[....] Starting enhanced syslogd: rsyslogd[?25l[?1c7[ ok 8[?25h[?0c. [....] Starting periodic command scheduler: cron[?25l[?1c7[ ok 8[?25h[?0c. [....] Starting OpenBSD Secure Shell server: sshd[ 15.606615] random: sshd: uninitialized urandom read (32 bytes read) [?25l[?1c7[ ok 8[?25h[?0c. Debian GNU/Linux 7 syzkaller ttyS0 syzkaller login: [ 22.264323] random: sshd: uninitialized urandom read (32 bytes read) [ 22.750168] random: sshd: uninitialized urandom read (32 bytes read) [ 23.715792] random: sshd: uninitialized urandom read (32 bytes read) Warning: Permanently added '10.128.0.30' (ECDSA) to the list of known hosts. [ 34.960669] random: sshd: uninitialized urandom read (32 bytes read) 2018/05/17 18:18:48 fuzzer started 2018/05/17 18:18:48 dialing manager at 10.128.0.26:33003 2018/05/17 18:18:53 kcov=true, comps=false 2018/05/17 18:18:55 executing program 0: getrusage(0x3, &(0x7f0000000200)) 2018/05/17 18:18:55 executing program 2: r0 = socket$inet(0x2, 0x3, 0x2) setsockopt$inet_int(r0, 0x0, 0xc8, &(0x7f0000000080), 0x4) setsockopt$inet_int(r0, 0x0, 0x5, &(0x7f0000000000), 0x4) 2018/05/17 18:18:55 executing program 7: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f0000000080)={@in={{0x2, 0x0, @dev={0xac, 0x14, 0x14}}}, 0x0, 0x6, 0x0, "b6f73b6e690dfa12c023fe736a343f8b70bbfadd0b2b7917794acb5f197a68d966aa0b5a5f41ca2b6204d8bac209c26d4b213ba809a1c6e983a2b18c3657b1710a93895ee1e98fb8566092d73d71d352"}, 0xd8) setsockopt$inet_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f00000014c0)={@in={{0x2, 0x0, @dev={0xac, 0x14, 0x14}}}, 0x0, 0x0, 0x0, "4ae9645a4bdbefd0187f1e35cba955127c7ca8b982f7408054208a36ee7b341bc01b6d8d52e8ee57c61ec7f041e965466b7a2d4cec6a16d568c9683cac6791e3bef5d31b03d40e4f5f68137e44379c3b"}, 0xd8) 2018/05/17 18:18:55 executing program 3: r0 = syz_open_dev$evdev(&(0x7f00000009c0)='/dev/input/event#\x00', 0x0, 0x0) ioctl$EVIOCSKEYCODE(r0, 0x40084502, &(0x7f0000000140)) 2018/05/17 18:18:55 executing program 1: r0 = socket(0xa, 0x1, 0x0) ioctl(r0, 0x8912, &(0x7f0000000240)="c626262c8523bf012cf66f") r1 = syz_open_dev$tun(&(0x7f0000000040)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f00000000c0)={"69666230000800ffffffffffff00", 0x201012}) ioctl$TUNSETLINK(r1, 0x400454cd, 0x20) dup2(r0, r1) 2018/05/17 18:18:55 executing program 4: perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x72, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000100)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = getpid() perf_event_open(&(0x7f0000000040)={0x1, 0x70}, r0, 0x0, 0xffffffffffffffff, 0x0) 2018/05/17 18:18:55 executing program 5: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='./file0\x00', &(0x7f0000000280)='devtmpfs\x00', 0x0, &(0x7f0000000500)) 2018/05/17 18:18:55 executing program 6: syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000200)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x0, &(0x7f0000000240)=ANY=[]) bind(0xffffffffffffffff, &(0x7f0000000100)=@l2={0x1f, 0x51f3, {0x100, 0x3c, 0x0, 0x0, 0x2}, 0x5}, 0xfffffffffffffd30) sched_setaffinity(0x0, 0x7, &(0x7f00000000c0)) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = creat(&(0x7f0000000240)='./file0/file0\x00', 0x0) write$binfmt_elf64(r0, &(0x7f0000000500)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x38}, [{}]}, 0xfdae) [ 42.236739] IPVS: Creating netns size=2536 id=1 [ 42.312050] IPVS: Creating netns size=2536 id=2 [ 42.386126] IPVS: Creating netns size=2536 id=3 [ 42.437531] IPVS: Creating netns size=2536 id=4 [ 42.477925] IPVS: Creating netns size=2536 id=5 [ 42.529062] IPVS: Creating netns size=2536 id=6 [ 42.597682] IPVS: Creating netns size=2536 id=7 [ 42.640376] IPVS: Creating netns size=2536 id=8 [ 43.127509] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 43.141671] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 43.166289] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 43.186658] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 43.209532] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 43.221983] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 43.382432] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 43.392515] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 43.435949] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 43.451554] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 43.511476] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 43.530592] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 43.549391] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 43.556887] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 43.575410] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 43.586442] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 43.613437] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 43.637117] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 43.657193] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 43.674926] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 43.708733] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 43.732086] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 43.756508] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 43.774188] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 43.802286] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 43.809281] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 43.833681] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 43.908592] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 43.938548] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 43.949073] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 43.961121] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 43.969605] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 43.982884] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 43.990806] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 44.013091] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 44.023594] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 44.031700] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 44.039113] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 44.050952] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 44.058512] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 44.080693] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 44.096145] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 44.111612] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 44.124947] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 44.132479] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 44.140346] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 44.148148] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 44.157482] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 44.164613] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 44.173272] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 44.181490] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 44.189120] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 44.196870] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 44.209334] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 44.220543] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 44.230358] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 44.237972] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 44.246483] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 44.254491] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 44.265130] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 44.274160] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 44.298393] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 44.313534] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 44.325978] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 44.335768] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 44.347463] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 44.357598] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 44.375977] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 44.383520] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 44.391648] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 44.399035] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 44.416051] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 44.426413] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 44.436503] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 44.454213] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 44.462120] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 44.469505] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 44.487998] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 44.504291] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 44.523228] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 44.542308] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 44.584975] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 44.625801] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 44.656673] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 44.676820] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 44.694098] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 44.709599] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 44.722561] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 44.730033] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 44.769240] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 44.834158] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 44.844898] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 44.852541] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 44.883401] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 44.890325] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 44.900624] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 47.998910] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 48.013796] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 48.104626] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 48.125705] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 48.185462] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 48.195998] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 48.204011] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 48.214445] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 48.223952] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 48.230646] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 48.268695] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 48.280193] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 48.290127] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 48.297843] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 48.306521] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 48.370637] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 48.390584] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 48.401329] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 48.408052] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 48.461982] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 48.468234] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 48.476605] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 48.493689] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 48.510097] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 48.526067] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 48.584238] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 48.599237] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 48.609713] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 48.725626] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 48.899451] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 48.912393] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 48.919029] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready 2018/05/17 18:19:02 executing program 2: r0 = socket$inet(0x2, 0x3, 0x2) setsockopt$inet_int(r0, 0x0, 0xc8, &(0x7f0000000080), 0x4) setsockopt$inet_int(r0, 0x0, 0x5, &(0x7f0000000000), 0x4) 2018/05/17 18:19:02 executing program 2: r0 = socket$inet(0x2, 0x3, 0x2) setsockopt$inet_int(r0, 0x0, 0xc8, &(0x7f0000000080), 0x4) setsockopt$inet_int(r0, 0x0, 0x5, &(0x7f0000000000), 0x4) 2018/05/17 18:19:02 executing program 7: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f0000000080)={@in={{0x2, 0x0, @dev={0xac, 0x14, 0x14}}}, 0x0, 0x6, 0x0, "b6f73b6e690dfa12c023fe736a343f8b70bbfadd0b2b7917794acb5f197a68d966aa0b5a5f41ca2b6204d8bac209c26d4b213ba809a1c6e983a2b18c3657b1710a93895ee1e98fb8566092d73d71d352"}, 0xd8) setsockopt$inet_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f00000014c0)={@in={{0x2, 0x0, @dev={0xac, 0x14, 0x14}}}, 0x0, 0x0, 0x0, "4ae9645a4bdbefd0187f1e35cba955127c7ca8b982f7408054208a36ee7b341bc01b6d8d52e8ee57c61ec7f041e965466b7a2d4cec6a16d568c9683cac6791e3bef5d31b03d40e4f5f68137e44379c3b"}, 0xd8) 2018/05/17 18:19:02 executing program 2: r0 = socket$inet(0x2, 0x3, 0x2) setsockopt$inet_int(r0, 0x0, 0xc8, &(0x7f0000000080), 0x4) setsockopt$inet_int(r0, 0x0, 0x5, &(0x7f0000000000), 0x4) 2018/05/17 18:19:02 executing program 7: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f0000000080)={@in={{0x2, 0x0, @dev={0xac, 0x14, 0x14}}}, 0x0, 0x6, 0x0, "b6f73b6e690dfa12c023fe736a343f8b70bbfadd0b2b7917794acb5f197a68d966aa0b5a5f41ca2b6204d8bac209c26d4b213ba809a1c6e983a2b18c3657b1710a93895ee1e98fb8566092d73d71d352"}, 0xd8) setsockopt$inet_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f00000014c0)={@in={{0x2, 0x0, @dev={0xac, 0x14, 0x14}}}, 0x0, 0x0, 0x0, "4ae9645a4bdbefd0187f1e35cba955127c7ca8b982f7408054208a36ee7b341bc01b6d8d52e8ee57c61ec7f041e965466b7a2d4cec6a16d568c9683cac6791e3bef5d31b03d40e4f5f68137e44379c3b"}, 0xd8) 2018/05/17 18:19:02 executing program 2: r0 = socket$inet(0x2, 0x3, 0x2) setsockopt$inet_int(r0, 0x0, 0xc8, &(0x7f0000000080), 0x4) setsockopt$inet_int(r0, 0x0, 0x5, &(0x7f0000000000), 0x4) 2018/05/17 18:19:03 executing program 7: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f0000000080)={@in={{0x2, 0x0, @dev={0xac, 0x14, 0x14}}}, 0x0, 0x6, 0x0, "b6f73b6e690dfa12c023fe736a343f8b70bbfadd0b2b7917794acb5f197a68d966aa0b5a5f41ca2b6204d8bac209c26d4b213ba809a1c6e983a2b18c3657b1710a93895ee1e98fb8566092d73d71d352"}, 0xd8) setsockopt$inet_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f00000014c0)={@in={{0x2, 0x0, @dev={0xac, 0x14, 0x14}}}, 0x0, 0x0, 0x0, "4ae9645a4bdbefd0187f1e35cba955127c7ca8b982f7408054208a36ee7b341bc01b6d8d52e8ee57c61ec7f041e965466b7a2d4cec6a16d568c9683cac6791e3bef5d31b03d40e4f5f68137e44379c3b"}, 0xd8) 2018/05/17 18:19:03 executing program 2: r0 = socket$inet(0x2, 0x3, 0x2) setsockopt$inet_int(r0, 0x0, 0xc8, &(0x7f0000000080), 0x4) setsockopt$inet_int(r0, 0x0, 0x5, &(0x7f0000000000), 0x4) [ 49.950540] hrtimer: interrupt took 41473 ns 2018/05/17 18:19:03 executing program 0: getrusage(0x3, &(0x7f0000000200)) 2018/05/17 18:19:03 executing program 5: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='./file0\x00', &(0x7f0000000280)='devtmpfs\x00', 0x0, &(0x7f0000000500)) 2018/05/17 18:19:03 executing program 6: syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000200)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x0, &(0x7f0000000240)=ANY=[]) bind(0xffffffffffffffff, &(0x7f0000000100)=@l2={0x1f, 0x51f3, {0x100, 0x3c, 0x0, 0x0, 0x2}, 0x5}, 0xfffffffffffffd30) sched_setaffinity(0x0, 0x7, &(0x7f00000000c0)) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = creat(&(0x7f0000000240)='./file0/file0\x00', 0x0) write$binfmt_elf64(r0, &(0x7f0000000500)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x38}, [{}]}, 0xfdae) 2018/05/17 18:19:03 executing program 4: perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x72, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000100)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = getpid() perf_event_open(&(0x7f0000000040)={0x1, 0x70}, r0, 0x0, 0xffffffffffffffff, 0x0) 2018/05/17 18:19:03 executing program 3: r0 = syz_open_dev$evdev(&(0x7f00000009c0)='/dev/input/event#\x00', 0x0, 0x0) ioctl$EVIOCSKEYCODE(r0, 0x40084502, &(0x7f0000000140)) 2018/05/17 18:19:03 executing program 1: r0 = socket(0xa, 0x1, 0x0) ioctl(r0, 0x8912, &(0x7f0000000240)="c626262c8523bf012cf66f") r1 = syz_open_dev$tun(&(0x7f0000000040)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f00000000c0)={"69666230000800ffffffffffff00", 0x201012}) ioctl$TUNSETLINK(r1, 0x400454cd, 0x20) dup2(r0, r1) 2018/05/17 18:19:03 executing program 7: setrlimit(0x7, &(0x7f0000becff0)) fanotify_init(0x0, 0x0) 2018/05/17 18:19:03 executing program 2: r0 = socket$inet(0x2, 0x3, 0x2) setsockopt$inet_int(r0, 0x0, 0xc8, &(0x7f0000000080), 0x4) setsockopt$inet_int(r0, 0x0, 0x5, &(0x7f0000000000), 0x4) 2018/05/17 18:19:03 executing program 0: getrusage(0x3, &(0x7f0000000200)) 2018/05/17 18:19:03 executing program 4: perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x72, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000100)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = getpid() perf_event_open(&(0x7f0000000040)={0x1, 0x70}, r0, 0x0, 0xffffffffffffffff, 0x0) 2018/05/17 18:19:03 executing program 2: syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000200)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x0, &(0x7f0000000240)=ANY=[]) bind(0xffffffffffffffff, &(0x7f0000000100)=@l2={0x1f, 0x51f3, {0x100, 0x3c, 0x0, 0x0, 0x2}, 0x5}, 0xfffffffffffffd30) sched_setaffinity(0x0, 0x7, &(0x7f00000000c0)) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = creat(&(0x7f0000000240)='./file0/file0\x00', 0x0) write$binfmt_elf64(r0, &(0x7f0000000500)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x38}, [{}]}, 0xfdae) 2018/05/17 18:19:03 executing program 7: setrlimit(0x7, &(0x7f0000becff0)) fanotify_init(0x0, 0x0) 2018/05/17 18:19:03 executing program 6: syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000200)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x0, &(0x7f0000000240)=ANY=[]) bind(0xffffffffffffffff, &(0x7f0000000100)=@l2={0x1f, 0x51f3, {0x100, 0x3c, 0x0, 0x0, 0x2}, 0x5}, 0xfffffffffffffd30) sched_setaffinity(0x0, 0x7, &(0x7f00000000c0)) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = creat(&(0x7f0000000240)='./file0/file0\x00', 0x0) write$binfmt_elf64(r0, &(0x7f0000000500)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x38}, [{}]}, 0xfdae) 2018/05/17 18:19:03 executing program 1: r0 = socket(0xa, 0x1, 0x0) ioctl(r0, 0x8912, &(0x7f0000000240)="c626262c8523bf012cf66f") r1 = syz_open_dev$tun(&(0x7f0000000040)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f00000000c0)={"69666230000800ffffffffffff00", 0x201012}) ioctl$TUNSETLINK(r1, 0x400454cd, 0x20) dup2(r0, r1) 2018/05/17 18:19:03 executing program 3: r0 = syz_open_dev$evdev(&(0x7f00000009c0)='/dev/input/event#\x00', 0x0, 0x0) ioctl$EVIOCSKEYCODE(r0, 0x40084502, &(0x7f0000000140)) 2018/05/17 18:19:03 executing program 5: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='./file0\x00', &(0x7f0000000280)='devtmpfs\x00', 0x0, &(0x7f0000000500)) [ 50.162569] attempt to access beyond end of device [ 50.167530] loop6: rw=536870912, want=130, limit=112 [ 50.174398] Buffer I/O error on dev loop6, logical block 129, lost async page write [ 50.182876] attempt to access beyond end of device [ 50.188332] loop6: rw=536870912, want=131, limit=112 [ 50.193519] Buffer I/O error on dev loop6, logical block 130, lost async page write 2018/05/17 18:19:03 executing program 7: setrlimit(0x7, &(0x7f0000becff0)) fanotify_init(0x0, 0x0) 2018/05/17 18:19:03 executing program 0: getrusage(0x3, &(0x7f0000000200)) 2018/05/17 18:19:03 executing program 4: perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x72, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000100)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = getpid() perf_event_open(&(0x7f0000000040)={0x1, 0x70}, r0, 0x0, 0xffffffffffffffff, 0x0) [ 50.211995] attempt to access beyond end of device [ 50.230708] loop6: rw=536870912, want=132, limit=112 2018/05/17 18:19:03 executing program 2: syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000200)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x0, &(0x7f0000000240)=ANY=[]) bind(0xffffffffffffffff, &(0x7f0000000100)=@l2={0x1f, 0x51f3, {0x100, 0x3c, 0x0, 0x0, 0x2}, 0x5}, 0xfffffffffffffd30) sched_setaffinity(0x0, 0x7, &(0x7f00000000c0)) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = creat(&(0x7f0000000240)='./file0/file0\x00', 0x0) write$binfmt_elf64(r0, &(0x7f0000000500)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x38}, [{}]}, 0xfdae) [ 50.270097] Buffer I/O error on dev loop6, logical block 131, lost async page write [ 50.293462] attempt to access beyond end of device [ 50.293469] loop2: rw=536870912, want=130, limit=112 [ 50.293476] Buffer I/O error on dev loop2, logical block 129, lost async page write [ 50.293486] attempt to access beyond end of device [ 50.293490] loop2: rw=536870912, want=131, limit=112 [ 50.293495] Buffer I/O error on dev loop2, logical block 130, lost async page write [ 50.293504] attempt to access beyond end of device [ 50.293509] loop2: rw=536870912, want=132, limit=112 [ 50.293514] Buffer I/O error on dev loop2, logical block 131, lost async page write [ 50.293523] attempt to access beyond end of device [ 50.293527] loop2: rw=536870912, want=133, limit=112 [ 50.293532] Buffer I/O error on dev loop2, logical block 132, lost async page write [ 50.293542] attempt to access beyond end of device [ 50.293546] loop2: rw=536870912, want=142, limit=112 [ 50.293551] Buffer I/O error on dev loop2, logical block 141, lost async page write [ 50.293560] attempt to access beyond end of device [ 50.293564] loop2: rw=536870912, want=143, limit=112 [ 50.293569] Buffer I/O error on dev loop2, logical block 142, lost async page write [ 50.293577] attempt to access beyond end of device [ 50.293582] loop2: rw=536870912, want=144, limit=112 [ 50.293586] Buffer I/O error on dev loop2, logical block 143, lost async page write [ 50.293596] attempt to access beyond end of device [ 50.293600] loop2: rw=536870912, want=145, limit=112 [ 50.293747] attempt to access beyond end of device [ 50.293751] loop2: rw=536870912, want=256, limit=112 [ 50.477219] attempt to access beyond end of device [ 50.482141] loop6: rw=536870912, want=133, limit=112 [ 50.487231] attempt to access beyond end of device [ 50.492235] loop6: rw=536870912, want=142, limit=112 [ 50.497326] attempt to access beyond end of device [ 50.501173] attempt to access beyond end of device [ 50.501179] loop2: rw=536870912, want=130, limit=112 [ 50.501193] attempt to access beyond end of device [ 50.501198] loop2: rw=536870912, want=131, limit=112 [ 50.501207] attempt to access beyond end of device [ 50.501211] loop2: rw=536870912, want=132, limit=112 [ 50.501220] attempt to access beyond end of device [ 50.501224] loop2: rw=536870912, want=133, limit=112 [ 50.501233] attempt to access beyond end of device [ 50.501237] loop2: rw=536870912, want=142, limit=112 [ 50.501246] attempt to access beyond end of device [ 50.501250] loop2: rw=536870912, want=143, limit=112 [ 50.501259] attempt to access beyond end of device [ 50.501263] loop2: rw=536870912, want=144, limit=112 [ 50.501273] attempt to access beyond end of device [ 50.501277] loop2: rw=536870912, want=145, limit=112 [ 50.501419] attempt to access beyond end of device [ 50.501423] loop2: rw=536870912, want=256, limit=112 [ 50.593084] loop6: rw=536870912, want=143, limit=112 [ 50.598176] attempt to access beyond end of device [ 50.603424] loop6: rw=536870912, want=144, limit=112 [ 50.608516] attempt to access beyond end of device [ 50.613440] loop6: rw=536870912, want=145, limit=112 [ 50.618585] attempt to access beyond end of device [ 50.623598] loop6: rw=536870912, want=256, limit=112 2018/05/17 18:19:03 executing program 7: setrlimit(0x7, &(0x7f0000becff0)) fanotify_init(0x0, 0x0) 2018/05/17 18:19:03 executing program 0: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='./file0\x00', &(0x7f0000000280)='devtmpfs\x00', 0x0, &(0x7f0000000500)) 2018/05/17 18:19:03 executing program 1: r0 = socket(0xa, 0x1, 0x0) ioctl(r0, 0x8912, &(0x7f0000000240)="c626262c8523bf012cf66f") r1 = syz_open_dev$tun(&(0x7f0000000040)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f00000000c0)={"69666230000800ffffffffffff00", 0x201012}) ioctl$TUNSETLINK(r1, 0x400454cd, 0x20) dup2(r0, r1) 2018/05/17 18:19:03 executing program 3: r0 = syz_open_dev$evdev(&(0x7f00000009c0)='/dev/input/event#\x00', 0x0, 0x0) ioctl$EVIOCSKEYCODE(r0, 0x40084502, &(0x7f0000000140)) 2018/05/17 18:19:03 executing program 5: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='./file0\x00', &(0x7f0000000280)='devtmpfs\x00', 0x0, &(0x7f0000000500)) 2018/05/17 18:19:03 executing program 4: r0 = socket(0xa, 0x1, 0x0) ioctl(r0, 0x8912, &(0x7f0000000240)="c626262c8523bf012cf66f") r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000280)="2f007e574d000330809022cfde26555dc9ecfe1974406edad38364782d63b6612854b9e49dbdcaef718197e37e870a308b1e3a798fa788a46d3025ef933e51828ab675064e2adbe9126423b4a73d68fbe99c6db2f160d49cb6cce76c27289a4f9d097354aaa5860d2383df87526baa184d90bb7729366c17bc33d765e9bc2f882a13f3a9c1f60660bd4fd2fa31d2c0a775242289bce062d10d24ded5406918a66b2c75c43fe1ff458ae5cd9fec63039ba5a7b66a60ede5ccdabc7ee77660ef2358ccdff02226021384b0c235f114ed9ade92767aecc256acdeb610df42e7169f240357f735ae5fe29017e51e27252f48b95bfbbb3a865535298bdc36d71db635f41c57771db77aeaff883feb3dc3cc24bd3c036e396ad3af37945058839e812270bc40901fa654e7cc3292a82fc80c374dc07142a1c2e9d3e2528e4fdac32bcaefe910ebd3b948a3bfebef5fa8d82473c7fbf3ec", 0x0, 0x0) fcntl$notify(r1, 0x402, 0x800000000000000d) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000100)="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", 0x0, 0x0) close(r2) 2018/05/17 18:19:03 executing program 6: syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000200)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x0, &(0x7f0000000240)=ANY=[]) bind(0xffffffffffffffff, &(0x7f0000000100)=@l2={0x1f, 0x51f3, {0x100, 0x3c, 0x0, 0x0, 0x2}, 0x5}, 0xfffffffffffffd30) sched_setaffinity(0x0, 0x7, &(0x7f00000000c0)) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = creat(&(0x7f0000000240)='./file0/file0\x00', 0x0) write$binfmt_elf64(r0, &(0x7f0000000500)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x38}, [{}]}, 0xfdae) 2018/05/17 18:19:03 executing program 2: syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000200)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x0, &(0x7f0000000240)=ANY=[]) bind(0xffffffffffffffff, &(0x7f0000000100)=@l2={0x1f, 0x51f3, {0x100, 0x3c, 0x0, 0x0, 0x2}, 0x5}, 0xfffffffffffffd30) sched_setaffinity(0x0, 0x7, &(0x7f00000000c0)) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = creat(&(0x7f0000000240)='./file0/file0\x00', 0x0) write$binfmt_elf64(r0, &(0x7f0000000500)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x38}, [{}]}, 0xfdae) 2018/05/17 18:19:03 executing program 7: r0 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000200)={'bridge_slave_1\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f00000018c0)={&(0x7f00000002c0)={0x10}, 0xc, &(0x7f0000001880)={&(0x7f00000004c0)=@setlink={0x28, 0x13, 0x105, 0x0, 0x0, {0x0, 0x0, 0x0, r1}, [@IFLA_XDP={0x8, 0x2b, [@nested={0x4, 0x1}]}]}, 0x28}, 0x1}, 0x0) 2018/05/17 18:19:04 executing program 4: r0 = socket(0xa, 0x1, 0x0) ioctl(r0, 0x8912, &(0x7f0000000240)="c626262c8523bf012cf66f") r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000280)="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", 0x0, 0x0) fcntl$notify(r1, 0x402, 0x800000000000000d) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000100)="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", 0x0, 0x0) close(r2) 2018/05/17 18:19:04 executing program 1: r0 = socket(0xa, 0x1, 0x0) ioctl(r0, 0x8912, &(0x7f0000000240)="c626262c8523bf012cf66f") r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000280)="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", 0x0, 0x0) fcntl$notify(r1, 0x402, 0x800000000000000d) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000100)="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", 0x0, 0x0) close(r2) [ 50.741261] attempt to access beyond end of device [ 50.748201] loop6: rw=536870912, want=130, limit=112 [ 50.758939] attempt to access beyond end of device [ 50.771433] loop6: rw=536870912, want=131, limit=112 2018/05/17 18:19:04 executing program 3: r0 = socket(0x200000000000011, 0x4000000000080003, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000140)={'sit0\x00', 0x0}) bind$packet(r0, &(0x7f0000000200)={0x11, 0x0, r1, 0x1, 0x0, 0x6, @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff]}, 0x14) sendmmsg$inet_sctp(r0, &(0x7f0000871fc8)=[{&(0x7f000086c000)=@in6={0xa, 0x0, 0x2}, 0x1c, &(0x7f0000d1e000), 0x0, &(0x7f0000dda000)}], 0x492492492492510, 0x0) 2018/05/17 18:19:04 executing program 7: r0 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000200)={'bridge_slave_1\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f00000018c0)={&(0x7f00000002c0)={0x10}, 0xc, &(0x7f0000001880)={&(0x7f00000004c0)=@setlink={0x28, 0x13, 0x105, 0x0, 0x0, {0x0, 0x0, 0x0, r1}, [@IFLA_XDP={0x8, 0x2b, [@nested={0x4, 0x1}]}]}, 0x28}, 0x1}, 0x0) 2018/05/17 18:19:04 executing program 1: r0 = socket(0xa, 0x1, 0x0) ioctl(r0, 0x8912, &(0x7f0000000240)="c626262c8523bf012cf66f") r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000280)="2f007e574d000330809022cfde26555dc9ecfe1974406edad38364782d63b6612854b9e49dbdcaef718197e37e870a308b1e3a798fa788a46d3025ef933e51828ab675064e2adbe9126423b4a73d68fbe99c6db2f160d49cb6cce76c27289a4f9d097354aaa5860d2383df87526baa184d90bb7729366c17bc33d765e9bc2f882a13f3a9c1f60660bd4fd2fa31d2c0a775242289bce062d10d24ded5406918a66b2c75c43fe1ff458ae5cd9fec63039ba5a7b66a60ede5ccdabc7ee77660ef2358ccdff02226021384b0c235f114ed9ade92767aecc256acdeb610df42e7169f240357f735ae5fe29017e51e27252f48b95bfbbb3a865535298bdc36d71db635f41c57771db77aeaff883feb3dc3cc24bd3c036e396ad3af37945058839e812270bc40901fa654e7cc3292a82fc80c374dc07142a1c2e9d3e2528e4fdac32bcaefe910ebd3b948a3bfebef5fa8d82473c7fbf3ec", 0x0, 0x0) fcntl$notify(r1, 0x402, 0x800000000000000d) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000100)="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", 0x0, 0x0) close(r2) 2018/05/17 18:19:04 executing program 4: r0 = socket(0xa, 0x1, 0x0) ioctl(r0, 0x8912, &(0x7f0000000240)="c626262c8523bf012cf66f") r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000280)="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", 0x0, 0x0) fcntl$notify(r1, 0x402, 0x800000000000000d) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000100)="2f007e574d000330809022cfde26555dc9ecfe1974406edad38364782d63b6612854b9e49dbdcaef718197e37e870a308b1e3a798fa788a46d3025ef933e51828ab675064e2adbe9126423b4a73d68fbe99c6db2f160d49cb6cce76c27289a4f9d097354aaa5860d2383df87526baa184d90bb7729366c17bc33d765e9bc2f882a13f3a9c1f60660bd4fd2fa31d2c0a775242289bce062d10d24ded5406918a66b2c75c43fe1ff458ae5cd9fec63039ba5a7b66a60ede5ccdabc7ee77660ef2358ccdff02226021384b0c235f114ed9ade92767aecc256acdeb610df42e7169f240357f735ae5fe29017e51e27252f48b95bfbbb3a865535298bdc36d71db635f41c57771db77aeaff883feb3dc3cc24bd3c036e396ad3af37945058839e812270bc40901fa654e7cc3292a82fc80c374dc07142a1c2e9d3e2528e4fdac32bcaefe910ebd3b948a3bfebef5fa8d82473c7fbf3ec", 0x0, 0x0) close(r2) [ 50.801625] attempt to access beyond end of device [ 50.821973] loop6: rw=536870912, want=132, limit=112 [ 50.860584] attempt to access beyond end of device [ 50.885565] loop6: rw=536870912, want=133, limit=112 [ 50.908424] attempt to access beyond end of device [ 50.923411] loop6: rw=536870912, want=142, limit=112 [ 50.931661] attempt to access beyond end of device [ 50.938492] loop6: rw=536870912, want=143, limit=112 [ 50.944493] attempt to access beyond end of device [ 50.950268] loop6: rw=536870912, want=144, limit=112 [ 50.955801] attempt to access beyond end of device [ 50.960719] loop6: rw=536870912, want=145, limit=112 [ 50.970795] attempt to access beyond end of device [ 50.979729] loop6: rw=536870912, want=256, limit=112 [ 51.011315] attempt to access beyond end of device [ 51.016256] loop2: rw=536870912, want=114, limit=112 [ 51.021853] attempt to access beyond end of device [ 51.026783] loop2: rw=536870912, want=115, limit=112 [ 51.031906] attempt to access beyond end of device [ 51.036990] loop2: rw=536870912, want=116, limit=112 [ 51.046276] attempt to access beyond end of device [ 51.051402] loop2: rw=536870912, want=117, limit=112 [ 51.056659] attempt to access beyond end of device 2018/05/17 18:19:04 executing program 7: r0 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000200)={'bridge_slave_1\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f00000018c0)={&(0x7f00000002c0)={0x10}, 0xc, &(0x7f0000001880)={&(0x7f00000004c0)=@setlink={0x28, 0x13, 0x105, 0x0, 0x0, {0x0, 0x0, 0x0, r1}, [@IFLA_XDP={0x8, 0x2b, [@nested={0x4, 0x1}]}]}, 0x28}, 0x1}, 0x0) 2018/05/17 18:19:04 executing program 1: r0 = socket(0xa, 0x1, 0x0) ioctl(r0, 0x8912, &(0x7f0000000240)="c626262c8523bf012cf66f") r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000280)="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", 0x0, 0x0) fcntl$notify(r1, 0x402, 0x800000000000000d) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000100)="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", 0x0, 0x0) close(r2) 2018/05/17 18:19:04 executing program 4: r0 = socket(0xa, 0x1, 0x0) ioctl(r0, 0x8912, &(0x7f0000000240)="c626262c8523bf012cf66f") r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000280)="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", 0x0, 0x0) fcntl$notify(r1, 0x402, 0x800000000000000d) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000100)="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", 0x0, 0x0) close(r2) 2018/05/17 18:19:04 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_xfrm(r0, &(0x7f0000000500)={&(0x7f0000000340)={0x10}, 0xc, &(0x7f00000004c0)={&(0x7f0000000380)=@getspdinfo={0x14, 0x25, 0x711}, 0x14}, 0x1}, 0x0) 2018/05/17 18:19:04 executing program 0: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='./file0\x00', &(0x7f0000000280)='devtmpfs\x00', 0x0, &(0x7f0000000500)) 2018/05/17 18:19:04 executing program 2: r0 = socket(0xa, 0x2, 0x0) r1 = open(&(0x7f00004b8ff8)='./file0\x00', 0x200000000028042, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0xfffffffffffffffc, 0x0, @ipv4={[], [0xff, 0xff], @loopback=0x7f000001}}, 0x1c) fallocate(r1, 0x0, 0xffff, 0x9) sched_setaffinity(0x0, 0x7, &(0x7f00000000c0)=0x9) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendfile(r0, r1, &(0x7f0000e64ff8), 0x10001) 2018/05/17 18:19:04 executing program 3: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$ndb(&(0x7f0000000100)='/dev/nbd#\x00', 0xffffffffffffffff, 0x0) ioctl$BLKTRACESETUP(r1, 0xc0481273, &(0x7f0000000000)={[], 0x0, 0x9, 0x8001}) r2 = fcntl$dupfd(r0, 0x406, r0) setsockopt$packet_rx_ring(r2, 0x107, 0x5, &(0x7f00000000c0)=@req={0x9, 0x2, 0x4, 0xfff}, 0x10) ioctl$BLKTRACETEARDOWN(r1, 0x1276, 0x0) openat$selinux_status(0xffffffffffffff9c, &(0x7f0000000240)='/selinux/status\x00', 0x0, 0x0) [ 51.062503] loop2: rw=536870912, want=130, limit=112 [ 51.070572] attempt to access beyond end of device [ 51.081393] loop2: rw=536870912, want=131, limit=112 [ 51.086502] attempt to access beyond end of device [ 51.091778] loop2: rw=536870912, want=132, limit=112 [ 51.096876] attempt to access beyond end of device [ 51.102261] loop2: rw=536870912, want=133, limit=112 [ 51.107432] attempt to access beyond end of device 2018/05/17 18:19:04 executing program 6: r0 = socket$inet_udp(0x2, 0x2, 0x0) connect$inet(r0, &(0x7f0000000000)={0x2, 0x0, @remote={0xac, 0x14, 0x14, 0xbb}}, 0x10) r1 = socket(0xa, 0x1, 0x0) ioctl(r1, 0x8912, &(0x7f0000000240)="c626262c8523bf012cf66f") setsockopt$inet_MCAST_JOIN_GROUP(r1, 0x0, 0x2a, &(0x7f0000000040)={0x2, {{0x2, 0x0, @multicast2=0xe0000002}}}, 0x88) setsockopt$sock_int(r0, 0x1, 0xb, &(0x7f0000000140), 0x4) 2018/05/17 18:19:04 executing program 4: r0 = openat$sequencer2(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/sequencer2\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_SUBSCRIPTION(r0, 0x40085112, &(0x7f0000b18000)={{0xffffff93}, {0xffffffa0}}) 2018/05/17 18:19:04 executing program 1: r0 = socket(0xa, 0x1, 0x0) ioctl(r0, 0x8912, &(0x7f0000000240)="c626262c8523bf012cf66f") r1 = syz_open_dev$mice(&(0x7f00000000c0)='/dev/input/mice\x00', 0x0, 0xa000) pipe2(&(0x7f0000000340)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) dup2(r2, r1) [ 51.114211] loop2: rw=536870912, want=252, limit=112 2018/05/17 18:19:04 executing program 7: r0 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000200)={'bridge_slave_1\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f00000018c0)={&(0x7f00000002c0)={0x10}, 0xc, &(0x7f0000001880)={&(0x7f00000004c0)=@setlink={0x28, 0x13, 0x105, 0x0, 0x0, {0x0, 0x0, 0x0, r1}, [@IFLA_XDP={0x8, 0x2b, [@nested={0x4, 0x1}]}]}, 0x28}, 0x1}, 0x0) 2018/05/17 18:19:04 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_xfrm(r0, &(0x7f0000000500)={&(0x7f0000000340)={0x10}, 0xc, &(0x7f00000004c0)={&(0x7f0000000380)=@getspdinfo={0x14, 0x25, 0x711}, 0x14}, 0x1}, 0x0) [ 51.142391] attempt to access beyond end of device [ 51.147336] loop6: rw=536870912, want=114, limit=112 [ 51.152462] attempt to access beyond end of device [ 51.161889] loop6: rw=536870912, want=115, limit=112 [ 51.167004] attempt to access beyond end of device 2018/05/17 18:19:04 executing program 7: r0 = openat$keychord(0xffffffffffffff9c, &(0x7f00000005c0)='/dev/keychord\x00', 0x200242, 0x0) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000100)="2e2f6367726f75702fe359ed7379", 0x1ff) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000440)='/dev/ptmx\x00', 0xfffffffffffefffc, 0x0) ioctl$TCSETS(r2, 0x40045431, &(0x7f00005befdc)) r3 = dup2(r1, r1) r4 = timerfd_create(0x0, 0x0) timerfd_settime(r4, 0x1, &(0x7f0000000080)={{0x0, 0x989680}, {0x0, 0x989680}}, &(0x7f0000000140)) timerfd_gettime(r4, &(0x7f00000000c0)) openat$ptmx(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/ptmx\x00', 0x80000, 0x0) getsockopt$inet_sctp_SCTP_CONTEXT(0xffffffffffffffff, 0x84, 0x11, &(0x7f0000000240)={0x0, 0x2800000000}, &(0x7f0000000280)=0x8) getsockopt$inet_sctp6_SCTP_GET_LOCAL_ADDRS(r3, 0x84, 0x6d, &(0x7f0000000700)=ANY=[@ANYRES32=r5, @ANYBLOB="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"], &(0x7f0000000380)=0x2) setsockopt$bt_BT_SECURITY(r3, 0x112, 0x4, &(0x7f0000000400)={0x80000000, 0xfffffffffffffffe}, 0x2) r6 = syz_open_pts(r2, 0x0) ioctl$TIOCEXCL(r2, 0x540c) ioctl$sock_SIOCGPGRP(r3, 0x8904, &(0x7f00000006c0)=0x0) perf_event_open(&(0x7f0000000640)={0x5, 0x70, 0x5, 0xffffffffffffff9d, 0x6, 0xfffffffffffffffb, 0x0, 0x3ff, 0x10000, 0xa, 0x6, 0x1, 0x8000, 0x0, 0xec, 0x1, 0x6, 0x2, 0xffffffffffff0001, 0x8d, 0xb93, 0x6, 0x4, 0x9, 0x3, 0x7, 0x457, 0x9, 0x83, 0x2, 0x8, 0xfffffffffffffffe, 0x400, 0xfff, 0x0, 0x3, 0xffffffff, 0x5, 0x0, 0x200, 0x4, @perf_bp={&(0x7f0000000600), 0xf}, 0x400, 0xfb, 0x686, 0x7, 0x8000000000000, 0xee89, 0x98}, r7, 0xb, r0, 0x8) getsockopt$inet_sctp6_SCTP_RECONFIG_SUPPORTED(r3, 0x84, 0x75, &(0x7f0000000300)={r5, 0x6}, &(0x7f0000000340)=0x8) ioctl$sock_netrom_TIOCINQ(r3, 0x541b, &(0x7f00000002c0)) r8 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000140)='/dev/snapshot\x00', 0x200000, 0x0) r9 = syz_open_dev$usbmon(&(0x7f00000001c0)='/dev/usbmon#\x00', 0x4b4, 0x200) ioctl$sock_inet_udp_SIOCINQ(r8, 0x541b, &(0x7f0000000180)) ioctl$sock_inet_SIOCGIFNETMASK(r9, 0x891b, &(0x7f0000000200)={'erspan0\x00', {0x2, 0x4e24, @local={0xac, 0x14, 0x14, 0xaa}}}) ioctl$TCSETAF(r6, 0x5412, &(0x7f00000000c0)) r10 = socket$inet_sctp(0x2, 0x5, 0x84) ioctl$VT_ACTIVATE(r2, 0x5606, 0x3ff) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f00000003c0)='./cgroup/syz1\x00', 0x1ff) fcntl$dupfd(r1, 0x406, r10) clone(0x24000000, &(0x7f0000000680), &(0x7f0000000800), &(0x7f0000000640), &(0x7f0000000480)="6cbd51a68b34088f82798abb0d96907921d405b768e0c7aff34f5c20e8e437e7a3de202da386db8881305587bb6e") 2018/05/17 18:19:04 executing program 4: r0 = openat$sequencer2(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/sequencer2\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_SUBSCRIPTION(r0, 0x40085112, &(0x7f0000b18000)={{0xffffff93}, {0xffffffa0}}) 2018/05/17 18:19:04 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_xfrm(r0, &(0x7f0000000500)={&(0x7f0000000340)={0x10}, 0xc, &(0x7f00000004c0)={&(0x7f0000000380)=@getspdinfo={0x14, 0x25, 0x711}, 0x14}, 0x1}, 0x0) [ 51.234213] loop6: rw=536870912, want=116, limit=112 2018/05/17 18:19:04 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_xfrm(r0, &(0x7f0000000500)={&(0x7f0000000340)={0x10}, 0xc, &(0x7f00000004c0)={&(0x7f0000000380)=@getspdinfo={0x14, 0x25, 0x711}, 0x14}, 0x1}, 0x0) [ 51.256729] attempt to access beyond end of device [ 51.278560] loop6: rw=536870912, want=117, limit=112 [ 51.309287] attempt to access beyond end of device [ 51.327949] loop6: rw=536870912, want=130, limit=112 [ 51.341030] attempt to access beyond end of device [ 51.346363] loop6: rw=536870912, want=131, limit=112 [ 51.351640] attempt to access beyond end of device [ 51.356595] loop6: rw=536870912, want=132, limit=112 [ 51.361788] attempt to access beyond end of device [ 51.366745] loop6: rw=536870912, want=133, limit=112 [ 51.372077] attempt to access beyond end of device [ 51.377038] loop6: rw=536870912, want=252, limit=112 2018/05/17 18:19:04 executing program 4: r0 = openat$sequencer2(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/sequencer2\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_SUBSCRIPTION(r0, 0x40085112, &(0x7f0000b18000)={{0xffffff93}, {0xffffffa0}}) 2018/05/17 18:19:04 executing program 2: r0 = socket(0xa, 0x2, 0x0) r1 = open(&(0x7f00004b8ff8)='./file0\x00', 0x200000000028042, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0xfffffffffffffffc, 0x0, @ipv4={[], [0xff, 0xff], @loopback=0x7f000001}}, 0x1c) fallocate(r1, 0x0, 0xffff, 0x9) sched_setaffinity(0x0, 0x7, &(0x7f00000000c0)=0x9) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendfile(r0, r1, &(0x7f0000e64ff8), 0x10001) 2018/05/17 18:19:04 executing program 1: r0 = socket(0xa, 0x1, 0x0) ioctl(r0, 0x8912, &(0x7f0000000240)="c626262c8523bf012cf66f") r1 = syz_open_dev$mice(&(0x7f00000000c0)='/dev/input/mice\x00', 0x0, 0xa000) pipe2(&(0x7f0000000340)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) dup2(r2, r1) 2018/05/17 18:19:04 executing program 5: r0 = socket(0xa, 0x1, 0x0) ioctl(r0, 0x8912, &(0x7f0000000240)="c626262c8523bf012cf66f") r1 = syz_open_dev$mice(&(0x7f00000000c0)='/dev/input/mice\x00', 0x0, 0xa000) pipe2(&(0x7f0000000340)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) dup2(r2, r1) 2018/05/17 18:19:04 executing program 3: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$ndb(&(0x7f0000000100)='/dev/nbd#\x00', 0xffffffffffffffff, 0x0) ioctl$BLKTRACESETUP(r1, 0xc0481273, &(0x7f0000000000)={[], 0x0, 0x9, 0x8001}) r2 = fcntl$dupfd(r0, 0x406, r0) setsockopt$packet_rx_ring(r2, 0x107, 0x5, &(0x7f00000000c0)=@req={0x9, 0x2, 0x4, 0xfff}, 0x10) ioctl$BLKTRACETEARDOWN(r1, 0x1276, 0x0) openat$selinux_status(0xffffffffffffff9c, &(0x7f0000000240)='/selinux/status\x00', 0x0, 0x0) 2018/05/17 18:19:04 executing program 0: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='./file0\x00', &(0x7f0000000280)='devtmpfs\x00', 0x0, &(0x7f0000000500)) 2018/05/17 18:19:04 executing program 6: r0 = socket$inet_udp(0x2, 0x2, 0x0) connect$inet(r0, &(0x7f0000000000)={0x2, 0x0, @remote={0xac, 0x14, 0x14, 0xbb}}, 0x10) r1 = socket(0xa, 0x1, 0x0) ioctl(r1, 0x8912, &(0x7f0000000240)="c626262c8523bf012cf66f") setsockopt$inet_MCAST_JOIN_GROUP(r1, 0x0, 0x2a, &(0x7f0000000040)={0x2, {{0x2, 0x0, @multicast2=0xe0000002}}}, 0x88) setsockopt$sock_int(r0, 0x1, 0xb, &(0x7f0000000140), 0x4) 2018/05/17 18:19:04 executing program 7: r0 = openat$keychord(0xffffffffffffff9c, &(0x7f00000005c0)='/dev/keychord\x00', 0x200242, 0x0) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000100)="2e2f6367726f75702fe359ed7379", 0x1ff) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000440)='/dev/ptmx\x00', 0xfffffffffffefffc, 0x0) ioctl$TCSETS(r2, 0x40045431, &(0x7f00005befdc)) r3 = dup2(r1, r1) r4 = timerfd_create(0x0, 0x0) timerfd_settime(r4, 0x1, &(0x7f0000000080)={{0x0, 0x989680}, {0x0, 0x989680}}, &(0x7f0000000140)) timerfd_gettime(r4, &(0x7f00000000c0)) openat$ptmx(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/ptmx\x00', 0x80000, 0x0) getsockopt$inet_sctp_SCTP_CONTEXT(0xffffffffffffffff, 0x84, 0x11, &(0x7f0000000240)={0x0, 0x2800000000}, &(0x7f0000000280)=0x8) getsockopt$inet_sctp6_SCTP_GET_LOCAL_ADDRS(r3, 0x84, 0x6d, &(0x7f0000000700)=ANY=[@ANYRES32=r5, @ANYBLOB="aa0000003899b6ff646b4231f61da75885efb5fd4d6b0cbfa0d8e86b3992e7b21780b90aa0ee0a3a220a8649f44db5d321a2e0199f497fde40515f832cea8b0dddd16208e2d7b2a066055b18c87e6b28410cb035d6e7e97ae58a8e7a61ad22cb411f72bf493c3244388b469971cdfd02b823ae8781033fbe819d6ad94e66c93788dd0576cc1ac9f3b5d1774ff3c0cca0aa04bbaad8f473e12de028b941892cd664a85dac80c62b78f1b6b9c3fa826584f84a6aa576d8859622991f411dced31e0a7426d5072607a94aabb40ad17f5f5ed0808d8942ec434ede38cce08d93dc56674cafb62d2e723e0e8b0435fd63b1a0201f91d6fd2c643aadeda9973d01696352860e3421f20fad7b3643d6d82cfd2dfdbd0500e0ebb6c06de639288d8b3466a79bc980a753be14794a592dbe514cafd6eb1d74a38e5feaf1830aaab2b14eb416099093c7cba810a92bc2610000a93985cbd685c386fbd18ed38874552406756cd6f4411ca0dc274e8398fd1cbc9bea019d92c715e3be842c80aecdaf695e3f2349fd433b6e5b677575042ec042bf922f"], &(0x7f0000000380)=0x2) setsockopt$bt_BT_SECURITY(r3, 0x112, 0x4, &(0x7f0000000400)={0x80000000, 0xfffffffffffffffe}, 0x2) r6 = syz_open_pts(r2, 0x0) ioctl$TIOCEXCL(r2, 0x540c) ioctl$sock_SIOCGPGRP(r3, 0x8904, &(0x7f00000006c0)=0x0) perf_event_open(&(0x7f0000000640)={0x5, 0x70, 0x5, 0xffffffffffffff9d, 0x6, 0xfffffffffffffffb, 0x0, 0x3ff, 0x10000, 0xa, 0x6, 0x1, 0x8000, 0x0, 0xec, 0x1, 0x6, 0x2, 0xffffffffffff0001, 0x8d, 0xb93, 0x6, 0x4, 0x9, 0x3, 0x7, 0x457, 0x9, 0x83, 0x2, 0x8, 0xfffffffffffffffe, 0x400, 0xfff, 0x0, 0x3, 0xffffffff, 0x5, 0x0, 0x200, 0x4, @perf_bp={&(0x7f0000000600), 0xf}, 0x400, 0xfb, 0x686, 0x7, 0x8000000000000, 0xee89, 0x98}, r7, 0xb, r0, 0x8) getsockopt$inet_sctp6_SCTP_RECONFIG_SUPPORTED(r3, 0x84, 0x75, &(0x7f0000000300)={r5, 0x6}, &(0x7f0000000340)=0x8) ioctl$sock_netrom_TIOCINQ(r3, 0x541b, &(0x7f00000002c0)) r8 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000140)='/dev/snapshot\x00', 0x200000, 0x0) r9 = syz_open_dev$usbmon(&(0x7f00000001c0)='/dev/usbmon#\x00', 0x4b4, 0x200) ioctl$sock_inet_udp_SIOCINQ(r8, 0x541b, &(0x7f0000000180)) ioctl$sock_inet_SIOCGIFNETMASK(r9, 0x891b, &(0x7f0000000200)={'erspan0\x00', {0x2, 0x4e24, @local={0xac, 0x14, 0x14, 0xaa}}}) ioctl$TCSETAF(r6, 0x5412, &(0x7f00000000c0)) r10 = socket$inet_sctp(0x2, 0x5, 0x84) ioctl$VT_ACTIVATE(r2, 0x5606, 0x3ff) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f00000003c0)='./cgroup/syz1\x00', 0x1ff) fcntl$dupfd(r1, 0x406, r10) clone(0x24000000, &(0x7f0000000680), &(0x7f0000000800), &(0x7f0000000640), &(0x7f0000000480)="6cbd51a68b34088f82798abb0d96907921d405b768e0c7aff34f5c20e8e437e7a3de202da386db8881305587bb6e") 2018/05/17 18:19:04 executing program 6: r0 = socket$inet_udp(0x2, 0x2, 0x0) connect$inet(r0, &(0x7f0000000000)={0x2, 0x0, @remote={0xac, 0x14, 0x14, 0xbb}}, 0x10) r1 = socket(0xa, 0x1, 0x0) ioctl(r1, 0x8912, &(0x7f0000000240)="c626262c8523bf012cf66f") setsockopt$inet_MCAST_JOIN_GROUP(r1, 0x0, 0x2a, &(0x7f0000000040)={0x2, {{0x2, 0x0, @multicast2=0xe0000002}}}, 0x88) setsockopt$sock_int(r0, 0x1, 0xb, &(0x7f0000000140), 0x4) 2018/05/17 18:19:04 executing program 4: r0 = openat$sequencer2(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/sequencer2\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_SUBSCRIPTION(r0, 0x40085112, &(0x7f0000b18000)={{0xffffff93}, {0xffffffa0}}) 2018/05/17 18:19:04 executing program 1: r0 = socket(0xa, 0x1, 0x0) ioctl(r0, 0x8912, &(0x7f0000000240)="c626262c8523bf012cf66f") r1 = syz_open_dev$mice(&(0x7f00000000c0)='/dev/input/mice\x00', 0x0, 0xa000) pipe2(&(0x7f0000000340)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) dup2(r2, r1) 2018/05/17 18:19:04 executing program 5: r0 = socket(0xa, 0x1, 0x0) ioctl(r0, 0x8912, &(0x7f0000000240)="c626262c8523bf012cf66f") r1 = syz_open_dev$mice(&(0x7f00000000c0)='/dev/input/mice\x00', 0x0, 0xa000) pipe2(&(0x7f0000000340)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) dup2(r2, r1) 2018/05/17 18:19:04 executing program 4: r0 = openat$keychord(0xffffffffffffff9c, &(0x7f00000005c0)='/dev/keychord\x00', 0x200242, 0x0) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000100)="2e2f6367726f75702fe359ed7379", 0x1ff) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000440)='/dev/ptmx\x00', 0xfffffffffffefffc, 0x0) ioctl$TCSETS(r2, 0x40045431, &(0x7f00005befdc)) r3 = dup2(r1, r1) r4 = timerfd_create(0x0, 0x0) timerfd_settime(r4, 0x1, &(0x7f0000000080)={{0x0, 0x989680}, {0x0, 0x989680}}, &(0x7f0000000140)) timerfd_gettime(r4, &(0x7f00000000c0)) openat$ptmx(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/ptmx\x00', 0x80000, 0x0) getsockopt$inet_sctp_SCTP_CONTEXT(0xffffffffffffffff, 0x84, 0x11, &(0x7f0000000240)={0x0, 0x2800000000}, &(0x7f0000000280)=0x8) getsockopt$inet_sctp6_SCTP_GET_LOCAL_ADDRS(r3, 0x84, 0x6d, &(0x7f0000000700)=ANY=[@ANYRES32=r5, @ANYBLOB="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"], &(0x7f0000000380)=0x2) setsockopt$bt_BT_SECURITY(r3, 0x112, 0x4, &(0x7f0000000400)={0x80000000, 0xfffffffffffffffe}, 0x2) r6 = syz_open_pts(r2, 0x0) ioctl$TIOCEXCL(r2, 0x540c) ioctl$sock_SIOCGPGRP(r3, 0x8904, &(0x7f00000006c0)=0x0) perf_event_open(&(0x7f0000000640)={0x5, 0x70, 0x5, 0xffffffffffffff9d, 0x6, 0xfffffffffffffffb, 0x0, 0x3ff, 0x10000, 0xa, 0x6, 0x1, 0x8000, 0x0, 0xec, 0x1, 0x6, 0x2, 0xffffffffffff0001, 0x8d, 0xb93, 0x6, 0x4, 0x9, 0x3, 0x7, 0x457, 0x9, 0x83, 0x2, 0x8, 0xfffffffffffffffe, 0x400, 0xfff, 0x0, 0x3, 0xffffffff, 0x5, 0x0, 0x200, 0x4, @perf_bp={&(0x7f0000000600), 0xf}, 0x400, 0xfb, 0x686, 0x7, 0x8000000000000, 0xee89, 0x98}, r7, 0xb, r0, 0x8) getsockopt$inet_sctp6_SCTP_RECONFIG_SUPPORTED(r3, 0x84, 0x75, &(0x7f0000000300)={r5, 0x6}, &(0x7f0000000340)=0x8) ioctl$sock_netrom_TIOCINQ(r3, 0x541b, &(0x7f00000002c0)) r8 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000140)='/dev/snapshot\x00', 0x200000, 0x0) r9 = syz_open_dev$usbmon(&(0x7f00000001c0)='/dev/usbmon#\x00', 0x4b4, 0x200) ioctl$sock_inet_udp_SIOCINQ(r8, 0x541b, &(0x7f0000000180)) ioctl$sock_inet_SIOCGIFNETMASK(r9, 0x891b, &(0x7f0000000200)={'erspan0\x00', {0x2, 0x4e24, @local={0xac, 0x14, 0x14, 0xaa}}}) ioctl$TCSETAF(r6, 0x5412, &(0x7f00000000c0)) r10 = socket$inet_sctp(0x2, 0x5, 0x84) ioctl$VT_ACTIVATE(r2, 0x5606, 0x3ff) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f00000003c0)='./cgroup/syz1\x00', 0x1ff) fcntl$dupfd(r1, 0x406, r10) clone(0x24000000, &(0x7f0000000680), &(0x7f0000000800), &(0x7f0000000640), &(0x7f0000000480)="6cbd51a68b34088f82798abb0d96907921d405b768e0c7aff34f5c20e8e437e7a3de202da386db8881305587bb6e") 2018/05/17 18:19:04 executing program 6: r0 = socket$inet_udp(0x2, 0x2, 0x0) connect$inet(r0, &(0x7f0000000000)={0x2, 0x0, @remote={0xac, 0x14, 0x14, 0xbb}}, 0x10) r1 = socket(0xa, 0x1, 0x0) ioctl(r1, 0x8912, &(0x7f0000000240)="c626262c8523bf012cf66f") setsockopt$inet_MCAST_JOIN_GROUP(r1, 0x0, 0x2a, &(0x7f0000000040)={0x2, {{0x2, 0x0, @multicast2=0xe0000002}}}, 0x88) setsockopt$sock_int(r0, 0x1, 0xb, &(0x7f0000000140), 0x4) 2018/05/17 18:19:04 executing program 5: r0 = socket(0xa, 0x1, 0x0) ioctl(r0, 0x8912, &(0x7f0000000240)="c626262c8523bf012cf66f") r1 = syz_open_dev$mice(&(0x7f00000000c0)='/dev/input/mice\x00', 0x0, 0xa000) pipe2(&(0x7f0000000340)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) dup2(r2, r1) 2018/05/17 18:19:05 executing program 7: r0 = openat$keychord(0xffffffffffffff9c, &(0x7f00000005c0)='/dev/keychord\x00', 0x200242, 0x0) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000100)="2e2f6367726f75702fe359ed7379", 0x1ff) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000440)='/dev/ptmx\x00', 0xfffffffffffefffc, 0x0) ioctl$TCSETS(r2, 0x40045431, &(0x7f00005befdc)) r3 = dup2(r1, r1) r4 = timerfd_create(0x0, 0x0) timerfd_settime(r4, 0x1, &(0x7f0000000080)={{0x0, 0x989680}, {0x0, 0x989680}}, &(0x7f0000000140)) timerfd_gettime(r4, &(0x7f00000000c0)) openat$ptmx(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/ptmx\x00', 0x80000, 0x0) getsockopt$inet_sctp_SCTP_CONTEXT(0xffffffffffffffff, 0x84, 0x11, &(0x7f0000000240)={0x0, 0x2800000000}, &(0x7f0000000280)=0x8) getsockopt$inet_sctp6_SCTP_GET_LOCAL_ADDRS(r3, 0x84, 0x6d, &(0x7f0000000700)=ANY=[@ANYRES32=r5, @ANYBLOB="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"], &(0x7f0000000380)=0x2) setsockopt$bt_BT_SECURITY(r3, 0x112, 0x4, &(0x7f0000000400)={0x80000000, 0xfffffffffffffffe}, 0x2) r6 = syz_open_pts(r2, 0x0) ioctl$TIOCEXCL(r2, 0x540c) ioctl$sock_SIOCGPGRP(r3, 0x8904, &(0x7f00000006c0)=0x0) perf_event_open(&(0x7f0000000640)={0x5, 0x70, 0x5, 0xffffffffffffff9d, 0x6, 0xfffffffffffffffb, 0x0, 0x3ff, 0x10000, 0xa, 0x6, 0x1, 0x8000, 0x0, 0xec, 0x1, 0x6, 0x2, 0xffffffffffff0001, 0x8d, 0xb93, 0x6, 0x4, 0x9, 0x3, 0x7, 0x457, 0x9, 0x83, 0x2, 0x8, 0xfffffffffffffffe, 0x400, 0xfff, 0x0, 0x3, 0xffffffff, 0x5, 0x0, 0x200, 0x4, @perf_bp={&(0x7f0000000600), 0xf}, 0x400, 0xfb, 0x686, 0x7, 0x8000000000000, 0xee89, 0x98}, r7, 0xb, r0, 0x8) getsockopt$inet_sctp6_SCTP_RECONFIG_SUPPORTED(r3, 0x84, 0x75, &(0x7f0000000300)={r5, 0x6}, &(0x7f0000000340)=0x8) ioctl$sock_netrom_TIOCINQ(r3, 0x541b, &(0x7f00000002c0)) r8 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000140)='/dev/snapshot\x00', 0x200000, 0x0) r9 = syz_open_dev$usbmon(&(0x7f00000001c0)='/dev/usbmon#\x00', 0x4b4, 0x200) ioctl$sock_inet_udp_SIOCINQ(r8, 0x541b, &(0x7f0000000180)) ioctl$sock_inet_SIOCGIFNETMASK(r9, 0x891b, &(0x7f0000000200)={'erspan0\x00', {0x2, 0x4e24, @local={0xac, 0x14, 0x14, 0xaa}}}) ioctl$TCSETAF(r6, 0x5412, &(0x7f00000000c0)) r10 = socket$inet_sctp(0x2, 0x5, 0x84) ioctl$VT_ACTIVATE(r2, 0x5606, 0x3ff) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f00000003c0)='./cgroup/syz1\x00', 0x1ff) fcntl$dupfd(r1, 0x406, r10) clone(0x24000000, &(0x7f0000000680), &(0x7f0000000800), &(0x7f0000000640), &(0x7f0000000480)="6cbd51a68b34088f82798abb0d96907921d405b768e0c7aff34f5c20e8e437e7a3de202da386db8881305587bb6e") 2018/05/17 18:19:05 executing program 1: r0 = socket(0xa, 0x1, 0x0) ioctl(r0, 0x8912, &(0x7f0000000240)="c626262c8523bf012cf66f") r1 = syz_open_dev$mice(&(0x7f00000000c0)='/dev/input/mice\x00', 0x0, 0xa000) pipe2(&(0x7f0000000340)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) dup2(r2, r1) 2018/05/17 18:19:05 executing program 0: r0 = openat$keychord(0xffffffffffffff9c, &(0x7f00000005c0)='/dev/keychord\x00', 0x200242, 0x0) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000100)="2e2f6367726f75702fe359ed7379", 0x1ff) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000440)='/dev/ptmx\x00', 0xfffffffffffefffc, 0x0) ioctl$TCSETS(r2, 0x40045431, &(0x7f00005befdc)) r3 = dup2(r1, r1) r4 = timerfd_create(0x0, 0x0) timerfd_settime(r4, 0x1, &(0x7f0000000080)={{0x0, 0x989680}, {0x0, 0x989680}}, &(0x7f0000000140)) timerfd_gettime(r4, &(0x7f00000000c0)) openat$ptmx(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/ptmx\x00', 0x80000, 0x0) getsockopt$inet_sctp_SCTP_CONTEXT(0xffffffffffffffff, 0x84, 0x11, &(0x7f0000000240)={0x0, 0x2800000000}, &(0x7f0000000280)=0x8) getsockopt$inet_sctp6_SCTP_GET_LOCAL_ADDRS(r3, 0x84, 0x6d, &(0x7f0000000700)=ANY=[@ANYRES32=r5, @ANYBLOB="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"], &(0x7f0000000380)=0x2) setsockopt$bt_BT_SECURITY(r3, 0x112, 0x4, &(0x7f0000000400)={0x80000000, 0xfffffffffffffffe}, 0x2) r6 = syz_open_pts(r2, 0x0) ioctl$TIOCEXCL(r2, 0x540c) ioctl$sock_SIOCGPGRP(r3, 0x8904, &(0x7f00000006c0)=0x0) perf_event_open(&(0x7f0000000640)={0x5, 0x70, 0x5, 0xffffffffffffff9d, 0x6, 0xfffffffffffffffb, 0x0, 0x3ff, 0x10000, 0xa, 0x6, 0x1, 0x8000, 0x0, 0xec, 0x1, 0x6, 0x2, 0xffffffffffff0001, 0x8d, 0xb93, 0x6, 0x4, 0x9, 0x3, 0x7, 0x457, 0x9, 0x83, 0x2, 0x8, 0xfffffffffffffffe, 0x400, 0xfff, 0x0, 0x3, 0xffffffff, 0x5, 0x0, 0x200, 0x4, @perf_bp={&(0x7f0000000600), 0xf}, 0x400, 0xfb, 0x686, 0x7, 0x8000000000000, 0xee89, 0x98}, r7, 0xb, r0, 0x8) getsockopt$inet_sctp6_SCTP_RECONFIG_SUPPORTED(r3, 0x84, 0x75, &(0x7f0000000300)={r5, 0x6}, &(0x7f0000000340)=0x8) ioctl$sock_netrom_TIOCINQ(r3, 0x541b, &(0x7f00000002c0)) r8 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000140)='/dev/snapshot\x00', 0x200000, 