, 0x14, 0x200, 0x1, 0x3}, 0xfff1}, 0x1, 0x0, 0x0, 0x8820}, 0x81) 2018/04/13 21:33:38 executing program 1: r0 = syz_open_dev$evdev(&(0x7f0000000340)='/dev/input/event#\x00', 0x0, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$TIOCSBRK(r1, 0x40284504) 2018/04/13 21:33:38 executing program 3: r0 = memfd_create(&(0x7f0000000140)='dev ', 0x0) write(r0, &(0x7f0000000040)="164690f91220", 0x6) sendfile(r0, r0, &(0x7f0000001000), 0xffff) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x4, 0x11, r0, 0x0) nanosleep(&(0x7f0000000000), &(0x7f0000000080)) 2018/04/13 21:33:38 executing program 4: r0 = semget$private(0x0, 0x5, 0x0) semop(r0, &(0x7f000002efe2)=[{0x0, 0x6}], 0x1) semop(r0, &(0x7f000001a000)=[{}], 0x1) semctl$IPC_RMID(r0, 0x0, 0x0) 2018/04/13 21:33:38 executing program 7: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00003e0000)='/dev/ptmx\x00', 0x0, 0x0) perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f00000000c0)) r1 = syz_open_pts(r0, 0x0) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000fdd000)=0x3) ioctl$PIO_UNISCRNMAP(r1, 0x80047456, &(0x7f0000000280)) 2018/04/13 21:33:38 executing program 0: r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r0, &(0x7f00004c0000)={0xa, 0x4e23, 0x0, @ipv4={[], [0xff, 0xff]}}, 0x1c) listen(r0, 0x43) setsockopt$inet_sctp6_SCTP_RTOINFO(r0, 0x84, 0x0, &(0x7f0000000100)={0x0, 0x1}, 0x10) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffff9c, 0x89e2, &(0x7f0000000000)={0xffffffffffffff9c}) bind$inet(0xffffffffffffffff, &(0x7f00000000c0)={0x2, 0x4e22, @rand_addr=0x396aa24c}, 0x10) r2 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r2, &(0x7f00001edff0)={0x2, 0x0, @multicast1=0xe0000001}, 0x10) setsockopt$inet_opts(r2, 0x0, 0x4, &(0x7f0000aa8000)="070a0722084fff", 0x7) connect$inet(r2, &(0x7f0000000080)={0x2, 0x0, @loopback=0x7f000001}, 0x10) readv(0xffffffffffffffff, &(0x7f0000001280)=[{&(0x7f0000001180)=""/249, 0xf9}], 0x1) getsockopt$inet_sctp6_SCTP_DELAYED_SACK(r1, 0x84, 0x10, &(0x7f0000000340)=@assoc_value={0x0, 0x800}, &(0x7f0000000400)=0x8) setsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER_VALUE(r0, 0x84, 0x7c, &(0x7f0000000440)={r3, 0x1, 0x8000}, 0x8) getsockopt$inet_sctp_SCTP_GET_LOCAL_ADDRS(0xffffffffffffffff, 0x84, 0x6d, &(0x7f0000000040)=ANY=[@ANYRES32=0x0], &(0x7f0000000180)=0x1) getsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x22, &(0x7f00000001c0)={{{@in=@local, @in=@multicast1}}, {{@in=@broadcast}, 0x0, @in=@local}}, &(0x7f0000000140)=0xe8) prctl$getreaper(0x1b, &(0x7f00000004c0)) recvfrom$inet(r2, &(0x7f0000000380)=""/116, 0xffffffffffffff47, 0x20, &(0x7f00000002c0)={0x2, 0x84e22, @dev={0xac, 0x14, 0x14, 0x17}}, 0xc) r4 = socket$inet6_sctp(0xa, 0x4000000000000001, 0x84) sendto$inet6(r4, &(0x7f000087dffe)='F', 0x1, 0x0, &(0x7f000005ffe4)={0xa, 0x4e23, 0x0, @loopback={0x0, 0x1}}, 0x1c) sendmsg$netlink(r4, &(0x7f00009f3fc8)={0x0, 0x0, &(0x7f000070f000)=[{&(0x7f0000000480)=ANY=[@ANYBLOB="00000000000000000330f85849ff64dbad369a38d9a6964886343cf2bd5205154ed85feaa3cc08e4be1a25ae18eabd56"], 0x1}], 0x1, &(0x7f0000414000)}, 0x0) 2018/04/13 21:33:38 executing program 5: r0 = syz_open_dev$loop(&(0x7f0000cceff5)='/dev/loop#\x00', 0x0, 0x0) ioctl$LOOP_GET_STATUS(r0, 0x1264, &(0x7f0000000000)) 2018/04/13 21:33:39 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000577fc8)={&(0x7f000026cff4)={0x10}, 0xc, &(0x7f0000577000)={&(0x7f000057ad74)=@newsa={0x13c, 0x10, 0x1, 0x0, 0x0, {{@in6=@ipv4={[], [0xff, 0xff], @local={0xac, 0x14, 0xffffffffffffffff, 0xaa}}, @in6=@mcast2={0xff, 0x2, [], 0x1}}, {@in6=@mcast2={0xff, 0x2, [], 0x1}, 0x0, 0x32}, @in6, {}, {}, {}, 0x0, 0x0, 0xa}, [@algo_aead={0x4c, 0x12, {{'rfc4106%gcm(aes))\x00'}, 0x0, 0x80}}]}, 0x13c}, 0x1}, 0x0) 2018/04/13 21:33:39 executing program 2: r0 = memfd_create(&(0x7f0000000000)="5b80f2feffffff", 0x7) fcntl$addseals(r0, 0x409, 0x6) fallocate(r0, 0x0, 0x0, 0x2) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) 2018/04/13 21:33:39 executing program 1: r0 = syz_open_dev$evdev(&(0x7f0000000340)='/dev/input/event#\x00', 0x0, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$TIOCSBRK(r1, 0x40284504) 2018/04/13 21:33:39 executing program 6: mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x3, 0x32, 0xffffffffffffffff, 0x0) r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x4e20, 0xb9, @remote={0xfe, 0x80, [], 0xbb}}, 0x1c) r1 = socket$inet6_udp(0xa, 0x2, 0x0) r2 = socket$l2tp(0x18, 0x1, 0x1) connect$inet6(r1, &(0x7f00000000c0)={0xa, 0x10000004e20, 0x0, @mcast2={0xff, 0x2, [], 0x1}, 0xa}, 0x1c) connect$l2tp(r2, &(0x7f00005fafd2)=@pppol2tpv3={0x18, 0x1, {0x0, r1, {0x2, 0x4e21, @multicast2=0xe0000002}, 0x4, 0x0, 0x2}}, 0x2e) sendmsg$nl_crypto(r2, &(0x7f000037ffc8)={&(0x7f00009dd000)={0x10, 0x0, 0x0, 0x2}, 0xc, &(0x7f00002ceff0)={&(0x7f000097b000)=@delrng={0x10, 0x14, 0x200, 0x1, 0x3}, 0xfff1}, 0x1, 0x0, 0x0, 0x8820}, 0x81) 2018/04/13 21:33:39 executing program 7: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00003e0000)='/dev/ptmx\x00', 0x0, 0x0) perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f00000000c0)) r1 = syz_open_pts(r0, 0x0) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000fdd000)=0x3) ioctl$PIO_UNISCRNMAP(r1, 0x80047456, &(0x7f0000000280)) 2018/04/13 21:33:39 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000577fc8)={&(0x7f000026cff4)={0x10}, 0xc, &(0x7f0000577000)={&(0x7f000057ad74)=@newsa={0x13c, 0x10, 0x1, 0x0, 0x0, {{@in6=@ipv4={[], [0xff, 0xff], @local={0xac, 0x14, 0xffffffffffffffff, 0xaa}}, @in6=@mcast2={0xff, 0x2, [], 0x1}}, {@in6=@mcast2={0xff, 0x2, [], 0x1}, 0x0, 0x32}, @in6, {}, {}, {}, 0x0, 0x0, 0xa}, [@algo_aead={0x4c, 0x12, {{'rfc4106%gcm(aes))\x00'}, 0x0, 0x80}}]}, 0x13c}, 0x1}, 0x0) 2018/04/13 21:33:39 executing program 2: r0 = memfd_create(&(0x7f0000000000)="5b80f2feffffff", 0x7) fcntl$addseals(r0, 0x409, 0x6) fallocate(r0, 0x0, 0x0, 0x2) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) 2018/04/13 21:33:39 executing program 1: r0 = getpgid(0x0) sched_setattr(r0, &(0x7f0000000000)={0x0, 0x1, 0x0, 0x0, 0x3}, 0x0) mkdir(&(0x7f000082f000)='./control\x00', 0x0) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x1, 0x32, 0xffffffffffffffff, 0x0) r1 = userfaultfd(0x0) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000e4c000)={0xaa}) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000043fe0)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r2 = creat(&(0x7f0000000000)='./control/file0\x00', 0x0) write$sndseq(r2, &(0x7f0000011fd2)=[{0x0, 0x0, 0x0, 0x0, @time, {}, {}, @time=@time={0x77359400}}], 0x30) fcntl$F_SET_RW_HINT(r2, 0x40c, &(0x7f0000000040)) unlink(&(0x7f0000f86000)='./control/file0\x00') close(r1) 2018/04/13 21:33:39 executing program 6: r0 = socket$inet_sctp(0x2, 0x5, 0x84) ioctl$int_out(r0, 0x2, &(0x7f00000002c0)) r1 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$int_out(r1, 0x0, &(0x7f0000000000)) getpeername(r1, &(0x7f0000000300)=@llc={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @dev}, &(0x7f0000000380)=0x80) getsockopt$inet_tcp_int(r1, 0x6, 0xa, &(0x7f0000000080), &(0x7f0000000040)=0x4) r2 = syz_open_dev$audion(&(0x7f00000000c0)='/dev/audio#\x00', 0x5, 0x2a00) getsockopt$inet_sctp_SCTP_GET_ASSOC_STATS(0xffffffffffffff9c, 0x84, 0x70, &(0x7f0000000100)={0x0, @in={{0x2, 0x4e23, @multicast1=0xe0000001}}, [0x0, 0x4e2, 0x6, 0xfff, 0x1, 0x9, 0x0, 0xfffffffffffffeff, 0x1, 0x1000, 0x7f57, 0x8, 0x8, 0x101]}, &(0x7f0000000200)=0x100) getsockopt$inet_sctp_SCTP_STREAM_SCHEDULER(r2, 0x84, 0x7b, &(0x7f0000000240)={r3, 0x6}, &(0x7f0000000280)=0x8) 2018/04/13 21:33:39 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_int(r0, 0x29, 0x4b, &(0x7f0000503000)=0x12, 0x4) bind$inet6(r0, &(0x7f00003b0fe4)={0xa, 0x0, 0x0, @ipv4={[], [0xff, 0xff]}}, 0x1c) 2018/04/13 21:33:39 executing program 3: r0 = memfd_create(&(0x7f0000000140)='dev ', 0x0) write(r0, &(0x7f0000000040)="164690f91220", 0x6) sendfile(r0, r0, &(0x7f0000001000), 0xffff) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x4, 0x11, r0, 0x0) nanosleep(&(0x7f0000000000), &(0x7f0000000080)) 2018/04/13 21:33:39 executing program 4: r0 = semget$private(0x0, 0x5, 0x0) semop(r0, &(0x7f000002efe2)=[{0x0, 0x6}], 0x1) semop(r0, &(0x7f000001a000)=[{}], 0x1) semctl$IPC_RMID(r0, 0x0, 0x0) 2018/04/13 21:33:40 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_int(r0, 0x29, 0x4b, &(0x7f0000503000)=0x12, 0x4) bind$inet6(r0, &(0x7f00003b0fe4)={0xa, 0x0, 0x0, @ipv4={[], [0xff, 0xff]}}, 0x1c) 2018/04/13 21:33:40 executing program 2: r0 = memfd_create(&(0x7f0000000000)="5b80f2feffffff", 0x7) fcntl$addseals(r0, 0x409, 0x6) fallocate(r0, 0x0, 0x0, 0x2) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) 2018/04/13 21:33:40 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000577fc8)={&(0x7f000026cff4)={0x10}, 0xc, &(0x7f0000577000)={&(0x7f000057ad74)=@newsa={0x13c, 0x10, 0x1, 0x0, 0x0, {{@in6=@ipv4={[], [0xff, 0xff], @local={0xac, 0x14, 0xffffffffffffffff, 0xaa}}, @in6=@mcast2={0xff, 0x2, [], 0x1}}, {@in6=@mcast2={0xff, 0x2, [], 0x1}, 0x0, 0x32}, @in6, {}, {}, {}, 0x0, 0x0, 0xa}, [@algo_aead={0x4c, 0x12, {{'rfc4106%gcm(aes))\x00'}, 0x0, 0x80}}]}, 0x13c}, 0x1}, 0x0) 2018/04/13 21:33:40 executing program 7: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00003e0000)='/dev/ptmx\x00', 0x0, 0x0) perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f00000000c0)) r1 = syz_open_pts(r0, 0x0) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000fdd000)=0x3) ioctl$PIO_UNISCRNMAP(r1, 0x80047456, &(0x7f0000000280)) 2018/04/13 21:33:40 executing program 6: r0 = socket$inet_sctp(0x2, 0x5, 0x84) ioctl$int_out(r0, 0x2, &(0x7f00000002c0)) r1 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$int_out(r1, 0x0, &(0x7f0000000000)) getpeername(r1, &(0x7f0000000300)=@llc={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @dev}, &(0x7f0000000380)=0x80) getsockopt$inet_tcp_int(r1, 0x6, 0xa, &(0x7f0000000080), &(0x7f0000000040)=0x4) r2 = syz_open_dev$audion(&(0x7f00000000c0)='/dev/audio#\x00', 0x5, 0x2a00) getsockopt$inet_sctp_SCTP_GET_ASSOC_STATS(0xffffffffffffff9c, 0x84, 0x70, &(0x7f0000000100)={0x0, @in={{0x2, 0x4e23, @multicast1=0xe0000001}}, [0x0, 0x4e2, 0x6, 0xfff, 0x1, 0x9, 0x0, 0xfffffffffffffeff, 0x1, 0x1000, 0x7f57, 0x8, 0x8, 0x101]}, &(0x7f0000000200)=0x100) getsockopt$inet_sctp_SCTP_STREAM_SCHEDULER(r2, 0x84, 0x7b, &(0x7f0000000240)={r3, 0x6}, &(0x7f0000000280)=0x8) 2018/04/13 21:33:40 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_int(r0, 0x29, 0x4b, &(0x7f0000503000)=0x12, 0x4) bind$inet6(r0, &(0x7f00003b0fe4)={0xa, 0x0, 0x0, @ipv4={[], [0xff, 0xff]}}, 0x1c) 2018/04/13 21:33:40 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000577fc8)={&(0x7f000026cff4)={0x10}, 0xc, &(0x7f0000577000)={&(0x7f000057ad74)=@newsa={0x13c, 0x10, 0x1, 0x0, 0x0, {{@in6=@ipv4={[], [0xff, 0xff], @local={0xac, 0x14, 0xffffffffffffffff, 0xaa}}, @in6=@mcast2={0xff, 0x2, [], 0x1}}, {@in6=@mcast2={0xff, 0x2, [], 0x1}, 0x0, 0x32}, @in6, {}, {}, {}, 0x0, 0x0, 0xa}, [@algo_aead={0x4c, 0x12, {{'rfc4106%gcm(aes))\x00'}, 0x0, 0x80}}]}, 0x13c}, 0x1}, 0x0) 2018/04/13 21:33:40 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000b5dfa8)={0x26, 'hash\x00', 0x0, 0x0, 'rmd320-generic\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) r2 = open(&(0x7f00004b8ff8)='./file0\x00', 0x28042, 0x0) fallocate(r2, 0x0, 0x0, 0x7f) sendfile(r1, r2, &(0x7f0000e64ff8), 0x6) 2018/04/13 21:33:40 executing program 6: r0 = socket$inet_sctp(0x2, 0x5, 0x84) ioctl$int_out(r0, 0x2, &(0x7f00000002c0)) r1 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$int_out(r1, 0x0, &(0x7f0000000000)) getpeername(r1, &(0x7f0000000300)=@llc={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @dev}, &(0x7f0000000380)=0x80) getsockopt$inet_tcp_int(r1, 0x6, 0xa, &(0x7f0000000080), &(0x7f0000000040)=0x4) r2 = syz_open_dev$audion(&(0x7f00000000c0)='/dev/audio#\x00', 0x5, 0x2a00) getsockopt$inet_sctp_SCTP_GET_ASSOC_STATS(0xffffffffffffff9c, 0x84, 0x70, &(0x7f0000000100)={0x0, @in={{0x2, 0x4e23, @multicast1=0xe0000001}}, [0x0, 0x4e2, 0x6, 0xfff, 0x1, 0x9, 0x0, 0xfffffffffffffeff, 0x1, 0x1000, 0x7f57, 0x8, 0x8, 0x101]}, &(0x7f0000000200)=0x100) getsockopt$inet_sctp_SCTP_STREAM_SCHEDULER(r2, 0x84, 0x7b, &(0x7f0000000240)={r3, 0x6}, &(0x7f0000000280)=0x8) 2018/04/13 21:33:40 executing program 7: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00003e0000)='/dev/ptmx\x00', 0x0, 0x0) perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f00000000c0)) r1 = syz_open_pts(r0, 0x0) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000fdd000)=0x3) ioctl$PIO_UNISCRNMAP(r1, 0x80047456, &(0x7f0000000280)) 2018/04/13 21:33:40 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_int(r0, 0x29, 0x4b, &(0x7f0000503000)=0x12, 0x4) bind$inet6(r0, &(0x7f00003b0fe4)={0xa, 0x0, 0x0, @ipv4={[], [0xff, 0xff]}}, 0x1c) 2018/04/13 21:33:40 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_int(r0, 0x29, 0x4b, &(0x7f0000503000)=0x12, 0x4) bind$inet6(r0, &(0x7f00003b0fe4)={0xa, 0x0, 0x0, @ipv4={[], [0xff, 0xff]}}, 0x1c) 2018/04/13 21:33:40 executing program 3: r0 = memfd_create(&(0x7f0000000140)='dev ', 0x0) write(r0, &(0x7f0000000040)="164690f91220", 0x6) sendfile(r0, r0, &(0x7f0000001000), 0xffff) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x4, 0x11, r0, 0x0) nanosleep(&(0x7f0000000000), &(0x7f0000000080)) 2018/04/13 21:33:40 executing program 1: r0 = getpgid(0x0) sched_setattr(r0, &(0x7f0000000000)={0x0, 0x1, 0x0, 0x0, 0x3}, 0x0) mkdir(&(0x7f000082f000)='./control\x00', 0x0) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x1, 0x32, 0xffffffffffffffff, 0x0) r1 = userfaultfd(0x0) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000e4c000)={0xaa}) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000043fe0)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r2 = creat(&(0x7f0000000000)='./control/file0\x00', 0x0) write$sndseq(r2, &(0x7f0000011fd2)=[{0x0, 0x0, 0x0, 0x0, @time, {}, {}, @time=@time={0x77359400}}], 0x30) fcntl$F_SET_RW_HINT(r2, 0x40c, &(0x7f0000000040)) unlink(&(0x7f0000f86000)='./control/file0\x00') close(r1) 2018/04/13 21:33:40 executing program 2: r0 = syz_open_dev$tun(&(0x7f0000000280)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f00000000c0)={"d202b999cf85000000000088f301e710", 0x102}) r1 = syz_open_dev$tun(&(0x7f0000000280)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETOWNER(r0, 0x400454cc, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f00000000c0)={"d202b999cf85000000000088f301e710", 0x102}) 2018/04/13 21:33:40 executing program 6: r0 = socket$inet_sctp(0x2, 0x5, 0x84) ioctl$int_out(r0, 0x2, &(0x7f00000002c0)) r1 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$int_out(r1, 0x0, &(0x7f0000000000)) getpeername(r1, &(0x7f0000000300)=@llc={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @dev}, &(0x7f0000000380)=0x80) getsockopt$inet_tcp_int(r1, 0x6, 0xa, &(0x7f0000000080), &(0x7f0000000040)=0x4) r2 = syz_open_dev$audion(&(0x7f00000000c0)='/dev/audio#\x00', 0x5, 0x2a00) getsockopt$inet_sctp_SCTP_GET_ASSOC_STATS(0xffffffffffffff9c, 0x84, 0x70, &(0x7f0000000100)={0x0, @in={{0x2, 0x4e23, @multicast1=0xe0000001}}, [0x0, 0x4e2, 0x6, 0xfff, 0x1, 0x9, 0x0, 0xfffffffffffffeff, 0x1, 0x1000, 0x7f57, 0x8, 0x8, 0x101]}, &(0x7f0000000200)=0x100) getsockopt$inet_sctp_SCTP_STREAM_SCHEDULER(r2, 0x84, 0x7b, &(0x7f0000000240)={r3, 0x6}, &(0x7f0000000280)=0x8) 2018/04/13 21:33:40 executing program 0: r0 = userfaultfd(0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000000040)={0xaa, 0xa}) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000911000)={{&(0x7f0000004000/0x1000)=nil, 0x1000}, 0x1}) readv(r0, &(0x7f00000002c0)=[{&(0x7f0000000500)=""/150, 0x96}], 0x1) clone(0x0, &(0x7f0000001f37), &(0x7f0000001ffc), &(0x7f0000001000), &(0x7f0000001000)) 2018/04/13 21:33:40 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_int(r0, 0x29, 0x4b, &(0x7f0000503000)=0x12, 0x4) bind$inet6(r0, &(0x7f00003b0fe4)={0xa, 0x0, 0x0, @ipv4={[], [0xff, 0xff]}}, 0x1c) 2018/04/13 21:33:40 executing program 7: r0 = socket$inet6(0xa, 0x1, 0x8010000400000084) bind$inet6(r0, &(0x7f0000ed3fe4)={0xa, 0x4e20, 0x0, @loopback={0x0, 0x1}}, 0x1c) sendto$inet6(r0, &(0x7f0000925000)="e0", 0x1, 0x0, &(0x7f0000bb6000)={0xa, 0x4e20, 0x0, @loopback={0x0, 0x1}}, 0x1c) ioctl$sock_inet6_tcp_SIOCINQ(r0, 0x541b, &(0x7f0000000500)) 2018/04/13 21:33:41 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000b5dfa8)={0x26, 'hash\x00', 0x0, 0x0, 'rmd320-generic\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) r2 = open(&(0x7f00004b8ff8)='./file0\x00', 0x28042, 0x0) fallocate(r2, 0x0, 0x0, 0x7f) sendfile(r1, r2, &(0x7f0000e64ff8), 0x6) 2018/04/13 21:33:41 executing program 2: r0 = syz_open_dev$tun(&(0x7f0000000280)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f00000000c0)={"d202b999cf85000000000088f301e710", 0x102}) r1 = syz_open_dev$tun(&(0x7f0000000280)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETOWNER(r0, 0x400454cc, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f00000000c0)={"d202b999cf85000000000088f301e710", 0x102}) 2018/04/13 21:33:41 executing program 6: r0 = syz_open_dev$tun(&(0x7f0000000280)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f00000000c0)={"d202b999cf85000000000088f301e710", 0x102}) r1 = syz_open_dev$tun(&(0x7f0000000280)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETOWNER(r0, 0x400454cc, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f00000000c0)={"d202b999cf85000000000088f301e710", 0x102}) 2018/04/13 21:33:41 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_int(r0, 0x29, 0x4b, &(0x7f0000503000)=0x12, 0x4) bind$inet6(r0, &(0x7f00003b0fe4)={0xa, 0x0, 0x0, @ipv4={[], [0xff, 0xff]}}, 0x1c) 2018/04/13 21:33:41 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000b5dfa8)={0x26, 'hash\x00', 0x0, 0x0, 'rmd320-generic\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) r2 = open(&(0x7f00004b8ff8)='./file0\x00', 0x28042, 0x0) fallocate(r2, 0x0, 0x0, 0x7f) sendfile(r1, r2, &(0x7f0000e64ff8), 0x6) 2018/04/13 21:33:41 executing program 2: r0 = syz_open_dev$tun(&(0x7f0000000280)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f00000000c0)={"d202b999cf85000000000088f301e710", 0x102}) r1 = syz_open_dev$tun(&(0x7f0000000280)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETOWNER(r0, 0x400454cc, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f00000000c0)={"d202b999cf85000000000088f301e710", 0x102}) 2018/04/13 21:33:41 executing program 6: r0 = syz_open_dev$tun(&(0x7f0000000280)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f00000000c0)={"d202b999cf85000000000088f301e710", 0x102}) r1 = syz_open_dev$tun(&(0x7f0000000280)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETOWNER(r0, 0x400454cc, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f00000000c0)={"d202b999cf85000000000088f301e710", 0x102}) 2018/04/13 21:33:41 executing program 3: bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000040)={0xffffffffffffffff, &(0x7f00000000c0)="b82283392dc50ff1fb635a5849d2f5916ae2fdc24e95e12aa8daccf7393e72be9cc66f"}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f0000346fd4)={0x0, 0x0, 0x0, 0x4, 0x9}, 0x2c) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x1, 0x5, &(0x7f0000346fc8)=@framed={{0x18}, [@alu={0x8000000201a7f19, 0x0, 0x7, 0x0, 0x1}], {0x95}}, &(0x7f0000f6bffb)='GPL\x00', 0x0, 0x299, &(0x7f00001a7f05)=""/251}, 0x18) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000140)={r0, 0x50, &(0x7f00000000c0)}, 0x10) socketpair$inet_icmp(0x2, 0x2, 0x1, &(0x7f0000000240)) 2018/04/13 21:33:41 executing program 1: r0 = getpgid(0x0) sched_setattr(r0, &(0x7f0000000000)={0x0, 0x1, 0x0, 0x0, 0x3}, 0x0) mkdir(&(0x7f000082f000)='./control\x00', 0x0) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x1, 0x32, 0xffffffffffffffff, 0x0) r1 = userfaultfd(0x0) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000e4c000)={0xaa}) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000043fe0)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r2 = creat(&(0x7f0000000000)='./control/file0\x00', 0x0) write$sndseq(r2, &(0x7f0000011fd2)=[{0x0, 0x0, 0x0, 0x0, @time, {}, {}, @time=@time={0x77359400}}], 0x30) fcntl$F_SET_RW_HINT(r2, 0x40c, &(0x7f0000000040)) unlink(&(0x7f0000f86000)='./control/file0\x00') close(r1) 2018/04/13 21:33:41 executing program 7: r0 = socket$inet6(0xa, 0x1, 0x8010000400000084) bind$inet6(r0, &(0x7f0000ed3fe4)={0xa, 0x4e20, 0x0, @loopback={0x0, 0x1}}, 0x1c) sendto$inet6(r0, &(0x7f0000925000)="e0", 0x1, 0x0, &(0x7f0000bb6000)={0xa, 0x4e20, 0x0, @loopback={0x0, 0x1}}, 0x1c) ioctl$sock_inet6_tcp_SIOCINQ(r0, 0x541b, &(0x7f0000000500)) 2018/04/13 21:33:41 executing program 0: r0 = userfaultfd(0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000000040)={0xaa, 0xa}) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000911000)={{&(0x7f0000004000/0x1000)=nil, 0x1000}, 0x1}) readv(r0, &(0x7f00000002c0)=[{&(0x7f0000000500)=""/150, 0x96}], 0x1) clone(0x0, &(0x7f0000001f37), &(0x7f0000001ffc), &(0x7f0000001000), &(0x7f0000001000)) 2018/04/13 21:33:42 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000b5dfa8)={0x26, 'hash\x00', 0x0, 0x0, 'rmd320-generic\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) r2 = open(&(0x7f00004b8ff8)='./file0\x00', 0x28042, 0x0) fallocate(r2, 0x0, 0x0, 0x7f) sendfile(r1, r2, &(0x7f0000e64ff8), 0x6) 2018/04/13 21:33:42 executing program 5: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) prctl$setmm(0x23, 0x7, &(0x7f0000ffe000/0x2000)=nil) 2018/04/13 21:33:42 executing program 3: bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000040)={0xffffffffffffffff, &(0x7f00000000c0)="b82283392dc50ff1fb635a5849d2f5916ae2fdc24e95e12aa8daccf7393e72be9cc66f"}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f0000346fd4)={0x0, 0x0, 0x0, 0x4, 0x9}, 0x2c) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x1, 0x5, &(0x7f0000346fc8)=@framed={{0x18}, [@alu={0x8000000201a7f19, 0x0, 0x7, 0x0, 0x1}], {0x95}}, &(0x7f0000f6bffb)='GPL\x00', 0x0, 0x299, &(0x7f00001a7f05)=""/251}, 0x18) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000140)={r0, 0x50, &(0x7f00000000c0)}, 0x10) socketpair$inet_icmp(0x2, 0x2, 0x1, &(0x7f0000000240)) 2018/04/13 21:33:42 executing program 2: r0 = syz_open_dev$tun(&(0x7f0000000280)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f00000000c0)={"d202b999cf85000000000088f301e710", 0x102}) r1 = syz_open_dev$tun(&(0x7f0000000280)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETOWNER(r0, 0x400454cc, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f00000000c0)={"d202b999cf85000000000088f301e710", 0x102}) 2018/04/13 21:33:42 executing program 6: r0 = syz_open_dev$tun(&(0x7f0000000280)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f00000000c0)={"d202b999cf85000000000088f301e710", 0x102}) r1 = syz_open_dev$tun(&(0x7f0000000280)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETOWNER(r0, 0x400454cc, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f00000000c0)={"d202b999cf85000000000088f301e710", 0x102}) 2018/04/13 21:33:42 executing program 5: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) prctl$setmm(0x23, 0x7, &(0x7f0000ffe000/0x2000)=nil) 2018/04/13 21:33:42 executing program 4: capset(&(0x7f0000000100)={0x20080522}, &(0x7f0000000180)={0x3, 0x7}) mkdir(&(0x7f00009cc000)='./file0\x00', 0x0) creat(&(0x7f0000f66ff4)='./file0/bus\x00', 0x0) open$dir(&(0x7f0000eb6000)='./file0/bus\x00', 0x0, 0x0) 2018/04/13 21:33:42 executing program 3: bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000040)={0xffffffffffffffff, &(0x7f00000000c0)="b82283392dc50ff1fb635a5849d2f5916ae2fdc24e95e12aa8daccf7393e72be9cc66f"}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f0000346fd4)={0x0, 0x0, 0x0, 0x4, 0x9}, 0x2c) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x1, 0x5, &(0x7f0000346fc8)=@framed={{0x18}, [@alu={0x8000000201a7f19, 0x0, 0x7, 0x0, 0x1}], {0x95}}, &(0x7f0000f6bffb)='GPL\x00', 0x0, 0x299, &(0x7f00001a7f05)=""/251}, 0x18) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000140)={r0, 0x50, &(0x7f00000000c0)}, 0x10) socketpair$inet_icmp(0x2, 0x2, 0x1, &(0x7f0000000240)) 2018/04/13 21:33:42 executing program 6: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000b6dfc8)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f0000000000)={0x2, 0x400000000000003, 0x0, 0x0, 0x11, 0x0, 0x0, 0x0, [@sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @ipv4={[], [0xff, 0xff], @rand_addr}}}, @sadb_address={0x3, 0x7, 0x0, 0x0, 0x0, @in={0x2, 0x0, @rand_addr}}, @sadb_sa={0x2, 0x1}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @mcast2={0xff, 0x2, [], 0x1}}}]}, 0x88}, 0x1}, 0x0) 2018/04/13 21:33:42 executing program 5: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) prctl$setmm(0x23, 0x7, &(0x7f0000ffe000/0x2000)=nil) 2018/04/13 21:33:42 executing program 4: capset(&(0x7f0000000100)={0x20080522}, &(0x7f0000000180)={0x3, 0x7}) mkdir(&(0x7f00009cc000)='./file0\x00', 0x0) creat(&(0x7f0000f66ff4)='./file0/bus\x00', 0x0) open$dir(&(0x7f0000eb6000)='./file0/bus\x00', 0x0, 0x0) 2018/04/13 21:33:42 executing program 1: r0 = getpgid(0x0) sched_setattr(r0, &(0x7f0000000000)={0x0, 0x1, 0x0, 0x0, 0x3}, 0x0) mkdir(&(0x7f000082f000)='./control\x00', 0x0) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x1, 0x32, 0xffffffffffffffff, 0x0) r1 = userfaultfd(0x0) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000e4c000)={0xaa}) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000043fe0)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r2 = creat(&(0x7f0000000000)='./control/file0\x00', 0x0) write$sndseq(r2, &(0x7f0000011fd2)=[{0x0, 0x0, 0x0, 0x0, @time, {}, {}, @time=@time={0x77359400}}], 0x30) fcntl$F_SET_RW_HINT(r2, 0x40c, &(0x7f0000000040)) unlink(&(0x7f0000f86000)='./control/file0\x00') close(r1) 2018/04/13 21:33:42 executing program 3: bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000040)={0xffffffffffffffff, &(0x7f00000000c0)="b82283392dc50ff1fb635a5849d2f5916ae2fdc24e95e12aa8daccf7393e72be9cc66f"}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f0000346fd4)={0x0, 0x0, 0x0, 0x4, 0x9}, 0x2c) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x1, 0x5, &(0x7f0000346fc8)=@framed={{0x18}, [@alu={0x8000000201a7f19, 0x0, 0x7, 0x0, 0x1}], {0x95}}, &(0x7f0000f6bffb)='GPL\x00', 0x0, 0x299, &(0x7f00001a7f05)=""/251}, 0x18) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000140)={r0, 0x50, &(0x7f00000000c0)}, 0x10) socketpair$inet_icmp(0x2, 0x2, 0x1, &(0x7f0000000240)) 2018/04/13 21:33:42 executing program 4: capset(&(0x7f0000000100)={0x20080522}, &(0x7f0000000180)={0x3, 0x7}) mkdir(&(0x7f00009cc000)='./file0\x00', 0x0) creat(&(0x7f0000f66ff4)='./file0/bus\x00', 0x0) open$dir(&(0x7f0000eb6000)='./file0/bus\x00', 0x0, 0x0) 2018/04/13 21:33:42 executing program 6: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000b6dfc8)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f0000000000)={0x2, 0x400000000000003, 0x0, 0x0, 0x11, 0x0, 0x0, 0x0, [@sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @ipv4={[], [0xff, 0xff], @rand_addr}}}, @sadb_address={0x3, 0x7, 0x0, 0x0, 0x0, @in={0x2, 0x0, @rand_addr}}, @sadb_sa={0x2, 0x1}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @mcast2={0xff, 0x2, [], 0x1}}}]}, 0x88}, 0x1}, 0x0) 2018/04/13 21:33:42 executing program 5: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) prctl$setmm(0x23, 0x7, &(0x7f0000ffe000/0x2000)=nil) 2018/04/13 21:33:42 executing program 0: r0 = userfaultfd(0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000000040)={0xaa, 0xa}) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000911000)={{&(0x7f0000004000/0x1000)=nil, 0x1000}, 0x1}) readv(r0, &(0x7f00000002c0)=[{&(0x7f0000000500)=""/150, 0x96}], 0x1) clone(0x0, &(0x7f0000001f37), &(0x7f0000001ffc), &(0x7f0000001000), &(0x7f0000001000)) 2018/04/13 21:33:42 executing program 7: r0 = socket$inet6(0xa, 0x1, 0x8010000400000084) bind$inet6(r0, &(0x7f0000ed3fe4)={0xa, 0x4e20, 0x0, @loopback={0x0, 0x1}}, 0x1c) sendto$inet6(r0, &(0x7f0000925000)="e0", 0x1, 0x0, &(0x7f0000bb6000)={0xa, 0x4e20, 0x0, @loopback={0x0, 0x1}}, 0x1c) ioctl$sock_inet6_tcp_SIOCINQ(r0, 0x541b, &(0x7f0000000500)) 2018/04/13 21:33:42 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000000)=[{&(0x7f0000000100)="3900000013000904690000008100002e0700004003000000450001070000002114001a0000000002e500000000000800f41ee4bc7c2bad5825", 0x39}], 0x1) 2018/04/13 21:33:42 executing program 4: capset(&(0x7f0000000100)={0x20080522}, &(0x7f0000000180)={0x3, 0x7}) mkdir(&(0x7f00009cc000)='./file0\x00', 0x0) creat(&(0x7f0000f66ff4)='./file0/bus\x00', 0x0) open$dir(&(0x7f0000eb6000)='./file0/bus\x00', 0x0, 0x0) 2018/04/13 21:33:43 executing program 5: bpf$BPF_PROG_QUERY(0x10, &(0x7f00000017c0)={0xffffffffffffffff, 0x4}, 0x20) 2018/04/13 21:33:43 executing program 6: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000b6dfc8)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f0000000000)={0x2, 0x400000000000003, 0x0, 0x0, 0x11, 0x0, 0x0, 0x0, [@sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @ipv4={[], [0xff, 0xff], @rand_addr}}}, @sadb_address={0x3, 0x7, 0x0, 0x0, 0x0, @in={0x2, 0x0, @rand_addr}}, @sadb_sa={0x2, 0x1}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @mcast2={0xff, 0x2, [], 0x1}}}]}, 0x88}, 0x1}, 0x0) 2018/04/13 21:33:43 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000000)=[{&(0x7f0000000100)="3900000013000904690000008100002e0700004003000000450001070000002114001a0000000002e500000000000800f41ee4bc7c2bad5825", 0x39}], 0x1) 2018/04/13 21:33:43 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) ioctl$int_out(r0, 0x2, &(0x7f0000001000)) r1 = syz_open_dev$sg(&(0x7f0000004ff7)='/dev/sg#\x00', 0x0, 0x0) ioctl(r1, 0x100000001, &(0x7f0000001000)) 2018/04/13 21:33:43 executing program 5: bpf$BPF_PROG_QUERY(0x10, &(0x7f00000017c0)={0xffffffffffffffff, 0x4}, 0x20) 2018/04/13 21:33:43 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000180)={&(0x7f0000000080)={0x10}, 0xc, &(0x7f0000000300)={&(0x7f00000014c0)={0x18, 0x8000027, 0x1ff307543bf68163, 0x0, 0x0, {0x3}, [@generic="e5"]}, 0x18}, 0x1}, 0x0) getpeername$inet(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, @loopback}, &(0x7f0000000240)=0x10) 2018/04/13 21:33:43 executing program 6: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000b6dfc8)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f0000000000)={0x2, 0x400000000000003, 0x0, 0x0, 0x11, 0x0, 0x0, 0x0, [@sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @ipv4={[], [0xff, 0xff], @rand_addr}}}, @sadb_address={0x3, 0x7, 0x0, 0x0, 0x0, @in={0x2, 0x0, @rand_addr}}, @sadb_sa={0x2, 0x1}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @mcast2={0xff, 0x2, [], 0x1}}}]}, 0x88}, 0x1}, 0x0) 2018/04/13 21:33:43 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000000)=[{&(0x7f0000000100)="3900000013000904690000008100002e0700004003000000450001070000002114001a0000000002e500000000000800f41ee4bc7c2bad5825", 0x39}], 0x1) 2018/04/13 21:33:43 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) ioctl$int_out(r0, 0x2, &(0x7f0000001000)) r1 = syz_open_dev$sg(&(0x7f0000004ff7)='/dev/sg#\x00', 0x0, 0x0) ioctl(r1, 0x100000001, &(0x7f0000001000)) 2018/04/13 21:33:43 executing program 5: bpf$BPF_PROG_QUERY(0x10, &(0x7f00000017c0)={0xffffffffffffffff, 0x4}, 0x20) 2018/04/13 21:33:43 executing program 0: r0 = userfaultfd(0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000000040)={0xaa, 0xa}) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000911000)={{&(0x7f0000004000/0x1000)=nil, 0x1000}, 0x1}) readv(r0, &(0x7f00000002c0)=[{&(0x7f0000000500)=""/150, 0x96}], 0x1) clone(0x0, &(0x7f0000001f37), &(0x7f0000001ffc), &(0x7f0000001000), &(0x7f0000001000)) 2018/04/13 21:33:43 executing program 7: r0 = socket$inet6(0xa, 0x1, 0x8010000400000084) bind$inet6(r0, &(0x7f0000ed3fe4)={0xa, 0x4e20, 0x0, @loopback={0x0, 0x1}}, 0x1c) sendto$inet6(r0, &(0x7f0000925000)="e0", 0x1, 0x0, &(0x7f0000bb6000)={0xa, 0x4e20, 0x0, @loopback={0x0, 0x1}}, 0x1c) ioctl$sock_inet6_tcp_SIOCINQ(r0, 0x541b, &(0x7f0000000500)) 2018/04/13 21:33:43 executing program 4: r0 = socket$inet(0x2, 0x80003, 0x100000001) bind$inet(r0, &(0x7f0000000080)={0x2, 0x0, @multicast1=0xe0000001}, 0x10) syz_emit_ethernet(0x2a, &(0x7f0000000140)={@broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], @dev={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa]}, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x0, 0x1, 0x0, @rand_addr, @multicast1=0xe0000001}, @icmp=@address_reply={0x6488}}}}}, &(0x7f0000000040)) 2018/04/13 21:33:43 executing program 6: r0 = socket(0xa, 0x2, 0x88) r1 = socket$netlink(0x10, 0x3, 0x4) connect$inet(r0, &(0x7f0000ffdff0)={0x2, 0x4e20, @loopback=0x7f000001}, 0x10) writev(r1, &(0x7f0000000080)=[{&(0x7f00000000c0)="480000001400257f09004b01fcfc8c560a880000f217e00100000000000000a2bc56c186e11f94580b0318fe0000000000200028213e146a1ce206000000000000ffff5bf1ff00c7", 0x48}], 0x1) 2018/04/13 21:33:43 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000180)={&(0x7f0000000080)={0x10}, 0xc, &(0x7f0000000300)={&(0x7f00000014c0)={0x18, 0x8000027, 0x1ff307543bf68163, 0x0, 0x0, {0x3}, [@generic="e5"]}, 0x18}, 0x1}, 0x0) getpeername$inet(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, @loopback}, &(0x7f0000000240)=0x10) [ 304.340306] netlink: 4 bytes leftover after parsing attributes in process `syz-executor1'. [ 304.366748] netlink: 4 bytes leftover after parsing attributes in process `syz-executor1'. 2018/04/13 21:33:43 executing program 5: bpf$BPF_PROG_QUERY(0x10, &(0x7f00000017c0)={0xffffffffffffffff, 0x4}, 0x20) 2018/04/13 21:33:43 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) ioctl$int_out(r0, 0x2, &(0x7f0000001000)) r1 = syz_open_dev$sg(&(0x7f0000004ff7)='/dev/sg#\x00', 0x0, 0x0) ioctl(r1, 0x100000001, &(0x7f0000001000)) 2018/04/13 21:33:44 executing program 4: r0 = socket$inet(0x2, 0x80003, 0x100000001) bind$inet(r0, &(0x7f0000000080)={0x2, 0x0, @multicast1=0xe0000001}, 0x10) syz_emit_ethernet(0x2a, &(0x7f0000000140)={@broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], @dev={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa]}, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x0, 0x1, 0x0, @rand_addr, @multicast1=0xe0000001}, @icmp=@address_reply={0x6488}}}}}, &(0x7f0000000040)) 2018/04/13 21:33:44 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000000)=[{&(0x7f0000000100)="3900000013000904690000008100002e0700004003000000450001070000002114001a0000000002e500000000000800f41ee4bc7c2bad5825", 0x39}], 0x1) 2018/04/13 21:33:44 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000180)={&(0x7f0000000080)={0x10}, 0xc, &(0x7f0000000300)={&(0x7f00000014c0)={0x18, 0x8000027, 0x1ff307543bf68163, 0x0, 0x0, {0x3}, [@generic="e5"]}, 0x18}, 0x1}, 0x0) getpeername$inet(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, @loopback}, &(0x7f0000000240)=0x10) [ 304.414711] netlink: 4 bytes leftover after parsing attributes in process `syz-executor1'. [ 304.512070] netlink: 4 bytes leftover after parsing attributes in process `syz-executor1'. 2018/04/13 21:33:44 executing program 0: bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffb4}, 0x199) r0 = syz_open_procfs(0x0, &(0x7f0000000180)="2f65786500000000000409004bddd9de91be10eebf000ee9a90f798058439ed554fa07424adee901d2da75af1f0200f5ab26d7a071fb35331ce39c5a") ioctl$DRM_IOCTL_RES_CTX(r0, 0xc0c0583b, &(0x7f0000000080)={0x0, &(0x7f0000000040)}) 2018/04/13 21:33:44 executing program 6: r0 = socket(0xa, 0x2, 0x88) r1 = socket$netlink(0x10, 0x3, 0x4) connect$inet(r0, &(0x7f0000ffdff0)={0x2, 0x4e20, @loopback=0x7f000001}, 0x10) writev(r1, &(0x7f0000000080)=[{&(0x7f00000000c0)="480000001400257f09004b01fcfc8c560a880000f217e00100000000000000a2bc56c186e11f94580b0318fe0000000000200028213e146a1ce206000000000000ffff5bf1ff00c7", 0x48}], 0x1) 2018/04/13 21:33:44 executing program 2: r0 = socket$inet(0x2, 0x80003, 0x100000001) bind$inet(r0, &(0x7f0000000080)={0x2, 0x0, @multicast1=0xe0000001}, 0x10) syz_emit_ethernet(0x2a, &(0x7f0000000140)={@broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], @dev={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa]}, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x0, 0x1, 0x0, @rand_addr, @multicast1=0xe0000001}, @icmp=@address_reply={0x6488}}}}}, &(0x7f0000000040)) 2018/04/13 21:33:44 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) ioctl$int_out(r0, 0x2, &(0x7f0000001000)) r1 = syz_open_dev$sg(&(0x7f0000004ff7)='/dev/sg#\x00', 0x0, 0x0) ioctl(r1, 0x100000001, &(0x7f0000001000)) 2018/04/13 21:33:44 executing program 4: r0 = socket$inet(0x2, 0x80003, 0x100000001) bind$inet(r0, &(0x7f0000000080)={0x2, 0x0, @multicast1=0xe0000001}, 0x10) syz_emit_ethernet(0x2a, &(0x7f0000000140)={@broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], @dev={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa]}, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x0, 0x1, 0x0, @rand_addr, @multicast1=0xe0000001}, @icmp=@address_reply={0x6488}}}}}, &(0x7f0000000040)) 2018/04/13 21:33:44 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000180)={&(0x7f0000000080)={0x10}, 0xc, &(0x7f0000000300)={&(0x7f00000014c0)={0x18, 0x8000027, 0x1ff307543bf68163, 0x0, 0x0, {0x3}, [@generic="e5"]}, 0x18}, 0x1}, 0x0) getpeername$inet(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, @loopback}, &(0x7f0000000240)=0x10) 2018/04/13 21:33:44 executing program 5: r0 = socket$inet(0x2, 0x1, 0x0) r1 = dup(r0) setsockopt$inet_tcp_int(r1, 0x6, 0x11, &(0x7f00007b5ffc), 0x4) 2018/04/13 21:33:44 executing program 7: r0 = creat(&(0x7f0000000100)='./file1\x00', 0x0) mkdir(&(0x7f000000dff6)='./control\x00', 0x0) r1 = open(&(0x7f0000000040)='./control\x00', 0x0, 0x0) mkdirat(r1, &(0x7f0000044ff6)='./control\x00', 0x0) r2 = fanotify_init(0x0, 0x0) fanotify_mark(r2, 0x11, 0x40000002, r1, &(0x7f0000000000)='./control\x00') fallocate(r0, 0x0, 0x0, 0x5) r3 = open(&(0x7f00000000c0)='./file0\x00', 0x28042, 0x0) fallocate(r3, 0x0, 0x0, 0x73e0) [ 305.290175] netlink: 4 bytes leftover after parsing attributes in process `syz-executor1'. 2018/04/13 21:33:44 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) mmap(&(0x7f0000000000/0xf000)=nil, 0xf000, 0x0, 0x1b071, 0xffffffffffffffff, 0x0) getsockopt$inet_buf(r0, 0x0, 0x42000000000484, &(0x7f0000000080)=""/24, &(0x7f0000d0cffc)=0xfcc1) 2018/04/13 21:33:44 executing program 5: r0 = socket$inet(0x2, 0x1, 0x0) r1 = dup(r0) setsockopt$inet_tcp_int(r1, 0x6, 0x11, &(0x7f00007b5ffc), 0x4) 2018/04/13 21:33:44 executing program 4: r0 = socket$inet(0x2, 0x80003, 0x100000001) bind$inet(r0, &(0x7f0000000080)={0x2, 0x0, @multicast1=0xe0000001}, 0x10) syz_emit_ethernet(0x2a, &(0x7f0000000140)={@broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], @dev={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa]}, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x0, 0x1, 0x0, @rand_addr, @multicast1=0xe0000001}, @icmp=@address_reply={0x6488}}}}}, &(0x7f0000000040)) 2018/04/13 21:33:44 executing program 2: r0 = socket$inet(0x2, 0x80003, 0x100000001) bind$inet(r0, &(0x7f0000000080)={0x2, 0x0, @multicast1=0xe0000001}, 0x10) syz_emit_ethernet(0x2a, &(0x7f0000000140)={@broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], @dev={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa]}, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x0, 0x1, 0x0, @rand_addr, @multicast1=0xe0000001}, @icmp=@address_reply={0x6488}}}}}, &(0x7f0000000040)) 2018/04/13 21:33:44 executing program 0: bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffb4}, 0x199) r0 = syz_open_procfs(0x0, &(0x7f0000000180)="2f65786500000000000409004bddd9de91be10eebf000ee9a90f798058439ed554fa07424adee901d2da75af1f0200f5ab26d7a071fb35331ce39c5a") ioctl$DRM_IOCTL_RES_CTX(r0, 0xc0c0583b, &(0x7f0000000080)={0x0, &(0x7f0000000040)}) 2018/04/13 21:33:44 executing program 6: r0 = socket(0xa, 0x2, 0x88) r1 = socket$netlink(0x10, 0x3, 0x4) connect$inet(r0, &(0x7f0000ffdff0)={0x2, 0x4e20, @loopback=0x7f000001}, 0x10) writev(r1, &(0x7f0000000080)=[{&(0x7f00000000c0)="480000001400257f09004b01fcfc8c560a880000f217e00100000000000000a2bc56c186e11f94580b0318fe0000000000200028213e146a1ce206000000000000ffff5bf1ff00c7", 0x48}], 0x1) 2018/04/13 21:33:44 executing program 1: r0 = socket$pptp(0x18, 0x1, 0x2) r1 = dup2(r0, r0) bind$nfc_llcp(r1, &(0x7f000026b000)={0x27, 0xffffffffffffffff, 0x80000, 0x0, 0x0, 0x0, "7c44d240ab8b4dcb290d9b4aae50e68e08a5b4000671bdb50005fc5b72eaff1156cc197842b4c0f611546634000c00800000000037eee17cc6556a85809693"}, 0x60) connect$pptp(r0, &(0x7f000018ffe0)={0x18, 0x2}, 0x20) 2018/04/13 21:33:45 executing program 7: r0 = creat(&(0x7f0000000100)='./file1\x00', 0x0) mkdir(&(0x7f000000dff6)='./control\x00', 0x0) r1 = open(&(0x7f0000000040)='./control\x00', 0x0, 0x0) mkdirat(r1, &(0x7f0000044ff6)='./control\x00', 0x0) r2 = fanotify_init(0x0, 0x0) fanotify_mark(r2, 0x11, 0x40000002, r1, &(0x7f0000000000)='./control\x00') fallocate(r0, 0x0, 0x0, 0x5) r3 = open(&(0x7f00000000c0)='./file0\x00', 0x28042, 0x0) fallocate(r3, 0x0, 0x0, 0x73e0) 2018/04/13 21:33:45 executing program 5: r0 = socket$inet(0x2, 0x1, 0x0) r1 = dup(r0) setsockopt$inet_tcp_int(r1, 0x6, 0x11, &(0x7f00007b5ffc), 0x4) 2018/04/13 21:33:45 executing program 4: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000400)={0x2, 0x4, 0x4, 0x8}, 0x2c) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f00000000c0)={r0, &(0x7f0000000200)="be", &(0x7f0000000300)=""/168}, 0x18) 2018/04/13 21:33:45 executing program 2: r0 = socket$inet(0x2, 0x80003, 0x100000001) bind$inet(r0, &(0x7f0000000080)={0x2, 0x0, @multicast1=0xe0000001}, 0x10) syz_emit_ethernet(0x2a, &(0x7f0000000140)={@broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], @dev={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa]}, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x0, 0x1, 0x0, @rand_addr, @multicast1=0xe0000001}, @icmp=@address_reply={0x6488}}}}}, &(0x7f0000000040)) 2018/04/13 21:33:45 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) mmap(&(0x7f0000000000/0xf000)=nil, 0xf000, 0x0, 0x1b071, 0xffffffffffffffff, 0x0) getsockopt$inet_buf(r0, 0x0, 0x42000000000484, &(0x7f0000000080)=""/24, &(0x7f0000d0cffc)=0xfcc1) 2018/04/13 21:33:45 executing program 0: bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffb4}, 0x199) r0 = syz_open_procfs(0x0, &(0x7f0000000180)="2f65786500000000000409004bddd9de91be10eebf000ee9a90f798058439ed554fa07424adee901d2da75af1f0200f5ab26d7a071fb35331ce39c5a") ioctl$DRM_IOCTL_RES_CTX(r0, 0xc0c0583b, &(0x7f0000000080)={0x0, &(0x7f0000000040)}) 2018/04/13 21:33:45 executing program 6: r0 = socket(0xa, 0x2, 0x88) r1 = socket$netlink(0x10, 0x3, 0x4) connect$inet(r0, &(0x7f0000ffdff0)={0x2, 0x4e20, @loopback=0x7f000001}, 0x10) writev(r1, &(0x7f0000000080)=[{&(0x7f00000000c0)="480000001400257f09004b01fcfc8c560a880000f217e00100000000000000a2bc56c186e11f94580b0318fe0000000000200028213e146a1ce206000000000000ffff5bf1ff00c7", 0x48}], 0x1) 2018/04/13 21:33:45 executing program 1: r0 = socket$pptp(0x18, 0x1, 0x2) r1 = dup2(r0, r0) bind$nfc_llcp(r1, &(0x7f000026b000)={0x27, 0xffffffffffffffff, 0x80000, 0x0, 0x0, 0x0, "7c44d240ab8b4dcb290d9b4aae50e68e08a5b4000671bdb50005fc5b72eaff1156cc197842b4c0f611546634000c00800000000037eee17cc6556a85809693"}, 0x60) connect$pptp(r0, &(0x7f000018ffe0)={0x18, 0x2}, 0x20) 2018/04/13 21:33:45 executing program 5: r0 = socket$inet(0x2, 0x1, 0x0) r1 = dup(r0) setsockopt$inet_tcp_int(r1, 0x6, 0x11, &(0x7f00007b5ffc), 0x4) 2018/04/13 21:33:45 executing program 4: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000400)={0x2, 0x4, 0x4, 0x8}, 0x2c) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f00000000c0)={r0, &(0x7f0000000200)="be", &(0x7f0000000300)=""/168}, 0x18) 2018/04/13 21:33:45 executing program 7: r0 = creat(&(0x7f0000000100)='./file1\x00', 0x0) mkdir(&(0x7f000000dff6)='./control\x00', 0x0) r1 = open(&(0x7f0000000040)='./control\x00', 0x0, 0x0) mkdirat(r1, &(0x7f0000044ff6)='./control\x00', 0x0) r2 = fanotify_init(0x0, 0x0) fanotify_mark(r2, 0x11, 0x40000002, r1, &(0x7f0000000000)='./control\x00') fallocate(r0, 0x0, 0x0, 0x5) r3 = open(&(0x7f00000000c0)='./file0\x00', 0x28042, 0x0) fallocate(r3, 0x0, 0x0, 0x73e0) 2018/04/13 21:33:45 executing program 0: bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffb4}, 0x199) r0 = syz_open_procfs(0x0, &(0x7f0000000180)="2f65786500000000000409004bddd9de91be10eebf000ee9a90f798058439ed554fa07424adee901d2da75af1f0200f5ab26d7a071fb35331ce39c5a") ioctl$DRM_IOCTL_RES_CTX(r0, 0xc0c0583b, &(0x7f0000000080)={0x0, &(0x7f0000000040)}) 2018/04/13 21:33:45 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) mmap(&(0x7f0000000000/0xf000)=nil, 0xf000, 0x0, 0x1b071, 0xffffffffffffffff, 0x0) getsockopt$inet_buf(r0, 0x0, 0x42000000000484, &(0x7f0000000080)=""/24, &(0x7f0000d0cffc)=0xfcc1) 2018/04/13 21:33:45 executing program 6: r0 = socket$pptp(0x18, 0x1, 0x2) r1 = dup2(r0, r0) bind$nfc_llcp(r1, &(0x7f000026b000)={0x27, 0xffffffffffffffff, 0x80000, 0x0, 0x0, 0x0, "7c44d240ab8b4dcb290d9b4aae50e68e08a5b4000671bdb50005fc5b72eaff1156cc197842b4c0f611546634000c00800000000037eee17cc6556a85809693"}, 0x60) connect$pptp(r0, &(0x7f000018ffe0)={0x18, 0x2}, 0x20) 2018/04/13 21:33:45 executing program 7: r0 = creat(&(0x7f0000000100)='./file1\x00', 0x0) mkdir(&(0x7f000000dff6)='./control\x00', 0x0) r1 = open(&(0x7f0000000040)='./control\x00', 0x0, 0x0) mkdirat(r1, &(0x7f0000044ff6)='./control\x00', 0x0) r2 = fanotify_init(0x0, 0x0) fanotify_mark(r2, 0x11, 0x40000002, r1, &(0x7f0000000000)='./control\x00') fallocate(r0, 0x0, 0x0, 0x5) r3 = open(&(0x7f00000000c0)='./file0\x00', 0x28042, 0x0) fallocate(r3, 0x0, 0x0, 0x73e0) 2018/04/13 21:33:45 executing program 2: r0 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000ea3000)='/dev/sequencer\x00', 0x0, 0x0) ioctl$KVM_SET_SIGNAL_MASK(r0, 0xc08c5102, &(0x7f0000000080)={0x20, "9a9c0493093120c0cf294987c1851bb962950e4ccaaa0dd532a8c4a3f99afff9"}) 2018/04/13 21:33:45 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) getsockopt$inet_sctp6_SCTP_HMAC_IDENT(0xffffffffffffffff, 0x84, 0x16, &(0x7f0000000000)=ANY=[@ANYBLOB="9473bd"], &(0x7f0000000340)=0x1) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000fe7000/0x18000)=nil, &(0x7f0000de9000)=[@text32={0x20, &(0x7f0000f59fc6)="0fc75fedc4c3c968fb6c0f9cfbb9040100c00f3266b842008ee80f230064672ec015dec4e245bea5d41e6082f9440f20c03506000000440f22c0", 0x3a}], 0x1, 0x0, &(0x7f0000000080), 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) 2018/04/13 21:33:45 executing program 4: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000400)={0x2, 0x4, 0x4, 0x8}, 0x2c) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f00000000c0)={r0, &(0x7f0000000200)="be", &(0x7f0000000300)=""/168}, 0x18) 2018/04/13 21:33:45 executing program 1: r0 = socket$pptp(0x18, 0x1, 0x2) r1 = dup2(r0, r0) bind$nfc_llcp(r1, &(0x7f000026b000)={0x27, 0xffffffffffffffff, 0x80000, 0x0, 0x0, 0x0, "7c44d240ab8b4dcb290d9b4aae50e68e08a5b4000671bdb50005fc5b72eaff1156cc197842b4c0f611546634000c00800000000037eee17cc6556a85809693"}, 0x60) connect$pptp(r0, &(0x7f000018ffe0)={0x18, 0x2}, 0x20) 2018/04/13 21:33:45 executing program 2: r0 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000ea3000)='/dev/sequencer\x00', 0x0, 0x0) ioctl$KVM_SET_SIGNAL_MASK(r0, 0xc08c5102, &(0x7f0000000080)={0x20, "9a9c0493093120c0cf294987c1851bb962950e4ccaaa0dd532a8c4a3f99afff9"}) 2018/04/13 21:33:45 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) mmap(&(0x7f0000000000/0xf000)=nil, 0xf000, 0x0, 0x1b071, 0xffffffffffffffff, 0x0) getsockopt$inet_buf(r0, 0x0, 0x42000000000484, &(0x7f0000000080)=""/24, &(0x7f0000d0cffc)=0xfcc1) 2018/04/13 21:33:45 executing program 4: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000400)={0x2, 0x4, 0x4, 0x8}, 0x2c) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f00000000c0)={r0, &(0x7f0000000200)="be", &(0x7f0000000300)=""/168}, 0x18) 2018/04/13 21:33:45 executing program 0: r0 = msgget$private(0x0, 0x0) msgctl$IPC_SET(r0, 0x1, &(0x7f0000258f88)) msgsnd(r0, &(0x7f0000000040)={0x3}, 0x8, 0x0) msgctl$IPC_SET(r0, 0x1, &(0x7f0000000700)={{}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9}) 2018/04/13 21:33:45 executing program 7: r0 = socket$inet6(0xa, 0x40000080806, 0x0) bind$inet6(r0, &(0x7f000047b000)={0xa, 0x4e20}, 0x1c) listen(r0, 0x20000003) r1 = socket$inet6(0xa, 0x6, 0x0) connect$inet6(r1, &(0x7f0000419000)={0xa, 0x4e20, 0x0, @ipv4={[], [0xff, 0xff], @remote={0xac, 0x14, 0x14, 0xbb}}}, 0x1c) 2018/04/13 21:33:45 executing program 6: r0 = socket$pptp(0x18, 0x1, 0x2) r1 = dup2(r0, r0) bind$nfc_llcp(r1, &(0x7f000026b000)={0x27, 0xffffffffffffffff, 0x80000, 0x0, 0x0, 0x0, "7c44d240ab8b4dcb290d9b4aae50e68e08a5b4000671bdb50005fc5b72eaff1156cc197842b4c0f611546634000c00800000000037eee17cc6556a85809693"}, 0x60) connect$pptp(r0, &(0x7f000018ffe0)={0x18, 0x2}, 0x20) 2018/04/13 21:33:45 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) getsockopt$inet_sctp6_SCTP_HMAC_IDENT(0xffffffffffffffff, 0x84, 0x16, &(0x7f0000000000)=ANY=[@ANYBLOB="9473bd"], &(0x7f0000000340)=0x1) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000fe7000/0x18000)=nil, &(0x7f0000de9000)=[@text32={0x20, &(0x7f0000f59fc6)="0fc75fedc4c3c968fb6c0f9cfbb9040100c00f3266b842008ee80f230064672ec015dec4e245bea5d41e6082f9440f20c03506000000440f22c0", 0x3a}], 0x1, 0x0, &(0x7f0000000080), 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) 2018/04/13 21:33:45 executing program 2: r0 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000ea3000)='/dev/sequencer\x00', 0x0, 0x0) ioctl$KVM_SET_SIGNAL_MASK(r0, 0xc08c5102, &(0x7f0000000080)={0x20, "9a9c0493093120c0cf294987c1851bb962950e4ccaaa0dd532a8c4a3f99afff9"}) 2018/04/13 21:33:45 executing program 1: r0 = socket$pptp(0x18, 0x1, 0x2) r1 = dup2(r0, r0) bind$nfc_llcp(r1, &(0x7f000026b000)={0x27, 0xffffffffffffffff, 0x80000, 0x0, 0x0, 0x0, "7c44d240ab8b4dcb290d9b4aae50e68e08a5b4000671bdb50005fc5b72eaff1156cc197842b4c0f611546634000c00800000000037eee17cc6556a85809693"}, 0x60) connect$pptp(r0, &(0x7f000018ffe0)={0x18, 0x2}, 0x20) 2018/04/13 21:33:45 executing program 6: r0 = socket$pptp(0x18, 0x1, 0x2) r1 = dup2(r0, r0) bind$nfc_llcp(r1, &(0x7f000026b000)={0x27, 0xffffffffffffffff, 0x80000, 0x0, 0x0, 0x0, "7c44d240ab8b4dcb290d9b4aae50e68e08a5b4000671bdb50005fc5b72eaff1156cc197842b4c0f611546634000c00800000000037eee17cc6556a85809693"}, 0x60) connect$pptp(r0, &(0x7f000018ffe0)={0x18, 0x2}, 0x20) 2018/04/13 21:33:45 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000505000)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000000)={0x3, 0x0, 0x16000, 0x2000, &(0x7f000000d000/0x2000)=nil}) pipe2(&(0x7f0000cdc000)={0x0, 0x0}, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) r4 = dup3(r3, r2, 0x0) syz_kvm_setup_cpu$x86(r1, r4, &(0x7f0000000000/0x18000)=nil, &(0x7f0000000140)=[@text32={0x20, &(0x7f0000000040)="66baf80cb846399d8eef66bafc0cec660f3882941d0c00c0fec4c2559fb47df57a0000b8000000000f23c80f21f835040070000f23f80f083c2126660f388254997766baf80cb830e9bd85ef66bafc0cb000eeb9a00d0000b800800000ba000000000f3066b821010f00d0", 0x6b}], 0x1, 0x1, &(0x7f0000000100)=[@cr4={0x1, 0x102000}], 0x1) ioctl$KVM_RUN(r3, 0xae80, 0x0) 2018/04/13 21:33:45 executing program 4: perf_event_open(&(0x7f0000348f88)={0x2, 0x70, 0x3e6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$binder(&(0x7f0000000000)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) ioctl$BINDER_WRITE_READ(r0, 0xc0306201, &(0x7f0000007000)={0x8, 0x0, &(0x7f0000005fd4)=[@acquire={0x40046305}], 0x0, 0x0, &(0x7f0000002000)}) ioctl$BINDER_WRITE_READ(r0, 0xc0306201, &(0x7f0000008fd0)={0x8, 0x0, &(0x7f0000008000)=[@release={0x400c630e}], 0x0, 0x0, &(0x7f0000000f4d)}) 2018/04/13 21:33:45 executing program 1: request_key(&(0x7f0000002000)='asymmetric\x00', &(0x7f0000001ffb)={0x73, 0x79, 0x7a}, &(0x7f0000001fee)="3a74670000000000008000080265783a30d1", 0x0) 2018/04/13 21:33:45 executing program 2: r0 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000ea3000)='/dev/sequencer\x00', 0x0, 0x0) ioctl$KVM_SET_SIGNAL_MASK(r0, 0xc08c5102, &(0x7f0000000080)={0x20, "9a9c0493093120c0cf294987c1851bb962950e4ccaaa0dd532a8c4a3f99afff9"}) [ 306.010477] binder: 21194:21195 Acquire 1 refcount change on invalid ref 0 ret -22 [ 306.038156] binder: 21194:21195 BC_REQUEST_DEATH_NOTIFICATION invalid ref 0 [ 306.069578] binder: 21194:21200 Acquire 1 refcount change on invalid ref 0 ret -22 2018/04/13 21:33:46 executing program 1: request_key(&(0x7f0000002000)='asymmetric\x00', &(0x7f0000001ffb)={0x73, 0x79, 0x7a}, &(0x7f0000001fee)="3a74670000000000008000080265783a30d1", 0x0) 2018/04/13 21:33:46 executing program 0: r0 = socket$inet6(0xa, 0x80001, 0x0) setsockopt$inet6_MCAST_JOIN_GROUP(r0, 0x29, 0x2a, &(0x7f0000fca000)={0x100000001, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x1, [], 0x1}}}}, 0x88) setsockopt$inet6_MCAST_MSFILTER(r0, 0x29, 0x30, &(0x7f0000d4b000)={0x100000001, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x1, [], 0x1}}}, 0x0, 0x3, [{{0xa, 0x0, 0x0, @mcast1={0xff, 0x1, [], 0x1}}}, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x1, [], 0x1}}}, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x1, [], 0x1}}}]}, 0x210) getsockopt$inet_sctp6_SCTP_GET_ASSOC_STATS(0xffffffffffffffff, 0x84, 0x70, &(0x7f0000000040)={0x0, @in={{0x2, 0x0, @multicast2=0xe0000002}}, [0x2, 0x401, 0x0, 0x0, 0x4, 0x0, 0x8]}, &(0x7f0000000140)=0x100) perf_event_open(&(0x7f0000b5a000)={0x4000000002, 0x78, 0x1e2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$inet6_MCAST_MSFILTER(r0, 0x29, 0x30, &(0x7f0000dbd000)={0x1, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x1, [], 0x1}}}}, 0x90) 2018/04/13 21:33:46 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) getsockopt$inet_sctp6_SCTP_HMAC_IDENT(0xffffffffffffffff, 0x84, 0x16, &(0x7f0000000000)=ANY=[@ANYBLOB="9473bd"], &(0x7f0000000340)=0x1) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000fe7000/0x18000)=nil, &(0x7f0000de9000)=[@text32={0x20, &(0x7f0000f59fc6)="0fc75fedc4c3c968fb6c0f9cfbb9040100c00f3266b842008ee80f230064672ec015dec4e245bea5d41e6082f9440f20c03506000000440f22c0", 0x3a}], 0x1, 0x0, &(0x7f0000000080), 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) 2018/04/13 21:33:46 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) prlimit64(0x0, 0x0, &(0x7f0000000000)={0x79}, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000780)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x40000004}, 0xc, &(0x7f0000000740)={&(0x7f0000000280)=@setlink={0x20, 0x13, 0x0, 0x0, 0x25dfdbfb}, 0x20}, 0x1}, 0x0) ioctl$KVM_GET_MSRS(r2, 0xc008ae88, &(0x7f0000000000)) 2018/04/13 21:33:46 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000505000)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000000)={0x3, 0x0, 0x16000, 0x2000, &(0x7f000000d000/0x2000)=nil}) pipe2(&(0x7f0000cdc000)={0x0, 0x0}, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) r4 = dup3(r3, r2, 0x0) syz_kvm_setup_cpu$x86(r1, r4, &(0x7f0000000000/0x18000)=nil, &(0x7f0000000140)=[@text32={0x20, &(0x7f0000000040)="66baf80cb846399d8eef66bafc0cec660f3882941d0c00c0fec4c2559fb47df57a0000b8000000000f23c80f21f835040070000f23f80f083c2126660f388254997766baf80cb830e9bd85ef66bafc0cb000eeb9a00d0000b800800000ba000000000f3066b821010f00d0", 0x6b}], 0x1, 0x1, &(0x7f0000000100)=[@cr4={0x1, 0x102000}], 0x1) ioctl$KVM_RUN(r3, 0xae80, 0x0) 2018/04/13 21:33:46 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r1, r2, &(0x7f0000000000/0x18000)=nil, &(0x7f0000000240)=[@text64={0x40, &(0x7f00000001c0)="470f01c9440f0766b8ca000f00d8b9620b00000f322626660f38823b0f06c744240094000000c744240266950000c7442406000000000f011424b9600200000f3266b8e0008ee866baf80cb852ae7b83ef66bafc0cec", 0x56}], 0x1, 0x78, &(0x7f0000000280), 0x0) fremovexattr(0xffffffffffffffff, &(0x7f0000000140)=ANY=[@ANYPTR=&(0x7f0000000080)=ANY=[@ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00']]) ioctl$KVM_RUN(r2, 0xae80, 0x0) 2018/04/13 21:33:46 executing program 7: r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ashmem\x00', 0x0, 0x0) ioctl$ASHMEM_SET_NAME(r0, 0x41007701, &(0x7f0000538ef3)="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") 2018/04/13 21:33:46 executing program 6: getrandom(&(0x7f0000000100), 0x0, 0x3) 2018/04/13 21:33:46 executing program 1: request_key(&(0x7f0000002000)='asymmetric\x00', &(0x7f0000001ffb)={0x73, 0x79, 0x7a}, &(0x7f0000001fee)="3a74670000000000008000080265783a30d1", 0x0) 2018/04/13 21:33:46 executing program 6: getrandom(&(0x7f0000000100), 0x0, 0x3) [ 306.899132] kvm [21216]: vcpu0, guest rIP: 0xfff0 Hyper-V unhandled rdmsr: 0x40000004 2018/04/13 21:33:46 executing program 7: r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ashmem\x00', 0x0, 0x0) ioctl$ASHMEM_SET_NAME(r0, 0x41007701, &(0x7f0000538ef3)="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") 2018/04/13 21:33:46 executing program 0: r0 = socket$inet6(0xa, 0x80001, 0x0) setsockopt$inet6_MCAST_JOIN_GROUP(r0, 0x29, 0x2a, &(0x7f0000fca000)={0x100000001, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x1, [], 0x1}}}}, 0x88) setsockopt$inet6_MCAST_MSFILTER(r0, 0x29, 0x30, &(0x7f0000d4b000)={0x100000001, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x1, [], 0x1}}}, 0x0, 0x3, [{{0xa, 0x0, 0x0, @mcast1={0xff, 0x1, [], 0x1}}}, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x1, [], 0x1}}}, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x1, [], 0x1}}}]}, 0x210) getsockopt$inet_sctp6_SCTP_GET_ASSOC_STATS(0xffffffffffffffff, 0x84, 0x70, &(0x7f0000000040)={0x0, @in={{0x2, 0x0, @multicast2=0xe0000002}}, [0x2, 0x401, 0x0, 0x0, 0x4, 0x0, 0x8]}, &(0x7f0000000140)=0x100) perf_event_open(&(0x7f0000b5a000)={0x4000000002, 0x78, 0x1e2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$inet6_MCAST_MSFILTER(r0, 0x29, 0x30, &(0x7f0000dbd000)={0x1, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x1, [], 0x1}}}}, 0x90) 2018/04/13 21:33:46 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) prlimit64(0x0, 0x0, &(0x7f0000000000)={0x79}, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000780)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x40000004}, 0xc, &(0x7f0000000740)={&(0x7f0000000280)=@setlink={0x20, 0x13, 0x0, 0x0, 0x25dfdbfb}, 0x20}, 0x1}, 0x0) ioctl$KVM_GET_MSRS(r2, 0xc008ae88, &(0x7f0000000000)) 2018/04/13 21:33:46 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000505000)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000000)={0x3, 0x0, 0x16000, 0x2000, &(0x7f000000d000/0x2000)=nil}) pipe2(&(0x7f0000cdc000)={0x0, 0x0}, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) r4 = dup3(r3, r2, 0x0) syz_kvm_setup_cpu$x86(r1, r4, &(0x7f0000000000/0x18000)=nil, &(0x7f0000000140)=[@text32={0x20, &(0x7f0000000040)="66baf80cb846399d8eef66bafc0cec660f3882941d0c00c0fec4c2559fb47df57a0000b8000000000f23c80f21f835040070000f23f80f083c2126660f388254997766baf80cb830e9bd85ef66bafc0cb000eeb9a00d0000b800800000ba000000000f3066b821010f00d0", 0x6b}], 0x1, 0x1, &(0x7f0000000100)=[@cr4={0x1, 0x102000}], 0x1) ioctl$KVM_RUN(r3, 0xae80, 0x0) 2018/04/13 21:33:46 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) getsockopt$inet_sctp6_SCTP_HMAC_IDENT(0xffffffffffffffff, 0x84, 0x16, &(0x7f0000000000)=ANY=[@ANYBLOB="9473bd"], &(0x7f0000000340)=0x1) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000fe7000/0x18000)=nil, &(0x7f0000de9000)=[@text32={0x20, &(0x7f0000f59fc6)="0fc75fedc4c3c968fb6c0f9cfbb9040100c00f3266b842008ee80f230064672ec015dec4e245bea5d41e6082f9440f20c03506000000440f22c0", 0x3a}], 0x1, 0x0, &(0x7f0000000080), 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) 2018/04/13 21:33:46 executing program 6: getrandom(&(0x7f0000000100), 0x0, 0x3) 2018/04/13 21:33:46 executing program 1: request_key(&(0x7f0000002000)='asymmetric\x00', &(0x7f0000001ffb)={0x73, 0x79, 0x7a}, &(0x7f0000001fee)="3a74670000000000008000080265783a30d1", 0x0) 2018/04/13 21:33:46 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r1, r2, &(0x7f0000000000/0x18000)=nil, &(0x7f0000000240)=[@text64={0x40, &(0x7f00000001c0)="470f01c9440f0766b8ca000f00d8b9620b00000f322626660f38823b0f06c744240094000000c744240266950000c7442406000000000f011424b9600200000f3266b8e0008ee866baf80cb852ae7b83ef66bafc0cec", 0x56}], 0x1, 0x78, &(0x7f0000000280), 0x0) fremovexattr(0xffffffffffffffff, &(0x7f0000000140)=ANY=[@ANYPTR=&(0x7f0000000080)=ANY=[@ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00']]) ioctl$KVM_RUN(r2, 0xae80, 0x0) 2018/04/13 21:33:46 executing program 7: r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ashmem\x00', 0x0, 0x0) ioctl$ASHMEM_SET_NAME(r0, 0x41007701, &(0x7f0000538ef3)="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") [ 307.105384] kvm [21238]: vcpu0, guest rIP: 0xfff0 Hyper-V unhandled rdmsr: 0x40000004 2018/04/13 21:33:46 executing program 0: r0 = socket$inet6(0xa, 0x80001, 0x0) setsockopt$inet6_MCAST_JOIN_GROUP(r0, 0x29, 0x2a, &(0x7f0000fca000)={0x100000001, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x1, [], 0x1}}}}, 0x88) setsockopt$inet6_MCAST_MSFILTER(r0, 0x29, 0x30, &(0x7f0000d4b000)={0x100000001, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x1, [], 0x1}}}, 0x0, 0x3, [{{0xa, 0x0, 0x0, @mcast1={0xff, 0x1, [], 0x1}}}, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x1, [], 0x1}}}, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x1, [], 0x1}}}]}, 0x210) getsockopt$inet_sctp6_SCTP_GET_ASSOC_STATS(0xffffffffffffffff, 0x84, 0x70, &(0x7f0000000040)={0x0, @in={{0x2, 0x0, @multicast2=0xe0000002}}, [0x2, 0x401, 0x0, 0x0, 0x4, 0x0, 0x8]}, &(0x7f0000000140)=0x100) perf_event_open(&(0x7f0000b5a000)={0x4000000002, 0x78, 0x1e2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$inet6_MCAST_MSFILTER(r0, 0x29, 0x30, &(0x7f0000dbd000)={0x1, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x1, [], 0x1}}}}, 0x90) 2018/04/13 21:33:46 executing program 6: getrandom(&(0x7f0000000100), 0x0, 0x3) 2018/04/13 21:33:46 executing program 1: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000004fc8)={0x0, 0x0, &(0x7f0000004000)=[{&(0x7f0000000040)="240000001a0001000700fd686fa2f8bc02000d0000000000031d9994080019000103f21a", 0x24}], 0x1}, 0x0) 2018/04/13 21:33:46 executing program 7: r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ashmem\x00', 0x0, 0x0) ioctl$ASHMEM_SET_NAME(r0, 0x41007701, &(0x7f0000538ef3)="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") 2018/04/13 21:33:46 executing program 5: r0 = memfd_create(&(0x7f0000000000)="17", 0x0) write$binfmt_elf32(r0, &(0x7f0000000140)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x38, 0x0, 0x0, 0x0, 0x20}, [{}]}, 0x58) execveat(r0, &(0x7f0000ff7000)='./file0\x00', &(0x7f0000000580), &(0x7f000034bff8)=[&(0x7f0000ff7000)="00000000000000060804002000fffc0c6565643b799365005f1b76"], 0x1000) 2018/04/13 21:33:46 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r1, r2, &(0x7f0000000000/0x18000)=nil, &(0x7f0000000240)=[@text64={0x40, &(0x7f00000001c0)="470f01c9440f0766b8ca000f00d8b9620b00000f322626660f38823b0f06c744240094000000c744240266950000c7442406000000000f011424b9600200000f3266b8e0008ee866baf80cb852ae7b83ef66bafc0cec", 0x56}], 0x1, 0x78, &(0x7f0000000280), 0x0) fremovexattr(0xffffffffffffffff, &(0x7f0000000140)=ANY=[@ANYPTR=&(0x7f0000000080)=ANY=[@ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00']]) ioctl$KVM_RUN(r2, 0xae80, 0x0) 2018/04/13 21:33:46 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) prlimit64(0x0, 0x0, &(0x7f0000000000)={0x79}, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000780)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x40000004}, 0xc, &(0x7f0000000740)={&(0x7f0000000280)=@setlink={0x20, 0x13, 0x0, 0x0, 0x25dfdbfb}, 0x20}, 0x1}, 0x0) ioctl$KVM_GET_MSRS(r2, 0xc008ae88, &(0x7f0000000000)) 2018/04/13 21:33:46 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000505000)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000000)={0x3, 0x0, 0x16000, 0x2000, &(0x7f000000d000/0x2000)=nil}) pipe2(&(0x7f0000cdc000)={0x0, 0x0}, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) r4 = dup3(r3, r2, 0x0) syz_kvm_setup_cpu$x86(r1, r4, &(0x7f0000000000/0x18000)=nil, &(0x7f0000000140)=[@text32={0x20, &(0x7f0000000040)="66baf80cb846399d8eef66bafc0cec660f3882941d0c00c0fec4c2559fb47df57a0000b8000000000f23c80f21f835040070000f23f80f083c2126660f388254997766baf80cb830e9bd85ef66bafc0cb000eeb9a00d0000b800800000ba000000000f3066b821010f00d0", 0x6b}], 0x1, 0x1, &(0x7f0000000100)=[@cr4={0x1, 0x102000}], 0x1) ioctl$KVM_RUN(r3, 0xae80, 0x0) 2018/04/13 21:33:46 executing program 6: perf_event_open(&(0x7f000001d000)={0x5, 0x78, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_bp={&(0x7f0000000000), 