0000000180)=ANY=[@ANYBLOB="7f454c4601010004070000000000000002003f0001800000200200000000000040000000000000008300000000000000f52f0000ac40380001000300018009000400000000ffffff020000000000000009000000000000005e0000000000"], 0x5e) 2018/05/15 08:24:48 executing program 6: clock_settime(0x6, &(0x7f0000000380)={0x0, 0x1c9c380}) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f00000000c0)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000400), 0x0, &(0x7f0000000600)=ANY=[]) getdents64(0xffffffffffffffff, &(0x7f0000000100)=""/244, 0xf4) getdents64(0xffffffffffffffff, &(0x7f0000000df0)=""/528, 0xff95) r0 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) socketpair$inet6_sctp(0xa, 0x5, 0x84, &(0x7f0000000240)) fallocate(r0, 0x1, 0x0, 0x10000101) socket$inet6_udp(0xa, 0x2, 0x0) 2018/05/15 08:24:48 executing program 3: syz_emit_ethernet(0x3e, &(0x7f00000001c0)={@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, @dev={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa]}, [], {@ipv6={0x86dd, {0x0, 0x6, "50a09c", 0x8, 0xffffff87, 0x0, @remote={0xfe, 0x80, [0x0, 0x0, 0xc0ffffff], 0xbb}, @local={0xfe, 0x80, [], 0xaa}, {[], @udp={0x0, 0x0, 0x8}}}}}}, &(0x7f0000000040)) 2018/05/15 08:24:48 executing program 1: clock_settime(0x6, &(0x7f0000000380)={0x0, 0x1c9c380}) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f00000000c0)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000400), 0x0, &(0x7f0000000600)=ANY=[]) getdents64(0xffffffffffffffff, &(0x7f0000000100)=""/244, 0xf4) getdents64(0xffffffffffffffff, &(0x7f0000000df0)=""/528, 0xff95) socket$netlink(0x10, 0x3, 0x0) r0 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) socketpair$inet6_sctp(0xa, 0x5, 0x84, &(0x7f0000000240)) fallocate(r0, 0x1, 0x0, 0x10000101) socket$inet6_udp(0xa, 0x2, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000040)={{{@in=@broadcast, @in=@multicast2}}, {{@in=@broadcast}, 0x0, @in6}}, &(0x7f0000000140)=0xe8) [ 419.279450] FAT-fs (loop1): bogus number of reserved sectors [ 419.285451] FAT-fs (loop1): Can't find a valid FAT filesystem 2018/05/15 08:24:48 executing program 0: r0 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer\x00', 0x82002, 0x0) write$binfmt_elf64(r0, &(0x7f0000000180)=ANY=[@ANYBLOB="7f454c4601010004070000000000000002003f0001800000200200000000000040000000000000008300000000000000f52f0000ac40380001000300018009000400000000ffffff020000000000000009000000000000005e0000000000"], 0x5e) 2018/05/15 08:24:48 executing program 2: syz_emit_ethernet(0x3e, &(0x7f00000001c0)={@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, @dev={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa]}, [], {@ipv6={0x86dd, {0x0, 0x6, "50a09c", 0x8, 0x0, 0x0, @remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0xe00], 0xbb}, @local={0xfe, 0x80, [], 0xaa}, {[], @udp={0x0, 0x0, 0x8}}}}}}, &(0x7f0000000040)) 2018/05/15 08:24:48 executing program 3: syz_emit_ethernet(0x3e, &(0x7f00000001c0)={@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, @dev={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa]}, [], {@ipv6={0x86dd, {0x0, 0x6, "50a09c", 0x8, 0xffffff87, 0x0, @remote={0xfe, 0x80, [0x0, 0x0, 0xffffffc0], 0xbb}, @local={0xfe, 0x80, [], 0xaa}, {[], @udp={0x0, 0x0, 0x8}}}}}}, &(0x7f0000000040)) [ 419.342394] FAT-fs (loop4): bogus number of reserved sectors [ 419.348471] FAT-fs (loop4): Can't find a valid FAT filesystem [ 419.371241] FAT-fs (loop5): bogus number of reserved sectors [ 419.377302] FAT-fs (loop5): Can't find a valid FAT filesystem [ 419.382426] FAT-fs (loop6): bogus number of reserved sectors [ 419.389350] FAT-fs (loop6): Can't find a valid FAT filesystem [ 419.397780] FAT-fs (loop7): bogus number of reserved sectors [ 419.404106] FAT-fs (loop7): Can't find a valid FAT filesystem 2018/05/15 08:24:48 executing program 0: r0 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer\x00', 0x82002, 0x0) write$binfmt_elf64(r0, &(0x7f0000000180)=ANY=[@ANYBLOB="7f454c4601010004070000000000000002003f0001800000200200000000000040000000000000008300000000000000f52f0000ac40380001000300018009000400000000ffffff020000000000000009000000000000005e0000000000"], 0x5e) 2018/05/15 08:24:49 executing program 2: syz_emit_ethernet(0x3e, &(0x7f00000001c0)={@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, @dev={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa]}, [], {@ipv6={0x86dd, {0x0, 0x6, "50a09c", 0x8, 0x0, 0x0, @remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x3f00], 0xbb}, @local={0xfe, 0x80, [], 0xaa}, {[], @udp={0x0, 0x0, 0x8}}}}}}, &(0x7f0000000040)) 2018/05/15 08:24:49 executing program 3: syz_emit_ethernet(0x3e, &(0x7f00000001c0)={@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, @dev={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa]}, [], {@ipv6={0x86dd, {0x0, 0x6, "50a09c", 0x8, 0xffffff87, 0x0, @remote={0xfe, 0x80, [0x0, 0x0, 0x3800], 0xbb}, @local={0xfe, 0x80, [], 0xaa}, {[], @udp={0x0, 0x0, 0x8}}}}}}, &(0x7f0000000040)) 2018/05/15 08:24:49 executing program 1: clock_settime(0x6, &(0x7f0000000380)={0x0, 0x1c9c380}) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f00000000c0)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000400), 0x0, &(0x7f0000000600)=ANY=[]) getdents64(0xffffffffffffffff, &(0x7f0000000100)=""/244, 0xf4) getdents64(0xffffffffffffffff, &(0x7f0000000df0)=""/528, 0xff95) socket$netlink(0x10, 0x3, 0x0) r0 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) socketpair$inet6_sctp(0xa, 0x5, 0x84, &(0x7f0000000240)) fallocate(r0, 0x1, 0x0, 0x10000101) socket$inet6_udp(0xa, 0x2, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000040)={{{@in=@broadcast, @in=@multicast2}}, {{@in=@broadcast}, 0x0, @in6}}, &(0x7f0000000140)=0xe8) 2018/05/15 08:24:49 executing program 5: clock_settime(0x6, &(0x7f0000000380)={0x0, 0x1c9c380}) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f00000000c0)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000400), 0x0, &(0x7f0000000600)=ANY=[]) getdents64(0xffffffffffffffff, &(0x7f0000000100)=""/244, 0xf4) getdents64(0xffffffffffffffff, &(0x7f0000000df0)=""/528, 0xff95) socket$netlink(0x10, 0x3, 0x0) r0 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) socketpair$inet6_sctp(0xa, 0x5, 0x84, &(0x7f0000000240)) fallocate(r0, 0x1, 0x0, 0x10000101) socket$inet6_udp(0xa, 0x2, 0x0) 2018/05/15 08:24:49 executing program 0: r0 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer\x00', 0x82002, 0x0) write$binfmt_elf64(r0, &(0x7f0000000180)=ANY=[@ANYBLOB="7f454c4601010004070000000000000002003f0001800000200200000000000040000000000000008300000000000000f52f0000ac40380001000300018009000400000000ffffff020000000000000009000000000000005e0000000000000001000000000000000100000000"], 0x6d) 2018/05/15 08:24:49 executing program 6: clock_settime(0x6, &(0x7f0000000380)={0x0, 0x1c9c380}) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f00000000c0)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000400), 0x0, &(0x7f0000000600)=ANY=[]) getdents64(0xffffffffffffffff, &(0x7f0000000100)=""/244, 0xf4) getdents64(0xffffffffffffffff, &(0x7f0000000df0)=""/528, 0xff95) socket$netlink(0x10, 0x3, 0x0) r0 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) socketpair$inet6_sctp(0xa, 0x5, 0x84, &(0x7f0000000240)) fallocate(r0, 0x1, 0x0, 0x10000101) socket$inet6_udp(0xa, 0x2, 0x0) 2018/05/15 08:24:49 executing program 7: getpgrp(0xffffffffffffffff) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000040)=0x0) r1 = syz_open_procfs(r0, &(0x7f0000000140)='net/igmp\x00') sendfile(r1, r1, &(0x7f0000000000)=0xffffffd, 0x7fffffff) 2018/05/15 08:24:49 executing program 4: pipe2(&(0x7f0000000480)={0xffffffffffffffff, 0xffffffffffffffff}, 0x800) getsockopt(r0, 0x1, 0x2, &(0x7f00000004c0)=""/17, &(0x7f0000000500)=0x11) r1 = syz_open_dev$sndpcmc(&(0x7f0000000180)='/dev/snd/pcmC#D#c\x00', 0x7fff, 0x80800) setsockopt$inet6_tcp_TCP_MD5SIG(r1, 0x6, 0xe, &(0x7f0000000340)={@in={{0x2, 0x4e24, @broadcast=0xffffffff}}, 0xff, 0x5, 0xb7, "6991500186dfb925243634551ec888502a85da4933ce5e99fc4ba01522919cfd7d55719977c2ada1586b1974f946014b60cec6f6d75e7a1260dc210258aa5efd3ac27a6f666f67f0311a45fe1e9fc99f"}, 0x54) r2 = syz_open_procfs(0x0, &(0x7f0000000280)="6e65742f6970365f7461626c65735f6d61746368657300b6e23bcf6093cb57f8b4d285e9c48608549acee9a66f09d47a011dcc8f5af7870c6c1b6eebe85ebea4ecda4e44def87e8ee568c843daaf2805944012bc0144937e8b04411d09016ca07f7388ded591e346fb612397e79a6fe43e5c6a86bee1565b17b22b8ed5c95b4afbb3a620d1402c50bbaad790d0ffdb7c5a27e60423079f77bf") bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0xf, 0x81, 0x3, 0x1, 0x27, r2, 0x6}, 0x2c) ioctl$SG_GET_RESERVED_SIZE(r2, 0x2272, &(0x7f0000000100)) ustat(0x3, &(0x7f0000000140)) getsockopt$inet6_mtu(r2, 0x29, 0x17, &(0x7f0000000080), &(0x7f00000000c0)=0x4) ioctl$EVIOCGKEYCODE_V2(r1, 0x80284504, &(0x7f00000001c0)=""/150) ioctl$TUNGETFEATURES(r2, 0x800454cf, &(0x7f0000000440)) ioctl$PERF_EVENT_IOC_DISABLE(r2, 0x2401, 0x0) sendfile(r2, r2, &(0x7f0000000000)=0xffffffd, 0x7fffffff) 2018/05/15 08:24:49 executing program 3: syz_emit_ethernet(0x3e, &(0x7f00000001c0)={@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, @dev={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa]}, [], {@ipv6={0x86dd, {0x0, 0x6, "50a09c", 0x8, 0xffffff87, 0x0, @remote={0xfe, 0x80, [0x0, 0x0, 0xfffffffe], 0xbb}, @local={0xfe, 0x80, [], 0xaa}, {[], @udp={0x0, 0x0, 0x8}}}}}}, &(0x7f0000000040)) [ 420.009678] FAT-fs (loop1): bogus number of reserved sectors [ 420.015645] FAT-fs (loop1): Can't find a valid FAT filesystem 2018/05/15 08:24:49 executing program 2: syz_emit_ethernet(0x3e, &(0x7f00000001c0)={@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, @dev={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa]}, [], {@ipv6={0x86dd, {0x0, 0x6, "50a09c", 0x8, 0x0, 0x0, @remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x28], 0xbb}, @local={0xfe, 0x80, [], 0xaa}, {[], @udp={0x0, 0x0, 0x8}}}}}}, &(0x7f0000000040)) 2018/05/15 08:24:49 executing program 0: r0 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer\x00', 0x82002, 0x0) write$binfmt_elf64(r0, &(0x7f0000000180)=ANY=[@ANYBLOB="7f454c4601010004070000000000000002003f0001800000200200000000000040000000000000008300000000000000f52f0000ac40380001000300018009000400000000ffffff020000000000000009000000000000005e0000000000000001000000000000000100000000"], 0x6d) 2018/05/15 08:24:49 executing program 4: r0 = accept4$ipx(0xffffffffffffffff, &(0x7f0000000040), &(0x7f0000000080)=0x10, 0x80800) ioctl$sock_inet_SIOCSIFPFLAGS(r0, 0x8934, &(0x7f00000000c0)={'syz_tun\x00', 0x3ff}) r1 = syz_open_procfs(0x0, &(0x7f0000000280)="6e65742f6970365f7461626c65735f6d61746368657300b6e23bcf6093cb57f8b4d285e9c48608549acee9a66f09d47a011dcc8f5af7870c6c1b6eebe85ebea4ecda4e44def87e8ee568c843daaf2805944012bc0144937e8b04411d09016ca07f7388ded591e346fb612397e79a6fe43e5c6a86bee1565b17b22b8ed5c95b4afbb3a620d1402c50bbaad790d0ffdb7c5a27e60423079f77bf") sendfile(r1, r1, &(0x7f0000000000)=0xfffffff, 0xffffffff) [ 420.079818] FAT-fs (loop6): bogus number of reserved sectors [ 420.086056] FAT-fs (loop6): Can't find a valid FAT filesystem [ 420.095730] FAT-fs (loop5): bogus number of reserved sectors [ 420.101730] FAT-fs (loop5): Can't find a valid FAT filesystem 2018/05/15 08:24:49 executing program 7: getpgrp(0xffffffffffffffff) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000040)=0x0) r1 = syz_open_procfs(r0, &(0x7f0000000140)='net/igmp\x00') sendfile(r1, r1, &(0x7f0000000000)=0xffffffd, 0x7fffffff) 2018/05/15 08:24:49 executing program 2: syz_emit_ethernet(0x3e, &(0x7f00000001c0)={@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, @dev={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa]}, [], {@ipv6={0x86dd, {0x0, 0x6, "50a09c", 0x8, 0x0, 0x0, @remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x3a00], 0xbb}, @local={0xfe, 0x80, [], 0xaa}, {[], @udp={0x0, 0x0, 0x8}}}}}}, &(0x7f0000000040)) 2018/05/15 08:24:49 executing program 3: syz_emit_ethernet(0x3e, &(0x7f00000001c0)={@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, @dev={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa]}, [], {@ipv6={0x86dd, {0x0, 0x6, "50a09c", 0x8, 0xffffff87, 0x0, @remote={0xfe, 0x80, [0x0, 0x0, 0x11], 0xbb}, @local={0xfe, 0x80, [], 0xaa}, {[], @udp={0x0, 0x0, 0x8}}}}}}, &(0x7f0000000040)) 2018/05/15 08:24:49 executing program 0: r0 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer\x00', 0x82002, 0x0) write$binfmt_elf64(r0, &(0x7f0000000180)=ANY=[@ANYBLOB="7f454c4601010004070000000000000002003f0001800000200200000000000040000000000000008300000000000000f52f0000ac40380001000300018009000400000000ffffff020000000000000009000000000000005e0000000000000001000000000000000100000000"], 