INIT: Entering runlevel: 2

[info] Using makefile-style concurrent boot in runlevel 2.
[....] Starting enhanced syslogd: rsyslogd[?25l[?1c7[ ok 8[?25h[?0c.
[....] Starting periodic command scheduler: cron[?25l[?1c7[ ok 8[?25h[?0c.
[....] Starting OpenBSD Secure Shell server: sshd[?25l[?1c7[ ok 8[?25h[?0c.

Debian GNU/Linux 7 syzkaller ttyS0

Warning: Permanently added '10.128.0.57' (ECDSA) to the list of known hosts.
2018/04/21 01:45:21 fuzzer started
2018/04/21 01:45:21 dialing manager at 10.128.0.26:39431
syzkaller login: [   53.528565] can: request_module (can-proto-0) failed.
[   53.537665] can: request_module (can-proto-0) failed.
2018/04/21 01:45:45 kcov=true, comps=true
2018/04/21 01:45:47 executing program 0:
r0 = socket$inet6_udp(0xa, 0x2, 0x0)
setsockopt$inet6_int(r0, 0x29, 0x31, &(0x7f0000000040), 0x1)

2018/04/21 01:45:47 executing program 1:
perf_event_open(&(0x7f00000000c0)={0x2, 0x70, 0x3e6}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x0, 0x0)
r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0)
ioctl$KVM_SET_PIT(r1, 0xae44, &(0x7f0000000600))

2018/04/21 01:45:47 executing program 7:
r0 = socket$inet6_tcp(0xa, 0x1, 0x0)
setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000ad7000)={0x1, &(0x7f0000acbff8)=[{0x6, 0x0, 0x0, 0x6}]}, 0x10)
setsockopt$inet6_int(r0, 0x29, 0x42, &(0x7f000098dffc)=0x20006, 0x0)
r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000001040)='/dev/sequencer\x00', 0x200000, 0x0)
ioctl$SNDRV_CTL_IOCTL_ELEM_LIST(r1, 0xc0505510, &(0x7f0000000200)={0x6, 0x3, 0x400, 0x7, &(0x7f0000000140)=[{}, {}, {}]})
setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r1, 0x84, 0x8, &(0x7f0000000100)=0x200000000000002, 0x4)
lseek(r1, 0x0, 0x3)
bind$inet6(r0, &(0x7f0000807fe4)={0xa, 0x4e22}, 0x1c)
bind$inet6(r0, &(0x7f0000000080)={0xa, 0x4e21, 0x5, @empty, 0x8}, 0x1c)
sendto$inet6(r0, &(0x7f0000976000), 0x0, 0x200408d4, &(0x7f000072e000)={0xa, 0x4e22, 0x0, @ipv4={[], [0xff, 0xff], @loopback=0x7f000001}}, 0x1c)
setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000000)='lo\x00', 0x10)
socket$inet6_sctp(0xa, 0x5, 0x84)
sendto$inet6(r0, &(0x7f0000ad6fad)='\x00', 0x1, 0x0, &(0x7f0000254000)={0xa, 0x0, 0x0, @loopback={0x0, 0x1}}, 0x1c)
close(r0)

2018/04/21 01:45:47 executing program 2:
r0 = syz_open_procfs(0x0, &(0x7f0000000ff0)='fdinfo\x00')
getdents(r0, &(0x7f0000000100)=""/98, 0x62)

2018/04/21 01:45:47 executing program 3:
r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00003e0000)='/dev/ptmx\x00', 0x0, 0x0)
ioctl$TCSETS(r0, 0x40045431, &(0x7f00003b9fdc))
r1 = syz_open_pts(r0, 0x0)
read(r1, &(0x7f0000a8bfff)=""/1, 0x805031ae)
ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000fd0ffc))
openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vga_arbiter\x00', 0x0, 0x0)
syz_open_pts(r0, 0x0)
dup3(r1, r0, 0x0)

2018/04/21 01:45:47 executing program 4:
r0 = socket$can_bcm(0x1d, 0x2, 0x2)
connect(r0, &(0x7f0000002000)=@ethernet, 0x10)
ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000002fd8)={'vcan0\x00', <r1=>0x0})
sendmsg$can_bcm(r0, &(0x7f0000011000)={&(0x7f0000010ff0)={0x1d, r1}, 0x10, &(0x7f000000eff0)={&(0x7f0000012f80)={0x4, 0xfffffffffffffffc, 0x0, {0x0, 0x2710}, {0x77359400}, {}, 0x1, @canfd={{}, 0x1f4, 0x0, 0x0, 0x0, "68759a67d8602d3e4b207446a705148d03f1f86e60b22a6ec7e5b35afc19cd0ed506fb9cdba948697c01f3ec6bc0f8f98290b0198d30bde485753f80c203fe81"}}, 0x80}, 0x1}, 0x0)

2018/04/21 01:45:47 executing program 5:
r0 = socket$inet(0x2, 0x4000000000000001, 0x0)
setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000000140)=[{0x6}]}, 0x10)
sendto$inet(r0, &(0x7f00000003c0), 0x0, 0x200007ff, &(0x7f0000deaff0)={0x2, 0x0, @loopback=0x7f000001}, 0x10)
recvmmsg(r0, &(0x7f0000001c40)=[{{0x0, 0x160, &(0x7f0000000080), 0x1}}], 0x800000000000221, 0x0, &(0x7f0000001cc0)={0x77359400})
shutdown(r0, 0x0)

2018/04/21 01:45:47 executing program 6:
r0 = socket$inet6(0xa, 0x80001, 0x0)
setsockopt$inet6_MCAST_JOIN_GROUP(r0, 0x29, 0x2a, &(0x7f0000fca000)={0x100000001, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x1, [], 0x1}}}}, 0x88)
setsockopt$inet6_MCAST_MSFILTER(r0, 0x29, 0x30, &(0x7f0000874000)={0x1, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x1, [], 0x1}}}, 0x0, 0x2, [{{0xa, 0x0, 0x0, @dev={0xfe, 0x80}}}, {{0xa, 0x0, 0x0, @loopback={0x0, 0x1}}}]}, 0x190)
setsockopt$inet6_group_source_req(r0, 0x29, 0x2b, &(0x7f0000000280)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x1, [], 0x1}}}, {{0xa, 0x0, 0x0, @dev={0xfe, 0x80, [], 0x11}}}}, 0xaa6886e63ad3e5c2)

[   57.377708] IPVS: ftp: loaded support on port[0] = 21
[   57.397320] IPVS: ftp: loaded support on port[0] = 21
[   57.422683] IPVS: ftp: loaded support on port[0] = 21
[   57.425134] IPVS: ftp: loaded support on port[0] = 21
[   57.434793] IPVS: ftp: loaded support on port[0] = 21
[   57.447248] IPVS: ftp: loaded support on port[0] = 21
[   57.484223] IPVS: ftp: loaded support on port[0] = 21
[   57.510877] IPVS: ftp: loaded support on port[0] = 21
[   59.612590] bridge0: port 1(bridge_slave_0) entered blocking state
[   59.619123] bridge0: port 1(bridge_slave_0) entered disabled state
[   59.661159] device bridge_slave_0 entered promiscuous mode
[   59.676119] bridge0: port 1(bridge_slave_0) entered blocking state
[   59.682596] bridge0: port 1(bridge_slave_0) entered disabled state
[   59.690771] device bridge_slave_0 entered promiscuous mode
[   59.710733] bridge0: port 1(bridge_slave_0) entered blocking state
[   59.717146] bridge0: port 1(bridge_slave_0) entered disabled state
[   59.726351] device bridge_slave_0 entered promiscuous mode
[   59.736233] bridge0: port 1(bridge_slave_0) entered blocking state
[   59.742627] bridge0: port 1(bridge_slave_0) entered disabled state
[   59.766680] device bridge_slave_0 entered promiscuous mode
[   59.781053] bridge0: port 1(bridge_slave_0) entered blocking state
[   59.787468] bridge0: port 1(bridge_slave_0) entered disabled state
[   59.797314] device bridge_slave_0 entered promiscuous mode
[   59.806422] bridge0: port 2(bridge_slave_1) entered blocking state
[   59.812788] bridge0: port 2(bridge_slave_1) entered disabled state
[   59.826247] device bridge_slave_1 entered promiscuous mode
[   59.839421] bridge0: port 1(bridge_slave_0) entered blocking state
[   59.845821] bridge0: port 1(bridge_slave_0) entered disabled state
[   59.866772] device bridge_slave_0 entered promiscuous mode
[   59.878879] bridge0: port 2(bridge_slave_1) entered blocking state
[   59.885266] bridge0: port 2(bridge_slave_1) entered disabled state
[   59.893482] device bridge_slave_1 entered promiscuous mode
[   59.901461] bridge0: port 2(bridge_slave_1) entered blocking state
[   59.907857] bridge0: port 2(bridge_slave_1) entered disabled state
[   59.925006] device bridge_slave_1 entered promiscuous mode
[   59.933952] bridge0: port 2(bridge_slave_1) entered blocking state
[   59.940342] bridge0: port 2(bridge_slave_1) entered disabled state
[   59.948496] device bridge_slave_1 entered promiscuous mode
[   59.955823] bridge0: port 1(bridge_slave_0) entered blocking state
[   59.962247] bridge0: port 1(bridge_slave_0) entered disabled state
[   59.971096] device bridge_slave_0 entered promiscuous mode
[   59.979862] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready
[   59.992174] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready
[   60.001199] bridge0: port 2(bridge_slave_1) entered blocking state
[   60.007613] bridge0: port 2(bridge_slave_1) entered disabled state
[   60.031699] device bridge_slave_1 entered promiscuous mode
[   60.043611] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready
[   60.050873] bridge0: port 1(bridge_slave_0) entered blocking state
[   60.057289] bridge0: port 1(bridge_slave_0) entered disabled state
[   60.069247] device bridge_slave_0 entered promiscuous mode
[   60.086123] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready
[   60.094298] bridge0: port 2(bridge_slave_1) entered blocking state
[   60.100683] bridge0: port 2(bridge_slave_1) entered disabled state
[   60.113163] device bridge_slave_1 entered promiscuous mode
[   60.119871] bridge0: port 2(bridge_slave_1) entered blocking state
[   60.126287] bridge0: port 2(bridge_slave_1) entered disabled state
[   60.147981] device bridge_slave_1 entered promiscuous mode
[   60.162077] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready
[   60.169611] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready
[   60.179376] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready
[   60.189635] bridge0: port 2(bridge_slave_1) entered blocking state
[   60.196079] bridge0: port 2(bridge_slave_1) entered disabled state
[   60.214329] device bridge_slave_1 entered promiscuous mode
[   60.227163] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready
[   60.235439] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready
[   60.256925] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready
[   60.305812] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready
[   60.314550] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready
[   60.345754] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready
[   60.366528] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready
[   60.402380] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready
[   60.502761] bond0: Enslaving bond_slave_0 as an active interface with an up link
[   60.518817] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready
[   60.650329] bond0: Enslaving bond_slave_0 as an active interface with an up link
[   60.681677] bond0: Enslaving bond_slave_0 as an active interface with an up link
[   60.697680] bond0: Enslaving bond_slave_1 as an active interface with an up link
[   60.724507] bond0: Enslaving bond_slave_0 as an active interface with an up link
[   60.756741] bond0: Enslaving bond_slave_0 as an active interface with an up link
[   60.771572] bond0: Enslaving bond_slave_0 as an active interface with an up link
[   60.780638] bond0: Enslaving bond_slave_0 as an active interface with an up link
[   60.794432] bond0: Enslaving bond_slave_1 as an active interface with an up link
[   60.807096] bond0: Enslaving bond_slave_1 as an active interface with an up link
[   60.846395] bond0: Enslaving bond_slave_1 as an active interface with an up link
[   60.869892] bond0: Enslaving bond_slave_0 as an active interface with an up link
[   60.918968] bond0: Enslaving bond_slave_1 as an active interface with an up link
[   60.928960] bond0: Enslaving bond_slave_1 as an active interface with an up link
[   60.940695] bond0: Enslaving bond_slave_1 as an active interface with an up link
[   61.002719] bond0: Enslaving bond_slave_1 as an active interface with an up link
[   61.118778] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready
[   61.125746] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready
[   61.135751] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready
[   61.148558] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready
[   61.176766] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready
[   61.183756] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready
[   61.195915] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready
[   61.202828] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready
[   61.228262] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready
[   61.235177] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready
[   61.296587] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready
[   61.303480] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready
[   61.360202] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready
[   61.375856] team0: Port device team_slave_0 added
[   61.504666] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready
[   61.524617] team0: Port device team_slave_0 added
[   61.540286] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready
[   61.547756] team0: Port device team_slave_1 added
[   61.555923] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready
[   61.569793] team0: Port device team_slave_0 added
[   61.590427] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready
[   61.605278] team0: Port device team_slave_0 added
[   61.623787] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready
[   61.640525] team0: Port device team_slave_0 added
[   61.654268] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready
[   61.668457] team0: Port device team_slave_1 added
[   61.673966] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready
[   61.689010] team0: Port device team_slave_0 added
[   61.694559] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready
[   61.707497] team0: Port device team_slave_1 added
[   61.726287] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready
[   61.742955] team0: Port device team_slave_0 added
[   61.751643] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready
[   61.765556] team0: Port device team_slave_0 added
[   61.774103] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready
[   61.794224] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready
[   61.802506] team0: Port device team_slave_1 added
[   61.814530] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready
[   61.829118] team0: Port device team_slave_1 added
[   61.836924] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready
[   61.850057] team0: Port device team_slave_1 added
[   61.880513] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready
[   61.894368] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready
[   61.914619] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready
[   61.925563] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready
[   61.934741] team0: Port device team_slave_1 added
[   61.939996] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready
[   61.947394] team0: Port device team_slave_1 added
[   61.963833] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready
[   61.979185] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready
[   61.988064] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready
[   62.002902] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready
[   62.023981] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready
[   62.049589] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready
[   62.062898] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready
[   62.074292] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready
[   62.083618] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready
[   62.091951] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready
[   62.116431] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready
[   62.131603] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready
[   62.139880] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready
[   62.147635] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready
[   62.155632] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready
[   62.162618] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready
[   62.170825] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready
[   62.180354] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready
[   62.187680] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready
[   62.195785] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready
[   62.206770] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready
[   62.215369] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready
[   62.224954] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready
[   62.232772] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready
[   62.240831] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready
[   62.247985] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready
[   62.281546] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready
[   62.312830] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready
[   62.332880] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready
[   62.347236] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready
[   62.355644] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready
[   62.363423] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready
[   62.371111] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready
[   62.378529] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready
[   62.386425] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready
[   62.394137] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready
[   62.401827] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready
[   62.409587] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready
[   62.417285] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready
[   62.424690] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready
[   62.432438] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready
[   62.447358] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready
[   62.456917] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready
[   62.464082] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready
[   62.481555] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready
[   62.502266] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready
[   62.517110] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready
[   62.532711] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready
[   62.541351] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready
[   62.549324] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready
[   62.559839] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready
[   62.568716] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready
[   62.585248] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready
[   62.614558] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready
[   62.641331] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready
[   62.649534] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready
[   62.657510] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready
[   62.665341] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready
[   62.673119] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready
[   62.681892] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready
[   62.692369] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready
[   62.716870] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready
[   62.730055] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready
[   62.764570] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready
[   62.781141] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready
[   62.795078] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready
[   62.802532] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready
[   62.812360] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready
[   62.823534] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready
[   62.844492] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready
[   62.854396] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready
[   62.866698] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready
[   62.890559] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready
[   62.913147] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready
[   63.778303] bridge0: port 2(bridge_slave_1) entered blocking state
[   63.784850] bridge0: port 2(bridge_slave_1) entered forwarding state
[   63.791833] bridge0: port 1(bridge_slave_0) entered blocking state
[   63.798224] bridge0: port 1(bridge_slave_0) entered forwarding state
[   63.838614] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready
[   63.946584] bridge0: port 2(bridge_slave_1) entered blocking state
[   63.953065] bridge0: port 2(bridge_slave_1) entered forwarding state
[   63.959730] bridge0: port 1(bridge_slave_0) entered blocking state
[   63.966120] bridge0: port 1(bridge_slave_0) entered forwarding state
[   63.981131] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready
[   63.992651] bridge0: port 2(bridge_slave_1) entered blocking state
[   63.999076] bridge0: port 2(bridge_slave_1) entered forwarding state
[   64.005747] bridge0: port 1(bridge_slave_0) entered blocking state
[   64.012112] bridge0: port 1(bridge_slave_0) entered forwarding state
[   64.021309] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready
[   64.030267] bridge0: port 2(bridge_slave_1) entered blocking state
[   64.036647] bridge0: port 2(bridge_slave_1) entered forwarding state
[   64.043294] bridge0: port 1(bridge_slave_0) entered blocking state
[   64.049669] bridge0: port 1(bridge_slave_0) entered forwarding state
[   64.057939] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready
[   64.103414] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready
[   64.124815] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready
[   64.162577] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready
[   64.191301] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready
[   64.206490] bridge0: port 2(bridge_slave_1) entered blocking state
[   64.212890] bridge0: port 2(bridge_slave_1) entered forwarding state
[   64.219510] bridge0: port 1(bridge_slave_0) entered blocking state
[   64.225866] bridge0: port 1(bridge_slave_0) entered forwarding state
[   64.237966] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready
[   64.247463] bridge0: port 2(bridge_slave_1) entered blocking state
[   64.253859] bridge0: port 2(bridge_slave_1) entered forwarding state
[   64.260531] bridge0: port 1(bridge_slave_0) entered blocking state
[   64.266907] bridge0: port 1(bridge_slave_0) entered forwarding state
[   64.289384] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready
[   64.310449] bridge0: port 2(bridge_slave_1) entered blocking state
[   64.316876] bridge0: port 2(bridge_slave_1) entered forwarding state
[   64.323548] bridge0: port 1(bridge_slave_0) entered blocking state
[   64.329929] bridge0: port 1(bridge_slave_0) entered forwarding state
[   64.349245] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready
[   64.360856] bridge0: port 2(bridge_slave_1) entered blocking state
[   64.367266] bridge0: port 2(bridge_slave_1) entered forwarding state
[   64.373946] bridge0: port 1(bridge_slave_0) entered blocking state
[   64.380327] bridge0: port 1(bridge_slave_0) entered forwarding state
[   64.439995] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready
[   65.119283] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready
[   65.142778] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready
[   65.176295] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready
[   65.188222] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready
[   69.016246] 8021q: adding VLAN 0 to HW filter on device bond0
[   69.047707] 8021q: adding VLAN 0 to HW filter on device bond0
[   69.141085] 8021q: adding VLAN 0 to HW filter on device bond0
[   69.182327] 8021q: adding VLAN 0 to HW filter on device bond0
[   69.231841] 8021q: adding VLAN 0 to HW filter on device bond0
[   69.278705] 8021q: adding VLAN 0 to HW filter on device bond0
[   69.381284] 8021q: adding VLAN 0 to HW filter on device bond0
[   69.407476] 8021q: adding VLAN 0 to HW filter on device bond0
[   69.474693] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready
[   69.554953] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready
[   69.626586] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready
[   69.635933] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready
[   69.667845] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready
[   69.775608] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready
[   69.884997] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready
[   69.928759] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready
[   69.953762] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready
[   69.960091] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready
[   69.976535] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready
[   70.078794] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready
[   70.085547] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready
[   70.092703] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready
[   70.127259] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready
[   70.134892] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready
[   70.142889] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready
[   70.149536] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready
[   70.168364] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready
[   70.198533] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready
[   70.220861] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready
[   70.227806] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready
[   70.234922] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready
[   70.270687] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready
[   70.285447] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready
[   70.316552] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready
[   70.474162] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready
[   70.480375] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready
[   70.491270] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready
[   70.514777] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready
[   70.521153] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready
[   70.533484] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready
[   70.567232] 8021q: adding VLAN 0 to HW filter on device team0
[   70.590974] 8021q: adding VLAN 0 to HW filter on device team0
[   70.621263] 8021q: adding VLAN 0 to HW filter on device team0
[   70.642706] 8021q: adding VLAN 0 to HW filter on device team0
[   70.728073] 8021q: adding VLAN 0 to HW filter on device team0
[   70.805760] 8021q: adding VLAN 0 to HW filter on device team0
[   70.999186] 8021q: adding VLAN 0 to HW filter on device team0
[   71.027807] 8021q: adding VLAN 0 to HW filter on device team0
2018/04/21 01:46:03 executing program 1:
perf_event_open(&(0x7f00000000c0)={0x2, 0x70, 0x3e6}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x0, 0x0)
r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0)
ioctl$KVM_SET_PIT(r1, 0xae44, &(0x7f0000000600))

2018/04/21 01:46:03 executing program 7:
r0 = socket$inet6_tcp(0xa, 0x1, 0x0)
setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000ad7000)={0x1, &(0x7f0000acbff8)=[{0x6, 0x0, 0x0, 0x6}]}, 0x10)
setsockopt$inet6_int(r0, 0x29, 0x42, &(0x7f000098dffc)=0x20006, 0x0)
r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000001040)='/dev/sequencer\x00', 0x200000, 0x0)
ioctl$SNDRV_CTL_IOCTL_ELEM_LIST(r1, 0xc0505510, &(0x7f0000000200)={0x6, 0x3, 0x400, 0x7, &(0x7f0000000140)=[{}, {}, {}]})
setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r1, 0x84, 0x8, &(0x7f0000000100)=0x200000000000002, 0x4)
lseek(r1, 0x0, 0x3)
bind$inet6(r0, &(0x7f0000807fe4)={0xa, 0x4e22}, 0x1c)
bind$inet6(r0, &(0x7f0000000080)={0xa, 0x4e21, 0x5, @empty, 0x8}, 0x1c)
sendto$inet6(r0, &(0x7f0000976000), 0x0, 0x200408d4, &(0x7f000072e000)={0xa, 0x4e22, 0x0, @ipv4={[], [0xff, 0xff], @loopback=0x7f000001}}, 0x1c)
setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000000)='lo\x00', 0x10)
socket$inet6_sctp(0xa, 0x5, 0x84)
sendto$inet6(r0, &(0x7f0000ad6fad)='\x00', 0x1, 0x0, &(0x7f0000254000)={0xa, 0x0, 0x0, @loopback={0x0, 0x1}}, 0x1c)
close(r0)

2018/04/21 01:46:03 executing program 6:
r0 = socket$inet6(0xa, 0x80001, 0x0)
setsockopt$inet6_MCAST_JOIN_GROUP(r0, 0x29, 0x2a, &(0x7f0000fca000)={0x100000001, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x1, [], 0x1}}}}, 0x88)
setsockopt$inet6_MCAST_MSFILTER(r0, 0x29, 0x30, &(0x7f0000874000)={0x1, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x1, [], 0x1}}}, 0x0, 0x2, [{{0xa, 0x0, 0x0, @dev={0xfe, 0x80}}}, {{0xa, 0x0, 0x0, @loopback={0x0, 0x1}}}]}, 0x190)
setsockopt$inet6_group_source_req(r0, 0x29, 0x2b, &(0x7f0000000280)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x1, [], 0x1}}}, {{0xa, 0x0, 0x0, @dev={0xfe, 0x80, [], 0x11}}}}, 0xaa6886e63ad3e5c2)

2018/04/21 01:46:03 executing program 4:
r0 = socket$can_bcm(0x1d, 0x2, 0x2)
connect(r0, &(0x7f0000002000)=@ethernet, 0x10)
ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000002fd8)={'vcan0\x00', <r1=>0x0})
sendmsg$can_bcm(r0, &(0x7f0000011000)={&(0x7f0000010ff0)={0x1d, r1}, 0x10, &(0x7f000000eff0)={&(0x7f0000012f80)={0x4, 0xfffffffffffffffc, 0x0, {0x0, 0x2710}, {0x77359400}, {}, 0x1, @canfd={{}, 0x1f4, 0x0, 0x0, 0x0, "68759a67d8602d3e4b207446a705148d03f1f86e60b22a6ec7e5b35afc19cd0ed506fb9cdba948697c01f3ec6bc0f8f98290b0198d30bde485753f80c203fe81"}}, 0x80}, 0x1}, 0x0)

2018/04/21 01:46:03 executing program 6:
r0 = socket$inet6(0xa, 0x80001, 0x0)
setsockopt$inet6_MCAST_JOIN_GROUP(r0, 0x29, 0x2a, &(0x7f0000fca000)={0x100000001, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x1, [], 0x1}}}}, 0x88)
setsockopt$inet6_MCAST_MSFILTER(r0, 0x29, 0x30, &(0x7f0000874000)={0x1, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x1, [], 0x1}}}, 0x0, 0x2, [{{0xa, 0x0, 0x0, @dev={0xfe, 0x80}}}, {{0xa, 0x0, 0x0, @loopback={0x0, 0x1}}}]}, 0x190)
setsockopt$inet6_group_source_req(r0, 0x29, 0x2b, &(0x7f0000000280)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x1, [], 0x1}}}, {{0xa, 0x0, 0x0, @dev={0xfe, 0x80, [], 0x11}}}}, 0xaa6886e63ad3e5c2)