0x1}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x3, 0x3a) setsockopt$inet6_int(r0, 0x29, 0x24, &(0x7f0000000000), 0x4) 2018/04/13 21:33:46 executing program 7: mq_notify(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0xfffffffffffffffc, 0x0, @thr={&(0x7f0000ce5fda), &(0x7f0000c51000)}}) [ 307.338980] kvm [21267]: vcpu0, guest rIP: 0xfff0 Hyper-V unhandled rdmsr: 0x40000004 2018/04/13 21:33:46 executing program 1: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000004fc8)={0x0, 0x0, &(0x7f0000004000)=[{&(0x7f0000000040)="240000001a0001000700fd686fa2f8bc02000d0000000000031d9994080019000103f21a", 0x24}], 0x1}, 0x0) 2018/04/13 21:33:46 executing program 5: r0 = memfd_create(&(0x7f0000000000)="17", 0x0) write$binfmt_elf32(r0, &(0x7f0000000140)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x38, 0x0, 0x0, 0x0, 0x20}, [{}]}, 0x58) execveat(r0, &(0x7f0000ff7000)='./file0\x00', &(0x7f0000000580), &(0x7f000034bff8)=[&(0x7f0000ff7000)="00000000000000060804002000fffc0c6565643b799365005f1b76"], 0x1000) 2018/04/13 21:33:47 executing program 7: mq_notify(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0xfffffffffffffffc, 0x0, @thr={&(0x7f0000ce5fda), &(0x7f0000c51000)}}) 2018/04/13 21:33:47 executing program 0: r0 = socket$inet6(0xa, 0x80001, 0x0) setsockopt$inet6_MCAST_JOIN_GROUP(r0, 0x29, 0x2a, &(0x7f0000fca000)={0x100000001, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x1, [], 0x1}}}}, 0x88) setsockopt$inet6_MCAST_MSFILTER(r0, 0x29, 0x30, &(0x7f0000d4b000)={0x100000001, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x1, [], 0x1}}}, 0x0, 0x3, [{{0xa, 0x0, 0x0, @mcast1={0xff, 0x1, [], 0x1}}}, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x1, [], 0x1}}}, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x1, [], 0x1}}}]}, 0x210) getsockopt$inet_sctp6_SCTP_GET_ASSOC_STATS(0xffffffffffffffff, 0x84, 0x70, &(0x7f0000000040)={0x0, @in={{0x2, 0x0, @multicast2=0xe0000002}}, [0x2, 0x401, 0x0, 0x0, 0x4, 0x0, 0x8]}, &(0x7f0000000140)=0x100) perf_event_open(&(0x7f0000b5a000)={0x4000000002, 0x78, 0x1e2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$inet6_MCAST_MSFILTER(r0, 0x29, 0x30, &(0x7f0000dbd000)={0x1, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x1, [], 0x1}}}}, 0x90) 2018/04/13 21:33:47 executing program 1: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000004fc8)={0x0, 0x0, &(0x7f0000004000)=[{&(0x7f0000000040)="240000001a0001000700fd686fa2f8bc02000d0000000000031d9994080019000103f21a", 0x24}], 0x1}, 0x0) 2018/04/13 21:33:47 executing program 6: perf_event_open(&(0x7f000001d000)={0x5, 0x78, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_bp={&(0x7f0000000000), 0x1}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x3, 0x3a) setsockopt$inet6_int(r0, 0x29, 0x24, &(0x7f0000000000), 0x4) 2018/04/13 21:33:47 executing program 3: syz_emit_ethernet(0x8d, &(0x7f0000001240)={@link_local={0x1, 0x80, 0xc2}, @remote={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xbb}, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x11, 0x0, @dev={0xac, 0x14, 0x14}, @local={0xac, 0x14, 0x14, 0xaa}}, @icmp=@timestamp={0xd, 0x0, 0x0, 0xb}}}}}, &(0x7f0000001300)) 2018/04/13 21:33:47 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) prlimit64(0x0, 0x0, &(0x7f0000000000)={0x79}, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000780)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x40000004}, 0xc, &(0x7f0000000740)={&(0x7f0000000280)=@setlink={0x20, 0x13, 0x0, 0x0, 0x25dfdbfb}, 0x20}, 0x1}, 0x0) ioctl$KVM_GET_MSRS(r2, 0xc008ae88, &(0x7f0000000000)) 2018/04/13 21:33:47 executing program 0: r0 = openat$audio(0xffffffffffffff9c, &(0x7f0000000180)='/dev/audio\x00', 0x0, 0x0) close(r0) r1 = socket$packet(0x11, 0x3, 0x300) setsockopt$SO_TIMESTAMPING(r0, 0x1, 0x25, &(0x7f0000000100)=0x118, 0x4) sendto$inet6(r0, &(0x7f0000000200)="ffe5cc02af92c26f084801764d65", 0xe, 0x0, &(0x7f0000000140)={0xa, 0x0, 0x5, @dev={0xfe, 0x80}}, 0x1c) ppoll(&(0x7f0000000000)=[{r1}], 0x1, &(0x7f0000000240), &(0x7f0000000280), 0x8) 2018/04/13 21:33:47 executing program 5: r0 = memfd_create(&(0x7f0000000000)="17", 0x0) write$binfmt_elf32(r0, &(0x7f0000000140)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x38, 0x0, 0x0, 0x0, 0x20}, [{}]}, 0x58) execveat(r0, &(0x7f0000ff7000)='./file0\x00', &(0x7f0000000580), &(0x7f000034bff8)=[&(0x7f0000ff7000)="00000000000000060804002000fffc0c6565643b799365005f1b76"], 0x1000) 2018/04/13 21:33:47 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r1, r2, &(0x7f0000000000/0x18000)=nil, &(0x7f0000000240)=[@text64={0x40, &(0x7f00000001c0)="470f01c9440f0766b8ca000f00d8b9620b00000f322626660f38823b0f06c744240094000000c744240266950000c7442406000000000f011424b9600200000f3266b8e0008ee866baf80cb852ae7b83ef66bafc0cec", 0x56}], 0x1, 0x78, &(0x7f0000000280), 0x0) fremovexattr(0xffffffffffffffff, &(0x7f0000000140)=ANY=[@ANYPTR=&(0x7f0000000080)=ANY=[@ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00']]) ioctl$KVM_RUN(r2, 0xae80, 0x0) 2018/04/13 21:33:47 executing program 7: mq_notify(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0xfffffffffffffffc, 0x0, @thr={&(0x7f0000ce5fda), &(0x7f0000c51000)}}) 2018/04/13 21:33:47 executing program 6: perf_event_open(&(0x7f000001d000)={0x5, 0x78, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_bp={&(0x7f0000000000), 0x1}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x3, 0x3a) setsockopt$inet6_int(r0, 0x29, 0x24, &(0x7f0000000000), 0x4) 2018/04/13 21:33:47 executing program 7: mq_notify(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0xfffffffffffffffc, 0x0, @thr={&(0x7f0000ce5fda), &(0x7f0000c51000)}}) 2018/04/13 21:33:47 executing program 3: syz_emit_ethernet(0x8d, &(0x7f0000001240)={@link_local={0x1, 0x80, 0xc2}, @remote={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xbb}, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x11, 0x0, @dev={0xac, 0x14, 0x14}, @local={0xac, 0x14, 0x14, 0xaa}}, @icmp=@timestamp={0xd, 0x0, 0x0, 0xb}}}}}, &(0x7f0000001300)) [ 307.631216] kvm [21297]: vcpu0, guest rIP: 0xfff0 Hyper-V unhandled rdmsr: 0x40000004 2018/04/13 21:33:47 executing program 0: r0 = openat$audio(0xffffffffffffff9c, &(0x7f0000000180)='/dev/audio\x00', 0x0, 0x0) close(r0) r1 = socket$packet(0x11, 0x3, 0x300) setsockopt$SO_TIMESTAMPING(r0, 0x1, 0x25, &(0x7f0000000100)=0x118, 0x4) sendto$inet6(r0, &(0x7f0000000200)="ffe5cc02af92c26f084801764d65", 0xe, 0x0, &(0x7f0000000140)={0xa, 0x0, 0x5, @dev={0xfe, 0x80}}, 0x1c) ppoll(&(0x7f0000000000)=[{r1}], 0x1, &(0x7f0000000240), &(0x7f0000000280), 0x8) 2018/04/13 21:33:47 executing program 1: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000004fc8)={0x0, 0x0, &(0x7f0000004000)=[{&(0x7f0000000040)="240000001a0001000700fd686fa2f8bc02000d0000000000031d9994080019000103f21a", 0x24}], 0x1}, 0x0) 2018/04/13 21:33:47 executing program 5: r0 = memfd_create(&(0x7f0000000000)="17", 0x0) write$binfmt_elf32(r0, &(0x7f0000000140)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x38, 0x0, 0x0, 0x0, 0x20}, [{}]}, 0x58) execveat(r0, &(0x7f0000ff7000)='./file0\x00', &(0x7f0000000580), &(0x7f000034bff8)=[&(0x7f0000ff7000)="00000000000000060804002000fffc0c6565643b799365005f1b76"], 0x1000) 2018/04/13 21:33:47 executing program 2: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = memfd_create(&(0x7f000088f000)='b\n\x00', 0x4) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x0, 0x5011, r0, 0x0) ftruncate(r0, 0x0) 2018/04/13 21:33:47 executing program 7: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)={0x0, 0x0}) socket$kcm(0x29, 0x2, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000040)={0xffffffffffffffff, &(0x7f00000000c0)="b82283392dc50ff1fb635a5849d2f5916ae2fdc24e95e12aa8daccf7393e72be9cc66f"}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f0000346fd4)={0x0, 0x0, 0x0, 0x4, 0x21d}, 0xffffffffffffffeb) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x1, 0x5, &(0x7f0000346fc8)=@framed={{0x18}, [@alu={0x8000000201a7f19, 0x0, 0x7, 0x0, 0x1}], {0x95}}, &(0x7f0000f6bffb)='GPL\x00', 0x0, 0x299, &(0x7f00001a7f05)=""/251}, 0x18) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000140)={r0, 0x50, &(0x7f00000000c0)}, 0x10) socketpair$inet_icmp(0x16, 0x29, 0x2d, &(0x7f0000000400)) 2018/04/13 21:33:47 executing program 4: r0 = memfd_create(&(0x7f0000781ffe)="0010", 0x0) mmap(&(0x7f0000000000/0xaa2000)=nil, 0xaa2000, 0x20b, 0x12, r0, 0x0) rt_sigaction(0x7, &(0x7f0000aa8fe0)={0x401, {0x400003ffffffe}}, &(0x7f0000000140), 0x8, &(0x7f0000af1ff8)) syz_open_procfs(0x0, &(0x7f0000000080)='net/dev_snmp6\x00') 2018/04/13 21:33:47 executing program 3: syz_emit_ethernet(0x8d, &(0x7f0000001240)={@link_local={0x1, 0x80, 0xc2}, @remote={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xbb}, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x11, 0x0, @dev={0xac, 0x14, 0x14}, @local={0xac, 0x14, 0x14, 0xaa}}, @icmp=@timestamp={0xd, 0x0, 0x0, 0xb}}}}}, &(0x7f0000001300)) 2018/04/13 21:33:47 executing program 6: perf_event_open(&(0x7f000001d000)={0x5, 0x78, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_bp={&(0x7f0000000000), 0x1}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x3, 0x3a) setsockopt$inet6_int(r0, 0x29, 0x24, &(0x7f0000000000), 0x4) 2018/04/13 21:33:47 executing program 1: r0 = syz_open_dev$sndctrl(&(0x7f0000000000)='/dev/snd/controlC#\x00', 0x2, 0x0) ioctl$SNDRV_CTL_IOCTL_RAWMIDI_INFO(r0, 0xc10c5541, &(0x7f0000000040)={0x0, 0x6}) 2018/04/13 21:33:47 executing program 0: r0 = openat$audio(0xffffffffffffff9c, &(0x7f0000000180)='/dev/audio\x00', 0x0, 0x0) close(r0) r1 = socket$packet(0x11, 0x3, 0x300) setsockopt$SO_TIMESTAMPING(r0, 0x1, 0x25, &(0x7f0000000100)=0x118, 0x4) sendto$inet6(r0, &(0x7f0000000200)="ffe5cc02af92c26f084801764d65", 0xe, 0x0, &(0x7f0000000140)={0xa, 0x0, 0x5, @dev={0xfe, 0x80}}, 0x1c) ppoll(&(0x7f0000000000)=[{r1}], 0x1, &(0x7f0000000240), &(0x7f0000000280), 0x8) 2018/04/13 21:33:47 executing program 4: mmap(&(0x7f0000000000/0xefa000)=nil, 0xefa000, 0x1000001, 0x32, 0xffffffffffffffff, 0x0) capget(&(0x7f0000000100), &(0x7f0000000140)) 2018/04/13 21:33:47 executing program 5: r0 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000008ff1)='/dev/sequencer\x00', 0x1, 0x0) ioctl$EVIOCGLED(r0, 0xc0046d00, &(0x7f0000007000)) 2018/04/13 21:33:47 executing program 7: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)={0x0, 0x0}) socket$kcm(0x29, 0x2, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000040)={0xffffffffffffffff, &(0x7f00000000c0)="b82283392dc50ff1fb635a5849d2f5916ae2fdc24e95e12aa8daccf7393e72be9cc66f"}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f0000346fd4)={0x0, 0x0, 0x0, 0x4, 0x21d}, 0xffffffffffffffeb) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x1, 0x5, &(0x7f0000346fc8)=@framed={{0x18}, [@alu={0x8000000201a7f19, 0x0, 0x7, 0x0, 0x1}], {0x95}}, &(0x7f0000f6bffb)='GPL\x00', 0x0, 0x299, &(0x7f00001a7f05)=""/251}, 0x18) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000140)={r0, 0x50, &(0x7f00000000c0)}, 0x10) socketpair$inet_icmp(0x16, 0x29, 0x2d, &(0x7f0000000400)) 2018/04/13 21:33:47 executing program 2: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = memfd_create(&(0x7f000088f000)='b\n\x00', 0x4) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x0, 0x5011, r0, 0x0) ftruncate(r0, 0x0) 2018/04/13 21:33:47 executing program 5: r0 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000008ff1)='/dev/sequencer\x00', 0x1, 0x0) ioctl$EVIOCGLED(r0, 0xc0046d00, &(0x7f0000007000)) 2018/04/13 21:33:47 executing program 6: r0 = socket$inet6(0xa, 0x3, 0x1) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f0000f68000)={@loopback={0x0, 0x1}, 0x800, 0x0, 0xff, 0x1}, 0x20) setsockopt$inet6_int(r0, 0x29, 0x21, &(0x7f000089b000)=0xffffffffffffffff, 0x4) connect$inet6(r0, &(0x7f000000cfe4)={0xa, 0x0, 0x807}, 0x1c) sendmmsg(r0, &(0x7f0000008a00)=[{{0x0, 0x0, &(0x7f0000000040), 0x0, &(0x7f0000000040)=[{0x18, 0x29, 0xb, '\x00'}], 0x18}}], 0x1, 0x0) 2018/04/13 21:33:47 executing program 1: r0 = syz_open_dev$sndctrl(&(0x7f0000000000)='/dev/snd/controlC#\x00', 0x2, 0x0) ioctl$SNDRV_CTL_IOCTL_RAWMIDI_INFO(r0, 0xc10c5541, &(0x7f0000000040)={0x0, 0x6}) 2018/04/13 21:33:47 executing program 4: mmap(&(0x7f0000000000/0xefa000)=nil, 0xefa000, 0x1000001, 0x32, 0xffffffffffffffff, 0x0) capget(&(0x7f0000000100), &(0x7f0000000140)) 2018/04/13 21:33:47 executing program 3: syz_emit_ethernet(0x8d, &(0x7f0000001240)={@link_local={0x1, 0x80, 0xc2}, @remote={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xbb}, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x11, 0x0, @dev={0xac, 0x14, 0x14}, @local={0xac, 0x14, 0x14, 0xaa}}, @icmp=@timestamp={0xd, 0x0, 0x0, 0xb}}}}}, &(0x7f0000001300)) 2018/04/13 21:33:47 executing program 0: r0 = openat$audio(0xffffffffffffff9c, &(0x7f0000000180)='/dev/audio\x00', 0x0, 0x0) close(r0) r1 = socket$packet(0x11, 0x3, 0x300) setsockopt$SO_TIMESTAMPING(r0, 0x1, 0x25, &(0x7f0000000100)=0x118, 0x4) sendto$inet6(r0, &(0x7f0000000200)="ffe5cc02af92c26f084801764d65", 0xe, 0x0, &(0x7f0000000140)={0xa, 0x0, 0x5, @dev={0xfe, 0x80}}, 0x1c) ppoll(&(0x7f0000000000)=[{r1}], 0x1, &(0x7f0000000240), &(0x7f0000000280), 0x8) 2018/04/13 21:33:47 executing program 7: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)={0x0, 0x0}) socket$kcm(0x29, 0x2, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000040)={0xffffffffffffffff, &(0x7f00000000c0)="b82283392dc50ff1fb635a5849d2f5916ae2fdc24e95e12aa8daccf7393e72be9cc66f"}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f0000346fd4)={0x0, 0x0, 0x0, 0x4, 0x21d}, 0xffffffffffffffeb) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x1, 0x5, &(0x7f0000346fc8)=@framed={{0x18}, [@alu={0x8000000201a7f19, 0x0, 0x7, 0x0, 0x1}], {0x95}}, &(0x7f0000f6bffb)='GPL\x00', 0x0, 0x299, &(0x7f00001a7f05)=""/251}, 0x18) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000140)={r0, 0x50, &(0x7f00000000c0)}, 0x10) socketpair$inet_icmp(0x16, 0x29, 0x2d, &(0x7f0000000400)) 2018/04/13 21:33:47 executing program 1: r0 = syz_open_dev$sndctrl(&(0x7f0000000000)='/dev/snd/controlC#\x00', 0x2, 0x0) ioctl$SNDRV_CTL_IOCTL_RAWMIDI_INFO(r0, 0xc10c5541, &(0x7f0000000040)={0x0, 0x6}) 2018/04/13 21:33:47 executing program 2: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = memfd_create(&(0x7f000088f000)='b\n\x00', 0x4) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x0, 0x5011, r0, 0x0) ftruncate(r0, 0x0) 2018/04/13 21:33:47 executing program 5: r0 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000008ff1)='/dev/sequencer\x00', 0x1, 0x0) ioctl$EVIOCGLED(r0, 0xc0046d00, &(0x7f0000007000)) 2018/04/13 21:33:47 executing program 6: r0 = socket$inet6(0xa, 0x3, 0x1) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f0000f68000)={@loopback={0x0, 0x1}, 0x800, 0x0, 0xff, 0x1}, 0x20) setsockopt$inet6_int(r0, 0x29, 0x21, &(0x7f000089b000)=0xffffffffffffffff, 0x4) connect$inet6(r0, &(0x7f000000cfe4)={0xa, 0x0, 0x807}, 0x1c) sendmmsg(r0, &(0x7f0000008a00)=[{{0x0, 0x0, &(0x7f0000000040), 0x0, &(0x7f0000000040)=[{0x18, 0x29, 0xb, '\x00'}], 0x18}}], 0x1, 0x0) 2018/04/13 21:33:47 executing program 4: mmap(&(0x7f0000000000/0xefa000)=nil, 0xefa000, 0x1000001, 0x32, 0xffffffffffffffff, 0x0) capget(&(0x7f0000000100), &(0x7f0000000140)) 2018/04/13 21:33:47 executing program 3: r0 = epoll_create1(0x0) getsockopt$inet_sctp_SCTP_RECONFIG_SUPPORTED(0xffffffffffffffff, 0x84, 0x75, &(0x7f0000000380)={0x0, 0x4}, &(0x7f00000003c0)=0x8) r1 = syz_open_dev$binder(&(0x7f0000000000)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) ioctl$BINDER_SET_CONTEXT_MGR(r1, 0x40046207, 0x0) ioctl$BINDER_WRITE_READ(r1, 0xc0306201, &(0x7f0000007fd0)={0x0, 0x0, &(0x7f0000004000), 0x48, 0x0, &(0x7f000000d000)="62164b44a5c310affb2298c023c7036e8915400419dae89cc59e3878ffffff00000000f7d7000003000000070718d1fc0e41a052600c828100000000000000bf244f0f2cc508303a"}) ioctl$BINDER_WRITE_READ(r1, 0xc0306201, &(0x7f0000000300)={0x5c, 0x0, &(0x7f0000000240)=[@request_death={0x400c630e, 0x0, 0x3}, @transaction_sg={0x40486311, {{0x0, 0x0, 0x3, 0x0, 0x1, 0x0, 0x0, 0x40, 0x28, &(0x7f00000001c0)=[@fd={0x66642a85, 0x0, 0xffffffffffffffff, 0x0, 0x1}, @ptr={0x70742a85, 0x0, &(0x7f0000000180), 0x1, 0x2, 0x2e}], &(0x7f0000000200)=[0x20, 0x0, 0x20, 0x38, 0x58]}}}], 0x19, 0x0, &(0x7f00000002c0)="249e929e732104d610f5d4594c04343b56ecfa05bae28b4b24"}) r2 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vga_arbiter\x00', 0x10000, 0x0) ioctl$RNDADDTOENTCNT(r2, 0x40045201, &(0x7f00000000c0)=0x6) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, 0xffffffffffffffff, &(0x7f0000000080)) r3 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000340)='/dev/ppp\x00', 0x105800, 0x0) ioctl$KVM_XEN_HVM_CONFIG(r3, 0x4038ae7a, &(0x7f0000000440)={0xbc, 0xc0000082, &(0x7f0000000140)="1c000687aefb31d3be546bdab483fcaf0f6fd7edc82638c55138d2409c01a50a8d38cd1b11aff1a1416139bf", &(0x7f0000000400)="880380d0fdca18", 0x2c, 0x7}) mmap$binder(&(0x7f0000000000/0x1000)=nil, 0x1000, 0x0, 0x12, r1, 0x0) perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r4 = socket$inet6(0xa, 0x80003, 0xff) setsockopt$inet6_int(r4, 0x29, 0x16, &(0x7f0000fcb000), 0x4) setsockopt$inet6_int(r4, 0x29, 0x16, &(0x7f0000fcb000), 0x4) ioctl$SNDRV_CTL_IOCTL_TLV_COMMAND(r4, 0xc008551c, &(0x7f0000000100)={0xffffffff, 0xc, [0xe113, 0xffffffffffff8001, 0x47b3b076]}) 2018/04/13 21:33:47 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000580)={0x26, 'skcipher\x00', 0x0, 0x0, 'cts(cbc(blowfish))\x00'}, 0x58) bind$alg(r0, &(0x7f0000000640)={0x26, 'rng\x00', 0x0, 0x0, 'drbg_pr_sha256\x00'}, 0x58) 2018/04/13 21:33:47 executing program 1: r0 = syz_open_dev$sndctrl(&(0x7f0000000000)='/dev/snd/controlC#\x00', 0x2, 0x0) ioctl$SNDRV_CTL_IOCTL_RAWMIDI_INFO(r0, 0xc10c5541, &(0x7f0000000040)={0x0, 0x6}) 2018/04/13 21:33:47 executing program 7: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)={0x0, 0x0}) socket$kcm(0x29, 0x2, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000040)={0xffffffffffffffff, &(0x7f00000000c0)="b82283392dc50ff1fb635a5849d2f5916ae2fdc24e95e12aa8daccf7393e72be9cc66f"}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f0000346fd4)={0x0, 0x0, 0x0, 0x4, 0x21d}, 0xffffffffffffffeb) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x1, 0x5, &(0x7f0000346fc8)=@framed={{0x18}, [@alu={0x8000000201a7f19, 0x0, 0x7, 0x0, 0x1}], {0x95}}, &(0x7f0000f6bffb)='GPL\x00', 0x0, 0x299, &(0x7f00001a7f05)=""/251}, 0x18) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000140)={r0, 0x50, &(0x7f00000000c0)}, 0x10) socketpair$inet_icmp(0x16, 0x29, 0x2d, &(0x7f0000000400)) 2018/04/13 21:33:47 executing program 2: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = memfd_create(&(0x7f000088f000)='b\n\x00', 0x4) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x0, 0x5011, r0, 0x0) ftruncate(r0, 0x0) 2018/04/13 21:33:47 executing program 5: r0 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000008ff1)='/dev/sequencer\x00', 0x1, 0x0) ioctl$EVIOCGLED(r0, 0xc0046d00, &(0x7f0000007000)) 2018/04/13 21:33:47 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000580)={0x26, 'skcipher\x00', 0x0, 0x0, 'cts(cbc(blowfish))\x00'}, 0x58) bind$alg(r0, &(0x7f0000000640)={0x26, 'rng\x00', 0x0, 0x0, 'drbg_pr_sha256\x00'}, 0x58) 2018/04/13 21:33:47 executing program 4: mmap(&(0x7f0000000000/0xefa000)=nil, 0xefa000, 0x1000001, 0x32, 0xffffffffffffffff, 0x0) capget(&(0x7f0000000100), &(0x7f0000000140)) 2018/04/13 21:33:47 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r1, r2, &(0x7f000000d000/0x18000)=nil, &(0x7f00000000c0)=[@text64={0x40, &(0x7f0000000480)="440f20c0350a000000440f22c0f36436470f22c626f3410f009575430000400f2324c74424000a000000c7442402081f0000c7442406000000000f011c2426263e650f01cab9bf090000b800a00000ba000000000f30b9800000c00f3235000100000f3048b81b110000000000000f23d80f21f835c00000f00f23f8c481f9f7fc", 0x81}], 0x1, 0x0, &(0x7f0000000200), 0x0) r3 = dup3(r2, r0, 0x0) ioctl$KVM_RUN(r3, 0xae80, 0x0) 2018/04/13 21:33:47 executing program 6: r0 = socket$inet6(0xa, 0x3, 0x1) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f0000f68000)={@loopback={0x0, 0x1}, 0x800, 0x0, 0xff, 0x1}, 0x20) setsockopt$inet6_int(r0, 0x29, 0x21, &(0x7f000089b000)=0xffffffffffffffff, 0x4) connect$inet6(r0, &(0x7f000000cfe4)={0xa, 0x0, 0x807}, 0x1c) sendmmsg(r0, &(0x7f0000008a00)=[{{0x0, 0x0, &(0x7f0000000040), 0x0, &(0x7f0000000040)=[{0x18, 0x29, 0xb, '\x00'}], 0x18}}], 0x1, 0x0) [ 309.082661] binder: 21386:21417 BC_REQUEST_DEATH_NOTIFICATION invalid ref 0 [ 309.089884] binder_alloc: 21386: binder_alloc_buf, no vma [ 309.095480] binder: 21386:21417 transaction failed 29189/-3, size 64-40 line 2963 [ 309.254503] binder: BINDER_SET_CONTEXT_MGR already set [ 309.259854] binder: 21386:21417 ioctl 40046207 0 returned -16 [ 309.263390] binder: 21386:21418 ioctl c0306201 20000300 returned -14 [ 309.276209] binder_alloc: binder_alloc_mmap_handler: 21386 20000000-20001000 already mapped failed -16 2018/04/13 21:33:48 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r1, r2, &(0x7f000000d000/0x18000)=nil, &(0x7f00000000c0)=[@text64={0x40, &(0x7f0000000480)="440f20c0350a000000440f22c0f36436470f22c626f3410f009575430000400f2324c74424000a000000c7442402081f0000c7442406000000000f011c2426263e650f01cab9bf090000b800a00000ba000000000f30b9800000c00f3235000100000f3048b81b110000000000000f23d80f21f835c00000f00f23f8c481f9f7fc", 0x81}], 0x1, 0x0, &(0x7f0000000200), 0x0) r3 = dup3(r2, r0, 0x0) ioctl$KVM_RUN(r3, 0xae80, 0x0) 2018/04/13 21:33:48 executing program 7: r0 = socket(0x10, 0x3, 0x0) ioctl$sock_ifreq(r0, 0x89f2, &(0x7f0000000080)={"73697430000880000000000000000002", @ifru_addrs=@in={0x2, 0x4e20, @rand_addr}}) 2018/04/13 21:33:48 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000e5b000)={0x2, 0x4e20, @multicast1=0xe0000001}, 0x10) connect$inet(r0, &(0x7f0000ccb000)={0x2, 0x4e20}, 0x10) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x1, 0x3, &(0x7f00009ff000)=@framed={{0x18}, [], {0x95}}, &(0x7f00002bf000)='syzkaller\x00', 0x4, 0xb7, &(0x7f0000000040)=""/183}, 0x48) r2 = socket$kcm(0x29, 0x5, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r2, 0x89e0, &(0x7f000031aff8)={r0, r1}) setsockopt$sock_int(r0, 0x1, 0x20, &(0x7f0000000180), 0x4) 2018/04/13 21:33:48 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000580)={0x26, 'skcipher\x00', 0x0, 0x0, 'cts(cbc(blowfish))\x00'}, 0x58) bind$alg(r0, &(0x7f0000000640)={0x26, 'rng\x00', 0x0, 0x0, 'drbg_pr_sha256\x00'}, 0x58) 2018/04/13 21:33:48 executing program 6: r0 = socket$inet6(0xa, 0x3, 0x1) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f0000f68000)={@loopback={0x0, 0x1}, 0x800, 0x0, 0xff, 0x1}, 0x20) setsockopt$inet6_int(r0, 0x29, 0x21, &(0x7f000089b000)=0xffffffffffffffff, 0x4) connect$inet6(r0, &(0x7f000000cfe4)={0xa, 0x0, 0x807}, 0x1c) sendmmsg(r0, &(0x7f0000008a00)=[{{0x0, 0x0, &(0x7f0000000040), 0x0, &(0x7f0000000040)=[{0x18, 0x29, 0xb, '\x00'}], 0x18}}], 0x1, 0x0) 2018/04/13 21:33:48 executing program 5: io_setup(0x3fa, &(0x7f0000000440)=0x0) io_getevents(r0, 0x2, 0x0, &(0x7f0000af2fc0), &(0x7f0000fa5ff0)={0x0, 0xfffffffffffff000}) clone(0x0, &(0x7f0000000040), &(0x7f0000000100), &(0x7f0000000140), &(0x7f0000000180)) kcmp$KCMP_EPOLL_TFD(0x0, 0x0, 0x7, 0xffffffffffffffff, &(0x7f00000006c0)={0xffffffffffffffff, 0xffffffffffffffff, 0x6400000000000000}) socketpair$inet(0x2, 0x7, 0x0, &(0x7f00000001c0)) syz_open_dev$mice(&(0x7f0000000000)='/dev/input/mice\x00', 0x0, 0x0) getsockopt$ARPT_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x60, &(0x7f0000000040)={'filter\x00'}, &(0x7f00000000c0)=0x44) io_destroy(r0) 2018/04/13 21:33:48 executing program 4: r0 = socket$inet6(0xa, 0x1, 0x84) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x4e20, 0x0, @loopback={0x0, 0x1}}, 0x1c) perf_event_open(&(0x7f000001d000)={0x5, 0x78, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_bp={&(0x7f0000000000), 0x1}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getsockopt$bt_hci(r0, 0x84, 0x6, &(0x7f0000000080)=""/4096, &(0x7f0000000000)=0x1000) 2018/04/13 21:33:48 executing program 3: r0 = epoll_create1(0x0) getsockopt$inet_sctp_SCTP_RECONFIG_SUPPORTED(0xffffffffffffffff, 0x84, 0x75, &(0x7f0000000380)={0x0, 0x4}, &(0x7f00000003c0)=0x8) r1 = syz_open_dev$binder(&(0x7f0000000000)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) ioctl$BINDER_SET_CONTEXT_MGR(r1, 0x40046207, 0x0) ioctl$BINDER_WRITE_READ(r1, 0xc0306201, &(0x7f0000007fd0)={0x0, 0x0, &(0x7f0000004000), 0x48, 0x0, &(0x7f000000d000)="62164b44a5c310affb2298c023c7036e8915400419dae89cc59e3878ffffff00000000f7d7000003000000070718d1fc0e41a052600c828100000000000000bf244f0f2cc508303a"}) ioctl$BINDER_WRITE_READ(r1, 0xc0306201, &(0x7f0000000300)={0x5c, 0x0, &(0x7f0000000240)=[@request_death={0x400c630e, 0x0, 0x3}, @transaction_sg={0x40486311, {{0x0, 0x0, 0x3, 0x0, 0x1, 0x0, 0x0, 0x40, 0x28, &(0x7f00000001c0)=[@fd={0x66642a85, 0x0, 0xffffffffffffffff, 0x0, 0x1}, @ptr={0x70742a85, 0x0, &(0x7f0000000180), 0x1, 0x2, 0x2e}], &(0x7f0000000200)=[0x20, 0x0, 0x20, 0x38, 0x58]}}}], 0x19, 0x0, &(0x7f00000002c0)="249e929e732104d610f5d4594c04343b56ecfa05bae28b4b24"}) r2 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vga_arbiter\x00', 0x10000, 0x0) ioctl$RNDADDTOENTCNT(r2, 0x40045201, &(0x7f00000000c0)=0x6) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, 0xffffffffffffffff, &(0x7f0000000080)) r3 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000340)='/dev/ppp\x00', 0x105800, 0x0) ioctl$KVM_XEN_HVM_CONFIG(r3, 0x4038ae7a, &(0x7f0000000440)={0xbc, 0xc0000082, &(0x7f0000000140)="1c000687aefb31d3be546bdab483fcaf0f6fd7edc82638c55138d2409c01a50a8d38cd1b11aff1a1416139bf", &(0x7f0000000400)="880380d0fdca18", 0x2c, 0x7}) mmap$binder(&(0x7f0000000000/0x1000)=nil, 0x1000, 0x0, 0x12, r1, 0x0) perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r4 = socket$inet6(0xa, 0x80003, 0xff) setsockopt$inet6_int(r4, 0x29, 0x16, &(0x7f0000fcb000), 0x4) setsockopt$inet6_int(r4, 0x29, 0x16, &(0x7f0000fcb000), 0x4) ioctl$SNDRV_CTL_IOCTL_TLV_COMMAND(r4, 0xc008551c, &(0x7f0000000100)={0xffffffff, 0xc, [0xe113, 0xffffffffffff8001, 0x47b3b076]}) [ 309.399239] binder: undelivered TRANSACTION_ERROR: 29189 2018/04/13 21:33:49 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000580)={0x26, 'skcipher\x00', 0x0, 0x0, 'cts(cbc(blowfish))\x00'}, 0x58) bind$alg(r0, &(0x7f0000000640)={0x26, 'rng\x00', 0x0, 0x0, 'drbg_pr_sha256\x00'}, 0x58) 2018/04/13 21:33:49 executing program 7: r0 = socket(0x10, 0x3, 0x0) ioctl$sock_ifreq(r0, 0x89f2, &(0x7f0000000080)={"73697430000880000000000000000002", @ifru_addrs=@in={0x2, 0x4e20, @rand_addr}}) 2018/04/13 21:33:49 executing program 6: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x10000000006}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f00009f8000)='./file0\x00', &(0x7f00000000c0)='./file0\x00', &(0x7f00005f7ffb)='nfs4\x00', 0x0, &(0x7f000000a000)) 2018/04/13 21:33:49 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000e5b000)={0x2, 0x4e20, @multicast1=0xe0000001}, 0x10) connect$inet(r0, &(0x7f0000ccb000)={0x2, 0x4e20}, 0x10) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x1, 0x3, &(0x7f00009ff000)=@framed={{0x18}, [], {0x95}}, &(0x7f00002bf000)='syzkaller\x00', 0x4, 0xb7, &(0x7f0000000040)=""/183}, 0x48) r2 = socket$kcm(0x29, 0x5, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r2, 0x89e0, &(0x7f000031aff8)={r0, r1}) setsockopt$sock_int(r0, 0x1, 0x20, &(0x7f0000000180), 0x4) 2018/04/13 21:33:49 executing program 4: r0 = socket$inet6(0xa, 0x1, 0x84) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x4e20, 0x0, @loopback={0x0, 0x1}}, 0x1c) perf_event_open(&(0x7f000001d000)={0x5, 0x78, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_bp={&(0x7f0000000000), 0x1}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getsockopt$bt_hci(r0, 0x84, 0x6, &(0x7f0000000080)=""/4096, &(0x7f0000000000)=0x1000) 2018/04/13 21:33:49 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r1, r2, &(0x7f000000d000/0x18000)=nil, &(0x7f00000000c0)=[@text64={0x40, &(0x7f0000000480)="440f20c0350a000000440f22c0f36436470f22c626f3410f009575430000400f2324c74424000a000000c7442402081f0000c7442406000000000f011c2426263e650f01cab9bf090000b800a00000ba000000000f30b9800000c00f3235000100000f3048b81b110000000000000f23d80f21f835c00000f00f23f8c481f9f7fc", 0x81}], 0x1, 0x0, &(0x7f0000000200), 0x0) r3 = dup3(r2, r0, 0x0) ioctl$KVM_RUN(r3, 0xae80, 0x0) 2018/04/13 21:33:49 executing program 0: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000240)='./cgroup.cpu\x00', 0x200002, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000000080)='cgroup.procs\x00', 0x2, 0x0) write$cgroup_pid(r1, &(0x7f0000000100)=ANY=[@ANYBLOB='1'], 0x1) 2018/04/13 21:33:49 executing program 7: r0 = socket(0x10, 0x3, 0x0) ioctl$sock_ifreq(r0, 0x89f2, &(0x7f0000000080)={"73697430000880000000000000000002", @ifru_addrs=@in={0x2, 0x4e20, @rand_addr}}) 2018/04/13 21:33:49 executing program 6: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x10000000006}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f00009f8000)='./file0\x00', &(0x7f00000000c0)='./file0\x00', &(0x7f00005f7ffb)='nfs4\x00', 0x0, &(0x7f000000a000)) [ 310.269839] binder: 21436:21472 BC_REQUEST_DEATH_NOTIFICATION invalid ref 0 [ 310.277569] binder_alloc: 21436: binder_alloc_buf, no vma [ 310.283169] binder: 21436:21472 transaction failed 29189/-3, size 64-40 line 2963 2018/04/13 21:33:50 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000e5b000)={0x2, 0x4e20, @multicast1=0xe0000001}, 0x10) connect$inet(r0, &(0x7f0000ccb000)={0x2, 0x4e20}, 0x10) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x1, 0x3, &(0x7f00009ff000)=@framed={{0x18}, [], {0x95}}, &(0x7f00002bf000)='syzkaller\x00', 0x4, 0xb7, &(0x7f0000000040)=""/183}, 0x48) r2 = socket$kcm(0x29, 0x5, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r2, 0x89e0, &(0x7f000031aff8)={r0, r1}) setsockopt$sock_int(r0, 0x1, 0x20, &(0x7f0000000180), 0x4) 2018/04/13 21:33:50 executing program 7: r0 = socket(0x10, 0x3, 0x0) ioctl$sock_ifreq(r0, 0x89f2, &(0x7f0000000080)={"73697430000880000000000000000002", @ifru_addrs=@in={0x2, 0x4e20, @rand_addr}}) 2018/04/13 21:33:50 executing program 6: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x10000000006}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f00009f8000)='./file0\x00', &(0x7f00000000c0)='./file0\x00', &(0x7f00005f7ffb)='nfs4\x00', 0x0, &(0x7f000000a000)) 2018/04/13 21:33:50 executing program 5: io_setup(0x3fa, &(0x7f0000000440)=0x0) io_getevents(r0, 0x2, 0x0, &(0x7f0000af2fc0), &(0x7f0000fa5ff0)={0x0, 0xfffffffffffff000}) clone(0x0, &(0x7f0000000040), &(0x7f0000000100), &(0x7f0000000140), &(0x7f0000000180)) kcmp$KCMP_EPOLL_TFD(0x0, 0x0, 0x7, 0xffffffffffffffff, &(0x7f00000006c0)={0xffffffffffffffff, 0xffffffffffffffff, 0x6400000000000000}) socketpair$inet(0x2, 0x7, 0x0, &(0x7f00000001c0)) syz_open_dev$mice(&(0x7f0000000000)='/dev/input/mice\x00', 0x0, 0x0) getsockopt$ARPT_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x60, &(0x7f0000000040)={'filter\x00'}, &(0x7f00000000c0)=0x44) io_destroy(r0) 2018/04/13 21:33:50 executing program 0: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000240)='./cgroup.cpu\x00', 0x200002, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000000080)='cgroup.procs\x00', 0x2, 0x0) write$cgroup_pid(r1, &(0x7f0000000100)=ANY=[@ANYBLOB='1'], 0x1) 2018/04/13 21:33:50 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r1, r2, &(0x7f000000d000/0x18000)=nil, &(0x7f00000000c0)=[@text64={0x40, &(0x7f0000000480)="440f20c0350a000000440f22c0f36436470f22c626f3410f009575430000400f2324c74424000a000000c7442402081f0000c7442406000000000f011c2426263e650f01cab9bf090000b800a00000ba000000000f30b9800000c00f3235000100000f3048b81b110000000000000f23d80f21f835c00000f00f23f8c481f9f7fc", 0x81}], 0x1, 0x0, &(0x7f0000000200), 0x0) r3 = dup3(r2, r0, 0x0) ioctl$KVM_RUN(r3, 0xae80, 0x0) 2018/04/13 21:33:50 executing program 3: r0 = epoll_create1(0x0) getsockopt$inet_sctp_SCTP_RECONFIG_SUPPORTED(0xffffffffffffffff, 0x84, 0x75, &(0x7f0000000380)={0x0, 0x4}, &(0x7f00000003c0)=0x8) r1 = syz_open_dev$binder(&(0x7f0000000000)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) ioctl$BINDER_SET_CONTEXT_MGR(r1, 0x40046207, 0x0) ioctl$BINDER_WRITE_READ(r1, 0xc0306201, &(0x7f0000007fd0)={0x0, 0x0, &(0x7f0000004000), 0x48, 0x0, &(0x7f000000d000)="62164b44a5c310affb2298c023c7036e8915400419dae89cc59e3878ffffff00000000f7d7000003000000070718d1fc0e41a052600c828100000000000000bf244f0f2cc508303a"}) ioctl$BINDER_WRITE_READ(r1, 0xc0306201, &(0x7f0000000300)={0x5c, 0x0, &(0x7f0000000240)=[@request_death={0x400c630e, 0x0, 0x3}, @transaction_sg={0x40486311, {{0x0, 0x0, 0x3, 0x0, 0x1, 0x0, 0x0, 0x40, 0x28, &(0x7f00000001c0)=[@fd={0x66642a85, 0x0, 0xffffffffffffffff, 0x0, 0x1}, @ptr={0x70742a85, 0x0, &(0x7f0000000180), 0x1, 0x2, 0x2e}], &(0x7f0000000200)=[0x20, 0x0, 0x20, 0x38, 0x58]}}}], 0x19, 0x0, &(0x7f00000002c0)="249e929e732104d610f5d4594c04343b56ecfa05bae28b4b24"}) r2 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vga_arbiter\x00', 0x10000, 0x0) ioctl$RNDADDTOENTCNT(r2, 0x40045201, &(0x7f00000000c0)=0x6) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, 0xffffffffffffffff, &(0x7f0000000080)) r3 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000340)='/dev/ppp\x00', 0x105800, 0x0) ioctl$KVM_XEN_HVM_CONFIG(r3, 0x4038ae7a, &(0x7f0000000440)={0xbc, 0xc0000082, &(0x7f0000000140)="1c000687aefb31d3be546bdab483fcaf0f6fd7edc82638c55138d2409c01a50a8d38cd1b11aff1a1416139bf", &(0x7f0000000400)="880380d0fdca18", 0x2c, 0x7}) mmap$binder(&(0x7f0000000000/0x1000)=nil, 0x1000, 0x0, 0x12, r1, 0x0) perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r4 = socket$inet6(0xa, 0x80003, 0xff) setsockopt$inet6_int(r4, 0x29, 0x16, &(0x7f0000fcb000), 0x4) setsockopt$inet6_int(r4, 0x29, 0x16, &(0x7f0000fcb000), 0x4) ioctl$SNDRV_CTL_IOCTL_TLV_COMMAND(r4, 0xc008551c, &(0x7f0000000100)={0xffffffff, 0xc, [0xe113, 0xffffffffffff8001, 0x47b3b076]}) 2018/04/13 21:33:50 executing program 4: r0 = socket$inet6(0xa, 0x1, 0x84) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x4e20, 0x0, @loopback={0x0, 0x1}}, 0x1c) perf_event_open(&(0x7f000001d000)={0x5, 0x78, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_bp={&(0x7f0000000000), 0x1}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getsockopt$bt_hci(r0, 0x84, 0x6, &(0x7f0000000080)=""/4096, &(0x7f0000000000)=0x1000) [ 310.442199] binder: undelivered TRANSACTION_ERROR: 29189 2018/04/13 21:33:50 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000e5b000)={0x2, 0x4e20, @multicast1=0xe0000001}, 0x10) connect$inet(r0, &(0x7f0000ccb000)={0x2, 0x4e20}, 0x10) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x1, 0x3, &(0x7f00009ff000)=@framed={{0x18}, [], {0x95}}, &(0x7f00002bf000)='syzkaller\x00', 0x4, 0xb7, &(0x7f0000000040)=""/183}, 0x48) r2 = socket$kcm(0x29, 0x5, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r2, 0x89e0, &(0x7f000031aff8)={r0, r1}) setsockopt$sock_int(r0, 0x1, 0x20, &(0x7f0000000180), 0x4) 2018/04/13 21:33:50 executing program 7: io_setup(0x3fa, &(0x7f0000000440)=0x0) io_getevents(r0, 0x2, 0x0, &(0x7f0000af2fc0), &(0x7f0000fa5ff0)={0x0, 0xfffffffffffff000}) clone(0x0, &(0x7f0000000040), &(0x7f0000000100), &(0x7f0000000140), &(0x7f0000000180)) kcmp$KCMP_EPOLL_TFD(0x0, 0x0, 0x7, 0xffffffffffffffff, &(0x7f00000006c0)={0xffffffffffffffff, 0xffffffffffffffff, 0x6400000000000000}) socketpair$inet(0x2, 0x7, 0x0, &(0x7f00000001c0)) syz_open_dev$mice(&(0x7f0000000000)='/dev/input/mice\x00', 0x0, 0x0) getsockopt$ARPT_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x60, &(0x7f0000000040)={'filter\x00'}, &(0x7f00000000c0)=0x44) io_destroy(r0) 2018/04/13 21:33:50 executing program 6: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x10000000006}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f00009f8000)='./file0\x00', &(0x7f00000000c0)='./file0\x00', &(0x7f00005f7ffb)='nfs4\x00', 0x0, &(0x7f000000a000)) 2018/04/13 21:33:50 executing program 0: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000240)='./cgroup.cpu\x00', 0x200002, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000000080)='cgroup.procs\x00', 0x2, 0x0) write$cgroup_pid(r1, &(0x7f0000000100)=ANY=[@ANYBLOB='1'], 0x1) 2018/04/13 21:33:50 executing program 2: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_kcm_SIOCKCMUNATTACH(r0, 0x89e1, &(0x7f0000000440)) 2018/04/13 21:33:50 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000b8fa8)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-des3_ede-asm\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000001f3a)="ad56b6c5820faeb995298992ea54c7beef9f5d56534c90c2", 0x18) r1 = accept$alg(r0, 0x0, 0x0) io_setup(0x302, &(0x7f0000e4b000)=0x0) io_submit(r2, 0x1, &(0x7f0000bd9fe0)=[&(0x7f0000617fc0)={0x0, 0x0, 0x0, 0x0, 0x0, r1, &(0x7f000007d000)="b3", 0x1}]) 2018/04/13 21:33:50 executing program 4: r0 = socket$inet6(0xa, 0x1, 0x84) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x4e20, 0x0, @loopback={0x0, 0x1}}, 0x1c) perf_event_open(&(0x7f000001d000)={0x5, 0x78, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_bp={&(0x7f0000000000), 0x1}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getsockopt$bt_hci(r0, 0x84, 0x6, &(0x7f0000000080)=""/4096, &(0x7f0000000000)=0x1000) [ 311.316468] binder: 21489:21515 BC_REQUEST_DEATH_NOTIFICATION invalid ref 0 [ 311.323665] binder_alloc: 21489: binder_alloc_buf, no vma [ 311.329260] binder: 21489:21515 transaction failed 29189/-3, size 64-40 line 2963 2018/04/13 21:33:51 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$inet_opts(r0, 0x0, 0x10, &(0x7f00000001c0)="17", 0x1) 2018/04/13 21:33:51 executing program 5: io_setup(0x3fa, &(0x7f0000000440)=0x0) io_getevents(r0, 0x2, 0x0, &(0x7f0000af2fc0), &(0x7f0000fa5ff0)={0x0, 0xfffffffffffff000}) clone(0x0, &(0x7f0000000040), &(0x7f0000000100), &(0x7f0000000140), &(0x7f0000000180)) kcmp$KCMP_EPOLL_TFD(0x0, 0x0, 0x7, 0xffffffffffffffff, &(0x7f00000006c0)={0xffffffffffffffff, 0xffffffffffffffff, 0x6400000000000000}) socketpair$inet(0x2, 0x7, 0x0, &(0x7f00000001c0)) syz_open_dev$mice(&(0x7f0000000000)='/dev/input/mice\x00', 0x0, 0x0) getsockopt$ARPT_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x60, &(0x7f0000000040)={'filter\x00'}, &(0x7f00000000c0)=0x44) io_destroy(r0) 2018/04/13 21:33:51 executing program 2: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_kcm_SIOCKCMUNATTACH(r0, 0x89e1, &(0x7f0000000440)) 2018/04/13 21:33:51 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000b8fa8)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-des3_ede-asm\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000001f3a)="ad56b6c5820faeb995298992ea54c7beef9f5d56534c90c2", 0x18) r1 = accept$alg(r0, 0x0, 0x0) io_setup(0x302, &(0x7f0000e4b000)=0x0) io_submit(r2, 0x1, &(0x7f0000bd9fe0)=[&(0x7f0000617fc0)={0x0, 0x0, 0x0, 0x0, 0x0, r1, &(0x7f000007d000)="b3", 0x1}]) 2018/04/13 21:33:51 executing program 0: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000240)='./cgroup.cpu\x00', 0x200002, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000000080)='cgroup.procs\x00', 0x2, 0x0) write$cgroup_pid(r1, &(0x7f0000000100)=ANY=[@ANYBLOB='1'], 0x1) 2018/04/13 21:33:51 executing program 7: io_setup(0x3fa, &(0x7f0000000440)=0x0) io_getevents(r0, 0x2, 0x0, &(0x7f0000af2fc0), &(0x7f0000fa5ff0)={0x0, 0xfffffffffffff000}) clone(0x0, &(0x7f0000000040), &(0x7f0000000100), &(0x7f0000000140), &(0x7f0000000180)) kcmp$KCMP_EPOLL_TFD(0x0, 0x0, 0x7, 0xffffffffffffffff, &(0x7f00000006c0)={0xffffffffffffffff, 0xffffffffffffffff, 0x6400000000000000}) socketpair$inet(0x2, 0x7, 0x0, &(0x7f00000001c0)) syz_open_dev$mice(&(0x7f0000000000)='/dev/input/mice\x00', 0x0, 0x0) getsockopt$ARPT_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x60, &(0x7f0000000040)={'filter\x00'}, &(0x7f00000000c0)=0x44) io_destroy(r0) 2018/04/13 21:33:51 executing program 3: r0 = epoll_create1(0x0) getsockopt$inet_sctp_SCTP_RECONFIG_SUPPORTED(0xffffffffffffffff, 0x84, 0x75, &(0x7f0000000380)={0x0, 0x4}, &(0x7f00000003c0)=0x8) r1 = syz_open_dev$binder(&(0x7f0000000000)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) ioctl$BINDER_SET_CONTEXT_MGR(r1, 0x40046207, 0x0) ioctl$BINDER_WRITE_READ(r1, 0xc0306201, &(0x7f0000007fd0)={0x0, 0x0, &(0x7f0000004000), 0x48, 0x0, &(0x7f000000d000)="62164b44a5c310affb2298c023c7036e8915400419dae89cc59e3878ffffff00000000f7d7000003000000070718d1fc0e41a052600c828100000000000000bf244f0f2cc508303a"}) ioctl$BINDER_WRITE_READ(r1, 0xc0306201, &(0x7f0000000300)={0x5c, 0x0, &(0x7f0000000240)=[@request_death={0x400c630e, 0x0, 0x3}, @transaction_sg={0x40486311, {{0x0, 0x0, 0x3, 0x0, 0x1, 0x0, 0x0, 0x40, 0x28, &(0x7f00000001c0)=[@fd={0x66642a85, 0x0, 0xffffffffffffffff, 0x0, 0x1}, @ptr={0x70742a85, 0x0, &(0x7f0000000180), 0x1, 0x2, 0x2e}], &(0x7f0000000200)=[0x20, 0x0, 0x20, 0x38, 0x58]}}}], 0x19, 0x0, &(0x7f00000002c0)="249e929e732104d610f5d4594c04343b56ecfa05bae28b4b24"}) r2 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vga_arbiter\x00', 0x10000, 0x0) ioctl$RNDADDTOENTCNT(r2, 0x40045201, &(0x7f00000000c0)=0x6) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, 0xffffffffffffffff, &(0x7f0000000080)) r3 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000340)='/dev/ppp\x00', 0x105800, 0x0) ioctl$KVM_XEN_HVM_CONFIG(r3, 0x4038ae7a, &(0x7f0000000440)={0xbc, 0xc0000082, &(0x7f0000000140)="1c000687aefb31d3be546bdab483fcaf0f6fd7edc82638c55138d2409c01a50a8d38cd1b11aff1a1416139bf", &(0x7f0000000400)="880380d0fdca18", 0x2c, 0x7}) mmap$binder(&(0x7f0000000000/0x1000)=nil, 0x1000, 0x0, 0x12, r1, 0x0) perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r4 = socket$inet6(0xa, 0x80003, 0xff) setsockopt$inet6_int(r4, 0x29, 0x16, &(0x7f0000fcb000), 0x4) setsockopt$inet6_int(r4, 0x29, 0x16, &(0x7f0000fcb000), 0x4) ioctl$SNDRV_CTL_IOCTL_TLV_COMMAND(r4, 0xc008551c, &(0x7f0000000100)={0xffffffff, 0xc, [0xe113, 0xffffffffffff8001, 0x47b3b076]}) 2018/04/13 21:33:51 executing program 6: openat$rtc(0xffffffffffffff9c, &(0x7f0000001000)='/dev/rtc\x00', 0x0, 0x0) epoll_create1(0x0) syz_open_dev$random(&(0x7f0000000000)='/dev/random\x00', 0x0, 0x0) unshare(0x400) pselect6(0x40, &(0x7f0000f33fc0)={0x3ffffd}, &(0x7f0000768000), &(0x7f0000086000), &(0x7f0000349000), &(0x7f0000f14000)={&(0x7f0000a65ff8), 0x8}) [ 311.495174] binder: undelivered TRANSACTION_ERROR: 29189 2018/04/13 21:33:51 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$inet_opts(r0, 0x0, 0x10, &(0x7f00000001c0)="17", 0x1) 2018/04/13 21:33:51 executing program 2: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_kcm_SIOCKCMUNATTACH(r0, 0x89e1, &(0x7f0000000440)) 2018/04/13 21:33:51 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000b8fa8)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-des3_ede-asm\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000001f3a)="ad56b6c5820faeb995298992ea54c7beef9f5d56534c90c2", 0x18) r1 = accept$alg(r0, 0x0, 0x0) io_setup(0x302, &(0x7f0000e4b000)=0x0) io_submit(r2, 0x1, &(0x7f0000bd9fe0)=[&(0x7f0000617fc0)={0x0, 0x0, 0x0, 0x0, 0x0, r1, &(0x7f000007d000)="b3", 0x1}]) 2018/04/13 21:33:51 executing program 6: openat$rtc(0xffffffffffffff9c, &(0x7f0000001000)='/dev/rtc\x00', 0x0, 0x0) epoll_create1(0x0) syz_open_dev$random(&(0x7f0000000000)='/dev/random\x00', 0x0, 0x0) unshare(0x400) pselect6(0x40, &(0x7f0000f33fc0)={0x3ffffd}, &(0x7f0000768000), &(0x7f0000086000), &(0x7f0000349000), &(0x7f0000f14000)={&(0x7f0000a65ff8), 0x8}) 2018/04/13 21:33:51 executing program 0: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000fb8)={0x2, 0x4, 0x0, 0x0, 0x2}, 0x10}, 0x2}, 0x0) 2018/04/13 21:33:51 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$inet_opts(r0, 0x0, 0x10, &(0x7f00000001c0)="17", 0x1) 2018/04/13 21:33:51 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$inet_opts(r0, 0x0, 0x10, &(0x7f00000001c0)="17", 0x1) 2018/04/13 21:33:51 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000b8fa8)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-des3_ede-asm\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000001f3a)="ad56b6c5820faeb995298992ea54c7beef9f5d56534c90c2", 0x18) r1 = accept$alg(r0, 0x0, 0x0) io_setup(0x302, &(0x7f0000e4b000)=0x0) io_submit(r2, 0x1, &(0x7f0000bd9fe0)=[&(0x7f0000617fc0)={0x0, 0x0, 0x0, 0x0, 0x0, r1, &(0x7f000007d000)="b3", 0x1}]) [ 312.312396] binder: 21516:21561 BC_REQUEST_DEATH_NOTIFICATION invalid ref 0 [ 312.319633] binder_alloc: 21516: binder_alloc_buf, no vma [ 312.325227] binder: 21516:21561 transaction failed 29189/-3, size 64-40 line 2963 2018/04/13 21:33:52 executing program 6: openat$rtc(0xffffffffffffff9c, &(0x7f0000001000)='/dev/rtc\x00', 0x0, 0x0) epoll_create1(0x0) syz_open_dev$random(&(0x7f0000000000)='/dev/random\x00', 0x0, 0x0) unshare(0x400) pselect6(0x40, &(0x7f0000f33fc0)={0x3ffffd}, &(0x7f0000768000), &(0x7f0000086000), &(0x7f0000349000), &(0x7f0000f14000)={&(0x7f0000a65ff8), 0x8}) 2018/04/13 21:33:52 executing program 2: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_kcm_SIOCKCMUNATTACH(r0, 0x89e1, &(0x7f0000000440)) 2018/04/13 21:33:52 executing program 0: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000fb8)={0x2, 0x4, 0x0, 0x0, 0x2}, 0x10}, 0x2}, 0x0) 2018/04/13 21:33:52 executing program 7: io_setup(0x3fa, &(0x7f0000000440)=0x0) io_getevents(r0, 0x2, 0x0, &(0x7f0000af2fc0), &(0x7f0000fa5ff0)={0x0, 0xfffffffffffff000}) clone(0x0, &(0x7f0000000040), &(0x7f0000000100), &(0x7f0000000140), &(0x7f0000000180)) kcmp$KCMP_EPOLL_TFD(0x0, 0x0, 0x7, 0xffffffffffffffff, &(0x7f00000006c0)={0xffffffffffffffff, 0xffffffffffffffff, 0x6400000000000000}) socketpair$inet(0x2, 0x7, 0x0, &(0x7f00000001c0)) syz_open_dev$mice(&(0x7f0000000000)='/dev/input/mice\x00', 0x0, 0x0) getsockopt$ARPT_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x60, &(0x7f0000000040)={'filter\x00'}, &(0x7f00000000c0)=0x44) io_destroy(r0) 2018/04/13 21:33:52 executing program 5: io_setup(0x3fa, &(0x7f0000000440)=0x0) io_getevents(r0, 0x2, 0x0, &(0x7f0000af2fc0), &(0x7f0000fa5ff0)={0x0, 0xfffffffffffff000}) clone(0x0, &(0x7f0000000040), &(0x7f0000000100), &(0x7f0000000140), &(0x7f0000000180)) kcmp$KCMP_EPOLL_TFD(0x0, 0x0, 0x7, 0xffffffffffffffff, &(0x7f00000006c0)={0xffffffffffffffff, 0xffffffffffffffff, 0x6400000000000000}) socketpair$inet(0x2, 0x7, 0x0, &(0x7f00000001c0)) syz_open_dev$mice(&(0x7f0000000000)='/dev/input/mice\x00', 0x0, 0x0) getsockopt$ARPT_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x60, &(0x7f0000000040)={'filter\x00'}, &(0x7f00000000c0)=0x44) io_destroy(r0) 2018/04/13 21:33:52 executing program 4: r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r0, &(0x7f000067efe4)={0xa, 0x4e20}, 0x1c) sendto$inet6(r0, &(0x7f00005a0fff)='8', 0x1, 0x0, &(0x7f00007bcfe4)={0xa, 0x4e20, 0x0, @loopback={0x0, 0x1}}, 0x1c) setsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(r0, 0x84, 0x72, &(0x7f0000bd6ff4)={0x0, 0x0, 0x4000020030}, 0xc) setsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER(r0, 0x84, 0x7b, &(0x7f0000b2b000)={0x0, 0x1}, 0x8) write(r0, &(0x7f0000cbdfb8)='v', 0x1) setsockopt$sock_int(r0, 0x1, 0x7, &(0x7f0000f0cffc), 0x4) write(r0, &(0x7f0000000340)="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", 0xe01) 2018/04/13 21:33:52 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000040)='IPVS\x00') sendmsg$IPVS_CMD_DEL_DEST(r0, &(0x7f00000002c0)={&(0x7f00000001c0)={0x10}, 0xc, &(0x7f0000000280)={&(0x7f0000000200)={0x44, r1, 0x219, 0x0, 0x0, {0x7}, [@IPVS_CMD_ATTR_SERVICE={0x30, 0x1, [@IPVS_SVC_ATTR_PORT={0x8, 0x4}, @IPVS_SVC_ATTR_AF={0x8, 0x1, 0x2}, @IPVS_SVC_ATTR_PROTOCOL={0x8, 0x2}, @IPVS_SVC_ATTR_ADDR={0x14, 0x3, @ipv6=@dev={0xfe, 0x80}}]}]}, 0x44}, 0x1}, 0x0) 2018/04/13 21:33:52 executing program 1: perf_event_open(&(0x7f0000348f88)={0x2, 0x78, 0x3e2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = userfaultfd(0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000602fe8)={0xaa, 0x40}) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000c20000)={{&(0x7f0000068000/0x800000)=nil, 0x800000}, 0x1}) mremap(&(0x7f00006af000/0xf000)=nil, 0xf000, 0x3000, 0x3, &(0x7f00002e0000/0x3000)=nil) close(r0) r1 = socket(0x2000000000010, 0x20000000000003, 0x0) write(r1, &(0x7f0000944fde)="220000005e000721004f10f7e2ffd90000000000000000edff000000e700ff02f157", 0x22) recvfrom$inet6(r1, &(0x7f0000000080)=""/73, 0x49, 0x0, &(0x7f0000000100)={0xa}, 0x1c) ioctl$EVIOCGPROP(0xffffffffffffffff, 0xc004743e, &(0x7f0000000f0a)=""/246) fcntl$setflags(r0, 0x2, 0x1) ioctl$KDGKBMETA(0xffffffffffffffff, 0x4b62, &(0x7f0000000040)) recvfrom(r1, &(0x7f0000362f74)=""/140, 0x8c, 0x0, 0x0, 0x0) [ 312.485173] binder: undelivered TRANSACTION_ERROR: 29189 2018/04/13 21:33:52 executing program 0: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000fb8)={0x2, 0x4, 0x0, 0x0, 0x2}, 0x10}, 0x2}, 0x0) 2018/04/13 21:33:52 executing program 2: r0 = socket$inet(0x2, 0x6, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000b40)=@broute={'broute\x00', 0x20, 0x2, 0x500, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20001040], 0x0, &(0x7f0000000000), &(0x7f0000001040)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xfffffffffffffffe, 0x2, [{{{0x8000000000000015, 0x0, 0x0, 'lo\x00', 'bcsh0\x00', 'eql\x00', 'teql0\x00', @random="86fc0f770739", [], @remote={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xbb}, [], 0x150, 0x1c8, 0x1f8, [@stp={'stp\x00', 0x48, {{0x0, {0x0, 0x0, 0x0, @empty, [], 0x0, 0x0, 0x0, 0x0, @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff]}}}}, @rateest={'rateest\x00', 0x48, {{'nr0\x00', 'rose0\x00'}}}]}, [@common=@NFLOG={'NFLOG\x00', 0x50, {{0x0, 0x0, 0x0, 0x0, 0x0, "85446c4d3516243eafb153805f37a73c147132122107d2f3cfee3572c3bb4de7eece597ee9f9d799d750bbab365ede8d9d010cf8b17ec0b0ed9d4d9b9be8180f"}}}]}, @common=@CONNSECMARK={'CONNSECMARK\x00', 0x8}}, {{{0x15, 0x0, 0x0, 'teql0\x00', 'ipddp0\x00', 'erspan0\x00', '\x00', @local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, [], @remote={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xbb}, [], 0x70, 0x118, 0x248}, [@common=@redirect={'redirect\x00', 0x8}, @common=@nflog={'nflog\x00', 0x50, {{0x0, 0x0, 0x0, 0x0, 0x0, "123c90d1a7c5f8750c381892dbb9151dbc71a4448b172f1ff5df5fed274603517a6d842323f92e93d24ce280010339c4274505dfb4e7efb05281b73c2df580cd"}}}]}, @common=@SECMARK={'SECMARK\x00', 0x108, {{0x0, 0x0, 'system_u:object_r:apt_lock_t:s0\x00'}}}}]}, {0x0, '\x00', 0x2, 0xfffffffffffffffe}, {0x0, '\x00', 0x2, 0xfffffffffffffffe}]}, 0x578) 2018/04/13 21:33:52 executing program 6: openat$rtc(0xffffffffffffff9c, &(0x7f0000001000)='/dev/rtc\x00', 0x0, 0x0) epoll_create1(0x0) syz_open_dev$random(&(0x7f0000000000)='/dev/random\x00', 0x0, 0x0) unshare(0x400) pselect6(0x40, &(0x7f0000f33fc0)={0x3ffffd}, &(0x7f0000768000), &(0x7f0000086000), &(0x7f0000349000), &(0x7f0000f14000)={&(0x7f0000a65ff8), 0x8}) [ 312.544503] netlink: 'syz-executor3': attribute type 4 has an invalid length. [ 312.551957] netlink: 'syz-executor3': attribute type 1 has an invalid length. [ 312.559338] netlink: 'syz-executor3': attribute type 2 has an invalid length. 2018/04/13 21:33:52 executing program 0: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000fb8)={0x2, 0x4, 0x0, 0x0, 0x2}, 0x10}, 0x2}, 0x0) [ 312.616887] netlink: 'syz-executor3': attribute type 4 has an invalid length. [ 312.624330] netlink: 'syz-executor3': attribute type 1 has an invalid length. [ 312.631689] netlink: 'syz-executor3': attribute type 2 has an invalid length. 2018/04/13 21:33:52 executing program 2: r0 = socket$inet(0x2, 0x6, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000b40)=@broute={'broute\x00', 0x20, 0x2, 0x500, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20001040], 0x0, &(0x7f0000000000), &(0x7f0000001040)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xfffffffffffffffe, 0x2, [{{{0x8000000000000015, 0x0, 0x0, 'lo\x00', 'bcsh0\x00', 'eql\x00', 'teql0\x00', @random="86fc0f770739", [], @remote={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xbb}, [], 0x150, 0x1c8, 0x1f8, [@stp={'stp\x00', 0x48, {{0x0, {0x0, 0x0, 0x0, @empty, [], 0x0, 0x0, 0x0, 0x0, @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff]}}}}, @rateest={'rateest\x00', 0x48, {{'nr0\x00', 'rose0\x00'}}}]}, [@common=@NFLOG={'NFLOG\x00', 0x50, {{0x0, 0x0, 0x0, 0x0, 0x0, "85446c4d3516243eafb153805f37a73c147132122107d2f3cfee3572c3bb4de7eece597ee9f9d799d750bbab365ede8d9d010cf8b17ec0b0ed9d4d9b9be8180f"}}}]}, @common=@CONNSECMARK={'CONNSECMARK\x00', 0x8}}, {{{0x15, 0x0, 0x0, 'teql0\x00', 'ipddp0\x00', 'erspan0\x00', '\x00', @local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, [], @remote={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xbb}, [], 0x70, 0x118, 0x248}, [@common=@redirect={'redirect\x00', 0x8}, @common=@nflog={'nflog\x00', 0x50, {{0x0, 0x0, 0x0, 0x0, 0x0, "123c90d1a7c5f8750c381892dbb9151dbc71a4448b172f1ff5df5fed274603517a6d842323f92e93d24ce280010339c4274505dfb4e7efb05281b73c2df580cd"}}}]}, @common=@SECMARK={'SECMARK\x00', 0x108, {{0x0, 0x0, 'system_u:object_r:apt_lock_t:s0\x00'}}}}]}, {0x0, '\x00', 0x2, 0xfffffffffffffffe}, {0x0, '\x00', 0x2, 0xfffffffffffffffe}]}, 0x578) 2018/04/13 21:33:52 executing program 6: r0 = memfd_create(&(0x7f0000002901)='dev ', 0x0) write(r0, &(0x7f0000000000)='v', 0x1) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x4, 0x11, r0, 0x0) name_to_handle_at(r0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000140)=ANY=[], &(0x7f0000000180), 0x1000) 2018/04/13 21:33:52 executing program 4: r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r0, &(0x7f000067efe4)={0xa, 0x4e20}, 0x1c) sendto$inet6(r0, &(0x7f00005a0fff)='8', 0x1, 0x0, &(0x7f00007bcfe4)={0xa, 0x4e20, 0x0, @loopback={0x0, 0x1}}, 0x1c) setsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(r0, 0x84, 0x72, &(0x7f0000bd6ff4)={0x0, 0x0, 0x4000020030}, 0xc) setsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER(r0, 0x84, 0x7b, &(0x7f0000b2b000)={0x0, 0x1}, 0x8) write(r0, &(0x7f0000cbdfb8)='v', 0x1) setsockopt$sock_int(r0, 0x1, 0x7, &(0x7f0000f0cffc), 0x4) write(r0, &(0x7f0000000340)="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", 0xe01) 2018/04/13 21:33:52 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000040)='IPVS\x00') sendmsg$IPVS_CMD_DEL_DEST(r0, &(0x7f00000002c0)={&(0x7f00000001c0)={0x10}, 0xc, &(0x7f0000000280)={&(0x7f0000000200)={0x44, r1, 0x219, 0x0, 0x0, {0x7}, [@IPVS_CMD_ATTR_SERVICE={0x30, 0x1, [@IPVS_SVC_ATTR_PORT={0x8, 0x4}, @IPVS_SVC_ATTR_AF={0x8, 0x1, 0x2}, @IPVS_SVC_ATTR_PROTOCOL={0x8, 0x2}, @IPVS_SVC_ATTR_ADDR={0x14, 0x3, @ipv6=@dev={0xfe, 0x80}}]}]}, 0x44}, 0x1}, 0x0) 2018/04/13 21:33:52 executing program 5: perf_event_open(&(0x7f0000348f88)={0x2, 0x70, 0x3e6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000b6cff6)='net/udp\x00') preadv(r0, &(0x7f0000331000)=[{&(0x7f0000723f20)=""/127, 0x7f}], 0x1, 0x102) 2018/04/13 21:33:52 executing program 2: r0 = socket$inet(0x2, 0x6, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000b40)=@broute={'broute\x00', 0x20, 0x2, 0x500, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20001040], 0x0, &(0x7f0000000000), &(0x7f0000001040)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xfffffffffffffffe, 0x2, [{{{0x8000000000000015, 0x0, 0x0, 'lo\x00', 'bcsh0\x00', 'eql\x00', 'teql0\x00', @random="86fc0f770739", [], @remote={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xbb}, [], 0x150, 0x1c8, 0x1f8, [@stp={'stp\x00', 0x48, {{0x0, {0x0, 0x0, 0x0, @empty, [], 0x0, 0x0, 0x0, 0x0, @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff]}}}}, @rateest={'rateest\x00', 0x48, {{'nr0\x00', 'rose0\x00'}}}]}, [@common=@NFLOG={'NFLOG\x00', 0x50, {{0x0, 0x0, 0x0, 0x0, 0x0, "85446c4d3516243eafb153805f37a73c147132122107d2f3cfee3572c3bb4de7eece597ee9f9d799d750bbab365ede8d9d010cf8b17ec0b0ed9d4d9b9be8180f"}}}]}, @common=@CONNSECMARK={'CONNSECMARK\x00', 0x8}}, {{{0x15, 0x0, 0x0, 'teql0\x00', 'ipddp0\x00', 'erspan0\x00', '\x00', @local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, [], @remote={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xbb}, [], 0x70, 0x118, 0x248}, [@common=@redirect={'redirect\x00', 0x8}, @common=@nflog={'nflog\x00', 0x50, {{0x0, 0x0, 0x0, 0x0, 0x0, "123c90d1a7c5f8750c381892dbb9151dbc71a4448b172f1ff5df5fed274603517a6d842323f92e93d24ce280010339c4274505dfb4e7efb05281b73c2df580cd"}}}]}, @common=@SECMARK={'SECMARK\x00', 0x108, {{0x0, 0x0, 'system_u:object_r:apt_lock_t:s0\x00'}}}}]}, {0x0, '\x00', 0x2, 0xfffffffffffffffe}, {0x0, '\x00', 0x2, 0xfffffffffffffffe}]}, 0x578) [ 312.785547] netlink: 'syz-executor3': attribute type 4 has an invalid length. [ 312.792981] netlink: 'syz-executor3': attribute type 1 has an invalid length. [ 312.800315] netlink: 'syz-executor3': attribute type 2 has an invalid length. 2018/04/13 21:33:52 executing program 4: r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r0, &(0x7f000067efe4)={0xa, 0x4e20}, 0x1c) sendto$inet6(r0, &(0x7f00005a0fff)='8', 0x1, 0x0, &(0x7f00007bcfe4)={0xa, 0x4e20, 0x0, @loopback={0x0, 0x1}}, 0x1c) setsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(r0, 0x84, 0x72, &(0x7f0000bd6ff4)={0x0, 0x0, 0x4000020030}, 0xc) setsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER(r0, 0x84, 0x7b, &(0x7f0000b2b000)={0x0, 0x1}, 0x8) write(r0, &(0x7f0000cbdfb8)='v', 0x1) setsockopt$sock_int(r0, 0x1, 0x7, &(0x7f0000f0cffc), 0x4) write(r0, &(0x7f0000000340)="867f60b6123f3dbc76c824d83435f62772edc51899d03489c56279d859638a8ee3eeb7ad38980ed7a79f25852fad3d46b096739cf22e557f9749a0090cae4d39a1fbe518c9536a4ceed0152fc76239e2b9586132a713d13f54a4de3d6231201a26b847a5c4ad682cbc246ac559bcf49053c3fbb445f91c1f3e2d5ff979fe92d6eb4107d65fe9356d81db1aaf772345552779f679a12a0322411d2fd32efa85927529d0fffecaf0c5bf00a96c7ae3b1c80b022941d597f82d8ab9bcc20158311d8d66ce86fb2f2cf80064b3f84cb62601f59999c466fc2341d3cd1410e0d79972caff1cc3e45a8896a5338d835182abb16f1e33e7150d9c7f2668193443dc90ab18c5e9d89b9902ebcde81ddf7432756044ccdb6182c205913dcdd3a608ac5094c71b8baaacd4fe1f173bde0c21f99aa1cb514820cbde7689dce0ebfe543930b98cebc03a258011319858ffeb1f95ab68b9b31334e0eec1c2633a56fc67a8b0fdcce1e6161e51a104d750616bcac1fad829b1cfc7e95fee43464b00501e0a042edc5be4fd85b72cc5a866f46c0975566b394a036097acd1621194e1ce84c9c44b3e0c51ab8f83c2178940490983a932a94911756da4384ecf9218682b9b6f3ddc933131b44925ba6b91280a1ca2f507cc4b0e02c388ab702b3a3eff97a6b197526ef11e19c555486f8edc9685536870b9821883a2dec1ffe96e822ff5857fc32a47e882c5d09aee4fc4976b114de052eeae1bad9a327e02de3afc20226e8b035f5503e6fd4b643e8204ba1dee3e2c6999d0a4a29529d4f4b3fee8d5febc3e131affa25e5310126e604293178b164c6c9c00f76d9ad867d9efa523fda42fc2d831e7196a26741dab388a87138b315ecf22ea91fa80e752db67665128bbcf5550dec6e15f085ff73695e26bd130fd5c51b4c450f7d62cda36c30e486f001a57aef8661e63ccb402f9bf3227c4a830beab7da39f3ef8bf61c216bb677eac3ba4c3586290b63a1b0d640af3fcddc1e790ff90a08fe576ae6644f898f121831a34ccf30e52e462acbe19f10755ee76baec07becb656bc044c877898dbdb0c480d8fbe6e25218816cce86bee917efaad83747cf2c7129585dc8c77808805a6c697efde0547ca2a8ca5f770242edf46dd9958df9f9efc84cf96fa6114f18cbfdc6d89e3498ec6787f0b16a99e68c6c278067f08339338a7460ad9194c95bc75a67a6f78462e9cf0933db52a7d8c30271d6a4231cfec27bece87aafe8065e2e1b3781f3973e763ca755e672f2a3455d4ab46af61c2f0f012be6d5811375cd6a25692e16dd9f848a1c573d0ccf1b0e338f96c6bf67ab795343bb75c45dfa89242b51e1bb785f8ab65d4a61659a671cd3486d357ced093158a0990950ab55f44dfcccebbedcec848c6b2eda2bec5e8c5d2af971a0063e11b27c0e7e202b85e823723f7f3745ca1d11fb4306df01c9d6c7346eb28244f758c0bdbabb9d18d751438a191614db005d25737d183459a1139cfc62714b49ee573f2a543a8ab14141849b1e70e7fbea17098da241de34eee59e1e663791204c1c8e4648ef9ad81c1582f1a64491376cbbf95b0e4efc552c346d143bb994a69f0f84028836b98ca3f8e670fdda047920e4bfc65126fcb3a3234d6c47a11bc33be10b657b499970db79431988c885f6be8d62123d5436c4a68d598071d5cb17d50d1e6383312cb1f219b362516ef8a681159fc86166ae4fe40d14558a2004a5095a0a9daf25c9cceb8fd7a29ebe1343ce6839b798cf9f331726244b591da0822ce35bb845659e3a34ce8c7881a7690625a1de677e083e535349915431ebfddbe50916d15c061d9b68488302d8320be4d5ae92dcca1fc59115b4132a1a18a7b46ae6d4d4d9c110cc4bc296b7312f64599bd2b9ece96e2b91072fb83f87252eb36156d84d5519ca6cf19eaa1ef6611d7373659efb14cead84f00bbf5a29ee13bea895145623d6c704d686a1d793399ae92341b84e61ff39fc799866bf068ad3fd68e831b835f8374ccc6e211344e5d5b4b0a368fb16e6e37ffd47a0c381784cbe294901c3bfcfe9ff1f6de7c02769592d01a516523ed6d90475f48b8a07748bf669fc018843114fb4ad12284cd77db7431b4601608421186c1148da8c0d95da4352d093208d19e31501814c8e7970fb3f07b700b3f65234ba49685e233f400f148078e59adc426538dc7775e235ed635c659c666132c2a084b83c91f037541f15152d4e2ce51bca1b8562b1df16d9f49339f65103af05ae6f58a9ec9028d135a26b4e4fc86b0999b17a2aa2f8bebf6bf9d172511b53351b9443b9d319d178a614cc332259b6b2e784d53395d8713dc9131bce09916e5730681772830348df828841636c0c88ecb17a3dfe33842fed86be157176d3fa142d26316b8c874ad50621d03ee9b1eab1beff957f39470713b0b87a22a40f12bc2415348c82237abc0ff93d86a79f89f7627cfd5b6588640beeabdb28c353af3fc5f2d7fa7f70edf241f32427ab7daa1d92f3e555626354928b99d0b4e3d174c3dd89a25a01bd634487d14d261a84e5230327d4fccbaf9137e7912a1f4146008b924a46f0cd00033a926db6703a1686fc8e8b1490df2faf4b97ee7e4fe5e6fc854ee242aaae0afdb65c207795af97684d40e23ee5226e3792d75a4449b5cdd0a95cedfb0b7fd4e3bb9a5103e743ad2171d084dcc6bbac4bdc5c7cc25f0fec787c43fd39e95eb0f118f234faf0a2e3537f247b2bae29b432ad381d5bfa4f557ab47db8aaf53dbbaa5da1e714edbfccedc4801ec4dc8a82e9674979876f3afe809835af0b55da62351bd1584e8e79c8e5dac1fb9cd563165c14a5323bf5d4099ec2f3dc15631a6b13370956940ce1f94be78c9260f80ec355c2a7f1968d23c2638d9d903a8619e3dca050b5e2d278a2a05ec3fdf78a1a2927bd7288766379595abe28781b5f86d2241d2d508e2ba88457503f405c6e3da47dbb7daeb3b8d0be389f68a0d4ee1cecc4898eeabe12707200df9a4f638e38277bf9f664d87749a5e99d08894b9c0861af47a757d329e4921036e2386470eeb5c14718ffed69487670c2f588c06db7f2016bf272a9118bf5074397c95febc97489e6ab2b2a4bf351e901ee7c25183e5285684fa46caac3bb5f1465f7e34deefc7a16577259650912010859c3d798f65bfb8f7c15ada9c8f1b0671d0be3a12e4ba0ff2fec275820e8201642d96d1fd9acf5de9ce795a8015df54f3d31db48e8495999f61fc80bdfdc0d780dbefded8059995ce478307f3f0e74228d320f73cd21f78c59cad887e18a5fc573f78a7aad95e536b7af0e1e030250bd3b25d381e8eade12c90879517f57c41d42163bdcde2a97bfaea2d65f357adbcb924ef63652717f4f225f9fa1e3e536de683daa654c9c6c02ca438af2fc2ec9edc4dc86164c9a9896d8d1771470e51da28028293171f1ef54b5ce702780cf72ff4d0a189f9d663e985970c28ff8877b5625d9730df6c72be60723c1dae25b9f29e42d62478676e55dc394ed22779464bc0160036222d1b814675a599d132b83d28c368a93444138580b3f74bd95406ef46457f541511f63923329ddc93b736844916d8797d30c592efcf8e2e5fe7b127308e827190393a7fa810a0c87d7cca18e97d29a877069c1e2d56be76b7dbfa6aad19987ead6033cc8e5a759524fc76420c00fcdee9009a98b69f3a4e328a1c5449a5089eeecfb22e7695d155b4aca3e50afa30f499f34ed3eb0442ff9229808785bcdd50f1a2e12cf05053117448343f9dc60c7c58e735ade8b41a6044b57edf165e03c0ce871b8c6e766fd1f99c8355ce2dd9667d6eeac6c03688641e5b96edb9f21f9358c61f0cc8318823201f96715a58868ac3571c1214adf9b0a80ccf8a8b32fc96ba935be8db596bdd1b487ca46f566d1f117e319d01455c4a21383ed795b4ca3418645ad2acbb55000b39d8405bec442beb6db050fbe5e74d01b257557c1b685c6ea5974a9d268a2a5a05d8f776aeb3615157da9ff6cdb6f169ad9d5fa526f6a90e36bf93df78314af5c2e27c4b5b43ab53576036bb50cff793a70dda7f92e2fa69a85e84672ff9ba6411df1027675997237469518063269f43758434b0eac908fa23890d1b6e1c46e0796bb96ab6b40a33011ba6b9add8d13a2a348b6f166da745a73aa118e9a60a9069c142816396124f7c78481ce60b87c775de577731db975916eae5b0ed9c8bcbcc084012a96584ba60bb1132b22ba651837d7d05250eeb448a2738c64d4d1973849b9bd843a46150641cc965f2dab2db7d22a4a6e1f9842e30738ce9f847c457185823a8474ec40a7c4de069a8d4549882ef3a9df32d23886e1c10d337f39572cba4e5a8423fe0c3dd0b7373dc08a1a39051a91d86e4e58e7ce921159c67883411eac6130dc02afd21bc3057c6c40aaf0ca238c1babf68bd59908369492d53beda3b46f1581c602b2f3b4e43e54e59a225390faeb9e8e9c05df40162313b940c1d8e7da1da93400f8641b663d9e4c412eae408d2f325517a76cd9a013f42fdcdb06c408c6be546a7e03fe1305337d884bcce1af79a0274e201aaeeddfe4bb0347b5ad941b826759aa7eac5f9f3ed3ea55c539e0ceffa5737ab8dbb6185d39fee85b31b3301a157c28a281ffcd0bd91dee263a1f9dc1462f86be07b3fd5c4d44f6ec2f0c2805866e3190743b3726c662fee060225c7da979a29891611f1dc04642ef44993248de08aa47030becce89b9232462028a4d8fa742fb5d6ccefa923fa1034c0ff7aa60663c009fa6671e698b072e9707aed41d88f47f468fbbcd6cf34875d0e1515e6aad67dba9c6940862f06063fa75269b48b05c269d864de0f985f8b2cbfbe521b3a41aafdeadf29329531a96d3394a883a176cf2a113e9514ea9705573f64169e88b8daad78fac136d6a4cb9aebd36f564eff0674a7013a1dabfa63dcf572412125f94b533b51f48d9f35b8b01bc41ab120a913a50634063addb81105be44b0fa2d58534237694a670dba2311222190a8f6ff0d2b410992eb5e0b9034f5158ffe53ef60a3fd614b5d9", 0xe01) 2018/04/13 21:33:52 executing program 7: perf_event_open(&(0x7f00000017c0)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x80001, 0x0) setsockopt$inet6_MCAST_JOIN_GROUP(r0, 0x29, 0x2a, &(0x7f0000fca000)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x1, [], 0x1}}}}, 0x88) setsockopt$inet6_MCAST_MSFILTER(r0, 0x29, 0x2d, &(0x7f0000000000)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x1, [], 0x1}}}}, 0x90) 2018/04/13 21:33:52 executing program 0: perf_event_open(&(0x7f0000348f88)={0x2, 0x78, 0x3e2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = userfaultfd(0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000602fe8)={0xaa, 0x40}) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000c20000)={{&(0x7f0000068000/0x800000)=nil, 0x800000}, 0x1}) mremap(&(0x7f00006af000/0xf000)=nil, 0xf000, 0x3000, 0x3, &(0x7f00002e0000/0x3000)=nil) close(r0) r1 = socket(0x2000000000010, 0x20000000000003, 0x0) write(r1, &(0x7f0000944fde)="220000005e000721004f10f7e2ffd90000000000000000edff000000e700ff02f157", 0x22) recvfrom$inet6(r1, &(0x7f0000000080)=""/73, 0x49, 0x0, &(0x7f0000000100)={0xa}, 0x1c) ioctl$EVIOCGPROP(0xffffffffffffffff, 0xc004743e, &(0x7f0000000f0a)=""/246) fcntl$setflags(r0, 0x2, 0x1) ioctl$KDGKBMETA(0xffffffffffffffff, 0x4b62, &(0x7f0000000040)) recvfrom(r1, &(0x7f0000362f74)=""/140, 0x8c, 0x0, 0x0, 0x0) 2018/04/13 21:33:52 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000040)='IPVS\x00') sendmsg$IPVS_CMD_DEL_DEST(r0, &(0x7f00000002c0)={&(0x7f00000001c0)={0x10}, 0xc, &(0x7f0000000280)={&(0x7f0000000200)={0x44, r1, 0x219, 0x0, 0x0, {0x7}, [@IPVS_CMD_ATTR_SERVICE={0x30, 0x1, [@IPVS_SVC_ATTR_PORT={0x8, 0x4}, @IPVS_SVC_ATTR_AF={0x8, 0x1, 0x2}, @IPVS_SVC_ATTR_PROTOCOL={0x8, 0x2}, @IPVS_SVC_ATTR_ADDR={0x14, 0x3, @ipv6=@dev={0xfe, 0x80}}]}]}, 0x44}, 0x1}, 0x0) 2018/04/13 21:33:52 executing program 6: mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1001, 0x32, 0xffffffffffffffff, 0x0) r0 = userfaultfd(0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000f6bfe8)={0xaa}) ioctl$UFFDIO_UNREGISTER(r0, 0x8010aa01, &(0x7f0000000080)={&(0x7f0000152000/0x1000)=nil, 0x1000}) 2018/04/13 21:33:52 executing program 5: perf_event_open(&(0x7f0000348f88)={0x2, 0x70, 0x3e6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000b6cff6)='net/udp\x00') preadv(r0, &(0x7f0000331000)=[{&(0x7f0000723f20)=""/127, 0x7f}], 0x1, 0x102) 2018/04/13 21:33:52 executing program 2: r0 = socket$inet(0x2, 0x6, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000b40)=@broute={'broute\x00', 0x20, 0x2, 0x500, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20001040], 0x0, &(0x7f0000000000), &(0x7f0000001040)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xfffffffffffffffe, 0x2, [{{{0x8000000000000015, 0x0, 0x0, 'lo\x00', 'bcsh0\x00', 'eql\x00', 'teql0\x00', @random="86fc0f770739", [], @remote={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xbb}, [], 0x150, 0x1c8, 0x1f8, [@stp={'stp\x00', 0x48, {{0x0, {0x0, 0x0, 0x0, @empty, [], 0x0, 0x0, 0x0, 0x0, @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff]}}}}, @rateest={'rateest\x00', 0x48, {{'nr0\x00', 'rose0\x00'}}}]}, [@common=@NFLOG={'NFLOG\x00', 0x50, {{0x0, 0x0, 0x0, 0x0, 0x0, "85446c4d3516243eafb153805f37a73c147132122107d2f3cfee3572c3bb4de7eece597ee9f9d799d750bbab365ede8d9d010cf8b17ec0b0ed9d4d9b9be8180f"}}}]}, @common=@CONNSECMARK={'CONNSECMARK\x00', 0x8}}, {{{0x15, 0x0, 0x0, 'teql0\x00', 'ipddp0\x00', 'erspan0\x00', '\x00', @local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, [], @remote={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xbb}, [], 0x70, 0x118, 0x248}, [@common=@redirect={'redirect\x00', 0x8}, @common=@nflog={'nflog\x00', 0x50, {{0x0, 0x0, 0x0, 0x0, 0x0, "123c90d1a7c5f8750c381892dbb9151dbc71a4448b172f1ff5df5fed274603517a6d842323f92e93d24ce280010339c4274505dfb4e7efb05281b73c2df580cd"}}}]}, @common=@SECMARK={'SECMARK\x00', 0x108, {{0x0, 0x0, 'system_u:object_r:apt_lock_t:s0\x00'}}}}]}, {0x0, '\x00', 0x2, 0xfffffffffffffffe}, {0x0, '\x00', 0x2, 0xfffffffffffffffe}]}, 0x578) 2018/04/13 21:33:52 executing program 1: perf_event_open(&(0x7f0000348f88)={0x2, 0x78, 0x3e2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = userfaultfd(0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000602fe8)={0xaa, 0x40}) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000c20000)={{&(0x7f0000068000/0x800000)=nil, 0x800000}, 0x1}) mremap(&(0x7f00006af000/0xf000)=nil, 0xf000, 0x3000, 0x3, &(0x7f00002e0000/0x3000)=nil) close(r0) r1 = socket(0x2000000000010, 0x20000000000003, 0x0) write(r1, &(0x7f0000944fde)="220000005e000721004f10f7e2ffd90000000000000000edff000000e700ff02f157", 0x22) recvfrom$inet6(r1, &(0x7f0000000080)=""/73, 0x49, 0x0, &(0x7f0000000100)={0xa}, 0x1c) ioctl$EVIOCGPROP(0xffffffffffffffff, 0xc004743e, &(0x7f0000000f0a)=""/246) fcntl$setflags(r0, 0x2, 0x1) ioctl$KDGKBMETA(0xffffffffffffffff, 0x4b62, &(0x7f0000000040)) recvfrom(r1, &(0x7f0000362f74)=""/140, 0x8c, 0x0, 0x0, 0x0) [ 313.364553] netlink: 'syz-executor3': attribute type 4 has an invalid length. 