0x6d) 2018/05/15 08:24:49 executing program 4: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) 2018/05/15 08:24:49 executing program 1: clock_settime(0x6, &(0x7f0000000380)={0x0, 0x1c9c380}) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f00000000c0)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000400), 0x0, &(0x7f0000000600)=ANY=[]) getdents64(0xffffffffffffffff, &(0x7f0000000100)=""/244, 0xf4) getdents64(0xffffffffffffffff, &(0x7f0000000df0)=""/528, 0xff95) socket$netlink(0x10, 0x3, 0x0) r0 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) socketpair$inet6_sctp(0xa, 0x5, 0x84, &(0x7f0000000240)) fallocate(r0, 0x1, 0x0, 0x10000101) socket$inet6_udp(0xa, 0x2, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000040)={{{@in=@broadcast, @in=@multicast2}}, {{@in=@broadcast}, 0x0, @in6}}, &(0x7f0000000140)=0xe8) 2018/05/15 08:24:49 executing program 0: r0 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer\x00', 0x82002, 0x0) write$binfmt_elf64(r0, &(0x7f0000000180)=ANY=[@ANYBLOB="7f454c4601010004070000000000000002003f0001800000200200000000000040000000000000008300000000000000f52f0000ac40380001000300018009000400000000ffffff020000000000000009000000000000005e00000000000000010000000000000001000000000000000700000000"], 0x75) [ 420.453279] FAT-fs (loop1): bogus number of reserved sectors [ 420.459196] FAT-fs (loop1): Can't find a valid FAT filesystem 2018/05/15 08:24:49 executing program 5: r0 = fcntl$getown(0xffffffffffffffff, 0x9) r1 = syz_open_procfs(r0, &(0x7f0000000280)='net/ptype\x00') r2 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x0) ioctl$EVIOCSFF(r2, 0x40304580, &(0x7f0000000100)=ANY=[@ANYBLOB="00000000000018000000000000000000000000000000000000000000000000000000000000000000"]) sendfile(r1, r1, &(0x7f0000000000)=0xffffffd, 0x7fffffff) 2018/05/15 08:24:49 executing program 2: syz_emit_ethernet(0x3e, &(0x7f00000001c0)={@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, @dev={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa]}, [], {@ipv6={0x86dd, {0x0, 0x6, "50a09c", 0x8, 0x0, 0x0, @remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffe], 0xbb}, @local={0xfe, 0x80, [], 0xaa}, {[], @udp={0x0, 0x0, 0x8}}}}}}, &(0x7f0000000040)) 2018/05/15 08:24:49 executing program 3: syz_emit_ethernet(0x3e, &(0x7f00000001c0)={@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, @dev={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa]}, [], {@ipv6={0x86dd, {0x0, 0x6, "50a09c", 0x8, 0xffffff87, 0x0, @remote={0xfe, 0x80, [0x0, 0x0, 0x689], 0xbb}, @local={0xfe, 0x80, [], 0xaa}, {[], @udp={0x0, 0x0, 0x8}}}}}}, &(0x7f0000000040)) 2018/05/15 08:24:49 executing program 4: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) 2018/05/15 08:24:49 executing program 0: r0 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer\x00', 0x82002, 0x0) write$binfmt_elf64(r0, &(0x7f0000000180)=ANY=[@ANYBLOB="7f454c4601010004070000000000000002003f0001800000200200000000000040000000000000008300000000000000f52f0000ac40380001000300018009000400000000ffffff020000000000000009000000000000005e00000000000000010000000000000001000000000000000700000000"], 0x75) 2018/05/15 08:24:49 executing program 7: getpgrp(0xffffffffffffffff) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000040)=0x0) r1 = syz_open_procfs(r0, &(0x7f0000000140)='net/igmp\x00') sendfile(r1, r1, &(0x7f0000000000)=0xffffffd, 0x7fffffff) 2018/05/15 08:24:49 executing program 1: clock_settime(0x6, &(0x7f0000000380)={0x0, 0x1c9c380}) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f00000000c0)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000400), 0x0, &(0x7f0000000600)=ANY=[]) getdents64(0xffffffffffffffff, &(0x7f0000000100)=""/244, 0xf4) getdents64(0xffffffffffffffff, &(0x7f0000000df0)=""/528, 0xff95) socket$netlink(0x10, 0x3, 0x0) r0 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) socketpair$inet6_sctp(0xa, 0x5, 0x84, &(0x7f0000000240)) fallocate(r0, 0x1, 0x0, 0x10000101) socket$inet6_udp(0xa, 0x2, 0x0) 2018/05/15 08:24:49 executing program 6: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/loop-control\x00', 0x0, 0x0) r1 = ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r1) 2018/05/15 08:24:50 executing program 0: r0 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer\x00', 0x82002, 0x0) write$binfmt_elf64(r0, &(0x7f0000000180)=ANY=[@ANYBLOB="7f454c4601010004070000000000000002003f0001800000200200000000000040000000000000008300000000000000f52f0000ac40380001000300018009000400000000ffffff020000000000000009000000000000005e00000000000000010000000000000001000000000000000700000000"], 0x75) [ 420.700314] FAT-fs (loop1): bogus number of reserved sectors [ 420.706285] FAT-fs (loop1): Can't find a valid FAT filesystem 2018/05/15 08:24:50 executing program 4: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) 2018/05/15 08:24:50 executing program 6: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/loop-control\x00', 0x0, 0x0) r1 = ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r1) 2018/05/15 08:24:50 executing program 3: syz_emit_ethernet(0x3e, &(0x7f00000001c0)={@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, @dev={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa]}, [], {@ipv6={0x86dd, {0x0, 0x6, "50a09c", 0x8, 0xffffff87, 0x0, @remote={0xfe, 0x80, [0x0, 0x0, 0xfffffffffffff000], 0xbb}, @local={0xfe, 0x80, [], 0xaa}, {[], @udp={0x0, 0x0, 0x8}}}}}}, &(0x7f0000000040)) 2018/05/15 08:24:50 executing program 7: getpgrp(0xffffffffffffffff) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000040)) sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000000)=0xffffffd, 0x7fffffff) 2018/05/15 08:24:50 executing program 1: clock_settime(0x6, &(0x7f0000000380)={0x0, 0x1c9c380}) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f00000000c0)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000400), 0x0, &(0x7f0000000600)=ANY=[]) getdents64(0xffffffffffffffff, &(0x7f0000000100)=""/244, 0xf4) getdents64(0xffffffffffffffff, &(0x7f0000000df0)=""/528, 0xff95) socket$netlink(0x10, 0x3, 0x0) r0 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) socketpair$inet6_sctp(0xa, 0x5, 0x84, &(0x7f0000000240)) fallocate(r0, 0x1, 0x0, 0x10000101) 2018/05/15 08:24:50 executing program 2: syz_emit_ethernet(0x3e, &(0x7f00000001c0)={@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, @dev={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa]}, [], {@ipv6={0x86dd, {0x0, 0x6, "50a09c", 0x8, 0x0, 0x0, @remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x6], 0xbb}, @local={0xfe, 0x80, [], 0xaa}, {[], @udp={0x0, 0x0, 0x8}}}}}}, &(0x7f0000000040)) 2018/05/15 08:24:50 executing program 5: r0 = fcntl$getown(0xffffffffffffffff, 0x9) r1 = syz_open_procfs(r0, &(0x7f0000000280)='net/ptype\x00') r2 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x0) ioctl$EVIOCSFF(r2, 0x40304580, &(0x7f0000000100)=ANY=[@ANYBLOB="00000000000018000000000000000000000000000000000000000000000000000000000000000000"]) sendfile(r1, r1, &(0x7f0000000000)=0xffffffd, 0x7fffffff) 2018/05/15 08:24:50 executing program 3: syz_emit_ethernet(0x3e, &(0x7f00000001c0)={@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, @dev={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa]}, [], {@ipv6={0x86dd, {0x0, 0x6, "50a09c", 0x8, 0xffffff87, 0x0, @remote={0xfe, 0x80, [0x0, 0x0, 0x5000000], 0xbb}, @local={0xfe, 0x80, [], 0xaa}, {[], @udp={0x0, 0x0, 0x8}}}}}}, &(0x7f0000000040)) 2018/05/15 08:24:50 executing program 0: r0 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer\x00', 0x82002, 0x0) write$binfmt_elf64(r0, &(0x7f0000000180)=ANY=[@ANYBLOB="7f454c4601010004070000000000000002003f0001800000200200000000000040000000000000008300000000000000f52f0000ac40380001000300018009000400000000ffffff020000000000000009000000000000005e00000000000000010000000000000001000000000000000700000000000000c7"], 0x79) 2018/05/15 08:24:50 executing program 4: ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) [ 420.916831] FAT-fs (loop1): bogus number of reserved sectors [ 420.922762] FAT-fs (loop1): Can't find a valid FAT filesystem 2018/05/15 08:24:50 executing program 6: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/loop-control\x00', 0x0, 0x0) r1 = ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r1) 2018/05/15 08:24:50 executing program 2: syz_emit_ethernet(0x3e, &(0x7f00000001c0)={@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, @dev={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa]}, [], {@ipv6={0x86dd, {0x0, 0x6, "50a09c", 0x8, 0x0, 0x0, @remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x4305000000000000], 0xbb}, @local={0xfe, 0x80, [], 0xaa}, {[], @udp={0x0, 0x0, 0x8}}}}}}, &(0x7f0000000040)) 2018/05/15 08:24:50 executing program 7: getpgrp(0xffffffffffffffff) r0 = syz_open_procfs(0x0, &(0x7f0000000140)='net/igmp\x00') sendfile(r0, r0, &(0x7f0000000000)=0xffffffd, 0x7fffffff) 2018/05/15 08:24:50 executing program 5: r0 = fcntl$getown(0xffffffffffffffff, 0x9) r1 = syz_open_procfs(r0, &(0x7f0000000280)='net/ptype\x00') r2 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x0) ioctl$EVIOCSFF(r2, 0x40304580, &(0x7f0000000100)=ANY=[@ANYBLOB="00000000000018000000000000000000000000000000000000000000000000000000000000000000"]) sendfile(r1, r1, &(0x7f0000000000)=0xffffffd, 0x7fffffff) 2018/05/15 08:24:50 executing program 1: clock_settime(0x6, &(0x7f0000000380)={0x0, 0x1c9c380}) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f00000000c0)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000400), 0x0, &(0x7f0000000600)=ANY=[]) getdents64(0xffffffffffffffff, &(0x7f0000000100)=""/244, 0xf4) getdents64(0xffffffffffffffff, &(0x7f0000000df0)=""/528, 0xff95) socket$netlink(0x10, 0x3, 0x0) r0 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) fallocate(r0, 0x1, 0x0, 0x10000101) 2018/05/15 08:24:50 executing program 0: r0 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer\x00', 0x82002, 0x0) write$binfmt_elf64(r0, &(0x7f0000000180)=ANY=[@ANYBLOB="7f454c4601010004070000000000000002003f0001800000200200000000000040000000000000008300000000000000f52f0000ac40380001000300018009000400000000ffffff020000000000000009000000000000005e00000000000000010000000000000001000000000000000700000000000000c7"], 0x79) 2018/05/15 08:24:50 executing program 3: syz_emit_ethernet(0x3e, &(0x7f00000001c0)={@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, @dev={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa]}, [], {@ipv6={0x86dd, {0x0, 0x6, "50a09c", 0x8, 0xffffff87, 0x0, @remote={0xfe, 0x80, [0x0, 0x0, 0x11000000], 0xbb}, @local={0xfe, 0x80, [], 0xaa}, {[], @udp={0x0, 0x0, 0x8}}}}}}, &(0x7f0000000040)) 2018/05/15 08:24:50 executing program 4: ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) 2018/05/15 08:24:50 executing program 7: r0 = syz_open_procfs(0x0, &(0x7f0000000140)='net/igmp\x00') sendfile(r0, r0, &(0x7f0000000000)=0xffffffd, 0x7fffffff) 2018/05/15 08:24:50 executing program 2: syz_emit_ethernet(0x3e, &(0x7f00000001c0)={@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, @dev={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa]}, [], {@ipv6={0x86dd, {0x0, 0x6, "50a09c", 0x8, 0x0, 0x0, @remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0xdc050000], 0xbb}, @local={0xfe, 0x80, [], 0xaa}, {[], @udp={0x0, 0x0, 0x8}}}}}}, &(0x7f0000000040)) 2018/05/15 08:24:50 executing program 5: r0 = fcntl$getown(0xffffffffffffffff, 0x9) r1 = syz_open_procfs(r0, &(0x7f0000000280)='net/ptype\x00') syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x0) sendfile(r1, r1, &(0x7f0000000000)=0xffffffd, 0x7fffffff) 2018/05/15 08:24:50 executing program 0: r0 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer\x00', 0x82002, 0x0) write$binfmt_elf64(r0, &(0x7f0000000180)=ANY=[@ANYBLOB="7f454c4601010004070000000000000002003f0001800000200200000000000040000000000000008300000000000000f52f0000ac40380001000300018009000400000000ffffff020000000000000009000000000000005e00000000000000010000000000000001000000000000000700000000000000c7"], 0x79) [ 421.178314] FAT-fs (loop1): bogus number of reserved sectors [ 421.184311] FAT-fs (loop1): Can't find a valid FAT filesystem 2018/05/15 08:24:50 executing program 4: ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) 2018/05/15 08:24:50 executing program 6: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) 2018/05/15 08:24:50 executing program 3: syz_emit_ethernet(0x3e, &(0x7f00000001c0)={@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, @dev={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa]}, [], {@ipv6={0x86dd, {0x0, 