0x0) r9 = syz_open_dev$usbmon(&(0x7f00000001c0)='/dev/usbmon#\x00', 0x4b4, 0x200) ioctl$sock_inet_udp_SIOCINQ(r8, 0x541b, &(0x7f0000000180)) ioctl$sock_inet_SIOCGIFNETMASK(r9, 0x891b, &(0x7f0000000200)={'erspan0\x00', {0x2, 0x4e24, @local={0xac, 0x14, 0x14, 0xaa}}}) ioctl$TCSETAF(r6, 0x5412, &(0x7f00000000c0)) r10 = socket$inet_sctp(0x2, 0x5, 0x84) ioctl$VT_ACTIVATE(r2, 0x5606, 0x3ff) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f00000003c0)='./cgroup/syz1\x00', 0x1ff) fcntl$dupfd(r1, 0x406, r10) clone(0x24000000, &(0x7f0000000680), &(0x7f0000000800), &(0x7f0000000640), &(0x7f0000000480)="6cbd51a68b34088f82798abb0d96907921d405b768e0c7aff34f5c20e8e437e7a3de202da386db8881305587bb6e") 2018/05/17 18:19:05 executing program 6: r0 = openat$keychord(0xffffffffffffff9c, &(0x7f00000005c0)='/dev/keychord\x00', 0x200242, 0x0) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000100)="2e2f6367726f75702fe359ed7379", 0x1ff) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000440)='/dev/ptmx\x00', 0xfffffffffffefffc, 0x0) ioctl$TCSETS(r2, 0x40045431, &(0x7f00005befdc)) r3 = dup2(r1, r1) r4 = timerfd_create(0x0, 0x0) timerfd_settime(r4, 0x1, &(0x7f0000000080)={{0x0, 0x989680}, {0x0, 0x989680}}, &(0x7f0000000140)) timerfd_gettime(r4, &(0x7f00000000c0)) openat$ptmx(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/ptmx\x00', 0x80000, 0x0) getsockopt$inet_sctp_SCTP_CONTEXT(0xffffffffffffffff, 0x84, 0x11, &(0x7f0000000240)={0x0, 0x2800000000}, &(0x7f0000000280)=0x8) getsockopt$inet_sctp6_SCTP_GET_LOCAL_ADDRS(r3, 0x84, 0x6d, &(0x7f0000000700)=ANY=[@ANYRES32=r5, @ANYBLOB="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"], &(0x7f0000000380)=0x2) setsockopt$bt_BT_SECURITY(r3, 0x112, 0x4, &(0x7f0000000400)={0x80000000, 0xfffffffffffffffe}, 0x2) r6 = syz_open_pts(r2, 0x0) ioctl$TIOCEXCL(r2, 0x540c) ioctl$sock_SIOCGPGRP(r3, 0x8904, &(0x7f00000006c0)=0x0) perf_event_open(&(0x7f0000000640)={0x5, 0x70, 0x5, 0xffffffffffffff9d, 0x6, 0xfffffffffffffffb, 0x0, 0x3ff, 0x10000, 0xa, 0x6, 0x1, 0x8000, 0x0, 0xec, 0x1, 0x6, 0x2, 0xffffffffffff0001, 0x8d, 0xb93, 0x6, 0x4, 0x9, 0x3, 0x7, 0x457, 0x9, 0x83, 0x2, 0x8, 0xfffffffffffffffe, 0x400, 0xfff, 0x0, 0x3, 0xffffffff, 0x5, 0x0, 0x200, 0x4, @perf_bp={&(0x7f0000000600), 0xf}, 0x400, 0xfb, 0x686, 0x7, 0x8000000000000, 0xee89, 0x98}, r7, 0xb, r0, 0x8) getsockopt$inet_sctp6_SCTP_RECONFIG_SUPPORTED(r3, 0x84, 0x75, &(0x7f0000000300)={r5, 0x6}, &(0x7f0000000340)=0x8) ioctl$sock_netrom_TIOCINQ(r3, 0x541b, &(0x7f00000002c0)) r8 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000140)='/dev/snapshot\x00', 0x200000, 0x0) r9 = syz_open_dev$usbmon(&(0x7f00000001c0)='/dev/usbmon#\x00', 0x4b4, 0x200) ioctl$sock_inet_udp_SIOCINQ(r8, 0x541b, &(0x7f0000000180)) ioctl$sock_inet_SIOCGIFNETMASK(r9, 0x891b, &(0x7f0000000200)={'erspan0\x00', {0x2, 0x4e24, @local={0xac, 0x14, 0x14, 0xaa}}}) ioctl$TCSETAF(r6, 0x5412, &(0x7f00000000c0)) r10 = socket$inet_sctp(0x2, 0x5, 0x84) ioctl$VT_ACTIVATE(r2, 0x5606, 0x3ff) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f00000003c0)='./cgroup/syz1\x00', 0x1ff) fcntl$dupfd(r1, 0x406, r10) clone(0x24000000, &(0x7f0000000680), &(0x7f0000000800), &(0x7f0000000640), &(0x7f0000000480)="6cbd51a68b34088f82798abb0d96907921d405b768e0c7aff34f5c20e8e437e7a3de202da386db8881305587bb6e") 2018/05/17 18:19:05 executing program 2: r0 = socket(0xa, 0x2, 0x0) r1 = open(&(0x7f00004b8ff8)='./file0\x00', 0x200000000028042, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0xfffffffffffffffc, 0x0, @ipv4={[], [0xff, 0xff], @loopback=0x7f000001}}, 0x1c) fallocate(r1, 0x0, 0xffff, 0x9) sched_setaffinity(0x0, 0x7, &(0x7f00000000c0)=0x9) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendfile(r0, r1, &(0x7f0000e64ff8), 0x10001) 2018/05/17 18:19:05 executing program 5: r0 = openat$keychord(0xffffffffffffff9c, &(0x7f00000005c0)='/dev/keychord\x00', 0x200242, 0x0) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000100)="2e2f6367726f75702fe359ed7379", 0x1ff) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000440)='/dev/ptmx\x00', 0xfffffffffffefffc, 0x0) ioctl$TCSETS(r2, 0x40045431, &(0x7f00005befdc)) r3 = dup2(r1, r1) r4 = timerfd_create(0x0, 0x0) timerfd_settime(r4, 0x1, &(0x7f0000000080)={{0x0, 0x989680}, {0x0, 0x989680}}, &(0x7f0000000140)) timerfd_gettime(r4, &(0x7f00000000c0)) openat$ptmx(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/ptmx\x00', 0x80000, 0x0) getsockopt$inet_sctp_SCTP_CONTEXT(0xffffffffffffffff, 0x84, 0x11, &(0x7f0000000240)={0x0, 0x2800000000}, &(0x7f0000000280)=0x8) getsockopt$inet_sctp6_SCTP_GET_LOCAL_ADDRS(r3, 0x84, 0x6d, &(0x7f0000000700)=ANY=[@ANYRES32=r5, @ANYBLOB="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"], &(0x7f0000000380)=0x2) setsockopt$bt_BT_SECURITY(r3, 0x112, 0x4, &(0x7f0000000400)={0x80000000, 0xfffffffffffffffe}, 0x2) r6 = syz_open_pts(r2, 0x0) ioctl$TIOCEXCL(r2, 0x540c) ioctl$sock_SIOCGPGRP(r3, 0x8904, &(0x7f00000006c0)=0x0) perf_event_open(&(0x7f0000000640)={0x5, 0x70, 0x5, 0xffffffffffffff9d, 0x6, 0xfffffffffffffffb, 0x0, 0x3ff, 0x10000, 0xa, 0x6, 0x1, 0x8000, 0x0, 0xec, 0x1, 0x6, 0x2, 0xffffffffffff0001, 0x8d, 0xb93, 0x6, 0x4, 0x9, 0x3, 0x7, 0x457, 0x9, 0x83, 0x2, 0x8, 0xfffffffffffffffe, 0x400, 0xfff, 0x0, 0x3, 0xffffffff, 0x5, 0x0, 0x200, 0x4, @perf_bp={&(0x7f0000000600), 0xf}, 0x400, 0xfb, 0x686, 0x7, 0x8000000000000, 0xee89, 0x98}, r7, 0xb, r0, 0x8) getsockopt$inet_sctp6_SCTP_RECONFIG_SUPPORTED(r3, 0x84, 0x75, &(0x7f0000000300)={r5, 0x6}, &(0x7f0000000340)=0x8) ioctl$sock_netrom_TIOCINQ(r3, 0x541b, &(0x7f00000002c0)) r8 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000140)='/dev/snapshot\x00', 0x200000, 0x0) r9 = syz_open_dev$usbmon(&(0x7f00000001c0)='/dev/usbmon#\x00', 0x4b4, 0x200) ioctl$sock_inet_udp_SIOCINQ(r8, 0x541b, &(0x7f0000000180)) ioctl$sock_inet_SIOCGIFNETMASK(r9, 0x891b, &(0x7f0000000200)={'erspan0\x00', {0x2, 0x4e24, @local={0xac, 0x14, 0x14, 0xaa}}}) ioctl$TCSETAF(r6, 0x5412, &(0x7f00000000c0)) r10 = socket$inet_sctp(0x2, 0x5, 0x84) ioctl$VT_ACTIVATE(r2, 0x5606, 0x3ff) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f00000003c0)='./cgroup/syz1\x00', 0x1ff) fcntl$dupfd(r1, 0x406, r10) clone(0x24000000, &(0x7f0000000680), &(0x7f0000000800), &(0x7f0000000640), &(0x7f0000000480)="6cbd51a68b34088f82798abb0d96907921d405b768e0c7aff34f5c20e8e437e7a3de202da386db8881305587bb6e") 2018/05/17 18:19:05 executing program 3: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$ndb(&(0x7f0000000100)='/dev/nbd#\x00', 0xffffffffffffffff, 0x0) ioctl$BLKTRACESETUP(r1, 0xc0481273, &(0x7f0000000000)={[], 0x0, 0x9, 0x8001}) r2 = fcntl$dupfd(r0, 0x406, r0) setsockopt$packet_rx_ring(r2, 0x107, 0x5, &(0x7f00000000c0)=@req={0x9, 0x2, 0x4, 0xfff}, 0x10) ioctl$BLKTRACETEARDOWN(r1, 0x1276, 0x0) openat$selinux_status(0xffffffffffffff9c, &(0x7f0000000240)='/selinux/status\x00', 0x0, 0x0) 2018/05/17 18:19:05 executing program 4: r0 = openat$keychord(0xffffffffffffff9c, &(0x7f00000005c0)='/dev/keychord\x00', 0x200242, 0x0) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000100)="2e2f6367726f75702fe359ed7379", 0x1ff) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000440)='/dev/ptmx\x00', 0xfffffffffffefffc, 0x0) ioctl$TCSETS(r2, 0x40045431, &(0x7f00005befdc)) r3 = dup2(r1, r1) r4 = timerfd_create(0x0, 0x0) timerfd_settime(r4, 0x1, &(0x7f0000000080)={{0x0, 0x989680}, {0x0, 0x989680}}, &(0x7f0000000140)) timerfd_gettime(r4, &(0x7f00000000c0)) openat$ptmx(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/ptmx\x00', 0x80000, 0x0) getsockopt$inet_sctp_SCTP_CONTEXT(0xffffffffffffffff, 0x84, 0x11, &(0x7f0000000240)={0x0, 0x2800000000}, &(0x7f0000000280)=0x8) getsockopt$inet_sctp6_SCTP_GET_LOCAL_ADDRS(r3, 0x84, 0x6d, &(0x7f0000000700)=ANY=[@ANYRES32=r5, @ANYBLOB="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"], &(0x7f0000000380)=0x2) setsockopt$bt_BT_SECURITY(r3, 0x112, 0x4, &(0x7f0000000400)={0x80000000, 0xfffffffffffffffe}, 0x2) r6 = syz_open_pts(r2, 0x0) ioctl$TIOCEXCL(r2, 0x540c) ioctl$sock_SIOCGPGRP(r3, 0x8904, &(0x7f00000006c0)=0x0) perf_event_open(&(0x7f0000000640)={0x5, 0x70, 0x5, 0xffffffffffffff9d, 0x6, 0xfffffffffffffffb, 0x0, 0x3ff, 0x10000, 0xa, 0x6, 0x1, 0x8000, 0x0, 0xec, 0x1, 0x6, 0x2, 0xffffffffffff0001, 0x8d, 0xb93, 0x6, 0x4, 0x9, 0x3, 0x7, 0x457, 0x9, 0x83, 0x2, 0x8, 0xfffffffffffffffe, 0x400, 0xfff, 0x0, 0x3, 0xffffffff, 0x5, 0x0, 0x200, 0x4, @perf_bp={&(0x7f0000000600), 0xf}, 0x400, 0xfb, 0x686, 0x7, 0x8000000000000, 0xee89, 0x98}, r7, 0xb, r0, 0x8) getsockopt$inet_sctp6_SCTP_RECONFIG_SUPPORTED(r3, 0x84, 0x75, &(0x7f0000000300)={r5, 0x6}, &(0x7f0000000340)=0x8) ioctl$sock_netrom_TIOCINQ(r3, 0x541b, &(0x7f00000002c0)) r8 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000140)='/dev/snapshot\x00', 0x200000, 0x0) r9 = syz_open_dev$usbmon(&(0x7f00000001c0)='/dev/usbmon#\x00', 0x4b4, 0x200) ioctl$sock_inet_udp_SIOCINQ(r8, 0x541b, &(0x7f0000000180)) ioctl$sock_inet_SIOCGIFNETMASK(r9, 0x891b, &(0x7f0000000200)={'erspan0\x00', {0x2, 0x4e24, @local={0xac, 0x14, 0x14, 0xaa}}}) ioctl$TCSETAF(r6, 0x5412, &(0x7f00000000c0)) r10 = socket$inet_sctp(0x2, 0x5, 0x84) ioctl$VT_ACTIVATE(r2, 0x5606, 0x3ff) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f00000003c0)='./cgroup/syz1\x00', 0x1ff) fcntl$dupfd(r1, 0x406, r10) clone(0x24000000, &(0x7f0000000680), &(0x7f0000000800), &(0x7f0000000640), &(0x7f0000000480)="6cbd51a68b34088f82798abb0d96907921d405b768e0c7aff34f5c20e8e437e7a3de202da386db8881305587bb6e") 2018/05/17 18:19:05 executing program 1: r0 = openat$keychord(0xffffffffffffff9c, &(0x7f00000005c0)='/dev/keychord\x00', 0x200242, 0x0) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000100)="2e2f6367726f75702fe359ed7379", 0x1ff) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000440)='/dev/ptmx\x00', 0xfffffffffffefffc, 0x0) ioctl$TCSETS(r2, 0x40045431, &(0x7f00005befdc)) r3 = dup2(r1, r1) r4 = timerfd_create(0x0, 0x0) timerfd_settime(r4, 0x1, &(0x7f0000000080)={{0x0, 0x989680}, {0x0, 0x989680}}, &(0x7f0000000140)) timerfd_gettime(r4, &(0x7f00000000c0)) openat$ptmx(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/ptmx\x00', 0x80000, 0x0) getsockopt$inet_sctp_SCTP_CONTEXT(0xffffffffffffffff, 0x84, 0x11, &(0x7f0000000240)={0x0, 0x2800000000}, &(0x7f0000000280)=0x8) getsockopt$inet_sctp6_SCTP_GET_LOCAL_ADDRS(r3, 0x84, 0x6d, &(0x7f0000000700)=ANY=[@ANYRES32=r5, @ANYBLOB="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"], &(0x7f0000000380)=0x2) setsockopt$bt_BT_SECURITY(r3, 0x112, 0x4, &(0x7f0000000400)={0x80000000, 0xfffffffffffffffe}, 0x2) r6 = syz_open_pts(r2, 0x0) ioctl$TIOCEXCL(r2, 0x540c) ioctl$sock_SIOCGPGRP(r3, 0x8904, &(0x7f00000006c0)=0x0) perf_event_open(&(0x7f0000000640)={0x5, 0x70, 0x5, 0xffffffffffffff9d, 0x6, 0xfffffffffffffffb, 0x0, 0x3ff, 0x10000, 0xa, 0x6, 0x1, 0x8000, 0x0, 0xec, 0x1, 0x6, 0x2, 0xffffffffffff0001, 0x8d, 0xb93, 0x6, 0x4, 0x9, 0x3, 0x7, 0x457, 0x9, 0x83, 0x2, 0x8, 0xfffffffffffffffe, 0x400, 0xfff, 0x0, 0x3, 0xffffffff, 0x5, 0x0, 0x200, 0x4, @perf_bp={&(0x7f0000000600), 0xf}, 0x400, 0xfb, 0x686, 0x7, 0x8000000000000, 0xee89, 0x98}, r7, 0xb, r0, 0x8) getsockopt$inet_sctp6_SCTP_RECONFIG_SUPPORTED(r3, 0x84, 0x75, &(0x7f0000000300)={r5, 0x6}, &(0x7f0000000340)=0x8) ioctl$sock_netrom_TIOCINQ(r3, 0x541b, &(0x7f00000002c0)) r8 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000140)='/dev/snapshot\x00', 0x200000, 0x0) r9 = syz_open_dev$usbmon(&(0x7f00000001c0)='/dev/usbmon#\x00', 0x4b4, 0x200) ioctl$sock_inet_udp_SIOCINQ(r8, 0x541b, &(0x7f0000000180)) ioctl$sock_inet_SIOCGIFNETMASK(r9, 0x891b, &(0x7f0000000200)={'erspan0\x00', {0x2, 0x4e24, @local={0xac, 0x14, 0x14, 0xaa}}}) ioctl$TCSETAF(r6, 0x5412, &(0x7f00000000c0)) r10 = socket$inet_sctp(0x2, 0x5, 0x84) ioctl$VT_ACTIVATE(r2, 0x5606, 0x3ff) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f00000003c0)='./cgroup/syz1\x00', 0x1ff) fcntl$dupfd(r1, 0x406, r10) clone(0x24000000, &(0x7f0000000680), &(0x7f0000000800), &(0x7f0000000640), &(0x7f0000000480)="6cbd51a68b34088f82798abb0d96907921d405b768e0c7aff34f5c20e8e437e7a3de202da386db8881305587bb6e") 2018/05/17 18:19:05 executing program 2: r0 = socket(0xa, 0x2, 0x0) r1 = open(&(0x7f00004b8ff8)='./file0\x00', 0x200000000028042, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0xfffffffffffffffc, 0x0, @ipv4={[], [0xff, 0xff], @loopback=0x7f000001}}, 0x1c) fallocate(r1, 0x0, 0xffff, 0x9) sched_setaffinity(0x0, 0x7, &(0x7f00000000c0)=0x9) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendfile(r0, r1, &(0x7f0000e64ff8), 0x10001) 2018/05/17 18:19:05 executing program 3: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$ndb(&(0x7f0000000100)='/dev/nbd#\x00', 0xffffffffffffffff, 0x0) ioctl$BLKTRACESETUP(r1, 0xc0481273, &(0x7f0000000000)={[], 0x0, 0x9, 0x8001}) r2 = fcntl$dupfd(r0, 0x406, r0) setsockopt$packet_rx_ring(r2, 0x107, 0x5, &(0x7f00000000c0)=@req={0x9, 0x2, 0x4, 0xfff}, 0x10) ioctl$BLKTRACETEARDOWN(r1, 0x1276, 0x0) openat$selinux_status(0xffffffffffffff9c, &(0x7f0000000240)='/selinux/status\x00', 0x0, 0x0) 2018/05/17 18:19:05 executing program 5: r0 = openat$keychord(0xffffffffffffff9c, &(0x7f00000005c0)='/dev/keychord\x00', 0x200242, 0x0) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000100)="2e2f6367726f75702fe359ed7379", 0x1ff) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000440)='/dev/ptmx\x00', 0xfffffffffffefffc, 0x0) ioctl$TCSETS(r2, 0x40045431, &(0x7f00005befdc)) r3 = dup2(r1, r1) r4 = timerfd_create(0x0, 0x0) timerfd_settime(r4, 0x1, &(0x7f0000000080)={{0x0, 0x989680}, {0x0, 0x989680}}, &(0x7f0000000140)) timerfd_gettime(r4, &(0x7f00000000c0)) openat$ptmx(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/ptmx\x00', 0x80000, 0x0) getsockopt$inet_sctp_SCTP_CONTEXT(0xffffffffffffffff, 0x84, 0x11, &(0x7f0000000240)={0x0, 0x2800000000}, &(0x7f0000000280)=0x8) getsockopt$inet_sctp6_SCTP_GET_LOCAL_ADDRS(r3, 0x84, 0x6d, &(0x7f0000000700)=ANY=[@ANYRES32=r5, @ANYBLOB="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"], &(0x7f0000000380)=0x2) setsockopt$bt_BT_SECURITY(r3, 0x112, 0x4, &(0x7f0000000400)={0x80000000, 0xfffffffffffffffe}, 0x2) r6 = syz_open_pts(r2, 0x0) ioctl$TIOCEXCL(r2, 0x540c) ioctl$sock_SIOCGPGRP(r3, 0x8904, &(0x7f00000006c0)=0x0) perf_event_open(&(0x7f0000000640)={0x5, 0x70, 0x5, 0xffffffffffffff9d, 0x6, 0xfffffffffffffffb, 0x0, 0x3ff, 0x10000, 0xa, 0x6, 0x1, 0x8000, 0x0, 0xec, 0x1, 0x6, 0x2, 0xffffffffffff0001, 0x8d, 0xb93, 0x6, 0x4, 0x9, 0x3, 0x7, 0x457, 0x9, 0x83, 0x2, 0x8, 0xfffffffffffffffe, 0x400, 0xfff, 0x0, 0x3, 0xffffffff, 0x5, 0x0, 0x200, 0x4, @perf_bp={&(0x7f0000000600), 0xf}, 0x400, 0xfb, 0x686, 0x7, 0x8000000000000, 0xee89, 0x98}, r7, 0xb, r0, 0x8) getsockopt$inet_sctp6_SCTP_RECONFIG_SUPPORTED(r3, 0x84, 0x75, &(0x7f0000000300)={r5, 0x6}, &(0x7f0000000340)=0x8) ioctl$sock_netrom_TIOCINQ(r3, 0x541b, &(0x7f00000002c0)) r8 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000140)='/dev/snapshot\x00', 0x200000, 0x0) r9 = syz_open_dev$usbmon(&(0x7f00000001c0)='/dev/usbmon#\x00', 0x4b4, 0x200) ioctl$sock_inet_udp_SIOCINQ(r8, 0x541b, &(0x7f0000000180)) ioctl$sock_inet_SIOCGIFNETMASK(r9, 0x891b, &(0x7f0000000200)={'erspan0\x00', {0x2, 0x4e24, @local={0xac, 0x14, 0x14, 0xaa}}}) ioctl$TCSETAF(r6, 0x5412, &(0x7f00000000c0)) r10 = socket$inet_sctp(0x2, 0x5, 0x84) ioctl$VT_ACTIVATE(r2, 0x5606, 0x3ff) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f00000003c0)='./cgroup/syz1\x00', 0x1ff) fcntl$dupfd(r1, 0x406, r10) clone(0x24000000, &(0x7f0000000680), &(0x7f0000000800), &(0x7f0000000640), &(0x7f0000000480)="6cbd51a68b34088f82798abb0d96907921d405b768e0c7aff34f5c20e8e437e7a3de202da386db8881305587bb6e") 2018/05/17 18:19:05 executing program 6: r0 = openat$keychord(0xffffffffffffff9c, &(0x7f00000005c0)='/dev/keychord\x00', 0x200242, 0x0) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000100)="2e2f6367726f75702fe359ed7379", 0x1ff) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000440)='/dev/ptmx\x00', 0xfffffffffffefffc, 0x0) ioctl$TCSETS(r2, 0x40045431, &(0x7f00005befdc)) r3 = dup2(r1, r1) r4 = timerfd_create(0x0, 0x0) timerfd_settime(r4, 0x1, &(0x7f0000000080)={{0x0, 0x989680}, {0x0, 0x989680}}, &(0x7f0000000140)) timerfd_gettime(r4, &(0x7f00000000c0)) openat$ptmx(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/ptmx\x00', 0x80000, 0x0) getsockopt$inet_sctp_SCTP_CONTEXT(0xffffffffffffffff, 0x84, 0x11, &(0x7f0000000240)={0x0, 0x2800000000}, &(0x7f0000000280)=0x8) getsockopt$inet_sctp6_SCTP_GET_LOCAL_ADDRS(r3, 0x84, 0x6d, &(0x7f0000000700)=ANY=[@ANYRES32=r5, @ANYBLOB="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"], &(0x7f0000000380)=0x2) setsockopt$bt_BT_SECURITY(r3, 0x112, 0x4, &(0x7f0000000400)={0x80000000, 0xfffffffffffffffe}, 0x2) r6 = syz_open_pts(r2, 0x0) ioctl$TIOCEXCL(r2, 0x540c) ioctl$sock_SIOCGPGRP(r3, 0x8904, &(0x7f00000006c0)=0x0) perf_event_open(&(0x7f0000000640)={0x5, 0x70, 0x5, 0xffffffffffffff9d, 0x6, 0xfffffffffffffffb, 0x0, 0x3ff, 0x10000, 0xa, 0x6, 0x1, 0x8000, 0x0, 0xec, 0x1, 0x6, 0x2, 0xffffffffffff0001, 0x8d, 0xb93, 0x6, 0x4, 0x9, 0x3, 0x7, 0x457, 0x9, 0x83, 0x2, 0x8, 0xfffffffffffffffe, 0x400, 0xfff, 0x0, 0x3, 0xffffffff, 0x5, 0x0, 0x200, 0x4, @perf_bp={&(0x7f0000000600), 0xf}, 0x400, 0xfb, 0x686, 0x7, 0x8000000000000, 0xee89, 0x98}, r7, 0xb, r0, 0x8) getsockopt$inet_sctp6_SCTP_RECONFIG_SUPPORTED(r3, 0x84, 0x75, &(0x7f0000000300)={r5, 0x6}, &(0x7f0000000340)=0x8) ioctl$sock_netrom_TIOCINQ(r3, 0x541b, &(0x7f00000002c0)) r8 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000140)='/dev/snapshot\x00', 0x200000, 0x0) r9 = syz_open_dev$usbmon(&(0x7f00000001c0)='/dev/usbmon#\x00', 0x4b4, 0x200) ioctl$sock_inet_udp_SIOCINQ(r8, 0x541b, &(0x7f0000000180)) ioctl$sock_inet_SIOCGIFNETMASK(r9, 0x891b, &(0x7f0000000200)={'erspan0\x00', {0x2, 0x4e24, @local={0xac, 0x14, 0x14, 0xaa}}}) ioctl$TCSETAF(r6, 0x5412, &(0x7f00000000c0)) r10 = socket$inet_sctp(0x2, 0x5, 0x84) ioctl$VT_ACTIVATE(r2, 0x5606, 0x3ff) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f00000003c0)='./cgroup/syz1\x00', 0x1ff) fcntl$dupfd(r1, 0x406, r10) clone(0x24000000, &(0x7f0000000680), &(0x7f0000000800), &(0x7f0000000640), &(0x7f0000000480)="6cbd51a68b34088f82798abb0d96907921d405b768e0c7aff34f5c20e8e437e7a3de202da386db8881305587bb6e") 2018/05/17 18:19:05 executing program 4: r0 = openat$keychord(0xffffffffffffff9c, &(0x7f00000005c0)='/dev/keychord\x00', 0x200242, 0x0) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000100)="2e2f6367726f75702fe359ed7379", 0x1ff) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000440)='/dev/ptmx\x00', 0xfffffffffffefffc, 0x0) ioctl$TCSETS(r2, 0x40045431, &(0x7f00005befdc)) r3 = dup2(r1, r1) r4 = timerfd_create(0x0, 0x0) timerfd_settime(r4, 0x1, &(0x7f0000000080)={{0x0, 0x989680}, {0x0, 0x989680}}, &(0x7f0000000140)) timerfd_gettime(r4, &(0x7f00000000c0)) openat$ptmx(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/ptmx\x00', 0x80000, 0x0) getsockopt$inet_sctp_SCTP_CONTEXT(0xffffffffffffffff, 0x84, 0x11, &(0x7f0000000240)={0x0, 0x2800000000}, &(0x7f0000000280)=0x8) getsockopt$inet_sctp6_SCTP_GET_LOCAL_ADDRS(r3, 0x84, 0x6d, &(0x7f0000000700)=ANY=[@ANYRES32=r5, @ANYBLOB="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"], &(0x7f0000000380)=0x2) setsockopt$bt_BT_SECURITY(r3, 0x112, 0x4, &(0x7f0000000400)={0x80000000, 0xfffffffffffffffe}, 0x2) r6 = syz_open_pts(r2, 0x0) ioctl$TIOCEXCL(r2, 0x540c) ioctl$sock_SIOCGPGRP(r3, 0x8904, &(0x7f00000006c0)=0x0) perf_event_open(&(0x7f0000000640)={0x5, 0x70, 0x5, 0xffffffffffffff9d, 0x6, 0xfffffffffffffffb, 0x0, 0x3ff, 0x10000, 0xa, 0x6, 0x1, 0x8000, 0x0, 0xec, 0x1, 0x6, 0x2, 0xffffffffffff0001, 0x8d, 0xb93, 0x6, 0x4, 0x9, 0x3, 0x7, 0x457, 0x9, 0x83, 0x2, 0x8, 0xfffffffffffffffe, 0x400, 0xfff, 0x0, 0x3, 0xffffffff, 0x5, 0x0, 0x200, 0x4, @perf_bp={&(0x7f0000000600), 0xf}, 0x400, 0xfb, 0x686, 0x7, 0x8000000000000, 0xee89, 0x98}, r7, 0xb, r0, 0x8) getsockopt$inet_sctp6_SCTP_RECONFIG_SUPPORTED(r3, 0x84, 0x75, &(0x7f0000000300)={r5, 0x6}, &(0x7f0000000340)=0x8) ioctl$sock_netrom_TIOCINQ(r3, 0x541b, &(0x7f00000002c0)) r8 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000140)='/dev/snapshot\x00', 0x200000, 0x0) r9 = syz_open_dev$usbmon(&(0x7f00000001c0)='/dev/usbmon#\x00', 0x4b4, 0x200) ioctl$sock_inet_udp_SIOCINQ(r8, 0x541b, &(0x7f0000000180)) ioctl$sock_inet_SIOCGIFNETMASK(r9, 0x891b, &(0x7f0000000200)={'erspan0\x00', {0x2, 0x4e24, @local={0xac, 0x14, 0x14, 0xaa}}}) ioctl$TCSETAF(r6, 0x5412, &(0x7f00000000c0)) r10 = socket$inet_sctp(0x2, 0x5, 0x84) ioctl$VT_ACTIVATE(r2, 0x5606, 0x3ff) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f00000003c0)='./cgroup/syz1\x00', 0x1ff) fcntl$dupfd(r1, 0x406, r10) clone(0x24000000, &(0x7f0000000680), &(0x7f0000000800), &(0x7f0000000640), &(0x7f0000000480)="6cbd51a68b34088f82798abb0d96907921d405b768e0c7aff34f5c20e8e437e7a3de202da386db8881305587bb6e") 2018/05/17 18:19:05 executing program 0: r0 = openat$keychord(0xffffffffffffff9c, &(0x7f00000005c0)='/dev/keychord\x00', 0x200242, 0x0) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000100)="2e2f6367726f75702fe359ed7379", 0x1ff) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000440)='/dev/ptmx\x00', 0xfffffffffffefffc, 0x0) ioctl$TCSETS(r2, 0x40045431, &(0x7f00005befdc)) r3 = dup2(r1, r1) r4 = timerfd_create(0x0, 0x0) timerfd_settime(r4, 0x1, &(0x7f0000000080)={{0x0, 0x989680}, {0x0, 0x989680}}, &(0x7f0000000140)) timerfd_gettime(r4, &(0x7f00000000c0)) openat$ptmx(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/ptmx\x00', 0x80000, 0x0) getsockopt$inet_sctp_SCTP_CONTEXT(0xffffffffffffffff, 0x84, 0x11, &(0x7f0000000240)={0x0, 0x2800000000}, &(0x7f0000000280)=0x8) getsockopt$inet_sctp6_SCTP_GET_LOCAL_ADDRS(r3, 0x84, 0x6d, &(0x7f0000000700)=ANY=[@ANYRES32=r5, @ANYBLOB="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"], &(0x7f0000000380)=0x2) setsockopt$bt_BT_SECURITY(r3, 0x112, 0x4, &(0x7f0000000400)={0x80000000, 0xfffffffffffffffe}, 0x2) r6 = syz_open_pts(r2, 0x0) ioctl$TIOCEXCL(r2, 0x540c) ioctl$sock_SIOCGPGRP(r3, 0x8904, &(0x7f00000006c0)=0x0) perf_event_open(&(0x7f0000000640)={0x5, 0x70, 0x5, 0xffffffffffffff9d, 0x6, 0xfffffffffffffffb, 0x0, 0x3ff, 0x10000, 0xa, 0x6, 0x1, 0x8000, 0x0, 0xec, 0x1, 0x6, 0x2, 0xffffffffffff0001, 0x8d, 0xb93, 0x6, 0x4, 0x9, 0x3, 0x7, 0x457, 0x9, 0x83, 0x2, 0x8, 0xfffffffffffffffe, 0x400, 0xfff, 0x0, 0x3, 0xffffffff, 0x5, 0x0, 0x200, 0x4, @perf_bp={&(0x7f0000000600), 0xf}, 0x400, 0xfb, 0x686, 0x7, 0x8000000000000, 0xee89, 0x98}, r7, 0xb, r0, 0x8) getsockopt$inet_sctp6_SCTP_RECONFIG_SUPPORTED(r3, 0x84, 0x75, &(0x7f0000000300)={r5, 0x6}, &(0x7f0000000340)=0x8) ioctl$sock_netrom_TIOCINQ(r3, 0x541b, &(0x7f00000002c0)) r8 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000140)='/dev/snapshot\x00', 0x200000, 0x0) r9 = syz_open_dev$usbmon(&(0x7f00000001c0)='/dev/usbmon#\x00', 0x4b4, 0x200) ioctl$sock_inet_udp_SIOCINQ(r8, 0x541b, &(0x7f0000000180)) ioctl$sock_inet_SIOCGIFNETMASK(r9, 0x891b, &(0x7f0000000200)={'erspan0\x00', {0x2, 0x4e24, @local={0xac, 0x14, 0x14, 0xaa}}}) ioctl$TCSETAF(r6, 0x5412, &(0x7f00000000c0)) r10 = socket$inet_sctp(0x2, 0x5, 0x84) ioctl$VT_ACTIVATE(r2, 0x5606, 0x3ff) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f00000003c0)='./cgroup/syz1\x00', 0x1ff) fcntl$dupfd(r1, 0x406, r10) clone(0x24000000, &(0x7f0000000680), &(0x7f0000000800), &(0x7f0000000640), &(0x7f0000000480)="6cbd51a68b34088f82798abb0d96907921d405b768e0c7aff34f5c20e8e437e7a3de202da386db8881305587bb6e") 2018/05/17 18:19:05 executing program 7: r0 = openat$keychord(0xffffffffffffff9c, &(0x7f00000005c0)='/dev/keychord\x00', 0x200242, 0x0) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000100)="2e2f6367726f75702fe359ed7379", 0x1ff) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000440)='/dev/ptmx\x00', 0xfffffffffffefffc, 0x0) ioctl$TCSETS(r2, 0x40045431, &(0x7f00005befdc)) r3 = dup2(r1, r1) r4 = timerfd_create(0x0, 0x0) timerfd_settime(r4, 0x1, &(0x7f0000000080)={{0x0, 0x989680}, {0x0, 0x989680}}, &(0x7f0000000140)) timerfd_gettime(r4, &(0x7f00000000c0)) openat$ptmx(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/ptmx\x00', 0x80000, 0x0) getsockopt$inet_sctp_SCTP_CONTEXT(0xffffffffffffffff, 0x84, 0x11, &(0x7f0000000240)={0x0, 0x2800000000}, &(0x7f0000000280)=0x8) getsockopt$inet_sctp6_SCTP_GET_LOCAL_ADDRS(r3, 0x84, 0x6d, &(0x7f0000000700)=ANY=[@ANYRES32=r5, @ANYBLOB="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"], &(0x7f0000000380)=0x2) setsockopt$bt_BT_SECURITY(r3, 0x112, 0x4, &(0x7f0000000400)={0x80000000, 0xfffffffffffffffe}, 0x2) r6 = syz_open_pts(r2, 0x0) ioctl$TIOCEXCL(r2, 0x540c) ioctl$sock_SIOCGPGRP(r3, 0x8904, &(0x7f00000006c0)=0x0) perf_event_open(&(0x7f0000000640)={0x5, 0x70, 0x5, 0xffffffffffffff9d, 0x6, 0xfffffffffffffffb, 0x0, 0x3ff, 0x10000, 0xa, 0x6, 0x1, 0x8000, 0x0, 0xec, 0x1, 0x6, 0x2, 0xffffffffffff0001, 0x8d, 0xb93, 0x6, 0x4, 0x9, 0x3, 0x7, 0x457, 0x9, 0x83, 0x2, 0x8, 0xfffffffffffffffe, 0x400, 0xfff, 0x0, 0x3, 0xffffffff, 0x5, 0x0, 0x200, 0x4, @perf_bp={&(0x7f0000000600), 0xf}, 0x400, 0xfb, 0x686, 0x7, 0x8000000000000, 0xee89, 0x98}, r7, 0xb, r0, 0x8) getsockopt$inet_sctp6_SCTP_RECONFIG_SUPPORTED(r3, 0x84, 0x75, &(0x7f0000000300)={r5, 0x6}, &(0x7f0000000340)=0x8) ioctl$sock_netrom_TIOCINQ(r3, 0x541b, &(0x7f00000002c0)) r8 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000140)='/dev/snapshot\x00', 0x200000, 0x0) r9 = syz_open_dev$usbmon(&(0x7f00000001c0)='/dev/usbmon#\x00', 0x4b4, 0x200) ioctl$sock_inet_udp_SIOCINQ(r8, 0x541b, &(0x7f0000000180)) ioctl$sock_inet_SIOCGIFNETMASK(r9, 0x891b, &(0x7f0000000200)={'erspan0\x00', {0x2, 0x4e24, @local={0xac, 0x14, 0x14, 0xaa}}}) ioctl$TCSETAF(r6, 0x5412, &(0x7f00000000c0)) r10 = socket$inet_sctp(0x2, 0x5, 0x84) ioctl$VT_ACTIVATE(r2, 0x5606, 0x3ff) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f00000003c0)='./cgroup/syz1\x00', 0x1ff) fcntl$dupfd(r1, 0x406, r10) clone(0x24000000, &(0x7f0000000680), &(0x7f0000000800), &(0x7f0000000640), &(0x7f0000000480)="6cbd51a68b34088f82798abb0d96907921d405b768e0c7aff34f5c20e8e437e7a3de202da386db8881305587bb6e") 2018/05/17 18:19:05 executing program 1: r0 = openat$keychord(0xffffffffffffff9c, &(0x7f00000005c0)='/dev/keychord\x00', 0x200242, 0x0) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000100)="2e2f6367726f75702fe359ed7379", 0x1ff) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000440)='/dev/ptmx\x00', 0xfffffffffffefffc, 0x0) ioctl$TCSETS(r2, 0x40045431, &(0x7f00005befdc)) r3 = dup2(r1, r1) r4 = timerfd_create(0x0, 0x0) timerfd_settime(r4, 0x1, &(0x7f0000000080)={{0x0, 0x989680}, {0x0, 0x989680}}, &(0x7f0000000140)) timerfd_gettime(r4, &(0x7f00000000c0)) openat$ptmx(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/ptmx\x00', 0x80000, 0x0) getsockopt$inet_sctp_SCTP_CONTEXT(0xffffffffffffffff, 0x84, 0x11, &(0x7f0000000240)={0x0, 0x2800000000}, &(0x7f0000000280)=0x8) getsockopt$inet_sctp6_SCTP_GET_LOCAL_ADDRS(r3, 0x84, 0x6d, &(0x7f0000000700)=ANY=[@ANYRES32=r5, @ANYBLOB="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"], &(0x7f0000000380)=0x2) setsockopt$bt_BT_SECURITY(r3, 0x112, 0x4, &(0x7f0000000400)={0x80000000, 0xfffffffffffffffe}, 0x2) r6 = syz_open_pts(r2, 0x0) ioctl$TIOCEXCL(r2, 0x540c) ioctl$sock_SIOCGPGRP(r3, 0x8904, &(0x7f00000006c0)=0x0) perf_event_open(&(0x7f0000000640)={0x5, 0x70, 0x5, 0xffffffffffffff9d, 0x6, 0xfffffffffffffffb, 0x0, 0x3ff, 0x10000, 0xa, 0x6, 0x1, 0x8000, 0x0, 0xec, 0x1, 0x6, 0x2, 0xffffffffffff0001, 0x8d, 0xb93, 0x6, 0x4, 0x9, 0x3, 0x7, 0x457, 0x9, 0x83, 0x2, 0x8, 0xfffffffffffffffe, 0x400, 0xfff, 0x0, 0x3, 0xffffffff, 0x5, 0x0, 0x200, 0x4, @perf_bp={&(0x7f0000000600), 0xf}, 0x400, 0xfb, 0x686, 0x7, 0x8000000000000, 0xee89, 0x98}, r7, 0xb, r0, 0x8) getsockopt$inet_sctp6_SCTP_RECONFIG_SUPPORTED(r3, 0x84, 0x75, &(0x7f0000000300)={r5, 0x6}, &(0x7f0000000340)=0x8) ioctl$sock_netrom_TIOCINQ(r3, 0x541b, &(0x7f00000002c0)) r8 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000140)='/dev/snapshot\x00', 0x200000, 0x0) r9 = syz_open_dev$usbmon(&(0x7f00000001c0)='/dev/usbmon#\x00', 0x4b4, 0x200) ioctl$sock_inet_udp_SIOCINQ(r8, 0x541b, &(0x7f0000000180)) ioctl$sock_inet_SIOCGIFNETMASK(r9, 0x891b, &(0x7f0000000200)={'erspan0\x00', {0x2, 0x4e24, @local={0xac, 0x14, 0x14, 0xaa}}}) ioctl$TCSETAF(r6, 0x5412, &(0x7f00000000c0)) r10 = socket$inet_sctp(0x2, 0x5, 0x84) ioctl$VT_ACTIVATE(r2, 0x5606, 0x3ff) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f00000003c0)='./cgroup/syz1\x00', 0x1ff) fcntl$dupfd(r1, 