2018/04/13 21:33:52 executing program 5: perf_event_open(&(0x7f0000348f88)={0x2, 0x70, 0x3e6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000b6cff6)='net/udp\x00') preadv(r0, &(0x7f0000331000)=[{&(0x7f0000723f20)=""/127, 0x7f}], 0x1, 0x102) 2018/04/13 21:33:53 executing program 6: mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1001, 0x32, 0xffffffffffffffff, 0x0) r0 = userfaultfd(0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000f6bfe8)={0xaa}) ioctl$UFFDIO_UNREGISTER(r0, 0x8010aa01, &(0x7f0000000080)={&(0x7f0000152000/0x1000)=nil, 0x1000}) 2018/04/13 21:33:53 executing program 2: perf_event_open(&(0x7f0000348f88)={0x2, 0x78, 0x3e2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = userfaultfd(0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000602fe8)={0xaa, 0x40}) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000c20000)={{&(0x7f0000068000/0x800000)=nil, 0x800000}, 0x1}) mremap(&(0x7f00006af000/0xf000)=nil, 0xf000, 0x3000, 0x3, &(0x7f00002e0000/0x3000)=nil) close(r0) r1 = socket(0x2000000000010, 0x20000000000003, 0x0) write(r1, &(0x7f0000944fde)="220000005e000721004f10f7e2ffd90000000000000000edff000000e700ff02f157", 0x22) recvfrom$inet6(r1, &(0x7f0000000080)=""/73, 0x49, 0x0, &(0x7f0000000100)={0xa}, 0x1c) ioctl$EVIOCGPROP(0xffffffffffffffff, 0xc004743e, &(0x7f0000000f0a)=""/246) fcntl$setflags(r0, 0x2, 0x1) ioctl$KDGKBMETA(0xffffffffffffffff, 0x4b62, &(0x7f0000000040)) recvfrom(r1, &(0x7f0000362f74)=""/140, 0x8c, 0x0, 0x0, 0x0) 2018/04/13 21:33:53 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000040)='IPVS\x00') sendmsg$IPVS_CMD_DEL_DEST(r0, &(0x7f00000002c0)={&(0x7f00000001c0)={0x10}, 0xc, &(0x7f0000000280)={&(0x7f0000000200)={0x44, r1, 0x219, 0x0, 0x0, {0x7}, [@IPVS_CMD_ATTR_SERVICE={0x30, 0x1, [@IPVS_SVC_ATTR_PORT={0x8, 0x4}, @IPVS_SVC_ATTR_AF={0x8, 0x1, 0x2}, @IPVS_SVC_ATTR_PROTOCOL={0x8, 0x2}, @IPVS_SVC_ATTR_ADDR={0x14, 0x3, @ipv6=@dev={0xfe, 0x80}}]}]}, 0x44}, 0x1}, 0x0) 2018/04/13 21:33:53 executing program 7: perf_event_open(&(0x7f00000017c0)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x80001, 0x0) setsockopt$inet6_MCAST_JOIN_GROUP(r0, 0x29, 0x2a, &(0x7f0000fca000)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x1, [], 0x1}}}}, 0x88) setsockopt$inet6_MCAST_MSFILTER(r0, 0x29, 0x2d, &(0x7f0000000000)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x1, [], 0x1}}}}, 0x90) 2018/04/13 21:33:53 executing program 3: perf_event_open(&(0x7f0000348f88)={0x2, 0x78, 0x3e2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = userfaultfd(0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000602fe8)={0xaa, 0x40}) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000c20000)={{&(0x7f0000068000/0x800000)=nil, 0x800000}, 0x1}) mremap(&(0x7f00006af000/0xf000)=nil, 0xf000, 0x3000, 0x3, &(0x7f00002e0000/0x3000)=nil) close(r0) r1 = socket(0x2000000000010, 0x20000000000003, 0x0) write(r1, &(0x7f0000944fde)="220000005e000721004f10f7e2ffd90000000000000000edff000000e700ff02f157", 0x22) recvfrom$inet6(r1, &(0x7f0000000080)=""/73, 0x49, 0x0, &(0x7f0000000100)={0xa}, 0x1c) ioctl$EVIOCGPROP(0xffffffffffffffff, 0xc004743e, &(0x7f0000000f0a)=""/246) fcntl$setflags(r0, 0x2, 0x1) ioctl$KDGKBMETA(0xffffffffffffffff, 0x4b62, &(0x7f0000000040)) recvfrom(r1, &(0x7f0000362f74)=""/140, 0x8c, 0x0, 0x0, 0x0) 2018/04/13 21:33:53 executing program 6: mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1001, 0x32, 0xffffffffffffffff, 0x0) r0 = userfaultfd(0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000f6bfe8)={0xaa}) ioctl$UFFDIO_UNREGISTER(r0, 0x8010aa01, &(0x7f0000000080)={&(0x7f0000152000/0x1000)=nil, 0x1000}) 2018/04/13 21:33:53 executing program 4: r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r0, &(0x7f000067efe4)={0xa, 0x4e20}, 0x1c) sendto$inet6(r0, &(0x7f00005a0fff)='8', 0x1, 0x0, &(0x7f00007bcfe4)={0xa, 0x4e20, 0x0, @loopback={0x0, 0x1}}, 0x1c) setsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(r0, 0x84, 0x72, &(0x7f0000bd6ff4)={0x0, 0x0, 0x4000020030}, 0xc) setsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER(r0, 0x84, 0x7b, &(0x7f0000b2b000)={0x0, 0x1}, 0x8) write(r0, &(0x7f0000cbdfb8)='v', 0x1) setsockopt$sock_int(r0, 0x1, 0x7, &(0x7f0000f0cffc), 0x4) write(r0, &(0x7f0000000340)="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", 0xe01) 2018/04/13 21:33:53 executing program 5: perf_event_open(&(0x7f0000348f88)={0x2, 0x70, 0x3e6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000b6cff6)='net/udp\x00') preadv(r0, &(0x7f0000331000)=[{&(0x7f0000723f20)=""/127, 0x7f}], 0x1, 0x102) 2018/04/13 21:33:53 executing program 7: perf_event_open(&(0x7f00000017c0)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x80001, 0x0) setsockopt$inet6_MCAST_JOIN_GROUP(r0, 0x29, 0x2a, &(0x7f0000fca000)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x1, [], 0x1}}}}, 0x88) setsockopt$inet6_MCAST_MSFILTER(r0, 0x29, 0x2d, &(0x7f0000000000)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x1, [], 0x1}}}}, 0x90) 2018/04/13 21:33:53 executing program 0: perf_event_open(&(0x7f0000348f88)={0x2, 0x78, 0x3e2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = userfaultfd(0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000602fe8)={0xaa, 0x40}) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000c20000)={{&(0x7f0000068000/0x800000)=nil, 0x800000}, 0x1}) mremap(&(0x7f00006af000/0xf000)=nil, 0xf000, 0x3000, 0x3, &(0x7f00002e0000/0x3000)=nil) close(r0) r1 = socket(0x2000000000010, 0x20000000000003, 0x0) write(r1, &(0x7f0000944fde)="220000005e000721004f10f7e2ffd90000000000000000edff000000e700ff02f157", 0x22) recvfrom$inet6(r1, &(0x7f0000000080)=""/73, 0x49, 0x0, &(0x7f0000000100)={0xa}, 0x1c) ioctl$EVIOCGPROP(0xffffffffffffffff, 0xc004743e, &(0x7f0000000f0a)=""/246) fcntl$setflags(r0, 0x2, 0x1) ioctl$KDGKBMETA(0xffffffffffffffff, 0x4b62, &(0x7f0000000040)) recvfrom(r1, &(0x7f0000362f74)=""/140, 0x8c, 0x0, 0x0, 0x0) 2018/04/13 21:33:53 executing program 1: perf_event_open(&(0x7f0000348f88)={0x2, 0x78, 0x3e2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = userfaultfd(0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000602fe8)={0xaa, 0x40}) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000c20000)={{&(0x7f0000068000/0x800000)=nil, 0x800000}, 0x1}) mremap(&(0x7f00006af000/0xf000)=nil, 0xf000, 0x3000, 0x3, &(0x7f00002e0000/0x3000)=nil) close(r0) r1 = socket(0x2000000000010, 0x20000000000003, 0x0) write(r1, &(0x7f0000944fde)="220000005e000721004f10f7e2ffd90000000000000000edff000000e700ff02f157", 0x22) recvfrom$inet6(r1, &(0x7f0000000080)=""/73, 0x49, 0x0, &(0x7f0000000100)={0xa}, 0x1c) ioctl$EVIOCGPROP(0xffffffffffffffff, 0xc004743e, &(0x7f0000000f0a)=""/246) fcntl$setflags(r0, 0x2, 0x1) ioctl$KDGKBMETA(0xffffffffffffffff, 0x4b62, &(0x7f0000000040)) recvfrom(r1, &(0x7f0000362f74)=""/140, 0x8c, 0x0, 0x0, 0x0) 2018/04/13 21:33:53 executing program 3: perf_event_open(&(0x7f0000348f88)={0x2, 0x78, 0x3e2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = userfaultfd(0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000602fe8)={0xaa, 0x40}) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000c20000)={{&(0x7f0000068000/0x800000)=nil, 0x800000}, 0x1}) mremap(&(0x7f00006af000/0xf000)=nil, 0xf000, 0x3000, 0x3, &(0x7f00002e0000/0x3000)=nil) close(r0) r1 = socket(0x2000000000010, 0x20000000000003, 0x0) write(r1, &(0x7f0000944fde)="220000005e000721004f10f7e2ffd90000000000000000edff000000e700ff02f157", 0x22) recvfrom$inet6(r1, &(0x7f0000000080)=""/73, 0x49, 0x0, &(0x7f0000000100)={0xa}, 0x1c) ioctl$EVIOCGPROP(0xffffffffffffffff, 0xc004743e, &(0x7f0000000f0a)=""/246) fcntl$setflags(r0, 0x2, 0x1) ioctl$KDGKBMETA(0xffffffffffffffff, 0x4b62, &(0x7f0000000040)) recvfrom(r1, &(0x7f0000362f74)=""/140, 0x8c, 0x0, 0x0, 0x0) 2018/04/13 21:33:53 executing program 2: perf_event_open(&(0x7f0000348f88)={0x2, 0x78, 0x3e2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = userfaultfd(0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000602fe8)={0xaa, 0x40}) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000c20000)={{&(0x7f0000068000/0x800000)=nil, 0x800000}, 0x1}) mremap(&(0x7f00006af000/0xf000)=nil, 0xf000, 0x3000, 0x3, &(0x7f00002e0000/0x3000)=nil) close(r0) r1 = socket(0x2000000000010, 0x20000000000003, 0x0) write(r1, &(0x7f0000944fde)="220000005e000721004f10f7e2ffd90000000000000000edff000000e700ff02f157", 0x22) recvfrom$inet6(r1, &(0x7f0000000080)=""/73, 0x49, 0x0, &(0x7f0000000100)={0xa}, 0x1c) ioctl$EVIOCGPROP(0xffffffffffffffff, 0xc004743e, &(0x7f0000000f0a)=""/246) fcntl$setflags(r0, 0x2, 0x1) ioctl$KDGKBMETA(0xffffffffffffffff, 0x4b62, &(0x7f0000000040)) recvfrom(r1, &(0x7f0000362f74)=""/140, 0x8c, 0x0, 0x0, 0x0) 2018/04/13 21:33:54 executing program 6: mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1001, 0x32, 0xffffffffffffffff, 0x0) r0 = userfaultfd(0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000f6bfe8)={0xaa}) ioctl$UFFDIO_UNREGISTER(r0, 0x8010aa01, &(0x7f0000000080)={&(0x7f0000152000/0x1000)=nil, 0x1000}) 2018/04/13 21:33:54 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0xb, 0x7e, 0x6, 0x1, 0x1}, 0x2c) mount(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000040)={&(0x7f0000000000)='./file0/file0\x00', r0}, 0x10) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x101}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 2018/04/13 21:33:54 executing program 7: perf_event_open(&(0x7f00000017c0)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x80001, 0x0) setsockopt$inet6_MCAST_JOIN_GROUP(r0, 0x29, 0x2a, &(0x7f0000fca000)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x1, [], 0x1}}}}, 0x88) setsockopt$inet6_MCAST_MSFILTER(r0, 0x29, 0x2d, &(0x7f0000000000)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x1, [], 0x1}}}}, 0x90) 2018/04/13 21:33:54 executing program 6: r0 = socket(0x1e, 0x2000000000000005, 0x0) bind$netlink(r0, &(0x7f0000000000)={0x10}, 0xc) 2018/04/13 21:33:54 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0xb, 0x7e, 0x6, 0x1, 0x1}, 0x2c) mount(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000040)={&(0x7f0000000000)='./file0/file0\x00', r0}, 0x10) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x101}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 2018/04/13 21:33:54 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000000c0)={0x26, 'hash\x00', 0x0, 0x0, 'cmac(des3_ede)\x00'}, 0x58) r1 = accept4(r0, 0x0, &(0x7f0000000000)=0xffffff24, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000c18000)="ad56b6c5820faeb995298992ea54c7beef915d56534c90c2", 0x18) sendmsg$alg(r1, &(0x7f0000000440)={0x0, 0x0, &(0x7f00000003c0)=[{&(0x7f0000000380)="5aa60bb216890559d011087c1b1b954591", 0x11}], 0x1, &(0x7f00000007c0)}, 0x0) 2018/04/13 21:33:54 executing program 7: syz_mount_image$bfs(&(0x7f0000000000)='bfs\x00', &(0x7f0000000100)='./file0\x00', 0x10000, 0x1, &(0x7f0000000200)=[{&(0x7f00000001c0)="cefaad1b000e0000ffff3d", 0xb}], 0x0, 0x0) [ 314.636834] BFS-fs: bfs_fill_super(): loop7 is unclean, continuing [ 314.650980] BFS-fs: bfs_fill_super(): Last block not available: 7935 [ 314.691510] BFS-fs: bfs_fill_super(): loop7 is unclean, continuing [ 314.702773] BFS-fs: bfs_fill_super(): Last block not available: 7935 2018/04/13 21:33:54 executing program 6: r0 = socket(0x1e, 0x2000000000000005, 0x0) bind$netlink(r0, &(0x7f0000000000)={0x10}, 0xc) 2018/04/13 21:33:54 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0xb, 0x7e, 0x6, 0x1, 0x1}, 0x2c) mount(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000040)={&(0x7f0000000000)='./file0/file0\x00', r0}, 0x10) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x101}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 2018/04/13 21:33:54 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000000c0)={0x26, 'hash\x00', 0x0, 0x0, 'cmac(des3_ede)\x00'}, 0x58) r1 = accept4(r0, 0x0, &(0x7f0000000000)=0xffffff24, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000c18000)="ad56b6c5820faeb995298992ea54c7beef915d56534c90c2", 0x18) sendmsg$alg(r1, &(0x7f0000000440)={0x0, 0x0, &(0x7f00000003c0)=[{&(0x7f0000000380)="5aa60bb216890559d011087c1b1b954591", 0x11}], 0x1, &(0x7f00000007c0)}, 0x0) 2018/04/13 21:33:54 executing program 7: syz_mount_image$bfs(&(0x7f0000000000)='bfs\x00', &(0x7f0000000100)='./file0\x00', 0x10000, 0x1, &(0x7f0000000200)=[{&(0x7f00000001c0)="cefaad1b000e0000ffff3d", 0xb}], 0x0, 0x0) 2018/04/13 21:33:54 executing program 0: perf_event_open(&(0x7f0000348f88)={0x2, 0x78, 0x3e2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = userfaultfd(0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000602fe8)={0xaa, 0x40}) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000c20000)={{&(0x7f0000068000/0x800000)=nil, 0x800000}, 0x1}) mremap(&(0x7f00006af000/0xf000)=nil, 0xf000, 0x3000, 0x3, &(0x7f00002e0000/0x3000)=nil) close(r0) r1 = socket(0x2000000000010, 0x20000000000003, 0x0) write(r1, &(0x7f0000944fde)="220000005e000721004f10f7e2ffd90000000000000000edff000000e700ff02f157", 0x22) recvfrom$inet6(r1, &(0x7f0000000080)=""/73, 0x49, 0x0, &(0x7f0000000100)={0xa}, 0x1c) ioctl$EVIOCGPROP(0xffffffffffffffff, 0xc004743e, &(0x7f0000000f0a)=""/246) fcntl$setflags(r0, 0x2, 0x1) ioctl$KDGKBMETA(0xffffffffffffffff, 0x4b62, &(0x7f0000000040)) recvfrom(r1, &(0x7f0000362f74)=""/140, 0x8c, 0x0, 0x0, 0x0) 2018/04/13 21:33:54 executing program 1: perf_event_open(&(0x7f0000348f88)={0x2, 0x78, 0x3e2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = userfaultfd(0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000602fe8)={0xaa, 0x40}) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000c20000)={{&(0x7f0000068000/0x800000)=nil, 0x800000}, 0x1}) mremap(&(0x7f00006af000/0xf000)=nil, 0xf000, 0x3000, 0x3, &(0x7f00002e0000/0x3000)=nil) close(r0) r1 = socket(0x2000000000010, 0x20000000000003, 0x0) write(r1, &(0x7f0000944fde)="220000005e000721004f10f7e2ffd90000000000000000edff000000e700ff02f157", 0x22) recvfrom$inet6(r1, &(0x7f0000000080)=""/73, 0x49, 0x0, &(0x7f0000000100)={0xa}, 0x1c) ioctl$EVIOCGPROP(0xffffffffffffffff, 0xc004743e, &(0x7f0000000f0a)=""/246) fcntl$setflags(r0, 0x2, 0x1) ioctl$KDGKBMETA(0xffffffffffffffff, 0x4b62, &(0x7f0000000040)) recvfrom(r1, &(0x7f0000362f74)=""/140, 0x8c, 0x0, 0x0, 0x0) 2018/04/13 21:33:54 executing program 3: perf_event_open(&(0x7f0000348f88)={0x2, 0x78, 0x3e2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = userfaultfd(0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000602fe8)={0xaa, 0x40}) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000c20000)={{&(0x7f0000068000/0x800000)=nil, 0x800000}, 0x1}) mremap(&(0x7f00006af000/0xf000)=nil, 0xf000, 0x3000, 0x3, &(0x7f00002e0000/0x3000)=nil) close(r0) r1 = socket(0x2000000000010, 0x20000000000003, 0x0) write(r1, &(0x7f0000944fde)="220000005e000721004f10f7e2ffd90000000000000000edff000000e700ff02f157", 0x22) recvfrom$inet6(r1, &(0x7f0000000080)=""/73, 0x49, 0x0, &(0x7f0000000100)={0xa}, 0x1c) ioctl$EVIOCGPROP(0xffffffffffffffff, 0xc004743e, &(0x7f0000000f0a)=""/246) fcntl$setflags(r0, 0x2, 0x1) ioctl$KDGKBMETA(0xffffffffffffffff, 0x4b62, &(0x7f0000000040)) recvfrom(r1, &(0x7f0000362f74)=""/140, 0x8c, 0x0, 0x0, 0x0) 2018/04/13 21:33:54 executing program 2: perf_event_open(&(0x7f0000348f88)={0x2, 0x78, 0x3e2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = userfaultfd(0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000602fe8)={0xaa, 0x40}) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000c20000)={{&(0x7f0000068000/0x800000)=nil, 0x800000}, 0x1}) mremap(&(0x7f00006af000/0xf000)=nil, 0xf000, 0x3000, 0x3, &(0x7f00002e0000/0x3000)=nil) close(r0) r1 = socket(0x2000000000010, 0x20000000000003, 0x0) write(r1, &(0x7f0000944fde)="220000005e000721004f10f7e2ffd90000000000000000edff000000e700ff02f157", 0x22) recvfrom$inet6(r1, &(0x7f0000000080)=""/73, 0x49, 0x0, &(0x7f0000000100)={0xa}, 0x1c) ioctl$EVIOCGPROP(0xffffffffffffffff, 0xc004743e, &(0x7f0000000f0a)=""/246) fcntl$setflags(r0, 0x2, 0x1) ioctl$KDGKBMETA(0xffffffffffffffff, 0x4b62, &(0x7f0000000040)) recvfrom(r1, &(0x7f0000362f74)=""/140, 0x8c, 0x0, 0x0, 0x0) 2018/04/13 21:33:54 executing program 6: r0 = socket(0x1e, 0x2000000000000005, 0x0) bind$netlink(r0, &(0x7f0000000000)={0x10}, 0xc) 2018/04/13 21:33:54 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000000c0)={0x26, 'hash\x00', 0x0, 0x0, 'cmac(des3_ede)\x00'}, 0x58) r1 = accept4(r0, 0x0, &(0x7f0000000000)=0xffffff24, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000c18000)="ad56b6c5820faeb995298992ea54c7beef915d56534c90c2", 0x18) sendmsg$alg(r1, &(0x7f0000000440)={0x0, 0x0, &(0x7f00000003c0)=[{&(0x7f0000000380)="5aa60bb216890559d011087c1b1b954591", 0x11}], 0x1, &(0x7f00000007c0)}, 0x0) 2018/04/13 21:33:54 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0xb, 0x7e, 0x6, 0x1, 0x1}, 0x2c) mount(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000040)={&(0x7f0000000000)='./file0/file0\x00', r0}, 0x10) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x101}, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 315.308541] BFS-fs: bfs_fill_super(): loop7 is unclean, continuing [ 315.331956] BFS-fs: bfs_fill_super(): Last block not available: 7935 2018/04/13 21:33:54 executing program 6: r0 = socket(0x1e, 0x2000000000000005, 0x0) bind$netlink(r0, &(0x7f0000000000)={0x10}, 0xc) 2018/04/13 21:33:54 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000000c0)={0x26, 'hash\x00', 0x0, 0x0, 'cmac(des3_ede)\x00'}, 0x58) r1 = accept4(r0, 0x0, &(0x7f0000000000)=0xffffff24, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000c18000)="ad56b6c5820faeb995298992ea54c7beef915d56534c90c2", 0x18) sendmsg$alg(r1, &(0x7f0000000440)={0x0, 0x0, &(0x7f00000003c0)=[{&(0x7f0000000380)="5aa60bb216890559d011087c1b1b954591", 0x11}], 0x1, &(0x7f00000007c0)}, 0x0) 2018/04/13 21:33:54 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000000c0)={0x26, 'hash\x00', 0x0, 0x0, 'cmac(des3_ede)\x00'}, 0x58) r1 = accept4(r0, 0x0, &(0x7f0000000000)=0xffffff24, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000c18000)="ad56b6c5820faeb995298992ea54c7beef915d56534c90c2", 0x18) sendmsg$alg(r1, &(0x7f0000000440)={0x0, 0x0, &(0x7f00000003c0)=[{&(0x7f0000000380)="5aa60bb216890559d011087c1b1b954591", 0x11}], 0x1, &(0x7f00000007c0)}, 0x0) 2018/04/13 21:33:55 executing program 7: syz_mount_image$bfs(&(0x7f0000000000)='bfs\x00', &(0x7f0000000100)='./file0\x00', 0x10000, 0x1, &(0x7f0000000200)=[{&(0x7f00000001c0)="cefaad1b000e0000ffff3d", 0xb}], 0x0, 0x0) [ 315.495071] BFS-fs: bfs_fill_super(): loop7 is unclean, continuing [ 315.508120] BFS-fs: bfs_fill_super(): Last block not available: 7935 2018/04/13 21:33:55 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f0000000280)={0x200000000000000e, 0x5, &(0x7f0000000000)=ANY=[@ANYBLOB="18020000000000ff0000000002800000850000002700000005000000000000009500000000000000"], &(0x7f00000000c0)="00007bf056c718041899f95b1a", 0x1, 0xce, &(0x7f0000000300)=""/206}, 0x48) 2018/04/13 21:33:55 executing program 6: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) mmap(&(0x7f0000000000/0xda6000)=nil, 0xda6000, 0x0, 0x64031, 0xffffffffffffffff, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) r3 = dup3(r2, r0, 0x0) ioctl$KVM_SET_GUEST_DEBUG(r3, 0x4048ae9b, &(0x7f0000000280)) 2018/04/13 21:33:55 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000000c0)={0x26, 'hash\x00', 0x0, 0x0, 'cmac(des3_ede)\x00'}, 0x58) r1 = accept4(r0, 0x0, &(0x7f0000000000)=0xffffff24, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000c18000)="ad56b6c5820faeb995298992ea54c7beef915d56534c90c2", 0x18) sendmsg$alg(r1, &(0x7f0000000440)={0x0, 0x0, &(0x7f00000003c0)=[{&(0x7f0000000380)="5aa60bb216890559d011087c1b1b954591", 0x11}], 0x1, &(0x7f00000007c0)}, 0x0) 2018/04/13 21:33:55 executing program 7: syz_mount_image$bfs(&(0x7f0000000000)='bfs\x00', &(0x7f0000000100)='./file0\x00', 0x10000, 0x1, &(0x7f0000000200)=[{&(0x7f00000001c0)="cefaad1b000e0000ffff3d", 0xb}], 0x0, 0x0) 2018/04/13 21:33:55 executing program 0: mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0) r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x5, 0x0) setsockopt$bt_l2cap_L2CAP_OPTIONS(r0, 0x6, 0x1, &(0x7f0000000000), 0xc) 2018/04/13 21:33:55 executing program 1: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000240)='./cgroup.cpu\x00', 0x200002, 0x0) r1 = openat$cgroup_int(r0, &(0x7f0000000000)='cpuset.cpus\x00', 0x2, 0x0) write$cgroup_int(r1, &(0x7f0000000040)={[0x37, 0x2d, 0x36]}, 0x3) 2018/04/13 21:33:55 executing program 4: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f00003b9fdc)) r1 = syz_open_pts(r0, 0x0) ioctl$TCSETAF(r0, 0x5408, &(0x7f0000000080)) ioctl$TIOCSETD(r1, 0x5423, &(0x7f00000000c0)=0x3) ioctl$TIOCGLCKTRMIOS(r1, 0x5412, &(0x7f0000000000)) 2018/04/13 21:33:55 executing program 2: bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0xf}, 0x2c) 2018/04/13 21:33:55 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000000c0)={0x26, 'hash\x00', 0x0, 0x0, 'cmac(des3_ede)\x00'}, 0x58) r1 = accept4(r0, 0x0, &(0x7f0000000000)=0xffffff24, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000c18000)="ad56b6c5820faeb995298992ea54c7beef915d56534c90c2", 0x18) sendmsg$alg(r1, &(0x7f0000000440)={0x0, 0x0, &(0x7f00000003c0)=[{&(0x7f0000000380)="5aa60bb216890559d011087c1b1b954591", 0x11}], 0x1, &(0x7f00000007c0)}, 0x0) 2018/04/13 21:33:55 executing program 2: bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0xf}, 0x2c) [ 316.203885] BFS-fs: bfs_fill_super(): loop7 is unclean, continuing [ 316.218194] BFS-fs: bfs_fill_super(): Last block not available: 7935 2018/04/13 21:33:55 executing program 1: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000240)='./cgroup.cpu\x00', 0x200002, 0x0) r1 = openat$cgroup_int(r0, &(0x7f0000000000)='cpuset.cpus\x00', 0x2, 0x0) write$cgroup_int(r1, &(0x7f0000000040)={[0x37, 0x2d, 0x36]}, 0x3) 2018/04/13 21:33:55 executing program 0: mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0) r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x5, 0x0) setsockopt$bt_l2cap_L2CAP_OPTIONS(r0, 0x6, 0x1, &(0x7f0000000000), 0xc) 2018/04/13 21:33:55 executing program 4: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f00003b9fdc)) r1 = syz_open_pts(r0, 0x0) ioctl$TCSETAF(r0, 0x5408, &(0x7f0000000080)) ioctl$TIOCSETD(r1, 0x5423, &(0x7f00000000c0)=0x3) ioctl$TIOCGLCKTRMIOS(r1, 0x5412, &(0x7f0000000000)) 2018/04/13 21:33:55 executing program 7: syz_mount_image$reiserfs(&(0x7f0000000000)='reiserfs\x00', &(0x7f0000000200)='./control\x00', 0x0, 0x0, &(0x7f00000015c0), 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='usrjquota=']) 2018/04/13 21:33:55 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f0000000280)={0x200000000000000e, 0x5, &(0x7f0000000000)=ANY=[@ANYBLOB="18020000000000ff0000000002800000850000002700000005000000000000009500000000000000"], &(0x7f00000000c0)="00007bf056c718041899f95b1a", 0x1, 0xce, &(0x7f0000000300)=""/206}, 0x48) 2018/04/13 21:33:55 executing program 5: futex(&(0x7f000000cffc), 0x0, 0x0, &(0x7f0000edfff0)={0x77359400}, &(0x7f0000000140), 0x0) futex(&(0x7f000000cffc), 0x5, 0x0, &(0x7f0000000080)={0x77359400}, &(0x7f000044b000), 0x0) 2018/04/13 21:33:55 executing program 6: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) mmap(&(0x7f0000000000/0xda6000)=nil, 0xda6000, 0x0, 0x64031, 0xffffffffffffffff, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) r3 = dup3(r2, r0, 0x0) ioctl$KVM_SET_GUEST_DEBUG(r3, 0x4048ae9b, &(0x7f0000000280)) 2018/04/13 21:33:55 executing program 2: bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0xf}, 0x2c) 2018/04/13 21:33:55 executing program 0: mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0) r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x5, 0x0) setsockopt$bt_l2cap_L2CAP_OPTIONS(r0, 0x6, 0x1, &(0x7f0000000000), 0xc) 2018/04/13 21:33:55 executing program 1: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000240)='./cgroup.cpu\x00', 0x200002, 0x0) r1 = openat$cgroup_int(r0, &(0x7f0000000000)='cpuset.cpus\x00', 0x2, 0x0) write$cgroup_int(r1, &(0x7f0000000040)={[0x37, 0x2d, 0x36]}, 0x3) [ 316.385805] REISERFS warning (device loop7): sh-2021 reiserfs_fill_super: can not find reiserfs on loop7 2018/04/13 21:33:56 executing program 4: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f00003b9fdc)) r1 = syz_open_pts(r0, 0x0) ioctl$TCSETAF(r0, 0x5408, &(0x7f0000000080)) ioctl$TIOCSETD(r1, 0x5423, &(0x7f00000000c0)=0x3) ioctl$TIOCGLCKTRMIOS(r1, 0x5412, &(0x7f0000000000)) 2018/04/13 21:33:56 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f0000000280)={0x200000000000000e, 0x5, &(0x7f0000000000)=ANY=[@ANYBLOB="18020000000000ff0000000002800000850000002700000005000000000000009500000000000000"], &(0x7f00000000c0)="00007bf056c718041899f95b1a", 0x1, 0xce, &(0x7f0000000300)=""/206}, 0x48) 2018/04/13 21:33:56 executing program 0: mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0) r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x5, 0x0) setsockopt$bt_l2cap_L2CAP_OPTIONS(r0, 0x6, 0x1, &(0x7f0000000000), 0xc) [ 316.449317] REISERFS warning (device loop7): sh-2021 reiserfs_fill_super: can not find reiserfs on loop7 2018/04/13 21:33:56 executing program 2: bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0xf}, 0x2c) 2018/04/13 21:33:56 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f0000000280)={0x200000000000000e, 0x5, &(0x7f0000000000)=ANY=[@ANYBLOB="18020000000000ff0000000002800000850000002700000005000000000000009500000000000000"], &(0x7f00000000c0)="00007bf056c718041899f95b1a", 0x1, 0xce, &(0x7f0000000300)=""/206}, 0x48) 2018/04/13 21:33:56 executing program 1: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000240)='./cgroup.cpu\x00', 0x200002, 0x0) r1 = openat$cgroup_int(r0, &(0x7f0000000000)='cpuset.cpus\x00', 0x2, 0x0) write$cgroup_int(r1, &(0x7f0000000040)={[0x37, 0x2d, 0x36]}, 0x3) 2018/04/13 21:33:56 executing program 2: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f000031f000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x2000000802, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f0000f68000)={@ipv4={[], [0xff, 0xff], @rand_addr}}, 0x20) 2018/04/13 21:33:56 executing program 0: mmap$binder(&(0x7f0000001000/0x4000)=nil, 0x4000, 0x2, 0x100000002132, 0xffffffffffffffff, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) mmap(&(0x7f0000000000/0x4000)=nil, 0x4000, 0x0, 0xc812, r0, 0x0) perf_event_open(&(0x7f0000000080)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 2018/04/13 21:33:56 executing program 6: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) mmap(&(0x7f0000000000/0xda6000)=nil, 0xda6000, 0x0, 0x64031, 0xffffffffffffffff, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) r3 = dup3(r2, r0, 0x0) ioctl$KVM_SET_GUEST_DEBUG(r3, 0x4048ae9b, &(0x7f0000000280)) 2018/04/13 21:33:56 executing program 4: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f00003b9fdc)) r1 = syz_open_pts(r0, 0x0) ioctl$TCSETAF(r0, 0x5408, &(0x7f0000000080)) ioctl$TIOCSETD(r1, 0x5423, &(0x7f00000000c0)=0x3) ioctl$TIOCGLCKTRMIOS(r1, 0x5412, &(0x7f0000000000)) 2018/04/13 21:33:56 executing program 5: futex(&(0x7f000000cffc), 0x0, 0x0, &(0x7f0000edfff0)={0x77359400}, &(0x7f0000000140), 0x0) futex(&(0x7f000000cffc), 0x5, 0x0, &(0x7f0000000080)={0x77359400}, &(0x7f000044b000), 0x0) 2018/04/13 21:33:56 executing program 7: syz_mount_image$reiserfs(&(0x7f0000000000)='reiserfs\x00', &(0x7f0000000200)='./control\x00', 0x0, 0x0, &(0x7f00000015c0), 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='usrjquota=']) 2018/04/13 21:33:56 executing program 3: perf_event_open(&(0x7f0000348f88)={0x2, 0x70, 0x3e2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000040)='net\x00') fchdir(r0) syz_fuseblk_mount(&(0x7f0000000000)='2/file0\x00', &(0x7f0000dd3ff8)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) 2018/04/13 21:33:56 executing program 1: r0 = eventfd2(0x2, 0x0) write$eventfd(r0, &(0x7f0000000000)=0xfffffffffffffffd, 0x8) write$eventfd(r0, &(0x7f0000000140), 0x8) readv(r0, &(0x7f0000002fe0)=[{&(0x7f0000000080)=""/108, 0x31}], 0x1) [ 317.272741] REISERFS warning (device loop7): sh-2021 reiserfs_fill_super: can not find reiserfs on loop7 2018/04/13 21:33:57 executing program 5: futex(&(0x7f000000cffc), 0x0, 0x0, &(0x7f0000edfff0)={0x77359400}, &(0x7f0000000140), 0x0) futex(&(0x7f000000cffc), 0x5, 0x0, &(0x7f0000000080)={0x77359400}, &(0x7f000044b000), 0x0) 2018/04/13 21:33:57 executing program 0: mmap$binder(&(0x7f0000001000/0x4000)=nil, 0x4000, 0x2, 0x100000002132, 0xffffffffffffffff, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) mmap(&(0x7f0000000000/0x4000)=nil, 0x4000, 0x0, 0xc812, r0, 0x0) perf_event_open(&(0x7f0000000080)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 2018/04/13 21:33:57 executing program 7: syz_mount_image$reiserfs(&(0x7f0000000000)='reiserfs\x00', &(0x7f0000000200)='./control\x00', 0x0, 0x0, &(0x7f00000015c0), 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='usrjquota=']) 2018/04/13 21:33:57 executing program 2: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f000031f000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x2000000802, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f0000f68000)={@ipv4={[], [0xff, 0xff], @rand_addr}}, 0x20) 2018/04/13 21:33:57 executing program 6: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) mmap(&(0x7f0000000000/0xda6000)=nil, 0xda6000, 0x0, 0x64031, 0xffffffffffffffff, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) r3 = dup3(r2, r0, 0x0) ioctl$KVM_SET_GUEST_DEBUG(r3, 0x4048ae9b, &(0x7f0000000280)) 2018/04/13 21:33:57 executing program 3: perf_event_open(&(0x7f0000348f88)={0x2, 0x70, 0x3e2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000040)='net\x00') fchdir(r0) syz_fuseblk_mount(&(0x7f0000000000)='2/file0\x00', &(0x7f0000dd3ff8)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) 2018/04/13 21:33:57 executing program 1: r0 = eventfd2(0x2, 0x0) write$eventfd(r0, &(0x7f0000000000)=0xfffffffffffffffd, 0x8) write$eventfd(r0, &(0x7f0000000140), 0x8) readv(r0, &(0x7f0000002fe0)=[{&(0x7f0000000080)=""/108, 0x31}], 0x1) 2018/04/13 21:33:57 executing program 4: r0 = socket$vsock_stream(0x28, 0x1, 0x0) setsockopt$SO_VM_SOCKETS_BUFFER_MIN_SIZE(r0, 0x28, 0x1, &(0x7f0000000000), 0x1) 2018/04/13 21:33:57 executing program 3: perf_event_open(&(0x7f0000348f88)={0x2, 0x70, 0x3e2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000040)='net\x00') fchdir(r0) syz_fuseblk_mount(&(0x7f0000000000)='2/file0\x00', &(0x7f0000dd3ff8)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) 2018/04/13 21:33:57 executing program 2: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f000031f000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x2000000802, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f0000f68000)={@ipv4={[], [0xff, 0xff], @rand_addr}}, 0x20) [ 318.231785] REISERFS warning (device loop7): sh-2021 reiserfs_fill_super: can not find reiserfs on loop7 2018/04/13 21:33:57 executing program 4: r0 = socket$vsock_stream(0x28, 0x1, 0x0) setsockopt$SO_VM_SOCKETS_BUFFER_MIN_SIZE(r0, 0x28, 0x1, &(0x7f0000000000), 0x1) 2018/04/13 21:33:57 executing program 0: mmap$binder(&(0x7f0000001000/0x4000)=nil, 0x4000, 0x2, 0x100000002132, 0xffffffffffffffff, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) mmap(&(0x7f0000000000/0x4000)=nil, 0x4000, 0x0, 0xc812, r0, 0x0) perf_event_open(&(0x7f0000000080)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 2018/04/13 21:33:57 executing program 7: syz_mount_image$reiserfs(&(0x7f0000000000)='reiserfs\x00', &(0x7f0000000200)='./control\x00', 0x0, 0x0, &(0x7f00000015c0), 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='usrjquota=']) 2018/04/13 21:33:57 executing program 6: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000498000)={&(0x7f0000d55000)={0x10}, 0xc, &(0x7f00008b7ff0)={&(0x7f00003c0fdc)={0x20, 0x0, 0x1, 0x800000001, 0x0, 0x0, {0xa}, [@nested={0xc, 0x2, [@typed={0x8, 0x1, @ipv4=@local={0xac, 0x14, 0xffffffffffffffff, 0xaa}}]}]}, 0x20}, 0x1}, 0x0) 2018/04/13 21:33:57 executing program 4: r0 = socket$vsock_stream(0x28, 0x1, 0x0) setsockopt$SO_VM_SOCKETS_BUFFER_MIN_SIZE(r0, 0x28, 0x1, &(0x7f0000000000), 0x1) 2018/04/13 21:33:57 executing program 3: perf_event_open(&(0x7f0000348f88)={0x2, 0x70, 0x3e2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000040)='net\x00') fchdir(r0) syz_fuseblk_mount(&(0x7f0000000000)='2/file0\x00', &(0x7f0000dd3ff8)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) [ 318.385321] netlink: 4 bytes leftover after parsing attributes in process `syz-executor6'. [ 318.415390] REISERFS warning (device loop7): sh-2021 reiserfs_fill_super: can not find reiserfs on loop7 2018/04/13 21:33:58 executing program 0: mmap$binder(&(0x7f0000001000/0x4000)=nil, 0x4000, 0x2, 0x100000002132, 0xffffffffffffffff, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) mmap(&(0x7f0000000000/0x4000)=nil, 0x4000, 0x0, 0xc812, r0, 0x0) perf_event_open(&(0x7f0000000080)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 2018/04/13 21:33:58 executing program 4: r0 = socket$vsock_stream(0x28, 0x1, 0x0) setsockopt$SO_VM_SOCKETS_BUFFER_MIN_SIZE(r0, 0x28, 0x1, &(0x7f0000000000), 0x1) 2018/04/13 21:33:58 executing program 2: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f000031f000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x2000000802, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f0000f68000)={@ipv4={[], [0xff, 0xff], @rand_addr}}, 0x20) 2018/04/13 21:33:58 executing program 6: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000498000)={&(0x7f0000d55000)={0x10}, 0xc, &(0x7f00008b7ff0)={&(0x7f00003c0fdc)={0x20, 0x0, 0x1, 0x800000001, 0x0, 0x0, {0xa}, [@nested={0xc, 0x2, [@typed={0x8, 0x1, @ipv4=@local={0xac, 0x14, 0xffffffffffffffff, 0xaa}}]}]}, 0x20}, 0x1}, 0x0) 2018/04/13 21:33:58 executing program 7: syz_open_dev$sndctrl(&(0x7f0000000000)='/dev/snd/controlC#\x00', 0x0, 0x0) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000040)={0xffffffffffffffff, &(0x7f00000000c0)="b82283392dc50ff1fb635a5849d2f5916ae2fdc24e95e12aa8daccf7393e72be9cc66f"}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f0000346fd4)={0x0, 0x0, 0x0, 0x1000000000000004, 0x202}, 0x2c) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x1, 0x5, &(0x7f0000346fc8)=@framed={{0x18}, [@alu={0x8000000201a7f19, 0x0, 0x7, 0x0, 0x1}], {0x95}}, &(0x7f0000f6bffb)='GPL\x00', 0x0, 0x299, &(0x7f00001a7f05)=""/251}, 0x18) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000140)={r0, 0x50, &(0x7f00000000c0)}, 0x10) socketpair$inet_icmp(0x13, 0xc0045540, 0x6f2000, &(0x7f00000003c0)) 2018/04/13 21:33:58 executing program 3: syz_emit_ethernet(0x2a, &(0x7f00006ba000)={@link_local={0x1, 0x80, 0xc2}, @random="e2701bb60589", [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x14, 0x0, 0x0, 0x0, 0x6c, 0x0, @rand_addr, @broadcast=0xffffffff}, @igmp={0x0, 0x0, 0x0, @multicast1=0xe0000001}}}}}, &(0x7f0000ea3000)) 2018/04/13 21:33:58 executing program 1: r0 = eventfd2(0x2, 0x0) write$eventfd(r0, &(0x7f0000000000)=0xfffffffffffffffd, 0x8) write$eventfd(r0, &(0x7f0000000140), 0x8) readv(r0, &(0x7f0000002fe0)=[{&(0x7f0000000080)=""/108, 0x31}], 0x1) 2018/04/13 21:33:58 executing program 5: futex(&(0x7f000000cffc), 0x0, 0x0, &(0x7f0000edfff0)={0x77359400}, &(0x7f0000000140), 0x0) futex(&(0x7f000000cffc), 0x5, 0x0, &(0x7f0000000080)={0x77359400}, &(0x7f000044b000), 0x0) 2018/04/13 21:33:58 executing program 4: ioctl$DRM_IOCTL_AGP_FREE(0xffffffffffffffff, 0x40206435, &(0x7f0000002000)={0x0, 0x0, 0x0, 0x501371}) bpf$PROG_LOAD(0x5, &(0x7f00006f4fb8)={0x1, 0x5, &(0x7f0000002000)=@framed={{0x18}, [@jmp={0x5}], {0x95}}, &(0x7f0000003ff6)='syzkaller\x00', 0xea4f, 0x164, &(0x7f000000a000)=""/195}, 0x48) 2018/04/13 21:33:58 executing program 3: syz_emit_ethernet(0x2a, &(0x7f00006ba000)={@link_local={0x1, 0x80, 0xc2}, @random="e2701bb60589", [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x14, 0x0, 0x0, 0x0, 0x6c, 0x0, @rand_addr, @broadcast=0xffffffff}, @igmp={0x0, 0x0, 0x0, @multicast1=0xe0000001}}}}}, &(0x7f0000ea3000)) 2018/04/13 21:33:58 executing program 0: mkdir(&(0x7f000053bff8)='./file0\x00', 0x0) mount(&(0x7f0000b79ff8)='./file0\x00', &(0x7f0000db0ff8)='./file0\x00', &(0x7f0000f9cffb)='proc\x00', 0x0, &(0x7f0000000040)) r0 = open(&(0x7f000054eff8)='./file0\x00', 0x0, 0x0) getdents(r0, &(0x7f0000077000)=""/133, 0x139) getdents64(r0, &(0x7f0000000040)=""/1679, 0x68f) getdents64(r0, &(0x7f0000179f35)=""/203, 0xcb) [ 319.106583] netlink: 4 bytes leftover after parsing attributes in process `syz-executor6'. 2018/04/13 21:33:58 executing program 2: semget$private(0x0, 0x0, 0x0) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000040)={0xffffffffffffffff, &(0x7f00000000c0)="b82283392dc50ff1fb635a5849d2f5916ae2fdc24e95e12aa8daccf7393e72be9cc66f"}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f0000346fd4)={0x0, 0x0, 0x0, 0x1040000000000004, 0x400000a4}, 0x127) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x1, 0x5, &(0x7f0000346fc8)=@framed={{0x18}, [@alu={0x8000000201a7f19, 0x0, 0x7, 0x0, 0x1}], {0x95}}, &(0x7f0000f6bffb)='GPL\x00', 0x0, 0x299, &(0x7f00001a7f05)=""/251}, 0x18) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000140)={r0, 0x50, &(0x7f00000000c0)}, 0x10) socketpair$inet_icmp(0x730000, 0x2, 0x1, &(0x7f0000000000)) 2018/04/13 21:33:58 executing program 6: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000498000)={&(0x7f0000d55000)={0x10}, 0xc, &(0x7f00008b7ff0)={&(0x7f00003c0fdc)={0x20, 0x0, 0x1, 0x800000001, 0x0, 0x0, {0xa}, [@nested={0xc, 0x2, [@typed={0x8, 0x1, @ipv4=@local={0xac, 0x14, 0xffffffffffffffff, 0xaa}}]}]}, 0x20}, 0x1}, 0x0) 2018/04/13 21:33:58 executing program 4: ioctl$DRM_IOCTL_AGP_FREE(0xffffffffffffffff, 0x40206435, &(0x7f0000002000)={0x0, 0x0, 0x0, 0x501371}) bpf$PROG_LOAD(0x5, &(0x7f00006f4fb8)={0x1, 0x5, &(0x7f0000002000)=@framed={{0x18}, [@jmp={0x5}], {0x95}}, &(0x7f0000003ff6)='syzkaller\x00', 0xea4f, 0x164, &(0x7f000000a000)=""/195}, 0x48) 2018/04/13 21:33:58 executing program 3: syz_emit_ethernet(0x2a, &(0x7f00006ba000)={@link_local={0x1, 0x80, 0xc2}, @random="e2701bb60589", [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x14, 0x0, 0x0, 0x0, 0x6c, 0x0, @rand_addr, @broadcast=0xffffffff}, @igmp={0x0, 0x0, 0x0, @multicast1=0xe0000001}}}}}, &(0x7f0000ea3000)) 2018/04/13 21:33:58 executing program 7: syz_open_dev$sndctrl(&(0x7f0000000000)='/dev/snd/controlC#\x00', 0x0, 0x0) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000040)={0xffffffffffffffff, &(0x7f00000000c0)="b82283392dc50ff1fb635a5849d2f5916ae2fdc24e95e12aa8daccf7393e72be9cc66f"}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f0000346fd4)={0x0, 0x0, 0x0, 0x1000000000000004, 0x202}, 0x2c) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x1, 0x5, &(0x7f0000346fc8)=@framed={{0x18}, [@alu={0x8000000201a7f19, 0x0, 0x7, 0x0, 0x1}], {0x95}}, &(0x7f0000f6bffb)='GPL\x00', 0x0, 0x299, &(0x7f00001a7f05)=""/251}, 0x18) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000140)={r0, 0x50, &(0x7f00000000c0)}, 0x10) socketpair$inet_icmp(0x13, 0xc0045540, 0x6f2000, &(0x7f00000003c0)) 2018/04/13 21:33:58 executing program 0: mkdir(&(0x7f000053bff8)='./file0\x00', 0x0) mount(&(0x7f0000b79ff8)='./file0\x00', &(0x7f0000db0ff8)='./file0\x00', &(0x7f0000f9cffb)='proc\x00', 0x0, &(0x7f0000000040)) r0 = open(&(0x7f000054eff8)='./file0\x00', 0x0, 0x0) getdents(r0, &(0x7f0000077000)=""/133, 0x139) getdents64(r0, &(0x7f0000000040)=""/1679, 0x68f) getdents64(r0, &(0x7f0000179f35)=""/203, 0xcb) [ 319.252830] netlink: 4 bytes leftover after parsing attributes in process `syz-executor6'. 2018/04/13 21:33:59 executing program 2: semget$private(0x0, 0x0, 0x0) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000040)={0xffffffffffffffff, &(0x7f00000000c0)="b82283392dc50ff1fb635a5849d2f5916ae2fdc24e95e12aa8daccf7393e72be9cc66f"}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f0000346fd4)={0x0, 0x0, 0x0, 0x1040000000000004, 0x400000a4}, 0x127) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x1, 0x5, &(0x7f0000346fc8)=@framed={{0x18}, [@alu={0x8000000201a7f19, 0x0, 0x7, 0x0, 0x1}], {0x95}}, &(0x7f0000f6bffb)='GPL\x00', 0x0, 0x299, &(0x7f00001a7f05)=""/251}, 0x18) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000140)={r0, 0x50, &(0x7f00000000c0)}, 0x10) socketpair$inet_icmp(0x730000, 0x2, 0x1, &(0x7f0000000000)) 2018/04/13 21:33:59 executing program 3: syz_emit_ethernet(0x2a, &(0x7f00006ba000)={@link_local={0x1, 0x80, 0xc2}, @random="e2701bb60589", [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x14, 0x0, 0x0, 0x0, 0x6c, 0x0, @rand_addr, @broadcast=0xffffffff}, @igmp={0x0, 0x0, 0x0, @multicast1=0xe0000001}}}}}, &(0x7f0000ea3000)) 2018/04/13 21:33:59 executing program 4: ioctl$DRM_IOCTL_AGP_FREE(0xffffffffffffffff, 0x40206435, &(0x7f0000002000)={0x0, 0x0, 0x0, 0x501371}) bpf$PROG_LOAD(0x5, &(0x7f00006f4fb8)={0x1, 0x5, &(0x7f0000002000)=@framed={{0x18}, [@jmp={0x5}], {0x95}}, &(0x7f0000003ff6)='syzkaller\x00', 0xea4f, 0x164, &(0x7f000000a000)=""/195}, 0x48) 2018/04/13 21:33:59 executing program 6: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000498000)={&(0x7f0000d55000)={0x10}, 0xc, &(0x7f00008b7ff0)={&(0x7f00003c0fdc)={0x20, 0x0, 0x1, 0x800000001, 0x0, 0x0, {0xa}, [@nested={0xc, 0x2, [@typed={0x8, 0x1, @ipv4=@local={0xac, 0x14, 0xffffffffffffffff, 0xaa}}]}]}, 0x20}, 0x1}, 0x0) 2018/04/13 21:33:59 executing program 7: syz_open_dev$sndctrl(&(0x7f0000000000)='/dev/snd/controlC#\x00', 0x0, 0x0) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000040)={0xffffffffffffffff, &(0x7f00000000c0)="b82283392dc50ff1fb635a5849d2f5916ae2fdc24e95e12aa8daccf7393e72be9cc66f"}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f0000346fd4)={0x0, 0x0, 0x0, 0x1000000000000004, 0x202}, 0x2c) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x1, 0x5, &(0x7f0000346fc8)=@framed={{0x18}, [@alu={0x8000000201a7f19, 0x0, 0x7, 0x0, 0x1}], {0x95}}, &(0x7f0000f6bffb)='GPL\x00', 0x0, 0x299, &(0x7f00001a7f05)=""/251}, 0x18) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000140)={r0, 0x50, &(0x7f00000000c0)}, 0x10) socketpair$inet_icmp(0x13, 0xc0045540, 0x6f2000, &(0x7f00000003c0)) 2018/04/13 21:33:59 executing program 0: mkdir(&(0x7f000053bff8)='./file0\x00', 0x0) mount(&(0x7f0000b79ff8)='./file0\x00', &(0x7f0000db0ff8)='./file0\x00', &(0x7f0000f9cffb)='proc\x00', 0x0, &(0x7f0000000040)) r0 = open(&(0x7f000054eff8)='./file0\x00', 0x0, 0x0) getdents(r0, &(0x7f0000077000)=""/133, 0x139) getdents64(r0, &(0x7f0000000040)=""/1679, 0x68f) getdents64(r0, &(0x7f0000179f35)=""/203, 0xcb) 2018/04/13 21:33:59 executing program 1: r0 = eventfd2(0x2, 0x0) write$eventfd(r0, &(0x7f0000000000)=0xfffffffffffffffd, 0x8) write$eventfd(r0, &(0x7f0000000140), 0x8) readv(r0, &(0x7f0000002fe0)=[{&(0x7f0000000080)=""/108, 0x31}], 0x1) 2018/04/13 21:33:59 executing program 5: capset(&(0x7f00002d0ff8)={0x20071026}, &(0x7f0000cc0000)) r0 = syz_open_dev$sndseq(&(0x7f0000783000)='/dev/snd/seq\x00', 0x0, 0x0) read(r0, &(0x7f0000000040)=""/28, 0x1c) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r0, 0xc0a85320, &(0x7f0000000340)={{0x80}, 'port1\x00', 0xa9824f69d1376637, 0x20000010800a}) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r0, 0x4040534e, &(0x7f000019ffe9)={0xc1}) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_CLIENT(r0, 0xc0bc5351, &(0x7f0000000140)={0x0, 0x0, 'client1\x00', 0x0, "bc1c66dfcfd4386c", "b249dd20d8805d97c884a43de77c8d19a590e1d0a93e60edf7297aacdf8655a5"}) openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000580)='/dev/sequencer2\x00', 0x0, 0x0) r1 = syz_open_dev$loop(&(0x7f0000000000)='/dev/loop#\x00', 0x0, 0x0) ioctl(r1, 0x40000000401870cc, &(0x7f0000006100)) 2018/04/13 21:33:59 executing program 2: semget$private(0x0, 0x0, 0x0) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000040)={0xffffffffffffffff, &(0x7f00000000c0)="b82283392dc50ff1fb635a5849d2f5916ae2fdc24e95e12aa8daccf7393e72be9cc66f"}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f0000346fd4)={0x0, 0x0, 0x0, 0x1040000000000004, 0x400000a4}, 0x127) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x1, 0x5, &(0x7f0000346fc8)=@framed={{0x18}, [@alu={0x8000000201a7f19, 0x0, 0x7, 0x0, 0x1}], {0x95}}, &(0x7f0000f6bffb)='GPL\x00', 0x0, 0x299, &(0x7f00001a7f05)=""/251}, 0x18) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000140)={r0, 0x50, &(0x7f00000000c0)}, 0x10) socketpair$inet_icmp(0x730000, 0x2, 0x1, &(0x7f0000000000)) 2018/04/13 21:33:59 executing program 7: syz_open_dev$sndctrl(&(0x7f0000000000)='/dev/snd/controlC#\x00', 0x0, 0x0) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000040)={0xffffffffffffffff, &(0x7f00000000c0)="b82283392dc50ff1fb635a5849d2f5916ae2fdc24e95e12aa8daccf7393e72be9cc66f"}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f0000346fd4)={0x0, 0x0, 0x0, 0x1000000000000004, 0x202}, 0x2c) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x1, 0x5, &(0x7f0000346fc8)=@framed={{0x18}, [@alu={0x8000000201a7f19, 0x0, 0x7, 0x0, 0x1}], {0x95}}, &(0x7f0000f6bffb)='GPL\x00', 0x0, 0x299, &(0x7f00001a7f05)=""/251}, 0x18) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000140)={r0, 0x50, &(0x7f00000000c0)}, 0x10) socketpair$inet_icmp(0x13, 0xc0045540, 0x6f2000, &(0x7f00000003c0)) [ 319.928758] netlink: 4 bytes leftover after parsing attributes in process `syz-executor6'. 2018/04/13 21:33:59 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000001880)={&(0x7f0000000580)={0x10}, 0xc, &(0x7f0000001840)={&(0x7f0000000700)=@ipv6_newroute={0x28, 0x18, 0x1, 0x0, 0x0, {0xa}, [@RTA_ENCAP_TYPE={0x8, 0x15, 0x3}, @RTA_ENCAP={0x4, 0x16}]}, 0x28}, 0x1}, 0x0) 2018/04/13 21:33:59 executing program 4: ioctl$DRM_IOCTL_AGP_FREE(0xffffffffffffffff, 0x40206435, &(0x7f0000002000)={0x0, 0x0, 0x0, 0x501371}) bpf$PROG_LOAD(0x5, &(0x7f00006f4fb8)={0x1, 0x5, &(0x7f0000002000)=@framed={{0x18}, [@jmp={0x5}], {0x95}}, &(0x7f0000003ff6)='syzkaller\x00', 0xea4f, 0x164, &(0x7f000000a000)=""/195}, 0x48) 2018/04/13 21:33:59 executing program 0: mkdir(&(0x7f000053bff8)='./file0\x00', 0x0) mount(&(0x7f0000b79ff8)='./file0\x00', &(0x7f0000db0ff8)='./file0\x00', &(0x7f0000f9cffb)='proc\x00', 0x0, &(0x7f0000000040)) r0 = open(&(0x7f000054eff8)='./file0\x00', 0x0, 0x0) getdents(r0, &(0x7f0000077000)=""/133, 0x139) getdents64(r0, &(0x7f0000000040)=""/1679, 0x68f) getdents64(r0, &(0x7f0000179f35)=""/203, 0xcb) 2018/04/13 21:33:59 executing program 6: bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x0, 0x3, &(0x7f0000000040)=ANY=[@ANYBLOB="080000000000000000000000028000007a0a00fffffffffd630148"], &(0x7f0000000000)="47504c00bc3047eb525f484f89fc96dd6ca64da40ff023122e66f6", 0x0, 0xce, &(0x7f0000000300)=""/206}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x4, 0x5, &(0x7f0000000040)=@framed={{0x18}, [@jmp={0x5}], {0x95}}, &(0x7f0000000200)='syzkaller\x00', 0x84000001, 0x3342, &(0x7f0000000300)=""/187}, 0x48) [ 320.036068] validate_nla: 5 callbacks suppressed [ 320.036078] netlink: 'syz-executor3': attribute type 21 has an invalid length. 2018/04/13 21:33:59 executing program 4: r0 = syz_open_procfs(0x0, &(0x7f0000000100)='net/netstat\x00') pread64(r0, &(0x7f00000000c0)=""/8, 0x18e, 0x1ffff) 2018/04/13 21:33:59 executing program 7: r0 = inotify_init() unshare(0x400) fcntl$notify(r0, 0x0, 0x283) 2018/04/13 21:33:59 executing program 2: semget$private(0x0, 0x0, 0x0) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000040)={0xffffffffffffffff, &(0x7f00000000c0)="b82283392dc50ff1fb635a5849d2f5916ae2fdc24e95e12aa8daccf7393e72be9cc66f"}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f0000346fd4)={0x0, 0x0, 0x0, 0x1040000000000004, 0x400000a4}, 0x127) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x1, 0x5, &(0x7f0000346fc8)=@framed={{0x18}, [@alu={0x8000000201a7f19, 0x0, 0x7, 0x0, 0x1}], {0x95}}, &(0x7f0000f6bffb)='GPL\x00', 0x0, 0x299, &(0x7f00001a7f05)=""/251}, 0x18) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000140)={r0, 0x50, &(0x7f00000000c0)}, 0x10) socketpair$inet_icmp(0x730000, 0x2, 0x1, &(0x7f0000000000)) 2018/04/13 21:33:59 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f00000000c0)={&(0x7f0000000000)={0x10}, 0xc, &(0x7f000000d379)={&(0x7f0000000080)={0x20, 0x15, 0x401, 0x0, 0x0, {0x4000a}, [@nested={0xc, 0x0, [@typed={0x8, 0x2, @uid}]}]}, 0x20}, 0x1}, 0x0) 2018/04/13 21:33:59 executing program 6: bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x0, 0x3, &(0x7f0000000040)=ANY=[@ANYBLOB="080000000000000000000000028000007a0a00fffffffffd630148"], &(0x7f0000000000)="47504c00bc3047eb525f484f89fc96dd6ca64da40ff023122e66f6", 0x0, 0xce, &(0x7f0000000300)=""/206}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x4, 0x5, &(0x7f0000000040)=@framed={{0x18}, [@jmp={0x5}], {0x95}}, &(0x7f0000000200)='syzkaller\x00', 0x84000001, 0x3342, &(0x7f0000000300)=""/187}, 0x48) 2018/04/13 21:33:59 executing program 4: r0 = syz_open_procfs(0x0, &(0x7f0000000100)='net/netstat\x00') pread64(r0, &(0x7f00000000c0)=""/8, 0x18e, 0x1ffff) 2018/04/13 21:34:00 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000001880)={&(0x7f0000000580)={0x10}, 0xc, &(0x7f0000001840)={&(0x7f0000000700)=@ipv6_newroute={0x28, 0x18, 0x1, 0x0, 0x0, {0xa}, [@RTA_ENCAP_TYPE={0x8, 0x15, 0x3}, @RTA_ENCAP={0x4, 0x16}]}, 0x28}, 0x1}, 0x0) 2018/04/13 21:34:00 executing program 7: r0 = inotify_init() unshare(0x400) fcntl$notify(r0, 0x0, 0x283) 2018/04/13 21:34:00 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f00000000c0)={&(0x7f0000000000)={0x10}, 0xc, &(0x7f000000d379)={&(0x7f0000000080)={0x20, 0x15, 0x401, 0x0, 0x0, {0x4000a}, [@nested={0xc, 0x0, [@typed={0x8, 0x2, @uid}]}]}, 0x20}, 0x1}, 0x0) 2018/04/13 21:34:00 executing program 6: bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x0, 0x3, &(0x7f0000000040)=ANY=[@ANYBLOB="080000000000000000000000028000007a0a00fffffffffd630148"], &(0x7f0000000000)="47504c00bc3047eb525f484f89fc96dd6ca64da40ff023122e66f6", 0x0, 0xce, &(0x7f0000000300)=""/206}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x4, 0x5, &(0x7f0000000040)=@framed={{0x18}, [@jmp={0x5}], {0x95}}, &(0x7f0000000200)='syzkaller\x00', 0x84000001, 0x3342, &(0x7f0000000300)=""/187}, 0x48) 2018/04/13 21:34:00 executing program 2: r0 = socket(0x2, 0x1, 0x0) setsockopt(r0, 0x6, 0xe, &(0x7f0000902000)="020008000000000000005462fa01a15eaf0d2cf653f13cc379ede4eaf40f4a95bbff850a8263357506b31e58a98399b397e695c0f03d3b3d54436fe71cbcdc6e30ac10369300f6af7d07634832b8a5c0a94c470502e9337b3e7298fc74e81b1058d02f9b14732017e2466a9fc43aea71263335960415800020f9575da602000000001f0000d1b0e6ebcb12c7291871363e97100c4a4c2e9f5c0c14f1659ce8c8bed2e97e60a3649f93ea0c8263f864802ad72fa698807ef14a4a1813e976be1d113b514dbdc05ea1309163d6a4830de8391f2ecab7bbfbcb", 0xd8) setsockopt(r0, 0x40000000000006, 0x20, &(0x7f00000000c0)="0200080000000000d9005462fa01a55eaf0d2cf653f13cc379ed80eaf40f4a95bbff850a8263357506b31e58a98399b397e695c0f03d3b3d54436fe71cbcdc6e30ac10369300f6af7d07634832b8a5c0a94c070000000000000098fc74e81b1058d02f8001732017e2466a9fc43aea71263335960415e40000f9695da601fffff9001f0000d1b0e6ebcb12c7291871363e97100c4a4c2e9f5c0c14f1659ce8c8bed2e97e60a3649f93ea0c8263f864802a602fa698807ef14a4a1813e976be1d00000006bdc05ea1309163d6a4830de8391f2ecab7bbfbcb", 0xd8) 2018/04/13 21:34:00 executing program 4: r0 = syz_open_procfs(0x0, &(0x7f0000000100)='net/netstat\x00') pread64(r0, &(0x7f00000000c0)=""/8, 0x18e, 0x1ffff) 2018/04/13 21:34:00 executing program 5: r0 = socket$inet6_udp(0xa, 0x2, 0x0) getsockopt$inet6_int(r0, 0x29, 0x4b, &(0x7f0000000000), &(0x7f0000000280)=0xea) 2018/04/13 21:34:00 executing program 1: perf_event_open(&(0x7f0000220000)={0x2, 0x70, 0x3e6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000100)='./file0\x00', 0x0) r0 = open(&(0x7f0000357000)='./file0\x00', 0x0, 0x0) r1 = fcntl$dupfd(r0, 0x800000000402, 0xffffffffffffffff) fcntl$dupfd(r0, 0x280000000000402, r1) pipe2(&(0x7f0000000700)={0x0, 0x0}, 0x0) ioctl$int_in(0xffffffffffffffff, 0x0, &(0x7f0000000040)=0x5) 2018/04/13 21:34:00 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f00000000c0)={&(0x7f0000000000)={0x10}, 0xc, &(0x7f000000d379)={&(0x7f0000000080)={0x20, 0x15, 0x401, 0x0, 0x0, {0x4000a}, [@nested={0xc, 0x0, [@typed={0x8, 0x2, @uid}]}]}, 0x20}, 0x1}, 0x0) [ 320.990867] netlink: 'syz-executor3': attribute type 21 has an invalid length. 2018/04/13 21:34:00 executing program 5: r0 = socket$inet6_udp(0xa, 0x2, 0x0) getsockopt$inet6_int(r0, 0x29, 0x4b, &(0x7f0000000000), &(0x7f0000000280)=0xea) 2018/04/13 21:34:00 executing program 7: r0 = inotify_init() unshare(0x400) fcntl$notify(r0, 0x0, 0x283) 2018/04/13 21:34:00 executing program 1: perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0xc1f000)=nil, 0xc1f000, 0x2, 0x71, 0xffffffffffffffff, 0x0) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x4001, &(0x7f0000527ff8)=0x7fff, 0x401c, 0x0) get_mempolicy(&(0x7f000029a000), &(0x7f00003e8000), 0x401, &(0x7f0000377000/0x1000)=nil, 0x2) 2018/04/13 21:34:00 executing program 6: bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x0, 0x3, &(0x7f0000000040)=ANY=[@ANYBLOB="080000000000000000000000028000007a0a00fffffffffd630148"], &(0x7f0000000000)="47504c00bc3047eb525f484f89fc96dd6ca64da40ff023122e66f6", 0x0, 0xce, &(0x7f0000000300)=""/206}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x4, 0x5, &(0x7f0000000040)=@framed={{0x18}, [@jmp={0x5}], {0x95}}, &(0x7f0000000200)='syzkaller\x00', 0x84000001, 0x3342, &(0x7f0000000300)=""/187}, 0x48) 2018/04/13 21:34:00 executing program 2: r0 = socket(0x2, 0x1, 0x0) setsockopt(r0, 0x6, 0xe, &(0x7f0000902000)="020008000000000000005462fa01a15eaf0d2cf653f13cc379ede4eaf40f4a95bbff850a8263357506b31e58a98399b397e695c0f03d3b3d54436fe71cbcdc6e30ac10369300f6af7d07634832b8a5c0a94c470502e9337b3e7298fc74e81b1058d02f9b14732017e2466a9fc43aea71263335960415800020f9575da602000000001f0000d1b0e6ebcb12c7291871363e97100c4a4c2e9f5c0c14f1659ce8c8bed2e97e60a3649f93ea0c8263f864802ad72fa698807ef14a4a1813e976be1d113b514dbdc05ea1309163d6a4830de8391f2ecab7bbfbcb", 0xd8) setsockopt(r0, 0x40000000000006, 0x20, &(0x7f00000000c0)="0200080000000000d9005462fa01a55eaf0d2cf653f13cc379ed80eaf40f4a95bbff850a8263357506b31e58a98399b397e695c0f03d3b3d54436fe71cbcdc6e30ac10369300f6af7d07634832b8a5c0a94c070000000000000098fc74e81b1058d02f8001732017e2466a9fc43aea71263335960415e40000f9695da601fffff9001f0000d1b0e6ebcb12c7291871363e97100c4a4c2e9f5c0c14f1659ce8c8bed2e97e60a3649f93ea0c8263f864802a602fa698807ef14a4a1813e976be1d00000006bdc05ea1309163d6a4830de8391f2ecab7bbfbcb", 0xd8) 2018/04/13 21:34:00 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000001880)={&(0x7f0000000580)={0x10}, 0xc, &(0x7f0000001840)={&(0x7f0000000700)=@ipv6_newroute={0x28, 0x18, 0x1, 0x0, 0x0, {0xa}, [@RTA_ENCAP_TYPE={0x8, 0x15, 0x3}, @RTA_ENCAP={0x4, 0x16}]}, 0x28}, 0x1}, 0x0) 2018/04/13 21:34:00 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f00000000c0)={&(0x7f0000000000)={0x10}, 0xc, &(0x7f000000d379)={&(0x7f0000000080)={0x20, 0x15, 0x401, 0x0, 0x0, {0x4000a}, [@nested={0xc, 0x0, [@typed={0x8, 0x2, @uid}]}]}, 0x20}, 0x1}, 0x0) 2018/04/13 21:34:00 executing program 4: r0 = syz_open_procfs(0x0, &(0x7f0000000100)='net/netstat\x00') pread64(r0, &(0x7f00000000c0)=""/8, 0x18e, 0x1ffff) 2018/04/13 21:34:00 executing program 7: r0 = inotify_init() unshare(0x400) fcntl$notify(r0, 0x0, 0x283) 2018/04/13 21:34:00 executing program 4: mkdir(&(0x7f0000cb3ff8)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0xe2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$amidi(&(0x7f00000004c0)='/dev/amidi#\x00', 0x0, 0x548f68b4964d93cf) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f00000006c0)={{{@in=@remote, @in6=@ipv4={[], [], @dev}}}, {{@in6=@remote}, 0x0, @in6=@ipv4={[], [], @dev}}}, &(0x7f0000000680)=0x17b01b40a0c5c1ce) openat$dsp(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/dsp\x00', 0x4902, 0x0) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) r2 = socket$inet6(0xa, 0x40000080806, 0x0) ioctl$sock_inet6_SIOCDELRT(r2, 0x890c, &(0x7f00000000c0)={@remote={0xfe, 0x80, [], 0xbb}, @mcast2={0xff, 0x2, [], 0x1}, @empty, 0x3, 0x78, 0x2000000000000007, 0x2000000000, 0x0, 0x80000000}) getsockname$inet(r1, &(0x7f0000000140)={0x0, 0x0, @loopback}, &(0x7f0000000180)=0x10) rename(&(0x7f0000000100)='..', &(0x7f0000000140)='../file0\x00') rename(&(0x7f0000000480)='../file0\x00', &(0x7f0000000440)='../file0\x00') mkdir(&(0x7f0000000400)='..', 0x12) mount(&(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)='../file0\x00', &(0x7f0000000300)='rootfs\x00', 0x0, 0x0) [ 321.131240] netlink: 'syz-executor3': attribute type 21 has an invalid length. 2018/04/13 21:34:00 executing program 5: r0 = socket$inet6_udp(0xa, 0x2, 0x0) getsockopt$inet6_int(r0, 0x29, 0x4b, &(0x7f0000000000), &(0x7f0000000280)=0xea) 2018/04/13 21:34:00 executing program 2: r0 = socket(0x2, 0x1, 0x0) setsockopt(r0, 0x6, 0xe, &(0x7f0000902000)="020008000000000000005462fa01a15eaf0d2cf653f13cc379ede4eaf40f4a95bbff850a8263357506b31e58a98399b397e695c0f03d3b3d54436fe71cbcdc6e30ac10369300f6af7d07634832b8a5c0a94c470502e9337b3e7298fc74e81b1058d02f9b14732017e2466a9fc43aea71263335960415800020f9575da602000000001f0000d1b0e6ebcb12c7291871363e97100c4a4c2e9f5c0c14f1659ce8c8bed2e97e60a3649f93ea0c8263f864802ad72fa698807ef14a4a1813e976be1d113b514dbdc05ea1309163d6a4830de8391f2ecab7bbfbcb", 0xd8) setsockopt(r0, 0x40000000000006, 0x20, &(0x7f00000000c0)="0200080000000000d9005462fa01a55eaf0d2cf653f13cc379ed80eaf40f4a95bbff850a8263357506b31e58a98399b397e695c0f03d3b3d54436fe71cbcdc6e30ac10369300f6af7d07634832b8a5c0a94c070000000000000098fc74e81b1058d02f8001732017e2466a9fc43aea71263335960415e40000f9695da601fffff9001f0000d1b0e6ebcb12c7291871363e97100c4a4c2e9f5c0c14f1659ce8c8bed2e97e60a3649f93ea0c8263f864802a602fa698807ef14a4a1813e976be1d00000006bdc05ea1309163d6a4830de8391f2ecab7bbfbcb", 0xd8) 2018/04/13 21:34:00 executing program 6: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)={0x0, 0x0}) openat$audio(0xffffffffffffff9c, &(0x7f0000000000)='/dev/audio\x00', 0x0, 0x0) socket$kcm(0x29, 0x2, 0x0) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000040)={0xffffffffffffffff, &(0x7f00000000c0)="b82283392dc50ff1fb635a5849d2f5916ae2fdc24e95e12aa8daccf7393e72be9cc66f"}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f0000346fd4)={0x0, 0x0, 0x0, 0x4, 0x21d}, 0xffffffffffffffeb) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x1, 0x5, &(0x7f0000346fc8)=@framed={{0x18}, [@alu={0x8000000201a7f19, 0x0, 0x7, 0x0, 0x1}], {0x95}}, &(0x7f0000f6bffb)='GPL\x00', 0x0, 0x299, &(0x7f00001a7f05)=""/251}, 0x18) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000140)={r0, 0x50, &(0x7f00000000c0)}, 0x10) socketpair$inet_icmp(0x16, 0x2, 0x1, &(0x7f0000000400)) 2018/04/13 21:34:00 executing program 1: perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0xc1f000)=nil, 0xc1f000, 0x2, 0x71, 0xffffffffffffffff, 0x0) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x4001, &(0x7f0000527ff8)=0x7fff, 0x401c, 0x0) get_mempolicy(&(0x7f000029a000), &(0x7f00003e8000), 0x401, &(0x7f0000377000/0x1000)=nil, 0x2) 2018/04/13 21:34:00 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000001880)={&(0x7f0000000580)={0x10}, 0xc, &(0x7f0000001840)={&(0x7f0000000700)=@ipv6_newroute={0x28, 0x18, 0x1, 0x0, 0x0, {0xa}, [@RTA_ENCAP_TYPE={0x8, 0x15, 0x3}, @RTA_ENCAP={0x4, 0x16}]}, 0x28}, 0x1}, 0x0) 2018/04/13 21:34:00 executing program 0: perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0xc1f000)=nil, 0xc1f000, 0x2, 0x71, 0xffffffffffffffff, 0x0) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x4001, &(0x7f0000527ff8)=0x7fff, 0x401c, 0x0) get_mempolicy(&(0x7f000029a000), &(0x7f00003e8000), 0x401, &(0x7f0000377000/0x1000)=nil, 0x2) 2018/04/13 21:34:00 executing program 7: r0 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000080)={'bond_slave_1\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f0000000280)={&(0x7f0000000040)={0x10}, 0xc, &(0x7f00000001c0)={&(0x7f00000000c0)=@bridge_dellink={0x20, 0x11, 0x401, 0x0, 0x0, {0x7, 0x0, 0x0, r1}}, 0x20}, 0x1}, 0x0) 2018/04/13 21:34:00 executing program 2: r0 = socket(0x2, 0x1, 0x0) setsockopt(r0, 0x6, 0xe, &(0x7f0000902000)="020008000000000000005462fa01a15eaf0d2cf653f13cc379ede4eaf40f4a95bbff850a8263357506b31e58a98399b397e695c0f03d3b3d54436fe71cbcdc6e30ac10369300f6af7d07634832b8a5c0a94c470502e9337b3e7298fc74e81b1058d02f9b14732017e2466a9fc43aea71263335960415800020f9575da602000000001f0000d1b0e6ebcb12c7291871363e97100c4a4c2e9f5c0c14f1659ce8c8bed2e97e60a3649f93ea0c8263f864802ad72fa698807ef14a4a1813e976be1d113b514dbdc05ea1309163d6a4830de8391f2ecab7bbfbcb", 0xd8) setsockopt(r0, 0x40000000000006, 0x20, &(0x7f00000000c0)="0200080000000000d9005462fa01a55eaf0d2cf653f13cc379ed80eaf40f4a95bbff850a8263357506b31e58a98399b397e695c0f03d3b3d54436fe71cbcdc6e30ac10369300f6af7d07634832b8a5c0a94c070000000000000098fc74e81b1058d02f8001732017e2466a9fc43aea71263335960415e40000f9695da601fffff9001f0000d1b0e6ebcb12c7291871363e97100c4a4c2e9f5c0c14f1659ce8c8bed2e97e60a3649f93ea0c8263f864802a602fa698807ef14a4a1813e976be1d00000006bdc05ea1309163d6a4830de8391f2ecab7bbfbcb", 0xd8) 2018/04/13 21:34:00 executing program 5: r0 = socket$inet6_udp(0xa, 0x2, 0x0) getsockopt$inet6_int(r0, 0x29, 0x4b, &(0x7f0000000000), &(0x7f0000000280)=0xea) [ 321.301448] netlink: 'syz-executor3': attribute type 21 has an invalid length. 