5d7a37edd032552c60ffeb53a2c8eecbe601a4ac5dceeecf1a943c2d9e2eaf4ad0a93e82a1a37a0cf2adbc4b512680428fee922ad18ff90ec6f87a75b299a953167bf4f9ae31cffd2c31dd47ba7d69151424dc1b2835f7624a302f270eb89118043dc1e1faa46e667be9cbf4456ad0c580ed032e4e49459f68f8a70f2dfe40f51362ffae"], 0x1) pread64(r0, &(0x7f0000000340)=""/181, 0xb5, 0x62) setsockopt$inet_msfilter(r0, 0x0, 0x29, &(0x7f0000000580)=ANY=[@ANYBLOB="e00000027f0000010000000001000000000000006b59aa51deb20d6efc9c04b7c9420f6434d31cbbe99b52873a8c21"], 0x1) socket$inet_udp(0x2, 0x2, 0x0) bpf$BPF_PROG_GET_NEXT_ID(0xb, &(0x7f0000000400)=0x7, 0x4) r5 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000ba4000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x2, 0x78, 0xe2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, r5, 0x0) r6 = perf_event_open(&(0x7f0000014f88)={0x1, 0x78, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00002e8000)}}, 0x0, 0x0, r5, 0x0) readv(r6, &(0x7f0000734000)=[{&(0x7f0000d42000)=""/146, 0x92}], 0x1) getsockopt$inet_sctp_SCTP_PEER_ADDR_THLDS(0xffffffffffffffff, 0x84, 0x1f, &(0x7f0000000480)={0x0, @in={{0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0xd}}}, 0xf80866d, 0x5}, &(0x7f0000000540)=0x90) getsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(0xffffffffffffff9c, 0x84, 0x18, &(0x7f0000000440)={r7, 0x400000000004}, &(0x7f00000005c0)=0xffffffffffffffc3) getsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER_VALUE(r0, 0x84, 0x7c, &(0x7f00000002c0)={r8, 0x10001, 0xc9e9}, &(0x7f0000000300)=0x8) [ 482.419199] jfs: Unrecognized mount option "umask=?" or missing value [ 482.482276] audit: type=1326 audit(1522438963.505:9): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=5116 comm="syz-executor3" exe="/root/syz-executor3" sig=31 arch=c000003e syscall=202 compat=0 ip=0x454e79 code=0xffff0000 2018/03/30 19:42:43 executing program 4: symlinkat(&(0x7f0000002f00)='./file0\x00', 0xffffffffffffffff, &(0x7f0000002f80)='./file0\x00') syz_mount_image$msdos(&(0x7f0000002fc0)='msdos\x00', &(0x7f0000003000)='./file0\x00', 0x4, 0x1, &(0x7f0000003180)=[{&(0x7f0000003040)="eaf9610c9f7031a1f58e51e73b3f0bd5af4364c38bbe335dbd3d211ec0338ba4c795c634af757a3c684da6110f67891133a6303441b21d139e3a6582efdaeabd3d68dbcb85cd383733a98084b62807af0b7ea49d68daa4cc9fda43dbeb13c3e67c44c463a2c429ccb66c0e1a9dfd5c911d4d7b578baaad6571d4457b9c6d92122a4bd97f5f174c81081941b007062f2cab2db1466851dde671e025909a633fec433bb2512fc61c436b74df23d280019a403884dc488071", 0xb7, 0xcd7}], 0x8, &(0x7f00000031c0)={[{@errors_continue='errors=continue', 0x2c}, {@time_offset={'time_offset', 0x3d, [0x0]}, 0x2c}]}) pipe(&(0x7f0000002f40)={0xffffffffffffffff}) r1 = open(&(0x7f0000003240)='./file0\x00', 0xa0001, 0x20) linkat(r0, &(0x7f0000003200)='./file0\x00', r1, &(0x7f0000003280)='./file0\x00', 0x400) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x80000, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)}, {&(0x7f0000010d00)="0000000000000000000000000000000000000000000000000000000002ae0000ed41000000040000d15bbe5ad15bbe5ad15bbe5a00000000000005002000000000000800070000000af301000400000000000000000000000100000030000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a1950000", 0xa0, 0x8c60}, {&(0x7f0000011a00)="020000000c0001022e000000020000000c0002022e2e00000b00000014000a026c6f73742b666f756e6400000c0000001000050166696c65300000000d0000001000050266696c65310000000f0000001000050166696c6532000000100000001000050166696c6533000000110000001000050166696c65340000001200000010000802564944454f5f54531400000068031201d181d18ed0b7d0bad0b0d0bbd0bbd0b5d1800000000000000000000000000000000000000000000000000000", 0xc0, 0xc000}, {&(0x7f0000012200)="0000000000000000000000000000000000000000000000000c0000dec910dfd800000000f4030000000000000000000000000000000000000000000000000000", 0x40, 0x117e0}, {&(0x7f0000012a00)="0d0000000c0001022e000000020000000c0002022e2e00000e000000dc03050166696c6530000000000000000000000000000000000000000000000000000000", 0x40, 0x1c000}], 0x0, &(0x7f0000013000)) syz_mount_image$bfs(&(0x7f0000000040)='bfs\x00', &(0x7f00000008c0)='./file0\x00', 0x20, 0x2, &(0x7f0000000180)=[{&(0x7f00000005c0)="f37e57346e86cb5adec662d7bd6f13a3764d2ca7640f9f81ba88d0689d0989735a7bafd5558d9a6e8988f9f6038fa475e49077bc8cfc6e170c4cdbaaa1375895c9a4068559d3cecf2a0423caa696bf77a75b3ae3f32b79da059ca13d055647998987fc2033d008bd55deb08808372b9b4595fb0d79a1358cd5949d859a7d155e86db4b608eb401109f6b792f5ce4a2ead9870dee49347bc08d0d54b0e4fca4fd895947a737f4ee823d997770e5c9df50c0c9fe2c0b945c6ffd13b7151e385b631520ac34a5967c6cd0d12b3746795681600541c17d379daed41ce8e715eba582fb668e160872a2", 0xe7, 0x7}, {&(0x7f0000000780)="6154d093a5a905da96fed5f8dea36bcd9d1d011246f7caf86806bf6ac6301d2d2b448461b867bbbe7d0eebdeafa16d7219af85ff4372670039ce277546def59f1d0eed4be4386a34c7243fe3ec84ad3807136a2c3ec35d6d87a7d7bb9342622cc3a7ff529ef3d76ff57fc7a1856f50b98e518515a9e679067cfc0e8500754fa30a81cf4dc42c5a0d36647280c5b0a8506efaf9ad06594678176efe4bdbcf7ab384b597df4c5ad66b2bd240823abe04cd30785819f1c7fd4d46bb55f8bd09ca4b44618b010e363fa572ca189ec73b36ad46b6f38d65c0acc417", 0xd9, 0x5}], 0x200000, 0x0) syz_mount_image$jfs(&(0x7f0000000080)='jfs\x00', &(0x7f0000000880)='./file0\x00', 0xfffffffffffffffe, 0x3, &(0x7f0000002dc0)=[{&(0x7f0000000900)="efee47debce411554253d03f2175c060de26b9a7a197d9327971105aafdf17a061227fe7dd52d3c1c1f0318992f304f7646c3eb4e32ff0514d34d4605b4e152474aa71ac6c0ba890b1f249f213d5bc162b605fdf3c524d6f84e1a2f8461d26ef5dd50b193ffb710ee69fc431552ae4548f0c1a7e503243bb10c53c566f37e3234d8b3d418992dca946568d275e1f54895a854bab3790963108fe6ce5b1f933e81bd0aa2dfd715aca4bd81b48b28e3ee265", 0xb1, 0x1}, {&(0x7f0000001a80)="b4bc90ad72742e5693f04c7955b05460b33cd0ca9cde365dbe1671162a8c1db744cb8a04d1d747ab4d3234fd615e6ad897396c21b8bf7da2c1d524d04fadade841e5acfac529250a2c75fed4b65a7b6c8735268244189e020c526112728097958fd591d00cd16d1591db9b0414d985d7718794369eb03d89403b7df76f6d745c94d4fa986321a9915fea55a73472bc39620fcf22ec74d02b77fafe6ccf72605eb0ba7ae69fa10a36d281e65a178528bc654ce5b6109d5294e400b18be755a3b899489b27a876ac3ea033ed525b28c7dff537b5210cbff466dc339e1f58db1679816589e886264ef1bcf6d0e1408d93946827711972", 0xf5, 0x7}, {&(0x7f0000002cc0)="c9bc1928c9ffffe99fdae39f5013810a038f1d558affc92341c81ee308195dabd95fcfedcfccd4cf2af62477e5ed935114b73940dba239c47d5824a3332fb48cea682934a6840ea5db2529c3a7c371bbf08f08bb15458de586609be64b699f29b7384dc7b2ba78f0e343fb9851eaf5a7b4106fc5b7", 0x75, 0x4}], 0x10000, &(0x7f0000002ec0)={[{@nodiscard='nodiscard', 0x2c}, {@resize='resize', 0x2c}, {@noquota='noquota', 0x2c}, {@umask={'umask', 0x3d, [0x3f]}, 0x2c}]}) 2018/03/30 19:42:43 executing program 5: unshare(0x40000000) perf_event_open(&(0x7f000001d000)={0x2, 0x78, 0xe2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000000)={0x6, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket(0xa, 0x1, 0x0) r0 = socket$packet(0x11, 0x0, 0x300) r1 = openat$cuse(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/cuse\x00', 0x82, 0x0) io_setup(0x43f, &(0x7f00000000c0)=0x0) io_submit(r2, 0x1, &(0x7f0000000000)=[&(0x7f0000000200)={0x0, 0x0, 0x0, 0x1, 0x0, r1, &(0x7f0000000040)="10000000020400000000000000000000", 0x10}]) r3 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000280)='/proc/sys/net/ipv4/vs/secure_tcp\x00', 0x2, 0x0) sendmsg$kcm(r3, &(0x7f0000001f00)={&(0x7f0000001b40)=@pppol2tpin6={0x18, 0x1, {0x0, r0, 0x0, 0x1, 0x0, 0x0, {0xa, 0x4e24, 0xc1, @mcast1={0xff, 0x1, [], 0x1}}}}, 0x80, &(0x7f0000001d80)=[{&(0x7f0000001bc0)="a9db123ebf124fab0f2eec9774559e3b5870fb7c6818fc89c4b8742d057480657265ae2b34fb2d4e585d22ca1bf7b0a22ce38a20a819d919947c78f8d5c9f3291905fd3ed2b8ef8a79d9453396c6b0b7eb0778dbc49b32ae91e443b64edddcf320c1589c7777eadd4e57c01b20a8ca7a831e8e2c104d0194d52fb5c35b550f", 0x7f}], 0x1, &(0x7f0000001dc0)=ANY=[], 0x0, 0x90}, 0x20000000) r4 = syz_open_dev$tun(&(0x7f00000001c0)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r4, 0x400454ca, &(0x7f0000000200)={'bridge0\x00\x00p\x00', 0x4000000000001005}) socketpair(0x1d, 0x3, 0x40, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_inet_SIOCSIFADDR(r5, 0x8916, &(0x7f0000000100)={'bridge8\x00', {0x2, 0x0, @dev={0xac, 0x14, 0x14}}}) ioctl$LOOP_SET_FD(r1, 0x4c00, r0) ioctl$SNDRV_SEQ_IOCTL_RUNNING_MODE(0xffffffffffffffff, 0xc0105303, &(0x7f00000002c0)={0x2, 0x8}) add_key$keyring(&(0x7f00000000c0)='keyring\x00', &(0x7f0000000100)={0x73, 0x79, 0x7a}, 0x0, 0x0, 0x0) clone(0x0, &(0x7f0000000040), &(0x7f0000000080), &(0x7f0000000000), &(0x7f0000000100)) ioctl$int_in(0xffffffffffffffff, 0x800000c004500a, &(0x7f0000006ff8)) wait4(0x0, 0x0, 0x4, &(0x7f0000000380)) ioctl$sock_inet_sctp_SIOCINQ(r6, 0x541b, &(0x7f0000000180)) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_PORT(0xffffffffffffffff, 0xc0a85352, &(0x7f0000001980)={{}, 'port1\x00', 0x0, 0x20010, 0x1f, 0x0, 0x3, 0x40, 0x0, 0x0, 0x4, 0x6d1}) 2018/03/30 19:42:43 executing program 7: r0 = open(&(0x7f0000000440)='./file0\x00', 0x1ffff, 0x5) ioctl$TIOCLINUX7(0xffffffffffffffff, 0x541c, &(0x7f0000000900)={0x7, 0x8}) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x0, &(0x7f00000003c0)=0x6, 0xf4) r1 = perf_event_open(&(0x7f0000000240)={0x0, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$LOOP_CLR_FD(0xffffffffffffffff, 0x4c01) clock_gettime(0x0, &(0x7f00000001c0)={0x0, 0x0}) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(0xffffffffffffffff, 0x4040534e, &(0x7f0000000340)={0x124, @time={r2, r3+30000000}, 0x1, {0x8, 0x606}, 0x101, 0x2, 0x80000001}) ioctl$ASHMEM_SET_PROT_MASK(r0, 0x40087705, &(0x7f0000000200)={0x7ff, 0x1}) r4 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000040)='/dev/rtc\x00', 0x0, 0x0) r5 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000580)='/dev/sequencer\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_CLIENT_ID(r4, 0x80045301, &(0x7f0000000980)) ioctl$LOOP_CLR_FD(r4, 0x7003) r6 = syz_genetlink_get_family_id$ipvs(&(0x7f00000005c0)='IPVS\x00') sendmsg$IPVS_CMD_GET_DEST(r0, &(0x7f0000000840)={&(0x7f0000000400)={0x10, 0x0, 0x0, 0x800000}, 0xc, &(0x7f0000000800)={&(0x7f0000000a80)=ANY=[@ANYBLOB="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"], 0x1}, 0x1}, 0x40000) getsockopt$inet6_opts(r1, 0x29, 0x3b, &(0x7f0000000080)=""/53, &(0x7f00000008c0)=0xfffffffffffffeb0) ioctl$DRM_IOCTL_SET_MASTER(r4, 0x641e) timerfd_gettime(0xffffffffffffffff, &(0x7f0000000300)) sendmsg$IPVS_CMD_SET_SERVICE(r4, &(0x7f0000000940)={&(0x7f0000000680)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000740)={&(0x7f00000006c0)={0x28, r6, 0x12, 0x70bd2d, 0x25dfdbfd, {0x2}, [@IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x3}, @IPVS_CMD_ATTR_DAEMON={0xc, 0x3, [@IPVS_DAEMON_ATTR_SYNC_MAXLEN={0x8, 0x4, 0xc96}]}]}, 0x28}, 0x1, 0x0, 0x0, 0x80}, 0x40) getsockopt$inet_sctp_SCTP_FRAGMENT_INTERLEAVE(r1, 0x84, 0x12, &(0x7f00000000c0), &(0x7f0000000100)=0x30c) sendmsg$IPVS_CMD_GET_DEST(r5, &(0x7f00000007c0)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x10080804}, 0xc, &(0x7f0000000780)={&(0x7f0000000c40)=ANY=[]}, 0x1, 0x0, 0x0, 0x4010}, 0x4000000) setsockopt$packet_buf(0xffffffffffffffff, 0x107, 0xd, &(0x7f0000000c40)="c2d199ce4bb8e85055d4983418a3cbaff144b56c7457d92855851ec93ab14499162cb3fc2743b9c92ef8670eb74c5e0db8d6558c3f203f97de220e3feb50cf2caff6fbd53a8111ae3fcfc8f6c0da082fd6f2b189d57694261228a7a05942634676e25cf6f9e4d74d0f65818a6f44e02a201b4f8aabdff21780cbd158b3bfc3c30716e1c62bd272dba79088b683", 0x8d) listxattr(&(0x7f0000000140)='./file0\x00', &(0x7f00000009c0)=""/158, 0x9e) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000540)=0x0) perf_event_open(&(0x7f0000000600)={0x5, 0x70, 0x10001, 0x8, 0x6, 0x8, 0x0, 0x0, 0x10000, 0x6, 0x8, 0x2, 0x4, 0x40, 0x1469, 0x80000001, 0x0, 0x101, 0x600000000, 0x9, 0x6, 0x15e600000, 0x0, 0x10000, 0x6, 0x0, 0x0, 0x4d, 0x9, 0x7be, 0x0, 0x93, 0x10001, 0x3, 0x8, 0x40, 0x8, 0x5, 0x0, 0x9, 0x4, @perf_bp={&(0x7f0000000480), 0x5}, 0x24008, 0x9, 0x0, 0x1, 0x0, 0x5, 0x2}, r7, 0x1, r1, 0x0) execve(&(0x7f0000000880)='./file0\x00', &(0x7f0000000b80), &(0x7f0000000180)=[&(0x7f0000000c00)='\'\x00', &(0x7f0000000700)='trustedwlan0vmnet0@%\x00']) ioctl$DRM_IOCTL_GET_MAGIC(r5, 0x80046402, &(0x7f00000004c0)=0x6ff) 2018/03/30 19:42:43 executing program 6: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_mreqn(r0, 0x0, 0x27, &(0x7f0000000000)={@multicast2=0xe0000002, @loopback=0x7f000001}, 0xc) getsockopt$inet_sctp6_SCTP_FRAGMENT_INTERLEAVE(0xffffffffffffffff, 0x84, 0x12, &(0x7f0000000080), &(0x7f00000000c0)=0x4) ioctl$sock_inet_SIOCGIFDSTADDR(0xffffffffffffffff, 0x8917, &(0x7f0000000040)={'bcsh0\x00', {0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x1a}}}) setsockopt$inet_sctp6_SCTP_MAX_BURST(0xffffffffffffffff, 0x84, 0x14, &(0x7f0000000380)=@int=0x3, 0x4) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000140)={'bcsh0\x00', 0x0}) ioctl$sock_inet6_SIOCDELRT(0xffffffffffffffff, 0x890c, &(0x7f0000000180)={@dev={0xfe, 0x80, [], 0x13}, @loopback={0x0, 0x1}, @mcast2={0xff, 0x2, [], 0x1}, 0x6, 0x0, 0x42e, 0x100, 0x9, 0x80000000, r1}) r2 = socket$inet(0x2, 0xa, 0x5) setsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX(r2, 0x84, 0x6e, &(0x7f0000000600)=[@in={0x2, 0x4e21, @multicast1=0xe0000001}, @in6={0xa, 0x4e20, 0x0, @remote={0xfe, 0x80, [], 0xbb}}, @in={0x2, 0x4e22, @multicast2=0xe0000002}, @in6={0xa, 0x4e21, 0x1ff, @local={0xfe, 0x80, [], 0xaa}, 0x84}, @in6={0xa, 0x4e20, 0x4, @local={0xfe, 0x80, [], 0xaa}}], 0x74) getsockopt$inet_sctp6_SCTP_PR_SUPPORTED(0xffffffffffffffff, 0x84, 0x71, &(0x7f0000000200)={0x0, 0x8}, &(0x7f0000000240)=0x8) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(0xffffffffffffffff, 0x84, 0x6f, &(0x7f0000000300)={r3, 0x70, &(0x7f0000000280)=[@in={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x12}}, @in={0x2, 0x4e24, @loopback=0x7f000001}, @in={0x2, 0x4e20, @remote={0xac, 0x14, 0x14, 0xbb}}, @in={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x1a}}, @in={0x2, 0x4e24, @remote={0xac, 0x14, 0x14, 0xbb}}, @in={0x2, 0x4e24, @rand_addr=0x3ff}, @in={0x2, 0x4e24, @multicast2=0xe0000002}]}, &(0x7f0000000340)=0x10) setsockopt$inet_sctp6_SCTP_SET_PEER_PRIMARY_ADDR(0xffffffffffffffff, 0x84, 0x5, &(0x7f00000004c0)={r4, @in={{0x2, 0x4e20, @rand_addr=0x8}}}, 0x84) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, &(0x7f00000003c0)={'lo\x00', 0x4100}) ioctl$sock_inet_SIOCGIFNETMASK(0xffffffffffffffff, 0x891b, &(0x7f0000000100)={'nr0\x00', {0x2, 0x4e24, @loopback=0x7f000001}}) setsockopt$inet_msfilter(r0, 0x0, 0x29, &(0x7f0000000680)=ANY=[@ANYBLOB="cf0000000276d172390cc8c4ff4f3b746e5947c2ddb66a93ebb6d0f75b5f453435c311b94e126c49d47c10682b6e523d09fae1d416ebface98e08aa083e9f1f1afa118eb05655fec48d75d7a37edd032552c60ffeb53a2c8eecbe601a4ac5dceeecf1a943c2d9e2eaf4ad0a93e82a1a37a0cf2adbc4b512680428fee922ad18ff90ec6f87a75b299a953167bf4f9ae31cffd2c31dd47ba7d69151424dc1b2835f7624a302f270eb89118043dc1e1faa46e667be9cbf4456ad0c580ed032e4e49459f68f8a70f2dfe40f51362ffae"], 0x1) pread64(r0, &(0x7f0000000340)=""/181, 0xb5, 0x62) setsockopt$inet_msfilter(r0, 0x0, 0x29, &(0x7f0000000580)=ANY=[@ANYBLOB="e00000027f0000010000000001000000000000006b59aa51deb20d6efc9c04b7c9420f6434d31cbbe99b52873a8c21"], 0x1) socket$inet_udp(0x2, 0x2, 0x0) bpf$BPF_PROG_GET_NEXT_ID(0xb, &(0x7f0000000400)=0x7, 0x4) r5 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000ba4000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x2, 0x78, 0xe2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, r5, 0x0) r6 = perf_event_open(&(0x7f0000014f88)={0x1, 0x78, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00002e8000)}}, 0x0, 0x0, r5, 0x0) readv(r6, &(0x7f0000734000)=[{&(0x7f0000d42000)=""/146, 0x92}], 0x1) getsockopt$inet_sctp_SCTP_PEER_ADDR_THLDS(0xffffffffffffffff, 0x84, 0x1f, &(0x7f0000000480)={0x0, @in={{0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0xd}}}, 0xf80866d, 0x5}, &(0x7f0000000540)=0x90) getsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(0xffffffffffffff9c, 0x84, 0x18, &(0x7f0000000440)={r7, 0x400000000004}, &(0x7f00000005c0)=0xffffffffffffffc3) getsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER_VALUE(r0, 0x84, 0x7c, &(0x7f00000002c0)={r8, 0x10001, 0xc9e9}, &(0x7f0000000300)=0x8) [ 482.587540] FAT-fs (loop4): Unrecognized mount option "time_offset=" or missing value [ 482.643696] EXT4-fs (loop4): VFS: Can't find ext4 filesystem [ 482.668386] BFS-fs: bfs_fill_super(): No BFS filesystem on loop4 (magic=00000000) [ 482.700448] jfs: Unrecognized mount option "umask=?" or missing value [ 483.220552] audit: type=1326 audit(1522438964.243:10): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=5116 comm="syz-executor3" exe="/root/syz-executor3" sig=31 arch=c000003e syscall=202 compat=0 ip=0x454e79 code=0xffff0000 2018/03/30 19:42:44 executing program 2: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) readv(0xffffffffffffffff, &(0x7f0000001480), 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f00003b9fdc)) readv(r0, &(0x7f0000001980)=[{&(0x7f00000018c0)=""/182, 0xb6}], 0x1) r1 = syz_open_pts(r0, 0x2) setsockopt$inet6_mtu(0xffffffffffffffff, 0x29, 0x17, &(0x7f0000000440)=0x5, 0x4) socket$inet_sctp(0x2, 0x5, 0x84) dup3(r1, r0, 0x0) write(r0, &(0x7f0000c34fff), 0xffffff0b) setsockopt$bt_l2cap_L2CAP_OPTIONS(0xffffffffffffffff, 0x6, 0x1, &(0x7f0000000380)={0xefa, 0x800, 0x0, 0x0, 0x9}, 0xc) 2018/03/30 19:42:44 executing program 1: r0 = syz_open_dev$amidi(&(0x7f0000000040)='/dev/amidi#\x00', 0x3, 0x28000) ioctl$DRM_IOCTL_RES_CTX(r0, 0xc0086426, &(0x7f0000000100)={0x2c, &(0x7f00000000c0)=[{}, {}, {}, {}, {}, {}, {}, {}]}) socket$netlink(0x10, 0x3, 0xc) writev(0xffffffffffffffff, &(0x7f00000021c0), 0x0) bind$bt_l2cap(r0, &(0x7f0000000340)={0x1f, 0x800000000000002, {0x401, 0x3, 0xb, 0x3f8}}, 0x9) socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f0000a8d000)={&(0x7f0000c78ff4)={0x10}, 0xc, &(0x7f0000df6000)={&(0x7f0000000200)=ANY=[@ANYBLOB="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"], 0x10d}, 0x1}, 0x0) r1 = socket$inet_sctp(0x2, 0x5, 0x84) sendmsg$inet_sctp(r1, &(0x7f0000001f00)={&(0x7f0000001840)=@in={0x2, 0x0, @dev={0xac, 0x14, 0x14}}, 0x10, &(0x7f0000001c40)=[{&(0x7f0000001880)='[', 0x1}], 0x1, &(0x7f0000001e40)}, 0x40) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000540)=@nat={'nat\x00', 0x19, 0x3, 0x376, [0x20000140, 0x0, 0x0, 0x20000170, 0x200002d0], 0x0, &(0x7f0000000100), &(0x7f00000006c0)=ANY=[@ANYBLOB="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"]}, 0x3ee) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000002980)) getsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(0xffffffffffffffff, 0x84, 0x1f, &(0x7f0000000440)={0x0, @in={{0x2, 0x4e22, @multicast2=0xe0000002}}, 0x7bb7, 0x4}, &(0x7f0000000500)=0x90) getsockopt$inet_sctp_SCTP_RTOINFO(0xffffffffffffffff, 0x84, 0x0, &(0x7f0000002240)={0x0, 0x9, 0x417}, &(0x7f00000001c0)=0x10) r2 = socket(0x22, 0x4, 0x3) r3 = socket(0x20000001e, 0x5, 0x0) r4 = perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$packet_tx_ring(r3, 0x10f, 0x87, &(0x7f0000265000)=@req={0x3fc, 0x0, 0x1}, 0x10) getegid() setsockopt$packet_tx_ring(r2, 0x10f, 0x87, &(0x7f0000265000)=@req={0x3fc, 0x0, 0x1}, 0x10) writev(r2, &(0x7f00000000c0)=[{&(0x7f0000000000)="8a", 0x1}], 0x1) close(r2) close(r3) perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r5 = syz_open_dev$evdev(&(0x7f0000dfdfee)='/dev/input/event#\x00', 0x0, 0x2) readv(r5, &(0x7f0000019fe0)=[{&(0x7f00008ec000)=""/219, 0xdb}], 0x1) write$evdev(r5, &(0x7f000004d000)=[{{}, 0x0, 0x1}, {{0x2}}], 0x30) r6 = getpgrp(0x0) setsockopt$ax25_int(r3, 0x101, 0xd, &(0x7f0000000080)=0x7, 0x4) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x8, 0xfffffffffffffffd, 0x9, 0x7, 0x0, 0x8001, 0x0, 0x6, 0x3ff, 0x4, 0x5, 0x4, 0xbd9, 0x56, 0x8000, 0x7f, 0xff, 0xeba, 0x1f, 0x0, 0xfd, 0x3, 0x1, 0x50, 0x7, 0x9, 0x641800, 0x3ff8000000000000, 0x4, 0x0, 0x10000, 0x5, 0x7, 0x6, 0x1, 0xffffffffffffffe0, 0x0, 0x20, 0x0, @perf_bp={&(0x7f0000000040), 0x8}, 0x20, 0x401, 0x8, 0x3, 0x8, 0x7, 0x7}, r6, 0xc, r4, 0x0) syz_genetlink_get_family_id$ipvs(&(0x7f0000000040)='IPVS\x00') 2018/03/30 19:42:44 executing program 5: unshare(0x40000000) perf_event_open(&(0x7f000001d000)={0x2, 0x78, 0xe2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000000)={0x6, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket(0xa, 0x1, 0x0) r0 = socket$packet(0x11, 0x0, 0x300) r1 = openat$cuse(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/cuse\x00', 0x82, 0x0) io_setup(0x43f, &(0x7f00000000c0)=0x0) io_submit(r2, 0x1, &(0x7f0000000000)=[&(0x7f0000000200)={0x0, 0x0, 0x0, 0x1, 0x0, r1, &(0x7f0000000040)="10000000020400000000000000000000", 0x10}]) r3 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000280)='/proc/sys/net/ipv4/vs/secure_tcp\x00', 0x2, 0x0) sendmsg$kcm(r3, &(0x7f0000001f00)={&(0x7f0000001b40)=@pppol2tpin6={0x18, 0x1, {0x0, r0, 0x0, 0x1, 0x0, 0x0, {0xa, 0x4e24, 0xc1, @mcast1={0xff, 0x1, [], 0x1}}}}, 0x80, &(0x7f0000001d80)=[{&(0x7f0000001bc0)="a9db123ebf124fab0f2eec9774559e3b5870fb7c6818fc89c4b8742d057480657265ae2b34fb2d4e585d22ca1bf7b0a22ce38a20a819d919947c78f8d5c9f3291905fd3ed2b8ef8a79d9453396c6b0b7eb0778dbc49b32ae91e443b64edddcf320c1589c7777eadd4e57c01b20a8ca7a831e8e2c104d0194d52fb5c35b550f", 0x7f}], 0x1, &(0x7f0000001dc0)=ANY=[], 0x0, 0x90}, 0x20000000) r4 = syz_open_dev$tun(&(0x7f00000001c0)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r4, 0x400454ca, &(0x7f0000000200)={'bridge0\x00\x00p\x00', 0x4000000000001005}) socketpair(0x1d, 0x3, 0x40, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_inet_SIOCSIFADDR(r5, 0x8916, &(0x7f0000000100)={'bridge8\x00', {0x2, 0x0, @dev={0xac, 0x14, 0x14}}}) ioctl$LOOP_SET_FD(r1, 0x4c00, r0) ioctl$SNDRV_SEQ_IOCTL_RUNNING_MODE(0xffffffffffffffff, 0xc0105303, &(0x7f00000002c0)={0x2, 0x8}) add_key$keyring(&(0x7f00000000c0)='keyring\x00', &(0x7f0000000100)={0x73, 0x79, 0x7a}, 0x0, 0x0, 0x0) clone(0x0, &(0x7f0000000040), &(0x7f0000000080), &(0x7f0000000000), &(0x7f0000000100)) ioctl$int_in(0xffffffffffffffff, 0x800000c004500a, &(0x7f0000006ff8)) wait4(0x0, 0x0, 0x4, &(0x7f0000000380)) ioctl$sock_inet_sctp_SIOCINQ(r6, 0x541b, &(0x7f0000000180)) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_PORT(0xffffffffffffffff, 0xc0a85352, &(0x7f0000001980)={{}, 'port1\x00', 0x0, 0x20010, 0x1f, 0x0, 0x3, 0x40, 0x0, 0x0, 0x4, 0x6d1}) 2018/03/30 19:42:44 executing program 3: r0 = socket$packet(0x11, 0x2, 0x300) r1 = syz_open_dev$tun(&(0x7f00000001c0)='/dev/net/tun\x00', 0x0, 0x0) getsockopt$bt_l2cap_L2CAP_OPTIONS(0xffffffffffffffff, 0x6, 0x1, &(0x7f0000000180), &(0x7f0000000240)=0xc) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000000)={'bridge0\x00', 0xfffffffffffffffd}) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f00000000c0)={'bridge0\x00', 0x22001}) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000100)='/proc/self/net/pfkey\x00', 0x200, 0x0) ioctl$FUSE_DEV_IOC_CLONE(0xffffffffffffffff, 0x8004e500, &(0x7f00000002c0)) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000140)={'bridge0\x00\x00 \x00'}) ioctl$sock_inet_tcp_SIOCOUTQNSD(0xffffffffffffffff, 0x894b, &(0x7f0000000280)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000006880)={{{@in6=@loopback, @in=@remote}}, {{@in=@rand_addr}, 0x0, @in6=@local}}, &(0x7f0000006980)=0xe8) fcntl$F_SET_FILE_RW_HINT(0xffffffffffffffff, 0x40e, &(0x7f0000000580)) lseek(r0, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_DEFAULT_SNDINFO(r0, 0x84, 0x22, &(0x7f0000000300)={0x7f, 0x4, 0x6, 0x3}, &(0x7f0000000380)=0x10) sendmsg$inet_sctp(0xffffffffffffffff, &(0x7f00000008c0)={&(0x7f00000004c0)=@in={0x2, 0x4e23, @remote={0xac, 0x14, 0x14, 0xbb}}, 0x10, &(0x7f00000007c0), 0x0, &(0x7f0000000840)}, 0x40000) setsockopt$packet_fanout_data(0xffffffffffffffff, 0x107, 0x16, &(0x7f0000000600)={0x3, &(0x7f00000005c0)=[{0x6, 0xf412, 0x0, 0x401}, {0x0, 0x0, 0x7}, {0x3, 0x0, 0x6f8, 0x7}]}, 0x10) ioctl$TUNGETSNDBUF(0xffffffffffffffff, 0x800454d3, &(0x7f0000000080)) fstat(0xffffffffffffffff, &(0x7f0000000940)) setgroups(0x0, &(0x7f0000000200)) fchmod(0xffffffffffffffff, 0x101) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000740)) ioctl$sock_SIOCSPGRP(0xffffffffffffffff, 0x8902, &(0x7f0000000780)) getrandom(&(0x7f0000000900)=""/5, 0x5, 0x0) 2018/03/30 19:42:44 executing program 7: r0 = accept4(0xffffffffffffffff, &(0x7f00000003c0)=@nfc, &(0x7f0000000380)=0x80, 0x0) accept4$nfc_llcp(r0, 0x0, &(0x7f0000000080), 0x0) mmap(&(0x7f0000002000/0x3000)=nil, 0x3000, 0x0, 0x12, 0xffffffffffffffff, 0x0) r1 = mq_open(&(0x7f0000000000)='-$\x00', 0x0, 0x0, &(0x7f0000664fc0)={0x0, 0x1}) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x0, 0x8010, 0xffffffffffffffff, 0x0) keyctl$assume_authority(0x10, 0x0) r2 = socket$inet6_udp(0xa, 0x2, 0x0) r3 = add_key$keyring(&(0x7f0000000580)='keyring\x00', &(0x7f00000005c0)={0x73, 0x79, 0x7a, 0x3}, 0x0, 0x0, 0x0) keyctl$describe(0x6, r3, &(0x7f0000000b40)=""/4096, 0x1000) r4 = dup2(0xffffffffffffffff, r1) ioctl$TUNSETVNETHDRSZ(r4, 0x400454d8, &(0x7f0000000100)) connect$l2tp(0xffffffffffffffff, &(0x7f00005fafd2)=@pppol2tpv3={0x18, 0x1, {0x0, r2, {0x2, 0x0, @multicast2=0xe0000002}, 0x4, 0x0, 0x2}}, 0x2e) r5 = request_key(&(0x7f00000002c0)='syzkaller\x00', &(0x7f00000004c0)={0x73, 0x79, 0x7a}, &(0x7f0000000500)='-$\x00', 0xfffffffffffffff8) add_key$user(&(0x7f0000000140)='user\x00', &(0x7f00000001c0)={0x73, 0x79, 0x7a, 0x2}, &(0x7f0000000440)="840d572a8e609edca8c2551947d6efb55b7c8c94e1be6a1cf9f0b6c187b75286d9eed3d30f1edecec627b782331d1882137024a7df67ee9edfe12e1986880dcc2053b1f5ba810719d45c279d5082b3c8d02dab1ce0b01e1f4cb973cc1ece8d0deb7664206fa5c189e384551221e8e58c9a4775aa", 0x74, r5) close(r2) sendmsg$nl_crypto(0xffffffffffffffff, &(0x7f000037ffc8)={&(0x7f00009dd000)={0x10}, 0xc, &(0x7f00002ceff0)={&(0x7f000097b000)=@delrng={0x10, 0x14, 0x200, 0x0, 0x3}, 0xfff1}, 0x1}, 0x0) r6 = add_key(&(0x7f0000000a80)="6173796d6d65747269630041472e8b637f55f694fcef0e58fc2ac924f9dd8addbd7bdb020097658e7651738b0e4ab818c6e76c0d075a9aafccb8dfa463c0e04194ee37284e414193d860", &(0x7f0000000b00)={0x73, 0x79, 0x7a, 0x0}, &(0x7f0000000800), 0x0, 0xfffffffffffffffc) keyctl$instantiate_iov(0x14, 0x0, &(0x7f00000003c0)=[{&(0x7f0000000300)="ad6e2301849005b80f700749ce55a60fe1e41d5768c90ac2926a4d5cb5677573", 0x20}], 0x1, r6) mq_timedreceive(0xffffffffffffffff, &(0x7f0000be2f7d)=""/131, 0xfffffffffffffffd, 0x0, 0x0) ioctl$DRM_IOCTL_RES_CTX(0xffffffffffffff9c, 0xc0086426, &(0x7f0000000240)={0x4, &(0x7f0000000200)=[{}, {}, {}, {}]}) ioctl$DRM_IOCTL_RM_CTX(0xffffffffffffffff, 0xc0086421, &(0x7f0000000280)) syz_open_procfs(0x0, &(0x7f0000000180)='ns/cgroup\x00') r7 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r7, &(0x7f0000360000)={0x0, 0x0, &(0x7f000035d000)={&(0x7f000033c000)={0x2, 0xd, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, [@sadb_address={0x3, 0x6, 0x0, 0x0, 0x0, @in={0x2, 0x0, @loopback=0x7f000001}}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2}}, @sadb_x_policy={0x8, 0x12, 0x2, 0x1, 0x0, 0x0, 0x0, {0x30, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, @in6=@mcast1={0xff, 0x1, [], 0x1}, @in6=@ipv4={[], [0xff, 0xff], @multicast1=0xe0000001}}}]}, 0x80}, 0x1}, 0x0) request_key(&(0x7f0000000700)='ceph\x00', &(0x7f0000000740)={0x73, 0x79, 0x7a}, &(0x7f0000000780)='eth0ppp0\x00', 0xfffffffffffffff8) keyctl$instantiate_iov(0x14, 0x0, &(0x7f00000006c0), 0x200000000000006c, 0x0) syz_genetlink_get_family_id$ipvs(&(0x7f0000000540)='IPVS\x00') setns(0xffffffffffffffff, 0x4000000) 2018/03/30 19:42:44 executing program 6: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_mreqn(r0, 0x0, 0x27, &(0x7f0000000000)={@multicast2=0xe0000002, @loopback=0x7f000001}, 0xc) getsockopt$inet_sctp6_SCTP_FRAGMENT_INTERLEAVE(0xffffffffffffffff, 0x84, 0x12, &(0x7f0000000080), &(0x7f00000000c0)=0x4) ioctl$sock_inet_SIOCGIFDSTADDR(0xffffffffffffffff, 0x8917, &(0x7f0000000040)={'bcsh0\x00', {0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x1a}}}) setsockopt$inet_sctp6_SCTP_MAX_BURST(0xffffffffffffffff, 0x84, 0x14, &(0x7f0000000380)=@int=0x3, 0x4) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000140)={'bcsh0\x00', 0x0}) ioctl$sock_inet6_SIOCDELRT(0xffffffffffffffff, 0x890c, &(0x7f0000000180)={@dev={0xfe, 0x80, [], 0x13}, @loopback={0x0, 0x1}, @mcast2={0xff, 0x2, [], 0x1}, 0x6, 0x0, 0x42e, 0x100, 0x9, 0x80000000, r1}) r2 = socket$inet(0x2, 0xa, 0x5) setsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX(r2, 0x84, 0x6e, &(0x7f0000000600)=[@in={0x2, 0x4e21, @multicast1=0xe0000001}, @in6={0xa, 0x4e20, 0x0, @remote={0xfe, 0x80, [], 0xbb}}, @in={0x2, 0x4e22, @multicast2=0xe0000002}, @in6={0xa, 0x4e21, 0x1ff, @local={0xfe, 0x80, [], 0xaa}, 0x84}, @in6={0xa, 0x4e20, 0x4, @local={0xfe, 0x80, [], 0xaa}}], 0x74) getsockopt$inet_sctp6_SCTP_PR_SUPPORTED(0xffffffffffffffff, 0x84, 0x71, &(0x7f0000000200)={0x0, 0x8}, &(0x7f0000000240)=0x8) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(0xffffffffffffffff, 0x84, 0x6f, &(0x7f0000000300)={r3, 0x70, &(0x7f0000000280)=[@in={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x12}}, @in={0x2, 0x4e24, @loopback=0x7f000001}, @in={0x2, 0x4e20, @remote={0xac, 0x14, 0x14, 0xbb}}, @in={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x1a}}, @in={0x2, 0x4e24, @remote={0xac, 0x14, 0x14, 0xbb}}, @in={0x2, 0x4e24, @rand_addr=0x3ff}, @in={0x2, 0x4e24, @multicast2=0xe0000002}]}, &(0x7f0000000340)=0x10) setsockopt$inet_sctp6_SCTP_SET_PEER_PRIMARY_ADDR(0xffffffffffffffff, 0x84, 0x5, &(0x7f00000004c0)={r4, @in={{0x2, 0x4e20, @rand_addr=0x8}}}, 0x84) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, &(0x7f00000003c0)={'lo\x00', 0x4100}) ioctl$sock_inet_SIOCGIFNETMASK(0xffffffffffffffff, 0x891b, &(0x7f0000000100)={'nr0\x00', {0x2, 0x4e24, @loopback=0x7f000001}}) setsockopt$inet_msfilter(r0, 0x0, 0x29, &(0x7f0000000680)=ANY=[@ANYBLOB="cf0000000276d172390cc8c4ff4f3b746e5947c2ddb66a93ebb6d0f75b5f453435c311b94e126c49d47c10682b6e523d09fae1d416ebface98e08aa083e9f1f1afa118eb05655fec48d75d7a37edd032552c60ffeb53a2c8eecbe601a4ac5dceeecf1a943c2d9e2eaf4ad0a93e82a1a37a0cf2adbc4b512680428fee922ad18ff90ec6f87a75b299a953167bf4f9ae31cffd2c31dd47ba7d69151424dc1b2835f7624a302f270eb89118043dc1e1faa46e667be9cbf4456ad0c580ed032e4e49459f68f8a70f2dfe40f51362ffae"], 0x1) pread64(r0, &(0x7f0000000340)=""/181, 0xb5, 0x62) setsockopt$inet_msfilter(r0, 0x0, 0x29, &(0x7f0000000580)=ANY=[@ANYBLOB="e00000027f0000010000000001000000000000006b59aa51deb20d6efc9c04b7c9420f6434d31cbbe99b52873a8c21"], 0x1) socket$inet_udp(0x2, 0x2, 0x0) bpf$BPF_PROG_GET_NEXT_ID(0xb, &(0x7f0000000400)=0x7, 0x4) r5 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000ba4000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x2, 0x78, 0xe2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, r5, 0x0) r6 = perf_event_open(&(0x7f0000014f88)={0x1, 0x78, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00002e8000)}}, 0x0, 0x0, r5, 0x0) readv(r6, &(0x7f0000734000)=[{&(0x7f0000d42000)=""/146, 0x92}], 0x1) getsockopt$inet_sctp_SCTP_PEER_ADDR_THLDS(0xffffffffffffffff, 0x84, 0x1f, &(0x7f0000000480)={0x0, @in={{0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0xd}}}, 0xf80866d, 0x5}, &(0x7f0000000540)=0x90) getsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(0xffffffffffffff9c, 0x84, 0x18, &(0x7f0000000440)={r7, 0x400000000004}, &(0x7f00000005c0)=0xffffffffffffffc3) getsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER_VALUE(r0, 0x84, 0x7c, &(0x7f00000002c0)={r8, 0x10001, 0xc9e9}, &(0x7f0000000300)=0x8) 2018/03/30 19:42:44 executing program 4: symlinkat(&(0x7f0000002f00)='./file0\x00', 0xffffffffffffffff, &(0x7f0000002f80)='./file0\x00') syz_mount_image$msdos(&(0x7f0000002fc0)='msdos\x00', &(0x7f0000003000)='./file0\x00', 0x4, 0x1, &(0x7f0000003180)=[{&(0x7f0000003040)="eaf9610c9f7031a1f58e51e73b3f0bd5af4364c38bbe335dbd3d211ec0338ba4c795c634af757a3c684da6110f67891133a6303441b21d139e3a6582efdaeabd3d68dbcb85cd383733a98084b62807af0b7ea49d68daa4cc9fda43dbeb13c3e67c44c463a2c429ccb66c0e1a9dfd5c911d4d7b578baaad6571d4457b9c6d92122a4bd97f5f174c81081941b007062f2cab2db1466851dde671e025909a633fec433bb2512fc61c436b74df23d280019a403884dc488071", 0xb7, 0xcd7}], 0x8, &(0x7f00000031c0)={[{@errors_continue='errors=continue', 0x2c}, {@time_offset={'time_offset', 0x3d, [0x0]}, 0x2c}]}) pipe(&(0x7f0000002f40)={0xffffffffffffffff}) r1 = open(&(0x7f0000003240)='./file0\x00', 0xa0001, 0x20) linkat(r0, &(0x7f0000003200)='./file0\x00', r1, &(0x7f0000003280)='./file0\x00', 0x400) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x80000, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)}, {&(0x7f0000010d00)="0000000000000000000000000000000000000000000000000000000002ae0000ed41000000040000d15bbe5ad15bbe5ad15bbe5a00000000000005002000000000000800070000000af301000400000000000000000000000100000030000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a1950000", 0xa0, 0x8c60}, {&(0x7f0000011a00)="020000000c0001022e000000020000000c0002022e2e00000b00000014000a026c6f73742b666f756e6400000c0000001000050166696c65300000000d0000001000050266696c65310000000f0000001000050166696c6532000000100000001000050166696c6533000000110000001000050166696c65340000001200000010000802564944454f5f54531400000068031201d181d18ed0b7d0bad0b0d0bbd0bbd0b5d1800000000000000000000000000000000000000000000000000000", 0xc0, 0xc000}, {&(0x7f0000012200)="0000000000000000000000000000000000000000000000000c0000dec910dfd800000000f4030000000000000000000000000000000000000000000000000000", 0x40, 0x117e0}, {&(0x7f0000012a00)="0d0000000c0001022e000000020000000c0002022e2e00000e000000dc03050166696c6530000000000000000000000000000000000000000000000000000000", 0x40, 0x1c000}], 0x0, &(0x7f0000013000)) syz_mount_image$bfs(&(0x7f0000000040)='bfs\x00', &(0x7f00000008c0)='./file0\x00', 0x20, 0x2, &(0x7f0000000180)=[{&(0x7f00000005c0)="f37e57346e86cb5adec662d7bd6f13a3764d2ca7640f9f81ba88d0689d0989735a7bafd5558d9a6e8988f9f6038fa475e49077bc8cfc6e170c4cdbaaa1375895c9a4068559d3cecf2a0423caa696bf77a75b3ae3f32b79da059ca13d055647998987fc2033d008bd55deb08808372b9b4595fb0d79a1358cd5949d859a7d155e86db4b608eb401109f6b792f5ce4a2ead9870dee49347bc08d0d54b0e4fca4fd895947a737f4ee823d997770e5c9df50c0c9fe2c0b945c6ffd13b7151e385b631520ac34a5967c6cd0d12b3746795681600541c17d379daed41ce8e715eba582fb668e160872a2", 0xe7, 0x7}, {&(0x7f0000000780)="6154d093a5a905da96fed5f8dea36bcd9d1d011246f7caf86806bf6ac6301d2d2b448461b867bbbe7d0eebdeafa16d7219af85ff4372670039ce277546def59f1d0eed4be4386a34c7243fe3ec84ad3807136a2c3ec35d6d87a7d7bb9342622cc3a7ff529ef3d76ff57fc7a1856f50b98e518515a9e679067cfc0e8500754fa30a81cf4dc42c5a0d36647280c5b0a8506efaf9ad06594678176efe4bdbcf7ab384b597df4c5ad66b2bd240823abe04cd30785819f1c7fd4d46bb55f8bd09ca4b44618b010e363fa572ca189ec73b36ad46b6f38d65c0acc417", 0xd9, 0x5}], 0x200000, 0x0) syz_mount_image$jfs(&(0x7f0000000080)='jfs\x00', &(0x7f0000000880)='./file0\x00', 0xfffffffffffffffe, 0x3, &(0x7f0000002dc0)=[{&(0x7f0000000900)="efee47debce411554253d03f2175c060de26b9a7a197d9327971105aafdf17a061227fe7dd52d3c1c1f0318992f304f7646c3eb4e32ff0514d34d4605b4e152474aa71ac6c0ba890b1f249f213d5bc162b605fdf3c524d6f84e1a2f8461d26ef5dd50b193ffb710ee69fc431552ae4548f0c1a7e503243bb10c53c566f37e3234d8b3d418992dca946568d275e1f54895a854bab3790963108fe6ce5b1f933e81bd0aa2dfd715aca4bd81b48b28e3ee265", 0xb1, 0x1}, {&(0x7f0000001a80)="b4bc90ad72742e5693f04c7955b05460b33cd0ca9cde365dbe1671162a8c1db744cb8a04d1d747ab4d3234fd615e6ad897396c21b8bf7da2c1d524d04fadade841e5acfac529250a2c75fed4b65a7b6c8735268244189e020c526112728097958fd591d00cd16d1591db9b0414d985d7718794369eb03d89403b7df76f6d745c94d4fa986321a9915fea55a73472bc39620fcf22ec74d02b77fafe6ccf72605eb0ba7ae69fa10a36d281e65a178528bc654ce5b6109d5294e400b18be755a3b899489b27a876ac3ea033ed525b28c7dff537b5210cbff466dc339e1f58db1679816589e886264ef1bcf6d0e1408d93946827711972", 0xf5, 0x7}, {&(0x7f0000002cc0)="c9bc1928c9ffffe99fdae39f5013810a038f1d558affc92341c81ee308195dabd95fcfedcfccd4cf2af62477e5ed935114b73940dba239c47d5824a3332fb48cea682934a6840ea5db2529c3a7c371bbf08f08bb15458de586609be64b699f29b7384dc7b2ba78f0e343fb9851eaf5a7b4106fc5b7", 0x75, 0x4}], 0x10000, &(0x7f0000002ec0)={[{@nodiscard='nodiscard', 0x2c}, {@resize='resize', 0x2c}, {@noquota='noquota', 0x2c}, {@umask={'umask', 0x3d, [0x3f]}, 0x2c}]}) 2018/03/30 19:42:44 executing program 0: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000f5eff5)='lp\x00', 0x4) sendto$inet(0xffffffffffffffff, &(0x7f0000fd0000), 0xfffffffffffffec1, 0x20000801, &(0x7f0000deaff0)={0x2, 0x4e23, @loopback=0x7f000001}, 0x10) shutdown(r0, 0x0) 2018/03/30 19:42:44 executing program 0: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000f5eff5)='lp\x00', 0x4) sendto$inet(0xffffffffffffffff, &(0x7f0000fd0000), 0xfffffffffffffec1, 0x20000801, &(0x7f0000deaff0)={0x2, 0x4e23, @loopback=0x7f000001}, 0x10) shutdown(r0, 0x0) [ 483.643285] FAT-fs (loop4): Unrecognized mount option "time_offset=" or missing value [ 483.671506] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 483.687729] kernel msg: ebtables bug: please report to author: EBT_ENTRY_OR_ENTRIES shouldn't be set in distinguisher 2018/03/30 19:42:44 executing program 7: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f0000366000)={0x2, 0x4e23, @broadcast=0xffffffff}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000f5eff5)='lp\x00', 0x4) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f0000000140)={0x1, [0x0]}, &(0x7f0000000340)=0x8) fcntl$getownex(r0, 0x10, &(0x7f00000003c0)={0x0, 0x0}) ptrace$peek(0x2, r2, &(0x7f0000000600)) setsockopt$inet_sctp_SCTP_DEFAULT_SEND_PARAM(r0, 0x84, 0xa, &(0x7f0000000380)={0x6, 0x6, 0x4, 0x8, 0x3, 0x9, 0x0, 0x8, r1}, 0x20) sendto$inet(r0, &(0x7f0000fd0000), 0xfffffffffffffec1, 0x20000801, &(0x7f0000deaff0)={0x2, 0x4e23, @loopback=0x7f000001}, 0x10) getsockopt$inet_sctp_SCTP_GET_PEER_ADDR_INFO(0xffffffffffffffff, 0x84, 0xf, &(0x7f0000000200)={0x0, @in6={{0xa, 0x4e22, 0x6, @mcast1={0xff, 0x1, [], 0x1}, 0xff}}, 0x1ff, 0x8, 0x9, 0x100000001, 0x674c}, &(0x7f00000002c0)=0x98) sendmsg(0xffffffffffffffff, &(0x7f00000000c0)={&(0x7f0000000000)=@sco={0x1f}, 0x80, &(0x7f0000000080), 0x0, &(0x7f0000000500)=ANY=[]}, 0x8001) setsockopt$IP_VS_SO_SET_STARTDAEMON(r0, 0x0, 0x48b, &(0x7f0000000300)={0x1, 'ip6gre0\x00'}, 0x8) getsockopt$inet_sctp6_SCTP_STATUS(0xffffffffffffffff, 0x84, 0xe, &(0x7f0000003580)={0x0, 0x4, 0x0, 0x4, 0x4bf, 0x80000001, 0x9, 0x0, {r3, @in={{0x2, 0x4e20, @remote={0xac, 0x14, 0x14, 0xbb}}}, 0x200, 0xb478, 0x0, 0x4, 0x9}}, &(0x7f0000003640)=0xb0) setsockopt$IP_VS_SO_SET_STOPDAEMON(r0, 0x0, 0x48c, &(0x7f0000000180)={0x1, 'ipddp0\x00', 0x1}, 0x18) shutdown(r0, 0x0) madvise(&(0x7f0000a93000/0x4000)=nil, 0x4000, 0xe) mremap(&(0x7f0000a96000/0x1000)=nil, 0x1000, 0x800000, 0x3, &(0x7f0000130000/0x800000)=nil) ioctl$sock_ipx_SIOCGIFADDR(0xffffffffffffffff, 0x8915, &(0x7f0000665fe0)={"dbc78fc0a6caa717004720a0a32b5f0d", {0x4, 0x0, 0x0, "e0b618b5a2e0"}}) clone(0x0, &(0x7f0000000040), &(0x7f0000bb3000), &(0x7f0000000140), &(0x7f00000000c0)="fb7ff023f1fcdf8f779076ee77e7598517fec847115a17c5ce2cf1013f7584b5985d360300000000000000c1b6330f77802d03ca0636cfd3a226cf6b40bd3c0d982ccce73f6d13b64b0eca3cf93feea4f3e6c3e23f4000") madvise(&(0x7f0000153000/0x800000)=nil, 0x800000, 0xf) setsockopt$EBT_SO_SET_COUNTERS(r0, 0x0, 0x81, &(0x7f0000000400)={'filter\x00', 0x2, [{}, {}]}, 0x48) pipe(&(0x7f0000652ff8)) sched_getaffinity(r2, 0x8, &(0x7f0000000080)) connect$ipx(0xffffffffffffffff, &(0x7f00000001c0)={0x4, 0x2e8, 0x0, "0f7287413567", 0x1000}, 0x10) 2018/03/30 19:42:44 executing program 3: r0 = socket$packet(0x11, 0x2, 0x300) r1 = syz_open_dev$tun(&(0x7f00000001c0)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000000)={'bridge0\x00', 0xfffffffffffffffd}) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f00000000c0)={'bridge0\x00', 0x22001}) r2 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000100)='/proc/self/net/pfkey\x00', 0x0, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000140)={'bridge0\x00\x00 \x00'}) ioctl$sock_inet_tcp_SIOCOUTQNSD(0xffffffffffffffff, 0x894b, &(0x7f0000000280)) setsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x15, &(0x7f00000069c0)={@dev={0xfe, 0x80}}, 0x14) lseek(0xffffffffffffffff, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_DEFAULT_SNDINFO(r0, 0x84, 0x22, &(0x7f0000000300)={0x0, 0x0, 0x6}, &(0x7f0000000380)=0x10) setsockopt$packet_fanout_data(0xffffffffffffffff, 0x107, 0x16, &(0x7f0000000600)={0x3, &(0x7f00000005c0)=[{0x0, 0x0, 0x7, 0xffffffff}, {0x0, 0x0, 0x0, 0x5d}, {0x0, 0x0, 0x0, 0x7}]}, 0x10) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r2, 0x84, 0x6f, &(0x7f0000000440)={0x0, 0x2c, &(0x7f00000003c0)=[@in={0x2, 0x0, @multicast1=0xe0000001}, @in6={0xa, 0x4e24, 0x0, @remote={0xfe, 0x80, [], 0xbb}, 0x7}]}, &(0x7f0000000480)=0x10) ioctl$TUNGETSNDBUF(0xffffffffffffffff, 0x800454d3, &(0x7f0000000080)) setsockopt$sock_void(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) fstat(0xffffffffffffffff, &(0x7f0000000940)) fchmod(0xffffffffffffffff, 0x0) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000740)) ioctl$sock_SIOCSPGRP(0xffffffffffffffff, 0x8902, &(0x7f0000000780)) 2018/03/30 19:42:44 executing program 6: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_mreqn(r0, 0x0, 0x27, &(0x7f0000000000)={@multicast2=0xe0000002, @loopback=0x7f000001}, 0xc) getsockopt$inet_sctp6_SCTP_FRAGMENT_INTERLEAVE(0xffffffffffffffff, 0x84, 0x12, &(0x7f0000000080), &(0x7f00000000c0)=0x4) ioctl$sock_inet_SIOCGIFDSTADDR(0xffffffffffffffff, 0x8917, &(0x7f0000000040)={'bcsh0\x00', {0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x1a}}}) setsockopt$inet_sctp6_SCTP_MAX_BURST(0xffffffffffffffff, 0x84, 0x14, &(0x7f0000000380)=@int=0x3, 0x4) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000140)={'bcsh0\x00', 0x0}) ioctl$sock_inet6_SIOCDELRT(0xffffffffffffffff, 0x890c, &(0x7f0000000180)={@dev={0xfe, 0x80, [], 0x13}, @loopback={0x0, 0x1}, @mcast2={0xff, 0x2, [], 0x1}, 0x6, 0x0, 0x42e, 0x100, 0x9, 0x80000000, r1}) r2 = socket$inet(0x2, 0xa, 0x5) setsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX(r2, 0x84, 0x6e, &(0x7f0000000600)=[@in={0x2, 0x4e21, @multicast1=0xe0000001}, @in6={0xa, 0x4e20, 0x0, @remote={0xfe, 0x80, [], 0xbb}}, @in={0x2, 0x4e22, @multicast2=0xe0000002}, @in6={0xa, 0x4e21, 0x1ff, @local={0xfe, 0x80, [], 0xaa}, 0x84}, @in6={0xa, 0x4e20, 0x4, @local={0xfe, 0x80, [], 0xaa}}], 0x74) getsockopt$inet_sctp6_SCTP_PR_SUPPORTED(0xffffffffffffffff, 0x84, 0x71, &(0x7f0000000200)={0x0, 0x8}, &(0x7f0000000240)=0x8) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(0xffffffffffffffff, 0x84, 0x6f, &(0x7f0000000300)={r3, 0x70, &(0x7f0000000280)=[@in={0x2, 0x4e20, @dev={0xac, 0x14, 0x14}}, @in={0x2, 0x4e24, @loopback=0x7f000001}, @in={0x2, 0x4e20, @remote={0xac, 0x14, 0x14, 0xbb}}, @in={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x1a}}, @in={0x2, 0x4e24, @remote={0xac, 0x14, 0x14, 0xbb}}, @in={0x2, 0x4e24, @rand_addr=0x3ff}, @in={0x2, 0x4e24, @multicast2=0xe0000002}]}, &(0x7f0000000340)=0x10) setsockopt$inet_sctp6_SCTP_SET_PEER_PRIMARY_ADDR(0xffffffffffffffff, 0x84, 0x5, &(0x7f00000004c0)={r4, @in={{0x2, 0x4e20, @rand_addr=0x8}}}, 0x84) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, &(0x7f00000003c0)={'lo\x00', 0x4100}) ioctl$sock_inet_SIOCGIFNETMASK(0xffffffffffffffff, 0x891b, &(0x7f0000000100)={'nr0\x00', {0x2, 0x4e24, @loopback=0x7f000001}}) setsockopt$inet_msfilter(r0, 0x0, 0x29, &(0x7f0000000680)=ANY=[@ANYBLOB="cf0000000276d172390cc8c4ff4f3b746e5947c2ddb66a93ebb6d0f75b5f453435c311b94e126c49d47c10682b6e523d09fae1d416ebface98e08aa083e9f1f1afa118eb05655fec48d75d7a37edd032552c60ffeb53a2c8eecbe601a4ac5dceeecf1a943c2d9e2eaf4ad0a93e82a1a37a0cf2adbc4b512680428fee922ad18ff90ec6f87a75b299a953167bf4f9ae31cffd2c31dd47ba7d69151424dc1b2835f7624a302f270eb89118043dc1e1faa46e667be9cbf4456ad0c580ed032e4e49459f68f8a70f2dfe40f51362ffae"], 0x1) pread64(r0, &(0x7f0000000340)=""/181, 0xb5, 0x62) setsockopt$inet_msfilter(r0, 0x0, 0x29, &(0x7f0000000580)=ANY=[@ANYBLOB="e00000027f0000010000000001000000000000006b59aa51deb20d6efc9c04b7c9420f6434d31cbbe99b52873a8c21"], 0x1) socket$inet_udp(0x2, 0x2, 0x0) bpf$BPF_PROG_GET_NEXT_ID(0xb, &(0x7f0000000400)=0x7, 0x4) r5 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000ba4000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x2, 0x78, 0xe2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, r5, 0x0) r6 = perf_event_open(&(0x7f0000014f88)={0x1, 0x78, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00002e8000)}}, 0x0, 0x0, r5, 0x0) readv(r6, &(0x7f0000734000)=[{&(0x7f0000d42000)=""/146, 0x92}], 0x1) getsockopt$inet_sctp_SCTP_PEER_ADDR_THLDS(0xffffffffffffffff, 0x84, 0x1f, &(0x7f0000000480)={0x0, @in={{0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0xd}}}, 0xf80866d, 0x5}, &(0x7f0000000540)=0x90) getsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(0xffffffffffffff9c, 0x84, 0x18, &(0x7f0000000440)={r7, 0x400000000004}, &(0x7f00000005c0)=0xffffffffffffffc3) getsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER_VALUE(r0, 0x84, 0x7c, &(0x7f00000002c0)={r8, 0x10001, 0xc9e9}, &(0x7f0000000300)=0x8) 2018/03/30 19:42:44 executing program 0: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000f5eff5)='lp\x00', 0x4) sendto$inet(0xffffffffffffffff, &(0x7f0000fd0000), 0xfffffffffffffec1, 0x20000801, &(0x7f0000deaff0)={0x2, 0x4e23, @loopback=0x7f000001}, 0x10) shutdown(r0, 0x0) [ 483.728691] EXT4-fs (loop4): VFS: Can't find ext4 filesystem 2018/03/30 19:42:44 executing program 4: symlinkat(&(0x7f0000002f00)='./file0\x00', 0xffffffffffffffff, &(0x7f0000002f80)='./file0\x00') syz_mount_image$msdos(&(0x7f0000002fc0)='msdos\x00', &(0x7f0000003000)='./file0\x00', 0x4, 0x1, &(0x7f0000003180)=[{&(0x7f0000003040)="eaf9610c9f7031a1f58e51e73b3f0bd5af4364c38bbe335dbd3d211ec0338ba4c795c634af757a3c684da6110f67891133a6303441b21d139e3a6582efdaeabd3d68dbcb85cd383733a98084b62807af0b7ea49d68daa4cc9fda43dbeb13c3e67c44c463a2c429ccb66c0e1a9dfd5c911d4d7b578baaad6571d4457b9c6d92122a4bd97f5f174c81081941b007062f2cab2db1466851dde671e025909a633fec433bb2512fc61c436b74df23d280019a403884dc488071", 0xb7, 0xcd7}], 0x8, &(0x7f00000031c0)={[{@errors_continue='errors=continue', 0x2c}, {@time_offset={'time_offset', 0x3d, [0x0]}, 0x2c}]}) pipe(&(0x7f0000002f40)={0xffffffffffffffff}) r1 = open(&(0x7f0000003240)='./file0\x00', 0xa0001, 0x20) linkat(r0, &(0x7f0000003200)='./file0\x00', r1, &(0x7f0000003280)='./file0\x00', 0x400) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x80000, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)}, {&(0x7f0000010d00)="0000000000000000000000000000000000000000000000000000000002ae0000ed41000000040000d15bbe5ad15bbe5ad15bbe5a00000000000005002000000000000800070000000af301000400000000000000000000000100000030000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a1950000", 0xa0, 0x8c60}, {&(0x7f0000011a00)="020000000c0001022e000000020000000c0002022e2e00000b00000014000a026c6f73742b666f756e6400000c0000001000050166696c65300000000d0000001000050266696c65310000000f0000001000050166696c6532000000100000001000050166696c6533000000110000001000050166696c65340000001200000010000802564944454f5f54531400000068031201d181d18ed0b7d0bad0b0d0bbd0bbd0b5d1800000000000000000000000000000000000000000000000000000", 0xc0, 0xc000}, {&(0x7f0000012200)="0000000000000000000000000000000000000000000000000c0000dec910dfd800000000f4030000000000000000000000000000000000000000000000000000", 0x40, 0x117e0}, {&(0x7f0000012a00)="0d0000000c0001022e000000020000000c0002022e2e00000e000000dc03050166696c6530000000000000000000000000000000000000000000000000000000", 0x40, 0x1c000}], 0x0, &(0x7f0000013000)) syz_mount_image$bfs(&(0x7f0000000040)='bfs\x00', &(0x7f00000008c0)='./file0\x00', 0x20, 0x2, &(0x7f0000000180)=[{&(0x7f00000005c0)="f37e57346e86cb5adec662d7bd6f13a3764d2ca7640f9f81ba88d0689d0989735a7bafd5558d9a6e8988f9f6038fa475e49077bc8cfc6e170c4cdbaaa1375895c9a4068559d3cecf2a0423caa696bf77a75b3ae3f32b79da059ca13d055647998987fc2033d008bd55deb08808372b9b4595fb0d79a1358cd5949d859a7d155e86db4b608eb401109f6b792f5ce4a2ead9870dee49347bc08d0d54b0e4fca4fd895947a737f4ee823d997770e5c9df50c0c9fe2c0b945c6ffd13b7151e385b631520ac34a5967c6cd0d12b3746795681600541c17d379daed41ce8e715eba582fb668e160872a2", 0xe7, 0x7}, {&(0x7f0000000780)="6154d093a5a905da96fed5f8dea36bcd9d1d011246f7caf86806bf6ac6301d2d2b448461b867bbbe7d0eebdeafa16d7219af85ff4372670039ce277546def59f1d0eed4be4386a34c7243fe3ec84ad3807136a2c3ec35d6d87a7d7bb9342622cc3a7ff529ef3d76ff57fc7a1856f50b98e518515a9e679067cfc0e8500754fa30a81cf4dc42c5a0d36647280c5b0a8506efaf9ad06594678176efe4bdbcf7ab384b597df4c5ad66b2bd240823abe04cd30785819f1c7fd4d46bb55f8bd09ca4b44618b010e363fa572ca189ec73b36ad46b6f38d65c0acc417", 0xd9, 0x5}], 0x200000, 0x0) syz_mount_image$jfs(&(0x7f0000000080)='jfs\x00', &(0x7f0000000880)='./file0\x00', 0xfffffffffffffffe, 0x3, &(0x7f0000002dc0)=[{&(0x7f0000000900)="efee47debce411554253d03f2175c060de26b9a7a197d9327971105aafdf17a061227fe7dd52d3c1c1f0318992f304f7646c3eb4e32ff0514d34d4605b4e152474aa71ac6c0ba890b1f249f213d5bc162b605fdf3c524d6f84e1a2f8461d26ef5dd50b193ffb710ee69fc431552ae4548f0c1a7e503243bb10c53c566f37e3234d8b3d418992dca946568d275e1f54895a854bab3790963108fe6ce5b1f933e81bd0aa2dfd715aca4bd81b48b28e3ee265", 0xb1, 0x1}, {&(0x7f0000001a80)="b4bc90ad72742e5693f04c7955b05460b33cd0ca9cde365dbe1671162a8c1db744cb8a04d1d747ab4d3234fd615e6ad897396c21b8bf7da2c1d524d04fadade841e5acfac529250a2c75fed4b65a7b6c8735268244189e020c526112728097958fd591d00cd16d1591db9b0414d985d7718794369eb03d89403b7df76f6d745c94d4fa986321a9915fea55a73472bc39620fcf22ec74d02b77fafe6ccf72605eb0ba7ae69fa10a36d281e65a178528bc654ce5b6109d5294e400b18be755a3b899489b27a876ac3ea033ed525b28c7dff537b5210cbff466dc339e1f58db1679816589e886264ef1bcf6d0e1408d93946827711972", 0xf5, 0x7}, {&(0x7f0000002cc0)="c9bc1928c9ffffe99fdae39f5013810a038f1d558affc92341c81ee308195dabd95fcfedcfccd4cf2af62477e5ed935114b73940dba239c47d5824a3332fb48cea682934a6840ea5db2529c3a7c371bbf08f08bb15458de586609be64b699f29b7384dc7b2ba78f0e343fb9851eaf5a7b4106fc5b7a8aaf6e069012286fa7259807928cbee722222f45e6c98cefa00829bcdd92bd03273c7b0f20453c72150adf49c311248d3d3d96ad17187d60add3d", 0xb0, 0x4}], 0x10000, &(0x7f0000002ec0)={[{@nodiscard='nodiscard', 0x2c}, {@resize='resize', 0x2c}, {@noquota='noquota', 0x2c}, {@umask={'umask', 0x3d, [0x3f]}, 0x2c}]}) [ 483.819789] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 483.833594] FAT-fs (loop4): Unrecognized mount option "time_offset=" or missing value 2018/03/30 19:42:44 executing program 0: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000f5eff5)='lp\x00', 0x4) sendto$inet(r0, &(0x7f0000fd0000), 0xfffffffffffffec1, 0x0, &(0x7f0000deaff0)={0x2, 0x4e23, @loopback=0x7f000001}, 0x10) shutdown(r0, 0x0) 2018/03/30 19:42:44 executing program 6: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_mreqn(r0, 0x0, 0x27, &(0x7f0000000000)={@multicast2=0xe0000002, @loopback=0x7f000001}, 0xc) getsockopt$inet_sctp6_SCTP_FRAGMENT_INTERLEAVE(0xffffffffffffffff, 0x84, 0x12, &(0x7f0000000080), &(0x7f00000000c0)=0x4) ioctl$sock_inet_SIOCGIFDSTADDR(0xffffffffffffffff, 0x8917, &(0x7f0000000040)={'bcsh0\x00', {0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x1a}}}) setsockopt$inet_sctp6_SCTP_MAX_BURST(0xffffffffffffffff, 0x84, 0x14, &(0x7f0000000380)=@int=0x3, 0x4) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000140)={'bcsh0\x00', 0x0}) ioctl$sock_inet6_SIOCDELRT(0xffffffffffffffff, 0x890c, &(0x7f0000000180)={@dev={0xfe, 0x80, [], 0x13}, @loopback={0x0, 0x1}, @mcast2={0xff, 0x2, [], 0x1}, 0x6, 0x0, 0x42e, 0x100, 0x9, 0x80000000, r1}) r2 = socket$inet(0x2, 0xa, 0x5) setsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX(r2, 0x84, 0x6e, &(0x7f0000000600)=[@in={0x2, 0x4e21, @multicast1=0xe0000001}, @in6={0xa, 0x4e20, 0x0, @remote={0xfe, 0x80, [], 0xbb}}, @in={0x2, 0x4e22, @multicast2=0xe0000002}, @in6={0xa, 0x4e21, 0x1ff, @local={0xfe, 0x80, [], 0xaa}, 0x84}, @in6={0xa, 0x4e20, 0x4, @local={0xfe, 0x80, [], 0xaa}}], 0x74) getsockopt$inet_sctp6_SCTP_PR_SUPPORTED(0xffffffffffffffff, 0x84, 0x71, &(0x7f0000000200)={0x0, 0x8}, &(0x7f0000000240)=0x8) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(0xffffffffffffffff, 0x84, 0x6f, &(0x7f0000000300)={r3, 0x70, &(0x7f0000000280)=[@in={0x2, 0x4e20, @dev={0xac, 0x14, 0x14}}, @in={0x2, 0x4e24, @loopback=0x7f000001}, @in={0x2, 0x4e20, @remote={0xac, 0x14, 0x14, 0xbb}}, @in={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x1a}}, @in={0x2, 0x4e24, @remote={0xac, 0x14, 0x14, 0xbb}}, @in={0x2, 0x4e24, @rand_addr=0x3ff}, @in={0x2, 0x4e24, @multicast2=0xe0000002}]}, &(0x7f0000000340)=0x10) setsockopt$inet_sctp6_SCTP_SET_PEER_PRIMARY_ADDR(0xffffffffffffffff, 0x84, 0x5, &(0x7f00000004c0)={r4, @in={{0x2, 0x4e20, @rand_addr=0x8}}}, 0x84) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, &(0x7f00000003c0)={'lo\x00', 0x4100}) ioctl$sock_inet_SIOCGIFNETMASK(0xffffffffffffffff, 0x891b, &(0x7f0000000100)={'nr0\x00', {0x2, 0x4e24, @loopback=0x7f000001}}) setsockopt$inet_msfilter(r0, 0x0, 0x29, &(0x7f0000000680)=ANY=[@ANYBLOB="cf0000000276d172390cc8c4ff4f3b746e5947c2ddb66a93ebb6d0f75b5f453435c311b94e126c49d47c10682b6e523d09fae1d416ebface98e08aa083e9f1f1afa118eb05655fec48d75d7a37edd032552c60ffeb53a2c8eecbe601a4ac5dceeecf1a943c2d9e2eaf4ad0a93e82a1a37a0cf2adbc4b512680428fee922ad18ff90ec6f87a75b299a953167bf4f9ae31cffd2c31dd47ba7d69151424dc1b2835f7624a302f270eb89118043dc1e1faa46e667be9cbf4456ad0c580ed032e4e49459f68f8a70f2dfe40f51362ffae"], 0x1) pread64(r0, &(0x7f0000000340)=""/181, 0xb5, 0x62) setsockopt$inet_msfilter(r0, 0x0, 0x29, &(0x7f0000000580)=ANY=[@ANYBLOB="e00000027f0000010000000001000000000000006b59aa51deb20d6efc9c04b7c9420f6434d31cbbe99b52873a8c21"], 0x1) socket$inet_udp(0x2, 0x2, 0x0) bpf$BPF_PROG_GET_NEXT_ID(0xb, &(0x7f0000000400)=0x7, 0x4) r5 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000ba4000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x2, 0x78, 0xe2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, r5, 0x0) r6 = perf_event_open(&(0x7f0000014f88)={0x1, 0x78, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00002e8000)}}, 0x0, 0x0, r5, 0x0) readv(r6, &(0x7f0000734000)=[{&(0x7f0000d42000)=""/146, 0x92}], 0x1) getsockopt$inet_sctp_SCTP_PEER_ADDR_THLDS(0xffffffffffffffff, 0x84, 0x1f, &(0x7f0000000480)={0x0, @in={{0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0xd}}}, 0xf80866d, 0x5}, &(0x7f0000000540)=0x90) getsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(0xffffffffffffff9c, 0x84, 0x18, &(0x7f0000000440)={r7, 0x400000000004}, &(0x7f00000005c0)=0xffffffffffffffc3) getsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER_VALUE(r0, 0x84, 0x7c, &(0x7f00000002c0)={r8, 0x10001, 0xc9e9}, &(0x7f0000000300)=0x8) [ 483.865773] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 483.904742] EXT4-fs (loop4): VFS: Can't find ext4 filesystem [ 483.916209] IPVS: ftp: loaded support on port[0] = 21 [ 483.949133] BFS-fs: bfs_fill_super(): No BFS filesystem on loop4 (magic=00000000) [ 483.984463] jfs: Unrecognized mount option "umask=?" or missing value 2018/03/30 19:42:45 executing program 2: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) readv(0xffffffffffffffff, &(0x7f0000001480), 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f00003b9fdc)) readv(r0, &(0x7f0000001980)=[{&(0x7f00000018c0)=""/182, 0xb6}], 0x1) r1 = syz_open_pts(r0, 0x2) setsockopt$inet6_mtu(0xffffffffffffffff, 0x29, 0x17, &(0x7f0000000440)=0x5, 0x4) socket$inet_sctp(0x2, 0x5, 0x84) dup3(r1, r0, 0x0) write(r0, &(0x7f0000c34fff), 0xffffff0b) setsockopt$bt_l2cap_L2CAP_OPTIONS(0xffffffffffffffff, 0x6, 0x1, &(0x7f0000000380)={0xefa, 0x800, 0x0, 0x0, 0x9}, 0xc) 2018/03/30 19:42:45 executing program 3: accept4$nfc_llcp(0xffffffffffffffff, 0x0, &(0x7f0000000080), 0x0) mmap(&(0x7f0000002000/0x3000)=nil, 0x3000, 0x0, 0x12, 0xffffffffffffffff, 0x0) r0 = mq_open(&(0x7f0000000000)='-$\x00', 0x0, 0x0, &(0x7f0000664fc0)={0x0, 0x1}) keyctl$assume_authority(0x10, 0x0) socket$inet6_udp(0xa, 0x2, 0x0) r1 = socket$l2tp(0x18, 0x1, 0x1) add_key$keyring(&(0x7f0000000580)='keyring\x00', &(0x7f00000005c0)={0x73, 0x79, 0x7a, 0x3}, 0x0, 0x0, 0x0) keyctl$describe(0x6, 0x0, &(0x7f0000000b40)=""/4096, 0x1000) ioctl$TUNSETVNETHDRSZ(0xffffffffffffffff, 0x400454d8, &(0x7f0000000100)) connect$l2tp(r1, &(0x7f00005fafd2)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @multicast2=0xe0000002}, 0x4, 0x0, 0x2}}, 0x2e) add_key$user(&(0x7f0000000140)='user\x00', &(0x7f00000001c0)={0x73, 0x79, 0x7a}, &(0x7f0000000440)="840d572a8e609edca8c2551947d6efb55b7c8c94e1be6a1cf9f0b6c187b75286d9eed3d30f1edecec627b782331d1882137024a7df67ee9edfe12e1986880dcc2053b1f5ba810719d45c279d5082b3c8d02dab1ce0b01e1f4cb973cc1ece8d0deb7664206fa5c189e384551221e8e58c9a4775aa231a6349", 0x78, 0x0) close(0xffffffffffffffff) sendmsg$nl_crypto(r1, &(0x7f000037ffc8)={&(0x7f00009dd000)={0x10}, 0xc, &(0x7f00002ceff0)={&(0x7f000097b000)=@delrng={0x10, 0x14, 0x200, 0x0, 0x3}, 0xfff1}, 0x1}, 0x0) r2 = add_key(&(0x7f0000000a80)="6173796d6d65747269630041472e8b637f55f694fcef0e58fc2ac924f9dd8addbd7bdb020097658e7651738b0e4ab818c6e76c0d075a9aafccb8dfa463c0e04194ee37284e414193d860", &(0x7f0000000b00)={0x73, 0x79, 0x7a, 0x0}, &(0x7f0000000800), 0x0, 0xfffffffffffffffc) keyctl$instantiate_iov(0x14, 0x0, &(0x7f00000003c0)=[{&(0x7f0000000300)="ad6e2301849005b80f700749ce55a60fe1e41d5768c90ac2926a4d5cb5677573b42b9cd3cd194619f6f0d5f7662113df4b522d72293454068d859944dc8bd1449d14a763b027c673a6", 0x49}], 0x1, r2) mq_timedreceive(0xffffffffffffffff, &(0x7f0000be2f7d)=""/131, 0xfffffffffffffffd, 0x0, 0x0) ioctl$DRM_IOCTL_RES_CTX(0xffffffffffffff9c, 0xc0086426, &(0x7f0000000240)={0x4, &(0x7f0000000200)=[{}, {}, {}, {}]}) ioctl$DRM_IOCTL_RM_CTX(0xffffffffffffffff, 0xc0086421, &(0x7f0000000280)) syz_open_procfs(0x0, &(0x7f0000000180)='ns/cgroup\x00') r3 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r3, &(0x7f0000360000)={0x0, 0x0, &(0x7f000035d000)={&(0x7f0000000600)=ANY=[@ANYBLOB="020d00001000000000000000000000000300060000000000020000007f00000100400000000000000300050000000000020000000000000000000000000000000800120002000100000000000000000030000000030000000000000000a58300ff01000000000000000000000000000100000000000000000000ffffe000f60182193e2de13be6fc279b86"], 0x8b}, 0x1}, 0x0) request_key(&(0x7f0000000700)='ceph\x00', &(0x7f0000000740)={0x73, 0x79, 0x7a}, &(0x7f0000000780)='eth0ppp0\x00', 0xfffffffffffffff8) keyctl$instantiate_iov(0x14, 0x0, &(0x7f00000006c0), 0x200000000000006c, 0x0) syz_genetlink_get_family_id$ipvs(&(0x7f0000000540)='IPVS\x00') setns(r1, 0x4000000) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDRS(r0, 0x84, 0x6c, &(0x7f00000007c0)={0x0, 0xd9, "23fecfc99588e0ad369783a605440a345f65b3b28d793b9faae4bc36d2d2518fbff22a062673e74a02af5d598b03601e6445df7cf4202afa7a893ebc2075647dfc6afedcb351193d4c834b3a5fcf30cc1e8ad3845ee9a43586353132a5df41e5b6bf647b88ba096744d2ada590b292781a454075544c76f20817dd5ad36296472d385df2ea7a492c70f4fc92f184b230b927cb6d75a3ab0cb99dc438a268e457c6da7ffae1ef0ff163a070012a85f6c1ca94994cf0045df4cb4570c6df9b314d0e91f7a7bf6b230ba757441f7dd964c985bc8acc5fcb77e531"}, &(0x7f0000000040)=0xe1) getsockopt$inet_sctp_SCTP_RESET_STREAMS(0xffffffffffffffff, 0x84, 0x77, &(0x7f00000000c0)={r4, 0x0, 0x7, [0x3, 0x1, 0xfffffffffffffffc, 0x7, 0x1, 0x101, 0x81]}, &(0x7f00000002c0)=0x16) 2018/03/30 19:42:45 executing program 6: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_mreqn(r0, 0x0, 0x27, &(0x7f0000000000)={@multicast2=0xe0000002, @loopback=0x7f000001}, 0xc) getsockopt$inet_sctp6_SCTP_FRAGMENT_INTERLEAVE(0xffffffffffffffff, 0x84, 0x12, &(0x7f0000000080), &(0x7f00000000c0)=0x4) ioctl$sock_inet_SIOCGIFDSTADDR(0xffffffffffffffff, 0x8917, &(0x7f0000000040)={'bcsh0\x00', {0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x1a}}}) setsockopt$inet_sctp6_SCTP_MAX_BURST(0xffffffffffffffff, 0x84, 0x14, &(0x7f0000000380)=@int=0x3, 0x4) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000140)={'bcsh0\x00', 0x0}) ioctl$sock_inet6_SIOCDELRT(0xffffffffffffffff, 0x890c, &(0x7f0000000180)={@dev={0xfe, 0x80, [], 0x13}, @loopback={0x0, 0x1}, @mcast2={0xff, 0x2, [], 0x1}, 0x6, 0x0, 0x42e, 0x100, 0x9, 0x80000000, r1}) r2 = socket$inet(0x2, 0xa, 0x5) setsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX(r2, 0x84, 0x6e, &(0x7f0000000600)=[@in={0x2, 0x4e21, @multicast1=0xe0000001}, @in6={0xa, 0x4e20, 0x0, @remote={0xfe, 0x80, [], 0xbb}}, @in={0x2, 0x4e22, @multicast2=0xe0000002}, @in6={0xa, 0x4e21, 0x1ff, @local={0xfe, 0x80, [], 0xaa}, 0x84}, @in6={0xa, 0x4e20, 0x4, @local={0xfe, 0x80, [], 0xaa}}], 0x74) getsockopt$inet_sctp6_SCTP_PR_SUPPORTED(0xffffffffffffffff, 0x84, 0x71, &(0x7f0000000200)={0x0, 0x8}, &(0x7f0000000240)=0x8) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(0xffffffffffffffff, 0x84, 0x6f, &(0x7f0000000300)={r3, 0x70, &(0x7f0000000280)=[@in={0x2, 0x4e20, @dev={0xac, 0x14, 0x14}}, @in={0x2, 0x4e24, @loopback=0x7f000001}, @in={0x2, 0x4e20, @remote={0xac, 0x14, 0x14, 0xbb}}, @in={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x1a}}, @in={0x2, 0x4e24, @remote={0xac, 0x14, 0x14, 0xbb}}, @in={0x2, 0x4e24, @rand_addr=0x3ff}, @in={0x2, 0x4e24, @multicast2=0xe0000002}]}, &(0x7f0000000340)=0x10) setsockopt$inet_sctp6_SCTP_SET_PEER_PRIMARY_ADDR(0xffffffffffffffff, 0x84, 0x5, &(0x7f00000004c0)={r4, @in={{0x2, 0x4e20, @rand_addr=0x8}}}, 0x84) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, &(0x7f00000003c0)={'lo\x00', 0x4100}) ioctl$sock_inet_SIOCGIFNETMASK(0xffffffffffffffff, 0x891b, &(0x7f0000000100)={'nr0\x00', {0x2, 0x4e24, @loopback=0x7f000001}}) setsockopt$inet_msfilter(r0, 0x0, 0x29, &(0x7f0000000680)=ANY=[@ANYBLOB="cf0000000276d172390cc8c4ff4f3b746e5947c2ddb66a93ebb6d0f75b5f453435c311b94e126c49d47c10682b6e523d09fae1d416ebface98e08aa083e9f1f1afa118eb05655fec48d75d7a37edd032552c60ffeb53a2c8eecbe601a4ac5dceeecf1a943c2d9e2eaf4ad0a93e82a1a37a0cf2adbc4b512680428fee922ad18ff90ec6f87a75b299a953167bf4f9ae31cffd2c31dd47ba7d69151424dc1b2835f7624a302f270eb89118043dc1e1faa46e667be9cbf4456ad0c580ed032e4e49459f68f8a70f2dfe40f51362ffae"], 0x1) pread64(r0, &(0x7f0000000340)=""/181, 0xb5, 0x62) setsockopt$inet_msfilter(r0, 0x0, 0x29, &(0x7f0000000580)=ANY=[@ANYBLOB="e00000027f0000010000000001000000000000006b59aa51deb20d6efc9c04b7c9420f6434d31cbbe99b52873a8c21"], 0x1) socket$inet_udp(0x2, 0x2, 0x0) bpf$BPF_PROG_GET_NEXT_ID(0xb, &(0x7f0000000400)=0x7, 0x4) r5 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000ba4000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x2, 0x78, 0xe2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, r5, 0x0) r6 = perf_event_open(&(0x7f0000014f88)={0x1, 0x78, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00002e8000)}}, 0x0, 0x0, r5, 0x0) readv(r6, &(0x7f0000734000)=[{&(0x7f0000d42000)=""/146, 0x92}], 0x1) getsockopt$inet_sctp_SCTP_PEER_ADDR_THLDS(0xffffffffffffffff, 0x84, 0x1f, &(0x7f0000000480)={0x0, @in={{0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0xd}}}, 0xf80866d, 0x5}, &(0x7f0000000540)=0x90) getsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(0xffffffffffffff9c, 0x84, 0x18, &(0x7f0000000440)={r7, 0x400000000004}, &(0x7f00000005c0)=0xffffffffffffffc3) getsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER_VALUE(r0, 0x84, 0x7c, &(0x7f00000002c0)={r8, 0x10001, 0xc9e9}, &(0x7f0000000300)=0x8) 2018/03/30 19:42:45 executing program 0: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000f5eff5)='lp\x00', 0x4) sendto$inet(r0, &(0x7f0000fd0000), 0xfffffffffffffec1, 0x0, &(0x7f0000deaff0)={0x2, 0x4e23, @loopback=0x7f000001}, 0x10) shutdown(r0, 0x0) 2018/03/30 19:42:45 executing program 4: symlinkat(&(0x7f0000002f00)='./file0\x00', 0xffffffffffffffff, &(0x7f0000002f80)='./file0\x00') syz_mount_image$msdos(&(0x7f0000002fc0)='msdos\x00', &(0x7f0000003000)='./file0\x00', 0x4, 0x1, &(0x7f0000003180)=[{&(0x7f0000003040)="eaf9610c9f7031a1f58e51e73b3f0bd5af4364c38bbe335dbd3d211ec0338ba4c795c634af757a3c684da6110f67891133a6303441b21d139e3a6582efdaeabd3d68dbcb85cd383733a98084b62807af0b7ea49d68daa4cc9fda43dbeb13c3e67c44c463a2c429ccb66c0e1a9dfd5c911d4d7b578baaad6571d4457b9c6d92122a4bd97f5f174c81081941b007062f2cab2db1466851dde671e025909a633fec433bb2512fc61c436b74df23d280019a403884dc488071", 0xb7, 0xcd7}], 0x8, &(0x7f00000031c0)={[{@errors_continue='errors=continue', 0x2c}, {@time_offset={'time_offset', 0x3d, [0x0]}, 0x2c}]}) pipe(&(0x7f0000002f40)={0xffffffffffffffff}) r1 = open(&(0x7f0000003240)='./file0\x00', 0xa0001, 0x20) linkat(r0, &(0x7f0000003200)='./file0\x00', r1, &(0x7f0000003280)='./file0\x00', 0x400) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x80000, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)}, {&(0x7f0000010d00)="0000000000000000000000000000000000000000000000000000000002ae0000ed41000000040000d15bbe5ad15bbe5ad15bbe5a00000000000005002000000000000800070000000af301000400000000000000000000000100000030000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a1950000", 0xa0, 0x8c60}, {&(0x7f0000011a00)="020000000c0001022e000000020000000c0002022e2e00000b00000014000a026c6f73742b666f756e6400000c0000001000050166696c65300000000d0000001000050266696c65310000000f0000001000050166696c6532000000100000001000050166696c6533000000110000001000050166696c65340000001200000010000802564944454f5f54531400000068031201d181d18ed0b7d0bad0b0d0bbd0bbd0b5d1800000000000000000000000000000000000000000000000000000", 0xc0, 0xc000}, {&(0x7f0000012200)="0000000000000000000000000000000000000000000000000c0000dec910dfd800000000f4030000000000000000000000000000000000000000000000000000", 0x40, 0x117e0}, {&(0x7f0000012a00)="0d0000000c0001022e000000020000000c0002022e2e00000e000000dc03050166696c6530000000000000000000000000000000000000000000000000000000", 0x40, 0x1c000}], 0x0, &(0x7f0000013000)) syz_mount_image$bfs(&(0x7f0000000040)='bfs\x00', &(0x7f00000008c0)='./file0\x00', 0x20, 0x2, &(0x7f0000000180)=[{&(0x7f00000005c0)="f37e57346e86cb5adec662d7bd6f13a3764d2ca7640f9f81ba88d0689d0989735a7bafd5558d9a6e8988f9f6038fa475e49077bc8cfc6e170c4cdbaaa1375895c9a4068559d3cecf2a0423caa696bf77a75b3ae3f32b79da059ca13d055647998987fc2033d008bd55deb08808372b9b4595fb0d79a1358cd5949d859a7d155e86db4b608eb401109f6b792f5ce4a2ead9870dee49347bc08d0d54b0e4fca4fd895947a737f4ee823d997770e5c9df50c0c9fe2c0b945c6ffd13b7151e385b631520ac34a5967c6cd0d12b3746795681600541c17d379daed41ce8e715eba582fb668e160872a2", 0xe7, 0x7}, {&(0x7f0000000780)="6154d093a5a905da96fed5f8dea36bcd9d1d011246f7caf86806bf6ac6301d2d2b448461b867bbbe7d0eebdeafa16d7219af85ff4372670039ce277546def59f1d0eed4be4386a34c7243fe3ec84ad3807136a2c3ec35d6d87a7d7bb9342622cc3a7ff529ef3d76ff57fc7a1856f50b98e518515a9e679067cfc0e8500754fa30a81cf4dc42c5a0d36647280c5b0a8506efaf9ad06594678176efe4bdbcf7ab384b597df4c5ad66b2bd240823abe04cd30785819f1c7fd4d46bb55f8bd09ca4b44618b010e363fa572ca189ec73b36ad46b6f38d65c0acc417", 0xd9, 0x5}], 0x200000, 0x0) syz_mount_image$jfs(&(0x7f0000000080)='jfs\x00', &(0x7f0000000880)='./file0\x00', 0xfffffffffffffffe, 0x3, &(0x7f0000002dc0)=[{&(0x7f0000000900)="efee47debce411554253d03f2175c060de26b9a7a197d9327971105aafdf17a061227fe7dd52d3c1c1f0318992f304f7646c3eb4e32ff0514d34d4605b4e152474aa71ac6c0ba890b1f249f213d5bc162b605fdf3c524d6f84e1a2f8461d26ef5dd50b193ffb710ee69fc431552ae4548f0c1a7e503243bb10c53c566f37e3234d8b3d418992dca946568d275e1f54895a854bab3790963108fe6ce5b1f933e81bd0aa2dfd715aca4bd81b48b28e3ee265", 0xb1, 0x1}, {&(0x7f0000001a80)="b4bc90ad72742e5693f04c7955b05460b33cd0ca9cde365dbe1671162a8c1db744cb8a04d1d747ab4d3234fd615e6ad897396c21b8bf7da2c1d524d04fadade841e5acfac529250a2c75fed4b65a7b6c8735268244189e020c526112728097958fd591d00cd16d1591db9b0414d985d7718794369eb03d89403b7df76f6d745c94d4fa986321a9915fea55a73472bc39620fcf22ec74d02b77fafe6ccf72605eb0ba7ae69fa10a36d281e65a178528bc654ce5b6109d5294e400b18be755a3b899489b27a876ac3ea033ed525b28c7dff537b5210cbff466dc339e1f58db1679816589e886264ef1bcf6d0e1408d93946827711972", 0xf5, 0x7}, {&(0x7f0000002cc0)="c9bc1928c9ffffe99fdae39f5013810a038f1d558affc92341c81ee308195dabd95fcfedcfccd4cf2af62477e5ed935114b73940dba239c47d5824a3332fb48cea682934a6840ea5db2529c3a7c371bbf08f08bb15458de586609be64b699f29b7384dc7b2ba78f0e343fb9851eaf5a7b4106fc5b7a8aaf6e069012286fa7259807928cbee722222f45e6c98cefa00829bcdd92bd03273c7b0f20453c72150adf49c311248d3d3d96ad17187d60add3d", 0xb0, 0x4}], 0x10000, &(0x7f0000002ec0)={[{@nodiscard='nodiscard', 0x2c}, {@resize='resize', 0x2c}, {@noquota='noquota', 0x2c}, {@umask={'umask', 0x3d, [0x3f]}, 0x2c}]}) 2018/03/30 19:42:45 executing program 7: r0 = dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x80000) ioctl$LOOP_SET_STATUS64(r0, 0x4c04, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x1d, 0x8, "b2cdc16948c2d8defdc6ccd7e69370cd89206e757600f494a6f386fd75de4ec168412aefa9b47ddce6005ef1f5e2188c611f11fe23a9973b4f3b4ca8115d75b6", "adcddcbdd258708ed483b1c6d50b363981c4f943de7510903594aa41b5a7d76826f71b49332e607bd68a9352cd05d36e027047e9bd95b49f71e4f89c99b3dacc", "98731c39612dffb0f3700d6862ad2c5e51f2bf1597643d3216b87c072c7cef3c", [0x0, 0x1]}) r1 = socket$inet6(0xa, 0x400000000001, 0x0) r2 = dup(r1) ioctl$TIOCGSID(r2, 0x5429, &(0x7f0000000440)) getresuid(&(0x7f0000000640), &(0x7f0000000680), &(0x7f00000006c0)) gettid() lstat(&(0x7f0000000740)='./file0\x00', &(0x7f0000000780)) fstat(r0, &(0x7f0000000800)) r3 = getpgrp(0xffffffffffffffff) getsockopt$inet_IP_IPSEC_POLICY(r2, 0x0, 0x10, &(0x7f0000000880)={{{@in=@rand_addr, @in6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@local}, 0x0, @in6=@loopback}}, &(0x7f0000000980)=0xe8) getresgid(&(0x7f00000009c0), &(0x7f0000000a00), &(0x7f0000000a40)=0x0) ioctl$sock_FIOGETOWN(r1, 0x8903, &(0x7f0000000a80)=0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x22, &(0x7f0000000ac0)={{{@in6=@mcast1, @in6=@mcast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@local}, 0x0, @in6=@loopback}}, &(0x7f0000000bc0)=0xe8) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f00000022c0)={0x0, 0x0, 0x0}, &(0x7f0000002300)=0xc) sendmsg$netlink(r0, &(0x7f00000024c0)={&(0x7f0000000180)=@kern={0x10, 0x0, 0x0, 0x4000000}, 0xc, &(0x7f0000000700)=[{&(0x7f0000001100)={0x10, 0x34, 0x0, 0x70bd27, 0x25dfdbfe}, 0x10}], 0x1, &(0x7f0000002340)=[@rights={0x30, 0x1, 0x1, [r2, r0, r2, r2, r0, r1, r1]}, @cred={0x20, 0x1, 0x2, r3, r4, r5}, @rights={0x18, 0x1, 0x1, [r2]}, @cred={0x20, 0x1, 0x2, r6, r7, r8}, @rights={0x20, 0x1, 0x1, [r0, r2, r0, r2]}], 0xa8, 0x8000}, 0x800) fchdir(0xffffffffffffffff) r9 = creat(&(0x7f00000002c0)='./file1\x00', 0x0) write$tun(r9, &(0x7f0000000200)=ANY=[@ANYBLOB], 0x1) clock_gettime(0x0, &(0x7f0000000300)={0x0, 0x0}) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_TEMPO(r0, 0x402c5342, &(0x7f0000000340)={0x3, 0xf634, 0xcc, {0x0, r10+10000000}, 0x4, 0x7}) fcntl$setstatus(r9, 0x4, 0x6000) unlink(&(0x7f0000000000)='./file1\x00') r11 = socket$netlink(0x10, 0x3, 0x0) writev(r11, &(0x7f0000011ff0)=[{&(0x7f00000002c0)="390000001300090665000000000000007f0080400300000046000107000000141900040004800000070000000003000000000000000003f500", 0x39}], 0x1) fcntl$getown(r9, 0x9) pwritev(0xffffffffffffffff, &(0x7f0000000240), 0x0, 0x0) syz_genetlink_get_family_id$ipvs(&(0x7f0000000140)='IPVS\x00') setsockopt$inet_tcp_buf(r9, 0x6, 0xd, &(0x7f00000001c0)="0ff96be526dc7479dc678fe172", 0xd) 2018/03/30 19:42:45 executing program 5: unshare(0x40000000) perf_event_open(&(0x7f000001d000)={0x2, 0x78, 0xe2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000000)={0x6, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl(0xffffffffffffffff, 0x8982, &(0x7f0000000000)) r0 = socket$packet(0x11, 0x0, 0x300) r1 = openat$cuse(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/cuse\x00', 0x82, 0x0) io_setup(0x43f, &(0x7f00000000c0)=0x0) io_submit(r2, 0x1, &(0x7f0000000000)=[&(0x7f0000000200)={0x0, 0x0, 0x0, 0x1, 0x0, r1, &(0x7f0000000040)="10000000020400000000000000000000", 0x10}]) r3 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000280)='/proc/sys/net/ipv4/vs/secure_tcp\x00', 0x2, 0x0) sendmsg$kcm(r3, &(0x7f0000001f00)={&(0x7f0000001b40)=@pppol2tpin6={0x18, 0x1, {0x0, r0, 0x0, 0x1, 0x0, 0x0, {0xa, 0x4e24, 0xc1, @mcast1={0xff, 0x1, [], 0x1}}}}, 0x80, &(0x7f0000001d80)=[{&(0x7f0000001bc0)="a9db123ebf124fab0f2eec9774559e3b5870fb7c6818fc89c4b8742d057480657265ae2b34fb2d4e585d22ca1bf7b0a22ce38a20a819d919947c78f8d5c9f3291905fd3ed2b8ef8a79d9453396c6b0b7eb0778dbc49b32ae91e443b64edddcf320c1589c7777eadd4e57c01b20a8ca7a831e8e2c104d0194d52fb5c35b550f", 0x7f}], 0x1, &(0x7f0000001dc0)=ANY=[], 0x0, 0x90}, 0x20000000) r4 = syz_open_dev$tun(&(0x7f00000001c0)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r4, 0x400454ca, &(0x7f0000000200)={'bridge0\x00\x00p\x00', 0x4000000000001005}) socketpair(0x1d, 0x3, 0x40, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_inet_SIOCSIFADDR(r5, 0x8916, &(0x7f0000000100)={'bridge8\x00', {0x2, 0x0, @dev={0xac, 0x14, 0x14}}}) ioctl$LOOP_SET_FD(r1, 0x4c00, r0) ioctl$SNDRV_SEQ_IOCTL_RUNNING_MODE(0xffffffffffffffff, 0xc0105303, &(0x7f00000002c0)={0x2, 0x8}) add_key$keyring(&(0x7f00000000c0)='keyring\x00', &(0x7f0000000100)={0x73, 0x79, 0x7a}, 0x0, 0x0, 0x0) clone(0x0, &(0x7f0000000040), &(0x7f0000000080), &(0x7f0000000000), &(0x7f0000000100)) ioctl$int_in(0xffffffffffffffff, 0x800000c004500a, &(0x7f0000006ff8)) wait4(0x0, 0x0, 0x4, &(0x7f0000000380)) ioctl$sock_inet_sctp_SIOCINQ(r6, 0x541b, &(0x7f0000000180)) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_PORT(0xffffffffffffffff, 0xc0a85352, &(0x7f0000001980)={{}, 'port1\x00', 0x0, 0x20010, 0x1f, 0x0, 0x3, 0x40, 0x0, 0x0, 0x4, 0x6d1}) 2018/03/30 19:42:45 executing program 1: r0 = syz_open_dev$amidi(&(0x7f0000000040)='/dev/amidi#\x00', 0x3, 0x28000) ioctl$DRM_IOCTL_RES_CTX(r0, 0xc0086426, &(0x7f0000000100)={0x2c, &(0x7f00000000c0)=[{}, {}, {}, {}, {}, {}, {}, {}]}) socket$netlink(0x10, 0x3, 0xc) writev(0xffffffffffffffff, &(0x7f00000021c0), 0x0) bind$bt_l2cap(r0, &(0x7f0000000340)={0x1f, 0x800000000000002, {0x401, 0x3, 0xb, 0x3f8}}, 0x9) socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f0000a8d000)={&(0x7f0000c78ff4)={0x10}, 0xc, &(0x7f0000df6000)={&(0x7f0000000200)=ANY=[@ANYBLOB="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"], 0x10d}, 0x1}, 0x0) r1 = socket$inet_sctp(0x2, 0x5, 0x84) sendmsg$inet_sctp(r1, &(0x7f0000001f00)={&(0x7f0000001840)=@in={0x2, 0x0, @dev={0xac, 0x14, 0x14}}, 0x10, &(0x7f0000001c40)=[{&(0x7f0000001880)='[', 0x1}], 0x1, &(0x7f0000001e40)}, 0x40) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000540)=@nat={'nat\x00', 0x19, 0x3, 0x376, [0x20000140, 0x0, 0x0, 0x20000170, 0x200002d0], 0x0, &(0x7f0000000100), &(0x7f00000006c0)=ANY=[@ANYBLOB="00000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000ffffffff01000000110000000000000000006e7230000000000000000000000000006772657461703000000000000000000074756e6c30000000000000000000000073797a6b616c6c657230000000000000ffffffffffff0000ff0000ffaaaaaaaaaaaaffff0000ffff000070000000b8000000e800000049444c4554494d45520000000000000000000000000000000000000000000000240000008100000073797a300000000000000000400000000000000000000000000000000100000061727072ffffff7f0000000000000000000000000000000000000000000000000c000000aaaaaaaaaabb00000000000000000000000000000000000000000000000000000000000000000000000000000000000001000000feffffff0000000000000000060000000000000000000000000000000000000000000000000000000000000001000000ffffffff020000000000000002000000880864756d6d79300000000000000000000062707130080000000000000000000000697036746e6c3000000000000000000073697430000000000000000000000000ffffffffffff000000000000aaaaaaaaaaaaffffffff00ff0000700000007000000098000000726564697265637400000000000000000000000000000000000000000000000004000000fcffffff0900000008000000000062726964676530000000000000000000697036746e6c3000000000000000000062637368300000000000000000000000766c616e300000000000000000000000000000000000ff00ff00ffffffffffffffff00ffffffff000000080100000801000030010000697076730000000000000000000000000000000000000000000000000000000028000000ac1414aa000000000000000000000000ffffffffffffff0000000000ff0000004e2400004e240008697076730000000000000000000000000000000000000000000000000000000028000000e0000001000000000000000000000000ffffffff000000ffffffffffff0000004e212b054e201f124155444954000000000000000000000000000000000000000000000000000000040000000000000075eb180f3829"]}, 0x3ee) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000002980)) getsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(0xffffffffffffffff, 0x84, 0x1f, &(0x7f0000000440)={0x0, @in={{0x2, 0x4e22, @multicast2=0xe0000002}}, 0x7bb7, 0x4}, &(0x7f0000000500)=0x90) getsockopt$inet_sctp_SCTP_RTOINFO(0xffffffffffffffff, 0x84, 0x0, &(0x7f0000002240)={0x0, 0x9, 0x417}, &(0x7f00000001c0)=0x10) r2 = socket(0x22, 0x4, 0x3) r3 = socket(0x20000001e, 0x5, 0x0) r4 = perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$packet_tx_ring(r3, 0x10f, 0x87, &(0x7f0000265000)=@req={0x3fc, 0x0, 0x1}, 0x10) getegid() setsockopt$packet_tx_ring(r2, 0x10f, 0x87, &(0x7f0000265000)=@req={0x3fc, 0x0, 0x1}, 0x10) writev(r2, &(0x7f00000000c0)=[{&(0x7f0000000000)="8a", 0x1}], 0x1) close(r2) close(r3) perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r5 = syz_open_dev$evdev(&(0x7f0000dfdfee)='/dev/input/event#\x00', 0x0, 0x2) readv(r5, &(0x7f0000019fe0)=[{&(0x7f00008ec000)=""/219, 0xdb}], 0x1) write$evdev(r5, &(0x7f000004d000)=[{{}, 0x0, 0x1}, {{0x2}}], 0x30) r6 = getpgrp(0x0) setsockopt$ax25_int(r3, 0x101, 0xd, &(0x7f0000000080)=0x7, 0x4) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x8, 0xfffffffffffffffd, 0x9, 0x7, 0x0, 0x8001, 0x0, 0x6, 0x3ff, 0x4, 0x5, 0x4, 0xbd9, 0x56, 0x8000, 0x7f, 0xff, 0xeba, 0x1f, 0x0, 0xfd, 0x3, 0x1, 0x50, 0x7, 0x9, 0x641800, 0x3ff8000000000000, 0x4, 0x0, 0x10000, 0x5, 0x7, 0x6, 0x1, 0xffffffffffffffe0, 0x0, 0x20, 0x0, @perf_bp={&(0x7f0000000040), 0x8}, 0x20, 0x401, 0x8, 0x3, 0x8, 0x7, 0x7}, r6, 0xc, r4, 0x0) syz_genetlink_get_family_id$ipvs(&(0x7f0000000040)='IPVS\x00') 2018/03/30 19:42:45 executing program 0: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000f5eff5)='lp\x00', 0x4) sendto$inet(r0, &(0x7f0000fd0000), 0xfffffffffffffec1, 0x0, &(0x7f0000deaff0)={0x2, 0x4e23, @loopback=0x7f000001}, 0x10) shutdown(r0, 0x0) [ 484.869655] FAT-fs (loop4): Unrecognized mount option "time_offset=" or missing value [ 484.886816] netlink: 'syz-executor7': attribute type 4 has an invalid length. 2018/03/30 19:42:45 executing program 4: symlinkat(&(0x7f0000002f00)='./file0\x00', 0xffffffffffffffff, &(0x7f0000002f80)='./file0\x00') syz_mount_image$msdos(&(0x7f0000002fc0)='msdos\x00', &(0x7f0000003000)='./file0\x00', 0x4, 0x1, &(0x7f0000003180)=[{&(0x7f0000003040)="eaf9610c9f7031a1f58e51e73b3f0bd5af4364c38bbe335dbd3d211ec0338ba4c795c634af757a3c684da6110f67891133a6303441b21d139e3a6582efdaeabd3d68dbcb85cd383733a98084b62807af0b7ea49d68daa4cc9fda43dbeb13c3e67c44c463a2c429ccb66c0e1a9dfd5c911d4d7b578baaad6571d4457b9c6d92122a4bd97f5f174c81081941b007062f2cab2db1466851dde671e025909a633fec433bb2512fc61c436b74df23d280019a403884dc488071", 0xb7, 0xcd7}], 0x8, &(0x7f00000031c0)={[{@errors_continue='errors=continue', 0x2c}, {@time_offset={'time_offset', 0x3d, [0x0]}, 0x2c}]}) pipe(&(0x7f0000002f40)={0xffffffffffffffff}) r1 = open(&(0x7f0000003240)='./file0\x00', 0xa0001, 0x20) linkat(r0, &(0x7f0000003200)='./file0\x00', r1, &(0x7f0000003280)='./file0\x00', 0x400) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x80000, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)}, {&(0x7f0000010d00)="0000000000000000000000000000000000000000000000000000000002ae0000ed41000000040000d15bbe5ad15bbe5ad15bbe5a00000000000005002000000000000800070000000af301000400000000000000000000000100000030000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a1950000", 0xa0, 0x8c60}, {&(0x7f0000011a00)="020000000c0001022e000000020000000c0002022e2e00000b00000014000a026c6f73742b666f756e6400000c0000001000050166696c65300000000d0000001000050266696c65310000000f0000001000050166696c6532000000100000001000050166696c6533000000110000001000050166696c65340000001200000010000802564944454f5f54531400000068031201d181d18ed0b7d0bad0b0d0bbd0bbd0b5d1800000000000000000000000000000000000000000000000000000", 0xc0, 0xc000}, {&(0x7f0000012200)="0000000000000000000000000000000000000000000000000c0000dec910dfd800000000f4030000000000000000000000000000000000000000000000000000", 0x40, 0x117e0}, {&(0x7f0000012a00)="0d0000000c0001022e000000020000000c0002022e2e00000e000000dc03050166696c6530000000000000000000000000000000000000000000000000000000", 0x40, 0x1c000}], 0x0, &(0x7f0000013000)) syz_mount_image$bfs(&(0x7f0000000040)='bfs\x00', &(0x7f00000008c0)='./file0\x00', 0x20, 0x2, &(0x7f0000000180)=[{&(0x7f00000005c0)="f37e57346e86cb5adec662d7bd6f13a3764d2ca7640f9f81ba88d0689d0989735a7bafd5558d9a6e8988f9f6038fa475e49077bc8cfc6e170c4cdbaaa1375895c9a4068559d3cecf2a0423caa696bf77a75b3ae3f32b79da059ca13d055647998987fc2033d008bd55deb08808372b9b4595fb0d79a1358cd5949d859a7d155e86db4b608eb401109f6b792f5ce4a2ead9870dee49347bc08d0d54b0e4fca4fd895947a737f4ee823d997770e5c9df50c0c9fe2c0b945c6ffd13b7151e385b631520ac34a5967c6cd0d12b3746795681600541c17d379daed41ce8e715eba582fb668e160872a2", 0xe7, 0x7}, {&(0x7f0000000780)="6154d093a5a905da96fed5f8dea36bcd9d1d011246f7caf86806bf6ac6301d2d2b448461b867bbbe7d0eebdeafa16d7219af85ff4372670039ce277546def59f1d0eed4be4386a34c7243fe3ec84ad3807136a2c3ec35d6d87a7d7bb9342622cc3a7ff529ef3d76ff57fc7a1856f50b98e518515a9e679067cfc0e8500754fa30a81cf4dc42c5a0d36647280c5b0a8506efaf9ad06594678176efe4bdbcf7ab384b597df4c5ad66b2bd240823abe04cd30785819f1c7fd4d46bb55f8bd09ca4b44618b010e363fa572ca189ec73b36ad46b6f38d65c0acc417", 0xd9, 0x5}], 0x200000, 0x0) syz_mount_image$jfs(&(0x7f0000000080)='jfs\x00', &(0x7f0000000880)='./file0\x00', 0xfffffffffffffffe, 0x3, &(0x7f0000002dc0)=[{&(0x7f0000000900)="efee47debce411554253d03f2175c060de26b9a7a197d9327971105aafdf17a061227fe7dd52d3c1c1f0318992f304f7646c3eb4e32ff0514d34d4605b4e152474aa71ac6c0ba890b1f249f213d5bc162b605fdf3c524d6f84e1a2f8461d26ef5dd50b193ffb710ee69fc431552ae4548f0c1a7e503243bb10c53c566f37e3234d8b3d418992dca946568d275e1f54895a854bab3790963108fe6ce5b1f933e81bd0aa2dfd715aca4bd81b48b28e3ee265", 0xb1, 0x1}, {&(0x7f0000001a80)="b4bc90ad72742e5693f04c7955b05460b33cd0ca9cde365dbe1671162a8c1db744cb8a04d1d747ab4d3234fd615e6ad897396c21b8bf7da2c1d524d04fadade841e5acfac529250a2c75fed4b65a7b6c8735268244189e020c526112728097958fd591d00cd16d1591db9b0414d985d7718794369eb03d89403b7df76f6d745c94d4fa986321a9915fea55a73472bc39620fcf22ec74d02b77fafe6ccf72605eb0ba7ae69fa10a36d281e65a178528bc654ce5b6109d5294e400b18be755a3b899489b27a876ac3ea033ed525b28c7dff537b5210cbff466dc339e1f58db1679816589e886264ef1bcf6d0e1408d93946827711972", 0xf5, 0x7}, {&(0x7f0000002cc0)="c9bc1928c9ffffe99fdae39f5013810a038f1d558affc92341c81ee308195dabd95fcfedcfccd4cf2af62477e5ed935114b73940dba239c47d5824a3332fb48cea682934a6840ea5db2529c3a7c371bbf08f08bb15458de586609be64b699f29b7384dc7b2ba78f0e343fb9851eaf5a7b4106fc5b7a8aaf6e069012286fa7259807928cbee722222f45e6c98cefa00829bcdd92bd03273c7b0f20453c72150adf49c311248d3d3d96ad17187d60add3d", 0xb0, 0x4}], 0x10000, &(0x7f0000002ec0)={[{@nodiscard='nodiscard', 0x2c}, {@resize='resize', 0x2c}, {@noquota='noquota', 0x2c}, {@umask={'umask', 0x3d, [0x3f]}, 0x2c}]}) 2018/03/30 19:42:45 executing program 6: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_mreqn(r0, 0x0, 0x27, &(0x7f0000000000)={@multicast2=0xe0000002, @loopback=0x7f000001}, 0xc) getsockopt$inet_sctp6_SCTP_FRAGMENT_INTERLEAVE(0xffffffffffffffff, 0x84, 0x12, &(0x7f0000000080), &(0x7f00000000c0)=0x4) ioctl$sock_inet_SIOCGIFDSTADDR(0xffffffffffffffff, 0x8917, &(0x7f0000000040)={'bcsh0\x00', {0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x1a}}}) setsockopt$inet_sctp6_SCTP_MAX_BURST(0xffffffffffffffff, 0x84, 0x14, &(0x7f0000000380)=@int=0x3, 0x4) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000140)={'bcsh0\x00', 0x0}) ioctl$sock_inet6_SIOCDELRT(0xffffffffffffffff, 0x890c, &(0x7f0000000180)={@dev={0xfe, 0x80, [], 0x13}, @loopback={0x0, 0x1}, @mcast2={0xff, 0x2, [], 0x1}, 0x6, 0x0, 0x42e, 0x100, 0x9, 0x80000000, r1}) r2 = socket$inet(0x2, 0xa, 0x5) setsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX(r2, 0x84, 0x6e, &(0x7f0000000600)=[@in={0x2, 0x4e21, @multicast1=0xe0000001}, @in6={0xa, 0x4e20, 0x0, @remote={0xfe, 0x80, [], 0xbb}}, @in={0x2, 0x4e22, @multicast2=0xe0000002}, @in6={0xa, 0x4e21, 0x1ff, @local={0xfe, 0x80, [], 0xaa}, 0x84}, @in6={0xa, 0x4e20, 0x4, @local={0xfe, 0x80, [], 0xaa}}], 0x74) getsockopt$inet_sctp6_SCTP_PR_SUPPORTED(0xffffffffffffffff, 0x84, 0x71, &(0x7f0000000200)={0x0, 0x8}, &(0x7f0000000240)=0x8) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(0xffffffffffffffff, 0x84, 0x6f, &(0x7f0000000300)={r3, 0x60, &(0x7f0000000280)=[@in={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x12}}, @in={0x2, 0x4e20, @remote={0xac, 0x14, 0x14, 0xbb}}, @in={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x1a}}, @in={0x2, 0x4e24, @remote={0xac, 0x14, 0x14, 0xbb}}, @in={0x2, 0x4e24, @rand_addr=0x3ff}, @in={0x2, 0x4e24, @multicast2=0xe0000002}]}, &(0x7f0000000340)=0x10) setsockopt$inet_sctp6_SCTP_SET_PEER_PRIMARY_ADDR(0xffffffffffffffff, 0x84, 0x5, &(0x7f00000004c0)={r4, @in={{0x2, 0x4e20, @rand_addr=0x8}}}, 0x84) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, &(0x7f00000003c0)={'lo\x00', 0x4100}) ioctl$sock_inet_SIOCGIFNETMASK(0xffffffffffffffff, 0x891b, &(0x7f0000000100)={'nr0\x00', {0x2, 0x4e24, @loopback=0x7f000001}}) setsockopt$inet_msfilter(r0, 0x0, 0x29, &(0x7f0000000680)=ANY=[@ANYBLOB="cf0000000276d172390cc8c4ff4f3b746e5947c2ddb66a93ebb6d0f75b5f453435c311b94e126c49d47c10682b6e523d09fae1d416ebface98e08aa083e9f1f1afa118eb05655fec48d75d7a37edd032552c60ffeb53a2c8eecbe601a4ac5dceeecf1a943c2d9e2eaf4ad0a93e82a1a37a0cf2adbc4b512680428fee922ad18ff90ec6f87a75b299a953167bf4f9ae31cffd2c31dd47ba7d69151424dc1b2835f7624a302f270eb89118043dc1e1faa46e667be9cbf4456ad0c580ed032e4e49459f68f8a70f2dfe40f51362ffae"], 0x1) pread64(r0, &(0x7f0000000340)=""/181, 0xb5, 0x62) setsockopt$inet_msfilter(r0, 0x0, 0x29, &(0x7f0000000580)=ANY=[@ANYBLOB="e00000027f0000010000000001000000000000006b59aa51deb20d6efc9c04b7c9420f6434d31cbbe99b52873a8c21"], 0x1) socket$inet_udp(0x2, 0x2, 0x0) bpf$BPF_PROG_GET_NEXT_ID(0xb, &(0x7f0000000400)=0x7, 0x4) r5 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000ba4000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x2, 0x78, 0xe2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, r5, 0x0) r6 = perf_event_open(&(0x7f0000014f88)={0x1, 0x78, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00002e8000)}}, 0x0, 0x0, r5, 0x0) readv(r6, &(0x7f0000734000)=[{&(0x7f0000d42000)=""/146, 0x92}], 0x1) getsockopt$inet_sctp_SCTP_PEER_ADDR_THLDS(0xffffffffffffffff, 0x84, 0x1f, &(0x7f0000000480)={0x0, @in={{0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0xd}}}, 0xf80866d, 0x5}, &(0x7f0000000540)=0x90) getsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(0xffffffffffffff9c, 0x84, 0x18, &(0x7f0000000440)={r7, 0x400000000004}, &(0x7f00000005c0)=0xffffffffffffffc3) getsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER_VALUE(r0, 0x84, 0x7c, &(0x7f00000002c0)={r8, 0x10001, 0xc9e9}, &(0x7f0000000300)=0x8) 2018/03/30 19:42:46 executing program 0: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000f5eff5)='lp\x00', 0x4) sendto$inet(r0, &(0x7f0000fd0000), 0xfffffffffffffec1, 0x20000801, &(0x7f0000deaff0)={0x2, 0x0, @loopback=0x7f000001}, 0x10) shutdown(r0, 0x0) 2018/03/30 19:42:46 executing program 3: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup.cpu\x00', 0x200002, 0x0) fchdir(r0) r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer\x00', 0x208801, 0x0) open(&(0x7f0000000280)='./file0\x00', 0x10000000080040, 0x0) rename(&(0x7f0000000000)='./file0\x00', &(0x7f0000887ff8)='./file1\x00') rt_sigtimedwait(&(0x7f00009ac000)={0xfffffffffffffffd}, &(0x7f0000de0ff0), &(0x7f0000039ff0)={0x0, 0x8000000}, 0x8) creat(&(0x7f0000fdeff8)='./file1\x00', 0x0) add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000180)={0x73, 0x79, 0x7a}, &(0x7f0000000240), 0x0, 0xfffffffffffffff8) keyctl$setperm(0x5, 0x0, 0x0) openat$cgroup_procs(r0, &(0x7f00000002c0)='cgroup.threads\x00', 0x2, 0x0) symlink(&(0x7f0000000140)='./file1\x00', &(0x7f0000000200)='./file1\x00') syz_fuse_mount(&(0x7f0000000300)='./file1\x00', 0x0, 0x0, 0x0, 0x0, 0x0) setsockopt$SO_VM_SOCKETS_BUFFER_MAX_SIZE(0xffffffffffffffff, 0x28, 0x2, &(0x7f00000001c0), 0x8) syz_open_dev$sg(&(0x7f0000000040)='/dev/sg#\x00', 0x6, 0x202002) bind$netlink(0xffffffffffffffff, &(0x7f0000000180)={0x10}, 0xc) syz_genetlink_get_family_id$ipvs(&(0x7f00000000c0)='IPVS\x00') sendmsg$IPVS_CMD_NEW_DEST(0xffffffffffffffff, &(0x7f0000000140)={&(0x7f0000000080)={0x10}, 0xc, &(0x7f0000000100)={&(0x7f0000000600)=ANY=[]}, 0x1}, 0x93ccaba251633594) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000340)={{{@in=@remote, @in=@broadcast}}, {{}, 0x0, @in=@broadcast}}, &(0x7f0000000440)=0xe8) ioctl$sock_netrom_TIOCOUTQ(r1, 0x5411, &(0x7f0000000600)) lstat(&(0x7f0000000480)='./file0\x00', &(0x7f00000004c0)) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000002e80)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x2020008}, 0xc, &(0x7f0000002e40)={&(0x7f0000000540)=ANY=[@ANYBLOB="9c0000003800000125bd7000fddbdf250000000008001100040044002dd114a18da106b1c8a9398d013e2fe1a16069e90dc91205920f6bd4e33ef8206d4eaad6120ad055ac"], 0x1}, 0x1}, 0x4040000) [ 484.941868] kernel msg: ebtables bug: please report to author: EBT_ENTRY_OR_ENTRIES shouldn't be set in distinguisher [ 484.959893] netlink: 'syz-executor7': attribute type 4 has an invalid length. [ 484.965503] FAT-fs (loop4): Unrecognized mount option "time_offset=" or missing value [ 485.002360] EXT4-fs (loop4): VFS: Can't find ext4 filesystem 2018/03/30 19:42:46 executing program 7: r0 = socket$inet6(0x10, 0x2, 0x0) socket$inet_udp(0x2, 0x2, 0x0) r1 = socket$packet(0x11, 0x800000000002, 0x300) setsockopt$packet_fanout(0xffffffffffffffff, 0x107, 0x12, &(0x7f000095bffc)={0x0, 0x0, 0xfffffffffffffffc}, 0x4) connect$inet(0xffffffffffffffff, &(0x7f0000000040)={0x2, 0x4e20, @local={0xac, 0x14, 0x14, 0xaa}}, 0x10) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f00000000c0)={0x0, 0x0}, &(0x7f0000000100)=0xc) setfsuid(r2) r3 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$packet_fanout(r1, 0x107, 0x12, &(0x7f0000000340)={0xfffffffffffff001, 0x3, 0x1000}, 0x4) connect$inet(r3, &(0x7f0000000040)={0x2, 0x4e20, @local={0xac, 0x14, 0x14, 0xaa}}, 0x10) sendto$inet(r3, &(0x7f0000762fff), 0xfdc7, 0x0, &(0x7f000057bff0)={0x2, 0x4e20, @multicast1=0xe0000001}, 0x10) syz_emit_ethernet(0x1, &(0x7f00000002c0)=ANY=[@ANYBLOB="36a70baa6f73852698ba49619a354f166641d8120858876a22891a68c6cc13ca78cbbd2aad73f959078cebe18e2f675e7566ab845b6396da38eea9838f872de6fe4832b472fa8f41e0684e025a7c7a989f52353c1e382bbb3e926ce5d2a8a2515834b4dfb3200dfb0000000000"], &(0x7f0000000380)) socketpair(0x0, 0x7, 0x8001, &(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(0xffffffffffffff9c, 0x84, 0x1f, &(0x7f0000000680)={0x0, @in6={{0xa, 0x4e21, 0x0, @local={0xfe, 0x80, [], 0xaa}, 0x6}}, 0x101, 0xfffffffffffffffa}, &(0x7f0000000740)=0x90) getsockopt$inet_sctp_SCTP_PR_ASSOC_STATUS(0xffffffffffffff9c, 0x84, 0x73, &(0x7f0000000780)={0x0, 0x20, 0x30, 0xcd3, 0x2}, &(0x7f00000007c0)=0x18) getsockopt$inet_sctp_SCTP_PEER_ADDR_THLDS(0xffffffffffffffff, 0x84, 0x1f, &(0x7f0000000880)={0x0, @in6={{0xa, 0x0, 0x1, @mcast1={0xff, 0x1, [], 0x1}, 0x94}}, 0x10000, 0x1c4}, &(0x7f0000000940)=0x90) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f0000000400)=ANY=[@ANYBLOB="743277e84f23b4fb07bfca1dbbb10fd12e557473dae38b8410e5461496c20b105bd647aba4794a8a7b1ad1bcf1336ff5debba6a903cf656d3347238b9b71d54c7c2a5b40da77f909ae672b9c05f62c9febd3d16580795e568e3133591e8a9b0ef23137a1a1771c3b7c8a584dadcf3b1c4110be6f19764c506c1b4d741f03d645aaa49cdfc1ec34ec0b0c0afe713b85473602ee82d2d2089be7713102f5d85d02f27aaef6b2f696c79a790916f2a031abaa14b3aa71f020", @ANYRES32=0x0, @ANYRES32=0x0], &(0x7f0000000d40)=0x3) getsockopt$inet_sctp6_SCTP_AUTH_ACTIVE_KEY(0xffffffffffffff9c, 0x84, 0x18, &(0x7f0000001040)={0x0, 0x8}, &(0x7f0000001080)=0x8) getsockopt$inet_sctp_SCTP_DEFAULT_SEND_PARAM(0xffffffffffffffff, 0x84, 0xa, &(0x7f0000001540)={0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100000000, 0x400}, &(0x7f0000001580)=0x20) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f00000015c0)=ANY=[@ANYBLOB="efff"], &(0x7f0000001600)=0x1) getsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX3(0xffffffffffffffff, 0x84, 0x6f, &(0x7f0000003b00)={0x0, 0x90, &(0x7f0000003a40)=[@in={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x11}}, @in6={0xa, 0x0, 0x2, @remote={0xfe, 0x80, [], 0xbb}}, @in6={0xa, 0x4e20, 0x5, @loopback={0x0, 0x1}, 0x8}, @in6={0xa, 0x4e22, 0x0, @mcast2={0xff, 0x2, [], 0x1}}, @in={0x2, 0x4e24}, @in6={0xa, 0x4e20, 0x6, @ipv4={[], [0xff, 0xff], @loopback=0x7f000001}}]}, &(0x7f0000003b40)=0xc) ioctl$sock_inet_udp_SIOCINQ(r3, 0x541b, &(0x7f0000000080)) getsockopt$inet_sctp6_SCTP_ASSOCINFO(0xffffffffffffff9c, 0x84, 0x1, &(0x7f0000003b80)={0x0, 0x4}, &(0x7f0000003bc0)=0x14) ioctl$KDGKBTYPE(r5, 0x4b33, &(0x7f0000000180)) getsockopt$inet_sctp6_SCTP_RTOINFO(0xffffffffffffff9c, 0x84, 0x0, &(0x7f0000003c00)={0x0, 0x101, 0x79c0cfea, 0x3}, &(0x7f0000003c40)=0x10) getsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(r5, 0x84, 0x18, &(0x7f0000004e80)={r6, 0x5}, &(0x7f0000004ec0)=0x8) sendmmsg$inet_sctp(r4, &(0x7f0000005080)=[{&(0x7f0000000b40)=@in6={0xa, 0x4e20, 0x0, @remote={0xfe, 0x80, [], 0xbb}, 0x7}, 0x1c, &(0x7f0000000cc0)=[{&(0x7f0000000b80)="256c19ad29177897357e919b446d79250bdb91206866866376f67a0a3648bab482e509348cdec0446eef90a49c", 0x2d}], 0x1, &(0x7f0000000d80), 0x0, 0x4844}], 0x1, 0x1) sendmsg(r0, &(0x7f0000000080)={&(0x7f0000000240)=@nl=@kern={0x10}, 0x80, &(0x7f0000000040)=[{&(0x7f00000001c0)="5500000018007f04002d1cb2a4a280930a0600007da843cf19d0f869390009402f002100040000001900050000fc1700000000dc1338d54400009b84136ef75afb83de448daa7227c43ab8220000060cec4fab91d4", 0x55}], 0x1, &(0x7f00000000c0)}, 0x0) ioctl$KDGKBLED(r4, 0x4b64, &(0x7f0000000140)) getsockopt$inet_sctp6_SCTP_MAX_BURST(r0, 0x84, 0x14, &(0x7f0000000000), &(0x7f00000000c0)=0x4) 2018/03/30 19:42:46 executing program 6: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_mreqn(r0, 0x0, 0x27, &(0x7f0000000000)={@multicast2=0xe0000002, @loopback=0x7f000001}, 0xc) getsockopt$inet_sctp6_SCTP_FRAGMENT_INTERLEAVE(0xffffffffffffffff, 0x84, 0x12, &(0x7f0000000080), &(0x7f00000000c0)=0x4) ioctl$sock_inet_SIOCGIFDSTADDR(0xffffffffffffffff, 0x8917, &(0x7f0000000040)={'bcsh0\x00', {0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x1a}}}) setsockopt$inet_sctp6_SCTP_MAX_BURST(0xffffffffffffffff, 0x84, 0x14, &(0x7f0000000380)=@int=0x3, 0x4) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000140)={'bcsh0\x00', 0x0}) ioctl$sock_inet6_SIOCDELRT(0xffffffffffffffff, 0x890c, &(0x7f0000000180)={@dev={0xfe, 0x80, [], 0x13}, @loopback={0x0, 0x1}, @mcast2={0xff, 0x2, [], 0x1}, 0x6, 0x0, 0x42e, 0x100, 0x9, 0x80000000, r1}) r2 = socket$inet(0x2, 0xa, 0x5) setsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX(r2, 0x84, 0x6e, &(0x7f0000000600)=[@in={0x2, 0x4e21, @multicast1=0xe0000001}, @in6={0xa, 0x4e20, 0x0, @remote={0xfe, 0x80, [], 0xbb}}, @in={0x2, 0x4e22, @multicast2=0xe0000002}, @in6={0xa, 0x4e21, 0x1ff, @local={0xfe, 0x80, [], 0xaa}, 0x84}, @in6={0xa, 0x4e20, 0x4, @local={0xfe, 0x80, [], 0xaa}}], 0x74) getsockopt$inet_sctp6_SCTP_PR_SUPPORTED(0xffffffffffffffff, 0x84, 0x71, &(0x7f0000000200)={0x0, 0x8}, &(0x7f0000000240)=0x8) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(0xffffffffffffffff, 0x84, 0x6f, &(0x7f0000000300)={r3, 0x60, &(0x7f0000000280)=[@in={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x12}}, @in={0x2, 0x4e20, @remote={0xac, 0x14, 0x14, 0xbb}}, @in={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x1a}}, @in={0x2, 0x4e24, @remote={0xac, 0x14, 0x14, 0xbb}}, @in={0x2, 0x4e24, @rand_addr=0x3ff}, @in={0x2, 0x4e24, @multicast2=0xe0000002}]}, &(0x7f0000000340)=0x10) setsockopt$inet_sctp6_SCTP_SET_PEER_PRIMARY_ADDR(0xffffffffffffffff, 0x84, 0x5, &(0x7f00000004c0)={r4, @in={{0x2, 0x4e20, @rand_addr=0x8}}}, 0x84) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, &(0x7f00000003c0)={'lo\x00', 0x4100}) ioctl$sock_inet_SIOCGIFNETMASK(0xffffffffffffffff, 0x891b, &(0x7f0000000100)={'nr0\x00', {0x2, 0x4e24, @loopback=0x7f000001}}) setsockopt$inet_msfilter(r0, 0x0, 0x29, &(0x7f0000000680)=ANY=[@ANYBLOB="cf0000000276d172390cc8c4ff4f3b746e5947c2ddb66a93ebb6d0f75b5f453435c311b94e126c49d47c10682b6e523d09fae1d416ebface98e08aa083e9f1f1afa118eb05655fec48d75d7a37edd032552c60ffeb53a2c8eecbe601a4ac5dceeecf1a943c2d9e2eaf4ad0a93e82a1a37a0cf2adbc4b512680428fee922ad18ff90ec6f87a75b299a953167bf4f9ae31cffd2c31dd47ba7d69151424dc1b2835f7624a302f270eb89118043dc1e1faa46e667be9cbf4456ad0c580ed032e4e49459f68f8a70f2dfe40f51362ffae"], 0x1) pread64(r0, &(0x7f0000000340)=""/181, 0xb5, 0x62) setsockopt$inet_msfilter(r0, 0x0, 0x29, &(0x7f0000000580)=ANY=[@ANYBLOB="e00000027f0000010000000001000000000000006b59aa51deb20d6efc9c04b7c9420f6434d31cbbe99b52873a8c21"], 0x1) socket$inet_udp(0x2, 0x2, 0x0) bpf$BPF_PROG_GET_NEXT_ID(0xb, &(0x7f0000000400)=0x7, 0x4) r5 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000ba4000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x2, 0x78, 0xe2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, r5, 0x0) r6 = perf_event_open(&(0x7f0000014f88)={0x1, 0x78, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00002e8000)}}, 0x0, 0x0, r5, 0x0) readv(r6, &(0x7f0000734000)=[{&(0x7f0000d42000)=""/146, 0x92}], 0x1) getsockopt$inet_sctp_SCTP_PEER_ADDR_THLDS(0xffffffffffffffff, 0x84, 0x1f, &(0x7f0000000480)={0x0, @in={{0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0xd}}}, 0xf80866d, 0x5}, &(0x7f0000000540)=0x90) getsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(0xffffffffffffff9c, 0x84, 0x18, &(0x7f0000000440)={r7, 0x400000000004}, &(0x7f00000005c0)=0xffffffffffffffc3) getsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER_VALUE(r0, 0x84, 0x7c, &(0x7f00000002c0)={r8, 0x10001, 0xc9e9}, &(0x7f0000000300)=0x8) [ 485.044647] BFS-fs: bfs_fill_super(): No BFS filesystem on loop4 (magic=00000000) [ 485.094921] jfs: Unrecognized mount option "umask=?" or missing value 2018/03/30 19:42:46 executing program 4: symlinkat(&(0x7f0000002f00)='./file0\x00', 0xffffffffffffffff, &(0x7f0000002f80)='./file0\x00') syz_mount_image$msdos(&(0x7f0000002fc0)='msdos\x00', &(0x7f0000003000)='./file0\x00', 0x4, 0x1, &(0x7f0000003180)=[{&(0x7f0000003040)="eaf9610c9f7031a1f58e51e73b3f0bd5af4364c38bbe335dbd3d211ec0338ba4c795c634af757a3c684da6110f67891133a6303441b21d139e3a6582efdaeabd3d68dbcb85cd383733a98084b62807af0b7ea49d68daa4cc9fda43dbeb13c3e67c44c463a2c429ccb66c0e1a9dfd5c911d4d7b578baaad6571d4457b9c6d92122a4bd97f5f174c81081941b007062f2cab2db1466851dde671e025909a633fec433bb2512fc61c436b74df23d280019a403884dc488071", 0xb7, 0xcd7}], 0x8, &(0x7f00000031c0)={[{@errors_continue='errors=continue', 0x2c}, {@time_offset={'time_offset', 0x3d, [0x0]}, 0x2c}]}) pipe(&(0x7f0000002f40)={0xffffffffffffffff}) r1 = open(&(0x7f0000003240)='./file0\x00', 0xa0001, 0x20) linkat(r0, &(0x7f0000003200)='./file0\x00', r1, &(0x7f0000003280)='./file0\x00', 0x400) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x80000, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)}, {&(0x7f0000010d00)="0000000000000000000000000000000000000000000000000000000002ae0000ed41000000040000d15bbe5ad15bbe5ad15bbe5a00000000000005002000000000000800070000000af301000400000000000000000000000100000030000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a1950000", 0xa0, 0x8c60}, {&(0x7f0000011a00)="020000000c0001022e000000020000000c0002022e2e00000b00000014000a026c6f73742b666f756e6400000c0000001000050166696c65300000000d0000001000050266696c65310000000f0000001000050166696c6532000000100000001000050166696c6533000000110000001000050166696c65340000001200000010000802564944454f5f54531400000068031201d181d18ed0b7d0bad0b0d0bbd0bbd0b5d1800000000000000000000000000000000000000000000000000000", 0xc0, 0xc000}, {&(0x7f0000012200)="0000000000000000000000000000000000000000000000000c0000dec910dfd800000000f4030000000000000000000000000000000000000000000000000000", 0x40, 0x117e0}, {&(0x7f0000012a00)="0d0000000c0001022e000000020000000c0002022e2e00000e000000dc03050166696c6530000000000000000000000000000000000000000000000000000000", 0x40, 0x1c000}], 0x0, &(0x7f0000013000)) syz_mount_image$bfs(&(0x7f0000000040)='bfs\x00', &(0x7f00000008c0)='./file0\x00', 0x20, 0x2, &(0x7f0000000180)=[{&(0x7f00000005c0)="f37e57346e86cb5adec662d7bd6f13a3764d2ca7640f9f81ba88d0689d0989735a7bafd5558d9a6e8988f9f6038fa475e49077bc8cfc6e170c4cdbaaa1375895c9a4068559d3cecf2a0423caa696bf77a75b3ae3f32b79da059ca13d055647998987fc2033d008bd55deb08808372b9b4595fb0d79a1358cd5949d859a7d155e86db4b608eb401109f6b792f5ce4a2ead9870dee49347bc08d0d54b0e4fca4fd895947a737f4ee823d997770e5c9df50c0c9fe2c0b945c6ffd13b7151e385b631520ac34a5967c6cd0d12b3746795681600541c17d379daed41ce8e715eba582fb668e160872a2", 0xe7, 0x7}, {&(0x7f0000000780)="6154d093a5a905da96fed5f8dea36bcd9d1d011246f7caf86806bf6ac6301d2d2b448461b867bbbe7d0eebdeafa16d7219af85ff4372670039ce277546def59f1d0eed4be4386a34c7243fe3ec84ad3807136a2c3ec35d6d87a7d7bb9342622cc3a7ff529ef3d76ff57fc7a1856f50b98e518515a9e679067cfc0e8500754fa30a81cf4dc42c5a0d36647280c5b0a8506efaf9ad06594678176efe4bdbcf7ab384b597df4c5ad66b2bd240823abe04cd30785819f1c7fd4d46bb55f8bd09ca4b44618b010e363fa572ca189ec73b36ad46b6f38d65c0acc417", 0xd9, 0x5}], 0x200000, 0x0) syz_mount_image$jfs(&(0x7f0000000080)='jfs\x00', &(0x7f0000000880)='./file0\x00', 0xfffffffffffffffe, 0x3, &(0x7f0000002dc0)=[{&(0x7f0000000900)="efee47debce411554253d03f2175c060de26b9a7a197d9327971105aafdf17a061227fe7dd52d3c1c1f0318992f304f7646c3eb4e32ff0514d34d4605b4e152474aa71ac6c0ba890b1f249f213d5bc162b605fdf3c524d6f84e1a2f8461d26ef5dd50b193ffb710ee69fc431552ae4548f0c1a7e503243bb10c53c566f37e3234d8b3d418992dca946568d275e1f54895a854bab3790963108fe6ce5b1f933e81bd0aa2dfd715aca4bd81b48b28e3ee265", 0xb1, 0x1}, {&(0x7f0000001a80)="b4bc90ad72742e5693f04c7955b05460b33cd0ca9cde365dbe1671162a8c1db744cb8a04d1d747ab4d3234fd615e6ad897396c21b8bf7da2c1d524d04fadade841e5acfac529250a2c75fed4b65a7b6c8735268244189e020c526112728097958fd591d00cd16d1591db9b0414d985d7718794369eb03d89403b7df76f6d745c94d4fa986321a9915fea55a73472bc39620fcf22ec74d02b77fafe6ccf72605eb0ba7ae69fa10a36d281e65a178528bc654ce5b6109d5294e400b18be755a3b899489b27a876ac3ea033ed525b28c7dff537b5210cbff466dc339e1f58db1679816589e886264ef1bcf6d0e1408d93946827711972", 0xf5, 0x7}, {&(0x7f0000002cc0)="c9bc1928c9ffffe99fdae39f5013810a038f1d558affc92341c81ee308195dabd95fcfedcfccd4cf2af62477e5ed935114b73940dba239c47d5824a3332fb48cea682934a6840ea5db2529c3a7c371bbf08f08bb15458de586609be64b699f29b7384dc7b2ba78f0e343fb9851eaf5a7b4106fc5b7a8aaf6e069012286fa7259807928cbee722222f45e6c98cefa00829bcdd92bd03273c7b0f20453c72150adf49c311248d3d3d96ad17187d60add3d1d8fbfbc5e572ceba134e5c533a5f75630a35514ee998b85a755085c04", 0xcd, 0x4}], 0x10000, &(0x7f0000002ec0)={[{@nodiscard='nodiscard', 0x2c}, {@resize='resize', 0x2c}, {@noquota='noquota', 0x2c}, {@umask={'umask', 0x3d, [0x3f]}, 0x2c}]}) [ 485.204550] FAT-fs (loop4): Unrecognized mount option "time_offset=" or missing value [ 485.234214] EXT4-fs (loop4): VFS: Can't find ext4 filesystem [ 485.263594] BFS-fs: bfs_fill_super(): No BFS filesystem on loop4 (magic=00000000) [ 485.287357] jfs: Unrecognized mount option "umask=?" or missing value [ 485.381819] IPVS: ftp: loaded support on port[0] = 21 2018/03/30 19:42:47 executing program 2: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) readv(0xffffffffffffffff, &(0x7f0000001480), 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f00003b9fdc)) readv(r0, &(0x7f0000001980)=[{&(0x7f00000018c0)=""/182, 0xb6}], 0x1) r1 = syz_open_pts(r0, 0x2) setsockopt$inet6_mtu(0xffffffffffffffff, 0x29, 0x17, &(0x7f0000000440)=0x5, 0x4) socket$inet_sctp(0x2, 0x5, 0x84) dup3(r1, r0, 0x0) write(r0, &(0x7f0000c34fff), 0xffffff0b) setsockopt$bt_l2cap_L2CAP_OPTIONS(0xffffffffffffffff, 0x6, 0x1, &(0x7f0000000380)={0xefa, 0x800, 0x0, 0x0, 0x9}, 0xc) 2018/03/30 19:42:47 executing program 1: r0 = syz_open_dev$amidi(&(0x7f0000000040)='/dev/amidi#\x00', 0x3, 0x28000) ioctl$DRM_IOCTL_RES_CTX(r0, 0xc0086426, &(0x7f0000000100)={0x2c, &(0x7f00000000c0)=[{}, {}, {}, {}, {}, {}, {}, {}]}) socket$netlink(0x10, 0x3, 0xc) writev(0xffffffffffffffff, &(0x7f00000021c0), 0x0) bind$bt_l2cap(r0, &(0x7f0000000340)={0x1f, 0x800000000000002, {0x401, 0x3, 0xb, 0x3f8}}, 0x9) socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f0000a8d000)={&(0x7f0000c78ff4)={0x10}, 0xc, &(0x7f0000df6000)={&(0x7f0000000200)=ANY=[@ANYBLOB="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"], 0x10d}, 0x1}, 0x0) r1 = socket$inet_sctp(0x2, 0x5, 0x84) sendmsg$inet_sctp(r1, &(0x7f0000001f00)={&(0x7f0000001840)=@in={0x2, 0x0, @dev={0xac, 0x14, 0x14}}, 0x10, &(0x7f0000001c40)=[{&(0x7f0000001880)='[', 0x1}], 0x1, &(0x7f0000001e40)}, 0x40) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000540)=@nat={'nat\x00', 0x19, 0x3, 0x376, [0x20000140, 0x0, 0x0, 0x20000170, 0x200002d0], 0x0, &(0x7f0000000100), &(0x7f00000006c0)=ANY=[@ANYBLOB="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"]}, 0x3ee) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000002980)) getsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(0xffffffffffffffff, 0x84, 0x1f, &(0x7f0000000440)={0x0, @in={{0x2, 0x4e22, @multicast2=0xe0000002}}, 0x7bb7, 0x4}, &(0x7f0000000500)=0x90) getsockopt$inet_sctp_SCTP_RTOINFO(0xffffffffffffffff, 0x84, 0x0, &(0x7f0000002240)={0x0, 0x9, 0x417}, &(0x7f00000001c0)=0x10) r2 = socket(0x22, 0x4, 0x3) r3 = socket(0x20000001e, 0x5, 0x0) r4 = perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$packet_tx_ring(r3, 0x10f, 0x87, &(0x7f0000265000)=@req={0x3fc, 0x0, 0x1}, 0x10) getegid() setsockopt$packet_tx_ring(r2, 0x10f, 0x87, &(0x7f0000265000)=@req={0x3fc, 0x0, 0x1}, 0x10) writev(r2, &(0x7f00000000c0)=[{&(0x7f0000000000)="8a", 0x1}], 0x1) close(r2) close(r3) perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r5 = syz_open_dev$evdev(&(0x7f0000dfdfee)='/dev/input/event#\x00', 0x0, 0x2) readv(r5, &(0x7f0000019fe0)=[{&(0x7f00008ec000)=""/219, 0xdb}], 0x1) write$evdev(r5, &(0x7f000004d000)=[{{}, 0x0, 0x1}, {{0x2}}], 0x30) r6 = getpgrp(0x0) setsockopt$ax25_int(r3, 0x101, 0xd, &(0x7f0000000080)=0x7, 0x4) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x8, 0xfffffffffffffffd, 0x9, 0x7, 0x0, 0x8001, 0x0, 0x6, 0x3ff, 0x4, 0x5, 0x4, 0xbd9, 0x56, 0x8000, 0x7f, 0xff, 0xeba, 0x1f, 0x0, 0xfd, 0x3, 0x1, 0x50, 0x7, 0x9, 0x641800, 0x3ff8000000000000, 0x4, 0x0, 0x10000, 0x5, 0x7, 0x6, 0x1, 0xffffffffffffffe0, 0x0, 0x20, 0x0, @perf_bp={&(0x7f0000000040), 0x8}, 0x20, 0x401, 0x8, 0x3, 0x8, 0x7, 0x7}, r6, 0xc, r4, 0x0) syz_genetlink_get_family_id$ipvs(&(0x7f0000000040)='IPVS\x00') 2018/03/30 19:42:47 executing program 0: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000f5eff5)='lp\x00', 0x4) sendto$inet(r0, &(0x7f0000fd0000), 0xfffffffffffffec1, 0x20000801, &(0x7f0000deaff0)={0x2, 0x0, @loopback=0x7f000001}, 0x10) shutdown(0xffffffffffffffff, 0x0) 2018/03/30 19:42:47 executing program 6: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_mreqn(r0, 0x0, 0x27, &(0x7f0000000000)={@multicast2=0xe0000002, @loopback=0x7f000001}, 0xc) getsockopt$inet_sctp6_SCTP_FRAGMENT_INTERLEAVE(0xffffffffffffffff, 0x84, 0x12, &(0x7f0000000080), &(0x7f00000000c0)=0x4) ioctl$sock_inet_SIOCGIFDSTADDR(0xffffffffffffffff, 0x8917, &(0x7f0000000040)={'bcsh0\x00', {0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x1a}}}) setsockopt$inet_sctp6_SCTP_MAX_BURST(0xffffffffffffffff, 0x84, 0x14, &(0x7f0000000380)=@int=0x3, 0x4) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000140)={'bcsh0\x00', 0x0}) ioctl$sock_inet6_SIOCDELRT(0xffffffffffffffff, 0x890c, &(0x7f0000000180)={@dev={0xfe, 0x80, [], 0x13}, @loopback={0x0, 0x1}, @mcast2={0xff, 0x2, [], 0x1}, 0x6, 0x0, 0x42e, 0x100, 0x9, 0x80000000, r1}) r2 = socket$inet(0x2, 0xa, 0x5) setsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX(r2, 0x84, 0x6e, &(0x7f0000000600)=[@in={0x2, 0x4e21, @multicast1=0xe0000001}, @in6={0xa, 0x4e20, 0x0, @remote={0xfe, 0x80, [], 0xbb}}, @in={0x2, 0x4e22, @multicast2=0xe0000002}, @in6={0xa, 0x4e21, 0x1ff, @local={0xfe, 0x80, [], 0xaa}, 0x84}, @in6={0xa, 0x4e20, 0x4, @local={0xfe, 0x80, [], 0xaa}}], 0x74) getsockopt$inet_sctp6_SCTP_PR_SUPPORTED(0xffffffffffffffff, 0x84, 0x71, &(0x7f0000000200)={0x0, 0x8}, &(0x7f0000000240)=0x8) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(0xffffffffffffffff, 0x84, 0x6f, &(0x7f0000000300)={r3, 0x60, &(0x7f0000000280)=[@in={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x12}}, @in={0x2, 0x4e20, @remote={0xac, 0x14, 0x14, 0xbb}}, @in={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x1a}}, @in={0x2, 0x4e24, @remote={0xac, 0x14, 0x14, 0xbb}}, @in={0x2, 0x4e24, @rand_addr=0x3ff}, @in={0x2, 0x4e24, @multicast2=0xe0000002}]}, &(0x7f0000000340)=0x10) setsockopt$inet_sctp6_SCTP_SET_PEER_PRIMARY_ADDR(0xffffffffffffffff, 0x84, 0x5, &(0x7f00000004c0)={r4, @in={{0x2, 0x4e20, @rand_addr=0x8}}}, 0x84) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, &(0x7f00000003c0)={'lo\x00', 0x4100}) ioctl$sock_inet_SIOCGIFNETMASK(0xffffffffffffffff, 0x891b, &(0x7f0000000100)={'nr0\x00', {0x2, 0x4e24, @loopback=0x7f000001}}) setsockopt$inet_msfilter(r0, 0x0, 0x29, &(0x7f0000000680)=ANY=[@ANYBLOB="cf0000000276d172390cc8c4ff4f3b746e5947c2ddb66a93ebb6d0f75b5f453435c311b94e126c49d47c10682b6e523d09fae1d416ebface98e08aa083e9f1f1afa118eb05655fec48d75d7a37edd032552c60ffeb53a2c8eecbe601a4ac5dceeecf1a943c2d9e2eaf4ad0a93e82a1a37a0cf2adbc4b512680428fee922ad18ff90ec6f87a75b299a953167bf4f9ae31cffd2c31dd47ba7d69151424dc1b2835f7624a302f270eb89118043dc1e1faa46e667be9cbf4456ad0c580ed032e4e49459f68f8a70f2dfe40f51362ffae"], 0x1) pread64(r0, &(0x7f0000000340)=""/181, 0xb5, 0x62) setsockopt$inet_msfilter(r0, 0x0, 0x29, &(0x7f0000000580)=ANY=[@ANYBLOB="e00000027f0000010000000001000000000000006b59aa51deb20d6efc9c04b7c9420f6434d31cbbe99b52873a8c21"], 0x1) socket$inet_udp(0x2, 0x2, 0x0) bpf$BPF_PROG_GET_NEXT_ID(0xb, &(0x7f0000000400)=0x7, 0x4) r5 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000ba4000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x2, 0x78, 0xe2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, r5, 0x0) r6 = perf_event_open(&(0x7f0000014f88)={0x1, 0x78, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00002e8000)}}, 0x0, 0x0, r5, 0x0) readv(r6, &(0x7f0000734000)=[{&(0x7f0000d42000)=""/146, 0x92}], 0x1) getsockopt$inet_sctp_SCTP_PEER_ADDR_THLDS(0xffffffffffffffff, 0x84, 0x1f, &(0x7f0000000480)={0x0, @in={{0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0xd}}}, 0xf80866d, 0x5}, &(0x7f0000000540)=0x90) getsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(0xffffffffffffff9c, 0x84, 0x18, &(0x7f0000000440)={r7, 0x400000000004}, &(0x7f00000005c0)=0xffffffffffffffc3) getsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER_VALUE(r0, 0x84, 0x7c, &(0x7f00000002c0)={r8, 0x10001, 0xc9e9}, &(0x7f0000000300)=0x8) 2018/03/30 19:42:47 executing program 3: fstat(0xffffffffffffffff, &(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$TUNSETGROUP(0xffffffffffffffff, 0x400454ce, r0) r1 = syz_open_procfs(0x0, &(0x7f0000000040)="2f65786500000000000090d8b75e67e16b394342abb5158df87ea8984e79c93df7498b2b34796068700e29fbd789f9a031f23e16c96e30baed2961953b057f7a3222943acc4b8cfa4de553f8276731ddeb811efd44ea011e1a0db9074a28a826c88566b89c57cc3cca4aec41d37fa27c8daa19030d03139d0aea71d509d9a20ba7deceb656cc1308d9d1f111b6bd1595486f55e229923be4ed8cbfb78e86280b4cacf386bfa8840afb312a4c520a03b27f805d181bd09ea208931a36e888060a2d") openat$ppp(0xffffffffffffff9c, &(0x7f0000000380)='/dev/ppp\x00', 0x0, 0x0) fsetxattr(r1, &(0x7f0000000140)=@known='user.syz\x00', &(0x7f0000000180)="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", 0x137, 0x0) fremovexattr(r1, &(0x7f0000000000)=@known='user.syz\x00') ioctl$DRM_IOCTL_GET_CAP(r1, 0xc010640c, &(0x7f0000000800)) execve(&(0x7f0000000480)='./file0\x00', &(0x7f0000000700)=[&(0x7f00000005c0)="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"], &(0x7f0000000780)) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f00000002c0)) chdir(&(0x7f0000000280)='./file0\x00') socket$inet_tcp(0x2, 0x1, 0x0) r2 = inotify_init() r3 = syz_open_dev$sg(&(0x7f0000000000)='/dev/sg#\x00', 0x0, 0x0) getsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(0xffffffffffffffff, 0x84, 0x8, &(0x7f0000000280), &(0x7f0000000c00)=0x4) ioctl$sock_SIOCGPGRP(r3, 0x8904, &(0x7f0000000180)) get_robust_list(0x0, &(0x7f0000000a00)=&(0x7f0000000240)={&(0x7f0000000200)={&(0x7f00000001c0)}}, &(0x7f0000000740)=0x6) mkdir(&(0x7f0000042ff6)='./control\x00', 0x0) inotify_init() inotify_add_watch(r2, &(0x7f0000000c40)='./control\x00', 0x80000d50) execve(&(0x7f00000000c0)='./control\x00', &(0x7f0000000840)=[&(0x7f00000007c0)='/dev/sequencer\x00', &(0x7f0000000800)="776c616e312576626f786e657431f46b657972696e6700"], &(0x7f00000008c0)=[&(0x7f0000000880)="2b5ee42c706f7369785f61636c5f616363657373776c616e30657468302df62e766d6e6574302d7d00"]) connect$inet6(r3, &(0x7f0000000140)={0xa, 0x4e23, 0x7}, 0x1c) getsockopt$inet_sctp_SCTP_GET_PEER_ADDR_INFO(0xffffffffffffff9c, 0x84, 0xf, &(0x7f0000001000)={0x0, @in={{0x2, 0x0, @remote={0xac, 0x14, 0x14, 0xbb}}}, 0x0, 0x1, 0x0, 0xfffffffffffffffd}, &(0x7f0000000300)=0x98) 2018/03/30 19:42:47 executing program 7: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup.cpu\x00', 0x200002, 0x0) fchdir(r0) r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer\x00', 0x208801, 0x0) open(&(0x7f0000000280)='./file0\x00', 0x10000000080040, 0x0) fcntl$setlease(0xffffffffffffffff, 0x400, 0x0) rename(&(0x7f0000000000)='./file0\x00', &(0x7f0000887ff8)='./file1\x00') rt_sigtimedwait(&(0x7f00009ac000)={0xfffffffffffffffd}, &(0x7f0000de0ff0), &(0x7f0000039ff0)={0x0, 0x8000000}, 0x8) creat(&(0x7f0000fdeff8)='./file1\x00', 0x0) add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000180)={0x73, 0x79, 0x7a}, &(0x7f0000000240), 0x0, 0xfffffffffffffff8) keyctl$setperm(0x5, 0x0, 0x0) unlink(&(0x7f0000000080)='./file1\x00') openat$cgroup_procs(r0, &(0x7f00000002c0)='cgroup.threads\x00', 0x2, 0x0) symlink(&(0x7f0000000140)='./file1\x00', &(0x7f0000000200)='./file1\x00') syz_fuse_mount(&(0x7f0000000300)='./file1\x00', 0x0, 0x0, 0x0, 0x0, 0x0) setsockopt$SO_VM_SOCKETS_BUFFER_MAX_SIZE(0xffffffffffffffff, 