2018/04/21 01:46:03 executing program 7:
r0 = socket$inet6_tcp(0xa, 0x1, 0x0)
setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000ad7000)={0x1, &(0x7f0000acbff8)=[{0x6, 0x0, 0x0, 0x6}]}, 0x10)
setsockopt$inet6_int(r0, 0x29, 0x42, &(0x7f000098dffc)=0x20006, 0x0)
r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000001040)='/dev/sequencer\x00', 0x200000, 0x0)
ioctl$SNDRV_CTL_IOCTL_ELEM_LIST(r1, 0xc0505510, &(0x7f0000000200)={0x6, 0x3, 0x400, 0x7, &(0x7f0000000140)=[{}, {}, {}]})
setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r1, 0x84, 0x8, &(0x7f0000000100)=0x200000000000002, 0x4)
lseek(r1, 0x0, 0x3)
bind$inet6(r0, &(0x7f0000807fe4)={0xa, 0x4e22}, 0x1c)
bind$inet6(r0, &(0x7f0000000080)={0xa, 0x4e21, 0x5, @empty, 0x8}, 0x1c)
sendto$inet6(r0, &(0x7f0000976000), 0x0, 0x200408d4, &(0x7f000072e000)={0xa, 0x4e22, 0x0, @ipv4={[], [0xff, 0xff], @loopback=0x7f000001}}, 0x1c)
setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000000)='lo\x00', 0x10)
socket$inet6_sctp(0xa, 0x5, 0x84)
sendto$inet6(r0, &(0x7f0000ad6fad)='\x00', 0x1, 0x0, &(0x7f0000254000)={0xa, 0x0, 0x0, @loopback={0x0, 0x1}}, 0x1c)
close(r0)

2018/04/21 01:46:03 executing program 1:
perf_event_open(&(0x7f00000000c0)={0x2, 0x70, 0x3e6}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x0, 0x0)
r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0)
ioctl$KVM_SET_PIT(r1, 0xae44, &(0x7f0000000600))

2018/04/21 01:46:03 executing program 4:
r0 = socket$can_bcm(0x1d, 0x2, 0x2)
connect(r0, &(0x7f0000002000)=@ethernet, 0x10)
ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000002fd8)={'vcan0\x00', <r1=>0x0})
sendmsg$can_bcm(r0, &(0x7f0000011000)={&(0x7f0000010ff0)={0x1d, r1}, 0x10, &(0x7f000000eff0)={&(0x7f0000012f80)={0x4, 0xfffffffffffffffc, 0x0, {0x0, 0x2710}, {0x77359400}, {}, 0x1, @canfd={{}, 0x1f4, 0x0, 0x0, 0x0, "68759a67d8602d3e4b207446a705148d03f1f86e60b22a6ec7e5b35afc19cd0ed506fb9cdba948697c01f3ec6bc0f8f98290b0198d30bde485753f80c203fe81"}}, 0x80}, 0x1}, 0x0)

2018/04/21 01:46:04 executing program 0:
r0 = socket$inet6_udp(0xa, 0x2, 0x0)
setsockopt$inet6_int(r0, 0x29, 0x31, &(0x7f0000000040), 0x1)

2018/04/21 01:46:04 executing program 3:
r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00003e0000)='/dev/ptmx\x00', 0x0, 0x0)
ioctl$TCSETS(r0, 0x40045431, &(0x7f00003b9fdc))
r1 = syz_open_pts(r0, 0x0)
read(r1, &(0x7f0000a8bfff)=""/1, 0x805031ae)
ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000fd0ffc))
openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vga_arbiter\x00', 0x0, 0x0)
syz_open_pts(r0, 0x0)
dup3(r1, r0, 0x0)

2018/04/21 01:46:04 executing program 5:
r0 = socket$inet(0x2, 0x4000000000000001, 0x0)
setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000000140)=[{0x6}]}, 0x10)
sendto$inet(r0, &(0x7f00000003c0), 0x0, 0x200007ff, &(0x7f0000deaff0)={0x2, 0x0, @loopback=0x7f000001}, 0x10)
recvmmsg(r0, &(0x7f0000001c40)=[{{0x0, 0x160, &(0x7f0000000080), 0x1}}], 0x800000000000221, 0x0, &(0x7f0000001cc0)={0x77359400})
shutdown(r0, 0x0)

2018/04/21 01:46:04 executing program 6:
r0 = socket$inet6(0xa, 0x80001, 0x0)
setsockopt$inet6_MCAST_JOIN_GROUP(r0, 0x29, 0x2a, &(0x7f0000fca000)={0x100000001, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x1, [], 0x1}}}}, 0x88)
setsockopt$inet6_MCAST_MSFILTER(r0, 0x29, 0x30, &(0x7f0000874000)={0x1, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x1, [], 0x1}}}, 0x0, 0x2, [{{0xa, 0x0, 0x0, @dev={0xfe, 0x80}}}, {{0xa, 0x0, 0x0, @loopback={0x0, 0x1}}}]}, 0x190)
setsockopt$inet6_group_source_req(r0, 0x29, 0x2b, &(0x7f0000000280)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x1, [], 0x1}}}, {{0xa, 0x0, 0x0, @dev={0xfe, 0x80, [], 0x11}}}}, 0xaa6886e63ad3e5c2)

2018/04/21 01:46:04 executing program 2:
r0 = syz_open_procfs(0x0, &(0x7f0000000ff0)='fdinfo\x00')
getdents(r0, &(0x7f0000000100)=""/98, 0x62)

2018/04/21 01:46:04 executing program 7:
r0 = socket$inet6_tcp(0xa, 0x1, 0x0)
setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000ad7000)={0x1, &(0x7f0000acbff8)=[{0x6, 0x0, 0x0, 0x6}]}, 0x10)
setsockopt$inet6_int(r0, 0x29, 0x42, &(0x7f000098dffc)=0x20006, 0x0)
r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000001040)='/dev/sequencer\x00', 0x200000, 0x0)
ioctl$SNDRV_CTL_IOCTL_ELEM_LIST(r1, 0xc0505510, &(0x7f0000000200)={0x6, 0x3, 0x400, 0x7, &(0x7f0000000140)=[{}, {}, {}]})
setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r1, 0x84, 0x8, &(0x7f0000000100)=0x200000000000002, 0x4)
lseek(r1, 0x0, 0x3)
bind$inet6(r0, &(0x7f0000807fe4)={0xa, 0x4e22}, 0x1c)
bind$inet6(r0, &(0x7f0000000080)={0xa, 0x4e21, 0x5, @empty, 0x8}, 0x1c)
sendto$inet6(r0, &(0x7f0000976000), 0x0, 0x200408d4, &(0x7f000072e000)={0xa, 0x4e22, 0x0, @ipv4={[], [0xff, 0xff], @loopback=0x7f000001}}, 0x1c)
setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000000)='lo\x00', 0x10)
socket$inet6_sctp(0xa, 0x5, 0x84)
sendto$inet6(r0, &(0x7f0000ad6fad)='\x00', 0x1, 0x0, &(0x7f0000254000)={0xa, 0x0, 0x0, @loopback={0x0, 0x1}}, 0x1c)
close(r0)

2018/04/21 01:46:04 executing program 4:
r0 = socket$can_bcm(0x1d, 0x2, 0x2)
connect(r0, &(0x7f0000002000)=@ethernet, 0x10)
ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000002fd8)={'vcan0\x00', <r1=>0x0})
sendmsg$can_bcm(r0, &(0x7f0000011000)={&(0x7f0000010ff0)={0x1d, r1}, 0x10, &(0x7f000000eff0)={&(0x7f0000012f80)={0x4, 0xfffffffffffffffc, 0x0, {0x0, 0x2710}, {0x77359400}, {}, 0x1, @canfd={{}, 0x1f4, 0x0, 0x0, 0x0, "68759a67d8602d3e4b207446a705148d03f1f86e60b22a6ec7e5b35afc19cd0ed506fb9cdba948697c01f3ec6bc0f8f98290b0198d30bde485753f80c203fe81"}}, 0x80}, 0x1}, 0x0)

2018/04/21 01:46:04 executing program 1:
perf_event_open(&(0x7f00000000c0)={0x2, 0x70, 0x3e6}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x0, 0x0)
r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0)
ioctl$KVM_SET_PIT(r1, 0xae44, &(0x7f0000000600))

2018/04/21 01:46:04 executing program 2:
r0 = syz_open_procfs(0x0, &(0x7f0000000ff0)='fdinfo\x00')
getdents(r0, &(0x7f0000000100)=""/98, 0x62)

2018/04/21 01:46:05 executing program 0:
r0 = socket$inet6_udp(0xa, 0x2, 0x0)
setsockopt$inet6_int(r0, 0x29, 0x31, &(0x7f0000000040), 0x1)

2018/04/21 01:46:05 executing program 6:
r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00003e0000)='/dev/ptmx\x00', 0x0, 0x0)
ioctl$TCSETS(r0, 0x40045431, &(0x7f00003b9fdc))
r1 = syz_open_pts(r0, 0x0)
read(r1, &(0x7f0000a8bfff)=""/1, 0x805031ae)
ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000fd0ffc))
openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vga_arbiter\x00', 0x0, 0x0)
syz_open_pts(r0, 0x0)
dup3(r1, r0, 0x0)

2018/04/21 01:46:05 executing program 7:
r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00003e0000)='/dev/ptmx\x00', 0x0, 0x0)
ioctl$TCSETS(r0, 0x40045431, &(0x7f00003b9fdc))
r1 = syz_open_pts(r0, 0x0)
read(r1, &(0x7f0000a8bfff)=""/1, 0x805031ae)
ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000fd0ffc))
openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vga_arbiter\x00', 0x0, 0x0)
syz_open_pts(r0, 0x0)
dup3(r1, r0, 0x0)

2018/04/21 01:46:05 executing program 4:
r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00003e0000)='/dev/ptmx\x00', 0x0, 0x0)
ioctl$TCSETS(r0, 0x40045431, &(0x7f00003b9fdc))
r1 = syz_open_pts(r0, 0x0)
read(r1, &(0x7f0000a8bfff)=""/1, 0x805031ae)
ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000fd0ffc))
openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vga_arbiter\x00', 0x0, 0x0)
syz_open_pts(r0, 0x0)
dup3(r1, r0, 0x0)

2018/04/21 01:46:05 executing program 2:
r0 = syz_open_procfs(0x0, &(0x7f0000000ff0)='fdinfo\x00')
getdents(r0, &(0x7f0000000100)=""/98, 0x62)

2018/04/21 01:46:05 executing program 1:
r0 = socket$inet(0x2, 0x4000000000000001, 0x0)
setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000000140)=[{0x6}]}, 0x10)
sendto$inet(r0, &(0x7f00000003c0), 0x0, 0x200007ff, &(0x7f0000deaff0)={0x2, 0x0, @loopback=0x7f000001}, 0x10)
recvmmsg(r0, &(0x7f0000001c40)=[{{0x0, 0x160, &(0x7f0000000080), 0x1}}], 0x800000000000221, 0x0, &(0x7f0000001cc0)={0x77359400})
shutdown(r0, 0x0)

2018/04/21 01:46:05 executing program 3:
r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00003e0000)='/dev/ptmx\x00', 0x0, 0x0)
ioctl$TCSETS(r0, 0x40045431, &(0x7f00003b9fdc))
r1 = syz_open_pts(r0, 0x0)
read(r1, &(0x7f0000a8bfff)=""/1, 0x805031ae)
ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000fd0ffc))
openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vga_arbiter\x00', 0x0, 0x0)
syz_open_pts(r0, 0x0)
dup3(r1, r0, 0x0)

2018/04/21 01:46:05 executing program 5:
r0 = socket$inet(0x2, 0x4000000000000001, 0x0)
setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000000140)=[{0x6}]}, 0x10)
sendto$inet(r0, &(0x7f00000003c0), 0x0, 0x200007ff, &(0x7f0000deaff0)={0x2, 0x0, @loopback=0x7f000001}, 0x10)
recvmmsg(r0, &(0x7f0000001c40)=[{{0x0, 0x160, &(0x7f0000000080), 0x1}}], 0x800000000000221, 0x0, &(0x7f0000001cc0)={0x77359400})
shutdown(r0, 0x0)

2018/04/21 01:46:05 executing program 0:
r0 = socket$inet6_udp(0xa, 0x2, 0x0)
setsockopt$inet6_int(r0, 0x29, 0x31, &(0x7f0000000040), 0x1)

2018/04/21 01:46:05 executing program 2:
r0 = socket$inet6_tcp(0xa, 0x1, 0x0)
setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000ad7000)={0x1, &(0x7f0000acbff8)=[{0x6, 0x0, 0x0, 0x6}]}, 0x10)
setsockopt$inet6_int(r0, 0x29, 0x42, &(0x7f000098dffc)=0x20006, 0x0)
r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000001040)='/dev/sequencer\x00', 0x200000, 0x0)
ioctl$SNDRV_CTL_IOCTL_ELEM_LIST(r1, 0xc0505510, &(0x7f0000000200)={0x6, 0x3, 0x400, 0x7, &(0x7f0000000140)=[{}, {}, {}]})
setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r1, 0x84, 0x8, &(0x7f0000000100)=0x200000000000002, 0x4)
lseek(r1, 0x0, 0x3)
bind$inet6(r0, &(0x7f0000807fe4)={0xa, 0x4e22}, 0x1c)
bind$inet6(r0, &(0x7f0000000080)={0xa, 0x4e21, 0x5, @empty, 0x8}, 0x1c)
sendto$inet6(r0, &(0x7f0000976000), 0x0, 0x200408d4, &(0x7f000072e000)={0xa, 0x4e22, 0x0, @ipv4={[], [0xff, 0xff], @loopback=0x7f000001}}, 0x1c)
setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000000)='lo\x00', 0x10)
socket$inet6_sctp(0xa, 0x5, 0x84)
sendto$inet6(r0, &(0x7f0000ad6fad)='\x00', 0x1, 0x0, &(0x7f0000254000)={0xa, 0x0, 0x0, @loopback={0x0, 0x1}}, 0x1c)
close(r0)

2018/04/21 01:46:05 executing program 0:
r0 = socket$inet6_tcp(0xa, 0x1, 0x0)
setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000ad7000)={0x1, &(0x7f0000acbff8)=[{0x6, 0x0, 0x0, 0x6}]}, 0x10)
setsockopt$inet6_int(r0, 0x29, 0x42, &(0x7f000098dffc)=0x20006, 0x0)
r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000001040)='/dev/sequencer\x00', 0x200000, 0x0)
ioctl$SNDRV_CTL_IOCTL_ELEM_LIST(r1, 0xc0505510, &(0x7f0000000200)={0x6, 0x3, 0x400, 0x7, &(0x7f0000000140)=[{}, {}, {}]})
setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r1, 0x84, 0x8, &(0x7f0000000100)=0x200000000000002, 0x4)
lseek(r1, 0x0, 0x3)
bind$inet6(r0, &(0x7f0000807fe4)={0xa, 0x4e22}, 0x1c)
bind$inet6(r0, &(0x7f0000000080)={0xa, 0x4e21, 0x5, @empty, 0x8}, 0x1c)
sendto$inet6(r0, &(0x7f0000976000), 0x0, 0x200408d4, &(0x7f000072e000)={0xa, 0x4e22, 0x0, @ipv4={[], [0xff, 0xff], @loopback=0x7f000001}}, 0x1c)
setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000000)='lo\x00', 0x10)
socket$inet6_sctp(0xa, 0x5, 0x84)
sendto$inet6(r0, &(0x7f0000ad6fad)='\x00', 0x1, 0x0, &(0x7f0000254000)={0xa, 0x0, 0x0, @loopback={0x0, 0x1}}, 0x1c)
close(r0)

2018/04/21 01:46:05 executing program 2:
r0 = socket$inet6_tcp(0xa, 0x1, 0x0)
setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000ad7000)={0x1, &(0x7f0000acbff8)=[{0x6, 0x0, 0x0, 0x6}]}, 0x10)
setsockopt$inet6_int(r0, 0x29, 0x42, &(0x7f000098dffc)=0x20006, 0x0)
r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000001040)='/dev/sequencer\x00', 0x200000, 0x0)
ioctl$SNDRV_CTL_IOCTL_ELEM_LIST(r1, 0xc0505510, &(0x7f0000000200)={0x6, 0x3, 0x400, 0x7, &(0x7f0000000140)=[{}, {}, {}]})
setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r1, 0x84, 0x8, &(0x7f0000000100)=0x200000000000002, 0x4)
lseek(r1, 0x0, 0x3)
bind$inet6(r0, &(0x7f0000807fe4)={0xa, 0x4e22}, 0x1c)
bind$inet6(r0, &(0x7f0000000080)={0xa, 0x4e21, 0x5, @empty, 0x8}, 0x1c)
sendto$inet6(r0, &(0x7f0000976000), 0x0, 0x200408d4, &(0x7f000072e000)={0xa, 0x4e22, 0x0, @ipv4={[], [0xff, 0xff], @loopback=0x7f000001}}, 0x1c)
setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000000)='lo\x00', 0x10)
socket$inet6_sctp(0xa, 0x5, 0x84)
sendto$inet6(r0, &(0x7f0000ad6fad)='\x00', 0x1, 0x0, &(0x7f0000254000)={0xa, 0x0, 0x0, @loopback={0x0, 0x1}}, 0x1c)
close(r0)

2018/04/21 01:46:05 executing program 2:
r0 = socket$inet6_tcp(0xa, 0x1, 0x0)
setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000ad7000)={0x1, &(0x7f0000acbff8)=[{0x6, 0x0, 0x0, 0x6}]}, 0x10)
setsockopt$inet6_int(r0, 0x29, 0x42, &(0x7f000098dffc)=0x20006, 0x0)
r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000001040)='/dev/sequencer\x00', 0x200000, 0x0)
ioctl$SNDRV_CTL_IOCTL_ELEM_LIST(r1, 0xc0505510, &(0x7f0000000200)={0x6, 0x3, 0x400, 0x7, &(0x7f0000000140)=[{}, {}, {}]})
setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r1, 0x84, 0x8, &(0x7f0000000100)=0x200000000000002, 0x4)
lseek(r1, 0x0, 0x3)
bind$inet6(r0, &(0x7f0000807fe4)={0xa, 0x4e22}, 0x1c)
bind$inet6(r0, &(0x7f0000000080)={0xa, 0x4e21, 0x5, @empty, 0x8}, 0x1c)
sendto$inet6(r0, &(0x7f0000976000), 0x0, 0x200408d4, &(0x7f000072e000)={0xa, 0x4e22, 0x0, @ipv4={[], [0xff, 0xff], @loopback=0x7f000001}}, 0x1c)
setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000000)='lo\x00', 0x10)
socket$inet6_sctp(0xa, 0x5, 0x84)
sendto$inet6(r0, &(0x7f0000ad6fad)='\x00', 0x1, 0x0, &(0x7f0000254000)={0xa, 0x0, 0x0, @loopback={0x0, 0x1}}, 0x1c)
close(r0)

2018/04/21 01:46:05 executing program 0:
r0 = socket$inet6_tcp(0xa, 0x1, 0x0)
setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000ad7000)={0x1, &(0x7f0000acbff8)=[{0x6, 0x0, 0x0, 0x6}]}, 0x10)
setsockopt$inet6_int(r0, 0x29, 0x42, &(0x7f000098dffc)=0x20006, 0x0)
r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000001040)='/dev/sequencer\x00', 0x200000, 0x0)
ioctl$SNDRV_CTL_IOCTL_ELEM_LIST(r1, 0xc0505510, &(0x7f0000000200)={0x6, 0x3, 0x400, 0x7, &(0x7f0000000140)=[{}, {}, {}]})
setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r1, 0x84, 0x8, &(0x7f0000000100)=0x200000000000002, 0x4)
lseek(r1, 0x0, 0x3)
bind$inet6(r0, &(0x7f0000807fe4)={0xa, 0x4e22}, 0x1c)
bind$inet6(r0, &(0x7f0000000080)={0xa, 0x4e21, 0x5, @empty, 0x8}, 0x1c)
sendto$inet6(r0, &(0x7f0000976000), 0x0, 0x200408d4, &(0x7f000072e000)={0xa, 0x4e22, 0x0, @ipv4={[], [0xff, 0xff], @loopback=0x7f000001}}, 0x1c)
setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000000)='lo\x00', 0x10)
socket$inet6_sctp(0xa, 0x5, 0x84)
sendto$inet6(r0, &(0x7f0000ad6fad)='\x00', 0x1, 0x0, &(0x7f0000254000)={0xa, 0x0, 0x0, @loopback={0x0, 0x1}}, 0x1c)
close(r0)

2018/04/21 01:46:05 executing program 2:
r0 = socket$nl_route(0x10, 0x3, 0x0)
ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000680)={"6c6f00000000001400000900", <r1=>0x0})
sendmsg$nl_route(r0, &(0x7f0000000180)={&(0x7f0000000000)={0x10}, 0xc, &(0x7f0000000140)={&(0x7f00000000c0)=@ipv4_newaddr={0x34, 0x14, 0x505, 0x0, 0x0, {0x2, 0x0, 0x0, 0x0, r1}, [@IFA_CACHEINFO={0x14, 0x6, {0x5, 0x8}}, @IFA_LOCAL={0x8, 0x2, @multicast1=0xe0000001}]}, 0x34}, 0x1}, 0x0)

2018/04/21 01:46:05 executing program 0:
r0 = socket$inet6_tcp(0xa, 0x1, 0x0)
setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000ad7000)={0x1, &(0x7f0000acbff8)=[{0x6, 0x0, 0x0, 0x6}]}, 0x10)
setsockopt$inet6_int(r0, 0x29, 0x42, &(0x7f000098dffc)=0x20006, 0x0)
r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000001040)='/dev/sequencer\x00', 0x200000, 0x0)
ioctl$SNDRV_CTL_IOCTL_ELEM_LIST(r1, 0xc0505510, &(0x7f0000000200)={0x6, 0x3, 0x400, 0x7, &(0x7f0000000140)=[{}, {}, {}]})
setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r1, 0x84, 0x8, &(0x7f0000000100)=0x200000000000002, 0x4)
lseek(r1, 0x0, 0x3)
bind$inet6(r0, &(0x7f0000807fe4)={0xa, 0x4e22}, 0x1c)
bind$inet6(r0, &(0x7f0000000080)={0xa, 0x4e21, 0x5, @empty, 0x8}, 0x1c)
sendto$inet6(r0, &(0x7f0000976000), 0x0, 0x200408d4, &(0x7f000072e000)={0xa, 0x4e22, 0x0, @ipv4={[], [0xff, 0xff], @loopback=0x7f000001}}, 0x1c)
setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000000)='lo\x00', 0x10)
socket$inet6_sctp(0xa, 0x5, 0x84)
sendto$inet6(r0, &(0x7f0000ad6fad)='\x00', 0x1, 0x0, &(0x7f0000254000)={0xa, 0x0, 0x0, @loopback={0x0, 0x1}}, 0x1c)
close(r0)

2018/04/21 01:46:05 executing program 2:
r0 = socket$nl_route(0x10, 0x3, 0x0)
ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000680)={"6c6f00000000001400000900", <r1=>0x0})
sendmsg$nl_route(r0, &(0x7f0000000180)={&(0x7f0000000000)={0x10}, 0xc, &(0x7f0000000140)={&(0x7f00000000c0)=@ipv4_newaddr={0x34, 0x14, 0x505, 0x0, 0x0, {0x2, 0x0, 0x0, 0x0, r1}, [@IFA_CACHEINFO={0x14, 0x6, {0x5, 0x8}}, @IFA_LOCAL={0x8, 0x2, @multicast1=0xe0000001}]}, 0x34}, 0x1}, 0x0)

2018/04/21 01:46:06 executing program 5:
r0 = socket$inet(0x2, 0x4000000000000001, 0x0)
setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000000140)=[{0x6}]}, 0x10)
sendto$inet(r0, &(0x7f00000003c0), 0x0, 0x200007ff, &(0x7f0000deaff0)={0x2, 0x0, @loopback=0x7f000001}, 0x10)
recvmmsg(r0, &(0x7f0000001c40)=[{{0x0, 0x160, &(0x7f0000000080), 0x1}}], 0x800000000000221, 0x0, &(0x7f0000001cc0)={0x77359400})
shutdown(r0, 0x0)

2018/04/21 01:46:06 executing program 1:
r0 = socket$inet(0x2, 0x4000000000000001, 0x0)
setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000000140)=[{0x6}]}, 0x10)
sendto$inet(r0, &(0x7f00000003c0), 0x0, 0x200007ff, &(0x7f0000deaff0)={0x2, 0x0, @loopback=0x7f000001}, 0x10)
recvmmsg(r0, &(0x7f0000001c40)=[{{0x0, 0x160, &(0x7f0000000080), 0x1}}], 0x800000000000221, 0x0, &(0x7f0000001cc0)={0x77359400})
shutdown(r0, 0x0)