0x406, r10) clone(0x24000000, &(0x7f0000000680), &(0x7f0000000800), &(0x7f0000000640), &(0x7f0000000480)="6cbd51a68b34088f82798abb0d96907921d405b768e0c7aff34f5c20e8e437e7a3de202da386db8881305587bb6e") 2018/05/17 18:19:05 executing program 2: r0 = openat$keychord(0xffffffffffffff9c, &(0x7f00000005c0)='/dev/keychord\x00', 0x200242, 0x0) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000100)="2e2f6367726f75702fe359ed7379", 0x1ff) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000440)='/dev/ptmx\x00', 0xfffffffffffefffc, 0x0) ioctl$TCSETS(r2, 0x40045431, &(0x7f00005befdc)) r3 = dup2(r1, r1) r4 = timerfd_create(0x0, 0x0) timerfd_settime(r4, 0x1, &(0x7f0000000080)={{0x0, 0x989680}, {0x0, 0x989680}}, &(0x7f0000000140)) timerfd_gettime(r4, &(0x7f00000000c0)) openat$ptmx(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/ptmx\x00', 0x80000, 0x0) getsockopt$inet_sctp_SCTP_CONTEXT(0xffffffffffffffff, 0x84, 0x11, &(0x7f0000000240)={0x0, 0x2800000000}, &(0x7f0000000280)=0x8) getsockopt$inet_sctp6_SCTP_GET_LOCAL_ADDRS(r3, 0x84, 0x6d, &(0x7f0000000700)=ANY=[@ANYRES32=r5, @ANYBLOB="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"], &(0x7f0000000380)=0x2) setsockopt$bt_BT_SECURITY(r3, 0x112, 0x4, &(0x7f0000000400)={0x80000000, 0xfffffffffffffffe}, 0x2) r6 = syz_open_pts(r2, 0x0) ioctl$TIOCEXCL(r2, 0x540c) ioctl$sock_SIOCGPGRP(r3, 0x8904, &(0x7f00000006c0)=0x0) perf_event_open(&(0x7f0000000640)={0x5, 0x70, 0x5, 0xffffffffffffff9d, 0x6, 0xfffffffffffffffb, 0x0, 0x3ff, 0x10000, 0xa, 0x6, 0x1, 0x8000, 0x0, 0xec, 0x1, 0x6, 0x2, 0xffffffffffff0001, 0x8d, 0xb93, 0x6, 0x4, 0x9, 0x3, 0x7, 0x457, 0x9, 0x83, 0x2, 0x8, 0xfffffffffffffffe, 0x400, 0xfff, 0x0, 0x3, 0xffffffff, 0x5, 0x0, 0x200, 0x4, @perf_bp={&(0x7f0000000600), 0xf}, 0x400, 0xfb, 0x686, 0x7, 0x8000000000000, 0xee89, 0x98}, r7, 0xb, r0, 0x8) getsockopt$inet_sctp6_SCTP_RECONFIG_SUPPORTED(r3, 0x84, 0x75, &(0x7f0000000300)={r5, 0x6}, &(0x7f0000000340)=0x8) ioctl$sock_netrom_TIOCINQ(r3, 0x541b, &(0x7f00000002c0)) r8 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000140)='/dev/snapshot\x00', 0x200000, 0x0) r9 = syz_open_dev$usbmon(&(0x7f00000001c0)='/dev/usbmon#\x00', 0x4b4, 0x200) ioctl$sock_inet_udp_SIOCINQ(r8, 0x541b, &(0x7f0000000180)) ioctl$sock_inet_SIOCGIFNETMASK(r9, 0x891b, &(0x7f0000000200)={'erspan0\x00', {0x2, 0x4e24, @local={0xac, 0x14, 0x14, 0xaa}}}) ioctl$TCSETAF(r6, 0x5412, &(0x7f00000000c0)) r10 = socket$inet_sctp(0x2, 0x5, 0x84) ioctl$VT_ACTIVATE(r2, 0x5606, 0x3ff) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f00000003c0)='./cgroup/syz1\x00', 0x1ff) fcntl$dupfd(r1, 0x406, r10) clone(0x24000000, &(0x7f0000000680), &(0x7f0000000800), &(0x7f0000000640), &(0x7f0000000480)="6cbd51a68b34088f82798abb0d96907921d405b768e0c7aff34f5c20e8e437e7a3de202da386db8881305587bb6e") 2018/05/17 18:19:05 executing program 5: r0 = openat$keychord(0xffffffffffffff9c, &(0x7f00000005c0)='/dev/keychord\x00', 0x200242, 0x0) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000100)="2e2f6367726f75702fe359ed7379", 0x1ff) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000440)='/dev/ptmx\x00', 0xfffffffffffefffc, 0x0) ioctl$TCSETS(r2, 0x40045431, &(0x7f00005befdc)) r3 = dup2(r1, r1) r4 = timerfd_create(0x0, 0x0) timerfd_settime(r4, 0x1, &(0x7f0000000080)={{0x0, 0x989680}, {0x0, 0x989680}}, &(0x7f0000000140)) timerfd_gettime(r4, &(0x7f00000000c0)) openat$ptmx(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/ptmx\x00', 0x80000, 0x0) getsockopt$inet_sctp_SCTP_CONTEXT(0xffffffffffffffff, 0x84, 0x11, &(0x7f0000000240)={0x0, 0x2800000000}, &(0x7f0000000280)=0x8) getsockopt$inet_sctp6_SCTP_GET_LOCAL_ADDRS(r3, 0x84, 0x6d, &(0x7f0000000700)=ANY=[@ANYRES32=r5, @ANYBLOB="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"], &(0x7f0000000380)=0x2) setsockopt$bt_BT_SECURITY(r3, 0x112, 0x4, &(0x7f0000000400)={0x80000000, 0xfffffffffffffffe}, 0x2) r6 = syz_open_pts(r2, 0x0) ioctl$TIOCEXCL(r2, 0x540c) ioctl$sock_SIOCGPGRP(r3, 0x8904, &(0x7f00000006c0)=0x0) perf_event_open(&(0x7f0000000640)={0x5, 0x70, 0x5, 0xffffffffffffff9d, 0x6, 0xfffffffffffffffb, 0x0, 0x3ff, 0x10000, 0xa, 0x6, 0x1, 0x8000, 0x0, 0xec, 0x1, 0x6, 0x2, 0xffffffffffff0001, 0x8d, 0xb93, 0x6, 0x4, 0x9, 0x3, 0x7, 0x457, 0x9, 0x83, 0x2, 0x8, 0xfffffffffffffffe, 0x400, 0xfff, 0x0, 0x3, 0xffffffff, 0x5, 0x0, 0x200, 0x4, @perf_bp={&(0x7f0000000600), 0xf}, 0x400, 0xfb, 0x686, 0x7, 0x8000000000000, 0xee89, 0x98}, r7, 0xb, r0, 0x8) getsockopt$inet_sctp6_SCTP_RECONFIG_SUPPORTED(r3, 0x84, 0x75, &(0x7f0000000300)={r5, 0x6}, &(0x7f0000000340)=0x8) ioctl$sock_netrom_TIOCINQ(r3, 0x541b, &(0x7f00000002c0)) r8 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000140)='/dev/snapshot\x00', 0x200000, 0x0) r9 = syz_open_dev$usbmon(&(0x7f00000001c0)='/dev/usbmon#\x00', 0x4b4, 0x200) ioctl$sock_inet_udp_SIOCINQ(r8, 0x541b, &(0x7f0000000180)) ioctl$sock_inet_SIOCGIFNETMASK(r9, 0x891b, &(0x7f0000000200)={'erspan0\x00', {0x2, 0x4e24, @local={0xac, 0x14, 0x14, 0xaa}}}) ioctl$TCSETAF(r6, 0x5412, &(0x7f00000000c0)) r10 = socket$inet_sctp(0x2, 0x5, 0x84) ioctl$VT_ACTIVATE(r2, 0x5606, 0x3ff) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f00000003c0)='./cgroup/syz1\x00', 0x1ff) fcntl$dupfd(r1, 0x406, r10) clone(0x24000000, &(0x7f0000000680), &(0x7f0000000800), &(0x7f0000000640), &(0x7f0000000480)="6cbd51a68b34088f82798abb0d96907921d405b768e0c7aff34f5c20e8e437e7a3de202da386db8881305587bb6e") 2018/05/17 18:19:05 executing program 3: r0 = openat$keychord(0xffffffffffffff9c, &(0x7f00000005c0)='/dev/keychord\x00', 0x200242, 0x0) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000100)="2e2f6367726f75702fe359ed7379", 0x1ff) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000440)='/dev/ptmx\x00', 0xfffffffffffefffc, 0x0) ioctl$TCSETS(r2, 0x40045431, &(0x7f00005befdc)) r3 = dup2(r1, r1) r4 = timerfd_create(0x0, 0x0) timerfd_settime(r4, 0x1, &(0x7f0000000080)={{0x0, 0x989680}, {0x0, 0x989680}}, &(0x7f0000000140)) timerfd_gettime(r4, &(0x7f00000000c0)) openat$ptmx(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/ptmx\x00', 0x80000, 0x0) getsockopt$inet_sctp_SCTP_CONTEXT(0xffffffffffffffff, 0x84, 0x11, &(0x7f0000000240)={0x0, 0x2800000000}, &(0x7f0000000280)=0x8) getsockopt$inet_sctp6_SCTP_GET_LOCAL_ADDRS(r3, 0x84, 0x6d, &(0x7f0000000700)=ANY=[@ANYRES32=r5, @ANYBLOB="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"], &(0x7f0000000380)=0x2) setsockopt$bt_BT_SECURITY(r3, 0x112, 0x4, &(0x7f0000000400)={0x80000000, 0xfffffffffffffffe}, 0x2) r6 = syz_open_pts(r2, 0x0) ioctl$TIOCEXCL(r2, 0x540c) ioctl$sock_SIOCGPGRP(r3, 0x8904, &(0x7f00000006c0)=0x0) perf_event_open(&(0x7f0000000640)={0x5, 0x70, 0x5, 0xffffffffffffff9d, 0x6, 0xfffffffffffffffb, 0x0, 0x3ff, 0x10000, 0xa, 0x6, 0x1, 0x8000, 0x0, 0xec, 0x1, 0x6, 0x2, 0xffffffffffff0001, 0x8d, 0xb93, 0x6, 0x4, 0x9, 0x3, 0x7, 0x457, 0x9, 0x83, 0x2, 0x8, 0xfffffffffffffffe, 0x400, 0xfff, 0x0, 0x3, 0xffffffff, 0x5, 0x0, 0x200, 0x4, @perf_bp={&(0x7f0000000600), 0xf}, 0x400, 0xfb, 0x686, 0x7, 0x8000000000000, 0xee89, 0x98}, r7, 0xb, r0, 0x8) getsockopt$inet_sctp6_SCTP_RECONFIG_SUPPORTED(r3, 0x84, 0x75, &(0x7f0000000300)={r5, 0x6}, &(0x7f0000000340)=0x8) ioctl$sock_netrom_TIOCINQ(r3, 0x541b, &(0x7f00000002c0)) r8 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000140)='/dev/snapshot\x00', 0x200000, 0x0) r9 = syz_open_dev$usbmon(&(0x7f00000001c0)='/dev/usbmon#\x00', 0x4b4, 0x200) ioctl$sock_inet_udp_SIOCINQ(r8, 0x541b, &(0x7f0000000180)) ioctl$sock_inet_SIOCGIFNETMASK(r9, 0x891b, &(0x7f0000000200)={'erspan0\x00', {0x2, 0x4e24, @local={0xac, 0x14, 0x14, 0xaa}}}) ioctl$TCSETAF(r6, 0x5412, &(0x7f00000000c0)) r10 = socket$inet_sctp(0x2, 0x5, 0x84) ioctl$VT_ACTIVATE(r2, 0x5606, 0x3ff) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f00000003c0)='./cgroup/syz1\x00', 0x1ff) fcntl$dupfd(r1, 0x406, r10) clone(0x24000000, &(0x7f0000000680), &(0x7f0000000800), &(0x7f0000000640), &(0x7f0000000480)="6cbd51a68b34088f82798abb0d96907921d405b768e0c7aff34f5c20e8e437e7a3de202da386db8881305587bb6e") 2018/05/17 18:19:05 executing program 4: r0 = openat$keychord(0xffffffffffffff9c, &(0x7f00000005c0)='/dev/keychord\x00', 0x200242, 0x0) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000100)="2e2f6367726f75702fe359ed7379", 0x1ff) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000440)='/dev/ptmx\x00', 0xfffffffffffefffc, 0x0) ioctl$TCSETS(r2, 0x40045431, &(0x7f00005befdc)) r3 = dup2(r1, r1) r4 = timerfd_create(0x0, 0x0) timerfd_settime(r4, 0x1, &(0x7f0000000080)={{0x0, 0x989680}, {0x0, 0x989680}}, &(0x7f0000000140)) timerfd_gettime(r4, &(0x7f00000000c0)) openat$ptmx(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/ptmx\x00', 0x80000, 0x0) getsockopt$inet_sctp_SCTP_CONTEXT(0xffffffffffffffff, 0x84, 0x11, &(0x7f0000000240)={0x0, 0x2800000000}, &(0x7f0000000280)=0x8) getsockopt$inet_sctp6_SCTP_GET_LOCAL_ADDRS(r3, 0x84, 0x6d, &(0x7f0000000700)=ANY=[@ANYRES32=r5, @ANYBLOB="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"], &(0x7f0000000380)=0x2) setsockopt$bt_BT_SECURITY(r3, 0x112, 0x4, &(0x7f0000000400)={0x80000000, 0xfffffffffffffffe}, 0x2) r6 = syz_open_pts(r2, 0x0) ioctl$TIOCEXCL(r2, 0x540c) ioctl$sock_SIOCGPGRP(r3, 0x8904, &(0x7f00000006c0)=0x0) perf_event_open(&(0x7f0000000640)={0x5, 0x70, 0x5, 0xffffffffffffff9d, 0x6, 0xfffffffffffffffb, 0x0, 0x3ff, 0x10000, 0xa, 0x6, 0x1, 0x8000, 0x0, 0xec, 0x1, 0x6, 0x2, 0xffffffffffff0001, 0x8d, 0xb93, 0x6, 0x4, 0x9, 0x3, 0x7, 0x457, 0x9, 0x83, 0x2, 0x8, 0xfffffffffffffffe, 0x400, 0xfff, 0x0, 0x3, 0xffffffff, 0x5, 0x0, 0x200, 0x4, @perf_bp={&(0x7f0000000600), 0xf}, 0x400, 0xfb, 0x686, 0x7, 0x8000000000000, 0xee89, 0x98}, r7, 0xb, r0, 0x8) getsockopt$inet_sctp6_SCTP_RECONFIG_SUPPORTED(r3, 0x84, 0x75, &(0x7f0000000300)={r5, 0x6}, &(0x7f0000000340)=0x8) ioctl$sock_netrom_TIOCINQ(r3, 0x541b, &(0x7f00000002c0)) r8 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000140)='/dev/snapshot\x00', 0x200000, 0x0) r9 = syz_open_dev$usbmon(&(0x7f00000001c0)='/dev/usbmon#\x00', 0x4b4, 0x200) ioctl$sock_inet_udp_SIOCINQ(r8, 0x541b, &(0x7f0000000180)) ioctl$sock_inet_SIOCGIFNETMASK(r9, 0x891b, &(0x7f0000000200)={'erspan0\x00', {0x2, 0x4e24, @local={0xac, 0x14, 0x14, 0xaa}}}) ioctl$TCSETAF(r6, 0x5412, &(0x7f00000000c0)) r10 = socket$inet_sctp(0x2, 0x5, 0x84) ioctl$VT_ACTIVATE(r2, 0x5606, 0x3ff) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f00000003c0)='./cgroup/syz1\x00', 0x1ff) fcntl$dupfd(r1, 0x406, r10) clone(0x24000000, &(0x7f0000000680), &(0x7f0000000800), &(0x7f0000000640), &(0x7f0000000480)="6cbd51a68b34088f82798abb0d96907921d405b768e0c7aff34f5c20e8e437e7a3de202da386db8881305587bb6e") 2018/05/17 18:19:05 executing program 7: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$ndb(&(0x7f0000000100)='/dev/nbd#\x00', 0xffffffffffffffff, 0x0) ioctl$BLKTRACESETUP(r1, 0xc0481273, &(0x7f0000000000)={[], 0x0, 0x9, 0x8001}) r2 = fcntl$dupfd(r0, 0x406, r0) setsockopt$packet_rx_ring(r2, 0x107, 0x5, &(0x7f00000000c0)=@req={0x9, 0x2, 0x4, 0xfff}, 0x10) ioctl$BLKTRACETEARDOWN(r1, 0x1276, 0x0) openat$selinux_status(0xffffffffffffff9c, &(0x7f0000000240)='/selinux/status\x00', 0x0, 0x0) 2018/05/17 18:19:05 executing program 6: r0 = openat$keychord(0xffffffffffffff9c, &(0x7f00000005c0)='/dev/keychord\x00', 0x200242, 0x0) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000100)="2e2f6367726f75702fe359ed7379", 0x1ff) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000440)='/dev/ptmx\x00', 0xfffffffffffefffc, 0x0) ioctl$TCSETS(r2, 0x40045431, &(0x7f00005befdc)) r3 = dup2(r1, r1) r4 = timerfd_create(0x0, 0x0) timerfd_settime(r4, 0x1, &(0x7f0000000080)={{0x0, 0x989680}, {0x0, 0x989680}}, &(0x7f0000000140)) timerfd_gettime(r4, &(0x7f00000000c0)) openat$ptmx(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/ptmx\x00', 0x80000, 0x0) getsockopt$inet_sctp_SCTP_CONTEXT(0xffffffffffffffff, 0x84, 0x11, &(0x7f0000000240)={0x0, 0x2800000000}, &(0x7f0000000280)=0x8) getsockopt$inet_sctp6_SCTP_GET_LOCAL_ADDRS(r3, 0x84, 0x6d, &(0x7f0000000700)=ANY=[@ANYRES32=r5, @ANYBLOB="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"], &(0x7f0000000380)=0x2) setsockopt$bt_BT_SECURITY(r3, 0x112, 0x4, &(0x7f0000000400)={0x80000000, 0xfffffffffffffffe}, 0x2) r6 = syz_open_pts(r2, 0x0) ioctl$TIOCEXCL(r2, 0x540c) ioctl$sock_SIOCGPGRP(r3, 0x8904, &(0x7f00000006c0)=0x0) perf_event_open(&(0x7f0000000640)={0x5, 0x70, 0x5, 0xffffffffffffff9d, 0x6, 0xfffffffffffffffb, 0x0, 0x3ff, 0x10000, 0xa, 0x6, 0x1, 0x8000, 0x0, 0xec, 0x1, 0x6, 0x2, 0xffffffffffff0001, 0x8d, 0xb93, 0x6, 0x4, 0x9, 0x3, 0x7, 0x457, 0x9, 0x83, 0x2, 0x8, 0xfffffffffffffffe, 0x400, 0xfff, 0x0, 0x3, 0xffffffff, 0x5, 0x0, 0x200, 0x4, @perf_bp={&(0x7f0000000600), 0xf}, 0x400, 0xfb, 0x686, 0x7, 0x8000000000000, 0xee89, 0x98}, r7, 0xb, r0, 0x8) getsockopt$inet_sctp6_SCTP_RECONFIG_SUPPORTED(r3, 0x84, 0x75, &(0x7f0000000300)={r5, 0x6}, &(0x7f0000000340)=0x8) ioctl$sock_netrom_TIOCINQ(r3, 0x541b, &(0x7f00000002c0)) r8 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000140)='/dev/snapshot\x00', 0x200000, 0x0) r9 = syz_open_dev$usbmon(&(0x7f00000001c0)='/dev/usbmon#\x00', 0x4b4, 0x200) ioctl$sock_inet_udp_SIOCINQ(r8, 0x541b, &(0x7f0000000180)) ioctl$sock_inet_SIOCGIFNETMASK(r9, 0x891b, &(0x7f0000000200)={'erspan0\x00', {0x2, 0x4e24, @local={0xac, 0x14, 0x14, 0xaa}}}) ioctl$TCSETAF(r6, 0x5412, &(0x7f00000000c0)) r10 = socket$inet_sctp(0x2, 0x5, 0x84) ioctl$VT_ACTIVATE(r2, 0x5606, 0x3ff) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f00000003c0)='./cgroup/syz1\x00', 0x1ff) fcntl$dupfd(r1, 0x406, r10) clone(0x24000000, &(0x7f0000000680), &(0x7f0000000800), &(0x7f0000000640), &(0x7f0000000480)="6cbd51a68b34088f82798abb0d96907921d405b768e0c7aff34f5c20e8e437e7a3de202da386db8881305587bb6e") 2018/05/17 18:19:05 executing program 1: r0 = openat$keychord(0xffffffffffffff9c, &(0x7f00000005c0)='/dev/keychord\x00', 0x200242, 0x0) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000100)="2e2f6367726f75702fe359ed7379", 0x1ff) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000440)='/dev/ptmx\x00', 0xfffffffffffefffc, 0x0) ioctl$TCSETS(r2, 0x40045431, &(0x7f00005befdc)) r3 = dup2(r1, r1) r4 = timerfd_create(0x0, 0x0) timerfd_settime(r4, 0x1, &(0x7f0000000080)={{0x0, 0x989680}, {0x0, 0x989680}}, &(0x7f0000000140)) timerfd_gettime(r4, &(0x7f00000000c0)) openat$ptmx(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/ptmx\x00', 0x80000, 0x0) getsockopt$inet_sctp_SCTP_CONTEXT(0xffffffffffffffff, 0x84, 0x11, &(0x7f0000000240)={0x0, 0x2800000000}, &(0x7f0000000280)=0x8) getsockopt$inet_sctp6_SCTP_GET_LOCAL_ADDRS(r3, 0x84, 0x6d, &(0x7f0000000700)=ANY=[@ANYRES32=r5, @ANYBLOB="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"], &(0x7f0000000380)=0x2) setsockopt$bt_BT_SECURITY(r3, 0x112, 0x4, &(0x7f0000000400)={0x80000000, 0xfffffffffffffffe}, 0x2) r6 = syz_open_pts(r2, 0x0) ioctl$TIOCEXCL(r2, 0x540c) ioctl$sock_SIOCGPGRP(r3, 0x8904, &(0x7f00000006c0)=0x0) perf_event_open(&(0x7f0000000640)={0x5, 0x70, 0x5, 0xffffffffffffff9d, 0x6, 0xfffffffffffffffb, 0x0, 0x3ff, 0x10000, 0xa, 0x6, 0x1, 0x8000, 0x0, 0xec, 0x1, 0x6, 0x2, 0xffffffffffff0001, 0x8d, 0xb93, 0x6, 0x4, 0x9, 0x3, 0x7, 0x457, 0x9, 0x83, 0x2, 0x8, 0xfffffffffffffffe, 0x400, 0xfff, 0x0, 0x3, 0xffffffff, 0x5, 0x0, 0x200, 0x4, @perf_bp={&(0x7f0000000600), 0xf}, 0x400, 0xfb, 0x686, 0x7, 0x8000000000000, 0xee89, 0x98}, r7, 0xb, r0, 0x8) getsockopt$inet_sctp6_SCTP_RECONFIG_SUPPORTED(r3, 0x84, 0x75, &(0x7f0000000300)={r5, 0x6}, &(0x7f0000000340)=0x8) ioctl$sock_netrom_TIOCINQ(r3, 0x541b, &(0x7f00000002c0)) r8 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000140)='/dev/snapshot\x00', 0x200000, 0x0) r9 = syz_open_dev$usbmon(&(0x7f00000001c0)='/dev/usbmon#\x00', 0x4b4, 0x200) ioctl$sock_inet_udp_SIOCINQ(r8, 0x541b, &(0x7f0000000180)) ioctl$sock_inet_SIOCGIFNETMASK(r9, 0x891b, &(0x7f0000000200)={'erspan0\x00', {0x2, 0x4e24, @local={0xac, 0x14, 0x14, 0xaa}}}) ioctl$TCSETAF(r6, 0x5412, &(0x7f00000000c0)) r10 = socket$inet_sctp(0x2, 0x5, 0x84) ioctl$VT_ACTIVATE(r2, 0x5606, 0x3ff) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f00000003c0)='./cgroup/syz1\x00', 0x1ff) fcntl$dupfd(r1, 0x406, r10) clone(0x24000000, &(0x7f0000000680), &(0x7f0000000800), &(0x7f0000000640), &(0x7f0000000480)="6cbd51a68b34088f82798abb0d96907921d405b768e0c7aff34f5c20e8e437e7a3de202da386db8881305587bb6e") 2018/05/17 18:19:06 executing program 2: r0 = openat$keychord(0xffffffffffffff9c, &(0x7f00000005c0)='/dev/keychord\x00', 0x200242, 0x0) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000100)="2e2f6367726f75702fe359ed7379", 0x1ff) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000440)='/dev/ptmx\x00', 0xfffffffffffefffc, 0x0) ioctl$TCSETS(r2, 0x40045431, &(0x7f00005befdc)) r3 = dup2(r1, r1) r4 = timerfd_create(0x0, 0x0) timerfd_settime(r4, 0x1, &(0x7f0000000080)={{0x0, 0x989680}, {0x0, 0x989680}}, &(0x7f0000000140)) timerfd_gettime(r4, &(0x7f00000000c0)) openat$ptmx(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/ptmx\x00', 0x80000, 0x0) getsockopt$inet_sctp_SCTP_CONTEXT(0xffffffffffffffff, 0x84, 0x11, &(0x7f0000000240)={0x0, 0x2800000000}, &(0x7f0000000280)=0x8) getsockopt$inet_sctp6_SCTP_GET_LOCAL_ADDRS(r3, 0x84, 0x6d, &(0x7f0000000700)=ANY=[@ANYRES32=r5, @ANYBLOB="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"], &(0x7f0000000380)=0x2) setsockopt$bt_BT_SECURITY(r3, 0x112, 0x4, &(0x7f0000000400)={0x80000000, 0xfffffffffffffffe}, 0x2) r6 = syz_open_pts(r2, 0x0) ioctl$TIOCEXCL(r2, 0x540c) ioctl$sock_SIOCGPGRP(r3, 0x8904, &(0x7f00000006c0)=0x0) perf_event_open(&(0x7f0000000640)={0x5, 0x70, 0x5, 0xffffffffffffff9d, 0x6, 0xfffffffffffffffb, 0x0, 0x3ff, 0x10000, 0xa, 0x6, 0x1, 0x8000, 0x0, 0xec, 0x1, 0x6, 0x2, 0xffffffffffff0001, 0x8d, 0xb93, 0x6, 0x4, 0x9, 0x3, 0x7, 0x457, 0x9, 0x83, 0x2, 0x8, 0xfffffffffffffffe, 0x400, 0xfff, 0x0, 0x3, 0xffffffff, 0x5, 0x0, 0x200, 0x4, @perf_bp={&(0x7f0000000600), 0xf}, 0x400, 0xfb, 0x686, 0x7, 0x8000000000000, 0xee89, 0x98}, r7, 0xb, r0, 0x8) getsockopt$inet_sctp6_SCTP_RECONFIG_SUPPORTED(r3, 0x84, 0x75, &(0x7f0000000300)={r5, 0x6}, &(0x7f0000000340)=0x8) ioctl$sock_netrom_TIOCINQ(r3, 0x541b, &(0x7f00000002c0)) r8 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000140)='/dev/snapshot\x00', 0x200000, 0x0) r9 = syz_open_dev$usbmon(&(0x7f00000001c0)='/dev/usbmon#\x00', 0x4b4, 0x200) ioctl$sock_inet_udp_SIOCINQ(r8, 0x541b, &(0x7f0000000180)) ioctl$sock_inet_SIOCGIFNETMASK(r9, 0x891b, &(0x7f0000000200)={'erspan0\x00', {0x2, 0x4e24, @local={0xac, 0x14, 0x14, 0xaa}}}) ioctl$TCSETAF(r6, 0x5412, &(0x7f00000000c0)) r10 = socket$inet_sctp(0x2, 0x5, 0x84) ioctl$VT_ACTIVATE(r2, 0x5606, 0x3ff) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f00000003c0)='./cgroup/syz1\x00', 0x1ff) fcntl$dupfd(r1, 0x406, r10) clone(0x24000000, &(0x7f0000000680), &(0x7f0000000800), &(0x7f0000000640), &(0x7f0000000480)="6cbd51a68b34088f82798abb0d96907921d405b768e0c7aff34f5c20e8e437e7a3de202da386db8881305587bb6e") 2018/05/17 18:19:06 executing program 0: r0 = openat$keychord(0xffffffffffffff9c, &(0x7f00000005c0)='/dev/keychord\x00', 0x200242, 0x0) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000100)="2e2f6367726f75702fe359ed7379", 0x1ff) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000440)='/dev/ptmx\x00', 0xfffffffffffefffc, 0x0) ioctl$TCSETS(r2, 0x40045431, &(0x7f00005befdc)) r3 = dup2(r1, r1) r4 = timerfd_create(0x0, 0x0) timerfd_settime(r4, 0x1, &(0x7f0000000080)={{0x0, 0x989680}, {0x0, 0x989680}}, &(0x7f0000000140)) timerfd_gettime(r4, &(0x7f00000000c0)) openat$ptmx(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/ptmx\x00', 0x80000, 0x0) getsockopt$inet_sctp_SCTP_CONTEXT(0xffffffffffffffff, 0x84, 0x11, &(0x7f0000000240)={0x0, 0x2800000000}, &(0x7f0000000280)=0x8) getsockopt$inet_sctp6_SCTP_GET_LOCAL_ADDRS(r3, 0x84, 0x6d, &(0x7f0000000700)=ANY=[@ANYRES32=r5, @ANYBLOB="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"], &(0x7f0000000380)=0x2) setsockopt$bt_BT_SECURITY(r3, 0x112, 0x4, &(0x7f0000000400)={0x80000000, 0xfffffffffffffffe}, 0x2) r6 = syz_open_pts(r2, 0x0) ioctl$TIOCEXCL(r2, 0x540c) ioctl$sock_SIOCGPGRP(r3, 0x8904, &(0x7f00000006c0)=0x0) perf_event_open(&(0x7f0000000640)={0x5, 0x70, 0x5, 0xffffffffffffff9d, 0x6, 0xfffffffffffffffb, 0x0, 0x3ff, 0x10000, 0xa, 0x6, 0x1, 0x8000, 0x0, 0xec, 0x1, 0x6, 0x2, 0xffffffffffff0001, 0x8d, 0xb93, 0x6, 0x4, 0x9, 0x3, 0x7, 0x457, 0x9, 0x83, 0x2, 0x8, 0xfffffffffffffffe, 0x400, 0xfff, 0x0, 0x3, 0xffffffff, 0x5, 0x0, 0x200, 0x4, @perf_bp={&(0x7f0000000600), 0xf}, 0x400, 0xfb, 0x686, 0x7, 0x8000000000000, 0xee89, 0x98}, r7, 0xb, r0, 0x8) getsockopt$inet_sctp6_SCTP_RECONFIG_SUPPORTED(r3, 0x84, 0x75, &(0x7f0000000300)={r5, 0x6}, &(0x7f0000000340)=0x8) ioctl$sock_netrom_TIOCINQ(r3, 0x541b, &(0x7f00000002c0)) r8 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000140)='/dev/snapshot\x00', 0x200000, 0x0) r9 = syz_open_dev$usbmon(&(0x7f00000001c0)='/dev/usbmon#\x00', 0x4b4, 0x200) ioctl$sock_inet_udp_SIOCINQ(r8, 0x541b, &(0x7f0000000180)) ioctl$sock_inet_SIOCGIFNETMASK(r9, 0x891b, &(0x7f0000000200)={'erspan0\x00', {0x2, 0x4e24, @local={0xac, 0x14, 0x14, 0xaa}}}) ioctl$TCSETAF(r6, 0x5412, &(0x7f00000000c0)) r10 = socket$inet_sctp(0x2, 0x5, 0x84) ioctl$VT_ACTIVATE(r2, 0x5606, 0x3ff) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f00000003c0)='./cgroup/syz1\x00', 0x1ff) fcntl$dupfd(r1, 0x406, r10) clone(0x24000000, &(0x7f0000000680), &(0x7f0000000800), &(0x7f0000000640), &(0x7f0000000480)="6cbd51a68b34088f82798abb0d96907921d405b768e0c7aff34f5c20e8e437e7a3de202da386db8881305587bb6e") 2018/05/17 18:19:06 executing program 3: r0 = openat$keychord(0xffffffffffffff9c, &(0x7f00000005c0)='/dev/keychord\x00', 0x200242, 0x0) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000100)="2e2f6367726f75702fe359ed7379", 0x1ff) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000440)='/dev/ptmx\x00', 0xfffffffffffefffc, 0x0) ioctl$TCSETS(r2, 0x40045431, &(0x7f00005befdc)) r3 = dup2(r1, r1) r4 = timerfd_create(0x0, 0x0) timerfd_settime(r4, 0x1, &(0x7f0000000080)={{0x0, 0x989680}, {0x0, 0x989680}}, &(0x7f0000000140)) timerfd_gettime(r4, &(0x7f00000000c0)) openat$ptmx(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/ptmx\x00', 0x80000, 0x0) getsockopt$inet_sctp_SCTP_CONTEXT(0xffffffffffffffff, 0x84, 0x11, &(0x7f0000000240)={0x0, 0x2800000000}, &(0x7f0000000280)=0x8) getsockopt$inet_sctp6_SCTP_GET_LOCAL_ADDRS(r3, 0x84, 0x6d, &(0x7f0000000700)=ANY=[@ANYRES32=r5, @ANYBLOB="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"], &(0x7f0000000380)=0x2) setsockopt$bt_BT_SECURITY(r3, 0x112, 0x4, &(0x7f0000000400)={0x80000000, 0xfffffffffffffffe}, 0x2) r6 = syz_open_pts(r2, 0x0) ioctl$TIOCEXCL(r2, 0x540c) ioctl$sock_SIOCGPGRP(r3, 0x8904, &(0x7f00000006c0)=0x0) perf_event_open(&(0x7f0000000640)={0x5, 0x70, 0x5, 0xffffffffffffff9d, 0x6, 0xfffffffffffffffb, 0x0, 0x3ff, 0x10000, 0xa, 0x6, 0x1, 0x8000, 0x0, 0xec, 0x1, 0x6, 0x2, 0xffffffffffff0001, 0x8d, 0xb93, 0x6, 0x4, 0x9, 0x3, 0x7, 0x457, 0x9, 0x83, 0x2, 0x8, 0xfffffffffffffffe, 0x400, 0xfff, 0x0, 0x3, 0xffffffff, 0x5, 0x0, 0x200, 0x4, @perf_bp={&(0x7f0000000600), 0xf}, 0x400, 0xfb, 0x686, 0x7, 0x8000000000000, 0xee89, 0x98}, r7, 0xb, r0, 0x8) getsockopt$inet_sctp6_SCTP_RECONFIG_SUPPORTED(r3, 0x84, 0x75, &(0x7f0000000300)={r5, 0x6}, &(0x7f0000000340)=0x8) ioctl$sock_netrom_TIOCINQ(r3, 0x541b, &(0x7f00000002c0)) r8 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000140)='/dev/snapshot\x00', 0x200000, 0x0) r9 = syz_open_dev$usbmon(&(0x7f00000001c0)='/dev/usbmon#\x00', 0x4b4, 0x200) ioctl$sock_inet_udp_SIOCINQ(r8, 0x541b, &(0x7f0000000180)) ioctl$sock_inet_SIOCGIFNETMASK(r9, 0x891b, &(0x7f0000000200)={'erspan0\x00', {0x2, 0x4e24, @local={0xac, 0x14, 0x14, 0xaa}}}) ioctl$TCSETAF(r6, 0x5412, &(0x7f00000000c0)) r10 = socket$inet_sctp(0x2, 0x5, 0x84) ioctl$VT_ACTIVATE(r2, 0x5606, 0x3ff) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f00000003c0)='./cgroup/syz1\x00', 0x1ff) fcntl$dupfd(r1, 0x406, r10) clone(0x24000000, &(0x7f0000000680), &(0x7f0000000800), &(0x7f0000000640), &(0x7f0000000480)="6cbd51a68b34088f82798abb0d96907921d405b768e0c7aff34f5c20e8e437e7a3de202da386db8881305587bb6e") 2018/05/17 18:19:06 executing program 4: r0 = openat$keychord(0xffffffffffffff9c, &(0x7f00000005c0)='/dev/keychord\x00', 0x200242, 0x0) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000100)="2e2f6367726f75702fe359ed7379", 0x1ff) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000440)='/dev/ptmx\x00', 0xfffffffffffefffc, 0x0) ioctl$TCSETS(r2, 0x40045431, &(0x7f00005befdc)) r3 = dup2(r1, r1) r4 = timerfd_create(0x0, 0x0) timerfd_settime(r4, 0x1, &(0x7f0000000080)={{0x0, 0x989680}, {0x0, 0x989680}}, &(0x7f0000000140)) timerfd_gettime(r4, &(0x7f00000000c0)) openat$ptmx(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/ptmx\x00', 0x80000, 0x0) getsockopt$inet_sctp_SCTP_CONTEXT(0xffffffffffffffff, 0x84, 0x11, &(0x7f0000000240)={0x0, 0x2800000000}, &(0x7f0000000280)=0x8) getsockopt$inet_sctp6_SCTP_GET_LOCAL_ADDRS(r3, 0x84, 0x6d, &(0x7f0000000700)=ANY=[@ANYRES32=r5, @ANYBLOB="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"], &(0x7f0000000380)=0x2) setsockopt$bt_BT_SECURITY(r3, 0x112, 0x4, &(0x7f0000000400)={0x80000000, 0xfffffffffffffffe}, 0x2) r6 = syz_open_pts(r2, 0x0) ioctl$TIOCEXCL(r2, 0x540c) ioctl$sock_SIOCGPGRP(r3, 0x8904, &(0x7f00000006c0)=0x0) perf_event_open(&(0x7f0000000640)={0x5, 0x70, 0x5, 0xffffffffffffff9d, 0x6, 0xfffffffffffffffb, 0x0, 0x3ff, 0x10000, 0xa, 0x6, 0x1, 0x8000, 0x0, 0xec, 0x1, 0x6, 0x2, 0xffffffffffff0001, 0x8d, 0xb93, 0x6, 0x4, 0x9, 0x3, 0x7, 0x457, 0x9, 0x83, 0x2, 0x8, 0xfffffffffffffffe, 0x400, 0xfff, 0x0, 0x3, 0xffffffff, 0x5, 0x0, 0x200, 0x4, @perf_bp={&(0x7f0000000600), 0xf}, 0x400, 0xfb, 0x686, 0x7, 0x8000000000000, 0xee89, 0x98}, r7, 0xb, r0, 0x8) getsockopt$inet_sctp6_SCTP_RECONFIG_SUPPORTED(r3, 0x84, 0x75, &(0x7f0000000300)={r5, 0x6}, &(0x7f0000000340)=0x8) ioctl$sock_netrom_TIOCINQ(r3, 0x541b, &(0x7f00000002c0)) r8 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000140)='/dev/snapshot\x00', 0x200000, 0x0) r9 = syz_open_dev$usbmon(&(0x7f00000001c0)='/dev/usbmon#\x00', 0x4b4, 0x200) ioctl$sock_inet_udp_SIOCINQ(r8, 0x541b, &(0x7f0000000180)) ioctl$sock_inet_SIOCGIFNETMASK(r9, 0x891b, &(0x7f0000000200)={'erspan0\x00', {0x2, 0x4e24, @local={0xac, 0x14, 0x14, 0xaa}}}) ioctl$TCSETAF(r6, 0x5412, &(0x7f00000000c0)) r10 = socket$inet_sctp(0x2, 0x5, 0x84) ioctl$VT_ACTIVATE(r2, 0x5606, 0x3ff) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f00000003c0)='./cgroup/syz1\x00', 0x1ff) fcntl$dupfd(r1, 0x406, r10) clone(0x24000000, &(0x7f0000000680), &(0x7f0000000800), &(0x7f0000000640), &(0x7f0000000480)="6cbd51a68b34088f82798abb0d96907921d405b768e0c7aff34f5c20e8e437e7a3de202da386db8881305587bb6e") 2018/05/17 18:19:06 executing program 5: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$ndb(&(0x7f0000000100)='/dev/nbd#\x00', 0xffffffffffffffff, 0x0) ioctl$BLKTRACESETUP(r1, 0xc0481273, &(0x7f0000000000)={[], 0x0, 0x9, 0x8001}) r2 = fcntl$dupfd(r0, 0x406, r0) setsockopt$packet_rx_ring(r2, 0x107, 0x5, &(0x7f00000000c0)=@req={0x9, 0x2, 0x4, 0xfff}, 0x10) ioctl$BLKTRACETEARDOWN(r1, 0x1276, 0x0) openat$selinux_status(0xffffffffffffff9c, &(0x7f0000000240)='/selinux/status\x00', 0x0, 0x0) 2018/05/17 18:19:06 executing program 6: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$ndb(&(0x7f0000000100)='/dev/nbd#\x00', 0xffffffffffffffff, 0x0) ioctl$BLKTRACESETUP(r1, 0xc0481273, &(0x7f0000000000)={[], 0x0, 0x9, 0x8001}) r2 = fcntl$dupfd(r0, 0x406, r0) setsockopt$packet_rx_ring(r2, 0x107, 0x5, &(0x7f00000000c0)=@req={0x9, 0x2, 0x4, 0xfff}, 0x10) ioctl$BLKTRACETEARDOWN(r1, 0x1276, 0x0) openat$selinux_status(0xffffffffffffff9c, &(0x7f0000000240)='/selinux/status\x00', 0x0, 0x0) 2018/05/17 18:19:06 executing program 7: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$ndb(&(0x7f0000000100)='/dev/nbd#\x00', 0xffffffffffffffff, 0x0) ioctl$BLKTRACESETUP(r1, 0xc0481273, &(0x7f0000000000)={[], 0x0, 0x9, 0x8001}) r2 = fcntl$dupfd(r0, 0x406, r0) setsockopt$packet_rx_ring(r2, 0x107, 0x5, &(0x7f00000000c0)=@req={0x9, 0x2, 0x4, 0xfff}, 0x10) ioctl$BLKTRACETEARDOWN(r1, 0x1276, 0x0) openat$selinux_status(0xffffffffffffff9c, &(0x7f0000000240)='/selinux/status\x00', 0x0, 0x0) 2018/05/17 18:19:06 executing program 1: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$ndb(&(0x7f0000000100)='/dev/nbd#\x00', 0xffffffffffffffff, 0x0) ioctl$BLKTRACESETUP(r1, 0xc0481273, &(0x7f0000000000)={[], 0x0, 0x9, 0x8001}) r2 = fcntl$dupfd(r0, 