[....] Starting enhanced syslogd: rsyslogd[?25l[?1c7[ ok 8[?25h[?0c. [....] Starting periodic command scheduler: cron[?25l[?1c7[ ok 8[?25h[?0c. [....] Starting OpenBSD Secure Shell server: sshd[ 14.930000] random: sshd: uninitialized urandom read (32 bytes read) [?25l[?1c7[ ok 8[?25h[?0c. Debian GNU/Linux 7 syzkaller ttyS0 syzkaller login: [ 20.750181] random: sshd: uninitialized urandom read (32 bytes read) [ 21.195913] random: sshd: uninitialized urandom read (32 bytes read) [ 22.067136] random: sshd: uninitialized urandom read (32 bytes read) Warning: Permanently added '10.128.10.43' (ECDSA) to the list of known hosts. [ 27.541199] random: sshd: uninitialized urandom read (32 bytes read) 2018/04/29 19:58:33 fuzzer started 2018/04/29 19:58:34 dialing manager at 10.128.0.26:35927 [ 32.897999] random: crng init done 2018/04/29 19:58:44 kcov=true, comps=false 2018/04/29 19:58:50 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000d7a000)={&(0x7f0000aeaff4)={0x10}, 0xc, &(0x7f00004e2000)={&(0x7f000007afe0)={0x14, 0xc, 0x6, 0x1}, 0x14}, 0x1}, 0x0) 2018/04/29 19:58:50 executing program 1: r0 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x82) r1 = memfd_create(&(0x7f0000000100)="74086e750000000000000000008c00", 0x0) pwritev(r1, &(0x7f0000000340)=[{&(0x7f00000001c0)='\'', 0x1}], 0x1, 0x81806) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) ioctl$LOOP_SET_STATUS64(0xffffffffffffffff, 0x4c04, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "07dd8aa88df543f4e8844a1d2dde93fca76c9439cf05a87d9f0d610bc6036cf5409918395b3e884a674b150031b8a6fe71b0813a5c3417e15539bd31b48884d5", "81d5544ff77ddd1ab96cb15c973cc51708890ab412736ecbd95a95953cd957110522bed52db1e2da0800a8bc29006d61018f79bffc89ee3a2e9a4ae67fe9198c", "fe3f7b07120d64de9d947ed16020a9327433f12036fc4a9c3f50e1eb5fa6f631"}) sendfile(r0, r0, &(0x7f0000000080), 0x102000004) 2018/04/29 19:58:50 executing program 7: r0 = socket$packet(0x11, 0x2, 0x300) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000140)={'bond_slave_1\x00'}) r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000200)={&(0x7f0000000000)={0x10}, 0xc, &(0x7f0000000180)={&(0x7f0000000680)=ANY=[@ANYBLOB="1c0000005e000100000000000000000000000000", @ANYBLOB="0404000070ba94c39a67f752df092127ddc697503cac8355be31e0c906cb6e779bf307c21b44e4530483ee8156f50e4bf6b62ca89a86150e1f4f978a6c521402c7a6a64dd4bfb3c97f8d604bfeb65b64d417addc498f8ebe9a173975fe3490befdcf56180236b9fe74ae13de2fce5054ecebc18cd0f2d4c3fd15811285fbd779f57878b541c8dbe55730d8d6d714de0000"], 0x2}, 0x1}, 0x0) 2018/04/29 19:58:50 executing program 2: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f000095bffc)={0x0, 0x0, 0xfffffffffffffffc}, 0x4) r1 = socket$inet_udp(0x2, 0x2, 0x0) sendto$inet(r1, &(0x7f0000762fff), 0xfdc7, 0x0, &(0x7f000057bff0)={0x2, 0x4e20, @multicast1=0xe0000001}, 0x10) 2018/04/29 19:58:50 executing program 3: bind$llc(0xffffffffffffffff, &(0x7f0000000300)={0x1a, 0x0, 0x0, 0x0, 0x0, 0x20, @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff]}, 0x10) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup.cpu\x00', 0x200002, 0x0) fchdir(r0) r1 = creat(&(0x7f0000000700)='./bus\x00', 0x0) fcntl$setstatus(r1, 0x4, 0x6000) r2 = open(&(0x7f00000000c0)='./bus\x00', 0x141042, 0x0) ftruncate(r2, 0x8000) r3 = open(&(0x7f000000fffa)='./bus\x00', 0x141042, 0x0) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(0xffffffffffffffff, 0xc08c5332, &(0x7f0000000200)={0x0, 0x0, 0x0, 'queue1\x00'}) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x800002, 0x11, r3, 0x0) setsockopt$inet6_tcp_TCP_MD5SIG(0xffffffffffffffff, 0x6, 0xe, &(0x7f0000005040)={@in6={{0xa}}, 0x0, 0x0, 0x0, "3a5a2e498096c1934b763b7f3352fb530751451ac825a402eec0c934cf8849557b9b13bd0ef6115fc126ebcfd4a4e8c53c113e7a9d51650e4011ea3f20bdbd99588fb09731f3dab2dac27a74be15acc6"}, 0xd8) r4 = open(&(0x7f0000000080)='./file1\x00', 0x0, 0x0) setsockopt$inet_sctp6_SCTP_NODELAY(0xffffffffffffffff, 0x84, 0x3, &(0x7f00000002c0), 0x4) sendfile(r1, r4, &(0x7f0000d83ff8), 0x8000fffffffe) 2018/04/29 19:58:50 executing program 4: socketpair(0x1, 0x3, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x8946, &(0x7f0000000040)="6c6f0076bf1a2d2851d7966fd651b179a9c8272c") 2018/04/29 19:58:50 executing program 5: perf_event_open(&(0x7f0000348f88)={0x2, 0x70, 0x3e6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f00003cefe4)={&(0x7f0000000000)={0x10, 0x34000}, 0xc, &(0x7f0000007ff0)={&(0x7f0000000080)={0x1c, 0x2c, 0x701, 0x0, 0x0, {0x3}, [@typed={0x8, 0x0, @str='\x00'}]}, 0x1c}, 0x1}, 0x0) 2018/04/29 19:58:50 executing program 6: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000300)='./cgroup\x00', 0x200002, 0x0) r1 = openat$cgroup_int(r0, &(0x7f0000000000)='rdma.max\x00', 0x2, 0x0) write$cgroup_int(r1, &(0x7f0000000080), 0x0) [ 44.949176] IPVS: Creating netns size=2536 id=1 [ 45.035186] IPVS: Creating netns size=2536 id=2 [ 45.114304] IPVS: Creating netns size=2536 id=3 [ 45.152571] IPVS: Creating netns size=2536 id=4 [ 45.196703] IPVS: Creating netns size=2536 id=5 [ 45.261143] IPVS: Creating netns size=2536 id=6 [ 45.292035] IPVS: Creating netns size=2536 id=7 [ 45.357718] IPVS: Creating netns size=2536 id=8 [ 45.868243] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 45.921160] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 45.991158] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 46.062059] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 46.077057] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 46.092888] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 46.114485] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 46.121630] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 46.138487] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 46.169266] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 46.242829] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 46.259786] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 46.294577] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 46.336772] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 46.350668] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 46.360990] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 46.375640] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 46.430446] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 46.444208] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 46.451671] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 46.486942] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 46.506468] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 46.515350] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 46.530206] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 46.594076] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 46.601622] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 46.628340] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 46.669995] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 46.688861] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 46.716404] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 46.736276] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 46.756298] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 46.777154] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 46.790052] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 46.804579] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 46.812783] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 46.820433] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 46.830240] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 46.849273] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 46.862838] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 46.871182] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 46.882460] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 46.891759] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 46.899141] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 46.921173] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 46.946463] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 46.954557] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 46.979036] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 46.990154] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 47.000824] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 47.010757] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 47.021806] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 47.029548] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 47.039546] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 47.048010] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 47.055827] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 47.064457] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 47.075168] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 47.082669] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 47.101540] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 47.109630] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 47.118876] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 47.126905] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 47.139511] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 47.150303] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 47.158060] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 47.165963] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 47.173426] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 47.180867] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 47.188378] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 47.195831] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 47.206676] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 47.217000] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 47.227656] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 47.236946] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 47.244961] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 47.252460] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 47.260407] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 47.267937] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 47.275520] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 47.282877] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 47.301187] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 47.347917] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 47.362080] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 47.372139] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 47.386230] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 47.393965] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 47.407436] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 47.423877] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 47.445934] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 47.487901] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 47.505855] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 47.513367] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 47.551381] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 47.565708] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 47.573214] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 50.958697] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 50.984407] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 51.036814] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 51.092196] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 51.119734] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 51.129759] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 51.149776] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 51.159572] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 51.169198] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 51.177416] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 51.188776] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 51.195760] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 51.212369] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 51.283906] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 51.290127] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 51.297944] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 51.311210] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 51.324269] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 51.331023] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 51.349389] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 51.359515] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 51.370143] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 51.378582] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 51.438264] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 51.460569] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 51.476846] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 51.485516] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 51.504079] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 51.510846] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 51.594825] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 51.605379] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 51.612182] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready 2018/04/29 19:58:58 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00001fefe4)={0xa, 0x4e22}, 0x1c) setsockopt$inet_int(r1, 0x0, 0x1f, &(0x7f0000000000)=0x7, 0x4) listen(r1, 0x7) sendto$inet6(r0, &(0x7f0000eb9fff), 0xfffffd65, 0x20000004, &(0x7f000031e000)={0xa, 0x4e22}, 0x1c) r2 = accept4(r1, &(0x7f00000000c0)=ANY=[], &(0x7f0000000100), 0x0) r3 = dup2(r0, r0) dup2(r3, r2) 2018/04/29 19:58:58 executing program 5: 2018/04/29 19:58:58 executing program 5: 2018/04/29 19:58:58 executing program 5: 2018/04/29 19:58:58 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00001fefe4)={0xa, 0x4e22}, 0x1c) setsockopt$inet_int(r1, 0x0, 0x1f, &(0x7f0000000000)=0x7, 0x4) listen(r1, 0x7) sendto$inet6(r0, &(0x7f0000eb9fff), 0xfffffd65, 0x20000004, &(0x7f000031e000)={0xa, 0x4e22}, 0x1c) r2 = accept4(r1, &(0x7f00000000c0)=ANY=[], &(0x7f0000000100), 0x0) r3 = dup2(r0, r0) dup2(r3, r2) 2018/04/29 19:58:58 executing program 5: 2018/04/29 19:58:58 executing program 5: 2018/04/29 19:58:58 executing program 1: 2018/04/29 19:58:59 executing program 0: 2018/04/29 19:58:59 executing program 4: 2018/04/29 19:58:59 executing program 6: 2018/04/29 19:58:59 executing program 5: r0 = syz_open_dev$sndseq(&(0x7f0000000080)='/dev/snd/seq\x00', 0x0, 0x0) read(r0, &(0x7f0000000000)=""/28, 0x1c) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r0, 0xc0a85320, &(0x7f0000418f50)={{0x80}, "706f727431000000000000000000000000000000000000000000eb000000b2a587e2000000000000020000000000000001008e15e7af00", 0xa9824f69d1376637, 0x10800a}) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r0, 0x4040534e, &(0x7f000019ffe9)={0xc1, @time}) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_TEMPO(r0, 0xc02c5341, &(0x7f00000000c0)) openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000400)='/dev/sequencer2\x00', 0x0, 0x0) 2018/04/29 19:58:59 executing program 2: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f0000000080)={0x2, 0x4e23, @broadcast=0xffffffff}, 0x10) setsockopt$inet_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f00000005c0)={@in={{0x2, 0x0, @loopback=0x7f000001}}, 0x0, 0x3, 0x0, "568ba1532d9fa4a4a0b2ac7fed1ba5df6183c56aab4b149a87b45ecde423213c30734da7de0daefc4f85152077b0196e06e5a1d95840e8dc7eb18f5f2781abadec7c9d4ef97335343396d95c6c3a63db"}, 0xd8) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f00006dc000)=[{0x6, 