2018/04/21 01:46:06 executing program 4:
r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00003e0000)='/dev/ptmx\x00', 0x0, 0x0)
ioctl$TCSETS(r0, 0x40045431, &(0x7f00003b9fdc))
r1 = syz_open_pts(r0, 0x0)
read(r1, &(0x7f0000a8bfff)=""/1, 0x805031ae)
ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000fd0ffc))
openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vga_arbiter\x00', 0x0, 0x0)
syz_open_pts(r0, 0x0)
dup3(r1, r0, 0x0)

2018/04/21 01:46:06 executing program 3:
r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00003e0000)='/dev/ptmx\x00', 0x0, 0x0)
ioctl$TCSETS(r0, 0x40045431, &(0x7f00003b9fdc))
r1 = syz_open_pts(r0, 0x0)
read(r1, &(0x7f0000a8bfff)=""/1, 0x805031ae)
ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000fd0ffc))
openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vga_arbiter\x00', 0x0, 0x0)
syz_open_pts(r0, 0x0)
dup3(r1, r0, 0x0)

2018/04/21 01:46:06 executing program 7:
r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00003e0000)='/dev/ptmx\x00', 0x0, 0x0)
ioctl$TCSETS(r0, 0x40045431, &(0x7f00003b9fdc))
r1 = syz_open_pts(r0, 0x0)
read(r1, &(0x7f0000a8bfff)=""/1, 0x805031ae)
ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000fd0ffc))
openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vga_arbiter\x00', 0x0, 0x0)
syz_open_pts(r0, 0x0)
dup3(r1, r0, 0x0)

2018/04/21 01:46:06 executing program 6:
r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00003e0000)='/dev/ptmx\x00', 0x0, 0x0)
ioctl$TCSETS(r0, 0x40045431, &(0x7f00003b9fdc))
r1 = syz_open_pts(r0, 0x0)
read(r1, &(0x7f0000a8bfff)=""/1, 0x805031ae)
ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000fd0ffc))
openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vga_arbiter\x00', 0x0, 0x0)
syz_open_pts(r0, 0x0)
dup3(r1, r0, 0x0)

2018/04/21 01:46:06 executing program 0:
syz_open_procfs(0x0, &(0x7f0000000040)='ns/ipc\x00')
syz_open_procfs(0x0, &(0x7f0000000000)='ns/ipc\x00')

2018/04/21 01:46:06 executing program 2:
r0 = socket$nl_route(0x10, 0x3, 0x0)
ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000680)={"6c6f00000000001400000900", <r1=>0x0})
sendmsg$nl_route(r0, &(0x7f0000000180)={&(0x7f0000000000)={0x10}, 0xc, &(0x7f0000000140)={&(0x7f00000000c0)=@ipv4_newaddr={0x34, 0x14, 0x505, 0x0, 0x0, {0x2, 0x0, 0x0, 0x0, r1}, [@IFA_CACHEINFO={0x14, 0x6, {0x5, 0x8}}, @IFA_LOCAL={0x8, 0x2, @multicast1=0xe0000001}]}, 0x34}, 0x1}, 0x0)

2018/04/21 01:46:07 executing program 0:
syz_open_procfs(0x0, &(0x7f0000000040)='ns/ipc\x00')
syz_open_procfs(0x0, &(0x7f0000000000)='ns/ipc\x00')

2018/04/21 01:46:07 executing program 2:
r0 = socket$nl_route(0x10, 0x3, 0x0)
ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000680)={"6c6f00000000001400000900", <r1=>0x0})
sendmsg$nl_route(r0, &(0x7f0000000180)={&(0x7f0000000000)={0x10}, 0xc, &(0x7f0000000140)={&(0x7f00000000c0)=@ipv4_newaddr={0x34, 0x14, 0x505, 0x0, 0x0, {0x2, 0x0, 0x0, 0x0, r1}, [@IFA_CACHEINFO={0x14, 0x6, {0x5, 0x8}}, @IFA_LOCAL={0x8, 0x2, @multicast1=0xe0000001}]}, 0x34}, 0x1}, 0x0)

2018/04/21 01:46:07 executing program 1:
r0 = socket$inet(0x2, 0x4000000000000001, 0x0)
setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000000140)=[{0x6}]}, 0x10)
sendto$inet(r0, &(0x7f00000003c0), 0x0, 0x200007ff, &(0x7f0000deaff0)={0x2, 0x0, @loopback=0x7f000001}, 0x10)
recvmmsg(r0, &(0x7f0000001c40)=[{{0x0, 0x160, &(0x7f0000000080), 0x1}}], 0x800000000000221, 0x0, &(0x7f0000001cc0)={0x77359400})
shutdown(r0, 0x0)

2018/04/21 01:46:07 executing program 5:
mkdir(&(0x7f0000000080)='./file0\x00', 0x0)
link(&(0x7f0000f3bff8)='./file0\x00', &(0x7f00009db000)='./file1\x00')

2018/04/21 01:46:07 executing program 4:
r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00003e0000)='/dev/ptmx\x00', 0x0, 0x0)
ioctl$TCSETS(r0, 0x40045431, &(0x7f00003b9fdc))
r1 = syz_open_pts(r0, 0x0)
read(r1, &(0x7f0000a8bfff)=""/1, 0x805031ae)
ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000fd0ffc))
openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vga_arbiter\x00', 0x0, 0x0)
syz_open_pts(r0, 0x0)
dup3(r1, r0, 0x0)

2018/04/21 01:46:07 executing program 3:
r0 = socket$can_bcm(0x1d, 0x2, 0x2)
connect(r0, &(0x7f0000002000)=@ethernet, 0x10)
sendmsg$can_bcm(r0, &(0x7f0000000000)={&(0x7f0000004000)={0x1d}, 0x10, &(0x7f0000002ff0)={&(0x7f0000004fb8)={0x5, 0x0, 0x0, {}, {0x0, 0x7530}, {}, 0x1, @can={{}, 0x0, 0x0, 0x0, 0x0, "8e15adecfc04aba1"}}, 0x48}, 0x1}, 0x0)
sendmsg$can_bcm(r0, &(0x7f00005e4000)={&(0x7f0000000040)={0x1d}, 0x10, &(0x7f0000000080)={&(0x7f00000aef80)={0x5, 0x0, 0x0, {}, {}, {}, 0x1, @can={{}, 0x0, 0x0, 0x0, 0x0, "e2ba079c66681a29"}}, 0x48}, 0x1}, 0x0)

2018/04/21 01:46:07 executing program 6:
r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00003e0000)='/dev/ptmx\x00', 0x0, 0x0)
ioctl$TCSETS(r0, 0x40045431, &(0x7f00003b9fdc))
r1 = syz_open_pts(r0, 0x0)
read(r1, &(0x7f0000a8bfff)=""/1, 0x805031ae)
ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000fd0ffc))
openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vga_arbiter\x00', 0x0, 0x0)
syz_open_pts(r0, 0x0)
dup3(r1, r0, 0x0)

2018/04/21 01:46:07 executing program 7:
r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00003e0000)='/dev/ptmx\x00', 0x0, 0x0)
ioctl$TCSETS(r0, 0x40045431, &(0x7f00003b9fdc))
r1 = syz_open_pts(r0, 0x0)
read(r1, &(0x7f0000a8bfff)=""/1, 0x805031ae)
ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000fd0ffc))
openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vga_arbiter\x00', 0x0, 0x0)
syz_open_pts(r0, 0x0)
dup3(r1, r0, 0x0)

2018/04/21 01:46:07 executing program 2:
r0 = openat$vsock(0xffffffffffffff9c, &(0x7f00001b3000)='/dev/vhost-vsock\x00', 0x2, 0x0)
ioctl$VHOST_SET_LOG_BASE(r0, 0xaf01, &(0x7f0000307000)=&(0x7f0000989fff))
ioctl$VHOST_SET_MEM_TABLE(r0, 0x4008af03, &(0x7f0000000000)=ANY=[])
ioctl$VHOST_SET_VRING_ADDR(r0, 0x4028af11, &(0x7f0000df5fd8)={0x0, 0x0, &(0x7f0000000200)=""/105, &(0x7f0000bf6000)=""/228, &(0x7f0000000080)=""/199})
ioctl$VHOST_SET_VRING_ADDR(r0, 0x4028af11, &(0x7f0000cef000)={0x1, 0x0, &(0x7f000062a000)=""/167, &(0x7f0000aac000)=""/21, &(0x7f00002fdf52)=""/174})
ioctl$VHOST_VSOCK_SET_RUNNING(r0, 0x4004af61, &(0x7f0000f82ffc)=0x4001)
ioctl$VHOST_SET_MEM_TABLE(r0, 0x4008af03, &(0x7f0000000180)={0x1, 0x0, [{0x0, 0xfffffffffffffdc0, &(0x7f0000000500)=""/41}]})

2018/04/21 01:46:07 executing program 5:
mkdir(&(0x7f0000000080)='./file0\x00', 0x0)
link(&(0x7f0000f3bff8)='./file0\x00', &(0x7f00009db000)='./file1\x00')

2018/04/21 01:46:07 executing program 3:
r0 = socket$can_bcm(0x1d, 0x2, 0x2)
connect(r0, &(0x7f0000002000)=@ethernet, 0x10)
sendmsg$can_bcm(r0, &(0x7f0000000000)={&(0x7f0000004000)={0x1d}, 0x10, &(0x7f0000002ff0)={&(0x7f0000004fb8)={0x5, 0x0, 0x0, {}, {0x0, 0x7530}, {}, 0x1, @can={{}, 0x0, 0x0, 0x0, 0x0, "8e15adecfc04aba1"}}, 0x48}, 0x1}, 0x0)
sendmsg$can_bcm(r0, &(0x7f00005e4000)={&(0x7f0000000040)={0x1d}, 0x10, &(0x7f0000000080)={&(0x7f00000aef80)={0x5, 0x0, 0x0, {}, {}, {}, 0x1, @can={{}, 0x0, 0x0, 0x0, 0x0, "e2ba079c66681a29"}}, 0x48}, 0x1}, 0x0)

2018/04/21 01:46:07 executing program 0:
syz_open_procfs(0x0, &(0x7f0000000040)='ns/ipc\x00')
syz_open_procfs(0x0, &(0x7f0000000000)='ns/ipc\x00')

2018/04/21 01:46:07 executing program 3:
r0 = socket$can_bcm(0x1d, 0x2, 0x2)
connect(r0, &(0x7f0000002000)=@ethernet, 0x10)
sendmsg$can_bcm(r0, &(0x7f0000000000)={&(0x7f0000004000)={0x1d}, 0x10, &(0x7f0000002ff0)={&(0x7f0000004fb8)={0x5, 0x0, 0x0, {}, {0x0, 0x7530}, {}, 0x1, @can={{}, 0x0, 0x0, 0x0, 0x0, "8e15adecfc04aba1"}}, 0x48}, 0x1}, 0x0)
sendmsg$can_bcm(r0, &(0x7f00005e4000)={&(0x7f0000000040)={0x1d}, 0x10, &(0x7f0000000080)={&(0x7f00000aef80)={0x5, 0x0, 0x0, {}, {}, {}, 0x1, @can={{}, 0x0, 0x0, 0x0, 0x0, "e2ba079c66681a29"}}, 0x48}, 0x1}, 0x0)

2018/04/21 01:46:07 executing program 5:
mkdir(&(0x7f0000000080)='./file0\x00', 0x0)
link(&(0x7f0000f3bff8)='./file0\x00', &(0x7f00009db000)='./file1\x00')

2018/04/21 01:46:07 executing program 0:
syz_open_procfs(0x0, &(0x7f0000000040)='ns/ipc\x00')
syz_open_procfs(0x0, &(0x7f0000000000)='ns/ipc\x00')

2018/04/21 01:46:07 executing program 2:
r0 = openat$vsock(0xffffffffffffff9c, &(0x7f00001b3000)='/dev/vhost-vsock\x00', 0x2, 0x0)
ioctl$VHOST_SET_LOG_BASE(r0, 0xaf01, &(0x7f0000307000)=&(0x7f0000989fff))
ioctl$VHOST_SET_MEM_TABLE(r0, 0x4008af03, &(0x7f0000000000)=ANY=[])
ioctl$VHOST_SET_VRING_ADDR(r0, 0x4028af11, &(0x7f0000df5fd8)={0x0, 0x0, &(0x7f0000000200)=""/105, &(0x7f0000bf6000)=""/228, &(0x7f0000000080)=""/199})
ioctl$VHOST_SET_VRING_ADDR(r0, 0x4028af11, &(0x7f0000cef000)={0x1, 0x0, &(0x7f000062a000)=""/167, &(0x7f0000aac000)=""/21, &(0x7f00002fdf52)=""/174})
ioctl$VHOST_VSOCK_SET_RUNNING(r0, 0x4004af61, &(0x7f0000f82ffc)=0x4001)
ioctl$VHOST_SET_MEM_TABLE(r0, 0x4008af03, &(0x7f0000000180)={0x1, 0x0, [{0x0, 0xfffffffffffffdc0, &(0x7f0000000500)=""/41}]})

2018/04/21 01:46:07 executing program 3:
r0 = socket$can_bcm(0x1d, 0x2, 0x2)
connect(r0, &(0x7f0000002000)=@ethernet, 0x10)
sendmsg$can_bcm(r0, &(0x7f0000000000)={&(0x7f0000004000)={0x1d}, 0x10, &(0x7f0000002ff0)={&(0x7f0000004fb8)={0x5, 0x0, 0x0, {}, {0x0, 0x7530}, {}, 0x1, @can={{}, 0x0, 0x0, 0x0, 0x0, "8e15adecfc04aba1"}}, 0x48}, 0x1}, 0x0)
sendmsg$can_bcm(r0, &(0x7f00005e4000)={&(0x7f0000000040)={0x1d}, 0x10, &(0x7f0000000080)={&(0x7f00000aef80)={0x5, 0x0, 0x0, {}, {}, {}, 0x1, @can={{}, 0x0, 0x0, 0x0, 0x0, "e2ba079c66681a29"}}, 0x48}, 0x1}, 0x0)

2018/04/21 01:46:08 executing program 6:
r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ptmx\x00', 0x0, 0x0)
ioctl$TCSETS(r0, 0x5402, &(0x7f0000000500)={0x2c15c010})

2018/04/21 01:46:08 executing program 5:
mkdir(&(0x7f0000000080)='./file0\x00', 0x0)
link(&(0x7f0000f3bff8)='./file0\x00', &(0x7f00009db000)='./file1\x00')

2018/04/21 01:46:08 executing program 2:
r0 = openat$vsock(0xffffffffffffff9c, &(0x7f00001b3000)='/dev/vhost-vsock\x00', 0x2, 0x0)
ioctl$VHOST_SET_LOG_BASE(r0, 0xaf01, &(0x7f0000307000)=&(0x7f0000989fff))
ioctl$VHOST_SET_MEM_TABLE(r0, 0x4008af03, &(0x7f0000000000)=ANY=[])
ioctl$VHOST_SET_VRING_ADDR(r0, 0x4028af11, &(0x7f0000df5fd8)={0x0, 0x0, &(0x7f0000000200)=""/105, &(0x7f0000bf6000)=""/228, &(0x7f0000000080)=""/199})
ioctl$VHOST_SET_VRING_ADDR(r0, 0x4028af11, &(0x7f0000cef000)={0x1, 0x0, &(0x7f000062a000)=""/167, &(0x7f0000aac000)=""/21, &(0x7f00002fdf52)=""/174})
ioctl$VHOST_VSOCK_SET_RUNNING(r0, 0x4004af61, &(0x7f0000f82ffc)=0x4001)
ioctl$VHOST_SET_MEM_TABLE(r0, 0x4008af03, &(0x7f0000000180)={0x1, 0x0, [{0x0, 0xfffffffffffffdc0, &(0x7f0000000500)=""/41}]})

2018/04/21 01:46:08 executing program 3:
r0 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vhost-vsock\x00', 0x2, 0x0)
ppoll(&(0x7f0000000080)=[{r0, 0x475}], 0x1, &(0x7f0000000040)={0x77359400}, &(0x7f0000000040)={0x7fffffffffffffff}, 0x8)

2018/04/21 01:46:08 executing program 1:
bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000040)={0xffffffffffffffff, &(0x7f00000000c0)="b82283392dc50ff1fb635a5849d2f5916ae2fdc24e95e12aa8daccf7393e72be9cc66f"}, 0x10)
bpf$MAP_CREATE(0x0, &(0x7f0000346fd4)={0x0, 0x0, 0x0, 0x4, 0x146}, 0x2c)
r0 = bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x1, 0x5, &(0x7f0000346fc8)=@framed={{0x18}, [@alu={0x8000000201a7f19, 0x0, 0x7, 0x0, 0x1}], {0x95}}, &(0x7f0000f6bffb)='GPL\x00', 0x0, 0x299, &(0x7f00001a7f05)=""/251}, 0x18)
bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000140)={r0, 0x50, &(0x7f00000000c0)}, 0x10)
socketpair$inet(0xe, 0x0, 0x9, &(0x7f0000000180))

2018/04/21 01:46:08 executing program 4:
socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, <r0=>0xffffffffffffffff})
sendmsg(r0, &(0x7f0000e91000)={0x0, 0x0, &(0x7f0000000040), 0x0, &(0x7f00000000c0)=[{0x18, 0x1000000000000001, 0x1, "13"}], 0x18}, 0x0)

2018/04/21 01:46:08 executing program 0:
syz_mount_image$ntfs(&(0x7f0000000040)='ntfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f00000007c0)=[{&(0x7f00000004c0), 0x0, 0x7110}], 0x0, &(0x7f0000000240)={[{@errors_recover='errors=recover', 0x2c}, {@gid={'gid', 0x3d, [0x38, 0x0]}, 0x2c}]})

2018/04/21 01:46:08 executing program 7:
r0 = syz_open_dev$sg(&(0x7f0000005000)='/dev/sg#\x00', 0x0, 0x8002)
write(r0, &(0x7f0000bfa000)="b6d3b85e1e8d225db3f3b29d7300000005cc796aed5ed2bc7018ce2c9b97ae21914d870000ffffbc9b16", 0x2a)
write(r0, &(0x7f0000e8efa7)="dbef803e3d9f5de1e52055bb7c8a326fe46092b6682d9ad789c5d7acad0e771f13d8cb59029b011ded54a09c41c6cfcfbcd743cc665c32af223d42438b496a0304891c88697aff07d4a70f330e6fe3a1c9c76f314ffab329", 0x58)
writev(r0, &(0x7f00001b6f90)=[{&(0x7f0000000040)="e59bc053050000007bb51f597ea6feb27c6371100ca6f5c53ded1a2f0fd1c92c1f8082d61217feadb3af", 0x2a}], 0x1)
read(r0, &(0x7f0000000300)=""/150, 0x96)

2018/04/21 01:46:08 executing program 3:
r0 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vhost-vsock\x00', 0x2, 0x0)
ppoll(&(0x7f0000000080)=[{r0, 0x475}], 0x1, &(0x7f0000000040)={0x77359400}, &(0x7f0000000040)={0x7fffffffffffffff}, 0x8)

[   78.337399] ntfs: (device loop0): read_ntfs_boot_sector(): Primary boot sector is invalid.
2018/04/21 01:46:08 executing program 4:
socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, <r0=>0xffffffffffffffff})
sendmsg(r0, &(0x7f0000e91000)={0x0, 0x0, &(0x7f0000000040), 0x0, &(0x7f00000000c0)=[{0x18, 0x1000000000000001, 0x1, "13"}], 0x18}, 0x0)

2018/04/21 01:46:08 executing program 5:
r0 = syz_open_procfs(0x0, &(0x7f000060c000)='auxv\x00')
read$eventfd(r0, &(0x7f0000000080), 0x8)

2018/04/21 01:46:08 executing program 6:
r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ptmx\x00', 0x0, 0x0)
ioctl$TCSETS(r0, 0x5402, &(0x7f0000000500)={0x2c15c010})

2018/04/21 01:46:08 executing program 2:
r0 = openat$vsock(0xffffffffffffff9c, &(0x7f00001b3000)='/dev/vhost-vsock\x00', 0x2, 0x0)
ioctl$VHOST_SET_LOG_BASE(r0, 0xaf01, &(0x7f0000307000)=&(0x7f0000989fff))
ioctl$VHOST_SET_MEM_TABLE(r0, 0x4008af03, &(0x7f0000000000)=ANY=[])
ioctl$VHOST_SET_VRING_ADDR(r0, 0x4028af11, &(0x7f0000df5fd8)={0x0, 0x0, &(0x7f0000000200)=""/105, &(0x7f0000bf6000)=""/228, &(0x7f0000000080)=""/199})
ioctl$VHOST_SET_VRING_ADDR(r0, 0x4028af11, &(0x7f0000cef000)={0x1, 0x0, &(0x7f000062a000)=""/167, &(0x7f0000aac000)=""/21, &(0x7f00002fdf52)=""/174})
ioctl$VHOST_VSOCK_SET_RUNNING(r0, 0x4004af61, &(0x7f0000f82ffc)=0x4001)
ioctl$VHOST_SET_MEM_TABLE(r0, 0x4008af03, &(0x7f0000000180)={0x1, 0x0, [{0x0, 0xfffffffffffffdc0, &(0x7f0000000500)=""/41}]})

2018/04/21 01:46:08 executing program 1:
bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000040)={0xffffffffffffffff, &(0x7f00000000c0)="b82283392dc50ff1fb635a5849d2f5916ae2fdc24e95e12aa8daccf7393e72be9cc66f"}, 0x10)
bpf$MAP_CREATE(0x0, &(0x7f0000346fd4)={0x0, 0x0, 0x0, 0x4, 0x146}, 0x2c)
r0 = bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x1, 0x5, &(0x7f0000346fc8)=@framed={{0x18}, [@alu={0x8000000201a7f19, 0x0, 0x7, 0x0, 0x1}], {0x95}}, &(0x7f0000f6bffb)='GPL\x00', 0x0, 0x299, &(0x7f00001a7f05)=""/251}, 0x18)
bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000140)={r0, 0x50, &(0x7f00000000c0)}, 0x10)
socketpair$inet(0xe, 0x0, 0x9, &(0x7f0000000180))

[   78.427636] ntfs: (device loop0): read_ntfs_boot_sector(): Could not find a valid backup boot sector.
[   78.437096] ntfs: (device loop0): ntfs_fill_super(): Not an NTFS volume.
2018/04/21 01:46:08 executing program 7:
r0 = syz_open_dev$sg(&(0x7f0000005000)='/dev/sg#\x00', 0x0, 0x8002)
write(r0, &(0x7f0000bfa000)="b6d3b85e1e8d225db3f3b29d7300000005cc796aed5ed2bc7018ce2c9b97ae21914d870000ffffbc9b16", 0x2a)
write(r0, &(0x7f0000e8efa7)="dbef803e3d9f5de1e52055bb7c8a326fe46092b6682d9ad789c5d7acad0e771f13d8cb59029b011ded54a09c41c6cfcfbcd743cc665c32af223d42438b496a0304891c88697aff07d4a70f330e6fe3a1c9c76f314ffab329", 0x58)
writev(r0, &(0x7f00001b6f90)=[{&(0x7f0000000040)="e59bc053050000007bb51f597ea6feb27c6371100ca6f5c53ded1a2f0fd1c92c1f8082d61217feadb3af", 0x2a}], 0x1)
read(r0, &(0x7f0000000300)=""/150, 0x96)

2018/04/21 01:46:08 executing program 4:
socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, <r0=>0xffffffffffffffff})
sendmsg(r0, &(0x7f0000e91000)={0x0, 0x0, &(0x7f0000000040), 0x0, &(0x7f00000000c0)=[{0x18, 0x1000000000000001, 0x1, "13"}], 0x18}, 0x0)

2018/04/21 01:46:08 executing program 5:
r0 = syz_open_procfs(0x0, &(0x7f000060c000)='auxv\x00')
read$eventfd(r0, &(0x7f0000000080), 0x8)

2018/04/21 01:46:08 executing program 3:
r0 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vhost-vsock\x00', 0x2, 0x0)
ppoll(&(0x7f0000000080)=[{r0, 0x475}], 0x1, &(0x7f0000000040)={0x77359400}, &(0x7f0000000040)={0x7fffffffffffffff}, 0x8)

2018/04/21 01:46:08 executing program 6:
r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ptmx\x00', 0x0, 0x0)
ioctl$TCSETS(r0, 0x5402, &(0x7f0000000500)={0x2c15c010})

[   78.586711] ntfs: (device loop0): read_ntfs_boot_sector(): Primary boot sector is invalid.
[   78.659744] ntfs: (device loop0): read_ntfs_boot_sector(): Could not find a valid backup boot sector.
[   78.669586] ntfs: (device loop0): ntfs_fill_super(): Not an NTFS volume.
2018/04/21 01:46:08 executing program 1:
bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000040)={0xffffffffffffffff, &(0x7f00000000c0)="b82283392dc50ff1fb635a5849d2f5916ae2fdc24e95e12aa8daccf7393e72be9cc66f"}, 0x10)
bpf$MAP_CREATE(0x0, &(0x7f0000346fd4)={0x0, 0x0, 0x0, 0x4, 0x146}, 0x2c)
r0 = bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x1, 0x5, &(0x7f0000346fc8)=@framed={{0x18}, [@alu={0x8000000201a7f19, 0x0, 0x7, 0x0, 0x1}], {0x95}}, &(0x7f0000f6bffb)='GPL\x00', 0x0, 0x299, &(0x7f00001a7f05)=""/251}, 0x18)
bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000140)={r0, 0x50, &(0x7f00000000c0)}, 0x10)
socketpair$inet(0xe, 0x0, 0x9, &(0x7f0000000180))