0x406, r0) setsockopt$packet_rx_ring(r2, 0x107, 0x5, &(0x7f00000000c0)=@req={0x9, 0x2, 0x4, 0xfff}, 0x10) ioctl$BLKTRACETEARDOWN(r1, 0x1276, 0x0) openat$selinux_status(0xffffffffffffff9c, &(0x7f0000000240)='/selinux/status\x00', 0x0, 0x0) 2018/05/17 18:19:06 executing program 2: r0 = openat$keychord(0xffffffffffffff9c, &(0x7f00000005c0)='/dev/keychord\x00', 0x200242, 0x0) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000100)="2e2f6367726f75702fe359ed7379", 0x1ff) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000440)='/dev/ptmx\x00', 0xfffffffffffefffc, 0x0) ioctl$TCSETS(r2, 0x40045431, &(0x7f00005befdc)) r3 = dup2(r1, r1) r4 = timerfd_create(0x0, 0x0) timerfd_settime(r4, 0x1, &(0x7f0000000080)={{0x0, 0x989680}, {0x0, 0x989680}}, &(0x7f0000000140)) timerfd_gettime(r4, &(0x7f00000000c0)) openat$ptmx(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/ptmx\x00', 0x80000, 0x0) getsockopt$inet_sctp_SCTP_CONTEXT(0xffffffffffffffff, 0x84, 0x11, &(0x7f0000000240)={0x0, 0x2800000000}, &(0x7f0000000280)=0x8) getsockopt$inet_sctp6_SCTP_GET_LOCAL_ADDRS(r3, 0x84, 0x6d, &(0x7f0000000700)=ANY=[@ANYRES32=r5, @ANYBLOB="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"], &(0x7f0000000380)=0x2) setsockopt$bt_BT_SECURITY(r3, 0x112, 0x4, &(0x7f0000000400)={0x80000000, 0xfffffffffffffffe}, 0x2) r6 = syz_open_pts(r2, 0x0) ioctl$TIOCEXCL(r2, 0x540c) ioctl$sock_SIOCGPGRP(r3, 0x8904, &(0x7f00000006c0)=0x0) perf_event_open(&(0x7f0000000640)={0x5, 0x70, 0x5, 0xffffffffffffff9d, 0x6, 0xfffffffffffffffb, 0x0, 0x3ff, 0x10000, 0xa, 0x6, 0x1, 0x8000, 0x0, 0xec, 0x1, 0x6, 0x2, 0xffffffffffff0001, 0x8d, 0xb93, 0x6, 0x4, 0x9, 0x3, 0x7, 0x457, 0x9, 0x83, 0x2, 0x8, 0xfffffffffffffffe, 0x400, 0xfff, 0x0, 0x3, 0xffffffff, 0x5, 0x0, 0x200, 0x4, @perf_bp={&(0x7f0000000600), 0xf}, 0x400, 0xfb, 0x686, 0x7, 0x8000000000000, 0xee89, 0x98}, r7, 0xb, r0, 0x8) getsockopt$inet_sctp6_SCTP_RECONFIG_SUPPORTED(r3, 0x84, 0x75, &(0x7f0000000300)={r5, 0x6}, &(0x7f0000000340)=0x8) ioctl$sock_netrom_TIOCINQ(r3, 0x541b, &(0x7f00000002c0)) r8 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000140)='/dev/snapshot\x00', 0x200000, 0x0) r9 = syz_open_dev$usbmon(&(0x7f00000001c0)='/dev/usbmon#\x00', 0x4b4, 0x200) ioctl$sock_inet_udp_SIOCINQ(r8, 0x541b, &(0x7f0000000180)) ioctl$sock_inet_SIOCGIFNETMASK(r9, 0x891b, &(0x7f0000000200)={'erspan0\x00', {0x2, 0x4e24, @local={0xac, 0x14, 0x14, 0xaa}}}) ioctl$TCSETAF(r6, 0x5412, &(0x7f00000000c0)) r10 = socket$inet_sctp(0x2, 0x5, 0x84) ioctl$VT_ACTIVATE(r2, 0x5606, 0x3ff) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f00000003c0)='./cgroup/syz1\x00', 0x1ff) fcntl$dupfd(r1, 0x406, r10) clone(0x24000000, &(0x7f0000000680), &(0x7f0000000800), &(0x7f0000000640), &(0x7f0000000480)="6cbd51a68b34088f82798abb0d96907921d405b768e0c7aff34f5c20e8e437e7a3de202da386db8881305587bb6e") 2018/05/17 18:19:06 executing program 5: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$ndb(&(0x7f0000000100)='/dev/nbd#\x00', 0xffffffffffffffff, 0x0) ioctl$BLKTRACESETUP(r1, 0xc0481273, &(0x7f0000000000)={[], 0x0, 0x9, 0x8001}) r2 = fcntl$dupfd(r0, 0x406, r0) setsockopt$packet_rx_ring(r2, 0x107, 0x5, &(0x7f00000000c0)=@req={0x9, 0x2, 0x4, 0xfff}, 0x10) ioctl$BLKTRACETEARDOWN(r1, 0x1276, 0x0) openat$selinux_status(0xffffffffffffff9c, &(0x7f0000000240)='/selinux/status\x00', 0x0, 0x0) 2018/05/17 18:19:06 executing program 4: r0 = openat$keychord(0xffffffffffffff9c, &(0x7f00000005c0)='/dev/keychord\x00', 0x200242, 0x0) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000100)="2e2f6367726f75702fe359ed7379", 0x1ff) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000440)='/dev/ptmx\x00', 0xfffffffffffefffc, 0x0) ioctl$TCSETS(r2, 0x40045431, &(0x7f00005befdc)) r3 = dup2(r1, r1) r4 = timerfd_create(0x0, 0x0) timerfd_settime(r4, 0x1, &(0x7f0000000080)={{0x0, 0x989680}, {0x0, 0x989680}}, &(0x7f0000000140)) timerfd_gettime(r4, &(0x7f00000000c0)) openat$ptmx(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/ptmx\x00', 0x80000, 0x0) getsockopt$inet_sctp_SCTP_CONTEXT(0xffffffffffffffff, 0x84, 0x11, &(0x7f0000000240)={0x0, 0x2800000000}, &(0x7f0000000280)=0x8) getsockopt$inet_sctp6_SCTP_GET_LOCAL_ADDRS(r3, 0x84, 0x6d, &(0x7f0000000700)=ANY=[@ANYRES32=r5, @ANYBLOB="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"], &(0x7f0000000380)=0x2) setsockopt$bt_BT_SECURITY(r3, 0x112, 0x4, &(0x7f0000000400)={0x80000000, 0xfffffffffffffffe}, 0x2) r6 = syz_open_pts(r2, 0x0) ioctl$TIOCEXCL(r2, 0x540c) ioctl$sock_SIOCGPGRP(r3, 0x8904, &(0x7f00000006c0)=0x0) perf_event_open(&(0x7f0000000640)={0x5, 0x70, 0x5, 0xffffffffffffff9d, 0x6, 0xfffffffffffffffb, 0x0, 0x3ff, 0x10000, 0xa, 0x6, 0x1, 0x8000, 0x0, 0xec, 0x1, 0x6, 0x2, 0xffffffffffff0001, 0x8d, 0xb93, 0x6, 0x4, 0x9, 0x3, 0x7, 0x457, 0x9, 0x83, 0x2, 0x8, 0xfffffffffffffffe, 0x400, 0xfff, 0x0, 0x3, 0xffffffff, 0x5, 0x0, 0x200, 0x4, @perf_bp={&(0x7f0000000600), 0xf}, 0x400, 0xfb, 0x686, 0x7, 0x8000000000000, 0xee89, 0x98}, r7, 0xb, r0, 0x8) getsockopt$inet_sctp6_SCTP_RECONFIG_SUPPORTED(r3, 0x84, 0x75, &(0x7f0000000300)={r5, 0x6}, &(0x7f0000000340)=0x8) ioctl$sock_netrom_TIOCINQ(r3, 0x541b, &(0x7f00000002c0)) r8 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000140)='/dev/snapshot\x00', 0x200000, 0x0) r9 = syz_open_dev$usbmon(&(0x7f00000001c0)='/dev/usbmon#\x00', 0x4b4, 0x200) ioctl$sock_inet_udp_SIOCINQ(r8, 0x541b, &(0x7f0000000180)) ioctl$sock_inet_SIOCGIFNETMASK(r9, 0x891b, &(0x7f0000000200)={'erspan0\x00', {0x2, 0x4e24, @local={0xac, 0x14, 0x14, 0xaa}}}) ioctl$TCSETAF(r6, 0x5412, &(0x7f00000000c0)) r10 = socket$inet_sctp(0x2, 0x5, 0x84) ioctl$VT_ACTIVATE(r2, 0x5606, 0x3ff) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f00000003c0)='./cgroup/syz1\x00', 0x1ff) fcntl$dupfd(r1, 0x406, r10) clone(0x24000000, &(0x7f0000000680), &(0x7f0000000800), &(0x7f0000000640), &(0x7f0000000480)="6cbd51a68b34088f82798abb0d96907921d405b768e0c7aff34f5c20e8e437e7a3de202da386db8881305587bb6e") 2018/05/17 18:19:06 executing program 3: r0 = openat$keychord(0xffffffffffffff9c, &(0x7f00000005c0)='/dev/keychord\x00', 0x200242, 0x0) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000100)="2e2f6367726f75702fe359ed7379", 0x1ff) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000440)='/dev/ptmx\x00', 0xfffffffffffefffc, 0x0) ioctl$TCSETS(r2, 0x40045431, &(0x7f00005befdc)) r3 = dup2(r1, r1) r4 = timerfd_create(0x0, 0x0) timerfd_settime(r4, 0x1, &(0x7f0000000080)={{0x0, 0x989680}, {0x0, 0x989680}}, &(0x7f0000000140)) timerfd_gettime(r4, &(0x7f00000000c0)) openat$ptmx(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/ptmx\x00', 0x80000, 0x0) getsockopt$inet_sctp_SCTP_CONTEXT(0xffffffffffffffff, 0x84, 0x11, &(0x7f0000000240)={0x0, 0x2800000000}, &(0x7f0000000280)=0x8) getsockopt$inet_sctp6_SCTP_GET_LOCAL_ADDRS(r3, 0x84, 0x6d, &(0x7f0000000700)=ANY=[@ANYRES32=r5, @ANYBLOB="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"], &(0x7f0000000380)=0x2) setsockopt$bt_BT_SECURITY(r3, 0x112, 0x4, &(0x7f0000000400)={0x80000000, 0xfffffffffffffffe}, 0x2) r6 = syz_open_pts(r2, 0x0) ioctl$TIOCEXCL(r2, 0x540c) ioctl$sock_SIOCGPGRP(r3, 0x8904, &(0x7f00000006c0)=0x0) perf_event_open(&(0x7f0000000640)={0x5, 0x70, 0x5, 0xffffffffffffff9d, 0x6, 0xfffffffffffffffb, 0x0, 0x3ff, 0x10000, 0xa, 0x6, 0x1, 0x8000, 0x0, 0xec, 0x1, 0x6, 0x2, 0xffffffffffff0001, 0x8d, 0xb93, 0x6, 0x4, 0x9, 0x3, 0x7, 0x457, 0x9, 0x83, 0x2, 0x8, 0xfffffffffffffffe, 0x400, 0xfff, 0x0, 0x3, 0xffffffff, 0x5, 0x0, 0x200, 0x4, @perf_bp={&(0x7f0000000600), 0xf}, 0x400, 0xfb, 0x686, 0x7, 0x8000000000000, 0xee89, 0x98}, r7, 0xb, r0, 0x8) getsockopt$inet_sctp6_SCTP_RECONFIG_SUPPORTED(r3, 0x84, 0x75, &(0x7f0000000300)={r5, 0x6}, &(0x7f0000000340)=0x8) ioctl$sock_netrom_TIOCINQ(r3, 0x541b, &(0x7f00000002c0)) r8 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000140)='/dev/snapshot\x00', 0x200000, 0x0) r9 = syz_open_dev$usbmon(&(0x7f00000001c0)='/dev/usbmon#\x00', 0x4b4, 0x200) ioctl$sock_inet_udp_SIOCINQ(r8, 0x541b, &(0x7f0000000180)) ioctl$sock_inet_SIOCGIFNETMASK(r9, 0x891b, &(0x7f0000000200)={'erspan0\x00', {0x2, 0x4e24, @local={0xac, 0x14, 0x14, 0xaa}}}) ioctl$TCSETAF(r6, 0x5412, &(0x7f00000000c0)) r10 = socket$inet_sctp(0x2, 0x5, 0x84) ioctl$VT_ACTIVATE(r2, 0x5606, 0x3ff) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f00000003c0)='./cgroup/syz1\x00', 0x1ff) fcntl$dupfd(r1, 0x406, r10) clone(0x24000000, &(0x7f0000000680), &(0x7f0000000800), &(0x7f0000000640), &(0x7f0000000480)="6cbd51a68b34088f82798abb0d96907921d405b768e0c7aff34f5c20e8e437e7a3de202da386db8881305587bb6e") 2018/05/17 18:19:06 executing program 0: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000100)={'team_slave_1\x00', &(0x7f0000000040)=@ethtool_cmd={0x19}}) 2018/05/17 18:19:06 executing program 0: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000100)={'team_slave_1\x00', &(0x7f0000000040)=@ethtool_cmd={0x19}}) 2018/05/17 18:19:06 executing program 2: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_ifreq(r0, 0x891e, &(0x7f0000000000)={'team_slave_1\x00', @ifru_mtu}) 2018/05/17 18:19:06 executing program 0: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000100)={'team_slave_1\x00', &(0x7f0000000040)=@ethtool_cmd={0x19}}) 2018/05/17 18:19:06 executing program 1: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$ndb(&(0x7f0000000100)='/dev/nbd#\x00', 0xffffffffffffffff, 0x0) ioctl$BLKTRACESETUP(r1, 0xc0481273, &(0x7f0000000000)={[], 0x0, 0x9, 0x8001}) r2 = fcntl$dupfd(r0, 0x406, r0) setsockopt$packet_rx_ring(r2, 0x107, 0x5, &(0x7f00000000c0)=@req={0x9, 0x2, 0x4, 0xfff}, 0x10) ioctl$BLKTRACETEARDOWN(r1, 0x1276, 0x0) openat$selinux_status(0xffffffffffffff9c, &(0x7f0000000240)='/selinux/status\x00', 0x0, 0x0) 2018/05/17 18:19:06 executing program 2: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_ifreq(r0, 0x891e, &(0x7f0000000000)={'team_slave_1\x00', @ifru_mtu}) 2018/05/17 18:19:06 executing program 2: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_ifreq(r0, 0x891e, &(0x7f0000000000)={'team_slave_1\x00', @ifru_mtu}) 2018/05/17 18:19:06 executing program 0: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000100)={'team_slave_1\x00', &(0x7f0000000040)=@ethtool_cmd={0x19}}) 2018/05/17 18:19:06 executing program 2: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_ifreq(r0, 0x891e, &(0x7f0000000000)={'team_slave_1\x00', @ifru_mtu}) 2018/05/17 18:19:06 executing program 6: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$ndb(&(0x7f0000000100)='/dev/nbd#\x00', 0xffffffffffffffff, 0x0) ioctl$BLKTRACESETUP(r1, 0xc0481273, &(0x7f0000000000)={[], 0x0, 0x9, 0x8001}) r2 = fcntl$dupfd(r0, 0x406, r0) setsockopt$packet_rx_ring(r2, 0x107, 0x5, &(0x7f00000000c0)=@req={0x9, 0x2, 0x4, 0xfff}, 0x10) ioctl$BLKTRACETEARDOWN(r1, 0x1276, 0x0) openat$selinux_status(0xffffffffffffff9c, &(0x7f0000000240)='/selinux/status\x00', 0x0, 0x0) 2018/05/17 18:19:07 executing program 7: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$ndb(&(0x7f0000000100)='/dev/nbd#\x00', 0xffffffffffffffff, 0x0) ioctl$BLKTRACESETUP(r1, 0xc0481273, &(0x7f0000000000)={[], 0x0, 0x9, 0x8001}) r2 = fcntl$dupfd(r0, 0x406, r0) setsockopt$packet_rx_ring(r2, 0x107, 0x5, &(0x7f00000000c0)=@req={0x9, 0x2, 0x4, 0xfff}, 0x10) ioctl$BLKTRACETEARDOWN(r1, 0x1276, 0x0) openat$selinux_status(0xffffffffffffff9c, &(0x7f0000000240)='/selinux/status\x00', 0x0, 0x0) 2018/05/17 18:19:07 executing program 0: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000040), 0x0, &(0x7f0000000240)=ANY=[]) socket(0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$inet(r0, &(0x7f0000deb000)={0x2, 0x4e23, @multicast1=0xe0000001}, 0x10) sendto$inet(r0, &(0x7f0000a88f88), 0x332, 0x20000800, &(0x7f0000e68000)={0x2, 0x4e23}, 0x10) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000000)="766574683100000000ffffffffffef00", 0x10) sendto$inet(r0, &(0x7f0000000000), 0xfffffffffffffe4e, 0xc0, &(0x7f00000000c0)={0x2}, 0x10) 2018/05/17 18:19:07 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='map_files\x00') getdents(r0, &(0x7f00000001c0)=""/69, 0xfe) getdents64(r0, &(0x7f0000004100)=""/4096, 0x111e) 2018/05/17 18:19:07 executing program 3: r0 = openat$hwrng(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/hwrng\x00', 0x101, 0x0) ioctl$BLKFLSBUF(r0, 0x1261, &(0x7f0000000200)=0x5) perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x71}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ustat(0x1, &(0x7f0000000040)) perf_event_open(&(0x7f00000004c0)={0x2, 0x239, 0x72, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xd4e9, 0x25}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket(0xa, 0x1, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = openat$null(0xffffffffffffff9c, &(0x7f0000000280)='/dev/null\x00', 0x3, 0x0) ioctl$EVIOCSREP(r3, 0x40084503, &(0x7f00000001c0)=[0x2, 0x100]) setsockopt$IP_VS_SO_SET_STARTDAEMON(r1, 0x0, 0x48b, &(0x7f0000000080)={0x2, 'veth1_to_team\x00', 0x1}, 0x18) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000440)={'syz_tun\x00'}) sendmsg$nl_route(r2, &(0x7f0000000180)={&(0x7f0000000000)={0x10}, 0xc, &(0x7f00000000c0)={&(0x7f0000000040)=ANY=[@ANYBLOB="2800000013002f0f000000000000000000000000"], 0x1}, 0x1}, 0x0) clone(0x24000000, &(0x7f0000000080)="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", &(0x7f0000000800), &(0x7f0000000640), &(0x7f00000003c0)) 2018/05/17 18:19:07 executing program 5: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$ndb(&(0x7f0000000100)='/dev/nbd#\x00', 0xffffffffffffffff, 0x0) ioctl$BLKTRACESETUP(r1, 0xc0481273, &(0x7f0000000000)={[], 0x0, 0x9, 0x8001}) r2 = fcntl$dupfd(r0, 0x406, r0) setsockopt$packet_rx_ring(r2, 0x107, 0x5, &(0x7f00000000c0)=@req={0x9, 0x2, 0x4, 0xfff}, 0x10) ioctl$BLKTRACETEARDOWN(r1, 0x1276, 0x0) openat$selinux_status(0xffffffffffffff9c, &(0x7f0000000240)='/selinux/status\x00', 0x0, 0x0) 2018/05/17 18:19:07 executing program 6: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$ndb(&(0x7f0000000100)='/dev/nbd#\x00', 0xffffffffffffffff, 0x0) ioctl$BLKTRACESETUP(r1, 0xc0481273, &(0x7f0000000000)={[], 0x0, 0x9, 0x8001}) r2 = fcntl$dupfd(r0, 0x406, r0) setsockopt$packet_rx_ring(r2, 0x107, 0x5, &(0x7f00000000c0)=@req={0x9, 0x2, 0x4, 0xfff}, 0x10) ioctl$BLKTRACETEARDOWN(r1, 0x1276, 0x0) openat$selinux_status(0xffffffffffffff9c, &(0x7f0000000240)='/selinux/status\x00', 0x0, 0x0) 2018/05/17 18:19:07 executing program 1: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$ndb(&(0x7f0000000100)='/dev/nbd#\x00', 0xffffffffffffffff, 0x0) ioctl$BLKTRACESETUP(r1, 0xc0481273, &(0x7f0000000000)={[], 0x0, 0x9, 0x8001}) r2 = fcntl$dupfd(r0, 0x406, r0) setsockopt$packet_rx_ring(r2, 0x107, 0x5, &(0x7f00000000c0)=@req={0x9, 0x2, 0x4, 0xfff}, 0x10) ioctl$BLKTRACETEARDOWN(r1, 0x1276, 0x0) openat$selinux_status(0xffffffffffffff9c, &(0x7f0000000240)='/selinux/status\x00', 0x0, 0x0) 2018/05/17 18:19:07 executing program 4: mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='tmpfs\x00', 0xc0ed0000, 0x0) [ 53.763022] [ 53.764679] ====================================================== [ 53.770982] [ INFO: possible circular locking dependency detected ] [ 53.771742] FAT-fs (loop0): bogus number of reserved sectors [ 53.771746] FAT-fs (loop0): Can't find a valid FAT filesystem [ 53.789013] 4.9.100-g73fdfa3 #26 Not tainted [ 53.793405] ------------------------------------------------------- [ 53.799791] syz-executor3/7373 is trying to acquire lock: 2018/05/17 18:19:07 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='map_files\x00') getdents(r0, &(0x7f00000001c0)=""/69, 0xfe) getdents64(r0, &(0x7f0000004100)=""/4096, 0x111e) 2018/05/17 18:19:07 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='map_files\x00') getdents(r0, &(0x7f00000001c0)=""/69, 0xfe) getdents64(r0, &(0x7f0000004100)=""/4096, 0x111e) 2018/05/17 18:19:07 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='map_files\x00') getdents(r0, &(0x7f00000001c0)=""/69, 0xfe) getdents64(r0, &(0x7f0000004100)=""/4096, 0x111e) [ 53.805311] (sk_lock-AF_INET){+.+.+.}, at: [] inet_bind+0x2a6/0x8b0 [ 53.813749] but task is already holding lock: [ 53.818400] (rtnl_mutex){+.+.+.}, at: [] rtnl_lock+0x17/0x20 [ 53.826222] which lock already depends on the new lock. [ 53.826222] [ 53.833220] [ 53.833220] the existing dependency chain (in reverse order) is: [ 53.840822] -> #1 (rtnl_mutex){+.+.+.}: [ 53.845473] lock_acquire+0x130/0x3e0 [ 53.849786] mutex_lock_nested+0xc0/0x870 [ 53.854441] rtnl_lock+0x17/0x20 [ 53.858319] mrtsock_destruct+0x3b/0x1e0 2018/05/17 18:19:07 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='map_files\x00') getdents(r0, &(0x7f00000001c0)=""/69, 0xfe) getdents64(r0, &(0x7f0000004100)=""/4096, 0x111e) 2018/05/17 18:19:07 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='map_files\x00') getdents(r0, &(0x7f00000001c0)=""/69, 0xfe) getdents64(r0, &(0x7f0000004100)=""/4096, 0x111e) 2018/05/17 18:19:07 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='map_files\x00') getdents(r0, &(0x7f00000001c0)=""/69, 0xfe) getdents64(r0, &(0x7f0000004100)=""/4096, 0x111e) [ 53.862891] ip_ra_control+0x2c2/0x420 [ 53.867286] do_ip_setsockopt.isra.13+0x15ff/0x2b10 [ 53.872813] ip_setsockopt+0x3a/0xb0 [ 53.877038] raw_setsockopt+0xb7/0xd0 [ 53.881349] sock_common_setsockopt+0x9a/0xe0 [ 53.886354] SyS_setsockopt+0x166/0x260 [ 53.890841] do_syscall_64+0x1a6/0x490 [ 53.895236] entry_SYSCALL_64_after_swapgs+0x5d/0xdb [ 53.900843] -> #0 (sk_lock-AF_INET){+.+.+.}: [ 53.905927] __lock_acquire+0x3019/0x4070 [ 53.910589] lock_acquire+0x130/0x3e0 [ 53.914899] lock_sock_nested+0xc6/0x120 [ 53.919468] inet_bind+0x2a6/0x8b0 [ 53.923512] start_sync_thread+0x1356/0x1e80 [ 53.928418] do_ip_vs_set_ctl+0x90f/0xbb0 [ 53.933060] nf_setsockopt+0x6d/0xc0 [ 53.937272] ip_setsockopt+0x9a/0xb0 [ 53.941485] udp_setsockopt+0x4a/0x90 [ 53.945780] ipv6_setsockopt+0x10a/0x130 [ 53.950334] tcp_setsockopt+0x88/0xe0 [ 53.954628] sock_common_setsockopt+0x9a/0xe0 [ 53.959616] SyS_setsockopt+0x166/0x260 [ 53.964082] do_syscall_64+0x1a6/0x490 [ 53.968463] entry_SYSCALL_64_after_swapgs+0x5d/0xdb [ 53.974059] [ 53.974059] other info that might help us debug this: [ 53.974059] [ 53.982168] Possible unsafe locking scenario: [ 53.982168] [ 53.988193] CPU0 CPU1 [ 53.992828] ---- ---- [ 53.997464] lock(rtnl_mutex); [ 54.000951] lock(sk_lock-AF_INET); [ 54.007391] lock(rtnl_mutex); [ 54.013420] lock(sk_lock-AF_INET); [ 54.017337] [ 54.017337] *** DEADLOCK *** [ 54.017337] [ 54.023373] 2 locks held by syz-executor3/7373: [ 54.028008] #0: (rtnl_mutex){+.+.+.}, at: [] rtnl_lock+0x17/0x20 [ 54.036339] #1: (ipvs->sync_mutex){+.+.+.}, at: [] start_sync_thread+0x118/0x1e80 [ 54.046150] [ 54.046150] stack backtrace: [ 54.050619] CPU: 1 PID: 7373 Comm: syz-executor3 Not tainted 4.9.100-g73fdfa3 #26 [ 54.058208] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 54.067535] ffff8801d4fd74f8 ffffffff81eb0f09 ffffffff855e7840 ffffffff8559cf30 [ 54.075514] ffffffff855e7840 ffff8801d703b8e8 ffff8801d703b000 ffff8801d4fd7540 [ 54.083500] ffffffff8142421d 0000000000000001 00000000d703b000 0000000000000001 [ 54.091487] Call Trace: [ 54.094047] [] dump_stack+0xc1/0x128 [ 54.099384] [] print_circular_bug.cold.51+0x1bd/0x27d [ 54.106204] [] __lock_acquire+0x3019/0x4070 2018/05/17 18:19:07 executing program 2: syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x0, &(0x7f0000000240)=ANY=[]) syz_mount_image$vfat(&(0x7f00000000c0)='vfat\x00', &(0x7f0000000140)='./file1\x00', 0x100, 0x1, &(0x7f0000000340)=[{&(0x7f00000001c0)="8787e76db8bdf6a4a6cb25a6dc43c5fa65c6d23a543ff8aae6010cdd4f8e", 0x1e, 0xc}], 0x8000, &(0x7f00000003c0)={[{@errors_remount='errors=remount-ro', 0x2c}]}) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000180)=ANY=[], 0xfffffd97) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setns(0xffffffffffffffff, 0x2c000000) mknod(&(0x7f0000000440)='./file0/file1\x00', 0x0, 0x0) [ 54.112149] [] ? debug_check_no_locks_freed+0x210/0x210 [ 54.119137] [] ? HARDIRQ_verbose+0x10/0x10 [ 54.124996] [] ? netlbl_sock_setattr+0x101/0x2e0 [ 54.131393] [] lock_acquire+0x130/0x3e0 [ 54.137015] [] ? inet_bind+0x2a6/0x8b0 [ 54.142541] [] lock_sock_nested+0xc6/0x120 [ 54.148416] [] ? inet_bind+0x2a6/0x8b0 [ 54.153944] [] inet_bind+0x2a6/0x8b0 2018/05/17 18:19:07 executing program 2: syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x0, &(0x7f0000000240)=ANY=[]) syz_mount_image$vfat(&(0x7f00000000c0)='vfat\x00', &(0x7f0000000140)='./file1\x00', 0x100, 0x1, &(0x7f0000000340)=[{&(0x7f00000001c0)="8787e76db8bdf6a4a6cb25a6dc43c5fa65c6d23a543ff8aae6010cdd4f8e", 0x1e, 0xc}], 0x8000, &(0x7f00000003c0)={[{@errors_remount='errors=remount-ro', 0x2c}]}) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000180)=ANY=[], 0xfffffd97) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setns(0xffffffffffffffff, 0x2c000000) mknod(&(0x7f0000000440)='./file0/file1\x00', 0x0, 0x0) [ 54.159306] [] start_sync_thread+0x1356/0x1e80 [ 54.165529] [] ? ip_vs_proc_sync_conn+0x952/0x952 [ 54.172011] [] ? ip_vs_sync_conn+0x2a90/0x2a90 [ 54.178226] [] ? HARDIRQ_verbose+0x10/0x10 [ 54.184092] [] ? memcpy+0x45/0x50 [ 54.189174] [] do_ip_vs_set_ctl+0x90f/0xbb0 [ 54.195117] [] ? perf_trace_lock_acquire+0x530/0x530 [ 54.201843] [] ? __lock_acquire+0x654/0x4070 [ 54.207879] [] ? drop_futex_key_refs.isra.12+0x56/0xd0 [ 54.214784] [] ? ip_vs_genl_set_cmd+0x9c0/0x9c0 [ 54.221078] [] ? mutex_lock_nested+0x572/0x870 [ 54.227284] [] ? __mutex_unlock_slowpath+0x221/0x3c0 [ 54.234013] [] ? __ww_mutex_lock+0x14c0/0x14c0 [ 54.240229] [] ? check_preemption_disabled+0x3b/0x170 [ 54.247040] [] ? mutex_unlock+0x9/0x10 [ 54.252555] [] ? nf_sockopt_find.constprop.0+0x1b1/0x230 [ 54.259632] [] nf_setsockopt+0x6d/0xc0 [ 54.265141] [] ip_setsockopt+0x9a/0xb0 [ 54.270651] [] udp_setsockopt+0x4a/0x90 [ 54.276250] [] ipv6_setsockopt+0x10a/0x130 [ 54.282106] [] tcp_setsockopt+0x88/0xe0 [ 54.287700] [] sock_common_setsockopt+0x9a/0xe0 [ 54.293995] [] SyS_setsockopt+0x166/0x260 [ 54.299764] [] ? SyS_recv+0x40/0x40 [ 54.305032] [] ? security_file_ioctl+0x8f/0xc0 [ 54.311236] [] ? do_syscall_64+0x48/0x490 [ 54.317009] [] ? SyS_recv+0x40/0x40 [ 54.322266] [] do_syscall_64+0x1a6/0x490 [ 54.327959] [] entry_SYSCALL_64_after_swapgs+0x5d/0xdb [ 54.336574] IPVS: sync thread started: state = BACKUP, mcast_ifn = veth1_to_team, syncid = 1, id = 0 [ 54.495725] FAT-fs (loop0): bogus number of reserved sectors [ 54.508757] FAT-fs (loop0): Can't find a valid FAT filesystem 2018/05/17 18:19:07 executing program 3: r0 = openat$hwrng(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/hwrng\x00', 0x101, 0x0) ioctl$BLKFLSBUF(r0, 0x1261, &(0x7f0000000200)=0x5) perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x71}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ustat(0x1, &(0x7f0000000040)) perf_event_open(&(0x7f00000004c0)={0x2, 0x239, 0x72, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xd4e9, 0x25}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket(0xa, 0x1, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = openat$null(0xffffffffffffff9c, &(0x7f0000000280)='/dev/null\x00', 0x3, 0x0) ioctl$EVIOCSREP(r3, 0x40084503, &(0x7f00000001c0)=[0x2, 0x100]) setsockopt$IP_VS_SO_SET_STARTDAEMON(r1, 0x0, 0x48b, &(0x7f0000000080)={0x2, 'veth1_to_team\x00', 0x1}, 0x18) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000440)={'syz_tun\x00'}) sendmsg$nl_route(r2, &(0x7f0000000180)={&(0x7f0000000000)={0x10}, 0xc, &(0x7f00000000c0)={&(0x7f0000000040)=ANY=[@ANYBLOB="2800000013002f0f000000000000000000000000"], 0x1}, 0x1}, 0x0) clone(0x24000000, &(0x7f0000000080)="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", &(0x7f0000000800), &(0x7f0000000640), &(0x7f00000003c0)) 2018/05/17 18:19:07 executing program 0: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000040), 0x0, &(0x7f0000000240)=ANY=[]) socket(0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$inet(r0, &(0x7f0000deb000)={0x2, 0x4e23, @multicast1=0xe0000001}, 0x10) sendto$inet(r0, &(0x7f0000a88f88), 0x332, 0x20000800, &(0x7f0000e68000)={0x2, 0x4e23}, 0x10) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000000)="766574683100000000ffffffffffef00", 0x10) sendto$inet(r0, &(0x7f0000000000), 0xfffffffffffffe4e, 0xc0, &(0x7f00000000c0)={0x2}, 0x10) 2018/05/17 18:19:07 executing program 1: r0 = openat$hwrng(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/hwrng\x00', 0x101, 0x0) ioctl$BLKFLSBUF(r0, 0x1261, &(0x7f0000000200)=0x5) perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x71}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ustat(0x1, &(0x7f0000000040)) perf_event_open(&(0x7f00000004c0)={0x2, 0x239, 0x72, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xd4e9, 0x25}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket(0xa, 0x1, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = openat$null(0xffffffffffffff9c, &(0x7f0000000280)='/dev/null\x00', 0x3, 0x0) ioctl$EVIOCSREP(r3, 0x40084503, &(0x7f00000001c0)=[0x2, 0x100]) setsockopt$IP_VS_SO_SET_STARTDAEMON(r1, 0x0, 0x48b, &(0x7f0000000080)={0x2, 'veth1_to_team\x00', 0x1}, 0x18) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000440)={'syz_tun\x00'}) sendmsg$nl_route(r2, &(0x7f0000000180)={&(0x7f0000000000)={0x10}, 0xc, &(0x7f00000000c0)={&(0x7f0000000040)=ANY=[@ANYBLOB="2800000013002f0f000000000000000000000000"], 0x1}, 0x1}, 0x0) clone(0x24000000, &(0x7f0000000080)="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", &(0x7f0000000800), &(0x7f0000000640), &(0x7f00000003c0)) 2018/05/17 18:19:07 executing program 6: r0 = openat$hwrng(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/hwrng\x00', 0x101, 0x0) ioctl$BLKFLSBUF(r0, 0x1261, &(0x7f0000000200)=0x5) perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x71}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ustat(0x1, &(0x7f0000000040)) perf_event_open(&(0x7f00000004c0)={0x2, 0x239, 0x72, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xd4e9, 0x25}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket(0xa, 0x1, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = openat$null(0xffffffffffffff9c, &(0x7f0000000280)='/dev/null\x00', 0x3, 0x0) ioctl$EVIOCSREP(r3, 0x40084503, &(0x7f00000001c0)=[0x2, 0x100]) setsockopt$IP_VS_SO_SET_STARTDAEMON(r1, 0x0, 0x48b, &(0x7f0000000080)={0x2, 'veth1_to_team\x00', 0x1}, 0x18) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000440)={'syz_tun\x00'}) sendmsg$nl_route(r2, &(0x7f0000000180)={&(0x7f0000000000)={0x10}, 0xc, &(0x7f00000000c0)={&(0x7f0000000040)=ANY=[@ANYBLOB="2800000013002f0f000000000000000000000000"], 0x1}, 0x1}, 0x0) clone(0x24000000, &(0x7f0000000080)="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", &(0x7f0000000800), &(0x7f0000000640), &(0x7f00000003c0)) 2018/05/17 18:19:07 executing program 4: mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='tmpfs\x00', 0xc0ed0000, 0x0) 2018/05/17 18:19:07 executing program 2: syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x0, &(0x7f0000000240)=ANY=[]) syz_mount_image$vfat(&(0x7f00000000c0)='vfat\x00', &(0x7f0000000140)='./file1\x00', 0x100, 0x1, &(0x7f0000000340)=[{&(0x7f00000001c0)="8787e76db8bdf6a4a6cb25a6dc43c5fa65c6d23a543ff8aae6010cdd4f8e", 0x1e, 0xc}], 0x8000, &(0x7f00000003c0)={[{@errors_remount='errors=remount-ro', 0x2c}]}) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000180)=ANY=[], 0xfffffd97) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setns(0xffffffffffffffff, 0x2c000000) mknod(&(0x7f0000000440)='./file0/file1\x00', 0x0, 0x0) 2018/05/17 18:19:07 executing program 5: mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='tmpfs\x00', 0xc0ed0000, 0x0) 2018/05/17 18:19:07 executing program 7: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000040), 0x0, &(0x7f0000000240)=ANY=[]) socket(0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$inet(r0, &(0x7f0000deb000)={0x2, 0x4e23, @multicast1=0xe0000001}, 0x10) sendto$inet(r0, &(0x7f0000a88f88), 0x332, 0x20000800, &(0x7f0000e68000)={0x2, 0x4e23}, 0x10) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000000)="766574683100000000ffffffffffef00", 0x10) sendto$inet(r0, &(0x7f0000000000), 0xfffffffffffffe4e, 0xc0, &(0x7f00000000c0)={0x2}, 0x10) 2018/05/17 18:19:07 executing program 4: mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='tmpfs\x00', 0xc0ed0000, 0x0) 2018/05/17 18:19:07 executing program 5: mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='tmpfs\x00', 0xc0ed0000, 0x0) [ 54.619151] FAT-fs (loop0): bogus number of reserved