INIT: Entering runlevel: 2 [info] Using makefile-style concurrent boot in runlevel 2. [....] Starting enhanced syslogd: rsyslogd[?25l[?1c7[ ok 8[?25h[?0c. [....] Starting periodic command scheduler: cron[?25l[?1c7[ ok 8[?25h[?0c. [....] Starting OpenBSD Secure Shell server: sshd[?25l[?1c7[ ok 8[?25h[?0c. Debian GNU/Linux 7 syzkaller ttyS0 Warning: Permanently added '10.128.0.28' (ECDSA) to the list of known hosts. 2018/04/24 07:20:18 fuzzer started 2018/04/24 07:20:18 dialing manager at 10.128.0.26:33571 syzkaller login: [ 48.868971] can: request_module (can-proto-0) failed. [ 48.880365] can: request_module (can-proto-0) failed. 2018/04/24 07:20:25 kcov=true, comps=false 2018/04/24 07:20:28 executing program 0: r0 = socket$inet6(0xa, 0x80001, 0x0) setsockopt$inet6_MCAST_JOIN_GROUP(r0, 0x29, 0x2a, &(0x7f0000fca000)={0x100000001, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x1, [], 0x1}}}}, 0x88) setsockopt$inet6_MCAST_MSFILTER(r0, 0x29, 0x30, &(0x7f0000000280)=ANY=[@ANYBLOB="010000000a00000000000000ff010000000000000000000000000001000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000040000000a00000000000000ff02000000000000000000000000000100000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a00000000000000ff01000000000000000000000000000100000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000100000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a00000000000000ff02000000000000000000000000000100000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a00000000000000ff01000000000000000000000000000100000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002f7335bd0503f4a4dbdc8a6a64ef9cc9725c42d9d19727291b1c1edb2509c9b65c4c3a8796f31aa377614b3b70918bd795e232ba9af29c9b114c15b5d76219b6dc08aec196b5fbe302a64a68e41146a356eeafc0962117edd2a6e3c41196f5eba2d25fb7413aedf3dd74178a1864767b359679a25880a688c4c75e2523ef8372fc1b41161f"], 0x1) setsockopt$inet6_MCAST_MSFILTER(r0, 0x29, 0x30, &(0x7f00000000c0)={0x1, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x1, [], 0x1}}}, 0x0, 0x2, [{{0xa, 0x0, 0x0, @mcast2={0xff, 0x2, [], 0x1}}}, {{0xa, 0x0, 0x0, @mcast2={0xff, 0x2, [], 0x1}}}]}, 0x190) 2018/04/24 07:20:28 executing program 1: r0 = socket$inet(0x2, 0x2, 0x0) setsockopt$inet_int(r0, 0x0, 0x7, &(0x7f0000000040)=0x6, 0xfffffffffffffe6c) setsockopt$SO_TIMESTAMPING(r0, 0x1, 0x25, &(0x7f0000ef0ffc)=0x7fe, 0xffffff14) sendto$inet(r0, &(0x7f0000edf000), 0x0, 0x0, &(0x7f0000ee9ff0)={0x2, 0x4e20}, 0x10) recvmsg(r0, &(0x7f0000bd9000)={0x0, 0x0, &(0x7f0000eee000), 0x0, &(0x7f0000b18faf)=""/81, 0x3a}, 0x40002104) 2018/04/24 07:20:28 executing program 3: msgrcv(0x0, &(0x7f0000000040)=ANY=[@ANYBLOB="0000000000000000860e000000000000000004"], 0x1, 0x0, 0x6b67fc445e09dd4a) 2018/04/24 07:20:28 executing program 7: r0 = socket$inet(0x2, 0x2, 0x0) setsockopt$inet_int(r0, 0x0, 0x7, &(0x7f0000000040)=0x6, 0xfffffffffffffe6c) setsockopt$inet_int(r0, 0x0, 0x12, &(0x7f0000000280)=0x1f, 0x4) setsockopt$SO_TIMESTAMPING(r0, 0x1, 0x25, &(0x7f0000ef0ffc)=0x7fe, 0xffffff14) sendto$inet(r0, &(0x7f0000edf000), 0x0, 0x0, &(0x7f0000ee9ff0)={0x2, 0x4e20}, 0x10) recvmsg(r0, &(0x7f0000bd9000)={0x0, 0x0, &(0x7f0000eee000), 0x0, &(0x7f0000b18faf)=""/81, 0x3a}, 0x40002104) 2018/04/24 07:20:28 executing program 4: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f00000004c0)="8da4363a00000000000000000000000000000000000000000000000000000000ecf6f2a3299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f00000002c0)=ANY=[]) symlinkat(&(0x7f0000000240)='./file0/file0/file0\x00', 0xffffffffffffffff, &(0x7f0000000140)='./file0\x00') chmod(&(0x7f0000000780)='./file0/file0/file0\x00', 0x0) 2018/04/24 07:20:28 executing program 5: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f00000004c0)="8da4363a00000000000000000000000000000000000000000000000000000000ecf6f2a3299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f00000002c0)=ANY=[]) 2018/04/24 07:20:28 executing program 6: r0 = socket$inet6(0xa, 0x400000000001, 0x0) r1 = dup(r0) setsockopt$inet6_tcp_int(r1, 0x6, 0x20000000000002, &(0x7f00007b1000)=0x1081, 0x4) ioctl$int_in(r0, 0x5421, &(0x7f0000000000)=0xfc) sendto$inet6(r0, &(0x7f0000e77fff), 0x2bd, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x0, 0x0, @loopback={0x0, 0x1}}, 0x1c) 2018/04/24 07:20:28 executing program 2: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f00000004c0)="8da4363a00000000000000000000000000000000000000000000000000000000ecf6f2a3299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f00000002c0)=ANY=[]) symlinkat(&(0x7f0000000240)='./file0/file0/file0\x00', 0xffffffffffffffff, &(0x7f0000000140)='./file0\x00') [ 53.555688] IPVS: ftp: loaded support on port[0] = 21 [ 53.668555] IPVS: ftp: loaded support on port[0] = 21 [ 53.717954] IPVS: ftp: loaded support on port[0] = 21 [ 53.783718] IPVS: ftp: loaded support on port[0] = 21 [ 53.881299] IPVS: ftp: loaded support on port[0] = 21 [ 54.008689] IPVS: ftp: loaded support on port[0] = 21 [ 54.149105] IPVS: ftp: loaded support on port[0] = 21 [ 54.316815] IPVS: ftp: loaded support on port[0] = 21 [ 55.557346] ip (4703) used greatest stack depth: 53928 bytes left [ 56.594364] bridge0: port 1(bridge_slave_0) entered blocking state [ 56.600845] bridge0: port 1(bridge_slave_0) entered disabled state [ 56.611007] device bridge_slave_0 entered promiscuous mode [ 56.860010] bridge0: port 2(bridge_slave_1) entered blocking state [ 56.866543] bridge0: port 2(bridge_slave_1) entered disabled state [ 56.878146] device bridge_slave_1 entered promiscuous mode [ 57.098780] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 57.133191] bridge0: port 1(bridge_slave_0) entered blocking state [ 57.139784] bridge0: port 1(bridge_slave_0) entered disabled state [ 57.184282] device bridge_slave_0 entered promiscuous mode [ 57.226726] bridge0: port 1(bridge_slave_0) entered blocking state [ 57.233249] bridge0: port 1(bridge_slave_0) entered disabled state [ 57.273243] device bridge_slave_0 entered promiscuous mode [ 57.289600] bridge0: port 1(bridge_slave_0) entered blocking state [ 57.296123] bridge0: port 1(bridge_slave_0) entered disabled state [ 57.322871] device bridge_slave_0 entered promiscuous mode [ 57.370594] bridge0: port 1(bridge_slave_0) entered blocking state [ 57.377120] bridge0: port 1(bridge_slave_0) entered disabled state [ 57.396862] device bridge_slave_0 entered promiscuous mode [ 57.414732] bridge0: port 1(bridge_slave_0) entered blocking state [ 57.421239] bridge0: port 1(bridge_slave_0) entered disabled state [ 57.443213] device bridge_slave_0 entered promiscuous mode [ 57.453548] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 57.463114] bridge0: port 2(bridge_slave_1) entered blocking state [ 57.469562] bridge0: port 2(bridge_slave_1) entered disabled state [ 57.499201] device bridge_slave_1 entered promiscuous mode [ 57.541333] bridge0: port 2(bridge_slave_1) entered blocking state [ 57.547854] bridge0: port 2(bridge_slave_1) entered disabled state [ 57.562984] device bridge_slave_1 entered promiscuous mode [ 57.571663] bridge0: port 2(bridge_slave_1) entered blocking state [ 57.578129] bridge0: port 2(bridge_slave_1) entered disabled state [ 57.588594] device bridge_slave_1 entered promiscuous mode [ 57.606624] bridge0: port 2(bridge_slave_1) entered blocking state [ 57.613130] bridge0: port 2(bridge_slave_1) entered disabled state [ 57.643695] device bridge_slave_1 entered promiscuous mode [ 57.669713] bridge0: port 2(bridge_slave_1) entered blocking state [ 57.676172] bridge0: port 2(bridge_slave_1) entered disabled state [ 57.715202] device bridge_slave_1 entered promiscuous mode [ 57.732590] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 57.804212] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 57.811966] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 57.820534] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 57.875733] bridge0: port 1(bridge_slave_0) entered blocking state [ 57.882251] bridge0: port 1(bridge_slave_0) entered disabled state [ 57.925164] device bridge_slave_0 entered promiscuous mode [ 57.949215] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 57.967105] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 57.976851] bridge0: port 1(bridge_slave_0) entered blocking state [ 57.983311] bridge0: port 1(bridge_slave_0) entered disabled state [ 58.009573] device bridge_slave_0 entered promiscuous mode [ 58.038668] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 58.050436] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 58.057902] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 58.076513] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 58.197738] bridge0: port 2(bridge_slave_1) entered blocking state [ 58.204248] bridge0: port 2(bridge_slave_1) entered disabled state [ 58.246830] device bridge_slave_1 entered promiscuous mode [ 58.255482] bridge0: port 2(bridge_slave_1) entered blocking state [ 58.261979] bridge0: port 2(bridge_slave_1) entered disabled state [ 58.270170] device bridge_slave_1 entered promiscuous mode [ 58.304370] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 58.403737] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 58.493167] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 58.545813] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 58.577799] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 58.606338] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 58.709471] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 58.734130] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 58.750366] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 58.778777] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 58.791827] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 58.802573] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 58.822763] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 58.829719] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 58.949473] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 58.962714] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 59.012973] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 59.051168] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 59.058808] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 59.074196] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 59.083822] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 59.113896] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 59.195185] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 59.202210] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 59.235217] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 59.242174] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 59.262488] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 59.269421] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 59.319465] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 59.341100] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 59.348492] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 59.364692] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 59.371757] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 59.421617] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 59.434775] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 59.442940] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 59.465336] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 59.483455] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 59.519997] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 59.527101] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 59.555376] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 59.564155] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 59.619915] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 59.668380] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 59.839751] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 59.865768] team0: Port device team_slave_0 added [ 59.893490] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 59.914407] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 59.940532] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 59.949437] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 59.968956] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 59.997678] team0: Port device team_slave_0 added [ 60.083708] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 60.121556] team0: Port device team_slave_1 added [ 60.137550] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 60.146818] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 60.153811] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 60.176902] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 60.208477] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 60.233852] team0: Port device team_slave_0 added [ 60.241313] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 60.266664] team0: Port device team_slave_1 added [ 60.280093] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 60.293865] team0: Port device team_slave_0 added [ 60.299857] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 60.312549] team0: Port device team_slave_0 added [ 60.361269] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 60.370076] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 60.403844] team0: Port device team_slave_0 added [ 60.432737] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 60.445428] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 60.477976] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 60.501066] team0: Port device team_slave_1 added [ 60.510297] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 60.525884] team0: Port device team_slave_1 added [ 60.531917] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 60.549460] team0: Port device team_slave_1 added [ 60.558897] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 60.567848] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 60.582988] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 60.616988] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 60.643704] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 60.663334] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 60.695398] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 60.711243] team0: Port device team_slave_1 added [ 60.729541] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 60.737196] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 60.757272] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 60.786759] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 60.806548] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 60.822972] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 60.845700] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 60.852635] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 60.861996] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 60.886623] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 60.898496] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 60.911470] team0: Port device team_slave_0 added [ 60.919317] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 60.926722] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 60.939472] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 60.954762] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 60.978176] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 61.000737] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 61.015839] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 61.024509] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 61.031710] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 61.052918] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 61.073526] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 61.089817] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 61.104511] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 61.120686] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 61.131370] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 61.139453] team0: Port device team_slave_0 added [ 61.150057] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 61.158146] team0: Port device team_slave_1 added [ 61.174419] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 61.186399] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 61.199059] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 61.212235] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 61.245804] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 61.255123] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 61.265896] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 61.275185] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 61.283394] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 61.293662] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 61.303007] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 61.311881] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 61.323085] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 61.334975] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 61.355805] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 61.381403] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 61.390657] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 61.399493] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 61.411907] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 61.420961] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 61.444294] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 61.468203] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 61.484021] team0: Port device team_slave_1 added [ 61.493340] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 61.500527] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 61.510476] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 61.540358] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 61.549081] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 61.557910] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 61.584993] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 61.611177] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 61.634931] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 61.652208] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 61.660644] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 61.669792] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 61.686431] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 61.693893] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 61.705709] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 61.738758] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 61.749308] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 61.764100] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 61.789091] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 61.826771] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 61.861233] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 61.900192] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 61.918761] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 61.939271] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 61.949798] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 61.957563] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 61.966927] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 62.006756] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 62.042381] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 62.052506] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 62.087144] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 62.112194] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 62.139944] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 62.202238] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 62.210166] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 62.225769] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 62.269294] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 62.279316] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 62.299251] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 62.506569] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 62.514150] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 62.524219] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 64.159015] bridge0: port 2(bridge_slave_1) entered blocking state [ 64.165511] bridge0: port 2(bridge_slave_1) entered forwarding state [ 64.172356] bridge0: port 1(bridge_slave_0) entered blocking state [ 64.178812] bridge0: port 1(bridge_slave_0) entered forwarding state [ 64.208556] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 64.217384] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 64.247605] bridge0: port 2(bridge_slave_1) entered blocking state [ 64.254119] bridge0: port 2(bridge_slave_1) entered forwarding state [ 64.260929] bridge0: port 1(bridge_slave_0) entered blocking state [ 64.267385] bridge0: port 1(bridge_slave_0) entered forwarding state [ 64.307300] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 64.316279] bridge0: port 2(bridge_slave_1) entered blocking state [ 64.322731] bridge0: port 2(bridge_slave_1) entered forwarding state [ 64.329515] bridge0: port 1(bridge_slave_0) entered blocking state [ 64.335926] bridge0: port 1(bridge_slave_0) entered forwarding state [ 64.354479] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 64.362968] bridge0: port 2(bridge_slave_1) entered blocking state [ 64.369421] bridge0: port 2(bridge_slave_1) entered forwarding state [ 64.376261] bridge0: port 1(bridge_slave_0) entered blocking state [ 64.382693] bridge0: port 1(bridge_slave_0) entered forwarding state [ 64.390750] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 64.398378] bridge0: port 2(bridge_slave_1) entered blocking state [ 64.404876] bridge0: port 2(bridge_slave_1) entered forwarding state [ 64.411730] bridge0: port 1(bridge_slave_0) entered blocking state [ 64.418194] bridge0: port 1(bridge_slave_0) entered forwarding state [ 64.444704] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 64.468447] bridge0: port 2(bridge_slave_1) entered blocking state [ 64.474909] bridge0: port 2(bridge_slave_1) entered forwarding state [ 64.481732] bridge0: port 1(bridge_slave_0) entered blocking state [ 64.488170] bridge0: port 1(bridge_slave_0) entered forwarding state [ 64.555115] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 64.584369] bridge0: port 2(bridge_slave_1) entered blocking state [ 64.590829] bridge0: port 2(bridge_slave_1) entered forwarding state [ 64.597630] bridge0: port 1(bridge_slave_0) entered blocking state [ 64.604129] bridge0: port 1(bridge_slave_0) entered forwarding state [ 64.640124] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 65.066092] bridge0: port 2(bridge_slave_1) entered blocking state [ 65.072585] bridge0: port 2(bridge_slave_1) entered forwarding state [ 65.079425] bridge0: port 1(bridge_slave_0) entered blocking state [ 65.085884] bridge0: port 1(bridge_slave_0) entered forwarding state [ 65.143014] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 65.248112] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 65.267802] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 65.292828] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 65.320355] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 65.337330] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 65.350352] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 65.357563] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 73.092875] 8021q: adding VLAN 0 to HW filter on device bond0 [ 73.120921] 8021q: adding VLAN 0 to HW filter on device bond0 [ 73.333303] 8021q: adding VLAN 0 to HW filter on device bond0 [ 73.357471] 8021q: adding VLAN 0 to HW filter on device bond0 [ 73.383598] 8021q: adding VLAN 0 to HW filter on device bond0 [ 73.398495] 8021q: adding VLAN 0 to HW filter on device bond0 [ 73.529434] 8021q: adding VLAN 0 to HW filter on device bond0 [ 73.908284] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 73.968586] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 74.113679] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 74.175734] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 74.184134] 8021q: adding VLAN 0 to HW filter on device bond0 [ 74.234799] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 74.281122] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 74.400767] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 74.656107] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 74.662360] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 74.673875] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 74.786977] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 74.793264] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 74.803967] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 74.964156] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 74.970408] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 74.982467] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 75.025347] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 75.031654] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 75.058909] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 75.109395] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 75.118133] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 75.127706] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 75.141794] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 75.171740] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 75.196988] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 75.217408] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 75.299127] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 