2018/04/21 01:46:08 executing program 2:
r0 = syz_open_procfs(0x0, &(0x7f000060c000)='auxv\x00')
read$eventfd(r0, &(0x7f0000000080), 0x8)

2018/04/21 01:46:08 executing program 7:
r0 = syz_open_dev$sg(&(0x7f0000005000)='/dev/sg#\x00', 0x0, 0x8002)
write(r0, &(0x7f0000bfa000)="b6d3b85e1e8d225db3f3b29d7300000005cc796aed5ed2bc7018ce2c9b97ae21914d870000ffffbc9b16", 0x2a)
write(r0, &(0x7f0000e8efa7)="dbef803e3d9f5de1e52055bb7c8a326fe46092b6682d9ad789c5d7acad0e771f13d8cb59029b011ded54a09c41c6cfcfbcd743cc665c32af223d42438b496a0304891c88697aff07d4a70f330e6fe3a1c9c76f314ffab329", 0x58)
writev(r0, &(0x7f00001b6f90)=[{&(0x7f0000000040)="e59bc053050000007bb51f597ea6feb27c6371100ca6f5c53ded1a2f0fd1c92c1f8082d61217feadb3af", 0x2a}], 0x1)
read(r0, &(0x7f0000000300)=""/150, 0x96)

2018/04/21 01:46:08 executing program 3:
r0 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vhost-vsock\x00', 0x2, 0x0)
ppoll(&(0x7f0000000080)=[{r0, 0x475}], 0x1, &(0x7f0000000040)={0x77359400}, &(0x7f0000000040)={0x7fffffffffffffff}, 0x8)

2018/04/21 01:46:08 executing program 4:
socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, <r0=>0xffffffffffffffff})
sendmsg(r0, &(0x7f0000e91000)={0x0, 0x0, &(0x7f0000000040), 0x0, &(0x7f00000000c0)=[{0x18, 0x1000000000000001, 0x1, "13"}], 0x18}, 0x0)

2018/04/21 01:46:08 executing program 0:
syz_mount_image$ntfs(&(0x7f0000000040)='ntfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f00000007c0)=[{&(0x7f00000004c0), 0x0, 0x7110}], 0x0, &(0x7f0000000240)={[{@errors_recover='errors=recover', 0x2c}, {@gid={'gid', 0x3d, [0x38, 0x0]}, 0x2c}]})

2018/04/21 01:46:08 executing program 5:
r0 = syz_open_procfs(0x0, &(0x7f000060c000)='auxv\x00')
read$eventfd(r0, &(0x7f0000000080), 0x8)

2018/04/21 01:46:08 executing program 6:
r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ptmx\x00', 0x0, 0x0)
ioctl$TCSETS(r0, 0x5402, &(0x7f0000000500)={0x2c15c010})

2018/04/21 01:46:08 executing program 5:
r0 = syz_open_procfs(0x0, &(0x7f000060c000)='auxv\x00')
read$eventfd(r0, &(0x7f0000000080), 0x8)

2018/04/21 01:46:08 executing program 3:
perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xffffffffffffffff}, 0x200000400, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
r0 = getgid()
getgroups(0x40000000000001f9, &(0x7f0000000000)=[0xffffffffffffffff, <r1=>0xffffffffffffffff, r0, 0xffffffffffffffff, 0xffffffffffffffff, r0])
setgid(r1)
mknod$loop(&(0x7f0000683000)='./file0\x00', 0x0, 0xffffffffffffffff)
mount(&(0x7f0000144000)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f0000bd2ffc)='nfs\x00', 0x0, &(0x7f000000a000))
kexec_load(0x8, 0x2, &(0x7f0000000380)=[{&(0x7f0000000180)="e15da901e33c1d85367cacfed2bb91a2c58223096276ce7531561628f55e4047be607360328d955994b594c35d2d632fc9255ee95682c4474cbee78544bfdae83b88308abbfaa0eb6c58c9186dfe86312d63286554a1c2ba8dfe69e864a26a365a7b06c0c6e4769da53be5fe0f924fbfff3e527f1391f1e5a43bb0ab3b03ad952280355d4bf28b56e171fdcf8a8b9d2f2136bdcb0e25da6cad312c33b8a594aebee87c28a4a1ab3669e841526a3b56ab85735b96a79e9d893cf7ca417af614c6a917c992a58a8d695d42e79da3866012da1ccfbfaeb553", 0xd7, 0x3, 0x100000001}, {&(0x7f0000000340)="ef3dd61a50d8bc1a15391aca0fc947db3ac2996654ce15807a0dd73b27eace95", 0x20, 0x3, 0x1000}], 0xa0000)
r2 = syz_open_dev$admmidi(&(0x7f0000000040)='/dev/admmidi#\x00', 0x10001, 0x80000)
getsockopt$inet6_int(r2, 0x29, 0x3f, &(0x7f00000000c0), &(0x7f0000000100)=0x4)
setsockopt$inet6_tcp_TCP_FASTOPEN_KEY(r2, 0x6, 0x21, &(0x7f0000000080)="ffce1c1c39748e05f45c1d50a4dba670", 0x10)
ioctl$KVM_ASSIGN_PCI_DEVICE(r2, 0x8040ae69, &(0x7f0000000140)={0x7, 0x4e2, 0x6, 0x6, 0x8})

2018/04/21 01:46:08 executing program 6:
pipe2(&(0x7f0000000000)={<r0=>0xffffffffffffffff, <r1=>0xffffffffffffffff}, 0x0)
r2 = epoll_create1(0x0)
epoll_ctl$EPOLL_CTL_ADD(r2, 0x1, r0, &(0x7f000000a000))
close(r1)

2018/04/21 01:46:08 executing program 2:
r0 = syz_open_procfs(0x0, &(0x7f000060c000)='auxv\x00')
read$eventfd(r0, &(0x7f0000000080), 0x8)

2018/04/21 01:46:08 executing program 4:
r0 = memfd_create(&(0x7f0000813ffa)='ramfs\x00', 0x0)
ioctl$TCSETA(r0, 0x4030582a, &(0x7f0000000000)={0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20})

2018/04/21 01:46:08 executing program 1:
bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000040)={0xffffffffffffffff, &(0x7f00000000c0)="b82283392dc50ff1fb635a5849d2f5916ae2fdc24e95e12aa8daccf7393e72be9cc66f"}, 0x10)
bpf$MAP_CREATE(0x0, &(0x7f0000346fd4)={0x0, 0x0, 0x0, 0x4, 0x146}, 0x2c)
r0 = bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x1, 0x5, &(0x7f0000346fc8)=@framed={{0x18}, [@alu={0x8000000201a7f19, 0x0, 0x7, 0x0, 0x1}], {0x95}}, &(0x7f0000f6bffb)='GPL\x00', 0x0, 0x299, &(0x7f00001a7f05)=""/251}, 0x18)
bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000140)={r0, 0x50, &(0x7f00000000c0)}, 0x10)
socketpair$inet(0xe, 0x0, 0x9, &(0x7f0000000180))

2018/04/21 01:46:08 executing program 7:
r0 = syz_open_dev$sg(&(0x7f0000005000)='/dev/sg#\x00', 0x0, 0x8002)
write(r0, &(0x7f0000bfa000)="b6d3b85e1e8d225db3f3b29d7300000005cc796aed5ed2bc7018ce2c9b97ae21914d870000ffffbc9b16", 0x2a)
write(r0, &(0x7f0000e8efa7)="dbef803e3d9f5de1e52055bb7c8a326fe46092b6682d9ad789c5d7acad0e771f13d8cb59029b011ded54a09c41c6cfcfbcd743cc665c32af223d42438b496a0304891c88697aff07d4a70f330e6fe3a1c9c76f314ffab329", 0x58)
writev(r0, &(0x7f00001b6f90)=[{&(0x7f0000000040)="e59bc053050000007bb51f597ea6feb27c6371100ca6f5c53ded1a2f0fd1c92c1f8082d61217feadb3af", 0x2a}], 0x1)
read(r0, &(0x7f0000000300)=""/150, 0x96)

[   78.844166] ntfs: (device loop0): read_ntfs_boot_sector(): Primary boot sector is invalid.
2018/04/21 01:46:09 executing program 5:
r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000200)="2e2f6367726f7570000478d081", 0x200002, 0x0)
r1 = openat$cgroup_int(r0, &(0x7f00000001c0)='pids.max\x00', 0x2, 0x0)
read(r1, &(0x7f0000000040)=""/239, 0xef)
write$cgroup_int(r1, &(0x7f0000000040), 0x1e4)

[   78.972894] ntfs: (device loop0): read_ntfs_boot_sector(): Could not find a valid backup boot sector.
[   78.982427] ntfs: (device loop0): ntfs_fill_super(): Not an NTFS volume.
2018/04/21 01:46:09 executing program 6:
pipe2(&(0x7f0000000000)={<r0=>0xffffffffffffffff, <r1=>0xffffffffffffffff}, 0x0)
r2 = epoll_create1(0x0)
epoll_ctl$EPOLL_CTL_ADD(r2, 0x1, r0, &(0x7f000000a000))
close(r1)

2018/04/21 01:46:09 executing program 2:
r0 = syz_open_procfs(0x0, &(0x7f000060c000)='auxv\x00')
read$eventfd(r0, &(0x7f0000000080), 0x8)

2018/04/21 01:46:09 executing program 1:
mremap(&(0x7f0000001000/0xc00000)=nil, 0xc00000, 0x7ffffffff000, 0x3, &(0x7f0000c87000/0x2000)=nil)

2018/04/21 01:46:09 executing program 4:
r0 = memfd_create(&(0x7f0000813ffa)='ramfs\x00', 0x0)
ioctl$TCSETA(r0, 0x4030582a, &(0x7f0000000000)={0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20})

2018/04/21 01:46:09 executing program 3:
perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xffffffffffffffff}, 0x200000400, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
r0 = getgid()
getgroups(0x40000000000001f9, &(0x7f0000000000)=[0xffffffffffffffff, <r1=>0xffffffffffffffff, r0, 0xffffffffffffffff, 0xffffffffffffffff, r0])
setgid(r1)
mknod$loop(&(0x7f0000683000)='./file0\x00', 0x0, 0xffffffffffffffff)
mount(&(0x7f0000144000)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f0000bd2ffc)='nfs\x00', 0x0, &(0x7f000000a000))
kexec_load(0x8, 0x2, &(0x7f0000000380)=[{&(0x7f0000000180)="e15da901e33c1d85367cacfed2bb91a2c58223096276ce7531561628f55e4047be607360328d955994b594c35d2d632fc9255ee95682c4474cbee78544bfdae83b88308abbfaa0eb6c58c9186dfe86312d63286554a1c2ba8dfe69e864a26a365a7b06c0c6e4769da53be5fe0f924fbfff3e527f1391f1e5a43bb0ab3b03ad952280355d4bf28b56e171fdcf8a8b9d2f2136bdcb0e25da6cad312c33b8a594aebee87c28a4a1ab3669e841526a3b56ab85735b96a79e9d893cf7ca417af614c6a917c992a58a8d695d42e79da3866012da1ccfbfaeb553", 0xd7, 0x3, 0x100000001}, {&(0x7f0000000340)="ef3dd61a50d8bc1a15391aca0fc947db3ac2996654ce15807a0dd73b27eace95", 0x20, 0x3, 0x1000}], 0xa0000)
r2 = syz_open_dev$admmidi(&(0x7f0000000040)='/dev/admmidi#\x00', 0x10001, 0x80000)
getsockopt$inet6_int(r2, 0x29, 0x3f, &(0x7f00000000c0), &(0x7f0000000100)=0x4)
setsockopt$inet6_tcp_TCP_FASTOPEN_KEY(r2, 0x6, 0x21, &(0x7f0000000080)="ffce1c1c39748e05f45c1d50a4dba670", 0x10)
ioctl$KVM_ASSIGN_PCI_DEVICE(r2, 0x8040ae69, &(0x7f0000000140)={0x7, 0x4e2, 0x6, 0x6, 0x8})

2018/04/21 01:46:09 executing program 7:
perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xffffffffffffffff}, 0x200000400, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
r0 = getgid()
getgroups(0x40000000000001f9, &(0x7f0000000000)=[0xffffffffffffffff, <r1=>0xffffffffffffffff, r0, 0xffffffffffffffff, 0xffffffffffffffff, r0])
setgid(r1)
mknod$loop(&(0x7f0000683000)='./file0\x00', 0x0, 0xffffffffffffffff)
mount(&(0x7f0000144000)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f0000bd2ffc)='nfs\x00', 0x0, &(0x7f000000a000))
kexec_load(0x8, 0x2, &(0x7f0000000380)=[{&(0x7f0000000180)="e15da901e33c1d85367cacfed2bb91a2c58223096276ce7531561628f55e4047be607360328d955994b594c35d2d632fc9255ee95682c4474cbee78544bfdae83b88308abbfaa0eb6c58c9186dfe86312d63286554a1c2ba8dfe69e864a26a365a7b06c0c6e4769da53be5fe0f924fbfff3e527f1391f1e5a43bb0ab3b03ad952280355d4bf28b56e171fdcf8a8b9d2f2136bdcb0e25da6cad312c33b8a594aebee87c28a4a1ab3669e841526a3b56ab85735b96a79e9d893cf7ca417af614c6a917c992a58a8d695d42e79da3866012da1ccfbfaeb553", 0xd7, 0x3, 0x100000001}, {&(0x7f0000000340)="ef3dd61a50d8bc1a15391aca0fc947db3ac2996654ce15807a0dd73b27eace95", 0x20, 0x3, 0x1000}], 0xa0000)
r2 = syz_open_dev$admmidi(&(0x7f0000000040)='/dev/admmidi#\x00', 0x10001, 0x80000)
getsockopt$inet6_int(r2, 0x29, 0x3f, &(0x7f00000000c0), &(0x7f0000000100)=0x4)
setsockopt$inet6_tcp_TCP_FASTOPEN_KEY(r2, 0x6, 0x21, &(0x7f0000000080)="ffce1c1c39748e05f45c1d50a4dba670", 0x10)
ioctl$KVM_ASSIGN_PCI_DEVICE(r2, 0x8040ae69, &(0x7f0000000140)={0x7, 0x4e2, 0x6, 0x6, 0x8})

2018/04/21 01:46:09 executing program 0:
syz_mount_image$ntfs(&(0x7f0000000040)='ntfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f00000007c0)=[{&(0x7f00000004c0), 0x0, 0x7110}], 0x0, &(0x7f0000000240)={[{@errors_recover='errors=recover', 0x2c}, {@gid={'gid', 0x3d, [0x38, 0x0]}, 0x2c}]})

2018/04/21 01:46:09 executing program 5:
r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000200)="2e2f6367726f7570000478d081", 0x200002, 0x0)
r1 = openat$cgroup_int(r0, &(0x7f00000001c0)='pids.max\x00', 0x2, 0x0)
read(r1, &(0x7f0000000040)=""/239, 0xef)
write$cgroup_int(r1, &(0x7f0000000040), 0x1e4)

2018/04/21 01:46:09 executing program 2:
r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000200)="2e2f6367726f7570000478d081", 0x200002, 0x0)
r1 = openat$cgroup_int(r0, &(0x7f00000001c0)='pids.max\x00', 0x2, 0x0)
read(r1, &(0x7f0000000040)=""/239, 0xef)
write$cgroup_int(r1, &(0x7f0000000040), 0x1e4)

2018/04/21 01:46:09 executing program 5:
r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000200)="2e2f6367726f7570000478d081", 0x200002, 0x0)
r1 = openat$cgroup_int(r0, &(0x7f00000001c0)='pids.max\x00', 0x2, 0x0)
read(r1, &(0x7f0000000040)=""/239, 0xef)
write$cgroup_int(r1, &(0x7f0000000040), 0x1e4)

2018/04/21 01:46:09 executing program 1:
mremap(&(0x7f0000001000/0xc00000)=nil, 0xc00000, 0x7ffffffff000, 0x3, &(0x7f0000c87000/0x2000)=nil)

2018/04/21 01:46:09 executing program 4:
r0 = memfd_create(&(0x7f0000813ffa)='ramfs\x00', 0x0)
ioctl$TCSETA(r0, 0x4030582a, &(0x7f0000000000)={0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20})

2018/04/21 01:46:09 executing program 6:
pipe2(&(0x7f0000000000)={<r0=>0xffffffffffffffff, <r1=>0xffffffffffffffff}, 0x0)
r2 = epoll_create1(0x0)
epoll_ctl$EPOLL_CTL_ADD(r2, 0x1, r0, &(0x7f000000a000))
close(r1)

2018/04/21 01:46:09 executing program 3:
perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xffffffffffffffff}, 0x200000400, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
r0 = getgid()
getgroups(0x40000000000001f9, &(0x7f0000000000)=[0xffffffffffffffff, <r1=>0xffffffffffffffff, r0, 0xffffffffffffffff, 0xffffffffffffffff, r0])
setgid(r1)
mknod$loop(&(0x7f0000683000)='./file0\x00', 0x0, 0xffffffffffffffff)
mount(&(0x7f0000144000)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f0000bd2ffc)='nfs\x00', 0x0, &(0x7f000000a000))
kexec_load(0x8, 0x2, &(0x7f0000000380)=[{&(0x7f0000000180)="e15da901e33c1d85367cacfed2bb91a2c58223096276ce7531561628f55e4047be607360328d955994b594c35d2d632fc9255ee95682c4474cbee78544bfdae83b88308abbfaa0eb6c58c9186dfe86312d63286554a1c2ba8dfe69e864a26a365a7b06c0c6e4769da53be5fe0f924fbfff3e527f1391f1e5a43bb0ab3b03ad952280355d4bf28b56e171fdcf8a8b9d2f2136bdcb0e25da6cad312c33b8a594aebee87c28a4a1ab3669e841526a3b56ab85735b96a79e9d893cf7ca417af614c6a917c992a58a8d695d42e79da3866012da1ccfbfaeb553", 0xd7, 0x3, 0x100000001}, {&(0x7f0000000340)="ef3dd61a50d8bc1a15391aca0fc947db3ac2996654ce15807a0dd73b27eace95", 0x20, 0x3, 0x1000}], 0xa0000)
r2 = syz_open_dev$admmidi(&(0x7f0000000040)='/dev/admmidi#\x00', 0x10001, 0x80000)
getsockopt$inet6_int(r2, 0x29, 0x3f, &(0x7f00000000c0), &(0x7f0000000100)=0x4)
setsockopt$inet6_tcp_TCP_FASTOPEN_KEY(r2, 0x6, 0x21, &(0x7f0000000080)="ffce1c1c39748e05f45c1d50a4dba670", 0x10)
ioctl$KVM_ASSIGN_PCI_DEVICE(r2, 0x8040ae69, &(0x7f0000000140)={0x7, 0x4e2, 0x6, 0x6, 0x8})

[   79.244760] ntfs: (device loop0): read_ntfs_boot_sector(): Primary boot sector is invalid.
2018/04/21 01:46:09 executing program 7:
perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xffffffffffffffff}, 0x200000400, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
r0 = getgid()
getgroups(0x40000000000001f9, &(0x7f0000000000)=[0xffffffffffffffff, <r1=>0xffffffffffffffff, r0, 0xffffffffffffffff, 0xffffffffffffffff, r0])
setgid(r1)
mknod$loop(&(0x7f0000683000)='./file0\x00', 0x0, 0xffffffffffffffff)
mount(&(0x7f0000144000)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f0000bd2ffc)='nfs\x00', 0x0, &(0x7f000000a000))
kexec_load(0x8, 0x2, &(0x7f0000000380)=[{&(0x7f0000000180)="e15da901e33c1d85367cacfed2bb91a2c58223096276ce7531561628f55e4047be607360328d955994b594c35d2d632fc9255ee95682c4474cbee78544bfdae83b88308abbfaa0eb6c58c9186dfe86312d63286554a1c2ba8dfe69e864a26a365a7b06c0c6e4769da53be5fe0f924fbfff3e527f1391f1e5a43bb0ab3b03ad952280355d4bf28b56e171fdcf8a8b9d2f2136bdcb0e25da6cad312c33b8a594aebee87c28a4a1ab3669e841526a3b56ab85735b96a79e9d893cf7ca417af614c6a917c992a58a8d695d42e79da3866012da1ccfbfaeb553", 0xd7, 0x3, 0x100000001}, {&(0x7f0000000340)="ef3dd61a50d8bc1a15391aca0fc947db3ac2996654ce15807a0dd73b27eace95", 0x20, 0x3, 0x1000}], 0xa0000)
r2 = syz_open_dev$admmidi(&(0x7f0000000040)='/dev/admmidi#\x00', 0x10001, 0x80000)
getsockopt$inet6_int(r2, 0x29, 0x3f, &(0x7f00000000c0), &(0x7f0000000100)=0x4)
setsockopt$inet6_tcp_TCP_FASTOPEN_KEY(r2, 0x6, 0x21, &(0x7f0000000080)="ffce1c1c39748e05f45c1d50a4dba670", 0x10)
ioctl$KVM_ASSIGN_PCI_DEVICE(r2, 0x8040ae69, &(0x7f0000000140)={0x7, 0x4e2, 0x6, 0x6, 0x8})

2018/04/21 01:46:09 executing program 2:
r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000200)="2e2f6367726f7570000478d081", 0x200002, 0x0)
r1 = openat$cgroup_int(r0, &(0x7f00000001c0)='pids.max\x00', 0x2, 0x0)
read(r1, &(0x7f0000000040)=""/239, 0xef)
write$cgroup_int(r1, &(0x7f0000000040), 0x1e4)

2018/04/21 01:46:09 executing program 5:
r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000200)="2e2f6367726f7570000478d081", 0x200002, 0x0)
r1 = openat$cgroup_int(r0, &(0x7f00000001c0)='pids.max\x00', 0x2, 0x0)
read(r1, &(0x7f0000000040)=""/239, 0xef)
write$cgroup_int(r1, &(0x7f0000000040), 0x1e4)

2018/04/21 01:46:09 executing program 1:
mremap(&(0x7f0000001000/0xc00000)=nil, 0xc00000, 0x7ffffffff000, 0x3, &(0x7f0000c87000/0x2000)=nil)

2018/04/21 01:46:09 executing program 0:
syz_mount_image$ntfs(&(0x7f0000000040)='ntfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f00000007c0)=[{&(0x7f00000004c0), 0x0, 0x7110}], 0x0, &(0x7f0000000240)={[{@errors_recover='errors=recover', 0x2c}, {@gid={'gid', 0x3d, [0x38, 0x0]}, 0x2c}]})

2018/04/21 01:46:09 executing program 6:
pipe2(&(0x7f0000000000)={<r0=>0xffffffffffffffff, <r1=>0xffffffffffffffff}, 0x0)
r2 = epoll_create1(0x0)
epoll_ctl$EPOLL_CTL_ADD(r2, 0x1, r0, &(0x7f000000a000))
close(r1)

2018/04/21 01:46:09 executing program 4:
r0 = memfd_create(&(0x7f0000813ffa)='ramfs\x00', 0x0)
ioctl$TCSETA(r0, 0x4030582a, &(0x7f0000000000)={0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20})

2018/04/21 01:46:09 executing program 3:
perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xffffffffffffffff}, 0x200000400, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
r0 = getgid()
getgroups(0x40000000000001f9, &(0x7f0000000000)=[0xffffffffffffffff, <r1=>0xffffffffffffffff, r0, 0xffffffffffffffff, 0xffffffffffffffff, r0])
setgid(r1)
mknod$loop(&(0x7f0000683000)='./file0\x00', 0x0, 0xffffffffffffffff)
mount(&(0x7f0000144000)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f0000bd2ffc)='nfs\x00', 0x0, &(0x7f000000a000))
kexec_load(0x8, 0x2, &(0x7f0000000380)=[{&(0x7f0000000180)="e15da901e33c1d85367cacfed2bb91a2c58223096276ce7531561628f55e4047be607360328d955994b594c35d2d632fc9255ee95682c4474cbee78544bfdae83b88308abbfaa0eb6c58c9186dfe86312d63286554a1c2ba8dfe69e864a26a365a7b06c0c6e4769da53be5fe0f924fbfff3e527f1391f1e5a43bb0ab3b03ad952280355d4bf28b56e171fdcf8a8b9d2f2136bdcb0e25da6cad312c33b8a594aebee87c28a4a1ab3669e841526a3b56ab85735b96a79e9d893cf7ca417af614c6a917c992a58a8d695d42e79da3866012da1ccfbfaeb553", 0xd7, 0x3, 0x100000001}, {&(0x7f0000000340)="ef3dd61a50d8bc1a15391aca0fc947db3ac2996654ce15807a0dd73b27eace95", 0x20, 0x3, 0x1000}], 0xa0000)
r2 = syz_open_dev$admmidi(&(0x7f0000000040)='/dev/admmidi#\x00', 0x10001, 0x80000)
getsockopt$inet6_int(r2, 0x29, 0x3f, &(0x7f00000000c0), &(0x7f0000000100)=0x4)
setsockopt$inet6_tcp_TCP_FASTOPEN_KEY(r2, 0x6, 0x21, &(0x7f0000000080)="ffce1c1c39748e05f45c1d50a4dba670", 0x10)
ioctl$KVM_ASSIGN_PCI_DEVICE(r2, 0x8040ae69, &(0x7f0000000140)={0x7, 0x4e2, 0x6, 0x6, 0x8})

