[....] Starting enhanced syslogd: rsyslogd[?25l[?1c7[ ok 8[?25h[?0c. [....] Starting periodic command scheduler: cron[?25l[?1c7[ ok 8[?25h[?0c. [....] Starting OpenBSD Secure Shell server: sshd[ 14.762545] random: sshd: uninitialized urandom read (32 bytes read) [?25l[?1c7[ ok 8[?25h[?0c. Debian GNU/Linux 7 syzkaller ttyS0 syzkaller login: [ 20.381519] random: sshd: uninitialized urandom read (32 bytes read) [ 20.696185] random: sshd: uninitialized urandom read (32 bytes read) [ 21.624162] random: sshd: uninitialized urandom read (32 bytes read) Warning: Permanently added '10.128.10.21' (ECDSA) to the list of known hosts. [ 27.138036] random: sshd: uninitialized urandom read (32 bytes read) 2018/04/30 20:08:12 fuzzer started 2018/04/30 20:08:12 dialing manager at 10.128.0.26:44829 [ 32.379691] random: crng init done 2018/04/30 20:08:22 kcov=true, comps=false 2018/04/30 20:08:27 executing program 0: perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x72, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000100)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x200000002, 0x4b, 0x0, 0x108000001}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f00000001c0)="3e375f143d09374cd60ad353042300") socket$inet(0x2, 0x0, 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000200)='/proc/self/net/pfkey\x00', 0x0, 0x0) 2018/04/30 20:08:27 executing program 2: r0 = add_key$keyring(&(0x7f0000000080)='keyring\x00', &(0x7f0000000140)={0x73, 0x79, 0x7a}, 0x0, 0x0, 0xffffffffffffffff) keyctl$setperm(0x5, r0, 0x242a0003) keyctl$search(0xa, r0, &(0x7f00000001c0)='keyring\x00', &(0x7f0000000280)={0x73, 0x79, 0x7a}, r0) 2018/04/30 20:08:27 executing program 7: syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010400)="1020f5f20100070009000000030000000c0000000900000001000000010000000000000000280000000000000c00000013000000020000000200000002000000010000000c000000000200000002000000060000000a0000000e000000100000030000000100000002", 0x69, 0x1400}], 0x0, &(0x7f0000000540)={[{@usrjquota={'usrjquota', 0x3d, 'noinline_data'}, 0x2c}]}) 2018/04/30 20:08:27 executing program 3: r0 = syz_open_dev$evdev(&(0x7f00003b9fee)='/dev/input/event#\x00', 0x0, 0x0) ioctl$EVIOCGMTSLOTS(r0, 0x8040450a, &(0x7f0000000000)) 2018/04/30 20:08:27 executing program 4: r0 = syz_open_dev$loop(&(0x7f0000308000)='/dev/loop#\x00', 0x0, 0x8000000000002) ioctl$LOOP_SET_DIRECT_IO(r0, 0x4c08, 0x0) 2018/04/30 20:08:27 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000005c0)={0x0, 0x0}) sendmmsg(r0, &(0x7f0000008600)=[{{0x0, 0x3c9, &(0x7f0000003140)}}, {{&(0x7f0000000000)=@nfc={0x27}, 0x10, &(0x7f0000007380), 0x0, &(0x7f00000073c0), 0x346}}], 0x2, 0x0) 2018/04/30 20:08:27 executing program 6: perf_event_open(&(0x7f000001d000)={0x5, 0x78, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_bp={&(0x7f0000000000), 0x1}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_int(r0, 0x107, 0x9, &(0x7f0000000000), 0x4) 2018/04/30 20:08:27 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r1, &(0x7f0000001640)={0x2, 0x4e20, @multicast2=0xe0000002}, 0x10) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000000)='veth1_to_team\x00', 0x10) bind$inet(r0, &(0x7f0000011ff0)={0x2, 0x4e20, @broadcast=0xffffffff}, 0x10) setsockopt$SO_BINDTODEVICE(r1, 0x1, 0x19, &(0x7f0000001600)='lo\x00', 0x10) listen(r1, 0x0) [ 42.701555] IPVS: Creating netns size=2536 id=1 [ 42.785714] IPVS: Creating netns size=2536 id=2 [ 42.851063] IPVS: Creating netns size=2536 id=3 [ 42.891059] IPVS: Creating netns size=2536 id=4 [ 42.956225] IPVS: Creating netns size=2536 id=5 [ 43.014888] IPVS: Creating netns size=2536 id=6 [ 43.084686] IPVS: Creating netns size=2536 id=7 [ 43.150860] IPVS: Creating netns size=2536 id=8 [ 43.425234] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 43.496816] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 43.539328] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 43.580408] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 43.593203] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 43.632458] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 43.774164] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 43.795456] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 43.819186] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 43.851594] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 43.947206] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 43.968879] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 43.986081] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 44.002921] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 44.022607] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 44.035987] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 44.086541] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 44.098993] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 44.122470] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 44.168904] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 44.192034] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 44.200548] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 44.211375] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 44.224765] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 44.254446] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 44.269679] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 44.281609] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 44.294836] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 44.304087] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 44.314792] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 44.328067] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 44.338901] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 44.350751] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 44.373432] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 44.387233] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 44.405157] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 44.454937] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 44.468287] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 44.476903] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 44.548229] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 44.556045] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 44.564497] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 44.573923] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 44.586852] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 44.598682] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 44.614256] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 44.624162] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 44.636774] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 44.645554] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 44.659451] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 44.669682] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 44.678648] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 44.689484] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 44.699291] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 44.710430] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 44.717943] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 44.745069] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 44.764320] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 44.779298] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 44.790238] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 44.797788] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 44.811817] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 44.819356] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 44.833683] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 44.845452] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 44.855510] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 44.868105] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 44.885041] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 44.896959] ip (4586) used greatest stack depth: 24104 bytes left [ 44.905600] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 44.915969] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 44.944225] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 44.960842] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 44.971656] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 44.979210] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 45.019857] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 45.040792] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 45.048590] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 45.058587] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 45.076912] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 45.087394] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 45.095697] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 45.113541] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 45.122358] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 45.134729] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 45.152540] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 45.162342] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 45.185300] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 45.193338] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 45.205035] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 45.217797] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 45.237982] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 45.249293] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 45.268840] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 45.288832] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 45.309001] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 45.322344] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 48.381481] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 48.558451] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 48.575766] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 48.583310] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 48.593768] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 48.661406] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 48.762991] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 48.788409] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 48.797181] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 48.818827] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 48.829897] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 48.836905] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 48.857645] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 48.867854] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 48.876167] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 48.963210] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 49.023978] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 49.032195] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 49.039643] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 49.046363] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 49.061420] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 49.068155] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 49.075785] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 49.087524] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 49.094200] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 49.106603] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 49.206503] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 49.230495] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 49.237255] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 49.257571] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 49.266042] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 49.276556] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 50.263896] F2FS-fs (loop7): Magic Mismatch, valid(0xf2f52010) - read(0x0) [ 50.285745] F2FS-fs (loop7): Can't find valid F2FS filesystem in 1th superblock [ 50.305160] F2FS-fs (loop7): journaled quota format not specified [ 50.320516] F2FS-fs (loop7): Magic Mismatch, valid(0xf2f52010) - read(0x0) [ 50.342256] F2FS-fs (loop7): Can't find valid F2FS filesystem in 1th superblock [ 50.364886] F2FS-fs (loop7): journaled quota format not specified [ 50.437295] F2FS-fs (loop7): Magic Mismatch, valid(0xf2f52010) - read(0x0) [ 50.452971] F2FS-fs (loop7): Can't find valid F2FS filesystem in 1th superblock [ 50.472650] F2FS-fs (loop7): journaled quota format not specified [ 50.483560] F2FS-fs (loop7): Magic Mismatch, valid(0xf2f52010) - read(0x0) 2018/04/30 20:08:35 executing program 7: syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010400)="1020f5f20100070009000000030000000c0000000900000001000000010000000000000000280000000000000c00000013000000020000000200000002000000010000000c000000000200000002000000060000000a0000000e000000100000030000000100000002", 0x69, 0x1400}], 0x0, &(0x7f0000000540)={[{@usrjquota={'usrjquota', 0x3d, 'noinline_data'}, 0x2c}]}) 2018/04/30 20:08:35 executing program 4: mknod$loop(&(0x7f0000000140)='./file0\x00', 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet6(0xa, 0x400000000001, 0x0) dup(0xffffffffffffffff) perf_event_open(&(0x7f0000000040)={0x1, 0x443, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40000000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x2800000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="8da4363a00000000000000000000000000000000000000000000000000000000ecf6f2a3299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d050000000000000000104000000000000000020000000000000000000000000000000000000000000000800200000000007000000000000006000000000000000100000000000000001000000010000000100000001000006100000004000000000000000000000000000000000000000000000045010000000000000000000000010000000000000000008002000000000000800000000000001000000010000000100000000000000000000000000000000000000000000000000000000000000000c08de47c70514c95b95e109e96a0b90decf6", 0x11d, 0x10000}], 0x0, &(0x7f0000014300)) mkdir(&(0x7f0000000700)='./file0\x00', 0x200000000145) r0 = open(&(0x7f00000002c0)='./file0\x00', 0x0, 0x0) stat(&(0x7f0000000300)='./file0/file0/file0\x00', &(0x7f00000005c0)) symlinkat(&(0x7f0000000240)='./file0/file0/file0\x00', 0xffffffffffffffff, &(0x7f0000000140)='./file0\x00') unlinkat(r0, &(0x7f0000000080)='./file0/file0/file0\x00', 0x0) fsync(r0) mkdir(&(0x7f0000000380)='./file1\x00', 0x3) 2018/04/30 20:08:35 executing program 1: mkdir(&(0x7f0000b08ff8)='./file0\x00', 0x0) r0 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) capset(&(0x7f000043fff8)={0x19980330}, &(0x7f0000000040)) fchdir(r0) 2018/04/30 20:08:35 executing program 0: perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x72, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000100)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x200000002, 0x4b, 0x0, 0x108000001}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f00000001c0)="3e375f143d09374cd60ad353042300") socket$inet(0x2, 0x0, 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000200)='/proc/self/net/pfkey\x00', 0x0, 0x0) 2018/04/30 20:08:35 executing program 3: open(&(0x7f0000000040)='./file0\x00', 0x3ff, 0x0) syz_mount_image$vfat(&(0x7f00000000c0)='vfat\x00', &(0x7f0000000740)='./file0\x00', 0x0, 0x0, &(0x7f0000000640), 0x1800, &(0x7f0000000000)=ANY=[]) r0 = open$dir(&(0x7f0000000200)='./file0\x00', 0x1000002, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x1, &(0x7f0000000180)=[{&(0x7f0000000440), 0x0, 0x6934ab96}], 0x0, &(0x7f00000006c0)) fallocate(r0, 0x11, 0x0, 0x100000001) 2018/04/30 20:08:35 executing program 2: r0 = openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000240)='/selinux/enforce\x00', 0x2002, 0x0) pwritev(r0, &(0x7f0000000000)=[{&(0x7f00000000c0)='2', 0x1}], 0x1, 0x0) 2018/04/30 20:08:35 executing program 6: dup2(0xffffffffffffffff, 0xffffffffffffffff) perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) lsetxattr(&(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)=@known='system.posix_acl_default\x00', &(0x7f0000000200)='ppp1)^@securityppp0\x00', 0x14, 0x0) openat$ion(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ion\x00', 0xe080, 0x0) openat$ion(0xffffffffffffff9c, &(0x7f0000000140)='/dev/ion\x00', 0x0, 0x0) 2018/04/30 20:08:35 executing program 5: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f0000000100)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000010000)="eb3c906d6b66732e66617400020401000200027004f801", 0x17}], 0x0, &(0x7f0000000240)=ANY=[]) flock(r0, 0x6) r1 = open(&(0x7f0000000140)='./file0/file0\x00', 0x6440, 0x0) r2 = open(&(0x7f0000000080)='./file0/file0\x00', 0x2000004001, 0x0) ftruncate(r2, 0x8000) execve(&(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000300)=[&(0x7f00000001c0)='\x00', &(0x7f0000000200)='vfat\x00', &(0x7f0000000240)='\'user&@\x00', &(0x7f00000002c0)='.$mime_typenodev-/\\wlan1#\x00'], &(0x7f0000000600)=[&(0x7f00000003c0)="6f6f6d5f61646a00aceb048ace6a7fe4299541856162c2caee4ddcec07751e2f54b9cbf0357fa60e7f8e7f6304370006f19190212c4a9e569adb10d57a4df1ac9de547a489ee151288214d250681714c92c72529697f2a774835bb6f09301d08f3c72fbbd90fe9775e40875adddc5c6c9f923b2d5899a66add2811c07319d9ddba60e2b798d5dbc662", &(0x7f0000000540)="6f6f6d5f61646a00aceb048ace6a7fe4299541856162c2caee4ddcec07751e2f54b9cbf0357fa60e7f8e7f6304370006f19190212c4a9e569adb10d57a4df1ac9de547a489ee151288214d250681714c92c72529697f2a774835bb6f09301d08f3c72fbbd90fe9775e40875adddc5c6c9f923b2d5899a66add2811c07319d9ddba60e2b798d5dbc662", &(0x7f0000000340)='%trusted\x00']) geteuid() getsockname$packet(0xffffffffffffffff, &(0x7f0000000c80)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @local}, &(0x7f0000000c40)=0xfffffdcd) lseek(r2, 0x0, 0x0) ioctl$BINDER_GET_NODE_DEBUG_INFO(r1, 0xc018620b, &(0x7f0000000640)) sendfile(0xffffffffffffffff, r1, &(0x7f0000000380), 0x0) pwrite64(0xffffffffffffffff, &(0x7f0000000280)='-', 0x1, 0x0) [ 50.558027] hrtimer: interrupt took 43627 ns 2018/04/30 20:08:35 executing program 2: r0 = openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000240)='/selinux/enforce\x00', 0x2002, 0x0) pwritev(r0, &(0x7f0000000000)=[{&(0x7f00000000c0)='2', 0x1}], 0x1, 0x0) [ 50.579452] capability: warning: `syz-executor1' uses 32-bit capabilities (legacy support in use) [ 50.585458] audit: type=1404 audit(1525118915.469:2): enforcing=2 old_enforcing=0 auid=4294967295 ses=4294967295 2018/04/30 20:08:35 executing program 0: perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x72, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000100)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x200000002, 0x4b, 0x0, 0x108000001}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f00000001c0)="3e375f143d09374cd60ad353042300") socket$inet(0x2, 0x0, 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000200)='/proc/self/net/pfkey\x00', 0x0, 0x0) 2018/04/30 20:08:35 executing program 6: dup2(0xffffffffffffffff, 0xffffffffffffffff) perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) lsetxattr(&(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)=@known='system.posix_acl_default\x00', &(0x7f0000000200)='ppp1)^@securityppp0\x00', 0x14, 0x0) openat$ion(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ion\x00', 0xe080, 0x0) openat$ion(0xffffffffffffff9c, &(0x7f0000000140)='/dev/ion\x00', 0x0, 0x0) [ 50.672844] BTRFS: device fsid ecf6f2a3-2997-48ae-b81e-1b00920efd9a devid 1 transid 5 /dev/loop4 [ 50.875110] BTRFS error (device loop4): superblock checksum mismatch [ 50.960710] BTRFS error (device loop4): open_ctree failed [ 51.037505] BTRFS error (device loop4): superblock checksum mismatch 2018/04/30 20:08:36 executing program 2: r0 = openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000240)='/selinux/enforce\x00', 0x2002, 0x0) pwritev(r0, &(0x7f0000000000)=[{&(0x7f00000000c0)='2', 0x1}], 0x1, 0x0) 2018/04/30 20:08:36 executing program 7: syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010400)="1020f5f20100070009000000030000000c0000000900000001000000010000000000000000280000000000000c00000013000000020000000200000002000000010000000c000000000200000002000000060000000a0000000e000000100000030000000100000002", 0x69, 0x1400}], 0x0, &(0x7f0000000540)={[{@usrjquota={'usrjquota', 0x3d, 'noinline_data'}, 0x2c}]}) 2018/04/30 20:08:36 executing program 1: mkdir(&(0x7f0000b08ff8)='./file0\x00', 0x0) r0 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) capset(&(0x7f000043fff8)={0x19980330}, &(0x7f0000000040)) fchdir(r0) 2018/04/30 20:08:36 executing program 3: open(&(0x7f0000000040)='./file0\x00', 0x3ff, 0x0) syz_mount_image$vfat(&(0x7f00000000c0)='vfat\x00', &(0x7f0000000740)='./file0\x00', 0x0, 0x0, &(0x7f0000000640), 0x1800, &(0x7f0000000000)=ANY=[]) r0 = open$dir(&(0x7f0000000200)='./file0\x00', 0x1000002, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x1, &(0x7f0000000180)=[{&(0x7f0000000440), 0x0, 0x6934ab96}], 0x0, &(0x7f00000006c0)) fallocate(r0, 0x11, 0x0, 0x100000001) 2018/04/30 20:08:36 executing program 0: perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x72, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000100)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x200000002, 0x4b, 0x0, 0x108000001}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f00000001c0)="3e375f143d09374cd60ad353042300") socket$inet(0x2, 0x0, 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000200)='/proc/self/net/pfkey\x00', 0x0, 0x0) 2018/04/30 20:08:36 executing program 6: dup2(0xffffffffffffffff, 0xffffffffffffffff) perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) lsetxattr(&(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)=@known='system.posix_acl_default\x00', &(0x7f0000000200)='ppp1)^@securityppp0\x00', 0x14, 0x0) openat$ion(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ion\x00', 0xe080, 0x0) openat$ion(0xffffffffffffff9c, &(0x7f0000000140)='/dev/ion\x00', 0x0, 0x0) 2018/04/30 20:08:36 executing program 5: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f0000000100)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000010000)="eb3c906d6b66732e66617400020401000200027004f801", 0x17}], 0x0, &(0x7f0000000240)=ANY=[]) flock(r0, 0x6) r1 = open(&(0x7f0000000140)='./file0/file0\x00', 0x6440, 0x0) r2 = open(&(0x7f0000000080)='./file0/file0\x00', 0x2000004001, 0x0) ftruncate(r2, 0x8000) execve(&(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000300)=[&(0x7f00000001c0)='\x00', &(0x7f0000000200)='vfat\x00', &(0x7f0000000240)='\'user&@\x00', &(0x7f00000002c0)='.$mime_typenodev-/\\wlan1#\x00'], &(0x7f0000000600)=[&(0x7f00000003c0)="6f6f6d5f61646a00aceb048ace6a7fe4299541856162c2caee4ddcec07751e2f54b9cbf0357fa60e7f8e7f6304370006f19190212c4a9e569adb10d57a4df1ac9de547a489ee151288214d250681714c92c72529697f2a774835bb6f09301d08f3c72fbbd90fe9775e40875adddc5c6c9f923b2d5899a66add2811c07319d9ddba60e2b798d5dbc662", &(0x7f0000000540)="6f6f6d5f61646a00aceb048ace6a7fe4299541856162c2caee4ddcec07751e2f54b9cbf0357fa60e7f8e7f6304370006f19190212c4a9e569adb10d57a4df1ac9de547a489ee151288214d250681714c92c72529697f2a774835bb6f09301d08f3c72fbbd90fe9775e40875adddc5c6c9f923b2d5899a66add2811c07319d9ddba60e2b798d5dbc662", &(0x7f0000000340)='%trusted\x00']) geteuid() getsockname$packet(0xffffffffffffffff, &(0x7f0000000c80)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @local}, &(0x7f0000000c40)=0xfffffdcd) lseek(r2, 0x0, 0x0) ioctl$BINDER_GET_NODE_DEBUG_INFO(r1, 0xc018620b, &(0x7f0000000640)) sendfile(0xffffffffffffffff, r1, &(0x7f0000000380), 0x0) pwrite64(0xffffffffffffffff, &(0x7f0000000280)='-', 0x1, 0x0) 2018/04/30 20:08:36 executing program 4: mknod$loop(&(0x7f0000000140)='./file0\x00', 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet6(0xa, 0x400000000001, 0x0) dup(0xffffffffffffffff) perf_event_open(&(0x7f0000000040)={0x1, 0x443, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40000000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x2800000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x11d, 0x10000}], 0x0, &(0x7f0000014300)) mkdir(&(0x7f0000000700)='./file0\x00', 0x200000000145) r0 = open(&(0x7f00000002c0)='./file0\x00', 0x0, 0x0) stat(&(0x7f0000000300)='./file0/file0/file0\x00', &(0x7f00000005c0)) symlinkat(&(0x7f0000000240)='./file0/file0/file0\x00', 0xffffffffffffffff, &(0x7f0000000140)='./file0\x00') unlinkat(r0, &(0x7f0000000080)='./file0/file0/file0\x00', 0x0) fsync(r0) mkdir(&(0x7f0000000380)='./file1\x00', 0x3) [ 51.100558] BTRFS error (device loop4): open_ctree failed 2018/04/30 20:08:36 executing program 2: r0 = openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000240)='/selinux/enforce\x00', 0x2002, 0x0) pwritev(r0, &(0x7f0000000000)=[{&(0x7f00000000c0)='2', 0x1}], 0x1, 0x0) 2018/04/30 20:08:36 executing program 7: syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010400)="1020f5f20100070009000000030000000c0000000900000001000000010000000000000000280000000000000c00000013000000020000000200000002000000010000000c000000000200000002000000060000000a0000000e000000100000030000000100000002", 0x69, 0x1400}], 0x0, &(0x7f0000000540)={[{@usrjquota={'usrjquota', 0x3d, 'noinline_data'}, 0x2c}]}) 2018/04/30 20:08:36 executing program 1: mkdir(&(0x7f0000b08ff8)='./file0\x00', 0x0) r0 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) capset(&(0x7f000043fff8)={0x19980330}, &(0x7f0000000040)) fchdir(r0) 2018/04/30 20:08:36 executing program 2: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f0000000100)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000010000)="eb3c906d6b66732e66617400020401000200027004f801", 0x17}], 0x0, &(0x7f0000000240)=ANY=[]) flock(r0, 0x6) r1 = open(&(0x7f0000000140)='./file0/file0\x00', 0x6440, 0x0) r2 = open(&(0x7f0000000080)='./file0/file0\x00', 0x2000004001, 0x0) ftruncate(r2, 0x8000) execve(&(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000300)=[&(0x7f00000001c0)='\x00', &(0x7f0000000200)='vfat\x00', &(0x7f0000000240)='\'user&@\x00', &(0x7f00000002c0)='.$mime_typenodev-/\\wlan1#\x00'], &(0x7f0000000600)=[&(0x7f00000003c0)="6f6f6d5f61646a00aceb048ace6a7fe4299541856162c2caee4ddcec07751e2f54b9cbf0357fa60e7f8e7f6304370006f19190212c4a9e569adb10d57a4df1ac9de547a489ee151288214d250681714c92c72529697f2a774835bb6f09301d08f3c72fbbd90fe9775e40875adddc5c6c9f923b2d5899a66add2811c07319d9ddba60e2b798d5dbc662", &(0x7f0000000540)="6f6f6d5f61646a00aceb048ace6a7fe4299541856162c2caee4ddcec07751e2f54b9cbf0357fa60e7f8e7f6304370006f19190212c4a9e569adb10d57a4df1ac9de547a489ee151288214d250681714c92c72529697f2a774835bb6f09301d08f3c72fbbd90fe9775e40875adddc5c6c9f923b2d5899a66add2811c07319d9ddba60e2b798d5dbc662", &(0x7f0000000340)='%trusted\x00']) geteuid() getsockname$packet(0xffffffffffffffff, &(0x7f0000000c80)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @local}, &(0x7f0000000c40)=0xfffffdcd) lseek(r2, 0x0, 0x0) ioctl$BINDER_GET_NODE_DEBUG_INFO(r1, 0xc018620b, &(0x7f0000000640)) sendfile(0xffffffffffffffff, r1, &(0x7f0000000380), 0x0) pwrite64(0xffffffffffffffff, &(0x7f0000000280)='-', 0x1, 0x0) 2018/04/30 20:08:36 executing program 1: mkdir(&(0x7f0000b08ff8)='./file0\x00', 0x0) r0 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) capset(&(0x7f000043fff8)={0x19980330}, &(0x7f0000000040)) fchdir(r0) 2018/04/30 20:08:36 executing program 0: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f0000000100)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000010000)="eb3c906d6b66732e66617400020401000200027004f801", 0x17}], 0x0, &(0x7f0000000240)=ANY=[]) flock(r0, 0x6) r1 = open(&(0x7f0000000140)='./file0/file0\x00', 0x6440, 0x0) r2 = open(&(0x7f0000000080)='./file0/file0\x00', 0x2000004001, 0x0) ftruncate(r2, 0x8000) execve(&(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000300)=[&(0x7f00000001c0)='\x00', &(0x7f0000000200)='vfat\x00', &(0x7f0000000240)='\'user&@\x00', &(0x7f00000002c0)='.$mime_typenodev-/\\wlan1#\x00'], &(0x7f0000000600)=[&(0x7f00000003c0)="6f6f6d5f61646a00aceb048ace6a7fe4299541856162c2caee4ddcec07751e2f54b9cbf0357fa60e7f8e7f6304370006f19190212c4a9e569adb10d57a4df1ac9de547a489ee151288214d250681714c92c72529697f2a774835bb6f09301d08f3c72fbbd90fe9775e40875adddc5c6c9f923b2d5899a66add2811c07319d9ddba60e2b798d5dbc662", &(0x7f0000000540)="6f6f6d5f61646a00aceb048ace6a7fe4299541856162c2caee4ddcec07751e2f54b9cbf0357fa60e7f8e7f6304370006f19190212c4a9e569adb10d57a4df1ac9de547a489ee151288214d250681714c92c72529697f2a774835bb6f09301d08f3c72fbbd90fe9775e40875adddc5c6c9f923b2d5899a66add2811c07319d9ddba60e2b798d5dbc662", &(0x7f0000000340)='%trusted\x00']) geteuid() getsockname$packet(0xffffffffffffffff, &(0x7f0000000c80)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @local}, &(0x7f0000000c40)=0xfffffdcd) lseek(r2, 0x0, 0x0) ioctl$BINDER_GET_NODE_DEBUG_INFO(r1, 0xc018620b, &(0x7f0000000640)) sendfile(0xffffffffffffffff, r1, &(0x7f0000000380), 0x0) pwrite64(0xffffffffffffffff, &(0x7f0000000280)='-', 0x1, 0x0) 2018/04/30 20:08:36 executing program 1: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f0000000100)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000010000)="eb3c906d6b66732e66617400020401000200027004f801", 0x17}], 0x0, &(0x7f0000000240)=ANY=[]) flock(r0, 0x6) r1 = open(&(0x7f0000000140)='./file0/file0\x00', 0x6440, 0x0) r2 = open(&(0x7f0000000080)='./file0/file0\x00', 0x2000004001, 0x0) ftruncate(r2, 0x8000) execve(&(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000300)=[&(0x7f00000001c0)='\x00', &(0x7f0000000200)='vfat\x00', &(0x7f0000000240)='\'user&@\x00', &(0x7f00000002c0)='.$mime_typenodev-/\\wlan1#\x00'], &(0x7f0000000600)=[&(0x7f00000003c0)="6f6f6d5f61646a00aceb048ace6a7fe4299541856162c2caee4ddcec07751e2f54b9cbf0357fa60e7f8e7f6304370006f19190212c4a9e569adb10d57a4df1ac9de547a489ee151288214d250681714c92c72529697f2a774835bb6f09301d08f3c72fbbd90fe9775e40875adddc5c6c9f923b2d5899a66add2811c07319d9ddba60e2b798d5dbc662", &(0x7f0000000540)="6f6f6d5f61646a00aceb048ace6a7fe4299541856162c2caee4ddcec07751e2f54b9cbf0357fa60e7f8e7f6304370006f19190212c4a9e569adb10d57a4df1ac9de547a489ee151288214d250681714c92c72529697f2a774835bb6f09301d08f3c72fbbd90fe9775e40875adddc5c6c9f923b2d5899a66add2811c07319d9ddba60e2b798d5dbc662", &(0x7f0000000340)='%trusted\x00']) geteuid() getsockname$packet(0xffffffffffffffff, &(0x7f0000000c80)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @local}, &(0x7f0000000c40)=0xfffffdcd) lseek(r2, 0x0, 0x0) ioctl$BINDER_GET_NODE_DEBUG_INFO(r1, 0xc018620b, &(0x7f0000000640)) sendfile(0xffffffffffffffff, r1, &(0x7f0000000380), 0x0) pwrite64(0xffffffffffffffff, &(0x7f0000000280)='-', 0x1, 0x0) 2018/04/30 20:08:36 executing program 6: dup2(0xffffffffffffffff, 0xffffffffffffffff) perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) lsetxattr(&(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)=@known='system.posix_acl_default\x00', &(0x7f0000000200)='ppp1)^@securityppp0\x00', 0x14, 0x0) openat$ion(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ion\x00', 0xe080, 0x0) openat$ion(0xffffffffffffff9c, &(0x7f0000000140)='/dev/ion\x00', 0x0, 0x0) 2018/04/30 20:08:36 executing program 7: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f0000000100)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000010000)="eb3c906d6b66732e66617400020401000200027004f801", 0x17}], 0x0, &(0x7f0000000240)=ANY=[]) flock(r0, 0x6) r1 = open(&(0x7f0000000140)='./file0/file0\x00', 0x6440, 0x0) r2 = open(&(0x7f0000000080)='./file0/file0\x00', 0x2000004001, 0x0) ftruncate(r2, 0x8000) execve(&(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000300)=[&(0x7f00000001c0)='\x00', &(0x7f0000000200)='vfat\x00', &(0x7f0000000240)='\'user&@\x00', &(0x7f00000002c0)='.$mime_typenodev-/\\wlan1#\x00'], &(0x7f0000000600)=[&(0x7f00000003c0)="6f6f6d5f61646a00aceb048ace6a7fe4299541856162c2caee4ddcec07751e2f54b9cbf0357fa60e7f8e7f6304370006f19190212c4a9e569adb10d57a4df1ac9de547a489ee151288214d250681714c92c72529697f2a774835bb6f09301d08f3c72fbbd90fe9775e40875adddc5c6c9f923b2d5899a66add2811c07319d9ddba60e2b798d5dbc662", &(0x7f0000000540)="6f6f6d5f61646a00aceb048ace6a7fe4299541856162c2caee4ddcec07751e2f54b9cbf0357fa60e7f8e7f6304370006f19190212c4a9e569adb10d57a4df1ac9de547a489ee151288214d250681714c92c72529697f2a774835bb6f09301d08f3c72fbbd90fe9775e40875adddc5c6c9f923b2d5899a66add2811c07319d9ddba60e2b798d5dbc662", &(0x7f0000000340)='%trusted\x00']) geteuid() getsockname$packet(0xffffffffffffffff, &(0x7f0000000c80)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @local}, &(0x7f0000000c40)=0xfffffdcd) lseek(r2, 0x0, 0x0) ioctl$BINDER_GET_NODE_DEBUG_INFO(r1, 0xc018620b, &(0x7f0000000640)) sendfile(0xffffffffffffffff, r1, &(0x7f0000000380), 0x0) pwrite64(0xffffffffffffffff, &(0x7f0000000280)='-', 0x1, 0x0) [ 51.480186] BTRFS error (device loop4): superblock checksum mismatch 2018/04/30 20:08:36 executing program 3: open(&(0x7f0000000040)='./file0\x00', 0x3ff, 0x0) syz_mount_image$vfat(&(0x7f00000000c0)='vfat\x00', &(0x7f0000000740)='./file0\x00', 0x0, 0x0, &(0x7f0000000640), 0x1800, &(0x7f0000000000)=ANY=[]) r0 = open$dir(&(0x7f0000000200)='./file0\x00', 0x1000002, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x1, &(0x7f0000000180)=[{&(0x7f0000000440), 0x0, 0x6934ab96}], 0x0, &(0x7f00000006c0)) fallocate(r0, 0x11, 0x0, 0x100000001) [ 51.659802] BTRFS error (device loop4): open_ctree failed 2018/04/30 20:08:36 executing program 6: open(&(0x7f0000000040)='./file0\x00', 0x3ff, 0x0) syz_mount_image$vfat(&(0x7f00000000c0)='vfat\x00', &(0x7f0000000740)='./file0\x00', 0x0, 0x0, &(0x7f0000000640), 0x1800, &(0x7f0000000000)=ANY=[]) r0 = open$dir(&(0x7f0000000200)='./file0\x00', 0x1000002, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x1, &(0x7f0000000180)=[{&(0x7f0000000440), 0x0, 0x6934ab96}], 0x0, &(0x7f00000006c0)) fallocate(r0, 0x11, 0x0, 0x100000001) 2018/04/30 20:08:36 executing program 3: open(&(0x7f0000000040)='./file0\x00', 0x3ff, 0x0) syz_mount_image$vfat(&(0x7f00000000c0)='vfat\x00', &(0x7f0000000740)='./file0\x00', 0x0, 0x0, &(0x7f0000000640), 0x1800, &(0x7f0000000000)=ANY=[]) r0 = open$dir(&(0x7f0000000200)='./file0\x00', 0x1000002, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x1, &(0x7f0000000180)=[{&(0x7f0000000440), 0x0, 0x6934ab96}], 0x0, &(0x7f00000006c0)) fallocate(r0, 0x11, 0x0, 0x100000001) 2018/04/30 20:08:36 executing program 5: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f0000000100)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000010000)="eb3c906d6b66732e66617400020401000200027004f801", 0x17}], 0x0, &(0x7f0000000240)=ANY=[]) flock(r0, 0x6) r1 = open(&(0x7f0000000140)='./file0/file0\x00', 0x6440, 0x0) r2 = open(&(0x7f0000000080)='./file0/file0\x00', 0x2000004001, 0x0) ftruncate(r2, 0x8000) execve(&(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000300)=[&(0x7f00000001c0)='\x00', &(0x7f0000000200)='vfat\x00', &(0x7f0000000240)='\'user&@\x00', &(0x7f00000002c0)='.$mime_typenodev-/\\wlan1#\x00'], &(0x7f0000000600)=[&(0x7f00000003c0)="6f6f6d5f61646a00aceb048ace6a7fe4299541856162c2caee4ddcec07751e2f54b9cbf0357fa60e7f8e7f6304370006f19190212c4a9e569adb10d57a4df1ac9de547a489ee151288214d250681714c92c72529697f2a774835bb6f09301d08f3c72fbbd90fe9775e40875adddc5c6c9f923b2d5899a66add2811c07319d9ddba60e2b798d5dbc662", &(0x7f0000000540)="6f6f6d5f61646a00aceb048ace6a7fe4299541856162c2caee4ddcec07751e2f54b9cbf0357fa60e7f8e7f6304370006f19190212c4a9e569adb10d57a4df1ac9de547a489ee151288214d250681714c92c72529697f2a774835bb6f09301d08f3c72fbbd90fe9775e40875adddc5c6c9f923b2d5899a66add2811c07319d9ddba60e2b798d5dbc662", &(0x7f0000000340)='%trusted\x00']) geteuid() getsockname$packet(0xffffffffffffffff, &(0x7f0000000c80)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @local}, &(0x7f0000000c40)=0xfffffdcd) lseek(r2, 0x0, 0x0) ioctl$BINDER_GET_NODE_DEBUG_INFO(r1, 0xc018620b, &(0x7f0000000640)) sendfile(0xffffffffffffffff, r1, &(0x7f0000000380), 0x0) pwrite64(0xffffffffffffffff, &(0x7f0000000280)='-', 0x1, 0x0) 2018/04/30 20:08:37 executing program 0: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f0000000100)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000010000)="eb3c906d6b66732e66617400020401000200027004f801", 0x17}], 0x0, &(0x7f0000000240)=ANY=[]) flock(r0, 0x6) r1 = open(&(0x7f0000000140)='./file0/file0\x00', 0x6440, 0x0) r2 = open(&(0x7f0000000080)='./file0/file0\x00', 0x2000004001, 0x0) ftruncate(r2, 0x8000) execve(&(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000300)=[&(0x7f00000001c0)='\x00', &(0x7f0000000200)='vfat\x00', &(0x7f0000000240)='\'user&@\x00', &(0x7f00000002c0)='.$mime_typenodev-/\\wlan1#\x00'], &(0x7f0000000600)=[&(0x7f00000003c0)="6f6f6d5f61646a00aceb048ace6a7fe4299541856162c2caee4ddcec07751e2f54b9cbf0357fa60e7f8e7f6304370006f19190212c4a9e569adb10d57a4df1ac9de547a489ee151288214d250681714c92c72529697f2a774835bb6f09301d08f3c72fbbd90fe9775e40875adddc5c6c9f923b2d5899a66add2811c07319d9ddba60e2b798d5dbc662", &(0x7f0000000540)="6f6f6d5f61646a00aceb048ace6a7fe4299541856162c2caee4ddcec07751e2f54b9cbf0357fa60e7f8e7f6304370006f19190212c4a9e569adb10d57a4df1ac9de547a489ee151288214d250681714c92c72529697f2a774835bb6f09301d08f3c72fbbd90fe9775e40875adddc5c6c9f923b2d5899a66add2811c07319d9ddba60e2b798d5dbc662", &(0x7f0000000340)='%trusted\x00']) geteuid() getsockname$packet(0xffffffffffffffff, &(0x7f0000000c80)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @local}, &(0x7f0000000c40)=0xfffffdcd) lseek(r2, 0x0, 0x0) ioctl$BINDER_GET_NODE_DEBUG_INFO(r1, 0xc018620b, &(0x7f0000000640)) sendfile(0xffffffffffffffff, r1, &(0x7f0000000380), 0x0) pwrite64(0xffffffffffffffff, &(0x7f0000000280)='-', 0x1, 0x0) 2018/04/30 20:08:37 executing program 2: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f0000000100)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000010000)="eb3c906d6b66732e66617400020401000200027004f801", 0x17}], 0x0, &(0x7f0000000240)=ANY=[]) flock(r0, 0x6) r1 = open(&(0x7f0000000140)='./file0/file0\x00', 0x6440, 0x0) r2 = open(&(0x7f0000000080)='./file0/file0\x00', 0x2000004001, 0x0) ftruncate(r2, 0x8000) execve(&(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000300)=[&(0x7f00000001c0)='\x00', &(0x7f0000000200)='vfat\x00', &(0x7f0000000240)='\'user&@\x00', &(0x7f00000002c0)='.$mime_typenodev-/\\wlan1#\x00'], &(0x7f0000000600)=[&(0x7f00000003c0)="6f6f6d5f61646a00aceb048ace6a7fe4299541856162c2caee4ddcec07751e2f54b9cbf0357fa60e7f8e7f6304370006f19190212c4a9e569adb10d57a4df1ac9de547a489ee151288214d250681714c92c72529697f2a774835bb6f09301d08f3c72fbbd90fe9775e40875adddc5c6c9f923b2d5899a66add2811c07319d9ddba60e2b798d5dbc662", &(0x7f0000000540)="6f6f6d5f61646a00aceb048ace6a7fe4299541856162c2caee4ddcec07751e2f54b9cbf0357fa60e7f8e7f6304370006f19190212c4a9e569adb10d57a4df1ac9de547a489ee151288214d250681714c92c72529697f2a774835bb6f09301d08f3c72fbbd90fe9775e40875adddc5c6c9f923b2d5899a66add2811c07319d9ddba60e2b798d5dbc662", &(0x7f0000000340)='%trusted\x00']) geteuid() getsockname$packet(0xffffffffffffffff, &(0x7f0000000c80)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @local}, &(0x7f0000000c40)=0xfffffdcd) lseek(r2, 0x0, 0x0) ioctl$BINDER_GET_NODE_DEBUG_INFO(r1, 0xc018620b, &(0x7f0000000640)) sendfile(0xffffffffffffffff, r1, &(0x7f0000000380), 0x0) pwrite64(0xffffffffffffffff, &(0x7f0000000280)='-', 0x1, 0x0) 2018/04/30 20:08:37 executing program 1: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f0000000100)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000010000)="eb3c906d6b66732e66617400020401000200027004f801", 0x17}], 0x0, &(0x7f0000000240)=ANY=[]) flock(r0, 0x6) r1 = open(&(0x7f0000000140)='./file0/file0\x00', 0x6440, 0x0) r2 = open(&(0x7f0000000080)='./file0/file0\x00', 0x2000004001, 0x0) ftruncate(r2, 0x8000) execve(&(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000300)=[&(0x7f00000001c0)='\x00', &(0x7f0000000200)='vfat\x00', &(0x7f0000000240)='\'user&@\x00', &(0x7f00000002c0)='.$mime_typenodev-/\\wlan1#\x00'], &(0x7f0000000600)=[&(0x7f00000003c0)="6f6f6d5f61646a00aceb048ace6a7fe4299541856162c2caee4ddcec07751e2f54b9cbf0357fa60e7f8e7f6304370006f19190212c4a9e569adb10d57a4df1ac9de547a489ee151288214d250681714c92c72529697f2a774835bb6f09301d08f3c72fbbd90fe9775e40875adddc5c6c9f923b2d5899a66add2811c07319d9ddba60e2b798d5dbc662", &(0x7f0000000540)="6f6f6d5f61646a00aceb048ace6a7fe4299541856162c2caee4ddcec07751e2f54b9cbf0357fa60e7f8e7f6304370006f19190212c4a9e569adb10d57a4df1ac9de547a489ee151288214d250681714c92c72529697f2a774835bb6f09301d08f3c72fbbd90fe9775e40875adddc5c6c9f923b2d5899a66add2811c07319d9ddba60e2b798d5dbc662", &(0x7f0000000340)='%trusted\x00']) geteuid() getsockname$packet(0xffffffffffffffff, &(0x7f0000000c80)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @local}, &(0x7f0000000c40)=0xfffffdcd) lseek(r2, 0x0, 0x0) ioctl$BINDER_GET_NODE_DEBUG_INFO(r1, 0xc018620b, &(0x7f0000000640)) sendfile(0xffffffffffffffff, r1, &(0x7f0000000380), 0x0) pwrite64(0xffffffffffffffff, &(0x7f0000000280)='-', 0x1, 0x0) 2018/04/30 20:08:37 executing program 4: mknod$loop(&(0x7f0000000140)='./file0\x00', 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet6(0xa, 0x400000000001, 0x0) dup(0xffffffffffffffff) perf_event_open(&(0x7f0000000040)={0x1, 0x443, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40000000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x2800000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="8da4363a00000000000000000000000000000000000000000000000000000000ecf6f2a3299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d050000000000000000104000000000000000020000000000000000000000000000000000000000000000800200000000007000000000000006000000000000000100000000000000001000000010000000100000001000006100000004000000000000000000000000000000000000000000000045010000000000000000000000010000000000000000008002000000000000800000000000001000000010000000100000000000000000000000000000000000000000000000000000000000000000c08de47c70514c95b95e109e96a0b90decf6", 0x11d, 0x10000}], 0x0, &(0x7f0000014300)) mkdir(&(0x7f0000000700)='./file0\x00', 0x200000000145) r0 = open(&(0x7f00000002c0)='./file0\x00', 0x0, 0x0) stat(&(0x7f0000000300)='./file0/file0/file0\x00', &(0x7f00000005c0)) symlinkat(&(0x7f0000000240)='./file0/file0/file0\x00', 0xffffffffffffffff, &(0x7f0000000140)='./file0\x00') unlinkat(r0, &(0x7f0000000080)='./file0/file0/file0\x00', 0x0) fsync(r0) mkdir(&(0x7f0000000380)='./file1\x00', 0x3) 2018/04/30 20:08:37 executing program 7: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f0000000100)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000010000)="eb3c906d6b66732e66617400020401000200027004f801", 0x17}], 0x0, &(0x7f0000000240)=ANY=[]) flock(r0, 0x6) r1 = open(&(0x7f0000000140)='./file0/file0\x00', 0x6440, 0x0) r2 = open(&(0x7f0000000080)='./file0/file0\x00', 0x2000004001, 0x0) ftruncate(r2, 0x8000) execve(&(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000300)=[&(0x7f00000001c0)='\x00', &(0x7f0000000200)='vfat\x00', &(0x7f0000000240)='\'user&@\x00', &(0x7f00000002c0)='.$mime_typenodev-/\\wlan1#\x00'], &(0x7f0000000600)=[&(0x7f00000003c0)="6f6f6d5f61646a00aceb048ace6a7fe4299541856162c2caee4ddcec07751e2f54b9cbf0357fa60e7f8e7f6304370006f19190212c4a9e569adb10d57a4df1ac9de547a489ee151288214d250681714c92c72529697f2a774835bb6f09301d08f3c72fbbd90fe9775e40875adddc5c6c9f923b2d5899a66add2811c07319d9ddba60e2b798d5dbc662", &(0x7f0000000540)="6f6f6d5f61646a00aceb048ace6a7fe4299541856162c2caee4ddcec07751e2f54b9cbf0357fa60e7f8e7f6304370006f19190212c4a9e569adb10d57a4df1ac9de547a489ee151288214d250681714c92c72529697f2a774835bb6f09301d08f3c72fbbd90fe9775e40875adddc5c6c9f923b2d5899a66add2811c07319d9ddba60e2b798d5dbc662", &(0x7f0000000340)='%trusted\x00']) geteuid() getsockname$packet(0xffffffffffffffff, &(0x7f0000000c80)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @local}, &(0x7f0000000c40)=0xfffffdcd) lseek(r2, 0x0, 0x0) ioctl$BINDER_GET_NODE_DEBUG_INFO(r1, 0xc018620b, &(0x7f0000000640)) sendfile(0xffffffffffffffff, r1, &(0x7f0000000380), 0x0) pwrite64(0xffffffffffffffff, &(0x7f0000000280)='-', 0x1, 0x0) 2018/04/30 20:08:37 executing program 3: r0 = socket(0x10, 0x400000802, 0x0) write(r0, &(0x7f00000eefe1)="1b0000004a00070100021b1a0017ffe320e60000fe441951000000", 0x1b) 2018/04/30 20:08:37 executing program 5: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f0000000100)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000010000)="eb3c906d6b66732e66617400020401000200027004f801", 0x17}], 0x0, &(0x7f0000000240)=ANY=[]) flock(r0, 0x6) r1 = open(&(0x7f0000000140)='./file0/file0\x00', 0x6440, 0x0) r2 = open(&(0x7f0000000080)='./file0/file0\x00', 0x2000004001, 0x0) ftruncate(r2, 0x8000) execve(&(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000300)=[&(0x7f00000001c0)='\x00', &(0x7f0000000200)='vfat\x00', &(0x7f0000000240)='\'user&@\x00', &(0x7f00000002c0)='.$mime_typenodev-/\\wlan1#\x00'], &(0x7f0000000600)=[&(0x7f00000003c0)="6f6f6d5f61646a00aceb048ace6a7fe4299541856162c2caee4ddcec07751e2f54b9cbf0357fa60e7f8e7f6304370006f19190212c4a9e569adb10d57a4df1ac9de547a489ee151288214d250681714c92c72529697f2a774835bb6f09301d08f3c72fbbd90fe9775e40875adddc5c6c9f923b2d5899a66add2811c07319d9ddba60e2b798d5dbc662", &(0x7f0000000540)="6f6f6d5f61646a00aceb048ace6a7fe4299541856162c2caee4ddcec07751e2f54b9cbf0357fa60e7f8e7f6304370006f19190212c4a9e569adb10d57a4df1ac9de547a489ee151288214d250681714c92c72529697f2a774835bb6f09301d08f3c72fbbd90fe9775e40875adddc5c6c9f923b2d5899a66add2811c07319d9ddba60e2b798d5dbc662", &(0x7f0000000340)='%trusted\x00']) geteuid() getsockname$packet(0xffffffffffffffff, &(0x7f0000000c80)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @local}, &(0x7f0000000c40)=0xfffffdcd) lseek(r2, 0x0, 0x0) ioctl$BINDER_GET_NODE_DEBUG_INFO(r1, 0xc018620b, &(0x7f0000000640)) sendfile(0xffffffffffffffff, r1, &(0x7f0000000380), 0x0) pwrite64(0xffffffffffffffff, &(0x7f0000000280)='-', 0x1, 0x0) 2018/04/30 20:08:37 executing program 6: open(&(0x7f0000000040)='./file0\x00', 0x3ff, 0x0) syz_mount_image$vfat(&(0x7f00000000c0)='vfat\x00', &(0x7f0000000740)='./file0\x00', 0x0, 0x0, &(0x7f0000000640), 0x1800, &(0x7f0000000000)=ANY=[]) r0 = open$dir(&(0x7f0000000200)='./file0\x00', 0x1000002, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x1, &(0x7f0000000180)=[{&(0x7f0000000440), 0x0, 0x6934ab96}], 0x0, &(0x7f00000006c0)) fallocate(r0, 0x11, 0x0, 0x100000001) 2018/04/30 20:08:37 executing program 3: syz_read_part_table(0x0, 0x2, &(0x7f00000013c0)=[{&(0x7f0000000240)="87217fe7d43d2c8277b3f304de83a959d69c75c9da0632b4cc16361687a26ef3d452b7428d487fd2addce4e4e3738b83ee400e9485d8954a1e710e12bf0aa8d7c546ee5bf854ae8e7bea084df3d95adca04a366d327015584d3793e0ac6f3c120ea9ff1788574cd3fd31f58876ef63b6ba3fc8a78dafc9685fafb4bdf16c04003c85ef3f538876c4c7c7899b878e8f158a7cd516117cae0e06a3282e75d5a72f4509a013a63539cc2cfb44de10693d3213d2c12e80daeab80c8dffa961e5f3d92cca165a9c33f486a4edbdc663824afc374318650214535b186c2d3dc7a364835e6d2eb559b6ea9220ec00b19df489e69b50a4e1989b4ec722e4fcac37565ae5db134a69088ff2864f144c8c4ed020fba2b2e53d61408a237c26e0f6d6832fe0adc6e5d6a0a1ffa794bb5edaf382dbe219bfb48b8c03966f755190a7999d61b65ef5363d5792b9990b4f8495b390025c9593a44959ecdf1dad18c85ae9a7618eeaf29c96c45e471682a677930cdeba666443818994f77ae86fae3e95723678e5e5371501467b4ff9be2677d8788f0df7b4cc84a1a9dea190ad717f82f2f15d70836ec79d4ed8feb0cccaa5912b3fe98a5f13cc54b8f22fd8b8deb46d8196b1483099483abc5493f253bcbe64c432dbe54970c0d8817ebd69deee3e788354613da1cae02f0205eee0ce16eb5326d570e352313bde0df143a9cd10b497", 0x1fc, 0x4}, {&(0x7f0000001300)='8', 0x1}]) [ 52.410647] Dev loop3: unable to read RDB block 1 [ 52.415641] loop3: unable to read partition table [ 52.430957] loop3: partition table beyond EOD, truncated [ 52.437025] loop_reread_partitions: partition scan of loop3 () failed (rc=-5) 2018/04/30 20:08:37 executing program 6: open(&(0x7f0000000040)='./file0\x00', 0x3ff, 0x0) syz_mount_image$vfat(&(0x7f00000000c0)='vfat\x00', &(0x7f0000000740)='./file0\x00', 0x0, 0x0, &(0x7f0000000640), 0x1800, &(0x7f0000000000)=ANY=[]) r0 = open$dir(&(0x7f0000000200)='./file0\x00', 0x1000002, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x1, &(0x7f0000000180)=[{&(0x7f0000000440), 0x0, 0x6934ab96}], 0x0, &(0x7f00000006c0)) fallocate(r0, 0x11, 0x0, 0x100000001) [ 52.519247] BTRFS error (device loop4): superblock checksum mismatch [ 52.528609] Dev loop3: unable to read RDB block 1 [ 52.528623] loop3: unable to read partition table [ 52.528682] loop3: partition table beyond EOD, truncated [ 52.528689] loop_reread_partitions: partition scan of loop3 () failed (rc=-5) [ 52.830560] BTRFS error (device loop4): open_ctree failed 2018/04/30 20:08:37 executing program 3: syz_read_part_table(0x0, 0x2, &(0x7f00000013c0)=[{&(0x7f0000000240)="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", 0x1fc, 0x4}, {&(0x7f0000001300)='8', 0x1}]) 2018/04/30 20:08:37 executing program 7: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f0000000100)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000010000)="eb3c906d6b66732e66617400020401000200027004f801", 0x17}], 0x0, &(0x7f0000000240)=ANY=[]) flock(r0, 0x6) r1 = open(&(0x7f0000000140)='./file0/file0\x00', 0x6440, 0x0) r2 = open(&(0x7f0000000080)='./file0/file0\x00', 0x2000004001, 0x0) ftruncate(r2, 0x8000) execve(&(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000300)=[&(0x7f00000001c0)='\x00', &(0x7f0000000200)='vfat\x00', &(0x7f0000000240)='\'user&@\x00', &(0x7f00000002c0)='.$mime_typenodev-/\\wlan1#\x00'], &(0x7f0000000600)=[&(0x7f00000003c0)="6f6f6d5f61646a00aceb048ace6a7fe4299541856162c2caee4ddcec07751e2f54b9cbf0357fa60e7f8e7f6304370006f19190212c4a9e569adb10d57a4df1ac9de547a489ee151288214d250681714c92c72529697f2a774835bb6f09301d08f3c72fbbd90fe9775e40875adddc5c6c9f923b2d5899a66add2811c07319d9ddba60e2b798d5dbc662", &(0x7f0000000540)="6f6f6d5f61646a00aceb048ace6a7fe4299541856162c2caee4ddcec07751e2f54b9cbf0357fa60e7f8e7f6304370006f19190212c4a9e569adb10d57a4df1ac9de547a489ee151288214d250681714c92c72529697f2a774835bb6f09301d08f3c72fbbd90fe9775e40875adddc5c6c9f923b2d5899a66add2811c07319d9ddba60e2b798d5dbc662", &(0x7f0000000340)='%trusted\x00']) geteuid() getsockname$packet(0xffffffffffffffff, &(0x7f0000000c80)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @local}, &(0x7f0000000c40)=0xfffffdcd) lseek(r2, 0x0, 0x0) ioctl$BINDER_GET_NODE_DEBUG_INFO(r1, 0xc018620b, &(0x7f0000000640)) sendfile(0xffffffffffffffff, r1, &(0x7f0000000380), 0x0) pwrite64(0xffffffffffffffff, &(0x7f0000000280)='-', 0x1, 0x0) 2018/04/30 20:08:37 executing program 1: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f0000000100)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000010000)="eb3c906d6b66732e66617400020401000200027004f801", 0x17}], 0x0, &(0x7f0000000240)=ANY=[]) flock(r0, 0x6) r1 = open(&(0x7f0000000140)='./file0/file0\x00', 0x6440, 0x0) r2 = open(&(0x7f0000000080)='./file0/file0\x00', 0x2000004001, 0x0) ftruncate(r2, 0x8000) execve(&(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000300)=[&(0x7f00000001c0)='\x00', &(0x7f0000000200)='vfat\x00', &(0x7f0000000240)='\'user&@\x00', &(0x7f00000002c0)='.$mime_typenodev-/\\wlan1#\x00'], &(0x7f0000000600)=[&(0x7f00000003c0)="6f6f6d5f61646a00aceb048ace6a7fe4299541856162c2caee4ddcec07751e2f54b9cbf0357fa60e7f8e7f6304370006f19190212c4a9e569adb10d57a4df1ac9de547a489ee151288214d250681714c92c72529697f2a774835bb6f09301d08f3c72fbbd90fe9775e40875adddc5c6c9f923b2d5899a66add2811c07319d9ddba60e2b798d5dbc662", &(0x7f0000000540)="6f6f6d5f61646a00aceb048ace6a7fe4299541856162c2caee4ddcec07751e2f54b9cbf0357fa60e7f8e7f6304370006f19190212c4a9e569adb10d57a4df1ac9de547a489ee151288214d250681714c92c72529697f2a774835bb6f09301d08f3c72fbbd90fe9775e40875adddc5c6c9f923b2d5899a66add2811c07319d9ddba60e2b798d5dbc662", &(0x7f0000000340)='%trusted\x00']) geteuid() getsockname$packet(0xffffffffffffffff, &(0x7f0000000c80)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @local}, &(0x7f0000000c40)=0xfffffdcd) lseek(r2, 0x0, 0x0) ioctl$BINDER_GET_NODE_DEBUG_INFO(r1, 0xc018620b, &(0x7f0000000640)) sendfile(0xffffffffffffffff, r1, &(0x7f0000000380), 0x0) pwrite64(0xffffffffffffffff, &(0x7f0000000280)='-', 0x1, 0x0) 2018/04/30 20:08:37 executing program 6: r0 = inotify_init1(0x0) ioctl$sock_netrom_TIOCINQ(r0, 0x541b, &(0x7f0000481ffc)) 2018/04/30 20:08:37 executing program 0: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f0000000100)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000010000)="eb3c906d6b66732e66617400020401000200027004f801", 0x17}], 0x0, &(0x7f0000000240)=ANY=[]) flock(r0, 0x6) r1 = open(&(0x7f0000000140)='./file0/file0\x00', 0x6440, 0x0) r2 = open(&(0x7f0000000080)='./file0/file0\x00', 0x2000004001, 0x0) ftruncate(r2, 0x8000) execve(&(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000300)=[&(0x7f00000001c0)='\x00', &(0x7f0000000200)='vfat\x00', &(0x7f0000000240)='\'user&@\x00', &(0x7f00000002c0)='.$mime_typenodev-/\\wlan1#\x00'], &(0x7f0000000600)=[&(0x7f00000003c0)="6f6f6d5f61646a00aceb048ace6a7fe4299541856162c2caee4ddcec07751e2f54b9cbf0357fa60e7f8e7f6304370006f19190212c4a9e569adb10d57a4df1ac9de547a489ee151288214d250681714c92c72529697f2a774835bb6f09301d08f3c72fbbd90fe9775e40875adddc5c6c9f923b2d5899a66add2811c07319d9ddba60e2b798d5dbc662", &(0x7f0000000540)="6f6f6d5f61646a00aceb048ace6a7fe4299541856162c2caee4ddcec07751e2f54b9cbf0357fa60e7f8e7f6304370006f19190212c4a9e569adb10d57a4df1ac9de547a489ee151288214d250681714c92c72529697f2a774835bb6f09301d08f3c72fbbd90fe9775e40875adddc5c6c9f923b2d5899a66add2811c07319d9ddba60e2b798d5dbc662", &(0x7f0000000340)='%trusted\x00']) geteuid() getsockname$packet(0xffffffffffffffff, &(0x7f0000000c80)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @local}, &(0x7f0000000c40)=0xfffffdcd) lseek(r2, 0x0, 0x0) ioctl$BINDER_GET_NODE_DEBUG_INFO(r1, 0xc018620b, &(0x7f0000000640)) sendfile(0xffffffffffffffff, r1, &(0x7f0000000380), 0x0) pwrite64(0xffffffffffffffff, &(0x7f0000000280)='-', 0x1, 0x0) 2018/04/30 20:08:37 executing program 2: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f0000000100)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000010000)="eb3c906d6b66732e66617400020401000200027004f801", 0x17}], 0x0, &(0x7f0000000240)=ANY=[]) flock(r0, 0x6) r1 = open(&(0x7f0000000140)='./file0/file0\x00', 0x6440, 0x0) r2 = open(&(0x7f0000000080)='./file0/file0\x00', 0x2000004001, 0x0) ftruncate(r2, 0x8000) execve(&(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000300)=[&(0x7f00000001c0)='\x00', &(0x7f0000000200)='vfat\x00', &(0x7f0000000240)='\'user&@\x00', &(0x7f00000002c0)='.$mime_typenodev-/\\wlan1#\x00'], &(0x7f0000000600)=[&(0x7f00000003c0)="6f6f6d5f61646a00aceb048ace6a7fe4299541856162c2caee4ddcec07751e2f54b9cbf0357fa60e7f8e7f6304370006f19190212c4a9e569adb10d57a4df1ac9de547a489ee151288214d250681714c92c72529697f2a774835bb6f09301d08f3c72fbbd90fe9775e40875adddc5c6c9f923b2d5899a66add2811c07319d9ddba60e2b798d5dbc662", &(0x7f0000000540)="6f6f6d5f61646a00aceb048ace6a7fe4299541856162c2caee4ddcec07751e2f54b9cbf0357fa60e7f8e7f6304370006f19190212c4a9e569adb10d57a4df1ac9de547a489ee151288214d250681714c92c72529697f2a774835bb6f09301d08f3c72fbbd90fe9775e40875adddc5c6c9f923b2d5899a66add2811c07319d9ddba60e2b798d5dbc662", &(0x7f0000000340)='%trusted\x00']) geteuid() getsockname$packet(0xffffffffffffffff, &(0x7f0000000c80)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @local}, &(0x7f0000000c40)=0xfffffdcd) lseek(r2, 0x0, 0x0) ioctl$BINDER_GET_NODE_DEBUG_INFO(r1, 0xc018620b, &(0x7f0000000640)) sendfile(0xffffffffffffffff, r1, &(0x7f0000000380), 0x0) pwrite64(0xffffffffffffffff, &(0x7f0000000280)='-', 0x1, 0x0) 2018/04/30 20:08:37 executing program 4: mknod$loop(&(0x7f0000000140)='./file0\x00', 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet6(0xa, 0x400000000001, 0x0) dup(0xffffffffffffffff) perf_event_open(&(0x7f0000000040)={0x1, 0x443, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40000000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x2800000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x11d, 0x10000}], 0x0, &(0x7f0000014300)) mkdir(&(0x7f0000000700)='./file0\x00', 0x200000000145) r0 = open(&(0x7f00000002c0)='./file0\x00', 0x0, 0x0) stat(&(0x7f0000000300)='./file0/file0/file0\x00', &(0x7f00000005c0)) symlinkat(&(0x7f0000000240)='./file0/file0/file0\x00', 0xffffffffffffffff, &(0x7f0000000140)='./file0\x00') unlinkat(r0, &(0x7f0000000080)='./file0/file0/file0\x00', 0x0) fsync(r0) mkdir(&(0x7f0000000380)='./file1\x00', 0x3) 2018/04/30 20:08:37 executing program 5: unshare(0x40600) r0 = creat(&(0x7f0000000140)='./file0\x00', 0x0) fgetxattr(r0, &(0x7f0000000000)=@known='security.selinux\x00', &(0x7f0000000040)=""/122, 0x7a) 2018/04/30 20:08:37 executing program 6: r0 = epoll_create1(0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) epoll_wait(r0, &(0x7f0000bf2f88)=[{}], 0x1, 0x8001) epoll_wait(r0, &(0x7f0000000080)=[{}], 0x1, 0x80) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, r1, &(0x7f0000b87ff4)={0x4}) 2018/04/30 20:08:37 executing program 5: r0 = syz_open_dev$sndseq(&(0x7f0000000140)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r0, 0xc0a85320, &(0x7f0000418f50)={{0x80}, "706f727431000000000000000000000000000000000000000000eb000000b2a587e2000000000000020000000000000001008e15e7af00", 0xa9824f69d1376637, 0x10800a}) openat$sequencer(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/sequencer\x00', 0x4000, 0x0) ioctl$SNDRV_SEQ_IOCTL_SET_CLIENT_POOL(r0, 0x4058534c, &(0x7f00000000c0)={0x80, 0x0, 0xf7, 0x3fd}) [ 53.070879] Dev loop3: unable to read RDB block 1 [ 53.075954] loop3: unable to read partition table 2018/04/30 20:08:38 executing program 5: r0 = syz_open_dev$sndseq(&(0x7f0000000140)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r0, 0xc0a85320, &(0x7f0000418f50)={{0x80}, "706f727431000000000000000000000000000000000000000000eb000000b2a587e2000000000000020000000000000001008e15e7af00", 0xa9824f69d1376637, 0x10800a}) openat$sequencer(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/sequencer\x00', 0x4000, 0x0) ioctl$SNDRV_SEQ_IOCTL_SET_CLIENT_POOL(r0, 0x4058534c, &(0x7f00000000c0)={0x80, 0x0, 0xf7, 0x3fd}) [ 53.103342] loop3: partition table beyond EOD, truncated [ 53.146495] loop_reread_partitions: partition scan of loop3 () failed (rc=-5) 2018/04/30 20:08:38 executing program 5: r0 = syz_open_dev$sndseq(&(0x7f0000000140)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r0, 0xc0a85320, &(0x7f0000418f50)={{0x80}, "706f727431000000000000000000000000000000000000000000eb000000b2a587e2000000000000020000000000000001008e15e7af00", 0xa9824f69d1376637, 0x10800a}) openat$sequencer(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/sequencer\x00', 0x4000, 0x0) ioctl$SNDRV_SEQ_IOCTL_SET_CLIENT_POOL(r0, 0x4058534c, &(0x7f00000000c0)={0x80, 0x0, 0xf7, 0x3fd}) 2018/04/30 20:08:38 executing program 3: syz_read_part_table(0x0, 0x2, &(0x7f00000013c0)=[{&(0x7f0000000240)="87217fe7d43d2c8277b3f304de83a959d69c75c9da0632b4cc16361687a26ef3d452b7428d487fd2addce4e4e3738b83ee400e9485d8954a1e710e12bf0aa8d7c546ee5bf854ae8e7bea084df3d95adca04a366d327015584d3793e0ac6f3c120ea9ff1788574cd3fd31f58876ef63b6ba3fc8a78dafc9685fafb4bdf16c04003c85ef3f538876c4c7c7899b878e8f158a7cd516117cae0e06a3282e75d5a72f4509a013a63539cc2cfb44de10693d3213d2c12e80daeab80c8dffa961e5f3d92cca165a9c33f486a4edbdc663824afc374318650214535b186c2d3dc7a364835e6d2eb559b6ea9220ec00b19df489e69b50a4e1989b4ec722e4fcac37565ae5db134a69088ff2864f144c8c4ed020fba2b2e53d61408a237c26e0f6d6832fe0adc6e5d6a0a1ffa794bb5edaf382dbe219bfb48b8c03966f755190a7999d61b65ef5363d5792b9990b4f8495b390025c9593a44959ecdf1dad18c85ae9a7618eeaf29c96c45e471682a677930cdeba666443818994f77ae86fae3e95723678e5e5371501467b4ff9be2677d8788f0df7b4cc84a1a9dea190ad717f82f2f15d70836ec79d4ed8feb0cccaa5912b3fe98a5f13cc54b8f22fd8b8deb46d8196b1483099483abc5493f253bcbe64c432dbe54970c0d8817ebd69deee3e788354613da1cae02f0205eee0ce16eb5326d570e352313bde0df143a9cd10b497", 0x1fc, 0x4}, {&(0x7f0000001300)='8', 0x1}]) [ 53.243938] BTRFS error (device loop4): superblock checksum mismatch 2018/04/30 20:08:38 executing program 5: r0 = syz_open_dev$sndseq(&(0x7f0000000140)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r0, 0xc0a85320, &(0x7f0000418f50)={{0x80}, "706f727431000000000000000000000000000000000000000000eb000000b2a587e2000000000000020000000000000001008e15e7af00", 0xa9824f69d1376637, 0x10800a}) openat$sequencer(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/sequencer\x00', 0x4000, 0x0) ioctl$SNDRV_SEQ_IOCTL_SET_CLIENT_POOL(r0, 0x4058534c, &(0x7f00000000c0)={0x80, 0x0, 0xf7, 0x3fd}) 2018/04/30 20:08:38 executing program 5: r0 = openat$ion(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ion\x00', 0x0, 0x0) ioctl$DRM_IOCTL_RES_CTX(0xffffffffffffffff, 0xc0106426, &(0x7f0000001000)={0x1, &(0x7f0000007000)=[{}]}) ioctl(r0, 0xc0184908, &(0x7f0000001000)) 2018/04/30 20:08:38 executing program 1: capset(&(0x7f0000000200)={0x19980330}, &(0x7f0000000080)) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = add_key$user(&(0x7f0000000000)='user\x00', &(0x7f0000000040)={0x73, 0x79, 0x7a}, &(0x7f00000000c0)='X', 0x1, 0xffffffffffffffff) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000100)={0x0, 0x0}, &(0x7f0000000280)=0x5) keyctl$chown(0x4, r1, r2, 0x0) [ 53.350900] Dev loop3: unable to read RDB block 1 [ 53.362213] loop3: unable to read partition table [ 53.371096] BTRFS error (device loop4): open_ctree failed 2018/04/30 20:08:38 executing program 7: r0 = syz_open_dev$sndseq(&(0x7f0000000040)='/dev/snd/seq\x00', 0x0, 0x800) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r0, 0xc0a85320, &(0x7f0000068f50)={{0x80}, "706f72ff0700000000000000000000000000000000000000000000001f0000ffffffffffffffef000003ff00000000000012000000000000000000000600", 0xc3, 0x80003}) r1 = openat$sequencer2(0xffffffffffffff9c, &(0x7f000085dff0)='/dev/sequencer2\x00', 0x10000080002, 0x0) r2 = dup2(r0, r1) read(r2, &(0x7f00004b8fab)=""/85, 0x55) [ 53.391367] loop3: partition table beyond EOD, truncated [ 53.416372] loop_reread_partitions: partition scan of loop3 () failed (rc=-5) 2018/04/30 20:08:38 executing program 5: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='net/sockstat6\x00') sendfile(r0, r0, &(0x7f0000000040)=0xa000000, 0x958) 2018/04/30 20:08:38 executing program 2: pipe2(&(0x7f0000000000)={0xffffffffffffffff}, 0x0) r1 = eventfd(0x0) splice(r0, &(0x7f00000002c0), r1, &(0x7f0000000300), 0x6f91aacb, 0x0) 2018/04/30 20:08:38 executing program 0: syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f0000000100)='./file0\x00', 0xd50, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="eb3c906d6b66732e66617400020401000270027000f8", 0x16}], 0x0, &(0x7f0000000e80)=ANY=[]) r0 = open$dir(&(0x7f0000000080)='./file0//ile0\x00', 0xc245, 0x0) ioctl(r0, 0x1, &(0x7f0000000240)) 2018/04/30 20:08:38 executing program 1: mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x0, 0x32, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x100000000000002, 0x0) mmap(&(0x7f0000002000/0x1000)=nil, 0x1000, 0x100000d, 0x32, 0xffffffffffffffff, 0x0) setsockopt$inet6_buf(r0, 0x29, 0x20, &(0x7f0000002922)="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", 0x6df) 2018/04/30 20:08:38 executing program 4: perf_event_open(&(0x7f000001d000)={0x2, 0x78, 0x71}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(0xffffffffffffffff, &(0x7f00001fefe4)={0xa}, 0x1c) listen(r0, 0x0) shutdown(r0, 0x0) 2018/04/30 20:08:38 executing program 7: r0 = syz_open_dev$sndseq(&(0x7f0000000040)='/dev/snd/seq\x00', 0x0, 0x800) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r0, 0xc0a85320, &(0x7f0000068f50)={{0x80}, "706f72ff0700000000000000000000000000000000000000000000001f0000ffffffffffffffef000003ff00000000000012000000000000000000000600", 0xc3, 0x80003}) r1 = openat$sequencer2(0xffffffffffffff9c, &(0x7f000085dff0)='/dev/sequencer2\x00', 0x10000080002, 0x0) r2 = dup2(r0, r1) read(r2, &(0x7f00004b8fab)=""/85, 0x55) 2018/04/30 20:08:38 executing program 6: r0 = epoll_create1(0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) epoll_wait(r0, &(0x7f0000bf2f88)=[{}], 0x1, 0x8001) epoll_wait(r0, &(0x7f0000000080)=[{}], 0x1, 0x80) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, r1, &(0x7f0000b87ff4)={0x4}) 2018/04/30 20:08:38 executing program 3: syz_read_part_table(0x0, 0x2, &(0x7f00000013c0)=[{&(0x7f0000000240)="87217fe7d43d2c8277b3f304de83a959d69c75c9da0632b4cc16361687a26ef3d452b7428d487fd2addce4e4e3738b83ee400e9485d8954a1e710e12bf0aa8d7c546ee5bf854ae8e7bea084df3d95adca04a366d327015584d3793e0ac6f3c120ea9ff1788574cd3fd31f58876ef63b6ba3fc8a78dafc9685fafb4bdf16c04003c85ef3f538876c4c7c7899b878e8f158a7cd516117cae0e06a3282e75d5a72f4509a013a63539cc2cfb44de10693d3213d2c12e80daeab80c8dffa961e5f3d92cca165a9c33f486a4edbdc663824afc374318650214535b186c2d3dc7a364835e6d2eb559b6ea9220ec00b19df489e69b50a4e1989b4ec722e4fcac37565ae5db134a69088ff2864f144c8c4ed020fba2b2e53d61408a237c26e0f6d6832fe0adc6e5d6a0a1ffa794bb5edaf382dbe219bfb48b8c03966f755190a7999d61b65ef5363d5792b9990b4f8495b390025c9593a44959ecdf1dad18c85ae9a7618eeaf29c96c45e471682a677930cdeba666443818994f77ae86fae3e95723678e5e5371501467b4ff9be2677d8788f0df7b4cc84a1a9dea190ad717f82f2f15d70836ec79d4ed8feb0cccaa5912b3fe98a5f13cc54b8f22fd8b8deb46d8196b1483099483abc5493f253bcbe64c432dbe54970c0d8817ebd69deee3e788354613da1cae02f0205eee0ce16eb5326d570e352313bde0df143a9cd10b497", 0x1fc, 0x4}, {&(0x7f0000001300)='8', 0x1}]) 2018/04/30 20:08:38 executing program 5: r0 = eventfd2(0x0, 0x200000800) r1 = syz_open_procfs(0x0, &(0x7f0000dafff7)='net/tcp6\x00') sendfile(r0, r1, &(0x7f0000000080), 0x400000ff) 2018/04/30 20:08:38 executing program 1: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = request_key(&(0x7f0000000440)='encrypted\x00', &(0x7f0000000480)={0x73, 0x79, 0x7a}, &(0x7f00000004c0)='/dev/snd/timer\x00', 0xfffffffffffffffe) ioctl$KDSETLED(r0, 0x4b32, 0x0) request_key(&(0x7f00000002c0)="646e735f7265736f6c766572000eaf669367e16e3e4c94d47a1922e0aa7df9a304a61b716762bceb935ba714e279b607f392e1fca92a14971a7368", &(0x7f0000000200)={0x73, 0x79, 0x7a}, &(0x7f0000000100)='procwlan0-\x00', r1) openat$ion(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ion\x00', 0x0, 0x0) pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$packet_rx_ring(r2, 0x107, 0x5, &(0x7f00000001c0)=@req={0x8, 0x1f34, 0x0, 0xfffffffffffffffd}, 0x10) 2018/04/30 20:08:38 executing program 2: socket$inet(0x2, 0x80003, 0x6) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x8000000000002, &(0x7f0000ed4000)=0x79, 0x4) bind$inet(r0, &(0x7f0000deb000)={0x2, 0x4e23, @broadcast=0xffffffff}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000680)={0x1, &(0x7f0000818000)=[{0x6, 0x0, 0x0, 0xfc}]}, 0x10) sendto$inet(r0, &(0x7f0000000100), 0x3c058533fd59b3f3, 0x20000000, &(0x7f0000deaff0)={0x2, 0x4e23, @loopback=0x7f000001}, 0x10) sendmsg(r0, &(0x7f000009cfe4)={&(0x7f000009ffa8)=@alg={0x26, 'aead\x00', 0x0, 0x0, 'pcrypt(pcrypt(rfc4106(gcm(aes))))\x00'}, 0x80, &(0x7f0000398000)=[{&(0x7f0000697000)="80", 0x1}], 0x1}, 0x0) 2018/04/30 20:08:38 executing program 7: r0 = syz_open_dev$sndseq(&(0x7f0000000040)='/dev/snd/seq\x00', 0x0, 0x800) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r0, 0xc0a85320, &(0x7f0000068f50)={{0x80}, "706f72ff0700000000000000000000000000000000000000000000001f0000ffffffffffffffef000003ff00000000000012000000000000000000000600", 0xc3, 0x80003}) r1 = openat$sequencer2(0xffffffffffffff9c, &(0x7f000085dff0)='/dev/sequencer2\x00', 0x10000080002, 0x0) r2 = dup2(r0, r1) read(r2, &(0x7f00004b8fab)=""/85, 0x55) [ 53.940350] FAT-fs (loop0): Directory bread(block 6) failed [ 53.946124] FAT-fs (loop0): Directory bread(block 7) failed 2018/04/30 20:08:38 executing program 4: perf_event_open(&(0x7f000001d000)={0x2, 0x78, 0x71}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(0xffffffffffffffff, &(0x7f00001fefe4)={0xa}, 0x1c) listen(r0, 0x0) shutdown(r0, 0x0) 2018/04/30 20:08:38 executing program 5: perf_event_open(&(0x7f000001d000)={0x2, 0x78, 0x71}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(0xffffffffffffffff, &(0x7f00001fefe4)={0xa}, 0x1c) listen(r0, 0x0) shutdown(r0, 0x0) [ 53.990378] FAT-fs (loop0): Directory bread(block 8) failed [ 54.000808] Dev loop3: unable to read RDB block 1 2018/04/30 20:08:38 executing program 7: r0 = syz_open_dev$sndseq(&(0x7f0000000040)='/dev/snd/seq\x00', 0x0, 0x800) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r0, 0xc0a85320, &(0x7f0000068f50)={{0x80}, "706f72ff0700000000000000000000000000000000000000000000001f0000ffffffffffffffef000003ff00000000000012000000000000000000000600", 0xc3, 0x80003}) r1 = openat$sequencer2(0xffffffffffffff9c, &(0x7f000085dff0)='/dev/sequencer2\x00', 0x10000080002, 0x0) r2 = dup2(r0, r1) read(r2, &(0x7f00004b8fab)=""/85, 0x55) 2018/04/30 20:08:38 executing program 3: r0 = socket$inet_udp(0x2, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x72, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000100)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_inet_udp_SIOCINQ(r0, 0x541b, &(0x7f00000000c0)) [ 54.000821] loop3: unable to read partition table [ 54.000859] loop3: partition table beyond EOD, truncated [ 54.000865] loop_reread_partitions: partition scan of loop3 () failed (rc=-5) 2018/04/30 20:08:38 executing program 4: perf_event_open(&(0x7f000001d000)={0x2, 0x78, 0x71}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(0xffffffffffffffff, &(0x7f00001fefe4)={0xa}, 0x1c) listen(r0, 0x0) shutdown(r0, 0x0) 2018/04/30 20:08:38 executing program 7: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f0000001640)={&(0x7f00000000c0)={0x10}, 0xc, &(0x7f0000000100)={&(0x7f0000000340)={0x18, 0x30, 0x203, 0x0, 0x0, {}, [@nested={0x4, 0x1}]}, 0x18}, 0x1}, 0x0) [ 54.087985] FAT-fs (loop0): Directory bread(block 9) failed [ 54.104822] FAT-fs (loop0): Directory bread(block 10) failed [ 54.121601] FAT-fs (loop0): Directory bread(block 11) failed [ 54.140525] FAT-fs (loop0): Directory bread(block 12) failed [ 54.146755] FAT-fs (loop0): Directory bread(block 13) failed [ 54.154670] FAT-fs (loop0): Directory bread(block 14) failed [ 54.161284] FAT-fs (loop0): Directory bread(block 15) failed 2018/04/30 20:08:39 executing program 5: perf_event_open(&(0x7f000001d000)={0x2, 0x78, 0x71}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(0xffffffffffffffff, &(0x7f00001fefe4)={0xa}, 0x1c) listen(r0, 0x0) shutdown(r0, 0x0) 2018/04/30 20:08:39 executing program 7: perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x72, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000100)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) syz_open_procfs(0x0, &(0x7f0000000340)='loginuid\x00') setsockopt$netrom_NETROM_IDLE(0xffffffffffffffff, 0x103, 0x7, &(0x7f00000005c0), 0x4) r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000180)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x0) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) sendmmsg$inet_sctp(0xffffffffffffffff, &(0x7f0000871fc8)=[{&(0x7f000086c000)=@in6={0xa, 0x0, 0x2}, 0x1c, &(0x7f0000d1e000), 0x0, &(0x7f0000dda000)}], 0x492492492492510, 0x0) stat(&(0x7f0000001940)='./file0\x00', &(0x7f0000001980)) syz_mount_image$ntfs(&(0x7f0000000440)='ntfs\x00', &(0x7f0000000480)='./bus\x00', 0x0, 0x0, &(0x7f0000000300), 0x1000, &(0x7f0000000740)=ANY=[]) quotactl(0x0, &(0x7f0000000080)='./bus\x00', 0x0, &(0x7f0000000280)) 2018/04/30 20:08:39 executing program 0: syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f0000000100)='./file0\x00', 0xd50, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="eb3c906d6b66732e66617400020401000270027000f8", 0x16}], 0x0, &(0x7f0000000e80)=ANY=[]) r0 = open$dir(&(0x7f0000000080)='./file0//ile0\x00', 0xc245, 0x0) ioctl(r0, 0x1, &(0x7f0000000240)) 2018/04/30 20:08:39 executing program 1: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = request_key(&(0x7f0000000440)='encrypted\x00', &(0x7f0000000480)={0x73, 0x79, 0x7a}, &(0x7f00000004c0)='/dev/snd/timer\x00', 0xfffffffffffffffe) ioctl$KDSETLED(r0, 0x4b32, 0x0) request_key(&(0x7f00000002c0)="646e735f7265736f6c766572000eaf669367e16e3e4c94d47a1922e0aa7df9a304a61b716762bceb935ba714e279b607f392e1fca92a14971a7368", &(0x7f0000000200)={0x73, 0x79, 0x7a}, &(0x7f0000000100)='procwlan0-\x00', r1) openat$ion(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ion\x00', 0x0, 0x0) pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$packet_rx_ring(r2, 0x107, 0x5, &(0x7f00000001c0)=@req={0x8, 0x1f34, 0x0, 0xfffffffffffffffd}, 0x10) 2018/04/30 20:08:39 executing program 3: perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x71}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pipe2(&(0x7f00000000c0)={0xffffffffffffffff}, 0x0) perf_event_open$cgroup(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x5, 0x0, 0x0, 0x0, 0x1f, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x4, @perf_config_ext, 0x200}, r0, 0x0, 0xffffffffffffffff, 0x2) 2018/04/30 20:08:39 executing program 2: socket$inet(0x2, 0x80003, 0x6) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x8000000000002, &(0x7f0000ed4000)=0x79, 0x4) bind$inet(r0, &(0x7f0000deb000)={0x2, 0x4e23, @broadcast=0xffffffff}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000680)={0x1, &(0x7f0000818000)=[{0x6, 0x0, 0x0, 0xfc}]}, 0x10) sendto$inet(r0, &(0x7f0000000100), 0x3c058533fd59b3f3, 0x20000000, &(0x7f0000deaff0)={0x2, 0x4e23, @loopback=0x7f000001}, 0x10) sendmsg(r0, &(0x7f000009cfe4)={&(0x7f000009ffa8)=@alg={0x26, 'aead\x00', 0x0, 0x0, 'pcrypt(pcrypt(rfc4106(gcm(aes))))\x00'}, 0x80, &(0x7f0000398000)=[{&(0x7f0000697000)="80", 0x1}], 0x1}, 0x0) 2018/04/30 20:08:39 executing program 4: perf_event_open(&(0x7f000001d000)={0x2, 0x78, 0x71}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(0xffffffffffffffff, &(0x7f00001fefe4)={0xa}, 0x1c) listen(r0, 0x0) shutdown(r0, 0x0) 2018/04/30 20:08:39 executing program 6: r0 = epoll_create1(0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) epoll_wait(r0, &(0x7f0000bf2f88)=[{}], 0x1, 0x8001) epoll_wait(r0, &(0x7f0000000080)=[{}], 0x1, 0x80) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, r1, &(0x7f0000b87ff4)={0x4}) 2018/04/30 20:08:39 executing program 5: perf_event_open(&(0x7f000001d000)={0x2, 0x78, 0x71}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(0xffffffffffffffff, &(0x7f00001fefe4)={0xa}, 0x1c) listen(r0, 0x0) shutdown(r0, 0x0) 2018/04/30 20:08:39 executing program 3: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) getsockopt$inet_sctp_SCTP_LOCAL_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1b, &(0x7f0000000200)={0x0, 0x7c, "d09620958397931ffafee62ac794d7ae8768a6c2014a404acc2b49e8282dbf10a9765cf2d43fe76b28a9340b37bac535bab11f51178bf62d687743170a83fdf69e467f7abb9a84e8e46786aaa4b021809cf9a98a8030cb51c10ea22ccfe59551c48643741ea17535ca0b03c91396a96363455b987cecc276cc1b9899"}, &(0x7f0000000340)=0x84) setsockopt(r0, 0xff, 0x8000000000000007, &(0x7f0000000280), 0x0) [ 54.924957] FAT-fs (loop0): Directory bread(block 6) failed [ 54.933898] FAT-fs (loop0): Directory bread(block 7) failed [ 54.940227] FAT-fs (loop0): Directory bread(block 8) failed [ 54.946161] FAT-fs (loop0): Directory bread(block 9) failed 2018/04/30 20:08:39 executing program 4: r0 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(r0, &(0x7f0000f61fe4)={0xa, 0x4e20, 0x0, @ipv4={[], [0xff, 0xff], @multicast1=0xe0000001}}, 0x1c) r1 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_int(r1, 0x29, 0x1a, &(0x7f0000000140)=0xdf8, 0x4) bind$inet6(r1, &(0x7f0000f67fe4)={0xa, 0x4e20}, 0x1c) [ 54.969179] FAT-fs (loop0): Directory bread(block 10) failed [ 54.969193] FAT-fs (loop0): Directory bread(block 11) failed 2018/04/30 20:08:39 executing program 0: syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f0000000100)='./file0\x00', 0xd50, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="eb3c906d6b66732e66617400020401000270027000f8", 0x16}], 0x0, &(0x7f0000000e80)=ANY=[]) r0 = open$dir(&(0x7f0000000080)='./file0//ile0\x00', 0xc245, 0x0) ioctl(r0, 0x1, &(0x7f0000000240)) 2018/04/30 20:08:39 executing program 3: r0 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000140)='/dev/sequencer2\x00', 0x6, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000100)) ioctl$EVIOCGUNIQ(r0, 0x80404508, &(0x7f0000000240)=""/131) accept4$netrom(0xffffffffffffffff, &(0x7f00000000c0), &(0x7f0000000200)=0x10, 0x0) close(r0) 2018/04/30 20:08:39 executing program 4: r0 = socket$inet6(0xa, 0x80002, 0x0) setsockopt$sock_int(r0, 0x1, 0x4000000000000002, &(0x7f0000d11000)=0x3fb, 0x4) bind$inet6(r0, &(0x7f0000fe7fe4)={0xa, 0x4e20}, 0x1c) r1 = socket$inet6(0xa, 0x2, 0x0) setsockopt$sock_int(r1, 0x1, 0x4000000000000002, &(0x7f0000ec1000)=0x5, 0x4) bind$inet6(r1, &(0x7f0000bcefe4)={0xa, 0x4e20}, 0x1c) 2018/04/30 20:08:39 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000f56000)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f0000333f88)={0x2, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, [@sadb_address={0x3, 0x0, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1=0xe0000001}}]}, 0x40ec94ba}, 0x1}, 0x0) [ 54.969207] FAT-fs (loop0): Directory bread(block 12) failed [ 54.969222] FAT-fs (loop0): Directory bread(block 13) failed 2018/04/30 20:08:40 executing program 4: timer_create(0x9, &(0x7f0000000180)={0x0, 0x12, 0x0, @thr={&(0x7f0000000040), &(0x7f0000000080)}}, &(0x7f0000000000)) timer_settime(0x0, 0x1, &(0x7f0000000080)={{}, {0x0, 0x1c9c380}}, &(0x7f00000000c0)) [ 54.969236] FAT-fs (loop0): Directory bread(block 14) failed [ 54.969248] FAT-fs (loop0): Directory bread(block 15) failed 2018/04/30 20:08:40 executing program 1: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = request_key(&(0x7f0000000440)='encrypted\x00', &(0x7f0000000480)={0x73, 0x79, 0x7a}, &(0x7f00000004c0)='/dev/snd/timer\x00', 0xfffffffffffffffe) ioctl$KDSETLED(r0, 0x4b32, 0x0) request_key(&(0x7f00000002c0)="646e735f7265736f6c766572000eaf669367e16e3e4c94d47a1922e0aa7df9a304a61b716762bceb935ba714e279b607f392e1fca92a14971a7368", &(0x7f0000000200)={0x73, 0x79, 0x7a}, &(0x7f0000000100)='procwlan0-\x00', r1) openat$ion(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ion\x00', 0x0, 0x0) pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$packet_rx_ring(r2, 0x107, 0x5, &(0x7f00000001c0)=@req={0x8, 0x1f34, 0x0, 0xfffffffffffffffd}, 0x10) 2018/04/30 20:08:40 executing program 3: r0 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000140)='/dev/sequencer2\x00', 0x6, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000100)) ioctl$EVIOCGUNIQ(r0, 0x80404508, &(0x7f0000000240)=""/131) accept4$netrom(0xffffffffffffffff, &(0x7f00000000c0), &(0x7f0000000200)=0x10, 0x0) close(r0) 2018/04/30 20:08:40 executing program 4: timer_create(0x9, &(0x7f0000000180)={0x0, 0x12, 0x0, @thr={&(0x7f0000000040), &(0x7f0000000080)}}, &(0x7f0000000000)) timer_settime(0x0, 0x1, &(0x7f0000000080)={{}, {0x0, 0x1c9c380}}, &(0x7f00000000c0)) 2018/04/30 20:08:40 executing program 7: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) r1 = socket$inet_tcp(0x2, 0x1, 0x0) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$sock_ifreq(r2, 0x8931, &(0x7f0000000080)={'sit0\x00', @ifru_data=&(0x7f0000000040)="b9251a24b4543c2bd94e879287ab539363b3f593a7a08a42826d857998966b25"}) 2018/04/30 20:08:40 executing program 5: r0 = syz_open_dev$evdev(&(0x7f0000fc0000)='/dev/input/event#\x00', 0x0, 0x0) ioctl$EVIOCSMASK(r0, 0x40104593, &(0x7f0000914ff0)={0x0, 0x0, &(0x7f0000fb2000)}) ioctl$EVIOCGMASK(r0, 0x80104592, &(0x7f0000dd5000)) [ 55.222423] FAT-fs (loop0): Directory bread(block 6) failed [ 55.233763] FAT-fs (loop0): Directory bread(block 7) failed [ 55.260846] FAT-fs (loop0): Directory bread(block 8) failed [ 55.278975] FAT-fs (loop0): Directory bread(block 9) failed [ 55.302450] FAT-fs (loop0): Directory bread(block 10) failed [ 55.313684] FAT-fs (loop0): Directory bread(block 11) failed [ 55.320215] FAT-fs (loop0): Directory bread(block 12) failed [ 55.326099] FAT-fs (loop0): Directory bread(block 13) failed [ 55.333392] FAT-fs (loop0): Directory bread(block 14) failed [ 55.339273] FAT-fs (loop0): Directory bread(block 15) failed 2018/04/30 20:08:40 executing program 0: syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f0000000100)='./file0\x00', 0xd50, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="eb3c906d6b66732e66617400020401000270027000f8", 0x16}], 0x0, &(0x7f0000000e80)=ANY=[]) r0 = open$dir(&(0x7f0000000080)='./file0//ile0\x00', 0xc245, 0x0) ioctl(r0, 0x1, &(0x7f0000000240)) 2018/04/30 20:08:40 executing program 5: r0 = syz_fuseblk_mount(&(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) r1 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x0) ioctl$LOOP_SET_FD(r1, 0x4c00, r0) 2018/04/30 20:08:40 executing program 2: socket$inet(0x2, 0x80003, 0x6) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x8000000000002, &(0x7f0000ed4000)=0x79, 0x4) bind$inet(r0, &(0x7f0000deb000)={0x2, 0x4e23, @broadcast=0xffffffff}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000680)={0x1, &(0x7f0000818000)=[{0x6, 0x0, 0x0, 0xfc}]}, 0x10) sendto$inet(r0, &(0x7f0000000100), 0x3c058533fd59b3f3, 0x20000000, &(0x7f0000deaff0)={0x2, 0x4e23, @loopback=0x7f000001}, 0x10) sendmsg(r0, &(0x7f000009cfe4)={&(0x7f000009ffa8)=@alg={0x26, 'aead\x00', 0x0, 0x0, 'pcrypt(pcrypt(rfc4106(gcm(aes))))\x00'}, 0x80, &(0x7f0000398000)=[{&(0x7f0000697000)="80", 0x1}], 0x1}, 0x0) 2018/04/30 20:08:40 executing program 6: r0 = epoll_create1(0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) epoll_wait(r0, &(0x7f0000bf2f88)=[{}], 0x1, 0x8001) epoll_wait(r0, &(0x7f0000000080)=[{}], 0x1, 0x80) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, r1, &(0x7f0000b87ff4)={0x4}) 2018/04/30 20:08:40 executing program 4: timer_create(0x9, &(0x7f0000000180)={0x0, 0x12, 0x0, @thr={&(0x7f0000000040), &(0x7f0000000080)}}, &(0x7f0000000000)) timer_settime(0x0, 0x1, &(0x7f0000000080)={{}, {0x0, 0x1c9c380}}, &(0x7f00000000c0)) 2018/04/30 20:08:40 executing program 1: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = request_key(&(0x7f0000000440)='encrypted\x00', &(0x7f0000000480)={0x73, 0x79, 0x7a}, &(0x7f00000004c0)='/dev/snd/timer\x00', 0xfffffffffffffffe) ioctl$KDSETLED(r0, 0x4b32, 0x0) request_key(&(0x7f00000002c0)="646e735f7265736f6c766572000eaf669367e16e3e4c94d47a1922e0aa7df9a304a61b716762bceb935ba714e279b607f392e1fca92a14971a7368", &(0x7f0000000200)={0x73, 0x79, 0x7a}, &(0x7f0000000100)='procwlan0-\x00', r1) openat$ion(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ion\x00', 0x0, 0x0) pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$packet_rx_ring(r2, 0x107, 0x5, &(0x7f00000001c0)=@req={0x8, 0x1f34, 0x0, 0xfffffffffffffffd}, 0x10) 2018/04/30 20:08:40 executing program 7: mlock2(&(0x7f0000000000/0x3000)=nil, 0x3000, 0xfffffffffffffffd) 2018/04/30 20:08:40 executing program 3: r0 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000140)='/dev/sequencer2\x00', 0x6, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000100)) ioctl$EVIOCGUNIQ(r0, 0x80404508, &(0x7f0000000240)=""/131) accept4$netrom(0xffffffffffffffff, &(0x7f00000000c0), &(0x7f0000000200)=0x10, 0x0) close(r0) 2018/04/30 20:08:40 executing program 4: timer_create(0x9, &(0x7f0000000180)={0x0, 0x12, 0x0, @thr={&(0x7f0000000040), &(0x7f0000000080)}}, &(0x7f0000000000)) timer_settime(0x0, 0x1, &(0x7f0000000080)={{}, {0x0, 0x1c9c380}}, &(0x7f00000000c0)) 2018/04/30 20:08:40 executing program 4: r0 = add_key$keyring(&(0x7f0000000180)='keyring\x00', &(0x7f00000001c0)={0x73, 0x79, 0x7a}, 0x0, 0x0, 0xfffffffffffffffe) r1 = add_key$keyring(&(0x7f00000000c0)='keyring\x00', &(0x7f0000000100)={0x73, 0x79, 0x7a}, 0x0, 0x0, r0) r2 = add_key$user(&(0x7f000038b000)='user\x00', &(0x7f000057f000)={0x73, 0x79, 0x7a}, &(0x7f0000d6c000)='1', 0x1, r1) keyctl$setperm(0x5, r1, 0x0) keyctl$unlink(0xf, r2, 0x0) [ 55.907993] FAT-fs (loop0): Directory bread(block 6) failed [ 55.922832] FAT-fs (loop0): Directory bread(block 7) failed [ 55.949417] FAT-fs (loop0): Directory bread(block 8) failed [ 55.955760] FAT-fs (loop0): Directory bread(block 9) failed [ 55.962517] FAT-fs (loop0): Directory bread(block 10) failed [ 55.968647] FAT-fs (loop0): Directory bread(block 11) failed [ 55.980365] FAT-fs (loop0): Directory bread(block 12) failed [ 56.001183] FAT-fs (loop0): Directory bread(block 13) failed [ 56.008930] FAT-fs (loop0): Directory bread(block 14) failed [ 56.014862] FAT-fs (loop0): Directory bread(block 15) failed 2018/04/30 20:08:41 executing program 7: r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000001000)={0x1, {{0xa, 0x0, 0x0, @mcast2={0xff, 0x2, [], 0x1}}}, {{0xa, 0x0, 0x0, @local={0xfe, 0x80, [], 0xffffffffffffffff}}}}, 0x108) r1 = syz_open_procfs(0x0, &(0x7f000012bff2)='net/mcfilter6\x00') setsockopt$inet6_MCAST_MSFILTER(r0, 0x29, 0x30, &(0x7f0000f46000)={0x1, {{0xa, 0x0, 0x0, @mcast2={0xff, 0x2, [], 0x1}}}, 0x0, 0x2, [{{0xa, 0x0, 0x0, @local={0xfe, 0x80, [], 0xffffffffffffffff}}}, {{0xa, 0x0, 0x0, @mcast2={0xff, 0x2, [], 0x1}}}]}, 0x190) preadv(r1, &(0x7f0000000000)=[{&(0x7f0000000180)=""/159, 0x9f}], 0x1, 0x4000) 2018/04/30 20:08:41 executing program 5: sendmsg$unix(0xffffffffffffffff, &(0x7f0000833000)={&(0x7f0000000000)=@abs, 0x6e, &(0x7f00007e0000)=[{&(0x7f0000007000)="fd20932fcc7cfaafcf960802e02348f8fba600069da7b753c31273", 0x1b}], 0x1, &(0x7f00000001c0)}, 0x0) r0 = syz_open_dev$sg(&(0x7f0000970000)='/dev/sg#\x00', 0x0, 0x0) ioctl$EVIOCSABS0(0xffffffffffffffff, 0x401845c0, &(0x7f0000007000)={0x0, 0x0, 0x67, 0x10040, 0x100000000005}) ioctl(r0, 0x2285, &(0x7f0000007000)='S') 2018/04/30 20:08:41 executing program 4: r0 = add_key$keyring(&(0x7f0000000180)='keyring\x00', &(0x7f00000001c0)={0x73, 0x79, 0x7a}, 0x0, 0x0, 0xfffffffffffffffe) r1 = add_key$keyring(&(0x7f00000000c0)='keyring\x00', &(0x7f0000000100)={0x73, 0x79, 0x7a}, 0x0, 0x0, r0) r2 = add_key$user(&(0x7f000038b000)='user\x00', &(0x7f000057f000)={0x73, 0x79, 0x7a}, &(0x7f0000d6c000)='1', 0x1, r1) keyctl$setperm(0x5, r1, 0x0) keyctl$unlink(0xf, r2, 0x0) 2018/04/30 20:08:41 executing program 1: r0 = userfaultfd(0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000000000)={0xaa}) mprotect(&(0x7f0000003000/0x4000)=nil, 0x4000, 0x1) ioctl$UFFDIO_REGISTER(r0, 0x8010aa01, &(0x7f0000006ffc)={{&(0x7f0000009000/0x4000)=nil, 0x4000}}) 2018/04/30 20:08:41 executing program 3: r0 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000140)='/dev/sequencer2\x00', 0x6, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000100)) ioctl$EVIOCGUNIQ(r0, 0x80404508, &(0x7f0000000240)=""/131) accept4$netrom(0xffffffffffffffff, &(0x7f00000000c0), &(0x7f0000000200)=0x10, 0x0) close(r0) 2018/04/30 20:08:41 executing program 0: pselect6(0x12, &(0x7f0000000000), &(0x7f0000000000), &(0x7f0000000040), &(0x7f0000000ff8)={0x77359400}, &(0x7f0000000ff8)={&(0x7f0000000ff8), 0x6}) 2018/04/30 20:08:41 executing program 2: socket$inet(0x2, 0x80003, 0x6) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x8000000000002, &(0x7f0000ed4000)=0x79, 0x4) bind$inet(r0, &(0x7f0000deb000)={0x2, 0x4e23, @broadcast=0xffffffff}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000680)={0x1, &(0x7f0000818000)=[{0x6, 0x0, 0x0, 0xfc}]}, 0x10) sendto$inet(r0, &(0x7f0000000100), 0x3c058533fd59b3f3, 0x20000000, &(0x7f0000deaff0)={0x2, 0x4e23, @loopback=0x7f000001}, 0x10) sendmsg(r0, &(0x7f000009cfe4)={&(0x7f000009ffa8)=@alg={0x26, 'aead\x00', 0x0, 0x0, 'pcrypt(pcrypt(rfc4106(gcm(aes))))\x00'}, 0x80, &(0x7f0000398000)=[{&(0x7f0000697000)="80", 0x1}], 0x1}, 0x0) 2018/04/30 20:08:41 executing program 6: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000080)='fdinfo/3\x00') exit(0x0) pread64(r0, &(0x7f00000000c0)=""/100, 0x64, 0x0) 2018/04/30 20:08:41 executing program 4: r0 = add_key$keyring(&(0x7f0000000180)='keyring\x00', &(0x7f00000001c0)={0x73, 0x79, 0x7a}, 0x0, 0x0, 0xfffffffffffffffe) r1 = add_key$keyring(&(0x7f00000000c0)='keyring\x00', &(0x7f0000000100)={0x73, 0x79, 0x7a}, 0x0, 0x0, r0) r2 = add_key$user(&(0x7f000038b000)='user\x00', &(0x7f000057f000)={0x73, 0x79, 0x7a}, &(0x7f0000d6c000)='1', 0x1, r1) keyctl$setperm(0x5, r1, 0x0) keyctl$unlink(0xf, r2, 0x0) 2018/04/30 20:08:41 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = syz_open_dev$tun(&(0x7f0000000180)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f00000001c0)={'syzkaller0\x00', 0x1002}) ioctl$sock_inet_SIOCSIFADDR(r0, 0x8916, &(0x7f0000000040)={'syzkaller0\x00', {0x2, 0x0, @rand_addr=0x80000000}}) ioctl$sock_inet_SIOCSIFNETMASK(r0, 0x891c, &(0x7f0000000080)={'syzkaller0\x00', {0x2}}) 2018/04/30 20:08:41 executing program 1: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$inet6_MRT6_ADD_MIF(r0, 0x29, 0xca, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x5}, 0xab) setsockopt$inet6_int(r0, 0x29, 0xcb, &(0x7f0000000080), 0x4) 2018/04/30 20:08:41 executing program 7: r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000001000)={0x1, {{0xa, 0x0, 0x0, @mcast2={0xff, 0x2, [], 0x1}}}, {{0xa, 0x0, 0x0, @local={0xfe, 0x80, [], 0xffffffffffffffff}}}}, 0x108) r1 = syz_open_procfs(0x0, &(0x7f000012bff2)='net/mcfilter6\x00') setsockopt$inet6_MCAST_MSFILTER(r0, 0x29, 0x30, &(0x7f0000f46000)={0x1, {{0xa, 0x0, 0x0, @mcast2={0xff, 0x2, [], 0x1}}}, 0x0, 0x2, [{{0xa, 0x0, 0x0, @local={0xfe, 0x80, [], 0xffffffffffffffff}}}, {{0xa, 0x0, 0x0, @mcast2={0xff, 0x2, [], 0x1}}}]}, 0x190) preadv(r1, &(0x7f0000000000)=[{&(0x7f0000000180)=""/159, 0x9f}], 0x1, 0x4000) 2018/04/30 20:08:41 executing program 4: r0 = add_key$keyring(&(0x7f0000000180)='keyring\x00', &(0x7f00000001c0)={0x73, 0x79, 0x7a}, 0x0, 0x0, 0xfffffffffffffffe) r1 = add_key$keyring(&(0x7f00000000c0)='keyring\x00', &(0x7f0000000100)={0x73, 0x79, 0x7a}, 0x0, 0x0, r0) r2 = add_key$user(&(0x7f000038b000)='user\x00', &(0x7f000057f000)={0x73, 0x79, 0x7a}, &(0x7f0000d6c000)='1', 0x1, r1) keyctl$setperm(0x5, r1, 0x0) keyctl$unlink(0xf, r2, 0x0) 2018/04/30 20:08:41 executing program 5: r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000001000)={0x1, {{0xa, 0x0, 0x0, @mcast2={0xff, 0x2, [], 0x1}}}, {{0xa, 0x0, 0x0, @local={0xfe, 0x80, [], 0xffffffffffffffff}}}}, 0x108) r1 = syz_open_procfs(0x0, &(0x7f000012bff2)='net/mcfilter6\x00') setsockopt$inet6_MCAST_MSFILTER(r0, 0x29, 0x30, &(0x7f0000f46000)={0x1, {{0xa, 0x0, 0x0, @mcast2={0xff, 0x2, [], 0x1}}}, 0x0, 0x2, [{{0xa, 0x0, 0x0, @local={0xfe, 0x80, [], 0xffffffffffffffff}}}, {{0xa, 0x0, 0x0, @mcast2={0xff, 0x2, [], 0x1}}}]}, 0x190) preadv(r1, &(0x7f0000000000)=[{&(0x7f0000000180)=""/159, 0x9f}], 0x1, 0x4000) 2018/04/30 20:08:41 executing program 7: r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000001000)={0x1, {{0xa, 0x0, 0x0, @mcast2={0xff, 0x2, [], 0x1}}}, {{0xa, 0x0, 0x0, @local={0xfe, 0x80, [], 0xffffffffffffffff}}}}, 0x108) r1 = syz_open_procfs(0x0, &(0x7f000012bff2)='net/mcfilter6\x00') setsockopt$inet6_MCAST_MSFILTER(r0, 0x29, 0x30, &(0x7f0000f46000)={0x1, {{0xa, 0x0, 0x0, @mcast2={0xff, 0x2, [], 0x1}}}, 0x0, 0x2, [{{0xa, 0x0, 0x0, @local={0xfe, 0x80, [], 0xffffffffffffffff}}}, {{0xa, 0x0, 0x0, @mcast2={0xff, 0x2, [], 0x1}}}]}, 0x190) preadv(r1, &(0x7f0000000000)=[{&(0x7f0000000180)=""/159, 0x9f}], 0x1, 0x4000) 2018/04/30 20:08:41 executing program 1: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$inet6_MRT6_ADD_MIF(r0, 0x29, 0xca, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x5}, 0xab) setsockopt$inet6_int(r0, 0x29, 0xcb, &(0x7f0000000080), 0x4) 2018/04/30 20:08:42 executing program 2: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f0000deb000)={0x2, 0x4e23, @broadcast=0xffffffff}, 0x6c) sendto$inet(r0, &(0x7f0000000000), 0x0, 0x20000802, &(0x7f0000000000)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0xa}}, 0x10) sendto$inet(r0, &(0x7f0000000240)="a9", 0x1, 0x0, &(0x7f0000000300)={0x2, 0x0, @dev={0xac, 0x14, 0x14}}, 0x10) close(r0) 2018/04/30 20:08:42 executing program 5: r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000001000)={0x1, {{0xa, 0x0, 0x0, @mcast2={0xff, 0x2, [], 0x1}}}, {{0xa, 0x0, 0x0, @local={0xfe, 0x80, [], 0xffffffffffffffff}}}}, 0x108) r1 = syz_open_procfs(0x0, &(0x7f000012bff2)='net/mcfilter6\x00') setsockopt$inet6_MCAST_MSFILTER(r0, 0x29, 0x30, &(0x7f0000f46000)={0x1, {{0xa, 0x0, 0x0, @mcast2={0xff, 0x2, [], 0x1}}}, 0x0, 0x2, [{{0xa, 0x0, 0x0, @local={0xfe, 0x80, [], 0xffffffffffffffff}}}, {{0xa, 0x0, 0x0, @mcast2={0xff, 0x2, [], 0x1}}}]}, 0x190) preadv(r1, &(0x7f0000000000)=[{&(0x7f0000000180)=""/159, 0x9f}], 0x1, 0x4000) 2018/04/30 20:08:42 executing program 7: r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000001000)={0x1, {{0xa, 0x0, 0x0, @mcast2={0xff, 0x2, [], 0x1}}}, {{0xa, 0x0, 0x0, @local={0xfe, 0x80, [], 0xffffffffffffffff}}}}, 0x108) r1 = syz_open_procfs(0x0, &(0x7f000012bff2)='net/mcfilter6\x00') setsockopt$inet6_MCAST_MSFILTER(r0, 0x29, 0x30, &(0x7f0000f46000)={0x1, {{0xa, 0x0, 0x0, @mcast2={0xff, 0x2, [], 0x1}}}, 0x0, 0x2, [{{0xa, 0x0, 0x0, @local={0xfe, 0x80, [], 0xffffffffffffffff}}}, {{0xa, 0x0, 0x0, @mcast2={0xff, 0x2, [], 0x1}}}]}, 0x190) preadv(r1, &(0x7f0000000000)=[{&(0x7f0000000180)=""/159, 0x9f}], 0x1, 0x4000) 2018/04/30 20:08:42 executing program 1: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$inet6_MRT6_ADD_MIF(r0, 0x29, 0xca, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x5}, 0xab) setsockopt$inet6_int(r0, 0x29, 0xcb, &(0x7f0000000080), 0x4) 2018/04/30 20:08:42 executing program 3: r0 = gettid() rt_sigprocmask(0x0, &(0x7f0000032ff8)={0xfffffffffffffffe}, 0x0, 0x8) timer_create(0x0, &(0x7f0000d61000)={0x0, 0x12, 0x4, @tid=r0}, &(0x7f0000044000)) timer_settime(0x0, 0x0, &(0x7f0000040fe0)={{0x0, 0x989680}, {0x0, 0x9}}, &(0x7f0000040000)) ppoll(&(0x7f0000ae7000), 0x0, &(0x7f0000845ff0), &(0x7f000079dff8), 0x8) 2018/04/30 20:08:42 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = syz_open_dev$tun(&(0x7f0000000180)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f00000001c0)={'syzkaller0\x00', 0x1002}) ioctl$sock_inet_SIOCSIFADDR(r0, 0x8916, &(0x7f0000000040)={'syzkaller0\x00', {0x2, 0x0, @rand_addr=0x80000000}}) ioctl$sock_inet_SIOCSIFNETMASK(r0, 0x891c, &(0x7f0000000080)={'syzkaller0\x00', {0x2}}) 2018/04/30 20:08:42 executing program 6: perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x13000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x3, 0xfffffffffffffffc}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 2018/04/30 20:08:42 executing program 4: r0 = socket(0xa, 0x2, 0x0) r1 = open(&(0x7f00004b8ff8)='./file0\x00', 0x28042, 0x0) sendmsg$IPVS_CMD_GET_SERVICE(0xffffffffffffffff, &(0x7f00000001c0)={&(0x7f00000000c0)={0x10}, 0xc, &(0x7f0000000180)={&(0x7f0000000140)=ANY=[]}, 0x1}, 0x0) connect$inet6(r0, &(0x7f0000d3cfe4)={0xa, 0x0, 0x0, @local={0xfe, 0x80, [], 0xaa}, 0x3}, 0x1c) fallocate(r1, 0x0, 0xffff, 0x1f) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x509}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r2, 0x107, 0x12, &(0x7f000095bffc)={0x0, 0x0, 0xfffffffffffffffc}, 0x4) r3 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$inet_sctp_SCTP_PRIMARY_ADDR(0xffffffffffffffff, 0x84, 0x6, &(0x7f0000000280)={0x0, @in={{0x2, 0x0, @remote={0xac, 0x14, 0x14, 0xbb}}}}, &(0x7f0000000340)=0x84) connect$inet(r3, &(0x7f0000000040)={0x2, 0x0, @local={0xac, 0x14, 0x14, 0xaa}}, 0x10) sendto$inet(r3, &(0x7f0000762fff), 0xfdc7, 0x0, &(0x7f000057bff0)={0x2, 0x4e20, @multicast1=0xe0000001}, 0x10) sendfile(r0, r1, &(0x7f00005faff8), 0xfffb) 2018/04/30 20:08:42 executing program 7: r0 = socket(0x10, 0x3, 0x0) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f00006ba000)={0x2, &(0x7f0000000000)=[{0x20, 0x0, 0x0, 0xffff7ffffffff038}, {0x6}]}, 0x10) sendmsg$nl_crypto(r0, &(0x7f00000001c0)={&(0x7f0000000040)={0x10}, 0xc, &(0x7f0000000180)={&(0x7f0000000080)=@get={0xe0, 0x13, 0x103, 0x0, 0x0, {{'drbg_nopr_ctr_aes256\x00'}}}, 0xe0}, 0x1}, 0x0) 2018/04/30 20:08:42 executing program 1: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$inet6_MRT6_ADD_MIF(r0, 0x29, 0xca, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x5}, 0xab) setsockopt$inet6_int(r0, 0x29, 0xcb, &(0x7f0000000080), 0x4) 2018/04/30 20:08:42 executing program 2: rt_sigaction(0x400000000000007, &(0x7f0000000000)={0x400573, {0xffffffffffffffe4}}, &(0x7f0000000080), 0x8, &(0x7f0000000040)) mmap(&(0x7f0000000000/0x95c000)=nil, 0x95c000, 0x1, 0x44031, 0xffffffffffffffff, 0x0) syz_open_procfs(0x0, &(0x7f00000000c0)='net/icmp\x00') 2018/04/30 20:08:42 executing program 6: setsockopt$inet_sctp_SCTP_RTOINFO(0xffffffffffffffff, 0x84, 0x0, &(0x7f0000001000)={0x10000, 0x4, 0x100, 0x400}, 0xd0) r0 = socket(0x11, 0x4000000000080002, 0x0) setsockopt(r0, 0x107, 0xd, &(0x7f0000001000), 0xaf1) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000040)={'lo\x00', 0x0}) bind$packet(r0, &(0x7f0000000200)={0x11, 0x0, r1, 0x1, 0x0, 0x6, @local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}}, 0x14) sendmmsg$inet_sctp(r0, &(0x7f0000871fc8)=[{&(0x7f000086c000)=@in6={0xa, 0x0, 0x2}, 0x1c, &(0x7f0000d1e000), 0x0, &(0x7f0000dda000)}], 0x492492492492510, 0x0) 2018/04/30 20:08:42 executing program 5: r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000001000)={0x1, {{0xa, 0x0, 0x0, @mcast2={0xff, 0x2, [], 0x1}}}, {{0xa, 0x0, 0x0, @local={0xfe, 0x80, [], 0xffffffffffffffff}}}}, 0x108) r1 = syz_open_procfs(0x0, &(0x7f000012bff2)='net/mcfilter6\x00') setsockopt$inet6_MCAST_MSFILTER(r0, 0x29, 0x30, &(0x7f0000f46000)={0x1, {{0xa, 0x0, 0x0, @mcast2={0xff, 0x2, [], 0x1}}}, 0x0, 0x2, [{{0xa, 0x0, 0x0, @local={0xfe, 0x80, [], 0xffffffffffffffff}}}, {{0xa, 0x0, 0x0, @mcast2={0xff, 0x2, [], 0x1}}}]}, 0x190) preadv(r1, &(0x7f0000000000)=[{&(0x7f0000000180)=""/159, 0x9f}], 0x1, 0x4000) 2018/04/30 20:08:42 executing program 3: r0 = gettid() rt_sigprocmask(0x0, &(0x7f0000032ff8)={0xfffffffffffffffe}, 0x0, 0x8) timer_create(0x0, &(0x7f0000d61000)={0x0, 0x12, 0x4, @tid=r0}, &(0x7f0000044000)) timer_settime(0x0, 0x0, &(0x7f0000040fe0)={{0x0, 0x989680}, {0x0, 0x9}}, &(0x7f0000040000)) ppoll(&(0x7f0000ae7000), 0x0, &(0x7f0000845ff0), &(0x7f000079dff8), 0x8) 2018/04/30 20:08:42 executing program 1: ioctl$sock_SIOCBRADDBR(0xffffffffffffffff, 0x89a0, &(0x7f0000000200)='dummy0\x00') sendmsg$IPVS_CMD_DEL_DEST(0xffffffffffffffff, &(0x7f0000000400)={&(0x7f0000000180)={0x10}, 0xc, &(0x7f00000003c0)={&(0x7f0000000900)=ANY=[@ANYBLOB="85b1243151758dd7f7455eb7727d297dc0a531b63c1bb9cebe2568da6ff4598e487b821fa079864f3ac61f72f7bc72d2c1b784666194f0042f68cc5b9dd88da007fea15081effd8de44bc106bb68247d2d440f1ecd89d5f82c443cecfd23"], 0x1}, 0x1, 0x0, 0x0, 0x48001}, 0x0) r0 = perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$SNDRV_TIMER_IOCTL_PAUSE(r1, 0x54a3) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000040)={0x0, 0x0}, &(0x7f0000000080)=0xc) getsockopt$inet_sctp_SCTP_PEER_AUTH_CHUNKS(r1, 0x84, 0x1a, &(0x7f0000000500)=ANY=[@ANYBLOB="6a0000005b5da5c90a99f14168b0aaea930eef3845a8fcc15d37ec6eaf8620f4952548e859b6725412836d2b1856cccc4aa938867f6a5c41721a95c2b063c6d0f9731e748ba78b5de7503842fb3ac82793b5c0a5bbe8e3d19138334f189c4ba005522008a318c52047ce87069d785e1d7b8786fa2373"], &(0x7f0000000340)=0x1) ioctl$SNDRV_TIMER_IOCTL_CONTINUE(r1, 0x54a2) fcntl$lock(0xffffffffffffffff, 0x0, &(0x7f0000000140)={0x0, 0x0, 0x8, 0x0, r2}) r4 = memfd_create(&(0x7f0000000ffe)='$\x00', 0x0) write(r4, &(0x7f0000002000)='/', 0x1) perf_event_open(&(0x7f0000000a80)={0x0, 0x70, 0x1000, 0x3ff, 0x9, 0x1, 0x0, 0x100000000, 0x10, 0x6, 0x403000000000, 0x7, 0x8000, 0x7, 0x0, 0x6, 0x79, 0x7, 0x101, 0xff, 0x3ff, 0x81, 0x3f, 0x0, 0x1, 0x100000001, 0x1, 0x0, 0x0, 0x9, 0xd768, 0x100, 0x0, 0x0, 0x2, 0x5, 0x0, 0x0, 0x0, 0x7f, 0x0, @perf_config_ext={0x80000000, 0x9}, 0x0, 0x0, 0x3, 0x0, 0x0, 0xffff, 0x40}, r2, 0x0, r0, 0x1) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000640)='./cgroup/syz0\x00', 0x1ff) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000740)='./cgroup/syz1\x00', 0x1ff) pwrite64(r0, &(0x7f0000000580)="3d4dea132d484c9992e14d7e07a998cc609d8194044e57b0e202b698e5226b95f0cbe9d569886fbdd9fb4e28d6ee06009fa98650aca1", 0x36, 0x0) getsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(r4, 0x84, 0x18, &(0x7f0000000780)={0x0, 0x4e}, &(0x7f00000007c0)=0x8) getsockopt$inet_sctp6_SCTP_GET_ASSOC_STATS(0xffffffffffffffff, 0x84, 0x70, &(0x7f0000000800)={0x0, @in={{0x2, 0x4e22, @multicast2=0xe0000002}}, [0x0, 0x6, 0x0, 0x0, 0x8, 0x10001, 0x60, 0x0, 0x400, 0x1, 0x400, 0x10001, 0x3ff, 0x0, 0x7]}, &(0x7f0000000b40)=0x100) getsockopt$inet_sctp6_SCTP_PR_ASSOC_STATUS(r1, 0x84, 0x73, &(0x7f0000000680)={0x0, 0x0, 0x0, 0x0, 0x8}, &(0x7f00000006c0)=0x18) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDRS(0xffffffffffffffff, 0x84, 0x6c, &(0x7f0000000bc0)=ANY=[], &(0x7f0000000b00)) getsockopt$bt_l2cap_L2CAP_CONNINFO(r1, 0x6, 0x2, &(0x7f0000000a00), &(0x7f0000000700)=0xff9d) sendfile(r4, r4, &(0x7f0000001000), 0xfec) ioctl$PERF_EVENT_IOC_DISABLE(0xffffffffffffffff, 0x2401, 0x0) ioprio_get$uid(0x0, r3) ioctl$DRM_IOCTL_MODESET_CTL(0xffffffffffffffff, 0x40086408, &(0x7f0000001580)={0x0, 0xfffffffffffffff9}) [ 57.909316] netlink: 192 bytes leftover after parsing attributes in process `syz-executor7'. [ 57.972542] netlink: 192 bytes leftover after parsing attributes in process `syz-executor7'. 