INIT: Entering runlevel: 2 [info] Using makefile-style concurrent boot in runlevel 2. [....] Starting enhanced syslogd: rsyslogd[?25l[?1c7[ ok 8[?25h[?0c. [....] Starting periodic command scheduler: cron[?25l[?1c7[ ok 8[?25h[?0c. [....] Starting OpenBSD Secure Shell server: sshd[?25l[?1c7[ ok 8[?25h[?0c. Debian GNU/Linux 7 syzkaller ttyS0 Warning: Permanently added '10.128.0.46' (ECDSA) to the list of known hosts. 2018/04/07 08:14:32 fuzzer started 2018/04/07 08:14:32 dialing manager at 10.128.0.26:38639 2018/04/07 08:14:38 kcov=true, comps=false 2018/04/07 08:14:41 executing program 0: set_mempolicy(0x2, &(0x7f00000002c0)=0x81, 0x8001) r0 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback={0x0, 0x1}}], 0x1c) connect$inet6(r0, &(0x7f00008c0000)={0xa, 0x4e23, 0x0, @loopback={0x0, 0x1}}, 0x1c) 2018/04/07 08:14:41 executing program 2: r0 = socket$unix(0x1, 0x2, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f00000001c0)={'ip6gretap0\x00', &(0x7f0000000180)=@ethtool_cmd={0x9}}) 2018/04/07 08:14:41 executing program 7: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x10000000013, &(0x7f000039c000)=0x400000000000001, 0x4) setsockopt$inet_tcp_int(r0, 0x6, 0x14, &(0x7f0000000040)=0x2, 0xfd7c) r1 = dup2(r0, r0) setsockopt$inet_tcp_int(r1, 0x6, 0x15, &(0x7f0000000000), 0x4) 2018/04/07 08:14:41 executing program 3: r0 = getpgrp(0x0) r1 = gettid() rt_sigprocmask(0x0, &(0x7f0000032ff8)={0xfffffffffffffffe}, 0x0, 0x8) rt_tgsigqueueinfo(r0, r1, 0x12, &(0x7f00003efff0)={0x0, 0x0, 0x2fffd}) r2 = signalfd4(0xffffffffffffffff, &(0x7f0000000ff8)={0xfffffffffffffdb0}, 0x8, 0x0) mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x0, 0x32, 0xffffffffffffffff, 0x0) read(r2, &(0x7f0000950000)=""/128, 0x80) 2018/04/07 08:14:41 executing program 1: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f0000e2d000)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$VHOST_SET_FEATURES(r0, 0x4008af00, &(0x7f0000e4e000)=0x200000000) write$vnet(r0, &(0x7f0000a8d000)={0x1, {&(0x7f0000c91000)=""/24, 0xfffffedb, &(0x7f0000b4cf9b)=""/101, 0x0, 0x2}}, 0x5aa) perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$vnet(r0, &(0x7f00005ebf98)={0x1, {&(0x7f0000f29fe4)=""/28, 0x1c, &(0x7f0000e9afb7)=""/73, 0x0, 0x3}}, 0x68) 2018/04/07 08:14:41 executing program 4: capset(&(0x7f00000fc000)={0x19980330}, &(0x7f0000000000)) prctl$intptr(0x2f, 0x2) 2018/04/07 08:14:41 executing program 5: r0 = socket(0x11, 0x4000000000080003, 0x0) fcntl$setflags(r0, 0x2, 0x0) 2018/04/07 08:14:41 executing program 6: mknod(&(0x7f0000000ffa)='./bus\x00', 0x1000, 0x0) creat(&(0x7f0000ccb000)='./bus\x00', 0x0) open(&(0x7f0000043000)='./bus\x00', 0x0, 0x0) open(&(0x7f0000000000)='./bus\x00', 0x80c7e, 0x0) syzkaller login: [ 41.905179] ip (3758) used greatest stack depth: 54672 bytes left [ 42.489837] ip (3812) used greatest stack depth: 54408 bytes left [ 43.403417] ip (3904) used greatest stack depth: 54200 bytes left [ 43.663820] ip (3924) used greatest stack depth: 53656 bytes left [ 45.597783] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 45.613082] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 45.650637] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 45.693336] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 45.701669] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 45.717004] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 45.787930] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 45.950152] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 54.601575] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 54.614361] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 54.624928] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 54.659168] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 54.714335] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 54.735682] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 54.745208] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 54.850168] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 55.362358] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 55.368660] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 55.384889] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 55.419434] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 55.429137] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 55.439316] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 55.447115] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 55.463726] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 55.493698] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 55.517714] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 55.540470] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 55.560667] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 55.571714] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 55.578258] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 55.594652] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 55.607938] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 55.617060] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 55.630408] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 55.648557] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 55.677866] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 55.707722] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 55.739170] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 55.765720] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 55.789681] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 56.539353] capability: warning: `syz-executor4' uses 32-bit capabilities (legacy support in use) 2018/04/07 08:14:58 executing program 7: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt(r0, 0x84, 0x7d, &(0x7f0000000fc8)="b131e9dc0137e4da", 0x8) r1 = socket$inet_sctp(0x2, 0x1, 0x84) ioctl$VT_DISALLOCATE(r1, 0x5608) getsockopt$inet_sctp_SCTP_DEFAULT_PRINFO(r1, 0x84, 0x72, &(0x7f0000000180)={0x0, 0x0, 0x10}, &(0x7f00000001c0)=0xc) setsockopt$inet_sctp6_SCTP_RECONFIG_SUPPORTED(0xffffffffffffffff, 0x84, 0x75, &(0x7f0000000200), 0x8) sendto$inet(0xffffffffffffffff, &(0x7f0000000000), 0x0, 0x0, &(0x7f0000000000)={0x2, 0x4e20, @multicast1=0xe0000001}, 0x10) setsockopt$inet_sctp6_SCTP_RTOINFO(0xffffffffffffffff, 0x84, 0x0, &(0x7f0000000240), 0x10) setsockopt$inet_sctp_SCTP_MAXSEG(r1, 0x84, 0xd, &(0x7f0000000140), 0x4) 2018/04/07 08:14:58 executing program 4: r0 = syz_open_dev$sndtimer(&(0x7f0000014000)='/dev/snd/timer\x00', 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_TREAD(r0, 0x40045402, &(0x7f000001dffc)=0x1) ioctl$SNDRV_TIMER_IOCTL_SELECT(r0, 0x40345410, &(0x7f0000001000)={{0x100000001}}) read(r0, &(0x7f0000021fe0)=""/32, 0x20) ioctl$SNDRV_TIMER_IOCTL_PARAMS(r0, 0x40505412, &(0x7f000001cfb0)={0x0, 0x1, 0x0, 0x0, 0xf}) r1 = dup2(r0, r0) ioctl$SNDRV_TIMER_IOCTL_START(r0, 0x54a0) ioctl$SNDRV_TIMER_IOCTL_START(r1, 0x54a0) [ 56.828516] sctp: [Deprecated]: syz-executor7 (pid 5070) Use of int in maxseg socket option. [ 56.828516] Use struct sctp_assoc_value instead [ 56.918804] sctp: [Deprecated]: syz-executor7 (pid 5079) Use of int in maxseg socket option. [ 56.918804] Use struct sctp_assoc_value instead 2018/04/07 08:14:59 executing program 4: perf_event_open(&(0x7f0000220000)={0x2, 0x78, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff7fffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f000068b000)='./file0\x00', 0x0) r0 = open(&(0x7f0000f14ff8)='./file0\x00', 0x0, 0x0) ioctl$int_out(r0, 0xc0189436, &(0x7f000000a000)) 2018/04/07 08:14:59 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000c00)={'tunl0\x00', 0x0}) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x1, 0x3, &(0x7f00000000c0)=@framed={{0x18}, [], {0x95}}, &(0x7f0000000100)='syzkaller\x00', 0x0, 0x12, &(0x7f0000000140)=""/18, 0x0, 0x0, [], r1}, 0x48) 2018/04/07 08:14:59 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000447000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(blowfish)\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000330d27)="d3ab2719", 0x4) sendmmsg$alg(r1, &(0x7f000059cfc8)=[{0x0, 0x0, &(0x7f0000283000)=[{&(0x7f00005a7000)="d1a4edc6ada830966dc07a7d9eda5a84d6acd04108a8778ef7bdb8de20dadf839b76eae0e7790d9454e3218626070927707fd45c81e73272b7ebc618d39458b5db41ebef9c78743b4aeab1813d5349a9", 0x50}], 0x1, &(0x7f0000000140)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmsg(r1, &(0x7f0000000340)={&(0x7f0000000000)=@alg, 0x58, &(0x7f00000002c0)=[{&(0x7f0000000080)=""/81, 0x51}], 0x1}, 0x0) 2018/04/07 08:14:59 executing program 5: mkdir(&(0x7f0000e29000)='./file0\x00', 0x0) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000026ff8)='./file0\x00', &(0x7f000000c000)='ramfs\x00', 0x0, &(0x7f00000002c0)) mount(&(0x7f0000037000)='./file0\x00', &(0x7f0000c4fff8)='./file0\x00', &(0x7f0000000080)="72616f04d99d69fb1933f8fc9d0d5200", 0x100000, &(0x7f0000ce3000)) creat(&(0x7f000016cff8)='./file0/file0\x00', 0x0) mount(&(0x7f000011dff2)='./file0/file0\x00', &(0x7f0000917000)='./file0/file0\x00', &(0x7f0000467000)='xfs\x00', 0x1000, 0x0) mount(&(0x7f0000f27ff2)='./file0/file0\x00', &(0x7f00002faff8)='./file0/file0\x00', &(0x7f0000239000)='\x00v\t', 0x1004, &(0x7f0000a06000)) mount(&(0x7f0000000200)='./file0/file0\x00', &(0x7f00000000c0)='./file0\x00', &(0x7f0000000280)='ncpfs\x00', 0x84000, &(0x7f00000002c0)) 2018/04/07 08:14:59 executing program 6: r0 = syz_open_procfs(0x0, &(0x7f0000000200)='oom_score_adj\x00') setsockopt$inet_sctp6_SCTP_ENABLE_STREAM_RESET(0xffffffffffffffff, 0x84, 0x76, &(0x7f00000000c0)={0x0, 0x4}, 0x2cf) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000000)) preadv(r0, &(0x7f0000000040)=[{&(0x7f0000000080)=""/1, 0x1}], 0x2000000000000021, 0x0) 2018/04/07 08:14:59 executing program 2: r0 = getpgrp(0x0) r1 = gettid() rt_sigprocmask(0x0, &(0x7f0000032ff8)={0xfffffffffffffffe}, 0x0, 0x8) rt_tgsigqueueinfo(r0, r1, 0x7, &(0x7f000058a000)={0x0, 0x0, 0x5}) r2 = signalfd4(0xffffffffffffffff, &(0x7f0000006000)={0x7fffffff}, 0x8, 0x0) readv(r2, &(0x7f0000000240)=[{&(0x7f0000000140)=""/208, 0xd0}], 0x1) 2018/04/07 08:14:59 executing program 7: r0 = syz_open_procfs(0x0, &(0x7f0000030ff8)='pagemap\x00') r1 = memfd_create(&(0x7f0000000ffc)='$\x00', 0x0) mmap(&(0x7f0000ffe000/0x1000)=nil, 0x1000, 0x0, 0x11, r1, 0x0) sendfile(r1, r0, &(0x7f0000000200)=0x100000, 0x10000) 2018/04/07 08:14:59 executing program 1: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f0000e2d000)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$VHOST_SET_FEATURES(r0, 0x4008af00, &(0x7f0000e4e000)=0x200000000) write$vnet(r0, &(0x7f0000a8d000)={0x1, {&(0x7f0000c91000)=""/24, 0xfffffedb, &(0x7f0000b4cf9b)=""/101, 0x0, 0x2}}, 0x5aa) perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$vnet(r0, &(0x7f00005ebf98)={0x1, {&(0x7f0000f29fe4)=""/28, 0x1c, &(0x7f0000e9afb7)=""/73, 0x0, 0x3}}, 0x68) 2018/04/07 08:14:59 executing program 2: r0 = getpgrp(0x0) r1 = gettid() rt_sigprocmask(0x0, &(0x7f0000032ff8)={0xfffffffffffffffe}, 0x0, 0x8) rt_tgsigqueueinfo(r0, r1, 0x7, &(0x7f000058a000)={0x0, 0x0, 0x5}) r2 = signalfd4(0xffffffffffffffff, &(0x7f0000006000)={0x7fffffff}, 0x8, 0x0) readv(r2, &(0x7f0000000240)=[{&(0x7f0000000140)=""/208, 0xd0}], 0x1) 2018/04/07 08:14:59 executing program 7: r0 = syz_open_procfs(0x0, &(0x7f0000030ff8)='pagemap\x00') r1 = memfd_create(&(0x7f0000000ffc)='$\x00', 0x0) mmap(&(0x7f0000ffe000/0x1000)=nil, 0x1000, 0x0, 0x11, r1, 0x0) sendfile(r1, r0, &(0x7f0000000200)=0x100000, 0x10000) 2018/04/07 08:15:00 executing program 6: r0 = syz_open_dev$vcsn(&(0x7f0000932ff6)='/dev/vcs#\x00', 0x1, 0x0) lseek(r0, 0x35, 0x1) 2018/04/07 08:15:00 executing program 0: io_setup(0xba, &(0x7f0000000000)=0x0) r1 = socket(0x2, 0x803, 0x1) connect$inet(r1, &(0x7f0000000100)={0x2, 0x4e20, @remote={0xac, 0x14, 0x14, 0xbb}}, 0x10) io_submit(r0, 0x1, &(0x7f0000000300)=[&(0x7f0000000180)={0x0, 0x0, 0x0, 0x1, 0x0, r1, &(0x7f0000000100)}]) 2018/04/07 08:15:00 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000447000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(blowfish)\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000330d27)="d3ab2719", 0x4) sendmmsg$alg(r1, &(0x7f000059cfc8)=[{0x0, 0x0, &(0x7f0000283000)=[{&(0x7f00005a7000)="d1a4edc6ada830966dc07a7d9eda5a84d6acd04108a8778ef7bdb8de20dadf839b76eae0e7790d9454e3218626070927707fd45c81e73272b7ebc618d39458b5db41ebef9c78743b4aeab1813d5349a9", 0x50}], 0x1, &(0x7f0000000140)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmsg(r1, &(0x7f0000000340)={&(0x7f0000000000)=@alg, 0x58, &(0x7f00000002c0)=[{&(0x7f0000000080)=""/81, 0x51}], 0x1}, 0x0) 2018/04/07 08:15:00 executing program 1: r0 = socket(0x20000000000000a, 0x2, 0x0) connect$inet6(r0, &(0x7f000004bfe4)={0xa, 0x4e20, 0x0, @dev={0xfe, 0x80}, 0x6}, 0x1c) perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$sock_buf(r0, 0x1, 0x19, &(0x7f0000e530e9)=""/16, &(0x7f0000000000)=0x170) 2018/04/07 08:15:00 executing program 4: r0 = socket$inet_dccp(0x2, 0x6, 0x0) getsockopt$ARPT_SO_GET_INFO(r0, 0x0, 0x60, &(0x7f0000000000)={'filter\x00'}, &(0x7f00000000c0)=0x298) 2018/04/07 08:15:00 executing program 5: mkdir(&(0x7f0000e29000)='./file0\x00', 0x0) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000026ff8)='./file0\x00', &(0x7f000000c000)='ramfs\x00', 0x0, &(0x7f00000002c0)) mount(&(0x7f0000037000)='./file0\x00', &(0x7f0000c4fff8)='./file0\x00', &(0x7f0000000080)="72616f04d99d69fb1933f8fc9d0d5200", 0x100000, &(0x7f0000ce3000)) creat(&(0x7f000016cff8)='./file0/file0\x00', 0x0) mount(&(0x7f000011dff2)='./file0/file0\x00', &(0x7f0000917000)='./file0/file0\x00', &(0x7f0000467000)='xfs\x00', 0x1000, 0x0) mount(&(0x7f0000f27ff2)='./file0/file0\x00', &(0x7f00002faff8)='./file0/file0\x00', &(0x7f0000239000)='\x00v\t', 0x1004, &(0x7f0000a06000)) mount(&(0x7f0000000200)='./file0/file0\x00', &(0x7f00000000c0)='./file0\x00', &(0x7f0000000280)='ncpfs\x00', 0x84000, &(0x7f00000002c0)) 2018/04/07 08:15:00 executing program 7: r0 = syz_open_procfs(0x0, &(0x7f0000030ff8)='pagemap\x00') r1 = memfd_create(&(0x7f0000000ffc)='$\x00', 0x0) mmap(&(0x7f0000ffe000/0x1000)=nil, 0x1000, 0x0, 0x11, r1, 0x0) sendfile(r1, r0, &(0x7f0000000200)=0x100000, 0x10000) 2018/04/07 08:15:00 executing program 2: mmap(&(0x7f0000000000/0xf000)=nil, 0xf000, 0x2000004, 0x32, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x80003, 0xef) getsockopt$IP6T_SO_GET_ENTRIES(r0, 0x29, 0x41, &(0x7f0000000140)={'filter\x00'}, &(0x7f0000000000)=0x24) 2018/04/07 08:15:00 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000447000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(blowfish)\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000330d27)="d3ab2719", 0x4) sendmmsg$alg(r1, &(0x7f000059cfc8)=[{0x0, 0x0, &(0x7f0000283000)=[{&(0x7f00005a7000)="d1a4edc6ada830966dc07a7d9eda5a84d6acd04108a8778ef7bdb8de20dadf839b76eae0e7790d9454e3218626070927707fd45c81e73272b7ebc618d39458b5db41ebef9c78743b4aeab1813d5349a9", 0x50}], 0x1, &(0x7f0000000140)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmsg(r1, &(0x7f0000000340)={&(0x7f0000000000)=@alg, 0x58, &(0x7f00000002c0)=[{&(0x7f0000000080)=""/81, 0x51}], 0x1}, 0x0) 2018/04/07 08:15:00 executing program 6: r0 = socket$inet_tcp(0x2, 0x1, 0x0) mmap(&(0x7f0000000000/0xe62000)=nil, 0xe62000, 0x1000004, 0x32, 0xffffffffffffffff, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x6, &(0x7f0000000040), 0x4) 2018/04/07 08:15:00 executing program 4: mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x0, 0x32, 0xffffffffffffffff, 0x0) nanosleep(&(0x7f0000000040)={0x0, 0x989680}, &(0x7f0000000080)) 2018/04/07 08:15:00 executing program 2: r0 = add_key$keyring(&(0x7f00000000c0)='keyring\x00', &(0x7f0000000040)={0x73, 0x79, 0x7a}, 0x0, 0x0, 0xfffffffffffffffb) r1 = add_key$keyring(&(0x7f0000000140)='keyring\x00', &(0x7f0000000180)={0x73, 0x79, 0x7a}, 0x0, 0x0, r0) add_key(&(0x7f0000000000)='user\x00', &(0x7f0000000080)={0x73, 0x79, 0x7a}, &(0x7f0000000080)='.', 0x1, r1) 2018/04/07 08:15:00 executing program 0: rmdir(&(0x7f0000000280)='..') 