2018/04/13 21:34:00 executing program 1: perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0xc1f000)=nil, 0xc1f000, 0x2, 0x71, 0xffffffffffffffff, 0x0) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x4001, &(0x7f0000527ff8)=0x7fff, 0x401c, 0x0) get_mempolicy(&(0x7f000029a000), &(0x7f00003e8000), 0x401, &(0x7f0000377000/0x1000)=nil, 0x2) 2018/04/13 21:34:00 executing program 4: mkdir(&(0x7f0000cb3ff8)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0xe2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$amidi(&(0x7f00000004c0)='/dev/amidi#\x00', 0x0, 0x548f68b4964d93cf) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f00000006c0)={{{@in=@remote, @in6=@ipv4={[], [], @dev}}}, {{@in6=@remote}, 0x0, @in6=@ipv4={[], [], @dev}}}, &(0x7f0000000680)=0x17b01b40a0c5c1ce) openat$dsp(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/dsp\x00', 0x4902, 0x0) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) r2 = socket$inet6(0xa, 0x40000080806, 0x0) ioctl$sock_inet6_SIOCDELRT(r2, 0x890c, &(0x7f00000000c0)={@remote={0xfe, 0x80, [], 0xbb}, @mcast2={0xff, 0x2, [], 0x1}, @empty, 0x3, 0x78, 0x2000000000000007, 0x2000000000, 0x0, 0x80000000}) getsockname$inet(r1, &(0x7f0000000140)={0x0, 0x0, @loopback}, &(0x7f0000000180)=0x10) rename(&(0x7f0000000100)='..', &(0x7f0000000140)='../file0\x00') rename(&(0x7f0000000480)='../file0\x00', &(0x7f0000000440)='../file0\x00') mkdir(&(0x7f0000000400)='..', 0x12) mount(&(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)='../file0\x00', &(0x7f0000000300)='rootfs\x00', 0x0, 0x0) 2018/04/13 21:34:00 executing program 6: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)={0x0, 0x0}) openat$audio(0xffffffffffffff9c, &(0x7f0000000000)='/dev/audio\x00', 0x0, 0x0) socket$kcm(0x29, 0x2, 0x0) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000040)={0xffffffffffffffff, &(0x7f00000000c0)="b82283392dc50ff1fb635a5849d2f5916ae2fdc24e95e12aa8daccf7393e72be9cc66f"}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f0000346fd4)={0x0, 0x0, 0x0, 0x4, 0x21d}, 0xffffffffffffffeb) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x1, 0x5, &(0x7f0000346fc8)=@framed={{0x18}, [@alu={0x8000000201a7f19, 0x0, 0x7, 0x0, 0x1}], {0x95}}, &(0x7f0000f6bffb)='GPL\x00', 0x0, 0x299, &(0x7f00001a7f05)=""/251}, 0x18) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000140)={r0, 0x50, &(0x7f00000000c0)}, 0x10) socketpair$inet_icmp(0x16, 0x2, 0x1, &(0x7f0000000400)) 2018/04/13 21:34:01 executing program 0: perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0xc1f000)=nil, 0xc1f000, 0x2, 0x71, 0xffffffffffffffff, 0x0) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x4001, &(0x7f0000527ff8)=0x7fff, 0x401c, 0x0) get_mempolicy(&(0x7f000029a000), &(0x7f00003e8000), 0x401, &(0x7f0000377000/0x1000)=nil, 0x2) 2018/04/13 21:34:01 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={&(0x7f0000000000)={0x10}, 0xc, &(0x7f0000000100)={&(0x7f0000000040)=@ipmr_getroute={0x14, 0x1a, 0x5, 0x0, 0x0, {0x80}}, 0x14}, 0x1}, 0x0) 2018/04/13 21:34:01 executing program 2: syz_emit_ethernet(0x46, &(0x7f0000000080)={@link_local={0x1, 0x80, 0xc2}, @local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, [], {@ipv6={0x86dd, {0x0, 0x6, "dab3e9", 0x10, 0x3b, 0x0, @empty, @mcast2={0xff, 0x2, [], 0x1}, {[], @dccp={{0x0, 0x0, 0x4, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, "896c48", 0x0, "49ef69"}}}}}}}, &(0x7f0000000380)) 2018/04/13 21:34:01 executing program 5: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xb, 0x40, 0xa9, 0xa37, 0x1, 0x1}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x3, &(0x7f0000000040)=ANY=[@ANYBLOB="18000000000000000000000002800000850000000000000095"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0xce, &(0x7f0000000180)=""/206}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x2, 0x4, &(0x7f0000000040)=@raw=[@map={0x18, 0x0, 0x1, 0x0, r0}, @call={0x85, 0x10, 0x0, 0x24}], &(0x7f0000000140)='GPL\x00', 0x41, 0xa7, &(0x7f00000004c0)=""/167, 0x41000}, 0x48) 2018/04/13 21:34:01 executing program 7: r0 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000080)={'bond_slave_1\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f0000000280)={&(0x7f0000000040)={0x10}, 0xc, &(0x7f00000001c0)={&(0x7f00000000c0)=@bridge_dellink={0x20, 0x11, 0x401, 0x0, 0x0, {0x7, 0x0, 0x0, r1}}, 0x20}, 0x1}, 0x0) 2018/04/13 21:34:01 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={&(0x7f0000000000)={0x10}, 0xc, &(0x7f0000000100)={&(0x7f0000000040)=@ipmr_getroute={0x14, 0x1a, 0x5, 0x0, 0x0, {0x80}}, 0x14}, 0x1}, 0x0) 2018/04/13 21:34:01 executing program 0: perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0xc1f000)=nil, 0xc1f000, 0x2, 0x71, 0xffffffffffffffff, 0x0) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x4001, &(0x7f0000527ff8)=0x7fff, 0x401c, 0x0) get_mempolicy(&(0x7f000029a000), &(0x7f00003e8000), 0x401, &(0x7f0000377000/0x1000)=nil, 0x2) 2018/04/13 21:34:01 executing program 7: r0 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000080)={'bond_slave_1\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f0000000280)={&(0x7f0000000040)={0x10}, 0xc, &(0x7f00000001c0)={&(0x7f00000000c0)=@bridge_dellink={0x20, 0x11, 0x401, 0x0, 0x0, {0x7, 0x0, 0x0, r1}}, 0x20}, 0x1}, 0x0) 2018/04/13 21:34:01 executing program 1: perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0xc1f000)=nil, 0xc1f000, 0x2, 0x71, 0xffffffffffffffff, 0x0) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x4001, &(0x7f0000527ff8)=0x7fff, 0x401c, 0x0) get_mempolicy(&(0x7f000029a000), &(0x7f00003e8000), 0x401, &(0x7f0000377000/0x1000)=nil, 0x2) 2018/04/13 21:34:01 executing program 5: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xb, 0x40, 0xa9, 0xa37, 0x1, 0x1}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x3, &(0x7f0000000040)=ANY=[@ANYBLOB="18000000000000000000000002800000850000000000000095"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0xce, &(0x7f0000000180)=""/206}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x2, 0x4, &(0x7f0000000040)=@raw=[@map={0x18, 0x0, 0x1, 0x0, r0}, @call={0x85, 0x10, 0x0, 0x24}], &(0x7f0000000140)='GPL\x00', 0x41, 0xa7, &(0x7f00000004c0)=""/167, 0x41000}, 0x48) 2018/04/13 21:34:01 executing program 4: mkdir(&(0x7f0000cb3ff8)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0xe2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$amidi(&(0x7f00000004c0)='/dev/amidi#\x00', 0x0, 0x548f68b4964d93cf) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f00000006c0)={{{@in=@remote, @in6=@ipv4={[], [], @dev}}}, {{@in6=@remote}, 0x0, @in6=@ipv4={[], [], @dev}}}, &(0x7f0000000680)=0x17b01b40a0c5c1ce) openat$dsp(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/dsp\x00', 0x4902, 0x0) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) r2 = socket$inet6(0xa, 0x40000080806, 0x0) ioctl$sock_inet6_SIOCDELRT(r2, 0x890c, &(0x7f00000000c0)={@remote={0xfe, 0x80, [], 0xbb}, @mcast2={0xff, 0x2, [], 0x1}, @empty, 0x3, 0x78, 0x2000000000000007, 0x2000000000, 0x0, 0x80000000}) getsockname$inet(r1, &(0x7f0000000140)={0x0, 0x0, @loopback}, &(0x7f0000000180)=0x10) rename(&(0x7f0000000100)='..', &(0x7f0000000140)='../file0\x00') rename(&(0x7f0000000480)='../file0\x00', &(0x7f0000000440)='../file0\x00') mkdir(&(0x7f0000000400)='..', 0x12) mount(&(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)='../file0\x00', &(0x7f0000000300)='rootfs\x00', 0x0, 0x0) 2018/04/13 21:34:01 executing program 2: syz_emit_ethernet(0x46, &(0x7f0000000080)={@link_local={0x1, 0x80, 0xc2}, @local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, [], {@ipv6={0x86dd, {0x0, 0x6, "dab3e9", 0x10, 0x3b, 0x0, @empty, @mcast2={0xff, 0x2, [], 0x1}, {[], @dccp={{0x0, 0x0, 0x4, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, "896c48", 0x0, "49ef69"}}}}}}}, &(0x7f0000000380)) 2018/04/13 21:34:01 executing program 6: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)={0x0, 0x0}) openat$audio(0xffffffffffffff9c, &(0x7f0000000000)='/dev/audio\x00', 0x0, 0x0) socket$kcm(0x29, 0x2, 0x0) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000040)={0xffffffffffffffff, &(0x7f00000000c0)="b82283392dc50ff1fb635a5849d2f5916ae2fdc24e95e12aa8daccf7393e72be9cc66f"}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f0000346fd4)={0x0, 0x0, 0x0, 0x4, 0x21d}, 0xffffffffffffffeb) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x1, 0x5, &(0x7f0000346fc8)=@framed={{0x18}, [@alu={0x8000000201a7f19, 0x0, 0x7, 0x0, 0x1}], {0x95}}, &(0x7f0000f6bffb)='GPL\x00', 0x0, 0x299, &(0x7f00001a7f05)=""/251}, 0x18) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000140)={r0, 0x50, &(0x7f00000000c0)}, 0x10) socketpair$inet_icmp(0x16, 0x2, 0x1, &(0x7f0000000400)) 2018/04/13 21:34:01 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000023000)={&(0x7f0000024000)={0x10}, 0xc, &(0x7f0000023ff0)={&(0x7f0000010ec4)={0x18, 0x27, 0xaff, 0x0, 0x0, {0x4}, [@nested={0x4, 0x1}]}, 0x18}, 0x1}, 0x0) 2018/04/13 21:34:01 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={&(0x7f0000000000)={0x10}, 0xc, &(0x7f0000000100)={&(0x7f0000000040)=@ipmr_getroute={0x14, 0x1a, 0x5, 0x0, 0x0, {0x80}}, 0x14}, 0x1}, 0x0) 2018/04/13 21:34:01 executing program 7: r0 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000080)={'bond_slave_1\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f0000000280)={&(0x7f0000000040)={0x10}, 0xc, &(0x7f00000001c0)={&(0x7f00000000c0)=@bridge_dellink={0x20, 0x11, 0x401, 0x0, 0x0, {0x7, 0x0, 0x0, r1}}, 0x20}, 0x1}, 0x0) 2018/04/13 21:34:01 executing program 2: syz_emit_ethernet(0x46, &(0x7f0000000080)={@link_local={0x1, 0x80, 0xc2}, @local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, [], {@ipv6={0x86dd, {0x0, 0x6, "dab3e9", 0x10, 0x3b, 0x0, @empty, @mcast2={0xff, 0x2, [], 0x1}, {[], @dccp={{0x0, 0x0, 0x4, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, "896c48", 0x0, "49ef69"}}}}}}}, &(0x7f0000000380)) 2018/04/13 21:34:01 executing program 5: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xb, 0x40, 0xa9, 0xa37, 0x1, 0x1}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x3, &(0x7f0000000040)=ANY=[@ANYBLOB="18000000000000000000000002800000850000000000000095"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0xce, &(0x7f0000000180)=""/206}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x2, 0x4, &(0x7f0000000040)=@raw=[@map={0x18, 0x0, 0x1, 0x0, r0}, @call={0x85, 0x10, 0x0, 0x24}], &(0x7f0000000140)='GPL\x00', 0x41, 0xa7, &(0x7f00000004c0)=""/167, 0x41000}, 0x48) 2018/04/13 21:34:01 executing program 4: mkdir(&(0x7f0000cb3ff8)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0xe2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$amidi(&(0x7f00000004c0)='/dev/amidi#\x00', 0x0, 0x548f68b4964d93cf) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f00000006c0)={{{@in=@remote, @in6=@ipv4={[], [], @dev}}}, {{@in6=@remote}, 0x0, @in6=@ipv4={[], [], @dev}}}, &(0x7f0000000680)=0x17b01b40a0c5c1ce) openat$dsp(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/dsp\x00', 0x4902, 0x0) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) r2 = socket$inet6(0xa, 0x40000080806, 0x0) ioctl$sock_inet6_SIOCDELRT(r2, 0x890c, &(0x7f00000000c0)={@remote={0xfe, 0x80, [], 0xbb}, @mcast2={0xff, 0x2, [], 0x1}, @empty, 0x3, 0x78, 0x2000000000000007, 0x2000000000, 0x0, 0x80000000}) getsockname$inet(r1, &(0x7f0000000140)={0x0, 0x0, @loopback}, &(0x7f0000000180)=0x10) rename(&(0x7f0000000100)='..', &(0x7f0000000140)='../file0\x00') rename(&(0x7f0000000480)='../file0\x00', &(0x7f0000000440)='../file0\x00') mkdir(&(0x7f0000000400)='..', 0x12) mount(&(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)='../file0\x00', &(0x7f0000000300)='rootfs\x00', 0x0, 0x0) 2018/04/13 21:34:01 executing program 6: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)={0x0, 0x0}) openat$audio(0xffffffffffffff9c, &(0x7f0000000000)='/dev/audio\x00', 0x0, 0x0) socket$kcm(0x29, 0x2, 0x0) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000040)={0xffffffffffffffff, &(0x7f00000000c0)="b82283392dc50ff1fb635a5849d2f5916ae2fdc24e95e12aa8daccf7393e72be9cc66f"}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f0000346fd4)={0x0, 0x0, 0x0, 0x4, 0x21d}, 0xffffffffffffffeb) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x1, 0x5, &(0x7f0000346fc8)=@framed={{0x18}, [@alu={0x8000000201a7f19, 0x0, 0x7, 0x0, 0x1}], {0x95}}, &(0x7f0000f6bffb)='GPL\x00', 0x0, 0x299, &(0x7f00001a7f05)=""/251}, 0x18) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000140)={r0, 0x50, &(0x7f00000000c0)}, 0x10) socketpair$inet_icmp(0x16, 0x2, 0x1, &(0x7f0000000400)) 2018/04/13 21:34:01 executing program 1: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$xfs(&(0x7f00000000c0)='xfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, &(0x7f0000000140), 0x0, &(0x7f0000000180)={'nouuid,', {[{@logbsize={'logbsize', 0x3d, [0x3d]}, 0x2c}]}}) 2018/04/13 21:34:01 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={&(0x7f0000000000)={0x10}, 0xc, &(0x7f0000000100)={&(0x7f0000000040)=@ipmr_getroute={0x14, 0x1a, 0x5, 0x0, 0x0, {0x80}}, 0x14}, 0x1}, 0x0) 2018/04/13 21:34:01 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000023000)={&(0x7f0000024000)={0x10}, 0xc, &(0x7f0000023ff0)={&(0x7f0000010ec4)={0x18, 0x27, 0xaff, 0x0, 0x0, {0x4}, [@nested={0x4, 0x1}]}, 0x18}, 0x1}, 0x0) 2018/04/13 21:34:01 executing program 7: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000000), 0x4) getsockopt$packet_int(r0, 0x107, 0x12, &(0x7f0000000040), &(0x7f0000000080)=0x4) 2018/04/13 21:34:01 executing program 2: syz_emit_ethernet(0x46, &(0x7f0000000080)={@link_local={0x1, 0x80, 0xc2}, @local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, [], {@ipv6={0x86dd, {0x0, 0x6, "dab3e9", 0x10, 0x3b, 0x0, @empty, @mcast2={0xff, 0x2, [], 0x1}, {[], @dccp={{0x0, 0x0, 0x4, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, "896c48", 0x0, "49ef69"}}}}}}}, &(0x7f0000000380)) 2018/04/13 21:34:01 executing program 5: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xb, 0x40, 0xa9, 0xa37, 0x1, 0x1}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x3, &(0x7f0000000040)=ANY=[@ANYBLOB="18000000000000000000000002800000850000000000000095"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0xce, &(0x7f0000000180)=""/206}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x2, 0x4, &(0x7f0000000040)=@raw=[@map={0x18, 0x0, 0x1, 0x0, r0}, @call={0x85, 0x10, 0x0, 0x24}], &(0x7f0000000140)='GPL\x00', 0x41, 0xa7, &(0x7f00000004c0)=""/167, 0x41000}, 0x48) 2018/04/13 21:34:01 executing program 1: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$xfs(&(0x7f00000000c0)='xfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, &(0x7f0000000140), 0x0, &(0x7f0000000180)={'nouuid,', {[{@logbsize={'logbsize', 0x3d, [0x3d]}, 0x2c}]}}) 2018/04/13 21:34:01 executing program 6: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback={0x0, 0x1}}, 0x1c) sendto$inet6(r0, &(0x7f0000000100)="a4", 0x1, 0x0, &(0x7f0000000140)={0xa, 0x0, 0x0, @dev={0xfe, 0x80}, 0x6}, 0x1c) sendto$inet6(r0, &(0x7f0000aaff09)="b8", 0x1, 0x0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @loopback={0x0, 0x1}}, 0x1c) 2018/04/13 21:34:01 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000affff7)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = eventfd2(0x0, 0x0) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_IRQFD(r1, 0x4020ae76, &(0x7f0000ae9000)={r2}) ioctl$KVM_SET_GSI_ROUTING(r1, 0x4008ae6a, &(0x7f0000b15fc8)={0x1, 0x0, [{0x0, 0x4}]}) r3 = fcntl$dupfd(r2, 0x0, r1) write$evdev(r3, &(0x7f0000b04000)=[{}], 0x18) 2018/04/13 21:34:01 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000023000)={&(0x7f0000024000)={0x10}, 0xc, &(0x7f0000023ff0)={&(0x7f0000010ec4)={0x18, 0x27, 0xaff, 0x0, 0x0, {0x4}, [@nested={0x4, 0x1}]}, 0x18}, 0x1}, 0x0) 2018/04/13 21:34:01 executing program 4: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff7fffffffffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = signalfd(0xffffffffffffffff, &(0x7f0000002480), 0x8) signalfd(r0, &(0x7f0000000040), 0x8) 2018/04/13 21:34:02 executing program 7: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000000), 0x4) getsockopt$packet_int(r0, 0x107, 0x12, &(0x7f0000000040), &(0x7f0000000080)=0x4) 2018/04/13 21:34:02 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f00000003c0)={&(0x7f0000024000)={0x10}, 0xc, &(0x7f0000023ff0)={&(0x7f0000000040)={0x14, 0x20, 0xafd, 0x0, 0x0, {0x3}}, 0x14}, 0x1}, 0x0) 2018/04/13 21:34:02 executing program 5: r0 = socket(0x40000000015, 0x5, 0x0) bind$inet(r0, &(0x7f0000fc4ff0)={0x2, 0x0, @loopback=0x7f000001}, 0x10) connect$inet(r0, &(0x7f0000000000)={0x2, 0x0, @loopback=0x7f000001}, 0x10) r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000100)='/proc/self/net/pfkey\x00', 0x200400, 0x0) getsockopt$inet_sctp_SCTP_STATUS(r0, 0x84, 0xe, &(0x7f0000000380)={0x0, 0xfff, 0x4, 0x81, 0x3, 0x6, 0x1, 0x2, {0x0, @in6={{0xa, 0x4e22, 0x400, @loopback={0x0, 0x1}, 0x400}}, 0x9, 0x8, 0x100, 0x6, 0x1}}, &(0x7f0000000440)=0xb0) setsockopt$inet_sctp_SCTP_STREAM_SCHEDULER_VALUE(r1, 0x84, 0x7c, &(0x7f0000000480)={r2, 0x10000, 0x8}, 0x8) ioctl$SNDRV_TIMER_IOCTL_PAUSE(r1, 0x54a3) sendmsg$alg(r0, &(0x7f0000159fc8)={0x0, 0x0, &(0x7f0000fc8000), 0x0, &(0x7f00000000c0)=[@assoc={0x18, 0x117, 0x4}, @op={0x18, 0x117, 0x3}], 0x30}, 0x0) ioctl$sock_inet6_tcp_SIOCOUTQNSD(r0, 0x894b, &(0x7f0000000340)) r3 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000180)='IPVS\x00') sendmsg$IPVS_CMD_GET_SERVICE(r1, &(0x7f00000002c0)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000000280)={&(0x7f00000001c0)={0x98, r3, 0x20, 0x70bd29, 0x25dfdbfc, {0x4}, [@IPVS_CMD_ATTR_DAEMON={0x4, 0x3}, @IPVS_CMD_ATTR_SERVICE={0x2c, 0x1, [@IPVS_SVC_ATTR_ADDR={0x14, 0x3}, @IPVS_SVC_ATTR_PROTOCOL={0x8, 0x2, 0x3c}, @IPVS_SVC_ATTR_FLAGS={0xc, 0x7, {0x4, 0x4}}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0x9}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x8}, @IPVS_CMD_ATTR_DAEMON={0x24, 0x3, [@IPVS_DAEMON_ATTR_MCAST_TTL={0x8, 0x8, 0x5}, @IPVS_DAEMON_ATTR_STATE={0x8, 0x1}, @IPVS_DAEMON_ATTR_MCAST_TTL={0x8, 0x8}, @IPVS_DAEMON_ATTR_MCAST_TTL={0x8, 0x8, 0x9}]}, @IPVS_CMD_ATTR_SERVICE={0x20, 0x1, [@IPVS_SVC_ATTR_FWMARK={0x8, 0x5, 0x3}, @IPVS_SVC_ATTR_TIMEOUT={0x8, 0x8}, @IPVS_SVC_ATTR_SCHED_NAME={0xc, 0x6, 'lblc\x00'}]}]}, 0x98}, 0x1, 0x0, 0x0, 0x840}, 0x800) r4 = socket$netlink(0x10, 0x3, 0xf) setsockopt$SO_BINDTODEVICE(r4, 0x1, 0x19, &(0x7f0000000300), 0x10) sendmsg$nl_generic(r4, &(0x7f0000002180)={&(0x7f0000000040)={0x10}, 0xc, &(0x7f0000002140)={&(0x7f0000000080)={0x18, 0x32, 0xfffffffffffffffd, 0x0, 0x0, {}, [@nested={0x4, 0x1}]}, 0x18}, 0x1}, 0x0) 2018/04/13 21:34:02 executing program 1: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$xfs(&(0x7f00000000c0)='xfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, &(0x7f0000000140), 0x0, &(0x7f0000000180)={'nouuid,', {[{@logbsize={'logbsize', 0x3d, [0x3d]}, 0x2c}]}}) 2018/04/13 21:34:02 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000affff7)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = eventfd2(0x0, 0x0) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_IRQFD(r1, 0x4020ae76, &(0x7f0000ae9000)={r2}) ioctl$KVM_SET_GSI_ROUTING(r1, 0x4008ae6a, &(0x7f0000b15fc8)={0x1, 0x0, [{0x0, 0x4}]}) r3 = fcntl$dupfd(r2, 0x0, r1) write$evdev(r3, &(0x7f0000b04000)=[{}], 0x18) 2018/04/13 21:34:02 executing program 6: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000affff7)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = eventfd2(0x0, 0x0) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_IRQFD(r1, 0x4020ae76, &(0x7f0000ae9000)={r2}) ioctl$KVM_SET_GSI_ROUTING(r1, 0x4008ae6a, &(0x7f0000b15fc8)={0x1, 0x0, [{0x0, 0x4}]}) r3 = fcntl$dupfd(r2, 0x0, r1) write$evdev(r3, &(0x7f0000b04000)=[{}], 0x18) 2018/04/13 21:34:02 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000023000)={&(0x7f0000024000)={0x10}, 0xc, &(0x7f0000023ff0)={&(0x7f0000010ec4)={0x18, 0x27, 0xaff, 0x0, 0x0, {0x4}, [@nested={0x4, 0x1}]}, 0x18}, 0x1}, 0x0) 2018/04/13 21:34:02 executing program 4: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff7fffffffffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = signalfd(0xffffffffffffffff, &(0x7f0000002480), 0x8) signalfd(r0, &(0x7f0000000040), 0x8) 2018/04/13 21:34:02 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000affff7)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = eventfd2(0x0, 0x0) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_IRQFD(r1, 0x4020ae76, &(0x7f0000ae9000)={r2}) ioctl$KVM_SET_GSI_ROUTING(r1, 0x4008ae6a, &(0x7f0000b15fc8)={0x1, 0x0, [{0x0, 0x4}]}) r3 = fcntl$dupfd(r2, 0x0, r1) write$evdev(r3, &(0x7f0000b04000)=[{}], 0x18) 2018/04/13 21:34:02 executing program 4: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff7fffffffffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = signalfd(0xffffffffffffffff, &(0x7f0000002480), 0x8) signalfd(r0, &(0x7f0000000040), 0x8) 2018/04/13 21:34:02 executing program 7: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000000), 0x4) getsockopt$packet_int(r0, 0x107, 0x12, &(0x7f0000000040), &(0x7f0000000080)=0x4) 2018/04/13 21:34:02 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f00000003c0)={&(0x7f0000024000)={0x10}, 0xc, &(0x7f0000023ff0)={&(0x7f0000000040)={0x14, 0x20, 0xafd, 0x0, 0x0, {0x3}}, 0x14}, 0x1}, 0x0) 2018/04/13 21:34:02 executing program 5: r0 = socket(0x40000000015, 0x5, 0x0) bind$inet(r0, &(0x7f0000fc4ff0)={0x2, 0x0, @loopback=0x7f000001}, 0x10) connect$inet(r0, &(0x7f0000000000)={0x2, 0x0, @loopback=0x7f000001}, 0x10) r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000100)='/proc/self/net/pfkey\x00', 0x200400, 0x0) getsockopt$inet_sctp_SCTP_STATUS(r0, 0x84, 0xe, &(0x7f0000000380)={0x0, 0xfff, 0x4, 0x81, 0x3, 0x6, 0x1, 0x2, {0x0, @in6={{0xa, 0x4e22, 0x400, @loopback={0x0, 0x1}, 0x400}}, 0x9, 0x8, 0x100, 0x6, 0x1}}, &(0x7f0000000440)=0xb0) setsockopt$inet_sctp_SCTP_STREAM_SCHEDULER_VALUE(r1, 0x84, 0x7c, &(0x7f0000000480)={r2, 0x10000, 0x8}, 0x8) ioctl$SNDRV_TIMER_IOCTL_PAUSE(r1, 0x54a3) sendmsg$alg(r0, &(0x7f0000159fc8)={0x0, 0x0, &(0x7f0000fc8000), 0x0, &(0x7f00000000c0)=[@assoc={0x18, 0x117, 0x4}, @op={0x18, 0x117, 0x3}], 0x30}, 0x0) ioctl$sock_inet6_tcp_SIOCOUTQNSD(r0, 0x894b, &(0x7f0000000340)) r3 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000180)='IPVS\x00') sendmsg$IPVS_CMD_GET_SERVICE(r1, &(0x7f00000002c0)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000000280)={&(0x7f00000001c0)={0x98, r3, 0x20, 0x70bd29, 0x25dfdbfc, {0x4}, [@IPVS_CMD_ATTR_DAEMON={0x4, 0x3}, @IPVS_CMD_ATTR_SERVICE={0x2c, 0x1, [@IPVS_SVC_ATTR_ADDR={0x14, 0x3}, @IPVS_SVC_ATTR_PROTOCOL={0x8, 0x2, 0x3c}, @IPVS_SVC_ATTR_FLAGS={0xc, 0x7, {0x4, 0x4}}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0x9}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x8}, @IPVS_CMD_ATTR_DAEMON={0x24, 0x3, [@IPVS_DAEMON_ATTR_MCAST_TTL={0x8, 0x8, 0x5}, @IPVS_DAEMON_ATTR_STATE={0x8, 0x1}, @IPVS_DAEMON_ATTR_MCAST_TTL={0x8, 0x8}, @IPVS_DAEMON_ATTR_MCAST_TTL={0x8, 0x8, 0x9}]}, @IPVS_CMD_ATTR_SERVICE={0x20, 0x1, [@IPVS_SVC_ATTR_FWMARK={0x8, 0x5, 0x3}, @IPVS_SVC_ATTR_TIMEOUT={0x8, 0x8}, @IPVS_SVC_ATTR_SCHED_NAME={0xc, 0x6, 'lblc\x00'}]}]}, 0x98}, 0x1, 0x0, 0x0, 0x840}, 0x800) r4 = socket$netlink(0x10, 0x3, 0xf) setsockopt$SO_BINDTODEVICE(r4, 0x1, 0x19, &(0x7f0000000300), 0x10) sendmsg$nl_generic(r4, &(0x7f0000002180)={&(0x7f0000000040)={0x10}, 0xc, &(0x7f0000002140)={&(0x7f0000000080)={0x18, 0x32, 0xfffffffffffffffd, 0x0, 0x0, {}, [@nested={0x4, 0x1}]}, 0x18}, 0x1}, 0x0) 2018/04/13 21:34:02 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000affff7)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = eventfd2(0x0, 0x0) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_IRQFD(r1, 0x4020ae76, &(0x7f0000ae9000)={r2}) ioctl$KVM_SET_GSI_ROUTING(r1, 0x4008ae6a, &(0x7f0000b15fc8)={0x1, 0x0, [{0x0, 0x4}]}) r3 = fcntl$dupfd(r2, 0x0, r1) write$evdev(r3, &(0x7f0000b04000)=[{}], 0x18) 2018/04/13 21:34:02 executing program 1: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$xfs(&(0x7f00000000c0)='xfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, &(0x7f0000000140), 0x0, &(0x7f0000000180)={'nouuid,', {[{@logbsize={'logbsize', 0x3d, [0x3d]}, 0x2c}]}}) 2018/04/13 21:34:02 executing program 6: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000affff7)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = eventfd2(0x0, 0x0) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_IRQFD(r1, 0x4020ae76, &(0x7f0000ae9000)={r2}) ioctl$KVM_SET_GSI_ROUTING(r1, 0x4008ae6a, &(0x7f0000b15fc8)={0x1, 0x0, [{0x0, 0x4}]}) r3 = fcntl$dupfd(r2, 0x0, r1) write$evdev(r3, &(0x7f0000b04000)=[{}], 0x18) 2018/04/13 21:34:02 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000affff7)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = eventfd2(0x0, 0x0) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_IRQFD(r1, 0x4020ae76, &(0x7f0000ae9000)={r2}) ioctl$KVM_SET_GSI_ROUTING(r1, 0x4008ae6a, &(0x7f0000b15fc8)={0x1, 0x0, [{0x0, 0x4}]}) r3 = fcntl$dupfd(r2, 0x0, r1) write$evdev(r3, &(0x7f0000b04000)=[{}], 0x18) 2018/04/13 21:34:02 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000affff7)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = eventfd2(0x0, 0x0) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_IRQFD(r1, 0x4020ae76, &(0x7f0000ae9000)={r2}) ioctl$KVM_SET_GSI_ROUTING(r1, 0x4008ae6a, &(0x7f0000b15fc8)={0x1, 0x0, [{0x0, 0x4}]}) r3 = fcntl$dupfd(r2, 0x0, r1) write$evdev(r3, &(0x7f0000b04000)=[{}], 0x18) 2018/04/13 21:34:02 executing program 4: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff7fffffffffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = signalfd(0xffffffffffffffff, &(0x7f0000002480), 0x8) signalfd(r0, &(0x7f0000000040), 0x8) 2018/04/13 21:34:02 executing program 7: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000000), 0x4) getsockopt$packet_int(r0, 0x107, 0x12, &(0x7f0000000040), &(0x7f0000000080)=0x4) 2018/04/13 21:34:02 executing program 5: r0 = socket(0x40000000015, 0x5, 0x0) bind$inet(r0, &(0x7f0000fc4ff0)={0x2, 0x0, @loopback=0x7f000001}, 0x10) connect$inet(r0, &(0x7f0000000000)={0x2, 0x0, @loopback=0x7f000001}, 0x10) r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000100)='/proc/self/net/pfkey\x00', 0x200400, 0x0) getsockopt$inet_sctp_SCTP_STATUS(r0, 0x84, 0xe, &(0x7f0000000380)={0x0, 0xfff, 0x4, 0x81, 0x3, 0x6, 0x1, 0x2, {0x0, @in6={{0xa, 0x4e22, 0x400, @loopback={0x0, 0x1}, 0x400}}, 0x9, 0x8, 0x100, 0x6, 0x1}}, &(0x7f0000000440)=0xb0) setsockopt$inet_sctp_SCTP_STREAM_SCHEDULER_VALUE(r1, 0x84, 0x7c, &(0x7f0000000480)={r2, 0x10000, 0x8}, 0x8) ioctl$SNDRV_TIMER_IOCTL_PAUSE(r1, 0x54a3) sendmsg$alg(r0, &(0x7f0000159fc8)={0x0, 0x0, &(0x7f0000fc8000), 0x0, &(0x7f00000000c0)=[@assoc={0x18, 0x117, 0x4}, @op={0x18, 0x117, 0x3}], 0x30}, 0x0) ioctl$sock_inet6_tcp_SIOCOUTQNSD(r0, 0x894b, &(0x7f0000000340)) r3 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000180)='IPVS\x00') sendmsg$IPVS_CMD_GET_SERVICE(r1, &(0x7f00000002c0)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000000280)={&(0x7f00000001c0)={0x98, r3, 0x20, 0x70bd29, 0x25dfdbfc, {0x4}, [@IPVS_CMD_ATTR_DAEMON={0x4, 0x3}, @IPVS_CMD_ATTR_SERVICE={0x2c, 0x1, [@IPVS_SVC_ATTR_ADDR={0x14, 0x3}, @IPVS_SVC_ATTR_PROTOCOL={0x8, 0x2, 0x3c}, @IPVS_SVC_ATTR_FLAGS={0xc, 0x7, {0x4, 0x4}}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0x9}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x8}, @IPVS_CMD_ATTR_DAEMON={0x24, 0x3, [@IPVS_DAEMON_ATTR_MCAST_TTL={0x8, 0x8, 0x5}, @IPVS_DAEMON_ATTR_STATE={0x8, 0x1}, @IPVS_DAEMON_ATTR_MCAST_TTL={0x8, 0x8}, @IPVS_DAEMON_ATTR_MCAST_TTL={0x8, 0x8, 0x9}]}, @IPVS_CMD_ATTR_SERVICE={0x20, 0x1, [@IPVS_SVC_ATTR_FWMARK={0x8, 0x5, 0x3}, @IPVS_SVC_ATTR_TIMEOUT={0x8, 0x8}, @IPVS_SVC_ATTR_SCHED_NAME={0xc, 0x6, 'lblc\x00'}]}]}, 0x98}, 0x1, 0x0, 0x0, 0x840}, 0x800) r4 = socket$netlink(0x10, 0x3, 0xf) setsockopt$SO_BINDTODEVICE(r4, 0x1, 0x19, &(0x7f0000000300), 0x10) sendmsg$nl_generic(r4, &(0x7f0000002180)={&(0x7f0000000040)={0x10}, 0xc, &(0x7f0000002140)={&(0x7f0000000080)={0x18, 0x32, 0xfffffffffffffffd, 0x0, 0x0, {}, [@nested={0x4, 0x1}]}, 0x18}, 0x1}, 0x0) 2018/04/13 21:34:02 executing program 1: r0 = socket(0x40000000015, 0x5, 0x0) bind$inet(r0, &(0x7f0000fc4ff0)={0x2, 0x0, @loopback=0x7f000001}, 0x10) connect$inet(r0, &(0x7f0000000000)={0x2, 0x0, @loopback=0x7f000001}, 0x10) r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000100)='/proc/self/net/pfkey\x00', 0x200400, 0x0) getsockopt$inet_sctp_SCTP_STATUS(r0, 0x84, 0xe, &(0x7f0000000380)={0x0, 0xfff, 0x4, 0x81, 0x3, 0x6, 0x1, 0x2, {0x0, @in6={{0xa, 0x4e22, 0x400, @loopback={0x0, 0x1}, 0x400}}, 0x9, 0x8, 0x100, 0x6, 0x1}}, &(0x7f0000000440)=0xb0) setsockopt$inet_sctp_SCTP_STREAM_SCHEDULER_VALUE(r1, 0x84, 0x7c, &(0x7f0000000480)={r2, 0x10000, 0x8}, 0x8) ioctl$SNDRV_TIMER_IOCTL_PAUSE(r1, 0x54a3) sendmsg$alg(r0, &(0x7f0000159fc8)={0x0, 0x0, &(0x7f0000fc8000), 0x0, &(0x7f00000000c0)=[@assoc={0x18, 0x117, 0x4}, @op={0x18, 0x117, 0x3}], 0x30}, 0x0) ioctl$sock_inet6_tcp_SIOCOUTQNSD(r0, 0x894b, &(0x7f0000000340)) r3 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000180)='IPVS\x00') sendmsg$IPVS_CMD_GET_SERVICE(r1, &(0x7f00000002c0)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000000280)={&(0x7f00000001c0)={0x98, r3, 0x20, 0x70bd29, 0x25dfdbfc, {0x4}, [@IPVS_CMD_ATTR_DAEMON={0x4, 0x3}, @IPVS_CMD_ATTR_SERVICE={0x2c, 0x1, [@IPVS_SVC_ATTR_ADDR={0x14, 0x3}, @IPVS_SVC_ATTR_PROTOCOL={0x8, 0x2, 0x3c}, @IPVS_SVC_ATTR_FLAGS={0xc, 0x7, {0x4, 0x4}}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0x9}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x8}, @IPVS_CMD_ATTR_DAEMON={0x24, 0x3, [@IPVS_DAEMON_ATTR_MCAST_TTL={0x8, 0x8, 0x5}, @IPVS_DAEMON_ATTR_STATE={0x8, 0x1}, @IPVS_DAEMON_ATTR_MCAST_TTL={0x8, 0x8}, @IPVS_DAEMON_ATTR_MCAST_TTL={0x8, 0x8, 0x9}]}, @IPVS_CMD_ATTR_SERVICE={0x20, 0x1, [@IPVS_SVC_ATTR_FWMARK={0x8, 0x5, 0x3}, @IPVS_SVC_ATTR_TIMEOUT={0x8, 0x8}, @IPVS_SVC_ATTR_SCHED_NAME={0xc, 0x6, 'lblc\x00'}]}]}, 0x98}, 0x1, 0x0, 0x0, 0x840}, 0x800) r4 = socket$netlink(0x10, 0x3, 0xf) setsockopt$SO_BINDTODEVICE(r4, 0x1, 0x19, &(0x7f0000000300), 0x10) sendmsg$nl_generic(r4, &(0x7f0000002180)={&(0x7f0000000040)={0x10}, 0xc, &(0x7f0000002140)={&(0x7f0000000080)={0x18, 0x32, 0xfffffffffffffffd, 0x0, 0x0, {}, [@nested={0x4, 0x1}]}, 0x18}, 0x1}, 0x0) 2018/04/13 21:34:02 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f00000003c0)={&(0x7f0000024000)={0x10}, 0xc, &(0x7f0000023ff0)={&(0x7f0000000040)={0x14, 0x20, 0xafd, 0x0, 0x0, {0x3}}, 0x14}, 0x1}, 0x0) 2018/04/13 21:34:02 executing program 6: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000affff7)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = eventfd2(0x0, 0x0) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_IRQFD(r1, 0x4020ae76, &(0x7f0000ae9000)={r2}) ioctl$KVM_SET_GSI_ROUTING(r1, 0x4008ae6a, &(0x7f0000b15fc8)={0x1, 0x0, [{0x0, 0x4}]}) r3 = fcntl$dupfd(r2, 0x0, r1) write$evdev(r3, &(0x7f0000b04000)=[{}], 0x18) 2018/04/13 21:34:02 executing program 5: r0 = socket(0x40000000015, 0x5, 0x0) bind$inet(r0, &(0x7f0000fc4ff0)={0x2, 0x0, @loopback=0x7f000001}, 0x10) connect$inet(r0, &(0x7f0000000000)={0x2, 0x0, @loopback=0x7f000001}, 0x10) r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000100)='/proc/self/net/pfkey\x00', 0x200400, 0x0) getsockopt$inet_sctp_SCTP_STATUS(r0, 0x84, 0xe, &(0x7f0000000380)={0x0, 0xfff, 0x4, 0x81, 0x3, 0x6, 0x1, 0x2, {0x0, @in6={{0xa, 0x4e22, 0x400, @loopback={0x0, 0x1}, 0x400}}, 0x9, 0x8, 0x100, 0x6, 0x1}}, &(0x7f0000000440)=0xb0) setsockopt$inet_sctp_SCTP_STREAM_SCHEDULER_VALUE(r1, 0x84, 0x7c, &(0x7f0000000480)={r2, 0x10000, 0x8}, 0x8) ioctl$SNDRV_TIMER_IOCTL_PAUSE(r1, 0x54a3) sendmsg$alg(r0, &(0x7f0000159fc8)={0x0, 0x0, &(0x7f0000fc8000), 0x0, &(0x7f00000000c0)=[@assoc={0x18, 0x117, 0x4}, @op={0x18, 0x117, 0x3}], 0x30}, 0x0) ioctl$sock_inet6_tcp_SIOCOUTQNSD(r0, 0x894b, &(0x7f0000000340)) r3 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000180)='IPVS\x00') sendmsg$IPVS_CMD_GET_SERVICE(r1, &(0x7f00000002c0)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000000280)={&(0x7f00000001c0)={0x98, r3, 0x20, 0x70bd29, 0x25dfdbfc, {0x4}, [@IPVS_CMD_ATTR_DAEMON={0x4, 0x3}, @IPVS_CMD_ATTR_SERVICE={0x2c, 0x1, [@IPVS_SVC_ATTR_ADDR={0x14, 0x3}, @IPVS_SVC_ATTR_PROTOCOL={0x8, 0x2, 0x3c}, @IPVS_SVC_ATTR_FLAGS={0xc, 0x7, {0x4, 0x4}}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0x9}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x8}, @IPVS_CMD_ATTR_DAEMON={0x24, 0x3, [@IPVS_DAEMON_ATTR_MCAST_TTL={0x8, 0x8, 0x5}, @IPVS_DAEMON_ATTR_STATE={0x8, 0x1}, @IPVS_DAEMON_ATTR_MCAST_TTL={0x8, 0x8}, @IPVS_DAEMON_ATTR_MCAST_TTL={0x8, 0x8, 0x9}]}, @IPVS_CMD_ATTR_SERVICE={0x20, 0x1, [@IPVS_SVC_ATTR_FWMARK={0x8, 0x5, 0x3}, @IPVS_SVC_ATTR_TIMEOUT={0x8, 0x8}, @IPVS_SVC_ATTR_SCHED_NAME={0xc, 0x6, 'lblc\x00'}]}]}, 0x98}, 0x1, 0x0, 0x0, 0x840}, 0x800) r4 = socket$netlink(0x10, 0x3, 0xf) setsockopt$SO_BINDTODEVICE(r4, 0x1, 0x19, &(0x7f0000000300), 0x10) sendmsg$nl_generic(r4, &(0x7f0000002180)={&(0x7f0000000040)={0x10}, 0xc, &(0x7f0000002140)={&(0x7f0000000080)={0x18, 0x32, 0xfffffffffffffffd, 0x0, 0x0, {}, [@nested={0x4, 0x1}]}, 0x18}, 0x1}, 0x0) 2018/04/13 21:34:02 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000affff7)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = eventfd2(0x0, 0x0) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_IRQFD(r1, 0x4020ae76, &(0x7f0000ae9000)={r2}) ioctl$KVM_SET_GSI_ROUTING(r1, 0x4008ae6a, &(0x7f0000b15fc8)={0x1, 0x0, [{0x0, 0x4}]}) r3 = fcntl$dupfd(r2, 0x0, r1) write$evdev(r3, &(0x7f0000b04000)=[{}], 0x18) 2018/04/13 21:34:02 executing program 7: mmap(&(0x7f0000000000/0xd25000)=nil, 0xd25000, 0x0, 0x32, 0xffffffffffffffff, 0x0) futex(&(0x7f00000000c0), 0x2400000085, 0x0, &(0x7f0000000140), &(0x7f0000000040), 0x4020000000) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='cgroup.controllers\x00', 0x0, 0x0) getsockopt$inet_sctp6_SCTP_PR_SUPPORTED(r0, 0x84, 0x71, &(0x7f0000000080)={0x0, 0x3}, &(0x7f0000000100)=0x8) setsockopt$inet_sctp_SCTP_PRIMARY_ADDR(r0, 0x84, 0x6, &(0x7f0000000180)={r1, @in={{0x2, 0x4e21, @multicast2=0xe0000002}}}, 0x84) socket$nl_xfrm(0x10, 0x3, 0x6) ioctl$LOOP_CHANGE_FD(r0, 0x4c06, r0) 2018/04/13 21:34:02 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f00000003c0)={&(0x7f0000024000)={0x10}, 0xc, &(0x7f0000023ff0)={&(0x7f0000000040)={0x14, 0x20, 0xafd, 0x0, 0x0, {0x3}}, 0x14}, 0x1}, 0x0) 2018/04/13 21:34:02 executing program 1: r0 = socket(0x40000000015, 0x5, 0x0) bind$inet(r0, &(0x7f0000fc4ff0)={0x2, 0x0, @loopback=0x7f000001}, 0x10) connect$inet(r0, &(0x7f0000000000)={0x2, 0x0, @loopback=0x7f000001}, 0x10) r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000100)='/proc/self/net/pfkey\x00', 0x200400, 0x0) getsockopt$inet_sctp_SCTP_STATUS(r0, 0x84, 0xe, &(0x7f0000000380)={0x0, 0xfff, 0x4, 0x81, 0x3, 0x6, 0x1, 0x2, {0x0, @in6={{0xa, 0x4e22, 0x400, @loopback={0x0, 0x1}, 0x400}}, 0x9, 0x8, 0x100, 0x6, 0x1}}, &(0x7f0000000440)=0xb0) setsockopt$inet_sctp_SCTP_STREAM_SCHEDULER_VALUE(r1, 0x84, 0x7c, &(0x7f0000000480)={r2, 0x10000, 0x8}, 0x8) ioctl$SNDRV_TIMER_IOCTL_PAUSE(r1, 0x54a3) sendmsg$alg(r0, &(0x7f0000159fc8)={0x0, 0x0, &(0x7f0000fc8000), 0x0, &(0x7f00000000c0)=[@assoc={0x18, 0x117, 0x4}, @op={0x18, 0x117, 0x3}], 0x30}, 0x0) ioctl$sock_inet6_tcp_SIOCOUTQNSD(r0, 0x894b, &(0x7f0000000340)) r3 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000180)='IPVS\x00') sendmsg$IPVS_CMD_GET_SERVICE(r1, &(0x7f00000002c0)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000000280)={&(0x7f00000001c0)={0x98, r3, 0x20, 0x70bd29, 0x25dfdbfc, {0x4}, [@IPVS_CMD_ATTR_DAEMON={0x4, 0x3}, @IPVS_CMD_ATTR_SERVICE={0x2c, 0x1, [@IPVS_SVC_ATTR_ADDR={0x14, 0x3}, @IPVS_SVC_ATTR_PROTOCOL={0x8, 0x2, 0x3c}, @IPVS_SVC_ATTR_FLAGS={0xc, 0x7, {0x4, 0x4}}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0x9}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x8}, @IPVS_CMD_ATTR_DAEMON={0x24, 0x3, [@IPVS_DAEMON_ATTR_MCAST_TTL={0x8, 0x8, 0x5}, @IPVS_DAEMON_ATTR_STATE={0x8, 0x1}, @IPVS_DAEMON_ATTR_MCAST_TTL={0x8, 0x8}, @IPVS_DAEMON_ATTR_MCAST_TTL={0x8, 0x8, 0x9}]}, @IPVS_CMD_ATTR_SERVICE={0x20, 0x1, [@IPVS_SVC_ATTR_FWMARK={0x8, 0x5, 0x3}, @IPVS_SVC_ATTR_TIMEOUT={0x8, 0x8}, @IPVS_SVC_ATTR_SCHED_NAME={0xc, 0x6, 'lblc\x00'}]}]}, 0x98}, 0x1, 0x0, 0x0, 0x840}, 0x800) r4 = socket$netlink(0x10, 0x3, 0xf) setsockopt$SO_BINDTODEVICE(r4, 0x1, 0x19, &(0x7f0000000300), 0x10) sendmsg$nl_generic(r4, &(0x7f0000002180)={&(0x7f0000000040)={0x10}, 0xc, &(0x7f0000002140)={&(0x7f0000000080)={0x18, 0x32, 0xfffffffffffffffd, 0x0, 0x0, {}, [@nested={0x4, 0x1}]}, 0x18}, 0x1}, 0x0) 2018/04/13 21:34:02 executing program 4: r0 = socket$inet_sctp(0x2, 0x5, 0x84) perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp_SCTP_RTOINFO(r0, 0x84, 0x0, &(0x7f0000000000), &(0x7f0000000000)=0x10) 2018/04/13 21:34:02 executing program 6: perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mknod(&(0x7f0000f80000)='./file0\x00', 0x1040, 0x0) open$dir(&(0x7f0000296ff8)='./file0\x00', 0x27e, 0x0) 2018/04/13 21:34:02 executing program 3: perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mknod(&(0x7f0000000080)='./bus\x00', 0x1000, 0x0) creat(&(0x7f0000000040)='./bus\x00', 0x0) open(&(0x7f0000000000)='./bus\x00', 0x0, 0x0) open(&(0x7f00000000c0)='./bus\x00', 0x20802, 0x0) 2018/04/13 21:34:02 executing program 0: r0 = socket$inet_sctp(0x2, 0x1, 0x84) sendto$inet(r0, &(0x7f0000a34fff)='H', 0x1, 0x0, &(0x7f0000030ff0)={0x2, 0x0, @local={0xac, 0x14, 0xffffffffffffffff, 0xaa}}, 0x10) sendto$inet(r0, &(0x7f000026cfff)="c6", 0x1, 0x0, &(0x7f000052a000)={0x2, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff, 0xbb}}, 0x10) shutdown(r0, 0x1) getsockopt$inet_sctp_SCTP_DEFAULT_SEND_PARAM(r0, 0x84, 0xa, &(0x7f0000000080), &(0x7f00000000c0)=0x20) 2018/04/13 21:34:04 executing program 3: perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mknod(&(0x7f0000000080)='./bus\x00', 0x1000, 0x0) creat(&(0x7f0000000040)='./bus\x00', 0x0) open(&(0x7f0000000000)='./bus\x00', 0x0, 0x0) open(&(0x7f00000000c0)='./bus\x00', 0x20802, 0x0) 2018/04/13 21:34:04 executing program 2: r0 = openat$sequencer2(0xffffffffffffff9c, &(0x7f00001c1000)='/dev/sequencer2\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_SUBSCRIPTION(r0, 0x40085112, &(0x7f000021dfb0)={{0x8}}) 2018/04/13 21:34:04 executing program 7: mmap(&(0x7f0000000000/0xd25000)=nil, 0xd25000, 0x0, 0x32, 0xffffffffffffffff, 0x0) futex(&(0x7f00000000c0), 0x2400000085, 0x0, &(0x7f0000000140), &(0x7f0000000040), 0x4020000000) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='cgroup.controllers\x00', 0x0, 0x0) getsockopt$inet_sctp6_SCTP_PR_SUPPORTED(r0, 0x84, 0x71, &(0x7f0000000080)={0x0, 0x3}, &(0x7f0000000100)=0x8) setsockopt$inet_sctp_SCTP_PRIMARY_ADDR(r0, 0x84, 0x6, &(0x7f0000000180)={r1, @in={{0x2, 0x4e21, @multicast2=0xe0000002}}}, 0x84) socket$nl_xfrm(0x10, 0x3, 0x6) ioctl$LOOP_CHANGE_FD(r0, 0x4c06, r0) 2018/04/13 21:34:04 executing program 5: madvise(&(0x7f000079c000/0x800000)=nil, 0x800000, 0xc) madvise(&(0x7f0000153000/0x800000)=nil, 0x800000, 0xf) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp6_SCTP_PR_SUPPORTED(0xffffffffffffffff, 0x84, 0x71, &(0x7f0000865ff8), &(0x7f00009cfffc)=0x8) madvise(&(0x7f00002f8000/0xc00000)=nil, 0xc00000, 0xd) 2018/04/13 21:34:04 executing program 4: r0 = socket$inet_sctp(0x2, 0x5, 0x84) perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp_SCTP_RTOINFO(r0, 0x84, 0x0, &(0x7f0000000000), &(0x7f0000000000)=0x10) 2018/04/13 21:34:04 executing program 1: r0 = socket(0x40000000015, 0x5, 0x0) bind$inet(r0, &(0x7f0000fc4ff0)={0x2, 0x0, @loopback=0x7f000001}, 0x10) connect$inet(r0, &(0x7f0000000000)={0x2, 0x0, @loopback=0x7f000001}, 0x10) r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000100)='/proc/self/net/pfkey\x00', 0x200400, 0x0) getsockopt$inet_sctp_SCTP_STATUS(r0, 0x84, 0xe, &(0x7f0000000380)={0x0, 0xfff, 0x4, 0x81, 0x3, 0x6, 0x1, 0x2, {0x0, @in6={{0xa, 0x4e22, 0x400, @loopback={0x0, 0x1}, 0x400}}, 0x9, 0x8, 0x100, 0x6, 0x1}}, &(0x7f0000000440)=0xb0) setsockopt$inet_sctp_SCTP_STREAM_SCHEDULER_VALUE(r1, 0x84, 0x7c, &(0x7f0000000480)={r2, 0x10000, 0x8}, 0x8) ioctl$SNDRV_TIMER_IOCTL_PAUSE(r1, 0x54a3) sendmsg$alg(r0, &(0x7f0000159fc8)={0x0, 0x0, &(0x7f0000fc8000), 0x0, &(0x7f00000000c0)=[@assoc={0x18, 0x117, 0x4}, @op={0x18, 0x117, 0x3}], 0x30}, 0x0) ioctl$sock_inet6_tcp_SIOCOUTQNSD(r0, 0x894b, &(0x7f0000000340)) r3 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000180)='IPVS\x00') sendmsg$IPVS_CMD_GET_SERVICE(r1, &(0x7f00000002c0)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000000280)={&(0x7f00000001c0)={0x98, r3, 0x20, 0x70bd29, 0x25dfdbfc, {0x4}, [@IPVS_CMD_ATTR_DAEMON={0x4, 0x3}, @IPVS_CMD_ATTR_SERVICE={0x2c, 0x1, [@IPVS_SVC_ATTR_ADDR={0x14, 0x3}, @IPVS_SVC_ATTR_PROTOCOL={0x8, 0x2, 0x3c}, @IPVS_SVC_ATTR_FLAGS={0xc, 0x7, {0x4, 0x4}}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0x9}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x8}, @IPVS_CMD_ATTR_DAEMON={0x24, 0x3, [@IPVS_DAEMON_ATTR_MCAST_TTL={0x8, 0x8, 0x5}, @IPVS_DAEMON_ATTR_STATE={0x8, 0x1}, @IPVS_DAEMON_ATTR_MCAST_TTL={0x8, 0x8}, @IPVS_DAEMON_ATTR_MCAST_TTL={0x8, 0x8, 0x9}]}, @IPVS_CMD_ATTR_SERVICE={0x20, 0x1, [@IPVS_SVC_ATTR_FWMARK={0x8, 0x5, 0x3}, @IPVS_SVC_ATTR_TIMEOUT={0x8, 0x8}, @IPVS_SVC_ATTR_SCHED_NAME={0xc, 0x6, 'lblc\x00'}]}]}, 0x98}, 0x1, 0x0, 0x0, 0x840}, 0x800) r4 = socket$netlink(0x10, 0x3, 0xf) setsockopt$SO_BINDTODEVICE(r4, 0x1, 0x19, &(0x7f0000000300), 0x10) sendmsg$nl_generic(r4, &(0x7f0000002180)={&(0x7f0000000040)={0x10}, 0xc, &(0x7f0000002140)={&(0x7f0000000080)={0x18, 0x32, 0xfffffffffffffffd, 0x0, 0x0, {}, [@nested={0x4, 0x1}]}, 0x18}, 0x1}, 0x0) 2018/04/13 21:34:04 executing program 6: r0 = msgget$private(0x0, 0x0) msgsnd(r0, &(0x7f0000000080)={0x2}, 0x8, 0x0) msgsnd(r0, &(0x7f000010d000)={0x3}, 0x8, 0x0) msgrcv(r0, &(0x7f0000000000), 0x8, 0x2, 0x2800) 2018/04/13 21:34:04 executing program 0: r0 = socket$inet_sctp(0x2, 0x1, 0x84) sendto$inet(r0, &(0x7f0000a34fff)='H', 0x1, 0x0, &(0x7f0000030ff0)={0x2, 0x0, @local={0xac, 0x14, 0xffffffffffffffff, 0xaa}}, 0x10) sendto$inet(r0, &(0x7f000026cfff)="c6", 0x1, 0x0, &(0x7f000052a000)={0x2, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff, 0xbb}}, 0x10) shutdown(r0, 0x1) getsockopt$inet_sctp_SCTP_DEFAULT_SEND_PARAM(r0, 0x84, 0xa, &(0x7f0000000080), &(0x7f00000000c0)=0x20) 2018/04/13 21:34:04 executing program 7: mmap(&(0x7f0000000000/0xd25000)=nil, 0xd25000, 0x0, 0x32, 0xffffffffffffffff, 0x0) futex(&(0x7f00000000c0), 0x2400000085, 0x0, &(0x7f0000000140), &(0x7f0000000040), 0x4020000000) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='cgroup.controllers\x00', 0x0, 0x0) getsockopt$inet_sctp6_SCTP_PR_SUPPORTED(r0, 0x84, 0x71, &(0x7f0000000080)={0x0, 0x3}, &(0x7f0000000100)=0x8) setsockopt$inet_sctp_SCTP_PRIMARY_ADDR(r0, 0x84, 0x6, &(0x7f0000000180)={r1, @in={{0x2, 0x4e21, @multicast2=0xe0000002}}}, 0x84) socket$nl_xfrm(0x10, 0x3, 0x6) ioctl$LOOP_CHANGE_FD(r0, 0x4c06, r0) 2018/04/13 21:34:04 executing program 1: perf_event_open(&(0x7f00000000c0)={0x2, 0x70, 0x3e6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000000)={&(0x7f000001a000)={0x10}, 0xc, &(0x7f0000000240)={&(0x7f0000ea2fd8)={0x14, 0x29, 0xffffffffffffffff, 0x0, 0x0, {0x2001}}, 0x14}, 0x1}, 0x0) 2018/04/13 21:34:04 executing program 6: r0 = msgget$private(0x0, 0x0) msgsnd(r0, &(0x7f0000000080)={0x2}, 0x8, 0x0) msgsnd(r0, &(0x7f000010d000)={0x3}, 0x8, 0x0) msgrcv(r0, &(0x7f0000000000), 0x8, 0x2, 0x2800) 2018/04/13 21:34:04 executing program 5: mkdir(&(0x7f000082f000)='./control\x00', 0x0) r0 = open(&(0x7f000080dff6)='./control\x00', 0x0, 0x0) r1 = userfaultfd(0x0) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000bc8000)={0xaa}) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000d62fe0)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f00000007c0)='/dev/kvm\x00', 0x0, 0x0) r3 = ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) r4 = ioctl$KVM_CREATE_VCPU(r3, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r3, r4, &(0x7f000000b000/0x18000)=nil, &(0x7f0000000100)=[@text64={0x40, &(0x7f0000000000)="0f01c866b8b9008ec0b983030000b800000000ba000000000f3067f2450f2dba00000100b805000000b9000000000f01d92e654a0fc79b7cf40000420f00d3440f38077600653e660f2fcdc4e114567000", 0x51}], 0x1, 0xfffffffffffffffb, &(0x7f0000000140), 0x0) ioctl$KVM_RUN(r4, 0xae80, 0x0) dup2(r0, r1) 2018/04/13 21:34:04 executing program 2: r0 = openat$sequencer2(0xffffffffffffff9c, &(0x7f00001c1000)='/dev/sequencer2\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_SUBSCRIPTION(r0, 0x40085112, &(0x7f000021dfb0)={{0x8}}) 2018/04/13 21:34:04 executing program 4: r0 = socket$inet_sctp(0x2, 0x5, 0x84) perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp_SCTP_RTOINFO(r0, 0x84, 0x0, &(0x7f0000000000), &(0x7f0000000000)=0x10) 2018/04/13 21:34:04 executing program 1: clock_nanosleep(0x2, 0x0, &(0x7f0000000140)={0x0, 0x1c9c380}, &(0x7f0000000000)) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) mremap(&(0x7f00000d1000/0x3000)=nil, 0x3000, 0x1000, 0x0, &(0x7f00001cd000/0x1000)=nil) 2018/04/13 21:34:04 executing program 6: r0 = msgget$private(0x0, 0x0) msgsnd(r0, &(0x7f0000000080)={0x2}, 0x8, 0x0) msgsnd(r0, &(0x7f000010d000)={0x3}, 0x8, 0x0) msgrcv(r0, &(0x7f0000000000), 0x8, 0x2, 0x2800) 2018/04/13 21:34:04 executing program 3: perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mknod(&(0x7f0000000080)='./bus\x00', 0x1000, 0x0) creat(&(0x7f0000000040)='./bus\x00', 0x0) open(&(0x7f0000000000)='./bus\x00', 0x0, 0x0) open(&(0x7f00000000c0)='./bus\x00', 0x20802, 0x0) 2018/04/13 21:34:04 executing program 7: mmap(&(0x7f0000000000/0xd25000)=nil, 0xd25000, 0x0, 0x32, 0xffffffffffffffff, 0x0) futex(&(0x7f00000000c0), 0x2400000085, 0x0, &(0x7f0000000140), &(0x7f0000000040), 0x4020000000) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='cgroup.controllers\x00', 0x0, 0x0) getsockopt$inet_sctp6_SCTP_PR_SUPPORTED(r0, 0x84, 0x71, &(0x7f0000000080)={0x0, 0x3}, &(0x7f0000000100)=0x8) setsockopt$inet_sctp_SCTP_PRIMARY_ADDR(r0, 0x84, 0x6, &(0x7f0000000180)={r1, @in={{0x2, 0x4e21, @multicast2=0xe0000002}}}, 0x84) socket$nl_xfrm(0x10, 0x3, 0x6) ioctl$LOOP_CHANGE_FD(r0, 0x4c06, r0) 2018/04/13 21:34:04 executing program 2: r0 = openat$sequencer2(0xffffffffffffff9c, &(0x7f00001c1000)='/dev/sequencer2\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_SUBSCRIPTION(r0, 0x40085112, &(0x7f000021dfb0)={{0x8}}) 2018/04/13 21:34:04 executing program 6: r0 = msgget$private(0x0, 0x0) msgsnd(r0, &(0x7f0000000080)={0x2}, 0x8, 0x0) msgsnd(r0, &(0x7f000010d000)={0x3}, 0x8, 0x0) msgrcv(r0, &(0x7f0000000000), 0x8, 0x2, 0x2800) 2018/04/13 21:34:04 executing program 4: r0 = socket$inet_sctp(0x2, 0x5, 0x84) perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp_SCTP_RTOINFO(r0, 0x84, 0x0, &(0x7f0000000000), &(0x7f0000000000)=0x10) 2018/04/13 21:34:04 executing program 6: syz_emit_ethernet(0xc0, &(0x7f0000000000)={@broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], @local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, [], {@arp={0x806, @ether_ipv4={0x1, 0x800, 0x6, 0x4, 0x1, @random="5b51fc71599a", @empty, @random="05db9db24e2a", @local={0xac, 0x14, 0xffffffffffffffff, 0xaa}}}}}, 0x0) 2018/04/13 21:34:04 executing program 7: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$binder(&(0x7f0000000140)='/dev/binder#\x00', 0xffffffffffffffff, 0x800) ioctl$BINDER_SET_MAX_THREADS(r0, 0x40046205, 0x0) ioctl$BINDER_WRITE_READ(r0, 0xc0306201, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000180), 0x1, 0x0, &(0x7f00000001c0)="98"}) [ 325.386904] binder: 22309:22311 ioctl 40046205 0 returned -22 [ 325.395205] binder: 22309:22311 ioctl c0306201 20000280 returned -11 [ 325.403944] binder: 22309:22313 ioctl 40046205 0 returned -22 2018/04/13 21:34:05 executing program 3: perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mknod(&(0x7f0000000080)='./bus\x00', 0x1000, 0x0) creat(&(0x7f0000000040)='./bus\x00', 0x0) open(&(0x7f0000000000)='./bus\x00', 0x0, 0x0) open(&(0x7f00000000c0)='./bus\x00', 0x20802, 0x0) 2018/04/13 21:34:05 executing program 0: r0 = socket$inet_sctp(0x2, 0x1, 0x84) sendto$inet(r0, &(0x7f0000a34fff)='H', 0x1, 0x0, &(0x7f0000030ff0)={0x2, 0x0, @local={0xac, 0x14, 0xffffffffffffffff, 0xaa}}, 0x10) sendto$inet(r0, &(0x7f000026cfff)="c6", 0x1, 0x0, &(0x7f000052a000)={0x2, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff, 0xbb}}, 0x10) shutdown(r0, 0x1) getsockopt$inet_sctp_SCTP_DEFAULT_SEND_PARAM(r0, 0x84, 0xa, &(0x7f0000000080), &(0x7f00000000c0)=0x20) 2018/04/13 21:34:05 executing program 4: r0 = open$dir(&(0x7f00000001c0)='./file0\x00', 0x1fffe, 0x0) r1 = open$dir(&(0x7f0000000500)='./file0\x00', 0x2, 0x0) write(r1, &(0x7f0000000300)="d88a8d38144e5013d473c0ac2ca61ff3b749a4f5c7e6", 0x16) fcntl$F_GET_FILE_RW_HINT(0xffffffffffffffff, 0x40d, &(0x7f0000000200)) sendfile(r1, r1, &(0x7f0000000040), 0x7527fb3200000000) syncfs(r0) fcntl$F_GET_RW_HINT(0xffffffffffffffff, 0x40b, &(0x7f0000000240)) sendfile(r1, r0, &(0x7f0000000180), 0x20000000011ffe) fadvise64(r0, 0x0, 0x0, 0x4) 2018/04/13 21:34:05 executing program 1: clock_nanosleep(0x2, 0x0, &(0x7f0000000140)={0x0, 0x1c9c380}, &(0x7f0000000000)) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) mremap(&(0x7f00000d1000/0x3000)=nil, 0x3000, 0x1000, 0x0, &(0x7f00001cd000/0x1000)=nil) 2018/04/13 21:34:05 executing program 7: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$binder(&(0x7f0000000140)='/dev/binder#\x00', 0xffffffffffffffff, 0x800) ioctl$BINDER_SET_MAX_THREADS(r0, 0x40046205, 0x0) ioctl$BINDER_WRITE_READ(r0, 0xc0306201, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000180), 0x1, 0x0, &(0x7f00000001c0)="98"}) 2018/04/13 21:34:05 executing program 6: syz_emit_ethernet(0xc0, &(0x7f0000000000)={@broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], @local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, [], {@arp={0x806, @ether_ipv4={0x1, 0x800, 0x6, 0x4, 0x1, @random="5b51fc71599a", @empty, @random="05db9db24e2a", @local={0xac, 0x14, 0xffffffffffffffff, 0xaa}}}}}, 0x0) 2018/04/13 21:34:05 executing program 5: mkdir(&(0x7f000082f000)='./control\x00', 0x0) r0 = open(&(0x7f000080dff6)='./control\x00', 0x0, 0x0) r1 = userfaultfd(0x0) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000bc8000)={0xaa}) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000d62fe0)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f00000007c0)='/dev/kvm\x00', 0x0, 0x0) r3 = ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) r4 = ioctl$KVM_CREATE_VCPU(r3, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r3, r4, &(0x7f000000b000/0x18000)=nil, &(0x7f0000000100)=[@text64={0x40, &(0x7f0000000000)="0f01c866b8b9008ec0b983030000b800000000ba000000000f3067f2450f2dba00000100b805000000b9000000000f01d92e654a0fc79b7cf40000420f00d3440f38077600653e660f2fcdc4e114567000", 0x51}], 0x1, 0xfffffffffffffffb, &(0x7f0000000140), 0x0) ioctl$KVM_RUN(r4, 0xae80, 0x0) dup2(r0, r1) 2018/04/13 21:34:05 executing program 2: r0 = openat$sequencer2(0xffffffffffffff9c, &(0x7f00001c1000)='/dev/sequencer2\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_SUBSCRIPTION(r0, 0x40085112, &(0x7f000021dfb0)={{0x8}}) 2018/04/13 21:34:05 executing program 6: syz_emit_ethernet(0xc0, &(0x7f0000000000)={@broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], @local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, [], {@arp={0x806, @ether_ipv4={0x1, 0x800, 0x6, 0x4, 0x1, @random="5b51fc71599a", @empty, @random="05db9db24e2a", @local={0xac, 0x14, 0xffffffffffffffff, 0xaa}}}}}, 0x0) 2018/04/13 21:34:05 executing program 2: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$binder(&(0x7f0000000140)='/dev/binder#\x00', 0xffffffffffffffff, 0x800) ioctl$BINDER_SET_MAX_THREADS(r0, 0x40046205, 0x0) ioctl$BINDER_WRITE_READ(r0, 0xc0306201, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000180), 0x1, 0x0, &(0x7f00000001c0)="98"}) [ 326.150384] binder: 22322:22331 ioctl 40046205 0 returned -22 [ 326.183483] binder: 22322:22331 ioctl c0306201 20000280 returned -11 2018/04/13 21:34:05 executing program 7: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$binder(&(0x7f0000000140)='/dev/binder#\x00', 0xffffffffffffffff, 0x800) ioctl$BINDER_SET_MAX_THREADS(r0, 0x40046205, 0x0) ioctl$BINDER_WRITE_READ(r0, 0xc0306201, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000180), 0x1, 0x0, &(0x7f00000001c0)="98"}) 2018/04/13 21:34:05 executing program 6: syz_emit_ethernet(0xc0, &(0x7f0000000000)={@broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], @local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, [], {@arp={0x806, @ether_ipv4={0x1, 0x800, 0x6, 0x4, 0x1, @random="5b51fc71599a", @empty, @random="05db9db24e2a", @local={0xac, 0x14, 0xffffffffffffffff, 0xaa}}}}}, 0x0) 2018/04/13 21:34:05 executing program 6: r0 = socket$inet6(0xa, 0x802, 0x0) sendto$inet6(r0, &(0x7f0000000040), 0x0, 0x8000, &(0x7f0000001040)={0xa, 0x4e22, 0x0, @mcast2={0xff, 0x2, [], 0x1}}, 0x1c) setsockopt$inet6_IPV6_ADDRFORM(r0, 0x29, 0x1, &(0x7f0000000bc0)=0x2, 0x4) 2018/04/13 21:34:05 executing program 2: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$binder(&(0x7f0000000140)='/dev/binder#\x00', 0xffffffffffffffff, 0x800) ioctl$BINDER_SET_MAX_THREADS(r0, 0x40046205, 0x0) ioctl$BINDER_WRITE_READ(r0, 0xc0306201, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000180), 0x1, 0x0, &(0x7f00000001c0)="98"}) [ 326.274821] binder: 22337:22339 ioctl 40046205 0 returned -22 [ 326.289743] binder: 22342:22343 ioctl 40046205 0 returned -22 [ 326.297266] binder: 22337:22339 ioctl c0306201 20000280 returned -11 [ 326.307566] binder: 22342:22343 ioctl c0306201 20000280 returned -11 2018/04/13 21:34:05 executing program 7: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$binder(&(0x7f0000000140)='/dev/binder#\x00', 0xffffffffffffffff, 0x800) ioctl$BINDER_SET_MAX_THREADS(r0, 0x40046205, 0x0) ioctl$BINDER_WRITE_READ(r0, 0xc0306201, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000180), 0x1, 0x0, &(0x7f00000001c0)="98"}) 2018/04/13 21:34:05 executing program 6: r0 = socket$inet6(0xa, 0x802, 0x0) sendto$inet6(r0, &(0x7f0000000040), 0x0, 0x8000, &(0x7f0000001040)={0xa, 0x4e22, 0x0, @mcast2={0xff, 0x2, [], 0x1}}, 0x1c) setsockopt$inet6_IPV6_ADDRFORM(r0, 0x29, 0x1, &(0x7f0000000bc0)=0x2, 0x4) [ 326.368382] binder: 22347:22348 ioctl 40046205 0 returned -22 [ 326.375954] binder: 22347:22348 ioctl c0306201 20000280 returned -11 [ 326.418702] binder: 22352:22353 ioctl 40046205 0 returned -22 [ 326.436705] binder: 22352:22353 ioctl c0306201 20000280 returned -11 2018/04/13 21:34:06 executing program 5: mkdir(&(0x7f000082f000)='./control\x00', 0x0) r0 = open(&(0x7f000080dff6)='./control\x00', 0x0, 0x0) r1 = userfaultfd(0x0) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000bc8000)={0xaa}) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000d62fe0)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f00000007c0)='/dev/kvm\x00', 0x0, 0x0) r3 = ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) r4 = ioctl$KVM_CREATE_VCPU(r3, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r3, r4, &(0x7f000000b000/0x18000)=nil, &(0x7f0000000100)=[@text64={0x40, &(0x7f0000000000)="0f01c866b8b9008ec0b983030000b800000000ba000000000f3067f2450f2dba00000100b805000000b9000000000f01d92e654a0fc79b7cf40000420f00d3440f38077600653e660f2fcdc4e114567000", 0x51}], 0x1, 0xfffffffffffffffb, &(0x7f0000000140), 0x0) ioctl$KVM_RUN(r4, 0xae80, 0x0) dup2(r0, r1) 2018/04/13 21:34:06 executing program 0: r0 = socket$inet_sctp(0x2, 0x1, 0x84) sendto$inet(r0, &(0x7f0000a34fff)='H', 0x1, 0x0, &(0x7f0000030ff0)={0x2, 0x0, @local={0xac, 0x14, 0xffffffffffffffff, 0xaa}}, 0x10) sendto$inet(r0, &(0x7f000026cfff)="c6", 0x1, 0x0, &(0x7f000052a000)={0x2, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff, 0xbb}}, 0x10) shutdown(r0, 0x1) getsockopt$inet_sctp_SCTP_DEFAULT_SEND_PARAM(r0, 0x84, 0xa, &(0x7f0000000080), &(0x7f00000000c0)=0x20) 2018/04/13 21:34:06 executing program 4: r0 = open$dir(&(0x7f00000001c0)='./file0\x00', 0x1fffe, 0x0) r1 = open$dir(&(0x7f0000000500)='./file0\x00', 0x2, 0x0) write(r1, &(0x7f0000000300)="d88a8d38144e5013d473c0ac2ca61ff3b749a4f5c7e6", 0x16) fcntl$F_GET_FILE_RW_HINT(0xffffffffffffffff, 0x40d, &(0x7f0000000200)) sendfile(r1, r1, &(0x7f0000000040), 0x7527fb3200000000) syncfs(r0) fcntl$F_GET_RW_HINT(0xffffffffffffffff, 0x40b, &(0x7f0000000240)) sendfile(r1, r0, &(0x7f0000000180), 0x20000000011ffe) fadvise64(r0, 0x0, 0x0, 0x4) 2018/04/13 21:34:06 executing program 6: r0 = socket$inet6(0xa, 0x802, 0x0) sendto$inet6(r0, &(0x7f0000000040), 0x0, 0x8000, &(0x7f0000001040)={0xa, 0x4e22, 0x0, @mcast2={0xff, 0x2, [], 0x1}}, 0x1c) setsockopt$inet6_IPV6_ADDRFORM(r0, 0x29, 0x1, &(0x7f0000000bc0)=0x2, 0x4) 2018/04/13 21:34:06 executing program 7: r0 = socket$inet(0x2, 0x2, 0x0) bind$inet(r0, &(0x7f0000eed000)={0x2, 0x4e21}, 0x10) syz_emit_ethernet(0xfed1, &(0x7f000000a000)={@broadcast=[0xff, 0xe0, 0xff, 0xff, 0xff, 0xff], @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x0, 0x11, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff, 0xbb}, @multicast1=0xe0000001}, @udp={0x0, 0x4e21, 0x8}}}}}, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8907, &(0x7f0000000600)={'bpq0\x00'}) recvmsg(r0, &(0x7f0000000400)={&(0x7f0000000000)=@vsock={0x0, 0x0, 0x0, @host}, 0x80, &(0x7f0000000380), 0x0, &(0x7f00000003c0)=""/59, 0x3b}, 0x0) 2018/04/13 21:34:06 executing program 1: clock_nanosleep(0x2, 0x0, &(0x7f0000000140)={0x0, 0x1c9c380}, &(0x7f0000000000)) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) mremap(&(0x7f00000d1000/0x3000)=nil, 0x3000, 0x1000, 0x0, &(0x7f00001cd000/0x1000)=nil) 2018/04/13 21:34:06 executing program 2: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$binder(&(0x7f0000000140)='/dev/binder#\x00', 0xffffffffffffffff, 0x800) ioctl$BINDER_SET_MAX_THREADS(r0, 0x40046205, 0x0) ioctl$BINDER_WRITE_READ(r0, 0xc0306201, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000180), 0x1, 0x0, &(0x7f00000001c0)="98"}) 2018/04/13 21:34:06 executing program 3: r0 = open$dir(&(0x7f00000001c0)='./file0\x00', 0x1fffe, 0x0) r1 = open$dir(&(0x7f0000000500)='./file0\x00', 0x2, 0x0) write(r1, &(0x7f0000000300)="d88a8d38144e5013d473c0ac2ca61ff3b749a4f5c7e6", 0x16) fcntl$F_GET_FILE_RW_HINT(0xffffffffffffffff, 0x40d, &(0x7f0000000200)) sendfile(r1, r1, &(0x7f0000000040), 0x7527fb3200000000) syncfs(r0) fcntl$F_GET_RW_HINT(0xffffffffffffffff, 0x40b, &(0x7f0000000240)) sendfile(r1, r0, &(0x7f0000000180), 0x20000000011ffe) fadvise64(r0, 0x0, 0x0, 0x4) 2018/04/13 21:34:06 executing program 6: r0 = socket$inet6(0xa, 0x802, 0x0) sendto$inet6(r0, &(0x7f0000000040), 0x0, 0x8000, &(0x7f0000001040)={0xa, 0x4e22, 0x0, @mcast2={0xff, 0x2, [], 0x1}}, 0x1c) setsockopt$inet6_IPV6_ADDRFORM(r0, 0x29, 0x1, &(0x7f0000000bc0)=0x2, 0x4) [ 327.304424] binder: 22364:22366 ioctl 40046205 0 returned -22 [ 327.316986] binder: 22364:22366 ioctl c0306201 20000280 returned -11 2018/04/13 21:34:07 executing program 7: r0 = socket$inet(0x2, 0x2, 0x0) bind$inet(r0, &(0x7f0000eed000)={0x2, 0x4e21}, 0x10) syz_emit_ethernet(0xfed1, &(0x7f000000a000)={@broadcast=[0xff, 0xe0, 0xff, 0xff, 0xff, 0xff], @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x0, 0x11, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff, 0xbb}, @multicast1=0xe0000001}, @udp={0x0, 0x4e21, 0x8}}}}}, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8907, &(0x7f0000000600)={'bpq0\x00'}) recvmsg(r0, &(0x7f0000000400)={&(0x7f0000000000)=@vsock={0x0, 0x0, 0x0, @host}, 0x80, &(0x7f0000000380), 0x0, &(0x7f00000003c0)=""/59, 0x3b}, 0x0) 2018/04/13 21:34:07 executing program 7: r0 = socket$inet(0x2, 0x2, 0x0) bind$inet(r0, &(0x7f0000eed000)={0x2, 0x4e21}, 0x10) syz_emit_ethernet(0xfed1, &(0x7f000000a000)={@broadcast=[0xff, 0xe0, 0xff, 0xff, 0xff, 0xff], @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x0, 0x11, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff, 0xbb}, @multicast1=0xe0000001}, @udp={0x0, 0x4e21, 0x8}}}}}, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8907, &(0x7f0000000600)={'bpq0\x00'}) recvmsg(r0, &(0x7f0000000400)={&(0x7f0000000000)=@vsock={0x0, 0x0, 0x0, @host}, 0x80, &(0x7f0000000380), 0x0, &(0x7f00000003c0)=""/59, 0x3b}, 0x0) 2018/04/13 21:34:07 executing program 7: r0 = socket$inet(0x2, 0x2, 0x0) bind$inet(r0, &(0x7f0000eed000)={0x2, 0x4e21}, 0x10) syz_emit_ethernet(0xfed1, &(0x7f000000a000)={@broadcast=[0xff, 0xe0, 0xff, 0xff, 0xff, 0xff], @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x0, 0x11, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff, 0xbb}, @multicast1=0xe0000001}, @udp={0x0, 0x4e21, 0x8}}}}}, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8907, &(0x7f0000000600)={'bpq0\x00'}) recvmsg(r0, &(0x7f0000000400)={&(0x7f0000000000)=@vsock={0x0, 0x0, 0x0, @host}, 0x80, &(0x7f0000000380), 0x0, &(0x7f00000003c0)=""/59, 0x3b}, 0x0) 2018/04/13 21:34:07 executing program 5: mkdir(&(0x7f000082f000)='./control\x00', 0x0) r0 = open(&(0x7f000080dff6)='./control\x00', 0x0, 0x0) r1 = userfaultfd(0x0) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000bc8000)={0xaa}) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000d62fe0)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f00000007c0)='/dev/kvm\x00', 0x0, 0x0) r3 = ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) r4 = ioctl$KVM_CREATE_VCPU(r3, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r3, r4, &(0x7f000000b000/0x18000)=nil, &(0x7f0000000100)=[@text64={0x40, &(0x7f0000000000)="0f01c866b8b9008ec0b983030000b800000000ba000000000f3067f2450f2dba00000100b805000000b9000000000f01d92e654a0fc79b7cf40000420f00d3440f38077600653e660f2fcdc4e114567000", 0x51}], 0x1, 0xfffffffffffffffb, &(0x7f0000000140), 0x0) ioctl$KVM_RUN(r4, 0xae80, 0x0) dup2(r0, r1) 2018/04/13 21:34:07 executing program 1: clock_nanosleep(0x2, 0x0, &(0x7f0000000140)={0x0, 0x1c9c380}, &(0x7f0000000000)) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) mremap(&(0x7f00000d1000/0x3000)=nil, 0x3000, 0x1000, 0x0, &(0x7f00001cd000/0x1000)=nil) 2018/04/13 21:34:07 executing program 4: r0 = open$dir(&(0x7f00000001c0)='./file0\x00', 0x1fffe, 0x0) r1 = open$dir(&(0x7f0000000500)='./file0\x00', 0x2, 0x0) write(r1, &(0x7f0000000300)="d88a8d38144e5013d473c0ac2ca61ff3b749a4f5c7e6", 0x16) fcntl$F_GET_FILE_RW_HINT(0xffffffffffffffff, 0x40d, &(0x7f0000000200)) sendfile(r1, r1, &(0x7f0000000040), 0x7527fb3200000000) syncfs(r0) fcntl$F_GET_RW_HINT(0xffffffffffffffff, 0x40b, &(0x7f0000000240)) sendfile(r1, r0, &(0x7f0000000180), 0x20000000011ffe) fadvise64(r0, 0x0, 0x0, 0x4) 2018/04/13 21:34:07 executing program 3: r0 = open$dir(&(0x7f00000001c0)='./file0\x00', 0x1fffe, 0x0) r1 = open$dir(&(0x7f0000000500)='./file0\x00', 0x2, 0x0) write(r1, &(0x7f0000000300)="d88a8d38144e5013d473c0ac2ca61ff3b749a4f5c7e6", 0x16) fcntl$F_GET_FILE_RW_HINT(0xffffffffffffffff, 0x40d, &(0x7f0000000200)) sendfile(r1, r1, &(0x7f0000000040), 0x7527fb3200000000) syncfs(r0) fcntl$F_GET_RW_HINT(0xffffffffffffffff, 0x40b, &(0x7f0000000240)) sendfile(r1, r0, &(0x7f0000000180), 