0x6, "50a09c", 0x8, 0xffffff87, 0x0, @remote={0xfe, 0x80, [0x0, 0x0, 0x5], 0xbb}, @local={0xfe, 0x80, [], 0xaa}, {[], @udp={0x0, 0x0, 0x8}}}}}}, &(0x7f0000000040)) 2018/05/15 08:24:50 executing program 7: r0 = syz_open_procfs(0x0, &(0x7f0000000140)='net/igmp\x00') sendfile(0xffffffffffffffff, r0, &(0x7f0000000000)=0xffffffd, 0x7fffffff) 2018/05/15 08:24:50 executing program 2: syz_emit_ethernet(0x3e, &(0x7f00000001c0)={@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, @dev={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa]}, [], {@ipv6={0x86dd, {0x0, 0x6, "50a09c", 0x8, 0x0, 0x0, @remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x89060000], 0xbb}, @local={0xfe, 0x80, [], 0xaa}, {[], @udp={0x0, 0x0, 0x8}}}}}}, &(0x7f0000000040)) 2018/05/15 08:24:50 executing program 1: clock_settime(0x6, &(0x7f0000000380)={0x0, 0x1c9c380}) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f00000000c0)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000400), 0x0, &(0x7f0000000600)=ANY=[]) getdents64(0xffffffffffffffff, &(0x7f0000000100)=""/244, 0xf4) getdents64(0xffffffffffffffff, &(0x7f0000000df0)=""/528, 0xff95) socket$netlink(0x10, 0x3, 0x0) fallocate(0xffffffffffffffff, 0x1, 0x0, 0x10000101) 2018/05/15 08:24:50 executing program 5: r0 = fcntl$getown(0xffffffffffffffff, 0x9) r1 = syz_open_procfs(r0, &(0x7f0000000280)='net/ptype\x00') sendfile(r1, r1, &(0x7f0000000000)=0xffffffd, 0x7fffffff) 2018/05/15 08:24:50 executing program 0: r0 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer\x00', 0x82002, 0x0) write$binfmt_elf64(r0, &(0x7f0000000180)=ANY=[@ANYBLOB="7f454c4601010004070000000000000002003f0001800000200200000000000040000000000000008300000000000000f52f0000ac40380001000300018009000400000000ffffff020000000000000009000000000000005e00000000000000010000000000000001000000000000000700000000000000c75b83"], 0x7b) 2018/05/15 08:24:50 executing program 4: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) 2018/05/15 08:24:50 executing program 2: syz_emit_ethernet(0x3e, &(0x7f00000001c0)={@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, @dev={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa]}, [], {@ipv6={0x86dd, {0x0, 0x6, "50a09c", 0x8, 0x0, 0x0, @remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0xffffa888], 0xbb}, @local={0xfe, 0x80, [], 0xaa}, {[], @udp={0x0, 0x0, 0x8}}}}}}, &(0x7f0000000040)) 2018/05/15 08:24:50 executing program 7: r0 = syz_open_procfs(0x0, &(0x7f0000000140)='net/igmp\x00') sendfile(r0, 0xffffffffffffffff, &(0x7f0000000000)=0xffffffd, 0x7fffffff) 2018/05/15 08:24:50 executing program 6: r0 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, r0) [ 421.412678] FAT-fs (loop1): bogus number of reserved sectors [ 421.418582] FAT-fs (loop1): Can't find a valid FAT filesystem 2018/05/15 08:24:50 executing program 3: syz_emit_ethernet(0x3e, &(0x7f00000001c0)={@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, @dev={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa]}, [], {@ipv6={0x86dd, {0x0, 0x6, "50a09c", 0x8, 0xffffff87, 0x0, @remote={0xfe, 0x80, [0x0, 0x0, 0xdc050000], 0xbb}, @local={0xfe, 0x80, [], 0xaa}, {[], @udp={0x0, 0x0, 0x8}}}}}}, &(0x7f0000000040)) 2018/05/15 08:24:50 executing program 5: fcntl$getown(0xffffffffffffffff, 0x9) sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000000)=0xffffffd, 0x7fffffff) 2018/05/15 08:24:50 executing program 0: r0 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer\x00', 0x82002, 0x0) write$binfmt_elf64(r0, &(0x7f0000000180)=ANY=[@ANYBLOB="7f454c4601010004070000000000000002003f0001800000200200000000000040000000000000008300000000000000f52f0000ac40380001000300018009000400000000ffffff020000000000000009000000000000005e00000000000000010000000000000001000000000000000700000000000000c75b83"], 0x7b) 2018/05/15 08:24:50 executing program 2: syz_emit_ethernet(0x3e, &(0x7f00000001c0)={@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, @dev={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa]}, [], {@ipv6={0x86dd, {0x0, 0x6, "50a09c", 0x8, 0x0, 0x0, @remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0xfeffffff00000000], 0xbb}, @local={0xfe, 0x80, [], 0xaa}, {[], @udp={0x0, 0x0, 0x8}}}}}}, &(0x7f0000000040)) 2018/05/15 08:24:50 executing program 6: r0 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, r0) 2018/05/15 08:24:50 executing program 4: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) 2018/05/15 08:24:50 executing program 1: clock_settime(0x6, &(0x7f0000000380)={0x0, 0x1c9c380}) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f00000000c0)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000400), 0x0, &(0x7f0000000600)=ANY=[]) getdents64(0xffffffffffffffff, &(0x7f0000000100)=""/244, 0xf4) getdents64(0xffffffffffffffff, &(0x7f0000000df0)=""/528, 0xff95) r0 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) fallocate(r0, 0x1, 0x0, 0x10000101) 2018/05/15 08:24:50 executing program 7: r0 = syz_open_procfs(0x0, &(0x7f0000000140)='net/igmp\x00') sendfile(r0, r0, &(0x7f0000000000), 0x7fffffff) 2018/05/15 08:24:50 executing program 3: syz_emit_ethernet(0x3e, &(0x7f00000001c0)={@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, @dev={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa]}, [], {@ipv6={0x86dd, {0x0, 0x6, "50a09c", 0x8, 0xffffff87, 0x0, @remote={0xfe, 0x80, [0x0, 0x0, 0xe00], 0xbb}, @local={0xfe, 0x80, [], 0xaa}, {[], @udp={0x0, 0x0, 0x8}}}}}}, &(0x7f0000000040)) 2018/05/15 08:24:50 executing program 5: r0 = syz_open_procfs(0x0, &(0x7f0000000280)='net/ptype\x00') sendfile(r0, r0, &(0x7f0000000000)=0xffffffd, 0x7fffffff) 2018/05/15 08:24:50 executing program 2: syz_emit_ethernet(0x3e, &(0x7f00000001c0)={@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, @dev={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa]}, [], {@ipv6={0x86dd, {0x0, 0x6, "50a09c", 0x8, 0x0, 0x0, @remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0xf0ffffffffffff], 0xbb}, @local={0xfe, 0x80, [], 0xaa}, {[], @udp={0x0, 0x0, 0x8}}}}}}, &(0x7f0000000040)) 2018/05/15 08:24:50 executing program 0: r0 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer\x00', 0x82002, 0x0) write$binfmt_elf64(r0, &(0x7f0000000180)=ANY=[@ANYBLOB="7f454c4601010004070000000000000002003f0001800000200200000000000040000000000000008300000000000000f52f0000ac40380001000300018009000400000000ffffff020000000000000009000000000000005e00000000000000010000000000000001000000000000000700000000000000c75b83"], 0x7b) 2018/05/15 08:24:51 executing program 5: r0 = syz_open_procfs(0x0, &(0x7f0000000280)='net/ptype\x00') sendfile(0xffffffffffffffff, r0, &(0x7f0000000000)=0xffffffd, 0x7fffffff) 2018/05/15 08:24:51 executing program 4: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) 2018/05/15 08:24:51 executing program 6: r0 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, r0) [ 421.738867] FAT-fs (loop1): bogus number of reserved sectors [ 421.744774] FAT-fs (loop1): Can't find a valid FAT filesystem 2018/05/15 08:24:51 executing program 3: syz_emit_ethernet(0x3e, &(0x7f00000001c0)={@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, @dev={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa]}, [], {@ipv6={0x86dd, {0x0, 0x6, "50a09c", 0x8, 0xffffff87, 0x0, @remote={0xfe, 0x80, [0x0, 0x0, 0x6000000], 0xbb}, @local={0xfe, 0x80, [], 0xaa}, {[], @udp={0x0, 0x0, 0x8}}}}}}, &(0x7f0000000040)) 2018/05/15 08:24:51 executing program 0: perf_event_open$cgroup(&(0x7f0000000240)={0x7, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x709c95dc, 0x4, 0x101, 0x6, 0x6, 0x0, 0x0, 0x7, 0x5, 0x200, 0x4, 0x2, 0xa813, 0x4, 0x9, 0x1, 0x4, 0xfffffffffffffff9, 0x5, 0x0, 0x5, 0x6, @perf_bp={&(0x7f0000000200), 0x6}, 0x10202, 0x4, 0x4, 0x7, 0xdf, 0x9, 0x3}, 0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x8) 2018/05/15 08:24:51 executing program 7: r0 = syz_open_procfs(0x0, &(0x7f0000000140)='net/igmp\x00') sendfile(r0, r0, &(0x7f0000000000)=0xffffffd, 0x0) 2018/05/15 08:24:51 executing program 2: syz_emit_ethernet(0x3e, &(0x7f00000001c0)={@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, @dev={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa]}, [], {@ipv6={0x86dd, {0x0, 0x6, "50a09c", 0x8, 0x0, 0x0, @remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0xd000000], 0xbb}, @local={0xfe, 0x80, [], 0xaa}, {[], @udp={0x0, 0x0, 0x8}}}}}}, &(0x7f0000000040)) 2018/05/15 08:24:51 executing program 6: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/loop-control\x00', 0x0, 0x0) r1 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r1) 2018/05/15 08:24:51 executing program 4: perf_event_open$cgroup(&(0x7f0000000240)={0x7, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x709c95dc, 0x4, 0x101, 0x6, 0x6, 0x0, 0x0, 0x7, 0x5, 0x200, 0x4, 0x2, 0xa813, 0x4, 0x9, 0x1, 0x4, 0xfffffffffffffff9, 0x5, 0x0, 0x5, 0x6, @perf_bp={&(0x7f0000000200), 0x6}, 0x10202, 0x4, 0x4, 0x7, 0xdf, 0x9, 0x3}, 0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x8) 2018/05/15 08:24:51 executing program 1: clock_settime(0x6, &(0x7f0000000380)={0x0, 0x1c9c380}) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f00000000c0)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000400), 0x0, &(0x7f0000000600)=ANY=[]) getdents64(0xffffffffffffffff, &(0x7f0000000100)=""/244, 0xf4) r0 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) fallocate(r0, 0x1, 0x0, 0x10000101) 2018/05/15 08:24:51 executing program 5: r0 = syz_open_procfs(0x0, &(0x7f0000000280)='net/ptype\x00') sendfile(r0, 0xffffffffffffffff, &(0x7f0000000000)=0xffffffd, 0x7fffffff) 2018/05/15 08:24:51 executing program 7: r0 = syz_open_procfs(0x0, &(0x7f0000000140)='net/igmp\x00') sendfile(r0, r0, &(0x7f0000000000)=0xffffffd, 0x0) 2018/05/15 08:24:51 executing program 0: perf_event_open$cgroup(&(0x7f0000000240)={0x7, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x709c95dc, 0x4, 0x101, 0x6, 0x6, 0x0, 0x0, 0x7, 0x5, 0x200, 0x4, 0x2, 0xa813, 0x4, 0x9, 0x1, 0x4, 0xfffffffffffffff9, 0x5, 0x0, 0x5, 0x6, @perf_bp={&(0x7f0000000200), 0x6}, 0x10202, 0x4, 0x4, 0x7, 0xdf, 0x9, 0x3}, 0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x8) [ 422.070091] FAT-fs (loop1): bogus number of reserved sectors [ 422.075991] FAT-fs (loop1): Can't find a valid FAT filesystem 2018/05/15 08:24:51 executing program 3: syz_emit_ethernet(0x3e, &(0x7f00000001c0)={@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, @dev={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa]}, [], {@ipv6={0x86dd, {0x0, 0x6, "50a09c", 0x8, 0xffffff87, 0x0, @remote={0xfe, 0x80, [0x0, 0x0, 0x8864], 0xbb}, @local={0xfe, 0x80, [], 0xaa}, {[], @udp={0x0, 0x0, 0x8}}}}}}, &(0x7f0000000040)) 2018/05/15 08:24:51 executing program 5: r0 = syz_open_procfs(0x0, &(0x7f0000000280)='net/ptype\x00') sendfile(r0, r0, &(0x7f0000000000), 0x7fffffff) 2018/05/15 08:24:51 executing program 6: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/loop-control\x00', 0x0, 0x0) r1 = ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, r1) 2018/05/15 08:24:51 executing program 4: perf_event_open$cgroup(&(0x7f0000000240)={0x7, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x709c95dc, 0x4, 0x101, 0x6, 0x6, 0x0, 0x0, 0x7, 0x5, 0x200, 0x4, 0x2, 0xa813, 0x4, 0x9, 0x1, 0x4, 0xfffffffffffffff9, 0x5, 0x0, 0x5, 0x6, @perf_bp={&(0x7f0000000200), 0x6}, 0x10202, 0x4, 0x4, 0x7, 0xdf, 0x9, 0x3}, 0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x8) 2018/05/15 08:24:51 executing program 7: r0 = syz_open_procfs(0x0, &(0x7f0000000140)='net/igmp\x00') sendfile(r0, r0, &(0x7f0000000000)=0xffffffd, 0x0) 2018/05/15 08:24:51 executing program 2: syz_emit_ethernet(0x3e, &(0x7f00000001c0)={@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, @dev={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa]}, [], {@ipv6={0x86dd, {0x0, 0x6, "50a09c", 0x8, 0x0, 0x0, @remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x81000000], 0xbb}, @local={0xfe, 0x80, [], 0xaa}, {[], @udp={0x0, 0x0, 0x8}}}}}}, &(0x7f0000000040)) 2018/05/15 08:24:51 executing program 1: clock_settime(0x6, &(0x7f0000000380)={0x0, 0x1c9c380}) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f00000000c0)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000400), 0x0, &(0x7f0000000600)=ANY=[]) r0 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) fallocate(r0, 0x1, 0x0, 0x10000101) 2018/05/15 08:24:51 executing program 0: perf_event_open$cgroup(&(0x7f0000000240)={0x7, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x709c95dc, 0x4, 0x101, 0x6, 0x6, 0x0, 0x0, 0x7, 0x5, 0x200, 0x4, 0x2, 0xa813, 0x4, 0x9, 0x1, 0x4, 0xfffffffffffffff9, 0x5, 0x0, 0x5, 0x6, @perf_bp={&(0x7f0000000200), 