sectors [ 54.645411] FAT-fs (loop7): bogus number of reserved sectors [ 54.645422] FAT-fs (loop7): Can't find a valid FAT filesystem [ 54.648342] IPVS: sync thread started: state = BACKUP, mcast_ifn = veth1_to_team, syncid = 1, id = 0 [ 54.710778] IPVS: sync thread started: state = BACKUP, mcast_ifn = veth1_to_team, syncid = 1, id = 0 [ 54.772748] FAT-fs (loop0): Can't find a valid FAT filesystem 2018/05/17 18:19:08 executing program 3: r0 = openat$hwrng(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/hwrng\x00', 0x101, 0x0) ioctl$BLKFLSBUF(r0, 0x1261, &(0x7f0000000200)=0x5) perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x71}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ustat(0x1, &(0x7f0000000040)) perf_event_open(&(0x7f00000004c0)={0x2, 0x239, 0x72, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xd4e9, 0x25}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket(0xa, 0x1, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = openat$null(0xffffffffffffff9c, &(0x7f0000000280)='/dev/null\x00', 0x3, 0x0) ioctl$EVIOCSREP(r3, 0x40084503, &(0x7f00000001c0)=[0x2, 0x100]) setsockopt$IP_VS_SO_SET_STARTDAEMON(r1, 0x0, 0x48b, &(0x7f0000000080)={0x2, 'veth1_to_team\x00', 0x1}, 0x18) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000440)={'syz_tun\x00'}) sendmsg$nl_route(r2, &(0x7f0000000180)={&(0x7f0000000000)={0x10}, 0xc, &(0x7f00000000c0)={&(0x7f0000000040)=ANY=[@ANYBLOB="2800000013002f0f000000000000000000000000"], 0x1}, 0x1}, 0x0) clone(0x24000000, &(0x7f0000000080)="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", &(0x7f0000000800), &(0x7f0000000640), &(0x7f00000003c0)) 2018/05/17 18:19:08 executing program 5: mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='tmpfs\x00', 0xc0ed0000, 0x0) 2018/05/17 18:19:08 executing program 4: mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='tmpfs\x00', 0xc0ed0000, 0x0) 2018/05/17 18:19:08 executing program 2: syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x0, &(0x7f0000000240)=ANY=[]) syz_mount_image$vfat(&(0x7f00000000c0)='vfat\x00', &(0x7f0000000140)='./file1\x00', 0x100, 0x1, &(0x7f0000000340)=[{&(0x7f00000001c0)="8787e76db8bdf6a4a6cb25a6dc43c5fa65c6d23a543ff8aae6010cdd4f8e", 0x1e, 0xc}], 0x8000, &(0x7f00000003c0)={[{@errors_remount='errors=remount-ro', 0x2c}]}) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000180)=ANY=[], 0xfffffd97) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setns(0xffffffffffffffff, 0x2c000000) mknod(&(0x7f0000000440)='./file0/file1\x00', 0x0, 0x0) 2018/05/17 18:19:08 executing program 6: r0 = openat$hwrng(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/hwrng\x00', 0x101, 0x0) ioctl$BLKFLSBUF(r0, 0x1261, &(0x7f0000000200)=0x5) perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x71}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ustat(0x1, &(0x7f0000000040)) perf_event_open(&(0x7f00000004c0)={0x2, 0x239, 0x72, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xd4e9, 0x25}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket(0xa, 0x1, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = openat$null(0xffffffffffffff9c, &(0x7f0000000280)='/dev/null\x00', 0x3, 0x0) ioctl$EVIOCSREP(r3, 0x40084503, &(0x7f00000001c0)=[0x2, 0x100]) setsockopt$IP_VS_SO_SET_STARTDAEMON(r1, 0x0, 0x48b, &(0x7f0000000080)={0x2, 'veth1_to_team\x00', 0x1}, 0x18) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000440)={'syz_tun\x00'}) sendmsg$nl_route(r2, &(0x7f0000000180)={&(0x7f0000000000)={0x10}, 0xc, &(0x7f00000000c0)={&(0x7f0000000040)=ANY=[@ANYBLOB="2800000013002f0f000000000000000000000000"], 0x1}, 0x1}, 0x0) clone(0x24000000, &(0x7f0000000080)="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", &(0x7f0000000800), &(0x7f0000000640), &(0x7f00000003c0)) 2018/05/17 18:19:08 executing program 7: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000040), 0x0, &(0x7f0000000240)=ANY=[]) socket(0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$inet(r0, &(0x7f0000deb000)={0x2, 0x4e23, @multicast1=0xe0000001}, 0x10) sendto$inet(r0, &(0x7f0000a88f88), 0x332, 0x20000800, &(0x7f0000e68000)={0x2, 0x4e23}, 0x10) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000000)="766574683100000000ffffffffffef00", 0x10) sendto$inet(r0, &(0x7f0000000000), 0xfffffffffffffe4e, 0xc0, &(0x7f00000000c0)={0x2}, 0x10) 2018/05/17 18:19:08 executing program 0: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000040), 0x0, &(0x7f0000000240)=ANY=[]) socket(0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$inet(r0, &(0x7f0000deb000)={0x2, 0x4e23, @multicast1=0xe0000001}, 0x10) sendto$inet(r0, &(0x7f0000a88f88), 0x332, 0x20000800, &(0x7f0000e68000)={0x2, 0x4e23}, 0x10) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000000)="766574683100000000ffffffffffef00", 0x10) sendto$inet(r0, &(0x7f0000000000), 0xfffffffffffffe4e, 0xc0, &(0x7f00000000c0)={0x2}, 0x10) 2018/05/17 18:19:08 executing program 1: r0 = openat$hwrng(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/hwrng\x00', 0x101, 0x0) ioctl$BLKFLSBUF(r0, 0x1261, &(0x7f0000000200)=0x5) perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x71}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ustat(0x1, &(0x7f0000000040)) perf_event_open(&(0x7f00000004c0)={0x2, 0x239, 0x72, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xd4e9, 0x25}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket(0xa, 0x1, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = openat$null(0xffffffffffffff9c, &(0x7f0000000280)='/dev/null\x00', 0x3, 0x0) ioctl$EVIOCSREP(r3, 0x40084503, &(0x7f00000001c0)=[0x2, 0x100]) setsockopt$IP_VS_SO_SET_STARTDAEMON(r1, 0x0, 0x48b, &(0x7f0000000080)={0x2, 'veth1_to_team\x00', 0x1}, 0x18) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000440)={'syz_tun\x00'}) sendmsg$nl_route(r2, &(0x7f0000000180)={&(0x7f0000000000)={0x10}, 0xc, &(0x7f00000000c0)={&(0x7f0000000040)=ANY=[@ANYBLOB="2800000013002f0f000000000000000000000000"], 0x1}, 0x1}, 0x0) clone(0x24000000, &(0x7f0000000080)="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", &(0x7f0000000800), &(0x7f0000000640), &(0x7f00000003c0)) 2018/05/17 18:19:08 executing program 4: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000040), 0x0, &(0x7f0000000240)=ANY=[]) socket(0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$inet(r0, &(0x7f0000deb000)={0x2, 0x4e23, @multicast1=0xe0000001}, 0x10) sendto$inet(r0, &(0x7f0000a88f88), 0x332, 0x20000800, &(0x7f0000e68000)={0x2, 0x4e23}, 0x10) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000000)="766574683100000000ffffffffffef00", 0x10) sendto$inet(r0, &(0x7f0000000000), 0xfffffffffffffe4e, 0xc0, &(0x7f00000000c0)={0x2}, 0x10) 2018/05/17 18:19:08 executing program 5: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000040), 0x0, &(0x7f0000000240)=ANY=[]) socket(0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$inet(r0, &(0x7f0000deb000)={0x2, 0x4e23, @multicast1=0xe0000001}, 0x10) sendto$inet(r0, &(0x7f0000a88f88), 0x332, 0x20000800, &(0x7f0000e68000)={0x2, 0x4e23}, 0x10) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000000)="766574683100000000ffffffffffef00", 0x10) sendto$inet(r0, &(0x7f0000000000), 0xfffffffffffffe4e, 0xc0, &(0x7f00000000c0)={0x2}, 0x10) 2018/05/17 18:19:08 executing program 1: r0 = openat$hwrng(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/hwrng\x00', 0x101, 0x0) ioctl$BLKFLSBUF(r0, 0x1261, &(0x7f0000000200)=0x5) perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x71}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ustat(0x1, &(0x7f0000000040)) perf_event_open(&(0x7f00000004c0)={0x2, 0x239, 0x72, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xd4e9, 0x25}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket(0xa, 0x1, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = openat$null(0xffffffffffffff9c, &(0x7f0000000280)='/dev/null\x00', 0x3, 0x0) ioctl$EVIOCSREP(r3, 0x40084503, &(0x7f00000001c0)=[0x2, 0x100]) setsockopt$IP_VS_SO_SET_STARTDAEMON(r1, 0x0, 0x48b, &(0x7f0000000080)={0x2, 'veth1_to_team\x00', 0x1}, 0x18) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000440)={'syz_tun\x00'}) sendmsg$nl_route(r2, &(0x7f0000000180)={&(0x7f0000000000)={0x10}, 0xc, &(0x7f00000000c0)={&(0x7f0000000040)=ANY=[@ANYBLOB="2800000013002f0f000000000000000000000000"], 0x1}, 0x1}, 0x0) clone(0x24000000, &(0x7f0000000080)="27ec91f29f5b79508937cb6a2d34a5ab6a176e94203cc716b27dd3642175f494ed72b00ba4e542c601f098d52f7f1f45c62021ff76d0e2e7fb6af19f9eb9010063ff0fbdb2e153585b88730381ff85a2f9ee8ee5b3742fdc92be934bf69e4c0bae02ba968523e726a4930e9cf263e2225c79a0d346d306c4cfc61af69c6f14394cb74f977bf3593bfd4ed0d138a95465092881b1ec829b3116755e6eb85d53b9e629304571d89ae53f8140aabec7a309eda4505c6447a9fb9cb5ae8ec09581a4d7697de2b74078f0be83fa4a074fef6e3b1a2d861da720f83138b569dc10bb2d9e32e9279f528e82e6855026718d72bf9e8240afea153a782e0dffafe89ccac5c529fb579d4efde94bdfc9a29da36614806dacd196e23287901a08f85ec2208e3ae5982de1e2b773328893d46414a635449c5d405836d0ba42bd4f9c340713b0", &(0x7f0000000800), &(0x7f0000000640), &(0x7f00000003c0)) [ 54.863671] FAT-fs (loop7): bogus number of reserved sectors [ 54.883509] FAT-fs (loop0): bogus number of reserved sectors 2018/05/17 18:19:08 executing program 3: r0 = openat$hwrng(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/hwrng\x00', 0x101, 0x0) ioctl$BLKFLSBUF(r0, 0x1261, &(0x7f0000000200)=0x5) perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x71}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ustat(0x1, &(0x7f0000000040)) perf_event_open(&(0x7f00000004c0)={0x2, 0x239, 0x72, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xd4e9, 0x25}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket(0xa, 0x1, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = openat$null(0xffffffffffffff9c, &(0x7f0000000280)='/dev/null\x00', 0x3, 0x0) ioctl$EVIOCSREP(r3, 0x40084503, &(0x7f00000001c0)=[0x2, 0x100]) setsockopt$IP_VS_SO_SET_STARTDAEMON(r1, 0x0, 0x48b, &(0x7f0000000080)={0x2, 'veth1_to_team\x00', 0x1}, 0x18) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000440)={'syz_tun\x00'}) sendmsg$nl_route(r2, &(0x7f0000000180)={&(0x7f0000000000)={0x10}, 0xc, &(0x7f00000000c0)={&(0x7f0000000040)=ANY=[@ANYBLOB="2800000013002f0f000000000000000000000000"], 0x1}, 0x1}, 0x0) clone(0x24000000, &(0x7f0000000080)="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", &(0x7f0000000800), &(0x7f0000000640), &(0x7f00000003c0)) 2018/05/17 18:19:08 executing program 6: r0 = openat$hwrng(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/hwrng\x00', 0x101, 0x0) ioctl$BLKFLSBUF(r0, 0x1261, &(0x7f0000000200)=0x5) perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x71}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ustat(0x1, &(0x7f0000000040)) perf_event_open(&(0x7f00000004c0)={0x2, 0x239, 0x72, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xd4e9, 0x25}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket(0xa, 0x1, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = openat$null(0xffffffffffffff9c, &(0x7f0000000280)='/dev/null\x00', 0x3, 0x0) ioctl$EVIOCSREP(r3, 0x40084503, &(0x7f00000001c0)=[0x2, 0x100]) setsockopt$IP_VS_SO_SET_STARTDAEMON(r1, 0x0, 0x48b, &(0x7f0000000080)={0x2, 'veth1_to_team\x00', 0x1}, 0x18) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000440)={'syz_tun\x00'}) sendmsg$nl_route(r2, &(0x7f0000000180)={&(0x7f0000000000)={0x10}, 0xc, &(0x7f00000000c0)={&(0x7f0000000040)=ANY=[@ANYBLOB="2800000013002f0f000000000000000000000000"], 0x1}, 0x1}, 0x0) clone(0x24000000, &(0x7f0000000080)="27ec91f29f5b79508937cb6a2d34a5ab6a176e94203cc716b27dd3642175f494ed72b00ba4e542c601f098d52f7f1f45c62021ff76d0e2e7fb6af19f9eb9010063ff0fbdb2e153585b88730381ff85a2f9ee8ee5b3742fdc92be934bf69e4c0bae02ba968523e726a4930e9cf263e2225c79a0d346d306c4cfc61af69c6f14394cb74f977bf3593bfd4ed0d138a95465092881b1ec829b3116755e6eb85d53b9e629304571d89ae53f8140aabec7a309eda4505c6447a9fb9cb5ae8ec09581a4d7697de2b74078f0be83fa4a074fef6e3b1a2d861da720f83138b569dc10bb2d9e32e9279f528e82e6855026718d72bf9e8240afea153a782e0dffafe89ccac5c529fb579d4efde94bdfc9a29da36614806dacd196e23287901a08f85ec2208e3ae5982de1e2b773328893d46414a635449c5d405836d0ba42bd4f9c340713b0", &(0x7f0000000800), &(0x7f0000000640), &(0x7f00000003c0)) [ 54.883513] FAT-fs (loop0): Can't find a valid FAT filesystem [ 54.976072] FAT-fs (loop7): Can't find a valid FAT filesystem 2018/05/17 18:19:08 executing program 1: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000040), 0x0, &(0x7f0000000240)=ANY=[]) socket(0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$inet(r0, &(0x7f0000deb000)={0x2, 0x4e23, @multicast1=0xe0000001}, 0x10) sendto$inet(r0, &(0x7f0000a88f88), 0x332, 0x20000800, &(0x7f0000e68000)={0x2, 0x4e23}, 0x10) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000000)="766574683100000000ffffffffffef00", 0x10) sendto$inet(r0, &(0x7f0000000000), 0xfffffffffffffe4e, 0xc0, &(0x7f00000000c0)={0x2}, 0x10) [ 54.985604] FAT-fs (loop4): bogus number of reserved sectors 2018/05/17 18:19:08 executing program 2: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000040), 0x0, &(0x7f0000000240)=ANY=[]) socket(0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$inet(r0, &(0x7f0000deb000)={0x2, 0x4e23, @multicast1=0xe0000001}, 0x10) sendto$inet(r0, &(0x7f0000a88f88), 0x332, 0x20000800, &(0x7f0000e68000)={0x2, 0x4e23}, 0x10) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000000)="766574683100000000ffffffffffef00", 0x10) sendto$inet(r0, &(0x7f0000000000), 0xfffffffffffffe4e, 0xc0, &(0x7f00000000c0)={0x2}, 0x10) [ 54.985608] FAT-fs (loop4): Can't find a valid FAT filesystem [ 54.999306] FAT-fs (loop5): bogus number of reserved sectors 2018/05/17 18:19:08 executing program 6: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000040), 0x0, &(0x7f0000000240)=ANY=[]) socket(0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$inet(r0, &(0x7f0000deb000)={0x2, 0x4e23, @multicast1=0xe0000001}, 0x10) sendto$inet(r0, &(0x7f0000a88f88), 0x332, 0x20000800, &(0x7f0000e68000)={0x2, 0x4e23}, 0x10) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000000)="766574683100000000ffffffffffef00", 0x10) sendto$inet(r0, &(0x7f0000000000), 0xfffffffffffffe4e, 0xc0, &(0x7f00000000c0)={0x2}, 0x10) [ 54.999310] FAT-fs (loop5): Can't find a valid FAT filesystem [ 55.058885] FAT-fs (loop1): bogus number of reserved sectors [ 55.058889] FAT-fs (loop1): Can't find a valid FAT filesystem 2018/05/17 18:19:08 executing program 3: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000040), 0x0, &(0x7f0000000240)=ANY=[]) socket(0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$inet(r0, &(0x7f0000deb000)={0x2, 0x4e23, @multicast1=0xe0000001}, 0x10) sendto$inet(r0, &(0x7f0000a88f88), 0x332, 0x20000800, &(0x7f0000e68000)={0x2, 0x4e23}, 0x10) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000000)="766574683100000000ffffffffffef00", 0x10) sendto$inet(r0, &(0x7f0000000000), 0xfffffffffffffe4e, 0xc0, &(0x7f00000000c0)={0x2}, 0x10) [ 55.179359] FAT-fs (loop6): bogus number of reserved sectors [ 55.179364] FAT-fs (loop6): Can't find a valid FAT filesystem 2018/05/17 18:19:08 executing program 4: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000040), 0x0, &(0x7f0000000240)=ANY=[]) socket(0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$inet(r0, &(0x7f0000deb000)={0x2, 0x4e23, @multicast1=0xe0000001}, 0x10) sendto$inet(r0, &(0x7f0000a88f88), 0x332, 0x20000800, &(0x7f0000e68000)={0x2, 0x4e23}, 0x10) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000000)="766574683100000000ffffffffffef00", 0x10) sendto$inet(r0, &(0x7f0000000000), 0xfffffffffffffe4e, 0xc0, &(0x7f00000000c0)={0x2}, 0x10) [ 55.180396] FAT-fs (loop2): bogus number of reserved sectors [ 55.180400] FAT-fs (loop2): Can't find a valid FAT filesystem [ 55.251958] FAT-fs (loop3): bogus number of reserved sectors [ 55.251962] FAT-fs (loop3): Can't find a valid FAT filesystem [ 55.336013] FAT-fs (loop4): bogus number of reserved sectors [ 55.336018] FAT-fs (loop4): Can't find a valid FAT filesystem 2018/05/17 18:19:08 executing program 0: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000040), 0x0, &(0x7f0000000240)=ANY=[]) socket(0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$inet(r0, &(0x7f0000deb000)={0x2, 0x4e23, @multicast1=0xe0000001}, 0x10) sendto$inet(r0, &(0x7f0000a88f88), 0x332, 0x20000800, &(0x7f0000e68000)={0x2, 0x4e23}, 0x10) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000000)="766574683100000000ffffffffffef00", 0x10) sendto$inet(r0, &(0x7f0000000000), 0xfffffffffffffe4e, 0xc0, &(0x7f00000000c0)={0x2}, 0x10) 2018/05/17 18:19:08 executing program 5: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000040), 0x0, &(0x7f0000000240)=ANY=[]) socket(0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$inet(r0, &(0x7f0000deb000)={0x2, 0x4e23, @multicast1=0xe0000001}, 0x10) sendto$inet(r0, &(0x7f0000a88f88), 0x332, 0x20000800, &(0x7f0000e68000)={0x2, 0x4e23}, 0x10) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000000)="766574683100000000ffffffffffef00", 0x10) sendto$inet(r0, &(0x7f0000000000), 0xfffffffffffffe4e, 0xc0, &(0x7f00000000c0)={0x2}, 0x10) 2018/05/17 18:19:08 executing program 1: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000040), 0x0, &(0x7f0000000240)=ANY=[]) socket(0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$inet(r0, &(0x7f0000deb000)={0x2, 0x4e23, @multicast1=0xe0000001}, 0x10) sendto$inet(r0, &(0x7f0000a88f88), 0x332, 0x20000800, &(0x7f0000e68000)={0x2, 0x4e23}, 0x10) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000000)="766574683100000000ffffffffffef00", 0x10) sendto$inet(r0, &(0x7f0000000000), 0xfffffffffffffe4e, 0xc0, &(0x7f00000000c0)={0x2}, 0x10) 2018/05/17 18:19:08 executing program 6: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000040), 0x0, &(0x7f0000000240)=ANY=[]) socket(0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$inet(r0, &(0x7f0000deb000)={0x2, 0x4e23, @multicast1=0xe0000001}, 0x10) sendto$inet(r0, &(0x7f0000a88f88), 0x332, 0x20000800, &(0x7f0000e68000)={0x2, 0x4e23}, 0x10) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000000)="766574683100000000ffffffffffef00", 0x10) sendto$inet(r0, &(0x7f0000000000), 0xfffffffffffffe4e, 0xc0, &(0x7f00000000c0)={0x2}, 0x10) 2018/05/17 18:19:08 executing program 2: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000040), 0x0, &(0x7f0000000240)=ANY=[]) socket(0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$inet(r0, &(0x7f0000deb000)={0x2, 0x4e23, @multicast1=0xe0000001}, 0x10) sendto$inet(r0, &(0x7f0000a88f88), 0x332, 0x20000800, &(0x7f0000e68000)={0x2, 0x4e23}, 0x10) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000000)="766574683100000000ffffffffffef00", 0x10) sendto$inet(r0, &(0x7f0000000000), 0xfffffffffffffe4e, 0xc0, &(0x7f00000000c0)={0x2}, 0x10) 2018/05/17 18:19:08 executing program 3: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000040), 0x0, &(0x7f0000000240)=ANY=[]) socket(0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$inet(r0, &(0x7f0000deb000)={0x2, 0x4e23, @multicast1=0xe0000001}, 0x10) sendto$inet(r0, &(0x7f0000a88f88), 0x332, 0x20000800, &(0x7f0000e68000)={0x2, 0x4e23}, 0x10) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000000)="766574683100000000ffffffffffef00", 0x10) sendto$inet(r0, &(0x7f0000000000), 0xfffffffffffffe4e, 0xc0, &(0x7f00000000c0)={0x2}, 0x10) 2018/05/17 18:19:08 executing program 7: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000040), 0x0, &(0x7f0000000240)=ANY=[]) socket(0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$inet(r0, &(0x7f0000deb000)={0x2, 0x4e23, @multicast1=0xe0000001}, 0x10) sendto$inet(r0, &(0x7f0000a88f88), 0x332, 0x20000800, &(0x7f0000e68000)={0x2, 0x4e23}, 0x10) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000000)="766574683100000000ffffffffffef00", 0x10) sendto$inet(r0, &(0x7f0000000000), 0xfffffffffffffe4e, 0xc0, &(0x7f00000000c0)={0x2}, 0x10) 2018/05/17 18:19:08 executing program 4: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000040), 0x0, &(0x7f0000000240)=ANY=[]) socket(0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$inet(r0, &(0x7f0000deb000)={0x2, 0x4e23, @multicast1=0xe0000001}, 0x10) sendto$inet(r0, &(0x7f0000a88f88), 0x332, 0x20000800, &(0x7f0000e68000)={0x2, 0x4e23}, 0x10) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000000)="766574683100000000ffffffffffef00", 0x10) sendto$inet(r0, &(0x7f0000000000), 0xfffffffffffffe4e, 0xc0, &(0x7f00000000c0)={0x2}, 0x10) [ 55.475292] FAT-fs (loop5): bogus number of reserved sectors [ 55.482358] FAT-fs (loop7): bogus number of reserved sectors [ 55.482363] FAT-fs (loop7): Can't find a valid FAT filesystem [ 55.489651] FAT-fs (loop6): bogus number of reserved sectors [ 55.489655] FAT-fs (loop6): Can't find a valid FAT filesystem [ 55.491666] FAT-fs (loop3): bogus number of reserved sectors [ 55.491669] FAT-fs (loop3): Can't find a valid FAT filesystem [ 55.494613] FAT-fs (loop1): bogus number of reserved sectors [ 55.494618] FAT-fs (loop1): Can't find a valid FAT filesystem [ 55.500273] FAT-fs (loop4): bogus number of reserved sectors [ 55.500277] FAT-fs (loop4): Can't find a valid FAT filesystem 2018/05/17 18:19:09 executing program 0: r0 = openat$hwrng(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/hwrng\x00', 0x101, 0x0) ioctl$BLKFLSBUF(r0, 0x1261, &(0x7f0000000200)=0x5) perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x71}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ustat(0x1, &(0x7f0000000040)) perf_event_open(&(0x7f00000004c0)={0x2, 0x239, 0x72, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xd4e9, 0x25}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket(0xa, 0x1, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = openat$null(0xffffffffffffff9c, &(0x7f0000000280)='/dev/null\x00', 0x3, 0x0) ioctl$EVIOCSREP(r3, 0x40084503, &(0x7f00000001c0)=[0x2, 0x100]) setsockopt$IP_VS_SO_SET_STARTDAEMON(r1, 0x0, 0x48b, &(0x7f0000000080)={0x2, 'veth1_to_team\x00', 0x1}, 0x18) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000440)={'syz_tun\x00'}) sendmsg$nl_route(r2, &(0x7f0000000180)={&(0x7f0000000000)={0x10}, 0xc, &(0x7f00000000c0)={&(0x7f0000000040)=ANY=[@ANYBLOB="2800000013002f0f000000000000000000000000"], 0x1}, 0x1}, 0x0) clone(0x24000000, &(0x7f0000000080)="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", &(0x7f0000000800), &(0x7f0000000640), &(0x7f00000003c0)) [ 55.503108] FAT-fs (loop0): bogus number of reserved sectors [ 55.503112] FAT-fs (loop0): Can't find a valid FAT filesystem 2018/05/17 18:19:09 executing program 3: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000040), 0x0, &(0x7f0000000240)=ANY=[]) socket(0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$inet(r0, &(0x7f0000deb000)={0x2, 0x4e23, @multicast1=0xe0000001}, 0x10) sendto$inet(r0, &(0x7f0000a88f88), 0x332, 0x20000800, &(0x7f0000e68000)={0x2, 0x4e23}, 0x10) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000000)="766574683100000000ffffffffffef00", 0x10) sendto$inet(r0, &(0x7f0000000000), 0xfffffffffffffe4e, 0xc0, &(0x7f00000000c0)={0x2}, 0x10) [ 55.506407] FAT-fs (loop2): bogus number of reserved sectors [ 55.506411] FAT-fs (loop2): Can't find a valid FAT filesystem [ 55.810517] IPVS: sync thread started: state = BACKUP, mcast_ifn = veth1_to_team, syncid = 1, id = 0 [ 55.817077] FAT-fs (loop3): bogus number of reserved sectors [ 55.817082] FAT-fs (loop3): Can't find a valid FAT filesystem [ 55.888354] FAT-fs (loop5): Can't find a valid FAT filesystem 2018/05/17 18:19:09 executing program 2: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000040), 0x0, &(0x7f0000000240)=ANY=[]) socket(0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$inet(r0, &(0x7f0000deb000)={0x2, 0x4e23, @multicast1=0xe0000001}, 0x10) sendto$inet(r0, &(0x7f0000a88f88), 0x332, 0x20000800, &(0x7f0000e68000)={0x2, 0x4e23}, 0x10) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000000)="766574683100000000ffffffffffef00", 0x10) sendto$inet(r0, &(0x7f0000000000), 0xfffffffffffffe4e, 0xc0, &(0x7f00000000c0)={0x2}, 0x10) 2018/05/17 18:19:09 executing program 4: r0 = openat$hwrng(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/hwrng\x00', 0x101, 0x0) ioctl$BLKFLSBUF(r0, 0x1261, &(0x7f0000000200)=0x5) perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x71}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ustat(0x1, &(0x7f0000000040)) perf_event_open(&(0x7f00000004c0)={0x2, 0x239, 0x72, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xd4e9, 0x25}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket(0xa, 0x1, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = openat$null(0xffffffffffffff9c, &(0x7f0000000280)='/dev/null\x00', 0x3, 0x0) ioctl$EVIOCSREP(r3, 0x40084503, &(0x7f00000001c0)=[0x2, 0x100]) setsockopt$IP_VS_SO_SET_STARTDAEMON(r1, 0x0, 0x48b, &(0x7f0000000080)={0x2, 'veth1_to_team\x00', 0x1}, 0x18) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000440)={'syz_tun\x00'}) sendmsg$nl_route(r2, &(0x7f0000000180)={&(0x7f0000000000)={0x10}, 0xc, &(0x7f00000000c0)={&(0x7f0000000040)=ANY=[@ANYBLOB="2800000013002f0f000000000000000000000000"], 0x1}, 0x1}, 0x0) clone(0x24000000, &(0x7f0000000080)="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", &(0x7f0000000800), &(0x7f0000000640), &(0x7f00000003c0)) 2018/05/17 18:19:09 executing program 7: syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x0, &(0x7f0000000240)=ANY=[]) syz_mount_image$vfat(&(0x7f00000000c0)='vfat\x00', &(0x7f0000000140)='./file1\x00', 0x100, 0x1, &(0x7f0000000340)=[{&(0x7f00000001c0)="8787e76db8bdf6a4a6cb25a6dc43c5fa65c6d23a543ff8aae6010cdd4f8e", 0x1e, 0xc}], 0x8000, &(0x7f00000003c0)={[{@errors_remount='errors=remount-ro', 0x2c}]}) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000180)=ANY=[], 0xfffffd97) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setns(0xffffffffffffffff, 0x2c000000) mknod(&(0x7f0000000440)='./file0/file1\x00', 0x0, 0x0) 2018/05/17 18:19:09 executing program 1: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000040), 0x0, &(0x7f0000000240)=ANY=[]) socket(0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$inet(r0, &(0x7f0000deb000)={0x2, 0x4e23, @multicast1=0xe0000001}, 0x10) sendto$inet(r0, &(0x7f0000a88f88), 0x332, 0x20000800, &(0x7f0000e68000)={0x2, 0x4e23}, 0x10) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000000)="766574683100000000ffffffffffef00", 0x10) sendto$inet(r0, &(0x7f0000000000), 0xfffffffffffffe4e, 0xc0, &(0x7f00000000c0)={0x2}, 0x10) 2018/05/17 18:19:09 executing program 6: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000040), 0x0, &(0x7f0000000240)=ANY=[]) socket(0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$inet(r0, &(0x7f0000deb000)={0x2, 0x4e23, @multicast1=0xe0000001}, 0x10) sendto$inet(r0, &(0x7f0000a88f88), 0x332, 0x20000800, &(0x7f0000e68000)={0x2, 0x4e23}, 0x10) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000000)="766574683100000000ffffffffffef00", 0x10) sendto$inet(r0, &(0x7f0000000000), 0xfffffffffffffe4e, 0xc0, &(0x7f00000000c0)={0x2}, 0x10) 2018/05/17 18:19:09 executing program 3: syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x0, &(0x7f0000000240)=ANY=[]) syz_mount_image$vfat(&(0x7f00000000c0)='vfat\x00', &(0x7f0000000140)='./file1\x00', 0x100, 0x1, &(0x7f0000000340)=[{&(0x7f00000001c0)="8787e76db8bdf6a4a6cb25a6dc43c5fa65c6d23a543ff8aae6010cdd4f8e", 0x1e, 0xc}], 0x8000, &(0x7f00000003c0)={[{@errors_remount='errors=remount-ro', 0x2c}]}) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000180)=ANY=[], 0xfffffd97) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setns(0xffffffffffffffff, 0x2c000000) mknod(&(0x7f0000000440)='./file0/file1\x00', 0x0, 0x0) 2018/05/17 18:19:09 executing program 5: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000040), 0x0, &(0x7f0000000240)=ANY=[]) socket(0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$inet(r0, &(0x7f0000deb000)={0x2, 0x4e23, @multicast1=0xe0000001}, 0x10) sendto$inet(r0, &(0x7f0000a88f88), 0x332, 0x20000800, &(0x7f0000e68000)={0x2, 0x4e23}, 0x10) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000000)="766574683100000000ffffffffffef00", 0x10) sendto$inet(r0, &(0x7f0000000000), 0xfffffffffffffe4e, 0xc0, &(0x7f00000000c0)={0x2}, 0x10) 2018/05/17 18:19:09 executing program 0: r0 = openat$hwrng(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/hwrng\x00', 0x101, 0x0) ioctl$BLKFLSBUF(r0, 