75.305400] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 75.319789] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 75.593518] 8021q: adding VLAN 0 to HW filter on device team0 [ 75.636913] 8021q: adding VLAN 0 to HW filter on device team0 [ 75.841722] 8021q: adding VLAN 0 to HW filter on device team0 [ 75.908534] 8021q: adding VLAN 0 to HW filter on device team0 [ 75.927956] 8021q: adding VLAN 0 to HW filter on device team0 [ 75.961592] 8021q: adding VLAN 0 to HW filter on device team0 [ 76.095433] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 76.101738] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 76.115815] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 76.196793] 8021q: adding VLAN 0 to HW filter on device team0 [ 76.945510] 8021q: adding VLAN 0 to HW filter on device team0 [ 80.611015] BTRFS: device fsid ecf6f2a3-2997-48ae-b81e-1b00920efd9a devid 0 transid 0 /dev/loop2 2018/04/24 07:20:56 executing program 6: llistxattr(&(0x7f0000000140)='./file0\x00', &(0x7f0000000300)=""/4096, 0x1000) r0 = socket$nl_xfrm(0x11, 0x3, 0x6) bind$packet(r0, &(0x7f0000000240)={0x11, 0x3, 0x0, 0x1, 0x0, 0x6}, 0x14) r1 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dsp\x00', 0x101000, 0x0) ioctl$VHOST_SET_LOG_BASE(r1, 0x4008af04, &(0x7f0000000100)=&(0x7f00000000c0)) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000080), 0x4) syz_emit_ethernet(0x36, &(0x7f00000002c0)=ANY=[@ANYBLOB="aaaaaaaaaaaaaaaaaaaaaabb81800000810045000024000000000000907840000000ac14140000000000040190780000f41800775721"], &(0x7f0000000040)) 2018/04/24 07:20:56 executing program 2: r0 = socket$inet6(0xa, 0x80001, 0x0) setsockopt$inet6_MCAST_JOIN_GROUP(r0, 0x29, 0x2a, &(0x7f0000fca000)={0x100000001, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x1, [], 0x1}}}}, 0x88) setsockopt$inet6_MCAST_JOIN_GROUP(r0, 0x29, 0x2a, &(0x7f00000000c0)={0x3, {{0xa, 0x0, 0x96d, @mcast1={0xff, 0x1, [], 0x1}}}}, 0x88) setsockopt$inet6_group_source_req(r0, 0x29, 0x2b, &(0x7f0000000180)={0x100000100000001, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x1, [], 0x1}}}, {{0xa, 0x0, 0x0, @dev={0xfe, 0x80}}}}, 0x108) getsockopt$inet_sctp_SCTP_PRIMARY_ADDR(0xffffffffffffffff, 0x84, 0x6, &(0x7f0000000000)={0x0, @in6={{0xa, 0x4e22, 0xff, @local={0xfe, 0x80, [], 0xaa}, 0xff}}}, &(0x7f00000002c0)=0x84) getsockopt$inet_sctp6_SCTP_RECONFIG_SUPPORTED(r0, 0x84, 0x75, &(0x7f0000000300)={r1, 0x9}, &(0x7f0000000340)=0x8) 2018/04/24 07:20:56 executing program 1: pipe2(&(0x7f00000001c0)={0xffffffffffffffff}, 0x0) ioctl$sock_bt_cmtp_CMTPGETCONNINFO(r0, 0x800443d3, &(0x7f0000000080)={{0xffffffff, 0xffffffff, 0x200, 0x0, 0x8, 0x628}, 0x3, 0x4, 0x2}) r1 = syz_open_dev$loop(&(0x7f0000ad7ff5)='/dev/loop#\x00', 0x0, 0x0) r2 = gettid() move_pages(r2, 0x4, &(0x7f00000000c0)=[&(0x7f0000ffd000/0x2000)=nil, &(0x7f0000ffd000/0x1000)=nil, &(0x7f0000ffd000/0x1000)=nil, &(0x7f0000ffc000/0x4000)=nil], &(0x7f0000000100)=[0x7fffffff, 0x6, 0xffffffff, 0x1], &(0x7f0000000140)=[0x0, 0x0, 0x0, 0x0], 0x4) ioctl(r1, 0x4400000000001268, &(0x7f0000000040)) syz_open_dev$loop(&(0x7f0000000000)='/dev/loop#\x00', 0x2, 0x0) ioctl$EVIOCSABS3F(r1, 0x401845ff, &(0x7f0000000180)={0x6, 0x8000, 0x40, 0xf5, 0x3f, 0x9}) 2018/04/24 07:20:57 executing program 7: r0 = syz_open_dev$adsp(&(0x7f0000000140)='/dev/adsp#\x00', 0xb4b, 0x0) r1 = accept4$ax25(r0, &(0x7f0000000040), &(0x7f0000000080)=0x10, 0x800) fcntl$getflags(r1, 0x40b) ioctl$int_in(r0, 0x5421, &(0x7f0000000000)=0x8000) readv(r0, &(0x7f0000000500)=[{&(0x7f0000000140)}, {&(0x7f0000000480)=""/124, 0x7c}], 0x2) 2018/04/24 07:20:57 executing program 6: io_setup(0x3, &(0x7f0000000280)) r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000240)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f0000000140)=""/246) setsockopt$inet_sctp6_SCTP_DELAYED_SACK(0xffffffffffffffff, 0x84, 0x10, &(0x7f00000002c0), 0xc) unshare(0x20000400) epoll_wait(r0, &(0x7f0000000100)=[{}, {}, {}, {}], 0x4, 0x3630) ioctl$EVIOCGMASK(r0, 0x80104592, &(0x7f00000000c0)={0x3, 0xfc, &(0x7f0000000300)="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"}) ioctl$KDDISABIO(r0, 0x4b37) ioctl$EVIOCGREP(r0, 0x40047451, &(0x7f0000000000)=""/174) 2018/04/24 07:20:57 executing program 3: r0 = syz_open_dev$admmidi(&(0x7f0000000040)='/dev/admmidi#\x00', 0x5, 0x8000) mq_open(&(0x7f0000000140)='ysystem%$A)self\x00', 0x80, 0x100, &(0x7f0000000180)={0x5, 0x7, 0x100000000, 0x80000001, 0x3ff, 0x3, 0x7, 0x7}) getsockopt$inet_sctp_SCTP_MAX_BURST(r0, 0x84, 0x14, &(0x7f0000000080)=@assoc_value, &(0x7f00000000c0)=0x8) symlinkat(&(0x7f00000001c0)='./file0\x00', r0, &(0x7f0000000200)='./file0\x00') syz_open_dev$sndpcmc(&(0x7f0000000300)='/dev/snd/pcmC#D#c\x00', 0x0, 0x40) unshare(0x40600) r1 = openat$rtc(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/rtc\x00', 0xe0400, 0x0) mincore(&(0x7f0000ffa000/0x4000)=nil, 0x4000, &(0x7f0000000240)=""/106) syz_open_dev$loop(&(0x7f0000000100)='/dev/loop#\x00', 0x8000, 0x10000) ioctl$LOOP_CLR_FD(r1, 0x7003) ioctl$SNDRV_SEQ_IOCTL_GET_CLIENT_INFO(r0, 0xc0bc5310, &(0x7f0000000340)) 2018/04/24 07:20:57 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = accept(r0, &(0x7f0000000140)=@ethernet={0x0, @link_local}, &(0x7f0000000000)=0x80) getsockopt$ax25_int(r1, 0x101, 0xe, &(0x7f00000000c0), &(0x7f00000001c0)=0x4) sendmsg$nl_generic(r0, &(0x7f0000000100)={&(0x7f0000000040)={0x10}, 0xc, &(0x7f0000000080)={&(0x7f0000000240)={0x14, 0x21, 0x201}, 0x14}, 0x1}, 0x0) 2018/04/24 07:20:57 executing program 1: r0 = openat$audio(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/audio\x00', 0x10000, 0x0) setsockopt$bt_BT_FLUSHABLE(r0, 0x112, 0x8, &(0x7f0000000200)=0x9, 0x4) r1 = open(&(0x7f0000000000)='./file0\x00', 0x8040, 0x0) rt_sigprocmask(0x0, &(0x7f0000032ff8)={0xfffffffffffffffe}, 0x0, 0x8) truncate(&(0x7f0000000080)='./file0\x00', 0x0) fcntl$setlease(0xffffffffffffffff, 0x400, 0x0) fcntl$getownex(r1, 0x10, &(0x7f00000000c0)) truncate(&(0x7f0000000040)='./file0\x00', 0x100000000) 2018/04/24 07:20:57 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket$inet_sctp(0x2, 0x0, 0x84) getsockopt$inet_sctp6_SCTP_PR_ASSOC_STATUS(0xffffffffffffffff, 0x84, 0x73, &(0x7f00000000c0)={0x0, 0x80000000, 0x10, 0x5, 0x2}, &(0x7f0000000100)=0x18) getsockopt$inet_sctp_SCTP_MAXSEG(r1, 0x84, 0xd, &(0x7f0000000140)=@assoc_value={r2, 0x5}, &(0x7f0000000180)=0x8) setsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000000)={@multicast1=0xe0000001, @loopback=0x7f000001}, 0xc) setsockopt$inet_MCAST_JOIN_GROUP(r0, 0x0, 0x2a, &(0x7f000043e000)={0x1, {{0x2, 0x0, @multicast1=0xe0000001}}}, 0x88) getsockopt$inet_buf(r0, 0x0, 0x29, &(0x7f0000000000)=""/145, &(0x7f0000695ffc)=0x91) 2018/04/24 07:20:57 executing program 2: setsockopt$inet6_buf(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000002000)="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", 0x12e) setsockopt$inet6_MRT6_DEL_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd3, &(0x7f0000002000)={{0xa}, {0xa, 0x0, 0x0, @empty, 0x1}}, 0x5c) setsockopt$inet6_tcp_TCP_REPAIR_WINDOW(0xffffffffffffffff, 0x6, 0x1d, &(0x7f0000002000)={0x0, 0x2, 0x9}, 0x14) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_int(r0, 0x29, 0x40, &(0x7f0000001fde), 0x4) r1 = syz_open_dev$mouse(&(0x7f0000000000)='/dev/input/mouse#\x00', 0xfff, 0x40040) setsockopt$netlink_NETLINK_LISTEN_ALL_NSID(r1, 0x10e, 0x8, &(0x7f0000000040)=0x5, 0x4) 2018/04/24 07:20:57 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000380)=ANY=[@ANYBLOB="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"], 0x18}, 0x1}, 0x0) io_setup(0x39ccbfc5, &(0x7f0000000000)=0x0) clock_gettime(0x0, &(0x7f0000000040)) io_getevents(r1, 0x5, 0x8, &(0x7f0000000280)=[{}, {}, {}, {}, {}, {}, {}, {}], &(0x7f00000000c0)) 2018/04/24 07:20:57 executing program 7: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f000014f000)={&(0x7f00003c7ff4)={0x10}, 0xc, &(0x7f0000bd7000)={&(0x7f0000002700)=ANY=[@ANYBLOB="800100001a0001000000000000000000ffffffff00000000000000000000000000000000000000000000ffff7f00000100000000000000000000000000000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="ac141400000000000000000000000000000000003300000000000000000000000000ffff0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000019000000000000000000000000000000000a0000000012000000000000480001007368613531322d73737365330000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000480002006c72772b63616d656c6c69612d61736d00000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000"], 0x180}, 0x1}, 0x0) 2018/04/24 07:20:57 executing program 6: unshare(0x40000000) openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer\x00', 0x0, 0x0) 2018/04/24 07:20:57 executing program 3: r0 = syz_open_dev$admmidi(&(0x7f0000000040)='/dev/admmidi#\x00', 0x5, 0x8000) mq_open(&(0x7f0000000140)='ysystem%$A)self\x00', 0x80, 0x100, &(0x7f0000000180)={0x5, 0x7, 0x100000000, 0x80000001, 0x3ff, 0x3, 0x7, 0x7}) getsockopt$inet_sctp_SCTP_MAX_BURST(r0, 0x84, 0x14, &(0x7f0000000080)=@assoc_value, &(0x7f00000000c0)=0x8) symlinkat(&(0x7f00000001c0)='./file0\x00', r0, &(0x7f0000000200)='./file0\x00') syz_open_dev$sndpcmc(&(0x7f0000000300)='/dev/snd/pcmC#D#c\x00', 0x0, 0x40) unshare(0x40600) r1 = openat$rtc(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/rtc\x00', 0xe0400, 0x0) mincore(&(0x7f0000ffa000/0x4000)=nil, 0x4000, &(0x7f0000000240)=""/106) syz_open_dev$loop(&(0x7f0000000100)='/dev/loop#\x00', 0x8000, 0x10000) ioctl$LOOP_CLR_FD(r1, 0x7003) ioctl$SNDRV_SEQ_IOCTL_GET_CLIENT_INFO(r0, 0xc0bc5310, &(0x7f0000000340)) 2018/04/24 07:20:57 executing program 5: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f00000004c0)="8da4363a00000000000000000000000000000000000000000000000000000000ecf6f2a3299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f00000002c0)=ANY=[]) 2018/04/24 07:20:57 executing program 4: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f00000004c0)="8da4363a00000000000000000000000000000000000000000000000000000000ecf6f2a3299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f00000002c0)=ANY=[]) symlinkat(&(0x7f0000000240)='./file0/file0/file0\x00', 0xffffffffffffffff, &(0x7f0000000140)='./file0\x00') chmod(&(0x7f0000000780)='./file0/file0/file0\x00', 0x0) [ 81.795505] IPVS: ftp: loaded support on port[0] = 21 2018/04/24 07:20:57 executing program 3: r0 = syz_open_dev$evdev(&(0x7f0000001080)='/dev/input/event#\x00', 0x0, 0x0) fcntl$getflags(r0, 0x0) getcwd(&(0x7f0000000340)=""/205, 0xcd) gettid() r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$EVIOCGRAB(r1, 0x40044590, &(0x7f0000000040)=0x1) r2 = add_key(&(0x7f0000000200)='trusted\x00', &(0x7f0000000240)={0x73, 0x79, 0x7a, 0x0}, &(0x7f0000000280)="b05945cb336ac961dcac9cfbcf22009be99398f1b6dde14dabf9b488c0e372e77e0a55fb25ca939081177fa155f7b93d8022aefcadc3a30537558de2174c9647e8d18ff94ef51df7007f67db204e82c322a96b86931352e769d7c164a7e5a3f2d0e7fe301176d18a40fbcfaa160312deed61f3d614032ea0512907fe66170aa5a59dcf807a91ae051dab39b4dced7476c783f63349971a7afa9c4e2d0a7b546438eca0d2", 0xa4, 0xfffffffffffffffd) ioctl$EVIOCSFF(r1, 0x40304580, &(0x7f0000000080)={0x51, 0x4, 0x7f, {0x5, 0x80000000}, {0x166, 0x6}, @const={0x20, {0x3120d63e, 0x1fc7, 0x9, 0x7f}}}) add_key$keyring(&(0x7f0000000180)='keyring\x00', &(0x7f00000001c0)={0x73, 0x79, 0x7a, 0x1}, 0x0, 0x0, r2) ioctl$sock_inet_SIOCGIFNETMASK(r1, 0x891b, &(0x7f00000000c0)={'veth0\x00', {0x2, 0x4e21, @local={0xac, 0x14, 0x14, 0xaa}}}) ioctl$TIOCSBRK(r1, 0x40044591) ioctl$DRM_IOCTL_MODE_GETCRTC(r1, 0xc06864a1, &(0x7f0000000100)={&(0x7f0000000000)=[0xf2a5, 0x86ff], 0x2, 0x7, 0x5, 0x5, 0x0, 0x0, {0x4, 0x1f, 0x4, 0x3ba7, 0x7, 0x7, 0x2bd, 0x92, 0x1d0, 0x4, 0x6, 0x8, 0x3480, 0xfffffffffffffff9, "f0b498ce7f77c773a8bc92b10c1cb46a037cc517243cfa02a5f1020609bd50b6"}}) 2018/04/24 07:20:57 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f00003f9fb8)={0x8, 0x20000000000000cf, &(0x7f0000000100)=@raw=[@ldst, @map={0x18, 0x0, 0x1, 0x0, 0xffffffffffffffff, 0x3}], &(0x7f0000fe5000)='GPL\x00', 0x8, 0xf2, &(0x7f0000000000)=""/242}, 0x48) r0 = msgget$private(0x0, 0x20) msgctl$MSG_STAT(r0, 0xb, &(0x7f0000000140)) prctl$setfpexc(0xc, 0x80000) 2018/04/24 07:20:57 executing program 7: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f000014f000)={&(0x7f00003c7ff4)={0x10}, 0xc, &(0x7f0000bd7000)={&(0x7f0000002700)=ANY=[@ANYBLOB="800100001a0001000000000000000000ffffffff00000000000000000000000000000000000000000000ffff7f00000100000000000000000000000000000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="ac141400000000000000000000000000000000003300000000000000000000000000ffff0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000019000000000000000000000000000000000a0000000012000000000000480001007368613531322d73737365330000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000480002006c72772b63616d656c6c69612d61736d00000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000"], 0x180}, 0x1}, 0x0) 2018/04/24 07:20:57 executing program 2: r0 = syz_open_dev$evdev(&(0x7f0000529fee)='/dev/input/event#\x00', 0x0, 0x2000) pipe2(&(0x7f0000000640)={0xffffffffffffffff}, 0x84800) setsockopt$RDS_GET_MR(r1, 0x114, 0x2, &(0x7f0000000700)={{&(0x7f0000000680)=""/50, 0x32}, &(0x7f00000006c0), 0x2}, 0x20) r2 = creat(&(0x7f0000000100)='./file0\x00', 0x52) ioctl$SNDRV_CTL_IOCTL_ELEM_READ(r2, 0xc4c85512, &(0x7f0000000140)={{0x10001, 0x1, 0x10001, 0x162140d8, "b4a9ec63dedc97b9f0239c6e01b51257a5edb99761606bc51602bf693307248500a57364611036595271eb57", 0x3}, 0x7, [0xf6fb, 0x8, 0x1ff, 0x3, 0xffff, 0x6, 0xd7, 0x1e31, 0x1, 0x6, 0x9f4e, 0x8, 0x3f, 0x5, 0xf76, 0xae, 0x100, 0x3, 0x10001, 0x100000000, 0x7ff, 0x2, 0x9402, 0x8ff, 0x10000, 0x100000000, 0x401, 0xabbb, 0x6, 0x3f, 0x100, 0x8, 0x4, 0x741, 0x77c0, 0x6, 0x8, 0x100000000, 0x4000400000, 0x200, 0x6, 0x8, 0xed, 0x1, 0x0, 0x34d19a0f, 0x0, 0x9, 0x4, 0x8, 0x0, 0x0, 0xffff, 0x3cf, 0x9, 0x80000000, 0x9, 0x3, 0x2, 0x7, 0x3ff, 0x4, 0x1, 0xffff, 0xffff, 0x400, 0x0, 0x833f, 0x0, 0x3f, 0x7, 0xeb, 0x3, 0x101, 0x106, 0x9989, 0x101, 0x56cc, 0x5, 0x667, 0x0, 0x152, 0xb60, 0xfff, 0x980, 0x400, 0x288, 0x605f, 0x1, 0x0, 0x9, 0xe000000000, 0x6, 0x80000001, 0x7, 0x4000, 0x10000, 0x1, 0x0, 0x5, 0x7f, 0x20, 0x0, 0x78, 0xff, 0x3, 0xd0, 0x6a80, 0xffffffffffff950c, 0xffffffffffffff7f, 0x5, 0x1000, 0xe499, 0xf70, 0xfffffffffffffffd, 0x7, 0x81, 0x81, 0x6, 0x2, 0x8001, 0x3d, 0x3a6, 0x1, 0xce7a, 0x2, 0x6, 0x2]}) ioctl$fiemap(r0, 0xc020660b, &(0x7f0000000000)={0x20, 0x5, 0x5, 0x58, 0x3, [{0x7, 0xab3, 0x7fffffff, 0x0, 0x0, 0x1}, {0x7a631b24, 0x10001, 0x4, 0x0, 0x0, 0x3200}, {0x5, 0x7, 0x2, 0x0, 0x0, 0x4}]}) close(r0) 2018/04/24 07:20:57 executing program 4: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f00000004c0)="8da4363a00000000000000000000000000000000000000000000000000000000ecf6f2a3299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f00000002c0)=ANY=[]) symlinkat(&(0x7f0000000240)='./file0/file0/file0\x00', 0xffffffffffffffff, &(0x7f0000000140)='./file0\x00') chmod(&(0x7f0000000780)='./file0/file0/file0\x00', 0x0) 2018/04/24 07:20:58 executing program 5: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f00000004c0)="8da4363a00000000000000000000000000000000000000000000000000000000ecf6f2a3299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f00000002c0)=ANY=[]) 2018/04/24 07:20:58 executing program 1: keyctl$reject(0x13, 0x0, 0x0, 0xe800, 0x0) r0 = dup3(0xffffffffffffff9c, 0xffffffffffffffff, 0x80000) ioctl$EVIOCGEFFECTS(r0, 0x80044584, &(0x7f0000001000)=""/4096) 2018/04/24 07:20:58 executing program 3: r0 = syz_open_dev$evdev(&(0x7f0000001080)='/dev/input/event#\x00', 0x0, 0x0) fcntl$getflags(r0, 0x0) getcwd(&(0x7f0000000340)=""/205, 0xcd) gettid() r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$EVIOCGRAB(r1, 0x40044590, &(0x7f0000000040)=0x1) r2 = add_key(&(0x7f0000000200)='trusted\x00', &(0x7f0000000240)={0x73, 0x79, 0x7a, 0x0}, &(0x7f0000000280)="b05945cb336ac961dcac9cfbcf22009be99398f1b6dde14dabf9b488c0e372e77e0a55fb25ca939081177fa155f7b93d8022aefcadc3a30537558de2174c9647e8d18ff94ef51df7007f67db204e82c322a96b86931352e769d7c164a7e5a3f2d0e7fe301176d18a40fbcfaa160312deed61f3d614032ea0512907fe66170aa5a59dcf807a91ae051dab39b4dced7476c783f63349971a7afa9c4e2d0a7b546438eca0d2", 0xa4, 0xfffffffffffffffd) ioctl$EVIOCSFF(r1, 0x40304580, &(0x7f0000000080)={0x51, 0x4, 0x7f, {0x5, 0x80000000}, {0x166, 0x6}, @const={0x20, {0x3120d63e, 0x1fc7, 0x9, 0x7f}}}) add_key$keyring(&(0x7f0000000180)='keyring\x00', &(0x7f00000001c0)={0x73, 0x79, 0x7a, 0x1}, 0x0, 0x0, r2) ioctl$sock_inet_SIOCGIFNETMASK(r1, 0x891b, &(0x7f00000000c0)={'veth0\x00', {0x2, 0x4e21, @local={0xac, 0x14, 0x14, 0xaa}}}) ioctl$TIOCSBRK(r1, 0x40044591) ioctl$DRM_IOCTL_MODE_GETCRTC(r1, 0xc06864a1, &(0x7f0000000100)={&(0x7f0000000000)=[0xf2a5, 0x86ff], 0x2, 0x7, 0x5, 0x5, 0x0, 0x0, {0x4, 0x1f, 0x4, 0x3ba7, 0x7, 0x7, 0x2bd, 0x92, 0x1d0, 0x4, 0x6, 0x8, 0x3480, 0xfffffffffffffff9, "f0b498ce7f77c773a8bc92b10c1cb46a037cc517243cfa02a5f1020609bd50b6"}}) [ 82.418584] IPVS: ftp: loaded support on port[0] = 21 2018/04/24 07:20:58 executing program 0: mkdir(&(0x7f000082f000)='./control\x00', 0x0) r0 = creat(&(0x7f000078dff8)='./file0\x00', 0x0) rename(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000280)='./control\x00') ioctl$SIOCSIFHWADDR(r0, 0x8924, &(0x7f0000000040)={'sit0\x00', @dev={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0x14}}) ioctl$SIOCSIFHWADDR(r0, 0x8924, &(0x7f0000000180)={'bcsh0\x00', @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff]}) 2018/04/24 07:20:58 executing program 3: perf_event_open(&(0x7f0000032000)={0x7, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7ff, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000123000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$sndmidi(&(0x7f0000000000)='/dev/snd/midiC#D#\x00', 0xfffffffffffffffe, 0x8000) ioctl$EVIOCGVERSION(r0, 0x80044501, &(0x7f0000000440)=""/195) 2018/04/24 07:20:58 executing program 7: syz_open_dev$midi(&(0x7f0000000000)='/dev/midi#\x00', 0x6, 0x200201) r0 = creat(&(0x7f0000000500)='./file0\x00', 0x1) stat(&(0x7f0000000580)='./file0\x00', &(0x7f00000005c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) fchown(r0, 0x0, r1) signalfd(r0, &(0x7f0000000040)={0x6}, 0x8) 2018/04/24 07:20:58 executing program 2: r0 = syz_open_dev$evdev(&(0x7f0000529fee)='/dev/input/event#\x00', 0x0, 0x2000) pipe2(&(0x7f0000000640)={0xffffffffffffffff}, 0x84800) setsockopt$RDS_GET_MR(r1, 0x114, 0x2, &(0x7f0000000700)={{&(0x7f0000000680)=""/50, 0x32}, &(0x7f00000006c0), 0x2}, 0x20) r2 = creat(&(0x7f0000000100)='./file0\x00', 0x52) ioctl$SNDRV_CTL_IOCTL_ELEM_READ(r2, 0xc4c85512, &(0x7f0000000140)={{0x10001, 0x1, 0x10001, 0x162140d8, "b4a9ec63dedc97b9f0239c6e01b51257a5edb99761606bc51602bf693307248500a57364611036595271eb57", 0x3}, 0x7, [0xf6fb, 0x8, 0x1ff, 0x3, 0xffff, 0x6, 0xd7, 0x1e31, 0x1, 0x6, 0x9f4e, 0x8, 0x3f, 0x5, 0xf76, 0xae, 0x100, 0x3, 0x10001, 0x100000000, 0x7ff, 0x2, 0x9402, 0x8ff, 0x10000, 0x100000000, 0x401, 0xabbb, 0x6, 0x3f, 0x100, 0x8, 0x4, 0x741, 0x77c0, 0x6, 0x8, 0x100000000, 0x4000400000, 0x200, 0x6, 0x8, 0xed, 0x1, 0x0, 0x34d19a0f, 0x0, 0x9, 0x4, 0x8, 0x0, 0x0, 0xffff, 0x3cf, 0x9, 0x80000000, 0x9, 0x3, 0x2, 0x7, 0x3ff, 0x4, 0x1, 0xffff, 0xffff, 0x400, 0x0, 0x833f, 0x0, 0x3f, 0x7, 0xeb, 0x3, 0x101, 0x106, 0x9989, 0x101, 0x56cc, 0x5, 0x667, 0x0, 0x152, 0xb60, 0xfff, 0x980, 0x400, 0x288, 0x605f, 0x1, 0x0, 0x9, 0xe000000000, 0x6, 0x80000001, 0x7, 0x4000, 0x10000, 0x1, 0x0, 0x5, 0x7f, 0x20, 0x0, 0x78, 0xff, 0x3, 0xd0, 0x6a80, 0xffffffffffff950c, 0xffffffffffffff7f, 0x5, 0x1000, 0xe499, 0xf70, 0xfffffffffffffffd, 0x7, 0x81, 0x81, 0x6, 0x2, 0x8001, 0x3d, 0x3a6, 0x1, 0xce7a, 0x2, 0x6, 0x2]}) ioctl$fiemap(r0, 0xc020660b, &(0x7f0000000000)={0x20, 0x5, 0x5, 0x58, 0x3, [{0x7, 0xab3, 0x7fffffff, 0x0, 0x0, 0x1}, {0x7a631b24, 0x10001, 0x4, 0x0, 0x0, 0x3200}, {0x5, 0x7, 0x2, 0x0, 0x0, 0x4}]}) close(r0) 2018/04/24 07:20:58 executing program 4: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f00000004c0)="8da4363a00000000000000000000000000000000000000000000000000000000ecf6f2a3299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f00000002c0)=ANY=[]) symlinkat(&(0x7f0000000240)='./file0/file0/file0\x00', 0xffffffffffffffff, &(0x7f0000000140)='./file0\x00') chmod(&(0x7f0000000780)='./file0/file0/file0\x00', 0x0) 2018/04/24 07:20:58 executing program 5: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f00000004c0)="8da4363a00000000000000000000000000000000000000000000000000000000ecf6f2a3299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f00000002c0)=ANY=[]) 2018/04/24 07:20:58 executing program 1: mmap(&(0x7f0000000000/0x95c000)=nil, 0x95c000, 0x2000001, 0x44031, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000180)='memory.current\x00', 0x0, 0x0) setsockopt$inet_MCAST_JOIN_GROUP(r0, 0x0, 0x2a, &(0x7f0000000240)={0x4c6, {{0x2, 0x4e22, @multicast2=0xe0000002}}}, 0x88) r1 = socket$inet_sctp(0x2, 0x1, 0x84) socketpair$inet6_sctp(0xa, 0x5, 0x84, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$inet_pktinfo(r1, 0x0, 0x8, &(0x7f0000000040)={0x0, @dev, @loopback}, &(0x7f0000000080)=0xc) setsockopt$inet6_mreq(r2, 0x29, 0x1c, &(0x7f00000000c0)={@ipv4={[], [0xff, 0xff]}, r3}, 0xffffffffffffff87) ioctl$TUNSETNOCSUM(r0, 0x400454c8, 0x0) getsockopt$inet_sctp_SCTP_DEFAULT_SNDINFO(r1, 0x84, 0x22, &(0x7f00000001c0), &(0x7f0000000200)=0x10) getsockopt$inet_sctp_SCTP_RECVNXTINFO(r1, 0x84, 0x21, &(0x7f0000000100), &(0x7f0000000140)=0x4) r4 = socket(0x2, 0x80000000000001, 0x0) sendmmsg$inet_sctp(r4, &(0x7f00002f0000)=[{&(0x7f00003deff0)=@in={0x2}, 0x10, &(0x7f0000001300)}], 0x1, 0x0) mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x0, 0x32, 0xffffffffffffffff, 0x0) 2018/04/24 07:20:58 executing program 6: unshare(0x40000000) openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer\x00', 0x0, 0x0) 2018/04/24 07:20:58 executing program 3: r0 = socket(0x2, 0x3, 0x40000000000000ff) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000100)='gre0\x00', 0x6) sendto$inet(r0, &(0x7f0000000140), 0x0, 0x0, &(0x7f0000000040)={0x2, 0x0, @broadcast=0xffffffff}, 0x10) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000140)={0x4, {{0xa, 0x4e21, 0x6, @mcast2={0xff, 0x2, [], 0x1}, 0x4}}, {{0xa, 0x4e22, 0x2, @mcast2={0xff, 0x2, [], 0x1}, 0x1}}}, 0x108) 2018/04/24 07:20:58 executing program 7: r0 = socket$key(0xf, 0x3, 0x2) setsockopt$sock_int(r0, 0x1, 0x3, &(0x7f0000000000)=0x7f, 0x4) sendmsg$key(r0, &(0x7f0000087000)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f0000b7bf20)={0x2, 0x400000000000003, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, [@sadb_x_nat_t_port={0x1, 0x17}]}, 0x18}, 0x1}, 0x0) r1 = memfd_create(&(0x7f0000000040)='!