0x6}, 0x10202, 0x4, 0x4, 0x7, 0xdf, 0x9, 0x3}, 0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x8) 2018/05/15 08:24:51 executing program 4: perf_event_open$cgroup(&(0x7f0000000240)={0x7, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x709c95dc, 0x4, 0x101, 0x6, 0x6, 0x0, 0x0, 0x7, 0x5, 0x200, 0x4, 0x2, 0xa813, 0x4, 0x9, 0x1, 0x4, 0xfffffffffffffff9, 0x5, 0x0, 0x5, 0x6, @perf_bp={&(0x7f0000000200), 0x6}, 0x10202, 0x4, 0x4, 0x7, 0xdf, 0x9, 0x3}, 0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x8) 2018/05/15 08:24:51 executing program 6: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/loop-control\x00', 0x0, 0x0) r1 = ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) 2018/05/15 08:24:51 executing program 7: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup(r0) setsockopt$bt_l2cap_L2CAP_LM(r1, 0x6, 0x22, &(0x7f0000000040), 0x4) getresuid(&(0x7f0000000080), &(0x7f00000000c0)=0x0, &(0x7f0000000100)) getsockopt$inet6_IPV6_IPSEC_POLICY(r1, 0x29, 0x22, &(0x7f0000000140)={{{@in=@rand_addr, @in=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@broadcast}, 0x0, @in6=@local}}, &(0x7f0000000240)=0xe8) stat(&(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) lstat(&(0x7f0000000340)='./file0\x00', &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000d40)=@broute={'broute\x00', 0x20, 0x4, 0x928, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000400], 0x0, &(0x7f0000000000), &(0x7f0000000400)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x2, [{{{0x5, 0x7, 0x4, 'bcsh0\x00', 'sit0\x00', 'syzkaller1\x00', 'veth0\x00', @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [0xff, 0xff, 0xff, 0xff], @dev={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0x18}, [0xff, 0x0, 0x0, 0x0, 0x0, 0xff], 0x1d8, 0x228, 0x258, [@comment={'comment\x00', 0x100}, @owner={'owner\x00', 0x18, {{r2, r3, r4, r5, 0x1, 0x1}}}]}, [@common=@LED={'LED\x00', 0x28, {{'syz0\x00', 0x1, 0x0, 0x800}}}]}, @common=@redirect={'redirect\x00', 0x8, {{0xfffffffffffffffe}}}}, {{{0x11, 0x4, 0x88e7, 'veth1_to_bond\x00', 'erspan0\x00', 'bridge_slave_1\x00', 'veth0_to_bridge\x00', @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [0xff, 0xff, 0x0, 0xff, 0x0, 0xff], @random="cfa071dc33d9", [0xff, 0xff, 0xff, 0xff, 0xff, 0xff], 0x2e0, 0x2e0, 0x330, [@mac={'mac\x00', 0x10, {{@remote={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xbb}, 0x1}}}, @bpf0={'bpf\x00', 0x210, {{0x20, [{0x8000, 0x4902, 0x5, 0x3ff}, {0x5, 0x8, 0x2, 0xff}, {0x1000, 0x48000000000, 0x3}, {0xf7, 0x1f, 0xfffffffffffffe00, 0x1}, {0x10000, 0xfc0, 0x1, 0x6}, {0x4, 0x2, 0xcefa, 0x81}, {0x815, 0xc7, 0x8001, 0x6a0}, {0x40, 0x0, 0x9, 0x80000001}, {0xffffffffffffff53, 0x38a, 0x100000000, 0x7}, {0x5, 0x1, 0x1000, 0x10001}, {0x80000000, 0x7, 0x1, 0xf7}, {0x2, 0x9, 0x4c, 0x5}, {0xfffffffffffffff7, 0x0, 0xe74, 0x52a}, {0x1ff, 0x7, 0x3, 0x7}, {0x6, 0x1ff, 0x49, 0x7}, {0x8000, 0x0, 0x7, 0x684}, {0xffe, 0x988, 0x3, 0x1}, {0x7b, 0x5a07, 0x18, 0x7}, {0xfffffffffffffffe, 0xfff, 0x3, 0x178180a0}, {0x2, 0xc0, 0x6, 0x401}, {0x5, 0x3, 0x8, 0x8}, {0xffffffffffff0001, 0x3, 0xfffffffffffffff7, 0x5}, {0x1ff, 0x8001, 0x3}, {0x3, 0x9, 0xffffffff, 0x2}, {0x5, 0x4, 0x574, 0x64c}, {0x5, 0x4, 0x10001, 0x6}, {0x1, 0x5b2c, 0x3ff, 0x7}, {0xff, 0x2, 0x5, 0x62c5fc18}, {0x101, 0x7, 0x2, 0xfffffffffffffffd}, {0x7fff, 0x6, 0x8, 0x4}, {0x9, 0x0, 0x7, 0xff}, {0x4, 0x4, 0x4, 0x10000}, {0x59b0, 0xfff, 0x4, 0x4}, {0x1f, 0xfffffffffffffffd, 0x8001, 0x800}, {0x0, 0xffffffffffffffff, 0x2, 0x65}, {0x1ff, 0x1, 0x2, 0x7ff}, {0x4, 0x5, 0x1, 0x7be}, {0x9e4, 0x0, 0x7, 0x5}, {0x5, 0x8, 0x7f, 0xffffffff}, {0x4, 0x6, 0x5, 0x7ff}, {0x22aaaf52, 0x8f, 0x6, 0x10000}, {0x2, 0x7, 0xffff}, {0x5, 0xfffffffff016eb50, 0x82, 0x7}, {0x38, 0x800, 0x9a2a, 0xfffffffffffffffc}, {0x5, 0xb, 0x4, 0xfffffffffffff001}, {0x8b5, 0x81, 0x4, 0x2}, {0x8, 0xfffffffffffffff8, 0x1, 0x8}, {0x40, 0x4, 0x1, 0x100000001}, {0x9b, 0x5, 0x1, 0xd64c}, {0x100, 0x8, 0x7, 0x3ff}, {0xf11, 0x200, 0x7, 0x2}, {0xac5, 0x0, 0x3, 0x7}, {0x518, 0x1, 0x80}, {0x6, 0x7f, 0x6, 0x7298}, {0x7, 0x1, 0x2, 0x1ec9}, {0x400, 0x2, 0x6, 0x6c3}, {0x100000001, 0x6, 0x5, 0x9}, {0x8, 0x1dae, 0xfffffffffffffff8, 0x101}, {0x2, 0x7, 0x8, 0x3}, {0x0, 0x45b, 0x7, 0x72}, {0x100000001, 0xc00000000000, 0x100000001, 0x8}, {0x100000001, 0x0, 0xfffffffffffffffc, 0x3}, {0x95, 0x90b, 0x0, 0xfffffffffffff565}, {0x0, 0x4, 0x0, 0x2}], 0x40}}}]}}, @common=@IDLETIMER={'IDLETIMER\x00', 0x28, {{0x7f, 'syz0\x00'}}}}]}, {0x0, '\x00', 0x2, 0xfffffffffffffffc}, {0x0, '\x00', 0x2, 0xffffffffffffffff, 0x2, [{{{0x11, 0x40, 0x87df, 'irlan0\x00', 'sit0\x00', 'veth0_to_team\x00', 'ip6gretap0\x00', @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [0xff, 0xff, 0xff, 0xff, 0x0, 0xff], @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [0x0, 0xff, 0x0, 0xff], 0xb0, 0x210, 0x258, [@time={'time\x00', 0x18, {{0x1ff, 0x1, 0xe063, 0xb6c5, 0x2e80, 0x0, 0x2}}}]}, [@common=@redirect={'redirect\x00', 0x8, {{0xffffffffffffffff}}}, @common=@SECMARK={'SECMARK\x00', 0x108, {{0x1, 0x6, 'system_u:object_r:lost_found_t:s0\x00'}}}]}, @common=@ERROR={'ERROR\x00', 0x20, {"4323eed968d7072e70de82f41331fe3aed2aedc8f2fff16e54b1c4e2ad07"}}}, {{{0x5, 0x54, 0x888d, 'ip6gretap0\x00', 'teql0\x00', 'veth1_to_team\x00', 'erspan0\x00', @random="0eae55d5aac5", [0x0, 0xff, 0x0, 0xff, 0xff, 0xff], @empty, [0xff, 0xff, 0xff, 0x0, 0xff, 0xff], 0x70, 0x70, 0xb8}}, @common=@RATEEST={'RATEEST\x00', 0x20, {{'syz0\x00', 0x9, 0x1, 0x4}}}}]}]}, 0x9a0) 2018/05/15 08:24:51 executing program 3: syz_emit_ethernet(0x3e, &(0x7f00000001c0)={@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, @dev={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa]}, [], {@ipv6={0x86dd, {0x0, 0x6, "50a09c", 0x8, 0xffffff87, 0x0, @remote={0xfe, 0x80, [0x0, 0x0, 0x6], 0xbb}, @local={0xfe, 0x80, [], 0xaa}, {[], @udp={0x0, 0x0, 0x8}}}}}}, &(0x7f0000000040)) 2018/05/15 08:24:51 executing program 2: syz_emit_ethernet(0x3e, &(0x7f00000001c0)={@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, @dev={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa]}, [], {@ipv6={0x86dd, {0x0, 0x6, "50a09c", 0x8, 0x0, 0x0, @remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x28000000], 0xbb}, @local={0xfe, 0x80, [], 0xaa}, {[], @udp={0x0, 0x0, 0x8}}}}}}, &(0x7f0000000040)) [ 422.224362] FAT-fs (loop1): bogus number of reserved sectors [ 422.230300] FAT-fs (loop1): Can't find a valid FAT filesystem 2018/05/15 08:24:51 executing program 5: r0 = syz_open_procfs(0x0, &(0x7f0000000280)='net/ptype\x00') sendfile(r0, r0, &(0x7f0000000000)=0xffffffd, 0x0) 2018/05/15 08:24:51 executing program 0: perf_event_open$cgroup(&(0x7f0000000240)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x709c95dc, 0x4, 0x101, 0x6, 0x6, 0x0, 0x0, 0x7, 0x5, 0x200, 0x4, 0x2, 0xa813, 0x4, 0x9, 0x1, 0x4, 0xfffffffffffffff9, 0x5, 0x0, 0x5, 0x6, @perf_bp={&(0x7f0000000200), 0x6}, 0x10202, 0x4, 0x4, 0x7, 0xdf, 0x9, 0x3}, 0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x8) 2018/05/15 08:24:51 executing program 6: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) 2018/05/15 08:24:51 executing program 4: perf_event_open$cgroup(&(0x7f0000000240)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x709c95dc, 0x4, 0x101, 0x6, 0x6, 0x0, 0x0, 0x7, 0x5, 0x200, 0x4, 0x2, 0xa813, 0x4, 0x9, 0x1, 0x4, 0xfffffffffffffff9, 0x5, 0x0, 0x5, 0x6, @perf_bp={&(0x7f0000000200), 0x6}, 0x10202, 0x4, 0x4, 0x7, 0xdf, 0x9, 0x3}, 0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x8) 2018/05/15 08:24:51 executing program 3: syz_emit_ethernet(0x3e, &(0x7f00000001c0)={@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, @dev={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa]}, [], {@ipv6={0x86dd, {0x0, 0x6, "50a09c", 0x8, 0xffffff87, 0x0, @remote={0xfe, 0x80, [0x0, 0x0, 0xd], 0xbb}, @local={0xfe, 0x80, [], 0xaa}, {[], @udp={0x0, 0x0, 0x8}}}}}}, &(0x7f0000000040)) 2018/05/15 08:24:51 executing program 7: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup(r0) setsockopt$bt_l2cap_L2CAP_LM(r1, 0x6, 0x22, &(0x7f0000000040), 0x4) getresuid(&(0x7f0000000080), &(0x7f00000000c0)=0x0, &(0x7f0000000100)) getsockopt$inet6_IPV6_IPSEC_POLICY(r1, 0x29, 0x22, &(0x7f0000000140)={{{@in=@rand_addr, @in=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@broadcast}, 0x0, @in6=@local}}, &(0x7f0000000240)=0xe8) stat(&(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) lstat(&(0x7f0000000340)='./file0\x00', &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000d40)=@broute={'broute\x00', 0x20, 0x4, 0x928, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000400], 0x0, &(0x7f0000000000), &(0x7f0000000400)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x2, [{{{0x5, 0x7, 0x4, 'bcsh0\x00', 'sit0\x00', 'syzkaller1\x00', 'veth0\x00', @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [0xff, 0xff, 0xff, 0xff], @dev={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0x18}, [0xff, 0x0, 0x0, 0x0, 0x0, 0xff], 0x1d8, 0x228, 0x258, [@comment={'comment\x00', 0x100}, @owner={'owner\x00', 0x18, {{r2, r3, r4, r5, 0x1, 0x1}}}]}, [@common=@LED={'LED\x00', 0x28, {{'syz0\x00', 0x1, 0x0, 0x800}}}]}, @common=@redirect={'redirect\x00', 0x8, {{0xfffffffffffffffe}}}}, {{{0x11, 0x4, 0x88e7, 'veth1_to_bond\x00', 'erspan0\x00', 'bridge_slave_1\x00', 'veth0_to_bridge\x00', @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [0xff, 0xff, 0x0, 0xff, 0x0, 0xff], @random="cfa071dc33d9", [0xff, 0xff, 0xff, 0xff, 0xff, 0xff], 0x2e0, 0x2e0, 0x330, [@mac={'mac\x00', 0x10, {{@remote={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xbb}, 0x1}}}, @bpf0={'bpf\x00', 0x210, {{0x20, [{0x8000, 0x4902, 0x5, 0x3ff}, {0x5, 0x8, 0x2, 0xff}, {0x1000, 0x48000000000, 0x3}, {0xf7, 0x1f, 0xfffffffffffffe00, 0x1}, {0x10000, 0xfc0, 0x1, 0x6}, {0x4, 0x2, 0xcefa, 0x81}, {0x815, 0xc7, 0x8001, 0x6a0}, {0x40, 0x0, 0x9, 0x80000001}, {0xffffffffffffff53, 0x38a, 0x100000000, 0x7}, {0x5, 0x1, 0x1000, 0x10001}, {0x80000000, 0x7, 0x1, 0xf7}, {0x2, 0x9, 0x4c, 0x5}, {0xfffffffffffffff7, 0x0, 0xe74, 0x52a}, {0x1ff, 0x7, 0x3, 0x7}, {0x6, 0x1ff, 0x49, 0x7}, {0x8000, 0x0, 0x7, 0x684}, {0xffe, 0x988, 0x3, 0x1}, {0x7b, 0x5a07, 0x18, 0x7}, {0xfffffffffffffffe, 0xfff, 0x3, 0x178180a0}, {0x2, 0xc0, 0x6, 0x401}, {0x5, 0x3, 0x8, 0x8}, {0xffffffffffff0001, 0x3, 0xfffffffffffffff7, 0x5}, {0x1ff, 0x8001, 0x3}, {0x3, 0x9, 0xffffffff, 0x2}, {0x5, 0x4, 0x574, 0x64c}, {0x5, 0x4, 0x10001, 0x6}, {0x1, 0x5b2c, 0x3ff, 0x7}, {0xff, 0x2, 0x5, 0x62c5fc18}, {0x101, 0x7, 0x2, 0xfffffffffffffffd}, {0x7fff, 0x6, 0x8, 0x4}, {0x9, 0x0, 0x7, 0xff}, {0x4, 0x4, 0x4, 0x10000}, {0x59b0, 0xfff, 0x4, 0x4}, {0x1f, 0xfffffffffffffffd, 0x8001, 0x800}, {0x0, 0xffffffffffffffff, 0x2, 0x65}, {0x1ff, 0x1, 0x2, 0x7ff}, {0x4, 0x5, 0x1, 0x7be}, {0x9e4, 0x0, 0x7, 0x5}, {0x5, 0x8, 0x7f, 0xffffffff}, {0x4, 0x6, 0x5, 0x7ff}, {0x22aaaf52, 0x8f, 0x6, 0x10000}, {0x2, 0x7, 0xffff}, {0x5, 0xfffffffff016eb50, 0x82, 0x7}, {0x38, 0x800, 0x9a2a, 0xfffffffffffffffc}, {0x5, 0xb, 0x4, 0xfffffffffffff001}, {0x8b5, 0x81, 0x4, 0x2}, {0x8, 0xfffffffffffffff8, 0x1, 0x8}, {0x40, 0x4, 0x1, 0x100000001}, {0x9b, 0x5, 0x1, 0xd64c}, {0x100, 0x8, 0x7, 0x3ff}, {0xf11, 0x200, 0x7, 0x2}, {0xac5, 0x0, 0x3, 0x7}, {0x518, 0x1, 0x80}, {0x6, 0x7f, 0x6, 0x7298}, {0x7, 0x1, 0x2, 0x1ec9}, {0x400, 0x2, 0x6, 0x6c3}, {0x100000001, 0x6, 0x5, 0x9}, {0x8, 0x1dae, 0xfffffffffffffff8, 0x101}, {0x2, 0x7, 0x8, 0x3}, {0x0, 0x45b, 0x7, 0x72}, {0x100000001, 0xc00000000000, 0x100000001, 0x8}, {0x100000001, 0x0, 0xfffffffffffffffc, 0x3}, {0x95, 0x90b, 0x0, 0xfffffffffffff565}, {0x0, 0x4, 0x0, 0x2}], 0x40}}}]}}, @common=@IDLETIMER={'IDLETIMER\x00', 0x28, {{0x7f, 'syz0\x00'}}}}]}, {0x0, '\x00', 0x2, 0xfffffffffffffffc}, {0x0, '\x00', 0x2, 0xffffffffffffffff, 0x2, [{{{0x11, 0x40, 0x87df, 'irlan0\x00', 'sit0\x00', 'veth0_to_team\x00', 'ip6gretap0\x00', @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [0xff, 0xff, 0xff, 0xff, 0x0, 0xff], @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [0x0, 0xff, 0x0, 0xff], 0xb0, 0x210, 0x258, [@time={'time\x00', 0x18, {{0x1ff, 0x1, 0xe063, 0xb6c5, 0x2e80, 0x0, 0x2}}}]}, [@common=@redirect={'redirect\x00', 0x8, {{0xffffffffffffffff}}}, @common=@SECMARK={'SECMARK\x00', 0x108, {{0x1, 0x6, 'system_u:object_r:lost_found_t:s0\x00'}}}]}, @common=@ERROR={'ERROR\x00', 0x20, {"4323eed968d7072e70de82f41331fe3aed2aedc8f2fff16e54b1c4e2ad07"}}}, {{{0x5, 0x54, 0x888d, 'ip6gretap0\x00', 'teql0\x00', 'veth1_to_team\x00', 'erspan0\x00', @random="0eae55d5aac5", [0x0, 0xff, 0x0, 0xff, 0xff, 0xff], @empty, [0xff, 0xff, 0xff, 0x0, 0xff, 0xff], 0x70, 0x70, 0xb8}}, @common=@RATEEST={'RATEEST\x00', 0x20, {{'syz0\x00', 0x9, 0x1, 0x4}}}}]}]}, 