0x1261, &(0x7f0000000200)=0x5) perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x71}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ustat(0x1, &(0x7f0000000040)) perf_event_open(&(0x7f00000004c0)={0x2, 0x239, 0x72, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xd4e9, 0x25}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket(0xa, 0x1, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = openat$null(0xffffffffffffff9c, &(0x7f0000000280)='/dev/null\x00', 0x3, 0x0) ioctl$EVIOCSREP(r3, 0x40084503, &(0x7f00000001c0)=[0x2, 0x100]) setsockopt$IP_VS_SO_SET_STARTDAEMON(r1, 0x0, 0x48b, &(0x7f0000000080)={0x2, 'veth1_to_team\x00', 0x1}, 0x18) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000440)={'syz_tun\x00'}) sendmsg$nl_route(r2, &(0x7f0000000180)={&(0x7f0000000000)={0x10}, 0xc, &(0x7f00000000c0)={&(0x7f0000000040)=ANY=[@ANYBLOB="2800000013002f0f000000000000000000000000"], 0x1}, 0x1}, 0x0) clone(0x24000000, &(0x7f0000000080)="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", &(0x7f0000000800), &(0x7f0000000640), &(0x7f00000003c0)) [ 55.968643] FAT-fs (loop2): bogus number of reserved sectors [ 55.976022] FAT-fs (loop1): bogus number of reserved sectors [ 55.976028] FAT-fs (loop1): Can't find a valid FAT filesystem [ 55.977534] FAT-fs (loop5): bogus number of reserved sectors 2018/05/17 18:19:09 executing program 0: r0 = openat$hwrng(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/hwrng\x00', 0x101, 0x0) ioctl$BLKFLSBUF(r0, 0x1261, &(0x7f0000000200)=0x5) perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x71}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ustat(0x1, &(0x7f0000000040)) perf_event_open(&(0x7f00000004c0)={0x2, 0x239, 0x72, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xd4e9, 0x25}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket(0xa, 0x1, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = openat$null(0xffffffffffffff9c, &(0x7f0000000280)='/dev/null\x00', 0x3, 0x0) ioctl$EVIOCSREP(r3, 0x40084503, &(0x7f00000001c0)=[0x2, 0x100]) setsockopt$IP_VS_SO_SET_STARTDAEMON(r1, 0x0, 0x48b, &(0x7f0000000080)={0x2, 'veth1_to_team\x00', 0x1}, 0x18) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000440)={'syz_tun\x00'}) sendmsg$nl_route(r2, &(0x7f0000000180)={&(0x7f0000000000)={0x10}, 0xc, &(0x7f00000000c0)={&(0x7f0000000040)=ANY=[@ANYBLOB="2800000013002f0f000000000000000000000000"], 0x1}, 0x1}, 0x0) clone(0x24000000, &(0x7f0000000080)="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", &(0x7f0000000800), &(0x7f0000000640), &(0x7f00000003c0)) [ 55.977539] FAT-fs (loop5): Can't find a valid FAT filesystem [ 55.981318] FAT-fs (loop6): bogus number of reserved sectors 2018/05/17 18:19:09 executing program 7: syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x0, &(0x7f0000000240)=ANY=[]) syz_mount_image$vfat(&(0x7f00000000c0)='vfat\x00', &(0x7f0000000140)='./file1\x00', 0x100, 0x1, &(0x7f0000000340)=[{&(0x7f00000001c0)="8787e76db8bdf6a4a6cb25a6dc43c5fa65c6d23a543ff8aae6010cdd4f8e", 0x1e, 0xc}], 0x8000, &(0x7f00000003c0)={[{@errors_remount='errors=remount-ro', 0x2c}]}) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000180)=ANY=[], 0xfffffd97) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setns(0xffffffffffffffff, 0x2c000000) mknod(&(0x7f0000000440)='./file0/file1\x00', 0x0, 0x0) [ 55.981322] FAT-fs (loop6): Can't find a valid FAT filesystem 2018/05/17 18:19:09 executing program 3: syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x0, &(0x7f0000000240)=ANY=[]) syz_mount_image$vfat(&(0x7f00000000c0)='vfat\x00', &(0x7f0000000140)='./file1\x00', 0x100, 0x1, &(0x7f0000000340)=[{&(0x7f00000001c0)="8787e76db8bdf6a4a6cb25a6dc43c5fa65c6d23a543ff8aae6010cdd4f8e", 0x1e, 0xc}], 0x8000, &(0x7f00000003c0)={[{@errors_remount='errors=remount-ro', 0x2c}]}) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000180)=ANY=[], 0xfffffd97) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setns(0xffffffffffffffff, 0x2c000000) mknod(&(0x7f0000000440)='./file0/file1\x00', 0x0, 0x0) 2018/05/17 18:19:09 executing program 4: r0 = openat$hwrng(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/hwrng\x00', 0x101, 0x0) ioctl$BLKFLSBUF(r0, 0x1261, &(0x7f0000000200)=0x5) perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x71}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ustat(0x1, &(0x7f0000000040)) perf_event_open(&(0x7f00000004c0)={0x2, 0x239, 0x72, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xd4e9, 0x25}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket(0xa, 0x1, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = openat$null(0xffffffffffffff9c, &(0x7f0000000280)='/dev/null\x00', 0x3, 0x0) ioctl$EVIOCSREP(r3, 0x40084503, &(0x7f00000001c0)=[0x2, 0x100]) setsockopt$IP_VS_SO_SET_STARTDAEMON(r1, 0x0, 0x48b, &(0x7f0000000080)={0x2, 'veth1_to_team\x00', 0x1}, 0x18) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000440)={'syz_tun\x00'}) sendmsg$nl_route(r2, &(0x7f0000000180)={&(0x7f0000000000)={0x10}, 0xc, &(0x7f00000000c0)={&(0x7f0000000040)=ANY=[@ANYBLOB="2800000013002f0f000000000000000000000000"], 0x1}, 0x1}, 0x0) clone(0x24000000, &(0x7f0000000080)="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", &(0x7f0000000800), &(0x7f0000000640), &(0x7f00000003c0)) [ 56.017394] IPVS: sync thread started: state = BACKUP, mcast_ifn = veth1_to_team, syncid = 1, id = 0 [ 56.203015] FAT-fs (loop2): Can't find a valid FAT filesystem 2018/05/17 18:19:09 executing program 0: syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x0, &(0x7f0000000240)=ANY=[]) syz_mount_image$vfat(&(0x7f00000000c0)='vfat\x00', &(0x7f0000000140)='./file1\x00', 0x100, 0x1, &(0x7f0000000340)=[{&(0x7f00000001c0)="8787e76db8bdf6a4a6cb25a6dc43c5fa65c6d23a543ff8aae6010cdd4f8e", 0x1e, 0xc}], 0x8000, &(0x7f00000003c0)={[{@errors_remount='errors=remount-ro', 0x2c}]}) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000180)=ANY=[], 0xfffffd97) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setns(0xffffffffffffffff, 0x2c000000) mknod(&(0x7f0000000440)='./file0/file1\x00', 0x0, 0x0) 2018/05/17 18:19:09 executing program 5: mprotect(&(0x7f000004a000/0x4000)=nil, 0x4000, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) r1 = creat(&(0x7f0000000040)='./file0\x00', 0x0) write$binfmt_elf64(r0, &(0x7f0000001340)=ANY=[@ANYBLOB="7f"], 0x1) fcntl$setstatus(r1, 0x4, 0x4000) write$selinux_access(r1, &(0x7f0000000000)={'system_u:object_r:etc_t:s0', 0x20, '/usr/sbin/ntpd', 0x20}, 0xfffffeff) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x0) 2018/05/17 18:19:09 executing program 6: perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x72, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000100)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f0000c86f88)={0x2, 0x70, 0xfffffffffffffffb, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9}, 0x0, 0x0, 0xffffffffffffffff, 0x0) read(r0, &(0x7f0000000140)=""/220, 0xdc) mmap(&(0x7f00001bf000/0x3000)=nil, 0x3000, 0x0, 0x4011, r0, 0x0) openat$selinux_avc_cache_stats(0xffffffffffffff9c, &(0x7f0000000700)='/selinux/avc/cache_stats\x00', 0x0, 0x0) getpgrp(0xffffffffffffffff) sched_setaffinity(0x0, 0x7, &(0x7f00000000c0)=0x9) setsockopt$SO_VM_SOCKETS_BUFFER_MIN_SIZE(0xffffffffffffffff, 0x28, 0x1, &(0x7f0000000200), 0x8) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x82) sendfile(r1, r1, &(0x7f0000000080), 0x102000004) sync() 2018/05/17 18:19:09 executing program 1: r0 = memfd_create(&(0x7f0000000100)="74086e750000000000000000008c00", 0x0) pwritev(r0, &(0x7f0000000340)=[{&(0x7f0000000240)='\'', 0x1}], 0x1, 0x81806) lseek(r0, 0x0, 0x3) [ 56.582598] random: crng init done 2018/05/17 18:19:09 executing program 3: syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x0, &(0x7f0000000240)=ANY=[]) syz_mount_image$vfat(&(0x7f00000000c0)='vfat\x00', &(0x7f0000000140)='./file1\x00', 0x100, 0x1, &(0x7f0000000340)=[{&(0x7f00000001c0)="8787e76db8bdf6a4a6cb25a6dc43c5fa65c6d23a543ff8aae6010cdd4f8e", 0x1e, 0xc}], 0x8000, &(0x7f00000003c0)={[{@errors_remount='errors=remount-ro', 0x2c}]}) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000180)=ANY=[], 0xfffffd97) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setns(0xffffffffffffffff, 0x2c000000) mknod(&(0x7f0000000440)='./file0/file1\x00', 0x0, 0x0) 2018/05/17 18:19:09 executing program 7: syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x0, &(0x7f0000000240)=ANY=[]) syz_mount_image$vfat(&(0x7f00000000c0)='vfat\x00', &(0x7f0000000140)='./file1\x00', 0x100, 0x1, &(0x7f0000000340)=[{&(0x7f00000001c0)="8787e76db8bdf6a4a6cb25a6dc43c5fa65c6d23a543ff8aae6010cdd4f8e", 0x1e, 0xc}], 0x8000, &(0x7f00000003c0)={[{@errors_remount='errors=remount-ro', 0x2c}]}) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000180)=ANY=[], 0xfffffd97) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setns(0xffffffffffffffff, 0x2c000000) mknod(&(0x7f0000000440)='./file0/file1\x00', 0x0, 0x0) 2018/05/17 18:19:09 executing program 0: syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x0, &(0x7f0000000240)=ANY=[]) syz_mount_image$vfat(&(0x7f00000000c0)='vfat\x00', &(0x7f0000000140)='./file1\x00', 0x100, 0x1, &(0x7f0000000340)=[{&(0x7f00000001c0)="8787e76db8bdf6a4a6cb25a6dc43c5fa65c6d23a543ff8aae6010cdd4f8e", 0x1e, 0xc}], 0x8000, &(0x7f00000003c0)={[{@errors_remount='errors=remount-ro', 0x2c}]}) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000180)=ANY=[], 0xfffffd97) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setns(0xffffffffffffffff, 0x2c000000) mknod(&(0x7f0000000440)='./file0/file1\x00', 0x0, 0x0) 2018/05/17 18:19:09 executing program 2: r0 = memfd_create(&(0x7f0000000100)="74086e750000000000000000008c00", 0x0) pwritev(r0, &(0x7f0000000340)=[{&(0x7f0000000240)='\'', 0x1}], 0x1, 0x81806) lseek(r0, 0x0, 0x3) 2018/05/17 18:19:09 executing program 5: mprotect(&(0x7f000004a000/0x4000)=nil, 0x4000, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) r1 = creat(&(0x7f0000000040)='./file0\x00', 0x0) write$binfmt_elf64(r0, &(0x7f0000001340)=ANY=[@ANYBLOB="7f"], 0x1) fcntl$setstatus(r1, 0x4, 0x4000) write$selinux_access(r1, &(0x7f0000000000)={'system_u:object_r:etc_t:s0', 0x20, '/usr/sbin/ntpd', 0x20}, 0xfffffeff) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x0) 2018/05/17 18:19:09 executing program 6: perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x72, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000100)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f0000c86f88)={0x2, 0x70, 0xfffffffffffffffb, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9}, 0x0, 0x0, 0xffffffffffffffff, 0x0) read(r0, &(0x7f0000000140)=""/220, 0xdc) mmap(&(0x7f00001bf000/0x3000)=nil, 0x3000, 0x0, 0x4011, r0, 0x0) openat$selinux_avc_cache_stats(0xffffffffffffff9c, &(0x7f0000000700)='/selinux/avc/cache_stats\x00', 0x0, 0x0) getpgrp(0xffffffffffffffff) sched_setaffinity(0x0, 0x7, &(0x7f00000000c0)=0x9) setsockopt$SO_VM_SOCKETS_BUFFER_MIN_SIZE(0xffffffffffffffff, 0x28, 0x1, &(0x7f0000000200), 0x8) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x82) sendfile(r1, r1, &(0x7f0000000080), 0x102000004) sync() 2018/05/17 18:19:09 executing program 1: r0 = memfd_create(&(0x7f0000000100)="74086e750000000000000000008c00", 0x0) pwritev(r0, &(0x7f0000000340)=[{&(0x7f0000000240)='\'', 0x1}], 0x1, 0x81806) lseek(r0, 0x0, 0x3) 2018/05/17 18:19:09 executing program 4: r0 = openat$hwrng(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/hwrng\x00', 0x101, 0x0) ioctl$BLKFLSBUF(r0, 0x1261, &(0x7f0000000200)=0x5) perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x71}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ustat(0x1, &(0x7f0000000040)) perf_event_open(&(0x7f00000004c0)={0x2, 0x239, 0x72, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xd4e9, 0x25}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket(0xa, 0x1, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = openat$null(0xffffffffffffff9c, &(0x7f0000000280)='/dev/null\x00', 0x3, 0x0) ioctl$EVIOCSREP(r3, 0x40084503, &(0x7f00000001c0)=[0x2, 0x100]) setsockopt$IP_VS_SO_SET_STARTDAEMON(r1, 0x0, 0x48b, &(0x7f0000000080)={0x2, 'veth1_to_team\x00', 0x1}, 0x18) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000440)={'syz_tun\x00'}) sendmsg$nl_route(r2, &(0x7f0000000180)={&(0x7f0000000000)={0x10}, 0xc, &(0x7f00000000c0)={&(0x7f0000000040)=ANY=[@ANYBLOB="2800000013002f0f000000000000000000000000"], 0x1}, 0x1}, 0x0) clone(0x24000000, &(0x7f0000000080)="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", &(0x7f0000000800), &(0x7f0000000640), &(0x7f00000003c0)) 2018/05/17 18:19:09 executing program 1: r0 = memfd_create(&(0x7f0000000100)="74086e750000000000000000008c00", 0x0) pwritev(r0, &(0x7f0000000340)=[{&(0x7f0000000240)='\'', 0x1}], 0x1, 0x81806) lseek(r0, 0x0, 0x3) 2018/05/17 18:19:10 executing program 2: r0 = memfd_create(&(0x7f0000000100)="74086e750000000000000000008c00", 0x0) pwritev(r0, &(0x7f0000000340)=[{&(0x7f0000000240)='\'', 0x1}], 0x1, 0x81806) lseek(r0, 0x0, 0x3) 2018/05/17 18:19:10 executing program 2: r0 = memfd_create(&(0x7f0000000100)="74086e750000000000000000008c00", 0x0) pwritev(r0, &(0x7f0000000340)=[{&(0x7f0000000240)='\'', 0x1}], 0x1, 0x81806) lseek(r0, 0x0, 0x3) 2018/05/17 18:19:10 executing program 1: r0 = memfd_create(&(0x7f0000000100)="74086e750000000000000000008c00", 0x0) pwritev(r0, &(0x7f0000000340)=[{&(0x7f0000000240)='\'', 0x1}], 0x1, 0x81806) lseek(r0, 0x0, 0x3) 2018/05/17 18:19:10 executing program 6: perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x72, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000100)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f0000c86f88)={0x2, 0x70, 0xfffffffffffffffb, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9}, 0x0, 0x0, 0xffffffffffffffff, 0x0) read(r0, &(0x7f0000000140)=""/220, 0xdc) mmap(&(0x7f00001bf000/0x3000)=nil, 0x3000, 0x0, 0x4011, r0, 0x0) openat$selinux_avc_cache_stats(0xffffffffffffff9c, &(0x7f0000000700)='/selinux/avc/cache_stats\x00', 0x0, 0x0) getpgrp(0xffffffffffffffff) sched_setaffinity(0x0, 0x7, &(0x7f00000000c0)=0x9) setsockopt$SO_VM_SOCKETS_BUFFER_MIN_SIZE(0xffffffffffffffff, 0x28, 0x1, &(0x7f0000000200), 0x8) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x82) sendfile(r1, r1, &(0x7f0000000080), 0x102000004) sync() 2018/05/17 18:19:10 executing program 1: mprotect(&(0x7f000004a000/0x4000)=nil, 0x4000, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) r1 = creat(&(0x7f0000000040)='./file0\x00', 0x0) write$binfmt_elf64(r0, &(0x7f0000001340)=ANY=[@ANYBLOB="7f"], 0x1) fcntl$setstatus(r1, 0x4, 0x4000) write$selinux_access(r1, &(0x7f0000000000)={'system_u:object_r:etc_t:s0', 0x20, '/usr/sbin/ntpd', 0x20}, 0xfffffeff) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x0) 2018/05/17 18:19:10 executing program 4: mprotect(&(0x7f000004a000/0x4000)=nil, 0x4000, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) r1 = creat(&(0x7f0000000040)='./file0\x00', 0x0) write$binfmt_elf64(r0, &(0x7f0000001340)=ANY=[@ANYBLOB="7f"], 0x1) fcntl$setstatus(r1, 0x4, 0x4000) write$selinux_access(r1, &(0x7f0000000000)={'system_u:object_r:etc_t:s0', 0x20, '/usr/sbin/ntpd', 0x20}, 0xfffffeff) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x0) 2018/05/17 18:19:10 executing program 7: mprotect(&(0x7f000004a000/0x4000)=nil, 0x4000, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) r1 = creat(&(0x7f0000000040)='./file0\x00', 0x0) write$binfmt_elf64(r0, &(0x7f0000001340)=ANY=[@ANYBLOB="7f"], 0x1) fcntl$setstatus(r1, 0x4, 0x4000) write$selinux_access(r1, &(0x7f0000000000)={'system_u:object_r:etc_t:s0', 0x20, '/usr/sbin/ntpd', 0x20}, 0xfffffeff) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x0) 2018/05/17 18:19:10 executing program 0: syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x0, &(0x7f0000000240)=ANY=[]) syz_mount_image$vfat(&(0x7f00000000c0)='vfat\x00', &(0x7f0000000140)='./file1\x00', 0x100, 0x1, &(0x7f0000000340)=[{&(0x7f00000001c0)="8787e76db8bdf6a4a6cb25a6dc43c5fa65c6d23a543ff8aae6010cdd4f8e", 0x1e, 0xc}], 0x8000, &(0x7f00000003c0)={[{@errors_remount='errors=remount-ro', 0x2c}]}) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000180)=ANY=[], 0xfffffd97) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setns(0xffffffffffffffff, 0x2c000000) mknod(&(0x7f0000000440)='./file0/file1\x00', 0x0, 0x0) 2018/05/17 18:19:10 executing program 3: mprotect(&(0x7f000004a000/0x4000)=nil, 0x4000, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) r1 = creat(&(0x7f0000000040)='./file0\x00', 0x0) write$binfmt_elf64(r0, &(0x7f0000001340)=ANY=[@ANYBLOB="7f"], 0x1) fcntl$setstatus(r1, 0x4, 0x4000) write$selinux_access(r1, &(0x7f0000000000)={'system_u:object_r:etc_t:s0', 0x20, '/usr/sbin/ntpd', 0x20}, 0xfffffeff) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x0) 2018/05/17 18:19:10 executing program 5: mprotect(&(0x7f000004a000/0x4000)=nil, 0x4000, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) r1 = creat(&(0x7f0000000040)='./file0\x00', 0x0) write$binfmt_elf64(r0, &(0x7f0000001340)=ANY=[@ANYBLOB="7f"], 0x1) fcntl$setstatus(r1, 0x4, 0x4000) write$selinux_access(r1, &(0x7f0000000000)={'system_u:object_r:etc_t:s0', 0x20, '/usr/sbin/ntpd', 0x20}, 0xfffffeff) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x0) 2018/05/17 18:19:10 executing program 2: perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x72, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000100)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f0000c86f88)={0x2, 0x70, 0xfffffffffffffffb, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9}, 0x0, 0x0, 0xffffffffffffffff, 0x0) read(r0, &(0x7f0000000140)=""/220, 0xdc) mmap(&(0x7f00001bf000/0x3000)=nil, 0x3000, 0x0, 0x4011, r0, 0x0) openat$selinux_avc_cache_stats(0xffffffffffffff9c, &(0x7f0000000700)='/selinux/avc/cache_stats\x00', 0x0, 0x0) getpgrp(0xffffffffffffffff) sched_setaffinity(0x0, 0x7, &(0x7f00000000c0)=0x9) setsockopt$SO_VM_SOCKETS_BUFFER_MIN_SIZE(0xffffffffffffffff, 0x28, 0x1, &(0x7f0000000200), 0x8) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x82) sendfile(r1, r1, &(0x7f0000000080), 0x102000004) sync() 2018/05/17 18:19:10 executing program 6: perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x72, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000100)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f0000c86f88)={0x2, 0x70, 0xfffffffffffffffb, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9}, 0x0, 0x0, 0xffffffffffffffff, 0x0) read(r0, &(0x7f0000000140)=""/220, 0xdc) mmap(&(0x7f00001bf000/0x3000)=nil, 0x3000, 0x0, 0x4011, r0, 0x0) openat$selinux_avc_cache_stats(0xffffffffffffff9c, &(0x7f0000000700)='/selinux/avc/cache_stats\x00', 0x0, 0x0) getpgrp(0xffffffffffffffff) sched_setaffinity(0x0, 0x7, &(0x7f00000000c0)=0x9) setsockopt$SO_VM_SOCKETS_BUFFER_MIN_SIZE(0xffffffffffffffff, 0x28, 0x1, &(0x7f0000000200), 0x8) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x82) sendfile(r1, r1, &(0x7f0000000080), 0x102000004) sync() 2018/05/17 18:19:10 executing program 0: perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x72, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000100)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f0000c86f88)={0x2, 0x70, 0xfffffffffffffffb, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9}, 0x0, 0x0, 0xffffffffffffffff, 0x0) read(r0, &(0x7f0000000140)=""/220, 0xdc) mmap(&(0x7f00001bf000/0x3000)=nil, 0x3000, 0x0, 0x4011, r0, 0x0) openat$selinux_avc_cache_stats(0xffffffffffffff9c, &(0x7f0000000700)='/selinux/avc/cache_stats\x00', 0x0, 0x0) getpgrp(0xffffffffffffffff) sched_setaffinity(0x0, 0x7, &(0x7f00000000c0)=0x9) setsockopt$SO_VM_SOCKETS_BUFFER_MIN_SIZE(0xffffffffffffffff, 0x28, 0x1, &(0x7f0000000200), 0x8) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x82) sendfile(r1, r1, &(0x7f0000000080), 0x102000004) sync() 2018/05/17 18:19:10 executing program 2: perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x72, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000100)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f0000c86f88)={0x2, 0x70, 0xfffffffffffffffb, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9}, 0x0, 0x0, 0xffffffffffffffff, 0x0) read(r0, &(0x7f0000000140)=""/220, 0xdc) mmap(&(0x7f00001bf000/0x3000)=nil, 0x3000, 0x0, 0x4011, r0, 0x0) openat$selinux_avc_cache_stats(0xffffffffffffff9c, &(0x7f0000000700)='/selinux/avc/cache_stats\x00', 0x0, 0x0) getpgrp(0xffffffffffffffff) sched_setaffinity(0x0, 0x7, &(0x7f00000000c0)=0x9) setsockopt$SO_VM_SOCKETS_BUFFER_MIN_SIZE(0xffffffffffffffff, 0x28, 0x1, &(0x7f0000000200), 0x8) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x82) sendfile(r1, r1, &(0x7f0000000080), 0x102000004) sync() 2018/05/17 18:19:10 executing program 7: mprotect(&(0x7f000004a000/0x4000)=nil, 0x4000, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) r1 = creat(&(0x7f0000000040)='./file0\x00', 0x0) write$binfmt_elf64(r0, &(0x7f0000001340)=ANY=[@ANYBLOB="7f"], 0x1) fcntl$setstatus(r1, 0x4, 0x4000) write$selinux_access(r1, &(0x7f0000000000)={'system_u:object_r:etc_t:s0', 0x20, '/usr/sbin/ntpd', 0x20}, 0xfffffeff) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x0) 2018/05/17 18:19:10 executing program 6: perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x72, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000100)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f0000c86f88)={0x2, 0x70, 0xfffffffffffffffb, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9}, 0x0, 0x0, 0xffffffffffffffff, 0x0) read(r0, &(0x7f0000000140)=""/220, 0xdc) mmap(&(0x7f00001bf000/0x3000)=nil, 0x3000, 0x0, 0x4011, r0, 0x0) openat$selinux_avc_cache_stats(0xffffffffffffff9c, &(0x7f0000000700)='/selinux/avc/cache_stats\x00', 0x0, 0x0) getpgrp(0xffffffffffffffff) sched_setaffinity(0x0, 0x7, &(0x7f00000000c0)=0x9) setsockopt$SO_VM_SOCKETS_BUFFER_MIN_SIZE(0xffffffffffffffff, 0x28, 0x1, &(0x7f0000000200), 0x8) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x82) sendfile(r1, r1, &(0x7f0000000080), 0x102000004) sync() 2018/05/17 18:19:10 executing program 0: perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x72, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000100)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f0000c86f88)={0x2, 0x70, 0xfffffffffffffffb, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9}, 0x0, 0x0, 0xffffffffffffffff, 0x0) read(r0, &(0x7f0000000140)=""/220, 0xdc) mmap(&(0x7f00001bf000/0x3000)=nil, 0x3000, 0x0, 0x4011, r0, 0x0) openat$selinux_avc_cache_stats(0xffffffffffffff9c, &(0x7f0000000700)='/selinux/avc/cache_stats\x00', 0x0, 0x0) getpgrp(0xffffffffffffffff) sched_setaffinity(0x0, 0x7, &(0x7f00000000c0)=0x9) setsockopt$SO_VM_SOCKETS_BUFFER_MIN_SIZE(0xffffffffffffffff, 0x28, 0x1, &(0x7f0000000200), 0x8) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x82) sendfile(r1, r1, &(0x7f0000000080), 0x102000004) sync() 2018/05/17 18:19:10 executing program 2: perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x72, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000100)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f0000c86f88)={0x2, 0x70, 0xfffffffffffffffb, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9}, 0x0, 0x0, 0xffffffffffffffff, 0x0) read(r0, &(0x7f0000000140)=""/220, 0xdc) mmap(&(0x7f00001bf000/0x3000)=nil, 0x3000, 0x0, 0x4011, r0, 0x0) openat$selinux_avc_cache_stats(0xffffffffffffff9c, &(0x7f0000000700)='/selinux/avc/cache_stats\x00', 0x0, 0x0) getpgrp(0xffffffffffffffff) sched_setaffinity(0x0, 0x7, &(0x7f00000000c0)=0x9) setsockopt$SO_VM_SOCKETS_BUFFER_MIN_SIZE(0xffffffffffffffff, 0x28, 0x1, &(0x7f0000000200), 0x8) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x82) sendfile(r1, r1, &(0x7f0000000080), 0x102000004) sync() 2018/05/17 18:19:10 executing program 6: perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x72, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000100)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f0000c86f88)={0x2, 0x70, 0xfffffffffffffffb, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9}, 0x0, 0x0, 0xffffffffffffffff, 0x0) read(r0, &(0x7f0000000140)=""/220, 0xdc) mmap(&(0x7f00001bf000/0x3000)=nil, 0x3000, 0x0, 0x4011, r0, 0x0) openat$selinux_avc_cache_stats(0xffffffffffffff9c, &(0x7f0000000700)='/selinux/avc/cache_stats\x00', 0x0, 0x0) getpgrp(0xffffffffffffffff) sched_setaffinity(0x0, 0x7, &(0x7f00000000c0)=0x9) setsockopt$SO_VM_SOCKETS_BUFFER_MIN_SIZE(0xffffffffffffffff, 0x28, 0x1, &(0x7f0000000200), 0x8) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x82) sendfile(r1, r1, &(0x7f0000000080), 0x102000004) sync() 2018/05/17 18:19:10 executing program 1: mprotect(&(0x7f000004a000/0x4000)=nil, 0x4000, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) r1 = creat(&(0x7f0000000040)='./file0\x00', 0x0) write$binfmt_elf64(r0, &(0x7f0000001340)=ANY=[@ANYBLOB="7f"], 0x1) fcntl$setstatus(r1, 0x4, 0x4000) write$selinux_access(r1, &(0x7f0000000000)={'system_u:object_r:etc_t:s0', 0x20, '/usr/sbin/ntpd', 0x20}, 0xfffffeff) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x0) 2018/05/17 18:19:11 executing program 4: mprotect(&(0x7f000004a000/0x4000)=nil, 0x4000, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) r1 = creat(&(0x7f0000000040)='./file0\x00', 0x0) write$binfmt_elf64(r0, &(0x7f0000001340)=ANY=[@ANYBLOB="7f"], 0x1) fcntl$setstatus(r1, 0x4, 0x4000) write$selinux_access(r1, &(0x7f0000000000)={'system_u:object_r:etc_t:s0', 0x20, '/usr/sbin/ntpd', 0x20}, 0xfffffeff) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x0) 2018/05/17 18:19:11 executing program 3: mprotect(&(0x7f000004a000/0x4000)=nil, 0x4000, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) r1 = creat(&(0x7f0000000040)='./file0\x00', 0x0) write$binfmt_elf64(r0, &(0x7f0000001340)=ANY=[@ANYBLOB="7f"], 0x1) fcntl$setstatus(r1, 0x4, 0x4000) write$selinux_access(r1, &(0x7f0000000000)={'system_u:object_r:etc_t:s0', 0x20, '/usr/sbin/ntpd', 0x20}, 0xfffffeff) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x0) [ 57.718746] syz-executor4 (7782) used greatest stack depth: 23600 bytes left 2018/05/17 18:19:11 executing program 5: mprotect(&(0x7f000004a000/0x4000)=nil, 0x4000, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) r1 = creat(&(0x7f0000000040)='./file0\x00', 0x0) write$binfmt_elf64(r0, &(0x7f0000001340)=ANY=[@ANYBLOB="7f"], 0x1) fcntl$setstatus(r1, 0x4, 0x4000) write$selinux_access(r1, &(0x7f0000000000)={'system_u:object_r:etc_t:s0', 0x20, '/usr/sbin/ntpd', 0x20}, 0xfffffeff) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x0) 2018/05/17 18:19:11 executing program 5: perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x72, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000100)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f0000c86f88)={0x2, 0x70, 0xfffffffffffffffb, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9}, 0x0, 0x0, 0xffffffffffffffff, 0x0) read(r0, &(0x7f0000000140)=""/220, 0xdc) mmap(&(0x7f00001bf000/0x3000)=nil, 0x3000, 0x0, 0x4011, r0, 0x0) openat$selinux_avc_cache_stats(0xffffffffffffff9c, &(0x7f0000000700)='/selinux/avc/cache_stats\x00', 0x0, 0x0) getpgrp(0xffffffffffffffff) sched_setaffinity(0x0, 0x7, &(0x7f00000000c0)=0x9) setsockopt$SO_VM_SOCKETS_BUFFER_MIN_SIZE(0xffffffffffffffff, 0x28, 0x1, &(0x7f0000000200), 0x8) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x82) sendfile(r1, r1, &(0x7f0000000080), 0x102000004) sync() 2018/05/17 18:19:11 executing program 0: perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x72, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000100)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f0000c86f88)={0x2, 0x70, 0xfffffffffffffffb, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9}, 0x0, 0x0, 0xffffffffffffffff, 0x0) read(r0, &(0x7f0000000140)=""/220, 0xdc) mmap(&(0x7f00001bf000/0x3000)=nil, 0x3000, 0x0, 0x4011, r0, 0x0) openat$selinux_avc_cache_stats(0xffffffffffffff9c, &(0x7f0000000700)='/selinux/avc/cache_stats\x00', 0x0, 0x0) getpgrp(0xffffffffffffffff) sched_setaffinity(0x0, 0x7, &(0x7f00000000c0)=0x9) setsockopt$SO_VM_SOCKETS_BUFFER_MIN_SIZE(0xffffffffffffffff, 0x28, 0x1, &(0x7f0000000200), 0x8) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x82) sendfile(r1, r1, &(0x7f0000000080), 0x102000004) sync() 2018/05/17 18:19:11 executing program 3: mprotect(&(0x7f000004a000/0x4000)=nil, 0x4000, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) r1 = creat(&(0x7f0000000040)='./file0\x00', 