{\x00', 0x1) pipe2(&(0x7f0000000080)={0xffffffffffffffff}, 0x4000) ioctl$sock_kcm_SIOCKCMATTACH(r1, 0x89e0, &(0x7f00000000c0)={r0, r2}) 2018/04/24 07:20:58 executing program 5: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, &(0x7f0000000200), 0x0, &(0x7f00000002c0)=ANY=[]) 2018/04/24 07:20:58 executing program 4: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f00000004c0)="8da4363a00000000000000000000000000000000000000000000000000000000ecf6f2a3299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f00000002c0)=ANY=[]) symlinkat(&(0x7f0000000240)='./file0/file0/file0\x00', 0xffffffffffffffff, &(0x7f0000000140)='./file0\x00') [ 83.441401] IPVS: ftp: loaded support on port[0] = 21 2018/04/24 07:20:59 executing program 0: r0 = syz_open_dev$sndpcmc(&(0x7f0000000240)='/dev/snd/pcmC#D#c\x00', 0x1, 0x400) ioctl$TIOCPKT(r0, 0x5420, &(0x7f0000000280)=0x7fff) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) sendto$unix(r1, &(0x7f00000000c0)="aa411f9bd9749c827f3c5fac1f4b8e0cc338aff1d8ae1f4deaf4812f3dde6f655cb2166c59f4c2264d9a570403ea8c5e62168a883d6cb59935bc9758f46b0a491b1dd88cf69d24d61f4ed986d52d65ddeb6c2f7b7dcb8f1b774d80e18b8ba964acf989bc08af18a2f0e2e85506d399a49976758f307bf44d220ef4edaa8c86415bf97713fd42d8ff698b670d676a554d7e725cd59dedbd15d9432cd9416527f1669235e60f7d2afdab530b993f761b317a859e8aa27902913a0a7c416733c94c0fd43b78d880db2240b63f8b3bed5e5d2162461db9827d934114cd", 0xdb, 0x40000, &(0x7f00000001c0)=@file={0x1, './file0\x00'}, 0x6e) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f0000021ff0)={0x2, &(0x7f0000000000)=[{0x28, 0x0, 0x0, 0xfffffffffffff010}, {0x6}]}, 0x10) fremovexattr(r2, &(0x7f0000000040)=@known='system.advise\x00') write(r2, &(0x7f0000000080), 0x383) poll(&(0x7f00000002c0)=[{r2, 0x20}, {r2, 0x9010}], 0x2, 0x7) 2018/04/24 07:20:59 executing program 2: r0 = socket$bt_hidp(0x1f, 0x3, 0x6) ioctl$sock_SIOCOUTQ(r0, 0x5411, &(0x7f0000000180)) r1 = socket$inet6(0x10, 0x3, 0x0) r2 = syz_open_dev$mouse(&(0x7f0000000140)='/dev/input/mouse#\x00', 0x6, 0x0) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f00000001c0)=ANY=[@ANYBLOB="00000001", @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0], &(0x7f0000000200)=0x28) getsockopt$inet_sctp_SCTP_ASSOCINFO(r2, 0x84, 0x1, &(0x7f0000000480)={0x0, 0x4, 0x100, 0x5, 0x4, 0x2}, &(0x7f00000004c0)=0x14) setsockopt$inet_sctp_SCTP_STREAM_SCHEDULER(r2, 0x84, 0x7b, &(0x7f0000000240)={r3, 0xcf2}, 0x8) sendmsg(r1, &(0x7f0000000000)={&(0x7f0000016000)=@nl=@kern={0x10}, 0x80, &(0x7f0000014000)=[{&(0x7f0000000040)="5500000019007fb1b72d1cb2a4a280a80a06050000a84321a7322369250009002100001c0100000006000500020000880d0000dc1338d544000a9b84226e2556e04075437ceeb75afb83de448daa7227c43ab82200", 0x55}], 0x1, &(0x7f0000006000)}, 0x0) sendto(r0, &(0x7f0000000280)="90b0505541f408af568472cd91be7e5c95d40456d38cfe8edea46ce265edcb4e9d863121e521c314c7d65cc84882a6c1de32d419f6d6853bbd29b746b9d492aac5af988d04d79ef8008423103ff5667831169352863b9f8a20a89471e541254f9059faaff3f531d8a2a46ea2fd04844c3d95ca9e4c29814212b236be5f70ce9604c19477c6e58a959590a9a449ff3ad2695eb03b28e9adb70522569770a5939a62b48d57335b555eac753db4128c8c5849abc27de81e6704f38b8377175510d603f77ffc8eedc07a4b9b", 0xca, 0x4000000, &(0x7f0000000380)=@pppol2tpv3={0x18, 0x1, {0x0, r1, {0x2, 0x4e23, @broadcast=0xffffffff}, 0x4, 0x0, 0x0, 0x1}}, 0x80) setsockopt$bt_l2cap_L2CAP_CONNINFO(r2, 0x6, 0x2, &(0x7f0000000440)={0xfff, 0x0, 0x0, 0x7fffffff}, 0x6) r4 = syz_open_dev$dmmidi(&(0x7f0000000100)='/dev/dmmidi#\x00', 0x4, 0xc0) ioctl$PIO_FONTRESET(r4, 0x4b6d, 0x0) ioctl$sock_inet_SIOCSIFPFLAGS(r1, 0x8934, &(0x7f00000000c0)={'eql\x00', 0x10000}) syz_open_dev$sndpcmc(&(0x7f0000000400)='/dev/snd/pcmC#D#c\x00', 0x4, 0x280ac2) 2018/04/24 07:20:59 executing program 5: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, &(0x7f0000000200), 0x0, &(0x7f00000002c0)=ANY=[]) 2018/04/24 07:20:59 executing program 1: mmap(&(0x7f0000000000/0x95c000)=nil, 0x95c000, 0x2000001, 0x44031, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000180)='memory.current\x00', 0x0, 0x0) setsockopt$inet_MCAST_JOIN_GROUP(r0, 0x0, 0x2a, &(0x7f0000000240)={0x4c6, {{0x2, 0x4e22, @multicast2=0xe0000002}}}, 0x88) r1 = socket$inet_sctp(0x2, 0x1, 0x84) socketpair$inet6_sctp(0xa, 0x5, 0x84, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$inet_pktinfo(r1, 0x0, 0x8, &(0x7f0000000040)={0x0, @dev, @loopback}, &(0x7f0000000080)=0xc) setsockopt$inet6_mreq(r2, 0x29, 0x1c, &(0x7f00000000c0)={@ipv4={[], [0xff, 0xff]}, r3}, 0xffffffffffffff87) ioctl$TUNSETNOCSUM(r0, 0x400454c8, 0x0) getsockopt$inet_sctp_SCTP_DEFAULT_SNDINFO(r1, 0x84, 0x22, &(0x7f00000001c0), &(0x7f0000000200)=0x10) getsockopt$inet_sctp_SCTP_RECVNXTINFO(r1, 0x84, 0x21, &(0x7f0000000100), &(0x7f0000000140)=0x4) r4 = socket(0x2, 0x80000000000001, 0x0) sendmmsg$inet_sctp(r4, &(0x7f00002f0000)=[{&(0x7f00003deff0)=@in={0x2}, 0x10, &(0x7f0000001300)}], 0x1, 0x0) mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x0, 0x32, 0xffffffffffffffff, 0x0) 2018/04/24 07:20:59 executing program 3: mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r0 = semget$private(0x0, 0x3, 0x110) r1 = creat(&(0x7f0000000a00)='./file0//ile0\x00', 0x41) ioctl$TIOCGSID(0xffffffffffffff9c, 0x5429, &(0x7f0000001140)=0x0) r3 = getuid() r4 = getegid() r5 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000001180)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) r6 = openat$rfkill(0xffffffffffffff9c, &(0x7f00000011c0)='/dev/rfkill\x00', 0x400000, 0x0) r7 = syz_open_dev$usbmon(&(0x7f0000001200)='/dev/usbmon#\x00', 0x1, 0x0) r8 = socket$nl_route(0x10, 0x3, 0x0) r9 = accept4$ax25(0xffffffffffffff9c, &(0x7f0000001240), &(0x7f0000001280)=0x10, 0x80800) sendmsg$unix(r1, &(0x7f0000001340)={&(0x7f0000000a40)=@abs={0x1, 0x0, 0x4e24}, 0x6e, &(0x7f0000001080)=[{&(0x7f0000000ac0)="b66c2e9c865ca57ff636a9dfb9190f664f632fa297c1c6e636ffc8ff1750dcec26f7350faa8030fafad10f51881993c86fa1d979efc0c43be1b0f315bfd5f630eacbe9f7cf079cc36e7c4f25202f04280b068c99afe9baf0af583ff4983c4d08cd47741b60283eb7d022f1bbaf55de0a1affaf9819dea734fd0cbf0edcaa993eab07b7de6ab5ba416d90420c77f146d3a35c81ef9f8cdbb26a1b35ade1ccff0314d0d357a88c50026bb14f60c212b5221778c301f2fb1715f954d0414d31636a01ff2984caa9c89ef9f888c62c3fe539bd91505243824d8fcaa0cf6f6dd7f8b1a8787118", 0xe4}, {&(0x7f0000000bc0)}, {&(0x7f0000000c00)="58750b16f8a645638a284b53df901809", 0x10}, {&(0x7f0000000c40)="fd2cfe1ccda14ff51a7c315a28a1bfb2bf2bddc31a79d56daea98ab796a8c152ab411ec037813e9f8460f8a6d318551d32a1c90580cc11b10ccc3e7db6956b361feddcbc8bb21c3b22658c52a4970e8e08bf1d5698e18ade6ee7a4f45edb46e129081b010428264ee04dbc7dfbbe6abd7a9829431e169e302e1bfdf4896b80aac7600dbd3775605214e3b941503f600631fb6ddf", 0x94}, {&(0x7f0000000d00)="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", 0xfa}, {&(0x7f0000000e00)="7aa186a7163acc03a47d7c31ef531bf1d0640f76c57d69dc61a5bde47de86f6642758623868b30c7b80c94676a036b7af7a70d6ad47a877ffa4592b85df7d871252321ce3a18c93a3bddf19dc10bed", 0x4f}, {&(0x7f0000000e80)="f0297a98dfd1f7c60a388326a2a791e6f85022b24b1166feb7f8ed18344e7d66be2f37eeceaae29e8240670cb61d1766f6c11d276347d9849ccdd21cb83de1837831a6a2a95f75fb958c4f6bca28fbb2fce65d6fcdc5a7c1caa363e0c784a29b5125588f44e90ecc85f14357bcc912405877e33b89b393e66d9feb0b7751509d6febcc0a8220bca005f8fdcd34b534c1a18010bcfc6304abdaf336a7bd31dea259aca7f310b6e91de29bb94fefd485976ad141f61ba07e5651c25ab95b7dd80b0553a2e2389f585549158ac0f813384869469a5434640dd1bf8003c5a7f08b68479eac7167d8ed44b4cbff25e49c94be15beab9b0395847483b013622558", 0xfe}, {&(0x7f0000000f80)="5c9982204efc827b8c1c52a3f2065bb48aebbdeba538d9f13c0bd0cc6db518effe784fbaca1a630ab6c9bc64faee", 0x2e}, {&(0x7f0000000fc0)="044b35a20da0b1bd85bd4585ce86632e19302b4d48c07d97235118b1160b94cc530a59992ebbaf6b112becea85bfda783153af7f3740a1ed44c7a2047d6243cebd6f20abc9551b4cc8e05800ac0f0ab1460717292213394ac03686e7a0c8671742126aa7b5d4edaaf777395f9ca7cce16180fd82203be018451aeb4bdc808a525270", 0x82}], 0x9, &(0x7f00000012c0)=[@cred={0x20, 0x1, 0x2, r2, r3, r4}, @rights={0x28, 0x1, 0x1, [r5, r6, r7, r8, r9]}], 0x48, 0x8080}, 0x40000) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffff9c, 0x0, 0x10, &(0x7f0000000200)={{{@in=@dev, @in6=@local, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@broadcast}, 0x0, @in=@remote}}, &(0x7f0000000000)=0xe8) stat(&(0x7f0000000040)='./file0\x00', &(0x7f0000000140)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) fstat(0xffffffffffffffff, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, 0x0}) lstat(&(0x7f0000000080)='./file0\x00', &(0x7f0000000480)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) semctl$IPC_SET(r0, 0x0, 0x1, &(0x7f0000000500)={{0x40, r10, r11, r12, r13, 0x128, 0xffff}, 0x20, 0xfffffffeffffffff, 0x5}) mount(&(0x7f00000003c0)='./file0\x00', &(0x7f0000000380)='./file0\x00', &(0x7f0000000300)='cgroup2\x00', 0x0, 0x0) rmdir(&(0x7f00000000c0)='./file0//ile0\x00') mkdir(&(0x7f0000000100)='./file0//ile0\x00', 0x0) 2018/04/24 07:20:59 executing program 6: r0 = syz_open_dev$sg(&(0x7f0000000140)='/dev/sg#\x00', 0x0, 0x204000) getpeername$netlink(r0, &(0x7f0000000040), &(0x7f00000001c0)=0xc) setsockopt$netlink_NETLINK_NO_ENOBUFS(r0, 0x10e, 0x5, &(0x7f0000000000)=0x8, 0x4) 2018/04/24 07:20:59 executing program 7: unshare(0x11820004) r0 = socket(0x100000001e, 0x1, 0x0) setsockopt(r0, 0x10f, 0x81, &(0x7f0000001080), 0x0) r1 = request_key(&(0x7f0000000080)='cifs.spnego\x00', &(0x7f00000000c0)={0x73, 0x79, 0x7a, 0x1}, &(0x7f0000000100)='\x00', 0xfffffffffffffffc) ioctl$DRM_IOCTL_GEM_OPEN(0xffffffffffffff9c, 0xc010640b, &(0x7f0000000140)={0x0, 0x0, 0x3ff}) ioctl$DRM_IOCTL_GEM_OPEN(0xffffffffffffff9c, 0xc010640b, &(0x7f0000000180)={0x0, 0x0, 0x2}) ioctl$DRM_IOCTL_GEM_FLINK(r0, 0xc008640a, &(0x7f00000001c0)={r2, r3}) add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000040)={0x73, 0x79, 0x7a, 0x3}, 0x0, 0x0, r1) 2018/04/24 07:20:59 executing program 4: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f00000004c0)="8da4363a00000000000000000000000000000000000000000000000000000000ecf6f2a3299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f00000002c0)=ANY=[]) symlinkat(&(0x7f0000000240)='./file0/file0/file0\x00', 0xffffffffffffffff, &(0x7f0000000140)='./file0\x00') [ 83.596415] netlink: 17 bytes leftover after parsing attributes in process `syz-executor2'. 2018/04/24 07:20:59 executing program 5: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, &(0x7f0000000200), 0x0, &(0x7f00000002c0)=ANY=[]) 2018/04/24 07:20:59 executing program 1: r0 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000180)='/dev/sequencer\x00', 0x42, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='pagemap\x00') sendfile(r0, r1, &(0x7f0000000040)=0x4, 0x88) 2018/04/24 07:20:59 executing program 7: r0 = signalfd(0xffffffffffffffff, &(0x7f00007aeff8), 0x8) mkdir(&(0x7f0000029ff6)='./control\x00', 0x0) read(r0, &(0x7f0000e6d000)=""/384, 0x180) signalfd(r0, &(0x7f0000f2dff8)={0xfffffffffffffffe}, 0x8) r1 = inotify_init1(0x0) fcntl$setstatus(r1, 0x4, 0x72109c5fef5d34d3) r2 = openat$rfkill(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rfkill\x00', 0x280000, 0x0) getsockopt$inet_mreqsrc(r2, 0x0, 0x28, &(0x7f0000000100)={@multicast1, @remote}, &(0x7f0000000180)=0xc) r3 = gettid() fcntl$setown(r1, 0x8, r3) r4 = socket$inet_sctp(0x2, 0x1, 0x84) setsockopt$EBT_SO_SET_ENTRIES(r4, 0x0, 0x80, &(0x7f0000000040)=@filter={'filter\x00', 0xe, 0x4, 0x8, [0x0, 0x20000140, 0x20000428, 0x20000e28], 0x0, &(0x7f00000000c0), &(0x7f0000000140)=ANY=[@ANYPTR64]}, 0x80) rt_sigprocmask(0x0, &(0x7f000003b000)={0xfffff7fffffffffe}, 0x0, 0x8) fcntl$setsig(r1, 0xa, 0x11) inotify_add_watch(r1, &(0x7f00007a7000)='./control\x00', 0xa4000960) open(&(0x7f00003f5000)='./control\x00', 0x0, 0x0) 2018/04/24 07:20:59 executing program 4: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f00000004c0)="8da4363a00000000000000000000000000000000000000000000000000000000ecf6f2a3299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f00000002c0)=ANY=[]) symlinkat(&(0x7f0000000240)='./file0/file0/file0\x00', 0xffffffffffffffff, &(0x7f0000000140)='./file0\x00') [ 83.702666] netlink: 17 bytes leftover after parsing attributes in process `syz-executor2'. 2018/04/24 07:20:59 executing program 6: r0 = socket$inet(0xa, 0x80005, 0x4000000000000002) socket$pppoe(0x18, 0x1, 0x0) setsockopt$IP_VS_SO_SET_FLUSH(r0, 0x84, 0x72, 0x0, 0x0) 2018/04/24 07:20:59 executing program 0: r0 = syz_open_dev$sndpcmc(&(0x7f0000000240)='/dev/snd/pcmC#D#c\x00', 0x1, 0x400) ioctl$TIOCPKT(r0, 0x5420, &(0x7f0000000280)=0x7fff) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) sendto$unix(r1, &(0x7f00000000c0)="aa411f9bd9749c827f3c5fac1f4b8e0cc338aff1d8ae1f4deaf4812f3dde6f655cb2166c59f4c2264d9a570403ea8c5e62168a883d6cb59935bc9758f46b0a491b1dd88cf69d24d61f4ed986d52d65ddeb6c2f7b7dcb8f1b774d80e18b8ba964acf989bc08af18a2f0e2e85506d399a49976758f307bf44d220ef4edaa8c86415bf97713fd42d8ff698b670d676a554d7e725cd59dedbd15d9432cd9416527f1669235e60f7d2afdab530b993f761b317a859e8aa27902913a0a7c416733c94c0fd43b78d880db2240b63f8b3bed5e5d2162461db9827d934114cd", 0xdb, 0x40000, &(0x7f00000001c0)=@file={0x1, './file0\x00'}, 0x6e) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f0000021ff0)={0x2, &(0x7f0000000000)=[{0x28, 0x0, 0x0, 0xfffffffffffff010}, {0x6}]}, 0x10) fremovexattr(r2, &(0x7f0000000040)=@known='system.advise\x00') write(r2, &(0x7f0000000080), 0x383) poll(&(0x7f00000002c0)=[{r2, 0x20}, {r2, 0x9010}], 0x2, 0x7) [ 84.674074] kernel msg: ebtables bug: please report to author: entries_size too small 2018/04/24 07:21:00 executing program 3: mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r0 = semget$private(0x0, 0x3, 0x110) r1 = creat(&(0x7f0000000a00)='./file0//ile0\x00', 0x41) ioctl$TIOCGSID(0xffffffffffffff9c, 0x5429, &(0x7f0000001140)=0x0) r3 = getuid() r4 = getegid() r5 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000001180)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) r6 = openat$rfkill(0xffffffffffffff9c, &(0x7f00000011c0)='/dev/rfkill\x00', 0x400000, 0x0) r7 = syz_open_dev$usbmon(&(0x7f0000001200)='/dev/usbmon#\x00', 0x1, 0x0) r8 = socket$nl_route(0x10, 0x3, 0x0) r9 = accept4$ax25(0xffffffffffffff9c, &(0x7f0000001240), &(0x7f0000001280)=0x10, 0x80800) sendmsg$unix(r1, &(0x7f0000001340)={&(0x7f0000000a40)=@abs={0x1, 0x0, 0x4e24}, 0x6e, &(0x7f0000001080)=[{&(0x7f0000000ac0)="b66c2e9c865ca57ff636a9dfb9190f664f632fa297c1c6e636ffc8ff1750dcec26f7350faa8030fafad10f51881993c86fa1d979efc0c43be1b0f315bfd5f630eacbe9f7cf079cc36e7c4f25202f04280b068c99afe9baf0af583ff4983c4d08cd47741b60283eb7d022f1bbaf55de0a1affaf9819dea734fd0cbf0edcaa993eab07b7de6ab5ba416d90420c77f146d3a35c81ef9f8cdbb26a1b35ade1ccff0314d0d357a88c50026bb14f60c212b5221778c301f2fb1715f954d0414d31636a01ff2984caa9c89ef9f888c62c3fe539bd91505243824d8fcaa0cf6f6dd7f8b1a8787118", 0xe4}, {&(0x7f0000000bc0)}, {&(0x7f0000000c00)="58750b16f8a645638a284b53df901809", 0x10}, {&(0x7f0000000c40)="fd2cfe1ccda14ff51a7c315a28a1bfb2bf2bddc31a79d56daea98ab796a8c152ab411ec037813e9f8460f8a6d318551d32a1c90580cc11b10ccc3e7db6956b361feddcbc8bb21c3b22658c52a4970e8e08bf1d5698e18ade6ee7a4f45edb46e129081b010428264ee04dbc7dfbbe6abd7a9829431e169e302e1bfdf4896b80aac7600dbd3775605214e3b941503f600631fb6ddf", 0x94}, {&(0x7f0000000d00)="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", 0xfa}, {&(0x7f0000000e00)="7aa186a7163acc03a47d7c31ef531bf1d0640f76c57d69dc61a5bde47de86f6642758623868b30c7b80c94676a036b7af7a70d6ad47a877ffa4592b85df7d871252321ce3a18c93a3bddf19dc10bed", 0x4f}, {&(0x7f0000000e80)="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", 0xfe}, {&(0x7f0000000f80)="5c9982204efc827b8c1c52a3f2065bb48aebbdeba538d9f13c0bd0cc6db518effe784fbaca1a630ab6c9bc64faee", 0x2e}, {&(0x7f0000000fc0)="044b35a20da0b1bd85bd4585ce86632e19302b4d48c07d97235118b1160b94cc530a59992ebbaf6b112becea85bfda783153af7f3740a1ed44c7a2047d6243cebd6f20abc9551b4cc8e05800ac0f0ab1460717292213394ac03686e7a0c8671742126aa7b5d4edaaf777395f9ca7cce16180fd82203be018451aeb4bdc808a525270", 0x82}], 0x9, &(0x7f00000012c0)=[@cred={0x20, 0x1, 0x2, r2, r3, r4}, @rights={0x28, 0x1, 0x1, [r5, r6, r7, r8, r9]}], 0x48, 0x8080}, 0x40000) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffff9c, 0x0, 0x10, &(0x7f0000000200)={{{@in=@dev, @in6=@local, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@broadcast}, 0x0, @in=@remote}}, &(0x7f0000000000)=0xe8) stat(&(0x7f0000000040)='./file0\x00', &(0x7f0000000140)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) fstat(0xffffffffffffffff, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, 0x0}) lstat(&(0x7f0000000080)='./file0\x00', &(0x7f0000000480)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) semctl$IPC_SET(r0, 0x0, 0x1, &(0x7f0000000500)={{0x40, r10, r11, r12, r13, 0x128, 0xffff}, 0x20, 0xfffffffeffffffff, 0x5}) mount(&(0x7f00000003c0)='./file0\x00', &(0x7f0000000380)='./file0\x00', &(0x7f0000000300)='cgroup2\x00', 0x0, 0x0) rmdir(&(0x7f00000000c0)='./file0//ile0\x00') mkdir(&(0x7f0000000100)='./file0//ile0\x00', 0x0) 2018/04/24 07:21:00 executing program 5: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f00000004c0), 0x0, 0x10000}], 0x0, &(0x7f00000002c0)=ANY=[]) 2018/04/24 07:21:00 executing program 2: r0 = gettid() r1 = syz_open_procfs(r0, &(0x7f0000000040)="00ad242538f92ebf9f6499aa66bf332efc8243b0390000") exit(0x4000020000000) unlinkat(r1, &(0x7f0000000000)='./file0\x00', 0x0) 2018/04/24 07:21:00 executing program 0: r0 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer\x00', 0x4000, 0x0) ioctl$EVIOCGEFFECTS(r0, 0x80044584, &(0x7f0000000180)=""/146) r1 = socket$netlink(0x10, 0x3, 0x0) flistxattr(r1, &(0x7f0000000240)=""/67, 0xfffffffffffffedc) bind$netlink(r1, &(0x7f00000000c0)={0x400000010, 0x0, 0x0, 0x2000000}, 0xc) r2 = dup(r1) getsockopt$netlink(r2, 0x10e, 0x9, &(0x7f00005c6000)=""/6, &(0x7f00001bb000)=0x6) mq_open(&(0x7f0000000040)='bdev\x00', 0x0, 0x10, &(0x7f0000000080)={0xfffffffffffeffff, 0x2, 0x10000, 0x4, 0x5, 0x8, 0xc9e, 0x2}) 2018/04/24 07:21:00 executing program 4: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f00000004c0)="8da4363a00000000000000000000000000000000000000000000000000000000ecf6f2a3299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f00000002c0)=ANY=[]) chmod(&(0x7f0000000780)='./file0/file0/file0\x00', 0x0) 2018/04/24 07:21:00 executing program 7: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000006c40)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCGPTPEER(r0, 0x541a, 0x8000000000100008) pipe2(&(0x7f0000000000)={0xffffffffffffffff}, 0x84800) getsockopt$inet_sctp6_SCTP_PARTIAL_DELIVERY_POINT(0xffffffffffffff9c, 0x84, 0x13, &(0x7f0000000040)={0x0, 0x5}, &(0x7f0000000080)=0x8) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000100)='/proc/sys/net/ipv4/vs/am_droprate\x00', 0x2, 0x0) setsockopt$inet_sctp6_SCTP_AUTH_ACTIVE_KEY(r1, 0x84, 0x18, &(0x7f00000000c0)={r2, 0x3}, 0x8) 2018/04/24 07:21:00 executing program 6: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000d65000)={&(0x7f0000000000)={0x10}, 0xc, &(0x7f00004ca000)={&(0x7f0000000040)=ANY=[@ANYBLOB="1400000000060100000000000000000000000002a767bdc6767e1ec2ca58b4693bf82e327a8eddc946cba1093fd67e397b9f3127acee6e74530cb59629c82c166fb749ebef77cea75b4247c25d29dde118b6f5a1496b0ecb441cc9a7e6ce5a7011057487d7bd047769a0f37828e0582c84e87fccbdac96ca350d5b4033e3f7801c4e5405ca9c803e16ac3dd1c9194b59e1be6f87c7d495baf79cbcabb36475b7558b5e7294e114e5d896f97391279fe682a74822b54d6a4cb78a0fa0b313b4ad0d91d188bd435c24b4c02964754f1625227bea223771e51a7935fd12cb30a824c4236025f597d61108057051437b1f39"], 0x14}, 0x1}, 0x0) [ 84.744540] kernel msg: ebtables bug: please report to author: entries_size too small 2018/04/24 07:21:00 executing program 1: r0 = socket$inet_sctp(0x2, 0x5, 0x84) pipe(&(0x7f0000000000)={0xffffffffffffffff}) fcntl$getownex(r0, 0x10, &(0x7f0000000200)={0x0, 0x0}) lstat(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0}) getresgid(&(0x7f0000000300), &(0x7f0000000340), &(0x7f0000000380)=0x0) r5 = socket$bt_bnep(0x1f, 0x3, 0x4) ioctl$TIOCGSID(0xffffffffffffff9c, 0x5429, &(0x7f00000003c0)=0x0) r7 = geteuid() stat(&(0x7f0000000400)='./file0\x00', &(0x7f0000000440)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) r9 = getpgrp(0xffffffffffffffff) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000a80)={0x0, 0x0}, &(0x7f0000000ac0)=0xc) getgroups(0x5, &(0x7f0000000b00)=[0xffffffffffffffff, 0x0, 0x0, 0xffffffffffffffff, 0x0]) r12 = gettid() getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f0000000b40)={{{@in=@loopback, @in6=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast2}, 0x0, @in=@dev}}, &(0x7f0000000c40)=0xe8) getgroups(0x2, &(0x7f0000000c80)=[0x0, 0xffffffffffffffff]) ioctl$sock_FIOGETOWN(r0, 0x8903, &(0x7f0000000cc0)=0x0) stat(&(0x7f0000000d00)='./file0\x00', &(0x7f0000000d40)={0x0, 0x0, 0x0, 0x0, 0x0}) fstat(r0, &(0x7f0000000dc0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f0000000e80)={{{@in=@local, @in6=@mcast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@local}, 0x0, @in=@remote}}, &(0x7f0000000f80)=0xe8) lstat(&(0x7f0000000fc0)='./file0\x00', &(0x7f0000001000)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) r20 = fcntl$getown(r0, 0x9) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000001080)={{{@in=@rand_addr, @in=@multicast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@ipv4={[], [], @dev}}, 0x0, @in=@local}}, &(0x7f0000001180)=0xe8) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f00000011c0)={0x0, 0x0, 0x0}, &(0x7f0000001200)=0xc) r23 = getpgrp(0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000001600)={{{@in6=@mcast2, @in=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@loopback}, 0x0, @in6=@mcast2}}, &(0x7f0000001700)=0xe8) lstat(&(0x7f0000001740)='./file0\x00', &(0x7f0000001780)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) r26 = getpgid(0xffffffffffffffff) r27 = getuid() r28 = getgid() getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000001a00)={0x0}, &(0x7f0000001a40)=0xc) getresuid(&(0x7f0000001a80)=0x0, &(0x7f0000001ac0), &(0x7f0000001b00)) r31 = getegid() r32 = fcntl$getown(r0, 0x9) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000001b40)={0x0, 0x0}, &(0x7f0000001b80)=0xffffffffffffff82) lstat(&(0x7f0000001bc0)='./file0\x00', &(0x7f0000001c00)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$sock_FIOGETOWN(r0, 0x8903, &(0x7f0000001c80)=0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000001cc0)={0x0, 0x0}, &(0x7f0000001d00)=0xc) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000001d40)={0x0, 0x0, 0x0}, &(0x7f0000001d80)=0xc) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000002900)=0x0) lstat(&(0x7f0000002180)='./file0\x00', &(0x7f00000021c0)={0x0, 0x0, 0x0, 0x0, 0x0}) getgroups(0x7, &(0x7f0000002240)=[0x0, 0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0xffffffffffffffff]) ioctl$sock_SIOCGPGRP(r0, 0x8904, &(0x7f0000002140)=0x0) fstat(r0, &(0x7f00000022c0)={0x0, 0x0, 0x0, 0x0, 0x0}) getresgid(&(0x7f0000002340)=0x0, &(0x7f0000002380), &(0x7f00000023c0)) r44 = getpgrp(0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffff9c, 0x29, 0x23, &(0x7f0000002400)={{{@in=@multicast2, @in6=@mcast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@remote}, 0x0, @in=@local}}, &(0x7f0000002500)=0xe8) r46 = getegid() fcntl$getownex(r0, 0x10, &(0x7f0000002540)={0x0, 0x0}) r48 = getuid() getresgid(&(0x7f0000002580), &(0x7f00000025c0), &(0x7f0000002600)=0x0) sendmmsg$unix(r1, &(0x7f0000002780)=[{&(0x7f0000000040)=@abs={0x1, 0x0, 0x4e24}, 0x6e, &(0x7f0000000180)=[{&(0x7f0000000100)="619c9773456758bcbdc95dd169901d70fc851b2d7f140ba3a6ec167e07cbb5f0a69e9493e4203b3948458c6f28f02c", 0x2f}], 0x1, &(0x7f00000004c0)=ANY=[@ANYBLOB="20000000000000000100000001000000", @ANYRES32=r0, @ANYRES32=r0, @ANYRES32=r0, @ANYRES32=r0, @ANYBLOB='\x00\x00', @ANYRES32=r2, @ANYRES32=r3, @ANYRES32=r4, @ANYBLOB="0000000038000000000000000100000001000000", @ANYRES32=r0, @ANYRES32=r0, @ANYRES32=r0, @ANYRES32=r0, @ANYRES32=r0, @ANYRES32=r0, @ANYRES32=r0, @ANYRES32=r0, @ANYRES32=r0, @ANYBLOB="0000000020000000000000000100000001000000", @ANYRES32=r0, @ANYRES32=r0, @ANYRES32=r0, @ANYRES32=r0, @ANYBLOB="18000000000000000100000001000000", @ANYRES32=r0, @ANYRES32=r5, @ANYBLOB="20000000000000000100000002000000", @ANYRES32=r6, @ANYRES32=r7, @ANYRES32=r8, @ANYBLOB], 0xd0, 0x8000}, {&(0x7f00000005c0)=@abs={0x0, 0x0, 0x4e21}, 0x6e, &(0x7f0000000a00)=[{&(0x7f0000000640)="f03584546a0e67642185ee0714f3b7ac0c5fc2f7fe70aa2f9c8fa8905103da39bb0017071680ae2d8f1068ff2854767ba6b03da386487f99f8b67fa9c8f86ba1495fcc0851445bfe5b1182dd3f632bedd422827d521c84a20f3c2defa12632b314a97a620d", 0x65}, {&(0x7f00000006c0)="916fe787cb91ea854a1cf1f6ad1a253a98d8bb9e8b5321ca7bd5cc966c6940aca5d56eacaf9f45f008df2c87807596a19e835c095e70fee60c416d9e82a1d8cec40275f836c4dc47d89e998a3365731580653b5354b4fc543bc6cc566884916d9adee35da24585e9503f", 0x6a}, {&(0x7f0000000740)="14771a0e2d0a2cd6a65c995066d41353a987afaf562e8c492d38a0ec17410c87a4b1169fd9281be418ef8320c3be49b198f56a5070dec43d7545d44237f0ff2f25148c51490f6357758bb77714351f1210b7c7f0c4a7b5cf0e445dc67d2a38b4c6981e5e4e9d7eb5816fe09ae6042aebb0ec61029f0750a79f245f6e9bcbcba57c54a21f0f9a8a0fb2fb0208ce68393c4d521db6fc1d56f5", 0x98}, {&(0x7f0000000800)="c5729eedb133e5ef2b688aab38467517f795355b8c0dafabe1b0d406cf250d1a7c18dd61cbd67a3316abd90eb3800834e17a6f51c93b6d5377c045790e11cac274ff7cc576f723d66cdc42b4109add44381be988cdfa27cad9b87cd822f81cb18566e55937c9db84b21082a582894ab8c48cb5062f1236a80afe2e6844751c32cbc24093e109a50ff4637d63d381a63eb0976948cdec4c7dbf3890d59dc7155683956ca3a137a917392dd59824b0aedc938650ceccaeb3a3f2faa3397b3fa460aa70edaf4b020e", 0xc7}, {&(0x7f0000000900)="70cd7482e6817371562fde30431a306597b8b1347b59c894e609e124587445f5c9a4cb9958b12978c45fd1501f108bbb064095889223a5b2ae152d2b303bbefc4c538bc6e6478ba2fe2e9e04", 0x4c}, {&(0x7f0000000980)="669e59f79a13376ec98d733ce5993094f82b7aa88b8578ee05861d613c2dd327bf8e1407ea9091bf6b5fcf4f91d3478d8ad71ad082a7feb3f1f527142640d805a241fd4c293cdc2bc7", 0x49}], 0x6, &(0x7f0000001240)=[@cred={0x20, 0x1, 0x2, r9, r10, r11}, @rights={0x30, 0x1, 0x1, [r0, r0, r0, r0, r0, r0, r0]}, @rights={0x28, 0x1, 0x1, [r0, r0, r0, r0, r0, 0xffffffffffffffff]}, @cred={0x20, 0x1, 0x2, r12, r13, r14}, @rights={0x20, 0x1, 0x1, [r0, r0, r0]}, @cred={0x20, 0x1, 0x2, r15, r16, r17}, @cred={0x20, 0x1, 0x2, 0x0, r18, r19}, @rights={0x30, 0x1, 0x1, [r0, r0, r0, r0, r0, r0, r0, r0]}, @cred={0x20, 0x1, 0x2, r20, r21, r22}], 0x148, 0x48080}, {&(0x7f00000013c0)=@abs={0x1, 0x0, 0x4e21}, 0x6e, &(0x7f00000015c0)=[{&(0x7f0000001440)="3788ce2099ab41d33826772fc578639315c65926c8300acba8846fb1f3235dffdec3e72e27f6fcd977605d84c8c8", 0x2e}, {&(0x7f0000001480)="6206876ad748c70a6599715a65090a181e351dfb03008d8f23909c3c65591a959d79a6553a175b216e768c394e7d9d6f1104fcf9cb2b780f19c0c545a4017890179402d58e6e4a077a8e42407ebac07bebf6cf9c8930cbe189", 0x59}, {&(0x7f0000001500)="2b546600f2a4270aa7057f20080572dc63eed0b9c9d16528b352b56961135d9baba3ed7354fb468a3bd3870d6bfecb19b7eb310dbd7e810cb3192697803e91e3925fc74b09", 0x45}, {&(0x7f0000001580)="374e1734737c3577eedc489cfb81fe59ab6dfbb7ff7d9e2af0a95d3b356d559cbf458f12be9f951b51e54f1512d2f33a", 0x30}], 0x4, &(0x7f0000001800)=[@rights={0x18, 0x1, 0x1, [r0, r0]}, @cred={0x20, 0x1, 0x2, r23, r24, r25}, @rights={0x18, 0x1, 0x1, [r0, r0]}, @rights={0x20, 0x1, 0x1, [r0, r0, r0]}, @rights={0x20, 0x1, 0x1, [r0, r0, r0, r0]}, @cred={0x20, 0x1, 0x2, r26, r27, r28}], 0xb0, 0x10}, {&(0x7f00000018c0)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f00000019c0)=[{&(0x7f0000001940)="abf87c14a74baa52b8001800d54991801145d09c0a47906e11832003b341073834f1c0c630f7ccc06ad028872c5c78a65769d3d94d6cfbed2b456d3e03a0d68ab526e33886fb617c21e67459f0cba4667a73", 0x52}], 0x1, &(0x7f0000001dc0)=[@cred={0x20, 0x1, 0x2, r29, r30, r31}, @cred={0x20, 0x1, 0x2, r32, r33, r34}, @cred={0x20, 0x1, 0x2, r35, r36, r37}], 0x60, 0x800}, {&(0x7f0000001e40)=@abs={0x1, 0x0, 0x4e22}, 0x6e, &(0x7f0000002100)=[{&(0x7f0000001ec0)="ef6bbbc5c831f4b0808e13e8e7c3213642f8040655be9c9ea10d8e58ed9cbad337630c88a0f985e5d1", 0x29}, {&(0x7f0000001f00)="537f77b651622cdff50e01b5c11071221cf29e98237599fd71d0e5773b027908050c62ef39b7f33af410e278121556c8ae528389fa54c891ed97f415041adb0247bd2cba5c45db5e17de9931c0a70742aa14", 0x52}, {&(0x7f0000001f80)="1436dad97a65b9c971107cb9ca2cc969262674db40a5617a74a957f662fcde093852856003dc7d462cc5cc8105a6fc889aca9f84e46bf4c89d32a5ecf40ec8f382f31835dfc3648fcae0b5c05fd5a8663610caac2c01c94981eb624cacd1e6957808e5d0027cb815202a412caadd84b35614deb872f7f9e6188156082c091bede01a48f99a8e214b232c9432927732225514207979434a3da8c9a726932678a6b3950a430e", 0xa5}, {&(0x7f0000002040)="f6ebb5d6810b8d648b971cd35f8e87faa4f2e1880bcff2a9685fae9d614c4aaac0fb502330c1b20df07e728bacd0650a316a71e64a273944870d21f564c450729b81f2ac4f5c0e519048b5bc402320b174b991816504ae79e899d7c772f8fc568dade7f978e7101243f19e86c09110f694799b76d989c022f49aedec4c35ea96dd25fb8471", 0x85}], 0x4, &(0x7f0000002640)=[@cred={0x20, 0x1, 0x2, r38, r39, r40}, @rights={0x18, 0x1, 0x1, [r0]}, @cred={0x20, 0x1, 0x2, r41, r42, r43}, @rights={0x18, 0x1, 0x1, [r0, r0]}, @cred={0x20, 0x1, 0x2, r44, r45, r46}, @rights={0x28, 0x1, 0x1, [r0, r0, r0, r0, r0]}, @rights={0x20, 0x1, 0x1, [r0, r0, r0]}, @rights={0x20, 0x1, 