0x28, 0x2, &(0x7f00000001c0), 0x8) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = syz_open_dev$sg(&(0x7f0000000040)='/dev/sg#\x00', 0x6, 0x202002) bind$netlink(r2, &(0x7f0000000180)={0x10, 0x0, 0x0, 0x802ffffffff}, 0xc) syz_genetlink_get_family_id$ipvs(&(0x7f00000000c0)='IPVS\x00') sendmsg$IPVS_CMD_NEW_DEST(r2, &(0x7f0000000140)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x40202000}, 0xc, &(0x7f0000000100)={&(0x7f0000000600)=ANY=[]}, 0x1}, 0x93ccaba251633594) getsockopt$inet_IP_XFRM_POLICY(r3, 0x0, 0x11, &(0x7f0000000340)={{{@in=@remote, @in=@broadcast}}, {{}, 0x0, @in=@broadcast}}, &(0x7f0000000440)=0xe8) ioctl$sock_netrom_TIOCOUTQ(r1, 0x5411, &(0x7f0000000600)) ioctl$sock_inet_SIOCADDRT(r3, 0x890b, &(0x7f0000002f00)={0x0, {0x2, 0x4e22}, {0x2, 0x4e22, @broadcast=0xffffffff}, {0x2, 0x4e23, @multicast1=0xe0000001}, 0x0, 0x2, 0x4, 0xffffffffffffff63, 0x0, &(0x7f0000002ec0)='ip6gretap0\x00', 0x98, 0x8000, 0x1f}) lstat(&(0x7f0000000480)='./file0\x00', &(0x7f00000004c0)) sendmsg$nl_generic(r3, &(0x7f0000002e80)={&(0x7f0000000300)={0x10}, 0xc, &(0x7f0000002e40)={&(0x7f0000000540)=ANY=[@ANYBLOB="9c0000003800000125bd7000fddbdf250000000008001100040044002dd114a18da106b1c8a9398d013e2fe1a16069e90dc91205920f6bd4e33ef8206d4eaad6120ad055ac52279bff91b014beb2928d9c6be69ec1c82727c592b2fac62bc7c723112acbf54c6a9f1f613bca2d796cc5c65322bc23ca1b386da7c4bf83eb3a490adac71ac5a9babbe3420fcd2a1b"], 0x1}, 0x1}, 0x4040000) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, &(0x7f0000000000), 0x4) socket(0x0, 0x0, 0x0) 2018/03/30 19:42:47 executing program 4: symlinkat(&(0x7f0000002f00)='./file0\x00', 0xffffffffffffffff, &(0x7f0000002f80)='./file0\x00') syz_mount_image$msdos(&(0x7f0000002fc0)='msdos\x00', &(0x7f0000003000)='./file0\x00', 0x4, 0x1, &(0x7f0000003180)=[{&(0x7f0000003040)="eaf9610c9f7031a1f58e51e73b3f0bd5af4364c38bbe335dbd3d211ec0338ba4c795c634af757a3c684da6110f67891133a6303441b21d139e3a6582efdaeabd3d68dbcb85cd383733a98084b62807af0b7ea49d68daa4cc9fda43dbeb13c3e67c44c463a2c429ccb66c0e1a9dfd5c911d4d7b578baaad6571d4457b9c6d92122a4bd97f5f174c81081941b007062f2cab2db1466851dde671e025909a633fec433bb2512fc61c436b74df23d280019a403884dc488071", 0xb7, 0xcd7}], 0x8, &(0x7f00000031c0)={[{@errors_continue='errors=continue', 0x2c}, {@time_offset={'time_offset', 0x3d, [0x0]}, 0x2c}]}) pipe(&(0x7f0000002f40)={0xffffffffffffffff}) r1 = open(&(0x7f0000003240)='./file0\x00', 0xa0001, 0x20) linkat(r0, &(0x7f0000003200)='./file0\x00', r1, &(0x7f0000003280)='./file0\x00', 0x400) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x80000, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)}, {&(0x7f0000010d00)="0000000000000000000000000000000000000000000000000000000002ae0000ed41000000040000d15bbe5ad15bbe5ad15bbe5a00000000000005002000000000000800070000000af301000400000000000000000000000100000030000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a1950000", 0xa0, 0x8c60}, {&(0x7f0000011a00)="020000000c0001022e000000020000000c0002022e2e00000b00000014000a026c6f73742b666f756e6400000c0000001000050166696c65300000000d0000001000050266696c65310000000f0000001000050166696c6532000000100000001000050166696c6533000000110000001000050166696c65340000001200000010000802564944454f5f54531400000068031201d181d18ed0b7d0bad0b0d0bbd0bbd0b5d1800000000000000000000000000000000000000000000000000000", 0xc0, 0xc000}, {&(0x7f0000012200)="0000000000000000000000000000000000000000000000000c0000dec910dfd800000000f4030000000000000000000000000000000000000000000000000000", 0x40, 0x117e0}, {&(0x7f0000012a00)="0d0000000c0001022e000000020000000c0002022e2e00000e000000dc03050166696c6530000000000000000000000000000000000000000000000000000000", 0x40, 0x1c000}], 0x0, &(0x7f0000013000)) syz_mount_image$bfs(&(0x7f0000000040)='bfs\x00', &(0x7f00000008c0)='./file0\x00', 0x20, 0x2, &(0x7f0000000180)=[{&(0x7f00000005c0)="f37e57346e86cb5adec662d7bd6f13a3764d2ca7640f9f81ba88d0689d0989735a7bafd5558d9a6e8988f9f6038fa475e49077bc8cfc6e170c4cdbaaa1375895c9a4068559d3cecf2a0423caa696bf77a75b3ae3f32b79da059ca13d055647998987fc2033d008bd55deb08808372b9b4595fb0d79a1358cd5949d859a7d155e86db4b608eb401109f6b792f5ce4a2ead9870dee49347bc08d0d54b0e4fca4fd895947a737f4ee823d997770e5c9df50c0c9fe2c0b945c6ffd13b7151e385b631520ac34a5967c6cd0d12b3746795681600541c17d379daed41ce8e715eba582fb668e160872a2", 0xe7, 0x7}, {&(0x7f0000000780)="6154d093a5a905da96fed5f8dea36bcd9d1d011246f7caf86806bf6ac6301d2d2b448461b867bbbe7d0eebdeafa16d7219af85ff4372670039ce277546def59f1d0eed4be4386a34c7243fe3ec84ad3807136a2c3ec35d6d87a7d7bb9342622cc3a7ff529ef3d76ff57fc7a1856f50b98e518515a9e679067cfc0e8500754fa30a81cf4dc42c5a0d36647280c5b0a8506efaf9ad06594678176efe4bdbcf7ab384b597df4c5ad66b2bd240823abe04cd30785819f1c7fd4d46bb55f8bd09ca4b44618b010e363fa572ca189ec73b36ad46b6f38d65c0acc417", 0xd9, 0x5}], 0x200000, 0x0) syz_mount_image$jfs(&(0x7f0000000080)='jfs\x00', &(0x7f0000000880)='./file0\x00', 0xfffffffffffffffe, 0x3, &(0x7f0000002dc0)=[{&(0x7f0000000900)="efee47debce411554253d03f2175c060de26b9a7a197d9327971105aafdf17a061227fe7dd52d3c1c1f0318992f304f7646c3eb4e32ff0514d34d4605b4e152474aa71ac6c0ba890b1f249f213d5bc162b605fdf3c524d6f84e1a2f8461d26ef5dd50b193ffb710ee69fc431552ae4548f0c1a7e503243bb10c53c566f37e3234d8b3d418992dca946568d275e1f54895a854bab3790963108fe6ce5b1f933e81bd0aa2dfd715aca4bd81b48b28e3ee265", 0xb1, 0x1}, {&(0x7f0000001a80)="b4bc90ad72742e5693f04c7955b05460b33cd0ca9cde365dbe1671162a8c1db744cb8a04d1d747ab4d3234fd615e6ad897396c21b8bf7da2c1d524d04fadade841e5acfac529250a2c75fed4b65a7b6c8735268244189e020c526112728097958fd591d00cd16d1591db9b0414d985d7718794369eb03d89403b7df76f6d745c94d4fa986321a9915fea55a73472bc39620fcf22ec74d02b77fafe6ccf72605eb0ba7ae69fa10a36d281e65a178528bc654ce5b6109d5294e400b18be755a3b899489b27a876ac3ea033ed525b28c7dff537b5210cbff466dc339e1f58db1679816589e886264ef1bcf6d0e1408d93946827711972", 0xf5, 0x7}, {&(0x7f0000002cc0)="c9bc1928c9ffffe99fdae39f5013810a038f1d558affc92341c81ee308195dabd95fcfedcfccd4cf2af62477e5ed935114b73940dba239c47d5824a3332fb48cea682934a6840ea5db2529c3a7c371bbf08f08bb15458de586609be64b699f29b7384dc7b2ba78f0e343fb9851eaf5a7b4106fc5b7a8aaf6e069012286fa7259807928cbee722222f45e6c98cefa00829bcdd92bd03273c7b0f20453c72150adf49c311248d3d3d96ad17187d60add3d1d8fbfbc5e572ceba134e5c533a5f75630a35514ee998b85a755085c04", 0xcd, 0x4}], 0x10000, &(0x7f0000002ec0)={[{@nodiscard='nodiscard', 0x2c}, {@resize='resize', 0x2c}, {@noquota='noquota', 0x2c}, {@umask={'umask', 0x3d, [0x3f]}, 0x2c}]}) 2018/03/30 19:42:47 executing program 5: unshare(0x40000000) perf_event_open(&(0x7f000001d000)={0x2, 0x78, 0xe2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000000)={0x6, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl(0xffffffffffffffff, 0x8982, &(0x7f0000000000)) r0 = socket$packet(0x11, 0x0, 0x300) r1 = openat$cuse(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/cuse\x00', 0x82, 0x0) io_setup(0x43f, &(0x7f00000000c0)=0x0) io_submit(r2, 0x1, &(0x7f0000000000)=[&(0x7f0000000200)={0x0, 0x0, 0x0, 0x1, 0x0, r1, &(0x7f0000000040)="10000000020400000000000000000000", 0x10}]) r3 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000280)='/proc/sys/net/ipv4/vs/secure_tcp\x00', 0x2, 0x0) sendmsg$kcm(r3, &(0x7f0000001f00)={&(0x7f0000001b40)=@pppol2tpin6={0x18, 0x1, {0x0, r0, 0x0, 0x1, 0x0, 0x0, {0xa, 0x4e24, 0xc1, @mcast1={0xff, 0x1, [], 0x1}}}}, 0x80, &(0x7f0000001d80)=[{&(0x7f0000001bc0)="a9db123ebf124fab0f2eec9774559e3b5870fb7c6818fc89c4b8742d057480657265ae2b34fb2d4e585d22ca1bf7b0a22ce38a20a819d919947c78f8d5c9f3291905fd3ed2b8ef8a79d9453396c6b0b7eb0778dbc49b32ae91e443b64edddcf320c1589c7777eadd4e57c01b20a8ca7a831e8e2c104d0194d52fb5c35b550f", 0x7f}], 0x1, &(0x7f0000001dc0)=ANY=[], 0x0, 0x90}, 0x20000000) r4 = syz_open_dev$tun(&(0x7f00000001c0)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r4, 0x400454ca, &(0x7f0000000200)={'bridge0\x00\x00p\x00', 0x4000000000001005}) socketpair(0x1d, 0x3, 0x40, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_inet_SIOCSIFADDR(r5, 0x8916, &(0x7f0000000100)={'bridge8\x00', {0x2, 0x0, @dev={0xac, 0x14, 0x14}}}) ioctl$LOOP_SET_FD(r1, 0x4c00, r0) ioctl$SNDRV_SEQ_IOCTL_RUNNING_MODE(0xffffffffffffffff, 0xc0105303, &(0x7f00000002c0)={0x2, 0x8}) add_key$keyring(&(0x7f00000000c0)='keyring\x00', &(0x7f0000000100)={0x73, 0x79, 0x7a}, 0x0, 0x0, 0x0) clone(0x0, &(0x7f0000000040), &(0x7f0000000080), &(0x7f0000000000), &(0x7f0000000100)) ioctl$int_in(0xffffffffffffffff, 0x800000c004500a, &(0x7f0000006ff8)) wait4(0x0, 0x0, 0x4, &(0x7f0000000380)) ioctl$sock_inet_sctp_SIOCINQ(r6, 0x541b, &(0x7f0000000180)) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_PORT(0xffffffffffffffff, 0xc0a85352, &(0x7f0000001980)={{}, 'port1\x00', 0x0, 0x20010, 0x1f, 0x0, 0x3, 0x40, 0x0, 0x0, 0x4, 0x6d1}) [ 486.261793] FAT-fs (loop4): Unrecognized mount option "time_offset=" or missing value [ 486.297088] kernel msg: ebtables bug: please report to author: EBT_ENTRY_OR_ENTRIES shouldn't be set in distinguisher 2018/03/30 19:42:47 executing program 3: r0 = getpid() r1 = syz_open_procfs(r0, &(0x7f0000000480)="2f6578650000000000ff070000ddd9f191be10eebf000ee9ff0700000000000054fa07424adee916d2da75afe70b35a0fd6a1f349572d226d7a075fb35331ce39c5a3568641006d7c0206a74e333265316a175350e730ab2bce682b69d603fc05ead7fb5180de13a74155d8560fe23dfbba10724631067f955b8810f3402053f95a8798b0e3749d9c79cdd5f62547e59ab4352ab0a3827384665fd2c16ea53e5e2a1dc065b53520b9cd4eb30edc0f70cb82149f8ff5b628eabf1a9ab91915a78b5cb259f4a0fbfab4dacbd68f077") chroot(&(0x7f0000000000)='./file1\x00') ioctl$SIOCGIFHWADDR(r1, 0x8927, &(0x7f0000000080)) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000300), &(0x7f0000000380)=0xc) fstat(r1, &(0x7f0000001d80)) geteuid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000002340)={0x0, 0x0, 0x0}, &(0x7f0000002380)=0xc) stat(&(0x7f00000023c0)='./file0\x00', &(0x7f0000002400)) lstat(&(0x7f0000002480)='./file1\x00', &(0x7f00000024c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) sendmsg$netlink(r1, &(0x7f00000026c0)={&(0x7f00000000c0)=@kern={0x10, 0x0, 0x0, 0x40108000}, 0xc, &(0x7f00000022c0)=[{&(0x7f0000000580)={0x10, 0x2a, 0x110, 0x70bd28, 0x25dfdbfc}, 0x10}], 0x1, &(0x7f0000002540)=ANY=[@ANYBLOB="0000000020000000000000000100000001000000", @ANYBLOB="0000000020000000000000000100000002000000", @ANYRES32=r2, @ANYBLOB='\x00\x00\b\x00', @ANYRES32=r1, @ANYRES32=r1, @ANYRES32=r1, @ANYBLOB="0000000020000000000000000100000001000000", @ANYRES32=r1, @ANYBLOB="0000000020000000000000000100000002000000", @ANYRES32=r3, @ANYBLOB="0000000030000000000000000100000001000000", @ANYRES32=r1, @ANYRES32=r1, @ANYRES32=r1, @ANYRES32=r1, @ANYBLOB='\x00\x00\x00\x00'], 0x94, 0x10}, 0x4000) syncfs(r1) setsockopt$inet_sctp6_SCTP_EVENTS(r1, 0x84, 0xb, &(0x7f0000000040)={0x0, 0x0, 0xfa, 0x1, 0x0, 0x7, 0x7, 0x8001, 0x3f, 0x94fc, 0x1bcb}, 0xb) mount(&(0x7f0000000340)='./file1\x00', &(0x7f0000015ff8)='./file0\x00', &(0x7f000001fffa)='bdev\x00', 0x0, &(0x7f000001f000)) 2018/03/30 19:42:47 executing program 6: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_mreqn(r0, 0x0, 0x27, &(0x7f0000000000)={@multicast2=0xe0000002, @loopback=0x7f000001}, 0xc) getsockopt$inet_sctp6_SCTP_FRAGMENT_INTERLEAVE(0xffffffffffffffff, 0x84, 0x12, &(0x7f0000000080), &(0x7f00000000c0)=0x4) ioctl$sock_inet_SIOCGIFDSTADDR(0xffffffffffffffff, 0x8917, &(0x7f0000000040)={'bcsh0\x00', {0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x1a}}}) setsockopt$inet_sctp6_SCTP_MAX_BURST(0xffffffffffffffff, 0x84, 0x14, &(0x7f0000000380)=@int=0x3, 0x4) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000140)={'bcsh0\x00', 0x0}) ioctl$sock_inet6_SIOCDELRT(0xffffffffffffffff, 0x890c, &(0x7f0000000180)={@dev={0xfe, 0x80, [], 0x13}, @loopback={0x0, 0x1}, @mcast2={0xff, 0x2, [], 0x1}, 0x6, 0x0, 0x42e, 0x100, 0x9, 0x80000000, r1}) r2 = socket$inet(0x2, 0xa, 0x5) setsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX(r2, 0x84, 0x6e, &(0x7f0000000600)=[@in={0x2, 0x4e21, @multicast1=0xe0000001}, @in6={0xa, 0x4e20, 0x0, @remote={0xfe, 0x80, [], 0xbb}}, @in={0x2, 0x4e22, @multicast2=0xe0000002}, @in6={0xa, 0x4e21, 0x1ff, @local={0xfe, 0x80, [], 0xaa}, 0x84}, @in6={0xa, 0x4e20, 0x4, @local={0xfe, 0x80, [], 0xaa}}], 0x74) getsockopt$inet_sctp6_SCTP_PR_SUPPORTED(0xffffffffffffffff, 0x84, 0x71, &(0x7f0000000200)={0x0, 0x8}, &(0x7f0000000240)=0x8) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(0xffffffffffffffff, 0x84, 0x6f, &(0x7f0000000300)={r3, 0x70, &(0x7f0000000280)=[@in={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x12}}, @in={0x2, 0x0, @loopback=0x7f000001}, @in={0x2, 0x4e20, @remote={0xac, 0x14, 0x14, 0xbb}}, @in={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x1a}}, @in={0x2, 0x4e24, @remote={0xac, 0x14, 0x14, 0xbb}}, @in={0x2, 0x4e24, @rand_addr=0x3ff}, @in={0x2, 0x4e24, @multicast2=0xe0000002}]}, &(0x7f0000000340)=0x10) setsockopt$inet_sctp6_SCTP_SET_PEER_PRIMARY_ADDR(0xffffffffffffffff, 0x84, 0x5, &(0x7f00000004c0)={r4, @in={{0x2, 0x4e20, @rand_addr=0x8}}}, 0x84) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, &(0x7f00000003c0)={'lo\x00', 0x4100}) ioctl$sock_inet_SIOCGIFNETMASK(0xffffffffffffffff, 0x891b, &(0x7f0000000100)={'nr0\x00', {0x2, 0x4e24, @loopback=0x7f000001}}) setsockopt$inet_msfilter(r0, 0x0, 0x29, &(0x7f0000000680)=ANY=[@ANYBLOB="cf0000000276d172390cc8c4ff4f3b746e5947c2ddb66a93ebb6d0f75b5f453435c311b94e126c49d47c10682b6e523d09fae1d416ebface98e08aa083e9f1f1afa118eb05655fec48d75d7a37edd032552c60ffeb53a2c8eecbe601a4ac5dceeecf1a943c2d9e2eaf4ad0a93e82a1a37a0cf2adbc4b512680428fee922ad18ff90ec6f87a75b299a953167bf4f9ae31cffd2c31dd47ba7d69151424dc1b2835f7624a302f270eb89118043dc1e1faa46e667be9cbf4456ad0c580ed032e4e49459f68f8a70f2dfe40f51362ffae"], 0x1) pread64(r0, &(0x7f0000000340)=""/181, 0xb5, 0x62) setsockopt$inet_msfilter(r0, 0x0, 0x29, &(0x7f0000000580)=ANY=[@ANYBLOB="e00000027f0000010000000001000000000000006b59aa51deb20d6efc9c04b7c9420f6434d31cbbe99b52873a8c21"], 0x1) socket$inet_udp(0x2, 0x2, 0x0) bpf$BPF_PROG_GET_NEXT_ID(0xb, &(0x7f0000000400)=0x7, 0x4) r5 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000ba4000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x2, 0x78, 0xe2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, r5, 0x0) r6 = perf_event_open(&(0x7f0000014f88)={0x1, 0x78, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00002e8000)}}, 0x0, 0x0, r5, 0x0) readv(r6, &(0x7f0000734000)=[{&(0x7f0000d42000)=""/146, 0x92}], 0x1) getsockopt$inet_sctp_SCTP_PEER_ADDR_THLDS(0xffffffffffffffff, 0x84, 0x1f, &(0x7f0000000480)={0x0, @in={{0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0xd}}}, 0xf80866d, 0x5}, &(0x7f0000000540)=0x90) getsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(0xffffffffffffff9c, 0x84, 0x18, &(0x7f0000000440)={r7, 0x400000000004}, &(0x7f00000005c0)=0xffffffffffffffc3) getsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER_VALUE(r0, 0x84, 0x7c, &(0x7f00000002c0)={r8, 0x10001, 0xc9e9}, &(0x7f0000000300)=0x8) [ 486.309984] EXT4-fs (loop4): VFS: Can't find ext4 filesystem [ 486.343345] BFS-fs: bfs_fill_super(): No BFS filesystem on loop4 (magic=00000000) [ 486.381202] jfs: Unrecognized mount option "umask=?" or missing value 2018/03/30 19:42:47 executing program 6: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_mreqn(r0, 0x0, 0x27, &(0x7f0000000000)={@multicast2=0xe0000002, @loopback=0x7f000001}, 0xc) getsockopt$inet_sctp6_SCTP_FRAGMENT_INTERLEAVE(0xffffffffffffffff, 0x84, 0x12, &(0x7f0000000080), &(0x7f00000000c0)=0x4) ioctl$sock_inet_SIOCGIFDSTADDR(0xffffffffffffffff, 0x8917, &(0x7f0000000040)={'bcsh0\x00', {0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x1a}}}) setsockopt$inet_sctp6_SCTP_MAX_BURST(0xffffffffffffffff, 0x84, 0x14, &(0x7f0000000380)=@int=0x3, 0x4) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000140)={'bcsh0\x00', 0x0}) ioctl$sock_inet6_SIOCDELRT(0xffffffffffffffff, 0x890c, &(0x7f0000000180)={@dev={0xfe, 0x80, [], 0x13}, @loopback={0x0, 0x1}, @mcast2={0xff, 0x2, [], 0x1}, 0x6, 0x0, 0x42e, 0x100, 0x9, 0x80000000, r1}) r2 = socket$inet(0x2, 0xa, 0x5) setsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX(r2, 0x84, 0x6e, &(0x7f0000000600)=[@in={0x2, 0x4e21, @multicast1=0xe0000001}, @in6={0xa, 0x4e20, 0x0, @remote={0xfe, 0x80, [], 0xbb}}, @in={0x2, 0x4e22, @multicast2=0xe0000002}, @in6={0xa, 0x4e21, 0x1ff, @local={0xfe, 0x80, [], 0xaa}, 0x84}, @in6={0xa, 0x4e20, 0x4, @local={0xfe, 0x80, [], 0xaa}}], 0x74) getsockopt$inet_sctp6_SCTP_PR_SUPPORTED(0xffffffffffffffff, 0x84, 0x71, &(0x7f0000000200)={0x0, 0x8}, &(0x7f0000000240)=0x8) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(0xffffffffffffffff, 0x84, 0x6f, &(0x7f0000000300)={r3, 0x70, &(0x7f0000000280)=[@in={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x12}}, @in={0x2, 0x0, @loopback=0x7f000001}, @in={0x2, 0x4e20, @remote={0xac, 0x14, 0x14, 0xbb}}, @in={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x1a}}, @in={0x2, 0x4e24, @remote={0xac, 0x14, 0x14, 0xbb}}, @in={0x2, 0x4e24, @rand_addr=0x3ff}, @in={0x2, 0x4e24, @multicast2=0xe0000002}]}, &(0x7f0000000340)=0x10) setsockopt$inet_sctp6_SCTP_SET_PEER_PRIMARY_ADDR(0xffffffffffffffff, 0x84, 0x5, &(0x7f00000004c0)={r4, @in={{0x2, 0x4e20, @rand_addr=0x8}}}, 0x84) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, &(0x7f00000003c0)={'lo\x00', 0x4100}) ioctl$sock_inet_SIOCGIFNETMASK(0xffffffffffffffff, 0x891b, &(0x7f0000000100)={'nr0\x00', {0x2, 0x4e24, @loopback=0x7f000001}}) setsockopt$inet_msfilter(r0, 0x0, 0x29, &(0x7f0000000680)=ANY=[@ANYBLOB="cf0000000276d172390cc8c4ff4f3b746e5947c2ddb66a93ebb6d0f75b5f453435c311b94e126c49d47c10682b6e523d09fae1d416ebface98e08aa083e9f1f1afa118eb05655fec48d75d7a37edd032552c60ffeb53a2c8eecbe601a4ac5dceeecf1a943c2d9e2eaf4ad0a93e82a1a37a0cf2adbc4b512680428fee922ad18ff90ec6f87a75b299a953167bf4f9ae31cffd2c31dd47ba7d69151424dc1b2835f7624a302f270eb89118043dc1e1faa46e667be9cbf4456ad0c580ed032e4e49459f68f8a70f2dfe40f51362ffae"], 0x1) pread64(r0, &(0x7f0000000340)=""/181, 0xb5, 0x62) setsockopt$inet_msfilter(r0, 0x0, 0x29, &(0x7f0000000580)=ANY=[@ANYBLOB="e00000027f0000010000000001000000000000006b59aa51deb20d6efc9c04b7c9420f6434d31cbbe99b52873a8c21"], 0x1) socket$inet_udp(0x2, 0x2, 0x0) bpf$BPF_PROG_GET_NEXT_ID(0xb, &(0x7f0000000400)=0x7, 0x4) r5 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000ba4000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x2, 0x78, 0xe2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, r5, 0x0) r6 = perf_event_open(&(0x7f0000014f88)={0x1, 0x78, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00002e8000)}}, 0x0, 0x0, r5, 0x0) readv(r6, &(0x7f0000734000)=[{&(0x7f0000d42000)=""/146, 0x92}], 0x1) getsockopt$inet_sctp_SCTP_PEER_ADDR_THLDS(0xffffffffffffffff, 0x84, 0x1f, &(0x7f0000000480)={0x0, @in={{0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0xd}}}, 0xf80866d, 0x5}, &(0x7f0000000540)=0x90) getsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(0xffffffffffffff9c, 0x84, 0x18, &(0x7f0000000440)={r7, 0x400000000004}, &(0x7f00000005c0)=0xffffffffffffffc3) getsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER_VALUE(r0, 0x84, 0x7c, &(0x7f00000002c0)={r8, 0x10001, 0xc9e9}, &(0x7f0000000300)=0x8) 2018/03/30 19:42:47 executing program 3: mmap(&(0x7f000053b000/0x2000)=nil, 0x2000, 0x1000004, 0x40000002871, 0xffffffffffffffff, 0x0) ioctl$sock_inet_SIOCDELRT(0xffffffffffffffff, 0x890c, &(0x7f0000000100)={0x7ff, {0x2, 0x4e22, @local={0xac, 0x14, 0x14, 0xaa}}, {0x2, 0x4e20, @dev={0xac, 0x14, 0x14}}, {0x2, 0x0, @multicast2=0xe0000002}, 0x0, 0x0, 0x1, 0x0, 0x40, &(0x7f0000000040)='ip_vti0\x00', 0x101, 0x8000}) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x1c, &(0x7f00000000c0)={@empty, 0x0}, &(0x7f0000000080)=0x14) mremap(&(0x7f000053b000/0x1000)=nil, 0x1000, 0x4000, 0x3, &(0x7f00000cc000/0x4000)=nil) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000280)='/dev/ppp\x00', 0x2400, 0x0) ioctl$sock_inet_SIOCGIFPFLAGS(r1, 0x8935, &(0x7f00000002c0)={'syz_tun\x00', 0x5}) mremap(&(0x7f000053a000/0x1000)=nil, 0x1000, 0x4000, 0x3, &(0x7f00000cf000/0x4000)=nil) mremap(&(0x7f000053c000/0x1000)=nil, 0x1000, 0x2000, 0x3, &(0x7f00000cd000/0x2000)=nil) getsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, &(0x7f0000000300)={{{@in6, @in=@local, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6}}}, &(0x7f0000000400)=0xe8) setsockopt$inet6_IPV6_IPSEC_POLICY(r1, 0x29, 0x22, &(0x7f0000000440)={{{@in6=@loopback={0x0, 0x1}, @in=@rand_addr=0xd3, 0x4e20, 0x5, 0x4e20, 0x1, 0xa, 0xa0, 0x80, 0x5e, r0, r2}, {0x0, 0x100, 0x0, 0x1ff, 0x7, 0x100, 0x9, 0x100000000}, {0x3, 0x10001, 0xffffffffffffff80, 0x2}, 0x4, 0x6e6bb3, 0x1, 0x0, 0x2, 0x2}, {{@in6=@mcast1={0xff, 0x1, [], 0x1}, 0x4d6, 0xff}, 0x0, @in6=@mcast1={0xff, 0x1, [], 0x1}, 0x3506, 0x2, 0x1, 0x4, 0xfffffffffffffbff, 0x0, 0xde}}, 0xe8) mremap(&(0x7f000053a000/0x3000)=nil, 0x3000, 0x3000, 0x3, &(0x7f00000cc000/0x3000)=nil) r3 = syz_open_dev$mice(&(0x7f0000000000)='/dev/input/mice\x00', 0x0, 0x4000) getsockopt$inet_sctp6_SCTP_AUTH_ACTIVE_KEY(0xffffffffffffffff, 0x84, 0x18, &(0x7f0000000180)={0x0, 0xa17c}, &(0x7f00000001c0)=0x8) openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000540)='/dev/vga_arbiter\x00', 0x40000, 0x0) getsockopt$inet_sctp_SCTP_ASSOCINFO(r3, 0x84, 0x1, &(0x7f0000000200)={r4, 0x6, 0x101, 0xfffffffffffffff9, 0x2, 0x1}, &(0x7f0000000240)=0x14) sigaltstack(&(0x7f000053b000/0x4000)=nil, 0x0) 2018/03/30 19:42:47 executing program 4: symlinkat(&(0x7f0000002f00)='./file0\x00', 0xffffffffffffffff, &(0x7f0000002f80)='./file0\x00') syz_mount_image$msdos(&(0x7f0000002fc0)='msdos\x00', &(0x7f0000003000)='./file0\x00', 0x4, 0x1, &(0x7f0000003180)=[{&(0x7f0000003040)="eaf9610c9f7031a1f58e51e73b3f0bd5af4364c38bbe335dbd3d211ec0338ba4c795c634af757a3c684da6110f67891133a6303441b21d139e3a6582efdaeabd3d68dbcb85cd383733a98084b62807af0b7ea49d68daa4cc9fda43dbeb13c3e67c44c463a2c429ccb66c0e1a9dfd5c911d4d7b578baaad6571d4457b9c6d92122a4bd97f5f174c81081941b007062f2cab2db1466851dde671e025909a633fec433bb2512fc61c436b74df23d280019a403884dc488071", 0xb7, 0xcd7}], 0x8, &(0x7f00000031c0)={[{@errors_continue='errors=continue', 0x2c}, {@time_offset={'time_offset', 0x3d, [0x0]}, 0x2c}]}) pipe(&(0x7f0000002f40)={0xffffffffffffffff}) r1 = open(&(0x7f0000003240)='./file0\x00', 0xa0001, 0x20) linkat(r0, &(0x7f0000003200)='./file0\x00', r1, &(0x7f0000003280)='./file0\x00', 0x400) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x80000, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)}, {&(0x7f0000010d00)="0000000000000000000000000000000000000000000000000000000002ae0000ed41000000040000d15bbe5ad15bbe5ad15bbe5a00000000000005002000000000000800070000000af301000400000000000000000000000100000030000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a1950000", 0xa0, 0x8c60}, {&(0x7f0000011a00)="020000000c0001022e000000020000000c0002022e2e00000b00000014000a026c6f73742b666f756e6400000c0000001000050166696c65300000000d0000001000050266696c65310000000f0000001000050166696c6532000000100000001000050166696c6533000000110000001000050166696c65340000001200000010000802564944454f5f54531400000068031201d181d18ed0b7d0bad0b0d0bbd0bbd0b5d1800000000000000000000000000000000000000000000000000000", 0xc0, 0xc000}, {&(0x7f0000012200)="0000000000000000000000000000000000000000000000000c0000dec910dfd800000000f4030000000000000000000000000000000000000000000000000000", 0x40, 0x117e0}, {&(0x7f0000012a00)="0d0000000c0001022e000000020000000c0002022e2e00000e000000dc03050166696c6530000000000000000000000000000000000000000000000000000000", 0x40, 0x1c000}], 0x0, &(0x7f0000013000)) syz_mount_image$bfs(&(0x7f0000000040)='bfs\x00', &(0x7f00000008c0)='./file0\x00', 0x20, 0x2, &(0x7f0000000180)=[{&(0x7f00000005c0)="f37e57346e86cb5adec662d7bd6f13a3764d2ca7640f9f81ba88d0689d0989735a7bafd5558d9a6e8988f9f6038fa475e49077bc8cfc6e170c4cdbaaa1375895c9a4068559d3cecf2a0423caa696bf77a75b3ae3f32b79da059ca13d055647998987fc2033d008bd55deb08808372b9b4595fb0d79a1358cd5949d859a7d155e86db4b608eb401109f6b792f5ce4a2ead9870dee49347bc08d0d54b0e4fca4fd895947a737f4ee823d997770e5c9df50c0c9fe2c0b945c6ffd13b7151e385b631520ac34a5967c6cd0d12b3746795681600541c17d379daed41ce8e715eba582fb668e160872a2", 0xe7, 0x7}, {&(0x7f0000000780)="6154d093a5a905da96fed5f8dea36bcd9d1d011246f7caf86806bf6ac6301d2d2b448461b867bbbe7d0eebdeafa16d7219af85ff4372670039ce277546def59f1d0eed4be4386a34c7243fe3ec84ad3807136a2c3ec35d6d87a7d7bb9342622cc3a7ff529ef3d76ff57fc7a1856f50b98e518515a9e679067cfc0e8500754fa30a81cf4dc42c5a0d36647280c5b0a8506efaf9ad06594678176efe4bdbcf7ab384b597df4c5ad66b2bd240823abe04cd30785819f1c7fd4d46bb55f8bd09ca4b44618b010e363fa572ca189ec73b36ad46b6f38d65c0acc417", 0xd9, 0x5}], 0x200000, 0x0) syz_mount_image$jfs(&(0x7f0000000080)='jfs\x00', &(0x7f0000000880)='./file0\x00', 0xfffffffffffffffe, 0x3, &(0x7f0000002dc0)=[{&(0x7f0000000900)="efee47debce411554253d03f2175c060de26b9a7a197d9327971105aafdf17a061227fe7dd52d3c1c1f0318992f304f7646c3eb4e32ff0514d34d4605b4e152474aa71ac6c0ba890b1f249f213d5bc162b605fdf3c524d6f84e1a2f8461d26ef5dd50b193ffb710ee69fc431552ae4548f0c1a7e503243bb10c53c566f37e3234d8b3d418992dca946568d275e1f54895a854bab3790963108fe6ce5b1f933e81bd0aa2dfd715aca4bd81b48b28e3ee265", 0xb1, 0x1}, {&(0x7f0000001a80)="b4bc90ad72742e5693f04c7955b05460b33cd0ca9cde365dbe1671162a8c1db744cb8a04d1d747ab4d3234fd615e6ad897396c21b8bf7da2c1d524d04fadade841e5acfac529250a2c75fed4b65a7b6c8735268244189e020c526112728097958fd591d00cd16d1591db9b0414d985d7718794369eb03d89403b7df76f6d745c94d4fa986321a9915fea55a73472bc39620fcf22ec74d02b77fafe6ccf72605eb0ba7ae69fa10a36d281e65a178528bc654ce5b6109d5294e400b18be755a3b899489b27a876ac3ea033ed525b28c7dff537b5210cbff466dc339e1f58db1679816589e886264ef1bcf6d0e1408d93946827711972", 0xf5, 0x7}, {&(0x7f0000002cc0)="c9bc1928c9ffffe99fdae39f5013810a038f1d558affc92341c81ee308195dabd95fcfedcfccd4cf2af62477e5ed935114b73940dba239c47d5824a3332fb48cea682934a6840ea5db2529c3a7c371bbf08f08bb15458de586609be64b699f29b7384dc7b2ba78f0e343fb9851eaf5a7b4106fc5b7a8aaf6e069012286fa7259807928cbee722222f45e6c98cefa00829bcdd92bd03273c7b0f20453c72150adf49c311248d3d3d96ad17187d60add3d1d8fbfbc5e572ceba134e5c533a5f75630a35514ee998b85a755085c04", 0xcd, 0x4}], 0x10000, &(0x7f0000002ec0)={[{@nodiscard='nodiscard', 0x2c}, {@resize='resize', 0x2c}, {@noquota='noquota', 0x2c}, {@umask={'umask', 0x3d, [0x3f]}, 0x2c}]}) 2018/03/30 19:42:47 executing program 6: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_mreqn(r0, 0x0, 0x27, &(0x7f0000000000)={@multicast2=0xe0000002, @loopback=0x7f000001}, 0xc) getsockopt$inet_sctp6_SCTP_FRAGMENT_INTERLEAVE(0xffffffffffffffff, 0x84, 0x12, &(0x7f0000000080), &(0x7f00000000c0)=0x4) ioctl$sock_inet_SIOCGIFDSTADDR(0xffffffffffffffff, 0x8917, &(0x7f0000000040)={'bcsh0\x00', {0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x1a}}}) setsockopt$inet_sctp6_SCTP_MAX_BURST(0xffffffffffffffff, 0x84, 0x14, &(0x7f0000000380)=@int=0x3, 0x4) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000140)={'bcsh0\x00', 0x0}) ioctl$sock_inet6_SIOCDELRT(0xffffffffffffffff, 0x890c, &(0x7f0000000180)={@dev={0xfe, 0x80, [], 0x13}, @loopback={0x0, 0x1}, @mcast2={0xff, 0x2, [], 0x1}, 0x6, 0x0, 0x42e, 0x100, 0x9, 0x80000000, r1}) r2 = socket$inet(0x2, 0xa, 0x5) setsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX(r2, 0x84, 0x6e, &(0x7f0000000600)=[@in={0x2, 0x4e21, @multicast1=0xe0000001}, @in6={0xa, 0x4e20, 0x0, @remote={0xfe, 0x80, [], 0xbb}}, @in={0x2, 0x4e22, @multicast2=0xe0000002}, @in6={0xa, 0x4e21, 0x1ff, @local={0xfe, 0x80, [], 0xaa}, 0x84}, @in6={0xa, 0x4e20, 0x4, @local={0xfe, 0x80, [], 0xaa}}], 0x74) getsockopt$inet_sctp6_SCTP_PR_SUPPORTED(0xffffffffffffffff, 0x84, 0x71, &(0x7f0000000200)={0x0, 0x8}, &(0x7f0000000240)=0x8) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(0xffffffffffffffff, 0x84, 0x6f, &(0x7f0000000300)={r3, 0x70, &(0x7f0000000280)=[@in={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x12}}, @in={0x2, 0x0, @loopback=0x7f000001}, @in={0x2, 0x4e20, @remote={0xac, 0x14, 0x14, 0xbb}}, @in={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x1a}}, @in={0x2, 0x4e24, @remote={0xac, 0x14, 0x14, 0xbb}}, @in={0x2, 0x4e24, @rand_addr=0x3ff}, @in={0x2, 0x4e24, @multicast2=0xe0000002}]}, &(0x7f0000000340)=0x10) setsockopt$inet_sctp6_SCTP_SET_PEER_PRIMARY_ADDR(0xffffffffffffffff, 0x84, 0x5, &(0x7f00000004c0)={r4, @in={{0x2, 0x4e20, @rand_addr=0x8}}}, 0x84) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, &(0x7f00000003c0)={'lo\x00', 0x4100}) ioctl$sock_inet_SIOCGIFNETMASK(0xffffffffffffffff, 0x891b, &(0x7f0000000100)={'nr0\x00', {0x2, 0x4e24, @loopback=0x7f000001}}) setsockopt$inet_msfilter(r0, 0x0, 0x29, &(0x7f0000000680)=ANY=[@ANYBLOB="cf0000000276d172390cc8c4ff4f3b746e5947c2ddb66a93ebb6d0f75b5f453435c311b94e126c49d47c10682b6e523d09fae1d416ebface98e08aa083e9f1f1afa118eb05655fec48d75d7a37edd032552c60ffeb53a2c8eecbe601a4ac5dceeecf1a943c2d9e2eaf4ad0a93e82a1a37a0cf2adbc4b512680428fee922ad18ff90ec6f87a75b299a953167bf4f9ae31cffd2c31dd47ba7d69151424dc1b2835f7624a302f270eb89118043dc1e1faa46e667be9cbf4456ad0c580ed032e4e49459f68f8a70f2dfe40f51362ffae"], 0x1) pread64(r0, &(0x7f0000000340)=""/181, 0xb5, 0x62) setsockopt$inet_msfilter(r0, 0x0, 0x29, &(0x7f0000000580)=ANY=[@ANYBLOB="e00000027f0000010000000001000000000000006b59aa51deb20d6efc9c04b7c9420f6434d31cbbe99b52873a8c21"], 0x1) socket$inet_udp(0x2, 0x2, 0x0) bpf$BPF_PROG_GET_NEXT_ID(0xb, &(0x7f0000000400)=0x7, 0x4) r5 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000ba4000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x2, 0x78, 0xe2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, r5, 0x0) r6 = perf_event_open(&(0x7f0000014f88)={0x1, 0x78, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00002e8000)}}, 0x0, 0x0, r5, 0x0) readv(r6, &(0x7f0000734000)=[{&(0x7f0000d42000)=""/146, 0x92}], 0x1) getsockopt$inet_sctp_SCTP_PEER_ADDR_THLDS(0xffffffffffffffff, 0x84, 0x1f, &(0x7f0000000480)={0x0, @in={{0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0xd}}}, 0xf80866d, 0x5}, &(0x7f0000000540)=0x90) getsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(0xffffffffffffff9c, 0x84, 0x18, &(0x7f0000000440)={r7, 0x400000000004}, &(0x7f00000005c0)=0xffffffffffffffc3) getsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER_VALUE(r0, 0x84, 0x7c, &(0x7f00000002c0)={r8, 0x10001, 0xc9e9}, &(0x7f0000000300)=0x8) 2018/03/30 19:42:47 executing program 3: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) getsockopt$EBT_SO_GET_ENTRIES(r0, 0x0, 0x81, &(0x7f0000000180)={'nat\x00', 0x0, 0x3, 0x50, [], 0x4, &(0x7f0000000080)=[{}, {}, {}, {}], &(0x7f0000000100)=""/80}, &(0x7f0000000200)=0x78) getsockopt$EBT_SO_GET_ENTRIES(r0, 0x0, 0x81, &(0x7f0000000380)={'broute\x00', 0x0, 0x0, 0xf4, [], 0x1, &(0x7f0000000240)=[{}], &(0x7f0000000280)=""/244}, &(0x7f0000000400)=0x50) getsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER(0xffffffffffffff9c, 0x84, 0x7b, &(0x7f0000000500)={0x0, 0x1}, &(0x7f0000000640)=0x8) getsockopt$inet_sctp_SCTP_MAXSEG(r0, 0x84, 0xd, &(0x7f0000000680)=@assoc_value={0x0, 0x2}, &(0x7f00000006c0)=0x8) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000580)='/proc/self/net/pfkey\x00', 0x109800, 0x0) setsockopt$IP_VS_SO_SET_ADD(r0, 0x0, 0x482, &(0x7f00000004c0)={0x11, @multicast1=0xe0000001, 0x0, 0x0, 'lblc\x00'}, 0x2c) dup(r0) socketpair(0xb, 0x0, 0x2, &(0x7f0000000000)) setsockopt$IP_VS_SO_SET_STARTDAEMON(r0, 0x0, 0x48b, &(0x7f0000000540)={0x1, 'ip6gre0\x00'}, 0x18) setsockopt$IP_VS_SO_SET_FLUSH(r0, 0x0, 0x485, 0x0, 0x0) 2018/03/30 19:42:47 executing program 7: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f00003b9fdc)) readv(r0, &(0x7f0000001980)=[{&(0x7f0000001640)=""/180, 0xb4}, {&(0x7f00000018c0)=""/182, 0xb6}], 0x2) r1 = syz_open_pts(r0, 0x2) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000003c0)='cpuset.effective_cpus\x00', 0x0, 0x0) setsockopt$inet6_mtu(r2, 0x29, 0x17, &(0x7f0000000440)=0x5, 0x4) socket$inet_sctp(0x2, 0x5, 0x84) dup3(r1, r0, 0x0) write(r0, &(0x7f0000c34fff), 0xffffff0b) socket$inet(0x2, 0xb, 0xfff) readv(0xffffffffffffffff, &(0x7f0000000180)=[{&(0x7f00000000c0)=""/3, 0x3}], 0x1) setsockopt$bt_l2cap_L2CAP_OPTIONS(0xffffffffffffffff, 0x6, 0x1, &(0x7f0000000380)={0xefa, 0x800, 0x9a2b, 0x0, 0x9, 0x0, 0xc9}, 0xc) perf_event_open(&(0x7f000025c000)={0x0, 0x78}, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 486.527431] FAT-fs (loop4): Unrecognized mount option "time_offset=" or missing value [ 486.565608] EXT4-fs (loop4): VFS: Can't find ext4 filesystem [ 486.613864] BFS-fs: bfs_fill_super(): No BFS filesystem on loop4 (magic=00000000) [ 486.655699] IPVS: sync thread started: state = MASTER, mcast_ifn = ip6gre0, syncid = 0, id = 0 [ 486.670877] jfs: Unrecognized mount option "umask=?" or missing value [ 486.762540] IPVS: ftp: loaded support on port[0] = 21 2018/03/30 19:42:48 executing program 2: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) readv(0xffffffffffffffff, &(0x7f0000001480), 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f00003b9fdc)) readv(r0, &(0x7f0000001980)=[{&(0x7f00000018c0)=""/182, 0xb6}], 0x1) r1 = syz_open_pts(r0, 0x2) setsockopt$inet6_mtu(0xffffffffffffffff, 0x29, 0x17, &(0x7f0000000440)=0x5, 0x4) socket$inet_sctp(0x2, 0x5, 0x84) dup3(r1, r0, 0x0) socket$inet(0x2, 0x0, 0x0) setsockopt$bt_l2cap_L2CAP_OPTIONS(0xffffffffffffffff, 0x6, 0x1, &(0x7f0000000380)={0xefa, 0x800, 0x0, 0x0, 0x9}, 0xc) 2018/03/30 19:42:48 executing program 0: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000f5eff5)='lp\x00', 0x4) sendto$inet(r0, &(0x7f0000fd0000), 0xfffffffffffffec1, 0x20000801, &(0x7f0000deaff0)={0x2, 0x0, @loopback=0x7f000001}, 0x10) shutdown(0xffffffffffffffff, 0x0) 2018/03/30 19:42:48 executing program 7: r0 = syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x0, 0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$netlink_NETLINK_ADD_MEMBERSHIP(0xffffffffffffffff, 0x10e, 0x1, &(0x7f0000000240), 0x4) rmdir(&(0x7f0000000080)='./file0\x00') connect$nfc_llcp(0xffffffffffffffff, &(0x7f0000000540)={0x27, 0x0, 0x0, 0x2, 0x7, 0x6, "4021bc5c62a8b600554fd217a152db8c5e202690ff5e106c7c3952d6060c481cf11e7913f883ddd296bfa5479216af340d0d68910e8d8adb388f562a8d6718"}, 0xab) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000000)={'lo\x00'}) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000001d40)={'lo\x00', 0xfff}) getsockopt$inet_sctp_SCTP_HMAC_IDENT(0xffffffffffffffff, 0x84, 0x16, &(0x7f0000000280)=ANY=[@ANYBLOB="09003c9dbb007f000300501c0100bc28f2"], &(0x7f0000000200)=0x1) ioctl$TIOCSTI(0xffffffffffffffff, 0x5412, 0x7) pread64(r0, &(0x7f0000000080)=""/156, 0x9c, 0x0) openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000700)='/dev/vga_arbiter\x00', 0x0, 0x0) getsockopt$inet_sctp_SCTP_GET_PEER_ADDRS(r0, 0x84, 0x6c, &(0x7f0000000740)={0x0, 0x7, "10b402dd98f261"}, &(0x7f0000000180)=0xf) getsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000040), 0x10) getsockopt$inet_sctp_SCTP_RESET_STREAMS(0xffffffffffffffff, 0x84, 0x77, &(0x7f00000007c0)={r2, 0x10001, 0x2, [0xfffffffffffffff9, 0x0]}, &(0x7f0000000800)=0xc) ioctl$DRM_IOCTL_DMA(r0, 0xc0286429, &(0x7f00000004c0)={0x0, 0x0, &(0x7f00000003c0), &(0x7f0000000400)=[0x9, 0x60, 0x0, 0x0, 0x1], 0x1, 0x2, 0x7, &(0x7f0000000440)=[0xffff, 0x0], &(0x7f0000000480)=[0x7]}) getsockopt$inet_sctp_SCTP_DEFAULT_SEND_PARAM(r0, 0x84, 0xa, &(0x7f0000000140)={0x0, 0x0, 0x200, 0x7, 0x0, 0x0, 0x3cb, 0xfffffffffffeffff}, &(0x7f00000001c0)=0x20) 2018/03/30 19:42:48 executing program 1: r0 = syz_open_dev$amidi(&(0x7f0000000040)='/dev/amidi#\x00', 0x3, 0x28000) ioctl$DRM_IOCTL_RES_CTX(r0, 0xc0086426, &(0x7f0000000100)={0x2c, &(0x7f00000000c0)=[{}, {}, {}, {}, {}, {}, {}, {}]}) socket$netlink(0x10, 0x3, 0xc) writev(0xffffffffffffffff, &(0x7f00000021c0), 0x0) bind$bt_l2cap(r0, &(0x7f0000000340)={0x1f, 0x800000000000002, {0x401, 0x3, 0xb, 0x3f8}}, 0x9) socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f0000a8d000)={&(0x7f0000c78ff4)={0x10}, 0xc, &(0x7f0000df6000)={&(0x7f0000000200)=ANY=[@ANYBLOB="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"], 0x10e}, 0x1}, 0x0) r1 = socket$inet_sctp(0x2, 0x5, 0x84) sendmsg$inet_sctp(r1, &(0x7f0000001f00)={&(0x7f0000001840)=@in={0x2, 0x0, @dev={0xac, 0x14, 0x14}}, 0x10, &(0x7f0000001c40)=[{&(0x7f0000001880)='[', 0x1}], 0x1, &(0x7f0000001e40)}, 0x40) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000540)=@nat={'nat\x00', 0x19, 0x3, 0x376, [0x20000140, 0x0, 0x0, 0x20000170, 0x200002d0], 0x0, &(0x7f0000000100), &(0x7f00000006c0)=ANY=[@ANYBLOB="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"]}, 0x3ee) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000002980)) getsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(0xffffffffffffffff, 0x84, 0x1f, &(0x7f0000000440)={0x0, @in={{0x2, 0x4e22, @multicast2=0xe0000002}}, 0x7bb7, 0x4}, &(0x7f0000000500)=0x90) getsockopt$inet_sctp_SCTP_RTOINFO(0xffffffffffffffff, 0x84, 0x0, &(0x7f0000002240)={0x0, 0x9, 0x417}, &(0x7f00000001c0)=0x10) r2 = socket(0x22, 0x4, 0x3) r3 = socket(0x20000001e, 0x5, 0x0) r4 = perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$packet_tx_ring(r3, 0x10f, 0x87, &(0x7f0000265000)=@req={0x3fc, 0x0, 0x1}, 0x10) getegid() setsockopt$packet_tx_ring(r2, 0x10f, 0x87, &(0x7f0000265000)=@req={0x3fc, 0x0, 0x1}, 0x10) writev(r2, &(0x7f00000000c0)=[{&(0x7f0000000000)="8a", 0x1}], 0x1) close(r2) close(r3) perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r5 = syz_open_dev$evdev(&(0x7f0000dfdfee)='/dev/input/event#\x00', 0x0, 0x2) readv(r5, &(0x7f0000019fe0)=[{&(0x7f00008ec000)=""/219, 0xdb}], 0x1) write$evdev(r5, &(0x7f000004d000)=[{{}, 0x0, 0x1}, {{0x2}}], 0x30) r6 = getpgrp(0x0) setsockopt$ax25_int(r3, 0x101, 0xd, &(0x7f0000000080)=0x7, 0x4) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x8, 0xfffffffffffffffd, 0x9, 0x7, 0x0, 0x8001, 0x0, 0x6, 0x3ff, 0x4, 0x5, 0x4, 0xbd9, 0x56, 0x8000, 0x7f, 0xff, 0xeba, 0x1f, 0x0, 0xfd, 0x3, 0x1, 0x50, 0x7, 0x9, 0x641800, 0x3ff8000000000000, 0x4, 0x0, 0x10000, 0x5, 0x7, 0x6, 0x1, 0xffffffffffffffe0, 0x0, 0x20, 0x0, @perf_bp={&(0x7f0000000040), 0x8}, 0x20, 0x401, 0x8, 0x3, 0x8, 0x7, 0x7}, r6, 0xc, r4, 0x0) syz_genetlink_get_family_id$ipvs(&(0x7f0000000040)='IPVS\x00') 2018/03/30 19:42:48 executing program 4: symlinkat(&(0x7f0000002f00)='./file0\x00', 0xffffffffffffffff, &(0x7f0000002f80)='./file0\x00') syz_mount_image$msdos(&(0x7f0000002fc0)='msdos\x00', &(0x7f0000003000)='./file0\x00', 0x4, 0x1, &(0x7f0000003180)=[{&(0x7f0000003040)="eaf9610c9f7031a1f58e51e73b3f0bd5af4364c38bbe335dbd3d211ec0338ba4c795c634af757a3c684da6110f67891133a6303441b21d139e3a6582efdaeabd3d68dbcb85cd383733a98084b62807af0b7ea49d68daa4cc9fda43dbeb13c3e67c44c463a2c429ccb66c0e1a9dfd5c911d4d7b578baaad6571d4457b9c6d92122a4bd97f5f174c81081941b007062f2cab2db1466851dde671e025909a633fec433bb2512fc61c436b74df23d280019a403884dc488071", 0xb7, 0xcd7}], 0x8, &(0x7f00000031c0)={[{@errors_continue='errors=continue', 0x2c}, {@time_offset={'time_offset', 0x3d, [0x0]}, 0x2c}]}) pipe(&(0x7f0000002f40)={0xffffffffffffffff}) r1 = open(&(0x7f0000003240)='./file0\x00', 0xa0001, 0x20) linkat(r0, &(0x7f0000003200)='./file0\x00', r1, &(0x7f0000003280)='./file0\x00', 0x400) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x80000, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)}, {&(0x7f0000010d00)="0000000000000000000000000000000000000000000000000000000002ae0000ed41000000040000d15bbe5ad15bbe5ad15bbe5a00000000000005002000000000000800070000000af301000400000000000000000000000100000030000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a1950000", 0xa0, 0x8c60}, {&(0x7f0000011a00)="020000000c0001022e000000020000000c0002022e2e00000b00000014000a026c6f73742b666f756e6400000c0000001000050166696c65300000000d0000001000050266696c65310000000f0000001000050166696c6532000000100000001000050166696c6533000000110000001000050166696c65340000001200000010000802564944454f5f54531400000068031201d181d18ed0b7d0bad0b0d0bbd0bbd0b5d1800000000000000000000000000000000000000000000000000000", 0xc0, 0xc000}, {&(0x7f0000012200)="0000000000000000000000000000000000000000000000000c0000dec910dfd800000000f4030000000000000000000000000000000000000000000000000000", 0x40, 0x117e0}, {&(0x7f0000012a00)="0d0000000c0001022e000000020000000c0002022e2e00000e000000dc03050166696c6530000000000000000000000000000000000000000000000000000000", 0x40, 0x1c000}], 0x0, &(0x7f0000013000)) syz_mount_image$bfs(&(0x7f0000000040)='bfs\x00', &(0x7f00000008c0)='./file0\x00', 0x20, 0x2, &(0x7f0000000180)=[{&(0x7f00000005c0)="f37e57346e86cb5adec662d7bd6f13a3764d2ca7640f9f81ba88d0689d0989735a7bafd5558d9a6e8988f9f6038fa475e49077bc8cfc6e170c4cdbaaa1375895c9a4068559d3cecf2a0423caa696bf77a75b3ae3f32b79da059ca13d055647998987fc2033d008bd55deb08808372b9b4595fb0d79a1358cd5949d859a7d155e86db4b608eb401109f6b792f5ce4a2ead9870dee49347bc08d0d54b0e4fca4fd895947a737f4ee823d997770e5c9df50c0c9fe2c0b945c6ffd13b7151e385b631520ac34a5967c6cd0d12b3746795681600541c17d379daed41ce8e715eba582fb668e160872a2", 0xe7, 0x7}, {&(0x7f0000000780)="6154d093a5a905da96fed5f8dea36bcd9d1d011246f7caf86806bf6ac6301d2d2b448461b867bbbe7d0eebdeafa16d7219af85ff4372670039ce277546def59f1d0eed4be4386a34c7243fe3ec84ad3807136a2c3ec35d6d87a7d7bb9342622cc3a7ff529ef3d76ff57fc7a1856f50b98e518515a9e679067cfc0e8500754fa30a81cf4dc42c5a0d36647280c5b0a8506efaf9ad06594678176efe4bdbcf7ab384b597df4c5ad66b2bd240823abe04cd30785819f1c7fd4d46bb55f8bd09ca4b44618b010e363fa572ca189ec73b36ad46b6f38d65c0acc417", 0xd9, 0x5}], 0x200000, 0x0) syz_mount_image$jfs(&(0x7f0000000080)='jfs\x00', &(0x7f0000000880)='./file0\x00', 0xfffffffffffffffe, 0x3, &(0x7f0000002dc0)=[{&(0x7f0000000900)="efee47debce411554253d03f2175c060de26b9a7a197d9327971105aafdf17a061227fe7dd52d3c1c1f0318992f304f7646c3eb4e32ff0514d34d4605b4e152474aa71ac6c0ba890b1f249f213d5bc162b605fdf3c524d6f84e1a2f8461d26ef5dd50b193ffb710ee69fc431552ae4548f0c1a7e503243bb10c53c566f37e3234d8b3d418992dca946568d275e1f54895a854bab3790963108fe6ce5b1f933e81bd0aa2dfd715aca4bd81b48b28e3ee265", 0xb1, 0x1}, {&(0x7f0000001a80)="b4bc90ad72742e5693f04c7955b05460b33cd0ca9cde365dbe1671162a8c1db744cb8a04d1d747ab4d3234fd615e6ad897396c21b8bf7da2c1d524d04fadade841e5acfac529250a2c75fed4b65a7b6c8735268244189e020c526112728097958fd591d00cd16d1591db9b0414d985d7718794369eb03d89403b7df76f6d745c94d4fa986321a9915fea55a73472bc39620fcf22ec74d02b77fafe6ccf72605eb0ba7ae69fa10a36d281e65a178528bc654ce5b6109d5294e400b18be755a3b899489b27a876ac3ea033ed525b28c7dff537b5210cbff466dc339e1f58db1679816589e886264ef1bcf6d0e1408d93946827711972", 0xf5, 0x7}, {&(0x7f0000002cc0)="c9bc1928c9ffffe99fdae39f5013810a038f1d558affc92341c81ee308195dabd95fcfedcfccd4cf2af62477e5ed935114b73940dba239c47d5824a3332fb48cea682934a6840ea5db2529c3a7c371bbf08f08bb15458de586609be64b699f29b7384dc7b2ba78f0e343fb9851eaf5a7b4106fc5b7a8aaf6e069012286fa7259807928cbee722222f45e6c98cefa00829bcdd92bd03273c7b0f20453c72150adf49c311248d3d3d96ad17187d60add3d1d8fbfbc5e572ceba134e5c533a5f75630a35514ee998b85a755085c04513dcc0047461d78f4aa8fdf0309fc", 0xdc, 0x4}], 0x10000, &(0x7f0000002ec0)={[{@nodiscard='nodiscard', 0x2c}, {@resize='resize', 0x2c}, {@noquota='noquota', 0x2c}, {@umask={'umask', 0x3d, [0x3f]}, 0x2c}]}) 2018/03/30 19:42:48 executing program 6: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_mreqn(r0, 0x0, 0x27, &(0x7f0000000000)={@multicast2=0xe0000002, @loopback=0x7f000001}, 0xc) getsockopt$inet_sctp6_SCTP_FRAGMENT_INTERLEAVE(0xffffffffffffffff, 0x84, 0x12, &(0x7f0000000080), &(0x7f00000000c0)=0x4) ioctl$sock_inet_SIOCGIFDSTADDR(0xffffffffffffffff, 0x8917, &(0x7f0000000040)={'bcsh0\x00', {0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x1a}}}) setsockopt$inet_sctp6_SCTP_MAX_BURST(0xffffffffffffffff, 0x84, 0x14, &(0x7f0000000380)=@int=0x3, 0x4) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000140)={'bcsh0\x00', 0x0}) ioctl$sock_inet6_SIOCDELRT(0xffffffffffffffff, 0x890c, &(0x7f0000000180)={@dev={0xfe, 0x80, [], 0x13}, @loopback={0x0, 0x1}, @mcast2={0xff, 0x2, [], 0x1}, 0x6, 0x0, 0x42e, 0x100, 0x9, 0x80000000, r1}) r2 = socket$inet(0x2, 0xa, 0x5) setsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX(r2, 0x84, 0x6e, &(0x7f0000000600)=[@in={0x2, 0x4e21, @multicast1=0xe0000001}, @in6={0xa, 0x4e20, 0x0, @remote={0xfe, 0x80, [], 0xbb}}, @in={0x2, 0x4e22, @multicast2=0xe0000002}, @in6={0xa, 0x4e21, 0x1ff, @local={0xfe, 0x80, [], 0xaa}, 0x84}, @in6={0xa, 0x4e20, 0x4, @local={0xfe, 0x80, [], 0xaa}}], 0x74) getsockopt$inet_sctp6_SCTP_PR_SUPPORTED(0xffffffffffffffff, 0x84, 0x71, &(0x7f0000000200)={0x0, 0x8}, &(0x7f0000000240)=0x8) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(0xffffffffffffffff, 0x84, 0x6f, &(0x7f0000000300)={r3, 0x60, &(0x7f0000000280)=[@in={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x12}}, @in={0x2, 0x4e24, @loopback=0x7f000001}, @in={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x1a}}, @in={0x2, 0x4e24, @remote={0xac, 0x14, 0x14, 0xbb}}, @in={0x2, 0x4e24, @rand_addr=0x3ff}, @in={0x2, 0x4e24, @multicast2=0xe0000002}]}, &(0x7f0000000340)=0x10) setsockopt$inet_sctp6_SCTP_SET_PEER_PRIMARY_ADDR(0xffffffffffffffff, 0x84, 0x5, &(0x7f00000004c0)={r4, @in={{0x2, 0x4e20, @rand_addr=0x8}}}, 0x84) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, &(0x7f00000003c0)={'lo\x00', 0x4100}) ioctl$sock_inet_SIOCGIFNETMASK(0xffffffffffffffff, 0x891b, &(0x7f0000000100)={'nr0\x00', {0x2, 0x4e24, @loopback=0x7f000001}}) setsockopt$inet_msfilter(r0, 0x0, 0x29, &(0x7f0000000680)=ANY=[@ANYBLOB="cf0000000276d172390cc8c4ff4f3b746e5947c2ddb66a93ebb6d0f75b5f453435c311b94e126c49d47c10682b6e523d09fae1d416ebface98e08aa083e9f1f1afa118eb05655fec48d75d7a37edd032552c60ffeb53a2c8eecbe601a4ac5dceeecf1a943c2d9e2eaf4ad0a93e82a1a37a0cf2adbc4b512680428fee922ad18ff90ec6f87a75b299a953167bf4f9ae31cffd2c31dd47ba7d69151424dc1b2835f7624a302f270eb89118043dc1e1faa46e667be9cbf4456ad0c580ed032e4e49459f68f8a70f2dfe40f51362ffae"], 0x1) pread64(r0, &(0x7f0000000340)=""/181, 0xb5, 0x62) setsockopt$inet_msfilter(r0, 0x0, 0x29, &(0x7f0000000580)=ANY=[@ANYBLOB="e00000027f0000010000000001000000000000006b59aa51deb20d6efc9c04b7c9420f6434d31cbbe99b52873a8c21"], 0x1) socket$inet_udp(0x2, 0x2, 0x0) bpf$BPF_PROG_GET_NEXT_ID(0xb, &(0x7f0000000400)=0x7, 0x4) r5 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000ba4000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x2, 0x78, 0xe2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, r5, 0x0) r6 = perf_event_open(&(0x7f0000014f88)={0x1, 0x78, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00002e8000)}}, 0x0, 0x0, r5, 0x0) readv(r6, &(0x7f0000734000)=[{&(0x7f0000d42000)=""/146, 0x92}], 0x1) getsockopt$inet_sctp_SCTP_PEER_ADDR_THLDS(0xffffffffffffffff, 0x84, 0x1f, &(0x7f0000000480)={0x0, @in={{0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0xd}}}, 0xf80866d, 0x5}, &(0x7f0000000540)=0x90) getsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(0xffffffffffffff9c, 0x84, 0x18, &(0x7f0000000440)={r7, 0x400000000004}, &(0x7f00000005c0)=0xffffffffffffffc3) getsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER_VALUE(r0, 0x84, 0x7c, &(0x7f00000002c0)={r8, 0x10001, 0xc9e9}, &(0x7f0000000300)=0x8) 2018/03/30 19:42:48 executing program 3: r0 = getpid() r1 = syz_open_procfs(r0, &(0x7f0000000480)="2f6578650000000000ff070000ddd9f191be10eebf000ee9ff0700000000000054fa07424adee916d2da75afe70b35a0fd6a1f349572d226d7a075fb35331ce39c5a3568641006d7c0206a74e333265316a175350e730ab2bce682b69d603fc05ead7fb5180de13a74155d8560fe23dfbba10724631067f955b8810f3402053f95a8798b0e3749d9c79cdd5f62547e59ab4352ab0a3827384665fd2c16ea53e5e2a1dc065b53520b9cd4eb30edc0f70cb82149f8ff5b628eabf1a9ab91915a78b5cb259f4a0fbfab4dacbd68f077") chroot(&(0x7f0000000000)='./file1\x00') ioctl$SIOCGIFHWADDR(r1, 0x8927, &(0x7f0000000080)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000300), &(0x7f0000000380)=0xc) fstat(0xffffffffffffffff, &(0x7f0000001d80)) geteuid() stat(&(0x7f00000023c0)='./file0\x00', &(0x7f0000002400)) lstat(&(0x7f0000002480)='./file1\x00', &(0x7f00000024c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) sendmsg$netlink(r1, &(0x7f00000026c0)={&(0x7f00000000c0)=@kern={0x10, 0x0, 0x0, 0x40108000}, 0xc, &(0x7f00000022c0)=[{&(0x7f0000000580)={0x10, 0x2a, 0x110, 0x70bd28}, 0x10}], 0x1, &(0x7f0000002540)=ANY=[@ANYBLOB="0000000020000000000000000100000001000000", @ANYRES32=r1, @ANYRES32=r1, @ANYRES32=r1, @ANYRES32=r1, @ANYBLOB="0000000020000000000000000100000001000000", @ANYRES32=r1, @ANYBLOB="0000000020000000000000000100000002000000", @ANYRES32=r2, @ANYBLOB="0000000030000000000000000100000001000000", @ANYRES32=r1, @ANYRES32=r1, @ANYRES32=r1, @ANYRES32=r1, @ANYRES32=r1, @ANYBLOB='\x00\x00\x00\x00'], 0x80, 0x10}, 0x4000) syncfs(r1) setsockopt$inet_sctp6_SCTP_EVENTS(r1, 0x84, 0xb, &(0x7f0000000040)={0x0, 0x0, 0xfa, 0x0, 0x0, 0x7, 0x7, 0x8001, 0x3f, 0x94fc, 0x1bcb}, 0xb) mount(&(0x7f0000000340)='./file1\x00', &(0x7f0000015ff8)='./file0\x00', &(0x7f000001fffa)='bdev\x00', 0x0, &(0x7f000001f000)) 2018/03/30 19:42:48 executing program 5: unshare(0x40000000) perf_event_open(&(0x7f000001d000)={0x2, 0x78, 0xe2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000000)={0x6, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl(0xffffffffffffffff, 0x8982, &(0x7f0000000000)) r0 = socket$packet(0x11, 0x0, 0x300) r1 = openat$cuse(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/cuse\x00', 0x82, 0x0) io_setup(0x43f, &(0x7f00000000c0)=0x0) io_submit(r2, 0x1, &(0x7f0000000000)=[&(0x7f0000000200)={0x0, 0x0, 0x0, 0x1, 0x0, r1, &(0x7f0000000040)="10000000020400000000000000000000", 0x10}]) r3 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000280)='/proc/sys/net/ipv4/vs/secure_tcp\x00', 0x2, 0x0) sendmsg$kcm(r3, &(0x7f0000001f00)={&(0x7f0000001b40)=@pppol2tpin6={0x18, 0x1, {0x0, r0, 0x0, 0x1, 0x0, 0x0, {0xa, 0x4e24, 0xc1, @mcast1={0xff, 0x1, [], 0x1}}}}, 0x80, &(0x7f0000001d80)=[{&(0x7f0000001bc0)="a9db123ebf124fab0f2eec9774559e3b5870fb7c6818fc89c4b8742d057480657265ae2b34fb2d4e585d22ca1bf7b0a22ce38a20a819d919947c78f8d5c9f3291905fd3ed2b8ef8a79d9453396c6b0b7eb0778dbc49b32ae91e443b64edddcf320c1589c7777eadd4e57c01b20a8ca7a831e8e2c104d0194d52fb5c35b550f", 0x7f}], 0x1, &(0x7f0000001dc0)=ANY=[], 0x0, 0x90}, 0x20000000) r4 = syz_open_dev$tun(&(0x7f00000001c0)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r4, 0x400454ca, &(0x7f0000000200)={'bridge0\x00\x00p\x00', 0x4000000000001005}) socketpair(0x1d, 0x3, 0x40, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_inet_SIOCSIFADDR(r5, 0x8916, &(0x7f0000000100)={'bridge8\x00', {0x2, 0x0, @dev={0xac, 0x14, 0x14}}}) ioctl$LOOP_SET_FD(r1, 0x4c00, r0) ioctl$SNDRV_SEQ_IOCTL_RUNNING_MODE(0xffffffffffffffff, 0xc0105303, &(0x7f00000002c0)={0x2, 0x8}) add_key$keyring(&(0x7f00000000c0)='keyring\x00', &(0x7f0000000100)={0x73, 0x79, 0x7a}, 0x0, 0x0, 0x0) clone(0x0, &(0x7f0000000040), &(0x7f0000000080), &(0x7f0000000000), &(0x7f0000000100)) ioctl$int_in(0xffffffffffffffff, 0x800000c004500a, &(0x7f0000006ff8)) wait4(0x0, 0x0, 0x4, &(0x7f0000000380)) ioctl$sock_inet_sctp_SIOCINQ(r6, 0x541b, &(0x7f0000000180)) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_PORT(0xffffffffffffffff, 0xc0a85352, &(0x7f0000001980)={{}, 'port1\x00', 0x0, 0x20010, 0x1f, 0x0, 0x3, 0x40, 0x0, 0x0, 0x4, 0x6d1}) [ 487.520101] FAT-fs (loop4): Unrecognized mount option "time_offset=" or missing value [ 487.558586] kernel msg: ebtables bug: please report to author: EBT_ENTRY_OR_ENTRIES shouldn't be set in distinguisher 2018/03/30 19:42:48 executing program 3: r0 = syz_open_dev$loop(&(0x7f0000ca9ff5)='/dev/loop#\x00', 0x0, 0x200000000000a2) r1 = memfd_create(&(0x7f0000614000)="74086e750000000000000000008c00", 0x0) bind$ax25(r1, &(0x7f00000005c0)={0x3, {"021fc1455fde3b"}, 0x8}, 0x10) pwritev(r1, &(0x7f0000f50f90)=[{&(0x7f0000000040)="aa", 0x1}], 0x1, 0x81006) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) sendfile(r0, r0, &(0x7f0000000080), 0x102000004) write(r0, &(0x7f0000000300), 0x0) openat$cgroup(0xffffffffffffff9c, &(0x7f0000000000)='syz0\x00', 0x200002, 0x0) r2 = getpgid(0xffffffffffffffff) r3 = syz_open_procfs(r2, &(0x7f0000000380)='io\x00') ioctl$KDSETMODE(r3, 0x4b3a, 0xb12) setsockopt$netlink_NETLINK_ADD_MEMBERSHIP(r1, 0x10e, 0x1, &(0x7f0000000180)=0x11, 0x4) getsockopt$inet_sctp_SCTP_STATUS(r3, 0x84, 0xe, &(0x7f0000001e00)={0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, {0x0, @in6={{0xa, 0x4e22, 0x0, @dev={0xfe, 0x80, [], 0xc}, 0xfffffffffffffff9}}, 0x8, 0x0, 0x0, 0x0, 0x6}}, &(0x7f0000001ec0)=0xb0) getsockopt$inet_sctp6_SCTP_DELAYED_SACK(0xffffffffffffffff, 0x84, 0x10, &(0x7f0000001f00)=@sack_info={0x0, 0x6, 0x10000000000}, &(0x7f0000001f40)=0xc) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r3, 0x84, 0x1d, &(0x7f0000000780)=ANY=[@ANYBLOB="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"], &(0x7f0000004cc0)=0x1) getsockopt$inet_sctp6_SCTP_PR_ASSOC_STATUS(0xffffffffffffff9c, 0x84, 0x73, &(0x7f0000004d00)={0x0, 0x1, 0x0, 0x1}, &(0x7f0000004d40)=0x18) getsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER(r3, 0x84, 0x7b, &(0x7f0000000540)={r4}, &(0x7f0000000580)=0x8) getsockopt$inet_sctp_SCTP_ASSOCINFO(r3, 0x84, 0x1, &(0x7f0000004d80)={0x0, 0x1, 0x8, 0xfff, 0x2, 0x9}, &(0x7f0000004dc0)=0x14) getsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER_VALUE(r3, 0x84, 0x7c, &(0x7f0000005180)={0x0, 0x3, 0x800}, &(0x7f00000001c0)=0x8) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDR_INFO(r3, 0x84, 0xf, &(0x7f0000005200)={0x0, @in6={{0xa, 0x4e24, 0x8, @mcast2={0xff, 0x2, [], 0x1}}}, 0x0, 0x2ca3, 0x1000, 0xffffffff}, &(0x7f00000052c0)=0x98) sendmmsg$inet_sctp(r3, &(0x7f0000005380)=[{&(0x7f00000003c0)=@in={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0xa}}, 0x10, &(0x7f0000000740)=[{&(0x7f0000000400)="28141cb893544237e52d45298a9b92daff19cbccae5065f0d48af3e3a211b7b4cbbe4c7eb776c8f83d552d63c8c72dde25300d1a0410f4be4c5384ecd79974c3f89bd9e1e79a37db61dcfce7a0982597fdc4d4cc84feec1378a82d34ac5b46460b5c604a7dc8367eee171a279be82a845df66a200b1c4e9aed1824db1d5ed1bf73274ddaee56be96c527038485f29b32b99ebe3ffcc674dd19681c5465d2eb0c98fb319addd1de718ee3cef5f889bb1e8040e69714b64e7228f6089ba880d07fb94864b8d2ddf870654b5a1dda679b5ede15d96476b2973118d36a67aa1912ac", 0xe0}], 0x1, &(0x7f0000000940)}], 0x1, 0x8800) getgroups(0x0, &(0x7f00000002c0)) r5 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r5, &(0x7f0000b9bff0)={0x2, 0x4e21, @multicast1=0xe0000001}, 0x10) setsockopt$inet_tcp_TCP_MD5SIG(r5, 0x6, 0xe, &(0x7f0000000000)={@in={{0x2, 0x0, @loopback=0x7f000001}}, 0x0, 0x8, 0x0, "7c6466b48e820ef5080e1706c24e1d02d7136e029bfe6fdeeed6db357e9818f0373f71c64cfcbfd93e6e525164337a97345146790fd3f0b4bd8455577279239c61e2fe16a59f804b41c845ac9d947213"}, 0xd8) sendto$inet(r5, &(0x7f0000fa0fff), 0xffffffffffffffbb, 0x20020003, &(0x7f0000385ff0)={0x2, 0x4e21, @loopback=0x7f000001}, 0x10) ioctl$SNDRV_SEQ_IOCTL_SET_CLIENT_POOL(0xffffffffffffffff, 0x4058534c, &(0x7f0000000240)) openat$rfkill(0xffffffffffffff9c, &(0x7f0000000100)='/dev/rfkill\x00', 0x200, 0x0) getsockopt$inet_sctp_SCTP_RTOINFO(0xffffffffffffffff, 0x84, 0x0, &(0x7f0000000140)={0x0, 0x7f, 0x7, 0x9}, &(0x7f0000000180)=0x10) 2018/03/30 19:42:48 executing program 6: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_mreqn(r0, 0x0, 0x27, &(0x7f0000000000)={@multicast2=0xe0000002, @loopback=0x7f000001}, 0xc) getsockopt$inet_sctp6_SCTP_FRAGMENT_INTERLEAVE(0xffffffffffffffff, 0x84, 0x12, &(0x7f0000000080), &(0x7f00000000c0)=0x4) ioctl$sock_inet_SIOCGIFDSTADDR(0xffffffffffffffff, 0x8917, &(0x7f0000000040)={'bcsh0\x00', {0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x1a}}}) setsockopt$inet_sctp6_SCTP_MAX_BURST(0xffffffffffffffff, 0x84, 0x14, &(0x7f0000000380)=@int=0x3, 0x4) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000140)={'bcsh0\x00', 0x0}) ioctl$sock_inet6_SIOCDELRT(0xffffffffffffffff, 0x890c, &(0x7f0000000180)={@dev={0xfe, 0x80, [], 0x13}, @loopback={0x0, 0x1}, @mcast2={0xff, 0x2, [], 0x1}, 0x6, 0x0, 0x42e, 0x100, 0x9, 0x80000000, r1}) r2 = socket$inet(0x2, 0xa, 0x5) setsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX(r2, 0x84, 0x6e, &(0x7f0000000600)=[@in={0x2, 0x4e21, @multicast1=0xe0000001}, @in6={0xa, 0x4e20, 0x0, @remote={0xfe, 0x80, [], 0xbb}}, @in={0x2, 0x4e22, @multicast2=0xe0000002}, @in6={0xa, 0x4e21, 0x1ff, @local={0xfe, 0x80, [], 0xaa}, 0x84}, @in6={0xa, 0x4e20, 0x4, @local={0xfe, 0x80, [], 0xaa}}], 0x74) getsockopt$inet_sctp6_SCTP_PR_SUPPORTED(0xffffffffffffffff, 0x84, 0x71, &(0x7f0000000200)={0x0, 0x8}, &(0x7f0000000240)=0x8) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(0xffffffffffffffff, 0x84, 0x6f, &(0x7f0000000300)={r3, 0x60, &(0x7f0000000280)=[@in={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x12}}, @in={0x2, 0x4e24, @loopback=0x7f000001}, @in={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x1a}}, @in={0x2, 0x4e24, @remote={0xac, 0x14, 0x14, 0xbb}}, @in={0x2, 0x4e24, @rand_addr=0x3ff}, @in={0x2, 0x4e24, @multicast2=0xe0000002}]}, &(0x7f0000000340)=0x10) setsockopt$inet_sctp6_SCTP_SET_PEER_PRIMARY_ADDR(0xffffffffffffffff, 0x84, 0x5, &(0x7f00000004c0)={r4, @in={{0x2, 0x4e20, @rand_addr=0x8}}}, 0x84) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, &(0x7f00000003c0)={'lo\x00', 0x4100}) ioctl$sock_inet_SIOCGIFNETMASK(0xffffffffffffffff, 0x891b, &(0x7f0000000100)={'nr0\x00', {0x2, 0x4e24, @loopback=0x7f000001}}) setsockopt$inet_msfilter(r0, 0x0, 0x29, &(0x7f0000000680)=ANY=[@ANYBLOB="cf0000000276d172390cc8c4ff4f3b746e5947c2ddb66a93ebb6d0f75b5f453435c311b94e126c49d47c10682b6e523d09fae1d416ebface98e08aa083e9f1f1afa118eb05655fec48d75d7a37edd032552c60ffeb53a2c8eecbe601a4ac5dceeecf1a943c2d9e2eaf4ad0a93e82a1a37a0cf2adbc4b512680428fee922ad18ff90ec6f87a75b299a953167bf4f9ae31cffd2c31dd47ba7d69151424dc1b2835f7624a302f270eb89118043dc1e1faa46e667be9cbf4456ad0c580ed032e4e49459f68f8a70f2dfe40f51362ffae"], 0x1) pread64(r0, &(0x7f0000000340)=""/181, 0xb5, 0x62) setsockopt$inet_msfilter(r0, 0x0, 0x29, &(0x7f0000000580)=ANY=[@ANYBLOB="e00000027f0000010000000001000000000000006b59aa51deb20d6efc9c04b7c9420f6434d31cbbe99b52873a8c21"], 0x1) socket$inet_udp(0x2, 0x2, 0x0) bpf$BPF_PROG_GET_NEXT_ID(0xb, &(0x7f0000000400)=0x7, 0x4) r5 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000ba4000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x2, 0x78, 0xe2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, r5, 0x0) r6 = perf_event_open(&(0x7f0000014f88)={0x1, 0x78, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00002e8000)}}, 0x0, 0x0, r5, 0x0) readv(r6, &(0x7f0000734000)=[{&(0x7f0000d42000)=""/146, 0x92}], 0x1) getsockopt$inet_sctp_SCTP_PEER_ADDR_THLDS(0xffffffffffffffff, 0x84, 0x1f, &(0x7f0000000480)={0x0, @in={{0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0xd}}}, 0xf80866d, 0x5}, &(0x7f0000000540)=0x90) getsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(0xffffffffffffff9c, 0x84, 0x18, &(0x7f0000000440)={r7, 0x400000000004}, &(0x7f00000005c0)=0xffffffffffffffc3) getsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER_VALUE(r0, 0x84, 0x7c, &(0x7f00000002c0)={r8, 0x10001, 0xc9e9}, &(0x7f0000000300)=0x8) [ 487.569528] device lo left promiscuous mode [ 487.581940] device lo entered promiscuous mode [ 487.610091] EXT4-fs (loop4): VFS: Can't find ext4 filesystem 2018/03/30 19:42:48 executing program 6: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_mreqn(r0, 0x0, 0x27, &(0x7f0000000000)={@multicast2=0xe0000002, @loopback=0x7f000001}, 0xc) getsockopt$inet_sctp6_SCTP_FRAGMENT_INTERLEAVE(0xffffffffffffffff, 0x84, 0x12, &(0x7f0000000080), &(0x7f00000000c0)=0x4) ioctl$sock_inet_SIOCGIFDSTADDR(0xffffffffffffffff, 0x8917, &(0x7f0000000040)={'bcsh0\x00', {0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x1a}}}) setsockopt$inet_sctp6_SCTP_MAX_BURST(0xffffffffffffffff, 0x84, 0x14, &(0x7f0000000380)=@int=0x3, 0x4) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000140)={'bcsh0\x00', 0x0}) ioctl$sock_inet6_SIOCDELRT(0xffffffffffffffff, 0x890c, &(0x7f0000000180)={@dev={0xfe, 0x80, [], 0x13}, @loopback={0x0, 0x1}, @mcast2={0xff, 0x2, [], 0x1}, 0x6, 0x0, 0x42e, 0x100, 0x9, 0x80000000, r1}) r2 = socket$inet(0x2, 0xa, 0x5) setsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX(r2, 0x84, 0x6e, &(0x7f0000000600)=[@in={0x2, 0x4e21, @multicast1=0xe0000001}, @in6={0xa, 0x4e20, 0x0, @remote={0xfe, 0x80, [], 0xbb}}, @in={0x2, 0x4e22, @multicast2=0xe0000002}, @in6={0xa, 0x4e21, 0x1ff, @local={0xfe, 0x80, [], 0xaa}, 0x84}, @in6={0xa, 0x4e20, 0x4, @local={0xfe, 0x80, [], 0xaa}}], 0x74) getsockopt$inet_sctp6_SCTP_PR_SUPPORTED(0xffffffffffffffff, 0x84, 0x71, &(0x7f0000000200)={0x0, 0x8}, &(0x7f0000000240)=0x8) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(0xffffffffffffffff, 0x84, 0x6f, &(0x7f0000000300)={r3, 0x60, &(0x7f0000000280)=[@in={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x12}}, @in={0x2, 0x4e24, @loopback=0x7f000001}, @in={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x1a}}, @in={0x2, 0x4e24, @remote={0xac, 0x14, 0x14, 0xbb}}, @in={0x2, 0x4e24, @rand_addr=0x3ff}, @in={0x2, 0x4e24, @multicast2=0xe0000002}]}, &(0x7f0000000340)=0x10) setsockopt$inet_sctp6_SCTP_SET_PEER_PRIMARY_ADDR(0xffffffffffffffff, 0x84, 0x5, &(0x7f00000004c0)={r4, @in={{0x2, 0x4e20, @rand_addr=0x8}}}, 0x84) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, &(0x7f00000003c0)={'lo\x00', 0x4100}) ioctl$sock_inet_SIOCGIFNETMASK(0xffffffffffffffff, 0x891b, &(0x7f0000000100)={'nr0\x00', {0x2, 0x4e24, @loopback=0x7f000001}}) setsockopt$inet_msfilter(r0, 0x0, 0x29, &(0x7f0000000680)=ANY=[@ANYBLOB="cf0000000276d172390cc8c4ff4f3b746e5947c2ddb66a93ebb6d0f75b5f453435c311b94e126c49d47c10682b6e523d09fae1d416ebface98e08aa083e9f1f1afa118eb05655fec48d75d7a37edd032552c60ffeb53a2c8eecbe601a4ac5dceeecf1a943c2d9e2eaf4ad0a93e82a1a37a0cf2adbc4b512680428fee922ad18ff90ec6f87a75b299a953167bf4f9ae31cffd2c31dd47ba7d69151424dc1b2835f7624a302f270eb89118043dc1e1faa46e667be9cbf4456ad0c580ed032e4e49459f68f8a70f2dfe40f51362ffae"], 0x1) pread64(r0, &(0x7f0000000340)=""/181, 0xb5, 0x62) setsockopt$inet_msfilter(r0, 0x0, 0x29, &(0x7f0000000580)=ANY=[@ANYBLOB="e00000027f0000010000000001000000000000006b59aa51deb20d6efc9c04b7c9420f6434d31cbbe99b52873a8c21"], 0x1) socket$inet_udp(0x2, 0x2, 0x0) bpf$BPF_PROG_GET_NEXT_ID(0xb, &(0x7f0000000400)=0x7, 0x4) r5 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000ba4000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x2, 0x78, 0xe2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, r5, 0x0) r6 = perf_event_open(&(0x7f0000014f88)={0x1, 0x78, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00002e8000)}}, 0x0, 0x0, r5, 0x0) readv(r6, &(0x7f0000734000)=[{&(0x7f0000d42000)=""/146, 0x92}], 0x1) getsockopt$inet_sctp_SCTP_PEER_ADDR_THLDS(0xffffffffffffffff, 0x84, 0x1f, &(0x7f0000000480)={0x0, @in={{0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0xd}}}, 0xf80866d, 0x5}, &(0x7f0000000540)=0x90) getsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(0xffffffffffffff9c, 0x84, 0x18, &(0x7f0000000440)={r7, 0x400000000004}, &(0x7f00000005c0)=0xffffffffffffffc3) getsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER_VALUE(r0, 0x84, 0x7c, &(0x7f00000002c0)={r8, 0x10001, 0xc9e9}, &(0x7f0000000300)=0x8) [ 487.643419] BFS-fs: bfs_fill_super(): No BFS filesystem on loop4 (magic=00000000) [ 487.688317] jfs: Unrecognized mount option "umask=?" or missing value 2018/03/30 19:42:48 executing program 4: symlinkat(&(0x7f0000002f00)='./file0\x00', 0xffffffffffffffff, &(0x7f0000002f80)='./file0\x00') syz_mount_image$msdos(&(0x7f0000002fc0)='msdos\x00', &(0x7f0000003000)='./file0\x00', 0x4, 0x1, &(0x7f0000003180)=[{&(0x7f0000003040)="eaf9610c9f7031a1f58e51e73b3f0bd5af4364c38bbe335dbd3d211ec0338ba4c795c634af757a3c684da6110f67891133a6303441b21d139e3a6582efdaeabd3d68dbcb85cd383733a98084b62807af0b7ea49d68daa4cc9fda43dbeb13c3e67c44c463a2c429ccb66c0e1a9dfd5c911d4d7b578baaad6571d4457b9c6d92122a4bd97f5f174c81081941b007062f2cab2db1466851dde671e025909a633fec433bb2512fc61c436b74df23d280019a403884dc488071", 0xb7, 0xcd7}], 0x8, &(0x7f00000031c0)={[{@errors_continue='errors=continue', 0x2c}, {@time_offset={'time_offset', 0x3d, [0x0]}, 0x2c}]}) pipe(&(0x7f0000002f40)={0xffffffffffffffff}) r1 = open(&(0x7f0000003240)='./file0\x00', 0xa0001, 0x20) linkat(r0, &(0x7f0000003200)='./file0\x00', r1, &(0x7f0000003280)='./file0\x00', 0x400) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x80000, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)}, {&(0x7f0000010d00)="0000000000000000000000000000000000000000000000000000000002ae0000ed41000000040000d15bbe5ad15bbe5ad15bbe5a00000000000005002000000000000800070000000af301000400000000000000000000000100000030000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a1950000", 0xa0, 0x8c60}, {&(0x7f0000011a00)="020000000c0001022e000000020000000c0002022e2e00000b00000014000a026c6f73742b666f756e6400000c0000001000050166696c65300000000d0000001000050266696c65310000000f0000001000050166696c6532000000100000001000050166696c6533000000110000001000050166696c65340000001200000010000802564944454f5f54531400000068031201d181d18ed0b7d0bad0b0d0bbd0bbd0b5d1800000000000000000000000000000000000000000000000000000", 0xc0, 0xc000}, {&(0x7f0000012200)="0000000000000000000000000000000000000000000000000c0000dec910dfd800000000f4030000000000000000000000000000000000000000000000000000", 0x40, 0x117e0}, {&(0x7f0000012a00)="0d0000000c0001022e000000020000000c0002022e2e00000e000000dc03050166696c6530000000000000000000000000000000000000000000000000000000", 0x40, 0x1c000}], 0x0, &(0x7f0000013000)) syz_mount_image$bfs(&(0x7f0000000040)='bfs\x00', &(0x7f00000008c0)='./file0\x00', 0x20, 0x2, &(0x7f0000000180)=[{&(0x7f00000005c0)="f37e57346e86cb5adec662d7bd6f13a3764d2ca7640f9f81ba88d0689d0989735a7bafd5558d9a6e8988f9f6038fa475e49077bc8cfc6e170c4cdbaaa1375895c9a4068559d3cecf2a0423caa696bf77a75b3ae3f32b79da059ca13d055647998987fc2033d008bd55deb08808372b9b4595fb0d79a1358cd5949d859a7d155e86db4b608eb401109f6b792f5ce4a2ead9870dee49347bc08d0d54b0e4fca4fd895947a737f4ee823d997770e5c9df50c0c9fe2c0b945c6ffd13b7151e385b631520ac34a5967c6cd0d12b3746795681600541c17d379daed41ce8e715eba582fb668e160872a2", 0xe7, 0x7}, {&(0x7f0000000780)="6154d093a5a905da96fed5f8dea36bcd9d1d011246f7caf86806bf6ac6301d2d2b448461b867bbbe7d0eebdeafa16d7219af85ff4372670039ce277546def59f1d0eed4be4386a34c7243fe3ec84ad3807136a2c3ec35d6d87a7d7bb9342622cc3a7ff529ef3d76ff57fc7a1856f50b98e518515a9e679067cfc0e8500754fa30a81cf4dc42c5a0d36647280c5b0a8506efaf9ad06594678176efe4bdbcf7ab384b597df4c5ad66b2bd240823abe04cd30785819f1c7fd4d46bb55f8bd09ca4b44618b010e363fa572ca189ec73b36ad46b6f38d65c0acc417", 0xd9, 0x5}], 0x200000, 0x0) syz_mount_image$jfs(&(0x7f0000000080)='jfs\x00', &(0x7f0000000880)='./file0\x00', 0xfffffffffffffffe, 0x3, &(0x7f0000002dc0)=[{&(0x7f0000000900)="efee47debce411554253d03f2175c060de26b9a7a197d9327971105aafdf17a061227fe7dd52d3c1c1f0318992f304f7646c3eb4e32ff0514d34d4605b4e152474aa71ac6c0ba890b1f249f213d5bc162b605fdf3c524d6f84e1a2f8461d26ef5dd50b193ffb710ee69fc431552ae4548f0c1a7e503243bb10c53c566f37e3234d8b3d418992dca946568d275e1f54895a854bab3790963108fe6ce5b1f933e81bd0aa2dfd715aca4bd81b48b28e3ee265", 0xb1, 0x1}, {&(0x7f0000001a80)="b4bc90ad72742e5693f04c7955b05460b33cd0ca9cde365dbe1671162a8c1db744cb8a04d1d747ab4d3234fd615e6ad897396c21b8bf7da2c1d524d04fadade841e5acfac529250a2c75fed4b65a7b6c8735268244189e020c526112728097958fd591d00cd16d1591db9b0414d985d7718794369eb03d89403b7df76f6d745c94d4fa986321a9915fea55a73472bc39620fcf22ec74d02b77fafe6ccf72605eb0ba7ae69fa10a36d281e65a178528bc654ce5b6109d5294e400b18be755a3b899489b27a876ac3ea033ed525b28c7dff537b5210cbff466dc339e1f58db1679816589e886264ef1bcf6d0e1408d93946827711972", 0xf5, 0x7}, {&(0x7f0000002cc0)="c9bc1928c9ffffe99fdae39f5013810a038f1d558affc92341c81ee308195dabd95fcfedcfccd4cf2af62477e5ed935114b73940dba239c47d5824a3332fb48cea682934a6840ea5db2529c3a7c371bbf08f08bb15458de586609be64b699f29b7384dc7b2ba78f0e343fb9851eaf5a7b4106fc5b7a8aaf6e069012286fa7259807928cbee722222f45e6c98cefa00829bcdd92bd03273c7b0f20453c72150adf49c311248d3d3d96ad17187d60add3d1d8fbfbc5e572ceba134e5c533a5f75630a35514ee998b85a755085c04513dcc0047461d78f4aa8fdf0309fc", 0xdc, 0x4}], 0x10000, &(0x7f0000002ec0)={[{@nodiscard='nodiscard', 0x2c}, {@resize='resize', 0x2c}, {@noquota='noquota', 0x2c}, {@umask={'umask', 0x3d, [0x3f]}, 0x2c}]}) 2018/03/30 19:42:48 executing program 6: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_mreqn(r0, 0x0, 0x27, &(0x7f0000000000)={@multicast2=0xe0000002, @loopback=0x7f000001}, 0xc) getsockopt$inet_sctp6_SCTP_FRAGMENT_INTERLEAVE(0xffffffffffffffff, 0x84, 0x12, &(0x7f0000000080), &(0x7f00000000c0)=0x4) ioctl$sock_inet_SIOCGIFDSTADDR(0xffffffffffffffff, 0x8917, &(0x7f0000000040)={'bcsh0\x00', {0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x1a}}}) setsockopt$inet_sctp6_SCTP_MAX_BURST(0xffffffffffffffff, 0x84, 0x14, &(0x7f0000000380)=@int=0x3, 0x4) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000140)={'bcsh0\x00', 0x0}) ioctl$sock_inet6_SIOCDELRT(0xffffffffffffffff, 0x890c, &(0x7f0000000180)={@dev={0xfe, 0x80, [], 0x13}, @loopback={0x0, 0x1}, @mcast2={0xff, 0x2, [], 0x1}, 0x6, 0x0, 0x42e, 0x100, 0x9, 0x80000000, r1}) r2 = socket$inet(0x2, 0xa, 0x5) setsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX(r2, 0x84, 0x6e, &(0x7f0000000600)=[@in={0x2, 0x4e21, @multicast1=0xe0000001}, @in6={0xa, 0x4e20, 0x0, @remote={0xfe, 0x80, [], 0xbb}}, @in={0x2, 0x4e22, @multicast2=0xe0000002}, @in6={0xa, 0x4e21, 0x1ff, @local={0xfe, 0x80, [], 0xaa}, 0x84}, @in6={0xa, 0x4e20, 0x4, @local={0xfe, 0x80, [], 0xaa}}], 0x74) getsockopt$inet_sctp6_SCTP_PR_SUPPORTED(0xffffffffffffffff, 0x84, 0x71, &(0x7f0000000200)={0x0, 0x8}, &(0x7f0000000240)=0x8) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(0xffffffffffffffff, 0x84, 0x6f, &(0x7f0000000300)={r3, 0x70, &(0x7f0000000280)=[@in={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x12}}, @in={0x2, 0x4e24, @loopback=0x7f000001}, @in={0x2, 0x0, @remote={0xac, 0x14, 0x14, 0xbb}}, @in={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x1a}}, @in={0x2, 0x4e24, @remote={0xac, 0x14, 0x14, 0xbb}}, @in={0x2, 0x4e24, @rand_addr=0x3ff}, @in={0x2, 0x4e24, @multicast2=0xe0000002}]}, &(0x7f0000000340)=0x10) setsockopt$inet_sctp6_SCTP_SET_PEER_PRIMARY_ADDR(0xffffffffffffffff, 0x84, 0x5, &(0x7f00000004c0)={r4, @in={{0x2, 0x4e20, @rand_addr=0x8}}}, 0x84) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, &(0x7f00000003c0)={'lo\x00', 0x4100}) ioctl$sock_inet_SIOCGIFNETMASK(0xffffffffffffffff, 0x891b, &(0x7f0000000100)={'nr0\x00', {0x2, 0x4e24, @loopback=0x7f000001}}) setsockopt$inet_msfilter(r0, 0x0, 0x29, &(0x7f0000000680)=ANY=[@ANYBLOB="cf0000000276d172390cc8c4ff4f3b746e5947c2ddb66a93ebb6d0f75b5f453435c311b94e126c49d47c10682b6e523d09fae1d416ebface98e08aa083e9f1f1afa118eb05655fec48d75d7a37edd032552c60ffeb53a2c8eecbe601a4ac5dceeecf1a943c2d9e2eaf4ad0a93e82a1a37a0cf2adbc4b512680428fee922ad18ff90ec6f87a75b299a953167bf4f9ae31cffd2c31dd47ba7d69151424dc1b2835f7624a302f270eb89118043dc1e1faa46e667be9cbf4456ad0c580ed032e4e49459f68f8a70f2dfe40f51362ffae"], 0x1) pread64(r0, &(0x7f0000000340)=""/181, 0xb5, 0x62) setsockopt$inet_msfilter(r0, 0x0, 0x29, &(0x7f0000000580)=ANY=[@ANYBLOB="e00000027f0000010000000001000000000000006b59aa51deb20d6efc9c04b7c9420f6434d31cbbe99b52873a8c21"], 0x1) socket$inet_udp(0x2, 0x2, 0x0) bpf$BPF_PROG_GET_NEXT_ID(0xb, &(0x7f0000000400)=0x7, 0x4) r5 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000ba4000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x2, 0x78, 0xe2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, r5, 0x0) r6 = perf_event_open(&(0x7f0000014f88)={0x1, 0x78, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00002e8000)}}, 0x0, 0x0, r5, 0x0) readv(r6, &(0x7f0000734000)=[{&(0x7f0000d42000)=""/146, 0x92}], 0x1) getsockopt$inet_sctp_SCTP_PEER_ADDR_THLDS(0xffffffffffffffff, 0x84, 0x1f, &(0x7f0000000480)={0x0, @in={{0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0xd}}}, 0xf80866d, 0x5}, &(0x7f0000000540)=0x90) getsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(0xffffffffffffff9c, 0x84, 0x18, &(0x7f0000000440)={r7, 0x400000000004}, &(0x7f00000005c0)=0xffffffffffffffc3) getsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER_VALUE(r0, 0x84, 0x7c, &(0x7f00000002c0)={r8, 0x10001, 0xc9e9}, &(0x7f0000000300)=0x8) 2018/03/30 19:42:48 executing program 6: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_mreqn(r0, 0x0, 0x27, &(0x7f0000000000)={@multicast2=0xe0000002, @loopback=0x7f000001}, 0xc) getsockopt$inet_sctp6_SCTP_FRAGMENT_INTERLEAVE(0xffffffffffffffff, 0x84, 0x12, &(0x7f0000000080), &(0x7f00000000c0)=0x4) ioctl$sock_inet_SIOCGIFDSTADDR(0xffffffffffffffff, 0x8917, &(0x7f0000000040)={'bcsh0\x00', {0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x1a}}}) setsockopt$inet_sctp6_SCTP_MAX_BURST(0xffffffffffffffff, 0x84, 0x14, &(0x7f0000000380)=@int=0x3, 0x4) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000140)={'bcsh0\x00', 0x0}) ioctl$sock_inet6_SIOCDELRT(0xffffffffffffffff, 0x890c, &(0x7f0000000180)={@dev={0xfe, 0x80, [], 0x13}, @loopback={0x0, 0x1}, @mcast2={0xff, 0x2, [], 0x1}, 0x6, 0x0, 0x42e, 0x100, 0x9, 0x80000000, r1}) r2 = socket$inet(0x2, 0xa, 0x5) setsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX(r2, 0x84, 0x6e, &(0x7f0000000600)=[@in={0x2, 0x4e21, @multicast1=0xe0000001}, @in6={0xa, 0x4e20, 0x0, @remote={0xfe, 0x80, [], 0xbb}}, @in={0x2, 0x4e22, @multicast2=0xe0000002}, @in6={0xa, 0x4e21, 0x1ff, @local={0xfe, 0x80, [], 0xaa}, 0x84}, @in6={0xa, 0x4e20, 0x4, @local={0xfe, 0x80, [], 0xaa}}], 0x74) getsockopt$inet_sctp6_SCTP_PR_SUPPORTED(0xffffffffffffffff, 0x84, 0x71, &(0x7f0000000200)={0x0, 0x8}, &(0x7f0000000240)=0x8) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(0xffffffffffffffff, 0x84, 0x6f, &(0x7f0000000300)={r3, 0x60, &(0x7f0000000280)=[@in={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x12}}, @in={0x2, 0x4e24, @loopback=0x7f000001}, @in={0x2, 0x0, @remote={0xac, 0x14, 0x14, 0xbb}}, @in={0x2, 0x4e24, @remote={0xac, 0x14, 0x14, 0xbb}}, @in={0x2, 0x4e24, @rand_addr=0x3ff}, @in={0x2, 0x4e24, @multicast2=0xe0000002}]}, &(0x7f0000000340)=0x10) setsockopt$inet_sctp6_SCTP_SET_PEER_PRIMARY_ADDR(0xffffffffffffffff, 0x84, 0x5, &(0x7f00000004c0)={r4, @in={{0x2, 0x4e20, @rand_addr=0x8}}}, 0x84) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, &(0x7f00000003c0)={'lo\x00', 0x4100}) ioctl$sock_inet_SIOCGIFNETMASK(0xffffffffffffffff, 0x891b, &(0x7f0000000100)={'nr0\x00', {0x2, 0x4e24, @loopback=0x7f000001}}) setsockopt$inet_msfilter(r0, 0x0, 0x29, &(0x7f0000000680)=ANY=[@ANYBLOB="cf0000000276d172390cc8c4ff4f3b746e5947c2ddb66a93ebb6d0f75b5f453435c311b94e126c49d47c10682b6e523d09fae1d416ebface98e08aa083e9f1f1afa118eb05655fec48d75d7a37edd032552c60ffeb53a2c8eecbe601a4ac5dceeecf1a943c2d9e2eaf4ad0a93e82a1a37a0cf2adbc4b512680428fee922ad18ff90ec6f87a75b299a953167bf4f9ae31cffd2c31dd47ba7d69151424dc1b2835f7624a302f270eb89118043dc1e1faa46e667be9cbf4456ad0c580ed032e4e49459f68f8a70f2dfe40f51362ffae"], 0x1) pread64(r0, &(0x7f0000000340)=""/181, 0xb5, 0x62) setsockopt$inet_msfilter(r0, 0x0, 0x29, &(0x7f0000000580)=ANY=[@ANYBLOB="e00000027f0000010000000001000000000000006b59aa51deb20d6efc9c04b7c9420f6434d31cbbe99b52873a8c21"], 0x1) socket$inet_udp(0x2, 0x2, 0x0) bpf$BPF_PROG_GET_NEXT_ID(0xb, &(0x7f0000000400)=0x7, 0x4) r5 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000ba4000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x2, 0x78, 0xe2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, r5, 0x0) r6 = perf_event_open(&(0x7f0000014f88)={0x1, 0x78, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00002e8000)}}, 0x0, 0x0, r5, 0x0) readv(r6, &(0x7f0000734000)=[{&(0x7f0000d42000)=""/146, 0x92}], 0x1) getsockopt$inet_sctp_SCTP_PEER_ADDR_THLDS(0xffffffffffffffff, 0x84, 0x1f, &(0x7f0000000480)={0x0, @in={{0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0xd}}}, 0xf80866d, 0x5}, &(0x7f0000000540)=0x90) getsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(0xffffffffffffff9c, 0x84, 0x18, &(0x7f0000000440)={r7, 0x400000000004}, &(0x7f00000005c0)=0xffffffffffffffc3) getsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER_VALUE(r0, 0x84, 0x7c, &(0x7f00000002c0)={r8, 0x10001, 0xc9e9}, &(0x7f0000000300)=0x8) [ 487.807649] FAT-fs (loop4): Unrecognized mount option "time_offset=" or missing value [ 487.831989] EXT4-fs (loop4): VFS: Can't find ext4 filesystem 2018/03/30 19:42:48 executing program 4: symlinkat(&(0x7f0000002f00)='./file0\x00', 0xffffffffffffffff, &(0x7f0000002f80)='./file0\x00') syz_mount_image$msdos(&(0x7f0000002fc0)='msdos\x00', &(0x7f0000003000)='./file0\x00', 0x4, 0x1, &(0x7f0000003180)=[{&(0x7f0000003040)="eaf9610c9f7031a1f58e51e73b3f0bd5af4364c38bbe335dbd3d211ec0338ba4c795c634af757a3c684da6110f67891133a6303441b21d139e3a6582efdaeabd3d68dbcb85cd383733a98084b62807af0b7ea49d68daa4cc9fda43dbeb13c3e67c44c463a2c429ccb66c0e1a9dfd5c911d4d7b578baaad6571d4457b9c6d92122a4bd97f5f174c81081941b007062f2cab2db1466851dde671e025909a633fec433bb2512fc61c436b74df23d280019a403884dc488071", 0xb7, 0xcd7}], 0x8, &(0x7f00000031c0)={[{@errors_continue='errors=continue', 0x2c}, {@time_offset={'time_offset', 0x3d, [0x0]}, 0x2c}]}) pipe(&(0x7f0000002f40)={0xffffffffffffffff}) r1 = open(&(0x7f0000003240)='./file0\x00', 0xa0001, 0x20) linkat(r0, &(0x7f0000003200)='./file0\x00', r1, &(0x7f0000003280)='./file0\x00', 0x400) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x80000, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)}, {&(0x7f0000010d00)="0000000000000000000000000000000000000000000000000000000002ae0000ed41000000040000d15bbe5ad15bbe5ad15bbe5a00000000000005002000000000000800070000000af301000400000000000000000000000100000030000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a1950000", 0xa0, 0x8c60}, {&(0x7f0000011a00)="020000000c0001022e000000020000000c0002022e2e00000b00000014000a026c6f73742b666f756e6400000c0000001000050166696c65300000000d0000001000050266696c65310000000f0000001000050166696c6532000000100000001000050166696c6533000000110000001000050166696c65340000001200000010000802564944454f5f54531400000068031201d181d18ed0b7d0bad0b0d0bbd0bbd0b5d1800000000000000000000000000000000000000000000000000000", 0xc0, 0xc000}, {&(0x7f0000012200)="0000000000000000000000000000000000000000000000000c0000dec910dfd800000000f4030000000000000000000000000000000000000000000000000000", 0x40, 0x117e0}, {&(0x7f0000012a00)="0d0000000c0001022e000000020000000c0002022e2e00000e000000dc03050166696c6530000000000000000000000000000000000000000000000000000000", 0x40, 0x1c000}], 0x0, &(0x7f0000013000)) syz_mount_image$bfs(&(0x7f0000000040)='bfs\x00', &(0x7f00000008c0)='./file0\x00', 0x20, 0x2, &(0x7f0000000180)=[{&(0x7f00000005c0)="f37e57346e86cb5adec662d7bd6f13a3764d2ca7640f9f81ba88d0689d0989735a7bafd5558d9a6e8988f9f6038fa475e49077bc8cfc6e170c4cdbaaa1375895c9a4068559d3cecf2a0423caa696bf77a75b3ae3f32b79da059ca13d055647998987fc2033d008bd55deb08808372b9b4595fb0d79a1358cd5949d859a7d155e86db4b608eb401109f6b792f5ce4a2ead9870dee49347bc08d0d54b0e4fca4fd895947a737f4ee823d997770e5c9df50c0c9fe2c0b945c6ffd13b7151e385b631520ac34a5967c6cd0d12b3746795681600541c17d379daed41ce8e715eba582fb668e160872a2", 0xe7, 0x7}, {&(0x7f0000000780)="6154d093a5a905da96fed5f8dea36bcd9d1d011246f7caf86806bf6ac6301d2d2b448461b867bbbe7d0eebdeafa16d7219af85ff4372670039ce277546def59f1d0eed4be4386a34c7243fe3ec84ad3807136a2c3ec35d6d87a7d7bb9342622cc3a7ff529ef3d76ff57fc7a1856f50b98e518515a9e679067cfc0e8500754fa30a81cf4dc42c5a0d36647280c5b0a8506efaf9ad06594678176efe4bdbcf7ab384b597df4c5ad66b2bd240823abe04cd30785819f1c7fd4d46bb55f8bd09ca4b44618b010e363fa572ca189ec73b36ad46b6f38d65c0acc417", 0xd9, 0x5}], 0x200000, 0x0) syz_mount_image$jfs(&(0x7f0000000080)='jfs\x00', &(0x7f0000000880)='./file0\x00', 0xfffffffffffffffe, 0x3, &(0x7f0000002dc0)=[{&(0x7f0000000900)="efee47debce411554253d03f2175c060de26b9a7a197d9327971105aafdf17a061227fe7dd52d3c1c1f0318992f304f7646c3eb4e32ff0514d34d4605b4e152474aa71ac6c0ba890b1f249f213d5bc162b605fdf3c524d6f84e1a2f8461d26ef5dd50b193ffb710ee69fc431552ae4548f0c1a7e503243bb10c53c566f37e3234d8b3d418992dca946568d275e1f54895a854bab3790963108fe6ce5b1f933e81bd0aa2dfd715aca4bd81b48b28e3ee265", 0xb1, 0x1}, {&(0x7f0000001a80)="b4bc90ad72742e5693f04c7955b05460b33cd0ca9cde365dbe1671162a8c1db744cb8a04d1d747ab4d3234fd615e6ad897396c21b8bf7da2c1d524d04fadade841e5acfac529250a2c75fed4b65a7b6c8735268244189e020c526112728097958fd591d00cd16d1591db9b0414d985d7718794369eb03d89403b7df76f6d745c94d4fa986321a9915fea55a73472bc39620fcf22ec74d02b77fafe6ccf72605eb0ba7ae69fa10a36d281e65a178528bc654ce5b6109d5294e400b18be755a3b899489b27a876ac3ea033ed525b28c7dff537b5210cbff466dc339e1f58db1679816589e886264ef1bcf6d0e1408d93946827711972", 0xf5, 0x7}, {&(0x7f0000002cc0)="c9bc1928c9ffffe99fdae39f5013810a038f1d558affc92341c81ee308195dabd95fcfedcfccd4cf2af62477e5ed935114b73940dba239c47d5824a3332fb48cea682934a6840ea5db2529c3a7c371bbf08f08bb15458de586609be64b699f29b7384dc7b2ba78f0e343fb9851eaf5a7b4106fc5b7a8aaf6e069012286fa7259807928cbee722222f45e6c98cefa00829bcdd92bd03273c7b0f20453c72150adf49c311248d3d3d96ad17187d60add3d1d8fbfbc5e572ceba134e5c533a5f75630a35514ee998b85a755085c04513dcc0047461d78f4aa8fdf0309fc", 0xdc, 0x4}], 0x10000, &(0x7f0000002ec0)={[{@nodiscard='nodiscard', 0x2c}, {@resize='resize', 0x2c}, {@noquota='noquota', 0x2c}, {@umask={'umask', 0x3d, [0x3f]}, 0x2c}]}) [ 487.862476] jfs: Unrecognized mount option "umask=?" or missing value 2018/03/30 19:42:48 executing program 6: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_mreqn(r0, 0x0, 0x27, &(0x7f0000000000)={@multicast2=0xe0000002, @loopback=0x7f000001}, 0xc) getsockopt$inet_sctp6_SCTP_FRAGMENT_INTERLEAVE(0xffffffffffffffff, 0x84, 0x12, &(0x7f0000000080), &(0x7f00000000c0)=0x4) ioctl$sock_inet_SIOCGIFDSTADDR(0xffffffffffffffff, 0x8917, &(0x7f0000000040)={'bcsh0\x00', {0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x1a}}}) setsockopt$inet_sctp6_SCTP_MAX_BURST(0xffffffffffffffff, 0x84, 0x14, &(0x7f0000000380)=@int=0x3, 0x4) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000140)={'bcsh0\x00', 0x0}) ioctl$sock_inet6_SIOCDELRT(0xffffffffffffffff, 0x890c, &(0x7f0000000180)={@dev={0xfe, 0x80, [], 0x13}, @loopback={0x0, 0x1}, @mcast2={0xff, 0x2, [], 0x1}, 0x6, 0x0, 0x42e, 0x100, 0x9, 0x80000000, r1}) r2 = socket$inet(0x2, 0xa, 0x5) setsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX(r2, 0x84, 0x6e, &(0x7f0000000600)=[@in={0x2, 0x4e21, @multicast1=0xe0000001}, @in6={0xa, 0x4e20, 0x0, @remote={0xfe, 0x80, [], 0xbb}}, @in={0x2, 0x4e22, @multicast2=0xe0000002}, @in6={0xa, 0x4e21, 0x1ff, @local={0xfe, 0x80, [], 0xaa}, 0x84}, @in6={0xa, 0x4e20, 0x4, @local={0xfe, 0x80, [], 0xaa}}], 0x74) getsockopt$inet_sctp6_SCTP_PR_SUPPORTED(0xffffffffffffffff, 0x84, 0x71, &(0x7f0000000200)={0x0, 0x8}, &(0x7f0000000240)=0x8) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(0xffffffffffffffff, 0x84, 0x6f, &(0x7f0000000300)={r3, 0x60, &(0x7f0000000280)=[@in={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x12}}, @in={0x2, 0x4e24, @loopback=0x7f000001}, @in={0x2, 0x0, @remote={0xac, 0x14, 0x14, 0xbb}}, @in={0x2, 0x4e24, @remote={0xac, 0x14, 0x14, 0xbb}}, @in={0x2, 0x4e24, @rand_addr=0x3ff}, @in={0x2, 0x4e24, @multicast2=0xe0000002}]}, &(0x7f0000000340)=0x10) setsockopt$inet_sctp6_SCTP_SET_PEER_PRIMARY_ADDR(0xffffffffffffffff, 0x84, 0x5, &(0x7f00000004c0)={r4, @in={{0x2, 0x4e20, @rand_addr=0x8}}}, 0x84) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, &(0x7f00000003c0)={'lo\x00', 0x4100}) ioctl$sock_inet_SIOCGIFNETMASK(0xffffffffffffffff, 0x891b, &(0x7f0000000100)={'nr0\x00', {0x2, 0x4e24, @loopback=0x7f000001}}) setsockopt$inet_msfilter(r0, 0x0, 0x29, &(0x7f0000000680)=ANY=[@ANYBLOB="cf0000000276d172390cc8c4ff4f3b746e5947c2ddb66a93ebb6d0f75b5f453435c311b94e126c49d47c10682b6e523d09fae1d416ebface98e08aa083e9f1f1afa118eb05655fec48d75d7a37edd032552c60ffeb53a2c8eecbe601a4ac5dceeecf1a943c2d9e2eaf4ad0a93e82a1a37a0cf2adbc4b512680428fee922ad18ff90ec6f87a75b299a953167bf4f9ae31cffd2c31dd47ba7d69151424dc1b2835f7624a302f270eb89118043dc1e1faa46e667be9cbf4456ad0c580ed032e4e49459f68f8a70f2dfe40f51362ffae"], 0x1) pread64(r0, &(0x7f0000000340)=""/181, 0xb5, 0x62) setsockopt$inet_msfilter(r0, 0x0, 0x29, &(0x7f0000000580)=ANY=[@ANYBLOB="e00000027f0000010000000001000000000000006b59aa51deb20d6efc9c04b7c9420f6434d31cbbe99b52873a8c21"], 0x1) socket$inet_udp(0x2, 0x2, 0x0) bpf$BPF_PROG_GET_NEXT_ID(0xb, &(0x7f0000000400)=0x7, 0x4) r5 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000ba4000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x2, 0x78, 0xe2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, r5, 0x0) r6 = perf_event_open(&(0x7f0000014f88)={0x1, 0x78, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00002e8000)}}, 0x0, 0x0, r5, 0x0) readv(r6, &(0x7f0000734000)=[{&(0x7f0000d42000)=""/146, 0x92}], 0x1) getsockopt$inet_sctp_SCTP_PEER_ADDR_THLDS(0xffffffffffffffff, 0x84, 0x1f, &(0x7f0000000480)={0x0, @in={{0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0xd}}}, 0xf80866d, 0x5}, &(0x7f0000000540)=0x90) getsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(0xffffffffffffff9c, 0x84, 0x18, &(0x7f0000000440)={r7, 0x400000000004}, &(0x7f00000005c0)=0xffffffffffffffc3) getsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER_VALUE(r0, 0x84, 0x7c, &(0x7f00000002c0)={r8, 0x10001, 0xc9e9}, &(0x7f0000000300)=0x8) [ 487.949639] FAT-fs (loop4): Unrecognized mount option "time_offset=" or missing value [ 488.013083] EXT4-fs (loop4): VFS: Can't find ext4 filesystem [ 488.281740] IPVS: ftp: loaded support on port[0] = 21 [ 488.481759] device lo left promiscuous mode [ 488.486912] device lo entered promiscuous mode 2018/03/30 19:42:49 executing program 2: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) readv(0xffffffffffffffff, &(0x7f0000001480), 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f00003b9fdc)) readv(r0, &(0x7f0000001980)=[{&(0x7f00000018c0)=""/182, 0xb6}], 0x1) r1 = syz_open_pts(r0, 0x2) setsockopt$inet6_mtu(0xffffffffffffffff, 0x29, 0x17, &(0x7f0000000440)=0x5, 0x4) socket$inet_sctp(0x2, 0x5, 0x84) dup3(r1, r0, 0x0) socket$inet(0x2, 0x0, 0x0) setsockopt$bt_l2cap_L2CAP_OPTIONS(0xffffffffffffffff, 0x6, 0x1, &(0x7f0000000380)={0xefa, 0x800, 0x0, 0x0, 0x9}, 0xc) 2018/03/30 19:42:49 executing program 0: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000f5eff5)='lp\x00', 0x4) sendto$inet(r0, &(0x7f0000fd0000), 0xfffffffffffffec1, 0x20000801, &(0x7f0000deaff0)={0x2, 0x0, @loopback=0x7f000001}, 0x10) shutdown(0xffffffffffffffff, 0x0) 2018/03/30 19:42:49 executing program 7: ioctl$sock_FIOGETOWN(0xffffffffffffff9c, 0x8903, &(0x7f0000000100)=0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000240)='net/mcfilter6\x00') r2 = fanotify_init(0x0, 0x1802) pread64(r1, &(0x7f0000000040)=""/8, 0x8, 0x1fffd) r3 = getpgid(0x0) ioctl$ASHMEM_GET_NAME(0xffffffffffffffff, 0x81007702, &(0x7f0000000500)=""/68) close(r1) seccomp(0x1, 0x0, &(0x7f0000c23fff)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0xffffffff}]}) mkdir(&(0x7f000063543e)='./file0\x00', 0x0) r4 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000001680)='/dev/sequencer\x00', 0x0, 0x0) getsockopt$inet_sctp6_SCTP_GET_LOCAL_ADDRS(0xffffffffffffff9c, 0x84, 0x6d, &(0x7f0000000580)=ANY=[@ANYRES32=0x0, @ANYBLOB="df0000007179f5f99a3171b71d845e1907c4a9bb612c0fe8253cb381877f7a399eeaa0b3d5f54f5b373baf591952ed278f38450112819b74afe4ae48a1d11deaea19919d50a64f1adf9ef6f1fd02008bf815308291ef776072bb952a7b3b46cf0a60515436204fdcd77077909a0e127bc600"], &(0x7f00000017c0)=0x2) r6 = request_key(&(0x7f00000002c0)='pkcs7_test\x00', &(0x7f0000000300)={0x73, 0x79, 0x7a, 0x1}, &(0x7f0000000340)='ramfs\x00', 0xfffffffffffffffe) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_REM(r4, 0x84, 0x65, &(0x7f0000000480)=[@in6={0xa, 0x4e23, 0x4, @local={0xfe, 0x80, [], 0xaa}, 0x7f}, @in6={0xa, 0x4e24, 0x4b35, @mcast2={0xff, 0x2, [], 0x1}, 0x8}, @in6={0xa, 0x4e21, 0x0, @mcast2={0xff, 0x2, [], 0x1}, 0x4}, @in={0x2, 0x0, @local={0xac, 0x14, 0x14, 0xaa}}], 0x64) keyctl$get_security(0x11, r6, &(0x7f0000000380)=""/193, 0xc1) getsockopt$inet_sctp6_SCTP_AUTH_ACTIVE_KEY(0xffffffffffffffff, 0x84, 0x18, &(0x7f0000001800)={r5, 0x9}, &(0x7f0000001840)=0x8) mount(&(0x7f0000018000)='./file0\x00', &(0x7f0000a9eff8)='./file0\x00', &(0x7f00007fcffa)='ramfs\x00', 0x0, &(0x7f000000a000)) chroot(&(0x7f0000000080)='./file0\x00') chroot(&(0x7f0000001640)='./file0\x00') r7 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000600)='./cgroup/syz1\x00', 0x200002, 0x0) fstat(r1, &(0x7f0000001140)) getsockopt$inet_IP_XFRM_POLICY(r4, 0x0, 0x11, &(0x7f0000001280)={{{@in=@broadcast, @in=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast1}, 0x0, @in=@remote}}, &(0x7f0000001380)=0xe8) stat(&(0x7f00000013c0)='./file0\x00', &(0x7f0000001400)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$inet_IP_IPSEC_POLICY(r1, 0x0, 0x10, &(0x7f0000001480)={{{@in6=@remote, @in=@broadcast, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@loopback}, 0x0, @in=@multicast2}}, &(0x7f0000001580)=0xe8) r11 = getgid() getgroups(0x4, &(0x7f0000001600)=[0x0, 0x0, 0x0, 0x0]) sendmsg$netlink(r7, &(0x7f00000016c0)={&(0x7f0000000700)=@proc={0x10, 0x0, 0x25dfdbfc, 0x8a00000}, 0xc, &(0x7f00000011c0)=[{&(0x7f0000000740)={0x10, 0x18, 0xe00, 0x70bd2d, 0x25dfdbfb}, 0x10}, {&(0x7f0000003b80)={0x8c, 0x39, 0x330, 0x70bd29, 0x25dfdbfb, "", [@typed={0xc, 0x3b, @u64=0x6}, @generic="d56d9212f7e1a230e2d9815c834606ae139b97d93d947808a91e64fea1111684face9c49f51b82de900f13b0bbc8ebdab17dcc533522e77c7ce684ffab4c2f39f3590cb4ade66becb4f8feda7bfb9f3591106c4688e048d2eed231ed6ab34d380ad5fb35f6410376fa30791b3dbba8"]}, 0x8c}], 0x2, &(0x7f0000001980)=[@cred={0x20, 0x1, 0x2, r0, r8, r9}, @rights={0x28, 0x1, 0x1, [r7, r1, r4, r1, r2]}, @cred={0x20, 0x1, 0x2, r3, r10, r11}, @rights={0x20, 0x1, 0x1, [r4, r4, r1]}, @cred={0x20, 0x1, 0x2, r0}, @rights={0x18, 0x1, 0x1, [r2, r1]}, @rights={0x38, 0x1, 0x1, [r4, r2, r2, r2, r7, r2, r7, r4, r1]}], 0xf8, 0x20000000}, 0x4000) mount(&(0x7f0000adcff8)='./file0\x00', &(0x7f00009a2ff8)='./file0\x00', &(0x7f0000ab4000)='qnx6\x00', 0x2000002003002, 0x0) pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) pivot_root(&(0x7f00002f9ff8)='./file0\x00', &(0x7f0000576ff8)='./file0\x00') request_key(&(0x7f0000000180)='rxrpc_s\x00', &(0x7f00000001c0)={0x73, 0x79, 0x7a, 0x0}, &(0x7f0000000200)='./cgroup/syz1\x00', 0xfffffffffffffff8) mknodat(r12, &(0x7f0000000280)='./file0\x00', 0x0, 0x5e920037) getresuid(&(0x7f0000001740), &(0x7f0000001780), &(0x7f0000001ac0)) getpgid(0xffffffffffffffff) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000002200)) getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f00000027c0), &(0x7f0000002800)=0xc) 2018/03/30 19:42:49 executing program 3: r0 = socket$inet6_icmp(0xa, 0x2, 0x3a) r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000017c0)='/proc/self/net/pfkey\x00', 0x200, 0x0) fchdir(r1) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000000)={0xffffffffffffffff}) r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000001c0)='./cgroup\x00', 0x200002, 0x0) fchdir(r3) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) rmdir(&(0x7f00000000c0)='./file0\x00') setsockopt$IP_VS_SO_SET_TIMEOUT(0xffffffffffffffff, 0x0, 0x48a, &(0x7f0000000040)={0x0, 0x5}, 0xc) ioctl$TCSBRK(r1, 0x5409, 0x0) r4 = memfd_create(&(0x7f0000001800)='/proc/sys/net/ipv4/vs/sync_qlen_max\x00', 0x0) write$cgroup_pid(0xffffffffffffffff, &(0x7f0000000100)=ANY=[], 0x1023c) r5 = syz_open_procfs(0x0, &(0x7f0000b92000)='smaps\x00') readv(r5, &(0x7f00009a5f80)=[{&(0x7f0000214000)=""/4096, 0x1000}], 0x1) r6 = syz_open_procfs(0x0, &(0x7f0000759000)='clear_refs\x00') fcntl$getownex(r6, 0x10, &(0x7f0000001200)={0x0, 0x0}) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000001380), &(0x7f0000001400)=0xc) ioctl$TIOCGSID(r6, 0x5429, &(0x7f0000001180)) ioctl$sock_FIOGETOWN(r2, 0x8903, &(0x7f0000001780)) fcntl$getown(r4, 0x9) r8 = syz_open_procfs(0x0, &(0x7f0000001340)='oom_score\x00') mmap(&(0x7f0000000000/0xd35000)=nil, 0xd35000, 0x3, 0x32, 0xffffffffffffffff, 0x0) sendfile(r6, r8, &(0x7f0000929000), 0xff) readv(r5, &(0x7f0000dc8ff8)=[{&(0x7f0000208000)=""/4096, 0x1000}], 0x1d3) ioctl$fiemap(0xffffffffffffffff, 0xc020660b, &(0x7f0000001240)=ANY=[@ANYBLOB="004a42000136440031fa3f3a8d215450a78c"]) ioctl$TIOCGPGRP(0xffffffffffffff9c, 0x540f, &(0x7f0000001680)) fcntl$setown(r8, 0x8, r7) ioctl$DRM_IOCTL_AGP_FREE(0xffffffffffffffff, 0x40206435, &(0x7f0000000200)) syz_open_dev$binder(&(0x7f00000016c0)='/dev/binder#\x00', 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000001100)=[{&(0x7f0000000100)=""/4096, 0x1000}], 0x1, &(0x7f0000001700)=[{&(0x7f0000000040)=""/133, 0x85}, {&(0x7f0000001280)=""/164, 0xa4}, {&(0x7f0000001480)=""/8, 0x8}, {&(0x7f00000014c0)=""/177, 0xb1}, {&(0x7f0000001580)=""/161, 0xa1}, {&(0x7f0000001640)=""/3, 0x3}], 0x6, 0x0) 2018/03/30 19:42:49 executing program 4: symlinkat(&(0x7f0000002f00)='./file0\x00', 0xffffffffffffffff, &(0x7f0000002f80)='./file0\x00') syz_mount_image$msdos(&(0x7f0000002fc0)='msdos\x00', &(0x7f0000003000)='./file0\x00', 0x4, 0x1, &(0x7f0000003180)=[{&(0x7f0000003040)="eaf9610c9f7031a1f58e51e73b3f0bd5af4364c38bbe335dbd3d211ec0338ba4c795c634af757a3c684da6110f67891133a6303441b21d139e3a6582efdaeabd3d68dbcb85cd383733a98084b62807af0b7ea49d68daa4cc9fda43dbeb13c3e67c44c463a2c429ccb66c0e1a9dfd5c911d4d7b578baaad6571d4457b9c6d92122a4bd97f5f174c81081941b007062f2cab2db1466851dde671e025909a633fec433bb2512fc61c436b74df23d280019a403884dc488071", 0xb7, 0xcd7}], 0x8, &(0x7f00000031c0)={[{@errors_continue='errors=continue', 0x2c}, {@time_offset={'time_offset', 0x3d, [0x0]}, 0x2c}]}) pipe(&(0x7f0000002f40)={0xffffffffffffffff}) r1 = open(&(0x7f0000003240)='./file0\x00', 0xa0001, 0x20) linkat(r0, &(0x7f0000003200)='./file0\x00', r1, &(0x7f0000003280)='./file0\x00', 0x400) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x80000, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)}, {&(0x7f0000010d00)="0000000000000000000000000000000000000000000000000000000002ae0000ed41000000040000d15bbe5ad15bbe5ad15bbe5a00000000000005002000000000000800070000000af301000400000000000000000000000100000030000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a1950000", 0xa0, 0x8c60}, {&(0x7f0000011a00)="020000000c0001022e000000020000000c0002022e2e00000b00000014000a026c6f73742b666f756e6400000c0000001000050166696c65300000000d0000001000050266696c65310000000f0000001000050166696c6532000000100000001000050166696c6533000000110000001000050166696c65340000001200000010000802564944454f5f54531400000068031201d181d18ed0b7d0bad0b0d0bbd0bbd0b5d1800000000000000000000000000000000000000000000000000000", 0xc0, 0xc000}, {&(0x7f0000012200)="0000000000000000000000000000000000000000000000000c0000dec910dfd800000000f4030000000000000000000000000000000000000000000000000000", 0x40, 0x117e0}, {&(0x7f0000012a00)="0d0000000c0001022e000000020000000c0002022e2e00000e000000dc03050166696c6530000000000000000000000000000000000000000000000000000000", 0x40, 0x1c000}], 0x0, &(0x7f0000013000)) syz_mount_image$bfs(&(0x7f0000000040)='bfs\x00', &(0x7f00000008c0)='./file0\x00', 0x20, 0x2, &(0x7f0000000180)=[{&(0x7f00000005c0)="f37e57346e86cb5adec662d7bd6f13a3764d2ca7640f9f81ba88d0689d0989735a7bafd5558d9a6e8988f9f6038fa475e49077bc8cfc6e170c4cdbaaa1375895c9a4068559d3cecf2a0423caa696bf77a75b3ae3f32b79da059ca13d055647998987fc2033d008bd55deb08808372b9b4595fb0d79a1358cd5949d859a7d155e86db4b608eb401109f6b792f5ce4a2ead9870dee49347bc08d0d54b0e4fca4fd895947a737f4ee823d997770e5c9df50c0c9fe2c0b945c6ffd13b7151e385b631520ac34a5967c6cd0d12b3746795681600541c17d379daed41ce8e715eba582fb668e160872a2", 0xe7, 0x7}, {&(0x7f0000000780)="6154d093a5a905da96fed5f8dea36bcd9d1d011246f7caf86806bf6ac6301d2d2b448461b867bbbe7d0eebdeafa16d7219af85ff4372670039ce277546def59f1d0eed4be4386a34c7243fe3ec84ad3807136a2c3ec35d6d87a7d7bb9342622cc3a7ff529ef3d76ff57fc7a1856f50b98e518515a9e679067cfc0e8500754fa30a81cf4dc42c5a0d36647280c5b0a8506efaf9ad06594678176efe4bdbcf7ab384b597df4c5ad66b2bd240823abe04cd30785819f1c7fd4d46bb55f8bd09ca4b44618b010e363fa572ca189ec73b36ad46b6f38d65c0acc417", 0xd9, 0x5}], 0x200000, 0x0) syz_mount_image$jfs(&(0x7f0000000080)='jfs\x00', &(0x7f0000000880)='./file0\x00', 0xfffffffffffffffe, 0x3, &(0x7f0000002dc0)=[{&(0x7f0000000900)="efee47debce411554253d03f2175c060de26b9a7a197d9327971105aafdf17a061227fe7dd52d3c1c1f0318992f304f7646c3eb4e32ff0514d34d4605b4e152474aa71ac6c0ba890b1f249f213d5bc162b605fdf3c524d6f84e1a2f8461d26ef5dd50b193ffb710ee69fc431552ae4548f0c1a7e503243bb10c53c566f37e3234d8b3d418992dca946568d275e1f54895a854bab3790963108fe6ce5b1f933e81bd0aa2dfd715aca4bd81b48b28e3ee265", 0xb1, 0x1}, {&(0x7f0000001a80)="b4bc90ad72742e5693f04c7955b05460b33cd0ca9cde365dbe1671162a8c1db744cb8a04d1d747ab4d3234fd615e6ad897396c21b8bf7da2c1d524d04fadade841e5acfac529250a2c75fed4b65a7b6c8735268244189e020c526112728097958fd591d00cd16d1591db9b0414d985d7718794369eb03d89403b7df76f6d745c94d4fa986321a9915fea55a73472bc39620fcf22ec74d02b77fafe6ccf72605eb0ba7ae69fa10a36d281e65a178528bc654ce5b6109d5294e400b18be755a3b899489b27a876ac3ea033ed525b28c7dff537b5210cbff466dc339e1f58db1679816589e886264ef1bcf6d0e1408d93946827711972", 0xf5, 0x7}, {&(0x7f0000002cc0)="c9bc1928c9ffffe99fdae39f5013810a038f1d558affc92341c81ee308195dabd95fcfedcfccd4cf2af62477e5ed935114b73940dba239c47d5824a3332fb48cea682934a6840ea5db2529c3a7c371bbf08f08bb15458de586609be64b699f29b7384dc7b2ba78f0e343fb9851eaf5a7b4106fc5b7a8aaf6e069012286fa7259807928cbee722222f45e6c98cefa00829bcdd92bd03273c7b0f20453c72150adf49c311248d3d3d96ad17187d60add3d1d8fbfbc5e572ceba134e5c533a5f75630a35514ee998b85a755085c04513dcc0047461d78f4aa8fdf0309fc39e3e4a1c24b45", 0xe3, 0x4}], 0x10000, &(0x7f0000002ec0)={[{@nodiscard='nodiscard', 0x2c}, {@resize='resize', 0x2c}, {@noquota='noquota', 0x2c}, {@umask={'umask', 0x3d, [0x3f]}, 0x2c}]}) 2018/03/30 19:42:49 executing program 6: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_mreqn(r0, 0x0, 0x27, &(0x7f0000000000)={@multicast2=0xe0000002, @loopback=0x7f000001}, 0xc) getsockopt$inet_sctp6_SCTP_FRAGMENT_INTERLEAVE(0xffffffffffffffff, 0x84, 0x12, &(0x7f0000000080), &(0x7f00000000c0)=0x4) ioctl$sock_inet_SIOCGIFDSTADDR(0xffffffffffffffff, 0x8917, &(0x7f0000000040)={'bcsh0\x00', {0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x1a}}}) setsockopt$inet_sctp6_SCTP_MAX_BURST(0xffffffffffffffff, 0x84, 0x14, &(0x7f0000000380)=@int=0x3, 0x4) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000140)={'bcsh0\x00', 0x0}) ioctl$sock_inet6_SIOCDELRT(0xffffffffffffffff, 0x890c, &(0x7f0000000180)={@dev={0xfe, 0x80, [], 0x13}, @loopback={0x0, 0x1}, @mcast2={0xff, 0x2, [], 0x1}, 0x6, 0x0, 0x42e, 0x100, 0x9, 0x80000000, r1}) r2 = socket$inet(0x2, 0xa, 0x5) setsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX(r2, 0x84, 0x6e, &(0x7f0000000600)=[@in={0x2, 0x4e21, @multicast1=0xe0000001}, @in6={0xa, 0x4e20, 0x0, @remote={0xfe, 0x80, [], 0xbb}}, @in={0x2, 0x4e22, @multicast2=0xe0000002}, @in6={0xa, 0x4e21, 0x1ff, @local={0xfe, 0x80, [], 0xaa}, 0x84}, @in6={0xa, 0x4e20, 0x4, @local={0xfe, 0x80, [], 0xaa}}], 0x74) getsockopt$inet_sctp6_SCTP_PR_SUPPORTED(0xffffffffffffffff, 0x84, 0x71, &(0x7f0000000200)={0x0, 0x8}, &(0x7f0000000240)=0x8) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(0xffffffffffffffff, 0x84, 0x6f, &(0x7f0000000300)={r3, 0x60, &(0x7f0000000280)=[@in={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x12}}, @in={0x2, 0x4e24, @loopback=0x7f000001}, @in={0x2, 0x0, @remote={0xac, 0x14, 0x14, 0xbb}}, @in={0x2, 0x4e24, @remote={0xac, 0x14, 0x14, 0xbb}}, @in={0x2, 0x4e24, @rand_addr=0x3ff}, @in={0x2, 0x4e24, @multicast2=0xe0000002}]}, &(0x7f0000000340)=0x10) setsockopt$inet_sctp6_SCTP_SET_PEER_PRIMARY_ADDR(0xffffffffffffffff, 0x84, 0x5, &(0x7f00000004c0)={r4, @in={{0x2, 0x4e20, @rand_addr=0x8}}}, 0x84) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, &(0x7f00000003c0)={'lo\x00', 0x4100}) ioctl$sock_inet_SIOCGIFNETMASK(0xffffffffffffffff, 0x891b, &(0x7f0000000100)={'nr0\x00', {0x2, 0x4e24, @loopback=0x7f000001}}) setsockopt$inet_msfilter(r0, 0x0, 0x29, &(0x7f0000000680)=ANY=[@ANYBLOB="cf0000000276d172390cc8c4ff4f3b746e5947c2ddb66a93ebb6d0f75b5f453435c311b94e126c49d47c10682b6e523d09fae1d416ebface98e08aa083e9f1f1afa118eb05655fec48d75d7a37edd032552c60ffeb53a2c8eecbe601a4ac5dceeecf1a943c2d9e2eaf4ad0a93e82a1a37a0cf2adbc4b512680428fee922ad18ff90ec6f87a75b299a953167bf4f9ae31cffd2c31dd47ba7d69151424dc1b2835f7624a302f270eb89118043dc1e1faa46e667be9cbf4456ad0c580ed032e4e49459f68f8a70f2dfe40f51362ffae"], 0x1) pread64(r0, &(0x7f0000000340)=""/181, 0xb5, 0x62) setsockopt$inet_msfilter(r0, 0x0, 0x29, &(0x7f0000000580)=ANY=[@ANYBLOB="e00000027f0000010000000001000000000000006b59aa51deb20d6efc9c04b7c9420f6434d31cbbe99b52873a8c21"], 0x1) socket$inet_udp(0x2, 0x2, 0x0) bpf$BPF_PROG_GET_NEXT_ID(0xb, &(0x7f0000000400)=0x7, 0x4) r5 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000ba4000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x2, 0x78, 0xe2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, r5, 0x0) r6 = perf_event_open(&(0x7f0000014f88)={0x1, 0x78, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00002e8000)}}, 0x0, 0x0, r5, 0x0) readv(r6, &(0x7f0000734000)=[{&(0x7f0000d42000)=""/146, 0x92}], 0x1) getsockopt$inet_sctp_SCTP_PEER_ADDR_THLDS(0xffffffffffffffff, 0x84, 0x1f, &(0x7f0000000480)={0x0, @in={{0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0xd}}}, 0xf80866d, 0x5}, &(0x7f0000000540)=0x90) getsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(0xffffffffffffff9c, 0x84, 0x18, &(0x7f0000000440)={r7, 0x400000000004}, &(0x7f00000005c0)=0xffffffffffffffc3) getsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER_VALUE(r0, 0x84, 0x7c, &(0x7f00000002c0)={r8, 0x10001, 0xc9e9}, &(0x7f0000000300)=0x8) 2018/03/30 19:42:49 executing program 1: r0 = syz_open_dev$amidi(&(0x7f0000000040)='/dev/amidi#\x00', 0x3, 0x28000) ioctl$DRM_IOCTL_RES_CTX(r0, 0xc0086426, &(0x7f0000000100)={0x2c, &(0x7f00000000c0)=[{}, {}, {}, {}, {}, {}, {}, {}]}) socket$netlink(0x10, 0x3, 0xc) writev(0xffffffffffffffff, &(0x7f00000021c0), 0x0) bind$bt_l2cap(r0, &(0x7f0000000340)={0x1f, 0x800000000000002, {0x401, 0x3, 0xb, 0x3f8}}, 0x9) socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f0000a8d000)={&(0x7f0000c78ff4)={0x10}, 0xc, &(0x7f0000df6000)={&(0x7f0000000200)=ANY=[@ANYBLOB="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"], 0x10e}, 0x1}, 0x0) r1 = socket$inet_sctp(0x2, 0x5, 0x84) sendmsg$inet_sctp(r1, &(0x7f0000001f00)={&(0x7f0000001840)=@in={0x2, 0x0, @dev={0xac, 0x14, 0x14}}, 0x10, &(0x7f0000001c40)=[{&(0x7f0000001880)='[', 0x1}], 0x1, &(0x7f0000001e40)}, 0x40) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000540)=@nat={'nat\x00', 0x19, 0x3, 0x376, [0x20000140, 0x0, 0x0, 0x20000170, 0x200002d0], 0x0, &(0x7f0000000100), &(0x7f00000006c0)=ANY=[@ANYBLOB="00000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000ffffffff01000000110000000000000000006e7230000000000000000000000000006772657461703000000000000000000074756e6c30000000000000000000000073797a6b616c6c657230000000000000ffffffffffff0000ff0000ffaaaaaaaaaaaaffff0000ffff000070000000b8000000e800000049444c4554494d45520000000000000000000000000000000000000000000000240000008100000073797a300000000000000000400000000000000000000000000000000100000061727072ffffff7f0000000000000000000000000000000000000000000000000c000000aaaaaaaaaabb00000000000000000000000000000000000000000000000000000000000000000000000000000000000001000000feffffff0000000000000000060000000000000000000000000000000000000000000000000000000000000001000000ffffffff020000000000000002000000880864756d6d79300000000000000000000062707130080000000000000000000000697036746e6c3000000000000000000073697430000000000000000000000000ffffffffffff000000000000aaaaaaaaaaaaffffffff00ff0000700000007000000098000000726564697265637400000000000000000000000000000000000000000000000004000000fcffffff0900000008000000000062726964676530000000000000000000697036746e6c3000000000000000000062637368300000000000000000000000766c616e300000000000000000000000000000000000ff00ff00ffffffffffffffff00ffffffff000000080100000801000030010000697076730000000000000000000000000000000000000000000000000000000028000000ac1414aa000000000000000000000000ffffffffffffff0000000000ff0000004e2400004e240008697076730000000000000000000000000000000000000000000000000000000028000000e0000001000000000000000000000000ffffffff000000ffffffffffff0000004e212b054e201f124155444954000000000000000000000000000000000000000000000000000000040000000000000075eb180f3829"]}, 0x3ee) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000002980)) getsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(0xffffffffffffffff, 0x84, 0x1f, &(0x7f0000000440)={0x0, @in={{0x2, 0x4e22, @multicast2=0xe0000002}}, 0x7bb7, 0x4}, &(0x7f0000000500)=0x90) getsockopt$inet_sctp_SCTP_RTOINFO(0xffffffffffffffff, 0x84, 0x0, &(0x7f0000002240)={0x0, 0x9, 0x417}, &(0x7f00000001c0)=0x10) r2 = socket(0x22, 0x4, 0x3) r3 = socket(0x20000001e, 0x5, 0x0) r4 = perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$packet_tx_ring(r3, 0x10f, 0x87, &(0x7f0000265000)=@req={0x3fc, 0x0, 0x1}, 0x10) getegid() setsockopt$packet_tx_ring(r2, 0x10f, 0x87, &(0x7f0000265000)=@req={0x3fc, 0x0, 0x1}, 0x10) writev(r2, &(0x7f00000000c0)=[{&(0x7f0000000000)="8a", 0x1}], 0x1) close(r2) close(r3) perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r5 = syz_open_dev$evdev(&(0x7f0000dfdfee)='/dev/input/event#\x00', 0x0, 0x2) readv(r5, &(0x7f0000019fe0)=[{&(0x7f00008ec000)=""/219, 0xdb}], 0x1) write$evdev(r5, &(0x7f000004d000)=[{{}, 0x0, 0x1}, {{0x2}}], 0x30) r6 = getpgrp(0x0) setsockopt$ax25_int(r3, 0x101, 0xd, &(0x7f0000000080)=0x7, 0x4) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x8, 0xfffffffffffffffd, 0x9, 0x7, 0x0, 0x8001, 0x0, 0x6, 0x3ff, 0x4, 0x5, 0x4, 0xbd9, 0x56, 0x8000, 0x7f, 0xff, 0xeba, 0x1f, 0x0, 0xfd, 0x3, 0x1, 0x50, 0x7, 0x9, 0x641800, 0x3ff8000000000000, 0x4, 0x0, 0x10000, 0x5, 0x7, 0x6, 0x1, 0xffffffffffffffe0, 0x0, 0x20, 0x0, @perf_bp={&(0x7f0000000040), 0x8}, 0x20, 0x401, 0x8, 0x3, 0x8, 0x7, 0x7}, r6, 0xc, r4, 0x0) syz_genetlink_get_family_id$ipvs(&(0x7f0000000040)='IPVS\x00') 2018/03/30 19:42:49 executing program 5: unshare(0x40000000) perf_event_open(&(0x7f000001d000)={0x2, 0x78, 0xe2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket(0xa, 0x1, 0x0) ioctl(r0, 0x8982, &(0x7f0000000000)) r1 = socket$packet(0x11, 0x0, 0x300) r2 = openat$cuse(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/cuse\x00', 0x82, 0x0) io_setup(0x43f, &(0x7f00000000c0)=0x0) io_submit(r3, 0x1, &(0x7f0000000000)=[&(0x7f0000000200)={0x0, 0x0, 0x0, 0x1, 0x0, r2, &(0x7f0000000040)="10000000020400000000000000000000", 0x10}]) r4 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000280)='/proc/sys/net/ipv4/vs/secure_tcp\x00', 0x2, 0x0) sendmsg$kcm(r4, &(0x7f0000001f00)={&(0x7f0000001b40)=@pppol2tpin6={0x18, 0x1, {0x0, r1, 0x0, 0x1, 0x0, 0x0, {0xa, 0x4e24, 0xc1, @mcast1={0xff, 0x1, [], 0x1}}}}, 0x80, &(0x7f0000001d80)=[{&(0x7f0000001bc0)="a9db123ebf124fab0f2eec9774559e3b5870fb7c6818fc89c4b8742d057480657265ae2b34fb2d4e585d22ca1bf7b0a22ce38a20a819d919947c78f8d5c9f3291905fd3ed2b8ef8a79d9453396c6b0b7eb0778dbc49b32ae91e443b64edddcf320c1589c7777eadd4e57c01b20a8ca7a831e8e2c104d0194d52fb5c35b550f", 0x7f}], 0x1, &(0x7f0000001dc0)=ANY=[], 0x0, 0x90}, 0x20000000) r5 = syz_open_dev$tun(&(0x7f00000001c0)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r5, 0x400454ca, &(0x7f0000000200)={'bridge0\x00\x00p\x00', 0x4000000000001005}) socketpair(0x1d, 0x3, 0x40, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_inet_SIOCSIFADDR(r6, 0x8916, &(0x7f0000000100)={'bridge8\x00', {0x2, 0x0, @dev={0xac, 0x14, 0x14}}}) ioctl$LOOP_SET_FD(r2, 0x4c00, r1) ioctl$SNDRV_SEQ_IOCTL_RUNNING_MODE(0xffffffffffffffff, 0xc0105303, &(0x7f00000002c0)={0x2, 0x8}) add_key$keyring(&(0x7f00000000c0)='keyring\x00', &(0x7f0000000100)={0x73, 0x79, 0x7a}, 0x0, 0x0, 0x0) clone(0x0, &(0x7f0000000040), &(0x7f0000000080), &(0x7f0000000000), &(0x7f0000000100)) ioctl$int_in(0xffffffffffffffff, 0x800000c004500a, &(0x7f0000006ff8)) wait4(0x0, 0x0, 0x4, &(0x7f0000000380)) ioctl$sock_inet_sctp_SIOCINQ(r7, 0x541b, &(0x7f0000000180)) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_PORT(0xffffffffffffffff, 0xc0a85352, &(0x7f0000001980)={{}, 'port1\x00', 0x0, 0x20010, 0x1f, 0x0, 0x3, 0x40, 0x0, 0x0, 0x4, 0x6d1}) [ 488.712932] FAT-fs (loop4): Unrecognized mount option "time_offset=" or missing value [ 488.714387] kernel msg: ebtables bug: please report to author: EBT_ENTRY_OR_ENTRIES shouldn't be set in distinguisher [ 488.738651] audit: type=1326 audit(1522438969.761:11): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=5504 comm="syz-executor7" exe="/root/syz-executor7" sig=31 arch=c000003e syscall=202 compat=0 ip=0x454e79 code=0xffff0000 2018/03/30 19:42:49 executing program 6: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_mreqn(r0, 0x0, 0x27, &(0x7f0000000000)={@multicast2=0xe0000002, @loopback=0x7f000001}, 0xc) getsockopt$inet_sctp6_SCTP_FRAGMENT_INTERLEAVE(0xffffffffffffffff, 0x84, 0x12, &(0x7f0000000080), &(0x7f00000000c0)=0x4) ioctl$sock_inet_SIOCGIFDSTADDR(0xffffffffffffffff, 0x8917, &(0x7f0000000040)={'bcsh0\x00', {0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x1a}}}) setsockopt$inet_sctp6_SCTP_MAX_BURST(0xffffffffffffffff, 0x84, 0x14, &(0x7f0000000380)=@int=0x3, 0x4) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000140)={'bcsh0\x00', 0x0}) ioctl$sock_inet6_SIOCDELRT(0xffffffffffffffff, 0x890c, &(0x7f0000000180)={@dev={0xfe, 0x80, [], 0x13}, @loopback={0x0, 0x1}, @mcast2={0xff, 0x2, [], 0x1}, 0x6, 0x0, 0x42e, 0x100, 0x9, 0x80000000, r1}) r2 = socket$inet(0x2, 0xa, 0x5) setsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX(r2, 0x84, 0x6e, &(0x7f0000000600)=[@in={0x2, 0x4e21, @multicast1=0xe0000001}, @in6={0xa, 0x4e20, 0x0, @remote={0xfe, 0x80, [], 0xbb}}, @in={0x2, 0x4e22, @multicast2=0xe0000002}, @in6={0xa, 0x4e21, 0x1ff, @local={0xfe, 0x80, [], 0xaa}, 0x84}, @in6={0xa, 0x4e20, 0x4, @local={0xfe, 0x80, [], 0xaa}}], 0x74) getsockopt$inet_sctp6_SCTP_PR_SUPPORTED(0xffffffffffffffff, 0x84, 0x71, &(0x7f0000000200)={0x0, 0x8}, &(0x7f0000000240)=0x8) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(0xffffffffffffffff, 0x84, 0x6f, &(0x7f0000000300)={r3, 0x70, &(0x7f0000000280)=[@in={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x12}}, @in={0x2, 0x4e24, @loopback=0x7f000001}, @in={0x2, 0x0, @remote={0xac, 0x14, 0x14, 0xbb}}, @in={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x1a}}, @in={0x2, 0x4e24, @remote={0xac, 0x14, 0x14, 0xbb}}, @in={0x2, 0x4e24, @rand_addr=0x3ff}, @in={0x2, 0x4e24, @multicast2=0xe0000002}]}, &(0x7f0000000340)=0x10) setsockopt$inet_sctp6_SCTP_SET_PEER_PRIMARY_ADDR(0xffffffffffffffff, 0x84, 0x5, &(0x7f00000004c0)={r4, @in={{0x2, 0x4e20, @rand_addr=0x8}}}, 0x84) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, &(0x7f00000003c0)={'lo\x00', 0x4100}) ioctl$sock_inet_SIOCGIFNETMASK(0xffffffffffffffff, 0x891b, &(0x7f0000000100)={'nr0\x00', {0x2, 0x4e24, @loopback=0x7f000001}}) setsockopt$inet_msfilter(r0, 0x0, 0x29, &(0x7f0000000680)=ANY=[@ANYBLOB="cf0000000276d172390cc8c4ff4f3b746e5947c2ddb66a93ebb6d0f75b5f453435c311b94e126c49d47c10682b6e523d09fae1d416ebface98e08aa083e9f1f1afa118eb05655fec48d75d7a37edd032552c60ffeb53a2c8eecbe601a4ac5dceeecf1a943c2d9e2eaf4ad0a93e82a1a37a0cf2adbc4b512680428fee922ad18ff90ec6f87a75b299a953167bf4f9ae31cffd2c31dd47ba7d69151424dc1b2835f7624a302f270eb89118043dc1e1faa46e667be9cbf4456ad0c580ed032e4e49459f68f8a70f2dfe40f51362ffae"], 0x1) pread64(r0, &(0x7f0000000340)=""/181, 0xb5, 0x62) setsockopt$inet_msfilter(r0, 0x0, 0x29, &(0x7f0000000580)=ANY=[@ANYBLOB="e00000027f0000010000000001000000000000006b59aa51deb20d6efc9c04b7c9420f6434d31cbbe99b52873a8c21"], 0x1) socket$inet_udp(0x2, 0x2, 0x0) bpf$BPF_PROG_GET_NEXT_ID(0xb, &(0x7f0000000400)=0x7, 0x4) r5 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000ba4000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x2, 0x78, 0xe2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, r5, 0x0) r6 = perf_event_open(&(0x7f0000014f88)={0x1, 0x78, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00002e8000)}}, 0x0, 0x0, r5, 0x0) readv(r6, &(0x7f0000734000)=[{&(0x7f0000d42000)=""/146, 0x92}], 0x1) getsockopt$inet_sctp_SCTP_PEER_ADDR_THLDS(0xffffffffffffffff, 0x84, 0x1f, &(0x7f0000000480)={0x0, @in={{0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0xd}}}, 0xf80866d, 0x5}, &(0x7f0000000540)=0x90) getsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(0xffffffffffffff9c, 0x84, 0x18, &(0x7f0000000440)={r7, 0x400000000004}, &(0x7f00000005c0)=0xffffffffffffffc3) getsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER_VALUE(r0, 0x84, 0x7c, &(0x7f00000002c0)={r8, 0x10001, 0xc9e9}, &(0x7f0000000300)=0x8) [ 488.780487] EXT4-fs (loop4): VFS: Can't find ext4 filesystem [ 488.818860] BFS-fs: bfs_fill_super(): No BFS filesystem on loop4 (magic=00000000) 2018/03/30 19:42:49 executing program 6: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_mreqn(r0, 0x0, 0x27, &(0x7f0000000000)={@multicast2=0xe0000002, @loopback=0x7f000001}, 0xc) getsockopt$inet_sctp6_SCTP_FRAGMENT_INTERLEAVE(0xffffffffffffffff, 0x84, 0x12, &(0x7f0000000080), &(0x7f00000000c0)=0x4) ioctl$sock_inet_SIOCGIFDSTADDR(0xffffffffffffffff, 0x8917, &(0x7f0000000040)={'bcsh0\x00', {0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x1a}}}) setsockopt$inet_sctp6_SCTP_MAX_BURST(0xffffffffffffffff, 0x84, 0x14, &(0x7f0000000380)=@int=0x3, 0x4) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000140)={'bcsh0\x00', 0x0}) ioctl$sock_inet6_SIOCDELRT(0xffffffffffffffff, 0x890c, &(0x7f0000000180)={@dev={0xfe, 0x80, [], 0x13}, @loopback={0x0, 0x1}, @mcast2={0xff, 0x2, [], 0x1}, 0x6, 0x0, 0x42e, 0x100, 0x9, 0x80000000, r1}) r2 = socket$inet(0x2, 0xa, 0x5) setsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX(r2, 0x84, 0x6e, &(0x7f0000000600)=[@in={0x2, 0x4e21, @multicast1=0xe0000001}, @in6={0xa, 0x4e20, 0x0, @remote={0xfe, 0x80, [], 0xbb}}, @in={0x2, 0x4e22, @multicast2=0xe0000002}, @in6={0xa, 0x4e21, 0x1ff, @local={0xfe, 0x80, [], 0xaa}, 0x84}, @in6={0xa, 0x4e20, 0x4, @local={0xfe, 0x80, [], 0xaa}}], 0x74) getsockopt$inet_sctp6_SCTP_PR_SUPPORTED(0xffffffffffffffff, 0x84, 0x71, &(0x7f0000000200)={0x0, 0x8}, &(0x7f0000000240)=0x8) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(0xffffffffffffffff, 0x84, 0x6f, &(0x7f0000000300)={r3, 0x70, &(0x7f0000000280)=[@in={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x12}}, @in={0x2, 