2018/04/21 01:46:09 executing program 5:
perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xffffffffffffffff}, 0x200000400, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
r0 = getgid()
getgroups(0x40000000000001f9, &(0x7f0000000000)=[0xffffffffffffffff, <r1=>0xffffffffffffffff, r0, 0xffffffffffffffff, 0xffffffffffffffff, r0])
setgid(r1)
mknod$loop(&(0x7f0000683000)='./file0\x00', 0x0, 0xffffffffffffffff)
mount(&(0x7f0000144000)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f0000bd2ffc)='nfs\x00', 0x0, &(0x7f000000a000))
kexec_load(0x8, 0x2, &(0x7f0000000380)=[{&(0x7f0000000180)="e15da901e33c1d85367cacfed2bb91a2c58223096276ce7531561628f55e4047be607360328d955994b594c35d2d632fc9255ee95682c4474cbee78544bfdae83b88308abbfaa0eb6c58c9186dfe86312d63286554a1c2ba8dfe69e864a26a365a7b06c0c6e4769da53be5fe0f924fbfff3e527f1391f1e5a43bb0ab3b03ad952280355d4bf28b56e171fdcf8a8b9d2f2136bdcb0e25da6cad312c33b8a594aebee87c28a4a1ab3669e841526a3b56ab85735b96a79e9d893cf7ca417af614c6a917c992a58a8d695d42e79da3866012da1ccfbfaeb553", 0xd7, 0x3, 0x100000001}, {&(0x7f0000000340)="ef3dd61a50d8bc1a15391aca0fc947db3ac2996654ce15807a0dd73b27eace95", 0x20, 0x3, 0x1000}], 0xa0000)
r2 = syz_open_dev$admmidi(&(0x7f0000000040)='/dev/admmidi#\x00', 0x10001, 0x80000)
getsockopt$inet6_int(r2, 0x29, 0x3f, &(0x7f00000000c0), &(0x7f0000000100)=0x4)
setsockopt$inet6_tcp_TCP_FASTOPEN_KEY(r2, 0x6, 0x21, &(0x7f0000000080)="ffce1c1c39748e05f45c1d50a4dba670", 0x10)
ioctl$KVM_ASSIGN_PCI_DEVICE(r2, 0x8040ae69, &(0x7f0000000140)={0x7, 0x4e2, 0x6, 0x6, 0x8})

2018/04/21 01:46:09 executing program 7:
perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xffffffffffffffff}, 0x200000400, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
r0 = getgid()
getgroups(0x40000000000001f9, &(0x7f0000000000)=[0xffffffffffffffff, <r1=>0xffffffffffffffff, r0, 0xffffffffffffffff, 0xffffffffffffffff, r0])
setgid(r1)
mknod$loop(&(0x7f0000683000)='./file0\x00', 0x0, 0xffffffffffffffff)
mount(&(0x7f0000144000)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f0000bd2ffc)='nfs\x00', 0x0, &(0x7f000000a000))
kexec_load(0x8, 0x2, &(0x7f0000000380)=[{&(0x7f0000000180)="e15da901e33c1d85367cacfed2bb91a2c58223096276ce7531561628f55e4047be607360328d955994b594c35d2d632fc9255ee95682c4474cbee78544bfdae83b88308abbfaa0eb6c58c9186dfe86312d63286554a1c2ba8dfe69e864a26a365a7b06c0c6e4769da53be5fe0f924fbfff3e527f1391f1e5a43bb0ab3b03ad952280355d4bf28b56e171fdcf8a8b9d2f2136bdcb0e25da6cad312c33b8a594aebee87c28a4a1ab3669e841526a3b56ab85735b96a79e9d893cf7ca417af614c6a917c992a58a8d695d42e79da3866012da1ccfbfaeb553", 0xd7, 0x3, 0x100000001}, {&(0x7f0000000340)="ef3dd61a50d8bc1a15391aca0fc947db3ac2996654ce15807a0dd73b27eace95", 0x20, 0x3, 0x1000}], 0xa0000)
r2 = syz_open_dev$admmidi(&(0x7f0000000040)='/dev/admmidi#\x00', 0x10001, 0x80000)
getsockopt$inet6_int(r2, 0x29, 0x3f, &(0x7f00000000c0), &(0x7f0000000100)=0x4)
setsockopt$inet6_tcp_TCP_FASTOPEN_KEY(r2, 0x6, 0x21, &(0x7f0000000080)="ffce1c1c39748e05f45c1d50a4dba670", 0x10)
ioctl$KVM_ASSIGN_PCI_DEVICE(r2, 0x8040ae69, &(0x7f0000000140)={0x7, 0x4e2, 0x6, 0x6, 0x8})

2018/04/21 01:46:09 executing program 2:
r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000200)="2e2f6367726f7570000478d081", 0x200002, 0x0)
r1 = openat$cgroup_int(r0, &(0x7f00000001c0)='pids.max\x00', 0x2, 0x0)
read(r1, &(0x7f0000000040)=""/239, 0xef)
write$cgroup_int(r1, &(0x7f0000000040), 0x1e4)

2018/04/21 01:46:09 executing program 1:
mremap(&(0x7f0000001000/0xc00000)=nil, 0xc00000, 0x7ffffffff000, 0x3, &(0x7f0000c87000/0x2000)=nil)

2018/04/21 01:46:09 executing program 3:
r0 = syz_open_procfs(0x0, &(0x7f0000000100)='net/protocols\x00')
perf_event_open(&(0x7f0000348f88)={0x2, 0x70, 0x3e6}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
r1 = socket$kcm(0x29, 0x2, 0x0)
sendfile(r1, r0, &(0x7f0000076ff8), 0xffffffff)

2018/04/21 01:46:09 executing program 6:
r0 = socket$nl_netfilter(0x10, 0x3, 0xc)
write(r0, &(0x7f0000000080)="130000001000ffdde200f49ff60f05001b230a009d0000000f7fcb3c189814e301000000f949a1b4b88ed4fc65be060202000000f1da8ed7c06c7e00f70000d8a43d585282cd0001e42d732747442d1f90f26af0982d800000000006518c2c681bbce9ec3c3f8612f026723affc1681de8f100c8eec8a70935b80a7f41c08ffa56b97c987c4d465ddab5439b20db0f7e5bf12930d837b9cb3349b6c440007d886959eaeb01800000000000001ad5b56d2a91e1a70000000000000000000000914393c7d8", 0xc4)

2018/04/21 01:46:09 executing program 2:
r0 = socket$netlink(0x10, 0x3, 0x0)
sendmsg$nl_generic(r0, &(0x7f0000005000)={&(0x7f0000020ff4)={0x10}, 0xc, &(0x7f000000d379)={&(0x7f0000020000)={0x13, 0x19, 0x401, 0x0, 0x0, {0x1d, 0x2, 0xf}}, 0x14}, 0x1}, 0x0)

2018/04/21 01:46:09 executing program 4:
r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000380)='/dev/kvm\x00', 0x0, 0x0)
r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0)
syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, &(0x7f00000000c0)=[@text16={0x10, &(0x7f0000000300)="c16a00012e260f01ca0f300f350f20e06635000100000f22e066b8ef0000000f23c80f21f866350c00e0000f23f80f21976766c7442400a56c05676766c7442402af3f00006766c744240600000000670f011424b8f1008ee80faeaf0100", 0x5e}], 0x1, 0x0, &(0x7f0000000100), 0x0)
r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0)
ioctl$KVM_SET_MSRS(r2, 0x4008ae89, &(0x7f0000000140)={0x1, 0x0, [{0x4b564d03, 0x0, 0x2000000}]})

2018/04/21 01:46:09 executing program 0:
perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0)
mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='cgroup2\x00', 0x0, 0x0)
lsetxattr(&(0x7f0000000040)='./file0\x00', &(0x7f0000faffe7)=@known='security.capability\x00', &(0x7f00002b2fec)="0000000201000000000000010400000000000000", 0x14, 0x0)

2018/04/21 01:46:09 executing program 7:
r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000280)='/dev/kvm\x00', 0x0, 0x0)
r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0)
ioctl$KVM_IRQ_LINE(r1, 0x4008ae61, &(0x7f0000000580))

2018/04/21 01:46:09 executing program 5:
perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xffffffffffffffff}, 0x200000400, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
r0 = getgid()
getgroups(0x40000000000001f9, &(0x7f0000000000)=[0xffffffffffffffff, <r1=>0xffffffffffffffff, r0, 0xffffffffffffffff, 0xffffffffffffffff, r0])
setgid(r1)
mknod$loop(&(0x7f0000683000)='./file0\x00', 0x0, 0xffffffffffffffff)
mount(&(0x7f0000144000)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f0000bd2ffc)='nfs\x00', 0x0, &(0x7f000000a000))
kexec_load(0x8, 0x2, &(0x7f0000000380)=[{&(0x7f0000000180)="e15da901e33c1d85367cacfed2bb91a2c58223096276ce7531561628f55e4047be607360328d955994b594c35d2d632fc9255ee95682c4474cbee78544bfdae83b88308abbfaa0eb6c58c9186dfe86312d63286554a1c2ba8dfe69e864a26a365a7b06c0c6e4769da53be5fe0f924fbfff3e527f1391f1e5a43bb0ab3b03ad952280355d4bf28b56e171fdcf8a8b9d2f2136bdcb0e25da6cad312c33b8a594aebee87c28a4a1ab3669e841526a3b56ab85735b96a79e9d893cf7ca417af614c6a917c992a58a8d695d42e79da3866012da1ccfbfaeb553", 0xd7, 0x3, 0x100000001}, {&(0x7f0000000340)="ef3dd61a50d8bc1a15391aca0fc947db3ac2996654ce15807a0dd73b27eace95", 0x20, 0x3, 0x1000}], 0xa0000)
r2 = syz_open_dev$admmidi(&(0x7f0000000040)='/dev/admmidi#\x00', 0x10001, 0x80000)
getsockopt$inet6_int(r2, 0x29, 0x3f, &(0x7f00000000c0), &(0x7f0000000100)=0x4)
setsockopt$inet6_tcp_TCP_FASTOPEN_KEY(r2, 0x6, 0x21, &(0x7f0000000080)="ffce1c1c39748e05f45c1d50a4dba670", 0x10)
ioctl$KVM_ASSIGN_PCI_DEVICE(r2, 0x8040ae69, &(0x7f0000000140)={0x7, 0x4e2, 0x6, 0x6, 0x8})

2018/04/21 01:46:09 executing program 1:
r0 = socket(0x40000000015, 0x5, 0x0)
getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f00000001c0)={0x0, <r1=>0x0}, &(0x7f0000000200)=0x5)
setreuid(r1, 0x0)
add_key$keyring(&(0x7f0000000100)='keyring\x00', &(0x7f0000000140)={0x73, 0x79, 0x7a}, 0x0, 0x0, 0xfffffffffffffffc)

2018/04/21 01:46:09 executing program 2:
r0 = socket$netlink(0x10, 0x3, 0x0)
sendmsg$nl_generic(r0, &(0x7f0000005000)={&(0x7f0000020ff4)={0x10}, 0xc, &(0x7f000000d379)={&(0x7f0000020000)={0x13, 0x19, 0x401, 0x0, 0x0, {0x1d, 0x2, 0xf}}, 0x14}, 0x1}, 0x0)

2018/04/21 01:46:10 executing program 3:
r0 = syz_open_procfs(0x0, &(0x7f0000000100)='net/protocols\x00')
perf_event_open(&(0x7f0000348f88)={0x2, 0x70, 0x3e6}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
r1 = socket$kcm(0x29, 0x2, 0x0)
sendfile(r1, r0, &(0x7f0000076ff8), 0xffffffff)

2018/04/21 01:46:10 executing program 6:
r0 = socket$nl_netfilter(0x10, 0x3, 0xc)
write(r0, &(0x7f0000000080)="130000001000ffdde200f49ff60f05001b230a009d0000000f7fcb3c189814e301000000f949a1b4b88ed4fc65be060202000000f1da8ed7c06c7e00f70000d8a43d585282cd0001e42d732747442d1f90f26af0982d800000000006518c2c681bbce9ec3c3f8612f026723affc1681de8f100c8eec8a70935b80a7f41c08ffa56b97c987c4d465ddab5439b20db0f7e5bf12930d837b9cb3349b6c440007d886959eaeb01800000000000001ad5b56d2a91e1a70000000000000000000000914393c7d8", 0xc4)

2018/04/21 01:46:10 executing program 0:
perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0)
mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='cgroup2\x00', 0x0, 0x0)
lsetxattr(&(0x7f0000000040)='./file0\x00', &(0x7f0000faffe7)=@known='security.capability\x00', &(0x7f00002b2fec)="0000000201000000000000010400000000000000", 0x14, 0x0)

2018/04/21 01:46:10 executing program 5:
perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xffffffffffffffff}, 0x200000400, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
r0 = getgid()
getgroups(0x40000000000001f9, &(0x7f0000000000)=[0xffffffffffffffff, <r1=>0xffffffffffffffff, r0, 0xffffffffffffffff, 0xffffffffffffffff, r0])
setgid(r1)
mknod$loop(&(0x7f0000683000)='./file0\x00', 0x0, 0xffffffffffffffff)
mount(&(0x7f0000144000)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f0000bd2ffc)='nfs\x00', 0x0, &(0x7f000000a000))
kexec_load(0x8, 0x2, &(0x7f0000000380)=[{&(0x7f0000000180)="e15da901e33c1d85367cacfed2bb91a2c58223096276ce7531561628f55e4047be607360328d955994b594c35d2d632fc9255ee95682c4474cbee78544bfdae83b88308abbfaa0eb6c58c9186dfe86312d63286554a1c2ba8dfe69e864a26a365a7b06c0c6e4769da53be5fe0f924fbfff3e527f1391f1e5a43bb0ab3b03ad952280355d4bf28b56e171fdcf8a8b9d2f2136bdcb0e25da6cad312c33b8a594aebee87c28a4a1ab3669e841526a3b56ab85735b96a79e9d893cf7ca417af614c6a917c992a58a8d695d42e79da3866012da1ccfbfaeb553", 0xd7, 0x3, 0x100000001}, {&(0x7f0000000340)="ef3dd61a50d8bc1a15391aca0fc947db3ac2996654ce15807a0dd73b27eace95", 0x20, 0x3, 0x1000}], 0xa0000)
r2 = syz_open_dev$admmidi(&(0x7f0000000040)='/dev/admmidi#\x00', 0x10001, 0x80000)
getsockopt$inet6_int(r2, 0x29, 0x3f, &(0x7f00000000c0), &(0x7f0000000100)=0x4)
setsockopt$inet6_tcp_TCP_FASTOPEN_KEY(r2, 0x6, 0x21, &(0x7f0000000080)="ffce1c1c39748e05f45c1d50a4dba670", 0x10)
ioctl$KVM_ASSIGN_PCI_DEVICE(r2, 0x8040ae69, &(0x7f0000000140)={0x7, 0x4e2, 0x6, 0x6, 0x8})

2018/04/21 01:46:10 executing program 7:
r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000280)='/dev/kvm\x00', 0x0, 0x0)
r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0)
ioctl$KVM_IRQ_LINE(r1, 0x4008ae61, &(0x7f0000000580))

2018/04/21 01:46:10 executing program 2:
r0 = socket$netlink(0x10, 0x3, 0x0)
sendmsg$nl_generic(r0, &(0x7f0000005000)={&(0x7f0000020ff4)={0x10}, 0xc, &(0x7f000000d379)={&(0x7f0000020000)={0x13, 0x19, 0x401, 0x0, 0x0, {0x1d, 0x2, 0xf}}, 0x14}, 0x1}, 0x0)

2018/04/21 01:46:10 executing program 4:
r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000380)='/dev/kvm\x00', 0x0, 0x0)
r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0)
syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, &(0x7f00000000c0)=[@text16={0x10, &(0x7f0000000300)="c16a00012e260f01ca0f300f350f20e06635000100000f22e066b8ef0000000f23c80f21f866350c00e0000f23f80f21976766c7442400a56c05676766c7442402af3f00006766c744240600000000670f011424b8f1008ee80faeaf0100", 0x5e}], 0x1, 0x0, &(0x7f0000000100), 0x0)
r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0)
ioctl$KVM_SET_MSRS(r2, 0x4008ae89, &(0x7f0000000140)={0x1, 0x0, [{0x4b564d03, 0x0, 0x2000000}]})

2018/04/21 01:46:10 executing program 1:
r0 = socket(0x40000000015, 0x5, 0x0)
getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f00000001c0)={0x0, <r1=>0x0}, &(0x7f0000000200)=0x5)
setreuid(r1, 0x0)
add_key$keyring(&(0x7f0000000100)='keyring\x00', &(0x7f0000000140)={0x73, 0x79, 0x7a}, 0x0, 0x0, 0xfffffffffffffffc)

2018/04/21 01:46:10 executing program 2:
r0 = socket$netlink(0x10, 0x3, 0x0)
sendmsg$nl_generic(r0, &(0x7f0000005000)={&(0x7f0000020ff4)={0x10}, 0xc, &(0x7f000000d379)={&(0x7f0000020000)={0x13, 0x19, 0x401, 0x0, 0x0, {0x1d, 0x2, 0xf}}, 0x14}, 0x1}, 0x0)

2018/04/21 01:46:10 executing program 6:
r0 = socket$nl_netfilter(0x10, 0x3, 0xc)
write(r0, &(0x7f0000000080)="130000001000ffdde200f49ff60f05001b230a009d0000000f7fcb3c189814e301000000f949a1b4b88ed4fc65be060202000000f1da8ed7c06c7e00f70000d8a43d585282cd0001e42d732747442d1f90f26af0982d800000000006518c2c681bbce9ec3c3f8612f026723affc1681de8f100c8eec8a70935b80a7f41c08ffa56b97c987c4d465ddab5439b20db0f7e5bf12930d837b9cb3349b6c440007d886959eaeb01800000000000001ad5b56d2a91e1a70000000000000000000000914393c7d8", 0xc4)

2018/04/21 01:46:10 executing program 0:
perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0)
mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='cgroup2\x00', 0x0, 0x0)
lsetxattr(&(0x7f0000000040)='./file0\x00', &(0x7f0000faffe7)=@known='security.capability\x00', &(0x7f00002b2fec)="0000000201000000000000010400000000000000", 0x14, 0x0)

2018/04/21 01:46:10 executing program 3:
r0 = syz_open_procfs(0x0, &(0x7f0000000100)='net/protocols\x00')
perf_event_open(&(0x7f0000348f88)={0x2, 0x70, 0x3e6}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
r1 = socket$kcm(0x29, 0x2, 0x0)
sendfile(r1, r0, &(0x7f0000076ff8), 0xffffffff)

2018/04/21 01:46:10 executing program 5:
r0 = socket$inet6(0xa, 0x2, 0x0)
connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2={0xff, 0x2, [], 0x1}, 0x2}, 0x1c)
bind$inet6(r0, &(0x7f0000f5dfe4)={0xa}, 0x1c)

2018/04/21 01:46:10 executing program 7:
r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000280)='/dev/kvm\x00', 0x0, 0x0)
r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0)
ioctl$KVM_IRQ_LINE(r1, 0x4008ae61, &(0x7f0000000580))

2018/04/21 01:46:10 executing program 1:
r0 = socket(0x40000000015, 0x5, 0x0)
getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f00000001c0)={0x0, <r1=>0x0}, &(0x7f0000000200)=0x5)
setreuid(r1, 0x0)
add_key$keyring(&(0x7f0000000100)='keyring\x00', &(0x7f0000000140)={0x73, 0x79, 0x7a}, 0x0, 0x0, 0xfffffffffffffffc)

2018/04/21 01:46:10 executing program 2:
perf_event_open(&(0x7f00000000c0)={0x2, 0x70, 0x3e6}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
r0 = socket$inet(0x10, 0x3, 0x0)
sendmsg(r0, &(0x7f0000007fc8)={0x0, 0x0, &(0x7f000000d000)=[{&(0x7f0000000000)="4c0000001000ff20fffefd956fc283b724a600000d00000000060000000000001000010006c41180b598bc593a02001148a730df33a49868c62b2ca654a6613b6aab02000000bc832b0790ed", 0x4c}], 0x1}, 0x0)

2018/04/21 01:46:10 executing program 6:
r0 = socket$nl_netfilter(0x10, 0x3, 0xc)
write(r0, &(0x7f0000000080)="130000001000ffdde200f49ff60f05001b230a009d0000000f7fcb3c189814e301000000f949a1b4b88ed4fc65be060202000000f1da8ed7c06c7e00f70000d8a43d585282cd0001e42d732747442d1f90f26af0982d800000000006518c2c681bbce9ec3c3f8612f026723affc1681de8f100c8eec8a70935b80a7f41c08ffa56b97c987c4d465ddab5439b20db0f7e5bf12930d837b9cb3349b6c440007d886959eaeb01800000000000001ad5b56d2a91e1a70000000000000000000000914393c7d8", 0xc4)

2018/04/21 01:46:10 executing program 4:
r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000380)='/dev/kvm\x00', 0x0, 0x0)
r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0)
syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, &(0x7f00000000c0)=[@text16={0x10, &(0x7f0000000300)="c16a00012e260f01ca0f300f350f20e06635000100000f22e066b8ef0000000f23c80f21f866350c00e0000f23f80f21976766c7442400a56c05676766c7442402af3f00006766c744240600000000670f011424b8f1008ee80faeaf0100", 0x5e}], 0x1, 0x0, &(0x7f0000000100), 0x0)
r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0)
ioctl$KVM_SET_MSRS(r2, 0x4008ae89, &(0x7f0000000140)={0x1, 0x0, [{0x4b564d03, 0x0, 0x2000000}]})

2018/04/21 01:46:10 executing program 5:
r0 = socket$inet6(0xa, 0x2, 0x0)
connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2={0xff, 0x2, [], 0x1}, 0x2}, 0x1c)
bind$inet6(r0, &(0x7f0000f5dfe4)={0xa}, 0x1c)

2018/04/21 01:46:10 executing program 0:
perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0)
mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='cgroup2\x00', 0x0, 0x0)
lsetxattr(&(0x7f0000000040)='./file0\x00', &(0x7f0000faffe7)=@known='security.capability\x00', &(0x7f00002b2fec)="0000000201000000000000010400000000000000", 0x14, 0x0)

2018/04/21 01:46:10 executing program 3:
r0 = syz_open_procfs(0x0, &(0x7f0000000100)='net/protocols\x00')
perf_event_open(&(0x7f0000348f88)={0x2, 0x70, 0x3e6}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
r1 = socket$kcm(0x29, 0x2, 0x0)
sendfile(r1, r0, &(0x7f0000076ff8), 0xffffffff)

2018/04/21 01:46:10 executing program 7:
r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000280)='/dev/kvm\x00', 0x0, 0x0)
r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0)
ioctl$KVM_IRQ_LINE(r1, 0x4008ae61, &(0x7f0000000580))

2018/04/21 01:46:10 executing program 6:
r0 = socket$inet6(0xa, 0x80002, 0x88)
recvfrom$inet6(r0, &(0x7f0000fbef6d)=""/185, 0xb9, 0x0, 0x0, 0x0)
bind$inet6(r0, &(0x7f00008a8000)={0xa, 0x4e23}, 0x1c)
ioctl$sock_bt(r0, 0x8907, &(0x7f0000000040))
r1 = socket$inet6(0xa, 0x8000000000000802, 0x88)
sendmsg$inet_sctp(r1, &(0x7f0000a29000)={&(0x7f00005dafe4)=@in6={0xa, 0x4e23, 0x0, @mcast2={0xff, 0x2, [], 0x1}}, 0x1c, &(0x7f0000fc8000)}, 0x0)

[   80.376851] netlink: 28 bytes leftover after parsing attributes in process `syz-executor2'.
2018/04/21 01:46:10 executing program 5:
r0 = socket$inet6(0xa, 0x2, 0x0)
connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2={0xff, 0x2, [], 0x1}, 0x2}, 0x1c)
bind$inet6(r0, &(0x7f0000f5dfe4)={0xa}, 0x1c)

2018/04/21 01:46:10 executing program 1:
r0 = socket(0x40000000015, 0x5, 0x0)
getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f00000001c0)={0x0, <r1=>0x0}, &(0x7f0000000200)=0x5)
setreuid(r1, 0x0)
add_key$keyring(&(0x7f0000000100)='keyring\x00', &(0x7f0000000140)={0x73, 0x79, 0x7a}, 0x0, 0x0, 0xfffffffffffffffc)

2018/04/21 01:46:10 executing program 7:
r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup.cpu\x00', 0x200002, 0x0)
r1 = openat$cgroup_ro(r0, &(0x7f00000001c0)='cpuacct.stat\x00', 0x0, 0x0)
read$eventfd(r1, &(0x7f0000000100), 0x8)