2018/04/07 08:15:00 executing program 1: pselect6(0xaa, &(0x7f00000abfc0), &(0x7f0000768000), &(0x7f00007fbfc0), &(0x7f0000349000)={0x0, 0x989680}, &(0x7f0000f14000)={&(0x7f00001da000), 0x8}) 2018/04/07 08:15:00 executing program 5: mkdir(&(0x7f0000e29000)='./file0\x00', 0x0) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000026ff8)='./file0\x00', &(0x7f000000c000)='ramfs\x00', 0x0, &(0x7f00000002c0)) mount(&(0x7f0000037000)='./file0\x00', &(0x7f0000c4fff8)='./file0\x00', &(0x7f0000000080)="72616f04d99d69fb1933f8fc9d0d5200", 0x100000, &(0x7f0000ce3000)) creat(&(0x7f000016cff8)='./file0/file0\x00', 0x0) mount(&(0x7f000011dff2)='./file0/file0\x00', &(0x7f0000917000)='./file0/file0\x00', &(0x7f0000467000)='xfs\x00', 0x1000, 0x0) mount(&(0x7f0000f27ff2)='./file0/file0\x00', &(0x7f00002faff8)='./file0/file0\x00', &(0x7f0000239000)='\x00v\t', 0x1004, &(0x7f0000a06000)) mount(&(0x7f0000000200)='./file0/file0\x00', &(0x7f00000000c0)='./file0\x00', &(0x7f0000000280)='ncpfs\x00', 0x84000, &(0x7f00000002c0)) 2018/04/07 08:15:00 executing program 7: r0 = syz_open_procfs(0x0, &(0x7f0000030ff8)='pagemap\x00') r1 = memfd_create(&(0x7f0000000ffc)='$\x00', 0x0) mmap(&(0x7f0000ffe000/0x1000)=nil, 0x1000, 0x0, 0x11, r1, 0x0) sendfile(r1, r0, &(0x7f0000000200)=0x100000, 0x10000) 2018/04/07 08:15:00 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000447000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(blowfish)\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000330d27)="d3ab2719", 0x4) sendmmsg$alg(r1, &(0x7f000059cfc8)=[{0x0, 0x0, &(0x7f0000283000)=[{&(0x7f00005a7000)="d1a4edc6ada830966dc07a7d9eda5a84d6acd04108a8778ef7bdb8de20dadf839b76eae0e7790d9454e3218626070927707fd45c81e73272b7ebc618d39458b5db41ebef9c78743b4aeab1813d5349a9", 0x50}], 0x1, &(0x7f0000000140)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmsg(r1, &(0x7f0000000340)={&(0x7f0000000000)=@alg, 0x58, &(0x7f00000002c0)=[{&(0x7f0000000080)=""/81, 0x51}], 0x1}, 0x0) 2018/04/07 08:15:00 executing program 4: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) setsockopt$inet_sctp6_SCTP_RECONFIG_SUPPORTED(r0, 0x84, 0x7d, &(0x7f0000000000), 0x8) 2018/04/07 08:15:00 executing program 6: pipe2(&(0x7f0000d0d000)={0xffffffffffffffff}, 0x0) mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0x7, 0x31, 0xffffffffffffffff, 0x0) io_setup(0x5, &(0x7f00000000c0)=0x0) io_submit(r1, 0x3e84, &(0x7f00004a7ffc)=[&(0x7f0000fb6000)={0x0, 0x0, 0x0, 0x7, 0x0, r0, &(0x7f00005be000), 0x31c}]) getsockopt$inet6_dccp_buf(0xffffffffffffffff, 0x21, 0x0, &(0x7f0000000100)=""/4096, &(0x7f0000000080)=0x1000) 2018/04/07 08:15:00 executing program 0: r0 = memfd_create(&(0x7f0000002901)='dev ', 0x0) write(r0, &(0x7f0000000080)="164690f11220a801e15c", 0xa) sendfile(r0, r0, &(0x7f0000001000), 0xffff) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x4, 0x11, r0, 0x0) rt_sigtimedwait(&(0x7f0000000000), 0x0, &(0x7f0000000040), 0x8) 2018/04/07 08:15:00 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000447000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(blowfish)\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000330d27)="d3ab2719", 0x4) recvmsg(r1, &(0x7f0000000340)={&(0x7f0000000000)=@alg, 0x58, &(0x7f00000002c0)=[{&(0x7f0000000080)=""/81, 0x51}], 0x1}, 0x0) 2018/04/07 08:15:00 executing program 2: r0 = add_key$keyring(&(0x7f00000000c0)='keyring\x00', &(0x7f0000000040)={0x73, 0x79, 0x7a}, 0x0, 0x0, 0xfffffffffffffffb) r1 = add_key$keyring(&(0x7f0000000140)='keyring\x00', &(0x7f0000000180)={0x73, 0x79, 0x7a}, 0x0, 0x0, r0) add_key(&(0x7f0000000000)='user\x00', &(0x7f0000000080)={0x73, 0x79, 0x7a}, &(0x7f0000000080)='.', 0x1, r1) 2018/04/07 08:15:00 executing program 7: r0 = syz_open_procfs(0x0, &(0x7f0000030ff8)='pagemap\x00') r1 = memfd_create(&(0x7f0000000ffc)='$\x00', 0x0) sendfile(r1, r0, &(0x7f0000000200)=0x100000, 0x10000) 2018/04/07 08:15:00 executing program 1: r0 = gettid() r1 = syz_open_procfs(r0, &(0x7f00000000c0)='syscall\x00') r2 = syz_open_dev$mice(&(0x7f00001c6000)='/dev/input/mice\x00', 0x0, 0x20000a0845) sendfile(r2, r1, &(0x7f00001f6ff8), 0x3fd) 2018/04/07 08:15:00 executing program 4: perf_event_open(&(0x7f0000d2af88)={0x2, 0x78, 0xe2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = getpgrp(0x0) r1 = gettid() rt_sigprocmask(0x0, &(0x7f0000032ff8)={0xffffffffffffff7f}, 0x0, 0x8) rt_tgsigqueueinfo(r0, r1, 0x8000000011, &(0x7f0000000180)={0x0, 0x0, 0x3}) r2 = signalfd4(0xffffffffffffffff, &(0x7f0000000ff8)={0xfffffffffffffdb0}, 0x8, 0x0) read(r2, &(0x7f0000481000)=""/128, 0xfffffffffffffe3a) 2018/04/07 08:15:00 executing program 6: ioperm(0x0, 0x7, 0x0) clone(0x84080903, &(0x7f0000000140), &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000080)) 2018/04/07 08:15:00 executing program 5: mkdir(&(0x7f0000e29000)='./file0\x00', 0x0) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000026ff8)='./file0\x00', &(0x7f000000c000)='ramfs\x00', 0x0, &(0x7f00000002c0)) mount(&(0x7f0000037000)='./file0\x00', &(0x7f0000c4fff8)='./file0\x00', &(0x7f0000000080)="72616f04d99d69fb1933f8fc9d0d5200", 0x100000, &(0x7f0000ce3000)) creat(&(0x7f000016cff8)='./file0/file0\x00', 0x0) mount(&(0x7f000011dff2)='./file0/file0\x00', &(0x7f0000917000)='./file0/file0\x00', &(0x7f0000467000)='xfs\x00', 0x1000, 0x0) mount(&(0x7f0000f27ff2)='./file0/file0\x00', &(0x7f00002faff8)='./file0/file0\x00', &(0x7f0000239000)='\x00v\t', 0x1004, &(0x7f0000a06000)) mount(&(0x7f0000000200)='./file0/file0\x00', &(0x7f00000000c0)='./file0\x00', &(0x7f0000000280)='ncpfs\x00', 0x84000, &(0x7f00000002c0)) 2018/04/07 08:15:00 executing program 6: r0 = socket$inet_sctp(0x2, 0x1, 0x84) sendto$inet(r0, &(0x7f0000a34fff)='H', 0x1, 0x0, &(0x7f0000030ff0)={0x2, 0x4e20, @local={0xac, 0x14, 0xffffffffffffffff, 0xaa}}, 0x10) sendto$inet(r0, &(0x7f000026cfff)="c6", 0x1, 0x0, &(0x7f0000033ff0)={0x2, 0x4e20, @remote={0xac, 0x14, 0xffffffffffffffff, 0xbb}}, 0x10) shutdown(r0, 0x1) getsockopt$inet_sctp_SCTP_DEFAULT_SEND_PARAM(0xffffffffffffffff, 0x84, 0xa, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, &(0x7f0000000040)=0x20) getsockopt$inet_sctp_SCTP_ENABLE_STREAM_RESET(0xffffffffffffffff, 0x84, 0x76, &(0x7f0000000080)={r1, 0x5}, &(0x7f00000000c0)=0xfffffeea) getsockopt$inet_sctp_SCTP_STATUS(r0, 0x84, 0xe, &(0x7f0000000100)={r1, 0xfffffffffffffeff, 0x4, 0x4, 0x5, 0x0, 0x0, 0x0, {0x0, @in6={{0xa, 0x4e20, 0x0, @mcast2={0xff, 0x2, [], 0x1}}}, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x7}}, &(0x7f00000001c0)=0xb8) write(r0, &(0x7f0000000300)="3d3dc0f9565a2d846f12a19de53833fcd57ab917d8b66eb1081c32c6f3d22103bdbb8f5086f1cd39244c072fc1a3323466c739513c2bbfc4c91281ad8d66558a49ca903f0fc4f0fa3add138792f54221d7ea0afa2a368f0cb313270eda41803f35bdba7c0858d133796e86e69af65252682e0f12cfbf0c89b6b8fb0418df67348f54f24d26ffc0e4c9fb276b1a7caa632eb5e399c75fb8778e8cc8295e875e922e2b24acd11146402711df53213a4911c52eb8b4b5a0997086e99dc1041eab1ec806118edae1e2e58486f81425a2d01b5f6bd0dd", 0xd4) setsockopt$inet_opts(r0, 0x0, 0x9, &(0x7f0000000400)="f6968c47e5ad6cf1dd5ed00dc5c06480a79d917e674f4032885cc17d50ffbe", 0x1f) 2018/04/07 08:15:00 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000447000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(blowfish)\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000330d27)="d3ab2719", 0x4) recvmsg(r1, &(0x7f0000000340)={&(0x7f0000000000)=@alg, 0x58, &(0x7f00000002c0)=[{&(0x7f0000000080)=""/81, 0x51}], 0x1}, 0x0) 2018/04/07 08:15:00 executing program 1: r0 = memfd_create(&(0x7f0000002000)="2f7b06003170707031253a656d30f9", 0x0) pwritev(r0, &(0x7f00000000c0)=[{&(0x7f0000000000)="480000000042f7", 0x7}], 0x1, 0x11) mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x4, 0x11, r0, 0x0) timer_settime(0x0, 0x0, &(0x7f0000001000), &(0x7f0000005000)) 2018/04/07 08:15:00 executing program 7: r0 = syz_open_procfs(0x0, &(0x7f0000030ff8)='pagemap\x00') r1 = memfd_create(&(0x7f0000000ffc)='$\x00', 0x0) sendfile(r1, r0, &(0x7f0000000200)=0x100000, 0x10000) 2018/04/07 08:15:00 executing program 2: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$inet6_int(r0, 0x29, 0x19, &(0x7f0000000000)=0x5, 0x4) syz_emit_ethernet(0x6e, &(0x7f0000000040)={@random="cd390b081bf2", @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [], {@ipv6={0x86dd, {0x0, 0x6, "02290f", 0x38, 0x3a, 0x0, @ipv4={[], [0xff, 0xff], @rand_addr}, @mcast2={0xff, 0x2, [], 0x1}, {[], @icmpv6=@pkt_toobig={0x2, 0x0, 0x0, 0x0, {0x0, 0x6, "9433df", 0x0, 0x3a, 0x0, @mcast2={0xff, 0x2, [], 0x1}, @dev={0xfe, 0x80}, [], "802a08000000006b"}}}}}}}, 0x0) 2018/04/07 08:15:01 executing program 4: perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f0000940000)={0x2, 0x78, 0x312, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7ff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r0) 2018/04/07 08:15:01 executing program 5: mkdir(&(0x7f0000e29000)='./file0\x00', 0x0) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000026ff8)='./file0\x00', &(0x7f000000c000)='ramfs\x00', 0x0, &(0x7f00000002c0)) mount(&(0x7f0000037000)='./file0\x00', &(0x7f0000c4fff8)='./file0\x00', &(0x7f0000000080)="72616f04d99d69fb1933f8fc9d0d5200", 0x100000, &(0x7f0000ce3000)) creat(&(0x7f000016cff8)='./file0/file0\x00', 0x0) mount(&(0x7f000011dff2)='./file0/file0\x00', &(0x7f0000917000)='./file0/file0\x00', &(0x7f0000467000)='xfs\x00', 0x1000, 0x0) mount(&(0x7f0000000200)='./file0/file0\x00', &(0x7f00000000c0)='./file0\x00', &(0x7f0000000280)='ncpfs\x00', 0x84000, &(0x7f00000002c0)) 2018/04/07 08:15:01 executing program 1: r0 = memfd_create(&(0x7f0000002000)="2f7b06003170707031253a656d30f9", 0x0) pwritev(r0, &(0x7f00000000c0)=[{&(0x7f0000000000)="480000000042f7", 0x7}], 0x1, 0x11) mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x4, 0x11, r0, 0x0) timer_settime(0x0, 0x0, &(0x7f0000001000), &(0x7f0000005000)) 2018/04/07 08:15:02 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000447000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(blowfish)\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000330d27)="d3ab2719", 0x4) recvmsg(r1, &(0x7f0000000340)={&(0x7f0000000000)=@alg, 0x58, &(0x7f00000002c0)=[{&(0x7f0000000080)=""/81, 0x51}], 0x1}, 0x0) 2018/04/07 08:15:02 executing program 2: r0 = socket$inet_sctp(0x2, 0x1, 0x84) sendto$inet(r0, &(0x7f0000a34fff)='H', 0x1, 0x0, &(0x7f0000030ff0)={0x2, 0x4e20, @local={0xac, 0x14, 0xffffffffffffffff, 0xaa}}, 0x10) sendto$inet(r0, &(0x7f000026cfff)="c6", 0x1, 0x0, &(0x7f0000033ff0)={0x2, 0x4e20, @remote={0xac, 0x14, 0xffffffffffffffff, 0xbb}}, 0x10) shutdown(r0, 0x1) setsockopt$inet_sctp_SCTP_RTOINFO(r0, 0x84, 0x0, &(0x7f0000000000)={0x0, 0x33dd}, 0x10) 2018/04/07 08:15:02 executing program 4: perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f0000940000)={0x2, 0x78, 0x312, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7ff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r0) 2018/04/07 08:15:02 executing program 5: mkdir(&(0x7f0000e29000)='./file0\x00', 0x0) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000026ff8)='./file0\x00', &(0x7f000000c000)='ramfs\x00', 0x0, &(0x7f00000002c0)) mount(&(0x7f0000037000)='./file0\x00', &(0x7f0000c4fff8)='./file0\x00', &(0x7f0000000080)="72616f04d99d69fb1933f8fc9d0d5200", 0x100000, &(0x7f0000ce3000)) creat(&(0x7f000016cff8)='./file0/file0\x00', 0x0) mount(&(0x7f000011dff2)='./file0/file0\x00', &(0x7f0000917000)='./file0/file0\x00', &(0x7f0000467000)='xfs\x00', 0x1000, 0x0) mount(&(0x7f0000000200)='./file0/file0\x00', &(0x7f00000000c0)='./file0\x00', &(0x7f0000000280)='ncpfs\x00', 0x84000, &(0x7f00000002c0)) 2018/04/07 08:15:02 executing program 1: r0 = memfd_create(&(0x7f0000002000)="2f7b06003170707031253a656d30f9", 0x0) pwritev(r0, &(0x7f00000000c0)=[{&(0x7f0000000000)="480000000042f7", 0x7}], 0x1, 0x11) mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x4, 0x11, r0, 0x0) timer_settime(0x0, 0x0, &(0x7f0000001000), &(0x7f0000005000)) 2018/04/07 08:15:02 executing program 6: perf_event_open(&(0x7f000025c000)={0x80000000002, 0x78, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7ff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x2100000000000002, 0x0) connect$inet6(r0, &(0x7f0000000640)={0xa, 0x4e20, 0x0, @mcast2={0xff, 0x2, [], 0x1}, 0x9}, 0x1c) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x4e20, 0x0, @local={0xfe, 0x80, [], 0xaa}, 0x6}, 0x1c) 2018/04/07 08:15:02 executing program 0: connect$inet6(0xffffffffffffffff, &(0x7f0000002fe4)={0xa, 0x4e20, 0x0, @mcast1={0xff, 0x1, [], 0x1}}, 0x1c) pkey_mprotect(&(0x7f0000000000/0x2000)=nil, 0x2000, 0xd, 0xffffffffffffffff) futex(&(0x7f0000000080), 0x0, 0x0, &(0x7f0000000100), &(0x7f0000000140), 0x0) 2018/04/07 08:15:02 executing program 7: r0 = syz_open_procfs(0x0, &(0x7f0000030ff8)='pagemap\x00') r1 = memfd_create(&(0x7f0000000ffc)='$\x00', 0x0) sendfile(r1, r0, &(0x7f0000000200)=0x100000, 0x10000) 2018/04/07 08:15:02 executing program 4: mmap(&(0x7f0000000000/0xf000)=nil, 0xf000, 0x2000004, 0x32, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x80003, 0xef) setsockopt$inet6_int(r0, 0x29, 0x21, &(0x7f0000013ffc)=0x2, 0x4) sendto$inet6(r0, &(0x7f0000001ffe), 0x0, 0x0, &(0x7f0000003000)={0xa, 0x4e20, 0x0, @mcast2={0xff, 0x2, [], 0x1}}, 0x1c) 2018/04/07 08:15:02 executing program 0: mmap(&(0x7f0000001000/0x4000)=nil, 0x4000, 0x0, 0x32, 0xffffffffffffffff, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$inet_buf(r0, 0x0, 0x1000000043, &(0x7f0000002fe2)=""/30, &(0x7f0000000000)=0x1e) 2018/04/07 08:15:02 executing program 1: r0 = memfd_create(&(0x7f0000002000)="2f7b06003170707031253a656d30f9", 0x0) pwritev(r0, &(0x7f00000000c0)=[{&(0x7f0000000000)="480000000042f7", 0x7}], 0x1, 0x11) mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x4, 0x11, r0, 0x0) timer_settime(0x0, 0x0, &(0x7f0000001000), &(0x7f0000005000)) 2018/04/07 08:15:02 executing program 7: r0 = syz_open_procfs(0x0, &(0x7f0000030ff8)='pagemap\x00') mmap(&(0x7f0000ffe000/0x1000)=nil, 0x1000, 0x0, 0x11, 0xffffffffffffffff, 0x0) sendfile(0xffffffffffffffff, r0, &(0x7f0000000200)=0x100000, 0x10000) 2018/04/07 08:15:02 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000447000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(blowfish)\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f000059cfc8)=[{0x0, 0x0, &(0x7f0000283000)=[{&(0x7f00005a7000)="d1a4edc6ada830966dc07a7d9eda5a84d6acd04108a8778ef7bdb8de20dadf839b76eae0e7790d9454e3218626070927707fd45c81e73272b7ebc618d39458b5db41ebef9c78743b4aeab1813d5349a9", 0x50}], 0x1, &(0x7f0000000140)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmsg(r1, &(0x7f0000000340)={&(0x7f0000000000)=@alg, 0x58, &(0x7f00000002c0)=[{&(0x7f0000000080)=""/81, 0x51}], 0x1}, 0x0) 2018/04/07 08:15:02 executing program 6: mmap(&(0x7f000092d000/0x400000)=nil, 0x400000, 0x0, 0x2000000008972, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$sndseq(&(0x7f0000371000)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r0, 0xc0a85320, &(0x7f0000029f50)={{0x80}, "0a4ceaa05d9a00000000000000039b3fd4cec307e8ef3d13eb790ec9c65abaf90d229db692542e5b78f8b29e0a27800f0000000000000009fb42f376589701a4", 0xa9824f69d1376637, 0x10000a}) openat$sequencer2(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/sequencer2\x00', 0x0, 0x0) read(r0, &(0x7f0000c7c000)=""/136, 0x88) 2018/04/07 08:15:02 executing program 5: mkdir(&(0x7f0000e29000)='./file0\x00', 0x0) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000026ff8)='./file0\x00', &(0x7f000000c000)='ramfs\x00', 0x0, &(0x7f00000002c0)) mount(&(0x7f0000037000)='./file0\x00', &(0x7f0000c4fff8)='./file0\x00', &(0x7f0000000080)="72616f04d99d69fb1933f8fc9d0d5200", 0x100000, &(0x7f0000ce3000)) creat(&(0x7f000016cff8)='./file0/file0\x00', 0x0) mount(&(0x7f000011dff2)='./file0/file0\x00', &(0x7f0000917000)='./file0/file0\x00', &(0x7f0000467000)='xfs\x00', 0x1000, 0x0) mount(&(0x7f0000000200)='./file0/file0\x00', &(0x7f00000000c0)='./file0\x00', &(0x7f0000000280)='ncpfs\x00', 0x84000, &(0x7f00000002c0)) 2018/04/07 08:15:03 executing program 0: r0 = socket(0x10, 0x802, 0x0) write(r0, &(0x7f0000000000)="220000002000070700cbe6ff080007010a00001e000000000000040004001180ff41", 0x22) 2018/04/07 08:15:03 executing program 7: r0 = memfd_create(&(0x7f0000000ffc)='$\x00', 0x0) mmap(&(0x7f0000ffe000/0x1000)=nil, 0x1000, 0x0, 0x11, r0, 0x0) sendfile(r0, 0xffffffffffffffff, &(0x7f0000000200)=0x100000, 0x10000) 2018/04/07 08:15:03 executing program 4: perf_event_open(&(0x7f0000857f88)={0x400000000002, 0x78, 0x160bea7, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = creat(&(0x7f0000000080)='./file0\x00', 0x0) fcntl$lock(r0, 0x6, &(0x7f0000d36000)={0x2}) 2018/04/07 08:15:03 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000447000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(blowfish)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000330d27)="d3ab2719", 0x4) sendmmsg$alg(0xffffffffffffffff, &(0x7f000059cfc8)=[{0x0, 0x0, &(0x7f0000283000)=[{&(0x7f00005a7000)="d1a4edc6ada830966dc07a7d9eda5a84d6acd04108a8778ef7bdb8de20dadf839b76eae0e7790d9454e3218626070927707fd45c81e73272b7ebc618d39458b5db41ebef9c78743b4aeab1813d5349a9", 0x50}], 0x1, &(0x7f0000000140)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmsg(0xffffffffffffffff, &(0x7f0000000340)={&(0x7f0000000000)=@alg, 0x58, &(0x7f00000002c0)=[{&(0x7f0000000080)=""/81, 0x51}], 0x1}, 0x0) 2018/04/07 08:15:03 executing program 1: r0 = memfd_create(&(0x7f0000002000)="2f7b06003170707031253a656d30f9", 0x0) pwritev(r0, &(0x7f00000000c0)=[{&(0x7f0000000000)="480000000042f7", 0x7}], 0x1, 0x11) timer_settime(0x0, 0x0, &(0x7f0000001000), &(0x7f0000005000)) 2018/04/07 08:15:03 executing program 5: mkdir(&(0x7f0000e29000)='./file0\x00', 0x0) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000026ff8)='./file0\x00', &(0x7f000000c000)='ramfs\x00', 0x0, &(0x7f00000002c0)) mount(&(0x7f0000037000)='./file0\x00', &(0x7f0000c4fff8)='./file0\x00', &(0x7f0000000080)="72616f04d99d69fb1933f8fc9d0d5200", 0x100000, &(0x7f0000ce3000)) creat(&(0x7f000016cff8)='./file0/file0\x00', 0x0) mount(&(0x7f0000f27ff2)='./file0/file0\x00', &(0x7f00002faff8)='./file0/file0\x00', &(0x7f0000239000)='\x00v\t', 0x1004, &(0x7f0000a06000)) mount(&(0x7f0000000200)='./file0/file0\x00', &(0x7f00000000c0)='./file0\x00', &(0x7f0000000280)='ncpfs\x00', 