2018/04/30 20:08:43 executing program 6: setsockopt$inet_sctp_SCTP_RTOINFO(0xffffffffffffffff, 0x84, 0x0, &(0x7f0000001000)={0x10000, 0x4, 0x100, 0x400}, 0xd0) r0 = socket(0x11, 0x4000000000080002, 0x0) setsockopt(r0, 0x107, 0xd, &(0x7f0000001000), 0xaf1) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000040)={'lo\x00', 0x0}) bind$packet(r0, &(0x7f0000000200)={0x11, 0x0, r1, 0x1, 0x0, 0x6, @local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}}, 0x14) sendmmsg$inet_sctp(r0, &(0x7f0000871fc8)=[{&(0x7f000086c000)=@in6={0xa, 0x0, 0x2}, 0x1c, &(0x7f0000d1e000), 0x0, &(0x7f0000dda000)}], 0x492492492492510, 0x0) 2018/04/30 20:08:43 executing program 5: r0 = memfd_create(&(0x7f0000002000)="2f7b06003170707031253a656d30f9", 0x0) write$evdev(r0, &(0x7f0000001000)=[{{}, 0x0, 0x0, 0x80000004}], 0x18) mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x4, 0x11, r0, 0x0) timer_settime(0x0, 0x0, &(0x7f0000001000)={{}, {0x0, 0x989680}}, &(0x7f0000005000)) 2018/04/30 20:08:43 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = syz_open_dev$tun(&(0x7f0000000180)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f00000001c0)={'syzkaller0\x00', 0x1002}) ioctl$sock_inet_SIOCSIFADDR(r0, 0x8916, &(0x7f0000000040)={'syzkaller0\x00', {0x2, 0x0, @rand_addr=0x80000000}}) ioctl$sock_inet_SIOCSIFNETMASK(r0, 0x891c, &(0x7f0000000080)={'syzkaller0\x00', {0x2}}) 2018/04/30 20:08:43 executing program 2: r0 = openat(0xffffffffffffffff, &(0x7f0000000100)='./file0\x00', 0x0, 0x10d) recvmsg(r0, &(0x7f0000000480)={&(0x7f0000000140)=@vsock={0x0, 0x0, 0x0, @host}, 0x80, &(0x7f0000000380)=[{&(0x7f00000001c0)=""/226, 0xe2}, {&(0x7f00000002c0)=""/175, 0xaf}], 0x2, &(0x7f00000003c0)=""/160, 0xa0, 0x7ff}, 0x2000) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mlockall(0x5) sigaltstack(&(0x7f0000ffe000/0x2000)=nil, &(0x7f00000000c0)) munlockall() 2018/04/30 20:08:43 executing program 3: r0 = gettid() rt_sigprocmask(0x0, &(0x7f0000032ff8)={0xfffffffffffffffe}, 0x0, 0x8) timer_create(0x0, &(0x7f0000d61000)={0x0, 0x12, 0x4, @tid=r0}, &(0x7f0000044000)) timer_settime(0x0, 0x0, &(0x7f0000040fe0)={{0x0, 0x989680}, {0x0, 0x9}}, &(0x7f0000040000)) ppoll(&(0x7f0000ae7000), 0x0, &(0x7f0000845ff0), &(0x7f000079dff8), 0x8) 2018/04/30 20:08:43 executing program 4: r0 = socket(0xa, 0x2, 0x0) r1 = open(&(0x7f00004b8ff8)='./file0\x00', 0x28042, 0x0) sendmsg$IPVS_CMD_GET_SERVICE(0xffffffffffffffff, &(0x7f00000001c0)={&(0x7f00000000c0)={0x10}, 0xc, &(0x7f0000000180)={&(0x7f0000000140)=ANY=[]}, 0x1}, 0x0) connect$inet6(r0, &(0x7f0000d3cfe4)={0xa, 0x0, 0x0, @local={0xfe, 0x80, [], 0xaa}, 0x3}, 0x1c) fallocate(r1, 0x0, 0xffff, 0x1f) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x509}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r2, 0x107, 0x12, &(0x7f000095bffc)={0x0, 0x0, 0xfffffffffffffffc}, 0x4) r3 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$inet_sctp_SCTP_PRIMARY_ADDR(0xffffffffffffffff, 0x84, 0x6, &(0x7f0000000280)={0x0, @in={{0x2, 0x0, @remote={0xac, 0x14, 0x14, 0xbb}}}}, &(0x7f0000000340)=0x84) connect$inet(r3, &(0x7f0000000040)={0x2, 0x0, @local={0xac, 0x14, 0x14, 0xaa}}, 0x10) sendto$inet(r3, &(0x7f0000762fff), 0xfdc7, 0x0, &(0x7f000057bff0)={0x2, 0x4e20, @multicast1=0xe0000001}, 0x10) sendfile(r0, r1, &(0x7f00005faff8), 0xfffb) 2018/04/30 20:08:43 executing program 7: r0 = socket(0x10, 0x3, 0x0) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f00006ba000)={0x2, &(0x7f0000000000)=[{0x20, 0x0, 0x0, 0xffff7ffffffff038}, {0x6}]}, 0x10) sendmsg$nl_crypto(r0, &(0x7f00000001c0)={&(0x7f0000000040)={0x10}, 0xc, &(0x7f0000000180)={&(0x7f0000000080)=@get={0xe0, 0x13, 0x103, 0x0, 0x0, {{'drbg_nopr_ctr_aes256\x00'}}}, 0xe0}, 0x1}, 0x0) 2018/04/30 20:08:43 executing program 1: ioctl$sock_SIOCBRADDBR(0xffffffffffffffff, 0x89a0, &(0x7f0000000200)='dummy0\x00') sendmsg$IPVS_CMD_DEL_DEST(0xffffffffffffffff, &(0x7f0000000400)={&(0x7f0000000180)={0x10}, 0xc, &(0x7f00000003c0)={&(0x7f0000000900)=ANY=[@ANYBLOB="85b1243151758dd7f7455eb7727d297dc0a531b63c1bb9cebe2568da6ff4598e487b821fa079864f3ac61f72f7bc72d2c1b784666194f0042f68cc5b9dd88da007fea15081effd8de44bc106bb68247d2d440f1ecd89d5f82c443cecfd23"], 0x1}, 0x1, 0x0, 0x0, 0x48001}, 0x0) r0 = perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$SNDRV_TIMER_IOCTL_PAUSE(r1, 0x54a3) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000040)={0x0, 0x0}, &(0x7f0000000080)=0xc) getsockopt$inet_sctp_SCTP_PEER_AUTH_CHUNKS(r1, 0x84, 0x1a, &(0x7f0000000500)=ANY=[@ANYBLOB="6a0000005b5da5c90a99f14168b0aaea930eef3845a8fcc15d37ec6eaf8620f4952548e859b6725412836d2b1856cccc4aa938867f6a5c41721a95c2b063c6d0f9731e748ba78b5de7503842fb3ac82793b5c0a5bbe8e3d19138334f189c4ba005522008a318c52047ce87069d785e1d7b8786fa2373"], &(0x7f0000000340)=0x1) ioctl$SNDRV_TIMER_IOCTL_CONTINUE(r1, 0x54a2) fcntl$lock(0xffffffffffffffff, 0x0, &(0x7f0000000140)={0x0, 0x0, 0x8, 0x0, r2}) r4 = memfd_create(&(0x7f0000000ffe)='$\x00', 0x0) write(r4, &(0x7f0000002000)='/', 0x1) perf_event_open(&(0x7f0000000a80)={0x0, 0x70, 0x1000, 0x3ff, 0x9, 0x1, 0x0, 0x100000000, 0x10, 0x6, 0x403000000000, 0x7, 0x8000, 0x7, 0x0, 0x6, 0x79, 0x7, 0x101, 0xff, 0x3ff, 0x81, 0x3f, 0x0, 0x1, 0x100000001, 0x1, 0x0, 0x0, 0x9, 0xd768, 0x100, 0x0, 0x0, 0x2, 0x5, 0x0, 0x0, 0x0, 0x7f, 0x0, @perf_config_ext={0x80000000, 0x9}, 0x0, 0x0, 0x3, 0x0, 0x0, 0xffff, 0x40}, r2, 0x0, r0, 0x1) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000640)='./cgroup/syz0\x00', 0x1ff) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000740)='./cgroup/syz1\x00', 0x1ff) pwrite64(r0, &(0x7f0000000580)="3d4dea132d484c9992e14d7e07a998cc609d8194044e57b0e202b698e5226b95f0cbe9d569886fbdd9fb4e28d6ee06009fa98650aca1", 0x36, 0x0) getsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(r4, 0x84, 0x18, &(0x7f0000000780)={0x0, 0x4e}, &(0x7f00000007c0)=0x8) getsockopt$inet_sctp6_SCTP_GET_ASSOC_STATS(0xffffffffffffffff, 0x84, 0x70, &(0x7f0000000800)={0x0, @in={{0x2, 0x4e22, @multicast2=0xe0000002}}, [0x0, 0x6, 0x0, 0x0, 0x8, 0x10001, 0x60, 0x0, 0x400, 0x1, 0x400, 0x10001, 0x3ff, 0x0, 0x7]}, &(0x7f0000000b40)=0x100) getsockopt$inet_sctp6_SCTP_PR_ASSOC_STATUS(r1, 0x84, 0x73, &(0x7f0000000680)={0x0, 0x0, 0x0, 0x0, 0x8}, &(0x7f00000006c0)=0x18) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDRS(0xffffffffffffffff, 0x84, 0x6c, &(0x7f0000000bc0)=ANY=[], &(0x7f0000000b00)) getsockopt$bt_l2cap_L2CAP_CONNINFO(r1, 0x6, 0x2, &(0x7f0000000a00), &(0x7f0000000700)=0xff9d) sendfile(r4, r4, &(0x7f0000001000), 0xfec) ioctl$PERF_EVENT_IOC_DISABLE(0xffffffffffffffff, 0x2401, 0x0) ioprio_get$uid(0x0, r3) ioctl$DRM_IOCTL_MODESET_CTL(0xffffffffffffffff, 0x40086408, &(0x7f0000001580)={0x0, 0xfffffffffffffff9}) 2018/04/30 20:08:43 executing program 5: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pipe2(&(0x7f0000000480)={0xffffffffffffffff}, 0x0) close(r0) ioctl$EVIOCGBITSW(0xffffffffffffffff, 0x80404525, &(0x7f0000000180)=""/82) 2018/04/30 20:08:43 executing program 3: r0 = gettid() rt_sigprocmask(0x0, &(0x7f0000032ff8)={0xfffffffffffffffe}, 0x0, 0x8) timer_create(0x0, &(0x7f0000d61000)={0x0, 0x12, 0x4, @tid=r0}, &(0x7f0000044000)) timer_settime(0x0, 0x0, &(0x7f0000040fe0)={{0x0, 0x989680}, {0x0, 0x9}}, &(0x7f0000040000)) ppoll(&(0x7f0000ae7000), 0x0, &(0x7f0000845ff0), &(0x7f000079dff8), 0x8) [ 58.213046] netlink: 192 bytes leftover after parsing attributes in process `syz-executor7'. 2018/04/30 20:08:43 executing program 7: r0 = socket(0x10, 0x3, 0x0) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f00006ba000)={0x2, &(0x7f0000000000)=[{0x20, 0x0, 0x0, 0xffff7ffffffff038}, {0x6}]}, 0x10) sendmsg$nl_crypto(r0, &(0x7f00000001c0)={&(0x7f0000000040)={0x10}, 0xc, &(0x7f0000000180)={&(0x7f0000000080)=@get={0xe0, 0x13, 0x103, 0x0, 0x0, {{'drbg_nopr_ctr_aes256\x00'}}}, 0xe0}, 0x1}, 0x0) 2018/04/30 20:08:43 executing program 3: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000880)='./file0\x00', &(0x7f00000008c0)='hugetlbfs\x00', 0x0, 0x0) r0 = open(&(0x7f00000002c0)='./file0/bus\x00', 0x42, 0x0) fallocate(r0, 0x3, 0x0, 0x80000400) 2018/04/30 20:08:43 executing program 6: setsockopt$inet_sctp_SCTP_RTOINFO(0xffffffffffffffff, 0x84, 0x0, &(0x7f0000001000)={0x10000, 0x4, 0x100, 0x400}, 0xd0) r0 = socket(0x11, 0x4000000000080002, 0x0) setsockopt(r0, 0x107, 0xd, &(0x7f0000001000), 0xaf1) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000040)={'lo\x00', 0x0}) bind$packet(r0, &(0x7f0000000200)={0x11, 0x0, r1, 0x1, 0x0, 0x6, @local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}}, 0x14) sendmmsg$inet_sctp(r0, &(0x7f0000871fc8)=[{&(0x7f000086c000)=@in6={0xa, 0x0, 0x2}, 0x1c, &(0x7f0000d1e000), 0x0, &(0x7f0000dda000)}], 0x492492492492510, 0x0) 2018/04/30 20:08:43 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = syz_open_dev$tun(&(0x7f0000000180)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f00000001c0)={'syzkaller0\x00', 0x1002}) ioctl$sock_inet_SIOCSIFADDR(r0, 0x8916, &(0x7f0000000040)={'syzkaller0\x00', {0x2, 0x0, @rand_addr=0x80000000}}) ioctl$sock_inet_SIOCSIFNETMASK(r0, 0x891c, &(0x7f0000000080)={'syzkaller0\x00', {0x2}}) [ 58.299170] netlink: 192 bytes leftover after parsing attributes in process `syz-executor7'. 2018/04/30 20:08:43 executing program 3: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000880)='./file0\x00', &(0x7f00000008c0)='hugetlbfs\x00', 0x0, 0x0) r0 = open(&(0x7f00000002c0)='./file0/bus\x00', 0x42, 0x0) fallocate(r0, 0x3, 0x0, 0x80000400) 2018/04/30 20:08:43 executing program 7: r0 = socket(0x10, 0x3, 0x0) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f00006ba000)={0x2, &(0x7f0000000000)=[{0x20, 0x0, 0x0, 0xffff7ffffffff038}, {0x6}]}, 0x10) sendmsg$nl_crypto(r0, &(0x7f00000001c0)={&(0x7f0000000040)={0x10}, 0xc, &(0x7f0000000180)={&(0x7f0000000080)=@get={0xe0, 0x13, 0x103, 0x0, 0x0, {{'drbg_nopr_ctr_aes256\x00'}}}, 0xe0}, 0x1}, 0x0) 2018/04/30 20:08:43 executing program 6: setsockopt$inet_sctp_SCTP_RTOINFO(0xffffffffffffffff, 0x84, 0x0, &(0x7f0000001000)={0x10000, 0x4, 0x100, 0x400}, 0xd0) r0 = socket(0x11, 0x4000000000080002, 0x0) setsockopt(r0, 0x107, 0xd, &(0x7f0000001000), 0xaf1) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000040)={'lo\x00', 0x0}) bind$packet(r0, &(0x7f0000000200)={0x11, 0x0, r1, 0x1, 0x0, 0x6, @local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}}, 0x14) sendmmsg$inet_sctp(r0, &(0x7f0000871fc8)=[{&(0x7f000086c000)=@in6={0xa, 0x0, 0x2}, 0x1c, &(0x7f0000d1e000), 0x0, &(0x7f0000dda000)}], 0x492492492492510, 0x0) 2018/04/30 20:08:43 executing program 5: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pipe2(&(0x7f0000000480)={0xffffffffffffffff}, 0x0) close(r0) ioctl$EVIOCGBITSW(0xffffffffffffffff, 0x80404525, &(0x7f0000000180)=""/82) [ 58.411195] netlink: 192 bytes leftover after parsing attributes in process `syz-executor7'. 2018/04/30 20:08:43 executing program 6: r0 = socket$packet(0x11, 0x3, 0x300) r1 = syz_open_dev$tun(&(0x7f00000000c0)='/dev/net/tun\x00', 0x0, 0x81) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000180)={'bridge0\x00', 0x1001}) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000080)={'bridge0\x00', 0x2001}) pwrite64(r1, &(0x7f0000000000)="9f", 0x1, 0x0) 2018/04/30 20:08:43 executing program 7: syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f0000000100)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000010000)="eb3c906d6b66732e66617400020401000200077008f8", 0x16}], 0x0, &(0x7f0000000240)=ANY=[]) perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) truncate(&(0x7f00000004c0)='./file0\x00', 0x0) syz_mount_image$btrfs(&(0x7f00000001c0)='btrfs\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0xaaaaaaaaaaaab60, &(0x7f0000000440), 0x0, &(0x7f0000000500)) unshare(0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x22, &(0x7f0000000640)={{{@in=@dev, @in=@multicast2}}, {{@in6=@ipv4={[], [], @multicast2}}, 0x0, @in6=@dev}}, &(0x7f00000002c0)=0xe8) getsockopt$inet_sctp_SCTP_STREAM_SCHEDULER_VALUE(0xffffffffffffff9c, 0x84, 0x7c, &(0x7f0000000140), &(0x7f0000000180)=0x8) 2018/04/30 20:08:43 executing program 3: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000880)='./file0\x00', &(0x7f00000008c0)='hugetlbfs\x00', 0x0, 0x0) r0 = open(&(0x7f00000002c0)='./file0/bus\x00', 0x42, 0x0) fallocate(r0, 0x3, 0x0, 0x80000400) 2018/04/30 20:08:43 executing program 5: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pipe2(&(0x7f0000000480)={0xffffffffffffffff}, 0x0) close(r0) ioctl$EVIOCGBITSW(0xffffffffffffffff, 0x80404525, &(0x7f0000000180)=""/82) 2018/04/30 20:08:43 executing program 1: ioctl$sock_SIOCBRADDBR(0xffffffffffffffff, 0x89a0, &(0x7f0000000200)='dummy0\x00') sendmsg$IPVS_CMD_DEL_DEST(0xffffffffffffffff, &(0x7f0000000400)={&(0x7f0000000180)={0x10}, 0xc, &(0x7f00000003c0)={&(0x7f0000000900)=ANY=[@ANYBLOB="85b1243151758dd7f7455eb7727d297dc0a531b63c1bb9cebe2568da6ff4598e487b821fa079864f3ac61f72f7bc72d2c1b784666194f0042f68cc5b9dd88da007fea15081effd8de44bc106bb68247d2d440f1ecd89d5f82c443cecfd23"], 0x1}, 0x1, 0x0, 0x0, 0x48001}, 0x0) r0 = perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$SNDRV_TIMER_IOCTL_PAUSE(r1, 0x54a3) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000040)={0x0, 0x0}, &(0x7f0000000080)=0xc) getsockopt$inet_sctp_SCTP_PEER_AUTH_CHUNKS(r1, 0x84, 0x1a, &(0x7f0000000500)=ANY=[@ANYBLOB="6a0000005b5da5c90a99f14168b0aaea930eef3845a8fcc15d37ec6eaf8620f4952548e859b6725412836d2b1856cccc4aa938867f6a5c41721a95c2b063c6d0f9731e748ba78b5de7503842fb3ac82793b5c0a5bbe8e3d19138334f189c4ba005522008a318c52047ce87069d785e1d7b8786fa2373"], &(0x7f0000000340)=0x1) ioctl$SNDRV_TIMER_IOCTL_CONTINUE(r1, 0x54a2) fcntl$lock(0xffffffffffffffff, 0x0, &(0x7f0000000140)={0x0, 0x0, 0x8, 0x0, r2}) r4 = memfd_create(&(0x7f0000000ffe)='$\x00', 0x0) write(r4, &(0x7f0000002000)='/', 0x1) perf_event_open(&(0x7f0000000a80)={0x0, 0x70, 0x1000, 0x3ff, 0x9, 0x1, 0x0, 0x100000000, 0x10, 0x6, 0x403000000000, 0x7, 0x8000, 0x7, 0x0, 0x6, 0x79, 0x7, 0x101, 0xff, 0x3ff, 0x81, 0x3f, 0x0, 0x1, 0x100000001, 0x1, 0x0, 0x0, 0x9, 0xd768, 0x100, 0x0, 0x0, 0x2, 0x5, 0x0, 0x0, 0x0, 0x7f, 0x0, @perf_config_ext={0x80000000, 0x9}, 0x0, 0x0, 0x3, 0x0, 0x0, 0xffff, 0x40}, r2, 0x0, r0, 0x1) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000640)='./cgroup/syz0\x00', 0x1ff) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000740)='./cgroup/syz1\x00', 0x1ff) pwrite64(r0, &(0x7f0000000580)="3d4dea132d484c9992e14d7e07a998cc609d8194044e57b0e202b698e5226b95f0cbe9d569886fbdd9fb4e28d6ee06009fa98650aca1", 0x36, 0x0) getsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(r4, 0x84, 0x18, &(0x7f0000000780)={0x0, 0x4e}, &(0x7f00000007c0)=0x8) getsockopt$inet_sctp6_SCTP_GET_ASSOC_STATS(0xffffffffffffffff, 0x84, 0x70, &(0x7f0000000800)={0x0, @in={{0x2, 0x4e22, @multicast2=0xe0000002}}, [0x0, 0x6, 0x0, 0x0, 0x8, 0x10001, 0x60, 0x0, 0x400, 0x1, 0x400, 0x10001, 0x3ff, 0x0, 0x7]}, &(0x7f0000000b40)=0x100) getsockopt$inet_sctp6_SCTP_PR_ASSOC_STATUS(r1, 0x84, 0x73, &(0x7f0000000680)={0x0, 0x0, 0x0, 0x0, 0x8}, &(0x7f00000006c0)=0x18) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDRS(0xffffffffffffffff, 0x84, 0x6c, &(0x7f0000000bc0)=ANY=[], &(0x7f0000000b00)) getsockopt$bt_l2cap_L2CAP_CONNINFO(r1, 0x6, 0x2, &(0x7f0000000a00), &(0x7f0000000700)=0xff9d) sendfile(r4, r4, &(0x7f0000001000), 0xfec) ioctl$PERF_EVENT_IOC_DISABLE(0xffffffffffffffff, 0x2401, 0x0) ioprio_get$uid(0x0, r3) ioctl$DRM_IOCTL_MODESET_CTL(0xffffffffffffffff, 0x40086408, &(0x7f0000001580)={0x0, 0xfffffffffffffff9}) 2018/04/30 20:08:43 executing program 4: r0 = socket(0xa, 0x2, 0x0) r1 = open(&(0x7f00004b8ff8)='./file0\x00', 0x28042, 0x0) sendmsg$IPVS_CMD_GET_SERVICE(0xffffffffffffffff, &(0x7f00000001c0)={&(0x7f00000000c0)={0x10}, 0xc, &(0x7f0000000180)={&(0x7f0000000140)=ANY=[]}, 0x1}, 0x0) connect$inet6(r0, &(0x7f0000d3cfe4)={0xa, 0x0, 0x0, @local={0xfe, 0x80, [], 0xaa}, 0x3}, 0x1c) fallocate(r1, 0x0, 0xffff, 0x1f) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x509}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r2, 0x107, 0x12, &(0x7f000095bffc)={0x0, 0x0, 0xfffffffffffffffc}, 0x4) r3 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$inet_sctp_SCTP_PRIMARY_ADDR(0xffffffffffffffff, 0x84, 0x6, &(0x7f0000000280)={0x0, @in={{0x2, 0x0, @remote={0xac, 0x14, 0x14, 0xbb}}}}, &(0x7f0000000340)=0x84) connect$inet(r3, &(0x7f0000000040)={0x2, 0x0, @local={0xac, 0x14, 0x14, 0xaa}}, 0x10) sendto$inet(r3, &(0x7f0000762fff), 0xfdc7, 0x0, &(0x7f000057bff0)={0x2, 0x4e20, @multicast1=0xe0000001}, 0x10) sendfile(r0, r1, &(0x7f00005faff8), 0xfffb) 2018/04/30 20:08:43 executing program 2: r0 = openat(0xffffffffffffffff, &(0x7f0000000100)='./file0\x00', 0x0, 0x10d) recvmsg(r0, &(0x7f0000000480)={&(0x7f0000000140)=@vsock={0x0, 0x0, 0x0, @host}, 0x80, &(0x7f0000000380)=[{&(0x7f00000001c0)=""/226, 0xe2}, {&(0x7f00000002c0)=""/175, 0xaf}], 0x2, &(0x7f00000003c0)=""/160, 0xa0, 0x7ff}, 0x2000) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mlockall(0x5) sigaltstack(&(0x7f0000ffe000/0x2000)=nil, &(0x7f00000000c0)) munlockall() 2018/04/30 20:08:43 executing program 0: socket$inet6(0xa, 0x400000000001, 0x0) r0 = dup(0xffffffffffffffff) perf_event_open(&(0x7f0000000040)={0x1, 0x443, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TIOCGSID(r0, 0x5429, &(0x7f0000000280)) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r1, &(0x7f0000d65000)={&(0x7f0000de2ff4)={0x10}, 0xc, &(0x7f0000403000)={&(0x7f0000001a80)=ANY=[@ANYBLOB="140000000301ffff000000000000000002000000cdfbf76f179a4367f599"], 0x1e}, 0x1}, 0x0) getegid() stat(&(0x7f0000000e00)='./bus/file0\x00', &(0x7f0000000e40)) syz_genetlink_get_family_id$team(&(0x7f0000000140)='team\x00') getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000001100)={{{@in, @in=@dev}}, {{@in=@multicast2}, 0x0, @in6=@dev}}, &(0x7f0000001200)=0xe8) stat(&(0x7f0000001480)='./bus\x00', &(0x7f00000014c0)) [ 58.755830] FAT-fs (loop7): Directory bread(block 112) failed 2018/04/30 20:08:43 executing program 7: r0 = perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x72, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000100)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) flock(r0, 0x2) 2018/04/30 20:08:43 executing program 3: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000880)='./file0\x00', &(0x7f00000008c0)='hugetlbfs\x00', 0x0, 0x0) r0 = open(&(0x7f00000002c0)='./file0/bus\x00', 0x42, 0x0) fallocate(r0, 0x3, 0x0, 0x80000400) 2018/04/30 20:08:44 executing program 5: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pipe2(&(0x7f0000000480)={0xffffffffffffffff}, 0x0) close(r0) ioctl$EVIOCGBITSW(0xffffffffffffffff, 0x80404525, &(0x7f0000000180)=""/82) 2018/04/30 20:08:44 executing program 3: munmap(&(0x7f0000ffb000/0x2000)=nil, 0x2000) r0 = userfaultfd(0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000432fe8)={0xaa}) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000000000)={{&(0x7f0000ffc000/0x1000)=nil, 0x1000}, 0x1}) 2018/04/30 20:08:44 executing program 4: r0 = socket(0xa, 0x2, 0x0) r1 = open(&(0x7f00004b8ff8)='./file0\x00', 0x28042, 0x0) sendmsg$IPVS_CMD_GET_SERVICE(0xffffffffffffffff, &(0x7f00000001c0)={&(0x7f00000000c0)={0x10}, 0xc, &(0x7f0000000180)={&(0x7f0000000140)=ANY=[]}, 0x1}, 0x0) connect$inet6(r0, &(0x7f0000d3cfe4)={0xa, 0x0, 0x0, @local={0xfe, 0x80, [], 0xaa}, 0x3}, 0x1c) fallocate(r1, 0x0, 0xffff, 0x1f) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x509}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r2, 0x107, 0x12, &(0x7f000095bffc)={0x0, 0x0, 0xfffffffffffffffc}, 0x4) r3 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$inet_sctp_SCTP_PRIMARY_ADDR(0xffffffffffffffff, 0x84, 0x6, &(0x7f0000000280)={0x0, @in={{0x2, 0x0, @remote={0xac, 0x14, 0x14, 0xbb}}}}, &(0x7f0000000340)=0x84) connect$inet(r3, &(0x7f0000000040)={0x2, 0x0, @local={0xac, 0x14, 0x14, 0xaa}}, 0x10) sendto$inet(r3, &(0x7f0000762fff), 0xfdc7, 0x0, &(0x7f000057bff0)={0x2, 0x4e20, @multicast1=0xe0000001}, 0x10) sendfile(r0, r1, &(0x7f00005faff8), 0xfffb) 2018/04/30 20:08:44 executing program 1: ioctl$sock_SIOCBRADDBR(0xffffffffffffffff, 0x89a0, &(0x7f0000000200)='dummy0\x00') sendmsg$IPVS_CMD_DEL_DEST(0xffffffffffffffff, &(0x7f0000000400)={&(0x7f0000000180)={0x10}, 0xc, &(0x7f00000003c0)={&(0x7f0000000900)=ANY=[@ANYBLOB="85b1243151758dd7f7455eb7727d297dc0a531b63c1bb9cebe2568da6ff4598e487b821fa079864f3ac61f72f7bc72d2c1b784666194f0042f68cc5b9dd88da007fea15081effd8de44bc106bb68247d2d440f1ecd89d5f82c443cecfd23"], 0x1}, 0x1, 0x0, 0x0, 0x48001}, 0x0) r0 = perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$SNDRV_TIMER_IOCTL_PAUSE(r1, 0x54a3) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000040)={0x0, 0x0}, &(0x7f0000000080)=0xc) getsockopt$inet_sctp_SCTP_PEER_AUTH_CHUNKS(r1, 0x84, 0x1a, &(0x7f0000000500)=ANY=[@ANYBLOB="6a0000005b5da5c90a99f14168b0aaea930eef3845a8fcc15d37ec6eaf8620f4952548e859b6725412836d2b1856cccc4aa938867f6a5c41721a95c2b063c6d0f9731e748ba78b5de7503842fb3ac82793b5c0a5bbe8e3d19138334f189c4ba005522008a318c52047ce87069d785e1d7b8786fa2373"], &(0x7f0000000340)=0x1) ioctl$SNDRV_TIMER_IOCTL_CONTINUE(r1, 0x54a2) fcntl$lock(0xffffffffffffffff, 0x0, &(0x7f0000000140)={0x0, 0x0, 0x8, 0x0, r2}) r4 = memfd_create(&(0x7f0000000ffe)='$\x00', 0x0) write(r4, &(0x7f0000002000)='/', 0x1) perf_event_open(&(0x7f0000000a80)={0x0, 0x70, 0x1000, 0x3ff, 0x9, 0x1, 0x0, 0x100000000, 0x10, 0x6, 0x403000000000, 0x7, 0x8000, 0x7, 0x0, 0x6, 0x79, 0x7, 0x101, 0xff, 0x3ff, 0x81, 0x3f, 0x0, 0x1, 0x100000001, 0x1, 0x0, 0x0, 0x9, 0xd768, 0x100, 0x0, 0x0, 0x2, 0x5, 0x0, 0x0, 0x0, 0x7f, 0x0, @perf_config_ext={0x80000000, 0x9}, 0x0, 0x0, 0x3, 0x0, 0x0, 0xffff, 0x40}, r2, 0x0, r0, 0x1) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000640)='./cgroup/syz0\x00', 0x1ff) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000740)='./cgroup/syz1\x00', 0x1ff) pwrite64(r0, &(0x7f0000000580)="3d4dea132d484c9992e14d7e07a998cc609d8194044e57b0e202b698e5226b95f0cbe9d569886fbdd9fb4e28d6ee06009fa98650aca1", 0x36, 0x0) getsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(r4, 0x84, 0x18, &(0x7f0000000780)={0x0, 0x4e}, &(0x7f00000007c0)=0x8) getsockopt$inet_sctp6_SCTP_GET_ASSOC_STATS(0xffffffffffffffff, 0x84, 0x70, &(0x7f0000000800)={0x0, @in={{0x2, 0x4e22, @multicast2=0xe0000002}}, [0x0, 0x6, 0x0, 0x0, 0x8, 0x10001, 0x60, 0x0, 0x400, 0x1, 0x400, 0x10001, 0x3ff, 0x0, 0x7]}, &(0x7f0000000b40)=0x100) getsockopt$inet_sctp6_SCTP_PR_ASSOC_STATUS(r1, 0x84, 0x73, &(0x7f0000000680)={0x0, 0x0, 0x0, 0x0, 0x8}, &(0x7f00000006c0)=0x18) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDRS(0xffffffffffffffff, 0x84, 0x6c, &(0x7f0000000bc0)=ANY=[], &(0x7f0000000b00)) getsockopt$bt_l2cap_L2CAP_CONNINFO(r1, 0x6, 0x2, &(0x7f0000000a00), &(0x7f0000000700)=0xff9d) sendfile(r4, r4, &(0x7f0000001000), 0xfec) ioctl$PERF_EVENT_IOC_DISABLE(0xffffffffffffffff, 0x2401, 0x0) ioprio_get$uid(0x0, r3) ioctl$DRM_IOCTL_MODESET_CTL(0xffffffffffffffff, 0x40086408, &(0x7f0000001580)={0x0, 0xfffffffffffffff9}) 2018/04/30 20:08:44 executing program 6: r0 = syz_open_procfs(0x0, &(0x7f0000000040)="2f65786500000000000035abe1e80d903e0d717ac1889a45e581c9e14a5c8f95f5d2968ae8c767e9d18fd69a") mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x4, 0x20011, r0, 0x0) ioctl$fiemap(r0, 0x40087602, &(0x7f00000000c0)) 2018/04/30 20:08:44 executing program 3: setsockopt$packet_fanout(0xffffffffffffffff, 0x107, 0x12, &(0x7f00004da000), 0xb4) perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = memfd_create(&(0x7f00000000c0)="74086e750000000000000000008c00", 0x0) pwritev(r0, &(0x7f0000f50f90)=[{&(0x7f0000000040)="aa", 0x1}], 0x1, 0x81006) r1 = open(&(0x7f000000fffa)='./bus\x00', 0x141042, 0x0) r2 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000100)='/dev/vga_arbiter\x00', 0x2, 0x0) pwritev(r2, &(0x7f0000000480)=[{&(0x7f0000000380)="bb", 0x1}], 0x1, 0x0) ioctl$TIOCLINUX7(r0, 0x541c, &(0x7f00000001c0)={0x7}) sendfile(r1, r0, &(0x7f0000000000), 0x1000000000000) 2018/04/30 20:08:44 executing program 6: r0 = syz_open_procfs(0x0, &(0x7f0000000040)="2f65786500000000000035abe1e80d903e0d717ac1889a45e581c9e14a5c8f95f5d2968ae8c767e9d18fd69a") mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x4, 0x20011, r0, 0x0) ioctl$fiemap(r0, 0x40087602, &(0x7f00000000c0)) 2018/04/30 20:08:44 executing program 7: r0 = syz_open_procfs(0x0, &(0x7f0000000040)="2f65786500000000000035abe1e80d903e0d717ac1889a45e581c9e14a5c8f95f5d2968ae8c767e9d18fd69a") mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x4, 0x20011, r0, 0x0) ioctl$fiemap(r0, 0x40087602, &(0x7f00000000c0)) 2018/04/30 20:08:44 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f00000000c0)='./file0/bus\x00', &(0x7f0000000880)='./file0\x00', &(0x7f0000000200)='hugetlbfs\x00', 0x0, 0x0) r0 = open(&(0x7f0000000100)='./file0/bus\x00', 0x340, 0x0) truncate(&(0x7f00000007c0)='./file0/bus\x00', 0x1000000) lseek(r0, 0x0, 0x2) read(r0, &(0x7f0000000040)=""/57, 0x200000) 2018/04/30 20:08:44 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000240)={&(0x7f0000000000)={0x10}, 0xc, &(0x7f00000001c0)={&(0x7f0000000040)=@acquire={0x16c, 0x17, 0x1, 0x0, 0x0, {{@in=@multicast1=0xe0000001}, @in6=@ipv4={[], [0xff, 0xff], @dev={0xac, 0x14, 0x14}}, {@in=@loopback=0x7f000001, @in6=@local={0xfe, 0x80, [], 0xaa}}, {{@in=@rand_addr, @in=@multicast1=0xe0000001, 0x0, 0x0, 0x0, 0x0, 0x2}}, 0xfffffff0, 0x7b23}, [@tmpl={0x44, 0x5, [{{@in6=@mcast1={0xff, 0x1, [], 0x1}, 0x0, 0x32}, 0x0, @in=@multicast1=0xe0000001}]}]}, 0x16c}, 0x1}, 0x0) 2018/04/30 20:08:44 executing program 0: socket$inet6(0xa, 0x400000000001, 0x0) r0 = dup(0xffffffffffffffff) perf_event_open(&(0x7f0000000040)={0x1, 0x443, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TIOCGSID(r0, 0x5429, &(0x7f0000000280)) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r1, &(0x7f0000d65000)={&(0x7f0000de2ff4)={0x10}, 0xc, &(0x7f0000403000)={&(0x7f0000001a80)=ANY=[@ANYBLOB="140000000301ffff000000000000000002000000cdfbf76f179a4367f599"], 0x1e}, 0x1}, 0x0) getegid() stat(&(0x7f0000000e00)='./bus/file0\x00', &(0x7f0000000e40)) syz_genetlink_get_family_id$team(&(0x7f0000000140)='team\x00') getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000001100)={{{@in, @in=@dev}}, {{@in=@multicast2}, 0x0, @in6=@dev}}, &(0x7f0000001200)=0xe8) stat(&(0x7f0000001480)='./bus\x00', &(0x7f00000014c0)) 2018/04/30 20:08:44 executing program 2: r0 = openat(0xffffffffffffffff, &(0x7f0000000100)='./file0\x00', 0x0, 0x10d) recvmsg(r0, &(0x7f0000000480)={&(0x7f0000000140)=@vsock={0x0, 0x0, 0x0, @host}, 0x80, &(0x7f0000000380)=[{&(0x7f00000001c0)=""/226, 0xe2}, {&(0x7f00000002c0)=""/175, 0xaf}], 0x2, &(0x7f00000003c0)=""/160, 0xa0, 0x7ff}, 0x2000) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mlockall(0x5) sigaltstack(&(0x7f0000ffe000/0x2000)=nil, &(0x7f00000000c0)) munlockall() 2018/04/30 20:08:44 executing program 4: r0 = syz_open_dev$tun(&(0x7f0000000280)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f00000000c0)={"d202b999cf85000000000088f301e710", 0x102}) ioctl$TUNSETQUEUE(r0, 0x400454d9, &(0x7f0000000100)={'ip6_vti0\x00', 0x400}) r1 = syz_open_dev$tun(&(0x7f0000000280)='/dev/net/tun\x00', 0x0, 0x0) dup2(r1, r0) 2018/04/30 20:08:44 executing program 6: r0 = syz_open_procfs(0x0, &(0x7f0000000040)="2f65786500000000000035abe1e80d903e0d717ac1889a45e581c9e14a5c8f95f5d2968ae8c767e9d18fd69a") mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x4, 0x20011, r0, 0x0) ioctl$fiemap(r0, 0x40087602, &(0x7f00000000c0)) 2018/04/30 20:08:44 executing program 5: open$dir(&(0x7f00000001c0)='./file0\x00', 0x1fffe, 0x0) ioctl$EVIOCGABS0(0xffffffffffffffff, 0x80184540, &(0x7f0000000900)=""/103) r0 = open$dir(&(0x7f00000002c0)='./file0\x00', 0x2, 0x0) write(r0, &(0x7f0000000200)="d8", 0x1) sendfile(r0, r0, &(0x7f0000000040), 0x7527fb3200000000) r1 = creat(&(0x7f0000002540)='./file0\x00', 0x0) ioctl$fiemap(r1, 0x40086602, &(0x7f00000002c0)=ANY=[@ANYBLOB="0ff200"]) write$binfmt_script(r1, &(0x7f0000000300)={'#! ', './file0', [], 0xa}, 0xb) creat(&(0x7f0000000000)='./file0\x00', 0x0) 2018/04/30 20:08:44 executing program 7: r0 = syz_open_procfs(0x0, &(0x7f0000000040)="2f65786500000000000035abe1e80d903e0d717ac1889a45e581c9e14a5c8f95f5d2968ae8c767e9d18fd69a") mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x4, 0x20011, r0, 0x0) ioctl$fiemap(r0, 0x40087602, &(0x7f00000000c0)) 2018/04/30 20:08:44 executing program 6: r0 = syz_open_procfs(0x0, &(0x7f0000000040)="2f65786500000000000035abe1e80d903e0d717ac1889a45e581c9e14a5c8f95f5d2968ae8c767e9d18fd69a") mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x4, 0x20011, r0, 0x0) ioctl$fiemap(r0, 0x40087602, &(0x7f00000000c0)) 2018/04/30 20:08:44 executing program 7: r0 = syz_open_procfs(0x0, &(0x7f0000000040)="2f65786500000000000035abe1e80d903e0d717ac1889a45e581c9e14a5c8f95f5d2968ae8c767e9d18fd69a") mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x4, 0x20011, r0, 0x0) ioctl$fiemap(r0, 0x40087602, &(0x7f00000000c0)) 2018/04/30 20:08:44 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000009000)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f000000c000)={0x2, &(0x7f0000002000)=[{0x3c}, {0x6}]}, 0x10) sendmmsg$unix(r1, &(0x7f0000006f90)=[{&(0x7f000000dff8)=@abs, 0x8, &(0x7f0000006000), 0x0, &(0x7f000000d000)}], 0x1, 0x0) 2018/04/30 20:08:45 executing program 5: open$dir(&(0x7f00000001c0)='./file0\x00', 0x1fffe, 0x0) ioctl$EVIOCGABS0(0xffffffffffffffff, 0x80184540, &(0x7f0000000900)=""/103) r0 = open$dir(&(0x7f00000002c0)='./file0\x00', 0x2, 0x0) write(r0, &(0x7f0000000200)="d8", 0x1) sendfile(r0, r0, &(0x7f0000000040), 0x7527fb3200000000) r1 = creat(&(0x7f0000002540)='./file0\x00', 0x0) ioctl$fiemap(r1, 0x40086602, &(0x7f00000002c0)=ANY=[@ANYBLOB="0ff200"]) write$binfmt_script(r1, &(0x7f0000000300)={'#! ', './file0', [], 0xa}, 0xb) creat(&(0x7f0000000000)='./file0\x00', 0x0) 2018/04/30 20:08:45 executing program 1: r0 = socket(0x11, 0x100000803, 0x0) r1 = syz_open_dev$tun(&(0x7f00000000c0)='/dev/net/tun\x00', 0x0, 0x2) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000040)={"6966623000faffffffffffffff00", 0x5001}) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000000)={'ifb0\x00', 0xa201}) write$tun(r1, &(0x7f0000002500)={@void, @hdr={0x1}, @ipv4={{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x0, 0x2f, 0x0, @dev={0xac, 0x14, 0x14}, @loopback=0x7f000001}, @igmp={0x0, 0x0, 0x0, @multicast2=0xe0000002}}}, 0xfc78) 2018/04/30 20:08:45 executing program 0: socket$inet6(0xa, 0x400000000001, 0x0) r0 = dup(0xffffffffffffffff) perf_event_open(&(0x7f0000000040)={0x1, 0x443, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TIOCGSID(r0, 0x5429, &(0x7f0000000280)) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r1, &(0x7f0000d65000)={&(0x7f0000de2ff4)={0x10}, 0xc, &(0x7f0000403000)={&(0x7f0000001a80)=ANY=[@ANYBLOB="140000000301ffff000000000000000002000000cdfbf76f179a4367f599"], 0x1e}, 0x1}, 0x0) getegid() stat(&(0x7f0000000e00)='./bus/file0\x00', &(0x7f0000000e40)) syz_genetlink_get_family_id$team(&(0x7f0000000140)='team\x00') getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000001100)={{{@in, @in=@dev}}, {{@in=@multicast2}, 0x0, @in6=@dev}}, &(0x7f0000001200)=0xe8) stat(&(0x7f0000001480)='./bus\x00', &(0x7f00000014c0)) 2018/04/30 20:08:45 executing program 4: r0 = syz_open_dev$sndseq(&(0x7f0000000240)='/dev/snd/seq\x00', 0x0, 0x0) read(r0, &(0x7f0000000140)=""/28, 0x1c) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r0, 0xc0a85320, &(0x7f0000418f50)={{0x80}, "706f727431000000000000000000000000000000000000000000eb000000b2a587e2000000000000020000000000000001008e15e7af00", 0xa9824f69d1376637, 0x10800a}) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r0, 0x4040534e, &(0x7f000019ffe9)={0xc1}) ioctl$SNDRV_SEQ_IOCTL_GET_CLIENT_POOL(r0, 0xc058534b, &(0x7f00000000c0)) openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer2\x00', 0x0, 0x0) 2018/04/30 20:08:45 executing program 6: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f00006d3fc8)={&(0x7f0000000040)={0x10}, 0xc, &(0x7f0000000080)={&(0x7f00000001c0)={0x14, 0x13, 0x1, 0x0, 0x0, {0x2}}, 0x14}, 0x1}, 0x0) 2018/04/30 20:08:45 executing program 3: setsockopt$packet_fanout(0xffffffffffffffff, 0x107, 0x12, &(0x7f00004da000), 0xb4) perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = memfd_create(&(0x7f00000000c0)="74086e750000000000000000008c00", 0x0) pwritev(r0, &(0x7f0000f50f90)=[{&(0x7f0000000040)="aa", 0x1}], 0x1, 0x81006) r1 = open(&(0x7f000000fffa)='./bus\x00', 0x141042, 0x0) r2 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000100)='/dev/vga_arbiter\x00', 0x2, 0x0) pwritev(r2, &(0x7f0000000480)=[{&(0x7f0000000380)="bb", 0x1}], 0x1, 0x0) ioctl$TIOCLINUX7(r0, 0x541c, &(0x7f00000001c0)={0x7}) sendfile(r1, r0, &(0x7f0000000000), 0x1000000000000) 2018/04/30 20:08:45 executing program 2: r0 = openat(0xffffffffffffffff, &(0x7f0000000100)='./file0\x00', 0x0, 0x10d) recvmsg(r0, &(0x7f0000000480)={&(0x7f0000000140)=@vsock={0x0, 0x0, 0x0, @host}, 0x80, &(0x7f0000000380)=[{&(0x7f00000001c0)=""/226, 0xe2}, {&(0x7f00000002c0)=""/175, 0xaf}], 0x2, &(0x7f00000003c0)=""/160, 0xa0, 0x7ff}, 0x2000) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mlockall(0x5) sigaltstack(&(0x7f0000ffe000/0x2000)=nil, &(0x7f00000000c0)) munlockall() 2018/04/30 20:08:45 executing program 7: setsockopt$packet_fanout(0xffffffffffffffff, 0x107, 0x12, &(0x7f00004da000), 0xb4) perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = memfd_create(&(0x7f00000000c0)="74086e750000000000000000008c00", 0x0) pwritev(r0, &(0x7f0000f50f90)=[{&(0x7f0000000040)="aa", 0x1}], 0x1, 0x81006) r1 = open(&(0x7f000000fffa)='./bus\x00', 0x141042, 0x0) r2 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000100)='/dev/vga_arbiter\x00', 0x2, 0x0) pwritev(r2, &(0x7f0000000480)=[{&(0x7f0000000380)="bb", 0x1}], 0x1, 0x0) ioctl$TIOCLINUX7(r0, 0x541c, &(0x7f00000001c0)={0x7}) sendfile(r1, r0, &(0x7f0000000000), 0x1000000000000) 2018/04/30 20:08:45 executing program 6: r0 = socket$packet(0x11, 0x80000000002, 0x300) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000040)={'syz_tun\x00', 0x0}) setsockopt$packet_add_memb(r0, 0x107, 0x1, &(0x7f0000000000)={r1, 0x1, 0x6}, 0x10) setsockopt$packet_drop_memb(r0, 0x107, 0x2, &(0x7f0000000140)={r1, 0x1, 0x6}, 0x10) [ 60.850052] device syz_tun entered promiscuous mode [ 60.870532] device syz_tun left promiscuous mode [ 60.895244] device syz_tun entered promiscuous mode [ 60.931088] device syz_tun left promiscuous mode 2018/04/30 20:08:45 executing program 6: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000240), 0x9}, 0x0, 0x0, 0x0, 0x6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = creat(&(0x7f00000000c0)='./bus\x00', 0x0) r1 = open(&(0x7f0000000000)='./bus\x00', 0x26302, 0x0) write$tun(r0, &(0x7f0000000180)={@pi, @hdr={0x1, 0x80, 0x0, 0x6, 0x0, 0x50d}, @ipx={0xffff, 0x1e, 0x8000, 0x5, {@broadcast=0xffffffff, @current, 0x401}, {@broadcast=0xffffffff, @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], 0x4}}}, 0x2c) ftruncate(r1, 0x80000) sendfile(r0, r1, &(0x7f0000d83ff8), 0x8000fffffffe) sendfile(r1, r1, &(0x7f0000000140), 0xffffffff) open(&(0x7f0000000100)='./bus/file0\x00', 0x1, 0x0) 2018/04/30 20:08:45 executing program 1: mkdir(&(0x7f000082f000)='./control\x00', 0x0) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x1, 0x32, 0xffffffffffffffff, 0x0) r0 = userfaultfd(0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000e4c000)={0xaa}) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000043fe0)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r1 = creat(&(0x7f0000000000)='./control/file0\x00', 0x0) write$sndseq(r1, &(0x7f0000011fd2)=[{0x0, 0x0, 0x0, 0x0, @time, {}, {}, @time=@time={0x77359400}}], 0x30) unlink(&(0x7f0000f86000)='./control/file0\x00') mount(&(0x7f0000000080)='./control/file1\x00', &(0x7f0000000100)='./control\x00', &(0x7f00000001c0)='ramfs\x00', 0x0, 0x0) syz_fuseblk_mount(&(0x7f00000000c0)='./control\x00', &(0x7f0000000140)='./control/file1\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) close(r0) 2018/04/30 20:08:46 executing program 0: socket$inet6(0xa, 0x400000000001, 0x0) r0 = dup(0xffffffffffffffff) perf_event_open(&(0x7f0000000040)={0x1, 0x443, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TIOCGSID(r0, 0x5429, &(0x7f0000000280)) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r1, &(0x7f0000d65000)={&(0x7f0000de2ff4)={0x10}, 0xc, &(0x7f0000403000)={&(0x7f0000001a80)=ANY=[@ANYBLOB="140000000301ffff000000000000000002000000cdfbf76f179a4367f599"], 0x1e}, 0x1}, 0x0) getegid() stat(&(0x7f0000000e00)='./bus/file0\x00', &(0x7f0000000e40)) syz_genetlink_get_family_id$team(&(0x7f0000000140)='team\x00') getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000001100)={{{@in, @in=@dev}}, {{@in=@multicast2}, 0x0, @in6=@dev}}, &(0x7f0000001200)=0xe8) stat(&(0x7f0000001480)='./bus\x00', &(0x7f00000014c0)) 2018/04/30 20:08:46 executing program 7: setsockopt$packet_fanout(0xffffffffffffffff, 0x107, 0x12, &(0x7f00004da000), 0xb4) perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = memfd_create(&(0x7f00000000c0)="74086e750000000000000000008c00", 0x0) pwritev(r0, &(0x7f0000f50f90)=[{&(0x7f0000000040)="aa", 0x1}], 0x1, 0x81006) r1 = open(&(0x7f000000fffa)='./bus\x00', 0x141042, 0x0) r2 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000100)='/dev/vga_arbiter\x00', 0x2, 0x0) pwritev(r2, &(0x7f0000000480)=[{&(0x7f0000000380)="bb", 0x1}], 0x1, 0x0) ioctl$TIOCLINUX7(r0, 0x541c, &(0x7f00000001c0)={0x7}) sendfile(r1, r0, &(0x7f0000000000), 0x1000000000000) 2018/04/30 20:08:46 executing program 3: setsockopt$packet_fanout(0xffffffffffffffff, 0x107, 0x12, &(0x7f00004da000), 0xb4) perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = memfd_create(&(0x7f00000000c0)="74086e750000000000000000008c00", 0x0) pwritev(r0, &(0x7f0000f50f90)=[{&(0x7f0000000040)="aa", 0x1}], 0x1, 0x81006) r1 = open(&(0x7f000000fffa)='./bus\x00', 0x141042, 0x0) r2 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000100)='/dev/vga_arbiter\x00', 0x2, 0x0) pwritev(r2, &(0x7f0000000480)=[{&(0x7f0000000380)="bb", 0x1}], 0x1, 0x0) ioctl$TIOCLINUX7(r0, 0x541c, &(0x7f00000001c0)={0x7}) sendfile(r1, r0, &(0x7f0000000000), 0x1000000000000) 2018/04/30 20:08:46 executing program 2: r0 = socket(0x10, 0x2, 0x0) write(r0, &(0x7f00000000c0)="26000000220047019353ff07008a00000002006d200000ff1fc0e9ffff495180e507c7033500", 0x26) 2018/04/30 20:08:46 executing program 0: mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x0, 0x32, 0xffffffffffffffff, 0x0) rt_sigtimedwait(&(0x7f0000000000), &(0x7f0000000040), &(0x7f0000000b80), 0x8) 2018/04/30 20:08:46 executing program 1: r0 = add_key$user(&(0x7f0000000000)='user\x00', &(0x7f0000000040)={0x73, 0x79, 0x7a}, &(0x7f0000000080)='Q', 0x1, 0xffffffffffffffff) keyctl$read(0xb, r0, &(0x7f00000000c0), 0x0) 2018/04/30 20:08:46 executing program 5: open$dir(&(0x7f00000001c0)='./file0\x00', 0x1fffe, 0x0) ioctl$EVIOCGABS0(0xffffffffffffffff, 0x80184540, &(0x7f0000000900)=""/103) r0 = open$dir(&(0x7f00000002c0)='./file0\x00', 0x2, 0x0) write(r0, &(0x7f0000000200)="d8", 0x1) sendfile(r0, r0, &(0x7f0000000040), 0x7527fb3200000000) r1 = creat(&(0x7f0000002540)='./file0\x00', 0x0) ioctl$fiemap(r1, 0x40086602, &(0x7f00000002c0)=ANY=[@ANYBLOB="0ff200"]) write$binfmt_script(r1, &(0x7f0000000300)={'#! ', './file0', [], 0xa}, 0xb) creat(&(0x7f0000000000)='./file0\x00', 0x0) 2018/04/30 20:08:46 executing program 7: setsockopt$packet_fanout(0xffffffffffffffff, 0x107, 0x12, &(0x7f00004da000), 0xb4) perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = memfd_create(&(0x7f00000000c0)="74086e750000000000000000008c00", 0x0) pwritev(r0, &(0x7f0000f50f90)=[{&(0x7f0000000040)="aa", 0x1}], 0x1, 0x81006) r1 = open(&(0x7f000000fffa)='./bus\x00', 0x141042, 0x0) r2 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000100)='/dev/vga_arbiter\x00', 0x2, 0x0) pwritev(r2, &(0x7f0000000480)=[{&(0x7f0000000380)="bb", 0x1}], 0x1, 0x0) ioctl$TIOCLINUX7(r0, 0x541c, &(0x7f00000001c0)={0x7}) sendfile(r1, r0, &(0x7f0000000000), 0x1000000000000) 2018/04/30 20:08:46 executing program 3: setsockopt$packet_fanout(0xffffffffffffffff, 0x107, 0x12, &(0x7f00004da000), 0xb4) perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = memfd_create(&(0x7f00000000c0)="74086e750000000000000000008c00", 0x0) pwritev(r0, &(0x7f0000f50f90)=[{&(0x7f0000000040)="aa", 0x1}], 0x1, 0x81006) r1 = open(&(0x7f000000fffa)='./bus\x00', 0x141042, 0x0) r2 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000100)='/dev/vga_arbiter\x00', 0x2, 0x0) pwritev(r2, &(0x7f0000000480)=[{&(0x7f0000000380)="bb", 0x1}], 0x1, 0x0) ioctl$TIOCLINUX7(r0, 0x541c, &(0x7f00000001c0)={0x7}) sendfile(r1, r0, &(0x7f0000000000), 0x1000000000000) 2018/04/30 20:08:46 executing program 6: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000240), 0x9}, 0x0, 0x0, 0x0, 0x6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = creat(&(0x7f00000000c0)='./bus\x00', 0x0) r1 = open(&(0x7f0000000000)='./bus\x00', 0x26302, 0x0) write$tun(r0, &(0x7f0000000180)={@pi, @hdr={0x1, 0x80, 0x0, 0x6, 0x0, 0x50d}, @ipx={0xffff, 0x1e, 0x8000, 0x5, {@broadcast=0xffffffff, @current, 0x401}, {@broadcast=0xffffffff, @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], 0x4}}}, 0x2c) ftruncate(r1, 0x80000) sendfile(r0, r1, &(0x7f0000d83ff8), 0x8000fffffffe) sendfile(r1, r1, &(0x7f0000000140), 0xffffffff) open(&(0x7f0000000100)='./bus/file0\x00', 0x1, 0x0) 2018/04/30 20:08:46 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f00003e4000)={&(0x7f0000e87000)={0x10}, 0xc, &(0x7f0000a3bff8)={&(0x7f0000000040)=@ipv6_newaddr={0x18, 0x11, 0x931, 0x0, 0x0, {0xa}}, 0x18}, 0x1}, 0x0) 2018/04/30 20:08:46 executing program 2: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000240), 0x9}, 0x0, 0x0, 0x0, 0x6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = creat(&(0x7f00000000c0)='./bus\x00', 0x0) r1 = open(&(0x7f0000000000)='./bus\x00', 0x26302, 0x0) write$tun(r0, &(0x7f0000000180)={@pi, @hdr={0x1, 0x80, 0x0, 0x6, 0x0, 0x50d}, @ipx={0xffff, 0x1e, 0x8000, 0x5, {@broadcast=0xffffffff, @current, 0x401}, {@broadcast=0xffffffff, @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], 0x4}}}, 0x2c) ftruncate(r1, 0x80000) sendfile(r0, r1, &(0x7f0000d83ff8), 0x8000fffffffe) sendfile(r1, r1, &(0x7f0000000140), 0xffffffff) open(&(0x7f0000000100)='./bus/file0\x00', 0x1, 0x0) 2018/04/30 20:08:46 executing program 4: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = memfd_create(&(0x7f000000e000)='\x00 ', 0x0) r1 = syz_open_dev$sndseq(&(0x7f0000000180)='/dev/snd/seq\x00', 0x0, 0x101801) ioctl$SNDRV_SEQ_IOCTL_GET_PORT_INFO(r0, 0xc0a85322, &(0x7f00000001c0)) pselect6(0x40, &(0x7f0000000080)={0x40, 0x6, 0x200, 0x8, 0x0, 0x80, 0x0, 0x7}, &(0x7f0000000280)={0x5, 0x2, 0x0, 0x80000000, 0xf4, 0x0, 0x81}, &(0x7f00000002c0)={0x53f0}, &(0x7f0000000300)={0x0, 0x1c9c380}, &(0x7f0000000480)={&(0x7f0000000440), 0x8}) r2 = dup2(r1, r0) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r2, 0xc08c5332, &(0x7f000002b000)={0x0, 0x0, 0x0, "9ede7a8c5ae95ec8672c93340f643a664f13eeab65c0322901dc6bd36cde2c51f01b7f0b014f9f91eeb7c37c7240f476c8d753d000aa8faf8fb574dbcfa6dc4d"}) write$sndseq(r0, &(0x7f0000000080), 0xffffff17) r3 = socket$netlink(0x10, 0x3, 0x0) getsockname$packet(0xffffffffffffff9c, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @link_local}, &(0x7f0000000200)=0x14) sendmmsg(r3, &(0x7f00000004c0)=[{{&(0x7f0000000240)=@ll={0x11, 0xf, r4, 0x1, 0x101, 0x6}, 0x80, &(0x7f0000000340)=[{&(0x7f00000002c0)="d043fe83922ff8bcd1e826069830af42bdea147623dc2808beabb3b9be63a423774b8ce080bef5b037dd1b6fabb5dc73e68d78358a20ab477f387973b3e2eed81d", 0x41}], 0x1, 0x0, 0x0, 0x8000}, 0x8e5}], 0x1, 0x4) syz_open_procfs(0x0, &(0x7f0000000180)='net/igmp\x00') syz_open_dev$sg(&(0x7f0000000000)='/dev/sg#\x00', 0x3ff, 0x8202) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_PORT(r2, 0xc0a85352, &(0x7f00000000c0)={{0xccea, 0x6}, 'port0\x00', 0x1, 0x10, 0x20, 0x4, 0x7, 0x1, 0x224, 0x0, 0x7, 0xffffffffffffffb1}) 2018/04/30 20:08:46 executing program 0: perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getsockopt$netrom_NETROM_T2(0xffffffffffffffff, 0x103, 0x2, &(0x7f0000000280)=0x400, &(0x7f00000002c0)=0x4) recvfrom(0xffffffffffffffff, &(0x7f0000000140)=""/166, 0xa6, 0x2000, &(0x7f0000000200)=@l2={0x1f, 0xfffffffffffffff8, {0x9, 0x7, 0x0, 0x7a3, 0x8}, 0x1, 0x7ff}, 0x80) r0 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000380)='/dev/hwrng\x00', 0x20000, 0x0) openat$selinux_avc_hash_stats(0xffffffffffffff9c, &(0x7f0000000300)='/selinux/avc/hash_stats\x00', 0x0, 0x0) r1 = memfd_create(&(0x7f00000000c0)="74086e750000000000000000008c00", 0x0) getsockopt$inet_sctp_SCTP_HMAC_IDENT(r0, 0x84, 0x16, &(0x7f0000000500)=ANY=[@ANYBLOB="020000000000ff01a81478808fe5a37b85894ae4842bf3650500c889dd39932454bcc3d26a3f2866604e65e29134ade4b79bc54be274c2d4f9008522faee10397faa3b0a0c183abb999c679a0a2dd0eb4a481034eba01f3c45f2370fa85a603bc9ed2d422d0e45a9b6d6e361355c23acc24056"], &(0x7f00000004c0)=0x1) pwritev(r1, &(0x7f0000f50f90)=[{&(0x7f0000000040)="aa", 0x1}], 0x1, 0x81006) ioctl$LOOP_CHANGE_FD(0xffffffffffffffff, 0x4c00, r1) sendfile(r1, 0xffffffffffffffff, &(0x7f0000000080), 0x101fffffe) r2 = getpid() ioprio_get$pid(0x1, r2) ioctl$LOOP_CLR_FD(0xffffffffffffffff, 0x4c01) statfs(&(0x7f00000003c0)='./file0\x00', &(0x7f0000000400)=""/72) connect$ax25(r1, &(0x7f0000000340)={0x3, {"0bca1e298e9c44"}, 0x5}, 0x10) ioctl$sock_SIOCGPGRP(r0, 0x8904, &(0x7f0000000480)) ptrace(0x4207, 0x0) sync() r3 = syz_open_dev$sg(&(0x7f0000000040)='/dev/sg#\x00', 0x0, 0x0) getsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(0xffffffffffffffff, 0x84, 0x1f, &(0x7f0000000640)={0x0, @in={{0x2, 0x4e24, @rand_addr}}, 0x7, 0x81}, &(0x7f0000000700)=0x90) setsockopt$inet_sctp_SCTP_SET_PEER_PRIMARY_ADDR(r3, 0x84, 0x5, &(0x7f0000000740)={r4, @in6={{0xa, 0x4e21, 0x80000000, @loopback={0x0, 0x1}, 0x5}}}, 0x84) ioctl$SNDRV_TIMER_IOCTL_START(r3, 0x54a0) setsockopt$inet6_dccp_buf(r1, 0x21, 0xe, &(0x7f0000000580)="d04eaaa9731decf95f714191cd316f83bad2961f29a65a0301588dd569a61f242b79ea0d0563dea17a675ea3dbd3481f100461138ed429c700a92330e6523245e0d1945c46bbf7759d6648ae21f928e9543d68271dafdbfd6669a33c182223fcc8e853b4bf376449c14391379f2e45b28d79511966a5278b469530f721522fa25aaa8c5fb8c84e45133330c2bf137eae29edb5730d809773f954f00857abed6761fa73daa0fa98d8f84cfaa39fe6c187a63cff24417d4b", 0xb7) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x81, 0x0) 2018/04/30 20:08:47 executing program 1: r0 = add_key$user(&(0x7f0000000000)='user\x00', &(0x7f0000000040)={0x73, 0x79, 0x7a}, &(0x7f0000000080)='Q', 0x1, 0xffffffffffffffff) keyctl$read(0xb, r0, &(0x7f00000000c0), 0x0) 2018/04/30 20:08:47 executing program 1: r0 = add_key$user(&(0x7f0000000000)='user\x00', &(0x7f0000000040)={0x73, 0x79, 0x7a}, &(0x7f0000000080)='Q', 0x1, 0xffffffffffffffff) keyctl$read(0xb, r0, &(0x7f00000000c0), 0x0) 2018/04/30 20:08:47 executing program 0: r0 = syz_open_dev$sg(&(0x7f0000005000)='/dev/sg#\x00', 0x0, 0x8002) write(r0, &(0x7f0000eaffa7)="dbef803e3d9f5de1e52055bb7c8a326fe46092b6682d9ad789c5d7acad0e771f13cecb59029b011ded54a09c41c6cfcfbcd743cc665c32af223d42438b496a0304891c88697ae707d4a70f330e6fe3a1c9c76f314ffab329", 0x58) write$sndseq(r0, &(0x7f00006d9000)=[{}], 0x30) write$sndseq(r0, &(0x7f0000000000)=[{0x0, 0x0, 0x0, 0x0, @tick, {}, {}, @addr}], 0x30) 2018/04/30 20:08:47 executing program 1: r0 = add_key$user(&(0x7f0000000000)='user\x00', &(0x7f0000000040)={0x73, 0x79, 0x7a}, &(0x7f0000000080)='Q', 0x1, 0xffffffffffffffff) keyctl$read(0xb, r0, &(0x7f00000000c0), 0x0) 2018/04/30 20:08:47 executing program 0: r0 = syz_open_dev$sg(&(0x7f0000005000)='/dev/sg#\x00', 0x0, 0x8002) write(r0, &(0x7f0000eaffa7)="dbef803e3d9f5de1e52055bb7c8a326fe46092b6682d9ad789c5d7acad0e771f13cecb59029b011ded54a09c41c6cfcfbcd743cc665c32af223d42438b496a0304891c88697ae707d4a70f330e6fe3a1c9c76f314ffab329", 0x58) write$sndseq(r0, &(0x7f00006d9000)=[{}], 0x30) write$sndseq(r0, &(0x7f0000000000)=[{0x0, 0x0, 0x0, 0x0, @tick, {}, {}, @addr}], 0x30) 2018/04/30 20:08:47 executing program 1: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000fb9fc8)={&(0x7f0000397ff4)={0x10}, 0xc, &(0x7f0000fe8000)={&(0x7f0000c06d10)=@updsa={0x120, 0x1a, 0xa09, 0x0, 0x0, {{@in=@dev={0xac, 0x14}, @in=@local={0xac, 0x14, 0xffffffffffffffff, 0xaa}}, {@in6=@ipv4={[], [0xff, 0xff], @local={0xac, 0x14, 0xffffffffffffffff, 0xaa}}, 0x0, 0x3c}, @in, {}, {}, {}, 0x0, 0x0, 0x2}, [@replay_esn_val={0x1c, 0x17, {0x40000000000001cb}}, @coaddr={0x14, 0xe, @in=@loopback=0x7f000001}]}, 0x120}, 0x1}, 0x0) 2018/04/30 20:08:47 executing program 0: r0 = syz_open_dev$sg(&(0x7f0000005000)='/dev/sg#\x00', 0x0, 0x8002) write(r0, &(0x7f0000eaffa7)="dbef803e3d9f5de1e52055bb7c8a326fe46092b6682d9ad789c5d7acad0e771f13cecb59029b011ded54a09c41c6cfcfbcd743cc665c32af223d42438b496a0304891c88697ae707d4a70f330e6fe3a1c9c76f314ffab329", 0x58) write$sndseq(r0, &(0x7f00006d9000)=[{}], 0x30) write$sndseq(r0, &(0x7f0000000000)=[{0x0, 0x0, 0x0, 0x0, @tick, {}, {}, @addr}], 0x30) 2018/04/30 20:08:47 executing program 1: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = memfd_create(&(0x7f000000e000)='\x00 ', 0x0) r1 = syz_open_dev$sndseq(&(0x7f0000000180)='/dev/snd/seq\x00', 0x0, 0x101801) ioctl$SNDRV_SEQ_IOCTL_GET_PORT_INFO(r0, 0xc0a85322, &(0x7f00000001c0)) pselect6(0x40, &(0x7f0000000080)={0x40, 0x6, 0x200, 0x8, 0x0, 0x80, 0x0, 0x7}, &(0x7f0000000280)={0x5, 0x2, 0x0, 0x80000000, 0xf4, 0x0, 0x81}, &(0x7f00000002c0)={0x53f0}, &(0x7f0000000300)={0x0, 0x1c9c380}, &(0x7f0000000480)={&(0x7f0000000440), 0x8}) r2 = dup2(r1, r0) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r2, 0xc08c5332, &(0x7f000002b000)={0x0, 0x0, 0x0, "9ede7a8c5ae95ec8672c93340f643a664f13eeab65c0322901dc6bd36cde2c51f01b7f0b014f9f91eeb7c37c7240f476c8d753d000aa8faf8fb574dbcfa6dc4d"}) write$sndseq(r0, &(0x7f0000000080), 0xffffff17) r3 = socket$netlink(0x10, 0x3, 0x0) getsockname$packet(0xffffffffffffff9c, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @link_local}, &(0x7f0000000200)=0x14) sendmmsg(r3, &(0x7f00000004c0)=[{{&(0x7f0000000240)=@ll={0x11, 0xf, r4, 0x1, 0x101, 0x6}, 0x80, &(0x7f0000000340)=[{&(0x7f00000002c0)="d043fe83922ff8bcd1e826069830af42bdea147623dc2808beabb3b9be63a423774b8ce080bef5b037dd1b6fabb5dc73e68d78358a20ab477f387973b3e2eed81d", 0x41}], 0x1, 0x0, 0x0, 0x8000}, 0x8e5}], 0x1, 0x4) syz_open_procfs(0x0, &(0x7f0000000180)='net/igmp\x00') syz_open_dev$sg(&(0x7f0000000000)='/dev/sg#\x00', 0x3ff, 0x8202) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_PORT(r2, 0xc0a85352, &(0x7f00000000c0)={{0xccea, 0x6}, 'port0\x00', 0x1, 0x10, 0x20, 0x4, 0x7, 0x1, 0x224, 0x0, 0x7, 0xffffffffffffffb1}) 2018/04/30 20:08:47 executing program 0: r0 = syz_open_dev$sg(&(0x7f0000005000)='/dev/sg#\x00', 0x0, 0x8002) write(r0, &(0x7f0000eaffa7)="dbef803e3d9f5de1e52055bb7c8a326fe46092b6682d9ad789c5d7acad0e771f13cecb59029b011ded54a09c41c6cfcfbcd743cc665c32af223d42438b496a0304891c88697ae707d4a70f330e6fe3a1c9c76f314ffab329", 0x58) write$sndseq(r0, &(0x7f00006d9000)=[{}], 0x30) write$sndseq(r0, &(0x7f0000000000)=[{0x0, 0x0, 0x0, 0x0, @tick, {}, {}, @addr}], 0x30) 2018/04/30 20:08:47 executing program 7: socketpair$unix(0x1, 0x4000000000005, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f00000000c0)={0x3, &(0x7f0000000140)=[{0x4}, {0x3}, {0x6}]}, 0x10) sendto$unix(r1, &(0x7f0000000000), 0x0, 0x0, &(0x7f000000dff8)=@abs, 0x6e) 2018/04/30 20:08:47 executing program 3: r0 = socket$nl_xfrm(0x11, 0x3, 0x6) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f00000000c0)={0x0, 0x0}, &(0x7f0000000180)=0x7) setreuid(0x0, r1) setuid(r1) 2018/04/30 20:08:47 executing program 2: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000240), 0x9}, 0x0, 0x0, 0x0, 0x6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = creat(&(0x7f00000000c0)='./bus\x00', 0x0) r1 = open(&(0x7f0000000000)='./bus\x00', 0x26302, 0x0) write$tun(r0, &(0x7f0000000180)={@pi, @hdr={0x1, 0x80, 0x0, 0x6, 0x0, 0x50d}, @ipx={0xffff, 0x1e, 0x8000, 0x5, {@broadcast=0xffffffff, @current, 0x401}, {@broadcast=0xffffffff, @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], 0x4}}}, 0x2c) ftruncate(r1, 0x80000) sendfile(r0, r1, &(0x7f0000d83ff8), 0x8000fffffffe) sendfile(r1, r1, &(0x7f0000000140), 0xffffffff) open(&(0x7f0000000100)='./bus/file0\x00', 0x1, 0x0) 2018/04/30 20:08:47 executing program 5: open$dir(&(0x7f00000001c0)='./file0\x00', 0x1fffe, 0x0) ioctl$EVIOCGABS0(0xffffffffffffffff, 0x80184540, &(0x7f0000000900)=""/103) r0 = open$dir(&(0x7f00000002c0)='./file0\x00', 0x2, 0x0) write(r0, &(0x7f0000000200)="d8", 0x1) sendfile(r0, r0, &(0x7f0000000040), 0x7527fb3200000000) r1 = creat(&(0x7f0000002540)='./file0\x00', 0x0) ioctl$fiemap(r1, 0x40086602, &(0x7f00000002c0)=ANY=[@ANYBLOB="0ff200"]) write$binfmt_script(r1, &(0x7f0000000300)={'#! ', './file0', [], 0xa}, 0xb) creat(&(0x7f0000000000)='./file0\x00', 0x0) 2018/04/30 20:08:47 executing program 4: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = memfd_create(&(0x7f000000e000)='\x00 ', 0x0) r1 = syz_open_dev$sndseq(&(0x7f0000000180)='/dev/snd/seq\x00', 0x0, 0x101801) ioctl$SNDRV_SEQ_IOCTL_GET_PORT_INFO(r0, 0xc0a85322, &(0x7f00000001c0)) pselect6(0x40, &(0x7f0000000080)={0x40, 0x6, 0x200, 0x8, 0x0, 0x80, 0x0, 0x7}, &(0x7f0000000280)={0x5, 0x2, 0x0, 0x80000000, 0xf4, 0x0, 0x81}, &(0x7f00000002c0)={0x53f0}, &(0x7f0000000300)={0x0, 0x1c9c380}, &(0x7f0000000480)={&(0x7f0000000440), 0x8}) r2 = dup2(r1, r0) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r2, 0xc08c5332, &(0x7f000002b000)={0x0, 0x0, 0x0, "9ede7a8c5ae95ec8672c93340f643a664f13eeab65c0322901dc6bd36cde2c51f01b7f0b014f9f91eeb7c37c7240f476c8d753d000aa8faf8fb574dbcfa6dc4d"}) write$sndseq(r0, &(0x7f0000000080), 0xffffff17) r3 = socket$netlink(0x10, 0x3, 0x0) getsockname$packet(0xffffffffffffff9c, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @link_local}, &(0x7f0000000200)=0x14) sendmmsg(r3, &(0x7f00000004c0)=[{{&(0x7f0000000240)=@ll={0x11, 0xf, r4, 0x1, 0x101, 0x6}, 0x80, &(0x7f0000000340)=[{&(0x7f00000002c0)="d043fe83922ff8bcd1e826069830af42bdea147623dc2808beabb3b9be63a423774b8ce080bef5b037dd1b6fabb5dc73e68d78358a20ab477f387973b3e2eed81d", 0x41}], 0x1, 0x0, 0x0, 0x8000}, 0x8e5}], 0x1, 0x4) syz_open_procfs(0x0, &(0x7f0000000180)='net/igmp\x00') syz_open_dev$sg(&(0x7f0000000000)='/dev/sg#\x00', 0x3ff, 0x8202) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_PORT(r2, 0xc0a85352, &(0x7f00000000c0)={{0xccea, 0x6}, 'port0\x00', 0x1, 0x10, 0x20, 0x4, 0x7, 0x1, 0x224, 0x0, 0x7, 0xffffffffffffffb1}) 2018/04/30 20:08:47 executing program 6: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000240), 0x9}, 0x0, 0x0, 0x0, 0x6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = creat(&(0x7f00000000c0)='./bus\x00', 0x0) r1 = open(&(0x7f0000000000)='./bus\x00', 0x26302, 0x0) write$tun(r0, &(0x7f0000000180)={@pi, @hdr={0x1, 0x80, 0x0, 0x6, 0x0, 0x50d}, @ipx={0xffff, 0x1e, 0x8000, 0x5, {@broadcast=0xffffffff, @current, 0x401}, {@broadcast=0xffffffff, @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], 0x4}}}, 0x2c) ftruncate(r1, 0x80000) sendfile(r0, r1, &(0x7f0000d83ff8), 0x8000fffffffe) sendfile(r1, r1, &(0x7f0000000140), 0xffffffff) open(&(0x7f0000000100)='./bus/file0\x00', 0x1, 0x0) 2018/04/30 20:08:48 executing program 0: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCFLSH(r0, 0x40045436, 0x2) 2018/04/30 20:08:48 executing program 7: r0 = syz_open_dev$sndtimer(&(0x7f0000214ff1)='/dev/snd/timer\x00', 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_TREAD(r0, 0x40045402, &(0x7f000001dffc)=0x9) ioctl$SNDRV_TIMER_IOCTL_SELECT(r0, 0x40345410, &(0x7f0000001000)={{0x100000001}}) r1 = epoll_create1(0x0) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, &(0x7f0000000040)={0x3}) ioctl$SNDRV_TIMER_IOCTL_PARAMS(r0, 0x40505412, &(0x7f000001cfb0)={0x0, 0x1, 0x0, 0x0, 0xf}) ioctl$SNDRV_TIMER_IOCTL_START(r0, 0x54a0) poll(&(0x7f0000050fd8)=[{r1}], 0x1, 0x0) 2018/04/30 20:08:48 executing program 3: r0 = syz_open_dev$loop(&(0x7f0000000b80)='/dev/loop#\x00', 0x0, 0x4006) r1 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000440)='/proc/sys/net/ipv4/vs/lblcr_expiration\x00', 0x2, 0x0) r2 = memfd_create(&(0x7f0000000000)="74086e750000000000000000008c00", 0x0) socket$nl_crypto(0x10, 0x3, 0x15) pwritev(r2, &(0x7f0000f50f90)=[{&(0x7f0000000040)="aa", 0x1}], 0x1, 0x81006) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r2) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000380)=0x0) ptrace$peekuser(0x3, r3, 0x9) ioctl$DRM_IOCTL_AGP_ALLOC(0xffffffffffffffff, 0xc0206434, &(0x7f0000000080)) fcntl$setlease(0xffffffffffffffff, 0x400, 0x0) syz_open_procfs(0x0, &(0x7f0000000100)='/exe\x00\x00\x00\x00\x00\x00') preadv(0xffffffffffffffff, &(0x7f0000000040), 0x41, 0x0) sendfile(r0, r2, &(0x7f0000000080), 0x102000004) setns(r1, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f00000000c0)={{{@in=@rand_addr, @in=@dev}}, {{@in6=@mcast1}, 0x0, @in=@local}}, &(0x7f00000001c0)=0xe8) 2018/04/30 20:08:48 executing program 0: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00003e0000)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETAF(r0, 0x402c542c, &(0x7f0000000000)) 2018/04/30 20:08:48 executing program 7: r0 = syz_open_dev$sndtimer(&(0x7f0000214ff1)='/dev/snd/timer\x00', 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_TREAD(r0, 0x40045402, &(0x7f000001dffc)=0x9) ioctl$SNDRV_TIMER_IOCTL_SELECT(r0, 0x40345410, &(0x7f0000001000)={{0x100000001}}) r1 = epoll_create1(0x0) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, &(0x7f0000000040)={0x3}) ioctl$SNDRV_TIMER_IOCTL_PARAMS(r0, 0x40505412, &(0x7f000001cfb0)={0x0, 0x1, 0x0, 0x0, 0xf}) ioctl$SNDRV_TIMER_IOCTL_START(r0, 0x54a0) poll(&(0x7f0000050fd8)=[{r1}], 0x1, 0x0) 2018/04/30 20:08:48 executing program 0: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00003e0000)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETAF(r0, 0x402c542c, &(0x7f0000000000)) 2018/04/30 20:08:48 executing program 7: r0 = syz_open_dev$sndtimer(&(0x7f0000214ff1)='/dev/snd/timer\x00', 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_TREAD(r0, 0x40045402, &(0x7f000001dffc)=0x9) ioctl$SNDRV_TIMER_IOCTL_SELECT(r0, 0x40345410, &(0x7f0000001000)={{0x100000001}}) r1 = epoll_create1(0x0) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, &(0x7f0000000040)={0x3}) ioctl$SNDRV_TIMER_IOCTL_PARAMS(r0, 0x40505412, &(0x7f000001cfb0)={0x0, 0x1, 0x0, 0x0, 0xf}) ioctl$SNDRV_TIMER_IOCTL_START(r0, 0x54a0) poll(&(0x7f0000050fd8)=[{r1}], 0x1, 0x0) 2018/04/30 20:08:48 executing program 0: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00003e0000)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETAF(r0, 0x402c542c, &(0x7f0000000000)) 2018/04/30 20:08:48 executing program 7: r0 = syz_open_dev$sndtimer(&(0x7f0000214ff1)='/dev/snd/timer\x00', 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_TREAD(r0, 0x40045402, &(0x7f000001dffc)=0x9) ioctl$SNDRV_TIMER_IOCTL_SELECT(r0, 0x40345410, &(0x7f0000001000)={{0x100000001}}) r1 = epoll_create1(0x0) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, &(0x7f0000000040)={0x3}) ioctl$SNDRV_TIMER_IOCTL_PARAMS(r0, 0x40505412, &(0x7f000001cfb0)={0x0, 0x1, 0x0, 0x0, 0xf}) ioctl$SNDRV_TIMER_IOCTL_START(r0, 0x54a0) poll(&(0x7f0000050fd8)=[{r1}], 0x1, 0x0) 2018/04/30 20:08:48 executing program 4: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = memfd_create(&(0x7f000000e000)='\x00 ', 0x0) r1 = syz_open_dev$sndseq(&(0x7f0000000180)='/dev/snd/seq\x00', 0x0, 0x101801) ioctl$SNDRV_SEQ_IOCTL_GET_PORT_INFO(r0, 0xc0a85322, &(0x7f00000001c0)) pselect6(0x40, &(0x7f0000000080)={0x40, 0x6, 0x200, 0x8, 0x0, 0x80, 0x0, 0x7}, &(0x7f0000000280)={0x5, 0x2, 0x0, 0x80000000, 0xf4, 0x0, 0x81}, &(0x7f00000002c0)={0x53f0}, &(0x7f0000000300)={0x0, 0x1c9c380}, &(0x7f0000000480)={&(0x7f0000000440), 0x8}) r2 = dup2(r1, r0) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r2, 0xc08c5332, &(0x7f000002b000)={0x0, 0x0, 0x0, "9ede7a8c5ae95ec8672c93340f643a664f13eeab65c0322901dc6bd36cde2c51f01b7f0b014f9f91eeb7c37c7240f476c8d753d000aa8faf8fb574dbcfa6dc4d"}) write$sndseq(r0, &(0x7f0000000080), 0xffffff17) r3 = socket$netlink(0x10, 0x3, 0x0) getsockname$packet(0xffffffffffffff9c, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @link_local}, &(0x7f0000000200)=0x14) sendmmsg(r3, &(0x7f00000004c0)=[{{&(0x7f0000000240)=@ll={0x11, 0xf, r4, 0x1, 0x101, 0x6}, 0x80, &(0x7f0000000340)=[{&(0x7f00000002c0)="d043fe83922ff8bcd1e826069830af42bdea147623dc2808beabb3b9be63a423774b8ce080bef5b037dd1b6fabb5dc73e68d78358a20ab477f387973b3e2eed81d", 0x41}], 0x1, 0x0, 0x0, 0x8000}, 0x8e5}], 0x1, 0x4) syz_open_procfs(0x0, &(0x7f0000000180)='net/igmp\x00') syz_open_dev$sg(&(0x7f0000000000)='/dev/sg#\x00', 0x3ff, 0x8202) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_PORT(r2, 0xc0a85352, &(0x7f00000000c0)={{0xccea, 0x6}, 'port0\x00', 0x1, 0x10, 0x20, 0x4, 0x7, 0x1, 0x224, 0x0, 0x7, 0xffffffffffffffb1}) 2018/04/30 20:08:48 executing program 0: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00003e0000)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETAF(r0, 0x402c542c, &(0x7f0000000000)) 2018/04/30 20:08:48 executing program 2: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000240), 0x9}, 0x0, 0x0, 0x0, 0x6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = creat(&(0x7f00000000c0)='./bus\x00', 0x0) r1 = open(&(0x7f0000000000)='./bus\x00', 0x26302, 0x0) write$tun(r0, &(0x7f0000000180)={@pi, @hdr={0x1, 0x80, 0x0, 0x6, 0x0, 0x50d}, @ipx={0xffff, 0x1e, 0x8000, 0x5, {@broadcast=0xffffffff, @current, 0x401}, {@broadcast=0xffffffff, @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], 0x4}}}, 0x2c) ftruncate(r1, 0x80000) sendfile(r0, r1, &(0x7f0000d83ff8), 0x8000fffffffe) sendfile(r1, r1, &(0x7f0000000140), 0xffffffff) open(&(0x7f0000000100)='./bus/file0\x00', 0x1, 0x0) 2018/04/30 20:08:48 executing program 6: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000240), 0x9}, 0x0, 0x0, 0x0, 0x6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = creat(&(0x7f00000000c0)='./bus\x00', 0x0) r1 = open(&(0x7f0000000000)='./bus\x00', 0x26302, 0x0) write$tun(r0, &(0x7f0000000180)={@pi, @hdr={0x1, 0x80, 0x0, 0x6, 0x0, 0x50d}, @ipx={0xffff, 0x1e, 0x8000, 0x5, {@broadcast=0xffffffff, @current, 0x401}, {@broadcast=0xffffffff, @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], 0x4}}}, 0x2c) ftruncate(r1, 0x80000) sendfile(r0, r1, &(0x7f0000d83ff8), 0x8000fffffffe) sendfile(r1, r1, &(0x7f0000000140), 0xffffffff) open(&(0x7f0000000100)='./bus/file0\x00', 0x1, 0x0) 2018/04/30 20:08:48 executing program 1: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = memfd_create(&(0x7f000000e000)='\x00 ', 0x0) r1 = syz_open_dev$sndseq(&(0x7f0000000180)='/dev/snd/seq\x00', 0x0, 0x101801) ioctl$SNDRV_SEQ_IOCTL_GET_PORT_INFO(r0, 0xc0a85322, &(0x7f00000001c0)) pselect6(0x40, &(0x7f0000000080)={0x40, 0x6, 0x200, 0x8, 0x0, 0x80, 0x0, 0x7}, &(0x7f0000000280)={0x5, 0x2, 0x0, 0x80000000, 0xf4, 0x0, 0x81}, &(0x7f00000002c0)={0x53f0}, &(0x7f0000000300)={0x0, 0x1c9c380}, &(0x7f0000000480)={&(0x7f0000000440), 0x8}) r2 = dup2(r1, r0) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r2, 0xc08c5332, &(0x7f000002b000)={0x0, 0x0, 0x0, "9ede7a8c5ae95ec8672c93340f643a664f13eeab65c0322901dc6bd36cde2c51f01b7f0b014f9f91eeb7c37c7240f476c8d753d000aa8faf8fb574dbcfa6dc4d"}) write$sndseq(r0, &(0x7f0000000080), 0xffffff17) r3 = socket$netlink(0x10, 0x3, 0x0) getsockname$packet(0xffffffffffffff9c, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @link_local}, &(0x7f0000000200)=0x14) sendmmsg(r3, &(0x7f00000004c0)=[{{&(0x7f0000000240)=@ll={0x11, 0xf, r4, 0x1, 0x101, 0x6}, 0x80, &(0x7f0000000340)=[{&(0x7f00000002c0)="d043fe83922ff8bcd1e826069830af42bdea147623dc2808beabb3b9be63a423774b8ce080bef5b037dd1b6fabb5dc73e68d78358a20ab477f387973b3e2eed81d", 0x41}], 0x1, 0x0, 0x0, 0x8000}, 0x8e5}], 0x1, 0x4) syz_open_procfs(0x0, &(0x7f0000000180)='net/igmp\x00') syz_open_dev$sg(&(0x7f0000000000)='/dev/sg#\x00', 0x3ff, 0x8202) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_PORT(r2, 0xc0a85352, &(0x7f00000000c0)={{0xccea, 0x6}, 'port0\x00', 0x1, 0x10, 0x20, 0x4, 0x7, 0x1, 0x224, 0x0, 0x7, 0xffffffffffffffb1}) 2018/04/30 20:08:48 executing program 5: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000180)='/dev/sequencer\x00', 0x45, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='mountinfo\x00') r2 = creat(&(0x7f0000000700)='./bus\x00', 0x0) r3 = open(&(0x7f0000000000)='./bus\x00', 0x26302, 0x0) ftruncate(r3, 0x80000) ioctl$DRM_IOCTL_SET_VERSION(0xffffffffffffffff, 0xc0106407, &(0x7f00000000c0)={0x4}) sendfile(r2, r3, &(0x7f0000d83ff8), 0x8000fffffffe) sendfile(r0, r1, &(0x7f0000000040), 0x100000000081) 2018/04/30 20:08:48 executing program 3: unshare(0x8000400) perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x72, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000100)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = mq_open(&(0x7f0000000000)='-$\x00', 0x6e93ebbbcc0884f2, 0x0, &(0x7f0000664fc0)={0x0, 0x5, 0x2}) mq_notify(r0, &(0x7f0000000200)={0x0, 0x0, 0x0, @thr={&(0x7f0000000040), &(0x7f0000000100)}}) 2018/04/30 20:08:48 executing program 0: r0 = inotify_init1(0x0) fcntl$setown(r0, 0x8, 0xffffffffffffffff) mmap(&(0x7f0000000000/0x237000)=nil, 0x237000, 0x0, 0x32, 0xffffffffffffffff, 0x0) fcntl$getownex(r0, 0x10, &(0x7f000045fff8)={0x0, 0x0}) ptrace$setopts(0x4206, r1, 0x0, 0x0) waitid(0x0, 0x0, &(0x7f0000000000), 0x5, 0x0) 2018/04/30 20:08:49 executing program 7: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$inet_mreqsrc(r0, 0x0, 0x27, &(0x7f000001b000)={@multicast2=0xe0000002, @loopback=0x7f000001, @multicast1=0xe0000001}, 0xc) setsockopt$inet_MCAST_JOIN_GROUP(0xffffffffffffffff, 0x0, 0x2a, &(0x7f0000008000)={0x1, {{0x2, 0x0, @multicast2=0xe0000002}}}, 0xfffffffffffffca0) r1 = socket$inet_udp(0x2, 0x2, 0x0) dup2(r0, r1) setsockopt$inet_mreqsrc(r1, 0x0, 0x27, &(0x7f0000000000)={@multicast2=0xe0000002, @local={0xac, 0x14, 0x14, 0xaa}, @dev={0xac, 0x14}}, 0xc) getsockopt$inet_buf(r1, 0x0, 0x30, &(0x7f0000008000)=""/144, &(0x7f0000004000)=0x90) 2018/04/30 20:08:49 executing program 0: r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_int(r0, 0x107, 0x9, &(0x7f0000000000), 0x2) 2018/04/30 20:08:49 executing program 7: mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0x7, 0x31, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00002e9000)='task\x00') getdents(r0, &(0x7f0000720fd4)=""/44, 0x1b3) 2018/04/30 20:08:49 executing program 3: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, @perf_bp={&(0x7f0000000240)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = creat(&(0x7f00000000c0)='./bus\x00', 0x0) r1 = open(&(0x7f0000000000)='./bus\x00', 0x26302, 0x0) write$tun(r0, &(0x7f0000000180)={@pi={0x0, 0x809b}, @hdr={0x1, 0x0, 0xe29, 0x6, 0x0, 0x50d}, @ipx={0xffff, 0x9c, 0x8000, 0x5, {@broadcast=0xffffffff, @current, 0x401}, {@broadcast=0xffffffff, @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], 0x4}, "18b2f71d03643256bb6afb12e50ec747163399ece02e5cdf615901bb23127f59fa41a538cc7f4fbd82b143e67c2f4f6057045d605c2641aceb3cddea8ac7b3382a148c323b1fef2fc5540dec354cb8f22a4d4466b3b5ecfd6ca16e38aa881d3d505fa1be1995c8abd8f889ebe4854ed249bad4475f7621de1ca471d1c95f"}}, 0xaa) ftruncate(r1, 0x80000) sendfile(r0, r1, &(0x7f0000d83ff8), 0x8000fffffffe) sendfile(r1, r1, &(0x7f0000000140), 0xffffffff) open(&(0x7f0000000100)='./bus/file0\x00', 0x1, 0x0) 2018/04/30 20:08:49 executing program 7: r0 = add_key$keyring(&(0x7f00000001c0)='keyring\x00', &(0x7f0000000200)={0x73, 0x79, 0x7a}, 0x0, 0x0, 0xfffffffffffffffb) add_key$keyring(&(0x7f0000000240)='keyring\x00', &(0x7f0000000400)={0x73, 0x79, 0x7a}, 0x0, 0x0, r0) keyctl$clear(0x7, r0) 2018/04/30 20:08:49 executing program 0: r0 = socket$inet(0x10, 0x2, 0x0) sendmsg(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000004000)=[{&(0x7f0000000080)="2f0000001c0003fd6d0000360000000002dd0700050000001f5f13c908000100f8ff72730beeffff005867855e7fa5", 0x2f}], 0x1}, 0x0) 2018/04/30 20:08:49 executing program 7: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000196fe4)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f0000000000)={0x2, 0x400000000000004, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, [@sadb_sa={0x2, 0x1}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xffffffffffffffff}}}]}, 0x48}, 0x1}, 0x0) 2018/04/30 20:08:49 executing program 1: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = memfd_create(&(0x7f000000e000)='\x00 ', 0x0) r1 = syz_open_dev$sndseq(&(0x7f0000000180)='/dev/snd/seq\x00', 0x0, 0x101801) ioctl$SNDRV_SEQ_IOCTL_GET_PORT_INFO(r0, 0xc0a85322, &(0x7f00000001c0)) pselect6(0x40, &(0x7f0000000080)={0x40, 0x6, 0x200, 0x8, 0x0, 0x80, 0x0, 0x7}, &(0x7f0000000280)={0x5, 0x2, 0x0, 0x80000000, 0xf4, 0x0, 0x81}, &(0x7f00000002c0)={0x53f0}, &(0x7f0000000300)={0x0, 0x1c9c380}, &(0x7f0000000480)={&(0x7f0000000440), 0x8}) r2 = dup2(r1, r0) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r2, 0xc08c5332, &(0x7f000002b000)={0x0, 0x0, 0x0, "9ede7a8c5ae95ec8672c93340f643a664f13eeab65c0322901dc6bd36cde2c51f01b7f0b014f9f91eeb7c37c7240f476c8d753d000aa8faf8fb574dbcfa6dc4d"}) write$sndseq(r0, &(0x7f0000000080), 0xffffff17) r3 = socket$netlink(0x10, 0x3, 0x0) getsockname$packet(0xffffffffffffff9c, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @link_local}, &(0x7f0000000200)=0x14) sendmmsg(r3, &(0x7f00000004c0)=[{{&(0x7f0000000240)=@ll={0x11, 0xf, r4, 0x1, 0x101, 0x6}, 0x80, &(0x7f0000000340)=[{&(0x7f00000002c0)="d043fe83922ff8bcd1e826069830af42bdea147623dc2808beabb3b9be63a423774b8ce080bef5b037dd1b6fabb5dc73e68d78358a20ab477f387973b3e2eed81d", 0x41}], 0x1, 0x0, 0x0, 0x8000}, 0x8e5}], 0x1, 0x4) syz_open_procfs(0x0, &(0x7f0000000180)='net/igmp\x00') syz_open_dev$sg(&(0x7f0000000000)='/dev/sg#\x00', 0x3ff, 0x8202) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_PORT(r2, 0xc0a85352, &(0x7f00000000c0)={{0xccea, 0x6}, 'port0\x00', 0x1, 0x10, 0x20, 0x4, 0x7, 0x1, 0x224, 0x0, 0x7, 0xffffffffffffffb1}) 2018/04/30 20:08:49 executing program 4: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = memfd_create(&(0x7f000000e000)='\x00 ', 0x0) r1 = syz_open_dev$sndseq(&(0x7f0000000180)='/dev/snd/seq\x00', 0x0, 0x101801) ioctl$SNDRV_SEQ_IOCTL_GET_PORT_INFO(r0, 0xc0a85322, &(0x7f00000001c0)) pselect6(0x40, &(0x7f0000000080)={0x40, 0x6, 0x200, 0x8, 0x0, 0x80, 0x0, 0x7}, &(0x7f0000000280)={0x5, 0x2, 0x0, 0x80000000, 0xf4, 0x0, 0x81}, &(0x7f00000002c0)={0x53f0}, &(0x7f0000000300)={0x0, 0x1c9c380}, &(0x7f0000000480)={&(0x7f0000000440), 0x8}) r2 = dup2(r1, r0) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r2, 0xc08c5332, &(0x7f000002b000)={0x0, 0x0, 0x0, "9ede7a8c5ae95ec8672c93340f643a664f13eeab65c0322901dc6bd36cde2c51f01b7f0b014f9f91eeb7c37c7240f476c8d753d000aa8faf8fb574dbcfa6dc4d"}) write$sndseq(r0, &(0x7f0000000080), 0xffffff17) r3 = socket$netlink(0x10, 0x3, 0x0) getsockname$packet(0xffffffffffffff9c, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @link_local}, &(0x7f0000000200)=0x14) sendmmsg(r3, &(0x7f00000004c0)=[{{&(0x7f0000000240)=@ll={0x11, 0xf, r4, 0x1, 0x101, 0x6}, 0x80, &(0x7f0000000340)=[{&(0x7f00000002c0)="d043fe83922ff8bcd1e826069830af42bdea147623dc2808beabb3b9be63a423774b8ce080bef5b037dd1b6fabb5dc73e68d78358a20ab477f387973b3e2eed81d", 0x41}], 0x1, 0x0, 0x0, 0x8000}, 0x8e5}], 0x1, 0x4) syz_open_procfs(0x0, &(0x7f0000000180)='net/igmp\x00') syz_open_dev$sg(&(0x7f0000000000)='/dev/sg#\x00', 0x3ff, 0x8202) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_PORT(r2, 0xc0a85352, &(0x7f00000000c0)={{0xccea, 0x6}, 'port0\x00', 0x1, 0x10, 0x20, 0x4, 0x7, 0x1, 0x224, 0x0, 0x7, 0xffffffffffffffb1}) [ 64.316382] netlink: 11 bytes leftover after parsing attributes in process `syz-executor0'. 