0x0, 0x0, 0xa1}]}, 0x10) sendto$inet(r0, &(0x7f0000e9bf14), 0x0, 0x200007ff, &(0x7f0000deaff0)={0x2, 0x1000000000004e23}, 0x10) sendmmsg(r0, &(0x7f0000005c40)=[{{&(0x7f0000001940)=@sco={0x1f}, 0x80, &(0x7f0000002f40)=[{&(0x7f0000002f00)="99", 0x1}], 0x1}}], 0x1, 0x0) sendto$inet(r0, &(0x7f00006fd000)="c3401c344654f3c7009aa4eedc3d6bd8ebd65c856a27d61154adc2b2a9763ae0201c0d32e11f38e9dd18c58f6bd779650fc30f93653bdaecf323c9f6502ceab47e58114347b289546465a5eb278de12b1989f64cc99412e36880d20c34d91051b22f6c8acc9d082b7bcdec844f667da0867d08d4000000000000", 0x7a, 0x800000000051, &(0x7f0000e66000)={0x2, 0x0, @loopback=0x7f000001}, 0x10) sendto$inet(r0, &(0x7f0000000000)="b0", 0x1, 0x0, &(0x7f0000000040)={0x2, 0x0, @multicast2=0xe0000002}, 0x10) 2018/04/29 19:58:59 executing program 7: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r0, &(0x7f0000000000), 0x0, 0x200408d6, &(0x7f00000011c0)={0xa, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xbb}, 0x2}, 0x1c) 2018/04/29 19:58:59 executing program 1: 2018/04/29 19:58:59 executing program 3: 2018/04/29 19:58:59 executing program 0: 2018/04/29 19:58:59 executing program 3: 2018/04/29 19:58:59 executing program 4: 2018/04/29 19:58:59 executing program 6: perf_event_open(&(0x7f0000348f88)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_emit_ethernet(0x2a, &(0x7f0000000000)={@random="a5f938ba331f", @random="55f64cf156ee", [], {@arp={0x806, @ether_ipv4={0x1, 0x800, 0x6, 0x4, 0x1, @random="4e6278344d7f", @broadcast=0xffffffff, @dev={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa]}, @broadcast=0xffffffff}}}}, &(0x7f0000000080)) sigaltstack(&(0x7f0000ffd000/0x3000)=nil, &(0x7f00000000c0)) 2018/04/29 19:58:59 executing program 1: open(&(0x7f0000000040)='./file0\x00', 0x80041, 0x0) capset(&(0x7f00000001c0)={0x19980330}, &(0x7f0000000200)) truncate(&(0x7f0000000000)='./file0\x00', 0x0) 2018/04/29 19:58:59 executing program 7: r0 = socket$inet6(0xa, 0x2, 0x0) sendmmsg(r0, &(0x7f0000000040)=[{{&(0x7f0000000580)=@generic={0xa, "c8b5edfbf8b1ab4cac8ed75cd4a0b8d86c66d2602bc1631ca5bcf63e5b62213ecbf070a4972c5693b9d145c9009910fa3b07c861485b5d02088225d2f63c71933c905613e2cd98a708a2cb30abf11fec2f649680f60fc4e12d48f918223a404e4df8cbce010891c68841bd5d3df05eb15b6b0a8da58ccfb7d792cf7e45c2"}, 0x80, &(0x7f00000004c0), 0x0, &(0x7f0000002840)}}], 0x1, 0x0) 2018/04/29 19:58:59 executing program 5: 2018/04/29 19:58:59 executing program 2: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup\x00', 0x200002, 0x0) fchdir(r0) r1 = creat(&(0x7f0000000080)='./file0\x00', 0x0) write$cgroup_pid(r1, &(0x7f0000000100)=ANY=[], 0x1023c) truncate(&(0x7f0000000100)='./file0\x00', 0x0) 2018/04/29 19:58:59 executing program 3: 2018/04/29 19:58:59 executing program 5: 2018/04/29 19:58:59 executing program 4: r0 = perf_event_open(&(0x7f0000940000)={0x2, 0x78, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x2000000802, 0x0) dup3(r1, r0, 0x0) 2018/04/29 19:59:00 executing program 0: mmap(&(0x7f0000000000/0xff5000)=nil, 0xff5000, 0x0, 0x5c831, 0xffffffffffffffff, 0x0) syz_open_dev$usbmon(&(0x7f0000000040)='/dev/usbmon#\x00', 0x0, 0x0) [ 53.943500] capability: warning: `syz-executor1' uses 32-bit capabilities (legacy support in use) 2018/04/29 19:59:00 executing program 3: 2018/04/29 19:59:00 executing program 7: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000f5eff5)='lp\x00', 0x4) 2018/04/29 19:59:00 executing program 5: r0 = socket(0xa, 0x8000000000000802, 0x0) sendto$inet6(r0, &(0x7f0000000040)="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", 0xae9, 0x0, &(0x7f0000001040)={0xa, 0x4e20, 0x0, @dev={0xfe, 0x80}, 0x5}, 0x1c) 2018/04/29 19:59:00 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000100)={'bridge_slave_1\x00'}) sendmsg$nl_route(r0, &(0x7f0000000240)={&(0x7f0000000000)={0x10}, 0xc, &(0x7f0000000200)={&(0x7f0000000280)=ANY=[@ANYBLOB="280000001c00070f000000000000000007000000", @ANYBLOB="ffffff000a000200231fc8c174a15741141aaaaaaaaaaa77000087b6913eaebc791f15e642fd000000000000000000000000"], 0x2}, 0x1}, 0x0) 2018/04/29 19:59:00 executing program 0: r0 = socket$inet6(0xa, 0x1, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f0000f5ffe0)={@loopback={0x0, 0x1}, 0x800, 0x0, 0xff}, 0x20) 2018/04/29 19:59:00 executing program 1: r0 = syz_open_dev$sg(&(0x7f0000005000)='/dev/sg#\x00', 0x0, 0x8002) write(r0, &(0x7f0000000040)="b63db85e1e8d020000feff00003e95eff0c76e3f00c8edd93763c13600d0f0011dcc606aed5ed2bc7018cebc9bc2fe", 0x2f) readv(r0, &(0x7f0000000680)=[{&(0x7f0000e94000)=""/62, 0xffbd}], 0x10000000000001db) 2018/04/29 19:59:00 executing program 4: 2018/04/29 19:59:00 executing program 6: r0 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x82) r1 = memfd_create(&(0x7f0000000100)="74086e750000000000000000008c00", 0x0) pwritev(r1, &(0x7f0000000340)=[{&(0x7f00000001c0)='\'', 0x1}], 0x1, 0x81806) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) ioctl$LOOP_SET_STATUS64(r0, 0x4c04, &(0x7f0000000240)={0x0, 0x0, 0x0, 0xfffffffffffffc00, 0x0, 0x0, 0x0, 0x0, 0x0, "07dd8aa88df543f4e8844a1d2dde93fca76c9439cf05a87d9f0d610bc6036cf5409918395b3e884a674b150031b8a6fe71b0813a5c3417e15539bd31b48884d5", "81d5544ff77ddd1ab96cb15c973cc51708890ab412736ecbd95a95953cd957110522bed52db1e2da0800a8bc29006d61018f79bffc89ee3a2e9a4ae67fe9198c", "fe3f7b07120d64de9d947ed16020a9327433f12036fc4a9c3f50e1eb5fa6f631"}) sendfile(r0, r0, &(0x7f0000000080), 0x102000004) 2018/04/29 19:59:00 executing program 4: 2018/04/29 19:59:00 executing program 3: 2018/04/29 19:59:00 executing program 5: 2018/04/29 19:59:00 executing program 4: r0 = socket$inet6(0xa, 0x2000000802, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f0000f68000)={@loopback={0x0, 0x1}, 0x0, 0x2}, 0x20) 2018/04/29 19:59:00 executing program 7: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0xf1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) waitid(0x0, 0x0, &(0x7f0000000100), 0x1000000000009, &(0x7f0000000200)) 2018/04/29 19:59:00 executing program 0: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket(0x0, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000c3000)="6d6f756e74696e666f00a4") sendfile(r0, r0, &(0x7f0000000040)=0x800000, 0x408) setsockopt$IP_VS_SO_SET_TIMEOUT(0xffffffffffffffff, 0x0, 0x48a, &(0x7f0000000000), 0xffffffffffffff15) mremap(&(0x7f0000006000/0x3000)=nil, 0x3000, 0x2000, 0x0, &(0x7f0000003000/0x2000)=nil) 2018/04/29 19:59:00 executing program 5: 2018/04/29 19:59:00 executing program 3: [ 54.130064] sg_write: data in/out 167162/1 bytes for SCSI command 0xed-- guessing data in; [ 54.130064] program syz-executor1 not setting count and/or reply_len properly 2018/04/29 19:59:00 executing program 2: 2018/04/29 19:59:00 executing program 3: 2018/04/29 19:59:00 executing program 5: 2018/04/29 19:59:00 executing program 2: 2018/04/29 19:59:00 executing program 4: [ 54.230175] sg_write: data in/out 167162/1 bytes for SCSI command 0xed-- guessing data in; [ 54.230175] program syz-executor1 not setting count and/or reply_len properly [ 54.261154] loop: Write error at byte offset 18446744073709550592, length 2048. 2018/04/29 19:59:00 executing program 7: r0 = syz_open_dev$tun(&(0x7f0000000280)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000040)={"d202b999cf85010400000088f301e710", 0x102}) 2018/04/29 19:59:00 executing program 3: 2018/04/29 19:59:00 executing program 2: 2018/04/29 19:59:00 executing program 5: 2018/04/29 19:59:00 executing program 4: 2018/04/29 19:59:00 executing program 6: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000180)='oom_adj\x00') write$cgroup_int(r0, &(0x7f0000000000)={[0x31]}, 0x1) 2018/04/29 19:59:00 executing program 1: r0 = perf_event_open(&(0x7f0000271000)={0x2, 0x70, 0x4a, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f000001b000)={0xffffffffffffffff}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) sendmmsg$unix(r1, &(0x7f0000005700)=[{&(0x7f0000000080)=@file={0x1, './file0\x00'}, 0x6e, &(0x7f00000011c0), 0x0, &(0x7f0000001200)=[@rights={0x14, 0x1, 0x1, [r0, r2]}], 0x14}], 0x1, 0x0) 2018/04/29 19:59:00 executing program 0: r0 = socket(0x11, 0x100000802, 0x0) r1 = syz_open_dev$tun(&(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x2) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000040)={"6966623000faffffffffffffff00", 0x4001}) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000000)={'ifb0\x00', 0xa201}) write$tun(r1, &(0x7f0000000300)=ANY=[@ANYBLOB="000086dd0100000000000000000060b9f8560000000000000000000000000000ffff7f008001000000000008907800000000000000000000000000000000"], 0x1) [ 54.261188] blk_update_request: I/O error, dev loop0, sector 0 [ 54.261210] Buffer I/O error on dev loop0, logical block 0, lost async page write [ 54.288468] VFS: Dirty inode writeback failed for block device loop0 (err=-5). 2018/04/29 19:59:00 executing program 3: mkdir(&(0x7f0000e50ff8)='./file0\x00', 0x0) mount(&(0x7f00007a3ff8)='./file0\x00', &(0x7f00004f5ff8)='./file0\x00', &(0x7f00000e1000)='ramfs\x00', 0x8409, &(0x7f0000c81ffe)) unshare(0x20000) r0 = syz_open_procfs(0x0, &(0x7f0000044000)='ns/mnt\x00') setns(r0, 0x0) clone(0x10000030020100, &(0x7f0000000500), &(0x7f0000000080), &(0x7f00000001c0), &(0x7f0000000340)) 2018/04/29 19:59:00 executing program 4: r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f00000001c0)={0xa, 0x0, 0x0, @mcast2={0xff, 0x2, [], 0x1}, 0x3}, 0x1c) 2018/04/29 19:59:00 executing program 2: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000040)='/dev/uinput\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0xfda000)=nil, 0xfda000, 0x0, 0x31, 0xffffffffffffffff, 0x0) setsockopt$inet_sctp_SCTP_NODELAY(r0, 0x84, 0x3, &(0x7f0000000180)=0x9, 0x4) r1 = syz_genetlink_get_family_id$team(&(0x7f0000000080)='team\x00') r2 = accept4$packet(r0, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @broadcast}, &(0x7f0000000200)=0x14, 0x800) recvmmsg(r0, &(0x7f00000040c0)=[{{0x0, 0x0, &(0x7f0000000340)=[{&(0x7f0000000300)=""/20, 0x14}], 0x1, &(0x7f0000000380)=""/79, 0x4f, 0x6ae}, 0x6}, {{&(0x7f0000000400)=@in={0x0, 0x0, @loopback}, 0x80, &(0x7f0000000600)=[{&(0x7f0000000480)=""/210, 0xd2}, {&(0x7f0000000580)=""/76, 0x4c}], 0x2, &(0x7f0000000640)=""/231, 0xe7, 0xc0}, 0x7fff}, {{&(0x7f0000000740)=@generic, 0x80, &(0x7f0000001900)=[{&(0x7f00000007c0)=""/116, 0x74}, {&(0x7f0000000840)=""/4096, 0x1000}, {&(0x7f0000001840)=""/147, 0x93}], 0x3, &(0x7f0000001940)=""/140, 0x8c, 0x4}, 0x3}, {{&(0x7f0000001a00)=@vsock={0x0, 0x0, 0x0, @host}, 0x80, &(0x7f0000003d40)=[{&(0x7f0000001a80)=""/41, 0x29}, {&(0x7f0000001ac0)=""/4096, 0x1000}, {&(0x7f0000002ac0)=""/196, 0xc4}, {&(0x7f0000002bc0)=""/223, 0xdf}, {&(0x7f0000002cc0)=""/100, 0x64}, {&(0x7f0000002d40)=""/4096, 0x1000}], 0x6, 0x0, 0x0, 0x3}, 0x2}, {{0x0, 0x0, &(0x7f0000003dc0), 0x0, 0x0, 0x0, 0x9}, 0x200000000000000}, {{&(0x7f0000003e00)=@hci={0x0, 0x0}, 0x80, &(0x7f0000004080)=[{&(0x7f0000003e80)=""/194, 0xc2}, {&(0x7f0000003f80)=""/235, 0xeb}], 0x2, 0x0, 0x0, 0x5}, 0x72640ede}], 0x6, 0x1, &(0x7f0000004240)={0x0, 0x1c9c380}) getpeername$packet(r0, &(0x7f0000004280)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @link_local}, &(0x7f00000042c0)=0x14) accept4$packet(r2, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @link_local}, &(0x7f0000000100)=0x14, 0x0) sendmsg$TEAM_CMD_NOOP(r0, &(0x7f0000004400)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x100}, 0xc, &(0x7f00000043c0)={&(0x7f0000004300)={0x9c, r1, 0x100, 0x70bd25, 0x25dfdbfb, {}, [{{0x8, 0x1, r3}, {0x80, 0x2, [{0x40, 0x1, @lb_tx_hash_to_port_mapping={{{0x24, 0x1, 'lb_tx_hash_to_port_mapping\x00'}, {0x8, 0x3, 0x3}, {0x8, 0x4, r4}}, {0x8, 0x7}}}, {0x3c, 0x1, @enabled={{{0x24, 0x1, 'enabled\x00'}, {0x8, 0x3, 0x6}, {0x4, 0x4}}, {0x8, 0x6, r5}}}]}}]}, 0x9c}, 0x1, 0x0, 0x0, 0x4000}, 0x404c844) ioctl$TCGETA(r0, 0x4008556c, &(0x7f0000000140)) 2018/04/29 19:59:00 executing program 5: r0 = socket(0x20000000000000a, 0x1, 0x0) connect$inet6(r0, &(0x7f000004bfe4)={0xa, 0x4e20, 0x0, @dev={0xfe, 0x80}, 0x6}, 0x1c) getsockopt$sock_buf(r0, 0x1, 0x40001f, &(0x7f0000000140)=""/16, &(0x7f0000000000)=0xffffffffffffffcf) getsockopt$IP_VS_SO_GET_INFO(r0, 0x0, 0x481, &(0x7f0000000040), &(0x7f0000000080)=0xc) socketpair$inet6_icmp(0xa, 0x2, 0x3a, &(0x7f00000000c0)) socket(0x4, 0x1, 0x1) 2018/04/29 19:59:00 executing program 4: r0 = socket$nl_xfrm(0x11, 0x3, 0x6) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f00000000c0)={0x0, 0x0}, &(0x7f0000000180)=0x7) pipe2(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x90000) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000080), &(0x7f0000000100)=0xc) setsockopt$inet6_dccp_buf(r2, 0x21, 0xc, &(0x7f0000000040)="1b0a9c16c812502e3b14", 0xa) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r3, 0x6, 0x16, &(0x7f0000000000)=[{0x2, 0x9}, {0x7, 0x9}], 0x2) setreuid(0x0, r1) ioctl$sock_ipx_SIOCIPXNCPCONN(r2, 0x89e3, &(0x7f0000000140)=0x8) ioctl$TIOCLINUX4(r3, 0x541c, &(0x7f0000000200)=0x4) pipe(&(0x7f0000000380)={0xffffffffffffffff}) ioctl$void(r4, 0xc0045878) [ 54.373107] syz-executor6 (6988): /proc/6985/oom_adj is deprecated, please use /proc/6985/oom_score_adj instead. 2018/04/29 19:59:00 executing program 7: r0 = socket$inet6(0xa, 0x80003, 0xff) setsockopt$inet6_int(r0, 0x29, 0x16, &(0x7f000034c000), 0x4) r1 = socket$inet6(0xa, 0x80003, 0xff) r2 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vga_arbiter\x00', 0x200, 0x0) getsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(0xffffffffffffff9c, 0x84, 0x9, &(0x7f0000000040)={0x0, @in={{0x2, 0x0, @remote={0xac, 0x14, 0x14, 0xbb}}}, 0x800, 0x1ff, 0x1, 0x1, 0x4381f6f9cdbbfbb8}, &(0x7f0000000100)=0x98) getsockopt$inet_sctp_SCTP_DEFAULT_PRINFO(r2, 0x84, 0x72, &(0x7f0000000140)={r3, 0x8001, 0x30}, &(0x7f00000001c0)=0xc) setsockopt$inet6_int(r1, 0x29, 0x16, &(0x7f0000fcb000), 0x4) setsockopt$inet6_int(r1, 0x29, 0x16, &(0x7f0000000180), 0x4) 2018/04/29 19:59:00 executing program 1: r0 = socket$inet(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x8, &(0x7f000087a000)=0x2, 0x4) socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$inet_tcp_int(r0, 0x6, 0x8, &(0x7f0000dc6ffe), &(0x7f0000904000)=0x4) 2018/04/29 19:59:00 executing program 6: perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg$netlink(0xffffffffffffffff, &(0x7f0000000a80)={0x0, 0x0, &(0x7f0000000a00), 0x0, &(0x7f0000000700)=ANY=[]}, 0x0) r0 = open(&(0x7f0000ae8ff8)='./file0\x00', 0x14104a, 0x0) write$evdev(r0, &(0x7f0000000080), 0x0) sendfile(r0, r0, &(0x7f0000000040), 0x7fc) 2018/04/29 19:59:00 executing program 3: sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f0000000100)={&(0x7f00000000c0)={0x10}, 0xc, &(0x7f00008b7ff0)={&(0x7f0000000000)={0x18, 0x3, 0x1000001, 0x800000001, 0x70bd2a, 0x0, {}, [@nested={0x4, 0x1}]}, 0x18}, 0x1}, 0x0) 2018/04/29 19:59:00 executing program 4: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000001000)={0x0, {{0xa}}, {{0xa, 0x0, 0x0, @dev={0xfe, 0x80}}}}, 0x108) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='net/unix\x00') getsockname$llc(r0, &(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @link_local}, &(0x7f0000000340)=0x10) preadv(r0, &(0x7f0000000100), 0x58, 0x10400003) getsockopt$IP_VS_SO_GET_SERVICE(r0, 0x0, 0x483, &(0x7f0000000100), &(0x7f0000000180)=0x68) ioctl$DRM_IOCTL_AGP_ALLOC(r0, 0xc0206434, &(0x7f00000001c0)={0xfffffffffffffffc, 0x0, 0x10001, 0x1f}) setsockopt$inet_sctp6_SCTP_SOCKOPT_BINDX_REM(r0, 0x84, 0x65, &(0x7f0000000240)=[@in={0x2, 0x4e21, @loopback=0x7f000001}, @in={0x2, 0x4e23, @remote={0xac, 0x14, 0x14, 0xbb}}, @in6={0xa, 0x4e23, 0xfffffffffffffff7, @local={0xfe, 0x80, [], 0xaa}, 0xffffffffffff7306}, @in6={0xa, 0x4e21, 0x7, @remote={0xfe, 0x80, [], 0xbb}}, @in6={0xa, 0x4e23, 0x1f, @dev={0xfe, 0x80, [], 0xd}, 0x6693cf7d}, @in6={0xa, 