[   80.472338] bridge0: port 2(bridge_slave_1) entered disabled state
[   80.479682] bridge0: port 1(bridge_slave_0) entered disabled state
2018/04/21 01:46:10 executing program 0:
r0 = socket$nl_generic(0x10, 0x3, 0x10)
sendmsg$nl_generic(r0, &(0x7f0000018000)={&(0x7f000001a000)={0x10}, 0xc, &(0x7f000000e000)={&(0x7f00005e4000)={0x18, 0x1d, 0xffffffffffffffff, 0x0, 0x0, {0x5}, [@nested={0x4, 0x200000000000001}]}, 0x18}, 0x1}, 0x0)

2018/04/21 01:46:10 executing program 3:
open$dir(&(0x7f0000000140)='./file0/file0\x00', 0x0, 0x0)
r0 = open$dir(&(0x7f00000001c0)='./file0\x00', 0x1fffe, 0x0)
r1 = open$dir(&(0x7f0000000500)='./file0\x00', 0x2, 0x0)
lseek(0xffffffffffffffff, 0x0, 0x0)
write(r1, &(0x7f0000000300)="d8", 0x1)
sendfile(r1, r1, &(0x7f0000000040), 0x7527fb3200000000)
lseek(r0, 0x0, 0x3)
sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x7fffffff)
ftruncate(r1, 0x0)

[   80.593097] netlink: 28 bytes leftover after parsing attributes in process `syz-executor2'.
[   80.682788] netlink: 'syz-executor0': attribute type 1 has an invalid length.
2018/04/21 01:46:11 executing program 5:
r0 = socket$inet6(0xa, 0x2, 0x0)
connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2={0xff, 0x2, [], 0x1}, 0x2}, 0x1c)
bind$inet6(r0, &(0x7f0000f5dfe4)={0xa}, 0x1c)

2018/04/21 01:46:11 executing program 4:
r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000380)='/dev/kvm\x00', 0x0, 0x0)
r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0)
syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, &(0x7f00000000c0)=[@text16={0x10, &(0x7f0000000300)="c16a00012e260f01ca0f300f350f20e06635000100000f22e066b8ef0000000f23c80f21f866350c00e0000f23f80f21976766c7442400a56c05676766c7442402af3f00006766c744240600000000670f011424b8f1008ee80faeaf0100", 0x5e}], 0x1, 0x0, &(0x7f0000000100), 0x0)
r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0)
ioctl$KVM_SET_MSRS(r2, 0x4008ae89, &(0x7f0000000140)={0x1, 0x0, [{0x4b564d03, 0x0, 0x2000000}]})

2018/04/21 01:46:11 executing program 7:
r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup.cpu\x00', 0x200002, 0x0)
r1 = openat$cgroup_ro(r0, &(0x7f00000001c0)='cpuacct.stat\x00', 0x0, 0x0)
read$eventfd(r1, &(0x7f0000000100), 0x8)

2018/04/21 01:46:11 executing program 1:
perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
r0 = syz_open_dev$sndtimer(&(0x7f0000000100)='/dev/snd/timer\x00', 0x0, 0x0)
ioctl$SNDRV_TIMER_IOCTL_SELECT(r0, 0x40345410, &(0x7f0000029fcc)={{0x0, 0x2}})
ioctl$SNDRV_TIMER_IOCTL_CONTINUE(r0, 0x54a2)

2018/04/21 01:46:11 executing program 0:
r0 = socket$nl_generic(0x10, 0x3, 0x10)
sendmsg$nl_generic(r0, &(0x7f0000018000)={&(0x7f000001a000)={0x10}, 0xc, &(0x7f000000e000)={&(0x7f00005e4000)={0x18, 0x1d, 0xffffffffffffffff, 0x0, 0x0, {0x5}, [@nested={0x4, 0x200000000000001}]}, 0x18}, 0x1}, 0x0)

2018/04/21 01:46:11 executing program 2:
perf_event_open(&(0x7f00000000c0)={0x2, 0x70, 0x3e6}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
r0 = socket$inet(0x10, 0x3, 0x0)
sendmsg(r0, &(0x7f0000007fc8)={0x0, 0x0, &(0x7f000000d000)=[{&(0x7f0000000000)="4c0000001000ff20fffefd956fc283b724a600000d00000000060000000000001000010006c41180b598bc593a02001148a730df33a49868c62b2ca654a6613b6aab02000000bc832b0790ed", 0x4c}], 0x1}, 0x0)

2018/04/21 01:46:11 executing program 3:
open$dir(&(0x7f0000000140)='./file0/file0\x00', 0x0, 0x0)
r0 = open$dir(&(0x7f00000001c0)='./file0\x00', 0x1fffe, 0x0)
r1 = open$dir(&(0x7f0000000500)='./file0\x00', 0x2, 0x0)
lseek(0xffffffffffffffff, 0x0, 0x0)
write(r1, &(0x7f0000000300)="d8", 0x1)
sendfile(r1, r1, &(0x7f0000000040), 0x7527fb3200000000)
lseek(r0, 0x0, 0x3)
sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x7fffffff)
ftruncate(r1, 0x0)

2018/04/21 01:46:11 executing program 6:
r0 = socket$inet6(0xa, 0x80002, 0x88)
recvfrom$inet6(r0, &(0x7f0000fbef6d)=""/185, 0xb9, 0x0, 0x0, 0x0)
bind$inet6(r0, &(0x7f00008a8000)={0xa, 0x4e23}, 0x1c)
ioctl$sock_bt(r0, 0x8907, &(0x7f0000000040))
r1 = socket$inet6(0xa, 0x8000000000000802, 0x88)
sendmsg$inet_sctp(r1, &(0x7f0000a29000)={&(0x7f00005dafe4)=@in6={0xa, 0x4e23, 0x0, @mcast2={0xff, 0x2, [], 0x1}}, 0x1c, &(0x7f0000fc8000)}, 0x0)

2018/04/21 01:46:11 executing program 5:
r0 = socket$inet6(0xa, 0x80002, 0x88)
recvfrom$inet6(r0, &(0x7f0000fbef6d)=""/185, 0xb9, 0x0, 0x0, 0x0)
bind$inet6(r0, &(0x7f00008a8000)={0xa, 0x4e23}, 0x1c)
ioctl$sock_bt(r0, 0x8907, &(0x7f0000000040))
r1 = socket$inet6(0xa, 0x8000000000000802, 0x88)
sendmsg$inet_sctp(r1, &(0x7f0000a29000)={&(0x7f00005dafe4)=@in6={0xa, 0x4e23, 0x0, @mcast2={0xff, 0x2, [], 0x1}}, 0x1c, &(0x7f0000fc8000)}, 0x0)

[   81.693161] netlink: 'syz-executor0': attribute type 1 has an invalid length.
[   81.712168] netlink: 28 bytes leftover after parsing attributes in process `syz-executor2'.
2018/04/21 01:46:11 executing program 7:
r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup.cpu\x00', 0x200002, 0x0)
r1 = openat$cgroup_ro(r0, &(0x7f00000001c0)='cpuacct.stat\x00', 0x0, 0x0)
read$eventfd(r1, &(0x7f0000000100), 0x8)

2018/04/21 01:46:11 executing program 2:
perf_event_open(&(0x7f00000000c0)={0x2, 0x70, 0x3e6}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
r0 = socket$inet(0x10, 0x3, 0x0)
sendmsg(r0, &(0x7f0000007fc8)={0x0, 0x0, &(0x7f000000d000)=[{&(0x7f0000000000)="4c0000001000ff20fffefd956fc283b724a600000d00000000060000000000001000010006c41180b598bc593a02001148a730df33a49868c62b2ca654a6613b6aab02000000bc832b0790ed", 0x4c}], 0x1}, 0x0)

2018/04/21 01:46:11 executing program 1:
perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
r0 = syz_open_dev$sndtimer(&(0x7f0000000100)='/dev/snd/timer\x00', 0x0, 0x0)
ioctl$SNDRV_TIMER_IOCTL_SELECT(r0, 0x40345410, &(0x7f0000029fcc)={{0x0, 0x2}})
ioctl$SNDRV_TIMER_IOCTL_CONTINUE(r0, 0x54a2)

2018/04/21 01:46:11 executing program 0:
r0 = socket$nl_generic(0x10, 0x3, 0x10)
sendmsg$nl_generic(r0, &(0x7f0000018000)={&(0x7f000001a000)={0x10}, 0xc, &(0x7f000000e000)={&(0x7f00005e4000)={0x18, 0x1d, 0xffffffffffffffff, 0x0, 0x0, {0x5}, [@nested={0x4, 0x200000000000001}]}, 0x18}, 0x1}, 0x0)

2018/04/21 01:46:11 executing program 4:
perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
r0 = syz_open_procfs(0x0, &(0x7f0000000140)='net/route\x00')
sendfile(r0, r0, &(0x7f0000b58000)=0x200000, 0xffff)

[   81.835697] netlink: 28 bytes leftover after parsing attributes in process `syz-executor2'.
2018/04/21 01:46:12 executing program 7:
r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup.cpu\x00', 0x200002, 0x0)
r1 = openat$cgroup_ro(r0, &(0x7f00000001c0)='cpuacct.stat\x00', 0x0, 0x0)
read$eventfd(r1, &(0x7f0000000100), 0x8)

2018/04/21 01:46:12 executing program 2:
perf_event_open(&(0x7f00000000c0)={0x2, 0x70, 0x3e6}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
r0 = socket$inet(0x10, 0x3, 0x0)
sendmsg(r0, &(0x7f0000007fc8)={0x0, 0x0, &(0x7f000000d000)=[{&(0x7f0000000000)="4c0000001000ff20fffefd956fc283b724a600000d00000000060000000000001000010006c41180b598bc593a02001148a730df33a49868c62b2ca654a6613b6aab02000000bc832b0790ed", 0x4c}], 0x1}, 0x0)

[   81.902857] netlink: 'syz-executor0': attribute type 1 has an invalid length.
[   82.011219] netlink: 28 bytes leftover after parsing attributes in process `syz-executor2'.
2018/04/21 01:46:12 executing program 1:
perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
r0 = syz_open_dev$sndtimer(&(0x7f0000000100)='/dev/snd/timer\x00', 0x0, 0x0)
ioctl$SNDRV_TIMER_IOCTL_SELECT(r0, 0x40345410, &(0x7f0000029fcc)={{0x0, 0x2}})
ioctl$SNDRV_TIMER_IOCTL_CONTINUE(r0, 0x54a2)

2018/04/21 01:46:12 executing program 0:
r0 = socket$nl_generic(0x10, 0x3, 0x10)
sendmsg$nl_generic(r0, &(0x7f0000018000)={&(0x7f000001a000)={0x10}, 0xc, &(0x7f000000e000)={&(0x7f00005e4000)={0x18, 0x1d, 0xffffffffffffffff, 0x0, 0x0, {0x5}, [@nested={0x4, 0x200000000000001}]}, 0x18}, 0x1}, 0x0)

2018/04/21 01:46:12 executing program 7:
r0 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000556ff0)='/dev/sequencer2\x00', 0x0, 0x0)
ioctl$SNDRV_SEQ_IOCTL_GET_SUBSCRIPTION(r0, 0x40085112, &(0x7f0000b18000)={{0xffffff92}, {0xe0}})

2018/04/21 01:46:12 executing program 4:
perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
r0 = syz_open_procfs(0x0, &(0x7f0000000140)='net/route\x00')
sendfile(r0, r0, &(0x7f0000b58000)=0x200000, 0xffff)

2018/04/21 01:46:12 executing program 2:
bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000040)={0xffffffffffffffff, &(0x7f00000000c0)="b82283392dc50ff1fb635a5849d2f5916ae2fdc24e95e12aa8daccf7393e72be9cc66f"}, 0x10)
bpf$MAP_CREATE(0x0, &(0x7f0000346fd4)={0x0, 0x0, 0x0, 0x4, 0x7d}, 0x2c)
r0 = bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x1, 0x5, &(0x7f0000346fc8)=@framed={{0x18}, [@alu={0x8000000201a7f19, 0x0, 0x7, 0x0, 0x1}], {0x95}}, &(0x7f0000f6bffb)='GPL\x00', 0x0, 0x299, &(0x7f00001a7f05)=""/251}, 0x18)
bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000140)={r0, 0x50, &(0x7f00000000c0)}, 0x10)
socketpair$inet(0x7fffffffefff, 0x0, 0x0, &(0x7f0000000480))

2018/04/21 01:46:12 executing program 6:
r0 = socket$inet6(0xa, 0x80002, 0x88)
recvfrom$inet6(r0, &(0x7f0000fbef6d)=""/185, 0xb9, 0x0, 0x0, 0x0)
bind$inet6(r0, &(0x7f00008a8000)={0xa, 0x4e23}, 0x1c)
ioctl$sock_bt(r0, 0x8907, &(0x7f0000000040))
r1 = socket$inet6(0xa, 0x8000000000000802, 0x88)
sendmsg$inet_sctp(r1, &(0x7f0000a29000)={&(0x7f00005dafe4)=@in6={0xa, 0x4e23, 0x0, @mcast2={0xff, 0x2, [], 0x1}}, 0x1c, &(0x7f0000fc8000)}, 0x0)

2018/04/21 01:46:12 executing program 3:
open$dir(&(0x7f0000000140)='./file0/file0\x00', 0x0, 0x0)
r0 = open$dir(&(0x7f00000001c0)='./file0\x00', 0x1fffe, 0x0)
r1 = open$dir(&(0x7f0000000500)='./file0\x00', 0x2, 0x0)
lseek(0xffffffffffffffff, 0x0, 0x0)
write(r1, &(0x7f0000000300)="d8", 0x1)
sendfile(r1, r1, &(0x7f0000000040), 0x7527fb3200000000)
lseek(r0, 0x0, 0x3)
sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x7fffffff)
ftruncate(r1, 0x0)

2018/04/21 01:46:12 executing program 5:
r0 = socket$inet6(0xa, 0x80002, 0x88)
recvfrom$inet6(r0, &(0x7f0000fbef6d)=""/185, 0xb9, 0x0, 0x0, 0x0)
bind$inet6(r0, &(0x7f00008a8000)={0xa, 0x4e23}, 0x1c)
ioctl$sock_bt(r0, 0x8907, &(0x7f0000000040))
r1 = socket$inet6(0xa, 0x8000000000000802, 0x88)
sendmsg$inet_sctp(r1, &(0x7f0000a29000)={&(0x7f00005dafe4)=@in6={0xa, 0x4e23, 0x0, @mcast2={0xff, 0x2, [], 0x1}}, 0x1c, &(0x7f0000fc8000)}, 0x0)

[   82.669745] netlink: 'syz-executor0': attribute type 1 has an invalid length.
2018/04/21 01:46:12 executing program 7:
r0 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000556ff0)='/dev/sequencer2\x00', 0x0, 0x0)
ioctl$SNDRV_SEQ_IOCTL_GET_SUBSCRIPTION(r0, 0x40085112, &(0x7f0000b18000)={{0xffffff92}, {0xe0}})

2018/04/21 01:46:12 executing program 1:
perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
r0 = syz_open_dev$sndtimer(&(0x7f0000000100)='/dev/snd/timer\x00', 0x0, 0x0)
ioctl$SNDRV_TIMER_IOCTL_SELECT(r0, 0x40345410, &(0x7f0000029fcc)={{0x0, 0x2}})
ioctl$SNDRV_TIMER_IOCTL_CONTINUE(r0, 0x54a2)

2018/04/21 01:46:12 executing program 0:
r0 = inotify_init1(0x0)
fcntl$setown(r0, 0x8, 0xffffffffffffffff)
fcntl$getownex(r0, 0x10, &(0x7f000045fff8)={0x0, <r1=>0x0})
ptrace$setopts(0x4206, r1, 0x0, 0x0)
ptrace(0x4207, r1)
ptrace$setopts(0x3, r1, 0x0, 0x2000000000000000)

2018/04/21 01:46:12 executing program 2:
bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000040)={0xffffffffffffffff, &(0x7f00000000c0)="b82283392dc50ff1fb635a5849d2f5916ae2fdc24e95e12aa8daccf7393e72be9cc66f"}, 0x10)
bpf$MAP_CREATE(0x0, &(0x7f0000346fd4)={0x0, 0x0, 0x0, 0x4, 0x7d}, 0x2c)
r0 = bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x1, 0x5, &(0x7f0000346fc8)=@framed={{0x18}, [@alu={0x8000000201a7f19, 0x0, 0x7, 0x0, 0x1}], {0x95}}, &(0x7f0000f6bffb)='GPL\x00', 0x0, 0x299, &(0x7f00001a7f05)=""/251}, 0x18)
bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000140)={r0, 0x50, &(0x7f00000000c0)}, 0x10)
socketpair$inet(0x7fffffffefff, 0x0, 0x0, &(0x7f0000000480))

2018/04/21 01:46:12 executing program 4:
perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
r0 = syz_open_procfs(0x0, &(0x7f0000000140)='net/route\x00')
sendfile(r0, r0, &(0x7f0000b58000)=0x200000, 0xffff)

2018/04/21 01:46:12 executing program 7:
r0 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000556ff0)='/dev/sequencer2\x00', 0x0, 0x0)
ioctl$SNDRV_SEQ_IOCTL_GET_SUBSCRIPTION(r0, 0x40085112, &(0x7f0000b18000)={{0xffffff92}, {0xe0}})

2018/04/21 01:46:12 executing program 1:
r0 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0)
fallocate(r0, 0x20, 0x0, 0x400)

2018/04/21 01:46:13 executing program 2:
bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000040)={0xffffffffffffffff, &(0x7f00000000c0)="b82283392dc50ff1fb635a5849d2f5916ae2fdc24e95e12aa8daccf7393e72be9cc66f"}, 0x10)
bpf$MAP_CREATE(0x0, &(0x7f0000346fd4)={0x0, 0x0, 0x0, 0x4, 0x7d}, 0x2c)
r0 = bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x1, 0x5, &(0x7f0000346fc8)=@framed={{0x18}, [@alu={0x8000000201a7f19, 0x0, 0x7, 0x0, 0x1}], {0x95}}, &(0x7f0000f6bffb)='GPL\x00', 0x0, 0x299, &(0x7f00001a7f05)=""/251}, 0x18)
bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000140)={r0, 0x50, &(0x7f00000000c0)}, 0x10)
socketpair$inet(0x7fffffffefff, 0x0, 0x0, &(0x7f0000000480))

2018/04/21 01:46:13 executing program 0:
r0 = inotify_init1(0x0)
fcntl$setown(r0, 0x8, 0xffffffffffffffff)
fcntl$getownex(r0, 0x10, &(0x7f000045fff8)={0x0, <r1=>0x0})
ptrace$setopts(0x4206, r1, 0x0, 0x0)
ptrace(0x4207, r1)
ptrace$setopts(0x3, r1, 0x0, 0x2000000000000000)

2018/04/21 01:46:13 executing program 4:
perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
r0 = syz_open_procfs(0x0, &(0x7f0000000140)='net/route\x00')
sendfile(r0, r0, &(0x7f0000b58000)=0x200000, 0xffff)

2018/04/21 01:46:13 executing program 7:
r0 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000556ff0)='/dev/sequencer2\x00', 0x0, 0x0)
ioctl$SNDRV_SEQ_IOCTL_GET_SUBSCRIPTION(r0, 0x40085112, &(0x7f0000b18000)={{0xffffff92}, {0xe0}})

2018/04/21 01:46:13 executing program 1:
r0 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0)
fallocate(r0, 0x20, 0x0, 0x400)

2018/04/21 01:46:13 executing program 6:
r0 = socket$inet6(0xa, 0x80002, 0x88)
recvfrom$inet6(r0, &(0x7f0000fbef6d)=""/185, 0xb9, 0x0, 0x0, 0x0)
bind$inet6(r0, &(0x7f00008a8000)={0xa, 0x4e23}, 0x1c)
ioctl$sock_bt(r0, 0x8907, &(0x7f0000000040))
r1 = socket$inet6(0xa, 0x8000000000000802, 0x88)
sendmsg$inet_sctp(r1, &(0x7f0000a29000)={&(0x7f00005dafe4)=@in6={0xa, 0x4e23, 0x0, @mcast2={0xff, 0x2, [], 0x1}}, 0x1c, &(0x7f0000fc8000)}, 0x0)

2018/04/21 01:46:13 executing program 3:
open$dir(&(0x7f0000000140)='./file0/file0\x00', 0x0, 0x0)
r0 = open$dir(&(0x7f00000001c0)='./file0\x00', 0x1fffe, 0x0)
r1 = open$dir(&(0x7f0000000500)='./file0\x00', 0x2, 0x0)
lseek(0xffffffffffffffff, 0x0, 0x0)
write(r1, &(0x7f0000000300)="d8", 0x1)
sendfile(r1, r1, &(0x7f0000000040), 0x7527fb3200000000)
lseek(r0, 0x0, 0x3)
sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x7fffffff)
ftruncate(r1, 0x0)

2018/04/21 01:46:13 executing program 5:
r0 = socket$inet6(0xa, 0x80002, 0x88)
recvfrom$inet6(r0, &(0x7f0000fbef6d)=""/185, 0xb9, 0x0, 0x0, 0x0)
bind$inet6(r0, &(0x7f00008a8000)={0xa, 0x4e23}, 0x1c)
ioctl$sock_bt(r0, 0x8907, &(0x7f0000000040))
r1 = socket$inet6(0xa, 0x8000000000000802, 0x88)
sendmsg$inet_sctp(r1, &(0x7f0000a29000)={&(0x7f00005dafe4)=@in6={0xa, 0x4e23, 0x0, @mcast2={0xff, 0x2, [], 0x1}}, 0x1c, &(0x7f0000fc8000)}, 0x0)

2018/04/21 01:46:13 executing program 7:
r0 = inotify_init()
r1 = epoll_create(0x6)
epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, &(0x7f00007a8000))

2018/04/21 01:46:13 executing program 2:
bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000040)={0xffffffffffffffff, &(0x7f00000000c0)="b82283392dc50ff1fb635a5849d2f5916ae2fdc24e95e12aa8daccf7393e72be9cc66f"}, 0x10)
bpf$MAP_CREATE(0x0, &(0x7f0000346fd4)={0x0, 0x0, 0x0, 0x4, 0x7d}, 0x2c)
r0 = bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x1, 0x5, &(0x7f0000346fc8)=@framed={{0x18}, [@alu={0x8000000201a7f19, 0x0, 0x7, 0x0, 0x1}], {0x95}}, &(0x7f0000f6bffb)='GPL\x00', 0x0, 0x299, &(0x7f00001a7f05)=""/251}, 0x18)
bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000140)={r0, 0x50, &(0x7f00000000c0)}, 0x10)
socketpair$inet(0x7fffffffefff, 0x0, 0x0, &(0x7f0000000480))

2018/04/21 01:46:13 executing program 1:
r0 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0)
fallocate(r0, 0x20, 0x0, 0x400)

2018/04/21 01:46:13 executing program 0:
r0 = inotify_init1(0x0)
fcntl$setown(r0, 0x8, 0xffffffffffffffff)
fcntl$getownex(r0, 0x10, &(0x7f000045fff8)={0x0, <r1=>0x0})
ptrace$setopts(0x4206, r1, 0x0, 0x0)
ptrace(0x4207, r1)
ptrace$setopts(0x3, r1, 0x0, 0x2000000000000000)

2018/04/21 01:46:13 executing program 7:
r0 = inotify_init()
r1 = epoll_create(0x6)
epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, &(0x7f00007a8000))

2018/04/21 01:46:13 executing program 4:
r0 = socket$inet_smc(0x2b, 0x1, 0x0)
listen(r0, 0x0)
poll(&(0x7f0000000200)=[{r0}], 0x1, 0x6)

2018/04/21 01:46:13 executing program 0:
r0 = inotify_init1(0x0)
fcntl$setown(r0, 0x8, 0xffffffffffffffff)
fcntl$getownex(r0, 0x10, &(0x7f000045fff8)={0x0, <r1=>0x0})
ptrace$setopts(0x4206, r1, 0x0, 0x0)
ptrace(0x4207, r1)
ptrace$setopts(0x3, r1, 0x0, 0x2000000000000000)

2018/04/21 01:46:13 executing program 2:
r0 = socket$inet6_tcp(0xa, 0x1, 0x0)
r1 = socket$inet6_tcp(0xa, 0x1, 0x0)
bind$inet6(r1, &(0x7f00001fefe4)={0xa, 0x4e22}, 0x1c)
listen(r1, 0x0)
sendto$inet6(r0, &(0x7f0000f6f000), 0x0, 0x20000004, &(0x7f0000cc7fe4)={0xa, 0x4e22}, 0x1c)
close(r0)
r2 = accept4(r1, &(0x7f0000c71000)=@alg, &(0x7f0000715ffc)=0x58, 0x0)
sendmmsg(r2, &(0x7f000000a200)=[{{0x0, 0x0, &(0x7f0000000600)}}, {{&(0x7f0000006040)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @multicast1=0xe0000001}}}, 0x80, &(0x7f00000061c0)=[{&(0x7f0000006080)='y', 0x1}], 0x1, &(0x7f0000006200)}}], 0x2, 0x4040800)

2018/04/21 01:46:13 executing program 1:
r0 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0)
fallocate(r0, 0x20, 0x0, 0x400)

[   83.972977] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies.  Check SNMP counters.
2018/04/21 01:46:14 executing program 7:
r0 = inotify_init()
r1 = epoll_create(0x6)
epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, &(0x7f00007a8000))