0x84000, &(0x7f00000002c0)) 2018/04/07 08:15:03 executing program 2: r0 = socket(0x2, 0x2, 0x0) getsockopt$sock_int(r0, 0x1, 0x23, &(0x7f0000000080), &(0x7f0000000000)=0x4) 2018/04/07 08:15:03 executing program 6: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000001000)='/dev/ptmx\x00', 0x102, 0x0) write(r0, &(0x7f000006e000), 0xfffffdd8) fcntl$setstatus(r0, 0x4, 0x3ffe) write(r0, &(0x7f0000000000), 0x0) 2018/04/07 08:15:03 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f000001bfc8)={&(0x7f0000008000)={0x10}, 0xc, &(0x7f000000b000)={&(0x7f0000000fdc)=@ipv6_newroute={0x24, 0x48, 0x20000000001, 0x0, 0x0, {0xa}, [@RTA_IIF={0x8, 0x1}]}, 0x24}, 0x1}, 0x0) 2018/04/07 08:15:03 executing program 7: r0 = syz_open_procfs(0x0, &(0x7f0000030ff8)='pagemap\x00') r1 = memfd_create(&(0x7f0000000ffc)='$\x00', 0x0) mmap(&(0x7f0000ffe000/0x1000)=nil, 0x1000, 0x0, 0x0, r1, 0x0) sendfile(r1, r0, &(0x7f0000000200)=0x100000, 0x10000) 2018/04/07 08:15:03 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) r1 = accept$alg(r0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000330d27)="d3ab2719", 0x4) sendmmsg$alg(r1, &(0x7f000059cfc8)=[{0x0, 0x0, &(0x7f0000283000)=[{&(0x7f00005a7000)="d1a4edc6ada830966dc07a7d9eda5a84d6acd04108a8778ef7bdb8de20dadf839b76eae0e7790d9454e3218626070927707fd45c81e73272b7ebc618d39458b5db41ebef9c78743b4aeab1813d5349a9", 0x50}], 0x1, &(0x7f0000000140)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmsg(r1, &(0x7f0000000340)={&(0x7f0000000000)=@alg, 0x58, &(0x7f00000002c0)=[{&(0x7f0000000080)=""/81, 0x51}], 0x1}, 0x0) 2018/04/07 08:15:03 executing program 1: r0 = memfd_create(&(0x7f0000002000)="2f7b06003170707031253a656d30f9", 0x0) pwritev(r0, &(0x7f00000000c0)=[{&(0x7f0000000000)="480000000042f7", 0x7}], 0x1, 0x11) timer_settime(0x0, 0x0, &(0x7f0000001000), &(0x7f0000005000)) 2018/04/07 08:15:03 executing program 2: r0 = socket$netlink(0x10, 0x3, 0xc) writev(r0, &(0x7f0000fb5ff0)=[{&(0x7f0000fb4000)="1f00000002031900000007000000068100023b0509000100010100ff3ffe58", 0x1f}], 0x1) writev(r0, &(0x7f00000000c0)=[{&(0x7f0000000240)="1f00000003031900000007000080068100023b0509000100010100ff3ffe58", 0x1f}], 0x1) 2018/04/07 08:15:03 executing program 4: r0 = syz_open_procfs(0x0, &(0x7f00008f0a07)='pagemap\x00') mmap(&(0x7f0000000000/0xfc2000)=nil, 0xfc2000, 0x4, 0x32, 0xffffffffffffffff, 0x0) r1 = socket(0x15, 0x80005, 0x0) ioctl$sock_SIOCSPGRP(r1, 0x8902, &(0x7f0000000040)) pread64(r0, &(0x7f0000fd7000)=""/8, 0x8, 0x100100) 2018/04/07 08:15:03 executing program 5: mkdir(&(0x7f0000e29000)='./file0\x00', 0x0) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000026ff8)='./file0\x00', &(0x7f000000c000)='ramfs\x00', 0x0, &(0x7f00000002c0)) mount(&(0x7f0000037000)='./file0\x00', &(0x7f0000c4fff8)='./file0\x00', &(0x7f0000000080)="72616f04d99d69fb1933f8fc9d0d5200", 0x100000, &(0x7f0000ce3000)) creat(&(0x7f000016cff8)='./file0/file0\x00', 0x0) mount(&(0x7f0000f27ff2)='./file0/file0\x00', &(0x7f00002faff8)='./file0/file0\x00', &(0x7f0000239000)='\x00v\t', 0x1004, &(0x7f0000a06000)) mount(&(0x7f0000000200)='./file0/file0\x00', &(0x7f00000000c0)='./file0\x00', &(0x7f0000000280)='ncpfs\x00', 0x84000, &(0x7f00000002c0)) 2018/04/07 08:15:03 executing program 0: r0 = syz_open_dev$evdev(&(0x7f0000000040)='/dev/input/event#\x00', 0x2, 0x0) ioctl$EVIOCSKEYCODE(r0, 0x40084504, &(0x7f0000001ffb)=[0x265]) 2018/04/07 08:15:03 executing program 1: r0 = memfd_create(&(0x7f0000002000)="2f7b06003170707031253a656d30f9", 0x0) pwritev(r0, &(0x7f00000000c0)=[{&(0x7f0000000000)="480000000042f7", 0x7}], 0x1, 0x11) timer_settime(0x0, 0x0, &(0x7f0000001000), &(0x7f0000005000)) 2018/04/07 08:15:03 executing program 7: r0 = syz_open_procfs(0x0, &(0x7f0000030ff8)='pagemap\x00') r1 = memfd_create(&(0x7f0000000ffc)='$\x00', 0x0) mmap(&(0x7f0000ffe000/0x1000)=nil, 0x1000, 0x0, 0x0, r1, 0x0) sendfile(r1, r0, &(0x7f0000000200)=0x100000, 0x10000) 2018/04/07 08:15:04 executing program 3: bind$alg(0xffffffffffffffff, &(0x7f0000447000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(blowfish)\x00'}, 0x58) r0 = accept$alg(0xffffffffffffffff, 0x0, 0x0) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000330d27)="d3ab2719", 0x4) sendmmsg$alg(r0, &(0x7f000059cfc8)=[{0x0, 0x0, &(0x7f0000283000)=[{&(0x7f00005a7000)="d1a4edc6ada830966dc07a7d9eda5a84d6acd04108a8778ef7bdb8de20dadf839b76eae0e7790d9454e3218626070927707fd45c81e73272b7ebc618d39458b5db41ebef9c78743b4aeab1813d5349a9", 0x50}], 0x1, &(0x7f0000000140)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmsg(r0, &(0x7f0000000340)={&(0x7f0000000000)=@alg, 0x58, &(0x7f00000002c0)=[{&(0x7f0000000080)=""/81, 0x51}], 0x1}, 0x0) 2018/04/07 08:15:04 executing program 4: r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_int(r0, 0x29, 0x18, &(0x7f0000d01000)=0x6, 0x4) 2018/04/07 08:15:04 executing program 5: mkdir(&(0x7f0000e29000)='./file0\x00', 0x0) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000026ff8)='./file0\x00', &(0x7f000000c000)='ramfs\x00', 0x0, &(0x7f00000002c0)) mount(&(0x7f0000037000)='./file0\x00', &(0x7f0000c4fff8)='./file0\x00', &(0x7f0000000080)="72616f04d99d69fb1933f8fc9d0d5200", 0x100000, &(0x7f0000ce3000)) creat(&(0x7f000016cff8)='./file0/file0\x00', 0x0) mount(&(0x7f0000f27ff2)='./file0/file0\x00', &(0x7f00002faff8)='./file0/file0\x00', &(0x7f0000239000)='\x00v\t', 0x1004, &(0x7f0000a06000)) mount(&(0x7f0000000200)='./file0/file0\x00', &(0x7f00000000c0)='./file0\x00', &(0x7f0000000280)='ncpfs\x00', 0x84000, &(0x7f00000002c0)) 2018/04/07 08:15:04 executing program 2: r0 = syz_open_dev$evdev(&(0x7f0000237fee)='/dev/input/event#\x00', 0x2, 0x28001) write$evdev(r0, &(0x7f0000f15fd0)=[{{}, 0x1, 0x60, 0x2}, {}], 0x30) ioctl$EVIOCGKEY(r0, 0x80404518, &(0x7f0000000140)=""/118) 2018/04/07 08:15:04 executing program 1: r0 = memfd_create(&(0x7f0000002000)="2f7b06003170707031253a656d30f9", 0x0) mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x4, 0x11, r0, 0x0) timer_settime(0x0, 0x0, &(0x7f0000001000), &(0x7f0000005000)) 2018/04/07 08:15:04 executing program 0: r0 = getpid() prlimit64(r0, 0x0, &(0x7f0000000100), &(0x7f0000000140)) 2018/04/07 08:15:04 executing program 6: r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f00000000c0)={"6c6f00000000000000008000", &(0x7f00000002c0)=@ethtool_dump={0x40}}) 2018/04/07 08:15:04 executing program 7: r0 = syz_open_procfs(0x0, &(0x7f0000030ff8)='pagemap\x00') r1 = memfd_create(&(0x7f0000000ffc)='$\x00', 0x0) mmap(&(0x7f0000ffe000/0x1000)=nil, 0x1000, 0x0, 0x0, r1, 0x0) sendfile(r1, r0, &(0x7f0000000200)=0x100000, 0x10000) 2018/04/07 08:15:04 executing program 6: r0 = memfd_create(&(0x7f0000002901)='dev ', 0x0) write(r0, &(0x7f0000000080)="33813385646c815a6e47c0e13781cc6f1c63e8eda2425180a9e1cf0c2ee473ce0f1202efc8bd41a1a13db30117246c41e17657198a4c1eec46c3580bae721519", 0x40) sendfile(r0, r0, &(0x7f0000001000), 0xffff) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x4, 0x11, r0, 0x0) rt_sigtimedwait(&(0x7f0000000000), &(0x7f0000000040), &(0x7f0000000180), 0x8) 2018/04/07 08:15:04 executing program 0: r0 = gettid() r1 = syz_open_procfs(r0, &(0x7f00000001c0)='wchan\x00') readv(r1, &(0x7f0000000100)=[{&(0x7f0000000080)=""/71, 0x47}], 0x1) 2018/04/07 08:15:04 executing program 1: r0 = memfd_create(&(0x7f0000002000)="2f7b06003170707031253a656d30f9", 0x0) mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x4, 0x11, r0, 0x0) timer_settime(0x0, 0x0, &(0x7f0000001000), &(0x7f0000005000)) 2018/04/07 08:15:04 executing program 4: r0 = syz_open_dev$sndtimer(&(0x7f0000214ff1)='/dev/snd/timer\x00', 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_INFO(r0, 0x80e85411, &(0x7f0000005680)=""/83) 2018/04/07 08:15:04 executing program 7: r0 = syz_open_procfs(0x0, &(0x7f0000030ff8)='pagemap\x00') r1 = memfd_create(&(0x7f0000000ffc)='$\x00', 0x0) mmap(&(0x7f0000ffe000/0x1000)=nil, 0x1000, 0x0, 0x11, 0xffffffffffffffff, 0x0) sendfile(r1, r0, &(0x7f0000000200)=0x100000, 0x10000) 2018/04/07 08:15:04 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(0xffffffffffffffff, &(0x7f0000447000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(blowfish)\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000330d27)="d3ab2719", 0x4) sendmmsg$alg(r1, &(0x7f000059cfc8)=[{0x0, 0x0, &(0x7f0000283000)=[{&(0x7f00005a7000)="d1a4edc6ada830966dc07a7d9eda5a84d6acd04108a8778ef7bdb8de20dadf839b76eae0e7790d9454e3218626070927707fd45c81e73272b7ebc618d39458b5db41ebef9c78743b4aeab1813d5349a9", 0x50}], 0x1, &(0x7f0000000140)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmsg(r1, &(0x7f0000000340)={&(0x7f0000000000)=@alg, 0x58, &(0x7f00000002c0)=[{&(0x7f0000000080)=""/81, 0x51}], 0x1}, 0x0) 2018/04/07 08:15:04 executing program 2: r0 = syz_open_dev$sndtimer(&(0x7f0000214ff1)='/dev/snd/timer\x00', 0x0, 0x0) r1 = epoll_create1(0x0) r2 = dup3(r0, r1, 0x0) ioctl$TIOCSCTTY(r2, 0x540e, 0x0) 2018/04/07 08:15:04 executing program 5: mkdir(&(0x7f0000e29000)='./file0\x00', 0x0) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000026ff8)='./file0\x00', &(0x7f000000c000)='ramfs\x00', 0x0, &(0x7f00000002c0)) mount(&(0x7f0000037000)='./file0\x00', &(0x7f0000c4fff8)='./file0\x00', &(0x7f0000000080)="72616f04d99d69fb1933f8fc9d0d5200", 0x100000, &(0x7f0000ce3000)) mount(&(0x7f000011dff2)='./file0/file0\x00', &(0x7f0000917000)='./file0/file0\x00', &(0x7f0000467000)='xfs\x00', 0x1000, 0x0) mount(&(0x7f0000f27ff2)='./file0/file0\x00', &(0x7f00002faff8)='./file0/file0\x00', &(0x7f0000239000)='\x00v\t', 0x1004, &(0x7f0000a06000)) mount(&(0x7f0000000200)='./file0/file0\x00', &(0x7f00000000c0)='./file0\x00', &(0x7f0000000280)='ncpfs\x00', 0x84000, &(0x7f00000002c0)) 2018/04/07 08:15:04 executing program 1: r0 = memfd_create(&(0x7f0000002000)="2f7b06003170707031253a656d30f9", 0x0) mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x4, 0x11, r0, 0x0) timer_settime(0x0, 0x0, &(0x7f0000001000), &(0x7f0000005000)) 2018/04/07 08:15:04 executing program 4: r0 = memfd_create(&(0x7f00000000c0)='[*[\x00', 0x0) write(r0, &(0x7f0000002000)='v', 0x1) write(r0, &(0x7f0000000000)="f7ea42337eb805da8d24d09f3c2100580900ccd45da0739a805009d8302bd00b1918efd82ab5b66259ecf0fd65e780619ab209f6d5f35ff95473ca9f55b5862d", 0x40) sendfile(r0, r0, &(0x7f0000001000), 0xffff) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x4, 0x11, r0, 0x0) utimensat(0xffffffffffffffff, &(0x7f0000000b00)='./file0\x00', &(0x7f0000000b40)={{0x0, 0x7530}}, 0x0) 2018/04/07 08:15:04 executing program 7: r0 = syz_open_procfs(0x0, &(0x7f0000030ff8)='pagemap\x00') r1 = memfd_create(&(0x7f0000000ffc)='$\x00', 0x0) mmap(&(0x7f0000ffe000/0x1000)=nil, 0x1000, 0x0, 0x11, 0xffffffffffffffff, 0x0) sendfile(r1, r0, &(0x7f0000000200)=0x100000, 0x10000) 2018/04/07 08:15:04 executing program 0: r0 = add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000040)={0x73, 0x79, 0x7a}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$update(0x2, r0, &(0x7f0000000080), 0x0) 2018/04/07 08:15:04 executing program 2: bpf$MAP_CREATE(0x0, &(0x7f0000346fd4)={0x0, 0x0, 0x0, 0x9cb}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0x1, 0x5, &(0x7f0000346fc8)=@framed={{0x18}, [@alu={0x8000000201a7f19, 0x0, 0x201a7fa6, 0x0, 0x1}], {0x95}}, &(0x7f0000f6bffb)='GPL\x00', 0x1, 0xfb, &(0x7f00001a7f05)=""/251}, 0x310) 2018/04/07 08:15:04 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000447000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(blowfish)\x00'}, 0x58) r1 = accept$alg(0xffffffffffffffff, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000330d27)="d3ab2719", 0x4) sendmmsg$alg(r1, &(0x7f000059cfc8)=[{0x0, 0x0, &(0x7f0000283000)=[{&(0x7f00005a7000)="d1a4edc6ada830966dc07a7d9eda5a84d6acd04108a8778ef7bdb8de20dadf839b76eae0e7790d9454e3218626070927707fd45c81e73272b7ebc618d39458b5db41ebef9c78743b4aeab1813d5349a9", 0x50}], 0x1, &(0x7f0000000140)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmsg(r1, &(0x7f0000000340)={&(0x7f0000000000)=@alg, 0x58, &(0x7f00000002c0)=[{&(0x7f0000000080)=""/81, 0x51}], 0x1}, 0x0) 2018/04/07 08:15:04 executing program 5: mkdir(&(0x7f0000e29000)='./file0\x00', 0x0) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000026ff8)='./file0\x00', &(0x7f000000c000)='ramfs\x00', 0x0, &(0x7f00000002c0)) mount(&(0x7f0000037000)='./file0\x00', &(0x7f0000c4fff8)='./file0\x00', &(0x7f0000000080)="72616f04d99d69fb1933f8fc9d0d5200", 0x100000, &(0x7f0000ce3000)) mount(&(0x7f000011dff2)='./file0/file0\x00', &(0x7f0000917000)='./file0/file0\x00', &(0x7f0000467000)='xfs\x00', 0x1000, 0x0) mount(&(0x7f0000f27ff2)='./file0/file0\x00', &(0x7f00002faff8)='./file0/file0\x00', &(0x7f0000239000)='\x00v\t', 0x1004, &(0x7f0000a06000)) mount(&(0x7f0000000200)='./file0/file0\x00', &(0x7f00000000c0)='./file0\x00', &(0x7f0000000280)='ncpfs\x00', 0x84000, &(0x7f00000002c0)) 2018/04/07 08:15:04 executing program 1: pwritev(0xffffffffffffffff, &(0x7f00000000c0)=[{&(0x7f0000000000)="480000000042f7", 0x7}], 0x1, 0x11) mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x4, 0x11, 0xffffffffffffffff, 0x0) timer_settime(0x0, 0x0, &(0x7f0000001000), &(0x7f0000005000)) 2018/04/07 08:15:05 executing program 6: ioctl$DRM_IOCTL_AGP_FREE(0xffffffffffffffff, 0x40206435, &(0x7f0000002000)={0x0, 0x0, 0x0, 0x481371}) bpf$PROG_LOAD(0x5, &(0x7f0000cd2fb8)={0x2000000000001, 0x5, &(0x7f0000002000)=@framed={{0x18}, [@jmp={0x5}], {0x95}}, &(0x7f0000e74000)='syzkaller\x00', 0xea4c, 0xc3, &(0x7f000000a000)=""/195}, 0x48) 2018/04/07 08:15:05 executing program 7: r0 = syz_open_procfs(0x0, &(0x7f0000030ff8)='pagemap\x00') r1 = memfd_create(&(0x7f0000000ffc)='$\x00', 0x0) mmap(&(0x7f0000ffe000/0x1000)=nil, 0x1000, 0x0, 0x11, 0xffffffffffffffff, 0x0) sendfile(r1, r0, &(0x7f0000000200)=0x100000, 0x10000) 2018/04/07 08:15:05 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000447000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(blowfish)\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000330d27)="d3ab2719", 0x4) sendmmsg$alg(r1, &(0x7f000059cfc8)=[{0x0, 0x0, &(0x7f0000283000)=[{&(0x7f00005a7000)="d1a4edc6ada830966dc07a7d9eda5a84d6acd04108a8778ef7bdb8de20dadf839b76eae0e7790d9454e3218626070927707fd45c81e73272b7ebc618d39458b5db41ebef9c78743b4aeab1813d5349a9", 0x50}], 0x1, &(0x7f0000000140)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmsg(r1, &(0x7f0000000340)={&(0x7f0000000000)=@alg, 0x58, &(0x7f00000002c0)=[{&(0x7f0000000080)=""/81, 0x51}], 0x1}, 0x0) 2018/04/07 08:15:05 executing program 2: r0 = syz_open_dev$evdev(&(0x7f0000131fee)='/dev/input/event#\x00', 0x0, 0x0) ioctl$EVIOCGSW(r0, 0x8040451b, &(0x7f0000000000)=""/101) 2018/04/07 08:15:05 executing program 0: r0 = open(&(0x7f0000000040)='.', 0x0, 0x0) fchownat(r0, &(0x7f0000000440)='.', 0x0, 0x0, 0x0) 2018/04/07 08:15:05 executing program 1: pwritev(0xffffffffffffffff, &(0x7f00000000c0)=[{&(0x7f0000000000)="480000000042f7", 0x7}], 0x1, 0x11) mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x4, 0x11, 0xffffffffffffffff, 0x0) timer_settime(0x0, 0x0, &(0x7f0000001000), &(0x7f0000005000)) 2018/04/07 08:15:05 executing program 5: mkdir(&(0x7f0000e29000)='./file0\x00', 0x0) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000026ff8)='./file0\x00', &(0x7f000000c000)='ramfs\x00', 0x0, &(0x7f00000002c0)) mount(&(0x7f0000037000)='./file0\x00', &(0x7f0000c4fff8)='./file0\x00', &(0x7f0000000080)="72616f04d99d69fb1933f8fc9d0d5200", 0x100000, &(0x7f0000ce3000)) mount(&(0x7f000011dff2)='./file0/file0\x00', &(0x7f0000917000)='./file0/file0\x00', &(0x7f0000467000)='xfs\x00', 0x1000, 0x0) mount(&(0x7f0000f27ff2)='./file0/file0\x00', &(0x7f00002faff8)='./file0/file0\x00', &(0x7f0000239000)='\x00v\t', 0x1004, &(0x7f0000a06000)) mount(&(0x7f0000000200)='./file0/file0\x00', &(0x7f00000000c0)='./file0\x00', &(0x7f0000000280)='ncpfs\x00', 0x84000, &(0x7f00000002c0)) 2018/04/07 08:15:05 executing program 4: mprotect(&(0x7f0000000000/0x1000)=nil, 0x1000, 0x2) r0 = eventfd2(0x0, 0x0) writev(r0, &(0x7f0000000fff)=[{&(0x7f0000006000), 0x2a9}], 0x1) 2018/04/07 08:15:05 executing program 4: mmap(&(0x7f0000000000/0xfda000)=nil, 0xfda000, 0x1, 0x31, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0x1e7000)=nil, 0x1e7000, 0x3, 0x32, 0xffffffffffffffff, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$inet_buf(r0, 0x0, 0x486, &(0x7f000048ffe8)=""/24, &(0x7f00001e6000)=0x18) 2018/04/07 08:15:05 executing program 2: r0 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x102) write$evdev(r0, &(0x7f0000057fa0)=[{}, {}], 0xfffffd24) clone(0x0, &(0x7f0000000000), &(0x7f0000000000), &(0x7f0000000040), &(0x7f0000000080)) close(r0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x0, 0x8031, 0xffffffffffffffff, 0x0) openat$rtc(0xffffffffffffff9c, &(0x7f0000000100)='/dev/rtc\x00', 0x0, 0x0) ioctl$EVIOCRMFF(0xffffffffffffffff, 0x40044581, &(0x7f0000000080)) clock_settime(0x0, &(0x7f00000000c0)={0x77359400}) 2018/04/07 08:15:05 executing program 1: pwritev(0xffffffffffffffff, &(0x7f00000000c0)=[{&(0x7f0000000000)="480000000042f7", 0x7}], 0x1, 0x11) mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x4, 0x11, 0xffffffffffffffff, 0x0) timer_settime(0x0, 0x0, &(0x7f0000001000), &(0x7f0000005000)) 2018/04/07 