0x4e24, @loopback=0x7f000001}, @in={0x2, 0x0, @remote={0xac, 0x14, 0x14, 0xbb}}, @in={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x1a}}, @in={0x2, 0x4e24, @remote={0xac, 0x14, 0x14, 0xbb}}, @in={0x2, 0x4e24, @rand_addr=0x3ff}, @in={0x2, 0x4e24, @multicast2=0xe0000002}]}, &(0x7f0000000340)=0x10) setsockopt$inet_sctp6_SCTP_SET_PEER_PRIMARY_ADDR(0xffffffffffffffff, 0x84, 0x5, &(0x7f00000004c0)={r4, @in={{0x2, 0x4e20, @rand_addr=0x8}}}, 0x84) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, &(0x7f00000003c0)={'lo\x00', 0x4100}) ioctl$sock_inet_SIOCGIFNETMASK(0xffffffffffffffff, 0x891b, &(0x7f0000000100)={'nr0\x00', {0x2, 0x4e24, @loopback=0x7f000001}}) setsockopt$inet_msfilter(r0, 0x0, 0x29, &(0x7f0000000680)=ANY=[@ANYBLOB="cf0000000276d172390cc8c4ff4f3b746e5947c2ddb66a93ebb6d0f75b5f453435c311b94e126c49d47c10682b6e523d09fae1d416ebface98e08aa083e9f1f1afa118eb05655fec48d75d7a37edd032552c60ffeb53a2c8eecbe601a4ac5dceeecf1a943c2d9e2eaf4ad0a93e82a1a37a0cf2adbc4b512680428fee922ad18ff90ec6f87a75b299a953167bf4f9ae31cffd2c31dd47ba7d69151424dc1b2835f7624a302f270eb89118043dc1e1faa46e667be9cbf4456ad0c580ed032e4e49459f68f8a70f2dfe40f51362ffae"], 0x1) pread64(r0, &(0x7f0000000340)=""/181, 0xb5, 0x62) setsockopt$inet_msfilter(r0, 0x0, 0x29, &(0x7f0000000580)=ANY=[@ANYBLOB="e00000027f0000010000000001000000000000006b59aa51deb20d6efc9c04b7c9420f6434d31cbbe99b52873a8c21"], 0x1) socket$inet_udp(0x2, 0x2, 0x0) bpf$BPF_PROG_GET_NEXT_ID(0xb, &(0x7f0000000400)=0x7, 0x4) r5 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000ba4000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x2, 0x78, 0xe2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, r5, 0x0) r6 = perf_event_open(&(0x7f0000014f88)={0x1, 0x78, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00002e8000)}}, 0x0, 0x0, r5, 0x0) readv(r6, &(0x7f0000734000)=[{&(0x7f0000d42000)=""/146, 0x92}], 0x1) getsockopt$inet_sctp_SCTP_PEER_ADDR_THLDS(0xffffffffffffffff, 0x84, 0x1f, &(0x7f0000000480)={0x0, @in={{0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0xd}}}, 0xf80866d, 0x5}, &(0x7f0000000540)=0x90) getsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(0xffffffffffffff9c, 0x84, 0x18, &(0x7f0000000440)={r7, 0x400000000004}, &(0x7f00000005c0)=0xffffffffffffffc3) getsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER_VALUE(r0, 0x84, 0x7c, &(0x7f00000002c0)={r8, 0x10001, 0xc9e9}, &(0x7f0000000300)=0x8) [ 488.865719] jfs: Unrecognized mount option "umask=?" or missing value 2018/03/30 19:42:49 executing program 4: symlinkat(&(0x7f0000002f00)='./file0\x00', 0xffffffffffffffff, &(0x7f0000002f80)='./file0\x00') syz_mount_image$msdos(&(0x7f0000002fc0)='msdos\x00', &(0x7f0000003000)='./file0\x00', 0x4, 0x1, &(0x7f0000003180)=[{&(0x7f0000003040)="eaf9610c9f7031a1f58e51e73b3f0bd5af4364c38bbe335dbd3d211ec0338ba4c795c634af757a3c684da6110f67891133a6303441b21d139e3a6582efdaeabd3d68dbcb85cd383733a98084b62807af0b7ea49d68daa4cc9fda43dbeb13c3e67c44c463a2c429ccb66c0e1a9dfd5c911d4d7b578baaad6571d4457b9c6d92122a4bd97f5f174c81081941b007062f2cab2db1466851dde671e025909a633fec433bb2512fc61c436b74df23d280019a403884dc488071", 0xb7, 0xcd7}], 0x8, &(0x7f00000031c0)={[{@errors_continue='errors=continue', 0x2c}, {@time_offset={'time_offset', 0x3d, [0x0]}, 0x2c}]}) pipe(&(0x7f0000002f40)={0xffffffffffffffff}) r1 = open(&(0x7f0000003240)='./file0\x00', 0xa0001, 0x20) linkat(r0, &(0x7f0000003200)='./file0\x00', r1, &(0x7f0000003280)='./file0\x00', 0x400) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x80000, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)}, {&(0x7f0000010d00)="0000000000000000000000000000000000000000000000000000000002ae0000ed41000000040000d15bbe5ad15bbe5ad15bbe5a00000000000005002000000000000800070000000af301000400000000000000000000000100000030000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a1950000", 0xa0, 0x8c60}, {&(0x7f0000011a00)="020000000c0001022e000000020000000c0002022e2e00000b00000014000a026c6f73742b666f756e6400000c0000001000050166696c65300000000d0000001000050266696c65310000000f0000001000050166696c6532000000100000001000050166696c6533000000110000001000050166696c65340000001200000010000802564944454f5f54531400000068031201d181d18ed0b7d0bad0b0d0bbd0bbd0b5d1800000000000000000000000000000000000000000000000000000", 0xc0, 0xc000}, {&(0x7f0000012200)="0000000000000000000000000000000000000000000000000c0000dec910dfd800000000f4030000000000000000000000000000000000000000000000000000", 0x40, 0x117e0}, {&(0x7f0000012a00)="0d0000000c0001022e000000020000000c0002022e2e00000e000000dc03050166696c6530000000000000000000000000000000000000000000000000000000", 0x40, 0x1c000}], 0x0, &(0x7f0000013000)) syz_mount_image$bfs(&(0x7f0000000040)='bfs\x00', &(0x7f00000008c0)='./file0\x00', 0x20, 0x2, &(0x7f0000000180)=[{&(0x7f00000005c0)="f37e57346e86cb5adec662d7bd6f13a3764d2ca7640f9f81ba88d0689d0989735a7bafd5558d9a6e8988f9f6038fa475e49077bc8cfc6e170c4cdbaaa1375895c9a4068559d3cecf2a0423caa696bf77a75b3ae3f32b79da059ca13d055647998987fc2033d008bd55deb08808372b9b4595fb0d79a1358cd5949d859a7d155e86db4b608eb401109f6b792f5ce4a2ead9870dee49347bc08d0d54b0e4fca4fd895947a737f4ee823d997770e5c9df50c0c9fe2c0b945c6ffd13b7151e385b631520ac34a5967c6cd0d12b3746795681600541c17d379daed41ce8e715eba582fb668e160872a2", 0xe7, 0x7}, {&(0x7f0000000780)="6154d093a5a905da96fed5f8dea36bcd9d1d011246f7caf86806bf6ac6301d2d2b448461b867bbbe7d0eebdeafa16d7219af85ff4372670039ce277546def59f1d0eed4be4386a34c7243fe3ec84ad3807136a2c3ec35d6d87a7d7bb9342622cc3a7ff529ef3d76ff57fc7a1856f50b98e518515a9e679067cfc0e8500754fa30a81cf4dc42c5a0d36647280c5b0a8506efaf9ad06594678176efe4bdbcf7ab384b597df4c5ad66b2bd240823abe04cd30785819f1c7fd4d46bb55f8bd09ca4b44618b010e363fa572ca189ec73b36ad46b6f38d65c0acc417", 0xd9, 0x5}], 0x200000, 0x0) syz_mount_image$jfs(&(0x7f0000000080)='jfs\x00', &(0x7f0000000880)='./file0\x00', 0xfffffffffffffffe, 0x3, &(0x7f0000002dc0)=[{&(0x7f0000000900)="efee47debce411554253d03f2175c060de26b9a7a197d9327971105aafdf17a061227fe7dd52d3c1c1f0318992f304f7646c3eb4e32ff0514d34d4605b4e152474aa71ac6c0ba890b1f249f213d5bc162b605fdf3c524d6f84e1a2f8461d26ef5dd50b193ffb710ee69fc431552ae4548f0c1a7e503243bb10c53c566f37e3234d8b3d418992dca946568d275e1f54895a854bab3790963108fe6ce5b1f933e81bd0aa2dfd715aca4bd81b48b28e3ee265", 0xb1, 0x1}, {&(0x7f0000001a80)="b4bc90ad72742e5693f04c7955b05460b33cd0ca9cde365dbe1671162a8c1db744cb8a04d1d747ab4d3234fd615e6ad897396c21b8bf7da2c1d524d04fadade841e5acfac529250a2c75fed4b65a7b6c8735268244189e020c526112728097958fd591d00cd16d1591db9b0414d985d7718794369eb03d89403b7df76f6d745c94d4fa986321a9915fea55a73472bc39620fcf22ec74d02b77fafe6ccf72605eb0ba7ae69fa10a36d281e65a178528bc654ce5b6109d5294e400b18be755a3b899489b27a876ac3ea033ed525b28c7dff537b5210cbff466dc339e1f58db1679816589e886264ef1bcf6d0e1408d93946827711972", 0xf5, 0x7}, {&(0x7f0000002cc0)="c9bc1928c9ffffe99fdae39f5013810a038f1d558affc92341c81ee308195dabd95fcfedcfccd4cf2af62477e5ed935114b73940dba239c47d5824a3332fb48cea682934a6840ea5db2529c3a7c371bbf08f08bb15458de586609be64b699f29b7384dc7b2ba78f0e343fb9851eaf5a7b4106fc5b7a8aaf6e069012286fa7259807928cbee722222f45e6c98cefa00829bcdd92bd03273c7b0f20453c72150adf49c311248d3d3d96ad17187d60add3d1d8fbfbc5e572ceba134e5c533a5f75630a35514ee998b85a755085c04513dcc0047461d78f4aa8fdf0309fc39e3e4a1c24b45", 0xe3, 0x4}], 0x10000, &(0x7f0000002ec0)={[{@nodiscard='nodiscard', 0x2c}, {@resize='resize', 0x2c}, {@noquota='noquota', 0x2c}, {@umask={'umask', 0x3d, [0x3f]}, 0x2c}]}) 2018/03/30 19:42:50 executing program 3: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000a00)='./cgroup.net\x00', 0x200002, 0x0) fchdir(r0) r1 = creat(&(0x7f0000000040)='./file1\x00', 0x0) r2 = dup3(r1, r0, 0x0) pwritev(0xffffffffffffffff, &(0x7f0000000b40)=[{&(0x7f0000000100)="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", 0x3b0}], 0x1, 0x0) fcntl$setstatus(r0, 0x4, 0x0) write$cgroup_subtree(r2, &(0x7f0000000000)=ANY=[], 0x34123610) ftruncate(r1, 0x3) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000b00)) ioctl$sock_inet_SIOCSIFDSTADDR(r2, 0x8918, &(0x7f0000000c00)={'erspan0\x00', {0x2, 0x4e24, @dev={0xac, 0x14, 0x14, 0x1a}}}) ioctl$TIOCGPTPEER(0xffffffffffffffff, 0x5441, 0x6) ppoll(&(0x7f0000000a40)=[{r2, 0x8}, {r2, 0x80}, {r2}, {0xffffffffffffffff, 0x8000}, {r1, 0x400}], 0x5, &(0x7f00000000c0), &(0x7f0000000ac0), 0x8) mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x31, 0xffffffffffffffff, 0x0) socket$l2tp(0x18, 0x1, 0x1) ioctl$fiemap(0xffffffffffffffff, 0xc020660b, &(0x7f0000000e80)=ANY=[@ANYBLOB="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"]) utime(&(0x7f0000000b80)='./file1\x00', &(0x7f0000000bc0)) 2018/03/30 19:42:50 executing program 6: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_mreqn(r0, 0x0, 0x27, &(0x7f0000000000)={@multicast2=0xe0000002, @loopback=0x7f000001}, 0xc) getsockopt$inet_sctp6_SCTP_FRAGMENT_INTERLEAVE(0xffffffffffffffff, 0x84, 0x12, &(0x7f0000000080), &(0x7f00000000c0)=0x4) ioctl$sock_inet_SIOCGIFDSTADDR(0xffffffffffffffff, 0x8917, &(0x7f0000000040)={'bcsh0\x00', {0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x1a}}}) setsockopt$inet_sctp6_SCTP_MAX_BURST(0xffffffffffffffff, 0x84, 0x14, &(0x7f0000000380)=@int=0x3, 0x4) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000140)={'bcsh0\x00', 0x0}) ioctl$sock_inet6_SIOCDELRT(0xffffffffffffffff, 0x890c, &(0x7f0000000180)={@dev={0xfe, 0x80, [], 0x13}, @loopback={0x0, 0x1}, @mcast2={0xff, 0x2, [], 0x1}, 0x6, 0x0, 0x42e, 0x100, 0x9, 0x80000000, r1}) r2 = socket$inet(0x2, 0xa, 0x5) setsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX(r2, 0x84, 0x6e, &(0x7f0000000600)=[@in={0x2, 0x4e21, @multicast1=0xe0000001}, @in6={0xa, 0x4e20, 0x0, @remote={0xfe, 0x80, [], 0xbb}}, @in={0x2, 0x4e22, @multicast2=0xe0000002}, @in6={0xa, 0x4e21, 0x1ff, @local={0xfe, 0x80, [], 0xaa}, 0x84}, @in6={0xa, 0x4e20, 0x4, @local={0xfe, 0x80, [], 0xaa}}], 0x74) getsockopt$inet_sctp6_SCTP_PR_SUPPORTED(0xffffffffffffffff, 0x84, 0x71, &(0x7f0000000200)={0x0, 0x8}, &(0x7f0000000240)=0x8) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(0xffffffffffffffff, 0x84, 0x6f, &(0x7f0000000300)={r3, 0x70, &(0x7f0000000280)=[@in={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x12}}, @in={0x2, 0x4e24, @loopback=0x7f000001}, @in={0x2, 0x0, @remote={0xac, 0x14, 0x14, 0xbb}}, @in={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x1a}}, @in={0x2, 0x4e24, @remote={0xac, 0x14, 0x14, 0xbb}}, @in={0x2, 0x4e24, @rand_addr=0x3ff}, @in={0x2, 0x4e24, @multicast2=0xe0000002}]}, &(0x7f0000000340)=0x10) setsockopt$inet_sctp6_SCTP_SET_PEER_PRIMARY_ADDR(0xffffffffffffffff, 0x84, 0x5, &(0x7f00000004c0)={r4, @in={{0x2, 0x4e20, @rand_addr=0x8}}}, 0x84) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, &(0x7f00000003c0)={'lo\x00', 0x4100}) ioctl$sock_inet_SIOCGIFNETMASK(0xffffffffffffffff, 0x891b, &(0x7f0000000100)={'nr0\x00', {0x2, 0x4e24, @loopback=0x7f000001}}) setsockopt$inet_msfilter(r0, 0x0, 0x29, &(0x7f0000000680)=ANY=[@ANYBLOB="cf0000000276d172390cc8c4ff4f3b746e5947c2ddb66a93ebb6d0f75b5f453435c311b94e126c49d47c10682b6e523d09fae1d416ebface98e08aa083e9f1f1afa118eb05655fec48d75d7a37edd032552c60ffeb53a2c8eecbe601a4ac5dceeecf1a943c2d9e2eaf4ad0a93e82a1a37a0cf2adbc4b512680428fee922ad18ff90ec6f87a75b299a953167bf4f9ae31cffd2c31dd47ba7d69151424dc1b2835f7624a302f270eb89118043dc1e1faa46e667be9cbf4456ad0c580ed032e4e49459f68f8a70f2dfe40f51362ffae"], 0x1) pread64(r0, &(0x7f0000000340)=""/181, 0xb5, 0x62) setsockopt$inet_msfilter(r0, 0x0, 0x29, &(0x7f0000000580)=ANY=[@ANYBLOB="e00000027f0000010000000001000000000000006b59aa51deb20d6efc9c04b7c9420f6434d31cbbe99b52873a8c21"], 0x1) socket$inet_udp(0x2, 0x2, 0x0) bpf$BPF_PROG_GET_NEXT_ID(0xb, &(0x7f0000000400)=0x7, 0x4) r5 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000ba4000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x2, 0x78, 0xe2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, r5, 0x0) r6 = perf_event_open(&(0x7f0000014f88)={0x1, 0x78, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00002e8000)}}, 0x0, 0x0, r5, 0x0) readv(r6, &(0x7f0000734000)=[{&(0x7f0000d42000)=""/146, 0x92}], 0x1) getsockopt$inet_sctp_SCTP_PEER_ADDR_THLDS(0xffffffffffffffff, 0x84, 0x1f, &(0x7f0000000480)={0x0, @in={{0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0xd}}}, 0xf80866d, 0x5}, &(0x7f0000000540)=0x90) getsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(0xffffffffffffff9c, 0x84, 0x18, &(0x7f0000000440)={r7, 0x400000000004}, &(0x7f00000005c0)=0xffffffffffffffc3) getsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER_VALUE(r0, 0x84, 0x7c, &(0x7f00000002c0)={r8, 0x10001, 0xc9e9}, &(0x7f0000000300)=0x8) [ 489.006539] FAT-fs (loop4): Unrecognized mount option "time_offset=" or missing value 2018/03/30 19:42:50 executing program 3: r0 = dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x80000) ioctl$LOOP_SET_STATUS64(0xffffffffffffffff, 0x4c04, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0xb, 0x0, 0x8, "b2cdc16948c2d8defdc6ccd7e69370cd89206e757600f494a6f386fd75de4ec168412aefa9b47ddce6005ef1f5e2188c611f11fe23a9973b4f3b4ca8115d75b6", "adcddcbdd258708ed483b1c6d50b363981c4f943de7510903594aa41b5a7d76826f71b49332e607bd68a9352cd05d36e027047e9bd95b49f71e4f89c99b3dacc", "98731c39612dffb0f3700d6862ad2c5e51f2bf1597643d3216b87c072c7cef3c", [0x4, 0x1]}) r1 = socket$inet6(0xa, 0x400000000001, 0x0) r2 = dup(r1) r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup.cpu\x00', 0x200002, 0x0) getsockopt$inet_pktinfo(r2, 0x0, 0x8, &(0x7f0000000400)={0x0, @local}, &(0x7f00000006c0)=0xc) fchdir(r3) r4 = syz_open_procfs(0x0, &(0x7f0000000040)='net/fib_trie\x00') clock_gettime(0x0, &(0x7f0000000140)) ioctl$sock_proto_private(r4, 0x89e0, &(0x7f0000000340)) preadv(r4, &(0x7f0000000440)=[{&(0x7f00000001c0)=""/250, 0xff2d}], 0x1, 0x0) ioctl$TUNSETPERSIST(r4, 0x400454cb, 0x0) getsockopt$bt_l2cap_L2CAP_OPTIONS(r4, 0x6, 0x1, &(0x7f0000000080), &(0x7f00000002c0)=0xc) write$tun(0xffffffffffffffff, &(0x7f0000000800)=ANY=[@ANYBLOB="8f00000000000000000000000100000000d02bc74171a8264d8d86ff34b0739018d9ae9b238769d31595971d52887df334c91277ab7c2372ccd4eefac2c8a4c11380f807cbda436ee90f1f742c68e25304f1340c91bf3c483e188331c27a98621fb35b89840bc675ac2e50f1230bcc0d5c32d45161f7983447c053a66c47ee6412fe24806dbbeffbb794dd4073fe06bc8d3eea6d10f51c82c3b3eb5dbfc4d0386494a55a8f823042b60ab6f2ab82f1fd757cb01004230a8024cce0c76f12eb82ce1139af9c00c1d49936d8f80ed425e049c0568856931b8ad2780e7d9dcbf57dba077c54afe364fd39e909e456d67b27caaeed069ea587764136eb6410fa08698e00000000000000000000"], 0x1) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x6000) unlink(&(0x7f0000000000)='./file1\x00') fcntl$getown(0xffffffffffffffff, 0x9) pwritev(0xffffffffffffffff, &(0x7f00000000c0)=[{&(0x7f0000000c00)="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", 0x53a}], 0x1, 0x0) syz_genetlink_get_family_id$ipvs(&(0x7f0000000600)='IPVS\x00') setsockopt$inet_tcp_buf(0xffffffffffffffff, 0x6, 0x0, &(0x7f00000001c0)="0ff96be526dc7479dc678fe17208", 0xe) sendmsg$IPVS_CMD_DEL_DAEMON(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f0000000040)={0x10}, 0xc, &(0x7f0000000240)={&(0x7f0000000940)=ANY=[@ANYBLOB="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"], 0x1}, 0x1}, 0x0) bind$inet6(r1, &(0x7f0000fa0fe4)={0xa, 0x0, 0x0, @loopback={0x0, 0x1}}, 0x1c) ioctl$SNDRV_SEQ_IOCTL_GET_CLIENT_POOL(r2, 0xc058534b, &(0x7f0000000300)={0x3, 0xfffffffffffff5ec, 0x3, 0x31e70a44, 0x2, 0x200}) sendto$inet6(r1, &(0x7f0000e77fff), 0xfffffffffffffd8a, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback={0x0, 0x1}}, 0x1c) ioctl$DRM_IOCTL_GEM_FLINK(r0, 0xc008640a, &(0x7f0000000200)={0x0, 0x0}) ioctl$DRM_IOCTL_GEM_OPEN(r0, 0xc010640b, &(0x7f0000000380)={r5, 0x0}) ioctl$DRM_IOCTL_PRIME_HANDLE_TO_FD(0xffffffffffffffff, 0xc00c642d, &(0x7f0000000480)={r6, 0x80004}) lstat(&(0x7f00000004c0)='./bus\x00', &(0x7f0000000500)) [ 489.055530] EXT4-fs (loop4): VFS: Can't find ext4 filesystem [ 489.089319] BFS-fs: bfs_fill_super(): No BFS filesystem on loop4 (magic=00000000) 2018/03/30 19:42:50 executing program 6: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_mreqn(r0, 0x0, 0x27, &(0x7f0000000000)={@multicast2=0xe0000002, @loopback=0x7f000001}, 0xc) getsockopt$inet_sctp6_SCTP_FRAGMENT_INTERLEAVE(0xffffffffffffffff, 0x84, 0x12, &(0x7f0000000080), &(0x7f00000000c0)=0x4) ioctl$sock_inet_SIOCGIFDSTADDR(0xffffffffffffffff, 0x8917, &(0x7f0000000040)={'bcsh0\x00', {0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x1a}}}) setsockopt$inet_sctp6_SCTP_MAX_BURST(0xffffffffffffffff, 0x84, 0x14, &(0x7f0000000380)=@int=0x3, 0x4) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000140)={'bcsh0\x00', 0x0}) ioctl$sock_inet6_SIOCDELRT(0xffffffffffffffff, 0x890c, &(0x7f0000000180)={@dev={0xfe, 0x80, [], 0x13}, @loopback={0x0, 0x1}, @mcast2={0xff, 0x2, [], 0x1}, 0x6, 0x0, 0x42e, 0x100, 0x9, 0x80000000, r1}) r2 = socket$inet(0x2, 0xa, 0x5) setsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX(r2, 0x84, 0x6e, &(0x7f0000000600)=[@in={0x2, 0x4e21, @multicast1=0xe0000001}, @in6={0xa, 0x4e20, 0x0, @remote={0xfe, 0x80, [], 0xbb}}, @in={0x2, 0x4e22, @multicast2=0xe0000002}, @in6={0xa, 0x4e21, 0x1ff, @local={0xfe, 0x80, [], 0xaa}, 0x84}, @in6={0xa, 0x4e20, 0x4, @local={0xfe, 0x80, [], 0xaa}}], 0x74) getsockopt$inet_sctp6_SCTP_PR_SUPPORTED(0xffffffffffffffff, 0x84, 0x71, &(0x7f0000000200)={0x0, 0x8}, &(0x7f0000000240)=0x8) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(0xffffffffffffffff, 0x84, 0x6f, &(0x7f0000000300)={r3, 0x70, &(0x7f0000000280)=[@in={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x12}}, @in={0x2, 0x4e24, @loopback=0x7f000001}, @in={0x2, 0x0, @remote={0xac, 0x14, 0x14, 0xbb}}, @in={0x2, 0x4e23, @dev={0xac, 0x14, 0x14}}, @in={0x2, 0x4e24, @remote={0xac, 0x14, 0x14, 0xbb}}, @in={0x2, 0x4e24, @rand_addr=0x3ff}, @in={0x2, 0x4e24, @multicast2=0xe0000002}]}, &(0x7f0000000340)=0x10) setsockopt$inet_sctp6_SCTP_SET_PEER_PRIMARY_ADDR(0xffffffffffffffff, 0x84, 0x5, &(0x7f00000004c0)={r4, @in={{0x2, 0x4e20, @rand_addr=0x8}}}, 0x84) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, &(0x7f00000003c0)={'lo\x00', 0x4100}) ioctl$sock_inet_SIOCGIFNETMASK(0xffffffffffffffff, 0x891b, &(0x7f0000000100)={'nr0\x00', {0x2, 0x4e24, @loopback=0x7f000001}}) setsockopt$inet_msfilter(r0, 0x0, 0x29, &(0x7f0000000680)=ANY=[@ANYBLOB="cf0000000276d172390cc8c4ff4f3b746e5947c2ddb66a93ebb6d0f75b5f453435c311b94e126c49d47c10682b6e523d09fae1d416ebface98e08aa083e9f1f1afa118eb05655fec48d75d7a37edd032552c60ffeb53a2c8eecbe601a4ac5dceeecf1a943c2d9e2eaf4ad0a93e82a1a37a0cf2adbc4b512680428fee922ad18ff90ec6f87a75b299a953167bf4f9ae31cffd2c31dd47ba7d69151424dc1b2835f7624a302f270eb89118043dc1e1faa46e667be9cbf4456ad0c580ed032e4e49459f68f8a70f2dfe40f51362ffae"], 0x1) pread64(r0, &(0x7f0000000340)=""/181, 0xb5, 0x62) setsockopt$inet_msfilter(r0, 0x0, 0x29, &(0x7f0000000580)=ANY=[@ANYBLOB="e00000027f0000010000000001000000000000006b59aa51deb20d6efc9c04b7c9420f6434d31cbbe99b52873a8c21"], 0x1) socket$inet_udp(0x2, 0x2, 0x0) bpf$BPF_PROG_GET_NEXT_ID(0xb, &(0x7f0000000400)=0x7, 0x4) r5 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000ba4000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x2, 0x78, 0xe2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, r5, 0x0) r6 = perf_event_open(&(0x7f0000014f88)={0x1, 0x78, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00002e8000)}}, 0x0, 0x0, r5, 0x0) readv(r6, &(0x7f0000734000)=[{&(0x7f0000d42000)=""/146, 0x92}], 0x1) getsockopt$inet_sctp_SCTP_PEER_ADDR_THLDS(0xffffffffffffffff, 0x84, 0x1f, &(0x7f0000000480)={0x0, @in={{0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0xd}}}, 0xf80866d, 0x5}, &(0x7f0000000540)=0x90) getsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(0xffffffffffffff9c, 0x84, 0x18, &(0x7f0000000440)={r7, 0x400000000004}, &(0x7f00000005c0)=0xffffffffffffffc3) getsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER_VALUE(r0, 0x84, 0x7c, &(0x7f00000002c0)={r8, 0x10001, 0xc9e9}, &(0x7f0000000300)=0x8) 2018/03/30 19:42:50 executing program 4: symlinkat(&(0x7f0000002f00)='./file0\x00', 0xffffffffffffffff, &(0x7f0000002f80)='./file0\x00') syz_mount_image$msdos(&(0x7f0000002fc0)='msdos\x00', &(0x7f0000003000)='./file0\x00', 0x4, 0x1, &(0x7f0000003180)=[{&(0x7f0000003040)="eaf9610c9f7031a1f58e51e73b3f0bd5af4364c38bbe335dbd3d211ec0338ba4c795c634af757a3c684da6110f67891133a6303441b21d139e3a6582efdaeabd3d68dbcb85cd383733a98084b62807af0b7ea49d68daa4cc9fda43dbeb13c3e67c44c463a2c429ccb66c0e1a9dfd5c911d4d7b578baaad6571d4457b9c6d92122a4bd97f5f174c81081941b007062f2cab2db1466851dde671e025909a633fec433bb2512fc61c436b74df23d280019a403884dc488071", 0xb7, 0xcd7}], 0x8, &(0x7f00000031c0)={[{@errors_continue='errors=continue', 0x2c}, {@time_offset={'time_offset', 0x3d, [0x0]}, 0x2c}]}) pipe(&(0x7f0000002f40)={0xffffffffffffffff}) r1 = open(&(0x7f0000003240)='./file0\x00', 0xa0001, 0x20) linkat(r0, &(0x7f0000003200)='./file0\x00', r1, &(0x7f0000003280)='./file0\x00', 0x400) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x80000, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)}, {&(0x7f0000010d00)="0000000000000000000000000000000000000000000000000000000002ae0000ed41000000040000d15bbe5ad15bbe5ad15bbe5a00000000000005002000000000000800070000000af301000400000000000000000000000100000030000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a1950000", 0xa0, 0x8c60}, {&(0x7f0000011a00)="020000000c0001022e000000020000000c0002022e2e00000b00000014000a026c6f73742b666f756e6400000c0000001000050166696c65300000000d0000001000050266696c65310000000f0000001000050166696c6532000000100000001000050166696c6533000000110000001000050166696c65340000001200000010000802564944454f5f54531400000068031201d181d18ed0b7d0bad0b0d0bbd0bbd0b5d1800000000000000000000000000000000000000000000000000000", 0xc0, 0xc000}, {&(0x7f0000012200)="0000000000000000000000000000000000000000000000000c0000dec910dfd800000000f4030000000000000000000000000000000000000000000000000000", 0x40, 0x117e0}, {&(0x7f0000012a00)="0d0000000c0001022e000000020000000c0002022e2e00000e000000dc03050166696c6530000000000000000000000000000000000000000000000000000000", 0x40, 0x1c000}], 0x0, &(0x7f0000013000)) syz_mount_image$bfs(&(0x7f0000000040)='bfs\x00', &(0x7f00000008c0)='./file0\x00', 0x20, 0x2, &(0x7f0000000180)=[{&(0x7f00000005c0)="f37e57346e86cb5adec662d7bd6f13a3764d2ca7640f9f81ba88d0689d0989735a7bafd5558d9a6e8988f9f6038fa475e49077bc8cfc6e170c4cdbaaa1375895c9a4068559d3cecf2a0423caa696bf77a75b3ae3f32b79da059ca13d055647998987fc2033d008bd55deb08808372b9b4595fb0d79a1358cd5949d859a7d155e86db4b608eb401109f6b792f5ce4a2ead9870dee49347bc08d0d54b0e4fca4fd895947a737f4ee823d997770e5c9df50c0c9fe2c0b945c6ffd13b7151e385b631520ac34a5967c6cd0d12b3746795681600541c17d379daed41ce8e715eba582fb668e160872a2", 0xe7, 0x7}, {&(0x7f0000000780)="6154d093a5a905da96fed5f8dea36bcd9d1d011246f7caf86806bf6ac6301d2d2b448461b867bbbe7d0eebdeafa16d7219af85ff4372670039ce277546def59f1d0eed4be4386a34c7243fe3ec84ad3807136a2c3ec35d6d87a7d7bb9342622cc3a7ff529ef3d76ff57fc7a1856f50b98e518515a9e679067cfc0e8500754fa30a81cf4dc42c5a0d36647280c5b0a8506efaf9ad06594678176efe4bdbcf7ab384b597df4c5ad66b2bd240823abe04cd30785819f1c7fd4d46bb55f8bd09ca4b44618b010e363fa572ca189ec73b36ad46b6f38d65c0acc417", 0xd9, 0x5}], 0x200000, 0x0) syz_mount_image$jfs(&(0x7f0000000080)='jfs\x00', &(0x7f0000000880)='./file0\x00', 0xfffffffffffffffe, 0x3, &(0x7f0000002dc0)=[{&(0x7f0000000900)="efee47debce411554253d03f2175c060de26b9a7a197d9327971105aafdf17a061227fe7dd52d3c1c1f0318992f304f7646c3eb4e32ff0514d34d4605b4e152474aa71ac6c0ba890b1f249f213d5bc162b605fdf3c524d6f84e1a2f8461d26ef5dd50b193ffb710ee69fc431552ae4548f0c1a7e503243bb10c53c566f37e3234d8b3d418992dca946568d275e1f54895a854bab3790963108fe6ce5b1f933e81bd0aa2dfd715aca4bd81b48b28e3ee265", 0xb1, 0x1}, {&(0x7f0000001a80)="b4bc90ad72742e5693f04c7955b05460b33cd0ca9cde365dbe1671162a8c1db744cb8a04d1d747ab4d3234fd615e6ad897396c21b8bf7da2c1d524d04fadade841e5acfac529250a2c75fed4b65a7b6c8735268244189e020c526112728097958fd591d00cd16d1591db9b0414d985d7718794369eb03d89403b7df76f6d745c94d4fa986321a9915fea55a73472bc39620fcf22ec74d02b77fafe6ccf72605eb0ba7ae69fa10a36d281e65a178528bc654ce5b6109d5294e400b18be755a3b899489b27a876ac3ea033ed525b28c7dff537b5210cbff466dc339e1f58db1679816589e886264ef1bcf6d0e1408d93946827711972", 0xf5, 0x7}, {&(0x7f0000002cc0)="c9bc1928c9ffffe99fdae39f5013810a038f1d558affc92341c81ee308195dabd95fcfedcfccd4cf2af62477e5ed935114b73940dba239c47d5824a3332fb48cea682934a6840ea5db2529c3a7c371bbf08f08bb15458de586609be64b699f29b7384dc7b2ba78f0e343fb9851eaf5a7b4106fc5b7a8aaf6e069012286fa7259807928cbee722222f45e6c98cefa00829bcdd92bd03273c7b0f20453c72150adf49c311248d3d3d96ad17187d60add3d1d8fbfbc5e572ceba134e5c533a5f75630a35514ee998b85a755085c04513dcc0047461d78f4aa8fdf0309fc39e3e4a1c24b45", 0xe3, 0x4}], 0x10000, &(0x7f0000002ec0)={[{@nodiscard='nodiscard', 0x2c}, {@resize='resize', 0x2c}, {@noquota='noquota', 0x2c}, {@umask={'umask', 0x3d, [0x3f]}, 0x2c}]}) [ 489.131968] jfs: Unrecognized mount option "umask=?" or missing value [ 489.230796] FAT-fs (loop4): Unrecognized mount option "time_offset=" or missing value [ 489.252978] BFS-fs: bfs_fill_super(): No BFS filesystem on loop4 (magic=00000000) [ 489.279997] jfs: Unrecognized mount option "umask=?" or missing value [ 489.690324] audit: type=1326 audit(1522438970.713:12): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=5504 comm="syz-executor7" exe="/root/syz-executor7" sig=31 arch=c000003e syscall=202 compat=0 ip=0x454e79 code=0xffff0000 2018/03/30 19:42:51 executing program 2: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) readv(0xffffffffffffffff, &(0x7f0000001480), 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f00003b9fdc)) readv(r0, &(0x7f0000001980)=[{&(0x7f00000018c0)=""/182, 0xb6}], 0x1) r1 = syz_open_pts(r0, 0x2) setsockopt$inet6_mtu(0xffffffffffffffff, 0x29, 0x17, &(0x7f0000000440)=0x5, 0x4) socket$inet_sctp(0x2, 0x5, 0x84) dup3(r1, r0, 0x0) socket$inet(0x2, 0x0, 0x0) setsockopt$bt_l2cap_L2CAP_OPTIONS(0xffffffffffffffff, 0x6, 0x1, &(0x7f0000000380)={0xefa, 0x800, 0x0, 0x0, 0x9}, 0xc) 2018/03/30 19:42:51 executing program 5: unshare(0x40000000) perf_event_open(&(0x7f000001d000)={0x2, 0x78, 0xe2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket(0xa, 0x1, 0x0) ioctl(r0, 0x8982, &(0x7f0000000000)) r1 = socket$packet(0x11, 0x0, 0x300) r2 = openat$cuse(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/cuse\x00', 0x82, 0x0) io_setup(0x43f, &(0x7f00000000c0)=0x0) io_submit(r3, 0x1, &(0x7f0000000000)=[&(0x7f0000000200)={0x0, 0x0, 0x0, 0x1, 0x0, r2, &(0x7f0000000040)="10000000020400000000000000000000", 0x10}]) r4 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000280)='/proc/sys/net/ipv4/vs/secure_tcp\x00', 0x2, 0x0) sendmsg$kcm(r4, &(0x7f0000001f00)={&(0x7f0000001b40)=@pppol2tpin6={0x18, 0x1, {0x0, r1, 0x0, 0x1, 0x0, 0x0, {0xa, 0x4e24, 0xc1, @mcast1={0xff, 0x1, [], 0x1}}}}, 0x80, &(0x7f0000001d80)=[{&(0x7f0000001bc0)="a9db123ebf124fab0f2eec9774559e3b5870fb7c6818fc89c4b8742d057480657265ae2b34fb2d4e585d22ca1bf7b0a22ce38a20a819d919947c78f8d5c9f3291905fd3ed2b8ef8a79d9453396c6b0b7eb0778dbc49b32ae91e443b64edddcf320c1589c7777eadd4e57c01b20a8ca7a831e8e2c104d0194d52fb5c35b550f", 0x7f}], 0x1, &(0x7f0000001dc0)=ANY=[], 0x0, 0x90}, 0x20000000) r5 = syz_open_dev$tun(&(0x7f00000001c0)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r5, 0x400454ca, &(0x7f0000000200)={'bridge0\x00\x00p\x00', 0x4000000000001005}) socketpair(0x1d, 0x3, 0x40, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_inet_SIOCSIFADDR(r6, 0x8916, &(0x7f0000000100)={'bridge8\x00', {0x2, 0x0, @dev={0xac, 0x14, 0x14}}}) ioctl$LOOP_SET_FD(r2, 0x4c00, r1) ioctl$SNDRV_SEQ_IOCTL_RUNNING_MODE(0xffffffffffffffff, 0xc0105303, &(0x7f00000002c0)={0x2, 0x8}) add_key$keyring(&(0x7f00000000c0)='keyring\x00', &(0x7f0000000100)={0x73, 0x79, 0x7a}, 0x0, 0x0, 0x0) clone(0x0, &(0x7f0000000040), &(0x7f0000000080), &(0x7f0000000000), &(0x7f0000000100)) ioctl$int_in(0xffffffffffffffff, 0x800000c004500a, &(0x7f0000006ff8)) wait4(0x0, 0x0, 0x4, &(0x7f0000000380)) ioctl$sock_inet_sctp_SIOCINQ(r7, 0x541b, &(0x7f0000000180)) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_PORT(0xffffffffffffffff, 0xc0a85352, &(0x7f0000001980)={{}, 'port1\x00', 0x0, 0x20010, 0x1f, 0x0, 0x3, 0x40, 0x0, 0x0, 0x4, 0x6d1}) 2018/03/30 19:42:51 executing program 3: r0 = syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x0, 0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$netlink_NETLINK_ADD_MEMBERSHIP(0xffffffffffffffff, 0x10e, 0x1, &(0x7f0000000240), 0x4) rmdir(&(0x7f0000000080)='./file0\x00') connect$nfc_llcp(0xffffffffffffffff, &(0x7f0000000540)={0x27, 0x0, 0x0, 0x0, 0x7, 0x6, "4021bc5c62a8b600554fd217a152db8c5e202690ff5e106c7c3952d6060c481cf11e7913f883ddd296bfa5479216af340d0d68910e8d8adb388f562a8d6718"}, 0xab) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000000)={'lo\x00'}) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000001d40)={'lo\x00', 0xfff}) getsockopt$inet_sctp_SCTP_HMAC_IDENT(0xffffffffffffffff, 0x84, 0x16, &(0x7f0000000280)=ANY=[@ANYBLOB="09003c9dbb007f000300501c0100bc28f2"], &(0x7f0000000200)=0x1) ioctl$TIOCSTI(0xffffffffffffffff, 0x5412, 0x7) pread64(r0, &(0x7f0000000080)=""/156, 0x9c, 0x0) openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000700)='/dev/vga_arbiter\x00', 0x0, 0x0) getsockopt$inet_sctp_SCTP_GET_PEER_ADDRS(r0, 0x84, 0x6c, &(0x7f0000000740)={0x0, 0x7, "10b402dd98f261"}, &(0x7f0000000180)=0xf) getsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000040), 0x10) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f00001cb000)={&(0x7f00008e5ff4)={0x10}, 0xc, &(0x7f0000f4a000)={&(0x7f000019bf9b)=ANY=[]}, 0x1}, 0x0) ioctl$DRM_IOCTL_DMA(r0, 0xc0286429, &(0x7f00000004c0)={0x0, 0x1, &(0x7f00000003c0)=[0x0], &(0x7f0000000400)=[0xaeef, 0x9, 0x60, 0x0, 0x0, 0x3800000, 0x1], 0x1, 0x3, 0x7, &(0x7f0000000440)=[0xffff, 0x0, 0x0], &(0x7f0000000480)=[0x7]}) getsockopt$inet_sctp_SCTP_DEFAULT_SEND_PARAM(r0, 0x84, 0xa, &(0x7f0000000140)={0x0, 0x0, 0x200, 0x7, 0x0, 0x0, 0x3cb, 0xfffffffffffeffff}, &(0x7f00000001c0)=0x20) 2018/03/30 19:42:51 executing program 7: getsockopt$inet_mreqsrc(0xffffffffffffffff, 0x0, 0x27, &(0x7f00000002c0)={@remote, @multicast2, @multicast2}, &(0x7f0000000300)=0xc) getsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER_VALUE(0xffffffffffffff9c, 0x84, 0x7c, &(0x7f00000000c0)={0x0, 0x7}, &(0x7f0000000100)) r1 = accept4(0xffffffffffffff9c, 0x0, &(0x7f00000003c0), 0x0) getsockopt$inet_sctp_SCTP_LOCAL_AUTH_CHUNKS(r1, 0x84, 0x1b, &(0x7f00000009c0)=ANY=[@ANYRES32, @ANYBLOB], &(0x7f00000004c0)=0x2) getsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(0xffffffffffffffff, 0x84, 0x18, &(0x7f0000000140)={r0, 0x1}, &(0x7f0000000180)=0x8) unshare(0x40000000) ioctl$DRM_IOCTL_GET_MAGIC(0xffffffffffffffff, 0x80046402, &(0x7f0000000040)=0xfffffffffffffffe) setsockopt$netrom_NETROM_T1(r1, 0x103, 0x1, &(0x7f0000000900), 0x4) syz_genetlink_get_family_id$ipvs(&(0x7f0000000b00)='IPVS\x00') sendmsg$IPVS_CMD_GET_DEST(r1, &(0x7f0000000980)={&(0x7f0000000540)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000940)={&(0x7f0000000c80)=ANY=[@ANYBLOB="80000000"], 0x1}, 0x1, 0x0, 0x0, 0x10}, 0x90) getpeername$packet(r1, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @dev}, &(0x7f0000000280)=0x14) getsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r1, 0x84, 0x9, &(0x7f0000000b40)={r0, @in={{0x2, 0x4e21, @multicast2=0xe0000002}}, 0x80000000, 0x5, 0x0, 0x4, 0x83}, &(0x7f0000000580)=0x98) setsockopt$inet_mreqn(r1, 0x0, 0x24, &(0x7f0000000400)={@remote={0xac, 0x14, 0x14, 0xbb}, @broadcast=0xffffffff, r2}, 0xc) ioctl$sock_SIOCBRDELBR(r1, 0x89a1, &(0x7f0000000440)='erspan0\x00') getsockopt$inet6_mreq(r1, 0x29, 0x0, &(0x7f0000000480)={@local}, &(0x7f0000000500)=0x14) r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000dc0)='./cg\x00', 0x200002, 0x0) fchdir(r3) r4 = creat(&(0x7f0000000040)='./file1\x00', 0x0) r5 = dup3(0xffffffffffffffff, r3, 0x0) pwritev(0xffffffffffffffff, &(0x7f0000000b40)=[{&(0x7f0000000100)="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", 0x86d}], 0x1, 0x0) ftruncate(r4, 0x3) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000b00)) ioctl$sock_inet_SIOCSIFDSTADDR(r5, 0x8918, &(0x7f0000000c00)={'erspan0\x00', {0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x1a}}}) ioctl$TIOCGPTPEER(0xffffffffffffffff, 0x5441, 0x6) getsockopt$EBT_SO_GET_INIT_INFO(0xffffffffffffffff, 0x0, 0x82, &(0x7f0000000980)={'broute\x00'}, &(0x7f0000000c40)=0x50) socket$l2tp(0x18, 0x1, 0x1) ioctl$fiemap(r3, 0xc020660b, &(0x7f0000000e80)=ANY=[@ANYBLOB="0400000000000000ff0f00000000000001000000020000000200000000fcff00800000000000000005000000000000007f000000000000000000010000000000000000000000000002000000000000000000000000000000ff000000000000000200000000000000070000000000000000"]) 2018/03/30 19:42:51 executing program 6: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_mreqn(r0, 0x0, 0x27, &(0x7f0000000000)={@multicast2=0xe0000002, @loopback=0x7f000001}, 0xc) getsockopt$inet_sctp6_SCTP_FRAGMENT_INTERLEAVE(0xffffffffffffffff, 0x84, 0x12, &(0x7f0000000080), &(0x7f00000000c0)=0x4) ioctl$sock_inet_SIOCGIFDSTADDR(0xffffffffffffffff, 0x8917, &(0x7f0000000040)={'bcsh0\x00', {0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x1a}}}) setsockopt$inet_sctp6_SCTP_MAX_BURST(0xffffffffffffffff, 0x84, 0x14, &(0x7f0000000380)=@int=0x3, 0x4) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000140)={'bcsh0\x00', 0x0}) ioctl$sock_inet6_SIOCDELRT(0xffffffffffffffff, 0x890c, &(0x7f0000000180)={@dev={0xfe, 0x80, [], 0x13}, @loopback={0x0, 0x1}, @mcast2={0xff, 0x2, [], 0x1}, 0x6, 0x0, 0x42e, 0x100, 0x9, 0x80000000, r1}) r2 = socket$inet(0x2, 0xa, 0x5) setsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX(r2, 0x84, 0x6e, &(0x7f0000000600)=[@in={0x2, 0x4e21, @multicast1=0xe0000001}, @in6={0xa, 0x4e20, 0x0, @remote={0xfe, 0x80, [], 0xbb}}, @in={0x2, 0x4e22, @multicast2=0xe0000002}, @in6={0xa, 0x4e21, 0x1ff, @local={0xfe, 0x80, [], 0xaa}, 0x84}, @in6={0xa, 0x4e20, 0x4, @local={0xfe, 0x80, [], 0xaa}}], 0x74) getsockopt$inet_sctp6_SCTP_PR_SUPPORTED(0xffffffffffffffff, 0x84, 0x71, &(0x7f0000000200)={0x0, 0x8}, &(0x7f0000000240)=0x8) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(0xffffffffffffffff, 0x84, 0x6f, &(0x7f0000000300)={r3, 0x70, &(0x7f0000000280)=[@in={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x12}}, @in={0x2, 0x4e24, @loopback=0x7f000001}, @in={0x2, 0x0, @remote={0xac, 0x14, 0x14, 0xbb}}, @in={0x2, 0x4e23, @dev={0xac, 0x14, 0x14}}, @in={0x2, 0x4e24, @remote={0xac, 0x14, 0x14, 0xbb}}, @in={0x2, 0x4e24, @rand_addr=0x3ff}, @in={0x2, 0x4e24, @multicast2=0xe0000002}]}, &(0x7f0000000340)=0x10) setsockopt$inet_sctp6_SCTP_SET_PEER_PRIMARY_ADDR(0xffffffffffffffff, 0x84, 0x5, &(0x7f00000004c0)={r4, @in={{0x2, 0x4e20, @rand_addr=0x8}}}, 0x84) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, &(0x7f00000003c0)={'lo\x00', 0x4100}) ioctl$sock_inet_SIOCGIFNETMASK(0xffffffffffffffff, 0x891b, &(0x7f0000000100)={'nr0\x00', {0x2, 0x4e24, @loopback=0x7f000001}}) setsockopt$inet_msfilter(r0, 0x0, 0x29, &(0x7f0000000680)=ANY=[@ANYBLOB="cf0000000276d172390cc8c4ff4f3b746e5947c2ddb66a93ebb6d0f75b5f453435c311b94e126c49d47c10682b6e523d09fae1d416ebface98e08aa083e9f1f1afa118eb05655fec48d75d7a37edd032552c60ffeb53a2c8eecbe601a4ac5dceeecf1a943c2d9e2eaf4ad0a93e82a1a37a0cf2adbc4b512680428fee922ad18ff90ec6f87a75b299a953167bf4f9ae31cffd2c31dd47ba7d69151424dc1b2835f7624a302f270eb89118043dc1e1faa46e667be9cbf4456ad0c580ed032e4e49459f68f8a70f2dfe40f51362ffae"], 0x1) pread64(r0, &(0x7f0000000340)=""/181, 0xb5, 0x62) setsockopt$inet_msfilter(r0, 0x0, 0x29, &(0x7f0000000580)=ANY=[@ANYBLOB="e00000027f0000010000000001000000000000006b59aa51deb20d6efc9c04b7c9420f6434d31cbbe99b52873a8c21"], 0x1) socket$inet_udp(0x2, 0x2, 0x0) bpf$BPF_PROG_GET_NEXT_ID(0xb, &(0x7f0000000400)=0x7, 0x4) r5 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000ba4000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x2, 0x78, 0xe2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, r5, 0x0) r6 = perf_event_open(&(0x7f0000014f88)={0x1, 0x78, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00002e8000)}}, 0x0, 0x0, r5, 0x0) readv(r6, &(0x7f0000734000)=[{&(0x7f0000d42000)=""/146, 0x92}], 0x1) getsockopt$inet_sctp_SCTP_PEER_ADDR_THLDS(0xffffffffffffffff, 0x84, 0x1f, &(0x7f0000000480)={0x0, @in={{0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0xd}}}, 0xf80866d, 0x5}, &(0x7f0000000540)=0x90) getsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(0xffffffffffffff9c, 0x84, 0x18, &(0x7f0000000440)={r7, 0x400000000004}, &(0x7f00000005c0)=0xffffffffffffffc3) getsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER_VALUE(r0, 0x84, 0x7c, &(0x7f00000002c0)={r8, 0x10001, 0xc9e9}, &(0x7f0000000300)=0x8) 2018/03/30 19:42:51 executing program 1: r0 = syz_open_dev$amidi(&(0x7f0000000040)='/dev/amidi#\x00', 0x3, 0x28000) ioctl$DRM_IOCTL_RES_CTX(r0, 0xc0086426, &(0x7f0000000100)={0x2c, &(0x7f00000000c0)=[{}, {}, {}, {}, {}, {}, {}, {}]}) socket$netlink(0x10, 0x3, 0xc) writev(0xffffffffffffffff, &(0x7f00000021c0), 0x0) bind$bt_l2cap(r0, &(0x7f0000000340)={0x1f, 0x800000000000002, {0x401, 0x3, 0xb, 0x3f8}}, 0x9) socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f0000a8d000)={&(0x7f0000c78ff4)={0x10}, 0xc, &(0x7f0000df6000)={&(0x7f0000000200)=ANY=[@ANYBLOB="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"], 0x10e}, 0x1}, 0x0) r1 = socket$inet_sctp(0x2, 0x5, 0x84) sendmsg$inet_sctp(r1, &(0x7f0000001f00)={&(0x7f0000001840)=@in={0x2, 0x0, @dev={0xac, 0x14, 0x14}}, 0x10, &(0x7f0000001c40)=[{&(0x7f0000001880)='[', 0x1}], 0x1, &(0x7f0000001e40)}, 0x40) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000540)=@nat={'nat\x00', 0x19, 0x3, 0x376, [0x20000140, 0x0, 0x0, 0x20000170, 0x200002d0], 0x0, &(0x7f0000000100), &(0x7f00000006c0)=ANY=[@ANYBLOB="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"]}, 0x3ee) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000002980)) getsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(0xffffffffffffffff, 0x84, 0x1f, &(0x7f0000000440)={0x0, @in={{0x2, 0x4e22, @multicast2=0xe0000002}}, 0x7bb7, 0x4}, &(0x7f0000000500)=0x90) getsockopt$inet_sctp_SCTP_RTOINFO(0xffffffffffffffff, 0x84, 0x0, &(0x7f0000002240)={0x0, 0x9, 0x417}, &(0x7f00000001c0)=0x10) r2 = socket(0x22, 0x4, 0x3) r3 = socket(0x20000001e, 0x5, 0x0) r4 = perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$packet_tx_ring(r3, 0x10f, 0x87, &(0x7f0000265000)=@req={0x3fc, 0x0, 0x1}, 0x10) getegid() setsockopt$packet_tx_ring(r2, 0x10f, 0x87, &(0x7f0000265000)=@req={0x3fc, 0x0, 0x1}, 0x10) writev(r2, &(0x7f00000000c0)=[{&(0x7f0000000000)="8a", 0x1}], 0x1) close(r2) close(r3) perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r5 = syz_open_dev$evdev(&(0x7f0000dfdfee)='/dev/input/event#\x00', 0x0, 0x2) readv(r5, &(0x7f0000019fe0)=[{&(0x7f00008ec000)=""/219, 0xdb}], 0x1) write$evdev(r5, &(0x7f000004d000)=[{{}, 0x0, 0x1}, {{0x2}}], 0x30) r6 = getpgrp(0x0) setsockopt$ax25_int(r3, 0x101, 0xd, &(0x7f0000000080)=0x7, 0x4) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x8, 0xfffffffffffffffd, 0x9, 0x7, 0x0, 0x8001, 0x0, 0x6, 0x3ff, 0x4, 0x5, 0x4, 0xbd9, 0x56, 0x8000, 0x7f, 0xff, 0xeba, 0x1f, 0x0, 0xfd, 0x3, 0x1, 0x50, 0x7, 0x9, 0x641800, 0x3ff8000000000000, 0x4, 0x0, 0x10000, 0x5, 0x7, 0x6, 0x1, 0xffffffffffffffe0, 0x0, 0x20, 0x0, @perf_bp={&(0x7f0000000040), 0x8}, 0x20, 0x401, 0x8, 0x3, 0x8, 0x7, 0x7}, r6, 0xc, r4, 0x0) syz_genetlink_get_family_id$ipvs(&(0x7f0000000040)='IPVS\x00') 2018/03/30 19:42:51 executing program 4: symlinkat(&(0x7f0000002f00)='./file0\x00', 0xffffffffffffffff, &(0x7f0000002f80)='./file0\x00') syz_mount_image$msdos(&(0x7f0000002fc0)='msdos\x00', &(0x7f0000003000)='./file0\x00', 0x4, 0x1, &(0x7f0000003180)=[{&(0x7f0000003040)="eaf9610c9f7031a1f58e51e73b3f0bd5af4364c38bbe335dbd3d211ec0338ba4c795c634af757a3c684da6110f67891133a6303441b21d139e3a6582efdaeabd3d68dbcb85cd383733a98084b62807af0b7ea49d68daa4cc9fda43dbeb13c3e67c44c463a2c429ccb66c0e1a9dfd5c911d4d7b578baaad6571d4457b9c6d92122a4bd97f5f174c81081941b007062f2cab2db1466851dde671e025909a633fec433bb2512fc61c436b74df23d280019a403884dc488071", 0xb7, 0xcd7}], 0x8, &(0x7f00000031c0)={[{@errors_continue='errors=continue', 0x2c}, {@time_offset={'time_offset', 0x3d, [0x0]}, 0x2c}]}) pipe(&(0x7f0000002f40)={0xffffffffffffffff}) r1 = open(&(0x7f0000003240)='./file0\x00', 0xa0001, 0x20) linkat(r0, &(0x7f0000003200)='./file0\x00', r1, &(0x7f0000003280)='./file0\x00', 0x400) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x80000, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)}, {&(0x7f0000010d00)="0000000000000000000000000000000000000000000000000000000002ae0000ed41000000040000d15bbe5ad15bbe5ad15bbe5a00000000000005002000000000000800070000000af301000400000000000000000000000100000030000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a1950000", 0xa0, 0x8c60}, {&(0x7f0000011a00)="020000000c0001022e000000020000000c0002022e2e00000b00000014000a026c6f73742b666f756e6400000c0000001000050166696c65300000000d0000001000050266696c65310000000f0000001000050166696c6532000000100000001000050166696c6533000000110000001000050166696c65340000001200000010000802564944454f5f54531400000068031201d181d18ed0b7d0bad0b0d0bbd0bbd0b5d1800000000000000000000000000000000000000000000000000000", 0xc0, 0xc000}, {&(0x7f0000012200)="0000000000000000000000000000000000000000000000000c0000dec910dfd800000000f4030000000000000000000000000000000000000000000000000000", 0x40, 0x117e0}, {&(0x7f0000012a00)="0d0000000c0001022e000000020000000c0002022e2e00000e000000dc03050166696c6530000000000000000000000000000000000000000000000000000000", 0x40, 0x1c000}], 0x0, &(0x7f0000013000)) syz_mount_image$bfs(&(0x7f0000000040)='bfs\x00', &(0x7f00000008c0)='./file0\x00', 0x20, 0x2, &(0x7f0000000180)=[{&(0x7f00000005c0)="f37e57346e86cb5adec662d7bd6f13a3764d2ca7640f9f81ba88d0689d0989735a7bafd5558d9a6e8988f9f6038fa475e49077bc8cfc6e170c4cdbaaa1375895c9a4068559d3cecf2a0423caa696bf77a75b3ae3f32b79da059ca13d055647998987fc2033d008bd55deb08808372b9b4595fb0d79a1358cd5949d859a7d155e86db4b608eb401109f6b792f5ce4a2ead9870dee49347bc08d0d54b0e4fca4fd895947a737f4ee823d997770e5c9df50c0c9fe2c0b945c6ffd13b7151e385b631520ac34a5967c6cd0d12b3746795681600541c17d379daed41ce8e715eba582fb668e160872a2", 0xe7, 0x7}, {&(0x7f0000000780)="6154d093a5a905da96fed5f8dea36bcd9d1d011246f7caf86806bf6ac6301d2d2b448461b867bbbe7d0eebdeafa16d7219af85ff4372670039ce277546def59f1d0eed4be4386a34c7243fe3ec84ad3807136a2c3ec35d6d87a7d7bb9342622cc3a7ff529ef3d76ff57fc7a1856f50b98e518515a9e679067cfc0e8500754fa30a81cf4dc42c5a0d36647280c5b0a8506efaf9ad06594678176efe4bdbcf7ab384b597df4c5ad66b2bd240823abe04cd30785819f1c7fd4d46bb55f8bd09ca4b44618b010e363fa572ca189ec73b36ad46b6f38d65c0acc417", 0xd9, 0x5}], 0x200000, 0x0) syz_mount_image$jfs(&(0x7f0000000080)='jfs\x00', &(0x7f0000000880)='./file0\x00', 0xfffffffffffffffe, 0x3, &(0x7f0000002dc0)=[{&(0x7f0000000900)="efee47debce411554253d03f2175c060de26b9a7a197d9327971105aafdf17a061227fe7dd52d3c1c1f0318992f304f7646c3eb4e32ff0514d34d4605b4e152474aa71ac6c0ba890b1f249f213d5bc162b605fdf3c524d6f84e1a2f8461d26ef5dd50b193ffb710ee69fc431552ae4548f0c1a7e503243bb10c53c566f37e3234d8b3d418992dca946568d275e1f54895a854bab3790963108fe6ce5b1f933e81bd0aa2dfd715aca4bd81b48b28e3ee265", 0xb1, 0x1}, {&(0x7f0000001a80)="b4bc90ad72742e5693f04c7955b05460b33cd0ca9cde365dbe1671162a8c1db744cb8a04d1d747ab4d3234fd615e6ad897396c21b8bf7da2c1d524d04fadade841e5acfac529250a2c75fed4b65a7b6c8735268244189e020c526112728097958fd591d00cd16d1591db9b0414d985d7718794369eb03d89403b7df76f6d745c94d4fa986321a9915fea55a73472bc39620fcf22ec74d02b77fafe6ccf72605eb0ba7ae69fa10a36d281e65a178528bc654ce5b6109d5294e400b18be755a3b899489b27a876ac3ea033ed525b28c7dff537b5210cbff466dc339e1f58db1679816589e886264ef1bcf6d0e1408d93946827711972", 0xf5, 0x7}, {&(0x7f0000002cc0)="c9bc1928c9ffffe99fdae39f5013810a038f1d558affc92341c81ee308195dabd95fcfedcfccd4cf2af62477e5ed935114b73940dba239c47d5824a3332fb48cea682934a6840ea5db2529c3a7c371bbf08f08bb15458de586609be64b699f29b7384dc7b2ba78f0e343fb9851eaf5a7b4106fc5b7a8aaf6e069012286fa7259807928cbee722222f45e6c98cefa00829bcdd92bd03273c7b0f20453c72150adf49c311248d3d3d96ad17187d60add3d1d8fbfbc5e572ceba134e5c533a5f75630a35514ee998b85a755085c04513dcc0047461d78f4aa8fdf0309fc39e3e4a1c24b4538acbf23", 0xe7, 0x4}], 0x10000, &(0x7f0000002ec0)={[{@nodiscard='nodiscard', 0x2c}, {@resize='resize', 0x2c}, {@noquota='noquota', 0x2c}, {@umask={'umask', 0x3d, [0x3f]}, 0x2c}]}) 2018/03/30 19:42:51 executing program 0: setsockopt$inet_sctp_SCTP_RTOINFO(0xffffffffffffffff, 0x84, 0x0, &(0x7f0000001000)={0x10000, 0x4, 0x100, 0x400}, 0x10) pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$inet_sctp_SCTP_ASSOCINFO(r0, 0x84, 0x1, &(0x7f0000000780)={0x0, 0x200, 0x1, 0x7, 0x0, 0x8}, &(0x7f00000007c0)=0x14) getsockopt$inet_sctp_SCTP_GET_PEER_ADDR_INFO(r0, 0x84, 0xf, &(0x7f0000000800)={0x0, @in6={{0xa, 0x4e22, 0x4, @local={0xfe, 0x80, [], 0xaa}, 0xffff}}, 0x100000000, 0x80, 0x7ff, 0x101, 0x9}, &(0x7f00000008c0)=0x98) getsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(r1, 0x84, 0xa, &(0x7f0000000900)={0x6, 0x7fff, 0x8002, 0xfff, 0x686, 0x512, 0x81, 0x6f172043}, &(0x7f0000000940)=0x20) getsockopt$inet_sctp_SCTP_CONTEXT(r0, 0x84, 0x11, &(0x7f0000002040)={0x0, 0x5875}, &(0x7f0000002080)=0x8) getsockopt$inet_sctp6_SCTP_DEFAULT_SNDINFO(r0, 0x84, 0x22, &(0x7f00000033c0)={0xfff, 0x8, 0x6, 0xd34}, &(0x7f0000003400)=0x10) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f0000003440)={0x3, [0x0, 0x0, 0x0]}, &(0x7f0000003480)=0x10) getsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r0, 0x84, 0x9, &(0x7f00000035c0)={0x0, @in6={{0xa, 0x4e24, 0x7, @remote={0xfe, 0x80, [], 0xbb}, 0x3}}, 0x2b6c, 0x0, 0x0, 0x0, 0x50}, &(0x7f0000003680)=0x98) sendmmsg$inet_sctp(r1, &(0x7f0000003840)=[{&(0x7f0000000380)=@in6={0xa, 0x4e24, 0x90, @ipv4={[], [0xff, 0xff], @multicast2=0xe0000002}, 0x4}, 0x1c, &(0x7f0000000700)=[{&(0x7f0000000400)="c032e356b44e2714e4f49062013e7b5966a09c1cb7e5809f9c4585851ad3f5d2da01e257103db034942d8f76bda9a8ba61b0a4c205ce60675f7dbe8cbcf5df94af28b4b10b86b1a7a0ceb5b1da30d440d86b1a29e9c0515bf3551ed001e2936350f6968bec8bfecce099", 0x6a}], 0x1, &(0x7f0000000980)}], 0x1, 0x0) getresuid(&(0x7f00000002c0), &(0x7f0000000300), &(0x7f0000000340)) setsockopt$inet_pktinfo(r1, 0x0, 0x8, &(0x7f00000003c0)={0x0, @dev={0xac, 0x14, 0x14}}, 0xc) ioctl$DRM_IOCTL_CONTROL(r0, 0x40086414, &(0x7f00000000c0)={0x2}) sendmsg$IPVS_CMD_GET_CONFIG(r1, &(0x7f00000001c0)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x20e1008}, 0xc, &(0x7f0000000180)={&(0x7f0000000100)=ANY=[]}, 0x1}, 0x0) r2 = socket(0x11, 0x4000000000080003, 0x0) setsockopt(r2, 0x107, 0xd, &(0x7f0000001000), 0x47e) mmap(&(0x7f0000399000/0x1000)=nil, 0x40000, 0x0, 0x12, r2, 0x0) setsockopt$packet_tx_ring(r2, 0x107, 0xd, &(0x7f0000000000), 0x10) getpeername$inet(r1, &(0x7f0000000140)={0x0, 0x0, @dev}, &(0x7f0000000200)=0x10) getsockopt$bt_BT_SNDMTU(r1, 0x112, 0xc, &(0x7f0000000240), &(0x7f0000000280)=0x2) [ 490.098546] IPVS: ftp: loaded support on port[0] = 21 [ 490.103561] FAT-fs (loop4): Unrecognized mount option "time_offset=" or missing value [ 490.123175] kernel msg: ebtables bug: please report to author: EBT_ENTRY_OR_ENTRIES shouldn't be set in distinguisher 2018/03/30 19:42:51 executing program 0: r0 = dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x80000) ioctl$LOOP_SET_STATUS64(r0, 0x4c04, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x1d, 0x0, "b2cdc16948c2d8defdc6ccd7e69370cd89206e757600f494a6f386fd75de4ec168412aefa9b47ddce6005ef1f5e2188c611f11fe23a9973b4f3b4ca8115d75b6", "adcddcbdd258708ed483b1c6d50b363981c4f943de7510903594aa41b5a7d76826f71b49332e607bd68a9352cd05d36e027047e9bd95b49f71e4f89c99b3dacc", "98731c39612dffb0f3700d6862ad2c5e51f2bf1597643d3216b87c072c7cef3c", [0x4, 0x1]}) r1 = socket$inet6(0xa, 0x400000000001, 0x0) r2 = dup(r1) ioctl$TIOCGSID(r2, 0x5429, &(0x7f0000000440)) getresuid(&(0x7f0000000640), &(0x7f0000000680), &(0x7f00000006c0)) gettid() lstat(&(0x7f0000000740)='./file0\x00', &(0x7f0000000780)) fstat(r0, &(0x7f0000000800)) r3 = getpgrp(0xffffffffffffffff) getresgid(&(0x7f00000009c0), &(0x7f0000000a00), &(0x7f0000000a40)=0x0) ioctl$sock_FIOGETOWN(r1, 0x8903, &(0x7f0000000a80)=0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x22, &(0x7f0000000ac0)={{{@in6=@mcast1, @in6=@mcast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@local}, 0x0, @in6=@loopback}}, &(0x7f0000000bc0)=0xe8) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f00000022c0)={0x0, 0x0, 0x0}, &(0x7f0000002300)=0xc) sendmsg$netlink(r0, &(0x7f00000024c0)={&(0x7f0000000180)=@kern={0x10, 0x0, 0x0, 0x4000000}, 0xc, &(0x7f0000000700)=[{&(0x7f0000001100)={0x10, 0x34, 0x0, 0x70bd27, 0x25dfdbfe}, 0x10}], 0x1, &(0x7f0000002340)=[@rights={0x18, 0x1, 0x1, [r1, r0]}, @rights={0x38, 0x1, 0x1, [r1, r2, r0, r2, r1, r0, r0, r2, r0]}, @rights={0x20, 0x1, 0x1, [r1, r2, r0, r0]}, @rights={0x18, 0x1, 0x1, [r2]}, @rights={0x30, 0x1, 0x1, [r2, r0, r2, r2, r0, r1, r1]}, @cred={0x20, 0x1, 0x2, r3, 0x0, r4}, @rights={0x18, 0x1, 0x1, [0xffffffffffffffff]}, @cred={0x20, 0x1, 0x2, r5, r6, r7}, @rights={0x20, 0x1, 0x1, [r0, r2, r0, r2]}], 0x130, 0x8000}, 0x800) r8 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup.cpu\x00', 0x200002, 0x0) fchdir(r8) r9 = creat(&(0x7f00000002c0)='./file1\x00', 0x0) write$tun(r9, &(0x7f0000000200)=ANY=[@ANYBLOB="0000047bc9de8c0c530d13ec8f00"], 0x1) clock_gettime(0x0, &(0x7f0000000300)={0x0, 0x0}) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_TEMPO(r0, 0x402c5342, &(0x7f0000000340)={0x3, 0xf634, 0xcc, {r10, r11+10000000}, 0x4, 0x7}) fcntl$setstatus(r9, 0x4, 0x6000) unlink(&(0x7f0000000000)='./file1\x00') r12 = socket$netlink(0x10, 0x3, 0x0) writev(r12, &(0x7f0000011ff0)=[{&(0x7f00000002c0)="390000001300090665000000000000007f0080400300000046000107000000141900040004800000070000000003000000000000000003f500", 0x39}], 0x1) fcntl$getown(r9, 0x9) pwritev(r8, &(0x7f0000000240), 0x0, 0x0) syz_genetlink_get_family_id$ipvs(&(0x7f0000000140)='IPVS\x00') setsockopt$inet_tcp_buf(r9, 0x6, 0xd, &(0x7f00000001c0)="0ff96be526dc7479dc678fe172", 0xd) 2018/03/30 19:42:51 executing program 6: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_mreqn(r0, 0x0, 0x27, &(0x7f0000000000)={@multicast2=0xe0000002, @loopback=0x7f000001}, 0xc) getsockopt$inet_sctp6_SCTP_FRAGMENT_INTERLEAVE(0xffffffffffffffff, 0x84, 0x12, &(0x7f0000000080), &(0x7f00000000c0)=0x4) ioctl$sock_inet_SIOCGIFDSTADDR(0xffffffffffffffff, 0x8917, &(0x7f0000000040)={'bcsh0\x00', {0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x1a}}}) setsockopt$inet_sctp6_SCTP_MAX_BURST(0xffffffffffffffff, 0x84, 0x14, &(0x7f0000000380)=@int=0x3, 0x4) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000140)={'bcsh0\x00', 0x0}) ioctl$sock_inet6_SIOCDELRT(0xffffffffffffffff, 0x890c, &(0x7f0000000180)={@dev={0xfe, 0x80, [], 0x13}, @loopback={0x0, 0x1}, @mcast2={0xff, 0x2, [], 0x1}, 0x6, 0x0, 0x42e, 0x100, 0x9, 0x80000000, r1}) r2 = socket$inet(0x2, 0xa, 0x5) setsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX(r2, 0x84, 0x6e, &(0x7f0000000600)=[@in={0x2, 0x4e21, @multicast1=0xe0000001}, @in6={0xa, 0x4e20, 0x0, @remote={0xfe, 0x80, [], 0xbb}}, @in={0x2, 0x4e22, @multicast2=0xe0000002}, @in6={0xa, 0x4e21, 0x1ff, @local={0xfe, 0x80, [], 0xaa}, 0x84}, @in6={0xa, 0x4e20, 0x4, @local={0xfe, 0x80, [], 0xaa}}], 0x74) getsockopt$inet_sctp6_SCTP_PR_SUPPORTED(0xffffffffffffffff, 0x84, 0x71, &(0x7f0000000200)={0x0, 0x8}, &(0x7f0000000240)=0x8) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(0xffffffffffffffff, 0x84, 0x6f, &(0x7f0000000300)={r3, 0x70, &(0x7f0000000280)=[@in={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x12}}, @in={0x2, 0x4e24, @loopback=0x7f000001}, @in={0x2, 0x0, @remote={0xac, 0x14, 0x14, 0xbb}}, @in={0x2, 0x4e23, @dev={0xac, 0x14, 0x14}}, @in={0x2, 0x4e24, @remote={0xac, 0x14, 0x14, 0xbb}}, @in={0x2, 0x4e24, @rand_addr=0x3ff}, @in={0x2, 0x4e24, @multicast2=0xe0000002}]}, &(0x7f0000000340)=0x10) setsockopt$inet_sctp6_SCTP_SET_PEER_PRIMARY_ADDR(0xffffffffffffffff, 0x84, 0x5, &(0x7f00000004c0)={r4, @in={{0x2, 0x4e20, @rand_addr=0x8}}}, 0x84) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, &(0x7f00000003c0)={'lo\x00', 0x4100}) ioctl$sock_inet_SIOCGIFNETMASK(0xffffffffffffffff, 0x891b, &(0x7f0000000100)={'nr0\x00', {0x2, 0x4e24, @loopback=0x7f000001}}) setsockopt$inet_msfilter(r0, 0x0, 0x29, &(0x7f0000000680)=ANY=[@ANYBLOB="cf0000000276d172390cc8c4ff4f3b746e5947c2ddb66a93ebb6d0f75b5f453435c311b94e126c49d47c10682b6e523d09fae1d416ebface98e08aa083e9f1f1afa118eb05655fec48d75d7a37edd032552c60ffeb53a2c8eecbe601a4ac5dceeecf1a943c2d9e2eaf4ad0a93e82a1a37a0cf2adbc4b512680428fee922ad18ff90ec6f87a75b299a953167bf4f9ae31cffd2c31dd47ba7d69151424dc1b2835f7624a302f270eb89118043dc1e1faa46e667be9cbf4456ad0c580ed032e4e49459f68f8a70f2dfe40f51362ffae"], 0x1) pread64(r0, &(0x7f0000000340)=""/181, 0xb5, 0x62) setsockopt$inet_msfilter(r0, 0x0, 0x29, &(0x7f0000000580)=ANY=[@ANYBLOB="e00000027f0000010000000001000000000000006b59aa51deb20d6efc9c04b7c9420f6434d31cbbe99b52873a8c21"], 0x1) socket$inet_udp(0x2, 0x2, 0x0) bpf$BPF_PROG_GET_NEXT_ID(0xb, &(0x7f0000000400)=0x7, 0x4) r5 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000ba4000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x2, 0x78, 0xe2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, r5, 0x0) r6 = perf_event_open(&(0x7f0000014f88)={0x1, 0x78, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00002e8000)}}, 0x0, 0x0, r5, 0x0) readv(r6, &(0x7f0000734000)=[{&(0x7f0000d42000)=""/146, 0x92}], 0x1) getsockopt$inet_sctp_SCTP_PEER_ADDR_THLDS(0xffffffffffffffff, 0x84, 0x1f, &(0x7f0000000480)={0x0, @in={{0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0xd}}}, 0xf80866d, 0x5}, &(0x7f0000000540)=0x90) getsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(0xffffffffffffff9c, 0x84, 0x18, &(0x7f0000000440)={r7, 0x400000000004}, &(0x7f00000005c0)=0xffffffffffffffc3) getsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER_VALUE(r0, 0x84, 0x7c, &(0x7f00000002c0)={r8, 0x10001, 0xc9e9}, &(0x7f0000000300)=0x8) [ 490.148999] device lo entered promiscuous mode [ 490.156345] EXT4-fs (loop4): VFS: Can't find ext4 filesystem [ 490.193708] BFS-fs: bfs_fill_super(): No BFS filesystem on loop4 (magic=00000000) [ 490.212726] netlink: 'syz-executor0': attribute type 4 has an invalid length. 2018/03/30 19:42:51 executing program 6: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_mreqn(r0, 0x0, 0x27, &(0x7f0000000000)={@multicast2=0xe0000002, @loopback=0x7f000001}, 0xc) getsockopt$inet_sctp6_SCTP_FRAGMENT_INTERLEAVE(0xffffffffffffffff, 0x84, 0x12, &(0x7f0000000080), &(0x7f00000000c0)=0x4) ioctl$sock_inet_SIOCGIFDSTADDR(0xffffffffffffffff, 0x8917, &(0x7f0000000040)={'bcsh0\x00', {0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x1a}}}) setsockopt$inet_sctp6_SCTP_MAX_BURST(0xffffffffffffffff, 0x84, 0x14, &(0x7f0000000380)=@int=0x3, 0x4) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000140)={'bcsh0\x00', 0x0}) ioctl$sock_inet6_SIOCDELRT(0xffffffffffffffff, 0x890c, &(0x7f0000000180)={@dev={0xfe, 0x80, [], 0x13}, @loopback={0x0, 0x1}, @mcast2={0xff, 0x2, [], 0x1}, 0x6, 0x0, 0x42e, 0x100, 0x9, 0x80000000, r1}) r2 = socket$inet(0x2, 0xa, 0x5) setsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX(r2, 0x84, 0x6e, &(0x7f0000000600)=[@in={0x2, 0x4e21, @multicast1=0xe0000001}, @in6={0xa, 0x4e20, 0x0, @remote={0xfe, 0x80, [], 0xbb}}, @in={0x2, 0x4e22, @multicast2=0xe0000002}, @in6={0xa, 0x4e21, 0x1ff, @local={0xfe, 0x80, [], 0xaa}, 0x84}, @in6={0xa, 0x4e20, 0x4, @local={0xfe, 0x80, [], 0xaa}}], 0x74) getsockopt$inet_sctp6_SCTP_PR_SUPPORTED(0xffffffffffffffff, 0x84, 0x71, &(0x7f0000000200)={0x0, 0x8}, &(0x7f0000000240)=0x8) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(0xffffffffffffffff, 0x84, 0x6f, &(0x7f0000000300)={r3, 0x60, &(0x7f0000000280)=[@in={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x12}}, @in={0x2, 0x4e24, @loopback=0x7f000001}, @in={0x2, 0x0, @remote={0xac, 0x14, 0x14, 0xbb}}, @in={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x1a}}, @in={0x2, 0x4e24, @rand_addr=0x3ff}, @in={0x2, 0x4e24, @multicast2=0xe0000002}]}, &(0x7f0000000340)=0x10) setsockopt$inet_sctp6_SCTP_SET_PEER_PRIMARY_ADDR(0xffffffffffffffff, 0x84, 0x5, &(0x7f00000004c0)={r4, @in={{0x2, 0x4e20, @rand_addr=0x8}}}, 0x84) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, &(0x7f00000003c0)={'lo\x00', 0x4100}) ioctl$sock_inet_SIOCGIFNETMASK(0xffffffffffffffff, 0x891b, &(0x7f0000000100)={'nr0\x00', {0x2, 0x4e24, @loopback=0x7f000001}}) setsockopt$inet_msfilter(r0, 0x0, 0x29, &(0x7f0000000680)=ANY=[@ANYBLOB="cf0000000276d172390cc8c4ff4f3b746e5947c2ddb66a93ebb6d0f75b5f453435c311b94e126c49d47c10682b6e523d09fae1d416ebface98e08aa083e9f1f1afa118eb05655fec48d75d7a37edd032552c60ffeb53a2c8eecbe601a4ac5dceeecf1a943c2d9e2eaf4ad0a93e82a1a37a0cf2adbc4b512680428fee922ad18ff90ec6f87a75b299a953167bf4f9ae31cffd2c31dd47ba7d69151424dc1b2835f7624a302f270eb89118043dc1e1faa46e667be9cbf4456ad0c580ed032e4e49459f68f8a70f2dfe40f51362ffae"], 0x1) pread64(r0, &(0x7f0000000340)=""/181, 0xb5, 0x62) setsockopt$inet_msfilter(r0, 0x0, 0x29, &(0x7f0000000580)=ANY=[@ANYBLOB="e00000027f0000010000000001000000000000006b59aa51deb20d6efc9c04b7c9420f6434d31cbbe99b52873a8c21"], 0x1) socket$inet_udp(0x2, 0x2, 0x0) bpf$BPF_PROG_GET_NEXT_ID(0xb, &(0x7f0000000400)=0x7, 0x4) r5 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000ba4000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x2, 0x78, 0xe2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, r5, 0x0) r6 = perf_event_open(&(0x7f0000014f88)={0x1, 0x78, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00002e8000)}}, 0x0, 0x0, r5, 0x0) readv(r6, &(0x7f0000734000)=[{&(0x7f0000d42000)=""/146, 0x92}], 0x1) getsockopt$inet_sctp_SCTP_PEER_ADDR_THLDS(0xffffffffffffffff, 0x84, 0x1f, &(0x7f0000000480)={0x0, @in={{0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0xd}}}, 0xf80866d, 0x5}, &(0x7f0000000540)=0x90) getsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(0xffffffffffffff9c, 0x84, 0x18, &(0x7f0000000440)={r7, 0x400000000004}, &(0x7f00000005c0)=0xffffffffffffffc3) getsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER_VALUE(r0, 0x84, 0x7c, &(0x7f00000002c0)={r8, 0x10001, 0xc9e9}, &(0x7f0000000300)=0x8) [ 490.245376] IPVS: ftp: loaded support on port[0] = 21 [ 490.258713] jfs: Unrecognized mount option "umask=?" or missing value [ 490.262686] netlink: 'syz-executor0': attribute type 4 has an invalid length. 2018/03/30 19:42:51 executing program 4: symlinkat(&(0x7f0000002f00)='./file0\x00', 0xffffffffffffffff, &(0x7f0000002f80)='./file0\x00') syz_mount_image$msdos(&(0x7f0000002fc0)='msdos\x00', &(0x7f0000003000)='./file0\x00', 0x4, 0x1, &(0x7f0000003180)=[{&(0x7f0000003040)="eaf9610c9f7031a1f58e51e73b3f0bd5af4364c38bbe335dbd3d211ec0338ba4c795c634af757a3c684da6110f67891133a6303441b21d139e3a6582efdaeabd3d68dbcb85cd383733a98084b62807af0b7ea49d68daa4cc9fda43dbeb13c3e67c44c463a2c429ccb66c0e1a9dfd5c911d4d7b578baaad6571d4457b9c6d92122a4bd97f5f174c81081941b007062f2cab2db1466851dde671e025909a633fec433bb2512fc61c436b74df23d280019a403884dc488071", 0xb7, 0xcd7}], 0x8, &(0x7f00000031c0)={[{@errors_continue='errors=continue', 0x2c}, {@time_offset={'time_offset', 0x3d, [0x0]}, 0x2c}]}) pipe(&(0x7f0000002f40)={0xffffffffffffffff}) r1 = open(&(0x7f0000003240)='./file0\x00', 0xa0001, 0x20) linkat(r0, &(0x7f0000003200)='./file0\x00', r1, &(0x7f0000003280)='./file0\x00', 0x400) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x80000, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)}, {&(0x7f0000010d00)="0000000000000000000000000000000000000000000000000000000002ae0000ed41000000040000d15bbe5ad15bbe5ad15bbe5a00000000000005002000000000000800070000000af301000400000000000000000000000100000030000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a1950000", 0xa0, 0x8c60}, {&(0x7f0000011a00)="020000000c0001022e000000020000000c0002022e2e00000b00000014000a026c6f73742b666f756e6400000c0000001000050166696c65300000000d0000001000050266696c65310000000f0000001000050166696c6532000000100000001000050166696c6533000000110000001000050166696c65340000001200000010000802564944454f5f54531400000068031201d181d18ed0b7d0bad0b0d0bbd0bbd0b5d1800000000000000000000000000000000000000000000000000000", 0xc0, 0xc000}, {&(0x7f0000012200)="0000000000000000000000000000000000000000000000000c0000dec910dfd800000000f4030000000000000000000000000000000000000000000000000000", 0x40, 0x117e0}, {&(0x7f0000012a00)="0d0000000c0001022e000000020000000c0002022e2e00000e000000dc03050166696c6530000000000000000000000000000000000000000000000000000000", 0x40, 0x1c000}], 0x0, &(0x7f0000013000)) syz_mount_image$bfs(&(0x7f0000000040)='bfs\x00', &(0x7f00000008c0)='./file0\x00', 0x20, 0x2, &(0x7f0000000180)=[{&(0x7f00000005c0)="f37e57346e86cb5adec662d7bd6f13a3764d2ca7640f9f81ba88d0689d0989735a7bafd5558d9a6e8988f9f6038fa475e49077bc8cfc6e170c4cdbaaa1375895c9a4068559d3cecf2a0423caa696bf77a75b3ae3f32b79da059ca13d055647998987fc2033d008bd55deb08808372b9b4595fb0d79a1358cd5949d859a7d155e86db4b608eb401109f6b792f5ce4a2ead9870dee49347bc08d0d54b0e4fca4fd895947a737f4ee823d997770e5c9df50c0c9fe2c0b945c6ffd13b7151e385b631520ac34a5967c6cd0d12b3746795681600541c17d379daed41ce8e715eba582fb668e160872a2", 0xe7, 0x7}, {&(0x7f0000000780)="6154d093a5a905da96fed5f8dea36bcd9d1d011246f7caf86806bf6ac6301d2d2b448461b867bbbe7d0eebdeafa16d7219af85ff4372670039ce277546def59f1d0eed4be4386a34c7243fe3ec84ad3807136a2c3ec35d6d87a7d7bb9342622cc3a7ff529ef3d76ff57fc7a1856f50b98e518515a9e679067cfc0e8500754fa30a81cf4dc42c5a0d36647280c5b0a8506efaf9ad06594678176efe4bdbcf7ab384b597df4c5ad66b2bd240823abe04cd30785819f1c7fd4d46bb55f8bd09ca4b44618b010e363fa572ca189ec73b36ad46b6f38d65c0acc417", 0xd9, 0x5}], 0x200000, 0x0) syz_mount_image$jfs(&(0x7f0000000080)='jfs\x00', &(0x7f0000000880)='./file0\x00', 0xfffffffffffffffe, 0x3, &(0x7f0000002dc0)=[{&(0x7f0000000900)="efee47debce411554253d03f2175c060de26b9a7a197d9327971105aafdf17a061227fe7dd52d3c1c1f0318992f304f7646c3eb4e32ff0514d34d4605b4e152474aa71ac6c0ba890b1f249f213d5bc162b605fdf3c524d6f84e1a2f8461d26ef5dd50b193ffb710ee69fc431552ae4548f0c1a7e503243bb10c53c566f37e3234d8b3d418992dca946568d275e1f54895a854bab3790963108fe6ce5b1f933e81bd0aa2dfd715aca4bd81b48b28e3ee265", 0xb1, 0x1}, {&(0x7f0000001a80)="b4bc90ad72742e5693f04c7955b05460b33cd0ca9cde365dbe1671162a8c1db744cb8a04d1d747ab4d3234fd615e6ad897396c21b8bf7da2c1d524d04fadade841e5acfac529250a2c75fed4b65a7b6c8735268244189e020c526112728097958fd591d00cd16d1591db9b0414d985d7718794369eb03d89403b7df76f6d745c94d4fa986321a9915fea55a73472bc39620fcf22ec74d02b77fafe6ccf72605eb0ba7ae69fa10a36d281e65a178528bc654ce5b6109d5294e400b18be755a3b899489b27a876ac3ea033ed525b28c7dff537b5210cbff466dc339e1f58db1679816589e886264ef1bcf6d0e1408d93946827711972", 0xf5, 0x7}, {&(0x7f0000002cc0)="c9bc1928c9ffffe99fdae39f5013810a038f1d558affc92341c81ee308195dabd95fcfedcfccd4cf2af62477e5ed935114b73940dba239c47d5824a3332fb48cea682934a6840ea5db2529c3a7c371bbf08f08bb15458de586609be64b699f29b7384dc7b2ba78f0e343fb9851eaf5a7b4106fc5b7a8aaf6e069012286fa7259807928cbee722222f45e6c98cefa00829bcdd92bd03273c7b0f20453c72150adf49c311248d3d3d96ad17187d60add3d1d8fbfbc5e572ceba134e5c533a5f75630a35514ee998b85a755085c04513dcc0047461d78f4aa8fdf0309fc39e3e4a1c24b4538acbf23", 0xe7, 0x4}], 0x10000, &(0x7f0000002ec0)={[{@nodiscard='nodiscard', 0x2c}, {@resize='resize', 0x2c}, {@noquota='noquota', 0x2c}, {@umask={'umask', 0x3d, [0x3f]}, 0x2c}]}) 2018/03/30 19:42:51 executing program 0: r0 = dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x80000) ioctl$LOOP_SET_STATUS64(0xffffffffffffffff, 0x4c04, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0xb, 0x0, 0x8, "b2cdc16948c2d8defdc6ccd7e69370cd89206e757600f494a6f386fd75de4ec168412aefa9b47ddce6005ef1f5e2188c611f11fe23a9973b4f3b4ca8115d75b6", "adcddcbdd258708ed483b1c6d50b363981c4f943de7510903594aa41b5a7d76826f71b49332e607bd68a9352cd05d36e027047e9bd95b49f71e4f89c99b3dacc", "98731c39612dffb0f3700d6862ad2c5e51f2bf1597643d3216b87c072c7cef3c", [0x4, 0x1]}) r1 = socket$inet6(0xa, 0x400000000001, 0x0) r2 = dup(r1) r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup.cpu\x00', 0x200002, 0x0) getsockopt$inet_pktinfo(r2, 0x0, 0x8, &(0x7f0000000400)={0x0, @local}, &(0x7f00000006c0)=0xc) fchdir(r3) r4 = syz_open_procfs(0x0, &(0x7f0000000040)='net/fib_trie\x00') clock_gettime(0x0, &(0x7f0000000140)) ioctl$sock_proto_private(r4, 0x89e0, &(0x7f0000000340)) preadv(r4, &(0x7f0000000440)=[{&(0x7f00000001c0)=""/250, 0xff2d}], 0x1, 0x0) ioctl$TUNSETPERSIST(r4, 0x400454cb, 0x0) getsockopt$bt_l2cap_L2CAP_OPTIONS(r4, 0x6, 0x1, &(0x7f0000000080), &(0x7f00000002c0)=0xc) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_REM(r0, 0x84, 0x65, &(0x7f0000000580)=[@in6={0xa, 0x4e23, 0x200000000000000, @mcast1={0xff, 0x1, [], 0x1}, 0x3ff}, @in={0x2, 0x4e21, @multicast1=0xe0000001}, @in6={0xa, 0x4e23, 0x6, @mcast1={0xff, 0x1, [], 0x1}, 0x2}, @in={0x2, 0x4e23, @broadcast=0xffffffff}], 0x58) r5 = creat(&(0x7f0000000740)='./file1\x00', 0x0) write$tun(0xffffffffffffffff, &(0x7f0000000800)=ANY=[], 0x0) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x0) unlink(&(0x7f0000000000)='./file1\x00') fcntl$getown(r5, 0x9) pwritev(0xffffffffffffffff, &(0x7f00000000c0)=[{&(0x7f0000000c00)="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", 0x53a}], 0x1, 0x0) syz_genetlink_get_family_id$ipvs(&(0x7f0000000600)='IPVS\x00') setsockopt$inet_tcp_buf(r5, 0x6, 0x0, &(0x7f00000001c0), 0x0) sendmsg$IPVS_CMD_DEL_DAEMON(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f0000000040)={0x10}, 0xc, &(0x7f0000000240)={&(0x7f0000000940)=ANY=[@ANYBLOB="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"], 0x1}, 0x1}, 0x0) bind$inet6(r1, &(0x7f0000fa0fe4)={0xa, 0x0, 0x0, @loopback={0x0, 0x1}}, 0x1c) ioctl$SNDRV_SEQ_IOCTL_GET_CLIENT_POOL(r2, 0xc058534b, &(0x7f0000000300)={0x3, 0xfffffffffffff5ec, 0x3, 0x31e70a44, 0x2, 0x200}) sendto$inet6(r1, &(0x7f0000e77fff), 0xfffffffffffffd8a, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback={0x0, 0x1}}, 0x1c) ioctl$DRM_IOCTL_GEM_FLINK(r0, 0xc008640a, &(0x7f0000000200)) ioctl$DRM_IOCTL_PRIME_HANDLE_TO_FD(r5, 0xc00c642d, &(0x7f0000000480)={0x0, 0x80004, r5}) lstat(&(0x7f00000004c0)='./bus\x00', &(0x7f0000000500)) 2018/03/30 19:42:51 executing program 5: unshare(0x40000000) perf_event_open(&(0x7f000001d000)={0x2, 0x78, 0xe2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket(0xa, 0x1, 0x0) ioctl(r0, 0x8982, &(0x7f0000000000)) r1 = socket$packet(0x11, 0x0, 0x300) r2 = openat$cuse(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/cuse\x00', 0x82, 0x0) io_setup(0x43f, &(0x7f00000000c0)=0x0) io_submit(r3, 0x1, &(0x7f0000000000)=[&(0x7f0000000200)={0x0, 0x0, 0x0, 0x1, 0x0, r2, &(0x7f0000000040)="10000000020400000000000000000000", 0x10}]) r4 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000280)='/proc/sys/net/ipv4/vs/secure_tcp\x00', 0x2, 0x0) sendmsg$kcm(r4, &(0x7f0000001f00)={&(0x7f0000001b40)=@pppol2tpin6={0x18, 0x1, {0x0, r1, 0x0, 0x1, 0x0, 0x0, {0xa, 0x4e24, 0xc1, @mcast1={0xff, 0x1, [], 0x1}}}}, 0x80, &(0x7f0000001d80)=[{&(0x7f0000001bc0)="a9db123ebf124fab0f2eec9774559e3b5870fb7c6818fc89c4b8742d057480657265ae2b34fb2d4e585d22ca1bf7b0a22ce38a20a819d919947c78f8d5c9f3291905fd3ed2b8ef8a79d9453396c6b0b7eb0778dbc49b32ae91e443b64edddcf320c1589c7777eadd4e57c01b20a8ca7a831e8e2c104d0194d52fb5c35b550f", 0x7f}], 0x1, &(0x7f0000001dc0)=ANY=[], 0x0, 0x90}, 0x20000000) r5 = syz_open_dev$tun(&(0x7f00000001c0)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r5, 0x400454ca, &(0x7f0000000200)={'bridge0\x00\x00p\x00', 0x4000000000001005}) socketpair(0x1d, 0x3, 0x40, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_inet_SIOCSIFADDR(r6, 0x8916, &(0x7f0000000100)={'bridge8\x00', {0x2, 0x0, @dev={0xac, 0x14, 0x14}}}) ioctl$LOOP_SET_FD(r2, 0x4c00, r1) ioctl$SNDRV_SEQ_IOCTL_RUNNING_MODE(0xffffffffffffffff, 0xc0105303, &(0x7f00000002c0)={0x2, 0x8}) add_key$keyring(&(0x7f00000000c0)='keyring\x00', &(0x7f0000000100)={0x73, 0x79, 0x7a}, 0x0, 0x0, 0x0) clone(0x0, &(0x7f0000000040), &(0x7f0000000080), &(0x7f0000000000), &(0x7f0000000100)) ioctl$int_in(0xffffffffffffffff, 0x800000c004500a, &(0x7f0000006ff8)) wait4(0x0, 0x0, 0x4, &(0x7f0000000380)) ioctl$sock_inet_sctp_SIOCINQ(r7, 0x541b, &(0x7f0000000180)) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_PORT(0xffffffffffffffff, 0xc0a85352, &(0x7f0000001980)={{}, 'port1\x00', 0x0, 0x20010, 0x1f, 0x0, 0x3, 0x40, 0x0, 0x0, 0x4, 0x6d1}) 2018/03/30 19:42:51 executing program 6: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_mreqn(r0, 0x0, 0x27, &(0x7f0000000000)={@multicast2=0xe0000002, @loopback=0x7f000001}, 0xc) getsockopt$inet_sctp6_SCTP_FRAGMENT_INTERLEAVE(0xffffffffffffffff, 0x84, 0x12, &(0x7f0000000080), &(0x7f00000000c0)=0x4) ioctl$sock_inet_SIOCGIFDSTADDR(0xffffffffffffffff, 0x8917, &(0x7f0000000040)={'bcsh0\x00', {0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x1a}}}) setsockopt$inet_sctp6_SCTP_MAX_BURST(0xffffffffffffffff, 0x84, 0x14, &(0x7f0000000380)=@int=0x3, 0x4) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000140)={'bcsh0\x00', 0x0}) ioctl$sock_inet6_SIOCDELRT(0xffffffffffffffff, 0x890c, &(0x7f0000000180)={@dev={0xfe, 0x80, [], 0x13}, @loopback={0x0, 0x1}, @mcast2={0xff, 0x2, [], 0x1}, 0x6, 0x0, 0x42e, 0x100, 0x9, 0x80000000, r1}) r2 = socket$inet(0x2, 0xa, 0x5) setsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX(r2, 0x84, 0x6e, &(0x7f0000000600)=[@in={0x2, 0x4e21, @multicast1=0xe0000001}, @in6={0xa, 0x4e20, 0x0, @remote={0xfe, 0x80, [], 0xbb}}, @in={0x2, 0x4e22, @multicast2=0xe0000002}, @in6={0xa, 0x4e21, 0x1ff, @local={0xfe, 0x80, [], 0xaa}, 0x84}, @in6={0xa, 0x4e20, 0x4, @local={0xfe, 0x80, [], 0xaa}}], 0x74) getsockopt$inet_sctp6_SCTP_PR_SUPPORTED(0xffffffffffffffff, 0x84, 0x71, &(0x7f0000000200)={0x0, 0x8}, &(0x7f0000000240)=0x8) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(0xffffffffffffffff, 0x84, 0x6f, &(0x7f0000000300)={r3, 0x60, &(0x7f0000000280)=[@in={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x12}}, @in={0x2, 0x4e24, @loopback=0x7f000001}, @in={0x2, 0x0, @remote={0xac, 0x14, 0x14, 0xbb}}, @in={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x1a}}, @in={0x2, 0x4e24, @rand_addr=0x3ff}, @in={0x2, 0x4e24, @multicast2=0xe0000002}]}, &(0x7f0000000340)=0x10) setsockopt$inet_sctp6_SCTP_SET_PEER_PRIMARY_ADDR(0xffffffffffffffff, 0x84, 0x5, &(0x7f00000004c0)={r4, @in={{0x2, 0x4e20, @rand_addr=0x8}}}, 0x84) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, &(0x7f00000003c0)={'lo\x00', 0x4100}) ioctl$sock_inet_SIOCGIFNETMASK(0xffffffffffffffff, 0x891b, &(0x7f0000000100)={'nr0\x00', {0x2, 0x4e24, @loopback=0x7f000001}}) setsockopt$inet_msfilter(r0, 0x0, 0x29, &(0x7f0000000680)=ANY=[@ANYBLOB="cf0000000276d172390cc8c4ff4f3b746e5947c2ddb66a93ebb6d0f75b5f453435c311b94e126c49d47c10682b6e523d09fae1d416ebface98e08aa083e9f1f1afa118eb05655fec48d75d7a37edd032552c60ffeb53a2c8eecbe601a4ac5dceeecf1a943c2d9e2eaf4ad0a93e82a1a37a0cf2adbc4b512680428fee922ad18ff90ec6f87a75b299a953167bf4f9ae31cffd2c31dd47ba7d69151424dc1b2835f7624a302f270eb89118043dc1e1faa46e667be9cbf4456ad0c580ed032e4e49459f68f8a70f2dfe40f51362ffae"], 0x1) pread64(r0, &(0x7f0000000340)=""/181, 0xb5, 0x62) setsockopt$inet_msfilter(r0, 0x0, 0x29, &(0x7f0000000580)=ANY=[@ANYBLOB="e00000027f0000010000000001000000000000006b59aa51deb20d6efc9c04b7c9420f6434d31cbbe99b52873a8c21"], 0x1) socket$inet_udp(0x2, 0x2, 0x0) bpf$BPF_PROG_GET_NEXT_ID(0xb, &(0x7f0000000400)=0x7, 0x4) r5 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000ba4000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x2, 0x78, 0xe2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, r5, 0x0) r6 = perf_event_open(&(0x7f0000014f88)={0x1, 0x78, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00002e8000)}}, 0x0, 0x0, r5, 0x0) readv(r6, &(0x7f0000734000)=[{&(0x7f0000d42000)=""/146, 0x92}], 0x1) getsockopt$inet_sctp_SCTP_PEER_ADDR_THLDS(0xffffffffffffffff, 0x84, 0x1f, &(0x7f0000000480)={0x0, @in={{0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0xd}}}, 0xf80866d, 0x5}, &(0x7f0000000540)=0x90) getsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(0xffffffffffffff9c, 0x84, 0x18, &(0x7f0000000440)={r7, 0x400000000004}, &(0x7f00000005c0)=0xffffffffffffffc3) getsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER_VALUE(r0, 0x84, 0x7c, &(0x7f00000002c0)={r8, 0x10001, 0xc9e9}, &(0x7f0000000300)=0x8) [ 490.382884] FAT-fs (loop4): Unrecognized mount option "time_offset=" or missing value [ 490.405430] IPVS: ftp: loaded support on port[0] = 21 [ 490.426751] EXT4-fs (loop4): VFS: Can't find ext4 filesystem 2018/03/30 19:42:51 executing program 7: socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000000)) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000001c0)='./cgroup\x00', 0x200002, 0x0) fchdir(r0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) rmdir(&(0x7f00000000c0)='./file0\x00') setsockopt$IP_VS_SO_SET_TIMEOUT(0xffffffffffffffff, 0x0, 0x48a, &(0x7f0000000040)={0x0, 0x5}, 0xc) r1 = creat(&(0x7f0000001840)='./file0\x00', 0x0) inotify_init1(0x0) ioctl$TCSBRK(0xffffffffffffffff, 0x5409, 0x0) memfd_create(&(0x7f0000001800)='/proc/sys/net/ipv4/vs/sync_qlen_max\x00', 0x0) write$cgroup_pid(r1, &(0x7f0000000100)=ANY=[], 0x1023c) ioctl$fiemap(0xffffffffffffffff, 0xc020660b, &(0x7f0000000140)=ANY=[@ANYBLOB]) ioctl$DRM_IOCTL_AGP_FREE(0xffffffffffffffff, 0x40206435, &(0x7f0000000200)) gettid() syz_open_dev$binder(&(0x7f00000016c0)='/dev/binder#\x00', 0x0, 0x802) process_vm_writev(0x0, &(0x7f0000001100)=[{&(0x7f0000000100)=""/4096, 0x1000}], 0x1, &(0x7f0000001700)=[{&(0x7f0000001280)=""/164, 0xa4}, {&(0x7f0000001140)=""/187, 0xbb}, {&(0x7f0000001480)=""/8, 0x8}, {&(0x7f00000014c0)=""/177, 0xb1}, {&(0x7f0000001640)=""/3, 0x3}], 0x5, 0x0) setsockopt$inet6_MCAST_MSFILTER(0xffffffffffffffff, 0x29, 0x30, &(0x7f0000001880)={0x0, {{0xa, 0x0, 0xffff, @mcast1={0xff, 0x1, [], 0x1}, 0x1f}}, 0x1, 0x3, [{{0xa, 0x0, 0x2, @mcast1={0xff, 0x1, [], 0x1}, 0x9}}, {{0xa, 0x4e23, 0x59c, @local={0xfe, 0x80, [], 0xaa}, 0x5}}, {{0xa, 0x0, 0x0, @ipv4={[], [0xff, 0xff], @rand_addr}}}]}, 0x210) openat$ipvs(0xffffffffffffff9c, &(0x7f00000013c0)='/proc/sys/net/ipv4/vs/sync_qlen_max\x00', 0x2, 0x0) ioprio_get$uid(0x0, 0x0) r2 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(0xffffffffffffffff, &(0x7f0000b9bff0)={0x2, 0x4e21, @multicast1=0xe0000001}, 0x10) sendto$inet(r2, &(0x7f0000fa0fff), 0xffffffffffffffbb, 0x20020003, &(0x7f0000385ff0)={0x2, 0x0, @loopback=0x7f000001}, 0x10) ioctl$sock_SIOCOUTQ(r2, 0x5411, &(0x7f0000000040)) setsockopt$sock_int(r2, 0x1, 0x2000000000000009, &(0x7f0000534ffc)=0x4, 0x4) [ 490.476186] BFS-fs: bfs_fill_super(): No BFS filesystem on loop4 (magic=00000000) [ 490.511478] jfs: Unrecognized mount option "umask=?" or missing value [ 491.073282] device lo left promiscuous mode 2018/03/30 19:42:52 executing program 2: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) readv(0xffffffffffffffff, &(0x7f0000001480), 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f00003b9fdc)) readv(r0, &(0x7f0000001980)=[{&(0x7f00000018c0)=""/182, 0xb6}], 0x1) syz_open_pts(r0, 0x2) setsockopt$inet6_mtu(0xffffffffffffffff, 0x29, 0x17, &(0x7f0000000440)=0x5, 0x4) socket$inet_sctp(0x2, 0x5, 0x84) write(r0, &(0x7f0000c34fff), 0xffffff0b) socket$inet(0x2, 0x0, 0x0) setsockopt$bt_l2cap_L2CAP_OPTIONS(0xffffffffffffffff, 0x6, 0x1, &(0x7f0000000380)={0xefa, 0x800, 0x0, 0x0, 0x9}, 0xc) 2018/03/30 19:42:52 executing program 3: socket$inet_udp(0x2, 0x2, 0x0) socket$packet(0x11, 0x0, 0x300) setsockopt$packet_fanout(0xffffffffffffffff, 0x107, 0x12, &(0x7f000095bffc)={0x0, 0x0, 0xfffffffffffffffc}, 0x4) r0 = socket$inet_udp(0x2, 0x2, 0x0) connect$inet(r0, &(0x7f0000000040)={0x2, 0x4e20, @local={0xac, 0x14, 0x14, 0xaa}}, 0x10) sendto$inet(r0, &(0x7f0000762fff), 0xfdc7, 0x0, &(0x7f000057bff0)={0x2, 0x4e20, @multicast1=0xe0000001}, 0x10) syz_emit_ethernet(0x0, &(0x7f0000000080)=ANY=[], &(0x7f0000000380)) getsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(0xffffffffffffff9c, 0x84, 0x1f, &(0x7f0000000680)={0x0, @in6={{0xa, 0x0, 0x0, @local={0xfe, 0x80, [], 0xaa}, 0x6}}, 0x101, 0xfffffffffffffffa}, &(0x7f0000000740)=0x90) getsockopt$inet_sctp_SCTP_PR_ASSOC_STATUS(0xffffffffffffff9c, 0x84, 0x73, &(0x7f0000000780)={0x0, 0x20, 0x30, 0x0, 0x2}, &(0x7f00000007c0)=0x18) getsockopt$inet_sctp_SCTP_PEER_ADDR_THLDS(0xffffffffffffffff, 0x84, 0x1f, &(0x7f0000000880)={0x0, @in6={{0xa, 0x0, 0x1, @mcast1={0xff, 0x1, [], 0x1}, 0x94}}, 0x10000}, &(0x7f0000000940)=0x90) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f0000000d00)={0x1, [0x0]}, &(0x7f0000000d40)=0x8) getsockopt$inet_sctp6_SCTP_DELAYED_SACK(0xffffffffffffff9c, 0x84, 0x10, &(0x7f0000000ec0)=@assoc_value={0x0, 0x101}, &(0x7f0000000f00)=0x8) getsockopt$inet_sctp6_SCTP_AUTH_ACTIVE_KEY(0xffffffffffffff9c, 0x84, 0x18, &(0x7f0000001040), &(0x7f0000001080)=0x8) getsockopt$inet_sctp_SCTP_DEFAULT_SEND_PARAM(0xffffffffffffffff, 0x84, 0xa, &(0x7f0000001540)={0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100000000, 0x400}, &(0x7f0000001580)=0x20) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f00000015c0), &(0x7f0000001600)=0x4) getsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX3(0xffffffffffffffff, 0x84, 0x6f, &(0x7f0000003b00)={0x0, 0x74, &(0x7f0000003a40)=[@in={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x11}}, @in6={0xa, 0x0, 0x2, @remote={0xfe, 0x80, [], 0xbb}}, @in6={0xa, 0x4e22, 0x0, @mcast2={0xff, 0x2, [], 0x1}}, @in={0x2, 0x4e24}, @in6={0xa, 0x0, 0x0, @ipv4={[], [0xff, 0xff], @loopback=0x7f000001}, 0x3}]}, &(0x7f0000003b40)=0x10) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) ioctl$PIO_FONTX(r1, 0x4b6c, &(0x7f0000000100)="e474d6d3dbe9521137b6210ad90bec3b03f8b12b868511fb53b5a48aaaa2d62bc0f93abefd7e482e5d873599df8feec19183af4e80666f4e1760d3a46df6942fbb2532d60d33b193ea7f86d6add5cb6caae58c5d91f042086395b127f19f86fb5844ce031086a1f59593dd9dd85423909d30f4e9ecf6b9") getsockopt$inet_sctp6_SCTP_RTOINFO(0xffffffffffffff9c, 0x84, 0x0, &(0x7f0000003c00)={0x0, 0x101, 0x0, 0x3}, &(0x7f0000003c40)=0x10) getsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(0xffffffffffffff9c, 0x84, 0x18, &(0x7f0000004e80), &(0x7f0000004ec0)=0x8) sendmmsg$inet_sctp(0xffffffffffffffff, &(0x7f0000005080), 0x0, 0x0) 2018/03/30 19:42:52 executing program 0: r0 = syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x0, 0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$netlink_NETLINK_ADD_MEMBERSHIP(0xffffffffffffffff, 0x10e, 0x1, &(0x7f0000000240), 0x4) rmdir(&(0x7f0000000080)='./file0\x00') connect$nfc_llcp(0xffffffffffffffff, &(0x7f0000000540)={0x27, 0x0, 0x0, 0x2, 0x7, 0x6, "4021bc5c62a8b600554fd217a152db8c5e202690ff5e106c7c3952d6060c481cf11e7913f883ddd296bfa5479216af340d0d68910e8d8adb388f562a8d6718"}, 0xab) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000000)={'lo\x00'}) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000001d40)={'lo\x00', 0xfff}) ioctl$TIOCSTI(0xffffffffffffffff, 0x5412, 0x7) openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000700)='/dev/vga_arbiter\x00', 0x0, 0x0) getsockopt$inet_sctp_SCTP_GET_PEER_ADDRS(r0, 0x84, 0x6c, &(0x7f0000000740)={0x0, 0x7, "10b402dd98f261"}, &(0x7f0000000180)=0xf) getsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000040), 0x10) getsockopt$inet_sctp_SCTP_RESET_STREAMS(0xffffffffffffffff, 0x84, 0x77, &(0x7f00000007c0)={r2, 0x10001, 0x2, [0xfffffffffffffff9, 0x0]}, &(0x7f0000000800)=0xc) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f00001cb000)={&(0x7f00008e5ff4)={0x10}, 0xc, &(0x7f0000f4a000)={&(0x7f000019bf9b)=ANY=[]}, 0x1}, 0x0) ioctl$DRM_IOCTL_DMA(r0, 0xc0286429, &(0x7f00000004c0)={0x0, 0x0, &(0x7f00000003c0), &(0x7f0000000400)=[0xaeef, 0x9, 0x60, 0x0, 0x0, 0x3800000, 0x1], 0x1, 0x3, 0x7, &(0x7f0000000440)=[0xffff, 0x0, 0x0], &(0x7f0000000480)=[0x7]}) getsockopt$inet_sctp_SCTP_DEFAULT_SEND_PARAM(r0, 0x84, 0xa, &(0x7f0000000140)={0x0, 0x0, 0x200, 0x7, 0x0, 0x0, 0x3cb, 0xfffffffffffeffff}, &(0x7f00000001c0)=0x20) 2018/03/30 19:42:52 executing program 4: symlinkat(&(0x7f0000002f00)='./file0\x00', 0xffffffffffffffff, &(0x7f0000002f80)='./file0\x00') syz_mount_image$msdos(&(0x7f0000002fc0)='msdos\x00', &(0x7f0000003000)='./file0\x00', 0x4, 0x1, &(0x7f0000003180)=[{&(0x7f0000003040)="eaf9610c9f7031a1f58e51e73b3f0bd5af4364c38bbe335dbd3d211ec0338ba4c795c634af757a3c684da6110f67891133a6303441b21d139e3a6582efdaeabd3d68dbcb85cd383733a98084b62807af0b7ea49d68daa4cc9fda43dbeb13c3e67c44c463a2c429ccb66c0e1a9dfd5c911d4d7b578baaad6571d4457b9c6d92122a4bd97f5f174c81081941b007062f2cab2db1466851dde671e025909a633fec433bb2512fc61c436b74df23d280019a403884dc488071", 0xb7, 0xcd7}], 0x8, &(0x7f00000031c0)={[{@errors_continue='errors=continue', 0x2c}, {@time_offset={'time_offset', 0x3d, [0x0]}, 0x2c}]}) pipe(&(0x7f0000002f40)={0xffffffffffffffff}) r1 = open(&(0x7f0000003240)='./file0\x00', 0xa0001, 0x20) linkat(r0, &(0x7f0000003200)='./file0\x00', r1, &(0x7f0000003280)='./file0\x00', 0x400) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x80000, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)}, {&(0x7f0000010d00)="0000000000000000000000000000000000000000000000000000000002ae0000ed41000000040000d15bbe5ad15bbe5ad15bbe5a00000000000005002000000000000800070000000af301000400000000000000000000000100000030000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a1950000", 0xa0, 0x8c60}, {&(0x7f0000011a00)="020000000c0001022e000000020000000c0002022e2e00000b00000014000a026c6f73742b666f756e6400000c0000001000050166696c65300000000d0000001000050266696c65310000000f0000001000050166696c6532000000100000001000050166696c6533000000110000001000050166696c65340000001200000010000802564944454f5f54531400000068031201d181d18ed0b7d0bad0b0d0bbd0bbd0b5d1800000000000000000000000000000000000000000000000000000", 0xc0, 0xc000}, {&(0x7f0000012200)="0000000000000000000000000000000000000000000000000c0000dec910dfd800000000f4030000000000000000000000000000000000000000000000000000", 0x40, 0x117e0}, {&(0x7f0000012a00)="0d0000000c0001022e000000020000000c0002022e2e00000e000000dc03050166696c6530000000000000000000000000000000000000000000000000000000", 0x40, 0x1c000}], 0x0, &(0x7f0000013000)) syz_mount_image$bfs(&(0x7f0000000040)='bfs\x00', &(0x7f00000008c0)='./file0\x00', 0x20, 0x2, &(0x7f0000000180)=[{&(0x7f00000005c0)="f37e57346e86cb5adec662d7bd6f13a3764d2ca7640f9f81ba88d0689d0989735a7bafd5558d9a6e8988f9f6038fa475e49077bc8cfc6e170c4cdbaaa1375895c9a4068559d3cecf2a0423caa696bf77a75b3ae3f32b79da059ca13d055647998987fc2033d008bd55deb08808372b9b4595fb0d79a1358cd5949d859a7d155e86db4b608eb401109f6b792f5ce4a2ead9870dee49347bc08d0d54b0e4fca4fd895947a737f4ee823d997770e5c9df50c0c9fe2c0b945c6ffd13b7151e385b631520ac34a5967c6cd0d12b3746795681600541c17d379daed41ce8e715eba582fb668e160872a2", 0xe7, 0x7}, {&(0x7f0000000780)="6154d093a5a905da96fed5f8dea36bcd9d1d011246f7caf86806bf6ac6301d2d2b448461b867bbbe7d0eebdeafa16d7219af85ff4372670039ce277546def59f1d0eed4be4386a34c7243fe3ec84ad3807136a2c3ec35d6d87a7d7bb9342622cc3a7ff529ef3d76ff57fc7a1856f50b98e518515a9e679067cfc0e8500754fa30a81cf4dc42c5a0d36647280c5b0a8506efaf9ad06594678176efe4bdbcf7ab384b597df4c5ad66b2bd240823abe04cd30785819f1c7fd4d46bb55f8bd09ca4b44618b010e363fa572ca189ec73b36ad46b6f38d65c0acc417", 0xd9, 0x5}], 0x200000, 0x0) syz_mount_image$jfs(&(0x7f0000000080)='jfs\x00', &(0x7f0000000880)='./file0\x00', 0xfffffffffffffffe, 0x3, &(0x7f0000002dc0)=[{&(0x7f0000000900)="efee47debce411554253d03f2175c060de26b9a7a197d9327971105aafdf17a061227fe7dd52d3c1c1f0318992f304f7646c3eb4e32ff0514d34d4605b4e152474aa71ac6c0ba890b1f249f213d5bc162b605fdf3c524d6f84e1a2f8461d26ef5dd50b193ffb710ee69fc431552ae4548f0c1a7e503243bb10c53c566f37e3234d8b3d418992dca946568d275e1f54895a854bab3790963108fe6ce5b1f933e81bd0aa2dfd715aca4bd81b48b28e3ee265", 0xb1, 0x1}, {&(0x7f0000001a80)="b4bc90ad72742e5693f04c7955b05460b33cd0ca9cde365dbe1671162a8c1db744cb8a04d1d747ab4d3234fd615e6ad897396c21b8bf7da2c1d524d04fadade841e5acfac529250a2c75fed4b65a7b6c8735268244189e020c526112728097958fd591d00cd16d1591db9b0414d985d7718794369eb03d89403b7df76f6d745c94d4fa986321a9915fea55a73472bc39620fcf22ec74d02b77fafe6ccf72605eb0ba7ae69fa10a36d281e65a178528bc654ce5b6109d5294e400b18be755a3b899489b27a876ac3ea033ed525b28c7dff537b5210cbff466dc339e1f58db1679816589e886264ef1bcf6d0e1408d93946827711972", 0xf5, 0x7}, {&(0x7f0000002cc0)="c9bc1928c9ffffe99fdae39f5013810a038f1d558affc92341c81ee308195dabd95fcfedcfccd4cf2af62477e5ed935114b73940dba239c47d5824a3332fb48cea682934a6840ea5db2529c3a7c371bbf08f08bb15458de586609be64b699f29b7384dc7b2ba78f0e343fb9851eaf5a7b4106fc5b7a8aaf6e069012286fa7259807928cbee722222f45e6c98cefa00829bcdd92bd03273c7b0f20453c72150adf49c311248d3d3d96ad17187d60add3d1d8fbfbc5e572ceba134e5c533a5f75630a35514ee998b85a755085c04513dcc0047461d78f4aa8fdf0309fc39e3e4a1c24b4538acbf23", 0xe7, 0x4}], 0x10000, &(0x7f0000002ec0)={[{@nodiscard='nodiscard', 0x2c}, {@resize='resize', 0x2c}, {@noquota='noquota', 0x2c}, {@umask={'umask', 0x3d, [0x3f]}, 0x2c}]}) 2018/03/30 19:42:52 executing program 5: unshare(0x40000000) perf_event_open(&(0x7f0000000000)={0x6, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0xa, 0x1, 0x0) ioctl(r0, 0x8982, &(0x7f0000000000)) r1 = socket$packet(0x11, 0x0, 0x300) r2 = openat$cuse(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/cuse\x00', 0x82, 0x0) io_setup(0x43f, &(0x7f00000000c0)=0x0) io_submit(r3, 0x1, &(0x7f0000000000)=[&(0x7f0000000200)={0x0, 0x0, 0x0, 0x1, 0x0, r2, &(0x7f0000000040)="10000000020400000000000000000000", 0x10}]) r4 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000280)='/proc/sys/net/ipv4/vs/secure_tcp\x00', 0x2, 0x0) sendmsg$kcm(r4, &(0x7f0000001f00)={&(0x7f0000001b40)=@pppol2tpin6={0x18, 0x1, {0x0, r1, 0x0, 0x1, 0x0, 0x0, {0xa, 0x4e24, 0xc1, @mcast1={0xff, 0x1, [], 0x1}}}}, 0x80, &(0x7f0000001d80)=[{&(0x7f0000001bc0)="a9db123ebf124fab0f2eec9774559e3b5870fb7c6818fc89c4b8742d057480657265ae2b34fb2d4e585d22ca1bf7b0a22ce38a20a819d919947c78f8d5c9f3291905fd3ed2b8ef8a79d9453396c6b0b7eb0778dbc49b32ae91e443b64edddcf320c1589c7777eadd4e57c01b20a8ca7a831e8e2c104d0194d52fb5c35b550f", 0x7f}], 0x1, &(0x7f0000001dc0)=ANY=[], 0x0, 0x90}, 0x20000000) r5 = syz_open_dev$tun(&(0x7f00000001c0)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r5, 0x400454ca, &(0x7f0000000200)={'bridge0\x00\x00p\x00', 0x4000000000001005}) socketpair(0x1d, 0x3, 0x40, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_inet_SIOCSIFADDR(r6, 0x8916, &(0x7f0000000100)={'bridge8\x00', {0x2, 0x0, @dev={0xac, 0x14, 0x14}}}) ioctl$LOOP_SET_FD(r2, 0x4c00, r1) ioctl$SNDRV_SEQ_IOCTL_RUNNING_MODE(0xffffffffffffffff, 0xc0105303, &(0x7f00000002c0)={0x2, 0x8}) add_key$keyring(&(0x7f00000000c0)='keyring\x00', &(0x7f0000000100)={0x73, 0x79, 0x7a}, 0x0, 0x0, 0x0) clone(0x0, &(0x7f0000000040), &(0x7f0000000080), &(0x7f0000000000), &(0x7f0000000100)) ioctl$int_in(0xffffffffffffffff, 0x800000c004500a, &(0x7f0000006ff8)) wait4(0x0, 0x0, 0x4, &(0x7f0000000380)) ioctl$sock_inet_sctp_SIOCINQ(r7, 0x541b, &(0x7f0000000180)) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_PORT(0xffffffffffffffff, 0xc0a85352, &(0x7f0000001980)={{}, 'port1\x00', 0x0, 0x20010, 0x1f, 0x0, 0x3, 0x40, 0x0, 0x0, 0x4, 0x6d1}) 2018/03/30 19:42:52 executing program 6: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_mreqn(r0, 0x0, 0x27, &(0x7f0000000000)={@multicast2=0xe0000002, @loopback=0x7f000001}, 0xc) getsockopt$inet_sctp6_SCTP_FRAGMENT_INTERLEAVE(0xffffffffffffffff, 0x84, 0x12, &(0x7f0000000080), &(0x7f00000000c0)=0x4) ioctl$sock_inet_SIOCGIFDSTADDR(0xffffffffffffffff, 0x8917, &(0x7f0000000040)={'bcsh0\x00', {0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x1a}}}) setsockopt$inet_sctp6_SCTP_MAX_BURST(0xffffffffffffffff, 0x84, 0x14, &(0x7f0000000380)=@int=0x3, 0x4) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000140)={'bcsh0\x00', 0x0}) ioctl$sock_inet6_SIOCDELRT(0xffffffffffffffff, 0x890c, &(0x7f0000000180)={@dev={0xfe, 0x80, [], 0x13}, @loopback={0x0, 0x1}, @mcast2={0xff, 0x2, [], 0x1}, 0x6, 0x0, 0x42e, 0x100, 0x9, 0x80000000, r1}) r2 = socket$inet(0x2, 0xa, 0x5) setsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX(r2, 0x84, 0x6e, &(0x7f0000000600)=[@in={0x2, 0x4e21, @multicast1=0xe0000001}, @in6={0xa, 0x4e20, 0x0, @remote={0xfe, 0x80, [], 0xbb}}, @in={0x2, 0x4e22, @multicast2=0xe0000002}, @in6={0xa, 0x4e21, 0x1ff, @local={0xfe, 0x80, [], 0xaa}, 0x84}, @in6={0xa, 0x4e20, 0x4, @local={0xfe, 0x80, [], 0xaa}}], 0x74) getsockopt$inet_sctp6_SCTP_PR_SUPPORTED(0xffffffffffffffff, 0x84, 0x71, &(0x7f0000000200)={0x0, 0x8}, &(0x7f0000000240)=0x8) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(0xffffffffffffffff, 0x84, 0x6f, &(0x7f0000000300)={r3, 0x60, &(0x7f0000000280)=[@in={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x12}}, @in={0x2, 0x4e24, @loopback=0x7f000001}, @in={0x2, 0x0, @remote={0xac, 0x14, 0x14, 0xbb}}, @in={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x1a}}, @in={0x2, 0x4e24, @rand_addr=0x3ff}, @in={0x2, 0x4e24, @multicast2=0xe0000002}]}, &(0x7f0000000340)=0x10) setsockopt$inet_sctp6_SCTP_SET_PEER_PRIMARY_ADDR(0xffffffffffffffff, 0x84, 0x5, &(0x7f00000004c0)={r4, @in={{0x2, 0x4e20, @rand_addr=0x8}}}, 0x84) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, &(0x7f00000003c0)={'lo\x00', 0x4100}) ioctl$sock_inet_SIOCGIFNETMASK(0xffffffffffffffff, 0x891b, &(0x7f0000000100)={'nr0\x00', {0x2, 0x4e24, @loopback=0x7f000001}}) setsockopt$inet_msfilter(r0, 0x0, 0x29, &(0x7f0000000680)=ANY=[@ANYBLOB="cf0000000276d172390cc8c4ff4f3b746e5947c2ddb66a93ebb6d0f75b5f453435c311b94e126c49d47c10682b6e523d09fae1d416ebface98e08aa083e9f1f1afa118eb05655fec48d75d7a37edd032552c60ffeb53a2c8eecbe601a4ac5dceeecf1a943c2d9e2eaf4ad0a93e82a1a37a0cf2adbc4b512680428fee922ad18ff90ec6f87a75b299a953167bf4f9ae31cffd2c31dd47ba7d69151424dc1b2835f7624a302f270eb89118043dc1e1faa46e667be9cbf4456ad0c580ed032e4e49459f68f8a70f2dfe40f51362ffae"], 0x1) pread64(r0, &(0x7f0000000340)=""/181, 0xb5, 0x62) setsockopt$inet_msfilter(r0, 0x0, 0x29, &(0x7f0000000580)=ANY=[@ANYBLOB="e00000027f0000010000000001000000000000006b59aa51deb20d6efc9c04b7c9420f6434d31cbbe99b52873a8c21"], 0x1) socket$inet_udp(0x2, 0x2, 0x0) bpf$BPF_PROG_GET_NEXT_ID(0xb, &(0x7f0000000400)=0x7, 0x4) r5 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000ba4000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x2, 0x78, 0xe2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, r5, 0x0) r6 = perf_event_open(&(0x7f0000014f88)={0x1, 0x78, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00002e8000)}}, 0x0, 0x0, r5, 0x0) readv(r6, &(0x7f0000734000)=[{&(0x7f0000d42000)=""/146, 0x92}], 0x1) getsockopt$inet_sctp_SCTP_PEER_ADDR_THLDS(0xffffffffffffffff, 0x84, 0x1f, &(0x7f0000000480)={0x0, @in={{0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0xd}}}, 0xf80866d, 0x5}, &(0x7f0000000540)=0x90) getsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(0xffffffffffffff9c, 0x84, 0x18, &(0x7f0000000440)={r7, 0x400000000004}, &(0x7f00000005c0)=0xffffffffffffffc3) getsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER_VALUE(r0, 0x84, 0x7c, &(0x7f00000002c0)={r8, 0x10001, 0xc9e9}, &(0x7f0000000300)=0x8) 2018/03/30 19:42:52 executing program 7: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f000099e000)={0x2, 0x4e20, @multicast1=0xe0000001}, 0x10) sendto$inet(r0, &(0x7f0000de1fff), 0xfffffffffffffd43, 0x20008005, &(0x7f0000db4ff0)={0x2, 0x4e20, @loopback=0x7f000001}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000af5000)='illinois\x00', 0x9) recvfrom(r0, &(0x7f0000f9cf9b)=""/101, 0x65, 0x0, 0x0, 0x0) getsockopt$inet_tcp_buf(r0, 0x6, 0x1a, &(0x7f0000000000)=""/177, &(0x7f0000000100)=0xb1) 2018/03/30 19:42:52 executing program 1: r0 = syz_open_dev$amidi(&(0x7f0000000040)='/dev/amidi#\x00', 0x3, 0x28000) ioctl$DRM_IOCTL_RES_CTX(r0, 0xc0086426, &(0x7f0000000100)={0x2c, &(0x7f00000000c0)=[{}, {}, {}, {}, {}, {}, {}, {}]}) socket$netlink(0x10, 0x3, 0xc) writev(0xffffffffffffffff, &(0x7f00000021c0), 0x0) bind$bt_l2cap(r0, &(0x7f0000000340)={0x1f, 0x800000000000002, {0x401, 0x3, 0xb, 0x3f8}}, 0x9) socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f0000a8d000)={&(0x7f0000c78ff4)={0x10}, 0xc, &(0x7f0000df6000)={&(0x7f0000000200)=ANY=[@ANYBLOB="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"], 0x10f}, 0x1}, 0x0) r1 = socket$inet_sctp(0x2, 0x0, 0x84) sendmsg$inet_sctp(r1, &(0x7f0000001f00)={&(0x7f0000001840)=@in={0x2, 0x0, @dev={0xac, 0x14, 0x14}}, 0x10, &(0x7f0000001c40)=[{&(0x7f0000001880)='[', 0x1}], 0x1, &(0x7f0000001e40)}, 0x40) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000540)=@nat={'nat\x00', 0x19, 0x3, 0x376, [0x20000140, 0x0, 0x0, 0x20000170, 0x200002d0], 0x0, &(0x7f0000000100), &(0x7f00000006c0)=ANY=[@ANYBLOB="00000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000ffffffff01000000110000000000000000006e7230000000000000000000000000006772657461703000000000000000000074756e6c30000000000000000000000073797a6b616c6c657230000000000000ffffffffffff0000ff0000ffaaaaaaaaaaaaffff0000ffff000070000000b8000000e800000049444c4554494d45520000000000000000000000000000000000000000000000240000008100000073797a300000000000000000400000000000000000000000000000000100000061727072ffffff7f0000000000000000000000000000000000000000000000000c000000aaaaaaaaaabb00000000000000000000000000000000000000000000000000000000000000000000000000000000000001000000feffffff0000000000000000060000000000000000000000000000000000000000000000000000000000000001000000ffffffff020000000000000002000000880864756d6d79300000000000000000000062707130080000000000000000000000697036746e6c3000000000000000000073697430000000000000000000000000ffffffffffff000000000000aaaaaaaaaaaaffffffff00ff0000700000007000000098000000726564697265637400000000000000000000000000000000000000000000000004000000fcffffff0900000008000000000062726964676530000000000000000000697036746e6c3000000000000000000062637368300000000000000000000000766c616e300000000000000000000000000000000000ff00ff00ffffffffffffffff00ffffffff000000080100000801000030010000697076730000000000000000000000000000000000000000000000000000000028000000ac1414aa000000000000000000000000ffffffffffffff0000000000ff0000004e2400004e240008697076730000000000000000000000000000000000000000000000000000000028000000e0000001000000000000000000000000ffffffff000000ffffffffffff0000004e212b054e201f124155444954000000000000000000000000000000000000000000000000000000040000000000000075eb180f3829"]}, 0x3ee) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000002980)) getsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(0xffffffffffffffff, 0x84, 0x1f, &(0x7f0000000440)={0x0, @in={{0x2, 0x4e22, @multicast2=0xe0000002}}, 0x7bb7, 0x4}, &(0x7f0000000500)=0x90) getsockopt$inet_sctp_SCTP_RTOINFO(0xffffffffffffffff, 0x84, 0x0, &(0x7f0000002240)={0x0, 0x9, 0x417}, &(0x7f00000001c0)=0x10) r2 = socket(0x22, 0x4, 0x3) r3 = socket(0x20000001e, 0x5, 0x0) r4 = perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$packet_tx_ring(r3, 0x10f, 0x87, &(0x7f0000265000)=@req={0x3fc, 0x0, 0x1}, 0x10) getegid() setsockopt$packet_tx_ring(r2, 0x10f, 0x87, &(0x7f0000265000)=@req={0x3fc, 0x0, 0x1}, 0x10) writev(r2, &(0x7f00000000c0)=[{&(0x7f0000000000)="8a", 0x1}], 0x1) close(r2) close(r3) perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r5 = syz_open_dev$evdev(&(0x7f0000dfdfee)='/dev/input/event#\x00', 0x0, 0x2) readv(r5, &(0x7f0000019fe0)=[{&(0x7f00008ec000)=""/219, 0xdb}], 0x1) write$evdev(r5, &(0x7f000004d000)=[{{}, 0x0, 0x1}, {{0x2}}], 0x30) r6 = getpgrp(0x0) setsockopt$ax25_int(r3, 0x101, 0xd, &(0x7f0000000080)=0x7, 0x4) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x8, 0xfffffffffffffffd, 0x9, 0x7, 0x0, 0x8001, 0x0, 0x6, 0x3ff, 0x4, 0x5, 0x4, 0xbd9, 0x56, 0x8000, 0x7f, 0xff, 0xeba, 0x1f, 0x0, 0xfd, 0x3, 0x1, 0x50, 0x7, 0x9, 0x641800, 0x3ff8000000000000, 0x4, 0x0, 0x10000, 0x5, 0x7, 0x6, 0x1, 0xffffffffffffffe0, 0x0, 0x20, 0x0, @perf_bp={&(0x7f0000000040), 0x8}, 0x20, 0x401, 0x8, 0x3, 0x8, 0x7, 0x7}, r6, 0xc, r4, 0x0) syz_genetlink_get_family_id$ipvs(&(0x7f0000000040)='IPVS\x00') [ 491.501235] FAT-fs (loop4): Unrecognized mount option "time_offset=" or missing value [ 491.518997] IPVS: ftp: loaded support on port[0] = 21 [ 491.531736] device lo left promiscuous mode 2018/03/30 19:42:52 executing program 6: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_mreqn(r0, 0x0, 0x27, &(0x7f0000000000)={@multicast2=0xe0000002, @loopback=0x7f000001}, 0xc) getsockopt$inet_sctp6_SCTP_FRAGMENT_INTERLEAVE(0xffffffffffffffff, 0x84, 0x12, &(0x7f0000000080), &(0x7f00000000c0)=0x4) ioctl$sock_inet_SIOCGIFDSTADDR(0xffffffffffffffff, 0x8917, &(0x7f0000000040)={'bcsh0\x00', {0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x1a}}}) setsockopt$inet_sctp6_SCTP_MAX_BURST(0xffffffffffffffff, 0x84, 0x14, &(0x7f0000000380)=@int=0x3, 0x4) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000140)={'bcsh0\x00', 0x0}) ioctl$sock_inet6_SIOCDELRT(0xffffffffffffffff, 0x890c, &(0x7f0000000180)={@dev={0xfe, 0x80, [], 0x13}, @loopback={0x0, 0x1}, @mcast2={0xff, 0x2, [], 0x1}, 0x6, 0x0, 0x42e, 0x100, 0x9, 0x80000000, r1}) r2 = socket$inet(0x2, 0xa, 0x5) setsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX(r2, 0x84, 0x6e, &(0x7f0000000600)=[@in={0x2, 0x4e21, @multicast1=0xe0000001}, @in6={0xa, 0x4e20, 0x0, @remote={0xfe, 0x80, [], 0xbb}}, @in={0x2, 0x4e22, @multicast2=0xe0000002}, @in6={0xa, 0x4e21, 0x1ff, @local={0xfe, 0x80, [], 0xaa}, 0x84}, @in6={0xa, 0x4e20, 0x4, @local={0xfe, 0x80, [], 0xaa}}], 0x74) getsockopt$inet_sctp6_SCTP_PR_SUPPORTED(0xffffffffffffffff, 0x84, 0x71, &(0x7f0000000200)={0x0, 0x8}, &(0x7f0000000240)=0x8) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(0xffffffffffffffff, 0x84, 0x6f, &(0x7f0000000300)={r3, 0x70, &(0x7f0000000280)=[@in={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x12}}, @in={0x2, 0x4e24, @loopback=0x7f000001}, @in={0x2, 0x0, @remote={0xac, 0x14, 0x14, 0xbb}}, @in={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x1a}}, @in={0x2, 0x0, @remote={0xac, 0x14, 0x14, 0xbb}}, @in={0x2, 0x4e24, @rand_addr=0x3ff}, @in={0x2, 0x4e24, @multicast2=0xe0000002}]}, &(0x7f0000000340)=0x10) setsockopt$inet_sctp6_SCTP_SET_PEER_PRIMARY_ADDR(0xffffffffffffffff, 0x84, 0x5, &(0x7f00000004c0)={r4, @in={{0x2, 0x4e20, @rand_addr=0x8}}}, 0x84) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, &(0x7f00000003c0)={'lo\x00', 0x4100}) ioctl$sock_inet_SIOCGIFNETMASK(0xffffffffffffffff, 0x891b, &(0x7f0000000100)={'nr0\x00', {0x2, 0x4e24, @loopback=0x7f000001}}) setsockopt$inet_msfilter(r0, 0x0, 0x29, &(0x7f0000000680)=ANY=[@ANYBLOB="cf0000000276d172390cc8c4ff4f3b746e5947c2ddb66a93ebb6d0f75b5f453435c311b94e126c49d47c10682b6e523d09fae1d416ebface98e08aa083e9f1f1afa118eb05655fec48d75d7a37edd032552c60ffeb53a2c8eecbe601a4ac5dceeecf1a943c2d9e2eaf4ad0a93e82a1a37a0cf2adbc4b512680428fee922ad18ff90ec6f87a75b299a953167bf4f9ae31cffd2c31dd47ba7d69151424dc1b2835f7624a302f270eb89118043dc1e1faa46e667be9cbf4456ad0c580ed032e4e49459f68f8a70f2dfe40f51362ffae"], 0x1) pread64(r0, &(0x7f0000000340)=""/181, 0xb5, 0x62) setsockopt$inet_msfilter(r0, 0x0, 0x29, &(0x7f0000000580)=ANY=[@ANYBLOB="e00000027f0000010000000001000000000000006b59aa51deb20d6efc9c04b7c9420f6434d31cbbe99b52873a8c21"], 0x1) socket$inet_udp(0x2, 0x2, 0x0) bpf$BPF_PROG_GET_NEXT_ID(0xb, &(0x7f0000000400)=0x7, 0x4) r5 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000ba4000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x2, 0x78, 0xe2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, r5, 0x0) r6 = perf_event_open(&(0x7f0000014f88)={0x1, 0x78, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00002e8000)}}, 0x0, 0x0, r5, 0x0) readv(r6, &(0x7f0000734000)=[{&(0x7f0000d42000)=""/146, 0x92}], 0x1) getsockopt$inet_sctp_SCTP_PEER_ADDR_THLDS(0xffffffffffffffff, 0x84, 0x1f, &(0x7f0000000480)={0x0, @in={{0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0xd}}}, 0xf80866d, 0x5}, &(0x7f0000000540)=0x90) getsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(0xffffffffffffff9c, 0x84, 0x18, &(0x7f0000000440)={r7, 0x400000000004}, &(0x7f00000005c0)=0xffffffffffffffc3) getsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER_VALUE(r0, 0x84, 0x7c, &(0x7f00000002c0)={r8, 0x10001, 0xc9e9}, &(0x7f0000000300)=0x8) [ 491.548688] jfs: Unrecognized mount option "umask=?" or missing value 2018/03/30 19:42:52 executing program 3: r0 = syz_open_dev$random(&(0x7f00000003c0)='/dev/random\x00', 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f000060c000)='oom_score_adj\x00') poll(&(0x7f00000014c0)=[{r1, 0x401}, {r1, 0x40}, {0xffffffffffffffff, 0x200}, {r1, 0x220}, {r0, 0x2320}], 0x5, 0x232) ioctl$TIOCGPGRP(r1, 0x540f, &(0x7f00000000c0)) getsockopt$netrom_NETROM_T4(r1, 0x103, 0x6, &(0x7f0000000300)=0x8, &(0x7f0000000340)=0x4) r2 = socket$inet6(0xa, 0x2000000802, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r2, 0x29, 0x20, &(0x7f0000f68000)={@loopback={0x0, 0x1}, 0x800, 0x0, 0xff, 0x1}, 0x20) setsockopt$inet6_int(r2, 0x29, 0x21, &(0x7f000089b000)=0x3, 0x4) setsockopt$bt_l2cap_L2CAP_OPTIONS(r1, 0x6, 0x1, &(0x7f0000001500)={0x0, 0x2, 0x9, 0x8, 0x46a7, 0x3, 0x101}, 0xc) getsockopt$sock_timeval(r2, 0x1, 0x15, &(0x7f00000004c0), &(0x7f0000000500)=0x10) r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup.net\x00', 0x200002, 0x0) fchdir(r3) r4 = creat(&(0x7f0000000040)='./file1\x00', 0x0) ioctl$fiemap(r3, 0xc020660b, &(0x7f0000000f40)={0x9, 0x0, 0x2, 0x7fff, 0x1, [{0x7, 0x4, 0x0, 0x0, 0x0, 0x8}]}) r5 = dup3(r4, r3, 0x0) pwritev(r3, &(0x7f00000012c0)=[{&(0x7f0000000100)="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", 0xa28}], 0x1, 0x0) fcntl$setstatus(r3, 0x4, 0x4000) write$cgroup_subtree(r5, &(0x7f0000000000)=ANY=[], 0x34123610) getsockname$packet(0xffffffffffffffff, &(0x7f0000000fc0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @link_local}, &(0x7f0000001000)=0x14) ioprio_get$pid(0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(r5, 0x29, 0x22, &(0x7f0000001040)={{{@in6=@loopback, @in6=@mcast2}}, {{@in=@local}, 0x0, @in6=@mcast2}}, &(0x7f0000000f00)=0xe8) setsockopt$inet_IP_IPSEC_POLICY(r4, 0x0, 0x10, &(0x7f0000001140)={{{@in6=@ipv4={[], [0xff, 0xff]}, @in=@local={0xac, 0x14, 0x14, 0xaa}, 0x4e21, 0x0, 0x4e24, 0x92, 0x2, 0xa0, 0x0, 0x88, r6}, {0xdef, 0x7, 0x9, 0x7, 0x3868, 0x0, 0x3, 0x101}, {0x0, 0x0, 0xfffffffffffffffa, 0xff5}, 0x80, 0x6e6bba, 0x1, 0x1}, {{@in6=@mcast1={0xff, 0x1, [], 0x1}, 0x0, 0xff}, 0x0, @in=@remote={0xac, 0x14, 0x14, 0xbb}, 0x0, 0x0, 0x3, 0x8, 0x2, 0x0, 0x101}}, 0xe8) setsockopt$inet6_MCAST_JOIN_GROUP(r2, 0x29, 0x2a, &(0x7f0000000b40)={0x1, {{0xa, 0x4e20, 0xffffffff, @remote={0xfe, 0x80, [], 0xbb}, 0x5}}}, 0x88) connect$inet6(0xffffffffffffffff, &(0x7f000000cfe4)={0xa, 0x0, 0x807}, 0x1c) getsockopt$inet6_IPV6_FLOWLABEL_MGR(r2, 0x29, 0x20, &(0x7f0000000000)={@mcast2={0xff, 0x2, [], 0x1}}, &(0x7f0000000040)=0x20) r7 = fcntl$getown(0xffffffffffffffff, 0x9) syz_open_procfs(r7, &(0x7f0000000100)="6e65742f69665f696e6574360093fdd81f12659f45e9cb89f8ffffffd451bea0bcf166e408aa93f2de9c7a1786a0b83e1c0da5210d01b9336480d24bf721df26e12a6152f604622b86f9e8a6d4e0e52b4d4518804bc3d131a1c20cee863e600711d0f8cdebab9c16f184f3835747b5fcfb4a8c439d37279d64119874b715ecd26d08c0b9f7b98e72b9401bf0496339354aaf1e011da685dbc8ee74625b3974533f2e05355dadea49035c03b2809c55c2ece8b4e17928fb1361c58fe2024cfa4798878692a6cfcad49eb3c51b78c9453e001eb16c27a6a39ca29de3e43b781daa7dd4348012f3b554bb56240130d542005d2e50fe46373cfc76a6a49c1b8050c99c08ab6aa3ec304a505456d90803f21ef70a51f56c6f4998e6fbb1d9d09e754b10d4b8f03d7621be8ab07b006d8081d8c353648c513e4d06bc9a3ecd201848931a11f7db75d319c2d37f4298ff0a48ad3e2a1f1a4c3813c47084b80fd1bacef8681897d56a3b09d2d1d0d60a1d3db780d2aad06d6f0ac83cb479cc667cb00e0d4133539b1ea8a2c5ffdcd9e6f82000824ed364cdb3d9aef2b4f74545e77ecc557beb1d694fc99c505392916ed300ecd94fe0a7b30886d5c4ef01db53002a4185d19fa71fd8728f0b09de4d8ff1444fa7e59f884f27c0b3fe86fd51a3f63c6adbb36ca81d182d25b311a045ba13") setsockopt$inet6_udp_int(0xffffffffffffffff, 0x11, 0x65, &(0x7f0000000000), 0x4) sysfs$2(0x2, 0x0, &(0x7f0000000c00)=""/179) 2018/03/30 19:42:52 executing program 4: symlinkat(&(0x7f0000002f00)='./file0\x00', 0xffffffffffffffff, &(0x7f0000002f80)='./file0\x00') syz_mount_image$msdos(&(0x7f0000002fc0)='msdos\x00', &(0x7f0000003000)='./file0\x00', 0x4, 0x1, &(0x7f0000003180)=[{&(0x7f0000003040)="eaf9610c9f7031a1f58e51e73b3f0bd5af4364c38bbe335dbd3d211ec0338ba4c795c634af757a3c684da6110f67891133a6303441b21d139e3a6582efdaeabd3d68dbcb85cd383733a98084b62807af0b7ea49d68daa4cc9fda43dbeb13c3e67c44c463a2c429ccb66c0e1a9dfd5c911d4d7b578baaad6571d4457b9c6d92122a4bd97f5f174c81081941b007062f2cab2db1466851dde671e025909a633fec433bb2512fc61c436b74df23d280019a403884dc488071", 0xb7, 0xcd7}], 0x8, &(0x7f00000031c0)={[{@errors_continue='errors=continue', 0x2c}, {@time_offset={'time_offset', 0x3d, [0x0]}, 0x2c}]}) pipe(&(0x7f0000002f40)={0xffffffffffffffff}) r1 = open(&(0x7f0000003240)='./file0\x00', 0xa0001, 0x20) linkat(r0, &(0x7f0000003200)='./file0\x00', r1, &(0x7f0000003280)='./file0\x00', 0x400) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x80000, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)}, {&(0x7f0000010d00)="0000000000000000000000000000000000000000000000000000000002ae0000ed41000000040000d15bbe5ad15bbe5ad15bbe5a00000000000005002000000000000800070000000af301000400000000000000000000000100000030000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a1950000", 0xa0, 0x8c60}, {&(0x7f0000011a00)="020000000c0001022e000000020000000c0002022e2e00000b00000014000a026c6f73742b666f756e6400000c0000001000050166696c65300000000d0000001000050266696c65310000000f0000001000050166696c6532000000100000001000050166696c6533000000110000001000050166696c65340000001200000010000802564944454f5f54531400000068031201d181d18ed0b7d0bad0b0d0bbd0bbd0b5d1800000000000000000000000000000000000000000000000000000", 0xc0, 0xc000}, {&(0x7f0000012200)="0000000000000000000000000000000000000000000000000c0000dec910dfd800000000f4030000000000000000000000000000000000000000000000000000", 0x40, 0x117e0}, {&(0x7f0000012a00)="0d0000000c0001022e000000020000000c0002022e2e00000e000000dc03050166696c6530000000000000000000000000000000000000000000000000000000", 0x40, 0x1c000}], 0x0, &(0x7f0000013000)) syz_mount_image$bfs(&(0x7f0000000040)='bfs\x00', &(0x7f00000008c0)='./file0\x00', 0x20, 0x2, &(0x7f0000000180)=[{&(0x7f00000005c0)="f37e57346e86cb5adec662d7bd6f13a3764d2ca7640f9f81ba88d0689d0989735a7bafd5558d9a6e8988f9f6038fa475e49077bc8cfc6e170c4cdbaaa1375895c9a4068559d3cecf2a0423caa696bf77a75b3ae3f32b79da059ca13d055647998987fc2033d008bd55deb08808372b9b4595fb0d79a1358cd5949d859a7d155e86db4b608eb401109f6b792f5ce4a2ead9870dee49347bc08d0d54b0e4fca4fd895947a737f4ee823d997770e5c9df50c0c9fe2c0b945c6ffd13b7151e385b631520ac34a5967c6cd0d12b3746795681600541c17d379daed41ce8e715eba582fb668e160872a2", 0xe7, 0x7}, {&(0x7f0000000780)="6154d093a5a905da96fed5f8dea36bcd9d1d011246f7caf86806bf6ac6301d2d2b448461b867bbbe7d0eebdeafa16d7219af85ff4372670039ce277546def59f1d0eed4be4386a34c7243fe3ec84ad3807136a2c3ec35d6d87a7d7bb9342622cc3a7ff529ef3d76ff57fc7a1856f50b98e518515a9e679067cfc0e8500754fa30a81cf4dc42c5a0d36647280c5b0a8506efaf9ad06594678176efe4bdbcf7ab384b597df4c5ad66b2bd240823abe04cd30785819f1c7fd4d46bb55f8bd09ca4b44618b010e363fa572ca189ec73b36ad46b6f38d65c0acc417", 0xd9, 0x5}], 0x200000, 0x0) syz_mount_image$jfs(&(0x7f0000000080)='jfs\x00', &(0x7f0000000880)='./file0\x00', 0xfffffffffffffffe, 0x3, &(0x7f0000002dc0)=[{&(0x7f0000000900)="efee47debce411554253d03f2175c060de26b9a7a197d9327971105aafdf17a061227fe7dd52d3c1c1f0318992f304f7646c3eb4e32ff0514d34d4605b4e152474aa71ac6c0ba890b1f249f213d5bc162b605fdf3c524d6f84e1a2f8461d26ef5dd50b193ffb710ee69fc431552ae4548f0c1a7e503243bb10c53c566f37e3234d8b3d418992dca946568d275e1f54895a854bab3790963108fe6ce5b1f933e81bd0aa2dfd715aca4bd81b48b28e3ee265", 0xb1, 0x1}, {&(0x7f0000001a80)="b4bc90ad72742e5693f04c7955b05460b33cd0ca9cde365dbe1671162a8c1db744cb8a04d1d747ab4d3234fd615e6ad897396c21b8bf7da2c1d524d04fadade841e5acfac529250a2c75fed4b65a7b6c8735268244189e020c526112728097958fd591d00cd16d1591db9b0414d985d7718794369eb03d89403b7df76f6d745c94d4fa986321a9915fea55a73472bc39620fcf22ec74d02b77fafe6ccf72605eb0ba7ae69fa10a36d281e65a178528bc654ce5b6109d5294e400b18be755a3b899489b27a876ac3ea033ed525b28c7dff537b5210cbff466dc339e1f58db1679816589e886264ef1bcf6d0e1408d93946827711972", 0xf5, 0x7}, {&(0x7f0000002cc0)="c9bc1928c9ffffe99fdae39f5013810a038f1d558affc92341c81ee308195dabd95fcfedcfccd4cf2af62477e5ed935114b73940dba239c47d5824a3332fb48cea682934a6840ea5db2529c3a7c371bbf08f08bb15458de586609be64b699f29b7384dc7b2ba78f0e343fb9851eaf5a7b4106fc5b7a8aaf6e069012286fa7259807928cbee722222f45e6c98cefa00829bcdd92bd03273c7b0f20453c72150adf49c311248d3d3d96ad17187d60add3d1d8fbfbc5e572ceba134e5c533a5f75630a35514ee998b85a755085c04513dcc0047461d78f4aa8fdf0309fc39e3e4a1c24b4538acbf2366fe", 0xe9, 0x4}], 0x10000, &(0x7f0000002ec0)={[{@nodiscard='nodiscard', 0x2c}, {@resize='resize', 0x2c}, {@noquota='noquota', 0x2c}, {@umask={'umask', 0x3d, [0x3f]}, 0x2c}]}) [ 491.574773] device lo entered promiscuous mode 2018/03/30 19:42:52 executing program 7: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f000099e000)={0x2, 0x4e20, @multicast1=0xe0000001}, 0x10) sendto$inet(r0, &(0x7f0000de1fff), 0xfffffffffffffd43, 0x20008005, &(0x7f0000db4ff0)={0x2, 0x4e20, @loopback=0x7f000001}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000af5000)='illinois\x00', 0x9) recvfrom(r0, &(0x7f0000f9cf9b)=""/101, 0x65, 0x0, 0x0, 0x0) getsockopt$inet_tcp_buf(r0, 0x6, 0x1a, &(0x7f0000000000)=""/177, &(0x7f0000000100)=0xb1) 2018/03/30 19:42:52 executing program 6: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_mreqn(r0, 0x0, 0x27, &(0x7f0000000000)={@multicast2=0xe0000002, @loopback=0x7f000001}, 0xc) getsockopt$inet_sctp6_SCTP_FRAGMENT_INTERLEAVE(0xffffffffffffffff, 0x84, 0x12, &(0x7f0000000080), &(0x7f00000000c0)=0x4) ioctl$sock_inet_SIOCGIFDSTADDR(0xffffffffffffffff, 0x8917, &(0x7f0000000040)={'bcsh0\x00', {0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x1a}}}) setsockopt$inet_sctp6_SCTP_MAX_BURST(0xffffffffffffffff, 0x84, 0x14, &(0x7f0000000380)=@int=0x3, 0x4) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000140)={'bcsh0\x00', 0x0}) ioctl$sock_inet6_SIOCDELRT(0xffffffffffffffff, 0x890c, &(0x7f0000000180)={@dev={0xfe, 0x80, [], 0x13}, @loopback={0x0, 0x1}, @mcast2={0xff, 0x2, [], 0x1}, 0x6, 0x0, 0x42e, 0x100, 0x9, 0x80000000, r1}) r2 = socket$inet(0x2, 0xa, 0x5) setsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX(r2, 0x84, 0x6e, &(0x7f0000000600)=[@in={0x2, 0x4e21, @multicast1=0xe0000001}, @in6={0xa, 0x4e20, 0x0, @remote={0xfe, 0x80, [], 0xbb}}, @in={0x2, 0x4e22, @multicast2=0xe0000002}, @in6={0xa, 0x4e21, 0x1ff, @local={0xfe, 0x80, [], 0xaa}, 0x84}, @in6={0xa, 0x4e20, 0x4, @local={0xfe, 0x80, [], 0xaa}}], 0x74) getsockopt$inet_sctp6_SCTP_PR_SUPPORTED(0xffffffffffffffff, 0x84, 0x71, &(0x7f0000000200)={0x0, 0x8}, &(0x7f0000000240)=0x8) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(0xffffffffffffffff, 0x84, 0x6f, &(0x7f0000000300)={r3, 0x70, &(0x7f0000000280)=[@in={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x12}}, @in={0x2, 0x4e24, @loopback=0x7f000001}, @in={0x2, 0x0, @remote={0xac, 0x14, 0x14, 0xbb}}, @in={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x1a}}, @in={0x2, 0x0, @remote={0xac, 0x14, 0x14, 0xbb}}, @in={0x2, 0x4e24, @rand_addr=0x3ff}, @in={0x2, 0x4e24, @multicast2=0xe0000002}]}, &(0x7f0000000340)=0x10) setsockopt$inet_sctp6_SCTP_SET_PEER_PRIMARY_ADDR(0xffffffffffffffff, 0x84, 0x5, &(0x7f00000004c0)={r4, @in={{0x2, 0x4e20, @rand_addr=0x8}}}, 0x84) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, &(0x7f00000003c0)={'lo\x00', 0x4100}) ioctl$sock_inet_SIOCGIFNETMASK(0xffffffffffffffff, 0x891b, &(0x7f0000000100)={'nr0\x00', {0x2, 0x4e24, @loopback=0x7f000001}}) setsockopt$inet_msfilter(r0, 0x0, 0x29, &(0x7f0000000680)=ANY=[@ANYBLOB="cf0000000276d172390cc8c4ff4f3b746e5947c2ddb66a93ebb6d0f75b5f453435c311b94e126c49d47c10682b6e523d09fae1d416ebface98e08aa083e9f1f1afa118eb05655fec48d75d7a37edd032552c60ffeb53a2c8eecbe601a4ac5dceeecf1a943c2d9e2eaf4ad0a93e82a1a37a0cf2adbc4b512680428fee922ad18ff90ec6f87a75b299a953167bf4f9ae31cffd2c31dd47ba7d69151424dc1b2835f7624a302f270eb89118043dc1e1faa46e667be9cbf4456ad0c580ed032e4e49459f68f8a70f2dfe40f51362ffae"], 0x1) pread64(r0, &(0x7f0000000340)=""/181, 0xb5, 0x62) setsockopt$inet_msfilter(r0, 0x0, 0x29, &(0x7f0000000580)=ANY=[@ANYBLOB="e00000027f0000010000000001000000000000006b59aa51deb20d6efc9c04b7c9420f6434d31cbbe99b52873a8c21"], 0x1) socket$inet_udp(0x2, 0x2, 0x0) bpf$BPF_PROG_GET_NEXT_ID(0xb, &(0x7f0000000400)=0x7, 0x4) r5 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000ba4000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x2, 0x78, 0xe2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, r5, 0x0) r6 = perf_event_open(&(0x7f0000014f88)={0x1, 0x78, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00002e8000)}}, 0x0, 0x0, r5, 0x0) readv(r6, &(0x7f0000734000)=[{&(0x7f0000d42000)=""/146, 0x92}], 0x1) getsockopt$inet_sctp_SCTP_PEER_ADDR_THLDS(0xffffffffffffffff, 0x84, 0x1f, &(0x7f0000000480)={0x0, @in={{0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0xd}}}, 0xf80866d, 0x5}, &(0x7f0000000540)=0x90) getsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(0xffffffffffffff9c, 0x84, 0x18, &(0x7f0000000440)={r7, 0x400000000004}, &(0x7f00000005c0)=0xffffffffffffffc3) getsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER_VALUE(r0, 0x84, 0x7c, &(0x7f00000002c0)={r8, 0x10001, 0xc9e9}, &(0x7f0000000300)=0x8) [ 491.630600] device lo left promiscuous mode [ 491.644802] FAT-fs (loop4): Unrecognized mount option "time_offset=" or missing value [ 491.648668] device lo entered promiscuous mode [ 491.694586] EXT4-fs (loop4): VFS: Can't find ext4 filesystem 2018/03/30 19:42:52 executing program 0: r0 = getpid() r1 = syz_open_procfs(r0, &(0x7f0000000480)="2f6578650000000000ff070000ddd9f191be10eebf000ee9ff0700000000000054fa07424adee916d2da75afe70b35a0fd6a1f349572d226d7a075fb35331ce39c5a3568641006d7c0206a74e333265316a175350e730ab2bce682b69d603fc05ead7fb5180de13a74155d8560fe23dfbba10724631067f955b8810f3402053f95a8798b0e3749d9c79cdd5f62547e59ab4352ab0a3827384665fd2c16ea53e5e2a1dc065b53520b9cd4eb30edc0f70cb82149f8ff5b628eabf1a9ab91915a78b5cb259f4a0fbfab4dacbd68f077") chroot(&(0x7f0000000000)='./file1\x00') ioctl$SIOCGIFHWADDR(r1, 