2018/04/30 20:08:49 executing program 0: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, @perf_bp={&(0x7f0000000240)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = creat(&(0x7f00000000c0)='./bus\x00', 0x0) r1 = open(&(0x7f0000000000)='./bus\x00', 0x26302, 0x0) write$tun(r0, &(0x7f0000000180)={@pi={0x0, 0x809b}, @hdr={0x1, 0x0, 0xe29, 0x6, 0x0, 0x50d}, @ipx={0xffff, 0x9c, 0x8000, 0x5, {@broadcast=0xffffffff, @current, 0x401}, {@broadcast=0xffffffff, @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], 0x4}, "18b2f71d03643256bb6afb12e50ec747163399ece02e5cdf615901bb23127f59fa41a538cc7f4fbd82b143e67c2f4f6057045d605c2641aceb3cddea8ac7b3382a148c323b1fef2fc5540dec354cb8f22a4d4466b3b5ecfd6ca16e38aa881d3d505fa1be1995c8abd8f889ebe4854ed249bad4475f7621de1ca471d1c95f"}}, 0xaa) ftruncate(r1, 0x80000) sendfile(r0, r1, &(0x7f0000d83ff8), 0x8000fffffffe) sendfile(r1, r1, &(0x7f0000000140), 0xffffffff) open(&(0x7f0000000100)='./bus/file0\x00', 0x1, 0x0) 2018/04/30 20:08:49 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(0xffffffffffffffff, &(0x7f0000b55000)={0x2}, 0xfffffffffffffe5b) perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x71}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getsockopt$IP_VS_SO_GET_INFO(r0, 0x0, 0x481, &(0x7f0000000140), &(0x7f0000000180)=0xc) 2018/04/30 20:08:49 executing program 7: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000080)='IPVS\x00') sendmsg$IPVS_CMD_NEW_DAEMON(r0, &(0x7f0000000200)={&(0x7f0000000040)={0x10}, 0xc, &(0x7f00000000c0)={&(0x7f0000000140)={0x20, r1, 0x103, 0x0, 0x0, {0x9}, [@IPVS_CMD_ATTR_DAEMON={0xc, 0x3, [@IPVS_DAEMON_ATTR_STATE={0x8, 0x1}]}]}, 0x20}, 0x1}, 0x0) 2018/04/30 20:08:49 executing program 4: r0 = creat(&(0x7f00008b2000)='./file0\x00', 0x0) lsetxattr(&(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)=@known='user.syz\x00', &(0x7f00000003c0)='%\x00', 0x2, 0x0) lsetxattr(&(0x7f0000712ff8)='./file0\x00', &(0x7f0000faffe7)=@known='security.capability\x00', &(0x7f0000d9ffec)="0000000201000000000000010400000000000000", 0x14, 0x0) flistxattr(r0, &(0x7f0000000500)=""/207, 0xcf) 2018/04/30 20:08:49 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x200400, 0x0) ioctl$SG_GET_LOW_DMA(r1, 0x227a, &(0x7f0000000040)) setsockopt$inet_opts(r0, 0x0, 0x4, &(0x7f000058f000)="440d0500ec0000000000000000", 0xd) getsockopt$inet_opts(r0, 0x0, 0x4, &(0x7f000069d000), &(0x7f00006ccffc)) 2018/04/30 20:08:49 executing program 6: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000180)='/dev/sequencer\x00', 0x45, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='mountinfo\x00') r2 = creat(&(0x7f0000000700)='./bus\x00', 0x0) r3 = open(&(0x7f0000000000)='./bus\x00', 0x26302, 0x0) ftruncate(r3, 0x80000) ioctl$DRM_IOCTL_SET_VERSION(0xffffffffffffffff, 0xc0106407, &(0x7f00000000c0)={0x4}) sendfile(r2, r3, &(0x7f0000d83ff8), 0x8000fffffffe) sendfile(r0, r1, &(0x7f0000000040), 0x100000000081) 2018/04/30 20:08:49 executing program 3: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, @perf_bp={&(0x7f0000000240)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = creat(&(0x7f00000000c0)='./bus\x00', 0x0) r1 = open(&(0x7f0000000000)='./bus\x00', 0x26302, 0x0) write$tun(r0, &(0x7f0000000180)={@pi={0x0, 0x809b}, @hdr={0x1, 0x0, 0xe29, 0x6, 0x0, 0x50d}, @ipx={0xffff, 0x9c, 0x8000, 0x5, {@broadcast=0xffffffff, @current, 0x401}, {@broadcast=0xffffffff, @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], 0x4}, "18b2f71d03643256bb6afb12e50ec747163399ece02e5cdf615901bb23127f59fa41a538cc7f4fbd82b143e67c2f4f6057045d605c2641aceb3cddea8ac7b3382a148c323b1fef2fc5540dec354cb8f22a4d4466b3b5ecfd6ca16e38aa881d3d505fa1be1995c8abd8f889ebe4854ed249bad4475f7621de1ca471d1c95f"}}, 0xaa) ftruncate(r1, 0x80000) sendfile(r0, r1, &(0x7f0000d83ff8), 0x8000fffffffe) sendfile(r1, r1, &(0x7f0000000140), 0xffffffff) open(&(0x7f0000000100)='./bus/file0\x00', 0x1, 0x0) 2018/04/30 20:08:49 executing program 5: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000180)='/dev/sequencer\x00', 0x45, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='mountinfo\x00') r2 = creat(&(0x7f0000000700)='./bus\x00', 0x0) r3 = open(&(0x7f0000000000)='./bus\x00', 0x26302, 0x0) ftruncate(r3, 0x80000) ioctl$DRM_IOCTL_SET_VERSION(0xffffffffffffffff, 0xc0106407, &(0x7f00000000c0)={0x4}) sendfile(r2, r3, &(0x7f0000d83ff8), 0x8000fffffffe) sendfile(r0, r1, &(0x7f0000000040), 0x100000000081) 2018/04/30 20:08:49 executing program 7: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, @perf_bp={&(0x7f0000000240)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = creat(&(0x7f00000000c0)='./bus\x00', 0x0) r1 = open(&(0x7f0000000000)='./bus\x00', 0x26302, 0x0) write$tun(r0, &(0x7f0000000180)={@pi={0x0, 0x809b}, @hdr={0x1, 0x0, 0xe29, 0x6, 0x0, 0x50d}, @ipx={0xffff, 0x9c, 0x8000, 0x5, {@broadcast=0xffffffff, @current, 0x401}, {@broadcast=0xffffffff, @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], 0x4}, "18b2f71d03643256bb6afb12e50ec747163399ece02e5cdf615901bb23127f59fa41a538cc7f4fbd82b143e67c2f4f6057045d605c2641aceb3cddea8ac7b3382a148c323b1fef2fc5540dec354cb8f22a4d4466b3b5ecfd6ca16e38aa881d3d505fa1be1995c8abd8f889ebe4854ed249bad4475f7621de1ca471d1c95f"}}, 0xaa) ftruncate(r1, 0x80000) sendfile(r0, r1, &(0x7f0000d83ff8), 0x8000fffffffe) sendfile(r1, r1, &(0x7f0000000140), 0xffffffff) open(&(0x7f0000000100)='./bus/file0\x00', 0x1, 0x0) 2018/04/30 20:08:49 executing program 1: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, @perf_bp={&(0x7f0000000240)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = creat(&(0x7f00000000c0)='./bus\x00', 0x0) r1 = open(&(0x7f0000000000)='./bus\x00', 0x26302, 0x0) write$tun(r0, &(0x7f0000000180)={@pi={0x0, 0x809b}, @hdr={0x1, 0x0, 0xe29, 0x6, 0x0, 0x50d}, @ipx={0xffff, 0x9c, 0x8000, 0x5, {@broadcast=0xffffffff, @current, 0x401}, {@broadcast=0xffffffff, @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], 0x4}, "18b2f71d03643256bb6afb12e50ec747163399ece02e5cdf615901bb23127f59fa41a538cc7f4fbd82b143e67c2f4f6057045d605c2641aceb3cddea8ac7b3382a148c323b1fef2fc5540dec354cb8f22a4d4466b3b5ecfd6ca16e38aa881d3d505fa1be1995c8abd8f889ebe4854ed249bad4475f7621de1ca471d1c95f"}}, 0xaa) ftruncate(r1, 0x80000) sendfile(r0, r1, &(0x7f0000d83ff8), 0x8000fffffffe) sendfile(r1, r1, &(0x7f0000000140), 0xffffffff) open(&(0x7f0000000100)='./bus/file0\x00', 0x1, 0x0) 2018/04/30 20:08:49 executing program 4: r0 = creat(&(0x7f00008b2000)='./file0\x00', 0x0) lsetxattr(&(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)=@known='user.syz\x00', &(0x7f00000003c0)='%\x00', 0x2, 0x0) lsetxattr(&(0x7f0000712ff8)='./file0\x00', &(0x7f0000faffe7)=@known='security.capability\x00', &(0x7f0000d9ffec)="0000000201000000000000010400000000000000", 0x14, 0x0) flistxattr(r0, &(0x7f0000000500)=""/207, 0xcf) 2018/04/30 20:08:49 executing program 2: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, @perf_bp={&(0x7f0000000240)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = creat(&(0x7f00000000c0)='./bus\x00', 0x0) r1 = open(&(0x7f0000000000)='./bus\x00', 0x26302, 0x0) write$tun(r0, &(0x7f0000000180)={@pi={0x0, 0x809b}, @hdr={0x1, 0x0, 0xe29, 0x6, 0x0, 0x50d}, @ipx={0xffff, 0x9c, 0x8000, 0x5, {@broadcast=0xffffffff, @current, 0x401}, {@broadcast=0xffffffff, @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], 0x4}, "18b2f71d03643256bb6afb12e50ec747163399ece02e5cdf615901bb23127f59fa41a538cc7f4fbd82b143e67c2f4f6057045d605c2641aceb3cddea8ac7b3382a148c323b1fef2fc5540dec354cb8f22a4d4466b3b5ecfd6ca16e38aa881d3d505fa1be1995c8abd8f889ebe4854ed249bad4475f7621de1ca471d1c95f"}}, 0xaa) ftruncate(r1, 0x80000) sendfile(r0, r1, &(0x7f0000d83ff8), 0x8000fffffffe) sendfile(r1, r1, &(0x7f0000000140), 0xffffffff) open(&(0x7f0000000100)='./bus/file0\x00', 0x1, 0x0) 2018/04/30 20:08:49 executing program 4: r0 = creat(&(0x7f00008b2000)='./file0\x00', 0x0) lsetxattr(&(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)=@known='user.syz\x00', &(0x7f00000003c0)='%\x00', 0x2, 0x0) lsetxattr(&(0x7f0000712ff8)='./file0\x00', &(0x7f0000faffe7)=@known='security.capability\x00', &(0x7f0000d9ffec)="0000000201000000000000010400000000000000", 0x14, 0x0) flistxattr(r0, &(0x7f0000000500)=""/207, 0xcf) 2018/04/30 20:08:50 executing program 4: r0 = creat(&(0x7f00008b2000)='./file0\x00', 0x0) lsetxattr(&(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)=@known='user.syz\x00', &(0x7f00000003c0)='%\x00', 0x2, 0x0) lsetxattr(&(0x7f0000712ff8)='./file0\x00', &(0x7f0000faffe7)=@known='security.capability\x00', &(0x7f0000d9ffec)="0000000201000000000000010400000000000000", 0x14, 0x0) flistxattr(r0, &(0x7f0000000500)=""/207, 0xcf) 2018/04/30 20:08:50 executing program 5: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000180)='/dev/sequencer\x00', 0x45, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='mountinfo\x00') r2 = creat(&(0x7f0000000700)='./bus\x00', 0x0) r3 = open(&(0x7f0000000000)='./bus\x00', 0x26302, 0x0) ftruncate(r3, 0x80000) ioctl$DRM_IOCTL_SET_VERSION(0xffffffffffffffff, 0xc0106407, &(0x7f00000000c0)={0x4}) sendfile(r2, r3, &(0x7f0000d83ff8), 0x8000fffffffe) sendfile(r0, r1, &(0x7f0000000040), 0x100000000081) 2018/04/30 20:08:50 executing program 6: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000180)='/dev/sequencer\x00', 0x45, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='mountinfo\x00') r2 = creat(&(0x7f0000000700)='./bus\x00', 0x0) r3 = open(&(0x7f0000000000)='./bus\x00', 0x26302, 0x0) ftruncate(r3, 0x80000) ioctl$DRM_IOCTL_SET_VERSION(0xffffffffffffffff, 0xc0106407, &(0x7f00000000c0)={0x4}) sendfile(r2, r3, &(0x7f0000d83ff8), 0x8000fffffffe) sendfile(r0, r1, &(0x7f0000000040), 0x100000000081) 2018/04/30 20:08:50 executing program 3: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, @perf_bp={&(0x7f0000000240)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = creat(&(0x7f00000000c0)='./bus\x00', 0x0) r1 = open(&(0x7f0000000000)='./bus\x00', 0x26302, 0x0) write$tun(r0, &(0x7f0000000180)={@pi={0x0, 0x809b}, @hdr={0x1, 0x0, 0xe29, 0x6, 0x0, 0x50d}, @ipx={0xffff, 0x9c, 0x8000, 0x5, {@broadcast=0xffffffff, @current, 0x401}, {@broadcast=0xffffffff, @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], 0x4}, "18b2f71d03643256bb6afb12e50ec747163399ece02e5cdf615901bb23127f59fa41a538cc7f4fbd82b143e67c2f4f6057045d605c2641aceb3cddea8ac7b3382a148c323b1fef2fc5540dec354cb8f22a4d4466b3b5ecfd6ca16e38aa881d3d505fa1be1995c8abd8f889ebe4854ed249bad4475f7621de1ca471d1c95f"}}, 0xaa) ftruncate(r1, 0x80000) sendfile(r0, r1, &(0x7f0000d83ff8), 0x8000fffffffe) sendfile(r1, r1, &(0x7f0000000140), 0xffffffff) open(&(0x7f0000000100)='./bus/file0\x00', 0x1, 0x0) 2018/04/30 20:08:50 executing program 0: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, @perf_bp={&(0x7f0000000240)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = creat(&(0x7f00000000c0)='./bus\x00', 0x0) r1 = open(&(0x7f0000000000)='./bus\x00', 0x26302, 0x0) write$tun(r0, &(0x7f0000000180)={@pi={0x0, 0x809b}, @hdr={0x1, 0x0, 0xe29, 0x6, 0x0, 0x50d}, @ipx={0xffff, 0x9c, 0x8000, 0x5, {@broadcast=0xffffffff, @current, 0x401}, {@broadcast=0xffffffff, @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], 0x4}, "18b2f71d03643256bb6afb12e50ec747163399ece02e5cdf615901bb23127f59fa41a538cc7f4fbd82b143e67c2f4f6057045d605c2641aceb3cddea8ac7b3382a148c323b1fef2fc5540dec354cb8f22a4d4466b3b5ecfd6ca16e38aa881d3d505fa1be1995c8abd8f889ebe4854ed249bad4475f7621de1ca471d1c95f"}}, 0xaa) ftruncate(r1, 0x80000) sendfile(r0, r1, &(0x7f0000d83ff8), 0x8000fffffffe) sendfile(r1, r1, &(0x7f0000000140), 0xffffffff) open(&(0x7f0000000100)='./bus/file0\x00', 0x1, 0x0) 2018/04/30 20:08:50 executing program 1: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, @perf_bp={&(0x7f0000000240)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = creat(&(0x7f00000000c0)='./bus\x00', 0x0) r1 = open(&(0x7f0000000000)='./bus\x00', 0x26302, 0x0) write$tun(r0, &(0x7f0000000180)={@pi={0x0, 0x809b}, @hdr={0x1, 0x0, 0xe29, 0x6, 0x0, 0x50d}, @ipx={0xffff, 0x9c, 0x8000, 0x5, {@broadcast=0xffffffff, @current, 0x401}, {@broadcast=0xffffffff, @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], 0x4}, "18b2f71d03643256bb6afb12e50ec747163399ece02e5cdf615901bb23127f59fa41a538cc7f4fbd82b143e67c2f4f6057045d605c2641aceb3cddea8ac7b3382a148c323b1fef2fc5540dec354cb8f22a4d4466b3b5ecfd6ca16e38aa881d3d505fa1be1995c8abd8f889ebe4854ed249bad4475f7621de1ca471d1c95f"}}, 0xaa) ftruncate(r1, 0x80000) sendfile(r0, r1, &(0x7f0000d83ff8), 0x8000fffffffe) sendfile(r1, r1, &(0x7f0000000140), 0xffffffff) open(&(0x7f0000000100)='./bus/file0\x00', 0x1, 0x0) 2018/04/30 20:08:50 executing program 7: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, @perf_bp={&(0x7f0000000240)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = creat(&(0x7f00000000c0)='./bus\x00', 0x0) r1 = open(&(0x7f0000000000)='./bus\x00', 0x26302, 0x0) write$tun(r0, &(0x7f0000000180)={@pi={0x0, 0x809b}, @hdr={0x1, 0x0, 0xe29, 0x6, 0x0, 0x50d}, @ipx={0xffff, 0x9c, 0x8000, 0x5, {@broadcast=0xffffffff, @current, 0x401}, {@broadcast=0xffffffff, @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], 0x4}, "18b2f71d03643256bb6afb12e50ec747163399ece02e5cdf615901bb23127f59fa41a538cc7f4fbd82b143e67c2f4f6057045d605c2641aceb3cddea8ac7b3382a148c323b1fef2fc5540dec354cb8f22a4d4466b3b5ecfd6ca16e38aa881d3d505fa1be1995c8abd8f889ebe4854ed249bad4475f7621de1ca471d1c95f"}}, 0xaa) ftruncate(r1, 0x80000) sendfile(r0, r1, &(0x7f0000d83ff8), 0x8000fffffffe) sendfile(r1, r1, &(0x7f0000000140), 0xffffffff) open(&(0x7f0000000100)='./bus/file0\x00', 0x1, 0x0) 2018/04/30 20:08:50 executing program 2: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, @perf_bp={&(0x7f0000000240)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = creat(&(0x7f00000000c0)='./bus\x00', 0x0) r1 = open(&(0x7f0000000000)='./bus\x00', 0x26302, 0x0) write$tun(r0, &(0x7f0000000180)={@pi={0x0, 0x809b}, @hdr={0x1, 0x0, 0xe29, 0x6, 0x0, 0x50d}, @ipx={0xffff, 0x9c, 0x8000, 0x5, {@broadcast=0xffffffff, @current, 0x401}, {@broadcast=0xffffffff, @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], 0x4}, "18b2f71d03643256bb6afb12e50ec747163399ece02e5cdf615901bb23127f59fa41a538cc7f4fbd82b143e67c2f4f6057045d605c2641aceb3cddea8ac7b3382a148c323b1fef2fc5540dec354cb8f22a4d4466b3b5ecfd6ca16e38aa881d3d505fa1be1995c8abd8f889ebe4854ed249bad4475f7621de1ca471d1c95f"}}, 0xaa) ftruncate(r1, 0x80000) sendfile(r0, r1, &(0x7f0000d83ff8), 0x8000fffffffe) sendfile(r1, r1, &(0x7f0000000140), 0xffffffff) open(&(0x7f0000000100)='./bus/file0\x00', 0x1, 0x0) 2018/04/30 20:08:50 executing program 4: recvmmsg(0xffffffffffffffff, &(0x7f0000004680), 0x0, 0xd22dc5dc840bd5b2, &(0x7f0000004700)={0x0, 0x1c9c380}) 2018/04/30 20:08:50 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f0000018000)='./file0\x00', &(0x7f000001c000)='./file0\x00', &(0x7f0000018ffa)='ramfs\x00', 0x0, &(0x7f0000000040)) open$dir(&(0x7f000001bff4)='./file0/bus\x00', 0x88040, 0x0) mount(&(0x7f0000033ff4)='./file0/bus\x00', &(0x7f000000fff8)='./file0\x00', &(0x7f0000032ffb)='fuse\x00', 0x7ffbf, &(0x7f0000032000)) open$dir(&(0x7f0000000040)='./file0/bus\x00', 0x200, 0x0) 2018/04/30 20:08:50 executing program 4: perf_event_open(&(0x7f000001d000)={0x2, 0x65, 0x72, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000100)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) r0 = inotify_init1(0x0) inotify_add_watch(r0, &(0x7f0000ac5000)='./file0\x00', 0xa400295c) rmdir(&(0x7f0000000000)='./file0\x00') 2018/04/30 20:08:51 executing program 4: mknod(&(0x7f0000000000)='./file0\x00', 0x1044, 0x0) acct(&(0x7f00000001c0)='./file0\x00') execve(&(0x7f0000000040)='./file0\x00', &(0x7f0000000240), &(0x7f0000000980)) 2018/04/30 20:08:51 executing program 5: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000180)='/dev/sequencer\x00', 0x45, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='mountinfo\x00') r2 = creat(&(0x7f0000000700)='./bus\x00', 0x0) r3 = open(&(0x7f0000000000)='./bus\x00', 0x26302, 0x0) ftruncate(r3, 0x80000) ioctl$DRM_IOCTL_SET_VERSION(0xffffffffffffffff, 0xc0106407, &(0x7f00000000c0)={0x4}) sendfile(r2, r3, &(0x7f0000d83ff8), 0x8000fffffffe) sendfile(r0, r1, &(0x7f0000000040), 0x100000000081) 2018/04/30 20:08:51 executing program 6: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000180)='/dev/sequencer\x00', 0x45, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='mountinfo\x00') r2 = creat(&(0x7f0000000700)='./bus\x00', 0x0) r3 = open(&(0x7f0000000000)='./bus\x00', 0x26302, 0x0) ftruncate(r3, 0x80000) ioctl$DRM_IOCTL_SET_VERSION(0xffffffffffffffff, 0xc0106407, &(0x7f00000000c0)={0x4}) sendfile(r2, r3, &(0x7f0000d83ff8), 0x8000fffffffe) sendfile(r0, r1, &(0x7f0000000040), 0x100000000081) [ 66.440363] syz-executor5 (7999) used greatest stack depth: 24056 bytes left 2018/04/30 20:08:51 executing program 0: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, @perf_bp={&(0x7f0000000240)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = creat(&(0x7f00000000c0)='./bus\x00', 0x0) r1 = open(&(0x7f0000000000)='./bus\x00', 0x26302, 0x0) write$tun(r0, &(0x7f0000000180)={@pi={0x0, 0x809b}, @hdr={0x1, 0x0, 0xe29, 0x6, 0x0, 0x50d}, @ipx={0xffff, 0x9c, 0x8000, 0x5, {@broadcast=0xffffffff, @current, 0x401}, {@broadcast=0xffffffff, @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], 0x4}, "18b2f71d03643256bb6afb12e50ec747163399ece02e5cdf615901bb23127f59fa41a538cc7f4fbd82b143e67c2f4f6057045d605c2641aceb3cddea8ac7b3382a148c323b1fef2fc5540dec354cb8f22a4d4466b3b5ecfd6ca16e38aa881d3d505fa1be1995c8abd8f889ebe4854ed249bad4475f7621de1ca471d1c95f"}}, 0xaa) ftruncate(r1, 0x80000) sendfile(r0, r1, &(0x7f0000d83ff8), 0x8000fffffffe) sendfile(r1, r1, &(0x7f0000000140), 0xffffffff) open(&(0x7f0000000100)='./bus/file0\x00', 0x1, 0x0) 2018/04/30 20:08:51 executing program 3: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, @perf_bp={&(0x7f0000000240)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = creat(&(0x7f00000000c0)='./bus\x00', 0x0) r1 = open(&(0x7f0000000000)='./bus\x00', 0x26302, 0x0) write$tun(r0, &(0x7f0000000180)={@pi={0x0, 0x809b}, @hdr={0x1, 0x0, 0xe29, 0x6, 0x0, 0x50d}, @ipx={0xffff, 0x9c, 0x8000, 0x5, {@broadcast=0xffffffff, @current, 0x401}, {@broadcast=0xffffffff, @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], 0x4}, "18b2f71d03643256bb6afb12e50ec747163399ece02e5cdf615901bb23127f59fa41a538cc7f4fbd82b143e67c2f4f6057045d605c2641aceb3cddea8ac7b3382a148c323b1fef2fc5540dec354cb8f22a4d4466b3b5ecfd6ca16e38aa881d3d505fa1be1995c8abd8f889ebe4854ed249bad4475f7621de1ca471d1c95f"}}, 0xaa) ftruncate(r1, 0x80000) sendfile(r0, r1, &(0x7f0000d83ff8), 0x8000fffffffe) sendfile(r1, r1, &(0x7f0000000140), 0xffffffff) open(&(0x7f0000000100)='./bus/file0\x00', 0x1, 0x0) 2018/04/30 20:08:51 executing program 2: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, @perf_bp={&(0x7f0000000240)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = creat(&(0x7f00000000c0)='./bus\x00', 0x0) r1 = open(&(0x7f0000000000)='./bus\x00', 0x26302, 0x0) write$tun(r0, &(0x7f0000000180)={@pi={0x0, 0x809b}, @hdr={0x1, 0x0, 0xe29, 0x6, 0x0, 0x50d}, @ipx={0xffff, 0x9c, 0x8000, 0x5, {@broadcast=0xffffffff, @current, 0x401}, {@broadcast=0xffffffff, @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], 0x4}, "18b2f71d03643256bb6afb12e50ec747163399ece02e5cdf615901bb23127f59fa41a538cc7f4fbd82b143e67c2f4f6057045d605c2641aceb3cddea8ac7b3382a148c323b1fef2fc5540dec354cb8f22a4d4466b3b5ecfd6ca16e38aa881d3d505fa1be1995c8abd8f889ebe4854ed249bad4475f7621de1ca471d1c95f"}}, 0xaa) ftruncate(r1, 0x80000) sendfile(r0, r1, &(0x7f0000d83ff8), 0x8000fffffffe) sendfile(r1, r1, &(0x7f0000000140), 0xffffffff) open(&(0x7f0000000100)='./bus/file0\x00', 0x1, 0x0) 2018/04/30 20:08:51 executing program 1: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, @perf_bp={&(0x7f0000000240)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = creat(&(0x7f00000000c0)='./bus\x00', 0x0) r1 = open(&(0x7f0000000000)='./bus\x00', 0x26302, 0x0) write$tun(r0, &(0x7f0000000180)={@pi={0x0, 0x809b}, @hdr={0x1, 0x0, 0xe29, 0x6, 0x0, 0x50d}, @ipx={0xffff, 0x9c, 0x8000, 0x5, {@broadcast=0xffffffff, @current, 0x401}, {@broadcast=0xffffffff, @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], 0x4}, "18b2f71d03643256bb6afb12e50ec747163399ece02e5cdf615901bb23127f59fa41a538cc7f4fbd82b143e67c2f4f6057045d605c2641aceb3cddea8ac7b3382a148c323b1fef2fc5540dec354cb8f22a4d4466b3b5ecfd6ca16e38aa881d3d505fa1be1995c8abd8f889ebe4854ed249bad4475f7621de1ca471d1c95f"}}, 0xaa) ftruncate(r1, 0x80000) sendfile(r0, r1, &(0x7f0000d83ff8), 0x8000fffffffe) sendfile(r1, r1, &(0x7f0000000140), 0xffffffff) open(&(0x7f0000000100)='./bus/file0\x00', 0x1, 0x0) 2018/04/30 20:08:51 executing program 7: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, @perf_bp={&(0x7f0000000240)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = creat(&(0x7f00000000c0)='./bus\x00', 0x0) r1 = open(&(0x7f0000000000)='./bus\x00', 0x26302, 0x0) write$tun(r0, &(0x7f0000000180)={@pi={0x0, 0x809b}, @hdr={0x1, 0x0, 0xe29, 0x6, 0x0, 0x50d}, @ipx={0xffff, 0x9c, 0x8000, 0x5, {@broadcast=0xffffffff, @current, 0x401}, {@broadcast=0xffffffff, @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], 0x4}, "18b2f71d03643256bb6afb12e50ec747163399ece02e5cdf615901bb23127f59fa41a538cc7f4fbd82b143e67c2f4f6057045d605c2641aceb3cddea8ac7b3382a148c323b1fef2fc5540dec354cb8f22a4d4466b3b5ecfd6ca16e38aa881d3d505fa1be1995c8abd8f889ebe4854ed249bad4475f7621de1ca471d1c95f"}}, 0xaa) ftruncate(r1, 0x80000) sendfile(r0, r1, &(0x7f0000d83ff8), 0x8000fffffffe) sendfile(r1, r1, &(0x7f0000000140), 0xffffffff) open(&(0x7f0000000100)='./bus/file0\x00', 0x1, 0x0) 2018/04/30 20:08:51 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000003000)={0x0, 0x0, &(0x7f0000000000)={&(0x7f000000e000)={0x2, 0x0, 0x0, 0x0, 0x2000000000000279}, 0x10}, 0x1}, 0x24004811) 2018/04/30 20:08:51 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f00007a3ff8)='./file0\x00', &(0x7f00004f5ff8)='./file0\x00', &(0x7f00000e1000)='ramfs\x00', 0x0, &(0x7f0000c81ffe)) r0 = inotify_init1(0x0) inotify_add_watch(r0, &(0x7f0000ac5000)='./file0\x00', 0xa400295c) r1 = open(&(0x7f0000fa3000)='./file0\x00', 0x0, 0x0) dup2(r0, r1) 2018/04/30 20:08:51 executing program 6: syz_mount_image$vfat(&(0x7f0000000140)='vfat\x00', &(0x7f00000001c0)='./file0//ile0\x00', 0x0, 0x0, &(0x7f0000000200), 0x0, &(0x7f0000000240)=ANY=[@ANYBLOB='codepage=862']) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000010000)="eb3c906d6b66732e66617400020401000200027000f8", 0x16}], 0x0, &(0x7f0000000240)=ANY=[]) creat(&(0x7f00000000c0)="2e2f66696c65302f2f696c6530ff", 0x0) 2018/04/30 20:08:52 executing program 4: r0 = syz_open_procfs(0x0, &(0x7f0000000040)='net/ip6_tables_targets\x00') close(r0) 2018/04/30 20:08:52 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000516ff0)={0x2, 0x4e21, @rand_addr}, 0x10) sendto$inet(r0, &(0x7f0000588fff), 0xfffffffffffffe98, 0x20020003, &(0x7f0000385ff0)={0x2, 0x4e21, @loopback=0x7f000001}, 0x10) shutdown(r0, 0x1) r1 = socket(0x10, 0x3, 0x4) sendmsg$nl_xfrm(r1, &(0x7f00009d3000)={&(0x7f0000c15000)={0x10}, 0xc, &(0x7f00001e5ff0)={&(0x7f0000abdefc)=@delsa={0x4c, 0x12, 0x515485708c54ddb, 0x0, 0x0, {@in=@rand_addr}, [@sec_ctx={0x24, 0x8, {0x1d, 0x8, 0x0, 0x0, 0x15, "69cc8910cf7a5164ef891111a0edabf37c1fd93a0d"}}]}, 0x4c}, 0x1}, 0x0) read(r1, &(0x7f0000000040)=""/89, 0x59) 2018/04/30 20:08:52 executing program 6: syz_mount_image$vfat(&(0x7f0000000140)='vfat\x00', &(0x7f00000001c0)='./file0//ile0\x00', 0x0, 0x0, &(0x7f0000000200), 0x0, &(0x7f0000000240)=ANY=[@ANYBLOB='codepage=862']) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000010000)="eb3c906d6b66732e66617400020401000200027000f8", 0x16}], 0x0, &(0x7f0000000240)=ANY=[]) creat(&(0x7f00000000c0)="2e2f66696c65302f2f696c6530ff", 0x0) 2018/04/30 20:08:52 executing program 4: r0 = socket$packet(0x11, 0x3, 0x300) getsockopt$sock_int(r0, 0x1, 0x26, &(0x7f0000000040), &(0x7f0000000080)=0x4) 2018/04/30 20:08:52 executing program 6: syz_mount_image$vfat(&(0x7f0000000140)='vfat\x00', &(0x7f00000001c0)='./file0//ile0\x00', 0x0, 0x0, &(0x7f0000000200), 0x0, &(0x7f0000000240)=ANY=[@ANYBLOB='codepage=862']) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000010000)="eb3c906d6b66732e66617400020401000200027000f8", 0x16}], 0x0, &(0x7f0000000240)=ANY=[]) creat(&(0x7f00000000c0)="2e2f66696c65302f2f696c6530ff", 0x0) 2018/04/30 20:08:52 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$inet_buf(r0, 0x0, 0x32, &(0x7f0000000100)=""/144, &(0x7f00000000c0)=0x90) 2018/04/30 20:08:52 executing program 4: r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000140)='/proc/self/net/pfkey\x00', 0x0, 0x0) ppoll(&(0x7f0000000040)=[{}, {}, {}, {r0}], 0x4, &(0x7f0000000080)={0x77359400}, &(0x7f00000000c0), 0x8) capset(&(0x7f0000f0fffa)={0x19980330}, &(0x7f00008e7000)) ioctl$UFFDIO_REGISTER(r0, 0xc0189436, &(0x7f0000000000)={{&(0x7f0000ffb000/0x3000)=nil, 0x3000}, 0x3}) 2018/04/30 20:08:52 executing program 6: syz_mount_image$vfat(&(0x7f0000000140)='vfat\x00', &(0x7f00000001c0)='./file0//ile0\x00', 0x0, 0x0, &(0x7f0000000200), 0x0, &(0x7f0000000240)=ANY=[@ANYBLOB='codepage=862']) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000010000)="eb3c906d6b66732e66617400020401000200027000f8", 0x16}], 0x0, &(0x7f0000000240)=ANY=[]) creat(&(0x7f00000000c0)="2e2f66696c65302f2f696c6530ff", 0x0) 2018/04/30 20:08:52 executing program 6: r0 = socket$inet_tcp(0x2, 0x1, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x40000000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(0xffffffffffffffff, 0x84, 0x18, &(0x7f00000000c0), &(0x7f0000000100)=0x8) r1 = openat$hwrng(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/hwrng\x00', 0x238280, 0x0) getsockname$netlink(r1, &(0x7f0000001800), &(0x7f0000001840)=0xfe4a) shutdown(r0, 0x0) ioctl$PIO_UNIMAP(0xffffffffffffffff, 0x4b67, &(0x7f00000003c0)={0x1, &(0x7f0000000380)=[{0x200, 0xfffffffffffffffd}]}) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000000)={'lo\x00'}) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000080)={'lo\x00', 0x101}) [ 67.977442] device lo entered promiscuous mode [ 68.003442] device lo left promiscuous mode 2018/04/30 20:08:53 executing program 7: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket(0xa, 0x2, 0x0) pkey_free(0xffffffffffffffff) setsockopt$inet6_udp_int(0xffffffffffffffff, 0x11, 0x0, &(0x7f00001be000)=0xff, 0x4) readahead(r0, 0x0, 0x0) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f0000000100)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000480)="eb3c906d6b66732e66617400020401000200077000f801", 0x17}], 0x0, &(0x7f0000000240)=ANY=[]) r1 = open(&(0x7f00000004c0)='./file0/file0\x00', 0x3fffa, 0x0) gettid() lstat(&(0x7f00000000c0)='./file0\x00', &(0x7f00000001c0)) fallocate(r1, 0x1, 0x0, 0x3f0000) close(r1) umount2(&(0x7f0000000080)='./file0\x00', 0x0) 2018/04/30 20:08:53 executing program 2: r0 = socket$inet6(0xa, 0x400000000001, 0x0) r1 = dup(r0) setsockopt$inet_int(r1, 0x0, 0x15, &(0x7f0000000080)=0x80000, 0x388) 2018/04/30 20:08:53 executing program 1: ioctl$DRM_IOCTL_AGP_ALLOC(0xffffffffffffffff, 0xc0206434, &(0x7f0000000040)={0x0, 0x0, 0x40000000000, 0x48}) r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000140)='/dev/rtc\x00', 0x0, 0x0) ioctl$sock_inet_tcp_SIOCATMARK(r0, 0x4028700f, &(0x7f0000000040)) 2018/04/30 20:08:53 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x40000000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(0xffffffffffffffff, 0x84, 0x18, &(0x7f00000000c0), &(0x7f0000000100)=0x8) r1 = openat$hwrng(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/hwrng\x00', 0x238280, 0x0) getsockname$netlink(r1, &(0x7f0000001800), &(0x7f0000001840)=0xfe4a) shutdown(r0, 0x0) ioctl$PIO_UNIMAP(0xffffffffffffffff, 0x4b67, &(0x7f00000003c0)={0x1, &(0x7f0000000380)=[{0x200, 0xfffffffffffffffd}]}) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000000)={'lo\x00'}) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000080)={'lo\x00', 0x101}) 2018/04/30 20:08:53 executing program 6: r0 = socket$inet_tcp(0x2, 0x1, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x40000000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(0xffffffffffffffff, 0x84, 0x18, &(0x7f00000000c0), &(0x7f0000000100)=0x8) r1 = openat$hwrng(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/hwrng\x00', 0x238280, 0x0) getsockname$netlink(r1, &(0x7f0000001800), &(0x7f0000001840)=0xfe4a) shutdown(r0, 0x0) ioctl$PIO_UNIMAP(0xffffffffffffffff, 0x4b67, &(0x7f00000003c0)={0x1, &(0x7f0000000380)=[{0x200, 0xfffffffffffffffd}]}) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000000)={'lo\x00'}) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000080)={'lo\x00', 0x101}) 2018/04/30 20:08:53 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000516ff0)={0x2, 0x4e21, @rand_addr}, 0x10) sendto$inet(r0, &(0x7f0000588fff), 0xfffffffffffffe98, 0x20020003, &(0x7f0000385ff0)={0x2, 0x4e21, @loopback=0x7f000001}, 0x10) shutdown(r0, 0x1) r1 = socket(0x10, 0x3, 0x4) sendmsg$nl_xfrm(r1, &(0x7f00009d3000)={&(0x7f0000c15000)={0x10}, 0xc, &(0x7f00001e5ff0)={&(0x7f0000abdefc)=@delsa={0x4c, 0x12, 0x515485708c54ddb, 0x0, 0x0, {@in=@rand_addr}, [@sec_ctx={0x24, 0x8, {0x1d, 0x8, 0x0, 0x0, 0x15, "69cc8910cf7a5164ef891111a0edabf37c1fd93a0d"}}]}, 0x4c}, 0x1}, 0x0) read(r1, &(0x7f0000000040)=""/89, 0x59) 2018/04/30 20:08:53 executing program 0: open(&(0x7f0000001180)='./file0\x00', 0x141044, 0x0) r0 = open(&(0x7f0000000600)='./control\x00', 0x80043, 0x0) fcntl$setlease(r0, 0x400, 0x0) rename(&(0x7f00000000c0)='./file0\x00', &(0x7f00004ddff6)='./control\x00') 2018/04/30 20:08:53 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000d65000)={&(0x7f00006d9ff4)={0x10}, 0xc, &(0x7f0000403000)={&(0x7f0000000180)={0x1c, 0x1, 0x2, 0x1, 0x0, 0x0, {}, [@nested={0x8, 0x7, [@generic='.']}]}, 0x1c}, 0x1}, 0x0) 2018/04/30 20:08:53 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000040)='IPVS\x00') sendmsg$IPVS_CMD_NEW_SERVICE(r0, &(0x7f0000000240)={&(0x7f0000000000)={0x10}, 0xc, &(0x7f0000000200)={&(0x7f0000000080)={0x28, r1, 0x1, 0x0, 0x0, {0x1}, [@IPVS_CMD_ATTR_SERVICE={0x14, 0x1, [@IPVS_SVC_ATTR_AF={0x8, 0x1}, @IPVS_SVC_ATTR_PORT={0x8, 0x4}]}]}, 0x28}, 0x1}, 0x0) 2018/04/30 20:08:53 executing program 3: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000100)={0xa, 0x0, 0x0, @dev={0xfe, 0x80}, 0x4}, 0x1c) sendmmsg(r0, &(0x7f0000007e00), 0x3c5, 0x0) r1 = socket$inet(0x2, 0x5, 0xffffffffffffffef) getsockopt$inet_sctp_SCTP_RESET_STREAMS(r1, 0x84, 0x77, &(0x7f00000001c0)={0x0, 0x11, 0x3, [0x40, 0xff, 0x4]}, &(0x7f0000000200)=0xe) getsockopt$inet_sctp_SCTP_DEFAULT_PRINFO(r1, 0x84, 0x72, &(0x7f0000000240)={0x0, 0x0, 0x20}, &(0x7f00000000c0)=0xc) getsockopt$inet_sctp_SCTP_PR_SUPPORTED(r1, 0x84, 0x71, &(0x7f0000000140)={r2, 0xffff}, &(0x7f0000000180)=0x8) bind$inet(0xffffffffffffffff, &(0x7f0000deb000)={0x2, 0x4e22, @broadcast=0xffffffff}, 0x10) sendto$inet(r1, &(0x7f0000617fc9), 0x84, 0x20000000, &(0x7f0000deaff0)={0x2, 0x0, @loopback=0x7f000001}, 0x10) 2018/04/30 20:08:53 executing program 2: r0 = syz_open_dev$sndtimer(&(0x7f0000c67ff1)='/dev/snd/timer\x00', 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_SELECT(r0, 0x40345410, &(0x7f00005a3fcc)={{0x0, 0x2, 0x0, 0xffffffffffffffff}}) openat$sequencer2(0xffffffffffffff9c, &(0x7f0000db9ff0)='/dev/sequencer2\x00', 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_INFO(r0, 0x80e85411, &(0x7f0000000000)=""/249) [ 68.400222] device lo entered promiscuous mode 2018/04/30 20:08:53 executing program 0: r0 = syz_open_dev$evdev(&(0x7f0000000040)='/dev/input/event#\x00', 0x0, 0x0) ioctl(r0, 0x80004524, &(0x7f0000000380)) 2018/04/30 20:08:53 executing program 1: capset(&(0x7f0000000180)={0x20071026}, &(0x7f00000001c0)) ioprio_set$pid(0x2, 0x0, 0x0) 2018/04/30 20:08:53 executing program 2: r0 = syz_open_dev$sndtimer(&(0x7f0000c67ff1)='/dev/snd/timer\x00', 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_SELECT(r0, 0x40345410, &(0x7f00005a3fcc)={{0x0, 0x2, 0x0, 0xffffffffffffffff}}) openat$sequencer2(0xffffffffffffff9c, &(0x7f0000db9ff0)='/dev/sequencer2\x00', 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_INFO(r0, 0x80e85411, &(0x7f0000000000)=""/249) 2018/04/30 20:08:53 executing program 2: r0 = syz_open_dev$sndtimer(&(0x7f0000c67ff1)='/dev/snd/timer\x00', 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_SELECT(r0, 0x40345410, &(0x7f00005a3fcc)={{0x0, 0x2, 0x0, 0xffffffffffffffff}}) openat$sequencer2(0xffffffffffffff9c, &(0x7f0000db9ff0)='/dev/sequencer2\x00', 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_INFO(r0, 0x80e85411, &(0x7f0000000000)=""/249) 2018/04/30 20:08:53 executing program 1: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000100)={0xa, 0x3, 0x5, @remote={0xfe, 0x80, [], 0xbb}, 0x4}, 0x1c) sendmmsg(r0, &(0x7f0000007e00), 0x3c5, 0x0) r1 = socket$inet(0x2, 0x4, 0xb) getsockopt$inet_sctp_SCTP_DEFAULT_PRINFO(r1, 0x84, 0x72, &(0x7f0000000200)={0x0, 0x4, 0x21}, &(0x7f00000001c0)=0xc) getsockopt$inet_sctp_SCTP_PARTIAL_DELIVERY_POINT(r1, 0x84, 0x13, &(0x7f00000002c0)={r2, 0x40000000000}, &(0x7f0000000300)=0x8) getsockopt$inet6_opts(r0, 0x29, 0x37, &(0x7f0000000240)=""/104, &(0x7f00000000c0)=0x68) r3 = memfd_create(&(0x7f0000000440)='selinux(em1/&}]-\x00', 0x1) ioctl$DRM_IOCTL_ADD_CTX(0xffffffffffffffff, 0xc0086420, &(0x7f0000000480)={0x0}) ioctl$DRM_IOCTL_DMA(r3, 0xc0406429, &(0x7f00000005c0)={r4, 0x5, &(0x7f00000004c0)=[0x9, 0x10000, 0x0, 0x80000001, 0x10000], &(0x7f0000000500)=[0x10001, 0x0, 0x80000001, 0x5, 0x2], 0x4, 0x4, 0x9, &(0x7f0000000540)=[0x4, 0x0, 0x0, 0x36], &(0x7f0000000580)=[0x7, 0x8]}) ioctl$ASHMEM_GET_PROT_MASK(r3, 0x7706, &(0x7f00000006c0)) getsockopt$inet_sctp_SCTP_PR_SUPPORTED(r1, 0x84, 0x71, &(0x7f0000000140)={r2, 0xffff}, &(0x7f0000000180)=0x8) bind$inet(r1, &(0x7f0000000000)={0x2, 0x4e23, @rand_addr}, 0x10) accept4$packet(0xffffffffffffff9c, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @dev}, &(0x7f0000000380)=0x14, 0x0) getsockopt$IP6T_SO_GET_REVISION_TARGET(r0, 0x29, 0x45, &(0x7f0000000640)={'TPROXY\x00'}, &(0x7f0000000680)=0x1e) setsockopt$inet_sctp6_SCTP_DELAYED_SACK(r0, 0x84, 0x10, &(0x7f0000000600)=@sack_info={r5, 0xffffffffffffffe1, 0xaa}, 0xc) ioctl$sock_inet6_SIOCDELRT(r0, 0x890c, &(0x7f00000003c0)={@remote={0xfe, 0x80, [], 0xbb}, @ipv4={[], [0xff, 0xff], @multicast1=0xe0000001}, @loopback={0x0, 0x1}, 0x4, 0x8, 0x0, 0x400, 0x3, 0x0, r6}) r7 = request_key(&(0x7f0000000700)='rxrpc\x00', &(0x7f0000000740)={0x73, 0x79, 0x7a, 0x1}, &(0x7f0000000780)='TPROXY\x00', 0xfffffffffffffffa) r8 = add_key$keyring(&(0x7f0000001cc0)='keyring\x00', &(0x7f0000001d00)={0x73, 0x79, 0x7a, 0x3}, 0x0, 0x0, 0xffffffffffffffff) keyctl$instantiate_iov(0x14, r7, &(0x7f0000001c00)=[{&(0x7f00000007c0)="bb3688f4eda8a660987b44fb1cd01c80b66df9e0d9", 0x15}, {&(0x7f0000000880)="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", 0xfe}, {&(0x7f0000000a00)="f487e574d97de92eaab27d76ae97a061fb866c3c5f8f2cfd7950bb14c0112f8c4ad0744c7d698fadab5bc7bf95be0cb08504d8e373f84132b72d7ddd9d67edb279e218c2ce9a45d0ae464471227996aaf6b94578dde7f447bb6b", 0x5a}, {&(0x7f0000000ac0)}, {&(0x7f0000001b00)="b8b33c10187046cdfa7debcaf061543946803966be17070b0765fefb59a00178a52b40c4ea7366ecc4b6dc10f08bc76239fd", 0x32}], 0x5, r8) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r3, 0x84, 0x9, &(0x7f0000001d40)={r5, @in6={{0xa, 0x4e24, 0x3f, @dev={0xfe, 0x80, [], 0x1c}, 0x400000}}, 0x0, 0x3f, 0x200, 0x8001}, 0x98) [ 68.508981] capability: warning: `syz-executor1' uses deprecated v2 capabilities in a way that may be insecure [ 68.665823] FAT-fs (loop7): Directory bread(block 112) failed [ 68.672507] FAT-fs (loop7): Directory bread(block 113) failed [ 68.678630] FAT-fs (loop7): Directory bread(block 114) failed [ 68.708205] FAT-fs (loop7): Directory bread(block 112) failed [ 68.714802] FAT-fs (loop7): Directory bread(block 113) failed [ 68.728909] FAT-fs (loop7): Directory bread(block 114) failed [ 68.759350] FAT-fs (loop7): Directory bread(block 112) failed [ 68.771195] FAT-fs (loop7): Directory bread(block 113) failed [ 68.785036] FAT-fs (loop7): Directory bread(block 114) failed [ 69.057804] FAT-fs (loop7): Directory bread(block 112) failed [ 69.078906] FAT-fs (loop7): Directory bread(block 113) failed [ 69.093634] FAT-fs (loop7): Directory bread(block 114) failed 2018/04/30 20:08:54 executing program 7: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket(0xa, 0x2, 0x0) pkey_free(0xffffffffffffffff) setsockopt$inet6_udp_int(0xffffffffffffffff, 0x11, 0x0, &(0x7f00001be000)=0xff, 0x4) readahead(r0, 0x0, 0x0) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f0000000100)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000480)="eb3c906d6b66732e66617400020401000200077000f801", 0x17}], 0x0, &(0x7f0000000240)=ANY=[]) r1 = open(&(0x7f00000004c0)='./file0/file0\x00', 0x3fffa, 0x0) gettid() lstat(&(0x7f00000000c0)='./file0\x00', &(0x7f00000001c0)) fallocate(r1, 0x1, 0x0, 0x3f0000) close(r1) umount2(&(0x7f0000000080)='./file0\x00', 0x0) [ 69.379548] device lo entered promiscuous mode 2018/04/30 20:08:54 executing program 1: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000100)={0xa, 0x3, 0x5, @remote={0xfe, 0x80, [], 0xbb}, 0x4}, 0x1c) sendmmsg(r0, &(0x7f0000007e00), 0x3c5, 0x0) r1 = socket$inet(0x2, 0x4, 0xb) getsockopt$inet_sctp_SCTP_DEFAULT_PRINFO(r1, 0x84, 0x72, &(0x7f0000000200)={0x0, 0x4, 0x21}, &(0x7f00000001c0)=0xc) getsockopt$inet_sctp_SCTP_PARTIAL_DELIVERY_POINT(r1, 0x84, 0x13, &(0x7f00000002c0)={r2, 0x40000000000}, &(0x7f0000000300)=0x8) getsockopt$inet6_opts(r0, 0x29, 0x37, &(0x7f0000000240)=""/104, &(0x7f00000000c0)=0x68) r3 = memfd_create(&(0x7f0000000440)='selinux(em1/&}]-\x00', 0x1) ioctl$DRM_IOCTL_ADD_CTX(0xffffffffffffffff, 0xc0086420, &(0x7f0000000480)={0x0}) ioctl$DRM_IOCTL_DMA(r3, 0xc0406429, &(0x7f00000005c0)={r4, 0x5, &(0x7f00000004c0)=[0x9, 0x10000, 0x0, 0x80000001, 0x10000], &(0x7f0000000500)=[0x10001, 0x0, 0x80000001, 0x5, 0x2], 0x4, 0x4, 0x9, &(0x7f0000000540)=[0x4, 0x0, 0x0, 0x36], &(0x7f0000000580)=[0x7, 0x8]}) ioctl$ASHMEM_GET_PROT_MASK(r3, 0x7706, &(0x7f00000006c0)) getsockopt$inet_sctp_SCTP_PR_SUPPORTED(r1, 0x84, 0x71, &(0x7f0000000140)={r2, 0xffff}, &(0x7f0000000180)=0x8) bind$inet(r1, &(0x7f0000000000)={0x2, 0x4e23, @rand_addr}, 0x10) accept4$packet(0xffffffffffffff9c, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @dev}, &(0x7f0000000380)=0x14, 0x0) getsockopt$IP6T_SO_GET_REVISION_TARGET(r0, 0x29, 0x45, &(0x7f0000000640)={'TPROXY\x00'}, &(0x7f0000000680)=0x1e) setsockopt$inet_sctp6_SCTP_DELAYED_SACK(r0, 0x84, 0x10, &(0x7f0000000600)=@sack_info={r5, 0xffffffffffffffe1, 0xaa}, 0xc) ioctl$sock_inet6_SIOCDELRT(r0, 0x890c, &(0x7f00000003c0)={@remote={0xfe, 0x80, [], 0xbb}, @ipv4={[], [0xff, 0xff], @multicast1=0xe0000001}, @loopback={0x0, 0x1}, 0x4, 0x8, 0x0, 0x400, 0x3, 0x0, r6}) r7 = request_key(&(0x7f0000000700)='rxrpc\x00', &(0x7f0000000740)={0x73, 0x79, 0x7a, 0x1}, &(0x7f0000000780)='TPROXY\x00', 0xfffffffffffffffa) r8 = add_key$keyring(&(0x7f0000001cc0)='keyring\x00', &(0x7f0000001d00)={0x73, 0x79, 0x7a, 0x3}, 0x0, 0x0, 0xffffffffffffffff) keyctl$instantiate_iov(0x14, r7, &(0x7f0000001c00)=[{&(0x7f00000007c0)="bb3688f4eda8a660987b44fb1cd01c80b66df9e0d9", 0x15}, {&(0x7f0000000880)="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", 0xfe}, {&(0x7f0000000a00)="f487e574d97de92eaab27d76ae97a061fb866c3c5f8f2cfd7950bb14c0112f8c4ad0744c7d698fadab5bc7bf95be0cb08504d8e373f84132b72d7ddd9d67edb279e218c2ce9a45d0ae464471227996aaf6b94578dde7f447bb6b", 0x5a}, {&(0x7f0000000ac0)}, {&(0x7f0000001b00)="b8b33c10187046cdfa7debcaf061543946803966be17070b0765fefb59a00178a52b40c4ea7366ecc4b6dc10f08bc76239fd", 0x32}], 0x5, r8) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r3, 0x84, 0x9, &(0x7f0000001d40)={r5, @in6={{0xa, 0x4e24, 0x3f, @dev={0xfe, 0x80, [], 0x1c}, 0x400000}}, 0x0, 0x3f, 0x200, 0x8001}, 0x98) 2018/04/30 20:08:54 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000516ff0)={0x2, 0x4e21, @rand_addr}, 0x10) sendto$inet(r0, &(0x7f0000588fff), 0xfffffffffffffe98, 0x20020003, &(0x7f0000385ff0)={0x2, 0x4e21, @loopback=0x7f000001}, 0x10) shutdown(r0, 0x1) r1 = socket(0x10, 0x3, 0x4) sendmsg$nl_xfrm(r1, &(0x7f00009d3000)={&(0x7f0000c15000)={0x10}, 0xc, &(0x7f00001e5ff0)={&(0x7f0000abdefc)=@delsa={0x4c, 0x12, 0x515485708c54ddb, 0x0, 0x0, {@in=@rand_addr}, [@sec_ctx={0x24, 0x8, {0x1d, 0x8, 0x0, 0x0, 0x15, "69cc8910cf7a5164ef891111a0edabf37c1fd93a0d"}}]}, 0x4c}, 0x1}, 0x0) read(r1, &(0x7f0000000040)=""/89, 0x59) 2018/04/30 20:08:54 executing program 3: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000100)={0xa, 0x0, 0x0, @dev={0xfe, 0x80}, 0x4}, 0x1c) sendmmsg(r0, &(0x7f0000007e00), 0x3c5, 0x0) r1 = socket$inet(0x2, 0x5, 0xffffffffffffffef) getsockopt$inet_sctp_SCTP_RESET_STREAMS(r1, 0x84, 0x77, &(0x7f00000001c0)={0x0, 0x11, 0x3, [0x40, 0xff, 0x4]}, &(0x7f0000000200)=0xe) getsockopt$inet_sctp_SCTP_DEFAULT_PRINFO(r1, 0x84, 0x72, &(0x7f0000000240)={0x0, 0x0, 0x20}, &(0x7f00000000c0)=0xc) getsockopt$inet_sctp_SCTP_PR_SUPPORTED(r1, 0x84, 0x71, &(0x7f0000000140)={r2, 0xffff}, &(0x7f0000000180)=0x8) bind$inet(0xffffffffffffffff, &(0x7f0000deb000)={0x2, 0x4e22, @broadcast=0xffffffff}, 0x10) sendto$inet(r1, &(0x7f0000617fc9), 0x84, 0x20000000, &(0x7f0000deaff0)={0x2, 0x0, @loopback=0x7f000001}, 0x10) 2018/04/30 20:08:54 executing program 2: r0 = syz_open_dev$sndtimer(&(0x7f0000c67ff1)='/dev/snd/timer\x00', 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_SELECT(r0, 0x40345410, &(0x7f00005a3fcc)={{0x0, 0x2, 0x0, 0xffffffffffffffff}}) openat$sequencer2(0xffffffffffffff9c, &(0x7f0000db9ff0)='/dev/sequencer2\x00', 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_INFO(r0, 0x80e85411, &(0x7f0000000000)=""/249) 2018/04/30 20:08:54 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x40000000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(0xffffffffffffffff, 0x84, 0x18, &(0x7f00000000c0), &(0x7f0000000100)=0x8) r1 = openat$hwrng(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/hwrng\x00', 0x238280, 0x0) getsockname$netlink(r1, &(0x7f0000001800), &(0x7f0000001840)=0xfe4a) shutdown(r0, 0x0) ioctl$PIO_UNIMAP(0xffffffffffffffff, 0x4b67, &(0x7f00000003c0)={0x1, &(0x7f0000000380)=[{0x200, 0xfffffffffffffffd}]}) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000000)={'lo\x00'}) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000080)={'lo\x00', 0x101}) 2018/04/30 20:08:54 executing program 0: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = creat(&(0x7f0000000700)='./bus\x00', 0x0) r1 = open(&(0x7f0000000000)='./bus\x00', 0x26302, 0x0) ftruncate(r1, 0x80000) write$binfmt_aout(0xffffffffffffffff, &(0x7f0000000740)={{0xcc, 0x0, 0x0, 0x2fe}, "", [[], []]}, 0x220) sendfile(r0, r1, &(0x7f0000d83ff8), 0x8000fffffffe) creat(&(0x7f00000000c0)='./bus\x00', 0x0) 2018/04/30 20:08:54 executing program 6: r0 = socket$inet_tcp(0x2, 0x1, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x40000000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(0xffffffffffffffff, 0x84, 0x18, &(0x7f00000000c0), &(0x7f0000000100)=0x8) r1 = openat$hwrng(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/hwrng\x00', 0x238280, 0x0) getsockname$netlink(r1, &(0x7f0000001800), &(0x7f0000001840)=0xfe4a) shutdown(r0, 0x0) ioctl$PIO_UNIMAP(0xffffffffffffffff, 0x4b67, &(0x7f00000003c0)={0x1, &(0x7f0000000380)=[{0x200, 0xfffffffffffffffd}]}) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000000)={'lo\x00'}) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000080)={'lo\x00', 0x101}) 2018/04/30 20:08:54 executing program 2: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket(0xa, 0x2, 0x0) pkey_free(0xffffffffffffffff) setsockopt$inet6_udp_int(0xffffffffffffffff, 0x11, 0x0, &(0x7f00001be000)=0xff, 0x4) readahead(r0, 0x0, 0x0) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f0000000100)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000480)="eb3c906d6b66732e66617400020401000200077000f801", 0x17}], 0x0, &(0x7f0000000240)=ANY=[]) r1 = open(&(0x7f00000004c0)='./file0/file0\x00', 0x3fffa, 0x0) gettid() lstat(&(0x7f00000000c0)='./file0\x00', &(0x7f00000001c0)) fallocate(r1, 0x1, 0x0, 0x3f0000) close(r1) umount2(&(0x7f0000000080)='./file0\x00', 0x0) [ 69.446115] device lo left promiscuous mode [ 69.497870] device lo left promiscuous mode [ 69.639182] FAT-fs (loop7): Directory bread(block 112) failed [ 69.661921] FAT-fs (loop7): Directory bread(block 113) failed [ 69.684429] FAT-fs (loop7): Directory bread(block 114) failed [ 69.718499] FAT-fs (loop2): Directory bread(block 112) failed [ 69.750754] FAT-fs (loop2): Directory bread(block 113) failed [ 69.773617] FAT-fs (loop7): Directory bread(block 112) failed [ 69.773861] FAT-fs (loop7): Directory bread(block 113) failed [ 69.773999] FAT-fs (loop7): Directory bread(block 114) failed [ 69.805561] FAT-fs (loop7): Directory bread(block 112) failed [ 69.805757] FAT-fs (loop7): Directory bread(block 113) failed 2018/04/30 20:08:54 executing program 0: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = creat(&(0x7f0000000700)='./bus\x00', 0x0) r1 = open(&(0x7f0000000000)='./bus\x00', 0x26302, 0x0) ftruncate(r1, 0x80000) write$binfmt_aout(0xffffffffffffffff, &(0x7f0000000740)={{0xcc, 0x0, 0x0, 0x2fe}, "", [[], []]}, 0x220) sendfile(r0, r1, &(0x7f0000d83ff8), 0x8000fffffffe) creat(&(0x7f00000000c0)='./bus\x00', 0x0) [ 69.805937] FAT-fs (loop7): Directory bread(block 114) failed [ 69.909468] FAT-fs (loop2): Directory bread(block 114) failed [ 70.005708] FAT-fs (loop2): Directory bread(block 112) failed [ 70.028565] FAT-fs (loop2): Directory bread(block 113) failed [ 70.044152] FAT-fs (loop2): Directory bread(block 114) failed [ 70.082927] FAT-fs (loop2): Directory bread(block 112) failed [ 70.098265] FAT-fs (loop2): Directory bread(block 113) failed [ 70.115054] FAT-fs (loop2): Directory bread(block 114) failed 2018/04/30 20:08:55 executing program 7: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket(0xa, 0x2, 0x0) pkey_free(0xffffffffffffffff) setsockopt$inet6_udp_int(0xffffffffffffffff, 0x11, 0x0, &(0x7f00001be000)=0xff, 0x4) readahead(r0, 0x0, 0x0) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f0000000100)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000480)="eb3c906d6b66732e66617400020401000200077000f801", 0x17}], 0x0, &(0x7f0000000240)=ANY=[]) r1 = open(&(0x7f00000004c0)='./file0/file0\x00', 0x3fffa, 0x0) gettid() lstat(&(0x7f00000000c0)='./file0\x00', &(0x7f00000001c0)) fallocate(r1, 0x1, 0x0, 0x3f0000) close(r1) umount2(&(0x7f0000000080)='./file0\x00', 0x0) 2018/04/30 20:08:55 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000516ff0)={0x2, 0x4e21, @rand_addr}, 0x10) sendto$inet(r0, &(0x7f0000588fff), 0xfffffffffffffe98, 0x20020003, &(0x7f0000385ff0)={0x2, 0x4e21, @loopback=0x7f000001}, 0x10) shutdown(r0, 0x1) r1 = socket(0x10, 0x3, 0x4) sendmsg$nl_xfrm(r1, &(0x7f00009d3000)={&(0x7f0000c15000)={0x10}, 0xc, &(0x7f00001e5ff0)={&(0x7f0000abdefc)=@delsa={0x4c, 0x12, 0x515485708c54ddb, 0x0, 0x0, {@in=@rand_addr}, [@sec_ctx={0x24, 0x8, {0x1d, 0x8, 0x0, 0x0, 0x15, "69cc8910cf7a5164ef891111a0edabf37c1fd93a0d"}}]}, 0x4c}, 0x1}, 0x0) read(r1, &(0x7f0000000040)=""/89, 0x59) 2018/04/30 20:08:55 executing program 2: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket(0xa, 0x2, 0x0) pkey_free(0xffffffffffffffff) setsockopt$inet6_udp_int(0xffffffffffffffff, 0x11, 0x0, &(0x7f00001be000)=0xff, 0x4) readahead(r0, 0x0, 0x0) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f0000000100)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000480)="eb3c906d6b66732e66617400020401000200077000f801", 0x17}], 0x0, &(0x7f0000000240)=ANY=[]) r1 = open(&(0x7f00000004c0)='./file0/file0\x00', 0x3fffa, 0x0) gettid() lstat(&(0x7f00000000c0)='./file0\x00', &(0x7f00000001c0)) fallocate(r1, 0x1, 0x0, 0x3f0000) close(r1) umount2(&(0x7f0000000080)='./file0\x00', 0x0) 2018/04/30 20:08:55 executing program 0: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = creat(&(0x7f0000000700)='./bus\x00', 0x0) r1 = open(&(0x7f0000000000)='./bus\x00', 0x26302, 0x0) ftruncate(r1, 0x80000) write$binfmt_aout(0xffffffffffffffff, &(0x7f0000000740)={{0xcc, 0x0, 0x0, 0x2fe}, "", [[], []]}, 0x220) sendfile(r0, r1, &(0x7f0000d83ff8), 0x8000fffffffe) creat(&(0x7f00000000c0)='./bus\x00', 0x0) 2018/04/30 20:08:55 executing program 3: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000100)={0xa, 0x0, 0x0, @dev={0xfe, 0x80}, 0x4}, 0x1c) sendmmsg(r0, &(0x7f0000007e00), 0x3c5, 0x0) r1 = socket$inet(0x2, 0x5, 0xffffffffffffffef) getsockopt$inet_sctp_SCTP_RESET_STREAMS(r1, 0x84, 0x77, &(0x7f00000001c0)={0x0, 0x11, 0x3, [0x40, 0xff, 0x4]}, &(0x7f0000000200)=0xe) getsockopt$inet_sctp_SCTP_DEFAULT_PRINFO(r1, 0x84, 0x72, &(0x7f0000000240)={0x0, 0x0, 0x20}, &(0x7f00000000c0)=0xc) getsockopt$inet_sctp_SCTP_PR_SUPPORTED(r1, 0x84, 0x71, &(0x7f0000000140)={r2, 0xffff}, &(0x7f0000000180)=0x8) bind$inet(0xffffffffffffffff, &(0x7f0000deb000)={0x2, 0x4e22, @broadcast=0xffffffff}, 0x10) sendto$inet(r1, &(0x7f0000617fc9), 0x84, 0x20000000, &(0x7f0000deaff0)={0x2, 0x0, @loopback=0x7f000001}, 0x10) 2018/04/30 20:08:55 executing program 1: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000100)={0xa, 0x3, 0x5, @remote={0xfe, 0x80, [], 0xbb}, 0x4}, 0x1c) sendmmsg(r0, &(0x7f0000007e00), 0x3c5, 0x0) r1 = socket$inet(0x2, 0x4, 0xb) getsockopt$inet_sctp_SCTP_DEFAULT_PRINFO(r1, 0x84, 0x72, &(0x7f0000000200)={0x0, 0x4, 0x21}, &(0x7f00000001c0)=0xc) getsockopt$inet_sctp_SCTP_PARTIAL_DELIVERY_POINT(r1, 0x84, 0x13, &(0x7f00000002c0)={r2, 0x40000000000}, &(0x7f0000000300)=0x8) getsockopt$inet6_opts(r0, 0x29, 0x37, &(0x7f0000000240)=""/104, &(0x7f00000000c0)=0x68) r3 = memfd_create(&(0x7f0000000440)='selinux(em1/&}]-\x00', 0x1) ioctl$DRM_IOCTL_ADD_CTX(0xffffffffffffffff, 0xc0086420, &(0x7f0000000480)={0x0}) ioctl$DRM_IOCTL_DMA(r3, 0xc0406429, &(0x7f00000005c0)={r4, 0x5, &(0x7f00000004c0)=[0x9, 0x10000, 0x0, 0x80000001, 0x10000], &(0x7f0000000500)=[0x10001, 0x0, 0x80000001, 0x5, 0x2], 0x4, 0x4, 0x9, &(0x7f0000000540)=[0x4, 0x0, 0x0, 0x36], &(0x7f0000000580)=[0x7, 0x8]}) ioctl$ASHMEM_GET_PROT_MASK(r3, 0x7706, &(0x7f00000006c0)) getsockopt$inet_sctp_SCTP_PR_SUPPORTED(r1, 0x84, 0x71, &(0x7f0000000140)={r2, 0xffff}, &(0x7f0000000180)=0x8) bind$inet(r1, &(0x7f0000000000)={0x2, 0x4e23, @rand_addr}, 0x10) accept4$packet(0xffffffffffffff9c, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @dev}, &(0x7f0000000380)=0x14, 0x0) getsockopt$IP6T_SO_GET_REVISION_TARGET(r0, 0x29, 0x45, &(0x7f0000000640)={'TPROXY\x00'}, &(0x7f0000000680)=0x1e) setsockopt$inet_sctp6_SCTP_DELAYED_SACK(r0, 0x84, 0x10, &(0x7f0000000600)=@sack_info={r5, 0xffffffffffffffe1, 0xaa}, 0xc) ioctl$sock_inet6_SIOCDELRT(r0, 0x890c, &(0x7f00000003c0)={@remote={0xfe, 0x80, [], 0xbb}, @ipv4={[], [0xff, 0xff], @multicast1=0xe0000001}, @loopback={0x0, 0x1}, 0x4, 0x8, 0x0, 0x400, 0x3, 0x0, r6}) r7 = request_key(&(0x7f0000000700)='rxrpc\x00', &(0x7f0000000740)={0x73, 0x79, 0x7a, 0x1}, &(0x7f0000000780)='TPROXY\x00', 0xfffffffffffffffa) r8 = add_key$keyring(&(0x7f0000001cc0)='keyring\x00', &(0x7f0000001d00)={0x73, 0x79, 0x7a, 0x3}, 0x0, 0x0, 0xffffffffffffffff) keyctl$instantiate_iov(0x14, r7, &(0x7f0000001c00)=[{&(0x7f00000007c0)="bb3688f4eda8a660987b44fb1cd01c80b66df9e0d9", 0x15}, {&(0x7f0000000880)="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", 0xfe}, {&(0x7f0000000a00)="f487e574d97de92eaab27d76ae97a061fb866c3c5f8f2cfd7950bb14c0112f8c4ad0744c7d698fadab5bc7bf95be0cb08504d8e373f84132b72d7ddd9d67edb279e218c2ce9a45d0ae464471227996aaf6b94578dde7f447bb6b", 0x5a}, {&(0x7f0000000ac0)}, {&(0x7f0000001b00)="b8b33c10187046cdfa7debcaf061543946803966be17070b0765fefb59a00178a52b40c4ea7366ecc4b6dc10f08bc76239fd", 0x32}], 0x5, r8) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r3, 0x84, 0x9, &(0x7f0000001d40)={r5, @in6={{0xa, 0x4e24, 0x3f, @dev={0xfe, 0x80, [], 0x1c}, 0x400000}}, 0x0, 0x3f, 0x200, 0x8001}, 0x98) 2018/04/30 20:08:55 executing program 6: r0 = socket$inet_tcp(0x2, 0x1, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x40000000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(0xffffffffffffffff, 0x84, 0x18, &(0x7f00000000c0), &(0x7f0000000100)=0x8) r1 = openat$hwrng(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/hwrng\x00', 0x238280, 0x0) getsockname$netlink(r1, &(0x7f0000001800), &(0x7f0000001840)=0xfe4a) shutdown(r0, 0x0) ioctl$PIO_UNIMAP(0xffffffffffffffff, 0x4b67, &(0x7f00000003c0)={0x1, &(0x7f0000000380)=[{0x200, 0xfffffffffffffffd}]}) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000000)={'lo\x00'}) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000080)={'lo\x00', 0x101}) 2018/04/30 20:08:55 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x40000000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(0xffffffffffffffff, 0x84, 0x18, &(0x7f00000000c0), &(0x7f0000000100)=0x8) r1 = openat$hwrng(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/hwrng\x00', 0x238280, 0x0) getsockname$netlink(r1, &(0x7f0000001800), &(0x7f0000001840)=0xfe4a) shutdown(r0, 0x0) ioctl$PIO_UNIMAP(0xffffffffffffffff, 0x4b67, &(0x7f00000003c0)={0x1, &(0x7f0000000380)=[{0x200, 0xfffffffffffffffd}]}) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000000)={'lo\x00'}) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000080)={'lo\x00', 0x101}) [ 70.665455] device lo entered promiscuous mode [ 70.676401] device lo entered promiscuous mode [ 70.735793] device lo left promiscuous mode [ 70.950994] FAT-fs (loop2): Directory bread(block 112) failed [ 70.962554] FAT-fs (loop7): Directory bread(block 112) failed [ 70.962712] FAT-fs (loop7): Directory bread(block 113) failed [ 70.962792] FAT-fs (loop7): Directory bread(block 114) failed [ 71.016057] FAT-fs (loop2): Directory bread(block 113) failed [ 71.028938] FAT-fs (loop2): Directory bread(block 114) failed [ 71.050327] FAT-fs (loop7): Directory bread(block 112) failed [ 71.050411] FAT-fs (loop7): Directory bread(block 113) failed [ 71.050530] FAT-fs (loop7): Directory bread(block 114) failed [ 71.080428] FAT-fs (loop7): Directory bread(block 112) failed [ 71.080532] FAT-fs (loop7): Directory bread(block 113) failed [ 71.080634] FAT-fs (loop7): Directory bread(block 114) failed [ 71.266242] FAT-fs (loop2): Directory bread(block 112) failed [ 71.291676] FAT-fs (loop2): Directory bread(block 113) failed [ 71.304877] FAT-fs (loop2): Directory bread(block 114) failed [ 71.371728] FAT-fs (loop2): Directory bread(block 112) failed [ 71.402699] FAT-fs (loop2): Directory bread(block 113) failed 2018/04/30 20:08:56 executing program 7: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket(0xa, 0x2, 0x0) pkey_free(0xffffffffffffffff) setsockopt$inet6_udp_int(0xffffffffffffffff, 0x11, 0x0, &(0x7f00001be000)=0xff, 0x4) readahead(r0, 0x0, 0x0) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f0000000100)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000480)="eb3c906d6b66732e66617400020401000200077000f801", 0x17}], 0x0, &(0x7f0000000240)=ANY=[]) r1 = open(&(0x7f00000004c0)='./file0/file0\x00', 0x3fffa, 0x0) gettid() lstat(&(0x7f00000000c0)='./file0\x00', &(0x7f00000001c0)) fallocate(r1, 0x1, 0x0, 0x3f0000) close(r1) umount2(&(0x7f0000000080)='./file0\x00', 0x0) [ 71.425633] FAT-fs (loop2): Directory bread(block 114) failed 2018/04/30 20:08:56 executing program 0: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = creat(&(0x7f0000000700)='./bus\x00', 0x0) r1 = open(&(0x7f0000000000)='./bus\x00', 0x26302, 0x0) ftruncate(r1, 0x80000) write$binfmt_aout(0xffffffffffffffff, &(0x7f0000000740)={{0xcc, 0x0, 0x0, 0x2fe}, "", [[], []]}, 0x220) sendfile(r0, r1, &(0x7f0000d83ff8), 0x8000fffffffe) creat(&(0x7f00000000c0)='./bus\x00', 0x0) 2018/04/30 20:08:56 executing program 5: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = creat(&(0x7f0000000700)='./bus\x00', 0x0) r1 = open(&(0x7f0000000000)='./bus\x00', 0x26302, 0x0) ftruncate(r1, 0x80000) write$binfmt_aout(0xffffffffffffffff, &(0x7f0000000740)={{0xcc, 0x0, 0x0, 0x2fe}, "", [[], []]}, 0x220) sendfile(r0, r1, &(0x7f0000d83ff8), 0x8000fffffffe) creat(&(0x7f00000000c0)='./bus\x00', 0x0) [ 71.720341] FAT-fs (loop7): Directory bread(block 112) failed [ 71.741494] FAT-fs (loop7): Directory bread(block 113) failed [ 71.763271] FAT-fs (loop7): Directory bread(block 114) failed 2018/04/30 20:08:56 executing program 2: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket(0xa, 0x2, 0x0) pkey_free(0xffffffffffffffff) setsockopt$inet6_udp_int(0xffffffffffffffff, 0x11, 0x0, &(0x7f00001be000)=0xff, 0x4) readahead(r0, 0x0, 0x0) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f0000000100)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000480)="eb3c906d6b66732e66617400020401000200077000f801", 0x17}], 0x0, &(0x7f0000000240)=ANY=[]) r1 = open(&(0x7f00000004c0)='./file0/file0\x00', 0x3fffa, 0x0) gettid() lstat(&(0x7f00000000c0)='./file0\x00', &(0x7f00000001c0)) fallocate(r1, 0x1, 0x0, 0x3f0000) close(r1) umount2(&(0x7f0000000080)='./file0\x00', 0x0) [ 71.845999] FAT-fs (loop7): Directory bread(block 112) failed [ 71.868187] FAT-fs (loop7): Directory bread(block 113) failed [ 71.889266] FAT-fs (loop7): Directory bread(block 114) failed [ 71.948973] FAT-fs (loop7): Directory bread(block 112) failed [ 71.972676] FAT-fs (loop7): Directory bread(block 113) failed [ 71.993844] FAT-fs (loop7): Directory bread(block 114) failed [ 72.178998] FAT-fs (loop2): Directory bread(block 112) failed [ 72.199765] FAT-fs (loop2): Directory bread(block 113) failed [ 72.219331] FAT-fs (loop2): Directory bread(block 114) failed 2018/04/30 20:08:57 executing program 0: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket(0xa, 0x2, 0x0) pkey_free(0xffffffffffffffff) setsockopt$inet6_udp_int(0xffffffffffffffff, 0x11, 0x0, &(0x7f00001be000)=0xff, 0x4) readahead(r0, 0x0, 0x0) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f0000000100)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000480)="eb3c906d6b66732e66617400020401000200077000f801", 0x17}], 0x0, &(0x7f0000000240)=ANY=[]) r1 = open(&(0x7f00000004c0)='./file0/file0\x00', 0x3fffa, 0x0) gettid() lstat(&(0x7f00000000c0)='./file0\x00', &(0x7f00000001c0)) fallocate(r1, 0x1, 0x0, 0x3f0000) close(r1) umount2(&(0x7f0000000080)='./file0\x00', 0x0) 2018/04/30 20:08:57 executing program 5: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = creat(&(0x7f0000000700)='./bus\x00', 0x0) r1 = open(&(0x7f0000000000)='./bus\x00', 0x26302, 0x0) ftruncate(r1, 0x80000) write$binfmt_aout(0xffffffffffffffff, &(0x7f0000000740)={{0xcc, 0x0, 0x0, 0x2fe}, "", [[], []]}, 0x220) sendfile(r0, r1, &(0x7f0000d83ff8), 0x8000fffffffe) creat(&(0x7f00000000c0)='./bus\x00', 0x0) [ 72.332580] FAT-fs (loop2): Directory bread(block 112) failed [ 72.359999] FAT-fs (loop2): Directory bread(block 113) failed [ 72.386225] FAT-fs (loop2): Directory bread(block 114) failed 2018/04/30 20:08:57 executing program 7: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket(0xa, 0x2, 0x0) pkey_free(0xffffffffffffffff) setsockopt$inet6_udp_int(0xffffffffffffffff, 0x11, 0x0, &(0x7f00001be000)=0xff, 0x4) readahead(r0, 0x0, 0x0) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f0000000100)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000480)="eb3c906d6b66732e66617400020401000200077000f801", 0x17}], 0x0, &(0x7f0000000240)=ANY=[]) r1 = open(&(0x7f00000004c0)='./file0/file0\x00', 0x3fffa, 0x0) gettid() lstat(&(0x7f00000000c0)='./file0\x00', &(0x7f00000001c0)) fallocate(r1, 0x1, 0x0, 0x3f0000) close(r1) umount2(&(0x7f0000000080)='./file0\x00', 0x0) [ 72.457911] FAT-fs (loop2): Directory bread(block 112) failed [ 72.490780] FAT-fs (loop2): Directory bread(block 113) failed [ 72.518328] FAT-fs (loop2): Directory bread(block 114) failed 2018/04/30 20:08:57 executing program 3: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000100)={0xa, 0x0, 0x0, @dev={0xfe, 0x80}, 0x4}, 0x1c) sendmmsg(r0, &(0x7f0000007e00), 0x3c5, 0x0) r1 = socket$inet(0x2, 0x5, 0xffffffffffffffef) getsockopt$inet_sctp_SCTP_RESET_STREAMS(r1, 0x84, 0x77, &(0x7f00000001c0)={0x0, 0x11, 0x3, [0x40, 0xff, 0x4]}, &(0x7f0000000200)=0xe) getsockopt$inet_sctp_SCTP_DEFAULT_PRINFO(r1, 0x84, 0x72, &(0x7f0000000240)={0x0, 0x0, 0x20}, &(0x7f00000000c0)=0xc) getsockopt$inet_sctp_SCTP_PR_SUPPORTED(r1, 0x84, 0x71, &(0x7f0000000140)={r2, 0xffff}, &(0x7f0000000180)=0x8) bind$inet(0xffffffffffffffff, &(0x7f0000deb000)={0x2, 0x4e22, @broadcast=0xffffffff}, 0x10) sendto$inet(r1, &(0x7f0000617fc9), 0x84, 0x20000000, &(0x7f0000deaff0)={0x2, 0x0, @loopback=0x7f000001}, 0x10) [ 72.629289] FAT-fs (loop0): Directory bread(block 112) failed [ 72.658227] FAT-fs (loop0): Directory bread(block 113) failed [ 72.688834] FAT-fs (loop0): Directory bread(block 114) failed [ 72.739020] FAT-fs (loop7): Directory bread(block 112) failed [ 72.762507] FAT-fs (loop7): Directory bread(block 113) failed [ 72.775900] FAT-fs (loop0): Directory bread(block 112) failed [ 72.776065] FAT-fs (loop0): Directory bread(block 113) failed [ 72.776164] FAT-fs (loop0): Directory bread(block 114) failed [ 72.792660] FAT-fs (loop0): Directory bread(block 112) failed [ 72.792858] FAT-fs (loop0): Directory bread(block 113) failed [ 72.793101] FAT-fs (loop0): Directory bread(block 114) failed 2018/04/30 20:08:57 executing program 2: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket(0xa, 0x2, 0x0) pkey_free(0xffffffffffffffff) setsockopt$inet6_udp_int(0xffffffffffffffff, 0x11, 0x0, &(0x7f00001be000)=0xff, 0x4) readahead(r0, 0x0, 0x0) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f0000000100)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000480)="eb3c906d6b66732e66617400020401000200077000f801", 0x17}], 0x0, &(0x7f0000000240)=ANY=[]) r1 = open(&(0x7f00000004c0)='./file0/file0\x00', 0x3fffa, 0x0) gettid() lstat(&(0x7f00000000c0)='./file0\x00', &(0x7f00000001c0)) fallocate(r1, 0x1, 0x0, 0x3f0000) close(r1) umount2(&(0x7f0000000080)='./file0\x00', 0x0) [ 72.913579] FAT-fs (loop7): Directory bread(block 114) failed 2018/04/30 20:08:57 executing program 5: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = creat(&(0x7f0000000700)='./bus\x00', 0x0) r1 = open(&(0x7f0000000000)='./bus\x00', 0x26302, 0x0) ftruncate(r1, 0x80000) write$binfmt_aout(0xffffffffffffffff, &(0x7f0000000740)={{0xcc, 0x0, 0x0, 0x2fe}, "", [[], []]}, 0x220) sendfile(r0, r1, &(0x7f0000d83ff8), 0x8000fffffffe) creat(&(0x7f00000000c0)='./bus\x00', 0x0) [ 73.007876] FAT-fs (loop7): Directory bread(block 112) failed [ 73.046978] FAT-fs (loop7): Directory bread(block 113) failed [ 73.063949] FAT-fs (loop7): Directory bread(block 114) failed [ 73.070069] device lo left promiscuous mode [ 73.104039] device lo entered promiscuous mode 2018/04/30 20:08:58 executing program 1: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000100)={0xa, 0x3, 0x5, @remote={0xfe, 0x80, [], 0xbb}, 0x4}, 0x1c) sendmmsg(r0, &(0x7f0000007e00), 0x3c5, 0x0) r1 = socket$inet(0x2, 0x4, 0xb) getsockopt$inet_sctp_SCTP_DEFAULT_PRINFO(r1, 0x84, 0x72, &(0x7f0000000200)={0x0, 0x4, 0x21}, &(0x7f00000001c0)=0xc) getsockopt$inet_sctp_SCTP_PARTIAL_DELIVERY_POINT(r1, 0x84, 0x13, &(0x7f00000002c0)={r2, 0x40000000000}, &(0x7f0000000300)=0x8) getsockopt$inet6_opts(r0, 0x29, 0x37, &(0x7f0000000240)=""/104, &(0x7f00000000c0)=0x68) r3 = memfd_create(&(0x7f0000000440)='selinux(em1/&}]-\x00', 0x1) ioctl$DRM_IOCTL_ADD_CTX(0xffffffffffffffff, 0xc0086420, &(0x7f0000000480)={0x0}) ioctl$DRM_IOCTL_DMA(r3, 0xc0406429, &(0x7f00000005c0)={r4, 0x5, &(0x7f00000004c0)=[0x9, 0x10000, 0x0, 0x80000001, 0x10000], &(0x7f0000000500)=[0x10001, 0x0, 0x80000001, 0x5, 0x2], 0x4, 0x4, 0x9, &(0x7f0000000540)=[0x4, 0x0, 0x0, 0x36], &(0x7f0000000580)=[0x7, 0x8]}) ioctl$ASHMEM_GET_PROT_MASK(r3, 0x7706, &(0x7f00000006c0)) getsockopt$inet_sctp_SCTP_PR_SUPPORTED(r1, 0x84, 0x71, &(0x7f0000000140)={r2, 0xffff}, &(0x7f0000000180)=0x8) bind$inet(r1, &(0x7f0000000000)={0x2, 0x4e23, @rand_addr}, 0x10) accept4$packet(0xffffffffffffff9c, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @dev}, &(0x7f0000000380)=0x14, 0x0) getsockopt$IP6T_SO_GET_REVISION_TARGET(r0, 0x29, 0x45, &(0x7f0000000640)={'TPROXY\x00'}, &(0x7f0000000680)=0x1e) setsockopt$inet_sctp6_SCTP_DELAYED_SACK(r0, 0x84, 0x10, &(0x7f0000000600)=@sack_info={r5, 0xffffffffffffffe1, 0xaa}, 0xc) ioctl$sock_inet6_SIOCDELRT(r0, 0x890c, &(0x7f00000003c0)={@remote={0xfe, 0x80, [], 0xbb}, @ipv4={[], [0xff, 0xff], @multicast1=0xe0000001}, @loopback={0x0, 0x1}, 0x4, 0x8, 0x0, 0x400, 0x3, 0x0, r6}) r7 = request_key(&(0x7f0000000700)='rxrpc\x00', &(0x7f0000000740)={0x73, 0x79, 0x7a, 0x1}, &(0x7f0000000780)='TPROXY\x00', 0xfffffffffffffffa) r8 = add_key$keyring(&(0x7f0000001cc0)='keyring\x00', &(0x7f0000001d00)={0x73, 0x79, 0x7a, 0x3}, 0x0, 0x0, 0xffffffffffffffff) keyctl$instantiate_iov(0x14, r7, &(0x7f0000001c00)=[{&(0x7f00000007c0)="bb3688f4eda8a660987b44fb1cd01c80b66df9e0d9", 0x15}, {&(0x7f0000000880)="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", 0xfe}, {&(0x7f0000000a00)="f487e574d97de92eaab27d76ae97a061fb866c3c5f8f2cfd7950bb14c0112f8c4ad0744c7d698fadab5bc7bf95be0cb08504d8e373f84132b72d7ddd9d67edb279e218c2ce9a45d0ae464471227996aaf6b94578dde7f447bb6b", 0x5a}, {&(0x7f0000000ac0)}, {&(0x7f0000001b00)="b8b33c10187046cdfa7debcaf061543946803966be17070b0765fefb59a00178a52b40c4ea7366ecc4b6dc10f08bc76239fd", 0x32}], 0x5, r8) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r3, 0x84, 0x9, &(0x7f0000001d40)={r5, @in6={{0xa, 0x4e24, 0x3f, @dev={0xfe, 0x80, [], 0x1c}, 0x400000}}, 0x0, 0x3f, 0x200, 0x8001}, 0x98) 2018/04/30 20:08:58 executing program 4: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000100)={0xa, 0x0, 0x0, @dev={0xfe, 0x80}, 0x4}, 0x1c) sendmmsg(r0, &(0x7f0000007e00), 0x3c5, 0x0) r1 = socket$inet(0x2, 0x5, 0xffffffffffffffef) getsockopt$inet_sctp_SCTP_RESET_STREAMS(r1, 0x84, 0x77, &(0x7f00000001c0)={0x0, 0x11, 0x3, [0x40, 0xff, 0x4]}, &(0x7f0000000200)=0xe) getsockopt$inet_sctp_SCTP_DEFAULT_PRINFO(r1, 0x84, 0x72, &(0x7f0000000240)={0x0, 0x0, 0x20}, &(0x7f00000000c0)=0xc) getsockopt$inet_sctp_SCTP_PR_SUPPORTED(r1, 0x84, 0x71, &(0x7f0000000140)={r2, 0xffff}, &(0x7f0000000180)=0x8) bind$inet(0xffffffffffffffff, &(0x7f0000deb000)={0x2, 0x4e22, @broadcast=0xffffffff}, 0x10) sendto$inet(r1, &(0x7f0000617fc9), 0x84, 0x20000000, &(0x7f0000deaff0)={0x2, 0x0, @loopback=0x7f000001}, 0x10) [ 73.110096] device lo entered promiscuous mode [ 73.130969] FAT-fs (loop2): Directory bread(block 112) failed [ 73.173299] FAT-fs (loop7): Directory bread(block 112) failed [ 73.173465] FAT-fs (loop7): Directory bread(block 113) failed [ 73.173585] FAT-fs (loop7): Directory bread(block 114) failed [ 73.241690] FAT-fs (loop2): Directory bread(block 113) failed [ 73.262727] FAT-fs (loop2): Directory bread(block 114) failed [ 73.348202] FAT-fs (loop2): Directory bread(block 112) failed [ 73.389849] FAT-fs (loop2): Directory bread(block 113) failed [ 73.415727] FAT-fs (loop2): Directory bread(block 114) failed [ 73.477175] FAT-fs (loop2): Directory bread(block 112) failed [ 73.498021] FAT-fs (loop2): Directory bread(block 113) failed [ 73.517725] FAT-fs (loop2): Directory bread(block 114) failed 2018/04/30 20:08:58 executing program 3: r0 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer\x00', 0x2001, 0x0) write$sndseq(r0, &(0x7f0000000040)=[{0x0, 0x0, 0x0, 0x0, @tick, {0x5, 0x9bf7}, {}, @time}], 0x1c) 2018/04/30 20:08:58 executing program 0: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket(0xa, 0x2, 0x0) pkey_free(0xffffffffffffffff) setsockopt$inet6_udp_int(0xffffffffffffffff, 0x11, 0x0, &(0x7f00001be000)=0xff, 0x4) readahead(r0, 0x0, 0x0) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f0000000100)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000480)="eb3c906d6b66732e66617400020401000200077000f801", 0x17}], 0x0, &(0x7f0000000240)=ANY=[]) r1 = open(&(0x7f00000004c0)='./file0/file0\x00', 0x3fffa, 0x0) gettid() lstat(&(0x7f00000000c0)='./file0\x00', &(0x7f00000001c0)) fallocate(r1, 0x1, 0x0, 0x3f0000) close(r1) umount2(&(0x7f0000000080)='./file0\x00', 0x0) 2018/04/30 20:08:58 executing program 7: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket(0xa, 0x2, 0x0) pkey_free(0xffffffffffffffff) setsockopt$inet6_udp_int(0xffffffffffffffff, 0x11, 0x0, &(0x7f00001be000)=0xff, 0x4) readahead(r0, 0x0, 0x0) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f0000000100)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000480)="eb3c906d6b66732e66617400020401000200077000f801", 0x17}], 0x0, &(0x7f0000000240)=ANY=[]) r1 = open(&(0x7f00000004c0)='./file0/file0\x00', 0x3fffa, 0x0) gettid() lstat(&(0x7f00000000c0)='./file0\x00', &(0x7f00000001c0)) fallocate(r1, 0x1, 0x0, 0x3f0000) close(r1) umount2(&(0x7f0000000080)='./file0\x00', 0x0) 2018/04/30 20:08:58 executing program 5: r0 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer2\x00', 0x0, 0x0) ioctl$KDGKBLED(r0, 0x80045105, &(0x7f0000000000)) 2018/04/30 20:08:58 executing program 2: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket(0xa, 0x2, 0x0) pkey_free(0xffffffffffffffff) setsockopt$inet6_udp_int(0xffffffffffffffff, 0x11, 0x0, &(0x7f00001be000)=0xff, 0x4) readahead(r0, 0x0, 0x0) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f0000000100)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000480)="eb3c906d6b66732e66617400020401000200077000f801", 0x17}], 0x0, &(0x7f0000000240)=ANY=[]) r1 = open(&(0x7f00000004c0)='./file0/file0\x00', 0x3fffa, 0x0) gettid() lstat(&(0x7f00000000c0)='./file0\x00', &(0x7f00000001c0)) fallocate(r1, 0x1, 0x0, 0x3f0000) close(r1) umount2(&(0x7f0000000080)='./file0\x00', 0x0) 2018/04/30 20:08:58 executing program 1: pipe(&(0x7f0000002640)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setownex(r0, 0xf, &(0x7f00000045c0)={0x3}) 2018/04/30 20:08:58 executing program 4: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000100)={0xa, 0x0, 0x0, @dev={0xfe, 0x80}, 0x4}, 0x1c) sendmmsg(r0, &(0x7f0000007e00), 0x3c5, 0x0) r1 = socket$inet(0x2, 0x5, 0xffffffffffffffef) getsockopt$inet_sctp_SCTP_RESET_STREAMS(r1, 0x84, 0x77, &(0x7f00000001c0)={0x0, 0x11, 0x3, [0x40, 0xff, 0x4]}, &(0x7f0000000200)=0xe) getsockopt$inet_sctp_SCTP_DEFAULT_PRINFO(r1, 0x84, 0x72, &(0x7f0000000240)={0x0, 0x0, 0x20}, &(0x7f00000000c0)=0xc) getsockopt$inet_sctp_SCTP_PR_SUPPORTED(r1, 0x84, 0x71, &(0x7f0000000140)={r2, 0xffff}, &(0x7f0000000180)=0x8) bind$inet(0xffffffffffffffff, &(0x7f0000deb000)={0x2, 0x4e22, @broadcast=0xffffffff}, 0x10) sendto$inet(r1, &(0x7f0000617fc9), 0x84, 0x20000000, &(0x7f0000deaff0)={0x2, 0x0, @loopback=0x7f000001}, 0x10) 2018/04/30 20:08:58 executing program 6: perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x71, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = open$dir(&(0x7f00000001c0)='./file0\x00', 0x17ffc, 0x0) r1 = open$dir(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) r2 = open$dir(&(0x7f0000000140)='./file0\x00', 0x1, 0x0) fcntl$lock(r2, 0x6, &(0x7f0000000040)={0x1}) fcntl$lock(r0, 0x4000000000026, &(0x7f0000000280)) fcntl$lock(r1, 0x6, &(0x7f0000000100)) 2018/04/30 20:08:59 executing program 3: r0 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer\x00', 0x2001, 0x0) write$sndseq(r0, &(0x7f0000000040)=[{0x0, 0x0, 0x0, 0x0, @tick, {0x5, 0x9bf7}, {}, @time}], 0x1c) 2018/04/30 20:08:59 executing program 5: r0 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer2\x00', 0x0, 0x0) ioctl$KDGKBLED(r0, 0x80045105, &(0x7f0000000000)) 2018/04/30 20:08:59 executing program 3: r0 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer\x00', 0x2001, 0x0) write$sndseq(r0, &(0x7f0000000040)=[{0x0, 0x0, 0x0, 0x0, @tick, {0x5, 0x9bf7}, {}, @time}], 0x1c) 2018/04/30 20:08:59 executing program 5: r0 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer2\x00', 0x0, 0x0) ioctl$KDGKBLED(r0, 0x80045105, &(0x7f0000000000)) 2018/04/30 20:08:59 executing program 1: r0 = socket$inet(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000020ff0)=[{&(0x7f0000000040)="2f0000001d000381ffffff000d000000020000000100000000ef02c91300010000000000050b29909e0ed08daeb24b", 0x2f}], 0x1}, 0x0) 2018/04/30 20:08:59 executing program 3: r0 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer\x00', 0x2001, 0x0) write$sndseq(r0, &(0x7f0000000040)=[{0x0, 0x0, 0x0, 0x0, @tick, {0x5, 0x9bf7}, {}, @time}], 0x1c) 2018/04/30 20:08:59 executing program 5: r0 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer2\x00', 0x0, 0x0) ioctl$KDGKBLED(r0, 0x80045105, &(0x7f0000000000)) 2018/04/30 20:08:59 executing program 1: r0 = socket$inet6(0xa, 0x80803, 0x87) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f00000001c0)={{{@in, @in=@dev={0xac, 0x14, 0x14}, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {}, 0x0, 0x0, 0x1}, {{@in6=@remote={0xfe, 0x80, [], 0xbb}, 0x0, 0x6c}, 0x0, @in6, 0x0, 0x0, 0x0, 0x90}}, 0xe8) connect$inet6(r0, &(0x7f00000000c0)={0xa}, 0x1c) 2018/04/30 20:08:59 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/enforce\x00', 0x8000, 0x0) getsockopt$inet6_int(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000040), &(0x7f0000000080)=0x4) writev(r0, &(0x7f0000000140)=[{&(0x7f00000000c0)="390000001300090465000000000000007f00804003000000070001070000000c1900110004000000070000000003000000000000000003f500", 0x39}], 0x1) [ 74.407080] FAT-fs (loop7): Directory bread(block 112) failed [ 74.414184] FAT-fs (loop7): Directory bread(block 113) failed [ 74.421007] FAT-fs (loop7): Directory bread(block 114) failed [ 74.471131] FAT-fs (loop7): Directory bread(block 112) failed [ 74.477574] FAT-fs (loop7): Directory bread(block 113) failed [ 74.484280] FAT-fs (loop7): Directory bread(block 114) failed [ 74.497956] FAT-fs (loop7): Directory bread(block 112) failed [ 74.504616] FAT-fs (loop7): Directory bread(block 113) failed [ 74.511182] FAT-fs (loop7): Directory bread(block 114) failed [ 74.526553] FAT-fs (loop0): Directory bread(block 112) failed [ 74.549770] FAT-fs (loop0): Directory bread(block 113) failed [ 74.574854] FAT-fs (loop2): Directory bread(block 112) failed [ 74.575170] FAT-fs (loop2): Directory bread(block 113) failed [ 74.575250] FAT-fs (loop2): Directory bread(block 114) failed [ 74.644410] FAT-fs (loop2): Directory bread(block 112) failed [ 74.644583] FAT-fs (loop2): Directory bread(block 113) failed [ 74.644696] FAT-fs (loop2): Directory bread(block 114) failed [ 74.648731] FAT-fs (loop2): Directory bread(block 112) failed [ 74.648793] FAT-fs (loop2): Directory bread(block 113) failed [ 74.648854] FAT-fs (loop2): Directory bread(block 114) failed [ 74.705830] FAT-fs (loop0): Directory bread(block 114) failed [ 74.776451] FAT-fs (loop0): Directory bread(block 112) failed [ 74.793181] FAT-fs (loop0): Directory bread(block 113) failed [ 74.806935] FAT-fs (loop0): Directory bread(block 114) failed [ 74.827572] FAT-fs (loop0): Directory bread(block 112) failed [ 74.833903] FAT-fs (loop0): Directory bread(block 113) failed [ 74.840157] FAT-fs (loop0): Directory bread(block 114) failed 2018/04/30 20:08:59 executing program 0: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket(0xa, 0x2, 0x0) pkey_free(0xffffffffffffffff) setsockopt$inet6_udp_int(0xffffffffffffffff, 0x11, 0x0, &(0x7f00001be000)=0xff, 0x4) readahead(r0, 0x0, 0x0) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f0000000100)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000480)="eb3c906d6b66732e66617400020401000200077000f801", 0x17}], 0x0, &(0x7f0000000240)=ANY=[]) r1 = open(&(0x7f00000004c0)='./file0/file0\x00', 0x3fffa, 0x0) gettid() lstat(&(0x7f00000000c0)='./file0\x00', &(0x7f00000001c0)) fallocate(r1, 0x1, 0x0, 0x3f0000) close(r1) umount2(&(0x7f0000000080)='./file0\x00', 0x0) [ 75.105491] FAT-fs (loop0): Directory bread(block 112) failed [ 75.111683] FAT-fs (loop0): Directory bread(block 113) failed [ 75.117717] FAT-fs (loop0): Directory bread(block 114) failed [ 75.157740] FAT-fs (loop0): Directory bread(block 112) failed [ 75.164019] FAT-fs (loop0): Directory bread(block 113) failed [ 75.170599] FAT-fs (loop0): Directory bread(block 114) failed [ 75.189917] FAT-fs (loop0): Directory bread(block 112) failed [ 75.201688] FAT-fs (loop0): Directory bread(block 113) failed [ 75.207955] FAT-fs (loop0): Directory bread(block 114) failed 2018/04/30 20:09:00 executing program 7: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket(0xa, 0x2, 0x0) pkey_free(0xffffffffffffffff) setsockopt$inet6_udp_int(0xffffffffffffffff, 0x11, 0x0, &(0x7f00001be000)=0xff, 0x4) readahead(r0, 0x0, 0x0) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f0000000100)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000480)="eb3c906d6b66732e66617400020401000200077000f801", 0x17}], 0x0, &(0x7f0000000240)=ANY=[]) r1 = open(&(0x7f00000004c0)='./file0/file0\x00', 0x3fffa, 0x0) gettid() lstat(&(0x7f00000000c0)='./file0\x00', &(0x7f00000001c0)) fallocate(r1, 0x1, 0x0, 0x3f0000) close(r1) umount2(&(0x7f0000000080)='./file0\x00', 0x0) 2018/04/30 20:09:00 executing program 2: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket(0xa, 0x2, 0x0) pkey_free(0xffffffffffffffff) setsockopt$inet6_udp_int(0xffffffffffffffff, 0x11, 0x0, &(0x7f00001be000)=0xff, 0x4) readahead(r0, 0x0, 0x0) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f0000000100)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000480)="eb3c906d6b66732e66617400020401000200077000f801", 0x17}], 0x0, &(0x7f0000000240)=ANY=[]) r1 = open(&(0x7f00000004c0)='./file0/file0\x00', 0x3fffa, 0x0) gettid() lstat(&(0x7f00000000c0)='./file0\x00', &(0x7f00000001c0)) fallocate(r1, 0x1, 0x0, 0x3f0000) close(r1) umount2(&(0x7f0000000080)='./file0\x00', 0x0) 2018/04/30 20:09:00 executing program 4: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000100)={0xa, 0x0, 0x0, @dev={0xfe, 0x80}, 0x4}, 0x1c) sendmmsg(r0, &(0x7f0000007e00), 0x3c5, 0x0) r1 = socket$inet(0x2, 0x5, 0xffffffffffffffef) getsockopt$inet_sctp_SCTP_RESET_STREAMS(r1, 0x84, 0x77, &(0x7f00000001c0)={0x0, 0x11, 0x3, [0x40, 0xff, 0x4]}, &(0x7f0000000200)=0xe) getsockopt$inet_sctp_SCTP_DEFAULT_PRINFO(r1, 0x84, 0x72, &(0x7f0000000240)={0x0, 0x0, 0x20}, &(0x7f00000000c0)=0xc) getsockopt$inet_sctp_SCTP_PR_SUPPORTED(r1, 0x84, 0x71, &(0x7f0000000140)={r2, 0xffff}, &(0x7f0000000180)=0x8) bind$inet(0xffffffffffffffff, &(0x7f0000deb000)={0x2, 0x4e22, @broadcast=0xffffffff}, 0x10) sendto$inet(r1, &(0x7f0000617fc9), 0x84, 0x20000000, &(0x7f0000deaff0)={0x2, 0x0, @loopback=0x7f000001}, 0x10) 2018/04/30 20:09:00 executing program 5: r0 = socket$inet6(0xa, 0x1, 0x0) setsockopt$inet6_opts(r0, 0x29, 0x36, &(0x7f0000e97000)=@hopopts={0x0, 0x6, [], [@padn={0x1, 0x4, [0x0, 0x0, 0x0, 0x0]}, @calipso={0x7, 0x31b, {0x0, 0x8, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0]}}]}, 0x38) setsockopt$inet6_opts(r0, 0x29, 0x36, &(0x7f0000bfd000)=@routing, 0x8) 2018/04/30 20:09:00 executing program 1: r0 = socket$inet6(0xa, 0x80803, 0x87) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f00000001c0)={{{@in, @in=@dev={0xac, 0x14, 0x14}, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {}, 0x0, 0x0, 0x1}, {{@in6=@remote={0xfe, 0x80, [], 0xbb}, 0x0, 0x6c}, 0x0, @in6, 0x0, 0x0, 0x0, 0x90}}, 0xe8) connect$inet6(r0, &(0x7f00000000c0)={0xa}, 0x1c) 2018/04/30 20:09:00 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/enforce\x00', 0x8000, 0x0) getsockopt$inet6_int(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000040), &(0x7f0000000080)=0x4) writev(r0, &(0x7f0000000140)=[{&(0x7f00000000c0)="390000001300090465000000000000007f00804003000000070001070000000c1900110004000000070000000003000000000000000003f500", 0x39}], 0x1) 2018/04/30 20:09:00 executing program 6: perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x71, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = open$dir(&(0x7f00000001c0)='./file0\x00', 0x17ffc, 0x0) r1 = open$dir(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) r2 = open$dir(&(0x7f0000000140)='./file0\x00', 0x1, 0x0) fcntl$lock(r2, 0x6, &(0x7f0000000040)={0x1}) fcntl$lock(r0, 0x4000000000026, &(0x7f0000000280)) fcntl$lock(r1, 0x6, &(0x7f0000000100)) 2018/04/30 20:09:00 executing program 0: perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x71, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = open$dir(&(0x7f00000001c0)='./file0\x00', 0x17ffc, 0x0) r1 = open$dir(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) r2 = open$dir(&(0x7f0000000140)='./file0\x00', 0x1, 0x0) fcntl$lock(r2, 0x6, &(0x7f0000000040)={0x1}) fcntl$lock(r0, 0x4000000000026, &(0x7f0000000280)) fcntl$lock(r1, 0x6, &(0x7f0000000100)) 2018/04/30 20:09:00 executing program 1: r0 = socket$inet6(0xa, 0x80803, 0x87) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f00000001c0)={{{@in, @in=@dev={0xac, 0x14, 0x14}, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {}, 0x0, 0x0, 0x1}, {{@in6=@remote={0xfe, 0x80, [], 0xbb}, 0x0, 0x6c}, 0x0, @in6, 0x0, 0x0, 0x0, 0x90}}, 0xe8) connect$inet6(r0, &(0x7f00000000c0)={0xa}, 0x1c) 2018/04/30 20:09:00 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/enforce\x00', 0x8000, 0x0) getsockopt$inet6_int(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000040), &(0x7f0000000080)=0x4) writev(r0, &(0x7f0000000140)=[{&(0x7f00000000c0)="390000001300090465000000000000007f00804003000000070001070000000c1900110004000000070000000003000000000000000003f500", 0x39}], 0x1) 2018/04/30 20:09:00 executing program 5: perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x71, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = open$dir(&(0x7f00000001c0)='./file0\x00', 0x17ffc, 0x0) r1 = open$dir(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) r2 = open$dir(&(0x7f0000000140)='./file0\x00', 0x1, 0x0) fcntl$lock(r2, 0x6, &(0x7f0000000040)={0x1}) fcntl$lock(r0, 0x4000000000026, &(0x7f0000000280)) fcntl$lock(r1, 0x6, &(0x7f0000000100)) 2018/04/30 20:09:00 executing program 1: r0 = socket$inet6(0xa, 0x80803, 0x87) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f00000001c0)={{{@in, @in=@dev={0xac, 0x14, 0x14}, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {}, 0x0, 0x0, 0x1}, {{@in6=@remote={0xfe, 0x80, [], 0xbb}, 0x0, 0x6c}, 0x0, @in6, 0x0, 0x0, 0x0, 0x90}}, 0xe8) connect$inet6(r0, &(0x7f00000000c0)={0xa}, 0x1c) 2018/04/30 20:09:00 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/enforce\x00', 0x8000, 0x0) getsockopt$inet6_int(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000040), &(0x7f0000000080)=0x4) writev(r0, &(0x7f0000000140)=[{&(0x7f00000000c0)="390000001300090465000000000000007f00804003000000070001070000000c1900110004000000070000000003000000000000000003f500", 0x39}], 0x1) 2018/04/30 20:09:00 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00001fefe4)={0xa, 0x4e22}, 0x5d) ioctl$int_in(r0, 0x5452, &(0x7f000053d000)=0x4) listen(r1, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendto$inet6(r0, &(0x7f0000eb9fff), 0xfffffd65, 0x20000004, &(0x7f000031e000)={0xa, 0x4e22}, 0x1c) 2018/04/30 20:09:00 executing program 3: mkdir(&(0x7f0000000000)="131377c5fc35d41454d5d41d29ad1a6029598146e6be166e41ad0dbd4054033c9f33bbda8224a2f3d772e7636e48b33cbf708372e8f1b9933ec5127743be2206209ef02df9cbf2f6e880d3382f", 0x0) mkdir(&(0x7f0000c4e000)='./file0\x00', 0x0) rename(&(0x7f0000001480)='./file0\x00', &(0x7f0000001540)="131377c5fc35d41454d5d41d29ad1a6029598146e6be166e41ad0dbd4054033c9f33bbda8224a2f3d772e7636e48b33cbf708372e8f1b9933ec5127743be2206209ef02df9cbf2f6e880d3382f00") [ 75.559236] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 2018/04/30 20:09:00 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00001fefe4)={0xa, 0x4e22}, 0x5d) ioctl$int_in(r0, 0x5452, &(0x7f000053d000)=0x4) listen(r1, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendto$inet6(r0, &(0x7f0000eb9fff), 0xfffffd65, 0x20000004, &(0x7f000031e000)={0xa, 0x4e22}, 0x1c) [ 75.657103] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 75.765889] FAT-fs (loop2): Directory bread(block 112) failed [ 75.777976] FAT-fs (loop7): Directory bread(block 112) failed [ 75.784569] FAT-fs (loop2): Directory bread(block 113) failed [ 75.784657] FAT-fs (loop2): Directory bread(block 114) failed [ 75.819594] FAT-fs (loop7): Directory bread(block 113) failed [ 75.837224] FAT-fs (loop2): Directory bread(block 112) failed [ 75.837311] FAT-fs (loop2): Directory bread(block 113) failed [ 75.837410] FAT-fs (loop2): Directory bread(block 114) failed [ 75.847742] FAT-fs (loop2): Directory bread(block 112) failed [ 75.847818] FAT-fs (loop2): Directory bread(block 113) failed [ 75.847887] FAT-fs (loop2): Directory bread(block 114) failed [ 75.927989] FAT-fs (loop7): Directory bread(block 114) failed [ 75.967212] FAT-fs (loop7): Directory bread(block 112) failed [ 75.976154] FAT-fs (loop7): Directory bread(block 113) failed [ 75.982707] FAT-fs (loop7): Directory bread(block 114) failed [ 75.996550] FAT-fs (loop7): Directory bread(block 112) failed [ 76.003226] FAT-fs (loop7): Directory bread(block 113) failed [ 76.009424] FAT-fs (loop7): Directory bread(block 114) failed 2018/04/30 20:09:01 executing program 0: perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x71, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = open$dir(&(0x7f00000001c0)='./file0\x00', 0x17ffc, 0x0) r1 = open$dir(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) r2 = open$dir(&(0x7f0000000140)='./file0\x00', 0x1, 0x0) fcntl$lock(r2, 0x6, &(0x7f0000000040)={0x1}) fcntl$lock(r0, 0x4000000000026, &(0x7f0000000280)) fcntl$lock(r1, 0x6, &(0x7f0000000100)) 2018/04/30 20:09:01 executing program 5: perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x71, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = open$dir(&(0x7f00000001c0)='./file0\x00', 0x17ffc, 0x0) r1 = open$dir(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) r2 = open$dir(&(0x7f0000000140)='./file0\x00', 0x1, 0x0) fcntl$lock(r2, 0x6, &(0x7f0000000040)={0x1}) fcntl$lock(r0, 0x4000000000026, &(0x7f0000000280)) fcntl$lock(r1, 0x6, &(0x7f0000000100)) 2018/04/30 20:09:01 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40000000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = getpid() ioprio_get$pid(0x3, r2) getsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(0xffffffffffffffff, 0x84, 0x18, &(0x7f00000000c0), &(0x7f0000000100)=0x3cb) r3 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000180)='/dev/loop-control\x00', 0x20200, 0x0) ioctl$LOOP_CTL_ADD(r3, 0x4c80, 0x0) tgkill(0x0, 0x0, 0x0) eventfd2(0x0, 0x1) fallocate(r1, 0x2, 0x2, 0x92d) r4 = ioctl$LOOP_CTL_GET_FREE(r3, 0x4c82) ioctl$LOOP_CTL_REMOVE(r3, 0x4c81, 0x0) preadv(r3, &(0x7f0000000280)=[{&(0x7f00000004c0)=""/249, 0xf9}], 0x1, 0x0) ioctl$sock_inet_SIOCRTMSG(r0, 0x890d, &(0x7f00000001c0)={0xffff, {0x2, 0x4e21, @multicast1=0xe0000001}, {0x2, 0x4e21, @local={0xac, 0x14, 0x14, 0xaa}}, {0x2, 0x4e24, @multicast2=0xe0000002}, 0x82, 0x80, 0x1ed7, 0x8001, 0x0, &(0x7f0000000140)='teql0\x00', 0x100, 0x5, 0x400}) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, r4) r5 = openat$selinux_status(0xffffffffffffff9c, &(0x7f00000002c0)='/selinux/status\x00', 0x0, 0x0) ioctl$EVIOCSFF(r5, 0x40304580, &(0x7f00000005c0)=ANY=[@ANYBLOB="54000104020007b25e02000000000040000000000000d0ea5e416da12cb64114781f278de13c54c30e9c6bb82498fd33d4673997a5c0281ca4b0c40387bae77ac9ced88ad100da4e7e7f084e53aef1dab44aab29e8df817b7b26969320a69910a220aedc5a000648a1a589c242d5a6cbf4daf3ca0000004f00bc6c0a03ab1cfe5007d6eb6a5df1f9bc74c422c958340446ef14bd7a838b60f2dc10844f45d6ca02801f7f8471620765729cb6a632285fe9276cc67091573658d996014633044af6f122d25f73056b"]) ioctl$KDGETLED(0xffffffffffffffff, 0x4b31, &(0x7f0000000300)) ioctl$PIO_UNIMAP(r5, 0x4b67, &(0x7f00000003c0)={0x40000000000002ad, &(0x7f0000000380)=[{0x80000003}, {0x1, 0x76}]}) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f0000000100)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000010000)="eb3c906d6b66732e66617400020401000200077008f8", 0x16}], 0x0, &(0x7f0000000240)=ANY=[]) open(&(0x7f00000000c0)='./file0/file0\x00', 0x3fffa, 0x0) r6 = open(&(0x7f00000003c0)='./file0/file0\x00', 0x4001, 0x0) fallocate(r6, 0x0, 0x0, 0x1fffff) 2018/04/30 20:09:01 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00001fefe4)={0xa, 0x4e22}, 0x5d) ioctl$int_in(r0, 0x5452, &(0x7f000053d000)=0x4) listen(r1, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendto$inet6(r0, &(0x7f0000eb9fff), 0xfffffd65, 0x20000004, &(0x7f000031e000)={0xa, 0x4e22}, 0x1c) 2018/04/30 20:09:01 executing program 2: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000001200)='/dev/uinput\x00', 0x402, 0x0) write$fuse(r0, &(0x7f0000001180)={0x12, 0x0, 0x0, @fuse_notify_poll_wakeup_out}, 0x45c) 2018/04/30 20:09:01 executing program 4: r0 = perf_event_open(&(0x7f0000271000)={0x2, 0x70, 0x0, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setrlimit(0x100000000007, &(0x7f0000046ff0)) dup(r0) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/sys/net/ipv4/vs/cache_bypass\x00', 0x2, 0x0) getsockopt$inet_opts(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000080)=""/19, &(0x7f0000000100)=0x13) 2018/04/30 20:09:01 executing program 6: perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x71, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = open$dir(&(0x7f00000001c0)='./file0\x00', 0x17ffc, 0x0) r1 = open$dir(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) r2 = open$dir(&(0x7f0000000140)='./file0\x00', 0x1, 0x0) fcntl$lock(r2, 0x6, &(0x7f0000000040)={0x1}) fcntl$lock(r0, 0x4000000000026, &(0x7f0000000280)) fcntl$lock(r1, 0x6, &(0x7f0000000100)) 2018/04/30 20:09:01 executing program 7: r0 = socket$inet6(0xa, 0x1, 0x0) getsockopt$inet6_int(r0, 0x29, 0x1a, &(0x7f0000000000), &(0x7f0000000040)=0x4) 2018/04/30 20:09:01 executing program 2: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000001200)='/dev/uinput\x00', 0x402, 0x0) write$fuse(r0, &(0x7f0000001180)={0x12, 0x0, 0x0, @fuse_notify_poll_wakeup_out}, 0x45c) 2018/04/30 20:09:01 executing program 7: perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x72, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000100)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f0000448000)='./file0\x00', 0x80040, 0x0) fcntl$setlease(r0, 0x400, 0x1) fcntl$setownex(r0, 0xf, &(0x7f0000000080)) open(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) close(r0) 2018/04/30 20:09:01 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00001fefe4)={0xa, 0x4e22}, 0x5d) ioctl$int_in(r0, 0x5452, &(0x7f000053d000)=0x4) listen(r1, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendto$inet6(r0, &(0x7f0000eb9fff), 0xfffffd65, 0x20000004, &(0x7f000031e000)={0xa, 0x4e22}, 0x1c) 2018/04/30 20:09:01 executing program 2: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000001200)='/dev/uinput\x00', 0x402, 0x0) write$fuse(r0, &(0x7f0000001180)={0x12, 0x0, 0x0, @fuse_notify_poll_wakeup_out}, 0x45c) [ 76.439506] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 2018/04/30 20:09:01 executing program 4: r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$sock_void(r0, 0x29, 0x11, 0x0, 0xf000) 2018/04/30 20:09:01 executing program 2: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000001200)='/dev/uinput\x00', 0x402, 0x0) write$fuse(r0, &(0x7f0000001180)={0x12, 0x0, 0x0, @fuse_notify_poll_wakeup_out}, 0x45c) 2018/04/30 20:09:01 executing program 4: r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$sock_void(r0, 0x29, 0x11, 0x0, 0xf000) 2018/04/30 20:09:01 executing program 4: r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$sock_void(r0, 0x29, 0x11, 0x0, 0xf000) [ 76.542691] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 76.648103] FAT-fs (loop3): Directory bread(block 112) failed [ 76.671965] FAT-fs (loop3): Directory bread(block 112) failed [ 76.683657] FAT-fs (loop3): Directory bread(block 112) failed [ 76.900380] attempt to access beyond end of device [ 76.905409] loop3: rw=536870912, want=246, limit=112 [ 76.910767] Buffer I/O error on dev loop3, logical block 245, lost async page write [ 76.918677] attempt to access beyond end of device [ 76.923693] loop3: rw=536870912, want=247, limit=112 [ 76.928871] Buffer I/O error on dev loop3, logical block 246, lost async page write [ 76.936760] attempt to access beyond end of device [ 76.941753] loop3: rw=536870912, want=248, limit=112 [ 76.946855] Buffer I/O error on dev loop3, logical block 247, lost async page write [ 76.954808] attempt to access beyond end of device [ 76.959759] loop3: rw=536870912, want=249, limit=112 [ 76.964860] Buffer I/O error on dev loop3, logical block 248, lost async page write [ 76.972667] attempt to access beyond end of device [ 76.977579] loop3: rw=536870912, want=262, limit=112 [ 76.982751] Buffer I/O error on dev loop3, logical block 261, lost async page write [ 76.990548] attempt to access beyond end of device [ 76.995458] loop3: rw=536870912, want=263, limit=112 [ 77.000563] Buffer I/O error on dev loop3, logical block 262, lost async page write [ 77.008359] attempt to access beyond end of device [ 77.013291] loop3: rw=536870912, want=264, limit=112 [ 77.018377] Buffer I/O error on dev loop3, logical block 263, lost async page write [ 77.026184] attempt to access beyond end of device [ 77.031121] loop3: rw=536870912, want=265, limit=112 [ 77.036204] Buffer I/O error on dev loop3, logical block 264, lost async page write [ 77.044949] attempt to access beyond end of device [ 77.049876] loop3: rw=536870912, want=2153, limit=112 2018/04/30 20:09:02 executing program 0: perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x71, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = open$dir(&(0x7f00000001c0)='./file0\x00', 0x17ffc, 0x0) r1 = open$dir(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) r2 = open$dir(&(0x7f0000000140)='./file0\x00', 0x1, 0x0) fcntl$lock(r2, 0x6, &(0x7f0000000040)={0x1}) fcntl$lock(r0, 0x4000000000026, &(0x7f0000000280)) fcntl$lock(r1, 0x6, &(0x7f0000000100)) 2018/04/30 20:09:02 executing program 2: r0 = socket$inet6(0xa, 0x1, 0x0) setsockopt(r0, 0x1, 0x15, &(0x7f0000e64ff7)="d7fdaf62", 0x4) 2018/04/30 20:09:02 executing program 4: r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$sock_void(r0, 0x29, 0x11, 0x0, 0xf000) 2018/04/30 20:09:02 executing program 1: r0 = syz_open_dev$sg(&(0x7f0000000000)='/dev/sg#\x00', 0x0, 0x0) ioctl(r0, 0x2271, &(0x7f0000791ffe)) 2018/04/30 20:09:02 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40000000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = getpid() ioprio_get$pid(0x3, r2) getsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(0xffffffffffffffff, 0x84, 0x18, &(0x7f00000000c0), &(0x7f0000000100)=0x3cb) r3 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000180)='/dev/loop-control\x00', 0x20200, 0x0) ioctl$LOOP_CTL_ADD(r3, 0x4c80, 0x0) tgkill(0x0, 0x0, 0x0) eventfd2(0x0, 0x1) fallocate(r1, 0x2, 0x2, 0x92d) r4 = ioctl$LOOP_CTL_GET_FREE(r3, 0x4c82) ioctl$LOOP_CTL_REMOVE(r3, 0x4c81, 0x0) preadv(r3, &(0x7f0000000280)=[{&(0x7f00000004c0)=""/249, 0xf9}], 0x1, 0x0) ioctl$sock_inet_SIOCRTMSG(r0, 0x890d, &(0x7f00000001c0)={0xffff, {0x2, 0x4e21, @multicast1=0xe0000001}, {0x2, 0x4e21, @local={0xac, 0x14, 0x14, 0xaa}}, {0x2, 0x4e24, @multicast2=0xe0000002}, 0x82, 0x80, 0x1ed7, 0x8001, 0x0, &(0x7f0000000140)='teql0\x00', 0x100, 0x5, 0x400}) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, r4) r5 = openat$selinux_status(0xffffffffffffff9c, &(0x7f00000002c0)='/selinux/status\x00', 0x0, 0x0) ioctl$EVIOCSFF(r5, 0x40304580, &(0x7f00000005c0)=ANY=[@ANYBLOB="54000104020007b25e02000000000040000000000000d0ea5e416da12cb64114781f278de13c54c30e9c6bb82498fd33d4673997a5c0281ca4b0c40387bae77ac9ced88ad100da4e7e7f084e53aef1dab44aab29e8df817b7b26969320a69910a220aedc5a000648a1a589c242d5a6cbf4daf3ca0000004f00bc6c0a03ab1cfe5007d6eb6a5df1f9bc74c422c958340446ef14bd7a838b60f2dc10844f45d6ca02801f7f8471620765729cb6a632285fe9276cc67091573658d996014633044af6f122d25f73056b"]) ioctl$KDGETLED(0xffffffffffffffff, 0x4b31, &(0x7f0000000300)) ioctl$PIO_UNIMAP(r5, 0x4b67, &(0x7f00000003c0)={0x40000000000002ad, &(0x7f0000000380)=[{0x80000003}, {0x1, 0x76}]}) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f0000000100)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000010000)="eb3c906d6b66732e66617400020401000200077008f8", 0x16}], 0x0, &(0x7f0000000240)=ANY=[]) open(&(0x7f00000000c0)='./file0/file0\x00', 0x3fffa, 0x0) r6 = open(&(0x7f00000003c0)='./file0/file0\x00', 0x4001, 0x0) fallocate(r6, 0x0, 0x0, 0x1fffff) 2018/04/30 20:09:02 executing program 6: perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x71, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = open$dir(&(0x7f00000001c0)='./file0\x00', 0x17ffc, 0x0) r1 = open$dir(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) r2 = open$dir(&(0x7f0000000140)='./file0\x00', 0x1, 0x0) fcntl$lock(r2, 0x6, &(0x7f0000000040)={0x1}) fcntl$lock(r0, 0x4000000000026, &(0x7f0000000280)) fcntl$lock(r1, 0x6, &(0x7f0000000100)) 2018/04/30 20:09:02 executing program 5: perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x71, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = open$dir(&(0x7f00000001c0)='./file0\x00', 0x17ffc, 0x0) r1 = open$dir(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) r2 = open$dir(&(0x7f0000000140)='./file0\x00', 0x1, 0x0) fcntl$lock(r2, 0x6, &(0x7f0000000040)={0x1}) fcntl$lock(r0, 0x4000000000026, &(0x7f0000000280)) fcntl$lock(r1, 0x6, &(0x7f0000000100)) 2018/04/30 20:09:02 executing program 7: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40000000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = getpid() ioprio_get$pid(0x3, r2) getsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(0xffffffffffffffff, 0x84, 0x18, &(0x7f00000000c0), &(0x7f0000000100)=0x3cb) r3 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000180)='/dev/loop-control\x00', 0x20200, 0x0) ioctl$LOOP_CTL_ADD(r3, 0x4c80, 0x0) tgkill(0x0, 0x0, 0x0) eventfd2(0x0, 0x1) fallocate(r1, 0x2, 0x2, 0x92d) r4 = ioctl$LOOP_CTL_GET_FREE(r3, 0x4c82) ioctl$LOOP_CTL_REMOVE(r3, 0x4c81, 0x0) preadv(r3, &(0x7f0000000280)=[{&(0x7f00000004c0)=""/249, 