08:15:05 executing program 5: mkdir(&(0x7f0000e29000)='./file0\x00', 0x0) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000026ff8)='./file0\x00', &(0x7f000000c000)='ramfs\x00', 0x0, &(0x7f00000002c0)) creat(&(0x7f000016cff8)='./file0/file0\x00', 0x0) mount(&(0x7f000011dff2)='./file0/file0\x00', &(0x7f0000917000)='./file0/file0\x00', &(0x7f0000467000)='xfs\x00', 0x1000, 0x0) mount(&(0x7f0000f27ff2)='./file0/file0\x00', &(0x7f00002faff8)='./file0/file0\x00', &(0x7f0000239000)='\x00v\t', 0x1004, &(0x7f0000a06000)) mount(&(0x7f0000000200)='./file0/file0\x00', &(0x7f00000000c0)='./file0\x00', &(0x7f0000000280)='ncpfs\x00', 0x84000, &(0x7f00000002c0)) 2018/04/07 08:15:05 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000447000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(blowfish)\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000330d27), 0x0) sendmmsg$alg(r1, &(0x7f000059cfc8)=[{0x0, 0x0, &(0x7f0000283000)=[{&(0x7f00005a7000)="d1a4edc6ada830966dc07a7d9eda5a84d6acd04108a8778ef7bdb8de20dadf839b76eae0e7790d9454e3218626070927707fd45c81e73272b7ebc618d39458b5db41ebef9c78743b4aeab1813d5349a9", 0x50}], 0x1, &(0x7f0000000140)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmsg(r1, &(0x7f0000000340)={&(0x7f0000000000)=@alg, 0x58, &(0x7f00000002c0)=[{&(0x7f0000000080)=""/81, 0x51}], 0x1}, 0x0) 2018/04/07 08:15:05 executing program 0: r0 = eventfd2(0x200000001, 0x0) readv(r0, &(0x7f0000001600)=[{&(0x7f0000000100)=""/8, 0x8}, {&(0x7f0000001500)=""/231, 0x4}], 0x2) 2018/04/07 08:15:05 executing program 1: r0 = memfd_create(&(0x7f0000002000)="2f7b06003170707031253a656d30f9", 0x0) pwritev(0xffffffffffffffff, &(0x7f00000000c0)=[{&(0x7f0000000000)="480000000042f7", 0x7}], 0x1, 0x11) mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x4, 0x11, r0, 0x0) timer_settime(0x0, 0x0, &(0x7f0000001000), &(0x7f0000005000)) 2018/04/07 08:15:06 executing program 6: ioctl$DRM_IOCTL_AGP_FREE(0xffffffffffffffff, 0x40206435, &(0x7f0000002000)={0x0, 0x0, 0x0, 0x481371}) bpf$PROG_LOAD(0x5, &(0x7f0000cd2fb8)={0x2000000000001, 0x5, &(0x7f0000002000)=@framed={{0x18}, [@jmp={0x5}], {0x95}}, &(0x7f0000e74000)='syzkaller\x00', 0xea4c, 0xc3, &(0x7f000000a000)=""/195}, 0x48) 2018/04/07 08:15:06 executing program 7: r0 = syz_open_procfs(0x0, &(0x7f0000030ff8)='pagemap\x00') r1 = memfd_create(&(0x7f0000000ffc)='$\x00', 0x0) mmap(&(0x7f0000ffe000/0x1000)=nil, 0x1000, 0x0, 0x11, r1, 0x0) sendfile(0xffffffffffffffff, r0, &(0x7f0000000200)=0x100000, 0x10000) 2018/04/07 08:15:06 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000447000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(blowfish)\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000330d27)="d3ab", 0x2) sendmmsg$alg(r1, &(0x7f000059cfc8)=[{0x0, 0x0, &(0x7f0000283000)=[{&(0x7f00005a7000)="d1a4edc6ada830966dc07a7d9eda5a84d6acd04108a8778ef7bdb8de20dadf839b76eae0e7790d9454e3218626070927707fd45c81e73272b7ebc618d39458b5db41ebef9c78743b4aeab1813d5349a9", 0x50}], 0x1, &(0x7f0000000140)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmsg(r1, &(0x7f0000000340)={&(0x7f0000000000)=@alg, 0x58, &(0x7f00000002c0)=[{&(0x7f0000000080)=""/81, 0x51}], 0x1}, 0x0) 2018/04/07 08:15:06 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f00000002c0)={'lo\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f0000000380)={&(0x7f0000000240)={0x10}, 0xc, &(0x7f0000000340)={&(0x7f0000000280)=@ipv6_newaddr={0x34, 0x14, 0x503, 0x0, 0x0, {0xa, 0x0, 0x0, 0x0, r1}, [@IFA_FLAGS={0x8, 0x8, 0x100}, @IFA_LOCAL={0x14, 0x2, @loopback={0x0, 0x1}}]}, 0x34}, 0x1}, 0x0) 2018/04/07 08:15:06 executing program 4: mkdir(&(0x7f0000b38ff8)='./file0\x00', 0x0) r0 = inotify_init() r1 = epoll_create(0x200000a) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, &(0x7f0000b68000)) r2 = inotify_add_watch(r0, &(0x7f0000c3d000)='./file0\x00', 0x2) inotify_rm_watch(r0, r2) epoll_ctl$EPOLL_CTL_MOD(r1, 0x3, r0, &(0x7f0000000000)={0x10000001}) 2018/04/07 08:15:06 executing program 1: r0 = memfd_create(&(0x7f0000002000)="2f7b06003170707031253a656d30f9", 0x0) pwritev(0xffffffffffffffff, &(0x7f00000000c0)=[{&(0x7f0000000000)="480000000042f7", 0x7}], 0x1, 0x11) mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x4, 0x11, r0, 0x0) timer_settime(0x0, 0x0, &(0x7f0000001000), &(0x7f0000005000)) 2018/04/07 08:15:06 executing program 2: r0 = gettid() r1 = syz_open_procfs(r0, &(0x7f0000000080)='loginuid\x00') read$eventfd(r1, &(0x7f0000000000), 0x8) writev(r1, &(0x7f000000a000)=[{&(0x7f0000000100)='+', 0x1}], 0x1) 2018/04/07 08:15:06 executing program 5: mkdir(&(0x7f0000e29000)='./file0\x00', 0x0) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000026ff8)='./file0\x00', &(0x7f000000c000)='ramfs\x00', 0x0, &(0x7f00000002c0)) creat(&(0x7f000016cff8)='./file0/file0\x00', 0x0) mount(&(0x7f000011dff2)='./file0/file0\x00', &(0x7f0000917000)='./file0/file0\x00', &(0x7f0000467000)='xfs\x00', 0x1000, 0x0) mount(&(0x7f0000f27ff2)='./file0/file0\x00', &(0x7f00002faff8)='./file0/file0\x00', &(0x7f0000239000)='\x00v\t', 0x1004, &(0x7f0000a06000)) mount(&(0x7f0000000200)='./file0/file0\x00', &(0x7f00000000c0)='./file0\x00', &(0x7f0000000280)='ncpfs\x00', 0x84000, &(0x7f00000002c0)) 2018/04/07 08:15:06 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000447000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(blowfish)\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000330d27)="d3ab27", 0x3) sendmmsg$alg(r1, &(0x7f000059cfc8)=[{0x0, 0x0, &(0x7f0000283000)=[{&(0x7f00005a7000)="d1a4edc6ada830966dc07a7d9eda5a84d6acd04108a8778ef7bdb8de20dadf839b76eae0e7790d9454e3218626070927707fd45c81e73272b7ebc618d39458b5db41ebef9c78743b4aeab1813d5349a9", 0x50}], 0x1, &(0x7f0000000140)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmsg(r1, &(0x7f0000000340)={&(0x7f0000000000)=@alg, 0x58, &(0x7f00000002c0)=[{&(0x7f0000000080)=""/81, 0x51}], 0x1}, 0x0) 2018/04/07 08:15:06 executing program 6: ioctl$DRM_IOCTL_AGP_FREE(0xffffffffffffffff, 0x40206435, &(0x7f0000002000)={0x0, 0x0, 0x0, 0x481371}) bpf$PROG_LOAD(0x5, &(0x7f0000cd2fb8)={0x2000000000001, 0x5, &(0x7f0000002000)=@framed={{0x18}, [@jmp={0x5}], {0x95}}, &(0x7f0000e74000)='syzkaller\x00', 0xea4c, 0xc3, &(0x7f000000a000)=""/195}, 0x48) 2018/04/07 08:15:06 executing program 7: r0 = syz_open_procfs(0x0, &(0x7f0000030ff8)='pagemap\x00') r1 = memfd_create(&(0x7f0000000ffc)='$\x00', 0x0) mmap(&(0x7f0000ffe000/0x1000)=nil, 0x1000, 0x0, 0x11, r1, 0x0) sendfile(r1, 0xffffffffffffffff, &(0x7f0000000200)=0x100000, 0x10000) 2018/04/07 08:15:06 executing program 2: r0 = socket(0x2, 0x1, 0x0) setsockopt(r0, 0x6, 0xe, &(0x7f0000902000)="020008000000000000005462fa01a15eaf0d2cf653f13cc379ede4eaf40f4a95bbff850a8263357506b31e58a98399b397e695c0f03d3b3d54436fe71cbcdc6e30ac10369300f6af7d07634832b8a5c0a94c470502e9337b3e7298fc74e81b1058d02f9b14732017e2466a9fc43aea71263335960415800020f9575da602000000001f0000d1b0e6ebcb12c7291871363e97100c4a4c2e9f5c0c14f1659ce8c8bed2e97e60a3649f93ea0c8263f864802ad72fa698807ef14a4a1813e976be1d113b514dbdc05ea1309163d6a4830de8391f2ecab7bbfbcb", 0xd8) setsockopt(r0, 0x40000000000006, 0x20, &(0x7f000061d000)="02000800000000000000001ffa01a55eaf0d2cf653f13cc379ede4eaf40f4a95bbff850a826335946c288558a98399b397e695c0f03d3b3d54436fe71cbcdc6e30ac10369300f6af7d07634832b8a5c0a94c070000000000000098fc74e91b1026d02f8001732017e2466a9fc43aea71263335960415800000f9575da602000011001f0000d1b0e6ebcb12c7291871363e97100c4a4c2e9f5c0c14f1659ce8c8bed2e97e60a3649f93ea0c8263f864802a602fa698807ef14a4a1813e976be1d00000006bdc05ea1309163d6a4830de8391f2ecab7bbfbcb", 0xd8) 2018/04/07 08:15:06 executing program 1: r0 = memfd_create(&(0x7f0000002000)="2f7b06003170707031253a656d30f9", 0x0) pwritev(0xffffffffffffffff, &(0x7f00000000c0)=[{&(0x7f0000000000)="480000000042f7", 0x7}], 0x1, 0x11) mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x4, 0x11, r0, 0x0) timer_settime(0x0, 0x0, &(0x7f0000001000), &(0x7f0000005000)) 2018/04/07 08:15:06 executing program 0: r0 = socket(0x10, 0x2, 0xc) write(r0, &(0x7f0000000000)="1f0000000101ffd6001effff0401a41e82c91d02970e9cf96aa3f800000000", 0x1f) clock_getres(0x2, &(0x7f00000001c0)) 2018/04/07 08:15:06 executing program 4: r0 = syz_open_dev$sg(&(0x7f0000001000)='/dev/sg#\x00', 0x0, 0x0) mmap(&(0x7f000000d000/0x2000)=nil, 0x2000, 0x3, 0x12, r0, 0x0) request_key(&(0x7f000000cfee)='.request_key_auth\x00', &(0x7f0000004ffb)={0x73, 0x79, 0x7a}, &(0x7f0000000fc0)=')}md5sum:-vmnet0posix_acl_access^ppp1mime_type+keyringmime_type\x00', 0x0) modify_ldt$read_default(0x2, &(0x7f000000d000)=""/191, 0xffffffffffffff00) 2018/04/07 08:15:06 executing program 5: mkdir(&(0x7f0000e29000)='./file0\x00', 0x0) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000026ff8)='./file0\x00', &(0x7f000000c000)='ramfs\x00', 0x0, &(0x7f00000002c0)) creat(&(0x7f000016cff8)='./file0/file0\x00', 0x0) mount(&(0x7f000011dff2)='./file0/file0\x00', &(0x7f0000917000)='./file0/file0\x00', &(0x7f0000467000)='xfs\x00', 0x1000, 0x0) mount(&(0x7f0000f27ff2)='./file0/file0\x00', &(0x7f00002faff8)='./file0/file0\x00', &(0x7f0000239000)='\x00v\t', 0x1004, &(0x7f0000a06000)) mount(&(0x7f0000000200)='./file0/file0\x00', &(0x7f00000000c0)='./file0\x00', &(0x7f0000000280)='ncpfs\x00', 0x84000, &(0x7f00000002c0)) 2018/04/07 08:15:06 executing program 6: ioctl$DRM_IOCTL_AGP_FREE(0xffffffffffffffff, 0x40206435, &(0x7f0000002000)={0x0, 0x0, 0x0, 0x481371}) bpf$PROG_LOAD(0x5, &(0x7f0000cd2fb8)={0x2000000000001, 0x5, &(0x7f0000002000)=@framed={{0x18}, [@jmp={0x5}], {0x95}}, &(0x7f0000e74000)='syzkaller\x00', 0xea4c, 0xc3, &(0x7f000000a000)=""/195}, 0x48) 2018/04/07 08:15:06 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000447000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(blowfish)\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000330d27)="d3ab2719", 0x4) sendmmsg$alg(0xffffffffffffffff, &(0x7f000059cfc8)=[{0x0, 0x0, &(0x7f0000283000)=[{&(0x7f00005a7000)="d1a4edc6ada830966dc07a7d9eda5a84d6acd04108a8778ef7bdb8de20dadf839b76eae0e7790d9454e3218626070927707fd45c81e73272b7ebc618d39458b5db41ebef9c78743b4aeab1813d5349a9", 0x50}], 0x1, &(0x7f0000000140)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmsg(r1, &(0x7f0000000340)={&(0x7f0000000000)=@alg, 0x58, &(0x7f00000002c0)=[{&(0x7f0000000080)=""/81, 0x51}], 0x1}, 0x0) [ 64.552229] netlink: 11 bytes leftover after parsing attributes in process `syz-executor0'. 2018/04/07 08:15:06 executing program 2: r0 = epoll_create(0x9) r1 = openat$rfkill(0xffffffffffffff9c, &(0x7f00003b5000)='/dev/rfkill\x00', 0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, r1, &(0x7f00002b9ff4)={0x4}) epoll_ctl$EPOLL_CTL_MOD(r0, 0x3, r1, &(0x7f0000000000)) epoll_wait(r0, &(0x7f0000ceefd0)=[{}], 0x1, 0x0) 2018/04/07 08:15:06 executing program 1: r0 = memfd_create(&(0x7f0000002000)="2f7b06003170707031253a656d30f9", 0x0) pwritev(r0, &(0x7f00000000c0), 0x0, 0x11) mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x4, 0x11, r0, 0x0) timer_settime(0x0, 0x0, &(0x7f0000001000), &(0x7f0000005000)) 2018/04/07 08:15:06 executing program 7: r0 = syz_open_procfs(0x0, &(0x7f0000030ff8)='pagemap\x00') r1 = memfd_create(&(0x7f0000000ffc)='$\x00', 0x0) mmap(&(0x7f0000ffe000/0x1000)=nil, 0x1000, 0x0, 0x11, r1, 0x0) sendfile(r1, r0, &(0x7f0000000200), 0x10000) 2018/04/07 08:15:06 executing program 4: r0 = syz_open_dev$sndseq(&(0x7f0000dcc000)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r0, 0xc0a85320, &(0x7f0000418f50)={{0x80}, "0a4ceaa05d9a00000000000000039b3fd4cec307e8ef3d13eb790ec9c65abaf90d229db692542e5b78f8b29e0a27800f0000000000000009fb42f376589701a4"}) ioctl$SNDRV_SEQ_IOCTL_SET_PORT_INFO(r0, 0x40a85323, &(0x7f0000000240)={{0x80}, 'port0\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}) [ 64.736791] netlink: 11 bytes leftover after parsing attributes in process `syz-executor0'. 2018/04/07 08:15:06 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000447000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(blowfish)\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000330d27)="d3ab2719", 0x4) sendmmsg$alg(0xffffffffffffffff, &(0x7f000059cfc8)=[{0x0, 0x0, &(0x7f0000283000)=[{&(0x7f00005a7000)="d1a4edc6ada830966dc07a7d9eda5a84d6acd04108a8778ef7bdb8de20dadf839b76eae0e7790d9454e3218626070927707fd45c81e73272b7ebc618d39458b5db41ebef9c78743b4aeab1813d5349a9", 0x50}], 0x1, &(0x7f0000000140)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmsg(r1, &(0x7f0000000340)={&(0x7f0000000000)=@alg, 0x58, &(0x7f00000002c0)=[{&(0x7f0000000080)=""/81, 0x51}], 0x1}, 0x0) 2018/04/07 08:15:06 executing program 6: bpf$PROG_LOAD(0x5, &(0x7f0000cd2fb8)={0x2000000000001, 0x5, &(0x7f0000002000)=@framed={{0x18}, [@jmp={0x5}], {0x95}}, &(0x7f0000e74000)='syzkaller\x00', 0xea4c, 0xc3, &(0x7f000000a000)=""/195}, 0x48) 2018/04/07 08:15:06 executing program 5: mkdir(&(0x7f0000e29000)='./file0\x00', 0x0) mount(&(0x7f0000037000)='./file0\x00', &(0x7f0000c4fff8)='./file0\x00', &(0x7f0000000080)="72616f04d99d69fb1933f8fc9d0d5200", 0x100000, &(0x7f0000ce3000)) creat(&(0x7f000016cff8)='./file0/file0\x00', 0x0) mount(&(0x7f000011dff2)='./file0/file0\x00', &(0x7f0000917000)='./file0/file0\x00', &(0x7f0000467000)='xfs\x00', 0x1000, 0x0) mount(&(0x7f0000f27ff2)='./file0/file0\x00', &(0x7f00002faff8)='./file0/file0\x00', &(0x7f0000239000)='\x00v\t', 0x1004, &(0x7f0000a06000)) mount(&(0x7f0000000200)='./file0/file0\x00', &(0x7f00000000c0)='./file0\x00', &(0x7f0000000280)='ncpfs\x00', 0x84000, &(0x7f00000002c0)) 2018/04/07 08:15:06 executing program 2: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000400)={'bond0\x00', &(0x7f0000000300)=ANY=[@ANYBLOB='Q']}) 2018/04/07 08:15:06 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) capset(&(0x7f0000000000)={0x19980330}, &(0x7f0000804000)) ioctl$DRM_IOCTL_AGP_FREE(0xffffffffffffffff, 0x40206435, &(0x7f0000000000)={0x6}) ioctl(r0, 0x800000000008982, &(0x7f0000000000)) 2018/04/07 08:15:06 executing program 7: r0 = syz_open_procfs(0x0, &(0x7f0000030ff8)='pagemap\x00') r1 = memfd_create(&(0x7f0000000ffc)='$\x00', 0x0) mmap(&(0x7f0000ffe000/0x1000)=nil, 0x1000, 0x0, 0x11, r1, 0x0) sendfile(r1, r0, &(0x7f0000000200), 0x10000) 2018/04/07 08:15:06 executing program 0: unshare(0x400) r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='/exe\x00\x00\x00\x00\x00\x00') fsetxattr(r0, &(0x7f0000000680)=@known='user.syz\x00', &(0x7f0000002140)='em0*.]keyring!\x00', 0xf, 0x0) 2018/04/07 08:15:06 executing program 1: r0 = memfd_create(&(0x7f0000002000)="2f7b06003170707031253a656d30f9", 0x0) pwritev(r0, &(0x7f00000000c0), 0x0, 0x11) mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x4, 0x11, r0, 0x0) timer_settime(0x0, 0x0, &(0x7f0000001000), &(0x7f0000005000)) 2018/04/07 08:15:07 executing program 4: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000011fd4)={0x3, 0x4, 0x4, 0x1, 0x0, 0x1}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000005100)={0x6, 0x5, &(0x7f0000000040)=@framed={{0x18}, [@map={0x18, 0x0, 0x1, 0x0, r0}], {0x95}}, &(0x7f0000000080)='syzkaller\x00', 0x9, 0x1000, &(0x7f0000001240)=""/4096}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000011c0)={0xc, 0x5, &(0x7f0000000000)=@framed={{0x18}, [@map={0x18, 0x0, 0x1, 0x0, r0}], {0x95}}, &(0x7f0000000180)='GPL\x00', 0xbeeb, 0x1000, &(0x7f00000001c0)=""/4096}, 0x48) 2018/04/07 08:15:07 executing program 7: r0 = syz_open_procfs(0x0, &(0x7f0000030ff8)='pagemap\x00') r1 = memfd_create(&(0x7f0000000ffc)='$\x00', 0x0) mmap(&(0x7f0000ffe000/0x1000)=nil, 0x1000, 0x0, 0x11, r1, 0x0) sendfile(r1, r0, &(0x7f0000000200), 0x10000) 2018/04/07 08:15:07 executing program 6: bpf$PROG_LOAD(0x5, &(0x7f0000cd2fb8)={0x2000000000001, 0x5, &(0x7f0000002000)=@framed={{0x18}, [@jmp={0x5}], {0x95}}, &(0x7f0000e74000)='syzkaller\x00', 0xea4c, 0xc3, &(0x7f000000a000)=""/195}, 0x48) 2018/04/07 08:15:07 executing program 2: r0 = syz_open_dev$sg(&(0x7f0000058ff7)='/dev/sg#\x00', 0x0, 0x0) ioctl(r0, 0x5385, &(0x7f0000280000)) 2018/04/07 08:15:07 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000447000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(blowfish)\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000330d27)="d3ab2719", 0x4) sendmmsg$alg(0xffffffffffffffff, &(0x7f000059cfc8)=[{0x0, 0x0, &(0x7f0000283000)=[{&(0x7f00005a7000)="d1a4edc6ada830966dc07a7d9eda5a84d6acd04108a8778ef7bdb8de20dadf839b76eae0e7790d9454e3218626070927707fd45c81e73272b7ebc618d39458b5db41ebef9c78743b4aeab1813d5349a9", 0x50}], 0x1, &(0x7f0000000140)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmsg(r1, &(0x7f0000000340)={&(0x7f0000000000)=@alg, 0x58, &(0x7f00000002c0)=[{&(0x7f0000000080)=""/81, 0x51}], 0x1}, 0x0) 2018/04/07 08:15:07 executing program 1: r0 = memfd_create(&(0x7f0000002000)="2f7b06003170707031253a656d30f9", 0x0) pwritev(r0, &(0x7f00000000c0), 0x0, 0x11) mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x4, 0x11, r0, 0x0) timer_settime(0x0, 0x0, &(0x7f0000001000), &(0x7f0000005000)) 2018/04/07 08:15:07 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000100)='net/igmp6\x00') bind$alg(r0, &(0x7f0000466000)={0x26, 'hash\x00', 0x0, 0x0, 'poly1305-generic\x00'}, 0x58) r2 = accept4$alg(r0, 0x0, 0x0, 0x0) sendfile(r2, r1, &(0x7f0000a2effc), 