0x8927, &(0x7f0000000080)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000300), &(0x7f0000000380)=0xc) fstat(r1, &(0x7f0000001d80)) geteuid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000002340)={0x0, 0x0, 0x0}, &(0x7f0000002380)=0xc) stat(&(0x7f00000023c0)='./file0\x00', &(0x7f0000002400)={0x0, 0x0, 0x0, 0x0, 0x0}) lstat(&(0x7f0000002480)='./file1\x00', &(0x7f00000024c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) sendmsg$netlink(r1, &(0x7f00000026c0)={&(0x7f00000000c0)=@kern={0x10, 0x0, 0x0, 0x40108000}, 0xc, &(0x7f00000022c0)=[{&(0x7f0000000580)={0x10, 0x2a, 0x110, 0x70bd28, 0x25dfdbfc}, 0x10}], 0x1, &(0x7f0000002540)=ANY=[@ANYRES32=r1, @ANYRES32=r1, @ANYBLOB="0000000020000000000000000100000001000000", @ANYRES32=r1, @ANYBLOB="0000000020000000000000000100000002000000", @ANYRES32=r2, @ANYRES32=r1, @ANYRES32=r1, @ANYRES32=r1, @ANYRES32=r1, @ANYRES32=r1, @ANYBLOB="0000000020000000000000000100000001000000", @ANYRES32=r1, @ANYRES32=r1, @ANYBLOB="0000000020000000000000000100000002000000", @ANYRES32=r3, @ANYRES32=r4, @ANYBLOB="0000000030000000000000000100000001000000", @ANYRES32=r1, @ANYRES32=r1, @ANYRES32=r1, @ANYRES32=r1, @ANYRES32=r1, @ANYRES32=r1, @ANYBLOB='\x00\x00\x00\x00'], 0xb4, 0x10}, 0x4000) syncfs(r1) setsockopt$inet_sctp6_SCTP_EVENTS(r1, 0x84, 0xb, &(0x7f0000000040)={0x0, 0x0, 0xfa, 0x1, 0x0, 0x7, 0x7, 0x8001, 0x3f, 0x94fc, 0x1bcb}, 0xb) mount(&(0x7f0000000340)='./file1\x00', &(0x7f0000015ff8)='./file0\x00', &(0x7f000001fffa)='bdev\x00', 0x0, &(0x7f000001f000)) 2018/03/30 19:42:52 executing program 3: ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'ip6tnl0\x00', 0x9516}) close(0xffffffffffffffff) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000044ff8)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$SO_VM_SOCKETS_CONNECT_TIMEOUT(0xffffffffffffffff, 0x28, 0x6, &(0x7f0000000000)={0x77359400}, 0x10) sendmmsg$unix(r1, &(0x7f00000bd000), 0x80, 0x0) poll(&(0x7f0000084ff0), 0x0, 0x0) dup2(r1, r0) openat$sequencer(0xffffffffffffff9c, &(0x7f0000000180)='/dev/sequencer\x00', 0x0, 0x0) syz_open_procfs(0x0, &(0x7f0000000280)='net/wireless\x00') mknodat(0xffffffffffffffff, &(0x7f0000000240)='./file0\x00', 0x0, 0x0) clone(0x0, &(0x7f00008a2000), &(0x7f0000d6cffc), &(0x7f0000ca4000), &(0x7f0000ab5f60)) getxattr(&(0x7f00000000c0)='./file0\x00', &(0x7f00000001c0)=ANY=[@ANYBLOB], &(0x7f00000002c0)=""/152, 0x98) [ 491.740085] BFS-fs: bfs_fill_super(): No BFS filesystem on loop4 (magic=00000000) 2018/03/30 19:42:52 executing program 6: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_mreqn(r0, 0x0, 0x27, &(0x7f0000000000)={@multicast2=0xe0000002, @loopback=0x7f000001}, 0xc) getsockopt$inet_sctp6_SCTP_FRAGMENT_INTERLEAVE(0xffffffffffffffff, 0x84, 0x12, &(0x7f0000000080), &(0x7f00000000c0)=0x4) ioctl$sock_inet_SIOCGIFDSTADDR(0xffffffffffffffff, 0x8917, &(0x7f0000000040)={'bcsh0\x00', {0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x1a}}}) setsockopt$inet_sctp6_SCTP_MAX_BURST(0xffffffffffffffff, 0x84, 0x14, &(0x7f0000000380)=@int=0x3, 0x4) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000140)={'bcsh0\x00', 0x0}) ioctl$sock_inet6_SIOCDELRT(0xffffffffffffffff, 0x890c, &(0x7f0000000180)={@dev={0xfe, 0x80, [], 0x13}, @loopback={0x0, 0x1}, @mcast2={0xff, 0x2, [], 0x1}, 0x6, 0x0, 0x42e, 0x100, 0x9, 0x80000000, r1}) r2 = socket$inet(0x2, 0xa, 0x5) setsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX(r2, 0x84, 0x6e, &(0x7f0000000600)=[@in={0x2, 0x4e21, @multicast1=0xe0000001}, @in6={0xa, 0x4e20, 0x0, @remote={0xfe, 0x80, [], 0xbb}}, @in={0x2, 0x4e22, @multicast2=0xe0000002}, @in6={0xa, 0x4e21, 0x1ff, @local={0xfe, 0x80, [], 0xaa}, 0x84}, @in6={0xa, 0x4e20, 0x4, @local={0xfe, 0x80, [], 0xaa}}], 0x74) getsockopt$inet_sctp6_SCTP_PR_SUPPORTED(0xffffffffffffffff, 0x84, 0x71, &(0x7f0000000200)={0x0, 0x8}, &(0x7f0000000240)=0x8) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(0xffffffffffffffff, 0x84, 0x6f, &(0x7f0000000300)={r3, 0x70, &(0x7f0000000280)=[@in={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x12}}, @in={0x2, 0x4e24, @loopback=0x7f000001}, @in={0x2, 0x0, @remote={0xac, 0x14, 0x14, 0xbb}}, @in={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x1a}}, @in={0x2, 0x0, @remote={0xac, 0x14, 0x14, 0xbb}}, @in={0x2, 0x4e24, @rand_addr=0x3ff}, @in={0x2, 0x4e24, @multicast2=0xe0000002}]}, &(0x7f0000000340)=0x10) setsockopt$inet_sctp6_SCTP_SET_PEER_PRIMARY_ADDR(0xffffffffffffffff, 0x84, 0x5, &(0x7f00000004c0)={r4, @in={{0x2, 0x4e20, @rand_addr=0x8}}}, 0x84) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, &(0x7f00000003c0)={'lo\x00', 0x4100}) ioctl$sock_inet_SIOCGIFNETMASK(0xffffffffffffffff, 0x891b, &(0x7f0000000100)={'nr0\x00', {0x2, 0x4e24, @loopback=0x7f000001}}) setsockopt$inet_msfilter(r0, 0x0, 0x29, &(0x7f0000000680)=ANY=[@ANYBLOB="cf0000000276d172390cc8c4ff4f3b746e5947c2ddb66a93ebb6d0f75b5f453435c311b94e126c49d47c10682b6e523d09fae1d416ebface98e08aa083e9f1f1afa118eb05655fec48d75d7a37edd032552c60ffeb53a2c8eecbe601a4ac5dceeecf1a943c2d9e2eaf4ad0a93e82a1a37a0cf2adbc4b512680428fee922ad18ff90ec6f87a75b299a953167bf4f9ae31cffd2c31dd47ba7d69151424dc1b2835f7624a302f270eb89118043dc1e1faa46e667be9cbf4456ad0c580ed032e4e49459f68f8a70f2dfe40f51362ffae"], 0x1) pread64(r0, &(0x7f0000000340)=""/181, 0xb5, 0x62) setsockopt$inet_msfilter(r0, 0x0, 0x29, &(0x7f0000000580)=ANY=[@ANYBLOB="e00000027f0000010000000001000000000000006b59aa51deb20d6efc9c04b7c9420f6434d31cbbe99b52873a8c21"], 0x1) socket$inet_udp(0x2, 0x2, 0x0) bpf$BPF_PROG_GET_NEXT_ID(0xb, &(0x7f0000000400)=0x7, 0x4) r5 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000ba4000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x2, 0x78, 0xe2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, r5, 0x0) r6 = perf_event_open(&(0x7f0000014f88)={0x1, 0x78, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00002e8000)}}, 0x0, 0x0, r5, 0x0) readv(r6, &(0x7f0000734000)=[{&(0x7f0000d42000)=""/146, 0x92}], 0x1) getsockopt$inet_sctp_SCTP_PEER_ADDR_THLDS(0xffffffffffffffff, 0x84, 0x1f, &(0x7f0000000480)={0x0, @in={{0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0xd}}}, 0xf80866d, 0x5}, &(0x7f0000000540)=0x90) getsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(0xffffffffffffff9c, 0x84, 0x18, &(0x7f0000000440)={r7, 0x400000000004}, &(0x7f00000005c0)=0xffffffffffffffc3) getsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER_VALUE(r0, 0x84, 0x7c, &(0x7f00000002c0)={r8, 0x10001, 0xc9e9}, &(0x7f0000000300)=0x8) [ 491.789075] jfs: Unrecognized mount option "umask=?" or missing value 2018/03/30 19:42:53 executing program 2: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) readv(0xffffffffffffffff, &(0x7f0000001480), 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f00003b9fdc)) readv(r0, &(0x7f0000001980)=[{&(0x7f00000018c0)=""/182, 0xb6}], 0x1) syz_open_pts(r0, 0x2) setsockopt$inet6_mtu(0xffffffffffffffff, 0x29, 0x17, &(0x7f0000000440)=0x5, 0x4) socket$inet_sctp(0x2, 0x5, 0x84) write(r0, &(0x7f0000c34fff), 0xffffff0b) socket$inet(0x2, 0x0, 0x0) setsockopt$bt_l2cap_L2CAP_OPTIONS(0xffffffffffffffff, 0x6, 0x1, &(0x7f0000000380)={0xefa, 0x800, 0x0, 0x0, 0x9}, 0xc) 2018/03/30 19:42:53 executing program 4: symlinkat(&(0x7f0000002f00)='./file0\x00', 0xffffffffffffffff, &(0x7f0000002f80)='./file0\x00') syz_mount_image$msdos(&(0x7f0000002fc0)='msdos\x00', &(0x7f0000003000)='./file0\x00', 0x4, 0x1, &(0x7f0000003180)=[{&(0x7f0000003040)="eaf9610c9f7031a1f58e51e73b3f0bd5af4364c38bbe335dbd3d211ec0338ba4c795c634af757a3c684da6110f67891133a6303441b21d139e3a6582efdaeabd3d68dbcb85cd383733a98084b62807af0b7ea49d68daa4cc9fda43dbeb13c3e67c44c463a2c429ccb66c0e1a9dfd5c911d4d7b578baaad6571d4457b9c6d92122a4bd97f5f174c81081941b007062f2cab2db1466851dde671e025909a633fec433bb2512fc61c436b74df23d280019a403884dc488071", 0xb7, 0xcd7}], 0x8, &(0x7f00000031c0)={[{@errors_continue='errors=continue', 0x2c}, {@time_offset={'time_offset', 0x3d, [0x0]}, 0x2c}]}) pipe(&(0x7f0000002f40)={0xffffffffffffffff}) r1 = open(&(0x7f0000003240)='./file0\x00', 0xa0001, 0x20) linkat(r0, &(0x7f0000003200)='./file0\x00', r1, &(0x7f0000003280)='./file0\x00', 0x400) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x80000, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)}, {&(0x7f0000010d00)="0000000000000000000000000000000000000000000000000000000002ae0000ed41000000040000d15bbe5ad15bbe5ad15bbe5a00000000000005002000000000000800070000000af301000400000000000000000000000100000030000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a1950000", 0xa0, 0x8c60}, {&(0x7f0000011a00)="020000000c0001022e000000020000000c0002022e2e00000b00000014000a026c6f73742b666f756e6400000c0000001000050166696c65300000000d0000001000050266696c65310000000f0000001000050166696c6532000000100000001000050166696c6533000000110000001000050166696c65340000001200000010000802564944454f5f54531400000068031201d181d18ed0b7d0bad0b0d0bbd0bbd0b5d1800000000000000000000000000000000000000000000000000000", 0xc0, 0xc000}, {&(0x7f0000012200)="0000000000000000000000000000000000000000000000000c0000dec910dfd800000000f4030000000000000000000000000000000000000000000000000000", 0x40, 0x117e0}, {&(0x7f0000012a00)="0d0000000c0001022e000000020000000c0002022e2e00000e000000dc03050166696c6530000000000000000000000000000000000000000000000000000000", 0x40, 0x1c000}], 0x0, &(0x7f0000013000)) syz_mount_image$bfs(&(0x7f0000000040)='bfs\x00', &(0x7f00000008c0)='./file0\x00', 0x20, 0x2, &(0x7f0000000180)=[{&(0x7f00000005c0)="f37e57346e86cb5adec662d7bd6f13a3764d2ca7640f9f81ba88d0689d0989735a7bafd5558d9a6e8988f9f6038fa475e49077bc8cfc6e170c4cdbaaa1375895c9a4068559d3cecf2a0423caa696bf77a75b3ae3f32b79da059ca13d055647998987fc2033d008bd55deb08808372b9b4595fb0d79a1358cd5949d859a7d155e86db4b608eb401109f6b792f5ce4a2ead9870dee49347bc08d0d54b0e4fca4fd895947a737f4ee823d997770e5c9df50c0c9fe2c0b945c6ffd13b7151e385b631520ac34a5967c6cd0d12b3746795681600541c17d379daed41ce8e715eba582fb668e160872a2", 0xe7, 0x7}, {&(0x7f0000000780)="6154d093a5a905da96fed5f8dea36bcd9d1d011246f7caf86806bf6ac6301d2d2b448461b867bbbe7d0eebdeafa16d7219af85ff4372670039ce277546def59f1d0eed4be4386a34c7243fe3ec84ad3807136a2c3ec35d6d87a7d7bb9342622cc3a7ff529ef3d76ff57fc7a1856f50b98e518515a9e679067cfc0e8500754fa30a81cf4dc42c5a0d36647280c5b0a8506efaf9ad06594678176efe4bdbcf7ab384b597df4c5ad66b2bd240823abe04cd30785819f1c7fd4d46bb55f8bd09ca4b44618b010e363fa572ca189ec73b36ad46b6f38d65c0acc417", 0xd9, 0x5}], 0x200000, 0x0) syz_mount_image$jfs(&(0x7f0000000080)='jfs\x00', &(0x7f0000000880)='./file0\x00', 0xfffffffffffffffe, 0x3, &(0x7f0000002dc0)=[{&(0x7f0000000900)="efee47debce411554253d03f2175c060de26b9a7a197d9327971105aafdf17a061227fe7dd52d3c1c1f0318992f304f7646c3eb4e32ff0514d34d4605b4e152474aa71ac6c0ba890b1f249f213d5bc162b605fdf3c524d6f84e1a2f8461d26ef5dd50b193ffb710ee69fc431552ae4548f0c1a7e503243bb10c53c566f37e3234d8b3d418992dca946568d275e1f54895a854bab3790963108fe6ce5b1f933e81bd0aa2dfd715aca4bd81b48b28e3ee265", 0xb1, 0x1}, {&(0x7f0000001a80)="b4bc90ad72742e5693f04c7955b05460b33cd0ca9cde365dbe1671162a8c1db744cb8a04d1d747ab4d3234fd615e6ad897396c21b8bf7da2c1d524d04fadade841e5acfac529250a2c75fed4b65a7b6c8735268244189e020c526112728097958fd591d00cd16d1591db9b0414d985d7718794369eb03d89403b7df76f6d745c94d4fa986321a9915fea55a73472bc39620fcf22ec74d02b77fafe6ccf72605eb0ba7ae69fa10a36d281e65a178528bc654ce5b6109d5294e400b18be755a3b899489b27a876ac3ea033ed525b28c7dff537b5210cbff466dc339e1f58db1679816589e886264ef1bcf6d0e1408d93946827711972", 0xf5, 0x7}, {&(0x7f0000002cc0)="c9bc1928c9ffffe99fdae39f5013810a038f1d558affc92341c81ee308195dabd95fcfedcfccd4cf2af62477e5ed935114b73940dba239c47d5824a3332fb48cea682934a6840ea5db2529c3a7c371bbf08f08bb15458de586609be64b699f29b7384dc7b2ba78f0e343fb9851eaf5a7b4106fc5b7a8aaf6e069012286fa7259807928cbee722222f45e6c98cefa00829bcdd92bd03273c7b0f20453c72150adf49c311248d3d3d96ad17187d60add3d1d8fbfbc5e572ceba134e5c533a5f75630a35514ee998b85a755085c04513dcc0047461d78f4aa8fdf0309fc39e3e4a1c24b4538acbf2366fe", 0xe9, 0x4}], 0x10000, &(0x7f0000002ec0)={[{@nodiscard='nodiscard', 0x2c}, {@resize='resize', 0x2c}, {@noquota='noquota', 0x2c}, {@umask={'umask', 0x3d, [0x3f]}, 0x2c}]}) 2018/03/30 19:42:53 executing program 5: unshare(0x40000000) perf_event_open(&(0x7f0000000000)={0x6, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0xa, 0x1, 0x0) ioctl(r0, 0x8982, &(0x7f0000000000)) r1 = socket$packet(0x11, 0x0, 0x300) r2 = openat$cuse(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/cuse\x00', 0x82, 0x0) io_setup(0x43f, &(0x7f00000000c0)=0x0) io_submit(r3, 0x1, &(0x7f0000000000)=[&(0x7f0000000200)={0x0, 0x0, 0x0, 0x1, 0x0, r2, &(0x7f0000000040)="10000000020400000000000000000000", 0x10}]) r4 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000280)='/proc/sys/net/ipv4/vs/secure_tcp\x00', 0x2, 0x0) sendmsg$kcm(r4, &(0x7f0000001f00)={&(0x7f0000001b40)=@pppol2tpin6={0x18, 0x1, {0x0, r1, 0x0, 0x1, 0x0, 0x0, {0xa, 0x4e24, 0xc1, @mcast1={0xff, 0x1, [], 0x1}}}}, 0x80, &(0x7f0000001d80)=[{&(0x7f0000001bc0)="a9db123ebf124fab0f2eec9774559e3b5870fb7c6818fc89c4b8742d057480657265ae2b34fb2d4e585d22ca1bf7b0a22ce38a20a819d919947c78f8d5c9f3291905fd3ed2b8ef8a79d9453396c6b0b7eb0778dbc49b32ae91e443b64edddcf320c1589c7777eadd4e57c01b20a8ca7a831e8e2c104d0194d52fb5c35b550f", 0x7f}], 0x1, &(0x7f0000001dc0)=ANY=[], 0x0, 0x90}, 0x20000000) r5 = syz_open_dev$tun(&(0x7f00000001c0)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r5, 0x400454ca, &(0x7f0000000200)={'bridge0\x00\x00p\x00', 0x4000000000001005}) socketpair(0x1d, 0x3, 0x40, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_inet_SIOCSIFADDR(r6, 0x8916, &(0x7f0000000100)={'bridge8\x00', {0x2, 0x0, @dev={0xac, 0x14, 0x14}}}) ioctl$LOOP_SET_FD(r2, 0x4c00, r1) ioctl$SNDRV_SEQ_IOCTL_RUNNING_MODE(0xffffffffffffffff, 0xc0105303, &(0x7f00000002c0)={0x2, 0x8}) add_key$keyring(&(0x7f00000000c0)='keyring\x00', &(0x7f0000000100)={0x73, 0x79, 0x7a}, 0x0, 0x0, 0x0) clone(0x0, &(0x7f0000000040), &(0x7f0000000080), &(0x7f0000000000), &(0x7f0000000100)) ioctl$int_in(0xffffffffffffffff, 0x800000c004500a, &(0x7f0000006ff8)) wait4(0x0, 0x0, 0x4, &(0x7f0000000380)) ioctl$sock_inet_sctp_SIOCINQ(r7, 0x541b, &(0x7f0000000180)) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_PORT(0xffffffffffffffff, 0xc0a85352, &(0x7f0000001980)={{}, 'port1\x00', 0x0, 0x20010, 0x1f, 0x0, 0x3, 0x40, 0x0, 0x0, 0x4, 0x6d1}) 2018/03/30 19:42:53 executing program 7: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f000099e000)={0x2, 0x4e20, @multicast1=0xe0000001}, 0x10) sendto$inet(r0, &(0x7f0000de1fff), 0xfffffffffffffd43, 0x20008005, &(0x7f0000db4ff0)={0x2, 0x4e20, @loopback=0x7f000001}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000af5000)='illinois\x00', 0x9) recvfrom(r0, &(0x7f0000f9cf9b)=""/101, 0x65, 0x0, 0x0, 0x0) getsockopt$inet_tcp_buf(r0, 0x6, 0x1a, &(0x7f0000000000)=""/177, &(0x7f0000000100)=0xb1) 2018/03/30 19:42:53 executing program 3: syz_open_dev$random(&(0x7f00000003c0)='/dev/random\x00', 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f000060c000)='oom_score_adj\x00') poll(&(0x7f00000014c0)=[{r0, 0x401}, {r0, 0x40}, {0xffffffffffffffff, 0x200}, {r0, 0x220}, {0xffffffffffffffff, 0x2320}], 0x5, 0x232) ioctl$TIOCGPGRP(r0, 0x540f, &(0x7f00000000c0)) getsockopt$netrom_NETROM_T4(r0, 0x103, 0x6, &(0x7f0000000300)=0x8, &(0x7f0000000340)=0x4) r1 = socket$inet6(0xa, 0x2000000802, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r1, 0x29, 0x20, &(0x7f0000f68000)={@loopback={0x0, 0x1}, 0x800, 0x0, 0xff, 0x1}, 0x20) setsockopt$inet6_int(r1, 0x29, 0x21, &(0x7f000089b000)=0x3, 0x4) setsockopt$bt_l2cap_L2CAP_OPTIONS(r0, 0x6, 0x1, &(0x7f0000001500)={0x0, 0x2, 0x9, 0x8, 0x46a7, 0x3, 0x101}, 0xc) getsockopt$sock_timeval(r1, 0x1, 0x15, &(0x7f00000004c0), &(0x7f0000000500)=0x10) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup.net\x00', 0x200002, 0x0) fchdir(r2) r3 = creat(&(0x7f0000000040)='./file1\x00', 0x0) ioctl$fiemap(r2, 0xc020660b, &(0x7f0000000f40)={0x9, 0x0, 0x2, 0x7fff, 0x1, [{0x7, 0x0, 0x0, 0x0, 0x0, 0x8}]}) r4 = dup3(r3, r2, 0x0) pwritev(0xffffffffffffffff, &(0x7f00000012c0), 0x0, 0x0) fcntl$setstatus(r2, 0x4, 0x4000) write$cgroup_subtree(r4, &(0x7f0000000000)=ANY=[], 0x34123610) getsockname$packet(0xffffffffffffffff, &(0x7f0000000fc0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @link_local}, &(0x7f0000001000)=0x14) ioprio_get$pid(0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000001040)={{{@in6=@loopback, @in6=@mcast2}}, {{@in=@local}, 0x0, @in6=@mcast2}}, &(0x7f0000000f00)=0xe8) setsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000001140)={{{@in6=@ipv4={[], [0xff, 0xff]}, @in=@local={0xac, 0x14, 0x14, 0xaa}, 0x4e21, 0x0, 0x4e24, 0x92, 0x2, 0xa0, 0x0, 0x88}, {0xdef, 0x7, 0x9, 0x7, 0x3868, 0x0, 0x3}, {0x0, 0x0, 0xfffffffffffffffa, 0xff5}, 0x80, 0x0, 0x1}, {{@in6=@mcast1={0xff, 0x1, [], 0x1}, 0x0, 0xff}, 0x0, @in=@remote={0xac, 0x14, 0x14, 0xbb}, 0x0, 0x0, 0x3}}, 0xe8) setsockopt$inet6_MCAST_JOIN_GROUP(r1, 0x29, 0x2a, &(0x7f0000000b40)={0x0, {{0xa, 0x4e20, 0x0, @remote={0xfe, 0x80, [], 0xbb}, 0x5}}}, 0x88) connect$inet6(r1, &(0x7f000000cfe4)={0xa}, 0x1c) getsockopt$inet6_IPV6_FLOWLABEL_MGR(r1, 0x29, 0x20, &(0x7f0000000000)={@mcast2={0xff, 0x2, [], 0x1}}, &(0x7f0000000040)=0x20) fcntl$getown(r0, 0x9) syz_open_procfs(0x0, &(0x7f0000000100)="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") setsockopt$inet6_udp_int(0xffffffffffffffff, 0x11, 0x65, &(0x7f0000000000), 0x4) 2018/03/30 19:42:53 executing program 6: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_mreqn(r0, 0x0, 0x27, &(0x7f0000000000)={@multicast2=0xe0000002, @loopback=0x7f000001}, 0xc) getsockopt$inet_sctp6_SCTP_FRAGMENT_INTERLEAVE(0xffffffffffffffff, 0x84, 0x12, &(0x7f0000000080), &(0x7f00000000c0)=0x4) ioctl$sock_inet_SIOCGIFDSTADDR(0xffffffffffffffff, 0x8917, &(0x7f0000000040)={'bcsh0\x00', {0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x1a}}}) setsockopt$inet_sctp6_SCTP_MAX_BURST(0xffffffffffffffff, 0x84, 0x14, &(0x7f0000000380)=@int=0x3, 0x4) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000140)={'bcsh0\x00', 0x0}) ioctl$sock_inet6_SIOCDELRT(0xffffffffffffffff, 0x890c, &(0x7f0000000180)={@dev={0xfe, 0x80, [], 0x13}, @loopback={0x0, 0x1}, @mcast2={0xff, 0x2, [], 0x1}, 0x6, 0x0, 0x42e, 0x100, 0x9, 0x80000000, r1}) r2 = socket$inet(0x2, 0xa, 0x5) setsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX(r2, 0x84, 0x6e, &(0x7f0000000600)=[@in={0x2, 0x4e21, @multicast1=0xe0000001}, @in6={0xa, 0x4e20, 0x0, @remote={0xfe, 0x80, [], 0xbb}}, @in={0x2, 0x4e22, @multicast2=0xe0000002}, @in6={0xa, 0x4e21, 0x1ff, @local={0xfe, 0x80, [], 0xaa}, 0x84}, @in6={0xa, 0x4e20, 0x4, @local={0xfe, 0x80, [], 0xaa}}], 0x74) getsockopt$inet_sctp6_SCTP_PR_SUPPORTED(0xffffffffffffffff, 0x84, 0x71, &(0x7f0000000200)={0x0, 0x8}, &(0x7f0000000240)=0x8) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(0xffffffffffffffff, 0x84, 0x6f, &(0x7f0000000300)={r3, 0x60, &(0x7f0000000280)=[@in={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x12}}, @in={0x2, 0x4e24, @loopback=0x7f000001}, @in={0x2, 0x0, @remote={0xac, 0x14, 0x14, 0xbb}}, @in={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x1a}}, @in={0x2, 0x4e24, @remote={0xac, 0x14, 0x14, 0xbb}}, @in={0x2, 0x4e24, @multicast2=0xe0000002}]}, &(0x7f0000000340)=0x10) setsockopt$inet_sctp6_SCTP_SET_PEER_PRIMARY_ADDR(0xffffffffffffffff, 0x84, 0x5, &(0x7f00000004c0)={r4, @in={{0x2, 0x4e20, @rand_addr=0x8}}}, 0x84) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, &(0x7f00000003c0)={'lo\x00', 0x4100}) ioctl$sock_inet_SIOCGIFNETMASK(0xffffffffffffffff, 0x891b, &(0x7f0000000100)={'nr0\x00', {0x2, 0x4e24, @loopback=0x7f000001}}) setsockopt$inet_msfilter(r0, 0x0, 0x29, &(0x7f0000000680)=ANY=[@ANYBLOB="cf0000000276d172390cc8c4ff4f3b746e5947c2ddb66a93ebb6d0f75b5f453435c311b94e126c49d47c10682b6e523d09fae1d416ebface98e08aa083e9f1f1afa118eb05655fec48d75d7a37edd032552c60ffeb53a2c8eecbe601a4ac5dceeecf1a943c2d9e2eaf4ad0a93e82a1a37a0cf2adbc4b512680428fee922ad18ff90ec6f87a75b299a953167bf4f9ae31cffd2c31dd47ba7d69151424dc1b2835f7624a302f270eb89118043dc1e1faa46e667be9cbf4456ad0c580ed032e4e49459f68f8a70f2dfe40f51362ffae"], 0x1) pread64(r0, &(0x7f0000000340)=""/181, 0xb5, 0x62) setsockopt$inet_msfilter(r0, 0x0, 0x29, &(0x7f0000000580)=ANY=[@ANYBLOB="e00000027f0000010000000001000000000000006b59aa51deb20d6efc9c04b7c9420f6434d31cbbe99b52873a8c21"], 0x1) socket$inet_udp(0x2, 0x2, 0x0) bpf$BPF_PROG_GET_NEXT_ID(0xb, &(0x7f0000000400)=0x7, 0x4) r5 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000ba4000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x2, 0x78, 0xe2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, r5, 0x0) r6 = perf_event_open(&(0x7f0000014f88)={0x1, 0x78, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00002e8000)}}, 0x0, 0x0, r5, 0x0) readv(r6, &(0x7f0000734000)=[{&(0x7f0000d42000)=""/146, 0x92}], 0x1) getsockopt$inet_sctp_SCTP_PEER_ADDR_THLDS(0xffffffffffffffff, 0x84, 0x1f, &(0x7f0000000480)={0x0, @in={{0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0xd}}}, 0xf80866d, 0x5}, &(0x7f0000000540)=0x90) getsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(0xffffffffffffff9c, 0x84, 0x18, &(0x7f0000000440)={r7, 0x400000000004}, &(0x7f00000005c0)=0xffffffffffffffc3) getsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER_VALUE(r0, 0x84, 0x7c, &(0x7f00000002c0)={r8, 0x10001, 0xc9e9}, &(0x7f0000000300)=0x8) 2018/03/30 19:42:53 executing program 1: r0 = syz_open_dev$amidi(&(0x7f0000000040)='/dev/amidi#\x00', 0x3, 0x28000) ioctl$DRM_IOCTL_RES_CTX(r0, 0xc0086426, &(0x7f0000000100)={0x2c, &(0x7f00000000c0)=[{}, {}, {}, {}, {}, {}, {}, {}]}) socket$netlink(0x10, 0x3, 0xc) writev(0xffffffffffffffff, &(0x7f00000021c0), 0x0) bind$bt_l2cap(r0, &(0x7f0000000340)={0x1f, 0x800000000000002, {0x401, 0x3, 0xb, 0x3f8}}, 0x9) socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f0000a8d000)={&(0x7f0000c78ff4)={0x10}, 0xc, &(0x7f0000df6000)={&(0x7f0000000200)=ANY=[@ANYBLOB="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"], 0x10f}, 0x1}, 0x0) r1 = socket$inet_sctp(0x2, 0x0, 0x84) sendmsg$inet_sctp(r1, &(0x7f0000001f00)={&(0x7f0000001840)=@in={0x2, 0x0, @dev={0xac, 0x14, 0x14}}, 0x10, &(0x7f0000001c40)=[{&(0x7f0000001880)='[', 0x1}], 0x1, &(0x7f0000001e40)}, 0x40) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000540)=@nat={'nat\x00', 0x19, 0x3, 0x376, [0x20000140, 0x0, 0x0, 0x20000170, 0x200002d0], 0x0, &(0x7f0000000100), &(0x7f00000006c0)=ANY=[@ANYBLOB="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"]}, 0x3ee) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000002980)) getsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(0xffffffffffffffff, 0x84, 0x1f, &(0x7f0000000440)={0x0, @in={{0x2, 0x4e22, @multicast2=0xe0000002}}, 0x7bb7, 0x4}, &(0x7f0000000500)=0x90) getsockopt$inet_sctp_SCTP_RTOINFO(0xffffffffffffffff, 0x84, 0x0, &(0x7f0000002240)={0x0, 0x9, 0x417}, &(0x7f00000001c0)=0x10) r2 = socket(0x22, 0x4, 0x3) r3 = socket(0x20000001e, 0x5, 0x0) r4 = perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$packet_tx_ring(r3, 0x10f, 0x87, &(0x7f0000265000)=@req={0x3fc, 0x0, 0x1}, 0x10) getegid() setsockopt$packet_tx_ring(r2, 0x10f, 0x87, &(0x7f0000265000)=@req={0x3fc, 0x0, 0x1}, 0x10) writev(r2, &(0x7f00000000c0)=[{&(0x7f0000000000)="8a", 0x1}], 0x1) close(r2) close(r3) perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r5 = syz_open_dev$evdev(&(0x7f0000dfdfee)='/dev/input/event#\x00', 0x0, 0x2) readv(r5, &(0x7f0000019fe0)=[{&(0x7f00008ec000)=""/219, 0xdb}], 0x1) write$evdev(r5, &(0x7f000004d000)=[{{}, 0x0, 0x1}, {{0x2}}], 0x30) r6 = getpgrp(0x0) setsockopt$ax25_int(r3, 0x101, 0xd, &(0x7f0000000080)=0x7, 0x4) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x8, 0xfffffffffffffffd, 0x9, 0x7, 0x0, 0x8001, 0x0, 0x6, 0x3ff, 0x4, 0x5, 0x4, 0xbd9, 0x56, 0x8000, 0x7f, 0xff, 0xeba, 0x1f, 0x0, 0xfd, 0x3, 0x1, 0x50, 0x7, 0x9, 0x641800, 0x3ff8000000000000, 0x4, 0x0, 0x10000, 0x5, 0x7, 0x6, 0x1, 0xffffffffffffffe0, 0x0, 0x20, 0x0, @perf_bp={&(0x7f0000000040), 0x8}, 0x20, 0x401, 0x8, 0x3, 0x8, 0x7, 0x7}, r6, 0xc, r4, 0x0) syz_genetlink_get_family_id$ipvs(&(0x7f0000000040)='IPVS\x00') 2018/03/30 19:42:53 executing program 0: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000080)={'bond0\x00', 0x0}) r2 = socket(0xa, 0x2, 0x0) flock(r2, 0x6) syz_genetlink_get_family_id$ipvs(&(0x7f0000000800)='IPVS\x00') sendmsg$IPVS_CMD_GET_INFO(0xffffffffffffffff, &(0x7f00000009c0)={&(0x7f0000000500)={0x10, 0x0, 0x0, 0x21100000}, 0xc, &(0x7f0000000980)={&(0x7f0000000cc0)=ANY=[]}, 0x1}, 0x20000884) ioctl$sock_FIOGETOWN(r2, 0x8903, &(0x7f0000000200)) connect$inet6(r2, &(0x7f0000000100)={0xa, 0x0, 0x0, @mcast1={0xff, 0x1, [], 0x1}, 0x100000002}, 0x1c) setsockopt$inet_sctp_SCTP_STREAM_SCHEDULER(0xffffffffffffffff, 0x84, 0x7b, &(0x7f0000000400), 0x3ba) getsockopt$inet_opts(r2, 0x0, 0x0, &(0x7f0000000540)=""/99, &(0x7f0000000780)=0x28c77c4c79f525cf) sendto$inet(r2, &(0x7f0000509f92), 0xff77, 0x0, &(0x7f000055fff0)={0x2, 0x4e23, @loopback=0x7f000001}, 0x10) r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000b00)='./cgroup.cpu\x00', 0x200002, 0x0) fchdir(r3) fstat(0xffffffffffffffff, &(0x7f0000000180)) bind$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @multicast1=0xe0000001}, 0x10) sendto$inet(0xffffffffffffffff, &(0x7f0000000a40)="45431bc153e49dc3c341afeff8a6a3782b30655dea8638a45a7a369ca5aebbc34e2d0227a019364ef806e574edc574801179b3c34145612db79a5340231421095dba2effc99687206c3416a0afabbea4ab2d17074a574429500a92adb41dfbc9e160349e8bb48b1d26e10c3e2571a99e857d", 0x72, 0x3ffffff, &(0x7f0000000c00)={0x2, 0x4e23, @loopback=0x7f000001}, 0x10) r4 = creat(&(0x7f0000000100)='./file1\x00', 0x0) fallocate(r4, 0x1, 0x0, 0x20004d2d) ioctl$DRM_IOCTL_SET_VERSION(r4, 0xc0106407, &(0x7f00000000c0)={0x0, 0x2, 0xffffffffffff5165, 0x4c}) sendto$inet(0xffffffffffffffff, &(0x7f0000000000)="1356c1f7a6f170d95ec6cfc03678287eebc2e19824311a77", 0x18, 0x0, &(0x7f0000000080)={0x2}, 0x10) socket$inet6_icmp(0xa, 0x2, 0x3a) sendmsg$inet_sctp(r2, &(0x7f000050dfc8)={&(0x7f0000000840)=@in6={0xa, 0x4e24, 0x80000001, @mcast1={0xff, 0x1, [], 0x1}}, 0x1c, &(0x7f00000005c0), 0x0, &(0x7f0000576000)}, 0x0) ioctl$EVIOCGPROP(0xffffffffffffffff, 0x80404509, &(0x7f00000003c0)=""/25) sendto$inet6(r2, &(0x7f0000000240)="6a14ad6a11c00f9a3e52ea90", 0xc, 0x0, &(0x7f0000000280)={0xa, 0x4e23, 0x3, @local={0xfe, 0x80, [], 0xaa}, 0x9}, 0x1c) getpeername$packet(0xffffffffffffffff, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @broadcast}, &(0x7f0000000a00)=0x14) getsockopt$inet6_IPV6_IPSEC_POLICY(r2, 0x29, 0x22, &(0x7f0000000000)={{{@in=@multicast2, @in6=@dev}}, {{@in=@multicast1}, 0x0, @in6=@ipv4={[], [], @remote}}}, &(0x7f0000000140)=0xe8) getsockopt$inet_sctp6_SCTP_NODELAY(0xffffffffffffffff, 0x84, 0x3, &(0x7f0000000440), &(0x7f0000000480)=0x4) recvfrom(r0, &(0x7f0000000040)=""/3, 0x3, 0x2, &(0x7f00000000c0)=@hci={0x1f, r1}, 0x80) [ 492.471369] FAT-fs (loop4): Unrecognized mount option "time_offset=" or missing value 2018/03/30 19:42:53 executing program 3: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000fdaff6)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000fd9ffc)=0x3) ioctl$TCFLSH(r0, 0x540b, 0x0) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x4000, 0x0) ioctl$TCFLSH(r0, 0x540b, 0x0) memfd_create(&(0x7f0000000100)=']\x00', 0x0) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup.net\x00', 0x200002, 0x0) fchdir(r1) r2 = creat(&(0x7f0000000080)='./file0\x00', 0x0) write$cgroup_pid(r2, &(0x7f0000000100)=ANY=[], 0x1023c) ioctl$DRM_IOCTL_GEM_FLINK(0xffffffffffffffff, 0xc008640a, &(0x7f0000000000)) fallocate(r2, 0x0, 0x0, 0xffff) pipe(&(0x7f0000000040)) r3 = inotify_init1(0x0) r4 = open(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) dup2(r3, r4) getsockopt$inet_sctp_SCTP_DELAYED_SACK(0xffffffffffffffff, 0x84, 0x10, &(0x7f0000000240)=@sack_info={0x0, 0x9, 0x1}, &(0x7f0000000280)=0xc) add_key$keyring(&(0x7f00000004c0)='keyring\x00', &(0x7f0000000500)={0x73, 0x79, 0x7a}, 0x0, 0x0, 0x0) clone(0x0, &(0x7f0000b53000), &(0x7f000084effc), &(0x7f0000c35ffc), &(0x7f0000b3bfff)) pipe(&(0x7f0000000480)) setsockopt$inet_sctp6_SCTP_MAX_BURST(0xffffffffffffffff, 0x84, 0x14, &(0x7f0000000180)=@assoc_value, 0x8) exit_group(0x7) 2018/03/30 19:42:53 executing program 6: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_mreqn(r0, 0x0, 0x27, &(0x7f0000000000)={@multicast2=0xe0000002, @loopback=0x7f000001}, 0xc) getsockopt$inet_sctp6_SCTP_FRAGMENT_INTERLEAVE(0xffffffffffffffff, 0x84, 0x12, &(0x7f0000000080), &(0x7f00000000c0)=0x4) ioctl$sock_inet_SIOCGIFDSTADDR(0xffffffffffffffff, 0x8917, &(0x7f0000000040)={'bcsh0\x00', {0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x1a}}}) setsockopt$inet_sctp6_SCTP_MAX_BURST(0xffffffffffffffff, 0x84, 0x14, &(0x7f0000000380)=@int=0x3, 0x4) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000140)={'bcsh0\x00', 0x0}) ioctl$sock_inet6_SIOCDELRT(0xffffffffffffffff, 0x890c, &(0x7f0000000180)={@dev={0xfe, 0x80, [], 0x13}, @loopback={0x0, 0x1}, @mcast2={0xff, 0x2, [], 0x1}, 0x6, 0x0, 0x42e, 0x100, 0x9, 0x80000000, r1}) r2 = socket$inet(0x2, 0xa, 0x5) setsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX(r2, 0x84, 0x6e, &(0x7f0000000600)=[@in={0x2, 0x4e21, @multicast1=0xe0000001}, @in6={0xa, 0x4e20, 0x0, @remote={0xfe, 0x80, [], 0xbb}}, @in={0x2, 0x4e22, @multicast2=0xe0000002}, @in6={0xa, 0x4e21, 0x1ff, @local={0xfe, 0x80, [], 0xaa}, 0x84}, @in6={0xa, 0x4e20, 0x4, @local={0xfe, 0x80, [], 0xaa}}], 0x74) getsockopt$inet_sctp6_SCTP_PR_SUPPORTED(0xffffffffffffffff, 0x84, 0x71, &(0x7f0000000200)={0x0, 0x8}, &(0x7f0000000240)=0x8) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(0xffffffffffffffff, 0x84, 0x6f, &(0x7f0000000300)={r3, 0x60, &(0x7f0000000280)=[@in={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x12}}, @in={0x2, 0x4e24, @loopback=0x7f000001}, @in={0x2, 0x0, @remote={0xac, 0x14, 0x14, 0xbb}}, @in={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x1a}}, @in={0x2, 0x4e24, @remote={0xac, 0x14, 0x14, 0xbb}}, @in={0x2, 0x4e24, @multicast2=0xe0000002}]}, &(0x7f0000000340)=0x10) setsockopt$inet_sctp6_SCTP_SET_PEER_PRIMARY_ADDR(0xffffffffffffffff, 0x84, 0x5, &(0x7f00000004c0)={r4, @in={{0x2, 0x4e20, @rand_addr=0x8}}}, 0x84) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, &(0x7f00000003c0)={'lo\x00', 0x4100}) ioctl$sock_inet_SIOCGIFNETMASK(0xffffffffffffffff, 0x891b, &(0x7f0000000100)={'nr0\x00', {0x2, 0x4e24, @loopback=0x7f000001}}) setsockopt$inet_msfilter(r0, 0x0, 0x29, &(0x7f0000000680)=ANY=[@ANYBLOB="cf0000000276d172390cc8c4ff4f3b746e5947c2ddb66a93ebb6d0f75b5f453435c311b94e126c49d47c10682b6e523d09fae1d416ebface98e08aa083e9f1f1afa118eb05655fec48d75d7a37edd032552c60ffeb53a2c8eecbe601a4ac5dceeecf1a943c2d9e2eaf4ad0a93e82a1a37a0cf2adbc4b512680428fee922ad18ff90ec6f87a75b299a953167bf4f9ae31cffd2c31dd47ba7d69151424dc1b2835f7624a302f270eb89118043dc1e1faa46e667be9cbf4456ad0c580ed032e4e49459f68f8a70f2dfe40f51362ffae"], 0x1) pread64(r0, &(0x7f0000000340)=""/181, 0xb5, 0x62) setsockopt$inet_msfilter(r0, 0x0, 0x29, &(0x7f0000000580)=ANY=[@ANYBLOB="e00000027f0000010000000001000000000000006b59aa51deb20d6efc9c04b7c9420f6434d31cbbe99b52873a8c21"], 0x1) socket$inet_udp(0x2, 0x2, 0x0) bpf$BPF_PROG_GET_NEXT_ID(0xb, &(0x7f0000000400)=0x7, 0x4) r5 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000ba4000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x2, 0x78, 0xe2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, r5, 0x0) r6 = perf_event_open(&(0x7f0000014f88)={0x1, 0x78, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00002e8000)}}, 0x0, 0x0, r5, 0x0) readv(r6, &(0x7f0000734000)=[{&(0x7f0000d42000)=""/146, 0x92}], 0x1) getsockopt$inet_sctp_SCTP_PEER_ADDR_THLDS(0xffffffffffffffff, 0x84, 0x1f, &(0x7f0000000480)={0x0, @in={{0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0xd}}}, 0xf80866d, 0x5}, &(0x7f0000000540)=0x90) getsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(0xffffffffffffff9c, 0x84, 0x18, &(0x7f0000000440)={r7, 0x400000000004}, &(0x7f00000005c0)=0xffffffffffffffc3) getsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER_VALUE(r0, 0x84, 0x7c, &(0x7f00000002c0)={r8, 0x10001, 0xc9e9}, &(0x7f0000000300)=0x8) 2018/03/30 19:42:53 executing program 7: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f000099e000)={0x2, 0x4e20, @multicast1=0xe0000001}, 0x10) sendto$inet(r0, &(0x7f0000de1fff), 0xfffffffffffffd43, 0x20008005, &(0x7f0000db4ff0)={0x2, 0x4e20, @loopback=0x7f000001}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000af5000)='illinois\x00', 0x9) recvfrom(r0, &(0x7f0000f9cf9b)=""/101, 0x65, 0x0, 0x0, 0x0) getsockopt$inet_tcp_buf(r0, 0x6, 0x1a, &(0x7f0000000000)=""/177, &(0x7f0000000100)=0xb1) [ 492.545754] EXT4-fs (loop4): VFS: Can't find ext4 filesystem 2018/03/30 19:42:53 executing program 4: symlinkat(&(0x7f0000002f00)='./file0\x00', 0xffffffffffffffff, &(0x7f0000002f80)='./file0\x00') syz_mount_image$msdos(&(0x7f0000002fc0)='msdos\x00', &(0x7f0000003000)='./file0\x00', 0x4, 0x1, &(0x7f0000003180)=[{&(0x7f0000003040)="eaf9610c9f7031a1f58e51e73b3f0bd5af4364c38bbe335dbd3d211ec0338ba4c795c634af757a3c684da6110f67891133a6303441b21d139e3a6582efdaeabd3d68dbcb85cd383733a98084b62807af0b7ea49d68daa4cc9fda43dbeb13c3e67c44c463a2c429ccb66c0e1a9dfd5c911d4d7b578baaad6571d4457b9c6d92122a4bd97f5f174c81081941b007062f2cab2db1466851dde671e025909a633fec433bb2512fc61c436b74df23d280019a403884dc488071", 0xb7, 0xcd7}], 0x8, &(0x7f00000031c0)={[{@errors_continue='errors=continue', 0x2c}, {@time_offset={'time_offset', 0x3d, [0x0]}, 0x2c}]}) pipe(&(0x7f0000002f40)={0xffffffffffffffff}) r1 = open(&(0x7f0000003240)='./file0\x00', 0xa0001, 0x20) linkat(r0, &(0x7f0000003200)='./file0\x00', r1, &(0x7f0000003280)='./file0\x00', 0x400) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x80000, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)}, {&(0x7f0000010d00)="0000000000000000000000000000000000000000000000000000000002ae0000ed41000000040000d15bbe5ad15bbe5ad15bbe5a00000000000005002000000000000800070000000af301000400000000000000000000000100000030000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a1950000", 0xa0, 0x8c60}, {&(0x7f0000011a00)="020000000c0001022e000000020000000c0002022e2e00000b00000014000a026c6f73742b666f756e6400000c0000001000050166696c65300000000d0000001000050266696c65310000000f0000001000050166696c6532000000100000001000050166696c6533000000110000001000050166696c65340000001200000010000802564944454f5f54531400000068031201d181d18ed0b7d0bad0b0d0bbd0bbd0b5d1800000000000000000000000000000000000000000000000000000", 0xc0, 0xc000}, {&(0x7f0000012200)="0000000000000000000000000000000000000000000000000c0000dec910dfd800000000f4030000000000000000000000000000000000000000000000000000", 0x40, 0x117e0}, {&(0x7f0000012a00)="0d0000000c0001022e000000020000000c0002022e2e00000e000000dc03050166696c6530000000000000000000000000000000000000000000000000000000", 0x40, 0x1c000}], 0x0, &(0x7f0000013000)) syz_mount_image$bfs(&(0x7f0000000040)='bfs\x00', &(0x7f00000008c0)='./file0\x00', 0x20, 0x2, &(0x7f0000000180)=[{&(0x7f00000005c0)="f37e57346e86cb5adec662d7bd6f13a3764d2ca7640f9f81ba88d0689d0989735a7bafd5558d9a6e8988f9f6038fa475e49077bc8cfc6e170c4cdbaaa1375895c9a4068559d3cecf2a0423caa696bf77a75b3ae3f32b79da059ca13d055647998987fc2033d008bd55deb08808372b9b4595fb0d79a1358cd5949d859a7d155e86db4b608eb401109f6b792f5ce4a2ead9870dee49347bc08d0d54b0e4fca4fd895947a737f4ee823d997770e5c9df50c0c9fe2c0b945c6ffd13b7151e385b631520ac34a5967c6cd0d12b3746795681600541c17d379daed41ce8e715eba582fb668e160872a2", 0xe7, 0x7}, {&(0x7f0000000780)="6154d093a5a905da96fed5f8dea36bcd9d1d011246f7caf86806bf6ac6301d2d2b448461b867bbbe7d0eebdeafa16d7219af85ff4372670039ce277546def59f1d0eed4be4386a34c7243fe3ec84ad3807136a2c3ec35d6d87a7d7bb9342622cc3a7ff529ef3d76ff57fc7a1856f50b98e518515a9e679067cfc0e8500754fa30a81cf4dc42c5a0d36647280c5b0a8506efaf9ad06594678176efe4bdbcf7ab384b597df4c5ad66b2bd240823abe04cd30785819f1c7fd4d46bb55f8bd09ca4b44618b010e363fa572ca189ec73b36ad46b6f38d65c0acc417", 0xd9, 0x5}], 0x200000, 0x0) syz_mount_image$jfs(&(0x7f0000000080)='jfs\x00', &(0x7f0000000880)='./file0\x00', 0xfffffffffffffffe, 0x3, &(0x7f0000002dc0)=[{&(0x7f0000000900)="efee47debce411554253d03f2175c060de26b9a7a197d9327971105aafdf17a061227fe7dd52d3c1c1f0318992f304f7646c3eb4e32ff0514d34d4605b4e152474aa71ac6c0ba890b1f249f213d5bc162b605fdf3c524d6f84e1a2f8461d26ef5dd50b193ffb710ee69fc431552ae4548f0c1a7e503243bb10c53c566f37e3234d8b3d418992dca946568d275e1f54895a854bab3790963108fe6ce5b1f933e81bd0aa2dfd715aca4bd81b48b28e3ee265", 0xb1, 0x1}, {&(0x7f0000001a80)="b4bc90ad72742e5693f04c7955b05460b33cd0ca9cde365dbe1671162a8c1db744cb8a04d1d747ab4d3234fd615e6ad897396c21b8bf7da2c1d524d04fadade841e5acfac529250a2c75fed4b65a7b6c8735268244189e020c526112728097958fd591d00cd16d1591db9b0414d985d7718794369eb03d89403b7df76f6d745c94d4fa986321a9915fea55a73472bc39620fcf22ec74d02b77fafe6ccf72605eb0ba7ae69fa10a36d281e65a178528bc654ce5b6109d5294e400b18be755a3b899489b27a876ac3ea033ed525b28c7dff537b5210cbff466dc339e1f58db1679816589e886264ef1bcf6d0e1408d93946827711972", 0xf5, 0x7}, {&(0x7f0000002cc0)="c9bc1928c9ffffe99fdae39f5013810a038f1d558affc92341c81ee308195dabd95fcfedcfccd4cf2af62477e5ed935114b73940dba239c47d5824a3332fb48cea682934a6840ea5db2529c3a7c371bbf08f08bb15458de586609be64b699f29b7384dc7b2ba78f0e343fb9851eaf5a7b4106fc5b7a8aaf6e069012286fa7259807928cbee722222f45e6c98cefa00829bcdd92bd03273c7b0f20453c72150adf49c311248d3d3d96ad17187d60add3d1d8fbfbc5e572ceba134e5c533a5f75630a35514ee998b85a755085c04513dcc0047461d78f4aa8fdf0309fc39e3e4a1c24b4538acbf2366fe", 0xe9, 0x4}], 0x10000, &(0x7f0000002ec0)={[{@nodiscard='nodiscard', 0x2c}, {@resize='resize', 0x2c}, {@noquota='noquota', 0x2c}, {@umask={'umask', 0x3d, [0x3f]}, 0x2c}]}) 2018/03/30 19:42:53 executing program 6: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_mreqn(r0, 0x0, 0x27, &(0x7f0000000000)={@multicast2=0xe0000002, @loopback=0x7f000001}, 0xc) getsockopt$inet_sctp6_SCTP_FRAGMENT_INTERLEAVE(0xffffffffffffffff, 0x84, 0x12, &(0x7f0000000080), &(0x7f00000000c0)=0x4) ioctl$sock_inet_SIOCGIFDSTADDR(0xffffffffffffffff, 0x8917, &(0x7f0000000040)={'bcsh0\x00', {0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x1a}}}) setsockopt$inet_sctp6_SCTP_MAX_BURST(0xffffffffffffffff, 0x84, 0x14, &(0x7f0000000380)=@int=0x3, 0x4) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000140)={'bcsh0\x00', 0x0}) ioctl$sock_inet6_SIOCDELRT(0xffffffffffffffff, 0x890c, &(0x7f0000000180)={@dev={0xfe, 0x80, [], 0x13}, @loopback={0x0, 0x1}, @mcast2={0xff, 0x2, [], 0x1}, 0x6, 0x0, 0x42e, 0x100, 0x9, 0x80000000, r1}) r2 = socket$inet(0x2, 0xa, 0x5) setsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX(r2, 0x84, 0x6e, &(0x7f0000000600)=[@in={0x2, 0x4e21, @multicast1=0xe0000001}, @in6={0xa, 0x4e20, 0x0, @remote={0xfe, 0x80, [], 0xbb}}, @in={0x2, 0x4e22, @multicast2=0xe0000002}, @in6={0xa, 0x4e21, 0x1ff, @local={0xfe, 0x80, [], 0xaa}, 0x84}, @in6={0xa, 0x4e20, 0x4, @local={0xfe, 0x80, [], 0xaa}}], 0x74) getsockopt$inet_sctp6_SCTP_PR_SUPPORTED(0xffffffffffffffff, 0x84, 0x71, &(0x7f0000000200)={0x0, 0x8}, &(0x7f0000000240)=0x8) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(0xffffffffffffffff, 0x84, 0x6f, &(0x7f0000000300)={r3, 0x60, &(0x7f0000000280)=[@in={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x12}}, @in={0x2, 0x4e24, @loopback=0x7f000001}, @in={0x2, 0x0, @remote={0xac, 0x14, 0x14, 0xbb}}, @in={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x1a}}, @in={0x2, 0x4e24, @remote={0xac, 0x14, 0x14, 0xbb}}, @in={0x2, 0x4e24, @multicast2=0xe0000002}]}, &(0x7f0000000340)=0x10) setsockopt$inet_sctp6_SCTP_SET_PEER_PRIMARY_ADDR(0xffffffffffffffff, 0x84, 0x5, &(0x7f00000004c0)={r4, @in={{0x2, 0x4e20, @rand_addr=0x8}}}, 0x84) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, &(0x7f00000003c0)={'lo\x00', 0x4100}) ioctl$sock_inet_SIOCGIFNETMASK(0xffffffffffffffff, 0x891b, &(0x7f0000000100)={'nr0\x00', {0x2, 0x4e24, @loopback=0x7f000001}}) setsockopt$inet_msfilter(r0, 0x0, 0x29, &(0x7f0000000680)=ANY=[@ANYBLOB="cf0000000276d172390cc8c4ff4f3b746e5947c2ddb66a93ebb6d0f75b5f453435c311b94e126c49d47c10682b6e523d09fae1d416ebface98e08aa083e9f1f1afa118eb05655fec48d75d7a37edd032552c60ffeb53a2c8eecbe601a4ac5dceeecf1a943c2d9e2eaf4ad0a93e82a1a37a0cf2adbc4b512680428fee922ad18ff90ec6f87a75b299a953167bf4f9ae31cffd2c31dd47ba7d69151424dc1b2835f7624a302f270eb89118043dc1e1faa46e667be9cbf4456ad0c580ed032e4e49459f68f8a70f2dfe40f51362ffae"], 0x1) pread64(r0, &(0x7f0000000340)=""/181, 0xb5, 0x62) setsockopt$inet_msfilter(r0, 0x0, 0x29, &(0x7f0000000580)=ANY=[@ANYBLOB="e00000027f0000010000000001000000000000006b59aa51deb20d6efc9c04b7c9420f6434d31cbbe99b52873a8c21"], 0x1) socket$inet_udp(0x2, 0x2, 0x0) bpf$BPF_PROG_GET_NEXT_ID(0xb, &(0x7f0000000400)=0x7, 0x4) r5 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000ba4000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x2, 0x78, 0xe2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, r5, 0x0) r6 = perf_event_open(&(0x7f0000014f88)={0x1, 0x78, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00002e8000)}}, 0x0, 0x0, r5, 0x0) readv(r6, &(0x7f0000734000)=[{&(0x7f0000d42000)=""/146, 0x92}], 0x1) getsockopt$inet_sctp_SCTP_PEER_ADDR_THLDS(0xffffffffffffffff, 0x84, 0x1f, &(0x7f0000000480)={0x0, @in={{0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0xd}}}, 0xf80866d, 0x5}, &(0x7f0000000540)=0x90) getsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(0xffffffffffffff9c, 0x84, 0x18, &(0x7f0000000440)={r7, 0x400000000004}, &(0x7f00000005c0)=0xffffffffffffffc3) getsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER_VALUE(r0, 0x84, 0x7c, &(0x7f00000002c0)={r8, 0x10001, 0xc9e9}, &(0x7f0000000300)=0x8) 2018/03/30 19:42:53 executing program 3: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000fdaff6)='/dev/ptmx\x00', 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x4000, 0x0) ioctl$TCFLSH(0xffffffffffffffff, 0x540b, 0x1) ioctl$TIOCNXCL(r0, 0x540d) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup.net\x00', 0x200002, 0x0) fchdir(r1) r2 = creat(&(0x7f0000000080)='./file0\x00', 0x0) write$cgroup_pid(r2, &(0x7f0000000100)=ANY=[], 0x1023c) ioctl$DRM_IOCTL_GEM_FLINK(0xffffffffffffffff, 0xc008640a, &(0x7f0000000000)) fallocate(r2, 0x0, 0x0, 0xffff) pipe(&(0x7f0000000040)) r3 = inotify_init1(0x0) r4 = open(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) dup2(r3, r4) add_key$keyring(&(0x7f00000004c0)='keyring\x00', &(0x7f0000000500)={0x73, 0x79, 0x7a, 0x0}, 0x0, 0x0, 0x0) unshare(0x0) clone(0x0, &(0x7f0000b53000), &(0x7f000084effc), &(0x7f0000c35ffc), &(0x7f0000b3bfff)) ioprio_set$pid(0x2, 0x0, 0x0) socketpair$inet_sctp(0x2, 0x5, 0x84, &(0x7f0000000200)) [ 492.673711] FAT-fs (loop4): Unrecognized mount option "time_offset=" or missing value 2018/03/30 19:42:53 executing program 6: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_mreqn(r0, 0x0, 0x27, &(0x7f0000000000)={@multicast2=0xe0000002, @loopback=0x7f000001}, 0xc) getsockopt$inet_sctp6_SCTP_FRAGMENT_INTERLEAVE(0xffffffffffffffff, 0x84, 0x12, &(0x7f0000000080), &(0x7f00000000c0)=0x4) ioctl$sock_inet_SIOCGIFDSTADDR(0xffffffffffffffff, 0x8917, &(0x7f0000000040)={'bcsh0\x00', {0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x1a}}}) setsockopt$inet_sctp6_SCTP_MAX_BURST(0xffffffffffffffff, 0x84, 0x14, &(0x7f0000000380)=@int=0x3, 0x4) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000140)={'bcsh0\x00', 0x0}) ioctl$sock_inet6_SIOCDELRT(0xffffffffffffffff, 0x890c, &(0x7f0000000180)={@dev={0xfe, 0x80, [], 0x13}, @loopback={0x0, 0x1}, @mcast2={0xff, 0x2, [], 0x1}, 0x6, 0x0, 0x42e, 0x100, 0x9, 0x80000000, r1}) r2 = socket$inet(0x2, 0xa, 0x5) setsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX(r2, 0x84, 0x6e, &(0x7f0000000600)=[@in={0x2, 0x4e21, @multicast1=0xe0000001}, @in6={0xa, 0x4e20, 0x0, @remote={0xfe, 0x80, [], 0xbb}}, @in={0x2, 0x4e22, @multicast2=0xe0000002}, @in6={0xa, 0x4e21, 0x1ff, @local={0xfe, 0x80, [], 0xaa}, 0x84}, @in6={0xa, 0x4e20, 0x4, @local={0xfe, 0x80, [], 0xaa}}], 0x74) getsockopt$inet_sctp6_SCTP_PR_SUPPORTED(0xffffffffffffffff, 0x84, 0x71, &(0x7f0000000200)={0x0, 0x8}, &(0x7f0000000240)=0x8) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(0xffffffffffffffff, 0x84, 0x6f, &(0x7f0000000300)={r3, 0x70, &(0x7f0000000280)=[@in={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x12}}, @in={0x2, 0x4e24, @loopback=0x7f000001}, @in={0x2, 0x0, @remote={0xac, 0x14, 0x14, 0xbb}}, @in={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x1a}}, @in={0x2, 0x4e24, @remote={0xac, 0x14, 0x14, 0xbb}}, @in={0x2, 0x0, @rand_addr=0x3ff}, @in={0x2, 0x4e24, @multicast2=0xe0000002}]}, &(0x7f0000000340)=0x10) setsockopt$inet_sctp6_SCTP_SET_PEER_PRIMARY_ADDR(0xffffffffffffffff, 0x84, 0x5, &(0x7f00000004c0)={r4, @in={{0x2, 0x4e20, @rand_addr=0x8}}}, 0x84) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, &(0x7f00000003c0)={'lo\x00', 0x4100}) ioctl$sock_inet_SIOCGIFNETMASK(0xffffffffffffffff, 0x891b, &(0x7f0000000100)={'nr0\x00', {0x2, 0x4e24, @loopback=0x7f000001}}) setsockopt$inet_msfilter(r0, 0x0, 0x29, &(0x7f0000000680)=ANY=[@ANYBLOB="cf0000000276d172390cc8c4ff4f3b746e5947c2ddb66a93ebb6d0f75b5f453435c311b94e126c49d47c10682b6e523d09fae1d416ebface98e08aa083e9f1f1afa118eb05655fec48d75d7a37edd032552c60ffeb53a2c8eecbe601a4ac5dceeecf1a943c2d9e2eaf4ad0a93e82a1a37a0cf2adbc4b512680428fee922ad18ff90ec6f87a75b299a953167bf4f9ae31cffd2c31dd47ba7d69151424dc1b2835f7624a302f270eb89118043dc1e1faa46e667be9cbf4456ad0c580ed032e4e49459f68f8a70f2dfe40f51362ffae"], 0x1) pread64(r0, &(0x7f0000000340)=""/181, 0xb5, 0x62) setsockopt$inet_msfilter(r0, 0x0, 0x29, &(0x7f0000000580)=ANY=[@ANYBLOB="e00000027f0000010000000001000000000000006b59aa51deb20d6efc9c04b7c9420f6434d31cbbe99b52873a8c21"], 0x1) socket$inet_udp(0x2, 0x2, 0x0) bpf$BPF_PROG_GET_NEXT_ID(0xb, &(0x7f0000000400)=0x7, 0x4) r5 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000ba4000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x2, 0x78, 0xe2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, r5, 0x0) r6 = perf_event_open(&(0x7f0000014f88)={0x1, 0x78, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00002e8000)}}, 0x0, 0x0, r5, 0x0) readv(r6, &(0x7f0000734000)=[{&(0x7f0000d42000)=""/146, 0x92}], 0x1) getsockopt$inet_sctp_SCTP_PEER_ADDR_THLDS(0xffffffffffffffff, 0x84, 0x1f, &(0x7f0000000480)={0x0, @in={{0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0xd}}}, 0xf80866d, 0x5}, &(0x7f0000000540)=0x90) getsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(0xffffffffffffff9c, 0x84, 0x18, &(0x7f0000000440)={r7, 0x400000000004}, &(0x7f00000005c0)=0xffffffffffffffc3) getsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER_VALUE(r0, 0x84, 0x7c, &(0x7f00000002c0)={r8, 0x10001, 0xc9e9}, &(0x7f0000000300)=0x8) 2018/03/30 19:42:53 executing program 7: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f000099e000)={0x2, 0x4e20, @multicast1=0xe0000001}, 0x10) sendto$inet(r0, &(0x7f0000de1fff), 0xfffffffffffffd43, 0x20008005, &(0x7f0000db4ff0)={0x2, 0x4e20, @loopback=0x7f000001}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000af5000)='illinois\x00', 0x9) getsockopt$inet_tcp_buf(r0, 0x6, 0x1a, &(0x7f0000000000)=""/177, &(0x7f0000000100)=0xb1) [ 492.746297] EXT4-fs (loop4): VFS: Can't find ext4 filesystem [ 493.348382] IPVS: ftp: loaded support on port[0] = 21 2018/03/30 19:42:54 executing program 2: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) readv(0xffffffffffffffff, &(0x7f0000001480), 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f00003b9fdc)) readv(r0, &(0x7f0000001980)=[{&(0x7f00000018c0)=""/182, 0xb6}], 0x1) syz_open_pts(r0, 0x2) setsockopt$inet6_mtu(0xffffffffffffffff, 0x29, 0x17, &(0x7f0000000440)=0x5, 0x4) socket$inet_sctp(0x2, 0x5, 0x84) write(r0, &(0x7f0000c34fff), 0xffffff0b) socket$inet(0x2, 0x0, 0x0) setsockopt$bt_l2cap_L2CAP_OPTIONS(0xffffffffffffffff, 0x6, 0x1, &(0x7f0000000380)={0xefa, 0x800, 0x0, 0x0, 0x9}, 0xc) 2018/03/30 19:42:54 executing program 5: unshare(0x40000000) perf_event_open(&(0x7f0000000000)={0x6, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0xa, 0x1, 0x0) ioctl(r0, 0x8982, &(0x7f0000000000)) r1 = socket$packet(0x11, 0x0, 0x300) r2 = openat$cuse(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/cuse\x00', 0x82, 0x0) io_setup(0x43f, &(0x7f00000000c0)=0x0) io_submit(r3, 0x1, &(0x7f0000000000)=[&(0x7f0000000200)={0x0, 0x0, 0x0, 0x1, 0x0, r2, &(0x7f0000000040)="10000000020400000000000000000000", 0x10}]) r4 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000280)='/proc/sys/net/ipv4/vs/secure_tcp\x00', 0x2, 0x0) sendmsg$kcm(r4, &(0x7f0000001f00)={&(0x7f0000001b40)=@pppol2tpin6={0x18, 0x1, {0x0, r1, 0x0, 0x1, 0x0, 0x0, {0xa, 0x4e24, 0xc1, @mcast1={0xff, 0x1, [], 0x1}}}}, 0x80, &(0x7f0000001d80)=[{&(0x7f0000001bc0)="a9db123ebf124fab0f2eec9774559e3b5870fb7c6818fc89c4b8742d057480657265ae2b34fb2d4e585d22ca1bf7b0a22ce38a20a819d919947c78f8d5c9f3291905fd3ed2b8ef8a79d9453396c6b0b7eb0778dbc49b32ae91e443b64edddcf320c1589c7777eadd4e57c01b20a8ca7a831e8e2c104d0194d52fb5c35b550f", 0x7f}], 0x1, &(0x7f0000001dc0)=ANY=[], 0x0, 0x90}, 0x20000000) r5 = syz_open_dev$tun(&(0x7f00000001c0)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r5, 0x400454ca, &(0x7f0000000200)={'bridge0\x00\x00p\x00', 0x4000000000001005}) socketpair(0x1d, 0x3, 0x40, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_inet_SIOCSIFADDR(r6, 0x8916, &(0x7f0000000100)={'bridge8\x00', {0x2, 0x0, @dev={0xac, 0x14, 0x14}}}) ioctl$LOOP_SET_FD(r2, 0x4c00, r1) ioctl$SNDRV_SEQ_IOCTL_RUNNING_MODE(0xffffffffffffffff, 0xc0105303, &(0x7f00000002c0)={0x2, 0x8}) add_key$keyring(&(0x7f00000000c0)='keyring\x00', &(0x7f0000000100)={0x73, 0x79, 0x7a}, 0x0, 0x0, 0x0) clone(0x0, &(0x7f0000000040), &(0x7f0000000080), &(0x7f0000000000), &(0x7f0000000100)) ioctl$int_in(0xffffffffffffffff, 0x800000c004500a, &(0x7f0000006ff8)) wait4(0x0, 0x0, 0x4, &(0x7f0000000380)) ioctl$sock_inet_sctp_SIOCINQ(r7, 0x541b, &(0x7f0000000180)) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_PORT(0xffffffffffffffff, 0xc0a85352, &(0x7f0000001980)={{}, 'port1\x00', 0x0, 0x20010, 0x1f, 0x0, 0x3, 0x40, 0x0, 0x0, 0x4, 0x6d1}) 2018/03/30 19:42:54 executing program 7: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f000099e000)={0x2, 0x4e20, @multicast1=0xe0000001}, 0x10) sendto$inet(r0, &(0x7f0000de1fff), 0xfffffffffffffd43, 0x20008005, &(0x7f0000db4ff0)={0x2, 0x4e20, @loopback=0x7f000001}, 0x10) getsockopt$inet_tcp_buf(r0, 0x6, 0x1a, &(0x7f0000000000)=""/177, &(0x7f0000000100)=0xb1) 2018/03/30 19:42:54 executing program 4: symlinkat(&(0x7f0000002f00)='./file0\x00', 0xffffffffffffffff, &(0x7f0000002f80)='./file0\x00') syz_mount_image$msdos(&(0x7f0000002fc0)='msdos\x00', &(0x7f0000003000)='./file0\x00', 0x4, 0x1, &(0x7f0000003180)=[{&(0x7f0000003040)="eaf9610c9f7031a1f58e51e73b3f0bd5af4364c38bbe335dbd3d211ec0338ba4c795c634af757a3c684da6110f67891133a6303441b21d139e3a6582efdaeabd3d68dbcb85cd383733a98084b62807af0b7ea49d68daa4cc9fda43dbeb13c3e67c44c463a2c429ccb66c0e1a9dfd5c911d4d7b578baaad6571d4457b9c6d92122a4bd97f5f174c81081941b007062f2cab2db1466851dde671e025909a633fec433bb2512fc61c436b74df23d280019a403884dc488071", 0xb7, 0xcd7}], 0x8, &(0x7f00000031c0)={[{@errors_continue='errors=continue', 0x2c}, {@time_offset={'time_offset', 0x3d, [0x0]}, 0x2c}]}) pipe(&(0x7f0000002f40)={0xffffffffffffffff}) r1 = open(&(0x7f0000003240)='./file0\x00', 0xa0001, 0x20) linkat(r0, &(0x7f0000003200)='./file0\x00', r1, &(0x7f0000003280)='./file0\x00', 0x400) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x80000, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)}, {&(0x7f0000010d00)="0000000000000000000000000000000000000000000000000000000002ae0000ed41000000040000d15bbe5ad15bbe5ad15bbe5a00000000000005002000000000000800070000000af301000400000000000000000000000100000030000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a1950000", 0xa0, 0x8c60}, {&(0x7f0000011a00)="020000000c0001022e000000020000000c0002022e2e00000b00000014000a026c6f73742b666f756e6400000c0000001000050166696c65300000000d0000001000050266696c65310000000f0000001000050166696c6532000000100000001000050166696c6533000000110000001000050166696c65340000001200000010000802564944454f5f54531400000068031201d181d18ed0b7d0bad0b0d0bbd0bbd0b5d1800000000000000000000000000000000000000000000000000000", 0xc0, 0xc000}, {&(0x7f0000012200)="0000000000000000000000000000000000000000000000000c0000dec910dfd800000000f4030000000000000000000000000000000000000000000000000000", 0x40, 0x117e0}, {&(0x7f0000012a00)="0d0000000c0001022e000000020000000c0002022e2e00000e000000dc03050166696c6530000000000000000000000000000000000000000000000000000000", 0x40, 0x1c000}], 0x0, &(0x7f0000013000)) syz_mount_image$bfs(&(0x7f0000000040)='bfs\x00', &(0x7f00000008c0)='./file0\x00', 0x20, 0x2, &(0x7f0000000180)=[{&(0x7f00000005c0)="f37e57346e86cb5adec662d7bd6f13a3764d2ca7640f9f81ba88d0689d0989735a7bafd5558d9a6e8988f9f6038fa475e49077bc8cfc6e170c4cdbaaa1375895c9a4068559d3cecf2a0423caa696bf77a75b3ae3f32b79da059ca13d055647998987fc2033d008bd55deb08808372b9b4595fb0d79a1358cd5949d859a7d155e86db4b608eb401109f6b792f5ce4a2ead9870dee49347bc08d0d54b0e4fca4fd895947a737f4ee823d997770e5c9df50c0c9fe2c0b945c6ffd13b7151e385b631520ac34a5967c6cd0d12b3746795681600541c17d379daed41ce8e715eba582fb668e160872a2", 0xe7, 0x7}, {&(0x7f0000000780)="6154d093a5a905da96fed5f8dea36bcd9d1d011246f7caf86806bf6ac6301d2d2b448461b867bbbe7d0eebdeafa16d7219af85ff4372670039ce277546def59f1d0eed4be4386a34c7243fe3ec84ad3807136a2c3ec35d6d87a7d7bb9342622cc3a7ff529ef3d76ff57fc7a1856f50b98e518515a9e679067cfc0e8500754fa30a81cf4dc42c5a0d36647280c5b0a8506efaf9ad06594678176efe4bdbcf7ab384b597df4c5ad66b2bd240823abe04cd30785819f1c7fd4d46bb55f8bd09ca4b44618b010e363fa572ca189ec73b36ad46b6f38d65c0acc417", 0xd9, 0x5}], 0x200000, 0x0) syz_mount_image$jfs(&(0x7f0000000080)='jfs\x00', &(0x7f0000000880)='./file0\x00', 0xfffffffffffffffe, 0x3, &(0x7f0000002dc0)=[{&(0x7f0000000900)="efee47debce411554253d03f2175c060de26b9a7a197d9327971105aafdf17a061227fe7dd52d3c1c1f0318992f304f7646c3eb4e32ff0514d34d4605b4e152474aa71ac6c0ba890b1f249f213d5bc162b605fdf3c524d6f84e1a2f8461d26ef5dd50b193ffb710ee69fc431552ae4548f0c1a7e503243bb10c53c566f37e3234d8b3d418992dca946568d275e1f54895a854bab3790963108fe6ce5b1f933e81bd0aa2dfd715aca4bd81b48b28e3ee265", 0xb1, 0x1}, {&(0x7f0000001a80)="b4bc90ad72742e5693f04c7955b05460b33cd0ca9cde365dbe1671162a8c1db744cb8a04d1d747ab4d3234fd615e6ad897396c21b8bf7da2c1d524d04fadade841e5acfac529250a2c75fed4b65a7b6c8735268244189e020c526112728097958fd591d00cd16d1591db9b0414d985d7718794369eb03d89403b7df76f6d745c94d4fa986321a9915fea55a73472bc39620fcf22ec74d02b77fafe6ccf72605eb0ba7ae69fa10a36d281e65a178528bc654ce5b6109d5294e400b18be755a3b899489b27a876ac3ea033ed525b28c7dff537b5210cbff466dc339e1f58db1679816589e886264ef1bcf6d0e1408d93946827711972", 0xf5, 0x7}, {&(0x7f0000002cc0)="c9bc1928c9ffffe99fdae39f5013810a038f1d558affc92341c81ee308195dabd95fcfedcfccd4cf2af62477e5ed935114b73940dba239c47d5824a3332fb48cea682934a6840ea5db2529c3a7c371bbf08f08bb15458de586609be64b699f29b7384dc7b2ba78f0e343fb9851eaf5a7b4106fc5b7a8aaf6e069012286fa7259807928cbee722222f45e6c98cefa00829bcdd92bd03273c7b0f20453c72150adf49c311248d3d3d96ad17187d60add3d1d8fbfbc5e572ceba134e5c533a5f75630a35514ee998b85a755085c04513dcc0047461d78f4aa8fdf0309fc39e3e4a1c24b4538acbf2366feaf", 0xea}], 0x10000, &(0x7f0000002ec0)={[{@nodiscard='nodiscard', 0x2c}, {@resize='resize', 0x2c}, {@noquota='noquota', 0x2c}, {@umask={'umask', 0x3d, [0x3f]}, 0x2c}]}) 2018/03/30 19:42:54 executing program 3: r0 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000180)='/dev/sequencer\x00', 0x42, 0x0) r1 = syz_open_procfs(0x0, &(0x7f00000001c0)="2f65786500000000000409004bddd9de91be10eebf000ee9a90f79805854fa07424adee901d2da75af1f0200f5ab26d7a071fb35331ce39c5a6621f51a480e2f3aac78a8db2c0be10f25d1fea68bbb27cf59ce6768143c7da0a5277c17be7e03ff2cd97a72d0351a82cb32b931716cad42bf9e3ec64b5fb82d5ab6bbd2d014549e66a84f9c795681f0a1df8b9edf3ce14950237ec78ece828761d8bc9245639704915d7d5d5625e9cd9707fd187d962a37d82094a688f609709697282397e835b7b1e416f488d1e93e9dd87c96a1fdfc37bdb13612dd5aa126c16417a8f366042350e9485d00b192449c56657ad3ea028ff1eb384742822414bbe5218eb51fe1b23ce8ff59358aec9153efa611c57ea26daf7533d6c3a4") getsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(r1, 0x84, 0x1f, &(0x7f0000000680)={0x0, @in={{0x2, 0x0, @loopback=0x7f000001}}, 0x904e, 0x8}, &(0x7f0000000740)=0x90) setsockopt$inet_sctp_SCTP_PR_SUPPORTED(r0, 0x84, 0x71, &(0x7f00000004c0)={r2}, 0x8) sendfile(r0, r1, &(0x7f0000000040), 0x100000000081) r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000140)='./cgroup.cpu\x00', 0x200002, 0x0) fchdir(r3) r4 = syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x0, 0x0) splice(r4, &(0x7f0000000300), 0xffffffffffffffff, &(0x7f00000003c0), 0x0, 0x0) r5 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet6_MRT6_ADD_MFC_PROXY(r1, 0x29, 0xd2, &(0x7f0000000600)={{0xa, 0x7, 0x9d, @empty, 0x4}, {0xa, 0x4e23, 0x5, @ipv4={[], [0xff, 0xff], @multicast2=0xe0000002}, 0x8}, 0x3, [0x9, 0x101, 0x5, 0x8, 0x0, 0x1f, 0x531, 0x1ff]}, 0x5c) rmdir(&(0x7f0000000080)='./file0\x00') setsockopt$inet_mreqn(r5, 0x0, 0x27, &(0x7f0000000140)={@multicast2=0xe0000002, @loopback=0x7f000001}, 0xc) ioctl$sock_inet_SIOCSIFFLAGS(r5, 0x8914, &(0x7f0000000940)={'lo\x00'}) setsockopt$IP_VS_SO_SET_ADD(0xffffffffffffffff, 0x0, 0x482, &(0x7f0000000340)={0x0, @multicast1=0xe0000001, 0x0, 0x0, 'dh\x00'}, 0x2c) socket$inet_sctp(0x2, 0x0, 0x84) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f0000000380)={'irlan0\x00'}) fcntl$setlease(r0, 0x400, 0x43) stat(&(0x7f0000000400)='./file0/file0\x00', &(0x7f0000000440)={0x0, 0x0, 0x0, 0x0, 0x0}) setsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x22, &(0x7f0000000500)={{{@in, @in=@remote={0xac, 0x14, 0x14, 0xbb}, 0x4e20, 0x0, 0x0, 0xb17, 0xa, 0xa0, 0xa0, 0x29, 0x0, r6}, {0x9, 0x43d, 0x3f, 0xacbb, 0x85e3, 0x3f, 0x5, 0x7}, {0x0, 0x100, 0x1f, 0x5}, 0x1f, 0x0, 0x1, 0x0, 0x0, 0x3}, {{@in=@broadcast=0xffffffff, 0x4d2}, 0xa, @in6=@local={0xfe, 0x80, [], 0xaa}, 0x3501, 0x2, 0x0, 0xfff, 0x7}}, 0xe8) pread64(0xffffffffffffffff, &(0x7f0000000080)=""/156, 0x9c, 0x0) sendto$inet(0xffffffffffffffff, &(0x7f0000000000), 0x0, 0x0, &(0x7f0000000040)={0x2, 0x4e22, @loopback=0x7f000001}, 0x10) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x8, &(0x7f0000cecffc), 0x4) setsockopt$inet6_MRT6_ADD_MFC(r0, 0x29, 0xcc, &(0x7f0000000800)={{0xa, 0x4e24, 0x18e, @local={0xfe, 0x80, [], 0xaa}, 0xa6c2}, {0xa, 0x4e24, 0xf40, @local={0xfe, 0x80, [], 0xaa}, 0x1f}, 0x0, [0x5, 0x100000000, 0x0, 0x3, 0x256, 0x6, 0x1f6, 0x100000000]}, 0x5c) setsockopt$inet_sctp_SCTP_RECVNXTINFO(r1, 0x84, 0x21, &(0x7f00000007c0)=0x5, 0x4) setsockopt$inet6_tcp_TCP_ULP(0xffffffffffffffff, 0x6, 0x1f, &(0x7f0000000780)='tls\x00', 0x4) write(0xffffffffffffffff, &(0x7f00000008c0)="2400000015007f000000873fd51be1550189d7fe6dff0f0000000000007050c0bb7db2e560a4b5f7a4a1763a0400f090", 0x30) open(&(0x7f0000ac3000)='./control\x00', 0x0, 0x0) openat(0xffffffffffffffff, &(0x7f0000563000)='./file0\x00', 0x0, 0x0) 2018/03/30 19:42:54 executing program 6: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_mreqn(r0, 0x0, 0x27, &(0x7f0000000000)={@multicast2=0xe0000002, @loopback=0x7f000001}, 0xc) getsockopt$inet_sctp6_SCTP_FRAGMENT_INTERLEAVE(0xffffffffffffffff, 0x84, 0x12, &(0x7f0000000080), &(0x7f00000000c0)=0x4) ioctl$sock_inet_SIOCGIFDSTADDR(0xffffffffffffffff, 0x8917, &(0x7f0000000040)={'bcsh0\x00', {0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x1a}}}) setsockopt$inet_sctp6_SCTP_MAX_BURST(0xffffffffffffffff, 0x84, 0x14, &(0x7f0000000380)=@int=0x3, 0x4) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000140)={'bcsh0\x00', 0x0}) ioctl$sock_inet6_SIOCDELRT(0xffffffffffffffff, 0x890c, &(0x7f0000000180)={@dev={0xfe, 0x80, [], 0x13}, @loopback={0x0, 0x1}, @mcast2={0xff, 0x2, [], 0x1}, 0x6, 0x0, 0x42e, 0x100, 0x9, 0x80000000, r1}) r2 = socket$inet(0x2, 0xa, 0x5) setsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX(r2, 0x84, 0x6e, &(0x7f0000000600)=[@in={0x2, 0x4e21, @multicast1=0xe0000001}, @in6={0xa, 0x4e20, 0x0, @remote={0xfe, 0x80, [], 0xbb}}, @in={0x2, 0x4e22, @multicast2=0xe0000002}, @in6={0xa, 0x4e21, 0x1ff, @local={0xfe, 0x80, [], 0xaa}, 0x84}, @in6={0xa, 0x4e20, 0x4, @local={0xfe, 0x80, [], 0xaa}}], 0x74) getsockopt$inet_sctp6_SCTP_PR_SUPPORTED(0xffffffffffffffff, 0x84, 0x71, &(0x7f0000000200)={0x0, 0x8}, &(0x7f0000000240)=0x8) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(0xffffffffffffffff, 0x84, 0x6f, &(0x7f0000000300)={r3, 0x70, &(0x7f0000000280)=[@in={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x12}}, @in={0x2, 0x4e24, @loopback=0x7f000001}, @in={0x2, 0x0, @remote={0xac, 0x14, 0x14, 0xbb}}, @in={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x1a}}, @in={0x2, 0x4e24, @remote={0xac, 0x14, 0x14, 0xbb}}, @in={0x2, 0x0, @rand_addr=0x3ff}, @in={0x2, 0x4e24, @multicast2=0xe0000002}]}, &(0x7f0000000340)=0x10) setsockopt$inet_sctp6_SCTP_SET_PEER_PRIMARY_ADDR(0xffffffffffffffff, 0x84, 0x5, &(0x7f00000004c0)={r4, @in={{0x2, 0x4e20, @rand_addr=0x8}}}, 0x84) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, &(0x7f00000003c0)={'lo\x00', 0x4100}) ioctl$sock_inet_SIOCGIFNETMASK(0xffffffffffffffff, 0x891b, &(0x7f0000000100)={'nr0\x00', {0x2, 0x4e24, @loopback=0x7f000001}}) setsockopt$inet_msfilter(r0, 0x0, 0x29, &(0x7f0000000680)=ANY=[@ANYBLOB="cf0000000276d172390cc8c4ff4f3b746e5947c2ddb66a93ebb6d0f75b5f453435c311b94e126c49d47c10682b6e523d09fae1d416ebface98e08aa083e9f1f1afa118eb05655fec48d75d7a37edd032552c60ffeb53a2c8eecbe601a4ac5dceeecf1a943c2d9e2eaf4ad0a93e82a1a37a0cf2adbc4b512680428fee922ad18ff90ec6f87a75b299a953167bf4f9ae31cffd2c31dd47ba7d69151424dc1b2835f7624a302f270eb89118043dc1e1faa46e667be9cbf4456ad0c580ed032e4e49459f68f8a70f2dfe40f51362ffae"], 0x1) pread64(r0, &(0x7f0000000340)=""/181, 0xb5, 0x62) setsockopt$inet_msfilter(r0, 0x0, 0x29, &(0x7f0000000580)=ANY=[@ANYBLOB="e00000027f0000010000000001000000000000006b59aa51deb20d6efc9c04b7c9420f6434d31cbbe99b52873a8c21"], 0x1) socket$inet_udp(0x2, 0x2, 0x0) bpf$BPF_PROG_GET_NEXT_ID(0xb, &(0x7f0000000400)=0x7, 0x4) r5 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000ba4000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x2, 0x78, 0xe2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, r5, 0x0) r6 = perf_event_open(&(0x7f0000014f88)={0x1, 0x78, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00002e8000)}}, 0x0, 0x0, r5, 0x0) readv(r6, &(0x7f0000734000)=[{&(0x7f0000d42000)=""/146, 0x92}], 0x1) getsockopt$inet_sctp_SCTP_PEER_ADDR_THLDS(0xffffffffffffffff, 0x84, 0x1f, &(0x7f0000000480)={0x0, @in={{0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0xd}}}, 0xf80866d, 0x5}, &(0x7f0000000540)=0x90) getsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(0xffffffffffffff9c, 0x84, 0x18, &(0x7f0000000440)={r7, 0x400000000004}, &(0x7f00000005c0)=0xffffffffffffffc3) getsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER_VALUE(r0, 0x84, 0x7c, &(0x7f00000002c0)={r8, 0x10001, 0xc9e9}, &(0x7f0000000300)=0x8) 2018/03/30 19:42:54 executing program 0: r0 = socket$inet6(0xa, 0x80002, 0x0) bind$inet6(r0, &(0x7f00008a8000)={0xa, 0x4e23}, 0x1c) r1 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000240)='/dev/autofs\x00', 0x10200000003, 0x0) setsockopt$inet_sctp_SCTP_RESET_STREAMS(r1, 0x84, 0x77, &(0x7f0000000140)=ANY=[@ANYRES32=0x0, @ANYRES16], 0x2) r2 = gettid() syz_open_dev$random(&(0x7f00000000c0)='/dev/random\x00', 0x0, 0xffffffffffffffff) wait4(r2, &(0x7f0000000100), 0x4, &(0x7f0000000180)) r3 = socket$inet6(0xa, 0x8000000000000802, 0x0) getsockopt$inet_sctp_SCTP_MAX_BURST(r1, 0x84, 0x14, &(0x7f00000009c0)=@assoc_value, &(0x7f0000000a00)=0x8) ioctl$TIOCLINUX2(r1, 0x541c, &(0x7f0000000280)={0x2, 0x62a0, 0x0, 0x5, 0x0, 0x2}) setsockopt$inet6_tcp_TCP_ULP(r3, 0x6, 0x1f, &(0x7f0000000580)='tls\x00', 0x4) sendmsg$inet_sctp(r3, &(0x7f0000a29000)={&(0x7f00005dafe4)=@in6={0xa, 0x4e23, 0x0, @mcast2={0xff, 0x2, [], 0x1}}, 0x1c, &(0x7f0000fc8000)}, 0x8000) sched_setscheduler(0x0, 0x5, &(0x7f0000000300)) setsockopt$ax25_buf(0xffffffffffffffff, 0x101, 0x0, &(0x7f0000000340), 0x0) sendto$inet6(r3, &(0x7f0000b0cf6e), 0xffed, 0x0, &(0x7f000001b000)={0xa}, 0x1c) ioctl$DRM_IOCTL_DROP_MASTER(0xffffffffffffffff, 0x641f) clone(0x0, &(0x7f0000000680)="11fc3d677819c5fd3ced30772692c922a63195f4d5324df3c529e766c729b0c9e5b16a445f0806704d126f46df29a55cd179ee140026c45dce7b7bc635c61cf244f1ff7de9a4b459c91981191fb2ad1eee4850046b0e99581a178d7d2900f516d3dd5cb7a92528cc49b2826a12fe7af568ef4bd6cb615680d021d5f21d8cb5280027320750b0a08312b6a5ed8e7993c57bcf072e3ecfd3c6edb49f1fcb28dbdec8644ac4f84cca6964c599fc60996c9b95f1d29d411a65c06a44cce339e1f6dd5aedfe7e8d937f23e3538f38f7cedc53c70deed22a35fd5a311c0115d00024c67f13637f6fa130332ddd3ca6", &(0x7f0000000080), &(0x7f00000001c0), &(0x7f00000000c0)) mq_open(&(0x7f00000003c0)='\x00', 0x0, 0x180, &(0x7f0000000400)={0x2, 0x8, 0x0, 0x8, 0x4}) r4 = socket$nl_crypto(0x10, 0x3, 0x15) dup3(0xffffffffffffffff, r4, 0x8080000) r5 = openat$rtc(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/rtc\x00', 0x400, 0x0) getsockname$netlink(r5, &(0x7f0000000300), &(0x7f0000000340)=0xc) futex(&(0x7f000000cffc)=0x4, 0x80000000000b, 0x4, &(0x7f000000b000)={0x77359400}, &(0x7f0000048000), 0x0) futex(&(0x7f000000cffc)=0x4, 0xc, 0x1, &(0x7f0000fd7ff0)={0x77359400}, &(0x7f0000048000), 0x4) gettid() timer_create(0x0, &(0x7f0000044000), &(0x7f0000636000)) 2018/03/30 19:42:54 executing program 1: r0 = syz_open_dev$amidi(&(0x7f0000000040)='/dev/amidi#\x00', 0x3, 0x28000) ioctl$DRM_IOCTL_RES_CTX(r0, 0xc0086426, &(0x7f0000000100)={0x2c, &(0x7f00000000c0)=[{}, {}, {}, {}, {}, {}, {}, {}]}) socket$netlink(0x10, 0x3, 0xc) writev(0xffffffffffffffff, &(0x7f00000021c0), 0x0) bind$bt_l2cap(r0, &(0x7f0000000340)={0x1f, 0x800000000000002, {0x401, 0x3, 0xb, 0x3f8}}, 0x9) socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f0000a8d000)={&(0x7f0000c78ff4)={0x10}, 0xc, &(0x7f0000df6000)={&(0x7f0000000200)=ANY=[@ANYBLOB="71d09610c8cdf0385325e40636fa5b4ea300f7cad0a6b900004b02d4dffcd2ed7ccdf561d2200b96fdec15365d03080343931dd765acc95ec5337c4646665aa21532f3c25f664fffd6954c69cdcc48f86a17bb1cacec90d3e5c2622a9490ac4731b92be01fb3d80189d7e0d71bca2fbcdb03f49e1d0c4483eb9869fefa26e622cf695a040633964ff57574ba1cae0000000000009fa5ad0bd3a1fdc60dec58ae9519fadb1e4de766842eb40ad6e3844a9f1eea26912c24acbe091cf5a56667cd77fb9cb3dee30a3819297d5b055128986b2167a429fe30824c5dd0a1e58c1a54121a089164918c04e944d6d6d5ca697a431f8e41485e6c2456beee2a3664d216be38b3d36a8820ca0e3d1781eaf47e"], 0x10f}, 0x1}, 0x0) r1 = socket$inet_sctp(0x2, 0x0, 0x84) sendmsg$inet_sctp(r1, &(0x7f0000001f00)={&(0x7f0000001840)=@in={0x2, 0x0, @dev={0xac, 0x14, 0x14}}, 0x10, &(0x7f0000001c40)=[{&(0x7f0000001880)='[', 0x1}], 0x1, &(0x7f0000001e40)}, 0x40) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000540)=@nat={'nat\x00', 0x19, 0x3, 0x376, [0x20000140, 0x0, 0x0, 0x20000170, 0x200002d0], 0x0, &(0x7f0000000100), &(0x7f00000006c0)=ANY=[@ANYBLOB="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"]}, 0x3ee) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000002980)) getsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(0xffffffffffffffff, 0x84, 0x1f, &(0x7f0000000440)={0x0, @in={{0x2, 0x4e22, @multicast2=0xe0000002}}, 0x7bb7, 0x4}, &(0x7f0000000500)=0x90) getsockopt$inet_sctp_SCTP_RTOINFO(0xffffffffffffffff, 0x84, 0x0, &(0x7f0000002240)={0x0, 0x9, 0x417}, &(0x7f00000001c0)=0x10) r2 = socket(0x22, 0x4, 0x3) r3 = socket(0x20000001e, 0x5, 0x0) r4 = perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$packet_tx_ring(r3, 0x10f, 0x87, &(0x7f0000265000)=@req={0x3fc, 0x0, 0x1}, 0x10) getegid() setsockopt$packet_tx_ring(r2, 0x10f, 0x87, &(0x7f0000265000)=@req={0x3fc, 0x0, 0x1}, 0x10) writev(r2, &(0x7f00000000c0)=[{&(0x7f0000000000)="8a", 0x1}], 0x1) close(r2) close(r3) perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r5 = syz_open_dev$evdev(&(0x7f0000dfdfee)='/dev/input/event#\x00', 0x0, 0x2) readv(r5, &(0x7f0000019fe0)=[{&(0x7f00008ec000)=""/219, 0xdb}], 0x1) write$evdev(r5, &(0x7f000004d000)=[{{}, 0x0, 0x1}, {{0x2}}], 0x30) r6 = getpgrp(0x0) setsockopt$ax25_int(r3, 0x101, 0xd, &(0x7f0000000080)=0x7, 0x4) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x8, 0xfffffffffffffffd, 0x9, 0x7, 0x0, 0x8001, 0x0, 0x6, 0x3ff, 0x4, 0x5, 0x4, 0xbd9, 0x56, 0x8000, 0x7f, 0xff, 0xeba, 0x1f, 0x0, 0xfd, 0x3, 0x1, 0x50, 0x7, 0x9, 0x641800, 0x3ff8000000000000, 0x4, 0x0, 0x10000, 0x5, 0x7, 0x6, 0x1, 0xffffffffffffffe0, 0x0, 0x20, 0x0, @perf_bp={&(0x7f0000000040), 0x8}, 0x20, 0x401, 0x8, 0x3, 0x8, 0x7, 0x7}, r6, 0xc, r4, 0x0) syz_genetlink_get_family_id$ipvs(&(0x7f0000000040)='IPVS\x00') [ 493.502892] FAT-fs (loop4): Unrecognized mount option "time_offset=" or missing value 2018/03/30 19:42:54 executing program 6: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_mreqn(r0, 0x0, 0x27, &(0x7f0000000000)={@multicast2=0xe0000002, @loopback=0x7f000001}, 0xc) getsockopt$inet_sctp6_SCTP_FRAGMENT_INTERLEAVE(0xffffffffffffffff, 0x84, 0x12, &(0x7f0000000080), &(0x7f00000000c0)=0x4) ioctl$sock_inet_SIOCGIFDSTADDR(0xffffffffffffffff, 0x8917, &(0x7f0000000040)={'bcsh0\x00', {0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x1a}}}) setsockopt$inet_sctp6_SCTP_MAX_BURST(0xffffffffffffffff, 0x84, 0x14, &(0x7f0000000380)=@int=0x3, 0x4) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000140)={'bcsh0\x00', 0x0}) ioctl$sock_inet6_SIOCDELRT(0xffffffffffffffff, 0x890c, &(0x7f0000000180)={@dev={0xfe, 0x80, [], 0x13}, @loopback={0x0, 0x1}, @mcast2={0xff, 0x2, [], 0x1}, 0x6, 0x0, 0x42e, 0x100, 0x9, 0x80000000, r1}) r2 = socket$inet(0x2, 0xa, 0x5) setsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX(r2, 0x84, 0x6e, &(0x7f0000000600)=[@in={0x2, 0x4e21, @multicast1=0xe0000001}, @in6={0xa, 0x4e20, 0x0, @remote={0xfe, 0x80, [], 0xbb}}, @in={0x2, 0x4e22, @multicast2=0xe0000002}, @in6={0xa, 0x4e21, 0x1ff, @local={0xfe, 0x80, [], 0xaa}, 0x84}, @in6={0xa, 0x4e20, 0x4, @local={0xfe, 0x80, [], 0xaa}}], 0x74) getsockopt$inet_sctp6_SCTP_PR_SUPPORTED(0xffffffffffffffff, 0x84, 0x71, &(0x7f0000000200)={0x0, 0x8}, &(0x7f0000000240)=0x8) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(0xffffffffffffffff, 0x84, 0x6f, &(0x7f0000000300)={r3, 0x70, &(0x7f0000000280)=[@in={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x12}}, @in={0x2, 0x4e24, @loopback=0x7f000001}, @in={0x2, 0x0, @remote={0xac, 0x14, 0x14, 0xbb}}, @in={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x1a}}, @in={0x2, 0x4e24, @remote={0xac, 0x14, 0x14, 0xbb}}, @in={0x2, 0x0, @rand_addr=0x3ff}, @in={0x2, 0x4e24, @multicast2=0xe0000002}]}, &(0x7f0000000340)=0x10) setsockopt$inet_sctp6_SCTP_SET_PEER_PRIMARY_ADDR(0xffffffffffffffff, 0x84, 0x5, &(0x7f00000004c0)={r4, @in={{0x2, 0x4e20, @rand_addr=0x8}}}, 0x84) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, &(0x7f00000003c0)={'lo\x00', 0x4100}) ioctl$sock_inet_SIOCGIFNETMASK(0xffffffffffffffff, 0x891b, &(0x7f0000000100)={'nr0\x00', {0x2, 0x4e24, @loopback=0x7f000001}}) setsockopt$inet_msfilter(r0, 0x0, 0x29, &(0x7f0000000680)=ANY=[@ANYBLOB="cf0000000276d172390cc8c4ff4f3b746e5947c2ddb66a93ebb6d0f75b5f453435c311b94e126c49d47c10682b6e523d09fae1d416ebface98e08aa083e9f1f1afa118eb05655fec48d75d7a37edd032552c60ffeb53a2c8eecbe601a4ac5dceeecf1a943c2d9e2eaf4ad0a93e82a1a37a0cf2adbc4b512680428fee922ad18ff90ec6f87a75b299a953167bf4f9ae31cffd2c31dd47ba7d69151424dc1b2835f7624a302f270eb89118043dc1e1faa46e667be9cbf4456ad0c580ed032e4e49459f68f8a70f2dfe40f51362ffae"], 0x1) pread64(r0, &(0x7f0000000340)=""/181, 0xb5, 0x62) setsockopt$inet_msfilter(r0, 0x0, 0x29, &(0x7f0000000580)=ANY=[@ANYBLOB="e00000027f0000010000000001000000000000006b59aa51deb20d6efc9c04b7c9420f6434d31cbbe99b52873a8c21"], 0x1) socket$inet_udp(0x2, 0x2, 0x0) bpf$BPF_PROG_GET_NEXT_ID(0xb, &(0x7f0000000400)=0x7, 0x4) r5 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000ba4000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x2, 0x78, 0xe2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, r5, 0x0) r6 = perf_event_open(&(0x7f0000014f88)={0x1, 0x78, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00002e8000)}}, 0x0, 0x0, r5, 0x0) readv(r6, &(0x7f0000734000)=[{&(0x7f0000d42000)=""/146, 0x92}], 0x1) getsockopt$inet_sctp_SCTP_PEER_ADDR_THLDS(0xffffffffffffffff, 0x84, 0x1f, &(0x7f0000000480)={0x0, @in={{0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0xd}}}, 0xf80866d, 0x5}, &(0x7f0000000540)=0x90) getsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(0xffffffffffffff9c, 0x84, 0x18, &(0x7f0000000440)={r7, 0x400000000004}, &(0x7f00000005c0)=0xffffffffffffffc3) getsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER_VALUE(r0, 0x84, 0x7c, &(0x7f00000002c0)={r8, 0x10001, 0xc9e9}, &(0x7f0000000300)=0x8) 2018/03/30 19:42:54 executing program 7: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f000099e000)={0x2, 0x4e20, @multicast1=0xe0000001}, 0x10) sendto$inet(r0, &(0x7f0000de1fff), 0xfffffffffffffd43, 0x20008005, &(0x7f0000db4ff0)={0x2, 0x4e20, @loopback=0x7f000001}, 0x10) getsockopt$inet_tcp_buf(r0, 0x6, 0x1a, &(0x7f0000000000)=""/177, &(0x7f0000000100)=0xb1) [ 493.581336] EXT4-fs (loop4): VFS: Can't find ext4 filesystem 2018/03/30 19:42:54 executing program 6: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_mreqn(r0, 0x0, 0x27, &(0x7f0000000000)={@multicast2=0xe0000002, @loopback=0x7f000001}, 0xc) getsockopt$inet_sctp6_SCTP_FRAGMENT_INTERLEAVE(0xffffffffffffffff, 0x84, 0x12, &(0x7f0000000080), &(0x7f00000000c0)=0x4) ioctl$sock_inet_SIOCGIFDSTADDR(0xffffffffffffffff, 0x8917, &(0x7f0000000040)={'bcsh0\x00', {0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x1a}}}) setsockopt$inet_sctp6_SCTP_MAX_BURST(0xffffffffffffffff, 0x84, 0x14, &(0x7f0000000380)=@int=0x3, 0x4) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000140)={'bcsh0\x00', 0x0}) ioctl$sock_inet6_SIOCDELRT(0xffffffffffffffff, 0x890c, &(0x7f0000000180)={@dev={0xfe, 0x80, [], 0x13}, @loopback={0x0, 0x1}, @mcast2={0xff, 0x2, [], 0x1}, 0x6, 0x0, 0x42e, 0x100, 0x9, 0x80000000, r1}) r2 = socket$inet(0x2, 0xa, 0x5) setsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX(r2, 0x84, 0x6e, &(0x7f0000000600)=[@in={0x2, 0x4e21, @multicast1=0xe0000001}, @in6={0xa, 0x4e20, 0x0, @remote={0xfe, 0x80, [], 0xbb}}, @in={0x2, 0x4e22, @multicast2=0xe0000002}, @in6={0xa, 0x4e21, 0x1ff, @local={0xfe, 0x80, [], 0xaa}, 0x84}, @in6={0xa, 0x4e20, 0x4, @local={0xfe, 0x80, [], 0xaa}}], 0x74) getsockopt$inet_sctp6_SCTP_PR_SUPPORTED(0xffffffffffffffff, 0x84, 0x71, &(0x7f0000000200)={0x0, 0x8}, &(0x7f0000000240)=0x8) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(0xffffffffffffffff, 0x84, 0x6f, &(0x7f0000000300)={r3, 0x70, &(0x7f0000000280)=[@in={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x12}}, @in={0x2, 0x4e24, @loopback=0x7f000001}, @in={0x2, 0x0, @remote={0xac, 0x14, 0x14, 0xbb}}, @in={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x1a}}, @in={0x2, 0x4e24, @remote={0xac, 0x14, 0x14, 0xbb}}, @in={0x2, 0x4e24, @rand_addr}, @in={0x2, 0x4e24, @multicast2=0xe0000002}]}, &(0x7f0000000340)=0x10) setsockopt$inet_sctp6_SCTP_SET_PEER_PRIMARY_ADDR(0xffffffffffffffff, 0x84, 0x5, &(0x7f00000004c0)={r4, @in={{0x2, 0x4e20, @rand_addr=0x8}}}, 0x84) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, &(0x7f00000003c0)={'lo\x00', 0x4100}) ioctl$sock_inet_SIOCGIFNETMASK(0xffffffffffffffff, 0x891b, &(0x7f0000000100)={'nr0\x00', {0x2, 0x4e24, @loopback=0x7f000001}}) setsockopt$inet_msfilter(r0, 0x0, 0x29, &(0x7f0000000680)=ANY=[@ANYBLOB="cf0000000276d172390cc8c4ff4f3b746e5947c2ddb66a93ebb6d0f75b5f453435c311b94e126c49d47c10682b6e523d09fae1d416ebface98e08aa083e9f1f1afa118eb05655fec48d75d7a37edd032552c60ffeb53a2c8eecbe601a4ac5dceeecf1a943c2d9e2eaf4ad0a93e82a1a37a0cf2adbc4b512680428fee922ad18ff90ec6f87a75b299a953167bf4f9ae31cffd2c31dd47ba7d69151424dc1b2835f7624a302f270eb89118043dc1e1faa46e667be9cbf4456ad0c580ed032e4e49459f68f8a70f2dfe40f51362ffae"], 0x1) pread64(r0, &(0x7f0000000340)=""/181, 0xb5, 0x62) setsockopt$inet_msfilter(r0, 0x0, 0x29, &(0x7f0000000580)=ANY=[@ANYBLOB="e00000027f0000010000000001000000000000006b59aa51deb20d6efc9c04b7c9420f6434d31cbbe99b52873a8c21"], 0x1) socket$inet_udp(0x2, 0x2, 0x0) bpf$BPF_PROG_GET_NEXT_ID(0xb, &(0x7f0000000400)=0x7, 0x4) r5 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000ba4000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x2, 0x78, 0xe2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, r5, 0x0) r6 = perf_event_open(&(0x7f0000014f88)={0x1, 0x78, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00002e8000)}}, 0x0, 0x0, r5, 0x0) readv(r6, &(0x7f0000734000)=[{&(0x7f0000d42000)=""/146, 0x92}], 0x1) getsockopt$inet_sctp_SCTP_PEER_ADDR_THLDS(0xffffffffffffffff, 0x84, 0x1f, &(0x7f0000000480)={0x0, @in={{0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0xd}}}, 0xf80866d, 0x5}, &(0x7f0000000540)=0x90) getsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(0xffffffffffffff9c, 0x84, 0x18, &(0x7f0000000440)={r7, 0x400000000004}, &(0x7f00000005c0)=0xffffffffffffffc3) getsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER_VALUE(r0, 0x84, 0x7c, &(0x7f00000002c0)={r8, 0x10001, 0xc9e9}, &(0x7f0000000300)=0x8) 2018/03/30 19:42:54 executing program 3: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000a00)='./cgroup.net\x00', 0x200002, 0x0) fchdir(r0) r1 = creat(&(0x7f0000000040)='./file1\x00', 0x0) r2 = dup3(r1, r0, 0x0) pwritev(0xffffffffffffffff, &(0x7f0000000b40)=[{&(0x7f0000000100)="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", 0x5f9}], 0x1, 0x0) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x0) write$cgroup_subtree(r2, &(0x7f0000000000)=ANY=[], 0x34123610) ftruncate(r1, 0x3) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000b00)=0x0) getpgrp(r3) ioctl$sock_inet_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, &(0x7f0000000c00)={'erspan0\x00', {0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x1a}}}) ppoll(&(0x7f0000000a40)=[{r2}, {}, {}], 0x3, &(0x7f00000000c0), &(0x7f0000000ac0), 0x8) mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x31, 0xffffffffffffffff, 0x0) getsockopt$EBT_SO_GET_INIT_INFO(r2, 0x0, 0x82, &(0x7f0000000980)={'broute\x00'}, &(0x7f0000000c40)=0x50) ioctl$fiemap(0xffffffffffffffff, 0xc020660b, &(0x7f0000000e80)=ANY=[]) 2018/03/30 19:42:54 executing program 7: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f000099e000)={0x2, 0x4e20, @multicast1=0xe0000001}, 0x10) sendto$inet(r0, &(0x7f0000de1fff), 0xfffffffffffffd43, 0x20008005, &(0x7f0000db4ff0)={0x2, 0x4e20, @loopback=0x7f000001}, 0x10) getsockopt$inet_tcp_buf(r0, 0x6, 0x1a, &(0x7f0000000000)=""/177, &(0x7f0000000100)=0xb1) [ 493.644662] BFS-fs: bfs_fill_super(): No BFS filesystem on loop4 (magic=00000000) [ 493.684368] jfs: Unrecognized mount option "umask=?" or missing value 2018/03/30 19:42:54 executing program 4: symlinkat(&(0x7f0000002f00)='./file0\x00', 0xffffffffffffffff, &(0x7f0000002f80)='./file0\x00') syz_mount_image$msdos(&(0x7f0000002fc0)='msdos\x00', &(0x7f0000003000)='./file0\x00', 0x4, 0x1, &(0x7f0000003180)=[{&(0x7f0000003040)="eaf9610c9f7031a1f58e51e73b3f0bd5af4364c38bbe335dbd3d211ec0338ba4c795c634af757a3c684da6110f67891133a6303441b21d139e3a6582efdaeabd3d68dbcb85cd383733a98084b62807af0b7ea49d68daa4cc9fda43dbeb13c3e67c44c463a2c429ccb66c0e1a9dfd5c911d4d7b578baaad6571d4457b9c6d92122a4bd97f5f174c81081941b007062f2cab2db1466851dde671e025909a633fec433bb2512fc61c436b74df23d280019a403884dc488071", 0xb7, 0xcd7}], 0x8, &(0x7f00000031c0)={[{@errors_continue='errors=continue', 0x2c}, {@time_offset={'time_offset', 0x3d, [0x0]}, 0x2c}]}) pipe(&(0x7f0000002f40)={0xffffffffffffffff}) r1 = open(&(0x7f0000003240)='./file0\x00', 0xa0001, 0x20) linkat(r0, &(0x7f0000003200)='./file0\x00', r1, &(0x7f0000003280)='./file0\x00', 0x400) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x80000, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)}, {&(0x7f0000010d00)="0000000000000000000000000000000000000000000000000000000002ae0000ed41000000040000d15bbe5ad15bbe5ad15bbe5a00000000000005002000000000000800070000000af301000400000000000000000000000100000030000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a1950000", 0xa0, 0x8c60}, {&(0x7f0000011a00)="020000000c0001022e000000020000000c0002022e2e00000b00000014000a026c6f73742b666f756e6400000c0000001000050166696c65300000000d0000001000050266696c65310000000f0000001000050166696c6532000000100000001000050166696c6533000000110000001000050166696c65340000001200000010000802564944454f5f54531400000068031201d181d18ed0b7d0bad0b0d0bbd0bbd0b5d1800000000000000000000000000000000000000000000000000000", 0xc0, 0xc000}, {&(0x7f0000012200)="0000000000000000000000000000000000000000000000000c0000dec910dfd800000000f4030000000000000000000000000000000000000000000000000000", 0x40, 0x117e0}, {&(0x7f0000012a00)="0d0000000c0001022e000000020000000c0002022e2e00000e000000dc03050166696c6530000000000000000000000000000000000000000000000000000000", 0x40, 0x1c000}], 0x0, &(0x7f0000013000)) syz_mount_image$bfs(&(0x7f0000000040)='bfs\x00', &(0x7f00000008c0)='./file0\x00', 0x20, 0x2, &(0x7f0000000180)=[{&(0x7f00000005c0)="f37e57346e86cb5adec662d7bd6f13a3764d2ca7640f9f81ba88d0689d0989735a7bafd5558d9a6e8988f9f6038fa475e49077bc8cfc6e170c4cdbaaa1375895c9a4068559d3cecf2a0423caa696bf77a75b3ae3f32b79da059ca13d055647998987fc2033d008bd55deb08808372b9b4595fb0d79a1358cd5949d859a7d155e86db4b608eb401109f6b792f5ce4a2ead9870dee49347bc08d0d54b0e4fca4fd895947a737f4ee823d997770e5c9df50c0c9fe2c0b945c6ffd13b7151e385b631520ac34a5967c6cd0d12b3746795681600541c17d379daed41ce8e715eba582fb668e160872a2", 0xe7, 0x7}, {&(0x7f0000000780)="6154d093a5a905da96fed5f8dea36bcd9d1d011246f7caf86806bf6ac6301d2d2b448461b867bbbe7d0eebdeafa16d7219af85ff4372670039ce277546def59f1d0eed4be4386a34c7243fe3ec84ad3807136a2c3ec35d6d87a7d7bb9342622cc3a7ff529ef3d76ff57fc7a1856f50b98e518515a9e679067cfc0e8500754fa30a81cf4dc42c5a0d36647280c5b0a8506efaf9ad06594678176efe4bdbcf7ab384b597df4c5ad66b2bd240823abe04cd30785819f1c7fd4d46bb55f8bd09ca4b44618b010e363fa572ca189ec73b36ad46b6f38d65c0acc417", 0xd9, 0x5}], 0x200000, 0x0) syz_mount_image$jfs(&(0x7f0000000080)='jfs\x00', &(0x7f0000000880)='./file0\x00', 0xfffffffffffffffe, 0x3, &(0x7f0000002dc0)=[{&(0x7f0000000900)="efee47debce411554253d03f2175c060de26b9a7a197d9327971105aafdf17a061227fe7dd52d3c1c1f0318992f304f7646c3eb4e32ff0514d34d4605b4e152474aa71ac6c0ba890b1f249f213d5bc162b605fdf3c524d6f84e1a2f8461d26ef5dd50b193ffb710ee69fc431552ae4548f0c1a7e503243bb10c53c566f37e3234d8b3d418992dca946568d275e1f54895a854bab3790963108fe6ce5b1f933e81bd0aa2dfd715aca4bd81b48b28e3ee265", 0xb1, 0x1}, {&(0x7f0000001a80)="b4bc90ad72742e5693f04c7955b05460b33cd0ca9cde365dbe1671162a8c1db744cb8a04d1d747ab4d3234fd615e6ad897396c21b8bf7da2c1d524d04fadade841e5acfac529250a2c75fed4b65a7b6c8735268244189e020c526112728097958fd591d00cd16d1591db9b0414d985d7718794369eb03d89403b7df76f6d745c94d4fa986321a9915fea55a73472bc39620fcf22ec74d02b77fafe6ccf72605eb0ba7ae69fa10a36d281e65a178528bc654ce5b6109d5294e400b18be755a3b899489b27a876ac3ea033ed525b28c7dff537b5210cbff466dc339e1f58db1679816589e886264ef1bcf6d0e1408d93946827711972", 0xf5, 0x7}, {&(0x7f0000002cc0)="c9bc1928c9ffffe99fdae39f5013810a038f1d558affc92341c81ee308195dabd95fcfedcfccd4cf2af62477e5ed935114b73940dba239c47d5824a3332fb48cea682934a6840ea5db2529c3a7c371bbf08f08bb15458de586609be64b699f29b7384dc7b2ba78f0e343fb9851eaf5a7b4106fc5b7a8aaf6e069012286fa7259807928cbee722222f45e6c98cefa00829bcdd92bd03273c7b0f20453c72150adf49c311248d3d3d96ad17187d60add3d1d8fbfbc5e572ceba134e5c533a5f75630a35514ee998b85a755085c04513dcc0047461d78f4aa8fdf0309fc39e3e4a1c24b4538acbf2366feaf", 0xea}], 0x10000, &(0x7f0000002ec0)={[{@nodiscard='nodiscard', 0x2c}, {@resize='resize', 0x2c}, {@noquota='noquota', 0x2c}, {@umask={'umask', 0x3d, [0x3f]}, 0x2c}]}) 2018/03/30 19:42:54 executing program 6: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_mreqn(r0, 0x0, 0x27, &(0x7f0000000000)={@multicast2=0xe0000002, @loopback=0x7f000001}, 0xc) getsockopt$inet_sctp6_SCTP_FRAGMENT_INTERLEAVE(0xffffffffffffffff, 0x84, 0x12, &(0x7f0000000080), &(0x7f00000000c0)=0x4) ioctl$sock_inet_SIOCGIFDSTADDR(0xffffffffffffffff, 0x8917, &(0x7f0000000040)={'bcsh0\x00', {0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x1a}}}) setsockopt$inet_sctp6_SCTP_MAX_BURST(0xffffffffffffffff, 0x84, 0x14, &(0x7f0000000380)=@int=0x3, 0x4) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000140)={'bcsh0\x00', 0x0}) ioctl$sock_inet6_SIOCDELRT(0xffffffffffffffff, 0x890c, &(0x7f0000000180)={@dev={0xfe, 0x80, [], 0x13}, @loopback={0x0, 0x1}, @mcast2={0xff, 0x2, [], 0x1}, 0x6, 0x0, 0x42e, 0x100, 0x9, 0x80000000, r1}) r2 = socket$inet(0x2, 0xa, 0x5) setsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX(r2, 0x84, 0x6e, &(0x7f0000000600)=[@in={0x2, 0x4e21, @multicast1=0xe0000001}, @in6={0xa, 0x4e20, 0x0, @remote={0xfe, 0x80, [], 0xbb}}, @in={0x2, 0x4e22, @multicast2=0xe0000002}, @in6={0xa, 0x4e21, 0x1ff, @local={0xfe, 0x80, [], 0xaa}, 0x84}, @in6={0xa, 0x4e20, 0x4, @local={0xfe, 0x80, [], 0xaa}}], 0x74) getsockopt$inet_sctp6_SCTP_PR_SUPPORTED(0xffffffffffffffff, 0x84, 0x71, &(0x7f0000000200)={0x0, 0x8}, &(0x7f0000000240)=0x8) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(0xffffffffffffffff, 0x84, 0x6f, &(0x7f0000000300)={r3, 0x70, &(0x7f0000000280)=[@in={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x12}}, @in={0x2, 0x4e24, @loopback=0x7f000001}, @in={0x2, 0x0, @remote={0xac, 0x14, 0x14, 0xbb}}, @in={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x1a}}, @in={0x2, 0x4e24, @remote={0xac, 0x14, 0x14, 0xbb}}, @in={0x2, 0x4e24, @rand_addr}, @in={0x2, 0x4e24, @multicast2=0xe0000002}]}, &(0x7f0000000340)=0x10) setsockopt$inet_sctp6_SCTP_SET_PEER_PRIMARY_ADDR(0xffffffffffffffff, 0x84, 0x5, &(0x7f00000004c0)={r4, @in={{0x2, 0x4e20, @rand_addr=0x8}}}, 0x84) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, &(0x7f00000003c0)={'lo\x00', 0x4100}) ioctl$sock_inet_SIOCGIFNETMASK(0xffffffffffffffff, 0x891b, &(0x7f0000000100)={'nr0\x00', {0x2, 0x4e24, @loopback=0x7f000001}}) setsockopt$inet_msfilter(r0, 0x0, 0x29, &(0x7f0000000680)=ANY=[@ANYBLOB="cf0000000276d172390cc8c4ff4f3b746e5947c2ddb66a93ebb6d0f75b5f453435c311b94e126c49d47c10682b6e523d09fae1d416ebface98e08aa083e9f1f1afa118eb05655fec48d75d7a37edd032552c60ffeb53a2c8eecbe601a4ac5dceeecf1a943c2d9e2eaf4ad0a93e82a1a37a0cf2adbc4b512680428fee922ad18ff90ec6f87a75b299a953167bf4f9ae31cffd2c31dd47ba7d69151424dc1b2835f7624a302f270eb89118043dc1e1faa46e667be9cbf4456ad0c580ed032e4e49459f68f8a70f2dfe40f51362ffae"], 0x1) pread64(r0, &(0x7f0000000340)=""/181, 0xb5, 0x62) setsockopt$inet_msfilter(r0, 0x0, 0x29, &(0x7f0000000580)=ANY=[@ANYBLOB="e00000027f0000010000000001000000000000006b59aa51deb20d6efc9c04b7c9420f6434d31cbbe99b52873a8c21"], 0x1) socket$inet_udp(0x2, 0x2, 0x0) bpf$BPF_PROG_GET_NEXT_ID(0xb, &(0x7f0000000400)=0x7, 0x4) r5 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000ba4000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x2, 0x78, 0xe2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, r5, 0x0) r6 = perf_event_open(&(0x7f0000014f88)={0x1, 0x78, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00002e8000)}}, 0x0, 0x0, r5, 0x0) readv(r6, &(0x7f0000734000)=[{&(0x7f0000d42000)=""/146, 0x92}], 0x1) getsockopt$inet_sctp_SCTP_PEER_ADDR_THLDS(0xffffffffffffffff, 0x84, 0x1f, &(0x7f0000000480)={0x0, @in={{0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0xd}}}, 0xf80866d, 0x5}, &(0x7f0000000540)=0x90) getsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(0xffffffffffffff9c, 0x84, 0x18, &(0x7f0000000440)={r7, 0x400000000004}, &(0x7f00000005c0)=0xffffffffffffffc3) getsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER_VALUE(r0, 0x84, 0x7c, &(0x7f00000002c0)={r8, 0x10001, 0xc9e9}, &(0x7f0000000300)=0x8) 2018/03/30 19:42:54 executing program 3: r0 = syz_open_dev$random(&(0x7f00000003c0)='/dev/random\x00', 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f000060c000)='oom_score_adj\x00') poll(&(0x7f00000014c0)=[{r0, 0x8000}, {r1}, {r0}], 0x3, 0x0) ioctl$TIOCGPGRP(r1, 0x540f, &(0x7f00000000c0)=0x0) getsockopt$netrom_NETROM_T4(r1, 0x103, 0x6, &(0x7f0000000300)=0x8, &(0x7f0000000340)=0x4) r3 = socket$inet6(0xa, 0x2000000802, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r3, 0x29, 0x20, &(0x7f0000f68000)={@loopback={0x0, 0x1}, 0x0, 0x0, 0xff, 0x1}, 0x20) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r1, 0x84, 0x1d, &(0x7f0000002080)=ANY=[@ANYRES16=r1, @ANYRES16=r0, @ANYRES16=r3, @ANYPTR=&(0x7f0000001900)=ANY=[@ANYRES32, @ANYPTR=&(0x7f0000001880)=ANY=[@ANYPTR, @ANYPTR], @ANYPTR=&(0x7f00000018c0)=ANY=[@ANYPTR64, @ANYRES32=r3, @ANYRES16=r1, @ANYRES32, @ANYRES64=r1, @ANYRES32=r2], @ANYRES16=r3, @ANYBLOB="d450223ea6428991a93ec43f694939b2973188587cb0424aa785f7a87e2247ad351d341a4461aecf22254115ed5eea895880974f8dae55bbda8c8da03d97ce6cdebb0f7346da9530a3e3a068c5d969227e8f43cafaa87973615fbcd03cb9f748ab9a6d02da8f0e501a6087ef9211dedf0b5340a7584137b2b0ec37adf77d4ec019bc639f5c9e73498d1e8e17282b2c9824"]], &(0x7f00000020c0)=0x4) setsockopt$inet6_int(r3, 0x29, 0x21, &(0x7f000089b000)=0x3, 0x4) openat$ashmem(0xffffffffffffff9c, &(0x7f0000001740)='/dev/ashmem\x00', 0x4040, 0x0) setsockopt$bt_l2cap_L2CAP_OPTIONS(r1, 0x6, 0x1, &(0x7f0000001500)={0x1, 0x2, 0x0, 0x8, 0x46a7}, 0xc) getsockopt$inet6_IPV6_FLOWLABEL_MGR(r3, 0x29, 0x20, &(0x7f0000000000)={@mcast2={0xff, 0x2, [], 0x1}}, &(0x7f0000000040)=0x20) fcntl$getown(r1, 0x9) r4 = syz_open_procfs(r2, &(0x7f0000000100)="6e65742f69665f696e6574360093fdd81f12659f45e9cb89f8ffffffd451bea0bcf166e408aa93f2de9c7a1786a0b83e1c0da5210d01b9336480d24bf721df26e12a6152f604622b86f9e8a6d4e0e52b4d4518804bc3d131a1c20cee863e600711d0f8cdebab9c16f184f3835747b5fcfb4a8c439d37279d64119874b715ecd26d08c0b9f7b98e72b9401bf0496339354aaf1e011da685dbc8ee74625b3974533f2e05355dadea49035c03b2809c55c2ece8b4e17928fb1361c58fe2024cfa4798878692a6cfcad49eb3c51b78c9453e001eb16c27a6a39ca29de3e43b781daa7dd4348012f3b554bb56240130d542005d2e50fe46373cfc76a6a49c1b8050c99c08ab6aa3ec304a505456d90803f21ef70a51f56c6f4998e6fbb1d9d09e754b10d4b8f03d7621be8ab07b006d8081d8c353648c513e4d06bc9a3ecd201848931a11f7db75d319c2d37f4298ff0a48ad3e2a1f1a4c3813c47084b80fd1bacef8681897d56a3b0952d1d0d60a1d3db780d2aad06d6f0ac83cb479cc667cb00e0d4133539b1ea8a2c5ffdcd9e6f82000824ed364cdb3d9aef2b4f74545e77ecc557beb1d694fc99c505392916ed300ecd94fe0a7b30886d5c4ef01db53002a4185d19fa71fd8728f0b09de4d8ff1444fa7e59f884f27c0b3fe86fd51a3f63c6adbb36ca81d182d25b311a045ba13") lookup_dcookie(0x4242de7a, &(0x7f00000004c0)=""/4096, 0x1000) ioctl$TIOCLINUX6(r4, 0x541c, &(0x7f0000000380)={0x6, 0x6}) setsockopt$inet6_udp_int(0xffffffffffffffff, 0x11, 0x65, &(0x7f0000000000), 0x4) setsockopt$sock_int(r4, 0x1, 0x0, &(0x7f0000001580)=0x1, 0x4) sendfile(r1, r4, &(0x7f0000000040), 0xff) syz_genetlink_get_family_id$ipvs(&(0x7f0000001640)='IPVS\x00') getrlimit(0x1, &(0x7f0000001680)) sendmsg$IPVS_CMD_GET_INFO(r4, &(0x7f0000001700)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x20000008}, 0xc, &(0x7f00000016c0)={&(0x7f0000001840)=ANY=[@ANYBLOB='$\x00\x00\x00'], 0x1}, 0x1, 0x0, 0x0, 0x20004000}, 0x8000) ioctl$VT_RELDISP(r4, 0x5605) setsockopt$inet_mreqsrc(r1, 0x0, 0x0, &(0x7f0000001600)={@rand_addr=0x8, @multicast2=0xe0000002, @remote={0xac, 0x14, 0x14, 0xbb}}, 0xc) ioctl$DRM_IOCTL_MODE_SETCRTC(r4, 0xc06864a2, &(0x7f00000019c0)={&(0x7f0000000400)=[0x1, 0x5], 0x2, 0x3, 0x57, 0x1, 0xdb3e, 0x1, {0x1, 0x80000000, 0x1ff, 0x3ff, 0x7, 0x3, 0x3, 0x93d, 0x7f, 0x7f, 0x6, 0xcf0e, 0xd294, 0x0, "1f77d757ab6c4c699502ac1fd9c4dd6e2ffb5ef6c275609145545f0a9eea1568"}}) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r4, 0x84, 0x6b, &(0x7f0000001540)=[@in6={0xa, 0x4e21, 0x7ff, @local={0xfe, 0x80, [], 0xaa}, 0x8000}, @in6={0xa, 0x0, 0x3, @empty, 0xfffffffffffffffd}], 0x38) [ 493.853563] FAT-fs (loop4): Unrecognized mount option "time_offset=" or missing value [ 493.920334] EXT4-fs (loop4): VFS: Can't find ext4 filesystem [ 493.954166] BFS-fs: bfs_fill_super(): No BFS filesystem on loop4 (magic=00000000) [ 493.983265] jfs: Unrecognized mount option "umask=?" or missing value 2018/03/30 19:42:55 executing program 2: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) readv(0xffffffffffffffff, &(0x7f0000001480), 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f00003b9fdc)) readv(r0, &(0x7f0000001980)=[{&(0x7f00000018c0)=""/182, 0xb6}], 0x1) r1 = syz_open_pts(r0, 0x2) setsockopt$inet6_mtu(0xffffffffffffffff, 0x29, 0x17, &(0x7f0000000440)=0x5, 0x4) dup3(r1, r0, 0x0) write(r0, &(0x7f0000c34fff), 0xffffff0b) socket$inet(0x2, 0x0, 0x0) setsockopt$bt_l2cap_L2CAP_OPTIONS(0xffffffffffffffff, 0x6, 0x1, &(0x7f0000000380)={0xefa, 0x800, 0x0, 0x0, 0x9}, 0xc) 2018/03/30 19:42:55 executing program 7: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f000099e000)={0x2, 0x4e20, @multicast1=0xe0000001}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000af5000)='illinois\x00', 0x9) getsockopt$inet_tcp_buf(r0, 0x6, 0x1a, &(0x7f0000000000)=""/177, &(0x7f0000000100)=0xb1) 2018/03/30 19:42:55 executing program 6: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_mreqn(r0, 0x0, 0x27, &(0x7f0000000000)={@multicast2=0xe0000002, @loopback=0x7f000001}, 0xc) getsockopt$inet_sctp6_SCTP_FRAGMENT_INTERLEAVE(0xffffffffffffffff, 0x84, 0x12, &(0x7f0000000080), &(0x7f00000000c0)=0x4) ioctl$sock_inet_SIOCGIFDSTADDR(0xffffffffffffffff, 0x8917, &(0x7f0000000040)={'bcsh0\x00', {0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x1a}}}) setsockopt$inet_sctp6_SCTP_MAX_BURST(0xffffffffffffffff, 0x84, 0x14, &(0x7f0000000380)=@int=0x3, 0x4) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000140)={'bcsh0\x00', 0x0}) ioctl$sock_inet6_SIOCDELRT(0xffffffffffffffff, 0x890c, &(0x7f0000000180)={@dev={0xfe, 0x80, [], 0x13}, @loopback={0x0, 0x1}, @mcast2={0xff, 0x2, [], 0x1}, 0x6, 0x0, 0x42e, 0x100, 0x9, 0x80000000, r1}) r2 = socket$inet(0x2, 0xa, 0x5) setsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX(r2, 0x84, 0x6e, &(0x7f0000000600)=[@in={0x2, 0x4e21, @multicast1=0xe0000001}, @in6={0xa, 0x4e20, 0x0, @remote={0xfe, 0x80, [], 0xbb}}, @in={0x2, 0x4e22, @multicast2=0xe0000002}, @in6={0xa, 0x4e21, 0x1ff, @local={0xfe, 0x80, [], 0xaa}, 0x84}, @in6={0xa, 0x4e20, 0x4, @local={0xfe, 0x80, [], 0xaa}}], 0x74) getsockopt$inet_sctp6_SCTP_PR_SUPPORTED(0xffffffffffffffff, 0x84, 0x71, &(0x7f0000000200)={0x0, 0x8}, &(0x7f0000000240)=0x8) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(0xffffffffffffffff, 0x84, 0x6f, &(0x7f0000000300)={r3, 0x70, &(0x7f0000000280)=[@in={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x12}}, @in={0x2, 0x4e24, @loopback=0x7f000001}, @in={0x2, 0x0, @remote={0xac, 0x14, 0x14, 0xbb}}, @in={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x1a}}, @in={0x2, 0x4e24, @remote={0xac, 0x14, 0x14, 0xbb}}, @in={0x2, 0x4e24, @rand_addr}, @in={0x2, 0x4e24, @multicast2=0xe0000002}]}, &(0x7f0000000340)=0x10) setsockopt$inet_sctp6_SCTP_SET_PEER_PRIMARY_ADDR(0xffffffffffffffff, 0x84, 0x5, &(0x7f00000004c0)={r4, @in={{0x2, 0x4e20, @rand_addr=0x8}}}, 0x84) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, &(0x7f00000003c0)={'lo\x00', 0x4100}) ioctl$sock_inet_SIOCGIFNETMASK(0xffffffffffffffff, 0x891b, &(0x7f0000000100)={'nr0\x00', {0x2, 0x4e24, @loopback=0x7f000001}}) setsockopt$inet_msfilter(r0, 0x0, 0x29, &(0x7f0000000680)=ANY=[@ANYBLOB="cf0000000276d172390cc8c4ff4f3b746e5947c2ddb66a93ebb6d0f75b5f453435c311b94e126c49d47c10682b6e523d09fae1d416ebface98e08aa083e9f1f1afa118eb05655fec48d75d7a37edd032552c60ffeb53a2c8eecbe601a4ac5dceeecf1a943c2d9e2eaf4ad0a93e82a1a37a0cf2adbc4b512680428fee922ad18ff90ec6f87a75b299a953167bf4f9ae31cffd2c31dd47ba7d69151424dc1b2835f7624a302f270eb89118043dc1e1faa46e667be9cbf4456ad0c580ed032e4e49459f68f8a70f2dfe40f51362ffae"], 0x1) pread64(r0, &(0x7f0000000340)=""/181, 0xb5, 0x62) setsockopt$inet_msfilter(r0, 0x0, 0x29, &(0x7f0000000580)=ANY=[@ANYBLOB="e00000027f0000010000000001000000000000006b59aa51deb20d6efc9c04b7c9420f6434d31cbbe99b52873a8c21"], 0x1) socket$inet_udp(0x2, 0x2, 0x0) bpf$BPF_PROG_GET_NEXT_ID(0xb, &(0x7f0000000400)=0x7, 0x4) r5 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000ba4000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x2, 0x78, 0xe2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, r5, 0x0) r6 = perf_event_open(&(0x7f0000014f88)={0x1, 0x78, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00002e8000)}}, 0x0, 0x0, r5, 0x0) readv(r6, &(0x7f0000734000)=[{&(0x7f0000d42000)=""/146, 0x92}], 0x1) getsockopt$inet_sctp_SCTP_PEER_ADDR_THLDS(0xffffffffffffffff, 0x84, 0x1f, &(0x7f0000000480)={0x0, @in={{0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0xd}}}, 0xf80866d, 0x5}, &(0x7f0000000540)=0x90) getsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(0xffffffffffffff9c, 0x84, 0x18, &(0x7f0000000440)={r7, 0x400000000004}, &(0x7f00000005c0)=0xffffffffffffffc3) getsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER_VALUE(r0, 0x84, 0x7c, &(0x7f00000002c0)={r8, 0x10001, 0xc9e9}, &(0x7f0000000300)=0x8) 2018/03/30 19:42:55 executing program 3: keyctl$clear(0x7, 0x0) r0 = socket$inet6(0xa, 0x2100000000000002, 0x0) getsockopt$inet6_mreq(r0, 0x29, 0x1d, &(0x7f0000000080)={@dev}, &(0x7f00000000c0)=0x14) getsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x22, &(0x7f00000002c0)={{{@in6=@mcast1, @in=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast1}, 0x0, @in=@local}}, &(0x7f0000000100)=0xe8) getsockopt$sock_linger(r0, 0x1, 0xd, &(0x7f0000001940), &(0x7f0000001980)=0x8) r2 = open(&(0x7f0000001a00)='./file0\x00', 0x8000, 0x122) r3 = openat$cgroup_ro(r2, &(0x7f00000019c0)='cpuacct.usage_user\x00', 0x0, 0x0) setsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x22, &(0x7f0000001600)={{{@in6=@mcast1={0xff, 0x1, [], 0x1}, @in6=@loopback={0x0, 0x1}, 0x4e23, 0x3, 0x4e00, 0x100000001, 0xa, 0x80, 0x80, 0x0, 0x0, r1}, {0x401, 0x4, 0x10000, 0x2, 0xfffffffffffffffd, 0x4, 0x9, 0xf7c2}, {0x503, 0x1000, 0x0, 0x9}, 0x0, 0x6e6bb6, 0x0, 0x0, 0x1, 0xfffffffffffffffc}, {{@in6=@mcast2={0xff, 0x2, [], 0x1}, 0x4d2, 0xff}, 0xa, @in=@multicast2=0xe0000002, 0x3501, 0x100000000, 0x2, 0x1, 0x6, 0x4, 0xfffffffeffffffff}}, 0xe8) setsockopt$inet6_MRT6_ADD_MIF(r0, 0x29, 0xca, &(0x7f0000001800)={0x6, 0x0, 0x401, 0x10001, 0x6}, 0xc) sendto$inet(r3, &(0x7f00000004c0)="3474534eee10634deafed53d37050576cd0f8bcfe63b5b4fbe7f39e8733a415731e1fb917d50ea52d1754e5390aa08a1b29cfbbc863b8c272a5ccb66ae92e5730624b008968638d4db0774cdb880e400835239428dc273ce8f02539f77d44e22ec616bafb5faf2c13dee249dd4aae6b272a351e5203ac533b3322146a3cf5e8f489d6694046bf338db512b6271e9c4a87e8cd8418e6f79f10b1a01b228877a", 0x9f, 0x4000, &(0x7f0000000180)={0x2, 0x4e21, @multicast2=0xe0000002}, 0x10) ioctl$EVIOCGSND(r3, 0x8040451a, &(0x7f0000001ac0)=""/203) readv(r0, &(0x7f00000015c0)=[{&(0x7f0000000580)=""/29, 0x1d}, {&(0x7f00000005c0)=""/4096, 0x1000}], 0x2) syz_genetlink_get_family_id$ipvs(&(0x7f0000001740)='IPVS\x00') sendmsg$IPVS_CMD_FLUSH(r3, &(0x7f0000001880)={&(0x7f0000001700)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f0000001840)={&(0x7f0000001c00)=ANY=[@ANYBLOB="8800000a774aaaf56eea7deaa2e50088252f2f60df49f4d67703da70ac6d452ab2921c93a01ae9286becc626e66db63ec7845617adcd8ae431d1475e1ebde1ab19745d1bce383ebeaf654be9e90e40184e01b13ddc984faa5311b767e8d7ab544d"], 0x1}, 0x1, 0x0, 0x0, 0x40800}, 0x44000) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f00000003c0)={{{@in6=@remote={0xfe, 0x80, [], 0xbb}, @in=@loopback=0x7f000001, 0x4e21, 0x4, 0x4e22, 0x0, 0xa, 0x0, 0x80, 0x11, 0x0, r1}, {0x0, 0xfff, 0x19, 0x4, 0xff, 0x80000001, 0x6, 0x9}, {0x0, 0x8, 0xcce8, 0xfffffffffffffffe}, 0x0, 0x6e6bb7, 0x0, 0x1}, {{@in6=@remote={0xfe, 0x80, [], 0xbb}, 0x4d5, 0x3f}, 0xa, @in=@loopback=0x7f000001, 0x0, 0x1, 0x1, 0x9, 0x80000000, 0x7}}, 0xe8) fcntl$getownex(r0, 0x10, &(0x7f0000001780)={0x0, 0x0}) fcntl$setown(r3, 0x8, r4) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f00000001c0)={{{@in6=@remote={0xfe, 0x80, [], 0xbb}, @in=@multicast2=0xe0000002, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {0x1000}, 0x0, 0x0, 0x1}, {{@in6=@loopback={0x0, 0x1}, 0x0, 0x2b}, 0x0, @in6, 0x0, 0x1, 0x0, 0x9}}, 0xe8) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @mcast2={0xff, 0x2, [], 0x1}, 0x4}, 0x1c) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDRS(0xffffffffffffff9c, 0x84, 0x6c, &(0x7f0000001d00)=ANY=[@ANYRES32=0x0, @ANYBLOB="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"], &(0x7f0000000140)=0x2) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r2, 0x84, 0x6f, &(0x7f0000002d40)={r5, 0x58, &(0x7f0000001a40)=[@in={0x2, 0x4e20, @remote={0xac, 0x14, 0x14, 0xbb}}, @in6={0xa, 0x4e22, 0x0, @mcast2={0xff, 0x2, [], 0x1}, 0x20}, @in6={0xa, 0x4e24, 0x21812f54, @dev={0xfe, 0x80, [], 0xf}, 0xf3}, @in={0x2, 0x4e23, @multicast1=0xe0000001}]}, &(0x7f0000002d80)=0x10) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback={0x0, 0x1}, 0x800}, 0x1c) readv(r0, &(0x7f0000001bc0)=[{&(0x7f0000001800)}], 0x1) lseek(0xffffffffffffffff, 0x4, 0x4) 2018/03/30 19:42:55 executing program 1: r0 = syz_open_dev$amidi(&(0x7f0000000040)='/dev/amidi#\x00', 0x3, 0x28000) ioctl$DRM_IOCTL_RES_CTX(r0, 0xc0086426, &(0x7f0000000100)={0x2c, &(0x7f00000000c0)=[{}, {}, {}, {}, {}, {}, {}, {}]}) socket$netlink(0x10, 0x3, 0xc) writev(0xffffffffffffffff, &(0x7f00000021c0), 0x0) bind$bt_l2cap(r0, &(0x7f0000000340)={0x1f, 0x800000000000002, {0x401, 0x3, 0xb, 0x3f8}}, 0x9) socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f0000a8d000)={&(0x7f0000c78ff4)={0x10}, 0xc, &(0x7f0000df6000)={&(0x7f0000000200)=ANY=[@ANYBLOB="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"], 0x10f}, 0x1}, 0x0) r1 = socket$inet_sctp(0x2, 0x5, 0x84) sendmsg$inet_sctp(0xffffffffffffffff, &(0x7f0000001f00)={&(0x7f0000001840)=@in={0x2, 0x0, @dev={0xac, 0x14, 0x14}}, 0x10, &(0x7f0000001c40)=[{&(0x7f0000001880)='[', 0x1}], 0x1, &(0x7f0000001e40)}, 0x40) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000540)=@nat={'nat\x00', 0x19, 0x3, 0x376, [0x20000140, 0x0, 0x0, 0x20000170, 0x200002d0], 0x0, &(0x7f0000000100), &(0x7f00000006c0)=ANY=[@ANYBLOB="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"]}, 0x3ee) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000002980)) getsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(0xffffffffffffffff, 0x84, 0x1f, &(0x7f0000000440)={0x0, @in={{0x2, 0x4e22, @multicast2=0xe0000002}}, 0x7bb7, 0x4}, &(0x7f0000000500)=0x90) getsockopt$inet_sctp_SCTP_RTOINFO(0xffffffffffffffff, 0x84, 0x0, &(0x7f0000002240)={0x0, 0x9, 0x417}, &(0x7f00000001c0)=0x10) r2 = socket(0x22, 0x4, 0x3) r3 = socket(0x20000001e, 0x5, 0x0) r4 = perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$packet_tx_ring(r3, 0x10f, 0x87, &(0x7f0000265000)=@req={0x3fc, 0x0, 0x1}, 0x10) getegid() setsockopt$packet_tx_ring(r2, 0x10f, 0x87, &(0x7f0000265000)=@req={0x3fc, 0x0, 0x1}, 0x10) writev(r2, &(0x7f00000000c0)=[{&(0x7f0000000000)="8a", 0x1}], 0x1) close(r2) close(r3) perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r5 = syz_open_dev$evdev(&(0x7f0000dfdfee)='/dev/input/event#\x00', 0x0, 0x2) readv(r5, &(0x7f0000019fe0)=[{&(0x7f00008ec000)=""/219, 0xdb}], 0x1) write$evdev(r5, &(0x7f000004d000)=[{{}, 0x0, 0x1}, {{0x2}}], 0x30) r6 = getpgrp(0x0) setsockopt$ax25_int(r3, 0x101, 0xd, &(0x7f0000000080)=0x7, 0x4) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x8, 0xfffffffffffffffd, 0x9, 0x7, 0x0, 0x8001, 0x0, 0x6, 0x3ff, 0x4, 0x5, 0x4, 0xbd9, 0x56, 0x8000, 0x7f, 0xff, 0xeba, 0x1f, 0x0, 0xfd, 0x3, 0x1, 0x50, 0x7, 0x9, 0x641800, 0x3ff8000000000000, 0x4, 0x0, 0x10000, 0x5, 0x7, 0x6, 0x1, 0xffffffffffffffe0, 0x0, 0x20, 0x0, @perf_bp={&(0x7f0000000040), 0x8}, 0x20, 0x401, 0x8, 0x3, 0x8, 0x7, 0x7}, r6, 0xc, r4, 0x0) syz_genetlink_get_family_id$ipvs(&(0x7f0000000040)='IPVS\x00') 2018/03/30 19:42:55 executing program 4: symlinkat(&(0x7f0000002f00)='./file0\x00', 0xffffffffffffffff, &(0x7f0000002f80)='./file0\x00') syz_mount_image$msdos(&(0x7f0000002fc0)='msdos\x00', &(0x7f0000003000)='./file0\x00', 0x4, 0x1, &(0x7f0000003180)=[{&(0x7f0000003040)="eaf9610c9f7031a1f58e51e73b3f0bd5af4364c38bbe335dbd3d211ec0338ba4c795c634af757a3c684da6110f67891133a6303441b21d139e3a6582efdaeabd3d68dbcb85cd383733a98084b62807af0b7ea49d68daa4cc9fda43dbeb13c3e67c44c463a2c429ccb66c0e1a9dfd5c911d4d7b578baaad6571d4457b9c6d92122a4bd97f5f174c81081941b007062f2cab2db1466851dde671e025909a633fec433bb2512fc61c436b74df23d280019a403884dc488071", 0xb7, 0xcd7}], 0x8, &(0x7f00000031c0)={[{@errors_continue='errors=continue', 0x2c}, {@time_offset={'time_offset', 0x3d, [0x0]}, 0x2c}]}) pipe(&(0x7f0000002f40)={0xffffffffffffffff}) r1 = open(&(0x7f0000003240)='./file0\x00', 0xa0001, 0x20) linkat(r0, &(0x7f0000003200)='./file0\x00', r1, &(0x7f0000003280)='./file0\x00', 0x400) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x80000, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)}, {&(0x7f0000010d00)="0000000000000000000000000000000000000000000000000000000002ae0000ed41000000040000d15bbe5ad15bbe5ad15bbe5a00000000000005002000000000000800070000000af301000400000000000000000000000100000030000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a1950000", 0xa0, 0x8c60}, {&(0x7f0000011a00)="020000000c0001022e000000020000000c0002022e2e00000b00000014000a026c6f73742b666f756e6400000c0000001000050166696c65300000000d0000001000050266696c65310000000f0000001000050166696c6532000000100000001000050166696c6533000000110000001000050166696c65340000001200000010000802564944454f5f54531400000068031201d181d18ed0b7d0bad0b0d0bbd0bbd0b5d1800000000000000000000000000000000000000000000000000000", 0xc0, 0xc000}, {&(0x7f0000012200)="0000000000000000000000000000000000000000000000000c0000dec910dfd800000000f4030000000000000000000000000000000000000000000000000000", 0x40, 0x117e0}, {&(0x7f0000012a00)="0d0000000c0001022e000000020000000c0002022e2e00000e000000dc03050166696c6530000000000000000000000000000000000000000000000000000000", 0x40, 0x1c000}], 0x0, &(0x7f0000013000)) syz_mount_image$bfs(&(0x7f0000000040)='bfs\x00', &(0x7f00000008c0)='./file0\x00', 0x20, 0x2, &(0x7f0000000180)=[{&(0x7f00000005c0)="f37e57346e86cb5adec662d7bd6f13a3764d2ca7640f9f81ba88d0689d0989735a7bafd5558d9a6e8988f9f6038fa475e49077bc8cfc6e170c4cdbaaa1375895c9a4068559d3cecf2a0423caa696bf77a75b3ae3f32b79da059ca13d055647998987fc2033d008bd55deb08808372b9b4595fb0d79a1358cd5949d859a7d155e86db4b608eb401109f6b792f5ce4a2ead9870dee49347bc08d0d54b0e4fca4fd895947a737f4ee823d997770e5c9df50c0c9fe2c0b945c6ffd13b7151e385b631520ac34a5967c6cd0d12b3746795681600541c17d379daed41ce8e715eba582fb668e160872a2", 0xe7, 0x7}, {&(0x7f0000000780)="6154d093a5a905da96fed5f8dea36bcd9d1d011246f7caf86806bf6ac6301d2d2b448461b867bbbe7d0eebdeafa16d7219af85ff4372670039ce277546def59f1d0eed4be4386a34c7243fe3ec84ad3807136a2c3ec35d6d87a7d7bb9342622cc3a7ff529ef3d76ff57fc7a1856f50b98e518515a9e679067cfc0e8500754fa30a81cf4dc42c5a0d36647280c5b0a8506efaf9ad06594678176efe4bdbcf7ab384b597df4c5ad66b2bd240823abe04cd30785819f1c7fd4d46bb55f8bd09ca4b44618b010e363fa572ca189ec73b36ad46b6f38d65c0acc417", 0xd9, 0x5}], 0x200000, 0x0) syz_mount_image$jfs(&(0x7f0000000080)='jfs\x00', &(0x7f0000000880)='./file0\x00', 0xfffffffffffffffe, 0x3, &(0x7f0000002dc0)=[{&(0x7f0000000900)="efee47debce411554253d03f2175c060de26b9a7a197d9327971105aafdf17a061227fe7dd52d3c1c1f0318992f304f7646c3eb4e32ff0514d34d4605b4e152474aa71ac6c0ba890b1f249f213d5bc162b605fdf3c524d6f84e1a2f8461d26ef5dd50b193ffb710ee69fc431552ae4548f0c1a7e503243bb10c53c566f37e3234d8b3d418992dca946568d275e1f54895a854bab3790963108fe6ce5b1f933e81bd0aa2dfd715aca4bd81b48b28e3ee265", 0xb1, 0x1}, {&(0x7f0000001a80)="b4bc90ad72742e5693f04c7955b05460b33cd0ca9cde365dbe1671162a8c1db744cb8a04d1d747ab4d3234fd615e6ad897396c21b8bf7da2c1d524d04fadade841e5acfac529250a2c75fed4b65a7b6c8735268244189e020c526112728097958fd591d00cd16d1591db9b0414d985d7718794369eb03d89403b7df76f6d745c94d4fa986321a9915fea55a73472bc39620fcf22ec74d02b77fafe6ccf72605eb0ba7ae69fa10a36d281e65a178528bc654ce5b6109d5294e400b18be755a3b899489b27a876ac3ea033ed525b28c7dff537b5210cbff466dc339e1f58db1679816589e886264ef1bcf6d0e1408d93946827711972", 0xf5, 0x7}, {&(0x7f0000002cc0)="c9bc1928c9ffffe99fdae39f5013810a038f1d558affc92341c81ee308195dabd95fcfedcfccd4cf2af62477e5ed935114b73940dba239c47d5824a3332fb48cea682934a6840ea5db2529c3a7c371bbf08f08bb15458de586609be64b699f29b7384dc7b2ba78f0e343fb9851eaf5a7b4106fc5b7a8aaf6e069012286fa7259807928cbee722222f45e6c98cefa00829bcdd92bd03273c7b0f20453c72150adf49c311248d3d3d96ad17187d60add3d1d8fbfbc5e572ceba134e5c533a5f75630a35514ee998b85a755085c04513dcc0047461d78f4aa8fdf0309fc39e3e4a1c24b4538acbf2366feaf", 0xea}], 0x10000, &(0x7f0000002ec0)={[{@nodiscard='nodiscard', 0x2c}, {@resize='resize', 0x2c}, {@noquota='noquota', 0x2c}, {@umask={'umask', 0x3d, [0x3f]}, 0x2c}]}) 2018/03/30 19:42:55 executing program 0: r0 = socket$inet(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000004000)=[{&(0x7f000000f000)="240000001a00030207fffd946fa283bc04eee6d87986c49727008568b51ba3a2d188737e", 0x24}], 0x1}, 0x0) recvmsg(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000fc0), 0x0, &(0x7f000000cf80)=""/128, 0x80}, 0x0) syz_open_dev$sg(&(0x7f0000000200)='/dev/sg#\x00', 0x7, 0x0) ioctl$LOOP_SET_FD(0xffffffffffffffff, 0x4c00, r0) recvmsg(r0, &(0x7f0000000540)={&(0x7f0000000040)=@pppol2tpv3in6={0x0, 0x0, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, @ipv4={[], [], @local}}}}, 0x80, &(0x7f0000000400), 0x0, &(0x7f00000004c0)=""/120, 0x78, 0x401}, 0x0) ioctl$sock_ifreq(0xffffffffffffffff, 0x8916, &(0x7f00000000c0)={'tunl0\x00', @ifru_ivalue}) fcntl$dupfd(0xffffffffffffffff, 0x406, 0xffffffffffffff9c) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup.net\x00', 0x200002, 0x0) fchdir(r1) ioctl$SNDRV_SEQ_IOCTL_GET_SUBSCRIPTION(0xffffffffffffffff, 0xc0505350, &(0x7f0000001800)={{0x3f}, {0x0, 0x80000001}, 0x5ad9, 0x2, 0x4}) creat(&(0x7f0000000080)='./file0\x00', 0x0) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(0xffffffffffffffff, 0x4040534e, &(0x7f0000000440)={0x11, @tick=0x800, 0x2, {0x0, 0x10000}, 0x9, 0x1, 0x100000000000}) epoll_pwait(0xffffffffffffffff, &(0x7f00000000c0)=[{}], 0x1, 0x0, &(0x7f00000002c0)={0xe9}, 0x8) openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000001c0)='./cgroup.cpu\x00', 0x200002, 0x0) r2 = creat(&(0x7f0000000500)='./file2\x00', 0x80) write$cgroup_pid(0xffffffffffffffff, &(0x7f0000000100)=ANY=[], 0x1023c) syz_open_dev$sg(&(0x7f0000000140)='/dev/sg#\x00', 0x5, 0x800) getsockopt$inet_sctp_SCTP_INITMSG(0xffffffffffffffff, 0x84, 0x2, &(0x7f0000000180), &(0x7f00000001c0)=0x8) mkdir(&(0x7f0000042ff6)='./control\x00', 0x0) r3 = inotify_init() creat(&(0x7f0000fc7000)='./control/file0\x00', 0x0) r4 = inotify_init1(0x0) inotify_add_watch(r3, &(0x7f0000000040)='./control\x00', 0x81000000) inotify_add_watch(r4, &(0x7f0000c31000)='./control\x00', 0x86000006) creat(&(0x7f0000000000)='./control/file0\x00', 0x0) openat(0xffffffffffffff9c, &(0x7f0000000280)='./control/file1\x00', 0x40, 0x0) getsockname$packet(r2, &(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @link_local}, &(0x7f0000001780)=0x14) ioctl$int_in(0xffffffffffffffff, 0x0, &(0x7f0000001880)=0x1000) 2018/03/30 19:42:55 executing program 5: perf_event_open(&(0x7f000001d000)={0x2, 0x78, 0xe2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000000)={0x6, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0xa, 0x1, 0x0) ioctl(r0, 0x8982, &(0x7f0000000000)) r1 = socket$packet(0x11, 0x0, 0x300) r2 = openat$cuse(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/cuse\x00', 0x82, 0x0) io_setup(0x43f, &(0x7f00000000c0)=0x0) io_submit(r3, 0x1, &(0x7f0000000000)=[&(0x7f0000000200)={0x0, 0x0, 0x0, 0x1, 0x0, r2, &(0x7f0000000040)="10000000020400000000000000000000", 0x10}]) r4 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000280)='/proc/sys/net/ipv4/vs/secure_tcp\x00', 0x2, 0x0) sendmsg$kcm(r4, &(0x7f0000001f00)={&(0x7f0000001b40)=@pppol2tpin6={0x18, 0x1, {0x0, r1, 0x0, 0x1, 0x0, 0x0, {0xa, 0x4e24, 0xc1, @mcast1={0xff, 0x1, [], 0x1}}}}, 0x80, &(0x7f0000001d80)=[{&(0x7f0000001bc0)="a9db123ebf124fab0f2eec9774559e3b5870fb7c6818fc89c4b8742d057480657265ae2b34fb2d4e585d22ca1bf7b0a22ce38a20a819d919947c78f8d5c9f3291905fd3ed2b8ef8a79d9453396c6b0b7eb0778dbc49b32ae91e443b64edddcf320c1589c7777eadd4e57c01b20a8ca7a831e8e2c104d0194d52fb5c35b550f", 0x7f}], 0x1, &(0x7f0000001dc0)=ANY=[], 0x0, 0x90}, 0x20000000) r5 = syz_open_dev$tun(&(0x7f00000001c0)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r5, 0x400454ca, &(0x7f0000000200)={'bridge0\x00\x00p\x00', 0x4000000000001005}) socketpair(0x1d, 0x3, 0x40, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_inet_SIOCSIFADDR(r6, 0x8916, &(0x7f0000000100)={'bridge8\x00', {0x2, 0x0, @dev={0xac, 0x14, 0x14}}}) ioctl$LOOP_SET_FD(r2, 0x4c00, r1) ioctl$SNDRV_SEQ_IOCTL_RUNNING_MODE(0xffffffffffffffff, 0xc0105303, &(0x7f00000002c0)={0x2, 0x8}) add_key$keyring(&(0x7f00000000c0)='keyring\x00', &(0x7f0000000100)={0x73, 0x79, 0x7a}, 0x0, 0x0, 0x0) clone(0x0, &(0x7f0000000040), &(0x7f0000000080), &(0x7f0000000000), &(0x7f0000000100)) ioctl$int_in(0xffffffffffffffff, 0x800000c004500a, &(0x7f0000006ff8)) wait4(0x0, 0x0, 0x4, &(0x7f0000000380)) ioctl$sock_inet_sctp_SIOCINQ(r7, 0x541b, &(0x7f0000000180)) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_PORT(0xffffffffffffffff, 0xc0a85352, &(0x7f0000001980)={{}, 'port1\x00', 0x0, 0x20010, 0x1f, 0x0, 0x3, 0x40, 0x0, 0x0, 0x4, 0x6d1}) 2018/03/30 19:42:55 executing program 7: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f000099e000)={0x2, 0x4e20, @multicast1=0xe0000001}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000af5000)='illinois\x00', 0x9) getsockopt$inet_tcp_buf(r0, 0x6, 0x1a, &(0x7f0000000000)=""/177, &(0x7f0000000100)=0xb1) [ 494.690885] FAT-fs (loop4): Unrecognized mount option "time_offset=" or missing value [ 494.711199] kernel msg: ebtables bug: please report to author: EBT_ENTRY_OR_ENTRIES shouldn't be set in distinguisher 2018/03/30 19:42:55 executing program 6: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_mreqn(r0, 0x0, 0x27, &(0x7f0000000000)={@multicast2=0xe0000002, @loopback=0x7f000001}, 0xc) getsockopt$inet_sctp6_SCTP_FRAGMENT_INTERLEAVE(0xffffffffffffffff, 0x84, 