0xf9}], 0x1, 0x0) ioctl$sock_inet_SIOCRTMSG(r0, 0x890d, &(0x7f00000001c0)={0xffff, {0x2, 0x4e21, @multicast1=0xe0000001}, {0x2, 0x4e21, @local={0xac, 0x14, 0x14, 0xaa}}, {0x2, 0x4e24, @multicast2=0xe0000002}, 0x82, 0x80, 0x1ed7, 0x8001, 0x0, &(0x7f0000000140)='teql0\x00', 0x100, 0x5, 0x400}) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, r4) r5 = openat$selinux_status(0xffffffffffffff9c, &(0x7f00000002c0)='/selinux/status\x00', 0x0, 0x0) ioctl$EVIOCSFF(r5, 0x40304580, &(0x7f00000005c0)=ANY=[@ANYBLOB="54000104020007b25e02000000000040000000000000d0ea5e416da12cb64114781f278de13c54c30e9c6bb82498fd33d4673997a5c0281ca4b0c40387bae77ac9ced88ad100da4e7e7f084e53aef1dab44aab29e8df817b7b26969320a69910a220aedc5a000648a1a589c242d5a6cbf4daf3ca0000004f00bc6c0a03ab1cfe5007d6eb6a5df1f9bc74c422c958340446ef14bd7a838b60f2dc10844f45d6ca02801f7f8471620765729cb6a632285fe9276cc67091573658d996014633044af6f122d25f73056b"]) ioctl$KDGETLED(0xffffffffffffffff, 0x4b31, &(0x7f0000000300)) ioctl$PIO_UNIMAP(r5, 0x4b67, &(0x7f00000003c0)={0x40000000000002ad, &(0x7f0000000380)=[{0x80000003}, {0x1, 0x76}]}) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f0000000100)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000010000)="eb3c906d6b66732e66617400020401000200077008f8", 0x16}], 0x0, &(0x7f0000000240)=ANY=[]) open(&(0x7f00000000c0)='./file0/file0\x00', 0x3fffa, 0x0) r6 = open(&(0x7f00000003c0)='./file0/file0\x00', 0x4001, 0x0) fallocate(r6, 0x0, 0x0, 0x1fffff) 2018/04/30 20:09:02 executing program 2: mmap(&(0x7f0000003000/0x2000)=nil, 0x2000, 0x0, 0x802132, 0xffffffffffffffff, 0x0) mremap(&(0x7f0000003000/0x1000)=nil, 0x1000, 0x4000, 0x3, &(0x7f0000ffc000/0x4000)=nil) mremap(&(0x7f0000fff000/0x1000)=nil, 0x1000, 0x3000, 0x0, &(0x7f0000ffa000/0x3000)=nil) 2018/04/30 20:09:02 executing program 4: perf_event_open(&(0x7f0000000040)={0x1, 0x443, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40000000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mlockall(0x3) ioctl$sock_ipx_SIOCSIFADDR(0xffffffffffffffff, 0x8916, &(0x7f0000000840)={'ip6tnl0\x00', {0x4, 0x0, 0x0, "d24d3fcd2c3b"}}) mmap(&(0x7f0000000000/0xff7000)=nil, 0xff7000, 0x1, 0x32, 0xffffffffffffffff, 0x0) r0 = dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$sock_FIOGETOWN(r0, 0x8903, &(0x7f0000000280)) setsockopt$netrom_NETROM_T2(0xffffffffffffffff, 0x103, 0x2, &(0x7f00000004c0), 0x4) perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x4, 0x9, 0x8b, 0x0, 0x0, 0x0, 0x7, 0x2, 0x3, 0x0, 0x0, 0xffff, 0x6, 0x8, 0x6, 0x3, 0x0, 0x6, 0x1ff, 0x8, 0xffffffffffffff96, 0x5, 0x10d, 0x5, 0x4, 0x0, 0x0, 0x0, 0x2, 0x100, 0x0, 0xfffffffffffffff7, 0x0, 0xf6b7, 0x0, 0x0, 0x0, 0x1, @perf_bp={&(0x7f00000000c0), 0xf}, 0x10, 0x0, 0x79, 0x7, 0x287f, 0xfffffffffffffff9}, 0x0, 0x4, 0xffffffffffffffff, 0x2) 2018/04/30 20:09:02 executing program 1: r0 = syz_open_dev$sg(&(0x7f0000000000)='/dev/sg#\x00', 0x0, 0x0) ioctl(r0, 0x2271, &(0x7f0000791ffe)) 2018/04/30 20:09:02 executing program 2: vmsplice(0xffffffffffffffff, &(0x7f0000000200)=[{&(0x7f00000001c0), 0xfffffffffffffd77}], 0x10000000000000d0, 0x0) 2018/04/30 20:09:02 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000000)={&(0x7f0000000040)={0x10}, 0xc, &(0x7f00008b7ff0)={&(0x7f0000bfdfdc)={0x14, 0x1, 0x2, 0x800000001}, 0x14}, 0x1}, 0x0) 2018/04/30 20:09:02 executing program 2: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$sequencer(0xffffffffffffff9c, &(0x7f0000000180)='/dev/sequencer\x00', 0x45, 0x0) r0 = creat(&(0x7f0000000700)='./bus\x00', 0x0) r1 = open(&(0x7f0000000000)='./bus\x00', 0x26302, 0x0) inotify_rm_watch(0xffffffffffffffff, 0x0) ftruncate(r1, 0x80000) sendfile(r0, r1, &(0x7f0000d83ff8), 0x8000fffffffe) sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000040), 0x100000000081) 2018/04/30 20:09:02 executing program 1: r0 = syz_open_dev$sg(&(0x7f0000000000)='/dev/sg#\x00', 0x0, 0x0) ioctl(r0, 0x2271, &(0x7f0000791ffe)) 2018/04/30 20:09:02 executing program 1: r0 = syz_open_dev$sg(&(0x7f0000000000)='/dev/sg#\x00', 0x0, 0x0) ioctl(r0, 0x2271, &(0x7f0000791ffe)) [ 77.785772] FAT-fs (loop7): Directory bread(block 112) failed [ 77.857792] FAT-fs (loop7): Directory bread(block 112) failed [ 77.889871] FAT-fs (loop7): Directory bread(block 112) failed [ 77.901875] FAT-fs (loop3): Directory bread(block 112) failed [ 77.952669] FAT-fs (loop3): Directory bread(block 112) failed [ 77.992050] FAT-fs (loop3): Directory bread(block 112) failed [ 78.301196] attempt to access beyond end of device [ 78.306246] loop7: rw=536870912, want=246, limit=112 [ 78.311813] Buffer I/O error on dev loop7, logical block 245, lost async page write [ 78.320081] attempt to access beyond end of device [ 78.320133] attempt to access beyond end of device [ 78.320139] loop3: rw=536870912, want=246, limit=112 [ 78.320145] Buffer I/O error on dev loop3, logical block 245, lost async page write [ 78.320155] attempt to access beyond end of device [ 78.320160] loop3: rw=536870912, want=247, limit=112 [ 78.320169] attempt to access beyond end of device [ 78.320173] loop3: rw=536870912, want=248, limit=112 [ 78.320182] attempt to access beyond end of device [ 78.320187] loop3: rw=536870912, want=249, limit=112 [ 78.320196] attempt to access beyond end of device [ 78.320200] loop3: rw=536870912, want=262, limit=112 [ 78.320209] attempt to access beyond end of device [ 78.320213] loop3: rw=536870912, want=263, limit=112 [ 78.320222] attempt to access beyond end of device [ 78.320226] loop3: rw=536870912, want=264, limit=112 [ 78.320236] attempt to access beyond end of device [ 78.320240] loop3: rw=536870912, want=265, limit=112 [ 78.320448] attempt to access beyond end of device [ 78.320452] loop3: rw=536870912, want=689, limit=112 [ 78.431859] loop7: rw=536870912, want=247, limit=112 [ 78.436963] attempt to access beyond end of device [ 78.442234] loop7: rw=536870912, want=248, limit=112 [ 78.447341] attempt to access beyond end of device [ 78.452544] loop7: rw=536870912, want=249, limit=112 [ 78.457646] attempt to access beyond end of device [ 78.463441] loop7: rw=536870912, want=262, limit=112 [ 78.468542] attempt to access beyond end of device [ 78.473693] loop7: rw=536870912, want=263, limit=112 [ 78.478796] attempt to access beyond end of device [ 78.483998] loop7: rw=536870912, want=264, limit=112 [ 78.489103] attempt to access beyond end of device [ 78.494504] loop7: rw=536870912, want=265, limit=112 2018/04/30 20:09:03 executing program 2: r0 = socket(0x11, 0x800000003, 0x0) bind(r0, &(0x7f0000000180)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @broadcast=0xffffffff}}}, 0x0) 2018/04/30 20:09:03 executing program 6: r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket(0x2, 0x3, 0x40000000000000ff) dup3(r0, r1, 0x0) 2018/04/30 20:09:03 executing program 5: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = memfd_create(&(0x7f000000e000)='\x00 ', 0x0) r1 = syz_open_dev$sndseq(&(0x7f0000000180)='/dev/snd/seq\x00', 0x0, 0x101801) ioctl$SNDRV_SEQ_IOCTL_GET_PORT_INFO(r0, 0xc0a85322, &(0x7f00000001c0)) pselect6(0x40, &(0x7f0000000080)={0x40, 0x6, 0x200, 0x8, 0x4, 0x80, 0x0, 0x7}, &(0x7f0000000280)={0x5, 0x2, 0x0, 0x80000000, 0xf4, 0x1ff, 0x81, 0x7}, &(0x7f00000002c0)={0x53f0}, &(0x7f0000000300)={0x0, 0x1c9c380}, &(0x7f0000000480)={&(0x7f0000000440), 0x8}) r2 = dup2(r1, r0) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r2, 0xc08c5332, &(0x7f000002b000)={0x0, 0x0, 0x0, "9ede7a8c5ae95ec8672c93340f643a664f13eeab65c0322901dc6bd36cde2c51f01b7f0b014f9f91eeb7c37c7240f476c8d753d000aa8faf8fb574dbcfa6dc4d", 0x4}) getsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(r0, 0x84, 0xa, &(0x7f0000000580)={0x7, 0xfffffffffffffff7, 0x200, 0x1, 0x4, 0x0, 0x0, 0x4}, &(0x7f00000005c0)=0x20) write$sndseq(r0, &(0x7f0000000080), 0xffffff17) r3 = socket$netlink(0x10, 0x3, 0x0) getsockname$packet(0xffffffffffffff9c, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @link_local}, &(0x7f0000000200)=0x14) sendmmsg(r3, &(0x7f00000004c0)=[{{&(0x7f0000000240)=@ll={0x11, 0xf, r4, 0x1, 0x101, 0x6}, 0x80, &(0x7f0000000340)=[{&(0x7f00000002c0)="d043fe83922ff8bcd1e826069830af42bdea147623dc2808beabb3b9be63a423774b8ce080bef5b037dd1b6fabb5dc73e68d78358a20ab477f387973b3e2eed81d3e04aadb2e66a0ce372789b99794adab4d93f090", 0x55}], 0x1, 0x0, 0x0, 0x8000}, 0x8e5}], 0x1, 0x4) fcntl$setflags(r0, 0x2, 0x1) r5 = syz_open_procfs(0x0, &(0x7f0000000180)='net/igmp\x00') preadv(r5, &(0x7f0000000480)=[{&(0x7f0000000380)=""/242, 0xf2}], 0x1, 0x10400003) syz_open_dev$sg(&(0x7f0000000000)='/dev/sg#\x00', 0x3ff, 0x8202) 2018/04/30 20:09:03 executing program 7: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40000000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = getpid() ioprio_get$pid(0x3, r2) getsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(0xffffffffffffffff, 0x84, 0x18, &(0x7f00000000c0), &(0x7f0000000100)=0x3cb) r3 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000180)='/dev/loop-control\x00', 0x20200, 0x0) ioctl$LOOP_CTL_ADD(r3, 0x4c80, 0x0) tgkill(0x0, 0x0, 0x0) eventfd2(0x0, 0x1) fallocate(r1, 0x2, 0x2, 0x92d) r4 = ioctl$LOOP_CTL_GET_FREE(r3, 0x4c82) ioctl$LOOP_CTL_REMOVE(r3, 0x4c81, 0x0) preadv(r3, &(0x7f0000000280)=[{&(0x7f00000004c0)=""/249, 0xf9}], 0x1, 0x0) ioctl$sock_inet_SIOCRTMSG(r0, 0x890d, &(0x7f00000001c0)={0xffff, {0x2, 0x4e21, @multicast1=0xe0000001}, {0x2, 0x4e21, @local={0xac, 0x14, 0x14, 0xaa}}, {0x2, 0x4e24, @multicast2=0xe0000002}, 0x82, 0x80, 0x1ed7, 0x8001, 0x0, &(0x7f0000000140)='teql0\x00', 0x100, 0x5, 0x400}) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, r4) r5 = openat$selinux_status(0xffffffffffffff9c, &(0x7f00000002c0)='/selinux/status\x00', 0x0, 0x0) ioctl$EVIOCSFF(r5, 0x40304580, &(0x7f00000005c0)=ANY=[@ANYBLOB="54000104020007b25e02000000000040000000000000d0ea5e416da12cb64114781f278de13c54c30e9c6bb82498fd33d4673997a5c0281ca4b0c40387bae77ac9ced88ad100da4e7e7f084e53aef1dab44aab29e8df817b7b26969320a69910a220aedc5a000648a1a589c242d5a6cbf4daf3ca0000004f00bc6c0a03ab1cfe5007d6eb6a5df1f9bc74c422c958340446ef14bd7a838b60f2dc10844f45d6ca02801f7f8471620765729cb6a632285fe9276cc67091573658d996014633044af6f122d25f73056b"]) ioctl$KDGETLED(0xffffffffffffffff, 0x4b31, &(0x7f0000000300)) ioctl$PIO_UNIMAP(r5, 0x4b67, &(0x7f00000003c0)={0x40000000000002ad, &(0x7f0000000380)=[{0x80000003}, {0x1, 0x76}]}) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f0000000100)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000010000)="eb3c906d6b66732e66617400020401000200077008f8", 0x16}], 0x0, &(0x7f0000000240)=ANY=[]) open(&(0x7f00000000c0)='./file0/file0\x00', 0x3fffa, 0x0) r6 = open(&(0x7f00000003c0)='./file0/file0\x00', 0x4001, 0x0) fallocate(r6, 0x0, 0x0, 0x1fffff) 2018/04/30 20:09:03 executing program 4: setsockopt$inet_sctp_SCTP_RTOINFO(0xffffffffffffffff, 0x84, 0x0, &(0x7f0000001000)={0x10000, 0x4, 0x100}, 0x10) r0 = socket(0x20000000011, 0x4000000000080002, 0x0) setsockopt(r0, 0x107, 0x5, &(0x7f0000001000), 0x59) 2018/04/30 20:09:03 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40000000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = getpid() ioprio_get$pid(0x3, r2) getsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(0xffffffffffffffff, 0x84, 0x18, &(0x7f00000000c0), &(0x7f0000000100)=0x3cb) r3 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000180)='/dev/loop-control\x00', 0x20200, 0x0) ioctl$LOOP_CTL_ADD(r3, 0x4c80, 0x0) tgkill(0x0, 0x0, 0x0) eventfd2(0x0, 0x1) fallocate(r1, 0x2, 0x2, 0x92d) r4 = ioctl$LOOP_CTL_GET_FREE(r3, 0x4c82) ioctl$LOOP_CTL_REMOVE(r3, 0x4c81, 0x0) preadv(r3, &(0x7f0000000280)=[{&(0x7f00000004c0)=""/249, 0xf9}], 0x1, 0x0) ioctl$sock_inet_SIOCRTMSG(r0, 0x890d, &(0x7f00000001c0)={0xffff, {0x2, 0x4e21, @multicast1=0xe0000001}, {0x2, 0x4e21, @local={0xac, 0x14, 0x14, 0xaa}}, {0x2, 0x4e24, @multicast2=0xe0000002}, 0x82, 0x80, 0x1ed7, 0x8001, 0x0, &(0x7f0000000140)='teql0\x00', 0x100, 0x5, 0x400}) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, r4) r5 = openat$selinux_status(0xffffffffffffff9c, &(0x7f00000002c0)='/selinux/status\x00', 0x0, 0x0) ioctl$EVIOCSFF(r5, 0x40304580, &(0x7f00000005c0)=ANY=[@ANYBLOB="54000104020007b25e02000000000040000000000000d0ea5e416da12cb64114781f278de13c54c30e9c6bb82498fd33d4673997a5c0281ca4b0c40387bae77ac9ced88ad100da4e7e7f084e53aef1dab44aab29e8df817b7b26969320a69910a220aedc5a000648a1a589c242d5a6cbf4daf3ca0000004f00bc6c0a03ab1cfe5007d6eb6a5df1f9bc74c422c958340446ef14bd7a838b60f2dc10844f45d6ca02801f7f8471620765729cb6a632285fe9276cc67091573658d996014633044af6f122d25f73056b"]) ioctl$KDGETLED(0xffffffffffffffff, 0x4b31, &(0x7f0000000300)) ioctl$PIO_UNIMAP(r5, 0x4b67, &(0x7f00000003c0)={0x40000000000002ad, &(0x7f0000000380)=[{0x80000003}, {0x1, 0x76}]}) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f0000000100)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000010000)="eb3c906d6b66732e66617400020401000200077008f8", 0x16}], 0x0, &(0x7f0000000240)=ANY=[]) open(&(0x7f00000000c0)='./file0/file0\x00', 0x3fffa, 0x0) r6 = open(&(0x7f00000003c0)='./file0/file0\x00', 0x4001, 0x0) fallocate(r6, 0x0, 0x0, 0x1fffff) 2018/04/30 20:09:03 executing program 1: r0 = perf_event_open(&(0x7f000012bf88)={0x2, 0x78, 0x71}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f000002ef88)={0x1, 0x78}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000029000/0x3000)=nil, 0x3000, 0x0, 0x51, r1, 0x0) r2 = perf_event_open(&(0x7f0000271000)={0x2, 0x70, 0x0, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r0, 0x2405, r1) dup2(r2, r0) 2018/04/30 20:09:03 executing program 0: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pkey_free(0xffffffffffffffff) r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000700)='/dev/loop-control\x00', 0x0, 0x0) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f0000000100)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000480)="eb3c906d6b66732e66617400", 0xc}], 0x0, &(0x7f0000000240)=ANY=[]) close(0xffffffffffffffff) connect(0xffffffffffffffff, &(0x7f0000000600)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x2, 0x0, 0x0, {0xa, 0x4e23, 0x0, @ipv4={[], [0xff, 0xff]}}}}, 0x80) getsockopt$inet_sctp_SCTP_PR_ASSOC_STATUS(0xffffffffffffffff, 0x84, 0x73, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x80000000, 0x100}, &(0x7f0000000380)=0x18) r1 = socket$inet6(0xa, 0x3, 0x3c) connect$inet6(r1, &(0x7f0000039000)={0xa, 0x0, 0x0, @mcast2={0xff, 0x2, [], 0x1}, 0x9}, 0x1c) sendmsg(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f000002c000)=[{&(0x7f0000000000)=',', 0x1}], 0x1, &(0x7f0000000140)}, 0xc100) sendmsg(r1, &(0x7f0000000a40)={0x0, 0x0, &(0x7f00000009c0)=[{&(0x7f0000000240)="d09a0e63c9476288b671afdbd53a5994e137381f62021d1951b627b8dda57a5d17d744648c81c5703ed8146ab1b0171f89091b1dd3238d03dbb686df460963245dedf2013ee555af99499e44ad420dbf65fd46fbc99a1274429e2d5783751815828ec8cb3553110cca66460215353d19f6d8bbd8fb08ad0491634ac2fd10e2cd30bcd7fede24263a7fff16e53ea293f3551b7147c33a44ea437fb1515c3e8d4f162fdebf8ebe11ae6fcd9372c8d8f19556ae091fe94215ae9434da412f6fa4cb6561e5f78ff9707844ee5d573fb294437722d9a06dfa61748c32c73d759933a8dd344c947d3efdbe90d0eb049df5fbb0c19f6785264b619c530d97395d44b04f7e2a280d658c7871ad373b792678c49227999651ef3b2ee1bc2b8f3035db2d6e8e09aa3837233c8713065a8ad131d24f6c42a3220d0e07c3d3e95d9f44f059a5dd10c09716b5f874ecf53aadfa5050ff40f2c3c4a629b6445e5836100afff5a8977583653b40ca116f8f11416e5c1bd5499636ddae25fc49709f0309cf5c0bf8e432160c258d14223b3b0d009b09858645773dd97e68a9531072713cff077b2e73e03ed4f145e9199c126a7f235e5674a3c7f5c7129ac7c1a3319590249b6d34ef6c3d8b94c6fc7cdcbddb053243f33e7bc1f230d3bc7dfc4359e33992d0a3946b914a093287a76ac4a249b5b86cc75476466e409553355fefab75e9268a8751ffc9481fcff1f49c475699595b315e2147eebe8b7291600c6b1cf7c8f24d587b9464a67e5ccec17820e711b98f4f7d5053642068a3fff72b53e2622d6e8b4a4c815fb2ea90ef63e141209dd29254e5ab5bde9c6817b3cb184586049e7741b2d8b5b1a19e99e1834a25959155720c1c0efa4d9d3c42e1ba282847d476cef0228b1422aba08e5f3c1cd279bb20dcf3e90f80a4a8ac093de9f0d9c11a540aff2de27437787bbed317439cafb71e7f92b7e02cbadb076f04ba2cb8c96aeef53c74d9036c922b1b24a79228e833abc661b5630caa45389341cb8ddf277fd916141023fb53c0d155faf6fdfb593e22db25c4f8afdcd90d437672ebe975f4a5f445bbdd845505fcfea702a42d821d3dc11720de0009e83161e5a089d09184346606e126842de54e85e20aa5fac874367a8690d09d6e041378bd424eabe8248652c3f75a849ff89da7b6be87fb3fe6ff22693b0cece9e4d935f28bb7efd85afb1642a363d583eb01f48f25784f80002b163bd3da724b0391dac7c23f76b5c5c6319f7aab18a486d5607f68ce2f83d2a6a8a13f8ecdb845b8af96230f063019ff113698c720403bbf6202b2d5e6146f14a45afe6ed538fc1fa57518769bd3bfc11e743b4e56b01f17483a152abcca0bd84a1011bd703a494150176d17322cf10307d259999622b76ac6a86407c9ed281ae29b9b569b382d3f39fe4d07706c96c41a565437d9edb1cb532d900efe54f518044bba5fa5791c1797c569a3d6c21342d92f4b104a3d957cf85e617c46ac97b6785a455ce7765eb80a02de4dffde0207061e1afb61e777379b202707f0f49edcf21a186ea1f2e08ef1dc15ae3371280d89aabb3bd53408b4cb2a8e42f9f4d0bc11d766eb51940f5e92559b91954649f2786fb6683e19ca5f609c40e327876f5515aeefce0f390d3fd557aabcb091b04131f3edc1ed80a2d5a812786530a302ab54f7e1f3a6bca852722d1af85ceab2e6565733b31f76d795b1a603a780564b181ebadb0028c03d0c2c2831ce3a83369bf4ec61f802633e719040dac86c9c26e01bdad8a18d33cd91ed4dcdf6f1e1d93d3ecfc1a8b0993ec8e441321a107e0f8e14b4eb135041eab6278b1557d13780f1b4f520cf0d5948d86842ea547824bdcc37a5383b3e58918b0a6ddaa38f9358ba907629bec4ec41a3c685adca897d41b0a847b3b20100daa73d01dd2cca16cad83af5bbae0e0b107de49a9222aef89cc4a6efde35f381433151afea24aa88bb44be666a996bb45fd37e2936c3f2fdea1837e294419dfb965a097dc478083f54d6432d431ca3eaebcc4b0dc1180d09736e08d6b4f594dea6fb9791d3ab6dffd9aad25ad8c834c9683e8b9f19eef75ab77792be9de198a66a785c15c8222931a6ff2208b15dc36836f3d2f35ad049e59cdb21c94de061d192c24437e87b08fb6ade25d48a6fc59c396faaec5f048fb9021a79fe32c35a857f5238f9e68d187e53488a3359612bc7ddbe76e9381612e4418dfb663694f81579f54fa9558abe7c0d75adfd29297b72fa3cd223cbb52ecbe1674966df197adde781b2000970463e021b338002efb88a0649e93f1c0a6572fc9edddc0d9d16e1be86a49f9657054493881a70bad2f9d93b5ec8fae8fa0b0000000000000000", 0x691}], 0x1, &(0x7f0000003b40)}, 0x0) accept(0xffffffffffffffff, &(0x7f0000000200)=@can, &(0x7f0000000280)=0x80) pread64(r0, &(0x7f0000000180)=""/45, 0x2d, 0x0) symlink(&(0x7f00000003c0)='./file0\x00', &(0x7f0000000440)='./file1\x00') connect(0xffffffffffffffff, &(0x7f0000000680)=@ipx={0x4, 0x0, 0x1, "76b8b6894d74"}, 0x80) umount2(&(0x7f0000000080)='./file0\x00', 0x0) [ 78.500162] attempt to access beyond end of device [ 78.505081] loop7: rw=536870912, want=865, limit=112 [ 78.602840] FAT-fs (loop0): bogus number of reserved sectors [ 78.640492] FAT-fs (loop0): Can't find a valid FAT filesystem [ 78.703617] FAT-fs (loop3): Directory bread(block 112) failed [ 78.761237] FAT-fs (loop3): Directory bread(block 112) failed [ 78.776730] FAT-fs (loop0): Unrecognized mount option "КcÉGbˆ¶q¯ÛÕ:Y”á78bQ¶'¸Ý¥z]×DdŒÅp>Øj±°‰ Ó#Û¶†ßF c$€" or missing value [ 78.803028] FAT-fs (loop7): Directory bread(block 112) failed [ 78.803829] FAT-fs (loop3): Directory bread(block 112) failed [ 78.897171] FAT-fs (loop7): Directory bread(block 112) failed [ 78.932994] FAT-fs (loop7): Directory bread(block 112) failed [ 79.371149] attempt to access beyond end of device [ 79.376177] loop3: rw=536870912, want=246, limit=112 [ 79.386890] attempt to access beyond end of device [ 79.396318] loop3: rw=536870912, want=247, limit=112 [ 79.406602] attempt to access beyond end of device [ 79.412288] loop3: rw=536870912, want=248, limit=112 [ 79.417403] attempt to access beyond end of device [ 79.427116] loop3: rw=536870912, want=249, limit=112 [ 79.432499] attempt to access beyond end of device [ 79.437418] loop3: rw=536870912, want=262, limit=112 [ 79.442879] attempt to access beyond end of device [ 79.447801] loop3: rw=536870912, want=263, limit=112 [ 79.453152] attempt to access beyond end of device [ 79.458071] loop3: rw=536870912, want=264, limit=112 [ 79.463493] attempt to access beyond end of device [ 79.463500] loop7: rw=536870912, want=246, limit=112 [ 79.463513] attempt to access beyond end of device [ 79.463518] loop7: rw=536870912, want=247, limit=112 [ 79.463528] attempt to access beyond end of device [ 79.463533] loop7: rw=536870912, want=248, limit=112 [ 79.463560] attempt to access beyond end of device [ 79.463565] loop7: rw=536870912, want=249, limit=112 [ 79.463575] attempt to access beyond end of device 2018/04/30 20:09:04 executing program 2: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pkey_free(0xffffffffffffffff) r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000700)='/dev/loop-control\x00', 0x0, 0x0) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f0000000100)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000480)="eb3c906d6b66732e66617400", 0xc}], 0x0, &(0x7f0000000240)=ANY=[]) close(0xffffffffffffffff) connect(0xffffffffffffffff, &(0x7f0000000600)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x2, 0x0, 0x0, {0xa, 0x4e23, 0x0, @ipv4={[], [0xff, 0xff]}}}}, 0x80) getsockopt$inet_sctp_SCTP_PR_ASSOC_STATUS(0xffffffffffffffff, 0x84, 0x73, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x80000000, 0x100}, &(0x7f0000000380)=0x18) r1 = socket$inet6(0xa, 0x3, 0x3c) connect$inet6(r1, &(0x7f0000039000)={0xa, 0x0, 0x0, @mcast2={0xff, 0x2, [], 0x1}, 0x9}, 0x1c) sendmsg(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f000002c000)=[{&(0x7f0000000000)=',', 0x1}], 0x1, &(0x7f0000000140)}, 0xc100) sendmsg(r1, &(0x7f0000000a40)={0x0, 0x0, &(0x7f00000009c0)=[{&(0x7f0000000240)="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", 0x691}], 0x1, &(0x7f0000003b40)}, 0x0) accept(0xffffffffffffffff, &(0x7f0000000200)=@can, &(0x7f0000000280)=0x80) pread64(r0, &(0x7f0000000180)=""/45, 0x2d, 0x0) symlink(&(0x7f00000003c0)='./file0\x00', &(0x7f0000000440)='./file1\x00') connect(0xffffffffffffffff, &(0x7f0000000680)=@ipx={0x4, 0x0, 0x1, "76b8b6894d74"}, 0x80) umount2(&(0x7f0000000080)='./file0\x00', 0x0) 2018/04/30 20:09:04 executing program 6: openat$ion(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ion\x00', 0x0, 0x0) 2018/04/30 20:09:04 executing program 4: r0 = socket$inet(0x2, 0x200000000000003, 0x1) sendto$inet(r0, &(0x7f0000000240)="126bac8816d7d700", 0x8, 0x0, &(0x7f0000000200)={0x2, 0x0, @remote={0xac, 0x14, 0x14, 0xbb}}, 0x10) 2018/04/30 20:09:04 executing program 1: r0 = perf_event_open(&(0x7f000012bf88)={0x2, 0x78, 0x71}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f000002ef88)={0x1, 0x78}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000029000/0x3000)=nil, 0x3000, 0x0, 0x51, r1, 0x0) r2 = perf_event_open(&(0x7f0000271000)={0x2, 0x70, 0x0, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r0, 0x2405, r1) dup2(r2, r0) 2018/04/30 20:09:04 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40000000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = getpid() ioprio_get$pid(0x3, r2) getsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(0xffffffffffffffff, 0x84, 0x18, &(0x7f00000000c0), &(0x7f0000000100)=0x3cb) r3 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000180)='/dev/loop-control\x00', 0x20200, 0x0) ioctl$LOOP_CTL_ADD(r3, 0x4c80, 0x0) tgkill(0x0, 0x0, 0x0) eventfd2(0x0, 0x1) fallocate(r1, 0x2, 0x2, 0x92d) r4 = ioctl$LOOP_CTL_GET_FREE(r3, 0x4c82) ioctl$LOOP_CTL_REMOVE(r3, 0x4c81, 0x0) preadv(r3, &(0x7f0000000280)=[{&(0x7f00000004c0)=""/249, 0xf9}], 0x1, 0x0) ioctl$sock_inet_SIOCRTMSG(r0, 0x890d, &(0x7f00000001c0)={0xffff, {0x2, 0x4e21, @multicast1=0xe0000001}, {0x2, 0x4e21, @local={0xac, 0x14, 0x14, 0xaa}}, {0x2, 0x4e24, @multicast2=0xe0000002}, 0x82, 0x80, 0x1ed7, 0x8001, 0x0, &(0x7f0000000140)='teql0\x00', 0x100, 0x5, 0x400}) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, r4) r5 = openat$selinux_status(0xffffffffffffff9c, &(0x7f00000002c0)='/selinux/status\x00', 0x0, 0x0) ioctl$EVIOCSFF(r5, 0x40304580, &(0x7f00000005c0)=ANY=[@ANYBLOB="54000104020007b25e02000000000040000000000000d0ea5e416da12cb64114781f278de13c54c30e9c6bb82498fd33d4673997a5c0281ca4b0c40387bae77ac9ced88ad100da4e7e7f084e53aef1dab44aab29e8df817b7b26969320a69910a220aedc5a000648a1a589c242d5a6cbf4daf3ca0000004f00bc6c0a03ab1cfe5007d6eb6a5df1f9bc74c422c958340446ef14bd7a838b60f2dc10844f45d6ca02801f7f8471620765729cb6a632285fe9276cc67091573658d996014633044af6f122d25f73056b"]) ioctl$KDGETLED(0xffffffffffffffff, 0x4b31, &(0x7f0000000300)) ioctl$PIO_UNIMAP(r5, 0x4b67, &(0x7f00000003c0)={0x40000000000002ad, &(0x7f0000000380)=[{0x80000003}, {0x1, 0x76}]}) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f0000000100)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000010000)="eb3c906d6b66732e66617400020401000200077008f8", 0x16}], 0x0, &(0x7f0000000240)=ANY=[]) open(&(0x7f00000000c0)='./file0/file0\x00', 0x3fffa, 0x0) r6 = open(&(0x7f00000003c0)='./file0/file0\x00', 0x4001, 0x0) fallocate(r6, 0x0, 0x0, 0x1fffff) 2018/04/30 20:09:04 executing program 0: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pkey_free(0xffffffffffffffff) r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000700)='/dev/loop-control\x00', 0x0, 0x0) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f0000000100)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000480)="eb3c906d6b66732e66617400", 0xc}], 0x0, &(0x7f0000000240)=ANY=[]) close(0xffffffffffffffff) connect(0xffffffffffffffff, &(0x7f0000000600)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x2, 0x0, 0x0, {0xa, 0x4e23, 0x0, @ipv4={[], [0xff, 0xff]}}}}, 0x80) getsockopt$inet_sctp_SCTP_PR_ASSOC_STATUS(0xffffffffffffffff, 0x84, 0x73, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x80000000, 0x100}, &(0x7f0000000380)=0x18) r1 = socket$inet6(0xa, 0x3, 0x3c) connect$inet6(r1, &(0x7f0000039000)={0xa, 0x0, 0x0, @mcast2={0xff, 0x2, [], 0x1}, 0x9}, 0x1c) sendmsg(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f000002c000)=[{&(0x7f0000000000)=',', 0x1}], 0x1, &(0x7f0000000140)}, 0xc100) sendmsg(r1, &(0x7f0000000a40)={0x0, 0x0, &(0x7f00000009c0)=[{&(0x7f0000000240)="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", 0x691}], 0x1, &(0x7f0000003b40)}, 0x0) accept(0xffffffffffffffff, &(0x7f0000000200)=@can, &(0x7f0000000280)=0x80) pread64(r0, &(0x7f0000000180)=""/45, 0x2d, 0x0) symlink(&(0x7f00000003c0)='./file0\x00', &(0x7f0000000440)='./file1\x00') connect(0xffffffffffffffff, &(0x7f0000000680)=@ipx={0x4, 0x0, 0x1, "76b8b6894d74"}, 0x80) umount2(&(0x7f0000000080)='./file0\x00', 0x0) 2018/04/30 20:09:04 executing program 5: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = memfd_create(&(0x7f000000e000)='\x00 ', 0x0) r1 = syz_open_dev$sndseq(&(0x7f0000000180)='/dev/snd/seq\x00', 0x0, 0x101801) ioctl$SNDRV_SEQ_IOCTL_GET_PORT_INFO(r0, 0xc0a85322, &(0x7f00000001c0)) pselect6(0x40, &(0x7f0000000080)={0x40, 0x6, 0x200, 0x8, 0x4, 0x80, 0x0, 0x7}, &(0x7f0000000280)={0x5, 0x2, 0x0, 0x80000000, 0xf4, 0x1ff, 0x81, 0x7}, &(0x7f00000002c0)={0x53f0}, &(0x7f0000000300)={0x0, 0x1c9c380}, &(0x7f0000000480)={&(0x7f0000000440), 0x8}) r2 = dup2(r1, r0) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r2, 0xc08c5332, &(0x7f000002b000)={0x0, 0x0, 0x0, "9ede7a8c5ae95ec8672c93340f643a664f13eeab65c0322901dc6bd36cde2c51f01b7f0b014f9f91eeb7c37c7240f476c8d753d000aa8faf8fb574dbcfa6dc4d", 0x4}) getsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(r0, 0x84, 0xa, &(0x7f0000000580)={0x7, 0xfffffffffffffff7, 0x200, 0x1, 0x4, 0x0, 0x0, 0x4}, &(0x7f00000005c0)=0x20) write$sndseq(r0, &(0x7f0000000080), 0xffffff17) r3 = socket$netlink(0x10, 0x3, 0x0) getsockname$packet(0xffffffffffffff9c, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @link_local}, &(0x7f0000000200)=0x14) sendmmsg(r3, &(0x7f00000004c0)=[{{&(0x7f0000000240)=@ll={0x11, 0xf, r4, 0x1, 0x101, 0x6}, 0x80, &(0x7f0000000340)=[{&(0x7f00000002c0)="d043fe83922ff8bcd1e826069830af42bdea147623dc2808beabb3b9be63a423774b8ce080bef5b037dd1b6fabb5dc73e68d78358a20ab477f387973b3e2eed81d3e04aadb2e66a0ce372789b99794adab4d93f090", 0x55}], 0x1, 0x0, 0x0, 0x8000}, 0x8e5}], 0x1, 0x4) fcntl$setflags(r0, 0x2, 0x1) r5 = syz_open_procfs(0x0, &(0x7f0000000180)='net/igmp\x00') preadv(r5, &(0x7f0000000480)=[{&(0x7f0000000380)=""/242, 0xf2}], 0x1, 0x10400003) syz_open_dev$sg(&(0x7f0000000000)='/dev/sg#\x00', 0x3ff, 0x8202) 2018/04/30 20:09:04 executing program 7: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40000000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = getpid() ioprio_get$pid(0x3, r2) getsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(0xffffffffffffffff, 0x84, 0x18, &(0x7f00000000c0), &(0x7f0000000100)=0x3cb) r3 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000180)='/dev/loop-control\x00', 0x20200, 0x0) ioctl$LOOP_CTL_ADD(r3, 0x4c80, 0x0) tgkill(0x0, 0x0, 0x0) eventfd2(0x0, 0x1) fallocate(r1, 0x2, 0x2, 0x92d) r4 = ioctl$LOOP_CTL_GET_FREE(r3, 0x4c82) ioctl$LOOP_CTL_REMOVE(r3, 0x4c81, 0x0) preadv(r3, &(0x7f0000000280)=[{&(0x7f00000004c0)=""/249, 0xf9}], 0x1, 0x0) ioctl$sock_inet_SIOCRTMSG(r0, 0x890d, &(0x7f00000001c0)={0xffff, {0x2, 0x4e21, @multicast1=0xe0000001}, {0x2, 0x4e21, @local={0xac, 0x14, 0x14, 0xaa}}, {0x2, 0x4e24, @multicast2=0xe0000002}, 0x82, 0x80, 0x1ed7, 0x8001, 0x0, &(0x7f0000000140)='teql0\x00', 0x100, 0x5, 0x400}) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, r4) r5 = openat$selinux_status(0xffffffffffffff9c, &(0x7f00000002c0)='/selinux/status\x00', 0x0, 0x0) ioctl$EVIOCSFF(r5, 0x40304580, &(0x7f00000005c0)=ANY=[@ANYBLOB="54000104020007b25e02000000000040000000000000d0ea5e416da12cb64114781f278de13c54c30e9c6bb82498fd33d4673997a5c0281ca4b0c40387bae77ac9ced88ad100da4e7e7f084e53aef1dab44aab29e8df817b7b26969320a69910a220aedc5a000648a1a589c242d5a6cbf4daf3ca0000004f00bc6c0a03ab1cfe5007d6eb6a5df1f9bc74c422c958340446ef14bd7a838b60f2dc10844f45d6ca02801f7f8471620765729cb6a632285fe9276cc67091573658d996014633044af6f122d25f73056b"]) ioctl$KDGETLED(0xffffffffffffffff, 0x4b31, &(0x7f0000000300)) ioctl$PIO_UNIMAP(r5, 0x4b67, &(0x7f00000003c0)={0x40000000000002ad, &(0x7f0000000380)=[{0x80000003}, {0x1, 0x76}]}) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f0000000100)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000010000)="eb3c906d6b66732e66617400020401000200077008f8", 0x16}], 0x0, &(0x7f0000000240)=ANY=[]) open(&(0x7f00000000c0)='./file0/file0\x00', 0x3fffa, 0x0) r6 = open(&(0x7f00000003c0)='./file0/file0\x00', 0x4001, 0x0) fallocate(r6, 0x0, 0x0, 0x1fffff) [ 79.463579] loop7: rw=536870912, want=262, limit=112 [ 79.463588] attempt to access beyond end of device [ 79.463592] loop7: rw=536870912, want=263, limit=112 [ 79.463602] attempt to access beyond end of device [ 79.463606] loop7: rw=536870912, want=264, limit=112 [ 79.463616] attempt to access beyond end of device [ 79.463620] loop7: rw=536870912, want=265, limit=112 [ 79.464412] attempt to access beyond end of device 2018/04/30 20:09:04 executing program 4: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pkey_free(0xffffffffffffffff) r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000700)='/dev/loop-control\x00', 0x0, 0x0) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f0000000100)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000480)="eb3c906d6b66732e66617400", 0xc}], 0x0, &(0x7f0000000240)=ANY=[]) close(0xffffffffffffffff) connect(0xffffffffffffffff, &(0x7f0000000600)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x2, 0x0, 0x0, {0xa, 0x4e23, 0x0, @ipv4={[], [0xff, 0xff]}}}}, 0x80) getsockopt$inet_sctp_SCTP_PR_ASSOC_STATUS(0xffffffffffffffff, 0x84, 0x73, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x80000000, 0x100}, &(0x7f0000000380)=0x18) r1 = socket$inet6(0xa, 0x3, 0x3c) connect$inet6(r1, &(0x7f0000039000)={0xa, 0x0, 0x0, @mcast2={0xff, 0x2, [], 0x1}, 0x9}, 0x1c) sendmsg(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f000002c000)=[{&(0x7f0000000000)=',', 0x1}], 0x1, &(0x7f0000000140)}, 0xc100) sendmsg(r1, &(0x7f0000000a40)={0x0, 0x0, &(0x7f00000009c0)=[{&(0x7f0000000240)="d09a0e63c9476288b671afdbd53a5994e137381f62021d1951b627b8dda57a5d17d744648c81c5703ed8146ab1b0171f89091b1dd3238d03dbb686df460963245dedf2013ee555af99499e44ad420dbf65fd46fbc99a1274429e2d5783751815828ec8cb3553110cca66460215353d19f6d8bbd8fb08ad0491634ac2fd10e2cd30bcd7fede24263a7fff16e53ea293f3551b7147c33a44ea437fb1515c3e8d4f162fdebf8ebe11ae6fcd9372c8d8f19556ae091fe94215ae9434da412f6fa4cb6561e5f78ff9707844ee5d573fb294437722d9a06dfa61748c32c73d759933a8dd344c947d3efdbe90d0eb049df5fbb0c19f6785264b619c530d97395d44b04f7e2a280d658c7871ad373b792678c49227999651ef3b2ee1bc2b8f3035db2d6e8e09aa3837233c8713065a8ad131d24f6c42a3220d0e07c3d3e95d9f44f059a5dd10c09716b5f874ecf53aadfa5050ff40f2c3c4a629b6445e5836100afff5a8977583653b40ca116f8f11416e5c1bd5499636ddae25fc49709f0309cf5c0bf8e432160c258d14223b3b0d009b09858645773dd97e68a9531072713cff077b2e73e03ed4f145e9199c126a7f235e5674a3c7f5c7129ac7c1a3319590249b6d34ef6c3d8b94c6fc7cdcbddb053243f33e7bc1f230d3bc7dfc4359e33992d0a3946b914a093287a76ac4a249b5b86cc75476466e409553355fefab75e9268a8751ffc9481fcff1f49c475699595b315e2147eebe8b7291600c6b1cf7c8f24d587b9464a67e5ccec17820e711b98f4f7d5053642068a3fff72b53e2622d6e8b4a4c815fb2ea90ef63e141209dd29254e5ab5bde9c6817b3cb184586049e7741b2d8b5b1a19e99e1834a25959155720c1c0efa4d9d3c42e1ba282847d476cef0228b1422aba08e5f3c1cd279bb20dcf3e90f80a4a8ac093de9f0d9c11a540aff2de27437787bbed317439cafb71e7f92b7e02cbadb076f04ba2cb8c96aeef53c74d9036c922b1b24a79228e833abc661b5630caa45389341cb8ddf277fd916141023fb53c0d155faf6fdfb593e22db25c4f8afdcd90d437672ebe975f4a5f445bbdd845505fcfea702a42d821d3dc11720de0009e83161e5a089d09184346606e126842de54e85e20aa5fac874367a8690d09d6e041378bd424eabe8248652c3f75a849ff89da7b6be87fb3fe6ff22693b0cece9e4d935f28bb7efd85afb1642a363d583eb01f48f25784f80002b163bd3da724b0391dac7c23f76b5c5c6319f7aab18a486d5607f68ce2f83d2a6a8a13f8ecdb845b8af96230f063019ff113698c720403bbf6202b2d5e6146f14a45afe6ed538fc1fa57518769bd3bfc11e743b4e56b01f17483a152abcca0bd84a1011bd703a494150176d17322cf10307d259999622b76ac6a86407c9ed281ae29b9b569b382d3f39fe4d07706c96c41a565437d9edb1cb532d900efe54f518044bba5fa5791c1797c569a3d6c21342d92f4b104a3d957cf85e617c46ac97b6785a455ce7765eb80a02de4dffde0207061e1afb61e777379b202707f0f49edcf21a186ea1f2e08ef1dc15ae3371280d89aabb3bd53408b4cb2a8e42f9f4d0bc11d766eb51940f5e92559b91954649f2786fb6683e19ca5f609c40e327876f5515aeefce0f390d3fd557aabcb091b04131f3edc1ed80a2d5a812786530a302ab54f7e1f3a6bca852722d1af85ceab2e6565733b31f76d795b1a603a780564b181ebadb0028c03d0c2c2831ce3a83369bf4ec61f802633e719040dac86c9c26e01bdad8a18d33cd91ed4dcdf6f1e1d93d3ecfc1a8b0993ec8e441321a107e0f8e14b4eb135041eab6278b1557d13780f1b4f520cf0d5948d86842ea547824bdcc37a5383b3e58918b0a6ddaa38f9358ba907629bec4ec41a3c685adca897d41b0a847b3b20100daa73d01dd2cca16cad83af5bbae0e0b107de49a9222aef89cc4a6efde35f381433151afea24aa88bb44be666a996bb45fd37e2936c3f2fdea1837e294419dfb965a097dc478083f54d6432d431ca3eaebcc4b0dc1180d09736e08d6b4f594dea6fb9791d3ab6dffd9aad25ad8c834c9683e8b9f19eef75ab77792be9de198a66a785c15c8222931a6ff2208b15dc36836f3d2f35ad049e59cdb21c94de061d192c24437e87b08fb6ade25d48a6fc59c396faaec5f048fb9021a79fe32c35a857f5238f9e68d187e53488a3359612bc7ddbe76e9381612e4418dfb663694f81579f54fa9558abe7c0d75adfd29297b72fa3cd223cbb52ecbe1674966df197adde781b2000970463e021b338002efb88a0649e93f1c0a6572fc9edddc0d9d16e1be86a49f9657054493881a70bad2f9d93b5ec8fae8fa0b0000000000000000", 0x691}], 0x1, &(0x7f0000003b40)}, 0x0) accept(0xffffffffffffffff, &(0x7f0000000200)=@can, &(0x7f0000000280)=0x80) pread64(r0, &(0x7f0000000180)=""/45, 0x2d, 0x0) symlink(&(0x7f00000003c0)='./file0\x00', &(0x7f0000000440)='./file1\x00') connect(0xffffffffffffffff, &(0x7f0000000680)=@ipx={0x4, 0x0, 0x1, "76b8b6894d74"}, 0x80) umount2(&(0x7f0000000080)='./file0\x00', 0x0) 2018/04/30 20:09:04 executing program 6: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pkey_free(0xffffffffffffffff) r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000700)='/dev/loop-control\x00', 0x0, 0x0) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f0000000100)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000480)="eb3c906d6b66732e66617400", 0xc}], 0x0, &(0x7f0000000240)=ANY=[]) close(0xffffffffffffffff) connect(0xffffffffffffffff, &(0x7f0000000600)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x2, 0x0, 0x0, {0xa, 0x4e23, 0x0, @ipv4={[], [0xff, 0xff]}}}}, 0x80) getsockopt$inet_sctp_SCTP_PR_ASSOC_STATUS(0xffffffffffffffff, 0x84, 0x73, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x80000000, 0x100}, &(0x7f0000000380)=0x18) r1 = socket$inet6(0xa, 0x3, 0x3c) connect$inet6(r1, &(0x7f0000039000)={0xa, 0x0, 0x0, @mcast2={0xff, 0x2, [], 0x1}, 0x9}, 0x1c) sendmsg(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f000002c000)=[{&(0x7f0000000000)=',', 0x1}], 0x1, &(0x7f0000000140)}, 0xc100) sendmsg(r1, &(0x7f0000000a40)={0x0, 0x0, &(0x7f00000009c0)=[{&(0x7f0000000240)="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", 0x691}], 0x1, &(0x7f0000003b40)}, 0x0) accept(0xffffffffffffffff, &(0x7f0000000200)=@can, &(0x7f0000000280)=0x80) pread64(r0, &(0x7f0000000180)=""/45, 0x2d, 0x0) symlink(&(0x7f00000003c0)='./file0\x00', &(0x7f0000000440)='./file1\x00') connect(0xffffffffffffffff, &(0x7f0000000680)=@ipx={0x4, 0x0, 0x1, "76b8b6894d74"}, 0x80) umount2(&(0x7f0000000080)='./file0\x00', 0x0) 2018/04/30 20:09:04 executing program 1: r0 = perf_event_open(&(0x7f000012bf88)={0x2, 0x78, 0x71}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f000002ef88)={0x1, 0x78}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000029000/0x3000)=nil, 0x3000, 0x0, 0x51, r1, 0x0) r2 = perf_event_open(&(0x7f0000271000)={0x2, 0x70, 0x0, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r0, 0x2405, r1) dup2(r2, r0) [ 79.464417] loop7: rw=536870912, want=2017, limit=112 [ 79.584394] attempt to access beyond end of device [ 79.595999] loop3: rw=536870912, want=265, limit=112 [ 79.604008] attempt to access beyond end of device [ 79.609047] loop3: rw=536870912, want=2153, limit=112 2018/04/30 20:09:04 executing program 0: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pkey_free(0xffffffffffffffff) r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000700)='/dev/loop-control\x00', 0x0, 0x0) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f0000000100)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000480)="eb3c906d6b66732e66617400", 0xc}], 0x0, &(0x7f0000000240)=ANY=[]) close(0xffffffffffffffff) connect(0xffffffffffffffff, &(0x7f0000000600)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x2, 0x0, 0x0, {0xa, 0x4e23, 0x0, @ipv4={[], [0xff, 0xff]}}}}, 0x80) getsockopt$inet_sctp_SCTP_PR_ASSOC_STATUS(0xffffffffffffffff, 0x84, 0x73, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x80000000, 0x100}, &(0x7f0000000380)=0x18) r1 = socket$inet6(0xa, 0x3, 0x3c) connect$inet6(r1, &(0x7f0000039000)={0xa, 0x0, 0x0, @mcast2={0xff, 0x2, [], 0x1}, 0x9}, 0x1c) sendmsg(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f000002c000)=[{&(0x7f0000000000)=',', 0x1}], 0x1, &(0x7f0000000140)}, 0xc100) sendmsg(r1, &(0x7f0000000a40)={0x0, 0x0, &(0x7f00000009c0)=[{&(0x7f0000000240)="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", 0x691}], 0x1, &(0x7f0000003b40)}, 0x0) accept(0xffffffffffffffff, &(0x7f0000000200)=@can, &(0x7f0000000280)=0x80) pread64(r0, &(0x7f0000000180)=""/45, 0x2d, 0x0) symlink(&(0x7f00000003c0)='./file0\x00', &(0x7f0000000440)='./file1\x00') connect(0xffffffffffffffff, &(0x7f0000000680)=@ipx={0x4, 0x0, 0x1, "76b8b6894d74"}, 0x80) umount2(&(0x7f0000000080)='./file0\x00', 0x0) 2018/04/30 20:09:04 executing program 1: r0 = perf_event_open(&(0x7f000012bf88)={0x2, 0x78, 0x71}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f000002ef88)={0x1, 0x78}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000029000/0x3000)=nil, 0x3000, 0x0, 0x51, r1, 0x0) r2 = perf_event_open(&(0x7f0000271000)={0x2, 0x70, 0x0, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r0, 0x2405, r1) dup2(r2, r0) [ 79.728385] FAT-fs (loop2): bogus number of reserved sectors [ 79.749484] FAT-fs (loop2): Can't find a valid FAT filesystem [ 79.817326] FAT-fs (loop4): bogus number of reserved sectors [ 79.851500] FAT-fs (loop4): Can't find a valid FAT filesystem 2018/04/30 20:09:04 executing program 1: r0 = socket(0x11, 0x4000000000080003, 0x0) setsockopt$packet_int(r0, 0x107, 0xe, &(0x7f0000000400), 0x4) [ 79.897795] FAT-fs (loop6): bogus number of reserved sectors [ 79.932331] FAT-fs (loop6): Can't find a valid FAT filesystem [ 79.952416] FAT-fs (loop7): Directory bread(block 112) failed 2018/04/30 20:09:04 executing program 1: rt_sigpending(&(0x7f0000000000), 0x8) [ 80.048672] FAT-fs (loop7): Directory bread(block 112) failed 2018/04/30 20:09:05 executing program 0: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pkey_free(0xffffffffffffffff) r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000700)='/dev/loop-control\x00', 0x0, 0x0) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f0000000100)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000480)="eb3c906d6b66732e66617400", 0xc}], 0x0, &(0x7f0000000240)=ANY=[]) close(0xffffffffffffffff) connect(0xffffffffffffffff, &(0x7f0000000600)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x2, 0x0, 0x0, {0xa, 0x4e23, 0x0, @ipv4={[], [0xff, 0xff]}}}}, 0x80) getsockopt$inet_sctp_SCTP_PR_ASSOC_STATUS(0xffffffffffffffff, 0x84, 0x73, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x80000000, 0x100}, &(0x7f0000000380)=0x18) r1 = socket$inet6(0xa, 0x3, 0x3c) connect$inet6(r1, &(0x7f0000039000)={0xa, 0x0, 0x0, @mcast2={0xff, 0x2, [], 0x1}, 0x9}, 0x1c) sendmsg(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f000002c000)=[{&(0x7f0000000000)=',', 0x1}], 0x1, &(0x7f0000000140)}, 0xc100) sendmsg(r1, &(0x7f0000000a40)={0x0, 0x0, &(0x7f00000009c0)=[{&(0x7f0000000240)="d09a0e63c9476288b671afdbd53a5994e137381f62021d1951b627b8dda57a5d17d744648c81c5703ed8146ab1b0171f89091b1dd3238d03dbb686df460963245dedf2013ee555af99499e44ad420dbf65fd46fbc99a1274429e2d5783751815828ec8cb3553110cca66460215353d19f6d8bbd8fb08ad0491634ac2fd10e2cd30bcd7fede24263a7fff16e53ea293f3551b7147c33a44ea437fb1515c3e8d4f162fdebf8ebe11ae6fcd9372c8d8f19556ae091fe94215ae9434da412f6fa4cb6561e5f78ff9707844ee5d573fb294437722d9a06dfa61748c32c73d759933a8dd344c947d3efdbe90d0eb049df5fbb0c19f6785264b619c530d97395d44b04f7e2a280d658c7871ad373b792678c49227999651ef3b2ee1bc2b8f3035db2d6e8e09aa3837233c8713065a8ad131d24f6c42a3220d0e07c3d3e95d9f44f059a5dd10c09716b5f874ecf53aadfa5050ff40f2c3c4a629b6445e5836100afff5a8977583653b40ca116f8f11416e5c1bd5499636ddae25fc49709f0309cf5c0bf8e432160c258d14223b3b0d009b09858645773dd97e68a9531072713cff077b2e73e03ed4f145e9199c126a7f235e5674a3c7f5c7129ac7c1a3319590249b6d34ef6c3d8b94c6fc7cdcbddb053243f33e7bc1f230d3bc7dfc4359e33992d0a3946b914a093287a76ac4a249b5b86cc75476466e409553355fefab75e9268a8751ffc9481fcff1f49c475699595b315e2147eebe8b7291600c6b1cf7c8f24d587b9464a67e5ccec17820e711b98f4f7d5053642068a3fff72b53e2622d6e8b4a4c815fb2ea90ef63e141209dd29254e5ab5bde9c6817b3cb184586049e7741b2d8b5b1a19e99e1834a25959155720c1c0efa4d9d3c42e1ba282847d476cef0228b1422aba08e5f3c1cd279bb20dcf3e90f80a4a8ac093de9f0d9c11a540aff2de27437787bbed317439cafb71e7f92b7e02cbadb076f04ba2cb8c96aeef53c74d9036c922b1b24a79228e833abc661b5630caa45389341cb8ddf277fd916141023fb53c0d155faf6fdfb593e22db25c4f8afdcd90d437672ebe975f4a5f445bbdd845505fcfea702a42d821d3dc11720de0009e83161e5a089d09184346606e126842de54e85e20aa5fac874367a8690d09d6e041378bd424eabe8248652c3f75a849ff89da7b6be87fb3fe6ff22693b0cece9e4d935f28bb7efd85afb1642a363d583eb01f48f25784f80002b163bd3da724b0391dac7c23f76b5c5c6319f7aab18a486d5607f68ce2f83d2a6a8a13f8ecdb845b8af96230f063019ff113698c720403bbf6202b2d5e6146f14a45afe6ed538fc1fa57518769bd3bfc11e743b4e56b01f17483a152abcca0bd84a1011bd703a494150176d17322cf10307d259999622b76ac6a86407c9ed281ae29b9b569b382d3f39fe4d07706c96c41a565437d9edb1cb532d900efe54f518044bba5fa5791c1797c569a3d6c21342d92f4b104a3d957cf85e617c46ac97b6785a455ce7765eb80a02de4dffde0207061e1afb61e777379b202707f0f49edcf21a186ea1f2e08ef1dc15ae3371280d89aabb3bd53408b4cb2a8e42f9f4d0bc11d766eb51940f5e92559b91954649f2786fb6683e19ca5f609c40e327876f5515aeefce0f390d3fd557aabcb091b04131f3edc1ed80a2d5a812786530a302ab54f7e1f3a6bca852722d1af85ceab2e6565733b31f76d795b1a603a780564b181ebadb0028c03d0c2c2831ce3a83369bf4ec61f802633e719040dac86c9c26e01bdad8a18d33cd91ed4dcdf6f1e1d93d3ecfc1a8b0993ec8e441321a107e0f8e14b4eb135041eab6278b1557d13780f1b4f520cf0d5948d86842ea547824bdcc37a5383b3e58918b0a6ddaa38f9358ba907629bec4ec41a3c685adca897d41b0a847b3b20100daa73d01dd2cca16cad83af5bbae0e0b107de49a9222aef89cc4a6efde35f381433151afea24aa88bb44be666a996bb45fd37e2936c3f2fdea1837e294419dfb965a097dc478083f54d6432d431ca3eaebcc4b0dc1180d09736e08d6b4f594dea6fb9791d3ab6dffd9aad25ad8c834c9683e8b9f19eef75ab77792be9de198a66a785c15c8222931a6ff2208b15dc36836f3d2f35ad049e59cdb21c94de061d192c24437e87b08fb6ade25d48a6fc59c396faaec5f048fb9021a79fe32c35a857f5238f9e68d187e53488a3359612bc7ddbe76e9381612e4418dfb663694f81579f54fa9558abe7c0d75adfd29297b72fa3cd223cbb52ecbe1674966df197adde781b2000970463e021b338002efb88a0649e93f1c0a6572fc9edddc0d9d16e1be86a49f9657054493881a70bad2f9d93b5ec8fae8fa0b0000000000000000", 0x691}], 0x1, &(0x7f0000003b40)}, 0x0) accept(0xffffffffffffffff, &(0x7f0000000200)=@can, &(0x7f0000000280)=0x80) pread64(r0, &(0x7f0000000180)=""/45, 0x2d, 0x0) symlink(&(0x7f00000003c0)='./file0\x00', &(0x7f0000000440)='./file1\x00') connect(0xffffffffffffffff, &(0x7f0000000680)=@ipx={0x4, 0x0, 0x1, "76b8b6894d74"}, 0x80) umount2(&(0x7f0000000080)='./file0\x00', 0x0) 2018/04/30 20:09:05 executing program 2: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pkey_free(0xffffffffffffffff) r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000700)='/dev/loop-control\x00', 0x0, 0x0) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f0000000100)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000480)="eb3c906d6b66732e66617400", 0xc}], 0x0, &(0x7f0000000240)=ANY=[]) close(0xffffffffffffffff) connect(0xffffffffffffffff, &(0x7f0000000600)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x2, 0x0, 0x0, {0xa, 0x4e23, 0x0, @ipv4={[], [0xff, 0xff]}}}}, 0x80) getsockopt$inet_sctp_SCTP_PR_ASSOC_STATUS(0xffffffffffffffff, 0x84, 0x73, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x80000000, 0x100}, &(0x7f0000000380)=0x18) r1 = socket$inet6(0xa, 0x3, 0x3c) connect$inet6(r1, &(0x7f0000039000)={0xa, 0x0, 0x0, @mcast2={0xff, 0x2, [], 0x1}, 0x9}, 0x1c) sendmsg(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f000002c000)=[{&(0x7f0000000000)=',', 0x1}], 0x1, &(0x7f0000000140)}, 0xc100) sendmsg(r1, &(0x7f0000000a40)={0x0, 0x0, &(0x7f00000009c0)=[{&(0x7f0000000240)="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", 0x691}], 0x1, &(0x7f0000003b40)}, 0x0) accept(0xffffffffffffffff, &(0x7f0000000200)=@can, &(0x7f0000000280)=0x80) pread64(r0, &(0x7f0000000180)=""/45, 0x2d, 0x0) symlink(&(0x7f00000003c0)='./file0\x00', &(0x7f0000000440)='./file1\x00') connect(0xffffffffffffffff, &(0x7f0000000680)=@ipx={0x4, 0x0, 0x1, "76b8b6894d74"}, 0x80) umount2(&(0x7f0000000080)='./file0\x00', 0x0) 2018/04/30 20:09:05 executing program 1: r0 = socket$inet6(0xa, 0x3, 0x3a) setsockopt$inet6_MRT6_ADD_MFC(r0, 0x29, 0xc8, &(0x7f0000000200)={{0xa, 0x0, 0x0, @ipv4={[], [0xff, 0xff], @multicast1=0xe0000001}}, {0xa, 0x0, 0x0, @dev={0xfe, 0x80}}}, 0x3) 2018/04/30 20:09:05 executing program 1: perf_event_open(&(0x7f000001d000)={0x2, 0x78, 0x71}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) getsockopt$IP_VS_SO_GET_SERVICE(r0, 0x0, 0x483, &(0x7f0000000100), &(0x7f0000000180)=0x68) [ 80.168652] FAT-fs (loop7): Directory bread(block 112) failed [ 80.221066] FAT-fs (loop3): Directory bread(block 112) failed [ 80.284120] FAT-fs (loop0): bogus number of reserved sectors [ 80.302621] FAT-fs (loop2): bogus number of reserved sectors [ 80.302650] FAT-fs (loop2): Can't find a valid FAT filesystem [ 80.351746] FAT-fs (loop3): Directory bread(block 112) failed [ 80.399466] FAT-fs (loop3): Directory bread(block 112) failed [ 80.441967] FAT-fs (loop0): Can't find a valid FAT filesystem [ 80.571819] attempt to access beyond end of device [ 80.576791] loop7: rw=536870912, want=246, limit=112 [ 80.591521] attempt to access beyond end of device [ 80.606904] loop7: rw=536870912, want=247, limit=112 [ 80.618186] attempt to access beyond end of device [ 80.628791] loop7: rw=536870912, want=248, limit=112 [ 80.637798] attempt to access beyond end of device [ 80.645100] loop7: rw=536870912, want=249, limit=112 [ 80.650531] attempt to access beyond end of device [ 80.650537] loop3: rw=536870912, want=246, limit=112 [ 80.650557] attempt to access beyond end of device [ 80.650561] loop3: rw=536870912, want=247, limit=112 [ 80.650569] attempt to access beyond end of device [ 80.650574] loop3: rw=536870912, want=248, limit=112 [ 80.650584] attempt to access beyond end of device [ 80.650589] loop3: rw=536870912, want=249, limit=112 [ 80.650599] attempt to access beyond end of device [ 80.650604] loop3: rw=536870912, want=262, limit=112 [ 80.650613] attempt to access beyond end of device [ 80.650617] loop3: rw=536870912, want=263, limit=112 [ 80.650626] attempt to access beyond end of device [ 80.650630] loop3: rw=536870912, want=264, limit=112 [ 80.650639] attempt to access beyond end of device [ 80.650643] loop3: rw=536870912, want=265, limit=112 [ 80.650797] attempt to access beyond end of device [ 80.650802] loop3: rw=536870912, want=561, limit=112 [ 80.752449] attempt to access beyond end of device [ 80.757396] loop7: rw=536870912, want=262, limit=112 [ 80.763171] attempt to access beyond end of device 2018/04/30 20:09:05 executing program 4: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pkey_free(0xffffffffffffffff) r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000700)='/dev/loop-control\x00', 0x0, 0x0) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f0000000100)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000480)="eb3c906d6b66732e66617400", 0xc}], 0x0, &(0x7f0000000240)=ANY=[]) close(0xffffffffffffffff) connect(0xffffffffffffffff, &(0x7f0000000600)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x2, 0x0, 0x0, {0xa, 0x4e23, 0x0, @ipv4={[], [0xff, 0xff]}}}}, 0x80) getsockopt$inet_sctp_SCTP_PR_ASSOC_STATUS(0xffffffffffffffff, 0x84, 0x73, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x80000000, 0x100}, &(0x7f0000000380)=0x18) r1 = socket$inet6(0xa, 0x3, 0x3c) connect$inet6(r1, &(0x7f0000039000)={0xa, 0x0, 0x0, @mcast2={0xff, 0x2, [], 0x1}, 0x9}, 0x1c) sendmsg(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f000002c000)=[{&(0x7f0000000000)=',', 0x1}], 0x1, &(0x7f0000000140)}, 0xc100) sendmsg(r1, &(0x7f0000000a40)={0x0, 0x0, &(0x7f00000009c0)=[{&(0x7f0000000240)="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", 0x691}], 0x1, &(0x7f0000003b40)}, 0x0) accept(0xffffffffffffffff, &(0x7f0000000200)=@can, &(0x7f0000000280)=0x80) pread64(r0, &(0x7f0000000180)=""/45, 0x2d, 0x0) symlink(&(0x7f00000003c0)='./file0\x00', &(0x7f0000000440)='./file1\x00') connect(0xffffffffffffffff, &(0x7f0000000680)=@ipx={0x4, 0x0, 0x1, "76b8b6894d74"}, 0x80) umount2(&(0x7f0000000080)='./file0\x00', 0x0) 2018/04/30 20:09:05 executing program 1: r0 = syz_open_dev$binder(&(0x7f00006a9ff3)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) r1 = syz_open_dev$binder(&(0x7f0000000040)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x0, 0x20011, r1, 0x0) accept$ax25(0xffffffffffffffff, &(0x7f0000000080), &(0x7f00000000c0)=0x10) ioctl$BINDER_SET_CONTEXT_MGR(r1, 0x40046207, 0x0) ioctl$BINDER_WRITE_READ(r1, 0xc0306201, &(0x7f0000008fd0)={0x4, 0x0, &(0x7f0000003fe8)=[@register_looper={0x630b}], 0x1, 0x0, &(0x7f0000009000)="d8"}) ioctl$BINDER_WRITE_READ(r0, 0xc0306201, &(0x7f000000a000)={0x14, 0x0, &(0x7f0000004000)=[@acquire_done={0x40486311}], 0x0, 0x0, &(0x7f0000002000)}) 2018/04/30 20:09:05 executing program 6: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pkey_free(0xffffffffffffffff) r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000700)='/dev/loop-control\x00', 0x0, 0x0) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f0000000100)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000480)="eb3c906d6b66732e66617400", 0xc}], 0x0, &(0x7f0000000240)=ANY=[]) close(0xffffffffffffffff) connect(0xffffffffffffffff, &(0x7f0000000600)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x2, 0x0, 0x0, {0xa, 0x4e23, 0x0, @ipv4={[], [0xff, 0xff]}}}}, 0x80) getsockopt$inet_sctp_SCTP_PR_ASSOC_STATUS(0xffffffffffffffff, 0x84, 0x73, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x80000000, 0x100}, &(0x7f0000000380)=0x18) r1 = socket$inet6(0xa, 0x3, 0x3c) connect$inet6(r1, &(0x7f0000039000)={0xa, 0x0, 0x0, @mcast2={0xff, 0x2, [], 0x1}, 0x9}, 0x1c) sendmsg(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f000002c000)=[{&(0x7f0000000000)=',', 0x1}], 0x1, &(0x7f0000000140)}, 0xc100) sendmsg(r1, &(0x7f0000000a40)={0x0, 0x0, &(0x7f00000009c0)=[{&(0x7f0000000240)="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", 0x691}], 0x1, &(0x7f0000003b40)}, 0x0) accept(0xffffffffffffffff, &(0x7f0000000200)=@can, &(0x7f0000000280)=0x80) pread64(r0, &(0x7f0000000180)=""/45, 0x2d, 0x0) symlink(&(0x7f00000003c0)='./file0\x00', &(0x7f0000000440)='./file1\x00') connect(0xffffffffffffffff, &(0x7f0000000680)=@ipx={0x4, 0x0, 0x1, "76b8b6894d74"}, 0x80) umount2(&(0x7f0000000080)='./file0\x00', 0x0) 2018/04/30 20:09:05 executing program 2: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pkey_free(0xffffffffffffffff) r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000700)='/dev/loop-control\x00', 0x0, 0x0) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f0000000100)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000480)="eb3c906d6b66732e66617400", 0xc}], 0x0, &(0x7f0000000240)=ANY=[]) close(0xffffffffffffffff) connect(0xffffffffffffffff, &(0x7f0000000600)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x2, 0x0, 0x0, {0xa, 0x4e23, 0x0, @ipv4={[], [0xff, 0xff]}}}}, 0x80) getsockopt$inet_sctp_SCTP_PR_ASSOC_STATUS(0xffffffffffffffff, 0x84, 0x73, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x80000000, 0x100}, &(0x7f0000000380)=0x18) r1 = socket$inet6(0xa, 0x3, 0x3c) connect$inet6(r1, &(0x7f0000039000)={0xa, 0x0, 0x0, @mcast2={0xff, 0x2, [], 0x1}, 0x9}, 0x1c) sendmsg(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f000002c000)=[{&(0x7f0000000000)=',', 0x1}], 0x1, &(0x7f0000000140)}, 0xc100) sendmsg(r1, &(0x7f0000000a40)={0x0, 0x0, &(0x7f00000009c0)=[{&(0x7f0000000240)="d09a0e63c9476288b671afdbd53a5994e137381f62021d1951b627b8dda57a5d17d744648c81c5703ed8146ab1b0171f89091b1dd3238d03dbb686df460963245dedf2013ee555af99499e44ad420dbf65fd46fbc99a1274429e2d5783751815828ec8cb3553110cca66460215353d19f6d8bbd8fb08ad0491634ac2fd10e2cd30bcd7fede24263a7fff16e53ea293f3551b7147c33a44ea437fb1515c3e8d4f162fdebf8ebe11ae6fcd9372c8d8f19556ae091fe94215ae9434da412f6fa4cb6561e5f78ff9707844ee5d573fb294437722d9a06dfa61748c32c73d759933a8dd344c947d3efdbe90d0eb049df5fbb0c19f6785264b619c530d97395d44b04f7e2a280d658c7871ad373b792678c49227999651ef3b2ee1bc2b8f3035db2d6e8e09aa3837233c8713065a8ad131d24f6c42a3220d0e07c3d3e95d9f44f059a5dd10c09716b5f874ecf53aadfa5050ff40f2c3c4a629b6445e5836100afff5a8977583653b40ca116f8f11416e5c1bd5499636ddae25fc49709f0309cf5c0bf8e432160c258d14223b3b0d009b09858645773dd97e68a9531072713cff077b2e73e03ed4f145e9199c126a7f235e5674a3c7f5c7129ac7c1a3319590249b6d34ef6c3d8b94c6fc7cdcbddb053243f33e7bc1f230d3bc7dfc4359e33992d0a3946b914a093287a76ac4a249b5b86cc75476466e409553355fefab75e9268a8751ffc9481fcff1f49c475699595b315e2147eebe8b7291600c6b1cf7c8f24d587b9464a67e5ccec17820e711b98f4f7d5053642068a3fff72b53e2622d6e8b4a4c815fb2ea90ef63e141209dd29254e5ab5bde9c6817b3cb184586049e7741b2d8b5b1a19e99e1834a25959155720c1c0efa4d9d3c42e1ba282847d476cef0228b1422aba08e5f3c1cd279bb20dcf3e90f80a4a8ac093de9f0d9c11a540aff2de27437787bbed317439cafb71e7f92b7e02cbadb076f04ba2cb8c96aeef53c74d9036c922b1b24a79228e833abc661b5630caa45389341cb8ddf277fd916141023fb53c0d155faf6fdfb593e22db25c4f8afdcd90d437672ebe975f4a5f445bbdd845505fcfea702a42d821d3dc11720de0009e83161e5a089d09184346606e126842de54e85e20aa5fac874367a8690d09d6e041378bd424eabe8248652c3f75a849ff89da7b6be87fb3fe6ff22693b0cece9e4d935f28bb7efd85afb1642a363d583eb01f48f25784f80002b163bd3da724b0391dac7c23f76b5c5c6319f7aab18a486d5607f68ce2f83d2a6a8a13f8ecdb845b8af96230f063019ff113698c720403bbf6202b2d5e6146f14a45afe6ed538fc1fa57518769bd3bfc11e743b4e56b01f17483a152abcca0bd84a1011bd703a494150176d17322cf10307d259999622b76ac6a86407c9ed281ae29b9b569b382d3f39fe4d07706c96c41a565437d9edb1cb532d900efe54f518044bba5fa5791c1797c569a3d6c21342d92f4b104a3d957cf85e617c46ac97b6785a455ce7765eb80a02de4dffde0207061e1afb61e777379b202707f0f49edcf21a186ea1f2e08ef1dc15ae3371280d89aabb3bd53408b4cb2a8e42f9f4d0bc11d766eb51940f5e92559b91954649f2786fb6683e19ca5f609c40e327876f5515aeefce0f390d3fd557aabcb091b04131f3edc1ed80a2d5a812786530a302ab54f7e1f3a6bca852722d1af85ceab2e6565733b31f76d795b1a603a780564b181ebadb0028c03d0c2c2831ce3a83369bf4ec61f802633e719040dac86c9c26e01bdad8a18d33cd91ed4dcdf6f1e1d93d3ecfc1a8b0993ec8e441321a107e0f8e14b4eb135041eab6278b1557d13780f1b4f520cf0d5948d86842ea547824bdcc37a5383b3e58918b0a6ddaa38f9358ba907629bec4ec41a3c685adca897d41b0a847b3b20100daa73d01dd2cca16cad83af5bbae0e0b107de49a9222aef89cc4a6efde35f381433151afea24aa88bb44be666a996bb45fd37e2936c3f2fdea1837e294419dfb965a097dc478083f54d6432d431ca3eaebcc4b0dc1180d09736e08d6b4f594dea6fb9791d3ab6dffd9aad25ad8c834c9683e8b9f19eef75ab77792be9de198a66a785c15c8222931a6ff2208b15dc36836f3d2f35ad049e59cdb21c94de061d192c24437e87b08fb6ade25d48a6fc59c396faaec5f048fb9021a79fe32c35a857f5238f9e68d187e53488a3359612bc7ddbe76e9381612e4418dfb663694f81579f54fa9558abe7c0d75adfd29297b72fa3cd223cbb52ecbe1674966df197adde781b2000970463e021b338002efb88a0649e93f1c0a6572fc9edddc0d9d16e1be86a49f9657054493881a70bad2f9d93b5ec8fae8fa0b0000000000000000", 0x691}], 0x1, &(0x7f0000003b40)}, 0x0) accept(0xffffffffffffffff, &(0x7f0000000200)=@can, &(0x7f0000000280)=0x80) pread64(r0, &(0x7f0000000180)=""/45, 0x2d, 0x0) symlink(&(0x7f00000003c0)='./file0\x00', &(0x7f0000000440)='./file1\x00') connect(0xffffffffffffffff, &(0x7f0000000680)=@ipx={0x4, 0x0, 0x1, "76b8b6894d74"}, 0x80) umount2(&(0x7f0000000080)='./file0\x00', 0x0) 2018/04/30 20:09:05 executing program 7: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x2, &(0x7f0000000280)=0x242, 0x4) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f000012afe4)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) r2 = syz_open_pts(0xffffffffffffff9c, 0x0) ioctl$TIOCGSID(r2, 0x5429, &(0x7f0000000140)) r3 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(0xffffffffffffffff, 0x84, 0x18, &(0x7f0000000300)={0x0, 0x3}, &(0x7f0000000100)=0x8) r5 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000180)='/dev/loop-control\x00', 0x20200, 0x0) ioctl$LOOP_CTL_ADD(r5, 0x4c80, 0x0) tgkill(0x0, 0x0, 0x0) fallocate(r3, 0x0, 0x0, 0x92d) ioctl$LOOP_CTL_GET_FREE(r5, 0x4c82) ioctl$LOOP_CTL_REMOVE(r5, 0x4c81, 0x0) ioctl$LOOP_CTL_REMOVE(r5, 0x4c81, 0x0) r6 = openat$selinux_status(0xffffffffffffff9c, &(0x7f00000002c0)='/selinux/status\x00', 0x0, 0x0) ioctl$EVIOCSFF(r6, 0x40304580, &(0x7f0000000300)=ANY=[@ANYBLOB]) getsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(0xffffffffffffffff, 0x84, 0x6, &(0x7f00000001c0)={r4, @in={{0x2, 0x4e23, @multicast1=0xe0000001}}}, &(0x7f0000000280)=0x84) ioctl$PIO_UNIMAP(0xffffffffffffffff, 0x4b67, &(0x7f00000003c0)={0x2, &(0x7f0000000380)=[{0x5749}, {0x200, 0xfffffffffffffffd}]}) sendto$inet6(r0, &(0x7f0000eb9fff), 0xffffff31, 0x20000003, &(0x7f000031e000)={0xa, 0x4e22}, 0x1c) shutdown(r0, 0x1) 2018/04/30 20:09:05 executing program 3: r0 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000006000/0x3000)=nil, 0x3000, 0x0, 0x11, r0, 0x0) madvise(&(0x7f0000006000/0x3000)=nil, 0x3000, 0x9) 2018/04/30 20:09:05 executing program 5: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = memfd_create(&(0x7f000000e000)='\x00 ', 0x0) r1 = syz_open_dev$sndseq(&(0x7f0000000180)='/dev/snd/seq\x00', 0x0, 0x101801) ioctl$SNDRV_SEQ_IOCTL_GET_PORT_INFO(r0, 0xc0a85322, &(0x7f00000001c0)) pselect6(0x40, &(0x7f0000000080)={0x40, 0x6, 0x200, 0x8, 0x4, 0x80, 0x0, 0x7}, &(0x7f0000000280)={0x5, 0x2, 0x0, 0x80000000, 0xf4, 0x1ff, 0x81, 0x7}, &(0x7f00000002c0)={0x53f0}, &(0x7f0000000300)={0x0, 0x1c9c380}, &(0x7f0000000480)={&(0x7f0000000440), 0x8}) r2 = dup2(r1, r0) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r2, 0xc08c5332, &(0x7f000002b000)={0x0, 0x0, 0x0, "9ede7a8c5ae95ec8672c93340f643a664f13eeab65c0322901dc6bd36cde2c51f01b7f0b014f9f91eeb7c37c7240f476c8d753d000aa8faf8fb574dbcfa6dc4d", 0x4}) getsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(r0, 0x84, 0xa, &(0x7f0000000580)={0x7, 0xfffffffffffffff7, 0x200, 0x1, 0x4, 0x0, 0x0, 0x4}, &(0x7f00000005c0)=0x20) write$sndseq(r0, &(0x7f0000000080), 0xffffff17) r3 = socket$netlink(0x10, 0x3, 0x0) getsockname$packet(0xffffffffffffff9c, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @link_local}, &(0x7f0000000200)=0x14) sendmmsg(r3, &(0x7f00000004c0)=[{{&(0x7f0000000240)=@ll={0x11, 0xf, r4, 0x1, 0x101, 0x6}, 0x80, &(0x7f0000000340)=[{&(0x7f00000002c0)="d043fe83922ff8bcd1e826069830af42bdea147623dc2808beabb3b9be63a423774b8ce080bef5b037dd1b6fabb5dc73e68d78358a20ab477f387973b3e2eed81d3e04aadb2e66a0ce372789b99794adab4d93f090", 0x55}], 0x1, 0x0, 0x0, 0x8000}, 0x8e5}], 0x1, 0x4) fcntl$setflags(r0, 0x2, 0x1) r5 = syz_open_procfs(0x0, &(0x7f0000000180)='net/igmp\x00') preadv(r5, &(0x7f0000000480)=[{&(0x7f0000000380)=""/242, 0xf2}], 0x1, 0x10400003) syz_open_dev$sg(&(0x7f0000000000)='/dev/sg#\x00', 0x3ff, 0x8202) [ 80.768129] loop7: rw=536870912, want=263, limit=112 [ 80.773611] attempt to access beyond end of device [ 80.778560] loop7: rw=536870912, want=264, limit=112 [ 80.783975] attempt to access beyond end of device [ 80.788929] loop7: rw=536870912, want=265, limit=112 [ 80.794546] attempt to access beyond end of device [ 80.799503] loop7: rw=536870912, want=697, limit=112 2018/04/30 20:09:05 executing program 0: r0 = perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) unshare(0x40000000) r1 = socket(0x0, 0xf, 0x1) sendto$ax25(r1, &(0x7f0000000140), 0x0, 0x20000000, &(0x7f0000000040)={0x3, {"65a21c61a839d6"}, 0x6}, 0x10) r2 = openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000000200)='/selinux/checkreqprot\x00', 0x2, 0x0) preadv(r1, &(0x7f00000014c0)=[{&(0x7f0000000240)=""/106, 0x6a}, {&(0x7f00000002c0)=""/73, 0x49}, {&(0x7f00000001c0)=""/39, 0x27}, {&(0x7f0000000340)=""/106, 0x6a}, {&(0x7f00000003c0)=""/243, 0xf3}, {&(0x7f00000004c0)=""/4096, 0x1000}], 0x6, 0x0) openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/commit_pending_bools\x00', 0x1, 0x0) ioctl$TIOCSBRK(r2, 0x5427) fcntl$getownex(r1, 0x10, &(0x7f00000015c0)={0x0, 0x0}) perf_event_open(&(0x7f0000000140)={0x6, 0x70, 0x40000, 0x8, 0x1, 0x10000, 0x0, 0x0, 0x1, 0x3, 0xfffffffffffffffd, 0x0, 0x9, 0x5, 0x8, 0x4, 0x0, 0x99, 0x8000, 0x6, 0xae, 0xb5, 0x8000, 0xb6a3, 0x7, 0x7, 0x2, 0xfffffffffffffff8, 0x0, 0xfffffffffffffff7, 0x8, 0x1, 0x2639, 0x24ce732f, 0xff, 0x22, 0x9, 0xe35, 0x0, 0xfff, 0x2, @perf_config_ext={0x0, 0x1000}, 0x11001, 0x7, 0x3, 0x7, 0x1, 0xe5, 0x3edf}, r3, 0x6, r0, 0x2) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="0004000000100000cc000000490b0000ec03000001000000000000000000000000200000002000000004000000000000e95dbe5a0000ffff53", 0x39, 0x400}], 0x0, &(0x7f0000012f00)) open$dir(&(0x7f0000000e40)='./file0//ile0\x00', 0x0, 0x0) readlink(&(0x7f0000001540)='./file0\x00', &(0x7f0000001600)=""/83, 0x53) truncate(&(0x7f0000000440)='./file0//ile0\x00', 0x0) [ 80.868217] binder: 8732:8741 ERROR: BC_REGISTER_LOOPER called without request [ 80.902206] IPVS: Creating netns size=2536 id=9 [ 80.967078] FAT-fs (loop4): bogus number of reserved sectors [ 80.976709] FAT-fs (loop4): Can't find a valid FAT filesystem [ 80.989344] FAT-fs (loop2): bogus number of reserved sectors [ 80.989359] FAT-fs (loop2): Can't find a valid FAT filesystem [ 81.007074] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 81.011429] IPVS: Creating netns size=2536 id=10 [ 81.053481] FAT-fs (loop6): bogus number of reserved sectors [ 81.053549] FAT-fs (loop6): Can't find a valid FAT filesystem [ 81.065167] EXT4-fs (loop0): VFS: Can't find ext4 filesystem [ 81.665202] binder_alloc: binder_alloc_mmap_handler: 8732 20000000-20002000 already mapped failed -16 [ 81.684791] binder: BINDER_SET_CONTEXT_MGR already set [ 81.694648] binder: 8732:8775 ioctl 40046207 0 returned -16 [ 81.708312] binder: 8732:8741 ERROR: BC_REGISTER_LOOPER called without request [ 81.715808] binder_alloc: 8732: binder_alloc_buf, no vma [ 81.725907] binder: 8732:8775 transaction failed 29189/-3, size 0-0 line 3133 [ 81.741374] binder: undelivered TRANSACTION_ERROR: 29189 [ 81.747765] binder: release 8732:8775 transaction 2 out, still active [ 81.757322] binder: undelivered TRANSACTION_COMPLETE [ 81.763913] binder: release 8732:8741 transaction 2 in, still active [ 81.770793] binder: send failed reply for transaction 2, target dead 2018/04/30 20:09:06 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x2, &(0x7f0000000280)=0x242, 0x4) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f000012afe4)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) r2 = syz_open_pts(0xffffffffffffff9c, 0x0) ioctl$TIOCGSID(r2, 0x5429, &(0x7f0000000140)) r3 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(0xffffffffffffffff, 0x84, 0x18, &(0x7f0000000300)={0x0, 0x3}, &(0x7f0000000100)=0x8) r5 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000180)='/dev/loop-control\x00', 0x20200, 0x0) ioctl$LOOP_CTL_ADD(r5, 0x4c80, 0x0) tgkill(0x0, 0x0, 0x0) fallocate(r3, 0x0, 0x0, 0x92d) ioctl$LOOP_CTL_GET_FREE(r5, 0x4c82) ioctl$LOOP_CTL_REMOVE(r5, 0x4c81, 0x0) ioctl$LOOP_CTL_REMOVE(r5, 0x4c81, 0x0) r6 = openat$selinux_status(0xffffffffffffff9c, &(0x7f00000002c0)='/selinux/status\x00', 0x0, 0x0) ioctl$EVIOCSFF(r6, 0x40304580, &(0x7f0000000300)=ANY=[@ANYBLOB]) getsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(0xffffffffffffffff, 0x84, 0x6, &(0x7f00000001c0)={r4, @in={{0x2, 0x4e23, @multicast1=0xe0000001}}}, &(0x7f0000000280)=0x84) ioctl$PIO_UNIMAP(0xffffffffffffffff, 0x4b67, &(0x7f00000003c0)={0x2, &(0x7f0000000380)=[{0x5749}, {0x200, 0xfffffffffffffffd}]}) sendto$inet6(r0, &(0x7f0000eb9fff), 0xffffff31, 0x20000003, &(0x7f000031e000)={0xa, 0x4e22}, 0x1c) shutdown(r0, 0x1) 2018/04/30 20:09:06 executing program 6: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pkey_free(0xffffffffffffffff) r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000700)='/dev/loop-control\x00', 0x0, 0x0) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f0000000100)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000480)="eb3c906d6b66732e66617400", 0xc}], 0x0, &(0x7f0000000240)=ANY=[]) close(0xffffffffffffffff) connect(0xffffffffffffffff, &(0x7f0000000600)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x2, 0x0, 0x0, {0xa, 0x4e23, 0x0, @ipv4={[], [0xff, 0xff]}}}}, 0x80) getsockopt$inet_sctp_SCTP_PR_ASSOC_STATUS(0xffffffffffffffff, 0x84, 0x73, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x80000000, 0x100}, &(0x7f0000000380)=0x18) r1 = socket$inet6(0xa, 0x3, 0x3c) connect$inet6(r1, &(0x7f0000039000)={0xa, 0x0, 0x0, @mcast2={0xff, 0x2, [], 0x1}, 0x9}, 0x1c) sendmsg(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f000002c000)=[{&(0x7f0000000000)=',', 0x1}], 0x1, &(0x7f0000000140)}, 0xc100) sendmsg(r1, &(0x7f0000000a40)={0x0, 0x0, &(0x7f00000009c0)=[{&(0x7f0000000240)="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", 0x691}], 0x1, &(0x7f0000003b40)}, 0x0) accept(0xffffffffffffffff, &(0x7f0000000200)=@can, &(0x7f0000000280)=0x80) pread64(r0, &(0x7f0000000180)=""/45, 0x2d, 0x0) symlink(&(0x7f00000003c0)='./file0\x00', &(0x7f0000000440)='./file1\x00') connect(0xffffffffffffffff, &(0x7f0000000680)=@ipx={0x4, 0x0, 0x1, "76b8b6894d74"}, 0x80) umount2(&(0x7f0000000080)='./file0\x00', 0x0) 2018/04/30 20:09:06 executing program 0: r0 = perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) unshare(0x40000000) r1 = socket(0x0, 0xf, 0x1) sendto$ax25(r1, &(0x7f0000000140), 0x0, 0x20000000, &(0x7f0000000040)={0x3, {"65a21c61a839d6"}, 0x6}, 0x10) r2 = openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000000200)='/selinux/checkreqprot\x00', 0x2, 0x0) preadv(r1, &(0x7f00000014c0)=[{&(0x7f0000000240)=""/106, 0x6a}, {&(0x7f00000002c0)=""/73, 0x49}, {&(0x7f00000001c0)=""/39, 0x27}, {&(0x7f0000000340)=""/106, 0x6a}, {&(0x7f00000003c0)=""/243, 0xf3}, {&(0x7f00000004c0)=""/4096, 0x1000}], 0x6, 0x0) openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/commit_pending_bools\x00', 0x1, 0x0) ioctl$TIOCSBRK(r2, 0x5427) fcntl$getownex(r1, 0x10, &(0x7f00000015c0)={0x0, 0x0}) perf_event_open(&(0x7f0000000140)={0x6, 0x70, 0x40000, 0x8, 0x1, 0x10000, 0x0, 0x0, 0x1, 0x3, 0xfffffffffffffffd, 0x0, 0x9, 0x5, 0x8, 0x4, 0x0, 0x99, 0x8000, 0x6, 0xae, 0xb5, 0x8000, 0xb6a3, 0x7, 0x7, 0x2, 0xfffffffffffffff8, 0x0, 0xfffffffffffffff7, 0x8, 0x1, 0x2639, 0x24ce732f, 0xff, 0x22, 0x9, 0xe35, 0x0, 0xfff, 0x2, @perf_config_ext={0x0, 0x1000}, 0x11001, 0x7, 0x3, 0x7, 0x1, 0xe5, 0x3edf}, r3, 0x6, r0, 0x2) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="0004000000100000cc000000490b0000ec03000001000000000000000000000000200000002000000004000000000000e95dbe5a0000ffff53", 0x39, 0x400}], 0x0, &(0x7f0000012f00)) open$dir(&(0x7f0000000e40)='./file0//ile0\x00', 0x0, 0x0) readlink(&(0x7f0000001540)='./file0\x00', &(0x7f0000001600)=""/83, 0x53) truncate(&(0x7f0000000440)='./file0//ile0\x00', 0x0) 2018/04/30 20:09:06 executing program 2: r0 = getpgrp(0x0) r1 = gettid() rt_sigprocmask(0x0, &(0x7f0000032ff8)={0xffffffffffffff7f}, 0x0, 0x8) rt_tgsigqueueinfo(r0, r1, 0x35, &(0x7f0000b1eff0)={0x0, 0x0, 0xfffffffffffffffe}) r2 = signalfd4(0xffffffffffffffff, &(0x7f0000000ff8)={0xfffffffffffffdb0}, 0x8, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0) read(r2, &(0x7f0000000080)=""/128, 0x80) 2018/04/30 20:09:06 executing program 1: perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x72, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000100)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000180)='/dev/loop-control\x00', 0x20200, 0x0) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x0) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) syz_mount_image$ntfs(&(0x7f0000000440)='ntfs\x00', &(0x7f0000000480)='./bus\x00', 0x0, 0x0, &(0x7f0000000300), 0x0, &(0x7f0000000740)=ANY=[]) quotactl(0x0, &(0x7f0000000080)='./bus\x00', 0x0, &(0x7f0000000280)) 2018/04/30 20:09:06 executing program 4: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pkey_free(0xffffffffffffffff) r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000700)='/dev/loop-control\x00', 0x0, 0x0) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f0000000100)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000480)="eb3c906d6b66732e66617400", 0xc}], 0x0, &(0x7f0000000240)=ANY=[]) close(0xffffffffffffffff) connect(0xffffffffffffffff, &(0x7f0000000600)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x2, 0x0, 0x0, {0xa, 0x4e23, 0x0, @ipv4={[], [0xff, 0xff]}}}}, 0x80) getsockopt$inet_sctp_SCTP_PR_ASSOC_STATUS(0xffffffffffffffff, 0x84, 0x73, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x80000000, 0x100}, &(0x7f0000000380)=0x18) r1 = socket$inet6(0xa, 0x3, 0x3c) connect$inet6(r1, &(0x7f0000039000)={0xa, 0x0, 0x0, @mcast2={0xff, 0x2, [], 0x1}, 0x9}, 0x1c) sendmsg(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f000002c000)=[{&(0x7f0000000000)=',', 0x1}], 0x1, &(0x7f0000000140)}, 0xc100) sendmsg(r1, &(0x7f0000000a40)={0x0, 0x0, &(0x7f00000009c0)=[{&(0x7f0000000240)="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", 0x691}], 0x1, &(0x7f0000003b40)}, 0x0) accept(0xffffffffffffffff, &(0x7f0000000200)=@can, &(0x7f0000000280)=0x80) pread64(r0, &(0x7f0000000180)=""/45, 0x2d, 0x0) symlink(&(0x7f00000003c0)='./file0\x00', &(0x7f0000000440)='./file1\x00') connect(0xffffffffffffffff, &(0x7f0000000680)=@ipx={0x4, 0x0, 0x1, "76b8b6894d74"}, 0x80) umount2(&(0x7f0000000080)='./file0\x00', 0x0) 2018/04/30 20:09:06 executing program 7: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x2, &(0x7f0000000280)=0x242, 0x4) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f000012afe4)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) r2 = syz_open_pts(0xffffffffffffff9c, 0x0) ioctl$TIOCGSID(r2, 0x5429, &(0x7f0000000140)) r3 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(0xffffffffffffffff, 0x84, 0x18, &(0x7f0000000300)={0x0, 0x3}, &(0x7f0000000100)=0x8) r5 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000180)='/dev/loop-control\x00', 0x20200, 0x0) ioctl$LOOP_CTL_ADD(r5, 0x4c80, 0x0) tgkill(0x0, 0x0, 0x0) fallocate(r3, 0x0, 0x0, 0x92d) ioctl$LOOP_CTL_GET_FREE(r5, 0x4c82) ioctl$LOOP_CTL_REMOVE(r5, 0x4c81, 0x0) ioctl$LOOP_CTL_REMOVE(r5, 0x4c81, 0x0) r6 = openat$selinux_status(0xffffffffffffff9c, &(0x7f00000002c0)='/selinux/status\x00', 0x0, 0x0) ioctl$EVIOCSFF(r6, 0x40304580, &(0x7f0000000300)=ANY=[@ANYBLOB]) getsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(0xffffffffffffffff, 0x84, 0x6, &(0x7f00000001c0)={r4, @in={{0x2, 0x4e23, @multicast1=0xe0000001}}}, &(0x7f0000000280)=0x84) ioctl$PIO_UNIMAP(0xffffffffffffffff, 0x4b67, &(0x7f00000003c0)={0x2, &(0x7f0000000380)=[{0x5749}, {0x200, 0xfffffffffffffffd}]}) sendto$inet6(r0, &(0x7f0000eb9fff), 0xffffff31, 0x20000003, &(0x7f000031e000)={0xa, 0x4e22}, 0x1c) shutdown(r0, 0x1) 2018/04/30 20:09:06 executing program 5: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = memfd_create(&(0x7f000000e000)='\x00 ', 0x0) r1 = syz_open_dev$sndseq(&(0x7f0000000180)='/dev/snd/seq\x00', 0x0, 0x101801) ioctl$SNDRV_SEQ_IOCTL_GET_PORT_INFO(r0, 0xc0a85322, &(0x7f00000001c0)) pselect6(0x40, &(0x7f0000000080)={0x40, 0x6, 0x200, 0x8, 0x4, 0x80, 0x0, 0x7}, &(0x7f0000000280)={0x5, 0x2, 0x0, 0x80000000, 0xf4, 0x1ff, 0x81, 0x7}, &(0x7f00000002c0)={0x53f0}, &(0x7f0000000300)={0x0, 0x1c9c380}, &(0x7f0000000480)={&(0x7f0000000440), 0x8}) r2 = dup2(r1, r0) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r2, 0xc08c5332, &(0x7f000002b000)={0x0, 0x0, 0x0, "9ede7a8c5ae95ec8672c93340f643a664f13eeab65c0322901dc6bd36cde2c51f01b7f0b014f9f91eeb7c37c7240f476c8d753d000aa8faf8fb574dbcfa6dc4d", 0x4}) getsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(r0, 0x84, 0xa, &(0x7f0000000580)={0x7, 0xfffffffffffffff7, 0x200, 0x1, 0x4, 0x0, 0x0, 0x4}, &(0x7f00000005c0)=0x20) write$sndseq(r0, &(0x7f0000000080), 0xffffff17) r3 = socket$netlink(0x10, 0x3, 0x0) getsockname$packet(0xffffffffffffff9c, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @link_local}, &(0x7f0000000200)=0x14) sendmmsg(r3, &(0x7f00000004c0)=[{{&(0x7f0000000240)=@ll={0x11, 0xf, r4, 0x1, 0x101, 0x6}, 0x80, &(0x7f0000000340)=[{&(0x7f00000002c0)="d043fe83922ff8bcd1e826069830af42bdea147623dc2808beabb3b9be63a423774b8ce080bef5b037dd1b6fabb5dc73e68d78358a20ab477f387973b3e2eed81d3e04aadb2e66a0ce372789b99794adab4d93f090", 0x55}], 0x1, 0x0, 0x0, 0x8000}, 0x8e5}], 0x1, 0x4) fcntl$setflags(r0, 0x2, 0x1) r5 = syz_open_procfs(0x0, &(0x7f0000000180)='net/igmp\x00') preadv(r5, &(0x7f0000000480)=[{&(0x7f0000000380)=""/242, 0xf2}], 0x1, 0x10400003) syz_open_dev$sg(&(0x7f0000000000)='/dev/sg#\x00', 0x3ff, 0x8202) 2018/04/30 20:09:06 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) mmap(&(0x7f0000000000/0x4000)=nil, 0x4000, 0x0, 0xc812, r0, 0x0) r1 = socket$inet6_udp(0xa, 0x2, 0x0) getsockopt$inet6_int(r1, 0x29, 0xcf, &(0x7f0000000ffc), &(0x7f0000013000)=0x4) [ 82.019381] IPVS: Creating netns size=2536 id=11 2018/04/30 20:09:07 executing program 2: r0 = creat(&(0x7f0000000080)='./bus\x00', 0x0) fcntl$setstatus(r0, 0x4, 0x6100) ftruncate(r0, 0x8200) r1 = open(&(0x7f000000fffa)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x800002, 0x11, r1, 0x0) symlinkat(&(0x7f0000008ff8)='./file1\x00', 0xffffffffffffffff, &(0x7f0000012ff8)='./file0\x00') recvmmsg(0xffffffffffffffff, &(0x7f0000006ec0)=[{{&(0x7f00000045c0)=@l2, 0x80, &(0x7f0000004940)=[{&(0x7f0000004880)=""/143, 0x8f}], 0x1, &(0x7f0000004980)=""/142, 0x8e}}], 0x1, 0x0, 0x0) r2 = open(&(0x7f0000000000)='./bus\x00', 0x0, 0x0) sendfile(r0, r2, &(0x7f0000d83ff8), 0x8000fffffffe) [ 82.085312] FAT-fs (loop4): bogus number of reserved sectors [ 82.110355] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 82.137030] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 2018/04/30 20:09:07 executing program 2: ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000000)={'ifb0\x00'}) r0 = socket$nl_route(0x10, 0x3, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x509}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000005000)=[{&(0x7f0000000240)=""/1, 0x1}], 0x100000000000016d, 0x0) sendmsg$nl_route(r0, &(0x7f0000001cc0)={&(0x7f0000000080)={0x10}, 0xc, &(0x7f0000000200)={&(0x7f0000000380)=@newlink={0x28, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8, 0x1b}]}, 0x28}, 0x1}, 0x0) [ 82.158373] FAT-fs (loop6): bogus number of reserved sectors [ 82.158394] FAT-fs (loop6): Can't find a valid FAT filesystem [ 82.293097] FAT-fs (loop4): Can't find a valid FAT filesystem 2018/04/30 20:09:07 executing program 1: perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x72, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000100)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000180)='/dev/loop-control\x00', 0x20200, 0x0) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x0) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) syz_mount_image$ntfs(&(0x7f0000000440)='ntfs\x00', &(0x7f0000000480)='./bus\x00', 0x0, 0x0, &(0x7f0000000300), 0x0, &(0x7f0000000740)=ANY=[]) quotactl(0x0, &(0x7f0000000080)='./bus\x00', 0x0, &(0x7f0000000280)) 2018/04/30 20:09:07 executing program 6: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={&(0x7f0000000040)={0x10}, 0xc, &(0x7f0000000080)={&(0x7f0000022000)=@ipv6_delroute={0x24, 0x19, 0x60d, 0x0, 0x0, {0xa}, [@RTA_PRIORITY={0x8, 0x6, 0xffffffffffffffff}]}, 0x24}, 0x1}, 0x0) 2018/04/30 20:09:07 executing program 4: r0 = perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x72, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000100)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x200000002, 0x4b, 0x0, 0x108000001}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r1, 0x2405, r0) [ 82.717573] EXT4-fs (loop0): VFS: Can't find ext4 filesystem 2018/04/30 20:09:08 executing program 4: openat$ipvs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net\x00\x00\x00\x00\x00\x00\x00\a/expire_nodest_conn\x00', 0x2, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x4) getsockopt$inet_sctp_SCTP_DELAYED_SACK(0xffffffffffffffff, 0x84, 0x10, &(0x7f00000001c0)=@sack_info={0x0, 0x2, 0xfff}, &(0x7f0000000200)=0xc) setsockopt$inet_sctp_SCTP_RECONFIG_SUPPORTED(0xffffffffffffffff, 0x84, 0x75, &(0x7f0000000240)={0x0, 0x7}, 0x8) r0 = openat$keychord(0xffffffffffffff9c, &(0x7f0000000000)='/dev/keychord\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0xdce000)=nil, 0xdce000, 0x1000000007, 0x32, 0xffffffffffffffff, 0x0) getdents64(r0, &(0x7f0000000100)=""/164, 0xa4) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000280)) 2018/04/30 20:09:08 executing program 6: perf_event_open(&(0x7f000001d000)={0x2, 0x78, 0x71}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_fuseblk_mount(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000200)='./file0\x00', 0x200000006000, 0x0, 0x0, 0x0, 0x0, 0x0) preadv(r0, &(0x7f0000000040)=[{&(0x7f0000000240)=""/200, 0xc8}], 0x1, 0x0) syz_fuseblk_mount(&(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) 2018/04/30 20:09:08 executing program 1: perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x72, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000100)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000180)='/dev/loop-control\x00', 0x20200, 0x0) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x0) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) syz_mount_image$ntfs(&(0x7f0000000440)='ntfs\x00', &(0x7f0000000480)='./bus\x00', 0x0, 0x0, &(0x7f0000000300), 0x0, &(0x7f0000000740)=ANY=[]) quotactl(0x0, &(0x7f0000000080)='./bus\x00', 0x0, &(0x7f0000000280)) 2018/04/30 20:09:08 executing program 2: ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000000)={'ifb0\x00'}) r0 = socket$nl_route(0x10, 0x3, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x509}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000005000)=[{&(0x7f0000000240)=""/1, 0x1}], 0x100000000000016d, 0x0) sendmsg$nl_route(r0, &(0x7f0000001cc0)={&(0x7f0000000080)={0x10}, 0xc, &(0x7f0000000200)={&(0x7f0000000380)=@newlink={0x28, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8, 0x1b}]}, 0x28}, 0x1}, 0x0) 2018/04/30 20:09:08 executing program 0: r0 = perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) unshare(0x40000000) r1 = socket(0x0, 0xf, 0x1) sendto$ax25(r1, &(0x7f0000000140), 0x0, 0x20000000, &(0x7f0000000040)={0x3, {"65a21c61a839d6"}, 0x6}, 0x10) r2 = openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000000200)='/selinux/checkreqprot\x00', 0x2, 0x0) preadv(r1, &(0x7f00000014c0)=[{&(0x7f0000000240)=""/106, 0x6a}, {&(0x7f00000002c0)=""/73, 0x49}, {&(0x7f00000001c0)=""/39, 0x27}, {&(0x7f0000000340)=""/106, 0x6a}, {&(0x7f00000003c0)=""/243, 0xf3}, {&(0x7f00000004c0)=""/4096, 0x1000}], 0x6, 0x0) openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/commit_pending_bools\x00', 0x1, 0x0) ioctl$TIOCSBRK(r2, 0x5427) fcntl$getownex(r1, 0x10, &(0x7f00000015c0)={0x0, 0x0}) perf_event_open(&(0x7f0000000140)={0x6, 0x70, 0x40000, 0x8, 0x1, 0x10000, 0x0, 0x0, 0x1, 0x3, 0xfffffffffffffffd, 0x0, 0x9, 0x5, 0x8, 0x4, 0x0, 0x99, 0x8000, 0x6, 0xae, 0xb5, 0x8000, 0xb6a3, 0x7, 0x7, 0x2, 0xfffffffffffffff8, 0x0, 0xfffffffffffffff7, 0x8, 0x1, 0x2639, 0x24ce732f, 0xff, 0x22, 0x9, 0xe35, 0x0, 0xfff, 0x2, @perf_config_ext={0x0, 0x1000}, 0x11001, 0x7, 0x3, 0x7, 0x1, 0xe5, 0x3edf}, r3, 0x6, r0, 0x2) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="0004000000100000cc000000490b0000ec03000001000000000000000000000000200000002000000004000000000000e95dbe5a0000ffff53", 0x39, 0x400}], 0x0, &(0x7f0000012f00)) open$dir(&(0x7f0000000e40)='./file0//ile0\x00', 0x0, 0x0) readlink(&(0x7f0000001540)='./file0\x00', &(0x7f0000001600)=""/83, 0x53) truncate(&(0x7f0000000440)='./file0//ile0\x00', 0x0) 2018/04/30 20:09:08 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x2, &(0x7f0000000280)=0x242, 0x4) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f000012afe4)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) r2 = syz_open_pts(0xffffffffffffff9c, 0x0) ioctl$TIOCGSID(r2, 0x5429, &(0x7f0000000140)) r3 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(0xffffffffffffffff, 0x84, 0x18, &(0x7f0000000300)={0x0, 0x3}, &(0x7f0000000100)=0x8) r5 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000180)='/dev/loop-control\x00', 0x20200, 0x0) ioctl$LOOP_CTL_ADD(r5, 0x4c80, 0x0) tgkill(0x0, 0x0, 0x0) fallocate(r3, 0x0, 0x0, 0x92d) ioctl$LOOP_CTL_GET_FREE(r5, 0x4c82) ioctl$LOOP_CTL_REMOVE(r5, 0x4c81, 0x0) ioctl$LOOP_CTL_REMOVE(r5, 0x4c81, 0x0) r6 = openat$selinux_status(0xffffffffffffff9c, &(0x7f00000002c0)='/selinux/status\x00', 0x0, 0x0) ioctl$EVIOCSFF(r6, 0x40304580, &(0x7f0000000300)=ANY=[@ANYBLOB]) getsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(0xffffffffffffffff, 0x84, 0x6, &(0x7f00000001c0)={r4, @in={{0x2, 0x4e23, @multicast1=0xe0000001}}}, &(0x7f0000000280)=0x84) ioctl$PIO_UNIMAP(0xffffffffffffffff, 0x4b67, &(0x7f00000003c0)={0x2, &(0x7f0000000380)=[{0x5749}, {0x200, 0xfffffffffffffffd}]}) sendto$inet6(r0, &(0x7f0000eb9fff), 0xffffff31, 0x20000003, &(0x7f000031e000)={0xa, 0x4e22}, 0x1c) shutdown(r0, 0x1) 2018/04/30 20:09:08 executing program 7: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x2, &(0x7f0000000280)=0x242, 0x4) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f000012afe4)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) r2 = syz_open_pts(0xffffffffffffff9c, 0x0) ioctl$TIOCGSID(r2, 0x5429, &(0x7f0000000140)) r3 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(0xffffffffffffffff, 0x84, 0x18, &(0x7f0000000300)={0x0, 0x3}, &(0x7f0000000100)=0x8) r5 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000180)='/dev/loop-control\x00', 0x20200, 0x0) ioctl$LOOP_CTL_ADD(r5, 0x4c80, 0x0) tgkill(0x0, 0x0, 0x0) fallocate(r3, 0x0, 0x0, 0x92d) ioctl$LOOP_CTL_GET_FREE(r5, 0x4c82) ioctl$LOOP_CTL_REMOVE(r5, 0x4c81, 0x0) ioctl$LOOP_CTL_REMOVE(r5, 0x4c81, 0x0) r6 = openat$selinux_status(0xffffffffffffff9c, &(0x7f00000002c0)='/selinux/status\x00', 0x0, 0x0) ioctl$EVIOCSFF(r6, 0x40304580, &(0x7f0000000300)=ANY=[@ANYBLOB]) getsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(0xffffffffffffffff, 0x84, 0x6, &(0x7f00000001c0)={r4, @in={{0x2, 0x4e23, @multicast1=0xe0000001}}}, &(0x7f0000000280)=0x84) ioctl$PIO_UNIMAP(0xffffffffffffffff, 0x4b67, &(0x7f00000003c0)={0x2, &(0x7f0000000380)=[{0x5749}, {0x200, 0xfffffffffffffffd}]}) sendto$inet6(r0, &(0x7f0000eb9fff), 0xffffff31, 0x20000003, &(0x7f000031e000)={0xa, 0x4e22}, 0x1c) shutdown(r0, 0x1) 2018/04/30 20:09:08 executing program 5: r0 = memfd_create(&(0x7f000000e000)='\x00 ', 0x0) r1 = syz_open_dev$sndseq(&(0x7f0000000180)='/dev/snd/seq\x00', 0x0, 0x101801) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r0, 0x84, 0x6f, &(0x7f0000000100)={0x0, 0x2c, &(0x7f00000000c0)=[@in={0x2, 0x4e23}, @in6={0xa, 0x4e22, 0x5, @empty, 0x7}]}, &(0x7f0000000140)=0x10) pselect6(0x40, &(0x7f0000000080)={0x40, 0x6, 0x0, 0x8, 0x4, 0x80, 0x0, 0x7}, &(0x7f0000000280)={0x5, 0x0, 0x0, 0x80000000, 0xf4, 0x0, 0x81, 0x7}, &(0x7f00000002c0)={0x53f0}, &(0x7f0000000300)={0x0, 0x1c9c380}, &(0x7f0000000480)={&(0x7f0000000440), 0x8}) r2 = dup2(r1, r0) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r2, 0xc08c5332, &(0x7f000002b000)={0x0, 0x0, 0x0, "9ede7a8c5ae95ec8672c93340f643a664f13eeab65c0322901dc6bd36cde2c51f01b7f0b014f9f91eeb7c37c7240f476c8d753d000aa8faf8fb574dbcfa6dc4d"}) setsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x22, &(0x7f0000000940)={{{@in6=@mcast1={0xff, 0x1, [], 0x1}, @in6=@loopback={0x0, 0x1}, 0x0, 0x800, 0x4e21, 0x790, 0xa}, {0x3, 0x4, 0x0, 0x9, 0x4, 0xffffffffffffbf8a, 0x3ff, 0xff}, {0x0, 0x80000001, 0x5, 0x8}, 0x0, 0x0, 0x2, 0x1, 0x1, 0x2}, {{@in=@remote={0xac, 0x14, 0x14, 0xbb}, 0x0, 0xff}, 0x2, @in=@rand_addr, 0x0, 0x3, 0x2, 0x0, 0x0, 0x10001, 0x6}}, 0xe8) write$sndseq(r0, &(0x7f0000000080), 0xffffff17) sendmmsg(0xffffffffffffffff, &(0x7f00000004c0)=[{{&(0x7f0000000240)=@ll={0x11, 0xf, 0x0, 0x1, 0x101, 0x6}, 0x80, &(0x7f0000000340)=[{&(0x7f00000002c0)="d043fe83922ff8bcd1e826069830af42bdea147623dc2808beabb3b9be63a423774b8ce080bef5b037dd1b6fabb5dc73e68d78358a20ab477f387973b3e2ee", 0x3f}], 0x1, 0x0, 0x0, 0x8000}}], 0x1, 0x4) fcntl$setflags(r0, 0x2, 0x1) 2018/04/30 20:09:08 executing program 4: openat$ipvs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net\x00\x00\x00\x00\x00\x00\x00\a/expire_nodest_conn\x00', 0x2, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x4) getsockopt$inet_sctp_SCTP_DELAYED_SACK(0xffffffffffffffff, 0x84, 0x10, &(0x7f00000001c0)=@sack_info={0x0, 0x2, 0xfff}, &(0x7f0000000200)=0xc) setsockopt$inet_sctp_SCTP_RECONFIG_SUPPORTED(0xffffffffffffffff, 0x84, 0x75, &(0x7f0000000240)={0x0, 0x7}, 0x8) r0 = openat$keychord(0xffffffffffffff9c, &(0x7f0000000000)='/dev/keychord\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0xdce000)=nil, 0xdce000, 0x1000000007, 0x32, 0xffffffffffffffff, 0x0) getdents64(r0, &(0x7f0000000100)=""/164, 0xa4) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000280)) 2018/04/30 20:09:08 executing program 5: r0 = memfd_create(&(0x7f000000e000)='\x00 ', 0x0) r1 = syz_open_dev$sndseq(&(0x7f0000000180)='/dev/snd/seq\x00', 0x0, 0x101801) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r0, 0x84, 0x6f, &(0x7f0000000100)={0x0, 0x2c, &(0x7f00000000c0)=[@in={0x2, 0x4e23}, @in6={0xa, 0x4e22, 0x5, @empty, 0x7}]}, &(0x7f0000000140)=0x10) pselect6(0x40, &(0x7f0000000080)={0x40, 0x6, 0x0, 0x8, 0x4, 0x80, 0x0, 0x7}, &(0x7f0000000280)={0x5, 0x0, 0x0, 0x80000000, 0xf4, 0x0, 0x81, 0x7}, &(0x7f00000002c0)={0x53f0}, &(0x7f0000000300)={0x0, 0x1c9c380}, &(0x7f0000000480)={&(0x7f0000000440), 0x8}) r2 = dup2(r1, r0) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r2, 0xc08c5332, &(0x7f000002b000)={0x0, 0x0, 0x0, "9ede7a8c5ae95ec8672c93340f643a664f13eeab65c0322901dc6bd36cde2c51f01b7f0b014f9f91eeb7c37c7240f476c8d753d000aa8faf8fb574dbcfa6dc4d"}) setsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x22, &(0x7f0000000940)={{{@in6=@mcast1={0xff, 0x1, [], 0x1}, @in6=@loopback={0x0, 0x1}, 0x0, 0x800, 0x4e21, 0x790, 0xa}, {0x3, 0x4, 0x0, 0x9, 0x4, 0xffffffffffffbf8a, 0x3ff, 0xff}, {0x0, 0x80000001, 0x5, 0x8}, 0x0, 0x0, 0x2, 0x1, 0x1, 0x2}, {{@in=@remote={0xac, 0x14, 0x14, 0xbb}, 0x0, 0xff}, 0x2, @in=@rand_addr, 0x0, 0x3, 0x2, 0x0, 0x0, 0x10001, 0x6}}, 0xe8) write$sndseq(r0, &(0x7f0000000080), 0xffffff17) sendmmsg(0xffffffffffffffff, &(0x7f00000004c0)=[{{&(0x7f0000000240)=@ll={0x11, 0xf, 0x0, 0x1, 0x101, 0x6}, 0x80, &(0x7f0000000340)=[{&(0x7f00000002c0)="d043fe83922ff8bcd1e826069830af42bdea147623dc2808beabb3b9be63a423774b8ce080bef5b037dd1b6fabb5dc73e68d78358a20ab477f387973b3e2ee", 0x3f}], 0x1, 0x0, 0x0, 0x8000}}], 0x1, 0x4) fcntl$setflags(r0, 0x2, 0x1) 2018/04/30 20:09:08 executing program 2: ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000000)={'ifb0\x00'}) r0 = socket$nl_route(0x10, 0x3, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x509}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000005000)=[{&(0x7f0000000240)=""/1, 0x1}], 0x100000000000016d, 0x0) sendmsg$nl_route(r0, &(0x7f0000001cc0)={&(0x7f0000000080)={0x10}, 0xc, &(0x7f0000000200)={&(0x7f0000000380)=@newlink={0x28, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8, 0x1b}]}, 0x28}, 0x1}, 0x0) 2018/04/30 20:09:08 executing program 5: r0 = memfd_create(&(0x7f000000e000)='\x00 ', 0x0) r1 = syz_open_dev$sndseq(&(0x7f0000000180)='/dev/snd/seq\x00', 0x0, 0x101801) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r0, 0x84, 0x6f, &(0x7f0000000100)={0x0, 0x2c, &(0x7f00000000c0)=[@in={0x2, 0x4e23}, @in6={0xa, 0x4e22, 0x5, @empty, 0x7}]}, &(0x7f0000000140)=0x10) pselect6(0x40, &(0x7f0000000080)={0x40, 0x6, 0x0, 0x8, 0x4, 0x80, 0x0, 0x7}, &(0x7f0000000280)={0x5, 0x0, 0x0, 