0x1, [r0, r0, r0]}, @rights={0x18, 0x1, 0x1, [r0]}, @cred={0x20, 0x1, 0x2, r47, r48, r49}], 0x130, 0x84}], 0x5, 0x8000) getsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX3(r0, 0x84, 0x6f, &(0x7f0000000140)={0x0, 0x20, &(0x7f00000000c0)=[@in={0x2, 0x4e20, @dev={0xac, 0x14, 0x14}}, @in={0x2, 0x0, @dev={0xac, 0x14, 0x14}}]}, &(0x7f00000001c0)=0x10) 2018/04/24 07:21:00 executing program 6: r0 = syz_open_dev$evdev(&(0x7f0000237fee)='/dev/input/event#\x00', 0x2, 0x28001) write$evdev(r0, &(0x7f0000000000)=[{{}, 0x1, 0x4c, 0x2}, {}], 0x30) 2018/04/24 07:21:00 executing program 5: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f00000004c0), 0x0, 0x10000}], 0x0, &(0x7f00000002c0)=ANY=[]) 2018/04/24 07:21:01 executing program 3: unshare(0x8000400) r0 = mq_open(&(0x7f0000000000)='-$\x00', 0x6e93ebbbcc0884f2, 0x0, &(0x7f0000664fc0)={0x0, 0x5, 0x2}) mq_notify(r0, &(0x7f0000000200)={0x0, 0x0, 0x0, @thr={&(0x7f0000000040), &(0x7f0000000100)}}) syz_open_dev$dspn(&(0x7f0000000040)='/dev/dsp#\x00', 0x8, 0x608041) readv(r0, &(0x7f0000001240)=[{&(0x7f0000000180)=""/98, 0x62}], 0x1) 2018/04/24 07:21:01 executing program 4: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f00000004c0)="8da4363a00000000000000000000000000000000000000000000000000000000ecf6f2a3299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f00000002c0)=ANY=[]) chmod(&(0x7f0000000780)='./file0/file0/file0\x00', 0x0) 2018/04/24 07:21:01 executing program 0: r0 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer\x00', 0x4000, 0x0) ioctl$EVIOCGEFFECTS(r0, 0x80044584, &(0x7f0000000180)=""/146) r1 = socket$netlink(0x10, 0x3, 0x0) flistxattr(r1, &(0x7f0000000240)=""/67, 0xfffffffffffffedc) bind$netlink(r1, &(0x7f00000000c0)={0x400000010, 0x0, 0x0, 0x2000000}, 0xc) r2 = dup(r1) getsockopt$netlink(r2, 0x10e, 0x9, &(0x7f00005c6000)=""/6, &(0x7f00001bb000)=0x6) mq_open(&(0x7f0000000040)='bdev\x00', 0x0, 0x10, &(0x7f0000000080)={0xfffffffffffeffff, 0x2, 0x10000, 0x4, 0x5, 0x8, 0xc9e, 0x2}) 2018/04/24 07:21:01 executing program 7: r0 = socket$inet_sctp(0x2, 0x2000000000005, 0x84) connect$inet(r0, &(0x7f0000f6fff0)={0x2, 0x0, @local={0xac, 0x14, 0xffffffffffffffff, 0xaa}}, 0x10) r1 = socket$netlink(0x10, 0x3, 0x4) syz_genetlink_get_family_id$team(&(0x7f0000000040)='team\x00') r2 = fcntl$dupfd(r0, 0x406, r1) fchmodat(r2, &(0x7f0000002740)='./file0\x00', 0x4) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000000)=0x0) getsockopt$EBT_SO_GET_INFO(r0, 0x0, 0x80, &(0x7f0000002800)={'nat\x00'}, &(0x7f0000002880)=0x78) process_vm_readv(r3, &(0x7f0000000080)=[{&(0x7f00000001c0)=""/4096, 0x1000}, {&(0x7f00000011c0)=""/4096, 0x1000}], 0x2, &(0x7f0000002680)=[{&(0x7f00000000c0)=""/35, 0x23}, {&(0x7f00000021c0)=""/212, 0xd4}, {&(0x7f0000000100)=""/4, 0x4}, {&(0x7f00000022c0)=""/20, 0x14}, {&(0x7f0000002300)=""/216, 0xd8}, {&(0x7f0000002400)=""/208, 0xd0}, {&(0x7f0000002500)=""/120, 0x78}, {&(0x7f0000002580)=""/226, 0xe2}], 0x8, 0x0) writev(r1, &(0x7f000051c000)=[{&(0x7f0000000140)="480000001400190d76a81014aed182f30284470080ffe00600000000000000a2bc5603ca0016087f89000000200000000101ff0000000309ff5bffff08c7e5ed5e00000000000000", 0x48}], 0x1) renameat(r2, &(0x7f0000002780)='./file0\x00', r2, &(0x7f00000027c0)='./file0\x00') ioctl$TCSETAW(r2, 0x5407, &(0x7f0000002700)={0x40, 0x2, 0x8000, 0xfffffffffffffffd, 0x6, 0x1, 0x31cdce84, 0x867c, 0x24, 0x4}) 2018/04/24 07:21:01 executing program 1: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f00000004c0)="8da4363a00000000000000000000000000000000000000000000000000000000ecf6f2a3299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f00000002c0)=ANY=[]) chmod(&(0x7f0000000780)='./file0/file0/file0\x00', 0x0) 2018/04/24 07:21:01 executing program 6: r0 = syz_open_dev$evdev(&(0x7f0000237fee)='/dev/input/event#\x00', 0x2, 0x28001) write$evdev(r0, &(0x7f0000000000)=[{{}, 0x1, 0x4c, 0x2}, {}], 0x30) 2018/04/24 07:21:01 executing program 4: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f00000004c0)="8da4363a00000000000000000000000000000000000000000000000000000000ecf6f2a3299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f00000002c0)=ANY=[]) chmod(&(0x7f0000000780)='./file0/file0/file0\x00', 0x0) 2018/04/24 07:21:01 executing program 5: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f00000004c0), 0x0, 0x10000}], 0x0, &(0x7f00000002c0)=ANY=[]) 2018/04/24 07:21:01 executing program 3: r0 = semget$private(0x0, 0x5, 0x0) semtimedop(r0, &(0x7f0000000000)=[{0x4, 0x7ffd}, {0x0, 0x8091}], 0x2, &(0x7f0000034000)={0x77359400}) pipe(&(0x7f0000000040)={0xffffffffffffffff}) ioctl$TIOCSBRK(r1, 0x5427) semop(r0, &(0x7f0000035000)=[{0x4, 0x100000081}, {}], 0xfe) 2018/04/24 07:21:01 executing program 2: capset(&(0x7f0000000000)={0x9980330}, &(0x7f0000000040)={0x3, 0x8000010000000, 0x0, 0x0, 0x0, 0xfffffffffffffffc}) r0 = getpgrp(0xffffffffffffffff) ioprio_set$pid(0x1, r0, 0x0) 2018/04/24 07:21:01 executing program 0: add_key(&(0x7f0000000280)='dns_resolver\x00', &(0x7f00000002c0)={0x73, 0x79, 0x7a, 0x1}, &(0x7f0000000480)="291bcc426fd0fd18aac003f36f6e51c4c870199a99692e7bd62862bfc375eb86e575b132be3d20026a2ddf34f13385f207b61db3e1f83afecf0ba32296c37e38591306af6ae1fd0135543b2c508d437feb894c426284b04665eb90bbb5d1a109ba8c4af3f8178174c42f6b46d3523ccbe96aea110e73d84645dbeec04d0c6b26998f749bd8bd4e69f41233d612fd61c77e989cf1b834cbd924318249b79aeefede59e12ec87469a8e3609a5f3f21773fd6ae7bd42e42786b7b5a61b5320da60a286028a8f37a0f93313ee5d458a21bfc598ec082f626704acf", 0xd9, 0xfffffffffffffffb) r0 = add_key$keyring(&(0x7f0000000340)='keyring\x00', &(0x7f0000000380)={0x73, 0x79, 0x7a, 0x1}, 0x0, 0x0, 0xfffffffffffffff8) r1 = add_key$keyring(&(0x7f0000000240)='keyring\x00', &(0x7f0000000300)={0x73, 0x79, 0x7a, 0x1}, 0x0, 0x0, r0) r2 = add_key$keyring(&(0x7f0000000080)='keyring\x00', &(0x7f00000000c0)={0x73, 0x79, 0x7a, 0x0}, 0x0, 0x0, r1) r3 = add_key$keyring(&(0x7f0000000a80)='keyring\x00', &(0x7f00000003c0)={0x73, 0x79, 0x7a}, 0x0, 0x0, r2) r4 = add_key$user(&(0x7f00000001c0)='user\x00', &(0x7f0000000200)={0x73, 0x79, 0x7a}, &(0x7f0000000440)="01", 0x1, r3) r5 = add_key$user(&(0x7f0000000000)='user\x00', &(0x7f0000000040)={0x73, 0x79, 0x7a}, &(0x7f00000005c0)="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", 0x17b, r2) keyctl$dh_compute(0x17, &(0x7f0000000100)={r4, r5, r4}, &(0x7f0000a53ffb)=""/5, 0x5, &(0x7f0000000180)={&(0x7f0000000140)={'poly1305\x00'}}) 2018/04/24 07:21:01 executing program 5: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f00000004c0)="8da4363a00000000000000000000000000000000000000000000000000000000ecf6f2a3", 0x24, 0x10000}], 0x0, &(0x7f00000002c0)=ANY=[]) 2018/04/24 07:21:01 executing program 0: r0 = socket(0x11, 0xa, 0x0) getsockopt$inet_sctp_SCTP_INITMSG(r0, 0x84, 0x2, &(0x7f0000000280), &(0x7f00000002c0)=0x8) getsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(r0, 0x84, 0x6, &(0x7f0000000100)={0x0, @in={{0x2, 0x4e20, @local={0xac, 0x14, 0x14, 0xaa}}}}, &(0x7f00000001c0)=0x84) r2 = gettid() migrate_pages(r2, 0x5, &(0x7f0000000380), &(0x7f00000003c0)) getsockopt$inet_sctp_SCTP_ENABLE_STREAM_RESET(r0, 0x84, 0x76, &(0x7f0000000200)={r1, 0x535d}, &(0x7f0000000240)=0x8) getsockopt$inet_sctp_SCTP_STREAM_SCHEDULER_VALUE(r0, 0x84, 0x7c, &(0x7f0000000300)={r3, 0xc4, 0x1}, &(0x7f0000000340)=0x8) sendto$llc(r0, &(0x7f0000000000)="d56333ffba3d2ef11ac25c5d08e634cc13eecc0579a26450fe7f67c84ca97b7ece115b7a43aeba5721e9c47e42a37b10025b811c898d20b6d8d84cc3c2b38fa98b211478fdb6289d49f67f52e40050e3bb8979628c14b2846ce8724b2d6b5d60501037c298c7fb61e33da93458206bd526bab1d4efc28d1c7c56170735b85fb4713628e88960c7c2988e461d14c4433f84004dc1d2a6d262f645f3336f2807c1ca2bc538782c766196b7c13109e1436b55ed7ae69f24eee4f9f9153435", 0xbd, 0x0, 0x0, 0x0) setsockopt$inet_sctp_SCTP_NODELAY(r0, 0x84, 0x3, &(0x7f00000000c0), 0x4) 2018/04/24 07:21:02 executing program 1: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f00000004c0)="8da4363a00000000000000000000000000000000000000000000000000000000ecf6f2a3299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f00000002c0)=ANY=[]) chmod(&(0x7f0000000780)='./file0/file0/file0\x00', 0x0) 2018/04/24 07:21:02 executing program 4: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, &(0x7f0000000200), 0x0, &(0x7f00000002c0)=ANY=[]) symlinkat(&(0x7f0000000240)='./file0/file0/file0\x00', 0xffffffffffffffff, &(0x7f0000000140)='./file0\x00') chmod(&(0x7f0000000780)='./file0/file0/file0\x00', 0x0) 2018/04/24 07:21:02 executing program 6: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x5, 0x1, 0x5, 0x9}, 0x2c) r1 = bpf$MAP_CREATE(0x0, &(0x7f00004f9fe4)={0xd, 0x83, 0x4, 0x100000002, 0x0, r0}, 0x2c) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000100)={r1, &(0x7f00000001c0)="88f198693333e4de7c088ee1cda5aa36e0a2f379c06c2377a43644f9857873d499913f88050ba25cdf4fc4464dff086a4706dab5a69f376fff12d2ec996c7051307b83394d3ba29d3ffb3c3ca886178cfe1e468dfd8d1037d47248cce6e519d484d843c40336755d25e47921c323677bfa644e67ad9c2b", &(0x7f0000000040)=""/129}, 0x18) 2018/04/24 07:21:02 executing program 2: r0 = epoll_create(0x143) flock(r0, 0x1) r1 = epoll_create(0x4) r2 = socket$rds(0x15, 0x5, 0x0) r3 = epoll_create(0x100000001) r4 = syz_open_dev$mouse(&(0x7f0000000000)='/dev/input/mouse#\x00', 0xfffffffffffff801, 0x80000) ioctl$EVIOCSABS3F(r4, 0x401845ff, &(0x7f0000000040)={0x6, 0x5, 0x7f, 0x5, 0x3ff, 0x5}) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r3, &(0x7f000000e000)) ioctl$DRM_IOCTL_INFO_BUFS(r1, 0xc0106418, &(0x7f0000000140)={0x2, 0x6, 0x8, 0xe, 0x10, 0x2}) epoll_ctl$EPOLL_CTL_ADD(r3, 0x1, r2, &(0x7f000000d000)) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, r1, &(0x7f000000dff4)) setsockopt$bt_BT_DEFER_SETUP(r4, 0x112, 0x7, &(0x7f00000000c0)=0x8, 0x4) r5 = epoll_create(0x46c) r6 = epoll_create(0x1000) close(r6) epoll_ctl$EPOLL_CTL_ADD(r6, 0x1, r2, &(0x7f00000001c0)) lremovexattr(&(0x7f0000000080)='./file0\x00', &(0x7f0000000200)=ANY=[@ANYBLOB="7365632e002e3b1b2a1c6ee1c51e8bcd15aaa1d514d9fb07fd09656d4b64a56cd8e568bf9ce0907547f9cc7c468f8d81fe5fc4bb06be20f2334609955a1408c30adea10e49574a9a8e01b9eb088b2b3baccd01ba0933c21e1f2138d932000000a243d2bd4a11c44cf97f6f4832d1b893750a4bbc44d4440f0a2bd47f42eca25d"]) epoll_ctl$EPOLL_CTL_ADD(r6, 0x1, r0, &(0x7f00004d0000)) epoll_ctl$EPOLL_CTL_ADD(r5, 0x1, r6, &(0x7f0000000100)={0x2}) 2018/04/24 07:21:02 executing program 5: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f00000004c0)="8da4363a00000000000000000000000000000000000000000000000000000000ecf6f2a3", 0x24, 0x10000}], 0x0, &(0x7f00000002c0)=ANY=[]) 2018/04/24 07:21:02 executing program 1: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f00000004c0)="8da4363a00000000000000000000000000000000000000000000000000000000ecf6f2a3299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f00000002c0)=ANY=[]) chmod(&(0x7f0000000780)='./file0/file0/file0\x00', 0x0) 2018/04/24 07:21:02 executing program 0: r0 = socket(0x11, 0xa, 0x0) getsockopt$inet_sctp_SCTP_INITMSG(r0, 0x84, 0x2, &(0x7f0000000280), &(0x7f00000002c0)=0x8) getsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(r0, 0x84, 0x6, &(0x7f0000000100)={0x0, @in={{0x2, 0x4e20, @local={0xac, 0x14, 0x14, 0xaa}}}}, &(0x7f00000001c0)=0x84) r2 = gettid() migrate_pages(r2, 0x5, &(0x7f0000000380), &(0x7f00000003c0)) getsockopt$inet_sctp_SCTP_ENABLE_STREAM_RESET(r0, 0x84, 0x76, &(0x7f0000000200)={r1, 0x535d}, &(0x7f0000000240)=0x8) getsockopt$inet_sctp_SCTP_STREAM_SCHEDULER_VALUE(r0, 0x84, 0x7c, &(0x7f0000000300)={r3, 0xc4, 0x1}, &(0x7f0000000340)=0x8) sendto$llc(r0, &(0x7f0000000000)="d56333ffba3d2ef11ac25c5d08e634cc13eecc0579a26450fe7f67c84ca97b7ece115b7a43aeba5721e9c47e42a37b10025b811c898d20b6d8d84cc3c2b38fa98b211478fdb6289d49f67f52e40050e3bb8979628c14b2846ce8724b2d6b5d60501037c298c7fb61e33da93458206bd526bab1d4efc28d1c7c56170735b85fb4713628e88960c7c2988e461d14c4433f84004dc1d2a6d262f645f3336f2807c1ca2bc538782c766196b7c13109e1436b55ed7ae69f24eee4f9f9153435", 0xbd, 0x0, 0x0, 0x0) setsockopt$inet_sctp_SCTP_NODELAY(r0, 0x84, 0x3, &(0x7f00000000c0), 0x4) 2018/04/24 07:21:02 executing program 4: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, &(0x7f0000000200), 0x0, &(0x7f00000002c0)=ANY=[]) symlinkat(&(0x7f0000000240)='./file0/file0/file0\x00', 0xffffffffffffffff, &(0x7f0000000140)='./file0\x00') chmod(&(0x7f0000000780)='./file0/file0/file0\x00', 0x0) 2018/04/24 07:21:02 executing program 2: r0 = add_key$keyring(&(0x7f0000000340)='keyring\x00', &(0x7f0000000380)={0x73, 0x79, 0x7a}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$revoke(0x3, r0) request_key(&(0x7f00000004c0)="6b657972696e670006c071759d7e80ce8b80aee43cb5e43b32b3a7ddad59b1c27695672e42f8104af31baa314de193af01000009cec134964288902ff8630f74741332f4f79b0cb73dce82fab0803f1e7ba99e0b50fec8fd44873d383d1f093b2711e38bf266e1346882a174ebbc478763436b85ee0a7716ec74a045ef892d1f5a10fc8b730ce27b372ab58bcad8c30951f7caac3d601e30a605ed508d147c27b010a56ff3714655f2bc79a91f22e558a391e14056eaa40100a03a5a152b1b11bcee6150cfea8f41964881b3", &(0x7f0000000280)={0x73, 0x79, 0x7a}, &(0x7f0000000080)='keyring\x00', 0x0) 2018/04/24 07:21:02 executing program 1: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f00000004c0)="8da4363a00000000000000000000000000000000000000000000000000000000ecf6f2a3299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f00000002c0)=ANY=[]) 2018/04/24 07:21:02 executing program 5: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f00000004c0)="8da4363a00000000000000000000000000000000000000000000000000000000ecf6f2a3", 0x24, 0x10000}], 0x0, &(0x7f00000002c0)=ANY=[]) 2018/04/24 07:21:02 executing program 7: r0 = socket$inet_sctp(0x2, 0x2000000000005, 0x84) connect$inet(r0, &(0x7f0000f6fff0)={0x2, 0x0, @local={0xac, 0x14, 0xffffffffffffffff, 0xaa}}, 0x10) r1 = socket$netlink(0x10, 0x3, 0x4) syz_genetlink_get_family_id$team(&(0x7f0000000040)='team\x00') r2 = fcntl$dupfd(r0, 0x406, r1) fchmodat(r2, &(0x7f0000002740)='./file0\x00', 0x4) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000000)=0x0) getsockopt$EBT_SO_GET_INFO(r0, 0x0, 0x80, &(0x7f0000002800)={'nat\x00'}, &(0x7f0000002880)=0x78) process_vm_readv(r3, &(0x7f0000000080)=[{&(0x7f00000001c0)=""/4096, 0x1000}, {&(0x7f00000011c0)=""/4096, 0x1000}], 0x2, &(0x7f0000002680)=[{&(0x7f00000000c0)=""/35, 0x23}, {&(0x7f00000021c0)=""/212, 0xd4}, {&(0x7f0000000100)=""/4, 0x4}, {&(0x7f00000022c0)=""/20, 0x14}, {&(0x7f0000002300)=""/216, 0xd8}, {&(0x7f0000002400)=""/208, 0xd0}, {&(0x7f0000002500)=""/120, 0x78}, {&(0x7f0000002580)=""/226, 0xe2}], 0x8, 0x0) writev(r1, &(0x7f000051c000)=[{&(0x7f0000000140)="480000001400190d76a81014aed182f30284470080ffe00600000000000000a2bc5603ca0016087f89000000200000000101ff0000000309ff5bffff08c7e5ed5e00000000000000", 0x48}], 0x1) renameat(r2, &(0x7f0000002780)='./file0\x00', r2, &(0x7f00000027c0)='./file0\x00') ioctl$TCSETAW(r2, 0x5407, &(0x7f0000002700)={0x40, 0x2, 0x8000, 0xfffffffffffffffd, 0x6, 0x1, 0x31cdce84, 0x867c, 0x24, 0x4}) 2018/04/24 07:21:02 executing program 3: r0 = semget$private(0x0, 0x5, 0x0) semtimedop(r0, &(0x7f0000000000)=[{0x4, 0x7ffd}, {0x0, 0x8091}], 0x2, &(0x7f0000034000)={0x77359400}) pipe(&(0x7f0000000040)={0xffffffffffffffff}) ioctl$TIOCSBRK(r1, 0x5427) semop(r0, &(0x7f0000035000)=[{0x4, 0x100000081}, {}], 0xfe) 2018/04/24 07:21:02 executing program 6: r0 = socket$inet_udp(0x2, 0x2, 0x0) r1 = syz_open_dev$admmidi(&(0x7f0000000000)='/dev/admmidi#\x00', 0x0, 0xa0400) shutdown(r0, 0x0) clock_gettime(0x0, &(0x7f0000001c80)={0x0, 0x0}) setsockopt$ipx_IPX_TYPE(r1, 0x100, 0x1, &(0x7f0000000040)=0x50c4, 0x4) recvmmsg(r0, &(0x7f0000001b80)=[{{&(0x7f0000000700)=@l2, 0x80, &(0x7f0000001840)}}, {{&(0x7f0000001880)=@pppol2tpv3in6={0x0, 0x0, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, @ipv4={[], [], @loopback}}}}, 0x80, &(0x7f0000001b00), 0x0, &(0x7f0000001b40)=""/25, 0x19}}], 0x2, 0x10021, &(0x7f0000001cc0)={0x0, r2+30000000}) clock_getres(0x4, &(0x7f0000000080)) 2018/04/24 07:21:02 executing program 1: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, &(0x7f0000000200), 0x0, &(0x7f00000002c0)=ANY=[]) 2018/04/24 07:21:02 executing program 2: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000002c0)='./cgroup\x00', 0x200002, 0x0) fchdir(r0) unshare(0x20020000) 2018/04/24 07:21:02 executing program 4: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, &(0x7f0000000200), 0x0, &(0x7f00000002c0)=ANY=[]) symlinkat(&(0x7f0000000240)='./file0/file0/file0\x00', 0xffffffffffffffff, &(0x7f0000000140)='./file0\x00') chmod(&(0x7f0000000780)='./file0/file0/file0\x00', 0x0) 2018/04/24 07:21:02 executing program 5: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f00000004c0)="8da4363a00000000000000000000000000000000000000000000000000000000ecf6f2a3299748aeb81e1b00920efd9a000001000000", 0x36, 0x10000}], 0x0, &(0x7f00000002c0)=ANY=[]) 2018/04/24 07:21:03 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000300)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(camellia)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000ff8000)="0a0775b005e381e5b3b60ced5c54dbb7295df0df8217ad4000000000000000e6", 0xffffffffffffff86) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000000c00)=[{0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000380)="a4ccd57bf12596ee0dbfef6b7f99b9123660a2c44bd72770f3cee8fd5f2a9a80527a65a2cdb82ee6d6445f520b026410248abc781159519bb4b02a0ee42340b2726b7d24b5b154061879d06a5727c8f0ca6538528d5ba403ff00807e63211e433ef0f4a4bfffc89d61a02c1c1befb7439c3255d56072fb4f1f92a4a9d005e00c16705b4cbe15f5a2656e0e57cb9bcd6692027a5b9fc4cbbc248abeb61b485ac95156d689fa40d1", 0xa7}, {&(0x7f0000000440)="3f70aa5da5e05592c992b377daaacea2a008711bf22bc85860f8b95ec6e054482b74fa0ef321dc3eb7534ada14f26bc759e730de777d64d86773db6ebd56659c8dfac844320a2a221cac77440fee678d8456a055b718fa25b720bb351569a292646ce98337f7c2daa48613a9e240584a6ac8d6a04bada8df3cd945299cd6a7d7bb1a9178def8abdbccbe145c24ea17aa548603ce1c05bf9241134a99c83129e87872dd9d8eaf61c6ea69344c53fa4b85", 0xb0}], 0x2, &(0x7f0000000580), 0x0, 0x40}, {0x0, 0x0, &(0x7f0000000240)=[{&(0x7f00000001c0)="9c53fe3fcdb0e5cf3fcf211b", 0xc}, {&(0x7f0000000880)="56170008223eb24617ee111affe7882bb28a1cb51129d188be2c2c4ec2aef5dd1230c393d6c1a0aee15715b52376113ec3f596fa16b452588ae55ac24ae8643a121647658aabc9b10264201fdb4edcede924e944f1", 0x55}], 0x2, &(0x7f0000003480)=[@op={0x18, 0x117, 0x3}, @assoc={0x0, 0x117, 0x4, 0x6}], 0x1030, 0x40000}, {0x0, 0x0, &(0x7f0000000b80)=[{&(0x7f0000000900)="866ac3432eee79", 0x7}, {&(0x7f0000000940)="4ca9f0048fa85d43bbc81380487b5ae545a05b0ade0b30f01d8020c6bb3019f810027fa8715ceeafcffe84b539021e7bdbd75a53fdcfe21508e96633ae8887288d3cdd24525b02a1f2a1e384f6302e8fdef22cc3cfd022a8", 0x58}, {&(0x7f00000044c0)="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", 0x1000}, {&(0x7f00000009c0)="680d20b9d46ce66b500c6c1b1013119e3b3bd34061abdc4943", 0x19}, {&(0x7f0000000a00)="000bf973c6915bbe1bd7e8bb1a7fd6ce858d8c8cf3b2ddde978628240bc47552bfc183a5231357488864b59d2d1eabf0b70f7859e73f66df31b4a517f45b5e4f02aee2407068ec326a3357744e36e7f12c527131ef1b1ec25c", 0x59}, {&(0x7f0000000a80)="1d74b1b00f5f3dd80d837486df7b0d4cd33f3169e8cc037634aa19c51f04e0f11412e4ecaa3e009bca5a7487a5191ba296c89ebbac49b66c0bf32f5265dc199d34591f4ebd1127582321e345786d742891d02702bd0ac6b0c4521d8f3a3f21ad811a40e1d6e08c0c99ff38655fe539674a86f1d9f5001bdf706bae5d7ed54764141a3b2f8fe1393409a80025da33ab668e4b2537522a90eb997a09037b52bbc4cd90951106471f6bf193da3f5ba360e7", 0xb0}, {&(0x7f0000000b40)="6909b29d7a9290ae4e53296cdcad8b1539e4d5ad6750f253261e913797af80703e", 0x13e}], 0x310, 0x0, 0x0, 0x8840}], 0x3, 0x0) ioctl$sock_FIOGETOWN(r0, 0x8903, &(0x7f0000000040)) recvmsg(r1, &(0x7f0000000140)={&(0x7f0000000280)=@sco, 0x80, &(0x7f0000000000)=[{&(0x7f0000001480)=""/4096, 0x1000}], 0x1, &(0x7f0000000200)=""/6, 0x6}, 0x0) 2018/04/24 07:21:03 executing program 6: futex(&(0x7f000000cffc), 0x0, 0x0, &(0x7f0000001000)={0x77359400}, &(0x7f0000048000), 0x0) futex(&(0x7f000000cffc), 0x0, 0x0, &(0x7f0000edfff0)={0x77359400}, &(0x7f0000048000), 0x0) mincore(&(0x7f0000ffc000/0x3000)=nil, 0x3000, &(0x7f0000000080)=""/207) r0 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000180)='/dev/hwrng\x00', 0x400000, 0x0) getsockopt$inet_sctp_SCTP_DELAYED_SACK(0xffffffffffffff9c, 0x84, 0x10, &(0x7f00000001c0)=@assoc_value={0x0, 0x1}, &(0x7f0000000200)=0x8) getsockopt$inet_sctp_SCTP_RTOINFO(r0, 0x84, 0x0, &(0x7f0000000240)={r1, 0x2, 0x1, 0x9565}, &(0x7f0000000280)=0x10) clock_gettime(0x4, &(0x7f0000000000)={0x0, 0x0}) futex(&(0x7f000000cffc), 0x5, 0x7, &(0x7f0000451000)={r2, r3+10000000}, &(0x7f0000000040), 0x0) 2018/04/24 07:21:03 executing program 1: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, &(0x7f0000000200), 0x0, &(0x7f00000002c0)=ANY=[]) 2018/04/24 07:21:03 executing program 4: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f00000004c0), 0x0, 0x10000}], 0x0, &(0x7f00000002c0)=ANY=[]) symlinkat(&(0x7f0000000240)='./file0/file0/file0\x00', 0xffffffffffffffff, &(0x7f0000000140)='./file0\x00') chmod(&(0x7f0000000780)='./file0/file0/file0\x00', 0x0) 2018/04/24 07:21:03 executing program 5: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f00000004c0)="8da4363a00000000000000000000000000000000000000000000000000000000ecf6f2a3299748aeb81e1b00920efd9a000001000000", 0x36, 0x10000}], 0x0, &(0x7f00000002c0)=ANY=[]) 2018/04/24 07:21:04 executing program 2: r0 = socket$inet6_udp(0xa, 0x2, 0x0) r1 = socket$inet(0x2, 0x2, 0x0) r2 = dup3(r0, r1, 0x0) getsockopt$inet_sctp6_SCTP_NODELAY(r2, 0x84, 0x3, &(0x7f0000000080), &(0x7f00000000c0)=0x4) setsockopt$SO_TIMESTAMPING(r2, 0x1, 0x25, &(0x7f0000000140)=0x7fd, 0x4) setsockopt$inet6_int(r0, 0x29, 0x3a, &(0x7f0000000040)=0x101, 0x4) setsockopt$inet_int(r2, 0x0, 0x8, &(0x7f0000000100)=0x5ff9, 0x2e8) sendto$inet(r1, &(0x7f0000832fff), 0x0, 0x0, &(0x7f0000000000)={0x2, 0x4e20}, 0x10) recvmsg(r1, &(0x7f00005b7000)={0x0, 0x0, &(0x7f0000000040), 0x0, &(0x7f0000002b40)}, 0x2020) 2018/04/24 07:21:04 executing program 4: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f00000004c0), 0x0, 0x10000}], 0x0, &(0x7f00000002c0)=ANY=[]) symlinkat(&(0x7f0000000240)='./file0/file0/file0\x00', 0xffffffffffffffff, &(0x7f0000000140)='./file0\x00') chmod(&(0x7f0000000780)='./file0/file0/file0\x00', 0x0) 2018/04/24 07:21:04 executing program 1: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, &(0x7f0000000200), 0x0, &(0x7f00000002c0)=ANY=[]) 2018/04/24 07:21:04 executing program 5: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f00000004c0)="8da4363a00000000000000000000000000000000000000000000000000000000ecf6f2a3299748aeb81e1b00920efd9a000001000000", 0x36, 0x10000}], 0x0, &(0x7f00000002c0)=ANY=[]) 2018/04/24 07:21:04 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, &(0x7f0000000200), 0x0, &(0x7f00000002c0)=ANY=[]) 2018/04/24 07:21:04 executing program 3: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, &(0x7f0000000200), 0x0, &(0x7f00000002c0)=ANY=[]) symlinkat(&(0x7f0000000240)='./file0/file0/file0\x00', 0xffffffffffffffff, &(0x7f0000000140)='./file0\x00') chmod(&(0x7f0000000780)='./file0/file0/file0\x00', 0x0) 2018/04/24 07:21:04 executing program 6: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000240)='./cgroup\x00', 0x200002, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000000040)='cgroup.procs\x00', 0x2, 0x0) readv(r1, &(0x7f0000001540)=[{&(0x7f0000001180)}, {&(0x7f0000001440)=""/192, 0xc0}], 0x200000000000032f) r2 = openat$mixer(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/mixer\x00', 0x440, 0x0) lstat(&(0x7f0000000000)='./file0\x00', &(0x7f0000000100)) ioctl$KDSETMODE(r2, 0x4b3a, 0x7fffffff) 2018/04/24 07:21:04 executing program 7: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000500)={0x26, 'aead\x00', 0x0, 0x0, 'rfc4543(gcm(aes))\x00'}, 0x58) r1 = syz_open_dev$mice(&(0x7f0000000000)='/dev/input/mice\x00', 0x0, 0x80000) ioctl$PERF_EVENT_IOC_QUERY_BPF(r1, 0xc008240a, &(0x7f00000000c0)=ANY=[@ANYBLOB="0a0001000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000"]) setsockopt$bt_l2cap_L2CAP_LM(r1, 0x6, 0x3, &(0x7f0000000040)=0x1, 0x4) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="d179f2508fb13583605d0008a230e7a657f9cc6e", 0x14) r2 = accept$alg(r1, 0x0, 0x0) sendmmsg$alg(r2, &(0x7f0000000f40)=[{0x0, 0x0, &(0x7f0000000640), 0x350, &(0x7f0000000680)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_REM(r1, 0x84, 0x65, &(0x7f0000000380)=[@in={0x2, 0x4e24, @multicast2=0xe0000002}, @in={0x2, 0x4e24, @multicast1=0xe0000001}, @in={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x15}}, @in={0x2, 0x4e23, @loopback=0x7f000001}, @in={0x2, 0x4e23, @multicast1=0xe0000001}, @in6={0xa, 0x4e22, 0x1ff, @mcast1={0xff, 0x1, [], 0x1}, 0x8001}, @in6={0xa, 0x4e23, 0x100000001, @local={0xfe, 0x80, [], 0xaa}, 0x2}, @in6={0xa, 0x4e23, 0x9c0, @remote={0xfe, 0x80, [], 0xbb}, 0x6}], 0xa4) recvmsg(r2, &(0x7f00000001c0)={&(0x7f0000000140)=@nfc_llcp, 0x80, &(0x7f0000000200)=[{&(0x7f0000000300)=""/88, 0x58}], 0x1, &(0x7f00009f2000)=""/190, 0xbe}, 0x0) getsockopt$ARPT_SO_GET_INFO(r1, 0x0, 0x60, &(0x7f0000000240)={'filter\x00'}, &(0x7f00000002c0)=0x44) ioctl$sock_SIOCADDDLCI(r2, 0x8980, &(0x7f0000000100)={'erspan0\x00', 0xb0e}) 2018/04/24 07:21:04 executing program 6: recvmsg(0xffffffffffffffff, &(0x7f0000346fc8)={&(0x7f0000baefec)=@ll, 0x14, &(0x7f0000000000), 0x163, &(0x7f0000a01f13)=""/237, 0xffffffffffffff62}, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x1, 0x5, &(0x7f0000346fc8)=ANY=[@ANYBLOB="18000000000000000000000000000000611000000000000000000000000200009500000000000000"], &(0x7f0000f6bffb)="34506e8b", 0xfffffffffffffffc, 0xfb, &(0x7f0000000280)=""/251, 0x0, 0x1}, 0x48) 2018/04/24 07:21:04 executing program 0: r0 = socket$inet6(0xa, 0x3, 0xff) connect$inet6(r0, &(0x7f000000cfe4)={0xa, 0x0, 0x0, @local={0xfe, 0x80, [], 0xaa}, 0x9}, 0x1c) getsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(0xffffffffffffff9c, 0x84, 0x6, &(0x7f0000000000)={0x0, @in={{0x2, 0x4e23, @multicast1=0xe0000001}}}, &(0x7f00000000c0)=0x84) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r0, 