0x20000000011ffe) fadvise64(r0, 0x0, 0x0, 0x4) 2018/04/13 21:34:08 executing program 6: r0 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) connect$vsock_dgram(0xffffffffffffffff, &(0x7f0000000480)={0x28, 0x0, 0x0, @host=0x2}, 0x10) ioctl$fiemap(r0, 0x40086602, &(0x7f0000000480)=ANY=[]) unlink(&(0x7f00003b3000)='./file0\x00') 2018/04/13 21:34:08 executing program 2: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$sndctrl(&(0x7f0000000400)='/dev/snd/controlC#\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_RAWMIDI_NEXT_DEVICE(r0, 0xc0045540, &(0x7f0000000040)) 2018/04/13 21:34:08 executing program 7: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x2000000003, 0x3) ioctl$sock_ipx_SIOCSIFADDR(r0, 0x400452c8, &(0x7f0000000000)={"69726c6103000000001c00", {0x4, 0x0, 0x0, "90310c252e29"}}) 2018/04/13 21:34:08 executing program 0: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f000000dff6)='./control\x00', 0x0) r0 = open(&(0x7f0000039000)='./control\x00', 0x0, 0x0) fdatasync(r0) 2018/04/13 21:34:08 executing program 5: remap_file_pages(&(0x7f0000008000/0x4000)=nil, 0x500, 0x0, 0x0, 0x0) 2018/04/13 21:34:08 executing program 7: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x2000000003, 0x3) ioctl$sock_ipx_SIOCSIFADDR(r0, 0x400452c8, &(0x7f0000000000)={"69726c6103000000001c00", {0x4, 0x0, 0x0, "90310c252e29"}}) [ 329.275757] mmap: syz-executor5 (22427) uses deprecated remap_file_pages() syscall. See Documentation/vm/remap_file_pages.txt. 2018/04/13 21:34:08 executing program 2: perf_event_open(&(0x7f00000017c0)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000340)={&(0x7f0000000040)={0x10}, 0xc, &(0x7f0000000300)={&(0x7f0000000100)={0x14, 0x3, 0x7, 0x1}, 0x14}, 0x1}, 0x0) 2018/04/13 21:34:09 executing program 2: perf_event_open(&(0x7f00000017c0)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000340)={&(0x7f0000000040)={0x10}, 0xc, &(0x7f0000000300)={&(0x7f0000000100)={0x14, 0x3, 0x7, 0x1}, 0x14}, 0x1}, 0x0) 2018/04/13 21:34:09 executing program 5: remap_file_pages(&(0x7f0000008000/0x4000)=nil, 0x500, 0x0, 0x0, 0x0) 2018/04/13 21:34:09 executing program 3: r0 = open$dir(&(0x7f00000001c0)='./file0\x00', 0x1fffe, 0x0) r1 = open$dir(&(0x7f0000000500)='./file0\x00', 0x2, 0x0) write(r1, &(0x7f0000000300)="d88a8d38144e5013d473c0ac2ca61ff3b749a4f5c7e6", 0x16) fcntl$F_GET_FILE_RW_HINT(0xffffffffffffffff, 0x40d, &(0x7f0000000200)) sendfile(r1, r1, &(0x7f0000000040), 0x7527fb3200000000) syncfs(r0) fcntl$F_GET_RW_HINT(0xffffffffffffffff, 0x40b, &(0x7f0000000240)) sendfile(r1, r0, &(0x7f0000000180), 0x20000000011ffe) fadvise64(r0, 0x0, 0x0, 0x4) 2018/04/13 21:34:09 executing program 0: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f000000dff6)='./control\x00', 0x0) r0 = open(&(0x7f0000039000)='./control\x00', 0x0, 0x0) fdatasync(r0) 2018/04/13 21:34:09 executing program 4: r0 = open$dir(&(0x7f00000001c0)='./file0\x00', 0x1fffe, 0x0) r1 = open$dir(&(0x7f0000000500)='./file0\x00', 0x2, 0x0) write(r1, &(0x7f0000000300)="d88a8d38144e5013d473c0ac2ca61ff3b749a4f5c7e6", 0x16) fcntl$F_GET_FILE_RW_HINT(0xffffffffffffffff, 0x40d, &(0x7f0000000200)) sendfile(r1, r1, &(0x7f0000000040), 0x7527fb3200000000) syncfs(r0) fcntl$F_GET_RW_HINT(0xffffffffffffffff, 0x40b, &(0x7f0000000240)) sendfile(r1, r0, &(0x7f0000000180), 0x20000000011ffe) fadvise64(r0, 0x0, 0x0, 0x4) 2018/04/13 21:34:09 executing program 7: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x2000000003, 0x3) ioctl$sock_ipx_SIOCSIFADDR(r0, 0x400452c8, &(0x7f0000000000)={"69726c6103000000001c00", {0x4, 0x0, 0x0, "90310c252e29"}}) 2018/04/13 21:34:09 executing program 1: perf_event_open(&(0x7f0000348f88)={0x2, 0x70, 0x3e6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) get_robust_list(0x0, &(0x7f0000000200)=&(0x7f00000001c0)={&(0x7f0000000100)={&(0x7f00000000c0)}, 0x0, &(0x7f0000000180)={&(0x7f0000000140)}}, &(0x7f0000000240)=0x18) 2018/04/13 21:34:09 executing program 6: r0 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) connect$vsock_dgram(0xffffffffffffffff, &(0x7f0000000480)={0x28, 0x0, 0x0, @host=0x2}, 0x10) ioctl$fiemap(r0, 0x40086602, &(0x7f0000000480)=ANY=[]) unlink(&(0x7f00003b3000)='./file0\x00') 2018/04/13 21:34:09 executing program 5: remap_file_pages(&(0x7f0000008000/0x4000)=nil, 0x500, 0x0, 0x0, 0x0) 2018/04/13 21:34:09 executing program 7: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x2000000003, 0x3) ioctl$sock_ipx_SIOCSIFADDR(r0, 0x400452c8, &(0x7f0000000000)={"69726c6103000000001c00", {0x4, 0x0, 0x0, "90310c252e29"}}) 2018/04/13 21:34:09 executing program 2: perf_event_open(&(0x7f00000017c0)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000340)={&(0x7f0000000040)={0x10}, 0xc, &(0x7f0000000300)={&(0x7f0000000100)={0x14, 0x3, 0x7, 0x1}, 0x14}, 0x1}, 0x0) 2018/04/13 21:34:09 executing program 0: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f000000dff6)='./control\x00', 0x0) r0 = open(&(0x7f0000039000)='./control\x00', 0x0, 0x0) fdatasync(r0) 2018/04/13 21:34:09 executing program 6: r0 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) connect$vsock_dgram(0xffffffffffffffff, &(0x7f0000000480)={0x28, 0x0, 0x0, @host=0x2}, 0x10) ioctl$fiemap(r0, 0x40086602, &(0x7f0000000480)=ANY=[]) unlink(&(0x7f00003b3000)='./file0\x00') 2018/04/13 21:34:09 executing program 5: remap_file_pages(&(0x7f0000008000/0x4000)=nil, 0x500, 0x0, 0x0, 0x0) 2018/04/13 21:34:09 executing program 1: perf_event_open(&(0x7f0000348f88)={0x2, 0x70, 0x3e6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) get_robust_list(0x0, &(0x7f0000000200)=&(0x7f00000001c0)={&(0x7f0000000100)={&(0x7f00000000c0)}, 0x0, &(0x7f0000000180)={&(0x7f0000000140)}}, &(0x7f0000000240)=0x18) [ 329.854860] IPVS: ftp: loaded support on port[0] = 21 [ 330.606903] bridge0: port 1(bridge_slave_0) entered blocking state [ 330.613281] bridge0: port 1(bridge_slave_0) entered disabled state [ 330.620435] device bridge_slave_0 entered promiscuous mode [ 330.645668] bridge0: port 2(bridge_slave_1) entered blocking state [ 330.652063] bridge0: port 2(bridge_slave_1) entered disabled state [ 330.659217] device bridge_slave_1 entered promiscuous mode [ 330.683870] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 330.708603] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 330.776644] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 330.808925] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 330.913906] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 330.921057] team0: Port device team_slave_0 added [ 330.945217] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 330.952495] team0: Port device team_slave_1 added [ 330.975953] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 331.003646] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 331.023874] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 331.049451] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 331.264796] bridge0: port 2(bridge_slave_1) entered blocking state [ 331.271174] bridge0: port 2(bridge_slave_1) entered forwarding state [ 331.277803] bridge0: port 1(bridge_slave_0) entered blocking state [ 331.284154] bridge0: port 1(bridge_slave_0) entered forwarding state [ 332.068862] 8021q: adding VLAN 0 to HW filter on device bond0 [ 332.147174] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 332.225641] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 332.231836] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 332.239469] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 332.312631] 8021q: adding VLAN 0 to HW filter on device team0 2018/04/13 21:34:12 executing program 3: syz_emit_ethernet(0x28, &(0x7f000003c000)={@empty, @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x0, 0x11, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff, 0xbb}, @multicast1=0xe0000001}, @udp={0x0, 0x0, 0x8}}}}}, 0x0) 2018/04/13 21:34:12 executing program 2: perf_event_open(&(0x7f00000017c0)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000340)={&(0x7f0000000040)={0x10}, 0xc, &(0x7f0000000300)={&(0x7f0000000100)={0x14, 0x3, 0x7, 0x1}, 0x14}, 0x1}, 0x0) 2018/04/13 21:34:12 executing program 5: r0 = socket$inet6(0xa, 0x3, 0x4000000000000087) io_setup(0x95, &(0x7f0000c6b000)=0x0) io_submit(r1, 0x1, &(0x7f0000356ff0)=[&(0x7f0000000080)={0x0, 0x0, 0x0, 0x1, 0x0, r0, &(0x7f0000001ec0), 0xfffffda5}]) 2018/04/13 21:34:12 executing program 0: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f000000dff6)='./control\x00', 0x0) r0 = open(&(0x7f0000039000)='./control\x00', 0x0, 0x0) fdatasync(r0) 2018/04/13 21:34:12 executing program 4: r0 = memfd_create(&(0x7f00000002c0)='ramfs\x00', 0x0) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) fanotify_init(0x30, 0x400) setsockopt$inet_tcp_int(r1, 0x6, 0x80000000000002, &(0x7f0000000280)=0x401, 0xaa3d) bind$inet(r1, &(0x7f0000deb000)={0x2, 0x4e23}, 0x10) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000f40ff8)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r1, &(0x7f0000a88f88), 0x29f, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @loopback=0x7f000001}, 0x10) openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup/syz0\x00', 0x200002, 0x0) openat$dsp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dsp\x00', 0x10000, 0x0) ioctl$ASHMEM_GET_PROT_MASK(r0, 0x7706, &(0x7f0000000580)) write$fuse(r1, &(0x7f0000000180)=ANY=[@ANYBLOB="809e0b0dc85f4d56aa30cc5ff6ae106d3a16270876e73026911116757283b62d08d24327bbb4daf7d3b522f6dc4891d3270a89"], 0x33) getsockopt$inet_sctp6_SCTP_GET_ASSOC_STATS(r0, 0x84, 0x70, &(0x7f0000000440)={0x0, @in6={{0xa, 0x4e23, 0x9, @local={0xfe, 0x80, [], 0xaa}, 0x9}}, [0x8000]}, &(0x7f00000003c0)=0x100) setsockopt$inet_sctp6_SCTP_ASSOCINFO(0xffffffffffffffff, 0x84, 0x1, &(0x7f0000000540), 0x14) sendmmsg(r1, &(0x7f00000025c0)=[{{&(0x7f0000000300)=@pppoe={0x18, 0x0, {0x0, @link_local={0x1, 0x80, 0xc2}, 'ip6tnl0\x00'}}, 0x80, &(0x7f0000000380)=[{&(0x7f00000010c0)="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", 0x3f6}], 0x1}}], 0x1, 0x0) shutdown(r1, 0x1) 2018/04/13 21:34:12 executing program 1: perf_event_open(&(0x7f0000348f88)={0x2, 0x70, 0x3e6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) get_robust_list(0x0, &(0x7f0000000200)=&(0x7f00000001c0)={&(0x7f0000000100)={&(0x7f00000000c0)}, 0x0, &(0x7f0000000180)={&(0x7f0000000140)}}, &(0x7f0000000240)=0x18) 2018/04/13 21:34:12 executing program 6: r0 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) connect$vsock_dgram(0xffffffffffffffff, &(0x7f0000000480)={0x28, 0x0, 0x0, @host=0x2}, 0x10) ioctl$fiemap(r0, 0x40086602, &(0x7f0000000480)=ANY=[]) unlink(&(0x7f00003b3000)='./file0\x00') 2018/04/13 21:34:12 executing program 7: syz_mount_image$minix(&(0x7f0000000000)='minix\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="10000000000001000c0005000003008b23efb77f200000005a4d", 0x1a, 0x400}], 0x0, 0x0) 2018/04/13 21:34:12 executing program 2: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x15, 0x5, 0x0) getsockopt$inet_mreqn(r0, 0x114, 0x200002714, &(0x7f0000000000)={@remote, @remote}, &(0x7f0000000080)=0xc) 2018/04/13 21:34:12 executing program 1: perf_event_open(&(0x7f0000348f88)={0x2, 0x70, 0x3e6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) get_robust_list(0x0, &(0x7f0000000200)=&(0x7f00000001c0)={&(0x7f0000000100)={&(0x7f00000000c0)}, 0x0, &(0x7f0000000180)={&(0x7f0000000140)}}, &(0x7f0000000240)=0x18) 2018/04/13 21:34:12 executing program 3: syz_emit_ethernet(0x28, &(0x7f000003c000)={@empty, @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x0, 0x11, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff, 0xbb}, @multicast1=0xe0000001}, @udp={0x0, 0x0, 0x8}}}}}, 0x0) 2018/04/13 21:34:12 executing program 5: r0 = socket$inet6(0xa, 0x3, 0x4000000000000087) io_setup(0x95, &(0x7f0000c6b000)=0x0) io_submit(r1, 0x1, &(0x7f0000356ff0)=[&(0x7f0000000080)={0x0, 0x0, 0x0, 0x1, 0x0, r0, &(0x7f0000001ec0), 0xfffffda5}]) [ 332.876181] MINIX-fs: bad superblock or unable to read bitmaps 2018/04/13 21:34:12 executing program 0: perf_event_open(&(0x7f00000000c0)={0x2, 0x70, 0x3e6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$KVM_SET_IRQCHIP(0xffffffffffffffff, 0x8208ae63, &(0x7f0000000240)=@ioapic={0x0, 0x0, 0x0, 0x0, 0x0, [{0x0, 0x0, 0x9}]}) shmctl$IPC_STAT(0x0, 0x2, &(0x7f0000000140)=""/171) [ 332.932460] MINIX-fs: bad superblock or unable to read bitmaps 2018/04/13 21:34:12 executing program 4: r0 = memfd_create(&(0x7f00000002c0)='ramfs\x00', 0x0) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) fanotify_init(0x30, 0x400) setsockopt$inet_tcp_int(r1, 0x6, 0x80000000000002, &(0x7f0000000280)=0x401, 0xaa3d) bind$inet(r1, &(0x7f0000deb000)={0x2, 0x4e23}, 0x10) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000f40ff8)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r1, &(0x7f0000a88f88), 0x29f, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @loopback=0x7f000001}, 0x10) openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup/syz0\x00', 0x200002, 0x0) openat$dsp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dsp\x00', 0x10000, 0x0) ioctl$ASHMEM_GET_PROT_MASK(r0, 0x7706, &(0x7f0000000580)) write$fuse(r1, &(0x7f0000000180)=ANY=[@ANYBLOB="809e0b0dc85f4d56aa30cc5ff6ae106d3a16270876e73026911116757283b62d08d24327bbb4daf7d3b522f6dc4891d3270a89"], 0x33) getsockopt$inet_sctp6_SCTP_GET_ASSOC_STATS(r0, 0x84, 0x70, &(0x7f0000000440)={0x0, @in6={{0xa, 0x4e23, 0x9, @local={0xfe, 0x80, [], 0xaa}, 0x9}}, [0x8000]}, &(0x7f00000003c0)=0x100) setsockopt$inet_sctp6_SCTP_ASSOCINFO(0xffffffffffffffff, 0x84, 0x1, &(0x7f0000000540), 0x14) sendmmsg(r1, &(0x7f00000025c0)=[{{&(0x7f0000000300)=@pppoe={0x18, 0x0, {0x0, @link_local={0x1, 0x80, 0xc2}, 'ip6tnl0\x00'}}, 0x80, &(0x7f0000000380)=[{&(0x7f00000010c0)="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", 0x3f6}], 0x1}}], 0x1, 0x0) shutdown(r1, 0x1) 2018/04/13 21:34:12 executing program 2: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x15, 0x5, 0x0) getsockopt$inet_mreqn(r0, 0x114, 0x200002714, &(0x7f0000000000)={@remote, @remote}, &(0x7f0000000080)=0xc) 2018/04/13 21:34:12 executing program 7: syz_mount_image$minix(&(0x7f0000000000)='minix\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="10000000000001000c0005000003008b23efb77f200000005a4d", 0x1a, 0x400}], 0x0, 0x0) [ 333.142228] MINIX-fs: bad superblock or unable to read bitmaps [ 333.166227] device bridge_slave_1 left promiscuous mode [ 333.171839] bridge0: port 2(bridge_slave_1) entered disabled state 2018/04/13 21:34:12 executing program 3: syz_emit_ethernet(0x28, &(0x7f000003c000)={@empty, @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x0, 0x11, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff, 0xbb}, @multicast1=0xe0000001}, @udp={0x0, 0x0, 0x8}}}}}, 0x0) 2018/04/13 21:34:12 executing program 6: r0 = memfd_create(&(0x7f00000002c0)='ramfs\x00', 0x0) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) fanotify_init(0x30, 0x400) setsockopt$inet_tcp_int(r1, 0x6, 0x80000000000002, &(0x7f0000000280)=0x401, 0xaa3d) bind$inet(r1, &(0x7f0000deb000)={0x2, 0x4e23}, 0x10) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000f40ff8)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r1, &(0x7f0000a88f88), 0x29f, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @loopback=0x7f000001}, 0x10) openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup/syz0\x00', 0x200002, 0x0) openat$dsp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dsp\x00', 0x10000, 0x0) ioctl$ASHMEM_GET_PROT_MASK(r0, 0x7706, &(0x7f0000000580)) write$fuse(r1, &(0x7f0000000180)=ANY=[@ANYBLOB="809e0b0dc85f4d56aa30cc5ff6ae106d3a16270876e73026911116757283b62d08d24327bbb4daf7d3b522f6dc4891d3270a89"], 0x33) getsockopt$inet_sctp6_SCTP_GET_ASSOC_STATS(r0, 0x84, 0x70, &(0x7f0000000440)={0x0, @in6={{0xa, 0x4e23, 0x9, @local={0xfe, 0x80, [], 0xaa}, 0x9}}, [0x8000]}, &(0x7f00000003c0)=0x100) setsockopt$inet_sctp6_SCTP_ASSOCINFO(0xffffffffffffffff, 0x84, 0x1, &(0x7f0000000540), 0x14) sendmmsg(r1, &(0x7f00000025c0)=[{{&(0x7f0000000300)=@pppoe={0x18, 0x0, {0x0, @link_local={0x1, 0x80, 0xc2}, 'ip6tnl0\x00'}}, 0x80, &(0x7f0000000380)=[{&(0x7f00000010c0)="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", 0x3f6}], 0x1}}], 0x1, 0x0) shutdown(r1, 0x1) 2018/04/13 21:34:12 executing program 1: perf_event_open(&(0x7f00000000c0)={0x2, 0x70, 0x3e6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$KVM_SET_IRQCHIP(0xffffffffffffffff, 0x8208ae63, &(0x7f0000000240)=@ioapic={0x0, 0x0, 0x0, 0x0, 0x0, [{0x0, 0x0, 0x9}]}) shmctl$IPC_STAT(0x0, 0x2, &(0x7f0000000140)=""/171) 2018/04/13 21:34:12 executing program 5: r0 = socket$inet6(0xa, 0x3, 0x4000000000000087) io_setup(0x95, &(0x7f0000c6b000)=0x0) io_submit(r1, 0x1, &(0x7f0000356ff0)=[&(0x7f0000000080)={0x0, 0x0, 0x0, 0x1, 0x0, r0, &(0x7f0000001ec0), 0xfffffda5}]) 2018/04/13 21:34:12 executing program 0: perf_event_open(&(0x7f00000000c0)={0x2, 0x70, 0x3e6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$KVM_SET_IRQCHIP(0xffffffffffffffff, 0x8208ae63, &(0x7f0000000240)=@ioapic={0x0, 0x0, 0x0, 0x0, 0x0, [{0x0, 0x0, 0x9}]}) shmctl$IPC_STAT(0x0, 0x2, &(0x7f0000000140)=""/171) 2018/04/13 21:34:12 executing program 4: r0 = memfd_create(&(0x7f00000002c0)='ramfs\x00', 0x0) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) fanotify_init(0x30, 0x400) setsockopt$inet_tcp_int(r1, 0x6, 0x80000000000002, &(0x7f0000000280)=0x401, 0xaa3d) bind$inet(r1, &(0x7f0000deb000)={0x2, 0x4e23}, 0x10) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000f40ff8)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r1, &(0x7f0000a88f88), 0x29f, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @loopback=0x7f000001}, 0x10) openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup/syz0\x00', 0x200002, 0x0) openat$dsp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dsp\x00', 0x10000, 0x0) ioctl$ASHMEM_GET_PROT_MASK(r0, 0x7706, &(0x7f0000000580)) write$fuse(r1, &(0x7f0000000180)=ANY=[@ANYBLOB="809e0b0dc85f4d56aa30cc5ff6ae106d3a16270876e73026911116757283b62d08d24327bbb4daf7d3b522f6dc4891d3270a89"], 0x33) getsockopt$inet_sctp6_SCTP_GET_ASSOC_STATS(r0, 0x84, 0x70, &(0x7f0000000440)={0x0, @in6={{0xa, 0x4e23, 0x9, @local={0xfe, 0x80, [], 0xaa}, 0x9}}, [0x8000]}, &(0x7f00000003c0)=0x100) setsockopt$inet_sctp6_SCTP_ASSOCINFO(0xffffffffffffffff, 0x84, 0x1, &(0x7f0000000540), 0x14) sendmmsg(r1, &(0x7f00000025c0)=[{{&(0x7f0000000300)=@pppoe={0x18, 0x0, {0x0, @link_local={0x1, 0x80, 0xc2}, 'ip6tnl0\x00'}}, 0x80, &(0x7f0000000380)=[{&(0x7f00000010c0)="9421e5271f45907f567d604a09fe27abfa55e2aebecfe4a0aeda13b3d2418870405797686467855ad166a77fa809f72ab92d438b38975596f98c0c03126989f5a4a3fe4878335988dfb98b11d880cc928c21fccdcf2086d98e2ac4ab265ff234ba0a86ee14bbb2bf4cc210f6ca6a5d3d18d3110ac82704ac8a979bebe6ea1a803cb5a21babf0a28c6741f5493a7189c764564aa039257ce92830f1a25bb6fb553231195be0ff72269d4b8503dbb0bc6c23f0341aa626735a002006f6c2b036efa5d1e087ee6181ffb3d0f5f569629e1691681449dc33e4b96e7d71acec3270c46c74442fbb78a39abcddd7c12b184b60f369e4cbf65bddc6e709130c8664607bf74f8e51b570d3a12155be268339d9e2012ee5e7f8ac4696119e847f2fc96f6006cbda28c502d7ee34fcabbbb5c303f7cd3292aabb74a7bff1f76fce1b1fe13482fda1408973de9868e96c630ff08bd68c3a98d07ce0662997755f039a7ee45bdae739d3f3b1cbd5ecfa8825b540b6417c730ec4a8204ce2ba6ebd0c9452b0cc1273bbd591314867c54abafc48697fed81bfeec349729da076218770bb7ba8a2aedca9000638018a28abcaa3dc6642db8097039f0f9f6fdd1ab481507e5796d65b2a81bd38b11c518feed59fce3147bb2bd31518c6032745185a44a98ec2efe3f8eb27709c2e70cfef9a971f97159e74868d6a55e1a8e6e7b500d7c116f02594a58e3dceb86175af56c7502287ddab530acb67386725e0d6b2e317cb0b87affd30d4ff210024287c19d27033b7a11bf18d1ce1e23f618476b15c3a5574fdc0f238f2ec1c3cd2784fd3d8235278bd957c929021d97da58459f921a47002a4841ff77262b7150c5fbda7f8bf6801c22adfb0bc96f7a2d8527aaf00ae5b663eb0f69914dc722b2d7b1e4861ed66168b7c6afa56fff36de7c842f3d24ecc65d25f24917f0867f6a2fb7c5a02335ff1870d35c3aba978208c118fb5ed56f102cf9bfde60786175bc25ebba02aaa4cbbdc95afa96c3449e53c5ea7e92bdabc8ae8b28370cdefc009698f8f870da37e1b188a5439428b619618179900e03df2d5926bd0a69fe94b5553ce84323a03b371d35d4984daa8e4f52cbc75d05dbd12d3bdcc5125ea53559ae82593a6a8d9812ea99d4166451edc55e5dd97f98b7e5c6527658765d14c9c5be3fc4153881d666dbf5eb45c1cbde2781a985f59e7e5aab7d9398dcc21e1d7495047a5afb84727aadc86854edd5a5a645ca3715b2c78ef32702231aa8be45cf97ac787765bbb631f6a357d292bbe97e7d3ec6d15b82f0985f7c0fe679b9788674b80312b5f365dbcf1a8eb5e295084485dcc92f2b905cdded6e2e81cfc7e9d29ec61fd893d120c31b9101770f4cb2e38a8a518295d373f9e6ba8a7226542c67a2ea423f1a32722260ad533435f903933a7", 0x3f6}], 0x1}}], 0x1, 0x0) shutdown(r1, 0x1) 2018/04/13 21:34:12 executing program 2: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x15, 0x5, 0x0) getsockopt$inet_mreqn(r0, 0x114, 0x200002714, &(0x7f0000000000)={@remote, @remote}, &(0x7f0000000080)=0xc) 2018/04/13 21:34:12 executing program 7: syz_mount_image$minix(&(0x7f0000000000)='minix\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="10000000000001000c0005000003008b23efb77f200000005a4d", 0x1a, 0x400}], 0x0, 0x0) [ 333.202136] device bridge_slave_0 left promiscuous mode [ 333.207673] bridge0: port 1(bridge_slave_0) entered disabled state 2018/04/13 21:34:12 executing program 3: syz_emit_ethernet(0x28, &(0x7f000003c000)={@empty, @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x0, 0x11, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff, 0xbb}, @multicast1=0xe0000001}, @udp={0x0, 0x0, 0x8}}}}}, 0x0) 2018/04/13 21:34:12 executing program 5: r0 = socket$inet6(0xa, 0x3, 0x4000000000000087) io_setup(0x95, &(0x7f0000c6b000)=0x0) io_submit(r1, 0x1, &(0x7f0000356ff0)=[&(0x7f0000000080)={0x0, 0x0, 0x0, 0x1, 0x0, r0, &(0x7f0000001ec0), 0xfffffda5}]) [ 333.288461] MINIX-fs: bad superblock or unable to read bitmaps 2018/04/13 21:34:12 executing program 2: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x15, 0x5, 0x0) getsockopt$inet_mreqn(r0, 0x114, 0x200002714, &(0x7f0000000000)={@remote, @remote}, &(0x7f0000000080)=0xc) 2018/04/13 21:34:12 executing program 0: perf_event_open(&(0x7f00000000c0)={0x2, 0x70, 0x3e6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$KVM_SET_IRQCHIP(0xffffffffffffffff, 0x8208ae63, &(0x7f0000000240)=@ioapic={0x0, 0x0, 0x0, 0x0, 0x0, [{0x0, 0x0, 0x9}]}) shmctl$IPC_STAT(0x0, 0x2, &(0x7f0000000140)=""/171) 2018/04/13 21:34:12 executing program 1: perf_event_open(&(0x7f00000000c0)={0x2, 0x70, 0x3e6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$KVM_SET_IRQCHIP(0xffffffffffffffff, 0x8208ae63, &(0x7f0000000240)=@ioapic={0x0, 0x0, 0x0, 0x0, 0x0, [{0x0, 0x0, 0x9}]}) shmctl$IPC_STAT(0x0, 0x2, &(0x7f0000000140)=""/171) 2018/04/13 21:34:13 executing program 7: syz_mount_image$minix(&(0x7f0000000000)='minix\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="10000000000001000c0005000003008b23efb77f200000005a4d", 0x1a, 0x400}], 0x0, 0x0) 2018/04/13 21:34:13 executing program 4: r0 = memfd_create(&(0x7f00000002c0)='ramfs\x00', 0x0) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) fanotify_init(0x30, 0x400) setsockopt$inet_tcp_int(r1, 0x6, 0x80000000000002, &(0x7f0000000280)=0x401, 0xaa3d) bind$inet(r1, &(0x7f0000deb000)={0x2, 0x4e23}, 0x10) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000f40ff8)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r1, &(0x7f0000a88f88), 0x29f, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @loopback=0x7f000001}, 0x10) openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup/syz0\x00', 0x200002, 0x0) openat$dsp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dsp\x00', 0x10000, 0x0) ioctl$ASHMEM_GET_PROT_MASK(r0, 0x7706, &(0x7f0000000580)) write$fuse(r1, &(0x7f0000000180)=ANY=[@ANYBLOB="809e0b0dc85f4d56aa30cc5ff6ae106d3a16270876e73026911116757283b62d08d24327bbb4daf7d3b522f6dc4891d3270a89"], 0x33) getsockopt$inet_sctp6_SCTP_GET_ASSOC_STATS(r0, 0x84, 0x70, &(0x7f0000000440)={0x0, @in6={{0xa, 0x4e23, 0x9, @local={0xfe, 0x80, [], 0xaa}, 0x9}}, [0x8000]}, &(0x7f00000003c0)=0x100) setsockopt$inet_sctp6_SCTP_ASSOCINFO(0xffffffffffffffff, 0x84, 0x1, &(0x7f0000000540), 0x14) sendmmsg(r1, &(0x7f00000025c0)=[{{&(0x7f0000000300)=@pppoe={0x18, 0x0, {0x0, @link_local={0x1, 0x80, 0xc2}, 'ip6tnl0\x00'}}, 0x80, &(0x7f0000000380)=[{&(0x7f00000010c0)="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", 0x3f6}], 0x1}}], 0x1, 0x0) shutdown(r1, 0x1) [ 333.412175] team0 (unregistering): Port device team_slave_1 removed 2018/04/13 21:34:13 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000040)={'lo\x00', &(0x7f00000000c0)=@ethtool_cmd={0x34}}) 2018/04/13 21:34:13 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x1004000000004) writev(r0, &(0x7f0000000000)=[{&(0x7f0000000040)="580000001400192340a14b80040d8c560a0600000000e076000543d8d8fe5800000024ca7f4f643e8900050028635a000510f5100002000000000000001c04ed5dfffff500002f00100001000a04082214abdd0500000000", 0x58}], 0x1) [ 333.483749] team0 (unregistering): Port device team_slave_0 removed [ 333.498893] MINIX-fs: bad superblock or unable to read bitmaps [ 333.556285] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 333.618510] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 333.647662] IPVS: ftp: loaded support on port[0] = 21 [ 333.685791] bond0 (unregistering): Released all slaves [ 334.253050] bridge0: port 1(bridge_slave_0) entered blocking state [ 334.259462] bridge0: port 1(bridge_slave_0) entered disabled state [ 334.267297] device bridge_slave_0 entered promiscuous mode [ 334.305275] bridge0: port 2(bridge_slave_1) entered blocking state [ 334.311687] bridge0: port 2(bridge_slave_1) entered disabled state [ 334.319452] device bridge_slave_1 entered promiscuous mode [ 334.355567] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 334.392119] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 334.499906] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 334.541203] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 334.709605] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 334.717000] team0: Port device team_slave_0 added [ 334.753896] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 334.761772] team0: Port device team_slave_1 added [ 334.797746] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 334.827755] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 334.867525] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 334.906888] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 335.160439] bridge0: port 2(bridge_slave_1) entered blocking state [ 335.166859] bridge0: port 2(bridge_slave_1) entered forwarding state [ 335.173498] bridge0: port 1(bridge_slave_0) entered blocking state [ 335.179848] bridge0: port 1(bridge_slave_0) entered forwarding state [ 335.187137] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 335.968124] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 336.006621] 8021q: adding VLAN 0 to HW filter on device bond0 [ 336.089934] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 336.170615] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 336.176960] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 336.185431] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 336.260398] 8021q: adding VLAN 0 to HW filter on device team0 2018/04/13 21:34:16 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000040)={'lo\x00', &(0x7f00000000c0)=@ethtool_cmd={0x34}}) 2018/04/13 21:34:16 executing program 0: perf_event_open(&(0x7f00000000c0)={0x2, 0x70, 0x3e6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$KVM_SET_IRQCHIP(0xffffffffffffffff, 0x8208ae63, &(0x7f0000000240)=@ioapic={0x0, 0x0, 0x0, 0x0, 0x0, [{0x0, 0x0, 0x9}]}) shmctl$IPC_STAT(0x0, 0x2, &(0x7f0000000140)=""/171) 2018/04/13 21:34:16 executing program 1: perf_event_open(&(0x7f00000000c0)={0x2, 0x70, 0x3e6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$KVM_SET_IRQCHIP(0xffffffffffffffff, 0x8208ae63, &(0x7f0000000240)=@ioapic={0x0, 0x0, 0x0, 0x0, 0x0, [{0x0, 0x0, 0x9}]}) shmctl$IPC_STAT(0x0, 0x2, &(0x7f0000000140)=""/171) 2018/04/13 21:34:16 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x1004000000004) writev(r0, &(0x7f0000000000)=[{&(0x7f0000000040)="580000001400192340a14b80040d8c560a0600000000e076000543d8d8fe5800000024ca7f4f643e8900050028635a000510f5100002000000000000001c04ed5dfffff500002f00100001000a04082214abdd0500000000", 0x58}], 0x1) 2018/04/13 21:34:16 executing program 7: syz_mount_image$msdos(&(0x7f0000000000)='msdos\x00', &(0x7f0000000100)='./file0\x00', 0xe800, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="eb3c906d6b66732e66617400100401000200027400f8", 0x16}], 0x0, &(0x7f0000004640)={[{@umask={'umask', 0x3d, [0x34, 0x30, 0x30, 0x32, 0x30, 0x33, 0x34, 0x36, 0x32]}, 0x2c}, {@discard='discard', 0x2c}, {@nocase='nocase', 0x2c}, {@usefree='usefree', 0x2c}, {@fmask={'fmask', 0x3d, [0x32, 0x37, 0x33, 0x32, 0x32]}, 0x2c}, {@allow_utime={'allow_utime', 0x3d, [0x35, 0x36, 0x32, 0x33, 0x30, 0x33, 0x30]}, 0x2c}]}) open$dir(&(0x7f0000000340)='./file0/f.le.\x00', 0x40, 0x0) 2018/04/13 21:34:16 executing program 4: r0 = inotify_init1(0x0) fcntl$setown(r0, 0x8, 0xffffffffffffffff) r1 = memfd_create(&(0x7f0000002901)='dev ', 0x0) write(r1, &(0x7f0000000380)='\x00', 0x1) sendfile(r1, r1, &(0x7f0000001000), 0xffff) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x2, 0x11, r1, 0x0) fcntl$getownex(r0, 0x10, &(0x7f000045fff8)={0x0, 0x0}) ptrace$setopts(0x4206, r2, 0x0, 0x0) ptrace(0x4207, r2) ptrace$getregset(0x4204, r2, 0x1, &(0x7f00000000c0)={&(0x7f00000013c0)=""/4096, 0x1000}) 2018/04/13 21:34:16 executing program 2: bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000040)={0xffffffffffffffff, &(0x7f00000000c0)="b82283392dc50ff1fb635a5849d2f5916ae2fdc24e95e12aa8daccf7393e72be9cc66f"}, 0x10) socket$inet_tcp(0x2, 0x1, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000346fd4)={0x0, 0x0, 0x0, 0x1000000000000004, 0x202}, 0x2c) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x1, 0x5, &(0x7f0000346fc8)=@framed={{0x18}, [@alu={0x8000000201a7f19, 0x0, 0x7, 0x0, 0x1}], {0x95}}, &(0x7f0000f6bffb)='GPL\x00', 0x0, 0x299, &(0x7f00001a7f05)=""/251}, 0x18) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000140)={r0, 0x50, &(0x7f00000000c0)}, 0x10) socketpair$inet_icmp(0x13, 0x894c, 0xfffffffe, &(0x7f0000000180)) 2018/04/13 21:34:16 executing program 6: r0 = memfd_create(&(0x7f00000002c0)='ramfs\x00', 0x0) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) fanotify_init(0x30, 0x400) setsockopt$inet_tcp_int(r1, 0x6, 0x80000000000002, &(0x7f0000000280)=0x401, 0xaa3d) bind$inet(r1, &(0x7f0000deb000)={0x2, 0x4e23}, 0x10) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000f40ff8)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r1, &(0x7f0000a88f88), 0x29f, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @loopback=0x7f000001}, 0x10) openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup/syz0\x00', 0x200002, 0x0) openat$dsp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dsp\x00', 0x10000, 0x0) ioctl$ASHMEM_GET_PROT_MASK(r0, 0x7706, &(0x7f0000000580)) write$fuse(r1, &(0x7f0000000180)=ANY=[@ANYBLOB="809e0b0dc85f4d56aa30cc5ff6ae106d3a16270876e73026911116757283b62d08d24327bbb4daf7d3b522f6dc4891d3270a89"], 0x33) getsockopt$inet_sctp6_SCTP_GET_ASSOC_STATS(r0, 0x84, 0x70, &(0x7f0000000440)={0x0, @in6={{0xa, 0x4e23, 0x9, @local={0xfe, 0x80, [], 0xaa}, 0x9}}, [0x8000]}, &(0x7f00000003c0)=0x100) setsockopt$inet_sctp6_SCTP_ASSOCINFO(0xffffffffffffffff, 0x84, 0x1, &(0x7f0000000540), 0x14) sendmmsg(r1, &(0x7f00000025c0)=[{{&(0x7f0000000300)=@pppoe={0x18, 0x0, {0x0, @link_local={0x1, 0x80, 0xc2}, 'ip6tnl0\x00'}}, 0x80, &(0x7f0000000380)=[{&(0x7f00000010c0)="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", 0x3f6}], 0x1}}], 0x1, 0x0) shutdown(r1, 0x1) 2018/04/13 21:34:16 executing program 1: perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x1, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f0000f5ffe0)={@loopback={0x0, 0x1}, 0x0, 0x0, 0x0, 0x1}, 0x20) getsockopt$IP6T_SO_GET_REVISION_TARGET(r0, 0x29, 0x45, &(0x7f0000000100)={'NETMAP\x00'}, &(0x7f0000000140)=0x1e) [ 336.770704] FAT-fs (loop7): mounting with "discard" option, but the device does not support discard 2018/04/13 21:34:16 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000040)={'lo\x00', &(0x7f00000000c0)=@ethtool_cmd={0x34}}) 2018/04/13 21:34:16 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x1004000000004) writev(r0, &(0x7f0000000000)=[{&(0x7f0000000040)="580000001400192340a14b80040d8c560a0600000000e076000543d8d8fe5800000024ca7f4f643e8900050028635a000510f5100002000000000000001c04ed5dfffff500002f00100001000a04082214abdd0500000000", 0x58}], 0x1) 2018/04/13 21:34:16 executing program 0: openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) r0 = dup2(0xffffffffffffff9c, 0xffffffffffffff9c) ioctl$KVM_SET_TSC_KHZ(r0, 0xaea2, 0x9800000000000000) clone(0x1000000, &(0x7f00000004c0)="6106e802c4455821b500339bbc33f3982ecbda0b4de8fe940a9d00505b74e485", &(0x7f0000000500), &(0x7f0000fef000), &(0x7f0000000380)="cbc5268168638fea702e6a94348cc6d6c7b84a027d27c42c15cadd2ff7d4345276cae16ba05fa5feca936e104b22a8b564fec21749af3e7e735cd250669261169e5b72f849192a785a87506b03855b06b1bf70d6152d01a8b150491ee7e068ae34d8e38d6932d723ddcdf7c8564bda47f52fa8fd66ded411fc63aff1f7d55432b8b420432b6c32b40d0267ebfb28f31cf3a260e8866a47d42e90f6e52192b8c962c354243b987814fbb0e78ba97e327cfb10af17ab538cc641") perf_event_open(&(0x7f000001d000)={0x5, 0x78, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_bp={&(0x7f0000000000), 0x1}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$nl_xfrm(0xa, 0x5, 0x84) timer_create(0x7, &(0x7f0000000040)={0x0, 0x24, 0x0, @tid=0xffffffffffffffff}, &(0x7f0000001080)=0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffff9c, 0x29, 0x23, &(0x7f0000001100)={{{@in=@dev, @in6=@mcast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast1}, 0x0, @in6=@mcast2}}, &(0x7f0000001200)=0xe8) recvfrom(r1, &(0x7f00000010c0)=""/9, 0x9, 0x140, &(0x7f0000001240)=@ll={0x11, 0x19, r3, 0x1, 0x2b, 0x6, @link_local={0x1, 0x80, 0xc2}}, 0x80) timer_delete(r2) getsockopt$bt_hci(r1, 0x84, 0x4, &(0x7f0000000080)=""/4096, &(0x7f0000000000)=0x1000) r4 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/net/pfkey\x00', 0x4181c3, 0x0) ioctl$TIOCGSID(r4, 0x5429, &(0x7f0000000140)=0x0) r6 = syz_open_procfs(r5, &(0x7f0000000100)='net/wireless\x00') mkdir(&(0x7f0000578000)='./file0\x00', 0x0) lsetxattr(&(0x7f0000672000)='./file0\x00', &(0x7f0000000100)=@known='system.posix_acl_access\x00', &(0x7f0000000140)="02000000020000000000e90005070000001f06a0", 0x14, 0x0) r7 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000001300)='/proc/self/net/pfkey\x00', 0x0, 0x0) ioctl$sock_ipx_SIOCGIFADDR(0xffffffffffffffff, 0x8915, &(0x7f0000000100)={'\x00', {0x4, 0x3f, 0x8, "a86e5e30a7a8", 0x3ff}}) r8 = open(&(0x7f0000000280)='./file0\x00', 0x141046, 0xfffffffffffffffd) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fallocate(r8, 0x0, 0xffff, 0x4) r9 = syz_init_net_socket$bt_l2cap(0x1f, 0x5, 0x0) bind$bt_l2cap(r9, &(0x7f00000000c0)={0x1f}, 0xe) listen(r9, 0x0) ioctl$sock_SIOCINQ(r9, 0x541b, &(0x7f0000000ac0)) open(&(0x7f0000002000)='./bus\x00', 0x101000, 0x0) getsockopt$inet_sctp6_SCTP_ASSOCINFO(r8, 0x84, 0x1, &(0x7f0000000180)={0x0, 0xbfb, 0x0, 0x80000001, 0x3, 0x3f}, &(0x7f00000001c0)=0x12) setsockopt$inet_sctp_SCTP_PRIMARY_ADDR(r7, 0x84, 0x6, &(0x7f0000000640)={r10, @in={{0x2, 0x0, @broadcast=0xffffffff}}}, 0x84) socket$inet6_sctp(0xa, 0x1, 0x84) ioctl$SNDRV_TIMER_IOCTL_START(r6, 0x54a0) 2018/04/13 21:34:16 executing program 2: bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000040)={0xffffffffffffffff, &(0x7f00000000c0)="b82283392dc50ff1fb635a5849d2f5916ae2fdc24e95e12aa8daccf7393e72be9cc66f"}, 0x10) socket$inet_tcp(0x2, 0x1, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000346fd4)={0x0, 0x0, 0x0, 0x1000000000000004, 0x202}, 0x2c) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x1, 0x5, &(0x7f0000346fc8)=@framed={{0x18}, [@alu={0x8000000201a7f19, 0x0, 0x7, 0x0, 0x1}], {0x95}}, &(0x7f0000f6bffb)='GPL\x00', 0x0, 0x299, &(0x7f00001a7f05)=""/251}, 0x18) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000140)={r0, 0x50, &(0x7f00000000c0)}, 0x10) socketpair$inet_icmp(0x13, 0x894c, 0xfffffffe, &(0x7f0000000180)) 2018/04/13 21:34:16 executing program 7: syz_mount_image$msdos(&(0x7f0000000000)='msdos\x00', &(0x7f0000000100)='./file0\x00', 0xe800, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="eb3c906d6b66732e66617400100401000200027400f8", 0x16}], 0x0, &(0x7f0000004640)={[{@umask={'umask', 0x3d, [0x34, 0x30, 0x30, 0x32, 0x30, 0x33, 0x34, 0x36, 0x32]}, 0x2c}, {@discard='discard', 0x2c}, {@nocase='nocase', 0x2c}, {@usefree='usefree', 0x2c}, {@fmask={'fmask', 0x3d, [0x32, 0x37, 0x33, 0x32, 0x32]}, 0x2c}, {@allow_utime={'allow_utime', 0x3d, [0x35, 0x36, 0x32, 0x33, 0x30, 0x33, 0x30]}, 0x2c}]}) open$dir(&(0x7f0000000340)='./file0/f.le.\x00', 0x40, 0x0) 2018/04/13 21:34:16 executing program 6: r0 = memfd_create(&(0x7f00000002c0)='ramfs\x00', 0x0) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) fanotify_init(0x30, 0x400) setsockopt$inet_tcp_int(r1, 0x6, 0x80000000000002, &(0x7f0000000280)=0x401, 0xaa3d) bind$inet(r1, &(0x7f0000deb000)={0x2, 0x4e23}, 0x10) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000f40ff8)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r1, &(0x7f0000a88f88), 0x29f, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @loopback=0x7f000001}, 0x10) openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup/syz0\x00', 0x200002, 0x0) openat$dsp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dsp\x00', 0x10000, 0x0) ioctl$ASHMEM_GET_PROT_MASK(r0, 0x7706, &(0x7f0000000580)) write$fuse(r1, &(0x7f0000000180)=ANY=[@ANYBLOB="809e0b0dc85f4d56aa30cc5ff6ae106d3a16270876e73026911116757283b62d08d24327bbb4daf7d3b522f6dc4891d3270a89"], 0x33) getsockopt$inet_sctp6_SCTP_GET_ASSOC_STATS(r0, 0x84, 0x70, &(0x7f0000000440)={0x0, @in6={{0xa, 0x4e23, 0x9, @local={0xfe, 0x80, [], 0xaa}, 0x9}}, [0x8000]}, &(0x7f00000003c0)=0x100) setsockopt$inet_sctp6_SCTP_ASSOCINFO(0xffffffffffffffff, 0x84, 0x1, &(0x7f0000000540), 0x14) sendmmsg(r1, &(0x7f00000025c0)=[{{&(0x7f0000000300)=@pppoe={0x18, 0x0, {0x0, @link_local={0x1, 0x80, 0xc2}, 'ip6tnl0\x00'}}, 0x80, &(0x7f0000000380)=[{&(0x7f00000010c0)="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", 0x3f6}], 0x1}}], 0x1, 0x0) shutdown(r1, 0x1) 2018/04/13 21:34:16 executing program 1: perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x1, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f0000f5ffe0)={@loopback={0x0, 0x1}, 0x0, 0x0, 0x0, 0x1}, 0x20) getsockopt$IP6T_SO_GET_REVISION_TARGET(r0, 0x29, 0x45, &(0x7f0000000100)={'NETMAP\x00'}, &(0x7f0000000140)=0x1e) [ 336.987687] FAT-fs (loop7): mounting with "discard" option, but the device does not support discard [ 337.094345] device bridge_slave_1 left promiscuous mode [ 337.099976] bridge0: port 2(bridge_slave_1) entered disabled state [ 337.140892] device bridge_slave_0 left promiscuous mode [ 337.146586] bridge0: port 1(bridge_slave_0) entered disabled state [ 337.227662] team0 (unregistering): Port device team_slave_1 removed [ 337.240666] team0 (unregistering): Port device team_slave_0 removed [ 337.255090] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 337.383702] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 337.531471] bond0 (unregistering): Released all slaves 2018/04/13 21:34:17 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000040)={'lo\x00', &(0x7f00000000c0)=@ethtool_cmd={0x34}}) 2018/04/13 21:34:17 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x1004000000004) writev(r0, &(0x7f0000000000)=[{&(0x7f0000000040)="580000001400192340a14b80040d8c560a0600000000e076000543d8d8fe5800000024ca7f4f643e8900050028635a000510f5100002000000000000001c04ed5dfffff500002f00100001000a04082214abdd0500000000", 0x58}], 0x1) 2018/04/13 21:34:17 executing program 2: bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000040)={0xffffffffffffffff, &(0x7f00000000c0)="b82283392dc50ff1fb635a5849d2f5916ae2fdc24e95e12aa8daccf7393e72be9cc66f"}, 0x10) socket$inet_tcp(0x2, 0x1, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000346fd4)={0x0, 0x0, 0x0, 0x1000000000000004, 0x202}, 0x2c) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x1, 0x5, &(0x7f0000346fc8)=@framed={{0x18}, [@alu={0x8000000201a7f19, 0x0, 0x7, 0x0, 0x1}], {0x95}}, &(0x7f0000f6bffb)='GPL\x00', 0x0, 0x299, &(0x7f00001a7f05)=""/251}, 0x18) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000140)={r0, 0x50, &(0x7f00000000c0)}, 0x10) socketpair$inet_icmp(0x13, 0x894c, 0xfffffffe, &(0x7f0000000180)) 2018/04/13 21:34:17 executing program 1: perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x1, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f0000f5ffe0)={@loopback={0x0, 0x1}, 0x0, 0x0, 0x0, 0x1}, 0x20) getsockopt$IP6T_SO_GET_REVISION_TARGET(r0, 0x29, 0x45, &(0x7f0000000100)={'NETMAP\x00'}, &(0x7f0000000140)=0x1e) 2018/04/13 21:34:17 executing program 6: syz_mount_image$msdos(&(0x7f0000000000)='msdos\x00', &(0x7f0000000100)='./file0\x00', 0xe800, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="eb3c906d6b66732e66617400100401000200027400f8", 0x16}], 0x0, &(0x7f0000004640)={[{@umask={'umask', 0x3d, [0x34, 0x30, 0x30, 0x32, 0x30, 0x33, 0x34, 0x36, 0x32]}, 0x2c}, {@discard='discard', 0x2c}, {@nocase='nocase', 0x2c}, {@usefree='usefree', 0x2c}, {@fmask={'fmask', 0x3d, [0x32, 0x37, 0x33, 0x32, 0x32]}, 0x2c}, {@allow_utime={'allow_utime', 0x3d, [0x35, 0x36, 0x32, 0x33, 0x30, 0x33, 0x30]}, 0x2c}]}) open$dir(&(0x7f0000000340)='./file0/f.le.\x00', 0x40, 0x0) 2018/04/13 21:34:17 executing program 7: syz_mount_image$msdos(&(0x7f0000000000)='msdos\x00', &(0x7f0000000100)='./file0\x00', 0xe800, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="eb3c906d6b66732e66617400100401000200027400f8", 0x16}], 0x0, &(0x7f0000004640)={[{@umask={'umask', 0x3d, [0x34, 0x30, 0x30, 0x32, 0x30, 0x33, 0x34, 0x36, 0x32]}, 0x2c}, {@discard='discard', 0x2c}, {@nocase='nocase', 0x2c}, {@usefree='usefree', 0x2c}, {@fmask={'fmask', 0x3d, [0x32, 0x37, 0x33, 0x32, 0x32]}, 0x2c}, {@allow_utime={'allow_utime', 0x3d, [0x35, 0x36, 0x32, 0x33, 0x30, 0x33, 0x30]}, 0x2c}]}) open$dir(&(0x7f0000000340)='./file0/f.le.\x00', 0x40, 0x0) 2018/04/13 21:34:17 executing program 4: r0 = inotify_init1(0x0) fcntl$setown(r0, 0x8, 0xffffffffffffffff) r1 = memfd_create(&(0x7f0000002901)='dev ', 0x0) write(r1, &(0x7f0000000380)='\x00', 0x1) sendfile(r1, r1, &(0x7f0000001000), 0xffff) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x2, 0x11, r1, 0x0) fcntl$getownex(r0, 0x10, &(0x7f000045fff8)={0x0, 0x0}) ptrace$setopts(0x4206, r2, 0x0, 0x0) ptrace(0x4207, r2) ptrace$getregset(0x4204, r2, 0x1, &(0x7f00000000c0)={&(0x7f00000013c0)=""/4096, 0x1000}) 2018/04/13 21:34:17 executing program 0: openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) r0 = dup2(0xffffffffffffff9c, 0xffffffffffffff9c) ioctl$KVM_SET_TSC_KHZ(r0, 0xaea2, 0x9800000000000000) clone(0x1000000, &(0x7f00000004c0)="6106e802c4455821b500339bbc33f3982ecbda0b4de8fe940a9d00505b74e485", &(0x7f0000000500), &(0x7f0000fef000), &(0x7f0000000380)="cbc5268168638fea702e6a94348cc6d6c7b84a027d27c42c15cadd2ff7d4345276cae16ba05fa5feca936e104b22a8b564fec21749af3e7e735cd250669261169e5b72f849192a785a87506b03855b06b1bf70d6152d01a8b150491ee7e068ae34d8e38d6932d723ddcdf7c8564bda47f52fa8fd66ded411fc63aff1f7d55432b8b420432b6c32b40d0267ebfb28f31cf3a260e8866a47d42e90f6e52192b8c962c354243b987814fbb0e78ba97e327cfb10af17ab538cc641") perf_event_open(&(0x7f000001d000)={0x5, 0x78, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_bp={&(0x7f0000000000), 0x1}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$nl_xfrm(0xa, 0x5, 0x84) timer_create(0x7, &(0x7f0000000040)={0x0, 0x24, 0x0, @tid=0xffffffffffffffff}, &(0x7f0000001080)=0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffff9c, 0x29, 0x23, &(0x7f0000001100)={{{@in=@dev, @in6=@mcast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast1}, 0x0, @in6=@mcast2}}, &(0x7f0000001200)=0xe8) recvfrom(r1, &(0x7f00000010c0)=""/9, 0x9, 0x140, &(0x7f0000001240)=@ll={0x11, 0x19, r3, 0x1, 0x2b, 0x6, @link_local={0x1, 0x80, 0xc2}}, 0x80) timer_delete(r2) getsockopt$bt_hci(r1, 0x84, 0x4, &(0x7f0000000080)=""/4096, &(0x7f0000000000)=0x1000) r4 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/net/pfkey\x00', 0x4181c3, 0x0) ioctl$TIOCGSID(r4, 0x5429, &(0x7f0000000140)=0x0) r6 = syz_open_procfs(r5, &(0x7f0000000100)='net/wireless\x00') mkdir(&(0x7f0000578000)='./file0\x00', 0x0) lsetxattr(&(0x7f0000672000)='./file0\x00', &(0x7f0000000100)=@known='system.posix_acl_access\x00', &(0x7f0000000140)="02000000020000000000e90005070000001f06a0", 0x14, 0x0) r7 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000001300)='/proc/self/net/pfkey\x00', 0x0, 0x0) ioctl$sock_ipx_SIOCGIFADDR(0xffffffffffffffff, 0x8915, &(0x7f0000000100)={'\x00', {0x4, 0x3f, 0x8, "a86e5e30a7a8", 0x3ff}}) r8 = open(&(0x7f0000000280)='./file0\x00', 0x141046, 0xfffffffffffffffd) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fallocate(r8, 0x0, 0xffff, 0x4) r9 = syz_init_net_socket$bt_l2cap(0x1f, 0x5, 0x0) bind$bt_l2cap(r9, &(0x7f00000000c0)={0x1f}, 0xe) listen(r9, 0x0) ioctl$sock_SIOCINQ(r9, 0x541b, &(0x7f0000000ac0)) open(&(0x7f0000002000)='./bus\x00', 0x101000, 0x0) getsockopt$inet_sctp6_SCTP_ASSOCINFO(r8, 0x84, 0x1, &(0x7f0000000180)={0x0, 0xbfb, 0x0, 0x80000001, 0x3, 0x3f}, &(0x7f00000001c0)=0x12) setsockopt$inet_sctp_SCTP_PRIMARY_ADDR(r7, 0x84, 0x6, &(0x7f0000000640)={r10, @in={{0x2, 0x0, @broadcast=0xffffffff}}}, 0x84) socket$inet6_sctp(0xa, 0x1, 0x84) ioctl$SNDRV_TIMER_IOCTL_START(r6, 0x54a0) 2018/04/13 21:34:17 executing program 3: openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) r0 = dup2(0xffffffffffffff9c, 0xffffffffffffff9c) ioctl$KVM_SET_TSC_KHZ(r0, 0xaea2, 0x9800000000000000) clone(0x1000000, &(0x7f00000004c0)="6106e802c4455821b500339bbc33f3982ecbda0b4de8fe940a9d00505b74e485", &(0x7f0000000500), &(0x7f0000fef000), &(0x7f0000000380)="cbc5268168638fea702e6a94348cc6d6c7b84a027d27c42c15cadd2ff7d4345276cae16ba05fa5feca936e104b22a8b564fec21749af3e7e735cd250669261169e5b72f849192a785a87506b03855b06b1bf70d6152d01a8b150491ee7e068ae34d8e38d6932d723ddcdf7c8564bda47f52fa8fd66ded411fc63aff1f7d55432b8b420432b6c32b40d0267ebfb28f31cf3a260e8866a47d42e90f6e52192b8c962c354243b987814fbb0e78ba97e327cfb10af17ab538cc641") perf_event_open(&(0x7f000001d000)={0x5, 0x78, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_bp={&(0x7f0000000000), 0x1}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$nl_xfrm(0xa, 0x5, 0x84) timer_create(0x7, &(0x7f0000000040)={0x0, 0x24, 0x0, @tid=0xffffffffffffffff}, &(0x7f0000001080)=0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffff9c, 0x29, 0x23, &(0x7f0000001100)={{{@in=@dev, @in6=@mcast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast1}, 0x0, @in6=@mcast2}}, &(0x7f0000001200)=0xe8) recvfrom(r1, &(0x7f00000010c0)=""/9, 0x9, 0x140, &(0x7f0000001240)=@ll={0x11, 0x19, r3, 0x1, 0x2b, 0x6, @link_local={0x1, 0x80, 0xc2}}, 0x80) timer_delete(r2) getsockopt$bt_hci(r1, 0x84, 0x4, &(0x7f0000000080)=""/4096, &(0x7f0000000000)=0x1000) r4 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/net/pfkey\x00', 0x4181c3, 0x0) ioctl$TIOCGSID(r4, 0x5429, &(0x7f0000000140)=0x0) r6 = syz_open_procfs(r5, &(0x7f0000000100)='net/wireless\x00') mkdir(&(0x7f0000578000)='./file0\x00', 0x0) lsetxattr(&(0x7f0000672000)='./file0\x00', &(0x7f0000000100)=@known='system.posix_acl_access\x00', &(0x7f0000000140)="02000000020000000000e90005070000001f06a0", 0x14, 0x0) r7 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000001300)='/proc/self/net/pfkey\x00', 0x0, 0x0) ioctl$sock_ipx_SIOCGIFADDR(0xffffffffffffffff, 0x8915, &(0x7f0000000100)={'\x00', {0x4, 0x3f, 0x8, "a86e5e30a7a8", 0x3ff}}) r8 = open(&(0x7f0000000280)='./file0\x00', 0x141046, 0xfffffffffffffffd) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fallocate(r8, 0x0, 0xffff, 0x4) r9 = syz_init_net_socket$bt_l2cap(0x1f, 0x5, 0x0) bind$bt_l2cap(r9, &(0x7f00000000c0)={0x1f}, 0xe) listen(r9, 0x0) ioctl$sock_SIOCINQ(r9, 0x541b, &(0x7f0000000ac0)) open(&(0x7f0000002000)='./bus\x00', 0x101000, 0x0) getsockopt$inet_sctp6_SCTP_ASSOCINFO(r8, 0x84, 0x1, &(0x7f0000000180)={0x0, 0xbfb, 0x0, 0x80000001, 0x3, 0x3f}, &(0x7f00000001c0)=0x12) setsockopt$inet_sctp_SCTP_PRIMARY_ADDR(r7, 0x84, 0x6, &(0x7f0000000640)={r10, @in={{0x2, 0x0, @broadcast=0xffffffff}}}, 0x84) socket$inet6_sctp(0xa, 0x1, 0x84) ioctl$SNDRV_TIMER_IOCTL_START(r6, 0x54a0) 2018/04/13 21:34:17 executing program 6: syz_mount_image$msdos(&(0x7f0000000000)='msdos\x00', &(0x7f0000000100)='./file0\x00', 0xe800, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="eb3c906d6b66732e66617400100401000200027400f8", 0x16}], 0x0, &(0x7f0000004640)={[{@umask={'umask', 0x3d, [0x34, 0x30, 0x30, 0x32, 0x30, 0x33, 0x34, 0x36, 0x32]}, 0x2c}, {@discard='discard', 0x2c}, {@nocase='nocase', 0x2c}, {@usefree='usefree', 0x2c}, {@fmask={'fmask', 0x3d, [0x32, 0x37, 0x33, 0x32, 0x32]}, 0x2c}, {@allow_utime={'allow_utime', 0x3d, [0x35, 0x36, 0x32, 0x33, 0x30, 0x33, 0x30]}, 0x2c}]}) open$dir(&(0x7f0000000340)='./file0/f.le.\x00', 0x40, 0x0) [ 337.774783] FAT-fs (loop7): mounting with "discard" option, but the device does not support discard 2018/04/13 21:34:17 executing program 5: openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) r0 = dup2(0xffffffffffffff9c, 0xffffffffffffff9c) ioctl$KVM_SET_TSC_KHZ(r0, 0xaea2, 0x9800000000000000) clone(0x1000000, &(0x7f00000004c0)="6106e802c4455821b500339bbc33f3982ecbda0b4de8fe940a9d00505b74e485", &(0x7f0000000500), &(0x7f0000fef000), &(0x7f0000000380)="cbc5268168638fea702e6a94348cc6d6c7b84a027d27c42c15cadd2ff7d4345276cae16ba05fa5feca936e104b22a8b564fec21749af3e7e735cd250669261169e5b72f849192a785a87506b03855b06b1bf70d6152d01a8b150491ee7e068ae34d8e38d6932d723ddcdf7c8564bda47f52fa8fd66ded411fc63aff1f7d55432b8b420432b6c32b40d0267ebfb28f31cf3a260e8866a47d42e90f6e52192b8c962c354243b987814fbb0e78ba97e327cfb10af17ab538cc641") perf_event_open(&(0x7f000001d000)={0x5, 0x78, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_bp={&(0x7f0000000000), 0x1}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$nl_xfrm(0xa, 0x5, 0x84) timer_create(0x7, &(0x7f0000000040)={0x0, 0x24, 0x0, @tid=0xffffffffffffffff}, &(0x7f0000001080)=0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffff9c, 0x29, 0x23, &(0x7f0000001100)={{{@in=@dev, @in6=@mcast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast1}, 0x0, @in6=@mcast2}}, &(0x7f0000001200)=0xe8) recvfrom(r1, &(0x7f00000010c0)=""/9, 0x9, 0x140, &(0x7f0000001240)=@ll={0x11, 0x19, r3, 0x1, 0x2b, 0x6, @link_local={0x1, 0x80, 0xc2}}, 0x80) timer_delete(r2) getsockopt$bt_hci(r1, 0x84, 0x4, &(0x7f0000000080)=""/4096, &(0x7f0000000000)=0x1000) r4 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/net/pfkey\x00', 0x4181c3, 0x0) ioctl$TIOCGSID(r4, 0x5429, &(0x7f0000000140)=0x0) r6 = syz_open_procfs(r5, &(0x7f0000000100)='net/wireless\x00') mkdir(&(0x7f0000578000)='./file0\x00', 0x0) lsetxattr(&(0x7f0000672000)='./file0\x00', &(0x7f0000000100)=@known='system.posix_acl_access\x00', &(0x7f0000000140)="02000000020000000000e90005070000001f06a0", 0x14, 0x0) r7 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000001300)='/proc/self/net/pfkey\x00', 0x0, 0x0) ioctl$sock_ipx_SIOCGIFADDR(0xffffffffffffffff, 0x8915, &(0x7f0000000100)={'\x00', {0x4, 0x3f, 0x8, "a86e5e30a7a8", 0x3ff}}) r8 = open(&(0x7f0000000280)='./file0\x00', 0x141046, 0xfffffffffffffffd) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fallocate(r8, 0x0, 0xffff, 0x4) r9 = syz_init_net_socket$bt_l2cap(0x1f, 0x5, 0x0) bind$bt_l2cap(r9, &(0x7f00000000c0)={0x1f}, 0xe) listen(r9, 0x0) ioctl$sock_SIOCINQ(r9, 0x541b, &(0x7f0000000ac0)) open(&(0x7f0000002000)='./bus\x00', 0x101000, 0x0) getsockopt$inet_sctp6_SCTP_ASSOCINFO(r8, 0x84, 0x1, &(0x7f0000000180)={0x0, 0xbfb, 0x0, 0x80000001, 0x3, 0x3f}, &(0x7f00000001c0)=0x12) setsockopt$inet_sctp_SCTP_PRIMARY_ADDR(r7, 0x84, 0x6, &(0x7f0000000640)={r10, @in={{0x2, 0x0, @broadcast=0xffffffff}}}, 0x84) socket$inet6_sctp(0xa, 0x1, 0x84) ioctl$SNDRV_TIMER_IOCTL_START(r6, 0x54a0) 2018/04/13 21:34:17 executing program 1: perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x1, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f0000f5ffe0)={@loopback={0x0, 0x1}, 0x0, 0x0, 0x0, 0x1}, 0x20) getsockopt$IP6T_SO_GET_REVISION_TARGET(r0, 0x29, 0x45, &(0x7f0000000100)={'NETMAP\x00'}, &(0x7f0000000140)=0x1e) 2018/04/13 21:34:17 executing program 2: bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000040)={0xffffffffffffffff, &(0x7f00000000c0)="b82283392dc50ff1fb635a5849d2f5916ae2fdc24e95e12aa8daccf7393e72be9cc66f"}, 0x10) socket$inet_tcp(0x2, 0x1, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000346fd4)={0x0, 0x0, 0x0, 0x1000000000000004, 0x202}, 0x2c) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x1, 0x5, &(0x7f0000346fc8)=@framed={{0x18}, [@alu={0x8000000201a7f19, 0x0, 0x7, 0x0, 0x1}], {0x95}}, &(0x7f0000f6bffb)='GPL\x00', 0x0, 0x299, &(0x7f00001a7f05)=""/251}, 0x18) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000140)={r0, 0x50, &(0x7f00000000c0)}, 0x10) socketpair$inet_icmp(0x13, 0x894c, 0xfffffffe, &(0x7f0000000180)) 2018/04/13 21:34:17 executing program 7: syz_mount_image$msdos(&(0x7f0000000000)='msdos\x00', &(0x7f0000000100)='./file0\x00', 0xe800, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="eb3c906d6b66732e66617400100401000200027400f8", 0x16}], 0x0, &(0x7f0000004640)={[{@umask={'umask', 0x3d, [0x34, 0x30, 0x30, 0x32, 0x30, 0x33, 0x34, 0x36, 0x32]}, 0x2c}, {@discard='discard', 0x2c}, {@nocase='nocase', 0x2c}, {@usefree='usefree', 0x2c}, {@fmask={'fmask', 0x3d, [0x32, 0x37, 0x33, 0x32, 0x32]}, 0x2c}, {@allow_utime={'allow_utime', 0x3d, [0x35, 0x36, 0x32, 0x33, 0x30, 0x33, 0x30]}, 0x2c}]}) open$dir(&(0x7f0000000340)='./file0/f.le.\x00', 0x40, 0x0) [ 337.987849] FAT-fs (loop7): mounting with "discard" option, but the device does not support discard 2018/04/13 21:34:18 executing program 6: syz_mount_image$msdos(&(0x7f0000000000)='msdos\x00', &(0x7f0000000100)='./file0\x00', 0xe800, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="eb3c906d6b66732e66617400100401000200027400f8", 0x16}], 0x0, &(0x7f0000004640)={[{@umask={'umask', 0x3d, [0x34, 0x30, 0x30, 0x32, 0x30, 0x33, 0x34, 0x36, 0x32]}, 0x2c}, {@discard='discard', 0x2c}, {@nocase='nocase', 0x2c}, {@usefree='usefree', 0x2c}, {@fmask={'fmask', 0x3d, [0x32, 0x37, 0x33, 0x32, 0x32]}, 0x2c}, {@allow_utime={'allow_utime', 0x3d, [0x35, 0x36, 0x32, 0x33, 0x30, 0x33, 0x30]}, 0x2c}]}) open$dir(&(0x7f0000000340)='./file0/f.le.\x00', 0x40, 0x0) 2018/04/13 21:34:18 executing program 4: r0 = inotify_init1(0x0) fcntl$setown(r0, 0x8, 0xffffffffffffffff) r1 = memfd_create(&(0x7f0000002901)='dev ', 0x0) write(r1, &(0x7f0000000380)='\x00', 0x1) sendfile(r1, r1, &(0x7f0000001000), 0xffff) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x2, 0x11, r1, 0x0) fcntl$getownex(r0, 0x10, &(0x7f000045fff8)={0x0, 0x0}) ptrace$setopts(0x4206, r2, 0x0, 0x0) ptrace(0x4207, r2) ptrace$getregset(0x4204, r2, 0x1, &(0x7f00000000c0)={&(0x7f00000013c0)=""/4096, 0x1000}) 2018/04/13 21:34:18 executing program 2: r0 = socket$inet(0x2, 0x2, 0x0) setsockopt$inet_mtu(r0, 0x0, 0xa, &(0x7f0000ff0ffc)=0x8000000000004, 0x4) r1 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r1, 0x107, 0x12, &(0x7f0000ff5ffc)={0x0, 0x3}, 0x4) r2 = socket$packet(0x11, 0x400000002, 0x300) setsockopt$packet_fanout(r2, 0x107, 0x12, &(0x7f0000ff5ffc)={0x0, 0x3}, 0x4) sendto$inet(r0, &(0x7f0000865000), 0xffe4, 0x0, &(0x7f0000fd9ff0)={0x2, 0x4e20, @rand_addr}, 0x10) ppoll(&(0x7f0000000000)=[{r1}], 0x1, &(0x7f00000000c0), &(0x7f0000000100), 0x8) r3 = socket$inet6(0xa, 0x400000000001, 0x0) bind$inet6(r3, &(0x7f0000fa0fe4)={0xa, 0x4e20, 0x0, @loopback={0x0, 0x1}}, 0x1c) sendto$inet6(r3, &(0x7f0000e77fff), 0xfffffffffffffd8a, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback={0x0, 0x1}}, 0x1c) 2018/04/13 21:34:18 executing program 0: openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) r0 = dup2(0xffffffffffffff9c, 0xffffffffffffff9c) ioctl$KVM_SET_TSC_KHZ(r0, 0xaea2, 0x9800000000000000) clone(0x1000000, &(0x7f00000004c0)="6106e802c4455821b500339bbc33f3982ecbda0b4de8fe940a9d00505b74e485", &(0x7f0000000500), &(0x7f0000fef000), &(0x7f0000000380)="cbc5268168638fea702e6a94348cc6d6c7b84a027d27c42c15cadd2ff7d4345276cae16ba05fa5feca936e104b22a8b564fec21749af3e7e735cd250669261169e5b72f849192a785a87506b03855b06b1bf70d6152d01a8b150491ee7e068ae34d8e38d6932d723ddcdf7c8564bda47f52fa8fd66ded411fc63aff1f7d55432b8b420432b6c32b40d0267ebfb28f31cf3a260e8866a47d42e90f6e52192b8c962c354243b987814fbb0e78ba97e327cfb10af17ab538cc641") perf_event_open(&(0x7f000001d000)={0x5, 0x78, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_bp={&(0x7f0000000000), 0x1}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$nl_xfrm(0xa, 0x5, 0x84) timer_create(0x7, &(0x7f0000000040)={0x0, 0x24, 0x0, @tid=0xffffffffffffffff}, &(0x7f0000001080)=0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffff9c, 0x29, 0x23, &(0x7f0000001100)={{{@in=@dev, @in6=@mcast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast1}, 0x0, @in6=@mcast2}}, &(0x7f0000001200)=0xe8) recvfrom(r1, &(0x7f00000010c0)=""/9, 0x9, 0x140, &(0x7f0000001240)=@ll={0x11, 0x19, r3, 0x1, 0x2b, 0x6, @link_local={0x1, 0x80, 0xc2}}, 0x80) timer_delete(r2) getsockopt$bt_hci(r1, 0x84, 0x4, &(0x7f0000000080)=""/4096, &(0x7f0000000000)=0x1000) r4 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/net/pfkey\x00', 0x4181c3, 0x0) ioctl$TIOCGSID(r4, 0x5429, &(0x7f0000000140)=0x0) r6 = syz_open_procfs(r5, &(0x7f0000000100)='net/wireless\x00') mkdir(&(0x7f0000578000)='./file0\x00', 0x0) lsetxattr(&(0x7f0000672000)='./file0\x00', &(0x7f0000000100)=@known='system.posix_acl_access\x00', &(0x7f0000000140)="02000000020000000000e90005070000001f06a0", 0x14, 0x0) r7 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000001300)='/proc/self/net/pfkey\x00', 0x0, 0x0) ioctl$sock_ipx_SIOCGIFADDR(0xffffffffffffffff, 0x8915, &(0x7f0000000100)={'\x00', {0x4, 0x3f, 0x8, "a86e5e30a7a8", 0x3ff}}) r8 = open(&(0x7f0000000280)='./file0\x00', 0x141046, 0xfffffffffffffffd) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fallocate(r8, 0x0, 0xffff, 0x4) r9 = syz_init_net_socket$bt_l2cap(0x1f, 0x5, 0x0) bind$bt_l2cap(r9, &(0x7f00000000c0)={0x1f}, 0xe) listen(r9, 0x0) ioctl$sock_SIOCINQ(r9, 0x541b, &(0x7f0000000ac0)) open(&(0x7f0000002000)='./bus\x00', 0x101000, 0x0) getsockopt$inet_sctp6_SCTP_ASSOCINFO(r8, 0x84, 0x1, &(0x7f0000000180)={0x0, 0xbfb, 0x0, 0x80000001, 0x3, 0x3f}, &(0x7f00000001c0)=0x12) setsockopt$inet_sctp_SCTP_PRIMARY_ADDR(r7, 0x84, 0x6, &(0x7f0000000640)={r10, @in={{0x2, 0x0, @broadcast=0xffffffff}}}, 0x84) socket$inet6_sctp(0xa, 0x1, 0x84) ioctl$SNDRV_TIMER_IOCTL_START(r6, 0x54a0) 2018/04/13 21:34:18 executing program 7: bpf$MAP_CREATE(0x0, &(0x7f0000346fd4)={0x0, 0x0, 0x0, 0x4, 0x21c}, 0xa) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x1, 0x5, &(0x7f0000346fc8)=@framed={{0x18}, [@alu={0x8000000201a7f19, 0x0, 0x7, 0x0, 0x1}], {0x95}}, &(0x7f0000f6bffb)='GPL\x00', 0x0, 0x299, &(0x7f00001a7f05)=""/251}, 0x18) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000040)={0xffffffffffffffff, &(0x7f00000000c0)="b82283392dc50ff1fb635a5849d2f5916ae2fdc24e95e12aa8daccf7393e72be9cc66f"}, 0x10) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000140)={r0, 0x50, &(0x7f00000000c0)}, 0x10) socketpair$inet_icmp(0x100000, 0x705000, 0x3, &(0x7f0000000200)) 2018/04/13 21:34:18 executing program 5: openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) r0 = dup2(0xffffffffffffff9c, 0xffffffffffffff9c) ioctl$KVM_SET_TSC_KHZ(r0, 0xaea2, 0x9800000000000000) clone(0x1000000, &(0x7f00000004c0)="6106e802c4455821b500339bbc33f3982ecbda0b4de8fe940a9d00505b74e485", &(0x7f0000000500), &(0x7f0000fef000), &(0x7f0000000380)="cbc5268168638fea702e6a94348cc6d6c7b84a027d27c42c15cadd2ff7d4345276cae16ba05fa5feca936e104b22a8b564fec21749af3e7e735cd250669261169e5b72f849192a785a87506b03855b06b1bf70d6152d01a8b150491ee7e068ae34d8e38d6932d723ddcdf7c8564bda47f52fa8fd66ded411fc63aff1f7d55432b8b420432b6c32b40d0267ebfb28f31cf3a260e8866a47d42e90f6e52192b8c962c354243b987814fbb0e78ba97e327cfb10af17ab538cc641") perf_event_open(&(0x7f000001d000)={0x5, 0x78, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_bp={&(0x7f0000000000), 0x1}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$nl_xfrm(0xa, 0x5, 0x84) timer_create(0x7, &(0x7f0000000040)={0x0, 0x24, 0x0, @tid=0xffffffffffffffff}, &(0x7f0000001080)=0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffff9c, 0x29, 0x23, &(0x7f0000001100)={{{@in=@dev, @in6=@mcast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast1}, 0x0, @in6=@mcast2}}, &(0x7f0000001200)=0xe8) recvfrom(r1, &(0x7f00000010c0)=""/9, 0x9, 0x140, &(0x7f0000001240)=@ll={0x11, 0x19, r3, 0x1, 0x2b, 0x6, @link_local={0x1, 0x80, 0xc2}}, 0x80) timer_delete(r2) getsockopt$bt_hci(r1, 0x84, 0x4, &(0x7f0000000080)=""/4096, &(0x7f0000000000)=0x1000) r4 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/net/pfkey\x00', 0x4181c3, 0x0) ioctl$TIOCGSID(r4, 0x5429, &(0x7f0000000140)=0x0) r6 = syz_open_procfs(r5, &(0x7f0000000100)='net/wireless\x00') mkdir(&(0x7f0000578000)='./file0\x00', 0x0) lsetxattr(&(0x7f0000672000)='./file0\x00', &(0x7f0000000100)=@known='system.posix_acl_access\x00', &(0x7f0000000140)="02000000020000000000e90005070000001f06a0", 0x14, 0x0) r7 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000001300)='/proc/self/net/pfkey\x00', 0x0, 0x0) ioctl$sock_ipx_SIOCGIFADDR(0xffffffffffffffff, 0x8915, &(0x7f0000000100)={'\x00', {0x4, 0x3f, 0x8, "a86e5e30a7a8", 0x3ff}}) r8 = open(&(0x7f0000000280)='./file0\x00', 0x141046, 0xfffffffffffffffd) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fallocate(r8, 0x0, 0xffff, 0x4) r9 = syz_init_net_socket$bt_l2cap(0x1f, 0x5, 0x0) bind$bt_l2cap(r9, &(0x7f00000000c0)={0x1f}, 0xe) listen(r9, 0x0) ioctl$sock_SIOCINQ(r9, 0x541b, &(0x7f0000000ac0)) open(&(0x7f0000002000)='./bus\x00', 0x101000, 0x0) getsockopt$inet_sctp6_SCTP_ASSOCINFO(r8, 0x84, 0x1, &(0x7f0000000180)={0x0, 0xbfb, 0x0, 0x80000001, 0x3, 0x3f}, &(0x7f00000001c0)=0x12) setsockopt$inet_sctp_SCTP_PRIMARY_ADDR(r7, 0x84, 0x6, &(0x7f0000000640)={r10, @in={{0x2, 0x0, @broadcast=0xffffffff}}}, 0x84) socket$inet6_sctp(0xa, 0x1, 0x84) ioctl$SNDRV_TIMER_IOCTL_START(r6, 0x54a0) 2018/04/13 21:34:18 executing program 3: openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) r0 = dup2(0xffffffffffffff9c, 0xffffffffffffff9c) ioctl$KVM_SET_TSC_KHZ(r0, 0xaea2, 0x9800000000000000) clone(0x1000000, &(0x7f00000004c0)="6106e802c4455821b500339bbc33f3982ecbda0b4de8fe940a9d00505b74e485", &(0x7f0000000500), &(0x7f0000fef000), &(0x7f0000000380)="cbc5268168638fea702e6a94348cc6d6c7b84a027d27c42c15cadd2ff7d4345276cae16ba05fa5feca936e104b22a8b564fec21749af3e7e735cd250669261169e5b72f849192a785a87506b03855b06b1bf70d6152d01a8b150491ee7e068ae34d8e38d6932d723ddcdf7c8564bda47f52fa8fd66ded411fc63aff1f7d55432b8b420432b6c32b40d0267ebfb28f31cf3a260e8866a47d42e90f6e52192b8c962c354243b987814fbb0e78ba97e327cfb10af17ab538cc641") perf_event_open(&(0x7f000001d000)={0x5, 0x78, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_bp={&(0x7f0000000000), 0x1}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$nl_xfrm(0xa, 0x5, 0x84) timer_create(0x7, &(0x7f0000000040)={0x0, 0x24, 0x0, @tid=0xffffffffffffffff}, &(0x7f0000001080)=0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffff9c, 0x29, 0x23, &(0x7f0000001100)={{{@in=@dev, @in6=@mcast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast1}, 0x0, @in6=@mcast2}}, &(0x7f0000001200)=0xe8) recvfrom(r1, &(0x7f00000010c0)=""/9, 0x9, 0x140, &(0x7f0000001240)=@ll={0x11, 0x19, r3, 0x1, 0x2b, 0x6, @link_local={0x1, 0x80, 0xc2}}, 0x80) timer_delete(r2) getsockopt$bt_hci(r1, 0x84, 0x4, &(0x7f0000000080)=""/4096, &(0x7f0000000000)=0x1000) r4 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/net/pfkey\x00', 0x4181c3, 0x0) ioctl$TIOCGSID(r4, 0x5429, &(0x7f0000000140)=0x0) r6 = syz_open_procfs(r5, &(0x7f0000000100)='net/wireless\x00') mkdir(&(0x7f0000578000)='./file0\x00', 0x0) lsetxattr(&(0x7f0000672000)='./file0\x00', &(0x7f0000000100)=@known='system.posix_acl_access\x00', &(0x7f0000000140)="02000000020000000000e90005070000001f06a0", 0x14, 0x0) r7 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000001300)='/proc/self/net/pfkey\x00', 0x0, 0x0) ioctl$sock_ipx_SIOCGIFADDR(0xffffffffffffffff, 0x8915, &(0x7f0000000100)={'\x00', {0x4, 0x3f, 0x8, "a86e5e30a7a8", 0x3ff}}) r8 = open(&(0x7f0000000280)='./file0\x00', 0x141046, 