0x9a0) 2018/05/15 08:24:51 executing program 2: syz_emit_ethernet(0x3e, &(0x7f00000001c0)={@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, @dev={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa]}, [], {@ipv6={0x86dd, {0x0, 0x6, "50a09c", 0x8, 0x0, 0x0, @remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x8864], 0xbb}, @local={0xfe, 0x80, [], 0xaa}, {[], @udp={0x0, 0x0, 0x8}}}}}}, &(0x7f0000000040)) 2018/05/15 08:24:51 executing program 5: r0 = syz_open_procfs(0x0, &(0x7f0000000280)='net/ptype\x00') sendfile(r0, r0, &(0x7f0000000000)=0xffffffd, 0x0) 2018/05/15 08:24:51 executing program 1: clock_settime(0x6, &(0x7f0000000380)={0x0, 0x1c9c380}) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) fallocate(r0, 0x1, 0x0, 0x10000101) 2018/05/15 08:24:51 executing program 2: syz_emit_ethernet(0x3e, &(0x7f00000001c0)={@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, @dev={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa]}, [], {@ipv6={0x86dd, {0x0, 0x6, "50a09c", 0x8, 0x0, 0x0, @remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffff5], 0xbb}, @local={0xfe, 0x80, [], 0xaa}, {[], @udp={0x0, 0x0, 0x8}}}}}}, &(0x7f0000000040)) 2018/05/15 08:24:51 executing program 0: perf_event_open$cgroup(&(0x7f0000000240)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x709c95dc, 0x4, 0x101, 0x6, 0x6, 0x0, 0x0, 0x7, 0x5, 0x200, 0x4, 0x2, 0xa813, 0x4, 0x9, 0x1, 0x4, 0xfffffffffffffff9, 0x5, 0x0, 0x5, 0x6, @perf_bp={&(0x7f0000000200), 0x6}, 0x10202, 0x4, 0x4, 0x7, 0xdf, 0x9, 0x3}, 0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x8) 2018/05/15 08:24:51 executing program 4: perf_event_open$cgroup(&(0x7f0000000240)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x709c95dc, 0x4, 0x101, 0x6, 0x6, 0x0, 0x0, 0x7, 0x5, 0x200, 0x4, 0x2, 0xa813, 0x4, 0x9, 0x1, 0x4, 0xfffffffffffffff9, 0x5, 0x0, 0x5, 0x6, @perf_bp={&(0x7f0000000200), 0x6}, 0x10202, 0x4, 0x4, 0x7, 0xdf, 0x9, 0x3}, 0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x8) 2018/05/15 08:24:51 executing program 3: syz_emit_ethernet(0x3e, &(0x7f00000001c0)={@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, @dev={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa]}, [], {@ipv6={0x86dd, {0x0, 0x6, "50a09c", 0x8, 0xffffff87, 0x0, @remote={0xfe, 0x80, [0x0, 0x0, 0x3], 0xbb}, @local={0xfe, 0x80, [], 0xaa}, {[], @udp={0x0, 0x0, 0x8}}}}}}, &(0x7f0000000040)) 2018/05/15 08:24:51 executing program 6: r0 = syz_open_procfs(0x0, &(0x7f0000000280)="6e65742f6970365f7461626c65735f6d61746368657300b6e23bcf6093cb57f8b4d285e9c48608549acee9a66f09d47a011dcc8f5af7870c6c1b6eebe85ebea4ecda4e44def87e8ee568c843daaf2805944012bc0144937e8b04411d09016ca07f7388ded591e346fb612397e79a6fe43e5c6a86bee1565b17b22b8ed5c95b4afbb3a620d1402c50bbaad790d0ffdb7c5a27e60423079f77bf") unlink(&(0x7f0000000080)='./file0\x00') sendfile(r0, r0, &(0x7f00000000c0)=0x10000000, 0x2) ioctl$KDGKBMETA(r0, 0x4b62, &(0x7f0000000100)) getsockopt$inet_sctp_SCTP_PARTIAL_DELIVERY_POINT(r0, 0x84, 0x13, &(0x7f0000000140)={0x0, 0xfffffffffffffffa}, &(0x7f0000000180)=0x8) syslog(0x2, &(0x7f0000000cc0)=""/107, 0x6b) setsockopt$IP_VS_SO_SET_DEL(r0, 0x0, 0x484, &(0x7f0000000200)={0x87, @dev={0xac, 0x14, 0x14, 0x1a}, 0x4e24, 0x2, 'rr\x00', 0x3, 0x2, 0x66}, 0x2c) setsockopt$inet_sctp_SCTP_STREAM_SCHEDULER(r0, 0x84, 0x7b, &(0x7f00000001c0)={r1, 0x40ef2843}, 0x8) setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x40, &(0x7f0000000340)=ANY=[@ANYBLOB="73656375726974790000000000000000000000000000000000000000000000000e00000004000000f8030000fffffffff00000000000000000000000ffffffffffffffff600300006003000060030000ffffffff04000000", @ANYPTR=&(0x7f0000000d40)=ANY=[@ANYBLOB="000000000000000000000000002100ebe70048ca02fec408edfbaf31ba590218fdffffffffffd60000000000000000000000000000000000000000000000000021d13202a6d3d3de0000000000000000000000"], @ANYBLOB="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"], 0x458) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000000)='dctcp\x00', 0x6) ioctl$SNDRV_CTL_IOCTL_ELEM_WRITE(r0, 0xc4c85513, &(0x7f00000007c0)={{0x8ab3, 0x0, 0x8, 0x2, "e476595fe5db5cf15185067ccadfbe190638f97eba35e9a6b670c6a86f41ada8f284516f46914bdc31761630", 0xb5}, 0xd3fd, [0x5, 0xff, 0x6, 0x5, 0x4, 0xfffffffffffffffc, 0xffffffffffffffff, 0x6, 0x7, 0xff, 0x2, 0x8, 0x7fffffff, 0x0, 0x0, 0x0, 0x80, 0x2, 0x1ae, 0x100, 0x100, 0x81, 0x7, 0xffffffffffffffff, 0x401, 0x7ff, 0x9, 0x7, 0x1000, 0x85, 0x7fff, 0x5, 0x7fff, 0x4, 0x100000001, 0x99f2, 0xe91, 0x10001, 0x10001, 0x7, 0xa9fe, 0x18, 0x7fff, 0x100000000000000, 0x8001, 0x81, 0x80000001, 0x80, 0x69c, 0x4, 0x0, 0x3, 0xcf4, 0x9, 0x9d3, 0x2, 0x8, 0x5, 0x7, 0x2, 0xc7, 0x0, 0x8, 0x2, 0x2, 0x80, 0x100000001, 0xfffffffffffffff8, 0x40, 0x2, 0x3855, 0x7, 0x5, 0x1f, 0x2, 0x40, 0xa7, 0xff, 0x1, 0x2, 0x20, 0x79, 0x100000001, 0xff, 0x7f, 0x1ff, 0x2, 0x2, 0xfffffffffffffff7, 0x0, 0x6, 0x80000001, 0x80, 0x5, 0x200, 0x0, 0x982, 0x0, 0x1, 0x4, 0x1, 0x1f, 0x4, 0x40, 0x4, 0x7f, 0xb3, 0x4, 0x6, 0x4, 0x4, 0x9, 0x9, 0x7, 0x5c, 0x45a8, 0x5, 0x80000001, 0x9, 0x984, 0x20, 0x15d0cd27, 0x2, 0x80000001, 0x1000, 0xfffffffffffffff8, 0x5, 0x9], {0x77359400}}) 2018/05/15 08:24:51 executing program 7: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup(r0) setsockopt$bt_l2cap_L2CAP_LM(r1, 0x6, 0x22, &(0x7f0000000040), 0x4) getresuid(&(0x7f0000000080), &(0x7f00000000c0)=0x0, &(0x7f0000000100)) getsockopt$inet6_IPV6_IPSEC_POLICY(r1, 0x29, 0x22, &(0x7f0000000140)={{{@in=@rand_addr, @in=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@broadcast}, 0x0, @in6=@local}}, &(0x7f0000000240)=0xe8) stat(&(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) lstat(&(0x7f0000000340)='./file0\x00', &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000d40)=@broute={'broute\x00', 0x20, 0x4, 0x928, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000400], 0x0, &(0x7f0000000000), &(0x7f0000000400)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x2, [{{{0x5, 0x7, 0x4, 'bcsh0\x00', 'sit0\x00', 'syzkaller1\x00', 'veth0\x00', @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [0xff, 0xff, 0xff, 0xff], @dev={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0x18}, [0xff, 0x0, 0x0, 0x0, 0x0, 0xff], 0x1d8, 0x228, 0x258, [@comment={'comment\x00', 0x100}, @owner={'owner\x00', 0x18, {{r2, r3, r4, r5, 0x1, 0x1}}}]}, [@common=@LED={'LED\x00', 0x28, {{'syz0\x00', 0x1, 0x0, 0x800}}}]}, @common=@redirect={'redirect\x00', 0x8, {{0xfffffffffffffffe}}}}, {{{0x11, 0x4, 0x88e7, 'veth1_to_bond\x00', 'erspan0\x00', 'bridge_slave_1\x00', 'veth0_to_bridge\x00', @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [0xff, 0xff, 0x0, 0xff, 0x0, 0xff], @random="cfa071dc33d9", [0xff, 0xff, 0xff, 0xff, 0xff, 0xff], 0x2e0, 0x2e0, 0x330, [@mac={'mac\x00', 0x10, {{@remote={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xbb}, 0x1}}}, @bpf0={'bpf\x00', 0x210, {{0x20, [{0x8000, 0x4902, 0x5, 0x3ff}, {0x5, 0x8, 0x2, 0xff}, {0x1000, 0x48000000000, 0x3}, {0xf7, 0x1f, 0xfffffffffffffe00, 0x1}, {0x10000, 0xfc0, 0x1, 0x6}, {0x4, 0x2, 0xcefa, 0x81}, {0x815, 0xc7, 0x8001, 0x6a0}, {0x40, 0x0, 0x9, 0x80000001}, {0xffffffffffffff53, 0x38a, 0x100000000, 0x7}, {0x5, 0x1, 0x1000, 0x10001}, {0x80000000, 0x7, 0x1, 0xf7}, {0x2, 0x9, 0x4c, 0x5}, {0xfffffffffffffff7, 0x0, 0xe74, 0x52a}, {0x1ff, 0x7, 0x3, 0x7}, {0x6, 0x1ff, 0x49, 0x7}, {0x8000, 0x0, 0x7, 0x684}, {0xffe, 0x988, 0x3, 0x1}, {0x7b, 0x5a07, 0x18, 0x7}, {0xfffffffffffffffe, 0xfff, 0x3, 0x178180a0}, {0x2, 0xc0, 0x6, 0x401}, {0x5, 0x3, 0x8, 0x8}, {0xffffffffffff0001, 0x3, 0xfffffffffffffff7, 0x5}, {0x1ff, 0x8001, 0x3}, {0x3, 0x9, 0xffffffff, 0x2}, {0x5, 0x4, 0x574, 0x64c}, {0x5, 0x4, 0x10001, 0x6}, {0x1, 0x5b2c, 0x3ff, 0x7}, {0xff, 0x2, 0x5, 0x62c5fc18}, {0x101, 0x7, 0x2, 0xfffffffffffffffd}, {0x7fff, 0x6, 0x8, 0x4}, {0x9, 0x0, 0x7, 0xff}, {0x4, 0x4, 0x4, 0x10000}, {0x59b0, 0xfff, 0x4, 0x4}, {0x1f, 0xfffffffffffffffd, 0x8001, 0x800}, {0x0, 0xffffffffffffffff, 0x2, 0x65}, {0x1ff, 0x1, 0x2, 0x7ff}, {0x4, 0x5, 0x1, 0x7be}, {0x9e4, 0x0, 0x7, 0x5}, {0x5, 0x8, 0x7f, 0xffffffff}, {0x4, 0x6, 0x5, 0x7ff}, {0x22aaaf52, 0x8f, 0x6, 0x10000}, {0x2, 0x7, 0xffff}, {0x5, 0xfffffffff016eb50, 0x82, 0x7}, {0x38, 0x800, 0x9a2a, 0xfffffffffffffffc}, {0x5, 0xb, 0x4, 0xfffffffffffff001}, {0x8b5, 0x81, 0x4, 0x2}, {0x8, 0xfffffffffffffff8, 0x1, 0x8}, {0x40, 0x4, 0x1, 0x100000001}, {0x9b, 0x5, 0x1, 0xd64c}, {0x100, 0x8, 0x7, 0x3ff}, {0xf11, 0x200, 0x7, 0x2}, {0xac5, 0x0, 0x3, 0x7}, {0x518, 0x1, 0x80}, {0x6, 0x7f, 0x6, 0x7298}, {0x7, 0x1, 0x2, 0x1ec9}, {0x400, 0x2, 0x6, 0x6c3}, {0x100000001, 0x6, 0x5, 0x9}, {0x8, 0x1dae, 0xfffffffffffffff8, 0x101}, {0x2, 0x7, 0x8, 0x3}, {0x0, 0x45b, 0x7, 0x72}, {0x100000001, 0xc00000000000, 0x100000001, 0x8}, {0x100000001, 0x0, 0xfffffffffffffffc, 0x3}, {0x95, 0x90b, 0x0, 0xfffffffffffff565}, {0x0, 0x4, 0x0, 0x2}], 0x40}}}]}}, @common=@IDLETIMER={'IDLETIMER\x00', 0x28, {{0x7f, 'syz0\x00'}}}}]}, {0x0, '\x00', 0x2, 0xfffffffffffffffc}, {0x0, '\x00', 0x2, 0xffffffffffffffff, 0x2, [{{{0x11, 0x40, 0x87df, 'irlan0\x00', 'sit0\x00', 'veth0_to_team\x00', 'ip6gretap0\x00', @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [0xff, 0xff, 0xff, 0xff, 0x0, 0xff], @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [0x0, 0xff, 0x0, 0xff], 0xb0, 0x210, 0x258, [@time={'time\x00', 0x18, {{0x1ff, 0x1, 0xe063, 0xb6c5, 0x2e80, 0x0, 0x2}}}]}, [@common=@redirect={'redirect\x00', 0x8, {{0xffffffffffffffff}}}, @common=@SECMARK={'SECMARK\x00', 0x108, {{0x1, 0x6, 'system_u:object_r:lost_found_t:s0\x00'}}}]}, @common=@ERROR={'ERROR\x00', 0x20, {"4323eed968d7072e70de82f41331fe3aed2aedc8f2fff16e54b1c4e2ad07"}}}, {{{0x5, 0x54, 0x888d, 'ip6gretap0\x00', 'teql0\x00', 'veth1_to_team\x00', 'erspan0\x00', @random="0eae55d5aac5", [0x0, 0xff, 0x0, 0xff, 0xff, 0xff], @empty, [0xff, 0xff, 0xff, 0x0, 0xff, 0xff], 0x70, 0x70, 0xb8}}, @common=@RATEEST={'RATEEST\x00', 0x20, {{'syz0\x00', 0x9, 0x1, 0x4}}}}]}]}, 0x9a0) 2018/05/15 08:24:51 executing program 5: r0 = syz_open_procfs(0x0, &(0x7f0000000280)='net/ptype\x00') sendfile(r0, r0, &(0x7f0000000000)=0xffffffd, 0x0) 2018/05/15 08:24:51 executing program 0: perf_event_open$cgroup(&(0x7f0000000240)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x709c95dc, 0x4, 0x101, 0x6, 0x6, 0x0, 0x0, 0x7, 0x5, 0x200, 0x4, 0x2, 0xa813, 0x4, 0x9, 0x1, 0x4, 0xfffffffffffffff9, 0x5, 0x0, 0x5, 0x6, @perf_bp={&(0x7f0000000200), 0x6}, 0x10202, 0x4, 0x4, 0x7, 0xdf, 0x9, 0x3}, 0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x8) 2018/05/15 08:24:51 executing program 4: perf_event_open$cgroup(&(0x7f0000000240)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x709c95dc, 0x4, 0x101, 0x6, 0x6, 0x0, 0x0, 0x7, 0x5, 0x200, 0x4, 0x2, 0xa813, 0x4, 0x9, 0x1, 0x4, 0xfffffffffffffff9, 0x5, 0x0, 0x5, 0x6, @perf_bp={&(0x7f0000000200), 0x6}, 0x10202, 0x4, 0x4, 0x7, 0xdf, 0x9, 0x3}, 0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x8) 2018/05/15 08:24:52 executing program 5 (fault-call:1 fault-nth:0): r0 = syz_open_procfs(0x0, &(0x7f0000000280)='net/ptype\x00') sendfile(r0, r0, &(0x7f0000000000)=0xffffffd, 0x7fffffff) 2018/05/15 08:24:52 executing program 3: syz_emit_ethernet(0x3e, &(0x7f00000001c0)={@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, @dev={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa]}, [], {@ipv6={0x86dd, {0x0, 0x6, "50a09c", 0x8, 0xffffff87, 0x0, @remote={0xfe, 0x80, [0x0, 0x0, 0x200000000000000], 0xbb}, @local={0xfe, 0x80, [], 0xaa}, {[], @udp={0x0, 0x0, 0x8}}}}}}, &(0x7f0000000040)) 2018/05/15 08:24:52 executing program 2: syz_emit_ethernet(0x3e, &(0x7f00000001c0)={@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, @dev={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa]}, [], {@ipv6={0x86dd, {0x0, 0x6, "50a09c", 0x8, 0x0, 0x0, @remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x4788], 0xbb}, @local={0xfe, 0x80, [], 0xaa}, {[], @udp={0x0, 0x0, 0x8}}}}}}, &(0x7f0000000040)) 2018/05/15 08:24:52 executing program 1: clock_settime(0x6, &(0x7f0000000380)={0x0, 0x1c9c380}) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) fallocate(r0, 0x1, 0x0, 0x10000101) 2018/05/15 08:24:52 executing program 6: r0 = syz_open_procfs(0x0, &(0x7f0000000280)="6e65742f6970365f7461626c65735f6d61746368657300b6e23bcf6093cb57f8b4d285e9c48608549acee9a66f09d47a011dcc8f5af7870c6c1b6eebe85ebea4ecda4e44def87e8ee568c843daaf2805944012bc0144937e8b04411d09016ca07f7388ded591e346fb612397e79a6fe43e5c6a86bee1565b17b22b8ed5c95b4afbb3a620d1402c50bbaad790d0ffdb7c5a27e60423079f77bf") unlink(&(0x7f0000000080)='./file0\x00') sendfile(r0, r0, &(0x7f00000000c0)=0x10000000, 0x2) ioctl$KDGKBMETA(r0, 0x4b62, &(0x7f0000000100)) getsockopt$inet_sctp_SCTP_PARTIAL_DELIVERY_POINT(r0, 