0x84, 0x66, &(0x7f0000000100)={r1, 0x730}, &(0x7f0000000140)=0x8) sendmsg(r0, &(0x7f0000001000)={0x0, 0x0, &(0x7f0000001700)=[{&(0x7f0000000bc0)="9df7325f7563032afcc296a8772ab9491329a257922adc1475dc2ee6ae2c2e689076a48e13910be1099b93dd79d124053b000a22c15827f189da291b54113c116f577071f2c2592d02d1c108cafa41a80c59a9b5e6618cc4a1f05c963e37fc153ce59c9e09aa29ce042882ab5ac733345bb08332ea3f3948f0410fdb4c4c731b063c3f38ba98238a92cb7c900b445f5375cee3d9f7a91f6f5a7798f3bbdfd92d17bdcacaf8f46b61839e53cbffba68a34a32bc6cf5e50d4069b619863666ce3aba0249563c0daae77a88415627408184c248ae741f2bc44968d93b0c4cea62156dcd4bc974f550295ffba50859ac52aff0943dac586ee880ba74e1e0a3d210259da67fdec08e07eebc55d8ab47f62cd79f8a60620b459fba742d7ce72284e3796f8d87368c5ce4553358db91ed068fdb14b402c15ce2075dbe16117478ab0265497fd3faf6aa8a8fb772f3e92caec6bdd0e5056d67e604b4ac268843be24cf35228bdc5def0efdbaf56f1d9d9046235fdf3064977b3d2e77fabd6aa47164760f0a9cad32090bb7f671c54c722de42d7a445386fd71a98dfef100a345a54d6d814154bde6cdcf672e9483a48b9a2c78076511ec3f17d3651015d19ce549cd977c94ff252c1362f867b0a15ab79801bd622010778f1745e2f5fa7240057ce43d5a3e7531996da3783207cb609d525643cf646cda22412d4a3d512fa7266af30238419e1f1e79fa49b92968f30f8c4dc5ea77077723abf3efaf3be921cdb87eb6b22e014f1c6da866da7f3d0e76faf12db758c62ae0425ebfe9a17fee1829388f194521ca13959a2bb947269a73a4aba96ff18d8de0e460c9e3828dba48448a1263b402447bd06b11007742ce006e776ee35fc4e36e87cb2272962455ccccbeaeb4d583bf7728871e37128e9be4769569b21015bf6e8a31fd40d19ae0a0846af59cd1b4c579bfcbd68fcfb3096e40e7f679dbeb09a3475a94091ff019e2c29642b5ed01b0f6ea41a26939987cf7ad7d02f22d18310f6b4cabe8a9c07da6030c1cc39e604931273acf74c077034c49dc37b329214e29428d12d2a99fbf1c7d2c845b8d2e37d317ac8ecddca5fba6e1d3964d6afe0b1404873ab27042ee2a755a887fecc05eb43156da69377c3f490e3a0279fbdd756f4831f1cfb3bb495b605d069b85a38f9ed692881fe5478748c47be77fad83cd50beaac4d2f70b970cf12465061c37f8553073552cbad7308ce4fe88f351e106f0f8d92ea0d263784cea849a6e35ab4f5930d5f231ce4a4017e4ba0ae40ae28fec10970380da44620a98f809e18be0040775237e2507f464452bd2ef4a03659b1e089b059072ac43571ae688e5cc6a0e", 0x3c3}, {&(0x7f0000000b80)="e347c9b1c813f485ef7616e8f5eda0c957c71da38ac2ae5f939d1f98", 0x1c}], 0x2, &(0x7f0000001040)}, 0x8000) 2018/04/24 07:21:04 executing program 1: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f00000004c0), 0x0, 0x10000}], 0x0, &(0x7f00000002c0)=ANY=[]) 2018/04/24 07:21:04 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x20000000000009, &(0x7f0000000000)=0x33, 0x4) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f0000000040)) r1 = syz_open_dev$dspn(&(0x7f0000000080)='/dev/dsp#\x00', 0x24f66d99, 0x200000) setsockopt$SO_RDS_MSG_RXPATH_LATENCY(r1, 0x114, 0xa, &(0x7f00000000c0)={0x3, "431682"}, 0x4) getsockopt$inet_tcp_int(r0, 0x6, 0x9, &(0x7f000024bffc), &(0x7f0000ff0000)=0x4) 2018/04/24 07:21:04 executing program 5: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f00000004c0)="8da4363a00000000000000000000000000000000000000000000000000000000ecf6f2a3299748aeb81e1b00920efd9a000001000000000001000000000000", 0x3f, 0x10000}], 0x0, &(0x7f00000002c0)=ANY=[]) 2018/04/24 07:21:04 executing program 4: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f00000004c0), 0x0, 0x10000}], 0x0, &(0x7f00000002c0)=ANY=[]) symlinkat(&(0x7f0000000240)='./file0/file0/file0\x00', 0xffffffffffffffff, &(0x7f0000000140)='./file0\x00') chmod(&(0x7f0000000780)='./file0/file0/file0\x00', 0x0) 2018/04/24 07:21:04 executing program 2: r0 = socket$inet6_udp(0xa, 0x2, 0x0) r1 = socket$inet(0x2, 0x2, 0x0) r2 = dup3(r0, r1, 0x0) getsockopt$inet_sctp6_SCTP_NODELAY(r2, 0x84, 0x3, &(0x7f0000000080), &(0x7f00000000c0)=0x4) setsockopt$SO_TIMESTAMPING(r2, 0x1, 0x25, &(0x7f0000000140)=0x7fd, 0x4) setsockopt$inet6_int(r0, 0x29, 0x3a, &(0x7f0000000040)=0x101, 0x4) setsockopt$inet_int(r2, 0x0, 0x8, &(0x7f0000000100)=0x5ff9, 0x2e8) sendto$inet(r1, &(0x7f0000832fff), 0x0, 0x0, &(0x7f0000000000)={0x2, 0x4e20}, 0x10) recvmsg(r1, &(0x7f00005b7000)={0x0, 0x0, &(0x7f0000000040), 0x0, &(0x7f0000002b40)}, 0x2020) 2018/04/24 07:21:04 executing program 7: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f00000004c0), 0x0, 0x10000}], 0x0, &(0x7f00000002c0)=ANY=[]) symlinkat(&(0x7f0000000240)='./file0/file0/file0\x00', 0xffffffffffffffff, &(0x7f0000000140)='./file0\x00') chmod(&(0x7f0000000780)='./file0/file0/file0\x00', 0x0) 2018/04/24 07:21:04 executing program 7: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f00000004c0), 0x0, 0x10000}], 0x0, &(0x7f00000002c0)=ANY=[]) symlinkat(&(0x7f0000000240)='./file0/file0/file0\x00', 0xffffffffffffffff, &(0x7f0000000140)='./file0\x00') chmod(&(0x7f0000000780)='./file0/file0/file0\x00', 0x0) 2018/04/24 07:21:04 executing program 1: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f00000004c0), 0x0, 0x10000}], 0x0, &(0x7f00000002c0)=ANY=[]) 2018/04/24 07:21:04 executing program 5: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f00000004c0)="8da4363a00000000000000000000000000000000000000000000000000000000ecf6f2a3299748aeb81e1b00920efd9a000001000000000001000000000000", 0x3f, 0x10000}], 0x0, &(0x7f00000002c0)=ANY=[]) 2018/04/24 07:21:04 executing program 4: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f00000004c0)="8da4363a00000000000000000000000000000000000000000000000000000000ecf6f2a3", 0x24, 0x10000}], 0x0, &(0x7f00000002c0)=ANY=[]) symlinkat(&(0x7f0000000240)='./file0/file0/file0\x00', 0xffffffffffffffff, &(0x7f0000000140)='./file0\x00') chmod(&(0x7f0000000780)='./file0/file0/file0\x00', 0x0) 2018/04/24 07:21:04 executing program 0: pipe2(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}, 0x84800) r2 = gettid() bind$netrom(r0, &(0x7f00000000c0)=@full={{0x3, {"1addfd3606d4de"}, 0x3}, [{"0e417702c53abd"}, {"a89a2f63ec2897"}, {"c04a28ce93c603"}, {"1f08d62088481a"}, {"e5b3b423bbb4b4"}, {"90bd3c833cff3a"}, {"14b13ecd08e7c4"}, {"91c360d9e7161b"}]}, 0x48) r3 = syz_open_procfs(r2, &(0x7f0000000240)='net/snmp6\x00') accept4$inet6(r1, &(0x7f0000000000), &(0x7f0000000080)=0x1c, 0x80000) sendfile(r1, r3, &(0x7f0000000040), 0x800000000fffc) 2018/04/24 07:21:04 executing program 2: r0 = userfaultfd(0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000000000)={0xaa, 0x20}) fstat(r0, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) fstat(r0, &(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) setregid(r1, r2) 2018/04/24 07:21:04 executing program 6: r0 = syz_open_dev$evdev(&(0x7f0000057fee)='/dev/input/event#\x00', 0xafd, 0x8000040000001) r1 = syz_open_dev$mice(&(0x7f0000000000)='/dev/input/mice\x00', 0x0, 0x0) ioctl$sock_FIOGETOWN(r1, 0x8903, &(0x7f0000000080)) setsockopt$IP_VS_SO_SET_ADDDEST(r1, 0x0, 0x487, &(0x7f00000000c0)={{0x3a, @multicast2=0xe0000002, 0x4e20, 0x3, 'sed\x00', 0x6, 0x1, 0x30}, {@multicast1=0xe0000001, 0x4e21, 0x1, 0x3ff, 0x72c, 0x20}}, 0x44) mknod$loop(&(0x7f0000000140)='./file0\x00', 0x40, 0x0) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r1, 0x84, 0x8, &(0x7f0000000040)=0x61, 0x4) write$evdev(r0, &(0x7f000004d000)=[{{}, 0x2, 0x8, 0x401}, {}], 0x30) 2018/04/24 07:21:04 executing program 3: r0 = syz_open_dev$sndpcmp(&(0x7f0000000080)='/dev/snd/pcmC#D#p\x00', 0x80, 0x2000) execve(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000180)=[&(0x7f0000000100)='.cpuset%@*\x00', &(0x7f0000000140)='\x00'], &(0x7f0000000240)=[&(0x7f00000001c0)='/dev/snd/pcmC#D#p\x00', &(0x7f0000000200)='/dev/snd/pcmC#D#p\x00']) chroot(&(0x7f0000000300)='./file0\x00') mkdir(&(0x7f00000002c0)='./file0\x00', 0x5) ioctl$VHOST_VSOCK_SET_GUEST_CID(r0, 0x4008af60, &(0x7f0000000280)={@hyper}) syz_emit_ethernet(0x3e, &(0x7f0000000000)={@broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], @dev={[0xaa, 0xaa, 0xaa, 0xaa]}, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x30, 0x0, 0x0, 0x0, 0x67, 0x0, @local={0xac, 0x14, 0xffffffffffffffff, 0xaa}, @rand_addr=0xffffffffffffffff}, @icmp=@time_exceeded={0x21, 0x0, 0x0, 0x0, 0x0, 0x0, {0x5, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @rand_addr, @dev={0xac, 0x14}}}}}}}, 0x0) 2018/04/24 07:21:04 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = inotify_init1(0x0) fcntl$setown(r1, 0x8, 0xffffffffffffffff) fcntl$getownex(r0, 0x10, &(0x7f00000000c0)={0x0, 0x0}) ptrace$setopts(0x4200, r2, 0x0, 0x2) ptrace(0x41fb, r2) ptrace$setregset(0x4205, r2, 0x1, &(0x7f0000000000)={&(0x7f00000000c0), 0xfffffffffffffe75}) socketpair$inet6_dccp(0xa, 0x6, 0x0, &(0x7f0000000000)) setsockopt$inet6_buf(r0, 0x29, 0x2d, &(0x7f0000000000), 0x0) 2018/04/24 07:21:04 executing program 7: r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000001240)='/proc/self/net/pfkey\x00', 0x18000, 0x0) ioctl$TIOCSCTTY(r0, 0x540e, 0x8) syz_open_dev$admmidi(&(0x7f0000001280)='/dev/admmidi#\x00', 0x200, 0x8000) r1 = perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f000031f000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, r1, 0x0) ioctl$PERF_EVENT_IOC_DISABLE(r1, 0x2401, 0x0) r3 = openat$vcs(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vcs\x00', 0x0, 0x0) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000001200)={r3, &(0x7f0000000100)="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", &(0x7f0000001100)=""/232}, 0x18) read(r2, &(0x7f0000000040)=""/78, 0x4e) fcntl$addseals(r3, 0x409, 0x4) 2018/04/24 07:21:04 executing program 3: r0 = syz_open_dev$mouse(&(0x7f0000000000)='/dev/input/mouse#\x00', 0x7, 0x8000) ioctl$PIO_UNISCRNMAP(r0, 0x4b6a, &(0x7f0000000100)="d3b899553d5862b3f9d5b3d15b79900d5625") r1 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_inet_SIOCDELRT(r1, 0x890c, &(0x7f0000000080)={0x0, {0x2, 0x0, @rand_addr}, {0x2, 0x0, @loopback=0x7f000001}, {0x2}, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000040)='team_slave_1\x00'}) 2018/04/24 07:21:05 executing program 5: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f00000004c0)="8da4363a00000000000000000000000000000000000000000000000000000000ecf6f2a3299748aeb81e1b00920efd9a000001000000000001000000000000", 0x3f, 0x10000}], 0x0, &(0x7f00000002c0)=ANY=[]) 2018/04/24 07:21:05 executing program 1: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f00000004c0), 0x0, 0x10000}], 0x0, &(0x7f00000002c0)=ANY=[]) 2018/04/24 07:21:05 executing program 0: mkdir(&(0x7f00000002c0)='./control\x00', 0x0) creat(&(0x7f00000001c0)='./control\x00', 0x0) unlink(&(0x7f0000000280)='./control/file1\x00') r0 = creat(&(0x7f0000000000)='./control/file0\x00', 0x0) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000040)={&(0x7f0000000200)='./control/file1\x00', 0x0, 0x18}, 0xed3f02836b683197) unlink(&(0x7f00000000c0)='./control/file0\x00') rmdir(&(0x7f000015dff6)='./control\x00') ioctl$KDGKBMETA(r0, 0x4b62, &(0x7f0000000140)) 2018/04/24 07:21:05 executing program 4: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f00000004c0)="8da4363a00000000000000000000000000000000000000000000000000000000ecf6f2a3", 0x24, 0x10000}], 0x0, &(0x7f00000002c0)=ANY=[]) symlinkat(&(0x7f0000000240)='./file0/file0/file0\x00', 0xffffffffffffffff, &(0x7f0000000140)='./file0\x00') chmod(&(0x7f0000000780)='./file0/file0/file0\x00', 0x0) 2018/04/24 07:21:05 executing program 6: r0 = syz_open_dev$sndseq(&(0x7f0000000100)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r0, 0xc0a85320, &(0x7f0000418f50)={{0x80}, "0a4ceaa05d9a00000000000000039b3fd4cec307e8ef3d13eb790ec9c65abaf90d229db692542e5b78f8b29e0a27800f0000000000000009fb42f376589701a4"}) r1 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040)='/dev/hwrng\x00', 0x280, 0x0) ioctl$VHOST_GET_VRING_ENDIAN(r1, 0x4008af14, &(0x7f00000001c0)={0x3, 0x7}) ioctl$SNDRV_SEQ_IOCTL_SUBSCRIBE_PORT(r0, 0x40505330, &(0x7f0000000080)={{0x0, 0x1}, {0x80}, 0x0, 0x4}) setsockopt$inet_sctp_SCTP_HMAC_IDENT(r1, 0x84, 0x16, &(0x7f0000000280)={0x4, [0x1, 0x8000, 0x638c, 0x3ff]}, 0xc) r2 = semget(0x2, 0x1, 0x0) semctl$GETPID(r2, 0x3, 0xb, &(0x7f0000000000)=""/13) ioctl$SNDRV_SEQ_IOCTL_GET_SUBSCRIPTION(r0, 0x40505330, &(0x7f0000000140)={{0x0, 0x10001}, {0xffffff80}, 0x0, 0x4, 0xbf}) modify_ldt$read(0x0, &(0x7f0000000200)=""/116, 0x74) 2018/04/24 07:21:05 executing program 3: r0 = socket$inet_sctp(0x2, 0x1, 0x84) r1 = openat$audio(0xffffffffffffff9c, &(0x7f0000000040)='/dev/audio\x00', 0x1, 0x0) accept4$bt_l2cap(r1, &(0x7f0000000080), &(0x7f00000000c0)=0xe, 0x80000) shutdown(r0, 0x0) getsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX3(r0, 0x84, 0x6f, &(0x7f00000001c0)={0x0, 0x20, &(0x7f0000000000)=[@in={0x2, 0x0, @remote={0xac, 0x14, 0x14, 0xbb}}, @in={0x2, 0x0, @loopback=0x7f000001}]}, &(0x7f0000000200)=0x10) 2018/04/24 07:21:05 executing program 2: r0 = syz_open_dev$dmmidi(&(0x7f0000000000)='/dev/dmmidi#\x00', 0x7, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000002c0)="f60156eff625cd2bbc339c23f6ee15ef8be8bfeb1efcd0288028d3d8f26baee1f32483682aeec9c282ba01657b9af4d995c51777ca3e45b9c7e71a5170e114872bbb5e8869b72d91ce0ca277999eee33c86021795e6c3a091298fad8c4d8264bb96b30", 0x63) tgkill(0x0, 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000040)="2f65786500000000000090d8b75e67e16b394342abb5158df87ea8984e79c93df7498b2b34796068700e29fbd789f9a031f23e16c96e30baed2961953b057f7a3222943acc4b8cfa4de553f8276731ddeb811efd44ea011e1a0db9074a28a826c88566b89c57cc3cca4aec41d37fa27c8daa19030d03139d0aea71d509d9a20ba7deceb656cc1308d9d1f111b6bd1595486f55e229923be4ed8cbfb78e86280b4cacf386bfa8840afb312a4c520a03b27f805d181bd09ea208931a36e888060a2d") fsetxattr(r1, &(0x7f0000000140)=@known='user.syz\x00', &(0x7f0000000180)="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", 0x137, 0x0) 2018/04/24 07:21:05 executing program 5: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f00000004c0)="8da4363a00000000000000000000000000000000000000000000000000000000ecf6f2a3299748aeb81e1b00920efd9a000001000000000001000000000000005f424852", 0x44, 0x10000}], 0x0, &(0x7f00000002c0)=ANY=[]) 2018/04/24 07:21:05 executing program 4: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f00000004c0)="8da4363a00000000000000000000000000000000000000000000000000000000ecf6f2a3", 0x24, 0x10000}], 0x0, &(0x7f00000002c0)=ANY=[]) symlinkat(&(0x7f0000000240)='./file0/file0/file0\x00', 0xffffffffffffffff, &(0x7f0000000140)='./file0\x00') chmod(&(0x7f0000000780)='./file0/file0/file0\x00', 0x0) 2018/04/24 07:21:05 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f00000004c0)="8da4363a00000000000000000000000000000000000000000000000000000000ecf6f2a3", 0x24, 0x10000}], 0x0, &(0x7f00000002c0)=ANY=[]) symlinkat(&(0x7f0000000240)='./file0/file0/file0\x00', 0xffffffffffffffff, &(0x7f0000000140)='./file0\x00') chmod(&(0x7f0000000780)='./file0/file0/file0\x00', 0x0) 2018/04/24 07:21:05 executing program 1: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f00000004c0)="8da4363a00000000000000000000000000000000000000000000000000000000ecf6f2a3", 0x24, 0x10000}], 0x0, &(0x7f00000002c0)=ANY=[]) 2018/04/24 07:21:05 executing program 7: mmap(&(0x7f0000000000/0xf000)=nil, 0xf000, 0x0, 0x1b071, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x200, 0x0) ioctl$sock_inet_tcp_SIOCOUTQ(r0, 0x5411, &(0x7f0000000040)) remap_file_pages(&(0x7f0000004000/0x1000)=nil, 0x1000, 0x0, 0xfffffffffffffffe, 0x0) mremap(&(0x7f0000004000/0x1000)=nil, 0x1000, 0x4000, 0x3, &(0x7f0000009000/0x4000)=nil) 2018/04/24 07:21:05 executing program 3: r0 = socket$key(0xf, 0x3, 0x2) sigaltstack(&(0x7f0000ffe000/0x2000)=nil, &(0x7f0000000140)) sendmsg$key(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000000)=ANY=[@ANYBLOB="0213000b130000002bbd7000fbdbdf25050005007f0000000a004e2400000000fe8000000000000000000000000000aafa651f5e0000000007001900000000000a004e2200000000ff0100000000000000000000000000010000000002004e23ac14141300000000000000eaffffffff04000700ff0000000a004e2200000000ff0100000000000000000000000000010000000000000000"], 0x98}, 0x1}, 0x0) getpeername$packet(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @local}, &(0x7f00000001c0)=0x14) setsockopt$inet_mreqn(r0, 0x0, 0x24, &(0x7f0000000200)={@empty, @dev={0xac, 0x14, 0x14, 0x15}, r1}, 0xc) getsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000240), 0x10) 2018/04/24 07:21:05 executing program 6: r0 = userfaultfd(0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000fcdfe8)={0xaa}) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000000000)={{&(0x7f0000068000/0x800000)=nil, 0x800000}, 0x1}) read(r0, &(0x7f0000465f8e)=""/114, 0x72) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='cpuacct.usage_percpu_sys\x00', 0x0, 0x0) ioctl$DRM_IOCTL_ADD_MAP(r1, 0xc0286415, &(0x7f0000000100)={0x0, 0x100000000, 0x4, 0xc9, &(0x7f0000a22000/0x3000)=nil, 0x44cdf075}) socketpair(0x5, 0x804, 0x9, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = syz_genetlink_get_family_id$ipvs(&(0x7f00000001c0)='IPVS\x00') sendmsg$IPVS_CMD_SET_CONFIG(r1, &(0x7f00000003c0)={&(0x7f0000000180)={0x10}, 0xc, &(0x7f0000000380)={&(0x7f0000000400)=ANY=[@ANYBLOB="70000000d25cfbff06343140", @ANYRES16=r3, @ANYBLOB="02082cbd7000ffdbdf250c000000080004000600000008000600ff000000080004005c0b00004400020008000400680000000800030002000000080004002504000008000b000a00000008000600030000000800070003000000080009000100000008000900fdffffff"], 0x70}, 0x1, 0x0, 0x0, 0x1}, 0x4000801) setsockopt$inet_sctp6_SCTP_SOCKOPT_BINDX_ADD(r2, 0x84, 0x64, &(0x7f0000000080)=[@in={0x2, 0x4e21, @broadcast=0xffffffff}, @in6={0xa, 0x4e24, 0x91e8, @remote={0xfe, 0x80, [], 0xbb}, 0x78}, @in={0x2, 0x4e22}], 0x3c) r4 = gettid() process_vm_readv(r4, &(0x7f0000fca000)=[{&(0x7f0000000280)=""/249, 0xf9}], 0x1, &(0x7f0000000140)=[{&(0x7f0000309fb2)=""/145, 0xfffffffffffffdb9}], 0x3f, 0x0) ioctl$UFFDIO_UNREGISTER(r0, 0x8010aa01, &(0x7f0000c22ff0)={&(0x7f000001d000/0xc00000)=nil, 0xc00000}) [ 89.523017] mmap: syz-executor7 (7237) uses deprecated remap_file_pages() syscall. See Documentation/vm/remap_file_pages.txt. 2018/04/24 07:21:05 executing program 3: r0 = memfd_create(&(0x7f0000002901)='dev ', 0x0) fallocate(r0, 0x0, 0xa7b3, 0x1) pwritev(r0, &(0x7f00000002c0)=[{&(0x7f00000001c0)='\a', 0x1}], 0x1, 0x0) sendfile(r0, r0, &(0x7f0000000000), 0x7) lseek(r0, 0x0, 0x4) 2018/04/24 07:21:05 executing program 2: r0 = syz_open_dev$dmmidi(&(0x7f0000000000)='/dev/dmmidi#\x00', 0x7, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000002c0)="f60156eff625cd2bbc339c23f6ee15ef8be8bfeb1efcd0288028d3d8f26baee1f32483682aeec9c282ba01657b9af4d995c51777ca3e45b9c7e71a5170e114872bbb5e8869b72d91ce0ca277999eee33c86021795e6c3a091298fad8c4d8264bb96b30", 0x63) tgkill(0x0, 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000040)="2f65786500000000000090d8b75e67e16b394342abb5158df87ea8984e79c93df7498b2b34796068700e29fbd789f9a031f23e16c96e30baed2961953b057f7a3222943acc4b8cfa4de553f8276731ddeb811efd44ea011e1a0db9074a28a826c88566b89c57cc3cca4aec41d37fa27c8daa19030d03139d0aea71d509d9a20ba7deceb656cc1308d9d1f111b6bd1595486f55e229923be4ed8cbfb78e86280b4cacf386bfa8840afb312a4c520a03b27f805d181bd09ea208931a36e888060a2d") fsetxattr(r1, &(0x7f0000000140)=@known='user.syz\x00', &(0x7f0000000180)="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", 0x137, 0x0) 2018/04/24 07:21:05 executing program 1: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f00000004c0)="8da4363a00000000000000000000000000000000000000000000000000000000ecf6f2a3", 0x24, 0x10000}], 0x0, &(0x7f00000002c0)=ANY=[]) 2018/04/24 07:21:05 executing program 7: r0 = memfd_create(&(0x7f0000002901)='dev ', 0x0) write(r0, &(0x7f0000000140)="164690f112641916d8bd2a53e1151eb1ecdbbc5e2c7e2c928643a4494a951b43284c0c36ce8a4d1ef0f4f99f53eabf195349f232d39c7177a860d712cca4bcd126b4388fb84de6b5", 0x48) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x4, 0x11, r0, 0x0) rt_sigtimedwait(&(0x7f0000000000), 0x0, &(0x7f0000000040), 0x8) 2018/04/24 07:21:05 executing program 4: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f00000004c0)="8da4363a00000000000000000000000000000000000000000000000000000000ecf6f2a3299748aeb81e1b00920efd9a000001000000", 0x36, 0x10000}], 0x0, &(0x7f00000002c0)=ANY=[]) symlinkat(&(0x7f0000000240)='./file0/file0/file0\x00', 0xffffffffffffffff, &(0x7f0000000140)='./file0\x00') chmod(&(0x7f0000000780)='./file0/file0/file0\x00', 0x0) 2018/04/24 07:21:05 executing program 0: clone(0x0, &(0x7f0000000080), &(0x7f0000a25ffc), &(0x7f000039f000), &(0x7f0000000040)) mkdir(&(0x7f000053bff8)='./file0\x00', 0x0) mount(&(0x7f0000b79ff8)='./file0\x00', &(0x7f0000db0ff8)='./file0\x00', &(0x7f0000f9cffb)='proc\x00', 0x0, &(0x7f0000cde000)) r0 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) getdents64(r0, &(0x7f0000000900)=""/250, 0x1ec) getdents64(r0, &(0x7f0000002000)=""/1679, 0x9db) waitid(0x0, 0x0, &(0x7f0000001ff0), 0xa0000004, 0x0) 2018/04/24 07:21:05 executing program 5: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f00000004c0)="8da4363a00000000000000000000000000000000000000000000000000000000ecf6f2a3299748aeb81e1b00920efd9a000001000000000001000000000000005f424852", 0x44, 0x10000}], 0x0, &(0x7f00000002c0)=ANY=[]) 2018/04/24 07:21:06 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) fstat(r0, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000180)={0x0, 0x0, 0x0}, &(0x7f0000000000)=0xc) setresgid(0x0, r1, r2) 2018/04/24 07:21:06 executing program 7: r0 = socket$inet(0x2, 0x5, 0x0) openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) setsockopt$inet_MCAST_JOIN_GROUP(r0, 0x0, 0x2a, &(0x7f0000000000)={0x0, {{0x2, 0x0, @broadcast=0xffffffff}}}, 0x88) 2018/04/24 07:21:06 executing program 5: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f00000004c0)="8da4363a00000000000000000000000000000000000000000000000000000000ecf6f2a3299748aeb81e1b00920efd9a000001000000000001000000000000005f424852", 0x44, 0x10000}], 0x0, &(0x7f00000002c0)=ANY=[]) 2018/04/24 07:21:06 executing program 1: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f00000004c0)="8da4363a00000000000000000000000000000000000000000000000000000000ecf6f2a3", 0x24, 0x10000}], 0x0, &(0x7f00000002c0)=ANY=[]) 2018/04/24 07:21:06 executing program 2: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) bind$inet6(r0, &(0x7f0000fa8fe4)={0xa, 0x4e23}, 0x1c) connect$inet6(r0, &(0x7f0000966fe4)={0xa, 0x4e23, 0x0, @loopback={0x0, 0x1}}, 0x1c) r1 = dup(r0) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000140)={0x1, &(0x7f0000000100)=[{0x6, 0x0, 0x0, 0x6}]}, 0x10) write$eventfd(r1, &(0x7f0000fc7ff8), 0xffc7) setsockopt$inet_sctp_SCTP_RESET_STREAMS(r1, 0x84, 0x77, &(0x7f0000000080)={0x0, 0x3ff, 0x1, [0x4]}, 0xa) getsockopt$EBT_SO_GET_INIT_ENTRIES(r1, 0x0, 0x83, &(0x7f0000000200)={'nat\x00', 0x0, 0x3, 0x77, [], 0x7, &(0x7f0000000000)=[{}, {}, {}, {}, {}, {}, {}], &(0x7f0000000180)=""/119}, &(0x7f00000000c0)=0x78) 2018/04/24 07:21:06 executing program 4: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f00000004c0)="8da4363a00000000000000000000000000000000000000000000000000000000ecf6f2a3299748aeb81e1b00920efd9a000001000000", 0x36, 0x10000}], 0x0, &(0x7f00000002c0)=ANY=[]) symlinkat(&(0x7f0000000240)='./file0/file0/file0\x00', 0xffffffffffffffff, &(0x7f0000000140)='./file0\x00') chmod(&(0x7f0000000780)='./file0/file0/file0\x00', 0x0) 2018/04/24 07:21:06 executing program 3: r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rtc\x00', 0x80000, 0x0) ioctl$sock_inet_SIOCSIFNETMASK(r0, 0x891c, &(0x7f0000000040)={'bridge_slave_1\x00', {0x2, 0x4e21, @rand_addr=0x80000000}}) r1 = socket$kcm(0xa, 0x8, 0x11) sendmsg(r1, &(0x7f0000001ec0)={&(0x7f00000018c0)=@nl=@unspec, 0x80, &(0x7f0000001dc0), 0x0, &(0x7f0000001e40)=[{0x10, 0x29, 0x36}], 0x10}, 0x0) 2018/04/24 07:21:06 executing program 7: r0 = socket$can_bcm(0x1d, 0x2, 0x2) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000040)={0xffffffffffffffff}) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000240), &(0x7f0000000180)=0xffffffffffffff32) mmap(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x0, 0x1010, r1, 0x0) perf_event_open(&(0x7f0000223000)={0x2, 0x78, 0xe3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = socket(0x11, 0x100000802, 0x0) setsockopt$packet_fanout(r2, 0x107, 0x12, &(0x7f00000001c0), 0x4) r3 = syz_open_dev$mouse(&(0x7f0000000100)='/dev/input/mouse#\x00', 0x4, 0x0) setrlimit(0xd, &(0x7f0000000080)={0x100, 0x8}) setsockopt$netlink_NETLINK_PKTINFO(r1, 0x10e, 0x3, &(0x7f00000000c0)=0x6, 0x4) ioctl$sock_kcm_SIOCKCMATTACH(r2, 0x89e0, &(0x7f0000000140)={r2, r3}) 2018/04/24 07:21:06 executing program 6: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_TCP_FASTOPEN_KEY(r0, 0x6, 0x21, &(0x7f00008c6000)="e315555af7ee49914ade74e3e3690d91", 0x10) setsockopt$inet_tcp_TCP_FASTOPEN_KEY(r0, 0x6, 0x21, &(0x7f0000000000)="a88ef8a66ad1a8e7fc50faa27f245004", 0x6) r1 = accept4(r0, 0x0, &(0x7f0000000040), 0x80000) accept4$nfc_llcp(r1, &(0x7f0000000080), &(0x7f0000000100)=0x60, 0x800) 2018/04/24 07:21:06 executing program 5: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f00000004c0)="8da4363a00000000000000000000000000000000000000000000000000000000ecf6f2a3299748aeb81e1b00920efd9a000001000000000001000000000000005f4248526653", 0x46, 0x10000}], 0x0, &(0x7f00000002c0)=ANY=[]) 2018/04/24 07:21:06 executing program 1: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f00000004c0)="8da4363a00000000000000000000000000000000000000000000000000000000ecf6f2a3299748aeb81e1b00920efd9a000001000000", 0x36, 0x10000}], 0x0, &(0x7f00000002c0)=ANY=[]) 2018/04/24 07:21:06 executing program 4: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f00000004c0)="8da4363a00000000000000000000000000000000000000000000000000000000ecf6f2a3299748aeb81e1b00920efd9a000001000000", 0x36, 0x10000}], 0x0, &(0x7f00000002c0)=ANY=[]) symlinkat(&(0x7f0000000240)='./file0/file0/file0\x00', 0xffffffffffffffff, &(0x7f0000000140)='./file0\x00') chmod(&(0x7f0000000780)='./file0/file0/file0\x00', 0x0) 2018/04/24 07:21:06 executing program 0: clone(0x0, &(0x7f0000000080), &(0x7f0000a25ffc), &(0x7f000039f000), &(0x7f0000000040)) mkdir(&(0x7f000053bff8)='./file0\x00', 0x0) mount(&(0x7f0000b79ff8)='./file0\x00', &(0x7f0000db0ff8)='./file0\x00', &(0x7f0000f9cffb)='proc\x00', 