0x80000000, 0xf4, 0x0, 0x81, 0x7}, &(0x7f00000002c0)={0x53f0}, &(0x7f0000000300)={0x0, 0x1c9c380}, &(0x7f0000000480)={&(0x7f0000000440), 0x8}) r2 = dup2(r1, r0) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r2, 0xc08c5332, &(0x7f000002b000)={0x0, 0x0, 0x0, "9ede7a8c5ae95ec8672c93340f643a664f13eeab65c0322901dc6bd36cde2c51f01b7f0b014f9f91eeb7c37c7240f476c8d753d000aa8faf8fb574dbcfa6dc4d"}) setsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x22, &(0x7f0000000940)={{{@in6=@mcast1={0xff, 0x1, [], 0x1}, @in6=@loopback={0x0, 0x1}, 0x0, 0x800, 0x4e21, 0x790, 0xa}, {0x3, 0x4, 0x0, 0x9, 0x4, 0xffffffffffffbf8a, 0x3ff, 0xff}, {0x0, 0x80000001, 0x5, 0x8}, 0x0, 0x0, 0x2, 0x1, 0x1, 0x2}, {{@in=@remote={0xac, 0x14, 0x14, 0xbb}, 0x0, 0xff}, 0x2, @in=@rand_addr, 0x0, 0x3, 0x2, 0x0, 0x0, 0x10001, 0x6}}, 0xe8) write$sndseq(r0, &(0x7f0000000080), 0xffffff17) sendmmsg(0xffffffffffffffff, &(0x7f00000004c0)=[{{&(0x7f0000000240)=@ll={0x11, 0xf, 0x0, 0x1, 0x101, 0x6}, 0x80, &(0x7f0000000340)=[{&(0x7f00000002c0)="d043fe83922ff8bcd1e826069830af42bdea147623dc2808beabb3b9be63a423774b8ce080bef5b037dd1b6fabb5dc73e68d78358a20ab477f387973b3e2ee", 0x3f}], 0x1, 0x0, 0x0, 0x8000}}], 0x1, 0x4) fcntl$setflags(r0, 0x2, 0x1) 2018/04/30 20:09:08 executing program 4: openat$ipvs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net\x00\x00\x00\x00\x00\x00\x00\a/expire_nodest_conn\x00', 0x2, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x4) getsockopt$inet_sctp_SCTP_DELAYED_SACK(0xffffffffffffffff, 0x84, 0x10, &(0x7f00000001c0)=@sack_info={0x0, 0x2, 0xfff}, &(0x7f0000000200)=0xc) setsockopt$inet_sctp_SCTP_RECONFIG_SUPPORTED(0xffffffffffffffff, 0x84, 0x75, &(0x7f0000000240)={0x0, 0x7}, 0x8) r0 = openat$keychord(0xffffffffffffff9c, &(0x7f0000000000)='/dev/keychord\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0xdce000)=nil, 0xdce000, 0x1000000007, 0x32, 0xffffffffffffffff, 0x0) getdents64(r0, &(0x7f0000000100)=""/164, 0xa4) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000280)) 2018/04/30 20:09:08 executing program 5: r0 = memfd_create(&(0x7f000000e000)='\x00 ', 0x0) r1 = syz_open_dev$sndseq(&(0x7f0000000180)='/dev/snd/seq\x00', 0x0, 0x101801) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r0, 0x84, 0x6f, &(0x7f0000000100)={0x0, 0x2c, &(0x7f00000000c0)=[@in={0x2, 0x4e23}, @in6={0xa, 0x4e22, 0x5, @empty, 0x7}]}, &(0x7f0000000140)=0x10) pselect6(0x40, &(0x7f0000000080)={0x40, 0x6, 0x0, 0x8, 0x4, 0x80, 0x0, 0x7}, &(0x7f0000000280)={0x5, 0x0, 0x0, 0x80000000, 0xf4, 0x0, 0x81, 0x7}, &(0x7f00000002c0)={0x53f0}, &(0x7f0000000300)={0x0, 0x1c9c380}, &(0x7f0000000480)={&(0x7f0000000440), 0x8}) r2 = dup2(r1, r0) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r2, 0xc08c5332, &(0x7f000002b000)={0x0, 0x0, 0x0, "9ede7a8c5ae95ec8672c93340f643a664f13eeab65c0322901dc6bd36cde2c51f01b7f0b014f9f91eeb7c37c7240f476c8d753d000aa8faf8fb574dbcfa6dc4d"}) setsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x22, &(0x7f0000000940)={{{@in6=@mcast1={0xff, 0x1, [], 0x1}, @in6=@loopback={0x0, 0x1}, 0x0, 0x800, 0x4e21, 0x790, 0xa}, {0x3, 0x4, 0x0, 0x9, 0x4, 0xffffffffffffbf8a, 0x3ff, 0xff}, {0x0, 0x80000001, 0x5, 0x8}, 0x0, 0x0, 0x2, 0x1, 0x1, 0x2}, {{@in=@remote={0xac, 0x14, 0x14, 0xbb}, 0x0, 0xff}, 0x2, @in=@rand_addr, 0x0, 0x3, 0x2, 0x0, 0x0, 0x10001, 0x6}}, 0xe8) write$sndseq(r0, &(0x7f0000000080), 0xffffff17) sendmmsg(0xffffffffffffffff, &(0x7f00000004c0)=[{{&(0x7f0000000240)=@ll={0x11, 0xf, 0x0, 0x1, 0x101, 0x6}, 0x80, &(0x7f0000000340)=[{&(0x7f00000002c0)="d043fe83922ff8bcd1e826069830af42bdea147623dc2808beabb3b9be63a423774b8ce080bef5b037dd1b6fabb5dc73e68d78358a20ab477f387973b3e2ee", 0x3f}], 0x1, 0x0, 0x0, 0x8000}}], 0x1, 0x4) fcntl$setflags(r0, 0x2, 0x1) 2018/04/30 20:09:08 executing program 1: perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x72, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000100)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000180)='/dev/loop-control\x00', 0x20200, 0x0) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x0) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) syz_mount_image$ntfs(&(0x7f0000000440)='ntfs\x00', &(0x7f0000000480)='./bus\x00', 0x0, 0x0, &(0x7f0000000300), 0x0, &(0x7f0000000740)=ANY=[]) quotactl(0x0, &(0x7f0000000080)='./bus\x00', 0x0, &(0x7f0000000280)) 2018/04/30 20:09:08 executing program 4: openat$ipvs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net\x00\x00\x00\x00\x00\x00\x00\a/expire_nodest_conn\x00', 0x2, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x4) getsockopt$inet_sctp_SCTP_DELAYED_SACK(0xffffffffffffffff, 0x84, 0x10, &(0x7f00000001c0)=@sack_info={0x0, 0x2, 0xfff}, &(0x7f0000000200)=0xc) setsockopt$inet_sctp_SCTP_RECONFIG_SUPPORTED(0xffffffffffffffff, 0x84, 0x75, &(0x7f0000000240)={0x0, 0x7}, 0x8) r0 = openat$keychord(0xffffffffffffff9c, &(0x7f0000000000)='/dev/keychord\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0xdce000)=nil, 0xdce000, 0x1000000007, 0x32, 0xffffffffffffffff, 0x0) getdents64(r0, &(0x7f0000000100)=""/164, 0xa4) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000280)) [ 83.299236] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 83.329165] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 2018/04/30 20:09:08 executing program 5: r0 = memfd_create(&(0x7f000000e000)='\x00 ', 0x0) r1 = syz_open_dev$sndseq(&(0x7f0000000180)='/dev/snd/seq\x00', 0x0, 0x101801) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r0, 0x84, 0x6f, &(0x7f0000000100)={0x0, 0x2c, &(0x7f00000000c0)=[@in={0x2, 0x4e23}, @in6={0xa, 0x4e22, 0x5, @empty, 0x7}]}, &(0x7f0000000140)=0x10) pselect6(0x40, &(0x7f0000000080)={0x40, 0x6, 0x0, 0x8, 0x4, 0x80, 0x0, 0x7}, &(0x7f0000000280)={0x5, 0x0, 0x0, 0x80000000, 0xf4, 0x0, 0x81, 0x7}, &(0x7f00000002c0)={0x53f0}, &(0x7f0000000300)={0x0, 0x1c9c380}, &(0x7f0000000480)={&(0x7f0000000440), 0x8}) r2 = dup2(r1, r0) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r2, 0xc08c5332, &(0x7f000002b000)={0x0, 0x0, 0x0, "9ede7a8c5ae95ec8672c93340f643a664f13eeab65c0322901dc6bd36cde2c51f01b7f0b014f9f91eeb7c37c7240f476c8d753d000aa8faf8fb574dbcfa6dc4d"}) setsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x22, &(0x7f0000000940)={{{@in6=@mcast1={0xff, 0x1, [], 0x1}, @in6=@loopback={0x0, 0x1}, 0x0, 0x800, 0x4e21, 0x790, 0xa}, {0x3, 0x4, 0x0, 0x9, 0x4, 0xffffffffffffbf8a, 0x3ff, 0xff}, {0x0, 0x80000001, 0x5, 0x8}, 0x0, 0x0, 0x2, 0x1, 0x1, 0x2}, {{@in=@remote={0xac, 0x14, 0x14, 0xbb}, 0x0, 0xff}, 0x2, @in=@rand_addr, 0x0, 0x3, 0x2, 0x0, 0x0, 0x10001, 0x6}}, 0xe8) write$sndseq(r0, &(0x7f0000000080), 0xffffff17) sendmmsg(0xffffffffffffffff, &(0x7f00000004c0)=[{{&(0x7f0000000240)=@ll={0x11, 0xf, 0x0, 0x1, 0x101, 0x6}, 0x80, &(0x7f0000000340)=[{&(0x7f00000002c0)="d043fe83922ff8bcd1e826069830af42bdea147623dc2808beabb3b9be63a423774b8ce080bef5b037dd1b6fabb5dc73e68d78358a20ab477f387973b3e2ee", 0x3f}], 0x1, 0x0, 0x0, 0x8000}}], 0x1, 0x4) fcntl$setflags(r0, 0x2, 0x1) 2018/04/30 20:09:08 executing program 6: perf_event_open(&(0x7f000001d000)={0x2, 0x78, 0x71}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_fuseblk_mount(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000200)='./file0\x00', 0x200000006000, 0x0, 0x0, 0x0, 0x0, 0x0) preadv(r0, &(0x7f0000000040)=[{&(0x7f0000000240)=""/200, 0xc8}], 0x1, 0x0) syz_fuseblk_mount(&(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) 2018/04/30 20:09:08 executing program 5: r0 = memfd_create(&(0x7f000000e000)='\x00 ', 0x0) r1 = syz_open_dev$sndseq(&(0x7f0000000180)='/dev/snd/seq\x00', 0x0, 0x101801) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r0, 0x84, 0x6f, &(0x7f0000000100)={0x0, 0x2c, &(0x7f00000000c0)=[@in={0x2, 0x4e23}, @in6={0xa, 0x4e22, 0x5, @empty, 0x7}]}, &(0x7f0000000140)=0x10) pselect6(0x40, &(0x7f0000000080)={0x40, 0x6, 0x0, 0x8, 0x4, 0x80, 0x0, 0x7}, &(0x7f0000000280)={0x5, 0x0, 0x0, 0x80000000, 0xf4, 0x0, 0x81, 0x7}, &(0x7f00000002c0)={0x53f0}, &(0x7f0000000300)={0x0, 0x1c9c380}, &(0x7f0000000480)={&(0x7f0000000440), 0x8}) r2 = dup2(r1, r0) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r2, 0xc08c5332, &(0x7f000002b000)={0x0, 0x0, 0x0, "9ede7a8c5ae95ec8672c93340f643a664f13eeab65c0322901dc6bd36cde2c51f01b7f0b014f9f91eeb7c37c7240f476c8d753d000aa8faf8fb574dbcfa6dc4d"}) setsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x22, &(0x7f0000000940)={{{@in6=@mcast1={0xff, 0x1, [], 0x1}, @in6=@loopback={0x0, 0x1}, 0x0, 0x800, 0x4e21, 0x790, 0xa}, {0x3, 0x4, 0x0, 0x9, 0x4, 0xffffffffffffbf8a, 0x3ff, 0xff}, {0x0, 0x80000001, 0x5, 0x8}, 0x0, 0x0, 0x2, 0x1, 0x1, 0x2}, {{@in=@remote={0xac, 0x14, 0x14, 0xbb}, 0x0, 0xff}, 0x2, @in=@rand_addr, 0x0, 0x3, 0x2, 0x0, 0x0, 0x10001, 0x6}}, 0xe8) write$sndseq(r0, &(0x7f0000000080), 0xffffff17) sendmmsg(0xffffffffffffffff, &(0x7f00000004c0)=[{{&(0x7f0000000240)=@ll={0x11, 0xf, 0x0, 0x1, 0x101, 0x6}, 0x80, &(0x7f0000000340)=[{&(0x7f00000002c0)="d043fe83922ff8bcd1e826069830af42bdea147623dc2808beabb3b9be63a423774b8ce080bef5b037dd1b6fabb5dc73e68d78358a20ab477f387973b3e2ee", 0x3f}], 0x1, 0x0, 0x0, 0x8000}}], 0x1, 0x4) fcntl$setflags(r0, 0x2, 0x1) 2018/04/30 20:09:08 executing program 5: r0 = memfd_create(&(0x7f000000e000)='\x00 ', 0x0) r1 = syz_open_dev$sndseq(&(0x7f0000000180)='/dev/snd/seq\x00', 0x0, 0x101801) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r0, 0x84, 0x6f, &(0x7f0000000100)={0x0, 0x2c, &(0x7f00000000c0)=[@in={0x2, 0x4e23}, @in6={0xa, 0x4e22, 0x5, @empty, 0x7}]}, &(0x7f0000000140)=0x10) pselect6(0x40, &(0x7f0000000080)={0x40, 0x6, 0x0, 0x8, 0x4, 0x80, 0x0, 0x7}, &(0x7f0000000280)={0x5, 0x0, 0x0, 0x80000000, 0xf4, 0x0, 0x81, 0x7}, &(0x7f00000002c0)={0x53f0}, &(0x7f0000000300)={0x0, 0x1c9c380}, &(0x7f0000000480)={&(0x7f0000000440), 0x8}) r2 = dup2(r1, r0) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r2, 0xc08c5332, &(0x7f000002b000)={0x0, 0x0, 0x0, "9ede7a8c5ae95ec8672c93340f643a664f13eeab65c0322901dc6bd36cde2c51f01b7f0b014f9f91eeb7c37c7240f476c8d753d000aa8faf8fb574dbcfa6dc4d"}) setsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x22, &(0x7f0000000940)={{{@in6=@mcast1={0xff, 0x1, [], 0x1}, @in6=@loopback={0x0, 0x1}, 0x0, 0x800, 0x4e21, 0x790, 0xa}, {0x3, 0x4, 0x0, 0x9, 0x4, 0xffffffffffffbf8a, 0x3ff, 0xff}, {0x0, 0x80000001, 0x5, 0x8}, 0x0, 0x0, 0x2, 0x1, 0x1, 0x2}, {{@in=@remote={0xac, 0x14, 0x14, 0xbb}, 0x0, 0xff}, 0x2, @in=@rand_addr, 0x0, 0x3, 0x2, 0x0, 0x0, 0x10001, 0x6}}, 0xe8) write$sndseq(r0, &(0x7f0000000080), 0xffffff17) sendmmsg(0xffffffffffffffff, &(0x7f00000004c0)=[{{&(0x7f0000000240)=@ll={0x11, 0xf, 0x0, 0x1, 0x101, 0x6}, 0x80, &(0x7f0000000340)=[{&(0x7f00000002c0)="d043fe83922ff8bcd1e826069830af42bdea147623dc2808beabb3b9be63a423774b8ce080bef5b037dd1b6fabb5dc73e68d78358a20ab477f387973b3e2ee", 0x3f}], 0x1, 0x0, 0x0, 0x8000}}], 0x1, 0x4) fcntl$setflags(r0, 0x2, 0x1) [ 83.773959] IPVS: Creating netns size=2536 id=12 [ 83.882820] EXT4-fs (loop0): VFS: Can't find ext4 filesystem 2018/04/30 20:09:08 executing program 2: ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000000)={'ifb0\x00'}) r0 = socket$nl_route(0x10, 0x3, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x509}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000005000)=[{&(0x7f0000000240)=""/1, 0x1}], 0x100000000000016d, 0x0) sendmsg$nl_route(r0, &(0x7f0000001cc0)={&(0x7f0000000080)={0x10}, 0xc, &(0x7f0000000200)={&(0x7f0000000380)=@newlink={0x28, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8, 0x1b}]}, 0x28}, 0x1}, 0x0) 2018/04/30 20:09:08 executing program 0: r0 = perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) unshare(0x40000000) r1 = socket(0x0, 0xf, 0x1) sendto$ax25(r1, &(0x7f0000000140), 0x0, 0x20000000, &(0x7f0000000040)={0x3, {"65a21c61a839d6"}, 0x6}, 0x10) r2 = openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000000200)='/selinux/checkreqprot\x00', 0x2, 0x0) preadv(r1, &(0x7f00000014c0)=[{&(0x7f0000000240)=""/106, 0x6a}, {&(0x7f00000002c0)=""/73, 0x49}, {&(0x7f00000001c0)=""/39, 0x27}, {&(0x7f0000000340)=""/106, 0x6a}, {&(0x7f00000003c0)=""/243, 0xf3}, {&(0x7f00000004c0)=""/4096, 0x1000}], 0x6, 0x0) openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/commit_pending_bools\x00', 0x1, 0x0) ioctl$TIOCSBRK(r2, 0x5427) fcntl$getownex(r1, 0x10, &(0x7f00000015c0)={0x0, 0x0}) perf_event_open(&(0x7f0000000140)={0x6, 0x70, 0x40000, 0x8, 0x1, 0x10000, 0x0, 0x0, 0x1, 0x3, 0xfffffffffffffffd, 0x0, 0x9, 0x5, 0x8, 0x4, 0x0, 0x99, 0x8000, 0x6, 0xae, 0xb5, 0x8000, 0xb6a3, 0x7, 0x7, 0x2, 0xfffffffffffffff8, 0x0, 0xfffffffffffffff7, 0x8, 0x1, 0x2639, 0x24ce732f, 0xff, 0x22, 0x9, 0xe35, 0x0, 0xfff, 0x2, @perf_config_ext={0x0, 0x1000}, 0x11001, 0x7, 0x3, 0x7, 0x1, 0xe5, 0x3edf}, r3, 0x6, r0, 0x2) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="0004000000100000cc000000490b0000ec03000001000000000000000000000000200000002000000004000000000000e95dbe5a0000ffff53", 0x39, 0x400}], 0x0, &(0x7f0000012f00)) open$dir(&(0x7f0000000e40)='./file0//ile0\x00', 0x0, 0x0) readlink(&(0x7f0000001540)='./file0\x00', &(0x7f0000001600)=""/83, 0x53) truncate(&(0x7f0000000440)='./file0//ile0\x00', 0x0) 2018/04/30 20:09:08 executing program 6: perf_event_open(&(0x7f000001d000)={0x2, 0x78, 0x71}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_fuseblk_mount(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000200)='./file0\x00', 0x200000006000, 0x0, 0x0, 0x0, 0x0, 0x0) preadv(r0, &(0x7f0000000040)=[{&(0x7f0000000240)=""/200, 0xc8}], 0x1, 0x0) syz_fuseblk_mount(&(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) 2018/04/30 20:09:08 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$inet_MCAST_JOIN_GROUP(r0, 0x0, 0x2a, &(0x7f0000008000)={0x1, {{0x2, 0x0, @multicast2=0xe0000002}}}, 0x90) r1 = socket$inet_udp(0x2, 0x2, 0x0) dup2(r0, r1) setsockopt$inet_group_source_req(r0, 0x0, 0x2e, &(0x7f0000000000)={0x6, {{0x2, 0x0, @multicast1=0xe0000001}}, {{0x2, 0x0, @rand_addr}}}, 0x108) getsockopt$inet_buf(r1, 0x0, 0x30, &(0x7f0000008000)=""/144, &(0x7f0000004000)=0x90) 2018/04/30 20:09:08 executing program 7: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x2, &(0x7f0000000280)=0x242, 0x4) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f000012afe4)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) r2 = syz_open_pts(0xffffffffffffff9c, 0x0) ioctl$TIOCGSID(r2, 0x5429, &(0x7f0000000140)) r3 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(0xffffffffffffffff, 0x84, 0x18, &(0x7f0000000300)={0x0, 0x3}, &(0x7f0000000100)=0x8) r5 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000180)='/dev/loop-control\x00', 0x20200, 0x0) ioctl$LOOP_CTL_ADD(r5, 0x4c80, 0x0) tgkill(0x0, 0x0, 0x0) fallocate(r3, 0x0, 0x0, 0x92d) ioctl$LOOP_CTL_GET_FREE(r5, 0x4c82) ioctl$LOOP_CTL_REMOVE(r5, 0x4c81, 0x0) ioctl$LOOP_CTL_REMOVE(r5, 0x4c81, 0x0) r6 = openat$selinux_status(0xffffffffffffff9c, &(0x7f00000002c0)='/selinux/status\x00', 0x0, 0x0) ioctl$EVIOCSFF(r6, 0x40304580, &(0x7f0000000300)=ANY=[@ANYBLOB]) getsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(0xffffffffffffffff, 0x84, 0x6, &(0x7f00000001c0)={r4, @in={{0x2, 0x4e23, @multicast1=0xe0000001}}}, &(0x7f0000000280)=0x84) ioctl$PIO_UNIMAP(0xffffffffffffffff, 0x4b67, &(0x7f00000003c0)={0x2, &(0x7f0000000380)=[{0x5749}, {0x200, 0xfffffffffffffffd}]}) sendto$inet6(r0, &(0x7f0000eb9fff), 0xffffff31, 0x20000003, &(0x7f000031e000)={0xa, 0x4e22}, 0x1c) shutdown(r0, 0x1) 2018/04/30 20:09:08 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x2, &(0x7f0000000280)=0x242, 0x4) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f000012afe4)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) r2 = syz_open_pts(0xffffffffffffff9c, 0x0) ioctl$TIOCGSID(r2, 0x5429, &(0x7f0000000140)) r3 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(0xffffffffffffffff, 0x84, 0x18, &(0x7f0000000300)={0x0, 0x3}, &(0x7f0000000100)=0x8) r5 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000180)='/dev/loop-control\x00', 0x20200, 0x0) ioctl$LOOP_CTL_ADD(r5, 0x4c80, 0x0) tgkill(0x0, 0x0, 0x0) fallocate(r3, 0x0, 0x0, 0x92d) ioctl$LOOP_CTL_GET_FREE(r5, 0x4c82) ioctl$LOOP_CTL_REMOVE(r5, 0x4c81, 0x0) ioctl$LOOP_CTL_REMOVE(r5, 0x4c81, 0x0) r6 = openat$selinux_status(0xffffffffffffff9c, &(0x7f00000002c0)='/selinux/status\x00', 0x0, 0x0) ioctl$EVIOCSFF(r6, 0x40304580, &(0x7f0000000300)=ANY=[@ANYBLOB]) getsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(0xffffffffffffffff, 0x84, 0x6, &(0x7f00000001c0)={r4, @in={{0x2, 0x4e23, @multicast1=0xe0000001}}}, &(0x7f0000000280)=0x84) ioctl$PIO_UNIMAP(0xffffffffffffffff, 0x4b67, &(0x7f00000003c0)={0x2, &(0x7f0000000380)=[{0x5749}, {0x200, 0xfffffffffffffffd}]}) sendto$inet6(r0, &(0x7f0000eb9fff), 0xffffff31, 0x20000003, &(0x7f000031e000)={0xa, 0x4e22}, 0x1c) shutdown(r0, 0x1) 2018/04/30 20:09:08 executing program 1: openat$ipvs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net\x00\x00\x00\x00\x00\x00\x00\a/expire_nodest_conn\x00', 0x2, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x4) getsockopt$inet_sctp_SCTP_DELAYED_SACK(0xffffffffffffffff, 0x84, 0x10, &(0x7f00000001c0)=@sack_info={0x0, 0x2, 0xfff}, &(0x7f0000000200)=0xc) setsockopt$inet_sctp_SCTP_RECONFIG_SUPPORTED(0xffffffffffffffff, 0x84, 0x75, &(0x7f0000000240)={0x0, 0x7}, 0x8) r0 = openat$keychord(0xffffffffffffff9c, &(0x7f0000000000)='/dev/keychord\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0xdce000)=nil, 0xdce000, 0x1000000007, 0x32, 0xffffffffffffffff, 0x0) getdents64(r0, &(0x7f0000000100)=""/164, 0xa4) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000280)) 2018/04/30 20:09:08 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_int(r0, 0x0, 0x15, &(0x7f0000000040), 0x0) 2018/04/30 20:09:08 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x2, &(0x7f0000000280)=0x242, 0x4) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f000012afe4)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) r2 = syz_open_pts(0xffffffffffffff9c, 0x0) ioctl$TIOCGSID(r2, 0x5429, &(0x7f0000000140)) r3 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(0xffffffffffffffff, 0x84, 0x18, &(0x7f0000000300)={0x0}, &(0x7f0000000100)=0x8) r5 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000180)='/dev/loop-control\x00', 0x20200, 0x0) ioctl$LOOP_CTL_ADD(r5, 0x4c80, 0x0) eventfd2(0x0, 0x0) fallocate(r3, 0x0, 0x0, 0x92d) ioctl$LOOP_CTL_REMOVE(r5, 0x4c81, 0x0) ioctl$LOOP_CTL_REMOVE(r5, 0x4c81, 0x0) openat$selinux_status(0xffffffffffffff9c, &(0x7f00000002c0)='/selinux/status\x00', 0x0, 0x0) getsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(0xffffffffffffffff, 0x84, 0x6, &(0x7f00000001c0)={r4, @in={{0x2, 0x4e23, @multicast1=0xe0000001}}}, &(0x7f0000000280)=0x84) ioctl$PIO_UNIMAP(0xffffffffffffffff, 0x4b67, &(0x7f00000003c0)={0x2, &(0x7f0000000380)=[{0x5749}, {0x200, 0xfffffffffffffffd}]}) sendto$inet6(r0, &(0x7f0000eb9fff), 0xffffff31, 0x20000003, &(0x7f000031e000)={0xa, 0x4e22}, 0x1c) shutdown(r0, 0x1) 2018/04/30 20:09:08 executing program 1: openat$ipvs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net\x00\x00\x00\x00\x00\x00\x00\a/expire_nodest_conn\x00', 0x2, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x4) getsockopt$inet_sctp_SCTP_DELAYED_SACK(0xffffffffffffffff, 0x84, 0x10, &(0x7f00000001c0)=@sack_info={0x0, 0x2, 0xfff}, &(0x7f0000000200)=0xc) setsockopt$inet_sctp_SCTP_RECONFIG_SUPPORTED(0xffffffffffffffff, 0x84, 0x75, &(0x7f0000000240)={0x0, 0x7}, 0x8) r0 = openat$keychord(0xffffffffffffff9c, &(0x7f0000000000)='/dev/keychord\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0xdce000)=nil, 0xdce000, 0x1000000007, 0x32, 0xffffffffffffffff, 0x0) getdents64(r0, &(0x7f0000000100)=""/164, 0xa4) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000280)) 2018/04/30 20:09:09 executing program 1: openat$ipvs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net\x00\x00\x00\x00\x00\x00\x00\a/expire_nodest_conn\x00', 0x2, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x4) getsockopt$inet_sctp_SCTP_DELAYED_SACK(0xffffffffffffffff, 0x84, 0x10, &(0x7f00000001c0)=@sack_info={0x0, 0x2, 0xfff}, &(0x7f0000000200)=0xc) setsockopt$inet_sctp_SCTP_RECONFIG_SUPPORTED(0xffffffffffffffff, 0x84, 0x75, &(0x7f0000000240)={0x0, 0x7}, 0x8) r0 = openat$keychord(0xffffffffffffff9c, &(0x7f0000000000)='/dev/keychord\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0xdce000)=nil, 0xdce000, 0x1000000007, 0x32, 0xffffffffffffffff, 0x0) getdents64(r0, &(0x7f0000000100)=""/164, 0xa4) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000280)) 2018/04/30 20:09:09 executing program 4: r0 = syz_open_procfs(0x0, &(0x7f0000000000)='ns\x00') getdents(r0, &(0x7f00000000c0)=""/24, 0x18) getdents(r0, &(0x7f0000000040)=""/70, 0x46) 2018/04/30 20:09:09 executing program 2: add_key(&(0x7f0000000280)='dns_resolver\x00', &(0x7f00000002c0)={0x73, 0x79, 0x7a, 0xffffffffffffffff, 0xfffffe00}, &(0x7f0000000300), 0xfffff, 0xfffffffffffffffd) clock_gettime(0x0, &(0x7f0000000080)) keyctl$instantiate_iov(0x14, 0x0, &(0x7f00000005c0)=[{&(0x7f0000000580)}], 0x1, 0x0) [ 84.219113] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 2018/04/30 20:09:09 executing program 1: perf_event_open(&(0x7f0000000040)={0x1, 0x443, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket(0x0, 0x0, 0x0) r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000480)={0xf97cff8c, 0x8, 'SE Linux'}, 0x10) unshare(0x40600) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000000c0)='cgroup.events\x00', 0x0, 0x0) ioctl$TIOCLINUX3(r1, 0x541c, &(0x7f0000000100)=0x3) r2 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000e4dff1)='/dev/sequencer\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, r2) [ 84.364183] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 84.388780] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 84.882430] EXT4-fs (loop0): VFS: Can't find ext4 filesystem [ 88.930352] pktgen: kernel_thread() failed for cpu 0 [ 88.935500] pktgen: Cannot create thread for cpu 0 (-4) [ 88.941022] pktgen: kernel_thread() failed for cpu 1 [ 88.946117] pktgen: Cannot create thread for cpu 1 (-4) [ 88.951551] pktgen: Initialization failed for all threads [ 89.052333] IPVS: Creating netns size=2536 id=13 [ 89.220214] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 89.234168] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 89.292534] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 89.311981] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 89.369695] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 89.384878] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 89.399444] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 89.414610] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 90.037554] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 90.069650] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 90.075775] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 90.083654] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready 2018/04/30 20:09:15 executing program 4: r0 = syz_open_procfs(0x0, &(0x7f0000000000)='ns\x00') getdents(r0, &(0x7f00000000c0)=""/24, 0x18) getdents(r0, &(0x7f0000000040)=""/70, 0x46) 2018/04/30 20:09:15 executing program 2: getuid() r0 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer\x00', 0x80000, 0x0) fcntl$setownex(0xffffffffffffffff, 0xf, &(0x7f0000000240)) ioctl$SNDRV_SEQ_IOCTL_GET_SUBSCRIPTION(r0, 0xc0505350, &(0x7f0000000880)={{0x100000000}, {}, 0x9e, 0x1, 0xd5}) tee(r0, 0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$DRM_IOCTL_GEM_OPEN(r0, 0xc010640b, &(0x7f0000000180)) setsockopt$inet_icmp_ICMP_FILTER(0xffffffffffffffff, 0x1, 0x1, &(0x7f0000000700)={0x3}, 0x4) ioctl$EVIOCGREP(r0, 0x80084503, &(0x7f0000000280)=""/181) ioctl$sock_inet_SIOCSIFADDR(r0, 0x8916, &(0x7f0000000940)={'irlan0\x00', {0x2, 0x4e20, @broadcast=0xffffffff}}) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup.cpu/syz1\x00', 0x1ff) ioctl$TCSETSW(r0, 0x5403, &(0x7f00000007c0)={0x0, 0x2, 0x6, 0x0, 0x5, 0x5, 0x7, 0x1f, 0x0, 0x0, 0x7fffffff, 0x100}) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f00007b6ff7)='/dev/ppp\x00', 0x0, 0x0) r2 = creat(&(0x7f0000002540)='./file0\x00', 0x0) ioctl$DRM_IOCTL_RES_CTX(0xffffffffffffffff, 0xc0106426, &(0x7f0000000040)={0x5, &(0x7f0000000000)=[{}, {}, {}, {}, {}]}) ioctl$fiemap(r2, 0x40086602, &(0x7f0000000040)=ANY=[]) r3 = creat(&(0x7f0000000080)='./file0\x00', 0x0) write$cgroup_pid(r3, &(0x7f0000000100)=ANY=[], 0x1023c) ioctl$EVIOCGPROP(r1, 0xc004743e, &(0x7f0000000480)=""/246) ptrace$setregs(0xf, 0x0, 0x100000001, &(0x7f0000000980)="6a02a1cfd5b8d47f69c3813cb3bef87924e52ceb94ac19761603a56d1634abf66d6bbe6b7baa809b4d6de920a2f77145") ioctl$EVIOCGREP(r1, 0x4004743c, &(0x7f00000003c0)=""/174) 2018/04/30 20:09:15 executing program 1: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x72, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000100)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_pts(0xffffffffffffffff, 0x0) setsockopt$inet6_MRT6_ADD_MFC(r0, 0x29, 0xcc, &(0x7f00000000c0)={{0xa, 0x0, 0x0, @dev={0xfe, 0x80}}, {0xa, 0x0, 0x0, @mcast1={0xff, 0x1, [], 0x1}}}, 0x5c) 2018/04/30 20:09:15 executing program 7: r0 = syz_open_dev$sndseq(&(0x7f0000000080)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r0, 0xc08c5332, &(0x7f0000b0bf74)={0x0, 0x0, 0x0, 'queue0\x00'}) r1 = memfd_create(&(0x7f0000000200)='queue0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x71}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = syz_open_dev$sndseq(&(0x7f00000000c0)='/dev/snd/seq\x00', 0x0, 0x8000000040102) r3 = dup2(r2, r2) write$sndseq(r1, &(0x7f0000e6ffd0)=[{0x0, 0x0, 0x0, 0x80003fd}], 0x30) sendfile(r3, r1, &(0x7f0000000040), 0x80000000) 2018/04/30 20:09:15 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x2, &(0x7f0000000280)=0x242, 0x4) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f000012afe4)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) r2 = syz_open_pts(0xffffffffffffff9c, 0x0) ioctl$TIOCGSID(r2, 0x5429, &(0x7f0000000140)) r3 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(0xffffffffffffffff, 0x84, 0x18, &(0x7f0000000300)={0x0}, &(0x7f0000000100)=0x8) r5 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000180)='/dev/loop-control\x00', 0x20200, 0x0) ioctl$LOOP_CTL_ADD(r5, 0x4c80, 0x0) eventfd2(0x0, 0x0) fallocate(r3, 0x0, 0x0, 0x92d) ioctl$LOOP_CTL_REMOVE(r5, 0x4c81, 0x0) ioctl$LOOP_CTL_REMOVE(r5, 0x4c81, 0x0) openat$selinux_status(0xffffffffffffff9c, &(0x7f00000002c0)='/selinux/status\x00', 0x0, 0x0) getsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(0xffffffffffffffff, 0x84, 0x6, &(0x7f00000001c0)={r4, @in={{0x2, 0x4e23, @multicast1=0xe0000001}}}, &(0x7f0000000280)=0x84) ioctl$PIO_UNIMAP(0xffffffffffffffff, 0x4b67, &(0x7f00000003c0)={0x2, &(0x7f0000000380)=[{0x5749}, {0x200, 0xfffffffffffffffd}]}) sendto$inet6(r0, &(0x7f0000eb9fff), 0xffffff31, 0x20000003, &(0x7f000031e000)={0xa, 0x4e22}, 0x1c) shutdown(r0, 0x1) 2018/04/30 20:09:15 executing program 3: listen(0xffffffffffffffff, 0x0) accept4(0xffffffffffffffff, &(0x7f0000001a00)=@un=@abs, &(0x7f00000000c0)=0x80, 0x0) r0 = gettid() capset(&(0x7f0000000000)={0x19980330, r0}, &(0x7f0000000040)={0x5, 0x7ff, 0x8, 0x0, 0xfffffffffffffc00, 0xfd8}) 2018/04/30 20:09:15 executing program 6: perf_event_open(&(0x7f000001d000)={0x2, 0x78, 0x71}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_fuseblk_mount(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000200)='./file0\x00', 0x200000006000, 0x0, 0x0, 0x0, 0x0, 0x0) preadv(r0, &(0x7f0000000040)=[{&(0x7f0000000240)=""/200, 0xc8}], 0x1, 0x0) syz_fuseblk_mount(&(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) 2018/04/30 20:09:15 executing program 0: r0 = openat$sequencer2(0xffffffffffffff9c, &(0x7f000026b000)='/dev/sequencer2\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0xf50000)=nil, 0xf50000, 0x0, 0x32, 0xffffffffffffffff, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_SUBSCRIPTION(r0, 0x40085112, &(0x7f000000efb0)) 2018/04/30 20:09:15 executing program 4: r0 = syz_open_procfs(0x0, &(0x7f0000000000)='ns\x00') getdents(r0, &(0x7f00000000c0)=""/24, 0x18) getdents(r0, &(0x7f0000000040)=""/70, 0x46) 2018/04/30 20:09:15 executing program 4: r0 = syz_open_procfs(0x0, &(0x7f0000000000)='ns\x00') getdents(r0, &(0x7f00000000c0)=""/24, 0x18) getdents(r0, &(0x7f0000000040)=""/70, 0x46) 2018/04/30 20:09:15 executing program 0: r0 = syz_open_procfs(0x0, &(0x7f0000000000)='ns\x00') getdents(r0, &(0x7f00000000c0)=""/24, 0x18) getdents(r0, &(0x7f0000000040)=""/70, 0x46) 2018/04/30 20:09:15 executing program 3: rt_sigaction(0x7, &(0x7f0000000080)={0x42a53c, {0xfffffffffffffff9}}, &(0x7f0000000040), 0x8, &(0x7f0000000000)) mmap(&(0x7f0000000000/0x95c000)=nil, 0x95c000, 0x4, 0x44031, 0xffffffffffffffff, 0x0) syz_open_procfs(0x0, &(0x7f0000000200)="6e65e026cdc17000") 2018/04/30 20:09:15 executing program 1: perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x71}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000000200)='/selinux/checkreqprot\x00', 0x0, 0x0) tee(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) mq_open(&(0x7f0000000180)="2c6370757365746b657972696e676574683023656d307b6367726f757076626f786e657430a6656d307070703062646576656d3000", 0x0, 0x0, &(0x7f00000001c0)={0x0, 0x3f}) read(r0, &(0x7f0000000040)=""/222, 0xde) 2018/04/30 20:09:15 executing program 0: r0 = syz_open_procfs(0x0, &(0x7f0000000000)='ns\x00') getdents(r0, &(0x7f00000000c0)=""/24, 0x18) getdents(r0, &(0x7f0000000040)=""/70, 0x46) 2018/04/30 20:09:15 executing program 4: perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x72, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000100)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000340)='loginuid\x00') setsockopt$netrom_NETROM_IDLE(r2, 0x103, 0x7, &(0x7f00000005c0)=0xffff, 0x10f) ioctl$KDDISABIO(r2, 0x4b37) getpgid(0x0) ioprio_get$pid(0x3, 0x0) ioctl$BINDER_WRITE_READ(r2, 0xc0306201, &(0x7f00000008c0)={0x7f, 0x0, &(0x7f0000000940)=ANY=[@ANYBLOB="016340400300000000000000020000000000000000000000010000000000000000000000400008000000000000000000000000006e5a27226267e82cd9c8caa0ae534502fead4df4063024733ee1ea1720322f5f8261b2d6cf857203ea3afc77d7f80723863a91777806eb362c7fd054df27389631db6a", @ANYPTR=&(0x7f00000007c0)=ANY=[@ANYBLOB="38000000000000004000000000000000a5c3bf2020e7cac800000000000000000000000000000000380000000000000038000000000000004800000000000000"]], 0x2f, 0x0, &(0x7f0000000880)="2853287fb4fb169d6148e737e9836a03444ae27fa5581ba1fc4afcfe658dfe949502459ed76adc3697e59b024aba87"}) getsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(0xffffffffffffffff, 0x84, 0x18, &(0x7f00000000c0), &(0x7f0000000100)=0x3cb) r3 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000180)='/dev/loop-control\x00', 0x20200, 0x0) prctl$getname(0x10, &(0x7f00000024c0)=""/144) ioctl$LOOP_CTL_ADD(r3, 0x4c80, 0x0) tgkill(0x0, 0x0, 0x0) pipe2(&(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) fallocate(r1, 0x2, 0x2, 0x92d) ioctl$LOOP_CTL_REMOVE(r3, 0x4c81, 0x0) getsockopt$inet_tcp_int(r0, 0x6, 0x5, &(0x7f00000001c0), &(0x7f0000000200)=0x4) getsockopt$netlink(r5, 0x10e, 0x7, &(0x7f0000000600)=""/122, &(0x7f0000000300)=0x7a) prctl$setptracer(0x59616d61, 0x0) ioctl$LOOP_CTL_GET_FREE(r2, 0x4c82) r6 = ioctl$LOOP_CTL_GET_FREE(r5, 0x4c82) ioctl$LOOP_CTL_REMOVE(r3, 0x4c81, r6) ioctl$VT_OPENQRY(0xffffffffffffffff, 0x5600, &(0x7f0000000240)) setsockopt$IP_VS_SO_SET_STARTDAEMON(r0, 0x0, 0x48b, &(0x7f0000000140)={0x1, 'veth1_to_bridge\x00'}, 0x18) socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$PIO_UNIMAP(0xffffffffffffffff, 0x4b67, &(0x7f00000003c0)={0x40000000000002ad, &(0x7f0000000380)=[{0x80000003}, {0x1, 0x76}]}) ioctl$SNDRV_TIMER_IOCTL_STATUS(r4, 0x80605414, &(0x7f00000006c0)=""/220) r7 = socket(0x200000000000011, 0x4000000000080002, 0x0) setsockopt$packet_int(r7, 0x107, 0x14, &(0x7f00000002c0)=0xffffffffffff8001, 0x4) syz_mount_image$ntfs(&(0x7f0000000440)='ntfs\x00', &(0x7f0000000480)='./bus\x00', 0x0, 0xaaaaaaaaaaaab59, &(0x7f0000000900), 0x1000, &(0x7f0000000940)=ANY=[]) 2018/04/30 20:09:15 executing program 3: socketpair$inet6_tcp(0xa, 0x1, 0x0, &(0x7f0000000140)) setsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, &(0x7f0000000180)='veth1_to_team\x00', 0x10) r0 = socket$inet_tcp(0x2, 0x1, 0x0) clock_settime(0x0, &(0x7f0000000240)={0x77359400}) r1 = open(&(0x7f0000000300)='\x00', 0x0, 0x100) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r1, 0x84, 0x1d, &(0x7f0000000340)={0x1, [0x0]}, &(0x7f0000000380)=0x8) bind$inet(r0, &(0x7f0000b9bff0)={0x2, 0x4e21, @multicast1=0xe0000001}, 0x10) sendto$inet(r0, &(0x7f0000000080), 0xfffffffffffffd90, 0x20020003, &(0x7f0000385ff0)={0x2, 0x20000000004e21, @loopback=0x7f000001}, 0x10) socketpair$inet_sctp(0x2, 0x1, 0x84, &(0x7f00000001c0)) perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x17, &(0x7f00000002c0), 0x4) recvfrom$inet(r0, &(0x7f0000000040)=""/149, 0x906b3b494c5a7b5, 0x0, 0x0, 0xfd69) 2018/04/30 20:09:15 executing program 7: r0 = syz_open_dev$sndseq(&(0x7f0000000080)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r0, 0xc08c5332, &(0x7f0000b0bf74)={0x0, 0x0, 0x0, 'queue0\x00'}) r1 = memfd_create(&(0x7f0000000200)='queue0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x71}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = syz_open_dev$sndseq(&(0x7f00000000c0)='/dev/snd/seq\x00', 0x0, 0x8000000040102) r3 = dup2(r2, r2) write$sndseq(r1, &(0x7f0000e6ffd0)=[{0x0, 0x0, 0x0, 0x80003fd}], 0x30) sendfile(r3, r1, &(0x7f0000000040), 0x80000000) [ 90.481187] PPPIOCDETACH file->f_count=2 [ 90.491569] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 90.600968] PPPIOCDETACH file->f_count=2 [ 90.737068] IPVS: sync thread started: state = MASTER, mcast_ifn = veth1_to_bridge, syncid = 0, id = 0 2033/05/18 03:33:20 executing program 0: r0 = syz_open_procfs(0x0, &(0x7f0000000000)='ns\x00') getdents(r0, &(0x7f00000000c0)=""/24, 0x18) getdents(r0, &(0x7f0000000040)=""/70, 0x46) 2033/05/18 03:33:20 executing program 1: perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x71}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000000200)='/selinux/checkreqprot\x00', 0x0, 0x0) tee(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) mq_open(&(0x7f0000000180)="2c6370757365746b657972696e676574683023656d307b6367726f757076626f786e657430a6656d307070703062646576656d3000", 0x0, 0x0, &(0x7f00000001c0)={0x0, 0x3f}) read(r0, &(0x7f0000000040)=""/222, 0xde) 2033/05/18 03:33:20 executing program 7: r0 = syz_open_dev$sndseq(&(0x7f0000000080)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r0, 0xc08c5332, &(0x7f0000b0bf74)={0x0, 0x0, 0x0, 'queue0\x00'}) r1 = memfd_create(&(0x7f0000000200)='queue0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x71}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = syz_open_dev$sndseq(&(0x7f00000000c0)='/dev/snd/seq\x00', 0x0, 0x8000000040102) r3 = dup2(r2, r2) write$sndseq(r1, &(0x7f0000e6ffd0)=[{0x0, 0x0, 0x0, 0x80003fd}], 0x30) sendfile(r3, r1, &(0x7f0000000040), 0x80000000) 2033/05/18 03:33:20 executing program 6: perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x71}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000000200)='/selinux/checkreqprot\x00', 0x0, 0x0) tee(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) mq_open(&(0x7f0000000180)="2c6370757365746b657972696e676574683023656d307b6367726f757076626f786e657430a6656d307070703062646576656d3000", 0x0, 0x0, &(0x7f00000001c0)={0x0, 0x3f}) read(r0, &(0x7f0000000040)=""/222, 0xde) 2033/05/18 03:33:20 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x2, &(0x7f0000000280)=0x242, 0x4) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f000012afe4)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) r2 = syz_open_pts(0xffffffffffffff9c, 0x0) ioctl$TIOCGSID(r2, 0x5429, &(0x7f0000000140)) r3 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(0xffffffffffffffff, 0x84, 0x18, &(0x7f0000000300)={0x0}, &(0x7f0000000100)=0x8) r5 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000180)='/dev/loop-control\x00', 0x20200, 0x0) ioctl$LOOP_CTL_ADD(r5, 0x4c80, 0x0) eventfd2(0x0, 0x0) fallocate(r3, 0x0, 0x0, 0x92d) ioctl$LOOP_CTL_REMOVE(r5, 0x4c81, 0x0) ioctl$LOOP_CTL_REMOVE(r5, 0x4c81, 0x0) openat$selinux_status(0xffffffffffffff9c, &(0x7f00000002c0)='/selinux/status\x00', 0x0, 0x0) getsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(0xffffffffffffffff, 0x84, 0x6, &(0x7f00000001c0)={r4, @in={{0x2, 0x4e23, @multicast1=0xe0000001}}}, &(0x7f0000000280)=0x84) ioctl$PIO_UNIMAP(0xffffffffffffffff, 0x4b67, &(0x7f00000003c0)={0x2, &(0x7f0000000380)=[{0x5749}, {0x200, 0xfffffffffffffffd}]}) sendto$inet6(r0, &(0x7f0000eb9fff), 0xffffff31, 0x20000003, &(0x7f000031e000)={0xa, 0x4e22}, 0x1c) shutdown(r0, 0x1) 2033/05/18 03:33:20 executing program 2: getuid() r0 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer\x00', 0x80000, 0x0) fcntl$setownex(0xffffffffffffffff, 0xf, &(0x7f0000000240)) ioctl$SNDRV_SEQ_IOCTL_GET_SUBSCRIPTION(r0, 0xc0505350, &(0x7f0000000880)={{0x100000000}, {}, 0x9e, 0x1, 0xd5}) tee(r0, 0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$DRM_IOCTL_GEM_OPEN(r0, 0xc010640b, &(0x7f0000000180)) setsockopt$inet_icmp_ICMP_FILTER(0xffffffffffffffff, 0x1, 0x1, &(0x7f0000000700)={0x3}, 0x4) ioctl$EVIOCGREP(r0, 0x80084503, &(0x7f0000000280)=""/181) ioctl$sock_inet_SIOCSIFADDR(r0, 0x8916, &(0x7f0000000940)={'irlan0\x00', {0x2, 0x4e20, @broadcast=0xffffffff}}) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup.cpu/syz1\x00', 0x1ff) ioctl$TCSETSW(r0, 0x5403, &(0x7f00000007c0)={0x0, 0x2, 0x6, 0x0, 0x5, 0x5, 0x7, 0x1f, 0x0, 0x0, 0x7fffffff, 0x100}) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f00007b6ff7)='/dev/ppp\x00', 0x0, 0x0) r2 = creat(&(0x7f0000002540)='./file0\x00', 0x0) ioctl$DRM_IOCTL_RES_CTX(0xffffffffffffffff, 0xc0106426, &(0x7f0000000040)={0x5, &(0x7f0000000000)=[{}, {}, {}, {}, {}]}) ioctl$fiemap(r2, 0x40086602, &(0x7f0000000040)=ANY=[]) r3 = creat(&(0x7f0000000080)='./file0\x00', 0x0) write$cgroup_pid(r3, &(0x7f0000000100)=ANY=[], 0x1023c) ioctl$EVIOCGPROP(r1, 0xc004743e, &(0x7f0000000480)=""/246) ptrace$setregs(0xf, 0x0, 0x100000001, &(0x7f0000000980)="6a02a1cfd5b8d47f69c3813cb3bef87924e52ceb94ac19761603a56d1634abf66d6bbe6b7baa809b4d6de920a2f77145") ioctl$EVIOCGREP(r1, 0x4004743c, &(0x7f00000003c0)=""/174) 2033/05/18 03:33:20 executing program 4: perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x72, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000100)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000340)='loginuid\x00') setsockopt$netrom_NETROM_IDLE(r2, 0x103, 0x7, &(0x7f00000005c0)=0xffff, 0x10f) ioctl$KDDISABIO(r2, 0x4b37) getpgid(0x0) ioprio_get$pid(0x3, 0x0) ioctl$BINDER_WRITE_READ(r2, 0xc0306201, &(0x7f00000008c0)={0x7f, 0x0, &(0x7f0000000940)=ANY=[@ANYBLOB="016340400300000000000000020000000000000000000000010000000000000000000000400008000000000000000000000000006e5a27226267e82cd9c8caa0ae534502fead4df4063024733ee1ea1720322f5f8261b2d6cf857203ea3afc77d7f80723863a91777806eb362c7fd054df27389631db6a", @ANYPTR=&(0x7f00000007c0)=ANY=[@ANYBLOB="38000000000000004000000000000000a5c3bf2020e7cac800000000000000000000000000000000380000000000000038000000000000004800000000000000"]], 0x2f, 0x0, &(0x7f0000000880)="2853287fb4fb169d6148e737e9836a03444ae27fa5581ba1fc4afcfe658dfe949502459ed76adc3697e59b024aba87"}) getsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(0xffffffffffffffff, 0x84, 0x18, &(0x7f00000000c0), &(0x7f0000000100)=0x3cb) r3 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000180)='/dev/loop-control\x00', 0x20200, 0x0) prctl$getname(0x10, &(0x7f00000024c0)=""/144) ioctl$LOOP_CTL_ADD(r3, 0x4c80, 0x0) tgkill(0x0, 0x0, 0x0) pipe2(&(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) fallocate(r1, 0x2, 0x2, 0x92d) ioctl$LOOP_CTL_REMOVE(r3, 0x4c81, 0x0) getsockopt$inet_tcp_int(r0, 0x6, 0x5, &(0x7f00000001c0), &(0x7f0000000200)=0x4) getsockopt$netlink(r5, 0x10e, 0x7, &(0x7f0000000600)=""/122, &(0x7f0000000300)=0x7a) prctl$setptracer(0x59616d61, 0x0) ioctl$LOOP_CTL_GET_FREE(r2, 0x4c82) r6 = ioctl$LOOP_CTL_GET_FREE(r5, 0x4c82) ioctl$LOOP_CTL_REMOVE(r3, 0x4c81, r6) ioctl$VT_OPENQRY(0xffffffffffffffff, 0x5600, &(0x7f0000000240)) setsockopt$IP_VS_SO_SET_STARTDAEMON(r0, 0x0, 0x48b, &(0x7f0000000140)={0x1, 'veth1_to_bridge\x00'}, 0x18) socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$PIO_UNIMAP(0xffffffffffffffff, 0x4b67, &(0x7f00000003c0)={0x40000000000002ad, &(0x7f0000000380)=[{0x80000003}, {0x1, 0x76}]}) ioctl$SNDRV_TIMER_IOCTL_STATUS(r4, 0x80605414, &(0x7f00000006c0)=""/220) r7 = socket(0x200000000000011, 0x4000000000080002, 0x0) setsockopt$packet_int(r7, 0x107, 0x14, &(0x7f00000002c0)=0xffffffffffff8001, 0x4) syz_mount_image$ntfs(&(0x7f0000000440)='ntfs\x00', &(0x7f0000000480)='./bus\x00', 0x0, 0xaaaaaaaaaaaab59, &(0x7f0000000900), 0x1000, &(0x7f0000000940)=ANY=[]) 2033/05/18 03:33:20 executing program 3: socketpair$inet6_tcp(0xa, 0x1, 0x0, &(0x7f0000000140)) setsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, &(0x7f0000000180)='veth1_to_team\x00', 0x10) r0 = socket$inet_tcp(0x2, 0x1, 0x0) clock_settime(0x0, &(0x7f0000000240)={0x77359400}) r1 = open(&(0x7f0000000300)='\x00', 0x0, 0x100) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r1, 0x84, 0x1d, &(0x7f0000000340)={0x1, [0x0]}, &(0x7f0000000380)=0x8) bind$inet(r0, &(0x7f0000b9bff0)={0x2, 0x4e21, @multicast1=0xe0000001}, 0x10) sendto$inet(r0, &(0x7f0000000080), 0xfffffffffffffd90, 0x20020003, &(0x7f0000385ff0)={0x2, 0x20000000004e21, @loopback=0x7f000001}, 0x10) socketpair$inet_sctp(0x2, 0x1, 0x84, &(0x7f00000001c0)) perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x17, &(0x7f00000002c0), 0x4) recvfrom$inet(r0, &(0x7f0000000040)=""/149, 0x906b3b494c5a7b5, 0x0, 0x0, 0xfd69) 2033/05/18 03:33:20 executing program 1: perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x71}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000000200)='/selinux/checkreqprot\x00', 0x0, 0x0) tee(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) mq_open(&(0x7f0000000180)="2c6370757365746b657972696e676574683023656d307b6367726f757076626f786e657430a6656d307070703062646576656d3000", 0x0, 0x0, &(0x7f00000001c0)={0x0, 0x3f}) read(r0, &(0x7f0000000040)=""/222, 0xde) 2033/05/18 03:33:20 executing program 0: r0 = socket$inet6(0xa, 0x2000000802, 0x0) setsockopt$inet6_int(r0, 0x29, 0x800000021, &(0x7f000089b000), 0x0) 2033/05/18 03:33:20 executing program 7: r0 = syz_open_dev$sndseq(&(0x7f0000000080)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r0, 0xc08c5332, &(0x7f0000b0bf74)={0x0, 0x0, 0x0, 'queue0\x00'}) r1 = memfd_create(&(0x7f0000000200)='queue0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x71}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = syz_open_dev$sndseq(&(0x7f00000000c0)='/dev/snd/seq\x00', 0x0, 0x8000000040102) r3 = dup2(r2, r2) write$sndseq(r1, &(0x7f0000e6ffd0)=[{0x0, 0x0, 0x0, 0x80003fd}], 0x30) sendfile(r3, r1, &(0x7f0000000040), 0x80000000) 2033/05/18 03:33:20 executing program 0: r0 = perf_event_open(&(0x7f000001d000)={0x200000002, 0x366, 0x0, 0x108000001}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000014f88)={0x1, 0x70, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, r0, 0x0) 2033/05/18 03:33:20 executing program 1: perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x71}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000000200)='/selinux/checkreqprot\x00', 0x0, 0x0) tee(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) mq_open(&(0x7f0000000180)="2c6370757365746b657972696e676574683023656d307b6367726f757076626f786e657430a6656d307070703062646576656d3000", 0x0, 0x0, &(0x7f00000001c0)={0x0, 0x3f}) read(r0, &(0x7f0000000040)=""/222, 0xde) 2033/05/18 03:33:20 executing program 7: r0 = syz_open_dev$tun(&(0x7f0000000000)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000340)={'syzkaller0\x00', 0xb}) ioctl$TUNSETVNETLE(r0, 0x400454dc, &(0x7f0000000040)=0x8000000000001) [ 91.802928] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 91.823503] PPPIOCDETACH file->f_count=2 [ 92.234295] IPVS: Creating netns size=2536 id=14 [ 92.681367] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 92.695517] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 92.750175] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 92.763654] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 92.817167] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 92.831475] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 92.846173] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 92.862012] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 93.480306] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 93.514019] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 93.520168] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 93.526791] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready 2033/05/18 03:33:22 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x2, &(0x7f0000000280)=0x242, 0x4) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f000012afe4)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) r2 = syz_open_pts(0xffffffffffffff9c, 0x0) ioctl$TIOCGSID(r2, 0x5429, &(0x7f0000000140)) r3 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(0xffffffffffffffff, 0x84, 0x18, &(0x7f0000000300)={0x0}, &(0x7f0000000100)=0x8) r5 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000180)='/dev/loop-control\x00', 0x20200, 0x0) ioctl$LOOP_CTL_ADD(r5, 0x4c80, 0x0) eventfd2(0x0, 0x0) fallocate(r3, 0x0, 0x0, 0x92d) ioctl$LOOP_CTL_REMOVE(r5, 0x4c81, 0x0) ioctl$LOOP_CTL_REMOVE(r5, 0x4c81, 0x0) openat$selinux_status(0xffffffffffffff9c, &(0x7f00000002c0)='/selinux/status\x00', 0x0, 0x0) getsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(0xffffffffffffffff, 0x84, 0x6, &(0x7f00000001c0)={r4, @in={{0x2, 0x4e23, @multicast1=0xe0000001}}}, &(0x7f0000000280)=0x84) ioctl$PIO_UNIMAP(0xffffffffffffffff, 0x4b67, &(0x7f00000003c0)={0x2, &(0x7f0000000380)=[{0x5749}, {0x200, 0xfffffffffffffffd}]}) sendto$inet6(r0, &(0x7f0000eb9fff), 0xffffff31, 0x20000003, &(0x7f000031e000)={0xa, 0x4e22}, 0x1c) shutdown(r0, 0x1) 2033/05/18 03:33:22 executing program 0: r0 = perf_event_open(&(0x7f000001d000)={0x200000002, 0x366, 0x0, 0x108000001}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000014f88)={0x1, 0x70, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, r0, 0x0) 2033/05/18 03:33:22 executing program 7: r0 = syz_open_dev$tun(&(0x7f0000000000)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000340)={'syzkaller0\x00', 0xb}) ioctl$TUNSETVNETLE(r0, 0x400454dc, &(0x7f0000000040)=0x8000000000001) 2033/05/18 03:33:22 executing program 2: getuid() r0 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer\x00', 0x80000, 0x0) fcntl$setownex(0xffffffffffffffff, 0xf, &(0x7f0000000240)) ioctl$SNDRV_SEQ_IOCTL_GET_SUBSCRIPTION(r0, 0xc0505350, &(0x7f0000000880)={{0x100000000}, {}, 0x9e, 0x1, 0xd5}) tee(r0, 0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$DRM_IOCTL_GEM_OPEN(r0, 0xc010640b, &(0x7f0000000180)) setsockopt$inet_icmp_ICMP_FILTER(0xffffffffffffffff, 0x1, 0x1, &(0x7f0000000700)={0x3}, 0x4) ioctl$EVIOCGREP(r0, 0x80084503, &(0x7f0000000280)=""/181) ioctl$sock_inet_SIOCSIFADDR(r0, 0x8916, &(0x7f0000000940)={'irlan0\x00', {0x2, 0x4e20, @broadcast=0xffffffff}}) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup.cpu/syz1\x00', 0x1ff) ioctl$TCSETSW(r0, 0x5403, &(0x7f00000007c0)={0x0, 0x2, 0x6, 0x0, 0x5, 0x5, 0x7, 0x1f, 0x0, 0x0, 0x7fffffff, 0x100}) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f00007b6ff7)='/dev/ppp\x00', 0x0, 0x0) r2 = creat(&(0x7f0000002540)='./file0\x00', 0x0) ioctl$DRM_IOCTL_RES_CTX(0xffffffffffffffff, 0xc0106426, &(0x7f0000000040)={0x5, &(0x7f0000000000)=[{}, {}, {}, {}, {}]}) ioctl$fiemap(r2, 0x40086602, &(0x7f0000000040)=ANY=[]) r3 = creat(&(0x7f0000000080)='./file0\x00', 0x0) write$cgroup_pid(r3, &(0x7f0000000100)=ANY=[], 0x1023c) ioctl$EVIOCGPROP(r1, 0xc004743e, &(0x7f0000000480)=""/246) ptrace$setregs(0xf, 0x0, 0x100000001, &(0x7f0000000980)="6a02a1cfd5b8d47f69c3813cb3bef87924e52ceb94ac19761603a56d1634abf66d6bbe6b7baa809b4d6de920a2f77145") ioctl$EVIOCGREP(r1, 0x4004743c, &(0x7f00000003c0)=""/174) 2033/05/18 03:33:22 executing program 3: socketpair$inet6_tcp(0xa, 0x1, 0x0, &(0x7f0000000140)) setsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, &(0x7f0000000180)='veth1_to_team\x00', 0x10) r0 = socket$inet_tcp(0x2, 0x1, 0x0) clock_settime(0x0, &(0x7f0000000240)={0x77359400}) r1 = open(&(0x7f0000000300)='\x00', 0x0, 0x100) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r1, 0x84, 0x1d, &(0x7f0000000340)={0x1, [0x0]}, &(0x7f0000000380)=0x8) bind$inet(r0, &(0x7f0000b9bff0)={0x2, 0x4e21, @multicast1=0xe0000001}, 0x10) sendto$inet(r0, &(0x7f0000000080), 0xfffffffffffffd90, 0x20020003, &(0x7f0000385ff0)={0x2, 0x20000000004e21, @loopback=0x7f000001}, 0x10) socketpair$inet_sctp(0x2, 0x1, 0x84, &(0x7f00000001c0)) perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x17, &(0x7f00000002c0), 0x4) recvfrom$inet(r0, &(0x7f0000000040)=""/149, 0x906b3b494c5a7b5, 0x0, 0x0, 0xfd69) 2033/05/18 03:33:22 executing program 4: perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x72, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000100)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000340)='loginuid\x00') setsockopt$netrom_NETROM_IDLE(r2, 0x103, 0x7, &(0x7f00000005c0)=0xffff, 0x10f) ioctl$KDDISABIO(r2, 0x4b37) getpgid(0x0) ioprio_get$pid(0x3, 0x0) ioctl$BINDER_WRITE_READ(r2, 0xc0306201, &(0x7f00000008c0)={0x7f, 0x0, &(0x7f0000000940)=ANY=[@ANYBLOB="016340400300000000000000020000000000000000000000010000000000000000000000400008000000000000000000000000006e5a27226267e82cd9c8caa0ae534502fead4df4063024733ee1ea1720322f5f8261b2d6cf857203ea3afc77d7f80723863a91777806eb362c7fd054df27389631db6a", @ANYPTR=&(0x7f00000007c0)=ANY=[@ANYBLOB="38000000000000004000000000000000a5c3bf2020e7cac800000000000000000000000000000000380000000000000038000000000000004800000000000000"]], 0x2f, 0x0, &(0x7f0000000880)="2853287fb4fb169d6148e737e9836a03444ae27fa5581ba1fc4afcfe658dfe949502459ed76adc3697e59b024aba87"}) getsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(0xffffffffffffffff, 0x84, 0x18, &(0x7f00000000c0), &(0x7f0000000100)=0x3cb) r3 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000180)='/dev/loop-control\x00', 0x20200, 0x0) prctl$getname(0x10, &(0x7f00000024c0)=""/144) ioctl$LOOP_CTL_ADD(r3, 0x4c80, 0x0) tgkill(0x0, 0x0, 0x0) pipe2(&(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) fallocate(r1, 0x2, 0x2, 0x92d) ioctl$LOOP_CTL_REMOVE(r3, 0x4c81, 0x0) getsockopt$inet_tcp_int(r0, 0x6, 0x5, &(0x7f00000001c0), &(0x7f0000000200)=0x4) getsockopt$netlink(r5, 0x10e, 0x7, &(0x7f0000000600)=""/122, &(0x7f0000000300)=0x7a) prctl$setptracer(0x59616d61, 0x0) ioctl$LOOP_CTL_GET_FREE(r2, 0x4c82) r6 = ioctl$LOOP_CTL_GET_FREE(r5, 0x4c82) ioctl$LOOP_CTL_REMOVE(r3, 0x4c81, r6) ioctl$VT_OPENQRY(0xffffffffffffffff, 0x5600, &(0x7f0000000240)) setsockopt$IP_VS_SO_SET_STARTDAEMON(r0, 0x0, 0x48b, &(0x7f0000000140)={0x1, 'veth1_to_bridge\x00'}, 0x18) socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$PIO_UNIMAP(0xffffffffffffffff, 0x4b67, &(0x7f00000003c0)={0x40000000000002ad, &(0x7f0000000380)=[{0x80000003}, {0x1, 0x76}]}) ioctl$SNDRV_TIMER_IOCTL_STATUS(r4, 0x80605414, &(0x7f00000006c0)=""/220) r7 = socket(0x200000000000011, 0x4000000000080002, 0x0) setsockopt$packet_int(r7, 0x107, 0x14, &(0x7f00000002c0)=0xffffffffffff8001, 0x4) syz_mount_image$ntfs(&(0x7f0000000440)='ntfs\x00', &(0x7f0000000480)='./bus\x00', 0x0, 0xaaaaaaaaaaaab59, &(0x7f0000000900), 0x1000, &(0x7f0000000940)=ANY=[]) 2033/05/18 03:33:22 executing program 1: capset(&(0x7f0000581ff8)={0x19980330}, &(0x7f0000000040)) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000280)={0x0, 0x0}, &(0x7f0000000200)=0x9) setresuid(r1, 0x0, 0x0) 2033/05/18 03:33:22 executing program 6: perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x71}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000000200)='/selinux/checkreqprot\x00', 0x0, 0x0) tee(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) mq_open(&(0x7f0000000180)="2c6370757365746b657972696e676574683023656d307b6367726f757076626f786e657430a6656d307070703062646576656d3000", 0x0, 0x0, &(0x7f00000001c0)={0x0, 0x3f}) read(r0, &(0x7f0000000040)=""/222, 0xde) 2033/05/18 03:33:20 executing program 1: r0 = eventfd2(0x0, 0x0) close(r0) dup(r0) socket$inet_sctp(0x2, 0x0, 0x84) 2033/05/18 03:33:20 executing program 0: r0 = perf_event_open(&(0x7f000001d000)={0x200000002, 0x366, 0x0, 0x108000001}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000014f88)={0x1, 0x70, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, r0, 0x0) 2033/05/18 03:33:20 executing program 7: r0 = syz_open_dev$tun(&(0x7f0000000000)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000340)={'syzkaller0\x00', 0xb}) ioctl$TUNSETVNETLE(r0, 0x400454dc, &(0x7f0000000040)=0x8000000000001) 2033/05/18 03:33:20 executing program 6: perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x71}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000000200)='/selinux/checkreqprot\x00', 0x0, 0x0) tee(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) mq_open(&(0x7f0000000180)="2c6370757365746b657972696e676574683023656d307b6367726f757076626f786e657430a6656d307070703062646576656d3000", 0x0, 0x0, &(0x7f00000001c0)={0x0, 0x3f}) read(r0, &(0x7f0000000040)=""/222, 0xde) 2033/05/18 03:33:20 executing program 1: r0 = eventfd2(0x0, 0x0) close(r0) dup(r0) socket$inet_sctp(0x2, 0x0, 0x84) 2033/05/18 03:33:20 executing program 2: getuid() r0 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer\x00', 0x80000, 0x0) fcntl$setownex(0xffffffffffffffff, 0xf, &(0x7f0000000240)) ioctl$SNDRV_SEQ_IOCTL_GET_SUBSCRIPTION(r0, 0xc0505350, &(0x7f0000000880)={{0x100000000}, {}, 0x9e, 0x1, 0xd5}) tee(r0, 0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$DRM_IOCTL_GEM_OPEN(r0, 0xc010640b, &(0x7f0000000180)) setsockopt$inet_icmp_ICMP_FILTER(0xffffffffffffffff, 0x1, 0x1, &(0x7f0000000700)={0x3}, 0x4) ioctl$EVIOCGREP(r0, 0x80084503, &(0x7f0000000280)=""/181) ioctl$sock_inet_SIOCSIFADDR(r0, 0x8916, &(0x7f0000000940)={'irlan0\x00', {0x2, 0x4e20, @broadcast=0xffffffff}}) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup.cpu/syz1\x00', 0x1ff) ioctl$TCSETSW(r0, 0x5403, &(0x7f00000007c0)={0x0, 0x2, 0x6, 0x0, 0x5, 0x5, 0x7, 0x1f, 0x0, 0x0, 0x7fffffff, 0x100}) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f00007b6ff7)='/dev/ppp\x00', 0x0, 0x0) r2 = creat(&(0x7f0000002540)='./file0\x00', 0x0) ioctl$DRM_IOCTL_RES_CTX(0xffffffffffffffff, 0xc0106426, &(0x7f0000000040)={0x5, &(0x7f0000000000)=[{}, {}, {}, {}, {}]}) ioctl$fiemap(r2, 0x40086602, &(0x7f0000000040)=ANY=[]) r3 = creat(&(0x7f0000000080)='./file0\x00', 0x0) write$cgroup_pid(r3, &(0x7f0000000100)=ANY=[], 0x1023c) ioctl$EVIOCGPROP(r1, 0xc004743e, &(0x7f0000000480)=""/246) ptrace$setregs(0xf, 0x0, 0x100000001, &(0x7f0000000980)="6a02a1cfd5b8d47f69c3813cb3bef87924e52ceb94ac19761603a56d1634abf66d6bbe6b7baa809b4d6de920a2f77145") ioctl$EVIOCGREP(r1, 0x4004743c, &(0x7f00000003c0)=""/174) [ 93.971405] PPPIOCDETACH file->f_count=2 2033/05/18 03:33:20 executing program 1: r0 = eventfd2(0x0, 0x0) close(r0) dup(r0) socket$inet_sctp(0x2, 0x0, 0x84) 2033/05/18 03:33:20 executing program 6: ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000040)=0x0) perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, r0, 0x0, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xfffffffffffffffd}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x40082406, &(0x7f0000000140)="6594038e2ff41f329cab6fb30bb12f45470a8ad9c82a98feed8375a14b192e3469cc7efebfd044c8ab3192a7343c8f9acd37797037ba735122373ead47105b13a1dc0aa880c4977fa56c341853ffb83e64fd0bfa6180f968c777c548cd52470a45175578a8381bec45ba63fadc54") [ 94.013149] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 94.190968] PPPIOCDETACH file->f_count=2 2033/05/18 03:33:20 executing program 1: r0 = eventfd2(0x0, 0x0) close(r0) dup(r0) socket$inet_sctp(0x2, 0x0, 0x84) 2033/05/18 03:33:20 executing program 0: r0 = perf_event_open(&(0x7f000001d000)={0x200000002, 0x366, 0x0, 0x108000001}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000014f88)={0x1, 0x70, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, r0, 0x0) 2033/05/18 03:33:20 executing program 6: ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000040)=0x0) perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, r0, 0x0, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xfffffffffffffffd}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x40082406, &(0x7f0000000140)="6594038e2ff41f329cab6fb30bb12f45470a8ad9c82a98feed8375a14b192e3469cc7efebfd044c8ab3192a7343c8f9acd37797037ba735122373ead47105b13a1dc0aa880c4977fa56c341853ffb83e64fd0bfa6180f968c777c548cd52470a45175578a8381bec45ba63fadc54") 2033/05/18 03:33:20 executing program 2: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000100)={0xa, 0x0, 0x0, @loopback={0x0, 0x1}}, 0x1c) restart_syscall() sendmmsg(r0, &(0x7f0000007e00), 0x5de253fd8eb2f1, 0x0) 2033/05/18 03:33:20 executing program 5: r0 = memfd_create(&(0x7f0000000040)="2f9900000000c604040f510000", 0x0) write$binfmt_script(r0, &(0x7f00000000c0)={'#! ', './file1', [{0x20, '#! '}], 0xa}, 0xf) execveat(r0, &(0x7f0000ff7000)='./file0\x00', &(0x7f0000d0e000), &(0x7f000034bff8)=[&(0x7f0000ff7000)="00000000000000060804002000fffc0c6565643b799365005f1b76"], 0x1000) 2033/05/18 03:33:20 executing program 3: socketpair$inet6_tcp(0xa, 0x1, 0x0, &(0x7f0000000140)) setsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, &(0x7f0000000180)='veth1_to_team\x00', 0x10) r0 = socket$inet_tcp(0x2, 0x1, 0x0) clock_settime(0x0, &(0x7f0000000240)={0x77359400}) r1 = open(&(0x7f0000000300)='\x00', 0x0, 0x100) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r1, 0x84, 0x1d, &(0x7f0000000340)={0x1, [0x0]}, &(0x7f0000000380)=0x8) bind$inet(r0, &(0x7f0000b9bff0)={0x2, 0x4e21, @multicast1=0xe0000001}, 0x10) sendto$inet(r0, &(0x7f0000000080), 0xfffffffffffffd90, 0x20020003, &(0x7f0000385ff0)={0x2, 0x20000000004e21, @loopback=0x7f000001}, 0x10) socketpair$inet_sctp(0x2, 0x1, 0x84, &(0x7f00000001c0)) perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x17, &(0x7f00000002c0), 0x4) recvfrom$inet(r0, &(0x7f0000000040)=""/149, 0x906b3b494c5a7b5, 0x0, 0x0, 0xfd69) 2033/05/18 03:33:20 executing program 4: perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x72, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000100)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000340)='loginuid\x00') setsockopt$netrom_NETROM_IDLE(r2, 0x103, 0x7, &(0x7f00000005c0)=0xffff, 0x10f) ioctl$KDDISABIO(r2, 0x4b37) getpgid(0x0) ioprio_get$pid(0x3, 0x0) ioctl$BINDER_WRITE_READ(r2, 0xc0306201, &(0x7f00000008c0)={0x7f, 0x0, &(0x7f0000000940)=ANY=[@ANYBLOB="016340400300000000000000020000000000000000000000010000000000000000000000400008000000000000000000000000006e5a27226267e82cd9c8caa0ae534502fead4df4063024733ee1ea1720322f5f8261b2d6cf857203ea3afc77d7f80723863a91777806eb362c7fd054df27389631db6a", @ANYPTR=&(0x7f00000007c0)=ANY=[@ANYBLOB="38000000000000004000000000000000a5c3bf2020e7cac800000000000000000000000000000000380000000000000038000000000000004800000000000000"]], 0x2f, 0x0, &(0x7f0000000880)="2853287fb4fb169d6148e737e9836a03444ae27fa5581ba1fc4afcfe658dfe949502459ed76adc3697e59b024aba87"}) getsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(0xffffffffffffffff, 0x84, 0x18, &(0x7f00000000c0), &(0x7f0000000100)=0x3cb) r3 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000180)='/dev/loop-control\x00', 0x20200, 0x0) prctl$getname(0x10, &(0x7f00000024c0)=""/144) ioctl$LOOP_CTL_ADD(r3, 0x4c80, 0x0) tgkill(0x0, 0x0, 0x0) pipe2(&(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) fallocate(r1, 0x2, 0x2, 0x92d) ioctl$LOOP_CTL_REMOVE(r3, 0x4c81, 0x0) getsockopt$inet_tcp_int(r0, 0x6, 0x5, &(0x7f00000001c0), &(0x7f0000000200)=0x4) getsockopt$netlink(r5, 0x10e, 0x7, &(0x7f0000000600)=""/122, &(0x7f0000000300)=0x7a) prctl$setptracer(0x59616d61, 0x0) ioctl$LOOP_CTL_GET_FREE(r2, 0x4c82) r6 = ioctl$LOOP_CTL_GET_FREE(r5, 0x4c82) ioctl$LOOP_CTL_REMOVE(r3, 0x4c81, r6) ioctl$VT_OPENQRY(0xffffffffffffffff, 0x5600, &(0x7f0000000240)) setsockopt$IP_VS_SO_SET_STARTDAEMON(r0, 0x0, 0x48b, &(0x7f0000000140)={0x1, 'veth1_to_bridge\x00'}, 0x18) socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$PIO_UNIMAP(0xffffffffffffffff, 0x4b67, &(0x7f00000003c0)={0x40000000000002ad, &(0x7f0000000380)=[{0x80000003}, {0x1, 0x76}]}) ioctl$SNDRV_TIMER_IOCTL_STATUS(r4, 0x80605414, &(0x7f00000006c0)=""/220) r7 = socket(0x200000000000011, 0x4000000000080002, 0x0) setsockopt$packet_int(r7, 0x107, 0x14, &(0x7f00000002c0)=0xffffffffffff8001, 0x4) syz_mount_image$ntfs(&(0x7f0000000440)='ntfs\x00', &(0x7f0000000480)='./bus\x00', 0x0, 0xaaaaaaaaaaaab59, &(0x7f0000000900), 0x1000, &(0x7f0000000940)=ANY=[]) 2033/05/18 03:33:20 executing program 7: r0 = syz_open_dev$tun(&(0x7f0000000000)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000340)={'syzkaller0\x00', 0xb}) ioctl$TUNSETVNETLE(r0, 0x400454dc, &(0x7f0000000040)=0x8000000000001) 2033/05/18 03:33:20 executing program 5: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00009e3ff6)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f00005befdc)) r1 = syz_open_pts(r0, 0x20201) fcntl$setstatus(r1, 0x4, 0x2800) ioctl$TCXONC(r1, 0x540a, 0x0) write(r1, &(0x7f0000000180)="bf", 0x1) close(r0) 2033/05/18 03:33:20 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f0000005000)={&(0x7f000000d000)={0x10}, 0xc, &(0x7f0000000040)={&(0x7f0000001100)={0x24, 0x2d, 0x301, 0x0, 0x0, {}, [@generic="c172aab73fffb5bb40077cfbdb"]}, 0x24}, 0x1}, 0x0) 2033/05/18 03:33:20 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000100)='ns\x00') getdents64(r0, &(0x7f0000000080)=""/30, 0x2a3) getdents(r0, &(0x7f0000001000)=""/24, 0x18) 2033/05/18 03:33:20 executing program 6: ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000040)=0x0) perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, r0, 0x0, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xfffffffffffffffd}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x40082406, &(0x7f0000000140)="6594038e2ff41f329cab6fb30bb12f45470a8ad9c82a98feed8375a14b192e3469cc7efebfd044c8ab3192a7343c8f9acd37797037ba735122373ead47105b13a1dc0aa880c4977fa56c341853ffb83e64fd0bfa6180f968c777c548cd52470a45175578a8381bec45ba63fadc54") 2033/05/18 03:33:20 executing program 1: r0 = perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) unshare(0x40000000) r1 = dup2(0xffffffffffffffff, r0) openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/checkreqprot\x00', 0x20c002, 0x0) getsockopt$inet_sctp6_SCTP_MAXSEG(r1, 0x84, 0xd, &(0x7f0000000080)=@assoc_id=0x0, &(0x7f00000001c0)=0x4) getsockopt$inet_sctp_SCTP_STREAM_SCHEDULER_VALUE(0xffffffffffffff9c, 0x84, 0x7c, &(0x7f0000000140)={r2, 0x0, 0x5}, &(0x7f0000000180)=0x4a) dup(r0) 2033/05/18 03:33:20 executing program 0: ptrace$pokeuser(0x6, 0x0, 0x0, 0x8) clock_gettime(0x0, &(0x7f00000000c0)) clock_gettime(0x5, &(0x7f0000001ec0)) clock_gettime(0x0, &(0x7f0000000200)={0x0, 0x0}) write$sndseq(0xffffffffffffffff, &(0x7f00000015c0)=[{0xfda, 0x7fff, 0x424, 0x275f7cf9, @tick, {0x56}, {0x0, 0x9a48}, @ext={0x7bc, &(0x7f0000000500)="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"}}, {0x1, 0x3, 0x7fffffff, 0x7, @time={0x77359400}, {0x3ff}, {0x4, 0x2d9}, @control={0x0, 0x9, 0x20}}, {0x0, 0x1000, 0x0, 0x1, @tick=0x3f, {0x0, 0x9}, {0x7, 0x8}, @ext={0x99, &(0x7f0000001500)="a126a62130ae22c71bf7ae805d9274c6fb005cc866f3fbeeccbda60eef491bf44e1d637e718c7716ff147f96bd58cca7bca721d37923d52d49ef23a329a3771e1ea5945af1ce386504e8cb00c51b9184493597794f264d94fc962ce1e0d5dcbf7ad5f92286fbd8fa6fa7ee1b1d67cb0f6a90626ca9b070a5a06f029fc8bd25d3c0d7ef14103daecf79e9b5418e87062e33bdbc7515ba28a954"}}, {0x9, 0x7fff, 0x4, 0x3, @tick=0x5, {0x3}, {0x0, 0x13c4800000}, @time=@time={r0, r1+10000000}}], 0xc0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) accept4$inet(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, @remote}, &(0x7f0000000280)=0x10, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000140)="2e2f6367726f757000361a6f74a1b774b8642f3dfdd313d92946ff0167415d8dc22791dcd496520c1c99f4b07d3b2a11090000000229210b73abdcd2986fc290ac9b6ace278586d39949a54fb276eb1fd3964b0cad27e417b33abb8d3b00e64e75e4dff47de27536dccdde5fc746b04faafcec347560a31b3a35a5f20bc949d75cbb763987", 0x200002, 0x0) syz_read_part_table(0xfffffffffffffffe, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="000000000000000000000000000000000000000000000000ed793afe00000000020082012600010000006400000000012700fd030c00650000006400000000030d0085043100c90000006400000000043200052020002d010000d306000055aa", 0x60, 0x1a0}]) openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000001e80)='cgroup.procs\x00', 0x2, 0x0) creat(&(0x7f0000000040)='./file0\x00', 0x0) 2033/05/18 03:33:20 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000100)='ns\x00') getdents64(r0, &(0x7f0000000080)=""/30, 0x2a3) getdents(r0, &(0x7f0000001000)=""/24, 0x18) 2033/05/18 03:33:20 executing program 5: r0 = syz_open_procfs(0x0, &(0x7f0000000100)='ns\x00') getdents64(r0, &(0x7f0000000080)=""/30, 0x2a3) getdents(r0, &(0x7f0000001000)=""/24, 0x18) 2033/05/18 03:33:20 executing program 7: r0 = syz_open_dev$binder(&(0x7f0000236ff3)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) ioctl$BINDER_WRITE_READ(r0, 0xc0306201, &(0x7f0000008000)={0x44, 0x0, &(0x7f0000004fbc)=[@transaction={0x40406300, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x28, 0x10, &(0x7f000026c000)=[@ptr={0x73622a85, 0x0, &(0x7f00004edf8a), 0x1}], &(0x7f000000afd0)=[0x0, 0x28]}}], 0x0, 0x0, &(0x7f0000009000)}) 2033/05/18 03:33:20 executing program 5: r0 = syz_open_procfs(0x0, &(0x7f0000000100)='ns\x00') getdents64(r0, &(0x7f0000000080)=""/30, 0x2a3) getdents(r0, &(0x7f0000001000)=""/24, 0x18) [ 94.996404] binder: 9979:9982 transaction failed 29189/-22, size 40-16 line 3010 [ 95.055881] binder: undelivered TRANSACTION_ERROR: 29189 [ 95.140950] IPVS: Creating netns size=2536 id=15 [ 95.224375] IPVS: Creating netns size=2536 id=16 [ 95.231317] loop0: p1 p2 p3 < > p4 < > [ 95.467796] loop_reread_partitions: partition scan of loop0 () failed (rc=-16) [ 95.475945] blk_update_request: I/O error, dev loop0, sector 101 [ 95.482290] blk_update_request: I/O error, dev loop0, sector 1 [ 95.488294] blk_update_request: I/O error, dev loop0, sector 1 [ 95.494318] buffer_io_error: 46 callbacks suppressed [ 95.494325] Buffer I/O error on dev loop0p1, logical block 0, async page read [ 95.507073] blk_update_request: I/O error, dev loop0, sector 301 [ 95.513271] blk_update_request: I/O error, dev loop0, sector 201 [ 95.519527] blk_update_request: I/O error, dev loop0, sector 201 [ 95.521184] blk_update_request: I/O error, dev loop0, sector 301 [ 95.521193] Buffer I/O error on dev loop0p4, logical block 0, async page read [ 95.521249] blk_update_request: I/O error, dev loop0, sector 301 [ 95.521254] Buffer I/O error on dev loop0p4, logical block 0, async page read [ 95.521282] blk_update_request: I/O error, dev loop0, sector 301 [ 95.521287] Buffer I/O error on dev loop0p4, logical block 0, async page read [ 95.521315] blk_update_request: I/O error, dev loop0, sector 301 [ 95.521319] Buffer I/O error on dev loop0p4, logical block 0, async page read [ 95.521348] Buffer I/O error on dev loop0p4, logical block 0, async page read [ 95.521382] Buffer I/O error on dev loop0p4, logical block 0, async page read [ 95.521411] Buffer I/O error on dev loop0p4, logical block 0, async page read [ 95.521439] Buffer I/O error on dev loop0p4, logical block 0, async page read [ 95.521468] Buffer I/O error on dev loop0p4, logical block 0, async page read [ 95.620331] loop_reread_partitions: partition scan of loop0 () failed (rc=-16) 2033/05/18 03:33:20 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000100)='ns\x00') getdents64(r0, &(0x7f0000000080)=""/30, 0x2a3) getdents(r0, &(0x7f0000001000)=""/24, 0x18) 2033/05/18 03:33:20 executing program 7: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x80000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$IP_VS_SO_SET_ADD(0xffffffffffffffff, 0x0, 0x482, &(0x7f0000000140)={0x11, @loopback=0x7f000001, 0x4e20, 0x0, 'lblcr\x00'}, 0x2c) setsockopt$IP_VS_SO_SET_FLUSH(0xffffffffffffffff, 0x0, 0x485, 0x0, 0x0) openat$full(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/full\x00', 0x200, 0x0) fcntl$getown(r0, 0x9) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000380)='/dev/ptmx\x00', 0x5, 0x0) ioctl$TCSETS(r1, 0x40045431, &(0x7f00003b9fdc)) getsockopt$inet_sctp6_SCTP_DEFAULT_SNDINFO(0xffffffffffffffff, 0x84, 0x22, &(0x7f0000000180)={0x0, 0x200, 0x3, 0x200000000000000, 0x0}, &(0x7f00000001c0)=0x10) getsockopt$inet_sctp_SCTP_DEFAULT_SNDINFO(0xffffffffffffffff, 0x84, 0x22, &(0x7f0000000200)={0x7fffffff, 0x81fc, 0x9, 0x8, r2}, &(0x7f0000000240)=0x10) ioctl$TCSETA(r1, 0x5406, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x7}) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000300)='cgroup.events\x00', 0x0, 0x0) ioctl$PIO_UNISCRNMAP(0xffffffffffffffff, 0x4b6a, &(0x7f0000000340)) syz_open_pts(r1, 0x0) ioctl$fiemap(0xffffffffffffffff, 0xc020660b, &(0x7f00000003c0)=ANY=[]) write(r1, &(0x7f0000c34fff), 0xffffff0b) r3 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000140)='/proc/sys/net/ipv4/vs/sync_threshold\x00', 0x2, 0x0) ioctl$SNDRV_SEQ_IOCTL_SUBSCRIBE_PORT(r3, 0x40505330, &(0x7f0000000040)={{0x9}, {0x8}}) sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000040), 0x0) fcntl$getown(r0, 0x9) setsockopt$inet6_tcp_int(r3, 0x6, 0x0, &(0x7f00000002c0)=0x8, 0x4) bind$pptp(0xffffffffffffffff, &(0x7f0000000280)={0x18, 0x2, {0x2, @local={0xac, 0x14, 0x14, 0xaa}}}, 0x1e) 2033/05/18 03:33:20 executing program 5: r0 = syz_open_procfs(0x0, &(0x7f0000000100)='ns\x00') getdents64(r0, &(0x7f0000000080)=""/30, 0x2a3) getdents(r0, &(0x7f0000001000)=""/24, 0x18) 2033/05/18 03:33:20 executing program 6: ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000040)=0x0) perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, r0, 0x0, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xfffffffffffffffd}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x40082406, &(0x7f0000000140)="6594038e2ff41f329cab6fb30bb12f45470a8ad9c82a98feed8375a14b192e3469cc7efebfd044c8ab3192a7343c8f9acd37797037ba735122373ead47105b13a1dc0aa880c4977fa56c341853ffb83e64fd0bfa6180f968c777c548cd52470a45175578a8381bec45ba63fadc54") 2033/05/18 03:33:20 executing program 1: r0 = perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) unshare(0x40000000) r1 = dup2(0xffffffffffffffff, r0) openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/checkreqprot\x00', 0x20c002, 0x0) getsockopt$inet_sctp6_SCTP_MAXSEG(r1, 0x84, 0xd, &(0x7f0000000080)=@assoc_id=0x0, &(0x7f00000001c0)=0x4) getsockopt$inet_sctp_SCTP_STREAM_SCHEDULER_VALUE(0xffffffffffffff9c, 0x84, 0x7c, &(0x7f0000000140)={r2, 0x0, 0x5}, &(0x7f0000000180)=0x4a) dup(r0) 2033/05/18 03:33:20 executing program 0: ptrace$pokeuser(0x6, 0x0, 0x0, 0x8) clock_gettime(0x0, &(0x7f00000000c0)) clock_gettime(0x5, &(0x7f0000001ec0)) clock_gettime(0x0, &(0x7f0000000200)={0x0, 0x0}) write$sndseq(0xffffffffffffffff, &(0x7f00000015c0)=[{0xfda, 0x7fff, 0x424, 0x275f7cf9, @tick, {0x56}, {0x0, 0x9a48}, @ext={0x7bc, &(0x7f0000000500)="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"}}, {0x1, 0x3, 0x7fffffff, 0x7, @time={0x77359400}, {0x3ff}, {0x4, 0x2d9}, @control={0x0, 0x9, 0x20}}, {0x0, 0x1000, 0x0, 0x1, @tick=0x3f, {0x0, 0x9}, {0x7, 0x8}, @ext={0x99, &(0x7f0000001500)="a126a62130ae22c71bf7ae805d9274c6fb005cc866f3fbeeccbda60eef491bf44e1d637e718c7716ff147f96bd58cca7bca721d37923d52d49ef23a329a3771e1ea5945af1ce386504e8cb00c51b9184493597794f264d94fc962ce1e0d5dcbf7ad5f92286fbd8fa6fa7ee1b1d67cb0f6a90626ca9b070a5a06f029fc8bd25d3c0d7ef14103daecf79e9b5418e87062e33bdbc7515ba28a954"}}, {0x9, 0x7fff, 0x4, 0x3, @tick=0x5, {0x3}, {0x0, 0x13c4800000}, @time=@time={r0, r1+10000000}}], 0xc0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) accept4$inet(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, @remote}, &(0x7f0000000280)=0x10, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000140)="2e2f6367726f757000361a6f74a1b774b8642f3dfdd313d92946ff0167415d8dc22791dcd496520c1c99f4b07d3b2a11090000000229210b73abdcd2986fc290ac9b6ace278586d39949a54fb276eb1fd3964b0cad27e417b33abb8d3b00e64e75e4dff47de27536dccdde5fc746b04faafcec347560a31b3a35a5f20bc949d75cbb763987", 0x200002, 0x0) syz_read_part_table(0xfffffffffffffffe, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="000000000000000000000000000000000000000000000000ed793afe00000000020082012600010000006400000000012700fd030c00650000006400000000030d0085043100c90000006400000000043200052020002d010000d306000055aa", 0x60, 0x1a0}]) openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000001e80)='cgroup.procs\x00', 0x2, 0x0) creat(&(0x7f0000000040)='./file0\x00', 0x0) 2033/05/18 03:33:20 executing program 3: ptrace$pokeuser(0x6, 0x0, 0x0, 0x8) clock_gettime(0x0, &(0x7f00000000c0)) clock_gettime(0x5, &(0x7f0000001ec0)) clock_gettime(0x0, &(0x7f0000000200)={0x0, 0x0}) write$sndseq(0xffffffffffffffff, &(0x7f00000015c0)=[{0xfda, 0x7fff, 0x424, 0x275f7cf9, @tick, {0x56}, {0x0, 0x9a48}, @ext={0x7bc, &(0x7f0000000500)="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"}}, {0x1, 0x3, 0x7fffffff, 0x7, @time={0x77359400}, {0x3ff}, {0x4, 0x2d9}, @control={0x0, 0x9, 0x20}}, {0x0, 0x1000, 0x0, 0x1, @tick=0x3f, {0x0, 0x9}, {0x7, 0x8}, @ext={0x99, &(0x7f0000001500)="a126a62130ae22c71bf7ae805d9274c6fb005cc866f3fbeeccbda60eef491bf44e1d637e718c7716ff147f96bd58cca7bca721d37923d52d49ef23a329a3771e1ea5945af1ce386504e8cb00c51b9184493597794f264d94fc962ce1e0d5dcbf7ad5f92286fbd8fa6fa7ee1b1d67cb0f6a90626ca9b070a5a06f029fc8bd25d3c0d7ef14103daecf79e9b5418e87062e33bdbc7515ba28a954"}}, {0x9, 0x7fff, 0x4, 0x3, @tick=0x5, {0x3}, {0x0, 0x13c4800000}, @time=@time={r0, r1+10000000}}], 0xc0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) accept4$inet(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, @remote}, &(0x7f0000000280)=0x10, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000140)="2e2f6367726f757000361a6f74a1b774b8642f3dfdd313d92946ff0167415d8dc22791dcd496520c1c99f4b07d3b2a11090000000229210b73abdcd2986fc290ac9b6ace278586d39949a54fb276eb1fd3964b0cad27e417b33abb8d3b00e64e75e4dff47de27536dccdde5fc746b04faafcec347560a31b3a35a5f20bc949d75cbb763987", 0x200002, 0x0) syz_read_part_table(0xfffffffffffffffe, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="000000000000000000000000000000000000000000000000ed793afe00000000020082012600010000006400000000012700fd030c00650000006400000000030d0085043100c90000006400000000043200052020002d010000d306000055aa", 0x60, 0x1a0}]) openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000001e80)='cgroup.procs\x00', 0x2, 0x0) creat(&(0x7f0000000040)='./file0\x00', 0x0) 2033/05/18 03:33:20 executing program 4: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000180)='/dev/zero\x00', 0x101001, 0x0) pwritev(r0, &(0x7f00000013c0)=[{&(0x7f0000001340)="b9", 0x1}], 0x1, 0x0) 2033/05/18 03:33:21 executing program 4: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000180)='/dev/zero\x00', 0x101001, 0x0) pwritev(r0, &(0x7f00000013c0)=[{&(0x7f0000001340)="b9", 0x1}], 0x1, 0x0) 2033/05/18 03:33:21 executing program 5: mknod(&(0x7f0000000840)='./file0\x00', 0x0, 0x0) r0 = syz_fuse_mount(&(0x7f0000000080)='./file0\x00', 0x6003, 0x0, 0x0, 0x0, 0x0) lstat(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)) preadv(r0, &(0x7f0000000100)=[{&(0x7f00000000c0)=""/55, 0x37}], 0x1, 0x0) 2033/05/18 03:33:21 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000100)='ns\x00') getdents64(r0, &(0x7f0000000080)=""/30, 0x2a3) getdents(r0, &(0x7f0000001000)=""/24, 0x18) 2033/05/18 03:33:21 executing program 4: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000180)='/dev/zero\x00', 0x101001, 0x0) pwritev(r0, &(0x7f00000013c0)=[{&(0x7f0000001340)="b9", 0x1}], 0x1, 0x0) 2033/05/18 03:33:21 executing program 6: r0 = socket(0x10, 0x2, 0x0) sendmsg$nl_route(r0, &(0x7f0000504000)={&(0x7f0000dfeff4)={0x10}, 0xc, &(0x7f000009b000)={&(0x7f00006c0fc4)=@newlink={0x28, 0x10, 0x9, 0x0, 0x0, {}, [@IFLA_AF_SPEC={0x8, 0x1a, [{0x4, 0x2}]}]}, 0x28}, 0x1}, 0x0) 2033/05/18 03:33:21 executing program 2: preadv(0xffffffffffffffff, &(0x7f0000001380), 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = memfd_create(&(0x7f000000e000)='\x00 ', 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_PORT_INFO(r0, 0xc0a85322, &(0x7f00000001c0)) pselect6(0x40, &(0x7f0000000080)={0x40, 0x6, 0x200, 0x8, 0x4, 0x80, 0x0, 0x7}, &(0x7f0000000280)={0x5, 0x2, 0x101, 0x80000000, 0xf4, 0x1ff, 0x81, 0x7}, &(0x7f00000002c0)={0x53f0}, &(0x7f0000000300)={0x0, 0x1c9c380}, &(0x7f0000000480)={&(0x7f0000000440), 0x8}) r1 = dup2(0xffffffffffffffff, r0) getsockopt$IPT_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x0, 0x43, &(0x7f00000006c0)={'icmp\x00'}, &(0x7f0000000700)=0x1e) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r1, 0xc08c5332, &(0x7f000002b000)={0x0, 0x0, 0x0, "9ede7a8c5ae95ec8672c93340f643a664f13eeab65c0322901dc6bd36cde2c51f01b7f0b014f9f91eeb7c37c7240f476c8d753d000aa8faf8fb574dbcfa6dc4d"}) getsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(r0, 0x84, 0xa, &(0x7f0000000580)={0x7, 0xfffffffffffffff7, 0x200, 0x1, 0x4, 0x2b2, 0x0, 0x4}, &(0x7f00000005c0)=0x20) write$sndseq(r0, &(0x7f0000000080), 0xffffff17) r2 = syz_open_procfs(0x0, &(0x7f0000000180)='net/igmp\x00') preadv(r2, &(0x7f0000000480)=[{&(0x7f0000000380)=""/242, 0xf2}], 0x1, 0x10400003) [ 95.905499] loop3: p1 p2 p3 < > p4 < > 2033/05/18 03:33:21 executing program 4: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000180)='/dev/zero\x00', 0x101001, 0x0) pwritev(r0, &(0x7f00000013c0)=[{&(0x7f0000001340)="b9", 0x1}], 0x1, 0x0) [ 95.933548] loop0: p1 p2 p3 < > p4 < > [ 96.213334] loop_reread_partitions: partition scan of loop0 () failed (rc=-16) [ 96.216153] loop_reread_partitions: partition scan of loop3 () failed (rc=-16) [ 96.528163] IPVS: Creating netns size=2536 id=17 2033/05/18 03:33:22 executing program 6: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x80000000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fcntl$getown(r0, 0x9) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f000088cff6)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r1, 0x40045431, &(0x7f00003b3fdc)) r2 = syz_open_pts(r1, 0x10000000002) writev(r2, &(0x7f0000001500)=[{&(0x7f0000000480)="7104b88f0181be5ac09100e093b785c74962efaf19b09343529c0c4ad7e817cd47905dee6b7dcfd7f1a4c830127a6668fe62353dd36b7cd59c3786b6ea97e7799e32b1540e3cafc9ff91a93e8cb90bb206301c627af4946683b6f0841f94d61b3d590b81d84713730968ec3704887282c98393d000f9a4c0bfaa69a446e29ac4a2298b6be7ae77d84148460492663187865aa8c4bcd0d3b47974316b2db9905357e69e01dba6e830", 0xa8}], 0x1) syz_mount_image$ext4(&(0x7f0000000140)='ext3\x00', &(0x7f0000000180)='/\x00', 0x0, 0x0, &(0x7f0000000000), 0x28024, &(0x7f00000000c0)) setsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER(0xffffffffffffffff, 0x84, 0x7b, &(0x7f0000000180)={0x0, 0x7}, 0x8) dup3(0xffffffffffffffff, r0, 0x0) 2033/05/18 03:33:22 executing program 4: r0 = openat$sequencer2(0xffffffffffffff9c, &(0x7f00006f3ff0)='/dev/sequencer2\x00', 0x0, 0x0) ioctl$KDGKBLED(r0, 0x40045108, &(0x7f0000888fff)) 2033/05/18 03:33:22 executing program 3: ptrace$pokeuser(0x6, 0x0, 0x0, 0x8) clock_gettime(0x0, &(0x7f00000000c0)) clock_gettime(0x5, &(0x7f0000001ec0)) clock_gettime(0x0, &(0x7f0000000200)={0x0, 0x0}) write$sndseq(0xffffffffffffffff, &(0x7f00000015c0)=[{0xfda, 0x7fff, 0x424, 0x275f7cf9, @tick, {0x56}, {0x0, 0x9a48}, @ext={0x7bc, &(0x7f0000000500)="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"}}, {0x1, 0x3, 0x7fffffff, 0x7, @time={0x77359400}, {0x3ff}, {0x4, 0x2d9}, @control={0x0, 0x9, 0x20}}, {0x0, 0x1000, 0x0, 0x1, @tick=0x3f, {0x0, 0x9}, {0x7, 0x8}, @ext={0x99, &(0x7f0000001500)="a126a62130ae22c71bf7ae805d9274c6fb005cc866f3fbeeccbda60eef491bf44e1d637e718c7716ff147f96bd58cca7bca721d37923d52d49ef23a329a3771e1ea5945af1ce386504e8cb00c51b9184493597794f264d94fc962ce1e0d5dcbf7ad5f92286fbd8fa6fa7ee1b1d67cb0f6a90626ca9b070a5a06f029fc8bd25d3c0d7ef14103daecf79e9b5418e87062e33bdbc7515ba28a954"}}, {0x9, 0x7fff, 0x4, 0x3, @tick=0x5, {0x3}, {0x0, 0x13c4800000}, @time=@time={r0, r1+10000000}}], 0xc0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) accept4$inet(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, @remote}, &(0x7f0000000280)=0x10, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000140)="2e2f6367726f757000361a6f74a1b774b8642f3dfdd313d92946ff0167415d8dc22791dcd496520c1c99f4b07d3b2a11090000000229210b73abdcd2986fc290ac9b6ace278586d39949a54fb276eb1fd3964b0cad27e417b33abb8d3b00e64e75e4dff47de27536dccdde5fc746b04faafcec347560a31b3a35a5f20bc949d75cbb763987", 0x200002, 0x0) syz_read_part_table(0xfffffffffffffffe, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="000000000000000000000000000000000000000000000000ed793afe00000000020082012600010000006400000000012700fd030c00650000006400000000030d0085043100c90000006400000000043200052020002d010000d306000055aa", 0x60, 0x1a0}]) openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000001e80)='cgroup.procs\x00', 0x2, 0x0) creat(&(0x7f0000000040)='./file0\x00', 0x0) 2033/05/18 03:33:22 executing program 0: ptrace$pokeuser(0x6, 0x0, 0x0, 0x8) clock_gettime(0x0, &(0x7f00000000c0)) clock_gettime(0x5, &(0x7f0000001ec0)) clock_gettime(0x0, &(0x7f0000000200)={0x0, 0x0}) write$sndseq(0xffffffffffffffff, &(0x7f00000015c0)=[{0xfda, 0x7fff, 0x424, 0x275f7cf9, @tick, {0x56}, {0x0, 0x9a48}, @ext={0x7bc, &(0x7f0000000500)="7f0f48bb3cf30b92372278ba59382bec9a5396cbdab0bdbec65c71772cfdba5499addbaa8d9ece8985e7c05eff2ce9968870afae3fd8b065ce1e3418bb097251de6bcf6f2968a637f9c2b456c66e9ea4ddbc1b25449b6d0e8ffad38b73b2cdf99fc94d7ce3ee897a4cc1619caac1092758698ba2054d2f3a2ea5b296c67c8459ea25cd1fb92214cf3800dcb4283e5145c4fb85a53ec9bde450faf24a5a72ac2c4886b189cbcb1049ea66dd187b5a48edc311eadc6232d9343dcc8ae72acb29463fde2a68bd259c50b6cc8ee6c7f543844cf13256c4c5c7d8e219b83b34b63771268fd4e481c3c626843130e7a14283170ccf422b2247fd18dcd7b54830624c108239653a7238683a13bfcbfaa71e2e53088706f870f667c702caa3d55c1c3630c3589077da6f7b2c281805e74298e5425b8234746ac1b1bf6239846de10f4c7061b55c66a937b8f7700b895201ec919f4789cab24e656d0f8188f75a2e2b7eed994c1f0ff8ccb9fa8d51ac1ae2bfce7ba8a21133cdd6300880e12d5a44c12ce6b7d12e0079f4c9ec6d1ccac75bd61ef7907e7d101bdc147afb2e2311cb0401c50c7b256412f40691b5fa3270c80fcb191b27632b7c64408d2c0781b99ebd809a4ebc643cf8ef507063a5ef2d65eeadf6c14ee0b475c1620956ba5be019910c57c047642907b1603a880960fc9dee189d76e4c6dd9109a816f243897ed03e8a9987ccec98eb81cf48f57d3114f64a98a29b6d0aae117ae9a4c1f352cfc0ffbea49400742320c8c94c070c5baafdc8f174342e8c2e9c60081ee114fbf146162d14eb4a58600593378c6ba53d67db783103b1d4689bdcd9a00d4653185ba2e48e10af8f4507a55af8a431f94251925a1719402f17fabfb68b8056ffc9d8189c136829844c9ed29c5fb6f0413f2c862d57b55667806dd92959980aa23586d0cd27fc635feda679c2130e3caf84e97f6aa8df8127a06aff7f03968c8986a52395086ae269a3471a05de8c4f8da42c7ba8e5d803da5f6989282a7f16153bb5a9e948981c8f6e9ad78a909b09336f831f6bd7d05246eda2f3c496b0357a53ba6e4a1a6124276e92a8a153927dd05c05d8182c4eaa72a84ecac4b60d1480645be02090d781c6d5c8d4adcaa0714fda1ac403840a95c75739e9e7a1ab65c04890603539170408130ef262868d5012fb9c34c92d39e32e757ba703ac146320ee6eca2788b43c160fdad44414b3cc114ec079d0379797b587b5fd0d21fa6fd5cf9f6ec98ada72d1a7f2693be3b4985ce70b71fddf6eeb5df8b760845cc2f075ae203cd39eb96ab3cd29a59121caa494f53673616d6f862d113c0be6d19596330ab214fe57422ba1369936b97990e738a36864f211b10df39c711d4a0e5f6d7ce7e8eea78e9daa32dad85e5314989be1dd968cc7e1d816999f8977ec048bc92d443a882030e34b78aaff97f9554cab67eb1cca3a6336888752eaf6e92f809aff8afbc359b37a0b0faea13e1b3519b204adc94a8d175226617a4b8a37b7215acc30f3abd05b4552f9f15eea492229b4c5bde67e79d3affccae5a4179b7978d1d991ccdbbf63b505d0c760fd774ba1919435e5b962ca232247c52154bee9d6a61fe00ec03774cc970cd9a87dc7592907cb7fcd67603ebe08fe0043527259c5c8944e2d229e12cbb944bdfe4b9711c7672ddc8a986ed64f8ed34ea903459e671dbdef971a02721cfecb34b796048b038fd9849d0c2b189871439bf650c239d08fb010bb04785a3a365a926f0e7d00ffa0ada96e16465ce5042aa0b301b8ec1f3ad068ad64b4c44437043f194b8bfa413b4e16c4a530ffb20bece2aa7f9a8fe1d5310c0eb2d3a5469f2cce6cefd5767e0e3e2c05a4a832b7556a7938ca689a4b2feeba57b3922633e294fc52d61ad2c154c950505e82a1ae8b3f9be42281fa57a408802c3099daf7d76a5c8e456b2df7492ede6ae5070d0e28ae1e9124b3846022f6f01505493a4be9f70f99cf1f5e5a258139a51244420994ee45c2901f72beea4f5be002a17842c71b0cf2a6d8ffa9d7c43182f74fd7f6f92ebf6502f7ab75e8569ca7b2212212669ead23ee18f96b786c7e696752990ad2868032c4b7fefbd85f78f36797068a69193505313376d22d76bc81b9e3e746972f11f2f36a3ff1744fcde542b4ffc798d1544545238290b32f07db0fd1234a7149404b001d20917445002bc3fd722b5441861963f92a771a78997100c385b23a3c9eebb7fe34e4fbf6271aad3245dde93042d78cde00362c0d85461f956b3dcc821e733fdba69bee9904d8708f65ec26363f32de78cda6be8f254b6794cf637e2a54537875ebc8f7d429a1c39882181dd64f5cad59cd3765d0c03ba31d9c61ad644399d08641b9265674e5766d8a9403854d300cb2492784a736d95ad651740dacc0248d2051d18369900c415a05ddc6c08fbddc4d993d0a1e3b55097c44445a2cbf02e1d7ee9f8a597a3ea0db1f3116ab2efef91ee106c6582cdf53a5550e89695c88788af83e667ba4de20cbaea08a552e5d8a0431a71f50d9665318038e9ae77b588be38ba04da3c622de81ee2216a600d64f8b21b06af9e20d56dc95e46fef38d6dc9dc9ba282a349eea5bfebc0ccdabac69b8fdd591a4643d6009184a0889e4438f78fe3b0794bae9fbe3d9a2410c9b6afe391ce1e9045eaa09704170d909e0becd6e59a2d7cb9dd71e0cda6f904d964428eef4fa0723d9ce4af64fd782960f1ac548a5fd251f2774ceca507ef6a9b71ab4a347968377a6d367171b15d49f6a6fb10709ee3005d466"}}, {0x1, 0x3, 0x7fffffff, 0x7, @time={0x77359400}, {0x3ff}, {0x4, 0x2d9}, @control={0x0, 0x9, 0x20}}, {0x0, 0x1000, 0x0, 0x1, @tick=0x3f, {0x0, 0x9}, {0x7, 0x8}, @ext={0x99, &(0x7f0000001500)="a126a62130ae22c71bf7ae805d9274c6fb005cc866f3fbeeccbda60eef491bf44e1d637e718c7716ff147f96bd58cca7bca721d37923d52d49ef23a329a3771e1ea5945af1ce386504e8cb00c51b9184493597794f264d94fc962ce1e0d5dcbf7ad5f92286fbd8fa6fa7ee1b1d67cb0f6a90626ca9b070a5a06f029fc8bd25d3c0d7ef14103daecf79e9b5418e87062e33bdbc7515ba28a954"}}, {0x9, 0x7fff, 0x4, 0x3, @tick=0x5, {0x3}, {0x0, 0x13c4800000}, @time=@time={r0, r1+10000000}}], 0xc0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) accept4$inet(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, @remote}, &(0x7f0000000280)=0x10, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000140)="2e2f6367726f757000361a6f74a1b774b8642f3dfdd313d92946ff0167415d8dc22791dcd496520c1c99f4b07d3b2a11090000000229210b73abdcd2986fc290ac9b6ace278586d39949a54fb276eb1fd3964b0cad27e417b33abb8d3b00e64e75e4dff47de27536dccdde5fc746b04faafcec347560a31b3a35a5f20bc949d75cbb763987", 0x200002, 0x0) syz_read_part_table(0xfffffffffffffffe, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="000000000000000000000000000000000000000000000000ed793afe00000000020082012600010000006400000000012700fd030c00650000006400000000030d0085043100c90000006400000000043200052020002d010000d306000055aa", 0x60, 0x1a0}]) openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000001e80)='cgroup.procs\x00', 0x2, 0x0) creat(&(0x7f0000000040)='./file0\x00', 0x0) 2033/05/18 03:33:22 executing program 1: r0 = perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) unshare(0x40000000) r1 = dup2(0xffffffffffffffff, r0) openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/checkreqprot\x00', 0x20c002, 0x0) getsockopt$inet_sctp6_SCTP_MAXSEG(r1, 0x84, 0xd, &(0x7f0000000080)=@assoc_id=0x0, &(0x7f00000001c0)=0x4) getsockopt$inet_sctp_SCTP_STREAM_SCHEDULER_VALUE(0xffffffffffffff9c, 0x84, 0x7c, &(0x7f0000000140)={r2, 0x0, 0x5}, &(0x7f0000000180)=0x4a) dup(r0) 2033/05/18 03:33:22 executing program 5: getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f00000000c0), &(0x7f0000000100)=0xc) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x3, 0x3a) setsockopt$inet6_int(r0, 0x29, 0xc8, &(0x7f0000000000), 0x4) setsockopt$inet6_MRT6_ADD_MFC(r0, 0x29, 0xc9, &(0x7f0000000180)={{0xa, 0x0, 0x0, @ipv4={[], [0xff, 0xff], @multicast1=0xe0000001}}, {0xa, 0x0, 0x0, @mcast2={0xff, 0x2, [], 0x1}}}, 0x5c) 2033/05/18 03:33:22 executing program 2: r0 = socket(0xa, 0x2400000001, 0x0) setsockopt$inet6_MCAST_JOIN_GROUP(r0, 0x29, 0x2a, &(0x7f0000034000)={0x1, {{0xa, 0x0, 0x0, @mcast2={0xff, 0x2, [], 0x1}}}}, 0x88) r1 = memfd_create(&(0x7f0000002901)='dev ', 0x0) write(r1, &(0x7f0000000080)="1646", 0x2) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x4, 0x11, r1, 0x0) getsockopt$inet6_buf(r0, 0x29, 0x10000000000030, &(0x7f0000034000)=""/144, &(0x7f0000000000)=0x90) 2033/05/18 03:33:22 executing program 7: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x80000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$IP_VS_SO_SET_ADD(0xffffffffffffffff, 0x0, 0x482, &(0x7f0000000140)={0x11, @loopback=0x7f000001, 0x4e20, 0x0, 'lblcr\x00'}, 0x2c) setsockopt$IP_VS_SO_SET_FLUSH(0xffffffffffffffff, 0x0, 0x485, 0x0, 0x0) openat$full(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/full\x00', 0x200, 0x0) fcntl$getown(r0, 0x9) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000380)='/dev/ptmx\x00', 0x5, 0x0) ioctl$TCSETS(r1, 0x40045431, &(0x7f00003b9fdc)) getsockopt$inet_sctp6_SCTP_DEFAULT_SNDINFO(0xffffffffffffffff, 0x84, 0x22, &(0x7f0000000180)={0x0, 0x200, 0x3, 0x200000000000000, 0x0}, &(0x7f00000001c0)=0x10) getsockopt$inet_sctp_SCTP_DEFAULT_SNDINFO(0xffffffffffffffff, 0x84, 0x22, &(0x7f0000000200)={0x7fffffff, 0x81fc, 0x9, 0x8, r2}, &(0x7f0000000240)=0x10) ioctl$TCSETA(r1, 0x5406, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x7}) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000300)='cgroup.events\x00', 0x0, 0x0) ioctl$PIO_UNISCRNMAP(0xffffffffffffffff, 0x4b6a, &(0x7f0000000340)) syz_open_pts(r1, 0x0) ioctl$fiemap(0xffffffffffffffff, 0xc020660b, &(0x7f00000003c0)=ANY=[]) write(r1, &(0x7f0000c34fff), 0xffffff0b) r3 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000140)='/proc/sys/net/ipv4/vs/sync_threshold\x00', 0x2, 0x0) ioctl$SNDRV_SEQ_IOCTL_SUBSCRIBE_PORT(r3, 0x40505330, &(0x7f0000000040)={{0x9}, {0x8}}) sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000040), 0x0) fcntl$getown(r0, 0x9) setsockopt$inet6_tcp_int(r3, 