0x400) 2018/04/07 08:15:07 executing program 5: mkdir(&(0x7f0000e29000)='./file0\x00', 0x0) mount(&(0x7f0000037000)='./file0\x00', &(0x7f0000c4fff8)='./file0\x00', &(0x7f0000000080)="72616f04d99d69fb1933f8fc9d0d5200", 0x100000, &(0x7f0000ce3000)) creat(&(0x7f000016cff8)='./file0/file0\x00', 0x0) mount(&(0x7f000011dff2)='./file0/file0\x00', &(0x7f0000917000)='./file0/file0\x00', &(0x7f0000467000)='xfs\x00', 0x1000, 0x0) mount(&(0x7f0000f27ff2)='./file0/file0\x00', &(0x7f00002faff8)='./file0/file0\x00', &(0x7f0000239000)='\x00v\t', 0x1004, &(0x7f0000a06000)) mount(&(0x7f0000000200)='./file0/file0\x00', &(0x7f00000000c0)='./file0\x00', &(0x7f0000000280)='ncpfs\x00', 0x84000, &(0x7f00000002c0)) 2018/04/07 08:15:07 executing program 4: r0 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) truncate(&(0x7f0000012000)='./bus\x00', 0xffff) mmap(&(0x7f0000000000/0x11000)=nil, 0x11000, 0x1, 0x11, r0, 0x0) r1 = open(&(0x7f0000cdd000)='./bus\x00', 0x0, 0x0) mlock2(&(0x7f0000008000/0x4000)=nil, 0x4000, 0x0) fadvise64(r1, 0x0, 0x0, 0x4) 2018/04/07 08:15:07 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x4) write(r0, &(0x7f0000000000)="270000001400010400000000120f0a0010f80000f6007500000000000000000000000000000000", 0x27) 2018/04/07 08:15:07 executing program 7: r0 = syz_open_procfs(0x0, &(0x7f0000030ff8)='pagemap\x00') r1 = memfd_create(&(0x7f0000000ffc)='$\x00', 0x0) mmap(&(0x7f0000ffe000/0x1000)=nil, 0x1000, 0x0, 0x11, r1, 0x0) sendfile(r1, r0, &(0x7f0000000200)=0x100000, 0x0) 2018/04/07 08:15:07 executing program 6: bpf$PROG_LOAD(0x5, &(0x7f0000cd2fb8)={0x2000000000001, 0x5, &(0x7f0000002000)=@framed={{0x18}, [@jmp={0x5}], {0x95}}, &(0x7f0000e74000)='syzkaller\x00', 0xea4c, 0xc3, &(0x7f000000a000)=""/195}, 0x48) 2018/04/07 08:15:07 executing program 1: r0 = memfd_create(&(0x7f0000002000)="2f7b06003170707031253a656d30f9", 0x0) pwritev(r0, &(0x7f00000000c0)=[{}], 0x1, 0x11) mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x4, 0x11, r0, 0x0) timer_settime(0x0, 0x0, &(0x7f0000001000), &(0x7f0000005000)) 2018/04/07 08:15:07 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000447000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(blowfish)\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000330d27)="d3ab2719", 0x4) sendmmsg$alg(r1, &(0x7f000059cfc8), 0x0, 0x0) recvmsg(r1, &(0x7f0000000340)={&(0x7f0000000000)=@alg, 0x58, &(0x7f00000002c0)=[{&(0x7f0000000080)=""/81, 0x51}], 0x1}, 0x0) 2018/04/07 08:15:07 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000100)='net/igmp6\x00') bind$alg(r0, &(0x7f0000466000)={0x26, 'hash\x00', 0x0, 0x0, 'poly1305-generic\x00'}, 0x58) r2 = accept4$alg(r0, 0x0, 0x0, 0x0) sendfile(r2, r1, &(0x7f0000a2effc), 0x400) 2018/04/07 08:15:07 executing program 4: r0 = epoll_create1(0x0) r1 = epoll_create1(0x0) close(r0) r2 = syz_open_dev$vcsa(&(0x7f0000580ff5)='/dev/vcsa#\x00', 0x1f, 0x0) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, &(0x7f0000c85000)) readv(r0, &(0x7f0000266000)=[{&(0x7f000032cf93)=""/109, 0x6d}], 0x1) poll(&(0x7f00000001c0)=[{r2}], 0x1, 0x0) 2018/04/07 08:15:07 executing program 5: mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000026ff8)='./file0\x00', &(0x7f000000c000)='ramfs\x00', 0x0, &(0x7f00000002c0)) mount(&(0x7f0000037000)='./file0\x00', &(0x7f0000c4fff8)='./file0\x00', &(0x7f0000000080)="72616f04d99d69fb1933f8fc9d0d5200", 0x100000, &(0x7f0000ce3000)) creat(&(0x7f000016cff8)='./file0/file0\x00', 0x0) mount(&(0x7f000011dff2)='./file0/file0\x00', &(0x7f0000917000)='./file0/file0\x00', &(0x7f0000467000)='xfs\x00', 0x1000, 0x0) mount(&(0x7f0000f27ff2)='./file0/file0\x00', &(0x7f00002faff8)='./file0/file0\x00', &(0x7f0000239000)='\x00v\t', 0x1004, &(0x7f0000a06000)) mount(&(0x7f0000000200)='./file0/file0\x00', &(0x7f00000000c0)='./file0\x00', &(0x7f0000000280)='ncpfs\x00', 0x84000, &(0x7f00000002c0)) 2018/04/07 08:15:07 executing program 1: r0 = memfd_create(&(0x7f0000002000)="2f7b06003170707031253a656d30f9", 0x0) pwritev(r0, &(0x7f00000000c0)=[{}], 0x1, 0x11) mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x4, 0x11, r0, 0x0) timer_settime(0x0, 0x0, &(0x7f0000001000), &(0x7f0000005000)) 2018/04/07 08:15:07 executing program 7: r0 = syz_open_procfs(0x0, &(0x7f0000030ff8)='pagemap\x00') r1 = memfd_create(&(0x7f0000000ffc)='$\x00', 0x0) mmap(&(0x7f0000ffe000/0x1000)=nil, 0x1000, 0x0, 0x11, r1, 0x0) sendfile(r1, r0, &(0x7f0000000200)=0x100000, 0x0) 2018/04/07 08:15:07 executing program 6: ioctl$DRM_IOCTL_AGP_FREE(0xffffffffffffffff, 0x40206435, &(0x7f0000002000)) bpf$PROG_LOAD(0x5, &(0x7f0000cd2fb8)={0x2000000000001, 0x5, &(0x7f0000002000)=@framed={{0x18}, [@jmp={0x5}], {0x95}}, &(0x7f0000e74000)='syzkaller\x00', 0xea4c, 0xc3, &(0x7f000000a000)=""/195}, 0x48) 2018/04/07 08:15:07 executing program 0: madvise(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0xa) r0 = socket$inet6(0xa, 0x1, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f0000f5ffe0)={@loopback={0x0, 0x1}, 0x0, 0x0, 0x400000000000003, 0x10001}, 0x28) 2018/04/07 08:15:07 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000447000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(blowfish)\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000330d27)="d3ab2719", 0x4) sendmmsg$alg(r1, &(0x7f000059cfc8), 0x0, 0x0) recvmsg(r1, &(0x7f0000000340)={&(0x7f0000000000)=@alg, 0x58, &(0x7f00000002c0)=[{&(0x7f0000000080)=""/81, 0x51}], 0x1}, 0x0) 2018/04/07 08:15:07 executing program 2: r0 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$inet_buf(r0, 0x0, 0x41, &(0x7f0000000180)=""/144, &(0x7f0000e58000)=0x28) 2018/04/07 08:15:07 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_opts(r0, 0x0, 0x4, &(0x7f0000000000)="440d80ab2f2000cb04000000ec", 0xd) getsockopt$inet_buf(r0, 0x0, 0x4, &(0x7f0000000140)=""/77, &(0x7f00000001c0)=0x4d) 2018/04/07 08:15:07 executing program 5: mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000026ff8)='./file0\x00', &(0x7f000000c000)='ramfs\x00', 0x0, &(0x7f00000002c0)) mount(&(0x7f0000037000)='./file0\x00', &(0x7f0000c4fff8)='./file0\x00', &(0x7f0000000080)="72616f04d99d69fb1933f8fc9d0d5200", 0x100000, &(0x7f0000ce3000)) creat(&(0x7f000016cff8)='./file0/file0\x00', 0x0) mount(&(0x7f000011dff2)='./file0/file0\x00', &(0x7f0000917000)='./file0/file0\x00', &(0x7f0000467000)='xfs\x00', 0x1000, 0x0) mount(&(0x7f0000f27ff2)='./file0/file0\x00', &(0x7f00002faff8)='./file0/file0\x00', &(0x7f0000239000)='\x00v\t', 0x1004, &(0x7f0000a06000)) mount(&(0x7f0000000200)='./file0/file0\x00', &(0x7f00000000c0)='./file0\x00', &(0x7f0000000280)='ncpfs\x00', 0x84000, &(0x7f00000002c0)) 2018/04/07 08:15:07 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000447000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(blowfish)\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000330d27)="d3ab2719", 0x4) sendmmsg$alg(r1, &(0x7f000059cfc8), 0x0, 0x0) recvmsg(r1, &(0x7f0000000340)={&(0x7f0000000000)=@alg, 0x58, &(0x7f00000002c0)=[{&(0x7f0000000080)=""/81, 0x51}], 0x1}, 0x0) 2018/04/07 08:15:08 executing program 6: ioctl$DRM_IOCTL_AGP_FREE(0xffffffffffffffff, 0x40206435, &(0x7f0000002000)) bpf$PROG_LOAD(0x5, &(0x7f0000cd2fb8)={0x2000000000001, 0x5, &(0x7f0000002000)=@framed={{0x18}, [@jmp={0x5}], {0x95}}, &(0x7f0000e74000)='syzkaller\x00', 0xea4c, 0xc3, &(0x7f000000a000)=""/195}, 0x48) 2018/04/07 08:15:08 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000447000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(blowfish)\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000330d27)="d3ab2719", 0x4) sendmmsg$alg(r1, &(0x7f000059cfc8)=[{0x0, 0x0, &(0x7f0000283000), 0x0, &(0x7f0000000140)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmsg(r1, &(0x7f0000000340)={&(0x7f0000000000)=@alg, 0x58, &(0x7f00000002c0)=[{&(0x7f0000000080)=""/81, 0x51}], 0x1}, 0x0) 2018/04/07 08:15:08 executing program 7: r0 = syz_open_procfs(0x0, &(0x7f0000030ff8)='pagemap\x00') r1 = memfd_create(&(0x7f0000000ffc)='$\x00', 0x0) mmap(&(0x7f0000ffe000/0x1000)=nil, 0x1000, 0x0, 0x11, r1, 0x0) sendfile(r1, r0, &(0x7f0000000200)=0x100000, 0x0) 2018/04/07 08:15:08 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'hash\x00', 0x0, 0x0, 'ghash-clmulni\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000f3eff0)="01010000000ef40000000300409d9254", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000000980)=[{0x0, 0x0, &(0x7f00000003c0)=[{&(0x7f0000000440)="b1", 0x1}], 0x1, &(0x7f00000005c0)=[@assoc={0x18, 0x117, 0x4, 0x2}], 0x18, 0x40880}, {0x0, 0x0, &(0x7f00000006c0)=[{&(0x7f0000000600)="c61b611a09257c8ae66bc40062127f5fa21ec2634fce43e1958c39a7960191f1f2b7ec88618c54a1ffc3f72250d5b7fe93b1c404bfd27ee5c4ee9ae649761475f201fbbede0e89f82cbc6b9289658e0b1fc1515c5a11e8f3b9e9f75122a50916a52b7c86c54e0368658da89c454e667adeec03c96848ffa0195d69e603883fa0a9dca6092e65901ba792e548ba2baf48a5a5ed2ad8ecbe", 0x97}], 0x1, &(0x7f0000000700)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, {0x0, 0x0, &(0x7f00000008c0)=[{&(0x7f0000000780)="33da033003bf8901d5ad8601", 0xc}], 0x1, &(0x7f0000000900)=[@iv={0x40, 0x117, 0x2, 0x28, "668e78db52b883c0f015c4314e4ff1dd5d23ea2479018947315df980a97fb5f2f069f20fd76df8e0"}], 0x40, 0x40010}], 0x3, 0x8004) sendmsg$alg(r1, &(0x7f00000014c0)={0x0, 0x0, &(0x7f0000001700)=[{&(0x7f0000000180)}], 0x1, &(0x7f00000017c0)=ANY=[@ANYBLOB="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"], 0x127, 0x4000000}, 0x4000800) 2018/04/07 08:15:08 executing program 2: perf_event_open(&(0x7f000001d000)={0x2, 0x78, 0xe2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000a32000)={&(0x7f0000000000)={0x10}, 0xc, &(0x7f000000e000)={&(0x7f00002a0e50)={0x1c, 0x1c, 0x1, 0x0, 0x0, {0x1}, [@nested={0x8, 0x1, [@generic="b5"]}]}, 0x1c}, 0x1}, 0x0) 2018/04/07 08:15:08 executing program 4: prctl$intptr(0x2000000000029, 0x3) r0 = memfd_create(&(0x7f0000ed5ff2)="73656c662b65746831a470703100", 0x0) mmap(&(0x7f0000000000/0xaa2000)=nil, 0xaa2000, 0x0, 0x88011, r0, 0x0) 2018/04/07 08:15:08 executing program 5: mkdir(&(0x7f0000e29000)='./file0\x00', 0x0) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000026ff8)='./file0\x00', &(0x7f000000c000)='ramfs\x00', 0x0, &(0x7f00000002c0)) mount(&(0x7f0000037000)='./file0\x00', &(0x7f0000c4fff8)='./file0\x00', &(0x7f0000000080)="72616f04d99d69fb1933f8fc9d0d5200", 0x0, &(0x7f0000ce3000)) creat(&(0x7f000016cff8)='./file0/file0\x00', 0x0) mount(&(0x7f000011dff2)='./file0/file0\x00', &(0x7f0000917000)='./file0/file0\x00', &(0x7f0000467000)='xfs\x00', 0x1000, 0x0) mount(&(0x7f0000f27ff2)='./file0/file0\x00', &(0x7f00002faff8)='./file0/file0\x00', &(0x7f0000239000)='\x00v\t', 0x1004, &(0x7f0000a06000)) mount(&(0x7f0000000200)='./file0/file0\x00', &(0x7f00000000c0)='./file0\x00', &(0x7f0000000280)='ncpfs\x00', 0x84000, &(0x7f00000002c0)) 2018/04/07 08:15:08 executing program 1: r0 = memfd_create(&(0x7f0000002000)="2f7b06003170707031253a656d30f9", 0x0) pwritev(r0, &(0x7f00000000c0)=[{}], 0x1, 0x11) mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x4, 0x11, r0, 0x0) timer_settime(0x0, 0x0, &(0x7f0000001000), &(0x7f0000005000)) 2018/04/07 08:15:08 executing program 6: ioctl$DRM_IOCTL_AGP_FREE(0xffffffffffffffff, 0x40206435, &(0x7f0000002000)) bpf$PROG_LOAD(0x5, &(0x7f0000cd2fb8)={0x2000000000001, 0x5, &(0x7f0000002000)=@framed={{0x18}, [@jmp={0x5}], {0x95}}, &(0x7f0000e74000)='syzkaller\x00', 0xea4c, 0xc3, &(0x7f000000a000)=""/195}, 0x48) 2018/04/07 08:15:08 executing program 4: mkdir(&(0x7f000082f000)='./control\x00', 0x0) r0 = open(&(0x7f0000028000)='./control\x00', 0x0, 0x0) symlinkat(&(0x7f0000000000)='./control/file0\x00', r0, &(0x7f000034aff8)='./file0\x00') name_to_handle_at(r0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000140)=ANY=[@ANYBLOB='N'], &(0x7f0000000100), 0x0) name_to_handle_at(r0, &(0x7f0000d64000)='./file0\x00', &(0x7f0000c22000)={0xc, 0x0, "cafe3b1a"}, &(0x7f0000583000), 0x0) 2018/04/07 08:15:08 executing program 7: r0 = semget$private(0x0, 0x20000000103, 0x0) semtimedop(r0, &(0x7f000001dfd6)=[{0x0, 0xfffffffffffffff7}], 0x1, &(0x7f0000380000)={0x101}) semtimedop(r0, &(0x7f0000033816)=[{}, {0x0, 0x8091}], 0x2, &(0x7f0000034000)={0x77359400}) semctl$IPC_RMID(r0, 0x0, 0x0) 2018/04/07 08:15:08 executing program 1: r0 = memfd_create(&(0x7f0000002000)="2f7b06003170707031253a656d30f9", 0x0) pwritev(r0, &(0x7f00000000c0)=[{&(0x7f0000000000)='H\x00\x00\x00', 0x4}], 0x1, 0x11) mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x4, 0x11, r0, 0x0) timer_settime(0x0, 0x0, &(0x7f0000001000), &(0x7f0000005000)) 2018/04/07 08:15:08 executing program 2: r0 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000d25fef)='/dev/vga_arbiter\x00', 0x20001, 0x0) write$eventfd(r0, &(0x7f00009c2ff8), 0xc92d) 2018/04/07 08:15:08 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000447000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(blowfish)\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000330d27)="d3ab2719", 0x4) sendmmsg$alg(r1, &(0x7f000059cfc8)=[{0x0, 0x0, &(0x7f0000283000), 0x0, &(0x7f0000000140)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmsg(r1, &(0x7f0000000340)={&(0x7f0000000000)=@alg, 0x58, &(0x7f00000002c0)=[{&(0x7f0000000080)=""/81, 0x51}], 0x1}, 0x0) 2018/04/07 08:15:08 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000800)={'lo\x00', &(0x7f0000000000)=@ethtool_cmd={0x19}}) 2018/04/07 08:15:08 executing program 5: mkdir(&(0x7f0000e29000)='./file0\x00', 0x0) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000026ff8)='./file0\x00', &(0x7f000000c000)='ramfs\x00', 0x0, &(0x7f00000002c0)) mount(&(0x7f0000037000)='./file0\x00', &(0x7f0000c4fff8)='./file0\x00', &(0x7f0000000080)="72616f04d99d69fb1933f8fc9d0d5200", 0x0, &(0x7f0000ce3000)) creat(&(0x7f000016cff8)='./file0/file0\x00', 0x0) mount(&(0x7f000011dff2)='./file0/file0\x00', &(0x7f0000917000)='./file0/file0\x00', &(0x7f0000467000)='xfs\x00', 0x1000, 0x0) mount(&(0x7f0000f27ff2)='./file0/file0\x00', &(0x7f00002faff8)='./file0/file0\x00', &(0x7f0000239000)='\x00v\t', 0x1004, &(0x7f0000a06000)) mount(&(0x7f0000000200)='./file0/file0\x00', &(0x7f00000000c0)='./file0\x00', &(0x7f0000000280)='ncpfs\x00', 0x84000, &(0x7f00000002c0)) 2018/04/07 08:15:08 executing program 2: r0 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000d25fef)='/dev/vga_arbiter\x00', 0x20001, 0x0) write$eventfd(r0, &(0x7f00009c2ff8), 0xc92d) 2018/04/07 08:15:08 executing program 6: ioctl$DRM_IOCTL_AGP_FREE(0xffffffffffffffff, 0x40206435, &(0x7f0000002000)={0x0, 0x0, 0x0, 0x481371}) bpf$PROG_LOAD(0x5, &(0x7f0000cd2fb8)={0x0, 0x5, &(0x7f0000002000)=@framed={{0x18}, [@jmp={0x5}], {0x95}}, &(0x7f0000e74000)='syzkaller\x00', 0xea4c, 0xc3, &(0x7f000000a000)=""/195}, 0x48) 2018/04/07 08:15:08 executing program 1: r0 = memfd_create(&(0x7f0000002000)="2f7b06003170707031253a656d30f9", 0x0) pwritev(r0, &(0x7f00000000c0)=[{&(0x7f0000000000)='H\x00\x00\x00', 0x4}], 0x1, 0x11) mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x4, 0x11, r0, 0x0) timer_settime(0x0, 0x0, &(0x7f0000001000), &(0x7f0000005000)) 2018/04/07 08:15:09 executing program 4: r0 = syz_open_dev$vcsa(&(0x7f00009a1ff5)='/dev/vcsa#\x00', 0x1, 0x0) perf_event_open(&(0x7f0000fdef88)={0x2, 0x78, 0xe3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$int_in(r0, 0x5452, &(0x7f00002d2000)=0x7) close(r0) 2018/04/07 08:15:09 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000447000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(blowfish)\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000330d27)="d3ab2719", 0x4) sendmmsg$alg(r1, &(0x7f000059cfc8)=[{0x0, 0x0, &(0x7f0000283000), 0x0, &(0x7f0000000140)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmsg(r1, &(0x7f0000000340)={&(0x7f0000000000)=@alg, 0x58, &(0x7f00000002c0)=[{&(0x7f0000000080)=""/81, 0x51}], 0x1}, 0x0) 2018/04/07 08:15:09 executing program 0: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000dfb000)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f00003b9fdc)) syz_open_pts(r0, 0x0) r1 = epoll_create(0x401) dup2(r1, r0) pselect6(0x40, &(0x7f00000abfc0)={0x3ffffd}, &(0x7f0000768000), &(0x7f0000086000), &(0x7f0000349000), &(0x7f0000f14000)={&(0x7f00001da000), 0x8}) 2018/04/07 08:15:09 executing program 2: mmap(&(0x7f0000000000/0xf000)=nil, 0xf000, 0x2000004, 0x32, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x80003, 0xef) read(r0, &(0x7f0000004f45)=""/187, 0xbb) setsockopt$inet6_int(r0, 0x29, 0x3, &(0x7f0000013ffc)=0xfb, 0x102) setsockopt$inet6_opts(r0, 0x29, 0x36, &(0x7f0000010ff8)=@fragment, 0x8) sendto$inet6(r0, &(0x7f0000001ffe), 0x0, 0x0, &(0x7f0000003000)={0xa, 0x4e20, 0x0, @mcast2={0xff, 0x2, [], 0x1}}, 0x1c) 2018/04/07 08:15:09 executing program 6: ioctl$DRM_IOCTL_AGP_FREE(0xffffffffffffffff, 0x40206435, &(0x7f0000002000)={0x0, 0x0, 0x0, 0x481371}) bpf$PROG_LOAD(0x5, &(0x7f0000cd2fb8)={0x0, 0x5, &(0x7f0000002000)=@framed={{0x18}, [@jmp={0x5}], {0x95}}, &(0x7f0000e74000)='syzkaller\x00', 0xea4c, 0xc3, &(0x7f000000a000)=""/195}, 0x48) 2018/04/07 08:15:09 executing program 1: r0 = memfd_create(&(0x7f0000002000)="2f7b06003170707031253a656d30f9", 0x0) pwritev(r0, &(0x7f00000000c0)=[{&(0x7f0000000000)='H\x00\x00\x00', 0x4}], 0x1, 