0x4e21, 0x3, @mcast2={0xff, 0x2, [], 0x1}, 0x4}], 0x90) ioctl$DRM_IOCTL_AGP_FREE(r0, 0x40206435, &(0x7f0000000200)={0x7, r1, 0x10000, 0x9928}) openat$selinux_user(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/user\x00', 0x2, 0x0) 2018/04/29 19:59:00 executing program 7: syz_mount_image$msdos(&(0x7f0000000180)='msdos\x00', &(0x7f0000000100)='./file0\x00', 0x4000001, 0x1, &(0x7f00000001c0)=[{&(0x7f0000010000)="eb3c906d6b66732e66617400020401000200027400f8", 0x16}], 0x0, &(0x7f0000000540)=ANY=[]) r0 = open(&(0x7f0000000300)='./file0/fil.0\x00', 0x800000000002040, 0x0) r1 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = getpgrp(0xffffffffffffffff) getsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x22, &(0x7f00000006c0)={{{@in=@loopback, @in=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@rand_addr}, 0x0, @in6=@remote}}, &(0x7f0000000140)=0xe8) lstat(&(0x7f00000007c0)='./file0/fil.0\x00', &(0x7f0000000800)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) sendmsg$unix(r1, &(0x7f00000008c0)={&(0x7f0000000a00)=@abs={0x0, 0x0, 0x4e22}, 0x6e, &(0x7f0000000640)=[{&(0x7f0000000340)="2fa5d7fb22c528189de7d72f25cfd368f5446469ce2e014ab11d43370448605987f3789b72303c970861acfa96b5cbc9370b460a61032180d304c76e3c42a2c0616ef494594a9e7360d1c23afc217a6ece6270d8dfbfae16a4584f68f836b68f07922a505f7607f01d431442f39c284f3b91a89504175458359f736c8ce09317d44c5e9582a1145293f0635b85c5e7cc046cdcccd83241ffe3b1", 0xffffffffffffffe2}, {&(0x7f0000000280)="669867e0e1d7f385296beca82625d30115839815fc946230910d6f4109061e578fc184203515f62fef3810f1de5ae3b82de7509852a3ab85fdbedbd1bba3bc0ea746456742df159027cc419fc5c3f906d003dffa0a14d79b5c1b1c3c1bb7f653494270e61e442b6aa8244c6f0a5cd07d451c3208cd68bf05acb0d2b6a264f32e", 0xfffffffffffffedf}, {&(0x7f00000000c0)="4acb2a65d69b359da526677bb6536788999ecdcc0ae86ec44566ad05d1c32b3c491a71b33e6985b199cc303949e4b8338b884e3e4a2be97189e39e66", 0x3c}, {&(0x7f0000000400)="6a058d07b5aa39637544448dbcdd3f8ed5856a722192f2f00af9ea51c34b87b167dccfa5276d924ae7b4c3db3ff845e3be018374d620293e89803cf4041236386f87d24f0fdec469db5c82c286b22258e106b4eb91e71f08dd69e2169739d6c0081eaef569a2bb44cc563f9369a67f2157a699ff8db106f5", 0x78}, {&(0x7f0000000a80)="0c48905c5d298a76293f8a5bd50e1350a779eae8aa75205898fb28e96a6b524a72e0c47e339d7f0a1dfda6f97c1fb32f93e490d27724d404a4ba1f387aeed7d124d71d022aa793be8dc7e27a7c50e571bec86857677f00a0ba324de375a3bb43a5144a617f0e3a29c35ca2415446bdbecc5c9c17b1383eb5563f9d056ef4d7718fe2530975ed015fcdbb2d253a6df0128927ca7696dd473d6d834c1a140792778ff6abff1543d735def1659a2d65204690f3b26f461d6733a507b06e78f44e093597e00766822660c2e5e2cab4838927f39cc5c64d335aeaf6a0b17fb7a4288973261ad51b1a", 0xe6}, {&(0x7f0000000580)="96bb7ebb377f7ee55aff59ab7bca5d306de9871138c05b21af7533dd130c02eabe6e4beb468897e4389f39f4b7e3ee71422eab6727ae4054508a2b3c69100d88387ad21c6f93d73ef39905987f4921171f1a9209290d2d23709deaaf2a06e65825d9d016676a26e7c2033101ba588ee356df6b8dff790fc142796c24650fc64608fc1162739c70fde26bd743674f121923cd7079ddb062d9", 0x98}], 0x6, &(0x7f0000000880)=[@cred={0x20, 0x1, 0x2, r2, r3, r4}], 0x20, 0x800}, 0x80) mkdirat(r1, &(0x7f0000033ff8)='./file0\x00', 0x0) 2018/04/29 19:59:00 executing program 1: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f0000000100)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000010000)="eb3c906d6b66732e6661740002040100020002708cf8", 0x16}], 0x0, &(0x7f0000000240)=ANY=[]) getpgrp(0x0) syz_mount_image$msdos(&(0x7f0000000000)='msdos\x00', &(0x7f0000000100)='./file0\x00', 0xe7ff, 0x0, &(0x7f0000000200), 0x0, &(0x7f0000000900)=ANY=[]) r1 = openat$rfkill(0xffffffffffffff9c, &(0x7f0000000140)='/dev/rfkill\x00', 0x80, 0x0) ioctl$TIOCSBRK(r1, 0x5427) mkdir(&(0x7f0000000080)='./file0/file0\x00', 0x0) sendfile(r0, r1, &(0x7f0000000180)=0x56, 0x2) syz_genetlink_get_family_id$ipvs(&(0x7f0000000380)='IPVS\x00') connect$inet(0xffffffffffffffff, &(0x7f0000987000)={0x2}, 0x10) syz_fuseblk_mount(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000400)='./file0/file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) 2018/04/29 19:59:00 executing program 2: r0 = socket$inet(0x2, 0x1, 0x0) mmap(&(0x7f000092d000/0x400000)=nil, 0x400000, 0xfffffffffffffffc, 0x8972, 0xffffffffffffffff, 0x0) bind$inet(r0, &(0x7f0000134000)={0x2, 0x4e23, @broadcast=0xffffffff}, 0x10) connect$inet(r0, &(0x7f00000e5000)={0x2, 0x4e23, @loopback=0x7f000001}, 0x10) connect$inet(r0, &(0x7f00009322c4)={0x2, 0x0, @local={0xac, 0x14, 0xffffffffffffffff, 0xaa}}, 0x10) accept$packet(0xffffffffffffff9c, &(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @local}, &(0x7f0000000340)=0x14) getresuid(&(0x7f0000000380)=0x0, &(0x7f00000003c0), &(0x7f0000000400)) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f0000000440)={{{@in=@multicast1=0xe0000001, @in=@loopback=0x7f000001, 0x4e20, 0x3, 0x4e24, 0x0, 0x2, 0x20, 0x80, 0x0, r1, r2}, {0x9, 0xe4, 0x80000001, 0xfffffffffffffffc, 0x0, 0xcea4, 0x0, 0x9}, {0xfffffffffffffffb, 0x3, 0x40, 0xa4a}, 0x9, 0x6e6bb4, 0x2, 0x1, 0x2, 0x3}, {{@in6=@remote={0xfe, 0x80, [], 0xbb}, 0x4d3, 0xff}, 0x2, @in6=@loopback={0x0, 0x1}, 0x3501, 0x3, 0x3, 0x1, 0x3, 0x7, 0xc636}}, 0xe8) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000140)='vegas\x00', 0x6) r3 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ppp\x00', 0x141000, 0x0) ioctl$SG_SET_FORCE_PACK_ID(r3, 0x227b, &(0x7f00000000c0)=0x1) connect$inet(r0, &(0x7f00000dcff0)={0x2, 0x4e23, @loopback=0x7f000001}, 0x10) shutdown(r0, 0x1) 2018/04/29 19:59:00 executing program 6: r0 = socket(0xa, 0x2, 0x0) r1 = open(&(0x7f00004b8ff8)='./file0\x00', 0x28042, 0x0) connect$inet6(r0, &(0x7f0000d3cfe4)={0xa, 0x0, 0x0, @local={0xfe, 0x80, [], 0xaa}, 0x3}, 0x1c) fallocate(r1, 0x0, 0xffff, 0x1f) connect$inet(r0, &(0x7f0000000040)={0x2, 0x4e22, @remote={0xac, 0x14, 0x14, 0xbb}}, 0x10) perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = open(&(0x7f00000001c0)='./file0\x00', 0x3ffff, 0x100) write$evdev(r2, &(0x7f0000037fe8)=[{}], 0x18) perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x72, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000100)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getsockopt$IPT_SO_GET_REVISION_TARGET(r1, 0x0, 0x43, &(0x7f0000000240)={'ipvs\x00'}, &(0x7f0000000280)=0x1e) sendfile(r2, r2, &(0x7f0000000040), 0x7fc) getsockopt$bt_BT_RCVMTU(r2, 0x112, 0xd, &(0x7f0000000080)=0x8, &(0x7f0000000140)=0x2) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x509}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_inet_SIOCSIFNETMASK(r1, 0x891c, &(0x7f00000002c0)={'teql0\x00', {0x2, 0x4e20, @remote={0xac, 0x14, 0x14, 0xbb}}}) socket$packet(0x11, 0x3, 0x300) socket$packet(0x11, 0x3, 0x300) ioctl$EVIOCSABS2F(r1, 0x401845ef, &(0x7f0000000200)={0x66c7bbd4, 0x9, 0x3f, 0x0, 0xfffffffffffff800, 0x6}) getsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(0xffffffffffffffff, 0x84, 0x18, &(0x7f0000000140), &(0x7f0000000180)=0x8) sendfile(r0, r1, &(0x7f00005faff8), 0xfffb) [ 54.524379] hrtimer: interrupt took 42037 ns 2018/04/29 19:59:00 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000100)={'veth0_to_bridge\x00', &(0x7f0000000000)=ANY=[@ANYBLOB="4500000000000000000000000000000000000000000000005c2d89622a8b3a09467b47ac405ed77ead8707ae9888d7403e5c236399fe7fb8906b43c9d4e6fca73459042e4baf90b6acd8783984c2477693cd5527c7e9944a"]}) r1 = dup(r0) ioctl$TUNGETSNDBUF(r1, 0x800454d3, &(0x7f0000000080)) [ 54.602801] FAT-fs (loop1): error, invalid access to FAT (entry 0x00006500) [ 54.633381] FAT-fs (loop1): Filesystem has been set read-only [ 54.682432] FAT-fs (loop1): error, invalid access to FAT (entry 0x00006500) [ 54.722060] FAT-fs (loop1): error, invalid access to FAT (entry 0x00006500) [ 54.734446] FAT-fs (loop1): error, invalid access to FAT (entry 0x00006500) [ 54.800084] syz-executor6 (7048) used greatest stack depth: 22704 bytes left 2018/04/29 19:59:01 executing program 0: r0 = socket(0x11, 0x100000802, 0x0) r1 = syz_open_dev$tun(&(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x2) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000040)={"6966623000faffffffffffffff00", 0x4001}) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000000)={'ifb0\x00', 0xa201}) write$tun(r1, &(0x7f0000000300)=ANY=[@ANYBLOB="000086dd0100000000000000000060b9f8560000000000000000000000000000ffff7f008001000000000008907800000000000000000000000000000000"], 0x1) 2018/04/29 19:59:01 executing program 7: r0 = syz_open_dev$sndseq(&(0x7f00000000c0)='/dev/snd/seq\x00', 0x0, 0x100000200008a002) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r0, 0xc08c5332, &(0x7f0000000180)={0x0, 0x0, 0x0, "e06594d232d12448b0c30905cebdbd09c0a763e204c2a32152615df55d05092d3c12ddd25bad4d127eb802407bc091842621790b637ae5ed23d8b2adf92fc9dd"}) writev(r0, &(0x7f0000000280)=[{&(0x7f0000000000)="0200000018003109004a0001000c0007251d93cc800a091d000a14ff", 0x1c}], 0x1) 2018/04/29 19:59:01 executing program 1: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f0000000100)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000010000)="eb3c906d6b66732e6661740002040100020002708cf8", 0x16}], 0x0, &(0x7f0000000240)=ANY=[]) getpgrp(0x0) syz_mount_image$msdos(&(0x7f0000000000)='msdos\x00', &(0x7f0000000100)='./file0\x00', 0xe7ff, 0x0, &(0x7f0000000200), 0x0, &(0x7f0000000900)=ANY=[]) r1 = openat$rfkill(0xffffffffffffff9c, &(0x7f0000000140)='/dev/rfkill\x00', 0x80, 0x0) ioctl$TIOCSBRK(r1, 0x5427) mkdir(&(0x7f0000000080)='./file0/file0\x00', 0x0) sendfile(r0, r1, &(0x7f0000000180)=0x56, 0x2) syz_genetlink_get_family_id$ipvs(&(0x7f0000000380)='IPVS\x00') connect$inet(0xffffffffffffffff, &(0x7f0000987000)={0x2}, 0x10) syz_fuseblk_mount(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000400)='./file0/file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) 2018/04/29 19:59:01 executing program 3: unshare(0x200) r0 = mq_open(&(0x7f000004b000)='/$cgrouplo\x00', 0x8c2, 0x0, &(0x7f000004b000)={0xffffffffffffffff, 0x1, 0x3}) mq_timedsend(r0, &(0x7f0000000140)="7f5516cb", 0x4, 0x0, 0x0) 2018/04/29 19:59:01 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) listen(r0, 0x0) listen(r1, 0x0) listen(r0, 0x3) r2 = syz_open_procfs(0x0, &(0x7f00000002c0)='net/tcp6\x00') getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000040), &(0x7f0000000080)=0xc) preadv(r2, &(0x7f0000000300)=[{&(0x7f00000003c0)=""/195, 0xc3}], 0x1, 0x8000000000000) remap_file_pages(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x0, 0x7ff, 0x80000) listen(r0, 0x0) ioctl$TUNGETFEATURES(r2, 0x800454cf, &(0x7f00000000c0)) write$eventfd(r2, &(0x7f0000000000)=0x7, 0x8) 2018/04/29 19:59:01 executing program 2: r0 = socket$inet(0x2, 0x1, 0x0) mmap(&(0x7f000092d000/0x400000)=nil, 0x400000, 0xfffffffffffffffc, 0x8972, 0xffffffffffffffff, 0x0) bind$inet(r0, &(0x7f0000134000)={0x2, 0x4e23, @broadcast=0xffffffff}, 0x10) connect$inet(r0, &(0x7f00000e5000)={0x2, 0x4e23, @loopback=0x7f000001}, 0x10) connect$inet(r0, &(0x7f00009322c4)={0x2, 0x0, @local={0xac, 0x14, 0xffffffffffffffff, 0xaa}}, 0x10) accept$packet(0xffffffffffffff9c, &(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @local}, &(0x7f0000000340)=0x14) getresuid(&(0x7f0000000380)=0x0, &(0x7f00000003c0), &(0x7f0000000400)) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f0000000440)={{{@in=@multicast1=0xe0000001, @in=@loopback=0x7f000001, 0x4e20, 0x3, 0x4e24, 0x0, 0x2, 0x20, 0x80, 0x0, r1, r2}, {0x9, 0xe4, 0x80000001, 0xfffffffffffffffc, 0x0, 0xcea4, 0x0, 0x9}, {0xfffffffffffffffb, 0x3, 0x40, 0xa4a}, 0x9, 0x6e6bb4, 0x2, 0x1, 0x2, 0x3}, {{@in6=@remote={0xfe, 0x80, [], 0xbb}, 0x4d3, 0xff}, 0x2, @in6=@loopback={0x0, 0x1}, 0x3501, 0x3, 0x3, 0x1, 0x3, 0x7, 0xc636}}, 0xe8) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000140)='vegas\x00', 0x6) r3 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ppp\x00', 0x141000, 0x0) ioctl$SG_SET_FORCE_PACK_ID(r3, 0x227b, &(0x7f00000000c0)=0x1) connect$inet(r0, &(0x7f00000dcff0)={0x2, 0x4e23, @loopback=0x7f000001}, 0x10) shutdown(r0, 0x1) 2018/04/29 19:59:01 executing program 6: r0 = socket(0xa, 0x2, 0x0) r1 = open(&(0x7f00004b8ff8)='./file0\x00', 0x28042, 0x0) connect$inet6(r0, &(0x7f0000d3cfe4)={0xa, 0x0, 0x0, @local={0xfe, 0x80, [], 0xaa}, 0x3}, 0x1c) fallocate(r1, 0x0, 0xffff, 0x1f) connect$inet(r0, &(0x7f0000000040)={0x2, 0x4e22, @remote={0xac, 0x14, 0x14, 0xbb}}, 0x10) perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = open(&(0x7f00000001c0)='./file0\x00', 0x3ffff, 0x100) write$evdev(r2, &(0x7f0000037fe8)=[{}], 0x18) perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x72, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000100)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getsockopt$IPT_SO_GET_REVISION_TARGET(r1, 0x0, 0x43, &(0x7f0000000240)={'ipvs\x00'}, &(0x7f0000000280)=0x1e) sendfile(r2, r2, &(0x7f0000000040), 0x7fc) getsockopt$bt_BT_RCVMTU(r2, 0x112, 0xd, &(0x7f0000000080)=0x8, &(0x7f0000000140)=0x2) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x509}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_inet_SIOCSIFNETMASK(r1, 0x891c, &(0x7f00000002c0)={'teql0\x00', {0x2, 0x4e20, @remote={0xac, 0x14, 0x14, 0xbb}}}) socket$packet(0x11, 0x3, 0x300) socket$packet(0x11, 0x3, 0x300) ioctl$EVIOCSABS2F(r1, 0x401845ef, &(0x7f0000000200)={0x66c7bbd4, 0x9, 0x3f, 0x0, 0xfffffffffffff800, 0x6}) getsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(0xffffffffffffffff, 0x84, 0x18, &(0x7f0000000140), &(0x7f0000000180)=0x8) sendfile(r0, r1, &(0x7f00005faff8), 0xfffb) 2018/04/29 19:59:01 executing program 5: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f0000000100)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000010000)="eb3c906d6b66732e6661740002040100020002708cf8", 0x16}], 0x0, &(0x7f0000000240)=ANY=[]) getpgrp(0x0) syz_mount_image$msdos(&(0x7f0000000000)='msdos\x00', &(0x7f0000000100)='./file0\x00', 0xe7ff, 0x0, &(0x7f0000000200), 0x0, &(0x7f0000000900)=ANY=[]) r1 = openat$rfkill(0xffffffffffffff9c, &(0x7f0000000140)='/dev/rfkill\x00', 0x80, 0x0) ioctl$TIOCSBRK(r1, 0x5427) mkdir(&(0x7f0000000080)='./file0/file0\x00', 0x0) sendfile(r0, r1, &(0x7f0000000180)=0x56, 0x2) syz_genetlink_get_family_id$ipvs(&(0x7f0000000380)='IPVS\x00') connect$inet(0xffffffffffffffff, &(0x7f0000987000)={0x2}, 0x10) syz_fuseblk_mount(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000400)='./file0/file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) 2018/04/29 19:59:01 executing program 3: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket(0x2, 0x2, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='net/udp\x00') connect$inet(r0, &(0x7f00000001c0)={0x2, 0x0, @local={0xac, 0x14, 0x14, 0xaa}}, 0x10) r2 = fcntl$dupfd(r0, 0xfffffffffffffffe, r1) connect(r2, &(0x7f0000003ff6)=@un=@file={0x0, './file0\x00'}, 0x80) sendmmsg$unix(0xffffffffffffffff, &(0x7f0000001780), 0x4924924924925a8, 0x0) 2018/04/29 19:59:01 executing program 7: r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x400, 0x0) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_TIMER(r0, 0x40605346, &(0x7f0000000040)={0x6, 0x1, {0x3, 0x0, 0x9, 0x1, 0x5}}) clock_getres(0x2000000000006, &(0x7f0000000140)) [ 55.391764] mmap: syz-executor4 (7088) uses deprecated remap_file_pages() syscall. See Documentation/vm/remap_file_pages.txt. 2018/04/29 19:59:01 executing program 7: times(&(0x7f00000000c0)) r0 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000200)='/selinux/commit_pending_bools\x00', 0x1, 0x0) getsockopt$ax25_buf(r0, 0x101, 0x19, &(0x7f0000000240)=""/155, &(0x7f0000000300)=0x9b) r1 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000100)='/dev/rtc0\x00', 0x40, 0x0) getsockopt$inet_sctp_SCTP_EVENTS(r1, 0x84, 0xb, &(0x7f0000000140), &(0x7f0000000180)=0xb) r2 = socket$inet6(0xa, 0x3, 0x3) getsockopt$IP_VS_SO_GET_TIMEOUT(r2, 0x0, 