0x0) write$binfmt_elf64(r0, &(0x7f0000001340)=ANY=[@ANYBLOB="7f"], 0x1) fcntl$setstatus(r1, 0x4, 0x4000) write$selinux_access(r1, &(0x7f0000000000)={'system_u:object_r:etc_t:s0', 0x20, '/usr/sbin/ntpd', 0x20}, 0xfffffeff) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x0) 2018/05/17 18:19:11 executing program 6: perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x72, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000100)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f0000c86f88)={0x2, 0x70, 0xfffffffffffffffb, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9}, 0x0, 0x0, 0xffffffffffffffff, 0x0) read(r0, &(0x7f0000000140)=""/220, 0xdc) mmap(&(0x7f00001bf000/0x3000)=nil, 0x3000, 0x0, 0x4011, r0, 0x0) openat$selinux_avc_cache_stats(0xffffffffffffff9c, &(0x7f0000000700)='/selinux/avc/cache_stats\x00', 0x0, 0x0) getpgrp(0xffffffffffffffff) sched_setaffinity(0x0, 0x7, &(0x7f00000000c0)=0x9) setsockopt$SO_VM_SOCKETS_BUFFER_MIN_SIZE(0xffffffffffffffff, 0x28, 0x1, &(0x7f0000000200), 0x8) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x82) sendfile(r1, r1, &(0x7f0000000080), 0x102000004) sync() 2018/05/17 18:19:11 executing program 7: mprotect(&(0x7f000004a000/0x4000)=nil, 0x4000, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) r1 = creat(&(0x7f0000000040)='./file0\x00', 0x0) write$binfmt_elf64(r0, &(0x7f0000001340)=ANY=[@ANYBLOB="7f"], 0x1) fcntl$setstatus(r1, 0x4, 0x4000) write$selinux_access(r1, &(0x7f0000000000)={'system_u:object_r:etc_t:s0', 0x20, '/usr/sbin/ntpd', 0x20}, 0xfffffeff) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x0) 2018/05/17 18:19:11 executing program 1: mprotect(&(0x7f000004a000/0x4000)=nil, 0x4000, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) r1 = creat(&(0x7f0000000040)='./file0\x00', 0x0) write$binfmt_elf64(r0, &(0x7f0000001340)=ANY=[@ANYBLOB="7f"], 0x1) fcntl$setstatus(r1, 0x4, 0x4000) write$selinux_access(r1, &(0x7f0000000000)={'system_u:object_r:etc_t:s0', 0x20, '/usr/sbin/ntpd', 0x20}, 0xfffffeff) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x0) 2018/05/17 18:19:11 executing program 4: mprotect(&(0x7f000004a000/0x4000)=nil, 0x4000, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) r1 = creat(&(0x7f0000000040)='./file0\x00', 0x0) write$binfmt_elf64(r0, &(0x7f0000001340)=ANY=[@ANYBLOB="7f"], 0x1) fcntl$setstatus(r1, 0x4, 0x4000) write$selinux_access(r1, &(0x7f0000000000)={'system_u:object_r:etc_t:s0', 0x20, '/usr/sbin/ntpd', 0x20}, 0xfffffeff) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x0) 2018/05/17 18:19:11 executing program 2: perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x72, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000100)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f0000c86f88)={0x2, 0x70, 0xfffffffffffffffb, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9}, 0x0, 0x0, 0xffffffffffffffff, 0x0) read(r0, &(0x7f0000000140)=""/220, 0xdc) mmap(&(0x7f00001bf000/0x3000)=nil, 0x3000, 0x0, 0x4011, r0, 0x0) openat$selinux_avc_cache_stats(0xffffffffffffff9c, &(0x7f0000000700)='/selinux/avc/cache_stats\x00', 0x0, 0x0) getpgrp(0xffffffffffffffff) sched_setaffinity(0x0, 0x7, &(0x7f00000000c0)=0x9) setsockopt$SO_VM_SOCKETS_BUFFER_MIN_SIZE(0xffffffffffffffff, 0x28, 0x1, &(0x7f0000000200), 0x8) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x82) sendfile(r1, r1, &(0x7f0000000080), 0x102000004) sync() 2018/05/17 18:19:11 executing program 2: perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x72, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000100)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f0000c86f88)={0x2, 0x70, 0xfffffffffffffffb, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9}, 0x0, 0x0, 0xffffffffffffffff, 0x0) read(r0, &(0x7f0000000140)=""/220, 0xdc) mmap(&(0x7f00001bf000/0x3000)=nil, 0x3000, 0x0, 0x4011, r0, 0x0) openat$selinux_avc_cache_stats(0xffffffffffffff9c, &(0x7f0000000700)='/selinux/avc/cache_stats\x00', 0x0, 0x0) getpgrp(0xffffffffffffffff) sched_setaffinity(0x0, 0x7, &(0x7f00000000c0)=0x9) setsockopt$SO_VM_SOCKETS_BUFFER_MIN_SIZE(0xffffffffffffffff, 0x28, 0x1, &(0x7f0000000200), 0x8) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x82) sendfile(r1, r1, &(0x7f0000000080), 0x102000004) sync() 2018/05/17 18:19:11 executing program 5: perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x72, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000100)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f0000c86f88)={0x2, 0x70, 0xfffffffffffffffb, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9}, 0x0, 0x0, 0xffffffffffffffff, 0x0) read(r0, &(0x7f0000000140)=""/220, 0xdc) mmap(&(0x7f00001bf000/0x3000)=nil, 0x3000, 0x0, 0x4011, r0, 0x0) openat$selinux_avc_cache_stats(0xffffffffffffff9c, &(0x7f0000000700)='/selinux/avc/cache_stats\x00', 0x0, 0x0) getpgrp(0xffffffffffffffff) sched_setaffinity(0x0, 0x7, &(0x7f00000000c0)=0x9) setsockopt$SO_VM_SOCKETS_BUFFER_MIN_SIZE(0xffffffffffffffff, 0x28, 0x1, &(0x7f0000000200), 0x8) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x82) sendfile(r1, r1, &(0x7f0000000080), 0x102000004) sync() 2018/05/17 18:19:11 executing program 0: perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x72, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000100)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f0000c86f88)={0x2, 0x70, 0xfffffffffffffffb, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9}, 0x0, 0x0, 0xffffffffffffffff, 0x0) read(r0, &(0x7f0000000140)=""/220, 0xdc) mmap(&(0x7f00001bf000/0x3000)=nil, 0x3000, 0x0, 0x4011, r0, 0x0) openat$selinux_avc_cache_stats(0xffffffffffffff9c, &(0x7f0000000700)='/selinux/avc/cache_stats\x00', 0x0, 0x0) getpgrp(0xffffffffffffffff) sched_setaffinity(0x0, 0x7, &(0x7f00000000c0)=0x9) setsockopt$SO_VM_SOCKETS_BUFFER_MIN_SIZE(0xffffffffffffffff, 0x28, 0x1, &(0x7f0000000200), 0x8) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x82) sendfile(r1, r1, &(0x7f0000000080), 0x102000004) sync() 2018/05/17 18:19:11 executing program 6: perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x72, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000100)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f0000c86f88)={0x2, 0x70, 0xfffffffffffffffb, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9}, 0x0, 0x0, 0xffffffffffffffff, 0x0) read(r0, &(0x7f0000000140)=""/220, 0xdc) mmap(&(0x7f00001bf000/0x3000)=nil, 0x3000, 0x0, 0x4011, r0, 0x0) openat$selinux_avc_cache_stats(0xffffffffffffff9c, &(0x7f0000000700)='/selinux/avc/cache_stats\x00', 0x0, 0x0) getpgrp(0xffffffffffffffff) sched_setaffinity(0x0, 0x7, &(0x7f00000000c0)=0x9) setsockopt$SO_VM_SOCKETS_BUFFER_MIN_SIZE(0xffffffffffffffff, 0x28, 0x1, &(0x7f0000000200), 0x8) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x82) sendfile(r1, r1, &(0x7f0000000080), 0x102000004) sync() 2018/05/17 18:19:11 executing program 5: perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x72, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000100)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f0000c86f88)={0x2, 0x70, 0xfffffffffffffffb, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9}, 0x0, 0x0, 0xffffffffffffffff, 0x0) read(r0, &(0x7f0000000140)=""/220, 0xdc) mmap(&(0x7f00001bf000/0x3000)=nil, 0x3000, 0x0, 0x4011, r0, 0x0) openat$selinux_avc_cache_stats(0xffffffffffffff9c, &(0x7f0000000700)='/selinux/avc/cache_stats\x00', 0x0, 0x0) getpgrp(0xffffffffffffffff) sched_setaffinity(0x0, 0x7, &(0x7f00000000c0)=0x9) setsockopt$SO_VM_SOCKETS_BUFFER_MIN_SIZE(0xffffffffffffffff, 0x28, 0x1, &(0x7f0000000200), 0x8) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x82) sendfile(r1, r1, &(0x7f0000000080), 0x102000004) sync() 2018/05/17 18:19:11 executing program 4: perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x72, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000100)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f0000c86f88)={0x2, 0x70, 0xfffffffffffffffb, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9}, 0x0, 0x0, 0xffffffffffffffff, 0x0) read(r0, &(0x7f0000000140)=""/220, 0xdc) mmap(&(0x7f00001bf000/0x3000)=nil, 0x3000, 0x0, 0x4011, r0, 0x0) openat$selinux_avc_cache_stats(0xffffffffffffff9c, &(0x7f0000000700)='/selinux/avc/cache_stats\x00', 0x0, 0x0) getpgrp(0xffffffffffffffff) sched_setaffinity(0x0, 0x7, &(0x7f00000000c0)=0x9) setsockopt$SO_VM_SOCKETS_BUFFER_MIN_SIZE(0xffffffffffffffff, 0x28, 0x1, &(0x7f0000000200), 0x8) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x82) sendfile(r1, r1, &(0x7f0000000080), 0x102000004) sync() 2018/05/17 18:19:11 executing program 3: perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x72, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000100)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f0000c86f88)={0x2, 0x70, 0xfffffffffffffffb, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9}, 0x0, 0x0, 0xffffffffffffffff, 0x0) read(r0, &(0x7f0000000140)=""/220, 0xdc) mmap(&(0x7f00001bf000/0x3000)=nil, 0x3000, 0x0, 0x4011, r0, 0x0) openat$selinux_avc_cache_stats(0xffffffffffffff9c, &(0x7f0000000700)='/selinux/avc/cache_stats\x00', 0x0, 0x0) getpgrp(0xffffffffffffffff) sched_setaffinity(0x0, 0x7, &(0x7f00000000c0)=0x9) setsockopt$SO_VM_SOCKETS_BUFFER_MIN_SIZE(0xffffffffffffffff, 0x28, 0x1, &(0x7f0000000200), 0x8) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x82) sendfile(r1, r1, &(0x7f0000000080), 0x102000004) sync() 2018/05/17 18:19:12 executing program 0: perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x72, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000100)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f0000c86f88)={0x2, 0x70, 0xfffffffffffffffb, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9}, 0x0, 0x0, 0xffffffffffffffff, 0x0) read(r0, &(0x7f0000000140)=""/220, 0xdc) mmap(&(0x7f00001bf000/0x3000)=nil, 0x3000, 0x0, 0x4011, r0, 0x0) openat$selinux_avc_cache_stats(0xffffffffffffff9c, &(0x7f0000000700)='/selinux/avc/cache_stats\x00', 0x0, 0x0) getpgrp(0xffffffffffffffff) sched_setaffinity(0x0, 0x7, &(0x7f00000000c0)=0x9) setsockopt$SO_VM_SOCKETS_BUFFER_MIN_SIZE(0xffffffffffffffff, 0x28, 0x1, &(0x7f0000000200), 0x8) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x82) sendfile(r1, r1, &(0x7f0000000080), 0x102000004) sync() 2018/05/17 18:19:12 executing program 7: r0 = memfd_create(&(0x7f0000000100)="74086e750000000000000000008c00", 0x0) pwritev(r0, &(0x7f0000000340)=[{&(0x7f0000000240)='\'', 0x1}], 0x1, 0x81806) lseek(r0, 0x0, 0x3) 2018/05/17 18:19:12 executing program 6: perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x72, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000100)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f0000c86f88)={0x2, 0x70, 0xfffffffffffffffb, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9}, 0x0, 0x0, 0xffffffffffffffff, 0x0) read(r0, &(0x7f0000000140)=""/220, 0xdc) mmap(&(0x7f00001bf000/0x3000)=nil, 0x3000, 0x0, 0x4011, r0, 0x0) openat$selinux_avc_cache_stats(0xffffffffffffff9c, &(0x7f0000000700)='/selinux/avc/cache_stats\x00', 0x0, 0x0) getpgrp(0xffffffffffffffff) sched_setaffinity(0x0, 0x7, &(0x7f00000000c0)=0x9) setsockopt$SO_VM_SOCKETS_BUFFER_MIN_SIZE(0xffffffffffffffff, 0x28, 0x1, &(0x7f0000000200), 0x8) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x82) sendfile(r1, r1, &(0x7f0000000080), 0x102000004) sync() 2018/05/17 18:19:12 executing program 2: perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x72, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000100)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f0000c86f88)={0x2, 0x70, 0xfffffffffffffffb, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9}, 0x0, 0x0, 0xffffffffffffffff, 0x0) read(r0, &(0x7f0000000140)=""/220, 0xdc) mmap(&(0x7f00001bf000/0x3000)=nil, 0x3000, 0x0, 0x4011, r0, 0x0) openat$selinux_avc_cache_stats(0xffffffffffffff9c, &(0x7f0000000700)='/selinux/avc/cache_stats\x00', 0x0, 0x0) getpgrp(0xffffffffffffffff) sched_setaffinity(0x0, 0x7, &(0x7f00000000c0)=0x9) setsockopt$SO_VM_SOCKETS_BUFFER_MIN_SIZE(0xffffffffffffffff, 0x28, 0x1, &(0x7f0000000200), 0x8) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x82) sendfile(r1, r1, &(0x7f0000000080), 0x102000004) sync() 2018/05/17 18:19:12 executing program 3: perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x72, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000100)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f0000c86f88)={0x2, 0x70, 0xfffffffffffffffb, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9}, 0x0, 0x0, 0xffffffffffffffff, 0x0) read(r0, &(0x7f0000000140)=""/220, 0xdc) mmap(&(0x7f00001bf000/0x3000)=nil, 0x3000, 0x0, 0x4011, r0, 0x0) openat$selinux_avc_cache_stats(0xffffffffffffff9c, &(0x7f0000000700)='/selinux/avc/cache_stats\x00', 0x0, 0x0) getpgrp(0xffffffffffffffff) sched_setaffinity(0x0, 0x7, &(0x7f00000000c0)=0x9) setsockopt$SO_VM_SOCKETS_BUFFER_MIN_SIZE(0xffffffffffffffff, 0x28, 0x1, &(0x7f0000000200), 0x8) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x82) sendfile(r1, r1, &(0x7f0000000080), 0x102000004) sync() 2018/05/17 18:19:12 executing program 1: r0 = socket(0xa, 0x1, 0x0) ioctl(r0, 0x8912, &(0x7f0000000240)="c626262c8523bf012cf66f") r1 = socket$netlink(0x10, 0x3, 0xf) bind$netlink(r1, &(0x7f0000514ff4)={0x10, 0x0, 0x0, 0x2ffffffff}, 0xc) close(r1) 2018/05/17 18:19:12 executing program 4: perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x72, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000100)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f0000c86f88)={0x2, 0x70, 0xfffffffffffffffb, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9}, 0x0, 0x0, 0xffffffffffffffff, 0x0) read(r0, &(0x7f0000000140)=""/220, 0xdc) mmap(&(0x7f00001bf000/0x3000)=nil, 0x3000, 0x0, 0x4011, r0, 0x0) openat$selinux_avc_cache_stats(0xffffffffffffff9c, &(0x7f0000000700)='/selinux/avc/cache_stats\x00', 0x0, 0x0) getpgrp(0xffffffffffffffff) sched_setaffinity(0x0, 0x7, &(0x7f00000000c0)=0x9) setsockopt$SO_VM_SOCKETS_BUFFER_MIN_SIZE(0xffffffffffffffff, 0x28, 0x1, &(0x7f0000000200), 0x8) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x82) sendfile(r1, r1, &(0x7f0000000080), 0x102000004) sync() 2018/05/17 18:19:12 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext2\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0xaaaaaaaaaaaab6d, &(0x7f0000001640), 0x0, &(0x7f0000001700)={[{@sb={'sb', 0x3d, [0x0]}, 0x2c}]}) 2018/05/17 18:19:12 executing program 1: r0 = socket(0xa, 0x1, 0x0) ioctl(r0, 0x8912, &(0x7f0000000240)="c626262c8523bf012cf66f") r1 = socket$netlink(0x10, 0x3, 0xf) bind$netlink(r1, &(0x7f0000514ff4)={0x10, 0x0, 0x0, 0x2ffffffff}, 0xc) close(r1) 2018/05/17 18:19:12 executing program 7: r0 = memfd_create(&(0x7f0000000100)="74086e750000000000000000008c00", 0x0) pwritev(r0, &(0x7f0000000340)=[{&(0x7f0000000240)='\'', 0x1}], 0x1, 0x81806) lseek(r0, 0x0, 0x3) 2018/05/17 18:19:12 executing program 7: r0 = memfd_create(&(0x7f0000000100)="74086e750000000000000000008c00", 0x0) pwritev(r0, &(0x7f0000000340)=[{&(0x7f0000000240)='\'', 0x1}], 0x1, 0x81806) lseek(r0, 0x0, 0x3) 2018/05/17 18:19:12 executing program 1: r0 = socket(0xa, 0x1, 0x0) ioctl(r0, 0x8912, &(0x7f0000000240)="c626262c8523bf012cf66f") r1 = socket$netlink(0x10, 0x3, 0xf) bind$netlink(r1, &(0x7f0000514ff4)={0x10, 0x0, 0x0, 0x2ffffffff}, 0xc) close(r1) 2018/05/17 18:19:12 executing program 7: r0 = socket(0xa, 0x1, 0x0) ioctl(r0, 0x8912, &(0x7f0000000240)="c626262c8523bf012cf66f") r1 = socket$netlink(0x10, 0x3, 0xf) bind$netlink(r1, &(0x7f0000514ff4)={0x10, 0x0, 0x0, 0x2ffffffff}, 0xc) close(r1) [ 58.993848] EXT2-fs (loop5): error: can't find an ext2 filesystem on dev loop5. [ 59.091390] EXT2-fs (loop5): error: can't find an ext2 filesystem on dev loop5. 2018/05/17 18:19:12 executing program 1: r0 = socket(0xa, 0x1, 0x0) ioctl(r0, 0x8912, &(0x7f0000000240)="c626262c8523bf012cf66f") r1 = socket$netlink(0x10, 0x3, 0xf) bind$netlink(r1, &(0x7f0000514ff4)={0x10, 0x0, 0x0, 0x2ffffffff}, 0xc) close(r1) 2018/05/17 18:19:12 executing program 7: r0 = socket(0xa, 0x1, 0x0) ioctl(r0, 0x8912, &(0x7f0000000240)="c626262c8523bf012cf66f") r1 = socket$netlink(0x10, 0x3, 0xf) bind$netlink(r1, &(0x7f0000514ff4)={0x10, 0x0, 0x0, 0x2ffffffff}, 0xc) close(r1) 2018/05/17 18:19:12 executing program 6: perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x72, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000100)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f0000c86f88)={0x2, 0x70, 0xfffffffffffffffb, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9}, 0x0, 0x0, 0xffffffffffffffff, 0x0) read(r0, &(0x7f0000000140)=""/220, 0xdc) mmap(&(0x7f00001bf000/0x3000)=nil, 0x3000, 0x0, 0x4011, r0, 0x0) openat$selinux_avc_cache_stats(0xffffffffffffff9c, &(0x7f0000000700)='/selinux/avc/cache_stats\x00', 0x0, 0x0) getpgrp(0xffffffffffffffff) sched_setaffinity(0x0, 0x7, &(0x7f00000000c0)=0x9) setsockopt$SO_VM_SOCKETS_BUFFER_MIN_SIZE(0xffffffffffffffff, 0x28, 0x1, &(0x7f0000000200), 0x8) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x82) sendfile(r1, r1, &(0x7f0000000080), 0x102000004) sync() 2018/05/17 18:19:12 executing program 3: perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x72, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000100)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f0000c86f88)={0x2, 0x70, 0xfffffffffffffffb, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9}, 0x0, 0x0, 0xffffffffffffffff, 0x0) read(r0, &(0x7f0000000140)=""/220, 0xdc) mmap(&(0x7f00001bf000/0x3000)=nil, 0x3000, 0x0, 0x4011, r0, 0x0) openat$selinux_avc_cache_stats(0xffffffffffffff9c, &(0x7f0000000700)='/selinux/avc/cache_stats\x00', 0x0, 0x0) getpgrp(0xffffffffffffffff) sched_setaffinity(0x0, 0x7, &(0x7f00000000c0)=0x9) setsockopt$SO_VM_SOCKETS_BUFFER_MIN_SIZE(0xffffffffffffffff, 0x28, 0x1, &(0x7f0000000200), 0x8) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x82) sendfile(r1, r1, &(0x7f0000000080), 0x102000004) sync() 2018/05/17 18:19:12 executing program 4: perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x72, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000100)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f0000c86f88)={0x2, 0x70, 0xfffffffffffffffb, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9}, 0x0, 0x0, 0xffffffffffffffff, 0x0) read(r0, &(0x7f0000000140)=""/220, 0xdc) mmap(&(0x7f00001bf000/0x3000)=nil, 0x3000, 0x0, 0x4011, r0, 0x0) openat$selinux_avc_cache_stats(0xffffffffffffff9c, &(0x7f0000000700)='/selinux/avc/cache_stats\x00', 0x0, 0x0) getpgrp(0xffffffffffffffff) sched_setaffinity(0x0, 0x7, &(0x7f00000000c0)=0x9) setsockopt$SO_VM_SOCKETS_BUFFER_MIN_SIZE(0xffffffffffffffff, 0x28, 0x1, &(0x7f0000000200), 0x8) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x82) sendfile(r1, r1, &(0x7f0000000080), 0x102000004) sync() 2018/05/17 18:19:12 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000140)='net/arp\x00') r1 = socket$inet_tcp(0x2, 0x1, 0x0) r2 = syz_open_dev$tun(&(0x7f0000000280)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f0000000200)={'syzkaller0\x00', 0x3}) ioctl$sock_inet_SIOCSARP(r1, 0x8955, &(0x7f0000000600)={{0x2, 0x0, @local={0xac, 0x14, 0x14, 0xaa}}, {}, 0x8, {0x2, 0x0, @rand_addr}, 'syzkaller0\x00'}) pread64(r0, &(0x7f0000000040)=""/8, 0x376, 0x0) 2018/05/17 18:19:12 executing program 0: perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x72, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000100)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f0000c86f88)={0x2, 0x70, 0xfffffffffffffffb, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9}, 0x0, 0x0, 0xffffffffffffffff, 0x0) read(r0, &(0x7f0000000140)=""/220, 0xdc) mmap(&(0x7f00001bf000/0x3000)=nil, 0x3000, 0x0, 0x4011, r0, 0x0) openat$selinux_avc_cache_stats(0xffffffffffffff9c, &(0x7f0000000700)='/selinux/avc/cache_stats\x00', 0x0, 0x0) getpgrp(0xffffffffffffffff) sched_setaffinity(0x0, 0x7, &(0x7f00000000c0)=0x9) setsockopt$SO_VM_SOCKETS_BUFFER_MIN_SIZE(0xffffffffffffffff, 0x28, 0x1, &(0x7f0000000200), 0x8) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x82) sendfile(r1, r1, &(0x7f0000000080), 0x102000004) sync() 2018/05/17 18:19:12 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext2\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0xaaaaaaaaaaaab6d, &(0x7f0000001640), 0x0, &(0x7f0000001700)={[{@sb={'sb', 0x3d, [0x0]}, 0x2c}]}) 2018/05/17 18:19:12 executing program 1: mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) syz_fuse_mount(&(0x7f0000000340)='./file0\x00', 0x4002, 0x0, 0x0, 0x465d, 0x0) syz_fuseblk_mount(&(0x7f0000000140)='./file0//ile0\x00', &(0x7f0000000080)='./file0//ile0\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) umount2(&(0x7f00000000c0)='./file0\x00', 0x3) 2018/05/17 18:19:12 executing program 7: r0 = socket(0xa, 0x1, 0x0) ioctl(r0, 0x8912, &(0x7f0000000240)="c626262c8523bf012cf66f") r1 = socket$netlink(0x10, 0x3, 0xf) bind$netlink(r1, &(0x7f0000514ff4)={0x10, 0x0, 0x0, 0x2ffffffff}, 0xc) close(r1) 2018/05/17 18:19:12 executing program 7: r0 = socket(0x10, 0x2, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000100)='net/mcfilter6\x00') sendfile(r0, r1, &(0x7f0000000000), 0x80000002) 2018/05/17 18:19:12 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000140)='net/arp\x00') r1 = socket$inet_tcp(0x2, 0x1, 0x0) r2 = syz_open_dev$tun(&(0x7f0000000280)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f0000000200)={'syzkaller0\x00', 0x3}) ioctl$sock_inet_SIOCSARP(r1, 0x8955, &(0x7f0000000600)={{0x2, 0x0, @local={0xac, 0x14, 0x14, 0xaa}}, {}, 0x8, {0x2, 0x0, @rand_addr}, 'syzkaller0\x00'}) pread64(r0, &(0x7f0000000040)=""/8, 0x376, 0x0) 2018/05/17 18:19:12 executing program 7: r0 = socket(0x10, 0x2, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000100)='net/mcfilter6\x00') sendfile(r0, r1, &(0x7f0000000000), 0x80000002) [ 59.285238] EXT2-fs (loop5): error: can't find an ext2 filesystem on dev loop5. [ 59.296237] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=25924 sclass=netlink_route_socket pig=7966 comm=syz-executor7 2018/05/17 18:19:12 executing program 7: r0 = socket(0x10, 0x2, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000100)='net/mcfilter6\x00') sendfile(r0, r1, &(0x7f0000000000), 0x80000002) 2018/05/17 18:19:12 executing program 3: r0 = socket(0x10, 0x2, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000100)='net/mcfilter6\x00') sendfile(r0, r1, &(0x7f0000000000), 0x80000002) 2018/05/17 18:19:12 executing program 4: r0 = syz_open_procfs(0x0, &(0x7f0000000140)='net/arp\x00') r1 = socket$inet_tcp(0x2, 0x1, 0x0) r2 = syz_open_dev$tun(&(0x7f0000000280)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f0000000200)={'syzkaller0\x00', 0x3}) ioctl$sock_inet_SIOCSARP(r1, 0x8955, &(0x7f0000000600)={{0x2, 0x0, @local={0xac, 0x14, 0x14, 0xaa}}, {}, 0x8, {0x2, 0x0, @rand_addr}, 'syzkaller0\x00'}) pread64(r0, &(0x7f0000000040)=""/8, 0x376, 0x0) 2018/05/17 18:19:12 executing program 6: r0 = syz_open_procfs(0x0, &(0x7f0000000140)='net/arp\x00') r1 = socket$inet_tcp(0x2, 0x1, 0x0) r2 = syz_open_dev$tun(&(0x7f0000000280)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f0000000200)={'syzkaller0\x00', 0x3}) ioctl$sock_inet_SIOCSARP(r1, 0x8955, &(0x7f0000000600)={{0x2, 0x0, @local={0xac, 0x14, 0x14, 0xaa}}, {}, 0x8, {0x2, 0x0, @rand_addr}, 'syzkaller0\x00'}) pread64(r0, &(0x7f0000000040)=""/8, 0x376, 0x0) 2018/05/17 18:19:12 executing program 7: r0 = socket(0x10, 0x2, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000100)='net/mcfilter6\x00') sendfile(r0, r1, &(0x7f0000000000), 0x80000002) 2018/05/17 18:19:12 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000140)='net/arp\x00') r1 = socket$inet_tcp(0x2, 0x1, 0x0) r2 = syz_open_dev$tun(&(0x7f0000000280)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f0000000200)={'syzkaller0\x00', 0x3}) ioctl$sock_inet_SIOCSARP(r1, 0x8955, &(0x7f0000000600)={{0x2, 0x0, @local={0xac, 0x14, 0x14, 0xaa}}, {}, 0x8, {0x2, 0x0, @rand_addr}, 'syzkaller0\x00'}) pread64(r0, &(0x7f0000000040)=""/8, 0x376, 0x0) [ 59.297361] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=25924 sclass=netlink_route_socket pig=7967 comm=syz-executor7 [ 59.340588] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=25924 sclass=netlink_route_socket pig=7973 comm=syz-executor7 [ 59.404664] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=25924 sclass=netlink_route_socket pig=7977 comm=syz-executor7 [ 59.409982] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=25924 sclass=netlink_route_socket pig=7983 comm=syz-executor3 [ 59.439773] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=25924 sclass=netlink_route_socket pig=7992 comm=syz-executor7 2018/05/17 18:19:13 executing program 3: r0 = socket(0x10, 0x2, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000100)='net/mcfilter6\x00') sendfile(r0, r1, &(0x7f0000000000), 0x80000002) 2018/05/17 18:19:13 executing program 0: r0 = syz_open_procfs(0x0, &(0x7f0000000140)='net/arp\x00') r1 = socket$inet_tcp(0x2, 0x1, 0x0) r2 = syz_open_dev$tun(&(0x7f0000000280)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f0000000200)={'syzkaller0\x00', 0x3}) ioctl$sock_inet_SIOCSARP(r1, 0x8955, &(0x7f0000000600)={{0x2, 0x0, @local={0xac, 0x14, 0x14, 0xaa}}, {}, 0x8, {0x2, 0x0, @rand_addr}, 'syzkaller0\x00'}) pread64(r0, &(0x7f0000000040)=""/8, 0x376, 0x0) 2018/05/17 18:19:13 executing program 7: r0 = socket$inet6(0xa, 0x2, 0x0) ioctl(r0, 0x8912, &(0x7f0000000240)="c626262c8523bf012cf66f") linkat(0xffffffffffffffff, &(0x7f0000000080)='./file0\x00', 0xffffffffffffffff, &(0x7f00000000c0)='./file0\x00', 0x6b38f7ae77de2b45) 2018/05/17 18:19:13 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext2\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0xaaaaaaaaaaaab6d, &(0x7f0000001640), 0x0, &(0x7f0000001700)={[{@sb={'sb', 0x3d, [0x0]}, 0x2c}]}) 2018/05/17 18:19:13 executing program 6: r0 = syz_open_procfs(0x0, &(0x7f0000000140)='net/arp\x00') r1 = socket$inet_tcp(0x2, 0x1, 0x0) r2 = syz_open_dev$tun(&(0x7f0000000280)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f0000000200)={'syzkaller0\x00', 0x3}) ioctl$sock_inet_SIOCSARP(r1, 0x8955, &(0x7f0000000600)={{0x2, 0x0, @local={0xac, 0x14, 0x14, 0xaa}}, {}, 0x8, {0x2, 0x0, @rand_addr}, 'syzkaller0\x00'}) pread64(r0, &(0x7f0000000040)=""/8, 0x376, 0x0) 2018/05/17 18:19:13 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000140)='net/arp\x00') r1 = socket$inet_tcp(0x2, 0x1, 0x0) r2 = syz_open_dev$tun(&(0x7f0000000280)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f0000000200)={'syzkaller0\x00', 0x3}) ioctl$sock_inet_SIOCSARP(r1, 0x8955, &(0x7f0000000600)={{0x2, 0x0, @local={0xac, 0x14, 0x14, 0xaa}}, {}, 0x8, {0x2, 0x0, @rand_addr}, 'syzkaller0\x00'}) pread64(r0, &(0x7f0000000040)=""/8, 0x376, 0x0) 2018/05/17 18:19:13 executing program 1: mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) syz_fuse_mount(&(0x7f0000000340)='./file0\x00', 0x4002, 0x0, 0x0, 0x465d, 0x0) syz_fuseblk_mount(&(0x7f0000000140)='./file0//ile0\x00', &(0x7f0000000080)='./file0//ile0\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) umount2(&(0x7f00000000c0)='./file0\x00', 0x3) 2018/05/17 18:19:13 executing program 4: r0 = syz_open_procfs(0x0, &(0x7f0000000140)='net/arp\x00') r1 = socket$inet_tcp(0x2, 0x1, 0x0) r2 = syz_open_dev$tun(&(0x7f0000000280)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f0000000200)={'syzkaller0\x00', 0x3}) ioctl$sock_inet_SIOCSARP(r1, 0x8955, &(0x7f0000000600)={{0x2, 0x0, @local={0xac, 0x14, 0x14, 0xaa}}, {}, 0x8, {0x2, 0x0, @rand_addr}, 'syzkaller0\x00'}) pread64(r0, &(0x7f0000000040)=""/8, 0x376, 0x0) 2018/05/17 18:19:13 executing program 7: r0 = socket$inet6(0xa, 0x2, 0x0) ioctl(r0, 0x8912, &(0x7f0000000240)="c626262c8523bf012cf66f") linkat(0xffffffffffffffff, &(0x7f0000000080)='./file0\x00', 0xffffffffffffffff, &(0x7f00000000c0)='./file0\x00', 0x6b38f7ae77de2b45) 2018/05/17 18:19:13 executing program 7: r0 = socket$inet6(0xa, 0x2, 0x0) ioctl(r0, 0x8912, &(0x7f0000000240)="c626262c8523bf012cf66f") linkat(0xffffffffffffffff, &(0x7f0000000080)='./file0\x00', 0xffffffffffffffff, &(0x7f00000000c0)='./file0\x00', 0x6b38f7ae77de2b45) 2018/05/17 18:19:13 executing program 3: r0 = socket(0x10, 0x2, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000100)='net/mcfilter6\x00') sendfile(r0, r1, &(0x7f0000000000), 0x80000002) 2018/05/17 18:19:13 executing program 7: r0 = socket$inet6(0xa, 0x2, 0x0) ioctl(r0, 0x8912, &(0x7f000000