0x12, &(0x7f0000000080), &(0x7f00000000c0)=0x4) ioctl$sock_inet_SIOCGIFDSTADDR(0xffffffffffffffff, 0x8917, &(0x7f0000000040)={'bcsh0\x00', {0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x1a}}}) setsockopt$inet_sctp6_SCTP_MAX_BURST(0xffffffffffffffff, 0x84, 0x14, &(0x7f0000000380)=@int=0x3, 0x4) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000140)={'bcsh0\x00', 0x0}) ioctl$sock_inet6_SIOCDELRT(0xffffffffffffffff, 0x890c, &(0x7f0000000180)={@dev={0xfe, 0x80, [], 0x13}, @loopback={0x0, 0x1}, @mcast2={0xff, 0x2, [], 0x1}, 0x6, 0x0, 0x42e, 0x100, 0x9, 0x80000000, r1}) r2 = socket$inet(0x2, 0xa, 0x5) setsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX(r2, 0x84, 0x6e, &(0x7f0000000600)=[@in={0x2, 0x4e21, @multicast1=0xe0000001}, @in6={0xa, 0x4e20, 0x0, @remote={0xfe, 0x80, [], 0xbb}}, @in={0x2, 0x4e22, @multicast2=0xe0000002}, @in6={0xa, 0x4e21, 0x1ff, @local={0xfe, 0x80, [], 0xaa}, 0x84}, @in6={0xa, 0x4e20, 0x4, @local={0xfe, 0x80, [], 0xaa}}], 0x74) getsockopt$inet_sctp6_SCTP_PR_SUPPORTED(0xffffffffffffffff, 0x84, 0x71, &(0x7f0000000200)={0x0, 0x8}, &(0x7f0000000240)=0x8) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(0xffffffffffffffff, 0x84, 0x6f, &(0x7f0000000300)={r3, 0x60, &(0x7f0000000280)=[@in={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x12}}, @in={0x2, 0x4e24, @loopback=0x7f000001}, @in={0x2, 0x0, @remote={0xac, 0x14, 0x14, 0xbb}}, @in={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x1a}}, @in={0x2, 0x4e24, @remote={0xac, 0x14, 0x14, 0xbb}}, @in={0x2, 0x4e24, @rand_addr=0x3ff}]}, &(0x7f0000000340)=0x10) setsockopt$inet_sctp6_SCTP_SET_PEER_PRIMARY_ADDR(0xffffffffffffffff, 0x84, 0x5, &(0x7f00000004c0)={r4, @in={{0x2, 0x4e20, @rand_addr=0x8}}}, 0x84) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, &(0x7f00000003c0)={'lo\x00', 0x4100}) ioctl$sock_inet_SIOCGIFNETMASK(0xffffffffffffffff, 0x891b, &(0x7f0000000100)={'nr0\x00', {0x2, 0x4e24, @loopback=0x7f000001}}) setsockopt$inet_msfilter(r0, 0x0, 0x29, &(0x7f0000000680)=ANY=[@ANYBLOB="cf0000000276d172390cc8c4ff4f3b746e5947c2ddb66a93ebb6d0f75b5f453435c311b94e126c49d47c10682b6e523d09fae1d416ebface98e08aa083e9f1f1afa118eb05655fec48d75d7a37edd032552c60ffeb53a2c8eecbe601a4ac5dceeecf1a943c2d9e2eaf4ad0a93e82a1a37a0cf2adbc4b512680428fee922ad18ff90ec6f87a75b299a953167bf4f9ae31cffd2c31dd47ba7d69151424dc1b2835f7624a302f270eb89118043dc1e1faa46e667be9cbf4456ad0c580ed032e4e49459f68f8a70f2dfe40f51362ffae"], 0x1) pread64(r0, &(0x7f0000000340)=""/181, 0xb5, 0x62) setsockopt$inet_msfilter(r0, 0x0, 0x29, &(0x7f0000000580)=ANY=[@ANYBLOB="e00000027f0000010000000001000000000000006b59aa51deb20d6efc9c04b7c9420f6434d31cbbe99b52873a8c21"], 0x1) socket$inet_udp(0x2, 0x2, 0x0) bpf$BPF_PROG_GET_NEXT_ID(0xb, &(0x7f0000000400)=0x7, 0x4) r5 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000ba4000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x2, 0x78, 0xe2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, r5, 0x0) r6 = perf_event_open(&(0x7f0000014f88)={0x1, 0x78, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00002e8000)}}, 0x0, 0x0, r5, 0x0) readv(r6, &(0x7f0000734000)=[{&(0x7f0000d42000)=""/146, 0x92}], 0x1) getsockopt$inet_sctp_SCTP_PEER_ADDR_THLDS(0xffffffffffffffff, 0x84, 0x1f, &(0x7f0000000480)={0x0, @in={{0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0xd}}}, 0xf80866d, 0x5}, &(0x7f0000000540)=0x90) getsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(0xffffffffffffff9c, 0x84, 0x18, &(0x7f0000000440)={r7, 0x400000000004}, &(0x7f00000005c0)=0xffffffffffffffc3) getsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER_VALUE(r0, 0x84, 0x7c, &(0x7f00000002c0)={r8, 0x10001, 0xc9e9}, &(0x7f0000000300)=0x8) 2018/03/30 19:42:55 executing program 5: perf_event_open(&(0x7f000001d000)={0x2, 0x78, 0xe2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000000)={0x6, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0xa, 0x1, 0x0) ioctl(r0, 0x8982, &(0x7f0000000000)) r1 = socket$packet(0x11, 0x0, 0x300) r2 = openat$cuse(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/cuse\x00', 0x82, 0x0) io_setup(0x43f, &(0x7f00000000c0)=0x0) io_submit(r3, 0x1, &(0x7f0000000000)=[&(0x7f0000000200)={0x0, 0x0, 0x0, 0x1, 0x0, r2, &(0x7f0000000040)="10000000020400000000000000000000", 0x10}]) r4 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000280)='/proc/sys/net/ipv4/vs/secure_tcp\x00', 0x2, 0x0) sendmsg$kcm(r4, &(0x7f0000001f00)={&(0x7f0000001b40)=@pppol2tpin6={0x18, 0x1, {0x0, r1, 0x0, 0x1, 0x0, 0x0, {0xa, 0x4e24, 0xc1, @mcast1={0xff, 0x1, [], 0x1}}}}, 0x80, &(0x7f0000001d80)=[{&(0x7f0000001bc0)="a9db123ebf124fab0f2eec9774559e3b5870fb7c6818fc89c4b8742d057480657265ae2b34fb2d4e585d22ca1bf7b0a22ce38a20a819d919947c78f8d5c9f3291905fd3ed2b8ef8a79d9453396c6b0b7eb0778dbc49b32ae91e443b64edddcf320c1589c7777eadd4e57c01b20a8ca7a831e8e2c104d0194d52fb5c35b550f", 0x7f}], 0x1, &(0x7f0000001dc0)=ANY=[], 0x0, 0x90}, 0x20000000) r5 = syz_open_dev$tun(&(0x7f00000001c0)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r5, 0x400454ca, &(0x7f0000000200)={'bridge0\x00\x00p\x00', 0x4000000000001005}) socketpair(0x1d, 0x3, 0x40, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_inet_SIOCSIFADDR(r6, 0x8916, &(0x7f0000000100)={'bridge8\x00', {0x2, 0x0, @dev={0xac, 0x14, 0x14}}}) ioctl$LOOP_SET_FD(r2, 0x4c00, r1) ioctl$SNDRV_SEQ_IOCTL_RUNNING_MODE(0xffffffffffffffff, 0xc0105303, &(0x7f00000002c0)={0x2, 0x8}) add_key$keyring(&(0x7f00000000c0)='keyring\x00', &(0x7f0000000100)={0x73, 0x79, 0x7a}, 0x0, 0x0, 0x0) clone(0x0, &(0x7f0000000040), &(0x7f0000000080), &(0x7f0000000000), &(0x7f0000000100)) ioctl$int_in(0xffffffffffffffff, 0x800000c004500a, &(0x7f0000006ff8)) wait4(0x0, 0x0, 0x4, &(0x7f0000000380)) ioctl$sock_inet_sctp_SIOCINQ(r7, 0x541b, &(0x7f0000000180)) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_PORT(0xffffffffffffffff, 0xc0a85352, &(0x7f0000001980)={{}, 'port1\x00', 0x0, 0x20010, 0x1f, 0x0, 0x3, 0x40, 0x0, 0x0, 0x4, 0x6d1}) [ 494.745073] EXT4-fs (loop4): VFS: Can't find ext4 filesystem [ 494.769701] BFS-fs: bfs_fill_super(): No BFS filesystem on loop4 (magic=00000000) 2018/03/30 19:42:55 executing program 7: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f000099e000)={0x2, 0x4e20, @multicast1=0xe0000001}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000af5000)='illinois\x00', 0x9) getsockopt$inet_tcp_buf(r0, 0x6, 0x1a, &(0x7f0000000000)=""/177, &(0x7f0000000100)=0xb1) [ 494.812304] jfs: Unrecognized mount option "umask=?" or missing value 2018/03/30 19:42:55 executing program 4: symlinkat(&(0x7f0000002f00)='./file0\x00', 0xffffffffffffffff, &(0x7f0000002f80)='./file0\x00') syz_mount_image$msdos(&(0x7f0000002fc0)='msdos\x00', &(0x7f0000003000)='./file0\x00', 0x4, 0x1, &(0x7f0000003180)=[{&(0x7f0000003040)="eaf9610c9f7031a1f58e51e73b3f0bd5af4364c38bbe335dbd3d211ec0338ba4c795c634af757a3c684da6110f67891133a6303441b21d139e3a6582efdaeabd3d68dbcb85cd383733a98084b62807af0b7ea49d68daa4cc9fda43dbeb13c3e67c44c463a2c429ccb66c0e1a9dfd5c911d4d7b578baaad6571d4457b9c6d92122a4bd97f5f174c81081941b007062f2cab2db1466851dde671e025909a633fec433bb2512fc61c436b74df23d280019a403884dc488071", 0xb7, 0xcd7}], 0x8, &(0x7f00000031c0)={[{@errors_continue='errors=continue', 0x2c}, {@time_offset={'time_offset', 0x3d, [0x0]}, 0x2c}]}) pipe(&(0x7f0000002f40)={0xffffffffffffffff}) r1 = open(&(0x7f0000003240)='./file0\x00', 0xa0001, 0x20) linkat(r0, &(0x7f0000003200)='./file0\x00', r1, &(0x7f0000003280)='./file0\x00', 0x400) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x80000, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)}, {&(0x7f0000010d00)="0000000000000000000000000000000000000000000000000000000002ae0000ed41000000040000d15bbe5ad15bbe5ad15bbe5a00000000000005002000000000000800070000000af301000400000000000000000000000100000030000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a1950000", 0xa0, 0x8c60}, {&(0x7f0000011a00)="020000000c0001022e000000020000000c0002022e2e00000b00000014000a026c6f73742b666f756e6400000c0000001000050166696c65300000000d0000001000050266696c65310000000f0000001000050166696c6532000000100000001000050166696c6533000000110000001000050166696c65340000001200000010000802564944454f5f54531400000068031201d181d18ed0b7d0bad0b0d0bbd0bbd0b5d1800000000000000000000000000000000000000000000000000000", 0xc0, 0xc000}, {&(0x7f0000012200)="0000000000000000000000000000000000000000000000000c0000dec910dfd800000000f4030000000000000000000000000000000000000000000000000000", 0x40, 0x117e0}, {&(0x7f0000012a00)="0d0000000c0001022e000000020000000c0002022e2e00000e000000dc03050166696c6530000000000000000000000000000000000000000000000000000000", 0x40, 0x1c000}], 0x0, &(0x7f0000013000)) syz_mount_image$bfs(&(0x7f0000000040)='bfs\x00', &(0x7f00000008c0)='./file0\x00', 0x20, 0x2, &(0x7f0000000180)=[{&(0x7f00000005c0)="f37e57346e86cb5adec662d7bd6f13a3764d2ca7640f9f81ba88d0689d0989735a7bafd5558d9a6e8988f9f6038fa475e49077bc8cfc6e170c4cdbaaa1375895c9a4068559d3cecf2a0423caa696bf77a75b3ae3f32b79da059ca13d055647998987fc2033d008bd55deb08808372b9b4595fb0d79a1358cd5949d859a7d155e86db4b608eb401109f6b792f5ce4a2ead9870dee49347bc08d0d54b0e4fca4fd895947a737f4ee823d997770e5c9df50c0c9fe2c0b945c6ffd13b7151e385b631520ac34a5967c6cd0d12b3746795681600541c17d379daed41ce8e715eba582fb668e160872a2", 0xe7, 0x7}, {&(0x7f0000000780)="6154d093a5a905da96fed5f8dea36bcd9d1d011246f7caf86806bf6ac6301d2d2b448461b867bbbe7d0eebdeafa16d7219af85ff4372670039ce277546def59f1d0eed4be4386a34c7243fe3ec84ad3807136a2c3ec35d6d87a7d7bb9342622cc3a7ff529ef3d76ff57fc7a1856f50b98e518515a9e679067cfc0e8500754fa30a81cf4dc42c5a0d36647280c5b0a8506efaf9ad06594678176efe4bdbcf7ab384b597df4c5ad66b2bd240823abe04cd30785819f1c7fd4d46bb55f8bd09ca4b44618b010e363fa572ca189ec73b36ad46b6f38d65c0acc417", 0xd9, 0x5}], 0x200000, 0x0) syz_mount_image$jfs(&(0x7f0000000080)='jfs\x00', &(0x7f0000000880)='./file0\x00', 0xfffffffffffffffe, 0x3, &(0x7f0000002dc0)=[{&(0x7f0000000900)="efee47debce411554253d03f2175c060de26b9a7a197d9327971105aafdf17a061227fe7dd52d3c1c1f0318992f304f7646c3eb4e32ff0514d34d4605b4e152474aa71ac6c0ba890b1f249f213d5bc162b605fdf3c524d6f84e1a2f8461d26ef5dd50b193ffb710ee69fc431552ae4548f0c1a7e503243bb10c53c566f37e3234d8b3d418992dca946568d275e1f54895a854bab3790963108fe6ce5b1f933e81bd0aa2dfd715aca4bd81b48b28e3ee265", 0xb1, 0x1}, {&(0x7f0000001a80)="b4bc90ad72742e5693f04c7955b05460b33cd0ca9cde365dbe1671162a8c1db744cb8a04d1d747ab4d3234fd615e6ad897396c21b8bf7da2c1d524d04fadade841e5acfac529250a2c75fed4b65a7b6c8735268244189e020c526112728097958fd591d00cd16d1591db9b0414d985d7718794369eb03d89403b7df76f6d745c94d4fa986321a9915fea55a73472bc39620fcf22ec74d02b77fafe6ccf72605eb0ba7ae69fa10a36d281e65a178528bc654ce5b6109d5294e400b18be755a3b899489b27a876ac3ea033ed525b28c7dff537b5210cbff466dc339e1f58db1679816589e886264ef1bcf6d0e1408d93946827711972", 0xf5, 0x7}, {&(0x7f0000002cc0)="c9bc1928c9ffffe99fdae39f5013810a038f1d558affc92341c81ee308195dabd95fcfedcfccd4cf2af62477e5ed935114b73940dba239c47d5824a3332fb48cea682934a6840ea5db2529c3a7c371bbf08f08bb15458de586609be64b699f29b7384dc7b2ba78f0e343fb9851eaf5a7b4106fc5b7a8aaf6e069012286fa7259807928cbee722222f45e6c98cefa00829bcdd92bd03273c7b0f20453c72150adf49c311248d3d3d96ad17187d60add3d1d8fbfbc5e572ceba134e5c533a5f75630a35514ee998b85a755085c04513dcc0047461d78f4aa8fdf0309fc39e3e4a1c24b4538acbf2366feaf", 0xea, 0x4}], 0x0, &(0x7f0000002ec0)={[{@nodiscard='nodiscard', 0x2c}, {@resize='resize', 0x2c}, {@noquota='noquota', 0x2c}, {@umask={'umask', 0x3d, [0x3f]}, 0x2c}]}) 2018/03/30 19:42:55 executing program 7: r0 = socket$inet_tcp(0x2, 0x1, 0x0) sendto$inet(r0, &(0x7f0000de1fff), 0xfffffffffffffd43, 0x20008005, &(0x7f0000db4ff0)={0x2, 0x4e20, @loopback=0x7f000001}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000af5000)='illinois\x00', 0x9) getsockopt$inet_tcp_buf(r0, 0x6, 0x1a, &(0x7f0000000000)=""/177, &(0x7f0000000100)=0xb1) 2018/03/30 19:42:55 executing program 6: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_mreqn(r0, 0x0, 0x27, &(0x7f0000000000)={@multicast2=0xe0000002, @loopback=0x7f000001}, 0xc) getsockopt$inet_sctp6_SCTP_FRAGMENT_INTERLEAVE(0xffffffffffffffff, 0x84, 0x12, &(0x7f0000000080), &(0x7f00000000c0)=0x4) ioctl$sock_inet_SIOCGIFDSTADDR(0xffffffffffffffff, 0x8917, &(0x7f0000000040)={'bcsh0\x00', {0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x1a}}}) setsockopt$inet_sctp6_SCTP_MAX_BURST(0xffffffffffffffff, 0x84, 0x14, &(0x7f0000000380)=@int=0x3, 0x4) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000140)={'bcsh0\x00', 0x0}) ioctl$sock_inet6_SIOCDELRT(0xffffffffffffffff, 0x890c, &(0x7f0000000180)={@dev={0xfe, 0x80, [], 0x13}, @loopback={0x0, 0x1}, @mcast2={0xff, 0x2, [], 0x1}, 0x6, 0x0, 0x42e, 0x100, 0x9, 0x80000000, r1}) r2 = socket$inet(0x2, 0xa, 0x5) setsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX(r2, 0x84, 0x6e, &(0x7f0000000600)=[@in={0x2, 0x4e21, @multicast1=0xe0000001}, @in6={0xa, 0x4e20, 0x0, @remote={0xfe, 0x80, [], 0xbb}}, @in={0x2, 0x4e22, @multicast2=0xe0000002}, @in6={0xa, 0x4e21, 0x1ff, @local={0xfe, 0x80, [], 0xaa}, 0x84}, @in6={0xa, 0x4e20, 0x4, @local={0xfe, 0x80, [], 0xaa}}], 0x74) getsockopt$inet_sctp6_SCTP_PR_SUPPORTED(0xffffffffffffffff, 0x84, 0x71, &(0x7f0000000200)={0x0, 0x8}, &(0x7f0000000240)=0x8) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(0xffffffffffffffff, 0x84, 0x6f, &(0x7f0000000300)={r3, 0x60, &(0x7f0000000280)=[@in={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x12}}, @in={0x2, 0x4e24, @loopback=0x7f000001}, @in={0x2, 0x0, @remote={0xac, 0x14, 0x14, 0xbb}}, @in={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x1a}}, @in={0x2, 0x4e24, @remote={0xac, 0x14, 0x14, 0xbb}}, @in={0x2, 0x4e24, @rand_addr=0x3ff}]}, &(0x7f0000000340)=0x10) setsockopt$inet_sctp6_SCTP_SET_PEER_PRIMARY_ADDR(0xffffffffffffffff, 0x84, 0x5, &(0x7f00000004c0)={r4, @in={{0x2, 0x4e20, @rand_addr=0x8}}}, 0x84) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, &(0x7f00000003c0)={'lo\x00', 0x4100}) ioctl$sock_inet_SIOCGIFNETMASK(0xffffffffffffffff, 0x891b, &(0x7f0000000100)={'nr0\x00', {0x2, 0x4e24, @loopback=0x7f000001}}) setsockopt$inet_msfilter(r0, 0x0, 0x29, &(0x7f0000000680)=ANY=[@ANYBLOB="cf0000000276d172390cc8c4ff4f3b746e5947c2ddb66a93ebb6d0f75b5f453435c311b94e126c49d47c10682b6e523d09fae1d416ebface98e08aa083e9f1f1afa118eb05655fec48d75d7a37edd032552c60ffeb53a2c8eecbe601a4ac5dceeecf1a943c2d9e2eaf4ad0a93e82a1a37a0cf2adbc4b512680428fee922ad18ff90ec6f87a75b299a953167bf4f9ae31cffd2c31dd47ba7d69151424dc1b2835f7624a302f270eb89118043dc1e1faa46e667be9cbf4456ad0c580ed032e4e49459f68f8a70f2dfe40f51362ffae"], 0x1) pread64(r0, &(0x7f0000000340)=""/181, 0xb5, 0x62) setsockopt$inet_msfilter(r0, 0x0, 0x29, &(0x7f0000000580)=ANY=[@ANYBLOB="e00000027f0000010000000001000000000000006b59aa51deb20d6efc9c04b7c9420f6434d31cbbe99b52873a8c21"], 0x1) socket$inet_udp(0x2, 0x2, 0x0) bpf$BPF_PROG_GET_NEXT_ID(0xb, &(0x7f0000000400)=0x7, 0x4) r5 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000ba4000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x2, 0x78, 0xe2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, r5, 0x0) r6 = perf_event_open(&(0x7f0000014f88)={0x1, 0x78, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00002e8000)}}, 0x0, 0x0, r5, 0x0) readv(r6, &(0x7f0000734000)=[{&(0x7f0000d42000)=""/146, 0x92}], 0x1) getsockopt$inet_sctp_SCTP_PEER_ADDR_THLDS(0xffffffffffffffff, 0x84, 0x1f, &(0x7f0000000480)={0x0, @in={{0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0xd}}}, 0xf80866d, 0x5}, &(0x7f0000000540)=0x90) getsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(0xffffffffffffff9c, 0x84, 0x18, &(0x7f0000000440)={r7, 0x400000000004}, &(0x7f00000005c0)=0xffffffffffffffc3) getsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER_VALUE(r0, 0x84, 0x7c, &(0x7f00000002c0)={r8, 0x10001, 0xc9e9}, &(0x7f0000000300)=0x8) 2018/03/30 19:42:55 executing program 0: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000fdaff6)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000fd9ffc)=0x3) ioctl$TCFLSH(r0, 0x540b, 0x0) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x4000, 0x0) ioctl$TCFLSH(r0, 0x540b, 0x1) ioctl$TIOCNXCL(r0, 0x540d) memfd_create(&(0x7f0000000100)=']\x00', 0x0) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup.net\x00', 0x200002, 0x0) fchdir(r1) r2 = creat(&(0x7f0000000080)='./file0\x00', 0x0) write$cgroup_pid(r2, &(0x7f0000000100)=ANY=[], 0x1023c) ioctl$DRM_IOCTL_GEM_FLINK(0xffffffffffffffff, 0xc008640a, &(0x7f0000000000)) fallocate(r2, 0x0, 0x0, 0xffff) pipe(&(0x7f0000000040)={0xffffffffffffffff}) r4 = inotify_init1(0x0) r5 = open(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) dup2(r4, r5) getsockopt$inet_sctp_SCTP_DELAYED_SACK(r3, 0x84, 0x10, &(0x7f0000000240)=@sack_info={0x0, 0x9, 0x1}, &(0x7f0000000280)=0xc) add_key$keyring(&(0x7f00000004c0)='keyring\x00', &(0x7f0000000500)={0x73, 0x79, 0x7a, 0x0}, 0x0, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(0xffffffffffffffff, 0x84, 0x9, &(0x7f00000002c0)={r6, @in6={{0xa, 0x4e20, 0xffffffffffff2607, @mcast2={0xff, 0x2, [], 0x1}, 0x6}}, 0x0, 0x80, 0x8}, &(0x7f0000000380)=0x98) unshare(0x0) clone(0x0, &(0x7f0000b53000), &(0x7f000084effc), &(0x7f0000c35ffc), &(0x7f0000b3bfff)) ioprio_set$pid(0x0, 0x0, 0x0) pipe(&(0x7f0000000480)) setsockopt$inet_sctp6_SCTP_MAX_BURST(0xffffffffffffffff, 0x84, 0x14, &(0x7f0000000180)=@assoc_value, 0x8) socketpair$inet_sctp(0x2, 0x0, 0x84, &(0x7f0000000200)) exit_group(0x7) [ 494.930522] FAT-fs (loop4): Unrecognized mount option "time_offset=" or missing value [ 495.005393] EXT4-fs (loop4): VFS: Can't find ext4 filesystem [ 495.044797] BFS-fs: bfs_fill_super(): No BFS filesystem on loop4 (magic=00000000) [ 495.091379] jfs: Unrecognized mount option "umask=?" or missing value 2018/03/30 19:42:56 executing program 2: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) readv(0xffffffffffffffff, &(0x7f0000001480), 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f00003b9fdc)) readv(r0, &(0x7f0000001980)=[{&(0x7f00000018c0)=""/182, 0xb6}], 0x1) r1 = syz_open_pts(r0, 0x2) setsockopt$inet6_mtu(0xffffffffffffffff, 0x29, 0x17, &(0x7f0000000440)=0x5, 0x4) dup3(r1, r0, 0x0) write(r0, &(0x7f0000c34fff), 0xffffff0b) socket$inet(0x2, 0x0, 0x0) setsockopt$bt_l2cap_L2CAP_OPTIONS(0xffffffffffffffff, 0x6, 0x1, &(0x7f0000000380)={0xefa, 0x800, 0x0, 0x0, 0x9}, 0xc) 2018/03/30 19:42:56 executing program 3: ioctl$sock_FIOGETOWN(0xffffffffffffff9c, 0x8903, &(0x7f0000000100)=0x0) r1 = syz_open_procfs(r0, &(0x7f0000000240)='net/mcfilter6\x00') pread64(r1, &(0x7f0000000040)=""/8, 0x8, 0x1fffd) r2 = getpgid(0x0) ioctl$ASHMEM_GET_NAME(r1, 0x81007702, &(0x7f0000000500)=""/68) close(r1) seccomp(0x1, 0x0, &(0x7f0000c23fff)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0xffffffff}]}) mkdir(&(0x7f000063543e)='./file0\x00', 0x0) r3 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000001680)='/dev/sequencer\x00', 0x0, 0x0) getsockopt$inet_sctp6_SCTP_GET_LOCAL_ADDRS(0xffffffffffffff9c, 0x84, 0x6d, &(0x7f0000000580)=ANY=[@ANYRES32=0x0, @ANYBLOB="df0000007179f5f99a3171b71d845e1907c4a9bb612c0fe8253cb381877f7a399eeaa0b3d5f54f5b373baf591952ed278f38450112819b74afe4ae48a1d11deaea19919d50a64f1adf9ef6f1fd02008bf815308291ef776072bb952a7b3b46cf0a60515436204fdcd77077909a0e127bc600"], &(0x7f00000017c0)=0x2) r5 = request_key(&(0x7f00000002c0)='pkcs7_test\x00', &(0x7f0000000300)={0x73, 0x79, 0x7a, 0x1}, &(0x7f0000000340)='ramfs\x00', 0xfffffffffffffffe) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_REM(r3, 0x84, 0x65, &(0x7f0000000480)=[@in6={0xa, 0x4e23, 0x4, @local={0xfe, 0x80, [], 0xaa}, 0x7f}, @in6={0xa, 0x4e24, 0x4b35, @mcast2={0xff, 0x2, [], 0x1}, 0x8}, @in={0x2, 0x4e23, @local={0xac, 0x14, 0x14, 0xaa}}], 0x48) keyctl$get_security(0x11, r5, &(0x7f0000000380)=""/193, 0xc1) getsockopt$inet_sctp6_SCTP_AUTH_ACTIVE_KEY(0xffffffffffffffff, 0x84, 0x18, &(0x7f0000001800)={r4, 0x9}, &(0x7f0000001840)=0x8) mount(&(0x7f0000018000)='./file0\x00', &(0x7f0000a9eff8)='./file0\x00', &(0x7f00007fcffa)='ramfs\x00', 0x0, &(0x7f000000a000)) chroot(&(0x7f0000000080)='./file0\x00') chroot(&(0x7f0000001640)='./file0\x00') r7 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000600)='./cgroup/syz1\x00', 0x200002, 0x0) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000000780), &(0x7f00000007c0)=0xc) fstat(r1, &(0x7f0000001140)) getsockopt$inet_IP_XFRM_POLICY(r3, 0x0, 0x11, &(0x7f0000001280)={{{@in=@broadcast, @in=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast1}, 0x0, @in=@remote}}, &(0x7f0000001380)=0xe8) stat(&(0x7f00000013c0)='./file0\x00', &(0x7f0000001400)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$inet_IP_IPSEC_POLICY(r1, 0x0, 0x10, &(0x7f0000001480)={{{@in6=@remote, @in=@broadcast, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@loopback}, 0x0, @in=@multicast2}}, &(0x7f0000001580)=0xe8) r11 = getgid() getgroups(0x5, &(0x7f0000001600)=[0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0]) sendmsg$netlink(r7, &(0x7f00000016c0)={&(0x7f0000000700)=@proc={0x10, 0x0, 0x25dfdbfc, 0x8a00000}, 0xc, &(0x7f00000011c0)=[{&(0x7f0000000740)={0x10, 0x18, 0xe00, 0x70bd2d, 0x25dfdbfb}, 0x10}], 0x1, &(0x7f0000001980)=[@cred={0x20, 0x1, 0x2, r0, r8, r9}, @rights={0x28, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, r3, r3, r1, 0xffffffffffffffff]}, @cred={0x20, 0x1, 0x2, r2, r10, r11}, @rights={0x20, 0x1, 0x1, [r3, r3, 0xffffffffffffffff]}, @cred={0x20, 0x1, 0x2, r0, 0x0, r12}, @rights={0x18, 0x1, 0x1, [0xffffffffffffffff, r1]}, @rights={0x38, 0x1, 0x1, [r3, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, r7, 0xffffffffffffffff, r7, r3, r1]}], 0xf8, 0x20000000}, 0x4000) mount(&(0x7f0000adcff8)='./file0\x00', &(0x7f00009a2ff8)='./file0\x00', &(0x7f0000ab4000)='qnx6\x00', 0x2000002003002, 0x0) pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) pivot_root(&(0x7f00002f9ff8)='./file0\x00', &(0x7f0000576ff8)='./file0\x00') request_key(&(0x7f0000000180)='rxrpc_s\x00', &(0x7f00000001c0)={0x73, 0x79, 0x7a, 0x0}, &(0x7f0000000200)='./cgroup/syz1\x00', 0xfffffffffffffff8) mknodat(r13, &(0x7f0000000280)='./file0\x00', 0x0, 0x5e920037) getresuid(&(0x7f0000001740), &(0x7f0000001780), &(0x7f0000001ac0)) getpgid(0xffffffffffffffff) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000002200)) getsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(r1, 0x84, 0x1f, &(0x7f0000000640)={r6, @in6={{0xa, 0x4e22, 0x400000000000000, @dev={0xfe, 0x80, [], 0x18}, 0x9}}, 0x5, 0x7f}, &(0x7f0000000140)=0x90) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f00000027c0), &(0x7f0000002800)=0xc) 2018/03/30 19:42:56 executing program 1: r0 = syz_open_dev$amidi(&(0x7f0000000040)='/dev/amidi#\x00', 0x3, 0x28000) ioctl$DRM_IOCTL_RES_CTX(r0, 0xc0086426, &(0x7f0000000100)={0x2c, &(0x7f00000000c0)=[{}, {}, {}, {}, {}, {}, {}, {}]}) socket$netlink(0x10, 0x3, 0xc) writev(0xffffffffffffffff, &(0x7f00000021c0), 0x0) bind$bt_l2cap(r0, &(0x7f0000000340)={0x1f, 0x800000000000002, {0x401, 0x3, 0xb, 0x3f8}}, 0x9) socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f0000a8d000)={&(0x7f0000c78ff4)={0x10}, 0xc, &(0x7f0000df6000)={&(0x7f0000000200)=ANY=[@ANYBLOB="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"], 0x10f}, 0x1}, 0x0) r1 = socket$inet_sctp(0x2, 0x5, 0x84) sendmsg$inet_sctp(0xffffffffffffffff, &(0x7f0000001f00)={&(0x7f0000001840)=@in={0x2, 0x0, @dev={0xac, 0x14, 0x14}}, 0x10, &(0x7f0000001c40)=[{&(0x7f0000001880)='[', 0x1}], 0x1, &(0x7f0000001e40)}, 0x40) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000540)=@nat={'nat\x00', 0x19, 0x3, 0x376, [0x20000140, 0x0, 0x0, 0x20000170, 0x200002d0], 0x0, &(0x7f0000000100), &(0x7f00000006c0)=ANY=[@ANYBLOB="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"]}, 0x3ee) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000002980)) getsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(0xffffffffffffffff, 0x84, 0x1f, &(0x7f0000000440)={0x0, @in={{0x2, 0x4e22, @multicast2=0xe0000002}}, 0x7bb7, 0x4}, &(0x7f0000000500)=0x90) getsockopt$inet_sctp_SCTP_RTOINFO(0xffffffffffffffff, 0x84, 0x0, &(0x7f0000002240)={0x0, 0x9, 0x417}, &(0x7f00000001c0)=0x10) r2 = socket(0x22, 0x4, 0x3) r3 = socket(0x20000001e, 0x5, 0x0) r4 = perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$packet_tx_ring(r3, 0x10f, 0x87, &(0x7f0000265000)=@req={0x3fc, 0x0, 0x1}, 0x10) getegid() setsockopt$packet_tx_ring(r2, 0x10f, 0x87, &(0x7f0000265000)=@req={0x3fc, 0x0, 0x1}, 0x10) writev(r2, &(0x7f00000000c0)=[{&(0x7f0000000000)="8a", 0x1}], 0x1) close(r2) close(r3) perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r5 = syz_open_dev$evdev(&(0x7f0000dfdfee)='/dev/input/event#\x00', 0x0, 0x2) readv(r5, &(0x7f0000019fe0)=[{&(0x7f00008ec000)=""/219, 0xdb}], 0x1) write$evdev(r5, &(0x7f000004d000)=[{{}, 0x0, 0x1}, {{0x2}}], 0x30) r6 = getpgrp(0x0) setsockopt$ax25_int(r3, 0x101, 0xd, &(0x7f0000000080)=0x7, 0x4) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x8, 0xfffffffffffffffd, 0x9, 0x7, 0x0, 0x8001, 0x0, 0x6, 0x3ff, 0x4, 0x5, 0x4, 0xbd9, 0x56, 0x8000, 0x7f, 0xff, 0xeba, 0x1f, 0x0, 0xfd, 0x3, 0x1, 0x50, 0x7, 0x9, 0x641800, 0x3ff8000000000000, 0x4, 0x0, 0x10000, 0x5, 0x7, 0x6, 0x1, 0xffffffffffffffe0, 0x0, 0x20, 0x0, @perf_bp={&(0x7f0000000040), 0x8}, 0x20, 0x401, 0x8, 0x3, 0x8, 0x7, 0x7}, r6, 0xc, r4, 0x0) syz_genetlink_get_family_id$ipvs(&(0x7f0000000040)='IPVS\x00') 2018/03/30 19:42:56 executing program 5: perf_event_open(&(0x7f000001d000)={0x2, 0x78, 0xe2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000000)={0x6, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0xa, 0x1, 0x0) ioctl(r0, 0x8982, &(0x7f0000000000)) r1 = socket$packet(0x11, 0x0, 0x300) r2 = openat$cuse(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/cuse\x00', 0x82, 0x0) io_setup(0x43f, &(0x7f00000000c0)=0x0) io_submit(r3, 0x1, &(0x7f0000000000)=[&(0x7f0000000200)={0x0, 0x0, 0x0, 0x1, 0x0, r2, &(0x7f0000000040)="10000000020400000000000000000000", 0x10}]) r4 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000280)='/proc/sys/net/ipv4/vs/secure_tcp\x00', 0x2, 0x0) sendmsg$kcm(r4, &(0x7f0000001f00)={&(0x7f0000001b40)=@pppol2tpin6={0x18, 0x1, {0x0, r1, 0x0, 0x1, 0x0, 0x0, {0xa, 0x4e24, 0xc1, @mcast1={0xff, 0x1, [], 0x1}}}}, 0x80, &(0x7f0000001d80)=[{&(0x7f0000001bc0)="a9db123ebf124fab0f2eec9774559e3b5870fb7c6818fc89c4b8742d057480657265ae2b34fb2d4e585d22ca1bf7b0a22ce38a20a819d919947c78f8d5c9f3291905fd3ed2b8ef8a79d9453396c6b0b7eb0778dbc49b32ae91e443b64edddcf320c1589c7777eadd4e57c01b20a8ca7a831e8e2c104d0194d52fb5c35b550f", 0x7f}], 0x1, &(0x7f0000001dc0)=ANY=[], 0x0, 0x90}, 0x20000000) r5 = syz_open_dev$tun(&(0x7f00000001c0)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r5, 0x400454ca, &(0x7f0000000200)={'bridge0\x00\x00p\x00', 0x4000000000001005}) socketpair(0x1d, 0x3, 0x40, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_inet_SIOCSIFADDR(r6, 0x8916, &(0x7f0000000100)={'bridge8\x00', {0x2, 0x0, @dev={0xac, 0x14, 0x14}}}) ioctl$LOOP_SET_FD(r2, 0x4c00, r1) ioctl$SNDRV_SEQ_IOCTL_RUNNING_MODE(0xffffffffffffffff, 0xc0105303, &(0x7f00000002c0)={0x2, 0x8}) add_key$keyring(&(0x7f00000000c0)='keyring\x00', &(0x7f0000000100)={0x73, 0x79, 0x7a}, 0x0, 0x0, 0x0) clone(0x0, &(0x7f0000000040), &(0x7f0000000080), &(0x7f0000000000), &(0x7f0000000100)) ioctl$int_in(0xffffffffffffffff, 0x800000c004500a, &(0x7f0000006ff8)) wait4(0x0, 0x0, 0x4, &(0x7f0000000380)) ioctl$sock_inet_sctp_SIOCINQ(r7, 0x541b, &(0x7f0000000180)) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_PORT(0xffffffffffffffff, 0xc0a85352, &(0x7f0000001980)={{}, 'port1\x00', 0x0, 0x20010, 0x1f, 0x0, 0x3, 0x40, 0x0, 0x0, 0x4, 0x6d1}) 2018/03/30 19:42:56 executing program 6: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_mreqn(r0, 0x0, 0x27, &(0x7f0000000000)={@multicast2=0xe0000002, @loopback=0x7f000001}, 0xc) getsockopt$inet_sctp6_SCTP_FRAGMENT_INTERLEAVE(0xffffffffffffffff, 0x84, 0x12, &(0x7f0000000080), &(0x7f00000000c0)=0x4) ioctl$sock_inet_SIOCGIFDSTADDR(0xffffffffffffffff, 0x8917, &(0x7f0000000040)={'bcsh0\x00', {0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x1a}}}) setsockopt$inet_sctp6_SCTP_MAX_BURST(0xffffffffffffffff, 0x84, 0x14, &(0x7f0000000380)=@int=0x3, 0x4) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000140)={'bcsh0\x00', 0x0}) ioctl$sock_inet6_SIOCDELRT(0xffffffffffffffff, 0x890c, &(0x7f0000000180)={@dev={0xfe, 0x80, [], 0x13}, @loopback={0x0, 0x1}, @mcast2={0xff, 0x2, [], 0x1}, 0x6, 0x0, 0x42e, 0x100, 0x9, 0x80000000, r1}) r2 = socket$inet(0x2, 0xa, 0x5) setsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX(r2, 0x84, 0x6e, &(0x7f0000000600)=[@in={0x2, 0x4e21, @multicast1=0xe0000001}, @in6={0xa, 0x4e20, 0x0, @remote={0xfe, 0x80, [], 0xbb}}, @in={0x2, 0x4e22, @multicast2=0xe0000002}, @in6={0xa, 0x4e21, 0x1ff, @local={0xfe, 0x80, [], 0xaa}, 0x84}, @in6={0xa, 0x4e20, 0x4, @local={0xfe, 0x80, [], 0xaa}}], 0x74) getsockopt$inet_sctp6_SCTP_PR_SUPPORTED(0xffffffffffffffff, 0x84, 0x71, &(0x7f0000000200)={0x0, 0x8}, &(0x7f0000000240)=0x8) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(0xffffffffffffffff, 0x84, 0x6f, &(0x7f0000000300)={r3, 0x60, &(0x7f0000000280)=[@in={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x12}}, @in={0x2, 0x4e24, @loopback=0x7f000001}, @in={0x2, 0x0, @remote={0xac, 0x14, 0x14, 0xbb}}, @in={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x1a}}, @in={0x2, 0x4e24, @remote={0xac, 0x14, 0x14, 0xbb}}, @in={0x2, 0x4e24, @rand_addr=0x3ff}]}, &(0x7f0000000340)=0x10) setsockopt$inet_sctp6_SCTP_SET_PEER_PRIMARY_ADDR(0xffffffffffffffff, 0x84, 0x5, &(0x7f00000004c0)={r4, @in={{0x2, 0x4e20, @rand_addr=0x8}}}, 0x84) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, &(0x7f00000003c0)={'lo\x00', 0x4100}) ioctl$sock_inet_SIOCGIFNETMASK(0xffffffffffffffff, 0x891b, &(0x7f0000000100)={'nr0\x00', {0x2, 0x4e24, @loopback=0x7f000001}}) setsockopt$inet_msfilter(r0, 0x0, 0x29, &(0x7f0000000680)=ANY=[@ANYBLOB="cf0000000276d172390cc8c4ff4f3b746e5947c2ddb66a93ebb6d0f75b5f453435c311b94e126c49d47c10682b6e523d09fae1d416ebface98e08aa083e9f1f1afa118eb05655fec48d75d7a37edd032552c60ffeb53a2c8eecbe601a4ac5dceeecf1a943c2d9e2eaf4ad0a93e82a1a37a0cf2adbc4b512680428fee922ad18ff90ec6f87a75b299a953167bf4f9ae31cffd2c31dd47ba7d69151424dc1b2835f7624a302f270eb89118043dc1e1faa46e667be9cbf4456ad0c580ed032e4e49459f68f8a70f2dfe40f51362ffae"], 0x1) pread64(r0, &(0x7f0000000340)=""/181, 0xb5, 0x62) setsockopt$inet_msfilter(r0, 0x0, 0x29, &(0x7f0000000580)=ANY=[@ANYBLOB="e00000027f0000010000000001000000000000006b59aa51deb20d6efc9c04b7c9420f6434d31cbbe99b52873a8c21"], 0x1) socket$inet_udp(0x2, 0x2, 0x0) bpf$BPF_PROG_GET_NEXT_ID(0xb, &(0x7f0000000400)=0x7, 0x4) r5 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000ba4000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x2, 0x78, 0xe2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, r5, 0x0) r6 = perf_event_open(&(0x7f0000014f88)={0x1, 0x78, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00002e8000)}}, 0x0, 0x0, r5, 0x0) readv(r6, &(0x7f0000734000)=[{&(0x7f0000d42000)=""/146, 0x92}], 0x1) getsockopt$inet_sctp_SCTP_PEER_ADDR_THLDS(0xffffffffffffffff, 0x84, 0x1f, &(0x7f0000000480)={0x0, @in={{0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0xd}}}, 0xf80866d, 0x5}, &(0x7f0000000540)=0x90) getsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(0xffffffffffffff9c, 0x84, 0x18, &(0x7f0000000440)={r7, 0x400000000004}, &(0x7f00000005c0)=0xffffffffffffffc3) getsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER_VALUE(r0, 0x84, 0x7c, &(0x7f00000002c0)={r8, 0x10001, 0xc9e9}, &(0x7f0000000300)=0x8) 2018/03/30 19:42:56 executing program 7: r0 = socket$inet_tcp(0x2, 0x1, 0x0) sendto$inet(r0, &(0x7f0000de1fff), 0xfffffffffffffd43, 0x20008005, &(0x7f0000db4ff0)={0x2, 0x4e20, @loopback=0x7f000001}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000af5000)='illinois\x00', 0x9) getsockopt$inet_tcp_buf(r0, 0x6, 0x1a, &(0x7f0000000000)=""/177, &(0x7f0000000100)=0xb1) 2018/03/30 19:42:56 executing program 4: symlinkat(&(0x7f0000002f00)='./file0\x00', 0xffffffffffffffff, &(0x7f0000002f80)='./file0\x00') syz_mount_image$msdos(&(0x7f0000002fc0)='msdos\x00', &(0x7f0000003000)='./file0\x00', 0x4, 0x1, &(0x7f0000003180)=[{&(0x7f0000003040)="eaf9610c9f7031a1f58e51e73b3f0bd5af4364c38bbe335dbd3d211ec0338ba4c795c634af757a3c684da6110f67891133a6303441b21d139e3a6582efdaeabd3d68dbcb85cd383733a98084b62807af0b7ea49d68daa4cc9fda43dbeb13c3e67c44c463a2c429ccb66c0e1a9dfd5c911d4d7b578baaad6571d4457b9c6d92122a4bd97f5f174c81081941b007062f2cab2db1466851dde671e025909a633fec433bb2512fc61c436b74df23d280019a403884dc488071", 0xb7, 0xcd7}], 0x8, &(0x7f00000031c0)={[{@errors_continue='errors=continue', 0x2c}, {@time_offset={'time_offset', 0x3d, [0x0]}, 0x2c}]}) pipe(&(0x7f0000002f40)={0xffffffffffffffff}) r1 = open(&(0x7f0000003240)='./file0\x00', 0xa0001, 0x20) linkat(r0, &(0x7f0000003200)='./file0\x00', r1, &(0x7f0000003280)='./file0\x00', 0x400) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x80000, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)}, {&(0x7f0000010d00)="0000000000000000000000000000000000000000000000000000000002ae0000ed41000000040000d15bbe5ad15bbe5ad15bbe5a00000000000005002000000000000800070000000af301000400000000000000000000000100000030000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a1950000", 0xa0, 0x8c60}, {&(0x7f0000011a00)="020000000c0001022e000000020000000c0002022e2e00000b00000014000a026c6f73742b666f756e6400000c0000001000050166696c65300000000d0000001000050266696c65310000000f0000001000050166696c6532000000100000001000050166696c6533000000110000001000050166696c65340000001200000010000802564944454f5f54531400000068031201d181d18ed0b7d0bad0b0d0bbd0bbd0b5d1800000000000000000000000000000000000000000000000000000", 0xc0, 0xc000}, {&(0x7f0000012200)="0000000000000000000000000000000000000000000000000c0000dec910dfd800000000f4030000000000000000000000000000000000000000000000000000", 0x40, 0x117e0}, {&(0x7f0000012a00)="0d0000000c0001022e000000020000000c0002022e2e00000e000000dc03050166696c6530000000000000000000000000000000000000000000000000000000", 0x40, 0x1c000}], 0x0, &(0x7f0000013000)) syz_mount_image$bfs(&(0x7f0000000040)='bfs\x00', &(0x7f00000008c0)='./file0\x00', 0x20, 0x2, &(0x7f0000000180)=[{&(0x7f00000005c0)="f37e57346e86cb5adec662d7bd6f13a3764d2ca7640f9f81ba88d0689d0989735a7bafd5558d9a6e8988f9f6038fa475e49077bc8cfc6e170c4cdbaaa1375895c9a4068559d3cecf2a0423caa696bf77a75b3ae3f32b79da059ca13d055647998987fc2033d008bd55deb08808372b9b4595fb0d79a1358cd5949d859a7d155e86db4b608eb401109f6b792f5ce4a2ead9870dee49347bc08d0d54b0e4fca4fd895947a737f4ee823d997770e5c9df50c0c9fe2c0b945c6ffd13b7151e385b631520ac34a5967c6cd0d12b3746795681600541c17d379daed41ce8e715eba582fb668e160872a2", 0xe7, 0x7}, {&(0x7f0000000780)="6154d093a5a905da96fed5f8dea36bcd9d1d011246f7caf86806bf6ac6301d2d2b448461b867bbbe7d0eebdeafa16d7219af85ff4372670039ce277546def59f1d0eed4be4386a34c7243fe3ec84ad3807136a2c3ec35d6d87a7d7bb9342622cc3a7ff529ef3d76ff57fc7a1856f50b98e518515a9e679067cfc0e8500754fa30a81cf4dc42c5a0d36647280c5b0a8506efaf9ad06594678176efe4bdbcf7ab384b597df4c5ad66b2bd240823abe04cd30785819f1c7fd4d46bb55f8bd09ca4b44618b010e363fa572ca189ec73b36ad46b6f38d65c0acc417", 0xd9, 0x5}], 0x200000, 0x0) syz_mount_image$jfs(&(0x7f0000000080)='jfs\x00', &(0x7f0000000880)='./file0\x00', 0xfffffffffffffffe, 0x3, &(0x7f0000002dc0)=[{&(0x7f0000000900)="efee47debce411554253d03f2175c060de26b9a7a197d9327971105aafdf17a061227fe7dd52d3c1c1f0318992f304f7646c3eb4e32ff0514d34d4605b4e152474aa71ac6c0ba890b1f249f213d5bc162b605fdf3c524d6f84e1a2f8461d26ef5dd50b193ffb710ee69fc431552ae4548f0c1a7e503243bb10c53c566f37e3234d8b3d418992dca946568d275e1f54895a854bab3790963108fe6ce5b1f933e81bd0aa2dfd715aca4bd81b48b28e3ee265", 0xb1, 0x1}, {&(0x7f0000001a80)="b4bc90ad72742e5693f04c7955b05460b33cd0ca9cde365dbe1671162a8c1db744cb8a04d1d747ab4d3234fd615e6ad897396c21b8bf7da2c1d524d04fadade841e5acfac529250a2c75fed4b65a7b6c8735268244189e020c526112728097958fd591d00cd16d1591db9b0414d985d7718794369eb03d89403b7df76f6d745c94d4fa986321a9915fea55a73472bc39620fcf22ec74d02b77fafe6ccf72605eb0ba7ae69fa10a36d281e65a178528bc654ce5b6109d5294e400b18be755a3b899489b27a876ac3ea033ed525b28c7dff537b5210cbff466dc339e1f58db1679816589e886264ef1bcf6d0e1408d93946827711972", 0xf5, 0x7}, {&(0x7f0000002cc0)="c9bc1928c9ffffe99fdae39f5013810a038f1d558affc92341c81ee308195dabd95fcfedcfccd4cf2af62477e5ed935114b73940dba239c47d5824a3332fb48cea682934a6840ea5db2529c3a7c371bbf08f08bb15458de586609be64b699f29b7384dc7b2ba78f0e343fb9851eaf5a7b4106fc5b7a8aaf6e069012286fa7259807928cbee722222f45e6c98cefa00829bcdd92bd03273c7b0f20453c72150adf49c311248d3d3d96ad17187d60add3d1d8fbfbc5e572ceba134e5c533a5f75630a35514ee998b85a755085c04513dcc0047461d78f4aa8fdf0309fc39e3e4a1c24b4538acbf2366feaf", 0xea, 0x4}], 0x0, &(0x7f0000002ec0)={[{@nodiscard='nodiscard', 0x2c}, {@resize='resize', 0x2c}, {@noquota='noquota', 0x2c}, {@umask={'umask', 0x3d, [0x3f]}, 0x2c}]}) 2018/03/30 19:42:56 executing program 0: pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) close(r1) r2 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$inet_MCAST_JOIN_GROUP(r2, 0x0, 0x2a, &(0x7f0000c33f70)={0x1, {{0x2, 0x0, @multicast2=0xe0000002}}}, 0x90) getsockopt$inet_sctp6_SCTP_RTOINFO(r0, 0x84, 0x0, &(0x7f0000000600)={0x0, 0xb5, 0x1, 0x3ff}, &(0x7f0000000640)=0x10) setsockopt$inet_sctp_SCTP_PR_SUPPORTED(r0, 0x84, 0x71, &(0x7f0000000680)={r3, 0x8}, 0x0) getsockopt$inet_sctp_SCTP_GET_PEER_ADDRS(0xffffffffffffffff, 0x84, 0x6c, &(0x7f0000000c40)=ANY=[@ANYRES32=0x0, @ANYBLOB="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"], &(0x7f0000000280)=0x2) ioctl$DRM_IOCTL_AGP_ACQUIRE(0xffffffffffffffff, 0x6430) ioctl$sock_inet_SIOCADDRT(r1, 0x890b, &(0x7f0000000200)={0x0, {0x2, 0x4e22, @broadcast=0xffffffff}, {0x2, 0x4e23}, {0x2, 0x4e23, @local={0xac, 0x14, 0x14, 0xaa}}, 0x1, 0x7, 0x8, 0xfff, 0x0, &(0x7f00000000c0)='sit0\x00', 0x3ff, 0x2, 0xd4d}) setsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(0xffffffffffffffff, 0x84, 0x1f, &(0x7f00000002c0)={r3, @in={{0x2, 0x0, @multicast1=0xe0000001}}, 0x1000, 0x2}, 0x90) setsockopt$inet_MCAST_JOIN_GROUP(r2, 0x0, 0x2a, &(0x7f0000acf000)={0x1, {{0x2, 0x0, @multicast1=0xe0000014}}}, 0x90) getsockopt$inet_sctp6_SCTP_ASSOCINFO(r1, 0x84, 0x1, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x8001}, &(0x7f0000000080)=0x14) getpeername(0xffffffffffffffff, &(0x7f0000000540)=@pppol2tpin6={0x0, 0x0, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, @ipv4={[], [], @rand_addr}}}}, &(0x7f00000005c0)=0x80) setsockopt$inet_MCAST_MSFILTER(0xffffffffffffffff, 0x0, 0x30, &(0x7f0000001240)=ANY=[@ANYBLOB="ff0300000000000002004e2100000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000600000002000000ac14141900000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002004e21ac1414aa00000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002004e22e000000100000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002004e207f00000100000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002004e24ac14141600000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002004e20000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000924a800bf29bce8ae2506c7468021cdd2c729e0e267bad44ec56159c5862be038cea0fb27099b29392d8896c926d79e9ac240db573a6b6cfe4866773e3fadf16f83337a15541188b3e4f9d77e60a17b3fb5af29b2dc8bafe557699db5bbd02460019fe120642b9bc2a2552ebaf1db55ac827e1e17ed4d9a76f9cafcde8a4f5ee4802d979b4ae6229a0a5eb6167a8e11aab2df0f90bf668917a41dc8b2202523da208aa76dfe7cd19e1fbc8179444a3f885200ff020439b7dc365b650c608e0b897d71e8a55e8ecc13cdf94e1936da6edf9605efd0e14402a604ffe6797934ee40b0746cde0125897a19686d7b98bf97db15a56c8568618f3f72faf6ccc34eb6e5089dae49"], 0x1) getsockopt$inet_int(r5, 0x0, 0x18, &(0x7f00000006c0), &(0x7f0000000700)=0x4) setsockopt$inet_MCAST_LEAVE_GROUP(r0, 0x0, 0x2d, &(0x7f0000000400)={0xffffffffffffffad, {{0x2, 0x4e24}}}, 0x88) getsockopt$inet_sctp_SCTP_GET_ASSOC_STATS(r5, 0x84, 0x70, &(0x7f0000000740)={r4, @in={{0x2, 0x4e22, @broadcast=0xffffffff}}, [0x81, 0x0, 0x327, 0x7, 0x1, 0x20, 0x2, 0x445cd569, 0x0, 0xfffffffffffffbff, 0x3f, 0x440, 0x3, 0x0, 0x3d15]}, &(0x7f0000000840)=0x100) close(r1) 2018/03/30 19:42:56 executing program 7: r0 = socket$inet_tcp(0x2, 0x1, 0x0) sendto$inet(r0, &(0x7f0000de1fff), 0xfffffffffffffd43, 0x20008005, &(0x7f0000db4ff0)={0x2, 0x4e20, @loopback=0x7f000001}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000af5000)='illinois\x00', 0x9) getsockopt$inet_tcp_buf(r0, 0x6, 0x1a, &(0x7f0000000000)=""/177, &(0x7f0000000100)=0xb1) 2018/03/30 19:42:56 executing program 0: r0 = getpid() r1 = syz_open_procfs(r0, &(0x7f0000000480)="2f6578650000000000ff070000ddd9f191be10eebf000ee9ff0700000000000054fa07424adee916d2da75afe70b35a0fd6a1f349572d226d7a075fb35331ce39c5a3568641006d7c0206a74e333265316a175350e730ab2bce682b69d603fc05ead7fb5180de13a74155d8560fe23dfbba10724631067f955b8810f3402053f95a8798b0e3749d9c79cdd5f62547e59ab4352ab0a3827384665fd2c16ea53e5e2a1dc065b53520b9cd4eb30edc0f70cb82149f8ff5b628eabf1a9ab91915a78b5cb259f4a0fbfab4dacbd68f077") chroot(&(0x7f0000000000)='./file1\x00') ioctl$SIOCGIFHWADDR(r1, 0x8927, &(0x7f0000000080)) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000300), &(0x7f0000000380)=0xc) fstat(r1, &(0x7f0000001d80)) geteuid() getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000002340), &(0x7f0000002380)=0xc) stat(&(0x7f00000023c0)='./file0\x00', &(0x7f0000002400)) lstat(&(0x7f0000002480)='./file1\x00', &(0x7f00000024c0)) sendmsg$netlink(r1, &(0x7f00000026c0)={&(0x7f00000000c0)=@kern={0x10, 0x0, 0x0, 0x40108000}, 0xc, &(0x7f00000022c0)=[{&(0x7f0000000580)={0x10, 0x2a, 0x110, 0x70bd28, 0x25dfdbfc}, 0x10}], 0x1, &(0x7f0000002540)=ANY=[@ANYBLOB="0000000020000000000000000100000002000000", @ANYBLOB='\x00\x00\b\x00', @ANYRES32=r1, @ANYRES32=r1, @ANYBLOB="0000000020000000000000000100000001000000", @ANYBLOB="0000000020000000000000000100000002000000", @ANYBLOB="0000000030000000000000000100000001000000", @ANYRES32=r1, @ANYRES32=r1, @ANYRES32=r1, @ANYBLOB='\x00\x00\x00'], 0x6b, 0x10}, 0x4000) syncfs(r1) setsockopt$inet_sctp6_SCTP_EVENTS(r1, 0x84, 0xb, &(0x7f0000000040)={0x0, 0x0, 0xfa, 0x1, 0x0, 0x7, 0x7, 0x8001, 0x3f, 0x94fc, 0x1bcb}, 0xb) mount(&(0x7f0000000340)='./file1\x00', &(0x7f0000015ff8)='./file0\x00', &(0x7f000001fffa)='bdev\x00', 0x0, &(0x7f000001f000)) [ 495.705386] FAT-fs (loop4): Unrecognized mount option "time_offset=" or missing value [ 495.727639] kernel msg: ebtables bug: please report to author: EBT_ENTRY_OR_ENTRIES shouldn't be set in distinguisher 2018/03/30 19:42:56 executing program 6: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_mreqn(r0, 0x0, 0x27, &(0x7f0000000000)={@multicast2=0xe0000002, @loopback=0x7f000001}, 0xc) getsockopt$inet_sctp6_SCTP_FRAGMENT_INTERLEAVE(0xffffffffffffffff, 0x84, 0x12, &(0x7f0000000080), &(0x7f00000000c0)=0x4) ioctl$sock_inet_SIOCGIFDSTADDR(0xffffffffffffffff, 0x8917, &(0x7f0000000040)={'bcsh0\x00', {0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x1a}}}) setsockopt$inet_sctp6_SCTP_MAX_BURST(0xffffffffffffffff, 0x84, 0x14, &(0x7f0000000380)=@int=0x3, 0x4) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000140)={'bcsh0\x00', 0x0}) ioctl$sock_inet6_SIOCDELRT(0xffffffffffffffff, 0x890c, &(0x7f0000000180)={@dev={0xfe, 0x80, [], 0x13}, @loopback={0x0, 0x1}, @mcast2={0xff, 0x2, [], 0x1}, 0x6, 0x0, 0x42e, 0x100, 0x9, 0x80000000, r1}) r2 = socket$inet(0x2, 0xa, 0x5) setsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX(r2, 0x84, 0x6e, &(0x7f0000000600)=[@in={0x2, 0x4e21, @multicast1=0xe0000001}, @in6={0xa, 0x4e20, 0x0, @remote={0xfe, 0x80, [], 0xbb}}, @in={0x2, 0x4e22, @multicast2=0xe0000002}, @in6={0xa, 0x4e21, 0x1ff, @local={0xfe, 0x80, [], 0xaa}, 0x84}, @in6={0xa, 0x4e20, 0x4, @local={0xfe, 0x80, [], 0xaa}}], 0x74) getsockopt$inet_sctp6_SCTP_PR_SUPPORTED(0xffffffffffffffff, 0x84, 0x71, &(0x7f0000000200)={0x0, 0x8}, &(0x7f0000000240)=0x8) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(0xffffffffffffffff, 0x84, 0x6f, &(0x7f0000000300)={r3, 0x70, &(0x7f0000000280)=[@in={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x12}}, @in={0x2, 0x4e24, @loopback=0x7f000001}, @in={0x2, 0x0, @remote={0xac, 0x14, 0x14, 0xbb}}, @in={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x1a}}, @in={0x2, 0x4e24, @remote={0xac, 0x14, 0x14, 0xbb}}, @in={0x2, 0x4e24, @rand_addr=0x3ff}, @in={0x2, 0x0, @multicast2=0xe0000002}]}, &(0x7f0000000340)=0x10) setsockopt$inet_sctp6_SCTP_SET_PEER_PRIMARY_ADDR(0xffffffffffffffff, 0x84, 0x5, &(0x7f00000004c0)={r4, @in={{0x2, 0x4e20, @rand_addr=0x8}}}, 0x84) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, &(0x7f00000003c0)={'lo\x00', 0x4100}) ioctl$sock_inet_SIOCGIFNETMASK(0xffffffffffffffff, 0x891b, &(0x7f0000000100)={'nr0\x00', {0x2, 0x4e24, @loopback=0x7f000001}}) setsockopt$inet_msfilter(r0, 0x0, 0x29, &(0x7f0000000680)=ANY=[@ANYBLOB="cf0000000276d172390cc8c4ff4f3b746e5947c2ddb66a93ebb6d0f75b5f453435c311b94e126c49d47c10682b6e523d09fae1d416ebface98e08aa083e9f1f1afa118eb05655fec48d75d7a37edd032552c60ffeb53a2c8eecbe601a4ac5dceeecf1a943c2d9e2eaf4ad0a93e82a1a37a0cf2adbc4b512680428fee922ad18ff90ec6f87a75b299a953167bf4f9ae31cffd2c31dd47ba7d69151424dc1b2835f7624a302f270eb89118043dc1e1faa46e667be9cbf4456ad0c580ed032e4e49459f68f8a70f2dfe40f51362ffae"], 0x1) pread64(r0, &(0x7f0000000340)=""/181, 0xb5, 0x62) setsockopt$inet_msfilter(r0, 0x0, 0x29, &(0x7f0000000580)=ANY=[@ANYBLOB="e00000027f0000010000000001000000000000006b59aa51deb20d6efc9c04b7c9420f6434d31cbbe99b52873a8c21"], 0x1) socket$inet_udp(0x2, 0x2, 0x0) bpf$BPF_PROG_GET_NEXT_ID(0xb, &(0x7f0000000400)=0x7, 0x4) r5 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000ba4000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x2, 0x78, 0xe2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, r5, 0x0) r6 = perf_event_open(&(0x7f0000014f88)={0x1, 0x78, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00002e8000)}}, 0x0, 0x0, r5, 0x0) readv(r6, &(0x7f0000734000)=[{&(0x7f0000d42000)=""/146, 0x92}], 0x1) getsockopt$inet_sctp_SCTP_PEER_ADDR_THLDS(0xffffffffffffffff, 0x84, 0x1f, &(0x7f0000000480)={0x0, @in={{0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0xd}}}, 0xf80866d, 0x5}, &(0x7f0000000540)=0x90) getsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(0xffffffffffffff9c, 0x84, 0x18, &(0x7f0000000440)={r7, 0x400000000004}, &(0x7f00000005c0)=0xffffffffffffffc3) getsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER_VALUE(r0, 0x84, 0x7c, &(0x7f00000002c0)={r8, 0x10001, 0xc9e9}, &(0x7f0000000300)=0x8) 2018/03/30 19:42:56 executing program 7: bind$inet(0xffffffffffffffff, &(0x7f000099e000)={0x2, 0x4e20, @multicast1=0xe0000001}, 0x10) sendto$inet(0xffffffffffffffff, &(0x7f0000de1fff), 0xfffffffffffffd43, 0x20008005, &(0x7f0000db4ff0)={0x2, 0x4e20, @loopback=0x7f000001}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, &(0x7f0000af5000)='illinois\x00', 0x9) getsockopt$inet_tcp_buf(0xffffffffffffffff, 0x6, 0x1a, &(0x7f0000000000)=""/177, &(0x7f0000000100)=0xb1) [ 495.784735] audit: type=1326 audit(1522438976.807:13): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=6000 comm="syz-executor3" exe="/root/syz-executor3" sig=31 arch=c000003e syscall=202 compat=0 ip=0x454e79 code=0xffff0000 [ 495.810754] EXT4-fs (loop4): VFS: Can't find ext4 filesystem 2018/03/30 19:42:56 executing program 5: unshare(0x0) perf_event_open(&(0x7f000001d000)={0x2, 0x78, 0xe2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000000)={0x6, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0xa, 0x1, 0x0) ioctl(r0, 0x8982, &(0x7f0000000000)) r1 = socket$packet(0x11, 0x0, 0x300) r2 = openat$cuse(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/cuse\x00', 0x82, 0x0) io_setup(0x43f, &(0x7f00000000c0)=0x0) io_submit(r3, 0x1, &(0x7f0000000000)=[&(0x7f0000000200)={0x0, 0x0, 0x0, 0x1, 0x0, r2, &(0x7f0000000040)="10000000020400000000000000000000", 0x10}]) r4 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000280)='/proc/sys/net/ipv4/vs/secure_tcp\x00', 0x2, 0x0) sendmsg$kcm(r4, &(0x7f0000001f00)={&(0x7f0000001b40)=@pppol2tpin6={0x18, 0x1, {0x0, r1, 0x0, 0x1, 0x0, 0x0, {0xa, 0x4e24, 0xc1, @mcast1={0xff, 0x1, [], 0x1}}}}, 0x80, &(0x7f0000001d80)=[{&(0x7f0000001bc0)="a9db123ebf124fab0f2eec9774559e3b5870fb7c6818fc89c4b8742d057480657265ae2b34fb2d4e585d22ca1bf7b0a22ce38a20a819d919947c78f8d5c9f3291905fd3ed2b8ef8a79d9453396c6b0b7eb0778dbc49b32ae91e443b64edddcf320c1589c7777eadd4e57c01b20a8ca7a831e8e2c104d0194d52fb5c35b550f", 0x7f}], 0x1, &(0x7f0000001dc0)=ANY=[], 0x0, 0x90}, 0x20000000) r5 = syz_open_dev$tun(&(0x7f00000001c0)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r5, 0x400454ca, &(0x7f0000000200)={'bridge0\x00\x00p\x00', 0x4000000000001005}) socketpair(0x1d, 0x3, 0x40, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_inet_SIOCSIFADDR(r6, 0x8916, &(0x7f0000000100)={'bridge8\x00', {0x2, 0x0, @dev={0xac, 0x14, 0x14}}}) ioctl$LOOP_SET_FD(r2, 0x4c00, r1) ioctl$SNDRV_SEQ_IOCTL_RUNNING_MODE(0xffffffffffffffff, 0xc0105303, &(0x7f00000002c0)={0x2, 0x8}) add_key$keyring(&(0x7f00000000c0)='keyring\x00', &(0x7f0000000100)={0x73, 0x79, 0x7a}, 0x0, 0x0, 0x0) clone(0x0, &(0x7f0000000040), &(0x7f0000000080), &(0x7f0000000000), &(0x7f0000000100)) ioctl$int_in(0xffffffffffffffff, 0x800000c004500a, &(0x7f0000006ff8)) wait4(0x0, 0x0, 0x4, &(0x7f0000000380)) ioctl$sock_inet_sctp_SIOCINQ(r7, 0x541b, &(0x7f0000000180)) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_PORT(0xffffffffffffffff, 0xc0a85352, &(0x7f0000001980)={{}, 'port1\x00', 0x0, 0x20010, 0x1f, 0x0, 0x3, 0x40, 0x0, 0x0, 0x4, 0x6d1}) [ 495.860547] BFS-fs: bfs_fill_super(): No BFS filesystem on loop4 (magic=00000000) 2018/03/30 19:42:56 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x10000000013, &(0x7f00000002c0)=0x1, 0x4) connect(r0, &(0x7f0000000140)=@un=@abs, 0x80) bind$inet(r0, &(0x7f0000738ff0)={0x2, 0x0, @multicast1=0xe0000001}, 0x10) sendto$inet(r0, &(0x7f0000a6efff), 0x0, 0x2001ffff, &(0x7f0000000280)={0x2, 0x4e21, @loopback=0x7f000001}, 0x10) setsockopt$inet_tcp_int(r0, 0x6, 0x14, &(0x7f0000f43ffc)=0xfffffffffffffffc, 0x4) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(r0, 0x6, 0x1d, &(0x7f0000000100)={0xffffffffffffff04, 0x7ffa, 0x80000002, 0x4}, 0x14) sendto$inet(r0, &(0x7f00000000c0)="92", 0x1, 0x0, &(0x7f0000000040)={0x2, 0x0, @dev={0xac, 0x14}}, 0x10) 2018/03/30 19:42:56 executing program 6: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_mreqn(r0, 0x0, 0x27, &(0x7f0000000000)={@multicast2=0xe0000002, @loopback=0x7f000001}, 0xc) getsockopt$inet_sctp6_SCTP_FRAGMENT_INTERLEAVE(0xffffffffffffffff, 0x84, 0x12, &(0x7f0000000080), &(0x7f00000000c0)=0x4) ioctl$sock_inet_SIOCGIFDSTADDR(0xffffffffffffffff, 0x8917, &(0x7f0000000040)={'bcsh0\x00', {0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x1a}}}) setsockopt$inet_sctp6_SCTP_MAX_BURST(0xffffffffffffffff, 0x84, 0x14, &(0x7f0000000380)=@int=0x3, 0x4) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000140)={'bcsh0\x00', 0x0}) ioctl$sock_inet6_SIOCDELRT(0xffffffffffffffff, 0x890c, &(0x7f0000000180)={@dev={0xfe, 0x80, [], 0x13}, @loopback={0x0, 0x1}, @mcast2={0xff, 0x2, [], 0x1}, 0x6, 0x0, 0x42e, 0x100, 0x9, 0x80000000, r1}) r2 = socket$inet(0x2, 0xa, 0x5) setsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX(r2, 0x84, 0x6e, &(0x7f0000000600)=[@in={0x2, 0x4e21, @multicast1=0xe0000001}, @in6={0xa, 0x4e20, 0x0, @remote={0xfe, 0x80, [], 0xbb}}, @in={0x2, 0x4e22, @multicast2=0xe0000002}, @in6={0xa, 0x4e21, 0x1ff, @local={0xfe, 0x80, [], 0xaa}, 0x84}, @in6={0xa, 0x4e20, 0x4, @local={0xfe, 0x80, [], 0xaa}}], 0x74) getsockopt$inet_sctp6_SCTP_PR_SUPPORTED(0xffffffffffffffff, 0x84, 0x71, &(0x7f0000000200)={0x0, 0x8}, &(0x7f0000000240)=0x8) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(0xffffffffffffffff, 0x84, 0x6f, &(0x7f0000000300)={r3, 0x70, &(0x7f0000000280)=[@in={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x12}}, @in={0x2, 0x4e24, @loopback=0x7f000001}, @in={0x2, 0x0, @remote={0xac, 0x14, 0x14, 0xbb}}, @in={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x1a}}, @in={0x2, 0x4e24, @remote={0xac, 0x14, 0x14, 0xbb}}, @in={0x2, 0x4e24, @rand_addr=0x3ff}, @in={0x2, 0x0, @multicast2=0xe0000002}]}, &(0x7f0000000340)=0x10) setsockopt$inet_sctp6_SCTP_SET_PEER_PRIMARY_ADDR(0xffffffffffffffff, 0x84, 0x5, &(0x7f00000004c0)={r4, @in={{0x2, 0x4e20, @rand_addr=0x8}}}, 0x84) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, &(0x7f00000003c0)={'lo\x00', 0x4100}) ioctl$sock_inet_SIOCGIFNETMASK(0xffffffffffffffff, 0x891b, &(0x7f0000000100)={'nr0\x00', {0x2, 0x4e24, @loopback=0x7f000001}}) setsockopt$inet_msfilter(r0, 0x0, 0x29, &(0x7f0000000680)=ANY=[@ANYBLOB="cf0000000276d172390cc8c4ff4f3b746e5947c2ddb66a93ebb6d0f75b5f453435c311b94e126c49d47c10682b6e523d09fae1d416ebface98e08aa083e9f1f1afa118eb05655fec48d75d7a37edd032552c60ffeb53a2c8eecbe601a4ac5dceeecf1a943c2d9e2eaf4ad0a93e82a1a37a0cf2adbc4b512680428fee922ad18ff90ec6f87a75b299a953167bf4f9ae31cffd2c31dd47ba7d69151424dc1b2835f7624a302f270eb89118043dc1e1faa46e667be9cbf4456ad0c580ed032e4e49459f68f8a70f2dfe40f51362ffae"], 0x1) pread64(r0, &(0x7f0000000340)=""/181, 0xb5, 0x62) setsockopt$inet_msfilter(r0, 0x0, 0x29, &(0x7f0000000580)=ANY=[@ANYBLOB="e00000027f0000010000000001000000000000006b59aa51deb20d6efc9c04b7c9420f6434d31cbbe99b52873a8c21"], 0x1) socket$inet_udp(0x2, 0x2, 0x0) bpf$BPF_PROG_GET_NEXT_ID(0xb, &(0x7f0000000400)=0x7, 0x4) r5 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000ba4000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x2, 0x78, 0xe2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, r5, 0x0) r6 = perf_event_open(&(0x7f0000014f88)={0x1, 0x78, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00002e8000)}}, 0x0, 0x0, r5, 0x0) readv(r6, &(0x7f0000734000)=[{&(0x7f0000d42000)=""/146, 0x92}], 0x1) getsockopt$inet_sctp_SCTP_PEER_ADDR_THLDS(0xffffffffffffffff, 0x84, 0x1f, &(0x7f0000000480)={0x0, @in={{0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0xd}}}, 0xf80866d, 0x5}, &(0x7f0000000540)=0x90) getsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(0xffffffffffffff9c, 0x84, 0x18, &(0x7f0000000440)={r7, 0x400000000004}, &(0x7f00000005c0)=0xffffffffffffffc3) getsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER_VALUE(r0, 0x84, 0x7c, &(0x7f00000002c0)={r8, 0x10001, 0xc9e9}, &(0x7f0000000300)=0x8) 2018/03/30 19:42:56 executing program 7: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(0xffffffffffffffff, &(0x7f000099e000)={0x2, 0x4e20, @multicast1=0xe0000001}, 0x10) sendto$inet(r0, &(0x7f0000de1fff), 0xfffffffffffffd43, 0x20008005, &(0x7f0000db4ff0)={0x2, 0x4e20, @loopback=0x7f000001}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000af5000)='illinois\x00', 0x9) getsockopt$inet_tcp_buf(r0, 0x6, 0x1a, &(0x7f0000000000)=""/177, &(0x7f0000000100)=0xb1) [ 495.918435] jfs: Unrecognized mount option "umask=?" or missing value [ 496.740532] audit: type=1326 audit(1522438977.763:14): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=6000 comm="syz-executor3" exe="/root/syz-executor3" sig=31 arch=c000003e syscall=202 compat=0 ip=0x454e79 code=0xffff0000 2018/03/30 19:42:57 executing program 4: symlinkat(&(0x7f0000002f00)='./file0\x00', 0xffffffffffffffff, &(0x7f0000002f80)='./file0\x00') syz_mount_image$msdos(&(0x7f0000002fc0)='msdos\x00', &(0x7f0000003000)='./file0\x00', 0x4, 0x1, &(0x7f0000003180)=[{&(0x7f0000003040)="eaf9610c9f7031a1f58e51e73b3f0bd5af4364c38bbe335dbd3d211ec0338ba4c795c634af757a3c684da6110f67891133a6303441b21d139e3a6582efdaeabd3d68dbcb85cd383733a98084b62807af0b7ea49d68daa4cc9fda43dbeb13c3e67c44c463a2c429ccb66c0e1a9dfd5c911d4d7b578baaad6571d4457b9c6d92122a4bd97f5f174c81081941b007062f2cab2db1466851dde671e025909a633fec433bb2512fc61c436b74df23d280019a403884dc488071", 0xb7, 0xcd7}], 0x8, &(0x7f00000031c0)={[{@errors_continue='errors=continue', 0x2c}, {@time_offset={'time_offset', 0x3d, [0x0]}, 0x2c}]}) pipe(&(0x7f0000002f40)={0xffffffffffffffff}) r1 = open(&(0x7f0000003240)='./file0\x00', 0xa0001, 0x20) linkat(r0, &(0x7f0000003200)='./file0\x00', r1, &(0x7f0000003280)='./file0\x00', 0x400) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x80000, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)}, {&(0x7f0000010d00)="0000000000000000000000000000000000000000000000000000000002ae0000ed41000000040000d15bbe5ad15bbe5ad15bbe5a00000000000005002000000000000800070000000af301000400000000000000000000000100000030000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a1950000", 0xa0, 0x8c60}, {&(0x7f0000011a00)="020000000c0001022e000000020000000c0002022e2e00000b00000014000a026c6f73742b666f756e6400000c0000001000050166696c65300000000d0000001000050266696c65310000000f0000001000050166696c6532000000100000001000050166696c6533000000110000001000050166696c65340000001200000010000802564944454f5f54531400000068031201d181d18ed0b7d0bad0b0d0bbd0bbd0b5d1800000000000000000000000000000000000000000000000000000", 0xc0, 0xc000}, {&(0x7f0000012200)="0000000000000000000000000000000000000000000000000c0000dec910dfd800000000f4030000000000000000000000000000000000000000000000000000", 0x40, 0x117e0}, {&(0x7f0000012a00)="0d0000000c0001022e000000020000000c0002022e2e00000e000000dc03050166696c6530000000000000000000000000000000000000000000000000000000", 0x40, 0x1c000}], 0x0, &(0x7f0000013000)) syz_mount_image$bfs(&(0x7f0000000040)='bfs\x00', &(0x7f00000008c0)='./file0\x00', 0x20, 0x2, &(0x7f0000000180)=[{&(0x7f00000005c0)="f37e57346e86cb5adec662d7bd6f13a3764d2ca7640f9f81ba88d0689d0989735a7bafd5558d9a6e8988f9f6038fa475e49077bc8cfc6e170c4cdbaaa1375895c9a4068559d3cecf2a0423caa696bf77a75b3ae3f32b79da059ca13d055647998987fc2033d008bd55deb08808372b9b4595fb0d79a1358cd5949d859a7d155e86db4b608eb401109f6b792f5ce4a2ead9870dee49347bc08d0d54b0e4fca4fd895947a737f4ee823d997770e5c9df50c0c9fe2c0b945c6ffd13b7151e385b631520ac34a5967c6cd0d12b3746795681600541c17d379daed41ce8e715eba582fb668e160872a2", 0xe7, 0x7}, {&(0x7f0000000780)="6154d093a5a905da96fed5f8dea36bcd9d1d011246f7caf86806bf6ac6301d2d2b448461b867bbbe7d0eebdeafa16d7219af85ff4372670039ce277546def59f1d0eed4be4386a34c7243fe3ec84ad3807136a2c3ec35d6d87a7d7bb9342622cc3a7ff529ef3d76ff57fc7a1856f50b98e518515a9e679067cfc0e8500754fa30a81cf4dc42c5a0d36647280c5b0a8506efaf9ad06594678176efe4bdbcf7ab384b597df4c5ad66b2bd240823abe04cd30785819f1c7fd4d46bb55f8bd09ca4b44618b010e363fa572ca189ec73b36ad46b6f38d65c0acc417", 0xd9, 0x5}], 0x200000, 0x0) syz_mount_image$jfs(&(0x7f0000000080)='jfs\x00', &(0x7f0000000880)='./file0\x00', 0xfffffffffffffffe, 0x3, &(0x7f0000002dc0)=[{&(0x7f0000000900)="efee47debce411554253d03f2175c060de26b9a7a197d9327971105aafdf17a061227fe7dd52d3c1c1f0318992f304f7646c3eb4e32ff0514d34d4605b4e152474aa71ac6c0ba890b1f249f213d5bc162b605fdf3c524d6f84e1a2f8461d26ef5dd50b193ffb710ee69fc431552ae4548f0c1a7e503243bb10c53c566f37e3234d8b3d418992dca946568d275e1f54895a854bab3790963108fe6ce5b1f933e81bd0aa2dfd715aca4bd81b48b28e3ee265", 0xb1, 0x1}, {&(0x7f0000001a80)="b4bc90ad72742e5693f04c7955b05460b33cd0ca9cde365dbe1671162a8c1db744cb8a04d1d747ab4d3234fd615e6ad897396c21b8bf7da2c1d524d04fadade841e5acfac529250a2c75fed4b65a7b6c8735268244189e020c526112728097958fd591d00cd16d1591db9b0414d985d7718794369eb03d89403b7df76f6d745c94d4fa986321a9915fea55a73472bc39620fcf22ec74d02b77fafe6ccf72605eb0ba7ae69fa10a36d281e65a178528bc654ce5b6109d5294e400b18be755a3b899489b27a876ac3ea033ed525b28c7dff537b5210cbff466dc339e1f58db1679816589e886264ef1bcf6d0e1408d93946827711972", 0xf5, 0x7}, {&(0x7f0000002cc0)="c9bc1928c9ffffe99fdae39f5013810a038f1d558affc92341c81ee308195dabd95fcfedcfccd4cf2af62477e5ed935114b73940dba239c47d5824a3332fb48cea682934a6840ea5db2529c3a7c371bbf08f08bb15458de586609be64b699f29b7384dc7b2ba78f0e343fb9851eaf5a7b4106fc5b7a8aaf6e069012286fa7259807928cbee722222f45e6c98cefa00829bcdd92bd03273c7b0f20453c72150adf49c311248d3d3d96ad17187d60add3d1d8fbfbc5e572ceba134e5c533a5f75630a35514ee998b85a755085c04513dcc0047461d78f4aa8fdf0309fc39e3e4a1c24b4538acbf2366feaf", 0xea, 0x4}], 0x0, &(0x7f0000002ec0)={[{@nodiscard='nodiscard', 0x2c}, {@resize='resize', 0x2c}, {@noquota='noquota', 0x2c}, {@umask={'umask', 0x3d, [0x3f]}, 0x2c}]}) 2018/03/30 19:42:57 executing program 2: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) readv(0xffffffffffffffff, &(0x7f0000001480), 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f00003b9fdc)) readv(r0, &(0x7f0000001980)=[{&(0x7f00000018c0)=""/182, 0xb6}], 0x1) r1 = syz_open_pts(r0, 0x2) setsockopt$inet6_mtu(0xffffffffffffffff, 0x29, 0x17, &(0x7f0000000440)=0x5, 0x4) dup3(r1, r0, 0x0) write(r0, &(0x7f0000c34fff), 0xffffff0b) socket$inet(0x2, 0x0, 0x0) setsockopt$bt_l2cap_L2CAP_OPTIONS(0xffffffffffffffff, 0x6, 0x1, &(0x7f0000000380)={0xefa, 0x800, 0x0, 0x0, 0x9}, 0xc) 2018/03/30 19:42:57 executing program 3: r0 = socket$inet6(0xa, 0x80002, 0x88) recvfrom$inet6(0xffffffffffffffff, &(0x7f0000ffbf47)=""/185, 0xfffffffffffffeba, 0x0, 0x0, 0xfffffffffffffde6) llistxattr(&(0x7f0000000440)='./file0\x00', &(0x7f00000008c0)=""/4096, 0x1000) bind$inet6(r0, &(0x7f00008a8000)={0xa, 0x4e23}, 0x1c) sendfile(r0, r0, &(0x7f00000004c0), 0x7) r1 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000080)='/dev/autofs\x00', 0x0, 0x0) setsockopt$inet_sctp_SCTP_RESET_STREAMS(0xffffffffffffffff, 0x84, 0x77, &(0x7f00000006c0)=ANY=[@ANYBLOB="00f4ff00100000e803de0683474400000097dc6fa817356ec235b7a82883b9d01c2301bfdb01000080000000001f5a62ebec03d7becf1f550ecbe61be9571e7c831feaa60042711b33c55b9a8d4d31becd35d787aa5ed9c5cfa5ba7fbd2f75bf"], 0x1) wait4(0x0, &(0x7f0000000100), 0x4, &(0x7f0000000180)) sendmsg$inet_sctp(0xffffffffffffffff, &(0x7f0000a29000)={&(0x7f00005dafe4)=@in6={0xa, 0x4e23, 0x0, @mcast2={0xff, 0x2, [], 0x1}}, 0x1c, &(0x7f0000fc8000)}, 0x8000) sched_setscheduler(0x0, 0x5, &(0x7f0000000300)) syz_open_dev$sg(&(0x7f0000000580)='/dev/sg#\x00', 0x0, 0x20a01) sendto$inet6(0xffffffffffffffff, &(0x7f0000b0cf6e), 0xffed, 0x0, &(0x7f000001b000)={0xa}, 0x1c) ioctl$sock_SIOCGPGRP(r1, 0x8904, &(0x7f0000000240)=0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000280)) getsockopt$inet_mreq(r1, 0x0, 0x0, &(0x7f0000000380)={@rand_addr, @multicast2}, &(0x7f0000000540)=0x8) tgkill(r2, 0x0, 0x30) r3 = dup2(0xffffffffffffffff, r0) recvfrom$inet6(r0, &(0x7f0000000600)=""/191, 0xbf, 0x0, &(0x7f0000000000)={0xa, 0x4e24}, 0x1c) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f00000000c0)=0x0) r5 = syz_open_procfs(0x0, &(0x7f00000005c0)='gid_map\x00') getsockopt$inet6_tcp_TCP_REPAIR_WINDOW(r5, 0x6, 0x1d, &(0x7f00000003c0), &(0x7f0000000400)=0x14) tgkill(r4, 0x0, 0x10) socket$inet6(0xa, 0xa, 0x0) sendmsg$inet_sctp(0xffffffffffffffff, &(0x7f0000000500)={&(0x7f0000000040)=@in={0x2, 0x0, @rand_addr=0x8}, 0x10, &(0x7f0000000480), 0x0, &(0x7f00000004c0), 0x0, 0x80}, 0x0) getsockopt$inet_sctp6_SCTP_GET_LOCAL_ADDRS(r3, 0x84, 0x6d, &(0x7f00000007c0)=ANY=[@ANYRES32=0x0, @ANYBLOB="364944041f77b80e9096fda3291b36a95791527702000000000000001a2f3edcb9b800000000000009000000000000000000fb6d7e5dd94dd67e7c99193cf2bc439f10d69d2be106d12e3244e98f978d745adcdc7ca0ef73aceb7d1c3ef8ab40785b6f6de478c79648bc25fde528c400f949a46b5f2c476093cfea61967d997013f033d0bdbd7f421562b6e77ef76518aa8493c6f78b0fb1388f82e44a34f72104de621d5a9866b21d88afef"], &(0x7f0000000140)=0x2) stat(&(0x7f00000002c0)='./file0\x00', &(0x7f00000018c0)) setsockopt$inet_sctp_SCTP_RTOINFO(0xffffffffffffffff, 0x84, 0x0, &(0x7f0000000480)={r6, 0x100000000, 0x1, 0x7}, 0x10) connect$netlink(r3, &(0x7f0000000340)=@unspec, 0xc) 2018/03/30 19:42:57 executing program 0: ioctl$LOOP_SET_STATUS64(0xffffffffffffffff, 0x4c04, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1d, 0x8, "b2cdc16948c2d8defdc6ccd7e69370cd89206e757600f494a6f386fd75de4ec168412aefa9b47ddce6005ef1f5e2188c611f11fe23a9973b4f3b4ca8115d75b6", "adcddcbdd258708ed483b1c6d50b363981c4f943de7510903594aa41b5a7d76826f71b49332e607bd68a9352cd05d36e027047e9bd95b49f71e4f89c99b3dacc", "98731c39612dffb0f3700d6862ad2c5e51f2bf1597643d3216b87c072c7cef3c", [0x4, 0x1]}) r0 = socket$inet6(0xa, 0x400000000001, 0x0) r1 = dup(r0) ioctl$TIOCGSID(r1, 0x5429, &(0x7f0000000440)) getresuid(&(0x7f0000000640), &(0x7f0000000680), &(0x7f00000006c0)) gettid() lstat(&(0x7f0000000740)='./file0\x00', &(0x7f0000000780)) fstat(0xffffffffffffffff, &(0x7f0000000800)) getpgrp(0xffffffffffffffff) getsockopt$inet_IP_IPSEC_POLICY(r1, 0x0, 0x10, &(0x7f0000000880)={{{@in=@rand_addr, @in6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@local}, 0x0, @in6=@loopback}}, &(0x7f0000000980)=0xe8) getresgid(&(0x7f00000009c0), &(0x7f0000000a00), &(0x7f0000000a40)=0x0) ioctl$sock_FIOGETOWN(r0, 0x8903, &(0x7f0000000a80)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000ac0)={{{@in6=@mcast1, @in6=@mcast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@local}, 0x0, @in6=@loopback}}, &(0x7f0000000bc0)=0xe8) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000022c0)={0x0, 0x0, 0x0}, &(0x7f0000002300)=0xc) sendmsg$netlink(0xffffffffffffffff, &(0x7f00000024c0)={&(0x7f0000000180)=@kern={0x10, 0x0, 0x0, 0x4000000}, 0xc, &(0x7f0000000700)=[{&(0x7f0000001100)=ANY=[@ANYBLOB="afe88a0906e84ded9b00000025"], 0x1}], 0x1, &(0x7f0000000340)=ANY=[@ANYRES32=r1, @ANYBLOB="0000000030000000000000000100000001000000", @ANYRES32, @ANYRES32=r1, @ANYRES32=r1, @ANYRES32, @ANYRES32=r0, @ANYRES32, @ANYBLOB="0000000020000000000000000100000002000000596beb65d1ae8c08fcbaeec8f78d47e74da9fe9720f30b1537ec5040b5e573bedabf54ab4235", @ANYRES32=r2, @ANYRES32=r3, @ANYBLOB="0000000018000000000000000100000001000000", @ANYBLOB="0000000020000000000000000100000002000000", @ANYRES32=r4, @ANYRES32=r5, @ANYBLOB="0000000020000000000000000100000001000000", @ANYRES32, @ANYRES32=r1, @ANYBLOB='\x00\x00\x00\x00'], 0xc2, 0x8000}, 0x0) r6 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup.cpu\x00', 0x200002, 0x0) fchdir(r6) r7 = creat(&(0x7f00000002c0)='./file1\x00', 0x0) write$tun(r7, &(0x7f00000001c0)=ANY=[@ANYBLOB="0000047bc9de8cad0ffb545daf0c530d13ec8f00"], 0x1) clock_gettime(0x0, &(0x7f0000000300)) fcntl$setstatus(r7, 0x4, 0x6000) unlink(&(0x7f0000000000)='./file1\x00') r8 = socket$netlink(0x10, 0x3, 0x0) writev(r8, &(0x7f0000011ff0)=[{&(0x7f00000002c0)="390000001300090665000000000000007f0080400300000046000107000000141900040004800000070000000003000000000000000003f500", 0x39}], 0x1) pwritev(r6, &(0x7f0000000240), 0x0, 0x0) syz_genetlink_get_family_id$ipvs(&(0x7f0000000140)='IPVS\x00') setsockopt$inet_tcp_buf(r7, 0x6, 0xd, &(0x7f00000001c0), 0x0) 2018/03/30 19:42:57 executing program 7: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(0xffffffffffffffff, &(0x7f000099e000)={0x2, 0x4e20, @multicast1=0xe0000001}, 0x10) sendto$inet(r0, &(0x7f0000de1fff), 0xfffffffffffffd43, 0x20008005, &(0x7f0000db4ff0)={0x2, 0x4e20, @loopback=0x7f000001}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000af5000)='illinois\x00', 0x9) getsockopt$inet_tcp_buf(r0, 0x6, 0x1a, &(0x7f0000000000)=""/177, &(0x7f0000000100)=0xb1) 2018/03/30 19:42:57 executing program 1: r0 = syz_open_dev$amidi(&(0x7f0000000040)='/dev/amidi#\x00', 0x3, 0x28000) ioctl$DRM_IOCTL_RES_CTX(r0, 0xc0086426, &(0x7f0000000100)={0x2c, &(0x7f00000000c0)=[{}, {}, {}, {}, {}, {}, {}, {}]}) socket$netlink(0x10, 0x3, 0xc) writev(0xffffffffffffffff, &(0x7f00000021c0), 0x0) bind$bt_l2cap(r0, &(0x7f0000000340)={0x1f, 0x800000000000002, {0x401, 0x3, 0xb, 0x3f8}}, 0x9) socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f0000a8d000)={&(0x7f0000c78ff4)={0x10}, 0xc, &(0x7f0000df6000)={&(0x7f0000000200)=ANY=[@ANYBLOB="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"], 0x10f}, 0x1}, 0x0) r1 = socket$inet_sctp(0x2, 0x5, 0x84) sendmsg$inet_sctp(0xffffffffffffffff, &(0x7f0000001f00)={&(0x7f0000001840)=@in={0x2, 0x0, @dev={0xac, 0x14, 0x14}}, 0x10, &(0x7f0000001c40)=[{&(0x7f0000001880)='[', 0x1}], 0x1, &(0x7f0000001e40)}, 0x40) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000540)=@nat={'nat\x00', 0x19, 0x3, 0x376, [0x20000140, 0x0, 0x0, 0x20000170, 0x200002d0], 0x0, &(0x7f0000000100), &(0x7f00000006c0)=ANY=[@ANYBLOB="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"]}, 0x3ee) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000002980)) getsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(0xffffffffffffffff, 0x84, 0x1f, &(0x7f0000000440)={0x0, @in={{0x2, 0x4e22, @multicast2=0xe0000002}}, 0x7bb7, 0x4}, &(0x7f0000000500)=0x90) getsockopt$inet_sctp_SCTP_RTOINFO(0xffffffffffffffff, 0x84, 0x0, &(0x7f0000002240)={0x0, 0x9, 0x417}, &(0x7f00000001c0)=0x10) r2 = socket(0x22, 0x4, 0x3) r3 = socket(0x20000001e, 0x5, 0x0) r4 = perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$packet_tx_ring(r3, 0x10f, 0x87, &(0x7f0000265000)=@req={0x3fc, 0x0, 0x1}, 0x10) getegid() setsockopt$packet_tx_ring(r2, 0x10f, 0x87, &(0x7f0000265000)=@req={0x3fc, 0x0, 0x1}, 0x10) writev(r2, &(0x7f00000000c0)=[{&(0x7f0000000000)="8a", 0x1}], 0x1) close(r2) close(r3) perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r5 = syz_open_dev$evdev(&(0x7f0000dfdfee)='/dev/input/event#\x00', 0x0, 0x2) readv(r5, &(0x7f0000019fe0)=[{&(0x7f00008ec000)=""/219, 0xdb}], 0x1) write$evdev(r5, &(0x7f000004d000)=[{{}, 0x0, 0x1}, {{0x2}}], 0x30) r6 = getpgrp(0x0) setsockopt$ax25_int(r3, 0x101, 0xd, &(0x7f0000000080)=0x7, 0x4) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x8, 0xfffffffffffffffd, 0x9, 0x7, 0x0, 0x8001, 0x0, 0x6, 0x3ff, 0x4, 0x5, 0x4, 0xbd9, 0x56, 0x8000, 0x7f, 0xff, 0xeba, 0x1f, 0x0, 0xfd, 0x3, 0x1, 0x50, 0x7, 0x9, 0x641800, 0x3ff8000000000000, 0x4, 0x0, 0x10000, 0x5, 0x7, 0x6, 0x1, 0xffffffffffffffe0, 0x0, 0x20, 0x0, @perf_bp={&(0x7f0000000040), 0x8}, 0x20, 0x401, 0x8, 0x3, 0x8, 0x7, 0x7}, r6, 0xc, r4, 0x0) syz_genetlink_get_family_id$ipvs(&(0x7f0000000040)='IPVS\x00') 2018/03/30 19:42:57 executing program 6: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_mreqn(r0, 0x0, 0x27, &(0x7f0000000000)={@multicast2=0xe0000002, @loopback=0x7f000001}, 0xc) getsockopt$inet_sctp6_SCTP_FRAGMENT_INTERLEAVE(0xffffffffffffffff, 0x84, 0x12, &(0x7f0000000080), &(0x7f00000000c0)=0x4) ioctl$sock_inet_SIOCGIFDSTADDR(0xffffffffffffffff, 0x8917, &(0x7f0000000040)={'bcsh0\x00', {0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x1a}}}) setsockopt$inet_sctp6_SCTP_MAX_BURST(0xffffffffffffffff, 0x84, 0x14, &(0x7f0000000380)=@int=0x3, 0x4) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000140)={'bcsh0\x00', 0x0}) ioctl$sock_inet6_SIOCDELRT(0xffffffffffffffff, 0x890c, &(0x7f0000000180)={@dev={0xfe, 0x80, [], 0x13}, @loopback={0x0, 0x1}, @mcast2={0xff, 0x2, [], 0x1}, 0x6, 0x0, 0x42e, 0x100, 0x9, 0x80000000, r1}) r2 = socket$inet(0x2, 0xa, 0x5) setsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX(r2, 0x84, 0x6e, &(0x7f0000000600)=[@in={0x2, 0x4e21, @multicast1=0xe0000001}, @in6={0xa, 0x4e20, 0x0, @remote={0xfe, 0x80, [], 0xbb}}, @in={0x2, 0x4e22, @multicast2=0xe0000002}, @in6={0xa, 0x4e21, 0x1ff, @local={0xfe, 0x80, [], 0xaa}, 0x84}, @in6={0xa, 0x4e20, 0x4, @local={0xfe, 0x80, [], 0xaa}}], 0x74) getsockopt$inet_sctp6_SCTP_PR_SUPPORTED(0xffffffffffffffff, 0x84, 0x71, &(0x7f0000000200)={0x0, 0x8}, &(0x7f0000000240)=0x8) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(0xffffffffffffffff, 0x84, 0x6f, &(0x7f0000000300)={r3, 0x70, &(0x7f0000000280)=[@in={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x12}}, @in={0x2, 0x4e24, @loopback=0x7f000001}, @in={0x2, 0x0, @remote={0xac, 0x14, 0x14, 0xbb}}, @in={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x1a}}, @in={0x2, 0x4e24, @remote={0xac, 0x14, 0x14, 0xbb}}, @in={0x2, 0x4e24, @rand_addr=0x3ff}, @in={0x2, 0x0, @multicast2=0xe0000002}]}, &(0x7f0000000340)=0x10) setsockopt$inet_sctp6_SCTP_SET_PEER_PRIMARY_ADDR(0xffffffffffffffff, 0x84, 0x5, &(0x7f00000004c0)={r4, @in={{0x2, 0x4e20, @rand_addr=0x8}}}, 0x84) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, &(0x7f00000003c0)={'lo\x00', 0x4100}) ioctl$sock_inet_SIOCGIFNETMASK(0xffffffffffffffff, 0x891b, &(0x7f0000000100)={'nr0\x00', {0x2, 0x4e24, @loopback=0x7f000001}}) setsockopt$inet_msfilter(r0, 0x0, 0x29, &(0x7f0000000680)=ANY=[@ANYBLOB="cf0000000276d172390cc8c4ff4f3b746e5947c2ddb66a93ebb6d0f75b5f453435c311b94e126c49d47c10682b6e523d09fae1d416ebface98e08aa083e9f1f1afa118eb05655fec48d75d7a37edd032552c60ffeb53a2c8eecbe601a4ac5dceeecf1a943c2d9e2eaf4ad0a93e82a1a37a0cf2adbc4b512680428fee922ad18ff90ec6f87a75b299a953167bf4f9ae31cffd2c31dd47ba7d69151424dc1b2835f7624a302f270eb89118043dc1e1faa46e667be9cbf4456ad0c580ed032e4e49459f68f8a70f2dfe40f51362ffae"], 0x1) pread64(r0, &(0x7f0000000340)=""/181, 0xb5, 0x62) setsockopt$inet_msfilter(r0, 0x0, 0x29, &(0x7f0000000580)=ANY=[@ANYBLOB="e00000027f0000010000000001000000000000006b59aa51deb20d6efc9c04b7c9420f6434d31cbbe99b52873a8c21"], 0x1) socket$inet_udp(0x2, 0x2, 0x0) bpf$BPF_PROG_GET_NEXT_ID(0xb, &(0x7f0000000400)=0x7, 0x4) r5 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000ba4000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x2, 0x78, 0xe2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, r5, 0x0) r6 = perf_event_open(&(0x7f0000014f88)={0x1, 0x78, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00002e8000)}}, 0x0, 0x0, r5, 0x0) readv(r6, &(0x7f0000734000)=[{&(0x7f0000d42000)=""/146, 0x92}], 0x1) getsockopt$inet_sctp_SCTP_PEER_ADDR_THLDS(0xffffffffffffffff, 0x84, 0x1f, &(0x7f0000000480)={0x0, @in={{0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0xd}}}, 0xf80866d, 0x5}, &(0x7f0000000540)=0x90) getsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(0xffffffffffffff9c, 0x84, 0x18, &(0x7f0000000440)={r7, 0x400000000004}, &(0x7f00000005c0)=0xffffffffffffffc3) getsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER_VALUE(r0, 0x84, 0x7c, &(0x7f00000002c0)={r8, 0x10001, 0xc9e9}, &(0x7f0000000300)=0x8) 2018/03/30 19:42:57 executing program 5: unshare(0x0) perf_event_open(&(0x7f000001d000)={0x2, 0x78, 0xe2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000000)={0x6, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0xa, 0x1, 0x0) ioctl(r0, 0x8982, &(0x7f0000000000)) r1 = socket$packet(0x11, 0x0, 0x300) r2 = openat$cuse(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/cuse\x00', 0x82, 0x0) io_setup(0x43f, &(0x7f00000000c0)=0x0) io_submit(r3, 0x1, &(0x7f0000000000)=[&(0x7f0000000200)={0x0, 0x0, 0x0, 0x1, 0x0, r2, &(0x7f0000000040)="10000000020400000000000000000000", 0x10}]) r4 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000280)='/proc/sys/net/ipv4/vs/secure_tcp\x00', 0x2, 0x0) sendmsg$kcm(r4, &(0x7f0000001f00)={&(0x7f0000001b40)=@pppol2tpin6={0x18, 0x1, {0x0, r1, 0x0, 0x1, 0x0, 0x0, {0xa, 0x4e24, 0xc1, @mcast1={0xff, 0x1, [], 0x1}}}}, 0x80, &(0x7f0000001d80)=[{&(0x7f0000001bc0)="a9db123ebf124fab0f2eec9774559e3b5870fb7c6818fc89c4b8742d057480657265ae2b34fb2d4e585d22ca1bf7b0a22ce38a20a819d919947c78f8d5c9f3291905fd3ed2b8ef8a79d9453396c6b0b7eb0778dbc49b32ae91e443b64edddcf320c1589c7777eadd4e57c01b20a8ca7a831e8e2c104d0194d52fb5c35b550f", 0x7f}], 0x1, &(0x7f0000001dc0)=ANY=[], 0x0, 0x90}, 0x20000000) r5 = syz_open_dev$tun(&(0x7f00000001c0)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r5, 0x400454ca, &(0x7f0000000200)={'bridge0\x00\x00p\x00', 0x4000000000001005}) socketpair(0x1d, 0x3, 0x40, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_inet_SIOCSIFADDR(r6, 0x8916, &(0x7f0000000100)={'bridge8\x00', {0x2, 0x0, @dev={0xac, 0x14, 0x14}}}) ioctl$LOOP_SET_FD(r2, 0x4c00, r1) ioctl$SNDRV_SEQ_IOCTL_RUNNING_MODE(0xffffffffffffffff, 0xc0105303, &(0x7f00000002c0)={0x2, 0x8}) add_key$keyring(&(0x7f00000000c0)='keyring\x00', &(0x7f0000000100)={0x73, 0x79, 0x7a}, 0x0, 0x0, 0x0) clone(0x0, &(0x7f0000000040), &(0x7f0000000080), &(0x7f0000000000), &(0x7f0000000100)) ioctl$int_in(0xffffffffffffffff, 0x800000c004500a, &(0x7f0000006ff8)) wait4(0x0, 0x0, 0x4, &(0x7f0000000380)) ioctl$sock_inet_sctp_SIOCINQ(r7, 0x541b, &(0x7f0000000180)) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_PORT(0xffffffffffffffff, 0xc0a85352, &(0x7f0000001980)={{}, 'port1\x00', 0x0, 0x20010, 0x1f, 0x0, 0x3, 0x40, 0x0, 0x0, 0x4, 0x6d1}) [ 496.876117] FAT-fs (loop4): Unrecognized mount option "time_offset=" or missing value [ 496.886338] netlink: 'syz-executor0': attribute type 4 has an invalid length. [ 496.896995] kernel msg: ebtables bug: please report to author: EBT_ENTRY_OR_ENTRIES shouldn't be set in distinguisher 2018/03/30 19:42:57 executing program 7: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(0xffffffffffffffff, &(0x7f000099e000)={0x2, 0x4e20, @multicast1=0xe0000001}, 0x10) sendto$inet(r0, &(0x7f0000de1fff), 0xfffffffffffffd43, 0x20008005, &(0x7f0000db4ff0)={0x2, 0x4e20, @loopback=0x7f000001}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000af5000)='illinois\x00', 0x9) getsockopt$inet_tcp_buf(r0, 0x6, 0x1a, &(0x7f0000000000)=""/177, &(0x7f0000000100)=0xb1) 2018/03/30 19:42:57 executing program 6: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_mreqn(r0, 0x0, 0x27, &(0x7f0000000000)={@multicast2=0xe0000002, @loopback=0x7f000001}, 0xc) getsockopt$inet_sctp6_SCTP_FRAGMENT_INTERLEAVE(0xffffffffffffffff, 0x84, 0x12, &(0x7f0000000080), &(0x7f00000000c0)=0x4) ioctl$sock_inet_SIOCGIFDSTADDR(0xffffffffffffffff, 0x8917, &(0x7f0000000040)={'bcsh0\x00', {0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x1a}}}) setsockopt$inet_sctp6_SCTP_MAX_BURST(0xffffffffffffffff, 0x84, 0x14, &(0x7f0000000380)=@int=0x3, 0x4) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000140)={'bcsh0\x00', 0x0}) ioctl$sock_inet6_SIOCDELRT(0xffffffffffffffff, 0x890c, &(0x7f0000000180)={@dev={0xfe, 0x80, [], 0x13}, @loopback={0x0, 0x1}, @mcast2={0xff, 0x2, [], 0x1}, 0x6, 0x0, 0x42e, 0x100, 0x9, 0x80000000, r1}) r2 = socket$inet(0x2, 0xa, 0x5) setsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX(r2, 0x84, 0x6e, &(0x7f0000000600)=[@in={0x2, 0x4e21, @multicast1=0xe0000001}, @in6={0xa, 0x4e20, 0x0, @remote={0xfe, 0x80, [], 0xbb}}, @in={0x2, 0x4e22, @multicast2=0xe0000002}, @in6={0xa, 0x4e21, 0x1ff, @local={0xfe, 0x80, [], 0xaa}, 0x84}, @in6={0xa, 0x4e20, 0x4, @local={0xfe, 0x80, [], 0xaa}}], 0x74) getsockopt$inet_sctp6_SCTP_PR_SUPPORTED(0xffffffffffffffff, 0x84, 0x71, &(0x7f0000000200)={0x0, 0x8}, &(0x7f0000000240)=0x8) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(0xffffffffffffffff, 0x84, 0x6f, &(0x7f0000000300)={r3, 0x70, &(0x7f0000000280)=[@in={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x12}}, @in={0x2, 0x4e24, @loopback=0x7f000001}, @in={0x2, 0x0, @remote={0xac, 0x14, 0x14, 0xbb}}, @in={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x1a}}, @in={0x2, 0x4e24, @remote={0xac, 0x14, 0x14, 0xbb}}, @in={0x2, 0x4e24, @rand_addr=0x3ff}, @in={0x2, 0x4e24, @multicast2=0xe0000002}]}, &(0x7f0000000340)=0x10) setsockopt$inet_sctp6_SCTP_SET_PEER_PRIMARY_ADDR(0xffffffffffffffff, 0x84, 0x5, &(0x7f00000004c0)={0x0, @in={{0x2, 0x4e20, @rand_addr=0x8}}}, 0x84) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, &(0x7f00000003c0)={'lo\x00', 0x4100}) ioctl$sock_inet_SIOCGIFNETMASK(0xffffffffffffffff, 0x891b, &(0x7f0000000100)={'nr0\x00', {0x2, 0x4e24, @loopback=0x7f000001}}) setsockopt$inet_msfilter(r0, 0x0, 0x29, &(0x7f0000000680)=ANY=[@ANYBLOB="cf0000000276d172390cc8c4ff4f3b746e5947c2ddb66a93ebb6d0f75b5f453435c311b94e126c49d47c10682b6e523d09fae1d416ebface98e08aa083e9f1f1afa118eb05655fec48d75d7a37edd032552c60ffeb53a2c8eecbe601a4ac5dceeecf1a943c2d9e2eaf4ad0a93e82a1a37a0cf2adbc4b512680428fee922ad18ff90ec6f87a75b299a953167bf4f9ae31cffd2c31dd47ba7d69151424dc1b2835f7624a302f270eb89118043dc1e1faa46e667be9cbf4456ad0c580ed032e4e49459f68f8a70f2dfe40f51362ffae"], 0x1) pread64(r0, &(0x7f0000000340)=""/181, 0xb5, 0x62) setsockopt$inet_msfilter(r0, 0x0, 0x29, &(0x7f0000000580)=ANY=[@ANYBLOB="e00000027f0000010000000001000000000000006b59aa51deb20d6efc9c04b7c9420f6434d31cbbe99b52873a8c21"], 0x1) socket$inet_udp(0x2, 0x2, 0x0) bpf$BPF_PROG_GET_NEXT_ID(0xb, &(0x7f0000000400)=0x7, 0x4) r5 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000ba4000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x2, 0x78, 0xe2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, r5, 0x0) r6 = perf_event_open(&(0x7f0000014f88)={0x1, 0x78, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00002e8000)}}, 0x0, 0x0, r5, 0x0) readv(r6, &(0x7f0000734000)=[{&(0x7f0000d42000)=""/146, 0x92}], 0x1) getsockopt$inet_sctp_SCTP_PEER_ADDR_THLDS(0xffffffffffffffff, 0x84, 0x1f, &(0x7f0000000480)={0x0, @in={{0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0xd}}}, 0xf80866d, 0x5}, &(0x7f0000000540)=0x90) getsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(0xffffffffffffff9c, 0x84, 0x18, &(0x7f0000000440)={r7, 0x400000000004}, &(0x7f00000005c0)=0xffffffffffffffc3) getsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER_VALUE(r0, 0x84, 0x7c, &(0x7f00000002c0)={r8, 0x10001, 0xc9e9}, &(0x7f0000000300)=0x8) [ 496.923545] EXT4-fs (loop4): VFS: Can't find ext4 filesystem 2018/03/30 19:42:57 executing program 5: unshare(0x0) perf_event_open(&(0x7f000001d000)={0x2, 0x78, 0xe2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000000)={0x6, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0xa, 0x1, 0x0) ioctl(r0, 0x8982, &(0x7f0000000000)) r1 = socket$packet(0x11, 0x0, 0x300) r2 = openat$cuse(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/cuse\x00', 0x82, 0x0) io_setup(0x43f, &(0x7f00000000c0)=0x0) io_submit(r3, 0x1, &(0x7f0000000000)=[&(0x7f0000000200)={0x0, 0x0, 0x0, 0x1, 0x0, r2, &(0x7f0000000040)="10000000020400000000000000000000", 0x10}]) r4 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000280)='/proc/sys/net/ipv4/vs/secure_tcp\x00', 0x2, 0x0) sendmsg$kcm(r4, &(0x7f0000001f00)={&(0x7f0000001b40)=@pppol2tpin6={0x18, 0x1, {0x0, r1, 0x0, 0x1, 0x0, 0x0, {0xa, 0x4e24, 0xc1, @mcast1={0xff, 0x1, [], 0x1}}}}, 0x80, &(0x7f0000001d80)=[{&(0x7f0000001bc0)="a9db123ebf124fab0f2eec9774559e3b5870fb7c6818fc89c4b8742d057480657265ae2b34fb2d4e585d22ca1bf7b0a22ce38a20a819d919947c78f8d5c9f3291905fd3ed2b8ef8a79d9453396c6b0b7eb0778dbc49b32ae91e443b64edddcf320c1589c7777eadd4e57c01b20a8ca7a831e8e2c104d0194d52fb5c35b550f", 0x7f}], 0x1, &(0x7f0000001dc0)=ANY=[], 0x0, 0x90}, 0x20000000) r5 = syz_open_dev$tun(&(0x7f00000001c0)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r5, 0x400454ca, &(0x7f0000000200)={'bridge0\x00\x00p\x00', 0x4000000000001005}) socketpair(0x1d, 0x3, 0x40, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_inet_SIOCSIFADDR(r6, 0x8916, &(0x7f0000000100)={'bridge8\x00', {0x2, 0x0, @dev={0xac, 0x14, 0x14}}}) ioctl$LOOP_SET_FD(r2, 0x4c00, r1) ioctl$SNDRV_SEQ_IOCTL_RUNNING_MODE(0xffffffffffffffff, 0xc0105303, &(0x7f00000002c0)={0x2, 0x8}) add_key$keyring(&(0x7f00000000c0)='keyring\x00', &(0x7f0000000100)={0x73, 0x79, 0x7a}, 0x0, 0x0, 0x0) clone(0x0, &(0x7f0000000040), &(0x7f0000000080), &(0x7f0000000000), &(0x7f0000000100)) ioctl$int_in(0xffffffffffffffff, 0x800000c004500a, &(0x7f0000006ff8)) wait4(0x0, 0x0, 0x4, &(0x7f0000000380)) ioctl$sock_inet_sctp_SIOCINQ(r7, 0x541b, &(0x7f0000000180)) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_PORT(0xffffffffffffffff, 0xc0a85352, &(0x7f0000001980)={{}, 'port1\x00', 0x0, 0x20010, 0x1f, 0x0, 0x3, 0x40, 0x0, 0x0, 0x4, 0x6d1}) 2018/03/30 19:42:58 executing program 7: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f000099e000)={0x2, 0x0, @multicast1=0xe0000001}, 0x10) sendto$inet(r0, &(0x7f0000de1fff), 0xfffffffffffffd43, 0x20008005, &(0x7f0000db4ff0)={0x2, 0x4e20, @loopback=0x7f000001}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000af5000)='illinois\x00', 0x9) getsockopt$inet_tcp_buf(r0, 0x6, 0x1a, &(0x7f0000000000)=""/177, &(0x7f0000000100)=0xb1) [ 496.959779] netlink: 'syz-executor0': attribute type 4 has an invalid length. [ 496.985109] BFS-fs: bfs_fill_super(): No BFS filesystem on loop4 (magic=00000000) 2018/03/30 19:42:58 executing program 0: fstat(0xffffffffffffffff, &(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$TUNSETGROUP(0xffffffffffffffff, 0x400454ce, r0) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f00000003c0), &(0x7f0000000400)=0xc) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000440)) r1 = syz_open_procfs(0x0, &(0x7f0000000040)="2f65786500000000000090d8b75e67e16b394342abb5158df87ea8984e79c93df7498b2b34796068700e29fbd789f9a031f23e16c96e30baed2961953b057f7a3222943acc4b8cfa4de553f8276731ddeb811efd44ea011e1a0db9074a28a826c88566b89c57cc3cca4aec41d37fa27c8daa19030d03139d0aea71d509d9a20ba7deceb656cc1308d9d1f111b6bd1595486f55e229923be4ed8cbfb78e86280b4cacf386bfa8840afb312a4c520a03b27f805d181bd09ea208931a36e888060a2d") openat$ppp(0xffffffffffffff9c, &(0x7f0000000380)='/dev/ppp\x00', 0x0, 0x0) fsetxattr(r1, &(0x7f0000000140)=@known='user.syz\x00', &(0x7f0000000180)="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", 0x137, 0x0) fremovexattr(r1, &(0x7f0000000000)=@known='user.syz\x00') ioctl$DRM_IOCTL_GET_CAP(r1, 0xc010640c, &(0x7f0000000800)) execve(&(0x7f0000000480)='./file0\x00', &(0x7f0000000700)=[&(0x7f00000004c0)='\\em1selfmd5sum\x00', &(0x7f0000000580)='user.syz\x00', &(0x7f00000005c0)="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"], &(0x7f0000000780)=[&(0x7f0000000740)='security\x00']) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f00000002c0)) chdir(&(0x7f0000000280)='./file0\x00') socket$inet_tcp(0x2, 0x1, 0x0) r2 = inotify_init() getsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(0xffffffffffffffff, 0x84, 0x8, &(0x7f0000000280), &(0x7f0000000c00)=0x4) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000180)=0x0) get_robust_list(r3, &(0x7f0000000a00)=&(0x7f0000000240)={&(0x7f0000000200)={&(0x7f00000001c0)}}, &(0x7f0000000740)=0x6) mkdir(&(0x7f0000042ff6)='./control\x00', 0x0) inotify_init() inotify_add_watch(r2, &(0x7f0000000c40)='./control\x00', 0x80000d50) execve(&(0x7f00000000c0)='./control\x00', &(0x7f0000000840)=[&(0x7f00000007c0)='/dev/sequencer\x00', &(0x7f0000000800)="776c616e312576626f786e657431f46b657972696e6700"], &(0x7f00000008c0)=[&(0x7f0000000880)="2b5ee42c706f7369785f61636c5f616363657373776c616e30657468302df62e766d6e6574302d7d00"]) connect$inet6(0xffffffffffffffff, &(0x7f0000000140)={0xa, 0x4e23, 0x7}, 0x1c) setsockopt$EBT_SO_SET_ENTRIES(0xffffffffffffffff, 0x0, 0x80, &(0x7f0000000900)=@nat={'nat\x00', 0x19, 0x5, 0xb, [0x20000c80, 0x0, 0x0, 0x20000d7c, 0x20000e48], 0x0, &(0x7f0000000700), &(0x7f0000000980)=ANY=[@ANYBLOB="c5a89cbb7c2008b4396a98"]}, 0x83) getsockopt$inet_sctp_SCTP_GET_PEER_ADDR_INFO(0xffffffffffffff9c, 0x84, 0xf, &(0x7f0000001000)={0x0, @in={{0x2, 0x4e20, @remote={0xac, 0x14, 0x14, 0xbb}}}, 0x0, 0x1, 0x4, 0xfffffffffffffffd}, &(0x7f0000000300)=0x98) sendmsg(0xffffffffffffffff, &(0x7f00000006c0)={&(0x7f00000004c0)=@sco={0x1f, {0x0, 0x3, 0x0, 0xda5, 0x0, 0x7}}, 0x80, &(0x7f0000000540)}, 0x0) [ 497.043336] jfs: Unrecognized mount option "umask=?" or missing value 2018/03/30 19:42:58 executing program 3: pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) close(r1) r2 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$inet_MCAST_JOIN_GROUP(r2, 0x0, 0x2a, &(0x7f0000c33f70)={0x1, {{0x2, 0x0, @multicast2=0xe0000002}}}, 0x90) getsockopt$inet_sctp6_SCTP_RTOINFO(r0, 0x84, 0x0, &(0x7f0000000600)={0x0, 0xb5, 0x1, 0x3ff}, &(0x7f0000000640)=0x10) setsockopt$inet_sctp_SCTP_PR_SUPPORTED(r0, 0x84, 0x71, &(0x7f0000000680)={r3, 0x8}, 0x0) getsockopt$inet_sctp_SCTP_GET_PEER_ADDRS(0xffffffffffffffff, 0x84, 0x6c, &(0x7f0000000c40)=ANY=[@ANYRES32=0x0, @ANYBLOB="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"], &(0x7f0000000280)=0x2) ioctl$DRM_IOCTL_AGP_ACQUIRE(0xffffffffffffffff, 0x6430) ioctl$sock_inet_SIOCADDRT(r1, 0x890b, &(0x7f0000000200)={0x0, {0x2, 0x4e22, @broadcast=0xffffffff}, {0x2, 0x4e23}, {0x2, 0x4e23, @local={0xac, 0x14, 0x14, 0xaa}}, 0x1, 0x7, 0x8, 0xfff, 0x7, &(0x7f00000000c0)='sit0\x00', 0x3ff, 0x2, 0xd4d}) setsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(0xffffffffffffffff, 0x84, 0x1f, &(0x7f00000002c0)={r3, @in={{0x2, 0x4e20, @multicast1=0xe0000001}}, 0x1000, 0x2}, 0x90) setsockopt$inet_MCAST_JOIN_GROUP(r2, 0x0, 0x2a, &(0x7f0000acf000)={0x1, {{0x2, 0x0, @multicast1=0xe0000014}}}, 0x90) getsockopt$inet_sctp6_SCTP_ASSOCINFO(r1, 0x84, 0x1, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x8001}, &(0x7f0000000080)=0x14) getpeername(0xffffffffffffffff, &(0x7f0000000540)=@pppol2tpin6={0x0, 0x0, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, @ipv4={[], [], @rand_addr}}}}, &(0x7f00000005c0)=0x80) setsockopt$inet_MCAST_MSFILTER(r2, 0x0, 0x30, &(0x7f0000001240)=ANY=[@ANYBLOB="ff0300000000000002004e2100000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000600000002000000ac14141900000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002004e21ac1414aa00000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002004e22e000000100000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002004e207f00000100000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002004e24ac14141600000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002004e20000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000924a800bf29bce8ae2506c7468021cdd2c729e0e267bad44ec56159c5862be038cea0fb27099b29392d8896c926d79e9ac240db573a6b6cfe4866773e3fadf16f83337a15541188b3e4f9d77e60a17b3fb5af29b2dc8bafe557699db5bbd02460019fe120642b9bc2a2552ebaf1db55ac827e1e17ed4d9a76f9cafcde8a4f5ee4802d979b4ae6229a0a5eb6167a8e11aab2df0f90bf668917a41dc8b2202523da208aa76dfe7cd19e1fbc8179444a3f885200ff020439b7dc365b650c608e0b897d71e8a55e8ecc13cdf94e1936da6edf9605efd0e14402a604ffe6797934ee40b0746cde0125897a19686d7b98bf97db15a56c8568618f3f72faf6ccc34eb6e5089dae494fb58089"], 0x1) getsockopt$inet_int(r5, 0x0, 0x0, &(0x7f00000006c0), &(0x7f0000000700)=0x4) setsockopt$inet_MCAST_LEAVE_GROUP(r0, 0x0, 0x2d, &(0x7f0000000400)={0xffffffffffffffad, {{0x2, 0x4e24}}}, 0x88) getsockopt$inet_sctp_SCTP_GET_ASSOC_STATS(r5, 0x84, 0x70, &(0x7f0000000740)={r4, @in={{0x2, 0x4e22, @broadcast=0xffffffff}}, [0x81, 0x0, 0x327, 0x7, 0x1, 0x20, 0x2, 0x445cd569, 0x0, 0xfffffffffffffbff, 0x0, 0x440, 0x3, 0x0, 0x3d15]}, &(0x7f0000000840)=0x100) close(r1) 2018/03/30 19:42:58 executing program 6: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_mreqn(r0, 0x0, 0x27, &(0x7f0000000000)={@multicast2=0xe0000002, @loopback=0x7f000001}, 0xc) getsockopt$inet_sctp6_SCTP_FRAGMENT_INTERLEAVE(0xffffffffffffffff, 0x84, 0x12, &(0x7f0000000080), &(0x7f00000000c0)=0x4) ioctl$sock_inet_SIOCGIFDSTADDR(0xffffffffffffffff, 0x8917, &(0x7f0000000040)={'bcsh0\x00', {0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x1a}}}) setsockopt$inet_sctp6_SCTP_MAX_BURST(0xffffffffffffffff, 0x84, 0x14, &(0x7f0000000380)=@int=0x3, 0x4) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000140)={'bcsh0\x00', 0x0}) ioctl$sock_inet6_SIOCDELRT(0xffffffffffffffff, 0x890c, &(0x7f0000000180)={@dev={0xfe, 0x80, [], 0x13}, @loopback={0x0, 0x1}, @mcast2={0xff, 0x2, [], 0x1}, 0x6, 0x0, 0x42e, 0x100, 0x9, 0x80000000, r1}) r2 = socket$inet(0x2, 0xa, 0x5) setsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX(r2, 0x84, 0x6e, &(0x7f0000000600)=[@in={0x2, 0x4e21, @multicast1=0xe0000001}, @in6={0xa, 0x4e20, 0x0, @remote={0xfe, 0x80, [], 0xbb}}, @in={0x2, 0x4e22, @multicast2=0xe0000002}, @in6={0xa, 0x4e21, 0x1ff, @local={0xfe, 0x80, [], 0xaa}, 0x84}, @in6={0xa, 0x4e20, 0x4, @local={0xfe, 0x80, [], 0xaa}}], 0x74) getsockopt$inet_sctp6_SCTP_PR_SUPPORTED(0xffffffffffffffff, 0x84, 0x71, &(0x7f0000000200)={0x0, 0x8}, &(0x7f0000000240)=0x8) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(0xffffffffffffffff, 0x84, 0x6f, &(0x7f0000000300)={r3, 0x70, &(0x7f0000000280)=[@in={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x12}}, @in={0x2, 0x4e24, @loopback=0x7f000001}, @in={0x2, 0x0, @remote={0xac, 0x14, 0x14, 0xbb}}, @in={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x1a}}, @in={0x2, 0x4e24, @remote={0xac, 0x14, 0x14, 0xbb}}, @in={0x2, 0x4e24, @rand_addr=0x3ff}, @in={0x2, 0x4e24, @multicast2=0xe0000002}]}, &(0x7f0000000340)=0x10) setsockopt$inet_sctp6_SCTP_SET_PEER_PRIMARY_ADDR(0xffffffffffffffff, 0x84, 0x5, &(0x7f00000004c0)={0x0, @in={{0x2, 0x4e20, @rand_addr=0x8}}}, 0x84) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, &(0x7f00000003c0)={'lo\x00', 0x4100}) ioctl$sock_inet_SIOCGIFNETMASK(0xffffffffffffffff, 0x891b, &(0x7f0000000100)={'nr0\x00', {0x2, 0x4e24, @loopback=0x7f000001}}) setsockopt$inet_msfilter(r0, 0x0, 0x29, &(0x7f0000000680)=ANY=[@ANYBLOB="cf0000000276d172390cc8c4ff4f3b746e5947c2ddb66a93ebb6d0f75b5f453435c311b94e126c49d47c10682b6e523d09fae1d416ebface98e08aa083e9f1f1afa118eb05655fec48d75d7a37edd032552c60ffeb53a2c8eecbe601a4ac5dceeecf1a943c2d9e2eaf4ad0a93e82a1a37a0cf2adbc4b512680428fee922ad18ff90ec6f87a75b299a953167bf4f9ae31cffd2c31dd47ba7d69151424dc1b2835f7624a302f270eb89118043dc1e1faa46e667be9cbf4456ad0c580ed032e4e49459f68f8a70f2dfe40f51362ffae"], 0x1) pread64(r0, &(0x7f0000000340)=""/181, 0xb5, 0x62) setsockopt$inet_msfilter(r0, 0x0, 0x29, &(0x7f0000000580)=ANY=[@ANYBLOB="e00000027f0000010000000001000000000000006b59aa51deb20d6efc9c04b7c9420f6434d31cbbe99b52873a8c21"], 0x1) socket$inet_udp(0x2, 0x2, 0x0) bpf$BPF_PROG_GET_NEXT_ID(0xb, &(0x7f0000000400)=0x7, 0x4) r5 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000ba4000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x2, 0x78, 0xe2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, r5, 0x0) r6 = perf_event_open(&(0x7f0000014f88)={0x1, 0x78, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00002e8000)}}, 0x0, 0x0, r5, 0x0) readv(r6, &(0x7f0000734000)=[{&(0x7f0000d42000)=""/146, 0x92}], 0x1) getsockopt$inet_sctp_SCTP_PEER_ADDR_THLDS(0xffffffffffffffff, 0x84, 0x1f, &(0x7f0000000480)={0x0, @in={{0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0xd}}}, 0xf80866d, 0x5}, &(0x7f0000000540)=0x90) getsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(0xffffffffffffff9c, 0x84, 0x18, &(0x7f0000000440)={r7, 0x400000000004}, &(0x7f00000005c0)=0xffffffffffffffc3) getsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER_VALUE(r0, 0x84, 0x7c, &(0x7f00000002c0)={r8, 0x10001, 0xc9e9}, &(0x7f0000000300)=0x8) 2018/03/30 19:42:58 executing program 4: symlinkat(&(0x7f0000002f00)='./file0\x00', 0xffffffffffffffff, &(0x7f0000002f80)='./file0\x00') syz_mount_image$msdos(&(0x7f0000002fc0)='msdos\x00', &(0x7f0000003000)='./file0\x00', 0x4, 0x1, &(0x7f0000003180)=[{&(0x7f0000003040)="eaf9610c9f7031a1f58e51e73b3f0bd5af4364c38bbe335dbd3d211ec0338ba4c795c634af757a3c684da6110f67891133a6303441b21d139e3a6582efdaeabd3d68dbcb85cd383733a98084b62807af0b7ea49d68daa4cc9fda43dbeb13c3e67c44c463a2c429ccb66c0e1a9dfd5c911d4d7b578baaad6571d4457b9c6d92122a4bd97f5f174c81081941b007062f2cab2db1466851dde671e025909a633fec433bb2512fc61c436b74df23d280019a403884dc488071", 0xb7, 0xcd7}], 0x8, &(0x7f00000031c0)={[{@errors_continue='errors=continue', 0x2c}, {@time_offset={'time_offset', 0x3d, [0x0]}, 0x2c}]}) pipe(&(0x7f0000002f40)={0xffffffffffffffff}) r1 = open(&(0x7f0000003240)='./file0\x00', 0xa0001, 0x20) linkat(r0, &(0x7f0000003200)='./file0\x00', r1, &(0x7f0000003280)='./file0\x00', 0x400) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x80000, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)}, {&(0x7f0000010d00)="0000000000000000000000000000000000000000000000000000000002ae0000ed41000000040000d15bbe5ad15bbe5ad15bbe5a00000000000005002000000000000800070000000af301000400000000000000000000000100000030000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a1950000", 0xa0, 0x8c60}, {&(0x7f0000011a00)="020000000c0001022e000000020000000c0002022e2e00000b00000014000a026c6f73742b666f756e6400000c0000001000050166696c65300000000d0000001000050266696c65310000000f0000001000050166696c6532000000100000001000050166696c6533000000110000001000050166696c65340000001200000010000802564944454f5f54531400000068031201d181d18ed0b7d0bad0b0d0bbd0bbd0b5d1800000000000000000000000000000000000000000000000000000", 0xc0, 0xc000}, {&(0x7f0000012200)="0000000000000000000000000000000000000000000000000c0000dec910dfd800000000f4030000000000000000000000000000000000000000000000000000", 0x40, 0x117e0}, {&(0x7f0000012a00)="0d0000000c0001022e000000020000000c0002022e2e00000e000000dc03050166696c6530000000000000000000000000000000000000000000000000000000", 0x40, 0x1c000}], 0x0, &(0x7f0000013000)) syz_mount_image$bfs(&(0x7f0000000040)='bfs\x00', &(0x7f00000008c0)='./file0\x00', 0x20, 0x2, &(0x7f0000000180)=[{&(0x7f00000005c0)="f37e57346e86cb5adec662d7bd6f13a3764d2ca7640f9f81ba88d0689d0989735a7bafd5558d9a6e8988f9f6038fa475e49077bc8cfc6e170c4cdbaaa1375895c9a4068559d3cecf2a0423caa696bf77a75b3ae3f32b79da059ca13d055647998987fc2033d008bd55deb08808372b9b4595fb0d79a1358cd5949d859a7d155e86db4b608eb401109f6b792f5ce4a2ead9870dee49347bc08d0d54b0e4fca4fd895947a737f4ee823d997770e5c9df50c0c9fe2c0b945c6ffd13b7151e385b631520ac34a5967c6cd0d12b3746795681600541c17d379daed41ce8e715eba582fb668e160872a2", 0xe7, 0x7}, {&(0x7f0000000780)="6154d093a5a905da96fed5f8dea36bcd9d1d011246f7caf86806bf6ac6301d2d2b448461b867bbbe7d0eebdeafa16d7219af85ff4372670039ce277546def59f1d0eed4be4386a34c7243fe3ec84ad3807136a2c3ec35d6d87a7d7bb9342622cc3a7ff529ef3d76ff57fc7a1856f50b98e518515a9e679067cfc0e8500754fa30a81cf4dc42c5a0d36647280c5b0a8506efaf9ad06594678176efe4bdbcf7ab384b597df4c5ad66b2bd240823abe04cd30785819f1c7fd4d46bb55f8bd09ca4b44618b010e363fa572ca189ec73b36ad46b6f38d65c0acc417", 0xd9, 0x5}], 0x200000, 0x0) syz_mount_image$jfs(&(0x7f0000000080)='jfs\x00', &(0x7f0000000880)='./file0\x00', 0xfffffffffffffffe, 0x3, &(0x7f0000002dc0)=[{&(0x7f0000000900)="efee47debce411554253d03f2175c060de26b9a7a197d9327971105aafdf17a061227fe7dd52d3c1c1f0318992f304f7646c3eb4e32ff0514d34d4605b4e152474aa71ac6c0ba890b1f249f213d5bc162b605fdf3c524d6f84e1a2f8461d26ef5dd50b193ffb710ee69fc431552ae4548f0c1a7e503243bb10c53c566f37e3234d8b3d418992dca946568d275e1f54895a854bab3790963108fe6ce5b1f933e81bd0aa2dfd715aca4bd81b48b28e3ee265", 0xb1, 0x1}, {&(0x7f0000001a80)="b4bc90ad72742e5693f04c7955b05460b33cd0ca9cde365dbe1671162a8c1db744cb8a04d1d747ab4d3234fd615e6ad897396c21b8bf7da2c1d524d04fadade841e5acfac529250a2c75fed4b65a7b6c8735268244189e020c526112728097958fd591d00cd16d1591db9b0414d985d7718794369eb03d89403b7df76f6d745c94d4fa986321a9915fea55a73472bc39620fcf22ec74d02b77fafe6ccf72605eb0ba7ae69fa10a36d281e65a178528bc654ce5b6109d5294e400b18be755a3b899489b27a876ac3ea033ed525b28c7dff537b5210cbff466dc339e1f58db1679816589e886264ef1bcf6d0e1408d93946827711972", 0xf5, 0x7}, {&(0x7f0000002cc0)="c9bc1928c9ffffe99fdae39f5013810a038f1d558affc92341c81ee308195dabd95fcfedcfccd4cf2af62477e5ed935114b73940dba239c47d5824a3332fb48cea682934a6840ea5db2529c3a7c371bbf08f08bb15458de586609be64b699f29b7384dc7b2ba78f0e343fb9851eaf5a7b4106fc5b7a8aaf6e069012286fa7259807928cbee722222f45e6c98cefa00829bcdd92bd03273c7b0f20453c72150adf49c311248d3d3d96ad17187d60add3d1d8fbfbc5e572ceba134e5c533a5f75630a35514ee998b85a755085c04513dcc0047461d78f4aa8fdf0309fc39e3e4a1c24b4538acbf2366feaf", 0xea, 0x4}], 0x10000, &(0x7f0000002ec0)={[{@resize='resize', 0x2c}, {@noquota='noquota', 0x2c}, {@umask={'umask', 0x3d, [0x3f]}, 0x2c}]}) 2018/03/30 19:42:58 executing program 5: unshare(0x40000000) perf_event_open(&(0x7f000001d000)={0x0, 0x78, 0xe2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000000)={0x6, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0xa, 0x1, 0x0) ioctl(r0, 0x8982, &(0x7f0000000000)) r1 = socket$packet(0x11, 0x0, 0x300) r2 = openat$cuse(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/cuse\x00', 0x82, 0x0) io_setup(0x43f, &(0x7f00000000c0)=0x0) io_submit(r3, 0x1, &(0x7f0000000000)=[&(0x7f0000000200)={0x0, 0x0, 0x0, 0x1, 0x0, r2, &(0x7f0000000040)="10000000020400000000000000000000", 0x10}]) r4 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000280)='/proc/sys/net/ipv4/vs/secure_tcp\x00', 0x2, 0x0) sendmsg$kcm(r4, &(0x7f0000001f00)={&(0x7f0000001b40)=@pppol2tpin6={0x18, 0x1, {0x0, r1, 0x0, 0x1, 0x0, 0x0, {0xa, 0x4e24, 0xc1, @mcast1={0xff, 0x1, [], 0x1}}}}, 0x80, &(0x7f0000001d80)=[{&(0x7f0000001bc0)="a9db123ebf124fab0f2eec9774559e3b5870fb7c6818fc89c4b8742d057480657265ae2b34fb2d4e585d22ca1bf7b0a22ce38a20a819d919947c78f8d5c9f3291905fd3ed2b8ef8a79d9453396c6b0b7eb0778dbc49b32ae91e443b64edddcf320c1589c7777eadd4e57c01b20a8ca7a831e8e2c104d0194d52fb5c35b550f", 0x7f}], 0x1, &(0x7f0000001dc0)=ANY=[], 0x0, 0x90}, 0x20000000) r5 = syz_open_dev$tun(&(0x7f00000001c0)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r5, 0x400454ca, &(0x7f0000000200)={'bridge0\x00\x00p\x00', 0x4000000000001005}) socketpair(0x1d, 0x3, 0x40, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_inet_SIOCSIFADDR(r6, 0x8916, &(0x7f0000000100)={'bridge8\x00', {0x2, 0x0, @dev={0xac, 0x14, 0x14}}}) ioctl$LOOP_SET_FD(r2, 0x4c00, r1) ioctl$SNDRV_SEQ_IOCTL_RUNNING_MODE(0xffffffffffffffff, 0xc0105303, &(0x7f00000002c0)={0x2, 0x8}) add_key$keyring(&(0x7f00000000c0)='keyring\x00', &(0x7f0000000100)={0x73, 0x79, 0x7a}, 0x0, 0x0, 0x0) clone(0x0, &(0x7f0000000040), &(0x7f0000000080), &(0x7f0000000000), &(0x7f0000000100)) ioctl$int_in(0xffffffffffffffff, 0x800000c004500a, &(0x7f0000006ff8)) wait4(0x0, 0x0, 0x4, &(0x7f0000000380)) ioctl$sock_inet_sctp_SIOCINQ(r7, 0x541b, &(0x7f0000000180)) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_PORT(0xffffffffffffffff, 0xc0a85352, &(0x7f0000001980)={{}, 'port1\x00', 0x0, 0x20010, 0x1f, 0x0, 0x3, 0x40, 0x0, 0x0, 0x4, 0x6d1}) 2018/03/30 19:42:58 executing program 0: r0 = socket(0xa, 0x2, 0x0) flock(r0, 0x6) syz_genetlink_get_family_id$ipvs(&(0x7f0000000800)='IPVS\x00') sendmsg$IPVS_CMD_GET_INFO(r0, &(0x7f00000009c0)={&(0x7f0000000500)={0x10, 0x0, 0x0, 0x21100000}, 0xc, &(0x7f0000000980)={&(0x7f0000000cc0)=ANY=[@ANYBLOB="010e28bd7000fedbdf250f0000000800060003000000680001000800050001000000080001000a00000008000bf072697e0008000b00736970000c0907001000000028000000080001000a0000079f04040007c6752b11623f002000000003010000080006006c630000b025dabd001a08000b007369700014000300ffff000000000000753f1e443084836ddea0f0a4a342b7a636d9511db0ecc72260e701c8a317508761027697"], 0x1}, 0x1, 0x0, 0x0, 0x50}, 0x20000884) ioctl$sock_FIOGETOWN(r0, 0x8903, &(0x7f0000000200)) connect$inet6(r0, &(0x7f0000000100)={0xa, 0x0, 0x0, @mcast1={0xff, 0x1, [], 0x1}, 0x100000002}, 0x1c) setsockopt$inet_sctp_SCTP_STREAM_SCHEDULER(0xffffffffffffffff, 0x84, 0x7b, &(0x7f0000000400), 0x3ba) getsockopt$inet_opts(r0, 0x0, 0x4, &(0x7f0000000540)=""/99, &(0x7f0000000780)=0x28c77c4c79f525cf) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000b00)='./cgroup.cpu\x00', 0x200002, 0x0) fchdir(r1) fstat(0xffffffffffffffff, &(0x7f0000000180)) bind$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x4e21, @multicast1=0xe0000001}, 0x10) sendto$inet(0xffffffffffffffff, &(0x7f0000000a40)="45431bc153e49dc3c341afeff8a6a3782b30655dea8638a45a7a369ca5aebbc34e2d0227a019364ef806e574edc574801179b3c34145612db79a5340231421095dba2effc99687206c3416a0afabbea4ab2d17074a574429500a92adb41dfbc9e160349e8bb48b1d26e10c3e2571a99e857df6cdf0eb2dbb45810d2736bc2d4336341fa4ff52e263987db0cceea561f2a067a266e1b4f0ec69fca51d0e32", 0x9e, 0x3ffffff, &(0x7f0000000c00)={0x2, 0x4e23, @loopback=0x7f000001}, 0x10) r2 = creat(&(0x7f0000000100)='./file1\x00', 0x0) fallocate(r2, 0x1, 0x0, 0x20004d2d) setsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(r2, 0x84, 0x1f, &(0x7f00000008c0)={0x0, @in6={{0xa, 0x4e24, 0xf6, @dev={0xfe, 0x80, [], 0x15}, 0xfffffffffffffffa}}, 0x0, 0x9}, 0x90) ioctl$DRM_IOCTL_SET_VERSION(r2, 0xc0106407, &(0x7f00000000c0)={0x55c, 0x2, 0xffffffffffff5165, 0x4c}) socket$inet6_icmp(0xa, 0x2, 0x3a) sendmsg$inet_sctp(r0, &(0x7f000050dfc8)={&(0x7f0000000840)=@in6={0xa, 0x4e24, 0x80000001, @mcast1={0xff, 0x1, [], 0x1}}, 0x1c, &(0x7f00000005c0)=[{&(0x7f0000000600)="ddb0fca614307a89e95e5fa8ed42dd4a5db8d9c7754d370c015d3de409c09fbcba9bfd8373fa1087b0481045c437ee4759e31023f32bdf7959f9145181be7bf1eb760b78df4bd25bd26eb187667a5dcc3d43cd5c0f3e5af7c72185b319c42596e47ea4af5ee7854c9e47a62c1f6580f1cf7efc78f416af56fe4d11", 0x7b}], 0x1, &(0x7f0000576000)}, 0x0) sendto$inet6(r0, &(0x7f0000000240), 0x0, 0x40000, &(0x7f0000000280)={0xa, 0x4e23, 0x3, @local={0xfe, 0x80, [], 0xaa}, 0x9}, 0x1c) ioctl$DRM_IOCTL_AGP_ACQUIRE(r2, 0x6430) getpeername$packet(0xffffffffffffffff, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @broadcast}, &(0x7f0000000a00)=0x14) ioctl$sock_SIOCDELDLCI(0xffffffffffffffff, 0x8981, &(0x7f00000004c0)={'sit0\x00'}) getsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x22, &(0x7f0000000000)={{{@in=@multicast2, @in6=@dev}}, {{@in=@multicast1}, 0x0, @in6=@ipv4={[], [], @remote}}}, &(0x7f0000000140)=0xe8) getsockopt$inet_sctp6_SCTP_NODELAY(0xffffffffffffffff, 0x84, 0x3, &(0x7f0000000440), &(0x7f0000000480)=0x4) ioctl$TUNGETFEATURES(r2, 0x800454cf, &(0x7f00000002c0)) 2018/03/30 19:42:58 executing program 7: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f000099e000)={0x2, 0x0, @multicast1=0xe0000001}, 0x10) sendto$inet(r0, &(0x7f0000de1fff), 0xfffffffffffffd43, 0x20008005, &(0x7f0000db4ff0)={0x2, 0x4e20, @loopback=0x7f000001}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000af5000)='illinois\x00', 0x9) getsockopt$inet_tcp_buf(r0, 0x6, 0x1a, &(0x7f0000000000)=""/177, &(0x7f0000000100)=0xb1) 2018/03/30 19:42:58 executing program 2: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) readv(0xffffffffffffffff, &(0x7f0000001480), 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f00003b9fdc)) readv(r0, &(0x7f0000001980)=[{&(0x7f00000018c0)=""/182, 0xb6}], 0x1) r1 = syz_open_pts(r0, 0x2) socket$inet_sctp(0x2, 0x5, 0x84) dup3(r1, r0, 0x0) write(r0, &(0x7f0000c34fff), 0xffffff0b) socket$inet(0x2, 0x0, 0x0) setsockopt$bt_l2cap_L2CAP_OPTIONS(0xffffffffffffffff, 0x6, 0x1, &(0x7f0000000380)={0xefa, 0x800, 0x0, 0x0, 0x9}, 0xc) 2018/03/30 19:42:58 executing program 1: r0 = syz_open_dev$amidi(&(0x7f0000000040)='/dev/amidi#\x00', 0x3, 0x28000) ioctl$DRM_IOCTL_RES_CTX(r0, 0xc0086426, &(0x7f0000000100)={0x2c, &(0x7f00000000c0)=[{}, {}, {}, {}, {}, {}, {}, {}]}) socket$netlink(0x10, 0x3, 0xc) writev(0xffffffffffffffff, &(0x7f00000021c0), 0x0) bind$bt_l2cap(r0, &(0x7f0000000340)={0x1f, 0x800000000000002, {0x401, 0x3, 0xb, 0x3f8}}, 0x9) socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f0000a8d000)={&(0x7f0000c78ff4)={0x10}, 0xc, &(0x7f0000df6000)={&(0x7f0000000200)=ANY=[@ANYBLOB="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"], 0x10f}, 0x1}, 0x0) r1 = socket$inet_sctp(0x2, 0x5, 0x84) sendmsg$inet_sctp(r1, &(0x7f0000001f00)={&(0x7f0000001840)=@in={0x2, 0x0, @dev={0xac, 0x14, 0x14}}, 0x10, &(0x7f0000001c40), 0x0, &(0x7f0000001e40)}, 0x40) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000540)=@nat={'nat\x00', 0x19, 0x3, 0x376, [0x20000140, 0x0, 0x0, 0x20000170, 0x200002d0], 0x0, &(0x7f0000000100), &(0x7f00000006c0)=ANY=[@ANYBLOB="00000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000ffffffff01000000110000000000000000006e7230000000000000000000000000006772657461703000000000000000000074756e6c30000000000000000000000073797a6b616c6c657230000000000000ffffffffffff0000ff0000ffaaaaaaaaaaaaffff0000ffff000070000000b8000000e800000049444c4554494d45520000000000000000000000000000000000000000000000240000008100000073797a300000000000000000400000000000000000000000000000000100000061727072ffffff7f0000000000000000000000000000000000000000000000000c000000aaaaaaaaaabb00000000000000000000000000000000000000000000000000000000000000000000000000000000000001000000feffffff0000000000000000060000000000000000000000000000000000000000000000000000000000000001000000ffffffff020000000000000002000000880864756d6d79300000000000000000000062707130080000000000000000000000697036746e6c3000000000000000000073697430000000000000000000000000ffffffffffff000000000000aaaaaaaaaaaaffffffff00ff0000700000007000000098000000726564697265637400000000000000000000000000000000000000000000000004000000fcffffff0900000008000000000062726964676530000000000000000000697036746e6c3000000000000000000062637368300000000000000000000000766c616e300000000000000000000000000000000000ff00ff00ffffffffffffffff00ffffffff000000080100000801000030010000697076730000000000000000000000000000000000000000000000000000000028000000ac1414aa000000000000000000000000ffffffffffffff0000000000ff0000004e2400004e240008697076730000000000000000000000000000000000000000000000000000000028000000e0000001000000000000000000000000ffffffff000000ffffffffffff0000004e212b054e201f124155444954000000000000000000000000000000000000000000000000000000040000000000000075eb180f3829"]}, 0x3ee) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000002980)) getsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(0xffffffffffffffff, 0x84, 0x1f, &(0x7f0000000440)={0x0, @in={{0x2, 0x4e22, @multicast2=0xe0000002}}, 0x7bb7, 0x4}, &(0x7f0000000500)=0x90) getsockopt$inet_sctp_SCTP_RTOINFO(0xffffffffffffffff, 0x84, 0x0, &(0x7f0000002240)={0x0, 0x9, 0x417}, &(0x7f00000001c0)=0x10) r2 = socket(0x22, 0x4, 0x3) r3 = socket(0x20000001e, 0x5, 0x0) r4 = perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$packet_tx_ring(r3, 0x10f, 0x87, &(0x7f0000265000)=@req={0x3fc, 0x0, 0x1}, 0x10) getegid() setsockopt$packet_tx_ring(r2, 0x10f, 0x87, &(0x7f0000265000)=@req={0x3fc, 0x0, 0x1}, 0x10) writev(r2, &(0x7f00000000c0)=[{&(0x7f0000000000)="8a", 0x1}], 0x1) close(r2) close(r3) perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r5 = syz_open_dev$evdev(&(0x7f0000dfdfee)='/dev/input/event#\x00', 0x0, 0x2) readv(r5, &(0x7f0000019fe0)=[{&(0x7f00008ec000)=""/219, 0xdb}], 0x1) write$evdev(r5, &(0x7f000004d000)=[{{}, 0x0, 0x1}, {{0x2}}], 0x30) r6 = getpgrp(0x0) setsockopt$ax25_int(r3, 0x101, 0xd, &(0x7f0000000080)=0x7, 0x4) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x8, 0xfffffffffffffffd, 0x9, 0x7, 0x0, 0x8001, 0x0, 0x6, 0x3ff, 0x4, 0x5, 0x4, 0xbd9, 0x56, 0x8000, 0x7f, 0xff, 0xeba, 0x1f, 0x0, 0xfd, 0x3, 0x1, 0x50, 0x7, 0x9, 0x641800, 0x3ff8000000000000, 0x4, 0x0, 0x10000, 0x5, 0x7, 0x6, 0x1, 0xffffffffffffffe0, 0x0, 0x20, 0x0, @perf_bp={&(0x7f0000000040), 0x8}, 0x20, 0x401, 0x8, 0x3, 0x8, 0x7, 0x7}, r6, 0xc, r4, 0x0) syz_genetlink_get_family_id$ipvs(&(0x7f0000000040)='IPVS\x00') [ 497.938390] IPVS: ftp: loaded support on port[0] = 21 [ 497.946786] FAT-fs (loop4): Unrecognized mount option "time_offset=" or missing value 2018/03/30 19:42:59 executing program 7: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f000099e000)={0x2, 0x0, @multicast1=0xe0000001}, 0x10) sendto$inet(r0, &(0x7f0000de1fff), 0xfffffffffffffd43, 0x20008005, &(0x7f0000db4ff0)={0x2, 0x4e20, @loopback=0x7f000001}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000af5000)='illinois\x00', 0x9) getsockopt$inet_tcp_buf(r0, 0x6, 0x1a, &(0x7f0000000000)=""/177, &(0x7f0000000100)=0xb1) 2018/03/30 19:42:59 executing program 3: r0 = socket(0xa, 0x2, 0x0) flock(r0, 0x0) sendmsg$IPVS_CMD_GET_INFO(r0, &(0x7f00000009c0)={&(0x7f0000000500)={0x10}, 0xc, &(0x7f0000000980)={&(0x7f0000000a00)=ANY=[]}, 0x1}, 0x20000884) ioctl$sock_FIOGETOWN(r0, 0x8903, &(0x7f0000000200)) connect$inet6(0xffffffffffffffff, &(0x7f0000000100)={0xa, 0x0, 0x0, @mcast1={0xff, 0x1, [], 0x1}}, 0x1c) getsockopt$inet_sctp_SCTP_PRIMARY_ADDR(0xffffffffffffffff, 0x84, 0x6, &(0x7f00000002c0)={0x0, @in6={{0xa, 0x4e23, 0x0, @mcast2={0xff, 0x2, [], 0x1}, 0x7fffffff}}}, &(0x7f0000000380)=0x84) setsockopt$inet_sctp_SCTP_STREAM_SCHEDULER(0xffffffffffffffff, 0x84, 0x7b, &(0x7f0000000400)={r1}, 0x3ba) getsockopt$inet_opts(r0, 0x0, 0x9, &(0x7f0000000540)=""/99, &(0x7f0000000780)=0x63) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000140)='./cgroup.cpu\x00', 0x200002, 0x0) fchdir(r2) fstat(0xffffffffffffffff, &(0x7f0000000180)) bind$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x4e21, @multicast1=0xe0000001}, 0x10) sendto$inet(0xffffffffffffffff, &(0x7f00000003c0), 0x0, 0x20020003, &(0x7f0000000040)={0x2, 0x0, @loopback=0x7f000001}, 0x10) r3 = creat(&(0x7f0000000100)='./file1\x00', 0x0) fallocate(r3, 0x1, 0x0, 0x20004d2d) sendto$inet(0xffffffffffffffff, &(0x7f0000000000)="1356c1f7a6f170d95ec6cfc03678287eebc2e19824311a777e1aa31f415a944914fb741a2ba49c24009db00874f8ae73", 0x30, 0x0, &(0x7f0000000080)={0x2, 0x0, @broadcast=0xffffffff}, 0x10) socket$inet6_icmp(0xa, 0x2, 0x3a) sendmsg$inet_sctp(r0, &(0x7f000050dfc8)={&(0x7f0000000840)=@in6={0xa, 0x4e24, 0x80000001, @mcast1={0xff, 0x1, [], 0x1}}, 0x1c, &(0x7f00000005c0), 0x0, &(0x7f0000576000)}, 0x0) sendto$inet6(0xffffffffffffffff, &(0x7f0000000240)="6a14", 0x2, 0x40000, &(0x7f0000000280)={0xa, 0x0, 0x0, @local={0xfe, 0x80, [], 0xaa}}, 0x1c) accept(0xffffffffffffffff, &(0x7f00000006c0)=@llc={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @link_local}, &(0x7f0000000740)=0x80) getpeername$packet(0xffffffffffffffff, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @broadcast}, &(0x7f0000000800)=0x14) ioctl$sock_SIOCDELDLCI(r0, 0x8981, &(0x7f00000004c0)={'sit0\x00'}) getsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x22, &(0x7f0000000000)={{{@in=@multicast2, @in6=@dev}}, {{@in=@multicast1}, 0x0, @in6=@ipv4={[], [], @remote}}}, &(0x7f0000000140)=0xe8) ioctl$sock_inet6_SIOCDELRT(r0, 0x890c, &(0x7f0000000180)={@local={0xfe, 0x80, [], 0xaa}, @ipv4={[], [0xff, 0xff], @loopback=0x7f000001}, @local={0xfe, 0x80, [], 0xaa}, 0x0, 0x80000000}) getsockopt$inet_sctp6_SCTP_NODELAY(0xffffffffffffffff, 0x84, 0x3, &(0x7f0000000440), &(0x7f0000000480)=0xffffffffffffff98) [ 497.978805] kernel msg: ebtables bug: please report to author: EBT_ENTRY_OR_ENTRIES shouldn't be set in distinguisher [ 498.002673] EXT4-fs (loop4): VFS: Can't find ext4 filesystem 2018/03/30 19:42:59 executing program 0: r0 = open(&(0x7f0000000300)='./file0\x00', 0x0, 0x0) ioctl$TIOCGSID(r0, 0x5429, &(0x7f0000000380)) r1 = syz_open_procfs(0x0, &(0x7f0000001b80)="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") getsockopt$inet_sctp_SCTP_PEER_ADDR_THLDS(0xffffffffffffffff, 0x84, 0x1f, &(0x7f0000000440)={0x0, @in6={{0xa, 0x0, 0x0, @ipv4={[], [0xff, 0xff], @remote={0xac, 0x14, 0x14, 0xbb}}, 0x5}}}, &(0x7f00000001c0)=0x90) lsetxattr(&(0x7f0000001e00)='./file2\x00', &(0x7f0000001e40)=@random={'trusted.', '/dev/autofs\x00'}, &(0x7f0000001e80)='em0vmnet1eth0md5sum\x00', 0x14, 0x2) setsockopt$IP6T_SO_SET_ADD_COUNTERS(r0, 0x29, 0x41, &(0x7f0000001d00)={'security\x00', 0x2, [{}, {}]}, 0x48) r3 = socket$key(0xf, 0x3, 0x2) fcntl$setlease(0xffffffffffffffff, 0x400, 0x0) rename(&(0x7f0000000000)='./file0\x00', &(0x7f0000887ff8)='./file1\x00') geteuid() rt_sigprocmask(0x0, &(0x7f0000032ff8), 0x0, 0x8) clock_adjtime(0x0, &(0x7f0000000340)) r4 = openat$autofs(0xffffffffffffff9c, &(0x7f0000001cc0)='/dev/autofs\x00', 0x0, 0x0) sendmsg$key(r3, &(0x7f0000f56000)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f0000000080)=ANY=[@ANYBLOB="020300020e00000000000001020000000400080005000000000000000000001c00000000000000000000000000000000030006000000000002000000000000000000000000e10000020001000000000000d1fb0200000000030005000000000002000000e00000010001000000000000"], 