0x486, &(0x7f0000000040), &(0x7f0000000080)=0xc) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r2, 0x6, 0x16, &(0x7f0000000000)=[{0x0, 0x1c0000000000}, {0x3, 0x9201}, {0x7, 0x5}], 0x3) connect$inet6(r2, &(0x7f0000419000)={0xa, 0x0, 0x0, @loopback={0x0, 0x1}}, 0x1c) ioctl$BLKIOOPT(r1, 0x1279, &(0x7f00000001c0)) sendto$inet6(r2, &(0x7f00004f3000), 0x0, 0x0, &(0x7f0000cac000)={0xa, 0x0, 0x0, @loopback={0x0, 0x1}}, 0x1a) 2018/04/29 19:59:01 executing program 7: perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x72, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000100)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40042409, 0x0) ioctl$DRM_IOCTL_AGP_ALLOC(0xffffffffffffffff, 0xc0206434, &(0x7f0000000040)={0x0, 0x0, 0x2, 0x200000201804}) r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rtc\x00', 0x0, 0x0) bind$bt_l2cap(r0, &(0x7f0000000080)={0x1f, 0x40, {0x7, 0x7, 0xfffffffffffffff8, 0x9, 0x0, 0x10000}, 0xce, 0x71}, 0xe) ioctl$sock_inet_tcp_SIOCATMARK(r0, 0x4028700f, &(0x7f0000000040)) 2018/04/29 19:59:01 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) listen(r0, 0x0) listen(r1, 0x0) listen(r0, 0x3) r2 = syz_open_procfs(0x0, &(0x7f00000002c0)='net/tcp6\x00') getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000040), &(0x7f0000000080)=0xc) preadv(r2, &(0x7f0000000300)=[{&(0x7f00000003c0)=""/195, 0xc3}], 0x1, 0x8000000000000) remap_file_pages(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x0, 0x7ff, 0x80000) listen(r0, 0x0) ioctl$TUNGETFEATURES(r2, 0x800454cf, &(0x7f00000000c0)) write$eventfd(r2, &(0x7f0000000000)=0x7, 0x8) [ 55.431290] FAT-fs (loop5): error, invalid access to FAT (entry 0x00006500) [ 55.431295] FAT-fs (loop5): Filesystem has been set read-only [ 55.470084] FAT-fs (loop5): error, invalid access to FAT (entry 0x00006500) 2018/04/29 19:59:01 executing program 3: perf_event_open(&(0x7f000001d000)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_bp={&(0x7f0000000000), 0x1}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x0, &(0x7f0000000080)="46520699fc3bc577b5a9a16fbd24f267ea4f5b5703e185f76ce42850ac0fe178d9506f59a7b46d93a4693c7201edae870b728641b6e2b6ab95be7bb829396f755594aceba4dbb9137e00000000000000000000", &(0x7f0000000180), &(0x7f0000000040), &(0x7f0000000200)) [ 55.706183] FAT-fs (loop1): error, invalid access to FAT (entry 0x00006500) [ 55.713387] FAT-fs (loop1): Filesystem has been set read-only [ 55.726850] FAT-fs (loop1): error, invalid access to FAT (entry 0x00006500) 2018/04/29 19:59:02 executing program 3: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = add_key(&(0x7f0000000140)='.dead\x00', &(0x7f0000000180)={0x73, 0x79, 0x7a, 0x2}, 0x0, 0x0, 0xfffffffffffffffd) add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f00000000c0)={0x73, 0x79, 0x7a, 0x2}, 0x0, 0x0, r0) r1 = openat$keychord(0xffffffffffffff9c, &(0x7f0000000040)='/dev/keychord\x00', 0x2002, 0x0) write$eventfd(r1, &(0x7f0000000100)=0x2100000001, 0x48) 2018/04/29 19:59:02 executing program 7: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000a2c000)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f00003b9fdc)) ioctl$TCXONC(r0, 0x540a, 0x2) r1 = dup(r0) ioctl$TIOCPKT(r1, 0x5420, &(0x7f000081cffc)=0x2) r2 = syz_open_pts(r1, 0x0) ioctl$TCXONC(r2, 0x540a, 0x2) 2018/04/29 19:59:02 executing program 4: perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x71, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000100)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = timerfd_create(0x9, 0x0) timerfd_settime(r0, 0x0, &(0x7f0000000200)={{0x0, 0x989680}}, &(0x7f0000000280)) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x0, 0x0) getsockopt$inet_sctp6_SCTP_ASSOCINFO(0xffffffffffffff9c, 0x84, 0x1, &(0x7f0000000080)={0x0, 0x1, 0x1, 0x10001, 0x5, 0x1ff}, &(0x7f00000000c0)=0x14) getsockopt$inet_sctp_SCTP_RECONFIG_SUPPORTED(r1, 0x84, 0x75, &(0x7f0000000240)={r2, 0xfffffffffffffffd}, &(0x7f00000002c0)=0x8) setsockopt$inet_tcp_TCP_CONGESTION(r1, 0x6, 0xd, &(0x7f0000000300)='westwood\x00', 0x9) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000040), &(0x7f0000000180)=0xc) ustat(0x6, &(0x7f00000001c0)) setsockopt$inet_sctp_SCTP_ENABLE_STREAM_RESET(r1, 0x84, 0x76, &(0x7f0000000140)={r2, 0x76}, 0x8) 2018/04/29 19:59:02 executing program 1: r0 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x21, 0x0) ioctl$EVIOCSKEYCODE_V2(r0, 0x40284504, &(0x7f0000000040)={0x0, 0x1, 0x0, 0x0, "a5629018b8da011d20c2d35446e6ad000008003802cb440e4af8c57b42f7c07e"}) socketpair(0x10, 0x4, 0x6, &(0x7f0000000080)={0xffffffffffffffff}) syz_open_dev$evdev(&(0x7f0000000240)='/dev/input/event#\x00', 0xdbc9, 0x2) getsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER(0xffffffffffffffff, 0x84, 0x7b, &(0x7f00000000c0)={0x0, 0x8000}, &(0x7f0000000100)=0x8) ioctl(r0, 0xfffffffffffffffc, &(0x7f00000001c0)="8f1ab38f2b02e5809804fedfb4b697e270de1dc55734ab6fe975dc365110d88f80405cd2a981d2fce7d5c0bb40d45f41d723e9fd9d55474a2cb8d097e265412b135243b1") getsockopt$inet_sctp_SCTP_PR_ASSOC_STATUS(r1, 0x84, 0x73, &(0x7f0000000140)={r2, 0xfffffffffffffffa, 0x30, 0xbdeb, 0x7}, &(0x7f0000000180)=0x18) 2018/04/29 19:59:02 executing program 5: rt_sigtimedwait(&(0x7f0000000000)={0x8}, &(0x7f0000000040), &(0x7f0000000080)={0x77359400}, 0x8) r0 = syz_open_dev$evdev(&(0x7f0000001b00)='/dev/input/event#\x00', 0x0, 0xc00) r1 = openat$selinux_avc_cache_stats(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/avc/cache_stats\x00', 0x0, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(0xffffffffffffffff, 0x84, 0x66, &(0x7f0000000180)={0x0, 0xffffffff}, &(0x7f00000001c0)=0x8) getsockopt$inet_sctp_SCTP_RECONFIG_SUPPORTED(r1, 0x84, 0x75, &(0x7f0000000200)={r2, 0x80000001}, &(0x7f0000000240)=0x8) read(r0, &(0x7f0000000280)=""/127, 0xe) ioctl$BLKRRPART(r1, 0x125f, 0x0) 2018/04/29 19:59:02 executing program 2: r0 = signalfd(0xffffffffffffffff, &(0x7f0000000000)={0x100}, 0x8) ioctl$int_out(r0, 0x2, &(0x7f0000000040)) r1 = socket$inet(0x2, 0x2, 0x0) sendmmsg(r1, &(0x7f0000000080), 0x2, 0x0) getsockopt$IPT_SO_GET_REVISION_TARGET(r1, 0x0, 0x43, &(0x7f00000000c0)={'icmp6\x00'}, &(0x7f0000000100)=0x1e) setsockopt$inet_sctp_SCTP_HMAC_IDENT(r1, 0x84, 0x16, &(0x7f0000000080)={0x5, [0x80000001, 0xffffffffffff6605, 0x4, 0x72, 0x8]}, 0xe) 2018/04/29 19:59:02 executing program 0: socket$inet_tcp(0x2, 0x1, 0x0) openat$ppp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ppp\x00', 0x0, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0xfffffffffffffffe}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ftruncate(r0, 0x453abdeb) socket$inet6_tcp(0xa, 0x1, 0x0) perf_event_open(&(0x7f000001d000)={0x5, 0x78, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_bp={&(0x7f0000000000), 0x1}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) creat(&(0x7f0000000040)='./file0\x00', 0x0) openat$autofs(0xffffffffffffff9c, &(0x7f0000462ff4)='/dev/autofs\x00', 0x0, 0x0) open$dir(&(0x7f00003e8ff8)='./file0\x00', 0x0, 0x0) socket$inet6_udp(0xa, 0x2, 0x0) perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xfffffffffffffffd}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = syz_open_procfs(0x0, &(0x7f000072dfef)='net/softnet_stat\x00') pselect6(0x40, &(0x7f00003e0000), &(0x7f0000000000), &(0x7f0000e90000), &(0x7f0000000000)={0x77359400}, &(0x7f0000e85ff0)={&(0x7f0000c71ff8), 0x8}) getsockopt$inet_sctp_SCTP_RECONFIG_SUPPORTED(r1, 0x84, 0x75, &(0x7f0000000080)={0x0, 0x7fff}, &(0x7f00000000c0)=0x8) setsockopt$inet_sctp_SCTP_RESET_ASSOC(r1, 0x84, 0x78, &(0x7f0000000100)=r2, 0x4) 2018/04/29 19:59:02 executing program 6: r0 = socket(0xa, 0x2, 0x0) r1 = open(&(0x7f00004b8ff8)='./file0\x00', 0x28042, 0x0) connect$inet6(r0, &(0x7f0000d3cfe4)={0xa, 0x0, 0x0, @local={0xfe, 0x80, [], 0xaa}, 0x3}, 0x1c) fallocate(r1, 0x0, 0xffff, 0x1f) connect$inet(r0, &(0x7f0000000040)={0x2, 0x4e22, @remote={0xac, 0x14, 0x14, 0xbb}}, 0x10) perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = open(&(0x7f00000001c0)='./file0\x00', 0x3ffff, 0x100) write$evdev(r2, &(0x7f0000037fe8)=[{}], 0x18) perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x72, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000100)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getsockopt$IPT_SO_GET_REVISION_TARGET(r1, 0x0, 0x43, &(0x7f0000000240)={'ipvs\x00'}, &(0x7f0000000280)=0x1e) sendfile(r2, r2, &(0x7f0000000040), 0x7fc) getsockopt$bt_BT_RCVMTU(r2, 0x112, 0xd, &(0x7f0000000080)=0x8, &(0x7f0000000140)=0x2) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x509}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_inet_SIOCSIFNETMASK(r1, 0x891c, &(0x7f00000002c0)={'teql0\x00', {0x2, 0x4e20, @remote={0xac, 0x14, 0x14, 0xbb}}}) socket$packet(0x11, 0x3, 0x300) socket$packet(0x11, 0x3, 0x300) ioctl$EVIOCSABS2F(r1, 0x401845ef, &(0x7f0000000200)={0x66c7bbd4, 0x9, 0x3f, 0x0, 0xfffffffffffff800, 0x6}) getsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(0xffffffffffffffff, 0x84, 0x18, &(0x7f0000000140), &(0x7f0000000180)=0x8) sendfile(r0, r1, &(0x7f00005faff8), 0xfffb) 2018/04/29 19:59:02 executing program 7: r0 = timerfd_create(0x0, 0x0) r1 = fcntl$getown(r0, 0x9) ptrace$getregs(0xe, r1, 0xfffffffffffffff9, &(0x7f00000001c0)=""/176) readv(r0, &(0x7f0000000100)=[{&(0x7f0000000040)=""/146, 0x92}], 0x6) clock_nanosleep(0x0, 0x0, &(0x7f0000000140)={0x0, 0x1c9c380}, &(0x7f0000000180)) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) r2 = getpid() ptrace$peek(0x1, r2, &(0x7f0000000000)) r3 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000480)='/dev/rtc0\x00', 0x2c000, 0x0) fcntl$F_GET_RW_HINT(r0, 0x40b, &(0x7f00000003c0)) recvfrom$inet(r3, &(0x7f00000004c0)=""/171, 0xab, 0x2000, &(0x7f0000000580)={0x2, 0x4e20, @local={0xac, 0x14, 0x14, 0xaa}}, 0x10) r4 = accept(0xffffffffffffff9c, &(0x7f0000000280)=@ipx, &(0x7f0000000300)=0x80) getsockopt$inet_sctp_SCTP_EVENTS(r4, 0x84, 0xb, &(0x7f0000000340), &(0x7f0000000380)=0xb) pkey_free(0xffffffffffffffff) 2018/04/29 19:59:02 executing program 1: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffff9c, 0x0, 0x10, &(0x7f0000000000)={{{@in6=@remote, @in6=@mcast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@broadcast}, 0x0, @in=@remote}}, &(0x7f0000000100)=0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffff9c, 0x29, 0x23, &(0x7f0000000140)={{{@in6=@ipv4={[], [], @dev}, @in=@broadcast, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@local}, 0x0, @in6}}, &(0x7f0000000240)=0xe8) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8933, &(0x7f0000000340)={'team0\x00', 0x0}) r4 = accept4(r0, 0x0, &(0x7f0000000300), 0x80800) getsockopt$inet6_IPV6_FLOWLABEL_MGR(r4, 0x29, 0x20, &(0x7f0000001700)={@empty, 0xff, 0x1, 0xff, 0x7, 0x5, 0x1, 0x8}, &(0x7f0000001740)=0x20) r5 = getuid() getsockname$packet(0xffffffffffffff9c, &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @random}, &(0x7f00000003c0)=0x14) r7 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000280)='/dev/hwrng\x00', 0x40800, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r7, 0x0, 0x80, &(0x7f0000001680)=@nat={'nat\x00', 0x19, 0x5, 0xea8, [0x200007c0, 0x0, 0x0, 0x200009f0, 0x200014c8], 0x0, &(0x7f00000002c0), &(0x7f00000007c0)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x2, [{{{0xf, 0x4, 0xdada, 'bpq0\x00', 'bcsf0\x00', 'veth1_to_bond\x00', 'bcsf0\x00', @random="eceb33aa63bd", [0xabf0ecab9697b11b, 0xff, 0x0, 0xff, 0xff, 0xff], @random="a31f49451283", [0xff, 0xff, 0xff, 0xff, 0xff], 0x70, 0x70, 0xe8}}, @common=@NFLOG={'NFLOG\x00', 0x50, {{0x8, 0x0, 0x200, 0x1, 0x0, "57f927f1a095da34bdc38741de06a8bf379f1c45a9f8dc5b3bf998d8ac3114e65a92c76f2c16daec8c78e25f1203d45a8f86b7040a916795b571d2462bbf0bd9"}}}}, {{{0x1d, 0x10, 0x9200, 'bridge0\x00', 'bridge_slave_0\x00', 'irlan0\x00', 'veth1\x00', @remote={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xbb}, [0xff, 0x0, 0xff, 0xff], @remote={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xbb}, [0xff, 0x0, 0xff, 0xff, 0xff, 0xff], 0xe0, 0xe0, 0x118, [@state={'state\x00', 0x8, {{0x1}}}, @connbytes={'connbytes\x00', 0x18, {{0x4, 0x2, 0x2, 0x3}}}]}}, @arpreply={'arpreply\x00', 0x10, {{@empty, 0xfffffffffffffffe}}}}]}, {0x0, '\x00', 0x2, 0xffffffffffffffff, 0x2, [{{{0x13, 0x2, 0x89ff, 'bpq0\x00', 'ip6tnl0\x00', 'sit0\x00', 'veth1_to_bridge\x00', @dev={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0x1c}, [0xff, 0x0, 0xff], @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [0x0, 0x0, 0x0, 0x0, 0xff], 0x888, 0x8d0, 0x920, [@state={'state\x00', 0x8}, @u32={'u32\x00', 0x7c0, {{[{[{0xff, 0x2}, {0xda6b, 0x3}, {0x2, 0x3}, {0x9}, {0x4, 0x3}, {0x7, 0x2}, {0xff, 0x1}, {0x6, 0x3}, {0x5, 0x1}, {0x8, 0x2}, {0x7ff}], [{0x0, 0x1}, {0x762279a6, 0x40}, {0x9, 0x5}, {0x3f, 0x81}, {0x8, 0x7fffffff}, {0x8001, 0x9}, {0x2, 0x8001}, {0x8, 0x40}, {0x4, 0xfffffffffffffff9}, {0x8, 0xb93}, {0x6, 0xffffffffffff0001}], 0x5, 0x6}, {[{0x1ff, 0x3}, {0x401, 0x3}, {0x8, 0x3}, {0x6, 0x3}, {0x81, 0x1}, {0x0, 0x3}, {0x7fff}, {0x2}, {0x3}, {0x0, 0x1}, {0x4e5}], [{0x200, 0x1}, {0x14af, 0x400}, {0x81, 0x49be}, {0x7fff, 0x2}, {0x6, 0x4}, {0x3, 0x5e00c72a}, {0x38b8, 0x9}, {0x89, 0x6}, {0x8000, 0x20}, {0x4d15183c, 0xfffffffffffffffe}, {0x9, 0x8}], 0x5, 0xa}, {[{0x2}, {0x0, 0x3}, {0x2, 0x2}, {0x3, 0x3}, {0x10000, 0x1}, {0x1f4, 0x3}, {0x2, 0x3}, {0x29b}, {0x6, 0x3}, {0x1, 0x1}, {0xab}], [{0x2eba, 0x400}, {0x100, 0x1}, {0x900000000, 0x5}, {0x3, 0x4}, {0x1f, 0x19ef}, {0x6, 0x7}, {0xffff, 0xfffffffffffffffa}, {0x5457761d, 0x7fffffff}, {0xac, 0x14e}, {0x0, 0x4}, {0xffffffffffffffff, 0x2}], 0x6, 0xa}, {[{0xe54, 0x2}, {0x6, 0x2}, {0x8, 0x3}, {0x10001}, {0x6, 0x3}, {0x7ff, 0x3}, {0x0, 0x3}, {0x9, 0x3}, {0x10001}, {0xfff}, {0x4, 0x3}], [{0x60dc, 0x3ee}, {0xfffffffffffffffb, 0x4}, {0x3, 0x8}, {0x1000, 0x2}, {0x7fffffff, 0x9}, {0x5, 0x81}, {0x3ff, 0x4}, {0x100000000, 0x4}, {0x8, 0xfffffffffffffe00}, {0x400, 0x8}, {0x4, 0x6}], 0xb, 0x9}, {[{0x1e1c, 0x2}, {0x8}, {0x665d, 0x3}, {0x9, 0x3}, {0x33a7, 0x3}, {0x1f, 0x3}, {0x4, 0x3}, {0xff, 0x3}, {0x4, 0x1}, {0x6}, {0x8, 0x3}], [{0x5}, {0xc37, 0xffff}, {0x55, 0xffffffffffffff3d}, {0xcf9, 0x4a70}, {0x2, 0x200}, {0x6, 0x1}, {0x100000000, 0xffffffff}, {0x1, 0x2}, {0x2, 0xba}, {0x40, 0x15}, {0x10001, 0x5}], 0x8, 0x2}, {[{0x1, 0x1}, {0x401}, {0x30f, 0x3}, {0x6, 0x3}, {0x401, 0x3}, {0x8, 0x3}, {0x7, 0x3}, {0x9, 0x3}, {0x2}, {0x4, 0x3}, {0x200, 0x1}], [{0x1, 0x4}, {0x6, 0x5}, {0x739, 0x1}, {0x8, 0x101}, {0xffff, 0xf1400000000}, {0x3, 0x80000000}, {0x6, 0x1}, {0x100, 0x4}, {0x9, 0x4}, {0xcc, 0xfffffffffffffffe}, {0x1}], 0x2, 0x1}, {[{0x7, 0x2}, {0x1ee}, {0x4, 0x1}, {0xc2, 0x1}, {0x8, 0x3}, {0x40000000, 0x1}, {0xffffffffffff8ed0, 0x2}, {0xba1}, {0x80000000, 0x2}, {0xfff, 0x2}, {0xfffffffffffffffd, 0x3}], [{0xf6ec, 0x4}, {0x9, 0x2}, {0x2, 0x200}, {0x7fffffff, 0x1ff}, {0x3, 0x80000000}, {0xfffffffffffffffc, 0x101}, {0xffffffff, 0x7}, {0x5}, {0x80000000, 0x5}, {0xb35b, 0x714e}, {0x6, 0x1}], 0xb, 0x1}, {[{0x1, 0x2}, {0x8}, {0x3, 0x3}, {0x800, 0x2}, {0x4, 0x3}, {0x81, 0x3}, {0x5}, {0x5, 0x1}, {0x3, 0x3}, {0x6, 0x3}, {0xa5ef, 0x3}], [{0x1f}, {0x94, 0xffffffff7fffffff}, {0x4, 0x3}, {0x2, 0x3ff}, {0x4, 0x3d9b}, {0x9, 0x4}, {0xffffffffffff3668, 0xced}, {0x9, 0x100000001}, {0x8001, 0x800}, {0xff, 0x85}, {0x21, 0x8000000}], 0x0, 0x6}, {[{0x0, 0x2}, {0x7fff, 0x2}, {0x9, 0x1}, {0x2, 0x1}, {0x401, 0x3}, {0x1, 0x2}, {0x5, 0x1}, {0x6, 0x1}, {0x3f, 0x2}, {0x80000001, 0x1}, {0x9, 0x3}], [{0x6, 0x64a}, {0x8001}, {0x1000, 0xfffffffffffffffa}, {0x1f, 0x7fff}, {0xfffffffffffffffd, 0x8}, {0x6}, {0x9, 0x7f}, {0x0, 0x9}, {0xffffffff00000001, 0xffffffff}, {0x7fffffff, 0xfffffffffffffff8}, {0x1, 0xf79a}], 0xa, 0x2}, {[{0x6}, {0x8, 0x2}, {0x1, 0x1}, {}, {0x2, 0x2}, {0x20, 0x3}, {0xa0000, 0x3}, {0x9}, {0x26, 0x3}, {0x10000, 0x3}, {0x37, 0x3}], [{0x100000001, 0x8001}, {0x873, 0x80000000}, {0x101, 