0x84, 0x13, &(0x7f0000000140)={0x0, 0xfffffffffffffffa}, &(0x7f0000000180)=0x8) syslog(0x2, &(0x7f0000000cc0)=""/107, 0x6b) setsockopt$IP_VS_SO_SET_DEL(r0, 0x0, 0x484, &(0x7f0000000200)={0x87, @dev={0xac, 0x14, 0x14, 0x1a}, 0x4e24, 0x2, 'rr\x00', 0x3, 0x2, 0x66}, 0x2c) setsockopt$inet_sctp_SCTP_STREAM_SCHEDULER(r0, 0x84, 0x7b, &(0x7f00000001c0)={r1, 0x40ef2843}, 0x8) setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x40, &(0x7f0000000340)=ANY=[@ANYBLOB="73656375726974790000000000000000000000000000000000000000000000000e00000004000000f8030000fffffffff00000000000000000000000ffffffffffffffff600300006003000060030000ffffffff04000000", @ANYPTR=&(0x7f0000000d40)=ANY=[@ANYBLOB="000000000000000000000000002100ebe70048ca02fec408edfbaf31ba590218fdffffffffffd60000000000000000000000000000000000000000000000000021d13202a6d3d3de0000000000000000000000"], @ANYBLOB="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"], 0x458) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000000)='dctcp\x00', 0x6) ioctl$SNDRV_CTL_IOCTL_ELEM_WRITE(r0, 0xc4c85513, &(0x7f00000007c0)={{0x8ab3, 0x0, 0x8, 0x2, "e476595fe5db5cf15185067ccadfbe190638f97eba35e9a6b670c6a86f41ada8f284516f46914bdc31761630", 0xb5}, 0xd3fd, [0x5, 0xff, 0x6, 0x5, 0x4, 0xfffffffffffffffc, 0xffffffffffffffff, 0x6, 0x7, 0xff, 0x2, 0x8, 0x7fffffff, 0x0, 0x0, 0x0, 0x80, 0x2, 0x1ae, 0x100, 0x100, 0x81, 0x7, 0xffffffffffffffff, 0x401, 0x7ff, 0x9, 0x7, 0x1000, 0x85, 0x7fff, 0x5, 0x7fff, 0x4, 0x100000001, 0x99f2, 0xe91, 0x10001, 0x10001, 0x7, 0xa9fe, 0x18, 0x7fff, 0x100000000000000, 0x8001, 0x81, 0x80000001, 0x80, 0x69c, 0x4, 0x0, 0x3, 0xcf4, 0x9, 0x9d3, 0x2, 0x8, 0x5, 0x7, 0x2, 0xc7, 0x0, 0x8, 0x2, 0x2, 0x80, 0x100000001, 0xfffffffffffffff8, 0x40, 0x2, 0x3855, 0x7, 0x5, 0x1f, 0x2, 0x40, 0xa7, 0xff, 0x1, 0x2, 0x20, 0x79, 0x100000001, 0xff, 0x7f, 0x1ff, 0x2, 0x2, 0xfffffffffffffff7, 0x0, 0x6, 0x80000001, 0x80, 0x5, 0x200, 0x0, 0x982, 0x0, 0x1, 0x4, 0x1, 0x1f, 0x4, 0x40, 0x4, 0x7f, 0xb3, 0x4, 0x6, 0x4, 0x4, 0x9, 0x9, 0x7, 0x5c, 0x45a8, 0x5, 0x80000001, 0x9, 0x984, 0x20, 0x15d0cd27, 0x2, 0x80000001, 0x1000, 0xfffffffffffffff8, 0x5, 0x9], {0x77359400}}) 2018/05/15 08:24:52 executing program 4: perf_event_open$cgroup(&(0x7f0000000240)={0x7, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x709c95dc, 0x4, 0x101, 0x6, 0x6, 0x0, 0x0, 0x7, 0x5, 0x200, 0x4, 0x2, 0xa813, 0x4, 0x9, 0x1, 0x4, 0xfffffffffffffff9, 0x5, 0x0, 0x5, 0x6, @perf_bp={&(0x7f0000000200), 0x6}, 0x10202, 0x4, 0x4, 0x7, 0xdf, 0x9, 0x3}, 0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x8) 2018/05/15 08:24:52 executing program 7: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup(r0) setsockopt$bt_l2cap_L2CAP_LM(r1, 0x6, 0x22, &(0x7f0000000040), 0x4) getresuid(&(0x7f0000000080), &(0x7f00000000c0)=0x0, &(0x7f0000000100)) getsockopt$inet6_IPV6_IPSEC_POLICY(r1, 0x29, 0x22, &(0x7f0000000140)={{{@in=@rand_addr, @in=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@broadcast}, 0x0, @in6=@local}}, &(0x7f0000000240)=0xe8) stat(&(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000d40)=@broute={'broute\x00', 0x20, 0x4, 0x928, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000400], 0x0, &(0x7f0000000000), &(0x7f0000000400)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x2, [{{{0x5, 0x7, 0x4, 'bcsh0\x00', 'sit0\x00', 'syzkaller1\x00', 'veth0\x00', @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [0xff, 0xff, 0xff, 0xff], @dev={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0x18}, [0xff, 0x0, 0x0, 0x0, 0x0, 0xff], 0x1d8, 0x228, 0x258, [@comment={'comment\x00', 0x100}, @owner={'owner\x00', 0x18, {{r2, r3, r4, 0x0, 0x1, 0x1}}}]}, [@common=@LED={'LED\x00', 0x28, {{'syz0\x00', 0x1, 0x0, 0x800}}}]}, @common=@redirect={'redirect\x00', 0x8, {{0xfffffffffffffffe}}}}, {{{0x11, 0x4, 0x88e7, 'veth1_to_bond\x00', 'erspan0\x00', 'bridge_slave_1\x00', 'veth0_to_bridge\x00', @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [0xff, 0xff, 0x0, 0xff, 0x0, 0xff], @random="cfa071dc33d9", [0xff, 0xff, 0xff, 0xff, 0xff, 0xff], 0x2e0, 0x2e0, 0x330, [@mac={'mac\x00', 0x10, {{@remote={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xbb}, 0x1}}}, @bpf0={'bpf\x00', 0x210, {{0x20, [{0x8000, 0x4902, 0x5, 0x3ff}, {0x5, 0x8, 0x2, 0xff}, {0x1000, 0x48000000000, 0x3}, {0xf7, 0x1f, 0xfffffffffffffe00, 0x1}, {0x10000, 0xfc0, 0x1, 0x6}, {0x4, 0x2, 0xcefa, 0x81}, {0x815, 0xc7, 0x8001, 0x6a0}, {0x40, 0x0, 0x9, 0x80000001}, {0xffffffffffffff53, 0x38a, 0x100000000, 0x7}, {0x5, 0x1, 0x1000, 0x10001}, {0x80000000, 0x7, 0x1, 0xf7}, {0x2, 0x9, 0x4c, 0x5}, {0xfffffffffffffff7, 0x0, 0xe74, 0x52a}, {0x1ff, 0x7, 0x3, 0x7}, {0x6, 0x1ff, 0x49, 0x7}, {0x8000, 0x0, 0x7, 0x684}, {0xffe, 0x988, 0x3, 0x1}, {0x7b, 0x5a07, 0x18, 0x7}, {0xfffffffffffffffe, 0xfff, 0x3, 0x178180a0}, {0x2, 0xc0, 0x6, 0x401}, {0x5, 0x3, 0x8, 0x8}, {0xffffffffffff0001, 0x3, 0xfffffffffffffff7, 0x5}, {0x1ff, 0x8001, 0x3}, {0x3, 0x9, 0xffffffff, 0x2}, {0x5, 0x4, 0x574, 0x64c}, {0x5, 0x4, 0x10001, 0x6}, {0x1, 0x5b2c, 0x3ff, 0x7}, {0xff, 0x2, 0x5, 0x62c5fc18}, {0x101, 0x7, 0x2, 0xfffffffffffffffd}, {0x7fff, 0x6, 0x8, 0x4}, {0x9, 0x0, 0x7, 0xff}, {0x4, 0x4, 0x4, 0x10000}, {0x59b0, 0xfff, 0x4, 0x4}, {0x1f, 0xfffffffffffffffd, 0x8001, 0x800}, {0x0, 0xffffffffffffffff, 0x2, 0x65}, {0x1ff, 0x1, 0x2, 0x7ff}, {0x4, 0x5, 0x1, 0x7be}, {0x9e4, 0x0, 0x7, 0x5}, {0x5, 0x8, 0x7f, 0xffffffff}, {0x4, 0x6, 0x5, 0x7ff}, {0x22aaaf52, 0x8f, 0x6, 0x10000}, {0x2, 0x7, 0xffff}, {0x5, 0xfffffffff016eb50, 0x82, 0x7}, {0x38, 0x800, 0x9a2a, 0xfffffffffffffffc}, {0x5, 0xb, 0x4, 0xfffffffffffff001}, {0x8b5, 0x81, 0x4, 0x2}, {0x8, 0xfffffffffffffff8, 0x1, 0x8}, {0x40, 0x4, 0x1, 0x100000001}, {0x9b, 0x5, 0x1, 0xd64c}, {0x100, 0x8, 0x7, 0x3ff}, {0xf11, 0x200, 0x7, 0x2}, {0xac5, 0x0, 0x3, 0x7}, {0x518, 0x1, 0x80}, {0x6, 0x7f, 0x6, 0x7298}, {0x7, 0x1, 0x2, 0x1ec9}, {0x400, 0x2, 0x6, 0x6c3}, {0x100000001, 0x6, 0x5, 0x9}, {0x8, 0x1dae, 0xfffffffffffffff8, 0x101}, {0x2, 0x7, 0x8, 0x3}, {0x0, 0x45b, 0x7, 0x72}, {0x100000001, 0xc00000000000, 0x100000001, 0x8}, {0x100000001, 0x0, 0xfffffffffffffffc, 0x3}, {0x95, 0x90b, 0x0, 0xfffffffffffff565}, {0x0, 0x4, 0x0, 0x2}], 0x40}}}]}}, @common=@IDLETIMER={'IDLETIMER\x00', 0x28, {{0x7f, 'syz0\x00'}}}}]}, {0x0, '\x00', 0x2, 0xfffffffffffffffc}, {0x0, '\x00', 0x2, 0xffffffffffffffff, 0x2, [{{{0x11, 0x40, 0x87df, 'irlan0\x00', 'sit0\x00', 'veth0_to_team\x00', 'ip6gretap0\x00', @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [0xff, 0xff, 0xff, 0xff, 0x0, 0xff], @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [0x0, 0xff, 0x0, 0xff], 0xb0, 0x210, 0x258, [@time={'time\x00', 0x18, {{0x1ff, 0x1, 0xe063, 0xb6c5, 0x2e80, 0x0, 0x2}}}]}, [@common=@redirect={'redirect\x00', 0x8, {{0xffffffffffffffff}}}, @common=@SECMARK={'SECMARK\x00', 0x108, {{0x1, 0x6, 'system_u:object_r:lost_found_t:s0\x00'}}}]}, @common=@ERROR={'ERROR\x00', 0x20, {"4323eed968d7072e70de82f41331fe3aed2aedc8f2fff16e54b1c4e2ad07"}}}, {{{0x5, 0x54, 0x888d, 'ip6gretap0\x00', 'teql0\x00', 'veth1_to_team\x00', 'erspan0\x00', @random="0eae55d5aac5", [0x0, 0xff, 0x0, 0xff, 0xff, 0xff], @empty, [0xff, 0xff, 0xff, 0x0, 0xff, 0xff], 0x70, 0x70, 0xb8}}, @common=@RATEEST={'RATEEST\x00', 0x20, {{'syz0\x00', 0x9, 0x1, 0x4}}}}]}]}, 0x9a0) 2018/05/15 08:24:52 executing program 0: perf_event_open$cgroup(&(0x7f0000000240)={0x7, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x709c95dc, 0x4, 0x101, 0x6, 0x6, 0x0, 0x0, 0x7, 0x5, 0x200, 0x4, 0x2, 0xa813, 0x4, 0x9, 0x1, 0x4, 0xfffffffffffffff9, 0x5, 0x0, 0x5, 0x6, @perf_bp={&(0x7f0000000200), 0x6}, 0x10202, 0x4, 0x4, 0x7, 0xdf, 0x9, 0x3}, 0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x8) [ 423.572913] FAULT_INJECTION: forcing a failure. [ 423.572913] name failslab, interval 1, probability 0, space 0, times 0 [ 423.584239] CPU: 1 PID: 13797 Comm: syz-executor5 Not tainted 4.17.0-rc5+ #51 [ 423.591515] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 423.600865] Call Trace: [ 423.603463] dump_stack+0x1b9/0x294 [ 423.607103] ? dump_stack_print_info.cold.2+0x52/0x52 [ 423.612301] ? debug_check_no_locks_freed+0x310/0x310 [ 423.617496] ? debug_check_no_locks_freed+0x310/0x310 [ 423.622703] should_fail.cold.4+0xa/0x1a [ 423.626780] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 423.631892] ? graph_lock+0x170/0x170 [ 423.635704] ? debug_check_no_locks_freed+0x310/0x310 [ 423.640907] ? find_held_lock+0x36/0x1c0 [ 423.644983] ? __lock_is_held+0xb5/0x140 [ 423.649069] ? check_same_owner+0x320/0x320 [ 423.653406] ? rcu_note_context_switch+0x710/0x710 [ 423.658347] __should_failslab+0x124/0x180 [ 423.662589] should_failslab+0x9/0x14 [ 423.666950] kmem_cache_alloc_trace+0x2cb/0x780 [ 423.671634] ? kasan_check_read+0x11/0x20 [ 423.675797] alloc_pipe_info+0x16d/0x580 [ 423.679870] ? pipe_read+0x940/0x940 [ 423.683601] ? __fget+0x40c/0x650 [ 423.687072] ? expand_files.part.8+0x9a0/0x9a0 [ 423.691662] ? find_held_lock+0x36/0x1c0 [ 423.695747] splice_direct_to_actor+0x6e7/0x8d0 [ 423.700423] ? graph_lock+0x170/0x170 [ 423.704237] ? pipe_to_sendpage+0x3f0/0x3f0 [ 423.708567] ? lock_downgrade+0x8e0/0x8e0 [ 423.712724] ? do_splice_to+0x190/0x190 [ 423.716712] ? rw_verify_area+0x118/0x360 [ 423.720872] do_splice_direct+0x2cc/0x400 [ 423.725035] ? splice_direct_to_actor+0x8d0/0x8d0 [ 423.729898] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 423.735446] ? __sb_start_write+0x17f/0x300 [ 423.739776] do_sendfile+0x60f/0xe00 [ 423.743504] ? do_compat_pwritev64+0x1b0/0x1b0 [ 423.748098] ? __might_sleep+0x95/0x190 [ 423.752099] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 423.757643] ? _copy_from_user+0xdf/0x150 [ 423.761799] __x64_sys_sendfile64+0x155/0x240 [ 423.766299] ? __ia32_sys_sendfile+0x290/0x290 [ 423.770889] ? do_syscall_64+0x92/0x800 [ 423.774869] do_syscall_64+0x1b1/0x800 [ 423.778764] ? syscall_return_slowpath+0x5c0/0x5c0 [ 423.783715] ? syscall_return_slowpath+0x30f/0x5c0 [ 423.788655] ? entry_SYSCALL_64_after_hwframe+0x59/0xbe [ 423.794046] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 423.798900] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 423.804086] RIP: 0033:0x455a09 [ 423.807272] RSP: 002b:00007ffbeaa32c68 EFLAGS: 00000246 ORIG_RAX: 0000000000000028 [ 423.814990] RAX: ffffffffffffffda RBX: 00007ffbeaa336d4 RCX: 0000000000455a09 2018/05/15 08:24:52 executing program 3: syz_emit_ethernet(0x3e, &(0x7f00000001c0)={@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, @dev={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa]}, [], {@ipv6={0x86dd, {0x0, 0x6, "50a09c", 0x8, 0xffffff87, 0x0, @remote={0xfe, 0x80, [0x0, 0x0, 0x3800000000000000], 0xbb}, @local={0xfe, 0x80, [], 0xaa}, {[], @udp={0x0, 0x0, 0x8}}}}}}, &(0x7f0000000040)) 2018/05/15 08:24:52 executing program 6: r0 = syz_open_procfs(0x0, &(0x7f0000000280)="6e65742f6970365f7461626c65735f6d61746368657300b6e23bcf6093cb57f8b4d285e9c48608549acee9a66f09d47a011dcc8f5af7870c6c1b6eebe85ebea4ecda4e44def87e8ee568c843daaf2805944012bc0144937e8b04411d09016ca07f7388ded591e346fb612397e79a6fe43e5c6a86bee1565b17b22b8ed5c95b4afbb3a620d1402c50bbaad790d0ffdb7c5a27e60423079f77bf") unlink(&(0x7f0000000080)='./file0\x00') sendfile(r0, r0, &(0x7f00000000c0)=0x10000000, 0x2) ioctl$KDGKBMETA(r0, 0x4b62, &(0x7f0000000100)) getsockopt$inet_sctp_SCTP_PARTIAL_DELIVERY_POINT(r0, 0x84, 0x13, &(0x7f0000000140)={0x0, 0xfffffffffffffffa}, &(0x7f0000000180)=0x8) syslog(0x2, &(0x7f0000000cc0)=""/107, 0x6b) setsockopt$IP_VS_SO_SET_DEL(r0, 0x0, 0x484, &(0x7f0000000200)={0x87, @dev={0xac, 0x14, 0x14, 0x1a}, 0x4e24, 0x2, 'rr\x00', 0x3, 0x2, 0x66}, 0x2c) setsockopt$inet_sctp_SCTP_STREAM_SCHEDULER(r0, 0x84, 0x7b, &(0x7f00000001c0)={r1, 0x40ef2843}, 