0xfffffffffffffffd) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fallocate(r8, 0x0, 0xffff, 0x4) r9 = syz_init_net_socket$bt_l2cap(0x1f, 0x5, 0x0) bind$bt_l2cap(r9, &(0x7f00000000c0)={0x1f}, 0xe) listen(r9, 0x0) ioctl$sock_SIOCINQ(r9, 0x541b, &(0x7f0000000ac0)) open(&(0x7f0000002000)='./bus\x00', 0x101000, 0x0) getsockopt$inet_sctp6_SCTP_ASSOCINFO(r8, 0x84, 0x1, &(0x7f0000000180)={0x0, 0xbfb, 0x0, 0x80000001, 0x3, 0x3f}, &(0x7f00000001c0)=0x12) setsockopt$inet_sctp_SCTP_PRIMARY_ADDR(r7, 0x84, 0x6, &(0x7f0000000640)={r10, @in={{0x2, 0x0, @broadcast=0xffffffff}}}, 0x84) socket$inet6_sctp(0xa, 0x1, 0x84) ioctl$SNDRV_TIMER_IOCTL_START(r6, 0x54a0) 2018/04/13 21:34:18 executing program 1: add_key$keyring(&(0x7f00000002c0)='keyring\x00', &(0x7f0000000340)={0x73, 0x79, 0x7a}, 0x0, 0x0, 0xfffffffffffffffd) r0 = add_key$keyring(&(0x7f0000000140)='keyring\x00', &(0x7f0000000180)={0x73, 0x79, 0x7a}, 0x0, 0x0, 0xfffffffffffffffb) keyctl$describe(0xb, r0, &(0x7f00000001c0)=""/196, 0xc4) [ 338.764258] IPv4: Oversized IP packet from 127.0.0.1 2018/04/13 21:34:18 executing program 1: add_key$keyring(&(0x7f00000002c0)='keyring\x00', &(0x7f0000000340)={0x73, 0x79, 0x7a}, 0x0, 0x0, 0xfffffffffffffffd) r0 = add_key$keyring(&(0x7f0000000140)='keyring\x00', &(0x7f0000000180)={0x73, 0x79, 0x7a}, 0x0, 0x0, 0xfffffffffffffffb) keyctl$describe(0xb, r0, &(0x7f00000001c0)=""/196, 0xc4) 2018/04/13 21:34:18 executing program 6: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000180)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(blowfish-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="d179f250", 0x4) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000002040)=[{0x0, 0x0, &(0x7f00000009c0)=[{&(0x7f0000000900)='`', 0x1}], 0x1, &(0x7f00000005c0)}, {0x0, 0x0, &(0x7f0000001fc0), 0x0, &(0x7f0000002000)=[@assoc={0x18, 0x117, 0x4}], 0x18}], 0x2, 0x8000) 2018/04/13 21:34:18 executing program 7: bpf$MAP_CREATE(0x0, &(0x7f0000346fd4)={0x0, 0x0, 0x0, 0x4, 0x21c}, 0xa) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x1, 0x5, &(0x7f0000346fc8)=@framed={{0x18}, [@alu={0x8000000201a7f19, 0x0, 0x7, 0x0, 0x1}], {0x95}}, &(0x7f0000f6bffb)='GPL\x00', 0x0, 0x299, &(0x7f00001a7f05)=""/251}, 0x18) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000040)={0xffffffffffffffff, &(0x7f00000000c0)="b82283392dc50ff1fb635a5849d2f5916ae2fdc24e95e12aa8daccf7393e72be9cc66f"}, 0x10) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000140)={r0, 0x50, &(0x7f00000000c0)}, 0x10) socketpair$inet_icmp(0x100000, 0x705000, 0x3, &(0x7f0000000200)) [ 338.844719] IPv4: Oversized IP packet from 127.0.0.1 2018/04/13 21:34:18 executing program 1: add_key$keyring(&(0x7f00000002c0)='keyring\x00', &(0x7f0000000340)={0x73, 0x79, 0x7a}, 0x0, 0x0, 0xfffffffffffffffd) r0 = add_key$keyring(&(0x7f0000000140)='keyring\x00', &(0x7f0000000180)={0x73, 0x79, 0x7a}, 0x0, 0x0, 0xfffffffffffffffb) keyctl$describe(0xb, r0, &(0x7f00000001c0)=""/196, 0xc4) 2018/04/13 21:34:18 executing program 2: r0 = socket$inet(0x2, 0x2, 0x0) setsockopt$inet_mtu(r0, 0x0, 0xa, &(0x7f0000ff0ffc)=0x8000000000004, 0x4) r1 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r1, 0x107, 0x12, &(0x7f0000ff5ffc)={0x0, 0x3}, 0x4) r2 = socket$packet(0x11, 0x400000002, 0x300) setsockopt$packet_fanout(r2, 0x107, 0x12, &(0x7f0000ff5ffc)={0x0, 0x3}, 0x4) sendto$inet(r0, &(0x7f0000865000), 0xffe4, 0x0, &(0x7f0000fd9ff0)={0x2, 0x4e20, @rand_addr}, 0x10) ppoll(&(0x7f0000000000)=[{r1}], 0x1, &(0x7f00000000c0), &(0x7f0000000100), 0x8) r3 = socket$inet6(0xa, 0x400000000001, 0x0) bind$inet6(r3, &(0x7f0000fa0fe4)={0xa, 0x4e20, 0x0, @loopback={0x0, 0x1}}, 0x1c) sendto$inet6(r3, &(0x7f0000e77fff), 0xfffffffffffffd8a, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback={0x0, 0x1}}, 0x1c) 2018/04/13 21:34:18 executing program 5: openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) r0 = dup2(0xffffffffffffff9c, 0xffffffffffffff9c) ioctl$KVM_SET_TSC_KHZ(r0, 0xaea2, 0x9800000000000000) clone(0x1000000, &(0x7f00000004c0)="6106e802c4455821b500339bbc33f3982ecbda0b4de8fe940a9d00505b74e485", &(0x7f0000000500), &(0x7f0000fef000), &(0x7f0000000380)="cbc5268168638fea702e6a94348cc6d6c7b84a027d27c42c15cadd2ff7d4345276cae16ba05fa5feca936e104b22a8b564fec21749af3e7e735cd250669261169e5b72f849192a785a87506b03855b06b1bf70d6152d01a8b150491ee7e068ae34d8e38d6932d723ddcdf7c8564bda47f52fa8fd66ded411fc63aff1f7d55432b8b420432b6c32b40d0267ebfb28f31cf3a260e8866a47d42e90f6e52192b8c962c354243b987814fbb0e78ba97e327cfb10af17ab538cc641") perf_event_open(&(0x7f000001d000)={0x5, 0x78, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_bp={&(0x7f0000000000), 0x1}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$nl_xfrm(0xa, 0x5, 0x84) timer_create(0x7, &(0x7f0000000040)={0x0, 0x24, 0x0, @tid=0xffffffffffffffff}, &(0x7f0000001080)=0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffff9c, 0x29, 0x23, &(0x7f0000001100)={{{@in=@dev, @in6=@mcast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast1}, 0x0, @in6=@mcast2}}, &(0x7f0000001200)=0xe8) recvfrom(r1, &(0x7f00000010c0)=""/9, 0x9, 0x140, &(0x7f0000001240)=@ll={0x11, 0x19, r3, 0x1, 0x2b, 0x6, @link_local={0x1, 0x80, 0xc2}}, 0x80) timer_delete(r2) getsockopt$bt_hci(r1, 0x84, 0x4, &(0x7f0000000080)=""/4096, &(0x7f0000000000)=0x1000) r4 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/net/pfkey\x00', 0x4181c3, 0x0) ioctl$TIOCGSID(r4, 0x5429, &(0x7f0000000140)=0x0) r6 = syz_open_procfs(r5, &(0x7f0000000100)='net/wireless\x00') mkdir(&(0x7f0000578000)='./file0\x00', 0x0) lsetxattr(&(0x7f0000672000)='./file0\x00', &(0x7f0000000100)=@known='system.posix_acl_access\x00', &(0x7f0000000140)="02000000020000000000e90005070000001f06a0", 0x14, 0x0) r7 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000001300)='/proc/self/net/pfkey\x00', 0x0, 0x0) ioctl$sock_ipx_SIOCGIFADDR(0xffffffffffffffff, 0x8915, &(0x7f0000000100)={'\x00', {0x4, 0x3f, 0x8, "a86e5e30a7a8", 0x3ff}}) r8 = open(&(0x7f0000000280)='./file0\x00', 0x141046, 0xfffffffffffffffd) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fallocate(r8, 0x0, 0xffff, 0x4) r9 = syz_init_net_socket$bt_l2cap(0x1f, 0x5, 0x0) bind$bt_l2cap(r9, &(0x7f00000000c0)={0x1f}, 0xe) listen(r9, 0x0) ioctl$sock_SIOCINQ(r9, 0x541b, &(0x7f0000000ac0)) open(&(0x7f0000002000)='./bus\x00', 0x101000, 0x0) getsockopt$inet_sctp6_SCTP_ASSOCINFO(r8, 0x84, 0x1, &(0x7f0000000180)={0x0, 0xbfb, 0x0, 0x80000001, 0x3, 0x3f}, &(0x7f00000001c0)=0x12) setsockopt$inet_sctp_SCTP_PRIMARY_ADDR(r7, 0x84, 0x6, &(0x7f0000000640)={r10, @in={{0x2, 0x0, @broadcast=0xffffffff}}}, 0x84) socket$inet6_sctp(0xa, 0x1, 0x84) ioctl$SNDRV_TIMER_IOCTL_START(r6, 0x54a0) 2018/04/13 21:34:18 executing program 7: bpf$MAP_CREATE(0x0, &(0x7f0000346fd4)={0x0, 0x0, 0x0, 0x4, 0x21c}, 0xa) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x1, 0x5, &(0x7f0000346fc8)=@framed={{0x18}, [@alu={0x8000000201a7f19, 0x0, 0x7, 0x0, 0x1}], {0x95}}, &(0x7f0000f6bffb)='GPL\x00', 0x0, 0x299, &(0x7f00001a7f05)=""/251}, 0x18) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000040)={0xffffffffffffffff, &(0x7f00000000c0)="b82283392dc50ff1fb635a5849d2f5916ae2fdc24e95e12aa8daccf7393e72be9cc66f"}, 0x10) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000140)={r0, 0x50, &(0x7f00000000c0)}, 0x10) socketpair$inet_icmp(0x100000, 0x705000, 0x3, &(0x7f0000000200)) 2018/04/13 21:34:18 executing program 3: openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) r0 = dup2(0xffffffffffffff9c, 0xffffffffffffff9c) ioctl$KVM_SET_TSC_KHZ(r0, 0xaea2, 0x9800000000000000) clone(0x1000000, &(0x7f00000004c0)="6106e802c4455821b500339bbc33f3982ecbda0b4de8fe940a9d00505b74e485", &(0x7f0000000500), &(0x7f0000fef000), &(0x7f0000000380)="cbc5268168638fea702e6a94348cc6d6c7b84a027d27c42c15cadd2ff7d4345276cae16ba05fa5feca936e104b22a8b564fec21749af3e7e735cd250669261169e5b72f849192a785a87506b03855b06b1bf70d6152d01a8b150491ee7e068ae34d8e38d6932d723ddcdf7c8564bda47f52fa8fd66ded411fc63aff1f7d55432b8b420432b6c32b40d0267ebfb28f31cf3a260e8866a47d42e90f6e52192b8c962c354243b987814fbb0e78ba97e327cfb10af17ab538cc641") perf_event_open(&(0x7f000001d000)={0x5, 0x78, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_bp={&(0x7f0000000000), 0x1}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$nl_xfrm(0xa, 0x5, 0x84) timer_create(0x7, &(0x7f0000000040)={0x0, 0x24, 0x0, @tid=0xffffffffffffffff}, &(0x7f0000001080)=0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffff9c, 0x29, 0x23, &(0x7f0000001100)={{{@in=@dev, @in6=@mcast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast1}, 0x0, @in6=@mcast2}}, &(0x7f0000001200)=0xe8) recvfrom(r1, &(0x7f00000010c0)=""/9, 0x9, 0x140, &(0x7f0000001240)=@ll={0x11, 0x19, r3, 0x1, 0x2b, 0x6, @link_local={0x1, 0x80, 0xc2}}, 0x80) timer_delete(r2) getsockopt$bt_hci(r1, 0x84, 0x4, &(0x7f0000000080)=""/4096, &(0x7f0000000000)=0x1000) r4 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/net/pfkey\x00', 0x4181c3, 0x0) ioctl$TIOCGSID(r4, 0x5429, &(0x7f0000000140)=0x0) r6 = syz_open_procfs(r5, &(0x7f0000000100)='net/wireless\x00') mkdir(&(0x7f0000578000)='./file0\x00', 0x0) lsetxattr(&(0x7f0000672000)='./file0\x00', &(0x7f0000000100)=@known='system.posix_acl_access\x00', &(0x7f0000000140)="02000000020000000000e90005070000001f06a0", 0x14, 0x0) r7 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000001300)='/proc/self/net/pfkey\x00', 0x0, 0x0) ioctl$sock_ipx_SIOCGIFADDR(0xffffffffffffffff, 0x8915, &(0x7f0000000100)={'\x00', {0x4, 0x3f, 0x8, "a86e5e30a7a8", 0x3ff}}) r8 = open(&(0x7f0000000280)='./file0\x00', 0x141046, 0xfffffffffffffffd) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fallocate(r8, 0x0, 0xffff, 0x4) r9 = syz_init_net_socket$bt_l2cap(0x1f, 0x5, 0x0) bind$bt_l2cap(r9, &(0x7f00000000c0)={0x1f}, 0xe) listen(r9, 0x0) ioctl$sock_SIOCINQ(r9, 0x541b, &(0x7f0000000ac0)) open(&(0x7f0000002000)='./bus\x00', 0x101000, 0x0) getsockopt$inet_sctp6_SCTP_ASSOCINFO(r8, 0x84, 0x1, &(0x7f0000000180)={0x0, 0xbfb, 0x0, 0x80000001, 0x3, 0x3f}, &(0x7f00000001c0)=0x12) setsockopt$inet_sctp_SCTP_PRIMARY_ADDR(r7, 0x84, 0x6, &(0x7f0000000640)={r10, @in={{0x2, 0x0, @broadcast=0xffffffff}}}, 0x84) socket$inet6_sctp(0xa, 0x1, 0x84) ioctl$SNDRV_TIMER_IOCTL_START(r6, 0x54a0) 2018/04/13 21:34:18 executing program 0: openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) r0 = dup2(0xffffffffffffff9c, 0xffffffffffffff9c) ioctl$KVM_SET_TSC_KHZ(r0, 0xaea2, 0x9800000000000000) clone(0x1000000, &(0x7f00000004c0)="6106e802c4455821b500339bbc33f3982ecbda0b4de8fe940a9d00505b74e485", &(0x7f0000000500), &(0x7f0000fef000), &(0x7f0000000380)="cbc5268168638fea702e6a94348cc6d6c7b84a027d27c42c15cadd2ff7d4345276cae16ba05fa5feca936e104b22a8b564fec21749af3e7e735cd250669261169e5b72f849192a785a87506b03855b06b1bf70d6152d01a8b150491ee7e068ae34d8e38d6932d723ddcdf7c8564bda47f52fa8fd66ded411fc63aff1f7d55432b8b420432b6c32b40d0267ebfb28f31cf3a260e8866a47d42e90f6e52192b8c962c354243b987814fbb0e78ba97e327cfb10af17ab538cc641") perf_event_open(&(0x7f000001d000)={0x5, 0x78, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_bp={&(0x7f0000000000), 0x1}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$nl_xfrm(0xa, 0x5, 0x84) timer_create(0x7, &(0x7f0000000040)={0x0, 0x24, 0x0, @tid=0xffffffffffffffff}, &(0x7f0000001080)=0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffff9c, 0x29, 0x23, &(0x7f0000001100)={{{@in=@dev, @in6=@mcast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast1}, 0x0, @in6=@mcast2}}, &(0x7f0000001200)=0xe8) recvfrom(r1, &(0x7f00000010c0)=""/9, 0x9, 0x140, &(0x7f0000001240)=@ll={0x11, 0x19, r3, 0x1, 0x2b, 0x6, @link_local={0x1, 0x80, 0xc2}}, 0x80) timer_delete(r2) getsockopt$bt_hci(r1, 0x84, 0x4, &(0x7f0000000080)=""/4096, &(0x7f0000000000)=0x1000) r4 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/net/pfkey\x00', 0x4181c3, 0x0) ioctl$TIOCGSID(r4, 0x5429, &(0x7f0000000140)=0x0) r6 = syz_open_procfs(r5, &(0x7f0000000100)='net/wireless\x00') mkdir(&(0x7f0000578000)='./file0\x00', 0x0) lsetxattr(&(0x7f0000672000)='./file0\x00', &(0x7f0000000100)=@known='system.posix_acl_access\x00', &(0x7f0000000140)="02000000020000000000e90005070000001f06a0", 0x14, 0x0) r7 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000001300)='/proc/self/net/pfkey\x00', 0x0, 0x0) ioctl$sock_ipx_SIOCGIFADDR(0xffffffffffffffff, 0x8915, &(0x7f0000000100)={'\x00', {0x4, 0x3f, 0x8, "a86e5e30a7a8", 0x3ff}}) r8 = open(&(0x7f0000000280)='./file0\x00', 0x141046, 0xfffffffffffffffd) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fallocate(r8, 0x0, 0xffff, 0x4) r9 = syz_init_net_socket$bt_l2cap(0x1f, 0x5, 0x0) bind$bt_l2cap(r9, &(0x7f00000000c0)={0x1f}, 0xe) listen(r9, 0x0) ioctl$sock_SIOCINQ(r9, 0x541b, &(0x7f0000000ac0)) open(&(0x7f0000002000)='./bus\x00', 0x101000, 0x0) getsockopt$inet_sctp6_SCTP_ASSOCINFO(r8, 0x84, 0x1, &(0x7f0000000180)={0x0, 0xbfb, 0x0, 0x80000001, 0x3, 0x3f}, &(0x7f00000001c0)=0x12) setsockopt$inet_sctp_SCTP_PRIMARY_ADDR(r7, 0x84, 0x6, &(0x7f0000000640)={r10, @in={{0x2, 0x0, @broadcast=0xffffffff}}}, 0x84) socket$inet6_sctp(0xa, 0x1, 0x84) ioctl$SNDRV_TIMER_IOCTL_START(r6, 0x54a0) [ 339.066402] IPv4: Oversized IP packet from 127.0.0.1 2018/04/13 21:34:19 executing program 1: add_key$keyring(&(0x7f00000002c0)='keyring\x00', &(0x7f0000000340)={0x73, 0x79, 0x7a}, 0x0, 0x0, 0xfffffffffffffffd) r0 = add_key$keyring(&(0x7f0000000140)='keyring\x00', &(0x7f0000000180)={0x73, 0x79, 0x7a}, 0x0, 0x0, 0xfffffffffffffffb) keyctl$describe(0xb, r0, &(0x7f00000001c0)=""/196, 0xc4) 2018/04/13 21:34:19 executing program 6: r0 = memfd_create(&(0x7f0000002901)='dev ', 0x0) ftruncate(r0, 0x1b0c) write(r0, &(0x7f00007fbffd)='H', 0x1) sendfile(r0, r0, &(0x7f00000011c0), 0x4000fed) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x4, 0x200000011, r0, 0x0) mount(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='mqueue\x00', 0x0, &(0x7f0000000100)) 2018/04/13 21:34:19 executing program 7: bpf$MAP_CREATE(0x0, &(0x7f0000346fd4)={0x0, 0x0, 0x0, 0x4, 0x21c}, 0xa) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x1, 0x5, &(0x7f0000346fc8)=@framed={{0x18}, [@alu={0x8000000201a7f19, 0x0, 0x7, 0x0, 0x1}], {0x95}}, &(0x7f0000f6bffb)='GPL\x00', 0x0, 0x299, &(0x7f00001a7f05)=""/251}, 0x18) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000040)={0xffffffffffffffff, &(0x7f00000000c0)="b82283392dc50ff1fb635a5849d2f5916ae2fdc24e95e12aa8daccf7393e72be9cc66f"}, 0x10) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000140)={r0, 0x50, &(0x7f00000000c0)}, 0x10) socketpair$inet_icmp(0x100000, 0x705000, 0x3, &(0x7f0000000200)) 2018/04/13 21:34:19 executing program 2: r0 = socket$inet(0x2, 0x2, 0x0) setsockopt$inet_mtu(r0, 0x0, 0xa, &(0x7f0000ff0ffc)=0x8000000000004, 0x4) r1 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r1, 0x107, 0x12, &(0x7f0000ff5ffc)={0x0, 0x3}, 0x4) r2 = socket$packet(0x11, 0x400000002, 0x300) setsockopt$packet_fanout(r2, 0x107, 0x12, &(0x7f0000ff5ffc)={0x0, 0x3}, 0x4) sendto$inet(r0, &(0x7f0000865000), 0xffe4, 0x0, &(0x7f0000fd9ff0)={0x2, 0x4e20, @rand_addr}, 0x10) ppoll(&(0x7f0000000000)=[{r1}], 0x1, &(0x7f00000000c0), &(0x7f0000000100), 0x8) r3 = socket$inet6(0xa, 0x400000000001, 0x0) bind$inet6(r3, &(0x7f0000fa0fe4)={0xa, 0x4e20, 0x0, @loopback={0x0, 0x1}}, 0x1c) sendto$inet6(r3, &(0x7f0000e77fff), 0xfffffffffffffd8a, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback={0x0, 0x1}}, 0x1c) 2018/04/13 21:34:19 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x13, &(0x7f0000ffbffc)=0x1, 0x4) setsockopt$inet_tcp_int(r0, 0x6, 0x200000014, &(0x7f0000000000)=0x1, 0x364) setsockopt$inet_tcp_int(r0, 0x6, 0x15, &(0x7f0000ffcffc), 0x4) 2018/04/13 21:34:19 executing program 3: unshare(0x40600) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000380)={0xffffffffffffffff}) sendmmsg$unix(r0, &(0x7f00006a1e08)=[{&(0x7f0000fe5ff6)=@file={0x0, './file0\x00'}, 0xa, &(0x7f0000fe5fe0)}], 0x1, 0x0) 2018/04/13 21:34:19 executing program 4: r0 = inotify_init1(0x0) fcntl$setown(r0, 0x8, 0xffffffffffffffff) r1 = memfd_create(&(0x7f0000002901)='dev ', 0x0) write(r1, &(0x7f0000000380)='\x00', 0x1) sendfile(r1, r1, &(0x7f0000001000), 0xffff) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x2, 0x11, r1, 0x0) fcntl$getownex(r0, 0x10, &(0x7f000045fff8)={0x0, 0x0}) ptrace$setopts(0x4206, r2, 0x0, 0x0) ptrace(0x4207, r2) ptrace$getregset(0x4204, r2, 0x1, &(0x7f00000000c0)={&(0x7f00000013c0)=""/4096, 0x1000}) 2018/04/13 21:34:19 executing program 0: r0 = syz_open_dev$sg(&(0x7f0000402000)='/dev/sg#\x00', 0x0, 0x0) ioctl(r0, 0x2201, &(0x7f0000000440)) [ 339.753763] IPv4: Oversized IP packet from 127.0.0.1 2018/04/13 21:34:19 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x13, &(0x7f0000ffbffc)=0x1, 0x4) setsockopt$inet_tcp_int(r0, 0x6, 0x200000014, &(0x7f0000000000)=0x1, 0x364) setsockopt$inet_tcp_int(r0, 0x6, 0x15, &(0x7f0000ffcffc), 0x4) 2018/04/13 21:34:19 executing program 3: unshare(0x40600) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000380)={0xffffffffffffffff}) sendmmsg$unix(r0, &(0x7f00006a1e08)=[{&(0x7f0000fe5ff6)=@file={0x0, './file0\x00'}, 0xa, &(0x7f0000fe5fe0)}], 0x1, 0x0) 2018/04/13 21:34:19 executing program 1: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt(r0, 0x3a, 0x1, &(0x7f0000002000), 0xce) 2018/04/13 21:34:19 executing program 0: r0 = syz_open_dev$sg(&(0x7f0000402000)='/dev/sg#\x00', 0x0, 0x0) ioctl(r0, 0x2201, &(0x7f0000000440)) 2018/04/13 21:34:19 executing program 7: mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mount(&(0x7f000000a000)='./file0\x00', &(0x7f000000aff8)='./file0\x00', &(0x7f000000c000)='ramfs\x00', 0x0, &(0x7f000001c000)) 2018/04/13 21:34:19 executing program 7: bpf$MAP_CREATE(0x0, &(0x7f0000346fd4)={0x0, 0x0, 0x0, 0x85, 0xffffffffffffffff}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0x8, 0x5, &(0x7f0000346fc8)=@framed={{0x18}, [@alu={0x8000000201a7f19, 0x0, 0x7, 0x0, 0x1}], {0x95}}, &(0x7f0000f6bffb)='GPL\x00', 0xfffffffffffffffc, 0xfb, &(0x7f00001a7f05)=""/251}, 0x48) 2018/04/13 21:34:20 executing program 1: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt(r0, 0x3a, 0x1, &(0x7f0000002000), 0xce) 2018/04/13 21:34:20 executing program 2: r0 = socket$inet(0x2, 0x2, 0x0) setsockopt$inet_mtu(r0, 0x0, 0xa, &(0x7f0000ff0ffc)=0x8000000000004, 0x4) r1 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r1, 0x107, 0x12, &(0x7f0000ff5ffc)={0x0, 0x3}, 0x4) r2 = socket$packet(0x11, 0x400000002, 0x300) setsockopt$packet_fanout(r2, 0x107, 0x12, &(0x7f0000ff5ffc)={0x0, 0x3}, 0x4) sendto$inet(r0, &(0x7f0000865000), 0xffe4, 0x0, &(0x7f0000fd9ff0)={0x2, 0x4e20, @rand_addr}, 0x10) ppoll(&(0x7f0000000000)=[{r1}], 0x1, &(0x7f00000000c0), &(0x7f0000000100), 0x8) r3 = socket$inet6(0xa, 0x400000000001, 0x0) bind$inet6(r3, &(0x7f0000fa0fe4)={0xa, 0x4e20, 0x0, @loopback={0x0, 0x1}}, 0x1c) sendto$inet6(r3, &(0x7f0000e77fff), 0xfffffffffffffd8a, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback={0x0, 0x1}}, 0x1c) 2018/04/13 21:34:20 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x13, &(0x7f0000ffbffc)=0x1, 0x4) setsockopt$inet_tcp_int(r0, 0x6, 0x200000014, &(0x7f0000000000)=0x1, 0x364) setsockopt$inet_tcp_int(r0, 0x6, 0x15, &(0x7f0000ffcffc), 0x4) 2018/04/13 21:34:20 executing program 3: unshare(0x40600) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000380)={0xffffffffffffffff}) sendmmsg$unix(r0, &(0x7f00006a1e08)=[{&(0x7f0000fe5ff6)=@file={0x0, './file0\x00'}, 0xa, &(0x7f0000fe5fe0)}], 0x1, 0x0) 2018/04/13 21:34:20 executing program 0: r0 = syz_open_dev$sg(&(0x7f0000402000)='/dev/sg#\x00', 0x0, 0x0) ioctl(r0, 0x2201, &(0x7f0000000440)) 2018/04/13 21:34:20 executing program 7: bpf$MAP_CREATE(0x0, &(0x7f0000346fd4)={0x0, 0x0, 0x0, 0x85, 0xffffffffffffffff}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0x8, 0x5, &(0x7f0000346fc8)=@framed={{0x18}, [@alu={0x8000000201a7f19, 0x0, 0x7, 0x0, 0x1}], {0x95}}, &(0x7f0000f6bffb)='GPL\x00', 0xfffffffffffffffc, 0xfb, &(0x7f00001a7f05)=""/251}, 0x48) 2018/04/13 21:34:20 executing program 6: r0 = memfd_create(&(0x7f0000002901)='dev ', 0x0) ftruncate(r0, 0x1b0c) write(r0, &(0x7f00007fbffd)='H', 0x1) sendfile(r0, r0, &(0x7f00000011c0), 0x4000fed) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x4, 0x200000011, r0, 0x0) mount(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='mqueue\x00', 0x0, &(0x7f0000000100)) 2018/04/13 21:34:20 executing program 4: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000d04000)='clear_refs\x00') writev(r0, &(0x7f0000000040)=[{&(0x7f0000514fff)='3', 0x1}], 0x1) [ 340.750575] IPv4: Oversized IP packet from 127.0.0.1 2018/04/13 21:34:20 executing program 1: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt(r0, 0x3a, 0x1, &(0x7f0000002000), 0xce) 2018/04/13 21:34:20 executing program 0: r0 = syz_open_dev$sg(&(0x7f0000402000)='/dev/sg#\x00', 0x0, 0x0) ioctl(r0, 0x2201, &(0x7f0000000440)) 2018/04/13 21:34:20 executing program 3: unshare(0x40600) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000380)={0xffffffffffffffff}) sendmmsg$unix(r0, &(0x7f00006a1e08)=[{&(0x7f0000fe5ff6)=@file={0x0, './file0\x00'}, 0xa, &(0x7f0000fe5fe0)}], 0x1, 0x0) 2018/04/13 21:34:20 executing program 7: bpf$MAP_CREATE(0x0, &(0x7f0000346fd4)={0x0, 0x0, 0x0, 0x85, 0xffffffffffffffff}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0x8, 0x5, &(0x7f0000346fc8)=@framed={{0x18}, [@alu={0x8000000201a7f19, 0x0, 0x7, 0x0, 0x1}], {0x95}}, &(0x7f0000f6bffb)='GPL\x00', 0xfffffffffffffffc, 0xfb, &(0x7f00001a7f05)=""/251}, 0x48) 2018/04/13 21:34:20 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x13, &(0x7f0000ffbffc)=0x1, 0x4) setsockopt$inet_tcp_int(r0, 0x6, 0x200000014, &(0x7f0000000000)=0x1, 0x364) setsockopt$inet_tcp_int(r0, 0x6, 0x15, &(0x7f0000ffcffc), 0x4) 2018/04/13 21:34:20 executing program 4: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup\x00', 0x200002, 0x0) r1 = openat$cgroup_int(r0, &(0x7f0000000080)='io.weight\x00', 0x2, 0x0) write$cgroup_int(r1, &(0x7f0000000100)={[0x30, 0x3a, 0x35]}, 0x4) 2018/04/13 21:34:20 executing program 1: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt(r0, 0x3a, 0x1, &(0x7f0000002000), 0xce) 2018/04/13 21:34:20 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x9) 2018/04/13 21:34:20 executing program 3: capset(&(0x7f00002d0ff8)={0x20071026}, &(0x7f0000cc0000)) r0 = syz_open_dev$loop(&(0x7f0000000000)='/dev/loop#\x00', 0x0, 0x0) ioctl(r0, 0x40000000401070c9, &(0x7f0000006100)) 2018/04/13 21:34:20 executing program 2: r0 = inotify_init1(0x0) fcntl$setown(r0, 0x8, 0xffffffffffffffff) fcntl$getownex(r0, 0x10, &(0x7f000045fff8)={0x0, 0x0}) ptrace$setopts(0x4206, r1, 0x0, 0x0) ptrace(0x4207, r1) r2 = syz_open_procfs(0x0, &(0x7f0000000040)="2f65786500000000000035abe1e80d903e0d717ac1889a45e581c9e14a5c8f95f5d2968ae8c767e9d18fd69a") mmap(&(0x7f0000000000/0x4000)=nil, 0x4000, 0xd, 0x20011, r2, 0x0) ptrace$setregset(0x4205, r1, 0x202, &(0x7f0000000080)={&(0x7f0000000240)}) 2018/04/13 21:34:21 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x9) 2018/04/13 21:34:21 executing program 7: bpf$MAP_CREATE(0x0, &(0x7f0000346fd4)={0x0, 0x0, 0x0, 0x85, 0xffffffffffffffff}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0x8, 0x5, &(0x7f0000346fc8)=@framed={{0x18}, [@alu={0x8000000201a7f19, 0x0, 0x7, 0x0, 0x1}], {0x95}}, &(0x7f0000f6bffb)='GPL\x00', 0xfffffffffffffffc, 0xfb, &(0x7f00001a7f05)=""/251}, 0x48) 2018/04/13 21:34:21 executing program 4: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup\x00', 0x200002, 0x0) r1 = openat$cgroup_int(r0, &(0x7f0000000080)='io.weight\x00', 0x2, 0x0) write$cgroup_int(r1, &(0x7f0000000100)={[0x30, 0x3a, 0x35]}, 0x4) 2018/04/13 21:34:21 executing program 1: setsockopt$inet6_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, &(0x7f00000001c0)="181e4741f69f55bbc81915cbc9acf178", 0x10) r0 = socket$inet6(0xa, 0x2, 0x0) sendmmsg(r0, &(0x7f0000001d80)=[{{&(0x7f0000000000)=@in6={0xa, 0x1, 0x0, @loopback={0x0, 0x1}}, 0x1c, &(0x7f0000000040), 0x0, &(0x7f0000000000)}}, {{&(0x7f0000000a80)=@in={0x2, 0x0, @rand_addr}, 0x10, &(0x7f0000000040), 0x217, &(0x7f0000000040)=[{0x10}], 0x10}}], 0x2, 0x0) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3e3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bind$inet(0xffffffffffffffff, &(0x7f0000e5b000)={0x2, 0x0, @multicast1=0xe0000001}, 0x10) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40042409, 0x1) r1 = memfd_create(&(0x7f0000001fcd)='wlan0*mime_type-trusted}&wlan0vmnet1.trusted{\\{GPL\x00', 0x0) mmap(&(0x7f0000004000/0x1000)=nil, 0x1000, 0x4, 0x4011, r1, 0x0) mknod$loop(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) getpeername$packet(r1, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @dev}, &(0x7f0000000340)=0x14) setsockopt$inet_mreqn(r1, 0x0, 0x24, &(0x7f0000000380)={@multicast1=0xe0000001, @local={0xac, 0x14, 0x14, 0xaa}, r2}, 0xc) writev(r1, &(0x7f0000007000)=[{&(0x7f0000b23000)="82aaabfc6c5b1c7a6718badabd246d62c80270e00d637af19152d09e59a695e5ecb4b013dea5c5ab0458f38fca8bbf1404fe615f1e536e0f35664718", 0x3c}], 0x1) ioctl$SNDRV_TIMER_IOCTL_STATUS(r1, 0x80605414, &(0x7f0000000040)=""/108) prctl$setendian(0x14, 0x3) ioctl$VT_RESIZE(r1, 0x5609, &(0x7f0000000100)={0x7f, 0x7, 0x660}) symlink(&(0x7f0000004000)='./file0\x00', &(0x7f0000002ff6)='./control\x00') rename(&(0x7f0000000280)='./file0\x00', &(0x7f0000000300)='./control\x00') socket$kcm(0x29, 0x5, 0x0) ioctl$DRM_IOCTL_ADD_CTX(r1, 0xc0086420, &(0x7f00000000c0)) 2018/04/13 21:34:21 executing program 3: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000380)='./cgroup\x00', 0x200002, 0x0) r1 = openat$cgroup_type(r0, &(0x7f00000003c0)='cgroup.type\x00', 0x2, 0x0) write$cgroup_type(r1, &(0x7f0000000400)='threaded\x00', 0x9) 2018/04/13 21:34:21 executing program 2: r0 = inotify_init1(0x0) fcntl$setown(r0, 0x8, 0xffffffffffffffff) fcntl$getownex(r0, 0x10, &(0x7f000045fff8)={0x0, 0x0}) ptrace$setopts(0x4206, r1, 0x0, 0x0) ptrace(0x4207, r1) r2 = syz_open_procfs(0x0, &(0x7f0000000040)="2f65786500000000000035abe1e80d903e0d717ac1889a45e581c9e14a5c8f95f5d2968ae8c767e9d18fd69a") mmap(&(0x7f0000000000/0x4000)=nil, 0x4000, 0xd, 0x20011, r2, 0x0) ptrace$setregset(0x4205, r1, 0x202, &(0x7f0000000080)={&(0x7f0000000240)}) 2018/04/13 21:34:21 executing program 6: r0 = memfd_create(&(0x7f0000002901)='dev ', 0x0) ftruncate(r0, 0x1b0c) write(r0, &(0x7f00007fbffd)='H', 0x1) sendfile(r0, r0, &(0x7f00000011c0), 0x4000fed) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x4, 0x200000011, r0, 0x0) mount(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='mqueue\x00', 0x0, &(0x7f0000000100)) 2018/04/13 21:34:21 executing program 5: r0 = socket$kcm(0x29, 0x5, 0x0) setsockopt$sock_timeval(r0, 0x1, 0x14, &(0x7f00001a6ff0)={0x0, 0x2710}, 0x10) recvmsg(r0, &(0x7f0000fdefc8)={&(0x7f000058e000)=@ll, 0x14, &(0x7f0000f42000), 0x0, &(0x7f0000fde000)=""/30, 0x1e}, 0x0) 2018/04/13 21:34:21 executing program 7: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000384ff7)='/dev/ppp\x00', 0x101002, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f0000b94000)=""/246) ioctl$sock_SIOCGIFBR(0xffffffffffffffff, 0x8940, &(0x7f0000000100)=@generic={0x0, 0x7fffffff}) readv(0xffffffffffffffff, &(0x7f0000000080)=[{&(0x7f0000000140)=""/219, 0xdb}], 0x1) pwritev(r0, &(0x7f0000000040), 0x19d, 0x0) 2018/04/13 21:34:21 executing program 4: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup\x00', 0x200002, 0x0) r1 = openat$cgroup_int(r0, &(0x7f0000000080)='io.weight\x00', 0x2, 0x0) write$cgroup_int(r1, &(0x7f0000000100)={[0x30, 0x3a, 0x35]}, 0x4) 2018/04/13 21:34:21 executing program 2: r0 = inotify_init1(0x0) fcntl$setown(r0, 0x8, 0xffffffffffffffff) fcntl$getownex(r0, 0x10, &(0x7f000045fff8)={0x0, 0x0}) ptrace$setopts(0x4206, r1, 0x0, 0x0) ptrace(0x4207, r1) r2 = syz_open_procfs(0x0, &(0x7f0000000040)="2f65786500000000000035abe1e80d903e0d717ac1889a45e581c9e14a5c8f95f5d2968ae8c767e9d18fd69a") mmap(&(0x7f0000000000/0x4000)=nil, 0x4000, 0xd, 0x20011, r2, 0x0) ptrace$setregset(0x4205, r1, 0x202, &(0x7f0000000080)={&(0x7f0000000240)}) 2018/04/13 21:34:21 executing program 5: r0 = socket$kcm(0x29, 0x5, 0x0) setsockopt$sock_timeval(r0, 0x1, 0x14, &(0x7f00001a6ff0)={0x0, 0x2710}, 0x10) recvmsg(r0, &(0x7f0000fdefc8)={&(0x7f000058e000)=@ll, 0x14, &(0x7f0000f42000), 0x0, &(0x7f0000fde000)=""/30, 0x1e}, 0x0) 2018/04/13 21:34:21 executing program 3: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000380)='./cgroup\x00', 0x200002, 0x0) r1 = openat$cgroup_type(r0, &(0x7f00000003c0)='cgroup.type\x00', 0x2, 0x0) write$cgroup_type(r1, &(0x7f0000000400)='threaded\x00', 0x9) 2018/04/13 21:34:21 executing program 1: setsockopt$inet6_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, &(0x7f00000001c0)="181e4741f69f55bbc81915cbc9acf178", 0x10) r0 = socket$inet6(0xa, 0x2, 0x0) sendmmsg(r0, &(0x7f0000001d80)=[{{&(0x7f0000000000)=@in6={0xa, 0x1, 0x0, @loopback={0x0, 0x1}}, 0x1c, &(0x7f0000000040), 0x0, &(0x7f0000000000)}}, {{&(0x7f0000000a80)=@in={0x2, 0x0, @rand_addr}, 0x10, &(0x7f0000000040), 0x217, &(0x7f0000000040)=[{0x10}], 0x10}}], 0x2, 0x0) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3e3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bind$inet(0xffffffffffffffff, &(0x7f0000e5b000)={0x2, 0x0, @multicast1=0xe0000001}, 0x10) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40042409, 0x1) r1 = memfd_create(&(0x7f0000001fcd)='wlan0*mime_type-trusted}&wlan0vmnet1.trusted{\\{GPL\x00', 0x0) mmap(&(0x7f0000004000/0x1000)=nil, 0x1000, 0x4, 0x4011, r1, 0x0) mknod$loop(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) getpeername$packet(r1, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @dev}, &(0x7f0000000340)=0x14) setsockopt$inet_mreqn(r1, 0x0, 0x24, &(0x7f0000000380)={@multicast1=0xe0000001, @local={0xac, 0x14, 0x14, 0xaa}, r2}, 0xc) writev(r1, &(0x7f0000007000)=[{&(0x7f0000b23000)="82aaabfc6c5b1c7a6718badabd246d62c80270e00d637af19152d09e59a695e5ecb4b013dea5c5ab0458f38fca8bbf1404fe615f1e536e0f35664718", 0x3c}], 0x1) ioctl$SNDRV_TIMER_IOCTL_STATUS(r1, 0x80605414, &(0x7f0000000040)=""/108) prctl$setendian(0x14, 0x3) ioctl$VT_RESIZE(r1, 0x5609, &(0x7f0000000100)={0x7f, 0x7, 0x660}) symlink(&(0x7f0000004000)='./file0\x00', &(0x7f0000002ff6)='./control\x00') rename(&(0x7f0000000280)='./file0\x00', &(0x7f0000000300)='./control\x00') socket$kcm(0x29, 0x5, 0x0) ioctl$DRM_IOCTL_ADD_CTX(r1, 0xc0086420, &(0x7f00000000c0)) 2018/04/13 21:34:21 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x9) 2018/04/13 21:34:21 executing program 3: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000380)='./cgroup\x00', 0x200002, 0x0) r1 = openat$cgroup_type(r0, &(0x7f00000003c0)='cgroup.type\x00', 0x2, 0x0) write$cgroup_type(r1, &(0x7f0000000400)='threaded\x00', 0x9) 2018/04/13 21:34:21 executing program 4: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup\x00', 0x200002, 0x0) r1 = openat$cgroup_int(r0, &(0x7f0000000080)='io.weight\x00', 0x2, 0x0) write$cgroup_int(r1, &(0x7f0000000100)={[0x30, 0x3a, 0x35]}, 0x4) 2018/04/13 21:34:22 executing program 2: r0 = inotify_init1(0x0) fcntl$setown(r0, 0x8, 0xffffffffffffffff) fcntl$getownex(r0, 0x10, &(0x7f000045fff8)={0x0, 0x0}) ptrace$setopts(0x4206, r1, 0x0, 0x0) ptrace(0x4207, r1) r2 = syz_open_procfs(0x0, &(0x7f0000000040)="2f65786500000000000035abe1e80d903e0d717ac1889a45e581c9e14a5c8f95f5d2968ae8c767e9d18fd69a") mmap(&(0x7f0000000000/0x4000)=nil, 0x4000, 0xd, 0x20011, r2, 0x0) ptrace$setregset(0x4205, r1, 0x202, &(0x7f0000000080)={&(0x7f0000000240)}) 2018/04/13 21:34:22 executing program 5: r0 = socket$kcm(0x29, 0x5, 0x0) setsockopt$sock_timeval(r0, 0x1, 0x14, &(0x7f00001a6ff0)={0x0, 0x2710}, 0x10) recvmsg(r0, &(0x7f0000fdefc8)={&(0x7f000058e000)=@ll, 0x14, &(0x7f0000f42000), 0x0, &(0x7f0000fde000)=""/30, 0x1e}, 0x0) 2018/04/13 21:34:22 executing program 7: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000384ff7)='/dev/ppp\x00', 0x101002, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f0000b94000)=""/246) ioctl$sock_SIOCGIFBR(0xffffffffffffffff, 0x8940, &(0x7f0000000100)=@generic={0x0, 0x7fffffff}) readv(0xffffffffffffffff, &(0x7f0000000080)=[{&(0x7f0000000140)=""/219, 0xdb}], 0x1) pwritev(r0, &(0x7f0000000040), 0x19d, 0x0) 2018/04/13 21:34:22 executing program 3: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000380)='./cgroup\x00', 0x200002, 0x0) r1 = openat$cgroup_type(r0, &(0x7f00000003c0)='cgroup.type\x00', 0x2, 0x0) write$cgroup_type(r1, &(0x7f0000000400)='threaded\x00', 0x9) 2018/04/13 21:34:22 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x9) 2018/04/13 21:34:22 executing program 4: setsockopt$inet6_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, &(0x7f00000001c0)="181e4741f69f55bbc81915cbc9acf178", 0x10) r0 = socket$inet6(0xa, 0x2, 0x0) sendmmsg(r0, &(0x7f0000001d80)=[{{&(0x7f0000000000)=@in6={0xa, 0x1, 0x0, @loopback={0x0, 0x1}}, 0x1c, &(0x7f0000000040), 0x0, &(0x7f0000000000)}}, {{&(0x7f0000000a80)=@in={0x2, 0x0, @rand_addr}, 0x10, &(0x7f0000000040), 0x217, &(0x7f0000000040)=[{0x10}], 0x10}}], 0x2, 0x0) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3e3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bind$inet(0xffffffffffffffff, &(0x7f0000e5b000)={0x2, 0x0, @multicast1=0xe0000001}, 0x10) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40042409, 0x1) r1 = memfd_create(&(0x7f0000001fcd)='wlan0*mime_type-trusted}&wlan0vmnet1.trusted{\\{GPL\x00', 0x0) mmap(&(0x7f0000004000/0x1000)=nil, 0x1000, 0x4, 0x4011, r1, 0x0) mknod$loop(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) getpeername$packet(r1, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @dev}, &(0x7f0000000340)=0x14) setsockopt$inet_mreqn(r1, 0x0, 0x24, &(0x7f0000000380)={@multicast1=0xe0000001, @local={0xac, 0x14, 0x14, 0xaa}, r2}, 0xc) writev(r1, &(0x7f0000007000)=[{&(0x7f0000b23000)="82aaabfc6c5b1c7a6718badabd246d62c80270e00d637af19152d09e59a695e5ecb4b013dea5c5ab0458f38fca8bbf1404fe615f1e536e0f35664718", 0x3c}], 0x1) ioctl$SNDRV_TIMER_IOCTL_STATUS(r1, 0x80605414, &(0x7f0000000040)=""/108) prctl$setendian(0x14, 0x3) ioctl$VT_RESIZE(r1, 0x5609, &(0x7f0000000100)={0x7f, 0x7, 0x660}) symlink(&(0x7f0000004000)='./file0\x00', &(0x7f0000002ff6)='./control\x00') rename(&(0x7f0000000280)='./file0\x00', &(0x7f0000000300)='./control\x00') socket$kcm(0x29, 0x5, 0x0) ioctl$DRM_IOCTL_ADD_CTX(r1, 0xc0086420, &(0x7f00000000c0)) 2018/04/13 21:34:22 executing program 6: r0 = memfd_create(&(0x7f0000002901)='dev ', 0x0) ftruncate(r0, 0x1b0c) write(r0, &(0x7f00007fbffd)='H', 0x1) sendfile(r0, r0, &(0x7f00000011c0), 0x4000fed) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x4, 0x200000011, r0, 0x0) mount(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='mqueue\x00', 0x0, &(0x7f0000000100)) 2018/04/13 21:34:22 executing program 1: setsockopt$inet6_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, &(0x7f00000001c0)="181e4741f69f55bbc81915cbc9acf178", 0x10) r0 = socket$inet6(0xa, 0x2, 0x0) sendmmsg(r0, &(0x7f0000001d80)=[{{&(0x7f0000000000)=@in6={0xa, 0x1, 0x0, @loopback={0x0, 0x1}}, 0x1c, &(0x7f0000000040), 0x0, &(0x7f0000000000)}}, {{&(0x7f0000000a80)=@in={0x2, 0x0, @rand_addr}, 0x10, &(0x7f0000000040), 0x217, &(0x7f0000000040)=[{0x10}], 0x10}}], 0x2, 0x0) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3e3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bind$inet(0xffffffffffffffff, &(0x7f0000e5b000)={0x2, 0x0, @multicast1=0xe0000001}, 0x10) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40042409, 0x1) r1 = memfd_create(&(0x7f0000001fcd)='wlan0*mime_type-trusted}&wlan0vmnet1.trusted{\\{GPL\x00', 0x0) mmap(&(0x7f0000004000/0x1000)=nil, 0x1000, 0x4, 0x4011, r1, 0x0) mknod$loop(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) getpeername$packet(r1, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @dev}, &(0x7f0000000340)=0x14) setsockopt$inet_mreqn(r1, 0x0, 0x24, &(0x7f0000000380)={@multicast1=0xe0000001, @local={0xac, 0x14, 0x14, 0xaa}, r2}, 0xc) writev(r1, &(0x7f0000007000)=[{&(0x7f0000b23000)="82aaabfc6c5b1c7a6718badabd246d62c80270e00d637af19152d09e59a695e5ecb4b013dea5c5ab0458f38fca8bbf1404fe615f1e536e0f35664718", 0x3c}], 0x1) ioctl$SNDRV_TIMER_IOCTL_STATUS(r1, 0x80605414, &(0x7f0000000040)=""/108) prctl$setendian(0x14, 0x3) ioctl$VT_RESIZE(r1, 0x5609, &(0x7f0000000100)={0x7f, 0x7, 0x660}) symlink(&(0x7f0000004000)='./file0\x00', &(0x7f0000002ff6)='./control\x00') rename(&(0x7f0000000280)='./file0\x00', &(0x7f0000000300)='./control\x00') socket$kcm(0x29, 0x5, 0x0) ioctl$DRM_IOCTL_ADD_CTX(r1, 0xc0086420, &(0x7f00000000c0)) 2018/04/13 21:34:22 executing program 5: r0 = socket$kcm(0x29, 0x5, 0x0) setsockopt$sock_timeval(r0, 0x1, 0x14, &(0x7f00001a6ff0)={0x0, 0x2710}, 0x10) recvmsg(r0, &(0x7f0000fdefc8)={&(0x7f000058e000)=@ll, 0x14, &(0x7f0000f42000), 0x0, &(0x7f0000fde000)=""/30, 0x1e}, 0x0) 2018/04/13 21:34:22 executing program 3: perf_event_open(&(0x7f0000348f88)={0x2, 0x70, 0x3e6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet_sctp_SCTP_RTOINFO(0xffffffffffffffff, 0x84, 0x0, &(0x7f0000001000)={0x10000, 0x4, 0x100, 0x400}, 0x10) r0 = socket(0x11, 0x4000000000080003, 0x0) setsockopt(r0, 0x107, 0xd, &(0x7f0000001000), 0x47e) sendmmsg(r0, &(0x7f0000003e80)=[{{&(0x7f0000000040)=@in6={0xa, 0x0, 0x3, @mcast1={0xff, 0x1, [], 0x1}}, 0x80, &(0x7f0000000300), 0x0, &(0x7f0000000340)}}], 0x5, 0x0) 2018/04/13 21:34:22 executing program 4: setsockopt$inet6_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, &(0x7f00000001c0)="181e4741f69f55bbc81915cbc9acf178", 0x10) r0 = socket$inet6(0xa, 0x2, 0x0) sendmmsg(r0, &(0x7f0000001d80)=[{{&(0x7f0000000000)=@in6={0xa, 0x1, 0x0, @loopback={0x0, 0x1}}, 0x1c, &(0x7f0000000040), 0x0, &(0x7f0000000000)}}, {{&(0x7f0000000a80)=@in={0x2, 0x0, @rand_addr}, 0x10, &(0x7f0000000040), 0x217, &(0x7f0000000040)=[{0x10}], 0x10}}], 0x2, 0x0) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3e3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bind$inet(0xffffffffffffffff, &(0x7f0000e5b000)={0x2, 0x0, @multicast1=0xe0000001}, 0x10) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40042409, 0x1) r1 = memfd_create(&(0x7f0000001fcd)='wlan0*mime_type-trusted}&wlan0vmnet1.trusted{\\{GPL\x00', 0x0) mmap(&(0x7f0000004000/0x1000)=nil, 0x1000, 0x4, 0x4011, r1, 0x0) mknod$loop(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) getpeername$packet(r1, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @dev}, &(0x7f0000000340)=0x14) setsockopt$inet_mreqn(r1, 0x0, 0x24, &(0x7f0000000380)={@multicast1=0xe0000001, @local={0xac, 0x14, 0x14, 0xaa}, r2}, 0xc) writev(r1, &(0x7f0000007000)=[{&(0x7f0000b23000)="82aaabfc6c5b1c7a6718badabd246d62c80270e00d637af19152d09e59a695e5ecb4b013dea5c5ab0458f38fca8bbf1404fe615f1e536e0f35664718", 0x3c}], 0x1) ioctl$SNDRV_TIMER_IOCTL_STATUS(r1, 0x80605414, &(0x7f0000000040)=""/108) prctl$setendian(0x14, 0x3) ioctl$VT_RESIZE(r1, 0x5609, &(0x7f0000000100)={0x7f, 0x7, 0x660}) symlink(&(0x7f0000004000)='./file0\x00', &(0x7f0000002ff6)='./control\x00') rename(&(0x7f0000000280)='./file0\x00', &(0x7f0000000300)='./control\x00') socket$kcm(0x29, 0x5, 0x0) ioctl$DRM_IOCTL_ADD_CTX(r1, 0xc0086420, &(0x7f00000000c0)) 2018/04/13 21:34:22 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000080)=[{&(0x7f0000999000)="390000001300094700bb61e1c3e4ffff06000600020000004500000020000000190029000d00bf000000280f00050000004bf9a9dd81b50400", 0x39}], 0x1) 2018/04/13 21:34:22 executing program 2: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00009e3ff6)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f00003b9fdc)) r1 = syz_open_pts(r0, 0x1) fcntl$setstatus(r1, 0x4, 0x2800) ioctl$TCXONC(r1, 0x540a, 0x0) write(r1, &(0x7f0000fd6000)='z', 0x1) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000939000)=0x400000019) ioctl$TCXONC(r1, 0x540a, 0x1) 2018/04/13 21:34:22 executing program 1: setsockopt$inet6_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, &(0x7f00000001c0)="181e4741f69f55bbc81915cbc9acf178", 0x10) r0 = socket$inet6(0xa, 0x2, 0x0) sendmmsg(r0, &(0x7f0000001d80)=[{{&(0x7f0000000000)=@in6={0xa, 0x1, 0x0, @loopback={0x0, 0x1}}, 0x1c, &(0x7f0000000040), 0x0, &(0x7f0000000000)}}, {{&(0x7f0000000a80)=@in={0x2, 0x0, @rand_addr}, 0x10, &(0x7f0000000040), 0x217, &(0x7f0000000040)=[{0x10}], 0x10}}], 0x2, 0x0) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3e3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bind$inet(0xffffffffffffffff, &(0x7f0000e5b000)={0x2, 0x0, @multicast1=0xe0000001}, 0x10) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40042409, 0x1) r1 = memfd_create(&(0x7f0000001fcd)='wlan0*mime_type-trusted}&wlan0vmnet1.trusted{\\{GPL\x00', 0x0) mmap(&(0x7f0000004000/0x1000)=nil, 0x1000, 0x4, 0x4011, r1, 0x0) mknod$loop(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) getpeername$packet(r1, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @dev}, &(0x7f0000000340)=0x14) setsockopt$inet_mreqn(r1, 0x0, 0x24, &(0x7f0000000380)={@multicast1=0xe0000001, @local={0xac, 0x14, 0x14, 0xaa}, r2}, 0xc) writev(r1, &(0x7f0000007000)=[{&(0x7f0000b23000)="82aaabfc6c5b1c7a6718badabd246d62c80270e00d637af19152d09e59a695e5ecb4b013dea5c5ab0458f38fca8bbf1404fe615f1e536e0f35664718", 0x3c}], 0x1) ioctl$SNDRV_TIMER_IOCTL_STATUS(r1, 0x80605414, &(0x7f0000000040)=""/108) prctl$setendian(0x14, 0x3) ioctl$VT_RESIZE(r1, 0x5609, &(0x7f0000000100)={0x7f, 0x7, 0x660}) symlink(&(0x7f0000004000)='./file0\x00', &(0x7f0000002ff6)='./control\x00') rename(&(0x7f0000000280)='./file0\x00', &(0x7f0000000300)='./control\x00') socket$kcm(0x29, 0x5, 0x0) ioctl$DRM_IOCTL_ADD_CTX(r1, 0xc0086420, &(0x7f00000000c0)) 2018/04/13 21:34:22 executing program 7: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000384ff7)='/dev/ppp\x00', 0x101002, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f0000b94000)=""/246) ioctl$sock_SIOCGIFBR(0xffffffffffffffff, 0x8940, &(0x7f0000000100)=@generic={0x0, 0x7fffffff}) readv(0xffffffffffffffff, &(0x7f0000000080)=[{&(0x7f0000000140)=""/219, 0xdb}], 0x1) pwritev(r0, &(0x7f0000000040), 0x19d, 0x0) 2018/04/13 21:34:22 executing program 5: r0 = syz_open_dev$sndctrl(&(0x7f000000dfed)='/dev/snd/controlC#\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_LOCK(r0, 0x40405514, &(0x7f000000c000)={0x9, 0x0, 0x0, 0x0, "ddfbe36de3f9b5e3e004bcc0ae4de5d4e831c68b6c2956c2874476ee83e417454f684cab6a71b139644ea97a"}) ioctl$SNDRV_CTL_IOCTL_ELEM_LOCK(r0, 0x40405514, &(0x7f000000f000)={0x9, 0x0, 0x0, 0x0, "2a5a7aa6e53ff258647a2c1a8eea9f6c6d94820ca1091fcd87f112b28bb336f2fc0f56e07866b5874c098814"}) [ 342.813592] netlink: 'syz-executor0': attribute type 41 has an invalid length. 2018/04/13 21:34:22 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000080)=[{&(0x7f0000999000)="390000001300094700bb61e1c3e4ffff06000600020000004500000020000000190029000d00bf000000280f00050000004bf9a9dd81b50400", 0x39}], 0x1) 2018/04/13 21:34:22 executing program 4: setsockopt$inet6_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, &(0x7f00000001c0)="181e4741f69f55bbc81915cbc9acf178", 0x10) r0 = socket$inet6(0xa, 0x2, 0x0) sendmmsg(r0, &(0x7f0000001d80)=[{{&(0x7f0000000000)=@in6={0xa, 0x1, 0x0, @loopback={0x0, 0x1}}, 0x1c, &(0x7f0000000040), 0x0, &(0x7f0000000000)}}, {{&(0x7f0000000a80)=@in={0x2, 0x0, @rand_addr}, 0x10, &(0x7f0000000040), 0x217, &(0x7f0000000040)=[{0x10}], 0x10}}], 0x2, 0x0) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3e3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bind$inet(0xffffffffffffffff, &(0x7f0000e5b000)={0x2, 0x0, @multicast1=0xe0000001}, 0x10) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40042409, 0x1) r1 = memfd_create(&(0x7f0000001fcd)='wlan0*mime_type-trusted}&wlan0vmnet1.trusted{\\{GPL\x00', 0x0) mmap(&(0x7f0000004000/0x1000)=nil, 0x1000, 0x4, 0x4011, r1, 0x0) mknod$loop(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) getpeername$packet(r1, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @dev}, &(0x7f0000000340)=0x14) setsockopt$inet_mreqn(r1, 0x0, 0x24, &(0x7f0000000380)={@multicast1=0xe0000001, @local={0xac, 0x14, 0x14, 0xaa}, r2}, 0xc) writev(r1, &(0x7f0000007000)=[{&(0x7f0000b23000)="82aaabfc6c5b1c7a6718badabd246d62c80270e00d637af19152d09e59a695e5ecb4b013dea5c5ab0458f38fca8bbf1404fe615f1e536e0f35664718", 0x3c}], 0x1) ioctl$SNDRV_TIMER_IOCTL_STATUS(r1, 0x80605414, &(0x7f0000000040)=""/108) prctl$setendian(0x14, 0x3) ioctl$VT_RESIZE(r1, 0x5609, &(0x7f0000000100)={0x7f, 0x7, 0x660}) symlink(&(0x7f0000004000)='./file0\x00', &(0x7f0000002ff6)='./control\x00') rename(&(0x7f0000000280)='./file0\x00', &(0x7f0000000300)='./control\x00') socket$kcm(0x29, 0x5, 0x0) ioctl$DRM_IOCTL_ADD_CTX(r1, 0xc0086420, &(0x7f00000000c0)) 2018/04/13 21:34:22 executing program 7: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000384ff7)='/dev/ppp\x00', 0x101002, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f0000b94000)=""/246) ioctl$sock_SIOCGIFBR(0xffffffffffffffff, 0x8940, &(0x7f0000000100)=@generic={0x0, 0x7fffffff}) readv(0xffffffffffffffff, &(0x7f0000000080)=[{&(0x7f0000000140)=""/219, 0xdb}], 0x1) pwritev(r0, &(0x7f0000000040), 0x19d, 0x0) 2018/04/13 21:34:22 executing program 2: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00009e3ff6)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f00003b9fdc)) r1 = syz_open_pts(r0, 0x1) fcntl$setstatus(r1, 0x4, 0x2800) ioctl$TCXONC(r1, 0x540a, 0x0) write(r1, &(0x7f0000fd6000)='z', 0x1) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000939000)=0x400000019) ioctl$TCXONC(r1, 0x540a, 0x1) 2018/04/13 21:34:22 executing program 5: r0 = syz_open_dev$sndctrl(&(0x7f000000dfed)='/dev/snd/controlC#\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_LOCK(r0, 0x40405514, &(0x7f000000c000)={0x9, 0x0, 0x0, 0x0, "ddfbe36de3f9b5e3e004bcc0ae4de5d4e831c68b6c2956c2874476ee83e417454f684cab6a71b139644ea97a"}) ioctl$SNDRV_CTL_IOCTL_ELEM_LOCK(r0, 0x40405514, &(0x7f000000f000)={0x9, 0x0, 0x0, 0x0, "2a5a7aa6e53ff258647a2c1a8eea9f6c6d94820ca1091fcd87f112b28bb336f2fc0f56e07866b5874c098814"}) [ 343.004138] netlink: 'syz-executor0': attribute type 41 has an invalid length. 2018/04/13 21:34:23 executing program 3: perf_event_open(&(0x7f0000348f88)={0x2, 0x70, 0x3e6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet_sctp_SCTP_RTOINFO(0xffffffffffffffff, 0x84, 0x0, &(0x7f0000001000)={0x10000, 0x4, 0x100, 0x400}, 0x10) r0 = socket(0x11, 0x4000000000080003, 0x0) setsockopt(r0, 0x107, 0xd, &(0x7f0000001000), 0x47e) sendmmsg(r0, &(0x7f0000003e80)=[{{&(0x7f0000000040)=@in6={0xa, 0x0, 0x3, @mcast1={0xff, 0x1, [], 0x1}}, 0x80, &(0x7f0000000300), 0x0, &(0x7f0000000340)}}], 0x5, 0x0) 2018/04/13 21:34:23 executing program 1: mmap$binder(&(0x7f0000001000/0x4000)=nil, 0x4000, 0x2, 0x100000002132, 0xffffffffffffffff, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) mmap(&(0x7f0000000000/0x4000)=nil, 0x4000, 0x0, 0xc812, r0, 0x0) r1 = socket$inet(0x15, 0x5, 0x0) getsockopt$inet_mreqn(r1, 0x114, 0x2715, &(0x7f0000000040)={@remote, @remote}, &(0x7f00000011c0)=0xc) 2018/04/13 21:34:23 executing program 2: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00009e3ff6)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f00003b9fdc)) r1 = syz_open_pts(r0, 0x1) fcntl$setstatus(r1, 0x4, 0x2800) ioctl$TCXONC(r1, 0x540a, 0x0) write(r1, &(0x7f0000fd6000)='z', 0x1) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000939000)=0x400000019) ioctl$TCXONC(r1, 0x540a, 0x1) 2018/04/13 21:34:23 executing program 5: r0 = syz_open_dev$sndctrl(&(0x7f000000dfed)='/dev/snd/controlC#\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_LOCK(r0, 0x40405514, &(0x7f000000c000)={0x9, 0x0, 0x0, 0x0, "ddfbe36de3f9b5e3e004bcc0ae4de5d4e831c68b6c2956c2874476ee83e417454f684cab6a71b139644ea97a"}) ioctl$SNDRV_CTL_IOCTL_ELEM_LOCK(r0, 0x40405514, &(0x7f000000f000)={0x9, 0x0, 0x0, 0x0, "2a5a7aa6e53ff258647a2c1a8eea9f6c6d94820ca1091fcd87f112b28bb336f2fc0f56e07866b5874c098814"}) 2018/04/13 21:34:23 executing program 7: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000219fa8)={0x26, 'hash\x00', 0x0, 0x0, 'sha512-generic\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) close(r0) close(r1) 2018/04/13 21:34:23 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000080)=[{&(0x7f0000999000)="390000001300094700bb61e1c3e4ffff06000600020000004500000020000000190029000d00bf000000280f00050000004bf9a9dd81b50400", 0x39}], 0x1) 2018/04/13 21:34:23 executing program 4: vmsplice(0xffffffffffffffff, &(0x7f0000000000), 0x1000000000000392, 0xffffffffffffffff) 2018/04/13 21:34:23 executing program 6: open(&(0x7f00000000c0)='./file0\x00', 0x0, 0x1) write$cgroup_int(0xffffffffffffffff, &(0x7f0000000100), 0x0) r0 = socket(0x0, 0x7, 0x7f) ftruncate(r0, 0xb0) r1 = syz_open_dev$sg(&(0x7f0000265ff7)='/dev/sg#\x00', 0x0, 0x2) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000080)) write$tun(r1, &(0x7f0000000000)={@pi={0x0, 0x883e}, @void, @llc={@snap={0xaa, 0x1, 'w', "087aeb", 0x6, "818dd3a31d9fd3ae6d7de1a764159abf4ac3ec9ccce30d67a916f6dbbadb0b5db0d3cdc5c13f61e781b008593694d04fe9977245b1f06c7c81b010ae04abe0c945ed2e849044f84a4b97580fbdc6df"}}}, 0x5b) ioctl(r1, 0x6, &(0x7f0000000140)) ioctl(r1, 0x0, &(0x7f00000000c0)) 2018/04/13 21:34:23 executing program 4: vmsplice(0xffffffffffffffff, &(0x7f0000000000), 0x1000000000000392, 0xffffffffffffffff) 2018/04/13 21:34:23 executing program 5: r0 = syz_open_dev$sndctrl(&(0x7f000000dfed)='/dev/snd/controlC#\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_LOCK(r0, 0x40405514, &(0x7f000000c000)={0x9, 0x0, 0x0, 0x0, "ddfbe36de3f9b5e3e004bcc0ae4de5d4e831c68b6c2956c2874476ee83e417454f684cab6a71b139644ea97a"}) ioctl$SNDRV_CTL_IOCTL_ELEM_LOCK(r0, 0x40405514, &(0x7f000000f000)={0x9, 0x0, 0x0, 0x0, "2a5a7aa6e53ff258647a2c1a8eea9f6c6d94820ca1091fcd87f112b28bb336f2fc0f56e07866b5874c098814"}) [ 343.574911] netlink: 'syz-executor0': attribute type 41 has an invalid length. 2018/04/13 21:34:23 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000080)=[{&(0x7f0000999000)="390000001300094700bb61e1c3e4ffff06000600020000004500000020000000190029000d00bf000000280f00050000004bf9a9dd81b50400", 0x39}], 0x1) 2018/04/13 21:34:23 executing program 1: mmap$binder(&(0x7f0000001000/0x4000)=nil, 0x4000, 0x2, 0x100000002132, 0xffffffffffffffff, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) mmap(&(0x7f0000000000/0x4000)=nil, 0x4000, 0x0, 0xc812, r0, 0x0) r1 = socket$inet(0x15, 0x5, 0x0) getsockopt$inet_mreqn(r1, 0x114, 0x2715, &(0x7f0000000040)={@remote, @remote}, &(0x7f00000011c0)=0xc) [ 343.656883] sg_write: data in/out 142016902/43 bytes for SCSI command 0xa9-- guessing data in; [ 343.656883] program syz-executor6 not setting count and/or reply_len properly [ 343.715356] netlink: 'syz-executor0': attribute type 41 has an invalid length. [ 343.744454] program syz-executor6 is using a deprecated SCSI ioctl, please convert it to SG_IO [ 343.757209] sd 0:0:1:0: ioctl_internal_command: ILLEGAL REQUEST asc=0x20 ascq=0x0 2018/04/13 21:34:23 executing program 7: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000219fa8)={0x26, 'hash\x00', 0x0, 0x0, 'sha512-generic\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) close(r0) close(r1) 2018/04/13 21:34:23 executing program 2: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00009e3ff6)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f00003b9fdc)) r1 = syz_open_pts(r0, 0x1) fcntl$setstatus(r1, 0x4, 0x2800) ioctl$TCXONC(r1, 0x540a, 0x0) write(r1, &(0x7f0000fd6000)='z', 0x1) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000939000)=0x400000019) ioctl$TCXONC(r1, 0x540a, 0x1) 2018/04/13 21:34:23 executing program 5: mkdir(&(0x7f0000000140)='./file0\x00', 0x0) syz_mount_image$iso9660(&(0x7f00000000c0)='iso9660\x00', &(0x7f0000000100)='./file0/control\x00', 0x0, 0x0, &(0x7f0000000400), 0x0, &(0x7f0000000480)={[{@uid={'uid', 0x3d, [0x39]}, 0x2c}, {@mode={'mode', 0x3d, [0x0]}, 0x2c}]}) 2018/04/13 21:34:23 executing program 4: vmsplice(0xffffffffffffffff, &(0x7f0000000000), 0x1000000000000392, 0xffffffffffffffff) 2018/04/13 21:34:23 executing program 3: perf_event_open(&(0x7f0000348f88)={0x2, 0x70, 0x3e6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet_sctp_SCTP_RTOINFO(0xffffffffffffffff, 0x84, 0x0, &(0x7f0000001000)={0x10000, 0x4, 0x100, 0x400}, 0x10) r0 = socket(0x11, 0x4000000000080003, 0x0) setsockopt(r0, 0x107, 0xd, &(0x7f0000001000), 0x47e) sendmmsg(r0, &(0x7f0000003e80)=[{{&(0x7f0000000040)=@in6={0xa, 0x0, 0x3, @mcast1={0xff, 0x1, [], 0x1}}, 0x80, &(0x7f0000000300), 0x0, &(0x7f0000000340)}}], 0x5, 0x0) 2018/04/13 21:34:23 executing program 1: mmap$binder(&(0x7f0000001000/0x4000)=nil, 0x4000, 0x2, 0x100000002132, 0xffffffffffffffff, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) mmap(&(0x7f0000000000/0x4000)=nil, 0x4000, 0x0, 0xc812, r0, 0x0) r1 = socket$inet(0x15, 0x5, 0x0) getsockopt$inet_mreqn(r1, 0x114, 0x2715, &(0x7f0000000040)={@remote, @remote}, &(0x7f00000011c0)=0xc) 2018/04/13 21:34:23 executing program 6: open(&(0x7f00000000c0)='./file0\x00', 0x0, 0x1) write$cgroup_int(0xffffffffffffffff, &(0x7f0000000100), 0x0) r0 = socket(0x0, 0x7, 0x7f) ftruncate(r0, 0xb0) r1 = syz_open_dev$sg(&(0x7f0000265ff7)='/dev/sg#\x00', 0x0, 0x2) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000080)) write$tun(r1, &(0x7f0000000000)={@pi={0x0, 0x883e}, @void, @llc={@snap={0xaa, 0x1, 'w', "087aeb", 0x6, "818dd3a31d9fd3ae6d7de1a764159abf4ac3ec9ccce30d67a916f6dbbadb0b5db0d3cdc5c13f61e781b008593694d04fe9977245b1f06c7c81b010ae04abe0c945ed2e849044f84a4b97580fbdc6df"}}}, 0x5b) ioctl(r1, 0x6, &(0x7f0000000140)) ioctl(r1, 0x0, &(0x7f00000000c0)) 2018/04/13 21:34:23 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000023000)={&(0x7f0000024000)={0x10}, 0xc, &(0x7f0000000040)={&(0x7f0000000240)={0x1c, 0x40000080000028, 0xaff, 0x0, 0x0, {0x1}, [@typed={0x8, 0x0, @u32=0x4102}]}, 0x1c}, 0x1}, 0x0) [ 343.800382] sg_write: data in/out 142016902/43 bytes for SCSI command 0xa9-- guessing data in; [ 343.800382] program syz-executor6 not setting count and/or reply_len properly [ 343.818262] program syz-executor6 is using a deprecated SCSI ioctl, please convert it to SG_IO [ 343.827391] sd 0:0:1:0: ioctl_internal_command: ILLEGAL REQUEST asc=0x20 ascq=0x0 2018/04/13 21:34:23 executing program 5: open(&(0x7f00000000c0)='./file0\x00', 0x0, 0x1) write$cgroup_int(0xffffffffffffffff, &(0x7f0000000100), 0x0) r0 = socket(0x0, 0x7, 0x7f) ftruncate(r0, 0xb0) r1 = syz_open_dev$sg(&(0x7f0000265ff7)='/dev/sg#\x00', 0x0, 0x2) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000080)) write$tun(r1, &(0x7f0000000000)={@pi={0x0, 0x883e}, @void, @llc={@snap={0xaa, 0x1, 'w', "087aeb", 0x6, "818dd3a31d9fd3ae6d7de1a764159abf4ac3ec9ccce30d67a916f6dbbadb0b5db0d3cdc5c13f61e781b008593694d04fe9977245b1f06c7c81b010ae04abe0c945ed2e849044f84a4b97580fbdc6df"}}}, 0x5b) ioctl(r1, 0x6, &(0x7f0000000140)) ioctl(r1, 0x0, &(0x7f00000000c0)) 2018/04/13 21:34:23 executing program 1: mmap$binder(&(0x7f0000001000/0x4000)=nil, 0x4000, 0x2, 0x100000002132, 0xffffffffffffffff, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) mmap(&(0x7f0000000000/0x4000)=nil, 0x4000, 0x0, 0xc812, r0, 0x0) r1 = socket$inet(0x15, 0x5, 0x0) getsockopt$inet_mreqn(r1, 0x114, 0x2715, &(0x7f0000000040)={@remote, @remote}, &(0x7f00000011c0)=0xc) 2018/04/13 21:34:23 executing program 7: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000219fa8)={0x26, 'hash\x00', 0x0, 0x0, 'sha512-generic\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) close(r0) close(r1) 2018/04/13 21:34:23 executing program 4: vmsplice(0xffffffffffffffff, &(0x7f0000000000), 0x1000000000000392, 0xffffffffffffffff) 2018/04/13 21:34:23 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(ecb-twofish-3way)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000ff8000)="0a0775b005e381e5b3b60ced5c54dbb7295df0df8217ad4000000000000000e6", 0x20) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000000180)=[{0x0, 0x0, &(0x7f00000001c0)=[{&(0x7f0000002780)="a7", 0x1}], 0x1, &(0x7f0000001700)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmsg(r1, &(0x7f0000001440)={&(0x7f0000000280)=@sco, 0x80, &(0x7f0000000000)=[{&(0x7f00000003c0)=""/4096, 0x1000}], 0x1, &(0x7f0000001400)=""/6, 0x6}, 0x0) 2018/04/13 21:34:23 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000023000)={&(0x7f0000024000)={0x10}, 0xc, &(0x7f0000000040)={&(0x7f0000000240)={0x1c, 0x40000080000028, 0xaff, 0x0, 0x0, {0x1}, [@typed={0x8, 0x0, @u32=0x4102}]}, 0x1c}, 0x1}, 0x0) 2018/04/13 21:34:23 executing program 3: perf_event_open(&(0x7f0000348f88)={0x2, 0x70, 0x3e6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet_sctp_SCTP_RTOINFO(0xffffffffffffffff, 0x84, 0x0, &(0x7f0000001000)={0x10000, 0x4, 0x100, 0x400}, 0x10) r0 = socket(0x11, 0x4000000000080003, 0x0) setsockopt(r0, 0x107, 0xd, &(0x7f0000001000), 0x47e) sendmmsg(r0, &(0x7f0000003e80)=[{{&(0x7f0000000040)=@in6={0xa, 0x0, 0x3, @mcast1={0xff, 0x1, [], 0x1}}, 0x80, &(0x7f0000000300), 0x0, &(0x7f0000000340)}}], 0x5, 0x0) [ 343.930739] sg_write: data in/out 142016902/43 bytes for SCSI command 0xa9-- guessing data in; [ 343.930739] program syz-executor6 not setting count and/or reply_len properly 2018/04/13 21:34:23 executing program 4: perf_event_open(&(0x7f0000348f88)={0x2, 0x70, 0x3e6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = getpgrp(0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, r0, 0x0, 0xffffffffffffffff, 0x0) 2018/04/13 21:34:23 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000023000)={&(0x7f0000024000)={0x10}, 0xc, &(0x7f0000000040)={&(0x7f0000000240)={0x1c, 0x40000080000028, 0xaff, 0x0, 0x0, {0x1}, [@typed={0x8, 0x0, @u32=0x4102}]}, 0x1c}, 0x1}, 0x0) 2018/04/13 21:34:23 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000180)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(camellia)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00001ec000)="0a0775b0d5e383e5b3b60ced5c54dbb7", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000005700)=[{0x0, 0x0, &(0x7f0000000100)=[{&(0x7f00000003c0)="54d467f339978354a463eb8449f3a23141aacb94bb1ae25c26c0c86c8865c39e71c1db1240e9fcbf99b557af1f5cd05920c567b7a780859b79ceca232f5d45cefbab24c76ec4cbe6692366b26a4d11a3", 0x50}], 0x1, &(0x7f00000004c0)}], 0x1, 0x0) recvmsg(r1, &(0x7f000022efc8)={&(0x7f0000bb5ff0)=@ethernet={0x0, @random}, 0x80, &(0x7f0000000000)=[{&(0x7f0000000040)=""/121, 0x79}], 0x1, &(0x7f0000139000)=""/70, 0x46}, 0x0) 2018/04/13 21:34:23 executing program 7: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000219fa8)={0x26, 'hash\x00', 0x0, 0x0, 'sha512-generic\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) close(r0) close(r1) [ 344.036316] program syz-executor6 is using a deprecated SCSI ioctl, please convert it to SG_IO [ 344.049311] sg_write: data in/out 142016902/43 bytes for SCSI command 0xa9-- guessing data in; [ 344.049311] program syz-executor5 not setting count and/or reply_len properly 2018/04/13 21:34:23 executing program 3: r0 = socket$inet6(0xa, 0x40000080806, 0x0) bind$inet6(r0, &(0x7f000047b000)={0xa, 0x4e20}, 0x1c) listen(r0, 0x20000003) r1 = socket$inet6(0xa, 0x6, 0x0) connect$inet6(r1, &(0x7f0000419000)={0xa, 0x4e20, 0x0, @dev={0xfe, 0x80, [], 0xf}, 0x3}, 0x1c) 2018/04/13 21:34:23 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(ecb-twofish-3way)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000ff8000)="0a0775b005e381e5b3b60ced5c54dbb7295df0df8217ad4000000000000000e6", 0x20) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000000180)=[{0x0, 0x0, &(0x7f00000001c0)=[{&(0x7f0000002780)="a7", 0x1}], 0x1, &(0x7f0000001700)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmsg(r1, &(0x7f0000001440)={&(0x7f0000000280)=@sco, 0x80, &(0x7f0000000000)=[{&(0x7f00000003c0)=""/4096, 0x1000}], 0x1, &(0x7f0000001400)=""/6, 0x6}, 0x0) 2018/04/13 21:34:23 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000023000)={&(0x7f0000024000)={0x10}, 0xc, &(0x7f0000000040)={&(0x7f0000000240)={0x1c, 0x40000080000028, 0xaff, 0x0, 0x0, {0x1}, [@typed={0x8, 0x0, @u32=0x4102}]}, 0x1c}, 0x1}, 0x0) [ 344.109990] sd 0:0:1:0: ioctl_internal_command: ILLEGAL REQUEST asc=0x20 ascq=0x0 [ 344.150168] program syz-executor5 is using a deprecated SCSI ioctl, please convert it to SG_IO 2018/04/13 21:34:23 executing program 6: open(&(0x7f00000000c0)='./file0\x00', 0x0, 0x1) write$cgroup_int(0xffffffffffffffff, &(0x7f0000000100), 0x0) r0 = socket(0x0, 0x7, 0x7f) ftruncate(r0, 0xb0) r1 = syz_open_dev$sg(&(0x7f0000265ff7)='/dev/sg#\x00', 0x0, 0x2) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000080)) write$tun(r1, &(0x7f0000000000)={@pi={0x0, 0x883e}, @void, @llc={@snap={0xaa, 0x1, 'w', "087aeb", 0x6, "818dd3a31d9fd3ae6d7de1a764159abf4ac3ec9ccce30d67a916f6dbbadb0b5db0d3cdc5c13f61e781b008593694d04fe9977245b1f06c7c81b010ae04abe0c945ed2e849044f84a4b97580fbdc6df"}}}, 0x5b) ioctl(r1, 0x6, &(0x7f0000000140)) ioctl(r1, 0x0, &(0x7f00000000c0)) 2018/04/13 21:34:23 executing program 7: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r0, 0x107, 0x14, &(0x7f0000000ffc), 0x1c4) [ 344.219267] sd 0:0:1:0: ioctl_internal_command: ILLEGAL REQUEST asc=0x20 ascq=0x0 2018/04/13 21:34:23 executing program 5: open(&(0x7f00000000c0)='./file0\x00', 0x0, 0x1) write$cgroup_int(0xffffffffffffffff, &(0x7f0000000100), 0x0) r0 = socket(0x0, 0x7, 0x7f) ftruncate(r0, 0xb0) r1 = syz_open_dev$sg(&(0x7f0000265ff7)='/dev/sg#\x00', 0x0, 0x2) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000080)) write$tun(r1, &(0x7f0000000000)={@pi={0x0, 0x883e}, @void, @llc={@snap={0xaa, 0x1, 'w', "087aeb", 0x6, "818dd3a31d9fd3ae6d7de1a764159abf4ac3ec9ccce30d67a916f6dbbadb0b5db0d3cdc5c13f61e781b008593694d04fe9977245b1f06c7c81b010ae04abe0c945ed2e849044f84a4b97580fbdc6df"}}}, 0x5b) ioctl(r1, 0x6, &(0x7f0000000140)) ioctl(r1, 0x0, &(0x7f00000000c0)) 2018/04/13 21:34:23 executing program 6: open(&(0x7f00000000c0)='./file0\x00', 0x0, 0x1) write$cgroup_int(0xffffffffffffffff, &(0x7f0000000100), 0x0) r0 = socket(0x0, 0x7, 0x7f) ftruncate(r0, 0xb0) r1 = syz_open_dev$sg(&(0x7f0000265ff7)='/dev/sg#\x00', 0x0, 0x2) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000080)) write$tun(r1, &(0x7f0000000000)={@pi={0x0, 0x883e}, @void, @llc={@snap={0xaa, 0x1, 'w', "087aeb", 0x6, "818dd3a31d9fd3ae6d7de1a764159abf4ac3ec9ccce30d67a916f6dbbadb0b5db0d3cdc5c13f61e781b008593694d04fe9977245b1f06c7c81b010ae04abe0c945ed2e849044f84a4b97580fbdc6df"}}}, 0x5b) ioctl(r1, 0x6, &(0x7f0000000140)) ioctl(r1, 0x0, &(0x7f00000000c0)) 2018/04/13 21:34:23 executing program 7: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r0, 0x107, 0x14, &(0x7f0000000ffc), 0x1c4) 2018/04/13 21:34:23 executing program 4: perf_event_open(&(0x7f0000348f88)={0x2, 0x70, 0x3e6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = getpgrp(0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, r0, 0x0, 0xffffffffffffffff, 0x0) 2018/04/13 21:34:23 executing program 3: r0 = socket$inet6(0xa, 0x40000080806, 0x0) bind$inet6(r0, &(0x7f000047b000)={0xa, 0x4e20}, 0x1c) listen(r0, 0x20000003) r1 = socket$inet6(0xa, 0x6, 0x0) connect$inet6(r1, &(0x7f0000419000)={0xa, 0x4e20, 0x0, @dev={0xfe, 0x80, [], 0xf}, 0x3}, 0x1c) 2018/04/13 21:34:23 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(ecb-twofish-3way)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000ff8000)="0a0775b005e381e5b3b60ced5c54dbb7295df0df8217ad4000000000000000e6", 0x20) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000000180)=[{0x0, 0x0, &(0x7f00000001c0)=[{&(0x7f0000002780)="a7", 0x1}], 0x1, &(0x7f0000001700)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmsg(r1, &(0x7f0000001440)={&(0x7f0000000280)=@sco, 0x80, &(0x7f0000000000)=[{&(0x7f00000003c0)=""/4096, 0x1000}], 0x1, &(0x7f0000001400)=""/6, 0x6}, 0x0) 2018/04/13 21:34:23 executing program 0: r0 = socket$inet6(0xa, 0x802, 0x0) getsockopt$inet_sctp6_SCTP_PR_ASSOC_STATUS(r0, 0x84, 0x73, &(0x7f0000000180)={0x0, 0x677, 0x20, 0xf7633c0000000000, 0x80000000}, &(0x7f00000001c0)=0x18) setsockopt$inet_sctp6_SCTP_DEFAULT_SNDINFO(r0, 0x84, 0x22, &(0x7f0000000200)={0x2, 0x4, 0x9, 0x1, r1}, 0x10) getsockopt$inet_sctp6_SCTP_EVENTS(r0, 0x84, 0xb, &(0x7f0000000240), &(0x7f0000000280)=0xb) ioctl$sock_ifreq(r0, 0x8922, &(0x7f0000000000)={'bond0\x00', @ifru_mtu=0x81}) getsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(r0, 0x84, 0x1f, &(0x7f0000000040)={0x0, @in6={{0xa, 0x4e22, 0x4, @mcast1={0xff, 0x1, [], 0x1}, 0x6}}, 0x6, 0xa93}, &(0x7f0000000100)=0x90) r3 = socket$inet(0x2, 0x6, 0x3) ioctl$DRM_IOCTL_PRIME_FD_TO_HANDLE(0xffffffffffffffff, 0xc00c642e, &(0x7f0000000640)={0x0, 0x80000, 0xffffffffffffffff}) ioctl$DRM_IOCTL_PRIME_FD_TO_HANDLE(r5, 0xc00c642e, &(0x7f0000000680)={r4, 0x80001, r5}) ioctl$DRM_IOCTL_GEM_FLINK(0xffffffffffffffff, 0xc008640a, &(0x7f00000006c0)={0x0, 0x0}) ioctl$DRM_IOCTL_GEM_FLINK(r5, 0xc008640a, &(0x7f0000000700)={r6, r7}) getsockopt$inet_sctp_SCTP_PR_ASSOC_STATUS(r3, 0x84, 