0x6, 0x0, &(0x7f00000002c0)=0x8, 0x4) bind$pptp(0xffffffffffffffff, &(0x7f0000000280)={0x18, 0x2, {0x2, @local={0xac, 0x14, 0x14, 0xaa}}}, 0x1e) 2033/05/18 03:33:22 executing program 4: r0 = openat$sequencer2(0xffffffffffffff9c, &(0x7f00006f3ff0)='/dev/sequencer2\x00', 0x0, 0x0) ioctl$KDGKBLED(r0, 0x40045108, &(0x7f0000888fff)) 2033/05/18 03:33:22 executing program 2: open(&(0x7f0000000000)='./bus\x00', 0x100000141842, 0x0) syz_mount_image$ntfs(&(0x7f0000000440)='ntfs\x00', &(0x7f0000000480)='./bus\x00', 0x0, 0x0, &(0x7f0000000300), 0x1000, &(0x7f0000000740)=ANY=[]) r0 = open(&(0x7f0000002000)='./bus\x00', 0x44006, 0x0) syz_mount_image$hfs(&(0x7f00000000c0)='hfs\x00', &(0x7f00000001c0)='./control/file0\x00', 0x0, 0x1, &(0x7f0000000300)=[{&(0x7f0000000200), 0xfffffd83}], 0x0, &(0x7f0000001a00)=ANY=[]) pread64(r0, &(0x7f0000000040)=""/117, 0x75, 0x0) 2033/05/18 03:33:22 executing program 4: r0 = openat$sequencer2(0xffffffffffffff9c, &(0x7f00006f3ff0)='/dev/sequencer2\x00', 0x0, 0x0) ioctl$KDGKBLED(r0, 0x40045108, &(0x7f0000888fff)) 2033/05/18 03:33:22 executing program 4: r0 = openat$sequencer2(0xffffffffffffff9c, &(0x7f00006f3ff0)='/dev/sequencer2\x00', 0x0, 0x0) ioctl$KDGKBLED(r0, 0x40045108, &(0x7f0000888fff)) 2033/05/18 03:33:22 executing program 5: r0 = inotify_init1(0x0) fcntl$setown(r0, 0x8, 0xffffffffffffffff) fcntl$getownex(r0, 0x10, &(0x7f000045fff8)={0x0, 0x0}) ptrace$setopts(0x4206, r1, 0x0, 0x0) ptrace(0x4207, r1) ptrace(0x18, r1) [ 97.235360] EXT4-fs (sda1): re-mounted. Opts: 2033/05/18 03:33:22 executing program 4: r0 = memfd_create(&(0x7f00007b0000)="1f00", 0x0) write(r0, &(0x7f0000002000)='\t', 0x1) sendfile(r0, r0, &(0x7f0000001000), 0xfec) setrlimit(0x3, &(0x7f000040c000)) mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x4, 0x11, r0, 0x0) execveat(r0, &(0x7f0000006000)='./file0\x00', &(0x7f0000005fd8), &(0x7f0000006000)=[&(0x7f0000001000)='-@cpuset[md5sum[\x00'], 0x1000) [ 97.334399] EXT4-fs (sda1): re-mounted. Opts: [ 97.336010] loop3: p1 p2 p3 < > p4 < > [ 97.379984] loop0: p1 p2 p3 < > p4 < > 2033/05/18 03:33:22 executing program 6: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x80000000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fcntl$getown(r0, 0x9) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f000088cff6)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r1, 0x40045431, &(0x7f00003b3fdc)) r2 = syz_open_pts(r1, 0x10000000002) writev(r2, &(0x7f0000001500)=[{&(0x7f0000000480)="7104b88f0181be5ac09100e093b785c74962efaf19b09343529c0c4ad7e817cd47905dee6b7dcfd7f1a4c830127a6668fe62353dd36b7cd59c3786b6ea97e7799e32b1540e3cafc9ff91a93e8cb90bb206301c627af4946683b6f0841f94d61b3d590b81d84713730968ec3704887282c98393d000f9a4c0bfaa69a446e29ac4a2298b6be7ae77d84148460492663187865aa8c4bcd0d3b47974316b2db9905357e69e01dba6e830", 0xa8}], 0x1) syz_mount_image$ext4(&(0x7f0000000140)='ext3\x00', &(0x7f0000000180)='/\x00', 0x0, 0x0, &(0x7f0000000000), 0x28024, &(0x7f00000000c0)) setsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER(0xffffffffffffffff, 0x84, 0x7b, &(0x7f0000000180)={0x0, 0x7}, 0x8) dup3(0xffffffffffffffff, r0, 0x0) [ 97.594478] EXT4-fs (sda1): re-mounted. Opts: [ 97.769926] loop_reread_partitions: partition scan of loop0 () failed (rc=-16) [ 97.797464] loop_reread_partitions: partition scan of loop3 () failed (rc=-16) [ 97.815354] IPVS: Creating netns size=2536 id=18 [ 97.936879] IPVS: Creating netns size=2536 id=19 [ 98.188745] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 98.238957] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 98.295246] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 98.309125] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 98.759409] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 98.773473] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 98.787266] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 98.802259] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 99.512776] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 99.545909] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 99.552209] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 99.558829] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready 2033/05/18 03:33:24 executing program 4: perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x71}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000040)={&(0x7f00000001c0)={0x10}, 0xc, &(0x7f0000000780)={&(0x7f0000000400)=@getae={0x40, 0x1f, 0x101, 0x0, 0x0, {{@in6=@local={0xfe, 0x80, [], 0xaa}}, @in=@local={0xac, 0x14, 0x14, 0xaa}}}, 0x40}, 0x1}, 0x0) 2033/05/18 03:33:24 executing program 6: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x80000000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fcntl$getown(r0, 0x9) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f000088cff6)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r1, 0x40045431, &(0x7f00003b3fdc)) r2 = syz_open_pts(r1, 0x10000000002) writev(r2, &(0x7f0000001500)=[{&(0x7f0000000480)="7104b88f0181be5ac09100e093b785c74962efaf19b09343529c0c4ad7e817cd47905dee6b7dcfd7f1a4c830127a6668fe62353dd36b7cd59c3786b6ea97e7799e32b1540e3cafc9ff91a93e8cb90bb206301c627af4946683b6f0841f94d61b3d590b81d84713730968ec3704887282c98393d000f9a4c0bfaa69a446e29ac4a2298b6be7ae77d84148460492663187865aa8c4bcd0d3b47974316b2db9905357e69e01dba6e830", 0xa8}], 0x1) syz_mount_image$ext4(&(0x7f0000000140)='ext3\x00', &(0x7f0000000180)='/\x00', 0x0, 0x0, &(0x7f0000000000), 0x28024, &(0x7f00000000c0)) setsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER(0xffffffffffffffff, 0x84, 0x7b, &(0x7f0000000180)={0x0, 0x7}, 0x8) dup3(0xffffffffffffffff, r0, 0x0) 2033/05/18 03:33:24 executing program 1: r0 = perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) unshare(0x40000000) r1 = dup2(0xffffffffffffffff, r0) openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/checkreqprot\x00', 0x20c002, 0x0) getsockopt$inet_sctp6_SCTP_MAXSEG(r1, 0x84, 0xd, &(0x7f0000000080)=@assoc_id=0x0, &(0x7f00000001c0)=0x4) getsockopt$inet_sctp_SCTP_STREAM_SCHEDULER_VALUE(0xffffffffffffff9c, 0x84, 0x7c, &(0x7f0000000140)={r2, 0x0, 0x5}, &(0x7f0000000180)=0x4a) dup(r0) 2033/05/18 03:33:24 executing program 2: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x80000000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fcntl$getown(r0, 0x9) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f000088cff6)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r1, 0x40045431, &(0x7f00003b3fdc)) r2 = syz_open_pts(r1, 0x10000000002) writev(r2, &(0x7f0000001500)=[{&(0x7f0000000480)="7104b88f0181be5ac09100e093b785c74962efaf19b09343529c0c4ad7e817cd47905dee6b7dcfd7f1a4c830127a6668fe62353dd36b7cd59c3786b6ea97e7799e32b1540e3cafc9ff91a93e8cb90bb206301c627af4946683b6f0841f94d61b3d590b81d84713730968ec3704887282c98393d000f9a4c0bfaa69a446e29ac4a2298b6be7ae77d84148460492663187865aa8c4bcd0d3b47974316b2db9905357e69e01dba6e830", 0xa8}], 0x1) syz_mount_image$ext4(&(0x7f0000000140)='ext3\x00', &(0x7f0000000180)='/\x00', 0x0, 0x0, &(0x7f0000000000), 0x28024, &(0x7f00000000c0)) setsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER(0xffffffffffffffff, 0x84, 0x7b, &(0x7f0000000180)={0x0, 0x7}, 0x8) dup3(0xffffffffffffffff, r0, 0x0) 2033/05/18 03:33:24 executing program 3: ptrace$pokeuser(0x6, 0x0, 0x0, 0x8) clock_gettime(0x0, &(0x7f00000000c0)) clock_gettime(0x5, &(0x7f0000001ec0)) clock_gettime(0x0, &(0x7f0000000200)={0x0, 0x0}) write$sndseq(0xffffffffffffffff, &(0x7f00000015c0)=[{0xfda, 0x7fff, 0x424, 0x275f7cf9, @tick, {0x56}, {0x0, 0x9a48}, @ext={0x7bc, &(0x7f0000000500)="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"}}, {0x1, 0x3, 0x7fffffff, 0x7, @time={0x77359400}, {0x3ff}, {0x4, 0x2d9}, @control={0x0, 0x9, 0x20}}, {0x0, 0x1000, 0x0, 0x1, @tick=0x3f, {0x0, 0x9}, {0x7, 0x8}, @ext={0x99, &(0x7f0000001500)="a126a62130ae22c71bf7ae805d9274c6fb005cc866f3fbeeccbda60eef491bf44e1d637e718c7716ff147f96bd58cca7bca721d37923d52d49ef23a329a3771e1ea5945af1ce386504e8cb00c51b9184493597794f264d94fc962ce1e0d5dcbf7ad5f92286fbd8fa6fa7ee1b1d67cb0f6a90626ca9b070a5a06f029fc8bd25d3c0d7ef14103daecf79e9b5418e87062e33bdbc7515ba28a954"}}, {0x9, 0x7fff, 0x4, 0x3, @tick=0x5, {0x3}, {0x0, 0x13c4800000}, @time=@time={r0, r1+10000000}}], 0xc0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) accept4$inet(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, @remote}, &(0x7f0000000280)=0x10, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000140)="2e2f6367726f757000361a6f74a1b774b8642f3dfdd313d92946ff0167415d8dc22791dcd496520c1c99f4b07d3b2a11090000000229210b73abdcd2986fc290ac9b6ace278586d39949a54fb276eb1fd3964b0cad27e417b33abb8d3b00e64e75e4dff47de27536dccdde5fc746b04faafcec347560a31b3a35a5f20bc949d75cbb763987", 0x200002, 0x0) syz_read_part_table(0xfffffffffffffffe, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="000000000000000000000000000000000000000000000000ed793afe00000000020082012600010000006400000000012700fd030c00650000006400000000030d0085043100c90000006400000000043200052020002d010000d306000055aa", 0x60, 0x1a0}]) openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000001e80)='cgroup.procs\x00', 0x2, 0x0) creat(&(0x7f0000000040)='./file0\x00', 0x0) 2033/05/18 03:33:24 executing program 5: r0 = inotify_init1(0x0) fcntl$setown(r0, 0x8, 0xffffffffffffffff) fcntl$getownex(r0, 0x10, &(0x7f000045fff8)={0x0, 0x0}) ptrace$setopts(0x4206, r1, 0x0, 0x0) ptrace(0x4207, r1) ptrace(0x18, r1) 2033/05/18 03:33:24 executing program 0: ptrace$pokeuser(0x6, 0x0, 0x0, 0x8) clock_gettime(0x0, &(0x7f00000000c0)) clock_gettime(0x5, &(0x7f0000001ec0)) clock_gettime(0x0, &(0x7f0000000200)={0x0, 0x0}) write$sndseq(0xffffffffffffffff, &(0x7f00000015c0)=[{0xfda, 0x7fff, 0x424, 0x275f7cf9, @tick, {0x56}, {0x0, 0x9a48}, @ext={0x7bc, &(0x7f0000000500)="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"}}, {0x1, 0x3, 0x7fffffff, 0x7, @time={0x77359400}, {0x3ff}, {0x4, 0x2d9}, @control={0x0, 0x9, 0x20}}, {0x0, 0x1000, 0x0, 0x1, @tick=0x3f, {0x0, 0x9}, {0x7, 0x8}, @ext={0x99, &(0x7f0000001500)="a126a62130ae22c71bf7ae805d9274c6fb005cc866f3fbeeccbda60eef491bf44e1d637e718c7716ff147f96bd58cca7bca721d37923d52d49ef23a329a3771e1ea5945af1ce386504e8cb00c51b9184493597794f264d94fc962ce1e0d5dcbf7ad5f92286fbd8fa6fa7ee1b1d67cb0f6a90626ca9b070a5a06f029fc8bd25d3c0d7ef14103daecf79e9b5418e87062e33bdbc7515ba28a954"}}, {0x9, 0x7fff, 0x4, 0x3, @tick=0x5, {0x3}, {0x0, 0x13c4800000}, @time=@time={r0, r1+10000000}}], 0xc0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) accept4$inet(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, @remote}, &(0x7f0000000280)=0x10, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000140)="2e2f6367726f757000361a6f74a1b774b8642f3dfdd313d92946ff0167415d8dc22791dcd496520c1c99f4b07d3b2a11090000000229210b73abdcd2986fc290ac9b6ace278586d39949a54fb276eb1fd3964b0cad27e417b33abb8d3b00e64e75e4dff47de27536dccdde5fc746b04faafcec347560a31b3a35a5f20bc949d75cbb763987", 0x200002, 0x0) syz_read_part_table(0xfffffffffffffffe, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="000000000000000000000000000000000000000000000000ed793afe00000000020082012600010000006400000000012700fd030c00650000006400000000030d0085043100c90000006400000000043200052020002d010000d306000055aa", 0x60, 0x1a0}]) openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000001e80)='cgroup.procs\x00', 0x2, 0x0) creat(&(0x7f0000000040)='./file0\x00', 0x0) 2033/05/18 03:33:24 executing program 7: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x80000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$IP_VS_SO_SET_ADD(0xffffffffffffffff, 0x0, 0x482, &(0x7f0000000140)={0x11, @loopback=0x7f000001, 0x4e20, 0x0, 'lblcr\x00'}, 0x2c) setsockopt$IP_VS_SO_SET_FLUSH(0xffffffffffffffff, 0x0, 0x485, 0x0, 0x0) openat$full(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/full\x00', 0x200, 0x0) fcntl$getown(r0, 0x9) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000380)='/dev/ptmx\x00', 0x5, 0x0) ioctl$TCSETS(r1, 0x40045431, &(0x7f00003b9fdc)) getsockopt$inet_sctp6_SCTP_DEFAULT_SNDINFO(0xffffffffffffffff, 0x84, 0x22, &(0x7f0000000180)={0x0, 0x200, 0x3, 0x200000000000000, 0x0}, &(0x7f00000001c0)=0x10) getsockopt$inet_sctp_SCTP_DEFAULT_SNDINFO(0xffffffffffffffff, 0x84, 0x22, &(0x7f0000000200)={0x7fffffff, 0x81fc, 0x9, 0x8, r2}, &(0x7f0000000240)=0x10) ioctl$TCSETA(r1, 0x5406, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x7}) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000300)='cgroup.events\x00', 0x0, 0x0) ioctl$PIO_UNISCRNMAP(0xffffffffffffffff, 0x4b6a, &(0x7f0000000340)) syz_open_pts(r1, 0x0) ioctl$fiemap(0xffffffffffffffff, 0xc020660b, &(0x7f00000003c0)=ANY=[]) write(r1, &(0x7f0000c34fff), 0xffffff0b) r3 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000140)='/proc/sys/net/ipv4/vs/sync_threshold\x00', 0x2, 0x0) ioctl$SNDRV_SEQ_IOCTL_SUBSCRIBE_PORT(r3, 0x40505330, &(0x7f0000000040)={{0x9}, {0x8}}) sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000040), 0x0) fcntl$getown(r0, 0x9) setsockopt$inet6_tcp_int(r3, 0x6, 0x0, &(0x7f00000002c0)=0x8, 0x4) bind$pptp(0xffffffffffffffff, &(0x7f0000000280)={0x18, 0x2, {0x2, @local={0xac, 0x14, 0x14, 0xaa}}}, 0x1e) 2033/05/18 03:33:24 executing program 5: r0 = inotify_init1(0x0) fcntl$setown(r0, 0x8, 0xffffffffffffffff) fcntl$getownex(r0, 0x10, &(0x7f000045fff8)={0x0, 0x0}) ptrace$setopts(0x4206, r1, 0x0, 0x0) ptrace(0x4207, r1) ptrace(0x18, r1) 2033/05/18 03:33:25 executing program 5: r0 = inotify_init1(0x0) fcntl$setown(r0, 0x8, 0xffffffffffffffff) fcntl$getownex(r0, 0x10, &(0x7f000045fff8)={0x0, 0x0}) ptrace$setopts(0x4206, r1, 0x0, 0x0) ptrace(0x4207, r1) ptrace(0x18, r1) 2033/05/18 03:33:25 executing program 5: perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$bt_BT_SECURITY(0xffffffffffffffff, 0x112, 0x4, &(0x7f00000017c0)={0x7}, 0x2) r0 = open$dir(&(0x7f0000000040)='./file0\x00', 0x1ff7e, 0x0) open$dir(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) r1 = openat$pktcdvd(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/pktcdvd/control\x00', 0x0, 0x0) getsockname$unix(r1, &(0x7f00000003c0), &(0x7f0000000440)=0x6e) r2 = open(&(0x7f0000000080)='./file0\x00', 0x4001, 0x0) truncate(&(0x7f00000004c0)='./file0\x00', 0x81020e) sendfile(r2, r0, &(0x7f0000002b80), 0x8000007fffffff) syz_mount_image$btrfs(&(0x7f0000000140)='btrfs\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x0, &(0x7f0000000440), 0x1000, &(0x7f0000000500)) [ 99.855057] EXT4-fs (sda1): re-mounted. Opts: 2033/05/18 03:33:25 executing program 4: ioperm(0x0, 0x3, 0x0) 2033/05/18 03:33:25 executing program 6: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x80000000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fcntl$getown(r0, 0x9) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f000088cff6)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r1, 0x40045431, &(0x7f00003b3fdc)) r2 = syz_open_pts(r1, 0x10000000002) writev(r2, &(0x7f0000001500)=[{&(0x7f0000000480)="7104b88f0181be5ac09100e093b785c74962efaf19b09343529c0c4ad7e817cd47905dee6b7dcfd7f1a4c830127a6668fe62353dd36b7cd59c3786b6ea97e7799e32b1540e3cafc9ff91a93e8cb90bb206301c627af4946683b6f0841f94d61b3d590b81d84713730968ec3704887282c98393d000f9a4c0bfaa69a446e29ac4a2298b6be7ae77d84148460492663187865aa8c4bcd0d3b47974316b2db9905357e69e01dba6e830", 0xa8}], 0x1) syz_mount_image$ext4(&(0x7f0000000140)='ext3\x00', &(0x7f0000000180)='/\x00', 0x0, 0x0, &(0x7f0000000000), 0x28024, &(0x7f00000000c0)) setsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER(0xffffffffffffffff, 0x84, 0x7b, &(0x7f0000000180)={0x0, 0x7}, 0x8) dup3(0xffffffffffffffff, r0, 0x0) [ 99.898478] EXT4-fs (sda1): re-mounted. Opts: 2033/05/18 03:33:25 executing program 4: r0 = syz_open_dev$sndtimer(&(0x7f0000000040)='/dev/snd/timer\x00', 0x0, 0x1a1840) ioctl$SNDRV_TIMER_IOCTL_SELECT(r0, 0x40345410, &(0x7f0000029fcc)={{0x0, 0x2, 0x0, 0xffefffffffffffff}}) r1 = accept4$inet(r0, &(0x7f0000000000)={0x0, 0x0, @loopback}, &(0x7f00000014c0)=0x10, 0x800) readv(0xffffffffffffffff, &(0x7f00000013c0)=[{&(0x7f0000000240)=""/195, 0xc3}, {&(0x7f0000000340)=""/4096, 0x1000}, {&(0x7f0000001340)=""/118, 0x76}], 0x3) r2 = dup2(r1, 0xffffffffffffffff) ioctl$DRM_IOCTL_AGP_INFO(r2, 0x80386433, &(0x7f0000000080)=""/25) sched_yield() r3 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_mreq(r3, 0x29, 0x14, &(0x7f0000000280)={@mcast2={0xff, 0x2, [], 0x1}}, 0x14) getsockopt$inet_sctp6_SCTP_STATUS(0xffffffffffffffff, 0x84, 0xe, &(0x7f00000000c0)={0x0, 0xffffffff, 0x3, 0x4, 0x2, 0xfffffffffffffffe, 0x0, 0x2, {0x0, @in={{0x2, 0x4e21, @dev={0xac, 0x14, 0x14, 0x1e}}}, 0x7fffffff}}, &(0x7f0000000180)=0xb0) setsockopt$inet_sctp6_SCTP_RECONFIG_SUPPORTED(0xffffffffffffffff, 0x84, 0x75, &(0x7f0000001500), 0x8) ioctl$SNDRV_TIMER_IOCTL_PARAMS(r0, 0x40505412, &(0x7f0000d97000)={0xffffffffffffffff, 0x1000000200007d}) readv(r0, &(0x7f0000d48fc0)=[{&(0x7f00003effa9)=""/87, 0x57}], 0x1) set_robust_list(&(0x7f00000015c0)={&(0x7f0000000200)={&(0x7f00000001c0)}, 0x47b4, &(0x7f0000001580)={&(0x7f0000001540)}}, 0x18) ioctl$EVIOCGLED(r2, 0x80404519, &(0x7f0000001680)=""/214) [ 99.995129] EXT4-fs (sda1): re-mounted. Opts: 2033/05/18 03:33:25 executing program 6: r0 = syz_open_procfs(0x0, &(0x7f0000009ffb)='comm\x00') ioctl$DRM_IOCTL_GET_MAP(0xffffffffffffffff, 0xc0286404, &(0x7f0000000040)={&(0x7f0000ffd000/0x3000)=nil, 0x8000, 0x0, 0x0, &(0x7f0000ffd000/0x2000)=nil}) writev(r0, &(0x7f0000000040), 0x1000000000000212) 2033/05/18 03:33:25 executing program 4: rt_sigprocmask(0x0, &(0x7f000078b000)={0xfffffffffffffffa}, 0x0, 0x8) r0 = gettid() timer_create(0x0, &(0x7f0000044000)={0x0, 0xa, 0x4, @tid=r0}, &(0x7f0000044000)) timer_settime(0x0, 0x3, &(0x7f000004a000)={{0x0, 0x1}, {0x7, 0xe4c}}, &(0x7f0000b4a000)) timer_settime(0x0, 0x0, &(0x7f0000000100)={{0x0, 0x989680}}, &(0x7f0000000140)) rt_sigtimedwait(&(0x7f0000000040)={0x9bb7}, &(0x7f0000000080), &(0x7f00000000c0), 0x8) [ 100.105166] loop3: p1 p2 p3 < > p4 < > [ 100.111833] loop0: p1 p2 p3 < > p4 < > [ 100.355057] loop_reread_partitions: partition scan of loop0 () failed (rc=-16) [ 100.407743] loop_reread_partitions: partition scan of loop3 () failed (rc=-16) [ 100.515307] blk_update_request: 3418 callbacks suppressed [ 100.515313] blk_update_request: I/O error, dev loop0, sector 1 [ 100.549952] blk_update_request: I/O error, dev loop3, sector 1 [ 100.551473] blk_update_request: I/O error, dev loop0, sector 1 [ 100.551480] buffer_io_error: 3387 callbacks suppressed [ 100.551485] Buffer I/O error on dev loop0p1, logical block 0, async page read [ 100.551510] blk_update_request: I/O error, dev loop0, sector 5 [ 100.551515] Buffer I/O error on dev loop0p1, logical block 1, async page read [ 100.551561] blk_update_request: I/O error, dev loop0, sector 1 [ 100.551566] Buffer I/O error on dev loop0p1, logical block 0, async page read [ 100.551586] blk_update_request: I/O error, dev loop0, sector 5 [ 100.551590] Buffer I/O error on dev loop0p1, logical block 1, async page read [ 100.551616] blk_update_request: I/O error, dev loop0, sector 1 [ 100.551621] Buffer I/O error on dev loop0p1, logical block 0, async page read [ 100.551640] blk_update_request: I/O error, dev loop0, sector 5 [ 100.551645] Buffer I/O error on dev loop0p1, logical block 1, async page read [ 100.551670] blk_update_request: I/O error, dev loop0, sector 1 [ 100.551675] Buffer I/O error on dev loop0p1, logical block 0, async page read [ 100.551694] blk_update_request: I/O error, dev loop0, sector 5 [ 100.551699] Buffer I/O error on dev loop0p1, logical block 1, async page read [ 100.551725] Buffer I/O error on dev loop0p1, logical block 0, async page read [ 100.551746] Buffer I/O error on dev loop0p1, logical block 1, async page read [ 100.846154] syz-executor5 (10602) used greatest stack depth: 23656 bytes left [ 101.025070] pktgen: kernel_thread() failed for cpu 0 [ 101.030335] pktgen: Cannot create thread for cpu 0 (-4) [ 101.035796] pktgen: kernel_thread() failed for cpu 1 [ 101.040965] pktgen: Cannot create thread for cpu 1 (-4) [ 101.046334] pktgen: Initialization failed for all threads 2033/05/18 03:33:26 executing program 6: perf_event_open(&(0x7f0000000040)={0x1, 0x443, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000000480)={0x2, 0x4e21, @rand_addr}, 0x10) sendto$inet(r0, &(0x7f0000588fff), 0xfffffffffffffe98, 0x20020003, &(0x7f0000385ff0)={0x2, 0x4e21, @loopback=0x7f000001}, 0x10) shutdown(r0, 0x1) 2033/05/18 03:33:26 executing program 0: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f00000000c0)='./file0\x00', 0x400000, 0x1, &(0x7f0000000200)=[{&(0x7f0000000080)="1004000000100000cc000000490b0000ec0300ed00000000000000000000000000200000002000000004000000000000e95dbe5a0000ffff53ef", 0x3a, 0x400}], 0x8001, &(0x7f0000000040)) 2033/05/18 03:33:26 executing program 4: perf_event_open(&(0x7f0000000040)={0x1, 0x443, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) dup2(r1, r0) clock_gettime(0x0, &(0x7f00000002c0)={0x0, 0x0}) recvmmsg(r1, &(0x7f0000f40000)=[{{&(0x7f0000000080)=@nfc_llcp, 0x70, &(0x7f0000000240)=[{&(0x7f0000000280)=""/34, 0x22}], 0x0, &(0x7f0000f40000)=""/7, 0xffffffffffffff1b}}], 0x172, 0x2, &(0x7f0000f40ff0)={0x0, r2+10000000}) gettid() 2033/05/18 03:33:26 executing program 2: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x80000000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fcntl$getown(r0, 0x9) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f000088cff6)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r1, 0x40045431, &(0x7f00003b3fdc)) r2 = syz_open_pts(r1, 0x10000000002) writev(r2, &(0x7f0000001500)=[{&(0x7f0000000480)="7104b88f0181be5ac09100e093b785c74962efaf19b09343529c0c4ad7e817cd47905dee6b7dcfd7f1a4c830127a6668fe62353dd36b7cd59c3786b6ea97e7799e32b1540e3cafc9ff91a93e8cb90bb206301c627af4946683b6f0841f94d61b3d590b81d84713730968ec3704887282c98393d000f9a4c0bfaa69a446e29ac4a2298b6be7ae77d84148460492663187865aa8c4bcd0d3b47974316b2db9905357e69e01dba6e830", 0xa8}], 0x1) syz_mount_image$ext4(&(0x7f0000000140)='ext3\x00', &(0x7f0000000180)='/\x00', 0x0, 0x0, &(0x7f0000000000), 0x28024, &(0x7f00000000c0)) setsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER(0xffffffffffffffff, 0x84, 0x7b, &(0x7f0000000180)={0x0, 0x7}, 0x8) dup3(0xffffffffffffffff, r0, 0x0) 2033/05/18 03:33:26 executing program 3: r0 = inotify_init1(0x0) fcntl$setown(r0, 0x8, 0xffffffffffffffff) fcntl$getownex(r0, 0x10, &(0x7f000045fff8)={0x0, 0x0}) ptrace$setopts(0x4206, r1, 0x0, 0x0) ptrace(0x4207, r1) ptrace(0x15, r1) setsockopt$inet_buf(0xffffffffffffffff, 0x0, 0x0, &(0x7f00000000c0), 0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000280)) pipe(&(0x7f00000001c0)) 2033/05/18 03:33:26 executing program 5: perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = open$dir(&(0x7f0000000040)='./file0\x00', 0x1fffe, 0x0) r1 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000500)='/dev/sequencer2\x00', 0x1fff5, 0x0) setsockopt$inet_tcp_TCP_REPAIR_OPTIONS(r1, 0x6, 0x16, &(0x7f0000000300)=[{0x3, 0x400}, {0x2, 0x1}], 0x2) r2 = open(&(0x7f0000000080)='./file0\x00', 0x4001, 0x0) truncate(&(0x7f00000004c0)='./file0\x00', 0x81020e) sendto$unix(r2, &(0x7f0000000200), 0x0, 0x4, 0x0, 0x0) sendfile(r2, r0, &(0x7f0000002b80), 0x8000007fffffff) fchmodat(r0, &(0x7f00000001c0)='./file0\x00', 0x114) syz_mount_image$btrfs(&(0x7f0000000140)='btrfs\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x0, &(0x7f0000000440), 0x0, &(0x7f0000000500)=ANY=[@ANYBLOB]) ioctl$DRM_IOCTL_MODESET_CTL(0xffffffffffffffff, 0x40086408, &(0x7f0000000340)={0x7, 0x400}) getsockopt$inet6_IPV6_FLOWLABEL_MGR(r1, 0x29, 0x20, &(0x7f0000000200)={@local={0xfe, 0x80, [], 0xaa}, 0x8, 0x2, 0x1, 0x2, 0x81, 0xd0, 0x8e1}, &(0x7f0000000240)=0x20) 2033/05/18 03:33:26 executing program 7: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x80000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$IP_VS_SO_SET_ADD(0xffffffffffffffff, 0x0, 0x482, &(0x7f0000000140)={0x11, @loopback=0x7f000001, 0x4e20, 0x0, 'lblcr\x00'}, 0x2c) setsockopt$IP_VS_SO_SET_FLUSH(0xffffffffffffffff, 0x0, 0x485, 0x0, 0x0) openat$full(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/full\x00', 0x200, 0x0) fcntl$getown(r0, 0x9) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000380)='/dev/ptmx\x00', 0x5, 0x0) ioctl$TCSETS(r1, 0x40045431, &(0x7f00003b9fdc)) getsockopt$inet_sctp6_SCTP_DEFAULT_SNDINFO(0xffffffffffffffff, 0x84, 0x22, &(0x7f0000000180)={0x0, 0x200, 0x3, 0x200000000000000, 0x0}, &(0x7f00000001c0)=0x10) getsockopt$inet_sctp_SCTP_DEFAULT_SNDINFO(0xffffffffffffffff, 0x84, 0x22, &(0x7f0000000200)={0x7fffffff, 0x81fc, 0x9, 0x8, r2}, &(0x7f0000000240)=0x10) ioctl$TCSETA(r1, 0x5406, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x7}) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000300)='cgroup.events\x00', 0x0, 0x0) ioctl$PIO_UNISCRNMAP(0xffffffffffffffff, 0x4b6a, &(0x7f0000000340)) syz_open_pts(r1, 0x0) ioctl$fiemap(0xffffffffffffffff, 0xc020660b, &(0x7f00000003c0)=ANY=[]) write(r1, &(0x7f0000c34fff), 0xffffff0b) r3 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000140)='/proc/sys/net/ipv4/vs/sync_threshold\x00', 0x2, 0x0) ioctl$SNDRV_SEQ_IOCTL_SUBSCRIBE_PORT(r3, 0x40505330, &(0x7f0000000040)={{0x9}, {0x8}}) sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000040), 0x0) fcntl$getown(r0, 0x9) setsockopt$inet6_tcp_int(r3, 0x6, 0x0, &(0x7f00000002c0)=0x8, 0x4) bind$pptp(0xffffffffffffffff, &(0x7f0000000280)={0x18, 0x2, {0x2, @local={0xac, 0x14, 0x14, 0xaa}}}, 0x1e) 2033/05/18 03:33:26 executing program 1: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$sock_inet6_SIOCADDRT(r0, 0x402c542d, &(0x7f0000000380)={@loopback={0x0, 0x1}, @loopback={0x0, 0x1}}) 2033/05/18 03:33:26 executing program 1: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$sock_inet6_SIOCADDRT(r0, 0x402c542d, &(0x7f0000000380)={@loopback={0x0, 0x1}, @loopback={0x0, 0x1}}) 2033/05/18 03:33:26 executing program 3: r0 = inotify_init1(0x0) fcntl$setown(r0, 0x8, 0xffffffffffffffff) fcntl$getownex(r0, 0x10, &(0x7f000045fff8)={0x0, 0x0}) ptrace$setopts(0x4206, r1, 0x0, 0x0) ptrace(0x4207, r1) ptrace(0x15, r1) setsockopt$inet_buf(0xffffffffffffffff, 0x0, 0x0, &(0x7f00000000c0), 0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000280)) pipe(&(0x7f00000001c0)) [ 101.337747] EXT4-fs error (device loop0): ext4_iget:4557: inode #2: comm syz-executor0: root inode unallocated 2033/05/18 03:33:26 executing program 4: perf_event_open(&(0x7f00000000c0)={0x1, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendto$ax25(0xffffffffffffffff, &(0x7f0000000500)="c7b9607c827c80e70fe4947b1035621e1b43b77fd4f2b2a393cac5195c740db293ec2b50f424ef6f634d202440c7cffce3e443bbe5", 0x35, 0x0, &(0x7f0000000300)={0x3, {"65a21c61a839d6"}}, 0x10) request_key(&(0x7f0000000040)='rxrpc_s\x00', &(0x7f0000000480)={0x73, 0x79, 0x7a, 0x1}, &(0x7f00000004c0)='\x00', 0xfffffffffffffff8) openat$pfkey(0xffffffffffffff9c, &(0x7f00000003c0)='/proc/self/net/pfkey\x00', 0x18040, 0x0) perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x71}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000140)="2f65786500000000000409004bddd9de91be10eebf000ee9a90f798058439ed554fa07424adee901d2da75af1f0200f5ab26d7a071fb35331ce39c5a") ioctl$DRM_IOCTL_RES_CTX(r0, 0x40086607, &(0x7f0000000080)={0x0, &(0x7f00000000c0)}) 2033/05/18 03:33:26 executing program 2: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x80000000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fcntl$getown(r0, 0x9) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f000088cff6)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r1, 0x40045431, &(0x7f00003b3fdc)) r2 = syz_open_pts(r1, 0x10000000002) writev(r2, &(0x7f0000001500)=[{&(0x7f0000000480)="7104b88f0181be5ac09100e093b785c74962efaf19b09343529c0c4ad7e817cd47905dee6b7dcfd7f1a4c830127a6668fe62353dd36b7cd59c3786b6ea97e7799e32b1540e3cafc9ff91a93e8cb90bb206301c627af4946683b6f0841f94d61b3d590b81d84713730968ec3704887282c98393d000f9a4c0bfaa69a446e29ac4a2298b6be7ae77d84148460492663187865aa8c4bcd0d3b47974316b2db9905357e69e01dba6e830", 0xa8}], 0x1) syz_mount_image$ext4(&(0x7f0000000140)='ext3\x00', &(0x7f0000000180)='/\x00', 0x0, 0x0, &(0x7f0000000000), 0x28024, &(0x7f00000000c0)) setsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER(0xffffffffffffffff, 0x84, 0x7b, &(0x7f0000000180)={0x0, 0x7}, 0x8) dup3(0xffffffffffffffff, r0, 0x0) [ 101.358485] EXT4-fs (sda1): re-mounted. Opts: 2033/05/18 03:33:26 executing program 1: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$sock_inet6_SIOCADDRT(r0, 0x402c542d, &(0x7f0000000380)={@loopback={0x0, 0x1}, @loopback={0x0, 0x1}}) 2033/05/18 03:33:26 executing program 3: r0 = inotify_init1(0x0) fcntl$setown(r0, 0x8, 0xffffffffffffffff) fcntl$getownex(r0, 0x10, &(0x7f000045fff8)={0x0, 0x0}) ptrace$setopts(0x4206, r1, 0x0, 0x0) ptrace(0x4207, r1) ptrace(0x15, r1) setsockopt$inet_buf(0xffffffffffffffff, 0x0, 0x0, &(0x7f00000000c0), 0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000280)) pipe(&(0x7f00000001c0)) [ 101.446905] EXT4-fs (loop0): get root inode failed 2033/05/18 03:33:26 executing program 1: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$sock_inet6_SIOCADDRT(r0, 0x402c542d, &(0x7f0000000380)={@loopback={0x0, 0x1}, @loopback={0x0, 0x1}}) [ 101.473777] EXT4-fs (loop0): mount failed 2033/05/18 03:33:26 executing program 3: r0 = inotify_init1(0x0) fcntl$setown(r0, 0x8, 0xffffffffffffffff) fcntl$getownex(r0, 0x10, &(0x7f000045fff8)={0x0, 0x0}) ptrace$setopts(0x4206, r1, 0x0, 0x0) ptrace(0x4207, r1) ptrace(0x15, r1) setsockopt$inet_buf(0xffffffffffffffff, 0x0, 0x0, &(0x7f00000000c0), 0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000280)) pipe(&(0x7f00000001c0)) [ 101.650829] EXT4-fs (sda1): re-mounted. Opts: 2033/05/18 03:33:27 executing program 7: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f00000001c0), 0x0, &(0x7f0000000200)={[{@subvolid={'subvolid', 0x3d, 'posix_acl_access#vmnet1'}, 0x2c}]}) 2033/05/18 03:33:27 executing program 3: r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000140)='/proc/self/net/pfkey\x00', 0x0, 0x0) ioctl$UFFDIO_REGISTER(r0, 0xc0189436, &(0x7f0000000040)={{&(0x7f0000ffb000/0x2000)=nil, 0x2000}, 0x800000000}) 2033/05/18 03:33:27 executing program 4: perf_event_open(&(0x7f00000000c0)={0x1, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendto$ax25(0xffffffffffffffff, &(0x7f0000000500)="c7b9607c827c80e70fe4947b1035621e1b43b77fd4f2b2a393cac5195c740db293ec2b50f424ef6f634d202440c7cffce3e443bbe5", 0x35, 0x0, &(0x7f0000000300)={0x3, {"65a21c61a839d6"}}, 0x10) request_key(&(0x7f0000000040)='rxrpc_s\x00', &(0x7f0000000480)={0x73, 0x79, 0x7a, 0x1}, &(0x7f00000004c0)='\x00', 0xfffffffffffffff8) openat$pfkey(0xffffffffffffff9c, &(0x7f00000003c0)='/proc/self/net/pfkey\x00', 0x18040, 0x0) perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x71}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000140)="2f65786500000000000409004bddd9de91be10eebf000ee9a90f798058439ed554fa07424adee901d2da75af1f0200f5ab26d7a071fb35331ce39c5a") ioctl$DRM_IOCTL_RES_CTX(r0, 0x40086607, &(0x7f0000000080)={0x0, &(0x7f00000000c0)}) 2033/05/18 03:33:27 executing program 0: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f00000000c0)='./file0\x00', 0x400000, 0x1, &(0x7f0000000200)=[{&(0x7f0000000080)="1004000000100000cc000000490b0000ec0300ed00000000000000000000000000200000002000000004000000000000e95dbe5a0000ffff53ef", 0x3a, 0x400}], 0x8001, &(0x7f0000000040)) 2033/05/18 03:33:27 executing program 1: perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = open$dir(&(0x7f0000000040)='./file0\x00', 0x1fffe, 0x0) r1 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000500)='/dev/sequencer2\x00', 0x1fff5, 0x0) setsockopt$inet_tcp_TCP_REPAIR_OPTIONS(r1, 0x6, 0x16, &(0x7f0000000300)=[{0x3, 0x400}, {0x2, 0x1}], 0x2) r2 = open(&(0x7f0000000080)='./file0\x00', 0x4001, 0x0) truncate(&(0x7f00000004c0)='./file0\x00', 0x81020e) sendto$unix(r2, &(0x7f0000000200), 0x0, 0x4, 0x0, 0x0) sendfile(r2, r0, &(0x7f0000002b80), 0x8000007fffffff) fchmodat(r0, &(0x7f00000001c0)='./file0\x00', 0x114) syz_mount_image$btrfs(&(0x7f0000000140)='btrfs\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x0, &(0x7f0000000440), 0x0, &(0x7f0000000500)=ANY=[@ANYBLOB]) ioctl$DRM_IOCTL_MODESET_CTL(0xffffffffffffffff, 0x40086408, &(0x7f0000000340)={0x7, 0x400}) getsockopt$inet6_IPV6_FLOWLABEL_MGR(r1, 0x29, 0x20, &(0x7f0000000200)={@local={0xfe, 0x80, [], 0xaa}, 0x8, 0x2, 0x1, 0x2, 0x81, 0xd0, 0x8e1}, &(0x7f0000000240)=0x20) 2033/05/18 03:33:27 executing program 6: perf_event_open(&(0x7f0000000040)={0x1, 0x443, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000000480)={0x2, 0x4e21, @rand_addr}, 0x10) sendto$inet(r0, &(0x7f0000588fff), 0xfffffffffffffe98, 0x20020003, &(0x7f0000385ff0)={0x2, 0x4e21, @loopback=0x7f000001}, 0x10) shutdown(r0, 0x1) 2033/05/18 03:33:27 executing program 2: socketpair$inet6_tcp(0xa, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff}) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000180)='veth1_to_team\x00', 0x10) r1 = socket$inet_tcp(0x2, 0x1, 0x0) clock_settime(0x1, &(0x7f0000000240)={0x77359400}) bind$inet(r1, &(0x7f0000b9bff0)={0x2, 0x4e21, @multicast1=0xe0000001}, 0x10) sendto$inet(r1, &(0x7f0000000080), 0xfffffffffffffd90, 0x20020003, &(0x7f0000385ff0)={0x2, 0x20000000004e21, @loopback=0x7f000001}, 0x10) socketpair$inet_sctp(0x2, 0x1, 0x84, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket(0x0, 0xe, 0x0) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x17, &(0x7f00000002c0), 0x4) getsockopt$inet_sctp_SCTP_PR_STREAM_STATUS(r2, 0x84, 0x74, &(0x7f0000000280)=""/79, &(0x7f0000000200)=0x4f) recvfrom$inet(r1, &(0x7f0000000040)=""/149, 0x906b3b494c5a7b5, 0x0, 0x0, 0xfd69) 2033/05/18 03:33:27 executing program 5: perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = open$dir(&(0x7f0000000040)='./file0\x00', 0x1fffe, 0x0) r1 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000500)='/dev/sequencer2\x00', 0x1fff5, 0x0) setsockopt$inet_tcp_TCP_REPAIR_OPTIONS(r1, 0x6, 0x16, &(0x7f0000000300)=[{0x3, 0x400}, {0x2, 0x1}], 0x2) r2 = open(&(0x7f0000000080)='./file0\x00', 0x4001, 0x0) truncate(&(0x7f00000004c0)='./file0\x00', 0x81020e) sendto$unix(r2, &(0x7f0000000200), 0x0, 0x4, 0x0, 0x0) sendfile(r2, r0, &(0x7f0000002b80), 0x8000007fffffff) fchmodat(r0, &(0x7f00000001c0)='./file0\x00', 0x114) syz_mount_image$btrfs(&(0x7f0000000140)='btrfs\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x0, &(0x7f0000000440), 0x0, &(0x7f0000000500)=ANY=[@ANYBLOB]) ioctl$DRM_IOCTL_MODESET_CTL(0xffffffffffffffff, 0x40086408, &(0x7f0000000340)={0x7, 0x400}) getsockopt$inet6_IPV6_FLOWLABEL_MGR(r1, 0x29, 0x20, &(0x7f0000000200)={@local={0xfe, 0x80, [], 0xaa}, 0x8, 0x2, 0x1, 0x2, 0x81, 0xd0, 0x8e1}, &(0x7f0000000240)=0x20) 2033/05/18 03:33:27 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) bind(r0, &(0x7f0000000080)=@in6={0xa, 0x0, 0x0, @loopback={0x0, 0x1}}, 0x80) sendmmsg(r0, &(0x7f0000001d80)=[{{&(0x7f0000000000)=@in6={0xa, 0x4e21, 0x0, @loopback={0x0, 0x1}}, 0x80, &(0x7f0000000040), 0x0, &(0x7f0000000080)}}, {{&(0x7f0000000a80)=@in={0x2, 0x0, @rand_addr}, 0xfcfd, &(0x7f0000001bc0), 0x3e7, &(0x7f0000000040)}}], 0x2, 0x0) 2033/05/18 03:33:27 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) bind(r0, &(0x7f0000000080)=@in6={0xa, 0x0, 0x0, @loopback={0x0, 0x1}}, 0x80) sendmmsg(r0, &(0x7f0000001d80)=[{{&(0x7f0000000000)=@in6={0xa, 0x4e21, 0x0, @loopback={0x0, 0x1}}, 0x80, &(0x7f0000000040), 0x0, &(0x7f0000000080)}}, {{&(0x7f0000000a80)=@in={0x2, 0x0, @rand_addr}, 0xfcfd, &(0x7f0000001bc0), 0x3e7, &(0x7f0000000040)}}], 0x2, 0x0) 2033/05/18 03:33:27 executing program 4: perf_event_open(&(0x7f00000000c0)={0x1, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendto$ax25(0xffffffffffffffff, &(0x7f0000000500)="c7b9607c827c80e70fe4947b1035621e1b43b77fd4f2b2a393cac5195c740db293ec2b50f424ef6f634d202440c7cffce3e443bbe5", 0x35, 0x0, &(0x7f0000000300)={0x3, {"65a21c61a839d6"}}, 0x10) request_key(&(0x7f0000000040)='rxrpc_s\x00', &(0x7f0000000480)={0x73, 0x79, 0x7a, 0x1}, &(0x7f00000004c0)='\x00', 0xfffffffffffffff8) openat$pfkey(0xffffffffffffff9c, &(0x7f00000003c0)='/proc/self/net/pfkey\x00', 0x18040, 0x0) perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x71}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000140)="2f65786500000000000409004bddd9de91be10eebf000ee9a90f798058439ed554fa07424adee901d2da75af1f0200f5ab26d7a071fb35331ce39c5a") ioctl$DRM_IOCTL_RES_CTX(r0, 0x40086607, &(0x7f0000000080)={0x0, &(0x7f00000000c0)}) 2033/05/18 03:33:27 executing program 7: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f00009aeff0)=[{&(0x7f0000d15fc6)="3900000010000904690000008000000006fa00400100000002e7f3060000001419001200040002000000050000000608000300ff00001ee404", 0x39}], 0x1) [ 102.408427] EXT4-fs error (device loop0): ext4_iget:4557: inode #2: comm syz-executor0: root inode unallocated [ 102.428650] EXT4-fs (loop0): get root inode failed [ 102.435141] EXT4-fs (loop0): mount failed 2033/05/18 03:33:27 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) bind(r0, &(0x7f0000000080)=@in6={0xa, 0x0, 0x0, @loopback={0x0, 0x1}}, 0x80) sendmmsg(r0, &(0x7f0000001d80)=[{{&(0x7f0000000000)=@in6={0xa, 0x4e21, 0x0, @loopback={0x0, 0x1}}, 0x80, &(0x7f0000000040), 0x0, &(0x7f0000000080)}}, {{&(0x7f0000000a80)=@in={0x2, 0x0, @rand_addr}, 0xfcfd, &(0x7f0000001bc0), 0x3e7, &(0x7f0000000040)}}], 0x2, 0x0) [ 102.478409] netlink: 17 bytes leftover after parsing attributes in process `syz-executor7'. 2033/05/18 03:33:27 executing program 0: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f00000000c0)='./file0\x00', 0x400000, 0x1, &(0x7f0000000200)=[{&(0x7f0000000080)="1004000000100000cc000000490b0000ec0300ed00000000000000000000000000200000002000000004000000000000e95dbe5a0000ffff53ef", 0x3a, 0x400}], 0x8001, &(0x7f0000000040)) 2033/05/18 03:33:27 executing program 4: perf_event_open(&(0x7f00000000c0)={0x1, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendto$ax25(0xffffffffffffffff, &(0x7f0000000500)="c7b9607c827c80e70fe4947b1035621e1b43b77fd4f2b2a393cac5195c740db293ec2b50f424ef6f634d202440c7cffce3e443bbe5", 0x35, 0x0, &(0x7f0000000300)={0x3, {"65a21c61a839d6"}}, 0x10) request_key(&(0x7f0000000040)='rxrpc_s\x00', &(0x7f0000000480)={0x73, 0x79, 0x7a, 0x1}, &(0x7f00000004c0)='\x00', 0xfffffffffffffff8) openat$pfkey(0xffffffffffffff9c, &(0x7f00000003c0)='/proc/self/net/pfkey\x00', 0x18040, 0x0) perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x71}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000140)="2f65786500000000000409004bddd9de91be10eebf000ee9a90f798058439ed554fa07424adee901d2da75af1f0200f5ab26d7a071fb35331ce39c5a") ioctl$DRM_IOCTL_RES_CTX(r0, 0x40086607, &(0x7f0000000080)={0x0, &(0x7f00000000c0)}) 2033/05/18 03:33:27 executing program 7: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00001fefe4)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000040)='net/rt_cache\x00') fsetxattr(r2, &(0x7f0000000000)=@known='security.selinux\x00', &(0x7f0000000080)="bb", 0x0, 0x0) sendto$inet6(r0, &(0x7f0000f6f000), 0x0, 0x20000004, &(0x7f0000cc7fe4)={0xa, 0x4e22}, 0x1c) r3 = accept4(r1, &(0x7f0000218fa8)=@alg, &(0x7f0000db4ffc)=0x214, 0x0) getsockopt$IP6T_SO_GET_ENTRIES(r0, 0x29, 0x41, &(0x7f00000000c0)={'nat\x00', 0xa1, "2b1bec292ea24fa037121d577505e7a11f7e744643fd03938cea8fd50301dd89444d8e3848db0b0d3f1cfac94a7e66e3051fd154fcc6ff893633301a16beeb5adab1503d760fe9bd5c766840b206915997fe36ca1148d8ad8fbe1d5af928324ec0687029cc9d413fea93ffe994df093042e28bfca141a49d7240cd5ad748988116461d2b2f528319642e0a8e2ef42ad07f87f0625295c036223cf87565b92a8715"}, &(0x7f00000001c0)=0xc5) shutdown(r0, 0x2) ioctl$sock_netrom_TIOCINQ(r3, 0x541b, &(0x7f0000000200)) 2033/05/18 03:33:27 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) bind(r0, &(0x7f0000000080)=@in6={0xa, 0x0, 0x0, @loopback={0x0, 0x1}}, 0x80) sendmmsg(r0, &(0x7f0000001d80)=[{{&(0x7f0000000000)=@in6={0xa, 0x4e21, 0x0, @loopback={0x0, 0x1}}, 0x80, &(0x7f0000000040), 0x0, &(0x7f0000000080)}}, {{&(0x7f0000000a80)=@in={0x2, 0x0, @rand_addr}, 0xfcfd, &(0x7f0000001bc0), 0x3e7, &(0x7f0000000040)}}], 0x2, 0x0) 2033/05/18 03:33:27 executing program 3: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r0, 0x107, 0xf, &(0x7f0000000040)=0x6, 0x4) sendto$inet6(r0, &(0x7f0000000080)="0401000000c000ddb8460900ffb25b4202938207d9033780398d5375c5f73f9390292412f295136fcff575903376b15cddbcd07a033b978920a42f2a2bb404e1b50000000040000000f55d4626a8805534529e419ad02192f872e3267aab0000000000000000000000000054", 0x6c, 0x0, &(0x7f0000000000)={0xa, 0x200000800, 0x7, @dev={0xfe, 0x80, [], 0x1c}, 0x8000}, 0x1c) [ 102.594424] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 102.719811] EXT4-fs error (device loop0): ext4_iget:4557: inode #2: comm syz-executor0: root inode unallocated [ 102.731866] EXT4-fs (loop0): get root inode failed [ 102.740143] EXT4-fs (loop0): mount failed 2033/05/18 03:33:28 executing program 2: openat$rtc(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/rtc0\x00', 0x412000, 0x0) mmap$binder(&(0x7f0000ff9000/0x4000)=nil, 0x4000, 0x2, 0x10, 0xffffffffffffff9c, 0x0) r0 = open(&(0x7f0000000040)='..', 0x0, 0x0) fcntl$notify(r0, 0x402, 0x2) 2033/05/18 03:33:28 executing program 3: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_int(r0, 0x0, 0x18, &(0x7f0000773000)=0x200000000404, 0x4) bind$inet(r0, &(0x7f0000000000)={0x2, 0x0, @rand_addr=0x7}, 0x10) 2033/05/18 03:33:28 executing program 0: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f00000000c0)='./file0\x00', 0x400000, 0x1, &(0x7f0000000200)=[{&(0x7f0000000080)="1004000000100000cc000000490b0000ec0300ed00000000000000000000000000200000002000000004000000000000e95dbe5a0000ffff53ef", 0x3a, 0x400}], 0x8001, &(0x7f0000000040)) 2033/05/18 03:33:28 executing program 4: r0 = socket$inet6(0xa, 0x400000000001, 0x0) r1 = dup(r0) perf_event_open(&(0x7f0000000040)={0x1, 0x443, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40000000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TUNSETOFFLOAD(0xffffffffffffffff, 0x400454d0, 0x0) r2 = socket(0xa, 0x2, 0x0) connect$inet6(r2, &(0x7f0000000040)={0xa, 0x0, 0x0, @mcast1={0xff, 0x1, [], 0x1}, 0x100000002}, 0x1c) setsockopt$sock_int(r2, 0x1, 0xb, &(0x7f0000000080)=0x6c5, 0x4) sendto$inet(r2, &(0x7f0000509f92), 0xff77, 0x0, &(0x7f000055fff0)={0x2, 0x4e23, @loopback=0x7f000001}, 0x10) setsockopt$inet6_tcp_int(r1, 0x6, 0x20000000000002, &(0x7f00007b1000)=0x81, 0x4) bind$inet6(r2, &(0x7f00000000c0)={0xa, 0x4e24, 0x7fff, @ipv4={[], [0xff, 0xff], @broadcast=0xffffffff}, 0xa402}, 0x1c) dup2(r1, r0) bind$inet6(r1, &(0x7f0000000080)={0xa, 0x4e20, 0x0, @loopback={0x0, 0x1}}, 0x1c) sendto$inet6(r0, &(0x7f0000000000)="85ace0073bc515f3adbed20d060a3eee25e220eeaed668d3e5e3e82c89e7d37a3562fa", 0x23, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback={0x0, 0x1}}, 0x1c) r3 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0xfffffffffffffffe) ftruncate(r3, 0x7fff) setsockopt$inet_tcp_TCP_MD5SIG(0xffffffffffffffff, 0x6, 0xe, &(0x7f0000001140)={@in6={{0xa, 0x4e20, 0x0, @mcast1={0xff, 0x1, [], 0x1}}}, 0x4, 0x20, 0x0, "755ccbd589963fc68b748315ddb526e75affef53a3f70188af1358d12e76c6b9b89cf84aa9364ed24706c85f515093c2ce55dde6d80a1e59c3c13a7c2d25cea6af78a35d715cd3f9cd358dade09b8351"}, 0xd8) sendfile(r1, r3, &(0x7f0000d83ff8), 0x8000fffffffe) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_TEMPO(r3, 0x402c5342, &(0x7f0000000180)={0x7, 0x5, 0x7fffffff, {0x77359400}, 0xe5a2, 0x2}) 2033/05/18 03:33:28 executing program 6: perf_event_open(&(0x7f0000000040)={0x1, 0x443, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000000480)={0x2, 0x4e21, @rand_addr}, 0x10) sendto$inet(r0, &(0x7f0000588fff), 0xfffffffffffffe98, 0x20020003, &(0x7f0000385ff0)={0x2, 0x4e21, @loopback=0x7f000001}, 0x10) shutdown(r0, 0x1) 2033/05/18 03:33:28 executing program 7: syz_mount_image$vfat(&(0x7f0000000140)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x0, 0x0, &(0x7f00000011c0), 0x0, &(0x7f0000000240)={[{@check_strict='check=strict', 0x2c}]}) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f0000000100)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000010000)="eb3c906d6b66732e66617400020401000200027000f8", 0x16}], 0x0, &(0x7f0000000240)=ANY=[]) open(&(0x7f0000000180)='./file0/file0\x00', 0x0, 0x0) open(&(0x7f0000000080)='./file0/file0\x00', 0x3fffa, 0x0) 2033/05/18 03:33:28 executing program 1: perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = open$dir(&(0x7f0000000040)='./file0\x00', 0x1fffe, 0x0) r1 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000500)='/dev/sequencer2\x00', 0x1fff5, 0x0) setsockopt$inet_tcp_TCP_REPAIR_OPTIONS(r1, 0x6, 0x16, &(0x7f0000000300)=[{0x3, 0x400}, {0x2, 0x1}], 0x2) r2 = open(&(0x7f0000000080)='./file0\x00', 0x4001, 0x0) truncate(&(0x7f00000004c0)='./file0\x00', 0x81020e) sendto$unix(r2, &(0x7f0000000200), 0x0, 0x4, 0x0, 0x0) sendfile(r2, r0, &(0x7f0000002b80), 0x8000007fffffff) fchmodat(r0, &(0x7f00000001c0)='./file0\x00', 0x114) syz_mount_image$btrfs(&(0x7f0000000140)='btrfs\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x0, &(0x7f0000000440), 0x0, &(0x7f0000000500)=ANY=[@ANYBLOB]) ioctl$DRM_IOCTL_MODESET_CTL(0xffffffffffffffff, 0x40086408, &(0x7f0000000340)={0x7, 0x400}) getsockopt$inet6_IPV6_FLOWLABEL_MGR(r1, 0x29, 0x20, &(0x7f0000000200)={@local={0xfe, 0x80, [], 0xaa}, 0x8, 0x2, 0x1, 0x2, 0x81, 0xd0, 0x8e1}, &(0x7f0000000240)=0x20) 2033/05/18 03:33:28 executing program 5: perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = open$dir(&(0x7f0000000040)='./file0\x00', 0x1fffe, 0x0) r1 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000500)='/dev/sequencer2\x00', 0x1fff5, 0x0) setsockopt$inet_tcp_TCP_REPAIR_OPTIONS(r1, 0x6, 0x16, &(0x7f0000000300)=[{0x3, 0x400}, {0x2, 0x1}], 0x2) r2 = open(&(0x7f0000000080)='./file0\x00', 0x4001, 0x0) truncate(&(0x7f00000004c0)='./file0\x00', 0x81020e) sendto$unix(r2, &(0x7f0000000200), 0x0, 0x4, 0x0, 0x0) sendfile(r2, r0, &(0x7f0000002b80), 0x8000007fffffff) fchmodat(r0, &(0x7f00000001c0)='./file0\x00', 0x114) syz_mount_image$btrfs(&(0x7f0000000140)='btrfs\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x0, &(0x7f0000000440), 0x0, &(0x7f0000000500)=ANY=[@ANYBLOB]) ioctl$DRM_IOCTL_MODESET_CTL(0xffffffffffffffff, 0x40086408, &(0x7f0000000340)={0x7, 0x400}) getsockopt$inet6_IPV6_FLOWLABEL_MGR(r1, 0x29, 0x20, &(0x7f0000000200)={@local={0xfe, 0x80, [], 0xaa}, 0x8, 0x2, 0x1, 0x2, 0x81, 0xd0, 0x8e1}, &(0x7f0000000240)=0x20) 2033/05/18 03:33:28 executing program 3: r0 = perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x71, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fcntl$setown(0xffffffffffffffff, 0x8, 0xffffffffffffffff) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f00000000c0)='vfat\x00', &(0x7f0000000500)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f0000000600)="c8c7263634c80000000000000000", 0xe}], 0x0, &(0x7f0000000640)=ANY=[]) r1 = syz_open_procfs(0x0, &(0x7f0000176000)="00640001000445") socket$netlink(0x10, 0x3, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) sendmsg$IPVS_CMD_GET_INFO(0xffffffffffffffff, &(0x7f00000004c0)={&(0x7f0000000300)={0x10}, 0xc, &(0x7f0000000440)={&(0x7f0000000380)=ANY=[@ANYRES16, @ANYBLOB="10002abd7000ffdbdf250f00000008000496686fbd000c000100080006007772720008000600be0003007f"], 0x2}, 0x1}, 0x0) getsockopt$IPT_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x40, &(0x7f0000000280)={'raw\x00'}, &(0x7f0000000540)=0x54) ioctl$KDGKBTYPE(r1, 0x4b33, &(0x7f0000000680)) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000200), &(0x7f0000000240)=0xc) r2 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) write$binfmt_script(r0, &(0x7f0000002040)={'#! ', './file0', [{0x20, '$securityselinux'}, {0x20, 'IPVS\x00'}, {0x20, ']nodev,-@,'}, {0x20, 'em0'}], 0xa, "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"}, 0xc31) fallocate(r2, 0x1, 0x7fff, 0x10000101) 2033/05/18 03:33:28 executing program 2: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fsync(0xffffffffffffffff) syz_mount_image$vfat(&(0x7f00000000c0)='vfat\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, &(0x7f0000000400), 0x0, &(0x7f0000000480)) sendmsg$unix(0xffffffffffffffff, &(0x7f0000833000)={&(0x7f0000000000)=@abs, 0x6e, &(0x7f00007e0000)=[{&(0x7f0000007000)="fd20932fcc7cfaafcf960802e02348f8fba600069da7b753c31273", 0x1b}], 0x1, &(0x7f00000001c0)}, 0x0) r0 = syz_open_dev$sg(&(0x7f0000970000)='/dev/sg#\x00', 0x0, 0x0) ioctl$EVIOCSABS0(0xffffffffffffffff, 0x401845c0, &(0x7f0000007000)={0x0, 0x0, 0x65}) ioctl(r0, 0x2285, &(0x7f0000007000)='S') [ 103.364935] FAT-fs (loop7): bogus number of reserved sectors [ 103.372239] FAT-fs (loop7): Can't find a valid FAT filesystem [ 103.431281] EXT4-fs error (device loop0): ext4_iget:4557: inode #2: comm syz-executor0: root inode unallocated 2033/05/18 03:33:28 executing program 7: syz_mount_image$vfat(&(0x7f0000000140)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x0, 0x0, &(0x7f00000011c0), 0x0, &(0x7f0000000240)={[{@check_strict='check=strict', 0x2c}]}) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f0000000100)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000010000)="eb3c906d6b66732e66617400020401000200027000f8", 0x16}], 0x0, &(0x7f0000000240)=ANY=[]) open(&(0x7f0000000180)='./file0/file0\x00', 0x0, 0x0) open(&(0x7f0000000080)='./file0/file0\x00', 0x3fffa, 0x0) [ 103.481907] EXT4-fs (loop0): get root inode failed [ 103.513401] EXT4-fs (loop0): mount failed [ 103.523540] FAT-fs (loop3): bogus number of reserved sectors [ 103.523558] FAT-fs (loop3): Can't find a valid FAT filesystem [ 103.527120] FAT-fs (loop2): bogus number of reserved sectors [ 103.527139] FAT-fs (loop2): Can't find a valid FAT filesystem 2033/05/18 03:33:28 executing program 2: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fsync(0xffffffffffffffff) syz_mount_image$vfat(&(0x7f00000000c0)='vfat\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, &(0x7f0000000400), 0x0, &(0x7f0000000480)) sendmsg$unix(0xffffffffffffffff, &(0x7f0000833000)={&(0x7f0000000000)=@abs, 0x6e, &(0x7f00007e0000)=[{&(0x7f0000007000)="fd20932fcc7cfaafcf960802e02348f8fba600069da7b753c31273", 0x1b}], 0x1, &(0x7f00000001c0)}, 0x0) r0 = syz_open_dev$sg(&(0x7f0000970000)='/dev/sg#\x00', 0x0, 0x0) ioctl$EVIOCSABS0(0xffffffffffffffff, 0x401845c0, &(0x7f0000007000)={0x0, 0x0, 0x65}) ioctl(r0, 0x2285, &(0x7f0000007000)='S') 2033/05/18 03:33:28 executing program 7: syz_mount_image$vfat(&(0x7f0000000140)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x0, 0x0, &(0x7f00000011c0), 0x0, &(0x7f0000000240)={[{@check_strict='check=strict', 0x2c}]}) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f0000000100)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000010000)="eb3c906d6b66732e66617400020401000200027000f8", 0x16}], 0x0, &(0x7f0000000240)=ANY=[]) open(&(0x7f0000000180)='./file0/file0\x00', 0x0, 0x0) open(&(0x7f0000000080)='./file0/file0\x00', 0x3fffa, 0x0) [ 103.599766] sd 0:0:1:0: [sg0] tag#173 FAILED Result: hostbyte=DID_ABORT driverbyte=DRIVER_OK [ 103.600062] sd 0:0:1:0: [sg0] tag#173 CDB: Test Unit Ready [ 103.600373] sd 0:0:1:0: [sg0] tag#173 CDB[00]: 00 00 00 00 00 08 00 00 00 00 00 00 00 69 fd 00 [ 103.600989] sd 0:0:1:0: [sg0] tag#173 CDB[10]: 00 00 00 00 00 ff ff ff ff ff ff ff ff 58 b0 02 [ 103.601264] sd 0:0:1:0: [sg0] tag#173 CDB[20]: 20 00 00 00 00 00 00 00 00 00 00 00 00 01 00 00 [ 103.601714] sd 0:0:1:0: [sg0] tag#173 CDB[30]: 00 00 00 00 00 00 00 00 00 00 00 00 00 fe ff ff [ 103.601893] sd 0:0:1:0: [sg0] tag#173 CDB[40]: ff ff ff ff ff 59 b0 02 20 00 00 00 00 00 00 00 [ 103.602271] sd 0:0:1:0: [sg0] tag#173 CDB[50]: 00 00 00 00 00 01 00 00 00 00 00 00 00 00 00 00 [ 103.602572] sd 0:0:1:0: [sg0] tag#173 CDB[60]: 00 00 00 00 00 [ 103.626164] FAT-fs (loop7): bogus number of reserved sectors [ 103.626170] FAT-fs (loop7): Can't find a valid FAT filesystem [ 103.630533] FAT-fs (loop2): bogus number of reserved sectors [ 103.630537] FAT-fs (loop2): Can't find a valid FAT filesystem [ 103.654420] sd 0:0:1:0: [sg0] tag#173 FAILED Result: hostbyte=DID_ABORT driverbyte=DRIVER_OK [ 103.654433] sd 0:0:1:0: [sg0] tag#173 CDB: Test Unit Ready [ 103.654448] sd 0:0:1:0: [sg0] tag#173 CDB[00]: 00 00 00 00 00 08 00 00 00 00 00 00 00 69 fd 00 [ 103.654460] sd 0:0:1:0: [sg0] tag#173 CDB[10]: 00 00 00 00 00 ff ff ff ff ff ff ff ff 58 b0 02 [ 103.654471] sd 0:0:1:0: [sg0] tag#173 CDB[20]: 20 00 00 00 00 00 00 00 00 00 00 00 00 01 00 00 [ 103.654482] sd 0:0:1:0: [sg0] tag#173 CDB[30]: 00 00 00 00 00 00 00 00 00 00 00 00 00 fe ff ff [ 103.654492] sd 0:0:1:0: [sg0] tag#173 CDB[40]: ff ff ff ff ff 59 b0 02 20 00 00 00 00 00 00 00 [ 103.654502] sd 0:0:1:0: [sg0] tag#173 CDB[50]: 00 00 00 00 00 01 00 00 00 00 00 00 00 00 00 00 [ 103.654511] sd 0:0:1:0: [sg0] tag#173 CDB[60]: 00 00 00 00 00 [ 103.824256] FAT-fs (loop7): bogus number of reserved sectors [ 103.824261] FAT-fs (loop7): Can't find a valid FAT filesystem [ 103.883069] FAT-fs (loop2): bogus number of reserved sectors [ 103.883092] FAT-fs (loop2): Can't find a valid FAT filesystem [ 103.966285] sd 0:0:1:0: [sg0] tag#173 FAILED Result: hostbyte=DID_ABORT driverbyte=DRIVER_OK [ 103.966423] sd 0:0:1:0: [sg0] tag#173 CDB: Test Unit Ready [ 103.966523] sd 0:0:1:0: [sg0] tag#173 CDB[00]: 00 00 00 00 00 08 00 00 00 00 00 00 00 69 fd 00 [ 103.966625] sd 0:0:1:0: [sg0] tag#173 CDB[10]: 00 00 00 00 00 ff ff ff ff ff ff ff ff 58 b0 02 [ 103.966635] sd 0:0:1:0: [sg0] tag#173 CDB[20]: 20 00 00 00 00 00 00 00 00 00 00 00 00 01 00 00 [ 103.966644] sd 0:0:1:0: [sg0] tag#173 CDB[30]: 00 00 00 00 00 00 00 00 00 00 00 00 00 fe ff ff [ 103.966654] sd 0:0:1:0: [sg0] tag#173 CDB[40]: ff ff ff ff ff 59 b0 02 20 00 00 00 00 00 00 00 [ 103.966667] sd 0:0:1:0: [sg0] tag#173 CDB[50]: 00 00 00 00 00 01 00 00 00 00 00 00 00 00 00 00 [ 103.966783] sd 0:0:1:0: [sg0] tag#173 CDB[60]: 00 00 00 00 00 [ 104.080919] FAT-fs (loop3): bogus number of reserved sectors [ 104.080955] FAT-fs (loop3): Can't find a valid FAT filesystem [ 104.402494] syz-executor5 (10825) used greatest stack depth: 23592 bytes left [ 104.406372] syz-executor1 (10827) used greatest stack depth: 22504 bytes left 2033/05/18 03:33:29 executing program 7: syz_mount_image$vfat(&(0x7f0000000140)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x0, 0x0, &(0x7f00000011c0), 0x0, &(0x7f0000000240)={[{@check_strict='check=strict', 0x2c}]}) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f0000000100)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000010000)="eb3c906d6b66732e66617400020401000200027000f8", 0x16}], 0x0, &(0x7f0000000240)=ANY=[]) open(&(0x7f0000000180)='./file0/file0\x00', 0x0, 0x0) open(&(0x7f0000000080)='./file0/file0\x00', 0x3fffa, 0x0) 2033/05/18 03:33:29 executing program 3: r0 = perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x71, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fcntl$setown(0xffffffffffffffff, 0x8, 0xffffffffffffffff) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f00000000c0)='vfat\x00', &(0x7f0000000500)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f0000000600)="c8c7263634c80000000000000000", 0xe}], 0x0, &(0x7f0000000640)=ANY=[]) r1 = syz_open_procfs(0x0, &(0x7f0000176000)="00640001000445") socket$netlink(0x10, 0x3, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) sendmsg$IPVS_CMD_GET_INFO(0xffffffffffffffff, &(0x7f00000004c0)={&(0x7f0000000300)={0x10}, 0xc, &(0x7f0000000440)={&(0x7f0000000380)=ANY=[@ANYRES16, @ANYBLOB="10002abd7000ffdbdf250f00000008000496686fbd000c000100080006007772720008000600be0003007f"], 0x2}, 0x1}, 0x0) getsockopt$IPT_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x40, &(0x7f0000000280)={'raw\x00'}, &(0x7f0000000540)=0x54) ioctl$KDGKBTYPE(r1, 0x4b33, &(0x7f0000000680)) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000200), &(0x7f0000000240)=0xc) r2 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) write$binfmt_script(r0, &(0x7f0000002040)={'#! ', './file0', [{0x20, '$securityselinux'}, {0x20, 'IPVS\x00'}, {0x20, ']nodev,-@,'}, {0x20, 'em0'}], 0xa, "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"}, 0xc31) fallocate(r2, 0x1, 0x7fff, 0x10000101) 2033/05/18 03:33:29 executing program 2: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fsync(0xffffffffffffffff) syz_mount_image$vfat(&(0x7f00000000c0)='vfat\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, &(0x7f0000000400), 0x0, &(0x7f0000000480)) sendmsg$unix(0xffffffffffffffff, &(0x7f0000833000)={&(0x7f0000000000)=@abs, 0x6e, &(0x7f00007e0000)=[{&(0x7f0000007000)="fd20932fcc7cfaafcf960802e02348f8fba600069da7b753c31273", 0x1b}], 0x1, &(0x7f00000001c0)}, 0x0) r0 = syz_open_dev$sg(&(0x7f0000970000)='/dev/sg#\x00', 0x0, 0x0) ioctl$EVIOCSABS0(0xffffffffffffffff, 0x401845c0, &(0x7f0000007000)={0x0, 0x0, 0x65}) ioctl(r0, 0x2285, &(0x7f0000007000)='S') 2033/05/18 03:33:29 executing program 6: perf_event_open(&(0x7f0000000040)={0x1, 0x443, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000000480)={0x2, 0x4e21, @rand_addr}, 0x10) sendto$inet(r0, &(0x7f0000588fff), 0xfffffffffffffe98, 0x20020003, &(0x7f0000385ff0)={0x2, 0x4e21, @loopback=0x7f000001}, 0x10) shutdown(r0, 0x1) 2033/05/18 03:33:29 executing program 5: perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = open$dir(&(0x7f0000000040)='./file0\x00', 0x1fffe, 0x0) r1 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000500)='/dev/sequencer2\x00', 0x1fff5, 0x0) setsockopt$inet_tcp_TCP_REPAIR_OPTIONS(r1, 0x6, 0x16, &(0x7f0000000300)=[{0x3, 0x400}, {0x2, 0x1}], 0x2) r2 = open(&(0x7f0000000080)='./file0\x00', 0x4001, 0x0) truncate(&(0x7f00000004c0)='./file0\x00', 0x81020e) sendto$unix(r2, &(0x7f0000000200), 0x0, 0x4, 0x0, 0x0) sendfile(r2, r0, &(0x7f0000002b80), 0x8000007fffffff) fchmodat(r0, &(0x7f00000001c0)='./file0\x00', 0x114) syz_mount_image$btrfs(&(0x7f0000000140)='btrfs\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x0, &(0x7f0000000440), 0x0, &(0x7f0000000500)=ANY=[@ANYBLOB]) ioctl$DRM_IOCTL_MODESET_CTL(0xffffffffffffffff, 0x40086408, &(0x7f0000000340)={0x7, 0x400}) getsockopt$inet6_IPV6_FLOWLABEL_MGR(r1, 0x29, 0x20, &(0x7f0000000200)={@local={0xfe, 0x80, [], 0xaa}, 0x8, 0x2, 0x1, 0x2, 0x81, 0xd0, 0x8e1}, &(0x7f0000000240)=0x20) 2033/05/18 03:33:29 executing program 1: perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = open$dir(&(0x7f0000000040)='./file0\x00', 0x1fffe, 0x0) r1 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000500)='/dev/sequencer2\x00', 0x1fff5, 0x0) setsockopt$inet_tcp_TCP_REPAIR_OPTIONS(r1, 0x6, 0x16, &(0x7f0000000300)=[{0x3, 0x400}, {0x2, 0x1}], 0x2) r2 = open(&(0x7f0000000080)='./file0\x00', 0x4001, 0x0) truncate(&(0x7f00000004c0)='./file0\x00', 0x81020e) sendto$unix(r2, &(0x7f0000000200), 0x0, 0x4, 0x0, 0x0) sendfile(r2, r0, &(0x7f0000002b80), 0x8000007fffffff) fchmodat(r0, &(0x7f00000001c0)='./file0\x00', 0x114) syz_mount_image$btrfs(&(0x7f0000000140)='btrfs\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x0, &(0x7f0000000440), 0x0, &(0x7f0000000500)=ANY=[@ANYBLOB]) ioctl$DRM_IOCTL_MODESET_CTL(0xffffffffffffffff, 0x40086408, &(0x7f0000000340)={0x7, 0x400}) getsockopt$inet6_IPV6_FLOWLABEL_MGR(r1, 0x29, 0x20, &(0x7f0000000200)={@local={0xfe, 0x80, [], 0xaa}, 0x8, 0x2, 0x1, 0x2, 0x81, 0xd0, 0x8e1}, &(0x7f0000000240)=0x20) 2033/05/18 03:33:29 executing program 4: r0 = socket$inet6(0xa, 0x400000000001, 0x0) r1 = dup(r0) perf_event_open(&(0x7f0000000040)={0x1, 0x443, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40000000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TUNSETOFFLOAD(0xffffffffffffffff, 0x400454d0, 0x0) r2 = socket(0xa, 0x2, 0x0) connect$inet6(r2, &(0x7f0000000040)={0xa, 0x0, 0x0, @mcast1={0xff, 0x1, [], 0x1}, 0x100000002}, 0x1c) setsockopt$sock_int(r2, 0x1, 0xb, &(0x7f0000000080)=0x6c5, 0x4) sendto$inet(r2, &(0x7f0000509f92), 0xff77, 0x0, &(0x7f000055fff0)={0x2, 0x4e23, @loopback=0x7f000001}, 0x10) setsockopt$inet6_tcp_int(r1, 0x6, 0x20000000000002, &(0x7f00007b1000)=0x81, 0x4) bind$inet6(r2, &(0x7f00000000c0)={0xa, 0x4e24, 0x7fff, @ipv4={[], [0xff, 0xff], @broadcast=0xffffffff}, 0xa402}, 0x1c) dup2(r1, r0) bind$inet6(r1, &(0x7f0000000080)={0xa, 0x4e20, 0x0, @loopback={0x0, 0x1}}, 0x1c) sendto$inet6(r0, &(0x7f0000000000)="85ace0073bc515f3adbed20d060a3eee25e220eeaed668d3e5e3e82c89e7d37a3562fa", 0x23, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback={0x0, 0x1}}, 0x1c) r3 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0xfffffffffffffffe) ftruncate(r3, 0x7fff) setsockopt$inet_tcp_TCP_MD5SIG(0xffffffffffffffff, 0x6, 0xe, &(0x7f0000001140)={@in6={{0xa, 0x4e20, 0x0, @mcast1={0xff, 0x1, [], 0x1}}}, 0x4, 0x20, 0x0, "755ccbd589963fc68b748315ddb526e75affef53a3f70188af1358d12e76c6b9b89cf84aa9364ed24706c85f515093c2ce55dde6d80a1e59c3c13a7c2d25cea6af78a35d715cd3f9cd358dade09b8351"}, 0xd8) sendfile(r1, r3, &(0x7f0000d83ff8), 0x8000fffffffe) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_TEMPO(r3, 0x402c5342, &(0x7f0000000180)={0x7, 0x5, 0x7fffffff, {0x77359400}, 0xe5a2, 0x2}) 2033/05/18 03:33:29 executing program 0: r0 = socket$inet6(0xa, 0x400000000001, 0x0) r1 = dup(r0) perf_event_open(&(0x7f0000000040)={0x1, 0x443, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40000000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TUNSETOFFLOAD(0xffffffffffffffff, 0x400454d0, 0x0) r2 = socket(0xa, 0x2, 0x0) connect$inet6(r2, &(0x7f0000000040)={0xa, 0x0, 0x0, @mcast1={0xff, 0x1, [], 0x1}, 0x100000002}, 0x1c) setsockopt$sock_int(r2, 0x1, 0xb, &(0x7f0000000080)=0x6c5, 0x4) sendto$inet(r2, &(0x7f0000509f92), 0xff77, 0x0, &(0x7f000055fff0)={0x2, 0x4e23, @loopback=0x7f000001}, 0x10) setsockopt$inet6_tcp_int(r1, 0x6, 0x20000000000002, &(0x7f00007b1000)=0x81, 0x4) bind$inet6(r2, &(0x7f00000000c0)={0xa, 0x4e24, 0x7fff, @ipv4={[], [0xff, 0xff], @broadcast=0xffffffff}, 0xa402}, 0x1c) dup2(r1, r0) bind$inet6(r1, &(0x7f0000000080)={0xa, 0x4e20, 0x0, @loopback={0x0, 0x1}}, 0x1c) sendto$inet6(r0, &(0x7f0000000000)="85ace0073bc515f3adbed20d060a3eee25e220eeaed668d3e5e3e82c89e7d37a3562fa", 0x23, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback={0x0, 0x1}}, 0x1c) r3 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0xfffffffffffffffe) ftruncate(r3, 0x7fff) setsockopt$inet_tcp_TCP_MD5SIG(0xffffffffffffffff, 0x6, 0xe, &(0x7f0000001140)={@in6={{0xa, 0x4e20, 0x0, @mcast1={0xff, 0x1, [], 0x1}}}, 0x4, 0x20, 0x0, "755ccbd589963fc68b748315ddb526e75affef53a3f70188af1358d12e76c6b9b89cf84aa9364ed24706c85f515093c2ce55dde6d80a1e59c3c13a7c2d25cea6af78a35d715cd3f9cd358dade09b8351"}, 0xd8) sendfile(r1, r3, &(0x7f0000d83ff8), 0x8000fffffffe) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_TEMPO(r3, 0x402c5342, &(0x7f0000000180)={0x7, 0x5, 0x7fffffff, {0x77359400}, 0xe5a2, 0x2}) [ 104.621312] FAT-fs (loop7): bogus number of reserved sectors [ 104.650253] FAT-fs (loop7): Can't find a valid FAT filesystem [ 104.702955] FAT-fs (loop3): bogus number of reserved sectors [ 104.719715] FAT-fs (loop2): bogus number of reserved sectors 2033/05/18 03:33:29 executing program 7: r0 = socket$inet6(0xa, 0x400000000001, 0x0) r1 = dup(r0) perf_event_open(&(0x7f0000000040)={0x1, 0x443, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40000000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TUNSETOFFLOAD(0xffffffffffffffff, 0x400454d0, 0x0) r2 = socket(0xa, 0x2, 0x0) connect$inet6(r2, &(0x7f0000000040)={0xa, 0x0, 0x0, @mcast1={0xff, 0x1, [], 0x1}, 0x100000002}, 0x1c) setsockopt$sock_int(r2, 0x1, 0xb, &(0x7f0000000080)=0x6c5, 0x4) sendto$inet(r2, &(0x7f0000509f92), 0xff77, 0x0, &(0x7f000055fff0)={0x2, 0x4e23, @loopback=0x7f000001}, 0x10) setsockopt$inet6_tcp_int(r1, 0x6, 0x20000000000002, &(0x7f00007b1000)=0x81, 0x4) bind$inet6(r2, &(0x7f00000000c0)={0xa, 0x4e24, 0x7fff, @ipv4={[], [0xff, 0xff], @broadcast=0xffffffff}, 0xa402}, 0x1c) dup2(r1, r0) bind$inet6(r1, &(0x7f0000000080)={0xa, 0x4e20, 0x0, @loopback={0x0, 0x1}}, 0x1c) sendto$inet6(r0, &(0x7f0000000000)="85ace0073bc515f3adbed20d060a3eee25e220eeaed668d3e5e3e82c89e7d37a3562fa", 0x23, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback={0x0, 0x1}}, 0x1c) r3 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0xfffffffffffffffe) ftruncate(r3, 0x7fff) setsockopt$inet_tcp_TCP_MD5SIG(0xffffffffffffffff, 0x6, 0xe, &(0x7f0000001140)={@in6={{0xa, 0x4e20, 0x0, @mcast1={0xff, 0x1, [], 0x1}}}, 0x4, 0x20, 0x0, "755ccbd589963fc68b748315ddb526e75affef53a3f70188af1358d12e76c6b9b89cf84aa9364ed24706c85f515093c2ce55dde6d80a1e59c3c13a7c2d25cea6af78a35d715cd3f9cd358dade09b8351"}, 0xd8) sendfile(r1, r3, &(0x7f0000d83ff8), 0x8000fffffffe) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_TEMPO(r3, 0x402c5342, &(0x7f0000000180)={0x7, 0x5, 0x7fffffff, {0x77359400}, 0xe5a2, 0x2}) [ 104.719736] FAT-fs (loop2): Can't find a valid FAT filesystem [ 104.805047] FAT-fs (loop3): Can't find a valid FAT filesystem [ 104.815911] sd 0:0:1:0: [sg0] tag#177 FAILED Result: hostbyte=DID_ABORT driverbyte=DRIVER_OK [ 104.815924] sd 0:0:1:0: [sg0] tag#177 CDB: Test Unit Ready [ 104.815940] sd 0:0:1:0: [sg0] tag#177 CDB[00]: 00 00 00 00 00 08 00 00 00 00 00 00 00 69 fd 00 [ 104.816008] sd 0:0:1:0: [sg0] tag#177 CDB[10]: 00 00 00 00 00 ff ff ff ff ff ff ff ff 58 b0 02 [ 104.816018] sd 0:0:1:0: [sg0] tag#177 CDB[20]: 20 00 00 00 00 00 00 00 00 00 00 00 00 01 00 00 [ 104.816029] sd 0:0:1:0: [sg0] tag#177 CDB[30]: 00 00 00 00 00 00 00 00 00 00 00 00 00 fe ff ff [ 104.816039] sd 0:0:1:0: [sg0] tag#177 CDB[40]: ff ff ff ff ff 59 b0 02 20 00 00 00 00 00 00 00 [ 104.816163] sd 0:0:1:0: [sg0] tag#177 CDB[50]: 00 00 00 00 00 01 00 00 00 00 00 00 00 00 00 00 2033/05/18 03:33:30 executing program 2: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fsync(0xffffffffffffffff) syz_mount_image$vfat(&(0x7f00000000c0)='vfat\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, &(0x7f0000000400), 0x0, &(0x7f0000000480)) sendmsg$unix(0xffffffffffffffff, &(0x7f0000833000)={&(0x7f0000000000)=@abs, 0x6e, &(0x7f00007e0000)=[{&(0x7f0000007000)="fd20932fcc7cfaafcf960802e02348f8fba600069da7b753c31273", 0x1b}], 0x1, &(0x7f00000001c0)}, 0x0) r0 = syz_open_dev$sg(&(0x7f0000970000)='/dev/sg#\x00', 0x0, 0x0) ioctl$EVIOCSABS0(0xffffffffffffffff, 0x401845c0, &(0x7f0000007000)={0x0, 0x0, 0x65}) ioctl(r0, 0x2285, &(0x7f0000007000)='S') [ 104.816283] sd 0:0:1:0: [sg0] tag#177 CDB[60]: 00 00 00 00 00 2033/05/18 03:33:30 executing program 6: r0 = perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x71, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fcntl$setown(0xffffffffffffffff, 0x8, 0xffffffffffffffff) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f00000000c0)='vfat\x00', &(0x7f0000000500)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f0000000600)="c8c7263634c80000000000000000", 0xe}], 0x0, &(0x7f0000000640)=ANY=[]) r1 = syz_open_procfs(0x0, &(0x7f0000176000)="00640001000445") socket$netlink(0x10, 0x3, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) sendmsg$IPVS_CMD_GET_INFO(0xffffffffffffffff, &(0x7f00000004c0)={&(0x7f0000000300)={0x10}, 0xc, &(0x7f0000000440)={&(0x7f0000000380)=ANY=[@ANYRES16, @ANYBLOB="10002abd7000ffdbdf250f00000008000496686fbd000c000100080006007772720008000600be0003007f"], 0x2}, 0x1}, 0x0) getsockopt$IPT_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x40, &(0x7f0000000280)={'raw\x00'}, &(0x7f0000000540)=0x54) ioctl$KDGKBTYPE(r1, 0x4b33, &(0x7f0000000680)) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000200), &(0x7f0000000240)=0xc) r2 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) write$binfmt_script(r0, &(0x7f0000002040)={'#! ', './file0', [{0x20, '$securityselinux'}, {0x20, 'IPVS\x00'}, {0x20, ']nodev,-@,'}, {0x20, 'em0'}], 0xa, "71cf5adad48f96df60346cb41ef0f0bb56badb733c09c09dbeb040e85f04ea9ebe00ae0073f18f2120dddbbbe915a2846d59cf45667cc3d66e1b42391285ffb7763a3b47edfb71c98b12653d998517672023dc03f417f0bb4ec306d8e15ddeaba7e618e046f86e25eb5ad2e8eabc0b0ca7fc6004edd79263d5fa4123a98e18f7af00490a39b0ab8b9a44ce260b71340af021ed2a571e03249ff967535d4eb242adc163bb1d230eddbb48b1e0db9dfea3df50cf1f053be892d92908fc4c4924fa2221f193dd36ebb0796758b7049631f066a3e2ef41a770527c6981eda53ebc4cef10f39e9154ebc9ed60ed31eb9615428d9ad4f9b25a9bbc65ef6c6e4d9e592645c4a55e6415d6df6718e415a4771e48485ee9a0bfea7b9242714fe88a972421f65940aff344a97bac8cee666034607c44c4d73976ac3df0c8414f45c511a97e0e95f35c43d5eb4d0e42fec911441422e56b69d48effb9fc7b55f7dea7c5a06dc9fc56405ef4aea07bb325da062e22fdaa334f1fa189e46efdcf995ac09a117f663f27ba81d1ffd0c806fdd200fb3a54615c0d4ee8c7a957e35024e1700cbbdd8cd9ce8e4a043d0c3d3cbd87220bd9698c2484b5cdcc8fd5437f5f00b14b3f0eecd192c86776f6d0b6a76c51a1a18db5215ea1e0419c5ace14af6ee9244190d6d5f4ee7602f5ef979722cb0b8e68da64f497194e34feec687cee61d16d9c85a447fd86bc5fc74b92093670f22060d45512934d92557103f3ca00a38d5cb6ba3e8c1b3103fe1fb1912fbabf57d3cdef7abb88d94b40c9f98182c7a1bda53595e13f7e4df507536059bdbb97b4ba4bb4024f0e7cd3887695c91ebe91ae0145d085f23f463e6325de1a30e70916ce9781f627a56f92491f926d50bc9c85dff0cce1fe5933c31130ab054bd98a826f621f7fd835848e3745a86eeb0a40105700b3b18e9ca3fb495a90346a498ebd668774dc0169dcc2a63ac08cd044149ee400b6814fa505cbae3bf17a3016684abdbd58e60a4cd57fa0fad9cbcaf8cb15dfba993cb56a68db91ed27f512e2d67a5a594b80f7c21e4595061a8e91ff75295941ab88265752377242dca8b02ecf3d6e6b4064f5171d8cf8475925bb1233bd3b445bf77704272ac941227c5b22b8a8238ea720e26e0b72ab6f722efab0a865968f19de8aaf276aa02b92e7e26ff98d54ba78227b1478004fa30fc6482a29e5521471f9c7f46de0e95f56fce202d33525208d19e3dbdf0528dfb7218c7fcf94adf3b9774f685463d6f39a3ef93f23fcb93f6d11a6d692aa6f4f2174469b1e509419e02d14cc91c7632393b7b0e9d452556b22981cf77132fb02560b896228368307f53dd957aa3bb654db3b3ff51f1bcd07fe61b49fc4a65593a9ef49c97128e5ce3cbf2632075751a0caa1d2c8cacc111a0efb98c3b850a23a450b4636c446861636d85ac5516949d31257ca4e86983433aa37adaa0d200301181f270f2e8188ae792c3687e08402ee1710cc2863d55fc8fa7c5519e469c7240f362cca0cdce9b4647c15d0e50e689a060950c6bb37ce71f40e75a4fe5b698c930ed64441662ad95fc02002d1d7c79a3519fcb91c49462769848d1487c252ec5320fd868f30ebe05f1a3514dede25da70e7dc4bd7a2619d6d750029b4942dd0741c069bfdc8324e20ad90f4cb9afdd0a8de2fdd4fd99b491c303b91a01a3ef8ecb1754198d59825f015d86335d557da1d86f39378f7cd04fd1de348e9f35a49c12cf8dc7bfe0c99e9fdbbe762d6d70198f5c8d44be08a044e14f4aac03e9dfa0eb6ac13d821ccc4cb9c983cbf02aa336faf55d4f42bcefbf337413788f7a4095fe29cdfed6a98ebb4fadcb276bb5bf57b4836905aeb3ee19584780b06817fdcb9e208983e438ff805afe7bdf47657ee1921190244673634355c3e34157b1482289808c6ef157879fa1a66c8dc709e4534433ca581b0d16a3e54d83d8ec91f21bff02b2f76588ea11ee188b53f51047569ae43b52eb2bf9201418840878a4d97086a9785b06e327b7bf824279454c0bfb7578bff295183ab719cc209f41b3d0c96f10959c3a2ed0d43e424a872897995f5cfb44977bdf5263fd4f0b8685eb40ffca906c32826ea877b4d8637acc0e6f487bb6c1cd9353d79ab8fd44d92d226f975de90e724dffa6b3262e18672246131b1be9f80662d8def5de894096eba05003ef9117d0b7732c439cc8eeb723e4c7f459fd8bbfaba72974c699aa159cc4f05e4c511a7b840ba7aa0bbb67f625821497e8caad2644f5e9df49d73a00e97b09cfa5f57de49cb7d6c0c8f228f9d5f4e27daf3e78e5e244923b0a7c573e8e071b6655c536b260a5e4b9774dbb8c290b837318c188f04d620881e74fa6d1f077513ac957950921767230e16116e4ef02454a0593153bc7edf2689f19d2282fde053ce8d9bcd65532be26c919f93e0bcb5722693aa25a309ca5791d0f9ac6bc575ccb6f355447a629e554074e9cf968d3825f6d8f4de6589c358fd7c763accd9905b108d576ae40c835e273b83a0e78fa2ced8a4bce0c0c028169b6df481a0b01d4ee326003755fe537d04364bcadec6942287328c8975d97b2fe11c1578dfcc870eac3e7b54b907545b950751fc7731cde7fbad995d884345098f956677beff522fff2aa082f330142a3a8cda32a2b9ca204b4f344b0917c670a44ec6aa864169ae0a76d3d5f9f70ffd1e8d593b2f44d5edfe9becae5764ebf3cf0f7fe239416d721a3a2457d394cf26380632efe476f58e34c598bdb7c84b9c804d4a27e962734ceca820206835f8d940efb97992214315960b331c7e36be693744ce2d5d00dd756352c3217d31aae9381a8638fd6f3ade7bfaa883f739f5a096c9b47059e32541908e5da54c98053f5121a30a8e8c9948b29c8d80bc67b7f5fbe94478bb259c39c0e1fd7f83adcd6cfac016660a1a45121e977077f54b259252f4eeb42893d590cb8ef5b5b05f60f77d6753c139c6c00fc9195a5589f680ffea6955e3cf9d2a42c58c94bd3d82af776c701bd89b203003ee9faa06b0801f7113cf9548eca7ba09195ccd3fc33cdbff3d323a39e9d3c1af4de332ce906b8f5b67b82eb3087f49bab21043a5ee12de8caf868fe23a5b8bebfec40c88a63131c3c3aba640869513f0ed8ca4e1893535582ba3dde887388a4d40d4377f45b159a9800563a25904d7a871ea765926dc8155de13fd91be15370f017ce1c8f79ebac95d3388a5407283e674f44a3b9a5e5d04b7a73702617d37c59bc1e11a242bbe8e31ee4426086fdf67d64e69f3d4e74a23869a7d25347097c2cc6a07a0884d045f3cf46d822b7fe6fc0673dbeada94a065063bc4844261b8cb69c06c5b3f73b85e73f3a11f9bc922d19d21833f610d55a83b6e093d72726c03e7826d547e66994be460f1bb88b86f142aeed7000503fe23a75e99740e81ca423ba6e642183e6bbd1c52ab190571e16eeec937ebd5e4c62463b8b5a6e4d56645674b6dcbe8331b6e2115fe4ee28c8a8a169e4700b9ba5b6c4f9dde49fa50b55e3f21d8adf94fa6d9a6f24d642af0e695c413a9307754af7736da4193e62ef1d5445e98cebe12d051655ef537d22b87514926d3b45cc7c4f2cf90226c1c3501b7ac0cb20104e6fadd5201ce2165d4ca246ebbe24a501c05ff7dea67d7474b847673096be7299351826855c7db2611e6fb148f8c85d233363d7ac32c6bf2665e62f6aef6d223cf34362ebbac1d6767a34859c766b9f344b3097f17fe30ac3412d56d2aa23fa71802509280e6c4620fab2de5e501f0024bd2930cfbc7fbd6cecb8dab9a66cd4c2a9550189613c207e41295d0315b96a27936e9246f13e4e0c680ab87481ec0e256e4b18db89b84440f182cd1fb09aa4d98aa87de3ced996e1390792ac1a5f780d92c6e3be5e6cbf1b45acebb0c609be9d44fe30ce02b3737eba03478f7e13a9c06b0172f658d491230e8a3e6870486e09d9f7fd8f54030925d17861655af7ae58e8a889e76d1a9012f26ee4450ee3b36393f26802fea565af0210bf8a63b27fcaac68605e18dc1db1ff4f661ea6392c4abe82f9565e686f05e21e877f65784248cfc947002696cdd754cd35740ea913080d4ebde66be0d9b9e2d3e093be28ae5b2d2e4f8c43e079f8b9ce823d71e7727f23c88ea0fa61a35f9d27898ec858a3e06ab0f88797ef37bbdcad10087854062ed909c8cdc1a5523bfb07b563d8c9a0a5ad7a9dcc68fafae02971ecc0b8880cd38fe201f97f50ef6b112ffae3e508710e7e38fe8cff87652de27bb6802c2aafa7ffcd4cdd559f54cbbf69574a24e79da55926b35b8fa31a8185a8efeafe2b71e632b13cfe5"}, 0xc31) fallocate(r2, 0x1, 0x7fff, 0x10000101) [ 105.463062] FAT-fs (loop2): bogus number of reserved sectors [ 105.501829] FAT-fs (loop2): Can't find a valid FAT filesystem [ 105.602979] sd 0:0:1:0: [sg0] tag#177 FAILED Result: hostbyte=DID_ABORT driverbyte=DRIVER_OK [ 105.611898] sd 0:0:1:0: [sg0] tag#177 CDB: Test Unit Ready [ 105.618236] sd 0:0:1:0: [sg0] tag#177 CDB[00]: 00 00 00 00 00 08 00 00 00 00 00 00 00 69 fd 00 [ 105.627349] sd 0:0:1:0: [sg0] tag#177 CDB[10]: 00 00 00 00 00 ff ff ff ff ff ff ff ff 58 b0 02 [ 105.636537] sd 0:0:1:0: [sg0] tag#177 CDB[20]: 20 00 00 00 00 00 00 00 00 00 00 00 00 01 00 00 2033/05/18 03:33:30 executing program 1: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fsync(0xffffffffffffffff) syz_mount_image$vfat(&(0x7f00000000c0)='vfat\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, &(0x7f0000000400), 0x0, &(0x7f0000000480)) sendmsg$unix(0xffffffffffffffff, &(0x7f0000833000)={&(0x7f0000000000)=@abs, 0x6e, &(0x7f00007e0000)=[{&(0x7f0000007000)="fd20932fcc7cfaafcf960802e02348f8fba600069da7b753c31273", 0x1b}], 0x1, &(0x7f00000001c0)}, 0x0) r0 = syz_open_dev$sg(&(0x7f0000970000)='/dev/sg#\x00', 0x0, 0x0) ioctl$EVIOCSABS0(0xffffffffffffffff, 0x401845c0, &(0x7f0000007000)={0x0, 0x0, 0x65}) ioctl(r0, 0x2285, &(0x7f0000007000)='S') [ 105.646106] sd 0:0:1:0: [sg0] tag#177 CDB[30]: 00 00 00 00 00 00 00 00 00 00 00 00 00 fe ff ff [ 105.655126] sd 0:0:1:0: [sg0] tag#177 CDB[40]: ff ff ff ff ff 59 b0 02 20 00 00 00 00 00 00 00 [ 105.664106] sd 0:0:1:0: [sg0] tag#177 CDB[50]: 00 00 00 00 00 01 00 00 00 00 00 00 00 00 00 00 [ 105.673105] sd 0:0:1:0: [sg0] tag#177 CDB[60]: 00 00 00 00 00 [ 105.712389] FAT-fs (loop6): bogus number of reserved sectors [ 105.747412] FAT-fs (loop6): Can't find a valid FAT filesystem 2033/05/18 03:33:31 executing program 5: socket$inet_tcp(0x2, 0x1, 0x0) open(&(0x7f0000000180)='./file0\x00', 0x842, 0x0) syz_mount_image$vfat(&(0x7f00000000c0)='vfat\x00', &(0x7f0000000740)='./file0\x00', 0x0, 0x0, &(0x7f0000000640), 0x1800, &(0x7f0000000000)=ANY=[]) r0 = open$dir(&(0x7f0000000000)='./file0\x00', 0x1000001, 0x0) syz_mount_image$hfs(&(0x7f0000000300)='hfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x1, &(0x7f00000003c0)=[{&(0x7f0000000240), 0x0, 0x400}], 0x0, &(0x7f0000000640)=ANY=[]) fallocate(r0, 0x11, 0x0, 0x100000001) 2033/05/18 03:33:31 executing program 3: r0 = perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x71, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fcntl$setown(0xffffffffffffffff, 0x8, 0xffffffffffffffff) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f00000000c0)='vfat\x00', &(0x7f0000000500)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f0000000600)="c8c7263634c80000000000000000", 0xe}], 0x0, &(0x7f0000000640)=ANY=[]) r1 = syz_open_procfs(0x0, &(0x7f0000176000)="00640001000445") socket$netlink(0x10, 0x3, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) sendmsg$IPVS_CMD_GET_INFO(0xffffffffffffffff, &(0x7f00000004c0)={&(0x7f0000000300)={0x10}, 0xc, &(0x7f0000000440)={&(0x7f0000000380)=ANY=[@ANYRES16, @ANYBLOB="10002abd7000ffdbdf250f00000008000496686fbd000c000100080006007772720008000600be0003007f"], 0x2}, 0x1}, 0x0) getsockopt$IPT_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x40, &(0x7f0000000280)={'raw\x00'}, &(0x7f0000000540)=0x54) ioctl$KDGKBTYPE(r1, 0x4b33, &(0x7f0000000680)) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000200), &(0x7f0000000240)=0xc) r2 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) write$binfmt_script(r0, &(0x7f0000002040)={'#! ', './file0', [{0x20, '$securityselinux'}, {0x20, 'IPVS\x00'}, {0x20, ']nodev,-@,'}, {0x20, 'em0'}], 0xa, "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"}, 0xc31) fallocate(r2, 0x1, 0x7fff, 0x10000101) [ 105.766518] FAT-fs (loop1): bogus number of reserved sectors [ 105.766536] FAT-fs (loop1): Can't find a valid FAT filesystem [ 105.867935] sd 0:0:1:0: [sg0] tag#177 FAILED Result: hostbyte=DID_ABORT driverbyte=DRIVER_OK [ 105.877090] sd 0:0:1:0: [sg0] tag#177 CDB: opcode=0x20 [ 105.882674] sd 0:0:1:0: [sg0] tag#177 CDB[00]: 20 00 00 00 00 00 00 00 00 00 00 00 00 01 00 00 [ 105.891764] sd 0:0:1:0: [sg0] tag#177 CDB[10]: 00 00 00 00 00 01 00 00 00 00 00 00 00 fe ff ff [ 105.901311] sd 0:0:1:0: [sg0] tag#177 CDB[20]: ff ff ff ff ff 16 02 00 20 00 00 00 00 00 00 00 [ 105.910272] sd 0:0:1:0: [sg0] tag#177 CDB[30]: 00 00 00 00 00 02 00 00 00 00 00 00 00 02 00 00 [ 105.919149] sd 0:0:1:0: [sg0] tag#177 CDB[40]: 00 00 00 00 00 fe ff ff ff ff ff ff ff 18 02 00 [ 105.928040] sd 0:0:1:0: [sg0] tag#177 CDB[50]: 20 00 00 00 00 00 00 00 00 00 00 00 00 02 00 00 [ 105.936939] sd 0:0:1:0: [sg0] tag#177 CDB[60]: 00 00 00 00 00 2033/05/18 03:33:31 executing program 5: r0 = socket$inet(0x2, 0x3, 0x6) recvmsg(r0, &(0x7f0000000180)={&(0x7f0000000000)=@pppol2tpin6, 0x80, &(0x7f0000000140), 0x0, &(0x7f0000000480)=""/170, 0xaa}, 0x1) [ 106.001907] FAT-fs (loop3): bogus number of reserved sectors [ 106.035638] FAT-fs (loop3): Can't find a valid FAT filesystem 2033/05/18 03:33:31 executing program 5: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet_sctp_SCTP_RTOINFO(0xffffffffffffffff, 0x84, 0x0, &(0x7f0000001000)={0x10000, 0x4, 0x100, 0x400}, 0x10) add_key(&(0x7f0000000000)='ceph\x00', &(0x7f0000000240)={0x73, 0x79, 0x7a, 0x1}, &(0x7f0000000280)="69eab34258385b33eecf030e03edd7e942a89fc20be8cc979bcbc9ce3fddf80d72c5d07233e45c3abea477702494b6dccc6839647fd45c1239a3f19b", 0x3c, 0xfffffffffffffff8) add_key$keyring(&(0x7f00000002c0)='keyring\x00', &(0x7f0000000300)={0x73, 0x79, 0x7a, 0x2}, 0x0, 0x0, 0xffffffffffffffff) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) r0 = syz_open_dev$mice(&(0x7f0000000440)='/dev/input/mice\x00', 0x0, 0x800) ioctl$SNDRV_SEQ_IOCTL_SYSTEM_INFO(r0, 0xc0305302, &(0x7f0000000480)={0x3eb7, 0x8, 0x5, 0x7, 0xc0e, 0x965b}) r1 = syz_open_dev$loop(&(0x7f0000308000)='/dev/loop#\x00', 0x0, 0x0) ioctl$LOOP_SET_STATUS(r1, 0xc0481273, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x6, 0x0, "3900ea631d00000000020000010000009f00000023f7b7d65f90b0e6330ee739b319d8f6aa6bd58d1443474482e85040fb4947ebb55bd19f335b5bffff0001f3", "cfa430745a540dc1c149b7b81579f6a41c51f7d51933223e82ab867dac761faf"}) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(0xffffffffffffffff, 0x6, 0x1d, &(0x7f0000000340)={0x8, 0x7fffffff, 0x200, 0x1, 0x3}, 0x14) r2 = socket(0x11, 0x802, 0x0) ioctl$LOOP_SET_STATUS(0xffffffffffffffff, 0x4c02, &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, 0x3f, 0x2, 0x80000000000000f, 0x1, "a94ec920a32c6a1b5e50a5e5aa58f72668137be6d83205bc6f42f1e6df89819b534a16c7ba1e0a78b2d4979331e260c265271f807de145ccbf21b1ec4ea2b3ff", "3835526cf0e214f9543946fb80c8e3b548112a011de7bdb4eb8c7b58a9871523", [0x8, 0x7ff]}) write(r2, &(0x7f0000000180)="5d2f599234ced1ccf5dd142159e1cc652b9079d2a9dd919b1e7354a80e14de090670ce09429d370648dbec8d2034d55c215f5665bc59a2e098036e5c0340f1efeb32a75f76ffd7f002deeb8abc013c08a202172774ce22406ab0cd0f0d1922bc3e523f399b5c016273ddd07fc6d0943b2ffc4098fd356ff7288df5782e3f412897", 0x81) setsockopt(r2, 0x107, 0xd, &(0x7f00000000c0)="cb5bc15926efaefaaf1c27e430bbf8454101a24cbd492a0300000000000000ab0384cd31c1c82d4f9efa264ee72d5d74718bbbcf39b0b6636f99c64c07294a86581850afe1309db4ef49ff684437897c919b9694f2765baff2d4359a58c9bd9b8c7f0bb7aa02f23c08d02084ca3cd5efb307ba7dc2ccc8e7b5b6fc1655da8aff9b1adac4e4687b877ca6abec4b9f915711899b110b19e910920f36d4d9fb19a31d3c79b26175", 0xa6) 2033/05/18 03:33:31 executing program 1: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fsync(0xffffffffffffffff) syz_mount_image$vfat(&(0x7f00000000c0)='vfat\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, &(0x7f0000000400), 0x0, &(0x7f0000000480)) sendmsg$unix(0xffffffffffffffff, &(0x7f0000833000)={&(0x7f0000000000)=@abs, 0x6e, &(0x7f00007e0000)=[{&(0x7f0000007000)="fd20932fcc7cfaafcf960802e02348f8fba600069da7b753c31273", 0x1b}], 0x1, &(0x7f00000001c0)}, 0x0) r0 = syz_open_dev$sg(&(0x7f0000970000)='/dev/sg#\x00', 0x0, 0x0) ioctl$EVIOCSABS0(0xffffffffffffffff, 0x401845c0, &(0x7f0000007000)={0x0, 0x0, 0x65}) ioctl(r0, 0x2285, &(0x7f0000007000)='S') 2033/05/18 03:33:31 executing program 6: r0 = perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x71, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fcntl$setown(0xffffffffffffffff, 0x8, 0xffffffffffffffff) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f00000000c0)='vfat\x00', &(0x7f0000000500)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f0000000600)="c8c7263634c80000000000000000", 0xe}], 0x0, &(0x7f0000000640)=ANY=[]) r1 = syz_open_procfs(0x0, &(0x7f0000176000)="00640001000445") socket$netlink(0x10, 0x3, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) sendmsg$IPVS_CMD_GET_INFO(0xffffffffffffffff, &(0x7f00000004c0)={&(0x7f0000000300)={0x10}, 0xc, &(0x7f0000000440)={&(0x7f0000000380)=ANY=[@ANYRES16, @ANYBLOB="10002abd7000ffdbdf250f00000008000496686fbd000c000100080006007772720008000600be0003007f"], 0x2}, 0x1}, 0x0) getsockopt$IPT_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x40, &(0x7f0000000280)={'raw\x00'}, &(0x7f0000000540)=0x54) ioctl$KDGKBTYPE(r1, 0x4b33, &(0x7f0000000680)) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000200), &(0x7f0000000240)=0xc) r2 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) write$binfmt_script(r0, &(0x7f0000002040)={'#! ', './file0', [{0x20, '$securityselinux'}, {0x20, 'IPVS\x00'}, {0x20, ']nodev,-@,'}, {0x20, 'em0'}], 0xa, "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"}, 0xc31) fallocate(r2, 0x1, 0x7fff, 0x10000101) 2033/05/18 03:33:31 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = syz_open_dev$tun(&(0x7f0000000200)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000000)={'syzkaller0\x00', 0x9322}) ioctl$sock_inet_SIOCSIFADDR(r0, 0x8916, &(0x7f0000000040)={'syzkaller0\x00', {0x2, 0x0, @rand_addr}}) [ 106.433694] FAT-fs (loop1): bogus number of reserved sectors [ 106.466168] FAT-fs (loop1): Can't find a valid FAT filesystem 2033/05/18 03:33:31 executing program 3: r0 = perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x71, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fcntl$setown(0xffffffffffffffff, 0x8, 0xffffffffffffffff) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f00000000c0)='vfat\x00', &(0x7f0000000500)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f0000000600)="c8c7263634c80000000000000000", 0xe}], 0x0, &(0x7f0000000640)=ANY=[]) r1 = syz_open_procfs(0x0, &(0x7f0000176000)="00640001000445") socket$netlink(0x10, 0x3, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) sendmsg$IPVS_CMD_GET_INFO(0xffffffffffffffff, &(0x7f00000004c0)={&(0x7f0000000300)={0x10}, 0xc, &(0x7f0000000440)={&(0x7f0000000380)=ANY=[@ANYRES16, @ANYBLOB="10002abd7000ffdbdf250f00000008000496686fbd000c000100080006007772720008000600be0003007f"], 0x2}, 0x1}, 0x0) getsockopt$IPT_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x40, &(0x7f0000000280)={'raw\x00'}, &(0x7f0000000540)=0x54) ioctl$KDGKBTYPE(r1, 0x4b33, &(0x7f0000000680)) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000200), &(0x7f0000000240)=0xc) r2 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) write$binfmt_script(r0, &(0x7f0000002040)={'#! ', './file0', [{0x20, '$securityselinux'}, {0x20, 'IPVS\x00'}, {0x20, ']nodev,-@,'}, {0x20, 'em0'}], 0xa, "71cf5adad48f96df60346cb41ef0f0bb56badb733c09c09dbeb040e85f04ea9ebe00ae0073f18f2120dddbbbe915a2846d59cf45667cc3d66e1b42391285ffb7763a3b47edfb71c98b12653d998517672023dc03f417f0bb4ec306d8e15ddeaba7e618e046f86e25eb5ad2e8eabc0b0ca7fc6004edd79263d5fa4123a98e18f7af00490a39b0ab8b9a44ce260b71340af021ed2a571e03249ff967535d4eb242adc163bb1d230eddbb48b1e0db9dfea3df50cf1f053be892d92908fc4c4924fa2221f193dd36ebb0796758b7049631f066a3e2ef41a770527c6981eda53ebc4cef10f39e9154ebc9ed60ed31eb9615428d9ad4f9b25a9bbc65ef6c6e4d9e592645c4a55e6415d6df6718e415a4771e48485ee9a0bfea7b9242714fe88a972421f65940aff344a97bac8cee666034607c44c4d73976ac3df0c8414f45c511a97e0e95f35c43d5eb4d0e42fec911441422e56b69d48effb9fc7b55f7dea7c5a06dc9fc56405ef4aea07bb325da062e22fdaa334f1fa189e46efdcf995ac09a117f663f27ba81d1ffd0c806fdd200fb3a54615c0d4ee8c7a957e35024e1700cbbdd8cd9ce8e4a043d0c3d3cbd87220bd9698c2484b5cdcc8fd5437f5f00b14b3f0eecd192c86776f6d0b6a76c51a1a18db5215ea1e0419c5ace14af6ee9244190d6d5f4ee7602f5ef979722cb0b8e68da64f497194e34feec687cee61d16d9c85a447fd86bc5fc74b92093670f22060d45512934d92557103f3ca00a38d5cb6ba3e8c1b3103fe1fb1912fbabf57d3cdef7abb88d94b40c9f98182c7a1bda53595e13f7e4df507536059bdbb97b4ba4bb4024f0e7cd3887695c91ebe91ae0145d085f23f463e6325de1a30e70916ce9781f627a56f92491f926d50bc9c85dff0cce1fe5933c31130ab054bd98a826f621f7fd835848e3745a86eeb0a40105700b3b18e9ca3fb495a90346a498ebd668774dc0169dcc2a63ac08cd044149ee400b6814fa505cbae3bf17a3016684abdbd58e60a4cd57fa0fad9cbcaf8cb15dfba993cb56a68db91ed27f512e2d67a5a594b80f7c21e4595061a8e91ff75295941ab88265752377242dca8b02ecf3d6e6b4064f5171d8cf8475925bb1233bd3b445bf77704272ac941227c5b22b8a8238ea720e26e0b72ab6f722efab0a865968f19de8aaf276aa02b92e7e26ff98d54ba78227b1478004fa30fc6482a29e5521471f9c7f46de0e95f56fce202d33525208d19e3dbdf0528dfb7218c7fcf94adf3b9774f685463d6f39a3ef93f23fcb93f6d11a6d692aa6f4f2174469b1e509419e02d14cc91c7632393b7b0e9d452556b22981cf77132fb02560b896228368307f53dd957aa3bb654db3b3ff51f1bcd07fe61b49fc4a65593a9ef49c97128e5ce3cbf2632075751a0caa1d2c8cacc111a0efb98c3b850a23a450b4636c446861636d85ac5516949d31257ca4e86983433aa37adaa0d200301181f270f2e8188ae792c3687e08402ee1710cc2863d55fc8fa7c5519e469c7240f362cca0cdce9b4647c15d0e50e689a060950c6bb37ce71f40e75a4fe5b698c930ed64441662ad95fc02002d1d7c79a3519fcb91c49462769848d1487c252ec5320fd868f30ebe05f1a3514dede25da70e7dc4bd7a2619d6d750029b4942dd0741c069bfdc8324e20ad90f4cb9afdd0a8de2fdd4fd99b491c303b91a01a3ef8ecb1754198d59825f015d86335d557da1d86f39378f7cd04fd1de348e9f35a49c12cf8dc7bfe0c99e9fdbbe762d6d70198f5c8d44be08a044e14f4aac03e9dfa0eb6ac13d821ccc4cb9c983cbf02aa336faf55d4f42bcefbf337413788f7a4095fe29cdfed6a98ebb4fadcb276bb5bf57b4836905aeb3ee19584780b06817fdcb9e208983e438ff805afe7bdf47657ee1921190244673634355c3e34157b1482289808c6ef157879fa1a66c8dc709e4534433ca581b0d16a3e54d83d8ec91f21bff02b2f76588ea11ee188b53f51047569ae43b52eb2bf9201418840878a4d97086a9785b06e327b7bf824279454c0bfb7578bff295183ab719cc209f41b3d0c96f10959c3a2ed0d43e424a872897995f5cfb44977bdf5263fd4f0b8685eb40ffca906c32826ea877b4d8637acc0e6f487bb6c1cd9353d79ab8fd44d92d226f975de90e724dffa6b3262e18672246131b1be9f80662d8def5de894096eba05003ef9117d0b7732c439cc8eeb723e4c7f459fd8bbfaba72974c699aa159cc4f05e4c511a7b840ba7aa0bbb67f625821497e8caad2644f5e9df49d73a00e97b09cfa5f57de49cb7d6c0c8f228f9d5f4e27daf3e78e5e244923b0a7c573e8e071b6655c536b260a5e4b9774dbb8c290b837318c188f04d620881e74fa6d1f077513ac957950921767230e16116e4ef02454a0593153bc7edf2689f19d2282fde053ce8d9bcd65532be26c919f93e0bcb5722693aa25a309ca5791d0f9ac6bc575ccb6f355447a629e554074e9cf968d3825f6d8f4de6589c358fd7c763accd9905b108d576ae40c835e273b83a0e78fa2ced8a4bce0c0c028169b6df481a0b01d4ee326003755fe537d04364bcadec6942287328c8975d97b2fe11c1578dfcc870eac3e7b54b907545b950751fc7731cde7fbad995d884345098f956677beff522fff2aa082f330142a3a8cda32a2b9ca204b4f344b0917c670a44ec6aa864169ae0a76d3d5f9f70ffd1e8d593b2f44d5edfe9becae5764ebf3cf0f7fe239416d721a3a2457d394cf26380632efe476f58e34c598bdb7c84b9c804d4a27e962734ceca820206835f8d940efb97992214315960b331c7e36be693744ce2d5d00dd756352c3217d31aae9381a8638fd6f3ade7bfaa883f739f5a096c9b47059e32541908e5da54c98053f5121a30a8e8c9948b29c8d80bc67b7f5fbe94478bb259c39c0e1fd7f83adcd6cfac016660a1a45121e977077f54b259252f4eeb42893d590cb8ef5b5b05f60f77d6753c139c6c00fc9195a5589f680ffea6955e3cf9d2a42c58c94bd3d82af776c701bd89b203003ee9faa06b0801f7113cf9548eca7ba09195ccd3fc33cdbff3d323a39e9d3c1af4de332ce906b8f5b67b82eb3087f49bab21043a5ee12de8caf868fe23a5b8bebfec40c88a63131c3c3aba640869513f0ed8ca4e1893535582ba3dde887388a4d40d4377f45b159a9800563a25904d7a871ea765926dc8155de13fd91be15370f017ce1c8f79ebac95d3388a5407283e674f44a3b9a5e5d04b7a73702617d37c59bc1e11a242bbe8e31ee4426086fdf67d64e69f3d4e74a23869a7d25347097c2cc6a07a0884d045f3cf46d822b7fe6fc0673dbeada94a065063bc4844261b8cb69c06c5b3f73b85e73f3a11f9bc922d19d21833f610d55a83b6e093d72726c03e7826d547e66994be460f1bb88b86f142aeed7000503fe23a75e99740e81ca423ba6e642183e6bbd1c52ab190571e16eeec937ebd5e4c62463b8b5a6e4d56645674b6dcbe8331b6e2115fe4ee28c8a8a169e4700b9ba5b6c4f9dde49fa50b55e3f21d8adf94fa6d9a6f24d642af0e695c413a9307754af7736da4193e62ef1d5445e98cebe12d051655ef537d22b87514926d3b45cc7c4f2cf90226c1c3501b7ac0cb20104e6fadd5201ce2165d4ca246ebbe24a501c05ff7dea67d7474b847673096be7299351826855c7db2611e6fb148f8c85d233363d7ac32c6bf2665e62f6aef6d223cf34362ebbac1d6767a34859c766b9f344b3097f17fe30ac3412d56d2aa23fa71802509280e6c4620fab2de5e501f0024bd2930cfbc7fbd6cecb8dab9a66cd4c2a9550189613c207e41295d0315b96a27936e9246f13e4e0c680ab87481ec0e256e4b18db89b84440f182cd1fb09aa4d98aa87de3ced996e1390792ac1a5f780d92c6e3be5e6cbf1b45acebb0c609be9d44fe30ce02b3737eba03478f7e13a9c06b0172f658d491230e8a3e6870486e09d9f7fd8f54030925d17861655af7ae58e8a889e76d1a9012f26ee4450ee3b36393f26802fea565af0210bf8a63b27fcaac68605e18dc1db1ff4f661ea6392c4abe82f9565e686f05e21e877f65784248cfc947002696cdd754cd35740ea913080d4ebde66be0d9b9e2d3e093be28ae5b2d2e4f8c43e079f8b9ce823d71e7727f23c88ea0fa61a35f9d27898ec858a3e06ab0f88797ef37bbdcad10087854062ed909c8cdc1a5523bfb07b563d8c9a0a5ad7a9dcc68fafae02971ecc0b8880cd38fe201f97f50ef6b112ffae3e508710e7e38fe8cff87652de27bb6802c2aafa7ffcd4cdd559f54cbbf69574a24e79da55926b35b8fa31a8185a8efeafe2b71e632b13cfe5"}, 