0x11) mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x4, 0x11, r0, 0x0) timer_settime(0x0, 0x0, &(0x7f0000001000), &(0x7f0000005000)) 2018/04/07 08:15:09 executing program 7: bpf$PROG_LOAD(0x5, &(0x7f0000abf000)={0x1, 0x3, &(0x7f0000001fd8)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0x6c}, [], {0x95}}, &(0x7f0000000080)='GPL\x00', 0x1, 0x15b, &(0x7f00007d1f3d)=""/195}, 0x1d) 2018/04/07 08:15:09 executing program 5: mkdir(&(0x7f0000e29000)='./file0\x00', 0x0) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000026ff8)='./file0\x00', &(0x7f000000c000)='ramfs\x00', 0x0, &(0x7f00000002c0)) mount(&(0x7f0000037000)='./file0\x00', &(0x7f0000c4fff8)='./file0\x00', &(0x7f0000000080)="72616f04d99d69fb1933f8fc9d0d5200", 0x0, &(0x7f0000ce3000)) creat(&(0x7f000016cff8)='./file0/file0\x00', 0x0) mount(&(0x7f000011dff2)='./file0/file0\x00', &(0x7f0000917000)='./file0/file0\x00', &(0x7f0000467000)='xfs\x00', 0x1000, 0x0) mount(&(0x7f0000f27ff2)='./file0/file0\x00', &(0x7f00002faff8)='./file0/file0\x00', &(0x7f0000239000)='\x00v\t', 0x1004, &(0x7f0000a06000)) mount(&(0x7f0000000200)='./file0/file0\x00', &(0x7f00000000c0)='./file0\x00', &(0x7f0000000280)='ncpfs\x00', 0x84000, &(0x7f00000002c0)) 2018/04/07 08:15:09 executing program 6: ioctl$DRM_IOCTL_AGP_FREE(0xffffffffffffffff, 0x40206435, &(0x7f0000002000)={0x0, 0x0, 0x0, 0x481371}) bpf$PROG_LOAD(0x5, &(0x7f0000cd2fb8)={0x0, 0x5, &(0x7f0000002000)=@framed={{0x18}, [@jmp={0x5}], {0x95}}, &(0x7f0000e74000)='syzkaller\x00', 0xea4c, 0xc3, &(0x7f000000a000)=""/195}, 0x48) 2018/04/07 08:15:09 executing program 4: r0 = socket$inet(0xa, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000000)=@broute={'broute\x00', 0x20, 0x1, 0x1a8, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000240], 0x0, &(0x7f0000008000), &(0x7f0000000240)=ANY=[@ANYBLOB="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"]}, 0x220) 2018/04/07 08:15:09 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000447000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(blowfish)\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000330d27)="d3ab2719", 0x4) sendmmsg$alg(r1, &(0x7f000059cfc8)=[{0x0, 0x0, &(0x7f0000283000)=[{&(0x7f00005a7000)}], 0x1, &(0x7f0000000140)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmsg(r1, &(0x7f0000000340)={&(0x7f0000000000)=@alg, 0x58, &(0x7f00000002c0)=[{&(0x7f0000000080)=""/81, 0x51}], 0x1}, 0x0) 2018/04/07 08:15:09 executing program 1: r0 = memfd_create(&(0x7f0000002000)="2f7b06003170707031253a656d30f9", 0x0) pwritev(r0, &(0x7f00000000c0)=[{&(0x7f0000000000)='H\x00\x00\x00\x00B', 0x6}], 0x1, 0x11) mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x4, 0x11, r0, 0x0) timer_settime(0x0, 0x0, &(0x7f0000001000), &(0x7f0000005000)) 2018/04/07 08:15:09 executing program 5: mkdir(&(0x7f0000e29000)='./file0\x00', 0x0) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000026ff8)='./file0\x00', &(0x7f000000c000)='ramfs\x00', 0x0, &(0x7f00000002c0)) mount(&(0x7f0000037000)='./file0\x00', &(0x7f0000c4fff8)='./file0\x00', &(0x7f0000000080)="72616f04d99d69fb1933f8fc9d0d5200", 0x100000, &(0x7f0000ce3000)) creat(&(0x7f000016cff8)='./file0/file0\x00', 0x0) mount(&(0x7f000011dff2)='./file0/file0\x00', &(0x7f0000917000)='./file0/file0\x00', &(0x7f0000467000)='xfs\x00', 0x0, 0x0) mount(&(0x7f0000f27ff2)='./file0/file0\x00', &(0x7f00002faff8)='./file0/file0\x00', &(0x7f0000239000)='\x00v\t', 0x1004, &(0x7f0000a06000)) mount(&(0x7f0000000200)='./file0/file0\x00', &(0x7f00000000c0)='./file0\x00', &(0x7f0000000280)='ncpfs\x00', 0x84000, &(0x7f00000002c0)) 2018/04/07 08:15:10 executing program 7: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-twofish-3way\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="d3ab27d5ea00000000000000000000000000000000000000", 0x18) 2018/04/07 08:15:10 executing program 2: r0 = memfd_create(&(0x7f0000000100)="2d2d93acab547f6574302e00", 0x2) r1 = syz_open_dev$sndseq(&(0x7f0000951000)='/dev/snd/seq\x00', 0x0, 0x200008000020002) dup2(r1, r0) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r1, 0xc08c5332, &(0x7f0000fbef74)={0x0, 0x0, 0x0, "71756575650000005d000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000f3ffffffffffffff00"}) write$sndseq(r0, &(0x7f0000040000)=[{0x0, 0x0, 0x0, 0x0, @tick, {}, {}, @addr}, {0x0, 0x0, 0x0, 0x0, @tick=0xa48b, {}, {}, @quote={{0x0, 0xff0000000000000}, 0x100000000, &(0x7f0000000080)={0x8, 0x0, 0x0, 0x0, @time={0x0, 0x1c9c380}, {}, {}, @raw32={[0x9, 0x4ff]}}}}], 0x60) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x80000) 2018/04/07 08:15:10 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000447000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(blowfish)\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000330d27)="d3ab2719", 0x4) sendmmsg$alg(r1, &(0x7f000059cfc8)=[{0x0, 0x0, &(0x7f0000283000)=[{&(0x7f00005a7000)}], 0x1, &(0x7f0000000140)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmsg(r1, &(0x7f0000000340)={&(0x7f0000000000)=@alg, 0x58, &(0x7f00000002c0)=[{&(0x7f0000000080)=""/81, 0x51}], 0x1}, 0x0) 2018/04/07 08:15:10 executing program 6: ioctl$DRM_IOCTL_AGP_FREE(0xffffffffffffffff, 0x40206435, &(0x7f0000002000)={0x0, 0x0, 0x0, 0x481371}) bpf$PROG_LOAD(0x5, &(0x7f0000cd2fb8)={0x2000000000001, 0x3, &(0x7f0000002000)=@framed={{0x18}, [], {0x95}}, &(0x7f0000e74000)='syzkaller\x00', 0xea4c, 0xc3, &(0x7f000000a000)=""/195}, 0x48) 2018/04/07 08:15:10 executing program 1: r0 = memfd_create(&(0x7f0000002000)="2f7b06003170707031253a656d30f9", 0x0) pwritev(r0, &(0x7f00000000c0)=[{&(0x7f0000000000)='H\x00\x00\x00\x00B', 0x6}], 0x1, 0x11) mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x4, 0x11, r0, 0x0) timer_settime(0x0, 0x0, &(0x7f0000001000), &(0x7f0000005000)) 2018/04/07 08:15:10 executing program 5: mkdir(&(0x7f0000e29000)='./file0\x00', 0x0) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000026ff8)='./file0\x00', &(0x7f000000c000)='ramfs\x00', 0x0, &(0x7f00000002c0)) mount(&(0x7f0000037000)='./file0\x00', &(0x7f0000c4fff8)='./file0\x00', &(0x7f0000000080)="72616f04d99d69fb1933f8fc9d0d5200", 0x100000, &(0x7f0000ce3000)) creat(&(0x7f000016cff8)='./file0/file0\x00', 0x0) mount(&(0x7f000011dff2)='./file0/file0\x00', &(0x7f0000917000)='./file0/file0\x00', &(0x7f0000467000)='xfs\x00', 0x0, 0x0) mount(&(0x7f0000f27ff2)='./file0/file0\x00', &(0x7f00002faff8)='./file0/file0\x00', &(0x7f0000239000)='\x00v\t', 0x1004, &(0x7f0000a06000)) mount(&(0x7f0000000200)='./file0/file0\x00', &(0x7f00000000c0)='./file0\x00', &(0x7f0000000280)='ncpfs\x00', 0x84000, &(0x7f00000002c0)) 2018/04/07 08:15:10 executing program 0: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000dfb000)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f00003b9fdc)) syz_open_pts(r0, 0x0) r1 = epoll_create(0x401) dup2(r1, r0) pselect6(0x40, &(0x7f00000abfc0)={0x3ffffd}, &(0x7f0000768000), &(0x7f0000086000), &(0x7f0000349000), &(0x7f0000f14000)={&(0x7f00001da000), 0x8}) 2018/04/07 08:15:10 executing program 4: mkdir(&(0x7f0000632000)='./file0\x00', 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000012ff8)='./file0\x00', 0x0, 0x0) symlinkat(&(0x7f000001effd)='./file1\x00', r0, &(0x7f0000012ff8)='./file0\x00') clone(0x0, &(0x7f0000000000), &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000140)) linkat(r0, &(0x7f000001b000)='./file0\x00', r0, &(0x7f0000017000)='./file1\x00', 0x0) 2018/04/07 08:15:10 executing program 1: r0 = memfd_create(&(0x7f0000002000)="2f7b06003170707031253a656d30f9", 0x0) pwritev(r0, &(0x7f00000000c0)=[{&(0x7f0000000000)='H\x00\x00\x00\x00B', 0x6}], 0x1, 0x11) mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x4, 0x11, r0, 0x0) timer_settime(0x0, 0x0, &(0x7f0000001000), &(0x7f0000005000)) 2018/04/07 08:15:10 executing program 7: mq_timedsend(0xffffffffffffffff, &(0x7f0000000080)="a2014f79b1ecd3aed6eb4b400dd47da3312d058cd0825cba37aac44a7be5785472e40914aca5c7918dc72f9cecbe2669ce095951be2335b38ca938cbb716b31c4a768da7ff16de11229aa82c1c", 0x4d, 0x0, &(0x7f0000000180)) r0 = syz_open_dev$evdev(&(0x7f0000974fee)='/dev/input/event#\x00', 0x0, 0x0) ioctl$EVIOCSMASK(r0, 0x40104593, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000040)="c66cb6f1ad02000000001400"}) 2018/04/07 08:15:10 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000447000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(blowfish)\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000330d27)="d3ab2719", 0x4) sendmmsg$alg(r1, &(0x7f000059cfc8)=[{0x0, 0x0, &(0x7f0000283000)=[{&(0x7f00005a7000)}], 0x1, &(0x7f0000000140)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmsg(r1, &(0x7f0000000340)={&(0x7f0000000000)=@alg, 0x58, &(0x7f00000002c0)=[{&(0x7f0000000080)=""/81, 0x51}], 0x1}, 0x0) 2018/04/07 08:15:10 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000001000)={0x26, 'hash\x00', 0x0, 0x0, 'michael_mic\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f000075dff8)="0000060025bd0300", 0x8) r1 = accept4$alg(r0, 0x0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f0000000480)={0x0, 0x0, &(0x7f00000005c0)=[{&(0x7f0000000600)="e22e2487470e92b36517bede94e45455cad5991653e25fd3eb20bcc96e4f1e58a5feb64b4912d550e0480568642ac82d9b6b1e683cd81fe5dc6eb378e23476d65377d64f46475a3f8025686221ea6964059f9ca5510b10e4fd8dbb6f03df01060adc380d781a6f534886f7b6977c10d889ee5a916e1ae529df7ea4fffc6c732df74000000000000000a7a1f00eae61df6cab13d14579afa9ff46322cc677b732d9ae48db80239760f16e487f6a7bc0dc0528726c2ee46763d7767449b66f25f8f1a35e1419cb3c221db4a8cfd8d0bcc67d77cbdd352b73bf0501eb773bd714", 0xdf}, {&(0x7f0000000500)}], 0x2}, 0x0) 2018/04/07 08:15:10 executing program 2: perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$evdev(&(0x7f0000000240)='/dev/input/event#\x00', 0x3, 0x8000000000000002) syz_open_dev$mice(&(0x7f0000000000)='/dev/input/mice\x00', 0x0, 0x0) write$evdev(r0, &(0x7f000004d000)=[{{}, 0x0, 0x1}, {{0x2}}], 0x30) 2018/04/07 08:15:10 executing program 5: mkdir(&(0x7f0000e29000)='./file0\x00', 0x0) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000026ff8)='./file0\x00', &(0x7f000000c000)='ramfs\x00', 0x0, &(0x7f00000002c0)) mount(&(0x7f0000037000)='./file0\x00', &(0x7f0000c4fff8)='./file0\x00', &(0x7f0000000080)="72616f04d99d69fb1933f8fc9d0d5200", 0x100000, &(0x7f0000ce3000)) creat(&(0x7f000016cff8)='./file0/file0\x00', 0x0) mount(&(0x7f000011dff2)='./file0/file0\x00', &(0x7f0000917000)='./file0/file0\x00', &(0x7f0000467000)='xfs\x00', 0x0, 0x0) mount(&(0x7f0000f27ff2)='./file0/file0\x00', &(0x7f00002faff8)='./file0/file0\x00', &(0x7f0000239000)='\x00v\t', 0x1004, &(0x7f0000a06000)) mount(&(0x7f0000000200)='./file0/file0\x00', &(0x7f00000000c0)='./file0\x00', &(0x7f0000000280)='ncpfs\x00', 0x84000, &(0x7f00000002c0)) 2018/04/07 08:15:10 executing program 6: ioctl$DRM_IOCTL_AGP_FREE(0xffffffffffffffff, 0x40206435, &(0x7f0000002000)={0x0, 0x0, 0x0, 0x481371}) bpf$PROG_LOAD(0x5, &(0x7f0000cd2fb8)={0x2000000000001, 0x3, &(0x7f0000002000)=@framed={{0x18}, [], {0x95}}, &(0x7f0000e74000)='syzkaller\x00', 0xea4c, 0xc3, &(0x7f000000a000)=""/195}, 0x48) 2018/04/07 08:15:10 executing program 1: r0 = memfd_create(&(0x7f0000002000)="2f7b06003170707031253a656d30f9", 0x0) pwritev(r0, &(0x7f00000000c0)=[{&(0x7f0000000000)="480000000042f7", 0x7}], 0x1, 0x0) mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x4, 0x11, r0, 0x0) timer_settime(0x0, 0x0, &(0x7f0000001000), &(0x7f0000005000)) 2018/04/07 08:15:10 executing program 7: pipe2(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80800) r1 = dup(r0) r2 = open(&(0x7f0000ae8000)='./bus\x00', 0x141042, 0x0) ftruncate(r2, 0x27ffe) sendfile(r1, r2, &(0x7f0000d1e000), 0x8080000001) 2018/04/07 08:15:10 executing program 0: mmap(&(0x7f000090c000/0x4000)=nil, 0x4000, 0x1, 0x32, 0xffffffffffffffff, 0x0) r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000ee8ff7)='/dev/rtc\x00', 0x2a2000, 0x0) readlinkat(r0, &(0x7f000090fff8)='./file0\x00', &(0x7f0000728000)=""/145, 0x91) 2018/04/07 08:15:10 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000447000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(blowfish)\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000330d27)="d3ab2719", 0x4) sendmmsg$alg(r1, &(0x7f000059cfc8)=[{0x0, 0x0, &(0x7f0000283000)=[{&(0x7f00005a7000)="d1a4edc6ada830966dc07a7d9eda5a84d6acd04108a8778ef7bdb8de20dadf839b76eae0e7790d94", 0x28}], 0x1, &(0x7f0000000140)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmsg(r1, &(0x7f0000000340)={&(0x7f0000000000)=@alg, 0x58, &(0x7f00000002c0)=[{&(0x7f0000000080)=""/81, 0x51}], 0x1}, 0x0) 2018/04/07 08:15:10 executing program 4: mkdir(&(0x7f00005b2000)='./file0\x00', 0x0) mount(&(0x7f0000212ff8)='./file0\x00', &(0x7f000078eff8)='./file0\x00', &(0x7f0000982ff9)='mqueue\x00', 0x0, &(0x7f0000653fff)) r0 = creat(&(0x7f0000489000)='./file0/bus\x00', 0x0) perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f000031f000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mq_notify(r0, &(0x7f0000477fa0)={0x0, 0x0, 0x0, @thr={&(0x7f0000bc8000), &(0x7f0000cf3000)}}) close(r0) 2018/04/07 08:15:10 executing program 5: mkdir(&(0x7f0000e29000)='./file0\x00', 0x0) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000026ff8)='./file0\x00', &(0x7f000000c000)='ramfs\x00', 0x0, &(0x7f00000002c0)) mount(&(0x7f0000037000)='./file0\x00', &(0x7f0000c4fff8)='./file0\x00', &(0x7f0000000080)="72616f04d99d69fb1933f8fc9d0d5200", 0x100000, &(0x7f0000ce3000)) creat(&(0x7f000016cff8)='./file0/file0\x00', 0x0) mount(&(0x7f000011dff2)='./file0/file0\x00', &(0x7f0000917000)='./file0/file0\x00', &(0x7f0000467000)='xfs\x00', 0x1000, 0x0) mount(&(0x7f0000f27ff2)='./file0/file0\x00', &(0x7f00002faff8)='./file0/file0\x00', &(0x7f0000239000)='\x00v\t', 0x0, &(0x7f0000a06000)) mount(&(0x7f0000000200)='./file0/file0\x00', &(0x7f00000000c0)='./file0\x00', &(0x7f0000000280)='ncpfs\x00', 0x84000, &(0x7f00000002c0)) 2018/04/07 08:15:10 executing program 2: mbind(&(0x7f0000024000/0xc00000)=nil, 0xc00000, 0x4003, &(0x7f0000c28000)=0x800003f, 0x5, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000531000)='numa_maps\x00') sendfile(r0, r0, &(0x7f00009c7000)=0x40000000, 0x400000ff) 2018/04/07 08:15:10 executing program 1: r0 = memfd_create(&(0x7f0000002000)="2f7b06003170707031253a656d30f9", 0x0) pwritev(r0, &(0x7f00000000c0)=[{&(0x7f0000000000)="480000000042f7", 0x7}], 0x1, 0x0) mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x4, 0x11, r0, 0x0) timer_settime(0x0, 0x0, &(0x7f0000001000), &(0x7f0000005000)) 2018/04/07 08:15:10 executing program 6: ioctl$DRM_IOCTL_AGP_FREE(0xffffffffffffffff, 0x40206435, &(0x7f0000002000)={0x0, 0x0, 0x0, 0x481371}) bpf$PROG_LOAD(0x5, &(0x7f0000cd2fb8)={0x2000000000001, 0x3, &(0x7f0000002000)=@framed={{0x18}, [], {0x95}}, &(0x7f0000e74000)='syzkaller\x00', 0xea4c, 0xc3, &(0x7f000000a000)=""/195}, 0x48) 2018/04/07 08:15:10 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0xc, 0x3, &(0x7f0000000040)=ANY=[@ANYBLOB="85000000220000000700000000009b009500000000000000"], &(0x7f00000001c0)="73797a6b616c6c65720001be826e8f833152f795b4d9f4bc3ea582523aed371b084fccfc3d2ef2cbe65d30642ca8dcd0f8479be52e66937908f1d8112489e8099d9d4edb806d81189c0fbb6818d028546c35d3363d54db0db780f54977ae6359d617c1d233d8e18abfc75f9a76cd8e1f77583bc02f07a33de6f304e95db82fd4da55ebd25162df6f88e7d1bb0654ffb31e008967", 0x1, 0x99, &(0x7f000000d000)=""/153}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000100)={r0, 0x0, 0x22, 0x1000, &(0x7f0000000180)="288b6692b5c352f6677525060800893cb07dac18da196567705d87ededc2457c54c7", &(0x7f0000002580)=""/4096}, 0x28) ioctl$PERF_EVENT_IOC_QUERY_BPF(0xffffffffffffffff, 0xc008240a, &(0x7f0000000140)={0x2, 0x0, [0x0, 0x0]}) 2018/04/07 08:15:11 executing program 6: ioctl$DRM_IOCTL_AGP_FREE(0xffffffffffffffff, 0x40206435, &(0x7f0000002000)={0x0, 0x0, 0x0, 0x481371}) bpf$PROG_LOAD(0x5, &(0x7f0000cd2fb8)={0x2000000000001, 0x5, &(0x7f0000002000)=@framed={{0x18}, [@jmp={0x5}], {0x95}}, &(0x7f0000e74000)='syzkaller\x00', 0x0, 0xc3, &(0x7f000000a000)=""/195}, 0x48) 2018/04/07 08:15:11 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000447000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(blowfish)\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000330d27)="d3ab2719", 0x4) sendmmsg$alg(r1, &(0x7f000059cfc8)=[{0x0, 0x0, &(0x7f0000283000)=[{&(0x7f00005a7000)="d1a4edc6ada830966dc07a7d9eda5a84d6acd04108a8778ef7bdb8de20dadf839b76eae0e7790d94", 0x28}], 0x1, &(0x7f0000000140)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmsg(r1, &(0x7f0000000340)={&(0x7f0000000000)=@alg, 0x58, &(0x7f00000002c0)=[{&(0x7f0000000080)=""/81, 0x51}], 0x1}, 0x0) 2018/04/07 08:15:11 executing program 1: r0 = memfd_create(&(0x7f0000002000)="2f7b06003170707031253a656d30f9", 0x0) pwritev(r0, &(0x7f00000000c0)=[{&(0x7f0000000000)="480000000042f7", 0x7}], 0x1, 0x0) mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x4, 0x11, r0, 0x0) timer_settime(0x0, 0x0, &(0x7f0000001000), &(0x7f0000005000)) 2018/04/07 08:15:11 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x10000000013, &(0x7f0000d06000)=0x1, 0x4) setsockopt$inet_tcp_int(r0, 0x6, 0x14, &(0x7f0000000040)=0x2, 0x4) sendto$inet(r0, &(0x7f0000a6efff), 0xbc, 