0x73, &(0x7f0000000300)={r2, 0x7, 0x10, 0xd6, 0xffffffff00000001}, &(0x7f0000000340)=0x18) bind$inet6(r0, &(0x7f0000000600)={0xa, 0x4e23, 0x401, @dev={0xfe, 0x80, [], 0xb}}, 0x1c) getpeername$inet6(r0, &(0x7f0000000580)={0x0, 0x0, 0x0, @dev}, &(0x7f00000005c0)=0x1c) setsockopt$inet_sctp6_SCTP_AUTH_DELETE_KEY(r0, 0x84, 0x19, &(0x7f0000000140)={r2, 0x81}, 0x8) setsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX(r3, 0x84, 0x6e, &(0x7f0000000380)=[@in={0x2, 0x4e24}, @in6={0xa, 0x4e21, 0x5c, @ipv4={[], [0xff, 0xff], @multicast2=0xe0000002}, 0x1}, @in={0x2, 0x4e21, @multicast2=0xe0000002}], 0x3c) r8 = socket$inet_sctp(0x2, 0x5, 0x84) r9 = accept(r8, &(0x7f00000003c0)=@nfc, &(0x7f0000000440)=0x80) getsockopt$nfc_llcp(r9, 0x118, 0x0, &(0x7f0000000480)=""/153, 0x99) setsockopt$inet_sctp_SCTP_I_WANT_MAPPED_V4_ADDR(r8, 0x84, 0xc, &(0x7f0000000540)=0xfff, 0x4) setsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX_OLD(r8, 0x84, 0x6b, &(0x7f00000002c0)=[@in={0x2, 0x4e22, @loopback=0x7f000001}, @in={0x2, 0x4e24, @loopback=0x7f000001}, @in6={0xa, 0x4e21, 0x4, @remote={0xfe, 0x80, [], 0xbb}, 0x9}], 0x3c) 2018/04/13 21:34:23 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000180)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(camellia)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00001ec000)="0a0775b0d5e383e5b3b60ced5c54dbb7", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000005700)=[{0x0, 0x0, &(0x7f0000000100)=[{&(0x7f00000003c0)="54d467f339978354a463eb8449f3a23141aacb94bb1ae25c26c0c86c8865c39e71c1db1240e9fcbf99b557af1f5cd05920c567b7a780859b79ceca232f5d45cefbab24c76ec4cbe6692366b26a4d11a3", 0x50}], 0x1, &(0x7f00000004c0)}], 0x1, 0x0) recvmsg(r1, &(0x7f000022efc8)={&(0x7f0000bb5ff0)=@ethernet={0x0, @random}, 0x80, &(0x7f0000000000)=[{&(0x7f0000000040)=""/121, 0x79}], 0x1, &(0x7f0000139000)=""/70, 0x46}, 0x0) [ 344.313706] sg_write: data in/out 142016902/43 bytes for SCSI command 0xa9-- guessing data in; [ 344.313706] program syz-executor6 not setting count and/or reply_len properly [ 344.336228] program syz-executor6 is using a deprecated SCSI ioctl, please convert it to SG_IO [ 344.345348] sd 0:0:1:0: ioctl_internal_command: ILLEGAL REQUEST asc=0x20 ascq=0x0 2018/04/13 21:34:24 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(ecb-twofish-3way)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000ff8000)="0a0775b005e381e5b3b60ced5c54dbb7295df0df8217ad4000000000000000e6", 0x20) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000000180)=[{0x0, 0x0, &(0x7f00000001c0)=[{&(0x7f0000002780)="a7", 0x1}], 0x1, &(0x7f0000001700)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmsg(r1, &(0x7f0000001440)={&(0x7f0000000280)=@sco, 0x80, &(0x7f0000000000)=[{&(0x7f00000003c0)=""/4096, 0x1000}], 0x1, &(0x7f0000001400)=""/6, 0x6}, 0x0) 2018/04/13 21:34:24 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000180)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(camellia)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00001ec000)="0a0775b0d5e383e5b3b60ced5c54dbb7", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000005700)=[{0x0, 0x0, &(0x7f0000000100)=[{&(0x7f00000003c0)="54d467f339978354a463eb8449f3a23141aacb94bb1ae25c26c0c86c8865c39e71c1db1240e9fcbf99b557af1f5cd05920c567b7a780859b79ceca232f5d45cefbab24c76ec4cbe6692366b26a4d11a3", 0x50}], 0x1, &(0x7f00000004c0)}], 0x1, 0x0) recvmsg(r1, &(0x7f000022efc8)={&(0x7f0000bb5ff0)=@ethernet={0x0, @random}, 0x80, &(0x7f0000000000)=[{&(0x7f0000000040)=""/121, 0x79}], 0x1, &(0x7f0000139000)=""/70, 0x46}, 0x0) [ 344.434308] sg_write: data in/out 142016902/43 bytes for SCSI command 0xa9-- guessing data in; [ 344.434308] program syz-executor5 not setting count and/or reply_len properly [ 344.471703] sg_write: data in/out 142016902/43 bytes for SCSI command 0xa9-- guessing data in; 2018/04/13 21:34:24 executing program 3: r0 = socket$inet6(0xa, 0x40000080806, 0x0) bind$inet6(r0, &(0x7f000047b000)={0xa, 0x4e20}, 0x1c) listen(r0, 0x20000003) r1 = socket$inet6(0xa, 0x6, 0x0) connect$inet6(r1, &(0x7f0000419000)={0xa, 0x4e20, 0x0, @dev={0xfe, 0x80, [], 0xf}, 0x3}, 0x1c) 2018/04/13 21:34:24 executing program 7: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r0, 0x107, 0x14, &(0x7f0000000ffc), 0x1c4) 2018/04/13 21:34:24 executing program 4: perf_event_open(&(0x7f0000348f88)={0x2, 0x70, 0x3e6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = getpgrp(0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, r0, 0x0, 0xffffffffffffffff, 0x0) [ 344.471703] program syz-executor6 not setting count and/or reply_len properly 2018/04/13 21:34:24 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000180)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(camellia)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00001ec000)="0a0775b0d5e383e5b3b60ced5c54dbb7", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000005700)=[{0x0, 0x0, &(0x7f0000000100)=[{&(0x7f00000003c0)="54d467f339978354a463eb8449f3a23141aacb94bb1ae25c26c0c86c8865c39e71c1db1240e9fcbf99b557af1f5cd05920c567b7a780859b79ceca232f5d45cefbab24c76ec4cbe6692366b26a4d11a3", 0x50}], 0x1, &(0x7f00000004c0)}], 0x1, 0x0) recvmsg(r1, &(0x7f000022efc8)={&(0x7f0000bb5ff0)=@ethernet={0x0, @random}, 0x80, &(0x7f0000000000)=[{&(0x7f0000000040)=""/121, 0x79}], 0x1, &(0x7f0000139000)=""/70, 0x46}, 0x0) 2018/04/13 21:34:24 executing program 2: r0 = socket$inet(0x2, 0x200000000000006, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000180)=@broute={'broute\x00', 0x20, 0x1, 0x1a8, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000880], 0x0, &(0x7f0000000040), &(0x7f0000000880)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe, 0x1, [{{{0x15, 0x0, 0x0, 'nr0\x00', 'teql0\x00', 'bcsf0\x00', 'rose0\x00', @dev={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa]}, [], @link_local={0x1, 0x80, 0xc2}, [], 0x70, 0xe8, 0x118}, [@common=@NFLOG={'NFLOG\x00', 0x50, {{0x0, 0x0, 0x0, 0x0, 0x0, "03df6be3fdcc0abb75180333f0748eae0cc9a7cb11b611f7ef4638cda01580dcd330cf7d8431c3db908d2519e8ab87de08679c6ad47ccd889ee1ad19e3457b00"}}}]}, @common=@AUDIT={'AUDIT\x00', 0x8}}]}, {0x0, '\x00', 0x1, 0xfffffffffffffffe}, {0x0, '\x00', 0x1, 0xfffffffffffffffe}]}, 0x220) [ 344.546681] program syz-executor6 is using a deprecated SCSI ioctl, please convert it to SG_IO [ 344.567307] program syz-executor5 is using a deprecated SCSI ioctl, please convert it to SG_IO [ 344.581935] sd 0:0:1:0: ioctl_internal_command: ILLEGAL REQUEST asc=0x20 ascq=0x0 2018/04/13 21:34:24 executing program 0: r0 = socket$inet6(0xa, 0x802, 0x0) getsockopt$inet_sctp6_SCTP_PR_ASSOC_STATUS(r0, 0x84, 0x73, &(0x7f0000000180)={0x0, 0x677, 0x20, 0xf7633c0000000000, 0x80000000}, &(0x7f00000001c0)=0x18) setsockopt$inet_sctp6_SCTP_DEFAULT_SNDINFO(r0, 0x84, 0x22, &(0x7f0000000200)={0x2, 0x4, 0x9, 0x1, r1}, 0x10) getsockopt$inet_sctp6_SCTP_EVENTS(r0, 0x84, 0xb, &(0x7f0000000240), &(0x7f0000000280)=0xb) ioctl$sock_ifreq(r0, 0x8922, &(0x7f0000000000)={'bond0\x00', @ifru_mtu=0x81}) getsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(r0, 0x84, 0x1f, &(0x7f0000000040)={0x0, @in6={{0xa, 0x4e22, 0x4, @mcast1={0xff, 0x1, [], 0x1}, 0x6}}, 0x6, 0xa93}, &(0x7f0000000100)=0x90) r3 = socket$inet(0x2, 0x6, 0x3) ioctl$DRM_IOCTL_PRIME_FD_TO_HANDLE(0xffffffffffffffff, 0xc00c642e, &(0x7f0000000640)={0x0, 0x80000, 0xffffffffffffffff}) ioctl$DRM_IOCTL_PRIME_FD_TO_HANDLE(r5, 0xc00c642e, &(0x7f0000000680)={r4, 0x80001, r5}) ioctl$DRM_IOCTL_GEM_FLINK(0xffffffffffffffff, 0xc008640a, &(0x7f00000006c0)={0x0, 0x0}) ioctl$DRM_IOCTL_GEM_FLINK(r5, 0xc008640a, &(0x7f0000000700)={r6, r7}) getsockopt$inet_sctp_SCTP_PR_ASSOC_STATUS(r3, 0x84, 0x73, &(0x7f0000000300)={r2, 0x7, 0x10, 0xd6, 0xffffffff00000001}, &(0x7f0000000340)=0x18) bind$inet6(r0, &(0x7f0000000600)={0xa, 0x4e23, 0x401, @dev={0xfe, 0x80, [], 0xb}}, 0x1c) getpeername$inet6(r0, &(0x7f0000000580)={0x0, 0x0, 0x0, @dev}, &(0x7f00000005c0)=0x1c) setsockopt$inet_sctp6_SCTP_AUTH_DELETE_KEY(r0, 0x84, 0x19, &(0x7f0000000140)={r2, 0x81}, 0x8) setsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX(r3, 0x84, 0x6e, &(0x7f0000000380)=[@in={0x2, 0x4e24}, @in6={0xa, 0x4e21, 0x5c, @ipv4={[], [0xff, 0xff], @multicast2=0xe0000002}, 0x1}, @in={0x2, 0x4e21, @multicast2=0xe0000002}], 0x3c) r8 = socket$inet_sctp(0x2, 0x5, 0x84) r9 = accept(r8, &(0x7f00000003c0)=@nfc, &(0x7f0000000440)=0x80) getsockopt$nfc_llcp(r9, 0x118, 0x0, &(0x7f0000000480)=""/153, 0x99) setsockopt$inet_sctp_SCTP_I_WANT_MAPPED_V4_ADDR(r8, 0x84, 0xc, &(0x7f0000000540)=0xfff, 0x4) setsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX_OLD(r8, 0x84, 0x6b, &(0x7f00000002c0)=[@in={0x2, 0x4e22, @loopback=0x7f000001}, @in={0x2, 0x4e24, @loopback=0x7f000001}, @in6={0xa, 0x4e21, 0x4, @remote={0xfe, 0x80, [], 0xbb}, 0x9}], 0x3c) [ 344.624141] sd 0:0:1:0: ioctl_internal_command: ILLEGAL REQUEST asc=0x20 ascq=0x0 2018/04/13 21:34:24 executing program 5: open(&(0x7f00000000c0)='./file0\x00', 0x0, 0x1) write$cgroup_int(0xffffffffffffffff, &(0x7f0000000100), 0x0) r0 = socket(0x0, 0x7, 0x7f) ftruncate(r0, 0xb0) r1 = syz_open_dev$sg(&(0x7f0000265ff7)='/dev/sg#\x00', 0x0, 0x2) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000080)) write$tun(r1, &(0x7f0000000000)={@pi={0x0, 0x883e}, @void, @llc={@snap={0xaa, 0x1, 'w', "087aeb", 0x6, "818dd3a31d9fd3ae6d7de1a764159abf4ac3ec9ccce30d67a916f6dbbadb0b5db0d3cdc5c13f61e781b008593694d04fe9977245b1f06c7c81b010ae04abe0c945ed2e849044f84a4b97580fbdc6df"}}}, 0x5b) ioctl(r1, 0x6, &(0x7f0000000140)) ioctl(r1, 0x0, &(0x7f00000000c0)) 2018/04/13 21:34:24 executing program 1: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x0) bind$bt_l2cap(r0, &(0x7f00000000c0)={0x1f, 0x0, {}, 0x0, 0x2}, 0xe) connect(r0, &(0x7f0000000100)=@sco={0x1f}, 0x80) 2018/04/13 21:34:24 executing program 0: r0 = socket$inet6(0xa, 0x802, 0x0) getsockopt$inet_sctp6_SCTP_PR_ASSOC_STATUS(r0, 0x84, 0x73, &(0x7f0000000180)={0x0, 0x677, 0x20, 0xf7633c0000000000, 0x80000000}, &(0x7f00000001c0)=0x18) setsockopt$inet_sctp6_SCTP_DEFAULT_SNDINFO(r0, 0x84, 0x22, &(0x7f0000000200)={0x2, 0x4, 0x9, 0x1, r1}, 0x10) getsockopt$inet_sctp6_SCTP_EVENTS(r0, 0x84, 0xb, &(0x7f0000000240), &(0x7f0000000280)=0xb) ioctl$sock_ifreq(r0, 0x8922, &(0x7f0000000000)={'bond0\x00', @ifru_mtu=0x81}) getsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(r0, 0x84, 0x1f, &(0x7f0000000040)={0x0, @in6={{0xa, 0x4e22, 0x4, @mcast1={0xff, 0x1, [], 0x1}, 0x6}}, 0x6, 0xa93}, &(0x7f0000000100)=0x90) r3 = socket$inet(0x2, 0x6, 0x3) ioctl$DRM_IOCTL_PRIME_FD_TO_HANDLE(0xffffffffffffffff, 0xc00c642e, &(0x7f0000000640)={0x0, 0x80000, 0xffffffffffffffff}) ioctl$DRM_IOCTL_PRIME_FD_TO_HANDLE(r5, 0xc00c642e, &(0x7f0000000680)={r4, 0x80001, r5}) ioctl$DRM_IOCTL_GEM_FLINK(0xffffffffffffffff, 0xc008640a, &(0x7f00000006c0)={0x0, 0x0}) ioctl$DRM_IOCTL_GEM_FLINK(r5, 0xc008640a, &(0x7f0000000700)={r6, r7}) getsockopt$inet_sctp_SCTP_PR_ASSOC_STATUS(r3, 0x84, 0x73, &(0x7f0000000300)={r2, 0x7, 0x10, 0xd6, 0xffffffff00000001}, &(0x7f0000000340)=0x18) bind$inet6(r0, &(0x7f0000000600)={0xa, 0x4e23, 0x401, @dev={0xfe, 0x80, [], 0xb}}, 0x1c) getpeername$inet6(r0, &(0x7f0000000580)={0x0, 0x0, 0x0, @dev}, &(0x7f00000005c0)=0x1c) setsockopt$inet_sctp6_SCTP_AUTH_DELETE_KEY(r0, 0x84, 0x19, &(0x7f0000000140)={r2, 0x81}, 0x8) setsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX(r3, 0x84, 0x6e, &(0x7f0000000380)=[@in={0x2, 0x4e24}, @in6={0xa, 0x4e21, 0x5c, @ipv4={[], [0xff, 0xff], @multicast2=0xe0000002}, 0x1}, @in={0x2, 0x4e21, @multicast2=0xe0000002}], 0x3c) r8 = socket$inet_sctp(0x2, 0x5, 0x84) r9 = accept(r8, &(0x7f00000003c0)=@nfc, &(0x7f0000000440)=0x80) getsockopt$nfc_llcp(r9, 0x118, 0x0, &(0x7f0000000480)=""/153, 0x99) setsockopt$inet_sctp_SCTP_I_WANT_MAPPED_V4_ADDR(r8, 0x84, 0xc, &(0x7f0000000540)=0xfff, 0x4) setsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX_OLD(r8, 0x84, 0x6b, &(0x7f00000002c0)=[@in={0x2, 0x4e22, @loopback=0x7f000001}, @in={0x2, 0x4e24, @loopback=0x7f000001}, @in6={0xa, 0x4e21, 0x4, @remote={0xfe, 0x80, [], 0xbb}, 0x9}], 0x3c) 2018/04/13 21:34:24 executing program 2: r0 = socket$inet(0x2, 0x200000000000006, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000180)=@broute={'broute\x00', 0x20, 0x1, 0x1a8, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000880], 0x0, &(0x7f0000000040), &(0x7f0000000880)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe, 0x1, [{{{0x15, 0x0, 0x0, 'nr0\x00', 'teql0\x00', 'bcsf0\x00', 'rose0\x00', @dev={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa]}, [], @link_local={0x1, 0x80, 0xc2}, [], 0x70, 0xe8, 0x118}, [@common=@NFLOG={'NFLOG\x00', 0x50, {{0x0, 0x0, 0x0, 0x0, 0x0, "03df6be3fdcc0abb75180333f0748eae0cc9a7cb11b611f7ef4638cda01580dcd330cf7d8431c3db908d2519e8ab87de08679c6ad47ccd889ee1ad19e3457b00"}}}]}, @common=@AUDIT={'AUDIT\x00', 0x8}}]}, {0x0, '\x00', 0x1, 0xfffffffffffffffe}, {0x0, '\x00', 0x1, 0xfffffffffffffffe}]}, 0x220) 2018/04/13 21:34:24 executing program 7: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r0, 0x107, 0x14, &(0x7f0000000ffc), 0x1c4) 2018/04/13 21:34:24 executing program 6: r0 = socket$inet6(0xa, 0x802, 0x0) getsockopt$inet_sctp6_SCTP_PR_ASSOC_STATUS(r0, 0x84, 0x73, &(0x7f0000000180)={0x0, 0x677, 0x20, 0xf7633c0000000000, 0x80000000}, &(0x7f00000001c0)=0x18) setsockopt$inet_sctp6_SCTP_DEFAULT_SNDINFO(r0, 0x84, 0x22, &(0x7f0000000200)={0x2, 0x4, 0x9, 0x1, r1}, 0x10) getsockopt$inet_sctp6_SCTP_EVENTS(r0, 0x84, 0xb, &(0x7f0000000240), &(0x7f0000000280)=0xb) ioctl$sock_ifreq(r0, 0x8922, &(0x7f0000000000)={'bond0\x00', @ifru_mtu=0x81}) getsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(r0, 0x84, 0x1f, &(0x7f0000000040)={0x0, @in6={{0xa, 0x4e22, 0x4, @mcast1={0xff, 0x1, [], 0x1}, 0x6}}, 0x6, 0xa93}, &(0x7f0000000100)=0x90) r3 = socket$inet(0x2, 0x6, 0x3) ioctl$DRM_IOCTL_PRIME_FD_TO_HANDLE(0xffffffffffffffff, 0xc00c642e, &(0x7f0000000640)={0x0, 0x80000, 0xffffffffffffffff}) ioctl$DRM_IOCTL_PRIME_FD_TO_HANDLE(r5, 0xc00c642e, &(0x7f0000000680)={r4, 0x80001, r5}) ioctl$DRM_IOCTL_GEM_FLINK(0xffffffffffffffff, 0xc008640a, &(0x7f00000006c0)={0x0, 0x0}) ioctl$DRM_IOCTL_GEM_FLINK(r5, 0xc008640a, &(0x7f0000000700)={r6, r7}) getsockopt$inet_sctp_SCTP_PR_ASSOC_STATUS(r3, 0x84, 0x73, &(0x7f0000000300)={r2, 0x7, 0x10, 0xd6, 0xffffffff00000001}, &(0x7f0000000340)=0x18) bind$inet6(r0, &(0x7f0000000600)={0xa, 0x4e23, 0x401, @dev={0xfe, 0x80, [], 0xb}}, 0x1c) getpeername$inet6(r0, &(0x7f0000000580)={0x0, 0x0, 0x0, @dev}, &(0x7f00000005c0)=0x1c) setsockopt$inet_sctp6_SCTP_AUTH_DELETE_KEY(r0, 0x84, 0x19, &(0x7f0000000140)={r2, 0x81}, 0x8) setsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX(r3, 0x84, 0x6e, &(0x7f0000000380)=[@in={0x2, 0x4e24}, @in6={0xa, 0x4e21, 0x5c, @ipv4={[], [0xff, 0xff], @multicast2=0xe0000002}, 0x1}, @in={0x2, 0x4e21, @multicast2=0xe0000002}], 0x3c) r8 = socket$inet_sctp(0x2, 0x5, 0x84) r9 = accept(r8, &(0x7f00000003c0)=@nfc, &(0x7f0000000440)=0x80) getsockopt$nfc_llcp(r9, 0x118, 0x0, &(0x7f0000000480)=""/153, 0x99) setsockopt$inet_sctp_SCTP_I_WANT_MAPPED_V4_ADDR(r8, 0x84, 0xc, &(0x7f0000000540)=0xfff, 0x4) setsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX_OLD(r8, 0x84, 0x6b, &(0x7f00000002c0)=[@in={0x2, 0x4e22, @loopback=0x7f000001}, @in={0x2, 0x4e24, @loopback=0x7f000001}, @in6={0xa, 0x4e21, 0x4, @remote={0xfe, 0x80, [], 0xbb}, 0x9}], 0x3c) 2018/04/13 21:34:24 executing program 3: r0 = socket$inet6(0xa, 0x40000080806, 0x0) bind$inet6(r0, &(0x7f000047b000)={0xa, 0x4e20}, 0x1c) listen(r0, 0x20000003) r1 = socket$inet6(0xa, 0x6, 0x0) connect$inet6(r1, &(0x7f0000419000)={0xa, 0x4e20, 0x0, @dev={0xfe, 0x80, [], 0xf}, 0x3}, 0x1c) 2018/04/13 21:34:24 executing program 4: perf_event_open(&(0x7f0000348f88)={0x2, 0x70, 0x3e6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = getpgrp(0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, r0, 0x0, 0xffffffffffffffff, 0x0) 2018/04/13 21:34:24 executing program 7: bpf$MAP_CREATE(0x0, &(0x7f0000346fd4)={0x0, 0x0, 0x0, 0x864}, 0xfffffffffffffd2a) bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0xd, 0x5, &(0x7f0000346fc8)=@framed={{0x18}, [@alu={0x8000000201a7f19, 0x0, 0x201a7fa6, 0x48, 0x1, 0x68}], {0x95}}, &(0x7f0000f6bffb)='GPL\x00', 0xfffffffffffffffc, 0x418, &(0x7f00001a7f05)=""/251}, 0x48) 2018/04/13 21:34:24 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSARP(r0, 0x8955, &(0x7f0000000080)={{0x2, 0x0, @broadcast=0xffffffff}, {0x0, @local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}}, 0xf, {0x2, 0x0, @dev={0xac, 0x14, 0x14}}, "00080700000400a0b22c582bf3aed17d"}) 2018/04/13 21:34:24 executing program 1: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x0) bind$bt_l2cap(r0, &(0x7f00000000c0)={0x1f, 0x0, {}, 0x0, 0x2}, 0xe) connect(r0, &(0x7f0000000100)=@sco={0x1f}, 0x80) 2018/04/13 21:34:24 executing program 2: r0 = socket$inet(0x2, 0x200000000000006, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000180)=@broute={'broute\x00', 0x20, 0x1, 0x1a8, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000880], 0x0, &(0x7f0000000040), &(0x7f0000000880)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe, 0x1, [{{{0x15, 0x0, 0x0, 'nr0\x00', 'teql0\x00', 'bcsf0\x00', 'rose0\x00', @dev={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa]}, [], @link_local={0x1, 0x80, 0xc2}, [], 0x70, 0xe8, 0x118}, [@common=@NFLOG={'NFLOG\x00', 0x50, {{0x0, 0x0, 0x0, 0x0, 0x0, "03df6be3fdcc0abb75180333f0748eae0cc9a7cb11b611f7ef4638cda01580dcd330cf7d8431c3db908d2519e8ab87de08679c6ad47ccd889ee1ad19e3457b00"}}}]}, @common=@AUDIT={'AUDIT\x00', 0x8}}]}, {0x0, '\x00', 0x1, 0xfffffffffffffffe}, {0x0, '\x00', 0x1, 0xfffffffffffffffe}]}, 0x220) [ 344.825575] sg_write: data in/out 142016902/43 bytes for SCSI command 0xa9-- guessing data in; [ 344.825575] program syz-executor5 not setting count and/or reply_len properly [ 344.865236] program syz-executor5 is using a deprecated SCSI ioctl, please convert it to SG_IO 2018/04/13 21:34:24 executing program 4: perf_event_open(&(0x7f000001d000)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_bp={&(0x7f0000000000), 0x1}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f00003b9fdc)) r1 = syz_open_pts(r0, 0x0) ioctl$TIOCGLCKTRMIOS(r1, 0x5424, &(0x7f0000000000)) 2018/04/13 21:34:24 executing program 0: r0 = socket$inet6(0xa, 0x802, 0x0) getsockopt$inet_sctp6_SCTP_PR_ASSOC_STATUS(r0, 0x84, 0x73, &(0x7f0000000180)={0x0, 0x677, 0x20, 0xf7633c0000000000, 0x80000000}, &(0x7f00000001c0)=0x18) setsockopt$inet_sctp6_SCTP_DEFAULT_SNDINFO(r0, 0x84, 0x22, &(0x7f0000000200)={0x2, 0x4, 0x9, 0x1, r1}, 0x10) getsockopt$inet_sctp6_SCTP_EVENTS(r0, 0x84, 0xb, &(0x7f0000000240), &(0x7f0000000280)=0xb) ioctl$sock_ifreq(r0, 0x8922, &(0x7f0000000000)={'bond0\x00', @ifru_mtu=0x81}) getsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(r0, 0x84, 0x1f, &(0x7f0000000040)={0x0, @in6={{0xa, 0x4e22, 0x4, @mcast1={0xff, 0x1, [], 0x1}, 0x6}}, 0x6, 0xa93}, &(0x7f0000000100)=0x90) r3 = socket$inet(0x2, 0x6, 0x3) ioctl$DRM_IOCTL_PRIME_FD_TO_HANDLE(0xffffffffffffffff, 0xc00c642e, &(0x7f0000000640)={0x0, 0x80000, 0xffffffffffffffff}) ioctl$DRM_IOCTL_PRIME_FD_TO_HANDLE(r5, 0xc00c642e, &(0x7f0000000680)={r4, 0x80001, r5}) ioctl$DRM_IOCTL_GEM_FLINK(0xffffffffffffffff, 0xc008640a, &(0x7f00000006c0)={0x0, 0x0}) ioctl$DRM_IOCTL_GEM_FLINK(r5, 0xc008640a, &(0x7f0000000700)={r6, r7}) getsockopt$inet_sctp_SCTP_PR_ASSOC_STATUS(r3, 0x84, 0x73, &(0x7f0000000300)={r2, 0x7, 0x10, 0xd6, 0xffffffff00000001}, &(0x7f0000000340)=0x18) bind$inet6(r0, &(0x7f0000000600)={0xa, 0x4e23, 0x401, @dev={0xfe, 0x80, [], 0xb}}, 0x1c) getpeername$inet6(r0, &(0x7f0000000580)={0x0, 0x0, 0x0, @dev}, &(0x7f00000005c0)=0x1c) setsockopt$inet_sctp6_SCTP_AUTH_DELETE_KEY(r0, 0x84, 0x19, &(0x7f0000000140)={r2, 0x81}, 0x8) setsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX(r3, 0x84, 0x6e, &(0x7f0000000380)=[@in={0x2, 0x4e24}, @in6={0xa, 0x4e21, 0x5c, @ipv4={[], [0xff, 0xff], @multicast2=0xe0000002}, 0x1}, @in={0x2, 0x4e21, @multicast2=0xe0000002}], 0x3c) r8 = socket$inet_sctp(0x2, 0x5, 0x84) r9 = accept(r8, &(0x7f00000003c0)=@nfc, &(0x7f0000000440)=0x80) getsockopt$nfc_llcp(r9, 0x118, 0x0, &(0x7f0000000480)=""/153, 0x99) setsockopt$inet_sctp_SCTP_I_WANT_MAPPED_V4_ADDR(r8, 0x84, 0xc, &(0x7f0000000540)=0xfff, 0x4) setsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX_OLD(r8, 0x84, 0x6b, &(0x7f00000002c0)=[@in={0x2, 0x4e22, @loopback=0x7f000001}, @in={0x2, 0x4e24, @loopback=0x7f000001}, @in6={0xa, 0x4e21, 0x4, @remote={0xfe, 0x80, [], 0xbb}, 0x9}], 0x3c) [ 344.889403] sd 0:0:1:0: ioctl_internal_command: ILLEGAL REQUEST asc=0x20 ascq=0x0 2018/04/13 21:34:24 executing program 2: r0 = socket$inet(0x2, 0x200000000000006, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000180)=@broute={'broute\x00', 0x20, 0x1, 0x1a8, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000880], 0x0, &(0x7f0000000040), &(0x7f0000000880)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe, 0x1, [{{{0x15, 0x0, 0x0, 'nr0\x00', 'teql0\x00', 'bcsf0\x00', 'rose0\x00', @dev={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa]}, [], @link_local={0x1, 0x80, 0xc2}, [], 0x70, 0xe8, 0x118}, [@common=@NFLOG={'NFLOG\x00', 0x50, {{0x0, 0x0, 0x0, 0x0, 0x0, "03df6be3fdcc0abb75180333f0748eae0cc9a7cb11b611f7ef4638cda01580dcd330cf7d8431c3db908d2519e8ab87de08679c6ad47ccd889ee1ad19e3457b00"}}}]}, @common=@AUDIT={'AUDIT\x00', 0x8}}]}, {0x0, '\x00', 0x1, 0xfffffffffffffffe}, {0x0, '\x00', 0x1, 0xfffffffffffffffe}]}, 0x220) 2018/04/13 21:34:24 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSARP(r0, 0x8955, &(0x7f0000000080)={{0x2, 0x0, @broadcast=0xffffffff}, {0x0, @local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}}, 0xf, {0x2, 0x0, @dev={0xac, 0x14, 0x14}}, "00080700000400a0b22c582bf3aed17d"}) 2018/04/13 21:34:24 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSARP(r0, 0x8955, &(0x7f0000000080)={{0x2, 0x0, @broadcast=0xffffffff}, {0x0, @local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}}, 0xf, {0x2, 0x0, @dev={0xac, 0x14, 0x14}}, "00080700000400a0b22c582bf3aed17d"}) 2018/04/13 21:34:24 executing program 6: r0 = socket$inet6(0xa, 0x802, 0x0) getsockopt$inet_sctp6_SCTP_PR_ASSOC_STATUS(r0, 0x84, 0x73, &(0x7f0000000180)={0x0, 0x677, 0x20, 0xf7633c0000000000, 0x80000000}, &(0x7f00000001c0)=0x18) setsockopt$inet_sctp6_SCTP_DEFAULT_SNDINFO(r0, 0x84, 0x22, &(0x7f0000000200)={0x2, 0x4, 0x9, 0x1, r1}, 0x10) getsockopt$inet_sctp6_SCTP_EVENTS(r0, 0x84, 0xb, &(0x7f0000000240), &(0x7f0000000280)=0xb) ioctl$sock_ifreq(r0, 0x8922, &(0x7f0000000000)={'bond0\x00', @ifru_mtu=0x81}) getsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(r0, 0x84, 0x1f, &(0x7f0000000040)={0x0, @in6={{0xa, 0x4e22, 0x4, @mcast1={0xff, 0x1, [], 0x1}, 0x6}}, 0x6, 0xa93}, &(0x7f0000000100)=0x90) r3 = socket$inet(0x2, 0x6, 0x3) ioctl$DRM_IOCTL_PRIME_FD_TO_HANDLE(0xffffffffffffffff, 0xc00c642e, &(0x7f0000000640)={0x0, 0x80000, 0xffffffffffffffff}) ioctl$DRM_IOCTL_PRIME_FD_TO_HANDLE(r5, 0xc00c642e, &(0x7f0000000680)={r4, 0x80001, r5}) ioctl$DRM_IOCTL_GEM_FLINK(0xffffffffffffffff, 0xc008640a, &(0x7f00000006c0)={0x0, 0x0}) ioctl$DRM_IOCTL_GEM_FLINK(r5, 0xc008640a, &(0x7f0000000700)={r6, r7}) getsockopt$inet_sctp_SCTP_PR_ASSOC_STATUS(r3, 0x84, 0x73, &(0x7f0000000300)={r2, 0x7, 0x10, 0xd6, 0xffffffff00000001}, &(0x7f0000000340)=0x18) bind$inet6(r0, &(0x7f0000000600)={0xa, 0x4e23, 0x401, @dev={0xfe, 0x80, [], 0xb}}, 0x1c) getpeername$inet6(r0, &(0x7f0000000580)={0x0, 0x0, 0x0, @dev}, &(0x7f00000005c0)=0x1c) setsockopt$inet_sctp6_SCTP_AUTH_DELETE_KEY(r0, 0x84, 0x19, &(0x7f0000000140)={r2, 0x81}, 0x8) setsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX(r3, 0x84, 0x6e, &(0x7f0000000380)=[@in={0x2, 0x4e24}, @in6={0xa, 0x4e21, 0x5c, @ipv4={[], [0xff, 0xff], @multicast2=0xe0000002}, 0x1}, @in={0x2, 0x4e21, @multicast2=0xe0000002}], 0x3c) r8 = socket$inet_sctp(0x2, 0x5, 0x84) r9 = accept(r8, &(0x7f00000003c0)=@nfc, &(0x7f0000000440)=0x80) getsockopt$nfc_llcp(r9, 0x118, 0x0, &(0x7f0000000480)=""/153, 0x99) setsockopt$inet_sctp_SCTP_I_WANT_MAPPED_V4_ADDR(r8, 0x84, 0xc, &(0x7f0000000540)=0xfff, 0x4) setsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX_OLD(r8, 0x84, 0x6b, &(0x7f00000002c0)=[@in={0x2, 0x4e22, @loopback=0x7f000001}, @in={0x2, 0x4e24, @loopback=0x7f000001}, @in6={0xa, 0x4e21, 0x4, @remote={0xfe, 0x80, [], 0xbb}, 0x9}], 0x3c) 2018/04/13 21:34:24 executing program 1: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x0) bind$bt_l2cap(r0, &(0x7f00000000c0)={0x1f, 0x0, {}, 0x0, 0x2}, 0xe) connect(r0, &(0x7f0000000100)=@sco={0x1f}, 0x80) 2018/04/13 21:34:24 executing program 7: bpf$MAP_CREATE(0x0, &(0x7f0000346fd4)={0x0, 0x0, 0x0, 0x864}, 0xfffffffffffffd2a) bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0xd, 0x5, &(0x7f0000346fc8)=@framed={{0x18}, [@alu={0x8000000201a7f19, 0x0, 0x201a7fa6, 0x48, 0x1, 0x68}], {0x95}}, &(0x7f0000f6bffb)='GPL\x00', 0xfffffffffffffffc, 0x418, &(0x7f00001a7f05)=""/251}, 0x48) 2018/04/13 21:34:24 executing program 4: perf_event_open(&(0x7f000001d000)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_bp={&(0x7f0000000000), 0x1}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f00003b9fdc)) r1 = syz_open_pts(r0, 0x0) ioctl$TIOCGLCKTRMIOS(r1, 0x5424, &(0x7f0000000000)) 2018/04/13 21:34:24 executing program 5: r0 = socket$unix(0x1, 0x5, 0x0) mmap(&(0x7f0000b4f000/0x3000)=nil, 0x3000, 0x0, 0x11, r0, 0x0) pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) write(r2, &(0x7f00000001c0), 0xfffffef3) read(r1, &(0x7f0000000200)=""/250, 0x50c7e3e3) mlock(&(0x7f00007ac000/0x800000)=nil, 0x800000) 2018/04/13 21:34:24 executing program 0: bpf$MAP_CREATE(0x0, &(0x7f0000346fd4)={0x0, 0x0, 0x0, 0x62}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0x6, 0x5, &(0x7f0000346fc8)=@framed={{0x18}, [@alu={0x8000000201a7f19, 0x0, 0x201a7fa6, 0x0, 0x1}], {0x95}}, &(0x7f0000f6bffb)='GPL\x00', 0xfffffffffffffffc, 0xfb, &(0x7f0000000100)=""/251}, 0x48) 2018/04/13 21:34:24 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'skcipher\x00', 0x0, 0x0, 'ctr-camellia-asm\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00001ec000)="0a0775b0d5e383e5b3b60ced5c54dbb7", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f0000f75fc8)={0x0, 0x0, &(0x7f0000805000), 0x0, &(0x7f00002e7000)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) io_setup(0x1, &(0x7f0000f7e000)=0x0) io_submit(r2, 0x1, &(0x7f0000738000)=[&(0x7f0000f73fc0)={0x0, 0x0, 0x0, 0x0, 0x0, r1, &(0x7f000079a000)="16", 0x1}]) 2018/04/13 21:34:24 executing program 7: bpf$MAP_CREATE(0x0, &(0x7f0000346fd4)={0x0, 0x0, 0x0, 0x864}, 0xfffffffffffffd2a) bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0xd, 0x5, &(0x7f0000346fc8)=@framed={{0x18}, [@alu={0x8000000201a7f19, 0x0, 0x201a7fa6, 0x48, 0x1, 0x68}], {0x95}}, &(0x7f0000f6bffb)='GPL\x00', 0xfffffffffffffffc, 0x418, &(0x7f00001a7f05)=""/251}, 0x48) 2018/04/13 21:34:24 executing program 4: perf_event_open(&(0x7f000001d000)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_bp={&(0x7f0000000000), 0x1}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f00003b9fdc)) r1 = syz_open_pts(r0, 0x0) ioctl$TIOCGLCKTRMIOS(r1, 0x5424, &(0x7f0000000000)) 2018/04/13 21:34:24 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'skcipher\x00', 0x0, 0x0, 'ctr-camellia-asm\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00001ec000)="0a0775b0d5e383e5b3b60ced5c54dbb7", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f0000f75fc8)={0x0, 0x0, &(0x7f0000805000), 0x0, &(0x7f00002e7000)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) io_setup(0x1, &(0x7f0000f7e000)=0x0) io_submit(r2, 0x1, &(0x7f0000738000)=[&(0x7f0000f73fc0)={0x0, 0x0, 0x0, 0x0, 0x0, r1, &(0x7f000079a000)="16", 0x1}]) 2018/04/13 21:34:24 executing program 1: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x0) bind$bt_l2cap(r0, &(0x7f00000000c0)={0x1f, 0x0, {}, 0x0, 0x2}, 0xe) connect(r0, &(0x7f0000000100)=@sco={0x1f}, 0x80) 2018/04/13 21:34:25 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSARP(r0, 0x8955, &(0x7f0000000080)={{0x2, 0x0, @broadcast=0xffffffff}, {0x0, @local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}}, 0xf, {0x2, 0x0, @dev={0xac, 0x14, 0x14}}, "00080700000400a0b22c582bf3aed17d"}) 2018/04/13 21:34:25 executing program 0: bpf$MAP_CREATE(0x0, &(0x7f0000346fd4)={0x0, 0x0, 0x0, 0x62}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0x6, 0x5, &(0x7f0000346fc8)=@framed={{0x18}, [@alu={0x8000000201a7f19, 0x0, 0x201a7fa6, 0x0, 0x1}], {0x95}}, &(0x7f0000f6bffb)='GPL\x00', 0xfffffffffffffffc, 0xfb, &(0x7f0000000100)=""/251}, 0x48) 2018/04/13 21:34:25 executing program 6: r0 = socket$inet6(0xa, 0x802, 0x0) getsockopt$inet_sctp6_SCTP_PR_ASSOC_STATUS(r0, 0x84, 0x73, &(0x7f0000000180)={0x0, 0x677, 0x20, 0xf7633c0000000000, 0x80000000}, &(0x7f00000001c0)=0x18) setsockopt$inet_sctp6_SCTP_DEFAULT_SNDINFO(r0, 0x84, 0x22, &(0x7f0000000200)={0x2, 0x4, 0x9, 0x1, r1}, 0x10) getsockopt$inet_sctp6_SCTP_EVENTS(r0, 0x84, 0xb, &(0x7f0000000240), &(0x7f0000000280)=0xb) ioctl$sock_ifreq(r0, 0x8922, &(0x7f0000000000)={'bond0\x00', @ifru_mtu=0x81}) getsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(r0, 0x84, 0x1f, &(0x7f0000000040)={0x0, @in6={{0xa, 0x4e22, 0x4, @mcast1={0xff, 0x1, [], 0x1}, 0x6}}, 0x6, 0xa93}, &(0x7f0000000100)=0x90) r3 = socket$inet(0x2, 0x6, 0x3) ioctl$DRM_IOCTL_PRIME_FD_TO_HANDLE(0xffffffffffffffff, 0xc00c642e, &(0x7f0000000640)={0x0, 0x80000, 0xffffffffffffffff}) ioctl$DRM_IOCTL_PRIME_FD_TO_HANDLE(r5, 0xc00c642e, &(0x7f0000000680)={r4, 0x80001, r5}) ioctl$DRM_IOCTL_GEM_FLINK(0xffffffffffffffff, 0xc008640a, &(0x7f00000006c0)={0x0, 0x0}) ioctl$DRM_IOCTL_GEM_FLINK(r5, 0xc008640a, &(0x7f0000000700)={r6, r7}) getsockopt$inet_sctp_SCTP_PR_ASSOC_STATUS(r3, 0x84, 0x73, &(0x7f0000000300)={r2, 0x7, 0x10, 0xd6, 0xffffffff00000001}, &(0x7f0000000340)=0x18) bind$inet6(r0, &(0x7f0000000600)={0xa, 0x4e23, 0x401, @dev={0xfe, 0x80, [], 0xb}}, 0x1c) getpeername$inet6(r0, &(0x7f0000000580)={0x0, 0x0, 0x0, @dev}, &(0x7f00000005c0)=0x1c) setsockopt$inet_sctp6_SCTP_AUTH_DELETE_KEY(r0, 0x84, 0x19, &(0x7f0000000140)={r2, 0x81}, 0x8) setsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX(r3, 0x84, 0x6e, &(0x7f0000000380)=[@in={0x2, 0x4e24}, @in6={0xa, 0x4e21, 0x5c, @ipv4={[], [0xff, 0xff], @multicast2=0xe0000002}, 0x1}, @in={0x2, 0x4e21, @multicast2=0xe0000002}], 0x3c) r8 = socket$inet_sctp(0x2, 0x5, 0x84) r9 = accept(r8, &(0x7f00000003c0)=@nfc, &(0x7f0000000440)=0x80) getsockopt$nfc_llcp(r9, 0x118, 0x0, &(0x7f0000000480)=""/153, 0x99) setsockopt$inet_sctp_SCTP_I_WANT_MAPPED_V4_ADDR(r8, 0x84, 0xc, &(0x7f0000000540)=0xfff, 0x4) setsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX_OLD(r8, 0x84, 0x6b, &(0x7f00000002c0)=[@in={0x2, 0x4e22, @loopback=0x7f000001}, @in={0x2, 0x4e24, @loopback=0x7f000001}, @in6={0xa, 0x4e21, 0x4, @remote={0xfe, 0x80, [], 0xbb}, 0x9}], 0x3c) 2018/04/13 21:34:25 executing program 7: bpf$MAP_CREATE(0x0, &(0x7f0000346fd4)={0x0, 0x0, 0x0, 0x864}, 0xfffffffffffffd2a) bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0xd, 0x5, &(0x7f0000346fc8)=@framed={{0x18}, [@alu={0x8000000201a7f19, 0x0, 0x201a7fa6, 0x48, 0x1, 0x68}], {0x95}}, &(0x7f0000f6bffb)='GPL\x00', 0xfffffffffffffffc, 0x418, &(0x7f00001a7f05)=""/251}, 0x48) 2018/04/13 21:34:25 executing program 4: perf_event_open(&(0x7f000001d000)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_bp={&(0x7f0000000000), 0x1}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f00003b9fdc)) r1 = syz_open_pts(r0, 0x0) ioctl$TIOCGLCKTRMIOS(r1, 0x5424, &(0x7f0000000000)) 2018/04/13 21:34:25 executing program 1: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000140)=@broute={'broute\x00', 0x20, 0x3, 0x500, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000640], 0x0, &(0x7f0000000080), &(0x7f0000000640)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe, 0x2, [{{{0x3, 0x0, 0x0, 'tunl0\x00', 'bridge0\x00', 'syzkaller1\x00', 'bcsh0\x00', @link_local={0x1, 0x80, 0xc2}, [], @link_local={0x1, 0x80, 0xc2}, [], 0x70, 0xd8, 0x128}, [@common=@NFQUEUE0={'NFQUEUE\x00', 0x8}, @common=@mark={'mark\x00', 0x10, {{0x0, 0xfffffffffffffffc}}}]}, @common=@LED={'LED\x00', 0x28, {{'syz1\x00'}}}}, {{{0x3, 0x0, 0x0, 'syzkaller1\x00', 'bpq0\x00', 'bridge0\x00', 'gretap0\x00', @dev={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa]}, [], @empty, [], 0x198, 0x198, 0x1c8, [@comment={'comment\x00', 0x100}]}}, @common=@CLASSIFY={'CLASSIFY\x00', 0x8}}]}, {0x0, '\x00', 0x2, 0xffffffffffffffff, 0x1, [{{{0x9, 0x0, 0x0, 'ip6gre0\x00', 'vlan0\x00', 'bond0\x00', 'vlan0\x00', @local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, [], @link_local={0x1, 0x80, 0xc2}, [], 0xd0, 0x150, 0x180, [@pkttype={'pkttype\x00', 0x8}, @m802_3={'802_3\x00', 0x8}]}, [@common=@NFQUEUE0={'NFQUEUE\x00', 0x8}, @common=@log={'log\x00', 0x28, {{0x0, "7d6553e6fa3ddb50bc2fbe68a4045e203568ccb23559892663bd4ed7fa54"}}}]}, @common=@AUDIT={'AUDIT\x00', 0x8}}]}, {0x0, '\x00', 0x3, 0xffffffffffffffff}]}, 0x578) 2018/04/13 21:34:25 executing program 5: r0 = socket$unix(0x1, 0x5, 0x0) mmap(&(0x7f0000b4f000/0x3000)=nil, 0x3000, 0x0, 0x11, r0, 0x0) pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) write(r2, &(0x7f00000001c0), 0xfffffef3) read(r1, &(0x7f0000000200)=""/250, 0x50c7e3e3) mlock(&(0x7f00007ac000/0x800000)=nil, 0x800000) 2018/04/13 21:34:25 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'skcipher\x00', 0x0, 0x0, 'ctr-camellia-asm\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00001ec000)="0a0775b0d5e383e5b3b60ced5c54dbb7", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f0000f75fc8)={0x0, 0x0, &(0x7f0000805000), 0x0, &(0x7f00002e7000)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) io_setup(0x1, &(0x7f0000f7e000)=0x0) io_submit(r2, 0x1, &(0x7f0000738000)=[&(0x7f0000f73fc0)={0x0, 0x0, 0x0, 0x0, 0x0, r1, &(0x7f000079a000)="16", 0x1}]) 2018/04/13 21:34:26 executing program 6: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000040)={&(0x7f0000000280)={0x10}, 0xc, &(0x7f0000000000)={&(0x7f00000002c0)={0x18, 0x27, 0x1ff307543bf68163, 0x0, 0x0, {0x14}, [@nested={0x4, 0x7}]}, 0x18}, 0x1}, 0x0) 2018/04/13 21:34:26 executing program 7: clone(0x200, &(0x7f0000fbf000), &(0x7f0000c53000), &(0x7f0000000180), &(0x7f000025e000)) mknod(&(0x7f0000f80000)='./file0\x00', 0x1040, 0x0) execve(&(0x7f0000f8aff8)='./file0\x00', &(0x7f0000ca5fe8), &(0x7f00006fcff0)) r0 = inotify_init1(0x0) perf_event_open(&(0x7f0000014f88)={0x0, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fcntl$setown(r0, 0x8, 0xffffffffffffffff) fcntl$getownex(r0, 0x10, &(0x7f000045fff8)={0x0, 0x0}) r2 = getpgrp(0x0) kcmp(r1, r2, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) creat(&(0x7f0000000240)='./file0\x00', 0x0) 2018/04/13 21:34:26 executing program 4: r0 = socket(0x10, 0x2, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={&(0x7f000076fff4)={0x10}, 0xc, &(0x7f000009b000)={&(0x7f0000e2effe)=@newlink={0x28, 0x10, 0x9, 0x0, 0x0, {}, [@IFLA_AF_SPEC={0x8, 0x1a, [{0x4, 0xa}]}]}, 0x23b}, 0x1}, 0x0) 2018/04/13 21:34:26 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'skcipher\x00', 0x0, 0x0, 'ctr-camellia-asm\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00001ec000)="0a0775b0d5e383e5b3b60ced5c54dbb7", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f0000f75fc8)={0x0, 0x0, &(0x7f0000805000), 0x0, &(0x7f00002e7000)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) io_setup(0x1, &(0x7f0000f7e000)=0x0) io_submit(r2, 0x1, &(0x7f0000738000)=[&(0x7f0000f73fc0)={0x0, 0x0, 0x0, 0x0, 0x0, r1, &(0x7f000079a000)="16", 0x1}]) 2018/04/13 21:34:26 executing program 3: r0 = socket$kcm(0x29, 0x2, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(r0, 0x89e2, &(0x7f0000000040)={0xffffffffffffffff}) close(r0) ioctl$sock_kcm_SIOCKCMCLONE(r1, 0x89e2, &(0x7f0000001380)) 2018/04/13 21:34:26 executing program 0: bpf$MAP_CREATE(0x0, &(0x7f0000346fd4)={0x0, 0x0, 0x0, 0x62}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0x6, 0x5, &(0x7f0000346fc8)=@framed={{0x18}, [@alu={0x8000000201a7f19, 0x0, 0x201a7fa6, 0x0, 0x1}], {0x95}}, &(0x7f0000f6bffb)='GPL\x00', 0xfffffffffffffffc, 0xfb, &(0x7f0000000100)=""/251}, 0x48) 2018/04/13 21:34:26 executing program 5: r0 = socket$unix(0x1, 0x5, 0x0) mmap(&(0x7f0000b4f000/0x3000)=nil, 0x3000, 0x0, 0x11, r0, 0x0) pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) write(r2, &(0x7f00000001c0), 0xfffffef3) read(r1, &(0x7f0000000200)=""/250, 0x50c7e3e3) mlock(&(0x7f00007ac000/0x800000)=nil, 0x800000) 2018/04/13 21:34:26 executing program 1: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000140)=@broute={'broute\x00', 0x20, 0x3, 0x500, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000640], 0x0, &(0x7f0000000080), &(0x7f0000000640)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe, 0x2, [{{{0x3, 0x0, 0x0, 'tunl0\x00', 'bridge0\x00', 'syzkaller1\x00', 'bcsh0\x00', @link_local={0x1, 0x80, 0xc2}, [], @link_local={0x1, 0x80, 0xc2}, [], 0x70, 0xd8, 0x128}, [@common=@NFQUEUE0={'NFQUEUE\x00', 0x8}, @common=@mark={'mark\x00', 0x10, {{0x0, 0xfffffffffffffffc}}}]}, @common=@LED={'LED\x00', 0x28, {{'syz1\x00'}}}}, {{{0x3, 0x0, 0x0, 'syzkaller1\x00', 'bpq0\x00', 'bridge0\x00', 'gretap0\x00', @dev={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa]}, [], @empty, [], 0x198, 0x198, 0x1c8, [@comment={'comment\x00', 0x100}]}}, @common=@CLASSIFY={'CLASSIFY\x00', 0x8}}]}, {0x0, '\x00', 0x2, 0xffffffffffffffff, 0x1, [{{{0x9, 0x0, 0x0, 'ip6gre0\x00', 'vlan0\x00', 'bond0\x00', 'vlan0\x00', @local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, [], @link_local={0x1, 0x80, 0xc2}, [], 0xd0, 0x150, 0x180, [@pkttype={'pkttype\x00', 0x8}, @m802_3={'802_3\x00', 0x8}]}, [@common=@NFQUEUE0={'NFQUEUE\x00', 0x8}, @common=@log={'log\x00', 0x28, {{0x0, "7d6553e6fa3ddb50bc2fbe68a4045e203568ccb23559892663bd4ed7fa54"}}}]}, @common=@AUDIT={'AUDIT\x00', 0x8}}]}, {0x0, '\x00', 0x3, 0xffffffffffffffff}]}, 0x578) 2018/04/13 21:34:26 executing program 6: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000040)={&(0x7f0000000280)={0x10}, 0xc, &(0x7f0000000000)={&(0x7f00000002c0)={0x18, 0x27, 0x1ff307543bf68163, 0x0, 0x0, {0x14}, [@nested={0x4, 0x7}]}, 0x18}, 0x1}, 0x0) 2018/04/13 21:34:26 executing program 3: r0 = socket$kcm(0x29, 0x2, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(r0, 0x89e2, &(0x7f0000000040)={0xffffffffffffffff}) close(r0) ioctl$sock_kcm_SIOCKCMCLONE(r1, 0x89e2, &(0x7f0000001380)) 2018/04/13 21:34:26 executing program 1: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000140)=@broute={'broute\x00', 0x20, 0x3, 0x500, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000640], 0x0, &(0x7f0000000080), &(0x7f0000000640)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe, 0x2, [{{{0x3, 0x0, 0x0, 'tunl0\x00', 'bridge0\x00', 'syzkaller1\x00', 'bcsh0\x00', @link_local={0x1, 0x80, 0xc2}, [], @link_local={0x1, 0x80, 0xc2}, [], 0x70, 0xd8, 0x128}, [@common=@NFQUEUE0={'NFQUEUE\x00', 0x8}, @common=@mark={'mark\x00', 0x10, {{0x0, 0xfffffffffffffffc}}}]}, @common=@LED={'LED\x00', 0x28, {{'syz1\x00'}}}}, {{{0x3, 0x0, 0x0, 'syzkaller1\x00', 'bpq0\x00', 'bridge0\x00', 'gretap0\x00', @dev={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa]}, [], @empty, [], 0x198, 0x198, 0x1c8, [@comment={'comment\x00', 0x100}]}}, @common=@CLASSIFY={'CLASSIFY\x00', 0x8}}]}, {0x0, '\x00', 0x2, 0xffffffffffffffff, 0x1, [{{{0x9, 0x0, 0x0, 'ip6gre0\x00', 'vlan0\x00', 'bond0\x00', 'vlan0\x00', @local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, [], @link_local={0x1, 0x80, 0xc2}, [], 0xd0, 0x150, 0x180, [@pkttype={'pkttype\x00', 0x8}, @m802_3={'802_3\x00', 0x8}]}, [@common=@NFQUEUE0={'NFQUEUE\x00', 0x8}, @common=@log={'log\x00', 0x28, {{0x0, "7d6553e6fa3ddb50bc2fbe68a4045e203568ccb23559892663bd4ed7fa54"}}}]}, @common=@AUDIT={'AUDIT\x00', 0x8}}]}, {0x0, '\x00', 0x3, 0xffffffffffffffff}]}, 0x578) 2018/04/13 21:34:26 executing program 0: bpf$MAP_CREATE(0x0, &(0x7f0000346fd4)={0x0, 0x0, 0x0, 0x62}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0x6, 0x5, &(0x7f0000346fc8)=@framed={{0x18}, [@alu={0x8000000201a7f19, 0x0, 0x201a7fa6, 0x0, 0x1}], {0x95}}, &(0x7f0000f6bffb)='GPL\x00', 0xfffffffffffffffc, 0xfb, &(0x7f0000000100)=""/251}, 0x48) 2018/04/13 21:34:26 executing program 4: r0 = socket(0x10, 0x2, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={&(0x7f000076fff4)={0x10}, 0xc, &(0x7f000009b000)={&(0x7f0000e2effe)=@newlink={0x28, 0x10, 0x9, 0x0, 0x0, {}, [@IFLA_AF_SPEC={0x8, 0x1a, [{0x4, 0xa}]}]}, 0x23b}, 0x1}, 0x0) 2018/04/13 21:34:26 executing program 2: r0 = socket$kcm(0x29, 0x2, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(r0, 0x89e2, &(0x7f0000000040)={0xffffffffffffffff}) close(r0) ioctl$sock_kcm_SIOCKCMCLONE(r1, 0x89e2, &(0x7f0000001380)) 2018/04/13 21:34:26 executing program 0: perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00', &(0x7f00000000c0)='configfs\x00', 0x0, &(0x7f0000000180)) syz_fuseblk_mount(&(0x7f0000000780)='./file0\x00', &(0x7f00000007c0)='./file0/file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) [ 347.712127] unregister_netdevice: waiting for lo to become free. Usage count = 4 2018/04/13 21:34:27 executing program 4: r0 = socket(0x10, 0x2, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={&(0x7f000076fff4)={0x10}, 0xc, &(0x7f000009b000)={&(0x7f0000e2effe)=@newlink={0x28, 0x10, 0x9, 0x0, 0x0, {}, [@IFLA_AF_SPEC={0x8, 0x1a, [{0x4, 0xa}]}]}, 0x23b}, 0x1}, 0x0) 2018/04/13 21:34:27 executing program 6: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000040)={&(0x7f0000000280)={0x10}, 0xc, &(0x7f0000000000)={&(0x7f00000002c0)={0x18, 0x27, 0x1ff307543bf68163, 0x0, 0x0, {0x14}, [@nested={0x4, 0x7}]}, 0x18}, 0x1}, 0x0) 2018/04/13 21:34:27 executing program 3: r0 = socket$kcm(0x29, 0x2, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(r0, 0x89e2, &(0x7f0000000040)={0xffffffffffffffff}) close(r0) ioctl$sock_kcm_SIOCKCMCLONE(r1, 0x89e2, &(0x7f0000001380)) 2018/04/13 21:34:27 executing program 1: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000140)=@broute={'broute\x00', 0x20, 0x3, 0x500, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000640], 0x0, &(0x7f0000000080), &(0x7f0000000640)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe, 0x2, [{{{0x3, 0x0, 0x0, 'tunl0\x00', 'bridge0\x00', 'syzkaller1\x00', 'bcsh0\x00', @link_local={0x1, 0x80, 0xc2}, [], @link_local={0x1, 0x80, 0xc2}, [], 0x70, 0xd8, 0x128}, [@common=@NFQUEUE0={'NFQUEUE\x00', 0x8}, @common=@mark={'mark\x00', 0x10, {{0x0, 0xfffffffffffffffc}}}]}, @common=@LED={'LED\x00', 0x28, {{'syz1\x00'}}}}, {{{0x3, 0x0, 0x0, 'syzkaller1\x00', 'bpq0\x00', 'bridge0\x00', 'gretap0\x00', @dev={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa]}, [], @empty, [], 0x198, 0x198, 0x1c8, [@comment={'comment\x00', 0x100}]}}, @common=@CLASSIFY={'CLASSIFY\x00', 0x8}}]}, {0x0, '\x00', 0x2, 0xffffffffffffffff, 0x1, [{{{0x9, 0x0, 0x0, 'ip6gre0\x00', 'vlan0\x00', 'bond0\x00', 'vlan0\x00', @local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, [], @link_local={0x1, 0x80, 0xc2}, [], 0xd0, 0x150, 0x180, [@pkttype={'pkttype\x00', 0x8}, @m802_3={'802_3\x00', 0x8}]}, [@common=@NFQUEUE0={'NFQUEUE\x00', 0x8}, @common=@log={'log\x00', 0x28, {{0x0, "7d6553e6fa3ddb50bc2fbe68a4045e203568ccb23559892663bd4ed7fa54"}}}]}, @common=@AUDIT={'AUDIT\x00', 0x8}}]}, {0x0, '\x00', 0x3, 0xffffffffffffffff}]}, 0x578) 2018/04/13 21:34:27 executing program 0: perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00', &(0x7f00000000c0)='configfs\x00', 0x0, &(0x7f0000000180)) syz_fuseblk_mount(&(0x7f0000000780)='./file0\x00', &(0x7f00000007c0)='./file0/file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) 2018/04/13 21:34:27 executing program 2: r0 = socket$kcm(0x29, 0x2, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(r0, 0x89e2, &(0x7f0000000040)={0xffffffffffffffff}) close(r0) ioctl$sock_kcm_SIOCKCMCLONE(r1, 0x89e2, &(0x7f0000001380)) 2018/04/13 21:34:27 executing program 7: clone(0x200, &(0x7f0000fbf000), &(0x7f0000c53000), &(0x7f0000000180), &(0x7f000025e000)) mknod(&(0x7f0000f80000)='./file0\x00', 0x1040, 0x0) execve(&(0x7f0000f8aff8)='./file0\x00', &(0x7f0000ca5fe8), &(0x7f00006fcff0)) r0 = inotify_init1(0x0) perf_event_open(&(0x7f0000014f88)={0x0, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fcntl$setown(r0, 0x8, 0xffffffffffffffff) fcntl$getownex(r0, 0x10, &(0x7f000045fff8)={0x0, 0x0}) r2 = getpgrp(0x0) kcmp(r1, r2, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) creat(&(0x7f0000000240)='./file0\x00', 0x0) 2018/04/13 21:34:27 executing program 5: r0 = socket$unix(0x1, 0x5, 0x0) mmap(&(0x7f0000b4f000/0x3000)=nil, 0x3000, 0x0, 0x11, r0, 0x0) pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) write(r2, &(0x7f00000001c0), 0xfffffef3) read(r1, &(0x7f0000000200)=""/250, 0x50c7e3e3) mlock(&(0x7f00007ac000/0x800000)=nil, 0x800000) 2018/04/13 21:34:27 executing program 4: r0 = socket(0x10, 0x2, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={&(0x7f000076fff4)={0x10}, 0xc, &(0x7f000009b000)={&(0x7f0000e2effe)=@newlink={0x28, 0x10, 0x9, 0x0, 0x0, {}, [@IFLA_AF_SPEC={0x8, 0x1a, [{0x4, 0xa}]}]}, 0x23b}, 0x1}, 0x0) 2018/04/13 21:34:27 executing program 0: perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00', &(0x7f00000000c0)='configfs\x00', 0x0, &(0x7f0000000180)) syz_fuseblk_mount(&(0x7f0000000780)='./file0\x00', &(0x7f00000007c0)='./file0/file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) 2018/04/13 21:34:27 executing program 6: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000040)={&(0x7f0000000280)={0x10}, 0xc, &(0x7f0000000000)={&(0x7f00000002c0)={0x18, 0x27, 0x1ff307543bf68163, 0x0, 0x0, {0x14}, [@nested={0x4, 0x7}]}, 0x18}, 0x1}, 0x0) 2018/04/13 21:34:27 executing program 2: r0 = socket$kcm(0x29, 0x2, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(r0, 0x89e2, &(0x7f0000000040)={0xffffffffffffffff}) close(r0) ioctl$sock_kcm_SIOCKCMCLONE(r1, 0x89e2, &(0x7f0000001380)) 2018/04/13 21:34:27 executing program 3: r0 = socket$kcm(0x29, 0x2, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(r0, 0x89e2, &(0x7f0000000040)={0xffffffffffffffff}) close(r0) ioctl$sock_kcm_SIOCKCMCLONE(r1, 0x89e2, &(0x7f0000001380)) 2018/04/13 21:34:27 executing program 1: syz_genetlink_get_family_id$fou(&(0x7f0000000140)='fou\x00') r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$fou(&(0x7f00000010c0)='fou\x00') sendmsg$FOU_CMD_DEL(r0, &(0x7f0000001200)={&(0x7f0000001140)={0x10}, 0xc, &(0x7f00000011c0)={&(0x7f0000001180)={0x14, r1, 0x101, 0x0, 0x0, {0x2}}, 0x14}, 0x1}, 0x0) 2018/04/13 21:34:27 executing program 0: perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00', &(0x7f00000000c0)='configfs\x00', 0x0, &(0x7f0000000180)) syz_fuseblk_mount(&(0x7f0000000780)='./file0\x00', &(0x7f00000007c0)='./file0/file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) 2018/04/13 21:34:27 executing program 2: recvmsg(0xffffffffffffffff, &(0x7f000000e5b4)={&(0x7f000000b000)=@can, 0x10, &(0x7f0000002000)=[{&(0x7f0000000000)=""/237, 0x3c7}, {&(0x7f0000000fdb)=""/37, 0x9c}], 0x96b0cf4a6d2225a0, 0x0, 0xb5}, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x1, 0x5, &(0x7f0000002000)=@framed={{0x18, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe}, [@jmp={0x5, 0x0, 0x2}], {0x95}}, &(0x7f000000a000)='syzkaller\x00', 0x1, 0x31b, &(0x7f0000011000)=""/195}, 0x48) 2018/04/13 21:34:27 executing program 3: syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f0000000100)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000010000)="eb3c906d6b66732e66617400020401000200027000f801", 0x17}], 0x0, &(0x7f0000000240)=ANY=[]) openat$vsock(0xffffffffffffff9c, &(0x7f0000000140)='/dev/vhost-vsock\x00', 0x2, 0x0) r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = open(&(0x7f0000000240)='./file0/file0\x00', 0x3fdfa, 0x0) write(r1, &(0x7f0000001200)="f858f0c637db5ccc708bd6cef167f826ab4a8a58266ae5093312240abe99b574541887d5e688c24bf3d745ace3a07e863db43e88d5d89df7727f717850b22b4e4ab511c59974b81f3f00e2506f772ea0b965d3540d01c1d7c141f88144c41ea48d6d7bc717399759cc4fcd8461ea8a9a4a7ea5cdcd2a53ec9aa6760ecd4ad5a7", 0x80) ioctl$BINDER_THREAD_EXIT(r1, 0x40046208, 0x0) r2 = open(&(0x7f0000000280)='./file0/file0\x00', 0x4001, 0x0) pwrite64(r0, &(0x7f0000000340)="2056396eee515a0df7ba6afa1c278e3456884c27a3ceee844e1a82f8b548b4442e9e8db16a75643b517cc7938c84b73de4a26a29cf3cef5c3bb781bdadac1739e8584fceeb75890848b7b44fd00b370d4fb49142b69562e1a04285983ca824f41ebab1b9980e321312140dbd7d23489535cd35b89e7072e5df8f367bc27d3ca2c25a4e0464106e20cc4c703fae079d32abd372a61dac88b8b5a3f2e654a134baad46cc49dfd6f89573871f2419af36abf658e8476bca78a0d457682ef9a8534bf5ad48d0f735796b492210f63c914ca172e8f64551e12fdb437ce419522cf367915f249b", 0xe4, 0x0) socketpair$inet_udp(0x2, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ftruncate(r2, 0x80) ioctl$KVM_GET_PIT(r2, 0xc048ae65, &(0x7f00000002c0)) setsockopt$EBT_SO_SET_COUNTERS(r4, 0x0, 0x81, &(0x7f0000000180)={'nat\x00', 0x5, [{}, {}, {}, {}, {}]}, 0x78) ftruncate(r2, 0x1000) splice(r2, &(0x7f0000000080), r3, &(0x7f0000000200), 0x4, 0x4) 2018/04/13 21:34:27 executing program 4: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup\x00', 0x200002, 0x0) r1 = openat$cgroup_int(r0, &(0x7f0000000080)='rdma.max\x00', 0x2, 0x0) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendfile(r1, r1, 0x0, 0xff) 2018/04/13 21:34:27 executing program 6: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000540)={0x26, 'skcipher\x00', 0x0, 0x0, 'kw(aes-asm)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000ff8000)="0a0775b005e381e5b3b60ced5c54dbb7", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000000200)=[{0x0, 0x0, &(0x7f0000000000), 0x0, &(0x7f0000000280)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) sendmsg$IPVS_CMD_NEW_DAEMON(r1, &(0x7f00000002c0)={&(0x7f0000000040)={0x10}, 0xc, &(0x7f0000000240)={&(0x7f00000000c0)={0x18, 0x0, 0x0, 0x0, 0x0, {0x9}, [@IPVS_CMD_ATTR_SERVICE={0x4, 0x1}]}, 0x18}, 0x1}, 0x0) recvmsg(r1, &(0x7f0000000500)={&(0x7f0000000100)=@pppol2tpin6={0x0, 0x0, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, @mcast1}}}, 0x80, &(0x7f00000003c0)=[{&(0x7f0000000180)=""/106, 0x6a}], 0x1, &(0x7f0000000400)=""/203, 0xcb}, 0x0) 2018/04/13 21:34:28 executing program 1: syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f0000000100)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000010000)="eb3c906d6b66732e66617400020401000200027000f801", 0x17}], 0x0, &(0x7f0000000240)=ANY=[]) openat$vsock(0xffffffffffffff9c, &(0x7f0000000140)='/dev/vhost-vsock\x00', 0x2, 0x0) r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = open(&(0x7f0000000240)='./file0/file0\x00', 0x3fdfa, 0x0) write(r1, &(0x7f0000001200)="f858f0c637db5ccc708bd6cef167f826ab4a8a58266ae5093312240abe99b574541887d5e688c24bf3d745ace3a07e863db43e88d5d89df7727f717850b22b4e4ab511c59974b81f3f00e2506f772ea0b965d3540d01c1d7c141f88144c41ea48d6d7bc717399759cc4fcd8461ea8a9a4a7ea5cdcd2a53ec9aa6760ecd4ad5a7", 0x80) ioctl$BINDER_THREAD_EXIT(r1, 0x40046208, 0x0) r2 = open(&(0x7f0000000280)='./file0/file0\x00', 0x4001, 0x0) pwrite64(r0, &(0x7f0000000340)="2056396eee515a0df7ba6afa1c278e3456884c27a3ceee844e1a82f8b548b4442e9e8db16a75643b517cc7938c84b73de4a26a29cf3cef5c3bb781bdadac1739e8584fceeb75890848b7b44fd00b370d4fb49142b69562e1a04285983ca824f41ebab1b9980e321312140dbd7d23489535cd35b89e7072e5df8f367bc27d3ca2c25a4e0464106e20cc4c703fae079d32abd372a61dac88b8b5a3f2e654a134baad46cc49dfd6f89573871f2419af36abf658e8476bca78a0d457682ef9a8534bf5ad48d0f735796b492210f63c914ca172e8f64551e12fdb437ce419522cf367915f249b", 0xe4, 0x0) socketpair$inet_udp(0x2, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ftruncate(r2, 0x80) ioctl$KVM_GET_PIT(r2, 0xc048ae65, &(0x7f00000002c0)) setsockopt$EBT_SO_SET_COUNTERS(r4, 0x0, 0x81, &(0x7f0000000180)={'nat\x00', 0x5, [{}, {}, {}, {}, {}]}, 0x78) ftruncate(r2, 0x1000) splice(r2, &(0x7f0000000080), r3, &(0x7f0000000200), 0x4, 0x4) 2018/04/13 21:34:28 executing program 0: mmap(&(0x7f0000003000/0x3000)=nil, 0x3000, 0x0, 0x2832, 0xffffffffffffffff, 0x0) r0 = socket$inet(0xa, 0x3, 0x5) ioctl$sock_SIOCGIFINDEX(r0, 0x8982, &(0x7f0000002ff2)) 2018/04/13 21:34:28 executing program 2: recvmsg(0xffffffffffffffff, &(0x7f000000e5b4)={&(0x7f000000b000)=@can, 0x10, &(0x7f0000002000)=[{&(0x7f0000000000)=""/237, 0x3c7}, {&(0x7f0000000fdb)=""/37, 0x9c}], 0x96b0cf4a6d2225a0, 0x0, 0xb5}, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x1, 0x5, &(0x7f0000002000)=@framed={{0x18, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe}, [@jmp={0x5, 0x0, 0x2}], {0x95}}, &(0x7f000000a000)='syzkaller\x00', 0x1, 0x31b, &(0x7f0000011000)=""/195}, 0x48) 2018/04/13 21:34:28 executing program 4: perf_event_open(&(0x7f0000348f88)={0x2, 0x78, 0x3e2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000d65000)={&(0x7f0000897ff4)={0x10}, 0xc9, &(0x7f0000023000)={&(0x7f0000010dfc)={0x14, 0x5, 0x1, 0x1}, 0x14}, 0x1}, 0x0) 2018/04/13 21:34:28 executing program 3: syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f0000000100)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000010000)="eb3c906d6b66732e66617400020401000200027000f801", 0x17}], 0x0, &(0x7f0000000240)=ANY=[]) openat$vsock(0xffffffffffffff9c, &(0x7f0000000140)='/dev/vhost-vsock\x00', 0x2, 0x0) r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = open(&(0x7f0000000240)='./file0/file0\x00', 0x3fdfa, 0x0) write(r1, &(0x7f0000001200)="f858f0c637db5ccc708bd6cef167f826ab4a8a58266ae5093312240abe99b574541887d5e688c24bf3d745ace3a07e863db43e88d5d89df7727f717850b22b4e4ab511c59974b81f3f00e2506f772ea0b965d3540d01c1d7c141f88144c41ea48d6d7bc717399759cc4fcd8461ea8a9a4a7ea5cdcd2a53ec9aa6760ecd4ad5a7", 0x80) ioctl$BINDER_THREAD_EXIT(r1, 0x40046208, 0x0) r2 = open(&(0x7f0000000280)='./file0/file0\x00', 0x4001, 0x0) pwrite64(r0, &(0x7f0000000340)="2056396eee515a0df7ba6afa1c278e3456884c27a3ceee844e1a82f8b548b4442e9e8db16a75643b517cc7938c84b73de4a26a29cf3cef5c3bb781bdadac1739e8584fceeb75890848b7b44fd00b370d4fb49142b69562e1a04285983ca824f41ebab1b9980e321312140dbd7d23489535cd35b89e7072e5df8f367bc27d3ca2c25a4e0464106e20cc4c703fae079d32abd372a61dac88b8b5a3f2e654a134baad46cc49dfd6f89573871f2419af36abf658e8476bca78a0d457682ef9a8534bf5ad48d0f735796b492210f63c914ca172e8f64551e12fdb437ce419522cf367915f249b", 0xe4, 0x0) socketpair$inet_udp(0x2, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ftruncate(r2, 0x80) ioctl$KVM_GET_PIT(r2, 0xc048ae65, &(0x7f00000002c0)) setsockopt$EBT_SO_SET_COUNTERS(r4, 0x0, 0x81, &(0x7f0000000180)={'nat\x00', 0x5, [{}, {}, {}, {}, {}]}, 0x78) ftruncate(r2, 0x1000) splice(r2, &(0x7f0000000080), r3, &(0x7f0000000200), 0x4, 0x4) 2018/04/13 21:34:28 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f000025bfc8)={&(0x7f0000b9343a)={0x10}, 0xc, &(0x7f000033cff0)={&(0x7f000037c000)=@ipv4_delroute={0x34, 0x19, 0x1, 0x0, 0x0, {0x2, 0x20, 0x0, 0x0, 0xff, 0x0, 0xff}, [@RTA_FLOW={0x8, 0xb, 0xbc}, @RTA_PREFSRC={0x8, 0x7, @loopback=0x7f000001}, @RTA_DST={0x8, 0x1, @loopback=0x7f000001}]}, 0x34}, 0x1, 0x0, 0x0, 0x4007}, 0x4000000) 2018/04/13 21:34:28 executing program 6: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000540)={0x26, 'skcipher\x00', 0x0, 0x0, 'kw(aes-asm)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000ff8000)="0a0775b005e381e5b3b60ced5c54dbb7", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000000200)=[{0x0, 0x0, &(0x7f0000000000), 0x0, &(0x7f0000000280)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) sendmsg$IPVS_CMD_NEW_DAEMON(r1, &(0x7f00000002c0)={&(0x7f0000000040)={0x10}, 0xc, &(0x7f0000000240)={&(0x7f00000000c0)={0x18, 0x0, 0x0, 0x0, 0x0, {0x9}, [@IPVS_CMD_ATTR_SERVICE={0x4, 0x1}]}, 0x18}, 0x1}, 0x0) recvmsg(r1, &(0x7f0000000500)={&(0x7f0000000100)=@pppol2tpin6={0x0, 0x0, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, @mcast1}}}, 0x80, &(0x7f00000003c0)=[{&(0x7f0000000180)=""/106, 0x6a}], 0x1, &(0x7f0000000400)=""/203, 0xcb}, 0x0) 2018/04/13 21:34:28 executing program 7: clone(0x200, &(0x7f0000fbf000), &(0x7f0000c53000), &(0x7f0000000180), &(0x7f000025e000)) mknod(&(0x7f0000f80000)='./file0\x00', 0x1040, 0x0) execve(&(0x7f0000f8aff8)='./file0\x00', &(0x7f0000ca5fe8), &(0x7f00006fcff0)) r0 = inotify_init1(0x0) perf_event_open(&(0x7f0000014f88)={0x0, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fcntl$setown(r0, 0x8, 0xffffffffffffffff) fcntl$getownex(r0, 0x10, &(0x7f000045fff8)={0x0, 0x0}) r2 = getpgrp(0x0) kcmp(r1, r2, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) creat(&(0x7f0000000240)='./file0\x00', 0x0) 2018/04/13 21:34:28 executing program 6: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000540)={0x26, 'skcipher\x00', 0x0, 0x0, 'kw(aes-asm)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000ff8000)="0a0775b005e381e5b3b60ced5c54dbb7", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000000200)=[{0x0, 0x0, &(0x7f0000000000), 0x0, &(0x7f0000000280)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) sendmsg$IPVS_CMD_NEW_DAEMON(r1, &(0x7f00000002c0)={&(0x7f0000000040)={0x10}, 0xc, &(0x7f0000000240)={&(0x7f00000000c0)={0x18, 0x0, 0x0, 0x0, 0x0, {0x9}, [@IPVS_CMD_ATTR_SERVICE={0x4, 0x1}]}, 0x18}, 0x1}, 0x0) recvmsg(r1, &(0x7f0000000500)={&(0x7f0000000100)=@pppol2tpin6={0x0, 0x0, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, @mcast1}}}, 0x80, &(0x7f00000003c0)=[{&(0x7f0000000180)=""/106, 0x6a}], 0x1, &(0x7f0000000400)=""/203, 0xcb}, 0x0) 2018/04/13 21:34:28 executing program 0: mmap(&(0x7f0000003000/0x3000)=nil, 0x3000, 0x0, 0x2832, 0xffffffffffffffff, 0x0) r0 = socket$inet(0xa, 0x3, 0x5) ioctl$sock_SIOCGIFINDEX(r0, 0x8982, &(0x7f0000002ff2)) 2018/04/13 21:34:28 executing program 2: recvmsg(0xffffffffffffffff, &(0x7f000000e5b4)={&(0x7f000000b000)=@can, 0x10, &(0x7f0000002000)=[{&(0x7f0000000000)=""/237, 0x3c7}, {&(0x7f0000000fdb)=""/37, 0x9c}], 0x96b0cf4a6d2225a0, 0x0, 0xb5}, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x1, 0x5, &(0x7f0000002000)=@framed={{0x18, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe}, [@jmp={0x5, 0x0, 0x2}], {0x95}}, &(0x7f000000a000)='syzkaller\x00', 0x1, 0x31b, &(0x7f0000011000)=""/195}, 0x48) 2018/04/13 21:34:28 executing program 1: syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f0000000100)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000010000)="eb3c906d6b66732e66617400020401000200027000f801", 0x17}], 0x0, &(0x7f0000000240)=ANY=[]) openat$vsock(0xffffffffffffff9c, &(0x7f0000000140)='/dev/vhost-vsock\x00', 0x2, 0x0) r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = open(&(0x7f0000000240)='./file0/file0\x00', 0x3fdfa, 0x0) write(r1, &(0x7f0000001200)="f858f0c637db5ccc708bd6cef167f826ab4a8a58266ae5093312240abe99b574541887d5e688c24bf3d745ace3a07e863db43e88d5d89df7727f717850b22b4e4ab511c59974b81f3f00e2506f772ea0b965d3540d01c1d7c141f88144c41ea48d6d7bc717399759cc4fcd8461ea8a9a4a7ea5cdcd2a53ec9aa6760ecd4ad5a7", 0x80) ioctl$BINDER_THREAD_EXIT(r1, 0x40046208, 0x0) r2 = open(&(0x7f0000000280)='./file0/file0\x00', 0x4001, 0x0) pwrite64(r0, &(0x7f0000000340)="2056396eee515a0df7ba6afa1c278e3456884c27a3ceee844e1a82f8b548b4442e9e8db16a75643b517cc7938c84b73de4a26a29cf3cef5c3bb781bdadac1739e8584fceeb75890848b7b44fd00b370d4fb49142b69562e1a04285983ca824f41ebab1b9980e321312140dbd7d23489535cd35b89e7072e5df8f367bc27d3ca2c25a4e0464106e20cc4c703fae079d32abd372a61dac88b8b5a3f2e654a134baad46cc49dfd6f89573871f2419af36abf658e8476bca78a0d457682ef9a8534bf5ad48d0f735796b492210f63c914ca172e8f64551e12fdb437ce419522cf367915f249b", 0xe4, 0x0) socketpair$inet_udp(0x2, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ftruncate(r2, 0x80) ioctl$KVM_GET_PIT(r2, 0xc048ae65, &(0x7f00000002c0)) setsockopt$EBT_SO_SET_COUNTERS(r4, 0x0, 0x81, &(0x7f0000000180)={'nat\x00', 0x5, [{}, {}, {}, {}, {}]}, 0x78) ftruncate(r2, 0x1000) splice(r2, &(0x7f0000000080), r3, &(0x7f0000000200), 0x4, 0x4) 2018/04/13 21:34:28 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f000025bfc8)={&(0x7f0000b9343a)={0x10}, 0xc, &(0x7f000033cff0)={&(0x7f000037c000)=@ipv4_delroute={0x34, 0x19, 0x1, 0x0, 0x0, {0x2, 0x20, 0x0, 0x0, 0xff, 0x0, 0xff}, [@RTA_FLOW={0x8, 0xb, 0xbc}, @RTA_PREFSRC={0x8, 0x7, @loopback=0x7f000001}, @RTA_DST={0x8, 0x1, @loopback=0x7f000001}]}, 0x34}, 0x1, 0x0, 0x0, 0x4007}, 0x4000000) 2018/04/13 21:34:28 executing program 4: perf_event_open(&(0x7f0000348f88)={0x2, 0x78, 0x3e2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000d65000)={&(0x7f0000897ff4)={0x10}, 0xc9, &(0x7f0000023000)={&(0x7f0000010dfc)={0x14, 0x5, 0x1, 0x1}, 0x14}, 0x1}, 0x0) 2018/04/13 21:34:28 executing program 3: syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f0000000100)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000010000)="eb3c906d6b66732e66617400020401000200027000f801", 0x17}], 0x0, &(0x7f0000000240)=ANY=[]) openat$vsock(0xffffffffffffff9c, &(0x7f0000000140)='/dev/vhost-vsock\x00', 0x2, 0x0) r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = open(&(0x7f0000000240)='./file0/file0\x00', 0x3fdfa, 0x0) write(r1, &(0x7f0000001200)="f858f0c637db5ccc708bd6cef167f826ab4a8a58266ae5093312240abe99b574541887d5e688c24bf3d745ace3a07e863db43e88d5d89df7727f717850b22b4e4ab511c59974b81f3f00e2506f772ea0b965d3540d01c1d7c141f88144c41ea48d6d7bc717399759cc4fcd8461ea8a9a4a7ea5cdcd2a53ec9aa6760ecd4ad5a7", 0x80) ioctl$BINDER_THREAD_EXIT(r1, 0x40046208, 0x0) r2 = open(&(0x7f0000000280)='./file0/file0\x00', 0x4001, 0x0) pwrite64(r0, &(0x7f0000000340)="2056396eee515a0df7ba6afa1c278e3456884c27a3ceee844e1a82f8b548b4442e9e8db16a75643b517cc7938c84b73de4a26a29cf3cef5c3bb781bdadac1739e8584fceeb75890848b7b44fd00b370d4fb49142b69562e1a04285983ca824f41ebab1b9980e321312140dbd7d23489535cd35b89e7072e5df8f367bc27d3ca2c25a4e0464106e20cc4c703fae079d32abd372a61dac88b8b5a3f2e654a134baad46cc49dfd6f89573871f2419af36abf658e8476bca78a0d457682ef9a8534bf5ad48d0f735796b492210f63c914ca172e8f64551e12fdb437ce419522cf367915f249b", 0xe4, 0x0) socketpair$inet_udp(0x2, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ftruncate(r2, 0x80) ioctl$KVM_GET_PIT(r2, 0xc048ae65, &(0x7f00000002c0)) setsockopt$EBT_SO_SET_COUNTERS(r4, 0x0, 0x81, &(0x7f0000000180)={'nat\x00', 0x5, [{}, {}, {}, {}, {}]}, 0x78) ftruncate(r2, 0x1000) splice(r2, &(0x7f0000000080), r3, &(0x7f0000000200), 0x4, 0x4) 2018/04/13 21:34:28 executing program 6: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000540)={0x26, 'skcipher\x00', 0x0, 0x0, 'kw(aes-asm)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000ff8000)="0a0775b005e381e5b3b60ced5c54dbb7", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000000200)=[{0x0, 0x0, &(0x7f0000000000), 0x0, &(0x7f0000000280)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) sendmsg$IPVS_CMD_NEW_DAEMON(r1, &(0x7f00000002c0)={&(0x7f0000000040)={0x10}, 0xc, &(0x7f0000000240)={&(0x7f00000000c0)={0x18, 0x0, 0x0, 0x0, 0x0, {0x9}, [@IPVS_CMD_ATTR_SERVICE={0x4, 0x1}]}, 0x18}, 0x1}, 0x0) recvmsg(r1, &(0x7f0000000500)={&(0x7f0000000100)=@pppol2tpin6={0x0, 0x0, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, @mcast1}}}, 0x80, &(0x7f00000003c0)=[{&(0x7f0000000180)=""/106, 0x6a}], 0x1, &(0x7f0000000400)=""/203, 0xcb}, 0x0) 2018/04/13 21:34:28 executing program 0: mmap(&(0x7f0000003000/0x3000)=nil, 0x3000, 0x0, 0x2832, 0xffffffffffffffff, 0x0) r0 = socket$inet(0xa, 0x3, 0x5) ioctl$sock_SIOCGIFINDEX(r0, 0x8982, &(0x7f0000002ff2)) 2018/04/13 21:34:29 executing program 2: recvmsg(0xffffffffffffffff, &(0x7f000000e5b4)={&(0x7f000000b000)=@can, 0x10, &(0x7f0000002000)=[{&(0x7f0000000000)=""/237, 0x3c7}, {&(0x7f0000000fdb)=""/37, 0x9c}], 0x96b0cf4a6d2225a0, 0x0, 0xb5}, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x1, 0x5, &(0x7f0000002000)=@framed={{0x18, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe}, [@jmp={0x5, 0x0, 0x2}], {0x95}}, &(0x7f000000a000)='syzkaller\x00', 0x1, 0x31b, &(0x7f0000011000)=""/195}, 0x48) 2018/04/13 21:34:29 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f000025bfc8)={&(0x7f0000b9343a)={0x10}, 0xc, &(0x7f000033cff0)={&(0x7f000037c000)=@ipv4_delroute={0x34, 0x19, 0x1, 0x0, 0x0, {0x2, 0x20, 0x0, 0x0, 0xff, 0x0, 0xff}, [@RTA_FLOW={0x8, 0xb, 0xbc}, @RTA_PREFSRC={0x8, 0x7, @loopback=0x7f000001}, @RTA_DST={0x8, 0x1, @loopback=0x7f000001}]}, 0x34}, 0x1, 0x0, 0x0, 0x4007}, 0x4000000) 2018/04/13 21:34:29 executing program 1: syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f0000000100)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000010000)="eb3c906d6b66732e66617400020401000200027000f801", 0x17}], 0x0, &(0x7f0000000240)=ANY=[]) openat$vsock(0xffffffffffffff9c, &(0x7f0000000140)='/dev/vhost-vsock\x00', 0x2, 0x0) r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = open(&(0x7f0000000240)='./file0/file0\x00', 0x3fdfa, 