0x0, &(0x7f0000cde000)) r0 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) getdents64(r0, &(0x7f0000000900)=""/250, 0x1ec) getdents64(r0, &(0x7f0000002000)=""/1679, 0x9db) waitid(0x0, 0x0, &(0x7f0000001ff0), 0xa0000004, 0x0) 2018/04/24 07:21:06 executing program 2: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) bind$inet6(r0, &(0x7f0000fa8fe4)={0xa, 0x4e23}, 0x1c) connect$inet6(r0, &(0x7f0000966fe4)={0xa, 0x4e23, 0x0, @loopback={0x0, 0x1}}, 0x1c) r1 = dup(r0) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000140)={0x1, &(0x7f0000000100)=[{0x6, 0x0, 0x0, 0x6}]}, 0x10) write$eventfd(r1, &(0x7f0000fc7ff8), 0xffc7) setsockopt$inet_sctp_SCTP_RESET_STREAMS(r1, 0x84, 0x77, &(0x7f0000000080)={0x0, 0x3ff, 0x1, [0x4]}, 0xa) getsockopt$EBT_SO_GET_INIT_ENTRIES(r1, 0x0, 0x83, &(0x7f0000000200)={'nat\x00', 0x0, 0x3, 0x77, [], 0x7, &(0x7f0000000000)=[{}, {}, {}, {}, {}, {}, {}], &(0x7f0000000180)=""/119}, &(0x7f00000000c0)=0x78) 2018/04/24 07:21:06 executing program 7: r0 = socket$nl_xfrm(0x11, 0x3, 0x6) r1 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vga_arbiter\x00', 0x40000, 0x0) getsockopt$inet_tcp_buf(r1, 0x6, 0x0, &(0x7f0000000040)=""/186, &(0x7f0000000100)=0xba) setsockopt$netlink_NETLINK_NO_ENOBUFS(r0, 0x107, 0x12, &(0x7f0000000ffc)=0x20000003, 0x4) 2018/04/24 07:21:06 executing program 3: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000240)='./cgroup.cpu\x00', 0x200002, 0x0) r1 = openat$cgroup_int(r0, &(0x7f0000000000)='cpuset.cpus\x00', 0x2, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup/syz1\x00', 0x200002, 0x0) write$cgroup_int(r1, &(0x7f0000000080)={[0x32, 0x2d]}, 0x2) 2018/04/24 07:21:06 executing program 3: unshare(0x400) r0 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0xffffffffffeffffc, 0x2) ioctl$EVIOCGKEYCODE(r0, 0x80084504, &(0x7f0000000180)=""/178) get_thread_area(&(0x7f0000000040)={0x401, 0x0, 0x4000, 0x0, 0x9, 0x9, 0x3ff, 0x80, 0x8, 0x4}) r1 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x200, 0x48) mlock(&(0x7f0000ffb000/0x3000)=nil, 0x3000) ioctl$GIO_UNISCRNMAP(r1, 0x4b69, &(0x7f00000000c0)=""/20) 2018/04/24 07:21:06 executing program 5: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f00000004c0)="8da4363a00000000000000000000000000000000000000000000000000000000ecf6f2a3299748aeb81e1b00920efd9a000001000000000001000000000000005f4248526653", 0x46, 0x10000}], 0x0, &(0x7f00000002c0)=ANY=[]) 2018/04/24 07:21:06 executing program 4: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f00000004c0)="8da4363a00000000000000000000000000000000000000000000000000000000ecf6f2a3299748aeb81e1b00920efd9a000001000000000001000000000000", 0x3f, 0x10000}], 0x0, &(0x7f00000002c0)=ANY=[]) symlinkat(&(0x7f0000000240)='./file0/file0/file0\x00', 0xffffffffffffffff, &(0x7f0000000140)='./file0\x00') chmod(&(0x7f0000000780)='./file0/file0/file0\x00', 0x0) 2018/04/24 07:21:06 executing program 7: r0 = socket$key(0xf, 0x3, 0x2) recvfrom(r0, &(0x7f00000002c0)=""/222, 0xfffffffffffffe61, 0x20, &(0x7f0000000140)=@nfc={0x27, 0x0, 0x0, 0x7}, 0x59) sendmsg$key(r0, &(0x7f0000001000)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000184000)=ANY=[@ANYBLOB="020f00001000000000000000000000000800120000000300000000000000000006000000000000000000000000000000e00000010000000000000000000000000000000000000000000000000000000003e7e576a9ce280006000000000002000000ac14ffbb0000000000000000030005000000000002004e20ac14ffbb0000"], 0x80}, 0x1}, 0x0) 2018/04/24 07:21:06 executing program 1: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f00000004c0)="8da4363a00000000000000000000000000000000000000000000000000000000ecf6f2a3299748aeb81e1b00920efd9a000001000000", 0x36, 0x10000}], 0x0, &(0x7f00000002c0)=ANY=[]) 2018/04/24 07:21:07 executing program 6: r0 = socket$unix(0x1, 0x100810, 0x0) r1 = epoll_create(0x6) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, &(0x7f00005d3ff4)) epoll_ctl$EPOLL_CTL_MOD(r1, 0x3, r0, &(0x7f000002aff4)) 2018/04/24 07:21:07 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = creat(&(0x7f0000000000)='./file0\x00', 0x0) bind$rds(r1, &(0x7f0000000040)={0x2, 0x4e20}, 0x10) sendmsg$nl_route(r0, &(0x7f0000d1d000)={&(0x7f0000000140)={0x10}, 0xc, &(0x7f00006fa000)={&(0x7f00000001c0)=@setlink={0x30, 0x13, 0x301, 0x0, 0x0, {}, [@IFLA_NET_NS_FD={0x8, 0x1c}, @IFLA_NET_NS_PID={0x8, 0x13}]}, 0x30}, 0x1}, 0x0) r2 = inotify_add_watch(r1, &(0x7f0000000080)='./file0\x00', 0x1000808) bind$alg(r1, &(0x7f00000000c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'ctr-serpent-sse2\x00'}, 0x58) inotify_rm_watch(r1, r2) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000180), &(0x7f0000000200)=0xc) 2018/04/24 07:21:07 executing program 7: r0 = socket$inet_dccp(0x2, 0x6, 0x0) getsockopt$inet_int(r0, 0x10d, 0x80040000000a2, &(0x7f0000000100), &(0x7f00000000c0)=0x4) r1 = syz_open_dev$midi(&(0x7f0000000000)='/dev/midi#\x00', 0x4, 0x400002) r2 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000080)='IPVS\x00') sendmsg$IPVS_CMD_NEW_SERVICE(r1, &(0x7f0000000200)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x4000001}, 0x143, &(0x7f00000001c0)={&(0x7f0000000240)=ANY=[@ANYBLOB="00000000f5dbbfe6bff5216578b9286ae282015cfe234a45fac8e560e222a5e7ab6a944803de0917494d361d39d8019a5f721e38cdcef3b1d5fefb56e55a33662aef73ca737728adb447149a929f19bed16aa68c733c0d9521c5d286c73aa6bf25b7ccc4d9b1e5eb677c1736769b1d7ce6dd9975c913a6f38d5e2e1e9b3494d2c0fb3e3d3e6dd47d73", @ANYRES16=r2, @ANYBLOB="000227bd7000fbdbdf25010000000800040000000000440001000c0007000800000004000000080001000200000008000800020000001400030000000000000000000000ffff000000000800050000000000080006006f766600"], 0x60}, 0x1, 0x0, 0x0, 0x1}, 0x20000000) 2018/04/24 07:21:07 executing program 3: socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$IP_VS_SO_SET_TIMEOUT(r0, 0x0, 0x48a, &(0x7f0000000040)={0x100000000, 0x8, 0xffffffffffffff4a}, 0xc) 2018/04/24 07:21:07 executing program 4: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f00000004c0)="8da4363a00000000000000000000000000000000000000000000000000000000ecf6f2a3299748aeb81e1b00920efd9a000001000000000001000000000000", 0x3f, 0x10000}], 0x0, &(0x7f00000002c0)=ANY=[]) symlinkat(&(0x7f0000000240)='./file0/file0/file0\x00', 0xffffffffffffffff, &(0x7f0000000140)='./file0\x00') chmod(&(0x7f0000000780)='./file0/file0/file0\x00', 0x0) 2018/04/24 07:21:07 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) capset(&(0x7f0000000080)={0x19980330}, &(0x7f0000032fe8)) sendmmsg(r0, &(0x7f0000001d80)=[{{&(0x7f0000000000)=@in6={0xa, 0x4e21, 0x0, @loopback={0x0, 0x1}}, 0x1c, &(0x7f0000000040), 0x0, &(0x7f0000000080)}}, {{&(0x7f0000000a80)=@in={0x2, 0x4e22, @rand_addr}, 0x10, &(0x7f0000001bc0), 0x0, &(0x7f0000000040)=[{0x10, 0x1, 0x24}], 0x10}}], 0x2, 0x0) 2018/04/24 07:21:07 executing program 1: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f00000004c0)="8da4363a00000000000000000000000000000000000000000000000000000000ecf6f2a3299748aeb81e1b00920efd9a000001000000", 0x36, 0x10000}], 0x0, &(0x7f00000002c0)=ANY=[]) 2018/04/24 07:21:07 executing program 5: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f00000004c0)="8da4363a00000000000000000000000000000000000000000000000000000000ecf6f2a3299748aeb81e1b00920efd9a000001000000000001000000000000005f4248526653", 0x46, 0x10000}], 0x0, &(0x7f00000002c0)=ANY=[]) [ 91.842961] capability: warning: `syz-executor2' uses 32-bit capabilities (legacy support in use) 2018/04/24 07:21:07 executing program 1: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f00000004c0)="8da4363a00000000000000000000000000000000000000000000000000000000ecf6f2a3299748aeb81e1b00920efd9a000001000000000001000000000000", 0x3f, 0x10000}], 0x0, &(0x7f00000002c0)=ANY=[]) 2018/04/24 07:21:07 executing program 0: r0 = socket$inet(0x2, 0x2, 0x0) sendto$inet(r0, &(0x7f0000000000)="91", 0x1, 0xfffffffffffffffe, &(0x7f0000000080)={0x2, 0x4e21, @remote={0xac, 0x14, 0x14, 0xbb}}, 0x10) r1 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000040)='/dev/mixer\x00', 0x0, 0x0) statx(r1, &(0x7f00000000c0)='./file0\x00', 0x0, 0x80, &(0x7f0000000100)) 2018/04/24 07:21:07 executing program 5: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f00000004c0)="8da4363a00000000000000000000000000000000000000000000000000000000ecf6f2a3299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f", 0x47, 0x10000}], 0x0, &(0x7f00000002c0)=ANY=[]) 2018/04/24 07:21:08 executing program 6: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000003800)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_ADD(r0, 0x4c81, 0x0) geteuid() r1 = socket$inet(0x2, 0xa, 0xa00) fcntl$setsig(r1, 0xa, 0x35) setsockopt$inet_sctp_SCTP_STREAM_SCHEDULER(r1, 0x84, 0x7b, &(0x7f00000000c0)={0x0, 0xfffffffffffff499}, 0x8) ioctl$LOOP_CTL_REMOVE(r0, 0x4c80, 0x0) r2 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net/ipv4/vs/drop_entry\x00', 0x2, 0x0) getsockname$packet(0xffffffffffffff9c, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @dev}, &(0x7f0000000080)=0x14) ioctl$sock_inet6_SIOCADDRT(r2, 0x890b, &(0x7f0000000100)={@ipv4={[], [0xff, 0xff]}, @ipv4={[], [0xff, 0xff], @remote={0xac, 0x14, 0x14, 0xbb}}, @ipv4={[], [0xff, 0xff], @multicast1=0xe0000001}, 0x81, 0x1f, 0x6, 0x100, 0x8, 0x1, r3}) [ 92.133538] syz-executor6 uses obsolete (PF_INET,SOCK_PACKET) 2018/04/24 07:21:08 executing program 3: r0 = socket(0x1e, 0x4, 0x0) setsockopt$packet_tx_ring(r0, 0x10f, 0x87, &(0x7f0000000100)=@req3={0x0, 0xfffffffffffffff9, 0x8, 0x8000, 0x5, 0x48}, 0x1c) r1 = socket(0x1e, 0x4, 0x0) setsockopt$packet_tx_ring(r1, 0x10f, 0x87, &(0x7f0000bc4ff0)=@req={0x3fc, 0x0, 0x3}, 0x7f) r2 = syz_open_dev$sndpcmp(&(0x7f0000000000)='/dev/snd/pcmC#D#p\x00', 0x7, 0x400000) ioctl$SNDRV_SEQ_IOCTL_GET_CLIENT_INFO(r2, 0xc0bc5310, &(0x7f0000000040)) 2018/04/24 07:21:08 executing program 4: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f00000004c0)="8da4363a00000000000000000000000000000000000000000000000000000000ecf6f2a3299748aeb81e1b00920efd9a000001000000000001000000000000", 0x3f, 0x10000}], 0x0, &(0x7f00000002c0)=ANY=[]) symlinkat(&(0x7f0000000240)='./file0/file0/file0\x00', 0xffffffffffffffff, &(0x7f0000000140)='./file0\x00') chmod(&(0x7f0000000780)='./file0/file0/file0\x00', 0x0) 2018/04/24 07:21:08 executing program 2: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f00000004c0)="8da4363a00000000000000000000000000000000000000000000000000000000ecf6f2a3299748aeb81e1b00920efd9a000001000000000001000000000000", 0x3f, 0x10000}], 0x0, &(0x7f00000002c0)=ANY=[]) symlinkat(&(0x7f0000000240)='./file0/file0/file0\x00', 0xffffffffffffffff, &(0x7f0000000140)='./file0\x00') chmod(&(0x7f0000000780)='./file0/file0/file0\x00', 0x0) 2018/04/24 07:21:08 executing program 1: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f00000004c0)="8da4363a00000000000000000000000000000000000000000000000000000000ecf6f2a3299748aeb81e1b00920efd9a000001000000000001000000000000", 0x3f, 0x10000}], 0x0, &(0x7f00000002c0)=ANY=[]) 2018/04/24 07:21:08 executing program 5: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f00000004c0)="8da4363a00000000000000000000000000000000000000000000000000000000ecf6f2a3299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f", 0x47, 0x10000}], 0x0, &(0x7f00000002c0)=ANY=[]) 2018/04/24 07:21:08 executing program 0: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00003e0000)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f00003b9fdc)) pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$bt_BT_DEFER_SETUP(r1, 0x112, 0x7, &(0x7f0000000080)=0x80000000, 0xfffffe4f) r2 = syz_open_pts(r0, 0x0) ioctl$TCXONC(r0, 0x540a, 0x7) r3 = dup(r2) ioctl$TIOCGLCKTRMIOS(r3, 0x5456, &(0x7f0000000040)) 2018/04/24 07:21:08 executing program 7: r0 = socket$inet6(0xa, 0x1, 0x80000009) bind$inet6(r0, &(0x7f000070ffe3)={0xa, 0x4e20, 0x0, @ipv4={[], [0xff, 0xff], @loopback=0x7f000001}}, 0x1c) setsockopt$sock_int(r0, 0x1, 0xf, &(0x7f0000f59ffc)=0x5, 0x4) r1 = openat$vcs(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/vcs\x00', 0x101041, 0x0) connect$can_bcm(r1, &(0x7f0000000000)={0x1d}, 0x10) getsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(r0, 0x84, 0x6, &(0x7f0000000040)={0x0, @in={{0x2, 0x4e23, @multicast1=0xe0000001}}}, &(0x7f0000000100)=0x84) getsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX3(r1, 0x84, 0x6f, &(0x7f00000001c0)={r2, 0x74, &(0x7f0000000140)=[@in={0x2, 0x4e21, @loopback=0x7f000001}, @in6={0xa, 0x4e24, 0xffffffff, @mcast2={0xff, 0x2, [], 0x1}, 0x1}, @in6={0xa, 0x4e20, 0x1f, @dev={0xfe, 0x80, [], 0x13}, 0x7ff}, @in={0x2, 0x4e22, @multicast1=0xe0000001}, @in6={0xa, 0x4e21, 0x1, @empty, 0x1ff}]}, &(0x7f0000000200)=0x10) ioctl$TUNSETVNETHDRSZ(r1, 0x400454d8, &(0x7f0000000280)) socket$inet6(0xa, 0x76dbc6f3685abf8a, 0x5eb2) r3 = socket$inet6(0xa, 0x2, 0x0) openat$audio(0xffffffffffffff9c, &(0x7f0000000240)='/dev/audio\x00', 0x400000, 0x0) bind$inet6(r3, &(0x7f0000f66000)={0xa, 0x4e20, 0x0, @ipv4={[], [0xff, 0xff]}}, 0x1c) 2018/04/24 07:21:08 executing program 6: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000003800)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_ADD(r0, 0x4c81, 0x0) geteuid() r1 = socket$inet(0x2, 0xa, 0xa00) fcntl$setsig(r1, 0xa, 0x35) setsockopt$inet_sctp_SCTP_STREAM_SCHEDULER(r1, 0x84, 0x7b, &(0x7f00000000c0)={0x0, 0xfffffffffffff499}, 0x8) ioctl$LOOP_CTL_REMOVE(r0, 0x4c80, 0x0) r2 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net/ipv4/vs/drop_entry\x00', 0x2, 0x0) getsockname$packet(0xffffffffffffff9c, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @dev}, &(0x7f0000000080)=0x14) ioctl$sock_inet6_SIOCADDRT(r2, 0x890b, &(0x7f0000000100)={@ipv4={[], [0xff, 0xff]}, @ipv4={[], [0xff, 0xff], @remote={0xac, 0x14, 0x14, 0xbb}}, @ipv4={[], [0xff, 0xff], @multicast1=0xe0000001}, 0x81, 0x1f, 0x6, 0x100, 0x8, 0x1, r3}) 2018/04/24 07:21:08 executing program 4: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f00000004c0)="8da4363a00000000000000000000000000000000000000000000000000000000ecf6f2a3299748aeb81e1b00920efd9a000001000000000001000000000000005f424852", 0x44, 0x10000}], 0x0, &(0x7f00000002c0)=ANY=[]) symlinkat(&(0x7f0000000240)='./file0/file0/file0\x00', 0xffffffffffffffff, &(0x7f0000000140)='./file0\x00') chmod(&(0x7f0000000780)='./file0/file0/file0\x00', 0x0) 2018/04/24 07:21:08 executing program 2: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f00000004c0)="8da4363a00000000000000000000000000000000000000000000000000000000ecf6f2a3299748aeb81e1b00920efd9a000001000000000001000000000000", 0x3f, 0x10000}], 0x0, &(0x7f00000002c0)=ANY=[]) symlinkat(&(0x7f0000000240)='./file0/file0/file0\x00', 0xffffffffffffffff, &(0x7f0000000140)='./file0\x00') chmod(&(0x7f0000000780)='./file0/file0/file0\x00', 0x0) 2018/04/24 07:21:08 executing program 5: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f00000004c0)="8da4363a00000000000000000000000000000000000000000000000000000000ecf6f2a3299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f", 0x47, 0x10000}], 0x0, &(0x7f00000002c0)=ANY=[]) 2018/04/24 07:21:08 executing program 7: r0 = socket$inet6(0xa, 0xb, 0x87f0) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(r0, 0x84, 0x6e, &(0x7f0000000000)=[@in={0x2, 0x4e24}, @in6={0xa, 0x4e23, 0x3, @remote={0xfe, 0x80, [], 0xbb}, 0x3f}], 0x2c) r1 = socket$inet_dccp(0x2, 0x6, 0x0) getsockopt$inet_int(r1, 0x10d, 0xc1, &(0x7f0000000180), &(0x7f0000000140)=0x4) 2018/04/24 07:21:08 executing program 1: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f00000004c0)="8da4363a00000000000000000000000000000000000000000000000000000000ecf6f2a3299748aeb81e1b00920efd9a000001000000000001000000000000", 0x3f, 0x10000}], 0x0, &(0x7f00000002c0)=ANY=[]) 2018/04/24 07:21:08 executing program 3: preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000001200)=""/148, 0x94}], 0x1, 0x0) syslog(0x3, &(0x7f0000000080)=""/84, 0x54) r0 = syz_open_procfs(0x0, &(0x7f0000000040)='net/raw\x00') ioctl$sock_inet6_tcp_SIOCINQ(r0, 0x541b, &(0x7f0000000100)) preadv(r0, &(0x7f0000000100), 0x361, 0x10400003) setsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(r0, 0x84, 0x8, &(0x7f0000000000)=0x10001, 0x4) 2018/04/24 07:21:08 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$IP_VS_SO_SET_STARTDAEMON(r0, 0x0, 0x48b, &(0x7f0000000000)={0x1, 'syz_tun\x00'}, 0x18) setsockopt$IP_VS_SO_SET_STOPDAEMON(r0, 0x0, 0x48c, &(0x7f0000000100)={0x1, 'irlan0\x00'}, 0x18) setsockopt$IP_VS_SO_SET_ADDDEST(r0, 0x0, 0x487, &(0x7f0000000040)={{0x66, @empty, 0x4e23, 0x3, 'lblc\x00', 0x11, 0x9, 0x2e}, {@local={0xac, 0x14, 0x14, 0xaa}, 0x4e21, 0x3, 0x1000, 0x401, 0x20}}, 0x44) 2018/04/24 07:21:08 executing program 6: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) bind$inet6(r0, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @ipv4={[], [0xff, 0xff], @multicast2=0xe0000002}}, 0x1c) connect$inet6(r0, &(0x7f0000966fe4)={0xa, 0x4e23, 0x0, @loopback={0x0, 0x1}}, 0x1c) r1 = semget$private(0x0, 0x4, 0x104) semctl$GETPID(r1, 0x7, 0xb, &(0x7f0000000180)=""/81) r2 = dup(r0) ioctl$DRM_IOCTL_IRQ_BUSID(r2, 0xc0106403, &(0x7f00000000c0)={0x9, 0x2, 0x2, 0xffffffff}) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000140)={0x1, &(0x7f0000000100)=[{0x6, 0x0, 0x0, 0x6}]}, 0x10) write$eventfd(r2, &(0x7f0000fc7ff8), 0xffc7) getsockopt$inet_sctp6_SCTP_ASSOCINFO(r0, 0x84, 0x1, &(0x7f0000000000)={0x0, 0x0, 0x7fff, 0x3, 0x0, 0xff}, &(0x7f0000000040)=0x14) 2018/04/24 07:21:08 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f00005d5ff3)={0x2, 0x4e20, @rand_addr}, 0x10) setsockopt$inet_tcp_int(r0, 0x6, 0x200000000000a, &(0x7f0000df8ffc)=0x4, 0x4) sendto$inet(r0, &(0x7f0000de1fff)='U', 0x1, 0x20008005, &(0x7f0000db4ff0)={0x2, 0x4e20, @loopback=0x7f000001}, 0x10) recvfrom$inet(r0, &(0x7f0000000000)=""/157, 0x204, 0x0, &(0x7f0000df7ff0)={0x2, 0x0, @multicast2=0xe0000002}, 0x10) r1 = semget(0x0, 0x2, 0x201) semctl$GETZCNT(r1, 0x0, 0xf, &(0x7f0000000140)=""/5) getsockopt$IP_VS_SO_GET_DAEMON(r0, 0x0, 0x487, &(0x7f00000000c0), &(0x7f0000000100)=0x30) setsockopt$inet_group_source_req(r0, 0x0, 0x2e, &(0x7f0000000180)={0xfffffffffffffff9, {{0x2, 0x4e20, @local={0xac, 0x14, 0x14, 0xaa}}}, {{0x2, 0x4e24, @remote={0xac, 0x14, 0x14, 0xbb}}}}, 0x108) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000defffc), 0x4) 2018/04/24 07:21:08 executing program 4: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f00000004c0)="8da4363a00000000000000000000000000000000000000000000000000000000ecf6f2a3299748aeb81e1b00920efd9a000001000000000001000000000000005f424852", 0x44, 0x10000}], 0x0, &(0x7f00000002c0)=ANY=[]) symlinkat(&(0x7f0000000240)='./file0/file0/file0\x00', 0xffffffffffffffff, &(0x7f0000000140)='./file0\x00') chmod(&(0x7f0000000780)='./file0/file0/file0\x00', 0x0) 2018/04/24 07:21:08 executing program 1: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f00000004c0)="8da4363a00000000000000000000000000000000000000000000000000000000ecf6f2a3299748aeb81e1b00920efd9a000001000000000001000000000000005f424852", 0x44, 0x10000}], 0x0, &(0x7f00000002c0)=ANY=[]) 2018/04/24 07:21:08 executing program 5: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f00000004c0)="8da4363a00000000000000000000000000000000000000000000000000000000ecf6f2a3299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48}], 0x0, &(0x7f00000002c0)=ANY=[]) 2018/04/24 07:21:08 executing program 3: preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000001200)=""/148, 0x94}], 0x1, 0x0) syslog(0x3, &(0x7f0000000080)=""/84, 0x54) r0 = syz_open_procfs(0x0, &(0x7f0000000040)='net/raw\x00') ioctl$sock_inet6_tcp_SIOCINQ(r0, 0x541b, &(0x7f0000000100)) preadv(r0, &(0x7f0000000100), 0x361, 0x10400003) setsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(r0, 0x84, 0x8, &(0x7f0000000000)=0x10001, 0x4) 2018/04/24 07:21:08 executing program 7: r0 = socket(0x1001000000010, 0x802, 0x0) fcntl$F_SET_FILE_RW_HINT(r0, 0x40e, &(0x7f0000000080)=0x1) sendmsg$nl_route(r0, &(0x7f0000000040)={&(0x7f0000f81000)={0x10}, 0xfffffffffffffe1d, &(0x7f0000000000)={&(0x7f0000a28000)=ANY=[@ANYBLOB="0000002aca5600", @ANYRES32=0x0, @ANYBLOB="0000000000000000180012001400010069703667726500000000000000060000"], 0x38}, 0x1}, 0x0) socketpair(0xb, 0x4, 0xda, &(0x7f00000000c0)={0xffffffffffffffff}) ioctl$EVIOCSKEYCODE(r1, 0x40084504, &(0x7f0000000100)=[0x7, 0x7870]) r2 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000180)='/proc/sys/net/ipv4/vs/am_droprate\x00', 0x2, 0x0) ioctl$KDGETMODE(r2, 0x4b3b, &(0x7f00000001c0)) syz_open_dev$midi(&(0x7f0000000140)='/dev/midi#\x00', 0x5, 0x3) [ 92.952164] random: crng init done [ 93.032899] IPVS: stopping master sync thread 7548 ... [ 93.038409] IPVS: sync thread started: state = MASTER, mcast_ifn = syz_tun, syncid = 0, id = 0 2018/04/24 07:21:09 executing program 1: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f00000004c0)="8da4363a00000000000000000000000000000000000000000000000000000000ecf6f2a3299748aeb81e1b00920efd9a000001000000000001000000000000005f424852", 0x44, 0x10000}], 0x0, &(0x7f00000002c0)=ANY=[]) [ 93.091505] IPVS: set_ctl: invalid protocol: 102 0.0.0.0:20003 lblc 2018/04/24 07:21:09 executing program 5: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f00000004c0)="8da4363a00000000000000000000000000000000000000000000000000000000ecf6f2a3299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48}], 0x0, &(0x7f00000002c0)=ANY=[]) 2018/04/24 07:21:09 executing program 4: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f00000004c0)="8da4363a00000000000000000000000000000000000000000000000000000000ecf6f2a3299748aeb81e1b00920efd9a000001000000000001000000000000005f424852", 0x44, 0x10000}], 0x0, &(0x7f00000002c0)=ANY=[]) symlinkat(&(0x7f0000000240)='./file0/file0/file0\x00', 0xffffffffffffffff, &(0x7f0000000140)='./file0\x00') chmod(&(0x7f0000000780)='./file0/file0/file0\x00', 0x0) [ 93.171652] IPVS: stopping master sync thread 7560 ... [ 93.172495] IPVS: sync thread started: state = MASTER, mcast_ifn = syz_tun, syncid = 0, id = 0 2018/04/24 07:21:09 executing program 6: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x5, 0x9, 0x4, 0xb, 0x1a, 0xffffffffffffff9c}, 0x2c) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000080)={r0, &(0x7f0000000200)}, 0x10) 2018/04/24 07:21:09 executing program 7: r0 = socket(0x1001000000010, 0x802, 0x0) fcntl$F_SET_FILE_RW_HINT(r0, 0x40e, &(0x7f0000000080)=0x1) sendmsg$nl_route(r0, &(0x7f0000000040)={&(0x7f0000f81000)={0x10}, 0xfffffffffffffe1d, &(0x7f0000000000)={&(0x7f0000a28000)=ANY=[@ANYBLOB="0000002aca5600", @ANYRES32=0x0, @ANYBLOB="0000000000000000180012001400010069703667726500000000000000060000"], 0x38}, 0x1}, 0x0) socketpair(0xb, 0x4, 0xda, &(0x7f00000000c0)={0xffffffffffffffff}) ioctl$EVIOCSKEYCODE(r1, 0x40084504, &(0x7f0000000100)=[0x7, 0x7870]) r2 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000180)='/proc/sys/net/ipv4/vs/am_droprate\x00', 0x2, 0x0) ioctl$KDGETMODE(r2, 0x4b3b, &(0x7f00000001c0)) syz_open_dev$midi(&(0x7f0000000140)='/dev/midi#\x00', 0x5, 0x3) 2018/04/24 07:21:09 executing program 1: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f00000004c0)="8da4363a00000000000000000000000000000000000000000000000000000000ecf6f2a3299748aeb81e1b00920efd9a000001000000000001000000000000005f424852", 0x44, 0x10000}], 0x0, &(0x7f00000002c0)=ANY=[]) 2018/04/24 07:21:09 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$IP_VS_SO_SET_STARTDAEMON(r0, 0x0, 0x48b, &(0x7f0000000000)={0x1, 'syz_tun\x00'}, 0x18) setsockopt$IP_VS_SO_SET_STOPDAEMON(r0, 0x0, 0x48c, &(0x7f0000000100)={0x1, 'irlan0\x00'}, 0x18) setsockopt$IP_VS_SO_SET_ADDDEST(r0, 0x0, 0x487, &(0x7f0000000040)={{0x66, @empty, 0x4e23, 0x3, 'lblc\x00', 0x11, 0x9, 0x2e}, {@local={0xac, 0x14, 0x14, 0xaa}, 0x4e21, 0x3, 0x1000, 0x401, 0x20}}, 0x44) [ 93.497192] IPVS: stopping master sync thread 7592 ... [ 93.502960] IPVS: sync thread started: state = MASTER, mcast_ifn = syz_tun, syncid = 0, id = 0 [ 93.517876] IPVS: set_ctl: invalid protocol: 102 0.0.0.0:20003 lblc 2018/04/24 07:21:09 executing program 5: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f00000004c0)="8da4363a00000000000000000000000000000000000000000000000000000000ecf6f2a3299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48}], 0x0, &(0x7f00000002c0)=ANY=[]) 2018/04/24 07:21:09 executing program 3: add_key(&(0x7f0000000000)='asymmetric\x00', &(0x7f0000000080)={0x73, 0x79, 0x7a}, &(0x7f00000000c0), 0x0, 0xfffffffffffffffc) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000001fec)={0x5, 0x1, 0x7ff, 0x1}, 0x95) fcntl$setlease(r0, 0x400, 0x1) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f000000b000)={r0, &(0x7f00000000c0)="05e3d80d5ddce57965c05f895e55c842a8c399e99717ec8b2f29dda5520d83e3d152bb5e061bce2f14d326152739b177a23a21470f279fd1e1a43fd88d9ed1686017d6077e85599dcb805f61e3b390f8446d2b05f8e2cb05142ae2cc000000", &(0x7f0000000180), 0x2}, 0x344) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000040)={r0, &(0x7f0000000000), &(0x7f0000006000)}, 0x18) fcntl$setsig(r0, 0xa, 0x35) 2018/04/24 07:21:09 executing program 4: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f00000004c0)="8da4363a00000000000000000000000000000000000000000000000000000000ecf6f2a3299748aeb81e1b00920efd9a000001000000000001000000000000005f4248526653", 0x46, 0x10000}], 0x0, &(0x7f00000002c0)=ANY=[]) symlinkat(&(0x7f0000000240)='./file0/file0/file0\x00', 0xffffffffffffffff, &(0x7f0000000140)='./file0\x00') chmod(&(0x7f0000000780)='./file0/file0/file0\x00', 0x0) 2018/04/24 07:21:09 executing program 6: r0 = syz_open_dev$mice(&(0x7f0000d73ff0)='/dev/input/mice\x00', 0x0, 0x82) ioctl$int_in(r0, 0x5452, &(0x7f0000000000)=0x1) socket$inet_smc(0x2b, 0x1, 0x0) ioctl$TUNSETFILTEREBPF(r0, 0x800454e1, &(0x7f0000000140)=r0) getsockopt$IP_VS_SO_GET_TIMEOUT(r0, 0x0, 0x486, &(0x7f0000000040), &(0x7f0000000080)=0xc) write(r0, &(0x7f00000000c0)="098a346f300062d6daf1c757ae5c797895cd971f8fbc020c46a3cadffebbdea368f4b5a365a706bcb68f6c5cdada8014896762aeed64f07489499ef89da8d2167e14935c09dccf10861b", 0x1036a) 