0x20020003, &(0x7f0000385ff0)={0x2, 0x4e20, @loopback=0x7f000001}, 0x10) mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x0, 0x32, 0xffffffffffffffff, 0x0) recvfrom$inet(r0, &(0x7f0000000080)=""/244, 0xf4, 0x40000022, 0x0, 0x0) 2018/04/07 08:15:11 executing program 2: r0 = socket$inet(0x2, 0x2, 0x0) setsockopt$inet_opts(r0, 0x0, 0x4, &(0x7f00006ec000), 0x0) close(r0) 2018/04/07 08:15:11 executing program 5: mkdir(&(0x7f0000e29000)='./file0\x00', 0x0) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000026ff8)='./file0\x00', &(0x7f000000c000)='ramfs\x00', 0x0, &(0x7f00000002c0)) mount(&(0x7f0000037000)='./file0\x00', &(0x7f0000c4fff8)='./file0\x00', &(0x7f0000000080)="72616f04d99d69fb1933f8fc9d0d5200", 0x100000, &(0x7f0000ce3000)) creat(&(0x7f000016cff8)='./file0/file0\x00', 0x0) mount(&(0x7f000011dff2)='./file0/file0\x00', &(0x7f0000917000)='./file0/file0\x00', &(0x7f0000467000)='xfs\x00', 0x1000, 0x0) mount(&(0x7f0000f27ff2)='./file0/file0\x00', &(0x7f00002faff8)='./file0/file0\x00', &(0x7f0000239000)='\x00v\t', 0x0, &(0x7f0000a06000)) mount(&(0x7f0000000200)='./file0/file0\x00', &(0x7f00000000c0)='./file0\x00', &(0x7f0000000280)='ncpfs\x00', 0x84000, &(0x7f00000002c0)) 2018/04/07 08:15:11 executing program 0: perf_event_open(&(0x7f0000fdef88)={0x2, 0x78, 0xe3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$sndseq(&(0x7f0000000080)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_RUNNING_MODE(r0, 0xc0105303, &(0x7f0000000000)={0x0, 0x0, 0x10}) 2018/04/07 08:15:11 executing program 7: r0 = syz_open_dev$loop(&(0x7f0000000080)='/dev/loop#\x00', 0x0, 0x0) ioctl(r0, 0x40000000401870cc, &(0x7f0000000000)) 2018/04/07 08:15:11 executing program 6: ioctl$DRM_IOCTL_AGP_FREE(0xffffffffffffffff, 0x40206435, &(0x7f0000002000)={0x0, 0x0, 0x0, 0x481371}) bpf$PROG_LOAD(0x5, &(0x7f0000cd2fb8)={0x2000000000001, 0x5, &(0x7f0000002000)=@framed={{0x18}, [@jmp={0x5}], {0x95}}, &(0x7f0000e74000)='syzkaller\x00', 0x0, 0xc3, &(0x7f000000a000)=""/195}, 0x48) 2018/04/07 08:15:11 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f0000005000)={&(0x7f0000000000)={0x10}, 0xc, &(0x7f0000015ff0)={&(0x7f0000013000)={0x10, 0x21, 0x2ff, 0x0, 0x0, {}, [@typed={0xc, 0x0, @u32}, @typed={0xc, 0x0, @u32}]}, 0x2c}, 0x1}, 0x0) 2018/04/07 08:15:11 executing program 1: r0 = memfd_create(&(0x7f0000002000)="2f7b06003170707031253a656d30f9", 0x0) pwritev(r0, &(0x7f00000000c0)=[{&(0x7f0000000000)="480000000042f7", 0x7}], 0x1, 0x11) mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x11, r0, 0x0) timer_settime(0x0, 0x0, &(0x7f0000001000), &(0x7f0000005000)) 2018/04/07 08:15:11 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000447000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(blowfish)\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000330d27)="d3ab2719", 0x4) sendmmsg$alg(r1, &(0x7f000059cfc8)=[{0x0, 0x0, &(0x7f0000283000)=[{&(0x7f00005a7000)="d1a4edc6ada830966dc07a7d9eda5a84d6acd04108a8778ef7bdb8de20dadf839b76eae0e7790d94", 0x28}], 0x1, &(0x7f0000000140)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmsg(r1, &(0x7f0000000340)={&(0x7f0000000000)=@alg, 0x58, &(0x7f00000002c0)=[{&(0x7f0000000080)=""/81, 0x51}], 0x1}, 0x0) 2018/04/07 08:15:11 executing program 4: mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$sock_inet6_SIOCDIFADDR(r0, 0x8936, &(0x7f00000000c0)={@dev={0xfe, 0x80}}) 2018/04/07 08:15:11 executing program 5: mkdir(&(0x7f0000e29000)='./file0\x00', 0x0) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000026ff8)='./file0\x00', &(0x7f000000c000)='ramfs\x00', 0x0, &(0x7f00000002c0)) mount(&(0x7f0000037000)='./file0\x00', &(0x7f0000c4fff8)='./file0\x00', &(0x7f0000000080)="72616f04d99d69fb1933f8fc9d0d5200", 0x100000, &(0x7f0000ce3000)) creat(&(0x7f000016cff8)='./file0/file0\x00', 0x0) mount(&(0x7f000011dff2)='./file0/file0\x00', &(0x7f0000917000)='./file0/file0\x00', &(0x7f0000467000)='xfs\x00', 0x1000, 0x0) mount(&(0x7f0000f27ff2)='./file0/file0\x00', &(0x7f00002faff8)='./file0/file0\x00', &(0x7f0000239000)='\x00v\t', 0x0, &(0x7f0000a06000)) mount(&(0x7f0000000200)='./file0/file0\x00', &(0x7f00000000c0)='./file0\x00', &(0x7f0000000280)='ncpfs\x00', 0x84000, &(0x7f00000002c0)) 2018/04/07 08:15:11 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f000007d000)={0xffffffffffffffff}) r1 = memfd_create(&(0x7f0000000000)='dev ', 0x0) ftruncate(r1, 0x40001) sendfile(r0, r1, &(0x7f000000a000), 0x5) sendfile(r0, r1, &(0x7f000000dff8), 0xa) 2018/04/07 08:15:11 executing program 4: r0 = socket(0x2, 0x2000080003, 0x2) mremap(&(0x7f0000000000/0x4000)=nil, 0x4000, 0x1000, 0x3, &(0x7f0000ffe000/0x1000)=nil) ioctl$sock_kcm_SIOCKCMUNATTACH(r0, 0x89e1, &(0x7f0000000000)) 2018/04/07 08:15:11 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f00000070c0)={&(0x7f00000000c0)={0x10}, 0xc, &(0x7f0000007080)={&(0x7f0000007000)=@bridge_newneigh={0x24, 0x1c, 0x5eed21a029ff0b3d, 0x0, 0x0, {0xa}, [@NDA_DST_IPV4={0x8, 0x1, @multicast1=0xe0000001}]}, 0x24}, 0x1}, 0x0) 2018/04/07 08:15:11 executing program 6: ioctl$DRM_IOCTL_AGP_FREE(0xffffffffffffffff, 0x40206435, &(0x7f0000002000)={0x0, 0x0, 0x0, 0x481371}) bpf$PROG_LOAD(0x5, &(0x7f0000cd2fb8)={0x2000000000001, 0x5, &(0x7f0000002000)=@framed={{0x18}, [@jmp={0x5}], {0x95}}, &(0x7f0000e74000)='syzkaller\x00', 0x0, 0xc3, &(0x7f000000a000)=""/195}, 0x48) 2018/04/07 08:15:11 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000447000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(blowfish)\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000330d27)="d3ab2719", 0x4) sendmmsg$alg(r1, &(0x7f000059cfc8)=[{0x0, 0x0, &(0x7f0000283000)=[{&(0x7f00005a7000)="d1a4edc6ada830966dc07a7d9eda5a84d6acd04108a8778ef7bdb8de20dadf839b76eae0e7790d9454e3218626070927707fd45c81e73272b7ebc618", 0x3c}], 0x1, &(0x7f0000000140)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmsg(r1, &(0x7f0000000340)={&(0x7f0000000000)=@alg, 0x58, &(0x7f00000002c0)=[{&(0x7f0000000080)=""/81, 0x51}], 0x1}, 0x0) 2018/04/07 08:15:11 executing program 1: r0 = memfd_create(&(0x7f0000002000)="2f7b06003170707031253a656d30f9", 0x0) pwritev(r0, &(0x7f00000000c0)=[{&(0x7f0000000000)="480000000042f7", 0x7}], 0x1, 0x11) mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x11, r0, 0x0) timer_settime(0x0, 0x0, &(0x7f0000001000), &(0x7f0000005000)) 2018/04/07 08:15:11 executing program 7: socketpair$unix(0x1, 0x8000000003, 0x0, &(0x7f0000d12000)={0xffffffffffffffff}) connect$unix(r0, &(0x7f0000000080)=@abs, 0x0) 2018/04/07 08:15:11 executing program 0: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) r0 = socket$key(0xf, 0x3, 0x2) write(r0, &(0x7f00000000c0)="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", 0xf41) 2018/04/07 08:15:11 executing program 5: mkdir(&(0x7f0000e29000)='./file0\x00', 0x0) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000026ff8)='./file0\x00', &(0x7f000000c000)='ramfs\x00', 0x0, &(0x7f00000002c0)) mount(&(0x7f0000037000)='./file0\x00', &(0x7f0000c4fff8)='./file0\x00', &(0x7f0000000080)="72616f04d99d69fb1933f8fc9d0d5200", 0x100000, &(0x7f0000ce3000)) creat(&(0x7f000016cff8)='./file0/file0\x00', 0x0) mount(&(0x7f000011dff2)='./file0/file0\x00', &(0x7f0000917000)='./file0/file0\x00', &(0x7f0000467000)='xfs\x00', 0x1000, 0x0) mount(&(0x7f0000f27ff2)='./file0/file0\x00', &(0x7f00002faff8)='./file0/file0\x00', &(0x7f0000239000)='\x00v\t', 0x1004, &(0x7f0000a06000)) mount(&(0x7f0000000200)='./file0/file0\x00', &(0x7f00000000c0)='./file0\x00', &(0x7f0000000280)='ncpfs\x00', 0x0, &(0x7f00000002c0)) 2018/04/07 08:15:12 executing program 4: r0 = syz_open_dev$sndtimer(&(0x7f0000026000)='/dev/snd/timer\x00', 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_SELECT(r0, 0x40345410, &(0x7f0000001000)={{0x100000003}}) ioctl$SNDRV_TIMER_IOCTL_CONTINUE(r0, 0x54a2) r1 = syz_open_dev$sndtimer(&(0x7f0000000000)='/dev/snd/timer\x00', 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_SELECT(r1, 0x40345410, &(0x7f000000efcc)={{0x3}}) ioctl$SNDRV_TIMER_IOCTL_CONTINUE(r1, 0x54a2) ioctl$SNDRV_TIMER_IOCTL_STOP(r0, 0x54a1) 2018/04/07 08:15:12 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000080)={0xa, 0x4e20, 0x0, @local={0xfe, 0x80, [], 0xaa}, 0x3}, 0x1c) setsockopt$inet6_tcp_int(r0, 0x6, 0x13, &(0x7f0000000000)=0x100000001, 0x4) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x4e20, 0x0, @local={0xfe, 0x80, [], 0xaa}}, 0x18) 2018/04/07 08:15:12 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000447000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(blowfish)\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000330d27)="d3ab2719", 0x4) sendmmsg$alg(r1, &(0x7f000059cfc8)=[{0x0, 0x0, &(0x7f0000283000)=[{&(0x7f00005a7000)="d1a4edc6ada830966dc07a7d9eda5a84d6acd04108a8778ef7bdb8de20dadf839b76eae0e7790d9454e3218626070927707fd45c81e73272b7ebc618d39458b5db41ebef9c78", 0x46}], 0x1, &(0x7f0000000140)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmsg(r1, &(0x7f0000000340)={&(0x7f0000000000)=@alg, 0x58, &(0x7f00000002c0)=[{&(0x7f0000000080)=""/81, 0x51}], 0x1}, 0x0) 2018/04/07 08:15:12 executing program 7: r0 = socket$inet(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000004fc8)={0x0, 0x0, &(0x7f0000003000)=[{&(0x7f0000000000)="240000002d00030007fffd946fa283b70a00000003000000100b00000000000003000600", 0x24}], 0x1}, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000300)={0x10}, 0xc, &(0x7f0000000380)={&(0x7f0000000640)=ANY=[]}, 0x1}, 0x0) 2018/04/07 08:15:12 executing program 4: r0 = syz_open_procfs(0x0, &(0x7f0000000040)="636c6561725f72656673007edb") clock_nanosleep(0x0, 0x0, &(0x7f0000000180)={0x0, 0x1c9c380}, &(0x7f00000001c0)) r1 = socket$inet6_udp(0xa, 0x2, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) writev(r0, &(0x7f0000b97000)=[{&(0x7f00000e9000)='4', 0x1}], 0x1) getsockopt$inet6_mtu(r1, 0x29, 0x17, &(0x7f0000000000), &(0x7f0000000080)=0x4) 2018/04/07 08:15:12 executing program 1: r0 = memfd_create(&(0x7f0000002000)="2f7b06003170707031253a656d30f9", 0x0) pwritev(r0, &(0x7f00000000c0)=[{&(0x7f0000000000)="480000000042f7", 0x7}], 0x1, 0x11) mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x11, r0, 0x0) timer_settime(0x0, 0x0, &(0x7f0000001000), &(0x7f0000005000)) 2018/04/07 08:15:12 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) perf_event_open(&(0x7f000001d000)={0x2, 0x78, 0xe2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$alg(r0, &(0x7f0000b0efa8)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc-blowfish-asm\x00'}, 0x58) r1 = accept4$alg(r0, 0x0, 0x0, 0x0) dup2(r0, r1) 2018/04/07 08:15:12 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000808fc8)={&(0x7f0000e87000)={0x10}, 0xc, &(0x7f0000a3bff8)={&(0x7f0000e69fb8)=@ipmr_newroute={0x38, 0x18, 0xc21, 0x0, 0x0, {0x80, 0x20, 0x0, 0x0, 0x0, 0x4, 0x0, 0x5}, [@RTA_MULTIPATH={0x1c, 0x9, [{0x9}, {}, {}]}]}, 0x38}, 0x1}, 0x0) 2018/04/07 08:15:12 executing program 6: r0 = socket$inet(0x2, 0x2, 0x0) setsockopt$inet_opts(r0, 0x0, 0x4, &(0x7f0000001000)="8907040000fd1789528491d09180afe204445e93376613f58b47597658a60c325a4d20d172ecb27e4825f7ca0924392bdf52523c062b", 0x36) 2018/04/07 08:15:12 executing program 6: r0 = socket(0x10, 0x802, 0x0) getsockopt$sock_int(r0, 0x1, 0x10, &(0x7f0000061ffc), &(0x7f00000001c0)=0x4) 2018/04/07 08:15:12 executing program 0: setxattr(&(0x7f0000c7e000)='..', &(0x7f00004a0fef)=@known='security.selinux\x00', &(0x7f000059afd5)='system_u:object_r:system_dbusd_var_lib_t:s0', 0x2b, 0x3) 2018/04/07 08:15:12 executing program 1: r0 = memfd_create(&(0x7f0000002000)="2f7b06003170707031253a656d30f9", 0x0) pwritev(r0, &(0x7f00000000c0)=[{&(0x7f0000000000)="480000000042f7", 0x7}], 0x1, 0x11) mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x4, 0x0, r0, 0x0) timer_settime(0x0, 0x0, &(0x7f0000001000), &(0x7f0000005000)) 2018/04/07 08:15:12 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000447000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(blowfish)\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000330d27)="d3ab2719", 0x4) sendmmsg$alg(r1, &(0x7f000059cfc8)=[{0x0, 0x0, &(0x7f0000283000)=[{&(0x7f00005a7000)="d1a4edc6ada830966dc07a7d9eda5a84d6acd04108a8778ef7bdb8de20dadf839b76eae0e7790d9454e3218626070927707fd45c81e73272b7ebc618d39458b5db41ebef9c78743b4aeab1", 0x4b}], 0x1, &(0x7f0000000140)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmsg(r1, &(0x7f0000000340)={&(0x7f0000000000)=@alg, 0x58, &(0x7f00000002c0)=[{&(0x7f0000000080)=""/81, 0x51}], 0x1}, 0x0) 2018/04/07 08:15:12 executing program 2: r0 = socket$inet_dccp(0x2, 0x6, 0x0) r1 = dup(r0) setsockopt(r1, 0x10d, 0x2, &(0x7f00000000c0)="032efcf75a69c6e5", 0x8) 2018/04/07 08:15:12 executing program 7: r0 = syz_open_dev$sg(&(0x7f0000001000)='/dev/sg#\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x0, 0x4000000000000051, r0, 0x0) mmap(&(0x7f00002e4000/0x3000)=nil, 0x3000, 0x1, 0x32, 0xffffffffffffffff, 0x0) name_to_handle_at(r0, &(0x7f00002e4000)='./file0\x00', &(0x7f0000000080)={0x8}, &(0x7f0000000000), 0x1400) 2018/04/07 08:15:12 executing program 5: r0 = syz_open_dev$sg(&(0x7f0000001000)='/dev/sg#\x00', 0x0, 0x0) mmap(&(0x7f000000a000/0x4000)=nil, 0x4000, 0x0, 0x12, r0, 0x0) clone(0x0, &(0x7f00008dcfff), &(0x7f0000000040), &(0x7f0000001ffc), &(0x7f0000002000)) waitid(0x0, 0x0, &(0x7f0000003ff8), 0xa0000005, 0x0) 2018/04/07 08:15:12 executing program 6: bpf$MAP_CREATE(0x0, &(0x7f0000346fd4)={0x0, 0x0, 0x0, 0xfdf, 0x10}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0x1, 0x5, &(0x7f0000346fc8)=@framed={{0x18}, [@alu={0x8000000201a7f19, 0x0, 0x7, 0x0, 0x1}], {0x95}}, &(0x7f0000f6bffb)='GPL\x00', 0xfffffffffffffffc, 0x188, &(0x7f00001a7f05)=""/251}, 0x48) 2018/04/07 08:15:12 executing program 1: r0 = memfd_create(&(0x7f0000002000)="2f7b06003170707031253a656d30f9", 0x0) pwritev(r0, &(0x7f00000000c0)=[{&(0x7f0000000000)="480000000042f7", 0x7}], 0x1, 0x11) mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x4, 0x0, r0, 0x0) timer_settime(0x0, 0x0, &(0x7f0000001000), &(0x7f0000005000)) 2018/04/07 08:15:12 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='/exe\x00\x00\x00\x00\x00\x00') fgetxattr(r0, &(0x7f0000000000)=@random={'user.', '\x00'}, &(0x7f00000001c0)=""/220, 0xdc) 2018/04/07 08:15:12 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f000001a000)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f0000ab9ff0)={0x2, &(0x7f000039a000)=[{0x20, 0x0, 0x0, 0xfffffffffffff010}, {0x6}]}, 0xffffffffffffff30) write(r0, &(0x7f0000000000), 0xff9f) 2018/04/07 08:15:12 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000447000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(blowfish)\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000330d27)="d3ab2719", 0x4) sendmmsg$alg(r1, &(0x7f000059cfc8)=[{0x0, 0x0, &(0x7f0000283000)=[{&(0x7f00005a7000)="d1a4edc6ada830966dc07a7d9eda5a84d6acd04108a8778ef7bdb8de20dadf839b76eae0e7790d9454e3218626070927707fd45c81e73272b7ebc618d39458b5db41ebef9c78743b4aeab1813d53", 0x4e}], 0x1, &(0x7f0000000140)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmsg(r1, &(0x7f0000000340)={&(0x7f0000000000)=@alg, 0x58, &(0x7f00000002c0)=[{&(0x7f0000000080)=""/81, 0x51}], 0x1}, 0x0) 2018/04/07 08:15:12 executing program 7: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f000012a000)=[{&(0x7f0000000080)="290000002000190700003fffffffda0602000006288fa170c4ef86dc0d000400ebffffff0bfb2a79aa", 0x29}], 0x1) 2018/04/07 08:15:12 executing program 4: perf_event_open(&(0x7f000001d000)={0x2, 0x78, 0xe2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$evdev(&(0x7f0000057fee)='/dev/input/event#\x00', 0x0, 0x0) ioctl$EVIOCGSND(r0, 0x8040451a, &(0x7f0000000040)=""/7) 2018/04/07 08:15:12 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f000001a000)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f0000000080)={0x2, &(0x7f0000fbcff0)=[{0x20, 0x0, 0x0, 0xfffffffffffff004}, {0x6}]}, 0x10) sendto(r0, &(0x7f0000c9e000), 0xf971, 0x0, 0x0, 0x0) [ 70.984017] netlink: 'syz-executor7': attribute type 4 has an invalid length. 