2018/04/21 01:46:14 executing program 4:
r0 = socket$inet_smc(0x2b, 0x1, 0x0)
listen(r0, 0x0)
poll(&(0x7f0000000200)=[{r0}], 0x1, 0x6)

2018/04/21 01:46:14 executing program 0:
r0 = socket$inet_smc(0x2b, 0x1, 0x0)
listen(r0, 0x0)
poll(&(0x7f0000000200)=[{r0}], 0x1, 0x6)

2018/04/21 01:46:14 executing program 1:
r0 = syz_open_dev$sndpcmp(&(0x7f0000000fee)='/dev/snd/pcmC#D#p\x00', 0x0, 0x81)
write$fuse(r0, &(0x7f0000002fd8)={0x28, 0x0, 0x0, @fuse_notify_inval_inode_out}, 0x28)

2018/04/21 01:46:14 executing program 2:
r0 = socket$inet6_tcp(0xa, 0x1, 0x0)
r1 = socket$inet6_tcp(0xa, 0x1, 0x0)
bind$inet6(r1, &(0x7f00001fefe4)={0xa, 0x4e22}, 0x1c)
listen(r1, 0x0)
sendto$inet6(r0, &(0x7f0000f6f000), 0x0, 0x20000004, &(0x7f0000cc7fe4)={0xa, 0x4e22}, 0x1c)
close(r0)
r2 = accept4(r1, &(0x7f0000c71000)=@alg, &(0x7f0000715ffc)=0x58, 0x0)
sendmmsg(r2, &(0x7f000000a200)=[{{0x0, 0x0, &(0x7f0000000600)}}, {{&(0x7f0000006040)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @multicast1=0xe0000001}}}, 0x80, &(0x7f00000061c0)=[{&(0x7f0000006080)='y', 0x1}], 0x1, &(0x7f0000006200)}}], 0x2, 0x4040800)

2018/04/21 01:46:14 executing program 5:
r0 = socket$inet6_tcp(0xa, 0x1, 0x0)
r1 = socket$inet6_tcp(0xa, 0x1, 0x0)
bind$inet6(r1, &(0x7f00001fefe4)={0xa, 0x4e22}, 0x1c)
listen(r1, 0x0)
sendto$inet6(r0, &(0x7f0000f6f000), 0x0, 0x20000004, &(0x7f0000cc7fe4)={0xa, 0x4e22}, 0x1c)
close(r0)
r2 = accept4(r1, &(0x7f0000c71000)=@alg, &(0x7f0000715ffc)=0x58, 0x0)
sendmmsg(r2, &(0x7f000000a200)=[{{0x0, 0x0, &(0x7f0000000600)}}, {{&(0x7f0000006040)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @multicast1=0xe0000001}}}, 0x80, &(0x7f00000061c0)=[{&(0x7f0000006080)='y', 0x1}], 0x1, &(0x7f0000006200)}}], 0x2, 0x4040800)

2018/04/21 01:46:14 executing program 6:
perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
r0 = socket$inet_tcp(0x2, 0x1, 0x0)
r1 = syz_open_dev$tun(&(0x7f0000000000)='/dev/net/tun\x00', 0x0, 0x0)
ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000340)={'syzkaller0\x00', 0xb})
ioctl$sock_inet_SIOCSARP(r0, 0x8955, &(0x7f00000002c0)={{0x2}, {0x0, @dev={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa]}}, 0xa, {0x2, 0x0, @rand_addr}, 'syzkaller0\x00'})

2018/04/21 01:46:14 executing program 3:
bpf$MAP_CREATE(0x0, &(0x7f0000346fd4)={0x0, 0x0, 0x0, 0x10bd}, 0x2c)
bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0x1, 0x5, &(0x7f0000346fc8)=@framed={{0x18}, [@alu={0x7, 0x1f, 0x1, 0x1, 0x1}], {0x95}}, &(0x7f000031cff6)='syzkaller\x00', 0x5c6e, 0x2f8, &(0x7f00001a7f05)=""/251}, 0x48)

2018/04/21 01:46:14 executing program 7:
r0 = inotify_init()
r1 = epoll_create(0x6)
epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, &(0x7f00007a8000))

2018/04/21 01:46:14 executing program 4:
r0 = socket$inet_smc(0x2b, 0x1, 0x0)
listen(r0, 0x0)
poll(&(0x7f0000000200)=[{r0}], 0x1, 0x6)

[   84.592155] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies.  Check SNMP counters.
[   84.592233] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies.  Check SNMP counters.
2018/04/21 01:46:14 executing program 1:
r0 = syz_open_dev$sndpcmp(&(0x7f0000000fee)='/dev/snd/pcmC#D#p\x00', 0x0, 0x81)
write$fuse(r0, &(0x7f0000002fd8)={0x28, 0x0, 0x0, @fuse_notify_inval_inode_out}, 0x28)

2018/04/21 01:46:14 executing program 0:
r0 = socket$inet_smc(0x2b, 0x1, 0x0)
listen(r0, 0x0)
poll(&(0x7f0000000200)=[{r0}], 0x1, 0x6)

2018/04/21 01:46:14 executing program 3:
bpf$MAP_CREATE(0x0, &(0x7f0000346fd4)={0x0, 0x0, 0x0, 0x10bd}, 0x2c)
bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0x1, 0x5, &(0x7f0000346fc8)=@framed={{0x18}, [@alu={0x7, 0x1f, 0x1, 0x1, 0x1}], {0x95}}, &(0x7f000031cff6)='syzkaller\x00', 0x5c6e, 0x2f8, &(0x7f00001a7f05)=""/251}, 0x48)

2018/04/21 01:46:14 executing program 5:
r0 = socket$inet6_tcp(0xa, 0x1, 0x0)
r1 = socket$inet6_tcp(0xa, 0x1, 0x0)
bind$inet6(r1, &(0x7f00001fefe4)={0xa, 0x4e22}, 0x1c)
listen(r1, 0x0)
sendto$inet6(r0, &(0x7f0000f6f000), 0x0, 0x20000004, &(0x7f0000cc7fe4)={0xa, 0x4e22}, 0x1c)
close(r0)
r2 = accept4(r1, &(0x7f0000c71000)=@alg, &(0x7f0000715ffc)=0x58, 0x0)
sendmmsg(r2, &(0x7f000000a200)=[{{0x0, 0x0, &(0x7f0000000600)}}, {{&(0x7f0000006040)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @multicast1=0xe0000001}}}, 0x80, &(0x7f00000061c0)=[{&(0x7f0000006080)='y', 0x1}], 0x1, &(0x7f0000006200)}}], 0x2, 0x4040800)

2018/04/21 01:46:14 executing program 7:
perf_event_open(&(0x7f0000348f88)={0x2, 0x70, 0x3e6}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
r0 = add_key$keyring(&(0x7f0000000040)='keyring\x00', &(0x7f0000000080)={0x73, 0x79, 0x7a}, 0x0, 0x0, 0xfffffffffffffffb)
keyctl$revoke(0xb, r0)

2018/04/21 01:46:14 executing program 4:
r0 = socket$inet_smc(0x2b, 0x1, 0x0)
listen(r0, 0x0)
poll(&(0x7f0000000200)=[{r0}], 0x1, 0x6)

2018/04/21 01:46:14 executing program 2:
r0 = socket$inet6_tcp(0xa, 0x1, 0x0)
r1 = socket$inet6_tcp(0xa, 0x1, 0x0)
bind$inet6(r1, &(0x7f00001fefe4)={0xa, 0x4e22}, 0x1c)
listen(r1, 0x0)
sendto$inet6(r0, &(0x7f0000f6f000), 0x0, 0x20000004, &(0x7f0000cc7fe4)={0xa, 0x4e22}, 0x1c)
close(r0)
r2 = accept4(r1, &(0x7f0000c71000)=@alg, &(0x7f0000715ffc)=0x58, 0x0)
sendmmsg(r2, &(0x7f000000a200)=[{{0x0, 0x0, &(0x7f0000000600)}}, {{&(0x7f0000006040)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @multicast1=0xe0000001}}}, 0x80, &(0x7f00000061c0)=[{&(0x7f0000006080)='y', 0x1}], 0x1, &(0x7f0000006200)}}], 0x2, 0x4040800)

2018/04/21 01:46:14 executing program 6:
perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
r0 = socket$inet_tcp(0x2, 0x1, 0x0)
r1 = syz_open_dev$tun(&(0x7f0000000000)='/dev/net/tun\x00', 0x0, 0x0)
ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000340)={'syzkaller0\x00', 0xb})
ioctl$sock_inet_SIOCSARP(r0, 0x8955, &(0x7f00000002c0)={{0x2}, {0x0, @dev={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa]}}, 0xa, {0x2, 0x0, @rand_addr}, 'syzkaller0\x00'})

2018/04/21 01:46:14 executing program 1:
r0 = syz_open_dev$sndpcmp(&(0x7f0000000fee)='/dev/snd/pcmC#D#p\x00', 0x0, 0x81)
write$fuse(r0, &(0x7f0000002fd8)={0x28, 0x0, 0x0, @fuse_notify_inval_inode_out}, 0x28)

[   84.864404] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies.  Check SNMP counters.
[   84.916703] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies.  Check SNMP counters.
2018/04/21 01:46:15 executing program 0:
r0 = socket$inet_smc(0x2b, 0x1, 0x0)
listen(r0, 0x0)
poll(&(0x7f0000000200)=[{r0}], 0x1, 0x6)

2018/04/21 01:46:15 executing program 3:
bpf$MAP_CREATE(0x0, &(0x7f0000346fd4)={0x0, 0x0, 0x0, 0x10bd}, 0x2c)
bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0x1, 0x5, &(0x7f0000346fc8)=@framed={{0x18}, [@alu={0x7, 0x1f, 0x1, 0x1, 0x1}], {0x95}}, &(0x7f000031cff6)='syzkaller\x00', 0x5c6e, 0x2f8, &(0x7f00001a7f05)=""/251}, 0x48)

2018/04/21 01:46:15 executing program 4:
r0 = socket(0x10, 0x80002, 0x0)
bind$netlink(r0, &(0x7f0000177ff4)={0x10, 0x0, 0x1}, 0xc)
write(r0, &(0x7f0000df8fd9)="2600000022004701050007008980e8ff06006d20002b1f00c0e9ff094a51f10101c7033500b0", 0x26)
connect$netlink(r0, &(0x7f0000000100)=@proc={0x10, 0x0, 0x1}, 0xc)
setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000b4bffc), 0x4)
sendto(r0, &(0x7f0000cfefee), 0x209, 0x0, 0x0, 0x0)
nanosleep(&(0x7f0000000280)={0x0, 0x1c9c380}, &(0x7f0000000380))
mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0)
prctl$intptr(0x2b, 0x0)
getsockopt$inet6_udp_int(0xffffffffffffffff, 0x11, 0x0, &(0x7f0000000000), &(0x7f0000000040)=0x4)

2018/04/21 01:46:15 executing program 7:
perf_event_open(&(0x7f0000348f88)={0x2, 0x70, 0x3e6}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
r0 = add_key$keyring(&(0x7f0000000040)='keyring\x00', &(0x7f0000000080)={0x73, 0x79, 0x7a}, 0x0, 0x0, 0xfffffffffffffffb)
keyctl$revoke(0xb, r0)

2018/04/21 01:46:15 executing program 1:
r0 = syz_open_dev$sndpcmp(&(0x7f0000000fee)='/dev/snd/pcmC#D#p\x00', 0x0, 0x81)
write$fuse(r0, &(0x7f0000002fd8)={0x28, 0x0, 0x0, @fuse_notify_inval_inode_out}, 0x28)

2018/04/21 01:46:15 executing program 2:
r0 = socket$inet6_tcp(0xa, 0x1, 0x0)
r1 = socket$inet6_tcp(0xa, 0x1, 0x0)
bind$inet6(r1, &(0x7f00001fefe4)={0xa, 0x4e22}, 0x1c)
listen(r1, 0x0)
sendto$inet6(r0, &(0x7f0000f6f000), 0x0, 0x20000004, &(0x7f0000cc7fe4)={0xa, 0x4e22}, 0x1c)
close(r0)
r2 = accept4(r1, &(0x7f0000c71000)=@alg, &(0x7f0000715ffc)=0x58, 0x0)
sendmmsg(r2, &(0x7f000000a200)=[{{0x0, 0x0, &(0x7f0000000600)}}, {{&(0x7f0000006040)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @multicast1=0xe0000001}}}, 0x80, &(0x7f00000061c0)=[{&(0x7f0000006080)='y', 0x1}], 0x1, &(0x7f0000006200)}}], 0x2, 0x4040800)

2018/04/21 01:46:15 executing program 6:
perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
r0 = socket$inet_tcp(0x2, 0x1, 0x0)
r1 = syz_open_dev$tun(&(0x7f0000000000)='/dev/net/tun\x00', 0x0, 0x0)
ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000340)={'syzkaller0\x00', 0xb})
ioctl$sock_inet_SIOCSARP(r0, 0x8955, &(0x7f00000002c0)={{0x2}, {0x0, @dev={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa]}}, 0xa, {0x2, 0x0, @rand_addr}, 'syzkaller0\x00'})

2018/04/21 01:46:15 executing program 5:
r0 = socket$inet6_tcp(0xa, 0x1, 0x0)
r1 = socket$inet6_tcp(0xa, 0x1, 0x0)
bind$inet6(r1, &(0x7f00001fefe4)={0xa, 0x4e22}, 0x1c)
listen(r1, 0x0)
sendto$inet6(r0, &(0x7f0000f6f000), 0x0, 0x20000004, &(0x7f0000cc7fe4)={0xa, 0x4e22}, 0x1c)
close(r0)
r2 = accept4(r1, &(0x7f0000c71000)=@alg, &(0x7f0000715ffc)=0x58, 0x0)
sendmmsg(r2, &(0x7f000000a200)=[{{0x0, 0x0, &(0x7f0000000600)}}, {{&(0x7f0000006040)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @multicast1=0xe0000001}}}, 0x80, &(0x7f00000061c0)=[{&(0x7f0000006080)='y', 0x1}], 0x1, &(0x7f0000006200)}}], 0x2, 0x4040800)

2018/04/21 01:46:15 executing program 7:
perf_event_open(&(0x7f0000348f88)={0x2, 0x70, 0x3e6}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
r0 = add_key$keyring(&(0x7f0000000040)='keyring\x00', &(0x7f0000000080)={0x73, 0x79, 0x7a}, 0x0, 0x0, 0xfffffffffffffffb)
keyctl$revoke(0xb, r0)

2018/04/21 01:46:15 executing program 0:
mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x0, 0x32, 0xffffffffffffffff, 0x0)
r0 = socket$nl_xfrm(0x10, 0x3, 0x6)
ioctl$sock_SIOCBRADDBR(r0, 0x89a0, &(0x7f0000000040)='ip6_vti0\x00')

[   85.087570] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies.  Check SNMP counters.
[   85.098681] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies.  Check SNMP counters.
2018/04/21 01:46:15 executing program 1:
capset(&(0x7f0000000040)={0x19980330}, &(0x7f0000804000))
shmat(0x0, &(0x7f0000ffc000/0x4000)=nil, 0x0)

2018/04/21 01:46:15 executing program 3:
bpf$MAP_CREATE(0x0, &(0x7f0000346fd4)={0x0, 0x0, 0x0, 0x10bd}, 0x2c)
bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0x1, 0x5, &(0x7f0000346fc8)=@framed={{0x18}, [@alu={0x7, 0x1f, 0x1, 0x1, 0x1}], {0x95}}, &(0x7f000031cff6)='syzkaller\x00', 0x5c6e, 0x2f8, &(0x7f00001a7f05)=""/251}, 0x48)

2018/04/21 01:46:15 executing program 5:
r0 = syz_open_dev$evdev(&(0x7f0000000180)='/dev/input/event#\x00', 0x2, 0x2)
write$evdev(r0, &(0x7f0000000240)=[{{0x0, 0x2710}, 0x4, 0x4}, {}], 0x30)

2018/04/21 01:46:15 executing program 2:
r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x0, 0x0)
r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0)
ioctl$KDGKBLED(0xffffffffffffffff, 0x4b64, &(0x7f0000001640))
r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0)
ioctl$KVM_SET_SIGNAL_MASK(r2, 0x4004ae8b, &(0x7f0000001680)={0x8, "b3b75cda919b1d38"})

2018/04/21 01:46:15 executing program 6:
perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
r0 = socket$inet_tcp(0x2, 0x1, 0x0)
r1 = syz_open_dev$tun(&(0x7f0000000000)='/dev/net/tun\x00', 0x0, 0x0)
ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000340)={'syzkaller0\x00', 0xb})
ioctl$sock_inet_SIOCSARP(r0, 0x8955, &(0x7f00000002c0)={{0x2}, {0x0, @dev={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa]}}, 0xa, {0x2, 0x0, @rand_addr}, 'syzkaller0\x00'})

2018/04/21 01:46:15 executing program 0:
mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x0, 0x32, 0xffffffffffffffff, 0x0)
r0 = socket$nl_xfrm(0x10, 0x3, 0x6)
ioctl$sock_SIOCBRADDBR(r0, 0x89a0, &(0x7f0000000040)='ip6_vti0\x00')

[   85.236508] capability: warning: `syz-executor1' uses 32-bit capabilities (legacy support in use)
2018/04/21 01:46:16 executing program 7:
perf_event_open(&(0x7f0000348f88)={0x2, 0x70, 0x3e6}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
r0 = add_key$keyring(&(0x7f0000000040)='keyring\x00', &(0x7f0000000080)={0x73, 0x79, 0x7a}, 0x0, 0x0, 0xfffffffffffffffb)
keyctl$revoke(0xb, r0)

2018/04/21 01:46:16 executing program 1:
perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
perf_event_open(&(0x7f0000b5a000)={0x0, 0x70, 0x1e2}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
openat$rfkill(0xffffffffffffff9c, &(0x7f0000000140)='/dev/rfkill\x00', 0x0, 0x0)
capset(&(0x7f0000000340)={0x19980330}, &(0x7f0000000080))
r0 = getpid()
sched_setaffinity(r0, 0x8, &(0x7f0000000100))
getsockname$packet(0xffffffffffffffff, &(0x7f00000028c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @random}, &(0x7f0000002900)=0x14)

2018/04/21 01:46:16 executing program 3:
umount2(&(0x7f00000006c0)='//file0\x00', 0x0)
open$dir(&(0x7f00000001c0)='./file0\x00', 0x1fffe, 0x0)
r0 = open$dir(&(0x7f00000002c0)='./file0\x00', 0x2, 0x0)
ioctl$sock_inet_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f0000000440)={0x3, {0x2, 0x0, @loopback=0x7f000001}, {0x2, 0x0, @broadcast=0xffffffff}, {0x2, 0x0, @loopback=0x7f000001}, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000300)='sit0\x00'})
write(r0, &(0x7f0000001300)="d88a8d38144e5013d473c0ac2ca61ff3b749a4f5c7e6e9c2ce586e5cfca5d60ffc9a4df71856925b300ab39b1dd59238", 0x30)
sendfile(r0, r0, &(0x7f0000000040), 0x7527fb3200000000)
syz_mount_image$iso9660(&(0x7f00000003c0)='iso9660\x00', &(0x7f00000014c0)='//file0\x00', 0x7, 0x0, &(0x7f0000003c80), 0x2, &(0x7f0000000100)=ANY=[])
r1 = open$dir(&(0x7f0000000000)='./file0\x00', 0x0, 0x100)
r2 = open(&(0x7f0000000080)='./file0\x00', 0x4001, 0x0)
truncate(&(0x7f0000000400)='./file0\x00', 0x10009)
sendfile(r2, r1, &(0x7f0000002b80), 0x7fffffff)
r3 = open(&(0x7f0000000240)='./file0\x00', 0x141042, 0xfffffffffffffffe)
fallocate(r3, 0x1, 0x0, 0x10000101)

2018/04/21 01:46:16 executing program 5:
r0 = syz_open_dev$evdev(&(0x7f0000000180)='/dev/input/event#\x00', 0x2, 0x2)
write$evdev(r0, &(0x7f0000000240)=[{{0x0, 0x2710}, 0x4, 0x4}, {}], 0x30)

2018/04/21 01:46:16 executing program 0:
mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x0, 0x32, 0xffffffffffffffff, 0x0)
r0 = socket$nl_xfrm(0x10, 0x3, 0x6)
ioctl$sock_SIOCBRADDBR(r0, 0x89a0, &(0x7f0000000040)='ip6_vti0\x00')

2018/04/21 01:46:16 executing program 2:
r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x0, 0x0)
r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0)
ioctl$KDGKBLED(0xffffffffffffffff, 0x4b64, &(0x7f0000001640))
r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0)
ioctl$KVM_SET_SIGNAL_MASK(r2, 0x4004ae8b, &(0x7f0000001680)={0x8, "b3b75cda919b1d38"})

2018/04/21 01:46:16 executing program 4:
r0 = socket(0x10, 0x80002, 0x0)
bind$netlink(r0, &(0x7f0000177ff4)={0x10, 0x0, 0x1}, 0xc)
write(r0, &(0x7f0000df8fd9)="2600000022004701050007008980e8ff06006d20002b1f00c0e9ff094a51f10101c7033500b0", 0x26)
connect$netlink(r0, &(0x7f0000000100)=@proc={0x10, 0x0, 0x1}, 0xc)
setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000b4bffc), 0x4)
sendto(r0, &(0x7f0000cfefee), 0x209, 0x0, 0x0, 0x0)
nanosleep(&(0x7f0000000280)={0x0, 0x1c9c380}, &(0x7f0000000380))
mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0)
prctl$intptr(0x2b, 0x0)
getsockopt$inet6_udp_int(0xffffffffffffffff, 0x11, 0x0, &(0x7f0000000000), &(0x7f0000000040)=0x4)

2018/04/21 01:46:16 executing program 6:
r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/kvm\x00', 0x0, 0x0)
r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0)
ioctl$KVM_X86_SETUP_MCE(0xffffffffffffffff, 0x4008ae9c, &(0x7f0000000000)={0x10})
syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, &(0x7f00000000c0)=[@text16={0x10, &(0x7f0000000300)="c16a00012e260f01ca0f300f350f20e06635000100000f22e066b8ef0000000f23c80f21f866350c00e0000f23f80f21976766c7442400a56c05676766c7442402af3f00006766c744240600000000670f011424b8f1008ee80faeaf0100", 0x5e}], 0x1, 0x0, &(0x7f0000000100), 0x0)
setsockopt$RDS_GET_MR(0xffffffffffffffff, 0x114, 0x2, &(0x7f0000000100)={{&(0x7f0000000040)=""/38, 0x26}, &(0x7f0000000080)}, 0x20)
sendmsg$key(0xffffffffffffffff, &(0x7f0000001000)={0x0, 0x0, &(0x7f0000182000)={&(0x7f00000001c0)=ANY=[@ANYBLOB="020d00001400000000000000000000000800120000000300000000000000000006000000000000000000000000000000e00000000001000000000000000000000000000000000000000000030006000000000002000000ac14ffbb0000000000000000030000000000000002000000ac14ffbb000000000000000004"], 0x7c}, 0x1}, 0x0)
chroot(&(0x7f0000000140)='./file0\x00')
bind$vsock_stream(0xffffffffffffffff, &(0x7f0000000180)={0x28, 0x0, 0x0, @any=0xffffffff}, 0x10)
r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0)
getsockname$packet(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @link_local}, &(0x7f00000002c0)=0x14)
ioctl$KVM_RUN(r2, 0xae80, 0x0)
ioctl$KVM_RUN(r2, 0xae80, 0x0)

2018/04/21 01:46:16 executing program 5:
r0 = syz_open_dev$evdev(&(0x7f0000000180)='/dev/input/event#\x00', 0x2, 0x2)
write$evdev(r0, &(0x7f0000000240)=[{{0x0, 0x2710}, 0x4, 0x4}, {}], 0x30)

2018/04/21 01:46:16 executing program 7:
r0 = memfd_create(&(0x7f0000002000)="2f7b06003170707031253a656d30f9", 0x0)
write$evdev(r0, &(0x7f0000001000)=[{{}, 0x0, 0x0, 0x80000004}], 0x18)
mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x4, 0x11, r0, 0x0)
timer_settime(0x0, 0x0, &(0x7f0000001000)={{}, {0x0, 0x989680}}, &(0x7f0000005000))

2018/04/21 01:46:16 executing program 0:
mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x0, 0x32, 0xffffffffffffffff, 0x0)
r0 = socket$nl_xfrm(0x10, 0x3, 0x6)
ioctl$sock_SIOCBRADDBR(r0, 0x89a0, &(0x7f0000000040)='ip6_vti0\x00')

2018/04/21 01:46:16 executing program 2:
r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x0, 0x0)
r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0)
ioctl$KDGKBLED(0xffffffffffffffff, 0x4b64, &(0x7f0000001640))
r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0)
ioctl$KVM_SET_SIGNAL_MASK(r2, 0x4004ae8b, &(0x7f0000001680)={0x8, "b3b75cda919b1d38"})