2018/04/24 07:21:09 executing program 1: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f00000004c0)="8da4363a00000000000000000000000000000000000000000000000000000000ecf6f2a3299748aeb81e1b00920efd9a000001000000000001000000000000005f4248526653", 0x46, 0x10000}], 0x0, &(0x7f00000002c0)=ANY=[]) 2018/04/24 07:21:09 executing program 0: r0 = socket$kcm(0xa, 0x3, 0x11) sendmsg$kcm(r0, &(0x7f0000003880)={&(0x7f0000000000)=@in6={0xa, 0x0, 0x0, @mcast1={0xff, 0x5, [], 0x1}, 0x3f000000}, 0x80, &(0x7f0000000080)}, 0x0) r1 = syz_open_dev$amidi(&(0x7f0000000080)='/dev/amidi#\x00', 0xe50a, 0x440) setsockopt$inet_tcp_buf(r1, 0x6, 0xb, &(0x7f00000000c0)="082e11548f0d3ce641c6ec20121b03e8ea4e62d905056f540970a80850f3645584c3faab989ff7f2678ab66194142b1faba551fe1d847bb76b787d519b9f39e585156e4692d65ace06409af0f13527196ecf7b8299612d703bac49e372b24b77c4738040647fadf9ef491f8687ebf7bd0d5a7516975569f741ad27fa2ea5f6a3f8ee1a0ac24b3b9cf0c90cb7d14b4ad0c796db", 0x93) 2018/04/24 07:21:09 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) syz_emit_ethernet(0x2a, &(0x7f0000000000)=ANY=[@ANYBLOB="aaaaaaaaaaaaaaaaaaaaaa000800ff00001c000000000002907800000000e0000001120090781f000000"], &(0x7f0000000040)) sendmsg$nl_generic(r0, &(0x7f0000000200)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x10000}, 0xc, &(0x7f00000001c0)={&(0x7f00000000c0)={0xc4, 0x3b, 0xe21, 0x70bd2c, 0x25dfdbfd, {0x1c}, [@typed={0x8, 0x3, @u32=0x24}, @nested={0xa8, 0x55, [@generic="808b7b5819d55a43998cddba7e9e1c55f0daf13c45d0c2c5bc5dad16180072c5c9f638feb220cd2cf7094369165f2a3914db631ea65aaef4df8c9bed74c371891ce56e9aba15116ff8542cacac50b9d0c8bc94429e5f98f0085807d8ff6063879f1782e55a32080d702ca432eb7cf5b5f59a806b64f3797c2bcca88e09a6db89d0cccd0bd10bea48c19926d064b8ff916fb11ecad01767a7833866cfcf8137d0f6"]}]}, 0xc4}, 0x1, 0x0, 0x0, 0x44000}, 0x40000) 2018/04/24 07:21:09 executing program 7: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f00000004c0)="8da4363a00000000000000000000000000000000000000000000000000000000ecf6f2a3299748aeb81e1b00920efd9a000001000000000001000000000000005f424852", 0x44, 0x10000}], 0x0, &(0x7f00000002c0)=ANY=[]) 2018/04/24 07:21:10 executing program 7: r0 = inotify_init1(0x0) fcntl$setown(r0, 0x8, 0xffffffffffffffff) fcntl$getownex(r0, 0x10, &(0x7f0000001000)={0x0, 0x0}) ptrace$setopts(0x4206, r1, 0x0, 0x0) ptrace(0x4207, r1) r2 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000001040)='/proc/sys/net/ipv4/vs/ignore_tunneled\x00', 0x2, 0x0) getresuid(&(0x7f0000001080)=0x0, &(0x7f00000010c0), &(0x7f0000001100)) lstat(&(0x7f0000001280)='./file0/file0\x00', &(0x7f00000011c0)={0x0, 0x0, 0x0, 0x0, 0x0}) r5 = getgid() sendmsg$netlink(r2, &(0x7f0000001240)={0x0, 0x0, &(0x7f0000001140)=[{&(0x7f0000001300)={0x143c, 0x3c, 0x200, 0x70bd29, 0x25dfdbfc, "", [@generic="7bd0e6cad556233542ed6a1480661a6499cd6badc228f3d7699ab65b6baa7e5ebe594db19fc6b7bf7a106696e63efc6058064d954c1a366ebc852707fa40f6198668c8dd01b556d9e5b866fa1e8aee6e0ec6b2862ec06549fbf8e33cfb9927d5ce1710a2a8ec6cc5c536f0586a7af7fa717060a6d1cb95a7063137a19fa3e42dbf2ca12a9ab304f9c4fb836f50e7ffb8b23101709ba4cfde6b66880be32462b7a28f896beda564ee1011c6c84a7e871e88c48c8f2139a7496fbf45f8454a9ff80abb06741083ba645b6344cfcfd0ad065d1ee048644ed434f5bb1dd9662b881c08", @typed={0x4, 0x62}, @typed={0x8, 0x29, @ipv4=@local={0xac, 0x14, 0x14, 0xaa}}, @typed={0x8, 0x86, @uid=r3}, @nested={0x1260, 0xc, [@typed={0x8, 0xc, @pid=r1}, @generic="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", @generic="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", @typed={0x60, 0x20, @binary="44e6ca167c9518456400aa542946a3b089af1d03c06b9b638b8abf8b7d5e33b7efb14142c60364fdbd37a5178e14db11fe85974852335a577254db4f692e873ca62098090951b366d473801d8cc0e0ced346ec6ba302b921be82"}, @generic="755309896eca598ef1a2f7b4a3311c4b8c2431408c25d6fa1c0405c40712c303c3b6879f045fadcfd512090582a763148dd40ed2bcc785347827964541e17f", @generic="1c81ee39eab02c6dfbb3ea8d68567365455da51d00118456711e6ea795b8c0046628c1cb3f79a98091b3241df5132335f355b7437857d2c3f392c177919262d03f38825ddf4562597fa4fba670cc92732ef11f05cd85fe9ff05283bc04874d78d5ae9461067bf1c9a75cac46557fd07c2efaa107ab8a11b246c959a92680670284dbf99eba0bde402dd1a7d567673c2325c786be77a523a0770983331c1a767cd4e8894a86a8e34b05fca98e09cc9b3d27afa0"]}, @typed={0x8, 0x72, @fd=r0}, @nested={0x78, 0x94, [@typed={0x74, 0x8f, @binary="5f925b3f889f3511c2cb764cba5c1d528670af7109983a83a0521f105a38ad07cd97bfe7d46136736a53e4e49a3986113c3a47b89b23e68fdcac0979824c545ff37cb8f7d55398bcfda3749bc0141802b1d5c168e53a405e1261ae3e7609485a89d88c664862cdec9c989f4db7a71b92"}]}, @generic="ccc594535c48524b6880564fc95f3b35e936187a3768e1b463e2821d90d88cdf74891eeb3744180ec02b2970d8b64d6d037fcde18586aed784e2502f8a5ceddd3cedbce347b3a9b1ca", @typed={0x8, 0x20, @u32=0x7}, @generic="0cc73cca"]}, 0x143c}], 0x1, &(0x7f0000002740)=ANY=[@ANYBLOB="30000000000000000100000001000000", @ANYRES32=r0, @ANYRES32=r0, @ANYRES32=r0, @ANYRES32=r0, @ANYRES32=r0, @ANYRES32=r0, @ANYRES32=r0, @ANYBLOB="0000000020000000000000000100000001000000", @ANYRES32=r0, @ANYRES32=r0, @ANYRES32=r0, @ANYBLOB="0000000020000000000000000100020002000000", @ANYRES32=r1, @ANYRES32=r4, @ANYRES32=r5, @ANYBLOB="0000000030000000000000000100000001000000", @ANYRES32=r0, @ANYRES32=r0, @ANYRES32=r0, @ANYRES32=r0, @ANYRES32=r0, @ANYRES32=r0, @ANYRES32=r0, @ANYRES32=r0], 0xa0, 0x40000}, 0x0) ptrace$getregset(0x5, r1, 0x7ffffd, &(0x7f00000012c0)={&(0x7f0000000000)=""/4096, 0x1000}) 2018/04/24 07:21:10 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x10000000013, &(0x7f0000d06000)=0x1, 0x4) readahead(r0, 0x7ff, 0x7ff) setsockopt$inet_tcp_int(r0, 0x6, 0x14, &(0x7f0000000040)=0xffffffff, 0x4) sendto$inet(r0, &(0x7f0000000000), 0x0, 0x20020003, &(0x7f0000385ff0)={0x2, 0x0, @loopback=0x7f000001}, 0x10) sendmmsg(r0, &(0x7f0000006b80)=[{{&(0x7f0000002f80)=@vsock={0x28, 0x0, 0x0, @my}, 0x80, &(0x7f0000003180), 0x0, &(0x7f00000031c0)}}, {{&(0x7f0000003480)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @local={0xfe, 0x80, [], 0xaa}}}}, 0x80, &(0x7f0000005780), 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB="1000000000000000000000000000000052f24c94ca8146f0f1e1805f9d06dfb8"], 0x20}}], 0x2, 0x0) 2018/04/24 07:21:10 executing program 3: r0 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/mixer\x00', 0x10000, 0x0) ioctl$SNDRV_TIMER_IOCTL_SELECT(r0, 0x40345410, &(0x7f0000000040)={{0x2, 0x1, 0x8, 0x0, 0x2}}) syz_open_dev$sndtimer(&(0x7f0000000080)='/dev/snd/timer\x00', 0x0, 0xa0000) r1 = shmget$private(0x0, 0x3000, 0x0, &(0x7f0000ffd000/0x3000)=nil) shmat(r1, &(0x7f0000ffc000/0x4000)=nil, 0x40000000007000) getsockopt$IP_VS_SO_GET_SERVICES(r0, 0x0, 0x482, &(0x7f00000000c0)=""/113, &(0x7f0000000140)=0x71) mprotect(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x2) 2018/04/24 07:21:10 executing program 1: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f00000004c0)="8da4363a00000000000000000000000000000000000000000000000000000000ecf6f2a3299748aeb81e1b00920efd9a000001000000000001000000000000005f4248526653", 0x46, 0x10000}], 0x0, &(0x7f00000002c0)=ANY=[]) 2018/04/24 07:21:10 executing program 5 (fault-call:0 fault-nth:0): syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f00000004c0)="8da4363a00000000000000000000000000000000000000000000000000000000ecf6f2a3299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f00000002c0)=ANY=[]) 2018/04/24 07:21:10 executing program 4: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f00000004c0)="8da4363a00000000000000000000000000000000000000000000000000000000ecf6f2a3299748aeb81e1b00920efd9a000001000000000001000000000000005f4248526653", 0x46, 0x10000}], 0x0, &(0x7f00000002c0)=ANY=[]) symlinkat(&(0x7f0000000240)='./file0/file0/file0\x00', 0xffffffffffffffff, &(0x7f0000000140)='./file0\x00') chmod(&(0x7f0000000780)='./file0/file0/file0\x00', 0x0) 2018/04/24 07:21:10 executing program 2: socket$inet6(0xa, 0x80000, 0x80a2) socket$inet6_tcp(0xa, 0x1, 0x0) r0 = socket$inet6(0xa, 0x2000000000000002, 0x0) bind$inet6(r0, &(0x7f0000000200)={0xa, 0x4e20}, 0x1c) r1 = fcntl$dupfd(r0, 0x0, r0) sendto$inet6(r1, &(0x7f0000000040)="66300b70c156e0359e6b85351d9020b0867416be0320087834be9af718ef962456afbb539bc97b72fca2b2415487208f2babe9269badc3f368c4071c97f4ff6f41b2163157af189ab0c32ea116716d9c24b6a79a6a4f8cc86811af32f1aaf3a31afd78dfe297cb3350", 0xfffffffffffffe27, 0x0, &(0x7f00005d6000)={0xa, 0x4e24, 0x0, @dev={0xfe, 0x80, [], 0x1c}}, 0x1c) pselect6(0x40, &(0x7f0000f33fc0)={0x3ffffd}, &(0x7f0000768000), &(0x7f0000086000), &(0x7f0000349000), &(0x7f0000f14000)={&(0x7f0000a65ff8), 0x8}) [ 94.430709] FAULT_INJECTION: forcing a failure. [ 94.430709] name failslab, interval 1, probability 0, space 0, times 1 [ 94.442143] CPU: 0 PID: 7659 Comm: syz-executor5 Not tainted 4.16.0+ #87 [ 94.449015] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 94.458404] Call Trace: [ 94.461049] dump_stack+0x185/0x1d0 [ 94.464731] should_fail+0x87b/0xab0 [ 94.468501] should_failslab+0x279/0x2a0 [ 94.472655] __kmalloc+0xc2/0x350 [ 94.476171] ? SYSC_memfd_create+0x242/0x9c0 [ 94.480656] SYSC_memfd_create+0x242/0x9c0 [ 94.484987] ? SYSC_write+0x2f0/0x360 [ 94.488873] SyS_memfd_create+0x45/0x70 [ 94.492925] do_syscall_64+0x309/0x430 [ 94.496866] ? memfd_fcntl+0x1d30/0x1d30 [ 94.500971] entry_SYSCALL_64_after_hwframe+0x3d/0xa2 [ 94.506190] RIP: 0033:0x455389 [ 94.509402] RSP: 002b:00007ff4beec7ba8 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 94.517150] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 0000000000455389 [ 94.524551] RDX: 0000000020000218 RSI: 0000000000000000 RDI: 00000000004ba1cf [ 94.531854] RBP: 000000000072bea0 R08: 0000000020000218 R09: 0000000000000000 [ 94.539157] R10: fe03f80fe03f80ff R11: 0000000000000246 R12: 0000000000000013 [ 94.546458] R13: 0000000000000672 R14: 00000000006fcb50 R15: 0000000000000000 2018/04/24 07:21:10 executing program 3: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f00000004c0)="8da4363a00000000000000000000000000000000000000000000000000000000ecf6f2a3299748aeb81e1b00920efd9a000001000000000001000000000000005f4248526653", 0x46, 0x10000}], 0x0, &(0x7f00000002c0)=ANY=[]) symlinkat(&(0x7f0000000240)='./file0/file0/file0\x00', 0xffffffffffffffff, &(0x7f0000000140)='./file0\x00') chmod(&(0x7f0000000780)='./file0/file0/file0\x00', 0x0) 2018/04/24 07:21:10 executing program 0: gettid() r0 = getpgid(0xffffffffffffffff) r1 = syz_open_procfs(r0, &(0x7f0000000000)="6e65742f6c6c6300cb19062edba1b302000000464071855969f8b716bf1b80fa33a5f80cd0") lseek(r1, 0x0, 0x4) 2018/04/24 07:21:10 executing program 1: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f00000004c0)="8da4363a00000000000000000000000000000000000000000000000000000000ecf6f2a3299748aeb81e1b00920efd9a000001000000000001000000000000005f4248526653", 0x46, 0x10000}], 0x0, &(0x7f00000002c0)=ANY=[]) 2018/04/24 07:21:10 executing program 6: r0 = socket$inet(0x2, 0x6, 0x9) openat$vsock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vhost-vsock\x00', 0x2, 0x0) setsockopt$inet_buf(r0, 0x0, 0x3, &(0x7f0000ff4000), 0x0) 2018/04/24 07:21:10 executing program 7: r0 = open(&(0x7f0000448000)='./file0\x00', 0x80040, 0x0) fcntl$setlease(r0, 0x400, 0x0) r1 = open(&(0x7f00003f5000)='./file0\x00', 0x0, 0x0) socket$rds(0x15, 0x5, 0x0) fcntl$setlease(r1, 0x400, 0x0) fcntl$getflags(r1, 0x401) 2018/04/24 07:21:10 executing program 2: r0 = eventfd2(0x0, 0x80800) readv(r0, &(0x7f0000001600)=[{&(0x7f0000001500)=""/231, 0xe7}], 0x1) r1 = accept4$unix(0xffffffffffffff9c, &(0x7f0000000000), &(0x7f0000000080)=0x6e, 0x800) r2 = getpid() ioctl$sock_SIOCSPGRP(r1, 0x8902, &(0x7f00000000c0)=r2) 2018/04/24 07:21:10 executing program 5 (fault-call:0 fault-nth:1): syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f00000004c0)="8da4363a00000000000000000000000000000000000000000000000000000000ecf6f2a3299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f00000002c0)=ANY=[]) 2018/04/24 07:21:10 executing program 4: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f00000004c0)="8da4363a00000000000000000000000000000000000000000000000000000000ecf6f2a3299748aeb81e1b00920efd9a000001000000000001000000000000005f4248526653", 0x46, 0x10000}], 0x0, &(0x7f00000002c0)=ANY=[]) symlinkat(&(0x7f0000000240)='./file0/file0/file0\x00', 0xffffffffffffffff, &(0x7f0000000140)='./file0\x00') chmod(&(0x7f0000000780)='./file0/file0/file0\x00', 0x0) [ 94.788452] FAULT_INJECTION: forcing a failure. [ 94.788452] name failslab, interval 1, probability 0, space 0, times 0 [ 94.799827] CPU: 0 PID: 7694 Comm: syz-executor5 Not tainted 4.16.0+ #87 [ 94.806698] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 94.816087] Call Trace: [ 94.818726] dump_stack+0x185/0x1d0 [ 94.822405] should_fail+0x87b/0xab0 [ 94.826176] should_failslab+0x279/0x2a0 [ 94.830296] kmem_cache_alloc+0x136/0xb90 [ 94.834538] ? __d_alloc+0x8b/0xc60 [ 94.838245] ? expand_files+0xa6/0xde0 [ 94.842209] ? kmsan_set_origin_inline+0x6b/0x120 [ 94.847097] __d_alloc+0x8b/0xc60 [ 94.850608] ? __msan_poison_alloca+0x15c/0x1d0 [ 94.855355] ? mntget+0x42/0xd0 [ 94.858713] d_alloc_pseudo+0x68/0x80 [ 94.862579] __shmem_file_setup+0x395/0x860 [ 94.867006] SYSC_memfd_create+0x5ad/0x9c0 [ 94.871344] ? SYSC_write+0x2f0/0x360 [ 94.875235] SyS_memfd_create+0x45/0x70 [ 94.879298] do_syscall_64+0x309/0x430 [ 94.883245] ? memfd_fcntl+0x1d30/0x1d30 [ 94.887351] entry_SYSCALL_64_after_hwframe+0x3d/0xa2 [ 94.892653] RIP: 0033:0x455389 [ 94.895861] RSP: 002b:00007ff4beec7ba8 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 94.903608] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 0000000000455389 [ 94.910907] RDX: 0000000020000218 RSI: 0000000000000000 RDI: 00000000004ba1cf [ 94.918215] RBP: 000000000072bea0 R08: 0000000020000218 R09: 0000000000000000 [ 94.925518] R10: fe03f80fe03f80ff R11: 0000000000000246 R12: 0000000000000013 2018/04/24 07:21:10 executing program 2: r0 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer\x00', 0x0, 0x0) unshare(0x40600) close(r0) creat(&(0x7f0000000100)='./file0\x00', 0x4) futex(&(0x7f0000000000)=0x2, 0xe569c9fc1c3d42e4, 0x0, &(0x7f0000000080)={0x0, 0x1c9c380}, &(0x7f00000000c0)=0x2, 0x1) fchown(r0, 0x0, 0x0) [ 94.932818] R13: 0000000000000672 R14: 00000000006fcb50 R15: 0000000000000001 2018/04/24 07:21:10 executing program 4: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f00000004c0)="8da4363a00000000000000000000000000000000000000000000000000000000ecf6f2a3299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f", 0x47, 0x10000}], 0x0, &(0x7f00000002c0)=ANY=[]) symlinkat(&(0x7f0000000240)='./file0/file0/file0\x00', 0xffffffffffffffff, &(0x7f0000000140)='./file0\x00') chmod(&(0x7f0000000780)='./file0/file0/file0\x00', 0x0) 2018/04/24 07:21:11 executing program 3: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f00000004c0)="8da4363a00000000000000000000000000000000000000000000000000000000ecf6f2a3299748aeb81e1b00920efd9a000001000000000001000000000000005f4248526653", 0x46, 0x10000}], 0x0, &(0x7f00000002c0)=ANY=[]) symlinkat(&(0x7f0000000240)='./file0/file0/file0\x00', 0xffffffffffffffff, &(0x7f0000000140)='./file0\x00') chmod(&(0x7f0000000780)='./file0/file0/file0\x00', 0x0) 2018/04/24 07:21:11 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_mreqn(r0, 0x0, 0x27, &(0x7f0000000000)={@multicast2=0xe0000002, @loopback=0x7f000001}, 0xc) setsockopt$inet_msfilter(r0, 0x0, 0x29, &(0x7f000023afe8)={@multicast2=0xe0000002, @loopback=0x7f000001, 0x1, 0x1, [@multicast2=0xe0000002]}, 0x14) r1 = openat$cuse(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/cuse\x00', 0x10400, 0x0) ioctl$TIOCSTI(r1, 0x5412, 0x51) r2 = syz_open_dev$admmidi(&(0x7f0000000080)='/dev/admmidi#\x00', 0xfffffffffffffff1, 0x80000) ioctl$PIO_FONT(r2, 0x4b61, &(0x7f00000000c0)="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") setsockopt$inet_msfilter(r0, 0x0, 0x29, &(0x7f0000000040)={@multicast2=0xe0000002, @loopback=0x7f000001, 0x0, 0x2, [@empty, @multicast1=0xe0000001]}, 0x18) r3 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$TIOCSTI(r2, 0x5412, 0x10000) setsockopt$inet_mreqsrc(r3, 0x0, 0x27, &(0x7f00003fdff5)={@multicast2=0xe0000002, @loopback=0x7f000001, @rand_addr}, 0xc) 2018/04/24 07:21:11 executing program 1: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f00000004c0)="8da4363a00000000000000000000000000000000000000000000000000000000ecf6f2a3299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f", 0x47, 0x10000}], 0x0, &(0x7f00000002c0)=ANY=[]) 2018/04/24 07:21:11 executing program 7: r0 = openat$vcs(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vcs\x00', 0x200000, 0x0) getsockopt$inet_sctp_SCTP_DEFAULT_SEND_PARAM(0xffffffffffffffff, 0x84, 0xa, &(0x7f0000000100)={0x2, 0xa7, 0x8000, 0x1, 0xfff, 0x8, 0xa99, 0x512fafa0, 0x0}, &(0x7f0000000140)=0x20) setsockopt$inet_sctp_SCTP_ASSOCINFO(r0, 0x84, 0x1, &(0x7f0000000180)={r1, 0x0, 0xff, 0x800, 0x1, 0x9}, 0x14) r2 = socket$inet(0x2, 0x6, 0x394) sendmmsg(r2, &(0x7f0000001e80)=[{{&(0x7f0000000000)=@in={0x2}, 0x80, &(0x7f0000000080), 0x0, &(0x7f0000000080)}}, {{&(0x7f00000002c0)=@in={0x2, 0x0, @broadcast=0xffffffff}, 0x80, &(0x7f0000000600), 0x0, &(0x7f0000000080)=[{0x18, 0x0, 0x7, 'B'}], 0x18}}], 0x2, 0x0) 2018/04/24 07:21:11 executing program 5 (fault-call:0 fault-nth:2): syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f00000004c0)="8da4363a00000000000000000000000000000000000000000000000000000000ecf6f2a3299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f00000002c0)=ANY=[]) 2018/04/24 07:21:11 executing program 6: r0 = memfd_create(&(0x7f0000530000)="51656c2a6e75787b2577ba610000000000000005786e65747b24008951", 0xfffffffffffffffd) openat$vcs(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vcs\x00', 0x101000, 0x0) ioctl$LOOP_CHANGE_FD(r0, 0x4c06, r0) fallocate(r0, 0xb, 0x0, 0xfa) ioctl$sock_inet_tcp_SIOCOUTQNSD(r0, 0x894b, &(0x7f0000000000)) 2018/04/24 07:21:11 executing program 2: r0 = socket(0x17, 0x6, 0x1) connect$unix(r0, &(0x7f0000000140)=@file={0x0, './file0\x00'}, 0x6e) getsockopt$inet_sctp6_SCTP_ENABLE_STREAM_RESET(r0, 0x84, 0x76, &(0x7f0000000080)={0x0, 0x76c}, &(0x7f00000000c0)=0x8) setsockopt$inet_sctp6_SCTP_CONTEXT(r0, 0x84, 0x11, &(0x7f0000000100)={r1, 0x1}, 0x8) 2018/04/24 07:21:11 executing program 4: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f00000004c0)="8da4363a00000000000000000000000000000000000000000000000000000000ecf6f2a3299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f", 0x47, 0x10000}], 0x0, &(0x7f00000002c0)=ANY=[]) symlinkat(&(0x7f0000000240)='./file0/file0/file0\x00', 0xffffffffffffffff, &(0x7f0000000140)='./file0\x00') chmod(&(0x7f0000000780)='./file0/file0/file0\x00', 0x0) [ 95.319863] FAULT_INJECTION: forcing a failure. [ 95.319863] name failslab, interval 1, probability 0, space 0, times 0 [ 95.331418] CPU: 0 PID: 7733 Comm: syz-executor5 Not tainted 4.16.0+ #87 [ 95.338291] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 95.347672] Call Trace: [ 95.350314] dump_stack+0x185/0x1d0 [ 95.353990] should_fail+0x87b/0xab0 [ 95.357763] should_failslab+0x279/0x2a0 [ 95.361876] kmem_cache_alloc+0x136/0xb90 [ 95.366082] ? shmem_alloc_inode+0x55/0xb0 [ 95.370362] ? memcg_kmem_put_cache+0x40/0x280 [ 95.375045] shmem_alloc_inode+0x55/0xb0 [ 95.379193] ? shmem_write_end+0x980/0x980 [ 95.383463] new_inode_pseudo+0x8a/0x430 [ 95.387560] new_inode+0x5c/0x400 [ 95.391073] ? __msan_metadata_ptr_for_load_8+0x10/0x20 [ 95.396480] shmem_get_inode+0x1e9/0xf00 [ 95.400616] ? validate_store+0xb0/0x980 [ 95.404732] __shmem_file_setup+0x46d/0x860 [ 95.409168] SYSC_memfd_create+0x5ad/0x9c0 [ 95.413506] ? SYSC_write+0x2f0/0x360 [ 95.417396] SyS_memfd_create+0x45/0x70 [ 95.421463] do_syscall_64+0x309/0x430 [ 95.425411] ? memfd_fcntl+0x1d30/0x1d30 [ 95.429520] entry_SYSCALL_64_after_hwframe+0x3d/0xa2 [ 95.434740] RIP: 0033:0x455389 [ 95.437958] RSP: 002b:00007ff4beec7ba8 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 95.445709] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 0000000000455389 [ 95.453025] RDX: 0000000020000218 RSI: 0000000000000000 RDI: 00000000004ba1cf [ 95.460329] RBP: 000000000072bea0 R08: 0000000020000218 R09: 0000000000000000 2018/04/24 07:21:11 executing program 7: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x6, 0x4, 0x4, 0x9}, 0x2c) unshare(0x400) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000140)={r0, &(0x7f0000000040), &(0x7f00000000c0)=""/5}, 0x18) r1 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000180)='/dev/dsp\x00', 0x40000, 0x0) ioctl$sock_ipx_SIOCSIFADDR(r1, 0x8916, &(0x7f00000001c0)={'vcan0\x00', {0x4, 0x40, 0x4, "48ff94bfe039", 0xb15}}) [ 95.467634] R10: fe03f80fe03f80ff R11: 0000000000000246 R12: 0000000000000013 [ 95.474939] R13: 0000000000000672 R14: 00000000006fcb50 R15: 0000000000000002 2018/04/24 07:21:11 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_mreqn(r0, 0x0, 0x27, &(0x7f0000000000)={@multicast2=0xe0000002, @loopback=0x7f000001}, 0xc) setsockopt$inet_msfilter(r0, 0x0, 0x29, &(0x7f000023afe8)={@multicast2=0xe0000002, @loopback=0x7f000001, 0x1, 0x1, [@multicast2=0xe0000002]}, 0x14) r1 = openat$cuse(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/cuse\x00', 0x10400, 0x0) ioctl$TIOCSTI(r1, 0x5412, 0x51) r2 = syz_open_dev$admmidi(&(0x7f0000000080)='/dev/admmidi#\x00', 0xfffffffffffffff1, 0x80000) ioctl$PIO_FONT(r2, 0x4b61, &(0x7f00000000c0)="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") setsockopt$inet_msfilter(r0, 0x0, 0x29, &(0x7f0000000040)={@multicast2=0xe0000002, @loopback=0x7f000001, 0x0, 0x2, [@empty, @multicast1=0xe0000001]}, 0x18) r3 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$TIOCSTI(r2, 0x5412, 0x10000) setsockopt$inet_mreqsrc(r3, 0x0, 0x27, &(0x7f00003fdff5)={@multicast2=0xe0000002, @loopback=0x7f000001, @rand_addr}, 0xc) 2018/04/24 07:21:11 executing program 1: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f00000004c0)="8da4363a00000000000000000000000000000000000000000000000000000000ecf6f2a3299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f", 0x47, 0x10000}], 0x0, &(0x7f00000002c0)=ANY=[]) 2018/04/24 07:21:11 executing program 3: r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r0, &(0x7f000067efe4)={0xa, 0x4e24, 0x0, @ipv4={[], [0xff, 0xff], @dev={0xac, 0x14, 0x14, 0x1b}}, 0xffffffffffffffff}, 0x1c) getsockopt$inet_sctp6_SCTP_GET_LOCAL_ADDRS(r0, 0x84, 0x6d, &(0x7f00000000c0)=ANY=[@ANYRES32=0x0, @ANYBLOB="764749df773dd002c3b6c1c90f5c1b9600000000"], &(0x7f0000000180)=0x8) r1 = syz_open_dev$mice(&(0x7f0000000340)='/dev/input/mice\x00', 0x0, 0x80000) ioctl$DRM_IOCTL_AGP_ALLOC(r1, 0xc0206434, &(0x7f0000000100)={0x10000, 0x0, 0x10001}) ioctl$DRM_IOCTL_AGP_UNBIND(r1, 0x40106437, &(0x7f0000000140)={r2, 0x3ff}) getsockopt$inet_sctp6_SCTP_FRAGMENT_INTERLEAVE(r1, 0x84, 0x12, &(0x7f0000000040), &(0x7f0000000080)=0x4) getsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX3(r1, 0x84, 0x6f, &(0x7f0000000200)={0x0, 0x20, &(0x7f00000001c0)=[@in={0x2, 0x4e20, @local={0xac, 0x14, 0x14, 0xaa}}, @in={0x2, 0x4e20, @remote={0xac, 0x14, 0x14, 0xbb}}]}, &(0x7f0000000240)=0x10) getsockopt$inet_sctp6_SCTP_ASSOCINFO(r1, 0x84, 0x1, &(0x7f0000000280)={r3, 0x100, 0x6, 0x6, 0xfffffffffffffff9}, &(0x7f00000002c0)=0x14) 2018/04/24 07:21:11 executing program 7: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f00000004c0)="8da4363a00000000000000000000000000000000000000000000000000000000ecf6f2a3299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f", 0x47, 0x10000}], 0x0, &(0x7f00000002c0)=ANY=[]) symlinkat(&(0x7f0000000240)='./file0/file0/file0\x00', 0xffffffffffffffff, &(0x7f0000000140)='./file0\x00') chmod(&(0x7f0000000780)='./file0/file0/file0\x00', 0x0) 2018/04/24 07:21:11 executing program 4: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f00000004c0)="8da4363a00000000000000000000000000000000000000000000000000000000ecf6f2a3299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f", 0x47, 0x10000}], 0x0, &(0x7f00000002c0)=ANY=[]) symlinkat(&(0x7f0000000240)='./file0/file0/file0\x00', 0xffffffffffffffff, &(0x7f0000000140)='./file0\x00') chmod(&(0x7f0000000780)='./file0/file0/file0\x00', 0x0) 2018/04/24 07:21:11 executing program 5 (fault-call:0 fault-nth:3): syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f00000004c0)="8da4363a00000000000000000000000000000000000000000000000000000000ecf6f2a3299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f00000002c0)=ANY=[]) 2018/04/24 07:21:11 executing program 6: socketpair$unix(0x1, 0x1, 0x0, &(0x7f000000d000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup2(r1, r0) ioctl$DRM_IOCTL_PRIME_HANDLE_TO_FD(r1, 0xc00c642d, &(0x7f0000000000)={0x0, 0x80000, r2}) ioctl$DRM_IOCTL_PRIME_FD_TO_HANDLE(r2, 0xc00c642e, &(0x7f0000000040)={r3, 0x80000, r2}) sendmsg$netlink(r2, &(0x7f0000001a00)={0x0, 0x0, &(0x7f0000001980), 0x0, &(0x7f00000019c0)=[@rights={0x10, 0x1, 0x1}], 0x10}, 0xc800) 2018/04/24 07:21:11 executing program 2: r0 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vga_arbiter\x00', 0x8002, 0x0) setsockopt$inet_sctp6_SCTP_MAX_BURST(r0, 0x84, 0x14, &(0x7f0000000100)=@int=0x7, 0x4) futex(&(0x7f0000000040)=0x4, 0x80000000000b, 0x4, &(0x7f0000000000)={0x77359400}, &(0x7f0000000080), 0x0) clone(0x2000400, &(0x7f00000001c0)="ccd6d698697ae5bdb0488fffffb1ee886d36425a0b6087c2b52824b4c636685b1e4c8d1596d576815df6e394b9b8", &(0x7f0000000200), &(0x7f0000000240), &(0x7f0000000280)="12d13cf83ed486a5b8a5f106ad89fb4cf789") futex(&(0x7f000000cffc), 0x800000000005, 0x0, &(0x7f000000b000)={0x77359400}, &(0x7f0000000040), 0x0) ioctl$sock_bt_bnep_BNEPGETCONNLIST(r0, 0x800442d2, &(0x7f0000000180)={0x2, &(0x7f0000000140)=[{0x0, 0x0, 0x0, @dev}, {0x0, 0x0, 0x0, @random}]}) clock_gettime(0x7, &(0x7f00000002c0)) [ 95.825199] FAULT_INJECTION: forcing a failure. [ 95.825199] name failslab, interval 1, probability 0, space 0, times 0 [ 95.836733] CPU: 1 PID: 7782 Comm: syz-executor5 Not tainted 4.16.0+ #87 [ 95.843609] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 