0xc31) fallocate(r2, 0x1, 0x7fff, 0x10000101) [ 106.500770] FAT-fs (loop6): bogus number of reserved sectors [ 106.514564] FAT-fs (loop6): Can't find a valid FAT filesystem [ 106.571716] sd 0:0:1:0: [sg0] tag#177 FAILED Result: hostbyte=DID_ABORT driverbyte=DRIVER_OK [ 106.580894] sd 0:0:1:0: [sg0] tag#177 CDB: opcode=0x20 [ 106.586521] sd 0:0:1:0: [sg0] tag#177 CDB[00]: 20 00 00 00 00 00 00 00 00 00 00 00 00 01 00 00 [ 106.595585] sd 0:0:1:0: [sg0] tag#177 CDB[10]: 00 00 00 00 00 01 00 00 00 00 00 00 00 fe ff ff [ 106.604533] sd 0:0:1:0: [sg0] tag#177 CDB[20]: ff ff ff ff ff 16 02 00 20 00 00 00 00 00 00 00 [ 106.608438] FAT-fs (loop3): bogus number of reserved sectors [ 106.608476] FAT-fs (loop3): Can't find a valid FAT filesystem [ 106.626035] sd 0:0:1:0: [sg0] tag#177 CDB[30]: 00 00 00 00 00 02 00 00 00 00 00 00 00 02 00 00 [ 106.635027] sd 0:0:1:0: [sg0] tag#177 CDB[40]: 00 00 00 00 00 fe ff ff ff ff ff ff ff 18 02 00 [ 106.643951] sd 0:0:1:0: [sg0] tag#177 CDB[50]: 20 00 00 00 00 00 00 00 00 00 00 00 00 02 00 00 [ 106.652816] sd 0:0:1:0: [sg0] tag#177 CDB[60]: 00 00 00 00 00 2033/05/18 03:33:32 executing program 5: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet_sctp_SCTP_RTOINFO(0xffffffffffffffff, 0x84, 0x0, &(0x7f0000001000)={0x10000, 0x4, 0x100, 0x400}, 0x10) add_key(&(0x7f0000000000)='ceph\x00', &(0x7f0000000240)={0x73, 0x79, 0x7a, 0x1}, &(0x7f0000000280)="69eab34258385b33eecf030e03edd7e942a89fc20be8cc979bcbc9ce3fddf80d72c5d07233e45c3abea477702494b6dccc6839647fd45c1239a3f19b", 0x3c, 0xfffffffffffffff8) add_key$keyring(&(0x7f00000002c0)='keyring\x00', &(0x7f0000000300)={0x73, 0x79, 0x7a, 0x2}, 0x0, 0x0, 0xffffffffffffffff) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) r0 = syz_open_dev$mice(&(0x7f0000000440)='/dev/input/mice\x00', 0x0, 0x800) ioctl$SNDRV_SEQ_IOCTL_SYSTEM_INFO(r0, 0xc0305302, &(0x7f0000000480)={0x3eb7, 0x8, 0x5, 0x7, 0xc0e, 0x965b}) r1 = syz_open_dev$loop(&(0x7f0000308000)='/dev/loop#\x00', 0x0, 0x0) ioctl$LOOP_SET_STATUS(r1, 0xc0481273, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x6, 0x0, "3900ea631d00000000020000010000009f00000023f7b7d65f90b0e6330ee739b319d8f6aa6bd58d1443474482e85040fb4947ebb55bd19f335b5bffff0001f3", "cfa430745a540dc1c149b7b81579f6a41c51f7d51933223e82ab867dac761faf"}) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(0xffffffffffffffff, 0x6, 0x1d, &(0x7f0000000340)={0x8, 0x7fffffff, 0x200, 0x1, 0x3}, 0x14) r2 = socket(0x11, 0x802, 0x0) ioctl$LOOP_SET_STATUS(0xffffffffffffffff, 0x4c02, &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, 0x3f, 0x2, 0x80000000000000f, 0x1, "a94ec920a32c6a1b5e50a5e5aa58f72668137be6d83205bc6f42f1e6df89819b534a16c7ba1e0a78b2d4979331e260c265271f807de145ccbf21b1ec4ea2b3ff", "3835526cf0e214f9543946fb80c8e3b548112a011de7bdb4eb8c7b58a9871523", [0x8, 0x7ff]}) write(r2, &(0x7f0000000180)="5d2f599234ced1ccf5dd142159e1cc652b9079d2a9dd919b1e7354a80e14de090670ce09429d370648dbec8d2034d55c215f5665bc59a2e098036e5c0340f1efeb32a75f76ffd7f002deeb8abc013c08a202172774ce22406ab0cd0f0d1922bc3e523f399b5c016273ddd07fc6d0943b2ffc4098fd356ff7288df5782e3f412897", 0x81) setsockopt(r2, 0x107, 0xd, &(0x7f00000000c0)="cb5bc15926efaefaaf1c27e430bbf8454101a24cbd492a0300000000000000ab0384cd31c1c82d4f9efa264ee72d5d74718bbbcf39b0b6636f99c64c07294a86581850afe1309db4ef49ff684437897c919b9694f2765baff2d4359a58c9bd9b8c7f0bb7aa02f23c08d02084ca3cd5efb307ba7dc2ccc8e7b5b6fc1655da8aff9b1adac4e4687b877ca6abec4b9f915711899b110b19e910920f36d4d9fb19a31d3c79b26175", 0xa6) 2033/05/18 03:33:32 executing program 2: mremap(&(0x7f000000d000/0x2000)=nil, 0xfffffffffffffe74, 0x1000, 0x3, &(0x7f0000007000/0x1000)=nil) 2033/05/18 03:33:32 executing program 7: r0 = socket$inet6(0xa, 0x400000000001, 0x0) r1 = dup(r0) perf_event_open(&(0x7f0000000040)={0x1, 0x443, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40000000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TUNSETOFFLOAD(0xffffffffffffffff, 0x400454d0, 0x0) r2 = socket(0xa, 0x2, 0x0) connect$inet6(r2, &(0x7f0000000040)={0xa, 0x0, 0x0, @mcast1={0xff, 0x1, [], 0x1}, 0x100000002}, 0x1c) setsockopt$sock_int(r2, 0x1, 0xb, &(0x7f0000000080)=0x6c5, 0x4) sendto$inet(r2, &(0x7f0000509f92), 0xff77, 0x0, &(0x7f000055fff0)={0x2, 0x4e23, @loopback=0x7f000001}, 0x10) setsockopt$inet6_tcp_int(r1, 0x6, 0x20000000000002, &(0x7f00007b1000)=0x81, 0x4) bind$inet6(r2, &(0x7f00000000c0)={0xa, 0x4e24, 0x7fff, @ipv4={[], [0xff, 0xff], @broadcast=0xffffffff}, 0xa402}, 0x1c) dup2(r1, r0) bind$inet6(r1, &(0x7f0000000080)={0xa, 0x4e20, 0x0, @loopback={0x0, 0x1}}, 0x1c) sendto$inet6(r0, &(0x7f0000000000)="85ace0073bc515f3adbed20d060a3eee25e220eeaed668d3e5e3e82c89e7d37a3562fa", 0x23, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback={0x0, 0x1}}, 0x1c) r3 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0xfffffffffffffffe) ftruncate(r3, 0x7fff) setsockopt$inet_tcp_TCP_MD5SIG(0xffffffffffffffff, 0x6, 0xe, &(0x7f0000001140)={@in6={{0xa, 0x4e20, 0x0, @mcast1={0xff, 0x1, [], 0x1}}}, 0x4, 0x20, 0x0, "755ccbd589963fc68b748315ddb526e75affef53a3f70188af1358d12e76c6b9b89cf84aa9364ed24706c85f515093c2ce55dde6d80a1e59c3c13a7c2d25cea6af78a35d715cd3f9cd358dade09b8351"}, 0xd8) sendfile(r1, r3, &(0x7f0000d83ff8), 0x8000fffffffe) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_TEMPO(r3, 0x402c5342, &(0x7f0000000180)={0x7, 0x5, 0x7fffffff, {0x77359400}, 0xe5a2, 0x2}) 2033/05/18 03:33:32 executing program 0: r0 = socket$inet6(0xa, 0x400000000001, 0x0) r1 = dup(r0) perf_event_open(&(0x7f0000000040)={0x1, 0x443, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40000000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TUNSETOFFLOAD(0xffffffffffffffff, 0x400454d0, 0x0) r2 = socket(0xa, 0x2, 0x0) connect$inet6(r2, &(0x7f0000000040)={0xa, 0x0, 0x0, @mcast1={0xff, 0x1, [], 0x1}, 0x100000002}, 0x1c) setsockopt$sock_int(r2, 0x1, 0xb, &(0x7f0000000080)=0x6c5, 0x4) sendto$inet(r2, &(0x7f0000509f92), 0xff77, 0x0, &(0x7f000055fff0)={0x2, 0x4e23, @loopback=0x7f000001}, 0x10) setsockopt$inet6_tcp_int(r1, 0x6, 0x20000000000002, &(0x7f00007b1000)=0x81, 0x4) bind$inet6(r2, &(0x7f00000000c0)={0xa, 0x4e24, 0x7fff, @ipv4={[], [0xff, 0xff], @broadcast=0xffffffff}, 0xa402}, 0x1c) dup2(r1, r0) bind$inet6(r1, &(0x7f0000000080)={0xa, 0x4e20, 0x0, @loopback={0x0, 0x1}}, 0x1c) sendto$inet6(r0, &(0x7f0000000000)="85ace0073bc515f3adbed20d060a3eee25e220eeaed668d3e5e3e82c89e7d37a3562fa", 0x23, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback={0x0, 0x1}}, 0x1c) r3 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0xfffffffffffffffe) ftruncate(r3, 0x7fff) setsockopt$inet_tcp_TCP_MD5SIG(0xffffffffffffffff, 0x6, 0xe, &(0x7f0000001140)={@in6={{0xa, 0x4e20, 0x0, @mcast1={0xff, 0x1, [], 0x1}}}, 0x4, 0x20, 0x0, "755ccbd589963fc68b748315ddb526e75affef53a3f70188af1358d12e76c6b9b89cf84aa9364ed24706c85f515093c2ce55dde6d80a1e59c3c13a7c2d25cea6af78a35d715cd3f9cd358dade09b8351"}, 0xd8) sendfile(r1, r3, &(0x7f0000d83ff8), 0x8000fffffffe) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_TEMPO(r3, 0x402c5342, &(0x7f0000000180)={0x7, 0x5, 0x7fffffff, {0x77359400}, 0xe5a2, 0x2}) 2033/05/18 03:33:32 executing program 1: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fsync(0xffffffffffffffff) syz_mount_image$vfat(&(0x7f00000000c0)='vfat\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, &(0x7f0000000400), 0x0, &(0x7f0000000480)) sendmsg$unix(0xffffffffffffffff, &(0x7f0000833000)={&(0x7f0000000000)=@abs, 0x6e, &(0x7f00007e0000)=[{&(0x7f0000007000)="fd20932fcc7cfaafcf960802e02348f8fba600069da7b753c31273", 0x1b}], 0x1, &(0x7f00000001c0)}, 0x0) r0 = syz_open_dev$sg(&(0x7f0000970000)='/dev/sg#\x00', 0x0, 0x0) ioctl$EVIOCSABS0(0xffffffffffffffff, 0x401845c0, &(0x7f0000007000)={0x0, 0x0, 0x65}) ioctl(r0, 0x2285, &(0x7f0000007000)='S') 2033/05/18 03:33:32 executing program 4: r0 = socket$inet6(0xa, 0x400000000001, 0x0) r1 = dup(r0) perf_event_open(&(0x7f0000000040)={0x1, 0x443, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40000000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TUNSETOFFLOAD(0xffffffffffffffff, 0x400454d0, 0x0) r2 = socket(0xa, 0x2, 0x0) connect$inet6(r2, &(0x7f0000000040)={0xa, 0x0, 0x0, @mcast1={0xff, 0x1, [], 0x1}, 0x100000002}, 0x1c) setsockopt$sock_int(r2, 0x1, 0xb, &(0x7f0000000080)=0x6c5, 0x4) sendto$inet(r2, &(0x7f0000509f92), 0xff77, 0x0, &(0x7f000055fff0)={0x2, 0x4e23, @loopback=0x7f000001}, 0x10) setsockopt$inet6_tcp_int(r1, 0x6, 0x20000000000002, &(0x7f00007b1000)=0x81, 0x4) bind$inet6(r2, &(0x7f00000000c0)={0xa, 0x4e24, 0x7fff, @ipv4={[], [0xff, 0xff], @broadcast=0xffffffff}, 0xa402}, 0x1c) dup2(r1, r0) bind$inet6(r1, &(0x7f0000000080)={0xa, 0x4e20, 0x0, @loopback={0x0, 0x1}}, 0x1c) sendto$inet6(r0, &(0x7f0000000000)="85ace0073bc515f3adbed20d060a3eee25e220eeaed668d3e5e3e82c89e7d37a3562fa", 0x23, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback={0x0, 0x1}}, 0x1c) r3 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0xfffffffffffffffe) ftruncate(r3, 0x7fff) setsockopt$inet_tcp_TCP_MD5SIG(0xffffffffffffffff, 0x6, 0xe, &(0x7f0000001140)={@in6={{0xa, 0x4e20, 0x0, @mcast1={0xff, 0x1, [], 0x1}}}, 0x4, 0x20, 0x0, "755ccbd589963fc68b748315ddb526e75affef53a3f70188af1358d12e76c6b9b89cf84aa9364ed24706c85f515093c2ce55dde6d80a1e59c3c13a7c2d25cea6af78a35d715cd3f9cd358dade09b8351"}, 0xd8) sendfile(r1, r3, &(0x7f0000d83ff8), 0x8000fffffffe) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_TEMPO(r3, 0x402c5342, &(0x7f0000000180)={0x7, 0x5, 0x7fffffff, {0x77359400}, 0xe5a2, 0x2}) 2033/05/18 03:33:32 executing program 6: r0 = perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x71, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fcntl$setown(0xffffffffffffffff, 0x8, 0xffffffffffffffff) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f00000000c0)='vfat\x00', &(0x7f0000000500)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f0000000600)="c8c7263634c80000000000000000", 0xe}], 0x0, &(0x7f0000000640)=ANY=[]) r1 = syz_open_procfs(0x0, &(0x7f0000176000)="00640001000445") socket$netlink(0x10, 0x3, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) sendmsg$IPVS_CMD_GET_INFO(0xffffffffffffffff, &(0x7f00000004c0)={&(0x7f0000000300)={0x10}, 0xc, &(0x7f0000000440)={&(0x7f0000000380)=ANY=[@ANYRES16, @ANYBLOB="10002abd7000ffdbdf250f00000008000496686fbd000c000100080006007772720008000600be0003007f"], 0x2}, 0x1}, 0x0) getsockopt$IPT_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x40, &(0x7f0000000280)={'raw\x00'}, &(0x7f0000000540)=0x54) ioctl$KDGKBTYPE(r1, 0x4b33, &(0x7f0000000680)) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000200), &(0x7f0000000240)=0xc) r2 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) write$binfmt_script(r0, &(0x7f0000002040)={'#! ', './file0', [{0x20, '$securityselinux'}, {0x20, 'IPVS\x00'}, {0x20, ']nodev,-@,'}, {0x20, 'em0'}], 0xa, "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"}, 0xc31) fallocate(r2, 0x1, 0x7fff, 0x10000101) 2033/05/18 03:33:32 executing program 3: r0 = socket(0x1000000010, 0x802, 0x0) mmap(&(0x7f0000000000/0xff7000)=nil, 0xff7000, 0x1, 0x32, 0xffffffffffffffff, 0x0) sendmsg$nl_route(r0, &(0x7f0000f84ff7)={&(0x7f0000f84000)={0x10}, 0xc, &(0x7f0000000040)={&(0x7f0000f84fbc)=@ipv4_deladdr={0x18, 0x15, 0x0, 0x0, 0x0, {0x2}}, 0x18}, 0x1}, 0x0) 2033/05/18 03:33:32 executing program 3: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet_sctp_SCTP_RTOINFO(0xffffffffffffffff, 0x84, 0x0, &(0x7f0000001000)={0x10000, 0x4, 0x100, 0x400}, 0x10) add_key(&(0x7f0000000000)='ceph\x00', &(0x7f0000000240)={0x73, 0x79, 0x7a, 0x1}, &(0x7f0000000280)="69eab34258385b33eecf030e03edd7e942a89fc20be8cc979bcbc9ce3fddf80d72c5d07233e45c3abea477702494b6dccc6839647fd45c1239a3f19b", 0x3c, 0xfffffffffffffff8) add_key$keyring(&(0x7f00000002c0)='keyring\x00', &(0x7f0000000300)={0x73, 0x79, 0x7a, 0x2}, 0x0, 0x0, 0xffffffffffffffff) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) r0 = syz_open_dev$mice(&(0x7f0000000440)='/dev/input/mice\x00', 0x0, 0x800) ioctl$SNDRV_SEQ_IOCTL_SYSTEM_INFO(r0, 0xc0305302, &(0x7f0000000480)={0x3eb7, 0x8, 0x5, 0x7, 0xc0e, 0x965b}) r1 = syz_open_dev$loop(&(0x7f0000308000)='/dev/loop#\x00', 0x0, 0x0) ioctl$LOOP_SET_STATUS(r1, 0xc0481273, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x6, 0x0, "3900ea631d00000000020000010000009f00000023f7b7d65f90b0e6330ee739b319d8f6aa6bd58d1443474482e85040fb4947ebb55bd19f335b5bffff0001f3", "cfa430745a540dc1c149b7b81579f6a41c51f7d51933223e82ab867dac761faf"}) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(0xffffffffffffffff, 0x6, 0x1d, &(0x7f0000000340)={0x8, 0x7fffffff, 0x200, 0x1, 0x3}, 0x14) r2 = socket(0x11, 0x802, 0x0) ioctl$LOOP_SET_STATUS(0xffffffffffffffff, 0x4c02, &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, 0x3f, 0x2, 0x80000000000000f, 0x1, "a94ec920a32c6a1b5e50a5e5aa58f72668137be6d83205bc6f42f1e6df89819b534a16c7ba1e0a78b2d4979331e260c265271f807de145ccbf21b1ec4ea2b3ff", "3835526cf0e214f9543946fb80c8e3b548112a011de7bdb4eb8c7b58a9871523", [0x8, 0x7ff]}) write(r2, &(0x7f0000000180)="5d2f599234ced1ccf5dd142159e1cc652b9079d2a9dd919b1e7354a80e14de090670ce09429d370648dbec8d2034d55c215f5665bc59a2e098036e5c0340f1efeb32a75f76ffd7f002deeb8abc013c08a202172774ce22406ab0cd0f0d1922bc3e523f399b5c016273ddd07fc6d0943b2ffc4098fd356ff7288df5782e3f412897", 0x81) setsockopt(r2, 0x107, 0xd, &(0x7f00000000c0)="cb5bc15926efaefaaf1c27e430bbf8454101a24cbd492a0300000000000000ab0384cd31c1c82d4f9efa264ee72d5d74718bbbcf39b0b6636f99c64c07294a86581850afe1309db4ef49ff684437897c919b9694f2765baff2d4359a58c9bd9b8c7f0bb7aa02f23c08d02084ca3cd5efb307ba7dc2ccc8e7b5b6fc1655da8aff9b1adac4e4687b877ca6abec4b9f915711899b110b19e910920f36d4d9fb19a31d3c79b26175", 0xa6) 2033/05/18 03:33:32 executing program 2: syz_mount_image$f2fs(&(0x7f0000000500)='f2fs\x00', &(0x7f0000000640)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010400)="1020f5f20100070009000000030000000c0000000900000001000000010000000000000000280000000000000c00000013000000020000000200000002000000010000000c000000000200000002000000060000000a0000000e000000100000030000000100000002", 0x69, 0x1400}], 0x0, &(0x7f0000000080)={[{@noextent_cache='noextent_cache', 0x2c}]}) [ 107.068847] f2fs_msg: 20 callbacks suppressed [ 107.068856] F2FS-fs (loop2): Magic Mismatch, valid(0xf2f52010) - read(0x0) [ 107.099303] FAT-fs (loop1): bogus number of reserved sectors [ 107.099321] FAT-fs (loop1): Can't find a valid FAT filesystem [ 107.131062] FAT-fs (loop6): bogus number of reserved sectors [ 107.131152] FAT-fs (loop6): Can't find a valid FAT filesystem [ 107.164339] sd 0:0:1:0: [sg0] tag#796 FAILED Result: hostbyte=DID_ABORT driverbyte=DRIVER_OK [ 107.164395] sd 0:0:1:0: [sg0] tag#796 CDB: opcode=0x20 [ 107.164489] sd 0:0:1:0: [sg0] tag#796 CDB[00]: 20 00 00 00 00 00 00 00 00 00 00 00 00 01 00 00 [ 107.165208] sd 0:0:1:0: [sg0] tag#796 CDB[10]: 00 00 00 00 00 01 00 00 00 00 00 00 00 fe ff ff [ 107.165628] sd 0:0:1:0: [sg0] tag#796 CDB[20]: ff ff ff ff ff 16 02 00 20 00 00 00 00 00 00 00 2033/05/18 03:33:32 executing program 3: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet_sctp_SCTP_RTOINFO(0xffffffffffffffff, 0x84, 0x0, &(0x7f0000001000)={0x10000, 0x4, 0x100, 0x400}, 0x10) add_key(&(0x7f0000000000)='ceph\x00', &(0x7f0000000240)={0x73, 0x79, 0x7a, 0x1}, &(0x7f0000000280)="69eab34258385b33eecf030e03edd7e942a89fc20be8cc979bcbc9ce3fddf80d72c5d07233e45c3abea477702494b6dccc6839647fd45c1239a3f19b", 0x3c, 0xfffffffffffffff8) add_key$keyring(&(0x7f00000002c0)='keyring\x00', &(0x7f0000000300)={0x73, 0x79, 0x7a, 0x2}, 0x0, 0x0, 0xffffffffffffffff) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) r0 = syz_open_dev$mice(&(0x7f0000000440)='/dev/input/mice\x00', 0x0, 0x800) ioctl$SNDRV_SEQ_IOCTL_SYSTEM_INFO(r0, 0xc0305302, &(0x7f0000000480)={0x3eb7, 0x8, 0x5, 0x7, 0xc0e, 0x965b}) r1 = syz_open_dev$loop(&(0x7f0000308000)='/dev/loop#\x00', 0x0, 0x0) ioctl$LOOP_SET_STATUS(r1, 0xc0481273, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x6, 0x0, "3900ea631d00000000020000010000009f00000023f7b7d65f90b0e6330ee739b319d8f6aa6bd58d1443474482e85040fb4947ebb55bd19f335b5bffff0001f3", "cfa430745a540dc1c149b7b81579f6a41c51f7d51933223e82ab867dac761faf"}) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(0xffffffffffffffff, 0x6, 0x1d, &(0x7f0000000340)={0x8, 0x7fffffff, 0x200, 0x1, 0x3}, 0x14) r2 = socket(0x11, 0x802, 0x0) ioctl$LOOP_SET_STATUS(0xffffffffffffffff, 0x4c02, &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, 0x3f, 0x2, 0x80000000000000f, 0x1, "a94ec920a32c6a1b5e50a5e5aa58f72668137be6d83205bc6f42f1e6df89819b534a16c7ba1e0a78b2d4979331e260c265271f807de145ccbf21b1ec4ea2b3ff", "3835526cf0e214f9543946fb80c8e3b548112a011de7bdb4eb8c7b58a9871523", [0x8, 0x7ff]}) write(r2, &(0x7f0000000180)="5d2f599234ced1ccf5dd142159e1cc652b9079d2a9dd919b1e7354a80e14de090670ce09429d370648dbec8d2034d55c215f5665bc59a2e098036e5c0340f1efeb32a75f76ffd7f002deeb8abc013c08a202172774ce22406ab0cd0f0d1922bc3e523f399b5c016273ddd07fc6d0943b2ffc4098fd356ff7288df5782e3f412897", 0x81) setsockopt(r2, 0x107, 0xd, &(0x7f00000000c0)="cb5bc15926efaefaaf1c27e430bbf8454101a24cbd492a0300000000000000ab0384cd31c1c82d4f9efa264ee72d5d74718bbbcf39b0b6636f99c64c07294a86581850afe1309db4ef49ff684437897c919b9694f2765baff2d4359a58c9bd9b8c7f0bb7aa02f23c08d02084ca3cd5efb307ba7dc2ccc8e7b5b6fc1655da8aff9b1adac4e4687b877ca6abec4b9f915711899b110b19e910920f36d4d9fb19a31d3c79b26175", 0xa6) 2033/05/18 03:33:32 executing program 1: socketpair(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, &(0x7f0000000000)=0x2) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x8946, &(0x7f00000000c0)="6c6f009674d651b159a9c84a2c60d29800000020") [ 107.166087] sd 0:0:1:0: [sg0] tag#796 CDB[30]: 00 00 00 00 00 02 00 00 00 00 00 00 00 02 00 00 [ 107.166365] sd 0:0:1:0: [sg0] tag#796 CDB[40]: 00 00 00 00 00 fe ff ff ff ff ff ff ff 18 02 00 2033/05/18 03:33:32 executing program 5: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet_sctp_SCTP_RTOINFO(0xffffffffffffffff, 0x84, 0x0, &(0x7f0000001000)={0x10000, 0x4, 0x100, 0x400}, 0x10) add_key(&(0x7f0000000000)='ceph\x00', &(0x7f0000000240)={0x73, 0x79, 0x7a, 0x1}, &(0x7f0000000280)="69eab34258385b33eecf030e03edd7e942a89fc20be8cc979bcbc9ce3fddf80d72c5d07233e45c3abea477702494b6dccc6839647fd45c1239a3f19b", 0x3c, 0xfffffffffffffff8) add_key$keyring(&(0x7f00000002c0)='keyring\x00', &(0x7f0000000300)={0x73, 0x79, 0x7a, 0x2}, 0x0, 0x0, 0xffffffffffffffff) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) r0 = syz_open_dev$mice(&(0x7f0000000440)='/dev/input/mice\x00', 0x0, 0x800) ioctl$SNDRV_SEQ_IOCTL_SYSTEM_INFO(r0, 0xc0305302, &(0x7f0000000480)={0x3eb7, 0x8, 0x5, 0x7, 0xc0e, 0x965b}) r1 = syz_open_dev$loop(&(0x7f0000308000)='/dev/loop#\x00', 0x0, 0x0) ioctl$LOOP_SET_STATUS(r1, 0xc0481273, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x6, 0x0, "3900ea631d00000000020000010000009f00000023f7b7d65f90b0e6330ee739b319d8f6aa6bd58d1443474482e85040fb4947ebb55bd19f335b5bffff0001f3", "cfa430745a540dc1c149b7b81579f6a41c51f7d51933223e82ab867dac761faf"}) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(0xffffffffffffffff, 0x6, 0x1d, &(0x7f0000000340)={0x8, 0x7fffffff, 0x200, 0x1, 0x3}, 0x14) r2 = socket(0x11, 0x802, 0x0) ioctl$LOOP_SET_STATUS(0xffffffffffffffff, 0x4c02, &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, 0x3f, 0x2, 0x80000000000000f, 0x1, "a94ec920a32c6a1b5e50a5e5aa58f72668137be6d83205bc6f42f1e6df89819b534a16c7ba1e0a78b2d4979331e260c265271f807de145ccbf21b1ec4ea2b3ff", "3835526cf0e214f9543946fb80c8e3b548112a011de7bdb4eb8c7b58a9871523", [0x8, 0x7ff]}) write(r2, &(0x7f0000000180)="5d2f599234ced1ccf5dd142159e1cc652b9079d2a9dd919b1e7354a80e14de090670ce09429d370648dbec8d2034d55c215f5665bc59a2e098036e5c0340f1efeb32a75f76ffd7f002deeb8abc013c08a202172774ce22406ab0cd0f0d1922bc3e523f399b5c016273ddd07fc6d0943b2ffc4098fd356ff7288df5782e3f412897", 0x81) setsockopt(r2, 0x107, 0xd, &(0x7f00000000c0)="cb5bc15926efaefaaf1c27e430bbf8454101a24cbd492a0300000000000000ab0384cd31c1c82d4f9efa264ee72d5d74718bbbcf39b0b6636f99c64c07294a86581850afe1309db4ef49ff684437897c919b9694f2765baff2d4359a58c9bd9b8c7f0bb7aa02f23c08d02084ca3cd5efb307ba7dc2ccc8e7b5b6fc1655da8aff9b1adac4e4687b877ca6abec4b9f915711899b110b19e910920f36d4d9fb19a31d3c79b26175", 0xa6) 2033/05/18 03:33:32 executing program 6: syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000180)="1020f5f20100070009000000030000000c0000000900000001000000010000000000000000280000000000000c00000013000000020000000200000002000000010000000c000000000200000002000000060000000a0000000e000000100000030000000100000002", 0x69, 0x1400}], 0x0, &(0x7f0000000240)={[{@lfs_mode='mode=lfs', 0x2c}]}) [ 107.166440] sd 0:0:1:0: [sg0] tag#796 CDB[50]: 20 00 00 00 00 00 00 00 00 00 00 00 00 02 00 00 [ 107.166544] sd 0:0:1:0: [sg0] tag#796 CDB[60]: 00 00 00 00 00 [ 107.609262] F2FS-fs (loop6): Magic Mismatch, valid(0xf2f52010) - read(0x0) [ 107.609269] F2FS-fs (loop6): Can't find valid F2FS filesystem in 1th superblock [ 107.610387] attempt to access beyond end of device [ 107.610395] loop6: rw=48, want=4104, limit=20 [ 107.610525] F2FS-fs (loop6): invalid crc value [ 107.610542] attempt to access beyond end of device [ 107.610548] loop6: rw=48, want=8200, limit=20 [ 107.610562] F2FS-fs (loop6): invalid crc value [ 107.610571] F2FS-fs (loop6): Failed to get valid F2FS checkpoint [ 107.611386] F2FS-fs (loop6): Magic Mismatch, valid(0xf2f52010) - read(0x0) [ 107.611392] F2FS-fs (loop6): Can't find valid F2FS filesystem in 1th superblock [ 107.611486] attempt to access beyond end of device [ 107.611492] loop6: rw=48, want=4104, limit=20 [ 107.611507] F2FS-fs (loop6): invalid crc value [ 107.611524] attempt to access beyond end of device [ 107.611531] loop6: rw=48, want=8200, limit=20 [ 107.611545] F2FS-fs (loop6): invalid crc value [ 107.648623] attempt to access beyond end of device [ 107.648631] loop6: rw=48, want=4104, limit=20 [ 107.648658] attempt to access beyond end of device [ 107.648664] loop6: rw=48, want=8200, limit=20 [ 107.648878] attempt to access beyond end of device [ 107.648884] loop6: rw=48, want=4104, limit=20 [ 107.648908] attempt to access beyond end of device [ 107.648914] loop6: rw=48, want=8200, limit=20 [ 108.000480] attempt to access beyond end of device [ 108.012649] loop2: rw=48, want=4104, limit=20 [ 108.022976] attempt to access beyond end of device [ 108.033678] loop2: rw=48, want=8200, limit=20 [ 108.044396] attempt to access beyond end of device [ 108.055070] loop2: rw=48, want=4104, limit=20 [ 108.068636] attempt to access beyond end of device [ 108.079209] loop2: rw=48, want=8200, limit=20 2033/05/18 03:33:33 executing program 1: syz_open_procfs(0x0, &(0x7f0000000080)="76cda2d775b2bccab4a9361c38d504ecd0000000000000000000000000") perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = creat(&(0x7f0000000700)='./bus\x00', 0x0) r1 = open(&(0x7f0000000000)='./bus\x00', 0x26302, 0x0) ftruncate(r1, 0x80000) sendfile(r0, r1, &(0x7f0000d83ff8), 0x8000fffffffe) creat(&(0x7f00000000c0)='./bus\x00', 0x0) 2033/05/18 03:33:33 executing program 6: syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000180)="1020f5f20100070009000000030000000c0000000900000001000000010000000000000000280000000000000c00000013000000020000000200000002000000010000000c000000000200000002000000060000000a0000000e000000100000030000000100000002", 0x69, 0x1400}], 0x0, &(0x7f0000000240)={[{@lfs_mode='mode=lfs', 0x2c}]}) 2033/05/18 03:33:33 executing program 5: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet_sctp_SCTP_RTOINFO(0xffffffffffffffff, 0x84, 0x0, &(0x7f0000001000)={0x10000, 0x4, 0x100, 0x400}, 0x10) add_key(&(0x7f0000000000)='ceph\x00', &(0x7f0000000240)={0x73, 0x79, 0x7a, 0x1}, &(0x7f0000000280)="69eab34258385b33eecf030e03edd7e942a89fc20be8cc979bcbc9ce3fddf80d72c5d07233e45c3abea477702494b6dccc6839647fd45c1239a3f19b", 0x3c, 0xfffffffffffffff8) add_key$keyring(&(0x7f00000002c0)='keyring\x00', &(0x7f0000000300)={0x73, 0x79, 0x7a, 0x2}, 0x0, 0x0, 0xffffffffffffffff) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) r0 = syz_open_dev$mice(&(0x7f0000000440)='/dev/input/mice\x00', 0x0, 0x800) ioctl$SNDRV_SEQ_IOCTL_SYSTEM_INFO(r0, 0xc0305302, &(0x7f0000000480)={0x3eb7, 0x8, 0x5, 0x7, 0xc0e, 0x965b}) r1 = syz_open_dev$loop(&(0x7f0000308000)='/dev/loop#\x00', 0x0, 0x0) ioctl$LOOP_SET_STATUS(r1, 0xc0481273, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x6, 0x0, "3900ea631d00000000020000010000009f00000023f7b7d65f90b0e6330ee739b319d8f6aa6bd58d1443474482e85040fb4947ebb55bd19f335b5bffff0001f3", "cfa430745a540dc1c149b7b81579f6a41c51f7d51933223e82ab867dac761faf"}) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(0xffffffffffffffff, 0x6, 0x1d, &(0x7f0000000340)={0x8, 0x7fffffff, 0x200, 0x1, 0x3}, 0x14) r2 = socket(0x11, 0x802, 0x0) ioctl$LOOP_SET_STATUS(0xffffffffffffffff, 0x4c02, &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, 0x3f, 0x2, 0x80000000000000f, 0x1, "a94ec920a32c6a1b5e50a5e5aa58f72668137be6d83205bc6f42f1e6df89819b534a16c7ba1e0a78b2d4979331e260c265271f807de145ccbf21b1ec4ea2b3ff", "3835526cf0e214f9543946fb80c8e3b548112a011de7bdb4eb8c7b58a9871523", [0x8, 0x7ff]}) write(r2, &(0x7f0000000180)="5d2f599234ced1ccf5dd142159e1cc652b9079d2a9dd919b1e7354a80e14de090670ce09429d370648dbec8d2034d55c215f5665bc59a2e098036e5c0340f1efeb32a75f76ffd7f002deeb8abc013c08a202172774ce22406ab0cd0f0d1922bc3e523f399b5c016273ddd07fc6d0943b2ffc4098fd356ff7288df5782e3f412897", 0x81) setsockopt(r2, 0x107, 0xd, &(0x7f00000000c0)="cb5bc15926efaefaaf1c27e430bbf8454101a24cbd492a0300000000000000ab0384cd31c1c82d4f9efa264ee72d5d74718bbbcf39b0b6636f99c64c07294a86581850afe1309db4ef49ff684437897c919b9694f2765baff2d4359a58c9bd9b8c7f0bb7aa02f23c08d02084ca3cd5efb307ba7dc2ccc8e7b5b6fc1655da8aff9b1adac4e4687b877ca6abec4b9f915711899b110b19e910920f36d4d9fb19a31d3c79b26175", 0xa6) 2033/05/18 03:33:33 executing program 3: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet_sctp_SCTP_RTOINFO(0xffffffffffffffff, 0x84, 0x0, &(0x7f0000001000)={0x10000, 0x4, 0x100, 0x400}, 0x10) add_key(&(0x7f0000000000)='ceph\x00', &(0x7f0000000240)={0x73, 0x79, 0x7a, 0x1}, &(0x7f0000000280)="69eab34258385b33eecf030e03edd7e942a89fc20be8cc979bcbc9ce3fddf80d72c5d07233e45c3abea477702494b6dccc6839647fd45c1239a3f19b", 0x3c, 0xfffffffffffffff8) add_key$keyring(&(0x7f00000002c0)='keyring\x00', &(0x7f0000000300)={0x73, 0x79, 0x7a, 0x2}, 0x0, 0x0, 0xffffffffffffffff) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) r0 = syz_open_dev$mice(&(0x7f0000000440)='/dev/input/mice\x00', 0x0, 0x800) ioctl$SNDRV_SEQ_IOCTL_SYSTEM_INFO(r0, 0xc0305302, &(0x7f0000000480)={0x3eb7, 0x8, 0x5, 0x7, 0xc0e, 0x965b}) r1 = syz_open_dev$loop(&(0x7f0000308000)='/dev/loop#\x00', 0x0, 0x0) ioctl$LOOP_SET_STATUS(r1, 0xc0481273, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x6, 0x0, "3900ea631d00000000020000010000009f00000023f7b7d65f90b0e6330ee739b319d8f6aa6bd58d1443474482e85040fb4947ebb55bd19f335b5bffff0001f3", "cfa430745a540dc1c149b7b81579f6a41c51f7d51933223e82ab867dac761faf"}) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(0xffffffffffffffff, 0x6, 0x1d, &(0x7f0000000340)={0x8, 0x7fffffff, 0x200, 0x1, 0x3}, 0x14) r2 = socket(0x11, 0x802, 0x0) ioctl$LOOP_SET_STATUS(0xffffffffffffffff, 0x4c02, &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, 0x3f, 0x2, 0x80000000000000f, 0x1, "a94ec920a32c6a1b5e50a5e5aa58f72668137be6d83205bc6f42f1e6df89819b534a16c7ba1e0a78b2d4979331e260c265271f807de145ccbf21b1ec4ea2b3ff", "3835526cf0e214f9543946fb80c8e3b548112a011de7bdb4eb8c7b58a9871523", [0x8, 0x7ff]}) write(r2, &(0x7f0000000180)="5d2f599234ced1ccf5dd142159e1cc652b9079d2a9dd919b1e7354a80e14de090670ce09429d370648dbec8d2034d55c215f5665bc59a2e098036e5c0340f1efeb32a75f76ffd7f002deeb8abc013c08a202172774ce22406ab0cd0f0d1922bc3e523f399b5c016273ddd07fc6d0943b2ffc4098fd356ff7288df5782e3f412897", 0x81) setsockopt(r2, 0x107, 0xd, &(0x7f00000000c0)="cb5bc15926efaefaaf1c27e430bbf8454101a24cbd492a0300000000000000ab0384cd31c1c82d4f9efa264ee72d5d74718bbbcf39b0b6636f99c64c07294a86581850afe1309db4ef49ff684437897c919b9694f2765baff2d4359a58c9bd9b8c7f0bb7aa02f23c08d02084ca3cd5efb307ba7dc2ccc8e7b5b6fc1655da8aff9b1adac4e4687b877ca6abec4b9f915711899b110b19e910920f36d4d9fb19a31d3c79b26175", 0xa6) 2033/05/18 03:33:33 executing program 0: r0 = socket$inet6(0xa, 0x400000000001, 0x0) r1 = dup(r0) perf_event_open(&(0x7f0000000040)={0x1, 0x443, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40000000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TUNSETOFFLOAD(0xffffffffffffffff, 0x400454d0, 0x0) r2 = socket(0xa, 0x2, 0x0) connect$inet6(r2, &(0x7f0000000040)={0xa, 0x0, 0x0, @mcast1={0xff, 0x1, [], 0x1}, 0x100000002}, 0x1c) setsockopt$sock_int(r2, 0x1, 0xb, &(0x7f0000000080)=0x6c5, 0x4) sendto$inet(r2, &(0x7f0000509f92), 0xff77, 0x0, &(0x7f000055fff0)={0x2, 0x4e23, @loopback=0x7f000001}, 0x10) setsockopt$inet6_tcp_int(r1, 0x6, 0x20000000000002, &(0x7f00007b1000)=0x81, 0x4) bind$inet6(r2, &(0x7f00000000c0)={0xa, 0x4e24, 0x7fff, @ipv4={[], [0xff, 0xff], @broadcast=0xffffffff}, 0xa402}, 0x1c) dup2(r1, r0) bind$inet6(r1, &(0x7f0000000080)={0xa, 0x4e20, 0x0, @loopback={0x0, 0x1}}, 0x1c) sendto$inet6(r0, &(0x7f0000000000)="85ace0073bc515f3adbed20d060a3eee25e220eeaed668d3e5e3e82c89e7d37a3562fa", 0x23, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback={0x0, 0x1}}, 0x1c) r3 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0xfffffffffffffffe) ftruncate(r3, 0x7fff) setsockopt$inet_tcp_TCP_MD5SIG(0xffffffffffffffff, 0x6, 0xe, &(0x7f0000001140)={@in6={{0xa, 0x4e20, 0x0, @mcast1={0xff, 0x1, [], 0x1}}}, 0x4, 0x20, 0x0, "755ccbd589963fc68b748315ddb526e75affef53a3f70188af1358d12e76c6b9b89cf84aa9364ed24706c85f515093c2ce55dde6d80a1e59c3c13a7c2d25cea6af78a35d715cd3f9cd358dade09b8351"}, 0xd8) sendfile(r1, r3, &(0x7f0000d83ff8), 0x8000fffffffe) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_TEMPO(r3, 0x402c5342, &(0x7f0000000180)={0x7, 0x5, 0x7fffffff, {0x77359400}, 0xe5a2, 0x2}) 2033/05/18 03:33:33 executing program 4: r0 = socket$inet6(0xa, 0x400000000001, 0x0) r1 = dup(r0) perf_event_open(&(0x7f0000000040)={0x1, 0x443, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40000000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TUNSETOFFLOAD(0xffffffffffffffff, 0x400454d0, 0x0) r2 = socket(0xa, 0x2, 0x0) connect$inet6(r2, &(0x7f0000000040)={0xa, 0x0, 0x0, @mcast1={0xff, 0x1, [], 0x1}, 0x100000002}, 0x1c) setsockopt$sock_int(r2, 0x1, 0xb, &(0x7f0000000080)=0x6c5, 0x4) sendto$inet(r2, &(0x7f0000509f92), 0xff77, 0x0, &(0x7f000055fff0)={0x2, 0x4e23, @loopback=0x7f000001}, 0x10) setsockopt$inet6_tcp_int(r1, 0x6, 0x20000000000002, &(0x7f00007b1000)=0x81, 0x4) bind$inet6(r2, &(0x7f00000000c0)={0xa, 0x4e24, 0x7fff, @ipv4={[], [0xff, 0xff], @broadcast=0xffffffff}, 0xa402}, 0x1c) dup2(r1, r0) bind$inet6(r1, &(0x7f0000000080)={0xa, 0x4e20, 0x0, @loopback={0x0, 0x1}}, 0x1c) sendto$inet6(r0, &(0x7f0000000000)="85ace0073bc515f3adbed20d060a3eee25e220eeaed668d3e5e3e82c89e7d37a3562fa", 0x23, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback={0x0, 0x1}}, 0x1c) r3 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0xfffffffffffffffe) ftruncate(r3, 0x7fff) setsockopt$inet_tcp_TCP_MD5SIG(0xffffffffffffffff, 0x6, 0xe, &(0x7f0000001140)={@in6={{0xa, 0x4e20, 0x0, @mcast1={0xff, 0x1, [], 0x1}}}, 0x4, 0x20, 0x0, "755ccbd589963fc68b748315ddb526e75affef53a3f70188af1358d12e76c6b9b89cf84aa9364ed24706c85f515093c2ce55dde6d80a1e59c3c13a7c2d25cea6af78a35d715cd3f9cd358dade09b8351"}, 0xd8) sendfile(r1, r3, &(0x7f0000d83ff8), 0x8000fffffffe) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_TEMPO(r3, 0x402c5342, &(0x7f0000000180)={0x7, 0x5, 0x7fffffff, {0x77359400}, 0xe5a2, 0x2}) 2033/05/18 03:33:33 executing program 2: syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f0000000100)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000010000)="eb3c906d6b66732e66617400020401000200077008f8", 0x16}], 0x0, &(0x7f0000000240)=ANY=[]) open(&(0x7f0000000400)='./file0/file0\x00', 0x3fffa, 0x0) r0 = open(&(0x7f00000003c0)='./file0/file0\x00', 0x4001, 0x0) fallocate(r0, 0x0, 0x0, 0x1fffff) creat(&(0x7f00000001c0)='./file0/file0\x00', 0x0) 2033/05/18 03:33:33 executing program 7: r0 = socket$inet6(0xa, 0x400000000001, 0x0) r1 = dup(r0) perf_event_open(&(0x7f0000000040)={0x1, 0x443, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40000000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TUNSETOFFLOAD(0xffffffffffffffff, 0x400454d0, 0x0) r2 = socket(0xa, 0x2, 0x0) connect$inet6(r2, &(0x7f0000000040)={0xa, 0x0, 0x0, @mcast1={0xff, 0x1, [], 0x1}, 0x100000002}, 0x1c) setsockopt$sock_int(r2, 0x1, 0xb, &(0x7f0000000080)=0x6c5, 0x4) sendto$inet(r2, &(0x7f0000509f92), 0xff77, 0x0, &(0x7f000055fff0)={0x2, 0x4e23, @loopback=0x7f000001}, 0x10) setsockopt$inet6_tcp_int(r1, 0x6, 0x20000000000002, &(0x7f00007b1000)=0x81, 0x4) bind$inet6(r2, &(0x7f00000000c0)={0xa, 0x4e24, 0x7fff, @ipv4={[], [0xff, 0xff], @broadcast=0xffffffff}, 0xa402}, 0x1c) dup2(r1, r0) bind$inet6(r1, &(0x7f0000000080)={0xa, 0x4e20, 0x0, @loopback={0x0, 0x1}}, 0x1c) sendto$inet6(r0, &(0x7f0000000000)="85ace0073bc515f3adbed20d060a3eee25e220eeaed668d3e5e3e82c89e7d37a3562fa", 0x23, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback={0x0, 0x1}}, 0x1c) r3 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0xfffffffffffffffe) ftruncate(r3, 0x7fff) setsockopt$inet_tcp_TCP_MD5SIG(0xffffffffffffffff, 0x6, 0xe, &(0x7f0000001140)={@in6={{0xa, 0x4e20, 0x0, @mcast1={0xff, 0x1, [], 0x1}}}, 0x4, 0x20, 0x0, "755ccbd589963fc68b748315ddb526e75affef53a3f70188af1358d12e76c6b9b89cf84aa9364ed24706c85f515093c2ce55dde6d80a1e59c3c13a7c2d25cea6af78a35d715cd3f9cd358dade09b8351"}, 0xd8) sendfile(r1, r3, &(0x7f0000d83ff8), 0x8000fffffffe) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_TEMPO(r3, 0x402c5342, &(0x7f0000000180)={0x7, 0x5, 0x7fffffff, {0x77359400}, 0xe5a2, 0x2}) [ 108.184368] attempt to access beyond end of device [ 108.216641] FAT-fs (loop2): Directory bread(block 112) failed [ 108.221893] FAT-fs (loop2): Directory bread(block 112) failed [ 108.223836] FAT-fs (loop2): Directory bread(block 112) failed [ 108.311859] loop6: rw=48, want=4104, limit=20 [ 108.331938] attempt to access beyond end of device [ 108.356313] loop6: rw=48, want=8200, limit=20 [ 108.372605] attempt to access beyond end of device [ 108.379509] loop6: rw=48, want=4104, limit=20 [ 108.390946] attempt to access beyond end of device 2033/05/18 03:33:33 executing program 3: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) sendmmsg(r0, &(0x7f0000005540)=[{{&(0x7f0000000440)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @dev={0xac, 0x14}}}}, 0x80, &(0x7f0000002880), 0x0, &(0x7f0000002900)}}], 0x1, 0x20000001) [ 108.414624] loop6: rw=48, want=8200, limit=20 2033/05/18 03:33:33 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f000012afe4)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, 0x0) tgkill(0x0, 0x0, 0x0) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) getsockopt$inet_sctp6_SCTP_INITMSG(0xffffffffffffffff, 0x84, 0x2, &(0x7f0000000340), &(0x7f0000000400)=0x8) sendto$inet6(r0, &(0x7f0000eb9fff), 0xffffff31, 0x20000003, &(0x7f000031e000)={0xa, 0x4e22}, 0x1c) 2033/05/18 03:33:33 executing program 3: mkdir(&(0x7f000082f000)='./control\x00', 0x0) r0 = open(&(0x7f000080dff6)='./control\x00', 0x0, 0x0) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x1, 0x32, 0xffffffffffffffff, 0x0) r1 = userfaultfd(0x0) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000bc8000)={0xaa}) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000d62fe0)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r2 = creat(&(0x7f0000000100)='./file0\x00', 0x0) write$sndseq(r2, &(0x7f0000011fd2)=[{0x0, 0x0, 0x0, 0x0, @tick, {}, {}, @time=@time={0x77359400}}], 0x1c) link(&(0x7f0000f3bff8)='./file0\x00', &(0x7f0000000080)='./control/file0\x00') getdents(r0, &(0x7f0000000140)=""/238, 0xee) getdents(r0, &(0x7f0000000000), 0xffffffffffffff3a) dup2(r0, r1) 2033/05/18 03:33:33 executing program 6: syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000180)="1020f5f20100070009000000030000000c0000000900000001000000010000000000000000280000000000000c00000013000000020000000200000002000000010000000c000000000200000002000000060000000a0000000e000000100000030000000100000002", 0x69, 0x1400}], 0x0, &(0x7f0000000240)={[{@lfs_mode='mode=lfs', 0x2c}]}) 2033/05/18 03:33:33 executing program 2: syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f0000000100)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000010000)="eb3c906d6b66732e66617400020401000200077008f8", 0x16}], 0x0, &(0x7f0000000240)=ANY=[]) open(&(0x7f0000000400)='./file0/file0\x00', 0x3fffa, 0x0) r0 = open(&(0x7f00000003c0)='./file0/file0\x00', 0x4001, 0x0) fallocate(r0, 0x0, 0x0, 0x1fffff) creat(&(0x7f00000001c0)='./file0/file0\x00', 0x0) [ 108.516895] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 108.573452] attempt to access beyond end of device [ 108.584114] loop6: rw=48, want=4104, limit=20 [ 108.596827] attempt to access beyond end of device [ 108.609068] loop6: rw=48, want=8200, limit=20 [ 108.622843] attempt to access beyond end of device [ 108.634927] loop6: rw=48, want=4104, limit=20 [ 108.645282] attempt to access beyond end of device [ 108.655918] loop6: rw=48, want=8200, limit=20 2033/05/18 03:33:33 executing program 6: syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000180)="1020f5f20100070009000000030000000c0000000900000001000000010000000000000000280000000000000c00000013000000020000000200000002000000010000000c000000000200000002000000060000000a0000000e000000100000030000000100000002", 0x69, 0x1400}], 0x0, &(0x7f0000000240)={[{@lfs_mode='mode=lfs', 0x2c}]}) [ 108.747534] FAT-fs (loop2): Directory bread(block 112) failed [ 108.820560] attempt to access beyond end of device [ 108.831455] FAT-fs (loop2): Directory bread(block 112) failed [ 108.832017] FAT-fs (loop2): Directory bread(block 112) failed 2033/05/18 03:33:34 executing program 1: syz_open_procfs(0x0, &(0x7f0000000080)="76cda2d775b2bccab4a9361c38d504ecd0000000000000000000000000") perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = creat(&(0x7f0000000700)='./bus\x00', 0x0) r1 = open(&(0x7f0000000000)='./bus\x00', 0x26302, 0x0) ftruncate(r1, 0x80000) sendfile(r0, r1, &(0x7f0000d83ff8), 0x8000fffffffe) creat(&(0x7f00000000c0)='./bus\x00', 0x0) [ 108.907463] loop6: rw=48, want=4104, limit=20 [ 108.923471] attempt to access beyond end of device [ 108.946223] loop6: rw=48, want=8200, limit=20 [ 108.970661] attempt to access beyond end of device 2033/05/18 03:33:34 executing program 2: syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f0000000100)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000010000)="eb3c906d6b66732e66617400020401000200077008f8", 0x16}], 0x0, &(0x7f0000000240)=ANY=[]) open(&(0x7f0000000400)='./file0/file0\x00', 0x3fffa, 0x0) r0 = open(&(0x7f00000003c0)='./file0/file0\x00', 0x4001, 0x0) fallocate(r0, 0x0, 0x0, 0x1fffff) creat(&(0x7f00000001c0)='./file0/file0\x00', 0x0) [ 109.001022] loop6: rw=48, want=4104, limit=20 [ 109.016109] attempt to access beyond end of device [ 109.031493] loop6: rw=48, want=8200, limit=20 [ 109.171558] FAT-fs (loop2): Directory bread(block 112) failed [ 109.238335] FAT-fs (loop2): Directory bread(block 112) failed [ 109.246227] FAT-fs (loop2): Directory bread(block 112) failed 2033/05/18 03:33:34 executing program 3: r0 = socket(0x10, 0x802, 0x0) write(r0, &(0x7f0000000080)="220000001800071100be0000090007000a00013f0000000900f8ff0005000280ff45", 0x22) 2033/05/18 03:33:34 executing program 4: syz_open_procfs(0x0, &(0x7f0000000080)="76cda2d775b2bccab4a9361c38d504ecd0000000000000000000000000") perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = creat(&(0x7f0000000700)='./bus\x00', 0x0) r1 = open(&(0x7f0000000000)='./bus\x00', 0x26302, 0x0) ftruncate(r1, 0x80000) sendfile(r0, r1, &(0x7f0000d83ff8), 0x8000fffffffe) creat(&(0x7f00000000c0)='./bus\x00', 0x0) 2033/05/18 03:33:34 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f000012afe4)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, 0x0) tgkill(0x0, 0x0, 0x0) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) getsockopt$inet_sctp6_SCTP_INITMSG(0xffffffffffffffff, 0x84, 0x2, &(0x7f0000000340), &(0x7f0000000400)=0x8) sendto$inet6(r0, &(0x7f0000eb9fff), 0xffffff31, 0x20000003, &(0x7f000031e000)={0xa, 0x4e22}, 0x1c) 2033/05/18 03:33:34 executing program 0: syz_open_procfs(0x0, &(0x7f0000000080)="76cda2d775b2bccab4a9361c38d504ecd0000000000000000000000000") perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = creat(&(0x7f0000000700)='./bus\x00', 0x0) r1 = open(&(0x7f0000000000)='./bus\x00', 0x26302, 0x0) ftruncate(r1, 0x80000) sendfile(r0, r1, &(0x7f0000d83ff8), 0x8000fffffffe) creat(&(0x7f00000000c0)='./bus\x00', 0x0) 2033/05/18 03:33:34 executing program 6: r0 = socket$netlink(0x10, 0x3, 0x0) perf_event_open(&(0x7f000001d000)={0x5, 0x5f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_bp={&(0x7f0000000000), 0x1}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getsockopt$netlink(r0, 0x10e, 0xa, &(0x7f00008f9000)=""/12, &(0x7f0000000000)=0x5) 2033/05/18 03:33:34 executing program 2: syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f0000000100)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000010000)="eb3c906d6b66732e66617400020401000200077008f8", 0x16}], 0x0, &(0x7f0000000240)=ANY=[]) open(&(0x7f0000000400)='./file0/file0\x00', 0x3fffa, 0x0) r0 = open(&(0x7f00000003c0)='./file0/file0\x00', 0x4001, 0x0) fallocate(r0, 0x0, 0x0, 0x1fffff) creat(&(0x7f00000001c0)='./file0/file0\x00', 0x0) 2033/05/18 03:33:34 executing program 7: syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f0000000100)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000010000)="eb3c906d6b66732e66617400020401000200077008f8", 0x16}], 0x0, &(0x7f0000000240)=ANY=[]) open(&(0x7f0000000400)='./file0/file0\x00', 0x3fffa, 0x0) r0 = open(&(0x7f00000003c0)='./file0/file0\x00', 0x4001, 0x0) fallocate(r0, 0x0, 0x0, 0x1fffff) creat(&(0x7f00000001c0)='./file0/file0\x00', 0x0) 2033/05/18 03:33:34 executing program 1: syz_open_procfs(0x0, &(0x7f0000000080)="76cda2d775b2bccab4a9361c38d504ecd0000000000000000000000000") perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = creat(&(0x7f0000000700)='./bus\x00', 0x0) r1 = open(&(0x7f0000000000)='./bus\x00', 0x26302, 0x0) ftruncate(r1, 0x80000) sendfile(r0, r1, &(0x7f0000d83ff8), 0x8000fffffffe) creat(&(0x7f00000000c0)='./bus\x00', 0x0) 2033/05/18 03:33:34 executing program 3: capset(&(0x7f0000581ff8)={0x19980330}, &(0x7f00000d3fe8)) syslog(0x0, &(0x7f0000000140)=""/242, 0xf2) 2033/05/18 03:33:34 executing program 6: mmap(&(0x7f0000540000/0x2000)=nil, 0x2000, 0x1, 0x40000002871, 0xffffffffffffffff, 0x0) mremap(&(0x7f0000540000/0x1000)=nil, 0x1000, 0x3000, 0x3, &(0x7f00000cd000/0x3000)=nil) perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x72, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000100)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mremap(&(0x7f000053b000/0x1000)=nil, 0x1000, 0x4000, 0x3, &(0x7f00000cc000/0x4000)=nil) 2033/05/18 03:33:34 executing program 3: request_key(&(0x7f0000000540)="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", &(0x7f0000000280)={0x73, 0x79, 0x7a}, &(0x7f0000000740)='port0\x00', 0x0) [ 109.473424] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 2033/05/18 03:33:34 executing program 3: mkdir(&(0x7f0000000280)='./file0\x00', 0x0) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='cgroup2\x00', 0x0, 0x0) r0 = open(&(0x7f0000000240)='./file0\x00', 0x0, 0x0) close(r0) [ 109.551275] FAT-fs (loop7): Directory bread(block 112) failed 2033/05/18 03:33:34 executing program 3: setsockopt$inet_MCAST_JOIN_GROUP(0xffffffffffffffff, 0x0, 0x2a, &(0x7f0000008000)={0x0, {{0x2, 0x0, @rand_addr}}}, 0xfffffdcd) r0 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$inet_buf(r0, 0x0, 0x30, &(0x7f0000008000)=""/144, &(0x7f0000004000)=0x90) 2033/05/18 03:33:34 executing program 6: r0 = userfaultfd(0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000000140)={0xaa}) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000000000)={{&(0x7f0000ff8000/0x2000)=nil, 0x2000}, 0x1}) r1 = userfaultfd(0x0) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000000140)={0xaa}) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000000180)={{&(0x7f0000ffa000/0x1000)=nil, 0x1000}, 0x1}) [ 109.584391] FAT-fs (loop2): Directory bread(block 112) failed [ 109.648096] FAT-fs (loop2): Directory bread(block 112) failed [ 109.657102] FAT-fs (loop2): Directory bread(block 112) failed [ 109.700394] FAT-fs (loop7): Directory bread(block 112) failed [ 109.707084] FAT-fs (loop7): Directory bread(block 112) failed 2033/05/18 03:33:35 executing program 6: perf_event_open(&(0x7f0000000040)={0x1, 0x443, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x20100, &(0x7f00000000c0), &(0x7f0000000200), &(0x7f0000000140), &(0x7f0000000240)) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f00000004c0)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000500)={{{@in6=@local, @in=@dev}}, {{@in6=@mcast2}, 0x0, @in6}}, &(0x7f0000000600)=0xe8) geteuid() ioctl$sock_SIOCGPGRP(0xffffffffffffff9c, 0x8904, &(0x7f0000000780)) ioctl$TIOCGSID(0xffffffffffffff9c, 0x5429, &(0x7f0000000940)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000a40), &(0x7f0000000a80)=0xc) getpid() getpgrp(0x0) getresuid(&(0x7f0000000b80), &(0x7f0000000bc0), &(0x7f0000000c00)) getresgid(&(0x7f0000000c40), &(0x7f0000000c80), &(0x7f0000000cc0)) 2033/05/18 03:33:35 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f0000ab9ff0)={0x2, &(0x7f000039a000)=[{0x20, 0x0, 0x0, 0xfffffffffffff00c}, {0x6}]}, 0x10) getsockopt$inet_mtu(0xffffffffffffffff, 0x0, 0xa, &(0x7f0000000100), &(0x7f0000000140)=0x4) write(r0, &(0x7f0000000140), 0x248) 2033/05/18 03:33:35 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f000012afe4)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, 0x0) tgkill(0x0, 0x0, 0x0) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) getsockopt$inet_sctp6_SCTP_INITMSG(0xffffffffffffffff, 0x84, 0x2, &(0x7f0000000340), &(0x7f0000000400)=0x8) sendto$inet6(r0, &(0x7f0000eb9fff), 0xffffff31, 0x20000003, &(0x7f000031e000)={0xa, 0x4e22}, 0x1c) 2033/05/18 03:33:35 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x80000000000a) bind$netlink(r0, &(0x7f0000514ff4)={0x10, 0x0, 0x0, 0x2ffffffff}, 0xc) sendmsg$IPVS_CMD_GET_CONFIG(r0, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f0000000080)={&(0x7f00000001c0)={0x14, 0x0, 0x0, 0x0, 0x0, {0xd}}, 0x14}, 0x1}, 0x0) 2033/05/18 03:33:35 executing program 7: syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f0000000100)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000010000)="eb3c906d6b66732e66617400020401000200077008f8", 0x16}], 0x0, &(0x7f0000000240)=ANY=[]) open(&(0x7f0000000400)='./file0/file0\x00', 0x3fffa, 0x0) r0 = open(&(0x7f00000003c0)='./file0/file0\x00', 0x4001, 0x0) fallocate(r0, 0x0, 0x0, 0x1fffff) creat(&(0x7f00000001c0)='./file0/file0\x00', 0x0) 2033/05/18 03:33:35 executing program 1: syz_open_procfs(0x0, &(0x7f0000000080)="76cda2d775b2bccab4a9361c38d504ecd0000000000000000000000000") perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = creat(&(0x7f0000000700)='./bus\x00', 0x0) r1 = open(&(0x7f0000000000)='./bus\x00', 0x26302, 0x0) ftruncate(r1, 0x80000) sendfile(r0, r1, &(0x7f0000d83ff8), 0x8000fffffffe) creat(&(0x7f00000000c0)='./bus\x00', 0x0) 2033/05/18 03:33:35 executing program 4: syz_open_procfs(0x0, &(0x7f0000000080)="76cda2d775b2bccab4a9361c38d504ecd0000000000000000000000000") perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = creat(&(0x7f0000000700)='./bus\x00', 0x0) r1 = open(&(0x7f0000000000)='./bus\x00', 0x26302, 0x0) ftruncate(r1, 0x80000) sendfile(r0, r1, &(0x7f0000d83ff8), 0x8000fffffffe) creat(&(0x7f00000000c0)='./bus\x00', 0x0) 2033/05/18 03:33:35 executing program 0: syz_open_procfs(0x0, &(0x7f0000000080)="76cda2d775b2bccab4a9361c38d504ecd0000000000000000000000000") perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = creat(&(0x7f0000000700)='./bus\x00', 0x0) r1 = open(&(0x7f0000000000)='./bus\x00', 0x26302, 0x0) ftruncate(r1, 0x80000) sendfile(r0, r1, &(0x7f0000d83ff8), 0x8000fffffffe) creat(&(0x7f00000000c0)='./bus\x00', 0x0) 2033/05/18 03:33:35 executing program 3: keyctl$session_to_parent(0x12) 2033/05/18 03:33:35 executing program 2: open(&(0x7f0000000040)='./bus\x00', 0x141042, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvfrom$inet(0xffffffffffffffff, &(0x7f0000000780)=""/250, 0xfa, 0x0, &(0x7f0000000480)={0x2, 0x0, @loopback=0x7f000001}, 0x10) r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000001a40), 0x0) r1 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) fallocate(r1, 0x1, 0x0, 0x10000101) 2033/05/18 03:33:35 executing program 3: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000038000/0x2000)=nil, 0x2000, 0x1fffffc, 0x10, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000440)='status\x00') sendfile(r0, r0, &(0x7f0000c7a000)=0x100004, 0x10000) request_key(&(0x7f0000000240)='rxrpc_s\x00', &(0x7f0000000280)={0x73, 0x79, 0x7a}, &(0x7f00000002c0)='/dev/net/tun\x00', 0xffffffffffffffff) syz_open_dev$tun(&(0x7f00000001c0)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000000)={'bridge0\x00'}) [ 110.101277] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 110.122261] FAT-fs (loop7): Directory bread(block 112) failed 2033/05/18 03:33:35 executing program 6: perf_event_open(&(0x7f0000000040)={0x1, 0x443, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x20100, &(0x7f00000000c0), &(0x7f0000000200), &(0x7f0000000140), &(0x7f0000000240)) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f00000004c0)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000500)={{{@in6=@local, @in=@dev}}, {{@in6=@mcast2}, 0x0, @in6}}, &(0x7f0000000600)=0xe8) geteuid() ioctl$sock_SIOCGPGRP(0xffffffffffffff9c, 0x8904, &(0x7f0000000780)) ioctl$TIOCGSID(0xffffffffffffff9c, 0x5429, &(0x7f0000000940)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000a40), &(0x7f0000000a80)=0xc) getpid() getpgrp(0x0) getresuid(&(0x7f0000000b80), &(0x7f0000000bc0), &(0x7f0000000c00)) getresgid(&(0x7f0000000c40), &(0x7f0000000c80), &(0x7f0000000cc0)) 2033/05/18 03:33:35 executing program 6: perf_event_open(&(0x7f0000000040)={0x1, 0x443, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x20100, &(0x7f00000000c0), &(0x7f0000000200), &(0x7f0000000140), &(0x7f0000000240)) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f00000004c0)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000500)={{{@in6=@local, @in=@dev}}, {{@in6=@mcast2}, 0x0, @in6}}, &(0x7f0000000600)=0xe8) geteuid() ioctl$sock_SIOCGPGRP(0xffffffffffffff9c, 0x8904, &(0x7f0000000780)) ioctl$TIOCGSID(0xffffffffffffff9c, 0x5429, &(0x7f0000000940)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000a40), &(0x7f0000000a80)=0xc) getpid() getpgrp(0x0) getresuid(&(0x7f0000000b80), &(0x7f0000000bc0), &(0x7f0000000c00)) getresgid(&(0x7f0000000c40), &(0x7f0000000c80), &(0x7f0000000cc0)) 2033/05/18 03:33:35 executing program 3: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000038000/0x2000)=nil, 0x2000, 0x1fffffc, 0x10, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000440)='status\x00') sendfile(r0, r0, &(0x7f0000c7a000)=0x100004, 0x10000) request_key(&(0x7f0000000240)='rxrpc_s\x00', &(0x7f0000000280)={0x73, 0x79, 0x7a}, &(0x7f00000002c0)='/dev/net/tun\x00', 0xffffffffffffffff) syz_open_dev$tun(&(0x7f00000001c0)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000000)={'bridge0\x00'}) [ 110.237323] FAT-fs (loop7): Directory bread(block 112) failed [ 110.249402] FAT-fs (loop7): Directory bread(block 112) failed 2033/05/18 03:33:35 executing program 6: perf_event_open(&(0x7f0000000040)={0x1, 0x443, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x20100, &(0x7f00000000c0), &(0x7f0000000200), &(0x7f0000000140), &(0x7f0000000240)) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f00000004c0)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000500)={{{@in6=@local, @in=@dev}}, {{@in6=@mcast2}, 0x0, @in6}}, &(0x7f0000000600)=0xe8) geteuid() ioctl$sock_SIOCGPGRP(0xffffffffffffff9c, 0x8904, &(0x7f0000000780)) ioctl$TIOCGSID(0xffffffffffffff9c, 0x5429, &(0x7f0000000940)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000a40), &(0x7f0000000a80)=0xc) getpid() getpgrp(0x0) getresuid(&(0x7f0000000b80), &(0x7f0000000bc0), &(0x7f0000000c00)) getresgid(&(0x7f0000000c40), &(0x7f0000000c80), &(0x7f0000000cc0)) 2033/05/18 03:33:35 executing program 6: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = epoll_create1(0x0) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, &(0x7f0000000080)) connect$unix(r0, &(0x7f00000000c0)=@file={0x0, './file0\x00'}, 0x6e) 2033/05/18 03:33:35 executing program 6: r0 = socket$inet6(0xa, 0x40000000000001, 0x0) setsockopt$inet6_opts(r0, 0x29, 0x39, &(0x7f0000dfa000)=@routing={0x0, 0x2, 0x2, 0x0, 0x0, [@mcast2={0xff, 0x2, [], 0x1}]}, 0x18) 2033/05/18 03:33:35 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f000012afe4)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, 0x0) tgkill(0x0, 0x0, 0x0) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) getsockopt$inet_sctp6_SCTP_INITMSG(0xffffffffffffffff, 0x84, 0x2, &(0x7f0000000340), &(0x7f0000000400)=0x8) sendto$inet6(r0, &(0x7f0000eb9fff), 0xffffff31, 0x20000003, &(0x7f000031e000)={0xa, 0x4e22}, 0x1c) 2033/05/18 03:33:35 executing program 3: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000038000/0x2000)=nil, 0x2000, 0x1fffffc, 0x10, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000440)='status\x00') sendfile(r0, r0, &(0x7f0000c7a000)=0x100004, 0x10000) request_key(&(0x7f0000000240)='rxrpc_s\x00', &(0x7f0000000280)={0x73, 0x79, 0x7a}, &(0x7f00000002c0)='/dev/net/tun\x00', 0xffffffffffffffff) syz_open_dev$tun(&(0x7f00000001c0)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000000)={'bridge0\x00'}) 2033/05/18 03:33:35 executing program 7: syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f0000000100)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000010000)="eb3c906d6b66732e66617400020401000200077008f8", 0x16}], 0x0, &(0x7f0000000240)=ANY=[]) open(&(0x7f0000000400)='./file0/file0\x00', 0x3fffa, 0x0) r0 = open(&(0x7f00000003c0)='./file0/file0\x00', 0x4001, 0x0) fallocate(r0, 0x0, 0x0, 0x1fffff) creat(&(0x7f00000001c0)='./file0/file0\x00', 0x0) 2033/05/18 03:33:35 executing program 2: open(&(0x7f0000000040)='./bus\x00', 0x141042, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvfrom$inet(0xffffffffffffffff, &(0x7f0000000780)=""/250, 0xfa, 0x0, &(0x7f0000000480)={0x2, 0x0, @loopback=0x7f000001}, 0x10) r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000001a40), 0x0) r1 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) fallocate(r1, 0x1, 0x0, 0x10000101) 2033/05/18 03:33:35 executing program 0: syz_open_procfs(0x0, &(0x7f0000000080)="76cda2d775b2bccab4a9361c38d504ecd0000000000000000000000000") perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = creat(&(0x7f0000000700)='./bus\x00', 0x0) r1 = open(&(0x7f0000000000)='./bus\x00', 0x26302, 0x0) ftruncate(r1, 0x80000) sendfile(r0, r1, &(0x7f0000d83ff8), 0x8000fffffffe) creat(&(0x7f00000000c0)='./bus\x00', 0x0) 2033/05/18 03:33:35 executing program 4: syz_open_procfs(0x0, &(0x7f0000000080)="76cda2d775b2bccab4a9361c38d504ecd0000000000000000000000000") perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = creat(&(0x7f0000000700)='./bus\x00', 0x0) r1 = open(&(0x7f0000000000)='./bus\x00', 0x26302, 0x0) ftruncate(r1, 0x80000) sendfile(r0, r1, &(0x7f0000d83ff8), 0x8000fffffffe) creat(&(0x7f00000000c0)='./bus\x00', 0x0) 2033/05/18 03:33:35 executing program 1: open(&(0x7f0000000040)='./bus\x00', 0x141042, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvfrom$inet(0xffffffffffffffff, &(0x7f0000000780)=""/250, 0xfa, 0x0, &(0x7f0000000480)={0x2, 0x0, @loopback=0x7f000001}, 0x10) r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000001a40), 0x0) r1 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) fallocate(r1, 0x1, 0x0, 0x10000101) 2033/05/18 03:33:35 executing program 6: r0 = socket$inet6(0xa, 0x40000000000001, 0x0) setsockopt$inet6_opts(r0, 0x29, 0x39, &(0x7f0000dfa000)=@routing={0x0, 0x2, 0x2, 0x0, 0x0, [@mcast2={0xff, 0x2, [], 0x1}]}, 0x18) [ 110.772726] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 110.801180] FAT-fs (loop7): Directory bread(block 112) failed 2033/05/18 03:33:36 executing program 6: r0 = socket$inet6(0xa, 0x40000000000001, 0x0) setsockopt$inet6_opts(r0, 0x29, 0x39, &(0x7f0000dfa000)=@routing={0x0, 0x2, 0x2, 0x0, 0x0, [@mcast2={0xff, 0x2, [], 0x1}]}, 0x18) 2033/05/18 03:33:36 executing program 6: r0 = socket$inet6(0xa, 0x40000000000001, 0x0) setsockopt$inet6_opts(r0, 0x29, 0x39, &(0x7f0000dfa000)=@routing={0x0, 0x2, 0x2, 0x0, 0x0, [@mcast2={0xff, 0x2, [], 0x1}]}, 0x18) [ 110.889061] FAT-fs (loop7): Directory bread(block 112) failed [ 110.899294] FAT-fs (loop7): Directory bread(block 112) failed 2033/05/18 03:33:36 executing program 6: r0 = openat$sequencer2(0xffffffffffffff9c, &(0x7f00001c1000)='/dev/sequencer2\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_SUBSCRIPTION(r0, 0x40085112, &(0x7f0000000000)={{0x80000000000ff, 0x8000a}, {}, 0xfffffffffffffffe}) 2033/05/18 03:33:36 executing program 3: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000038000/0x2000)=nil, 0x2000, 0x1fffffc, 0x10, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000440)='status\x00') sendfile(r0, r0, &(0x7f0000c7a000)=0x100004, 0x10000) request_key(&(0x7f0000000240)='rxrpc_s\x00', &(0x7f0000000280)={0x73, 0x79, 0x7a}, &(0x7f00000002c0)='/dev/net/tun\x00', 0xffffffffffffffff) syz_open_dev$tun(&(0x7f00000001c0)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000000)={'bridge0\x00'}) 2033/05/18 03:33:36 executing program 6: r0 = openat$sequencer2(0xffffffffffffff9c, &(0x7f00001c1000)='/dev/sequencer2\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_SUBSCRIPTION(r0, 0x40085112, &(0x7f0000000000)={{0x80000000000ff, 0x8000a}, {}, 0xfffffffffffffffe}) 2033/05/18 03:33:36 executing program 6: r0 = openat$sequencer2(0xffffffffffffff9c, &(0x7f00001c1000)='/dev/sequencer2\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_SUBSCRIPTION(r0, 0x40085112, &(0x7f0000000000)={{0x80000000000ff, 0x8000a}, {}, 0xfffffffffffffffe}) 2033/05/18 03:33:36 executing program 1: open(&(0x7f0000000040)='./bus\x00', 0x141042, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvfrom$inet(0xffffffffffffffff, &(0x7f0000000780)=""/250, 0xfa, 0x0, &(0x7f0000000480)={0x2, 0x0, @loopback=0x7f000001}, 0x10) r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000001a40), 0x0) r1 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) fallocate(r1, 0x1, 0x0, 0x10000101) 2033/05/18 03:33:36 executing program 6: r0 = openat$sequencer2(0xffffffffffffff9c, &(0x7f00001c1000)='/dev/sequencer2\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_SUBSCRIPTION(r0, 0x40085112, &(0x7f0000000000)={{0x80000000000ff, 0x8000a}, {}, 0xfffffffffffffffe}) 2033/05/18 03:33:36 executing program 6: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000040)) ioctl$TIOCPKT(r0, 0x5420, &(0x7f00000000c0)=0x213d) r1 = syz_open_pts(r0, 0x0) ioctl$TCSETS(r0, 0x5402, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffeffff}) ioctl$TIOCGLCKTRMIOS(r1, 0x5412, &(0x7f0000000000)={0xffffffff}) 2033/05/18 03:33:36 executing program 2: open(&(0x7f0000000040)='./bus\x00', 0x141042, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvfrom$inet(0xffffffffffffffff, &(0x7f0000000780)=""/250, 0xfa, 0x0, &(0x7f0000000480)={0x2, 0x0, @loopback=0x7f000001}, 0x10) r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000001a40), 0x0) r1 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) fallocate(r1, 0x1, 0x0, 0x10000101) 2033/05/18 03:33:36 executing program 7: syz_open_dev$sndseq(&(0x7f0000000140)='/dev/snd/seq\x00', 0x0, 0x0) syz_fuse_mount(&(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) unshare(0x8000400) socket$inet_tcp(0x2, 0x1, 0x0) pselect6(0x40, &(0x7f00000abfc0)={0x3ffffd}, &(0x7f0000768000), &(0x7f00007fbfc0), &(0x7f0000f22000)={0x0, 0x989680}, &(0x7f0000f14000)={&(0x7f0000553ff8), 0x8}) 2033/05/18 03:33:36 executing program 3: r0 = syz_open_procfs(0x0, &(0x7f00002dfff8)='pagemap\x00') preadv(r0, &(0x7f0000b24fb0)=[{&(0x7f00006b2000)=""/8, 0x8}, {&(0x7f0000830000)=""/4096, 0x1000}], 0x2, 0x80000000) 2033/05/18 03:33:36 executing program 1: open(&(0x7f0000000040)='./bus\x00', 0x141042, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvfrom$inet(0xffffffffffffffff, &(0x7f0000000780)=""/250, 0xfa, 0x0, &(0x7f0000000480)={0x2, 0x0, @loopback=0x7f000001}, 0x10) r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000001a40), 0x0) r1 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) fallocate(r1, 0x1, 0x0, 0x10000101) 2033/05/18 03:33:36 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f00006d3fc8)={&(0x7f00001e4ff4)={0x10}, 0xc, &(0x7f0000e03ff0)={&(0x7f00000002c0)={0x20, 0x13, 0x311, 0x0, 0x0, {0x11}, [@nested={0xc, 0x5f, [@typed={0x8, 0x0, @fd}]}]}, 0x20}, 0x1}, 0x0) 2033/05/18 03:33:36 executing program 6: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000040)) ioctl$TIOCPKT(r0, 0x5420, &(0x7f00000000c0)=0x213d) r1 = syz_open_pts(r0, 0x0) ioctl$TCSETS(r0, 0x5402, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffeffff}) ioctl$TIOCGLCKTRMIOS(r1, 0x5412, &(0x7f0000000000)={0xffffffff}) 2033/05/18 03:33:36 executing program 7: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) connect$inet6(0xffffffffffffffff, &(0x7f0000d3cfe4)={0xa, 0x0, 0x0, @mcast2={0xff, 0x2, [], 0x1}, 0x3}, 0x1c) connect$inet(0xffffffffffffffff, &(0x7f0000000040)={0x2, 0x0, @multicast1=0xe0000001}, 0x10) sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000080), 0xfffb) r0 = socket$packet(0x11, 0x2, 0x300) r1 = syz_open_dev$tun(&(0x7f00000001c0)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000000)={'bridge0\x00', 0xfffffffffffffffd}) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f00000000c0)={'bridge0\x00', 0x22001}) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000140)={'bridge0\x00\x00 \x00\v\x00'}) close(r1) 2033/05/18 03:33:36 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000b97000)={0x2, &(0x7f000048fff0)=[{}, {0x6}]}, 0x10) getsockopt$sock_buf(r0, 0x1, 0x1a, &(0x7f0000baf000)=""/1, &(0x7f0000561ffc)=0x1) 2033/05/18 03:33:36 executing program 2: open(&(0x7f0000000040)='./bus\x00', 0x141042, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvfrom$inet(0xffffffffffffffff, &(0x7f0000000780)=""/250, 0xfa, 0x0, &(0x7f0000000480)={0x2, 0x0, @loopback=0x7f000001}, 0x10) r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000001a40), 0x0) r1 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) fallocate(r1, 0x1, 0x0, 0x10000101) 2033/05/18 03:33:36 executing program 4: r0 = openat$hwrng(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/hwrng\x00', 0x80000000, 0x0) bind$netlink(r0, &(0x7f00000002c0)={0x10, 0x0, 0x25dfdbff, 0x100000}, 0xc) perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fcntl$setsig(r0, 0xa, 0x23) unshare(0x80000000) r1 = socket(0x0, 0xe, 0x1) sendto$ax25(0xffffffffffffffff, &(0x7f0000000140), 0x0, 0x0, &(0x7f0000000040)={0x3, {"65a21c61a839d6"}, 0x6}, 0x10) getpid() add_key$keyring(&(0x7f0000000180)='keyring\x00', &(0x7f0000000280)={0x73, 0x79, 0x7a, 0x2}, 0x0, 0x0, 0x0) add_key(&(0x7f0000000200)='encrypted\x00', &(0x7f0000000240)={0x73, 0x79, 0x7a, 0x1}, 0x0, 0x0, 0xfffffffffffffffe) ioctl$DRM_IOCTL_ADD_CTX(r0, 0xc0086420, &(0x7f0000000480)) getpeername(r0, &(0x7f00000004c0)=@nfc_llcp, &(0x7f0000000540)=0x80) getsockopt$inet_sctp6_SCTP_PR_ASSOC_STATUS(r0, 0x84, 0x73, &(0x7f0000000380)={0x0, 0x1dc, 0x30, 0xffffffff, 0x3}, &(0x7f00000003c0)=0x18) getsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER_VALUE(r1, 0x84, 0x7c, &(0x7f0000000400)={r2, 0x0, 0xfff}, &(0x7f0000000440)=0x8) r3 = syz_open_procfs(0x0, &(0x7f0000000140)="2f65786500000000000409004bddd9de91be10eebf000ee9a90f798058439ed554fa07424adee901d2da75af1f0200f5ab26d7a071fb35331ce39c5a") ioctl$DRM_IOCTL_RES_CTX(r3, 0x40086607, &(0x7f0000000080)={0x0, &(0x7f00000000c0)}) 2033/05/18 03:33:36 executing program 5: r0 = socket$inet6(0xa, 0x1001000000080001, 0x0) mmap(&(0x7f000000e000/0x4000)=nil, 0x4000, 0x0, 0x10, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$random(&(0x7f0000000040)='/dev/random\x00', 0x0, 0x0) preadv(r1, &(0x7f0000450000)=[{&(0x7f0000000080)=""/175, 0x376}], 0x1, 0x0) timer_create(0x0, &(0x7f0000580000)={0x0, 0x12, 0x0, @thr={&(0x7f0000f44000), &(0x7f0000ff5fd2)}}, &(0x7f0000000000)) timer_settime(0x0, 0x0, &(0x7f0000000240)={{0x0, 0x8}, {0x0, 0x9}}, &(0x7f0000040000)) r2 = getpgid(0x0) mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x1000009, 0x32, 0xffffffffffffffff, 0x0) tkill(r2, 0x1000000000016) getsockopt$inet6_buf(r0, 0x29, 0x41, &(0x7f000000e000)=""/84, &(0x7f0000000000)=0x54) 2033/05/18 03:33:36 executing program 3: r0 = open(&(0x7f0000000000)='./bus\x00', 0x100000141042, 0x0) fallocate(r0, 0x0, 0x4b99, 0x5) r1 = open(&(0x7f0000002000)='./bus\x00', 0x0, 0x0) preadv(r0, &(0x7f0000001a80)=[{&(0x7f0000001980)=""/160, 0xa0}], 0x1, 0x0) fallocate(r0, 0x1, 0x0, 0x4000003) lseek(r1, 0x0, 0x4) 2033/05/18 03:33:36 executing program 6: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000040)) ioctl$TIOCPKT(r0, 0x5420, &(0x7f00000000c0)=0x213d) r1 = syz_open_pts(r0, 0x0) ioctl$TCSETS(r0, 0x5402, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffeffff}) ioctl$TIOCGLCKTRMIOS(r1, 0x5412, &(0x7f0000000000)={0xffffffff}) 2033/05/18 03:33:36 executing program 0: r0 = socket$inet6(0xa, 0x1, 0x0) mmap(&(0x7f0000000000/0xb3c000)=nil, 0xb3c000, 0x1, 0x32, 0xffffffffffffffff, 0x0) getsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f00004c3000), &(0x7f0000b3cffc)=0x20) 2033/05/18 03:33:37 executing program 0: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x3, 0x8) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000940)={'dummy0\x00'}) r1 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rtc0\x00', 0x101000, 0x0) accept4$packet(r1, &(0x7f0000000e40)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @link_local}, &(0x7f0000000e80)=0x14, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f00000044c0)={{{@in=@multicast2, @in6=@local}}, {{@in=@local}, 0x0, @in6=@remote}}, &(0x7f00000045c0)=0xe8) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000004880)={{{@in=@remote, @in=@multicast1}}, {{@in=@dev}, 0x0, @in=@multicast1}}, &(0x7f0000004980)=0xe8) connect$inet6(r0, &(0x7f0000000100)={0xa, 0x0, 0x0, @loopback={0x0, 0x1}}, 0x1c) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000300)={{{@in=@dev={0xac, 0x14, 0x14}, @in6=@ipv4={[], [0xff, 0xff], @local={0xac, 0x14, 0x14, 0xaa}}, 0x0, 0x0, 0x0, 0x807, 0xa, 0x0, 0x80}, {0x0, 0x0, 0xfffffffffffffffd}, {0x0, 0xb80b}, 0x0, 0x0, 0x1, 0x1, 0x1}, {{@in6=@mcast1={0xff, 0x1, [], 0x1}, 0x4d5, 0x33}, 0x2, @in6=@ipv4={[], [0xff, 0xff], @remote={0xac, 0x14, 0x14, 0xbb}}}}, 0xe8) syz_mount_image$cifs(&(0x7f0000000180)='cifs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x4, &(0x7f00000009c0)=[{&(0x7f0000000200)}, {&(0x7f00000004c0)}, {&(0x7f0000000680)="5a2d715a7b73e9", 0x7, 0x10000}, {&(0x7f0000000ec0)}], 0x0, &(0x7f0000000ac0)='ipddp0\x00') sendmmsg(r0, &(0x7f0000007e00), 0x5de253fd8eb2f1, 0x800000000007ffe) 2033/05/18 03:33:37 executing program 6: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000040)) ioctl$TIOCPKT(r0, 0x5420, &(0x7f00000000c0)=0x213d) r1 = syz_open_pts(r0, 0x0) ioctl$TCSETS(r0, 0x5402, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffeffff}) ioctl$TIOCGLCKTRMIOS(r1, 0x5412, &(0x7f0000000000)={0xffffffff}) 2033/05/18 03:33:37 executing program 3: socketpair$inet6_sctp(0xa, 0x1, 0x84, &(0x7f0000000000)={0xffffffffffffffff}) ioctl$sock_netdev_private(r0, 0x89f9, &(0x7f0000000100)) openat$sequencer(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/sequencer\x00', 0x200, 0x0) setsockopt$packet_fanout(0xffffffffffffffff, 0x107, 0x12, &(0x7f00004da000)={0x1}, 0xb4) r1 = perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$sg(&(0x7f0000000480)='/dev/sg#\x00', 0x1, 0x121000) openat$sequencer(0xffffffffffffff9c, &(0x7f0000000500)='/dev/sequencer\x00', 0x8000, 0x0) recvfrom(0xffffffffffffffff, &(0x7f0000000140)=""/166, 0xa6, 0x2000, &(0x7f0000000200)=@l2={0x1f, 0xfffffffffffffff8, {0x9, 0x7, 0x9}, 0x1}, 0x80) r2 = syz_open_dev$loop(&(0x7f0000ca9ff5)='/dev/loop#\x00', 0x0, 0x82) r3 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000140)='/dev/hwrng\x00', 0x20000, 0x0) clock_gettime(0x0, &(0x7f0000000180)) r4 = memfd_create(&(0x7f00000000c0)="74086e750000000000000000008c00", 0x0) pwritev(r4, &(0x7f0000f50f90)=[{&(0x7f0000000040)="aa", 0x1}], 0x1, 0x81006) ioctl$LOOP_CHANGE_FD(r2, 0x4c00, r4) ioctl$sock_netrom_SIOCADDRT(r4, 0x890b, &(0x7f0000000340)) sendfile(r2, r2, &(0x7f0000000080), 0x102000004) sync() syz_open_dev$sg(&(0x7f0000000040)='/dev/sg#\x00', 0x0, 0x0) setsockopt$l2tp_PPPOL2TP_SO_RECVSEQ(0xffffffffffffffff, 0x111, 0x2, 0x0, 0x4) fcntl$getownex(r3, 0x10, &(0x7f0000000580)) getresgid(&(0x7f0000000280), &(0x7f00000002c0), &(0x7f0000000380)) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000400)) r5 = open(&(0x7f000000fffa)='./bus\x00', 0x141042, 0x0) fallocate(r5, 0x0, 0xffff, 0x4) lseek(r1, 0x0, 0xffffffffffffffff) open(&(0x7f0000002000)='./bus\x00', 0x4002, 0x0) sendfile(r5, 0xffffffffffffffff, &(0x7f0000000000), 0x1000000000000) 2033/05/18 03:33:37 executing program 4: r0 = openat$hwrng(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/hwrng\x00', 0x80000000, 0x0) bind$netlink(r0, &(0x7f00000002c0)={0x10, 0x0, 0x25dfdbff, 0x100000}, 0xc) perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fcntl$setsig(r0, 0xa, 0x23) unshare(0x80000000) r1 = socket(0x0, 0xe, 0x1) sendto$ax25(0xffffffffffffffff, &(0x7f0000000140), 0x0, 0x0, &(0x7f0000000040)={0x3, {"65a21c61a839d6"}, 0x6}, 0x10) getpid() add_key$keyring(&(0x7f0000000180)='keyring\x00', &(0x7f0000000280)={0x73, 0x79, 0x7a, 0x2}, 0x0, 0x0, 0x0) add_key(&(0x7f0000000200)='encrypted\x00', &(0x7f0000000240)={0x73, 0x79, 0x7a, 0x1}, 0x0, 0x0, 0xfffffffffffffffe) ioctl$DRM_IOCTL_ADD_CTX(r0, 0xc0086420, &(0x7f0000000480)) getpeername(r0, &(0x7f00000004c0)=@nfc_llcp, &(0x7f0000000540)=0x80) getsockopt$inet_sctp6_SCTP_PR_ASSOC_STATUS(r0, 0x84, 0x73, &(0x7f0000000380)={0x0, 0x1dc, 0x30, 0xffffffff, 0x3}, &(0x7f00000003c0)=0x18) getsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER_VALUE(r1, 0x84, 0x7c, &(0x7f0000000400)={r2, 0x0, 0xfff}, &(0x7f0000000440)=0x8) r3 = syz_open_procfs(0x0, &(0x7f0000000140)="2f65786500000000000409004bddd9de91be10eebf000ee9a90f798058439ed554fa07424adee901d2da75af1f0200f5ab26d7a071fb35331ce39c5a") ioctl$DRM_IOCTL_RES_CTX(r3, 0x40086607, &(0x7f0000000080)={0x0, &(0x7f00000000c0)}) 2033/05/18 03:33:37 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f0000252000)='map_files\x00') unshare(0x40600) getdents(r0, &(0x7f0000000040), 0x931c4bc063f2bcfb) 2033/05/18 03:33:37 executing program 2: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000001000)={0x0, {{0xa}}, {{0xa, 0x0, 0x0, @dev={0xfe, 0x80}}}}, 0x108) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='oom_score_adj\x00') preadv(r0, &(0x7f0000000100), 0x2d9, 0x10400003) 2033/05/18 03:33:37 executing program 5: r0 = openat$selinux_status(0xffffffffffffff9c, &(0x7f00000003c0)='/selinux/status\x00', 0x0, 0x0) read(r0, &(0x7f00000004c0)=""/226, 0xe2) socket$inet_tcp(0x2, 0x1, 0x0) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40000000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(0xffffffffffffffff, 0x84, 0x18, &(0x7f00000000c0)={0x0}, &(0x7f0000000100)=0x8) r3 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000180)='/dev/loop-control\x00', 0x20200, 0x0) r4 = ioctl$LOOP_CTL_GET_FREE(r3, 0x4c82) ioctl$LOOP_CTL_ADD(r3, 0x4c80, 0x0) tgkill(0x0, 0x0, 0x0) socketpair$inet_dccp(0x2, 0x6, 0x0, &(0x7f0000000140)) eventfd2(0x0, 0x1) fallocate(r1, 0x2, 0x2, 0x92d) openat$selinux_status(0xffffffffffffff9c, &(0x7f0000000380)='/selinux/status\x00', 0x0, 0x0) socket$inet_dccp(0x2, 0x6, 0x0) r5 = ioctl$LOOP_CTL_GET_FREE(r3, 0x4c82) ioctl$LOOP_CTL_REMOVE(r3, 0x4c81, r4) r6 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$fou(&(0x7f0000000100)='fou\x00') setsockopt$inet_dccp_buf(r6, 0x21, 0xcf, &(0x7f0000000400)="216414623db1482aed5a1c02962db7ecc2df6ef60641ebf5bc86523c71f42bd2eb669e285da694abc1a9af9a59cebd4e549bbb53731e41aee40836316acff742258dc2a68c469f79318d451670e9f4a7510c4d077dfcdce3022cf6f3eed663122a98e4757170770a247e442925bcc4c2b62699dd617f5faacf47e7259fccc481e3c8eae855adc09e2e5524c7e8b92ee889592b86722a1455ad5089a0", 0x9c) getsockopt$inet6_mreq(0xffffffffffffff9c, 0x29, 0x0, &(0x7f0000003480)={@dev}, &(0x7f00000034c0)=0x14) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f00000035c0)={0x0, @dev, @remote}, &(0x7f0000003600)=0xc) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000003740)={{{@in=@local, @in=@rand_addr}}, {{@in=@loopback}, 0x0, @in6=@mcast2}}, &(0x7f0000003840)=0xe8) ioctl$LOOP_CTL_REMOVE(r3, 0x4c81, r5) r7 = openat$selinux_status(0xffffffffffffff9c, &(0x7f00000002c0)='/selinux/status\x00', 0x0, 0x0) ioctl$EVIOCSFF(r7, 0x40304580, &(0x7f0000000300)=ANY=[@ANYBLOB="54000004020007e58d00cb26901f0000000007000008810000080000020078b25e02000091970600"]) getsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(0xffffffffffffffff, 0x84, 0x6, &(0x7f00000001c0)={r2, @in={{0x2, 0x4e23, @multicast1=0xe0000001}}}, &(0x7f0000000280)=0x84) ioctl$PIO_UNIMAP(0xffffffffffffffff, 0x4b67, &(0x7f0000000340)={0x4073, &(0x7f00000004c0)}) 2033/05/18 03:33:37 executing program 7: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$inet_opts(r0, 0x0, 0x4, &(0x7f00002b8ff6), 0x0) connect$inet(r0, &(0x7f0000000080)={0x2, 0x0, @remote={0xac, 0x14, 0x14, 0xbb}}, 0x10) r1 = memfd_create(&(0x7f00000006c0)="237d00d3fc1ee4671fbaa0a4c6dfb7128b8e96f7fd829d4d39f1828ebf764f5077c32cf6d22b4c4f8d000000000000000000cbc045a996411e646083b96f3e8c6eea18f7b2e2e0974e113319b3fe14b8014b3897318bcffadcc45549ad003dd8e55b1e535a5884ea779cc2f5b4e661bd27ae6412a713a1c8e31b5b827fb084a333e3a520822842a0c2d797f2dd7b9d082fcb3f14e7d2eaf9f667019a07dcb67c443a64f4e0e445aebd6b1f5baed9a6d6", 0x0) ftruncate(r1, 0x40001) sendfile(r0, r1, &(0x7f000000a000), 0x7ffff) 2033/05/18 03:33:37 executing program 6: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x20000, 0x0) get_thread_area(&(0x7f0000000140)={0x9, 0x0, 0x0, 0x81, 0x5, 0x1f, 0x0, 0x3, 0x6, 0x3d}) setsockopt(r0, 0x0, 0x0, &(0x7f0000000080), 0x0) r1 = openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000000200)='/selinux/mls\x00', 0x0, 0x0) r2 = socket(0x11, 0x2, 0x0) setsockopt(r2, 0x107, 0x1, &(0x7f0000dfaff0)="010000000300060000071a00009139cc", 0x10) openat$keychord(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/keychord\x00', 0x101001, 0x0) dup3(r1, r2, 0x0) 2033/05/18 03:33:37 executing program 7: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000000)='/dev/uinput\x00', 0x0, 0x0) ioctl$SG_GET_SG_TABLESIZE(r0, 0x4004556a, &(0x7f0000000080)) 2033/05/18 03:33:37 executing program 1: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40000000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$netrom_NETROM_IDLE(0xffffffffffffffff, 0x103, 0x7, &(0x7f00000005c0)=0xffff, 0x4) getsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(0xffffffffffffffff, 0x84, 0x18, &(0x7f00000000c0), &(0x7f0000000100)=0x3cb) r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000180)='/dev/loop-control\x00', 0x20200, 0x0) prctl$getname(0x10, &(0x7f00000024c0)=""/144) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) getsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x0, &(0x7f00000001c0), &(0x7f0000000200)=0x4) preadv(r0, &(0x7f0000000280)=[{&(0x7f00000004c0)=""/249, 0xf9}], 0x1, 0x0) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x100000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="8000000000040000ae000000d90300006c000000010000000000000000000000002000000020000080000000000000002b5ebe5a0000ffff53ef", 0x3a, 0x400}, {&(0x7f0000010d00)="ed410000000400002b5ebe5a2b5ebe5a2b5ebe5a000000000000050002000000000000000000000015", 0x29, 0x1480}], 0x0, &(0x7f0000012900)) 2033/05/18 03:33:37 executing program 2: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000001000)={0x0, {{0xa}}, {{0xa, 0x0, 0x0, @dev={0xfe, 0x80}}}}, 0x108) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='oom_score_adj\x00') preadv(r0, &(0x7f0000000100), 0x2d9, 0x10400003) [ 112.638434] device lo entered promiscuous mode 2033/05/18 03:33:37 executing program 7: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000000)='/dev/uinput\x00', 0x0, 0x0) ioctl$SG_GET_SG_TABLESIZE(r0, 0x4004556a, &(0x7f0000000080)) [ 112.672742] device lo left promiscuous mode 2033/05/18 03:33:37 executing program 7: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000000)='/dev/uinput\x00', 0x0, 0x0) ioctl$SG_GET_SG_TABLESIZE(r0, 0x4004556a, &(0x7f0000000080)) [ 112.734789] device lo entered promiscuous mode 2033/05/18 03:33:37 executing program 7: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000000)='/dev/uinput\x00', 0x0, 0x0) ioctl$SG_GET_SG_TABLESIZE(r0, 0x4004556a, &(0x7f0000000080)) 2033/05/18 03:33:37 executing program 4: r0 = openat$hwrng(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/hwrng\x00', 0x80000000, 0x0) bind$netlink(r0, &(0x7f00000002c0)={0x10, 0x0, 0x25dfdbff, 0x100000}, 0xc) perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fcntl$setsig(r0, 0xa, 0x23) unshare(0x80000000) r1 = socket(0x0, 0xe, 0x1) sendto$ax25(0xffffffffffffffff, &(0x7f0000000140), 0x0, 0x0, &(0x7f0000000040)={0x3, {"65a21c61a839d6"}, 0x6}, 0x10) getpid() add_key$keyring(&(0x7f0000000180)='keyring\x00', &(0x7f0000000280)={0x73, 0x79, 0x7a, 0x2}, 0x0, 0x0, 0x0) add_key(&(0x7f0000000200)='encrypted\x00', &(0x7f0000000240)={0x73, 0x79, 0x7a, 0x1}, 0x0, 0x0, 0xfffffffffffffffe) ioctl$DRM_IOCTL_ADD_CTX(r0, 0xc0086420, &(0x7f0000000480)) getpeername(r0, &(0x7f00000004c0)=@nfc_llcp, &(0x7f0000000540)=0x80) getsockopt$inet_sctp6_SCTP_PR_ASSOC_STATUS(r0, 0x84, 0x73, &(0x7f0000000380)={0x0, 0x1dc, 0x30, 0xffffffff, 0x3}, &(0x7f00000003c0)=0x18) getsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER_VALUE(r1, 0x84, 0x7c, &(0x7f0000000400)={r2, 0x0, 0xfff}, &(0x7f0000000440)=0x8) r3 = syz_open_procfs(0x0, &(0x7f0000000140)="2f65786500000000000409004bddd9de91be10eebf000ee9a90f798058439ed554fa07424adee901d2da75af1f0200f5ab26d7a071fb35331ce39c5a") ioctl$DRM_IOCTL_RES_CTX(r3, 0x40086607, &(0x7f0000000080)={0x0, &(0x7f00000000c0)}) [ 112.760965] EXT4-fs (loop1): ext4_check_descriptors: Block bitmap for group 0 not in group (block 0)! [ 112.769289] device lo left promiscuous mode [ 112.827053] EXT4-fs (loop1): group descriptors corrupted! 2033/05/18 03:33:38 executing program 4: r0 = openat$hwrng(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/hwrng\x00', 0x80000000, 0x0) bind$netlink(r0, &(0x7f00000002c0)={0x10, 0x0, 0x25dfdbff, 0x100000}, 0xc) perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fcntl$setsig(r0, 0xa, 0x23) unshare(0x80000000) r1 = socket(0x0, 0xe, 0x1) sendto$ax25(0xffffffffffffffff, &(0x7f0000000140), 0x0, 0x0, &(0x7f0000000040)={0x3, {"65a21c61a839d6"}, 0x6}, 0x10) getpid() add_key$keyring(&(0x7f0000000180)='keyring\x00', &(0x7f0000000280)={0x73, 0x79, 0x7a, 0x2}, 0x0, 0x0, 0x0) add_key(&(0x7f0000000200)='encrypted\x00', &(0x7f0000000240)={0x73, 0x79, 0x7a, 0x1}, 0x0, 0x0, 0xfffffffffffffffe) ioctl$DRM_IOCTL_ADD_CTX(r0, 0xc0086420, &(0x7f0000000480)) getpeername(r0, &(0x7f00000004c0)=@nfc_llcp, &(0x7f0000000540)=0x80) getsockopt$inet_sctp6_SCTP_PR_ASSOC_STATUS(r0, 0x84, 0x73, &(0x7f0000000380)={0x0, 0x1dc, 0x30, 0xffffffff, 0x3}, &(0x7f00000003c0)=0x18) getsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER_VALUE(r1, 0x84, 0x7c, &(0x7f0000000400)={r2, 0x0, 0xfff}, &(0x7f0000000440)=0x8) r3 = syz_open_procfs(0x0, &(0x7f0000000140)="2f65786500000000000409004bddd9de91be10eebf000ee9a90f798058439ed554fa07424adee901d2da75af1f0200f5ab26d7a071fb35331ce39c5a") ioctl$DRM_IOCTL_RES_CTX(r3, 0x40086607, &(0x7f0000000080)={0x0, &(0x7f00000000c0)}) 2033/05/18 03:33:38 executing program 1: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40000000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$netrom_NETROM_IDLE(0xffffffffffffffff, 0x103, 0x7, &(0x7f00000005c0)=0xffff, 0x4) getsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(0xffffffffffffffff, 0x84, 0x18, &(0x7f00000000c0), &(0x7f0000000100)=0x3cb) r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000180)='/dev/loop-control\x00', 0x20200, 0x0) prctl$getname(0x10, &(0x7f00000024c0)=""/144) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) getsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x0, &(0x7f00000001c0), &(0x7f0000000200)=0x4) preadv(r0, &(0x7f0000000280)=[{&(0x7f00000004c0)=""/249, 0xf9}], 0x1, 0x0) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x100000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="8000000000040000ae000000d90300006c000000010000000000000000000000002000000020000080000000000000002b5ebe5a0000ffff53ef", 0x3a, 0x400}, {&(0x7f0000010d00)="ed410000000400002b5ebe5a2b5ebe5a2b5ebe5a000000000000050002000000000000000000000015", 0x29, 0x1480}], 0x0, &(0x7f0000012900)) 2033/05/18 03:33:38 executing program 0: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x3, 0x8) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000940)={'dummy0\x00'}) r1 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rtc0\x00', 0x101000, 0x0) accept4$packet(r1, &(0x7f0000000e40)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @link_local}, &(0x7f0000000e80)=0x14, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f00000044c0)={{{@in=@multicast2, @in6=@local}}, {{@in=@local}, 0x0, @in6=@remote}}, &(0x7f00000045c0)=0xe8) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000004880)={{{@in=@remote, @in=@multicast1}}, {{@in=@dev}, 0x0, @in=@multicast1}}, &(0x7f0000004980)=0xe8) connect$inet6(r0, &(0x7f0000000100)={0xa, 0x0, 0x0, @loopback={0x0, 0x1}}, 0x1c) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000300)={{{@in=@dev={0xac, 0x14, 0x14}, @in6=@ipv4={[], [0xff, 0xff], @local={0xac, 0x14, 0x14, 0xaa}}, 0x0, 0x0, 0x0, 0x807, 0xa, 0x0, 0x80}, {0x0, 0x0, 0xfffffffffffffffd}, {0x0, 0xb80b}, 0x0, 0x0, 0x1, 0x1, 0x1}, {{@in6=@mcast1={0xff, 0x1, [], 0x1}, 0x4d5, 0x33}, 0x2, @in6=@ipv4={[], [0xff, 0xff], @remote={0xac, 0x14, 0x14, 0xbb}}}}, 0xe8) syz_mount_image$cifs(&(0x7f0000000180)='cifs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x4, &(0x7f00000009c0)=[{&(0x7f0000000200)}, {&(0x7f00000004c0)}, {&(0x7f0000000680)="5a2d715a7b73e9", 0x7, 0x10000}, {&(0x7f0000000ec0)}], 0x0, &(0x7f0000000ac0)='ipddp0\x00') sendmmsg(r0, &(0x7f0000007e00), 0x5de253fd8eb2f1, 0x800000000007ffe) 2033/05/18 03:33:38 executing program 3: socketpair$inet6_sctp(0xa, 0x1, 0x84, &(0x7f0000000000)={0xffffffffffffffff}) ioctl$sock_netdev_private(r0, 0x89f9, &(0x7f0000000100)) openat$sequencer(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/sequencer\x00', 0x200, 0x0) setsockopt$packet_fanout(0xffffffffffffffff, 0x107, 0x12, &(0x7f00004da000)={0x1}, 0xb4) r1 = perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$sg(&(0x7f0000000480)='/dev/sg#\x00', 0x1, 0x121000) openat$sequencer(0xffffffffffffff9c, &(0x7f0000000500)='/dev/sequencer\x00', 0x8000, 0x0) recvfrom(0xffffffffffffffff, &(0x7f0000000140)=""/166, 0xa6, 0x2000, &(0x7f0000000200)=@l2={0x1f, 0xfffffffffffffff8, {0x9, 0x7, 0x9}, 0x1}, 0x80) r2 = syz_open_dev$loop(&(0x7f0000ca9ff5)='/dev/loop#\x00', 0x0, 0x82) r3 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000140)='/dev/hwrng\x00', 0x20000, 0x0) clock_gettime(0x0, &(0x7f0000000180)) r4 = memfd_create(&(0x7f00000000c0)="74086e750000000000000000008c00", 0x0) pwritev(r4, &(0x7f0000f50f90)=[{&(0x7f0000000040)="aa", 0x1}], 0x1, 0x81006) ioctl$LOOP_CHANGE_FD(r2, 0x4c00, r4) ioctl$sock_netrom_SIOCADDRT(r4, 0x890b, &(0x7f0000000340)) sendfile(r2, r2, &(0x7f0000000080), 0x102000004) sync() syz_open_dev$sg(&(0x7f0000000040)='/dev/sg#\x00', 0x0, 0x0) setsockopt$l2tp_PPPOL2TP_SO_RECVSEQ(0xffffffffffffffff, 0x111, 0x2, 0x0, 0x4) fcntl$getownex(r3, 0x10, &(0x7f0000000580)) getresgid(&(0x7f0000000280), &(0x7f00000002c0), &(0x7f0000000380)) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000400)) r5 = open(&(0x7f000000fffa)='./bus\x00', 0x141042, 0x0) fallocate(r5, 0x0, 0xffff, 0x4) lseek(r1, 0x0, 0xffffffffffffffff) open(&(0x7f0000002000)='./bus\x00', 0x4002, 0x0) sendfile(r5, 0xffffffffffffffff, &(0x7f0000000000), 0x1000000000000) 2033/05/18 03:33:38 executing program 2: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000001000)={0x0, {{0xa}}, {{0xa, 0x0, 0x0, @dev={0xfe, 0x80}}}}, 0x108) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='oom_score_adj\x00') preadv(r0, &(0x7f0000000100), 0x2d9, 0x10400003) 2033/05/18 03:33:38 executing program 6: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x20000, 0x0) get_thread_area(&(0x7f0000000140)={0x9, 0x0, 0x0, 0x81, 0x5, 0x1f, 0x0, 0x3, 0x6, 0x3d}) setsockopt(r0, 0x0, 0x0, &(0x7f0000000080), 0x0) r1 = openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000000200)='/selinux/mls\x00', 0x0, 0x0) r2 = socket(0x11, 0x2, 0x0) setsockopt(r2, 0x107, 0x1, &(0x7f0000dfaff0)="010000000300060000071a00009139cc", 0x10) openat$keychord(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/keychord\x00', 0x101001, 0x0) dup3(r1, r2, 0x0) 2033/05/18 03:33:38 executing program 7: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000001000)={0x0, {{0xa}}, {{0xa, 0x0, 0x0, @dev={0xfe, 0x80}}}}, 0x108) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='oom_score_adj\x00') preadv(r0, &(0x7f0000000100), 0x2d9, 0x10400003) 2033/05/18 03:33:38 executing program 5: r0 = openat$selinux_status(0xffffffffffffff9c, &(0x7f00000003c0)='/selinux/status\x00', 0x0, 0x0) read(r0, &(0x7f00000004c0)=""/226, 0xe2) socket$inet_tcp(0x2, 0x1, 0x0) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40000000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(0xffffffffffffffff, 0x84, 0x18, &(0x7f00000000c0)={0x0}, &(0x7f0000000100)=0x8) r3 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000180)='/dev/loop-control\x00', 0x20200, 0x0) r4 = ioctl$LOOP_CTL_GET_FREE(r3, 0x4c82) ioctl$LOOP_CTL_ADD(r3, 0x4c80, 0x0) tgkill(0x0, 0x0, 0x0) socketpair$inet_dccp(0x2, 0x6, 0x0, &(0x7f0000000140)) eventfd2(0x0, 0x1) fallocate(r1, 0x2, 0x2, 0x92d) openat$selinux_status(0xffffffffffffff9c, &(0x7f0000000380)='/selinux/status\x00', 0x0, 0x0) socket$inet_dccp(0x2, 0x6, 0x0) r5 = ioctl$LOOP_CTL_GET_FREE(r3, 0x4c82) ioctl$LOOP_CTL_REMOVE(r3, 0x4c81, r4) r6 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$fou(&(0x7f0000000100)='fou\x00') setsockopt$inet_dccp_buf(r6, 0x21, 0xcf, &(0x7f0000000400)="216414623db1482aed5a1c02962db7ecc2df6ef60641ebf5bc86523c71f42bd2eb669e285da694abc1a9af9a59cebd4e549bbb53731e41aee40836316acff742258dc2a68c469f79318d451670e9f4a7510c4d077dfcdce3022cf6f3eed663122a98e4757170770a247e442925bcc4c2b62699dd617f5faacf47e7259fccc481e3c8eae855adc09e2e5524c7e8b92ee889592b86722a1455ad5089a0", 0x9c) getsockopt$inet6_mreq(0xffffffffffffff9c, 0x29, 0x0, &(0x7f0000003480)={@dev}, &(0x7f00000034c0)=0x14) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f00000035c0)={0x0, @dev, @remote}, &(0x7f0000003600)=0xc) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000003740)={{{@in=@local, @in=@rand_addr}}, {{@in=@loopback}, 0x0, @in6=@mcast2}}, &(0x7f0000003840)=0xe8) ioctl$LOOP_CTL_REMOVE(r3, 0x4c81, r5) r7 = openat$selinux_status(0xffffffffffffff9c, &(0x7f00000002c0)='/selinux/status\x00', 0x0, 0x0) ioctl$EVIOCSFF(r7, 0x40304580, &(0x7f0000000300)=ANY=[@ANYBLOB="54000004020007e58d00cb26901f0000000007000008810000080000020078b25e02000091970600"]) getsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(0xffffffffffffffff, 0x84, 0x6, &(0x7f00000001c0)={r2, @in={{0x2, 0x4e23, @multicast1=0xe0000001}}}, &(0x7f0000000280)=0x84) ioctl$PIO_UNIMAP(0xffffffffffffffff, 0x4b67, &(0x7f0000000340)={0x4073, &(0x7f00000004c0)}) 2033/05/18 03:33:38 executing program 7: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000001000)={0x0, {{0xa}}, {{0xa, 0x0, 0x0, @dev={0xfe, 0x80}}}}, 0x108) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='oom_score_adj\x00') preadv(r0, &(0x7f0000000100), 0x2d9, 0x10400003) 2033/05/18 03:33:38 executing program 4: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x3, 0x8) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000940)={'dummy0\x00'}) r1 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rtc0\x00', 0x101000, 0x0) accept4$packet(r1, &(0x7f0000000e40)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @link_local}, &(0x7f0000000e80)=0x14, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f00000044c0)={{{@in=@multicast2, @in6=@local}}, {{@in=@local}, 0x0, @in6=@remote}}, &(0x7f00000045c0)=0xe8) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000004880)={{{@in=@remote, @in=@multicast1}}, {{@in=@dev}, 0x0, @in=@multicast1}}, &(0x7f0000004980)=0xe8) connect$inet6(r0, &(0x7f0000000100)={0xa, 0x0, 0x0, @loopback={0x0, 0x1}}, 0x1c) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000300)={{{@in=@dev={0xac, 0x14, 0x14}, @in6=@ipv4={[], [0xff, 0xff], @local={0xac, 0x14, 0x14, 0xaa}}, 0x0, 0x0, 0x0, 0x807, 0xa, 0x0, 0x80}, {0x0, 0x0, 0xfffffffffffffffd}, {0x0, 0xb80b}, 0x0, 0x0, 0x1, 0x1, 0x1}, {{@in6=@mcast1={0xff, 0x1, [], 0x1}, 0x4d5, 0x33}, 0x2, @in6=@ipv4={[], [0xff, 0xff], @remote={0xac, 0x14, 0x14, 0xbb}}}}, 0xe8) syz_mount_image$cifs(&(0x7f0000000180)='cifs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x4, &(0x7f00000009c0)=[{&(0x7f0000000200)}, {&(0x7f00000004c0)}, {&(0x7f0000000680)="5a2d715a7b73e9", 0x7, 0x10000}, {&(0x7f0000000ec0)}], 0x0, &(0x7f0000000ac0)='ipddp0\x00') sendmmsg(r0, &(0x7f0000007e00), 0x5de253fd8eb2f1, 0x800000000007ffe) [ 113.097756] device lo entered promiscuous mode [ 113.107177] device lo left promiscuous mode 2033/05/18 03:33:38 executing program 6: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x20000, 0x0) get_thread_area(&(0x7f0000000140)={0x9, 0x0, 0x0, 0x81, 0x5, 0x1f, 0x0, 0x3, 0x6, 0x3d}) setsockopt(r0, 0x0, 0x0, &(0x7f0000000080), 0x0) r1 = openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000000200)='/selinux/mls\x00', 0x0, 0x0) r2 = socket(0x11, 0x2, 0x0) setsockopt(r2, 0x107, 0x1, &(0x7f0000dfaff0)="010000000300060000071a00009139cc", 0x10) openat$keychord(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/keychord\x00', 0x101001, 0x0) dup3(r1, r2, 0x0) 2033/05/18 03:33:38 executing program 2: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000001000)={0x0, {{0xa}}, {{0xa, 0x0, 0x0, @dev={0xfe, 0x80}}}}, 0x108) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='oom_score_adj\x00') preadv(r0, &(0x7f0000000100), 0x2d9, 0x10400003) 2033/05/18 03:33:38 executing program 2: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x3, 0x8) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000940)={'dummy0\x00'}) r1 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rtc0\x00', 0x101000, 0x0) accept4$packet(r1, &(0x7f0000000e40)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @link_local}, &(0x7f0000000e80)=0x14, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f00000044c0)={{{@in=@multicast2, @in6=@local}}, {{@in=@local}, 0x0, @in6=@remote}}, &(0x7f00000045c0)=0xe8) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000004880)={{{@in=@remote, @in=@multicast1}}, {{@in=@dev}, 0x0, @in=@multicast1}}, &(0x7f0000004980)=0xe8) connect$inet6(r0, &(0x7f0000000100)={0xa, 0x0, 0x0, @loopback={0x0, 0x1}}, 0x1c) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000300)={{{@in=@dev={0xac, 0x14, 0x14}, @in6=@ipv4={[], [0xff, 0xff], @local={0xac, 0x14, 0x14, 0xaa}}, 0x0, 0x0, 0x0, 0x807, 0xa, 0x0, 0x80}, {0x0, 0x0, 0xfffffffffffffffd}, {0x0, 0xb80b}, 0x0, 0x0, 0x1, 0x1, 0x1}, {{@in6=@mcast1={0xff, 0x1, [], 0x1}, 0x4d5, 0x33}, 0x2, @in6=@ipv4={[], [0xff, 0xff], @remote={0xac, 0x14, 0x14, 0xbb}}}}, 0xe8) syz_mount_image$cifs(&(0x7f0000000180)='cifs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x4, &(0x7f00000009c0)=[{&(0x7f0000000200)}, {&(0x7f00000004c0)}, {&(0x7f0000000680)="5a2d715a7b73e9", 0x7, 0x10000}, {&(0x7f0000000ec0)}], 0x0, &(0x7f0000000ac0)='ipddp0\x00') sendmmsg(r0, &(0x7f0000007e00), 0x5de253fd8eb2f1, 0x800000000007ffe) [ 113.245266] device lo entered promiscuous mode [ 113.265267] device lo left promiscuous mode 2033/05/18 03:33:38 executing program 6: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x20000, 0x0) get_thread_area(&(0x7f0000000140)={0x9, 0x0, 0x0, 0x81, 0x5, 0x1f, 0x0, 0x3, 0x6, 0x3d}) setsockopt(r0, 0x0, 0x0, &(0x7f0000000080), 0x0) r1 = openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000000200)='/selinux/mls\x00', 0x0, 0x0) r2 = socket(0x11, 0x2, 0x0) setsockopt(r2, 0x107, 0x1, &(0x7f0000dfaff0)="010000000300060000071a00009139cc", 0x10) openat$keychord(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/keychord\x00', 0x101001, 0x0) dup3(r1, r2, 0x0) 2033/05/18 03:33:38 executing program 7: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000001000)={0x0, {{0xa}}, {{0xa, 0x0, 0x0, @dev={0xfe, 0x80}}}}, 0x108) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='oom_score_adj\x00') preadv(r0, &(0x7f0000000100), 0x2d9, 0x10400003) 2033/05/18 03:33:38 executing program 3: socketpair$inet6_sctp(0xa, 0x1, 0x84, &(0x7f0000000000)={0xffffffffffffffff}) ioctl$sock_netdev_private(r0, 0x89f9, &(0x7f0000000100)) openat$sequencer(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/sequencer\x00', 0x200, 0x0) setsockopt$packet_fanout(0xffffffffffffffff, 0x107, 0x12, &(0x7f00004da000)={0x1}, 0xb4) r1 = perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$sg(&(0x7f0000000480)='/dev/sg#\x00', 0x1, 0x121000) openat$sequencer(0xffffffffffffff9c, &(0x7f0000000500)='/dev/sequencer\x00', 0x8000, 0x0) recvfrom(0xffffffffffffffff, &(0x7f0000000140)=""/166, 0xa6, 0x2000, &(0x7f0000000200)=@l2={0x1f, 0xfffffffffffffff8, {0x9, 0x7, 0x9}, 0x1}, 0x80) r2 = syz_open_dev$loop(&(0x7f0000ca9ff5)='/dev/loop#\x00', 0x0, 0x82) r3 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000140)='/dev/hwrng\x00', 0x20000, 0x0) clock_gettime(0x0, &(0x7f0000000180)) r4 = memfd_create(&(0x7f00000000c0)="74086e750000000000000000008c00", 0x0) pwritev(r4, &(0x7f0000f50f90)=[{&(0x7f0000000040)="aa", 0x1}], 0x1, 0x81006) ioctl$LOOP_CHANGE_FD(r2, 0x4c00, r4) ioctl$sock_netrom_SIOCADDRT(r4, 0x890b, &(0x7f0000000340)) sendfile(r2, r2, &(0x7f0000000080), 0x102000004) sync() syz_open_dev$sg(&(0x7f0000000040)='/dev/sg#\x00', 0x0, 0x0) setsockopt$l2tp_PPPOL2TP_SO_RECVSEQ(0xffffffffffffffff, 0x111, 0x2, 0x0, 0x4) fcntl$getownex(r3, 0x10, &(0x7f0000000580)) getresgid(&(0x7f0000000280), &(0x7f00000002c0), &(0x7f0000000380)) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000400)) r5 = open(&(0x7f000000fffa)='./bus\x00', 0x141042, 0x0) fallocate(r5, 0x0, 0xffff, 0x4) lseek(r1, 0x0, 0xffffffffffffffff) open(&(0x7f0000002000)='./bus\x00', 0x4002, 0x0) sendfile(r5, 0xffffffffffffffff, &(0x7f0000000000), 0x1000000000000) [ 113.411184] device lo entered promiscuous mode [ 113.450834] device lo left promiscuous mode 2033/05/18 03:33:38 executing program 6: socketpair$inet6_sctp(0xa, 0x1, 0x84, &(0x7f0000000000)={0xffffffffffffffff}) ioctl$sock_netdev_private(r0, 0x89f9, &(0x7f0000000100)) openat$sequencer(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/sequencer\x00', 0x200, 0x0) setsockopt$packet_fanout(0xffffffffffffffff, 0x107, 0x12, &(0x7f00004da000)={0x1}, 0xb4) r1 = perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$sg(&(0x7f0000000480)='/dev/sg#\x00', 0x1, 0x121000) openat$sequencer(0xffffffffffffff9c, &(0x7f0000000500)='/dev/sequencer\x00', 0x8000, 0x0) recvfrom(0xffffffffffffffff, &(0x7f0000000140)=""/166, 0xa6, 0x2000, &(0x7f0000000200)=@l2={0x1f, 0xfffffffffffffff8, {0x9, 0x7, 0x9}, 0x1}, 0x80) r2 = syz_open_dev$loop(&(0x7f0000ca9ff5)='/dev/loop#\x00', 0x0, 0x82) r3 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000140)='/dev/hwrng\x00', 0x20000, 0x0) clock_gettime(0x0, &(0x7f0000000180)) r4 = memfd_create(&(0x7f00000000c0)="74086e750000000000000000008c00", 0x0) pwritev(r4, &(0x7f0000f50f90)=[{&(0x7f0000000040)="aa", 0x1}], 0x1, 0x81006) ioctl$LOOP_CHANGE_FD(r2, 0x4c00, r4) ioctl$sock_netrom_SIOCADDRT(r4, 0x890b, &(0x7f0000000340)) sendfile(r2, r2, &(0x7f0000000080), 0x102000004) sync() syz_open_dev$sg(&(0x7f0000000040)='/dev/sg#\x00', 0x0, 0x0) setsockopt$l2tp_PPPOL2TP_SO_RECVSEQ(0xffffffffffffffff, 0x111, 0x2, 0x0, 0x4) fcntl$getownex(r3, 0x10, &(0x7f0000000580)) getresgid(&(0x7f0000000280), &(0x7f00000002c0), &(0x7f0000000380)) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000400)) r5 = open(&(0x7f000000fffa)='./bus\x00', 0x141042, 0x0) fallocate(r5, 0x0, 0xffff, 0x4) lseek(r1, 0x0, 0xffffffffffffffff) open(&(0x7f0000002000)='./bus\x00', 0x4002, 0x0) sendfile(r5, 0xffffffffffffffff, &(0x7f0000000000), 0x1000000000000) [ 113.556637] EXT4-fs (loop1): ext4_check_descriptors: Block bitmap for group 0 not in group (block 0)! [ 113.591267] EXT4-fs (loop1): group descriptors corrupted! 