0x8) setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x40, &(0x7f0000000340)=ANY=[@ANYBLOB="73656375726974790000000000000000000000000000000000000000000000000e00000004000000f8030000fffffffff00000000000000000000000ffffffffffffffff600300006003000060030000ffffffff04000000", @ANYPTR=&(0x7f0000000d40)=ANY=[@ANYBLOB="000000000000000000000000002100ebe70048ca02fec408edfbaf31ba590218fdffffffffffd60000000000000000000000000000000000000000000000000021d13202a6d3d3de0000000000000000000000"], @ANYBLOB="00000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000c800f0000000000000000000000000000000000000000000000000003000616800000000000000000000000000000000000000000000000000000000f9ffffff7f000000010000000000000028005443504d5353000000000000000000000000000000000000000000000000740c0000000000007f000001ac14140dffffff00ffffffff6772653000000000000000000000000069703667726530000000000000000000000000000000000000000000ff0000000000000000000000000000000000000000000000000000000000ff0000000000000000000000000000007f0003010000000000000000000000000000b80018010000000000000000000000000000000000000000000000002000736f636b657400000000000000000000000000000000000000000000000060005345540000000000000000000000000000000000000000000000000000000100000000100000020000000000008e0a000000010400000800000000033f0002000000d4180000ff0700009c0a00001e62000000000000e1020000ff09010000000100ac1414aa000000ffff0000007465616d5f736c6176655f310000000069703667726574617030000000000000000000000000000000000000ff0000000000000000000000000000000000000000000000000000000000ff000000000000000000000000000000670001400000000000000000000000000000280158010000000000000000000000000000000000000000000000004000736574000000000000000000000000000000000000000000000000000000070000000100000008000000090000000000000000000000060000000307050050006f736600000000000000000000000000000000000000000000000000000073797a3100000000000000000000000000000000000000000000000000000000070000000200000002000000000000003000434f4e4e4d41524b00000000000000000000ffffffffffffffe5000000014000000009000000020000000300000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000700098000000000000000000000000000000000000000000280000000000000000000000000000000000000000000000000000000000000800ffffff00000000"], 0x458) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000000)='dctcp\x00', 0x6) ioctl$SNDRV_CTL_IOCTL_ELEM_WRITE(r0, 0xc4c85513, &(0x7f00000007c0)={{0x8ab3, 0x0, 0x8, 0x2, "e476595fe5db5cf15185067ccadfbe190638f97eba35e9a6b670c6a86f41ada8f284516f46914bdc31761630", 0xb5}, 0xd3fd, [0x5, 0xff, 0x6, 0x5, 0x4, 0xfffffffffffffffc, 0xffffffffffffffff, 0x6, 0x7, 0xff, 0x2, 0x8, 0x7fffffff, 0x0, 0x0, 0x0, 0x80, 0x2, 0x1ae, 0x100, 0x100, 0x81, 0x7, 0xffffffffffffffff, 0x401, 0x7ff, 0x9, 0x7, 0x1000, 0x85, 0x7fff, 0x5, 0x7fff, 0x4, 0x100000001, 0x99f2, 0xe91, 0x10001, 0x10001, 0x7, 0xa9fe, 0x18, 0x7fff, 0x100000000000000, 0x8001, 0x81, 0x80000001, 0x80, 0x69c, 0x4, 0x0, 0x3, 0xcf4, 0x9, 0x9d3, 0x2, 0x8, 0x5, 0x7, 0x2, 0xc7, 0x0, 0x8, 0x2, 0x2, 0x80, 0x100000001, 0xfffffffffffffff8, 0x40, 0x2, 0x3855, 0x7, 0x5, 0x1f, 0x2, 0x40, 0xa7, 0xff, 0x1, 0x2, 0x20, 0x79, 0x100000001, 0xff, 0x7f, 0x1ff, 0x2, 0x2, 0xfffffffffffffff7, 0x0, 0x6, 0x80000001, 0x80, 0x5, 0x200, 0x0, 0x982, 0x0, 0x1, 0x4, 0x1, 0x1f, 0x4, 0x40, 0x4, 0x7f, 0xb3, 0x4, 0x6, 0x4, 0x4, 0x9, 0x9, 0x7, 0x5c, 0x45a8, 0x5, 0x80000001, 0x9, 0x984, 0x20, 0x15d0cd27, 0x2, 0x80000001, 0x1000, 0xfffffffffffffff8, 0x5, 0x9], {0x77359400}}) 2018/05/15 08:24:52 executing program 3: syz_emit_ethernet(0x3e, &(0x7f00000001c0)={@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, @dev={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa]}, [], {@ipv6={0x86dd, {0x0, 0x6, "50a09c", 0x8, 0xffffff87, 0x0, @remote={0xfe, 0x80, [0x0, 0x0, 0x43050000], 0xbb}, @local={0xfe, 0x80, [], 0xaa}, {[], @udp={0x0, 0x0, 0x8}}}}}}, &(0x7f0000000040)) 2018/05/15 08:24:52 executing program 6: r0 = syz_open_procfs(0x0, &(0x7f0000000280)="6e65742f6970365f7461626c65735f6d61746368657300b6e23bcf6093cb57f8b4d285e9c48608549acee9a66f09d47a011dcc8f5af7870c6c1b6eebe85ebea4ecda4e44def87e8ee568c843daaf2805944012bc0144937e8b04411d09016ca07f7388ded591e346fb612397e79a6fe43e5c6a86bee1565b17b22b8ed5c95b4afbb3a620d1402c50bbaad790d0ffdb7c5a27e60423079f77bf") unlink(&(0x7f0000000080)='./file0\x00') sendfile(r0, r0, &(0x7f00000000c0)=0x10000000, 0x2) ioctl$KDGKBMETA(r0, 0x4b62, &(0x7f0000000100)) getsockopt$inet_sctp_SCTP_PARTIAL_DELIVERY_POINT(r0, 0x84, 0x13, &(0x7f0000000140)={0x0, 0xfffffffffffffffa}, &(0x7f0000000180)=0x8) syslog(0x2, &(0x7f0000000cc0)=""/107, 0x6b) setsockopt$IP_VS_SO_SET_DEL(r0, 0x0, 0x484, &(0x7f0000000200)={0x87, @dev={0xac, 0x14, 0x14, 0x1a}, 0x4e24, 0x2, 'rr\x00', 0x3, 0x2, 0x66}, 0x2c) setsockopt$inet_sctp_SCTP_STREAM_SCHEDULER(r0, 0x84, 0x7b, &(0x7f00000001c0)={r1, 0x40ef2843}, 0x8) setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x40, &(0x7f0000000340)=ANY=[@ANYBLOB="73656375726974790000000000000000000000000000000000000000000000000e00000004000000f8030000fffffffff00000000000000000000000ffffffffffffffff600300006003000060030000ffffffff04000000", @ANYPTR=&(0x7f0000000d40)=ANY=[@ANYBLOB="000000000000000000000000002100ebe70048ca02fec408edfbaf31ba590218fdffffffffffd60000000000000000000000000000000000000000000000000021d13202a6d3d3de0000000000000000000000"], @ANYBLOB="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"], 0x458) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000000)='dctcp\x00', 0x6) 2018/05/15 08:24:52 executing program 3: syz_emit_ethernet(0x3e, &(0x7f00000001c0)={@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, @dev={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa]}, [], {@ipv6={0x86dd, {0x0, 0x6, "50a09c", 0x8, 0xffffff87, 0x0, @remote={0xfe, 0x80, [0x0, 0x0, 0xd000000], 0xbb}, @local={0xfe, 0x80, [], 0xaa}, {[], @udp={0x0, 0x0, 0x8}}}}}}, &(0x7f0000000040)) 2018/05/15 08:24:53 executing program 6: r0 = syz_open_procfs(0x0, &(0x7f0000000280)="6e65742f6970365f7461626c65735f6d61746368657300b6e23bcf6093cb57f8b4d285e9c48608549acee9a66f09d47a011dcc8f5af7870c6c1b6eebe85ebea4ecda4e44def87e8ee568c843daaf2805944012bc0144937e8b04411d09016ca07f7388ded591e346fb612397e79a6fe43e5c6a86bee1565b17b22b8ed5c95b4afbb3a620d1402c50bbaad790d0ffdb7c5a27e60423079f77bf") unlink(&(0x7f0000000080)='./file0\x00') sendfile(r0, r0, &(0x7f00000000c0)=0x10000000, 0x2) ioctl$KDGKBMETA(r0, 0x4b62, &(0x7f0000000100)) getsockopt$inet_sctp_SCTP_PARTIAL_DELIVERY_POINT(r0, 0x84, 0x13, &(0x7f0000000140)={0x0, 0xfffffffffffffffa}, &(0x7f0000000180)=0x8) syslog(0x2, &(0x7f0000000cc0)=""/107, 0x6b) setsockopt$IP_VS_SO_SET_DEL(r0, 0x0, 0x484, &(0x7f0000000200)={0x87, @dev={0xac, 0x14, 0x14, 0x1a}, 0x4e24, 0x2, 'rr\x00', 0x3, 0x2, 0x66}, 0x2c) setsockopt$inet_sctp_SCTP_STREAM_SCHEDULER(r0, 0x84, 0x7b, &(0x7f00000001c0)={r1, 0x40ef2843}, 0x8) setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x40, &(0x7f0000000340)=ANY=[@ANYBLOB="73656375726974790000000000000000000000000000000000000000000000000e00000004000000f8030000fffffffff00000000000000000000000ffffffffffffffff600300006003000060030000ffffffff04000000", @ANYPTR=&(0x7f0000000d40)=ANY=[@ANYBLOB="000000000000000000000000002100ebe70048ca02fec408edfbaf31ba590218fdffffffffffd60000000000000000000000000000000000000000000000000021d13202a6d3d3de0000000000000000000000"], @ANYBLOB="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"], 0x458) 2018/05/15 08:24:53 executing program 3: syz_emit_ethernet(0x3e, &(0x7f00000001c0)={@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, @dev={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa]}, [], {@ipv6={0x86dd, {0x0, 0x6, "50a09c", 0x8, 0xffffff87, 0x0, @remote={0xfe, 0x80, [0x0, 0x0, 0x88470000], 0xbb}, @local={0xfe, 0x80, [], 0xaa}, {[], @udp={0x0, 0x0, 0x8}}}}}}, &(0x7f0000000040)) 2018/05/15 08:24:53 executing program 6: r0 = syz_open_procfs(0x0, &(0x7f0000000280)="6e65742f6970365f7461626c65735f6d61746368657300b6e23bcf6093cb57f8b4d285e9c48608549acee9a66f09d47a011dcc8f5af7870c6c1b6eebe85ebea4ecda4e44def87e8ee568c843daaf2805944012bc0144937e8b04411d09016ca07f7388ded591e346fb612397e79a6fe43e5c6a86bee1565b17b22b8ed5c95b4afbb3a620d1402c50bbaad790d0ffdb7c5a27e60423079f77bf") unlink(&(0x7f0000000080)='./file0\x00') sendfile(r0, r0, &(0x7f00000000c0)=0x10000000, 0x2) ioctl$KDGKBMETA(r0, 0x4b62, &(0x7f0000000100)) getsockopt$inet_sctp_SCTP_PARTIAL_DELIVERY_POINT(r0, 0x84, 0x13, &(0x7f0000000140)={0x0, 0xfffffffffffffffa}, &(0x7f0000000180)=0x8) syslog(0x2, &(0x7f0000000cc0)=""/107, 0x6b) setsockopt$IP_VS_SO_SET_DEL(r0, 0x0, 0x484, &(0x7f0000000200)={0x87, @dev={0xac, 0x14, 0x14, 0x1a}, 0x4e24, 0x2, 'rr\x00', 0x3, 0x2, 0x66}, 0x2c) setsockopt$inet_sctp_SCTP_STREAM_SCHEDULER(r0, 0x84, 0x7b, &(0x7f00000001c0)={r1, 0x40ef2843}, 0x8) [ 423.822257] RDX: 0000000020000000 RSI: 0000000000000013 RDI: 0000000000000013 [ 423.829521] RBP: 000000000072bea0 R08: 0000000000000000 R09: 0000000000000000 [ 423.836790] R10: 000000007fffffff R11: 0000000000000246 R12: 0000000000000014 [ 423.844063] R13: 0000000000000579 R14: 00000000006fc3f8 R15: 0000000000000000 2018/05/15 08:24:53 executing program 4: perf_event_open$cgroup(&(0x7f0000000240)={0x7, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x101, 0x6, 0x6, 0x0, 0x0, 0x7, 0x5, 0x200, 0x4, 0x2, 0xa813, 0x4, 0x9, 0x1, 0x4, 0xfffffffffffffff9, 0x5, 0x0, 0x5, 0x6, @perf_bp={&(0x7f0000000200), 0x6}, 0x10202, 0x4, 0x4, 0x7, 0xdf, 0x9, 0x3}, 0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x8) 2018/05/15 08:24:53 executing program 0: perf_event_open$cgroup(&(0x7f0000000240)={0x7, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x101, 0x6, 0x6, 0x0, 0x0, 0x7, 0x5, 0x200, 0x4, 0x2, 0xa813, 0x4, 0x9, 0x1, 0x4, 0xfffffffffffffff9, 0x5, 0x0, 0x5, 0x6, @perf_bp={&(0x7f0000000200), 0x6}, 0x10202, 0x4, 0x4, 0x7, 0xdf, 0x9, 0x3}, 0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x8) 2018/05/15 08:24:53 executing program 2: syz_emit_ethernet(0x3e, &(0x7f00000001c0)={@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, @dev={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa]}, [], {@ipv6={0x86dd, {0x0, 0x6, "50a09c", 0x8, 0x0, 0x0, @remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x3300000000000000], 0xbb}, @local={0xfe, 0x80, [], 0xaa}, {[], @udp={0x0, 0x0, 0x8}}}}}}, &(0x7f0000000040)) 2018/05/15 08:24:53 executing program 1: clock_settime(0x6, &(0x7f0000000380)={0x0, 0x1c9c380}) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) fallocate(r0, 0x1, 0x0, 0x10000101) 2018/05/15 08:24:53 executing program 5 (fault-call:1 fault-nth:1): r0 = syz_open_procfs(0x0, &(0x7f0000000280)='net/ptype\x00') sendfile(r0, r0, &(0x7f0000000000)=0xffffffd, 0x7fffffff) 2018/05/15 08:24:53 executing program 7: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup(r0) setsockopt$bt_l2cap_L2CAP_LM(r1, 0x6, 0x22, &(0x7f0000000040), 0x4) getresuid(&(0x7f0000000080), &(0x7f00000000c0)=0x0, &(0x7f0000000100)) getsockopt$inet6_IPV6_IPSEC_POLICY(r1, 0x29, 0x22, &(0x7f0000000140)={{{@in=@rand_addr, @in=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@broadcast}, 0x0, @in6=@local}}, &(0x7f0000000240)=0xe8) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000d40)=@broute={'broute\x00', 0x20, 0x4, 0x928, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000400], 0x0, &(0x7f0000000000), &(0x7f0000000400)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x2, [{{{0x5, 0x7, 0x4, 'bcsh0\x00', 'sit0\x00', 'syzkaller1\x00', 'veth0\x00', @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [0xff, 0xff, 0xff, 0xff], @dev={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0x18}, [0xff, 0x0, 0x0, 0x0, 0x0, 0xff], 0x1d8, 0x228, 0x258, [@comment={'comment\x00', 0x100}, @owner={'owner\x00', 0x18, {{r2, r3, 0x0, 0x0, 0x1, 0x1}}}]}, [@common=@LED={'LED\x00', 0x28, {{'syz0\x00', 0x1, 0x0, 0x800}}}]}, @common=@redirect={'redirect\x00', 0x8, {{0xfffffffffffffffe}}}}, {{{0x11, 0x4, 0x88e7, 'veth1_to_bond\x00', 'erspan0\x00', 'bridge_slave_1\x00', 'veth0_to_bridge\x00', @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [0xff, 0xff, 0x0, 0xff, 0x0, 0xff], @random="cfa071dc33d9", [0xff, 0xff, 0xff, 0xff, 0xff, 0xff], 0x2e0, 0x2e0, 0x330, [@mac={'mac\x00', 0x10, {{@remote={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xbb}, 0x1}}}, @bpf0={'bpf\x00', 0x210, {{0x20, [{0x8000, 0x4902, 0x5, 0x3ff}, {0x5, 0x8, 0x2, 0xff}, {0x1000, 0x48000000000, 0x3}, {0xf7, 0x1f, 0xfffffffffffffe00, 0x1}, {0x10000, 0xfc0, 0x1, 0x6}, {0x4, 0x2, 0xcefa, 0x81}, {0x815, 0xc7, 0x8001, 0x6a0}, {0x40, 0x0, 0x9, 0x80000001}, {0xffffffffffffff53, 0x38a, 0x100000000, 0x7}, {0x5, 0x1, 0x1000, 0x10001}, {0x80000000, 0x7, 0x1, 0xf7}, {0x2, 0x9, 0x4c, 0x5}, {0xfffffffffffffff7, 0x0, 0xe74, 0x52a}, {0x1ff, 0x7, 0x3, 0x7}, {0x6, 0x1ff, 0x49, 0x7}, {0x8000, 0x0, 0x7, 0x684}, {0xffe, 0x988, 0x3, 0x1}, {0x7b, 0x5a07, 0x18, 0x7}, {0xfffffffffffffffe, 0xfff, 0x3, 0x178180a0}, {0x2, 0xc0, 0x6, 0x401}, {0x5, 0x3, 0x8, 0x8}, {0xffffffffffff0001, 0x3, 0xfffffffffffffff7, 0x5}, {0x1ff, 0x8001, 0x3}, {0x3, 0x9, 0xffffffff, 0x2}, {0x5, 0x4, 0x574, 0x64c}, {0x5, 0x4, 0x10001, 0x6}, {0x1, 0x5b2c, 0x3ff, 0x7}, {0xff, 0x2, 0x5, 0x62c5fc18}, {0x101, 0x7, 0x2, 0xfffffffffffffffd}, {0x7fff, 0x6, 0x8, 0x4}, {0x9, 0x0, 0x7, 0xff}, {0x4, 0x4, 0x4, 0x10000}, {0x59b0, 0xfff, 0x4, 0x4}, {0x1f, 0xfffffffffffffffd, 0x8001, 0x800}, {0x0, 0xffffffffffffffff, 0x2, 0x65}, {0x1ff, 0x1, 0x2, 0x7ff}, {0x4, 0x5, 0x1, 0x7be}, {0x9e4, 0x0, 0x7, 0x5}, {0x5, 0x8, 0x7f, 0xffffffff}, {0x4, 0x6, 0x5, 0x7ff}, {0x22aaaf52, 0x8f, 0x6, 0x10000}, {0x2, 0x7, 0xffff}, {0x5, 0xfffffffff016eb50, 0x82, 0x7}, {0x38, 0x800, 0x9a2a, 0xfffffffffffffffc}, {0x5, 