95.853086] Call Trace: [ 95.855729] dump_stack+0x185/0x1d0 [ 95.859399] should_fail+0x87b/0xab0 [ 95.863215] should_failslab+0x279/0x2a0 [ 95.867388] kmem_cache_alloc+0x136/0xb90 [ 95.871629] ? get_empty_filp+0x1f1/0x870 [ 95.875860] ? kmsan_memcpy_origins+0xf1/0x170 [ 95.880523] get_empty_filp+0x1f1/0x870 [ 95.884587] alloc_file+0x6a/0x5d0 [ 95.888175] ? clear_nlink+0x81/0xf0 [ 95.891929] __shmem_file_setup+0x5d3/0x860 [ 95.896355] SYSC_memfd_create+0x5ad/0x9c0 [ 95.900691] ? SYSC_write+0x2f0/0x360 [ 95.904582] SyS_memfd_create+0x45/0x70 [ 95.908644] do_syscall_64+0x309/0x430 [ 95.912594] ? memfd_fcntl+0x1d30/0x1d30 [ 95.916701] entry_SYSCALL_64_after_hwframe+0x3d/0xa2 [ 95.921922] RIP: 0033:0x455389 2018/04/24 07:21:11 executing program 6: r0 = socket$key(0xf, 0x3, 0x2) r1 = dup3(r0, r0, 0x80000) bind$inet(r1, &(0x7f00000000c0)={0x2, 0x4e22, @dev={0xac, 0x14, 0x14, 0x1b}}, 0x10) getsockopt$inet_mreq(r1, 0x0, 0x23, &(0x7f0000000100)={@local, @broadcast}, &(0x7f0000000140)=0x8) ioctl$VHOST_SET_VRING_ERR(r1, 0x4008af22, &(0x7f0000000080)={0x3}) sendmsg$key(r0, &(0x7f0000f56000)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f0000000180)=ANY=[@ANYBLOB="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"], 0x50}, 0x1}, 0x0) ioctl$VHOST_SET_VRING_NUM(r1, 0x4008af10, &(0x7f0000000000)={0x0, 0x1}) 2018/04/24 07:21:11 executing program 7: r0 = gettid() sched_setattr(r0, &(0x7f00000003c0)={0x30, 0x2, 0x1, 0x61, 0x3, 0x101, 0x2b17, 0x5dab}, 0x0) r1 = socket$inet6(0xa, 0x7fc, 0x7d02) getsockopt$inet_sctp6_SCTP_MAX_BURST(r1, 0x84, 0x14, &(0x7f0000000180)=@assoc_value, &(0x7f0000000380)=0x8) bind$inet6(r1, &(0x7f000070ffe3)={0xa, 0x800000000004e20}, 0x1c) sendto$inet6(r1, &(0x7f0000000000)="89", 0x1, 0x0, &(0x7f0000000100)={0xa, 0x0, 0x0, @dev={0xfe, 0x80}, 0x3}, 0x1c) getsockopt$inet6_udp_int(r1, 0x11, 0x1, &(0x7f0000000040), &(0x7f0000000080)=0x4) sendto$inet6(r1, &(0x7f000023effe)="7f", 0x2c0, 0x0, &(0x7f000010e000)={0xa, 0x4e22, 0x0, @mcast1={0xff, 0x1, [], 0x1}}, 0xfffffffffffffec9) r2 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000140)='/dev/autofs\x00', 0x501001, 0x0) ioctl$SNDRV_TIMER_IOCTL_STATUS(r2, 0x80605414, &(0x7f0000000280)=""/197) setsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(r1, 0x84, 0x1f, &(0x7f00000001c0)={0x0, @in={{0x2, 0x4e20, @local={0xac, 0x14, 0x14, 0xaa}}}}, 0x90) r3 = getpgid(0x0) fcntl$setownex(r1, 0xf, &(0x7f00000000c0)={0x2, r3}) 2018/04/24 07:21:11 executing program 4: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f00000004c0)="8da4363a00000000000000000000000000000000000000000000000000000000ecf6f2a3299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48}], 0x0, &(0x7f00000002c0)=ANY=[]) symlinkat(&(0x7f0000000240)='./file0/file0/file0\x00', 0xffffffffffffffff, &(0x7f0000000140)='./file0\x00') chmod(&(0x7f0000000780)='./file0/file0/file0\x00', 0x0) 2018/04/24 07:21:11 executing program 3: r0 = socket$unix(0x1, 0x5, 0x0) bind$unix(r0, &(0x7f000000dff8)=@file={0x1}, 0x2) r1 = add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000040)={0x73, 0x79, 0x7a, 0x1}, 0x0, 0x0, 0x0) add_key(&(0x7f0000bbaff8)='trusted\x00', &(0x7f0000c33ffb)={0x73, 0x79, 0x7a}, &(0x7f00000d6000), 0x0, r1) listen(r0, 0x0) add_key(&(0x7f0000efeffa)='logon\x00', &(0x7f0000a13000)={0x73, 0x79, 0x7a}, &(0x7f0000bd9faa), 0x0, 0xfffffffffffffffe) [ 95.925138] RSP: 002b:00007ff4beec7ba8 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 95.932889] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 0000000000455389 [ 95.940194] RDX: 0000000020000218 RSI: 0000000000000000 RDI: 00000000004ba1cf [ 95.948191] RBP: 000000000072bea0 R08: 0000000020000218 R09: 0000000000000000 [ 95.955496] R10: fe03f80fe03f80ff R11: 0000000000000246 R12: 0000000000000013 [ 95.962794] R13: 0000000000000672 R14: 00000000006fcb50 R15: 0000000000000003 2018/04/24 07:21:12 executing program 0: r0 = msgget$private(0x0, 0x2a0) msgctl$MSG_STAT(r0, 0xb, &(0x7f0000000000)=""/137) openat$ptmx(0xffffffffffffff9c, &(0x7f00003e0000)='/dev/ptmx\x00', 0x0, 0x0) 2018/04/24 07:21:12 executing program 1: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f00000004c0)="8da4363a00000000000000000000000000000000000000000000000000000000ecf6f2a3299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f", 0x47, 0x10000}], 0x0, &(0x7f00000002c0)=ANY=[]) 2018/04/24 07:21:12 executing program 4: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f00000004c0)="8da4363a00000000000000000000000000000000000000000000000000000000ecf6f2a3299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48}], 0x0, &(0x7f00000002c0)=ANY=[]) symlinkat(&(0x7f0000000240)='./file0/file0/file0\x00', 0xffffffffffffffff, &(0x7f0000000140)='./file0\x00') chmod(&(0x7f0000000780)='./file0/file0/file0\x00', 0x0) 2018/04/24 07:21:12 executing program 7: mkdir(&(0x7f0000554ff8)='./file0\x00', 0x0) r0 = open(&(0x7f00006c69d0)='./file0\x00', 0x0, 0x0) fcntl$dupfd(r0, 0x800000000402, 0xffffffffffffffff) r1 = open(&(0x7f00004a3000)='./file0\x00', 0x0, 0x0) r2 = open(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) fcntl$notify(r2, 0x402, 0x1) getsockopt$IPT_SO_GET_INFO(r1, 0x0, 0x40, &(0x7f0000000080)={'mangle\x00'}, &(0x7f0000000000)=0x54) fcntl$notify(r1, 0x402, 0x0) 2018/04/24 07:21:12 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) ioctl$fiemap(r0, 0xc020660b, &(0x7f0000000380)=ANY=[@ANYBLOB="01000000000000008000000000000000070000007b0e00000500000000000000000000000100000001000000000000000100000000000000000000000000000000000000000000000418000000000000000000000000000004000000000000001f0b00000000000003000000000000020000000000000000000000000000000000080000000000000000000000000000f7ffffffffffffff070000000000000004000000000000000000000000000000000000000000000008000000000000000000000000000000ff000000000000000800000000000000060000000000000000000000000000000000000000000000010000000000000000000000000000003d1ff8480000000000004c0000000000000007000000000000000000000000000000000000000000000001000000000000000000000000000000"]) r1 = syz_open_dev$sg(&(0x7f0000000080)='/dev/sg#\x00', 0xfff, 0x200) timerfd_gettime(r1, &(0x7f0000000100)) sendmsg$nl_generic(r0, &(0x7f0000000200)={&(0x7f00009f7000)={0x10}, 0x2, &(0x7f0000000140)={&(0x7f0000000000)=ANY=[]}, 0x1}, 0x80) 2018/04/24 07:21:12 executing program 1: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f00000004c0)="8da4363a00000000000000000000000000000000000000000000000000000000ecf6f2a3299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48}], 0x0, &(0x7f00000002c0)=ANY=[]) 2018/04/24 07:21:12 executing program 5 (fault-call:0 fault-nth:4): syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f00000004c0)="8da4363a00000000000000000000000000000000000000000000000000000000ecf6f2a3299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f00000002c0)=ANY=[]) 2018/04/24 07:21:12 executing program 7: r0 = syz_open_dev$tun(&(0x7f0000000080)='/dev/net/tun\x00', 0x0, 0xfffffffffffffffe) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000040)={"d202b999cf85000000000088f301e710", 0x102}) socketpair$packet(0x11, 0x2, 0x300, &(0x7f0000000100)={0xffffffffffffffff}) sendto$packet(r1, &(0x7f0000000140)="e65166ab1fa65144963336d9d8effa7de70e522876c6a81af62298ff59fea8da4153a0822f3e1c0c40890879823b59b8c83807838ee806967e", 0x39, 0x20000000, 0x0, 0x0) fcntl$getownex(r0, 0x10, &(0x7f00000000c0)) ioctl$TUNGETSNDBUF(r0, 0x800454d3, &(0x7f0000000000)) 2018/04/24 07:21:12 executing program 6: r0 = socket$nl_generic(0x10, 0x3, 0x10) mkdir(&(0x7f0000554ff8)='./file0\x00', 0x0) r1 = open(&(0x7f00006c69d0)='./file0\x00', 0x0, 0x0) fcntl$dupfd(r1, 0x800000000402, 0xffffffffffffffff) add_key(&(0x7f0000000180)='encrypted\x00', &(0x7f00000001c0)={0x73, 0x79, 0x7a}, &(0x7f0000000200), 0x0, 0xfffffffffffffffd) request_key(&(0x7f0000000000)="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", &(0x7f0000001ffb)={0x73, 0x79, 0x7a}, &(0x7f0000001fee)=':trusteduserVexf(\x00', 0x0) r2 = open(&(0x7f00004a3000)='./file0\x00', 0x0, 0x0) r3 = open(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) fcntl$notify(r0, 0x402, 0x7) fcntl$notify(r2, 0x402, 0x0) sendmmsg$alg(r3, &(0x7f0000002080)=[{0x0, 0x0, &(0x7f0000000400)=[{&(0x7f0000000080)="1115f54c3b94d1f53ae355ce86b066c747919340460f357017954b275cd26c1d830741ee6d3dfbd5586d0399e0fb4ad12911af62229dc94037a5e30cd3a44263881fbe7e0a2ecf3fc626e2c01d38c4f048522aa9458f18d638dcb2f594e0641496d29718491b55", 0x67}, {&(0x7f0000000100)="943fe7122fb1a6ce3f58370a7b07a31ed7168c74902f22a4876c2c450a8b8c04b15946239d145566209df7bf5f3876a2291bfc2322316da5a6b52bf37d4e3077ec5f5378f3ec5e87de7e18b9cfa21007e57ab336153d02ba4646e44f185c4103b603d1fbea243091b0f13166a3b9ce79bbf98c730c11a19a12182837e97f9c58dc9af60f3499188cdc50d8e4bfa648d1cdfff0e804074b08c812eeaa3bd427d6f489741090337707293f8227be38d0ebf4d24026a27c4452965c6fb5a08304edf9023ca05b2272e717a2215eb4aa465eccd773f5bfd0dbb0e68d0dfeba5492f1b6e20482ccf96580635805b5eecf2ae66c5e", 0xf2}, {&(0x7f0000000200)="db6ba559e201ad428e1bb008abf0b6aea0358a55cc9f14e65cc331e14f74bf81db3b3ba2954685e3d914d9a71102f6bef1e63658cb3a9afb8f107c55fd243e9b38366ce93d30f884f89309903a11e1c28a675a34815a45bb312566a0e6eaa13e9eb01f98aaa484e8df95a2e3b92479a3a4b76aaaec3155f664f78129ff43b2b25df3a3195a97f3126c52ea0935020b044ad5659d10bab5b6a64ce73155fb68cec255b59e1d13245aa1cf2b66fe8a27a3a734693e9193b881de1e7f9051f6cec745bdeedae0d3d40358257fce7ea6aa5ad5a4b7ce737a0d39bdd2d46306e2577134303d4cb9321af7df099184a84afc52f2dc", 0xf2}, {&(0x7f0000000000)="187c7af27765bbf12275124782330b7a75af939986e30a0d3c3ae57758a2", 0x1e}, {&(0x7f0000000300)="ed2248bd77fe334653d34d881abeb89296ba0c51e2311c9ee4e954baccad654c52f76923ac194c7f8a1dd59a01546f56164a44c9cacf", 0x36}, {&(0x7f0000000340)="37bd417760297fbe13e676879dcecbe6432fa5c1269ffd2ccc9aa36010fc17fadfcefcd0f0457f5ff0e2aeffef83b379f946980ad2c75cf21719775f82f0fb3383466650c6b259c3b75156534be3f4132532262d36b77a0b523bae3304d7c3d491a8735cba21dc941c35cdf3fcb2d610e1b1c13ce1a9efaf8476e3d0de2021359422f1b9ec764e9ecb123978bd269e3ac70a19b76b763fc9e79cb2f6b8592bb0fdfcf1", 0xa3}], 0x6, &(0x7f0000000480)=[@assoc={0x18, 0x117, 0x4, 0x8}, @op={0x18, 0x117, 0x3, 0x1}, @assoc={0x18, 0x117, 0x4, 0x6}, @op={0x18, 0x117, 0x3, 0x1}, @op={0x18, 0x117, 0x3, 0x1}, @assoc={0x18, 0x117, 0x4, 0x9}, @assoc={0x18, 0x117, 0x4, 0x2}, @op={0x18, 0x117, 0x3, 0x1}, @assoc={0x18, 0x117, 0x4, 0x5}], 0xd8, 0x4}, {0x0, 0x0, &(0x7f0000000780)=[{&(0x7f0000000580)="407bec2c489073a8ab8ca6d034b819c1fc288fe87658df148ba75d4bd95ff523773e0b03628f9fa19466d5d2ae1cff3399f4b54201ffb01de3058361c0c12904a34ed677d6f9dd46f6b1f5c9cce080ff2441dd676e9f4fd80c2be714a676c58714c82ac57cf0048af00920282db1140670ff45f957c2e29f86329c97f4afd64ee655742f2406f4b19490ecfc6597f7e0596a77aabe32e7120ddab98738a11dad889e9590355b5565f44c54dce0da6d47c75f4a217847d44fac8f8fa935bf24a6caa730d43dd20f638dd1144f849c525943a08b81ac66cbb4e1c0eada2ec0ebb9a9c98ed9eaac3dda", 0xe8}, {&(0x7f0000000680)="7d7733e98905d446308da64a5ecc6069d41c088efb2e7751244da58bd7362cab6b67c49f9595bb15dff20e9f02a7d8e8d95f034fb0f8cb8ead383372abd2f063c676c854516d89332f2e7975d622d59fe14b8142b58617a302f27de77709bf963b7083087ea002d6942a4a2482f804ae438c84d932623140e0c251c3591b857178390c0f9a72a16148b5e3518a05de5f5f3773727bdfd546a27cb7993942c806f0af7e6a37731db23cb75ecac71b5192bdb89609f808dc71655778bb03d7578d39aa", 0xc2}], 0x2, &(0x7f00000007c0)=[@op={0x18, 0x117, 0x3}, @op={0x18, 0x117, 0x3}, @op={0x18, 0x117, 0x3, 0x1}, @op={0x18, 0x117, 0x3, 0x1}, @op={0x18, 0x117, 0x3, 0x1}, @assoc={0x18, 0x117, 0x4, 0x1}], 0x90, 0x8000}, {0x0, 0x0, &(0x7f0000000940)=[{&(0x7f0000000880)="7089bfba55066300451b08dd668b33d05730", 0x12}, {&(0x7f00000008c0)="1c291fc385d5be540710fbb4e86c80da6f8babe91e84247102ee16b96726f67bc5b098034b42af08a02e4106b855168beb58bf4242ac6b75520477964eefe6c5dcef002b0df4960376f11b294e1fa6ed31d167720411d602f67def0b190cc6e3abc5ff18521b11d59b43579487dde7a2e36fde6f6b", 0x75}], 0x2, &(0x7f0000000980)=[@assoc={0x18, 0x117, 0x4, 0xd3f}, @op={0x18, 0x117, 0x3, 0x1}, @iv={0xa0, 0x117, 0x2, 0x85, "ab7f78449d9a2f8bc028571b31d7e5c3e3bc5299023311b0ac64aa4482f31e6bb4310d5373a514d48b89a47c67b61c474b67b070a76edac2f32913b03b10becd465c899917081c4abad8d4f6c89310033fa2e021306eb4d65b019480db5856314d7a6c1d0a5eaaef7dbceb904a7e1ecd9e9d47f6d1dbf8c6feeedf5cfb1495d6070543fe82"}, @iv={0xd8, 0x117, 0x2, 0xc2, "a8b1334f1132d05f8f458ca92ea93d8702100fcae011de6ad80052dc5b5d81c77118f40c84e8b0dad2583e5f53e8d16086eac9be6723cf14c1bbfaef57d1d9ee7a687243bab40ccddf703137ddd4d217ad7fd7dd0e42a7c78e4d35df06f4df5f3c548af524cb79bbef2edd2a3e860bd80134486e47149b17111ba56d63f1abd4fbe1127cbd65a6165e0b82c8f49666be38f95cc9c604c848895a84a7eb6fbd45e0dadd201aa5c9be4dffb24f08f9bdb7d77d068bf37076b382bbebb9ef4871b1561e"}, @op={0x18, 0x117, 0x3, 0x1}, @assoc={0x18, 0x117, 0x4, 0xa0}], 0x1d8, 0x4}, {0x0, 0x0, &(0x7f0000001d80)=[{&(0x7f0000000b80)="9750e419817b79aef0bba20f151e10e4e60ae037b59085edde98e934f192fa7384c98c4624be4e1bb12d", 0x2a}, {&(0x7f0000000bc0)="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", 0x1000}, {&(0x7f0000001bc0)="8776841900727dace0f08f0cad2da89286003cca9d7f76315b78d1a64ee4d1aae169526c8f532dbc68252debc47ec75e28f5dc787a51af034ba4f4488bcad897243e4e490a119b3ea620092765235098d5f2402f9a8a4f05e0ab6bc7b743777f8bdeceb8509b89d529356f97631d0f9b7c2aafc79c16dbf7c6af561e9350cf84731f419f1513fef783390867bce0d491c868cdda2f75be3ba0acea232a2adeb73042e7642424768a065348791998228fb3bcc87b58b7124376da7d59a3069c08f6e442b14de93fc9e83d0f5cf68bf57509034a0f8eb952306332531538db46452b4d27781feda8d6557bc58213b8e1", 0xef}, {&(0x7f0000001cc0)="4e59222711ef398beb0c959c362eaaa380450c97b52223fc7784df564185135f08714d163d1614e8cc7b53be90ae50a58e7b961c1c9f1852ceaf41eb6e266bda14df6b38877d55e14c0cda52df383b82dc6c791608dcbeeb431bcaaeb3f2dc720c02bd3660a914b1461052ce872cc6c4f555b29d6716606cffbf6e510939a320625021379942189d27f0bbf0ae988b52aaf2c90142cd5b1a21c0f5dea94e80c3ef7f", 0xa2}], 0x4, &(0x7f0000001dc0)=[@iv={0x98, 0x117, 0x2, 0x82, "eb4df4fdb72c49612028ad45fa8eee2564a2a13f235fb3724d6980601bf831e1a8a215a224b867a33734df2f12aac6f0ac1315c4227d468b7bb92da80581567989fbf63aaf2ba490f199be1ea0d0328aba6595aa8f259cadc4eeb5e4b58e8416ce9042985ecc9172a971984471f2d77762968a88f3659c5caa18a97a352c64d133b2"}, @assoc={0x18, 0x117, 0x4, 0x6}, @op={0x18, 0x117, 0x3, 0x1}, @assoc={0x18, 0x117, 0x4, 0x40}], 0xe0, 0x1}, {0x0, 0x0, &(0x7f0000001f80)=[{&(0x7f0000001ec0)="a26ae847fed6c4a21a", 0x9}, {&(0x7f0000001f00)="b39c09c569e93f550be6146d1265338e2c3f6bf5882ff5ffb4d83773b34b1dd7a5a37a52f6250330b30c8a044052be7f7619b3c601bff331149972d93ea60e5223b31b0c72cee0756455ab3dcb12b439b80cc1812e226d1ab14518000f694bbfb64072bf11398a3dadc564a3f4755a2007c51e53605848d04993cfd1cf6a59", 0x7f}], 0x2, &(0x7f0000001fc0)=[@op={0x18, 0x117, 0x3}, @iv={0x30, 0x117, 0x2, 0x16, "173a78c03354e3cee6fb7b45eea18d9f0232a815f102"}, @op={0x18, 0x117, 0x3}, @op={0x18, 0x117, 0x3}, @op={0x18, 0x117, 0x3, 0x1}, @assoc={0x18, 0x117, 0x4}], 0xa8, 0x4004}], 0x5, 0x20040050) 2018/04/24 07:21:12 executing program 0: syz_emit_ethernet(0x3e, &(0x7f0000000000)={@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, @remote={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xbb}, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x30, 0x0, 0x0, 0x0, 0x1, 0x0, @remote={0xac, 0x14, 0x14, 0xbb}, @dev={0xac, 0x14, 0x14, 0x800e}}, @icmp=@parameter_prob={0x3, 0xfffffffd, 0x0, 0x0, 0x0, 0x0, {0x5, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @local={0xac, 0x14, 0x14, 0xaa}, @dev={0xac, 0x14, 0x14}}}}}}}, &(0x7f0000000200)={0x0, 0x0, [0x0, 0xab9]}) r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x80001, 0x100) ioctl$GIO_UNISCRNMAP(r0, 0x4b69, &(0x7f0000001380)=""/106) ioctl$KDGETMODE(r0, 0x4b3b, &(0x7f0000000080)) recvmsg$kcm(r0, &(0x7f0000001340)={&(0x7f00000000c0)=@pppol2tpv3={0x0, 0x0, {0x0, 0xffffffffffffffff, {0x0, 0x0, @local}}}, 0x80, &(0x7f0000001240)=[{&(0x7f0000000140)=""/87, 0x57}, {&(0x7f00000001c0)}, {&(0x7f0000000240)=""/4096, 0x1000}], 0x3, &(0x7f0000001280)=""/187, 0xbb, 0x8}, 0x2) 2018/04/24 07:21:12 executing program 4: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f00000004c0)="8da4363a00000000000000000000000000000000000000000000000000000000ecf6f2a3299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48}], 0x0, &(0x7f00000002c0)=ANY=[]) symlinkat(&(0x7f0000000240)='./file0/file0/file0\x00', 0xffffffffffffffff, &(0x7f0000000140)='./file0\x00') chmod(&(0x7f0000000780)='./file0/file0/file0\x00', 0x0) 2018/04/24 07:21:12 executing program 3: r0 = socket(0x10, 0x803, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f0000000680)={@mcast2={0xff, 0x2, [], 0x1}, 0x65, 0x0, 0x0, 0x2, 0x6, 0x0, 0x400}, 0x20) sendto(r0, &(0x7f00000003c0)="120000001200e7ff00ffe90009144a000ae9", 0x12, 0x0, 0x0, 0x0) syz_mount_image$reiserfs(&(0x7f00000000c0)='reiserfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f00000005c0)=[{&(0x7f0000000340)="290f43b49a3df07fcc5cf9f5be970d21ece919a4887fc627d1a717fe88d590391344af2cd73a87e352c312144d299ddfe79ae089b07b073e7285dcc1b095804f2c1ccbebbe5a41060b000588ea53efe23ed9091b6374fad5218da7625600cc6e64f8cc", 0x63, 0x800}, {&(0x7f0000000500)="5607a5fb3fb95fc1448cc0032472d99f08bb91e266cbbf8cca2899a108b76011f6a37066fd4ddcce65d0ae67e86fdaa23cfba0481323c6a31bcfb59aad704037214a0ba686de09f79f30c8fe35ed0823bcc16bc34d9d8e39a86c9883a6910a9c7135faa5fcda6ac799a782581b4f91a44bc80b4aaf8bb410cea664d0cbb72040c255196bd66ea5", 0x87, 0x532}, {&(0x7f0000000400)="af0e9c29818ab68de0cb9eac2760380152a9422c648c9a0a8e5cb896a92423c7431ed21863434ce1dc63", 0x2a, 0x8}], 0x1403, &(0x7f0000000640)={[{@tails_small='tails=small', 0x2c}, {@balloc_hashed_reloc='block-allocator=hashed_relocation', 0x2c}]}) recvmsg(r0, &(0x7f00000004c0)={&(0x7f00000002c0)=@pppol2tpin6={0x0, 0x0, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, @loopback}}}, 0x80, &(0x7f0000000400), 0x0, &(0x7f0000000440)=""/118, 0x76}, 0x0) recvmsg(r0, &(0x7f0000002a80)={0x0, 0x0, &(0x7f00000029c0)=[{&(0x7f0000000000)=""/135, 0x87}, {&(0x7f0000001680)=""/133, 0x85}, {&(0x7f0000000140)=""/68, 0x44}, {&(0x7f00000017c0)=""/252, 0xfc}, {&(0x7f00000001c0)=""/247, 0xf7}, {&(0x7f00000019c0)=""/4096, 0x1000}], 0x6, &(0x7f0000002a00)=""/85, 0x55}, 0x0) [ 96.849970] FAULT_INJECTION: forcing a failure. [ 96.849970] name failslab, interval 1, probability 0, space 0, times 0 [ 96.861252] CPU: 0 PID: 7843 Comm: syz-executor5 Not tainted 4.16.0+ #87 [ 96.868116] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 96.877582] Call Trace: [ 96.880230] dump_stack+0x185/0x1d0 [ 96.883924] should_fail+0x87b/0xab0 [ 96.887751] should_failslab+0x279/0x2a0 [ 96.891887] kmem_cache_alloc+0x136/0xb90 [ 96.896094] ? radix_tree_node_alloc+0x135/0x5c0 [ 96.900933] ? kmsan_set_origin_inline+0x6b/0x120 [ 96.905836] radix_tree_node_alloc+0x135/0x5c0 [ 96.910473] __radix_tree_create+0x66d/0xc40 [ 96.914998] __radix_tree_insert+0x17d/0x580 [ 96.919475] shmem_add_to_page_cache+0x575/0xae0 [ 96.924341] ? radix_tree_maybe_preload_order+0x479/0x4a0 [ 96.929935] shmem_getpage_gfp+0x432e/0x59c0 [ 96.934428] ? __msan_metadata_ptr_for_load_4+0x10/0x20 [ 96.939877] ? is_bpf_text_address+0xb4/0x4b0 [ 96.944464] ? __is_insn_slot_addr+0x198/0x1c0 2018/04/24 07:21:12 executing program 0: syz_emit_ethernet(0x3e, &(0x7f0000000000)={@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, @remote={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xbb}, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x30, 0x0, 0x0, 0x0, 0x1, 0x0, @remote={0xac, 0x14, 0x14, 0xbb}, @dev={0xac, 0x14, 0x14, 0x800e}}, @icmp=@parameter_prob={0x3, 0xfffffffd, 0x0, 0x0, 0x0, 0x0, {0x5, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @local={0xac, 0x14, 0x14, 0xaa}, @dev={0xac, 0x14, 0x14}}}}}}}, &(0x7f0000000200)={0x0, 0x0, [0x0, 0xab9]}) r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x80001, 0x100) ioctl$GIO_UNISCRNMAP(r0, 0x4b69, &(0x7f0000001380)=""/106) ioctl$KDGETMODE(r0, 0x4b3b, &(0x7f0000000080)) recvmsg$kcm(r0, &(0x7f0000001340)={&(0x7f00000000c0)=@pppol2tpv3={0x0, 0x0, {0x0, 0xffffffffffffffff, {0x0, 0x0, @local}}}, 0x80, &(0x7f0000001240)=[{&(0x7f0000000140)=""/87, 0x57}, {&(0x7f00000001c0)}, {&(0x7f0000000240)=""/4096, 0x1000}], 0x3, &(0x7f0000001280)=""/187, 0xbb, 0x8}, 0x2) [ 96.949123] ? kernel_text_address+0x34d/0x3a0 [ 96.953806] shmem_write_begin+0x1ae/0x330 [ 96.958144] ? shmem_writepage+0x19b0/0x19b0 [ 96.962591] generic_perform_write+0x402/0x990 [ 96.967284] ? __msan_metadata_ptr_for_load_8+0x10/0x20 [ 96.972726] ? file_update_time+0x547/0x6c0 [ 96.977143] __generic_file_write_iter+0x43b/0xa10 [ 96.982174] generic_file_write_iter+0x814/0xbf0 [ 96.987054] ? __generic_file_write_iter+0xa10/0xa10 [ 96.992250] __vfs_write+0x7fb/0x9f0 [ 96.996035] vfs_write+0x463/0x8d0 [ 96.999689] SYSC_pwrite64+0x275/0x310 [ 97.003695] SyS_pwrite64+0x65/0x90 [ 97.007423] do_syscall_64+0x309/0x430 [ 97.011367] ? SYSC_pread64+0x310/0x310 [ 97.015472] entry_SYSCALL_64_after_hwframe+0x3d/0xa2 [ 97.020689] RIP: 0033:0x40f647 [ 97.023899] RSP: 002b:00007ff4beec7ba0 EFLAGS: 00000293 ORIG_RAX: 0000000000000012 [ 97.031650] RAX: ffffffffffffffda RBX: 0000000020000210 RCX: 000000000040f647 [ 97.038944] RDX: 0000000000000048 RSI: 00000000200004c0 RDI: 0000000000000014 [ 97.046238] RBP: 0000000000000000 R08: 0000000020000218 R09: 0000000000000000 [ 97.053534] R10: 0000000000010000 R11: 0000000000000293 R12: 0000000000000014 [ 97.060835] R13: 0000000000000001 R14: 00000000006fcb50 R15: 0000000000000004 2018/04/24 07:21:13 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) ioctl$fiemap(r0, 0xc020660b, &(0x7f0000000380)=ANY=[@ANYBLOB="01000000000000008000000000000000070000007b0e00000500000000000000000000000100000001000000000000000100000000000000000000000000000000000000000000000418000000000000000000000000000004000000000000001f0b00000000000003000000000000020000000000000000000000000000000000080000000000000000000000000000f7ffffffffffffff070000000000000004000000000000000000000000000000000000000000000008000000000000000000000000000000ff000000000000000800000000000000060000000000000000000000000000000000000000000000010000000000000000000000000000003d1ff8480000000000004c0000000000000007000000000000000000000000000000000000000000000001000000000000000000000000000000"]) r1 = syz_open_dev$sg(&(0x7f0000000080)='/dev/sg#\x00', 0xfff, 0x200) timerfd_gettime(r1, &(0x7f0000000100)) sendmsg$nl_generic(r0, &(0x7f0000000200)={&(0x7f00009f7000)={0x10}, 0x2, &(0x7f0000000140)={&(0x7f0000000000)=ANY=[]}, 0x1}, 0x80) [ 97.292695] ================================================================== [ 97.300126] BUG: KMSAN: uninit-value in netlink_sendmsg+0xb26/0x1310 [ 97.306630] CPU: 0 PID: 7869 Comm: syz-executor2 Not tainted 4.16.0+ #87 [ 97.313467] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 97.322818] Call Trace: [ 97.325421] dump_stack+0x185/0x1d0 [ 97.329062] ? netlink_sendmsg+0xb26/0x1310 [ 97.333387] kmsan_report+0x142/0x240 [ 97.337198] __msan_warning_32+0x6c/0xb0 [ 97.341267] netlink_sendmsg+0xb26/0x1310 [ 97.345431] ? netlink_getsockopt+0xc80/0xc80 [ 97.349931] ___sys_sendmsg+0xec0/0x1310 [ 97.354004] ? __fdget+0x4e/0x60 [ 97.357390] ? __fget_light+0x56/0x710 [ 97.361281] ? __fdget+0x4e/0x60 [ 97.364653] ? __msan_metadata_ptr_for_load_1+0x10/0x20 [ 97.370018] ? __fget_light+0x6b9/0x710 [ 97.374009] SYSC_sendmsg+0x2a3/0x3d0 [ 97.377823] SyS_sendmsg+0x54/0x80 [ 97.381369] do_syscall_64+0x309/0x430 [ 97.385262] ? ___sys_sendmsg+0x1310/0x1310 [ 97.389593] entry_SYSCALL_64_after_hwframe+0x3d/0xa2 [ 97.394782] RIP: 0033:0x455389 [ 97.397973] RSP: 002b:00007fb31ae1bc68 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 97.406296] RAX: ffffffffffffffda RBX: 00007fb31ae1c6d4 RCX: 0000000000455389 [ 97.413572] RDX: 0000000000000080 RSI: 0000000020000200 RDI: 0000000000000013 [ 97.420849] RBP: 000000000072bea0 R08: 0000000000000000 R09: 0000000000000000 [ 97.428126] R10: 0000000000000000 R11: 0000000000000246 R12: 00000000ffffffff [ 97.435398] R13: 00000000000004f8 R14: 00000000006fa7e0 R15: 0000000000000000 [ 97.442657] [ 97.444267] Local variable description: ----address@___sys_sendmsg [ 97.450559] Variable was created at: [ 97.454263] ___sys_sendmsg+0xd3/0x1310 [ 97.458223] SYSC_sendmsg+0x2a3/0x3d0 [ 97.462009] ================================================================== [ 97.469350] Disabling lock debugging due to kernel taint [ 97.474786] Kernel panic - not syncing: panic_on_warn set ... [ 97.474786] [ 97.482138] CPU: 0 PID: 7869 Comm: syz-executor2 Tainted: G B 4.16.0+ #87 [ 97.490274] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 97.499609] Call Trace: [ 97.502186] dump_stack+0x185/0x1d0 [ 97.505800] panic+0x39d/0x940 [ 97.508995] ? netlink_sendmsg+0xb26/0x1310 [ 97.513304] kmsan_report+0x238/0x240 [ 97.517093] __msan_warning_32+0x6c/0xb0 [ 97.521141] netlink_sendmsg+0xb26/0x1310 [ 97.525279] ? netlink_getsockopt+0xc80/0xc80 [ 97.529767] ___sys_sendmsg+0xec0/0x1310 [ 97.533840] ? __fdget+0x4e/0x60 [ 97.537195] ? __fget_light+0x56/0x710 [ 97.541072] ? __fdget+0x4e/0x60 [ 97.544429] ? __msan_metadata_ptr_for_load_1+0x10/0x20 [ 97.549781] ? __fget_light+0x6b9/0x710 [ 97.553746] SYSC_sendmsg+0x2a3/0x3d0 [ 97.557547] SyS_sendmsg+0x54/0x80 [ 97.561072] do_syscall_64+0x309/0x430 [ 97.564947] ? ___sys_sendmsg+0x1310/0x1310 [ 97.569256] entry_SYSCALL_64_after_hwframe+0x3d/0xa2 [ 97.574433] RIP: 0033:0x455389 [ 97.577604] RSP: 002b:00007fb31ae1bc68 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 97.585294] RAX: ffffffffffffffda RBX: 00007fb31ae1c6d4 RCX: 0000000000455389 [ 97.592545] RDX: 0000000000000080 RSI: 0000000020000200 RDI: 0000000000000013 [ 97.599797] RBP: 000000000072bea0 R08: 0000000000000000 R09: 0000000000000000 [ 97.607048] R10: 0000000000000000 R11: 0000000000000246 R12: 00000000ffffffff [ 97.614306] R13: 00000000000004f8 R14: 00000000006fa7e0 R15: 0000000000000000 [ 97.622077] Dumping ftrace buffer: [ 97.625602] (ftrace buffer empty) [ 97.629287] Kernel Offset: disabled [ 97.632893] Rebooting in 86400 seconds..