2033/05/18 03:33:38 executing program 1: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40000000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$netrom_NETROM_IDLE(0xffffffffffffffff, 0x103, 0x7, &(0x7f00000005c0)=0xffff, 0x4) getsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(0xffffffffffffffff, 0x84, 0x18, &(0x7f00000000c0), &(0x7f0000000100)=0x3cb) r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000180)='/dev/loop-control\x00', 0x20200, 0x0) prctl$getname(0x10, &(0x7f00000024c0)=""/144) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) getsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x0, &(0x7f00000001c0), &(0x7f0000000200)=0x4) preadv(r0, &(0x7f0000000280)=[{&(0x7f00000004c0)=""/249, 0xf9}], 0x1, 0x0) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x100000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="8000000000040000ae000000d90300006c000000010000000000000000000000002000000020000080000000000000002b5ebe5a0000ffff53ef", 0x3a, 0x400}, {&(0x7f0000010d00)="ed410000000400002b5ebe5a2b5ebe5a2b5ebe5a000000000000050002000000000000000000000015", 0x29, 0x1480}], 0x0, &(0x7f0000012900)) 2033/05/18 03:33:39 executing program 0: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x3, 0x8) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000940)={'dummy0\x00'}) r1 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rtc0\x00', 0x101000, 0x0) accept4$packet(r1, &(0x7f0000000e40)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @link_local}, &(0x7f0000000e80)=0x14, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f00000044c0)={{{@in=@multicast2, @in6=@local}}, {{@in=@local}, 0x0, @in6=@remote}}, &(0x7f00000045c0)=0xe8) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000004880)={{{@in=@remote, @in=@multicast1}}, {{@in=@dev}, 0x0, @in=@multicast1}}, &(0x7f0000004980)=0xe8) connect$inet6(r0, &(0x7f0000000100)={0xa, 0x0, 0x0, @loopback={0x0, 0x1}}, 0x1c) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000300)={{{@in=@dev={0xac, 0x14, 0x14}, @in6=@ipv4={[], [0xff, 0xff], @local={0xac, 0x14, 0x14, 0xaa}}, 0x0, 0x0, 0x0, 0x807, 0xa, 0x0, 0x80}, {0x0, 0x0, 0xfffffffffffffffd}, {0x0, 0xb80b}, 0x0, 0x0, 0x1, 0x1, 0x1}, {{@in6=@mcast1={0xff, 0x1, [], 0x1}, 0x4d5, 0x33}, 0x2, @in6=@ipv4={[], [0xff, 0xff], @remote={0xac, 0x14, 0x14, 0xbb}}}}, 0xe8) syz_mount_image$cifs(&(0x7f0000000180)='cifs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x4, &(0x7f00000009c0)=[{&(0x7f0000000200)}, {&(0x7f00000004c0)}, {&(0x7f0000000680)="5a2d715a7b73e9", 0x7, 0x10000}, {&(0x7f0000000ec0)}], 0x0, &(0x7f0000000ac0)='ipddp0\x00') sendmmsg(r0, &(0x7f0000007e00), 0x5de253fd8eb2f1, 0x800000000007ffe) 2033/05/18 03:33:39 executing program 5: r0 = openat$selinux_status(0xffffffffffffff9c, &(0x7f00000003c0)='/selinux/status\x00', 0x0, 0x0) read(r0, &(0x7f00000004c0)=""/226, 0xe2) socket$inet_tcp(0x2, 0x1, 0x0) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40000000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(0xffffffffffffffff, 0x84, 0x18, &(0x7f00000000c0)={0x0}, &(0x7f0000000100)=0x8) r3 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000180)='/dev/loop-control\x00', 0x20200, 0x0) r4 = ioctl$LOOP_CTL_GET_FREE(r3, 0x4c82) ioctl$LOOP_CTL_ADD(r3, 0x4c80, 0x0) tgkill(0x0, 0x0, 0x0) socketpair$inet_dccp(0x2, 0x6, 0x0, &(0x7f0000000140)) eventfd2(0x0, 0x1) fallocate(r1, 0x2, 0x2, 0x92d) openat$selinux_status(0xffffffffffffff9c, &(0x7f0000000380)='/selinux/status\x00', 0x0, 0x0) socket$inet_dccp(0x2, 0x6, 0x0) r5 = ioctl$LOOP_CTL_GET_FREE(r3, 0x4c82) ioctl$LOOP_CTL_REMOVE(r3, 0x4c81, r4) r6 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$fou(&(0x7f0000000100)='fou\x00') setsockopt$inet_dccp_buf(r6, 0x21, 0xcf, &(0x7f0000000400)="216414623db1482aed5a1c02962db7ecc2df6ef60641ebf5bc86523c71f42bd2eb669e285da694abc1a9af9a59cebd4e549bbb53731e41aee40836316acff742258dc2a68c469f79318d451670e9f4a7510c4d077dfcdce3022cf6f3eed663122a98e4757170770a247e442925bcc4c2b62699dd617f5faacf47e7259fccc481e3c8eae855adc09e2e5524c7e8b92ee889592b86722a1455ad5089a0", 0x9c) getsockopt$inet6_mreq(0xffffffffffffff9c, 0x29, 0x0, &(0x7f0000003480)={@dev}, &(0x7f00000034c0)=0x14) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f00000035c0)={0x0, @dev, @remote}, &(0x7f0000003600)=0xc) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000003740)={{{@in=@local, @in=@rand_addr}}, {{@in=@loopback}, 0x0, @in6=@mcast2}}, &(0x7f0000003840)=0xe8) ioctl$LOOP_CTL_REMOVE(r3, 0x4c81, r5) r7 = openat$selinux_status(0xffffffffffffff9c, &(0x7f00000002c0)='/selinux/status\x00', 0x0, 0x0) ioctl$EVIOCSFF(r7, 0x40304580, &(0x7f0000000300)=ANY=[@ANYBLOB="54000004020007e58d00cb26901f0000000007000008810000080000020078b25e02000091970600"]) getsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(0xffffffffffffffff, 0x84, 0x6, &(0x7f00000001c0)={r2, @in={{0x2, 0x4e23, @multicast1=0xe0000001}}}, &(0x7f0000000280)=0x84) ioctl$PIO_UNIMAP(0xffffffffffffffff, 0x4b67, &(0x7f0000000340)={0x4073, &(0x7f00000004c0)}) 2033/05/18 03:33:39 executing program 7: socketpair$inet6_sctp(0xa, 0x1, 0x84, &(0x7f0000000000)={0xffffffffffffffff}) ioctl$sock_netdev_private(r0, 0x89f9, &(0x7f0000000100)) openat$sequencer(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/sequencer\x00', 0x200, 0x0) setsockopt$packet_fanout(0xffffffffffffffff, 0x107, 0x12, &(0x7f00004da000)={0x1}, 0xb4) r1 = perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$sg(&(0x7f0000000480)='/dev/sg#\x00', 0x1, 0x121000) openat$sequencer(0xffffffffffffff9c, &(0x7f0000000500)='/dev/sequencer\x00', 0x8000, 0x0) recvfrom(0xffffffffffffffff, &(0x7f0000000140)=""/166, 0xa6, 0x2000, &(0x7f0000000200)=@l2={0x1f, 0xfffffffffffffff8, {0x9, 0x7, 0x9}, 0x1}, 0x80) r2 = syz_open_dev$loop(&(0x7f0000ca9ff5)='/dev/loop#\x00', 0x0, 0x82) r3 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000140)='/dev/hwrng\x00', 0x20000, 0x0) clock_gettime(0x0, &(0x7f0000000180)) r4 = memfd_create(&(0x7f00000000c0)="74086e750000000000000000008c00", 0x0) pwritev(r4, &(0x7f0000f50f90)=[{&(0x7f0000000040)="aa", 0x1}], 0x1, 0x81006) ioctl$LOOP_CHANGE_FD(r2, 0x4c00, r4) ioctl$sock_netrom_SIOCADDRT(r4, 0x890b, &(0x7f0000000340)) sendfile(r2, r2, &(0x7f0000000080), 0x102000004) sync() syz_open_dev$sg(&(0x7f0000000040)='/dev/sg#\x00', 0x0, 0x0) setsockopt$l2tp_PPPOL2TP_SO_RECVSEQ(0xffffffffffffffff, 0x111, 0x2, 0x0, 0x4) fcntl$getownex(r3, 0x10, &(0x7f0000000580)) getresgid(&(0x7f0000000280), &(0x7f00000002c0), &(0x7f0000000380)) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000400)) r5 = open(&(0x7f000000fffa)='./bus\x00', 0x141042, 0x0) fallocate(r5, 0x0, 0xffff, 0x4) lseek(r1, 0x0, 0xffffffffffffffff) open(&(0x7f0000002000)='./bus\x00', 0x4002, 0x0) sendfile(r5, 0xffffffffffffffff, &(0x7f0000000000), 0x1000000000000) 2033/05/18 03:33:39 executing program 2: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x3, 0x8) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000940)={'dummy0\x00'}) r1 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rtc0\x00', 0x101000, 0x0) accept4$packet(r1, &(0x7f0000000e40)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @link_local}, &(0x7f0000000e80)=0x14, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f00000044c0)={{{@in=@multicast2, @in6=@local}}, {{@in=@local}, 0x0, @in6=@remote}}, &(0x7f00000045c0)=0xe8) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000004880)={{{@in=@remote, @in=@multicast1}}, {{@in=@dev}, 0x0, @in=@multicast1}}, &(0x7f0000004980)=0xe8) connect$inet6(r0, &(0x7f0000000100)={0xa, 0x0, 0x0, @loopback={0x0, 0x1}}, 0x1c) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000300)={{{@in=@dev={0xac, 0x14, 0x14}, @in6=@ipv4={[], [0xff, 0xff], @local={0xac, 0x14, 0x14, 0xaa}}, 0x0, 0x0, 0x0, 0x807, 0xa, 0x0, 0x80}, {0x0, 0x0, 0xfffffffffffffffd}, {0x0, 0xb80b}, 0x0, 0x0, 0x1, 0x1, 0x1}, {{@in6=@mcast1={0xff, 0x1, [], 0x1}, 0x4d5, 0x33}, 0x2, @in6=@ipv4={[], [0xff, 0xff], @remote={0xac, 0x14, 0x14, 0xbb}}}}, 0xe8) syz_mount_image$cifs(&(0x7f0000000180)='cifs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x4, &(0x7f00000009c0)=[{&(0x7f0000000200)}, {&(0x7f00000004c0)}, {&(0x7f0000000680)="5a2d715a7b73e9", 0x7, 0x10000}, {&(0x7f0000000ec0)}], 0x0, &(0x7f0000000ac0)='ipddp0\x00') sendmmsg(r0, &(0x7f0000007e00), 0x5de253fd8eb2f1, 0x800000000007ffe) 2033/05/18 03:33:39 executing program 6: socketpair$inet6_sctp(0xa, 0x1, 0x84, &(0x7f0000000000)={0xffffffffffffffff}) ioctl$sock_netdev_private(r0, 0x89f9, &(0x7f0000000100)) openat$sequencer(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/sequencer\x00', 0x200, 0x0) setsockopt$packet_fanout(0xffffffffffffffff, 0x107, 0x12, &(0x7f00004da000)={0x1}, 0xb4) r1 = perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$sg(&(0x7f0000000480)='/dev/sg#\x00', 0x1, 0x121000) openat$sequencer(0xffffffffffffff9c, &(0x7f0000000500)='/dev/sequencer\x00', 0x8000, 0x0) recvfrom(0xffffffffffffffff, &(0x7f0000000140)=""/166, 0xa6, 0x2000, &(0x7f0000000200)=@l2={0x1f, 0xfffffffffffffff8, {0x9, 0x7, 0x9}, 0x1}, 0x80) r2 = syz_open_dev$loop(&(0x7f0000ca9ff5)='/dev/loop#\x00', 0x0, 0x82) r3 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000140)='/dev/hwrng\x00', 0x20000, 0x0) clock_gettime(0x0, &(0x7f0000000180)) r4 = memfd_create(&(0x7f00000000c0)="74086e750000000000000000008c00", 0x0) pwritev(r4, &(0x7f0000f50f90)=[{&(0x7f0000000040)="aa", 0x1}], 0x1, 0x81006) ioctl$LOOP_CHANGE_FD(r2, 0x4c00, r4) ioctl$sock_netrom_SIOCADDRT(r4, 0x890b, &(0x7f0000000340)) sendfile(r2, r2, &(0x7f0000000080), 0x102000004) sync() syz_open_dev$sg(&(0x7f0000000040)='/dev/sg#\x00', 0x0, 0x0) setsockopt$l2tp_PPPOL2TP_SO_RECVSEQ(0xffffffffffffffff, 0x111, 0x2, 0x0, 0x4) fcntl$getownex(r3, 0x10, &(0x7f0000000580)) getresgid(&(0x7f0000000280), &(0x7f00000002c0), &(0x7f0000000380)) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000400)) r5 = open(&(0x7f000000fffa)='./bus\x00', 0x141042, 0x0) fallocate(r5, 0x0, 0xffff, 0x4) lseek(r1, 0x0, 0xffffffffffffffff) open(&(0x7f0000002000)='./bus\x00', 0x4002, 0x0) sendfile(r5, 0xffffffffffffffff, &(0x7f0000000000), 0x1000000000000) [ 113.944947] EXT4-fs (loop1): ext4_check_descriptors: Block bitmap for group 0 not in group (block 0)! [ 113.984543] EXT4-fs (loop1): group descriptors corrupted! 2033/05/18 03:33:39 executing program 3: socketpair$inet6_sctp(0xa, 0x1, 0x84, &(0x7f0000000000)={0xffffffffffffffff}) ioctl$sock_netdev_private(r0, 0x89f9, &(0x7f0000000100)) openat$sequencer(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/sequencer\x00', 0x200, 0x0) setsockopt$packet_fanout(0xffffffffffffffff, 0x107, 0x12, &(0x7f00004da000)={0x1}, 0xb4) r1 = perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$sg(&(0x7f0000000480)='/dev/sg#\x00', 0x1, 0x121000) openat$sequencer(0xffffffffffffff9c, &(0x7f0000000500)='/dev/sequencer\x00', 0x8000, 0x0) recvfrom(0xffffffffffffffff, &(0x7f0000000140)=""/166, 0xa6, 0x2000, &(0x7f0000000200)=@l2={0x1f, 0xfffffffffffffff8, {0x9, 0x7, 0x9}, 0x1}, 0x80) r2 = syz_open_dev$loop(&(0x7f0000ca9ff5)='/dev/loop#\x00', 0x0, 0x82) r3 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000140)='/dev/hwrng\x00', 0x20000, 0x0) clock_gettime(0x0, &(0x7f0000000180)) r4 = memfd_create(&(0x7f00000000c0)="74086e750000000000000000008c00", 0x0) pwritev(r4, &(0x7f0000f50f90)=[{&(0x7f0000000040)="aa", 0x1}], 0x1, 0x81006) ioctl$LOOP_CHANGE_FD(r2, 0x4c00, r4) ioctl$sock_netrom_SIOCADDRT(r4, 0x890b, &(0x7f0000000340)) sendfile(r2, r2, &(0x7f0000000080), 0x102000004) sync() syz_open_dev$sg(&(0x7f0000000040)='/dev/sg#\x00', 0x0, 0x0) setsockopt$l2tp_PPPOL2TP_SO_RECVSEQ(0xffffffffffffffff, 0x111, 0x2, 0x0, 0x4) fcntl$getownex(r3, 0x10, &(0x7f0000000580)) getresgid(&(0x7f0000000280), &(0x7f00000002c0), &(0x7f0000000380)) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000400)) r5 = open(&(0x7f000000fffa)='./bus\x00', 0x141042, 0x0) fallocate(r5, 0x0, 0xffff, 0x4) lseek(r1, 0x0, 0xffffffffffffffff) open(&(0x7f0000002000)='./bus\x00', 0x4002, 0x0) sendfile(r5, 0xffffffffffffffff, &(0x7f0000000000), 0x1000000000000) 2033/05/18 03:33:39 executing program 4: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x3, 0x8) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000940)={'dummy0\x00'}) r1 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rtc0\x00', 0x101000, 0x0) accept4$packet(r1, &(0x7f0000000e40)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @link_local}, &(0x7f0000000e80)=0x14, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f00000044c0)={{{@in=@multicast2, @in6=@local}}, {{@in=@local}, 0x0, @in6=@remote}}, &(0x7f00000045c0)=0xe8) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000004880)={{{@in=@remote, @in=@multicast1}}, {{@in=@dev}, 0x0, @in=@multicast1}}, &(0x7f0000004980)=0xe8) connect$inet6(r0, &(0x7f0000000100)={0xa, 0x0, 0x0, @loopback={0x0, 0x1}}, 0x1c) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000300)={{{@in=@dev={0xac, 0x14, 0x14}, @in6=@ipv4={[], [0xff, 0xff], @local={0xac, 0x14, 0x14, 0xaa}}, 0x0, 0x0, 0x0, 0x807, 0xa, 0x0, 0x80}, {0x0, 0x0, 0xfffffffffffffffd}, {0x0, 0xb80b}, 0x0, 0x0, 0x1, 0x1, 0x1}, {{@in6=@mcast1={0xff, 0x1, [], 0x1}, 0x4d5, 0x33}, 0x2, @in6=@ipv4={[], [0xff, 0xff], @remote={0xac, 0x14, 0x14, 0xbb}}}}, 0xe8) syz_mount_image$cifs(&(0x7f0000000180)='cifs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x4, &(0x7f00000009c0)=[{&(0x7f0000000200)}, {&(0x7f00000004c0)}, {&(0x7f0000000680)="5a2d715a7b73e9", 0x7, 0x10000}, {&(0x7f0000000ec0)}], 0x0, &(0x7f0000000ac0)='ipddp0\x00') sendmmsg(r0, &(0x7f0000007e00), 0x5de253fd8eb2f1, 0x800000000007ffe) 2033/05/18 03:33:39 executing program 1: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40000000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$netrom_NETROM_IDLE(0xffffffffffffffff, 0x103, 0x7, &(0x7f00000005c0)=0xffff, 0x4) getsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(0xffffffffffffffff, 0x84, 0x18, &(0x7f00000000c0), &(0x7f0000000100)=0x3cb) r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000180)='/dev/loop-control\x00', 0x20200, 0x0) prctl$getname(0x10, &(0x7f00000024c0)=""/144) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) getsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x0, &(0x7f00000001c0), &(0x7f0000000200)=0x4) preadv(r0, &(0x7f0000000280)=[{&(0x7f00000004c0)=""/249, 0xf9}], 0x1, 0x0) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x100000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="8000000000040000ae000000d90300006c000000010000000000000000000000002000000020000080000000000000002b5ebe5a0000ffff53ef", 0x3a, 0x400}, {&(0x7f0000010d00)="ed410000000400002b5ebe5a2b5ebe5a2b5ebe5a000000000000050002000000000000000000000015", 0x29, 0x1480}], 0x0, &(0x7f0000012900)) 2033/05/18 03:33:39 executing program 5: r0 = openat$selinux_status(0xffffffffffffff9c, &(0x7f00000003c0)='/selinux/status\x00', 0x0, 0x0) read(r0, &(0x7f00000004c0)=""/226, 0xe2) socket$inet_tcp(0x2, 0x1, 0x0) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40000000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(0xffffffffffffffff, 0x84, 0x18, &(0x7f00000000c0)={0x0}, &(0x7f0000000100)=0x8) r3 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000180)='/dev/loop-control\x00', 0x20200, 0x0) r4 = ioctl$LOOP_CTL_GET_FREE(r3, 0x4c82) ioctl$LOOP_CTL_ADD(r3, 0x4c80, 0x0) tgkill(0x0, 0x0, 0x0) socketpair$inet_dccp(0x2, 0x6, 0x0, &(0x7f0000000140)) eventfd2(0x0, 0x1) fallocate(r1, 0x2, 0x2, 0x92d) openat$selinux_status(0xffffffffffffff9c, &(0x7f0000000380)='/selinux/status\x00', 0x0, 0x0) socket$inet_dccp(0x2, 0x6, 0x0) r5 = ioctl$LOOP_CTL_GET_FREE(r3, 0x4c82) ioctl$LOOP_CTL_REMOVE(r3, 0x4c81, r4) r6 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$fou(&(0x7f0000000100)='fou\x00') setsockopt$inet_dccp_buf(r6, 0x21, 0xcf, &(0x7f0000000400)="216414623db1482aed5a1c02962db7ecc2df6ef60641ebf5bc86523c71f42bd2eb669e285da694abc1a9af9a59cebd4e549bbb53731e41aee40836316acff742258dc2a68c469f79318d451670e9f4a7510c4d077dfcdce3022cf6f3eed663122a98e4757170770a247e442925bcc4c2b62699dd617f5faacf47e7259fccc481e3c8eae855adc09e2e5524c7e8b92ee889592b86722a1455ad5089a0", 0x9c) getsockopt$inet6_mreq(0xffffffffffffff9c, 0x29, 0x0, &(0x7f0000003480)={@dev}, &(0x7f00000034c0)=0x14) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f00000035c0)={0x0, @dev, @remote}, &(0x7f0000003600)=0xc) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000003740)={{{@in=@local, @in=@rand_addr}}, {{@in=@loopback}, 0x0, @in6=@mcast2}}, &(0x7f0000003840)=0xe8) ioctl$LOOP_CTL_REMOVE(r3, 0x4c81, r5) r7 = openat$selinux_status(0xffffffffffffff9c, &(0x7f00000002c0)='/selinux/status\x00', 0x0, 0x0) ioctl$EVIOCSFF(r7, 0x40304580, &(0x7f0000000300)=ANY=[@ANYBLOB="54000004020007e58d00cb26901f0000000007000008810000080000020078b25e02000091970600"]) getsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(0xffffffffffffffff, 0x84, 0x6, &(0x7f00000001c0)={r2, @in={{0x2, 0x4e23, @multicast1=0xe0000001}}}, &(0x7f0000000280)=0x84) ioctl$PIO_UNIMAP(0xffffffffffffffff, 0x4b67, &(0x7f0000000340)={0x4073, &(0x7f00000004c0)}) 2033/05/18 03:33:39 executing program 2: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x3, 0x8) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000940)={'dummy0\x00'}) r1 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rtc0\x00', 0x101000, 0x0) accept4$packet(r1, &(0x7f0000000e40)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @link_local}, &(0x7f0000000e80)=0x14, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f00000044c0)={{{@in=@multicast2, @in6=@local}}, {{@in=@local}, 0x0, @in6=@remote}}, &(0x7f00000045c0)=0xe8) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000004880)={{{@in=@remote, @in=@multicast1}}, {{@in=@dev}, 0x0, @in=@multicast1}}, &(0x7f0000004980)=0xe8) connect$inet6(r0, &(0x7f0000000100)={0xa, 0x0, 0x0, @loopback={0x0, 0x1}}, 0x1c) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000300)={{{@in=@dev={0xac, 0x14, 0x14}, @in6=@ipv4={[], [0xff, 0xff], @local={0xac, 0x14, 0x14, 0xaa}}, 0x0, 0x0, 0x0, 0x807, 0xa, 0x0, 0x80}, {0x0, 0x0, 0xfffffffffffffffd}, {0x0, 0xb80b}, 0x0, 0x0, 0x1, 0x1, 0x1}, {{@in6=@mcast1={0xff, 0x1, [], 0x1}, 0x4d5, 0x33}, 0x2, @in6=@ipv4={[], [0xff, 0xff], @remote={0xac, 0x14, 0x14, 0xbb}}}}, 0xe8) syz_mount_image$cifs(&(0x7f0000000180)='cifs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x4, &(0x7f00000009c0)=[{&(0x7f0000000200)}, {&(0x7f00000004c0)}, {&(0x7f0000000680)="5a2d715a7b73e9", 0x7, 0x10000}, {&(0x7f0000000ec0)}], 0x0, &(0x7f0000000ac0)='ipddp0\x00') sendmmsg(r0, &(0x7f0000007e00), 0x5de253fd8eb2f1, 0x800000000007ffe) 2033/05/18 03:33:39 executing program 6: socketpair$inet6_sctp(0xa, 0x1, 0x84, &(0x7f0000000000)={0xffffffffffffffff}) ioctl$sock_netdev_private(r0, 0x89f9, &(0x7f0000000100)) openat$sequencer(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/sequencer\x00', 0x200, 0x0) setsockopt$packet_fanout(0xffffffffffffffff, 0x107, 0x12, &(0x7f00004da000)={0x1}, 0xb4) r1 = perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$sg(&(0x7f0000000480)='/dev/sg#\x00', 0x1, 0x121000) openat$sequencer(0xffffffffffffff9c, &(0x7f0000000500)='/dev/sequencer\x00', 0x8000, 0x0) recvfrom(0xffffffffffffffff, &(0x7f0000000140)=""/166, 0xa6, 0x2000, &(0x7f0000000200)=@l2={0x1f, 0xfffffffffffffff8, {0x9, 0x7, 0x9}, 0x1}, 0x80) r2 = syz_open_dev$loop(&(0x7f0000ca9ff5)='/dev/loop#\x00', 0x0, 0x82) r3 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000140)='/dev/hwrng\x00', 0x20000, 0x0) clock_gettime(0x0, &(0x7f0000000180)) r4 = memfd_create(&(0x7f00000000c0)="74086e750000000000000000008c00", 0x0) pwritev(r4, &(0x7f0000f50f90)=[{&(0x7f0000000040)="aa", 0x1}], 0x1, 0x81006) ioctl$LOOP_CHANGE_FD(r2, 0x4c00, r4) ioctl$sock_netrom_SIOCADDRT(r4, 0x890b, &(0x7f0000000340)) sendfile(r2, r2, &(0x7f0000000080), 0x102000004) sync() syz_open_dev$sg(&(0x7f0000000040)='/dev/sg#\x00', 0x0, 0x0) setsockopt$l2tp_PPPOL2TP_SO_RECVSEQ(0xffffffffffffffff, 0x111, 0x2, 0x0, 0x4) fcntl$getownex(r3, 0x10, &(0x7f0000000580)) getresgid(&(0x7f0000000280), &(0x7f00000002c0), &(0x7f0000000380)) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000400)) r5 = open(&(0x7f000000fffa)='./bus\x00', 0x141042, 0x0) fallocate(r5, 0x0, 0xffff, 0x4) lseek(r1, 0x0, 0xffffffffffffffff) open(&(0x7f0000002000)='./bus\x00', 0x4002, 0x0) sendfile(r5, 0xffffffffffffffff, &(0x7f0000000000), 0x1000000000000) 2033/05/18 03:33:39 executing program 0: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x3, 0x8) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000940)={'dummy0\x00'}) r1 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rtc0\x00', 0x101000, 0x0) accept4$packet(r1, &(0x7f0000000e40)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @link_local}, &(0x7f0000000e80)=0x14, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f00000044c0)={{{@in=@multicast2, @in6=@local}}, {{@in=@local}, 0x0, @in6=@remote}}, &(0x7f00000045c0)=0xe8) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000004880)={{{@in=@remote, @in=@multicast1}}, {{@in=@dev}, 0x0, @in=@multicast1}}, &(0x7f0000004980)=0xe8) connect$inet6(r0, &(0x7f0000000100)={0xa, 0x0, 0x0, @loopback={0x0, 0x1}}, 0x1c) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000300)={{{@in=@dev={0xac, 0x14, 0x14}, @in6=@ipv4={[], [0xff, 0xff], @local={0xac, 0x14, 0x14, 0xaa}}, 0x0, 0x0, 0x0, 0x807, 0xa, 0x0, 0x80}, {0x0, 0x0, 0xfffffffffffffffd}, {0x0, 0xb80b}, 0x0, 0x0, 0x1, 0x1, 0x1}, {{@in6=@mcast1={0xff, 0x1, [], 0x1}, 0x4d5, 0x33}, 0x2, @in6=@ipv4={[], [0xff, 0xff], @remote={0xac, 0x14, 0x14, 0xbb}}}}, 0xe8) syz_mount_image$cifs(&(0x7f0000000180)='cifs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x4, &(0x7f00000009c0)=[{&(0x7f0000000200)}, {&(0x7f00000004c0)}, {&(0x7f0000000680)="5a2d715a7b73e9", 0x7, 0x10000}, {&(0x7f0000000ec0)}], 0x0, &(0x7f0000000ac0)='ipddp0\x00') sendmmsg(r0, &(0x7f0000007e00), 0x5de253fd8eb2f1, 0x800000000007ffe) 2033/05/18 03:33:39 executing program 7: socketpair$inet6_sctp(0xa, 0x1, 0x84, &(0x7f0000000000)={0xffffffffffffffff}) ioctl$sock_netdev_private(r0, 0x89f9, &(0x7f0000000100)) openat$sequencer(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/sequencer\x00', 0x200, 0x0) setsockopt$packet_fanout(0xffffffffffffffff, 0x107, 0x12, &(0x7f00004da000)={0x1}, 0xb4) r1 = perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$sg(&(0x7f0000000480)='/dev/sg#\x00', 0x1, 0x121000) openat$sequencer(0xffffffffffffff9c, &(0x7f0000000500)='/dev/sequencer\x00', 0x8000, 0x0) recvfrom(0xffffffffffffffff, &(0x7f0000000140)=""/166, 0xa6, 0x2000, &(0x7f0000000200)=@l2={0x1f, 0xfffffffffffffff8, {0x9, 0x7, 0x9}, 0x1}, 0x80) r2 = syz_open_dev$loop(&(0x7f0000ca9ff5)='/dev/loop#\x00', 0x0, 0x82) r3 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000140)='/dev/hwrng\x00', 0x20000, 0x0) clock_gettime(0x0, &(0x7f0000000180)) r4 = memfd_create(&(0x7f00000000c0)="74086e750000000000000000008c00", 0x0) pwritev(r4, &(0x7f0000f50f90)=[{&(0x7f0000000040)="aa", 0x1}], 0x1, 0x81006) ioctl$LOOP_CHANGE_FD(r2, 0x4c00, r4) ioctl$sock_netrom_SIOCADDRT(r4, 0x890b, &(0x7f0000000340)) sendfile(r2, r2, &(0x7f0000000080), 0x102000004) sync() syz_open_dev$sg(&(0x7f0000000040)='/dev/sg#\x00', 0x0, 0x0) setsockopt$l2tp_PPPOL2TP_SO_RECVSEQ(0xffffffffffffffff, 0x111, 0x2, 0x0, 0x4) fcntl$getownex(r3, 0x10, &(0x7f0000000580)) getresgid(&(0x7f0000000280), &(0x7f00000002c0), &(0x7f0000000380)) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000400)) r5 = open(&(0x7f000000fffa)='./bus\x00', 0x141042, 0x0) fallocate(r5, 0x0, 0xffff, 0x4) lseek(r1, 0x0, 0xffffffffffffffff) open(&(0x7f0000002000)='./bus\x00', 0x4002, 0x0) sendfile(r5, 0xffffffffffffffff, &(0x7f0000000000), 0x1000000000000) 2033/05/18 03:33:39 executing program 3: socketpair$inet6_sctp(0xa, 0x1, 0x84, &(0x7f0000000000)={0xffffffffffffffff}) ioctl$sock_netdev_private(r0, 0x89f9, &(0x7f0000000100)) openat$sequencer(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/sequencer\x00', 0x200, 0x0) setsockopt$packet_fanout(0xffffffffffffffff, 0x107, 0x12, &(0x7f00004da000)={0x1}, 0xb4) r1 = perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$sg(&(0x7f0000000480)='/dev/sg#\x00', 0x1, 0x121000) openat$sequencer(0xffffffffffffff9c, &(0x7f0000000500)='/dev/sequencer\x00', 0x8000, 0x0) recvfrom(0xffffffffffffffff, &(0x7f0000000140)=""/166, 0xa6, 0x2000, &(0x7f0000000200)=@l2={0x1f, 0xfffffffffffffff8, {0x9, 0x7, 0x9}, 0x1}, 0x80) r2 = syz_open_dev$loop(&(0x7f0000ca9ff5)='/dev/loop#\x00', 0x0, 0x82) r3 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000140)='/dev/hwrng\x00', 0x20000, 0x0) clock_gettime(0x0, &(0x7f0000000180)) r4 = memfd_create(&(0x7f00000000c0)="74086e750000000000000000008c00", 0x0) pwritev(r4, &(0x7f0000f50f90)=[{&(0x7f0000000040)="aa", 0x1}], 0x1, 0x81006) ioctl$LOOP_CHANGE_FD(r2, 0x4c00, r4) ioctl$sock_netrom_SIOCADDRT(r4, 0x890b, &(0x7f0000000340)) sendfile(r2, r2, &(0x7f0000000080), 0x102000004) sync() syz_open_dev$sg(&(0x7f0000000040)='/dev/sg#\x00', 0x0, 0x0) setsockopt$l2tp_PPPOL2TP_SO_RECVSEQ(0xffffffffffffffff, 0x111, 0x2, 0x0, 0x4) fcntl$getownex(r3, 0x10, &(0x7f0000000580)) getresgid(&(0x7f0000000280), &(0x7f00000002c0), &(0x7f0000000380)) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000400)) r5 = open(&(0x7f000000fffa)='./bus\x00', 0x141042, 0x0) fallocate(r5, 0x0, 0xffff, 0x4) lseek(r1, 0x0, 0xffffffffffffffff) open(&(0x7f0000002000)='./bus\x00', 0x4002, 0x0) sendfile(r5, 0xffffffffffffffff, &(0x7f0000000000), 0x1000000000000) [ 114.547304] EXT4-fs (loop1): ext4_check_descriptors: Block bitmap for group 0 not in group (block 0)! [ 114.573710] EXT4-fs (loop1): group descriptors corrupted! 2033/05/18 03:33:40 executing program 3: socketpair$inet6_sctp(0xa, 0x1, 0x84, &(0x7f0000000000)={0xffffffffffffffff}) ioctl$sock_netdev_private(r0, 0x89f9, &(0x7f0000000100)) openat$sequencer(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/sequencer\x00', 0x200, 0x0) setsockopt$packet_fanout(0xffffffffffffffff, 0x107, 0x12, &(0x7f00004da000)={0x1}, 0xb4) r1 = perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$sg(&(0x7f0000000480)='/dev/sg#\x00', 0x1, 0x121000) openat$sequencer(0xffffffffffffff9c, &(0x7f0000000500)='/dev/sequencer\x00', 0x8000, 0x0) recvfrom(0xffffffffffffffff, &(0x7f0000000140)=""/166, 0xa6, 0x2000, &(0x7f0000000200)=@l2={0x1f, 0xfffffffffffffff8, {0x9, 0x7, 0x9}, 0x1}, 0x80) r2 = syz_open_dev$loop(&(0x7f0000ca9ff5)='/dev/loop#\x00', 0x0, 0x82) r3 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000140)='/dev/hwrng\x00', 0x20000, 0x0) clock_gettime(0x0, &(0x7f0000000180)) r4 = memfd_create(&(0x7f00000000c0)="74086e750000000000000000008c00", 0x0) pwritev(r4, &(0x7f0000f50f90)=[{&(0x7f0000000040)="aa", 0x1}], 0x1, 0x81006) ioctl$LOOP_CHANGE_FD(r2, 0x4c00, r4) ioctl$sock_netrom_SIOCADDRT(r4, 0x890b, &(0x7f0000000340)) sendfile(r2, r2, &(0x7f0000000080), 0x102000004) sync() syz_open_dev$sg(&(0x7f0000000040)='/dev/sg#\x00', 0x0, 0x0) setsockopt$l2tp_PPPOL2TP_SO_RECVSEQ(0xffffffffffffffff, 0x111, 0x2, 0x0, 0x4) fcntl$getownex(r3, 0x10, &(0x7f0000000580)) getresgid(&(0x7f0000000280), &(0x7f00000002c0), &(0x7f0000000380)) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000400)) r5 = open(&(0x7f000000fffa)='./bus\x00', 0x141042, 0x0) fallocate(r5, 0x0, 0xffff, 0x4) lseek(r1, 0x0, 0xffffffffffffffff) open(&(0x7f0000002000)='./bus\x00', 0x4002, 0x0) sendfile(r5, 0xffffffffffffffff, &(0x7f0000000000), 0x1000000000000) 2033/05/18 03:33:40 executing program 6: perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x71, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$EVIOCGBITKEY(0xffffffffffffffff, 0x80404521, &(0x7f0000001b80)=""/85) writev(0xffffffffffffffff, &(0x7f0000001a40), 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) syz_genetlink_get_family_id$ipvs(&(0x7f0000000500)='IPVS\x00') r0 = socket(0x10, 0x803, 0x0) sendto(r0, &(0x7f0000cfefee)="120000001200e7ff00ffe90009144a000ae9", 0x12, 0x0, 0x0, 0x0) accept$packet(0xffffffffffffffff, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @random}, &(0x7f0000000580)=0x2) ioctl$TIOCSWINSZ(0xffffffffffffffff, 0x5414, &(0x7f00000017c0)) getsockopt$IPT_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x40, &(0x7f0000000280)={'raw\x00'}, &(0x7f0000000540)=0x54) ioctl$KDGKBTYPE(0xffffffffffffffff, 0x4b33, &(0x7f0000000680)) 2033/05/18 03:33:40 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x10000000013, &(0x7f000039c000)=0x400000000000001, 0x4) setsockopt$inet_tcp_int(r0, 0x6, 0x14, &(0x7f00000b2000)=0xffffffffffffffff, 0x4) sendto$inet(r0, &(0x7f00005c9000), 0x6a, 0x800000020000000, &(0x7f0000000300)={0x2, 0x0, @loopback=0x7f000001}, 0x10) r1 = fcntl$dupfd(r0, 0x0, r0) setsockopt$inet_tcp_int(r1, 0x6, 0x19, &(0x7f00000000c0)=0x6, 0x4) poll(&(0x7f0000000000)=[{r0}], 0x1, 0x0) 2033/05/18 03:33:40 executing program 0: accept4(0xffffffffffffff9c, 0x0, &(0x7f0000000500), 0x0) getsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(0xffffffffffffffff, 0x84, 0x72, &(0x7f0000000540), &(0x7f0000000700)=0xc) accept4$packet(0xffffffffffffffff, 0x0, &(0x7f0000000140), 0x0) getsockopt$inet_mreqsrc(0xffffffffffffffff, 0x0, 0x28, &(0x7f0000000000)={@multicast1, @empty, @local}, &(0x7f00000000c0)=0xc) r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000100)='/dev/snapshot\x00', 0x41, 0x0) bind$vsock_stream(r0, &(0x7f0000000240)={0x28, 0x0, 0x0, @hyper}, 0x10) ioctl$SG_SET_DEBUG(0xffffffffffffffff, 0x227e, &(0x7f0000000180)) write$fuse(r0, &(0x7f0000000580)={0x10, 0x0, 0x3}, 0x10) getrusage(0x0, &(0x7f0000000440)) getresuid(&(0x7f0000000400)=0x0, &(0x7f0000000280), &(0x7f0000000300)) stat(&(0x7f0000000340)='./file1\x00', &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) fchown(0xffffffffffffffff, r1, r2) r3 = openat$sequencer(0xffffffffffffff9c, &(0x7f00005d6000)='/dev/sequencer\x00', 0x0, 0x0) connect$inet(0xffffffffffffffff, &(0x7f0000000200)={0x2, 0x0, @multicast1=0xe0000001}, 0x10) dup2(0xffffffffffffffff, 0xffffffffffffffff) r4 = dup3(r3, r0, 0x0) fallocate(r4, 0x0, 0x0, 0x0) 2033/05/18 03:33:40 executing program 4: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x3, 0x8) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000940)={'dummy0\x00'}) r1 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rtc0\x00', 0x101000, 0x0) accept4$packet(r1, &(0x7f0000000e40)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @link_local}, &(0x7f0000000e80)=0x14, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f00000044c0)={{{@in=@multicast2, @in6=@local}}, {{@in=@local}, 0x0, @in6=@remote}}, &(0x7f00000045c0)=0xe8) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000004880)={{{@in=@remote, @in=@multicast1}}, {{@in=@dev}, 0x0, @in=@multicast1}}, &(0x7f0000004980)=0xe8) connect$inet6(r0, &(0x7f0000000100)={0xa, 0x0, 0x0, @loopback={0x0, 0x1}}, 0x1c) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000300)={{{@in=@dev={0xac, 0x14, 0x14}, @in6=@ipv4={[], [0xff, 0xff], @local={0xac, 0x14, 0x14, 0xaa}}, 0x0, 0x0, 0x0, 0x807, 0xa, 0x0, 0x80}, {0x0, 0x0, 0xfffffffffffffffd}, {0x0, 0xb80b}, 0x0, 0x0, 0x1, 0x1, 0x1}, {{@in6=@mcast1={0xff, 0x1, [], 0x1}, 0x4d5, 0x33}, 0x2, @in6=@ipv4={[], [0xff, 0xff], @remote={0xac, 0x14, 0x14, 0xbb}}}}, 0xe8) syz_mount_image$cifs(&(0x7f0000000180)='cifs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x4, &(0x7f00000009c0)=[{&(0x7f0000000200)}, {&(0x7f00000004c0)}, {&(0x7f0000000680)="5a2d715a7b73e9", 0x7, 0x10000}, {&(0x7f0000000ec0)}], 0x0, &(0x7f0000000ac0)='ipddp0\x00') sendmmsg(r0, &(0x7f0000007e00), 0x5de253fd8eb2f1, 0x800000000007ffe) 2033/05/18 03:33:40 executing program 2: mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x0, 0x32, 0xffffffffffffffff, 0x0) socketpair(0x0, 0x0, 0x0, &(0x7f0000000500)) mlockall(0x3) mmap(&(0x7f0000000000/0xff7000)=nil, 0xff7000, 0x0, 0x32, 0xffffffffffffffff, 0x0) userfaultfd(0x0) setsockopt$netlink_NETLINK_CAP_ACK(0xffffffffffffffff, 0x10e, 0xa, &(0x7f0000000080)=0x7fffffff, 0x4) pselect6(0x14, &(0x7f00000000c0), &(0x7f0000000fc0), &(0x7f0000013fc0), &(0x7f0000000ff0), &(0x7f0000000ff0)={&(0x7f0000001000), 0x8}) fcntl$getown(0xffffffffffffffff, 0x9) 2033/05/18 03:33:40 executing program 1: perf_event_open(&(0x7f000001d000)={0x2, 0x78, 0x71}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000010000)="eb3c906d6b66732e66617400020401000200027000f801", 0x17}], 0x0, &(0x7f0000000240)=ANY=[]) mkdir(&(0x7f0000000300)='./file0//ile0\x00', 0x0) mknod(&(0x7f0000000200)='./file0//ile0/file0\x00', 0x0, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000000140), 0x50, 0x0, &(0x7f00000001c0)={0x0, 0x989680}) 2033/05/18 03:33:40 executing program 7: socketpair$inet6_sctp(0xa, 0x1, 0x84, &(0x7f0000000000)={0xffffffffffffffff}) ioctl$sock_netdev_private(r0, 0x89f9, &(0x7f0000000100)) openat$sequencer(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/sequencer\x00', 0x200, 0x0) setsockopt$packet_fanout(0xffffffffffffffff, 0x107, 0x12, &(0x7f00004da000)={0x1}, 0xb4) r1 = perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$sg(&(0x7f0000000480)='/dev/sg#\x00', 0x1, 0x121000) openat$sequencer(0xffffffffffffff9c, &(0x7f0000000500)='/dev/sequencer\x00', 0x8000, 0x0) recvfrom(0xffffffffffffffff, &(0x7f0000000140)=""/166, 0xa6, 0x2000, &(0x7f0000000200)=@l2={0x1f, 0xfffffffffffffff8, {0x9, 0x7, 0x9}, 0x1}, 0x80) r2 = syz_open_dev$loop(&(0x7f0000ca9ff5)='/dev/loop#\x00', 0x0, 0x82) r3 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000140)='/dev/hwrng\x00', 0x20000, 0x0) clock_gettime(0x0, &(0x7f0000000180)) r4 = memfd_create(&(0x7f00000000c0)="74086e750000000000000000008c00", 0x0) pwritev(r4, &(0x7f0000f50f90)=[{&(0x7f0000000040)="aa", 0x1}], 0x1, 0x81006) ioctl$LOOP_CHANGE_FD(r2, 0x4c00, r4) ioctl$sock_netrom_SIOCADDRT(r4, 0x890b, &(0x7f0000000340)) sendfile(r2, r2, &(0x7f0000000080), 0x102000004) sync() syz_open_dev$sg(&(0x7f0000000040)='/dev/sg#\x00', 0x0, 0x0) setsockopt$l2tp_PPPOL2TP_SO_RECVSEQ(0xffffffffffffffff, 0x111, 0x2, 0x0, 0x4) fcntl$getownex(r3, 0x10, &(0x7f0000000580)) getresgid(&(0x7f0000000280), &(0x7f00000002c0), &(0x7f0000000380)) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000400)) r5 = open(&(0x7f000000fffa)='./bus\x00', 0x141042, 0x0) fallocate(r5, 0x0, 0xffff, 0x4) lseek(r1, 0x0, 0xffffffffffffffff) open(&(0x7f0000002000)='./bus\x00', 0x4002, 0x0) sendfile(r5, 0xffffffffffffffff, &(0x7f0000000000), 0x1000000000000) 2033/05/18 03:33:40 executing program 5: r0 = openat$selinux_avc_cache_stats(0xffffffffffffff9c, &(0x7f00000002c0)='/selinux/avc/cache_stats\x00', 0x0, 0x0) clock_gettime(0x0, &(0x7f00000000c0)) clock_gettime(0x0, &(0x7f0000000200)) write$sndseq(r0, &(0x7f00000015c0)=[{0xfda, 0x0, 0x424, 0x275f7cf9, @tick=0x6, {0x0, 0x2}, {}, @ext={0x0, &(0x7f0000000500)}}, {0x0, 0x0, 0xffffffffffffff54, 0x0, @tick, {0x2, 0xffffffff}, {0x67, 0x1}, @addr={0x7ff, 0xfffffffffffffffc}}], 0x60) getpeername$packet(0xffffffffffffffff, &(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @broadcast}, &(0x7f0000000340)=0x14) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KDSKBSENT(0xffffffffffffffff, 0x4b49, &(0x7f0000000400)="1b") openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000080)='cgroup.procs\x00', 0x2, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x406, r1) syz_read_part_table(0xfffffffffffffffe, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="000000000000000000000000000000000000000000000000ed793afe00000000020082012600010000006400000000012700fd030c00650000006400000000030d0085043100c90000006400000000043200052020002d010000d306000055aa", 0x60, 0x1a0}]) openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000380)='/selinux/enforce\x00', 0x80000, 0x0) 2033/05/18 03:33:40 executing program 6: syz_mount_image$ext4(&(0x7f0000000080)='ext2\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000540), 0x0, &(0x7f0000000600)={[{@sb={'sb', 0x3d}, 0x2c}]}) 2033/05/18 03:33:40 executing program 1: perf_event_open(&(0x7f000001d000)={0x2, 0x78, 0x71}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000010000)="eb3c906d6b66732e66617400020401000200027000f801", 0x17}], 0x0, &(0x7f0000000240)=ANY=[]) mkdir(&(0x7f0000000300)='./file0//ile0\x00', 0x0) mknod(&(0x7f0000000200)='./file0//ile0/file0\x00', 0x0, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000000140), 0x50, 0x0, &(0x7f00000001c0)={0x0, 0x989680}) [ 115.053407] EXT2-fs (loop6): error: can't find an ext2 filesystem on dev loop6. 2033/05/18 03:33:40 executing program 0: r0 = open(&(0x7f0000000040)='./bus\x00', 0x141042, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f00000000c0)='vfat\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f0000000140), 0x0, 0x2}], 0x0, &(0x7f0000000600)=ANY=[]) getdents64(0xffffffffffffffff, &(0x7f0000000100)=""/244, 0xf4) ioctl$EVIOCGBITKEY(0xffffffffffffffff, 0x80404521, &(0x7f0000001b80)=""/85) getdents64(0xffffffffffffffff, &(0x7f0000000df0)=""/528, 0xff95) recvfrom$inet(0xffffffffffffffff, &(0x7f0000000780)=""/250, 0xfa, 0x3, &(0x7f0000000480)={0x2, 0x4e21, @loopback=0x7f000001}, 0x10) r1 = socket$netlink(0x10, 0x3, 0x0) writev(r1, &(0x7f0000001a40)=[{&(0x7f0000000780)}], 0x1) r2 = dup2(0xffffffffffffffff, 0xffffffffffffffff) r3 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000500)='IPVS\x00') accept$packet(0xffffffffffffffff, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @random}, &(0x7f0000000580)=0x2) ioctl$TIOCSWINSZ(r2, 0x5414, &(0x7f00000017c0)={0x0, 0x60b, 0x4}) write$cgroup_pid(0xffffffffffffffff, &(0x7f00000005c0)={[0x0, 0x0]}, 0x2) accept(r2, &(0x7f00000006c0)=@hci, &(0x7f0000000740)=0x80) sendmsg$IPVS_CMD_GET_INFO(0xffffffffffffffff, &(0x7f00000004c0)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x20010}, 0xc, &(0x7f0000000440)={&(0x7f0000000380)=ANY=[@ANYRES16=r3], 0x1}, 0x1}, 0x0) getsockopt$IPT_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x40, &(0x7f0000000280)={'raw\x00'}, &(0x7f0000000540)=0x54) fallocate(r0, 0x0, 0xffff, 0x4) ioctl$KDGKBTYPE(0xffffffffffffffff, 0x4b33, &(0x7f0000000680)) r4 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) fallocate(r4, 0x1, 0x7fff, 0x10000101) dup(0xffffffffffffffff) [ 115.103445] loop5: p1 p2 p3 < > p4 < > [ 115.164105] EXT2-fs (loop6): error: can't find an ext2 filesystem on dev loop6. 2033/05/18 03:33:40 executing program 6: syz_mount_image$ext4(&(0x7f0000000080)='ext2\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000540), 0x0, &(0x7f0000000600)={[{@sb={'sb', 0x3d}, 0x2c}]}) 2033/05/18 03:33:40 executing program 1: perf_event_open(&(0x7f000001d000)={0x2, 0x78, 0x71}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000010000)="eb3c906d6b66732e66617400020401000200027000f801", 0x17}], 0x0, &(0x7f0000000240)=ANY=[]) mkdir(&(0x7f0000000300)='./file0//ile0\x00', 0x0) mknod(&(0x7f0000000200)='./file0//ile0/file0\x00', 0x0, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000000140), 0x50, 0x0, &(0x7f00000001c0)={0x0, 0x989680}) 2033/05/18 03:33:40 executing program 6: syz_mount_image$ext4(&(0x7f0000000080)='ext2\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000540), 0x0, &(0x7f0000000600)={[{@sb={'sb', 0x3d}, 0x2c}]}) [ 115.254872] EXT2-fs (loop6): error: can't find an ext2 filesystem on dev loop6. [ 115.373266] EXT2-fs (loop6): error: can't find an ext2 filesystem on dev loop6. 2033/05/18 03:33:40 executing program 6: syz_mount_image$ext4(&(0x7f0000000080)='ext2\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000540), 0x0, &(0x7f0000000600)={[{@sb={'sb', 0x3d}, 0x2c}]}) [ 115.509736] EXT2-fs (loop6): error: can't find an ext2 filesystem on dev loop6. [ 115.544123] loop_reread_partitions: partition scan of loop5 () failed (rc=-16) [ 115.554358] blk_update_request: 356 callbacks suppressed [ 115.554364] blk_update_request: I/O error, dev loop5, sector 301 2033/05/18 03:33:40 executing program 3: socketpair$inet6_sctp(0xa, 0x1, 0x84, &(0x7f0000000000)={0xffffffffffffffff}) ioctl$sock_netdev_private(r0, 0x89f9, &(0x7f0000000100)) openat$sequencer(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/sequencer\x00', 0x200, 0x0) setsockopt$packet_fanout(0xffffffffffffffff, 0x107, 0x12, &(0x7f00004da000)={0x1}, 0xb4) r1 = perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$sg(&(0x7f0000000480)='/dev/sg#\x00', 0x1, 0x121000) openat$sequencer(0xffffffffffffff9c, &(0x7f0000000500)='/dev/sequencer\x00', 0x8000, 0x0) recvfrom(0xffffffffffffffff, &(0x7f0000000140)=""/166, 0xa6, 0x2000, &(0x7f0000000200)=@l2={0x1f, 0xfffffffffffffff8, {0x9, 0x7, 0x9}, 0x1}, 0x80) r2 = syz_open_dev$loop(&(0x7f0000ca9ff5)='/dev/loop#\x00', 0x0, 0x82) r3 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000140)='/dev/hwrng\x00', 0x20000, 0x0) clock_gettime(0x0, &(0x7f0000000180)) r4 = memfd_create(&(0x7f00000000c0)="74086e750000000000000000008c00", 0x0) pwritev(r4, &(0x7f0000f50f90)=[{&(0x7f0000000040)="aa", 0x1}], 0x1, 0x81006) ioctl$LOOP_CHANGE_FD(r2, 0x4c00, r4) ioctl$sock_netrom_SIOCADDRT(r4, 0x890b, &(0x7f0000000340)) sendfile(r2, r2, &(0x7f0000000080), 0x102000004) sync() syz_open_dev$sg(&(0x7f0000000040)='/dev/sg#\x00', 0x0, 0x0) setsockopt$l2tp_PPPOL2TP_SO_RECVSEQ(0xffffffffffffffff, 0x111, 0x2, 0x0, 0x4) fcntl$getownex(r3, 0x10, &(0x7f0000000580)) getresgid(&(0x7f0000000280), &(0x7f00000002c0), &(0x7f0000000380)) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000400)) r5 = open(&(0x7f000000fffa)='./bus\x00', 0x141042, 0x0) fallocate(r5, 0x0, 0xffff, 0x4) lseek(r1, 0x0, 0xffffffffffffffff) open(&(0x7f0000002000)='./bus\x00', 0x4002, 0x0) sendfile(r5, 0xffffffffffffffff, &(0x7f0000000000), 0x1000000000000) 2033/05/18 03:33:40 executing program 1: perf_event_open(&(0x7f000001d000)={0x2, 0x78, 0x71}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000010000)="eb3c906d6b66732e66617400020401000200027000f801", 0x17}], 0x0, &(0x7f0000000240)=ANY=[]) mkdir(&(0x7f0000000300)='./file0//ile0\x00', 0x0) mknod(&(0x7f0000000200)='./file0//ile0/file0\x00', 0x0, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000000140), 0x50, 0x0, &(0x7f00000001c0)={0x0, 0x989680}) 2033/05/18 03:33:40 executing program 4: r0 = socket$inet6(0xa, 0x2000000802, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f0000000040)={@loopback={0x0, 0x1}, 0x0, 0x0, 0xff, 0x1, 0x0, 0x7fff}, 0x20) 2033/05/18 03:33:40 executing program 2: mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x0, 0x32, 0xffffffffffffffff, 0x0) socketpair(0x0, 0x0, 0x0, &(0x7f0000000500)) mlockall(0x3) mmap(&(0x7f0000000000/0xff7000)=nil, 0xff7000, 0x0, 0x32, 0xffffffffffffffff, 0x0) userfaultfd(0x0) setsockopt$netlink_NETLINK_CAP_ACK(0xffffffffffffffff, 0x10e, 0xa, &(0x7f0000000080)=0x7fffffff, 0x4) pselect6(0x14, &(0x7f00000000c0), &(0x7f0000000fc0), &(0x7f0000013fc0), &(0x7f0000000ff0), &(0x7f0000000ff0)={&(0x7f0000001000), 0x8}) fcntl$getown(0xffffffffffffffff, 0x9) [ 115.554405] blk_update_request: I/O error, dev loop5, sector 301 [ 115.554410] buffer_io_error: 354 callbacks suppressed [ 115.554414] Buffer I/O error on dev loop5p4, logical block 0, async page read 2033/05/18 03:33:40 executing program 4: sysfs$2(0x2, 0xffffffffe8104f32, &(0x7f00000001c0)=""/213) r0 = syz_open_dev$mice(&(0x7f0000000000)='/dev/input/mice\x00', 0x0, 0x0) r1 = memfd_create(&(0x7f0000000ffd)='[,\x00', 0x0) mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0x0, 0x2012, r1, 0x0) pkey_mprotect(&(0x7f0000005000/0x4000)=nil, 0x4000, 0xa, 0xffffffffffffffff) mprotect(&(0x7f0000003000/0x4000)=nil, 0x4000, 0x2) sendmsg$nl_generic(r0, &(0x7f0000000140)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0xa0004000}, 0xc, &(0x7f0000000100)={&(0x7f0000000080)={0x20, 0x41, 0x900, 0x70bd2a, 0x25dfdbfb, {0x11}, [@typed={0xc, 0x63, @u64=0x60a}]}, 0x20}, 0x1, 0x0, 0x0, 0x40000}, 0x1) membarrier(0x1, 0x0) 2033/05/18 03:33:40 executing program 7: open$dir(&(0x7f00000001c0)='./file0\x00', 0x1fffe, 0x0) r0 = open$dir(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) mmap(&(0x7f0000ffb000/0x3000)=nil, 0x3000, 0x0, 0x90111, r0, 0x0) [ 115.554452] blk_update_request: I/O error, dev loop5, sector 301 [ 115.554456] Buffer I/O error on dev loop5p4, logical block 0, async page read [ 115.554482] blk_update_request: I/O error, dev loop5, sector 301 [ 115.554487] Buffer I/O error on dev loop5p4, logical block 0, async page read 2033/05/18 03:33:40 executing program 5: r0 = openat$selinux_avc_cache_stats(0xffffffffffffff9c, &(0x7f00000002c0)='/selinux/avc/cache_stats\x00', 0x0, 0x0) clock_gettime(0x0, &(0x7f00000000c0)) clock_gettime(0x0, &(0x7f0000000200)) write$sndseq(r0, &(0x7f00000015c0)=[{0xfda, 0x0, 0x424, 0x275f7cf9, @tick=0x6, {0x0, 0x2}, {}, @ext={0x0, &(0x7f0000000500)}}, {0x0, 0x0, 0xffffffffffffff54, 0x0, @tick, {0x2, 0xffffffff}, {0x67, 0x1}, @addr={0x7ff, 0xfffffffffffffffc}}], 0x60) getpeername$packet(0xffffffffffffffff, &(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @broadcast}, &(0x7f0000000340)=0x14) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KDSKBSENT(0xffffffffffffffff, 0x4b49, &(0x7f0000000400)="1b") openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000080)='cgroup.procs\x00', 0x2, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x406, r1) syz_read_part_table(0xfffffffffffffffe, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="000000000000000000000000000000000000000000000000ed793afe00000000020082012600010000006400000000012700fd030c00650000006400000000030d0085043100c90000006400000000043200052020002d010000d306000055aa", 0x60, 0x1a0}]) openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000380)='/selinux/enforce\x00', 0x80000, 0x0) [ 115.554513] blk_update_request: I/O error, dev loop5, sector 301 [ 115.554518] Buffer I/O error on dev loop5p4, logical block 0, async page read 2033/05/18 03:33:40 executing program 7: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000580)={&(0x7f0000000100)={0x10}, 0xc, &(0x7f0000000200)={&(0x7f0000000c00)=@newsa={0xfc, 0x10, 0x1, 0x0, 0x0, {{@in6=@mcast1={0xff, 0x1, [], 0x1}, @in6=@dev={0xfe, 0x80}}, {@in6=@mcast1={0xff, 0x1, [], 0x1}, 0x0, 0x32}, @in=@multicast1=0xe0000001, {}, {}, {}, 0x0, 0x0, 0x2}, [@sec_ctx={0xc, 0x8, {0x8, 0x8}}]}, 0xfc}, 0x1}, 0x0) [ 115.554545] blk_update_request: I/O error, dev loop5, sector 301 [ 115.554550] Buffer I/O error on dev loop5p4, logical block 0, async page read [ 115.554576] blk_update_request: I/O error, dev loop5, sector 301 [ 115.554581] Buffer I/O error on dev loop5p4, logical block 0, async page read 2033/05/18 03:33:41 executing program 0: r0 = open(&(0x7f0000000040)='./bus\x00', 0x141042, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f00000000c0)='vfat\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f0000000140), 0x0, 0x2}], 0x0, &(0x7f0000000600)=ANY=[]) getdents64(0xffffffffffffffff, &(0x7f0000000100)=""/244, 0xf4) ioctl$EVIOCGBITKEY(0xffffffffffffffff, 0x80404521, &(0x7f0000001b80)=""/85) getdents64(0xffffffffffffffff, &(0x7f0000000df0)=""/528, 0xff95) recvfrom$inet(0xffffffffffffffff, &(0x7f0000000780)=""/250, 0xfa, 0x3, &(0x7f0000000480)={0x2, 0x4e21, @loopback=0x7f000001}, 0x10) r1 = socket$netlink(0x10, 0x3, 0x0) writev(r1, &(0x7f0000001a40)=[{&(0x7f0000000780)}], 0x1) r2 = dup2(0xffffffffffffffff, 0xffffffffffffffff) r3 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000500)='IPVS\x00') accept$packet(0xffffffffffffffff, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @random}, &(0x7f0000000580)=0x2) ioctl$TIOCSWINSZ(r2, 0x5414, &(0x7f00000017c0)={0x0, 0x60b, 0x4}) write$cgroup_pid(0xffffffffffffffff, &(0x7f00000005c0)={[0x0, 0x0]}, 0x2) accept(r2, &(0x7f00000006c0)=@hci, &(0x7f0000000740)=0x80) sendmsg$IPVS_CMD_GET_INFO(0xffffffffffffffff, &(0x7f00000004c0)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x20010}, 0xc, &(0x7f0000000440)={&(0x7f0000000380)=ANY=[@ANYRES16=r3], 0x1}, 0x1}, 0x0) getsockopt$IPT_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x40, &(0x7f0000000280)={'raw\x00'}, &(0x7f0000000540)=0x54) fallocate(r0, 0x0, 0xffff, 0x4) ioctl$KDGKBTYPE(0xffffffffffffffff, 0x4b33, &(0x7f0000000680)) r4 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) fallocate(r4, 0x1, 0x7fff, 0x10000101) dup(0xffffffffffffffff) 2033/05/18 03:33:41 executing program 4: r0 = open(&(0x7f0000000040)='./bus\x00', 0x141042, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f00000000c0)='vfat\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f0000000140), 0x0, 0x2}], 0x0, &(0x7f0000000600)=ANY=[]) getdents64(0xffffffffffffffff, &(0x7f0000000100)=""/244, 0xf4) ioctl$EVIOCGBITKEY(0xffffffffffffffff, 0x80404521, &(0x7f0000001b80)=""/85) getdents64(0xffffffffffffffff, &(0x7f0000000df0)=""/528, 0xff95) recvfrom$inet(0xffffffffffffffff, &(0x7f0000000780)=""/250, 0xfa, 0x3, &(0x7f0000000480)={0x2, 0x4e21, @loopback=0x7f000001}, 0x10) r1 = socket$netlink(0x10, 0x3, 0x0) writev(r1, &(0x7f0000001a40)=[{&(0x7f0000000780)}], 0x1) r2 = dup2(0xffffffffffffffff, 0xffffffffffffffff) r3 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000500)='IPVS\x00') accept$packet(0xffffffffffffffff, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @random}, &(0x7f0000000580)=0x2) ioctl$TIOCSWINSZ(r2, 0x5414, &(0x7f00000017c0)={0x0, 0x60b, 0x4}) write$cgroup_pid(0xffffffffffffffff, &(0x7f00000005c0)={[0x0, 0x0]}, 0x2) accept(r2, &(0x7f00000006c0)=@hci, &(0x7f0000000740)=0x80) sendmsg$IPVS_CMD_GET_INFO(0xffffffffffffffff, &(0x7f00000004c0)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x20010}, 0xc, &(0x7f0000000440)={&(0x7f0000000380)=ANY=[@ANYRES16=r3], 0x1}, 0x1}, 0x0) getsockopt$IPT_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x40, &(0x7f0000000280)={'raw\x00'}, &(0x7f0000000540)=0x54) fallocate(r0, 0x0, 0xffff, 0x4) ioctl$KDGKBTYPE(0xffffffffffffffff, 0x4b33, &(0x7f0000000680)) r4 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) fallocate(r4, 0x1, 0x7fff, 0x10000101) dup(0xffffffffffffffff) [ 115.554609] blk_update_request: I/O error, dev loop5, sector 301 [ 115.554614] Buffer I/O error on dev loop5p4, logical block 0, async page read 2033/05/18 03:33:41 executing program 7: r0 = open(&(0x7f0000000040)='./bus\x00', 0x141042, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f00000000c0)='vfat\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f0000000140), 0x0, 0x2}], 0x0, &(0x7f0000000600)=ANY=[]) getdents64(0xffffffffffffffff, &(0x7f0000000100)=""/244, 0xf4) ioctl$EVIOCGBITKEY(0xffffffffffffffff, 0x80404521, &(0x7f0000001b80)=""/85) getdents64(0xffffffffffffffff, &(0x7f0000000df0)=""/528, 0xff95) recvfrom$inet(0xffffffffffffffff, &(0x7f0000000780)=""/250, 0xfa, 0x3, &(0x7f0000000480)={0x2, 0x4e21, @loopback=0x7f000001}, 0x10) r1 = socket$netlink(0x10, 0x3, 0x0) writev(r1, &(0x7f0000001a40)=[{&(0x7f0000000780)}], 0x1) r2 = dup2(0xffffffffffffffff, 0xffffffffffffffff) r3 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000500)='IPVS\x00') accept$packet(0xffffffffffffffff, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @random}, &(0x7f0000000580)=0x2) ioctl$TIOCSWINSZ(r2, 0x5414, &(0x7f00000017c0)={0x0, 0x60b, 0x4}) write$cgroup_pid(0xffffffffffffffff, &(0x7f00000005c0)={[0x0, 0x0]}, 0x2) accept(r2, &(0x7f00000006c0)=@hci, &(0x7f0000000740)=0x80) sendmsg$IPVS_CMD_GET_INFO(0xffffffffffffffff, &(0x7f00000004c0)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x20010}, 0xc, &(0x7f0000000440)={&(0x7f0000000380)=ANY=[@ANYRES16=r3], 0x1}, 0x1}, 0x0) getsockopt$IPT_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x40, &(0x7f0000000280)={'raw\x00'}, &(0x7f0000000540)=0x54) fallocate(r0, 0x0, 0xffff, 0x4) ioctl$KDGKBTYPE(0xffffffffffffffff, 0x4b33, &(0x7f0000000680)) r4 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) fallocate(r4, 0x1, 0x7fff, 0x10000101) dup(0xffffffffffffffff) 2033/05/18 03:33:41 executing program 1: r0 = socket$inet(0x2, 0x840000000003, 0x2) setsockopt$inet_int(r0, 0x0, 0x32, &(0x7f0000000040), 0x4) [ 115.554639] blk_update_request: I/O error, dev loop5, sector 301 [ 115.554643] Buffer I/O error on dev loop5p4, logical block 0, async page read [ 115.554669] blk_update_request: I/O error, dev loop5, sector 301 [ 115.554674] Buffer I/O error on dev loop5p4, logical block 0, async page read 2033/05/18 03:33:41 executing program 1: r0 = syz_open_dev$sndseq(&(0x7f0000000080)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_UNSUBSCRIBE_PORT(r0, 0x40505331, &(0x7f0000000280)={{}, {0x0, 0x6}}) 2033/05/18 03:33:41 executing program 2: mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x0, 0x32, 0xffffffffffffffff, 0x0) socketpair(0x0, 0x0, 0x0, &(0x7f0000000500)) mlockall(0x3) mmap(&(0x7f0000000000/0xff7000)=nil, 0xff7000, 0x0, 0x32, 0xffffffffffffffff, 0x0) userfaultfd(0x0) setsockopt$netlink_NETLINK_CAP_ACK(0xffffffffffffffff, 0x10e, 0xa, &(0x7f0000000080)=0x7fffffff, 0x4) pselect6(0x14, &(0x7f00000000c0), &(0x7f0000000fc0), &(0x7f0000013fc0), &(0x7f0000000ff0), &(0x7f0000000ff0)={&(0x7f0000001000), 0x8}) fcntl$getown(0xffffffffffffffff, 0x9) [ 115.554699] Buffer I/O error on dev loop5p4, logical block 0, async page read [ 115.648516] loop5: p1 p2 p3 < > p4 < > [ 115.762181] FAT-fs (loop0): bogus number of reserved sectors 2033/05/18 03:33:41 executing program 1: socket$inet_tcp(0x2, 0x1, 0x0) r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40000000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(0xffffffffffffffff, 0x84, 0x18, &(0x7f00000000c0)={0x0}, &(0x7f0000000100)=0x8) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000180)='/dev/loop-control\x00', 0x20200, 0x0) ioctl$LOOP_CTL_ADD(r2, 0x4c80, 0x0) tgkill(0x0, 0x0, 0x0) eventfd2(0x0, 0x0) fallocate(r0, 0x2, 0x2, 0x92d) ioctl$LOOP_CTL_GET_FREE(r2, 0x4c82) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, 0x0) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, 0x0) r3 = openat$selinux_status(0xffffffffffffff9c, &(0x7f00000002c0)='/selinux/status\x00', 0x0, 0x0) ioctl$EVIOCSFF(r3, 0x40304580, &(0x7f0000000300)=ANY=[@ANYBLOB="54000004020007e58d00cb26901f0000000007000008810000080000020078b25e02000091970600"]) getsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(0xffffffffffffffff, 0x84, 0x6, &(0x7f00000001c0)={r1, @in={{0x2, 0x4e23, @multicast1=0xe0000001}}}, &(0x7f0000000280)=0x84) ioctl$PIO_UNIMAP(0xffffffffffffffff, 0x4b67, &(0x7f00000003c0)={0x2, &(0x7f0000000380)=[{0x5749}, {0x200, 0xfffffffffffffffd}]}) [ 115.762187] FAT-fs (loop0): Can't find a valid FAT filesystem [ 115.944713] loop5: p1 p2 p3 < > p4 < > [ 116.045615] FAT-fs (loop7): bogus number of reserved sectors [ 116.045633] FAT-fs (loop7): Can't find a valid FAT filesystem 2033/05/18 03:33:41 executing program 1: r0 = socket$inet(0x2, 0x3, 0x19) ioctl$sock_proto_private(r0, 0x89e0, &(0x7f0000000100)="da") 2033/05/18 03:33:41 executing program 0: r0 = open(&(0x7f0000000040)='./bus\x00', 0x141042, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f00000000c0)='vfat\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f0000000140), 0x0, 0x2}], 0x0, &(0x7f0000000600)=ANY=[]) getdents64(0xffffffffffffffff, &(0x7f0000000100)=""/244, 0xf4) ioctl$EVIOCGBITKEY(0xffffffffffffffff, 0x80404521, &(0x7f0000001b80)=""/85) getdents64(0xffffffffffffffff, &(0x7f0000000df0)=""/528, 0xff95) recvfrom$inet(0xffffffffffffffff, &(0x7f0000000780)=""/250, 0xfa, 0x3, &(0x7f0000000480)={0x2, 0x4e21, @loopback=0x7f000001}, 0x10) r1 = socket$netlink(0x10, 0x3, 0x0) writev(r1, &(0x7f0000001a40)=[{&(0x7f0000000780)}], 0x1) r2 = dup2(0xffffffffffffffff, 0xffffffffffffffff) r3 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000500)='IPVS\x00') accept$packet(0xffffffffffffffff, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @random}, &(0x7f0000000580)=0x2) ioctl$TIOCSWINSZ(r2, 0x5414, &(0x7f00000017c0)={0x0, 0x60b, 0x4}) write$cgroup_pid(0xffffffffffffffff, &(0x7f00000005c0)={[0x0, 0x0]}, 0x2) accept(r2, &(0x7f00000006c0)=@hci, &(0x7f0000000740)=0x80) sendmsg$IPVS_CMD_GET_INFO(0xffffffffffffffff, &(0x7f00000004c0)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x20010}, 0xc, &(0x7f0000000440)={&(0x7f0000000380)=ANY=[@ANYRES16=r3], 0x1}, 0x1}, 0x0) getsockopt$IPT_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x40, &(0x7f0000000280)={'raw\x00'}, &(0x7f0000000540)=0x54) fallocate(r0, 0x0, 0xffff, 0x4) ioctl$KDGKBTYPE(0xffffffffffffffff, 0x4b33, &(0x7f0000000680)) r4 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) fallocate(r4, 0x1, 0x7fff, 0x10000101) dup(0xffffffffffffffff) 2033/05/18 03:33:41 executing program 4: r0 = open(&(0x7f0000000040)='./bus\x00', 0x141042, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f00000000c0)='vfat\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f0000000140), 0x0, 0x2}], 0x0, &(0x7f0000000600)=ANY=[]) getdents64(0xffffffffffffffff, &(0x7f0000000100)=""/244, 0xf4) ioctl$EVIOCGBITKEY(0xffffffffffffffff, 0x80404521, &(0x7f0000001b80)=""/85) getdents64(0xffffffffffffffff, &(0x7f0000000df0)=""/528, 0xff95) recvfrom$inet(0xffffffffffffffff, &(0x7f0000000780)=""/250, 0xfa, 0x3, &(0x7f0000000480)={0x2, 0x4e21, @loopback=0x7f000001}, 0x10) r1 = socket$netlink(0x10, 0x3, 0x0) writev(r1, &(0x7f0000001a40)=[{&(0x7f0000000780)}], 0x1) r2 = dup2(0xffffffffffffffff, 0xffffffffffffffff) r3 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000500)='IPVS\x00') accept$packet(0xffffffffffffffff, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @random}, &(0x7f0000000580)=0x2) ioctl$TIOCSWINSZ(r2, 0x5414, &(0x7f00000017c0)={0x0, 0x60b, 0x4}) write$cgroup_pid(0xffffffffffffffff, &(0x7f00000005c0)={[0x0, 0x0]}, 0x2) accept(r2, &(0x7f00000006c0)=@hci, &(0x7f0000000740)=0x80) sendmsg$IPVS_CMD_GET_INFO(0xffffffffffffffff, &(0x7f00000004c0)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x20010}, 0xc, &(0x7f0000000440)={&(0x7f0000000380)=ANY=[@ANYRES16=r3], 0x1}, 0x1}, 0x0) getsockopt$IPT_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x40, &(0x7f0000000280)={'raw\x00'}, &(0x7f0000000540)=0x54) fallocate(r0, 0x0, 0xffff, 0x4) ioctl$KDGKBTYPE(0xffffffffffffffff, 0x4b33, &(0x7f0000000680)) r4 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) fallocate(r4, 0x1, 0x7fff, 0x10000101) dup(0xffffffffffffffff) 2033/05/18 03:33:41 executing program 3: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt(r0, 0x88, 0x0, &(0x7f0000000280), 0x0) 2033/05/18 03:33:41 executing program 5: r0 = openat$selinux_avc_cache_stats(0xffffffffffffff9c, &(0x7f00000002c0)='/selinux/avc/cache_stats\x00', 0x0, 0x0) clock_gettime(0x0, &(0x7f00000000c0)) clock_gettime(0x0, &(0x7f0000000200)) write$sndseq(r0, &(0x7f00000015c0)=[{0xfda, 0x0, 0x424, 0x275f7cf9, @tick=0x6, {0x0, 0x2}, {}, @ext={0x0, &(0x7f0000000500)}}, {0x0, 0x0, 0xffffffffffffff54, 0x0, @tick, {0x2, 0xffffffff}, {0x67, 0x1}, @addr={0x7ff, 0xfffffffffffffffc}}], 0x60) getpeername$packet(0xffffffffffffffff, &(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @broadcast}, &(0x7f0000000340)=0x14) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KDSKBSENT(0xffffffffffffffff, 0x4b49, &(0x7f0000000400)="1b") openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000080)='cgroup.procs\x00', 0x2, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x406, r1) syz_read_part_table(0xfffffffffffffffe, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="000000000000000000000000000000000000000000000000ed793afe00000000020082012600010000006400000000012700fd030c00650000006400000000030d0085043100c90000006400000000043200052020002d010000d306000055aa", 0x60, 0x1a0}]) openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000380)='/selinux/enforce\x00', 0x80000, 0x0) 2033/05/18 03:33:41 executing program 7: r0 = open(&(0x7f0000000040)='./bus\x00', 0x141042, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f00000000c0)='vfat\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f0000000140), 0x0, 0x2}], 0x0, &(0x7f0000000600)=ANY=[]) getdents64(0xffffffffffffffff, &(0x7f0000000100)=""/244, 0xf4) ioctl$EVIOCGBITKEY(0xffffffffffffffff, 0x80404521, &(0x7f0000001b80)=""/85) getdents64(0xffffffffffffffff, &(0x7f0000000df0)=""/528, 0xff95) recvfrom$inet(0xffffffffffffffff, &(0x7f0000000780)=""/250, 0xfa, 0x3, &(0x7f0000000480)={0x2, 0x4e21, @loopback=0x7f000001}, 0x10) r1 = socket$netlink(0x10, 0x3, 0x0) writev(r1, &(0x7f0000001a40)=[{&(0x7f0000000780)}], 0x1) r2 = dup2(0xffffffffffffffff, 0xffffffffffffffff) r3 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000500)='IPVS\x00') accept$packet(0xffffffffffffffff, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @random}, &(0x7f0000000580)=0x2) ioctl$TIOCSWINSZ(r2, 0x5414, &(0x7f00000017c0)={0x0, 0x60b, 0x4}) write$cgroup_pid(0xffffffffffffffff, &(0x7f00000005c0)={[0x0, 0x0]}, 0x2) accept(r2, &(0x7f00000006c0)=@hci, &(0x7f0000000740)=0x80) sendmsg$IPVS_CMD_GET_INFO(0xffffffffffffffff, &(0x7f00000004c0)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x20010}, 0xc, &(0x7f0000000440)={&(0x7f0000000380)=ANY=[@ANYRES16=r3], 0x1}, 0x1}, 0x0) getsockopt$IPT_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x40, &(0x7f0000000280)={'raw\x00'}, &(0x7f0000000540)=0x54) fallocate(r0, 0x0, 0xffff, 0x4) ioctl$KDGKBTYPE(0xffffffffffffffff, 0x4b33, &(0x7f0000000680)) r4 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) fallocate(r4, 0x1, 0x7fff, 0x10000101) dup(0xffffffffffffffff) 2033/05/18 03:33:41 executing program 2: mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x0, 0x32, 0xffffffffffffffff, 0x0) socketpair(0x0, 0x0, 0x0, &(0x7f0000000500)) mlockall(0x3) mmap(&(0x7f0000000000/0xff7000)=nil, 0xff7000, 0x0, 0x32, 0xffffffffffffffff, 0x0) userfaultfd(0x0) setsockopt$netlink_NETLINK_CAP_ACK(0xffffffffffffffff, 0x10e, 0xa, &(0x7f0000000080)=0x7fffffff, 0x4) pselect6(0x14, &(0x7f00000000c0), &(0x7f0000000fc0), &(0x7f0000013fc0), &(0x7f0000000ff0), &(0x7f0000000ff0)={&(0x7f0000001000), 0x8}) fcntl$getown(0xffffffffffffffff, 0x9) 2033/05/18 03:33:41 executing program 6: perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x1, 0x0, 0x7fff000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x400}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$bt_l2cap_L2CAP_LM(0xffffffffffffffff, 0x6, 0x3, &(0x7f0000000140)=0x4, 0x4) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x31, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = creat(&(0x7f0000000440)='./bus\x00', 0x0) r1 = open(&(0x7f0000000000)='./bus\x00', 0x26302, 0x0) ftruncate(r1, 0x80000) sendfile(r0, r1, &(0x7f0000d83ff8), 0x8000fffffffe) 2033/05/18 03:33:41 executing program 3: preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000001200)=""/148, 0x94}], 0x100000000000039a, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='net/fib_trie\x00') preadv(r0, &(0x7f0000000480)=[{&(0x7f0000000280)=""/209}, {&(0x7f0000000380)=""/242}], 0x10000000000002a1, 0x10400003) [ 116.538263] FAT-fs (loop7): bogus number of reserved sectors [ 116.558409] FAT-fs (loop0): bogus number of reserved sectors [ 116.558517] FAT-fs (loop0): Can't find a valid FAT filesystem [ 116.583294] loop5: p1 p2 p3 < > p4 < > [ 116.649549] FAT-fs (loop7): Can't find a valid FAT filesystem [ 116.845137] loop_reread_partitions: partition scan of loop5 () failed (rc=-16) 2033/05/18 03:33:42 executing program 1: syz_mount_image$iso9660(&(0x7f0000000000)='iso9660\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f0000000280), 0x0, &(0x7f0000000300)={[{@nojoliet='nojoliet', 0x2c}]}) 2033/05/18 03:33:42 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f000008bfc8)={&(0x7f0000ec8000)={0x10}, 0xc, &(0x7f00004c7ff0)={&(0x7f0000000000)={0x14, 0x2, 0x3, 0x21}, 0x14}, 0x1}, 0x0) 2033/05/18 03:33:42 executing program 4: r0 = open(&(0x7f0000000040)='./bus\x00', 0x141042, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f00000000c0)='vfat\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f0000000140), 0x0, 0x2}], 0x0, &(0x7f0000000600)=ANY=[]) getdents64(0xffffffffffffffff, &(0x7f0000000100)=""/244, 0xf4) ioctl$EVIOCGBITKEY(0xffffffffffffffff, 0x80404521, &(0x7f0000001b80)=""/85) getdents64(0xffffffffffffffff, &(0x7f0000000df0)=""/528, 0xff95) recvfrom$inet(0xffffffffffffffff, &(0x7f0000000780)=""/250, 0xfa, 0x3, &(0x7f0000000480)={0x2, 0x4e21, @loopback=0x7f000001}, 0x10) r1 = socket$netlink(0x10, 0x3, 0x0) writev(r1, &(0x7f0000001a40)=[{&(0x7f0000000780)}], 0x1) r2 = dup2(0xffffffffffffffff, 0xffffffffffffffff) r3 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000500)='IPVS\x00') accept$packet(0xffffffffffffffff, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @random}, &(0x7f0000000580)=0x2) ioctl$TIOCSWINSZ(r2, 0x5414, &(0x7f00000017c0)={0x0, 0x60b, 0x4}) write$cgroup_pid(0xffffffffffffffff, &(0x7f00000005c0)={[0x0, 0x0]}, 0x2) accept(r2, &(0x7f00000006c0)=@hci, &(0x7f0000000740)=0x80) sendmsg$IPVS_CMD_GET_INFO(0xffffffffffffffff, &(0x7f00000004c0)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x20010}, 0xc, &(0x7f0000000440)={&(0x7f0000000380)=ANY=[@ANYRES16=r3], 0x1}, 0x1}, 0x0) getsockopt$IPT_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x40, &(0x7f0000000280)={'raw\x00'}, &(0x7f0000000540)=0x54) fallocate(r0, 0x0, 0xffff, 0x4) ioctl$KDGKBTYPE(0xffffffffffffffff, 0x4b33, &(0x7f0000000680)) r4 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) fallocate(r4, 0x1, 0x7fff, 0x10000101) dup(0xffffffffffffffff) 2033/05/18 03:33:42 executing program 2: prctl$intptr(0x8000000000000008, 0x1) 2033/05/18 03:33:42 executing program 5: r0 = openat$selinux_avc_cache_stats(0xffffffffffffff9c, &(0x7f00000002c0)='/selinux/avc/cache_stats\x00', 0x0, 0x0) clock_gettime(0x0, &(0x7f00000000c0)) clock_gettime(0x0, &(0x7f0000000200)) write$sndseq(r0, &(0x7f00000015c0)=[{0xfda, 0x0, 0x424, 0x275f7cf9, @tick=0x6, {0x0, 0x2}, {}, @ext={0x0, &(0x7f0000000500)}}, {0x0, 0x0, 0xffffffffffffff54, 0x0, @tick, {0x2, 0xffffffff}, {0x67, 0x1}, @addr={0x7ff, 0xfffffffffffffffc}}], 0x60) getpeername$packet(0xffffffffffffffff, &(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @broadcast}, &(0x7f0000000340)=0x14) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KDSKBSENT(0xffffffffffffffff, 0x4b49, &(0x7f0000000400)="1b") openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000080)='cgroup.procs\x00', 0x2, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x406, r1) syz_read_part_table(0xfffffffffffffffe, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="000000000000000000000000000000000000000000000000ed793afe00000000020082012600010000006400000000012700fd030c00650000006400000000030d0085043100c90000006400000000043200052020002d010000d306000055aa", 0x60, 0x1a0}]) openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000380)='/selinux/enforce\x00', 0x80000, 0x0) 2033/05/18 03:33:42 executing program 0: r0 = open(&(0x7f0000000040)='./bus\x00', 0x141042, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f00000000c0)='vfat\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f0000000140), 0x0, 0x2}], 0x0, &(0x7f0000000600)=ANY=[]) getdents64(0xffffffffffffffff, &(0x7f0000000100)=""/244, 0xf4) ioctl$EVIOCGBITKEY(0xffffffffffffffff, 0x80404521, &(0x7f0000001b80)=""/85) getdents64(0xffffffffffffffff, &(0x7f0000000df0)=""/528, 0xff95) recvfrom$inet(0xffffffffffffffff, &(0x7f0000000780)=""/250, 0xfa, 0x3, &(0x7f0000000480)={0x2, 0x4e21, @loopback=0x7f000001}, 0x10) r1 = socket$netlink(0x10, 0x3, 0x0) writev(r1, &(0x7f0000001a40)=[{&(0x7f0000000780)}], 0x1) r2 = dup2(0xffffffffffffffff, 0xffffffffffffffff) r3 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000500)='IPVS\x00') accept$packet(0xffffffffffffffff, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @random}, &(0x7f0000000580)=0x2) ioctl$TIOCSWINSZ(r2, 0x5414, &(0x7f00000017c0)={0x0, 0x60b, 0x4}) write$cgroup_pid(0xffffffffffffffff, &(0x7f00000005c0)={[0x0, 0x0]}, 0x2) accept(r2, &(0x7f00000006c0)=@hci, &(0x7f0000000740)=0x80) sendmsg$IPVS_CMD_GET_INFO(0xffffffffffffffff, &(0x7f00000004c0)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x20010}, 0xc, &(0x7f0000000440)={&(0x7f0000000380)=ANY=[@ANYRES16=r3], 0x1}, 0x1}, 0x0) getsockopt$IPT_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x40, &(0x7f0000000280)={'raw\x00'}, &(0x7f0000000540)=0x54) fallocate(r0, 0x0, 0xffff, 0x4) ioctl$KDGKBTYPE(0xffffffffffffffff, 0x4b33, &(0x7f0000000680)) r4 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) fallocate(r4, 0x1, 0x7fff, 0x10000101) dup(0xffffffffffffffff) 2033/05/18 03:33:42 executing program 6: syz_read_part_table(0x0, 0x2, &(0x7f00000004c0)=[{&(0x7f0000001140)="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", 0x1e3, 0x9}, {&(0x7f0000000480), 0x0, 0xfff}]) 2033/05/18 03:33:42 executing program 7: r0 = open(&(0x7f0000000040)='./bus\x00', 0x141042, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f00000000c0)='vfat\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f0000000140), 0x0, 0x2}], 0x0, &(0x7f0000000600)=ANY=[]) getdents64(0xffffffffffffffff, &(0x7f0000000100)=""/244, 0xf4) ioctl$EVIOCGBITKEY(0xffffffffffffffff, 0x80404521, &(0x7f0000001b80)=""/85) getdents64(0xffffffffffffffff, &(0x7f0000000df0)=""/528, 0xff95) recvfrom$inet(0xffffffffffffffff, &(0x7f0000000780)=""/250, 0xfa, 0x3, &(0x7f0000000480)={0x2, 0x4e21, @loopback=0x7f000001}, 0x10) r1 = socket$netlink(0x10, 0x3, 0x0) writev(r1, &(0x7f0000001a40)=[{&(0x7f0000000780)}], 0x1) r2 = dup2(0xffffffffffffffff, 0xffffffffffffffff) r3 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000500)='IPVS\x00') accept$packet(0xffffffffffffffff, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @random}, &(0x7f0000000580)=0x2) ioctl$TIOCSWINSZ(r2, 0x5414, &(0x7f00000017c0)={0x0, 0x60b, 0x4}) write$cgroup_pid(0xffffffffffffffff, &(0x7f00000005c0)={[0x0, 0x0]}, 0x2) accept(r2, &(0x7f00000006c0)=@hci, &(0x7f0000000740)=0x80) sendmsg$IPVS_CMD_GET_INFO(0xffffffffffffffff, &(0x7f00000004c0)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x20010}, 0xc, &(0x7f0000000440)={&(0x7f0000000380)=ANY=[@ANYRES16=r3], 0x1}, 0x1}, 0x0) getsockopt$IPT_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x40, &(0x7f0000000280)={'raw\x00'}, &(0x7f0000000540)=0x54) fallocate(r0, 0x0, 0xffff, 0x4) ioctl$KDGKBTYPE(0xffffffffffffffff, 0x4b33, &(0x7f0000000680)) r4 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) fallocate(r4, 0x1, 0x7fff, 0x10000101) dup(0xffffffffffffffff) 2033/05/18 03:33:42 executing program 2: r0 = creat(&(0x7f0000000080)='./file0\x00', 0x0) write$cgroup_pid(r0, &(0x7f0000000580)=ANY=[], 0xfffffce5) r1 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) lseek(r1, 0x1000, 0x4) 2033/05/18 03:33:42 executing program 3: socket$inet_tcp(0x2, 0x1, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x40000000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(0xffffffffffffffff, 0x84, 0x18, &(0x7f00000000c0), &(0x7f0000000100)=0x8) r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000180)='/dev/loop-control\x00', 0x20200, 0x0) tgkill(0x0, 0x0, 0x0) eventfd2(0x2, 0x1) r1 = ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r1) ioctl$PIO_UNIMAP(0xffffffffffffffff, 0x4b67, &(0x7f00000003c0)={0x2, &(0x7f0000000380)=[{0x5749}, {0x200, 0xfffffffffffffffd}]}) [ 117.086814] ISOFS: Unable to identify CD-ROM format. [ 117.111892] Dev loop6: unable to read RDB block 15 [ 117.118144] loop6: unable to read partition table [ 117.131885] FAT-fs (loop7): bogus number of reserved sectors [ 117.131903] FAT-fs (loop7): Can't find a valid FAT filesystem [ 117.133328] FAT-fs (loop0): bogus number of reserved sectors [ 117.133346] FAT-fs (loop0): Can't find a valid FAT filesystem [ 117.188795] ISOFS: Unable to identify CD-ROM format. [ 117.242308] loop6: partition table beyond EOD, [ 117.247982] loop5: p1 p2 p3 < > p4 < > [ 117.277759] truncated 2033/05/18 03:33:42 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000140)={0xa, 0xffffffffffffffee, 0x0, @ipv4={[], [0xff, 0xff], @broadcast=0xffffffff}}, 0x1c) 2033/05/18 03:33:42 executing program 3: socket$inet_tcp(0x2, 0x1, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x40000000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(0xffffffffffffffff, 0x84, 0x18, &(0x7f00000000c0), &(0x7f0000000100)=0x8) r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000180)='/dev/loop-control\x00', 0x20200, 0x0) tgkill(0x0, 0x0, 0x0) eventfd2(0x2, 0x1) r1 = ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r1) ioctl$PIO_UNIMAP(0xffffffffffffffff, 0x4b67, &(0x7f00000003c0)={0x2, &(0x7f0000000380)=[{0x5749}, {0x200, 0xfffffffffffffffd}]}) [ 117.297686] loop_reread_partitions: partition scan of loop6 () failed (rc=-5) 2033/05/18 03:33:42 executing program 1: socket$inet_tcp(0x2, 0x1, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x40000000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(0xffffffffffffffff, 0x84, 0x18, &(0x7f00000000c0), &(0x7f0000000100)=0x8) r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000180)='/dev/loop-control\x00', 0x20200, 0x0) tgkill(0x0, 0x0, 0x0) eventfd2(0x2, 0x1) r1 = ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r1) ioctl$PIO_UNIMAP(0xffffffffffffffff, 0x4b67, &(0x7f00000003c0)={0x2, &(0x7f0000000380)=[{0x5749}, {0x200, 0xfffffffffffffffd}]}) 2033/05/18 03:33:42 executing program 4: mmap(&(0x7f0000a93000/0x4000)=nil, 0x4000, 0x1, 0x8972, 0xffffffffffffffff, 0x0) mremap(&(0x7f0000a95000/0x2000)=nil, 0x2000, 0x800000, 0x3, &(0x7f0000130000/0x800000)=nil) add_key(&(0x7f0000002000)='dns_resolver\x00', &(0x7f00001e5000)={0x73, 0x79, 0x7a}, &(0x7f000013af7e)="63b5", 0x2, 0xffffffffffffffff) 2033/05/18 03:33:42 executing program 4: syz_mount_image$iso9660(&(0x7f0000000000)='iso9660\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010c00)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bb000000000000bb252f", 0x5a, 0x9000}], 0x0, &(0x7f0000000040)={[{@nojoliet='nojoliet', 0x2c}]}) 2033/05/18 03:33:42 executing program 3: socket$inet_tcp(0x2, 0x1, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x40000000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(0xffffffffffffffff, 0x84, 0x18, &(0x7f00000000c0), &(0x7f0000000100)=0x8) r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000180)='/dev/loop-control\x00', 0x20200, 0x0) tgkill(0x0, 0x0, 0x0) eventfd2(0x2, 0x1) r1 = ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r1) ioctl$PIO_UNIMAP(0xffffffffffffffff, 0x4b67, &(0x7f00000003c0)={0x2, &(0x7f0000000380)=[{0x5749}, {0x200, 0xfffffffffffffffd}]}) 2033/05/18 03:33:42 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000000040)={0x2, 0x4e24, @rand_addr}, 0x10) setsockopt$sock_int(r0, 0x1, 0xf, &(0x7f0000016ffc)=0xfffff7fffffffffd, 0x2a3) listen(r0, 0x0) 2033/05/18 03:33:42 executing program 4: r0 = syz_open_dev$tun(&(0x7f0000000280)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f00000000c0)={"d202b999cf85000000000088f301e710", 0x102}) ioctl$TUNSETOFFLOAD(r0, 0x400454d0, 0xd) 2033/05/18 03:33:42 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000280)={'sit0\x00', &(0x7f0000000000)=@ethtool_cmd={0x19}}) INIT: Id "4" respawning too fast: disabled for 5 minutes INIT: Id "3" respawning too fast: disabled for 5 minutes INIT: Id "2" respawning too fast: disabled for 5 minutes INIT: Id "1" respawning too fast: disabled for 5 minutes INIT: Id "6" respawning too fast: disabled for 5 minutes INIT: Id "5" respawning too fast: disabled for 5 minutes [ 244.939739] INFO: task syz-executor0:3876 blocked for more than 120 seconds. [ 244.946944] Not tainted 4.9.97-g2bcbbd5 #11 [ 244.952310] "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. [ 244.960309] syz-executor0 D26600 3876 1 0x00000004 [ 244.966115] ffff8801c224b000 0000000000000000 ffff8801b5930a80 ffff8801d6850000 [ 244.974138] ffff8801db321b98 ffff8801bd3374e8 ffffffff839e375d ffff8801c224b8c8 [ 244.982164] ffffed0038449718 ffff8801c224b000 00fffc0000000000 ffff8801db322468 [ 244.990213] Call Trace: [ 244.992782] [] ? __schedule+0x64d/0x1bd0 [ 244.998468] [] schedule+0x7f/0x1b0 [ 245.003776] [] schedule_preempt_disabled+0x13/0x20 [ 245.010366] [] mutex_lock_nested+0x326/0x870 [ 245.016410] [] ? loop_probe+0x74/0x180 [ 245.021975] [] ? mutex_trylock+0x3e0/0x3e0 [ 245.027844] [] loop_probe+0x74/0x180 [ 245.033387] [] ? loop_control_ioctl+0x300/0x300 [ 245.039736] [] kobj_lookup+0x223/0x410 [ 245.045256] [] ? loop_control_ioctl+0x300/0x300 [ 245.051600] [] get_gendisk+0x39/0x2d0 [ 245.057038] [] __blkdev_get+0x351/0xd60 [ 245.062680] [] ? debug_check_no_locks_freed+0x210/0x210 [ 245.069714] [] ? __blkdev_put+0x840/0x840 [ 245.075491] [] ? fsnotify+0x114/0x1100 [ 245.081365] [] blkdev_get+0x2da/0x920 [ 245.086795] [] ? bd_may_claim+0xd0/0xd0 [ 245.092423] [] ? bd_acquire+0x27/0x250 [ 245.097937] [] ? bd_acquire+0x88/0x250 [ 245.103524] [] ? _raw_spin_unlock+0x2c/0x50 [ 245.109491] [] blkdev_open+0x1a5/0x250 [ 245.115040] [] do_dentry_open+0x703/0xc80 [ 245.121353] [] ? blkdev_get_by_dev+0x70/0x70 [ 245.127388] [] vfs_open+0x11c/0x210 [ 245.132672] [] ? may_open.isra.57+0x14f/0x2a0 [ 245.138793] [] path_openat+0x758/0x3590 [ 245.144555] [] ? save_stack+0xa9/0xd0 [ 245.150012] [] ? path_lookupat.isra.41+0x410/0x410 [ 245.156569] [] ? __lock_is_held+0xa2/0xf0 [ 245.162374] [] do_filp_open+0x197/0x270 [ 245.167975] [] ? may_open_dev+0xe0/0xe0 [ 245.173622] [] ? _raw_spin_unlock+0x2c/0x50 [ 245.179576] [] ? __alloc_fd+0x1d7/0x4a0 [ 245.185217] [] do_sys_open+0x30d/0x5c0 [ 245.190753] [] ? filp_open+0x70/0x70 [ 245.196091] [] ? done_path_create+0xcc/0x110 [ 245.202154] [] ? SyS_mkdir+0x16a/0x260 [ 245.207669] [] ? SyS_mkdirat+0x260/0x260 [ 245.213734] [] ? task_work_run+0x14a/0x180 [ 245.219632] [] SyS_open+0x2d/0x40 [ 245.224724] [] ? do_sys_open+0x5c0/0x5c0 [ 245.230454] [] do_syscall_64+0x1a6/0x490 [ 245.236144] [] entry_SYSCALL_64_after_swapgs+0x5d/0xdb [ 245.243079] [ 245.243079] Showing all locks held in the system: [ 245.249382] 2 locks held by khungtaskd/518: [ 245.253731] #0: (rcu_read_lock){......}, at: [] watchdog+0x11c/0xa20 [ 245.262463] #1: (tasklist_lock){.+.+..}, at: [] debug_show_all_locks+0x79/0x218 [ 245.272151] 2 locks held by getty/3779: [ 245.276103] #0: (&tty->ldisc_sem){++++++}, at: [] ldsem_down_read+0x32/0x40 [ 245.285438] #1: (&ldata->atomic_read_lock){+.+...}, at: [] n_tty_read+0x202/0x16e0 [ 245.295377] 1 lock held by syz-executor0/3876: [ 245.299964] #0: (loop_index_mutex){+.+.+.}, at: [] loop_probe+0x74/0x180 [ 245.309012] 2 locks held by syz-executor7/3887: [ 245.313682] #0: (&bdev->bd_mutex){+.+.+.}, at: [] __blkdev_get+0x10c/0xd60 [ 245.322914] #1: (loop_index_mutex){+.+.+.}, at: [] lo_open+0x1b/0xa0 [ 245.331645] 2 locks held by syz-executor5/11850: [ 245.336387] #0: (&lo->lo_ctl_mutex/1){+.+.+.}, at: [] lo_ioctl+0x8b/0x1aa0 [ 245.345754] #1: (&bdev->bd_mutex){+.+.+.}, at: [] blkdev_reread_part+0x1e/0x40 [ 245.355349] 2 locks held by syz-executor6/11855: [ 245.360105] #0: (&lo->lo_ctl_mutex/1){+.+.+.}, at: [] lo_ioctl+0x8b/0x1aa0 [ 245.369428] #1: (&bdev->bd_mutex){+.+.+.}, at: [] blkdev_reread_part+0x1e/0x40 [ 245.379019] 2 locks held by syz-executor1/11883: [ 245.383778] #0: (loop_index_mutex){+.+.+.}, at: [] loop_control_ioctl+0x7a/0x300 [ 245.393537] #1: (&lo->lo_ctl_mutex#2){+.+.+.}, at: [] loop_control_ioctl+0x186/0x300 [ 245.403753] 2 locks held by blkid/11885: [ 245.407788] #0: (&bdev->bd_mutex){+.+.+.}, at: [] __blkdev_get+0x10c/0xd60 [ 245.417018] #1: (loop_index_mutex){+.+.+.}, at: [] lo_open+0x1b/0xa0 [ 245.425728] 2 locks held by blkid/11886: [ 245.429781] #0: (&bdev->bd_mutex){+.+.+.}, at: [] __blkdev_get+0x10c/0xd60 [ 245.438988] #1: (loop_index_mutex){+.+.+.}, at: [] lo_open+0x1b/0xa0 [ 245.447724] 1 lock held by syz-executor3/11894: [ 245.452399] #0: (loop_index_mutex){+.+.+.}, at: [] loop_control_ioctl+0x7a/0x300 [ 245.462166] 1 lock held by syz-executor3/11904: [ 245.466807] #0: (loop_index_mutex){+.+.+.}, at: [] loop_control_ioctl+0x7a/0x300 [ 245.476555] [ 245.478156] ============================================= [ 245.478156] [ 245.485396] NMI backtrace for cpu 0 [ 245.489036] CPU: 0 PID: 518 Comm: khungtaskd Not tainted 4.9.97-g2bcbbd5 #11 [ 245.496200] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 245.505528] ffff8801d8497d08 ffffffff81eb0b69 0000000000000000 0000000000000000 [ 245.513520] 0000000000000000 0000000000000001 ffffffff810b7d60 ffff8801d8497d40 [ 245.521495] ffffffff81ebbe97 0000000000000000 0000000000000000 0000000000000003 [ 245.529474] Call Trace: [ 245.532032] [] dump_stack+0xc1/0x128 [ 245.537368] [] ? irq_force_complete_move+0x320/0x320 [ 245.544091] [] nmi_cpu_backtrace.cold.2+0x48/0x87 [ 245.550554] [] ? irq_force_complete_move+0x320/0x320 [ 245.557277] [] nmi_trigger_cpumask_backtrace+0x12a/0x14f [ 245.564348] [] arch_trigger_cpumask_backtrace+0x14/0x20 [ 245.571333] [] watchdog+0x6b4/0xa20 [ 245.576581] [] ? watchdog+0x11c/0xa20 [ 245.582006] [] kthread+0x26d/0x300 [ 245.587195] [] ? reset_hung_task_detector+0x20/0x20 [ 245.593836] [] ? kthread_park+0xa0/0xa0 [ 245.599432] [] ? kthread_park+0xa0/0xa0 [ 245.605027] [] ? kthread_park+0xa0/0xa0 [ 245.610623] [] ret_from_fork+0x5c/0x70 [ 245.616266] Sending NMI from CPU 0 to CPUs 1: [ 245.620783] NMI backtrace for cpu 1 skipped: idling at pc 0xffffffff839f3266 [ 245.628125] Kernel panic - not syncing: hung_task: blocked tasks [ 245.634262] CPU: 0 PID: 518 Comm: khungtaskd Not tainted 4.9.97-g2bcbbd5 #11 [ 245.641421] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 245.650750] ffff8801d8497cc8 ffffffff81eb0b69 ffffffff83c8b4e0 00000000ffffffff [ 245.658733] 0000000000000000 0000000000000000 dffffc0000000000 ffff8801d8497d88 [ 245.666711] ffffffff8141f975 0000000041b58ab3 ffffffff843b8408 ffffffff8141f7b6 [ 245.674694] Call Trace: [ 245.677257] [] dump_stack+0xc1/0x128 [ 245.682608] [] panic+0x1bf/0x3bc [ 245.687595] [] ? add_taint.cold.6+0x16/0x16 [ 245.693536] [] ? ___preempt_schedule+0x16/0x18 [ 245.699739] [] ? nmi_trigger_cpumask_backtrace+0x100/0x14f [ 245.706993] [] watchdog+0x6c5/0xa20 [ 245.712252] [] ? watchdog+0x11c/0xa20 [ 245.717673] [] kthread+0x26d/0x300 [ 245.722836] [] ? reset_hung_task_detector+0x20/0x20 [ 245.729470] [] ? kthread_park+0xa0/0xa0 [ 245.735077] [] ? kthread_park+0xa0/0xa0 [ 245.740670] [] ? kthread_park+0xa0/0xa0 [ 245.746351] [] ret_from_fork+0x5c/0x70 [ 245.752368] Dumping ftrace buffer: [ 245.755926] (ftrace buffer empty) [ 245.759609] Kernel Offset: disabled [ 245.763228] Rebooting in 86400 seconds..