0x8}, {0x0, 0x9e0}, {0xfc, 0x4}, {0x80000000, 0x7}, {0x2, 0x8}, {0x8, 0x27}, {0x6, 0x5f5}, {0x401}, {0x3617, 0x1}], 0x1, 0x6}, {[{0xf5, 0x1}, {0xfffffffffffffff9, 0x2}, {0xce, 0x2}, {0x1f}, {0x67e, 0x1}, {0x6}, {0x7fff, 0x3}, {0x3, 0x3}, {0xfffffffffffffffd, 0x3}, {0x303}, {0xc3, 0x2}], [{0x3, 0x5}, {0x401, 0x40}, {0x100000001, 0x1}, {0xe43, 0x80}, {0x2, 0x7}, {0x80000001, 0x9}, {0x2}, {0x9}, {0x3, 0x4}, {0x101, 0xfffffffffffffc01}, {0x2, 0x4}], 0x9, 0x9}], 0x5, 0x400}}}]}, [@common=@ERROR={'ERROR\x00', 0x20, {"ed060d703d39690cf13113ae03041f904ea3b80cff3357ed0f7a4474a359"}}]}, @common=@LED={'LED\x00', 0x28, {{'syz1\x00', 0x0, 0x2, 0x9}}}}, {{{0x15, 0x40, 0x884c, 'veth1_to_bridge\x00', 'bcsh0\x00', 'ip6_vti0\x00', 'veth0_to_bond\x00', @remote={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xbb}, [0xff, 0x0, 0xff, 0x0, 0x0, 0xff], @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x3}, [0xff, 0x0, 0x0, 0x0, 0xff, 0xff], 0x110, 0x110, 0x188, [@helper={'helper\x00', 0x28, {{0x0, 'irc-20000\x00'}}}, @nfacct={'nfacct\x00', 0x28, {{'syz0\x00', 0x3}}}]}}, @common=@NFLOG={'NFLOG\x00', 0x50, {{0x7fff, 0x7, 0xffff, 0x0, 0x0, "5764f54a5981d27d6122515677de616ed9294d4dffe89de6570622d140427015905e264ed0109bb75dfc30d7844e5dd399d10c6b3374c48111f4634121391c58"}}}}]}, {0x0, '\x00', 0x4, 0xffffffffffffffff, 0x1, [{{{0x0, 0x11, 0x883e, 'bond_slave_1\x00', 'syzkaller0\x00', 'veth1_to_bond\x00', 'nr0\x00', @random="1b913678a96a", [0x0, 0x0, 0x0, 0x0, 0xff, 0xff], @random="97e0fb64160f", [0xff, 0xff, 0xff, 0xff, 0x21b60bc3cbe906a3], 0xc0, 0xf8, 0x170, [@nfacct={'nfacct\x00', 0x28, {{'syz0\x00', 0x9}}}]}, [@snat={'snat\x00', 0x10, {{@broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], 0xfffffffffffffffc}}}]}, @common=@NFLOG={'NFLOG\x00', 0x50, {{0xff, 0xe662, 0x6, 0x1, 0x0, "795a7ecb44615466f26f27dc4894e0995118cfd21288b5fdf22204cf4ca27cb4e24f3d0233618620cfd4c56b9f5613de8ff264c80551e64972f2c39ac7424442"}}}}]}]}, 0xf20) fstat(r0, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, 0x0}) sendmsg$nl_xfrm(r0, &(0x7f000000b000)={&(0x7f000000f000)={0x10}, 0xc, &(0x7f00005a6ff0)={&(0x7f0000000480)=@report={0x328, 0x20, 0x10, 0x70bd26, 0x25dfdbfb, {0x0, {@in6=@local={0xfe, 0x80, [], 0xaa}, @in=@remote={0xac, 0x14, 0x14, 0xbb}, 0x4e23, 0xfffffffffffffc01, 0x4e23, 0x5, 0xa, 0x80, 0x20, 0x8, r1, r2}}, [@algo_aead={0xe0, 0x12, {{'rfc7539esp(xts-camellia-asm,sm3-generic)\x00'}, 0x488, 0x3c0, "45810d55bf5f2d55673a1b811f8c88b442278c7aa5e5c3ec7d01941092d9bb557198d5814936ea0ac1317d15d3191450397ed611f0c215eeee6e2a18ee11eddb25a57825d57b0eede27d0dee8a40e7fbc28bf65962e4a2fa52f0335e8fc5a285d21345745bb334e06a49417b84b11e36e451a2d87d04541d552024bf706b9ab22a06672f9f225f8cecd0dafb8179636435"}}, @sa={0xe4, 0x6, {{@in6=@remote={0xfe, 0x80, [], 0xbb}, @in6=@local={0xfe, 0x80, [], 0xaa}, 0x4e21, 0x5, 0x4e24, 0x5, 0x2, 0x20, 0xa0, 0xff, r3, r5}, {@in6=@ipv4={[], [0xff, 0xff], @local={0xac, 0x14, 0x14, 0xaa}}, 0x4d2}, @in=@loopback=0x7f000001, {0x0, 0xc6e2, 0x1668, 0x0, 0x2c, 0x4, 0x9, 0x8}, {0xb0, 0x2, 0x81, 0xffffffffffffffff}, {0x81, 0x8, 0x100000000}, 0x70bd2a, 0x3504, 0xa, 0x3, 0xb4, 0x20}}, @replay_thresh={0x8, 0xb, 0x8658}, @sa={0xe4, 0x6, {{@in=@local={0xac, 0x14, 0x14, 0xaa}, @in6=@dev={0xfe, 0x80, [], 0x1e}, 0x4e23, 0xffffffff, 0x4e21, 0x80000000, 0x2, 0x20, 0x80, 0x77, r6, r8}, {@in6=@dev={0xfe, 0x80, [], 0x18}, 0x4d5, 0xff}, @in6=@mcast1={0xff, 0x1, [], 0x1}, {0xffffffffffffff00, 0x100000000, 0x9, 0x101, 0x8, 0x4, 0x5, 0xfffffffffffffffc}, {0x7fffffff, 0x2, 0x4ab7, 0xadbe}, {0x6, 0x2, 0x3f}, 0x70bd29, 0x34ff, 0xa, 0x0, 0x80000000, 0x3}}, @lifetime_val={0x24, 0x9, {0x66, 0xbd, 0xda, 0xffffffff}}, @proto={0x8, 0x19, 0x33}]}, 0x328}, 0x1}, 0x0) 2018/04/29 19:59:02 executing program 2: getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f00000000c0)={0x0}, &(0x7f0000000100)=0xc) r1 = syz_open_procfs(r0, &(0x7f00004c6f8b)="6d6f756e74696e666f004388f750c83d14c4a3a9ac1488a477660ae763891738ac656bb3e891941f02f1265047502f6c2dd9f655ef7131eabf3110d638f0d2e6a49a2bc4a08d63e2da7af47e6c37972352875f125bcf3ea7f04b7b505b6a06beedb2a86e30a86bc0d37a6438b99a45ea22b1f4fb05") readv(r1, &(0x7f000005a000)=[{&(0x7f0000d1d000)=""/203, 0x52e}], 0x342) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000000140)) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000852000)='.', &(0x7f0000000180)='debugfs\x00', 0x0, &(0x7f0000d1cfff)="d3") 2018/04/29 19:59:02 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000065fc8)={&(0x7f00002dfff4)={0x10}, 0xc, &(0x7f0000fd1000)={&(0x7f0000000080)=ANY=[@ANYBLOB="140000000a0afdff000000200000000000000000"], 0x14}, 0x1}, 0x0) [ 56.238825] keychord: keycode 25646 out of range [ 56.256632] keychord: keycode 25646 out of range 2018/04/29 19:59:03 executing program 4: socket$nl_xfrm(0x10, 0x3, 0x6) r0 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer\x00', 0x2, 0x0) getsockopt$inet_sctp_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1a, &(0x7f0000001100)=ANY=[@ANYRES32=0x0, @ANYBLOB="00100000c2583fe4089e204d9fb7ec9c0876d8c70bcd324929466a3d629e66dac4715d6b81a323f78b47b6709a572b6a39e4e2d1dcf60de1bf436ceb9a1980fb7ce549f16c67b5319386a418d6ad1e35ff1247f071ae9257d664be678ca44aa8adf564c88aced3a6a3fa22f936f70c780804b169c173c946f5fded0cd0f32c219150ba23355dd4684c3ceecf3a08804bb5d2cf8358fa2ae13af5a7af6b970284d670e2b1b1bb404ec5a4c3b867efe82c65b88b9a43c448d1185bc64f689bd8390efb1e2c413990508b495615c852e9dd88f4d9d140df7af05278c7994fab8bb80f1067da27b8727432cb011961a3af84c5a6b0ae35ed4182a11498085080c06e664fca66fc9a54e6a14822a6875c4bddc1c3f007c8dd7b930100b691e8899e66cc139d0bf4a420a309142d9eae52f224404bf081904f63db4337c460e06e2a0a2d9541aa7d7ee7dfdb1f1162866e22903e81d3bf9f6562f736dc26376e0deeab382e3592f7d3f2b6a5ff22b7e5c030e26580d500183834fd4dd4f6cd8f27b04a02edf8489a10d9d47fa93044a088e8e0301e10c8683c8d1db38a730c82489298009f84a8da59ae872dc0ae1ee1f96888d45132ceb133def97a7abdaec79b2e13b6b181daa3f9c300849800aa55e66bb1437f6712b096f241b4b6baa2481f8e7dbbeec6cbd6ab32878a4e005e1a41d6678f8579807c08d8bedbc713c9cc86cdff7468872e486f91947bb211b536bb30c159ada9976407417ae9746e6831b9159a9356064ad6fd5da03e4945151a501f98ba9f23464109bc12b662824e163688b8a37e4d0bbcaae061e9cd29f43db63ac1e11e30f319cb9cb4c645de7fcceae14ade3b8b9517de4a6a95572ac5ef5baaf62110f6415f291c1cfc0f3d85564c9bf553c3eb56a33b30c04504449125ba91ea2ee4bfd53ea7f19818eb95cb5e208464c6790f7c2f1d6e21a357a349baa17d92aa4890f6576db084eceb283ac22ba2167e3819bd9d85da81f39d74f3a5d4133617671a434e6c3fb9fe72a5d19e8208fc02fea39d7084fe3f7ea385f5abc96a444f8a721ec6018c6d7c32fe6bf61cc5add872362b3bbc569d639e7f7bb9b5b333b70002caf29040aaf041027a500ef43fbc77daead0f558ccc4408936bb1b969d8f6d28472950eeaf1905e395c0a6092fa9217a4bffb37defddb87ce3f1c6bb4e5f542c83f8fd2c827582d57a74fe24a111ab842c8d6db23efde9eb65dc18c8a20dce43547393720a544ce8124f8dc2760abe1beae57fcd263129aeecd74970db4043447ca6071774f7096424004fc4be7f6f8e3c542586cdb7294d1b3980b1c3e59939afe29115a4feca8f1256a84cb5c1e0da87c94a2355840fa30dfbf20e0896533832f5d2832756ea6a031a561e16240fb0b4542741bf622fb745598663381b12c60cd9fda2b2caf2b0083d3e616be3d4334c787488ba2d2b50df655ea599fe0a41e75e19b5d118204c4716e7c869e539daa6c3b591c542f1ec5860bcc038bf238a8a81c3370d827ee3d2554998518c5539fef35bd878fe1964fdd6970d99b422a1f653d77259b6f182486abfc52fb6e68275f38a92a83587370b35a5bf7d4fba43e934cee89cb26b521c1ff1b35cf914181a51d034b0549a6203626f267c162e055df3a2918488b377c5236001145a8e4f01268768004121fda2db3a11a5ddaf62a808f0da4d1295a91a061acb8fff712e508e2dfbabfb28907e6d019f6ec6b8213ab1e6672065c294f95a97e761cb82aadc6d2692c92c9a7c8fbeac404cfae4e4ee5b46bf59aaf7fa1566deea29b22b8ff62a481e45096d3b6aa9bbd00cb373cb8aba28f975a65666120a077523d118c7df6d399ba96e8d13f21b2a1edfd1ff7d2812036e9037e7c28ada68b9c23662c1fa0f8003b6b008738f9cbf8de8dcfe74ff0080c854abfc855a1a9c45e50bea4dddb3aa75d6f8356c3bfd1df37d2fb9b07505333483e93701881a2ae47cf52aa513df8c9bacdc3ca10d38b58f42ca215b416b3f804db6383022a96b9ed09e917a051171926f3c0597698cdeae6168861247fe5309de82179b71a1ffdc225161dcf015bb2fd736fefb8633cfbdd85e42c5a2e4003750f7e43adf0b3077a92de1a207ba7f0c984a13ae6b43ca7227a510fe51e3849b8ad290bf7cdf826bc0bc89213914e2137683f813349617a2d0c2ebda718740ed1d10987f9213f67192ec8efb95d4de7e7d8449646205190f0b770a4abdb1f161f193d8912e483a4042ef81b4d14f54c2d1bfef2d1c103da0d4d5fd6f9af7b132cda86110b1cdfd2a71bd104bec74893af680fbdbebb9bf3543f04dd2acf7697b8ef6447d8223c686d8b7095f742b97f97774d68f6144da63a3a07fb426d716991d2bbf0ef757d0071c9703204f9d43b87e661a3507bab60453f24088cedd83cb4860be4d0129510d6547ebfc05d291fb3e66ba22d116607d2cdc944b10bffd57e243881b1a78e62bb6ec765d177218b18ceb5ae89d4f32ad8ed7333f96a94c03954bc2d9d2cb44dfccb5f41125d84c85dcabcf339ab6f028486f1f312929ee2f260c2d121a4f61a7a142f13c699f83ebe845a017ed93b265374a0ec8ad7b3bfee33f1843bef9ed7bdb8e21e6b8e444ba8d8c0f684fda89863b26d47010180eae6dc9ba0493fafb67530064f399e316f73c3ae3ccba6c9e0adee4889a06156dfee04ce60ee6f32ee3075bb72c40e59312e91c0a3798ad41a558d8353272779a27305f36606acafe9c99066179c4a7dacc4a269f4eaab7e4b8e41a0b0320cf6697637bec7450a3ff9c103d3f1d3b785359c37eccf94b1f1ccf3d1ef76101380614e57667423cfcfbdd725681a82a9c5aa9331ee59653cf0828f5d848b8c856f36567c41c7d9109ee024b1f523850083bbb3f9ae32c65b07aa64853c73c1078e22a08f44641d49a931379aa4b0f46e559c6662407b345e90c3a05e407942069d6d4e3cd8080221e0b5c9319ed16822c88d449f7ee8386886b1521eb8c73ca3d7fce8d1e4c8b48d1464942c4470d84f32b853165dcee9bab9dcc2a3edad67bdad03308d5ba76dfb1de30f76ce01e6fe493ea822ab14813ff03395b11a675de324685a6c2ad3880d2ed8495d98d0781c63a6be7208c5271a76bd2719776fc7176d9a774ac37501ca8e25675f466f877a90a5c175f57d82d10d9438c5e10eb15a4f3e15008fb4f1d11a6f587477e6b8c98327e88bb05c987165f9e7df10ba87f403678d5f32ddced24d724c0f9f897550b0f72cc82fa2337480d41f48ca82016d4d4841cfde7e555b7bedfed3350cd0ea1732191c21718573517bff00ef55ccf443c3b09ef40212b2c15c3277b411e07391b63c03db51dd055cb9a34c75883bfcf2f1d200bd0c04fcb6838cb16fdb14c16c25c795c51e74239fa8eb962f67137732252925e78f73dfd533e0e1c7b4375fec6b978a8eca80a9217157a06348d99abe3772a9a6e6f41017bdec87cf85e5922edd311b62bfc130a5929ab69499e1f9074a834a125204d6d0fbed3d58a10df876d15e25878f2bdbab3c03bfe8e6c0de5a8eba9fe6e3dcb5cf3e19f448a50d1a8b7ddfe5a3f94fc5fb7fecdbc79f0e326c063debe1c709385b3f9a5de6bcf4f590c819f7441d893d2dcbb3fccfc1967bba373edb9f74bc737e51e7e34a9e398692e9703e8f733047286fbfde495510615b55997f80553145312891672b61ff82aed7059ee8593f134540a9b6f340975fa9e8328dcba4726be5817b98600a98cfb8a6eb703373670c971b08c93520d2a2e41cb50c09d2681d64c733905713c57903989779912bee14a37582216b09bad4cd3a987f8290fc615efab2f671cb7ba217f2c6f181ef4f8ad169cca54f0c29bd9f07af15e4273ce59539cedf377ce914b16a60e1190c0ccea3939fdadac05eaafba75ea9dce58a39beaaa2c1b1cfe51a1cf2a155a47823dce954ff245ba6982172e5da0ab93bf67eae44cd75bc3fbb71d92a7836a118e18fe5825901bdadc452801812dd6c55d81762852b0a5c474c37118bbd34591255ba17b717c8f20bf888c4b7e9fff381544aa670d427c5021ea38943e149dc28c6a74f18f7b211a35602fa2c36387cb72b7c958150494078914856c6b052300f28f34ff4da362a6167d6080a66c9fe88ded2fa85fe4dc6061ae9e50d28d67d8f55c99963d812e61418093cb4378b7bb3eeaf60d5ed46434b7d4c9af93e73d16f96491b0237287ebdb86e93f9f3740d96dc060e6e1b2c7063cd85e366ad7434584acc8e80dfee465ae41b49da8058609cdbe1f29485578f12104b069331ed646d9ebbbb165b061a9b6a93418fac584ca8883b8ac5ecbeba4148c6feb3f13cca7a6c9c0148fb621f9e28b2cc6c749a88b5efb27bd2bfa1a2bb964b33ee4daa6c88218343663513f12d1596b5dc1b941825c814f821ab607dff168406949d9df933574fba835cabc6d3348ab9b72fd310d55121e6d976ee6f16a8f6db14237a55f5f44948597e101ad6e45b8f95a24fc6ec72a75537e814d453e7fabf8838f64d2ecff732aa643792e667664f7e8cb93bbed486e22acaf374d5a6b6e032432fd4bad723f01a9ce086daab2734cd76fa2843db7bda86aaa723178d71158f7a26f764a373210737405d4316b1a29862a756ac75bf93b21137020bc3e7b3d14421745ea18f5784c5e06149f6dd75af02c47e60ceeda66e0cdcc1963d828608812e378c236995577b3bbad40ed7ce9dd9d553f75001d5d02832def8b2da1d3d4d8d96958493560bad9a72016691f292982a8ff6c1e02de637f6e3d63732996731c00c3c02a179e755f70706109969d0af46c9ffa20584880918db72451da521edd0ebf26546a43feb248c3369391eedf18fc03e0d56de7353da57570e05e73cc9fb521c969a5e6d00da20ccecaca2a9882c879179767816d22949a199e0aa20c868d1f26613afe9ecec96dae8a0e3267abfd700277ca54053dd59282301edf51fb6f951472b70a4bcc5189aed957b8c5968afc6379e091f54fd46682cfbbecb7ee026ac660f136bd4f75b1a14f09bfb5cbfd562fe126544db093bde8691d6a422d43414b9e9ffed868b9a8a04d17c798c8ec5139231c7a073ebaf886e5723d6f6f7a2fd3536662f0c2d131749e24e7c121e3daec3de82b5be6e8db313fcb4ad85ae2a72777727db632cbc824c6d3524700c882ea27cf688fc42824e6978c235bf7e6894679d7756a600485fdd1f5d6b1d69b1269bb34e7ffa28a70435117a19bc6686dba4d11953e19de0227ead175c885e17f1b150bd038745077cfdc3d202d0d2212a219ebbf9dd7ed94750e3413037716fded13409d4b298fc7e2c4397d9f3d94e33245cfd26c85bf33fc1b3b506a0d0b5cb597fc62356937c089c6368c9812900959d2db47296977fcd7a386d56e7e3bdde6c7a4b84baaf0b334829ee5f59dcf1c10532ef1b316abc86fe2cf23561e3e705cb5f5dae4b180f9084709a84b993180b1a50e69073e36886b338fee0d13eb63a0c8aa11368baa36e579093fcb06a41aad7cdf8cf0a0ccbf1df0bfdcbc466a36fc20c37f8fe6d570c48daf355bde8cfd0ef814363e6fa9bfdfce4e28260d44737abbd374071511128718366a2c92159de424eb7a7530c0b6f0aecc6fe539f46c4613faf771844d9d1ef46e4fa7b1b3eaf972b03c2dd0e23db9b7611f0e484e9d0bac3f086f16111e455bc12ed8e1b419bd17585aadfcba389c88cd85b548f6c68e091a686611ec31227e31a0db7c5c2536aef519b97032a0657096442fa5e05bd4836a5e10a2810f635911a9690997d9e8ee33216daf624b592b42bbdaee23192293c3e80df9e8a16e8f3b07f04a7ac6f3b01393d5f9d4470bd8696ba5f404a2af68fd28dfc37495ba1e8d809914a1520a27000000000000000000"], &(0x7f0000001080)=0x1008) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_STATUS(r0, 0xc05c5340, &(0x7f0000000040)={0x10000, 0x5, 0x1, {0x0, 0x1c9c380}, 0x3, 0x2}) setsockopt$inet_sctp6_SCTP_DEFAULT_SNDINFO(r0, 0x84, 0x22, &(0x7f00000010c0)={0xfffffffffffffff9, 0x8, 0x8, 0x5, r1}, 0x10) 2018/04/29 19:59:03 executing program 1: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x2, 0x0) fcntl$setstatus(r0, 0x4, 0x2804) ioctl$KDSIGACCEPT(r0, 0x4b4e, 0x34) ioctl$TCXONC(r0, 0x540a, 0x0) write(r0, &(0x7f00001b1fff)='O', 0x1) r1 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net/ipv4/vs/sync_sock_size\x00', 0x2, 0x0) ioctl$SG_IO(r1, 0x2285, &(0x7f0000000300)={0x0, 0xffffffffffffffff, 0xea, 0x7fffffff, @buffer={0x0, 0xb, &(0x7f0000000080)=""/11}, &(0x7f00000000c0)="cde922f35e16b0ef2aa8a6ce0b2343e62df3e16402b101ad52d668a736139547c72740e0cba8b1e202bf8cd6631fc0cb35c2ef452aa0fee893947661049b06325e6cf0ce88205d5877c6548d10bdbd25b41a1476caee95127a425d9698ccabee9a2f34425eb9a380bdcc8648ae771caaa3eaab2304029c802268bc8a37f5beb3153473d3b9d5252f28d27209ed7c6e142832f085d1fe33a210ff6076ce88bf3d9ae1ff7e2545698f81ede0987a3b64e8224c75465abdaa3dbd90e6f8aa13c715d8f11831143856a9a102c5f221aee43f20251f1e4cdb137e02b78606d48c365b605608f67df1adda4423", &(0x7f00000001c0)=""/219, 0x9a, 0x0, 0x3, &(0x7f00000002c0)}) fcntl$setsig(r0, 0xa, 0x21) ioctl$TCXONC(r0, 0x540a, 0x1) 2018/04/29 19:59:03 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ipvs(&(0x7f00000000c0)='IPVS\x00') r2 = accept(r0, &(0x7f0000000000)=@pppol2tp={0x0, 0x0, {0x0, 0xffffffffffffffff, {0x0, 0x0, @rand_addr}}}, &(0x7f0000000080)=0x80) bind$bt_l2cap(r2, &(0x7f00000001c0)={0x1f, 0xffffffffffff8001, {0x7fff, 0x8, 0xffff, 0x5, 0x8001, 0x2}, 0x400, 0x2}, 0xe) sendmsg$IPVS_CMD_NEW_DAEMON(r0, &(0x7f0000000700)={&(0x7f0000000100)={0x10}, 0xc, &(0x7f00000006c0)={&(0x7f0000000140)=ANY=[@ANYBLOB='4\x00\x00\x00', @ANYRES16=r1, @ANYBLOB="0100000000000000000009000000200003000899aa3d6107660000140002006970000000034a04046f74e9828136aee444d8548084b12b914616356c0d16460ca30e3af9f1cfcc247a0e5074b4f2e1faa0d90f1a2d33aa42fa"], 0x34}, 0x1}, 0x0) getsockopt$inet_sctp_SCTP_DELAYED_SACK(r3, 0x84, 0x10, &(0x7f0000000200)=@assoc_value={0x0, 0x16ad}, &(0x7f0000000240)=0x8) getsockopt$inet_sctp_SCTP_GET_PEER_ADDRS(r2, 0x84, 