0x0) write(r1, &(0x7f0000001200)="f858f0c637db5ccc708bd6cef167f826ab4a8a58266ae5093312240abe99b574541887d5e688c24bf3d745ace3a07e863db43e88d5d89df7727f717850b22b4e4ab511c59974b81f3f00e2506f772ea0b965d3540d01c1d7c141f88144c41ea48d6d7bc717399759cc4fcd8461ea8a9a4a7ea5cdcd2a53ec9aa6760ecd4ad5a7", 0x80) ioctl$BINDER_THREAD_EXIT(r1, 0x40046208, 0x0) r2 = open(&(0x7f0000000280)='./file0/file0\x00', 0x4001, 0x0) pwrite64(r0, &(0x7f0000000340)="2056396eee515a0df7ba6afa1c278e3456884c27a3ceee844e1a82f8b548b4442e9e8db16a75643b517cc7938c84b73de4a26a29cf3cef5c3bb781bdadac1739e8584fceeb75890848b7b44fd00b370d4fb49142b69562e1a04285983ca824f41ebab1b9980e321312140dbd7d23489535cd35b89e7072e5df8f367bc27d3ca2c25a4e0464106e20cc4c703fae079d32abd372a61dac88b8b5a3f2e654a134baad46cc49dfd6f89573871f2419af36abf658e8476bca78a0d457682ef9a8534bf5ad48d0f735796b492210f63c914ca172e8f64551e12fdb437ce419522cf367915f249b", 0xe4, 0x0) socketpair$inet_udp(0x2, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ftruncate(r2, 0x80) ioctl$KVM_GET_PIT(r2, 0xc048ae65, &(0x7f00000002c0)) setsockopt$EBT_SO_SET_COUNTERS(r4, 0x0, 0x81, &(0x7f0000000180)={'nat\x00', 0x5, [{}, {}, {}, {}, {}]}, 0x78) ftruncate(r2, 0x1000) splice(r2, &(0x7f0000000080), r3, &(0x7f0000000200), 0x4, 0x4) 2018/04/13 21:34:29 executing program 6: syz_open_dev$sndseq(&(0x7f0000000240)='/dev/snd/seq\x00', 0x0, 0x0) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000080)={0xffffffffffffffff, &(0x7f00000000c0)="b82283392dc50ff1fb635a5849d2f5916ae2fdc24e95e12aa8daccf7393e72be9cc66f"}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f0000346fd4)={0x0, 0x0, 0x0, 0x1000000000000004, 0x202}, 0x2c) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x1, 0x5, &(0x7f0000346fc8)=@framed={{0x18}, [@alu={0x8000000201a7f19, 0x0, 0x7, 0x0, 0x1}], {0x95}}, &(0x7f0000f6bffb)='GPL\x00', 0x0, 0x299, &(0x7f00001a7f05)=""/251}, 0x18) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000140)={r0, 0x50, &(0x7f00000000c0)}, 0x10) socketpair$inet_icmp(0x13, 0xc0a45352, 0xfffffffe, &(0x7f0000000380)) 2018/04/13 21:34:29 executing program 0: mmap(&(0x7f0000003000/0x3000)=nil, 0x3000, 0x0, 0x2832, 0xffffffffffffffff, 0x0) r0 = socket$inet(0xa, 0x3, 0x5) ioctl$sock_SIOCGIFINDEX(r0, 0x8982, &(0x7f0000002ff2)) 2018/04/13 21:34:29 executing program 4: perf_event_open(&(0x7f0000348f88)={0x2, 0x78, 0x3e2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000d65000)={&(0x7f0000897ff4)={0x10}, 0xc9, &(0x7f0000023000)={&(0x7f0000010dfc)={0x14, 0x5, 0x1, 0x1}, 0x14}, 0x1}, 0x0) 2018/04/13 21:34:29 executing program 7: clone(0x200, &(0x7f0000fbf000), &(0x7f0000c53000), &(0x7f0000000180), &(0x7f000025e000)) mknod(&(0x7f0000f80000)='./file0\x00', 0x1040, 0x0) execve(&(0x7f0000f8aff8)='./file0\x00', &(0x7f0000ca5fe8), &(0x7f00006fcff0)) r0 = inotify_init1(0x0) perf_event_open(&(0x7f0000014f88)={0x0, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fcntl$setown(r0, 0x8, 0xffffffffffffffff) fcntl$getownex(r0, 0x10, &(0x7f000045fff8)={0x0, 0x0}) r2 = getpgrp(0x0) kcmp(r1, r2, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) creat(&(0x7f0000000240)='./file0\x00', 0x0) 2018/04/13 21:34:29 executing program 3: syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f0000000100)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000010000)="eb3c906d6b66732e66617400020401000200027000f801", 0x17}], 0x0, &(0x7f0000000240)=ANY=[]) openat$vsock(0xffffffffffffff9c, &(0x7f0000000140)='/dev/vhost-vsock\x00', 0x2, 0x0) r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = open(&(0x7f0000000240)='./file0/file0\x00', 0x3fdfa, 0x0) write(r1, &(0x7f0000001200)="f858f0c637db5ccc708bd6cef167f826ab4a8a58266ae5093312240abe99b574541887d5e688c24bf3d745ace3a07e863db43e88d5d89df7727f717850b22b4e4ab511c59974b81f3f00e2506f772ea0b965d3540d01c1d7c141f88144c41ea48d6d7bc717399759cc4fcd8461ea8a9a4a7ea5cdcd2a53ec9aa6760ecd4ad5a7", 0x80) ioctl$BINDER_THREAD_EXIT(r1, 0x40046208, 0x0) r2 = open(&(0x7f0000000280)='./file0/file0\x00', 0x4001, 0x0) pwrite64(r0, &(0x7f0000000340)="2056396eee515a0df7ba6afa1c278e3456884c27a3ceee844e1a82f8b548b4442e9e8db16a75643b517cc7938c84b73de4a26a29cf3cef5c3bb781bdadac1739e8584fceeb75890848b7b44fd00b370d4fb49142b69562e1a04285983ca824f41ebab1b9980e321312140dbd7d23489535cd35b89e7072e5df8f367bc27d3ca2c25a4e0464106e20cc4c703fae079d32abd372a61dac88b8b5a3f2e654a134baad46cc49dfd6f89573871f2419af36abf658e8476bca78a0d457682ef9a8534bf5ad48d0f735796b492210f63c914ca172e8f64551e12fdb437ce419522cf367915f249b", 0xe4, 0x0) socketpair$inet_udp(0x2, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ftruncate(r2, 0x80) ioctl$KVM_GET_PIT(r2, 0xc048ae65, &(0x7f00000002c0)) setsockopt$EBT_SO_SET_COUNTERS(r4, 0x0, 0x81, &(0x7f0000000180)={'nat\x00', 0x5, [{}, {}, {}, {}, {}]}, 0x78) ftruncate(r2, 0x1000) splice(r2, &(0x7f0000000080), r3, &(0x7f0000000200), 0x4, 0x4) 2018/04/13 21:34:29 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000200)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(blowfish-asm)\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00003bcfd0)="d3ab2719", 0x4) sendmmsg$alg(r1, &(0x7f0000001240)=[{0x0, 0x0, &(0x7f0000000300)=[{&(0x7f00000002c0)="f7b190d22a41d3bd9b0b66cd09479eef323587169e9965146c10aee61cfb9e5ee01fd2b2e724ba609f43c91d15553a57e3e9627b6a1171bb", 0x38}], 0x1, &(0x7f0000000000)}], 0x1, 0x0) recvmsg(r1, &(0x7f0000002cc0)={&(0x7f0000002980)=@hci, 0x80, &(0x7f0000002b80)=[{&(0x7f0000002a00)=""/26, 0x1a}, {&(0x7f0000002b00)=""/96, 0x60}], 0x2, &(0x7f0000002bc0)=""/212, 0xd4}, 0x0) 2018/04/13 21:34:29 executing program 4: perf_event_open(&(0x7f0000348f88)={0x2, 0x78, 0x3e2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000d65000)={&(0x7f0000897ff4)={0x10}, 0xc9, &(0x7f0000023000)={&(0x7f0000010dfc)={0x14, 0x5, 0x1, 0x1}, 0x14}, 0x1}, 0x0) 2018/04/13 21:34:29 executing program 0: r0 = socket$inet6(0xa, 0x1000000000001, 0x0) setsockopt$inet6_int(r0, 0x29, 0x4c, &(0x7f0000000080)=0x7, 0x4) 2018/04/13 21:34:29 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f000025bfc8)={&(0x7f0000b9343a)={0x10}, 0xc, &(0x7f000033cff0)={&(0x7f000037c000)=@ipv4_delroute={0x34, 0x19, 0x1, 0x0, 0x0, {0x2, 0x20, 0x0, 0x0, 0xff, 0x0, 0xff}, [@RTA_FLOW={0x8, 0xb, 0xbc}, @RTA_PREFSRC={0x8, 0x7, @loopback=0x7f000001}, @RTA_DST={0x8, 0x1, @loopback=0x7f000001}]}, 0x34}, 0x1, 0x0, 0x0, 0x4007}, 0x4000000) 2018/04/13 21:34:29 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r1, r2, &(0x7f0000a98000/0x18000)=nil, &(0x7f0000000140)=[@text32={0x20, &(0x7f00000000c0)="66baf80cb8d3bed98aef66bafc0cb001ee66baf80cb8f338078eef66bafc0cb009eec4c2ed929cb0100001009aaa00000084006665d9f13e660f3226f36d0f01dfb8000001000f23d80f21f835c00000c00f23f8c4c16dea31", 0x59}], 0x1, 0x0, &(0x7f0000000180), 0x0) ioctl$KVM_SET_SREGS(r2, 0x4138ae84, &(0x7f0000c9bec8)={{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, 0xfffffffffffffffc, 0x0, 0x0, 0x400060}) 2018/04/13 21:34:29 executing program 6: syz_open_dev$sndseq(&(0x7f0000000240)='/dev/snd/seq\x00', 0x0, 0x0) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000080)={0xffffffffffffffff, &(0x7f00000000c0)="b82283392dc50ff1fb635a5849d2f5916ae2fdc24e95e12aa8daccf7393e72be9cc66f"}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f0000346fd4)={0x0, 0x0, 0x0, 0x1000000000000004, 0x202}, 0x2c) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x1, 0x5, &(0x7f0000346fc8)=@framed={{0x18}, [@alu={0x8000000201a7f19, 0x0, 0x7, 0x0, 0x1}], {0x95}}, &(0x7f0000f6bffb)='GPL\x00', 0x0, 0x299, &(0x7f00001a7f05)=""/251}, 0x18) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000140)={r0, 0x50, &(0x7f00000000c0)}, 0x10) socketpair$inet_icmp(0x13, 0xc0a45352, 0xfffffffe, &(0x7f0000000380)) 2018/04/13 21:34:29 executing program 3: perf_event_open(&(0x7f0000b5a000)={0x4000000002, 0x78, 0x1e2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$fuse(0xffffffffffffffff, &(0x7f000000afdf)={0x28, 0x0, 0x0, @fuse_notify_inval_inode_out}, 0x28) socketpair$inet(0x1e, 0x1, 0x0, &(0x7f00001b6ff8)={0x0, 0x0}) sendmsg$key(r1, &(0x7f0000d4c000)={0x0, 0x0, &(0x7f000089c000)={&(0x7f0000e6ce08)={0x2, 0x0, 0x0, 0x0, 0x2}, 0xffffffa3}, 0x1}, 0x0) recvmsg(r0, &(0x7f00002ed000)={&(0x7f0000559fec)=@ll={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @random}, 0x14, &(0x7f0000686fa0)=[{&(0x7f0000ae3000)=""/22, 0xffffff08}], 0x1, &(0x7f0000f1b000)=""/4096, 0xffffffffffffff73}, 0x121) 2018/04/13 21:34:29 executing program 0: r0 = socket$inet6(0xa, 0x1000000000001, 0x0) setsockopt$inet6_int(r0, 0x29, 0x4c, &(0x7f0000000080)=0x7, 0x4) 2018/04/13 21:34:29 executing program 5: r0 = socket$inet(0x2, 0x1, 0x0) perf_event_open(&(0x7f00000000c0)={0x2, 0x70, 0x3e6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getsockopt$IP_VS_SO_GET_DESTS(r0, 0x0, 0x484, &(0x7f0000000600)=""/4096, &(0x7f0000000040)=0x18) 2018/04/13 21:34:29 executing program 0: r0 = socket$inet6(0xa, 0x1000000000001, 0x0) setsockopt$inet6_int(r0, 0x29, 0x4c, &(0x7f0000000080)=0x7, 0x4) 2018/04/13 21:34:30 executing program 7: r0 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f00000000c0)={'bridge_slave_1\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f0000000240)={&(0x7f0000000000)={0x10}, 0xc, &(0x7f0000000200)={&(0x7f0000000180)=@bridge_delneigh={0x28, 0x1c, 0xf07, 0x0, 0x0, {0x7, 0x0, 0x0, r1, 0x6}, [@NDA_LLADDR={0xa, 0x2, @local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}}]}, 0x28}, 0x1}, 0x0) 2018/04/13 21:34:30 executing program 6: syz_open_dev$sndseq(&(0x7f0000000240)='/dev/snd/seq\x00', 0x0, 0x0) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000080)={0xffffffffffffffff, &(0x7f00000000c0)="b82283392dc50ff1fb635a5849d2f5916ae2fdc24e95e12aa8daccf7393e72be9cc66f"}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f0000346fd4)={0x0, 0x0, 0x0, 0x1000000000000004, 0x202}, 0x2c) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x1, 0x5, &(0x7f0000346fc8)=@framed={{0x18}, [@alu={0x8000000201a7f19, 0x0, 0x7, 0x0, 0x1}], {0x95}}, &(0x7f0000f6bffb)='GPL\x00', 0x0, 0x299, &(0x7f00001a7f05)=""/251}, 0x18) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000140)={r0, 0x50, &(0x7f00000000c0)}, 0x10) socketpair$inet_icmp(0x13, 0xc0a45352, 0xfffffffe, &(0x7f0000000380)) 2018/04/13 21:34:30 executing program 1: r0 = socket(0x40000000015, 0x5, 0x0) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f000015ffa8)={0x26, 'skcipher\x00', 0x0, 0x0, 'salsa20-asm\x00'}, 0x58) r2 = accept$alg(r1, 0x0, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f00000001c0)={0x0, 0x0}, &(0x7f0000000200)=0x5) setuid(r3) fsetxattr(r2, &(0x7f0000000140)=@random={'security.', '$\x00'}, &(0x7f0000000180)='skcipher\x00', 0x9, 0x0) 2018/04/13 21:34:30 executing program 0: r0 = socket$inet6(0xa, 0x1000000000001, 0x0) setsockopt$inet6_int(r0, 0x29, 0x4c, &(0x7f0000000080)=0x7, 0x4) 2018/04/13 21:34:30 executing program 4: r0 = socket(0x2000800000010, 0x2, 0x0) write(r0, &(0x7f0000000040)="26000000130047f100007fff590022ff001000e3010000000000000000ebff00060010000535", 0x26) 2018/04/13 21:34:30 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r1, r2, &(0x7f0000a98000/0x18000)=nil, &(0x7f0000000140)=[@text32={0x20, &(0x7f00000000c0)="66baf80cb8d3bed98aef66bafc0cb001ee66baf80cb8f338078eef66bafc0cb009eec4c2ed929cb0100001009aaa00000084006665d9f13e660f3226f36d0f01dfb8000001000f23d80f21f835c00000c00f23f8c4c16dea31", 0x59}], 0x1, 0x0, &(0x7f0000000180), 0x0) ioctl$KVM_SET_SREGS(r2, 0x4138ae84, &(0x7f0000c9bec8)={{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, 0xfffffffffffffffc, 0x0, 0x0, 0x400060}) 2018/04/13 21:34:30 executing program 5: r0 = socket$inet(0x2, 0x1, 0x0) perf_event_open(&(0x7f00000000c0)={0x2, 0x70, 0x3e6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getsockopt$IP_VS_SO_GET_DESTS(r0, 0x0, 0x484, &(0x7f0000000600)=""/4096, &(0x7f0000000040)=0x18) 2018/04/13 21:34:30 executing program 3: perf_event_open(&(0x7f0000b5a000)={0x4000000002, 0x78, 0x1e2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$fuse(0xffffffffffffffff, &(0x7f000000afdf)={0x28, 0x0, 0x0, @fuse_notify_inval_inode_out}, 0x28) socketpair$inet(0x1e, 0x1, 0x0, &(0x7f00001b6ff8)={0x0, 0x0}) sendmsg$key(r1, &(0x7f0000d4c000)={0x0, 0x0, &(0x7f000089c000)={&(0x7f0000e6ce08)={0x2, 0x0, 0x0, 0x0, 0x2}, 0xffffffa3}, 0x1}, 0x0) recvmsg(r0, &(0x7f00002ed000)={&(0x7f0000559fec)=@ll={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @random}, 0x14, &(0x7f0000686fa0)=[{&(0x7f0000ae3000)=""/22, 0xffffff08}], 0x1, &(0x7f0000f1b000)=""/4096, 0xffffffffffffff73}, 0x121) [ 350.909748] netlink: 'syz-executor4': attribute type 16 has an invalid length. 2018/04/13 21:34:30 executing program 1: r0 = socket(0x40000000015, 0x5, 0x0) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f000015ffa8)={0x26, 'skcipher\x00', 0x0, 0x0, 'salsa20-asm\x00'}, 0x58) r2 = accept$alg(r1, 0x0, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f00000001c0)={0x0, 0x0}, &(0x7f0000000200)=0x5) setuid(r3) fsetxattr(r2, &(0x7f0000000140)=@random={'security.', '$\x00'}, &(0x7f0000000180)='skcipher\x00', 0x9, 0x0) 2018/04/13 21:34:30 executing program 7: r0 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f00000000c0)={'bridge_slave_1\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f0000000240)={&(0x7f0000000000)={0x10}, 0xc, &(0x7f0000000200)={&(0x7f0000000180)=@bridge_delneigh={0x28, 0x1c, 0xf07, 0x0, 0x0, {0x7, 0x0, 0x0, r1, 0x6}, [@NDA_LLADDR={0xa, 0x2, @local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}}]}, 0x28}, 0x1}, 0x0) 2018/04/13 21:34:30 executing program 4: r0 = socket(0x2000800000010, 0x2, 0x0) write(r0, &(0x7f0000000040)="26000000130047f100007fff590022ff001000e3010000000000000000ebff00060010000535", 0x26) 2018/04/13 21:34:30 executing program 0: r0 = add_key(&(0x7f000019eff8)='keyring\x00', &(0x7f000001d000)={0x73, 0x79, 0x7a, 0x0}, 0x0, 0x0, 0xffffffffffffffff) keyctl$setperm(0x5, r0, 0xc0810) keyctl$search(0xa, r0, &(0x7f0000027ff8)='keyring\x00', &(0x7f0000000000)={0x73, 0x79, 0x7a, 0x0}, r0) 2018/04/13 21:34:30 executing program 5: r0 = socket$inet(0x2, 0x1, 0x0) perf_event_open(&(0x7f00000000c0)={0x2, 0x70, 0x3e6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getsockopt$IP_VS_SO_GET_DESTS(r0, 0x0, 0x484, &(0x7f0000000600)=""/4096, &(0x7f0000000040)=0x18) 2018/04/13 21:34:30 executing program 6: syz_open_dev$sndseq(&(0x7f0000000240)='/dev/snd/seq\x00', 0x0, 0x0) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000080)={0xffffffffffffffff, &(0x7f00000000c0)="b82283392dc50ff1fb635a5849d2f5916ae2fdc24e95e12aa8daccf7393e72be9cc66f"}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f0000346fd4)={0x0, 0x0, 0x0, 0x1000000000000004, 0x202}, 0x2c) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x1, 0x5, &(0x7f0000346fc8)=@framed={{0x18}, [@alu={0x8000000201a7f19, 0x0, 0x7, 0x0, 0x1}], {0x95}}, &(0x7f0000f6bffb)='GPL\x00', 0x0, 0x299, &(0x7f00001a7f05)=""/251}, 0x18) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000140)={r0, 0x50, &(0x7f00000000c0)}, 0x10) socketpair$inet_icmp(0x13, 0xc0a45352, 0xfffffffe, &(0x7f0000000380)) 2018/04/13 21:34:30 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r1, r2, &(0x7f0000a98000/0x18000)=nil, &(0x7f0000000140)=[@text32={0x20, &(0x7f00000000c0)="66baf80cb8d3bed98aef66bafc0cb001ee66baf80cb8f338078eef66bafc0cb009eec4c2ed929cb0100001009aaa00000084006665d9f13e660f3226f36d0f01dfb8000001000f23d80f21f835c00000c00f23f8c4c16dea31", 0x59}], 0x1, 0x0, &(0x7f0000000180), 0x0) ioctl$KVM_SET_SREGS(r2, 0x4138ae84, &(0x7f0000c9bec8)={{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, 0xfffffffffffffffc, 0x0, 0x0, 0x400060}) 2018/04/13 21:34:30 executing program 1: r0 = socket(0x40000000015, 0x5, 0x0) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f000015ffa8)={0x26, 'skcipher\x00', 0x0, 0x0, 'salsa20-asm\x00'}, 0x58) r2 = accept$alg(r1, 0x0, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f00000001c0)={0x0, 0x0}, &(0x7f0000000200)=0x5) setuid(r3) fsetxattr(r2, &(0x7f0000000140)=@random={'security.', '$\x00'}, &(0x7f0000000180)='skcipher\x00', 0x9, 0x0) 2018/04/13 21:34:30 executing program 5: r0 = socket$inet(0x2, 0x1, 0x0) perf_event_open(&(0x7f00000000c0)={0x2, 0x70, 0x3e6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getsockopt$IP_VS_SO_GET_DESTS(r0, 0x0, 0x484, &(0x7f0000000600)=""/4096, &(0x7f0000000040)=0x18) 2018/04/13 21:34:30 executing program 0: r0 = add_key(&(0x7f000019eff8)='keyring\x00', &(0x7f000001d000)={0x73, 0x79, 0x7a, 0x0}, 0x0, 0x0, 0xffffffffffffffff) keyctl$setperm(0x5, r0, 0xc0810) keyctl$search(0xa, r0, &(0x7f0000027ff8)='keyring\x00', &(0x7f0000000000)={0x73, 0x79, 0x7a, 0x0}, r0) [ 351.071601] netlink: 'syz-executor4': attribute type 16 has an invalid length. 2018/04/13 21:34:30 executing program 7: r0 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f00000000c0)={'bridge_slave_1\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f0000000240)={&(0x7f0000000000)={0x10}, 0xc, &(0x7f0000000200)={&(0x7f0000000180)=@bridge_delneigh={0x28, 0x1c, 0xf07, 0x0, 0x0, {0x7, 0x0, 0x0, r1, 0x6}, [@NDA_LLADDR={0xa, 0x2, @local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}}]}, 0x28}, 0x1}, 0x0) 2018/04/13 21:34:30 executing program 4: r0 = socket(0x2000800000010, 0x2, 0x0) write(r0, &(0x7f0000000040)="26000000130047f100007fff590022ff001000e3010000000000000000ebff00060010000535", 0x26) 2018/04/13 21:34:30 executing program 6: r0 = socket$rds(0x15, 0x5, 0x0) bind$rds(r0, &(0x7f0000002ff0)={0x2, 0x0, @loopback=0x7f000001}, 0x10) sendmsg$rds(r0, &(0x7f0000006fc8)={&(0x7f000000dff0)={0x2, 0x0, @multicast1=0xe0000001}, 0x10, &(0x7f0000004000), 0x0, &(0x7f0000010000)=[@rdma_args={0x48, 0x114, 0x1, {{}, {&(0x7f0000009000)=""/171, 0xab}, &(0x7f000000d000)=[{&(0x7f0000010000)=""/3, 0x3}], 0x1}}, @rdma_dest={0x18, 0x114, 0x2}], 0x60}, 0x0) 2018/04/13 21:34:30 executing program 1: r0 = socket(0x40000000015, 0x5, 0x0) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f000015ffa8)={0x26, 'skcipher\x00', 0x0, 0x0, 'salsa20-asm\x00'}, 0x58) r2 = accept$alg(r1, 0x0, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f00000001c0)={0x0, 0x0}, &(0x7f0000000200)=0x5) setuid(r3) fsetxattr(r2, &(0x7f0000000140)=@random={'security.', '$\x00'}, &(0x7f0000000180)='skcipher\x00', 0x9, 0x0) 2018/04/13 21:34:30 executing program 5: gettid() timer_create(0x9, &(0x7f0000044000)={0x0, 0x1000000000000017}, &(0x7f00008ec000)) timer_delete(0x0) [ 351.232365] netlink: 'syz-executor4': attribute type 16 has an invalid length. 2018/04/13 21:34:31 executing program 3: perf_event_open(&(0x7f0000b5a000)={0x4000000002, 0x78, 0x1e2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$fuse(0xffffffffffffffff, &(0x7f000000afdf)={0x28, 0x0, 0x0, @fuse_notify_inval_inode_out}, 0x28) socketpair$inet(0x1e, 0x1, 0x0, &(0x7f00001b6ff8)={0x0, 0x0}) sendmsg$key(r1, &(0x7f0000d4c000)={0x0, 0x0, &(0x7f000089c000)={&(0x7f0000e6ce08)={0x2, 0x0, 0x0, 0x0, 0x2}, 0xffffffa3}, 0x1}, 0x0) recvmsg(r0, &(0x7f00002ed000)={&(0x7f0000559fec)=@ll={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @random}, 0x14, &(0x7f0000686fa0)=[{&(0x7f0000ae3000)=""/22, 0xffffff08}], 0x1, &(0x7f0000f1b000)=""/4096, 0xffffffffffffff73}, 0x121) 2018/04/13 21:34:31 executing program 0: r0 = add_key(&(0x7f000019eff8)='keyring\x00', &(0x7f000001d000)={0x73, 0x79, 0x7a, 0x0}, 0x0, 0x0, 0xffffffffffffffff) keyctl$setperm(0x5, r0, 0xc0810) keyctl$search(0xa, r0, &(0x7f0000027ff8)='keyring\x00', &(0x7f0000000000)={0x73, 0x79, 0x7a, 0x0}, r0) 2018/04/13 21:34:31 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r1, r2, &(0x7f0000a98000/0x18000)=nil, &(0x7f0000000140)=[@text32={0x20, &(0x7f00000000c0)="66baf80cb8d3bed98aef66bafc0cb001ee66baf80cb8f338078eef66bafc0cb009eec4c2ed929cb0100001009aaa00000084006665d9f13e660f3226f36d0f01dfb8000001000f23d80f21f835c00000c00f23f8c4c16dea31", 0x59}], 0x1, 0x0, &(0x7f0000000180), 0x0) ioctl$KVM_SET_SREGS(r2, 0x4138ae84, &(0x7f0000c9bec8)={{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, 0xfffffffffffffffc, 0x0, 0x0, 0x400060}) 2018/04/13 21:34:31 executing program 6: r0 = socket$rds(0x15, 0x5, 0x0) bind$rds(r0, &(0x7f0000002ff0)={0x2, 0x0, @loopback=0x7f000001}, 0x10) sendmsg$rds(r0, &(0x7f0000006fc8)={&(0x7f000000dff0)={0x2, 0x0, @multicast1=0xe0000001}, 0x10, &(0x7f0000004000), 0x0, &(0x7f0000010000)=[@rdma_args={0x48, 0x114, 0x1, {{}, {&(0x7f0000009000)=""/171, 0xab}, &(0x7f000000d000)=[{&(0x7f0000010000)=""/3, 0x3}], 0x1}}, @rdma_dest={0x18, 0x114, 0x2}], 0x60}, 0x0) 2018/04/13 21:34:31 executing program 7: r0 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f00000000c0)={'bridge_slave_1\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f0000000240)={&(0x7f0000000000)={0x10}, 0xc, &(0x7f0000000200)={&(0x7f0000000180)=@bridge_delneigh={0x28, 0x1c, 0xf07, 0x0, 0x0, {0x7, 0x0, 0x0, r1, 0x6}, [@NDA_LLADDR={0xa, 0x2, @local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}}]}, 0x28}, 0x1}, 0x0) 2018/04/13 21:34:31 executing program 4: r0 = socket(0x2000800000010, 0x2, 0x0) write(r0, &(0x7f0000000040)="26000000130047f100007fff590022ff001000e3010000000000000000ebff00060010000535", 0x26) 2018/04/13 21:34:31 executing program 1: r0 = socket(0x10, 0x2, 0x0) write(r0, &(0x7f0000dd2f63)="24000000240007dd3200000800360300fbffffff0100000000000000ffffffff0100ff10", 0x24) 2018/04/13 21:34:31 executing program 5: gettid() timer_create(0x9, &(0x7f0000044000)={0x0, 0x1000000000000017}, &(0x7f00008ec000)) timer_delete(0x0) [ 351.924560] netlink: 'syz-executor4': attribute type 16 has an invalid length. 2018/04/13 21:34:31 executing program 7: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x1, 0x5, &(0x7f0000000080)=ANY=[@ANYBLOB="180000001000000000000000000000000500000000000000d4000000400000009500000000000000"], &(0x7f000001bff6)='syzkaller\x00', 0x1, 0xc3, &(0x7f0000011000)=""/195}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000280)={r0, 0x0, 0xe, 0x84, &(0x7f0000000100)="416fe71f79ef42537532367622c1", &(0x7f00000002c0)=""/132}, 0x28) 2018/04/13 21:34:31 executing program 5: gettid() timer_create(0x9, &(0x7f0000044000)={0x0, 0x1000000000000017}, &(0x7f00008ec000)) timer_delete(0x0) 2018/04/13 21:34:31 executing program 1: r0 = socket(0x10, 0x2, 0x0) write(r0, &(0x7f0000dd2f63)="24000000240007dd3200000800360300fbffffff0100000000000000ffffffff0100ff10", 0x24) 2018/04/13 21:34:31 executing program 0: r0 = add_key(&(0x7f000019eff8)='keyring\x00', &(0x7f000001d000)={0x73, 0x79, 0x7a, 0x0}, 0x0, 0x0, 0xffffffffffffffff) keyctl$setperm(0x5, r0, 0xc0810) keyctl$search(0xa, r0, &(0x7f0000027ff8)='keyring\x00', &(0x7f0000000000)={0x73, 0x79, 0x7a, 0x0}, r0) 2018/04/13 21:34:31 executing program 6: r0 = socket$rds(0x15, 0x5, 0x0) bind$rds(r0, &(0x7f0000002ff0)={0x2, 0x0, @loopback=0x7f000001}, 0x10) sendmsg$rds(r0, &(0x7f0000006fc8)={&(0x7f000000dff0)={0x2, 0x0, @multicast1=0xe0000001}, 0x10, &(0x7f0000004000), 0x0, &(0x7f0000010000)=[@rdma_args={0x48, 0x114, 0x1, {{}, {&(0x7f0000009000)=""/171, 0xab}, &(0x7f000000d000)=[{&(0x7f0000010000)=""/3, 0x3}], 0x1}}, @rdma_dest={0x18, 0x114, 0x2}], 0x60}, 0x0) 2018/04/13 21:34:31 executing program 4: syz_emit_ethernet(0x2a, &(0x7f0000000080)={@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, @empty, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x0, 0xffffff89, 0x0, @local={0xac, 0x223, 0x14, 0xaa}, @dev={0xac, 0x14, 0x14}}, @udp={0x0, 0x0, 0x8}}}}}, &(0x7f00000000c0)) 2018/04/13 21:34:31 executing program 2: r0 = accept4$bt_l2cap(0xffffffffffffffff, &(0x7f00000003c0), &(0x7f0000000400)=0xe, 0x800) getsockopt$IP_VS_SO_GET_TIMEOUT(r0, 0x0, 0x486, &(0x7f0000000440), &(0x7f0000000480)=0xc) r1 = socket$nl_route(0x10, 0x3, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000140)={0x0}, &(0x7f0000000300)=0xc) ioctl$sock_FIOSETOWN(r1, 0x8901, &(0x7f0000000340)=r2) r3 = socket(0x40000000015, 0x5, 0x0) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f00000001c0)={0x0, 0x0}, &(0x7f0000000200)=0x5) set_tid_address(&(0x7f0000000000)) setreuid(r4, r4) bind$pptp(r3, &(0x7f0000000100)={0x18, 0x2, {0x1, @local={0xac, 0x14, 0x14, 0xaa}}}, 0x34a) r5 = add_key$keyring(&(0x7f0000000180)='keyring\x00', &(0x7f0000000240)={0x73, 0x79, 0x7a, 0x2}, 0x0, 0x0, 0xffffffffffffffff) ioctl$sock_inet_SIOCSIFPFLAGS(r3, 0x8934, &(0x7f0000000080)={'rose0\x00', 0xfffffffffffff800}) socket$pptp(0x18, 0x1, 0x2) request_key(&(0x7f00000002c0)='user\x00', &(0x7f00000000c0)={0x73, 0x79, 0x7a}, &(0x7f0000000280)='logon\x00', r5) r6 = semget$private(0x0, 0x0, 0x0) socket$alg(0x26, 0x5, 0x0) semtimedop(r6, &(0x7f000001dfd6)=[{}], 0x1, &(0x7f0000380000)={0x101}) semctl$IPC_RMID(r6, 0x0, 0x0) semtimedop(0x0, &(0x7f0000033816), 0x0, &(0x7f0000034000)={0x77359400}) getpeername$packet(r3, &(0x7f0000002b80)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @dev}, &(0x7f0000002bc0)=0x14) setsockopt$packet_add_memb(r3, 0x107, 0x1, &(0x7f0000002c00)={r7, 0x1, 0x6, @remote={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xbb}}, 0x10) 2018/04/13 21:34:31 executing program 4: syz_emit_ethernet(0x2a, &(0x7f0000000080)={@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, @empty, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x0, 0xffffff89, 0x0, @local={0xac, 0x223, 0x14, 0xaa}, @dev={0xac, 0x14, 0x14}}, @udp={0x0, 0x0, 0x8}}}}}, &(0x7f00000000c0)) 2018/04/13 21:34:32 executing program 0: pipe2(&(0x7f0000989000)={0xffffffffffffffff}, 0x0) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x1, 0x32, 0xffffffffffffffff, 0x0) r1 = userfaultfd(0x0) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000bc8000)={0xaa}) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000d62fe0)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r2 = creat(&(0x7f000009aff8)='./file0\x00', 0x0) write$sndseq(r2, &(0x7f0000011fd2)=[{0x0, 0x0, 0x0, 0x0, @time, {}, {}, @time=@time={0x77359400}}], 0x30) mount(&(0x7f0000000300)='./file0\x00', &(0x7f0000000340)='./file0\x00', &(0x7f0000000100)='fuseblk\x00', 0x114c0, 0x0) mount(&(0x7f0000434ff8)='./file0\x00', &(0x7f0000abf000)='./file0\x00', &(0x7f0000000000)="dc", 0x1023404, 0x0) unlink(&(0x7f00003b3000)='./file0\x00') dup2(r0, r1) 2018/04/13 21:34:32 executing program 3: perf_event_open(&(0x7f0000b5a000)={0x4000000002, 0x78, 0x1e2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$fuse(0xffffffffffffffff, &(0x7f000000afdf)={0x28, 0x0, 0x0, @fuse_notify_inval_inode_out}, 0x28) socketpair$inet(0x1e, 0x1, 0x0, &(0x7f00001b6ff8)={0x0, 0x0}) sendmsg$key(r1, &(0x7f0000d4c000)={0x0, 0x0, &(0x7f000089c000)={&(0x7f0000e6ce08)={0x2, 0x0, 0x0, 0x0, 0x2}, 0xffffffa3}, 0x1}, 0x0) recvmsg(r0, &(0x7f00002ed000)={&(0x7f0000559fec)=@ll={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @random}, 0x14, &(0x7f0000686fa0)=[{&(0x7f0000ae3000)=""/22, 0xffffff08}], 0x1, &(0x7f0000f1b000)=""/4096, 0xffffffffffffff73}, 0x121) 2018/04/13 21:34:32 executing program 1: r0 = socket(0x10, 0x2, 0x0) write(r0, &(0x7f0000dd2f63)="24000000240007dd3200000800360300fbffffff0100000000000000ffffffff0100ff10", 0x24) 2018/04/13 21:34:32 executing program 7: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x1, 0x5, &(0x7f0000000080)=ANY=[@ANYBLOB="180000001000000000000000000000000500000000000000d4000000400000009500000000000000"], &(0x7f000001bff6)='syzkaller\x00', 0x1, 0xc3, &(0x7f0000011000)=""/195}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000280)={r0, 0x0, 0xe, 0x84, &(0x7f0000000100)="416fe71f79ef42537532367622c1", &(0x7f00000002c0)=""/132}, 0x28) 2018/04/13 21:34:32 executing program 5: gettid() timer_create(0x9, &(0x7f0000044000)={0x0, 0x1000000000000017}, &(0x7f00008ec000)) timer_delete(0x0) 2018/04/13 21:34:32 executing program 6: r0 = socket$rds(0x15, 0x5, 0x0) bind$rds(r0, &(0x7f0000002ff0)={0x2, 0x0, @loopback=0x7f000001}, 0x10) sendmsg$rds(r0, &(0x7f0000006fc8)={&(0x7f000000dff0)={0x2, 0x0, @multicast1=0xe0000001}, 0x10, &(0x7f0000004000), 0x0, &(0x7f0000010000)=[@rdma_args={0x48, 0x114, 0x1, {{}, {&(0x7f0000009000)=""/171, 0xab}, &(0x7f000000d000)=[{&(0x7f0000010000)=""/3, 0x3}], 0x1}}, @rdma_dest={0x18, 0x114, 0x2}], 0x60}, 0x0) 2018/04/13 21:34:32 executing program 4: syz_emit_ethernet(0x2a, &(0x7f0000000080)={@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, @empty, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x0, 0xffffff89, 0x0, @local={0xac, 0x223, 0x14, 0xaa}, @dev={0xac, 0x14, 0x14}}, @udp={0x0, 0x0, 0x8}}}}}, &(0x7f00000000c0)) 2018/04/13 21:34:32 executing program 2: r0 = accept4$bt_l2cap(0xffffffffffffffff, &(0x7f00000003c0), &(0x7f0000000400)=0xe, 0x800) getsockopt$IP_VS_SO_GET_TIMEOUT(r0, 0x0, 0x486, &(0x7f0000000440), &(0x7f0000000480)=0xc) r1 = socket$nl_route(0x10, 0x3, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000140)={0x0}, &(0x7f0000000300)=0xc) ioctl$sock_FIOSETOWN(r1, 0x8901, &(0x7f0000000340)=r2) r3 = socket(0x40000000015, 0x5, 0x0) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f00000001c0)={0x0, 0x0}, &(0x7f0000000200)=0x5) set_tid_address(&(0x7f0000000000)) setreuid(r4, r4) bind$pptp(r3, &(0x7f0000000100)={0x18, 0x2, {0x1, @local={0xac, 0x14, 0x14, 0xaa}}}, 0x34a) r5 = add_key$keyring(&(0x7f0000000180)='keyring\x00', &(0x7f0000000240)={0x73, 0x79, 0x7a, 0x2}, 0x0, 0x0, 0xffffffffffffffff) ioctl$sock_inet_SIOCSIFPFLAGS(r3, 0x8934, &(0x7f0000000080)={'rose0\x00', 0xfffffffffffff800}) socket$pptp(0x18, 0x1, 0x2) request_key(&(0x7f00000002c0)='user\x00', &(0x7f00000000c0)={0x73, 0x79, 0x7a}, &(0x7f0000000280)='logon\x00', r5) r6 = semget$private(0x0, 0x0, 0x0) socket$alg(0x26, 0x5, 0x0) semtimedop(r6, &(0x7f000001dfd6)=[{}], 0x1, &(0x7f0000380000)={0x101}) semctl$IPC_RMID(r6, 0x0, 0x0) semtimedop(0x0, &(0x7f0000033816), 0x0, &(0x7f0000034000)={0x77359400}) getpeername$packet(r3, &(0x7f0000002b80)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @dev}, &(0x7f0000002bc0)=0x14) setsockopt$packet_add_memb(r3, 0x107, 0x1, &(0x7f0000002c00)={r7, 0x1, 0x6, @remote={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xbb}}, 0x10) 2018/04/13 21:34:32 executing program 5: r0 = accept4$bt_l2cap(0xffffffffffffffff, &(0x7f00000003c0), &(0x7f0000000400)=0xe, 0x800) getsockopt$IP_VS_SO_GET_TIMEOUT(r0, 0x0, 0x486, &(0x7f0000000440), &(0x7f0000000480)=0xc) r1 = socket$nl_route(0x10, 0x3, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000140)={0x0}, &(0x7f0000000300)=0xc) ioctl$sock_FIOSETOWN(r1, 0x8901, &(0x7f0000000340)=r2) r3 = socket(0x40000000015, 0x5, 0x0) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f00000001c0)={0x0, 0x0}, &(0x7f0000000200)=0x5) set_tid_address(&(0x7f0000000000)) setreuid(r4, r4) bind$pptp(r3, &(0x7f0000000100)={0x18, 0x2, {0x1, @local={0xac, 0x14, 0x14, 0xaa}}}, 0x34a) r5 = add_key$keyring(&(0x7f0000000180)='keyring\x00', &(0x7f0000000240)={0x73, 0x79, 0x7a, 0x2}, 0x0, 0x0, 0xffffffffffffffff) ioctl$sock_inet_SIOCSIFPFLAGS(r3, 0x8934, &(0x7f0000000080)={'rose0\x00', 0xfffffffffffff800}) socket$pptp(0x18, 0x1, 0x2) request_key(&(0x7f00000002c0)='user\x00', &(0x7f00000000c0)={0x73, 0x79, 0x7a}, &(0x7f0000000280)='logon\x00', r5) r6 = semget$private(0x0, 0x0, 0x0) socket$alg(0x26, 0x5, 0x0) semtimedop(r6, &(0x7f000001dfd6)=[{}], 0x1, &(0x7f0000380000)={0x101}) semctl$IPC_RMID(r6, 0x0, 0x0) semtimedop(0x0, &(0x7f0000033816), 0x0, &(0x7f0000034000)={0x77359400}) getpeername$packet(r3, &(0x7f0000002b80)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @dev}, &(0x7f0000002bc0)=0x14) setsockopt$packet_add_memb(r3, 0x107, 0x1, &(0x7f0000002c00)={r7, 0x1, 0x6, @remote={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xbb}}, 0x10) 2018/04/13 21:34:32 executing program 7: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x1, 0x5, &(0x7f0000000080)=ANY=[@ANYBLOB="180000001000000000000000000000000500000000000000d4000000400000009500000000000000"], &(0x7f000001bff6)='syzkaller\x00', 0x1, 0xc3, &(0x7f0000011000)=""/195}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000280)={r0, 0x0, 0xe, 0x84, &(0x7f0000000100)="416fe71f79ef42537532367622c1", &(0x7f00000002c0)=""/132}, 0x28) 2018/04/13 21:34:32 executing program 1: r0 = socket(0x10, 0x2, 0x0) write(r0, &(0x7f0000dd2f63)="24000000240007dd3200000800360300fbffffff0100000000000000ffffffff0100ff10", 0x24) 2018/04/13 21:34:32 executing program 4: syz_emit_ethernet(0x2a, &(0x7f0000000080)={@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, @empty, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x0, 0xffffff89, 0x0, @local={0xac, 0x223, 0x14, 0xaa}, @dev={0xac, 0x14, 0x14}}, @udp={0x0, 0x0, 0x8}}}}}, &(0x7f00000000c0)) 2018/04/13 21:34:32 executing program 6: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000306000)={&(0x7f00003d7ff4)={0x10}, 0xc, &(0x7f00003b3000)={&(0x7f00001b87b0)=@newsa={0x104, 0x1a, 0x811, 0x0, 0x0, {{@in=@multicast1=0xe0000001, @in=@rand_addr}, {@in6, 0xffffffffffffffff, 0x2b}, @in=@loopback=0x7f000001, {}, {}, {}, 0x0, 0x0, 0xa}, [@coaddr={0x14, 0xe, @in=@local={0xac, 0x14, 0xffffffffffffffff, 0xaa}}]}, 0x104}, 0x1}, 0x0) 2018/04/13 21:34:32 executing program 2: r0 = accept4$bt_l2cap(0xffffffffffffffff, &(0x7f00000003c0), &(0x7f0000000400)=0xe, 0x800) getsockopt$IP_VS_SO_GET_TIMEOUT(r0, 0x0, 0x486, &(0x7f0000000440), &(0x7f0000000480)=0xc) r1 = socket$nl_route(0x10, 0x3, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000140)={0x0}, &(0x7f0000000300)=0xc) ioctl$sock_FIOSETOWN(r1, 0x8901, &(0x7f0000000340)=r2) r3 = socket(0x40000000015, 0x5, 0x0) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f00000001c0)={0x0, 0x0}, &(0x7f0000000200)=0x5) set_tid_address(&(0x7f0000000000)) setreuid(r4, r4) bind$pptp(r3, &(0x7f0000000100)={0x18, 0x2, {0x1, @local={0xac, 0x14, 0x14, 0xaa}}}, 0x34a) r5 = add_key$keyring(&(0x7f0000000180)='keyring\x00', &(0x7f0000000240)={0x73, 0x79, 0x7a, 0x2}, 0x0, 0x0, 0xffffffffffffffff) ioctl$sock_inet_SIOCSIFPFLAGS(r3, 0x8934, &(0x7f0000000080)={'rose0\x00', 0xfffffffffffff800}) socket$pptp(0x18, 0x1, 0x2) request_key(&(0x7f00000002c0)='user\x00', &(0x7f00000000c0)={0x73, 0x79, 0x7a}, &(0x7f0000000280)='logon\x00', r5) r6 = semget$private(0x0, 0x0, 0x0) socket$alg(0x26, 0x5, 0x0) semtimedop(r6, &(0x7f000001dfd6)=[{}], 0x1, &(0x7f0000380000)={0x101}) semctl$IPC_RMID(r6, 0x0, 0x0) semtimedop(0x0, &(0x7f0000033816), 0x0, &(0x7f0000034000)={0x77359400}) getpeername$packet(r3, &(0x7f0000002b80)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @dev}, &(0x7f0000002bc0)=0x14) setsockopt$packet_add_memb(r3, 0x107, 0x1, &(0x7f0000002c00)={r7, 0x1, 0x6, @remote={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xbb}}, 0x10) 2018/04/13 21:34:32 executing program 5: r0 = accept4$bt_l2cap(0xffffffffffffffff, &(0x7f00000003c0), &(0x7f0000000400)=0xe, 0x800) getsockopt$IP_VS_SO_GET_TIMEOUT(r0, 0x0, 0x486, &(0x7f0000000440), &(0x7f0000000480)=0xc) r1 = socket$nl_route(0x10, 0x3, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000140)={0x0}, &(0x7f0000000300)=0xc) ioctl$sock_FIOSETOWN(r1, 0x8901, &(0x7f0000000340)=r2) r3 = socket(0x40000000015, 0x5, 0x0) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f00000001c0)={0x0, 0x0}, &(0x7f0000000200)=0x5) set_tid_address(&(0x7f0000000000)) setreuid(r4, r4) bind$pptp(r3, &(0x7f0000000100)={0x18, 0x2, {0x1, @local={0xac, 0x14, 0x14, 0xaa}}}, 0x34a) r5 = add_key$keyring(&(0x7f0000000180)='keyring\x00', &(0x7f0000000240)={0x73, 0x79, 0x7a, 0x2}, 0x0, 0x0, 0xffffffffffffffff) ioctl$sock_inet_SIOCSIFPFLAGS(r3, 0x8934, &(0x7f0000000080)={'rose0\x00', 0xfffffffffffff800}) socket$pptp(0x18, 0x1, 0x2) request_key(&(0x7f00000002c0)='user\x00', &(0x7f00000000c0)={0x73, 0x79, 0x7a}, &(0x7f0000000280)='logon\x00', r5) r6 = semget$private(0x0, 0x0, 0x0) socket$alg(0x26, 0x5, 0x0) semtimedop(r6, &(0x7f000001dfd6)=[{}], 0x1, &(0x7f0000380000)={0x101}) semctl$IPC_RMID(r6, 0x0, 0x0) semtimedop(0x0, &(0x7f0000033816), 0x0, &(0x7f0000034000)={0x77359400}) getpeername$packet(r3, &(0x7f0000002b80)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @dev}, &(0x7f0000002bc0)=0x14) setsockopt$packet_add_memb(r3, 0x107, 0x1, &(0x7f0000002c00)={r7, 0x1, 0x6, @remote={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xbb}}, 0x10) 2018/04/13 21:34:32 executing program 1: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='net\x00') exit(0x0) fstat(r0, &(0x7f0000000140)) [ 353.013484] mip6: mip6_rthdr_init_state: spi is not 0: 4294967295 2018/04/13 21:34:33 executing program 0: pipe2(&(0x7f0000989000)={0xffffffffffffffff}, 0x0) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x1, 0x32, 0xffffffffffffffff, 0x0) r1 = userfaultfd(0x0) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000bc8000)={0xaa}) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000d62fe0)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r2 = creat(&(0x7f000009aff8)='./file0\x00', 0x0) write$sndseq(r2, &(0x7f0000011fd2)=[{0x0, 0x0, 0x0, 0x0, @time, {}, {}, @time=@time={0x77359400}}], 0x30) mount(&(0x7f0000000300)='./file0\x00', &(0x7f0000000340)='./file0\x00', &(0x7f0000000100)='fuseblk\x00', 0x114c0, 0x0) mount(&(0x7f0000434ff8)='./file0\x00', &(0x7f0000abf000)='./file0\x00', &(0x7f0000000000)="dc", 0x1023404, 0x0) unlink(&(0x7f00003b3000)='./file0\x00') dup2(r0, r1) 2018/04/13 21:34:33 executing program 1: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='net\x00') exit(0x0) fstat(r0, &(0x7f0000000140)) 2018/04/13 21:34:33 executing program 3: perf_event_open(&(0x7f0000348f88)={0x2, 0x70, 0x3e6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$inet_MCAST_MSFILTER(r0, 0x0, 0x11, &(0x7f0000000040)={0x0, {{0x2}}}, 0x90) setsockopt$IP_VS_SO_SET_ADD(r0, 0x0, 0x482, &(0x7f0000000100)={0x11, @multicast2=0xe0000002, 0x4e20, 0x1100, 'rr\x00', 0x5, 0x7, 0x25}, 0x2c) 2018/04/13 21:34:33 executing program 7: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x1, 0x5, &(0x7f0000000080)=ANY=[@ANYBLOB="180000001000000000000000000000000500000000000000d4000000400000009500000000000000"], &(0x7f000001bff6)='syzkaller\x00', 0x1, 0xc3, &(0x7f0000011000)=""/195}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000280)={r0, 0x0, 0xe, 0x84, &(0x7f0000000100)="416fe71f79ef42537532367622c1", &(0x7f00000002c0)=""/132}, 0x28) 2018/04/13 21:34:33 executing program 4: r0 = gettid() rt_sigprocmask(0x0, &(0x7f0000024000)={0xfffffffffffffffe}, 0x0, 0x8) timer_create(0x3, &(0x7f0000044000)={0x0, 0x14, 0x4, @tid=r0}, &(0x7f0000044000)) timer_settime(0x0, 0x1, &(0x7f0000046fe0)={{}, {0x0, 0x9}}, &(0x7f0000000000)) timer_settime(0x0, 0x1, &(0x7f0000040fe0)={{}, {0x0, 0x9}}, &(0x7f0000040000)) 2018/04/13 21:34:33 executing program 2: r0 = accept4$bt_l2cap(0xffffffffffffffff, &(0x7f00000003c0), &(0x7f0000000400)=0xe, 0x800) getsockopt$IP_VS_SO_GET_TIMEOUT(r0, 0x0, 0x486, &(0x7f0000000440), &(0x7f0000000480)=0xc) r1 = socket$nl_route(0x10, 0x3, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000140)={0x0}, &(0x7f0000000300)=0xc) ioctl$sock_FIOSETOWN(r1, 0x8901, &(0x7f0000000340)=r2) r3 = socket(0x40000000015, 0x5, 0x0) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f00000001c0)={0x0, 0x0}, &(0x7f0000000200)=0x5) set_tid_address(&(0x7f0000000000)) setreuid(r4, r4) bind$pptp(r3, &(0x7f0000000100)={0x18, 0x2, {0x1, @local={0xac, 0x14, 0x14, 0xaa}}}, 0x34a) r5 = add_key$keyring(&(0x7f0000000180)='keyring\x00', &(0x7f0000000240)={0x73, 0x79, 0x7a, 0x2}, 0x0, 0x0, 0xffffffffffffffff) ioctl$sock_inet_SIOCSIFPFLAGS(r3, 0x8934, &(0x7f0000000080)={'rose0\x00', 0xfffffffffffff800}) socket$pptp(0x18, 0x1, 0x2) request_key(&(0x7f00000002c0)='user\x00', &(0x7f00000000c0)={0x73, 0x79, 0x7a}, &(0x7f0000000280)='logon\x00', r5) r6 = semget$private(0x0, 0x0, 0x0) socket$alg(0x26, 0x5, 0x0) semtimedop(r6, &(0x7f000001dfd6)=[{}], 0x1, &(0x7f0000380000)={0x101}) semctl$IPC_RMID(r6, 0x0, 0x0) semtimedop(0x0, &(0x7f0000033816), 0x0, &(0x7f0000034000)={0x77359400}) getpeername$packet(r3, &(0x7f0000002b80)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @dev}, &(0x7f0000002bc0)=0x14) setsockopt$packet_add_memb(r3, 0x107, 0x1, &(0x7f0000002c00)={r7, 0x1, 0x6, @remote={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xbb}}, 0x10) 2018/04/13 21:34:33 executing program 5: r0 = accept4$bt_l2cap(0xffffffffffffffff, &(0x7f00000003c0), &(0x7f0000000400)=0xe, 0x800) getsockopt$IP_VS_SO_GET_TIMEOUT(r0, 0x0, 0x486, &(0x7f0000000440), &(0x7f0000000480)=0xc) r1 = socket$nl_route(0x10, 0x3, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000140)={0x0}, &(0x7f0000000300)=0xc) ioctl$sock_FIOSETOWN(r1, 0x8901, &(0x7f0000000340)=r2) r3 = socket(0x40000000015, 0x5, 0x0) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f00000001c0)={0x0, 0x0}, &(0x7f0000000200)=0x5) set_tid_address(&(0x7f0000000000)) setreuid(r4, r4) bind$pptp(r3, &(0x7f0000000100)={0x18, 0x2, {0x1, @local={0xac, 0x14, 0x14, 0xaa}}}, 0x34a) r5 = add_key$keyring(&(0x7f0000000180)='keyring\x00', &(0x7f0000000240)={0x73, 0x79, 0x7a, 0x2}, 0x0, 0x0, 0xffffffffffffffff) ioctl$sock_inet_SIOCSIFPFLAGS(r3, 0x8934, &(0x7f0000000080)={'rose0\x00', 0xfffffffffffff800}) socket$pptp(0x18, 0x1, 0x2) request_key(&(0x7f00000002c0)='user\x00', &(0x7f00000000c0)={0x73, 0x79, 0x7a}, &(0x7f0000000280)='logon\x00', r5) r6 = semget$private(0x0, 0x0, 0x0) socket$alg(0x26, 0x5, 0x0) semtimedop(r6, &(0x7f000001dfd6)=[{}], 0x1, &(0x7f0000380000)={0x101}) semctl$IPC_RMID(r6, 0x0, 0x0) semtimedop(0x0, &(0x7f0000033816), 0x0, &(0x7f0000034000)={0x77359400}) getpeername$packet(r3, &(0x7f0000002b80)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @dev}, &(0x7f0000002bc0)=0x14) setsockopt$packet_add_memb(r3, 0x107, 0x1, &(0x7f0000002c00)={r7, 0x1, 0x6, @remote={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xbb}}, 0x10) 2018/04/13 21:34:33 executing program 6: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000306000)={&(0x7f00003d7ff4)={0x10}, 0xc, &(0x7f00003b3000)={&(0x7f00001b87b0)=@newsa={0x104, 0x1a, 0x811, 0x0, 0x0, {{@in=@multicast1=0xe0000001, @in=@rand_addr}, {@in6, 0xffffffffffffffff, 0x2b}, @in=@loopback=0x7f000001, {}, {}, {}, 0x0, 0x0, 0xa}, [@coaddr={0x14, 0xe, @in=@local={0xac, 0x14, 0xffffffffffffffff, 0xaa}}]}, 0x104}, 0x1}, 0x0) 2018/04/13 21:34:33 executing program 4: r0 = gettid() rt_sigprocmask(0x0, &(0x7f0000024000)={0xfffffffffffffffe}, 0x0, 0x8) timer_create(0x3, &(0x7f0000044000)={0x0, 0x14, 0x4, @tid=r0}, &(0x7f0000044000)) timer_settime(0x0, 0x1, &(0x7f0000046fe0)={{}, {0x0, 0x9}}, &(0x7f0000000000)) timer_settime(0x0, 0x1, &(0x7f0000040fe0)={{}, {0x0, 0x9}}, &(0x7f0000040000)) 2018/04/13 21:34:33 executing program 7: r0 = gettid() rt_sigprocmask(0x0, &(0x7f0000024000)={0xfffffffffffffffe}, 0x0, 0x8) timer_create(0x3, &(0x7f0000044000)={0x0, 0x14, 0x4, @tid=r0}, &(0x7f0000044000)) timer_settime(0x0, 0x1, &(0x7f0000046fe0)={{}, {0x0, 0x9}}, &(0x7f0000000000)) timer_settime(0x0, 0x1, &(0x7f0000040fe0)={{}, {0x0, 0x9}}, &(0x7f0000040000)) 2018/04/13 21:34:33 executing program 2: syz_read_part_table(0x0, 0x1, &(0x7f0000001ac0)=[{&(0x7f0000000a00)="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", 0x200}]) 2018/04/13 21:34:33 executing program 3: perf_event_open(&(0x7f0000348f88)={0x2, 0x70, 0x3e6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$inet_MCAST_MSFILTER(r0, 0x0, 0x11, &(0x7f0000000040)={0x0, {{0x2}}}, 0x90) setsockopt$IP_VS_SO_SET_ADD(r0, 0x0, 0x482, &(0x7f0000000100)={0x11, @multicast2=0xe0000002, 0x4e20, 0x1100, 'rr\x00', 0x5, 0x7, 0x25}, 0x2c) [ 354.123354] mip6: mip6_rthdr_init_state: spi is not 0: 4294967295 2018/04/13 21:34:33 executing program 6: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000306000)={&(0x7f00003d7ff4)={0x10}, 0xc, &(0x7f00003b3000)={&(0x7f00001b87b0)=@newsa={0x104, 0x1a, 0x811, 0x0, 0x0, {{@in=@multicast1=0xe0000001, @in=@rand_addr}, {@in6, 0xffffffffffffffff, 0x2b}, @in=@loopback=0x7f000001, {}, {}, {}, 0x0, 0x0, 0xa}, [@coaddr={0x14, 0xe, @in=@local={0xac, 0x14, 0xffffffffffffffff, 0xaa}}]}, 0x104}, 0x1}, 0x0) 2018/04/13 21:34:33 executing program 5: perf_event_open(&(0x7f0000348f88)={0x2, 0x70, 0x3e6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$inet_MCAST_MSFILTER(r0, 0x0, 0x11, &(0x7f0000000040)={0x0, {{0x2}}}, 0x90) setsockopt$IP_VS_SO_SET_ADD(r0, 0x0, 0x482, &(0x7f0000000100)={0x11, @multicast2=0xe0000002, 0x4e20, 0x1100, 'rr\x00', 0x5, 0x7, 0x25}, 0x2c) 2018/04/13 21:34:33 executing program 7: r0 = gettid() rt_sigprocmask(0x0, &(0x7f0000024000)={0xfffffffffffffffe}, 0x0, 0x8) timer_create(0x3, &(0x7f0000044000)={0x0, 0x14, 0x4, @tid=r0}, &(0x7f0000044000)) timer_settime(0x0, 0x1, &(0x7f0000046fe0)={{}, {0x0, 0x9}}, &(0x7f0000000000)) timer_settime(0x0, 0x1, &(0x7f0000040fe0)={{}, {0x0, 0x9}}, &(0x7f0000040000)) 2018/04/13 21:34:33 executing program 4: r0 = gettid() rt_sigprocmask(0x0, &(0x7f0000024000)={0xfffffffffffffffe}, 0x0, 0x8) timer_create(0x3, &(0x7f0000044000)={0x0, 0x14, 0x4, @tid=r0}, &(0x7f0000044000)) timer_settime(0x0, 0x1, &(0x7f0000046fe0)={{}, {0x0, 0x9}}, &(0x7f0000000000)) timer_settime(0x0, 0x1, &(0x7f0000040fe0)={{}, {0x0, 0x9}}, &(0x7f0000040000)) [ 354.251591] mip6: mip6_rthdr_init_state: spi is not 0: 4294967295 2018/04/13 21:34:34 executing program 0: pipe2(&(0x7f0000989000)={0xffffffffffffffff}, 0x0) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x1, 0x32, 0xffffffffffffffff, 0x0) r1 = userfaultfd(0x0) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000bc8000)={0xaa}) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000d62fe0)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r2 = creat(&(0x7f000009aff8)='./file0\x00', 0x0) write$sndseq(r2, &(0x7f0000011fd2)=[{0x0, 0x0, 0x0, 0x0, @time, {}, {}, @time=@time={0x77359400}}], 0x30) mount(&(0x7f0000000300)='./file0\x00', &(0x7f0000000340)='./file0\x00', &(0x7f0000000100)='fuseblk\x00', 0x114c0, 0x0) mount(&(0x7f0000434ff8)='./file0\x00', &(0x7f0000abf000)='./file0\x00', &(0x7f0000000000)="dc", 0x1023404, 0x0) unlink(&(0x7f00003b3000)='./file0\x00') dup2(r0, r1) 2018/04/13 21:34:34 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r1, r2, &(0x7f000000d000/0x18000)=nil, &(0x7f00000000c0)=[@text64={0x40, &(0x7f0000000180)="440f2200c482a9376e00b935030000b801000000ba000000000f30c744240000a00000c744240200400000c7442406000000000f0114242e45d228c4818d584f0dc4c2d8f35acbc443f96bc70d66ba6100ecb805000000b9000000000f01c1", 0x5f}], 0x1, 0x0, &(0x7f0000000200), 0x0) r3 = dup3(r2, r0, 0x0) ioctl$KVM_RUN(r3, 0xae80, 0x0) 2018/04/13 21:34:34 executing program 3: perf_event_open(&(0x7f0000348f88)={0x2, 0x70, 0x3e6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$inet_MCAST_MSFILTER(r0, 0x0, 0x11, &(0x7f0000000040)={0x0, {{0x2}}}, 0x90) setsockopt$IP_VS_SO_SET_ADD(r0, 0x0, 0x482, &(0x7f0000000100)={0x11, @multicast2=0xe0000002, 0x4e20, 0x1100, 'rr\x00', 0x5, 0x7, 0x25}, 0x2c) 2018/04/13 21:34:34 executing program 5: perf_event_open(&(0x7f0000348f88)={0x2, 0x70, 0x3e6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$inet_MCAST_MSFILTER(r0, 0x0, 0x11, &(0x7f0000000040)={0x0, {{0x2}}}, 0x90) setsockopt$IP_VS_SO_SET_ADD(r0, 0x0, 0x482, &(0x7f0000000100)={0x11, @multicast2=0xe0000002, 0x4e20, 0x1100, 'rr\x00', 0x5, 0x7, 0x25}, 0x2c) 2018/04/13 21:34:34 executing program 6: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000306000)={&(0x7f00003d7ff4)={0x10}, 0xc, &(0x7f00003b3000)={&(0x7f00001b87b0)=@newsa={0x104, 0x1a, 0x811, 0x0, 0x0, {{@in=@multicast1=0xe0000001, @in=@rand_addr}, {@in6, 0xffffffffffffffff, 0x2b}, @in=@loopback=0x7f000001, {}, {}, {}, 0x0, 0x0, 0xa}, [@coaddr={0x14, 0xe, @in=@local={0xac, 0x14, 0xffffffffffffffff, 0xaa}}]}, 0x104}, 0x1}, 0x0) 2018/04/13 21:34:34 executing program 7: r0 = gettid() rt_sigprocmask(0x0, &(0x7f0000024000)={0xfffffffffffffffe}, 0x0, 0x8) timer_create(0x3, &(0x7f0000044000)={0x0, 0x14, 0x4, @tid=r0}, &(0x7f0000044000)) timer_settime(0x0, 0x1, &(0x7f0000046fe0)={{}, {0x0, 0x9}}, &(0x7f0000000000)) timer_settime(0x0, 0x1, &(0x7f0000040fe0)={{}, {0x0, 0x9}}, &(0x7f0000040000)) 2018/04/13 21:34:34 executing program 4: r0 = gettid() rt_sigprocmask(0x0, &(0x7f0000024000)={0xfffffffffffffffe}, 0x0, 0x8) timer_create(0x3, &(0x7f0000044000)={0x0, 0x14, 0x4, @tid=r0}, &(0x7f0000044000)) timer_settime(0x0, 0x1, &(0x7f0000046fe0)={{}, {0x0, 0x9}}, &(0x7f0000000000)) timer_settime(0x0, 0x1, &(0x7f0000040fe0)={{}, {0x0, 0x9}}, &(0x7f0000040000)) 2018/04/13 21:34:34 executing program 1: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='net\x00') exit(0x0) fstat(r0, &(0x7f0000000140)) 2018/04/13 21:34:34 executing program 7: r0 = socket$inet6_udp(0xa, 0x2, 0x0) sendmmsg(r0, &(0x7f0000f56000)=[{{&(0x7f0000b46000)=@in6={0x2, 0x1}, 0x1c, &(0x7f00000f9000), 0x0, &(0x7f000003cc48)=[{0x142, 0x29, 0x32}], 0x1e8}}], 0x1, 0x0) 2018/04/13 21:34:34 executing program 4: mlock(&(0x7f0000001000/0x8000)=nil, 0x8000) msync(&(0x7f0000000000/0xd000)=nil, 0xd000, 0x6) [ 355.051584] mip6: mip6_rthdr_init_state: spi is not 0: 4294967295 2018/04/13 21:34:34 executing program 5: perf_event_open(&(0x7f0000348f88)={0x2, 0x70, 0x3e6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$inet_MCAST_MSFILTER(r0, 0x0, 0x11, &(0x7f0000000040)={0x0, {{0x2}}}, 0x90) setsockopt$IP_VS_SO_SET_ADD(r0, 0x0, 0x482, &(0x7f0000000100)={0x11, @multicast2=0xe0000002, 0x4e20, 0x1100, 'rr\x00', 0x5, 0x7, 0x25}, 0x2c) 2018/04/13 21:34:34 executing program 6: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$inet6_MCAST_MSFILTER(r0, 0x29, 0x2f, &(0x7f0000bb2000)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x1, [], 0x1}}}, 0x1}, 0x90) 2018/04/13 21:34:34 executing program 3: perf_event_open(&(0x7f0000348f88)={0x2, 0x70, 0x3e6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$inet_MCAST_MSFILTER(r0, 0x0, 0x11, &(0x7f0000000040)={0x0, {{0x2}}}, 0x90) setsockopt$IP_VS_SO_SET_ADD(r0, 0x0, 0x482, &(0x7f0000000100)={0x11, @multicast2=0xe0000002, 0x4e20, 0x1100, 'rr\x00', 0x5, 0x7, 0x25}, 0x2c) 2018/04/13 21:34:34 executing program 4: mlock(&(0x7f0000001000/0x8000)=nil, 0x8000) msync(&(0x7f0000000000/0xd000)=nil, 0xd000, 0x6) 2018/04/13 21:34:34 executing program 7: r0 = socket$inet6_udp(0xa, 0x2, 0x0) sendmmsg(r0, &(0x7f0000f56000)=[{{&(0x7f0000b46000)=@in6={0x2, 0x1}, 0x1c, &(0x7f00000f9000), 0x0, &(0x7f000003cc48)=[{0x142, 0x29, 0x32}], 0x1e8}}], 0x1, 0x0) 2018/04/13 21:34:34 executing program 3: clock_nanosleep(0x2, 0x0, &(0x7f0000b85000)={0x0, 0x1c9c380}, &(0x7f0000001540)) r0 = gettid() timer_create(0x0, &(0x7f0000044000)={0x0, 0x12}, &(0x7f0000044000)) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x8}, {0x0, 0x9}}, &(0x7f0000040000)) mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x0, 0x32, 0xffffffffffffffff, 0x0) tkill(r0, 0x16) 2018/04/13 21:34:35 executing program 0: pipe2(&(0x7f0000989000)={0xffffffffffffffff}, 0x0) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x1, 0x32, 0xffffffffffffffff, 0x0) r1 = userfaultfd(0x0) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000bc8000)={0xaa}) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000d62fe0)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r2 = creat(&(0x7f000009aff8)='./file0\x00', 0x0) write$sndseq(r2, &(0x7f0000011fd2)=[{0x0, 0x0, 0x0, 0x0, @time, {}, {}, @time=@time={0x77359400}}], 0x30) mount(&(0x7f0000000300)='./file0\x00', &(0x7f0000000340)='./file0\x00', &(0x7f0000000100)='fuseblk\x00', 0x114c0, 0x0) mount(&(0x7f0000434ff8)='./file0\x00', &(0x7f0000abf000)='./file0\x00', &(0x7f0000000000)="dc", 0x1023404, 0x0) unlink(&(0x7f00003b3000)='./file0\x00') dup2(r0, r1) 2018/04/13 21:34:35 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r1, r2, &(0x7f000000d000/0x18000)=nil, &(0x7f00000000c0)=[@text64={0x40, &(0x7f0000000180)="440f2200c482a9376e00b935030000b801000000ba000000000f30c744240000a00000c744240200400000c7442406000000000f0114242e45d228c4818d584f0dc4c2d8f35acbc443f96bc70d66ba6100ecb805000000b9000000000f01c1", 0x5f}], 0x1, 0x0, &(0x7f0000000200), 0x0) r3 = dup3(r2, r0, 0x0) ioctl$KVM_RUN(r3, 0xae80, 0x0) 2018/04/13 21:34:35 executing program 4: mlock(&(0x7f0000001000/0x8000)=nil, 0x8000) msync(&(0x7f0000000000/0xd000)=nil, 0xd000, 0x6) 2018/04/13 21:34:35 executing program 5: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f0000deb000)={0x2, 0x4e23, @broadcast=0xffffffff}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f00006dc000)=[{0x6, 0x0, 0x0, 0xa1}]}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000040)='dctcp\x00', 0x6) sendto$inet(r0, &(0x7f0000000140), 0x0, 0x200007ff, &(0x7f0000003e00)={0x2, 0x4e23}, 0x10) sendto$inet(r0, &(0x7f00006fd000)="c3401c344654f3c7d9b41ba48c8e399aa4eedc3d6bd8ebd65c856a27d61154adc2b2a9763ae0201c0d32e11f38e9dd18c58f6bd779650fc30f93653bdaecf323c9f6502ceab47e58114347b289546465a5eb278de12b1989f64cc99412e36880d20c34d91051b22f6c8acc9d082b7bcdec844f667da0867d08d4154004997e317b79", 0x82, 0x51, &(0x7f0000e66000)={0x2, 0x0, @rand_addr}, 0x10) recvmsg(r0, &(0x7f0000000440)={&(0x7f0000000100)=@pptp={0x0, 0x0, {0x0, @dev}}, 0x80, &(0x7f0000000080)=[{&(0x7f0000000280)=""/141, 0x8d}], 0x1, &(0x7f00000003c0)=""/127, 0x7f}, 0x0) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000180)='bbr\x00', 0x4) writev(r0, &(0x7f0000df9000)=[{&(0x7f0000354ff8)='\'', 0x1}], 0x1) 2018/04/13 21:34:35 executing program 7: r0 = socket$inet6_udp(0xa, 0x2, 0x0) sendmmsg(r0, &(0x7f0000f56000)=[{{&(0x7f0000b46000)=@in6={0x2, 0x1}, 0x1c, &(0x7f00000f9000), 0x0, &(0x7f000003cc48)=[{0x142, 0x29, 0x32}], 0x1e8}}], 0x1, 0x0) 2018/04/13 21:34:35 executing program 6: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$inet6_MCAST_MSFILTER(r0, 0x29, 0x2f, &(0x7f0000bb2000)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x1, [], 0x1}}}, 0x1}, 0x90) 2018/04/13 21:34:35 executing program 1: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='net\x00') exit(0x0) fstat(r0, &(0x7f0000000140)) 2018/04/13 21:34:35 executing program 3: clock_nanosleep(0x2, 0x0, &(0x7f0000b85000)={0x0, 0x1c9c380}, &(0x7f0000001540)) r0 = gettid() timer_create(0x0, &(0x7f0000044000)={0x0, 0x12}, &(0x7f0000044000)) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x8}, {0x0, 0x9}}, &(0x7f0000040000)) mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x0, 0x32, 0xffffffffffffffff, 0x0) tkill(r0, 0x16) 2018/04/13 21:34:35 executing program 4: mlock(&(0x7f0000001000/0x8000)=nil, 0x8000) msync(&(0x7f0000000000/0xd000)=nil, 0xd000, 0x6) 2018/04/13 21:34:35 executing program 7: r0 = socket$inet6_udp(0xa, 0x2, 0x0) sendmmsg(r0, &(0x7f0000f56000)=[{{&(0x7f0000b46000)=@in6={0x2, 0x1}, 0x1c, &(0x7f00000f9000), 0x0, &(0x7f000003cc48)=[{0x142, 0x29, 0x32}], 0x1e8}}], 0x1, 0x0) 2018/04/13 21:34:35 executing program 6: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$inet6_MCAST_MSFILTER(r0, 0x29, 0x2f, &(0x7f0000bb2000)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x1, [], 0x1}}}, 0x1}, 0x90) 2018/04/13 21:34:35 executing program 4: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x10, 0x802, 0x0) write(r0, &(0x7f00000000c0)="22000000150007010009d6f400010004020800000100000009000100000100000115", 0x22) 2018/04/13 21:34:35 executing program 5: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f0000deb000)={0x2, 0x4e23, @broadcast=0xffffffff}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f00006dc000)=[{0x6, 0x0, 0x0, 0xa1}]}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000040)='dctcp\x00', 0x6) sendto$inet(r0, &(0x7f0000000140), 0x0, 0x200007ff, &(0x7f0000003e00)={0x2, 0x4e23}, 0x10) sendto$inet(r0, &(0x7f00006fd000)="c3401c344654f3c7d9b41ba48c8e399aa4eedc3d6bd8ebd65c856a27d61154adc2b2a9763ae0201c0d32e11f38e9dd18c58f6bd779650fc30f93653bdaecf323c9f6502ceab47e58114347b289546465a5eb278de12b1989f64cc99412e36880d20c34d91051b22f6c8acc9d082b7bcdec844f667da0867d08d4154004997e317b79", 0x82, 0x51, &(0x7f0000e66000)={0x2, 0x0, @rand_addr}, 0x10) recvmsg(r0, &(0x7f0000000440)={&(0x7f0000000100)=@pptp={0x0, 0x0, {0x0, @dev}}, 0x80, &(0x7f0000000080)=[{&(0x7f0000000280)=""/141, 0x8d}], 0x1, &(0x7f00000003c0)=""/127, 0x7f}, 0x0) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000180)='bbr\x00', 0x4) writev(r0, &(0x7f0000df9000)=[{&(0x7f0000354ff8)='\'', 0x1}], 0x1) 2018/04/13 21:34:35 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r1, r2, &(0x7f000000d000/0x18000)=nil, &(0x7f00000000c0)=[@text64={0x40, &(0x7f0000000180)="440f2200c482a9376e00b935030000b801000000ba000000000f30c744240000a00000c744240200400000c7442406000000000f0114242e45d228c4818d584f0dc4c2d8f35acbc443f96bc70d66ba6100ecb805000000b9000000000f01c1", 0x5f}], 0x1, 0x0, &(0x7f0000000200), 0x0) r3 = dup3(r2, r0, 0x0) ioctl$KVM_RUN(r3, 0xae80, 0x0) 2018/04/13 21:34:35 executing program 6: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$inet6_MCAST_MSFILTER(r0, 0x29, 0x2f, &(0x7f0000bb2000)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x1, [], 0x1}}}, 0x1}, 0x90) 2018/04/13 21:34:35 executing program 7: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_DEFAULT_SNDINFO(r0, 0x84, 0x22, &(0x7f0000000340), 0x1) [ 356.359113] netlink: 'syz-executor4': attribute type 1 has an invalid length. [ 356.397747] netlink: 'syz-executor4': attribute type 1 has an invalid length. 2018/04/13 21:34:36 executing program 3: clock_nanosleep(0x2, 0x0, &(0x7f0000b85000)={0x0, 0x1c9c380}, &(0x7f0000001540)) r0 = gettid() timer_create(0x0, &(0x7f0000044000)={0x0, 0x12}, &(0x7f0000044000)) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x8}, {0x0, 0x9}}, &(0x7f0000040000)) mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x0, 0x32, 0xffffffffffffffff, 0x0) tkill(r0, 0x16) 2018/04/13 21:34:36 executing program 7: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_DEFAULT_SNDINFO(r0, 0x84, 0x22, &(0x7f0000000340), 0x1) 2018/04/13 21:34:36 executing program 6: sendmsg$alg(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000001340)}, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @loopback={0x0, 0x1}}, 0x1c) sendmmsg(r0, &(0x7f0000007e00)=[{{0x0, 0x0, &(0x7f0000000380), 0x0, &(0x7f00000003c0)}}, {{&(0x7f00000004c0)=@in6={0xa, 0x4e22, 0x0, @mcast2={0xff, 0x2, [], 0x1}}, 0x80, &(0x7f0000000680), 0x0, &(0x7f0000000080)=[{0x18, 0x29, 0x4, "89"}], 0x18}}], 0x2, 0x0) 2018/04/13 21:34:36 executing program 5: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f0000deb000)={0x2, 0x4e23, @broadcast=0xffffffff}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f00006dc000)=[{0x6, 0x0, 0x0, 0xa1}]}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000040)='dctcp\x00', 0x6) sendto$inet(r0, &(0x7f0000000140), 0x0, 0x200007ff, &(0x7f0000003e00)={0x2, 0x4e23}, 0x10) sendto$inet(r0, &(0x7f00006fd000)="c3401c344654f3c7d9b41ba48c8e399aa4eedc3d6bd8ebd65c856a27d61154adc2b2a9763ae0201c0d32e11f38e9dd18c58f6bd779650fc30f93653bdaecf323c9f6502ceab47e58114347b289546465a5eb278de12b1989f64cc99412e36880d20c34d91051b22f6c8acc9d082b7bcdec844f667da0867d08d4154004997e317b79", 0x82, 0x51, &(0x7f0000e66000)={0x2, 0x0, @rand_addr}, 0x10) recvmsg(r0, &(0x7f0000000440)={&(0x7f0000000100)=@pptp={0x0, 0x0, {0x0, @dev}}, 0x80, &(0x7f0000000080)=[{&(0x7f0000000280)=""/141, 0x8d}], 0x1, &(0x7f00000003c0)=""/127, 0x7f}, 0x0) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000180)='bbr\x00', 0x4) writev(r0, &(0x7f0000df9000)=[{&(0x7f0000354ff8)='\'', 0x1}], 0x1) 2018/04/13 21:34:36 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r1, r2, &(0x7f000000d000/0x18000)=nil, &(0x7f00000000c0)=[@text64={0x40, &(0x7f0000000180)="440f2200c482a9376e00b935030000b801000000ba000000000f30c744240000a00000c744240200400000c7442406000000000f0114242e45d228c4818d584f0dc4c2d8f35acbc443f96bc70d66ba6100ecb805000000b9000000000f01c1", 0x5f}], 0x1, 0x0, &(0x7f0000000200), 0x0) r3 = dup3(r2, r0, 0x0) ioctl$KVM_RUN(r3, 0xae80, 0x0) 2018/04/13 21:34:36 executing program 4: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x10, 0x802, 0x0) write(r0, &(0x7f00000000c0)="22000000150007010009d6f400010004020800000100000009000100000100000115", 0x22) 2018/04/13 21:34:36 executing program 0: perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$key(0xf, 0x3, 0x2) setsockopt$sock_int(r0, 0x1, 0x2c, &(0x7f0000000100), 0xc842) sendmsg$key(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000140)=ANY=[@ANYBLOB="02150306070000002abd7000fedbdf5848660e9a9815c5000a004e2106000000ff0200000f53000000000000000000014d000000000100000067f8a5324e78d42a2ce3439f5df134825bf3ba297bd53bf44121f862fc3132f74dc08fe06f54fbeb73352345088739a587d33eacb3207b81ea7334b9af25bd3536ba684c78"], 0x7e}, 0x1}, 0x80000000000010) sendmsg$key(r0, &(0x7f0000003000)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000400)=ANY=[@ANYBLOB="020a00000200000000000005000000e52524d10de5549457dc69edb3f0d966054c20de9a379db679ae308d24f16d987755449a6afb15f9ae06d1a54276f048f1261dba6824826813385f03309b15009aa718f3c1869a56faf24fdc4b1f02b8dd246022d0d9b7d745d35b7329173e0b"], 0x6f}, 0x1}, 0x0) setitimer(0x0, &(0x7f0000000fe0)={{0x100000000000, 0x2710}, {0x77359400}}, &(0x7f0000000fe0)) remap_file_pages(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x5, 0x6bbc, 0x20003) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000140)="2e2f6367726f757000361a6f74a1b774b8642f3dfdd313d92946ff0167415d8dc22791dcd496520c1c99f4b07d3b2a11090000000229210b73abdcd2986fc290ac9b6ace278586d39949a54fb276eb1fd3964b0cad27e417b33abb8d3b00e64e75e4dff47de27536dccdde5fc746b04faafcec347560a31b3a35a5f20bc949d75cbb763987", 0x200002, 0x0) openat$cgroup_procs(r1, &(0x7f0000000000)='cgroup.threads\x00', 0x2, 0x0) r2 = getpgid(0xffffffffffffffff) sched_rr_get_interval(r2, &(0x7f0000000480)) socket(0xb, 0x3, 0x5) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000240)={{{@in=@loopback, @in6=@mcast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@broadcast}, 0x0, @in6=@remote}}, &(0x7f0000000100)=0xe8) lstat(&(0x7f0000000340)='./file0\x00', &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) syz_fuseblk_mount(&(0x7f0000000080)='./file0\x00', &(0x7f0000000200)='./file0\x00', 0xa000, r3, r4, 0x80, 0x4, 0x2000) syz_open_dev$vcsn(&(0x7f0000000040)='/dev/vcs#\x00', 0x0, 0x0) 2018/04/13 21:34:36 executing program 1: r0 = socket(0x10, 0x802, 0x0) write(r0, &(0x7f0000000000)="24000000200025f0071c0165ff0ffc0e020000000010000002e1000c08000b0000000000", 0x24) 2018/04/13 21:34:36 executing program 6: sendmsg$alg(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000001340)}, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @loopback={0x0, 0x1}}, 0x1c) sendmmsg(r0, &(0x7f0000007e00)=[{{0x0, 0x0, &(0x7f0000000380), 0x0, &(0x7f00000003c0)}}, {{&(0x7f00000004c0)=@in6={0xa, 0x4e22, 0x0, @mcast2={0xff, 0x2, [], 0x1}}, 0x80, &(0x7f0000000680), 0x0, &(0x7f0000000080)=[{0x18, 0x29, 0x4, "89"}], 0x18}}], 0x2, 0x0) 2018/04/13 21:34:36 executing program 1: r0 = socket(0x10, 0x802, 0x0) write(r0, &(0x7f0000000000)="24000000200025f0071c0165ff0ffc0e020000000010000002e1000c08000b0000000000", 0x24) 2018/04/13 21:34:36 executing program 7: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_DEFAULT_SNDINFO(r0, 0x84, 0x22, &(0x7f0000000340), 0x1) [ 357.101848] netlink: 'syz-executor4': attribute type 1 has an invalid length. 2018/04/13 21:34:36 executing program 4: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x10, 0x802, 0x0) write(r0, &(0x7f00000000c0)="22000000150007010009d6f400010004020800000100000009000100000100000115", 0x22) 2018/04/13 21:34:36 executing program 5: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f0000deb000)={0x2, 0x4e23, @broadcast=0xffffffff}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f00006dc000)=[{0x6, 0x0, 0x0, 0xa1}]}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000040)='dctcp\x00', 0x6) sendto$inet(r0, &(0x7f0000000140), 0x0, 0x200007ff, &(0x7f0000003e00)={0x2, 0x4e23}, 0x10) sendto$inet(r0, &(0x7f00006fd000)="c3401c344654f3c7d9b41ba48c8e399aa4eedc3d6bd8ebd65c856a27d61154adc2b2a9763ae0201c0d32e11f38e9dd18c58f6bd779650fc30f93653bdaecf323c9f6502ceab47e58114347b289546465a5eb278de12b1989f64cc99412e36880d20c34d91051b22f6c8acc9d082b7bcdec844f667da0867d08d4154004997e317b79", 0x82, 0x51, &(0x7f0000e66000)={0x2, 0x0, @rand_addr}, 0x10) recvmsg(r0, &(0x7f0000000440)={&(0x7f0000000100)=@pptp={0x0, 0x0, {0x0, @dev}}, 0x80, &(0x7f0000000080)=[{&(0x7f0000000280)=""/141, 0x8d}], 0x1, &(0x7f00000003c0)=""/127, 0x7f}, 0x0) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000180)='bbr\x00', 0x4) writev(r0, &(0x7f0000df9000)=[{&(0x7f0000354ff8)='\'', 0x1}], 0x1) 2018/04/13 21:34:36 executing program 2: r0 = syz_open_dev$sndtimer(&(0x7f00004f6000)='/dev/snd/timer\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0xd15000)=nil, 0xd15000, 0x0, 0x32, 0xffffffffffffffff, 0x0) ioctl$SNDRV_TIMER_IOCTL_SELECT(r0, 0x40345410, &(0x7f0000029fcc)) 2018/04/13 21:34:36 executing program 7: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_DEFAULT_SNDINFO(r0, 0x84, 0x22, &(0x7f0000000340), 0x1) 2018/04/13 21:34:36 executing program 1: r0 = socket(0x10, 0x802, 0x0) write(r0, &(0x7f0000000000)="24000000200025f0071c0165ff0ffc0e020000000010000002e1000c08000b0000000000", 0x24) [ 357.238232] netlink: 'syz-executor4': attribute type 1 has an invalid length.