0x70}, 0x1}, 0x0) ioctl$PERF_EVENT_IOC_DISABLE(r4, 0x2401, 0x4) fsync(r3) setsockopt$inet_sctp6_SCTP_RESET_ASSOC(r1, 0x84, 0x78, &(0x7f0000000240)=r2, 0x4) clone(0x0, &(0x7f0000001fc0)="9850de421c1296abfacc990e9d4583619894024a0eddd777b7c2864dc268e7cb7cab09dc2bd9514cdc0047d41d4d7e212448e8ee4e8ecd36dce9e3666c5fcd41cc489453844b595f078684b2c7acc800000000000000000000000000", &(0x7f0000001f00), &(0x7f0000001f40), &(0x7f0000002080)="0a4acf7ea573d4350379ea2b181968640e8c733ca11dbec097ead759b1b92aec1fdd751b6a4a463f73926f4f95e14b2f698e54efa645818322927eccd56142d05631dee453ef4b07fad6417d6c2bf20180e7a0beb60cfa96bc30a932e5328a6e568bd014272513dd9440fcbe") mlock2(&(0x7f0000a92000/0x1000)=nil, 0x1000, 0x0) r5 = openat(r1, &(0x7f0000000040)='./file0\x00', 0x0, 0xc2) getsockopt$inet_tcp_TCP_REPAIR_WINDOW(r0, 0x6, 0x1d, &(0x7f00000002c0), &(0x7f0000001b40)=0x14) recvmsg$netrom(r5, &(0x7f0000000180)={&(0x7f0000000100)=@ax25={0x3, {"5b8e655165822d"}, 0x6}, 0x10, &(0x7f0000000140), 0x0, &(0x7f0000000740)=[{0x28, 0x117, 0x2, "c8bc2e35c9ac62d2dc22a9470da052cfaa2e4ff457151d"}], 0x28, 0x40}, 0x40000000) mlock2(&(0x7f0000a91000/0x4000)=nil, 0x4000, 0x0) sendmsg$nl_xfrm(r1, &(0x7f0000001dc0)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000001d80)={&(0x7f0000000280)=@getsa={0x34, 0x12, 0x105, 0x70bd26, 0x9, {@in=@multicast2=0xe0000002, 0x4d4}, [@policy_type={0xc, 0x10, {0x1}}]}, 0x34}, 0x1}, 0x0) 2018/03/30 19:42:59 executing program 6: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_mreqn(r0, 0x0, 0x27, &(0x7f0000000000)={@multicast2=0xe0000002, @loopback=0x7f000001}, 0xc) getsockopt$inet_sctp6_SCTP_FRAGMENT_INTERLEAVE(0xffffffffffffffff, 0x84, 0x12, &(0x7f0000000080), &(0x7f00000000c0)=0x4) ioctl$sock_inet_SIOCGIFDSTADDR(0xffffffffffffffff, 0x8917, &(0x7f0000000040)={'bcsh0\x00', {0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x1a}}}) setsockopt$inet_sctp6_SCTP_MAX_BURST(0xffffffffffffffff, 0x84, 0x14, &(0x7f0000000380)=@int=0x3, 0x4) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000140)={'bcsh0\x00', 0x0}) ioctl$sock_inet6_SIOCDELRT(0xffffffffffffffff, 0x890c, &(0x7f0000000180)={@dev={0xfe, 0x80, [], 0x13}, @loopback={0x0, 0x1}, @mcast2={0xff, 0x2, [], 0x1}, 0x6, 0x0, 0x42e, 0x100, 0x9, 0x80000000, r1}) r2 = socket$inet(0x2, 0xa, 0x5) setsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX(r2, 0x84, 0x6e, &(0x7f0000000600)=[@in={0x2, 0x4e21, @multicast1=0xe0000001}, @in6={0xa, 0x4e20, 0x0, @remote={0xfe, 0x80, [], 0xbb}}, @in={0x2, 0x4e22, @multicast2=0xe0000002}, @in6={0xa, 0x4e21, 0x1ff, @local={0xfe, 0x80, [], 0xaa}, 0x84}, @in6={0xa, 0x4e20, 0x4, @local={0xfe, 0x80, [], 0xaa}}], 0x74) getsockopt$inet_sctp6_SCTP_PR_SUPPORTED(0xffffffffffffffff, 0x84, 0x71, &(0x7f0000000200)={0x0, 0x8}, &(0x7f0000000240)=0x8) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(0xffffffffffffffff, 0x84, 0x6f, &(0x7f0000000300)={r3, 0x70, &(0x7f0000000280)=[@in={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x12}}, @in={0x2, 0x4e24, @loopback=0x7f000001}, @in={0x2, 0x0, @remote={0xac, 0x14, 0x14, 0xbb}}, @in={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x1a}}, @in={0x2, 0x4e24, @remote={0xac, 0x14, 0x14, 0xbb}}, @in={0x2, 0x4e24, @rand_addr=0x3ff}, @in={0x2, 0x4e24, @multicast2=0xe0000002}]}, &(0x7f0000000340)=0x10) setsockopt$inet_sctp6_SCTP_SET_PEER_PRIMARY_ADDR(0xffffffffffffffff, 0x84, 0x5, &(0x7f00000004c0)={0x0, @in={{0x2, 0x4e20, @rand_addr=0x8}}}, 0x84) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, &(0x7f00000003c0)={'lo\x00', 0x4100}) ioctl$sock_inet_SIOCGIFNETMASK(0xffffffffffffffff, 0x891b, &(0x7f0000000100)={'nr0\x00', {0x2, 0x4e24, @loopback=0x7f000001}}) setsockopt$inet_msfilter(r0, 0x0, 0x29, &(0x7f0000000680)=ANY=[@ANYBLOB="cf0000000276d172390cc8c4ff4f3b746e5947c2ddb66a93ebb6d0f75b5f453435c311b94e126c49d47c10682b6e523d09fae1d416ebface98e08aa083e9f1f1afa118eb05655fec48d75d7a37edd032552c60ffeb53a2c8eecbe601a4ac5dceeecf1a943c2d9e2eaf4ad0a93e82a1a37a0cf2adbc4b512680428fee922ad18ff90ec6f87a75b299a953167bf4f9ae31cffd2c31dd47ba7d69151424dc1b2835f7624a302f270eb89118043dc1e1faa46e667be9cbf4456ad0c580ed032e4e49459f68f8a70f2dfe40f51362ffae"], 0x1) pread64(r0, &(0x7f0000000340)=""/181, 0xb5, 0x62) setsockopt$inet_msfilter(r0, 0x0, 0x29, &(0x7f0000000580)=ANY=[@ANYBLOB="e00000027f0000010000000001000000000000006b59aa51deb20d6efc9c04b7c9420f6434d31cbbe99b52873a8c21"], 0x1) socket$inet_udp(0x2, 0x2, 0x0) bpf$BPF_PROG_GET_NEXT_ID(0xb, &(0x7f0000000400)=0x7, 0x4) r5 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000ba4000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x2, 0x78, 0xe2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, r5, 0x0) r6 = perf_event_open(&(0x7f0000014f88)={0x1, 0x78, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00002e8000)}}, 0x0, 0x0, r5, 0x0) readv(r6, &(0x7f0000734000)=[{&(0x7f0000d42000)=""/146, 0x92}], 0x1) getsockopt$inet_sctp_SCTP_PEER_ADDR_THLDS(0xffffffffffffffff, 0x84, 0x1f, &(0x7f0000000480)={0x0, @in={{0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0xd}}}, 0xf80866d, 0x5}, &(0x7f0000000540)=0x90) getsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(0xffffffffffffff9c, 0x84, 0x18, &(0x7f0000000440)={r7, 0x400000000004}, &(0x7f00000005c0)=0xffffffffffffffc3) getsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER_VALUE(r0, 0x84, 0x7c, &(0x7f00000002c0)={r8, 0x10001, 0xc9e9}, &(0x7f0000000300)=0x8) [ 498.036172] BFS-fs: bfs_fill_super(): No BFS filesystem on loop4 (magic=00000000) 2018/03/30 19:42:59 executing program 7: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f000099e000)={0x2, 0x4e20, @multicast1=0xe0000001}, 0x10) sendto$inet(0xffffffffffffffff, &(0x7f0000de1fff), 0xfffffffffffffd43, 0x20008005, &(0x7f0000db4ff0)={0x2, 0x4e20, @loopback=0x7f000001}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000af5000)='illinois\x00', 0x9) getsockopt$inet_tcp_buf(r0, 0x6, 0x1a, &(0x7f0000000000)=""/177, &(0x7f0000000100)=0xb1) [ 498.077334] jfs: Unrecognized mount option "umask=?" or missing value 2018/03/30 19:42:59 executing program 4: symlinkat(&(0x7f0000002f00)='./file0\x00', 0xffffffffffffffff, &(0x7f0000002f80)='./file0\x00') syz_mount_image$msdos(&(0x7f0000002fc0)='msdos\x00', &(0x7f0000003000)='./file0\x00', 0x4, 0x1, &(0x7f0000003180)=[{&(0x7f0000003040)="eaf9610c9f7031a1f58e51e73b3f0bd5af4364c38bbe335dbd3d211ec0338ba4c795c634af757a3c684da6110f67891133a6303441b21d139e3a6582efdaeabd3d68dbcb85cd383733a98084b62807af0b7ea49d68daa4cc9fda43dbeb13c3e67c44c463a2c429ccb66c0e1a9dfd5c911d4d7b578baaad6571d4457b9c6d92122a4bd97f5f174c81081941b007062f2cab2db1466851dde671e025909a633fec433bb2512fc61c436b74df23d280019a403884dc488071", 0xb7, 0xcd7}], 0x8, &(0x7f00000031c0)={[{@errors_continue='errors=continue', 0x2c}, {@time_offset={'time_offset', 0x3d, [0x0]}, 0x2c}]}) pipe(&(0x7f0000002f40)={0xffffffffffffffff}) r1 = open(&(0x7f0000003240)='./file0\x00', 0xa0001, 0x20) linkat(r0, &(0x7f0000003200)='./file0\x00', r1, &(0x7f0000003280)='./file0\x00', 0x400) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x80000, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)}, {&(0x7f0000010d00)="0000000000000000000000000000000000000000000000000000000002ae0000ed41000000040000d15bbe5ad15bbe5ad15bbe5a00000000000005002000000000000800070000000af301000400000000000000000000000100000030000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a1950000", 0xa0, 0x8c60}, {&(0x7f0000011a00)="020000000c0001022e000000020000000c0002022e2e00000b00000014000a026c6f73742b666f756e6400000c0000001000050166696c65300000000d0000001000050266696c65310000000f0000001000050166696c6532000000100000001000050166696c6533000000110000001000050166696c65340000001200000010000802564944454f5f54531400000068031201d181d18ed0b7d0bad0b0d0bbd0bbd0b5d1800000000000000000000000000000000000000000000000000000", 0xc0, 0xc000}, {&(0x7f0000012200)="0000000000000000000000000000000000000000000000000c0000dec910dfd800000000f4030000000000000000000000000000000000000000000000000000", 0x40, 0x117e0}, {&(0x7f0000012a00)="0d0000000c0001022e000000020000000c0002022e2e00000e000000dc03050166696c6530000000000000000000000000000000000000000000000000000000", 0x40, 0x1c000}], 0x0, &(0x7f0000013000)) syz_mount_image$bfs(&(0x7f0000000040)='bfs\x00', &(0x7f00000008c0)='./file0\x00', 0x20, 0x2, &(0x7f0000000180)=[{&(0x7f00000005c0)="f37e57346e86cb5adec662d7bd6f13a3764d2ca7640f9f81ba88d0689d0989735a7bafd5558d9a6e8988f9f6038fa475e49077bc8cfc6e170c4cdbaaa1375895c9a4068559d3cecf2a0423caa696bf77a75b3ae3f32b79da059ca13d055647998987fc2033d008bd55deb08808372b9b4595fb0d79a1358cd5949d859a7d155e86db4b608eb401109f6b792f5ce4a2ead9870dee49347bc08d0d54b0e4fca4fd895947a737f4ee823d997770e5c9df50c0c9fe2c0b945c6ffd13b7151e385b631520ac34a5967c6cd0d12b3746795681600541c17d379daed41ce8e715eba582fb668e160872a2", 0xe7, 0x7}, {&(0x7f0000000780)="6154d093a5a905da96fed5f8dea36bcd9d1d011246f7caf86806bf6ac6301d2d2b448461b867bbbe7d0eebdeafa16d7219af85ff4372670039ce277546def59f1d0eed4be4386a34c7243fe3ec84ad3807136a2c3ec35d6d87a7d7bb9342622cc3a7ff529ef3d76ff57fc7a1856f50b98e518515a9e679067cfc0e8500754fa30a81cf4dc42c5a0d36647280c5b0a8506efaf9ad06594678176efe4bdbcf7ab384b597df4c5ad66b2bd240823abe04cd30785819f1c7fd4d46bb55f8bd09ca4b44618b010e363fa572ca189ec73b36ad46b6f38d65c0acc417", 0xd9, 0x5}], 0x200000, 0x0) syz_mount_image$jfs(&(0x7f0000000080)='jfs\x00', &(0x7f0000000880)='./file0\x00', 0xfffffffffffffffe, 0x3, &(0x7f0000002dc0)=[{&(0x7f0000000900)="efee47debce411554253d03f2175c060de26b9a7a197d9327971105aafdf17a061227fe7dd52d3c1c1f0318992f304f7646c3eb4e32ff0514d34d4605b4e152474aa71ac6c0ba890b1f249f213d5bc162b605fdf3c524d6f84e1a2f8461d26ef5dd50b193ffb710ee69fc431552ae4548f0c1a7e503243bb10c53c566f37e3234d8b3d418992dca946568d275e1f54895a854bab3790963108fe6ce5b1f933e81bd0aa2dfd715aca4bd81b48b28e3ee265", 0xb1, 0x1}, {&(0x7f0000001a80)="b4bc90ad72742e5693f04c7955b05460b33cd0ca9cde365dbe1671162a8c1db744cb8a04d1d747ab4d3234fd615e6ad897396c21b8bf7da2c1d524d04fadade841e5acfac529250a2c75fed4b65a7b6c8735268244189e020c526112728097958fd591d00cd16d1591db9b0414d985d7718794369eb03d89403b7df76f6d745c94d4fa986321a9915fea55a73472bc39620fcf22ec74d02b77fafe6ccf72605eb0ba7ae69fa10a36d281e65a178528bc654ce5b6109d5294e400b18be755a3b899489b27a876ac3ea033ed525b28c7dff537b5210cbff466dc339e1f58db1679816589e886264ef1bcf6d0e1408d93946827711972", 0xf5, 0x7}, {&(0x7f0000002cc0)="c9bc1928c9ffffe99fdae39f5013810a038f1d558affc92341c81ee308195dabd95fcfedcfccd4cf2af62477e5ed935114b73940dba239c47d5824a3332fb48cea682934a6840ea5db2529c3a7c371bbf08f08bb15458de586609be64b699f29b7384dc7b2ba78f0e343fb9851eaf5a7b4106fc5b7a8aaf6e069012286fa7259807928cbee722222f45e6c98cefa00829bcdd92bd03273c7b0f20453c72150adf49c311248d3d3d96ad17187d60add3d1d8fbfbc5e572ceba134e5c533a5f75630a35514ee998b85a755085c04513dcc0047461d78f4aa8fdf0309fc39e3e4a1c24b4538acbf2366feaf", 0xea, 0x4}], 0x10000, &(0x7f0000002ec0)={[{@resize='resize', 0x2c}, {@noquota='noquota', 0x2c}, {@umask={'umask', 0x3d, [0x3f]}, 0x2c}]}) 2018/03/30 19:42:59 executing program 3: r0 = memfd_create(&(0x7f00000002c0)='ramfs\x00', 0x0) ioctl$TCSETA(r0, 0x4030582a, &(0x7f0000000280)={0x0, 0x0, 0x3f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40000000000000d8}) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) getsockopt$inet_sctp_SCTP_GET_ASSOC_NUMBER(0xffffffffffffffff, 0x84, 0x1c, &(0x7f0000000200), &(0x7f0000000240)=0x4) setsockopt$inet_tcp_int(r1, 0x6, 0x80000000000002, &(0x7f0000ed4000)=0x78, 0x4) bind$inet(r1, &(0x7f0000deb000)={0x2, 0x4e23, @multicast1=0xe0000001}, 0x10) write$fuse(r0, &(0x7f0000000140)={0x20, 0x1, 0x0, @fuse_notify_inval_entry_out}, 0x20) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000f40ff8)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r1, &(0x7f0000a88f88), 0x29f, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @loopback=0x7f000001}, 0x10) sendmmsg(r1, &(0x7f00000025c0)=[{{&(0x7f0000000300)=@pppoe={0x18, 0x0, {0x4, @link_local={0x1, 0x80, 0xc2}, 'ip6tnl0\x00'}}, 0x80, &(0x7f0000000380)=[{&(0x7f00000010c0)="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", 0xb5c}], 0x1}}], 0x1, 0x0) shutdown(r1, 0x1) getsockopt$bt_BT_SNDMTU(0xffffffffffffffff, 0x112, 0xc, &(0x7f0000000180)=0xf4400000, &(0x7f00000001c0)=0x2) times(&(0x7f0000000100)) setsockopt$inet_udp_encap(0xffffffffffffffff, 0x11, 0x64, &(0x7f00000003c0), 0x4) ioctl$RNDCLEARPOOL(0xffffffffffffffff, 0x5206, &(0x7f0000000000)=0x4) setsockopt$inet6_MCAST_LEAVE_GROUP(0xffffffffffffffff, 0x29, 0x2d, &(0x7f0000000040)={0x0, {{0xa, 0x0, 0x8, @loopback={0x0, 0x1}}}}, 0x84) mmap$binder(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0x0, 0x2011, 0xffffffffffffffff, 0x0) 2018/03/30 19:42:59 executing program 7: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f000099e000)={0x2, 0x4e20, @multicast1=0xe0000001}, 0x10) sendto$inet(0xffffffffffffffff, &(0x7f0000de1fff), 0xfffffffffffffd43, 0x20008005, &(0x7f0000db4ff0)={0x2, 0x4e20, @loopback=0x7f000001}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000af5000)='illinois\x00', 0x9) getsockopt$inet_tcp_buf(r0, 0x6, 0x1a, &(0x7f0000000000)=""/177, &(0x7f0000000100)=0xb1) 2018/03/30 19:42:59 executing program 6: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_mreqn(r0, 0x0, 0x27, &(0x7f0000000000)={@multicast2=0xe0000002, @loopback=0x7f000001}, 0xc) getsockopt$inet_sctp6_SCTP_FRAGMENT_INTERLEAVE(0xffffffffffffffff, 0x84, 0x12, &(0x7f0000000080), &(0x7f00000000c0)=0x4) ioctl$sock_inet_SIOCGIFDSTADDR(0xffffffffffffffff, 0x8917, &(0x7f0000000040)={'bcsh0\x00', {0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x1a}}}) setsockopt$inet_sctp6_SCTP_MAX_BURST(0xffffffffffffffff, 0x84, 0x14, &(0x7f0000000380)=@int=0x3, 0x4) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000140)={'bcsh0\x00', 0x0}) ioctl$sock_inet6_SIOCDELRT(0xffffffffffffffff, 0x890c, &(0x7f0000000180)={@dev={0xfe, 0x80, [], 0x13}, @loopback={0x0, 0x1}, @mcast2={0xff, 0x2, [], 0x1}, 0x6, 0x0, 0x42e, 0x100, 0x9, 0x80000000, r1}) r2 = socket$inet(0x2, 0xa, 0x5) setsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX(r2, 0x84, 0x6e, &(0x7f0000000600)=[@in={0x2, 0x4e21, @multicast1=0xe0000001}, @in6={0xa, 0x4e20, 0x0, @remote={0xfe, 0x80, [], 0xbb}}, @in={0x2, 0x4e22, @multicast2=0xe0000002}, @in6={0xa, 0x4e21, 0x1ff, @local={0xfe, 0x80, [], 0xaa}, 0x84}, @in6={0xa, 0x4e20, 0x4, @local={0xfe, 0x80, [], 0xaa}}], 0x74) getsockopt$inet_sctp6_SCTP_PR_SUPPORTED(0xffffffffffffffff, 0x84, 0x71, &(0x7f0000000200)={0x0, 0x8}, &(0x7f0000000240)=0x8) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(0xffffffffffffffff, 0x84, 0x6f, &(0x7f0000000300)={r3, 0x70, &(0x7f0000000280)=[@in={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x12}}, @in={0x2, 0x4e24, @loopback=0x7f000001}, @in={0x2, 0x0, @remote={0xac, 0x14, 0x14, 0xbb}}, @in={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x1a}}, @in={0x2, 0x4e24, @remote={0xac, 0x14, 0x14, 0xbb}}, @in={0x2, 0x4e24, @rand_addr=0x3ff}, @in={0x2, 0x4e24, @multicast2=0xe0000002}]}, &(0x7f0000000340)=0x10) setsockopt$inet_sctp6_SCTP_SET_PEER_PRIMARY_ADDR(0xffffffffffffffff, 0x84, 0x5, &(0x7f00000004c0)={r4, @in={{0x2, 0x0, @rand_addr=0x8}}}, 0x84) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, &(0x7f00000003c0)={'lo\x00', 0x4100}) ioctl$sock_inet_SIOCGIFNETMASK(0xffffffffffffffff, 0x891b, &(0x7f0000000100)={'nr0\x00', {0x2, 0x4e24, @loopback=0x7f000001}}) setsockopt$inet_msfilter(r0, 0x0, 0x29, &(0x7f0000000680)=ANY=[@ANYBLOB="cf0000000276d172390cc8c4ff4f3b746e5947c2ddb66a93ebb6d0f75b5f453435c311b94e126c49d47c10682b6e523d09fae1d416ebface98e08aa083e9f1f1afa118eb05655fec48d75d7a37edd032552c60ffeb53a2c8eecbe601a4ac5dceeecf1a943c2d9e2eaf4ad0a93e82a1a37a0cf2adbc4b512680428fee922ad18ff90ec6f87a75b299a953167bf4f9ae31cffd2c31dd47ba7d69151424dc1b2835f7624a302f270eb89118043dc1e1faa46e667be9cbf4456ad0c580ed032e4e49459f68f8a70f2dfe40f51362ffae"], 0x1) pread64(r0, &(0x7f0000000340)=""/181, 0xb5, 0x62) setsockopt$inet_msfilter(r0, 0x0, 0x29, &(0x7f0000000580)=ANY=[@ANYBLOB="e00000027f0000010000000001000000000000006b59aa51deb20d6efc9c04b7c9420f6434d31cbbe99b52873a8c21"], 0x1) socket$inet_udp(0x2, 0x2, 0x0) bpf$BPF_PROG_GET_NEXT_ID(0xb, &(0x7f0000000400)=0x7, 0x4) r5 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000ba4000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x2, 0x78, 0xe2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, r5, 0x0) r6 = perf_event_open(&(0x7f0000014f88)={0x1, 0x78, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00002e8000)}}, 0x0, 0x0, r5, 0x0) readv(r6, &(0x7f0000734000)=[{&(0x7f0000d42000)=""/146, 0x92}], 0x1) getsockopt$inet_sctp_SCTP_PEER_ADDR_THLDS(0xffffffffffffffff, 0x84, 0x1f, &(0x7f0000000480)={0x0, @in={{0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0xd}}}, 0xf80866d, 0x5}, &(0x7f0000000540)=0x90) getsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(0xffffffffffffff9c, 0x84, 0x18, &(0x7f0000000440)={r7, 0x400000000004}, &(0x7f00000005c0)=0xffffffffffffffc3) getsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER_VALUE(r0, 0x84, 0x7c, &(0x7f00000002c0)={r8, 0x10001, 0xc9e9}, &(0x7f0000000300)=0x8) [ 498.200147] FAT-fs (loop4): Unrecognized mount option "time_offset=" or missing value 2018/03/30 19:43:00 executing program 7: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f000099e000)={0x2, 0x4e20, @multicast1=0xe0000001}, 0x10) sendto$inet(0xffffffffffffffff, &(0x7f0000de1fff), 0xfffffffffffffd43, 0x20008005, &(0x7f0000db4ff0)={0x2, 0x4e20, @loopback=0x7f000001}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000af5000)='illinois\x00', 0x9) getsockopt$inet_tcp_buf(r0, 0x6, 0x1a, &(0x7f0000000000)=""/177, &(0x7f0000000100)=0xb1) 2018/03/30 19:43:00 executing program 4: symlinkat(&(0x7f0000002f00)='./file0\x00', 0xffffffffffffffff, &(0x7f0000002f80)='./file0\x00') syz_mount_image$msdos(&(0x7f0000002fc0)='msdos\x00', &(0x7f0000003000)='./file0\x00', 0x4, 0x1, &(0x7f0000003180)=[{&(0x7f0000003040)="eaf9610c9f7031a1f58e51e73b3f0bd5af4364c38bbe335dbd3d211ec0338ba4c795c634af757a3c684da6110f67891133a6303441b21d139e3a6582efdaeabd3d68dbcb85cd383733a98084b62807af0b7ea49d68daa4cc9fda43dbeb13c3e67c44c463a2c429ccb66c0e1a9dfd5c911d4d7b578baaad6571d4457b9c6d92122a4bd97f5f174c81081941b007062f2cab2db1466851dde671e025909a633fec433bb2512fc61c436b74df23d280019a403884dc488071", 0xb7, 0xcd7}], 0x8, &(0x7f00000031c0)={[{@errors_continue='errors=continue', 0x2c}, {@time_offset={'time_offset', 0x3d, [0x0]}, 0x2c}]}) pipe(&(0x7f0000002f40)={0xffffffffffffffff}) r1 = open(&(0x7f0000003240)='./file0\x00', 0xa0001, 0x20) linkat(r0, &(0x7f0000003200)='./file0\x00', r1, &(0x7f0000003280)='./file0\x00', 0x400) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x80000, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)}, {&(0x7f0000010d00)="0000000000000000000000000000000000000000000000000000000002ae0000ed41000000040000d15bbe5ad15bbe5ad15bbe5a00000000000005002000000000000800070000000af301000400000000000000000000000100000030000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a1950000", 0xa0, 0x8c60}, {&(0x7f0000011a00)="020000000c0001022e000000020000000c0002022e2e00000b00000014000a026c6f73742b666f756e6400000c0000001000050166696c65300000000d0000001000050266696c65310000000f0000001000050166696c6532000000100000001000050166696c6533000000110000001000050166696c65340000001200000010000802564944454f5f54531400000068031201d181d18ed0b7d0bad0b0d0bbd0bbd0b5d1800000000000000000000000000000000000000000000000000000", 0xc0, 0xc000}, {&(0x7f0000012200)="0000000000000000000000000000000000000000000000000c0000dec910dfd800000000f4030000000000000000000000000000000000000000000000000000", 0x40, 0x117e0}, {&(0x7f0000012a00)="0d0000000c0001022e000000020000000c0002022e2e00000e000000dc03050166696c6530000000000000000000000000000000000000000000000000000000", 0x40, 0x1c000}], 0x0, &(0x7f0000013000)) syz_mount_image$bfs(&(0x7f0000000040)='bfs\x00', &(0x7f00000008c0)='./file0\x00', 0x20, 0x2, &(0x7f0000000180)=[{&(0x7f00000005c0)="f37e57346e86cb5adec662d7bd6f13a3764d2ca7640f9f81ba88d0689d0989735a7bafd5558d9a6e8988f9f6038fa475e49077bc8cfc6e170c4cdbaaa1375895c9a4068559d3cecf2a0423caa696bf77a75b3ae3f32b79da059ca13d055647998987fc2033d008bd55deb08808372b9b4595fb0d79a1358cd5949d859a7d155e86db4b608eb401109f6b792f5ce4a2ead9870dee49347bc08d0d54b0e4fca4fd895947a737f4ee823d997770e5c9df50c0c9fe2c0b945c6ffd13b7151e385b631520ac34a5967c6cd0d12b3746795681600541c17d379daed41ce8e715eba582fb668e160872a2", 0xe7, 0x7}, {&(0x7f0000000780)="6154d093a5a905da96fed5f8dea36bcd9d1d011246f7caf86806bf6ac6301d2d2b448461b867bbbe7d0eebdeafa16d7219af85ff4372670039ce277546def59f1d0eed4be4386a34c7243fe3ec84ad3807136a2c3ec35d6d87a7d7bb9342622cc3a7ff529ef3d76ff57fc7a1856f50b98e518515a9e679067cfc0e8500754fa30a81cf4dc42c5a0d36647280c5b0a8506efaf9ad06594678176efe4bdbcf7ab384b597df4c5ad66b2bd240823abe04cd30785819f1c7fd4d46bb55f8bd09ca4b44618b010e363fa572ca189ec73b36ad46b6f38d65c0acc417", 0xd9, 0x5}], 0x200000, 0x0) syz_mount_image$jfs(&(0x7f0000000080)='jfs\x00', &(0x7f0000000880)='./file0\x00', 0xfffffffffffffffe, 0x3, &(0x7f0000002dc0)=[{&(0x7f0000000900)="efee47debce411554253d03f2175c060de26b9a7a197d9327971105aafdf17a061227fe7dd52d3c1c1f0318992f304f7646c3eb4e32ff0514d34d4605b4e152474aa71ac6c0ba890b1f249f213d5bc162b605fdf3c524d6f84e1a2f8461d26ef5dd50b193ffb710ee69fc431552ae4548f0c1a7e503243bb10c53c566f37e3234d8b3d418992dca946568d275e1f54895a854bab3790963108fe6ce5b1f933e81bd0aa2dfd715aca4bd81b48b28e3ee265", 0xb1, 0x1}, {&(0x7f0000001a80)="b4bc90ad72742e5693f04c7955b05460b33cd0ca9cde365dbe1671162a8c1db744cb8a04d1d747ab4d3234fd615e6ad897396c21b8bf7da2c1d524d04fadade841e5acfac529250a2c75fed4b65a7b6c8735268244189e020c526112728097958fd591d00cd16d1591db9b0414d985d7718794369eb03d89403b7df76f6d745c94d4fa986321a9915fea55a73472bc39620fcf22ec74d02b77fafe6ccf72605eb0ba7ae69fa10a36d281e65a178528bc654ce5b6109d5294e400b18be755a3b899489b27a876ac3ea033ed525b28c7dff537b5210cbff466dc339e1f58db1679816589e886264ef1bcf6d0e1408d93946827711972", 0xf5, 0x7}, {&(0x7f0000002cc0)="c9bc1928c9ffffe99fdae39f5013810a038f1d558affc92341c81ee308195dabd95fcfedcfccd4cf2af62477e5ed935114b73940dba239c47d5824a3332fb48cea682934a6840ea5db2529c3a7c371bbf08f08bb15458de586609be64b699f29b7384dc7b2ba78f0e343fb9851eaf5a7b4106fc5b7a8aaf6e069012286fa7259807928cbee722222f45e6c98cefa00829bcdd92bd03273c7b0f20453c72150adf49c311248d3d3d96ad17187d60add3d1d8fbfbc5e572ceba134e5c533a5f75630a35514ee998b85a755085c04513dcc0047461d78f4aa8fdf0309fc39e3e4a1c24b4538acbf2366feaf", 0xea, 0x4}], 0x10000, &(0x7f0000002ec0)={[{@resize='resize', 0x2c}, {@noquota='noquota', 0x2c}, {@umask={'umask', 0x3d, [0x3f]}, 0x2c}]}) 2018/03/30 19:43:00 executing program 0: r0 = syz_open_dev$tun(&(0x7f00000004c0)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'ip6tnl0\x00', 0x9516}) close(r0) capset(&(0x7f0000000000), &(0x7f0000000040)={0x3, 0x0, 0x0, 0x0, 0x0, 0x10001}) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000044ff8)) ioctl$SIOCGIFHWADDR(r0, 0x8927, &(0x7f0000000100)) setsockopt$SO_VM_SOCKETS_CONNECT_TIMEOUT(0xffffffffffffffff, 0x28, 0x6, &(0x7f0000000000)={0x77359400}, 0x10) sendmmsg$unix(0xffffffffffffffff, &(0x7f00000bd000), 0x80, 0x0) alarm(0x100000000) poll(&(0x7f0000084ff0)=[{0xffffffffffffffff, 0xc1a6}], 0x20000000000000b5, 0x0) r1 = dup2(0xffffffffffffffff, 0xffffffffffffffff) openat$sequencer(0xffffffffffffff9c, &(0x7f0000000180)='/dev/sequencer\x00', 0x2, 0x0) ioctl$TIOCGPGRP(r1, 0x540f, &(0x7f0000000300)) fcntl$getownex(r0, 0x10, &(0x7f0000000480)) ioctl$TIOCGPGRP(r1, 0x540f, &(0x7f0000000500)) getpgid(0x0) fcntl$getown(r1, 0x9) unshare(0x8000000) getsockopt$inet_sctp_SCTP_DEFAULT_SEND_PARAM(0xffffffffffffffff, 0x84, 0xa, &(0x7f00000003c0)={0x200, 0x5, 0x200, 0x0, 0x0, 0x8001, 0x0, 0x7f, 0x0}, &(0x7f0000000400)=0x20) getsockopt$inet_sctp_SCTP_PARTIAL_DELIVERY_POINT(0xffffffffffffffff, 0x84, 0x13, &(0x7f0000000280)={r2, 0x3}, &(0x7f00000002c0)=0x8) getsockopt$inet_sctp_SCTP_PARTIAL_DELIVERY_POINT(0xffffffffffffffff, 0x84, 0x13, &(0x7f0000000300)={r3}, &(0x7f0000000340)=0x8) getresgid(&(0x7f0000000680), &(0x7f00000006c0)=0x0, &(0x7f0000000700)) stat(&(0x7f0000000780)='./file0\x00', &(0x7f00000007c0)) setsockopt$inet6_icmp_ICMP_FILTER(0xffffffffffffffff, 0x1, 0x1, &(0x7f0000000880)={0x8001}, 0x4) setresgid(r4, 0x0, 0x0) renameat(0xffffffffffffffff, &(0x7f00000005c0)='./file0\x00', 0xffffffffffffffff, &(0x7f0000000640)='./file0\x00') ioctl$DRM_IOCTL_GEM_FLINK(0xffffffffffffffff, 0xc008640a, &(0x7f0000000180)) 2018/03/30 19:43:00 executing program 2: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) readv(0xffffffffffffffff, &(0x7f0000001480), 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f00003b9fdc)) readv(r0, &(0x7f0000001980)=[{&(0x7f00000018c0)=""/182, 0xb6}], 0x1) r1 = syz_open_pts(r0, 0x2) socket$inet_sctp(0x2, 0x5, 0x84) dup3(r1, r0, 0x0) write(r0, &(0x7f0000c34fff), 0xffffff0b) socket$inet(0x2, 0x0, 0x0) setsockopt$bt_l2cap_L2CAP_OPTIONS(0xffffffffffffffff, 0x6, 0x1, &(0x7f0000000380)={0xefa, 0x800, 0x0, 0x0, 0x9}, 0xc) 2018/03/30 19:43:00 executing program 6: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_mreqn(r0, 0x0, 0x27, &(0x7f0000000000)={@multicast2=0xe0000002, @loopback=0x7f000001}, 0xc) getsockopt$inet_sctp6_SCTP_FRAGMENT_INTERLEAVE(0xffffffffffffffff, 0x84, 0x12, &(0x7f0000000080), &(0x7f00000000c0)=0x4) ioctl$sock_inet_SIOCGIFDSTADDR(0xffffffffffffffff, 0x8917, &(0x7f0000000040)={'bcsh0\x00', {0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x1a}}}) setsockopt$inet_sctp6_SCTP_MAX_BURST(0xffffffffffffffff, 0x84, 0x14, &(0x7f0000000380)=@int=0x3, 0x4) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000140)={'bcsh0\x00', 0x0}) ioctl$sock_inet6_SIOCDELRT(0xffffffffffffffff, 0x890c, &(0x7f0000000180)={@dev={0xfe, 0x80, [], 0x13}, @loopback={0x0, 0x1}, @mcast2={0xff, 0x2, [], 0x1}, 0x6, 0x0, 0x42e, 0x100, 0x9, 0x80000000, r1}) r2 = socket$inet(0x2, 0xa, 0x5) setsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX(r2, 0x84, 0x6e, &(0x7f0000000600)=[@in={0x2, 0x4e21, @multicast1=0xe0000001}, @in6={0xa, 0x4e20, 0x0, @remote={0xfe, 0x80, [], 0xbb}}, @in={0x2, 0x4e22, @multicast2=0xe0000002}, @in6={0xa, 0x4e21, 0x1ff, @local={0xfe, 0x80, [], 0xaa}, 0x84}, @in6={0xa, 0x4e20, 0x4, @local={0xfe, 0x80, [], 0xaa}}], 0x74) getsockopt$inet_sctp6_SCTP_PR_SUPPORTED(0xffffffffffffffff, 0x84, 0x71, &(0x7f0000000200)={0x0, 0x8}, &(0x7f0000000240)=0x8) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(0xffffffffffffffff, 0x84, 0x6f, &(0x7f0000000300)={r3, 0x70, &(0x7f0000000280)=[@in={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x12}}, @in={0x2, 0x4e24, @loopback=0x7f000001}, @in={0x2, 0x0, @remote={0xac, 0x14, 0x14, 0xbb}}, @in={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x1a}}, @in={0x2, 0x4e24, @remote={0xac, 0x14, 0x14, 0xbb}}, @in={0x2, 0x4e24, @rand_addr=0x3ff}, @in={0x2, 0x4e24, @multicast2=0xe0000002}]}, &(0x7f0000000340)=0x10) setsockopt$inet_sctp6_SCTP_SET_PEER_PRIMARY_ADDR(0xffffffffffffffff, 0x84, 0x5, &(0x7f00000004c0)={r4, @in={{0x2, 0x0, @rand_addr=0x8}}}, 0x84) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, &(0x7f00000003c0)={'lo\x00', 0x4100}) ioctl$sock_inet_SIOCGIFNETMASK(0xffffffffffffffff, 0x891b, &(0x7f0000000100)={'nr0\x00', {0x2, 0x4e24, @loopback=0x7f000001}}) setsockopt$inet_msfilter(r0, 0x0, 0x29, &(0x7f0000000680)=ANY=[@ANYBLOB="cf0000000276d172390cc8c4ff4f3b746e5947c2ddb66a93ebb6d0f75b5f453435c311b94e126c49d47c10682b6e523d09fae1d416ebface98e08aa083e9f1f1afa118eb05655fec48d75d7a37edd032552c60ffeb53a2c8eecbe601a4ac5dceeecf1a943c2d9e2eaf4ad0a93e82a1a37a0cf2adbc4b512680428fee922ad18ff90ec6f87a75b299a953167bf4f9ae31cffd2c31dd47ba7d69151424dc1b2835f7624a302f270eb89118043dc1e1faa46e667be9cbf4456ad0c580ed032e4e49459f68f8a70f2dfe40f51362ffae"], 0x1) pread64(r0, &(0x7f0000000340)=""/181, 0xb5, 0x62) setsockopt$inet_msfilter(r0, 0x0, 0x29, &(0x7f0000000580)=ANY=[@ANYBLOB="e00000027f0000010000000001000000000000006b59aa51deb20d6efc9c04b7c9420f6434d31cbbe99b52873a8c21"], 0x1) socket$inet_udp(0x2, 0x2, 0x0) bpf$BPF_PROG_GET_NEXT_ID(0xb, &(0x7f0000000400)=0x7, 0x4) r5 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000ba4000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x2, 0x78, 0xe2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, r5, 0x0) r6 = perf_event_open(&(0x7f0000014f88)={0x1, 0x78, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00002e8000)}}, 0x0, 0x0, r5, 0x0) readv(r6, &(0x7f0000734000)=[{&(0x7f0000d42000)=""/146, 0x92}], 0x1) getsockopt$inet_sctp_SCTP_PEER_ADDR_THLDS(0xffffffffffffffff, 0x84, 0x1f, &(0x7f0000000480)={0x0, @in={{0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0xd}}}, 0xf80866d, 0x5}, &(0x7f0000000540)=0x90) getsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(0xffffffffffffff9c, 0x84, 0x18, &(0x7f0000000440)={r7, 0x400000000004}, &(0x7f00000005c0)=0xffffffffffffffc3) getsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER_VALUE(r0, 0x84, 0x7c, &(0x7f00000002c0)={r8, 0x10001, 0xc9e9}, &(0x7f0000000300)=0x8) 2018/03/30 19:43:00 executing program 3: socket(0x10, 0x0, 0x0) r0 = socket$inet6(0xa, 0x2000000802, 0x0) connect$inet6(r0, &(0x7f000000cfe4)={0xa}, 0x1c) sendto$inet6(r0, &(0x7f0000000000), 0x0, 0x0, &(0x7f0000000100)={0xa, 0x0, 0x0, @dev={0xfe, 0x80}}, 0x1c) openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000200)='/dev/vga_arbiter\x00', 0x440000, 0x0) getsockopt$inet_sctp6_SCTP_RTOINFO(r0, 0x84, 0x0, &(0x7f0000000ec0)={0x0, 0x8, 0x7ff}, &(0x7f0000000f00)=0x10) getsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX3(0xffffffffffffffff, 0x84, 0x6f, &(0x7f0000000f80)={0x0, 0x2c, &(0x7f0000000f40)=[@in={0x2, 0x4e23, @dev={0xac, 0x14, 0x14}}, @in6={0xa, 0x4e22, 0x10001, @ipv4={[], [0xff, 0xff], @local={0xac, 0x14, 0x14, 0xaa}}, 0xfff}]}, &(0x7f0000000fc0)=0x10) syz_open_dev$sg(&(0x7f0000000300)='/dev/sg#\x00', 0xfffffffffffffff7, 0x800) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$sock_linger(0xffffffffffffffff, 0x1, 0xd, &(0x7f00000003c0), &(0x7f0000000400)=0x8) bind$inet6(r2, &(0x7f0000000000)={0xa, 0x4e22}, 0x1c) r3 = openat$rfkill(0xffffffffffffff9c, &(0x7f0000000300)='/dev/rfkill\x00', 0x0, 0x0) listen(r2, 0x0) sendto$inet6(r1, &(0x7f0000f6f000), 0x1000000c4, 0x20000001, &(0x7f0000faafe4)={0xa, 0x4e22}, 0x1c) sendmsg(r1, &(0x7f0000000b00)={&(0x7f0000000440)=@in={0x2, 0x4e24, @multicast1=0xe0000001}, 0x80, &(0x7f0000000a80), 0x0, &(0x7f0000001600)=ANY=[], 0x0, 0x80000}, 0x0) setsockopt$inet6_tcp_TCP_REPAIR_WINDOW(r1, 0x6, 0x1d, &(0x7f00000015c0)={0x0, 0x0, 0x9, 0x1e000004}, 0xfd9b) r4 = accept4(r1, &(0x7f0000000580)=@alg, &(0x7f0000000040)=0x222, 0x400000080800) getsockname$packet(r3, &(0x7f0000000900)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @dev}, &(0x7f0000000940)=0x14) sendto$packet(r4, &(0x7f0000000880)="47d82f4ee2f635e2e20450e412b0220acf243910ddbe76aa3a2361f0b552fa5080b53e8ce74b03e9c5f56ed3a13eebb299bb4be847774442d083280fec30813686eb7d6d00a7fc10de0b6b585e579b067e0cd3f397fc7737b38588f0bfa6d14ad61ee6", 0x63, 0x10, &(0x7f0000000980)={0x11, 0x1f, 0x0, 0x1, 0x0, 0x6, @remote={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xbb}}, 0x14) getsockopt$inet_dccp_buf(0xffffffffffffffff, 0x21, 0xf, &(0x7f0000000140)=""/86, &(0x7f00000001c0)=0x56) socket$nl_netfilter(0x10, 0x3, 0xc) getsockopt$inet_sctp_SCTP_PR_ASSOC_STATUS(0xffffffffffffffff, 0x84, 0x73, &(0x7f0000001000)={0x0, 0xf5, 0x0, 0x0, 0x5}, &(0x7f0000001040)=0xffffffffffffff65) r5 = syz_open_procfs(0x0, &(0x7f0000000700)="6664001a000000") getdents64(r5, &(0x7f00000004c0)=""/189, 0xabf70f75d9c5643) ioctl$fiemap(0xffffffffffffffff, 0xc020660b, &(0x7f0000000600)=ANY=[@ANYBLOB="0000010000000000810000000000000007000000ffffffff0200000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000208"]) lseek(0xffffffffffffffff, 0x0, 0x0) ioctl$DRM_IOCTL_GET_CLIENT(0xffffffffffffffff, 0xc0286405, &(0x7f0000000480)={0xfff, 0x0, 0x0, 0x0, 0x0, 0x280000000000000, 0x0, 0x3}) 2018/03/30 19:43:00 executing program 5: unshare(0x40000000) perf_event_open(&(0x7f000001d000)={0x0, 0x78, 0xe2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000000)={0x6, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0xa, 0x1, 0x0) ioctl(r0, 0x8982, &(0x7f0000000000)) r1 = socket$packet(0x11, 0x0, 0x300) r2 = openat$cuse(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/cuse\x00', 0x82, 0x0) io_setup(0x43f, &(0x7f00000000c0)=0x0) io_submit(r3, 0x1, &(0x7f0000000000)=[&(0x7f0000000200)={0x0, 0x0, 0x0, 0x1, 0x0, r2, &(0x7f0000000040)="10000000020400000000000000000000", 0x10}]) r4 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000280)='/proc/sys/net/ipv4/vs/secure_tcp\x00', 0x2, 0x0) sendmsg$kcm(r4, &(0x7f0000001f00)={&(0x7f0000001b40)=@pppol2tpin6={0x18, 0x1, {0x0, r1, 0x0, 0x1, 0x0, 0x0, {0xa, 0x4e24, 0xc1, @mcast1={0xff, 0x1, [], 0x1}}}}, 0x80, &(0x7f0000001d80)=[{&(0x7f0000001bc0)="a9db123ebf124fab0f2eec9774559e3b5870fb7c6818fc89c4b8742d057480657265ae2b34fb2d4e585d22ca1bf7b0a22ce38a20a819d919947c78f8d5c9f3291905fd3ed2b8ef8a79d9453396c6b0b7eb0778dbc49b32ae91e443b64edddcf320c1589c7777eadd4e57c01b20a8ca7a831e8e2c104d0194d52fb5c35b550f", 0x7f}], 0x1, &(0x7f0000001dc0)=ANY=[], 0x0, 0x90}, 0x20000000) r5 = syz_open_dev$tun(&(0x7f00000001c0)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r5, 0x400454ca, &(0x7f0000000200)={'bridge0\x00\x00p\x00', 0x4000000000001005}) socketpair(0x1d, 0x3, 0x40, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_inet_SIOCSIFADDR(r6, 0x8916, &(0x7f0000000100)={'bridge8\x00', {0x2, 0x0, @dev={0xac, 0x14, 0x14}}}) ioctl$LOOP_SET_FD(r2, 0x4c00, r1) ioctl$SNDRV_SEQ_IOCTL_RUNNING_MODE(0xffffffffffffffff, 0xc0105303, &(0x7f00000002c0)={0x2, 0x8}) add_key$keyring(&(0x7f00000000c0)='keyring\x00', &(0x7f0000000100)={0x73, 0x79, 0x7a}, 0x0, 0x0, 0x0) clone(0x0, &(0x7f0000000040), &(0x7f0000000080), &(0x7f0000000000), &(0x7f0000000100)) ioctl$int_in(0xffffffffffffffff, 0x800000c004500a, &(0x7f0000006ff8)) wait4(0x0, 0x0, 0x4, &(0x7f0000000380)) ioctl$sock_inet_sctp_SIOCINQ(r7, 0x541b, &(0x7f0000000180)) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_PORT(0xffffffffffffffff, 0xc0a85352, &(0x7f0000001980)={{}, 'port1\x00', 0x0, 0x20010, 0x1f, 0x0, 0x3, 0x40, 0x0, 0x0, 0x4, 0x6d1}) 2018/03/30 19:43:00 executing program 1: r0 = syz_open_dev$amidi(&(0x7f0000000040)='/dev/amidi#\x00', 0x3, 0x28000) ioctl$DRM_IOCTL_RES_CTX(r0, 0xc0086426, &(0x7f0000000100)={0x2c, &(0x7f00000000c0)=[{}, {}, {}, {}, {}, {}, {}, {}]}) socket$netlink(0x10, 0x3, 0xc) writev(0xffffffffffffffff, &(0x7f00000021c0), 0x0) bind$bt_l2cap(r0, &(0x7f0000000340)={0x1f, 0x800000000000002, {0x401, 0x3, 0xb, 0x3f8}}, 0x9) socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f0000a8d000)={&(0x7f0000c78ff4)={0x10}, 0xc, &(0x7f0000df6000)={&(0x7f0000000200)=ANY=[@ANYBLOB="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"], 0x10f}, 0x1}, 0x0) r1 = socket$inet_sctp(0x2, 0x5, 0x84) sendmsg$inet_sctp(r1, &(0x7f0000001f00)={&(0x7f0000001840)=@in={0x2, 0x0, @dev={0xac, 0x14, 0x14}}, 0x10, &(0x7f0000001c40), 0x0, &(0x7f0000001e40)}, 0x40) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000540)=@nat={'nat\x00', 0x19, 0x3, 0x376, [0x20000140, 0x0, 0x0, 0x20000170, 0x200002d0], 0x0, &(0x7f0000000100), &(0x7f00000006c0)=ANY=[@ANYBLOB="00000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000ffffffff01000000110000000000000000006e7230000000000000000000000000006772657461703000000000000000000074756e6c30000000000000000000000073797a6b616c6c657230000000000000ffffffffffff0000ff0000ffaaaaaaaaaaaaffff0000ffff000070000000b8000000e800000049444c4554494d45520000000000000000000000000000000000000000000000240000008100000073797a300000000000000000400000000000000000000000000000000100000061727072ffffff7f0000000000000000000000000000000000000000000000000c000000aaaaaaaaaabb00000000000000000000000000000000000000000000000000000000000000000000000000000000000001000000feffffff0000000000000000060000000000000000000000000000000000000000000000000000000000000001000000ffffffff020000000000000002000000880864756d6d79300000000000000000000062707130080000000000000000000000697036746e6c3000000000000000000073697430000000000000000000000000ffffffffffff000000000000aaaaaaaaaaaaffffffff00ff0000700000007000000098000000726564697265637400000000000000000000000000000000000000000000000004000000fcffffff0900000008000000000062726964676530000000000000000000697036746e6c3000000000000000000062637368300000000000000000000000766c616e300000000000000000000000000000000000ff00ff00ffffffffffffffff00ffffffff000000080100000801000030010000697076730000000000000000000000000000000000000000000000000000000028000000ac1414aa000000000000000000000000ffffffffffffff0000000000ff0000004e2400004e240008697076730000000000000000000000000000000000000000000000000000000028000000e0000001000000000000000000000000ffffffff000000ffffffffffff0000004e212b054e201f124155444954000000000000000000000000000000000000000000000000000000040000000000000075eb180f3829"]}, 0x3ee) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000002980)) getsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(0xffffffffffffffff, 0x84, 0x1f, &(0x7f0000000440)={0x0, @in={{0x2, 0x4e22, @multicast2=0xe0000002}}, 0x7bb7, 0x4}, &(0x7f0000000500)=0x90) getsockopt$inet_sctp_SCTP_RTOINFO(0xffffffffffffffff, 0x84, 0x0, &(0x7f0000002240)={0x0, 0x9, 0x417}, &(0x7f00000001c0)=0x10) r2 = socket(0x22, 0x4, 0x3) r3 = socket(0x20000001e, 0x5, 0x0) r4 = perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$packet_tx_ring(r3, 0x10f, 0x87, &(0x7f0000265000)=@req={0x3fc, 0x0, 0x1}, 0x10) getegid() setsockopt$packet_tx_ring(r2, 0x10f, 0x87, &(0x7f0000265000)=@req={0x3fc, 0x0, 0x1}, 0x10) writev(r2, &(0x7f00000000c0)=[{&(0x7f0000000000)="8a", 0x1}], 0x1) close(r2) close(r3) perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r5 = syz_open_dev$evdev(&(0x7f0000dfdfee)='/dev/input/event#\x00', 0x0, 0x2) readv(r5, &(0x7f0000019fe0)=[{&(0x7f00008ec000)=""/219, 0xdb}], 0x1) write$evdev(r5, &(0x7f000004d000)=[{{}, 0x0, 0x1}, {{0x2}}], 0x30) r6 = getpgrp(0x0) setsockopt$ax25_int(r3, 0x101, 0xd, &(0x7f0000000080)=0x7, 0x4) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x8, 0xfffffffffffffffd, 0x9, 0x7, 0x0, 0x8001, 0x0, 0x6, 0x3ff, 0x4, 0x5, 0x4, 0xbd9, 0x56, 0x8000, 0x7f, 0xff, 0xeba, 0x1f, 0x0, 0xfd, 0x3, 0x1, 0x50, 0x7, 0x9, 0x641800, 0x3ff8000000000000, 0x4, 0x0, 0x10000, 0x5, 0x7, 0x6, 0x1, 0xffffffffffffffe0, 0x0, 0x20, 0x0, @perf_bp={&(0x7f0000000040), 0x8}, 0x20, 0x401, 0x8, 0x3, 0x8, 0x7, 0x7}, r6, 0xc, r4, 0x0) syz_genetlink_get_family_id$ipvs(&(0x7f0000000040)='IPVS\x00') 2018/03/30 19:43:00 executing program 6: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_mreqn(r0, 0x0, 0x27, &(0x7f0000000000)={@multicast2=0xe0000002, @loopback=0x7f000001}, 0xc) getsockopt$inet_sctp6_SCTP_FRAGMENT_INTERLEAVE(0xffffffffffffffff, 0x84, 0x12, &(0x7f0000000080), &(0x7f00000000c0)=0x4) ioctl$sock_inet_SIOCGIFDSTADDR(0xffffffffffffffff, 0x8917, &(0x7f0000000040)={'bcsh0\x00', {0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x1a}}}) setsockopt$inet_sctp6_SCTP_MAX_BURST(0xffffffffffffffff, 0x84, 0x14, &(0x7f0000000380)=@int=0x3, 0x4) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000140)={'bcsh0\x00', 0x0}) ioctl$sock_inet6_SIOCDELRT(0xffffffffffffffff, 0x890c, &(0x7f0000000180)={@dev={0xfe, 0x80, [], 0x13}, @loopback={0x0, 0x1}, @mcast2={0xff, 0x2, [], 0x1}, 0x6, 0x0, 0x42e, 0x100, 0x9, 0x80000000, r1}) r2 = socket$inet(0x2, 0xa, 0x5) setsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX(r2, 0x84, 0x6e, &(0x7f0000000600)=[@in={0x2, 0x4e21, @multicast1=0xe0000001}, @in6={0xa, 0x4e20, 0x0, @remote={0xfe, 0x80, [], 0xbb}}, @in={0x2, 0x4e22, @multicast2=0xe0000002}, @in6={0xa, 0x4e21, 0x1ff, @local={0xfe, 0x80, [], 0xaa}, 0x84}, @in6={0xa, 0x4e20, 0x4, @local={0xfe, 0x80, [], 0xaa}}], 0x74) getsockopt$inet_sctp6_SCTP_PR_SUPPORTED(0xffffffffffffffff, 0x84, 0x71, &(0x7f0000000200)={0x0, 0x8}, &(0x7f0000000240)=0x8) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(0xffffffffffffffff, 0x84, 0x6f, &(0x7f0000000300)={r3, 0x70, &(0x7f0000000280)=[@in={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x12}}, @in={0x2, 0x4e24, @loopback=0x7f000001}, @in={0x2, 0x0, @remote={0xac, 0x14, 0x14, 0xbb}}, @in={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x1a}}, @in={0x2, 0x4e24, @remote={0xac, 0x14, 0x14, 0xbb}}, @in={0x2, 0x4e24, @rand_addr=0x3ff}, @in={0x2, 0x4e24, @multicast2=0xe0000002}]}, &(0x7f0000000340)=0x10) setsockopt$inet_sctp6_SCTP_SET_PEER_PRIMARY_ADDR(0xffffffffffffffff, 0x84, 0x5, &(0x7f00000004c0)={r4, @in={{0x2, 0x0, @rand_addr=0x8}}}, 0x84) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, &(0x7f00000003c0)={'lo\x00', 0x4100}) ioctl$sock_inet_SIOCGIFNETMASK(0xffffffffffffffff, 0x891b, &(0x7f0000000100)={'nr0\x00', {0x2, 0x4e24, @loopback=0x7f000001}}) setsockopt$inet_msfilter(r0, 0x0, 0x29, &(0x7f0000000680)=ANY=[@ANYBLOB="cf0000000276d172390cc8c4ff4f3b746e5947c2ddb66a93ebb6d0f75b5f453435c311b94e126c49d47c10682b6e523d09fae1d416ebface98e08aa083e9f1f1afa118eb05655fec48d75d7a37edd032552c60ffeb53a2c8eecbe601a4ac5dceeecf1a943c2d9e2eaf4ad0a93e82a1a37a0cf2adbc4b512680428fee922ad18ff90ec6f87a75b299a953167bf4f9ae31cffd2c31dd47ba7d69151424dc1b2835f7624a302f270eb89118043dc1e1faa46e667be9cbf4456ad0c580ed032e4e49459f68f8a70f2dfe40f51362ffae"], 0x1) pread64(r0, &(0x7f0000000340)=""/181, 0xb5, 0x62) setsockopt$inet_msfilter(r0, 0x0, 0x29, &(0x7f0000000580)=ANY=[@ANYBLOB="e00000027f0000010000000001000000000000006b59aa51deb20d6efc9c04b7c9420f6434d31cbbe99b52873a8c21"], 0x1) socket$inet_udp(0x2, 0x2, 0x0) bpf$BPF_PROG_GET_NEXT_ID(0xb, &(0x7f0000000400)=0x7, 0x4) r5 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000ba4000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x2, 0x78, 0xe2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, r5, 0x0) r6 = perf_event_open(&(0x7f0000014f88)={0x1, 0x78, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00002e8000)}}, 0x0, 0x0, r5, 0x0) readv(r6, &(0x7f0000734000)=[{&(0x7f0000d42000)=""/146, 0x92}], 0x1) getsockopt$inet_sctp_SCTP_PEER_ADDR_THLDS(0xffffffffffffffff, 0x84, 0x1f, &(0x7f0000000480)={0x0, @in={{0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0xd}}}, 0xf80866d, 0x5}, &(0x7f0000000540)=0x90) getsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(0xffffffffffffff9c, 0x84, 0x18, &(0x7f0000000440)={r7, 0x400000000004}, &(0x7f00000005c0)=0xffffffffffffffc3) getsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER_VALUE(r0, 0x84, 0x7c, &(0x7f00000002c0)={r8, 0x10001, 0xc9e9}, &(0x7f0000000300)=0x8) [ 499.104228] FAT-fs (loop4): Unrecognized mount option "time_offset=" or missing value [ 499.130540] kernel msg: ebtables bug: please report to author: EBT_ENTRY_OR_ENTRIES shouldn't be set in distinguisher 2018/03/30 19:43:00 executing program 7: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f000099e000)={0x2, 0x4e20, @multicast1=0xe0000001}, 0x10) sendto$inet(r0, &(0x7f0000de1fff), 0xfffffffffffffd43, 0x0, &(0x7f0000db4ff0)={0x2, 0x4e20, @loopback=0x7f000001}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000af5000)='illinois\x00', 0x9) getsockopt$inet_tcp_buf(r0, 0x6, 0x1a, &(0x7f0000000000)=""/177, &(0x7f0000000100)=0xb1) [ 499.165754] EXT4-fs (loop4): VFS: Can't find ext4 filesystem [ 499.191745] BFS-fs: bfs_fill_super(): No BFS filesystem on loop4 (magic=00000000) 2018/03/30 19:43:00 executing program 0: r0 = socket$inet6(0xa, 0x80002, 0x88) recvfrom$inet6(0xffffffffffffffff, &(0x7f0000ffbf47)=""/185, 0xfffffffffffffeba, 0x0, 0x0, 0xfffffffffffffde6) llistxattr(&(0x7f0000000380)='./file0\x00', &(0x7f00000008c0)=""/4096, 0x1000) bind$inet6(0xffffffffffffffff, &(0x7f00008a8000)={0xa, 0x4e23}, 0x1c) r1 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000080)='/dev/autofs\x00', 0x0, 0x0) setsockopt$inet_sctp_SCTP_RESET_STREAMS(0xffffffffffffffff, 0x84, 0x77, &(0x7f00000006c0)=ANY=[@ANYBLOB="00f4ff00100000e803de0683474400000097dc6fa817356ec235b7a82883b9d01c2301bfdb01000080000000001f5a62ebec03d7becf1f550ecbe61be9571e7c831feaa60042711b33c55b9a8d4d31becd35d787aa5ed9c5cfa5ba7fbd2f75bffa08621bf0896ae3ae012afd17194474b75d72f1a45c929d5cf94fefbf9a249648d929994f86b563812c6386a295c36c02502098a9492471"], 0x1) wait4(0x0, &(0x7f0000000100), 0x4, &(0x7f0000000180)) r2 = socket$inet6(0xa, 0x8000000000000802, 0x0) sendmsg$inet_sctp(r2, &(0x7f0000a29000)={&(0x7f00005dafe4)=@in6={0xa, 0x4e23, 0x0, @mcast2={0xff, 0x2, [], 0x1}}, 0x1c, &(0x7f0000fc8000)}, 0x8000) sched_setscheduler(0x0, 0x5, &(0x7f0000000300)) sendto$inet6(r2, &(0x7f0000b0cf6e), 0xffed, 0x0, &(0x7f000001b000)={0xa}, 0x1c) fchdir(r0) ioctl$sock_SIOCGPGRP(r1, 0x8904, &(0x7f0000000240)) ioctl$sock_SIOCGPGRP(r2, 0x8904, &(0x7f0000000280)) r3 = dup2(r2, r0) recvfrom$inet6(r0, &(0x7f0000000600)=""/191, 0xbf, 0x0, &(0x7f0000000440)={0xa, 0x104e24, 0x40000000000000, @mcast2={0xff, 0x2, [], 0x1}}, 0x1c) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f00000000c0)=0x0) syz_open_procfs(r4, &(0x7f00000005c0)='gid_map\x00') tgkill(r4, r4, 0x10) socket$inet6(0xa, 0xa, 0x0) sendmsg$inet_sctp(0xffffffffffffffff, &(0x7f0000000500)={&(0x7f0000000040)=@in={0x2, 0x4e22, @rand_addr=0x8}, 0x10, &(0x7f0000000480), 0x0, &(0x7f00000004c0), 0x0, 0x80}, 0x0) getsockopt$inet_sctp6_SCTP_GET_LOCAL_ADDRS(r3, 0x84, 0x6d, &(0x7f00000007c0)=ANY=[@ANYRES32=0x0, @ANYBLOB="364944041f77b80e9096fda3291b36a95791527702000000000000001a2f3edcb9b800000000000009000000000000000000fb6d7e5dd94dd67e7c99193cf2bc439f10d69d2be106d12e3244e98f978d745adcdc7ca0ef73aceb7d1c3ef8ab40785b6f6de478c79648bc25fde528c400f949a46b5f2c476093cfea61967d997013f033d0bdbd7f421562b6e77ef76518aa8493c6f78b0fb1388f82e44a34f72104de621d5a"], &(0x7f0000000140)=0x2) stat(&(0x7f00000002c0)='./file0\x00', &(0x7f00000003c0)) setsockopt$inet_sctp_SCTP_RTOINFO(r2, 0x84, 0x0, &(0x7f0000000480)={r5, 0x100000000, 0x1}, 0x10) connect$netlink(0xffffffffffffffff, &(0x7f0000000340)=@unspec, 0xc) 2018/03/30 19:43:00 executing program 7: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f000099e000)={0x2, 0x4e20, @multicast1=0xe0000001}, 0x10) sendto$inet(r0, &(0x7f0000de1fff), 0xfffffffffffffd43, 0x0, &(0x7f0000db4ff0)={0x2, 0x4e20, @loopback=0x7f000001}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000af5000)='illinois\x00', 0x9) getsockopt$inet_tcp_buf(r0, 0x6, 0x1a, &(0x7f0000000000)=""/177, &(0x7f0000000100)=0xb1) [ 499.246069] jfs: Unrecognized mount option "umask=?" or missing value [ 499.465572] IPVS: ftp: loaded support on port[0] = 21 2018/03/30 19:43:01 executing program 4: symlinkat(&(0x7f0000002f00)='./file0\x00', 0xffffffffffffffff, &(0x7f0000002f80)='./file0\x00') syz_mount_image$msdos(&(0x7f0000002fc0)='msdos\x00', &(0x7f0000003000)='./file0\x00', 0x4, 0x1, &(0x7f0000003180)=[{&(0x7f0000003040)="eaf9610c9f7031a1f58e51e73b3f0bd5af4364c38bbe335dbd3d211ec0338ba4c795c634af757a3c684da6110f67891133a6303441b21d139e3a6582efdaeabd3d68dbcb85cd383733a98084b62807af0b7ea49d68daa4cc9fda43dbeb13c3e67c44c463a2c429ccb66c0e1a9dfd5c911d4d7b578baaad6571d4457b9c6d92122a4bd97f5f174c81081941b007062f2cab2db1466851dde671e025909a633fec433bb2512fc61c436b74df23d280019a403884dc488071", 0xb7, 0xcd7}], 0x8, &(0x7f00000031c0)={[{@errors_continue='errors=continue', 0x2c}, {@time_offset={'time_offset', 0x3d, [0x0]}, 0x2c}]}) pipe(&(0x7f0000002f40)={0xffffffffffffffff}) r1 = open(&(0x7f0000003240)='./file0\x00', 0xa0001, 0x20) linkat(r0, &(0x7f0000003200)='./file0\x00', r1, &(0x7f0000003280)='./file0\x00', 0x400) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x80000, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)}, {&(0x7f0000010d00)="0000000000000000000000000000000000000000000000000000000002ae0000ed41000000040000d15bbe5ad15bbe5ad15bbe5a00000000000005002000000000000800070000000af301000400000000000000000000000100000030000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a1950000", 0xa0, 0x8c60}, {&(0x7f0000011a00)="020000000c0001022e000000020000000c0002022e2e00000b00000014000a026c6f73742b666f756e6400000c0000001000050166696c65300000000d0000001000050266696c65310000000f0000001000050166696c6532000000100000001000050166696c6533000000110000001000050166696c65340000001200000010000802564944454f5f54531400000068031201d181d18ed0b7d0bad0b0d0bbd0bbd0b5d1800000000000000000000000000000000000000000000000000000", 0xc0, 0xc000}, {&(0x7f0000012200)="0000000000000000000000000000000000000000000000000c0000dec910dfd800000000f4030000000000000000000000000000000000000000000000000000", 0x40, 0x117e0}, {&(0x7f0000012a00)="0d0000000c0001022e000000020000000c0002022e2e00000e000000dc03050166696c6530000000000000000000000000000000000000000000000000000000", 0x40, 0x1c000}], 0x0, &(0x7f0000013000)) syz_mount_image$bfs(&(0x7f0000000040)='bfs\x00', &(0x7f00000008c0)='./file0\x00', 0x20, 0x2, &(0x7f0000000180)=[{&(0x7f00000005c0)="f37e57346e86cb5adec662d7bd6f13a3764d2ca7640f9f81ba88d0689d0989735a7bafd5558d9a6e8988f9f6038fa475e49077bc8cfc6e170c4cdbaaa1375895c9a4068559d3cecf2a0423caa696bf77a75b3ae3f32b79da059ca13d055647998987fc2033d008bd55deb08808372b9b4595fb0d79a1358cd5949d859a7d155e86db4b608eb401109f6b792f5ce4a2ead9870dee49347bc08d0d54b0e4fca4fd895947a737f4ee823d997770e5c9df50c0c9fe2c0b945c6ffd13b7151e385b631520ac34a5967c6cd0d12b3746795681600541c17d379daed41ce8e715eba582fb668e160872a2", 0xe7, 0x7}, {&(0x7f0000000780)="6154d093a5a905da96fed5f8dea36bcd9d1d011246f7caf86806bf6ac6301d2d2b448461b867bbbe7d0eebdeafa16d7219af85ff4372670039ce277546def59f1d0eed4be4386a34c7243fe3ec84ad3807136a2c3ec35d6d87a7d7bb9342622cc3a7ff529ef3d76ff57fc7a1856f50b98e518515a9e679067cfc0e8500754fa30a81cf4dc42c5a0d36647280c5b0a8506efaf9ad06594678176efe4bdbcf7ab384b597df4c5ad66b2bd240823abe04cd30785819f1c7fd4d46bb55f8bd09ca4b44618b010e363fa572ca189ec73b36ad46b6f38d65c0acc417", 0xd9, 0x5}], 0x200000, 0x0) syz_mount_image$jfs(&(0x7f0000000080)='jfs\x00', &(0x7f0000000880)='./file0\x00', 0xfffffffffffffffe, 0x3, &(0x7f0000002dc0)=[{&(0x7f0000000900)="efee47debce411554253d03f2175c060de26b9a7a197d9327971105aafdf17a061227fe7dd52d3c1c1f0318992f304f7646c3eb4e32ff0514d34d4605b4e152474aa71ac6c0ba890b1f249f213d5bc162b605fdf3c524d6f84e1a2f8461d26ef5dd50b193ffb710ee69fc431552ae4548f0c1a7e503243bb10c53c566f37e3234d8b3d418992dca946568d275e1f54895a854bab3790963108fe6ce5b1f933e81bd0aa2dfd715aca4bd81b48b28e3ee265", 0xb1, 0x1}, {&(0x7f0000001a80)="b4bc90ad72742e5693f04c7955b05460b33cd0ca9cde365dbe1671162a8c1db744cb8a04d1d747ab4d3234fd615e6ad897396c21b8bf7da2c1d524d04fadade841e5acfac529250a2c75fed4b65a7b6c8735268244189e020c526112728097958fd591d00cd16d1591db9b0414d985d7718794369eb03d89403b7df76f6d745c94d4fa986321a9915fea55a73472bc39620fcf22ec74d02b77fafe6ccf72605eb0ba7ae69fa10a36d281e65a178528bc654ce5b6109d5294e400b18be755a3b899489b27a876ac3ea033ed525b28c7dff537b5210cbff466dc339e1f58db1679816589e886264ef1bcf6d0e1408d93946827711972", 0xf5, 0x7}, {&(0x7f0000002cc0)="c9bc1928c9ffffe99fdae39f5013810a038f1d558affc92341c81ee308195dabd95fcfedcfccd4cf2af62477e5ed935114b73940dba239c47d5824a3332fb48cea682934a6840ea5db2529c3a7c371bbf08f08bb15458de586609be64b699f29b7384dc7b2ba78f0e343fb9851eaf5a7b4106fc5b7a8aaf6e069012286fa7259807928cbee722222f45e6c98cefa00829bcdd92bd03273c7b0f20453c72150adf49c311248d3d3d96ad17187d60add3d1d8fbfbc5e572ceba134e5c533a5f75630a35514ee998b85a755085c04513dcc0047461d78f4aa8fdf0309fc39e3e4a1c24b4538acbf2366feaf", 0xea, 0x4}], 0x10000, &(0x7f0000002ec0)={[{@resize='resize', 0x2c}, {@umask={'umask', 0x3d, [0x3f]}, 0x2c}]}) 2018/03/30 19:43:01 executing program 6: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_mreqn(r0, 0x0, 0x27, &(0x7f0000000000)={@multicast2=0xe0000002, @loopback=0x7f000001}, 0xc) getsockopt$inet_sctp6_SCTP_FRAGMENT_INTERLEAVE(0xffffffffffffffff, 0x84, 0x12, &(0x7f0000000080), &(0x7f00000000c0)=0x4) ioctl$sock_inet_SIOCGIFDSTADDR(0xffffffffffffffff, 0x8917, &(0x7f0000000040)={'bcsh0\x00', {0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x1a}}}) setsockopt$inet_sctp6_SCTP_MAX_BURST(0xffffffffffffffff, 0x84, 0x14, &(0x7f0000000380)=@int=0x3, 0x4) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000140)={'bcsh0\x00', 0x0}) ioctl$sock_inet6_SIOCDELRT(0xffffffffffffffff, 0x890c, &(0x7f0000000180)={@dev={0xfe, 0x80, [], 0x13}, @loopback={0x0, 0x1}, @mcast2={0xff, 0x2, [], 0x1}, 0x6, 0x0, 0x42e, 0x100, 0x9, 0x80000000, r1}) r2 = socket$inet(0x2, 0xa, 0x5) setsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX(r2, 0x84, 0x6e, &(0x7f0000000600)=[@in={0x2, 0x4e21, @multicast1=0xe0000001}, @in6={0xa, 0x4e20, 0x0, @remote={0xfe, 0x80, [], 0xbb}}, @in={0x2, 0x4e22, @multicast2=0xe0000002}, @in6={0xa, 0x4e21, 0x1ff, @local={0xfe, 0x80, [], 0xaa}, 0x84}, @in6={0xa, 0x4e20, 0x4, @local={0xfe, 0x80, [], 0xaa}}], 0x74) getsockopt$inet_sctp6_SCTP_PR_SUPPORTED(0xffffffffffffffff, 0x84, 0x71, &(0x7f0000000200)={0x0, 0x8}, &(0x7f0000000240)=0x8) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(0xffffffffffffffff, 0x84, 0x6f, &(0x7f0000000300)={r3, 0x70, &(0x7f0000000280)=[@in={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x12}}, @in={0x2, 0x4e24, @loopback=0x7f000001}, @in={0x2, 0x0, @remote={0xac, 0x14, 0x14, 0xbb}}, @in={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x1a}}, @in={0x2, 0x4e24, @remote={0xac, 0x14, 0x14, 0xbb}}, @in={0x2, 0x4e24, @rand_addr=0x3ff}, @in={0x2, 0x4e24, @multicast2=0xe0000002}]}, &(0x7f0000000340)=0x10) setsockopt$inet_sctp6_SCTP_SET_PEER_PRIMARY_ADDR(0xffffffffffffffff, 0x84, 0x5, &(0x7f00000004c0)={r4, @in={{0x2, 0x4e20, @rand_addr}}}, 0x84) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, &(0x7f00000003c0)={'lo\x00', 0x4100}) ioctl$sock_inet_SIOCGIFNETMASK(0xffffffffffffffff, 0x891b, &(0x7f0000000100)={'nr0\x00', {0x2, 0x4e24, @loopback=0x7f000001}}) setsockopt$inet_msfilter(r0, 0x0, 0x29, &(0x7f0000000680)=ANY=[@ANYBLOB="cf0000000276d172390cc8c4ff4f3b746e5947c2ddb66a93ebb6d0f75b5f453435c311b94e126c49d47c10682b6e523d09fae1d416ebface98e08aa083e9f1f1afa118eb05655fec48d75d7a37edd032552c60ffeb53a2c8eecbe601a4ac5dceeecf1a943c2d9e2eaf4ad0a93e82a1a37a0cf2adbc4b512680428fee922ad18ff90ec6f87a75b299a953167bf4f9ae31cffd2c31dd47ba7d69151424dc1b2835f7624a302f270eb89118043dc1e1faa46e667be9cbf4456ad0c580ed032e4e49459f68f8a70f2dfe40f51362ffae"], 0x1) pread64(r0, &(0x7f0000000340)=""/181, 0xb5, 0x62) setsockopt$inet_msfilter(r0, 0x0, 0x29, &(0x7f0000000580)=ANY=[@ANYBLOB="e00000027f0000010000000001000000000000006b59aa51deb20d6efc9c04b7c9420f6434d31cbbe99b52873a8c21"], 0x1) socket$inet_udp(0x2, 0x2, 0x0) bpf$BPF_PROG_GET_NEXT_ID(0xb, &(0x7f0000000400)=0x7, 0x4) r5 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000ba4000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x2, 0x78, 0xe2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, r5, 0x0) r6 = perf_event_open(&(0x7f0000014f88)={0x1, 0x78, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00002e8000)}}, 0x0, 0x0, r5, 0x0) readv(r6, &(0x7f0000734000)=[{&(0x7f0000d42000)=""/146, 0x92}], 0x1) getsockopt$inet_sctp_SCTP_PEER_ADDR_THLDS(0xffffffffffffffff, 0x84, 0x1f, &(0x7f0000000480)={0x0, @in={{0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0xd}}}, 0xf80866d, 0x5}, &(0x7f0000000540)=0x90) getsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(0xffffffffffffff9c, 0x84, 0x18, &(0x7f0000000440)={r7, 0x400000000004}, &(0x7f00000005c0)=0xffffffffffffffc3) getsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER_VALUE(r0, 0x84, 0x7c, &(0x7f00000002c0)={r8, 0x10001, 0xc9e9}, &(0x7f0000000300)=0x8) 2018/03/30 19:43:01 executing program 5: unshare(0x40000000) perf_event_open(&(0x7f000001d000)={0x0, 0x78, 0xe2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000000)={0x6, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0xa, 0x1, 0x0) ioctl(r0, 0x8982, &(0x7f0000000000)) r1 = socket$packet(0x11, 0x0, 0x300) r2 = openat$cuse(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/cuse\x00', 0x82, 0x0) io_setup(0x43f, &(0x7f00000000c0)=0x0) io_submit(r3, 0x1, &(0x7f0000000000)=[&(0x7f0000000200)={0x0, 0x0, 0x0, 0x1, 0x0, r2, &(0x7f0000000040)="10000000020400000000000000000000", 0x10}]) r4 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000280)='/proc/sys/net/ipv4/vs/secure_tcp\x00', 0x2, 0x0) sendmsg$kcm(r4, &(0x7f0000001f00)={&(0x7f0000001b40)=@pppol2tpin6={0x18, 0x1, {0x0, r1, 0x0, 0x1, 0x0, 0x0, {0xa, 0x4e24, 0xc1, @mcast1={0xff, 0x1, [], 0x1}}}}, 0x80, &(0x7f0000001d80)=[{&(0x7f0000001bc0)="a9db123ebf124fab0f2eec9774559e3b5870fb7c6818fc89c4b8742d057480657265ae2b34fb2d4e585d22ca1bf7b0a22ce38a20a819d919947c78f8d5c9f3291905fd3ed2b8ef8a79d9453396c6b0b7eb0778dbc49b32ae91e443b64edddcf320c1589c7777eadd4e57c01b20a8ca7a831e8e2c104d0194d52fb5c35b550f", 0x7f}], 0x1, &(0x7f0000001dc0)=ANY=[], 0x0, 0x90}, 0x20000000) r5 = syz_open_dev$tun(&(0x7f00000001c0)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r5, 0x400454ca, &(0x7f0000000200)={'bridge0\x00\x00p\x00', 0x4000000000001005}) socketpair(0x1d, 0x3, 0x40, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_inet_SIOCSIFADDR(r6, 0x8916, &(0x7f0000000100)={'bridge8\x00', {0x2, 0x0, @dev={0xac, 0x14, 0x14}}}) ioctl$LOOP_SET_FD(r2, 0x4c00, r1) ioctl$SNDRV_SEQ_IOCTL_RUNNING_MODE(0xffffffffffffffff, 0xc0105303, &(0x7f00000002c0)={0x2, 0x8}) add_key$keyring(&(0x7f00000000c0)='keyring\x00', &(0x7f0000000100)={0x73, 0x79, 0x7a}, 0x0, 0x0, 0x0) clone(0x0, &(0x7f0000000040), &(0x7f0000000080), &(0x7f0000000000), &(0x7f0000000100)) ioctl$int_in(0xffffffffffffffff, 0x800000c004500a, &(0x7f0000006ff8)) wait4(0x0, 0x0, 0x4, &(0x7f0000000380)) ioctl$sock_inet_sctp_SIOCINQ(r7, 0x541b, &(0x7f0000000180)) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_PORT(0xffffffffffffffff, 0xc0a85352, &(0x7f0000001980)={{}, 'port1\x00', 0x0, 0x20010, 0x1f, 0x0, 0x3, 0x40, 0x0, 0x0, 0x4, 0x6d1}) 2018/03/30 19:43:01 executing program 7: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f000099e000)={0x2, 0x4e20, @multicast1=0xe0000001}, 0x10) sendto$inet(r0, &(0x7f0000de1fff), 0xfffffffffffffd43, 0x0, &(0x7f0000db4ff0)={0x2, 0x4e20, @loopback=0x7f000001}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000af5000)='illinois\x00', 0x9) getsockopt$inet_tcp_buf(r0, 0x6, 0x1a, &(0x7f0000000000)=""/177, &(0x7f0000000100)=0xb1) 2018/03/30 19:43:01 executing program 0: r0 = socket$inet6(0xa, 0x2000000802, 0x0) connect$inet6(0xffffffffffffffff, &(0x7f000000cfe4)={0xa}, 0x1c) sendto$inet6(r0, &(0x7f0000000000), 0x0, 0x0, &(0x7f0000000100)={0xa, 0x4e22, 0x0, @dev={0xfe, 0x80}}, 0x1c) openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000200)='/dev/vga_arbiter\x00', 0x440000, 0x0) getsockopt$inet_sctp6_SCTP_RTOINFO(r0, 0x84, 0x0, &(0x7f0000000ec0)={0x0, 0x8, 0x7ff}, &(0x7f0000000f00)=0x10) getsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX3(0xffffffffffffffff, 0x84, 0x6f, &(0x7f0000000f80)={0x0, 0x10, &(0x7f0000000f40)=[@in={0x2, 0x4e23, @dev={0xac, 0x14, 0x14}}]}, &(0x7f0000000fc0)=0x10) syz_open_dev$sg(&(0x7f0000000300)='/dev/sg#\x00', 0xfffffffffffffff7, 0x800) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$sock_linger(0xffffffffffffffff, 0x1, 0xd, &(0x7f00000003c0), &(0x7f0000000400)=0x8) bind$inet6(r2, &(0x7f0000000000)={0xa, 0x4e22}, 0x1c) listen(r2, 0x0) sendto$inet6(r1, &(0x7f0000f6f000), 0x1000000c4, 0x20000001, &(0x7f0000faafe4)={0xa}, 0x1c) setsockopt$inet6_tcp_TCP_REPAIR_WINDOW(r1, 0x6, 0x1d, &(0x7f00000015c0)={0x0, 0x0, 0x9, 0x1e000004}, 0xfd9b) r3 = accept4(r1, &(0x7f0000000580)=@alg, &(0x7f0000000040)=0x222, 0x400000080800) getsockname$packet(0xffffffffffffffff, &(0x7f0000000900)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @dev}, &(0x7f0000000940)=0x14) sendto$packet(r3, &(0x7f0000000880)="47d82f4ee2f635e2e20450e412b0220acf243910ddbe76aa3a2361f0b552fa5080b53e8ce74b03e9c5f56ed3a13eebb299bb4be847774442d083280fec30813686eb7d6d00a7fc10de0b6b585e579b067e0cd3f397fc7737b38588f0bfa6d14ad61ee6", 0x63, 0x10, &(0x7f0000000980)={0x11, 0x1f, 0x0, 0x1, 0x0, 0x6, @remote={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xbb}}, 0x14) getsockopt$inet_dccp_buf(0xffffffffffffffff, 0x21, 0x0, &(0x7f0000000140)=""/86, &(0x7f00000001c0)=0x56) ioctl$sock_inet_SIOCGIFNETMASK(0xffffffffffffffff, 0x891b, &(0x7f0000000380)={'bcsf0\x00', {0x2, 0x4e21, @multicast2=0xe0000002}}) getsockopt$inet_sctp_SCTP_PR_ASSOC_STATUS(0xffffffffffffffff, 0x84, 0x73, &(0x7f0000001000)={0x0, 0x0, 0x0, 0x0, 0x5}, &(0x7f0000001040)=0xffffffffffffff65) r4 = syz_open_procfs(0x0, &(0x7f0000000700)="6664001a000000") getdents64(r4, &(0x7f00000004c0)=""/189, 0xabf70f75d9c5643) ioctl$fiemap(0xffffffffffffffff, 0xc020660b, &(0x7f0000000600)=ANY=[@ANYBLOB="0000010000000000810000000000000007000000ffffffff02000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002088af7be0000000000000000000000000000800000000000000000000000000000000000"]) lseek(0xffffffffffffffff, 0x0, 0x1) ioctl$DRM_IOCTL_GET_CLIENT(0xffffffffffffffff, 0xc0286405, &(0x7f0000000480)={0xfff, 0x0, 0x0, 0x0, 0x0, 0x280000000000000, 0x0, 0x3}) 2018/03/30 19:43:01 executing program 3: r0 = socket$inet6(0xa, 0x80002, 0x88) recvfrom$inet6(0xffffffffffffffff, &(0x7f0000ffbf47)=""/185, 0xfffffffffffffeba, 0x0, 0x0, 0xfffffffffffffde6) llistxattr(&(0x7f0000000380)='./file0\x00', &(0x7f00000008c0)=""/4096, 0x1000) bind$inet6(r0, &(0x7f00008a8000)={0xa, 0x4e23}, 0x1c) sendfile(0xffffffffffffffff, r0, &(0x7f00000004c0), 0x7) setsockopt$inet_sctp_SCTP_RESET_STREAMS(0xffffffffffffffff, 0x84, 0x77, &(0x7f00000006c0)=ANY=[@ANYRES32=0x0, @ANYBLOB="00f4ff00100000e803de0683474400000097dc6fa817356ec235b7a82883b9d01c2301bfdb01000080000000001f5a62ebec03d7becf1f550ecbe61be9571e7c831feaa60042711b33c55b9a8d4d31becd35d787aa5ed9c5cfa5ba7fbd2f75bffa08621bf0896ae3ae012afd17194474b75d72f1a45c929d5cf94fefbf9a249648d929994f86b5"], 0x2) wait4(0x0, &(0x7f0000000100), 0x4, &(0x7f0000000180)) r1 = socket$inet6(0xa, 0x8000000000000802, 0x88) sendmsg$inet_sctp(r1, &(0x7f0000a29000)={&(0x7f00005dafe4)=@in6={0xa, 0x4e23, 0x0, @mcast2={0xff, 0x2, [], 0x1}}, 0x1c, &(0x7f0000fc8000)}, 0x8000) sched_setscheduler(0x0, 0x5, &(0x7f0000000300)) sendto$inet6(r1, &(0x7f0000b0cf6e), 0xffed, 0x0, &(0x7f000001b000)={0xa}, 0x1c) setsockopt$inet6_tcp_buf(r1, 0x6, 0xb, &(0x7f00000018c0)="2827156059c1d315ace9837d5e2ecf94c4f1eb1ed59b087df5fe4df4c129f4b5025dc7bf8bbee5329362980fe32724c3ff452e36920565a21f8dd2fc6a4f4e33bf357e8f9e6a5d5b333932a78c995c150069203c1afcfe9eb89986a4b4ecf42ce5a225a8eaacfa91b5e0c688a4ef34ebcace97117859d5fbbbc46fd4817d062581758a5ca58490342b5fc295e6f9a9ee22f26176d88e623248a4cb9aa8ecbcef34f454f3d9bba7a603548884c097246de740990d5e66e973a21407aa0ccb19c59425f7f8e73b3a5e709e52501f417be308fe04e8fee4521ba317fd0c953b903708a21a05abc5f8ed8803e7cbf28057e21c853f6932e3959d", 0xf8) fchdir(r0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000240)=0x0) ioctl$sock_SIOCGPGRP(r1, 0x8904, &(0x7f0000000280)=0x0) tgkill(r2, r3, 0x30) recvfrom$inet6(r0, &(0x7f0000000600)=""/191, 0xbf, 0x0, &(0x7f0000000000)={0xa, 0x4e24}, 0x1c) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f00000000c0)=0x0) syz_open_procfs(r4, &(0x7f00000005c0)='gid_map\x00') tgkill(0x0, r4, 0x10) socket$inet6(0xa, 0xa, 0x0) sendmsg$inet_sctp(0xffffffffffffffff, &(0x7f0000000500)={&(0x7f0000000040)=@in={0x2, 0x0, @rand_addr=0x8}, 0x10, &(0x7f0000000480), 0x0, &(0x7f00000004c0), 0x0, 0x80}, 0x0) getsockopt$inet_sctp6_SCTP_GET_LOCAL_ADDRS(0xffffffffffffffff, 0x84, 0x6d, &(0x7f00000007c0)=ANY=[@ANYRES32=0x0, @ANYBLOB="364944041f77b80e9096fda3291b36a95791527702000000000000001a2f3edcb9b800000000000009000000000000000000fb6d7e5dd94dd67e7c99193cf2bc439f10d69d2be106d12e3244e98f978d745adcdc7ca0ef73aceb7d1c3ef8ab40785b6f6de478c79648bc25fde528c400f949a46b5f2c476093cfea61967d997013f033d0bdbd7f421562b6e77ef76518aa8493c6f78b0fb1388f82e44a34f72104de621d5a9866b21d88afef19cd5f6884cb4447cb1c39d5782eeba78cb4d56d49edd9bf693b044d9631edef567181"], &(0x7f0000000140)=0x2) stat(&(0x7f00000002c0)='./file0\x00', &(0x7f00000003c0)) setsockopt$inet_sctp_SCTP_RTOINFO(r1, 0x84, 0x0, &(0x7f0000000480)={r5, 0x100000000, 0x1, 0x7}, 0x10) connect$netlink(0xffffffffffffffff, &(0x7f0000000340)=@unspec, 0xc) 2018/03/30 19:43:01 executing program 1: r0 = syz_open_dev$amidi(&(0x7f0000000040)='/dev/amidi#\x00', 0x3, 0x28000) ioctl$DRM_IOCTL_RES_CTX(r0, 0xc0086426, &(0x7f0000000100)={0x2c, &(0x7f00000000c0)=[{}, {}, {}, {}, {}, {}, {}, {}]}) socket$netlink(0x10, 0x3, 0xc) writev(0xffffffffffffffff, &(0x7f00000021c0), 0x0) bind$bt_l2cap(r0, &(0x7f0000000340)={0x1f, 0x800000000000002, {0x401, 0x3, 0xb, 0x3f8}}, 0x9) socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f0000a8d000)={&(0x7f0000c78ff4)={0x10}, 0xc, &(0x7f0000df6000)={&(0x7f0000000200)=ANY=[@ANYBLOB="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"], 0x10f}, 0x1}, 0x0) r1 = socket$inet_sctp(0x2, 0x5, 0x84) sendmsg$inet_sctp(r1, &(0x7f0000001f00)={&(0x7f0000001840)=@in={0x2, 0x0, @dev={0xac, 0x14, 0x14}}, 0x10, &(0x7f0000001c40), 0x0, &(0x7f0000001e40)}, 0x40) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000540)=@nat={'nat\x00', 0x19, 0x3, 0x376, [0x20000140, 0x0, 0x0, 0x20000170, 0x200002d0], 0x0, &(0x7f0000000100), &(0x7f00000006c0)=ANY=[@ANYBLOB="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"]}, 0x3ee) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000002980)) getsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(0xffffffffffffffff, 0x84, 0x1f, &(0x7f0000000440)={0x0, @in={{0x2, 0x4e22, @multicast2=0xe0000002}}, 0x7bb7, 0x4}, &(0x7f0000000500)=0x90) getsockopt$inet_sctp_SCTP_RTOINFO(0xffffffffffffffff, 0x84, 0x0, &(0x7f0000002240)={0x0, 0x9, 0x417}, &(0x7f00000001c0)=0x10) r2 = socket(0x22, 0x4, 0x3) r3 = socket(0x20000001e, 0x5, 0x0) r4 = perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$packet_tx_ring(r3, 0x10f, 0x87, &(0x7f0000265000)=@req={0x3fc, 0x0, 0x1}, 0x10) getegid() setsockopt$packet_tx_ring(r2, 0x10f, 0x87, &(0x7f0000265000)=@req={0x3fc, 0x0, 0x1}, 0x10) writev(r2, &(0x7f00000000c0)=[{&(0x7f0000000000)="8a", 0x1}], 0x1) close(r2) close(r3) perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r5 = syz_open_dev$evdev(&(0x7f0000dfdfee)='/dev/input/event#\x00', 0x0, 0x2) readv(r5, &(0x7f0000019fe0)=[{&(0x7f00008ec000)=""/219, 0xdb}], 0x1) write$evdev(r5, &(0x7f000004d000)=[{{}, 0x0, 0x1}, {{0x2}}], 0x30) r6 = getpgrp(0x0) setsockopt$ax25_int(r3, 0x101, 0xd, &(0x7f0000000080)=0x7, 0x4) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x8, 0xfffffffffffffffd, 0x9, 0x7, 0x0, 0x8001, 0x0, 0x6, 0x3ff, 0x4, 0x5, 0x4, 0xbd9, 0x56, 0x8000, 0x7f, 0xff, 0xeba, 0x1f, 0x0, 0xfd, 0x3, 0x1, 0x50, 0x7, 0x9, 0x641800, 0x3ff8000000000000, 0x4, 0x0, 0x10000, 0x5, 0x7, 0x6, 0x1, 0xffffffffffffffe0, 0x0, 0x20, 0x0, @perf_bp={&(0x7f0000000040), 0x8}, 0x20, 0x401, 0x8, 0x3, 0x8, 0x7, 0x7}, r6, 0xc, r4, 0x0) syz_genetlink_get_family_id$ipvs(&(0x7f0000000040)='IPVS\x00') 2018/03/30 19:43:01 executing program 2: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) readv(0xffffffffffffffff, &(0x7f0000001480), 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f00003b9fdc)) readv(r0, &(0x7f0000001980)=[{&(0x7f00000018c0)=""/182, 0xb6}], 0x1) r1 = syz_open_pts(r0, 0x2) socket$inet_sctp(0x2, 0x5, 0x84) dup3(r1, r0, 0x0) write(r0, &(0x7f0000c34fff), 0xffffff0b) socket$inet(0x2, 0x0, 0x0) setsockopt$bt_l2cap_L2CAP_OPTIONS(0xffffffffffffffff, 0x6, 0x1, &(0x7f0000000380)={0xefa, 0x800, 0x0, 0x0, 0x9}, 0xc) 2018/03/30 19:43:01 executing program 0: r0 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000180)='/dev/sequencer\x00', 0x42, 0x0) r1 = syz_open_procfs(0x0, &(0x7f00000001c0)="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") getsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(r1, 0x84, 0x1f, &(0x7f0000000680)={0x0, @in={{0x2, 0x0, @loopback=0x7f000001}}, 0x904e, 0x8}, &(0x7f0000000740)=0x90) setsockopt$inet_sctp_SCTP_PR_SUPPORTED(r0, 0x84, 0x71, &(0x7f00000004c0)={r2}, 0x8) sendfile(r0, r1, &(0x7f0000000040), 0x100000000081) r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000140)='./cgroup.cpu\x00', 0x200002, 0x0) fchdir(r3) r4 = syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x0, 0x0) splice(r4, &(0x7f0000000300), 0xffffffffffffffff, &(0x7f00000003c0), 0x0, 0x0) r5 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet6_MRT6_ADD_MFC_PROXY(r1, 0x29, 0xd2, &(0x7f0000000600)={{0xa, 0x7, 0x9d, @empty, 0x4}, {0xa, 0x4e23, 0x5, @ipv4={[], [0xff, 0xff], @multicast2=0xe0000002}, 0x8}, 0x3, [0x9, 0x101, 0x5, 0x8, 0x0, 0x1f, 0x531, 0x1ff]}, 0x5c) rmdir(&(0x7f0000000080)='./file0\x00') setsockopt$inet_mreqn(r5, 0x0, 0x27, &(0x7f0000000140)={@multicast2=0xe0000002, @loopback=0x7f000001}, 0xc) ioctl$sock_inet_SIOCSIFFLAGS(r5, 0x8914, &(0x7f0000000940)={'lo\x00'}) setsockopt$IP_VS_SO_SET_ADD(0xffffffffffffffff, 0x0, 0x482, &(0x7f0000000340)={0x0, @multicast1=0xe0000001, 0x0, 0x0, 'dh\x00'}, 0x2c) socket$inet_sctp(0x2, 0x0, 0x84) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f0000000380)={'irlan0\x00'}) fcntl$setlease(r0, 0x400, 0x43) stat(&(0x7f0000000400)='./file0/file0\x00', &(0x7f0000000440)={0x0, 0x0, 0x0, 0x0, 0x0}) setsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x22, &(0x7f0000000500)={{{@in, @in=@remote={0xac, 0x14, 0x14, 0xbb}, 0x4e20, 0x0, 0x0, 0xb17, 0xa, 0xa0, 0xa0, 0x29, 0x0, r6}, {0x9, 0x43d, 0x3f, 0xacbb, 0x85e3, 0x3f, 0x5, 0x7}, {0x0, 0x100, 0x1f, 0x5}, 0x1f, 0x0, 0x1, 0x0, 0x2, 0x3}, {{@in=@broadcast=0xffffffff, 0x4d2}, 0xa, @in6=@local={0xfe, 0x80, [], 0xaa}, 0x3501, 0x2, 0x0, 0xfff, 0x7}}, 0xe8) pread64(0xffffffffffffffff, &(0x7f0000000080)=""/156, 0x9c, 0x0) sendto$inet(0xffffffffffffffff, &(0x7f0000000000), 0x0, 0x0, &(0x7f0000000040)={0x2, 0x4e22, @loopback=0x7f000001}, 0x10) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x8, &(0x7f0000cecffc), 0x4) setsockopt$inet6_MRT6_ADD_MFC(0xffffffffffffffff, 0x29, 0xcc, &(0x7f0000000800)={{0xa, 0x4e24, 0x18e, @local={0xfe, 0x80, [], 0xaa}, 0xa6c2}, {0xa, 0x4e24, 0xf40, @local={0xfe, 0x80, [], 0xaa}}, 0x0, [0x5, 0x100000000, 0x0, 0x3, 0x256, 0x6, 0x1f6, 0x100000000]}, 0x5c) setsockopt$inet_sctp_SCTP_RECVNXTINFO(r1, 0x84, 0x21, &(0x7f00000007c0)=0x5, 0x4) setsockopt$inet6_tcp_TCP_ULP(0xffffffffffffffff, 0x6, 0x1f, &(0x7f0000000780)='tls\x00', 0x4) write(0xffffffffffffffff, &(0x7f00000008c0)="2400000015007f000000873fd51be1550189d7fe6dff0f0000000000007050c0bb7db2e560a4b5f7a4a1763a0400f090", 0x30) open(&(0x7f0000ac3000)='./control\x00', 0x0, 0x0) openat(0xffffffffffffffff, &(0x7f0000563000)='./file0\x00', 0x0, 0x0) 2018/03/30 19:43:01 executing program 7: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f000099e000)={0x2, 0x4e20, @multicast1=0xe0000001}, 0x10) sendto$inet(r0, &(0x7f0000de1fff), 0xfffffffffffffd43, 0x20008005, &(0x7f0000db4ff0)={0x2, 0x0, @loopback=0x7f000001}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000af5000)='illinois\x00', 0x9) getsockopt$inet_tcp_buf(r0, 0x6, 0x1a, &(0x7f0000000000)=""/177, &(0x7f0000000100)=0xb1) [ 500.280356] FAT-fs (loop4): Unrecognized mount option "time_offset=" or missing value [ 500.345092] EXT4-fs (loop4): VFS: Can't find ext4 filesystem [ 500.363240] kernel msg: ebtables bug: please report to author: EBT_ENTRY_OR_ENTRIES shouldn't be set in distinguisher [ 500.374171] device lo left promiscuous mode 2018/03/30 19:43:01 executing program 6: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_mreqn(r0, 0x0, 0x27, &(0x7f0000000000)={@multicast2=0xe0000002, @loopback=0x7f000001}, 0xc) getsockopt$inet_sctp6_SCTP_FRAGMENT_INTERLEAVE(0xffffffffffffffff, 0x84, 0x12, &(0x7f0000000080), &(0x7f00000000c0)=0x4) ioctl$sock_inet_SIOCGIFDSTADDR(0xffffffffffffffff, 0x8917, &(0x7f0000000040)={'bcsh0\x00', {0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x1a}}}) setsockopt$inet_sctp6_SCTP_MAX_BURST(0xffffffffffffffff, 0x84, 0x14, &(0x7f0000000380)=@int=0x3, 0x4) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000140)={'bcsh0\x00', 0x0}) ioctl$sock_inet6_SIOCDELRT(0xffffffffffffffff, 0x890c, &(0x7f0000000180)={@dev={0xfe, 0x80, [], 0x13}, @loopback={0x0, 0x1}, @mcast2={0xff, 0x2, [], 0x1}, 0x6, 0x0, 0x42e, 0x100, 0x9, 0x80000000, r1}) r2 = socket$inet(0x2, 0xa, 0x5) setsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX(r2, 0x84, 0x6e, &(0x7f0000000600)=[@in={0x2, 0x4e21, @multicast1=0xe0000001}, @in6={0xa, 0x4e20, 0x0, @remote={0xfe, 0x80, [], 0xbb}}, @in={0x2, 0x4e22, @multicast2=0xe0000002}, @in6={0xa, 0x4e21, 0x1ff, @local={0xfe, 0x80, [], 0xaa}, 0x84}, @in6={0xa, 0x4e20, 0x4, @local={0xfe, 0x80, [], 0xaa}}], 0x74) getsockopt$inet_sctp6_SCTP_PR_SUPPORTED(0xffffffffffffffff, 0x84, 0x71, &(0x7f0000000200)={0x0, 0x8}, &(0x7f0000000240)=0x8) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(0xffffffffffffffff, 0x84, 0x6f, &(0x7f0000000300)={r3, 0x70, &(0x7f0000000280)=[@in={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x12}}, @in={0x2, 0x4e24, @loopback=0x7f000001}, @in={0x2, 0x0, @remote={0xac, 0x14, 0x14, 0xbb}}, @in={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x1a}}, @in={0x2, 0x4e24, @remote={0xac, 0x14, 0x14, 0xbb}}, @in={0x2, 0x4e24, @rand_addr=0x3ff}, @in={0x2, 0x4e24, @multicast2=0xe0000002}]}, &(0x7f0000000340)=0x10) setsockopt$inet_sctp6_SCTP_SET_PEER_PRIMARY_ADDR(0xffffffffffffffff, 0x84, 0x5, &(0x7f00000004c0)={r4, @in={{0x2, 0x4e20, @rand_addr}}}, 0x84) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, &(0x7f00000003c0)={'lo\x00', 0x4100}) ioctl$sock_inet_SIOCGIFNETMASK(0xffffffffffffffff, 0x891b, &(0x7f0000000100)={'nr0\x00', {0x2, 0x4e24, @loopback=0x7f000001}}) setsockopt$inet_msfilter(r0, 0x0, 0x29, &(0x7f0000000680)=ANY=[@ANYBLOB="cf0000000276d172390cc8c4ff4f3b746e5947c2ddb66a93ebb6d0f75b5f453435c311b94e126c49d47c10682b6e523d09fae1d416ebface98e08aa083e9f1f1afa118eb05655fec48d75d7a37edd032552c60ffeb53a2c8eecbe601a4ac5dceeecf1a943c2d9e2eaf4ad0a93e82a1a37a0cf2adbc4b512680428fee922ad18ff90ec6f87a75b299a953167bf4f9ae31cffd2c31dd47ba7d69151424dc1b2835f7624a302f270eb89118043dc1e1faa46e667be9cbf4456ad0c580ed032e4e49459f68f8a70f2dfe40f51362ffae"], 0x1) pread64(r0, &(0x7f0000000340)=""/181, 0xb5, 0x62) setsockopt$inet_msfilter(r0, 0x0, 0x29, &(0x7f0000000580)=ANY=[@ANYBLOB="e00000027f0000010000000001000000000000006b59aa51deb20d6efc9c04b7c9420f6434d31cbbe99b52873a8c21"], 0x1) socket$inet_udp(0x2, 0x2, 0x0) bpf$BPF_PROG_GET_NEXT_ID(0xb, &(0x7f0000000400)=0x7, 0x4) r5 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000ba4000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x2, 0x78, 0xe2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, r5, 0x0) r6 = perf_event_open(&(0x7f0000014f88)={0x1, 0x78, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00002e8000)}}, 0x0, 0x0, r5, 0x0) readv(r6, &(0x7f0000734000)=[{&(0x7f0000d42000)=""/146, 0x92}], 0x1) getsockopt$inet_sctp_SCTP_PEER_ADDR_THLDS(0xffffffffffffffff, 0x84, 0x1f, &(0x7f0000000480)={0x0, @in={{0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0xd}}}, 0xf80866d, 0x5}, &(0x7f0000000540)=0x90) getsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(0xffffffffffffff9c, 0x84, 0x18, &(0x7f0000000440)={r7, 0x400000000004}, &(0x7f00000005c0)=0xffffffffffffffc3) getsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER_VALUE(r0, 0x84, 0x7c, &(0x7f00000002c0)={r8, 0x10001, 0xc9e9}, &(0x7f0000000300)=0x8) 2018/03/30 19:43:01 executing program 4: symlinkat(&(0x7f0000002f00)='./file0\x00', 0xffffffffffffffff, &(0x7f0000002f80)='./file0\x00') syz_mount_image$msdos(&(0x7f0000002fc0)='msdos\x00', &(0x7f0000003000)='./file0\x00', 0x4, 0x1, &(0x7f0000003180)=[{&(0x7f0000003040)="eaf9610c9f7031a1f58e51e73b3f0bd5af4364c38bbe335dbd3d211ec0338ba4c795c634af757a3c684da6110f67891133a6303441b21d139e3a6582efdaeabd3d68dbcb85cd383733a98084b62807af0b7ea49d68daa4cc9fda43dbeb13c3e67c44c463a2c429ccb66c0e1a9dfd5c911d4d7b578baaad6571d4457b9c6d92122a4bd97f5f174c81081941b007062f2cab2db1466851dde671e025909a633fec433bb2512fc61c436b74df23d280019a403884dc488071", 0xb7, 0xcd7}], 0x8, &(0x7f00000031c0)={[{@errors_continue='errors=continue', 0x2c}, {@time_offset={'time_offset', 0x3d, [0x0]}, 0x2c}]}) pipe(&(0x7f0000002f40)={0xffffffffffffffff}) r1 = open(&(0x7f0000003240)='./file0\x00', 0xa0001, 0x20) linkat(r0, &(0x7f0000003200)='./file0\x00', r1, &(0x7f0000003280)='./file0\x00', 0x400) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x80000, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)}, {&(0x7f0000010d00)="0000000000000000000000000000000000000000000000000000000002ae0000ed41000000040000d15bbe5ad15bbe5ad15bbe5a00000000000005002000000000000800070000000af301000400000000000000000000000100000030000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a1950000", 0xa0, 0x8c60}, {&(0x7f0000011a00)="020000000c0001022e000000020000000c0002022e2e00000b00000014000a026c6f73742b666f756e6400000c0000001000050166696c65300000000d0000001000050266696c65310000000f0000001000050166696c6532000000100000001000050166696c6533000000110000001000050166696c65340000001200000010000802564944454f5f54531400000068031201d181d18ed0b7d0bad0b0d0bbd0bbd0b5d1800000000000000000000000000000000000000000000000000000", 0xc0, 0xc000}, {&(0x7f0000012200)="0000000000000000000000000000000000000000000000000c0000dec910dfd800000000f4030000000000000000000000000000000000000000000000000000", 0x40, 0x117e0}, {&(0x7f0000012a00)="0d0000000c0001022e000000020000000c0002022e2e00000e000000dc03050166696c6530000000000000000000000000000000000000000000000000000000", 0x40, 0x1c000}], 0x0, &(0x7f0000013000)) syz_mount_image$bfs(&(0x7f0000000040)='bfs\x00', &(0x7f00000008c0)='./file0\x00', 0x20, 0x2, &(0x7f0000000180)=[{&(0x7f00000005c0)="f37e57346e86cb5adec662d7bd6f13a3764d2ca7640f9f81ba88d0689d0989735a7bafd5558d9a6e8988f9f6038fa475e49077bc8cfc6e170c4cdbaaa1375895c9a4068559d3cecf2a0423caa696bf77a75b3ae3f32b79da059ca13d055647998987fc2033d008bd55deb08808372b9b4595fb0d79a1358cd5949d859a7d155e86db4b608eb401109f6b792f5ce4a2ead9870dee49347bc08d0d54b0e4fca4fd895947a737f4ee823d997770e5c9df50c0c9fe2c0b945c6ffd13b7151e385b631520ac34a5967c6cd0d12b3746795681600541c17d379daed41ce8e715eba582fb668e160872a2", 0xe7, 0x7}, {&(0x7f0000000780)="6154d093a5a905da96fed5f8dea36bcd9d1d011246f7caf86806bf6ac6301d2d2b448461b867bbbe7d0eebdeafa16d7219af85ff4372670039ce277546def59f1d0eed4be4386a34c7243fe3ec84ad3807136a2c3ec35d6d87a7d7bb9342622cc3a7ff529ef3d76ff57fc7a1856f50b98e518515a9e679067cfc0e8500754fa30a81cf4dc42c5a0d36647280c5b0a8506efaf9ad06594678176efe4bdbcf7ab384b597df4c5ad66b2bd240823abe04cd30785819f1c7fd4d46bb55f8bd09ca4b44618b010e363fa572ca189ec73b36ad46b6f38d65c0acc417", 0xd9, 0x5}], 0x200000, 0x0) syz_mount_image$jfs(&(0x7f0000000080)='jfs\x00', &(0x7f0000000880)='./file0\x00', 0xfffffffffffffffe, 0x3, &(0x7f0000002dc0)=[{&(0x7f0000000900)="efee47debce411554253d03f2175c060de26b9a7a197d9327971105aafdf17a061227fe7dd52d3c1c1f0318992f304f7646c3eb4e32ff0514d34d4605b4e152474aa71ac6c0ba890b1f249f213d5bc162b605fdf3c524d6f84e1a2f8461d26ef5dd50b193ffb710ee69fc431552ae4548f0c1a7e503243bb10c53c566f37e3234d8b3d418992dca946568d275e1f54895a854bab3790963108fe6ce5b1f933e81bd0aa2dfd715aca4bd81b48b28e3ee265", 0xb1, 0x1}, {&(0x7f0000001a80)="b4bc90ad72742e5693f04c7955b05460b33cd0ca9cde365dbe1671162a8c1db744cb8a04d1d747ab4d3234fd615e6ad897396c21b8bf7da2c1d524d04fadade841e5acfac529250a2c75fed4b65a7b6c8735268244189e020c526112728097958fd591d00cd16d1591db9b0414d985d7718794369eb03d89403b7df76f6d745c94d4fa986321a9915fea55a73472bc39620fcf22ec74d02b77fafe6ccf72605eb0ba7ae69fa10a36d281e65a178528bc654ce5b6109d5294e400b18be755a3b899489b27a876ac3ea033ed525b28c7dff537b5210cbff466dc339e1f58db1679816589e886264ef1bcf6d0e1408d93946827711972", 0xf5, 0x7}, {&(0x7f0000002cc0)="c9bc1928c9ffffe99fdae39f5013810a038f1d558affc92341c81ee308195dabd95fcfedcfccd4cf2af62477e5ed935114b73940dba239c47d5824a3332fb48cea682934a6840ea5db2529c3a7c371bbf08f08bb15458de586609be64b699f29b7384dc7b2ba78f0e343fb9851eaf5a7b4106fc5b7a8aaf6e069012286fa7259807928cbee722222f45e6c98cefa00829bcdd92bd03273c7b0f20453c72150adf49c311248d3d3d96ad17187d60add3d1d8fbfbc5e572ceba134e5c533a5f75630a35514ee998b85a755085c04513dcc0047461d78f4aa8fdf0309fc39e3e4a1c24b4538acbf2366feaf", 0xea, 0x4}], 0x10000, &(0x7f0000002ec0)={[{@resize='resize', 0x2c}, {@umask={'umask', 0x3d, [0x3f]}, 0x2c}]}) 2018/03/30 19:43:01 executing program 7: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f000099e000)={0x2, 0x4e20, @multicast1=0xe0000001}, 0x10) sendto$inet(r0, &(0x7f0000de1fff), 0xfffffffffffffd43, 0x20008005, &(0x7f0000db4ff0)={0x2, 0x0, @loopback=0x7f000001}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000af5000)='illinois\x00', 0x9) getsockopt$inet_tcp_buf(r0, 0x6, 0x1a, &(0x7f0000000000)=""/177, &(0x7f0000000100)=0xb1) 2018/03/30 19:43:01 executing program 3: mmap(&(0x7f000053b000/0x2000)=nil, 0x2000, 0x1000004, 0x40000002871, 0xffffffffffffffff, 0x0) ioctl$sock_inet_SIOCDELRT(0xffffffffffffffff, 0x890c, &(0x7f0000000100)={0x7ff, {0x2, 0x4e22, @local={0xac, 0x14, 0x14, 0xaa}}, {0x2, 0x4e20, @dev={0xac, 0x14, 0x14}}, {0x2, 0x0, @multicast2=0xe0000002}, 0x0, 0x0, 0x1, 0x0, 0x40, &(0x7f0000000040)='ip_vti0\x00', 0x0, 0x8000}) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x1c, &(0x7f00000000c0)={@empty, 0x0}, &(0x7f0000000080)=0x14) mremap(&(0x7f000053b000/0x1000)=nil, 0x1000, 0x4000, 0x3, &(0x7f00000cc000/0x4000)=nil) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000280)='/dev/ppp\x00', 0x2400, 0x0) ioctl$sock_inet_SIOCGIFPFLAGS(r1, 0x8935, &(0x7f00000002c0)={'syz_tun\x00', 0x5}) mremap(&(0x7f000053a000/0x1000)=nil, 0x1000, 0x4000, 0x3, &(0x7f00000cf000/0x4000)=nil) mremap(&(0x7f000053c000/0x1000)=nil, 0x1000, 0x2000, 0x3, &(0x7f00000cd000/0x2000)=nil) getsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, &(0x7f0000000300)={{{@in6, @in=@local, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6}}}, &(0x7f0000000400)=0xe8) setsockopt$inet6_IPV6_IPSEC_POLICY(r1, 0x29, 0x22, &(0x7f0000000440)={{{@in6=@loopback={0x0, 0x1}, @in=@rand_addr=0xd3, 0x4e20, 0x5, 0x4e20, 0x1, 0xa, 0xa0, 0x80, 0x0, r0, r2}, {0x0, 0x100, 0x0, 0x1ff, 0x7, 0x100, 0x9, 0x100000000}, {0x3, 0x10001, 0xffffffffffffff80, 0x2}, 0x4, 0x6e6bb3, 0x1, 0x0, 0x2, 0x2}, {{@in6=@mcast1={0xff, 0x1, [], 0x1}, 0x4d6, 0xff}, 0x0, @in6=@mcast1={0xff, 0x1, [], 0x1}, 0x3506, 0x2, 0x1, 0x4, 0xfffffffffffffbff, 0xe323, 0xde}}, 0xe8) mremap(&(0x7f000053a000/0x3000)=nil, 0x3000, 0x3000, 0x3, &(0x7f00000cc000/0x3000)=nil) r3 = syz_open_dev$mice(&(0x7f0000000000)='/dev/input/mice\x00', 0x0, 0x4000) getsockopt$inet_sctp6_SCTP_AUTH_ACTIVE_KEY(0xffffffffffffffff, 0x84, 0x18, &(0x7f0000000180)={0x0, 0xa17c}, &(0x7f00000001c0)=0x8) openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000540)='/dev/vga_arbiter\x00', 0x0, 0x0) getsockopt$inet_sctp_SCTP_ASSOCINFO(r3, 0x84, 0x1, &(0x7f0000000200)={r4, 0x6, 0x101, 0xfffffffffffffff9, 0x2}, &(0x7f0000000240)=0x14) sigaltstack(&(0x7f000053b000/0x4000)=nil, 0x0) 2018/03/30 19:43:01 executing program 6: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_mreqn(r0, 0x0, 0x27, &(0x7f0000000000)={@multicast2=0xe0000002, @loopback=0x7f000001}, 0xc) getsockopt$inet_sctp6_SCTP_FRAGMENT_INTERLEAVE(0xffffffffffffffff, 0x84, 0x12, &(0x7f0000000080), &(0x7f00000000c0)=0x4) ioctl$sock_inet_SIOCGIFDSTADDR(0xffffffffffffffff, 0x8917, &(0x7f0000000040)={'bcsh0\x00', {0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x1a}}}) setsockopt$inet_sctp6_SCTP_MAX_BURST(0xffffffffffffffff, 0x84, 0x14, &(0x7f0000000380)=@int=0x3, 0x4) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000140)={'bcsh0\x00', 0x0}) ioctl$sock_inet6_SIOCDELRT(0xffffffffffffffff, 0x890c, &(0x7f0000000180)={@dev={0xfe, 0x80, [], 0x13}, @loopback={0x0, 0x1}, @mcast2={0xff, 0x2, [], 0x1}, 0x6, 0x0, 0x42e, 0x100, 0x9, 0x80000000, r1}) r2 = socket$inet(0x2, 0xa, 0x5) setsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX(r2, 0x84, 0x6e, &(0x7f0000000600)=[@in={0x2, 0x4e21, @multicast1=0xe0000001}, @in6={0xa, 0x4e20, 0x0, @remote={0xfe, 0x80, [], 0xbb}}, @in={0x2, 0x4e22, @multicast2=0xe0000002}, @in6={0xa, 0x4e21, 0x1ff, @local={0xfe, 0x80, [], 0xaa}, 0x84}, @in6={0xa, 0x4e20, 0x4, @local={0xfe, 0x80, [], 0xaa}}], 0x74) getsockopt$inet_sctp6_SCTP_PR_SUPPORTED(0xffffffffffffffff, 0x84, 0x71, &(0x7f0000000200)={0x0, 0x8}, &(0x7f0000000240)=0x8) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(0xffffffffffffffff, 0x84, 0x6f, &(0x7f0000000300)={r3, 0x70, &(0x7f0000000280)=[@in={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x12}}, @in={0x2, 0x4e24, @loopback=0x7f000001}, @in={0x2, 0x0, @remote={0xac, 0x14, 0x14, 0xbb}}, @in={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x1a}}, @in={0x2, 0x4e24, @remote={0xac, 0x14, 0x14, 0xbb}}, @in={0x2, 0x4e24, @rand_addr=0x3ff}, @in={0x2, 0x4e24, @multicast2=0xe0000002}]}, &(0x7f0000000340)=0x10) setsockopt$inet_sctp6_SCTP_SET_PEER_PRIMARY_ADDR(0xffffffffffffffff, 0x84, 0x5, &(0x7f00000004c0)={r4, @in={{0x2, 0x4e20, @rand_addr}}}, 0x84) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, &(0x7f00000003c0)={'lo\x00', 0x4100}) ioctl$sock_inet_SIOCGIFNETMASK(0xffffffffffffffff, 0x891b, &(0x7f0000000100)={'nr0\x00', {0x2, 0x4e24, @loopback=0x7f000001}}) setsockopt$inet_msfilter(r0, 0x0, 0x29, &(0x7f0000000680)=ANY=[@ANYBLOB="cf0000000276d172390cc8c4ff4f3b746e5947c2ddb66a93ebb6d0f75b5f453435c311b94e126c49d47c10682b6e523d09fae1d416ebface98e08aa083e9f1f1afa118eb05655fec48d75d7a37edd032552c60ffeb53a2c8eecbe601a4ac5dceeecf1a943c2d9e2eaf4ad0a93e82a1a37a0cf2adbc4b512680428fee922ad18ff90ec6f87a75b299a953167bf4f9ae31cffd2c31dd47ba7d69151424dc1b2835f7624a302f270eb89118043dc1e1faa46e667be9cbf4456ad0c580ed032e4e49459f68f8a70f2dfe40f51362ffae"], 0x1) pread64(r0, &(0x7f0000000340)=""/181, 0xb5, 0x62) setsockopt$inet_msfilter(r0, 0x0, 0x29, &(0x7f0000000580)=ANY=[@ANYBLOB="e00000027f0000010000000001000000000000006b59aa51deb20d6efc9c04b7c9420f6434d31cbbe99b52873a8c21"], 0x1) socket$inet_udp(0x2, 0x2, 0x0) bpf$BPF_PROG_GET_NEXT_ID(0xb, &(0x7f0000000400)=0x7, 0x4) r5 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000ba4000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x2, 0x78, 0xe2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, r5, 0x0) r6 = perf_event_open(&(0x7f0000014f88)={0x1, 0x78, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00002e8000)}}, 0x0, 0x0, r5, 0x0) readv(r6, &(0x7f0000734000)=[{&(0x7f0000d42000)=""/146, 0x92}], 0x1) getsockopt$inet_sctp_SCTP_PEER_ADDR_THLDS(0xffffffffffffffff, 0x84, 0x1f, &(0x7f0000000480)={0x0, @in={{0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0xd}}}, 0xf80866d, 0x5}, &(0x7f0000000540)=0x90) getsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(0xffffffffffffff9c, 0x84, 0x18, &(0x7f0000000440)={r7, 0x400000000004}, &(0x7f00000005c0)=0xffffffffffffffc3) getsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER_VALUE(r0, 0x84, 0x7c, &(0x7f00000002c0)={r8, 0x10001, 0xc9e9}, &(0x7f0000000300)=0x8) [ 500.502266] FAT-fs (loop4): Unrecognized mount option "time_offset=" or missing value [ 500.542124] BFS-fs: bfs_fill_super(): No BFS filesystem on loop4 (magic=00000000) 2018/03/30 19:43:01 executing program 7: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f000099e000)={0x2, 0x4e20, @multicast1=0xe0000001}, 0x10) sendto$inet(r0, &(0x7f0000de1fff), 0xfffffffffffffd43, 0x20008005, &(0x7f0000db4ff0)={0x2, 0x0, @loopback=0x7f000001}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000af5000)='illinois\x00', 0x9) getsockopt$inet_tcp_buf(r0, 0x6, 0x1a, &(0x7f0000000000)=""/177, &(0x7f0000000100)=0xb1) [ 500.581469] jfs: Unrecognized mount option "umask=?" or missing value 2018/03/30 19:43:01 executing program 0: fstat(0xffffffffffffffff, &(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$TUNSETGROUP(0xffffffffffffffff, 0x400454ce, r0) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f00000003c0), &(0x7f0000000400)=0xc) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000440)) fcntl$getown(0xffffffffffffffff, 0x9) r1 = syz_open_procfs(0x0, &(0x7f0000000040)="2f65786500000000000090d8b75e67e16b394342abb5158df87ea8984e79c93df7498b2b34796068700e29fbd789f9a031f23e16c96e30baed2961953b057f7a3222943acc4b8cfa4de553f8276731ddeb811efd44ea011e1a0db9074a28a826c88566b89c57cc3cca4aec41d37fa27c8daa19030d03139d0aea71d509d9a20ba7deceb656cc1308d9d1f111b6bd1595486f55e229923be4ed8cbfb78e86280b4cacf386bfa8840afb312a4c520a03b27f805d181bd09ea208931a36e888060a2d") openat$ppp(0xffffffffffffff9c, &(0x7f0000000380)='/dev/ppp\x00', 0x0, 0x0) fsetxattr(r1, &(0x7f0000000140)=@known='user.syz\x00', &(0x7f0000000180)="363c51940180ebe7753205aff0fa0447a66dafe9356a7523588002a93724a0e1fe2d1192f3e19aec4d078b2ab1bb0365360f1339aa1b80de79356570d0a6b7a6025c471e7b8514989fa1e6746581add1157d812fd9ef438b5cd74178ad1fa3bb6cff15a3ede5d306b4f8d977fd65146e99d0c2b2c1d5f2c62577c3c094b374cc50eafec5b0a349c4b04ad425b5dd4d51856e426f359338dbcbe939c9da32b8ffb1f84e3df8dca651656e7818d949b14b5560d71c92335881a988a06f5c2b798dad13916946e32139ede4df933f525428b81464aea9a3c66c410bc4718ba27dab77cee9c682d9dcba6fdd36e36057a6bda603998e69e4aa516c825653071d26d991b749e7b19c2f076a0dc8f0240aabfae82984f0ee5172a6d18e0de0c1f674e57e4a71c0093db907000000000000000000000000000000", 0x137, 0x0) fremovexattr(r1, &(0x7f0000000000)=@known='user.syz\x00') ioctl$DRM_IOCTL_GET_CAP(r1, 0xc010640c, &(0x7f0000000800)) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f00000002c0)) chdir(&(0x7f0000000280)='./file0\x00') socket$inet_tcp(0x2, 0x1, 0x0) inotify_init() r2 = syz_open_dev$sg(&(0x7f0000000000)='/dev/sg#\x00', 0x100000002000, 0x20000) getsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r2, 0x84, 0x8, &(0x7f0000000280), &(0x7f0000000c00)=0x4) inotify_rm_watch(0xffffffffffffffff, 0x0) ioctl$sock_SIOCGPGRP(r2, 0x8904, &(0x7f0000000180)=0x0) get_robust_list(r3, &(0x7f0000000a00)=&(0x7f0000000240)={&(0x7f0000000200)={&(0x7f00000001c0)}}, &(0x7f0000000740)=0x6) mkdir(&(0x7f0000042ff6)='./control\x00', 0x0) inotify_init() execve(&(0x7f00000000c0)='./control\x00', &(0x7f0000000840)=[&(0x7f00000007c0)='/dev/sequencer\x00', &(0x7f0000000800)="776c616e312576626f786e657431f46b657972696e6700"], &(0x7f00000008c0)=[&(0x7f0000000880)="2b5ee42c706f7369785f61636c5f616363657373776c616e30657468302df62e766d6e6574302d7d00"]) connect$inet6(r2, &(0x7f0000000140)={0xa, 0x4e23, 0x7}, 0x1c) setsockopt$EBT_SO_SET_ENTRIES(r2, 0x0, 0x80, &(0x7f0000000900)=@nat={'nat\x00', 0x19, 0x5, 0x0, [0x20000c80, 0x0, 0x0, 0x20000d7c, 0x20000e48], 0x0, &(0x7f0000000700), &(0x7f0000000980)=ANY=[@ANYBLOB]}, 0x78) getsockopt$inet_sctp_SCTP_GET_PEER_ADDR_INFO(0xffffffffffffff9c, 0x84, 0xf, &(0x7f0000001000)={0x0, @in={{0x2, 0x4e20, @remote={0xac, 0x14, 0x14, 0xbb}}}, 0x7, 0x1, 0x4, 0x0, 0x7ff}, &(0x7f0000000300)=0x98) sendmsg(r2, &(0x7f00000006c0)={&(0x7f00000004c0)=@sco={0x1f, {0x0, 0x3, 0x100000000, 0xda5, 0x1, 0x7}}, 0x80, &(0x7f0000000540)=[{&(0x7f0000000a80)}], 0x1}, 0x0) 2018/03/30 19:43:01 executing program 3: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000fdaff6)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000fd9ffc)=0x3) ioctl$TCFLSH(0xffffffffffffffff, 0x540b, 0x0) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x4000, 0x0) ioctl$TCFLSH(0xffffffffffffffff, 0x540b, 0x0) memfd_create(&(0x7f0000000100)=']\x00', 0x0) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup.net\x00', 0x200002, 0x0) fchdir(r1) r2 = creat(&(0x7f0000000080)='./file0\x00', 0x0) write$cgroup_pid(r2, &(0x7f0000000100)=ANY=[], 0x1023c) ioctl$DRM_IOCTL_GEM_FLINK(0xffffffffffffffff, 0xc008640a, &(0x7f0000000000)) fallocate(0xffffffffffffffff, 0x0, 0x0, 0xffff) pipe(&(0x7f0000000040)={0xffffffffffffffff}) r4 = inotify_init1(0x0) r5 = open(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) dup2(r4, r5) getsockopt$inet_sctp_SCTP_DELAYED_SACK(r3, 0x84, 0x10, &(0x7f0000000240)=@sack_info={0x0}, &(0x7f0000000280)=0xc) add_key$keyring(&(0x7f00000004c0)='keyring\x00', &(0x7f0000000500)={0x73, 0x79, 0x7a}, 0x0, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(0xffffffffffffffff, 0x84, 0x9, &(0x7f00000002c0)={r6, @in6={{0xa, 0x0, 0x0, @mcast2={0xff, 0x2, [], 0x1}, 0x6}}, 0x0, 0x80}, &(0x7f0000000380)=0x98) unshare(0x0) clone(0x0, &(0x7f0000b53000), &(0x7f000084effc), &(0x7f0000c35ffc), &(0x7f0000b3bfff)) ioprio_set$pid(0x2, 0x0, 0x0) setsockopt$inet_sctp6_SCTP_MAX_BURST(0xffffffffffffffff, 0x84, 0x14, &(0x7f0000000180)=@assoc_value, 0x8) exit_group(0x7) [ 500.879161] IPVS: ftp: loaded support on port[0] = 21 2018/03/30 19:43:01 executing program 5: unshare(0x40000000) perf_event_open(&(0x7f000001d000)={0x2, 0x78, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000000)={0x6, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0xa, 0x1, 0x0) ioctl(r0, 0x8982, &(0x7f0000000000)) r1 = socket$packet(0x11, 0x0, 0x300) r2 = openat$cuse(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/cuse\x00', 0x82, 0x0) io_setup(0x43f, &(0x7f00000000c0)=0x0) io_submit(r3, 0x1, &(0x7f0000000000)=[&(0x7f0000000200)={0x0, 0x0, 0x0, 0x1, 0x0, r2, &(0x7f0000000040)="10000000020400000000000000000000", 0x10}]) r4 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000280)='/proc/sys/net/ipv4/vs/secure_tcp\x00', 0x2, 0x0) sendmsg$kcm(r4, &(0x7f0000001f00)={&(0x7f0000001b40)=@pppol2tpin6={0x18, 0x1, {0x0, r1, 0x0, 0x1, 0x0, 0x0, {0xa, 0x4e24, 0xc1, @mcast1={0xff, 0x1, [], 0x1}}}}, 0x80, &(0x7f0000001d80)=[{&(0x7f0000001bc0)="a9db123ebf124fab0f2eec9774559e3b5870fb7c6818fc89c4b8742d057480657265ae2b34fb2d4e585d22ca1bf7b0a22ce38a20a819d919947c78f8d5c9f3291905fd3ed2b8ef8a79d9453396c6b0b7eb0778dbc49b32ae91e443b64edddcf320c1589c7777eadd4e57c01b20a8ca7a831e8e2c104d0194d52fb5c35b550f", 0x7f}], 0x1, &(0x7f0000001dc0)=ANY=[], 0x0, 0x90}, 0x20000000) r5 = syz_open_dev$tun(&(0x7f00000001c0)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r5, 0x400454ca, &(0x7f0000000200)={'bridge0\x00\x00p\x00', 0x4000000000001005}) socketpair(0x1d, 0x3, 0x40, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_inet_SIOCSIFADDR(r6, 0x8916, &(0x7f0000000100)={'bridge8\x00', {0x2, 0x0, @dev={0xac, 0x14, 0x14}}}) ioctl$LOOP_SET_FD(r2, 0x4c00, r1) ioctl$SNDRV_SEQ_IOCTL_RUNNING_MODE(0xffffffffffffffff, 0xc0105303, &(0x7f00000002c0)={0x2, 0x8}) add_key$keyring(&(0x7f00000000c0)='keyring\x00', &(0x7f0000000100)={0x73, 0x79, 0x7a}, 0x0, 0x0, 0x0) clone(0x0, &(0x7f0000000040), &(0x7f0000000080), &(0x7f0000000000), &(0x7f0000000100)) ioctl$int_in(0xffffffffffffffff, 0x800000c004500a, &(0x7f0000006ff8)) wait4(0x0, 0x0, 0x4, &(0x7f0000000380)) ioctl$sock_inet_sctp_SIOCINQ(r7, 0x541b, &(0x7f0000000180)) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_PORT(0xffffffffffffffff, 0xc0a85352, &(0x7f0000001980)={{}, 'port1\x00', 0x0, 0x20010, 0x1f, 0x0, 0x3, 0x40, 0x0, 0x0, 0x4, 0x6d1}) 2018/03/30 19:43:01 executing program 7: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f000099e000)={0x2, 0x4e20, @multicast1=0xe0000001}, 0x10) sendto$inet(r0, &(0x7f0000de1fff), 0xfffffffffffffd43, 0x20008005, &(0x7f0000db4ff0)={0x2, 0x4e20, @loopback=0x7f000001}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, &(0x7f0000af5000)='illinois\x00', 0x9) getsockopt$inet_tcp_buf(r0, 0x6, 0x1a, &(0x7f0000000000)=""/177, &(0x7f0000000100)=0xb1) 2018/03/30 19:43:01 executing program 4: symlinkat(&(0x7f0000002f00)='./file0\x00', 0xffffffffffffffff, &(0x7f0000002f80)='./file0\x00') syz_mount_image$msdos(&(0x7f0000002fc0)='msdos\x00', &(0x7f0000003000)='./file0\x00', 0x4, 0x1, &(0x7f0000003180)=[{&(0x7f0000003040)="eaf9610c9f7031a1f58e51e73b3f0bd5af4364c38bbe335dbd3d211ec0338ba4c795c634af757a3c684da6110f67891133a6303441b21d139e3a6582efdaeabd3d68dbcb85cd383733a98084b62807af0b7ea49d68daa4cc9fda43dbeb13c3e67c44c463a2c429ccb66c0e1a9dfd5c911d4d7b578baaad6571d4457b9c6d92122a4bd97f5f174c81081941b007062f2cab2db1466851dde671e025909a633fec433bb2512fc61c436b74df23d280019a403884dc488071", 0xb7, 0xcd7}], 0x8, &(0x7f00000031c0)={[{@errors_continue='errors=continue', 0x2c}, {@time_offset={'time_offset', 0x3d, [0x0]}, 0x2c}]}) pipe(&(0x7f0000002f40)={0xffffffffffffffff}) r1 = open(&(0x7f0000003240)='./file0\x00', 0xa0001, 0x20) linkat(r0, &(0x7f0000003200)='./file0\x00', r1, &(0x7f0000003280)='./file0\x00', 0x400) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x80000, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)}, {&(0x7f0000010d00)="0000000000000000000000000000000000000000000000000000000002ae0000ed41000000040000d15bbe5ad15bbe5ad15bbe5a00000000000005002000000000000800070000000af301000400000000000000000000000100000030000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a1950000", 0xa0, 0x8c60}, {&(0x7f0000011a00)="020000000c0001022e000000020000000c0002022e2e00000b00000014000a026c6f73742b666f756e6400000c0000001000050166696c65300000000d0000001000050266696c65310000000f0000001000050166696c6532000000100000001000050166696c6533000000110000001000050166696c65340000001200000010000802564944454f5f54531400000068031201d181d18ed0b7d0bad0b0d0bbd0bbd0b5d1800000000000000000000000000000000000000000000000000000", 0xc0, 0xc000}, {&(0x7f0000012200)="0000000000000000000000000000000000000000000000000c0000dec910dfd800000000f4030000000000000000000000000000000000000000000000000000", 0x40, 0x117e0}, {&(0x7f0000012a00)="0d0000000c0001022e000000020000000c0002022e2e00000e000000dc03050166696c6530000000000000000000000000000000000000000000000000000000", 0x40, 0x1c000}], 0x0, &(0x7f0000013000)) syz_mount_image$bfs(&(0x7f0000000040)='bfs\x00', &(0x7f00000008c0)='./file0\x00', 0x20, 0x2, &(0x7f0000000180)=[{&(0x7f00000005c0)="f37e57346e86cb5adec662d7bd6f13a3764d2ca7640f9f81ba88d0689d0989735a7bafd5558d9a6e8988f9f6038fa475e49077bc8cfc6e170c4cdbaaa1375895c9a4068559d3cecf2a0423caa696bf77a75b3ae3f32b79da059ca13d055647998987fc2033d008bd55deb08808372b9b4595fb0d79a1358cd5949d859a7d155e86db4b608eb401109f6b792f5ce4a2ead9870dee49347bc08d0d54b0e4fca4fd895947a737f4ee823d997770e5c9df50c0c9fe2c0b945c6ffd13b7151e385b631520ac34a5967c6cd0d12b3746795681600541c17d379daed41ce8e715eba582fb668e160872a2", 0xe7, 0x7}, {&(0x7f0000000780)="6154d093a5a905da96fed5f8dea36bcd9d1d011246f7caf86806bf6ac6301d2d2b448461b867bbbe7d0eebdeafa16d7219af85ff4372670039ce277546def59f1d0eed4be4386a34c7243fe3ec84ad3807136a2c3ec35d6d87a7d7bb9342622cc3a7ff529ef3d76ff57fc7a1856f50b98e518515a9e679067cfc0e8500754fa30a81cf4dc42c5a0d36647280c5b0a8506efaf9ad06594678176efe4bdbcf7ab384b597df4c5ad66b2bd240823abe04cd30785819f1c7fd4d46bb55f8bd09ca4b44618b010e363fa572ca189ec73b36ad46b6f38d65c0acc417", 0xd9, 0x5}], 0x200000, 0x0) syz_mount_image$jfs(&(0x7f0000000080)='jfs\x00', &(0x7f0000000880)='./file0\x00', 0xfffffffffffffffe, 0x3, &(0x7f0000002dc0)=[{&(0x7f0000000900)="efee47debce411554253d03f2175c060de26b9a7a197d9327971105aafdf17a061227fe7dd52d3c1c1f0318992f304f7646c3eb4e32ff0514d34d4605b4e152474aa71ac6c0ba890b1f249f213d5bc162b605fdf3c524d6f84e1a2f8461d26ef5dd50b193ffb710ee69fc431552ae4548f0c1a7e503243bb10c53c566f37e3234d8b3d418992dca946568d275e1f54895a854bab3790963108fe6ce5b1f933e81bd0aa2dfd715aca4bd81b48b28e3ee265", 0xb1, 0x1}, {&(0x7f0000001a80)="b4bc90ad72742e5693f04c7955b05460b33cd0ca9cde365dbe1671162a8c1db744cb8a04d1d747ab4d3234fd615e6ad897396c21b8bf7da2c1d524d04fadade841e5acfac529250a2c75fed4b65a7b6c8735268244189e020c526112728097958fd591d00cd16d1591db9b0414d985d7718794369eb03d89403b7df76f6d745c94d4fa986321a9915fea55a73472bc39620fcf22ec74d02b77fafe6ccf72605eb0ba7ae69fa10a36d281e65a178528bc654ce5b6109d5294e400b18be755a3b899489b27a876ac3ea033ed525b28c7dff537b5210cbff466dc339e1f58db1679816589e886264ef1bcf6d0e1408d93946827711972", 0xf5, 0x7}, {&(0x7f0000002cc0)="c9bc1928c9ffffe99fdae39f5013810a038f1d558affc92341c81ee308195dabd95fcfedcfccd4cf2af62477e5ed935114b73940dba239c47d5824a3332fb48cea682934a6840ea5db2529c3a7c371bbf08f08bb15458de586609be64b699f29b7384dc7b2ba78f0e343fb9851eaf5a7b4106fc5b7a8aaf6e069012286fa7259807928cbee722222f45e6c98cefa00829bcdd92bd03273c7b0f20453c72150adf49c311248d3d3d96ad17187d60add3d1d8fbfbc5e572ceba134e5c533a5f75630a35514ee998b85a755085c04513dcc0047461d78f4aa8fdf0309fc39e3e4a1c24b4538acbf2366feaf", 0xea, 0x4}], 0x10000, &(0x7f0000002ec0)={[{@resize='resize', 0x2c}, {@umask={'umask', 0x3d, [0x3f]}, 0x2c}]}) 2018/03/30 19:43:01 executing program 6: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_mreqn(r0, 0x0, 0x27, &(0x7f0000000000)={@multicast2=0xe0000002, @loopback=0x7f000001}, 0xc) getsockopt$inet_sctp6_SCTP_FRAGMENT_INTERLEAVE(0xffffffffffffffff, 0x84, 0x12, &(0x7f0000000080), &(0x7f00000000c0)=0x4) ioctl$sock_inet_SIOCGIFDSTADDR(0xffffffffffffffff, 0x8917, &(0x7f0000000040)={'bcsh0\x00', {0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x1a}}}) setsockopt$inet_sctp6_SCTP_MAX_BURST(0xffffffffffffffff, 0x84, 0x14, &(0x7f0000000380)=@int=0x3, 0x4) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000140)={'bcsh0\x00', 0x0}) ioctl$sock_inet6_SIOCDELRT(0xffffffffffffffff, 0x890c, &(0x7f0000000180)={@dev={0xfe, 0x80, [], 0x13}, @loopback={0x0, 0x1}, @mcast2={0xff, 0x2, [], 0x1}, 0x6, 0x0, 0x42e, 0x100, 0x9, 0x80000000, r1}) r2 = socket$inet(0x2, 0xa, 0x5) setsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX(r2, 0x84, 0x6e, &(0x7f0000000600)=[@in={0x2, 0x4e21, @multicast1=0xe0000001}, @in6={0xa, 0x4e20, 0x0, @remote={0xfe, 0x80, [], 0xbb}}, @in={0x2, 0x4e22, @multicast2=0xe0000002}, @in6={0xa, 0x4e21, 0x1ff, @local={0xfe, 0x80, [], 0xaa}, 0x84}, @in6={0xa, 0x4e20, 0x4, @local={0xfe, 0x80, [], 0xaa}}], 0x74) getsockopt$inet_sctp6_SCTP_PR_SUPPORTED(0xffffffffffffffff, 0x84, 0x71, &(0x7f0000000200)={0x0, 0x8}, &(0x7f0000000240)=0x8) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(0xffffffffffffffff, 0x84, 0x6f, &(0x7f0000000300)={r3, 0x70, &(0x7f0000000280)=[@in={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x12}}, @in={0x2, 0x4e24, @loopback=0x7f000001}, @in={0x2, 0x0, @remote={0xac, 0x14, 0x14, 0xbb}}, @in={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x1a}}, @in={0x2, 0x4e24, @remote={0xac, 0x14, 0x14, 0xbb}}, @in={0x2, 0x4e24, @rand_addr=0x3ff}, @in={0x2, 0x4e24, @multicast2=0xe0000002}]}, &(0x7f0000000340)=0x10) setsockopt$inet_sctp6_SCTP_SET_PEER_PRIMARY_ADDR(0xffffffffffffffff, 0x84, 0x5, &(0x7f00000004c0)={r4, @in={{0x2, 0x4e20, @rand_addr=0x8}}}, 0x84) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, &(0x7f00000003c0)={'lo\x00'}) ioctl$sock_inet_SIOCGIFNETMASK(0xffffffffffffffff, 0x891b, &(0x7f0000000100)={'nr0\x00', {0x2, 0x4e24, @loopback=0x7f000001}}) setsockopt$inet_msfilter(r0, 0x0, 0x29, &(0x7f0000000680)=ANY=[@ANYBLOB="cf0000000276d172390cc8c4ff4f3b746e5947c2ddb66a93ebb6d0f75b5f453435c311b94e126c49d47c10682b6e523d09fae1d416ebface98e08aa083e9f1f1afa118eb05655fec48d75d7a37edd032552c60ffeb53a2c8eecbe601a4ac5dceeecf1a943c2d9e2eaf4ad0a93e82a1a37a0cf2adbc4b512680428fee922ad18ff90ec6f87a75b299a953167bf4f9ae31cffd2c31dd47ba7d69151424dc1b2835f7624a302f270eb89118043dc1e1faa46e667be9cbf4456ad0c580ed032e4e49459f68f8a70f2dfe40f51362ffae"], 0x1) pread64(r0, &(0x7f0000000340)=""/181, 0xb5, 0x62) setsockopt$inet_msfilter(r0, 0x0, 0x29, &(0x7f0000000580)=ANY=[@ANYBLOB="e00000027f0000010000000001000000000000006b59aa51deb20d6efc9c04b7c9420f6434d31cbbe99b52873a8c21"], 0x1) socket$inet_udp(0x2, 0x2, 0x0) bpf$BPF_PROG_GET_NEXT_ID(0xb, &(0x7f0000000400)=0x7, 0x4) r5 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000ba4000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x2, 0x78, 0xe2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, r5, 0x0) r6 = perf_event_open(&(0x7f0000014f88)={0x1, 0x78, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00002e8000)}}, 0x0, 0x0, r5, 0x0) readv(r6, &(0x7f0000734000)=[{&(0x7f0000d42000)=""/146, 0x92}], 0x1) getsockopt$inet_sctp_SCTP_PEER_ADDR_THLDS(0xffffffffffffffff, 0x84, 0x1f, &(0x7f0000000480)={0x0, @in={{0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0xd}}}, 0xf80866d, 0x5}, &(0x7f0000000540)=0x90) getsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(0xffffffffffffff9c, 0x84, 0x18, &(0x7f0000000440)={r7, 0x400000000004}, &(0x7f00000005c0)=0xffffffffffffffc3) getsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER_VALUE(r0, 0x84, 0x7c, &(0x7f00000002c0)={r8, 0x10001, 0xc9e9}, &(0x7f0000000300)=0x8) [ 500.967056] FAT-fs (loop4): Unrecognized mount option "time_offset=" or missing value [ 501.009974] EXT4-fs (loop4): VFS: Can't find ext4 filesystem [ 501.040602] BFS-fs: bfs_fill_super(): No BFS filesystem on loop4 (magic=00000000) [ 501.096254] jfs: Unrecognized mount option "umask=?" or missing value [ 501.801723] IPVS: ftp: loaded support on port[0] = 21 2018/03/30 19:43:02 executing program 0: r0 = socket(0xa, 0x2, 0x0) flock(r0, 0x6) sendmsg$IPVS_CMD_GET_INFO(r0, &(0x7f00000009c0)={&(0x7f0000000500)={0x10}, 0xc, &(0x7f0000000980)={&(0x7f0000000a00)=ANY=[]}, 0x1}, 0x20000884) ioctl$sock_FIOGETOWN(r0, 0x8903, &(0x7f0000000200)) connect$inet6(r0, &(0x7f0000000100)={0xa, 0x0, 0x0, @mcast1={0xff, 0x1, [], 0x1}}, 0x1c) getsockopt$inet_sctp_SCTP_PRIMARY_ADDR(0xffffffffffffffff, 0x84, 0x6, &(0x7f00000002c0)={0x0, @in6={{0xa, 0x4e23, 0x0, @mcast2={0xff, 0x2, [], 0x1}, 0x7fffffff}}}, &(0x7f0000000380)=0x84) setsockopt$inet_sctp_SCTP_STREAM_SCHEDULER(0xffffffffffffffff, 0x84, 0x7b, &(0x7f0000000400)={r1}, 0x3ba) getsockopt$inet_opts(r0, 0x0, 0x9, &(0x7f0000000540)=""/99, &(0x7f0000000780)=0x63) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000140)='./cgroup.cpu\x00', 0x200002, 0x0) fchdir(r2) fstat(0xffffffffffffffff, &(0x7f0000000180)) bind$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x4e21, @multicast1=0xe0000001}, 0x10) sendto$inet(0xffffffffffffffff, &(0x7f00000003c0), 0x0, 0x20020003, &(0x7f0000000040)={0x2, 0x0, @loopback=0x7f000001}, 0x10) r3 = creat(&(0x7f0000000100)='./file1\x00', 0x0) fallocate(r3, 0x1, 0x0, 0x20004d2d) sendto$inet(0xffffffffffffffff, &(0x7f0000000000)="1356c1f7a6f170d95ec6cfc03678287eebc2e19824311a777e1aa3", 0x1b, 0x0, &(0x7f0000000080)={0x2, 0x0, @broadcast=0xffffffff}, 0x10) socket$inet6_icmp(0xa, 0x2, 0x3a) sendmsg$inet_sctp(r0, &(0x7f000050dfc8)={&(0x7f0000000840)=@in6={0xa, 0x4e24, 0x80000001, @mcast1={0xff, 0x1, [], 0x1}, 0x3}, 0x1c, &(0x7f00000005c0), 0x0, &(0x7f0000576000)}, 0x0) accept(0xffffffffffffffff, &(0x7f00000006c0)=@llc={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @link_local}, &(0x7f0000000740)=0x80) getpeername$packet(0xffffffffffffffff, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @broadcast}, &(0x7f0000000800)=0x14) getsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x22, &(0x7f0000000000)={{{@in=@multicast2, @in6=@dev}}, {{@in=@multicast1}, 0x0, @in6=@ipv4={[], [], @remote}}}, &(0x7f0000000140)=0xe8) ioctl$sock_inet6_SIOCDELRT(r0, 0x890c, &(0x7f0000000180)={@local={0xfe, 0x80, [], 0xaa}, @ipv4={[], [0xff, 0xff], @loopback=0x7f000001}, @local={0xfe, 0x80, [], 0xaa}, 0x0, 0x80000000}) getsockopt$inet_sctp6_SCTP_NODELAY(0xffffffffffffffff, 0x84, 0x3, &(0x7f0000000440), &(0x7f0000000480)=0xffffffffffffff98) 2018/03/30 19:43:02 executing program 5: unshare(0x40000000) perf_event_open(&(0x7f000001d000)={0x2, 0x78, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000000)={0x6, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0xa, 0x1, 0x0) ioctl(r0, 0x8982, &(0x7f0000000000)) r1 = socket$packet(0x11, 0x0, 0x300) r2 = openat$cuse(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/cuse\x00', 0x82, 0x0) io_setup(0x43f, &(0x7f00000000c0)=0x0) io_submit(r3, 0x1, &(0x7f0000000000)=[&(0x7f0000000200)={0x0, 0x0, 0x0, 0x1, 0x0, r2, &(0x7f0000000040)="10000000020400000000000000000000", 0x10}]) r4 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000280)='/proc/sys/net/ipv4/vs/secure_tcp\x00', 0x2, 0x0) sendmsg$kcm(r4, &(0x7f0000001f00)={&(0x7f0000001b40)=@pppol2tpin6={0x18, 0x1, {0x0, r1, 0x0, 0x1, 0x0, 0x0, {0xa, 0x4e24, 0xc1, @mcast1={0xff, 0x1, [], 0x1}}}}, 0x80, &(0x7f0000001d80)=[{&(0x7f0000001bc0)="a9db123ebf124fab0f2eec9774559e3b5870fb7c6818fc89c4b8742d057480657265ae2b34fb2d4e585d22ca1bf7b0a22ce38a20a819d919947c78f8d5c9f3291905fd3ed2b8ef8a79d9453396c6b0b7eb0778dbc49b32ae91e443b64edddcf320c1589c7777eadd4e57c01b20a8ca7a831e8e2c104d0194d52fb5c35b550f", 0x7f}], 0x1, &(0x7f0000001dc0)=ANY=[], 0x0, 0x90}, 0x20000000) r5 = syz_open_dev$tun(&(0x7f00000001c0)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r5, 0x400454ca, &(0x7f0000000200)={'bridge0\x00\x00p\x00', 0x4000000000001005}) socketpair(0x1d, 0x3, 0x40, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_inet_SIOCSIFADDR(r6, 0x8916, &(0x7f0000000100)={'bridge8\x00', {0x2, 0x0, @dev={0xac, 0x14, 0x14}}}) ioctl$LOOP_SET_FD(r2, 0x4c00, r1) ioctl$SNDRV_SEQ_IOCTL_RUNNING_MODE(0xffffffffffffffff, 0xc0105303, &(0x7f00000002c0)={0x2, 0x8}) add_key$keyring(&(0x7f00000000c0)='keyring\x00', &(0x7f0000000100)={0x73, 0x79, 0x7a}, 0x0, 0x0, 0x0) clone(0x0, &(0x7f0000000040), &(0x7f0000000080), &(0x7f0000000000), &(0x7f0000000100)) ioctl$int_in(0xffffffffffffffff, 0x800000c004500a, &(0x7f0000006ff8)) wait4(0x0, 0x0, 0x4, &(0x7f0000000380)) ioctl$sock_inet_sctp_SIOCINQ(r7, 0x541b, &(0x7f0000000180)) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_PORT(0xffffffffffffffff, 0xc0a85352, &(0x7f0000001980)={{}, 'port1\x00', 0x0, 0x20010, 0x1f, 0x0, 0x3, 0x40, 0x0, 0x0, 0x4, 0x6d1}) 2018/03/30 19:43:02 executing program 4: symlinkat(&(0x7f0000002f00)='./file0\x00', 0xffffffffffffffff, &(0x7f0000002f80)='./file0\x00') syz_mount_image$msdos(&(0x7f0000002fc0)='msdos\x00', &(0x7f0000003000)='./file0\x00', 0x4, 0x1, &(0x7f0000003180)=[{&(0x7f0000003040)="eaf9610c9f7031a1f58e51e73b3f0bd5af4364c38bbe335dbd3d211ec0338ba4c795c634af757a3c684da6110f67891133a6303441b21d139e3a6582efdaeabd3d68dbcb85cd383733a98084b62807af0b7ea49d68daa4cc9fda43dbeb13c3e67c44c463a2c429ccb66c0e1a9dfd5c911d4d7b578baaad6571d4457b9c6d92122a4bd97f5f174c81081941b007062f2cab2db1466851dde671e025909a633fec433bb2512fc61c436b74df23d280019a403884dc488071", 0xb7, 0xcd7}], 0x8, &(0x7f00000031c0)={[{@errors_continue='errors=continue', 0x2c}, {@time_offset={'time_offset', 0x3d, [0x0]}, 0x2c}]}) pipe(&(0x7f0000002f40)={0xffffffffffffffff}) r1 = open(&(0x7f0000003240)='./file0\x00', 0xa0001, 0x20) linkat(r0, &(0x7f0000003200)='./file0\x00', r1, &(0x7f0000003280)='./file0\x00', 0x400) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x80000, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)}, {&(0x7f0000010d00)="0000000000000000000000000000000000000000000000000000000002ae0000ed41000000040000d15bbe5ad15bbe5ad15bbe5a00000000000005002000000000000800070000000af301000400000000000000000000000100000030000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a1950000", 0xa0, 0x8c60}, {&(0x7f0000011a00)="020000000c0001022e000000020000000c0002022e2e00000b00000014000a026c6f73742b666f756e6400000c0000001000050166696c65300000000d0000001000050266696c65310000000f0000001000050166696c6532000000100000001000050166696c6533000000110000001000050166696c65340000001200000010000802564944454f5f54531400000068031201d181d18ed0b7d0bad0b0d0bbd0bbd0b5d1800000000000000000000000000000000000000000000000000000", 0xc0, 0xc000}, {&(0x7f0000012200)="0000000000000000000000000000000000000000000000000c0000dec910dfd800000000f4030000000000000000000000000000000000000000000000000000", 0x40, 0x117e0}, {&(0x7f0000012a00)="0d0000000c0001022e000000020000000c0002022e2e00000e000000dc03050166696c6530000000000000000000000000000000000000000000000000000000", 0x40, 0x1c000}], 0x0, &(0x7f0000013000)) syz_mount_image$bfs(&(0x7f0000000040)='bfs\x00', &(0x7f00000008c0)='./file0\x00', 0x20, 0x2, &(0x7f0000000180)=[{&(0x7f00000005c0)="f37e57346e86cb5adec662d7bd6f13a3764d2ca7640f9f81ba88d0689d0989735a7bafd5558d9a6e8988f9f6038fa475e49077bc8cfc6e170c4cdbaaa1375895c9a4068559d3cecf2a0423caa696bf77a75b3ae3f32b79da059ca13d055647998987fc2033d008bd55deb08808372b9b4595fb0d79a1358cd5949d859a7d155e86db4b608eb401109f6b792f5ce4a2ead9870dee49347bc08d0d54b0e4fca4fd895947a737f4ee823d997770e5c9df50c0c9fe2c0b945c6ffd13b7151e385b631520ac34a5967c6cd0d12b3746795681600541c17d379daed41ce8e715eba582fb668e160872a2", 0xe7, 0x7}, {&(0x7f0000000780)="6154d093a5a905da96fed5f8dea36bcd9d1d011246f7caf86806bf6ac6301d2d2b448461b867bbbe7d0eebdeafa16d7219af85ff4372670039ce277546def59f1d0eed4be4386a34c7243fe3ec84ad3807136a2c3ec35d6d87a7d7bb9342622cc3a7ff529ef3d76ff57fc7a1856f50b98e518515a9e679067cfc0e8500754fa30a81cf4dc42c5a0d36647280c5b0a8506efaf9ad06594678176efe4bdbcf7ab384b597df4c5ad66b2bd240823abe04cd30785819f1c7fd4d46bb55f8bd09ca4b44618b010e363fa572ca189ec73b36ad46b6f38d65c0acc417", 0xd9, 0x5}], 0x200000, 0x0) syz_mount_image$jfs(&(0x7f0000000080)='jfs\x00', &(0x7f0000000880)='./file0\x00', 0xfffffffffffffffe, 0x3, &(0x7f0000002dc0)=[{&(0x7f0000000900)="efee47debce411554253d03f2175c060de26b9a7a197d9327971105aafdf17a061227fe7dd52d3c1c1f0318992f304f7646c3eb4e32ff0514d34d4605b4e152474aa71ac6c0ba890b1f249f213d5bc162b605fdf3c524d6f84e1a2f8461d26ef5dd50b193ffb710ee69fc431552ae4548f0c1a7e503243bb10c53c566f37e3234d8b3d418992dca946568d275e1f54895a854bab3790963108fe6ce5b1f933e81bd0aa2dfd715aca4bd81b48b28e3ee265", 0xb1, 0x1}, {&(0x7f0000001a80)="b4bc90ad72742e5693f04c7955b05460b33cd0ca9cde365dbe1671162a8c1db744cb8a04d1d747ab4d3234fd615e6ad897396c21b8bf7da2c1d524d04fadade841e5acfac529250a2c75fed4b65a7b6c8735268244189e020c526112728097958fd591d00cd16d1591db9b0414d985d7718794369eb03d89403b7df76f6d745c94d4fa986321a9915fea55a73472bc39620fcf22ec74d02b77fafe6ccf72605eb0ba7ae69fa10a36d281e65a178528bc654ce5b6109d5294e400b18be755a3b899489b27a876ac3ea033ed525b28c7dff537b5210cbff466dc339e1f58db1679816589e886264ef1bcf6d0e1408d93946827711972", 0xf5, 0x7}, {&(0x7f0000002cc0)="c9bc1928c9ffffe99fdae39f5013810a038f1d558affc92341c81ee308195dabd95fcfedcfccd4cf2af62477e5ed935114b73940dba239c47d5824a3332fb48cea682934a6840ea5db2529c3a7c371bbf08f08bb15458de586609be64b699f29b7384dc7b2ba78f0e343fb9851eaf5a7b4106fc5b7a8aaf6e069012286fa7259807928cbee722222f45e6c98cefa00829bcdd92bd03273c7b0f20453c72150adf49c311248d3d3d96ad17187d60add3d1d8fbfbc5e572ceba134e5c533a5f75630a35514ee998b85a755085c04513dcc0047461d78f4aa8fdf0309fc39e3e4a1c24b4538acbf2366feaf", 0xea, 0x4}], 0x10000, &(0x7f0000002ec0)={[{@resize='resize', 0x2c}, {@noquota='noquota', 0x2c}]}) 2018/03/30 19:43:02 executing program 7: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f000099e000)={0x2, 0x4e20, @multicast1=0xe0000001}, 0x10) sendto$inet(r0, &(0x7f0000de1fff), 0xfffffffffffffd43, 0x20008005, &(0x7f0000db4ff0)={0x2, 0x4e20, @loopback=0x7f000001}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, &(0x7f0000af5000)='illinois\x00', 0x9) getsockopt$inet_tcp_buf(r0, 0x6, 0x1a, &(0x7f0000000000)=""/177, &(0x7f0000000100)=0xb1) 2018/03/30 19:43:02 executing program 3: r0 = socket$packet(0x11, 0x2, 0x300) r1 = syz_open_dev$tun(&(0x7f00000001c0)='/dev/net/tun\x00', 0x0, 0x0) getsockopt$bt_l2cap_L2CAP_OPTIONS(0xffffffffffffffff, 0x6, 0x1, &(0x7f0000000180), &(0x7f0000000240)=0xc) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000000)={'bridge0\x00', 0xfffffffffffffffd}) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000340)={'gretap0\x00'}) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f00000000c0)={'bridge0\x00', 0x22001}) r2 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000100)='/proc/self/net/pfkey\x00', 0x200, 0x0) ioctl$FUSE_DEV_IOC_CLONE(0xffffffffffffffff, 0x8004e500, &(0x7f00000002c0)) fcntl$F_GET_FILE_RW_HINT(r1, 0x40d, &(0x7f0000000040)) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000140)={'bridge0\x00\x00 \x00'}) ioctl$sock_inet_tcp_SIOCOUTQNSD(0xffffffffffffffff, 0x894b, &(0x7f0000000280)) getsockopt$inet6_IPV6_IPSEC_POLICY(r1, 0x29, 0x22, &(0x7f0000006880)={{{@in6=@loopback, @in=@remote}}, {{@in=@rand_addr}, 0x0, @in6=@local}}, &(0x7f0000006980)=0xe8) fcntl$F_SET_FILE_RW_HINT(0xffffffffffffffff, 0x40e, &(0x7f0000000580)) setsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x15, &(0x7f00000069c0)={@dev={0xfe, 0x80}}, 0x14) lseek(r0, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_DEFAULT_SNDINFO(r0, 0x84, 0x22, &(0x7f0000000300)={0x7f, 0x4, 0x6, 0x3}, &(0x7f0000000380)=0x10) sendmsg$inet_sctp(0xffffffffffffffff, &(0x7f00000008c0)={&(0x7f00000004c0)=@in={0x2, 0x4e23, @remote={0xac, 0x14, 0x14, 0xbb}}, 0x10, &(0x7f00000007c0)=[{&(0x7f0000000500)="fc3e767ef0ede84804f782c4f1e011a2510e62e36408ec6384b133ce", 0x1c}], 0x1, &(0x7f0000000840), 0x0, 0x40}, 0x40000) setsockopt$packet_fanout_data(0xffffffffffffffff, 0x107, 0x16, &(0x7f0000000600)={0x4, &(0x7f00000005c0)=[{0x6, 0xf412, 0x4, 0x401}, {0x190, 0x0, 0x7, 0xffffffff}, {0x4, 0x0, 0x400, 0x5d}, {0x3, 0xf9, 0x6f8, 0x7}]}, 0x10) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r2, 0x84, 0x6f, &(0x7f0000000440)={0x0, 0x4c, &(0x7f00000003c0)=[@in={0x2, 0x4e22, @remote={0xac, 0x14, 0x14, 0xbb}}, @in={0x2, 0x0, @multicast1=0xe0000001}, @in6={0xa, 0x4e24, 0x8, @remote={0xfe, 0x80, [], 0xbb}, 0x7}, @in={0x2, 0x4e21, @multicast1=0xe0000001}]}, &(0x7f0000000480)=0x10) ioctl$TUNGETSNDBUF(0xffffffffffffffff, 0x800454d3, &(0x7f0000000080)) setsockopt$sock_void(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) fstat(0xffffffffffffffff, &(0x7f0000000940)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) setgroups(0x1, &(0x7f0000000200)=[r3]) fchmod(0xffffffffffffffff, 0x101) fcntl$getownex(r1, 0x10, &(0x7f0000000740)={0x0, 0x0}) ioctl$sock_SIOCSPGRP(r0, 0x8902, &(0x7f0000000780)=r4) ioctl$TUNDETACHFILTER(0xffffffffffffffff, 0x400854d6, 0x0) getrandom(&(0x7f0000000900)=""/5, 0x5, 0x0) 2018/03/30 19:43:02 executing program 6: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_mreqn(r0, 0x0, 0x27, &(0x7f0000000000)={@multicast2=0xe0000002, @loopback=0x7f000001}, 0xc) getsockopt$inet_sctp6_SCTP_FRAGMENT_INTERLEAVE(0xffffffffffffffff, 0x84, 0x12, &(0x7f0000000080), &(0x7f00000000c0)=0x4) ioctl$sock_inet_SIOCGIFDSTADDR(0xffffffffffffffff, 0x8917, &(0x7f0000000040)={'bcsh0\x00', {0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x1a}}}) setsockopt$inet_sctp6_SCTP_MAX_BURST(0xffffffffffffffff, 0x84, 0x14, &(0x7f0000000380)=@int=0x3, 0x4) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000140)={'bcsh0\x00', 0x0}) ioctl$sock_inet6_SIOCDELRT(0xffffffffffffffff, 0x890c, &(0x7f0000000180)={@dev={0xfe, 0x80, [], 0x13}, @loopback={0x0, 0x1}, @mcast2={0xff, 0x2, [], 0x1}, 0x6, 0x0, 0x42e, 0x100, 0x9, 0x80000000, r1}) r2 = socket$inet(0x2, 0xa, 0x5) setsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX(r2, 0x84, 0x6e, &(0x7f0000000600)=[@in={0x2, 0x4e21, @multicast1=0xe0000001}, @in6={0xa, 0x4e20, 0x0, @remote={0xfe, 0x80, [], 0xbb}}, @in={0x2, 0x4e22, @multicast2=0xe0000002}, @in6={0xa, 0x4e21, 0x1ff, @local={0xfe, 0x80, [], 0xaa}, 0x84}, @in6={0xa, 0x4e20, 0x4, @local={0xfe, 0x80, [], 0xaa}}], 0x74) getsockopt$inet_sctp6_SCTP_PR_SUPPORTED(0xffffffffffffffff, 0x84, 0x71, &(0x7f0000000200)={0x0, 0x8}, &(0x7f0000000240)=0x8) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(0xffffffffffffffff, 0x84, 0x6f, &(0x7f0000000300)={r3, 0x70, &(0x7f0000000280)=[@in={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x12}}, @in={0x2, 0x4e24, @loopback=0x7f000001}, @in={0x2, 0x0, @remote={0xac, 0x14, 0x14, 0xbb}}, @in={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x1a}}, @in={0x2, 0x4e24, @remote={0xac, 0x14, 0x14, 0xbb}}, @in={0x2, 0x4e24, @rand_addr=0x3ff}, @in={0x2, 0x4e24, @multicast2=0xe0000002}]}, &(0x7f0000000340)=0x10) setsockopt$inet_sctp6_SCTP_SET_PEER_PRIMARY_ADDR(0xffffffffffffffff, 0x84, 0x5, &(0x7f00000004c0)={r4, @in={{0x2, 0x4e20, @rand_addr=0x8}}}, 0x84) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, &(0x7f00000003c0)={'lo\x00'}) ioctl$sock_inet_SIOCGIFNETMASK(0xffffffffffffffff, 0x891b, &(0x7f0000000100)={'nr0\x00', {0x2, 0x4e24, @loopback=0x7f000001}}) setsockopt$inet_msfilter(r0, 0x0, 0x29, &(0x7f0000000680)=ANY=[@ANYBLOB="cf0000000276d172390cc8c4ff4f3b746e5947c2ddb66a93ebb6d0f75b5f453435c311b94e126c49d47c10682b6e523d09fae1d416ebface98e08aa083e9f1f1afa118eb05655fec48d75d7a37edd032552c60ffeb53a2c8eecbe601a4ac5dceeecf1a943c2d9e2eaf4ad0a93e82a1a37a0cf2adbc4b512680428fee922ad18ff90ec6f87a75b299a953167bf4f9ae31cffd2c31dd47ba7d69151424dc1b2835f7624a302f270eb89118043dc1e1faa46e667be9cbf4456ad0c580ed032e4e49459f68f8a70f2dfe40f51362ffae"], 0x1) pread64(r0, &(0x7f0000000340)=""/181, 0xb5, 0x62) setsockopt$inet_msfilter(r0, 0x0, 0x29, &(0x7f0000000580)=ANY=[@ANYBLOB="e00000027f0000010000000001000000000000006b59aa51deb20d6efc9c04b7c9420f6434d31cbbe99b52873a8c21"], 0x1) socket$inet_udp(0x2, 0x2, 0x0) bpf$BPF_PROG_GET_NEXT_ID(0xb, &(0x7f0000000400)=0x7, 0x4) r5 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000ba4000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x2, 0x78, 0xe2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, r5, 0x0) r6 = perf_event_open(&(0x7f0000014f88)={0x1, 0x78, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00002e8000)}}, 0x0, 0x0, r5, 0x0) readv(r6, &(0x7f0000734000)=[{&(0x7f0000d42000)=""/146, 0x92}], 0x1) getsockopt$inet_sctp_SCTP_PEER_ADDR_THLDS(0xffffffffffffffff, 0x84, 0x1f, &(0x7f0000000480)={0x0, @in={{0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0xd}}}, 0xf80866d, 0x5}, &(0x7f0000000540)=0x90) getsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(0xffffffffffffff9c, 0x84, 0x18, &(0x7f0000000440)={r7, 0x400000000004}, &(0x7f00000005c0)=0xffffffffffffffc3) getsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER_VALUE(r0, 0x84, 0x7c, &(0x7f00000002c0)={r8, 0x10001, 0xc9e9}, &(0x7f0000000300)=0x8) 2018/03/30 19:43:02 executing program 1: r0 = syz_open_dev$amidi(&(0x7f0000000040)='/dev/amidi#\x00', 0x3, 0x28000) ioctl$DRM_IOCTL_RES_CTX(r0, 0xc0086426, &(0x7f0000000100)={0x2c, &(0x7f00000000c0)=[{}, {}, {}, {}, {}, {}, {}, {}]}) socket$netlink(0x10, 0x3, 0xc) writev(0xffffffffffffffff, &(0x7f00000021c0), 0x0) bind$bt_l2cap(r0, &(0x7f0000000340)={0x1f, 0x800000000000002, {0x401, 0x3, 0xb, 0x3f8}}, 0x9) socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f0000a8d000)={&(0x7f0000c78ff4)={0x10}, 0xc, &(0x7f0000df6000)={&(0x7f0000000200)=ANY=[@ANYBLOB="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"], 0x10f}, 0x1}, 0x0) r1 = socket$inet_sctp(0x2, 0x5, 0x84) sendmsg$inet_sctp(r1, &(0x7f0000001f00)={&(0x7f0000001840)=@in={0x2, 0x0, @dev={0xac, 0x14, 0x14}}, 0x10, &(0x7f0000001c40)=[{&(0x7f0000001880)}], 0x1, &(0x7f0000001e40)}, 0x40) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000540)=@nat={'nat\x00', 0x19, 0x3, 0x376, [0x20000140, 0x0, 0x0, 0x20000170, 0x200002d0], 0x0, &(0x7f0000000100), &(0x7f00000006c0)=ANY=[@ANYBLOB="00000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000ffffffff01000000110000000000000000006e7230000000000000000000000000006772657461703000000000000000000074756e6c30000000000000000000000073797a6b616c6c657230000000000000ffffffffffff0000ff0000ffaaaaaaaaaaaaffff0000ffff000070000000b8000000e800000049444c4554494d45520000000000000000000000000000000000000000000000240000008100000073797a300000000000000000400000000000000000000000000000000100000061727072ffffff7f0000000000000000000000000000000000000000000000000c000000aaaaaaaaaabb00000000000000000000000000000000000000000000000000000000000000000000000000000000000001000000feffffff0000000000000000060000000000000000000000000000000000000000000000000000000000000001000000ffffffff020000000000000002000000880864756d6d79300000000000000000000062707130080000000000000000000000697036746e6c3000000000000000000073697430000000000000000000000000ffffffffffff000000000000aaaaaaaaaaaaffffffff00ff0000700000007000000098000000726564697265637400000000000000000000000000000000000000000000000004000000fcffffff0900000008000000000062726964676530000000000000000000697036746e6c3000000000000000000062637368300000000000000000000000766c616e300000000000000000000000000000000000ff00ff00ffffffffffffffff00ffffffff000000080100000801000030010000697076730000000000000000000000000000000000000000000000000000000028000000ac1414aa000000000000000000000000ffffffffffffff0000000000ff0000004e2400004e240008697076730000000000000000000000000000000000000000000000000000000028000000e0000001000000000000000000000000ffffffff000000ffffffffffff0000004e212b054e201f124155444954000000000000000000000000000000000000000000000000000000040000000000000075eb180f3829"]}, 0x3ee) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000002980)) getsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(0xffffffffffffffff, 0x84, 0x1f, &(0x7f0000000440)={0x0, @in={{0x2, 0x4e22, @multicast2=0xe0000002}}, 0x7bb7, 0x4}, &(0x7f0000000500)=0x90) getsockopt$inet_sctp_SCTP_RTOINFO(0xffffffffffffffff, 0x84, 0x0, &(0x7f0000002240)={0x0, 0x9, 0x417}, &(0x7f00000001c0)=0x10) r2 = socket(0x22, 0x4, 0x3) r3 = socket(0x20000001e, 0x5, 0x0) r4 = perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$packet_tx_ring(r3, 0x10f, 0x87, &(0x7f0000265000)=@req={0x3fc, 0x0, 0x1}, 0x10) getegid() setsockopt$packet_tx_ring(r2, 0x10f, 0x87, &(0x7f0000265000)=@req={0x3fc, 0x0, 0x1}, 0x10) writev(r2, &(0x7f00000000c0)=[{&(0x7f0000000000)="8a", 0x1}], 0x1) close(r2) close(r3) perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r5 = syz_open_dev$evdev(&(0x7f0000dfdfee)='/dev/input/event#\x00', 0x0, 0x2) readv(r5, &(0x7f0000019fe0)=[{&(0x7f00008ec000)=""/219, 0xdb}], 0x1) write$evdev(r5, &(0x7f000004d000)=[{{}, 0x0, 0x1}, {{0x2}}], 0x30) r6 = getpgrp(0x0) setsockopt$ax25_int(r3, 0x101, 0xd, &(0x7f0000000080)=0x7, 0x4) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x8, 0xfffffffffffffffd, 0x9, 0x7, 0x0, 0x8001, 0x0, 0x6, 0x3ff, 0x4, 0x5, 0x4, 0xbd9, 0x56, 0x8000, 0x7f, 0xff, 0xeba, 0x1f, 0x0, 0xfd, 0x3, 0x1, 0x50, 0x7, 0x9, 0x641800, 0x3ff8000000000000, 0x4, 0x0, 0x10000, 0x5, 0x7, 0x6, 0x1, 0xffffffffffffffe0, 0x0, 0x20, 0x0, @perf_bp={&(0x7f0000000040), 0x8}, 0x20, 0x401, 0x8, 0x3, 0x8, 0x7, 0x7}, r6, 0xc, r4, 0x0) syz_genetlink_get_family_id$ipvs(&(0x7f0000000040)='IPVS\x00') 2018/03/30 19:43:02 executing program 2: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) readv(0xffffffffffffffff, &(0x7f0000001480), 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f00003b9fdc)) readv(r0, &(0x7f0000001980)=[{&(0x7f00000018c0)=""/182, 0xb6}], 0x1) setsockopt$inet6_mtu(0xffffffffffffffff, 0x29, 0x17, &(0x7f0000000440)=0x5, 0x4) socket$inet_sctp(0x2, 0x5, 0x84) dup3(0xffffffffffffffff, r0, 0x0) write(r0, &(0x7f0000c34fff), 0xffffff0b) socket$inet(0x2, 0x0, 0x0) setsockopt$bt_l2cap_L2CAP_OPTIONS(0xffffffffffffffff, 0x6, 0x1, &(0x7f0000000380)={0xefa, 0x800, 0x0, 0x0, 0x9}, 0xc) [ 501.876980] FAT-fs (loop4): Unrecognized mount option "time_offset=" or missing value [ 501.889984] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 501.906454] EXT4-fs (loop4): VFS: Can't find ext4 filesystem [ 501.940819] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 501.957161] BFS-fs: bfs_fill_super(): No BFS filesystem on loop4 (magic=00000000) [ 501.970513] kernel msg: ebtables bug: please report to author: EBT_ENTRY_OR_ENTRIES shouldn't be set in distinguisher [ 502.021762] resize option for remount only 2018/03/30 19:43:03 executing program 0: r0 = socket$inet6(0xa, 0x80002, 0x0) recvfrom$inet6(0xffffffffffffffff, &(0x7f0000ffbf47)=""/185, 0xfffffffffffffeba, 0x0, 0x0, 0xfffffffffffffde6) bind$inet6(0xffffffffffffffff, &(0x7f00008a8000)={0xa, 0x4e23}, 0x1c) sendfile(0xffffffffffffffff, r0, &(0x7f00000004c0), 0x0) r1 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000080)='/dev/autofs\x00', 0x0, 0x0) setsockopt$inet_sctp_SCTP_RESET_STREAMS(0xffffffffffffffff, 0x84, 0x77, &(0x7f00000001c0)=ANY=[@ANYPTR=&(0x7f0000000100)=ANY=[@ANYBLOB='~\t\x00\x00\x00S{']], 0x1) r2 = socket$inet6(0xa, 0x8000000000000802, 0x0) sendmsg$inet_sctp(r2, &(0x7f0000a29000)={&(0x7f00005dafe4)=@in6={0xa, 0x4e23, 0x0, @mcast2={0xff, 0x2, [], 0x1}}, 0x1c, &(0x7f0000fc8000)}, 0x8000) sched_setscheduler(0x0, 0x5, &(0x7f0000000300)) sendto$inet6(r2, &(0x7f0000b0cf6e), 0xffed, 0x0, &(0x7f000001b000)={0xa}, 0x1c) socket$inet6(0xa, 0x0, 0x0) fchdir(r0) ioctl$sock_SIOCGPGRP(r1, 0x8904, &(0x7f0000000240)=0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000280)) tgkill(r3, 0x0, 0x30) dup2(r2, r0) accept$packet(0xffffffffffffffff, 0x0, &(0x7f0000000180)) recvfrom$inet6(r0, &(0x7f0000000600)=""/191, 0xbf, 0x0, &(0x7f0000000440)={0xa, 0x104e24, 0x40000000000000, @mcast2={0xff, 0x2, [], 0x1}}, 0x1c) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f00000000c0)) syz_open_procfs(r3, &(0x7f00000005c0)='gid_map\x00') socket$inet6(0xa, 0xa, 0x0) getsockopt$inet_sctp6_SCTP_GET_LOCAL_ADDRS(0xffffffffffffffff, 0x84, 0x6d, &(0x7f00000018c0)=ANY=[@ANYRES32=0x0], &(0x7f0000000140)=0x1) clock_gettime(0x0, &(0x7f0000000200)={0x0}) write$sndseq(r1, &(0x7f0000000700)=[{0x1, 0x3ff, 0x0, 0x0, @time={r5}, {}, {0x7fffffff, 0x96}, @note={0x0, 0x0, 0xffff, 0x4, 0x9}}, {0x0, 0x5a, 0x1, 0x8, @tick=0xff, {0x7fffffff, 0x5}, {0x7, 0x1}, @queue={0x1, {0x8, 0x1000}}}, {0x0, 0x0, 0x1, 0x400, @tick, {0x800, 0x6}, {0x200, 0x101}, @result={0x9e, 0xf6}}], 0x90) setsockopt$inet_sctp_SCTP_RTOINFO(r2, 0x84, 0x0, &(0x7f0000000480)={r4, 0x0, 0x1}, 0x10) connect$netlink(0xffffffffffffffff, &(0x7f00000003c0)=@proc={0x10, 0x0, 0x25dfdbfd, 0x3000000}, 0x3e0) 2018/03/30 19:43:03 executing program 7: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f000099e000)={0x2, 0x4e20, @multicast1=0xe0000001}, 0x10) sendto$inet(r0, &(0x7f0000de1fff), 0xfffffffffffffd43, 0x20008005, &(0x7f0000db4ff0)={0x2, 0x4e20, @loopback=0x7f000001}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, &(0x7f0000af5000)='illinois\x00', 0x9) getsockopt$inet_tcp_buf(r0, 0x6, 0x1a, &(0x7f0000000000)=""/177, &(0x7f0000000100)=0xb1) 2018/03/30 19:43:03 executing program 6: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_mreqn(r0, 0x0, 0x27, &(0x7f0000000000)={@multicast2=0xe0000002, @loopback=0x7f000001}, 0xc) getsockopt$inet_sctp6_SCTP_FRAGMENT_INTERLEAVE(0xffffffffffffffff, 0x84, 0x12, &(0x7f0000000080), &(0x7f00000000c0)=0x4) ioctl$sock_inet_SIOCGIFDSTADDR(0xffffffffffffffff, 0x8917, &(0x7f0000000040)={'bcsh0\x00', {0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x1a}}}) setsockopt$inet_sctp6_SCTP_MAX_BURST(0xffffffffffffffff, 0x84, 0x14, &(0x7f0000000380)=@int=0x3, 0x4) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000140)={'bcsh0\x00', 0x0}) ioctl$sock_inet6_SIOCDELRT(0xffffffffffffffff, 0x890c, &(0x7f0000000180)={@dev={0xfe, 0x80, [], 0x13}, @loopback={0x0, 0x1}, @mcast2={0xff, 0x2, [], 0x1}, 0x6, 0x0, 0x42e, 0x100, 0x9, 0x80000000, r1}) r2 = socket$inet(0x2, 0xa, 0x5) setsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX(r2, 0x84, 0x6e, &(0x7f0000000600)=[@in={0x2, 0x4e21, @multicast1=0xe0000001}, @in6={0xa, 0x4e20, 0x0, @remote={0xfe, 0x80, [], 0xbb}}, @in={0x2, 0x4e22, @multicast2=0xe0000002}, @in6={0xa, 0x4e21, 0x1ff, @local={0xfe, 0x80, [], 0xaa}, 0x84}, @in6={0xa, 0x4e20, 0x4, @local={0xfe, 0x80, [], 0xaa}}], 0x74) getsockopt$inet_sctp6_SCTP_PR_SUPPORTED(0xffffffffffffffff, 0x84, 0x71, &(0x7f0000000200)={0x0, 0x8}, &(0x7f0000000240)=0x8) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(0xffffffffffffffff, 0x84, 0x6f, &(0x7f0000000300)={r3, 0x70, &(0x7f0000000280)=[@in={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x12}}, @in={0x2, 0x4e24, @loopback=0x7f000001}, @in={0x2, 0x0, @remote={0xac, 0x14, 0x14, 0xbb}}, @in={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x1a}}, @in={0x2, 0x4e24, @remote={0xac, 0x14, 0x14, 0xbb}}, @in={0x2, 0x4e24, @rand_addr=0x3ff}, @in={0x2, 0x4e24, @multicast2=0xe0000002}]}, &(0x7f0000000340)=0x10) setsockopt$inet_sctp6_SCTP_SET_PEER_PRIMARY_ADDR(0xffffffffffffffff, 0x84, 0x5, &(0x7f00000004c0)={r4, @in={{0x2, 0x4e20, @rand_addr=0x8}}}, 0x84) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, &(0x7f00000003c0)={'lo\x00'}) ioctl$sock_inet_SIOCGIFNETMASK(0xffffffffffffffff, 0x891b, &(0x7f0000000100)={'nr0\x00', {0x2, 0x4e24, @loopback=0x7f000001}}) setsockopt$inet_msfilter(r0, 0x0, 0x29, &(0x7f0000000680)=ANY=[@ANYBLOB="cf0000000276d172390cc8c4ff4f3b746e5947c2ddb66a93ebb6d0f75b5f453435c311b94e126c49d47c10682b6e523d09fae1d416ebface98e08aa083e9f1f1afa118eb05655fec48d75d7a37edd032552c60ffeb53a2c8eecbe601a4ac5dceeecf1a943c2d9e2eaf4ad0a93e82a1a37a0cf2adbc4b512680428fee922ad18ff90ec6f87a75b299a953167bf4f9ae31cffd2c31dd47ba7d69151424dc1b2835f7624a302f270eb89118043dc1e1faa46e667be9cbf4456ad0c580ed032e4e49459f68f8a70f2dfe40f51362ffae"], 0x1) pread64(r0, &(0x7f0000000340)=""/181, 0xb5, 0x62) setsockopt$inet_msfilter(r0, 0x0, 0x29, &(0x7f0000000580)=ANY=[@ANYBLOB="e00000027f0000010000000001000000000000006b59aa51deb20d6efc9c04b7c9420f6434d31cbbe99b52873a8c21"], 0x1) socket$inet_udp(0x2, 0x2, 0x0) bpf$BPF_PROG_GET_NEXT_ID(0xb, &(0x7f0000000400)=0x7, 0x4) r5 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000ba4000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x2, 0x78, 0xe2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, r5, 0x0) r6 = perf_event_open(&(0x7f0000014f88)={0x1, 0x78, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00002e8000)}}, 0x0, 0x0, r5, 0x0) readv(r6, &(0x7f0000734000)=[{&(0x7f0000d42000)=""/146, 0x92}], 0x1) getsockopt$inet_sctp_SCTP_PEER_ADDR_THLDS(0xffffffffffffffff, 0x84, 0x1f, &(0x7f0000000480)={0x0, @in={{0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0xd}}}, 0xf80866d, 0x5}, &(0x7f0000000540)=0x90) getsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(0xffffffffffffff9c, 0x84, 0x18, &(0x7f0000000440)={r7, 0x400000000004}, &(0x7f00000005c0)=0xffffffffffffffc3) getsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER_VALUE(r0, 0x84, 0x7c, &(0x7f00000002c0)={r8, 0x10001, 0xc9e9}, &(0x7f0000000300)=0x8) 2018/03/30 19:43:03 executing program 4: symlinkat(&(0x7f0000002f00)='./file0\x00', 0xffffffffffffffff, &(0x7f0000002f80)='./file0\x00') syz_mount_image$msdos(&(0x7f0000002fc0)='msdos\x00', &(0x7f0000003000)='./file0\x00', 0x4, 0x1, &(0x7f0000003180)=[{&(0x7f0000003040)="eaf9610c9f7031a1f58e51e73b3f0bd5af4364c38bbe335dbd3d211ec0338ba4c795c634af757a3c684da6110f67891133a6303441b21d139e3a6582efdaeabd3d68dbcb85cd383733a98084b62807af0b7ea49d68daa4cc9fda43dbeb13c3e67c44c463a2c429ccb66c0e1a9dfd5c911d4d7b578baaad6571d4457b9c6d92122a4bd97f5f174c81081941b007062f2cab2db1466851dde671e025909a633fec433bb2512fc61c436b74df23d280019a403884dc488071", 0xb7, 0xcd7}], 0x8, &(0x7f00000031c0)={[{@errors_continue='errors=continue', 0x2c}, {@time_offset={'time_offset', 0x3d, [0x0]}, 0x2c}]}) pipe(&(0x7f0000002f40)={0xffffffffffffffff}) r1 = open(&(0x7f0000003240)='./file0\x00', 0xa0001, 0x20) linkat(r0, &(0x7f0000003200)='./file0\x00', r1, &(0x7f0000003280)='./file0\x00', 0x400) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x80000, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)}, {&(0x7f0000010d00)="0000000000000000000000000000000000000000000000000000000002ae0000ed41000000040000d15bbe5ad15bbe5ad15bbe5a00000000000005002000000000000800070000000af301000400000000000000000000000100000030000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a1950000", 0xa0, 0x8c60}, {&(0x7f0000011a00)="020000000c0001022e000000020000000c0002022e2e00000b00000014000a026c6f73742b666f756e6400000c0000001000050166696c65300000000d0000001000050266696c65310000000f0000001000050166696c6532000000100000001000050166696c6533000000110000001000050166696c65340000001200000010000802564944454f5f54531400000068031201d181d18ed0b7d0bad0b0d0bbd0bbd0b5d1800000000000000000000000000000000000000000000000000000", 0xc0, 0xc000}, {&(0x7f0000012200)="0000000000000000000000000000000000000000000000000c0000dec910dfd800000000f4030000000000000000000000000000000000000000000000000000", 0x40, 0x117e0}, {&(0x7f0000012a00)="0d0000000c0001022e000000020000000c0002022e2e00000e000000dc03050166696c6530000000000000000000000000000000000000000000000000000000", 0x40, 0x1c000}], 0x0, &(0x7f0000013000)) syz_mount_image$bfs(&(0x7f0000000040)='bfs\x00', &(0x7f00000008c0)='./file0\x00', 0x20, 0x2, &(0x7f0000000180)=[{&(0x7f00000005c0)="f37e57346e86cb5adec662d7bd6f13a3764d2ca7640f9f81ba88d0689d0989735a7bafd5558d9a6e8988f9f6038fa475e49077bc8cfc6e170c4cdbaaa1375895c9a4068559d3cecf2a0423caa696bf77a75b3ae3f32b79da059ca13d055647998987fc2033d008bd55deb08808372b9b4595fb0d79a1358cd5949d859a7d155e86db4b608eb401109f6b792f5ce4a2ead9870dee49347bc08d0d54b0e4fca4fd895947a737f4ee823d997770e5c9df50c0c9fe2c0b945c6ffd13b7151e385b631520ac34a5967c6cd0d12b3746795681600541c17d379daed41ce8e715eba582fb668e160872a2", 0xe7, 0x7}, {&(0x7f0000000780)="6154d093a5a905da96fed5f8dea36bcd9d1d011246f7caf86806bf6ac6301d2d2b448461b867bbbe7d0eebdeafa16d7219af85ff4372670039ce277546def59f1d0eed4be4386a34c7243fe3ec84ad3807136a2c3ec35d6d87a7d7bb9342622cc3a7ff529ef3d76ff57fc7a1856f50b98e518515a9e679067cfc0e8500754fa30a81cf4dc42c5a0d36647280c5b0a8506efaf9ad06594678176efe4bdbcf7ab384b597df4c5ad66b2bd240823abe04cd30785819f1c7fd4d46bb55f8bd09ca4b44618b010e363fa572ca189ec73b36ad46b6f38d65c0acc417", 0xd9, 0x5}], 0x200000, 0x0) syz_mount_image$jfs(&(0x7f0000000080)='jfs\x00', &(0x7f0000000880)='./file0\x00', 0xfffffffffffffffe, 0x3, &(0x7f0000002dc0)=[{&(0x7f0000000900)="efee47debce411554253d03f2175c060de26b9a7a197d9327971105aafdf17a061227fe7dd52d3c1c1f0318992f304f7646c3eb4e32ff0514d34d4605b4e152474aa71ac6c0ba890b1f249f213d5bc162b605fdf3c524d6f84e1a2f8461d26ef5dd50b193ffb710ee69fc431552ae4548f0c1a7e503243bb10c53c566f37e3234d8b3d418992dca946568d275e1f54895a854bab3790963108fe6ce5b1f933e81bd0aa2dfd715aca4bd81b48b28e3ee265", 0xb1, 0x1}, {&(0x7f0000001a80)="b4bc90ad72742e5693f04c7955b05460b33cd0ca9cde365dbe1671162a8c1db744cb8a04d1d747ab4d3234fd615e6ad897396c21b8bf7da2c1d524d04fadade841e5acfac529250a2c75fed4b65a7b6c8735268244189e020c526112728097958fd591d00cd16d1591db9b0414d985d7718794369eb03d89403b7df76f6d745c94d4fa986321a9915fea55a73472bc39620fcf22ec74d02b77fafe6ccf72605eb0ba7ae69fa10a36d281e65a178528bc654ce5b6109d5294e400b18be755a3b899489b27a876ac3ea033ed525b28c7dff537b5210cbff466dc339e1f58db1679816589e886264ef1bcf6d0e1408d93946827711972", 0xf5, 0x7}, {&(0x7f0000002cc0)="c9bc1928c9ffffe99fdae39f5013810a038f1d558affc92341c81ee308195dabd95fcfedcfccd4cf2af62477e5ed935114b73940dba239c47d5824a3332fb48cea682934a6840ea5db2529c3a7c371bbf08f08bb15458de586609be64b699f29b7384dc7b2ba78f0e343fb9851eaf5a7b4106fc5b7a8aaf6e069012286fa7259807928cbee722222f45e6c98cefa00829bcdd92bd03273c7b0f20453c72150adf49c311248d3d3d96ad17187d60add3d1d8fbfbc5e572ceba134e5c533a5f75630a35514ee998b85a755085c04513dcc0047461d78f4aa8fdf0309fc39e3e4a1c24b4538acbf2366feaf", 0xea, 0x4}], 0x10000, &(0x7f0000002ec0)={[{@resize='resize', 0x2c}, {@noquota='noquota', 0x2c}]}) 2018/03/30 19:43:03 executing program 3: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$IP_VS_SO_SET_ADD(r0, 0x0, 0x482, &(0x7f0000000740)={0x11, @multicast2=0xe0000002, 0x0, 0x0, 'sh\x00'}, 0x2c) 2018/03/30 19:43:03 executing program 1: r0 = syz_open_dev$amidi(&(0x7f0000000040)='/dev/amidi#\x00', 0x3, 0x28000) ioctl$DRM_IOCTL_RES_CTX(r0, 0xc0086426, &(0x7f0000000100)={0x2c, &(0x7f00000000c0)=[{}, {}, {}, {}, {}, {}, {}, {}]}) socket$netlink(0x10, 0x3, 0xc) writev(0xffffffffffffffff, &(0x7f00000021c0), 0x0) bind$bt_l2cap(r0, &(0x7f0000000340)={0x1f, 0x800000000000002, {0x401, 0x3, 0xb, 0x3f8}}, 0x9) socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f0000a8d000)={&(0x7f0000c78ff4)={0x10}, 0xc, &(0x7f0000df6000)={&(0x7f0000000200)=ANY=[@ANYBLOB="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"], 0x10f}, 0x1}, 0x0) r1 = socket$inet_sctp(0x2, 0x5, 0x84) sendmsg$inet_sctp(r1, &(0x7f0000001f00)={&(0x7f0000001840)=@in={0x2, 0x0, @dev={0xac, 0x14, 0x14}}, 0x10, &(0x7f0000001c40)=[{&(0x7f0000001880)}], 0x1, &(0x7f0000001e40)}, 0x40) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000540)=@nat={'nat\x00', 0x19, 0x3, 0x376, [0x20000140, 0x0, 0x0, 0x20000170, 0x200002d0], 0x0, &(0x7f0000000100), &(0x7f00000006c0)=ANY=[@ANYBLOB="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"]}, 0x3ee) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000002980)) getsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(0xffffffffffffffff, 0x84, 0x1f, &(0x7f0000000440)={0x0, @in={{0x2, 0x4e22, @multicast2=0xe0000002}}, 0x7bb7, 0x4}, &(0x7f0000000500)=0x90) getsockopt$inet_sctp_SCTP_RTOINFO(0xffffffffffffffff, 0x84, 0x0, &(0x7f0000002240)={0x0, 0x9, 0x417}, &(0x7f00000001c0)=0x10) r2 = socket(0x22, 0x4, 0x3) r3 = socket(0x20000001e, 0x5, 0x0) r4 = perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$packet_tx_ring(r3, 0x10f, 0x87, &(0x7f0000265000)=@req={0x3fc, 0x0, 0x1}, 0x10) getegid() setsockopt$packet_tx_ring(r2, 0x10f, 0x87, &(0x7f0000265000)=@req={0x3fc, 0x0, 0x1}, 0x10) writev(r2, &(0x7f00000000c0)=[{&(0x7f0000000000)="8a", 0x1}], 0x1) close(r2) close(r3) perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r5 = syz_open_dev$evdev(&(0x7f0000dfdfee)='/dev/input/event#\x00', 0x0, 0x2) readv(r5, &(0x7f0000019fe0)=[{&(0x7f00008ec000)=""/219, 0xdb}], 0x1) write$evdev(r5, &(0x7f000004d000)=[{{}, 0x0, 0x1}, {{0x2}}], 0x30) r6 = getpgrp(0x0) setsockopt$ax25_int(r3, 0x101, 0xd, &(0x7f0000000080)=0x7, 0x4) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x8, 0xfffffffffffffffd, 0x9, 0x7, 0x0, 0x8001, 0x0, 0x6, 0x3ff, 0x4, 0x5, 0x4, 0xbd9, 0x56, 0x8000, 0x7f, 0xff, 0xeba, 0x1f, 0x0, 0xfd, 0x3, 0x1, 0x50, 0x7, 0x9, 0x641800, 0x3ff8000000000000, 0x4, 0x0, 0x10000, 0x5, 0x7, 0x6, 0x1, 0xffffffffffffffe0, 0x0, 0x20, 0x0, @perf_bp={&(0x7f0000000040), 0x8}, 0x20, 0x401, 0x8, 0x3, 0x8, 0x7, 0x7}, r6, 0xc, r4, 0x0) syz_genetlink_get_family_id$ipvs(&(0x7f0000000040)='IPVS\x00') 2018/03/30 19:43:03 executing program 5: unshare(0x40000000) perf_event_open(&(0x7f000001d000)={0x2, 0x78, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000000)={0x6, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0xa, 0x1, 0x0) ioctl(r0, 0x8982, &(0x7f0000000000)) r1 = socket$packet(0x11, 0x0, 0x300) r2 = openat$cuse(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/cuse\x00', 0x82, 0x0) io_setup(0x43f, &(0x7f00000000c0)=0x0) io_submit(r3, 0x1, &(0x7f0000000000)=[&(0x7f0000000200)={0x0, 0x0, 0x0, 0x1, 0x0, r2, &(0x7f0000000040)="10000000020400000000000000000000", 0x10}]) r4 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000280)='/proc/sys/net/ipv4/vs/secure_tcp\x00', 0x2, 0x0) sendmsg$kcm(r4, &(0x7f0000001f00)={&(0x7f0000001b40)=@pppol2tpin6={0x18, 0x1, {0x0, r1, 0x0, 0x1, 0x0, 0x0, {0xa, 0x4e24, 0xc1, @mcast1={0xff, 0x1, [], 0x1}}}}, 0x80, &(0x7f0000001d80)=[{&(0x7f0000001bc0)="a9db123ebf124fab0f2eec9774559e3b5870fb7c6818fc89c4b8742d057480657265ae2b34fb2d4e585d22ca1bf7b0a22ce38a20a819d919947c78f8d5c9f3291905fd3ed2b8ef8a79d9453396c6b0b7eb0778dbc49b32ae91e443b64edddcf320c1589c7777eadd4e57c01b20a8ca7a831e8e2c104d0194d52fb5c35b550f", 0x7f}], 0x1, &(0x7f0000001dc0)=ANY=[], 0x0, 0x90}, 0x20000000) r5 = syz_open_dev$tun(&(0x7f00000001c0)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r5, 0x400454ca, &(0x7f0000000200)={'bridge0\x00\x00p\x00', 0x4000000000001005}) socketpair(0x1d, 0x3, 0x40, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_inet_SIOCSIFADDR(r6, 0x8916, &(0x7f0000000100)={'bridge8\x00', {0x2, 0x0, @dev={0xac, 0x14, 0x14}}}) ioctl$LOOP_SET_FD(r2, 0x4c00, r1) ioctl$SNDRV_SEQ_IOCTL_RUNNING_MODE(0xffffffffffffffff, 0xc0105303, &(0x7f00000002c0)={0x2, 0x8}) add_key$keyring(&(0x7f00000000c0)='keyring\x00', &(0x7f0000000100)={0x73, 0x79, 0x7a}, 0x0, 0x0, 0x0) clone(0x0, &(0x7f0000000040), &(0x7f0000000080), &(0x7f0000000000), &(0x7f0000000100)) ioctl$int_in(0xffffffffffffffff, 0x800000c004500a, &(0x7f0000006ff8)) wait4(0x0, 0x0, 0x4, &(0x7f0000000380)) ioctl$sock_inet_sctp_SIOCINQ(r7, 0x541b, &(0x7f0000000180)) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_PORT(0xffffffffffffffff, 0xc0a85352, &(0x7f0000001980)={{}, 'port1\x00', 0x0, 0x20010, 0x1f, 0x0, 0x3, 0x40, 0x0, 0x0, 0x4, 0x6d1}) 2018/03/30 19:43:03 executing program 2: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) readv(0xffffffffffffffff, &(0x7f0000001480), 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f00003b9fdc)) readv(r0, &(0x7f0000001980)=[{&(0x7f00000018c0)=""/182, 0xb6}], 0x1) setsockopt$inet6_mtu(0xffffffffffffffff, 0x29, 0x17, &(0x7f0000000440)=0x5, 0x4) socket$inet_sctp(0x2, 0x5, 0x84) dup3(0xffffffffffffffff, r0, 0x0) write(r0, &(0x7f0000c34fff), 0xffffff0b) socket$inet(0x2, 0x0, 0x0) setsockopt$bt_l2cap_L2CAP_OPTIONS(0xffffffffffffffff, 0x6, 0x1, &(0x7f0000000380)={0xefa, 0x800, 0x0, 0x0, 0x9}, 0xc) 2018/03/30 19:43:03 executing program 3: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000a00)='./cgroup.net\x00', 0x200002, 0x0) fchdir(r0) r1 = creat(&(0x7f0000000040)='./file1\x00', 0x0) r2 = dup3(r1, r0, 0x0) pwritev(0xffffffffffffffff, &(0x7f0000000b40)=[{&(0x7f0000000100)="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", 0x718}], 0x1, 0x0) fcntl$setstatus(r0, 0x4, 0x0) write$cgroup_subtree(r2, &(0x7f0000000000)=ANY=[], 0x34123610) ftruncate(0xffffffffffffffff, 0x3) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000b00)) ioctl$TIOCGPTPEER(0xffffffffffffffff, 0x5441, 0x0) mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x31, 0xffffffffffffffff, 0x0) socket$l2tp(0x18, 0x1, 0x1) ioctl$fiemap(r0, 0xc020660b, &(0x7f0000000e80)=ANY=[@ANYBLOB="0400000000000000ff0f00000000000001000000020000000200000000fcff00800000000000000005000000000000007f000000000000000000010000000000000000000000000002000000000000000000000000000000ff000000000000000200000000000000070000000000000000"]) [ 502.929941] FAT-fs (loop4): Unrecognized mount option "time_offset=" or missing value [ 502.933572] kernel msg: ebtables bug: please report to author: EBT_ENTRY_OR_ENTRIES shouldn't be set in distinguisher [ 502.948924] IPVS: ftp: loaded support on port[0] = 21 [ 502.987981] EXT4-fs (loop4): VFS: Can't find ext4 filesystem [ 503.026760] BFS-fs: bfs_fill_super(): No BFS filesystem on loop4 (magic=00000000) [ 503.083287] resize option for remount only 2018/03/30 19:43:04 executing program 2: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) readv(0xffffffffffffffff, &(0x7f0000001480), 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f00003b9fdc)) readv(r0, &(0x7f0000001980)=[{&(0x7f00000018c0)=""/182, 0xb6}], 0x1) setsockopt$inet6_mtu(0xffffffffffffffff, 0x29, 0x17, &(0x7f0000000440)=0x5, 0x4) socket$inet_sctp(0x2, 0x5, 0x84) dup3(0xffffffffffffffff, r0, 0x0) write(r0, &(0x7f0000c34fff), 0xffffff0b) socket$inet(0x2, 0x0, 0x0) setsockopt$bt_l2cap_L2CAP_OPTIONS(0xffffffffffffffff, 0x6, 0x1, &(0x7f0000000380)={0xefa, 0x800, 0x0, 0x0, 0x9}, 0xc) 2018/03/30 19:43:04 executing program 3: r0 = open(&(0x7f0000000440)='./file0\x00', 0x1ffff, 0x5) ioctl$TIOCLINUX7(0xffffffffffffffff, 0x541c, &(0x7f0000000900)={0x7, 0x8}) setsockopt$inet_tcp_int(r0, 0x6, 0x0, &(0x7f00000003c0)=0x6, 0xf4) r1 = perf_event_open(&(0x7f0000000240)={0x0, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$LOOP_CLR_FD(0xffffffffffffffff, 0x4c01) clock_gettime(0x0, &(0x7f00000001c0)={0x0, 0x0}) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(0xffffffffffffffff, 0x4040534e, &(0x7f0000000340)={0x124, @time={r2, r3+30000000}, 0x1, {0x8}, 0x101, 0x2, 0x80000001}) ioctl$ASHMEM_SET_PROT_MASK(r0, 0x40087705, &(0x7f0000000200)={0x7ff, 0x1}) r4 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000040)='/dev/rtc\x00', 0x0, 0x0) r5 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000580)='/dev/sequencer\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_CLIENT_ID(r4, 0x80045301, &(0x7f0000000980)) ioctl$LOOP_CLR_FD(r4, 0x7003) r6 = syz_genetlink_get_family_id$ipvs(&(0x7f00000005c0)='IPVS\x00') sendmsg$IPVS_CMD_GET_DEST(r0, &(0x7f0000000840)={&(0x7f0000000400)={0x10, 0x0, 0x0, 0x800000}, 0xc, &(0x7f0000000800)={&(0x7f0000000a80)=ANY=[@ANYBLOB="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"], 0x1}, 0x1}, 0x40000) getsockopt$inet6_opts(r1, 0x29, 0x3b, &(0x7f0000000080)=""/53, &(0x7f00000008c0)=0xfffffffffffffeb0) ioctl$DRM_IOCTL_SET_MASTER(r4, 0x641e) timerfd_gettime(0xffffffffffffffff, &(0x7f0000000300)) sendmsg$IPVS_CMD_SET_SERVICE(r4, &(0x7f0000000940)={&(0x7f0000000680)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000740)={&(0x7f00000006c0)={0x28, r6, 0x12, 0x70bd2d, 0x25dfdbfd, {0x2}, [@IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x3}, @IPVS_CMD_ATTR_DAEMON={0xc, 0x3, [@IPVS_DAEMON_ATTR_SYNC_MAXLEN={0x8, 0x4, 0xc96}]}]}, 0x28}, 0x1, 0x0, 0x0, 0x80}, 0x40) getsockopt$inet_sctp_SCTP_FRAGMENT_INTERLEAVE(r1, 0x84, 0x12, &(0x7f00000000c0), &(0x7f0000000100)=0x30c) sendmsg$IPVS_CMD_GET_DEST(r5, &(0x7f00000007c0)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x10080804}, 0xc, &(0x7f0000000780)={&(0x7f0000000c40)=ANY=[]}, 0x1, 0x0, 0x0, 0x4010}, 0x4000000) setsockopt$packet_buf(0xffffffffffffffff, 0x107, 0xd, &(0x7f0000000c40)="c2d199ce4bb8e85055d4983418a3cbaff144b56c7457d92855851ec93ab14499162cb3fc2743b9c92ef8670eb74c5e0db8d6558c3f203f97de220e3feb50cf2caff6fbd53a8111ae3fcfc8f6c0da082fd6f2b189d57694261228a7a05942634676e25cf6f9e4d74d0f65818a6f44e02a201b4f8aabdff21780cbd158b3bfc3c30716e1c62bd272dba79088b683", 0x8d) listxattr(&(0x7f0000000140)='./file0\x00', &(0x7f00000009c0)=""/158, 0x9e) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000540)=0x0) perf_event_open(&(0x7f0000000600)={0x5, 0x70, 0x10001, 0x8, 0x6, 0x8, 0x0, 0x0, 0x10000, 0x6, 0x0, 0x2, 0x4, 0x40, 0x1469, 0x0, 0x0, 0x101, 0x600000000, 0x9, 0x0, 0x15e600000, 0x0, 0x10000, 0x6, 0x0, 0x0, 0x4d, 0x9, 0x7be, 0x0, 0x93, 0x10001, 0x0, 0x8, 0x40, 0x8, 0x5, 0x0, 0x9, 0x4, @perf_bp={&(0x7f0000000480), 0x5}, 0x24008, 0x9, 0x0, 0x1, 0x0, 0x5, 0x2}, r7, 0x1, 0xffffffffffffffff, 0x0) execve(&(0x7f0000000880)='./file0\x00', &(0x7f0000000b80), &(0x7f0000000180)=[&(0x7f0000000700)='trustedwlan0vmnet0@%\x00']) ioctl$DRM_IOCTL_GET_MAGIC(r5, 0x80046402, &(0x7f00000004c0)=0x6ff) 2018/03/30 19:43:04 executing program 4: symlinkat(&(0x7f0000002f00)='./file0\x00', 0xffffffffffffffff, &(0x7f0000002f80)='./file0\x00') syz_mount_image$msdos(&(0x7f0000002fc0)='msdos\x00', &(0x7f0000003000)='./file0\x00', 0x4, 0x1, &(0x7f0000003180)=[{&(0x7f0000003040)="eaf9610c9f7031a1f58e51e73b3f0bd5af4364c38bbe335dbd3d211ec0338ba4c795c634af757a3c684da6110f67891133a6303441b21d139e3a6582efdaeabd3d68dbcb85cd383733a98084b62807af0b7ea49d68daa4cc9fda43dbeb13c3e67c44c463a2c429ccb66c0e1a9dfd5c911d4d7b578baaad6571d4457b9c6d92122a4bd97f5f174c81081941b007062f2cab2db1466851dde671e025909a633fec433bb2512fc61c436b74df23d280019a403884dc488071", 0xb7, 0xcd7}], 0x8, &(0x7f00000031c0)={[{@errors_continue='errors=continue', 0x2c}, {@time_offset={'time_offset', 0x3d, [0x0]}, 0x2c}]}) pipe(&(0x7f0000002f40)={0xffffffffffffffff}) r1 = open(&(0x7f0000003240)='./file0\x00', 0xa0001, 0x20) linkat(r0, &(0x7f0000003200)='./file0\x00', r1, &(0x7f0000003280)='./file0\x00', 0x400) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x80000, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)}, {&(0x7f0000010d00)="0000000000000000000000000000000000000000000000000000000002ae0000ed41000000040000d15bbe5ad15bbe5ad15bbe5a00000000000005002000000000000800070000000af301000400000000000000000000000100000030000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a1950000", 0xa0, 0x8c60}, {&(0x7f0000011a00)="020000000c0001022e000000020000000c0002022e2e00000b00000014000a026c6f73742b666f756e6400000c0000001000050166696c65300000000d0000001000050266696c65310000000f0000001000050166696c6532000000100000001000050166696c6533000000110000001000050166696c65340000001200000010000802564944454f5f54531400000068031201d181d18ed0b7d0bad0b0d0bbd0bbd0b5d1800000000000000000000000000000000000000000000000000000", 0xc0, 0xc000}, {&(0x7f0000012200)="0000000000000000000000000000000000000000000000000c0000dec910dfd800000000f4030000000000000000000000000000000000000000000000000000", 0x40, 0x117e0}, {&(0x7f0000012a00)="0d0000000c0001022e000000020000000c0002022e2e00000e000000dc03050166696c6530000000000000000000000000000000000000000000000000000000", 0x40, 0x1c000}], 0x0, &(0x7f0000013000)) syz_mount_image$bfs(&(0x7f0000000040)='bfs\x00', &(0x7f00000008c0)='./file0\x00', 0x20, 0x2, &(0x7f0000000180)=[{&(0x7f00000005c0)="f37e57346e86cb5adec662d7bd6f13a3764d2ca7640f9f81ba88d0689d0989735a7bafd5558d9a6e8988f9f6038fa475e49077bc8cfc6e170c4cdbaaa1375895c9a4068559d3cecf2a0423caa696bf77a75b3ae3f32b79da059ca13d055647998987fc2033d008bd55deb08808372b9b4595fb0d79a1358cd5949d859a7d155e86db4b608eb401109f6b792f5ce4a2ead9870dee49347bc08d0d54b0e4fca4fd895947a737f4ee823d997770e5c9df50c0c9fe2c0b945c6ffd13b7151e385b631520ac34a5967c6cd0d12b3746795681600541c17d379daed41ce8e715eba582fb668e160872a2", 0xe7, 0x7}, {&(0x7f0000000780)="6154d093a5a905da96fed5f8dea36bcd9d1d011246f7caf86806bf6ac6301d2d2b448461b867bbbe7d0eebdeafa16d7219af85ff4372670039ce277546def59f1d0eed4be4386a34c7243fe3ec84ad3807136a2c3ec35d6d87a7d7bb9342622cc3a7ff529ef3d76ff57fc7a1856f50b98e518515a9e679067cfc0e8500754fa30a81cf4dc42c5a0d36647280c5b0a8506efaf9ad06594678176efe4bdbcf7ab384b597df4c5ad66b2bd240823abe04cd30785819f1c7fd4d46bb55f8bd09ca4b44618b010e363fa572ca189ec73b36ad46b6f38d65c0acc417", 0xd9, 0x5}], 0x200000, 0x0) syz_mount_image$jfs(&(0x7f0000000080)='jfs\x00', &(0x7f0000000880)='./file0\x00', 0xfffffffffffffffe, 0x3, &(0x7f0000002dc0)=[{&(0x7f0000000900)="efee47debce411554253d03f2175c060de26b9a7a197d9327971105aafdf17a061227fe7dd52d3c1c1f0318992f304f7646c3eb4e32ff0514d34d4605b4e152474aa71ac6c0ba890b1f249f213d5bc162b605fdf3c524d6f84e1a2f8461d26ef5dd50b193ffb710ee69fc431552ae4548f0c1a7e503243bb10c53c566f37e3234d8b3d418992dca946568d275e1f54895a854bab3790963108fe6ce5b1f933e81bd0aa2dfd715aca4bd81b48b28e3ee265", 0xb1, 0x1}, {&(0x7f0000001a80)="b4bc90ad72742e5693f04c7955b05460b33cd0ca9cde365dbe1671162a8c1db744cb8a04d1d747ab4d3234fd615e6ad897396c21b8bf7da2c1d524d04fadade841e5acfac529250a2c75fed4b65a7b6c8735268244189e020c526112728097958fd591d00cd16d1591db9b0414d985d7718794369eb03d89403b7df76f6d745c94d4fa986321a9915fea55a73472bc39620fcf22ec74d02b77fafe6ccf72605eb0ba7ae69fa10a36d281e65a178528bc654ce5b6109d5294e400b18be755a3b899489b27a876ac3ea033ed525b28c7dff537b5210cbff466dc339e1f58db1679816589e886264ef1bcf6d0e1408d93946827711972", 0xf5, 0x7}, {&(0x7f0000002cc0)="c9bc1928c9ffffe99fdae39f5013810a038f1d558affc92341c81ee308195dabd95fcfedcfccd4cf2af62477e5ed935114b73940dba239c47d5824a3332fb48cea682934a6840ea5db2529c3a7c371bbf08f08bb15458de586609be64b699f29b7384dc7b2ba78f0e343fb9851eaf5a7b4106fc5b7a8aaf6e069012286fa7259807928cbee722222f45e6c98cefa00829bcdd92bd03273c7b0f20453c72150adf49c311248d3d3d96ad17187d60add3d1d8fbfbc5e572ceba134e5c533a5f75630a35514ee998b85a755085c04513dcc0047461d78f4aa8fdf0309fc39e3e4a1c24b4538acbf2366feaf", 0xea, 0x4}], 0x10000, &(0x7f0000002ec0)={[{@resize='resize', 0x2c}, {@noquota='noquota', 0x2c}]}) 2018/03/30 19:43:04 executing program 7: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f000099e000)={0x2, 0x4e20, @multicast1=0xe0000001}, 0x10) sendto$inet(r0, &(0x7f0000de1fff), 0xfffffffffffffd43, 0x20008005, &(0x7f0000db4ff0)={0x2, 0x4e20, @loopback=0x7f000001}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000af5000)='illinois\x00', 0x9) getsockopt$inet_tcp_buf(0xffffffffffffffff, 0x6, 0x1a, &(0x7f0000000000)=""/177, &(0x7f0000000100)=0xb1) 2018/03/30 19:43:04 executing program 5: unshare(0x40000000) perf_event_open(&(0x7f000001d000)={0x2, 0x78, 0xe2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000000)={0x6, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0xa, 0x1, 0x0) ioctl(r0, 0x8982, &(0x7f0000000000)) r1 = socket$packet(0x11, 0x0, 0x300) r2 = openat$cuse(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/cuse\x00', 0x82, 0x0) io_setup(0x43f, &(0x7f00000000c0)=0x0) io_submit(r3, 0x1, &(0x7f0000000000)=[&(0x7f0000000200)={0x0, 0x0, 0x0, 0x1, 0x0, r2, &(0x7f0000000040)="10000000020400000000000000000000", 0x10}]) r4 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000280)='/proc/sys/net/ipv4/vs/secure_tcp\x00', 0x2, 0x0) sendmsg$kcm(r4, &(0x7f0000001f00)={&(0x7f0000001b40)=@pppol2tpin6={0x18, 0x1, {0x0, r1, 0x0, 0x1, 0x0, 0x0, {0xa, 0x4e24, 0xc1, @mcast1={0xff, 0x1, [], 0x1}}}}, 0x80, &(0x7f0000001d80)=[{&(0x7f0000001bc0)="a9db123ebf124fab0f2eec9774559e3b5870fb7c6818fc89c4b8742d057480657265ae2b34fb2d4e585d22ca1bf7b0a22ce38a20a819d919947c78f8d5c9f3291905fd3ed2b8ef8a79d9453396c6b0b7eb0778dbc49b32ae91e443b64edddcf320c1589c7777eadd4e57c01b20a8ca7a831e8e2c104d0194d52fb5c35b550f", 0x7f}], 0x1, &(0x7f0000001dc0)=ANY=[], 0x0, 0x90}, 0x20000000) r5 = syz_open_dev$tun(&(0x7f00000001c0)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r5, 0x400454ca, &(0x7f0000000200)={'bridge0\x00\x00p\x00', 0x4000000000001005}) socketpair(0x1d, 0x3, 0x40, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_inet_SIOCSIFADDR(r6, 0x8916, &(0x7f0000000100)={'bridge8\x00', {0x2, 0x0, @dev={0xac, 0x14, 0x14}}}) ioctl$LOOP_SET_FD(r2, 0x4c00, r1) ioctl$SNDRV_SEQ_IOCTL_RUNNING_MODE(0xffffffffffffffff, 0xc0105303, &(0x7f00000002c0)={0x2, 0x8}) add_key$keyring(&(0x7f00000000c0)='keyring\x00', &(0x7f0000000100)={0x73, 0x79, 0x7a}, 0x0, 0x0, 0x0) clone(0x0, &(0x7f0000000040), &(0x7f0000000080), &(0x7f0000000000), &(0x7f0000000100)) ioctl$int_in(0xffffffffffffffff, 0x800000c004500a, &(0x7f0000006ff8)) wait4(0x0, 0x0, 0x4, &(0x7f0000000380)) ioctl$sock_inet_sctp_SIOCINQ(r7, 0x541b, &(0x7f0000000180)) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_PORT(0xffffffffffffffff, 0xc0a85352, &(0x7f0000001980)={{}, 'port1\x00', 0x0, 0x20010, 0x1f, 0x0, 0x3, 0x40, 0x0, 0x0, 0x4, 0x6d1}) 2018/03/30 19:43:04 executing program 6: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_mreqn(r0, 0x0, 0x27, &(0x7f0000000000)={@multicast2=0xe0000002, @loopback=0x7f000001}, 0xc) getsockopt$inet_sctp6_SCTP_FRAGMENT_INTERLEAVE(0xffffffffffffffff, 0x84, 0x12, &(0x7f0000000080), &(0x7f00000000c0)=0x4) ioctl$sock_inet_SIOCGIFDSTADDR(0xffffffffffffffff, 0x8917, &(0x7f0000000040)={'bcsh0\x00', {0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x1a}}}) setsockopt$inet_sctp6_SCTP_MAX_BURST(0xffffffffffffffff, 0x84, 0x14, &(0x7f0000000380)=@int=0x3, 0x4) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000140)={'bcsh0\x00', 0x0}) ioctl$sock_inet6_SIOCDELRT(0xffffffffffffffff, 0x890c, &(0x7f0000000180)={@dev={0xfe, 0x80, [], 0x13}, @loopback={0x0, 0x1}, @mcast2={0xff, 0x2, [], 0x1}, 0x6, 0x0, 0x42e, 0x100, 0x9, 0x80000000, r1}) r2 = socket$inet(0x2, 0xa, 0x5) setsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX(r2, 0x84, 0x6e, &(0x7f0000000600)=[@in={0x2, 0x4e21, @multicast1=0xe0000001}, @in6={0xa, 0x4e20, 0x0, @remote={0xfe, 0x80, [], 0xbb}}, @in={0x2, 0x4e22, @multicast2=0xe0000002}, @in6={0xa, 0x4e21, 0x1ff, @local={0xfe, 0x80, [], 0xaa}, 0x84}, @in6={0xa, 0x4e20, 0x4, @local={0xfe, 0x80, [], 0xaa}}], 0x74) getsockopt$inet_sctp6_SCTP_PR_SUPPORTED(0xffffffffffffffff, 0x84, 0x71, &(0x7f0000000200)={0x0, 0x8}, &(0x7f0000000240)=0x8) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(0xffffffffffffffff, 0x84, 0x6f, &(0x7f0000000300)={r3, 0x70, &(0x7f0000000280)=[@in={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x12}}, @in={0x2, 0x4e24, @loopback=0x7f000001}, @in={0x2, 0x0, @remote={0xac, 0x14, 0x14, 0xbb}}, @in={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x1a}}, @in={0x2, 0x4e24, @remote={0xac, 0x14, 0x14, 0xbb}}, @in={0x2, 0x4e24, @rand_addr=0x3ff}, @in={0x2, 0x4e24, @multicast2=0xe0000002}]}, &(0x7f0000000340)=0x10) setsockopt$inet_sctp6_SCTP_SET_PEER_PRIMARY_ADDR(0xffffffffffffffff, 0x84, 0x5, &(0x7f00000004c0)={r4, @in={{0x2, 0x4e20, @rand_addr=0x8}}}, 0x84) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, &(0x7f00000003c0)={'lo\x00', 0x4100}) ioctl$sock_inet_SIOCGIFNETMASK(0xffffffffffffffff, 0x891b, &(0x7f0000000100)={'nr0\x00', {0x2, 0x0, @loopback=0x7f000001}}) setsockopt$inet_msfilter(r0, 0x0, 0x29, &(0x7f0000000680)=ANY=[@ANYBLOB="cf0000000276d172390cc8c4ff4f3b746e5947c2ddb66a93ebb6d0f75b5f453435c311b94e126c49d47c10682b6e523d09fae1d416ebface98e08aa083e9f1f1afa118eb05655fec48d75d7a37edd032552c60ffeb53a2c8eecbe601a4ac5dceeecf1a943c2d9e2eaf4ad0a93e82a1a37a0cf2adbc4b512680428fee922ad18ff90ec6f87a75b299a953167bf4f9ae31cffd2c31dd47ba7d69151424dc1b2835f7624a302f270eb89118043dc1e1faa46e667be9cbf4456ad0c580ed032e4e49459f68f8a70f2dfe40f51362ffae"], 0x1) pread64(r0, &(0x7f0000000340)=""/181, 0xb5, 0x62) setsockopt$inet_msfilter(r0, 0x0, 0x29, &(0x7f0000000580)=ANY=[@ANYBLOB="e00000027f0000010000000001000000000000006b59aa51deb20d6efc9c04b7c9420f6434d31cbbe99b52873a8c21"], 0x1) socket$inet_udp(0x2, 0x2, 0x0) bpf$BPF_PROG_GET_NEXT_ID(0xb, &(0x7f0000000400)=0x7, 0x4) r5 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000ba4000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x2, 0x78, 0xe2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, r5, 0x0) r6 = perf_event_open(&(0x7f0000014f88)={0x1, 0x78, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00002e8000)}}, 0x0, 0x0, r5, 0x0) readv(r6, &(0x7f0000734000)=[{&(0x7f0000d42000)=""/146, 0x92}], 0x1) getsockopt$inet_sctp_SCTP_PEER_ADDR_THLDS(0xffffffffffffffff, 0x84, 0x1f, &(0x7f0000000480)={0x0, @in={{0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0xd}}}, 0xf80866d, 0x5}, &(0x7f0000000540)=0x90) getsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(0xffffffffffffff9c, 0x84, 0x18, &(0x7f0000000440)={r7, 0x400000000004}, &(0x7f00000005c0)=0xffffffffffffffc3) getsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER_VALUE(r0, 0x84, 0x7c, &(0x7f00000002c0)={r8, 0x10001, 0xc9e9}, &(0x7f0000000300)=0x8) 2018/03/30 19:43:04 executing program 0: r0 = socket$inet6(0xa, 0x80002, 0x0) bind$inet6(r0, &(0x7f00008a8000)={0xa, 0x4e23}, 0x1c) r1 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000240)='/dev/autofs\x00', 0x10200000003, 0x0) setsockopt$inet_sctp_SCTP_RESET_STREAMS(r1, 0x84, 0x77, &(0x7f0000000140)=ANY=[@ANYRES32=0x0, @ANYRES16], 0x2) r2 = gettid() syz_open_dev$random(&(0x7f00000000c0)='/dev/random\x00', 0x0, 0x0) wait4(r2, &(0x7f0000000100), 0x4, &(0x7f0000000180)) r3 = socket$inet6(0xa, 0x8000000000000802, 0x0) getsockopt$inet_sctp_SCTP_MAX_BURST(r1, 0x84, 0x14, &(0x7f00000009c0)=@assoc_value, &(0x7f0000000a00)=0x8) ioctl$TIOCLINUX2(r1, 0x541c, &(0x7f0000000280)={0x2, 0x62a0, 0x0, 0x5, 0x0, 0x2}) setsockopt$inet6_tcp_TCP_ULP(r3, 0x6, 0x1f, &(0x7f0000000580)='tls\x00', 0x4) sendmsg$inet_sctp(r3, &(0x7f0000a29000)={&(0x7f00005dafe4)=@in6={0xa, 0x4e23, 0x0, @mcast2={0xff, 0x2, [], 0x1}}, 0x1c, &(0x7f0000fc8000)}, 0x8000) sched_setscheduler(0x0, 0x5, &(0x7f0000000300)) setsockopt$ax25_buf(0xffffffffffffffff, 0x101, 0x0, &(0x7f0000000340), 0x0) sendto$inet6(r3, &(0x7f0000b0cf6e), 0xffed, 0x0, &(0x7f000001b000)={0xa}, 0x1c) ioctl$DRM_IOCTL_DROP_MASTER(0xffffffffffffffff, 0x641f) clone(0x0, &(0x7f0000000680)="11fc3d677819c5fd3ced30772692c922a63195f4d5324df3c529e766c729b0c9e5b16a445f0806704d126f46df29a55cd179ee140026c45dce7b7bc635c61cf244f1ff7de9a4b459c91981191fb2ad1eee4850046b0e99581a178d7d2900f516d3dd5cb7a92528cc49b2826a12fe7af568ef4bd6cb615680d021d5f21d8cb5280027320750b0a08312b6a5ed8e7993c57bcf072e3ecfd3c6edb49f1fcb28dbdec8644ac4f84cca6964c599fc60996c9b95f1d29d411a65c06a44cce339e1f6dd5aedfe7e8d937f23e3538f38f7cedc53c70deed22a35fd5a311c0115d00024c67f13637f6fa130332ddd3ca6", &(0x7f0000000080), &(0x7f00000001c0), &(0x7f00000000c0)) mq_open(&(0x7f00000003c0)='\x00', 0x0, 0x180, &(0x7f0000000400)={0x2, 0x8, 0x0, 0x8, 0x4}) r4 = socket$nl_crypto(0x10, 0x3, 0x15) dup3(0xffffffffffffffff, r4, 0x8080000) r5 = openat$rtc(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/rtc\x00', 0x400, 0x0) getsockname$netlink(r5, &(0x7f0000000300), &(0x7f0000000340)=0xc) futex(&(0x7f000000cffc)=0x4, 0x80000000000b, 0x4, &(0x7f000000b000)={0x77359400}, &(0x7f0000048000), 0x0) futex(&(0x7f000000cffc)=0x4, 0xc, 0x1, &(0x7f0000fd7ff0)={0x77359400}, &(0x7f0000048000), 0x4) gettid() timer_create(0x0, &(0x7f0000044000), &(0x7f0000636000)) 2018/03/30 19:43:04 executing program 1: r0 = syz_open_dev$amidi(&(0x7f0000000040)='/dev/amidi#\x00', 0x3, 0x28000) ioctl$DRM_IOCTL_RES_CTX(r0, 0xc0086426, &(0x7f0000000100)={0x2c, &(0x7f00000000c0)=[{}, {}, {}, {}, {}, {}, {}, {}]}) socket$netlink(0x10, 0x3, 0xc) writev(0xffffffffffffffff, &(0x7f00000021c0), 0x0) bind$bt_l2cap(r0, &(0x7f0000000340)={0x1f, 0x800000000000002, {0x401, 0x3, 0xb, 0x3f8}}, 0x9) socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f0000a8d000)={&(0x7f0000c78ff4)={0x10}, 0xc, &(0x7f0000df6000)={&(0x7f0000000200)=ANY=[@ANYBLOB="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"], 0x10f}, 0x1}, 0x0) r1 = socket$inet_sctp(0x2, 0x5, 0x84) sendmsg$inet_sctp(r1, &(0x7f0000001f00)={&(0x7f0000001840)=@in={0x2, 0x0, @dev={0xac, 0x14, 0x14}}, 0x10, &(0x7f0000001c40)=[{&(0x7f0000001880)}], 0x1, &(0x7f0000001e40)}, 0x40) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000540)=@nat={'nat\x00', 0x19, 0x3, 0x376, [0x20000140, 0x0, 0x0, 0x20000170, 0x200002d0], 0x0, &(0x7f0000000100), &(0x7f00000006c0)=ANY=[@ANYBLOB="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"]}, 0x3ee) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000002980)) getsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(0xffffffffffffffff, 0x84, 0x1f, &(0x7f0000000440)={0x0, @in={{0x2, 0x4e22, @multicast2=0xe0000002}}, 0x7bb7, 0x4}, &(0x7f0000000500)=0x90) getsockopt$inet_sctp_SCTP_RTOINFO(0xffffffffffffffff, 0x84, 0x0, &(0x7f0000002240)={0x0, 0x9, 0x417}, &(0x7f00000001c0)=0x10) r2 = socket(0x22, 0x4, 0x3) r3 = socket(0x20000001e, 0x5, 0x0) r4 = perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$packet_tx_ring(r3, 0x10f, 0x87, &(0x7f0000265000)=@req={0x3fc, 0x0, 0x1}, 0x10) getegid() setsockopt$packet_tx_ring(r2, 0x10f, 0x87, &(0x7f0000265000)=@req={0x3fc, 0x0, 0x1}, 0x10) writev(r2, &(0x7f00000000c0)=[{&(0x7f0000000000)="8a", 0x1}], 0x1) close(r2) close(r3) perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r5 = syz_open_dev$evdev(&(0x7f0000dfdfee)='/dev/input/event#\x00', 0x0, 0x2) readv(r5, &(0x7f0000019fe0)=[{&(0x7f00008ec000)=""/219, 0xdb}], 0x1) write$evdev(r5, &(0x7f000004d000)=[{{}, 0x0, 0x1}, {{0x2}}], 0x30) r6 = getpgrp(0x0) setsockopt$ax25_int(r3, 0x101, 0xd, &(0x7f0000000080)=0x7, 0x4) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x8, 0xfffffffffffffffd, 0x9, 0x7, 0x0, 0x8001, 0x0, 0x6, 0x3ff, 0x4, 0x5, 0x4, 0xbd9, 0x56, 0x8000, 0x7f, 0xff, 0xeba, 0x1f, 0x0, 0xfd, 0x3, 0x1, 0x50, 0x7, 0x9, 0x641800, 0x3ff8000000000000, 0x4, 0x0, 0x10000, 0x5, 0x7, 0x6, 0x1, 0xffffffffffffffe0, 0x0, 0x20, 0x0, @perf_bp={&(0x7f0000000040), 0x8}, 0x20, 0x401, 0x8, 0x3, 0x8, 0x7, 0x7}, r6, 0xc, r4, 0x0) syz_genetlink_get_family_id$ipvs(&(0x7f0000000040)='IPVS\x00') 2018/03/30 19:43:04 executing program 6: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_mreqn(r0, 0x0, 0x27, &(0x7f0000000000)={@multicast2=0xe0000002, @loopback=0x7f000001}, 0xc) getsockopt$inet_sctp6_SCTP_FRAGMENT_INTERLEAVE(0xffffffffffffffff, 0x84, 0x12, &(0x7f0000000080), &(0x7f00000000c0)=0x4) ioctl$sock_inet_SIOCGIFDSTADDR(0xffffffffffffffff, 0x8917, &(0x7f0000000040)={'bcsh0\x00', {0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x1a}}}) setsockopt$inet_sctp6_SCTP_MAX_BURST(0xffffffffffffffff, 0x84, 0x14, &(0x7f0000000380)=@int=0x3, 0x4) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000140)={'bcsh0\x00', 0x0}) ioctl$sock_inet6_SIOCDELRT(0xffffffffffffffff, 0x890c, &(0x7f0000000180)={@dev={0xfe, 0x80, [], 0x13}, @loopback={0x0, 0x1}, @mcast2={0xff, 0x2, [], 0x1}, 0x6, 0x0, 0x42e, 0x100, 0x9, 0x80000000, r1}) r2 = socket$inet(0x2, 0xa, 0x5) setsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX(r2, 0x84, 0x6e, &(0x7f0000000600)=[@in={0x2, 0x4e21, @multicast1=0xe0000001}, @in6={0xa, 0x4e20, 0x0, @remote={0xfe, 0x80, [], 0xbb}}, @in={0x2, 0x4e22, @multicast2=0xe0000002}, @in6={0xa, 0x4e21, 0x1ff, @local={0xfe, 0x80, [], 0xaa}, 0x84}, @in6={0xa, 0x4e20, 0x4, @local={0xfe, 0x80, [], 0xaa}}], 0x74) getsockopt$inet_sctp6_SCTP_PR_SUPPORTED(0xffffffffffffffff, 0x84, 0x71, &(0x7f0000000200)={0x0, 0x8}, &(0x7f0000000240)=0x8) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(0xffffffffffffffff, 0x84, 0x6f, &(0x7f0000000300)={r3, 0x70, &(0x7f0000000280)=[@in={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x12}}, @in={0x2, 0x4e24, @loopback=0x7f000001}, @in={0x2, 0x0, @remote={0xac, 0x14, 0x14, 0xbb}}, @in={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x1a}}, @in={0x2, 0x4e24, @remote={0xac, 0x14, 0x14, 0xbb}}, @in={0x2, 0x4e24, @rand_addr=0x3ff}, @in={0x2, 0x4e24, @multicast2=0xe0000002}]}, &(0x7f0000000340)=0x10) setsockopt$inet_sctp6_SCTP_SET_PEER_PRIMARY_ADDR(0xffffffffffffffff, 0x84, 0x5, &(0x7f00000004c0)={r4, @in={{0x2, 0x4e20, @rand_addr=0x8}}}, 0x84) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, &(0x7f00000003c0)={'lo\x00', 0x4100}) ioctl$sock_inet_SIOCGIFNETMASK(0xffffffffffffffff, 0x891b, &(0x7f0000000100)={'nr0\x00', {0x2, 0x0, @loopback=0x7f000001}}) setsockopt$inet_msfilter(r0, 0x0, 0x29, &(0x7f0000000680)=ANY=[@ANYBLOB="cf0000000276d172390cc8c4ff4f3b746e5947c2ddb66a93ebb6d0f75b5f453435c311b94e126c49d47c10682b6e523d09fae1d416ebface98e08aa083e9f1f1afa118eb05655fec48d75d7a37edd032552c60ffeb53a2c8eecbe601a4ac5dceeecf1a943c2d9e2eaf4ad0a93e82a1a37a0cf2adbc4b512680428fee922ad18ff90ec6f87a75b299a953167bf4f9ae31cffd2c31dd47ba7d69151424dc1b2835f7624a302f270eb89118043dc1e1faa46e667be9cbf4456ad0c580ed032e4e49459f68f8a70f2dfe40f51362ffae"], 0x1) pread64(r0, &(0x7f0000000340)=""/181, 0xb5, 0x62) setsockopt$inet_msfilter(r0, 0x0, 0x29, &(0x7f0000000580)=ANY=[@ANYBLOB="e00000027f0000010000000001000000000000006b59aa51deb20d6efc9c04b7c9420f6434d31cbbe99b52873a8c21"], 0x1) socket$inet_udp(0x2, 0x2, 0x0) bpf$BPF_PROG_GET_NEXT_ID(0xb, &(0x7f0000000400)=0x7, 0x4) r5 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000ba4000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x2, 0x78, 0xe2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, r5, 0x0) r6 = perf_event_open(&(0x7f0000014f88)={0x1, 0x78, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00002e8000)}}, 0x0, 0x0, r5, 0x0) readv(r6, &(0x7f0000734000)=[{&(0x7f0000d42000)=""/146, 0x92}], 0x1) getsockopt$inet_sctp_SCTP_PEER_ADDR_THLDS(0xffffffffffffffff, 0x84, 0x1f, &(0x7f0000000480)={0x0, @in={{0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0xd}}}, 0xf80866d, 0x5}, &(0x7f0000000540)=0x90) getsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(0xffffffffffffff9c, 0x84, 0x18, &(0x7f0000000440)={r7, 0x400000000004}, &(0x7f00000005c0)=0xffffffffffffffc3) getsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER_VALUE(r0, 0x84, 0x7c, &(0x7f00000002c0)={r8, 0x10001, 0xc9e9}, &(0x7f0000000300)=0x8) [ 503.885653] FAT-fs (loop4): Unrecognized mount option "time_offset=" or missing value [ 503.906472] kernel msg: ebtables bug: please report to author: EBT_ENTRY_OR_ENTRIES shouldn't be set in distinguisher 2018/03/30 19:43:05 executing program 3: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000080)={'bond0\x00', 0x0}) r2 = socket(0xa, 0x2, 0x0) flock(r2, 0x6) syz_genetlink_get_family_id$ipvs(&(0x7f0000000800)='IPVS\x00') sendmsg$IPVS_CMD_GET_INFO(r2, &(0x7f00000009c0)={&(0x7f0000000500)={0x10, 0x0, 0x0, 0x21100000}, 0xc, &(0x7f0000000980)={&(0x7f0000000cc0)=ANY=[@ANYBLOB="010e28bd7000fedbdf250f0000000800060003000000680000000000000000000000080001000a00000008000bf072697e0008000b0073690001000a0000079f02040007c6752b11623f002000000003010000080006006c630000b025dabd001a08000b007369700014000300ffff000000000000753f1e443084836ddea0f0a4a342b7a636d9511db0ecc72260e701c8a317508761027697ee720e6397bce347bfee2bd65a4200000000000000000000000000000000000000000000000000000000400000000000000000"], 0x1}, 0x1, 0x0, 0x0, 0x50}, 0x20000884) ioctl$sock_FIOGETOWN(r2, 0x8903, &(0x7f0000000200)) connect$inet6(r2, &(0x7f0000000100)={0xa, 0x0, 0x0, @mcast1={0xff, 0x1, [], 0x1}, 0x100000002}, 0x1c) setsockopt$inet_sctp_SCTP_STREAM_SCHEDULER(0xffffffffffffffff, 0x84, 0x7b, &(0x7f0000000400), 0x3ba) getsockopt$inet_opts(r2, 0x0, 0x4, &(0x7f0000000540)=""/99, &(0x7f0000000780)=0x28c77c4c79f525cf) sendto$inet(r2, &(0x7f0000509f92), 0xff77, 0x0, &(0x7f000055fff0)={0x2, 0x4e23, @loopback=0x7f000001}, 0x10) r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000b00)='./cgroup.cpu\x00', 0x200002, 0x0) fchdir(r3) fstat(0xffffffffffffffff, &(0x7f0000000180)) bind$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @multicast1=0xe0000001}, 0x10) sendto$inet(0xffffffffffffffff, &(0x7f0000000a40)="45431bc153e49dc3c341afeff8a6a3782b30655dea8638a45a7a369ca5aebbc34e2d0227a019364ef806e574edc574801179b3c34145612db79a5340231421095dba2effc99687206c3416a0afabbea4ab2d17074a574429500a92adb41dfbc9e160349e8bb48b1d26e10c3e2571a99e857df6cdf0eb2dbb45810d2736bc2d4336341fa4ff52e263987db0cceea561f2a067a266", 0x94, 0x3ffffff, &(0x7f0000000c00)={0x2, 0x4e23, @loopback=0x7f000001}, 0x10) r4 = creat(&(0x7f0000000100)='./file1\x00', 0x0) fallocate(r4, 0x1, 0x0, 0x20004d2d) ioctl$DRM_IOCTL_SET_VERSION(r4, 0xc0106407, &(0x7f00000000c0)={0x55c, 0x2, 0xffffffffffff5165, 0x4c}) sendto$inet(0xffffffffffffffff, &(0x7f0000000000)="1356c1f7a6f170d95ec6cfc03678287eebc2e19824311a77", 0x18, 0x0, &(0x7f0000000080)={0x2}, 0x10) socket$inet6_icmp(0xa, 0x2, 0x3a) sendmsg$inet_sctp(r2, &(0x7f000050dfc8)={&(0x7f0000000840)=@in6={0xa, 0x4e24, 0x80000001, @mcast1={0xff, 0x1, [], 0x1}, 0x3}, 0x1c, &(0x7f00000005c0), 0x0, &(0x7f0000576000)}, 0x0) ioctl$EVIOCGPROP(0xffffffffffffffff, 0x80404509, &(0x7f00000003c0)=""/25) sendto$inet6(r2, &(0x7f0000000240)="6a14ad6a11c00f9a3e52ea90f0", 0xd, 0x0, &(0x7f0000000280)={0xa, 0x4e23, 0x3, @local={0xfe, 0x80, [], 0xaa}, 0x9}, 0x1c) getpeername$packet(0xffffffffffffffff, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @broadcast}, &(0x7f0000000a00)=0x14) ioctl$sock_SIOCDELDLCI(r2, 0x8981, &(0x7f00000004c0)={'sit0\x00'}) getsockopt$inet6_IPV6_IPSEC_POLICY(r2, 0x29, 0x22, &(0x7f0000000000)={{{@in=@multicast2, @in6=@dev}}, {{@in=@multicast1}, 0x0, @in6=@ipv4={[], [], @remote}}}, &(0x7f0000000140)=0xe8) getsockopt$inet_sctp6_SCTP_NODELAY(0xffffffffffffffff, 0x84, 0x3, &(0x7f0000000440), &(0x7f0000000480)=0x4) recvfrom(r0, &(0x7f0000000040)=""/3, 0x3, 0x2, &(0x7f00000000c0)=@hci={0x1f, r1, 0x3}, 0x80) [ 503.965736] EXT4-fs (loop4): VFS: Can't find ext4 filesystem [ 504.001421] BFS-fs: bfs_fill_super(): No BFS filesystem on loop4 (magic=00000000) 2018/03/30 19:43:05 executing program 6: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_mreqn(r0, 0x0, 0x27, &(0x7f0000000000)={@multicast2=0xe0000002, @loopback=0x7f000001}, 0xc) getsockopt$inet_sctp6_SCTP_FRAGMENT_INTERLEAVE(0xffffffffffffffff, 0x84, 0x12, &(0x7f0000000080), &(0x7f00000000c0)=0x4) ioctl$sock_inet_SIOCGIFDSTADDR(0xffffffffffffffff, 0x8917, &(0x7f0000000040)={'bcsh0\x00', {0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x1a}}}) setsockopt$inet_sctp6_SCTP_MAX_BURST(0xffffffffffffffff, 0x84, 0x14, &(0x7f0000000380)=@int=0x3, 0x4) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000140)={'bcsh0\x00', 0x0}) ioctl$sock_inet6_SIOCDELRT(0xffffffffffffffff, 0x890c, &(0x7f0000000180)={@dev={0xfe, 0x80, [], 0x13}, @loopback={0x0, 0x1}, @mcast2={0xff, 0x2, [], 0x1}, 0x6, 0x0, 0x42e, 0x100, 0x9, 0x80000000, r1}) r2 = socket$inet(0x2, 0xa, 0x5) setsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX(r2, 0x84, 0x6e, &(0x7f0000000600)=[@in={0x2, 0x4e21, @multicast1=0xe0000001}, @in6={0xa, 0x4e20, 0x0, @remote={0xfe, 0x80, [], 0xbb}}, @in={0x2, 0x4e22, @multicast2=0xe0000002}, @in6={0xa, 0x4e21, 0x1ff, @local={0xfe, 0x80, [], 0xaa}, 0x84}, @in6={0xa, 0x4e20, 0x4, @local={0xfe, 0x80, [], 0xaa}}], 0x74) getsockopt$inet_sctp6_SCTP_PR_SUPPORTED(0xffffffffffffffff, 0x84, 0x71, &(0x7f0000000200)={0x0, 0x8}, &(0x7f0000000240)=0x8) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(0xffffffffffffffff, 0x84, 0x6f, &(0x7f0000000300)={r3, 0x70, &(0x7f0000000280)=[@in={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x12}}, @in={0x2, 0x4e24, @loopback=0x7f000001}, @in={0x2, 0x0, @remote={0xac, 0x14, 0x14, 0xbb}}, @in={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x1a}}, @in={0x2, 0x4e24, @remote={0xac, 0x14, 0x14, 0xbb}}, @in={0x2, 0x4e24, @rand_addr=0x3ff}, @in={0x2, 0x4e24, @multicast2=0xe0000002}]}, &(0x7f0000000340)=0x10) setsockopt$inet_sctp6_SCTP_SET_PEER_PRIMARY_ADDR(0xffffffffffffffff, 0x84, 0x5, &(0x7f00000004c0)={r4, @in={{0x2, 0x4e20, @rand_addr=0x8}}}, 0x84) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, &(0x7f00000003c0)={'lo\x00', 0x4100}) ioctl$sock_inet_SIOCGIFNETMASK(0xffffffffffffffff, 0x891b, &(0x7f0000000100)={'nr0\x00', {0x2, 0x0, @loopback=0x7f000001}}) setsockopt$inet_msfilter(r0, 0x0, 0x29, &(0x7f0000000680)=ANY=[@ANYBLOB="cf0000000276d172390cc8c4ff4f3b746e5947c2ddb66a93ebb6d0f75b5f453435c311b94e126c49d47c10682b6e523d09fae1d416ebface98e08aa083e9f1f1afa118eb05655fec48d75d7a37edd032552c60ffeb53a2c8eecbe601a4ac5dceeecf1a943c2d9e2eaf4ad0a93e82a1a37a0cf2adbc4b512680428fee922ad18ff90ec6f87a75b299a953167bf4f9ae31cffd2c31dd47ba7d69151424dc1b2835f7624a302f270eb89118043dc1e1faa46e667be9cbf4456ad0c580ed032e4e49459f68f8a70f2dfe40f51362ffae"], 0x1) pread64(r0, &(0x7f0000000340)=""/181, 0xb5, 0x62) setsockopt$inet_msfilter(r0, 0x0, 0x29, &(0x7f0000000580)=ANY=[@ANYBLOB="e00000027f0000010000000001000000000000006b59aa51deb20d6efc9c04b7c9420f6434d31cbbe99b52873a8c21"], 0x1) socket$inet_udp(0x2, 0x2, 0x0) bpf$BPF_PROG_GET_NEXT_ID(0xb, &(0x7f0000000400)=0x7, 0x4) r5 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000ba4000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x2, 0x78, 0xe2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, r5, 0x0) r6 = perf_event_open(&(0x7f0000014f88)={0x1, 0x78, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00002e8000)}}, 0x0, 0x0, r5, 0x0) readv(r6, &(0x7f0000734000)=[{&(0x7f0000d42000)=""/146, 0x92}], 0x1) getsockopt$inet_sctp_SCTP_PEER_ADDR_THLDS(0xffffffffffffffff, 0x84, 0x1f, &(0x7f0000000480)={0x0, @in={{0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0xd}}}, 0xf80866d, 0x5}, &(0x7f0000000540)=0x90) getsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(0xffffffffffffff9c, 0x84, 0x18, &(0x7f0000000440)={r7, 0x400000000004}, &(0x7f00000005c0)=0xffffffffffffffc3) getsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER_VALUE(r0, 0x84, 0x7c, &(0x7f00000002c0)={r8, 0x10001, 0xc9e9}, &(0x7f0000000300)=0x8) 2018/03/30 19:43:05 executing program 7: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f000099e000)={0x2, 0x4e20, @multicast1=0xe0000001}, 0x10) sendto$inet(r0, &(0x7f0000de1fff), 0xfffffffffffffd43, 0x20008005, &(0x7f0000db4ff0)={0x2, 0x4e20, @loopback=0x7f000001}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000af5000)='illinois\x00', 0x9) getsockopt$inet_tcp_buf(r0, 0x6, 0x0, &(0x7f0000000000)=""/177, &(0x7f0000000100)=0xb1) [ 504.022268] resize option for remount only 2018/03/30 19:43:05 executing program 4: symlinkat(&(0x7f0000002f00)='./file0\x00', 0xffffffffffffffff, &(0x7f0000002f80)='./file0\x00') syz_mount_image$msdos(&(0x7f0000002fc0)='msdos\x00', &(0x7f0000003000)='./file0\x00', 0x4, 0x1, &(0x7f0000003180)=[{&(0x7f0000003040)="eaf9610c9f7031a1f58e51e73b3f0bd5af4364c38bbe335dbd3d211ec0338ba4c795c634af757a3c684da6110f67891133a6303441b21d139e3a6582efdaeabd3d68dbcb85cd383733a98084b62807af0b7ea49d68daa4cc9fda43dbeb13c3e67c44c463a2c429ccb66c0e1a9dfd5c911d4d7b578baaad6571d4457b9c6d92122a4bd97f5f174c81081941b007062f2cab2db1466851dde671e025909a633fec433bb2512fc61c436b74df23d280019a403884dc488071", 0xb7, 0xcd7}], 0x8, &(0x7f00000031c0)={[{@errors_continue='errors=continue', 0x2c}, {@time_offset={'time_offset', 0x3d, [0x0]}, 0x2c}]}) pipe(&(0x7f0000002f40)={0xffffffffffffffff}) r1 = open(&(0x7f0000003240)='./file0\x00', 0xa0001, 0x20) linkat(r0, &(0x7f0000003200)='./file0\x00', r1, &(0x7f0000003280)='./file0\x00', 0x400) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x80000, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)}, {&(0x7f0000010d00)="0000000000000000000000000000000000000000000000000000000002ae0000ed41000000040000d15bbe5ad15bbe5ad15bbe5a00000000000005002000000000000800070000000af301000400000000000000000000000100000030000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a1950000", 0xa0, 0x8c60}, {&(0x7f0000011a00)="020000000c0001022e000000020000000c0002022e2e00000b00000014000a026c6f73742b666f756e6400000c0000001000050166696c65300000000d0000001000050266696c65310000000f0000001000050166696c6532000000100000001000050166696c6533000000110000001000050166696c65340000001200000010000802564944454f5f54531400000068031201d181d18ed0b7d0bad0b0d0bbd0bbd0b5d1800000000000000000000000000000000000000000000000000000", 0xc0, 0xc000}, {&(0x7f0000012200)="0000000000000000000000000000000000000000000000000c0000dec910dfd800000000f4030000000000000000000000000000000000000000000000000000", 0x40, 0x117e0}, {&(0x7f0000012a00)="0d0000000c0001022e000000020000000c0002022e2e00000e000000dc03050166696c6530000000000000000000000000000000000000000000000000000000", 0x40, 0x1c000}], 0x0, &(0x7f0000013000)) syz_mount_image$bfs(&(0x7f0000000040)='bfs\x00', &(0x7f00000008c0)='./file0\x00', 0x20, 0x2, &(0x7f0000000180)=[{&(0x7f00000005c0)="f37e57346e86cb5adec662d7bd6f13a3764d2ca7640f9f81ba88d0689d0989735a7bafd5558d9a6e8988f9f6038fa475e49077bc8cfc6e170c4cdbaaa1375895c9a4068559d3cecf2a0423caa696bf77a75b3ae3f32b79da059ca13d055647998987fc2033d008bd55deb08808372b9b4595fb0d79a1358cd5949d859a7d155e86db4b608eb401109f6b792f5ce4a2ead9870dee49347bc08d0d54b0e4fca4fd895947a737f4ee823d997770e5c9df50c0c9fe2c0b945c6ffd13b7151e385b631520ac34a5967c6cd0d12b3746795681600541c17d379daed41ce8e715eba582fb668e160872a2", 0xe7, 0x7}, {&(0x7f0000000780)="6154d093a5a905da96fed5f8dea36bcd9d1d011246f7caf86806bf6ac6301d2d2b448461b867bbbe7d0eebdeafa16d7219af85ff4372670039ce277546def59f1d0eed4be4386a34c7243fe3ec84ad3807136a2c3ec35d6d87a7d7bb9342622cc3a7ff529ef3d76ff57fc7a1856f50b98e518515a9e679067cfc0e8500754fa30a81cf4dc42c5a0d36647280c5b0a8506efaf9ad06594678176efe4bdbcf7ab384b597df4c5ad66b2bd240823abe04cd30785819f1c7fd4d46bb55f8bd09ca4b44618b010e363fa572ca189ec73b36ad46b6f38d65c0acc417", 0xd9, 0x5}], 0x200000, 0x0) syz_mount_image$jfs(&(0x7f0000000080)='jfs\x00', &(0x7f0000000880)='./file0\x00', 0xfffffffffffffffe, 0x3, &(0x7f0000002dc0)=[{&(0x7f0000000900)="efee47debce411554253d03f2175c060de26b9a7a197d9327971105aafdf17a061227fe7dd52d3c1c1f0318992f304f7646c3eb4e32ff0514d34d4605b4e152474aa71ac6c0ba890b1f249f213d5bc162b605fdf3c524d6f84e1a2f8461d26ef5dd50b193ffb710ee69fc431552ae4548f0c1a7e503243bb10c53c566f37e3234d8b3d418992dca946568d275e1f54895a854bab3790963108fe6ce5b1f933e81bd0aa2dfd715aca4bd81b48b28e3ee265", 0xb1, 0x1}, {&(0x7f0000001a80)="b4bc90ad72742e5693f04c7955b05460b33cd0ca9cde365dbe1671162a8c1db744cb8a04d1d747ab4d3234fd615e6ad897396c21b8bf7da2c1d524d04fadade841e5acfac529250a2c75fed4b65a7b6c8735268244189e020c526112728097958fd591d00cd16d1591db9b0414d985d7718794369eb03d89403b7df76f6d745c94d4fa986321a9915fea55a73472bc39620fcf22ec74d02b77fafe6ccf72605eb0ba7ae69fa10a36d281e65a178528bc654ce5b6109d5294e400b18be755a3b899489b27a876ac3ea033ed525b28c7dff537b5210cbff466dc339e1f58db1679816589e886264ef1bcf6d0e1408d93946827711972", 0xf5, 0x7}, {&(0x7f0000002cc0)="c9bc1928c9ffffe99fdae39f5013810a038f1d558affc92341c81ee308195dabd95fcfedcfccd4cf2af62477e5ed935114b73940dba239c47d5824a3332fb48cea682934a6840ea5db2529c3a7c371bbf08f08bb15458de586609be64b699f29b7384dc7b2ba78f0e343fb9851eaf5a7b4106fc5b7a8aaf6e069012286fa7259807928cbee722222f45e6c98cefa00829bcdd92bd03273c7b0f20453c72150adf49c311248d3d3d96ad17187d60add3d1d8fbfbc5e572ceba134e5c533a5f75630a35514ee998b85a755085c04513dcc0047461d78f4aa8fdf0309fc39e3e4a1c24b4538acbf2366feaf", 0xea, 0x4}], 0x10000, &(0x7f0000002ec0)={[{@resize='resize', 0x2c}, {@noquota='noquota', 0x2c}, {@umask={'umask', 0x3d}, 0x2c}]}) 2018/03/30 19:43:05 executing program 6: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_mreqn(r0, 0x0, 0x27, &(0x7f0000000000)={@multicast2=0xe0000002, @loopback=0x7f000001}, 0xc) getsockopt$inet_sctp6_SCTP_FRAGMENT_INTERLEAVE(0xffffffffffffffff, 0x84, 0x12, &(0x7f0000000080), &(0x7f00000000c0)=0x4) ioctl$sock_inet_SIOCGIFDSTADDR(0xffffffffffffffff, 0x8917, &(0x7f0000000040)={'bcsh0\x00', {0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x1a}}}) setsockopt$inet_sctp6_SCTP_MAX_BURST(0xffffffffffffffff, 0x84, 0x14, &(0x7f0000000380)=@int=0x3, 0x4) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000140)={'bcsh0\x00', 0x0}) ioctl$sock_inet6_SIOCDELRT(0xffffffffffffffff, 0x890c, &(0x7f0000000180)={@dev={0xfe, 0x80, [], 0x13}, @loopback={0x0, 0x1}, @mcast2={0xff, 0x2, [], 0x1}, 0x6, 0x0, 0x42e, 0x100, 0x9, 0x80000000, r1}) r2 = socket$inet(0x2, 0xa, 0x5) setsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX(r2, 0x84, 0x6e, &(0x7f0000000600)=[@in={0x2, 0x4e21, @multicast1=0xe0000001}, @in6={0xa, 0x4e20, 0x0, @remote={0xfe, 0x80, [], 0xbb}}, @in={0x2, 0x4e22, @multicast2=0xe0000002}, @in6={0xa, 0x4e21, 0x1ff, @local={0xfe, 0x80, [], 0xaa}, 0x84}, @in6={0xa, 0x4e20, 0x4, @local={0xfe, 0x80, [], 0xaa}}], 0x74) getsockopt$inet_sctp6_SCTP_PR_SUPPORTED(0xffffffffffffffff, 0x84, 0x71, &(0x7f0000000200)={0x0, 0x8}, &(0x7f0000000240)=0x8) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(0xffffffffffffffff, 0x84, 0x6f, &(0x7f0000000300)={r3, 0x70, &(0x7f0000000280)=[@in={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x12}}, @in={0x2, 0x4e24, @loopback=0x7f000001}, @in={0x2, 0x0, @remote={0xac, 0x14, 0x14, 0xbb}}, @in={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x1a}}, @in={0x2, 0x4e24, @remote={0xac, 0x14, 0x14, 0xbb}}, @in={0x2, 0x4e24, @rand_addr=0x3ff}, @in={0x2, 0x4e24, @multicast2=0xe0000002}]}, &(0x7f0000000340)=0x10) setsockopt$inet_sctp6_SCTP_SET_PEER_PRIMARY_ADDR(0xffffffffffffffff, 0x84, 0x5, &(0x7f00000004c0)={r4, @in={{0x2, 0x4e20, @rand_addr=0x8}}}, 0x84) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, &(0x7f00000003c0)={'lo\x00', 0x4100}) ioctl$sock_inet_SIOCGIFNETMASK(0xffffffffffffffff, 0x891b, &(0x7f0000000100)={'nr0\x00', {0x2, 0x4e24, @loopback=0x7f000001}}) setsockopt$inet_msfilter(0xffffffffffffffff, 0x0, 0x29, &(0x7f0000000680)=ANY=[@ANYBLOB="cf0000000276d172390cc8c4ff4f3b746e5947c2ddb66a93ebb6d0f75b5f453435c311b94e126c49d47c10682b6e523d09fae1d416ebface98e08aa083e9f1f1afa118eb05655fec48d75d7a37edd032552c60ffeb53a2c8eecbe601a4ac5dceeecf1a943c2d9e2eaf4ad0a93e82a1a37a0cf2adbc4b512680428fee922ad18ff90ec6f87a75b299a953167bf4f9ae31cffd2c31dd47ba7d69151424dc1b2835f7624a302f270eb89118043dc1e1faa46e667be9cbf4456ad0c580ed032e4e49459f68f8a70f2dfe40f51362ffae"], 0x1) pread64(r0, &(0x7f0000000340)=""/181, 0xb5, 0x62) setsockopt$inet_msfilter(r0, 0x0, 0x29, &(0x7f0000000580)=ANY=[@ANYBLOB="e00000027f0000010000000001000000000000006b59aa51deb20d6efc9c04b7c9420f6434d31cbbe99b52873a8c21"], 0x1) socket$inet_udp(0x2, 0x2, 0x0) bpf$BPF_PROG_GET_NEXT_ID(0xb, &(0x7f0000000400)=0x7, 0x4) r5 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000ba4000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x2, 0x78, 0xe2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, r5, 0x0) r6 = perf_event_open(&(0x7f0000014f88)={0x1, 0x78, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00002e8000)}}, 0x0, 0x0, r5, 0x0) readv(r6, &(0x7f0000734000)=[{&(0x7f0000d42000)=""/146, 0x92}], 0x1) getsockopt$inet_sctp_SCTP_PEER_ADDR_THLDS(0xffffffffffffffff, 0x84, 0x1f, &(0x7f0000000480)={0x0, @in={{0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0xd}}}, 0xf80866d, 0x5}, &(0x7f0000000540)=0x90) getsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(0xffffffffffffff9c, 0x84, 0x18, &(0x7f0000000440)={r7, 0x400000000004}, &(0x7f00000005c0)=0xffffffffffffffc3) getsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER_VALUE(r0, 0x84, 0x7c, &(0x7f00000002c0)={r8, 0x10001, 0xc9e9}, &(0x7f0000000300)=0x8) [ 504.124186] FAT-fs (loop4): Unrecognized mount option "time_offset=" or missing value [ 504.164217] EXT4-fs (loop4): VFS: Can't find ext4 filesystem 2018/03/30 19:43:05 executing program 7: socket$inet6(0xa, 0x80002, 0x88) recvfrom$inet6(0xffffffffffffffff, &(0x7f0000ffbf47)=""/185, 0xfffffffffffffeba, 0x0, 0x0, 0xfffffffffffffde6) openat$autofs(0xffffffffffffff9c, &(0x7f0000000080)='/dev/autofs\x00', 0x0, 0x0) setsockopt$inet_sctp_SCTP_RESET_STREAMS(0xffffffffffffffff, 0x84, 0x77, &(0x7f0000000140)={0x0, 0x0, 0x3, [0xffff, 0x9, 0x0]}, 0xe) r0 = gettid() wait4(r0, &(0x7f0000000100), 0x4, &(0x7f0000000180)) r1 = socket$inet6(0xa, 0x8000000000000802, 0x88) sendmsg$inet_sctp(r1, &(0x7f0000a29000)={&(0x7f00005dafe4)=@in6={0xa, 0x4e23, 0x0, @mcast2={0xff, 0x2, [], 0x1}}, 0x1c, &(0x7f0000fc8000)}, 0x0) sched_setscheduler(r0, 0x5, &(0x7f0000000300)) setsockopt$ax25_buf(0xffffffffffffffff, 0x101, 0x0, &(0x7f0000000340), 0x0) sendto$inet6(0xffffffffffffffff, &(0x7f0000b0cf6e), 0xffed, 0x0, &(0x7f000001b000)={0xa}, 0x1c) dup2(r1, 0xffffffffffffffff) ioctl$DRM_IOCTL_DROP_MASTER(0xffffffffffffffff, 0x641f) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f00000000c0)=0x0) syz_open_procfs(r2, &(0x7f00000005c0)='gid_map\x00') tgkill(0x0, 0x0, 0x10) sendmsg$inet_sctp(0xffffffffffffffff, &(0x7f0000000500)={&(0x7f0000000040)=@in={0x2, 0x4e22, @rand_addr=0x8}, 0x10, &(0x7f0000000480), 0x0, &(0x7f00000004c0)}, 0x0) r3 = gettid() r4 = syz_open_procfs(r3, &(0x7f00000000c0)='net/netlink\x00') read(r4, &(0x7f0000000240)=""/85, 0x55) setsockopt$inet_sctp_SCTP_AUTOCLOSE(r4, 0x84, 0x4, &(0x7f0000000100)=0x4, 0x4) openat$sequencer(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer\x00', 0x0, 0x0) getsockopt$inet_sctp_SCTP_PR_SUPPORTED(0xffffffffffffffff, 0x84, 0x71, &(0x7f00000001c0)={0x0, 0x400}, &(0x7f0000000380)=0x8) perf_event_open(&(0x7f000025c000)={0x0, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r5 = memfd_create(&(0x7f00000002c0)='/dev/sequencer\x00', 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(0xffffffffffffffff, 0xc008240a, &(0x7f0000000080)=ANY=[@ANYBLOB="0000b668a56c00"]) sendfile(r5, r4, &(0x7f0000000200), 0x200000010000) 2018/03/30 19:43:05 executing program 4: symlinkat(&(0x7f0000002f00)='./file0\x00', 0xffffffffffffffff, &(0x7f0000002f80)='./file0\x00') syz_mount_image$msdos(&(0x7f0000002fc0)='msdos\x00', &(0x7f0000003000)='./file0\x00', 0x4, 0x1, &(0x7f0000003180)=[{&(0x7f0000003040)="eaf9610c9f7031a1f58e51e73b3f0bd5af4364c38bbe335dbd3d211ec0338ba4c795c634af757a3c684da6110f67891133a6303441b21d139e3a6582efdaeabd3d68dbcb85cd383733a98084b62807af0b7ea49d68daa4cc9fda43dbeb13c3e67c44c463a2c429ccb66c0e1a9dfd5c911d4d7b578baaad6571d4457b9c6d92122a4bd97f5f174c81081941b007062f2cab2db1466851dde671e025909a633fec433bb2512fc61c436b74df23d280019a403884dc488071", 0xb7, 0xcd7}], 0x8, &(0x7f00000031c0)={[{@errors_continue='errors=continue', 0x2c}, {@time_offset={'time_offset', 0x3d, [0x0]}, 0x2c}]}) pipe(&(0x7f0000002f40)={0xffffffffffffffff}) r1 = open(&(0x7f0000003240)='./file0\x00', 0xa0001, 0x20) linkat(r0, &(0x7f0000003200)='./file0\x00', r1, &(0x7f0000003280)='./file0\x00', 0x400) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x80000, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)}, {&(0x7f0000010d00)="0000000000000000000000000000000000000000000000000000000002ae0000ed41000000040000d15bbe5ad15bbe5ad15bbe5a00000000000005002000000000000800070000000af301000400000000000000000000000100000030000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a1950000", 0xa0, 0x8c60}, {&(0x7f0000011a00)="020000000c0001022e000000020000000c0002022e2e00000b00000014000a026c6f73742b666f756e6400000c0000001000050166696c65300000000d0000001000050266696c65310000000f0000001000050166696c6532000000100000001000050166696c6533000000110000001000050166696c65340000001200000010000802564944454f5f54531400000068031201d181d18ed0b7d0bad0b0d0bbd0bbd0b5d1800000000000000000000000000000000000000000000000000000", 0xc0, 0xc000}, {&(0x7f0000012200)="0000000000000000000000000000000000000000000000000c0000dec910dfd800000000f4030000000000000000000000000000000000000000000000000000", 0x40, 0x117e0}, {&(0x7f0000012a00)="0d0000000c0001022e000000020000000c0002022e2e00000e000000dc03050166696c6530000000000000000000000000000000000000000000000000000000", 0x40, 0x1c000}], 0x0, &(0x7f0000013000)) syz_mount_image$bfs(&(0x7f0000000040)='bfs\x00', &(0x7f00000008c0)='./file0\x00', 0x20, 0x2, &(0x7f0000000180)=[{&(0x7f00000005c0)="f37e57346e86cb5adec662d7bd6f13a3764d2ca7640f9f81ba88d0689d0989735a7bafd5558d9a6e8988f9f6038fa475e49077bc8cfc6e170c4cdbaaa1375895c9a4068559d3cecf2a0423caa696bf77a75b3ae3f32b79da059ca13d055647998987fc2033d008bd55deb08808372b9b4595fb0d79a1358cd5949d859a7d155e86db4b608eb401109f6b792f5ce4a2ead9870dee49347bc08d0d54b0e4fca4fd895947a737f4ee823d997770e5c9df50c0c9fe2c0b945c6ffd13b7151e385b631520ac34a5967c6cd0d12b3746795681600541c17d379daed41ce8e715eba582fb668e160872a2", 0xe7, 0x7}, {&(0x7f0000000780)="6154d093a5a905da96fed5f8dea36bcd9d1d011246f7caf86806bf6ac6301d2d2b448461b867bbbe7d0eebdeafa16d7219af85ff4372670039ce277546def59f1d0eed4be4386a34c7243fe3ec84ad3807136a2c3ec35d6d87a7d7bb9342622cc3a7ff529ef3d76ff57fc7a1856f50b98e518515a9e679067cfc0e8500754fa30a81cf4dc42c5a0d36647280c5b0a8506efaf9ad06594678176efe4bdbcf7ab384b597df4c5ad66b2bd240823abe04cd30785819f1c7fd4d46bb55f8bd09ca4b44618b010e363fa572ca189ec73b36ad46b6f38d65c0acc417", 0xd9, 0x5}], 0x200000, 0x0) syz_mount_image$jfs(&(0x7f0000000080)='jfs\x00', &(0x7f0000000880)='./file0\x00', 0xfffffffffffffffe, 0x3, &(0x7f0000002dc0)=[{&(0x7f0000000900)="efee47debce411554253d03f2175c060de26b9a7a197d9327971105aafdf17a061227fe7dd52d3c1c1f0318992f304f7646c3eb4e32ff0514d34d4605b4e152474aa71ac6c0ba890b1f249f213d5bc162b605fdf3c524d6f84e1a2f8461d26ef5dd50b193ffb710ee69fc431552ae4548f0c1a7e503243bb10c53c566f37e3234d8b3d418992dca946568d275e1f54895a854bab3790963108fe6ce5b1f933e81bd0aa2dfd715aca4bd81b48b28e3ee265", 0xb1, 0x1}, {&(0x7f0000001a80)="b4bc90ad72742e5693f04c7955b05460b33cd0ca9cde365dbe1671162a8c1db744cb8a04d1d747ab4d3234fd615e6ad897396c21b8bf7da2c1d524d04fadade841e5acfac529250a2c75fed4b65a7b6c8735268244189e020c526112728097958fd591d00cd16d1591db9b0414d985d7718794369eb03d89403b7df76f6d745c94d4fa986321a9915fea55a73472bc39620fcf22ec74d02b77fafe6ccf72605eb0ba7ae69fa10a36d281e65a178528bc654ce5b6109d5294e400b18be755a3b899489b27a876ac3ea033ed525b28c7dff537b5210cbff466dc339e1f58db1679816589e886264ef1bcf6d0e1408d93946827711972", 0xf5, 0x7}, {&(0x7f0000002cc0)="c9bc1928c9ffffe99fdae39f5013810a038f1d558affc92341c81ee308195dabd95fcfedcfccd4cf2af62477e5ed935114b73940dba239c47d5824a3332fb48cea682934a6840ea5db2529c3a7c371bbf08f08bb15458de586609be64b699f29b7384dc7b2ba78f0e343fb9851eaf5a7b4106fc5b7a8aaf6e069012286fa7259807928cbee722222f45e6c98cefa00829bcdd92bd03273c7b0f20453c72150adf49c311248d3d3d96ad17187d60add3d1d8fbfbc5e572ceba134e5c533a5f75630a35514ee998b85a755085c04513dcc0047461d78f4aa8fdf0309fc39e3e4a1c24b4538acbf2366feaf", 0xea, 0x4}], 0x10000, &(0x7f0000002ec0)={[{@resize='resize', 0x2c}, {@noquota='noquota', 0x2c}, {@umask={'umask', 0x3d}, 0x2c}]}) [ 504.250114] FAT-fs (loop4): Unrecognized mount option "time_offset=" or missing value [ 504.269372] EXT4-fs (loop4): VFS: Can't find ext4 filesystem [ 504.297897] BFS-fs: bfs_fill_super(): No BFS filesystem on loop4 (magic=00000000) [ 504.336844] jfs: Unrecognized mount option "umask=" or missing value [ 504.582721] IPVS: ftp: loaded support on port[0] = 21 2018/03/30 19:43:06 executing program 4: symlinkat(&(0x7f0000002f00)='./file0\x00', 0xffffffffffffffff, &(0x7f0000002f80)='./file0\x00') syz_mount_image$msdos(&(0x7f0000002fc0)='msdos\x00', &(0x7f0000003000)='./file0\x00', 0x4, 0x1, &(0x7f0000003180)=[{&(0x7f0000003040)="eaf9610c9f7031a1f58e51e73b3f0bd5af4364c38bbe335dbd3d211ec0338ba4c795c634af757a3c684da6110f67891133a6303441b21d139e3a6582efdaeabd3d68dbcb85cd383733a98084b62807af0b7ea49d68daa4cc9fda43dbeb13c3e67c44c463a2c429ccb66c0e1a9dfd5c911d4d7b578baaad6571d4457b9c6d92122a4bd97f5f174c81081941b007062f2cab2db1466851dde671e025909a633fec433bb2512fc61c436b74df23d280019a403884dc488071", 0xb7, 0xcd7}], 0x8, &(0x7f00000031c0)={[{@errors_continue='errors=continue', 0x2c}, {@time_offset={'time_offset', 0x3d, [0x0]}, 0x2c}]}) pipe(&(0x7f0000002f40)={0xffffffffffffffff}) r1 = open(&(0x7f0000003240)='./file0\x00', 0xa0001, 0x20) linkat(r0, &(0x7f0000003200)='./file0\x00', r1, &(0x7f0000003280)='./file0\x00', 0x400) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x80000, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)}, {&(0x7f0000010d00)="0000000000000000000000000000000000000000000000000000000002ae0000ed41000000040000d15bbe5ad15bbe5ad15bbe5a00000000000005002000000000000800070000000af301000400000000000000000000000100000030000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a1950000", 0xa0, 0x8c60}, {&(0x7f0000011a00)="020000000c0001022e000000020000000c0002022e2e00000b00000014000a026c6f73742b666f756e6400000c0000001000050166696c65300000000d0000001000050266696c65310000000f0000001000050166696c6532000000100000001000050166696c6533000000110000001000050166696c65340000001200000010000802564944454f5f54531400000068031201d181d18ed0b7d0bad0b0d0bbd0bbd0b5d1800000000000000000000000000000000000000000000000000000", 0xc0, 0xc000}, {&(0x7f0000012200)="0000000000000000000000000000000000000000000000000c0000dec910dfd800000000f4030000000000000000000000000000000000000000000000000000", 0x40, 0x117e0}, {&(0x7f0000012a00)="0d0000000c0001022e000000020000000c0002022e2e00000e000000dc03050166696c6530000000000000000000000000000000000000000000000000000000", 0x40, 0x1c000}], 0x0, &(0x7f0000013000)) syz_mount_image$bfs(&(0x7f0000000040)='bfs\x00', &(0x7f00000008c0)='./file0\x00', 0x20, 0x2, &(0x7f0000000180)=[{&(0x7f00000005c0)="f37e57346e86cb5adec662d7bd6f13a3764d2ca7640f9f81ba88d0689d0989735a7bafd5558d9a6e8988f9f6038fa475e49077bc8cfc6e170c4cdbaaa1375895c9a4068559d3cecf2a0423caa696bf77a75b3ae3f32b79da059ca13d055647998987fc2033d008bd55deb08808372b9b4595fb0d79a1358cd5949d859a7d155e86db4b608eb401109f6b792f5ce4a2ead9870dee49347bc08d0d54b0e4fca4fd895947a737f4ee823d997770e5c9df50c0c9fe2c0b945c6ffd13b7151e385b631520ac34a5967c6cd0d12b3746795681600541c17d379daed41ce8e715eba582fb668e160872a2", 0xe7, 0x7}, {&(0x7f0000000780)="6154d093a5a905da96fed5f8dea36bcd9d1d011246f7caf86806bf6ac6301d2d2b448461b867bbbe7d0eebdeafa16d7219af85ff4372670039ce277546def59f1d0eed4be4386a34c7243fe3ec84ad3807136a2c3ec35d6d87a7d7bb9342622cc3a7ff529ef3d76ff57fc7a1856f50b98e518515a9e679067cfc0e8500754fa30a81cf4dc42c5a0d36647280c5b0a8506efaf9ad06594678176efe4bdbcf7ab384b597df4c5ad66b2bd240823abe04cd30785819f1c7fd4d46bb55f8bd09ca4b44618b010e363fa572ca189ec73b36ad46b6f38d65c0acc417", 0xd9, 0x5}], 0x200000, 0x0) syz_mount_image$jfs(&(0x7f0000000080)='jfs\x00', &(0x7f0000000880)='./file0\x00', 0xfffffffffffffffe, 0x3, &(0x7f0000002dc0)=[{&(0x7f0000000900)="efee47debce411554253d03f2175c060de26b9a7a197d9327971105aafdf17a061227fe7dd52d3c1c1f0318992f304f7646c3eb4e32ff0514d34d4605b4e152474aa71ac6c0ba890b1f249f213d5bc162b605fdf3c524d6f84e1a2f8461d26ef5dd50b193ffb710ee69fc431552ae4548f0c1a7e503243bb10c53c566f37e3234d8b3d418992dca946568d275e1f54895a854bab3790963108fe6ce5b1f933e81bd0aa2dfd715aca4bd81b48b28e3ee265", 0xb1, 0x1}, {&(0x7f0000001a80)="b4bc90ad72742e5693f04c7955b05460b33cd0ca9cde365dbe1671162a8c1db744cb8a04d1d747ab4d3234fd615e6ad897396c21b8bf7da2c1d524d04fadade841e5acfac529250a2c75fed4b65a7b6c8735268244189e020c526112728097958fd591d00cd16d1591db9b0414d985d7718794369eb03d89403b7df76f6d745c94d4fa986321a9915fea55a73472bc39620fcf22ec74d02b77fafe6ccf72605eb0ba7ae69fa10a36d281e65a178528bc654ce5b6109d5294e400b18be755a3b899489b27a876ac3ea033ed525b28c7dff537b5210cbff466dc339e1f58db1679816589e886264ef1bcf6d0e1408d93946827711972", 0xf5, 0x7}, {&(0x7f0000002cc0)="c9bc1928c9ffffe99fdae39f5013810a038f1d558affc92341c81ee308195dabd95fcfedcfccd4cf2af62477e5ed935114b73940dba239c47d5824a3332fb48cea682934a6840ea5db2529c3a7c371bbf08f08bb15458de586609be64b699f29b7384dc7b2ba78f0e343fb9851eaf5a7b4106fc5b7a8aaf6e069012286fa7259807928cbee722222f45e6c98cefa00829bcdd92bd03273c7b0f20453c72150adf49c311248d3d3d96ad17187d60add3d1d8fbfbc5e572ceba134e5c533a5f75630a35514ee998b85a755085c04513dcc0047461d78f4aa8fdf0309fc39e3e4a1c24b4538acbf2366feaf", 0xea, 0x4}], 0x10000, &(0x7f0000002ec0)={[{@resize='resize', 0x2c}, {@noquota='noquota', 0x2c}, {@umask={'umask', 0x3d}, 0x2c}]}) 2018/03/30 19:43:06 executing program 0: r0 = getpid() socketpair$inet_sctp(0x2, 0x5, 0x84, &(0x7f0000002900)) r1 = perf_event_open(&(0x7f0000348f88)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x80}, r0, 0xfffffffffffffffd, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_RESET(r1, 0x2403, 0xc377) recvmsg$kcm(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x139, &(0x7f00000007c0), 0x0, &(0x7f0000000100)=""/63, 0x3f, 0xfffffffffffffffc}, 0xfffffffffffffffe) r2 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r2, 0x40082404, &(0x7f0000000140)=0x6) r3 = gettid() mkdir(&(0x7f000075bff8)='./file0\x00', 0x0) socketpair(0x10, 0x800, 0x5, &(0x7f0000001100)={0xffffffffffffffff, 0xffffffffffffffff}) r6 = perf_event_open(&(0x7f0000001340)={0x7, 0x70, 0xfffffffffffffff9, 0x9, 0x5, 0xff, 0x0, 0x7fff, 0x0, 0x1, 0x3, 0x6, 0x457, 0x3, 0x5, 0x3, 0x9, 0xb0, 0x40, 0x1, 0x1dc, 0x2, 0x0, 0x8001, 0x1, 0x0, 0x6, 0x4, 0x0, 0xff, 0x9, 0x7fff, 0x100000000, 0x8, 0x7, 0x6ad, 0xffffffffffffff14, 0x0, 0x0, 0x39, 0x4, @perf_config_ext={0x6, 0x80000000}, 0x400, 0x0, 0xffffffffffffff81, 0x3, 0x2, 0x6, 0xb75}, r3, 0x7, r5, 0x8) recvmsg$kcm(r4, &(0x7f0000001300)={0x0, 0x0, &(0x7f0000001200)=[{&(0x7f0000001140)=""/131, 0x83}], 0x1, &(0x7f0000001240)=""/134, 0x86, 0xfff}, 0x2000) perf_event_open(&(0x7f000000a000)={0x1, 0x78, 0x0, 0x0, 0xb140, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x800000, 0x0, @perf_bp={&(0x7f0000000000), 0x800000}, 0x0, 0x20000000, 0x6, 0x400010, 0x100}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000002700)='./file2\x00', 0x3) socketpair$inet6_udp(0xa, 0x2, 0x0, &(0x7f0000002a80)) r7 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000002680)={&(0x7f0000002640)='./file1\x00', 0x0, 0x8}, 0x10) perf_event_open(&(0x7f0000002980)={0x3, 0x70, 0x1, 0x4, 0x9, 0x8, 0x0, 0x0, 0x80, 0x5, 0x80, 0xfffffffffffffffe, 0x1000, 0x6, 0x9, 0x4, 0x5, 0xb93e, 0x80000001, 0x4, 0x3, 0x4, 0x401, 0x1, 0x4, 0xffffffffffff9bce, 0x5, 0x2, 0x0, 0x5, 0x6, 0x0, 0x4, 0x7f, 0x3, 0x7, 0x4, 0x3, 0x0, 0x1ff, 0x2, @perf_config_ext={0xfffffffffffffffe, 0x7}, 0x0, 0x5, 0x2, 0x5, 0x0, 0x902, 0x8}, r0, 0x6, r1, 0xa) mount(&(0x7f00009f8000)='./file0\x00', &(0x7f0000a3bff8)='./file0\x00', &(0x7f00000026c0)='nfs4\x00', 0x0, &(0x7f000000a000)) socketpair$inet_icmp(0x2, 0x2, 0x1, &(0x7f0000000180)) perf_event_open(&(0x7f00000001c0)={0x3, 0x70, 0x4594dab1, 0x0, 0xc600000000000000, 0x1, 0x0, 0xd53f, 0x80008, 0x0, 0x0, 0x44d1, 0x3, 0x1, 0x10001, 0x100, 0x40, 0x7, 0x15c000000000000, 0x0, 0x42, 0x7, 0x1, 0x8, 0x1, 0x7, 0x0, 0x81, 0x3, 0x5, 0x4, 0x1, 0x5, 0x7a52, 0xfffffffffffffff8, 0x1, 0x0, 0xffff, 0x0, 0x2, 0x1, @perf_config_ext={0x1ff}, 0x430, 0x401, 0x100000000, 0x1, 0x0, 0x890b, 0x80000000}, r3, 0x5, r2, 0x1) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f0000002940)) recvmsg$kcm(r5, &(0x7f0000002600)={0x0, 0x0, &(0x7f0000002580)=[{&(0x7f00000013c0)=""/113, 0x71}, {&(0x7f0000001440)=""/4096, 0x1000}, {&(0x7f0000002440)=""/15, 0xf}, {&(0x7f0000002480)=""/227, 0xe3}], 0x4, &(0x7f00000025c0)=""/61, 0x3d, 0x7fffffff}, 0x2001) perf_event_open(&(0x7f0000002780)={0x4, 0x70, 0x9, 0x3, 0x2, 0x0, 0x0, 0x5, 0x40000, 0x4, 0x3, 0x8, 0x0, 0x4, 0x7fffffff, 0x63, 0x3, 0x80, 0x9, 0x468e, 0x10000, 0x11, 0x5, 0xff, 0x20, 0x20, 0x2, 0x40, 0x400, 0x0, 0x5, 0x557, 0x9, 0x9e, 0x3ff, 0x1, 0x0, 0x1, 0x0, 0x3, 0x4, @perf_bp={&(0x7f0000002740)}, 0x0, 0x1, 0x4, 0x2, 0x401, 0x6, 0x1f}, r0, 0xc, r6, 0x1) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000002880)={r7, 0x50, &(0x7f0000002800)={0x0, 0x0}}, 0x10) bpf$OBJ_GET_PROG(0x7, &(0x7f0000002a00)={&(0x7f0000002a40)='./file0\x00', 0x0, 0x80008}, 0x195) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000028c0)=r8, 0x4) 2018/03/30 19:43:06 executing program 5: unshare(0x40000000) perf_event_open(&(0x7f000001d000)={0x2, 0x78, 0xe2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000000)={0x6, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0xa, 0x1, 0x0) ioctl(r0, 0x8982, &(0x7f0000000000)) r1 = socket$packet(0x11, 0x0, 0x300) r2 = openat$cuse(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/cuse\x00', 0x82, 0x0) io_setup(0x43f, &(0x7f00000000c0)=0x0) io_submit(r3, 0x1, &(0x7f0000000000)=[&(0x7f0000000200)={0x0, 0x0, 0x0, 0x1, 0x0, r2, &(0x7f0000000040)="10000000020400000000000000000000", 0x10}]) r4 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000280)='/proc/sys/net/ipv4/vs/secure_tcp\x00', 0x2, 0x0) sendmsg$kcm(r4, &(0x7f0000001f00)={&(0x7f0000001b40)=@pppol2tpin6={0x18, 0x1, {0x0, r1, 0x0, 0x1, 0x0, 0x0, {0xa, 0x4e24, 0xc1, @mcast1={0xff, 0x1, [], 0x1}}}}, 0x80, &(0x7f0000001d80)=[{&(0x7f0000001bc0)="a9db123ebf124fab0f2eec9774559e3b5870fb7c6818fc89c4b8742d057480657265ae2b34fb2d4e585d22ca1bf7b0a22ce38a20a819d919947c78f8d5c9f3291905fd3ed2b8ef8a79d9453396c6b0b7eb0778dbc49b32ae91e443b64edddcf320c1589c7777eadd4e57c01b20a8ca7a831e8e2c104d0194d52fb5c35b550f", 0x7f}], 0x1, &(0x7f0000001dc0)=ANY=[], 0x0, 0x90}, 0x20000000) r5 = syz_open_dev$tun(&(0x7f00000001c0)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r5, 0x400454ca, &(0x7f0000000200)={'bridge0\x00\x00p\x00', 0x4000000000001005}) socketpair(0x1d, 0x3, 0x40, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_inet_SIOCSIFADDR(r6, 0x8916, &(0x7f0000000100)={'bridge8\x00', {0x2, 0x0, @dev={0xac, 0x14, 0x14}}}) ioctl$LOOP_SET_FD(r2, 0x4c00, r1) ioctl$SNDRV_SEQ_IOCTL_RUNNING_MODE(0xffffffffffffffff, 0xc0105303, &(0x7f00000002c0)={0x2, 0x8}) add_key$keyring(&(0x7f00000000c0)='keyring\x00', &(0x7f0000000100)={0x73, 0x79, 0x7a}, 0x0, 0x0, 0x0) clone(0x0, &(0x7f0000000040), &(0x7f0000000080), &(0x7f0000000000), &(0x7f0000000100)) ioctl$int_in(0xffffffffffffffff, 0x800000c004500a, &(0x7f0000006ff8)) wait4(0x0, 0x0, 0x4, &(0x7f0000000380)) ioctl$sock_inet_sctp_SIOCINQ(r7, 0x541b, &(0x7f0000000180)) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_PORT(0xffffffffffffffff, 0xc0a85352, &(0x7f0000001980)={{}, 'port1\x00', 0x0, 0x20010, 0x1f, 0x0, 0x3, 0x40, 0x0, 0x0, 0x4, 0x6d1}) 2018/03/30 19:43:06 executing program 1: r0 = syz_open_dev$amidi(&(0x7f0000000040)='/dev/amidi#\x00', 0x3, 0x28000) ioctl$DRM_IOCTL_RES_CTX(r0, 0xc0086426, &(0x7f0000000100)={0x2c, &(0x7f00000000c0)=[{}, {}, {}, {}, {}, {}, {}, {}]}) socket$netlink(0x10, 0x3, 0xc) writev(0xffffffffffffffff, &(0x7f00000021c0), 0x0) bind$bt_l2cap(r0, &(0x7f0000000340)={0x1f, 0x800000000000002, {0x401, 0x3, 0xb, 0x3f8}}, 0x9) socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f0000a8d000)={&(0x7f0000c78ff4)={0x10}, 0xc, &(0x7f0000df6000)={&(0x7f0000000200)=ANY=[@ANYBLOB="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"], 0x10f}, 0x1}, 0x0) r1 = socket$inet_sctp(0x2, 0x5, 0x84) sendmsg$inet_sctp(r1, &(0x7f0000001f00)={&(0x7f0000001840)=@in={0x2, 0x0, @dev={0xac, 0x14, 0x14}}, 0x10, &(0x7f0000001c40)=[{&(0x7f0000001880)='[', 0x1}], 0x1, &(0x7f0000001e40)}, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000540)=@nat={'nat\x00', 0x19, 0x3, 0x376, [0x20000140, 0x0, 0x0, 0x20000170, 0x200002d0], 0x0, &(0x7f0000000100), &(0x7f00000006c0)=ANY=[@ANYBLOB="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"]}, 0x3ee) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000002980)) getsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(0xffffffffffffffff, 0x84, 0x1f, &(0x7f0000000440)={0x0, @in={{0x2, 0x4e22, @multicast2=0xe0000002}}, 0x7bb7, 0x4}, &(0x7f0000000500)=0x90) getsockopt$inet_sctp_SCTP_RTOINFO(0xffffffffffffffff, 0x84, 0x0, &(0x7f0000002240)={0x0, 0x9, 0x417}, &(0x7f00000001c0)=0x10) r2 = socket(0x22, 0x4, 0x3) r3 = socket(0x20000001e, 0x5, 0x0) r4 = perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$packet_tx_ring(r3, 0x10f, 0x87, &(0x7f0000265000)=@req={0x3fc, 0x0, 0x1}, 0x10) getegid() setsockopt$packet_tx_ring(r2, 0x10f, 0x87, &(0x7f0000265000)=@req={0x3fc, 0x0, 0x1}, 0x10) writev(r2, &(0x7f00000000c0)=[{&(0x7f0000000000)="8a", 0x1}], 0x1) close(r2) close(r3) perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r5 = syz_open_dev$evdev(&(0x7f0000dfdfee)='/dev/input/event#\x00', 0x0, 0x2) readv(r5, &(0x7f0000019fe0)=[{&(0x7f00008ec000)=""/219, 0xdb}], 0x1) write$evdev(r5, &(0x7f000004d000)=[{{}, 0x0, 0x1}, {{0x2}}], 0x30) r6 = getpgrp(0x0) setsockopt$ax25_int(r3, 0x101, 0xd, &(0x7f0000000080)=0x7, 0x4) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x8, 0xfffffffffffffffd, 0x9, 0x7, 0x0, 0x8001, 0x0, 0x6, 0x3ff, 0x4, 0x5, 0x4, 0xbd9, 0x56, 0x8000, 0x7f, 0xff, 0xeba, 0x1f, 0x0, 0xfd, 0x3, 0x1, 0x50, 0x7, 0x9, 0x641800, 0x3ff8000000000000, 0x4, 0x0, 0x10000, 0x5, 0x7, 0x6, 0x1, 0xffffffffffffffe0, 0x0, 0x20, 0x0, @perf_bp={&(0x7f0000000040), 0x8}, 0x20, 0x401, 0x8, 0x3, 0x8, 0x7, 0x7}, r6, 0xc, r4, 0x0) syz_genetlink_get_family_id$ipvs(&(0x7f0000000040)='IPVS\x00') 2018/03/30 19:43:06 executing program 7: r0 = socket$packet(0x11, 0x2, 0x300) r1 = syz_open_dev$tun(&(0x7f00000001c0)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000000)={'bridge0\x00', 0xfffffffffffffffd}) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f00000000c0)={'bridge0\x00', 0x22001}) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000140)={'bridge0\x00\x00 \x00'}) lseek(r0, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_DEFAULT_SNDINFO(r0, 0x84, 0x22, &(0x7f0000000300)={0x0, 0x4, 0x6}, &(0x7f0000000380)=0x10) sendmsg$inet_sctp(0xffffffffffffffff, &(0x7f00000008c0)={&(0x7f00000004c0)=@in={0x2, 0x4e23, @remote={0xac, 0x14, 0x14, 0xbb}}, 0x10, &(0x7f00000007c0), 0x0, &(0x7f0000000840)}, 0x0) setsockopt$packet_fanout_data(0xffffffffffffffff, 0x107, 0x16, &(0x7f0000000600)={0x2, &(0x7f00000005c0)=[{0x6, 0xf412, 0x4}, {0x0, 0x0, 0x6f8}]}, 0x10) ioctl$TUNGETSNDBUF(0xffffffffffffffff, 0x800454d3, &(0x7f0000000080)) setsockopt$sock_void(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) setgroups(0x0, &(0x7f0000000200)) fchmod(0xffffffffffffffff, 0x0) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000740)) ioctl$sock_SIOCSPGRP(0xffffffffffffffff, 0x8902, &(0x7f0000000780)) 2018/03/30 19:43:06 executing program 3: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$DRM_IOCTL_SET_VERSION(0xffffffffffffffff, 0xc0106407, &(0x7f00000000c0)={0x0, 0x0, 0x1, 0x1}) ioctl$DRM_IOCTL_RM_MAP(0xffffffffffffffff, 0x4028641b, &(0x7f00000002c0)={&(0x7f0000ffa000/0x3000)=nil, 0x7, 0x0, 0x20, &(0x7f0000ffb000/0x4000)=nil, 0x4}) pipe(&(0x7f0000000080)) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000005000)={&(0x7f0000000040)={0x10}, 0xc, &(0x7f0000015ff0)={&(0x7f0000000240)={0x20, 0x2c, 0xafb, 0x0, 0x0, {0x2}, [@typed={0xc, 0x3f, @str='IPVS\x00'}]}, 0x20}, 0x1}, 0x0) setsockopt$IP_VS_SO_SET_STARTDAEMON(r0, 0x0, 0x48b, &(0x7f0000000000)={0x1, 'gre0\x00'}, 0x18) setsockopt$IP_VS_SO_SET_STOPDAEMON(r0, 0x0, 0x48c, &(0x7f0000001d00)={0x1, 'vcan0\x00'}, 0x18) socket$key(0xf, 0x3, 0x2) 2018/03/30 19:43:06 executing program 2: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) readv(0xffffffffffffffff, &(0x7f0000001480), 0x0) readv(r0, &(0x7f0000001980)=[{&(0x7f00000018c0)=""/182, 0xb6}], 0x1) r1 = syz_open_pts(r0, 0x2) setsockopt$inet6_mtu(0xffffffffffffffff, 0x29, 0x17, &(0x7f0000000440)=0x5, 0x4) socket$inet_sctp(0x2, 0x5, 0x84) dup3(r1, r0, 0x0) write(r0, &(0x7f0000c34fff), 0xffffff0b) socket$inet(0x2, 0x0, 0x0) setsockopt$bt_l2cap_L2CAP_OPTIONS(0xffffffffffffffff, 0x6, 0x1, &(0x7f0000000380)={0xefa, 0x800, 0x0, 0x0, 0x9}, 0xc) 2018/03/30 19:43:06 executing program 6: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_mreqn(r0, 0x0, 0x27, &(0x7f0000000000)={@multicast2=0xe0000002, @loopback=0x7f000001}, 0xc) getsockopt$inet_sctp6_SCTP_FRAGMENT_INTERLEAVE(0xffffffffffffffff, 0x84, 0x12, &(0x7f0000000080), &(0x7f00000000c0)=0x4) ioctl$sock_inet_SIOCGIFDSTADDR(0xffffffffffffffff, 0x8917, &(0x7f0000000040)={'bcsh0\x00', {0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x1a}}}) setsockopt$inet_sctp6_SCTP_MAX_BURST(0xffffffffffffffff, 0x84, 0x14, &(0x7f0000000380)=@int=0x3, 0x4) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000140)={'bcsh0\x00', 0x0}) ioctl$sock_inet6_SIOCDELRT(0xffffffffffffffff, 0x890c, &(0x7f0000000180)={@dev={0xfe, 0x80, [], 0x13}, @loopback={0x0, 0x1}, @mcast2={0xff, 0x2, [], 0x1}, 0x6, 0x0, 0x42e, 0x100, 0x9, 0x80000000, r1}) r2 = socket$inet(0x2, 0xa, 0x5) setsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX(r2, 0x84, 0x6e, &(0x7f0000000600)=[@in={0x2, 0x4e21, @multicast1=0xe0000001}, @in6={0xa, 0x4e20, 0x0, @remote={0xfe, 0x80, [], 0xbb}}, @in={0x2, 0x4e22, @multicast2=0xe0000002}, @in6={0xa, 0x4e21, 0x1ff, @local={0xfe, 0x80, [], 0xaa}, 0x84}, @in6={0xa, 0x4e20, 0x4, @local={0xfe, 0x80, [], 0xaa}}], 0x74) getsockopt$inet_sctp6_SCTP_PR_SUPPORTED(0xffffffffffffffff, 0x84, 0x71, &(0x7f0000000200)={0x0, 0x8}, &(0x7f0000000240)=0x8) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(0xffffffffffffffff, 0x84, 0x6f, &(0x7f0000000300)={r3, 0x70, &(0x7f0000000280)=[@in={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x12}}, @in={0x2, 0x4e24, @loopback=0x7f000001}, @in={0x2, 0x0, @remote={0xac, 0x14, 0x14, 0xbb}}, @in={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x1a}}, @in={0x2, 0x4e24, @remote={0xac, 0x14, 0x14, 0xbb}}, @in={0x2, 0x4e24, @rand_addr=0x3ff}, @in={0x2, 0x4e24, @multicast2=0xe0000002}]}, &(0x7f0000000340)=0x10) setsockopt$inet_sctp6_SCTP_SET_PEER_PRIMARY_ADDR(0xffffffffffffffff, 0x84, 0x5, &(0x7f00000004c0)={r4, @in={{0x2, 0x4e20, @rand_addr=0x8}}}, 0x84) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, &(0x7f00000003c0)={'lo\x00', 0x4100}) ioctl$sock_inet_SIOCGIFNETMASK(0xffffffffffffffff, 0x891b, &(0x7f0000000100)={'nr0\x00', {0x2, 0x4e24, @loopback=0x7f000001}}) setsockopt$inet_msfilter(0xffffffffffffffff, 0x0, 0x29, &(0x7f0000000680)=ANY=[@ANYBLOB="cf0000000276d172390cc8c4ff4f3b746e5947c2ddb66a93ebb6d0f75b5f453435c311b94e126c49d47c10682b6e523d09fae1d416ebface98e08aa083e9f1f1afa118eb05655fec48d75d7a37edd032552c60ffeb53a2c8eecbe601a4ac5dceeecf1a943c2d9e2eaf4ad0a93e82a1a37a0cf2adbc4b512680428fee922ad18ff90ec6f87a75b299a953167bf4f9ae31cffd2c31dd47ba7d69151424dc1b2835f7624a302f270eb89118043dc1e1faa46e667be9cbf4456ad0c580ed032e4e49459f68f8a70f2dfe40f51362ffae"], 0x1) pread64(r0, &(0x7f0000000340)=""/181, 0xb5, 0x62) setsockopt$inet_msfilter(r0, 0x0, 0x29, &(0x7f0000000580)=ANY=[@ANYBLOB="e00000027f0000010000000001000000000000006b59aa51deb20d6efc9c04b7c9420f6434d31cbbe99b52873a8c21"], 0x1) socket$inet_udp(0x2, 0x2, 0x0) bpf$BPF_PROG_GET_NEXT_ID(0xb, &(0x7f0000000400)=0x7, 0x4) r5 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000ba4000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x2, 0x78, 0xe2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, r5, 0x0) r6 = perf_event_open(&(0x7f0000014f88)={0x1, 0x78, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00002e8000)}}, 0x0, 0x0, r5, 0x0) readv(r6, &(0x7f0000734000)=[{&(0x7f0000d42000)=""/146, 0x92}], 0x1) getsockopt$inet_sctp_SCTP_PEER_ADDR_THLDS(0xffffffffffffffff, 0x84, 0x1f, &(0x7f0000000480)={0x0, @in={{0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0xd}}}, 0xf80866d, 0x5}, &(0x7f0000000540)=0x90) getsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(0xffffffffffffff9c, 0x84, 0x18, &(0x7f0000000440)={r7, 0x400000000004}, &(0x7f00000005c0)=0xffffffffffffffc3) getsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER_VALUE(r0, 0x84, 0x7c, &(0x7f00000002c0)={r8, 0x10001, 0xc9e9}, &(0x7f0000000300)=0x8) [ 505.057210] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 505.072161] FAT-fs (loop4): Unrecognized mount option "time_offset=" or missing value [ 505.088093] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready 2018/03/30 19:43:06 executing program 6: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_mreqn(r0, 0x0, 0x27, &(0x7f0000000000)={@multicast2=0xe0000002, @loopback=0x7f000001}, 0xc) getsockopt$inet_sctp6_SCTP_FRAGMENT_INTERLEAVE(0xffffffffffffffff, 0x84, 0x12, &(0x7f0000000080), &(0x7f00000000c0)=0x4) ioctl$sock_inet_SIOCGIFDSTADDR(0xffffffffffffffff, 0x8917, &(0x7f0000000040)={'bcsh0\x00', {0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x1a}}}) setsockopt$inet_sctp6_SCTP_MAX_BURST(0xffffffffffffffff, 0x84, 0x14, &(0x7f0000000380)=@int=0x3, 0x4) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000140)={'bcsh0\x00', 0x0}) ioctl$sock_inet6_SIOCDELRT(0xffffffffffffffff, 0x890c, &(0x7f0000000180)={@dev={0xfe, 0x80, [], 0x13}, @loopback={0x0, 0x1}, @mcast2={0xff, 0x2, [], 0x1}, 0x6, 0x0, 0x42e, 0x100, 0x9, 0x80000000, r1}) r2 = socket$inet(0x2, 0xa, 0x5) setsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX(r2, 0x84, 0x6e, &(0x7f0000000600)=[@in={0x2, 0x4e21, @multicast1=0xe0000001}, @in6={0xa, 0x4e20, 0x0, @remote={0xfe, 0x80, [], 0xbb}}, @in={0x2, 0x4e22, @multicast2=0xe0000002}, @in6={0xa, 0x4e21, 0x1ff, @local={0xfe, 0x80, [], 0xaa}, 0x84}, @in6={0xa, 0x4e20, 0x4, @local={0xfe, 0x80, [], 0xaa}}], 0x74) getsockopt$inet_sctp6_SCTP_PR_SUPPORTED(0xffffffffffffffff, 0x84, 0x71, &(0x7f0000000200)={0x0, 0x8}, &(0x7f0000000240)=0x8) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(0xffffffffffffffff, 0x84, 0x6f, &(0x7f0000000300)={r3, 0x70, &(0x7f0000000280)=[@in={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x12}}, @in={0x2, 0x4e24, @loopback=0x7f000001}, @in={0x2, 0x0, @remote={0xac, 0x14, 0x14, 0xbb}}, @in={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x1a}}, @in={0x2, 0x4e24, @remote={0xac, 0x14, 0x14, 0xbb}}, @in={0x2, 0x4e24, @rand_addr=0x3ff}, @in={0x2, 0x4e24, @multicast2=0xe0000002}]}, &(0x7f0000000340)=0x10) setsockopt$inet_sctp6_SCTP_SET_PEER_PRIMARY_ADDR(0xffffffffffffffff, 0x84, 0x5, &(0x7f00000004c0)={r4, @in={{0x2, 0x4e20, @rand_addr=0x8}}}, 0x84) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, &(0x7f00000003c0)={'lo\x00', 0x4100}) ioctl$sock_inet_SIOCGIFNETMASK(0xffffffffffffffff, 0x891b, &(0x7f0000000100)={'nr0\x00', {0x2, 0x4e24, @loopback=0x7f000001}}) setsockopt$inet_msfilter(0xffffffffffffffff, 0x0, 0x29, &(0x7f0000000680)=ANY=[@ANYBLOB="cf0000000276d172390cc8c4ff4f3b746e5947c2ddb66a93ebb6d0f75b5f453435c311b94e126c49d47c10682b6e523d09fae1d416ebface98e08aa083e9f1f1afa118eb05655fec48d75d7a37edd032552c60ffeb53a2c8eecbe601a4ac5dceeecf1a943c2d9e2eaf4ad0a93e82a1a37a0cf2adbc4b512680428fee922ad18ff90ec6f87a75b299a953167bf4f9ae31cffd2c31dd47ba7d69151424dc1b2835f7624a302f270eb89118043dc1e1faa46e667be9cbf4456ad0c580ed032e4e49459f68f8a70f2dfe40f51362ffae"], 0x1) pread64(r0, &(0x7f0000000340)=""/181, 0xb5, 0x62) setsockopt$inet_msfilter(r0, 0x0, 0x29, &(0x7f0000000580)=ANY=[@ANYBLOB="e00000027f0000010000000001000000000000006b59aa51deb20d6efc9c04b7c9420f6434d31cbbe99b52873a8c21"], 0x1) socket$inet_udp(0x2, 0x2, 0x0) bpf$BPF_PROG_GET_NEXT_ID(0xb, &(0x7f0000000400)=0x7, 0x4) r5 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000ba4000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x2, 0x78, 0xe2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, r5, 0x0) r6 = perf_event_open(&(0x7f0000014f88)={0x1, 0x78, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00002e8000)}}, 0x0, 0x0, r5, 0x0) readv(r6, &(0x7f0000734000)=[{&(0x7f0000d42000)=""/146, 0x92}], 0x1) getsockopt$inet_sctp_SCTP_PEER_ADDR_THLDS(0xffffffffffffffff, 0x84, 0x1f, &(0x7f0000000480)={0x0, @in={{0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0xd}}}, 0xf80866d, 0x5}, &(0x7f0000000540)=0x90) getsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(0xffffffffffffff9c, 0x84, 0x18, &(0x7f0000000440)={r7, 0x400000000004}, &(0x7f00000005c0)=0xffffffffffffffc3) getsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER_VALUE(r0, 0x84, 0x7c, &(0x7f00000002c0)={r8, 0x10001, 0xc9e9}, &(0x7f0000000300)=0x8) 2018/03/30 19:43:06 executing program 7: r0 = socket$inet6_sctp(0xa, 0x40000000005, 0x84) shutdown(r0, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r0, 0x84, 0x6f, &(0x7f0000000100)={0x0, 0x1c, &(0x7f00000000c0)=[@in6={0xa, 0x0, 0x0, @loopback={0x0, 0x1}}]}, &(0x7f0000000140)=0x10) getsockopt$inet_sctp6_SCTP_GET_LOCAL_ADDRS(r0, 0x84, 0x6d, &(0x7f0000001940)={r1, 0x1c, "f2eb817d5f5dc75ce97864ff93ab72d1e31d787eb77c29be24639068"}, &(0x7f00000005c0)=0x24) [ 505.102283] EXT4-fs (loop4): VFS: Can't find ext4 filesystem [ 505.126926] BFS-fs: bfs_fill_super(): No BFS filesystem on loop4 (magic=00000000) [ 505.128943] IPVS: stopping master sync thread 5399 ... 