0x6c, &(0x7f0000000280)=ANY=[@ANYRES32=r4, @ANYBLOB="2100000035be31ab2b719daf26517c3b3b44646d7b6c7946d755"], &(0x7f00000002c0)=0x29) 2018/04/29 19:59:03 executing program 2: perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000001700)=[{{&(0x7f0000000500)=@pppol2tpv3in6={0x0, 0x0, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, @mcast2}}}, 0x80, &(0x7f00000003c0)=[{&(0x7f0000000380)}], 0x1, &(0x7f0000000400)=""/185, 0xb9, 0x1f}}], 0x1, 0x0, &(0x7f0000001780)={0x0, 0x1c9c380}) setsockopt$netrom_NETROM_T1(r0, 0x103, 0x1, &(0x7f00000004c0)=0x20, 0x4) setsockopt$bt_BT_SECURITY(r0, 0x112, 0x4, &(0x7f00000017c0)={0x7}, 0x2) r1 = open$dir(&(0x7f0000000040)='./file0\x00', 0x1fffe, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f00000001c0)={{{@in=@rand_addr}}, {{}, 0x0, @in6=@loopback}}, &(0x7f00000002c0)=0xe8) r2 = open(&(0x7f0000000080)='./file0\x00', 0x4001, 0x0) openat$cgroup_type(r2, &(0x7f0000000380)='cgroup.type\x00', 0x2, 0x0) sendfile(r2, r1, &(0x7f0000002b80), 0x8000007fffffff) socket$netlink(0x10, 0x3, 0x15) getsockopt$inet_sctp_SCTP_STREAM_SCHEDULER_VALUE(r0, 0x84, 0x7c, &(0x7f0000000140), &(0x7f0000000180)=0x8) getsockopt$inet_sctp6_SCTP_ADAPTATION_LAYER(r0, 0x84, 0x7, &(0x7f0000001800), &(0x7f0000001840)=0x4) 2018/04/29 19:59:03 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000065fc8)={&(0x7f00002dfff4)={0x10}, 0xc, &(0x7f0000fd1000)={&(0x7f0000000080)=ANY=[@ANYBLOB="140000000a0afdff000000200000000000000000"], 0x14}, 0x1}, 0x0) 2018/04/29 19:59:03 executing program 5: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x126, 0x0, 0x0, 0x0, 0x0, 0x400000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000001000)={0x0, {{0xa}}, {{0xa, 0x0, 0x0, @dev={0xfe, 0x80}}}}, 0x108) r1 = syz_open_procfs(0x0, &(0x7f00000000c0)='cmdline\x00') preadv(r1, &(0x7f0000000100), 0x2d9, 0x10400003) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000000)=0x0) r3 = syz_open_pts(0xffffffffffffffff, 0x800) ioctl$TIOCCONS(r3, 0x541d) r4 = syz_open_procfs(r2, &(0x7f00000000c0)='net/if_inet6\x00') readv(r4, &(0x7f00000014c0)=[{&(0x7f00000003c0)=""/4096, 0x1000}], 0x1) connect(r0, &(0x7f0000000340)=@pppol2tpin6={0x18, 0x1, {0x0, r4, 0x4, 0x3, 0x3, 0x0, {0xa, 0x4e24, 0x0, @mcast2={0xff, 0x2, [], 0x1}, 0x2}}}, 0x80) r5 = add_key(&(0x7f0000000200)='encrypted\x00', &(0x7f0000000240)={0x73, 0x79, 0x7a, 0x0}, &(0x7f0000000280)="a8fc31a8e82febd72518765de677850edc4c0dd653c65e05", 0x18, 0xfffffffffffffffe) r6 = syz_genetlink_get_family_id$ipvs(&(0x7f00000001c0)='IPVS\x00') sendmsg$IPVS_CMD_SET_CONFIG(r4, &(0x7f0000001480)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x100008}, 0xc, &(0x7f0000000300)={&(0x7f00000013c0)=ANY=[@ANYBLOB="7047ecd8", @ANYRES16=r6, @ANYBLOB="210b28bd7000ffdbdf250c00000020000300080001000100000014000600000000000000000000000000000000014800010014000300ac1414bb000000000000000000000000080006006e710000080001000a00000008000800ff0100000c0006006c626c63000000000c000700100000001a00000008000400070000000c000100080005000200000004000300"], 0x94}, 0x1, 0x0, 0x0, 0x1}, 0x10) keyctl$restrict_keyring(0x1d, r5, 0x0, &(0x7f00000002c0)='/dev/input/event#\x00') setsockopt$inet_sctp_SCTP_RESET_STREAMS(r4, 0x84, 0x77, &(0x7f0000000180)=ANY=[@ANYRES32=0x0, @ANYBLOB="000009f3ff03025905410d0000022ec64c000000"], 0x1a) syz_open_dev$evdev(&(0x7f0000000140)='/dev/input/event#\x00', 0x2, 0x0) 2018/04/29 19:59:03 executing program 7: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000001000)={0x0, {{0xa}}, {{0xa, 0x0, 0x0, @dev={0xfe, 0x80}}}}, 0x108) r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000100)='/dev/null\x00', 0x2a00, 0x0) accept4$bt_l2cap(r0, &(0x7f0000000140), &(0x7f0000000180)=0xe, 0x80000) r1 = syz_open_procfs(0x0, &(0x7f00000000c0)='net/protocols\x00') preadv(r1, &(0x7f0000000100), 0x2d9, 0x10400003) setsockopt$inet_sctp6_SCTP_RECVNXTINFO(0xffffffffffffffff, 0x84, 0x21, &(0x7f0000000000), 0x4) 2018/04/29 19:59:03 executing program 6: r0 = socket(0xa, 0x2, 0x0) r1 = open(&(0x7f00004b8ff8)='./file0\x00', 0x28042, 0x0) connect$inet6(r0, &(0x7f0000d3cfe4)={0xa, 0x0, 0x0, @local={0xfe, 0x80, [], 0xaa}, 0x3}, 0x1c) fallocate(r1, 0x0, 0xffff, 0x1f) connect$inet(r0, &(0x7f0000000040)={0x2, 0x4e22, @remote={0xac, 0x14, 0x14, 0xbb}}, 0x10) perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = open(&(0x7f00000001c0)='./file0\x00', 0x3ffff, 0x100) write$evdev(r2, &(0x7f0000037fe8)=[{}], 0x18) perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x72, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000100)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getsockopt$IPT_SO_GET_REVISION_TARGET(r1, 0x0, 0x43, &(0x7f0000000240)={'ipvs\x00'}, &(0x7f0000000280)=0x1e) sendfile(r2, r2, &(0x7f0000000040), 0x7fc) getsockopt$bt_BT_RCVMTU(r2, 0x112, 0xd, &(0x7f0000000080)=0x8, &(0x7f0000000140)=0x2) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x509}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_inet_SIOCSIFNETMASK(r1, 0x891c, &(0x7f00000002c0)={'teql0\x00', {0x2, 0x4e20, @remote={0xac, 0x14, 0x14, 0xbb}}}) socket$packet(0x11, 0x3, 0x300) socket$packet(0x11, 0x3, 0x300) ioctl$EVIOCSABS2F(r1, 0x401845ef, &(0x7f0000000200)={0x66c7bbd4, 0x9, 0x3f, 0x0, 0xfffffffffffff800, 0x6}) getsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(0xffffffffffffffff, 0x84, 0x18, &(0x7f0000000140), &(0x7f0000000180)=0x8) sendfile(r0, r1, &(0x7f00005faff8), 0xfffb) 2018/04/29 19:59:03 executing program 3: socket$inet6_udp(0xa, 0x2, 0x0) 2018/04/29 19:59:03 executing program 4: r0 = perf_event_open(&(0x7f0000014f88)={0x1, 0x70, 0x5, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x385}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x40082404, &(0x7f00000000c0)=0x6) 2018/04/29 19:59:03 executing program 7: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000001000)={0x0, {{0xa}}, {{0xa, 0x0, 0x0, @dev={0xfe, 0x80}}}}, 0x108) r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000100)='/dev/null\x00', 0x2a00, 0x0) accept4$bt_l2cap(r0, &(0x7f0000000140), &(0x7f0000000180)=0xe, 0x80000) r1 = syz_open_procfs(0x0, &(0x7f00000000c0)='net/protocols\x00') preadv(r1, &(0x7f0000000100), 0x2d9, 0x10400003) setsockopt$inet_sctp6_SCTP_RECVNXTINFO(0xffffffffffffffff, 0x84, 0x21, &(0x7f0000000000), 0x4) 2018/04/29 19:59:03 executing program 1: r0 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/commit_pending_bools\x00', 0x1, 0x0) connect$netlink(r0, &(0x7f0000000040)=@kern={0x10, 0x0, 0x0, 0x8000000}, 0xc) r1 = socket(0x0, 0xfffffffffffffffc, 0x4) write(r1, &(0x7f0000000080)="2400000021002553074401650272fc02800000000010fdffffff000c08000500000035c3", 0x24) getsockopt$inet_sctp6_SCTP_STATUS(r0, 0x84, 0xe, &(0x7f00000000c0)={0x0, 0x15f, 0x7, 0x8a2, 0x6d5b, 0x4, 0x5, 0x1, {0x0, @in={{0x2, 0x4e20, @broadcast=0xffffffff}}, 0x3, 0x7e9, 0x7, 0x80, 0x1}}, &(0x7f0000000180)=0xb0) getsockopt$inet_sctp_SCTP_STREAM_SCHEDULER_VALUE(r0, 0x84, 0x7c, &(0x7f00000001c0)={r2, 0x4, 0x6}, &(0x7f0000000200)=0x8) bind(r0, &(0x7f0000000280)=@vsock={0x28, 0x0, 0x2711, @my=0x0}, 0x80) setsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(r1, 0x84, 0x8, &(0x7f0000000240)=0xfff, 0x4) 2018/04/29 19:59:03 executing program 2: r0 = open(&(0x7f0000042ff8)='./file0\x00', 0x80040, 0x0) fcntl$setlease(r0, 0x400, 0x0) rt_sigprocmask(0x4, &(0x7f0000000140)={0x1}, 0x0, 0x7) rt_sigtimedwait(&(0x7f0000061000)={0xfffffffffffffffb}, &(0x7f0000039ff0), &(0x7f0000039ff0)={0x77359400, 0xffff}, 0x8) rt_sigsuspend(&(0x7f0000000040)={0xfffffffffffffffd}, 0x8) truncate(&(0x7f0000000240)='./file0\x00', 0x0) [ 57.404513] netlink: 28 bytes leftover after parsing attributes in process `syz-executor0'. 2018/04/29 19:59:03 executing program 3: syz_open_procfs(0x0, &(0x7f0000000000)="6d6f756e74696e666f004388f750c83d14c4a3a9ac1488a477660ae763891738ac656bb3e891941f02f1265047502f6c2dd9f655ef7131eabf3110d638f0d2e6a49a2bc4a08d63e2da7af47e6c37972352875f125bcf3ea7f04b7b505b6a06beedb2a86e30a86bc0d67a6438b99a45ea22b1f4fb054f56cad739f5a33066e16a70a014eb7a6982342fa23725968caecc91dd0721961ec1c860ace6241ef319d87616bfbbc2ae47289d83864ff86f93c0cfbf00df08b3d3ce9d9fa4e19db8c2d71b14dd3b887e5ad003a3") r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000140)=ANY=[@ANYBLOB="02050100f00000d3b8ca000000000000000000"], 0x24}, 0x1}, 0x0) 2018/04/29 19:59:03 executing program 4: r0 = perf_event_open(&(0x7f0000014f88)={0x1, 0x70, 0x5, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x385}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x40082404, &(0x7f00000000c0)=0x6) 2018/04/29 19:59:03 executing program 0: perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000001700)=[{{&(0x7f0000000300)=@pppol2tpv3in6={0x0, 0x0, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, @mcast2}}}, 0x80, &(0x7f00000003c0), 0x0, &(0x7f0000000400)=""/185, 0xb9}, 0x3f}, {{&(0x7f00000004c0)=@hci, 0x80, &(0x7f00000016c0)=[{&(0x7f0000000540)=""/119, 0x77}, {&(0x7f0000000680)=""/4096, 0x1000}, {&(0x7f0000001680)=""/29, 0x1d}], 0x3, 0x0, 0x0, 0x50b}, 0xfff}], 0x2, 0x0, &(0x7f0000001780)={0x0, 0x1c9c380}) r0 = open$dir(&(0x7f0000000040)='./file0\x00', 0x1fffe, 0x0) r1 = open(&(0x7f0000000080)='./file0\x00', 0x4001, 0x0) truncate(&(0x7f00000004c0)='./file0\x00', 0x81020e) recvmmsg(r1, &(0x7f0000001fc0)=[{{0x0, 0x0, &(0x7f00000002c0)=[{&(0x7f00000001c0)=""/144, 0x90}, {&(0x7f00000019c0)=""/251, 0xfb}, {&(0x7f0000001ac0)=""/250, 0xfa}, {&(0x7f00000005c0)=""/105, 0x69}], 0x4, &(0x7f00000003c0)=""/8, 0x8, 0x4}, 0xbb61}, {{0x0, 0x0, &(0x7f0000000640), 0x0, 0x0, 0x0, 0x6}}, {{0x0, 0x0, &(0x7f0000001f40)=[{&(0x7f0000001bc0)=""/227, 0xe3}, {&(0x7f00000017c0)=""/14, 0xe}, {&(0x7f0000001cc0)=""/163, 0xa3}, {&(0x7f0000001800)=""/110, 0x6e}, {&(0x7f0000001d80)=""/9, 0x9}, {&(0x7f0000001dc0)=""/163, 0xa3}, {&(0x7f0000001e80)=""/69, 0x45}, {&(0x7f0000001f00)=""/38, 0x26}], 0x8, &(0x7f0000002bc0)=""/4096, 0x1000, 0x4}, 0xdc}], 0x3, 0x20, &(0x7f0000002080)) fcntl$setpipe(r1, 0x407, 0x0) sendfile(r1, r0, &(0x7f0000002b80), 0x8000007fffffff) syz_mount_image$btrfs(&(0x7f0000000140)='btrfs\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0xaaaaaaaaaaaae25, &(0x7f0000000440), 0x0, &(0x7f00000020c0)=ANY=[@ANYBLOB="00e52a4f858dbaf9916083c398288ae9ad08b36adb9a8519a71203b9f0f40dd82ee8e1c88cb6117e24821ae88e29f9da0ea248f3a98092ad83e0e380108aab58da02afdbc9d858e3d5467dee5212d11a1bb429a1ba664a726ceb0012ef22887b0a8518cce92fa0050b81ac053383d0e33b652be95a2e20bb558303125409000000000000000000000000000000"]) unshare(0x40000000) getsockopt$inet_sctp_SCTP_STREAM_SCHEDULER_VALUE(0xffffffffffffff9c, 0x84, 0x7c, &(0x7f0000000140)={0x0, 0x77e}, &(0x7f0000000180)=0x8) setxattr(&(0x7f0000000380)='./file0\x00', &(0x7f0000000280)=@known='com.apple.FinderInfo\x00', &(0x7f0000001880)="0400fee04d90d51ffeac331a86df5abb7e2d447e25266c44107fce128c302d076bf25189d1b1d1060e7afc60c6216ccdcdffff46a63d957f6c72e3d90cc55a622cd2103da4dfdc", 0x47, 0x2) [ 57.491298] netlink: 28 bytes leftover after parsing attributes in process `syz-executor0'. 2018/04/29 19:59:03 executing program 4: syz_fuseblk_mount(&(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='./file0\x00', 0xa000, 0x0, 0x0, 0x0, 0x0, 0x0) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='fd/4\x00') ioctl$EVIOCRMFF(r0, 0x40044581, &(0x7f0000000100)=0x8) ioctl$TCXONC(r0, 0x540a, 0x80) write$fuse(r0, &(0x7f0000000040)={0x28, 0x4, 0x0, @fuse_notify_inval_inode_out={0x100000001, 0x80, 0x7}}, 0x28) ioctl$PIO_UNISCRNMAP(r0, 0x4b6a, &(0x7f0000000140)="93e15e15a48180cc532d5b63b9492406305eb21fc21ab7074a32c7e763b870e0") 2018/04/29 19:59:03 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_SIOCOUTQNSD(r0, 0x894b, &(0x7f0000000100)) perf_event_open(&(0x7f000001d000)={0x5, 0x70, 0x0, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_bp={&(0x7f0000000000), 0x1}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_genetlink_get_family_id$fou(&(0x7f00000000c0)='fou\x00') socketpair$inet6_sctp(0xa, 0x5, 0x84, &(0x7f0000000040)) getsockopt$inet_buf(r0, 0x0, 0x3, &(0x7f0000000080)=""/30, &(0x7f0000000000)=0x2) 2018/04/29 19:59:03 executing program 3: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket(0x2, 0x2, 0x0) pipe2(&(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) socket$inet_icmp_raw(0x2, 0x3, 0x1) getsockopt$inet_sctp6_SCTP_MAX_BURST(0xffffffffffffffff, 0x84, 0x14, &(0x7f0000000600), &(0x7f0000000640)=0x4) write$sndseq(r1, &(0x7f0000000300)=[{0x2, 0x0, 0x0, 0x0, @time={0x77359400}, {}, {0x9, 0x3}, @time=@tick=0x4}, {0xc21, 0xff, 0x4, 0x7, @time, {}, {}, @connect={{0x7}}}, {0x0, 0x9, 0x0, 0x8000, @tick=0x3, {}, {}, @addr={0x0, 0x1000}}, {0x6, 0x7ff, 0x6, 0x0, @time, {}, {0x9, 0xc3}, @connect={{0x0, 0x4}, {0x0, 0x986}}}], 0xc0) r3 = syz_open_procfs(0x0, &(0x7f0000000000)='net/udp\x00') connect$inet(r0, &(0x7f00000001c0)={0x2, 0x0, @local={0xac, 0x14, 0x14, 0xaa}}, 0x10) r4 = fcntl$dupfd(r0, 0x0, r3) sendmmsg$unix(r4, &(0x7f0000001780), 0x4924924924925a8, 0x0) openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000180)='/dev/loop-control\x00', 0x0, 0x0) request_key(&(0x7f0000000540)='id_resolver\x00', &(0x7f0000000580)={0x73, 0x79, 0x7a}, &(0x7f00000005c0)='(\x00', 0xfffffffffffffff8) ioctl$KDGETMODE(r2, 0x4b3b, &(0x7f0000000680)) nanosleep(&(0x7f0000000140)={0x77359400}, &(0x7f0000000200)) syz_genetlink_get_family_id$team(&(0x7f0000000440)='team\x00') ioctl$DRM_IOCTL_ADD_CTX(r1, 0xc0086420, &(0x7f0000000100)={0x0}) ioctl$DRM_IOCTL_GET_CTX(r1, 0xc0086423, &(0x7f00000002c0)={r5, 0x2}) getsockname$packet(r2, &(0x7f0000008ec0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @dev}, &(0x7f0000008f00)=0x14) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000009080)={'sit0\x00'}) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000009300)={{{@in6=@local, @in6=@loopback}}, {{@in6=@dev}, 0x0, @in6=@dev}}, &(0x7f0000009400)=0xe8) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000009480)={{{@in6=@mcast2, @in6=@dev}}, {{@in=@remote}, 0x0, @in6=@ipv4={[], [], @local}}}, &(0x7f0000009580)=0xe8) getpeername$packet(r0, &(0x7f0000009700)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @dev}, &(0x7f0000009740)=0x14) sendmsg$TEAM_CMD_NOOP(0xffffffffffffffff, &(0x7f0000009c00)={&(0x7f00000000c0)={0x10}, 0xc, &(0x7f0000009bc0)={&(0x7f0000009780)=ANY=[@ANYBLOB='|', @ANYBLOB, @ANYBLOB="04000200", @ANYBLOB="0801020040000100240001006c625f74785f686173685f746f5f706f", @ANYBLOB="0800070000000000400001002400010071756575655f69640000000000000000000000000000000000000000000000000800030003000000080004000000000008000600", @ANYBLOB, @ANYBLOB="4400020040000100240001006c625f74785f686173685f746f5f706f72745f6d617070696e67000000000100080003000300000008000400", @ANYBLOB='\b\x00\a\x00\x00\x00'], 0x8}, 0x1, 0x0, 0x0, 0x5}, 0x0) setsockopt$inet_mreqsrc(0xffffffffffffffff, 0x0, 0x26, &(0x7f0000000240)={@remote={0xac, 0x14, 0x14, 0xbb}, @broadcast=0xffffffff, @loopback=0x7f000001}, 0xc) 2018/04/29 19:59:03 executing program 4: r0 = socket(0x11, 0x100000802, 0x0) r1 = syz_open_dev$tun(&(0x7f0000000100)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000040)={"6966623000faffffffffffffff00", 0x1000000000004002}) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000000)={'ifb0\x00', 0xa201}) read(r1, &(0x7f0000000600)=""/139, 0x8b) socket(0xa, 0x6, 0xfffffff800000000) [ 57.819063] syz-executor6 (7202) used greatest stack depth: 22128 bytes left [ 58.203135] IPVS: Creating netns size=2536 id=9 [ 58.292680] IPVS: Creating netns size=2536 id=10 2018/04/29 19:59:04 executing program 5: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x126, 0x0, 0x0, 0x0, 0x0, 0x400000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000001000)={0x0, {{0xa}}, {{0xa, 0x0, 0x0, @dev={0xfe, 0x80}}}}, 0x108) r1 = syz_open_procfs(0x0, &(0x7f00000000c0)='cmdline\x00') preadv(r1, &(0x7f0000000100), 0x2d9, 