2018/04/07 08:15:13 executing program 2: r0 = syz_open_dev$sndtimer(&(0x7f0000214ff1)='/dev/snd/timer\x00', 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_SELECT(r0, 0x40345410, &(0x7f0000001000)={{0x100000001}}) r1 = epoll_create1(0x0) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, &(0x7f0000000080)={0xfffffffffffffffc}) ioctl$SNDRV_TIMER_IOCTL_START(r0, 0x54a0) poll(&(0x7f0000000000)=[{r1}], 0x1, 0x8) 2018/04/07 08:15:13 executing program 0: perf_event_open(&(0x7f0000271000)={0x2, 0x78, 0x48, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f0000028fc8)={&(0x7f0000007ff4)={0x10}, 0xc, &(0x7f0000015ff0)={&(0x7f0000db9000)={0x1c, 0x20, 0xaff, 0x0, 0x0, {}, [@generic="0011ff0121"]}, 0x1c}, 0x1}, 0x0) 2018/04/07 08:15:13 executing program 4: r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000389000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000348f88)={0x2, 0x78, 0x3e2}, 0x0, 0xffffffffffffffff, r0, 0x0) r1 = perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e2}, 0x0, 0xffffffffffffffff, r0, 0x0) close(r1) socketpair(0x0, 0x0, 0x0, &(0x7f0000000040)) 2018/04/07 08:15:13 executing program 1: r0 = memfd_create(&(0x7f0000002000)="2f7b06003170707031253a656d30f9", 0x0) pwritev(r0, &(0x7f00000000c0)=[{&(0x7f0000000000)="480000000042f7", 0x7}], 0x1, 0x11) mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x4, 0x0, r0, 0x0) timer_settime(0x0, 0x0, &(0x7f0000001000), &(0x7f0000005000)) 2018/04/07 08:15:13 executing program 6: pipe2(&(0x7f0000a93000)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) ioctl$DRM_IOCTL_RM_MAP(0xffffffffffffffff, 0x4028641b, &(0x7f0000b1d000)={&(0x7f0000a95000/0x1000)=nil, 0x1, 0xb59c87267741adee, 0x1, &(0x7f0000b20000/0x2000)=nil}) mprotect(&(0x7f0000b1d000/0x2000)=nil, 0x2000, 0x5) vmsplice(r0, &(0x7f0000b1d000)=[{&(0x7f0000006000)}], 0xd5, 0x0) 2018/04/07 08:15:13 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000447000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(blowfish)\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000330d27)="d3ab2719", 0x4) sendmmsg$alg(r1, &(0x7f000059cfc8)=[{0x0, 0x0, &(0x7f0000283000)=[{&(0x7f00005a7000)="d1a4edc6ada830966dc07a7d9eda5a84d6acd04108a8778ef7bdb8de20dadf839b76eae0e7790d9454e3218626070927707fd45c81e73272b7ebc618d39458b5db41ebef9c78743b4aeab1813d5349", 0x4f}], 0x1, &(0x7f0000000140)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmsg(r1, &(0x7f0000000340)={&(0x7f0000000000)=@alg, 0x58, &(0x7f00000002c0)=[{&(0x7f0000000080)=""/81, 0x51}], 0x1}, 0x0) 2018/04/07 08:15:13 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f000001a000)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f0000000080)={0x2, &(0x7f0000fbcff0)=[{0x20, 0x0, 0x0, 0xfffffffffffff004}, {0x6}]}, 0x10) sendto(r0, &(0x7f0000c9e000), 0xf971, 0x0, 0x0, 0x0) 2018/04/07 08:15:13 executing program 7: perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x0, 0x4031, 0xffffffffffffffff, 0x0) futex(&(0x7f0000012ffc), 0x80, 0x0, &(0x7f0000060ff0), &(0x7f00003cfffc), 0x0) 2018/04/07 08:15:13 executing program 2: r0 = openat$autofs(0xffffffffffffff9c, &(0x7f0000ca3000)='/dev/autofs\x00', 0x0, 0x0) ioctl(r0, 0x8000000000009382, &(0x7f0000000040)) 2018/04/07 08:15:13 executing program 1: r0 = memfd_create(&(0x7f0000002000)="2f7b06003170707031253a656d30f9", 0x0) pwritev(r0, &(0x7f00000000c0)=[{&(0x7f0000000000)="480000000042f7", 0x7}], 0x1, 0x11) mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x4, 0x11, 0xffffffffffffffff, 0x0) timer_settime(0x0, 0x0, &(0x7f0000001000), &(0x7f0000005000)) 2018/04/07 08:15:13 executing program 0: r0 = syz_open_dev$evdev(&(0x7f0000000040)='/dev/input/event#\x00', 0x0, 0x0) read(r0, &(0x7f0000000000)=""/24, 0x7) 2018/04/07 08:15:13 executing program 6: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000005c0)={0x0, 0x0}) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000040)={'syz_tun\x00', &(0x7f0000000180)=@ethtool_cmd={0x22}}) 2018/04/07 08:15:13 executing program 7: r0 = signalfd4(0xffffffffffffffff, &(0x7f0000ddeff8)={0x7fffffff}, 0x8, 0x0) readv(r0, &(0x7f000046eff0)=[{&(0x7f000004f000)=""/128, 0xfee0}], 0x1) timer_create(0x2, &(0x7f000004c000)={0x0, 0x19, 0x0, @thr={&(0x7f0000aa1000), &(0x7f0000b70000)}}, &(0x7f0000000040)) timer_settime(0x0, 0x1, &(0x7f0000666fe0)={{0x0, 0x989680}, {0x0, 0x7}}, &(0x7f000004afe0)) 2018/04/07 08:15:13 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000447000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(blowfish)\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000330d27)="d3ab2719", 0x4) sendmmsg$alg(r1, &(0x7f000059cfc8)=[{0x0, 0x0, &(0x7f0000283000)=[{&(0x7f00005a7000)="d1a4edc6ada830966dc07a7d9eda5a84d6acd04108a8778ef7bdb8de20dadf839b76eae0e7790d9454e3218626070927707fd45c81e73272b7ebc618d39458b5db41ebef9c78743b4aeab1813d5349a9", 0x50}], 0x1, &(0x7f0000000140)}], 0x1, 0x0) recvmsg(r1, &(0x7f0000000340)={&(0x7f0000000000)=@alg, 0x58, &(0x7f00000002c0)=[{&(0x7f0000000080)=""/81, 0x51}], 0x1}, 0x0) 2018/04/07 08:15:13 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f000001a000)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f0000000080)={0x2, &(0x7f0000fbcff0)=[{0x20, 0x0, 0x0, 0xfffffffffffff004}, {0x6}]}, 0x10) sendto(r0, &(0x7f0000c9e000), 0xf971, 0x0, 0x0, 0x0) 2018/04/07 08:15:13 executing program 4: socket$inet_tcp(0x2, 0x1, 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000180)='/proc/self/net/pfkey\x00', 0x0, 0x0) signalfd(0xffffffffffffffff, &(0x7f0000559ff8), 0x8) unshare(0x20000400) pselect6(0x40, &(0x7f00000abfc0)={0x3ffffd}, &(0x7f0000f08fc0), &(0x7f0000086000), &(0x7f0000349000)={0x0, 0x989680}, &(0x7f0000d0a000)={&(0x7f00001da000), 0x8}) 2018/04/07 08:15:13 executing program 1: r0 = memfd_create(&(0x7f0000002000)="2f7b06003170707031253a656d30f9", 0x0) pwritev(r0, &(0x7f00000000c0)=[{&(0x7f0000000000)="480000000042f7", 0x7}], 0x1, 0x11) mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x4, 0x11, 0xffffffffffffffff, 0x0) timer_settime(0x0, 0x0, &(0x7f0000001000), &(0x7f0000005000)) 2018/04/07 08:15:13 executing program 2: mkdir(&(0x7f0000030000)='./file0\x00', 0x0) mount(&(0x7f000000a000)='./file0\x00', &(0x7f000000aff8)='./file0\x00', &(0x7f00000001c0)="657874332eb8ca7d57ea061e49a0a191ded09589c57b688ce67454a3e840d95a0ce4bd251d33b2438b8d57c2c302641e1fb5bd591e8f5aa4b4438257517d648e072f920e930260645cbf6661eff0ac667d1e580c69c320dacaaf8bee0587dcb22cf7e05ee0dfb6daa054581d5bcf603972de", 0x0, &(0x7f0000000040)) 2018/04/07 08:15:14 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000d1bfa8)={0x26, 'hash\x00', 0x0, 0x0, 'crc32-generic\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) r2 = open(&(0x7f00004b8ff8)='./file0\x00', 0x28042, 0x0) fallocate(r2, 0x0, 0x0, 0x8) sendfile(r1, r2, &(0x7f0000000080), 0xa) 2018/04/07 08:15:14 executing program 6: mkdir(&(0x7f0000000640)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x3, 0x78}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f0000144000)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) 2018/04/07 08:15:14 executing program 0: r0 = socket(0x10, 0x3, 0x0) write(r0, &(0x7f0000000000)="26000000130047f1eb14c1f8590022ff001000e3010000000500000000000000060010000e4b", 0x26) 2018/04/07 08:15:14 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f000001a000)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f0000000080)={0x2, &(0x7f0000fbcff0)=[{0x20, 0x0, 0x0, 0xfffffffffffff004}, {0x6}]}, 0x10) sendto(r0, &(0x7f0000c9e000), 0xf971, 0x0, 0x0, 0x0) 2018/04/07 08:15:14 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000447000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(blowfish)\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000330d27)="d3ab2719", 0x4) sendmmsg$alg(r1, &(0x7f000059cfc8)=[{0x0, 0x0, &(0x7f0000283000)=[{&(0x7f00005a7000)="d1a4edc6ada830966dc07a7d9eda5a84d6acd04108a8778ef7bdb8de20dadf839b76eae0e7790d9454e3218626070927707fd45c81e73272b7ebc618d39458b5db41ebef9c78743b4aeab1813d5349a9", 0x50}], 0x1, &(0x7f0000000140)}], 0x1, 0x0) recvmsg(r1, &(0x7f0000000340)={&(0x7f0000000000)=@alg, 0x58, &(0x7f00000002c0)=[{&(0x7f0000000080)=""/81, 0x51}], 0x1}, 0x0) 2018/04/07 08:15:14 executing program 4: perf_event_open(&(0x7f0000348f88)={0x0, 0x78}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000004fc8)={&(0x7f0000000100)={0x10}, 0xc, &(0x7f0000000f80)={&(0x7f0000000d80)=@setlink={0x3c, 0x13, 0x1, 0x0, 0x0, {}, [@IFLA_IFNAME={0x14, 0x3, 'sit0\x00'}, @IFLA_AF_SPEC={0x8, 0x1a, [{0x4, 0x2}]}]}, 0x3c}, 0x1}, 0x0) 2018/04/07 08:15:14 executing program 7: perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff7fffffffffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clock_adjtime(0x0, &(0x7f0000012f30)) 2018/04/07 08:15:14 executing program 1: r0 = memfd_create(&(0x7f0000002000)="2f7b06003170707031253a656d30f9", 0x0) pwritev(r0, &(0x7f00000000c0)=[{&(0x7f0000000000)="480000000042f7", 0x7}], 0x1, 0x11) mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x4, 0x11, 0xffffffffffffffff, 0x0) timer_settime(0x0, 0x0, &(0x7f0000001000), &(0x7f0000005000)) [ 72.439323] netlink: 'syz-executor0': attribute type 16 has an invalid length. [ 72.477372] ================================================================== 2018/04/07 08:15:14 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f000001a000)={0xffffffffffffffff}) sendto(r0, &(0x7f0000c9e000), 0xf971, 0x0, 0x0, 0x0) [ 72.484783] BUG: KMSAN: uninit-value in crc32_le+0x4c2/0xcd0 [ 72.490588] CPU: 0 PID: 6088 Comm: syz-executor2 Not tainted 4.16.0+ #81 [ 72.497418] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 72.506769] Call Trace: [ 72.509359] dump_stack+0x185/0x1d0 [ 72.512990] ? crc32_le+0x4c2/0xcd0 [ 72.516615] kmsan_report+0x142/0x240 [ 72.520421] __msan_warning_32+0x6c/0xb0 [ 72.524475] crc32_le+0x4c2/0xcd0 [ 72.527940] ? __msan_metadata_ptr_for_store_4+0x13/0x20 [ 72.533395] ? hash_walk_new_entry+0x615/0x720 2018/04/07 08:15:14 executing program 6: perf_event_open(&(0x7f0000b5a000)={0x4000000002, 0x78, 0x1e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000040)='keyring\x00', &(0x7f0000000080)={0x73, 0x79, 0x7a}, 0x0, 0x0, 0xffffffffffffffff) r1 = add_key$keyring(&(0x7f0000000200)='keyring\x00', &(0x7f0000000000)={0x73, 0x79, 0x7a}, 0x0, 0x0, r0) r2 = add_key$user(&(0x7f00003bd000)='user\x00', &(0x7f0000a00000)={0x73, 0x79, 0x7a}, &(0x7f0000facfff)="01", 0x1, r1) r3 = add_key$user(&(0x7f0000fc0ffb)='user\x00', &(0x7f0000752ffb)={0x73, 0x79, 0x7a, 0x3}, &(0x7f00003eb000)="b3", 0x1, r1) keyctl$update(0x2, r3, &(0x7f0000000240)="df02754677212dfc3e2acc26fdc3ffa64813da494137e175e9f2780ac5e2a09f43a1fcebf272a5a135de92bf4a9033933824f6e6aa023895113293535d1c0066d20e0f275188b4b4c187e18774fc2227cbb60fc6697f5337726164c8fbe1181e6d50986cd98a5c44ac0ec375deb27eafcf7d06438f252510d87bd91d03e7dc2faed85adcd88ca30e75b1e143a72d94defa187e48b89efbbbcc9b9a9a307353df7a21affce4e9149eb122cbc356cb681365afd979e97b57b596e901864a68679f", 0xc0) keyctl$dh_compute(0x17, &(0x7f0000000100)={r2, r3, r3}, &(0x7f0000000140)=""/5, 0x5, &(0x7f0000000300)={&(0x7f00000000c0)={'sha512-generic\x00'}}) [ 72.537989] crc32_update+0xb6/0x120 [ 72.541704] ? crc32_init+0xe0/0xe0 [ 72.545330] shash_async_update+0x290/0x360 [ 72.549653] ? shash_async_init+0x270/0x270 [ 72.553971] hash_sendpage+0x904/0xe10 [ 72.557864] ? hash_recvmsg+0xd50/0xd50 [ 72.561842] sock_sendpage+0x1de/0x2c0 [ 72.565743] pipe_to_sendpage+0x31b/0x430 [ 72.569898] ? sock_fasync+0x2b0/0x2b0 [ 72.573797] ? propagate_umount+0x3a30/0x3a30 [ 72.578295] __splice_from_pipe+0x49a/0xf30 [ 72.582620] ? generic_splice_sendpage+0x2a0/0x2a0 [ 72.587556] ? __msan_metadata_ptr_for_load_4+0x10/0x20 [ 72.592932] generic_splice_sendpage+0x1c6/0x2a0 [ 72.597699] ? iter_file_splice_write+0x1710/0x1710 [ 72.602718] ? iter_file_splice_write+0x1710/0x1710 [ 72.607740] direct_splice_actor+0x19b/0x200 [ 72.612162] splice_direct_to_actor+0x764/0x1040 [ 72.616926] ? do_splice_direct+0x540/0x540 [ 72.621259] ? security_file_permission+0x28f/0x4b0 [ 72.626285] ? rw_verify_area+0x35e/0x580 [ 72.630441] do_splice_direct+0x335/0x540 [ 72.634602] do_sendfile+0x1067/0x1e40 2018/04/07 08:15:14 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f000001a000)={0xffffffffffffffff}) sendto(r0, &(0x7f0000c9e000), 0xf971, 0x0, 0x0, 0x0) [ 72.638507] SYSC_sendfile64+0x1b3/0x300 [ 72.642578] SyS_sendfile64+0x64/0x90 [ 72.646378] do_syscall_64+0x309/0x430 [ 72.650275] ? SYSC_sendfile+0x320/0x320 [ 72.654359] entry_SYSCALL_64_after_hwframe+0x3d/0xa2 [ 72.659572] RIP: 0033:0x455259 [ 72.662760] RSP: 002b:00007f27c58ecc68 EFLAGS: 00000246 ORIG_RAX: 0000000000000028 [ 72.670472] RAX: ffffffffffffffda RBX: 00007f27c58ed6d4 RCX: 0000000000455259 [ 72.677746] RDX: 0000000020000080 RSI: 0000000000000015 RDI: 0000000000000014 [ 72.685017] RBP: 000000000072bea0 R08: 0000000000000000 R09: 0000000000000000 [ 72.692294] R10: 000000000000000a R11: 0000000000000246 R12: 00000000ffffffff [ 72.699569] R13: 00000000000004c6 R14: 00000000006fa330 R15: 0000000000000000 [ 72.706836] [ 72.708458] Uninit was created at: [ 72.711999] kmsan_alloc_meta_for_pages+0x161/0x3a0 [ 72.717011] kmsan_alloc_page+0x82/0xe0 [ 72.720997] __alloc_pages_nodemask+0xf5b/0x5dc0 [ 72.725753] alloc_pages_vma+0xcc8/0x1800 [ 72.729903] shmem_alloc_and_acct_page+0x6d5/0x1000 2018/04/07 08:15:14 executing program 1: perf_event_open(&(0x7f0000b5a000)={0x4000000002, 0x78, 0x1e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000040)='keyring\x00', &(0x7f0000000080)={0x73, 0x79, 0x7a}, 0x0, 0x0, 0xffffffffffffffff) r1 = add_key$keyring(&(0x7f0000000200)='keyring\x00', &(0x7f0000000000)={0x73, 0x79, 0x7a}, 0x0, 0x0, r0) r2 = add_key$user(&(0x7f00003bd000)='user\x00', &(0x7f0000a00000)={0x73, 0x79, 0x7a}, &(0x7f0000facfff)="01", 0x1, r1) r3 = add_key$user(&(0x7f0000fc0ffb)='user\x00', &(0x7f0000752ffb)={0x73, 0x79, 0x7a, 0x3}, &(0x7f00003eb000)="b3", 0x1, r1) keyctl$update(0x2, r3, &(0x7f0000000240)="df02754677212dfc3e2acc26fdc3ffa64813da494137e175e9f2780ac5e2a09f43a1fcebf272a5a135de92bf4a9033933824f6e6aa023895113293535d1c0066d20e0f275188b4b4c187e18774fc2227cbb60fc6697f5337726164c8fbe1181e6d50986cd98a5c44ac0ec375deb27eafcf7d06438f252510d87bd91d03e7dc2faed85adcd88ca30e75b1e143a72d94defa187e48b89efbbbcc9b9a9a307353df7a21affce4e9149eb122cbc356cb681365afd979e97b57b596e901864a68679f", 0xc0) keyctl$dh_compute(0x17, &(0x7f0000000100)={r2, r3, r3}, &(0x7f0000000140)=""/5, 0x5, &(0x7f0000000300)={&(0x7f00000000c0)={'sha512-generic\x00'}}) 2018/04/07 08:15:14 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f000001a000)={0xffffffffffffffff}) sendto(r0, &(0x7f0000c9e000), 0xf971, 0x0, 0x0, 0x0) [ 72.734482] netlink: 'syz-executor0': attribute type 16 has an invalid length. [ 72.734915] shmem_getpage_gfp+0x35db/0x5770 [ 72.734942] shmem_fallocate+0xde2/0x1610 [ 72.750824] vfs_fallocate+0x9dc/0xde0 [ 72.754715] SYSC_fallocate+0x119/0x1d0 [ 72.758690] SyS_fallocate+0x64/0x90 [ 72.762403] do_syscall_64+0x309/0x430 [ 72.766289] entry_SYSCALL_64_after_hwframe+0x3d/0xa2 [ 72.771466] ================================================================== [ 72.778813] Disabling lock debugging due to kernel taint [ 72.784259] Kernel panic - not syncing: panic_on_warn set ... [ 72.784259] [ 72.791625] CPU: 0 PID: 6088 Comm: syz-executor2 Tainted: G B 4.16.0+ #81 [ 72.799760] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 72.809120] Call Trace: [ 72.811717] dump_stack+0x185/0x1d0 [ 72.815350] panic+0x39d/0x940 [ 72.818568] ? crc32_le+0x4c2/0xcd0 [ 72.822199] kmsan_report+0x238/0x240 [ 72.826006] __msan_warning_32+0x6c/0xb0 [ 72.830070] crc32_le+0x4c2/0xcd0 [ 72.833528] ? __msan_metadata_ptr_for_store_4+0x13/0x20 2018/04/07 08:15:14 executing program 0: perf_event_open(&(0x7f0000348f88)={0x2, 0x78, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clock_gettime(0x6, &(0x7f0000000140)) [ 72.838982] ? hash_walk_new_entry+0x615/0x720 [ 72.843583] crc32_update+0xb6/0x120 [ 72.847379] ? crc32_init+0xe0/0xe0 [ 72.851003] shash_async_update+0x290/0x360 [ 72.855330] ? shash_async_init+0x270/0x270 [ 72.859653] hash_sendpage+0x904/0xe10 [ 72.863543] ? hash_recvmsg+0xd50/0xd50 [ 72.867522] sock_sendpage+0x1de/0x2c0 [ 72.871420] pipe_to_sendpage+0x31b/0x430 [ 72.875570] ? sock_fasync+0x2b0/0x2b0 [ 72.879461] ? propagate_umount+0x3a30/0x3a30 [ 72.883956] __splice_from_pipe+0x49a/0xf30 2018/04/07 08:15:14 executing program 5: setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, &(0x7f0000000080)={0x2, &(0x7f0000fbcff0)=[{0x20, 0x0, 0x0, 0xfffffffffffff004}, {0x6}]}, 0x10) sendto(0xffffffffffffffff, &(0x7f0000c9e000), 0xf971, 0x0, 0x0, 0x0) [ 72.888277] ? generic_splice_sendpage+0x2a0/0x2a0 [ 72.893212] ? __msan_metadata_ptr_for_load_4+0x10/0x20 [ 72.898574] generic_splice_sendpage+0x1c6/0x2a0 [ 72.903336] ? iter_file_splice_write+0x1710/0x1710 [ 72.908358] ? iter_file_splice_write+0x1710/0x1710 [ 72.913410] direct_splice_actor+0x19b/0x200 [ 72.917827] splice_direct_to_actor+0x764/0x1040 [ 72.922583] ? do_splice_direct+0x540/0x540 [ 72.926927] ? security_file_permission+0x28f/0x4b0 [ 72.931967] ? rw_verify_area+0x35e/0x580 [ 72.936129] do_splice_direct+0x335/0x540 2018/04/07 08:15:14 executing program 5: socketpair$unix(0x1, 0x0, 0x0, &(0x7f000001a000)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f0000000080)={0x2, &(0x7f0000fbcff0)=[{0x20, 0x0, 0x0, 0xfffffffffffff004}, {0x6}]}, 0x10) sendto(r0, &(0x7f0000c9e000), 0xf971, 0x0, 0x0, 0x0) [ 72.940284] do_sendfile+0x1067/0x1e40 [ 72.944182] SYSC_sendfile64+0x1b3/0x300 [ 72.948245] SyS_sendfile64+0x64/0x90 [ 72.952042] do_syscall_64+0x309/0x430 [ 72.955933] ? SYSC_sendfile+0x320/0x320 [ 72.960000] entry_SYSCALL_64_after_hwframe+0x3d/0xa2 [ 72.965184] RIP: 0033:0x455259 [ 72.968364] RSP: 002b:00007f27c58ecc68 EFLAGS: 00000246 ORIG_RAX: 0000000000000028 [ 72.976070] RAX: ffffffffffffffda RBX: 00007f27c58ed6d4 RCX: 0000000000455259 [ 72.983338] RDX: 0000000020000080 RSI: 0000000000000015 RDI: 0000000000000014 [ 72.990600] RBP: 000000000072bea0 R08: 0000000000000000 R09: 0000000000000000 [ 72.997863] R10: 000000000000000a R11: 0000000000000246 R12: 00000000ffffffff [ 73.005133] R13: 00000000000004c6 R14: 00000000006fa330 R15: 0000000000000000 [ 73.012937] Dumping ftrace buffer: [ 73.016465] (ftrace buffer empty) [ 73.020149] Kernel Offset: disabled [ 73.023747] Rebooting in 86400 seconds..