2018/03/30 19:43:06 executing program 0: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) connect$inet6(r0, &(0x7f0000000600)={0xa, 0x0, 0x0, @dev={0xfe, 0x80}, 0x2b}, 0x1c) 2018/03/30 19:43:06 executing program 4: symlinkat(&(0x7f0000002f00)='./file0\x00', 0xffffffffffffffff, &(0x7f0000002f80)='./file0\x00') syz_mount_image$msdos(&(0x7f0000002fc0)='msdos\x00', &(0x7f0000003000)='./file0\x00', 0x4, 0x1, &(0x7f0000003180)=[{&(0x7f0000003040)="eaf9610c9f7031a1f58e51e73b3f0bd5af4364c38bbe335dbd3d211ec0338ba4c795c634af757a3c684da6110f67891133a6303441b21d139e3a6582efdaeabd3d68dbcb85cd383733a98084b62807af0b7ea49d68daa4cc9fda43dbeb13c3e67c44c463a2c429ccb66c0e1a9dfd5c911d4d7b578baaad6571d4457b9c6d92122a4bd97f5f174c81081941b007062f2cab2db1466851dde671e025909a633fec433bb2512fc61c436b74df23d280019a403884dc488071", 0xb7, 0xcd7}], 0x8, &(0x7f00000031c0)={[{@errors_continue='errors=continue', 0x2c}, {@time_offset={'time_offset', 0x3d, [0x0]}, 0x2c}]}) pipe(&(0x7f0000002f40)={0xffffffffffffffff}) r1 = open(&(0x7f0000003240)='./file0\x00', 0xa0001, 0x20) linkat(r0, &(0x7f0000003200)='./file0\x00', r1, &(0x7f0000003280)='./file0\x00', 0x400) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x80000, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)}, {&(0x7f0000010d00)="0000000000000000000000000000000000000000000000000000000002ae0000ed41000000040000d15bbe5ad15bbe5ad15bbe5a00000000000005002000000000000800070000000af301000400000000000000000000000100000030000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a1950000", 0xa0, 0x8c60}, {&(0x7f0000011a00)="020000000c0001022e000000020000000c0002022e2e00000b00000014000a026c6f73742b666f756e6400000c0000001000050166696c65300000000d0000001000050266696c65310000000f0000001000050166696c6532000000100000001000050166696c6533000000110000001000050166696c65340000001200000010000802564944454f5f54531400000068031201d181d18ed0b7d0bad0b0d0bbd0bbd0b5d1800000000000000000000000000000000000000000000000000000", 0xc0, 0xc000}, {&(0x7f0000012200)="0000000000000000000000000000000000000000000000000c0000dec910dfd800000000f4030000000000000000000000000000000000000000000000000000", 0x40, 0x117e0}, {&(0x7f0000012a00)="0d0000000c0001022e000000020000000c0002022e2e00000e000000dc03050166696c6530000000000000000000000000000000000000000000000000000000", 0x40, 0x1c000}], 0x0, &(0x7f0000013000)) syz_mount_image$bfs(&(0x7f0000000040)='bfs\x00', &(0x7f00000008c0)='./file0\x00', 0x20, 0x2, &(0x7f0000000180)=[{&(0x7f00000005c0)="f37e57346e86cb5adec662d7bd6f13a3764d2ca7640f9f81ba88d0689d0989735a7bafd5558d9a6e8988f9f6038fa475e49077bc8cfc6e170c4cdbaaa1375895c9a4068559d3cecf2a0423caa696bf77a75b3ae3f32b79da059ca13d055647998987fc2033d008bd55deb08808372b9b4595fb0d79a1358cd5949d859a7d155e86db4b608eb401109f6b792f5ce4a2ead9870dee49347bc08d0d54b0e4fca4fd895947a737f4ee823d997770e5c9df50c0c9fe2c0b945c6ffd13b7151e385b631520ac34a5967c6cd0d12b3746795681600541c17d379daed41ce8e715eba582fb668e160872a2", 0xe7, 0x7}, {&(0x7f0000000780)="6154d093a5a905da96fed5f8dea36bcd9d1d011246f7caf86806bf6ac6301d2d2b448461b867bbbe7d0eebdeafa16d7219af85ff4372670039ce277546def59f1d0eed4be4386a34c7243fe3ec84ad3807136a2c3ec35d6d87a7d7bb9342622cc3a7ff529ef3d76ff57fc7a1856f50b98e518515a9e679067cfc0e8500754fa30a81cf4dc42c5a0d36647280c5b0a8506efaf9ad06594678176efe4bdbcf7ab384b597df4c5ad66b2bd240823abe04cd30785819f1c7fd4d46bb55f8bd09ca4b44618b010e363fa572ca189ec73b36ad46b6f38d65c0acc417", 0xd9, 0x5}], 0x200000, 0x0) syz_mount_image$jfs(&(0x7f0000000080)='jfs\x00', &(0x7f0000000880)='./file0\x00', 0xfffffffffffffffe, 0x3, &(0x7f0000002dc0)=[{&(0x7f0000000900)="efee47debce411554253d03f2175c060de26b9a7a197d9327971105aafdf17a061227fe7dd52d3c1c1f0318992f304f7646c3eb4e32ff0514d34d4605b4e152474aa71ac6c0ba890b1f249f213d5bc162b605fdf3c524d6f84e1a2f8461d26ef5dd50b193ffb710ee69fc431552ae4548f0c1a7e503243bb10c53c566f37e3234d8b3d418992dca946568d275e1f54895a854bab3790963108fe6ce5b1f933e81bd0aa2dfd715aca4bd81b48b28e3ee265", 0xb1, 0x1}, {&(0x7f0000001a80)="b4bc90ad72742e5693f04c7955b05460b33cd0ca9cde365dbe1671162a8c1db744cb8a04d1d747ab4d3234fd615e6ad897396c21b8bf7da2c1d524d04fadade841e5acfac529250a2c75fed4b65a7b6c8735268244189e020c526112728097958fd591d00cd16d1591db9b0414d985d7718794369eb03d89403b7df76f6d745c94d4fa986321a9915fea55a73472bc39620fcf22ec74d02b77fafe6ccf72605eb0ba7ae69fa10a36d281e65a178528bc654ce5b6109d5294e400b18be755a3b899489b27a876ac3ea033ed525b28c7dff537b5210cbff466dc339e1f58db1679816589e886264ef1bcf6d0e1408d93946827711972", 0xf5, 0x7}, {&(0x7f0000002cc0)="c9bc1928c9ffffe99fdae39f5013810a038f1d558affc92341c81ee308195dabd95fcfedcfccd4cf2af62477e5ed935114b73940dba239c47d5824a3332fb48cea682934a6840ea5db2529c3a7c371bbf08f08bb15458de586609be64b699f29b7384dc7b2ba78f0e343fb9851eaf5a7b4106fc5b7a8aaf6e069012286fa7259807928cbee722222f45e6c98cefa00829bcdd92bd03273c7b0f20453c72150adf49c311248d3d3d96ad17187d60add3d1d8fbfbc5e572ceba134e5c533a5f75630a35514ee998b85a755085c04513dcc0047461d78f4aa8fdf0309fc39e3e4a1c24b4538acbf2366feaf", 0xea, 0x4}], 0x10000, &(0x7f0000002ec0)={[{@resize='resize', 0x2c}, {@noquota='noquota', 0x2c}, {@umask={'umask', 0x3d, [0x0]}, 0x2c}]}) [ 505.177640] jfs: Unrecognized mount option "umask=" or missing value [ 505.204232] IPVS: stopping master sync thread 6572 ... [ 505.210139] IPVS: sync thread started: state = MASTER, mcast_ifn = gre0, syncid = 0, id = 0 2018/03/30 19:43:06 executing program 7: seccomp(0x1, 0x0, &(0x7f00008c1ff0)={0x1, &(0x7f0000000000)=[{0x6}]}) accept4$inet6(0xffffffffffffff9c, &(0x7f00000000c0)={0x0, 0x0, 0x0, @ipv4}, &(0x7f0000000100)=0x1c, 0x0) listen(0xffffffffffffffff, 0xf4) futex(&(0x7f0000000040)=0x4, 0x0, 0x4, &(0x7f0000000000)={0x77359400}, &(0x7f0000000080), 0x0) futex(&(0x7f000000cffc), 0x800000000005, 0x0, &(0x7f000000b000), &(0x7f0000000040), 0x0) 2018/03/30 19:43:06 executing program 6: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_mreqn(r0, 0x0, 0x27, &(0x7f0000000000)={@multicast2=0xe0000002, @loopback=0x7f000001}, 0xc) getsockopt$inet_sctp6_SCTP_FRAGMENT_INTERLEAVE(0xffffffffffffffff, 0x84, 0x12, &(0x7f0000000080), &(0x7f00000000c0)=0x4) ioctl$sock_inet_SIOCGIFDSTADDR(0xffffffffffffffff, 0x8917, &(0x7f0000000040)={'bcsh0\x00', {0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x1a}}}) setsockopt$inet_sctp6_SCTP_MAX_BURST(0xffffffffffffffff, 0x84, 0x14, &(0x7f0000000380)=@int=0x3, 0x4) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000140)={'bcsh0\x00', 0x0}) ioctl$sock_inet6_SIOCDELRT(0xffffffffffffffff, 0x890c, &(0x7f0000000180)={@dev={0xfe, 0x80, [], 0x13}, @loopback={0x0, 0x1}, @mcast2={0xff, 0x2, [], 0x1}, 0x6, 0x0, 0x42e, 0x100, 0x9, 0x80000000, r1}) r2 = socket$inet(0x2, 0xa, 0x5) setsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX(r2, 0x84, 0x6e, &(0x7f0000000600)=[@in={0x2, 0x4e21, @multicast1=0xe0000001}, @in6={0xa, 0x4e20, 0x0, @remote={0xfe, 0x80, [], 0xbb}}, @in={0x2, 0x4e22, @multicast2=0xe0000002}, @in6={0xa, 0x4e21, 0x1ff, @local={0xfe, 0x80, [], 0xaa}, 0x84}, @in6={0xa, 0x4e20, 0x4, @local={0xfe, 0x80, [], 0xaa}}], 0x74) getsockopt$inet_sctp6_SCTP_PR_SUPPORTED(0xffffffffffffffff, 0x84, 0x71, &(0x7f0000000200)={0x0, 0x8}, &(0x7f0000000240)=0x8) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(0xffffffffffffffff, 0x84, 0x6f, &(0x7f0000000300)={r3, 0x70, &(0x7f0000000280)=[@in={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x12}}, @in={0x2, 0x4e24, @loopback=0x7f000001}, @in={0x2, 0x0, @remote={0xac, 0x14, 0x14, 0xbb}}, @in={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x1a}}, @in={0x2, 0x4e24, @remote={0xac, 0x14, 0x14, 0xbb}}, @in={0x2, 0x4e24, @rand_addr=0x3ff}, @in={0x2, 0x4e24, @multicast2=0xe0000002}]}, &(0x7f0000000340)=0x10) setsockopt$inet_sctp6_SCTP_SET_PEER_PRIMARY_ADDR(0xffffffffffffffff, 0x84, 0x5, &(0x7f00000004c0)={r4, @in={{0x2, 0x4e20, @rand_addr=0x8}}}, 0x84) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, &(0x7f00000003c0)={'lo\x00', 0x4100}) ioctl$sock_inet_SIOCGIFNETMASK(0xffffffffffffffff, 0x891b, &(0x7f0000000100)={'nr0\x00', {0x2, 0x4e24, @loopback=0x7f000001}}) setsockopt$inet_msfilter(0xffffffffffffffff, 0x0, 0x29, &(0x7f0000000680)=ANY=[], 0x0) pread64(r0, &(0x7f0000000340)=""/181, 0xb5, 0x62) setsockopt$inet_msfilter(r0, 0x0, 0x29, &(0x7f0000000580)=ANY=[@ANYBLOB="e00000027f0000010000000001000000000000006b59aa51deb20d6efc9c04b7c9420f6434d31cbbe99b52873a8c21"], 0x1) socket$inet_udp(0x2, 0x2, 0x0) bpf$BPF_PROG_GET_NEXT_ID(0xb, &(0x7f0000000400)=0x7, 0x4) r5 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000ba4000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x2, 0x78, 0xe2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, r5, 0x0) r6 = perf_event_open(&(0x7f0000014f88)={0x1, 0x78, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00002e8000)}}, 0x0, 0x0, r5, 0x0) readv(r6, &(0x7f0000734000)=[{&(0x7f0000d42000)=""/146, 0x92}], 0x1) getsockopt$inet_sctp_SCTP_PEER_ADDR_THLDS(0xffffffffffffffff, 0x84, 0x1f, &(0x7f0000000480)={0x0, @in={{0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0xd}}}, 0xf80866d, 0x5}, &(0x7f0000000540)=0x90) getsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(0xffffffffffffff9c, 0x84, 0x18, &(0x7f0000000440)={r7, 0x400000000004}, &(0x7f00000005c0)=0xffffffffffffffc3) getsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER_VALUE(r0, 0x84, 0x7c, &(0x7f00000002c0)={r8, 0x10001, 0xc9e9}, &(0x7f0000000300)=0x8) 2018/03/30 19:43:06 executing program 3: syz_emit_ethernet(0x1, &(0x7f0000000280)=ANY=[@ANYBLOB="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"], &(0x7f0000aed000)={0x0, 0x0, [0x1000000000003]}) 2018/03/30 19:43:06 executing program 0: syz_mount_image$bfs(&(0x7f0000000080)='bfs\x00', &(0x7f0000000180)='./file0/bus\x00', 0x8000, 0x1, &(0x7f0000001640)=[{&(0x7f00000001c0)="aba10fc5e9bbbd1493", 0x9, 0x3ff}], 0x808, 0x0) mkdir(&(0x7f0000000600)='./file0\x00', 0x0) syz_mount_image$ntfs(&(0x7f0000001700)='ntfs\x00', &(0x7f00000017c0)='./file0\x00', 0xfffffffffffffffb, 0x1, &(0x7f0000001c80)=[{&(0x7f0000001b40)="2e112df23aa2b7b0e482d8b7161141e139b0cbae951779a22bf869474c3b8a076fdc0d2b2ac793710f453c6eddbc255ceaf0afcce7f1058dc6f7bf2ec1d00466712fe4e4a46a100088a35f21ba212dddfbda105c401ef0494a306979", 0x5c, 0x7}], 0x1, &(0x7f0000001d00)={[{@gid={'gid', 0x3d, [0x7d, 0x3e, 0x0, 0x36]}, 0x2c}, {@gid={'gid', 0x3d, [0x37, 0x3d, 0x7a, 0x33]}, 0x2c}]}) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000100)='./file0\x00', &(0x7f0000000140)='sysfs\x00', 0x0, &(0x7f0000000400)) syz_mount_image$btrfs(&(0x7f0000001780)='btrfs\x00', &(0x7f0000001740)='./file0/bus\x00', 0x1f, 0x0, &(0x7f0000001780), 0x0, &(0x7f0000001b00)) r0 = open(&(0x7f0000001880)='./file0\x00', 0x0, 0x4) r1 = open(&(0x7f0000001900)='./file2\x00', 0x0, 0x0) symlinkat(&(0x7f0000001840)='./file1\x00', r0, &(0x7f00000018c0)='./file0\x00') pipe(&(0x7f0000001d40)) fcntl$setsig(r1, 0xa, 0x39) mount(&(0x7f0000000040)='./file0/bus\x00', &(0x7f00000000c0)='./file0/bus\x00', &(0x7f0000000340)='sysfs\x00', 0x0, &(0x7f00000004c0)) syz_mount_image$btrfs(&(0x7f0000001940)='btrfs\x00', &(0x7f0000001980)='./file0\x00', 0x0, 0x1, &(0x7f0000001a40)=[{&(0x7f00000019c0)="22b84fa60022c20fb68148659277f1f50eb65629e2f4021e504109259062330d2a4f740eec7b891b95e4f63504c352a423f58558a8f3594db6d2cd4738f0deaa3a", 0x41, 0x3}], 0x202000, &(0x7f0000001a80)={[{@noinode_cache='noinode_cache', 0x2c}, {@noflushoncommit='noflushoncommit', 0x2c}, {@nossd='nossd', 0x2c}, {@noenospc_debug='noenospc_debug', 0x2c}]}) [ 505.311899] FAT-fs (loop4): Unrecognized mount option "time_offset=" or missing value 2018/03/30 19:43:06 executing program 3: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f0000deb000)={0x2, 0x4e23, @broadcast=0xffffffff}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f00006dc000)=[{0x6, 0x0, 0x0, 0xa1}]}, 0x10) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000f59000), 0x4) sendto$inet(r0, &(0x7f0000fd0000), 0x0, 0x200007ff, &(0x7f0000deaff0)={0x2, 0x4e23, @loopback=0x7f000001}, 0x10) sendto$inet(r0, &(0x7f0000000140)="acbb915d6846975d5d248d4c727115f29ae03c05a1540f53036c3cc3396fab70b8f72443207b3bc9d2b76a2124327a8dc22115702dfd81d9c5daf3734095c968bb4c931a63cd94bbfe810cf243bdd2976b73d5c0d300e011c378c17bde5460ef55a7bcfe93f760a0a1928b8c0954a22b092351d191d71a236ce3666aa7ed8790364a", 0x82, 0xc0, 0x0, 0x0) sendto$inet(r0, &(0x7f00006fd000)="c3401c344654f3c7d9b41ba48c8e399aa4eedc3d6bd8ebd65c856a27d61154adc2b2a9763ae0201c0d32e11f38e9dd18c58f6bd779650fc30f93653bdaecf323c9f6502ceab47e58114347b289546465a5eb278de12b1989f64cc99412e36880d20c34d91051b22f6c8acc9d082b7bcdec844f667da0867d08d4154004997e317b79", 0x82, 0x81, &(0x7f0000e66000)={0x2, 0x0, @rand_addr}, 0x10) sendto$inet(r0, &(0x7f000099e000)="850ef00109525e0e36334d055dffd02147c4f48d137fb0ae6dad4bfd54365b7b836407594893a400508bc774af07bfed17643ca96d2436ebcb30407e8e72569639195e57a488c59c933ba1657667611e1c87f98c2971a2877f608da84e915d2b4810660ee7ec5ab58effbaaafa429a08b6dd2c27c9ce", 0x76, 0x0, &(0x7f0000449ff0)={0x2, 0x0, @multicast2=0xe0000002}, 0x10) sendmmsg(r0, &(0x7f0000006b80)=[{{0x0, 0x0, &(0x7f0000006a80)=[{&(0x7f0000005a80)="13", 0x1}], 0x1, &(0x7f0000006b00)}}], 0x1, 0x0) [ 505.354681] audit: type=1326 audit(1522438986.377:15): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=6583 comm="syz-executor7" exe="/root/syz-executor7" sig=31 arch=c000003e syscall=202 compat=0 ip=0x454e79 code=0x0 [ 505.415674] EXT4-fs (loop4): VFS: Can't find ext4 filesystem 2018/03/30 19:43:06 executing program 6: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_mreqn(r0, 0x0, 0x27, &(0x7f0000000000)={@multicast2=0xe0000002, @loopback=0x7f000001}, 0xc) getsockopt$inet_sctp6_SCTP_FRAGMENT_INTERLEAVE(0xffffffffffffffff, 0x84, 0x12, &(0x7f0000000080), &(0x7f00000000c0)=0x4) ioctl$sock_inet_SIOCGIFDSTADDR(0xffffffffffffffff, 0x8917, &(0x7f0000000040)={'bcsh0\x00', {0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x1a}}}) setsockopt$inet_sctp6_SCTP_MAX_BURST(0xffffffffffffffff, 0x84, 0x14, &(0x7f0000000380)=@int=0x3, 0x4) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000140)={'bcsh0\x00', 0x0}) ioctl$sock_inet6_SIOCDELRT(0xffffffffffffffff, 0x890c, &(0x7f0000000180)={@dev={0xfe, 0x80, [], 0x13}, @loopback={0x0, 0x1}, @mcast2={0xff, 0x2, [], 0x1}, 0x6, 0x0, 0x42e, 0x100, 0x9, 0x80000000, r1}) r2 = socket$inet(0x2, 0xa, 0x5) setsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX(r2, 0x84, 0x6e, &(0x7f0000000600)=[@in={0x2, 0x4e21, @multicast1=0xe0000001}, @in6={0xa, 0x4e20, 0x0, @remote={0xfe, 0x80, [], 0xbb}}, @in={0x2, 0x4e22, @multicast2=0xe0000002}, @in6={0xa, 0x4e21, 0x1ff, @local={0xfe, 0x80, [], 0xaa}, 0x84}, @in6={0xa, 0x4e20, 0x4, @local={0xfe, 0x80, [], 0xaa}}], 0x74) getsockopt$inet_sctp6_SCTP_PR_SUPPORTED(0xffffffffffffffff, 0x84, 0x71, &(0x7f0000000200)={0x0, 0x8}, &(0x7f0000000240)=0x8) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(0xffffffffffffffff, 0x84, 0x6f, &(0x7f0000000300)={r3, 0x70, &(0x7f0000000280)=[@in={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x12}}, @in={0x2, 0x4e24, @loopback=0x7f000001}, @in={0x2, 0x0, @remote={0xac, 0x14, 0x14, 0xbb}}, @in={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x1a}}, @in={0x2, 0x4e24, @remote={0xac, 0x14, 0x14, 0xbb}}, @in={0x2, 0x4e24, @rand_addr=0x3ff}, @in={0x2, 0x4e24, @multicast2=0xe0000002}]}, &(0x7f0000000340)=0x10) setsockopt$inet_sctp6_SCTP_SET_PEER_PRIMARY_ADDR(0xffffffffffffffff, 0x84, 0x5, &(0x7f00000004c0)={r4, @in={{0x2, 0x4e20, @rand_addr=0x8}}}, 0x84) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, &(0x7f00000003c0)={'lo\x00', 0x4100}) ioctl$sock_inet_SIOCGIFNETMASK(0xffffffffffffffff, 0x891b, &(0x7f0000000100)={'nr0\x00', {0x2, 0x4e24, @loopback=0x7f000001}}) setsockopt$inet_msfilter(0xffffffffffffffff, 0x0, 0x29, &(0x7f0000000680)=ANY=[], 0x0) pread64(r0, &(0x7f0000000340)=""/181, 0xb5, 0x62) setsockopt$inet_msfilter(r0, 0x0, 0x29, &(0x7f0000000580)=ANY=[@ANYBLOB="e00000027f0000010000000001000000000000006b59aa51deb20d6efc9c04b7c9420f6434d31cbbe99b52873a8c21"], 0x1) socket$inet_udp(0x2, 0x2, 0x0) bpf$BPF_PROG_GET_NEXT_ID(0xb, &(0x7f0000000400)=0x7, 0x4) r5 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000ba4000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x2, 0x78, 0xe2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, r5, 0x0) r6 = perf_event_open(&(0x7f0000014f88)={0x1, 0x78, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00002e8000)}}, 0x0, 0x0, r5, 0x0) readv(r6, &(0x7f0000734000)=[{&(0x7f0000d42000)=""/146, 0x92}], 0x1) getsockopt$inet_sctp_SCTP_PEER_ADDR_THLDS(0xffffffffffffffff, 0x84, 0x1f, &(0x7f0000000480)={0x0, @in={{0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0xd}}}, 0xf80866d, 0x5}, &(0x7f0000000540)=0x90) getsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(0xffffffffffffff9c, 0x84, 0x18, &(0x7f0000000440)={r7, 0x400000000004}, &(0x7f00000005c0)=0xffffffffffffffc3) getsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER_VALUE(r0, 0x84, 0x7c, &(0x7f00000002c0)={r8, 0x10001, 0xc9e9}, &(0x7f0000000300)=0x8) [ 505.465075] BFS-fs: bfs_fill_super(): No BFS filesystem on loop4 (magic=00000000) [ 505.521368] jfs: Unrecognized mount option "umask=" or missing value [ 505.859478] kernel msg: ebtables bug: please report to author: EBT_ENTRY_OR_ENTRIES shouldn't be set in distinguisher [ 506.247868] audit: type=1326 audit(1522438987.270:16): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=6583 comm="syz-executor7" exe="/root/syz-executor7" sig=31 arch=c000003e syscall=202 compat=0 ip=0x454e79 code=0x0 2018/03/30 19:43:07 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x13, &(0x7f0000000000)=0x1, 0x4) connect$inet6(r0, &(0x7f0000000080)={0xa}, 0x1c) 2018/03/30 19:43:07 executing program 4: symlinkat(&(0x7f0000002f00)='./file0\x00', 0xffffffffffffffff, &(0x7f0000002f80)='./file0\x00') syz_mount_image$msdos(&(0x7f0000002fc0)='msdos\x00', &(0x7f0000003000)='./file0\x00', 0x4, 0x1, &(0x7f0000003180)=[{&(0x7f0000003040)="eaf9610c9f7031a1f58e51e73b3f0bd5af4364c38bbe335dbd3d211ec0338ba4c795c634af757a3c684da6110f67891133a6303441b21d139e3a6582efdaeabd3d68dbcb85cd383733a98084b62807af0b7ea49d68daa4cc9fda43dbeb13c3e67c44c463a2c429ccb66c0e1a9dfd5c911d4d7b578baaad6571d4457b9c6d92122a4bd97f5f174c81081941b007062f2cab2db1466851dde671e025909a633fec433bb2512fc61c436b74df23d280019a403884dc488071", 0xb7, 0xcd7}], 0x8, &(0x7f00000031c0)={[{@errors_continue='errors=continue', 0x2c}, {@time_offset={'time_offset', 0x3d, [0x0]}, 0x2c}]}) pipe(&(0x7f0000002f40)={0xffffffffffffffff}) r1 = open(&(0x7f0000003240)='./file0\x00', 0xa0001, 0x20) linkat(r0, &(0x7f0000003200)='./file0\x00', r1, &(0x7f0000003280)='./file0\x00', 0x400) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x80000, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)}, {&(0x7f0000010d00)="0000000000000000000000000000000000000000000000000000000002ae0000ed41000000040000d15bbe5ad15bbe5ad15bbe5a00000000000005002000000000000800070000000af301000400000000000000000000000100000030000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a1950000", 0xa0, 0x8c60}, {&(0x7f0000011a00)="020000000c0001022e000000020000000c0002022e2e00000b00000014000a026c6f73742b666f756e6400000c0000001000050166696c65300000000d0000001000050266696c65310000000f0000001000050166696c6532000000100000001000050166696c6533000000110000001000050166696c65340000001200000010000802564944454f5f54531400000068031201d181d18ed0b7d0bad0b0d0bbd0bbd0b5d1800000000000000000000000000000000000000000000000000000", 0xc0, 0xc000}, {&(0x7f0000012200)="0000000000000000000000000000000000000000000000000c0000dec910dfd800000000f4030000000000000000000000000000000000000000000000000000", 0x40, 0x117e0}, {&(0x7f0000012a00)="0d0000000c0001022e000000020000000c0002022e2e00000e000000dc03050166696c6530000000000000000000000000000000000000000000000000000000", 0x40, 0x1c000}], 0x0, &(0x7f0000013000)) syz_mount_image$bfs(&(0x7f0000000040)='bfs\x00', &(0x7f00000008c0)='./file0\x00', 0x20, 0x2, &(0x7f0000000180)=[{&(0x7f00000005c0)="f37e57346e86cb5adec662d7bd6f13a3764d2ca7640f9f81ba88d0689d0989735a7bafd5558d9a6e8988f9f6038fa475e49077bc8cfc6e170c4cdbaaa1375895c9a4068559d3cecf2a0423caa696bf77a75b3ae3f32b79da059ca13d055647998987fc2033d008bd55deb08808372b9b4595fb0d79a1358cd5949d859a7d155e86db4b608eb401109f6b792f5ce4a2ead9870dee49347bc08d0d54b0e4fca4fd895947a737f4ee823d997770e5c9df50c0c9fe2c0b945c6ffd13b7151e385b631520ac34a5967c6cd0d12b3746795681600541c17d379daed41ce8e715eba582fb668e160872a2", 0xe7, 0x7}, {&(0x7f0000000780)="6154d093a5a905da96fed5f8dea36bcd9d1d011246f7caf86806bf6ac6301d2d2b448461b867bbbe7d0eebdeafa16d7219af85ff4372670039ce277546def59f1d0eed4be4386a34c7243fe3ec84ad3807136a2c3ec35d6d87a7d7bb9342622cc3a7ff529ef3d76ff57fc7a1856f50b98e518515a9e679067cfc0e8500754fa30a81cf4dc42c5a0d36647280c5b0a8506efaf9ad06594678176efe4bdbcf7ab384b597df4c5ad66b2bd240823abe04cd30785819f1c7fd4d46bb55f8bd09ca4b44618b010e363fa572ca189ec73b36ad46b6f38d65c0acc417", 0xd9, 0x5}], 0x200000, 0x0) syz_mount_image$jfs(&(0x7f0000000080)='jfs\x00', &(0x7f0000000880)='./file0\x00', 0xfffffffffffffffe, 0x3, &(0x7f0000002dc0)=[{&(0x7f0000000900)="efee47debce411554253d03f2175c060de26b9a7a197d9327971105aafdf17a061227fe7dd52d3c1c1f0318992f304f7646c3eb4e32ff0514d34d4605b4e152474aa71ac6c0ba890b1f249f213d5bc162b605fdf3c524d6f84e1a2f8461d26ef5dd50b193ffb710ee69fc431552ae4548f0c1a7e503243bb10c53c566f37e3234d8b3d418992dca946568d275e1f54895a854bab3790963108fe6ce5b1f933e81bd0aa2dfd715aca4bd81b48b28e3ee265", 0xb1, 0x1}, {&(0x7f0000001a80)="b4bc90ad72742e5693f04c7955b05460b33cd0ca9cde365dbe1671162a8c1db744cb8a04d1d747ab4d3234fd615e6ad897396c21b8bf7da2c1d524d04fadade841e5acfac529250a2c75fed4b65a7b6c8735268244189e020c526112728097958fd591d00cd16d1591db9b0414d985d7718794369eb03d89403b7df76f6d745c94d4fa986321a9915fea55a73472bc39620fcf22ec74d02b77fafe6ccf72605eb0ba7ae69fa10a36d281e65a178528bc654ce5b6109d5294e400b18be755a3b899489b27a876ac3ea033ed525b28c7dff537b5210cbff466dc339e1f58db1679816589e886264ef1bcf6d0e1408d93946827711972", 0xf5, 0x7}, {&(0x7f0000002cc0)="c9bc1928c9ffffe99fdae39f5013810a038f1d558affc92341c81ee308195dabd95fcfedcfccd4cf2af62477e5ed935114b73940dba239c47d5824a3332fb48cea682934a6840ea5db2529c3a7c371bbf08f08bb15458de586609be64b699f29b7384dc7b2ba78f0e343fb9851eaf5a7b4106fc5b7a8aaf6e069012286fa7259807928cbee722222f45e6c98cefa00829bcdd92bd03273c7b0f20453c72150adf49c311248d3d3d96ad17187d60add3d1d8fbfbc5e572ceba134e5c533a5f75630a35514ee998b85a755085c04513dcc0047461d78f4aa8fdf0309fc39e3e4a1c24b4538acbf2366feaf", 0xea, 0x4}], 0x10000, &(0x7f0000002ec0)={[{@resize='resize', 0x2c}, {@noquota='noquota', 0x2c}, {@umask={'umask', 0x3d, [0x0]}, 0x2c}]}) 2018/03/30 19:43:07 executing program 6: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_mreqn(r0, 0x0, 0x27, &(0x7f0000000000)={@multicast2=0xe0000002, @loopback=0x7f000001}, 0xc) getsockopt$inet_sctp6_SCTP_FRAGMENT_INTERLEAVE(0xffffffffffffffff, 0x84, 0x12, &(0x7f0000000080), &(0x7f00000000c0)=0x4) ioctl$sock_inet_SIOCGIFDSTADDR(0xffffffffffffffff, 0x8917, &(0x7f0000000040)={'bcsh0\x00', {0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x1a}}}) setsockopt$inet_sctp6_SCTP_MAX_BURST(0xffffffffffffffff, 0x84, 0x14, &(0x7f0000000380)=@int=0x3, 0x4) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000140)={'bcsh0\x00', 0x0}) ioctl$sock_inet6_SIOCDELRT(0xffffffffffffffff, 0x890c, &(0x7f0000000180)={@dev={0xfe, 0x80, [], 0x13}, @loopback={0x0, 0x1}, @mcast2={0xff, 0x2, [], 0x1}, 0x6, 0x0, 0x42e, 0x100, 0x9, 0x80000000, r1}) r2 = socket$inet(0x2, 0xa, 0x5) setsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX(r2, 0x84, 0x6e, &(0x7f0000000600)=[@in={0x2, 0x4e21, @multicast1=0xe0000001}, @in6={0xa, 0x4e20, 0x0, @remote={0xfe, 0x80, [], 0xbb}}, @in={0x2, 0x4e22, @multicast2=0xe0000002}, @in6={0xa, 0x4e21, 0x1ff, @local={0xfe, 0x80, [], 0xaa}, 0x84}, @in6={0xa, 0x4e20, 0x4, @local={0xfe, 0x80, [], 0xaa}}], 0x74) getsockopt$inet_sctp6_SCTP_PR_SUPPORTED(0xffffffffffffffff, 0x84, 0x71, &(0x7f0000000200)={0x0, 0x8}, &(0x7f0000000240)=0x8) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(0xffffffffffffffff, 0x84, 0x6f, &(0x7f0000000300)={r3, 0x70, &(0x7f0000000280)=[@in={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x12}}, @in={0x2, 0x4e24, @loopback=0x7f000001}, @in={0x2, 0x0, @remote={0xac, 0x14, 0x14, 0xbb}}, @in={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x1a}}, @in={0x2, 0x4e24, @remote={0xac, 0x14, 0x14, 0xbb}}, @in={0x2, 0x4e24, @rand_addr=0x3ff}, @in={0x2, 0x4e24, @multicast2=0xe0000002}]}, &(0x7f0000000340)=0x10) setsockopt$inet_sctp6_SCTP_SET_PEER_PRIMARY_ADDR(0xffffffffffffffff, 0x84, 0x5, &(0x7f00000004c0)={r4, @in={{0x2, 0x4e20, @rand_addr=0x8}}}, 0x84) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, &(0x7f00000003c0)={'lo\x00', 0x4100}) ioctl$sock_inet_SIOCGIFNETMASK(0xffffffffffffffff, 0x891b, &(0x7f0000000100)={'nr0\x00', {0x2, 0x4e24, @loopback=0x7f000001}}) setsockopt$inet_msfilter(0xffffffffffffffff, 0x0, 0x29, &(0x7f0000000680)=ANY=[], 0x0) pread64(r0, &(0x7f0000000340)=""/181, 0xb5, 0x62) setsockopt$inet_msfilter(r0, 0x0, 0x29, &(0x7f0000000580)=ANY=[@ANYBLOB="e00000027f0000010000000001000000000000006b59aa51deb20d6efc9c04b7c9420f6434d31cbbe99b52873a8c21"], 0x1) socket$inet_udp(0x2, 0x2, 0x0) bpf$BPF_PROG_GET_NEXT_ID(0xb, &(0x7f0000000400)=0x7, 0x4) r5 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000ba4000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x2, 0x78, 0xe2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, r5, 0x0) r6 = perf_event_open(&(0x7f0000014f88)={0x1, 0x78, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00002e8000)}}, 0x0, 0x0, r5, 0x0) readv(r6, &(0x7f0000734000)=[{&(0x7f0000d42000)=""/146, 0x92}], 0x1) getsockopt$inet_sctp_SCTP_PEER_ADDR_THLDS(0xffffffffffffffff, 0x84, 0x1f, &(0x7f0000000480)={0x0, @in={{0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0xd}}}, 0xf80866d, 0x5}, &(0x7f0000000540)=0x90) getsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(0xffffffffffffff9c, 0x84, 0x18, &(0x7f0000000440)={r7, 0x400000000004}, &(0x7f00000005c0)=0xffffffffffffffc3) getsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER_VALUE(r0, 0x84, 0x7c, &(0x7f00000002c0)={r8, 0x10001, 0xc9e9}, &(0x7f0000000300)=0x8) 2018/03/30 19:43:07 executing program 2: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) readv(0xffffffffffffffff, &(0x7f0000001480), 0x0) readv(r0, &(0x7f0000001980)=[{&(0x7f00000018c0)=""/182, 0xb6}], 0x1) r1 = syz_open_pts(r0, 0x2) setsockopt$inet6_mtu(0xffffffffffffffff, 0x29, 0x17, &(0x7f0000000440)=0x5, 0x4) socket$inet_sctp(0x2, 0x5, 0x84) dup3(r1, r0, 0x0) write(r0, &(0x7f0000c34fff), 0xffffff0b) socket$inet(0x2, 0x0, 0x0) setsockopt$bt_l2cap_L2CAP_OPTIONS(0xffffffffffffffff, 0x6, 0x1, &(0x7f0000000380)={0xefa, 0x800, 0x0, 0x0, 0x9}, 0xc) 2018/03/30 19:43:07 executing program 5: unshare(0x40000000) perf_event_open(&(0x7f000001d000)={0x2, 0x78, 0xe2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000000)={0x6, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0xa, 0x1, 0x0) ioctl(r0, 0x8982, &(0x7f0000000000)) r1 = socket$packet(0x11, 0x0, 0x300) r2 = openat$cuse(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/cuse\x00', 0x82, 0x0) io_setup(0x43f, &(0x7f00000000c0)=0x0) io_submit(r3, 0x1, &(0x7f0000000000)=[&(0x7f0000000200)={0x0, 0x0, 0x0, 0x1, 0x0, r2, &(0x7f0000000040)="10000000020400000000000000000000", 0x10}]) r4 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000280)='/proc/sys/net/ipv4/vs/secure_tcp\x00', 0x2, 0x0) sendmsg$kcm(r4, &(0x7f0000001f00)={&(0x7f0000001b40)=@pppol2tpin6={0x18, 0x1, {0x0, r1, 0x0, 0x1, 0x0, 0x0, {0xa, 0x4e24, 0xc1, @mcast1={0xff, 0x1, [], 0x1}}}}, 0x80, &(0x7f0000001d80)=[{&(0x7f0000001bc0)="a9db123ebf124fab0f2eec9774559e3b5870fb7c6818fc89c4b8742d057480657265ae2b34fb2d4e585d22ca1bf7b0a22ce38a20a819d919947c78f8d5c9f3291905fd3ed2b8ef8a79d9453396c6b0b7eb0778dbc49b32ae91e443b64edddcf320c1589c7777eadd4e57c01b20a8ca7a831e8e2c104d0194d52fb5c35b550f", 0x7f}], 0x1, &(0x7f0000001dc0)=ANY=[], 0x0, 0x90}, 0x20000000) r5 = syz_open_dev$tun(&(0x7f00000001c0)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r5, 0x400454ca, &(0x7f0000000200)={'bridge0\x00\x00p\x00', 0x4000000000001005}) socketpair(0x1d, 0x3, 0x40, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_inet_SIOCSIFADDR(r6, 0x8916, &(0x7f0000000100)={'bridge8\x00', {0x2, 0x0, @dev={0xac, 0x14, 0x14}}}) ioctl$LOOP_SET_FD(r2, 0x4c00, r1) ioctl$SNDRV_SEQ_IOCTL_RUNNING_MODE(0xffffffffffffffff, 0xc0105303, &(0x7f00000002c0)={0x2, 0x8}) add_key$keyring(&(0x7f00000000c0)='keyring\x00', &(0x7f0000000100)={0x73, 0x79, 0x7a}, 0x0, 0x0, 0x0) clone(0x0, &(0x7f0000000040), &(0x7f0000000080), &(0x7f0000000000), &(0x7f0000000100)) ioctl$int_in(0xffffffffffffffff, 0x800000c004500a, &(0x7f0000006ff8)) wait4(0x0, 0x0, 0x4, &(0x7f0000000380)) ioctl$sock_inet_sctp_SIOCINQ(r7, 0x541b, &(0x7f0000000180)) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_PORT(0xffffffffffffffff, 0xc0a85352, &(0x7f0000001980)={{}, 'port1\x00', 0x0, 0x20010, 0x1f, 0x0, 0x3, 0x40, 0x0, 0x0, 0x4, 0x6d1}) 2018/03/30 19:43:07 executing program 1: r0 = syz_open_dev$amidi(&(0x7f0000000040)='/dev/amidi#\x00', 0x3, 0x28000) ioctl$DRM_IOCTL_RES_CTX(r0, 0xc0086426, &(0x7f0000000100)={0x2c, &(0x7f00000000c0)=[{}, {}, {}, {}, {}, {}, {}, {}]}) socket$netlink(0x10, 0x3, 0xc) writev(0xffffffffffffffff, &(0x7f00000021c0), 0x0) bind$bt_l2cap(r0, &(0x7f0000000340)={0x1f, 0x800000000000002, {0x401, 0x3, 0xb, 0x3f8}}, 0x9) socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f0000a8d000)={&(0x7f0000c78ff4)={0x10}, 0xc, &(0x7f0000df6000)={&(0x7f0000000200)=ANY=[@ANYBLOB="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"], 0x10f}, 0x1}, 0x0) r1 = socket$inet_sctp(0x2, 0x5, 0x84) sendmsg$inet_sctp(r1, &(0x7f0000001f00)={&(0x7f0000001840)=@in={0x2, 0x0, @dev={0xac, 0x14, 0x14}}, 0x10, &(0x7f0000001c40)=[{&(0x7f0000001880)='[', 0x1}], 0x1, &(0x7f0000001e40)}, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000540)=@nat={'nat\x00', 0x19, 0x3, 0x376, [0x20000140, 0x0, 0x0, 0x20000170, 0x200002d0], 0x0, &(0x7f0000000100), &(0x7f00000006c0)=ANY=[@ANYBLOB="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"]}, 0x3ee) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000002980)) getsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(0xffffffffffffffff, 0x84, 0x1f, &(0x7f0000000440)={0x0, @in={{0x2, 0x4e22, @multicast2=0xe0000002}}, 0x7bb7, 0x4}, &(0x7f0000000500)=0x90) getsockopt$inet_sctp_SCTP_RTOINFO(0xffffffffffffffff, 0x84, 0x0, &(0x7f0000002240)={0x0, 0x9, 0x417}, &(0x7f00000001c0)=0x10) r2 = socket(0x22, 0x4, 0x3) r3 = socket(0x20000001e, 0x5, 0x0) r4 = perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$packet_tx_ring(r3, 0x10f, 0x87, &(0x7f0000265000)=@req={0x3fc, 0x0, 0x1}, 0x10) getegid() setsockopt$packet_tx_ring(r2, 0x10f, 0x87, &(0x7f0000265000)=@req={0x3fc, 0x0, 0x1}, 0x10) writev(r2, &(0x7f00000000c0)=[{&(0x7f0000000000)="8a", 0x1}], 0x1) close(r2) close(r3) perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r5 = syz_open_dev$evdev(&(0x7f0000dfdfee)='/dev/input/event#\x00', 0x0, 0x2) readv(r5, &(0x7f0000019fe0)=[{&(0x7f00008ec000)=""/219, 0xdb}], 0x1) write$evdev(r5, &(0x7f000004d000)=[{{}, 0x0, 0x1}, {{0x2}}], 0x30) r6 = getpgrp(0x0) setsockopt$ax25_int(r3, 0x101, 0xd, &(0x7f0000000080)=0x7, 0x4) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x8, 0xfffffffffffffffd, 0x9, 0x7, 0x0, 0x8001, 0x0, 0x6, 0x3ff, 0x4, 0x5, 0x4, 0xbd9, 0x56, 0x8000, 0x7f, 0xff, 0xeba, 0x1f, 0x0, 0xfd, 0x3, 0x1, 0x50, 0x7, 0x9, 0x641800, 0x3ff8000000000000, 0x4, 0x0, 0x10000, 0x5, 0x7, 0x6, 0x1, 0xffffffffffffffe0, 0x0, 0x20, 0x0, @perf_bp={&(0x7f0000000040), 0x8}, 0x20, 0x401, 0x8, 0x3, 0x8, 0x7, 0x7}, r6, 0xc, r4, 0x0) syz_genetlink_get_family_id$ipvs(&(0x7f0000000040)='IPVS\x00') 2018/03/30 19:43:07 executing program 7: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$inet_opts(r0, 0x0, 0x4, &(0x7f00002b8ff6), 0x0) connect$inet(r0, &(0x7f0000000080)={0x2, 0x0, @remote={0xac, 0x14, 0x14, 0xbb}}, 0x10) r1 = memfd_create(&(0x7f00000000c0)="237d00d3fc1ee4671fbaa0a455e73e678b8e96f7fd829d4d39f1828ebf765e220913b73db94f6d495077c32cf6d22b4c4f8d", 0x0) ftruncate(r1, 0x40001) sendfile(r0, r1, &(0x7f000000a000), 0x7ffff) 2018/03/30 19:43:07 executing program 3: socketpair(0x1, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) sendmsg(r0, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000001400), 0x0, &(0x7f0000001f00)=[{0xe0, 0x0, 0x0, "c059ca6bf9e0a4bd42e77d96884858e0d2b04bc77c1988039483f4e67bd64672202a1987ec0fd0644fdad3fb46c17fa42ef566e445e8d496013a16f2bc89cefbd514fb73fcc8ee1a2316fdddc4aa8ff830de32eacb1113dd5449cef421bf101086c21a8ba07128b645b15f9332a2632cb7ab928909fa42ce588ce4afecb37b29be267be36d17fdc2f52b55a6ee624e416e33aa9abfcd67e28f00c6f7c489076ea57090df4b9005be67ceeee79fe52576a777b82dd42363479ae8a6b32a15be3383e3a8a105750d3ce54cb57844af"}, {0xf0, 0x113, 0x101, "1d709afd8c07fd12c775c8f8bc54795836614a65163d936094bfde122d17a6835670167c8ed0bf90b5792d3546c097c6fad2bb0b9474ac90a1b3d6397b12755ff5e883a5e41b4fdbbee786a1d8d8055ca124945f6f4b7ed36ade24d15ff6ee119fca04b857be19259591a72525492512e2d738d470ed17e943cac74f7c9953181bd71b7e54160b49ba378ab1948a979444d2539f41b912bed19b62dfba39aca3bb77d71bc971a4f0536bc6d21510cd7e90b2e200a649bd61548fab7723857a0c54c81e2b05b4a586062b426528472d15626db82abc6102e1bf4695"}, {0x20, 0x18e, 0x6, "0e99e8d5b92779a5682b20f9ab49a2c6"}, {0x20, 0x19c, 0x0, "795e6280a2b79eeec0d3b5224bf4bace"}, {0x58, 0x112, 0x2, "ee3ccc95790b83e10000930a3b19a2d611b60c3c6260c22fb9bd6553da57243500896eeefe08000000000000007772d3d897611d2b2576f4c5ccbee5f578e7d7f883196d20c01406"}], 0x268}, 0x0) [ 506.412622] IPVS: ftp: loaded support on port[0] = 21 [ 506.414618] FAT-fs (loop4): Unrecognized mount option "time_offset=" or missing value 2018/03/30 19:43:07 executing program 3: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$DRM_IOCTL_PRIME_HANDLE_TO_FD(0xffffffffffffffff, 0xc00c642d, &(0x7f0000000040)={0x0, 0x0, 0xffffffffffffffff}) ioctl$DRM_IOCTL_SET_VERSION(0xffffffffffffffff, 0xc0106407, &(0x7f00000000c0)={0x0, 0x0, 0x1, 0x1}) ioctl$DRM_IOCTL_RM_MAP(r1, 0x4028641b, &(0x7f00000002c0)={&(0x7f0000ffa000/0x3000)=nil, 0x7, 0x0, 0x20, &(0x7f0000ffb000/0x4000)=nil, 0x4}) pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_bt_bnep_BNEPCONNADD(r2, 0x400442c8, &(0x7f0000001600)) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000005000)={&(0x7f0000000040)={0x10}, 0xc, &(0x7f0000015ff0)={&(0x7f0000000240)={0x20, 0x2c, 0xafb, 0x0, 0x0, {0x2}, [@typed={0xc, 0x3f, @str='IPVS\x00'}]}, 0x20}, 0x1}, 0x0) setsockopt$IP_VS_SO_SET_STARTDAEMON(r0, 0x0, 0x48b, &(0x7f0000000000)={0x1, 'gre0\x00'}, 0x18) setsockopt$IP_VS_SO_SET_STOPDAEMON(r0, 0x0, 0x48c, &(0x7f0000001d00)={0x1, 'vcan0\x00'}, 0x18) socket$key(0xf, 0x3, 0x2) 2018/03/30 19:43:07 executing program 0: setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(0xffffffffffffffff, 0x84, 0x64, &(0x7f0000000180)=[@in6={0xa, 0x0, 0x0, @mcast1={0xff, 0x1, [], 0x1}}, @in6={0xa, 0x0, 0x0, @dev={0xfe, 0x80}}, @in6={0xa, 0x0, 0x0, @ipv4={[], [0xff, 0xff], @multicast2=0xe0000002}}, @in={0x2, 0x0, @loopback=0x7f000001}], 0x64) pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x0, 0xb7c, 0x5, 0x3, 0x0, r0, 0x80}, 0x2c) r3 = socket(0x0, 0x2000000000000005, 0x0) getsockopt$inet_sctp_SCTP_MAXSEG(r1, 0x84, 0xd, &(0x7f0000000080)=@assoc_id=0x0, &(0x7f00000000c0)=0x4) r5 = socket$inet6(0xa, 0x3, 0x8010000400000081) getsockname(r5, &(0x7f0000000380)=@ipx, &(0x7f0000000400)=0x80) sendmsg$rds(0xffffffffffffffff, &(0x7f0000000600)={&(0x7f0000000100)={0x2, 0x0, @multicast1=0xe0000001}, 0x10, &(0x7f0000000540), 0x0, &(0x7f00000005c0)}, 0x0) r6 = socket$nl_generic(0x10, 0x3, 0x10) setsockopt$netlink_NETLINK_TX_RING(0xffffffffffffffff, 0x10e, 0x7, &(0x7f0000000040)={0x0, 0x0, 0x7}, 0x10) socket$packet(0x11, 0x3, 0x300) setsockopt$packet_add_memb(0xffffffffffffffff, 0x107, 0x1, &(0x7f00000000c0)={0x0, 0x1, 0x6, @random="7c2e1626459d"}, 0x10) ioctl$sock_SIOCBRADDBR(r6, 0x89a0, &(0x7f0000000980)='bcsf0\x00') ioctl$sock_SIOCBRDELBR(r6, 0x89a1, &(0x7f0000000000)='bcsf0\x00') r7 = accept$packet(0xffffffffffffffff, 0x0, &(0x7f0000000040)) getsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, &(0x7f0000000080), 0x10) socket$packet(0x11, 0x3, 0x300) ioctl$sock_kcm_SIOCKCMATTACH(r3, 0x89e0, &(0x7f0000000300)={r3, r2}) setsockopt$packet_add_memb(0xffffffffffffffff, 0x107, 0x1, &(0x7f00000000c0)={0x0, 0x1, 0xac, @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff]}, 0x10) r8 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r8, &(0x7f00000001c0)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0xffffffffffffffff}, 0xc, &(0x7f00000000c0)={&(0x7f0000000140)=@newlink={0x40, 0x10, 0x1, 0x0, 0x0, {}, [@IFLA_BROADCAST={0xc, 0x2, @remote={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xbb}}, @IFLA_IFNAME={0x14, 0x3, 'lo\x00'}]}, 0x40}, 0x1, 0x0, 0x0, 0x4000804}, 0x90) setsockopt$packet_add_memb(0xffffffffffffffff, 0x107, 0x1, &(0x7f0000000080)={0x0, 0x1, 0x6}, 0x10) socket$inet_icmp_raw(0x2, 0x3, 0x1) r9 = accept(r7, &(0x7f0000000140)=@pptp={0x0, 0x0, {0x0, @rand_addr}}, &(0x7f00000001c0)=0x80) getsockopt$inet_sctp6_SCTP_PR_ASSOC_STATUS(0xffffffffffffffff, 0x84, 0x73, &(0x7f0000000200)={0x0, 0xe807, 0x20, 0xfb, 0x7}, &(0x7f0000000240)=0x18) getsockopt$inet_sctp_SCTP_DEFAULT_PRINFO(r9, 0x84, 0x72, &(0x7f0000000280)={0x0, 0x7f, 0x10}, &(0x7f00000002c0)=0xc) setsockopt$EBT_SO_SET_ENTRIES(0xffffffffffffffff, 0x0, 0x80, &(0x7f0000000440)=@broute={'broute\x00', 0x20, 0x2, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000180], 0x0, &(0x7f0000000000), &(0x7f0000000100)=ANY=[]}, 0x78) pipe(&(0x7f0000000540)) sendmmsg(r5, &(0x7f0000003f00)=[{{&(0x7f0000000080)=@in6={0xa, 0x0, 0x0, @dev={0xfe, 0x80}}, 0x80, &(0x7f0000000780)}}, {{&(0x7f0000000840)=@in6={0xa, 0x0, 0x0, @local={0xfe, 0x80, [], 0xaa}, 0xb25}, 0x80, &(0x7f0000001b80), 0x0, &(0x7f0000001c00)}}], 0x2, 0x0) setsockopt$inet_sctp_SCTP_STREAM_SCHEDULER_VALUE(r0, 0x84, 0x7c, &(0x7f0000000340)={r4, 0x10001, 0x100}, 0x8) 2018/03/30 19:43:07 executing program 7: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000ed4000)=0x78, 0x4) bind$inet(r0, &(0x7f0000deb000)={0x2, 0x4e23, @multicast1=0xe0000001}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000f40ff8)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r0, &(0x7f0000a88f88), 0x29f, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @loopback=0x7f000001}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f00003d1ffc)='bbr\x00', 0x4) socketpair$inet_icmp(0x2, 0x2, 0x1, &(0x7f0000001700)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000001f00)={{{@in6=@mcast1, @in=@broadcast}}, {{@in6=@ipv4={[], [], @loopback}}, 0x0, @in6=@loopback}}, &(0x7f0000002000)=0xe8) sendmmsg(r0, &(0x7f0000002400)=[{{&(0x7f0000000000)=@nfc={0x27, 0x1, 0x1}, 0x80, &(0x7f0000001480)=[{&(0x7f0000000380)="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", 0xf60}], 0x1, &(0x7f0000002980)=ANY=[]}, 0xf08c}, {{&(0x7f00000022c0)=@nl=@unspec, 0x80, &(0x7f00000023c0)=[{&(0x7f0000002340)="fecc0192bc721b12abf5dd3978ef97d04304556403524bd35c81b1968ddeff6defbf7efc9e2a5d924fb3733d55bf4700d19e8c7045418bbb2c1c71987db80420d2ee3e5e3d6c", 0x46}], 0x1, &(0x7f0000002600)=ANY=[]}, 0x7f}], 0x2, 0x48001) shutdown(r0, 0x1) 2018/03/30 19:43:07 executing program 6: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_mreqn(r0, 0x0, 0x27, &(0x7f0000000000)={@multicast2=0xe0000002, @loopback=0x7f000001}, 0xc) getsockopt$inet_sctp6_SCTP_FRAGMENT_INTERLEAVE(0xffffffffffffffff, 0x84, 0x12, &(0x7f0000000080), &(0x7f00000000c0)=0x4) ioctl$sock_inet_SIOCGIFDSTADDR(0xffffffffffffffff, 0x8917, &(0x7f0000000040)={'bcsh0\x00', {0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x1a}}}) setsockopt$inet_sctp6_SCTP_MAX_BURST(0xffffffffffffffff, 0x84, 0x14, &(0x7f0000000380)=@int=0x3, 0x4) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000140)={'bcsh0\x00', 0x0}) ioctl$sock_inet6_SIOCDELRT(0xffffffffffffffff, 0x890c, &(0x7f0000000180)={@dev={0xfe, 0x80, [], 0x13}, @loopback={0x0, 0x1}, @mcast2={0xff, 0x2, [], 0x1}, 0x6, 0x0, 0x42e, 0x100, 0x9, 0x80000000, r1}) r2 = socket$inet(0x2, 0xa, 0x5) setsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX(r2, 0x84, 0x6e, &(0x7f0000000600)=[@in={0x2, 0x4e21, @multicast1=0xe0000001}, @in6={0xa, 0x4e20, 0x0, @remote={0xfe, 0x80, [], 0xbb}}, @in={0x2, 0x4e22, @multicast2=0xe0000002}, @in6={0xa, 0x4e21, 0x1ff, @local={0xfe, 0x80, [], 0xaa}, 0x84}, @in6={0xa, 0x4e20, 0x4, @local={0xfe, 0x80, [], 0xaa}}], 0x74) getsockopt$inet_sctp6_SCTP_PR_SUPPORTED(0xffffffffffffffff, 0x84, 0x71, &(0x7f0000000200)={0x0, 0x8}, &(0x7f0000000240)=0x8) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(0xffffffffffffffff, 0x84, 0x6f, &(0x7f0000000300)={r3, 0x70, &(0x7f0000000280)=[@in={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x12}}, @in={0x2, 0x4e24, @loopback=0x7f000001}, @in={0x2, 0x0, @remote={0xac, 0x14, 0x14, 0xbb}}, @in={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x1a}}, @in={0x2, 0x4e24, @remote={0xac, 0x14, 0x14, 0xbb}}, @in={0x2, 0x4e24, @rand_addr=0x3ff}, @in={0x2, 0x4e24, @multicast2=0xe0000002}]}, &(0x7f0000000340)=0x10) setsockopt$inet_sctp6_SCTP_SET_PEER_PRIMARY_ADDR(0xffffffffffffffff, 0x84, 0x5, &(0x7f00000004c0)={r4, @in={{0x2, 0x4e20, @rand_addr=0x8}}}, 0x84) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, &(0x7f00000003c0)={'lo\x00', 0x4100}) ioctl$sock_inet_SIOCGIFNETMASK(0xffffffffffffffff, 0x891b, &(0x7f0000000100)={'nr0\x00', {0x2, 0x4e24, @loopback=0x7f000001}}) setsockopt$inet_msfilter(0xffffffffffffffff, 0x0, 0x29, &(0x7f0000000680)=ANY=[@ANYBLOB], 0x1) pread64(r0, &(0x7f0000000340)=""/181, 0xb5, 0x62) setsockopt$inet_msfilter(r0, 0x0, 0x29, &(0x7f0000000580)=ANY=[@ANYBLOB="e00000027f0000010000000001000000000000006b59aa51deb20d6efc9c04b7c9420f6434d31cbbe99b52873a8c21"], 0x1) socket$inet_udp(0x2, 0x2, 0x0) bpf$BPF_PROG_GET_NEXT_ID(0xb, &(0x7f0000000400)=0x7, 0x4) r5 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000ba4000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x2, 0x78, 0xe2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, r5, 0x0) r6 = perf_event_open(&(0x7f0000014f88)={0x1, 0x78, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00002e8000)}}, 0x0, 0x0, r5, 0x0) readv(r6, &(0x7f0000734000)=[{&(0x7f0000d42000)=""/146, 0x92}], 0x1) getsockopt$inet_sctp_SCTP_PEER_ADDR_THLDS(0xffffffffffffffff, 0x84, 0x1f, &(0x7f0000000480)={0x0, @in={{0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0xd}}}, 0xf80866d, 0x5}, &(0x7f0000000540)=0x90) getsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(0xffffffffffffff9c, 0x84, 0x18, &(0x7f0000000440)={r7, 0x400000000004}, &(0x7f00000005c0)=0xffffffffffffffc3) getsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER_VALUE(r0, 0x84, 0x7c, &(0x7f00000002c0)={r8, 0x10001, 0xc9e9}, &(0x7f0000000300)=0x8) [ 506.462768] EXT4-fs (loop4): VFS: Can't find ext4 filesystem [ 506.499555] BFS-fs: bfs_fill_super(): No BFS filesystem on loop4 (magic=00000000) [ 506.551739] jfs: Unrecognized mount option "umask=" or missing value [ 506.559289] IPVS: stopping master sync thread 6666 ... [ 506.565245] IPVS: sync thread started: state = MASTER, mcast_ifn = gre0, syncid = 0, id = 0 2018/03/30 19:43:07 executing program 4: symlinkat(&(0x7f0000002f00)='./file0\x00', 0xffffffffffffffff, &(0x7f0000002f80)='./file0\x00') syz_mount_image$msdos(&(0x7f0000002fc0)='msdos\x00', &(0x7f0000003000)='./file0\x00', 0x4, 0x1, &(0x7f0000003180)=[{&(0x7f0000003040)="eaf9610c9f7031a1f58e51e73b3f0bd5af4364c38bbe335dbd3d211ec0338ba4c795c634af757a3c684da6110f67891133a6303441b21d139e3a6582efdaeabd3d68dbcb85cd383733a98084b62807af0b7ea49d68daa4cc9fda43dbeb13c3e67c44c463a2c429ccb66c0e1a9dfd5c911d4d7b578baaad6571d4457b9c6d92122a4bd97f5f174c81081941b007062f2cab2db1466851dde671e025909a633fec433bb2512fc61c436b74df23d280019a403884dc488071", 0xb7, 0xcd7}], 0x8, &(0x7f00000031c0)={[{@errors_continue='errors=continue', 0x2c}, {@time_offset={'time_offset', 0x3d, [0x0]}, 0x2c}]}) pipe(&(0x7f0000002f40)={0xffffffffffffffff}) r1 = open(&(0x7f0000003240)='./file0\x00', 0xa0001, 0x20) linkat(r0, &(0x7f0000003200)='./file0\x00', r1, &(0x7f0000003280)='./file0\x00', 0x400) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x80000, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)}, {&(0x7f0000010d00)="0000000000000000000000000000000000000000000000000000000002ae0000ed41000000040000d15bbe5ad15bbe5ad15bbe5a00000000000005002000000000000800070000000af301000400000000000000000000000100000030000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a1950000", 0xa0, 0x8c60}, {&(0x7f0000011a00)="020000000c0001022e000000020000000c0002022e2e00000b00000014000a026c6f73742b666f756e6400000c0000001000050166696c65300000000d0000001000050266696c65310000000f0000001000050166696c6532000000100000001000050166696c6533000000110000001000050166696c65340000001200000010000802564944454f5f54531400000068031201d181d18ed0b7d0bad0b0d0bbd0bbd0b5d1800000000000000000000000000000000000000000000000000000", 0xc0, 0xc000}, {&(0x7f0000012200)="0000000000000000000000000000000000000000000000000c0000dec910dfd800000000f4030000000000000000000000000000000000000000000000000000", 0x40, 0x117e0}, {&(0x7f0000012a00)="0d0000000c0001022e000000020000000c0002022e2e00000e000000dc03050166696c6530000000000000000000000000000000000000000000000000000000", 0x40, 0x1c000}], 0x0, &(0x7f0000013000)) syz_mount_image$bfs(&(0x7f0000000040)='bfs\x00', &(0x7f00000008c0)='./file0\x00', 0x20, 0x2, &(0x7f0000000180)=[{&(0x7f00000005c0)="f37e57346e86cb5adec662d7bd6f13a3764d2ca7640f9f81ba88d0689d0989735a7bafd5558d9a6e8988f9f6038fa475e49077bc8cfc6e170c4cdbaaa1375895c9a4068559d3cecf2a0423caa696bf77a75b3ae3f32b79da059ca13d055647998987fc2033d008bd55deb08808372b9b4595fb0d79a1358cd5949d859a7d155e86db4b608eb401109f6b792f5ce4a2ead9870dee49347bc08d0d54b0e4fca4fd895947a737f4ee823d997770e5c9df50c0c9fe2c0b945c6ffd13b7151e385b631520ac34a5967c6cd0d12b3746795681600541c17d379daed41ce8e715eba582fb668e160872a2", 0xe7, 0x7}, {&(0x7f0000000780)="6154d093a5a905da96fed5f8dea36bcd9d1d011246f7caf86806bf6ac6301d2d2b448461b867bbbe7d0eebdeafa16d7219af85ff4372670039ce277546def59f1d0eed4be4386a34c7243fe3ec84ad3807136a2c3ec35d6d87a7d7bb9342622cc3a7ff529ef3d76ff57fc7a1856f50b98e518515a9e679067cfc0e8500754fa30a81cf4dc42c5a0d36647280c5b0a8506efaf9ad06594678176efe4bdbcf7ab384b597df4c5ad66b2bd240823abe04cd30785819f1c7fd4d46bb55f8bd09ca4b44618b010e363fa572ca189ec73b36ad46b6f38d65c0acc417", 0xd9, 0x5}], 0x200000, 0x0) syz_mount_image$jfs(&(0x7f0000000080)='jfs\x00', &(0x7f0000000880)='./file0\x00', 0xfffffffffffffffe, 0x3, &(0x7f0000002dc0)=[{&(0x7f0000000900)="efee47debce411554253d03f2175c060de26b9a7a197d9327971105aafdf17a061227fe7dd52d3c1c1f0318992f304f7646c3eb4e32ff0514d34d4605b4e152474aa71ac6c0ba890b1f249f213d5bc162b605fdf3c524d6f84e1a2f8461d26ef5dd50b193ffb710ee69fc431552ae4548f0c1a7e503243bb10c53c566f37e3234d8b3d418992dca946568d275e1f54895a854bab3790963108fe6ce5b1f933e81bd0aa2dfd715aca4bd81b48b28e3ee265", 0xb1, 0x1}, {&(0x7f0000001a80)="b4bc90ad72742e5693f04c7955b05460b33cd0ca9cde365dbe1671162a8c1db744cb8a04d1d747ab4d3234fd615e6ad897396c21b8bf7da2c1d524d04fadade841e5acfac529250a2c75fed4b65a7b6c8735268244189e020c526112728097958fd591d00cd16d1591db9b0414d985d7718794369eb03d89403b7df76f6d745c94d4fa986321a9915fea55a73472bc39620fcf22ec74d02b77fafe6ccf72605eb0ba7ae69fa10a36d281e65a178528bc654ce5b6109d5294e400b18be755a3b899489b27a876ac3ea033ed525b28c7dff537b5210cbff466dc339e1f58db1679816589e886264ef1bcf6d0e1408d93946827711972", 0xf5, 0x7}, {&(0x7f0000002cc0)="c9bc1928c9ffffe99fdae39f5013810a038f1d558affc92341c81ee308195dabd95fcfedcfccd4cf2af62477e5ed935114b73940dba239c47d5824a3332fb48cea682934a6840ea5db2529c3a7c371bbf08f08bb15458de586609be64b699f29b7384dc7b2ba78f0e343fb9851eaf5a7b4106fc5b7a8aaf6e069012286fa7259807928cbee722222f45e6c98cefa00829bcdd92bd03273c7b0f20453c72150adf49c311248d3d3d96ad17187d60add3d1d8fbfbc5e572ceba134e5c533a5f75630a35514ee998b85a755085c04513dcc0047461d78f4aa8fdf0309fc39e3e4a1c24b4538acbf2366feaf", 0xea, 0x4}], 0x10000, &(0x7f0000002ec0)={[{@resize='resize', 0x2c}, {@noquota='noquota', 0x2c}, {@umask={'umask', 0x3d, [0x0]}, 0x2c}]}) 2018/03/30 19:43:07 executing program 7: r0 = socket(0x0, 0x0, 0x0) r1 = socket(0x0, 0x2, 0x0) bind(r0, &(0x7f0000000580)=@generic={0x1e, "0103000000000500ffffffffffffffe409a979f321b30c7bc8790405c7bad62e0a43a632ed4938d36d73fb8f84b9a3ff59829a2b0afe7ce43a4b2470a0c5216669ca021f6f65dcf160e7e58f358c0002f0000158d19bcb31f131668ef151622ca5bdb9c8ead2000077aeb81c90001d6d7c980ee590c801f70dc136cb184a"}, 0xffffffffffffff3e) unshare(0x60000000) getuid() getgid() getpid() ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000740)) socket$inet(0x2, 0x4, 0x5) getgid() getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000300)={{{@in=@local, @in6=@ipv4={[], [], @loopback}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast2}, 0x0, @in=@remote}}, &(0x7f0000000200)=0x515) ioctl$sock_proto_private(r0, 0x89e7, &(0x7f0000000400)="f6c016c65a29d2b587ac1a02a23d18e10e") getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000e00), &(0x7f0000000e40)=0xc) gettid() getsockopt$inet_sctp_SCTP_PARTIAL_DELIVERY_POINT(r0, 0x84, 0x13, &(0x7f0000000140)={0x0, 0x8}, &(0x7f0000000240)=0x8) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000001400), &(0x7f0000001440)=0xc) ioctl$sock_SIOCGPGRP(r0, 0x8904, &(0x7f0000000180)) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000001480)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000014c0), &(0x7f0000001500)=0xc) r3 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_SIOCETHTOOL(r3, 0x8946, &(0x7f0000000180)={'\x00', &(0x7f0000000780)=ANY=[@ANYBLOB="4f00000007000000ff0700000000ae00054905daf7ffffff060000000004090305000000ff030000800000001f9b9960b31e32b967090311d079c0450189a830ef28ca45302426b888b975b920d6be48360daf941f725c1eaff25b9f6b8d78d0e8efdb648f78da9a7ec07f86aef52369df4dad76c3bbef9b00000077a8f08394b2f947f1d1497eebf267a373550029c1520400f7bc867b9cf1bdd06ab5dea2a39f0fed3460189f993db50a724ccbeb5affcb93d1fededb957c4c593e0aaa7df0a55f8985c2068ecf6d3b15a7684f38203d3436e7a912b4e3b27c66042abcf9477e95f16f5d"]}) ioctl$sock_inet_SIOCSARP(r3, 0x8955, &(0x7f0000000500)={{0x2, 0xfffffffffffffffe, @dev={0xac, 0x14, 0x14}}, {0x80000, @dev={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa]}}, 0x5, {0x2, 0x0, @dev={0xac, 0x14, 0x14}}, 'syz_tun\x00'}) ioctl$sock_inet_SIOCGARP(r3, 0x8954, &(0x7f0000000600)={{0x2, 0x4e23, @rand_addr=0x8000}, {0x309, @random="04d8d2a5efdf"}, 0x14, {0x2, 0x4e24, @multicast2=0xe0000002}, "627269646765300000000000000400"}) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f00000002c0)={'teql0\x00', r2}) socketpair(0x0, 0xb, 0x0, &(0x7f0000000300)) r4 = accept4$ax25(0xffffffffffffffff, &(0x7f0000000000), &(0x7f0000000480)=0xffffff16, 0x0) setsockopt$SO_VM_SOCKETS_BUFFER_MAX_SIZE(0xffffffffffffffff, 0x28, 0x2, &(0x7f00000004c0)=0x9, 0x8) getsockopt$IPT_SO_GET_INFO(r3, 0x0, 0x40, &(0x7f0000000380)={'security\x00'}, &(0x7f0000000280)=0x54) recvfrom$ax25(r4, &(0x7f0000000080)=""/133, 0x85, 0x10100, &(0x7f00000001c0)={0x3, {"ddf6d4b4097ce5"}, 0xff}, 0x10) 2018/03/30 19:43:07 executing program 6: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_mreqn(r0, 0x0, 0x27, &(0x7f0000000000)={@multicast2=0xe0000002, @loopback=0x7f000001}, 0xc) getsockopt$inet_sctp6_SCTP_FRAGMENT_INTERLEAVE(0xffffffffffffffff, 0x84, 0x12, &(0x7f0000000080), &(0x7f00000000c0)=0x4) ioctl$sock_inet_SIOCGIFDSTADDR(0xffffffffffffffff, 0x8917, &(0x7f0000000040)={'bcsh0\x00', {0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x1a}}}) setsockopt$inet_sctp6_SCTP_MAX_BURST(0xffffffffffffffff, 0x84, 0x14, &(0x7f0000000380)=@int=0x3, 0x4) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000140)={'bcsh0\x00', 0x0}) ioctl$sock_inet6_SIOCDELRT(0xffffffffffffffff, 0x890c, &(0x7f0000000180)={@dev={0xfe, 0x80, [], 0x13}, @loopback={0x0, 0x1}, @mcast2={0xff, 0x2, [], 0x1}, 0x6, 0x0, 0x42e, 0x100, 0x9, 0x80000000, r1}) r2 = socket$inet(0x2, 0xa, 0x5) setsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX(r2, 0x84, 0x6e, &(0x7f0000000600)=[@in={0x2, 0x4e21, @multicast1=0xe0000001}, @in6={0xa, 0x4e20, 0x0, @remote={0xfe, 0x80, [], 0xbb}}, @in={0x2, 0x4e22, @multicast2=0xe0000002}, @in6={0xa, 0x4e21, 0x1ff, @local={0xfe, 0x80, [], 0xaa}, 0x84}, @in6={0xa, 0x4e20, 0x4, @local={0xfe, 0x80, [], 0xaa}}], 0x74) getsockopt$inet_sctp6_SCTP_PR_SUPPORTED(0xffffffffffffffff, 0x84, 0x71, &(0x7f0000000200)={0x0, 0x8}, &(0x7f0000000240)=0x8) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(0xffffffffffffffff, 0x84, 0x6f, &(0x7f0000000300)={r3, 0x70, &(0x7f0000000280)=[@in={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x12}}, @in={0x2, 0x4e24, @loopback=0x7f000001}, @in={0x2, 0x0, @remote={0xac, 0x14, 0x14, 0xbb}}, @in={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x1a}}, @in={0x2, 0x4e24, @remote={0xac, 0x14, 0x14, 0xbb}}, @in={0x2, 0x4e24, @rand_addr=0x3ff}, @in={0x2, 0x4e24, @multicast2=0xe0000002}]}, &(0x7f0000000340)=0x10) setsockopt$inet_sctp6_SCTP_SET_PEER_PRIMARY_ADDR(0xffffffffffffffff, 0x84, 0x5, &(0x7f00000004c0)={r4, @in={{0x2, 0x4e20, @rand_addr=0x8}}}, 0x84) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, &(0x7f00000003c0)={'lo\x00', 0x4100}) ioctl$sock_inet_SIOCGIFNETMASK(0xffffffffffffffff, 0x891b, &(0x7f0000000100)={'nr0\x00', {0x2, 0x4e24, @loopback=0x7f000001}}) setsockopt$inet_msfilter(0xffffffffffffffff, 0x0, 0x29, &(0x7f0000000680)=ANY=[@ANYBLOB], 0x1) pread64(r0, &(0x7f0000000340)=""/181, 0xb5, 0x62) setsockopt$inet_msfilter(r0, 0x0, 0x29, &(0x7f0000000580)=ANY=[@ANYBLOB="e00000027f0000010000000001000000000000006b59aa51deb20d6efc9c04b7c9420f6434d31cbbe99b52873a8c21"], 0x1) socket$inet_udp(0x2, 0x2, 0x0) bpf$BPF_PROG_GET_NEXT_ID(0xb, &(0x7f0000000400)=0x7, 0x4) r5 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000ba4000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x2, 0x78, 0xe2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, r5, 0x0) r6 = perf_event_open(&(0x7f0000014f88)={0x1, 0x78, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00002e8000)}}, 0x0, 0x0, r5, 0x0) readv(r6, &(0x7f0000734000)=[{&(0x7f0000d42000)=""/146, 0x92}], 0x1) getsockopt$inet_sctp_SCTP_PEER_ADDR_THLDS(0xffffffffffffffff, 0x84, 0x1f, &(0x7f0000000480)={0x0, @in={{0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0xd}}}, 0xf80866d, 0x5}, &(0x7f0000000540)=0x90) getsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(0xffffffffffffff9c, 0x84, 0x18, &(0x7f0000000440)={r7, 0x400000000004}, &(0x7f00000005c0)=0xffffffffffffffc3) getsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER_VALUE(r0, 0x84, 0x7c, &(0x7f00000002c0)={r8, 0x10001, 0xc9e9}, &(0x7f0000000300)=0x8) 2018/03/30 19:43:07 executing program 3: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) r1 = accept$nfc_llcp(0xffffffffffffff9c, &(0x7f0000000040), &(0x7f00000000c0)=0x60) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) connect$nfc_llcp(r1, &(0x7f0000000100)={0x27, 0x0, 0x0, 0x7, 0x8, 0x7, "9cb186890d74f32c6d958b5d302f36ec7f041071c6bfea4fa1a6a88ea6e71d20967d6356045a882e1746cdc90bad9f5dbef1826599ad16b87bb1356bc29976", 0x9}, 0x60) r3 = socket$inet_sctp(0x2, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(r2, 0x84, 0x6, &(0x7f0000000180)={0x0, @in6={{0xa, 0x4e20, 0x10000, @mcast1={0xff, 0x1, [], 0x1}, 0x1}}}, &(0x7f0000000240)=0x84) getsockopt$inet_buf(r3, 0x0, 0x10, &(0x7f00000002c0)=""/121, &(0x7f0000000340)=0x79) setsockopt$inet_sctp_SCTP_PR_SUPPORTED(r3, 0x84, 0x71, &(0x7f0000000280)={r4, 0xfc}, 0x8) ioctl$sock_ifreq(r0, 0x40000089f0, &(0x7f0000000000)={"626f6e64300000000000000000f800", @ifru_names='ip6gretap0\x00'}) [ 506.641933] FAT-fs (loop4): Unrecognized mount option "time_offset=" or missing value 2018/03/30 19:43:07 executing program 5: unshare(0x40000000) perf_event_open(&(0x7f000001d000)={0x2, 0x78, 0xe2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000000)={0x6, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0xa, 0x1, 0x0) ioctl(r0, 0x8982, &(0x7f0000000000)) r1 = socket$packet(0x11, 0x0, 0x300) r2 = openat$cuse(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/cuse\x00', 0x82, 0x0) io_setup(0x43f, &(0x7f00000000c0)=0x0) io_submit(r3, 0x1, &(0x7f0000000000)=[&(0x7f0000000200)={0x0, 0x0, 0x0, 0x1, 0x0, r2, &(0x7f0000000040)="10000000020400000000000000000000", 0x10}]) r4 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000280)='/proc/sys/net/ipv4/vs/secure_tcp\x00', 0x2, 0x0) sendmsg$kcm(r4, &(0x7f0000001f00)={&(0x7f0000001b40)=@pppol2tpin6={0x18, 0x1, {0x0, r1, 0x0, 0x1, 0x0, 0x0, {0xa, 0x4e24, 0xc1, @mcast1={0xff, 0x1, [], 0x1}}}}, 0x80, &(0x7f0000001d80)=[{&(0x7f0000001bc0)="a9db123ebf124fab0f2eec9774559e3b5870fb7c6818fc89c4b8742d057480657265ae2b34fb2d4e585d22ca1bf7b0a22ce38a20a819d919947c78f8d5c9f3291905fd3ed2b8ef8a79d9453396c6b0b7eb0778dbc49b32ae91e443b64edddcf320c1589c7777eadd4e57c01b20a8ca7a831e8e2c104d0194d52fb5c35b550f", 0x7f}], 0x1, &(0x7f0000001dc0)=ANY=[], 0x0, 0x90}, 0x20000000) r5 = syz_open_dev$tun(&(0x7f00000001c0)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r5, 0x400454ca, &(0x7f0000000200)={'bridge0\x00\x00p\x00', 0x4000000000001005}) socketpair(0x1d, 0x3, 0x40, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_inet_SIOCSIFADDR(r6, 0x8916, &(0x7f0000000100)={'bridge8\x00', {0x2, 0x0, @dev={0xac, 0x14, 0x14}}}) ioctl$LOOP_SET_FD(r2, 0x4c00, r1) ioctl$SNDRV_SEQ_IOCTL_RUNNING_MODE(0xffffffffffffffff, 0xc0105303, &(0x7f00000002c0)={0x2, 0x8}) add_key$keyring(&(0x7f00000000c0)='keyring\x00', &(0x7f0000000100)={0x73, 0x79, 0x7a}, 0x0, 0x0, 0x0) clone(0x0, &(0x7f0000000040), &(0x7f0000000080), &(0x7f0000000000), &(0x7f0000000100)) ioctl$int_in(0xffffffffffffffff, 0x800000c004500a, &(0x7f0000006ff8)) wait4(0x0, 0x0, 0x4, &(0x7f0000000380)) ioctl$sock_inet_sctp_SIOCINQ(r7, 0x541b, &(0x7f0000000180)) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_PORT(0xffffffffffffffff, 0xc0a85352, &(0x7f0000001980)={{}, 'port1\x00', 0x0, 0x20010, 0x1f, 0x0, 0x3, 0x40, 0x0, 0x0, 0x4, 0x6d1}) [ 506.708693] EXT4-fs (loop4): VFS: Can't find ext4 filesystem [ 506.732392] bond0: ip6gretap0 is up - this may be due to an out of date ifenslave 2018/03/30 19:43:07 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext3\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="0004000000100000b8020000490b0000ec03000001000000000000000000000000200000002000000004000000000000015ebe5a0000ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000012f00)) 2018/03/30 19:43:07 executing program 3: unshare(0x40000000) r0 = socket$packet(0x11, 0x0, 0x300) r1 = syz_open_dev$tun(&(0x7f00000001c0)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000200)={'bridge0\x00\x00p\x00', 0x4000000000001005}) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000080)={'bridge0\x00', 0x3505}) r2 = syz_open_dev$admmidi(&(0x7f0000000040)='/dev/admmidi#\x00', 0x1, 0x8000) setsockopt$inet_sctp_SCTP_AUTO_ASCONF(r2, 0x84, 0x1e, &(0x7f0000000380)=0x1, 0x4) socketpair(0x1d, 0x3, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_inet_SIOCSIFADDR(r3, 0x8916, &(0x7f0000000100)={'bridge8\x00', {0x2, 0x0, @dev={0xac, 0x14, 0x14}}}) r5 = getgid() ioctl$TUNSETGROUP(r3, 0x400454ce, r5) syz_open_dev$urandom(&(0x7f00000000c0)='/dev/urandom\x00', 0x0, 0x0) r6 = syz_open_dev$usbmon(&(0x7f0000000340)='/dev/usbmon#\x00', 0x6, 0x0) ioctl$LOOP_SET_FD(r6, 0x4c00, r0) ioctl$TIOCGSID(r4, 0x5429, &(0x7f00000003c0)=0x0) capget(&(0x7f0000000400)={0x200f1526, r7}, &(0x7f0000000440)={0x8f0c, 0x7, 0x768b, 0x8, 0x80000001, 0x8}) ioctl$SNDRV_SEQ_IOCTL_RUNNING_MODE(r6, 0xc0105303, &(0x7f00000002c0)={0x2}) fcntl$getown(r1, 0x9) r8 = add_key$keyring(&(0x7f00000000c0)='keyring\x00', &(0x7f0000000100)={0x73, 0x79, 0x7a}, 0x0, 0x0, 0x0) unshare(0x20000000) clone(0x0, &(0x7f0000000040), &(0x7f0000000080), &(0x7f0000000000), &(0x7f0000000100)) add_key$user(&(0x7f0000688000)='user\x00', &(0x7f0000000080)={0x73, 0x79, 0x7a}, &(0x7f0000000200)="b33ab76079ebe0d14f729cd653e520d29ad7ef0000000000000044c249b544230b9387fb8bd6ed056ccf59ef70995bf2e8e0ecd3fff32853747eda22d2818d08cade2389365666bbb7a0e6b9485f2d925493f62113e33e5f853b5fa638e3fc6b7f5b07e5849d2e875b066cd6401d36616fe0f3c3002801b4627ee7597689525e8e81f750a86eb580fb4690ea52246bd3d32b1a91f944edb74b1f50ae08c5387ed8fd0598b600579f3af3f864e1c324f6928f6672", 0xb4, r8) getpid() ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_PORT(0xffffffffffffffff, 0xc0a85352, &(0x7f0000001980)={{}, 'port1\x00', 0x0, 0x20010, 0x1f, 0x0, 0x3, 0x40, 0x0, 0x0, 0x4, 0x6d1}) ioctl$SNDRV_SEQ_IOCTL_UNSUBSCRIBE_PORT(0xffffffffffffffff, 0x40505331, &(0x7f0000001900)={{}, {0xf331}, 0x0, 0x4}) [ 506.752346] BFS-fs: bfs_fill_super(): No BFS filesystem on loop4 (magic=00000000) [ 506.762477] bond0: ip6gretap0 is up - this may be due to an out of date ifenslave [ 506.793467] jfs: Unrecognized mount option "umask=" or missing value [ 507.205068] kernel msg: ebtables bug: please report to author: EBT_ENTRY_OR_ENTRIES shouldn't be set in distinguisher 2018/03/30 19:43:08 executing program 2: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) readv(0xffffffffffffffff, &(0x7f0000001480), 0x0) readv(r0, &(0x7f0000001980)=[{&(0x7f00000018c0)=""/182, 0xb6}], 0x1) r1 = syz_open_pts(r0, 0x2) setsockopt$inet6_mtu(0xffffffffffffffff, 0x29, 0x17, &(0x7f0000000440)=0x5, 0x4) socket$inet_sctp(0x2, 0x5, 0x84) dup3(r1, r0, 0x0) write(r0, &(0x7f0000c34fff), 0xffffff0b) socket$inet(0x2, 0x0, 0x0) setsockopt$bt_l2cap_L2CAP_OPTIONS(0xffffffffffffffff, 0x6, 0x1, &(0x7f0000000380)={0xefa, 0x800, 0x0, 0x0, 0x9}, 0xc) 2018/03/30 19:43:08 executing program 6: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_mreqn(r0, 0x0, 0x27, &(0x7f0000000000)={@multicast2=0xe0000002, @loopback=0x7f000001}, 0xc) getsockopt$inet_sctp6_SCTP_FRAGMENT_INTERLEAVE(0xffffffffffffffff, 0x84, 0x12, &(0x7f0000000080), &(0x7f00000000c0)=0x4) ioctl$sock_inet_SIOCGIFDSTADDR(0xffffffffffffffff, 0x8917, &(0x7f0000000040)={'bcsh0\x00', {0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x1a}}}) setsockopt$inet_sctp6_SCTP_MAX_BURST(0xffffffffffffffff, 0x84, 0x14, &(0x7f0000000380)=@int=0x3, 0x4) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000140)={'bcsh0\x00', 0x0}) ioctl$sock_inet6_SIOCDELRT(0xffffffffffffffff, 0x890c, &(0x7f0000000180)={@dev={0xfe, 0x80, [], 0x13}, @loopback={0x0, 0x1}, @mcast2={0xff, 0x2, [], 0x1}, 0x6, 0x0, 0x42e, 0x100, 0x9, 0x80000000, r1}) r2 = socket$inet(0x2, 0xa, 0x5) setsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX(r2, 0x84, 0x6e, &(0x7f0000000600)=[@in={0x2, 0x4e21, @multicast1=0xe0000001}, @in6={0xa, 0x4e20, 0x0, @remote={0xfe, 0x80, [], 0xbb}}, @in={0x2, 0x4e22, @multicast2=0xe0000002}, @in6={0xa, 0x4e21, 0x1ff, @local={0xfe, 0x80, [], 0xaa}, 0x84}, @in6={0xa, 0x4e20, 0x4, @local={0xfe, 0x80, [], 0xaa}}], 0x74) getsockopt$inet_sctp6_SCTP_PR_SUPPORTED(0xffffffffffffffff, 0x84, 0x71, &(0x7f0000000200)={0x0, 0x8}, &(0x7f0000000240)=0x8) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(0xffffffffffffffff, 0x84, 0x6f, &(0x7f0000000300)={r3, 0x70, &(0x7f0000000280)=[@in={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x12}}, @in={0x2, 0x4e24, @loopback=0x7f000001}, @in={0x2, 0x0, @remote={0xac, 0x14, 0x14, 0xbb}}, @in={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x1a}}, @in={0x2, 0x4e24, @remote={0xac, 0x14, 0x14, 0xbb}}, @in={0x2, 0x4e24, @rand_addr=0x3ff}, @in={0x2, 0x4e24, @multicast2=0xe0000002}]}, &(0x7f0000000340)=0x10) setsockopt$inet_sctp6_SCTP_SET_PEER_PRIMARY_ADDR(0xffffffffffffffff, 0x84, 0x5, &(0x7f00000004c0)={r4, @in={{0x2, 0x4e20, @rand_addr=0x8}}}, 0x84) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, &(0x7f00000003c0)={'lo\x00', 0x4100}) ioctl$sock_inet_SIOCGIFNETMASK(0xffffffffffffffff, 0x891b, &(0x7f0000000100)={'nr0\x00', {0x2, 0x4e24, @loopback=0x7f000001}}) setsockopt$inet_msfilter(0xffffffffffffffff, 0x0, 0x29, &(0x7f0000000680)=ANY=[@ANYBLOB], 0x1) pread64(r0, &(0x7f0000000340)=""/181, 0xb5, 0x62) setsockopt$inet_msfilter(r0, 0x0, 0x29, &(0x7f0000000580)=ANY=[@ANYBLOB="e00000027f0000010000000001000000000000006b59aa51deb20d6efc9c04b7c9420f6434d31cbbe99b52873a8c21"], 0x1) socket$inet_udp(0x2, 0x2, 0x0) bpf$BPF_PROG_GET_NEXT_ID(0xb, &(0x7f0000000400)=0x7, 0x4) r5 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000ba4000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x2, 0x78, 0xe2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, r5, 0x0) r6 = perf_event_open(&(0x7f0000014f88)={0x1, 0x78, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00002e8000)}}, 0x0, 0x0, r5, 0x0) readv(r6, &(0x7f0000734000)=[{&(0x7f0000d42000)=""/146, 0x92}], 0x1) getsockopt$inet_sctp_SCTP_PEER_ADDR_THLDS(0xffffffffffffffff, 0x84, 0x1f, &(0x7f0000000480)={0x0, @in={{0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0xd}}}, 0xf80866d, 0x5}, &(0x7f0000000540)=0x90) getsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(0xffffffffffffff9c, 0x84, 0x18, &(0x7f0000000440)={r7, 0x400000000004}, &(0x7f00000005c0)=0xffffffffffffffc3) getsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER_VALUE(r0, 0x84, 0x7c, &(0x7f00000002c0)={r8, 0x10001, 0xc9e9}, &(0x7f0000000300)=0x8) 2018/03/30 19:43:08 executing program 1: r0 = syz_open_dev$amidi(&(0x7f0000000040)='/dev/amidi#\x00', 0x3, 0x28000) ioctl$DRM_IOCTL_RES_CTX(r0, 0xc0086426, &(0x7f0000000100)={0x2c, &(0x7f00000000c0)=[{}, {}, {}, {}, {}, {}, {}, {}]}) socket$netlink(0x10, 0x3, 0xc) writev(0xffffffffffffffff, &(0x7f00000021c0), 0x0) bind$bt_l2cap(r0, &(0x7f0000000340)={0x1f, 0x800000000000002, {0x401, 0x3, 0xb, 0x3f8}}, 0x9) socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f0000a8d000)={&(0x7f0000c78ff4)={0x10}, 0xc, &(0x7f0000df6000)={&(0x7f0000000200)=ANY=[@ANYBLOB="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"], 0x10f}, 0x1}, 0x0) r1 = socket$inet_sctp(0x2, 0x5, 0x84) sendmsg$inet_sctp(r1, &(0x7f0000001f00)={&(0x7f0000001840)=@in={0x2, 0x0, @dev={0xac, 0x14, 0x14}}, 0x10, &(0x7f0000001c40)=[{&(0x7f0000001880)='[', 0x1}], 0x1, &(0x7f0000001e40)}, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000540)=@nat={'nat\x00', 0x19, 0x3, 0x376, [0x20000140, 0x0, 0x0, 0x20000170, 0x200002d0], 0x0, &(0x7f0000000100), &(0x7f00000006c0)=ANY=[@ANYBLOB="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"]}, 0x3ee) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000002980)) getsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(0xffffffffffffffff, 0x84, 0x1f, &(0x7f0000000440)={0x0, @in={{0x2, 0x4e22, @multicast2=0xe0000002}}, 0x7bb7, 0x4}, &(0x7f0000000500)=0x90) getsockopt$inet_sctp_SCTP_RTOINFO(0xffffffffffffffff, 0x84, 0x0, &(0x7f0000002240)={0x0, 0x9, 0x417}, &(0x7f00000001c0)=0x10) r2 = socket(0x22, 0x4, 0x3) r3 = socket(0x20000001e, 0x5, 0x0) r4 = perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$packet_tx_ring(r3, 0x10f, 0x87, &(0x7f0000265000)=@req={0x3fc, 0x0, 0x1}, 0x10) getegid() setsockopt$packet_tx_ring(r2, 0x10f, 0x87, &(0x7f0000265000)=@req={0x3fc, 0x0, 0x1}, 0x10) writev(r2, &(0x7f00000000c0)=[{&(0x7f0000000000)="8a", 0x1}], 0x1) close(r2) close(r3) perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r5 = syz_open_dev$evdev(&(0x7f0000dfdfee)='/dev/input/event#\x00', 0x0, 0x2) readv(r5, &(0x7f0000019fe0)=[{&(0x7f00008ec000)=""/219, 0xdb}], 0x1) write$evdev(r5, &(0x7f000004d000)=[{{}, 0x0, 0x1}, {{0x2}}], 0x30) r6 = getpgrp(0x0) setsockopt$ax25_int(r3, 0x101, 0xd, &(0x7f0000000080)=0x7, 0x4) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x8, 0xfffffffffffffffd, 0x9, 0x7, 0x0, 0x8001, 0x0, 0x6, 0x3ff, 0x4, 0x5, 0x4, 0xbd9, 0x56, 0x8000, 0x7f, 0xff, 0xeba, 0x1f, 0x0, 0xfd, 0x3, 0x1, 0x50, 0x7, 0x9, 0x641800, 0x3ff8000000000000, 0x4, 0x0, 0x10000, 0x5, 0x7, 0x6, 0x1, 0xffffffffffffffe0, 0x0, 0x20, 0x0, @perf_bp={&(0x7f0000000040), 0x8}, 0x20, 0x401, 0x8, 0x3, 0x8, 0x7, 0x7}, r6, 0xc, r4, 0x0) syz_genetlink_get_family_id$ipvs(&(0x7f0000000040)='IPVS\x00') 2018/03/30 19:43:08 executing program 4: syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000010000)="eb3c906d6b66732e66617400020401000200027000f80100", 0x18}], 0x112, &(0x7f0000000240)=ANY=[]) syz_mount_image$vfat(&(0x7f0000000340)='vfat\x00', &(0x7f0000000380)='./file0\x00', 0x1, 0x1, &(0x7f0000000500)=[{&(0x7f00000003c0), 0x0, 0x7}], 0x40001, &(0x7f0000000f40)=ANY=[]) r0 = open(&(0x7f0000000080)='./file0\x00', 0x4000, 0x0) syz_mount_image$xfs(&(0x7f0000000480)='xfs\x00', &(0x7f0000000600)='./file2\x00', 0xfffffffffffffc03, 0x0, &(0x7f0000000400), 0x2003c, &(0x7f0000000680)={'\x00', {[{@quota='quota', 0x2c}, {@swidth={'swidth', 0x3d, [0x32, 0x0, 0x31, 0x38]}, 0x2c}]}}) open_by_handle_at(r0, &(0x7f0000000ec0)=ANY=[@ANYBLOB="78000000070000001bbdd62904b2ba66ff01e0110658a98db676650d74797dc148e5ad1b2afffeeb249eba6120d349eb20333a0db835115d6213c7fa158a6ff59951340b1fc661afd2d7bfa4050b219572a0ac468e68dcfddd3f8f4c19dd90913122f3a1e4dde3604d0f29575a77421f07e451ceea"], 0x0) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000010000)="eb3c906d6b66732e66617400020401000200027000", 0x15}], 0x0, &(0x7f0000000240)=ANY=[]) vmsplice(0xffffffffffffffff, &(0x7f0000000640)=[{&(0x7f0000000140)}], 0x3da, 0x7) ftruncate(r0, 0xfffffffffffeffff) syz_mount_image$minix(&(0x7f0000000140)='minix\x00', &(0x7f00000001c0)='./file0/file0\x00', 0x3ff, 0x1, &(0x7f0000000a40)=[{&(0x7f0000000540)="3cd68f3af3ecaa2fd97f359de92ed4c69dfae23c7f60e5fa133e0b6e833158f5b6f498d54e82527dcb03f966dbf4d047a7a252dd21e52d48e06f0834544bdc04c9b9001748ea70", 0x47, 0x2}], 0x140000, 0x0) fsync(r0) syz_mount_image$reiserfs(&(0x7f0000000b00)='reiserfs\x00', &(0x7f0000000b40)='./file0/"ile0/file0\x00', 0x5, 0x1, &(0x7f0000001300)=[{&(0x7f0000000b80), 0x0, 0x4}], 0x64043, &(0x7f0000000e40)={[{@noattrs='noattrs', 0x2c}, {@hash_rupasov='hash=rupasov', 0x2c}]}) name_to_handle_at(0xffffffffffffffff, &(0x7f0000000340)='./file0/file0\x00', &(0x7f0000000380)=ANY=[@ANYBLOB="a1e479b9e8"], &(0x7f00000003c0), 0x0) mkdir(&(0x7f0000000080)='./file0/file0\x00', 0x0) umount2(&(0x7f0000000180)='./file0\x00', 0x0) fdatasync(0xffffffffffffffff) symlinkat(&(0x7f0000000280)='./file0\x00', 0xffffffffffffffff, &(0x7f00000002c0)='./file0/file0\x00') close(0xffffffffffffffff) open(&(0x7f00000000c0)='./file0/"ile0\x00', 0x0, 0x10) 2018/03/30 19:43:08 executing program 0: ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000000)={'bridge0\x00'}) r0 = socket(0x10, 0x803, 0x0) write(r0, &(0x7f0000df8fd9)="2600000026004701050007008980e8ff06006d20002b1f00c0e9ff094a51f10101c7033500b0", 0x26) accept4$bt_l2cap(0xffffffffffffffff, &(0x7f0000000340), &(0x7f0000000100)=0xe, 0x0) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f00000005c0)='/dev/ppp\x00', 0x0, 0x0) fstat(0xffffffffffffffff, &(0x7f0000000740)) getsockopt$inet_sctp_SCTP_PEER_ADDR_THLDS(r1, 0x84, 0x1f, &(0x7f0000000480)={0x0, @in={{0x2, 0x0, @rand_addr}}}, &(0x7f00000003c0)=0x88) getpgrp(0x0) sendmmsg$unix(0xffffffffffffffff, &(0x7f0000001600), 0x0, 0x0) 2018/03/30 19:43:08 executing program 6: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_mreqn(r0, 0x0, 0x27, &(0x7f0000000000)={@multicast2=0xe0000002, @loopback=0x7f000001}, 0xc) getsockopt$inet_sctp6_SCTP_FRAGMENT_INTERLEAVE(0xffffffffffffffff, 0x84, 0x12, &(0x7f0000000080), &(0x7f00000000c0)=0x4) ioctl$sock_inet_SIOCGIFDSTADDR(0xffffffffffffffff, 0x8917, &(0x7f0000000040)={'bcsh0\x00', {0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x1a}}}) setsockopt$inet_sctp6_SCTP_MAX_BURST(0xffffffffffffffff, 0x84, 0x14, &(0x7f0000000380)=@int=0x3, 0x4) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000140)={'bcsh0\x00', 0x0}) ioctl$sock_inet6_SIOCDELRT(0xffffffffffffffff, 0x890c, &(0x7f0000000180)={@dev={0xfe, 0x80, [], 0x13}, @loopback={0x0, 0x1}, @mcast2={0xff, 0x2, [], 0x1}, 0x6, 0x0, 0x42e, 0x100, 0x9, 0x80000000, r1}) r2 = socket$inet(0x2, 0xa, 0x5) setsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX(r2, 0x84, 0x6e, &(0x7f0000000600)=[@in={0x2, 0x4e21, @multicast1=0xe0000001}, @in6={0xa, 0x4e20, 0x0, @remote={0xfe, 0x80, [], 0xbb}}, @in={0x2, 0x4e22, @multicast2=0xe0000002}, @in6={0xa, 0x4e21, 0x1ff, @local={0xfe, 0x80, [], 0xaa}, 0x84}, @in6={0xa, 0x4e20, 0x4, @local={0xfe, 0x80, [], 0xaa}}], 0x74) getsockopt$inet_sctp6_SCTP_PR_SUPPORTED(0xffffffffffffffff, 0x84, 0x71, &(0x7f0000000200)={0x0, 0x8}, &(0x7f0000000240)=0x8) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(0xffffffffffffffff, 0x84, 0x6f, &(0x7f0000000300)={r3, 0x70, &(0x7f0000000280)=[@in={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x12}}, @in={0x2, 0x4e24, @loopback=0x7f000001}, @in={0x2, 0x0, @remote={0xac, 0x14, 0x14, 0xbb}}, @in={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x1a}}, @in={0x2, 0x4e24, @remote={0xac, 0x14, 0x14, 0xbb}}, @in={0x2, 0x4e24, @rand_addr=0x3ff}, @in={0x2, 0x4e24, @multicast2=0xe0000002}]}, &(0x7f0000000340)=0x10) setsockopt$inet_sctp6_SCTP_SET_PEER_PRIMARY_ADDR(0xffffffffffffffff, 0x84, 0x5, &(0x7f00000004c0)={r4, @in={{0x2, 0x4e20, @rand_addr=0x8}}}, 0x84) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, &(0x7f00000003c0)={'lo\x00', 0x4100}) ioctl$sock_inet_SIOCGIFNETMASK(0xffffffffffffffff, 0x891b, &(0x7f0000000100)={'nr0\x00', {0x2, 0x4e24, @loopback=0x7f000001}}) setsockopt$inet_msfilter(0xffffffffffffffff, 0x0, 0x29, &(0x7f0000000680)=ANY=[@ANYBLOB="cf0000000276d172390cc8c4ff4f3b746e5947c2ddb66a93ebb6d0f75b5f453435c311b94e126c49d47c10682b6e523d09fae1d416ebface98e08aa083e9f1f1afa118eb05655fec48d75d7a37edd032552c60ffeb53a2c8eecbe601a4ac5dceeecf1a943c2d9e"], 0x1) pread64(r0, &(0x7f0000000340)=""/181, 0xb5, 0x62) setsockopt$inet_msfilter(r0, 0x0, 0x29, &(0x7f0000000580)=ANY=[@ANYBLOB="e00000027f0000010000000001000000000000006b59aa51deb20d6efc9c04b7c9420f6434d31cbbe99b52873a8c21"], 0x1) socket$inet_udp(0x2, 0x2, 0x0) bpf$BPF_PROG_GET_NEXT_ID(0xb, &(0x7f0000000400)=0x7, 0x4) r5 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000ba4000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x2, 0x78, 0xe2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, r5, 0x0) r6 = perf_event_open(&(0x7f0000014f88)={0x1, 0x78, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00002e8000)}}, 0x0, 0x0, r5, 0x0) readv(r6, &(0x7f0000734000)=[{&(0x7f0000d42000)=""/146, 0x92}], 0x1) getsockopt$inet_sctp_SCTP_PEER_ADDR_THLDS(0xffffffffffffffff, 0x84, 0x1f, &(0x7f0000000480)={0x0, @in={{0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0xd}}}, 0xf80866d, 0x5}, &(0x7f0000000540)=0x90) getsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(0xffffffffffffff9c, 0x84, 0x18, &(0x7f0000000440)={r7, 0x400000000004}, &(0x7f00000005c0)=0xffffffffffffffc3) getsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER_VALUE(r0, 0x84, 0x7c, &(0x7f00000002c0)={r8, 0x10001, 0xc9e9}, &(0x7f0000000300)=0x8) [ 507.541892] netlink: 2 bytes leftover after parsing attributes in process `syz-executor0'. 2018/03/30 19:43:08 executing program 0: syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000010000)="eb3c906d6b66732e66617400020401000200027000f80100", 0x18}], 0x112, &(0x7f0000000240)=ANY=[]) syz_mount_image$vfat(&(0x7f0000000340)='vfat\x00', &(0x7f0000000380)='./file0\x00', 0x1, 0x1, &(0x7f0000000500)=[{&(0x7f00000003c0), 0x0, 0x7}], 0x40001, &(0x7f0000000f40)=ANY=[]) r0 = open(&(0x7f0000000080)='./file0\x00', 0x4000, 0x0) syz_mount_image$xfs(&(0x7f0000000480)='xfs\x00', &(0x7f0000000600)='./file2\x00', 0xfffffffffffffc03, 0x0, &(0x7f0000000400), 0x2003c, &(0x7f0000000680)={'\x00', {[{@quota='quota', 0x2c}, {@swidth={'swidth', 0x3d, [0x33, 0x32, 0x0, 0x31, 0x38]}, 0x2c}, {@rtdev={'rtdev', 0x3d, './file0\x00'}, 0x2c}]}}) open_by_handle_at(r0, &(0x7f0000000ec0)=ANY=[@ANYBLOB="78000000070000001bbdd62904b2ba66ff01e0110658a98db676650d74797dc148e5ad1b2afffeeb249eba6120d349eb20333a0db835115d6213c7fa158a6ff59951340b1fc661afd2d7bfa4050b219572a0ac468e68dcfddd3f8f4c19dd90913122f3a1e4dde3604d0f29575a77421f07e451ceea8ea872"], 0x0) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f0000000100)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000010000)="eb3c906d6b66732e666174", 0xb}], 0x0, &(0x7f0000000240)=ANY=[]) vmsplice(0xffffffffffffffff, &(0x7f0000000640)=[{&(0x7f0000000140)}], 0x3da, 0x7) ftruncate(r0, 0xfffffffffffeffff) syz_mount_image$minix(&(0x7f0000000140)='minix\x00', &(0x7f00000001c0)='./file0/file0\x00', 0x3ff, 0x1, &(0x7f0000000a40)=[{&(0x7f0000000540)="3cd68f3af3ecaa2fd97f359de92ed4c69dfae23c7f60e5fa133e0b6e833158f5b6f498d54e82527dcb03f966dbf4d047a7a252dd21e52d48e06f0834544bdc04c9b9001748ea70", 0x47, 0x2}], 0x140000, 0x0) fsync(r0) syz_mount_image$reiserfs(&(0x7f0000000b00)='reiserfs\x00', &(0x7f0000000b40)='./file0/"ile0/file0\x00', 0x5, 0x1, &(0x7f0000001300)=[{&(0x7f0000000b80), 0x0, 0x4}], 0x64043, &(0x7f0000000e40)={[{@noattrs='noattrs', 0x2c}, {@hash_rupasov='hash=rupasov', 0x2c}]}) name_to_handle_at(0xffffffffffffffff, &(0x7f0000000340)='./file0/file0\x00', &(0x7f0000000380)=ANY=[@ANYBLOB="a1e479b9e8"], &(0x7f00000003c0), 0x0) mkdir(&(0x7f0000000080)='./file0/file0\x00', 0x0) umount2(&(0x7f0000000180)='./file0\x00', 0x0) fdatasync(0xffffffffffffffff) symlinkat(&(0x7f0000000280)='./file0\x00', 0xffffffffffffffff, &(0x7f00000002c0)='./file0/file0\x00') close(0xffffffffffffffff) open(&(0x7f00000000c0)='./file0/"ile0\x00', 0x0, 0x10) mkdir(&(0x7f0000000300)='./file0/"ile0\x00', 0x20) 2018/03/30 19:43:08 executing program 6: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_mreqn(r0, 0x0, 0x27, &(0x7f0000000000)={@multicast2=0xe0000002, @loopback=0x7f000001}, 0xc) getsockopt$inet_sctp6_SCTP_FRAGMENT_INTERLEAVE(0xffffffffffffffff, 0x84, 0x12, &(0x7f0000000080), &(0x7f00000000c0)=0x4) ioctl$sock_inet_SIOCGIFDSTADDR(0xffffffffffffffff, 0x8917, &(0x7f0000000040)={'bcsh0\x00', {0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x1a}}}) setsockopt$inet_sctp6_SCTP_MAX_BURST(0xffffffffffffffff, 0x84, 0x14, &(0x7f0000000380)=@int=0x3, 0x4) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000140)={'bcsh0\x00', 0x0}) ioctl$sock_inet6_SIOCDELRT(0xffffffffffffffff, 0x890c, &(0x7f0000000180)={@dev={0xfe, 0x80, [], 0x13}, @loopback={0x0, 0x1}, @mcast2={0xff, 0x2, [], 0x1}, 0x6, 0x0, 0x42e, 0x100, 0x9, 0x80000000, r1}) r2 = socket$inet(0x2, 0xa, 0x5) setsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX(r2, 0x84, 0x6e, &(0x7f0000000600)=[@in={0x2, 0x4e21, @multicast1=0xe0000001}, @in6={0xa, 0x4e20, 0x0, @remote={0xfe, 0x80, [], 0xbb}}, @in={0x2, 0x4e22, @multicast2=0xe0000002}, @in6={0xa, 0x4e21, 0x1ff, @local={0xfe, 0x80, [], 0xaa}, 0x84}, @in6={0xa, 0x4e20, 0x4, @local={0xfe, 0x80, [], 0xaa}}], 0x74) getsockopt$inet_sctp6_SCTP_PR_SUPPORTED(0xffffffffffffffff, 0x84, 0x71, &(0x7f0000000200)={0x0, 0x8}, &(0x7f0000000240)=0x8) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(0xffffffffffffffff, 0x84, 0x6f, &(0x7f0000000300)={r3, 0x70, &(0x7f0000000280)=[@in={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x12}}, @in={0x2, 0x4e24, @loopback=0x7f000001}, @in={0x2, 0x0, @remote={0xac, 0x14, 0x14, 0xbb}}, @in={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x1a}}, @in={0x2, 0x4e24, @remote={0xac, 0x14, 0x14, 0xbb}}, @in={0x2, 0x4e24, @rand_addr=0x3ff}, @in={0x2, 0x4e24, @multicast2=0xe0000002}]}, &(0x7f0000000340)=0x10) setsockopt$inet_sctp6_SCTP_SET_PEER_PRIMARY_ADDR(0xffffffffffffffff, 0x84, 0x5, &(0x7f00000004c0)={r4, @in={{0x2, 0x4e20, @rand_addr=0x8}}}, 0x84) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, &(0x7f00000003c0)={'lo\x00', 0x4100}) ioctl$sock_inet_SIOCGIFNETMASK(0xffffffffffffffff, 0x891b, &(0x7f0000000100)={'nr0\x00', {0x2, 0x4e24, @loopback=0x7f000001}}) setsockopt$inet_msfilter(0xffffffffffffffff, 0x0, 0x29, &(0x7f0000000680)=ANY=[@ANYBLOB="cf0000000276d172390cc8c4ff4f3b746e5947c2ddb66a93ebb6d0f75b5f453435c311b94e126c49d47c10682b6e523d09fae1d416ebface98e08aa083e9f1f1afa118eb05655fec48d75d7a37edd032552c60ffeb53a2c8eecbe601a4ac5dceeecf1a943c2d9e"], 0x1) pread64(r0, &(0x7f0000000340)=""/181, 0xb5, 0x62) setsockopt$inet_msfilter(r0, 0x0, 0x29, &(0x7f0000000580)=ANY=[@ANYBLOB="e00000027f0000010000000001000000000000006b59aa51deb20d6efc9c04b7c9420f6434d31cbbe99b52873a8c21"], 0x1) socket$inet_udp(0x2, 0x2, 0x0) bpf$BPF_PROG_GET_NEXT_ID(0xb, &(0x7f0000000400)=0x7, 0x4) r5 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000ba4000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x2, 0x78, 0xe2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, r5, 0x0) r6 = perf_event_open(&(0x7f0000014f88)={0x1, 0x78, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00002e8000)}}, 0x0, 0x0, r5, 0x0) readv(r6, &(0x7f0000734000)=[{&(0x7f0000d42000)=""/146, 0x92}], 0x1) getsockopt$inet_sctp_SCTP_PEER_ADDR_THLDS(0xffffffffffffffff, 0x84, 0x1f, &(0x7f0000000480)={0x0, @in={{0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0xd}}}, 0xf80866d, 0x5}, &(0x7f0000000540)=0x90) getsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(0xffffffffffffff9c, 0x84, 0x18, &(0x7f0000000440)={r7, 0x400000000004}, &(0x7f00000005c0)=0xffffffffffffffc3) getsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER_VALUE(r0, 0x84, 0x7c, &(0x7f00000002c0)={r8, 0x10001, 0xc9e9}, &(0x7f0000000300)=0x8) 2018/03/30 19:43:08 executing program 4: r0 = syz_open_procfs(0x0, &(0x7f0000000400)='net/ip6_mr_cache\x00') readv(r0, &(0x7f0000000100)=[{&(0x7f00000001c0)=""/133, 0x85}, {&(0x7f0000000280)=""/202, 0xca}], 0x2) [ 507.679387] can: request_module (can-proto-0) failed. 2018/03/30 19:43:08 executing program 4: perf_event_open(&(0x7f0000cccf88)={0x2, 0x70, 0xe12, 0x0, 0x0, 0x0, 0x0, 0x2000, 0x3ff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair(0x1, 0xa, 0x10001, &(0x7f0000000480)={0xffffffffffffffff}) socketpair$inet_udp(0x2, 0x2, 0x0, &(0x7f00000004c0)={0xffffffffffffffff}) ioctl$sock_kcm_SIOCKCMCLONE(r0, 0x89e2, &(0x7f0000000500)={r1}) r2 = perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000389000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40042409, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x89e1, &(0x7f00000002c0)) r3 = gettid() perf_event_open(&(0x7f0000000080)={0x5, 0x70, 0x1, 0xffffffffffff7fff, 0x7, 0x3, 0x0, 0x7, 0x44001, 0xb, 0x9, 0x9, 0x0, 0x200, 0x8001, 0x3, 0x93, 0x8, 0x9, 0x0, 0x2, 0xfffffffffffff800, 0x1, 0x1, 0x7fffffff, 0x6, 0x4, 0x100, 0x5, 0x5, 0x8, 0x20000000000, 0xfffffffffffff001, 0x4, 0x7, 0x33, 0x9a, 0x1, 0x0, 0x3, 0x1, @perf_bp={&(0x7f0000000040), 0x1}, 0x20000, 0x19a, 0x4, 0x7, 0x1, 0x9d26, 0x1e}, r3, 0x0, r2, 0x8) [ 507.905967] can: request_module (can-proto-0) failed. [ 508.382231] kernel msg: ebtables bug: please report to author: EBT_ENTRY_OR_ENTRIES shouldn't be set in distinguisher 2018/03/30 19:43:09 executing program 7: r0 = open(&(0x7f0000000000)='./file0\x00', 0x200, 0x102) readahead(r0, 0x7, 0xfffffffffffffff7) r1 = getuid() stat(&(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) chown(&(0x7f0000000040)='./file0\x00', r1, r2) chown(&(0x7f0000000140)='./file0\x00', r1, r2) open_by_handle_at(r0, &(0x7f0000000180)={0x1008, 0x8, "109cfd78ee1450c29d821235ed0f9701bbf8562af79c47cb411a93c058ae0840bbf65652a08de4b9a96196f5318927ce49b1a132109ef49180788a84d29e5af57886e51f7f34f4499c548715115cc33596f8e71c4f8987d419719a361e5d42a014375e745eb564f8c640e2f70b7dc415681fe94ed2e55dcd65445b226736fc7fd2e4785e35b3ceed2f4f329837205c04e99f0123e3fd05f75dcad41c2a8c8aaaf683cd308eb8e7890bd7dec5f6e7fb8b30c854130955cfdc1c56e71a42ff691f3b9a224daa10bc0f8838603f2f02d77282b2408675e02e2f03bd63bcb8fd9fe933dfca4d094e1ad978e6b2428b3a9ed108087c1d6a3820e8e4055e4178f291d33a9c7491bb12934da9ef2a9b6f1d64729fd650eaa455e020e77283f3a2dba45822999d9af43e4cd8de43aecc37ab67c00e2f68436718075b07ff10862c6ce50922736d138297521800afd5994bb298278db4ad00bc1067f2e5aa1db8bd8f41d143de2506788b6812bbbef31e7b5bfecda623ef3697873dd26c0eb3a6e210ce22e470b5228b9f1daaa898c3375d5e48458097803d4d577e6a1d60af9bcb20913cc0a330f4ab1f11d4a8a375c9e6dcdffe0280d72db7ef07ad42d9f8f11ae7f2eba60030df261c41074869222e9dca08d791dd269dcc7cd83dbb85fa62a320d4d00bad664486cfe798711993b49ddaaa6e35a9a694f44d2b8776b77bb85ca8cfb172fa36d0f6fe67f114868868ec36d8d8c2849fe1eed6b9a464fb06c93424b2b703b0f3a9d8afbdef18bc70bc0a90787e73cc3038f2cae6bc84cad8b861987461849c1c12d202df7f987e68e6950f9d63cb3cd120449eb27214aa031f71e116a8c48b2d9b140dd30475f7df0ac75591fcca99091ca3c056a92d4f7e4ccd849cb9c3fc7590c47c40e6340204e52f0adf18d386a2c6c180319e23321d96d6b754c1cb66b6ff7142a01abfa576c1f78f552734a7c07f7e32f42b4543da9426287cf43561f535e21ce7cdee25d1046fdffd5a0a904e03c584e9a74ca38c8a65994adbbb0a3b5b509b6a078cee1d3283ff24bd700cd049428cc645634535bd402784a1f103d9354cdcd7375e547c729f5833007ac60d3f25c5da8348fba1cb6855561373e4d24af2aae541ddc43a35cb0c9735694437688907dec1ad7b7928b9a979ab5d3d1a3a870da45ea2370c64f3ff697c6900ba864af3eac384f6c0e1d826e3d7003fce8c32d7ec5b613e46733cd553b67e1475d1f0f52eba76f9eb81e66caeb3956833fd5bef9835ecdb1bb6f73544aae92c3fdda8ccd747e5448930521513028b419a255e1398314df9cb68486edfe1767966730fd83486c4dc5e33513960980659ae390ae645afe9396156ef25f5221724988dbc20ee54dca2cbb3153d01e1cbc0b3daa2e22e92400fdbe9e8aedfcb733c4789b2ce0587683c89e952143be561a0017c6854616fe9d90e1c991f268722c8309024548a1a115745975a9144da00aaa6345b67cd23ed6a2a3e96712ce7f099829fc6cae7a1c7d827dd559fdca2e3cf89bd3871a04fda402f16036417af5504d10e87b3941a161df0690cc2b1db779fd1b085b2e4fe4a0d5fac17b0ffa55ca021bc63ec7c505768077a97ef8d576672bd4e80aee54677e6b5f5125eea217fc6a125c841ab1dffc5947d4e6c96c946063f12df874b70c64e2b1e40ef78df3e5d61dec41085addc51193c4a5e17a36ca3147b80e2dcaa7da3e72688e2362a310f7651f9619073ff68852fda8bdfb91f8db55c09fc062357e087fbbef456d5686d87745bd38152c45da5b1a13c6fab312a3bb9cb53e9c52ddefd8178a73c708c22207faf5c7fa7b2c46d354515135be917fd13ac0c22783fe25bb57657ec4f6a4fae6bb8450e19c77af48fd8e04ce8f22cf5d33a30d2748fe50aaadd7a5d4cafb318cb4affb7049510fe6f3e880508b32e391eeb5feaf26e93908fc23fc22ba284dff77660362cfaebd9c7016dc4728a2eea1467482e5a15919dd3872e25f69c9ddb47565f6f92c1f00f6e9e8c0a485e9a0028326ca04e540b29877cb7e9ffc9018d8905ca4bd067862f034523c7781e0cea93b6b06be7ec22c455129d1596b8e2740571af9c52a36925cd923695cb93650dd14092967d4f1b1e7d641f36c9e65f6b5d28e144ec68e110da11d2f6e2160293e588f405ce4b90c6ee20801ee524989d4a9100d9ada18b124fbad94042c93b5b2b66f50c69e0141a5c5b3a382b8081a4b9339b60fe1a0b9570f37839b70f1d2a514ee7d74f29a263dc3eb8acc0253ab5a7a140b83ab119ce5cbf185fbfedb130811fac6ea0dda32c978f640f27d0e3be5e737579fb4ab42bea210619c3d648b83b5e4483249724296f382e55b50c0ccdb0de4feaf5323c6ff37363d108c6255b13b8f7af49d2f00712d2b53c5f4d30a888dcc686b66c4475364a2e93609f9bb1123ceac995ddc63347b444c9231940c94d803201c24ff39d5b45a0f57b087531f5b357f51438585e372c7d571592348bd512ecaf9543e4986de9fae87dcf25714be573510b3b93ff50ca89b1353f78e158f60ea1e12065cd104c37248b8938141e2d6eaa575189b29b31f00372523f8c558cf7680cd26643f5e83bf457b935deaeb63abeb8dea2075465494da12597928625d0399caccf540419ad63deea60f381fb8b05e619ae9a4704fb89ece10d31dfde9f5321654ad971ada3c0f83fcdf66b6a95eeb9dda56aa1410d55841384b471806d5d4b9e8bb40250851748e101df08e1b1c47ada3de74d6ed1b081bcdff1a61370fb4459d060469ad8beef8d864e94e8c6b9f549fcd437750c5a36e57e9328737216c380b78e34b578b7535203543196ae8c1754edc7248a6a979118e3bd885522e9b60548c7fdc436c6b6af935dbe41b33a04a16c6b1525d2fab27e5daf77163144b9926a9745749102cf42290b970962f58d04e4bbe0ad62cddc6efe3e85cdcac04ec0765644d2c7bc97d85f11cde72274b727f1e3a7141e05dab624930690fb272699ef7d18265c2b64a4b97d1b7a2a9e852d72bd74853893877687ab8581d538a7722bfd5520453e52283d3898d4eb0934367fa734ace6ce407ae4872a06cb9309c573155d1a7ac565a23dd5035858bd87ed0268f2bafc453c8297a9814899eb7593a999a765ce909d32ec6010528210d8e88668efabaaff8ed24ce4c10a61c104aa74e6f53e8fd0307e9eb9f26cf696aee8aa26c7630b2dc45f20b4338080a3bf54c4e13a885c735db674f7767f046bbca70c5a9ab3009613e6581c3985c869a64917a2b643b833994d2f6feb61dfc62180c5b24b893eb51b100b768bca0b254581a1400080a2ddd6529ff3f1dcc3def9a61fae83c22add4fcb633424ba97b8b79bbf5ecda2fd9bd400286f787ae10662ba994047a2d7916adc851173291c0bbfeafa820aaca9c31cc08aa6d8f32c2c893024c72f4624b79192b492c58f3cf7db9a79759070a13d877658923d65c58372abcdc77ba7681cebfc35c4fad391f56956410682a01dda2f9c7618a40c4e8004232ef09ea3eebb72ab64cb3fb0a5a37623c1f716926ba33f5cc9b74f56f81a9fa9141627039314e3b5330f3a60ca4134399dac774c7a530fc53e2895e444fa7efc3b12500c38dd2f3da71a0be67a48c58d0853f57271ef239a35ed04ff3ebeb3a31d4f18c29dee1817e158e25d78a347d90efa67c44191071e643d0d3a56227a3349c6cb6b1734f6ba0f284914c67ae3426e1c72b989e08de2282176d7f49b592407d4839f9caf1931af9f85a9be9b98cc51deb5d8a4a7d394e81d1bd51fa90fa3a5da306c7985321afe1074a2b47aed00876999f602bb8ff0a48279e704f41ecd7e2189ae757cf3ab095f22398cec1c6129e5eed7d2ccc0a479503e25721622db13b68cba34a451b748fc9a7944f6f230218410e3e141e3b0e4fca02abadad9f6cbf6a4fc61ac1d23e3f4be1aea01e012bf7131a2c8f8b6218b3767931d512f37a290667391b7d6a76fc0712fcfb98e2896e3771e9dd6101c9db86c8df753314bf6f7fe9f72ffc2707ff6f765c142682889138da893ce6db7d1d3c4d9f3268cf100d55d72f205f127d297bd8ddd16763f14834e27de74ea6ab285a74d808321f09c09cf734f9cc7e6fe61a63f409be470c7bd183cd335fd49a19a016570e01b5e7f9c68f38dc0b7df0b74e726fb652bb1e4a65bd34950d7d20ef0ed3781ae210cae0a2cc3d45286f325c83d109fbc90dd2c4bc3874a4a7c1b1b82d9043feea6b5a17088c5683da846b6ed7a5a3031011d5e1d62357e5065db5d20efc6a6ce2716f751ca349b72d49842a98cdd219674536b5b66453ae92275b62159839d5cadadda3a1999bfb3f5ece5850af88886a7713e2431844ec1544dc013ccc0afd4ddbc18348666d90f8275e8dd6912306d76f2430d8a6a42b15b8b27ce4def8061ec7c3eb11620bc7683a1c60b338e1b2860299d7722d8c602cb3050687b02885c12b251649087050eb29284bd6c219645102943927c40627337fcd30261e5fdf43f01bfe080b52beb4ddea184f77908b7b92a58e661a98595df1c1d18ae3e4875987477af117207400ae7fa5704b3b164f0902921c4b5a46134ae149c9f31acf9e198b2b0eb5f36647c2cbba12c98a0d8bbf79456492c6d3cd29063d1c3990440d5a6f88e8adbbbb06b63ecd1c3a34193ceae7f9048cdf02b63781bbc9190d13f63f374f50adcc12e952bd4d95ae56fbabed693c811eb6580586e3c24aa7d0fab62bb27cadf65289f789c495a8d10b6a105ff40291867a8bdbf6671880723ec0a6342e9e70aec1660d53f80e6e838f16073abee6f54df1973980ed82d9f50df4b5f03ba04ebb3909da93af0c2974bbc1784a895c9832d5e162a4f4af04a6375c79107214231ee4024e3b6f2ca682328651cc8144c89138499a21eb1665deba094a9ba00b65953af76bdb2b3dba68b54bfb4acf8c6d7f0e7f2aabd6da1a58536d3558c99f89414526b473310badbe0cd9069a956caedbe9534ae1dc6bc069d79bb373a94fc49d6ed241cdd044bf8befe30f1b94d5362d42c93837954d9094451629f7db9ac541c1f761e894158cd314d621d8f3e377c55263e4ab0aeaede9ad416705f461b8e7a290dc70e5cb77fdbae11c9c0d989005eb68e7bd6bd382133dfddb8fc500b5eb4da7d550210fd6528b9615dce9d502d44d538d58b61d96986959e0e4ee6070914930e5f7e94e32627d687bc9d27eb883a75e4ea694ebc83461f9ad49ddd1c305d3ce18b122cb4027bd0ecbad414acac74a09cb00b8440bae98414e25b7a2b6d458a073b692ae4f4791400be4731228f1f557aa70e1a2fdd2fe867720511884ddcfe99842f7ad9c33bcb47fd981f1539f78889671b3671a0d8d50c922989d68018aae21250a2be360f5432e59021f6a5cf6ccc4139f5b289413397a569695ec66914377b7dd1598dbba941f2c99f7e61f87e54253326e08a792a2efacf402a97b2b9a26a0552da467e73900e04b68f48fbb7fb9e2ae01f50831c84b8c24f6365bc0f21f167a880dc62c7ae8c388d98d84ee03ef570bea18e36681d54d2c4a82cee726a64aa64bcbfd9405375a117f8f36e94eb7d9ca23f6036d33842e3680750b1d9ed8133c3dbcd39e8249915c6f683d81afc47fc9a34d7ef85342ea3bc1e99c2d476dc30f16d78ab4af8c0d0cbcf0a86b923161497c935d4c47403784c1dd620bcffb497d0b27a9a466c1008cf94b6acf229e9cf20c43c38035c4e1eda5104791c6b3f5ae59e94c83ef1d5a77612ea04b24d01"}, 0x60000) fcntl$notify(r0, 0x402, 0x12) preadv(r0, &(0x7f00000012c0)=[{&(0x7f00000011c0)=""/158, 0x9e}, {&(0x7f0000001280)=""/64, 0x40}], 0x2, 0x0) syz_mount_image$xfs(&(0x7f0000001300)='xfs\x00', &(0x7f0000001340)='./file0\x00', 0x80000001, 0x1, &(0x7f0000001600)=[{&(0x7f0000001380)="36ee01c1570994d7509a2de82ce768c030c25877bf3aaacba30000663520d4d9a376d8dd4fb40d3d0515b138914f929b4641b1c52ec5672c46e4e1b5f8c5fec736c88bd2db9985ac930a40fd522dbc1b1359435694f0b0b2bbbca5731c7b5bfad953211b0f479df91c6d6865063f55c33e6ce50fad17a021ea2025ab5e566fff58faff5c9050e2", 0x87, 0xffffffff}], 0x2, &(0x7f0000001680)={'nouuid,', {[{@logdev={'logdev', 0x3d, './file0\x00'}, 0x2c}]}}) fcntl$F_GET_RW_HINT(r0, 0x40b, &(0x7f00000016c0)) syz_mount_image$reiserfs(&(0x7f0000001700)='reiserfs\x00', &(0x7f0000001740)='./file0\x00', 0x8, 0x2, &(0x7f00000019c0)=[{&(0x7f0000001780)="6f6199cf0ccadf068166e3fb15fc8056236b94dd1af92af7a6e7b389780bbcb22fe47e92fb6e3f44f20057f93df9d32120efd9aa0f91e2e4f01aa5ceda1fb4c884c76560fb74efa1b569b239c1fff2bdfcb4d5f45944d10575fbb7637407c377fe1d84780d3e87eabc9038f1398a6582a849cd64cf4a5b37bf0771710591f573aea9505d25e3147ab50312e8bed384eb096506683c623ebad2e299bac686fcc44711eecfa581e0b850f58f072d7cee2d75d6a7", 0xb3, 0x7fff}, {&(0x7f0000001940)="1aa4795cac28fe0c6c99065d0b9275afb9aca69b8429d1f957835324b5e3942f7a0512e17db95200ad2e7924be3bf3edc56282d83364fbea25f8905d6d274894e9bf8c0888918f43394c93d6263eda429f677e136672d4b0b767d12aeeaaf282df204ee9e434459919", 0x69, 0x6527}], 0x8000, &(0x7f0000001a40)={[{@usrquota='usrquota', 0x2c}, {@data_ordered='data=ordered', 0x2c}, {@jqfmt_vfsold='jqfmt=vfsold', 0x2c}]}) sync_file_range(r0, 0x5, 0x9, 0x2) syncfs(r0) mmap(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0x200000f, 0x10, r0, 0x10) fcntl$setlease(r0, 0x400, 0x2) fcntl$addseals(r0, 0x409, 0x4) syz_mount_image$btrfs(&(0x7f0000001a80)='btrfs\x00', &(0x7f0000001ac0)='./file0\x00', 0x3, 0x2, &(0x7f0000001cc0)=[{&(0x7f0000001b00)="74a55d5c514790629a2fd5481a65d72ac8af678e71c54de678f4663cf3965714b9a16382cd423682f1087b16a76f428507086704b2341620753ba2a409fc05f5f563dc", 0x43, 0x7f}, {&(0x7f0000001c40)="807732b140a3108d0de4b409ab94539bc2d30daa20311d5459fa02823c4dffa81ffd2f8949b4a953e2a07c163e45ab8799f635ba2ed8870e0ffaf12e7305e3198be179c7615c960044c0d240573d", 0x4e, 0x4}], 0x80, &(0x7f0000001d40)={[{@check_int_data='check_int_data', 0x2c}, {@compress_force_algo={'compress-force', 0x3d, 'no'}, 0x2c}, {@fragment_metadata='fragment=metadata', 0x2c}, {@subvolrootid={'subvolrootid', 0x3d, [0x7e, 0x38, 0x33, 0x37]}, 0x2c}, {@check_int_print_mask={'check_int_print_mask', 0x3d, [0x78, 0x0, 0x32, 0x36]}, 0x2c}]}) mremap(&(0x7f0000ff8000/0x4000)=nil, 0x4000, 0x1000, 0x3, &(0x7f0000ffc000/0x1000)=nil) mkdir(&(0x7f0000001dc0)='./file0\x00', 0x0) fcntl$getown(r0, 0x9) remap_file_pages(&(0x7f0000ff9000/0x3000)=nil, 0x3000, 0x4, 0x4, 0x8002) syz_mount_image$iso9660(&(0x7f0000001e00)='iso9660\x00', &(0x7f0000001e40)='./file0\x00', 0x1, 0x2, &(0x7f0000002140)=[{&(0x7f0000001e80)="92a9b1d9cc7e0bca009a8ef382b3103f6c9f5d65c3b78ac40c48bd7ef61e64c5a42993623ffc6d3176f4af6d1cd79bc26fd6f2390ceaaeb476816ef1c3d47794acf11372d885fbeff33ddfc27fb1f670e4dfe1911793f1defef72f4c71c51cecfd3c68a96da195f835a46c901dff6d7eeb037ae1512ecb8182bfa0a5c76228061eac74ed1e6d945c1a39d4", 0x8b, 0x101}, {&(0x7f0000001f80)="5bb148896327fd48c937521d43291067e02eee04f874fc92d7b995f12dd9cb21f22c9929a9e2d9144ca18c251474223e83bd9b42b8973a4d2710124723ec5cb1c78c16303cf5c41abb88fcb9fd6c83223c982b64a16f1fc20c837f6f7145fe007db83d3322f0eb43368be25d4f25a1322bcf398fda19bdf52e4e4556f2be57a7e54f3358a08166d8cee86473ce0fadd3fbcbd1171b5c9c2b36cafd1594400667d4f4d3be20bd34c0f7c146b52b424909882709e40e10113212cd9add69a0c36f2c23da6147e5872d1dccadef5babc8b8db8362a1ba8e969ad5ca8a3e4a83607007c91a0ab84db8250652", 0xea, 0x400}], 0x40, &(0x7f00000021c0)={[{@check_strict='check=strict', 0x2c}, {@mode={'mode', 0x3d, [0x35, 0x3f, 0x7d, 0x7d, 0x38, 0x78, 0x7f]}, 0x2c}, {@sbsector={'sbsector', 0x3d, [0x3f, 0x78, 0x34]}, 0x2c}, {@unhide='unhide', 0x2c}, {@nojoliet='nojoliet', 0x2c}, {@norock='norock', 0x2c}, {@nojoliet='nojoliet', 0x2c}, {@session={'session', 0x3d, [0x34, 0x36, 0x3d, 0x31]}, 0x2c}, {@gid={'gid', 0x3d, [0x2d]}, 0x2c}]}) linkat(r0, &(0x7f0000002240)='./file0\x00', r0, &(0x7f0000002280)='./file0\x00', 0x1000) pipe(&(0x7f00000022c0)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setsig(r0, 0xa, 0x4) fdatasync(r3) r4 = open(&(0x7f0000002300)='./file0\x00', 0x80000, 0x0) fcntl$F_GET_RW_HINT(r0, 0x40b, &(0x7f0000002340)) fcntl$getownex(r4, 0x10, &(0x7f0000002380)) 2018/03/30 19:43:09 executing program 2: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f00003b9fdc)) readv(r0, &(0x7f0000001980)=[{&(0x7f00000018c0)=""/182, 0xb6}], 0x1) r1 = syz_open_pts(r0, 0x2) setsockopt$inet6_mtu(0xffffffffffffffff, 0x29, 0x17, &(0x7f0000000440)=0x5, 0x4) socket$inet_sctp(0x2, 0x5, 0x84) dup3(r1, r0, 0x0) write(r0, &(0x7f0000c34fff), 0xffffff0b) socket$inet(0x2, 0x0, 0x0) setsockopt$bt_l2cap_L2CAP_OPTIONS(0xffffffffffffffff, 0x6, 0x1, &(0x7f0000000380)={0xefa, 0x800, 0x0, 0x0, 0x9}, 0xc) 2018/03/30 19:43:09 executing program 3: pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) splice(r1, &(0x7f0000000140), r1, &(0x7f0000000180), 0x4, 0x0) rmdir(&(0x7f0000000080)='./file0\x00') r2 = open$dir(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) r3 = open$dir(&(0x7f00000001c0)='./file0\x00', 0x1fffe, 0x0) ftruncate(r3, 0x8001) r4 = open$dir(&(0x7f0000000500)='./file0\x00', 0x2, 0x0) lseek(0xffffffffffffffff, 0x0, 0x0) write(r4, &(0x7f0000000300)="d88a8d38144e5013d473c0ac2ca61ff3b749a4f5c7e6e9c2ce586e5cfca5d60ffc9a4df71856925b300ab39b1dd592385821faecb039bcdc475ffbacb982187073fc479f1cc6ffa0000af0026e75921d8a8310071ec28e0e6292680755e470aa73f538545ff8b19c257d032f9da1fa51f9a41568ce04a04f48d13d59ef80d3419c", 0x81) tee(0xffffffffffffffff, r1, 0x0, 0x2) sendfile(r4, r4, &(0x7f0000000040), 0x7527fb3200000000) syncfs(r0) pwritev(r3, &(0x7f00000002c0)=[{&(0x7f0000000540)="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", 0xf00}], 0x1, 0x0) sendfile(r4, r3, &(0x7f0000000180), 0x12000) fdatasync(r2) fcntl$getownex(r0, 0x10, &(0x7f0000000200)={0x0, 0x0}) fcntl$lock(r3, 0x0, &(0x7f0000000240)={0x1, 0x6, 0x1, 0xff, r5}) syz_mount_image$vfat(&(0x7f0000001640)='vfat\x00', &(0x7f0000001680)='./file0\x00', 0x200, 0x1, &(0x7f0000002900)=[{&(0x7f00000016c0)="cf029ff80a1c57176fcec2ab1bff3e9ffbe0d31231540853608f9da1c7222aad36e440f9ff9e69b8e53ae45dc736ca700022dc4ec4", 0x35, 0x9}], 0x1001, &(0x7f0000002980)) name_to_handle_at(r2, &(0x7f0000002d00)='./file0\x00', &(0x7f0000002e40)=ANY=[@ANYBLOB="9a000000040000001045f2e90b19709a8787351b8b1f8104f97b77fd6c3a99af823eb540a04833cad551a1b11f312b7c6383ecb35894deff6b322523c5f442e2f47d89e3dd5d578407adc92a1934a2bfed7efeec3d2887e585a9ce06c6a6413d4450863856dbbbf2b6ca529d6e9871515828eba9db9dcc7d206eb2e71d9f000468a026b32928818d1bdc2d8c85f833654d49551168a3d6b16f9fea7519cd20f1db205511281c242e973c71e56972f173773e77b9bc269dd0271beeae439aab5305e5dc8832c01367be795e92d21fd0b3c971b34dd3a1d14ba88100000000000000"], &(0x7f0000002e00), 0x1400) pwritev(r4, &(0x7f0000002cc0)=[{&(0x7f00000029c0)="111cbe3291187171ac60bb9d2ddc1b23875d91c22984094d6e579d0e201b5c4df58bbb6e228155a4641521df6aeb1a3d8eccbbc4db1d2799ebe5f07b154cfb14af1a78d4dc84aa2fd3b1132f8340d658d173e19fb8edeacd55d937c3012b55086acf9c4d55be8a6323c8e27b8c775c2ffc7e3a26ced3af3580d3fab0f57fe916312601c3a573f7c59ab1f8f9", 0x8c}], 0x1, 0x0) fallocate(r0, 0x1, 0x1, 0x8) lseek(r2, 0x43, 0x6) syz_mount_image$xfs(&(0x7f0000000100)='xfs\x00', &(0x7f00000003c0)='./file0\x00', 0x6, 0x1, &(0x7f0000000480)=[{&(0x7f0000000400)="456655db142b0600750e5c0aff3b50ab1819d59e912310af2c87b1ee984e09e2b6679e58d9b46d9b575949cd9f2122360a1143d054c4933a903b8f291d32564926a69aadeffc1ecc9fbac447", 0x4c, 0x3}], 0x400, &(0x7f0000002700)=ANY=[]) fdatasync(r4) 2018/03/30 19:43:09 executing program 1: r0 = syz_open_dev$amidi(&(0x7f0000000040)='/dev/amidi#\x00', 0x3, 0x28000) ioctl$DRM_IOCTL_RES_CTX(r0, 0xc0086426, &(0x7f0000000100)={0x2c, &(0x7f00000000c0)=[{}, {}, {}, {}, {}, {}, {}, {}]}) socket$netlink(0x10, 0x3, 0xc) writev(0xffffffffffffffff, &(0x7f00000021c0), 0x0) bind$bt_l2cap(r0, &(0x7f0000000340)={0x1f, 0x800000000000002, {0x401, 0x3, 0xb, 0x3f8}}, 0x9) socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f0000a8d000)={&(0x7f0000c78ff4)={0x10}, 0xc, &(0x7f0000df6000)={&(0x7f0000000200)=ANY=[@ANYBLOB="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"], 0x10f}, 0x1}, 0x0) r1 = socket$inet_sctp(0x2, 0x5, 0x84) sendmsg$inet_sctp(r1, &(0x7f0000001f00)={&(0x7f0000001840)=@in={0x2, 0x0, @dev={0xac, 0x14, 0x14}}, 0x10, &(0x7f0000001c40)=[{&(0x7f0000001880)='[', 0x1}], 0x1, &(0x7f0000001e40)}, 0x40) setsockopt$EBT_SO_SET_ENTRIES(0xffffffffffffffff, 0x0, 0x80, &(0x7f0000000540)=@nat={'nat\x00', 0x19, 0x3, 0x376, [0x20000140, 0x0, 0x0, 0x20000170, 0x200002d0], 0x0, &(0x7f0000000100), &(0x7f00000006c0)=ANY=[@ANYBLOB="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"]}, 0x3ee) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000002980)) getsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(0xffffffffffffffff, 0x84, 0x1f, &(0x7f0000000440)={0x0, @in={{0x2, 0x4e22, @multicast2=0xe0000002}}, 0x7bb7, 0x4}, &(0x7f0000000500)=0x90) getsockopt$inet_sctp_SCTP_RTOINFO(0xffffffffffffffff, 0x84, 0x0, &(0x7f0000002240)={0x0, 0x9, 0x417}, &(0x7f00000001c0)=0x10) r2 = socket(0x22, 0x4, 0x3) r3 = socket(0x20000001e, 0x5, 0x0) r4 = perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$packet_tx_ring(r3, 0x10f, 0x87, &(0x7f0000265000)=@req={0x3fc, 0x0, 0x1}, 0x10) getegid() setsockopt$packet_tx_ring(r2, 0x10f, 0x87, &(0x7f0000265000)=@req={0x3fc, 0x0, 0x1}, 0x10) writev(r2, &(0x7f00000000c0)=[{&(0x7f0000000000)="8a", 0x1}], 0x1) close(r2) close(r3) perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r5 = syz_open_dev$evdev(&(0x7f0000dfdfee)='/dev/input/event#\x00', 0x0, 0x2) readv(r5, &(0x7f0000019fe0)=[{&(0x7f00008ec000)=""/219, 0xdb}], 0x1) write$evdev(r5, &(0x7f000004d000)=[{{}, 0x0, 0x1}, {{0x2}}], 0x30) r6 = getpgrp(0x0) setsockopt$ax25_int(r3, 0x101, 0xd, &(0x7f0000000080)=0x7, 0x4) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x8, 0xfffffffffffffffd, 0x9, 0x7, 0x0, 0x8001, 0x0, 0x6, 0x3ff, 0x4, 0x5, 0x4, 0xbd9, 0x56, 0x8000, 0x7f, 0xff, 0xeba, 0x1f, 0x0, 0xfd, 0x3, 0x1, 0x50, 0x7, 0x9, 0x641800, 0x3ff8000000000000, 0x4, 0x0, 0x10000, 0x5, 0x7, 0x6, 0x1, 0xffffffffffffffe0, 0x0, 0x20, 0x0, @perf_bp={&(0x7f0000000040), 0x8}, 0x20, 0x401, 0x8, 0x3, 0x8, 0x7, 0x7}, r6, 0xc, r4, 0x0) syz_genetlink_get_family_id$ipvs(&(0x7f0000000040)='IPVS\x00') 2018/03/30 19:43:09 executing program 5: unshare(0x40000000) perf_event_open(&(0x7f000001d000)={0x2, 0x78, 0xe2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000000)={0x6, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0xa, 0x1, 0x0) ioctl(r0, 0x8982, &(0x7f0000000000)) r1 = socket$packet(0x11, 0x0, 0x300) r2 = openat$cuse(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/cuse\x00', 0x82, 0x0) io_setup(0x43f, &(0x7f00000000c0)=0x0) io_submit(r3, 0x1, &(0x7f0000000000)=[&(0x7f0000000200)={0x0, 0x0, 0x0, 0x1, 0x0, r2, &(0x7f0000000040)="10000000020400000000000000000000", 0x10}]) r4 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000280)='/proc/sys/net/ipv4/vs/secure_tcp\x00', 0x2, 0x0) sendmsg$kcm(r4, &(0x7f0000001f00)={&(0x7f0000001b40)=@pppol2tpin6={0x18, 0x1, {0x0, r1, 0x0, 0x1, 0x0, 0x0, {0xa, 0x4e24, 0xc1, @mcast1={0xff, 0x1, [], 0x1}}}}, 0x80, &(0x7f0000001d80)=[{&(0x7f0000001bc0)="a9db123ebf124fab0f2eec9774559e3b5870fb7c6818fc89c4b8742d057480657265ae2b34fb2d4e585d22ca1bf7b0a22ce38a20a819d919947c78f8d5c9f3291905fd3ed2b8ef8a79d9453396c6b0b7eb0778dbc49b32ae91e443b64edddcf320c1589c7777eadd4e57c01b20a8ca7a831e8e2c104d0194d52fb5c35b550f", 0x7f}], 0x1, &(0x7f0000001dc0)=ANY=[], 0x0, 0x90}, 0x20000000) r5 = syz_open_dev$tun(&(0x7f00000001c0)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r5, 0x400454ca, &(0x7f0000000200)={'bridge0\x00\x00p\x00', 0x4000000000001005}) socketpair(0x1d, 0x3, 0x40, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_inet_SIOCSIFADDR(r6, 0x8916, &(0x7f0000000100)={'bridge8\x00', {0x2, 0x0, @dev={0xac, 0x14, 0x14}}}) ioctl$LOOP_SET_FD(r2, 0x4c00, r1) ioctl$SNDRV_SEQ_IOCTL_RUNNING_MODE(0xffffffffffffffff, 0xc0105303, &(0x7f00000002c0)={0x2, 0x8}) add_key$keyring(&(0x7f00000000c0)='keyring\x00', &(0x7f0000000100)={0x73, 0x79, 0x7a}, 0x0, 0x0, 0x0) clone(0x0, &(0x7f0000000040), &(0x7f0000000080), &(0x7f0000000000), &(0x7f0000000100)) ioctl$int_in(0xffffffffffffffff, 0x800000c004500a, &(0x7f0000006ff8)) wait4(0x0, 0x0, 0x4, &(0x7f0000000380)) ioctl$sock_inet_sctp_SIOCINQ(r7, 0x541b, &(0x7f0000000180)) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_PORT(0xffffffffffffffff, 0xc0a85352, &(0x7f0000001980)={{}, 'port1\x00', 0x0, 0x20010, 0x1f, 0x0, 0x3, 0x40, 0x0, 0x0, 0x4, 0x6d1}) 2018/03/30 19:43:09 executing program 0: r0 = socket$inet6(0xa, 0x3, 0x3) ioctl$sock_inet6_SIOCDELRT(r0, 0x890c, &(0x7f0000000440)={@remote={0xfe, 0x80, [], 0xbb}, @mcast2={0xff, 0x2, [], 0x1}, @remote={0xfe, 0x80, [], 0xbb}, 0x0, 0x78}) 2018/03/30 19:43:09 executing program 6: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_mreqn(r0, 0x0, 0x27, &(0x7f0000000000)={@multicast2=0xe0000002, @loopback=0x7f000001}, 0xc) getsockopt$inet_sctp6_SCTP_FRAGMENT_INTERLEAVE(0xffffffffffffffff, 0x84, 0x12, &(0x7f0000000080), &(0x7f00000000c0)=0x4) ioctl$sock_inet_SIOCGIFDSTADDR(0xffffffffffffffff, 0x8917, &(0x7f0000000040)={'bcsh0\x00', {0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x1a}}}) setsockopt$inet_sctp6_SCTP_MAX_BURST(0xffffffffffffffff, 0x84, 0x14, &(0x7f0000000380)=@int=0x3, 0x4) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000140)={'bcsh0\x00', 0x0}) ioctl$sock_inet6_SIOCDELRT(0xffffffffffffffff, 0x890c, &(0x7f0000000180)={@dev={0xfe, 0x80, [], 0x13}, @loopback={0x0, 0x1}, @mcast2={0xff, 0x2, [], 0x1}, 0x6, 0x0, 0x42e, 0x100, 0x9, 0x80000000, r1}) r2 = socket$inet(0x2, 0xa, 0x5) setsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX(r2, 0x84, 0x6e, &(0x7f0000000600)=[@in={0x2, 0x4e21, @multicast1=0xe0000001}, @in6={0xa, 0x4e20, 0x0, @remote={0xfe, 0x80, [], 0xbb}}, @in={0x2, 0x4e22, @multicast2=0xe0000002}, @in6={0xa, 0x4e21, 0x1ff, @local={0xfe, 0x80, [], 0xaa}, 0x84}, @in6={0xa, 0x4e20, 0x4, @local={0xfe, 0x80, [], 0xaa}}], 0x74) getsockopt$inet_sctp6_SCTP_PR_SUPPORTED(0xffffffffffffffff, 0x84, 0x71, &(0x7f0000000200)={0x0, 0x8}, &(0x7f0000000240)=0x8) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(0xffffffffffffffff, 0x84, 0x6f, &(0x7f0000000300)={r3, 0x70, &(0x7f0000000280)=[@in={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x12}}, @in={0x2, 0x4e24, @loopback=0x7f000001}, @in={0x2, 0x0, @remote={0xac, 0x14, 0x14, 0xbb}}, @in={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x1a}}, @in={0x2, 0x4e24, @remote={0xac, 0x14, 0x14, 0xbb}}, @in={0x2, 0x4e24, @rand_addr=0x3ff}, @in={0x2, 0x4e24, @multicast2=0xe0000002}]}, &(0x7f0000000340)=0x10) setsockopt$inet_sctp6_SCTP_SET_PEER_PRIMARY_ADDR(0xffffffffffffffff, 0x84, 0x5, &(0x7f00000004c0)={r4, @in={{0x2, 0x4e20, @rand_addr=0x8}}}, 0x84) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, &(0x7f00000003c0)={'lo\x00', 0x4100}) ioctl$sock_inet_SIOCGIFNETMASK(0xffffffffffffffff, 0x891b, &(0x7f0000000100)={'nr0\x00', {0x2, 0x4e24, @loopback=0x7f000001}}) setsockopt$inet_msfilter(0xffffffffffffffff, 0x0, 0x29, &(0x7f0000000680)=ANY=[@ANYBLOB="cf0000000276d172390cc8c4ff4f3b746e5947c2ddb66a93ebb6d0f75b5f453435c311b94e126c49d47c10682b6e523d09fae1d416ebface98e08aa083e9f1f1afa118eb05655fec48d75d7a37edd032552c60ffeb53a2c8eecbe601a4ac5dceeecf1a943c2d9e"], 0x1) pread64(r0, &(0x7f0000000340)=""/181, 0xb5, 0x62) setsockopt$inet_msfilter(r0, 0x0, 0x29, &(0x7f0000000580)=ANY=[@ANYBLOB="e00000027f0000010000000001000000000000006b59aa51deb20d6efc9c04b7c9420f6434d31cbbe99b52873a8c21"], 0x1) socket$inet_udp(0x2, 0x2, 0x0) bpf$BPF_PROG_GET_NEXT_ID(0xb, &(0x7f0000000400)=0x7, 0x4) r5 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000ba4000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x2, 0x78, 0xe2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, r5, 0x0) r6 = perf_event_open(&(0x7f0000014f88)={0x1, 0x78, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00002e8000)}}, 0x0, 0x0, r5, 0x0) readv(r6, &(0x7f0000734000)=[{&(0x7f0000d42000)=""/146, 0x92}], 0x1) getsockopt$inet_sctp_SCTP_PEER_ADDR_THLDS(0xffffffffffffffff, 0x84, 0x1f, &(0x7f0000000480)={0x0, @in={{0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0xd}}}, 0xf80866d, 0x5}, &(0x7f0000000540)=0x90) getsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(0xffffffffffffff9c, 0x84, 0x18, &(0x7f0000000440)={r7, 0x400000000004}, &(0x7f00000005c0)=0xffffffffffffffc3) getsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER_VALUE(r0, 0x84, 0x7c, &(0x7f00000002c0)={r8, 0x10001, 0xc9e9}, &(0x7f0000000300)=0x8) 2018/03/30 19:43:09 executing program 4: perf_event_open(&(0x7f0000cccf88)={0x2, 0x70, 0xe12, 0x0, 0x0, 0x0, 0x0, 0x2000, 0x3ff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair(0x1, 0xa, 0x10001, &(0x7f0000000480)={0xffffffffffffffff}) socketpair$inet_udp(0x2, 0x2, 0x0, &(0x7f00000004c0)={0xffffffffffffffff}) ioctl$sock_kcm_SIOCKCMCLONE(r0, 0x89e2, &(0x7f0000000500)={r1}) r2 = perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000389000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40042409, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x89e1, &(0x7f00000002c0)) r3 = gettid() perf_event_open(&(0x7f0000000080)={0x5, 0x70, 0x1, 0xffffffffffff7fff, 0x7, 0x3, 0x0, 0x7, 0x44001, 0xb, 0x9, 0x9, 0x0, 0x200, 0x8001, 0x3, 0x93, 0x8, 0x9, 0x0, 0x2, 0xfffffffffffff800, 0x1, 0x1, 0x7fffffff, 0x6, 0x4, 0x100, 0x5, 0x5, 0x8, 0x20000000000, 0xfffffffffffff001, 0x4, 0x7, 0x33, 0x9a, 0x1, 0x0, 0x3, 0x1, @perf_bp={&(0x7f0000000040), 0x1}, 0x20000, 0x19a, 0x4, 0x7, 0x1, 0x9d26, 0x1e}, r3, 0x0, r2, 0x8) [ 508.650148] IPVS: ftp: loaded support on port[0] = 21 [ 508.664863] XFS (loop7): Invalid device [./file0], error=-15 [ 508.671367] ================================================================== [ 508.679062] BUG: KASAN: use-after-free in radix_tree_next_chunk+0xde1/0xdf0 [ 508.686168] Read of size 4 at addr ffff8801cb1ccd50 by task syz-executor1/6804 [ 508.693518] [ 508.695134] CPU: 0 PID: 6804 Comm: syz-executor1 Not tainted 4.16.0-rc7+ #7 [ 508.702215] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 508.711551] Call Trace: [ 508.714182] dump_stack+0x194/0x24d [ 508.717803] ? arch_local_irq_restore+0x53/0x53 [ 508.722466] ? show_regs_print_info+0x18/0x18 [ 508.726949] ? radix_tree_next_chunk+0xde1/0xdf0 [ 508.731730] print_address_description+0x73/0x250 [ 508.736560] ? radix_tree_next_chunk+0xde1/0xdf0 [ 508.741302] kasan_report+0x23c/0x360 [ 508.745093] __asan_report_load4_noabort+0x14/0x20 [ 508.750006] radix_tree_next_chunk+0xde1/0xdf0 [ 508.754593] ? debug_check_no_locks_freed+0x3c0/0x3c0 [ 508.759780] ? idr_preload+0x30/0x30 [ 508.763502] ? put_prev_task_fair+0x80/0x80 [ 508.767813] ? print_irqtrace_events+0x270/0x270 [ 508.772554] ? perf_trace_lock_acquire+0xe3/0x980 [ 508.777385] ? debug_check_no_locks_freed+0x3c0/0x3c0 [ 508.782563] ? perf_trace_lock+0x900/0x900 [ 508.786826] ? flush_plug_callbacks+0x53b/0x7b0 [ 508.791499] ? resched_curr+0x13e/0x1a0 [ 508.795462] ? print_irqtrace_events+0x270/0x270 [ 508.800204] ? ioc_set_batching+0x2c0/0x2c0 [ 508.804510] ? __lock_acquire+0x664/0x3e00 [ 508.808735] ? perf_trace_lock_acquire+0xe3/0x980 [ 508.813568] radix_tree_gang_lookup_tag+0x36e/0x5e0 [ 508.818571] ? lock_acquire+0x1d5/0x580 [ 508.822533] ? radix_tree_gang_lookup_slot+0x3f0/0x3f0 [ 508.827801] ? lock_release+0xa40/0xa40 [ 508.831824] ? rcutorture_record_progress+0x10/0x10 [ 508.836866] xfs_perag_get_tag+0x109/0x6c0 [ 508.841093] ? xfs_perag_get+0x520/0x520 [ 508.845140] ? lock_downgrade+0x980/0x980 [ 508.849274] ? lock_release+0xa40/0xa40 [ 508.853238] ? do_raw_spin_trylock+0x190/0x190 [ 508.857805] ? __lock_is_held+0xb6/0x140 [ 508.861865] xfs_reclaim_inodes_count+0x82/0xb0 [ 508.866521] xfs_fs_nr_cached_objects+0x37/0x50 [ 508.871172] ? xfs_fs_free_cached_objects+0x80/0x80 [ 508.876195] super_cache_count+0x96/0x280 [ 508.880361] shrink_slab.part.46+0x30c/0xe80 [ 508.884757] ? throttle_direct_reclaim+0x890/0x890 [ 508.889681] ? current_may_throttle+0x210/0x210 [ 508.894342] ? shrink_active_list+0x15e0/0x15e0 [ 508.899021] ? mem_cgroup_nr_lru_pages+0x80/0x80 [ 508.903788] ? _raw_spin_unlock+0x22/0x30 [ 508.907938] ? __queue_work+0x5b9/0x1230 [ 508.911987] ? trace_hardirqs_off+0x10/0x10 [ 508.916301] ? _raw_spin_unlock+0x22/0x30 [ 508.920449] shrink_slab+0x9d/0xb0 [ 508.923977] shrink_node+0x51e/0xf70 [ 508.927684] ? shrink_node_memcg+0x1690/0x1690 [ 508.932247] ? queue_work_on+0xc2/0x1c0 [ 508.936211] ? trace_hardirqs_on_caller+0x421/0x5c0 [ 508.941211] ? trace_hardirqs_on+0xd/0x10 [ 508.945353] ? queue_work_on+0x106/0x1c0 [ 508.949408] do_try_to_free_pages+0x383/0x1020 [ 508.953990] ? shrink_node+0xf70/0xf70 [ 508.957873] try_to_free_mem_cgroup_pages+0x44d/0xb40 [ 508.963051] ? try_to_free_pages+0x9c0/0x9c0 [ 508.967493] ? cgroup_file_notify+0x5e/0x70 [ 508.971805] ? lock_downgrade+0x980/0x980 [ 508.975937] ? lock_release+0xa40/0xa40 [ 508.979898] ? lock_release+0xa40/0xa40 [ 508.983882] ? kernfs_get+0xe1/0x130 [ 508.987584] ? do_raw_spin_trylock+0x190/0x190 [ 508.992153] ? _raw_spin_unlock_irqrestore+0x31/0xc0 [ 508.997247] ? trace_hardirqs_on+0xd/0x10 [ 509.001387] reclaim_high.constprop.64+0x1e2/0x330 [ 509.006301] ? mem_cgroup_from_task+0x1e0/0x1e0 [ 509.010966] ? exit_to_usermode_loop+0x8c/0x2f0 [ 509.015622] mem_cgroup_handle_over_high+0x8d/0x130 [ 509.020634] exit_to_usermode_loop+0x242/0x2f0 [ 509.025198] ? lock_release+0xa40/0xa40 [ 509.029160] ? trace_event_raw_event_sys_exit+0x260/0x260 [ 509.034697] ? trace_hardirqs_on_caller+0x421/0x5c0 [ 509.039718] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 509.044464] syscall_return_slowpath+0x487/0x550 [ 509.049204] ? prepare_exit_to_usermode+0x350/0x350 [ 509.054216] ? __put_user_4+0x1c/0x30 [ 509.058007] ret_from_fork+0x15/0x50 [ 509.061710] RIP: 0033:0x45352a [ 509.064884] RSP: 002b:00007ffcf6a90470 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 [ 509.072581] RAX: 0000000000000000 RBX: 00007ffcf6a90470 RCX: 000000000045352a [ 509.079836] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000001200011 [ 509.087089] RBP: 00007ffcf6a904b0 R08: 0000000000000001 R09: 000000000142e940 [ 509.094345] R10: 000000000142ec10 R11: 0000000000000246 R12: 0000000000000001 [ 509.101600] R13: 0000000000000000 R14: 0000000000000000 R15: 0000000000001380 [ 509.108870] [ 509.110482] Allocated by task 6794: [ 509.114096] save_stack+0x43/0xd0 [ 509.117538] kasan_kmalloc+0xad/0xe0 [ 509.121235] kmem_cache_alloc_trace+0x136/0x740 [ 509.125889] xfs_fs_fill_super+0xd1/0x1220 [ 509.130108] mount_bdev+0x2b7/0x370 [ 509.133718] xfs_fs_mount+0x34/0x40 [ 509.137325] mount_fs+0x66/0x2d0 [ 509.140737] vfs_kern_mount.part.26+0xc6/0x4a0 [ 509.145301] do_mount+0xea4/0x2bb0 [ 509.148822] SyS_mount+0xab/0x120 [ 509.152257] do_syscall_64+0x281/0x940 [ 509.156129] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 509.161296] [ 509.162912] Freed by task 6794: [ 509.166174] save_stack+0x43/0xd0 [ 509.169608] __kasan_slab_free+0x11a/0x170 [ 509.173825] kasan_slab_free+0xe/0x10 [ 509.177606] kfree+0xd9/0x260 [ 509.180705] xfs_fs_fill_super+0x6c3/0x1220 [ 509.185015] mount_bdev+0x2b7/0x370 [ 509.188630] xfs_fs_mount+0x34/0x40 [ 509.192238] mount_fs+0x66/0x2d0 [ 509.195587] vfs_kern_mount.part.26+0xc6/0x4a0 [ 509.200152] do_mount+0xea4/0x2bb0 [ 509.203674] SyS_mount+0xab/0x120 [ 509.207111] do_syscall_64+0x281/0x940 [ 509.210985] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 509.216156] [ 509.217768] The buggy address belongs to the object at ffff8801cb1cc980 [ 509.217768] which belongs to the cache kmalloc-4096 of size 4096 [ 509.230579] The buggy address is located 976 bytes inside of [ 509.230579] 4096-byte region [ffff8801cb1cc980, ffff8801cb1cd980) [ 509.242520] The buggy address belongs to the page: [ 509.247435] page:ffffea00072c7300 count:1 mapcount:0 mapping:ffff8801cb1cc980 index:0x0 compound_mapcount: 0 [ 509.257394] flags: 0x2fffc0000008100(slab|head) [ 509.262052] raw: 02fffc0000008100 ffff8801cb1cc980 0000000000000000 0000000100000001 [ 509.269919] raw: ffffea00072c5fa0 ffff8801dac01a48 ffff8801dac00dc0 0000000000000000 [ 509.277780] page dumped because: kasan: bad access detected [ 509.283472] [ 509.285085] Memory state around the buggy address: [ 509.289996] ffff8801cb1ccc00: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 509.297355] ffff8801cb1ccc80: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 509.304708] >ffff8801cb1ccd00: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 509.312052] ^ [ 509.318005] ffff8801cb1ccd80: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 509.325350] ffff8801cb1cce00: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 509.332689] ================================================================== [ 509.340030] Disabling lock debugging due to kernel taint [ 509.345858] Kernel panic - not syncing: panic_on_warn set ... [ 509.345858] 2018/03/30 19:43:10 executing program 0: bpf$MAP_CREATE(0x0, &(0x7f0000583000)={0x0, 0x80000000005, 0x4000, 0x1}, 0x2c) socket$inet6_udp(0xa, 0x2, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) setsockopt$netlink_NETLINK_TX_RING(0xffffffffffffffff, 0x10e, 0x7, &(0x7f0000000040)={0x0, 0x2}, 0xfffffe63) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000000)={'bridge0\x00', 0x0}) ioctl$sock_SIOCBRADDBR(r0, 0x89a0, &(0x7f0000000980)='bcsf0\x00') ioctl$sock_SIOCBRDELBR(r0, 0x89a1, &(0x7f0000000000)='bcsf0\x00') ioctl$PPPIOCGFLAGS(0xffffffffffffffff, 0x8004745a, &(0x7f0000000440)) accept$packet(0xffffffffffffffff, 0x0, &(0x7f0000001d00)=0x28e) syz_genetlink_get_family_id$ipvs(&(0x7f0000000280)='IPVS\x00') sendmsg$IPVS_CMD_DEL_DEST(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x43011000}, 0xc, &(0x7f0000000380)={&(0x7f00000009c0)=ANY=[@ANYBLOB="90000000"], 0x1}, 0x1}, 0x840) setsockopt$packet_drop_memb(0xffffffffffffffff, 0x107, 0x2, &(0x7f0000000800)={r1, 0x1, 0x6, @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff]}, 0x10) setsockopt$EBT_SO_SET_ENTRIES(0xffffffffffffffff, 0x0, 0x80, &(0x7f00000008c0)=@broute={'broute\x00', 0x20, 0x2, 0x448, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000280], 0x0, &(0x7f0000000240), &(0x7f0000000d00)=ANY=[@ANYBLOB="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"]}, 0x4c0) [ 509.353225] CPU: 0 PID: 6804 Comm: syz-executor1 Tainted: G B 4.16.0-rc7+ #7 [ 509.361627] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 509.370979] Call Trace: [ 509.373570] dump_stack+0x194/0x24d [ 509.377203] ? arch_local_irq_restore+0x53/0x53 [ 509.381875] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 509.386641] ? vsnprintf+0x1ed/0x1900 [ 509.390424] ? radix_tree_next_chunk+0xda0/0xdf0 [ 509.395220] panic+0x1e4/0x41c [ 509.398404] ? refcount_error_report+0x214/0x214 [ 509.403142] ? radix_tree_next_chunk+0xde1/0xdf0 [ 509.407884] kasan_end_report+0x50/0x50 [ 509.411847] kasan_report+0x149/0x360 [ 509.415647] __asan_report_load4_noabort+0x14/0x20 [ 509.420568] radix_tree_next_chunk+0xde1/0xdf0 [ 509.425518] ? debug_check_no_locks_freed+0x3c0/0x3c0 [ 509.430694] ? idr_preload+0x30/0x30 [ 509.434386] ? put_prev_task_fair+0x80/0x80 [ 509.438691] ? print_irqtrace_events+0x270/0x270 [ 509.443443] ? perf_trace_lock_acquire+0xe3/0x980 [ 509.448280] ? debug_check_no_locks_freed+0x3c0/0x3c0 [ 509.453452] ? perf_trace_lock+0x900/0x900 [ 509.457669] ? flush_plug_callbacks+0x53b/0x7b0 [ 509.462318] ? resched_curr+0x13e/0x1a0 [ 509.466280] ? print_irqtrace_events+0x270/0x270 [ 509.471029] ? ioc_set_batching+0x2c0/0x2c0 [ 509.475340] ? __lock_acquire+0x664/0x3e00 [ 509.479558] ? perf_trace_lock_acquire+0xe3/0x980 [ 509.484390] radix_tree_gang_lookup_tag+0x36e/0x5e0 [ 509.489391] ? lock_acquire+0x1d5/0x580 [ 509.493347] ? radix_tree_gang_lookup_slot+0x3f0/0x3f0 [ 509.498622] ? lock_release+0xa40/0xa40 [ 509.502576] ? rcutorture_record_progress+0x10/0x10 [ 509.507583] xfs_perag_get_tag+0x109/0x6c0 [ 509.511814] ? xfs_perag_get+0x520/0x520 [ 509.515860] ? lock_downgrade+0x980/0x980 [ 509.520003] ? lock_release+0xa40/0xa40 [ 509.523964] ? do_raw_spin_trylock+0x190/0x190 [ 509.528531] ? __lock_is_held+0xb6/0x140 [ 509.532580] xfs_reclaim_inodes_count+0x82/0xb0 [ 509.537240] xfs_fs_nr_cached_objects+0x37/0x50 [ 509.541892] ? xfs_fs_free_cached_objects+0x80/0x80 [ 509.546901] super_cache_count+0x96/0x280 [ 509.551037] shrink_slab.part.46+0x30c/0xe80 [ 509.555426] ? throttle_direct_reclaim+0x890/0x890 [ 509.560336] ? current_may_throttle+0x210/0x210 [ 509.564990] ? shrink_active_list+0x15e0/0x15e0 [ 509.569641] ? mem_cgroup_nr_lru_pages+0x80/0x80 [ 509.574375] ? _raw_spin_unlock+0x22/0x30 [ 509.578505] ? __queue_work+0x5b9/0x1230 [ 509.582557] ? trace_hardirqs_off+0x10/0x10 [ 509.586874] ? _raw_spin_unlock+0x22/0x30 [ 509.591016] shrink_slab+0x9d/0xb0 [ 509.594537] shrink_node+0x51e/0xf70 [ 509.598244] ? shrink_node_memcg+0x1690/0x1690 [ 509.602815] ? queue_work_on+0xc2/0x1c0 [ 509.606774] ? trace_hardirqs_on_caller+0x421/0x5c0 [ 509.611776] ? trace_hardirqs_on+0xd/0x10 [ 509.615903] ? queue_work_on+0x106/0x1c0 [ 509.619948] do_try_to_free_pages+0x383/0x1020 [ 509.624517] ? shrink_node+0xf70/0xf70 [ 509.628384] try_to_free_mem_cgroup_pages+0x44d/0xb40 [ 509.633550] ? try_to_free_pages+0x9c0/0x9c0 [ 509.637947] ? cgroup_file_notify+0x5e/0x70 [ 509.642258] ? lock_downgrade+0x980/0x980 [ 509.646388] ? lock_release+0xa40/0xa40 [ 509.650342] ? lock_release+0xa40/0xa40 2018/03/30 19:43:10 executing program 2: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f00003b9fdc)) readv(r0, &(0x7f0000001980)=[{&(0x7f00000018c0)=""/182, 0xb6}], 0x1) r1 = syz_open_pts(r0, 0x2) setsockopt$inet6_mtu(0xffffffffffffffff, 0x29, 0x17, &(0x7f0000000440)=0x5, 0x4) socket$inet_sctp(0x2, 0x5, 0x84) dup3(r1, r0, 0x0) write(r0, &(0x7f0000c34fff), 0xffffff0b) socket$inet(0x2, 0x0, 0x0) setsockopt$bt_l2cap_L2CAP_OPTIONS(0xffffffffffffffff, 0x6, 0x1, &(0x7f0000000380)={0xefa, 0x800, 0x0, 0x0, 0x9}, 0xc) [ 509.654301] ? kernfs_get+0xe1/0x130 [ 509.658002] ? do_raw_spin_trylock+0x190/0x190 [ 509.662574] ? _raw_spin_unlock_irqrestore+0x31/0xc0 [ 509.667676] ? trace_hardirqs_on+0xd/0x10 [ 509.671815] reclaim_high.constprop.64+0x1e2/0x330 [ 509.676739] ? mem_cgroup_from_task+0x1e0/0x1e0 [ 509.681403] ? exit_to_usermode_loop+0x8c/0x2f0 [ 509.686057] mem_cgroup_handle_over_high+0x8d/0x130 [ 509.691070] exit_to_usermode_loop+0x242/0x2f0 [ 509.695644] ? lock_release+0xa40/0xa40 [ 509.699602] ? trace_event_raw_event_sys_exit+0x260/0x260 [ 509.705117] ? trace_hardirqs_on_caller+0x421/0x5c0 [ 509.710114] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 509.714852] syscall_return_slowpath+0x487/0x550 [ 509.719589] ? prepare_exit_to_usermode+0x350/0x350 [ 509.724588] ? __put_user_4+0x1c/0x30 [ 509.728372] ret_from_fork+0x15/0x50 [ 509.732064] RIP: 0033:0x45352a [ 509.735231] RSP: 002b:00007ffcf6a90470 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 [ 509.742929] RAX: 0000000000000000 RBX: 00007ffcf6a90470 RCX: 000000000045352a [ 509.750177] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000001200011 [ 509.757434] RBP: 00007ffcf6a904b0 R08: 0000000000000001 R09: 000000000142e940 [ 509.764688] R10: 000000000142ec10 R11: 0000000000000246 R12: 0000000000000001 [ 509.771935] R13: 0000000000000000 R14: 0000000000000000 R15: 0000000000001380 [ 509.779580] Dumping ftrace buffer: [ 509.783101] (ftrace buffer empty) [ 509.786788] Kernel Offset: disabled [ 509.790392] Rebooting in 86400 seconds..