0x10400003) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000000)=0x0) r3 = syz_open_pts(0xffffffffffffffff, 0x800) ioctl$TIOCCONS(r3, 0x541d) r4 = syz_open_procfs(r2, &(0x7f00000000c0)='net/if_inet6\x00') readv(r4, &(0x7f00000014c0)=[{&(0x7f00000003c0)=""/4096, 0x1000}], 0x1) connect(r0, &(0x7f0000000340)=@pppol2tpin6={0x18, 0x1, {0x0, r4, 0x4, 0x3, 0x3, 0x0, {0xa, 0x4e24, 0x0, @mcast2={0xff, 0x2, [], 0x1}, 0x2}}}, 0x80) r5 = add_key(&(0x7f0000000200)='encrypted\x00', &(0x7f0000000240)={0x73, 0x79, 0x7a, 0x0}, &(0x7f0000000280)="a8fc31a8e82febd72518765de677850edc4c0dd653c65e05", 0x18, 0xfffffffffffffffe) r6 = syz_genetlink_get_family_id$ipvs(&(0x7f00000001c0)='IPVS\x00') sendmsg$IPVS_CMD_SET_CONFIG(r4, &(0x7f0000001480)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x100008}, 0xc, &(0x7f0000000300)={&(0x7f00000013c0)=ANY=[@ANYBLOB="7047ecd8", @ANYRES16=r6, @ANYBLOB="210b28bd7000ffdbdf250c00000020000300080001000100000014000600000000000000000000000000000000014800010014000300ac1414bb000000000000000000000000080006006e710000080001000a00000008000800ff0100000c0006006c626c63000000000c000700100000001a00000008000400070000000c000100080005000200000004000300"], 0x94}, 0x1, 0x0, 0x0, 0x1}, 0x10) keyctl$restrict_keyring(0x1d, r5, 0x0, &(0x7f00000002c0)='/dev/input/event#\x00') setsockopt$inet_sctp_SCTP_RESET_STREAMS(r4, 0x84, 0x77, &(0x7f0000000180)=ANY=[@ANYRES32=0x0, @ANYBLOB="000009f3ff03025905410d0000022ec64c000000"], 0x1a) syz_open_dev$evdev(&(0x7f0000000140)='/dev/input/event#\x00', 0x2, 0x0) 2018/04/29 19:59:04 executing program 6: r0 = socket(0xa, 0x2, 0x0) r1 = open(&(0x7f00004b8ff8)='./file0\x00', 0x28042, 0x0) connect$inet6(r0, &(0x7f0000d3cfe4)={0xa, 0x0, 0x0, @local={0xfe, 0x80, [], 0xaa}, 0x3}, 0x1c) fallocate(r1, 0x0, 0xffff, 0x1f) connect$inet(r0, &(0x7f0000000040)={0x2, 0x4e22, @remote={0xac, 0x14, 0x14, 0xbb}}, 0x10) perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = open(&(0x7f00000001c0)='./file0\x00', 0x3ffff, 0x100) write$evdev(r2, &(0x7f0000037fe8)=[{}], 0x18) perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x72, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000100)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getsockopt$IPT_SO_GET_REVISION_TARGET(r1, 0x0, 0x43, &(0x7f0000000240)={'ipvs\x00'}, &(0x7f0000000280)=0x1e) sendfile(r2, r2, &(0x7f0000000040), 0x7fc) getsockopt$bt_BT_RCVMTU(r2, 0x112, 0xd, &(0x7f0000000080)=0x8, &(0x7f0000000140)=0x2) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x509}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_inet_SIOCSIFNETMASK(r1, 0x891c, &(0x7f00000002c0)={'teql0\x00', {0x2, 0x4e20, @remote={0xac, 0x14, 0x14, 0xbb}}}) socket$packet(0x11, 0x3, 0x300) socket$packet(0x11, 0x3, 0x300) ioctl$EVIOCSABS2F(r1, 0x401845ef, &(0x7f0000000200)={0x66c7bbd4, 0x9, 0x3f, 0x0, 0xfffffffffffff800, 0x6}) sendfile(r0, r1, &(0x7f00005faff8), 0xfffb) 2018/04/29 19:59:04 executing program 3: perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000001700)=[{{&(0x7f0000000300)=@pppol2tpv3in6={0x0, 0x0, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, @mcast2}}}, 0x80, &(0x7f00000003c0), 0x0, &(0x7f0000000400)=""/185, 0xb9}, 0x3f}, {{&(0x7f00000004c0)=@hci, 0x80, &(0x7f00000016c0)=[{&(0x7f0000000540)=""/119, 0x77}, {&(0x7f0000000680)=""/4096, 0x1000}, {&(0x7f0000001680)=""/29, 0x1d}], 0x3, 0x0, 0x0, 0x50b}, 0xfff}], 0x2, 0x0, &(0x7f0000001780)={0x0, 0x1c9c380}) r0 = open$dir(&(0x7f0000000040)='./file0\x00', 0x1fffe, 0x0) r1 = open(&(0x7f0000000080)='./file0\x00', 0x4001, 0x0) truncate(&(0x7f00000004c0)='./file0\x00', 0x81020e) recvmmsg(r1, &(0x7f0000001fc0)=[{{0x0, 0x0, &(0x7f00000002c0)=[{&(0x7f00000001c0)=""/144, 0x90}, {&(0x7f00000019c0)=""/251, 0xfb}, {&(0x7f0000001ac0)=""/250, 0xfa}, {&(0x7f00000005c0)=""/105, 0x69}], 0x4, &(0x7f00000003c0)=""/8, 0x8, 0x4}, 0xbb61}, {{0x0, 0x0, &(0x7f0000000640), 0x0, 0x0, 0x0, 0x6}}, {{0x0, 0x0, &(0x7f0000001f40)=[{&(0x7f0000001bc0)=""/227, 0xe3}, {&(0x7f00000017c0)=""/14, 0xe}, {&(0x7f0000001cc0)=""/163, 0xa3}, {&(0x7f0000001800)=""/110, 0x6e}, {&(0x7f0000001d80)=""/9, 0x9}, {&(0x7f0000001dc0)=""/163, 0xa3}, {&(0x7f0000001e80)=""/69, 0x45}, {&(0x7f0000001f00)=""/38, 0x26}], 0x8, &(0x7f0000002bc0)=""/4096, 0x1000, 0x4}, 0xdc}], 0x3, 0x20, &(0x7f0000002080)) fcntl$setpipe(r1, 0x407, 0x0) sendfile(r1, r0, &(0x7f0000002b80), 0x8000007fffffff) syz_mount_image$btrfs(&(0x7f0000000140)='btrfs\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0xaaaaaaaaaaaae25, &(0x7f0000000440), 0x0, &(0x7f00000020c0)=ANY=[@ANYBLOB="00e52a4f858dbaf9916083c398288ae9ad08b36adb9a8519a71203b9f0f40dd82ee8e1c88cb6117e24821ae88e29f9da0ea248f3a98092ad83e0e380108aab58da02afdbc9d858e3d5467dee5212d11a1bb429a1ba664a726ceb0012ef22887b0a8518cce92fa0050b81ac053383d0e33b652be95a2e20bb558303125409000000000000000000000000000000"]) unshare(0x40000000) getsockopt$inet_sctp_SCTP_STREAM_SCHEDULER_VALUE(0xffffffffffffff9c, 0x84, 0x7c, &(0x7f0000000140)={0x0, 0x77e}, &(0x7f0000000180)=0x8) setxattr(&(0x7f0000000380)='./file0\x00', &(0x7f0000000280)=@known='com.apple.FinderInfo\x00', &(0x7f0000001880)="0400fee04d90d51ffeac331a86df5abb7e2d447e25266c44107fce128c302d076bf25189d1b1d1060e7afc60c6216ccdcdffff46a63d957f6c72e3d90cc55a622cd2103da4dfdc", 0x47, 0x2) 2018/04/29 19:59:04 executing program 4: socketpair(0xf, 0x2, 0x9, &(0x7f0000000140)={0xffffffffffffffff}) setsockopt$l2tp_PPPOL2TP_SO_DEBUG(0xffffffffffffffff, 0x111, 0x1, 0x1000, 0x4) ioctl$sock_SIOCBRADDBR(0xffffffffffffffff, 0x89a0, &(0x7f0000000900)="746562435f736c6187110b97f6033e00") perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc}, 0x0, 0x0, 0xffffffffffffffff, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) fcntl$lock(0xffffffffffffffff, 0x0, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x3}) r1 = open(&(0x7f0000ae8ff8)='./file0\x00', 0x14104a, 0x0) write$evdev(r1, &(0x7f0000037fe8)=[{}], 0x18) sendfile(r1, r1, &(0x7f0000000040), 0x7fc) stat(&(0x7f0000000300)='./file0\x00', &(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) setfsgid(r2) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8933, &(0x7f0000000080)={'team0\x00', 0x0}) sendto$packet(0xffffffffffffffff, &(0x7f0000000180)="51f4dc5a0d0d4c60ab8fba504dca82773335f5014ac95cc0147e9330cda79d171ee5d8b825f2563068c09aa8d5b77bac1172e0a5a47e0aceab6d9e9ffe59fb9d69d4a37148d37b6c895a1ac145026be9fcf79c54bff82f03925fa83dba4f09824e116af83e5b056d52da11402b498dc941b0020c654904450b76cb3bdcbac12e17218dd6ba5a3e876a33cb2e27", 0x8d, 0x0, &(0x7f0000000240)={0x11, 0x5, r3, 0x1, 0x1192, 0x6, @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff]}, 0x14) write(0xffffffffffffffff, &(0x7f0000002000), 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000640)='./cgroup/syz0\x00', 0x1ff) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000740)='./cgroup/syz1\x00', 0x1ff) syz_open_dev$sndtimer(&(0x7f0000000280)='/dev/snd/timer\x00', 0x0, 0x200000) getsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(0xffffffffffffffff, 0x84, 0x18, &(0x7f00000003c0)={0x0, 0x4e}, &(0x7f0000000400)=0x571b338a1109a371) mkdirat$cgroup(r0, &(0x7f00000002c0)='syz0\x00', 0x1ff) 2018/04/29 19:59:04 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x40000000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(0xffffffffffffffff, 0x84, 0x18, &(0x7f00000000c0), &(0x7f0000000100)=0x8) fstat(r1, &(0x7f0000000240)) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f0000000400)={{{@in6=@local, @in6=@dev}}, {{@in6=@remote}, 0x0, @in=@broadcast}}, &(0x7f00000002c0)=0xe8) sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f0000000340)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x1100010}, 0xc, &(0x7f0000000300)={&(0x7f0000001880)=ANY=[@ANYBLOB="c81200000006000426bd700000"], 0x1c}, 0x1}, 0x8000) getsockopt$inet_sctp6_SCTP_CONTEXT(0xffffffffffffffff, 0x84, 0x11, &(0x7f0000000140), &(0x7f0000000180)=0x8) getsockname$netlink(0xffffffffffffffff, &(0x7f0000001800), &(0x7f0000001840)=0xc) tgkill(0x0, 0x0, 0x0) eventfd2(0x0, 0x1) ioctl$PIO_UNIMAP(0xffffffffffffffff, 0x4b67, &(0x7f00000003c0)={0x1, &(0x7f0000000380)=[{0x5749}]}) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000000)={'lo\x00'}) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000080)={'lo\x00', 0x101}) 2018/04/29 19:59:04 executing program 1: mkdir(&(0x7f0000cb3ff8)='./file0\x00', 0x0) mount(&(0x7f0000000000)='./file1\x00', &(0x7f0000000040)='./file0\x00', &(0x7f00000000c0)='sysfs\x00', 0x0, 0x0) chdir(&(0x7f0000cd2ff8)='./file0\x00') socketpair$inet6_sctp(0xa, 0x5, 0x84, &(0x7f0000000080)={0xffffffffffffffff}) getsockopt$inet_sctp6_SCTP_NODELAY(r0, 0x84, 0x3, &(0x7f0000000140), &(0x7f0000000180)=0x4) r1 = openat$keychord(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/keychord\x00', 0x44c200, 0x0) ioctl$BLKRESETZONE(r1, 0x40101283, &(0x7f0000000200)={0x80000000, 0x5}) getcwd(&(0x7f0000000100)=""/43, 0xb50212942ba8b5af) 2018/04/29 19:59:04 executing program 0: perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000001700)=[{{&(0x7f0000000300)=@pppol2tpv3in6={0x0, 0x0, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, @mcast2}}}, 0x80, &(0x7f00000003c0), 0x0, &(0x7f0000000400)=""/185, 0xb9}, 0x3f}, {{&(0x7f00000004c0)=@hci, 0x80, &(0x7f00000016c0)=[{&(0x7f0000000540)=""/119, 0x77}, {&(0x7f0000000680)=""/4096, 0x1000}, {&(0x7f0000001680)=""/29, 0x1d}], 0x3, 0x0, 0x0, 0x50b}, 0xfff}], 0x2, 0x0, &(0x7f0000001780)={0x0, 0x1c9c380}) r0 = open$dir(&(0x7f0000000040)='./file0\x00', 0x1fffe, 0x0) r1 = open(&(0x7f0000000080)='./file0\x00', 0x4001, 0x0) truncate(&(0x7f00000004c0)='./file0\x00', 0x81020e) recvmmsg(r1, &(0x7f0000001fc0)=[{{0x0, 0x0, &(0x7f00000002c0)=[{&(0x7f00000001c0)=""/144, 0x90}, {&(0x7f00000019c0)=""/251, 0xfb}, {&(0x7f0000001ac0)=""/250, 0xfa}, {&(0x7f00000005c0)=""/105, 0x69}], 0x4, &(0x7f00000003c0)=""/8, 0x8, 0x4}, 0xbb61}, {{0x0, 0x0, &(0x7f0000000640), 0x0, 0x0, 0x0, 0x6}}, {{0x0, 0x0, &(0x7f0000001f40)=[{&(0x7f0000001bc0)=""/227, 0xe3}, {&(0x7f00000017c0)=""/14, 0xe}, {&(0x7f0000001cc0)=""/163, 0xa3}, {&(0x7f0000001800)=""/110, 0x6e}, {&(0x7f0000001d80)=""/9, 0x9}, {&(0x7f0000001dc0)=""/163, 0xa3}, {&(0x7f0000001e80)=""/69, 0x45}, {&(0x7f0000001f00)=""/38, 0x26}], 0x8, &(0x7f0000002bc0)=""/4096, 0x1000, 0x4}, 0xdc}], 0x3, 0x20, &(0x7f0000002080)) fcntl$setpipe(r1, 0x407, 0x0) sendfile(r1, r0, &(0x7f0000002b80), 0x8000007fffffff) syz_mount_image$btrfs(&(0x7f0000000140)='btrfs\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0xaaaaaaaaaaaae25, &(0x7f0000000440), 0x0, &(0x7f00000020c0)=ANY=[@ANYBLOB="00e52a4f858dbaf9916083c398288ae9ad08b36adb9a8519a71203b9f0f40dd82ee8e1c88cb6117e24821ae88e29f9da0ea248f3a98092ad83e0e380108aab58da02afdbc9d858e3d5467dee5212d11a1bb429a1ba664a726ceb0012ef22887b0a8518cce92fa0050b81ac053383d0e33b652be95a2e20bb558303125409000000000000000000000000000000"]) unshare(0x40000000) getsockopt$inet_sctp_SCTP_STREAM_SCHEDULER_VALUE(0xffffffffffffff9c, 0x84, 0x7c, &(0x7f0000000140)={0x0, 0x77e}, &(0x7f0000000180)=0x8) setxattr(&(0x7f0000000380)='./file0\x00', &(0x7f0000000280)=@known='com.apple.FinderInfo\x00', &(0x7f0000001880)="0400fee04d90d51ffeac331a86df5abb7e2d447e25266c44107fce128c302d076bf25189d1b1d1060e7afc60c6216ccdcdffff46a63d957f6c72e3d90cc55a622cd2103da4dfdc", 0x47, 0x2) 2018/04/29 19:59:04 executing program 7: r0 = socket$unix(0x1, 0x2, 0x0) mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x4, 0x32, 0xffffffffffffffff, 0x0) bind(r0, &(0x7f0000557130)=@generic={0x0, "0103000000000000000000000000000009a979f321b30c7bc8790405c7bad62e0a53a632ed4938d36d73fb8f8401a3ff59829a2b0afe7ce43a4b2470a0c5216669ca021f6f65dcf160e7e58f358c0002f0000158d19bcb3151314a8ef1f1622ca5bdb9c8ead2000077aeb81c90001d6d7c980ee590c8b9f70dc136cb184a"}, 0x80) mremap(&(0x7f00003fb000/0x400000)=nil, 0x400000, 0x800000, 0x3, &(0x7f00007fb000/0x800000)=nil) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x80, 0x0) getsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(0xffffffffffffffff, 0x84, 0x18, &(0x7f0000000040)={0x0, 0x3}, &(0x7f0000000080)=0x8) setsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(r1, 0x84, 0xa, &(0x7f00000000c0)={0x8, 0x2, 0x2, 0x8, 0x2, 0xfffffffffffffff9, 0x0, 0x93, r2}, 0x20) 2018/04/29 19:59:04 executing program 7: perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000001700)=[{{&(0x7f0000000300)=@pppol2tpv3in6={0x0, 0x0, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, @mcast2}}}, 0x80, &(0x7f00000003c0), 0x0, &(0x7f0000000400)=""/185, 0xb9}, 0x3f}, {{&(0x7f00000004c0)=@hci, 0x80, &(0x7f00000016c0)=[{&(0x7f0000000540)=""/119, 0x77}, {&(0x7f0000000680)=""/4096, 0x1000}, {&(0x7f0000001680)=""/29, 0x1d}], 0x3, 0x0, 0x0, 0x50b}, 0xfff}], 0x2, 0x0, &(0x7f0000001780)={0x0, 0x1c9c380}) r0 = open$dir(&(0x7f0000000040)='./file0\x00', 0x1fffe, 0x0) r1 = open(&(0x7f0000000080)='./file0\x00', 0x4001, 0x0) truncate(&(0x7f00000004c0)='./file0\x00', 0x81020e) recvmmsg(r1, &(0x7f0000001fc0)=[{{0x0, 0x0, &(0x7f00000002c0)=[{&(0x7f00000001c0)=""/144, 0x90}, {&(0x7f00000019c0)=""/251, 0xfb}, {&(0x7f0000001ac0)=""/250, 0xfa}, {&(0x7f00000005c0)=""/105, 0x69}], 0x4, &(0x7f00000003c0)=""/8, 0x8, 0x4}, 0xbb61}, {{0x0, 0x0, &(0x7f0000000640), 0x0, 0x0, 0x0, 0x6}}, {{0x0, 0x0, &(0x7f0000001f40)=[{&(0x7f0000001bc0)=""/227, 0xe3}, {&(0x7f00000017c0)=""/14, 0xe}, {&(0x7f0000001cc0)=""/163, 0xa3}, {&(0x7f0000001800)=""/110, 0x6e}, {&(0x7f0000001d80)=""/9, 0x9}, {&(0x7f0000001dc0)=""/163, 0xa3}, {&(0x7f0000001e80)=""/69, 0x45}, {&(0x7f0000001f00)=""/38, 0x26}], 0x8, &(0x7f0000002bc0)=""/4096, 0x1000, 0x4}, 0xdc}], 0x3, 0x20, &(0x7f0000002080)) fcntl$setpipe(r1, 0x407, 0x0) sendfile(r1, r0, &(0x7f0000002b80), 0x8000007fffffff) syz_mount_image$btrfs(&(0x7f0000000140)='btrfs\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0xaaaaaaaaaaaae25, &(0x7f0000000440), 0x0, &(0x7f00000020c0)=ANY=[@ANYBLOB="00e52a4f858dbaf9916083c398288ae9ad08b36adb9a8519a71203b9f0f40dd82ee8e1c88cb6117e24821ae88e29f9da0ea248f3a98092ad83e0e380108aab58da02afdbc9d858e3d5467dee5212d11a1bb429a1ba664a726ceb0012ef22887b0a8518cce92fa0050b81ac053383d0e33b652be95a2e20bb558303125409000000000000000000000000000000"]) unshare(0x40000000) getsockopt$inet_sctp_SCTP_STREAM_SCHEDULER_VALUE(0xffffffffffffff9c, 0x84, 0x7c, &(0x7f0000000140)={0x0, 0x77e}, &(0x7f0000000180)=0x8) setxattr(&(0x7f0000000380)='./file0\x00', &(0x7f0000000280)=@known='com.apple.FinderInfo\x00', &(0x7f0000001880)="0400fee04d90d51ffeac331a86df5abb7e2d447e25266c44107fce128c302d076bf25189d1b1d1060e7afc60c6216ccdcdffff46a63d957f6c72e3d90cc55a622cd2103da4dfdc", 0x47, 0x2) 2018/04/29 19:59:04 executing program 1: perf_event_open(&(0x7f000001d000)={0x2, 0x78, 0x71}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x3, 0xfe) r1 = memfd_create(&(0x7f0000000040)='%]\x00', 0x3) ioctl$BLKROGET(r1, 0x125e, &(0x7f0000000080)) bind$inet6(r0, &(0x7f000000d000)={0xa}, 0x1c) getpgid(0xffffffffffffffff) lstat(&(0x7f00000008c0)='./file0\x00', &(0x7f0000000900)) 2018/04/29 19:59:05 executing program 6: r0 = socket(0xa, 0x2, 0x0) r1 = open(&(0x7f00004b8ff8)='./file0\x00', 0x28042, 0x0) connect$inet6(r0, &(0x7f0000d3cfe4)={0xa, 0x0, 0x0, @local={0xfe, 0x80, [], 0xaa}, 0x3}, 0x1c) fallocate(r1, 0x0, 0xffff, 0x1f) connect$inet(r0, &(0x7f0000000040)={0x2, 0x4e22, @remote={0xac, 0x14, 0x14, 0xbb}}, 0x10) perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = open(&(0x7f00000001c0)='./file0\x00', 0x3ffff, 0x100) write$evdev(r2, &(0x7f0000037fe8)=[{}], 0x18) perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x72, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000100)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getsockopt$IPT_SO_GET_REVISION_TARGET(r1, 0x0, 0x43, &(0x7f0000000240)={'ipvs\x00'}, &(0x7f0000000280)=0x1e) sendfile(r2, r2, &(0x7f0000000040), 0x7fc) getsockopt$bt_BT_RCVMTU(r2, 