2018/04/21 01:46:16 executing program 1:
perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
perf_event_open(&(0x7f0000b5a000)={0x0, 0x70, 0x1e2}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
openat$rfkill(0xffffffffffffff9c, &(0x7f0000000140)='/dev/rfkill\x00', 0x0, 0x0)
capset(&(0x7f0000000340)={0x19980330}, &(0x7f0000000080))
r0 = getpid()
sched_setaffinity(r0, 0x8, &(0x7f0000000100))
getsockname$packet(0xffffffffffffffff, &(0x7f00000028c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @random}, &(0x7f0000002900)=0x14)

[   87.033104] ISOFS: Unable to identify CD-ROM format.
[   87.270044] ISOFS: Unable to identify CD-ROM format.
2018/04/21 01:46:17 executing program 5:
r0 = syz_open_dev$evdev(&(0x7f0000000180)='/dev/input/event#\x00', 0x2, 0x2)
write$evdev(r0, &(0x7f0000000240)=[{{0x0, 0x2710}, 0x4, 0x4}, {}], 0x30)

2018/04/21 01:46:17 executing program 0:
perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
perf_event_open(&(0x7f0000b5a000)={0x0, 0x70, 0x1e2}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
openat$rfkill(0xffffffffffffff9c, &(0x7f0000000140)='/dev/rfkill\x00', 0x0, 0x0)
capset(&(0x7f0000000340)={0x19980330}, &(0x7f0000000080))
r0 = getpid()
sched_setaffinity(r0, 0x8, &(0x7f0000000100))
getsockname$packet(0xffffffffffffffff, &(0x7f00000028c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @random}, &(0x7f0000002900)=0x14)

2018/04/21 01:46:17 executing program 6:
r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/kvm\x00', 0x0, 0x0)
r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0)
ioctl$KVM_X86_SETUP_MCE(0xffffffffffffffff, 0x4008ae9c, &(0x7f0000000000)={0x10})
syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, &(0x7f00000000c0)=[@text16={0x10, &(0x7f0000000300)="c16a00012e260f01ca0f300f350f20e06635000100000f22e066b8ef0000000f23c80f21f866350c00e0000f23f80f21976766c7442400a56c05676766c7442402af3f00006766c744240600000000670f011424b8f1008ee80faeaf0100", 0x5e}], 0x1, 0x0, &(0x7f0000000100), 0x0)
setsockopt$RDS_GET_MR(0xffffffffffffffff, 0x114, 0x2, &(0x7f0000000100)={{&(0x7f0000000040)=""/38, 0x26}, &(0x7f0000000080)}, 0x20)
sendmsg$key(0xffffffffffffffff, &(0x7f0000001000)={0x0, 0x0, &(0x7f0000182000)={&(0x7f00000001c0)=ANY=[@ANYBLOB="020d00001400000000000000000000000800120000000300000000000000000006000000000000000000000000000000e00000000001000000000000000000000000000000000000000000030006000000000002000000ac14ffbb0000000000000000030000000000000002000000ac14ffbb000000000000000004"], 0x7c}, 0x1}, 0x0)
chroot(&(0x7f0000000140)='./file0\x00')
bind$vsock_stream(0xffffffffffffffff, &(0x7f0000000180)={0x28, 0x0, 0x0, @any=0xffffffff}, 0x10)
r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0)
getsockname$packet(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @link_local}, &(0x7f00000002c0)=0x14)
ioctl$KVM_RUN(r2, 0xae80, 0x0)
ioctl$KVM_RUN(r2, 0xae80, 0x0)

2018/04/21 01:46:17 executing program 1:
perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
perf_event_open(&(0x7f0000b5a000)={0x0, 0x70, 0x1e2}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
openat$rfkill(0xffffffffffffff9c, &(0x7f0000000140)='/dev/rfkill\x00', 0x0, 0x0)
capset(&(0x7f0000000340)={0x19980330}, &(0x7f0000000080))
r0 = getpid()
sched_setaffinity(r0, 0x8, &(0x7f0000000100))
getsockname$packet(0xffffffffffffffff, &(0x7f00000028c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @random}, &(0x7f0000002900)=0x14)

2018/04/21 01:46:17 executing program 7:
r0 = memfd_create(&(0x7f0000002000)="2f7b06003170707031253a656d30f9", 0x0)
write$evdev(r0, &(0x7f0000001000)=[{{}, 0x0, 0x0, 0x80000004}], 0x18)
mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x4, 0x11, r0, 0x0)
timer_settime(0x0, 0x0, &(0x7f0000001000)={{}, {0x0, 0x989680}}, &(0x7f0000005000))

2018/04/21 01:46:17 executing program 2:
r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x0, 0x0)
r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0)
ioctl$KDGKBLED(0xffffffffffffffff, 0x4b64, &(0x7f0000001640))
r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0)
ioctl$KVM_SET_SIGNAL_MASK(r2, 0x4004ae8b, &(0x7f0000001680)={0x8, "b3b75cda919b1d38"})

2018/04/21 01:46:17 executing program 3:
umount2(&(0x7f00000006c0)='//file0\x00', 0x0)
open$dir(&(0x7f00000001c0)='./file0\x00', 0x1fffe, 0x0)
r0 = open$dir(&(0x7f00000002c0)='./file0\x00', 0x2, 0x0)
ioctl$sock_inet_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f0000000440)={0x3, {0x2, 0x0, @loopback=0x7f000001}, {0x2, 0x0, @broadcast=0xffffffff}, {0x2, 0x0, @loopback=0x7f000001}, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000300)='sit0\x00'})
write(r0, &(0x7f0000001300)="d88a8d38144e5013d473c0ac2ca61ff3b749a4f5c7e6e9c2ce586e5cfca5d60ffc9a4df71856925b300ab39b1dd59238", 0x30)
sendfile(r0, r0, &(0x7f0000000040), 0x7527fb3200000000)
syz_mount_image$iso9660(&(0x7f00000003c0)='iso9660\x00', &(0x7f00000014c0)='//file0\x00', 0x7, 0x0, &(0x7f0000003c80), 0x2, &(0x7f0000000100)=ANY=[])
r1 = open$dir(&(0x7f0000000000)='./file0\x00', 0x0, 0x100)
r2 = open(&(0x7f0000000080)='./file0\x00', 0x4001, 0x0)
truncate(&(0x7f0000000400)='./file0\x00', 0x10009)
sendfile(r2, r1, &(0x7f0000002b80), 0x7fffffff)
r3 = open(&(0x7f0000000240)='./file0\x00', 0x141042, 0xfffffffffffffffe)
fallocate(r3, 0x1, 0x0, 0x10000101)

2018/04/21 01:46:17 executing program 4:
r0 = socket(0x10, 0x80002, 0x0)
bind$netlink(r0, &(0x7f0000177ff4)={0x10, 0x0, 0x1}, 0xc)
write(r0, &(0x7f0000df8fd9)="2600000022004701050007008980e8ff06006d20002b1f00c0e9ff094a51f10101c7033500b0", 0x26)
connect$netlink(r0, &(0x7f0000000100)=@proc={0x10, 0x0, 0x1}, 0xc)
setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000b4bffc), 0x4)
sendto(r0, &(0x7f0000cfefee), 0x209, 0x0, 0x0, 0x0)
nanosleep(&(0x7f0000000280)={0x0, 0x1c9c380}, &(0x7f0000000380))
mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0)
prctl$intptr(0x2b, 0x0)
getsockopt$inet6_udp_int(0xffffffffffffffff, 0x11, 0x0, &(0x7f0000000000), &(0x7f0000000040)=0x4)

[   87.423504] syz-executor3 (7520) used greatest stack depth: 15400 bytes left
2018/04/21 01:46:17 executing program 5:
umount2(&(0x7f00000006c0)='//file0\x00', 0x0)
open$dir(&(0x7f00000001c0)='./file0\x00', 0x1fffe, 0x0)
r0 = open$dir(&(0x7f00000002c0)='./file0\x00', 0x2, 0x0)
ioctl$sock_inet_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f0000000440)={0x3, {0x2, 0x0, @loopback=0x7f000001}, {0x2, 0x0, @broadcast=0xffffffff}, {0x2, 0x0, @loopback=0x7f000001}, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000300)='sit0\x00'})
write(r0, &(0x7f0000001300)="d88a8d38144e5013d473c0ac2ca61ff3b749a4f5c7e6e9c2ce586e5cfca5d60ffc9a4df71856925b300ab39b1dd59238", 0x30)
sendfile(r0, r0, &(0x7f0000000040), 0x7527fb3200000000)
syz_mount_image$iso9660(&(0x7f00000003c0)='iso9660\x00', &(0x7f00000014c0)='//file0\x00', 0x7, 0x0, &(0x7f0000003c80), 0x2, &(0x7f0000000100)=ANY=[])
r1 = open$dir(&(0x7f0000000000)='./file0\x00', 0x0, 0x100)
r2 = open(&(0x7f0000000080)='./file0\x00', 0x4001, 0x0)
truncate(&(0x7f0000000400)='./file0\x00', 0x10009)
sendfile(r2, r1, &(0x7f0000002b80), 0x7fffffff)
r3 = open(&(0x7f0000000240)='./file0\x00', 0x141042, 0xfffffffffffffffe)
fallocate(r3, 0x1, 0x0, 0x10000101)

2018/04/21 01:46:17 executing program 2:
r0 = syz_init_net_socket$llc(0x1a, 0x1, 0x0)
getsockname$llc(r0, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @remote}, &(0x7f0000000080)=0x10)

2018/04/21 01:46:17 executing program 7:
r0 = memfd_create(&(0x7f0000002000)="2f7b06003170707031253a656d30f9", 0x0)
write$evdev(r0, &(0x7f0000001000)=[{{}, 0x0, 0x0, 0x80000004}], 0x18)
mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x4, 0x11, r0, 0x0)
timer_settime(0x0, 0x0, &(0x7f0000001000)={{}, {0x0, 0x989680}}, &(0x7f0000005000))

2018/04/21 01:46:17 executing program 0:
perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
perf_event_open(&(0x7f0000b5a000)={0x0, 0x70, 0x1e2}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
openat$rfkill(0xffffffffffffff9c, &(0x7f0000000140)='/dev/rfkill\x00', 0x0, 0x0)
capset(&(0x7f0000000340)={0x19980330}, &(0x7f0000000080))
r0 = getpid()
sched_setaffinity(r0, 0x8, &(0x7f0000000100))
getsockname$packet(0xffffffffffffffff, &(0x7f00000028c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @random}, &(0x7f0000002900)=0x14)

2018/04/21 01:46:17 executing program 1:
perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
perf_event_open(&(0x7f0000b5a000)={0x0, 0x70, 0x1e2}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
openat$rfkill(0xffffffffffffff9c, &(0x7f0000000140)='/dev/rfkill\x00', 0x0, 0x0)
capset(&(0x7f0000000340)={0x19980330}, &(0x7f0000000080))
r0 = getpid()
sched_setaffinity(r0, 0x8, &(0x7f0000000100))
getsockname$packet(0xffffffffffffffff, &(0x7f00000028c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @random}, &(0x7f0000002900)=0x14)

[   87.650258] ==================================================================
[   87.658383] BUG: KASAN: null-ptr-deref in refcount_inc_not_zero+0x8f/0x2d0
[   87.665405] Read of size 4 at addr 0000000000000004 by task syz-executor2/7543
[   87.672763] 
[   87.674407] CPU: 0 PID: 7543 Comm: syz-executor2 Not tainted 4.17.0-rc1+ #10
[   87.681595] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011
[   87.690952] Call Trace:
[   87.693540]  dump_stack+0x1b9/0x294
[   87.697158]  ? dump_stack_print_info.cold.2+0x52/0x52
[   87.702341]  ? kasan_check_write+0x14/0x20
[   87.706563]  ? do_raw_spin_lock+0xc1/0x200
[   87.710785]  ? vprintk_func+0x81/0xe7
[   87.714575]  ? refcount_inc_not_zero+0x8f/0x2d0
[   87.719230]  kasan_report.cold.7+0x6d/0x2fe
[   87.723542]  check_memory_region+0x13e/0x1b0
[   87.727944]  kasan_check_read+0x11/0x20
[   87.731904]  refcount_inc_not_zero+0x8f/0x2d0
[   87.736393]  ? refcount_add_not_zero+0x320/0x320
[   87.741136]  ? trace_hardirqs_on_caller+0x421/0x5c0
[   87.746148]  ? lock_sock_nested+0x9f/0x120
[   87.750383]  refcount_inc+0x15/0x70
[   87.754017]  llc_ui_release+0xba/0x2b0
[   87.757903]  ? fsnotify_first_mark+0x330/0x330
[   87.762478]  sock_release+0x96/0x1b0
[   87.766273]  ? sock_alloc_file+0x4e0/0x4e0
[   87.770495]  sock_close+0x16/0x20
[   87.773941]  __fput+0x34d/0x890
[   87.777227]  ? fput+0x1a0/0x1a0
[   87.780511]  ? _raw_spin_unlock_irq+0x27/0x70
[   87.784993]  ____fput+0x15/0x20
[   87.788261]  task_work_run+0x1e4/0x290
[   87.792146]  ? task_work_cancel+0x240/0x240
[   87.796459]  ? switch_task_namespaces+0xbd/0xd0
[   87.801118]  do_exit+0x1aee/0x2730
[   87.804670]  ? mm_update_next_owner+0x980/0x980
[   87.809324]  ? print_usage_bug+0xc0/0xc0
[   87.813373]  ? check_same_owner+0x320/0x320
[   87.817783]  ? do_raw_spin_unlock+0x9e/0x2e0
[   87.822180]  ? rcu_note_context_switch+0x710/0x710
[   87.827093]  ? lock_acquire+0x1dc/0x520
[   87.831143]  ? __might_sleep+0x95/0x190
[   87.835105]  ? __sanitizer_cov_trace_const_cmp4+0x16/0x20
[   87.840629]  ? __lock_acquire+0x7f5/0x5140
[   87.844853]  ? kasan_check_write+0x14/0x20
[   87.849089]  ? do_raw_spin_lock+0xc1/0x200
[   87.853319]  ? __sanitizer_cov_trace_const_cmp4+0x16/0x20
[   87.858846]  ? debug_check_no_locks_freed+0x310/0x310
[   87.864036]  ? __sanitizer_cov_trace_switch+0x53/0x90
[   87.869214]  ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20
[   87.874735]  ? drop_futex_key_refs.isra.13+0x6d/0xe0
[   87.879824]  ? futex_wait+0x5c1/0x9f0
[   87.883610]  ? perf_trace_lock+0xd6/0x900
[   87.887748]  ? zap_class+0x720/0x720
[   87.891449]  ? __sanitizer_cov_trace_switch+0x53/0x90
[   87.896626]  ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20
[   87.902148]  ? drop_futex_key_refs.isra.13+0x6d/0xe0
[   87.907236]  ? futex_wake+0x2f6/0x750
[   87.911037]  ? graph_lock+0x170/0x170
[   87.914829]  ? memset+0x31/0x40
[   87.918097]  ? find_held_lock+0x36/0x1c0
[   87.922149]  ? lock_downgrade+0x8e0/0x8e0
[   87.926290]  do_group_exit+0x16f/0x430
[   87.930164]  ? do_raw_spin_trylock+0x1b0/0x1b0
[   87.934732]  ? __ia32_sys_exit+0x50/0x50
[   87.938779]  ? _raw_spin_unlock_irq+0x27/0x70
[   87.943262]  ? trace_hardirqs_on_caller+0x421/0x5c0
[   87.948267]  get_signal+0x886/0x1960
[   87.951973]  ? ptrace_notify+0x130/0x130
[   87.956028]  ? graph_lock+0x170/0x170
[   87.959814]  ? rcu_is_watching+0x85/0x140
[   87.963951]  ? mntput_no_expire+0x186/0xba0
[   87.968258]  ? dentry_kill+0xce/0x5a0
[   87.972043]  ? mnt_get_count+0x150/0x150
[   87.976091]  ? find_held_lock+0x36/0x1c0
[   87.980141]  do_signal+0x98/0x2040
[   87.983670]  ? lock_downgrade+0x8e0/0x8e0
[   87.987805]  ? setup_sigcontext+0x7d0/0x7d0
[   87.992114]  ? kasan_check_read+0x11/0x20
[   87.996257]  ? do_raw_spin_unlock+0x9e/0x2e0
[   88.000653]  ? do_raw_spin_trylock+0x1b0/0x1b0
[   88.005226]  ? _raw_spin_unlock_irq+0x27/0x70
[   88.009707]  ? trace_hardirqs_on_caller+0x421/0x5c0
[   88.014720]  ? exit_to_usermode_loop+0x87/0x310
[   88.019377]  exit_to_usermode_loop+0x28a/0x310
[   88.023946]  ? syscall_slow_exit_work+0x4f0/0x4f0
[   88.028773]  ? fput+0x130/0x1a0
[   88.032042]  ? do_syscall_64+0x92/0x800
[   88.036006]  do_syscall_64+0x6ac/0x800
[   88.039884]  ? finish_task_switch+0x1ca/0x810
[   88.044372]  ? syscall_return_slowpath+0x5c0/0x5c0
[   88.049290]  ? syscall_return_slowpath+0x30f/0x5c0
[   88.054205]  ? entry_SYSCALL_64_after_hwframe+0x59/0xbe
[   88.059558]  ? trace_hardirqs_off_thunk+0x1a/0x1c
[   88.064388]  entry_SYSCALL_64_after_hwframe+0x49/0xbe
[   88.069565] RIP: 0033:0x455389
[   88.072736] RSP: 002b:00007f0bc1a26ce8 EFLAGS: 00000246 ORIG_RAX: 00000000000000ca
[   88.080427] RAX: 0000000000000000 RBX: 000000000072bec8 RCX: 0000000000455389
[   88.087681] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 000000000072bec8
[   88.095121] RBP: 000000000072bec8 R08: 0000000000000000 R09: 000000000072bea0
[   88.102372] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000
[   88.109626] R13: 00007ffdb5b2541f R14: 00007f0bc1a279c0 R15: 0000000000000000
[   88.116905] ==================================================================
[   88.124251] Disabling lock debugging due to kernel taint
[   88.129958] Kernel panic - not syncing: panic_on_warn set ...
[   88.129958] 
[   88.137328] CPU: 0 PID: 7543 Comm: syz-executor2 Tainted: G    B             4.17.0-rc1+ #10
[   88.145899] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011
[   88.155245] Call Trace:
[   88.157836]  dump_stack+0x1b9/0x294
[   88.161465]  ? dump_stack_print_info.cold.2+0x52/0x52
[   88.166659]  ? trace_hardirqs_on_thunk+0x1a/0x1c
[   88.171425]  ? refcount_add_not_zero+0x300/0x320
[   88.176186]  panic+0x22f/0x4de
[   88.179381]  ? add_taint.cold.5+0x16/0x16
[   88.183534]  ? do_raw_spin_unlock+0x9e/0x2e0
[   88.187945]  ? do_raw_spin_unlock+0x9e/0x2e0
[   88.192364]  ? refcount_inc_not_zero+0x8f/0x2d0
[   88.197031]  kasan_end_report+0x47/0x4f
[   88.201003]  kasan_report.cold.7+0x76/0x2fe
[   88.205333]  check_memory_region+0x13e/0x1b0
[   88.209744]  kasan_check_read+0x11/0x20
[   88.213720]  refcount_inc_not_zero+0x8f/0x2d0
[   88.218221]  ? refcount_add_not_zero+0x320/0x320
[   88.222978]  ? trace_hardirqs_on_caller+0x421/0x5c0
[   88.228002]  ? lock_sock_nested+0x9f/0x120
[   88.232245]  refcount_inc+0x15/0x70
[   88.235880]  llc_ui_release+0xba/0x2b0
[   88.239767]  ? fsnotify_first_mark+0x330/0x330
[   88.244355]  sock_release+0x96/0x1b0
[   88.248074]  ? sock_alloc_file+0x4e0/0x4e0
[   88.252318]  sock_close+0x16/0x20
[   88.255774]  __fput+0x34d/0x890
[   88.259057]  ? fput+0x1a0/0x1a0
[   88.262346]  ? _raw_spin_unlock_irq+0x27/0x70
[   88.266892]  ____fput+0x15/0x20
[   88.270173]  task_work_run+0x1e4/0x290
[   88.274066]  ? task_work_cancel+0x240/0x240
[   88.278391]  ? switch_task_namespaces+0xbd/0xd0
[   88.283066]  do_exit+0x1aee/0x2730
[   88.286612]  ? mm_update_next_owner+0x980/0x980
[   88.291283]  ? print_usage_bug+0xc0/0xc0
[   88.295347]  ? check_same_owner+0x320/0x320
[   88.299670]  ? do_raw_spin_unlock+0x9e/0x2e0
[   88.304082]  ? rcu_note_context_switch+0x710/0x710
[   88.309016]  ? lock_acquire+0x1dc/0x520
[   88.313001]  ? __might_sleep+0x95/0x190
[   88.316991]  ? __sanitizer_cov_trace_const_cmp4+0x16/0x20
[   88.322536]  ? __lock_acquire+0x7f5/0x5140
[   88.326870]  ? kasan_check_write+0x14/0x20
[   88.331114]  ? do_raw_spin_lock+0xc1/0x200
[   88.335356]  ? __sanitizer_cov_trace_const_cmp4+0x16/0x20
[   88.340906]  ? debug_check_no_locks_freed+0x310/0x310
[   88.346106]  ? __sanitizer_cov_trace_switch+0x53/0x90
[   88.351305]  ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20
[   88.354994] ISOFS: Unable to identify CD-ROM format.
[   88.356845]  ? drop_futex_key_refs.isra.13+0x6d/0xe0
[   88.356859]  ? futex_wait+0x5c1/0x9f0
[   88.356878]  ? perf_trace_lock+0xd6/0x900
[   88.356894]  ? zap_class+0x720/0x720
[   88.378724]  ? __sanitizer_cov_trace_switch+0x53/0x90
[   88.383924]  ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20
[   88.389466]  ? drop_futex_key_refs.isra.13+0x6d/0xe0
[   88.394575]  ? futex_wake+0x2f6/0x750
[   88.398378]  ? graph_lock+0x170/0x170
[   88.402191]  ? memset+0x31/0x40
[   88.405476]  ? find_held_lock+0x36/0x1c0
[   88.409546]  ? lock_downgrade+0x8e0/0x8e0
[   88.413705]  do_group_exit+0x16f/0x430
[   88.417600]  ? do_raw_spin_trylock+0x1b0/0x1b0
[   88.422274]  ? __ia32_sys_exit+0x50/0x50
[   88.426353]  ? _raw_spin_unlock_irq+0x27/0x70
[   88.430853]  ? trace_hardirqs_on_caller+0x421/0x5c0
[   88.435895]  get_signal+0x886/0x1960
[   88.439620]  ? ptrace_notify+0x130/0x130
[   88.440790] ISOFS: Unable to identify CD-ROM format.
[   88.443684]  ? graph_lock+0x170/0x170
[   88.443699]  ? rcu_is_watching+0x85/0x140
[   88.443715]  ? mntput_no_expire+0x186/0xba0
[   88.443728]  ? dentry_kill+0xce/0x5a0
[   88.443739]  ? mnt_get_count+0x150/0x150
[   88.443754]  ? find_held_lock+0x36/0x1c0
[   88.472998]  do_signal+0x98/0x2040
[   88.476545]  ? lock_downgrade+0x8e0/0x8e0
[   88.480699]  ? setup_sigcontext+0x7d0/0x7d0
[   88.485030]  ? kasan_check_read+0x11/0x20
[   88.489189]  ? do_raw_spin_unlock+0x9e/0x2e0
[   88.493599]  ? do_raw_spin_trylock+0x1b0/0x1b0
[   88.498190]  ? _raw_spin_unlock_irq+0x27/0x70
[   88.502720]  ? trace_hardirqs_on_caller+0x421/0x5c0
[   88.507748]  ? exit_to_usermode_loop+0x87/0x310
[   88.512420]  exit_to_usermode_loop+0x28a/0x310
[   88.516991]  ? syscall_slow_exit_work+0x4f0/0x4f0
[   88.521824]  ? fput+0x130/0x1a0
[   88.525087]  ? do_syscall_64+0x92/0x800
[   88.529048]  do_syscall_64+0x6ac/0x800
[   88.532925]  ? finish_task_switch+0x1ca/0x810
[   88.537406]  ? syscall_return_slowpath+0x5c0/0x5c0
[   88.542320]  ? syscall_return_slowpath+0x30f/0x5c0
[   88.547245]  ? entry_SYSCALL_64_after_hwframe+0x59/0xbe
[   88.552598]  ? trace_hardirqs_off_thunk+0x1a/0x1c
[   88.557436]  entry_SYSCALL_64_after_hwframe+0x49/0xbe
[   88.562606] RIP: 0033:0x455389
[   88.565778] RSP: 002b:00007f0bc1a26ce8 EFLAGS: 00000246 ORIG_RAX: 00000000000000ca
[   88.573479] RAX: 0000000000000000 RBX: 000000000072bec8 RCX: 0000000000455389
[   88.580732] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 000000000072bec8
[   88.587993] RBP: 000000000072bec8 R08: 0000000000000000 R09: 000000000072bea0
[   88.595255] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000
[   88.602593] R13: 00007ffdb5b2541f R14: 00007f0bc1a279c0 R15: 0000000000000000
[   88.610398] Dumping ftrace buffer:
[   88.613921]    (ftrace buffer empty)
[   88.617607] Kernel Offset: disabled
[   88.621215] Rebooting in 86400 seconds..