0x112, 0xd, &(0x7f0000000080)=0x8, &(0x7f0000000140)=0x2) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x509}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_inet_SIOCSIFNETMASK(r1, 0x891c, &(0x7f00000002c0)={'teql0\x00', {0x2, 0x4e20, @remote={0xac, 0x14, 0x14, 0xbb}}}) socket$packet(0x11, 0x3, 0x300) socket$packet(0x11, 0x3, 0x300) sendfile(r0, r1, &(0x7f00005faff8), 0xfffb) 2018/04/29 19:59:05 executing program 5: r0 = perf_event_open(&(0x7f000001d000)={0x2, 0x78, 0x71}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pipe2(&(0x7f00000000c0)={0xffffffffffffffff}, 0x84800) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_CLIENT(r1, 0xc0bc5351, &(0x7f0000000100)={0x9, 0x0, 'client0\x00', 0x1, "9e7027fdf50486d5", "9e67864273ea51a3309a13503dffad0c91b50338635544e0bf4c03d5f4ed390a", 0x8000, 0xb4d}) socket$netlink(0x10, 0x3, 0x0) r2 = openat$selinux_avc_cache_stats(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/avc/cache_stats\x00', 0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(r2, 0x1, r0, &(0x7f0000000080)={0x2}) r3 = syz_open_dev$mice(&(0x7f0000117000)='/dev/input/mice\x00', 0x0, 0x0) r4 = epoll_create1(0x0) epoll_ctl$EPOLL_CTL_ADD(r4, 0x1, r3, &(0x7f0000693ff4)={0x40000004}) epoll_pwait(r4, &(0x7f0000000200)=[{}], 0x1, 0x0, &(0x7f0000000240), 0x8) 2018/04/29 19:59:05 executing program 6: r0 = socket(0xa, 0x2, 0x0) r1 = open(&(0x7f00004b8ff8)='./file0\x00', 0x28042, 0x0) connect$inet6(r0, &(0x7f0000d3cfe4)={0xa, 0x0, 0x0, @local={0xfe, 0x80, [], 0xaa}, 0x3}, 0x1c) fallocate(r1, 0x0, 0xffff, 0x1f) connect$inet(r0, &(0x7f0000000040)={0x2, 0x4e22, @remote={0xac, 0x14, 0x14, 0xbb}}, 0x10) perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = open(&(0x7f00000001c0)='./file0\x00', 0x3ffff, 0x100) write$evdev(r2, &(0x7f0000037fe8)=[{}], 0x18) perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x72, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000100)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getsockopt$IPT_SO_GET_REVISION_TARGET(r1, 0x0, 0x43, &(0x7f0000000240)={'ipvs\x00'}, &(0x7f0000000280)=0x1e) sendfile(r2, r2, &(0x7f0000000040), 0x7fc) getsockopt$bt_BT_RCVMTU(r2, 0x112, 0xd, &(0x7f0000000080)=0x8, &(0x7f0000000140)=0x2) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x509}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_inet_SIOCSIFNETMASK(r1, 0x891c, &(0x7f00000002c0)={'teql0\x00', {0x2, 0x4e20, @remote={0xac, 0x14, 0x14, 0xbb}}}) socket$packet(0x11, 0x3, 0x300) socket$packet(0x11, 0x3, 0x300) sendfile(r0, r1, &(0x7f00005faff8), 0xfffb) 2018/04/29 19:59:05 executing program 5: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x72, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000100)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x0) gettid() setsockopt$IP_VS_SO_SET_STARTDAEMON(r0, 0x0, 0x48b, &(0x7f0000000040)={0x2, 'bridge_slave_0\x00'}, 0x18) getsockopt$inet_mtu(r0, 0x0, 0xa, &(0x7f00000000c0), &(0x7f0000000140)=0x4) ioctl$EVIOCGNAME(r1, 0x80404506, &(0x7f0000000180)=""/133) openat$uinput(0xffffffffffffff9c, &(0x7f0000000080)='/dev/uinput\x00', 0x20000, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(r0, 0x0, 0x48c, &(0x7f0000000000)={0x2, 'ifb0\x00'}, 0x18) 2018/04/29 19:59:05 executing program 4: perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f00000000c0)='vfat\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, &(0x7f0000000400), 0x0, &(0x7f0000000600)=ANY=[]) getdents64(0xffffffffffffffff, &(0x7f0000000100)=""/244, 0xf4) getdents64(0xffffffffffffffff, &(0x7f0000000df0)=""/528, 0xff95) socket$netlink(0x10, 0x3, 0x0) r0 = dup2(0xffffffffffffffff, 0xffffffffffffffff) syz_genetlink_get_family_id$ipvs(&(0x7f0000000500)='IPVS\x00') ioctl$KDSETMODE(0xffffffffffffffff, 0x4b3a, 0x0) r1 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000480)='/dev/sequencer2\x00', 0x8001, 0x0) write$cgroup_pid(r1, &(0x7f0000000400)=ANY=[], 0x66a807cfb2e331bf) r2 = accept(r0, &(0x7f00000006c0)=@hci, &(0x7f0000000740)=0x80) getsockopt$IPT_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x40, &(0x7f0000000280)={'raw\x00'}, &(0x7f0000000540)=0x54) r3 = getpgid(0x0) getpgrp(r3) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$KDGKBTYPE(0xffffffffffffffff, 0x4b33, &(0x7f0000000680)) ptrace$poke(0x5, r3, &(0x7f00000003c0), 0x1) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000200), &(0x7f0000000240)=0xc) ioctl$sock_ipx_SIOCAIPXITFCRT(r2, 0x89e0, &(0x7f0000000300)=0x4) lremovexattr(&(0x7f0000000340)='./file0\x00', &(0x7f0000000380)=@known='com.apple.system.Security\x00') ioprio_set$pid(0x1, 0x0, 0x0) r4 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) fallocate(r4, 0x1, 0x0, 0x10000101) [ 59.492812] FAT-fs (loop4): bogus number of reserved sectors [ 59.526817] FAT-fs (loop4): Can't find a valid FAT filesystem 2018/04/29 19:59:05 executing program 6: r0 = socket(0xa, 0x2, 0x0) r1 = open(&(0x7f00004b8ff8)='./file0\x00', 0x28042, 0x0) connect$inet6(r0, &(0x7f0000d3cfe4)={0xa, 0x0, 0x0, @local={0xfe, 0x80, [], 0xaa}, 0x3}, 0x1c) fallocate(r1, 0x0, 0xffff, 0x1f) connect$inet(r0, &(0x7f0000000040)={0x2, 0x4e22, @remote={0xac, 0x14, 0x14, 0xbb}}, 0x10) perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = open(&(0x7f00000001c0)='./file0\x00', 0x3ffff, 0x100) write$evdev(r2, &(0x7f0000037fe8)=[{}], 0x18) perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x72, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000100)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getsockopt$IPT_SO_GET_REVISION_TARGET(r1, 0x0, 0x43, &(0x7f0000000240)={'ipvs\x00'}, &(0x7f0000000280)=0x1e) sendfile(r2, r2, &(0x7f0000000040), 0x7fc) getsockopt$bt_BT_RCVMTU(r2, 0x112, 0xd, &(0x7f0000000080)=0x8, &(0x7f0000000140)=0x2) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x509}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_inet_SIOCSIFNETMASK(r1, 0x891c, &(0x7f00000002c0)={'teql0\x00', {0x2, 0x4e20, @remote={0xac, 0x14, 0x14, 0xbb}}}) socket$packet(0x11, 0x3, 0x300) socket$packet(0x11, 0x3, 0x300) sendfile(r0, r1, &(0x7f00005faff8), 0xfffb) 2018/04/29 19:59:05 executing program 6: r0 = socket(0xa, 0x2, 0x0) r1 = open(&(0x7f00004b8ff8)='./file0\x00', 0x28042, 0x0) connect$inet6(r0, &(0x7f0000d3cfe4)={0xa, 0x0, 0x0, @local={0xfe, 0x80, [], 0xaa}, 0x3}, 0x1c) fallocate(r1, 0x0, 0xffff, 0x1f) connect$inet(r0, &(0x7f0000000040)={0x2, 0x4e22, @remote={0xac, 0x14, 0x14, 0xbb}}, 0x10) perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = open(&(0x7f00000001c0)='./file0\x00', 0x3ffff, 0x100) write$evdev(r2, &(0x7f0000037fe8)=[{}], 0x18) perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x72, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000100)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getsockopt$IPT_SO_GET_REVISION_TARGET(r1, 0x0, 0x43, &(0x7f0000000240)={'ipvs\x00'}, &(0x7f0000000280)=0x1e) sendfile(r2, r2, &(0x7f0000000040), 0x7fc) getsockopt$bt_BT_RCVMTU(r2, 0x112, 0xd, &(0x7f0000000080)=0x8, &(0x7f0000000140)=0x2) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x509}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_inet_SIOCSIFNETMASK(r1, 0x891c, &(0x7f00000002c0)={'teql0\x00', {0x2, 0x4e20, @remote={0xac, 0x14, 0x14, 0xbb}}}) socket$packet(0x11, 0x3, 0x300) ioctl$EVIOCSABS2F(r1, 0x401845ef, &(0x7f0000000200)={0x66c7bbd4, 0x9, 0x3f, 0x0, 0xfffffffffffff800, 0x6}) sendfile(r0, r1, &(0x7f00005faff8), 0xfffb) [ 59.767792] FAT-fs (loop4): bogus number of reserved sectors [ 59.778288] FAT-fs (loop4): Can't find a valid FAT filesystem 2018/04/29 19:59:05 executing program 4: r0 = socket(0xa, 0x2, 0x0) r1 = open(&(0x7f00004b8ff8)='./file0\x00', 0x28042, 0x0) connect$inet6(r0, &(0x7f0000d3cfe4)={0xa, 0x0, 0x0, @local={0xfe, 0x80, [], 0xaa}, 0x3}, 0x1c) fallocate(r1, 0x0, 0xffff, 0x1f) connect$inet(r0, &(0x7f0000000040)={0x2, 0x4e22, @remote={0xac, 0x14, 0x14, 0xbb}}, 0x10) perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = open(&(0x7f00000001c0)='./file0\x00', 0x3ffff, 0x100) write$evdev(r2, &(0x7f0000037fe8)=[{}], 0x18) perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x72, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000100)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getsockopt$IPT_SO_GET_REVISION_TARGET(r1, 0x0, 0x43, &(0x7f0000000240)={'ipvs\x00'}, &(0x7f0000000280)=0x1e) sendfile(r2, r2, &(0x7f0000000040), 0x7fc) getsockopt$bt_BT_RCVMTU(r2, 0x112, 0xd, &(0x7f0000000080)=0x8, &(0x7f0000000140)=0x2) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x509}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_inet_SIOCSIFNETMASK(r1, 0x891c, &(0x7f00000002c0)={'teql0\x00', {0x2, 0x4e20, @remote={0xac, 0x14, 0x14, 0xbb}}}) socket$packet(0x11, 0x3, 0x300) socket$packet(0x11, 0x3, 0x300) sendfile(r0, r1, &(0x7f00005faff8), 0xfffb) [ 60.134115] IPVS: sync thread started: state = BACKUP, mcast_ifn = bridge_slave_0, syncid = 0, id = 0 [ 60.134136] device lo entered promiscuous mode [ 60.144306] device lo left promiscuous mode [ 60.188202] IPVS: stopping backup sync thread 7382 ... INIT: Id "6" respawning too fast: disabled for 5 minutes INIT: Id "3" respawning too fast: disabled for 5 minutes INIT: Id "4" respawning too fast: disabled for 5 minutes INIT: Id "1" respawning too fast: disabled for 5 minutes INIT: Id "2" respawning too fast: disabled for 5 minutes INIT: Id "5" respawning too fast: disabled for 5 minutes [ 245.033688] INFO: task kworker/1:1:24 blocked for more than 120 seconds. [ 245.040600] Not tainted 4.9.96-g71fce1e #10 [ 245.045555] "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. [ 245.053501] kworker/1:1 D26968 24 2 0x00000000 [ 245.059293] Workqueue: events_power_efficient reg_check_chans_work [ 245.065744] ffff8801d9aee000 0000000000000000 ffff8801bc3f4fc0 ffff8801d9a6b000 [ 245.073789] ffff8801db321b98 ffff8801d9bffa18 ffffffff839e240d ffff8801d9aee8c8 [ 245.081805] ffffed003b35dd18 ffff8801d9aee000 00fffc0000000000 ffff8801db322468 [ 245.089865] Call Trace: [ 245.092434] [] ? __schedule+0x64d/0x1bd0 [ 245.098162] [] schedule+0x7f/0x1b0 [ 245.103333] [] schedule_preempt_disabled+0x13/0x20 [ 245.109935] [] mutex_lock_nested+0x326/0x870 [ 245.116405] [] ? rtnl_lock+0x17/0x20 [ 245.121759] [] ? mutex_trylock+0x3e0/0x3e0 [ 245.127744] [] ? HARDIRQ_verbose+0x10/0x10 [ 245.133629] [] rtnl_lock+0x17/0x20 [ 245.138809] [] reg_check_chans_work+0x74/0xd90 [ 245.145059] [] ? regdom_changes+0x140/0x140 [ 245.151007] [] process_one_work+0x7e1/0x1500 [ 245.157185] [] ? process_one_work+0x728/0x1500 [ 245.163396] [] ? pwq_dec_nr_in_flight+0x2e0/0x2e0 [ 245.169914] [] worker_thread+0xd6/0x10a0 [ 245.175629] [] ? __schedule+0x655/0x1bd0 [ 245.181318] [] kthread+0x26d/0x300 [ 245.186513] [] ? process_one_work+0x1500/0x1500 [ 245.192806] [] ? kthread_park+0xa0/0xa0 [ 245.198438] [] ? kthread_park+0xa0/0xa0 [ 245.204055] [] ? kthread_park+0xa0/0xa0 [ 245.209661] [] ret_from_fork+0x5c/0x70 [ 245.215205] [ 245.215205] Showing all locks held in the system: [ 245.221507] 3 locks held by kworker/1:1/24: [ 245.225825] #0: ("events_power_efficient"){.+.+.+}, at: [] process_one_work+0x6ee/0x1500 [ 245.236289] #1: ((reg_check_chans).work){+.+...}, at: [] process_one_work+0x728/0x1500 [ 245.246578] #2: (rtnl_mutex){+.+.+.}, at: [] rtnl_lock+0x17/0x20 [ 245.254935] 2 locks held by khungtaskd/518: [ 245.259235] #0: (rcu_read_lock){......}, at: [] watchdog+0x11c/0xa20 [ 245.267983] #1: (tasklist_lock){.+.+..}, at: [] debug_show_all_locks+0x79/0x218 [ 245.277669] 4 locks held by kworker/u4:3/1617: [ 245.282223] #0: ("%s""netns"){.+.+.+}, at: [] process_one_work+0x6ee/0x1500 [ 245.291568] #1: (net_cleanup_work){+.+.+.}, at: [] process_one_work+0x728/0x1500 [ 245.301324] #2: (net_mutex){+.+.+.}, at: [] cleanup_net+0x13f/0x630 [ 245.309942] #3: (rtnl_mutex){+.+.+.}, at: [] rtnl_lock+0x17/0x20 [ 245.318322] 3 locks held by kworker/0:2/1844: [ 245.322788] #0: ("%s"("ipv6_addrconf")){.+.+..}, at: [] process_one_work+0x6ee/0x1500 [ 245.332981] #1: ((addr_chk_work).work){+.+...}, at: [] process_one_work+0x728/0x1500 [ 245.343088] #2: (rtnl_mutex){+.+.+.}, at: [] rtnl_lock+0x17/0x20 [ 245.351439] 1 lock held by rsyslogd/3640: [ 245.355584] #0: (&f->f_pos_lock){+.+.+.}, at: [] __fdget_pos+0xac/0xd0 [ 245.364460] 2 locks held by getty/3737: [ 245.368403] #0: (&tty->ldisc_sem){++++++}, at: [] ldsem_down_read+0x32/0x40 [ 245.377728] #1: (&ldata->atomic_read_lock){+.+...}, at: [] n_tty_read+0x202/0x16e0 [ 245.387677] 1 lock held by syz-executor0/7348: [ 245.392230] #0: (net_mutex){+.+.+.}, at: [] copy_net_ns+0x155/0x290 [ 245.400864] 1 lock held by syz-executor3/7347: [ 245.405460] #0: (net_mutex){+.+.+.}, at: [] copy_net_ns+0x155/0x290 [ 245.414118] 1 lock held by syz-executor7/7352: [ 245.418682] #0: (net_mutex){+.+.+.}, at: [] copy_net_ns+0x155/0x290 [ 245.427347] 1 lock held by syz-executor5/7381: [ 245.431906] #0: (ipvs->sync_mutex){+.+.+.}, at: [] do_ip_vs_set_ctl+0x645/0xbd0 [ 245.441634] 2 locks held by syz-executor5/7383: [ 245.446307] #0: (rtnl_mutex){+.+.+.}, at: [] rtnl_lock+0x17/0x20 [ 245.454686] #1: (ipvs->sync_mutex){+.+.+.}, at: [] do_ip_vs_set_ctl+0x90d/0xbd0 [ 245.464359] 1 lock held by ipvs-b:3:0/7382: [ 245.468661] #0: (rtnl_mutex){+.+.+.}, at: [] rtnl_lock+0x17/0x20 [ 245.477487] [ 245.479090] ============================================= [ 245.479090] [ 245.486312] NMI backtrace for cpu 1 [ 245.489968] CPU: 1 PID: 518 Comm: khungtaskd Not tainted 4.9.96-g71fce1e #10 [ 245.497127] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 245.506543] ffff8801d87afd08 ffffffff81eb0b69 0000000000000000 0000000000000001 [ 245.514559] 0000000000000001 0000000000000001 ffffffff810b7d60 ffff8801d87afd40 [ 245.522554] ffffffff81ebbe97 0000000000000001 0000000000000000 0000000000000003 [ 245.530561] Call Trace: [ 245.533125] [] dump_stack+0xc1/0x128 [ 245.538464] [] ? irq_force_complete_move+0x320/0x320 [ 245.545189] [] nmi_cpu_backtrace.cold.2+0x48/0x87 [ 245.551655] [] ? irq_force_complete_move+0x320/0x320 [ 245.558383] [] nmi_trigger_cpumask_backtrace+0x12a/0x14f [ 245.565455] [] arch_trigger_cpumask_backtrace+0x14/0x20 [ 245.572456] [] watchdog+0x6b4/0xa20 [ 245.577710] [] ? watchdog+0x11c/0xa20 [ 245.583140] [] kthread+0x26d/0x300 [ 245.588314] [] ? reset_hung_task_detector+0x20/0x20 [ 245.594959] [] ? kthread_park+0xa0/0xa0 [ 245.600560] [] ? kthread_park+0xa0/0xa0 [ 245.606157] [] ? kthread_park+0xa0/0xa0 [ 245.611776] [] ret_from_fork+0x5c/0x70 [ 245.617428] Sending NMI from CPU 1 to CPUs 0: [ 245.621931] NMI backtrace for cpu 0 skipped: idling at pc 0xffffffff839f1f16 [ 245.629317] Kernel panic - not syncing: hung_task: blocked tasks [ 245.635478] CPU: 1 PID: 518 Comm: khungtaskd Not tainted 4.9.96-g71fce1e #10 [ 245.642643] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 245.651979] ffff8801d87afcc8 ffffffff81eb0b69 ffffffff83a8b4e0 00000000ffffffff [ 245.659991] 0000000000000000 0000000000000001 dffffc0000000000 ffff8801d87afd88 [ 245.668024] ffffffff8141f975 0000000041b58ab3 ffffffff841b8030 ffffffff8141f7b6 [ 245.676089] Call Trace: [ 245.678651] [] dump_stack+0xc1/0x128 [ 245.684001] [] panic+0x1bf/0x3bc [ 245.688989] [] ? add_taint.cold.6+0x16/0x16 [ 245.694936] [] ? ___preempt_schedule+0x16/0x18 [ 245.701493] [] ? nmi_trigger_cpumask_backtrace+0x100/0x14f [ 245.708745] [] watchdog+0x6c5/0xa20 [ 245.713996] [] ? watchdog+0x11c/0xa20 [ 245.719432] [] kthread+0x26d/0x300 [ 245.724596] [] ? reset_hung_task_detector+0x20/0x20 [ 245.731234] [] ? kthread_park+0xa0/0xa0 [ 245.736830] [] ? kthread_park+0xa0/0xa0 [ 245.742428] [] ? kthread_park+0xa0/0xa0 [ 245.748036] [] ret_from_fork+0x5c/0x70 [ 245.754080] Dumping ftrace buffer: [ 245.757681] (ftrace buffer empty) [ 245.761367] Kernel Offset: disabled [ 245.764990] Rebooting in 86400 seconds..