0xb, 0x4, 0xfffffffffffff001}, {0x8b5, 0x81, 0x4, 0x2}, {0x8, 0xfffffffffffffff8, 0x1, 0x8}, {0x40, 0x4, 0x1, 0x100000001}, {0x9b, 0x5, 0x1, 0xd64c}, {0x100, 0x8, 0x7, 0x3ff}, {0xf11, 0x200, 0x7, 0x2}, {0xac5, 0x0, 0x3, 0x7}, {0x518, 0x1, 0x80}, {0x6, 0x7f, 0x6, 0x7298}, {0x7, 0x1, 0x2, 0x1ec9}, {0x400, 0x2, 0x6, 0x6c3}, {0x100000001, 0x6, 0x5, 0x9}, {0x8, 0x1dae, 0xfffffffffffffff8, 0x101}, {0x2, 0x7, 0x8, 0x3}, {0x0, 0x45b, 0x7, 0x72}, {0x100000001, 0xc00000000000, 0x100000001, 0x8}, {0x100000001, 0x0, 0xfffffffffffffffc, 0x3}, {0x95, 0x90b, 0x0, 0xfffffffffffff565}, {0x0, 0x4, 0x0, 0x2}], 0x40}}}]}}, @common=@IDLETIMER={'IDLETIMER\x00', 0x28, {{0x7f, 'syz0\x00'}}}}]}, {0x0, '\x00', 0x2, 0xfffffffffffffffc}, {0x0, '\x00', 0x2, 0xffffffffffffffff, 0x2, [{{{0x11, 0x40, 0x87df, 'irlan0\x00', 'sit0\x00', 'veth0_to_team\x00', 'ip6gretap0\x00', @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [0xff, 0xff, 0xff, 0xff, 0x0, 0xff], @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [0x0, 0xff, 0x0, 0xff], 0xb0, 0x210, 0x258, [@time={'time\x00', 0x18, {{0x1ff, 0x1, 0xe063, 0xb6c5, 0x2e80, 0x0, 0x2}}}]}, [@common=@redirect={'redirect\x00', 0x8, {{0xffffffffffffffff}}}, @common=@SECMARK={'SECMARK\x00', 0x108, {{0x1, 0x6, 'system_u:object_r:lost_found_t:s0\x00'}}}]}, @common=@ERROR={'ERROR\x00', 0x20, {"4323eed968d7072e70de82f41331fe3aed2aedc8f2fff16e54b1c4e2ad07"}}}, {{{0x5, 0x54, 0x888d, 'ip6gretap0\x00', 'teql0\x00', 'veth1_to_team\x00', 'erspan0\x00', @random="0eae55d5aac5", [0x0, 0xff, 0x0, 0xff, 0xff, 0xff], @empty, [0xff, 0xff, 0xff, 0x0, 0xff, 0xff], 0x70, 0x70, 0xb8}}, @common=@RATEEST={'RATEEST\x00', 0x20, {{'syz0\x00', 0x9, 0x1, 0x4}}}}]}]}, 0x9a0) 2018/05/15 08:24:53 executing program 3: syz_emit_ethernet(0x3e, &(0x7f00000001c0)={@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, @dev={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa]}, [], {@ipv6={0x86dd, {0x0, 0x6, "50a09c", 0x8, 0xffffff87, 0x0, @remote={0xfe, 0x80, [0x0, 0x0, 0x7], 0xbb}, @local={0xfe, 0x80, [], 0xaa}, {[], @udp={0x0, 0x0, 0x8}}}}}}, &(0x7f0000000040)) 2018/05/15 08:24:53 executing program 6: r0 = syz_open_procfs(0x0, &(0x7f0000000280)="6e65742f6970365f7461626c65735f6d61746368657300b6e23bcf6093cb57f8b4d285e9c48608549acee9a66f09d47a011dcc8f5af7870c6c1b6eebe85ebea4ecda4e44def87e8ee568c843daaf2805944012bc0144937e8b04411d09016ca07f7388ded591e346fb612397e79a6fe43e5c6a86bee1565b17b22b8ed5c95b4afbb3a620d1402c50bbaad790d0ffdb7c5a27e60423079f77bf") unlink(&(0x7f0000000080)='./file0\x00') sendfile(r0, r0, &(0x7f00000000c0)=0x10000000, 0x2) ioctl$KDGKBMETA(r0, 0x4b62, &(0x7f0000000100)) getsockopt$inet_sctp_SCTP_PARTIAL_DELIVERY_POINT(r0, 0x84, 0x13, &(0x7f0000000140)={0x0, 0xfffffffffffffffa}, &(0x7f0000000180)=0x8) syslog(0x2, &(0x7f0000000cc0)=""/107, 0x6b) setsockopt$IP_VS_SO_SET_DEL(r0, 0x0, 0x484, &(0x7f0000000200)={0x87, @dev={0xac, 0x14, 0x14, 0x1a}, 0x4e24, 0x2, 'rr\x00', 0x3, 0x2, 0x66}, 0x2c) [ 424.055132] FAULT_INJECTION: forcing a failure. [ 424.055132] name failslab, interval 1, probability 0, space 0, times 0 [ 424.066455] CPU: 0 PID: 13850 Comm: syz-executor5 Not tainted 4.17.0-rc5+ #51 [ 424.073733] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 424.083086] Call Trace: [ 424.085686] dump_stack+0x1b9/0x294 [ 424.089330] ? dump_stack_print_info.cold.2+0x52/0x52 [ 424.094535] ? __save_stack_trace+0x7e/0xd0 [ 424.098873] should_fail.cold.4+0xa/0x1a 2018/05/15 08:24:53 executing program 0: perf_event_open$cgroup(&(0x7f0000000240)={0x7, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x101, 0x6, 0x6, 0x0, 0x0, 0x7, 0x5, 0x200, 0x4, 0x2, 0xa813, 0x4, 0x9, 0x1, 0x4, 0xfffffffffffffff9, 0x5, 0x0, 0x5, 0x6, @perf_bp={&(0x7f0000000200), 0x6}, 0x10202, 0x4, 0x4, 0x7, 0xdf, 0x9, 0x3}, 0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x8) 2018/05/15 08:24:53 executing program 1: clock_settime(0x6, &(0x7f0000000380)={0x0, 0x1c9c380}) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f00000000c0)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000400), 0x0, &(0x7f0000000600)=ANY=[]) r0 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) fallocate(r0, 0x1, 0x0, 0x10000101) 2018/05/15 08:24:53 executing program 3: syz_emit_ethernet(0x3e, &(0x7f00000001c0)={@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, @dev={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa]}, [], {@ipv6={0x86dd, {0x0, 0x6, "50a09c", 0x8, 0xffffff87, 0x0, @remote={0xfe, 0x80, [0x0, 0x0, 0x806000000000000], 0xbb}, @local={0xfe, 0x80, [], 0xaa}, {[], @udp={0x0, 0x0, 0x8}}}}}}, &(0x7f0000000040)) 2018/05/15 08:24:53 executing program 2: syz_emit_ethernet(0x3e, &(0x7f00000001c0)={@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, @dev={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa]}, [], {@ipv6={0x86dd, {0x0, 0x6, "50a09c", 0x8, 0x0, 0x0, @remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x700000000000000], 0xbb}, @local={0xfe, 0x80, [], 0xaa}, {[], @udp={0x0, 0x0, 0x8}}}}}}, &(0x7f0000000040)) 2018/05/15 08:24:53 executing program 0: perf_event_open$cgroup(&(0x7f0000000240)={0x7, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x6, 0x0, 0x0, 0x7, 0x5, 0x200, 0x4, 0x2, 0xa813, 0x4, 0x9, 0x1, 0x4, 0xfffffffffffffff9, 0x5, 0x0, 0x5, 0x6, @perf_bp={&(0x7f0000000200), 0x6}, 0x10202, 0x4, 0x4, 0x7, 0xdf, 0x9, 0x3}, 0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x8) [ 424.102948] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 424.108065] ? save_stack+0x43/0xd0 [ 424.111700] ? kasan_kmalloc+0xc4/0xe0 [ 424.115593] ? kmem_cache_alloc_trace+0x152/0x780 [ 424.120439] ? alloc_pipe_info+0x16d/0x580 [ 424.124686] ? splice_direct_to_actor+0x6e7/0x8d0 [ 424.129539] ? graph_lock+0x170/0x170 [ 424.133355] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 424.138728] ? find_held_lock+0x36/0x1c0 [ 424.142795] ? __lock_is_held+0xb5/0x140 [ 424.146877] ? check_same_owner+0x320/0x320 [ 424.151214] ? rcu_note_context_switch+0x710/0x710 [ 424.156161] __should_failslab+0x124/0x180 [ 424.160412] should_failslab+0x9/0x14 [ 424.164221] __kmalloc+0x2c8/0x760 [ 424.167769] ? kmem_cache_alloc_trace+0x616/0x780 [ 424.172625] ? alloc_pipe_info+0x2a0/0x580 [ 424.176872] alloc_pipe_info+0x2a0/0x580 [ 424.180945] ? pipe_read+0x940/0x940 [ 424.184671] ? __fget+0x40c/0x650 [ 424.188143] ? expand_files.part.8+0x9a0/0x9a0 [ 424.192734] ? find_held_lock+0x36/0x1c0 [ 424.196812] splice_direct_to_actor+0x6e7/0x8d0 [ 424.201506] ? graph_lock+0x170/0x170 [ 424.205322] ? pipe_to_sendpage+0x3f0/0x3f0 [ 424.209669] ? lock_downgrade+0x8e0/0x8e0 [ 424.213833] ? do_splice_to+0x190/0x190 [ 424.217820] ? rw_verify_area+0x118/0x360 [ 424.221976] do_splice_direct+0x2cc/0x400 [ 424.226148] ? splice_direct_to_actor+0x8d0/0x8d0 [ 424.231009] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 424.236552] ? __sb_start_write+0x17f/0x300 [ 424.240880] do_sendfile+0x60f/0xe00 [ 424.244606] ? do_compat_pwritev64+0x1b0/0x1b0 [ 424.249193] ? __might_sleep+0x95/0x190 2018/05/15 08:24:53 executing program 4: perf_event_open$cgroup(&(0x7f0000000240)={0x7, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x101, 0x6, 0x6, 0x0, 0x0, 0x7, 0x5, 0x200, 0x4, 0x2, 0xa813, 0x4, 0x9, 0x1, 0x4, 0xfffffffffffffff9, 0x5, 0x0, 0x5, 0x6, @perf_bp={&(0x7f0000000200), 0x6}, 0x10202, 0x4, 0x4, 0x7, 0xdf, 0x9, 0x3}, 0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x8) 2018/05/15 08:24:53 executing program 0: perf_event_open$cgroup(&(0x7f0000000240)={0x7, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x7, 0x5, 0x200, 0x4, 0x2, 0xa813, 0x4, 0x9, 0x1, 0x4, 0xfffffffffffffff9, 0x5, 0x0, 0x5, 0x6, @perf_bp={&(0x7f0000000200), 0x6}, 0x10202, 0x4, 0x4, 0x7, 0xdf, 0x9, 0x3}, 0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x8) 2018/05/15 08:24:53 executing program 2: syz_emit_ethernet(0x3e, &(0x7f00000001c0)={@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, @dev={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa]}, [], {@ipv6={0x86dd, {0x0, 0x6, "50a09c", 0x8, 0x0, 0x0, @remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x3300], 0xbb}, @local={0xfe, 0x80, [], 0xaa}, {[], @udp={0x0, 0x0, 0x8}}}}}}, &(0x7f0000000040)) 2018/05/15 08:24:53 executing program 3: syz_emit_ethernet(0x3e, &(0x7f00000001c0)={@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, @dev={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa]}, [], {@ipv6={0x86dd, {0x0, 0x6, "50a09c", 0x8, 0xffffff87, 0x0, @remote={0xfe, 0x80, [0x0, 0x0, 0x700000000000000], 0xbb}, @local={0xfe, 0x80, [], 0xaa}, {[], @udp={0x0, 0x0, 0x8}}}}}}, &(0x7f0000000040)) [ 424.253184] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 424.258730] ? _copy_from_user+0xdf/0x150 [ 424.262889] __x64_sys_sendfile64+0x155/0x240 [ 424.267391] ? __ia32_sys_sendfile+0x290/0x290 [ 424.271979] ? do_syscall_64+0x92/0x800 [ 424.275964] do_syscall_64+0x1b1/0x800 [ 424.279855] ? finish_task_switch+0x1ca/0x840 [ 424.284358] ? syscall_return_slowpath+0x5c0/0x5c0 [ 424.289288] ? syscall_return_slowpath+0x30f/0x5c0 [ 424.294224] ? entry_SYSCALL_64_after_hwframe+0x59/0xbe [ 424.299598] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 424.304452] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 424.309639] RIP: 0033:0x455a09 [ 424.312826] RSP: 002b:00007ffbeaa32c68 EFLAGS: 00000246 ORIG_RAX: 0000000000000028 [ 424.320538] RAX: ffffffffffffffda RBX: 00007ffbeaa336d4 RCX: 0000000000455a09 [ 424.328175] RDX: 0000000020000000 RSI: 0000000000000013 RDI: 0000000000000013 [ 424.335442] RBP: 000000000072bea0 R08: 0000000000000000 R09: 0000000000000000 [ 424.342711] R10: 000000007fffffff R11: 0000000000000246 R12: 0000000000000014 [ 424.344846] FAT-fs (loop1): bogus number of reserved sectors [ 424.349977] R13: 0000000000000579 R14: 00000000006fc3f8 R15: 0000000000000001 [ 424.364245] FAT-fs (loop1): Can't find a valid FAT filesystem 2018/05/15 08:24:53 executing program 7: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup(r0) setsockopt$bt_l2cap_L2CAP_LM(r1, 0x6, 0x22, &(0x7f0000000040), 0x4) getresuid(&(0x7f0000000080), &(0x7f00000000c0)=0x0, &(0x7f0000000100)) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000d40)=@broute={'broute\x00', 0x20, 0x4, 0x928, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000400], 0x0, &(0x7f0000000000), &(0x7f0000000400)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x2, [{{{0x5, 0x7, 0x4, 'bcsh0\x00', 'sit0\x00', 'syzkaller1\x00', 'veth0\x00', @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [0xff, 0xff, 0xff, 0xff], @dev={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0x18}, [0xff, 0x0, 0x0, 0x0, 0x0, 0xff], 0x1d8, 0x228, 0x258, [@comment={'comment\x00', 0x100}, @owner={'owner\x00', 0x18, {{r2, 0x0, 0x0, 0x0, 0x1, 0x1}}}]}, [@common=@LED={'LED\x00', 0x28, {{'syz0\x00', 0x1, 0x0, 0x800}}}]}, @common=@redirect={'redirect\x00', 0x8, {{0xfffffffffffffffe}}}}, {{{0x11, 0x4, 0x88e7, 'veth1_to_bond\x00', 'erspan0\x00', 'bridge_slave_1\x00', 'veth0_to_bridge\x00', @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [0xff, 0xff, 0x0, 0xff, 0x0, 0xff], @random="cfa071dc33d9", [0xff, 0xff, 0xff, 0xff, 0xff, 0xff], 0x2e0, 0x2e0, 0x330, [@mac={'mac\x00', 0x10, {{@remote={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xbb}, 0x1}}}, @bpf0={'bpf\x00', 0x210, {{0x20, [{0x8000, 0x4902, 0x5, 0x3ff}, {0x5, 0x8, 0x2, 0xff}, {0x1000, 0x48000000000, 0x3}, {0xf7, 0x1f, 0xfffffffffffffe00, 0x1}, {0x10000, 0xfc0, 0x1, 0x6}, {0x4, 0x2, 0xcefa, 0x81}, {0x815, 0xc7, 0x8001, 0x6a0}, {0x40, 0x0, 0x9, 0x80000001}, {0xffffffffffffff53, 0x38a, 0x100000000, 0x7}, {0x5, 0x1, 0x1000, 0x10001}, {0x80000000, 0x7, 0x1, 0xf7}, {0x2, 0x9, 0x4c, 0x5}, {0xfffffffffffffff7, 0x0, 0xe74, 0x52a}, {0x1ff, 0x7, 0x3, 0x7}, {0x6, 0x1ff, 0x49, 0x7}, {0x8000, 0x0, 0x7, 0x684}, {0xffe, 0x988, 0x3, 0x1}, {0x7b, 0x5a07, 0x18, 0x7}, {0xfffffffffffffffe, 0xfff, 0x3, 0x178180a0}, {0x2, 0xc0, 0x6, 0x401}, {0x5, 0x3, 0x8, 0x8}, {0xffffffffffff0001, 0x3, 0xfffffffffffffff7, 0x5}, {0x1ff, 0x8001, 0x3}, {0x3, 0x9, 0xffffffff, 0x2}, {0x5, 0x4, 0x574, 0x64c}, {0x5, 0x4, 0x10001, 0x6}, {0x1, 0x5b2c, 0x3ff, 0x7}, {0xff, 0x2, 0x5, 0x62c5fc18}, {0x101, 0x7, 0x2, 0xfffffffffffffffd}, {0x7fff, 0x6, 0x8, 0x4}, {0x9, 0x0, 0x7, 0xff}, {0x4, 0x4, 0x4, 0x10000}, {0x59b0, 0xfff, 0x4, 0x4}, {0x1f, 0xfffffffffffffffd, 0x8001, 0x800}, {0x0, 0xffffffffffffffff, 0x2, 0x65}, {0x1ff, 0x1, 0x2, 0x7ff}, {0x4, 0x5, 0x1, 0x7be}, {0x9e4, 0x0, 0x7, 0x5}, {0x5, 0x8, 0x7f, 0xffffffff}, {0x4, 0x6, 0x5, 0x7ff}, {0x22aaaf52, 0x8f, 0x6, 0x10000}, {0x2, 0x7, 0xffff}, {0x5, 0xfffffffff016eb50, 0x82, 0x7}, {0x38, 0x800, 0x9a2a, 0xfffffffffffffffc}, {0x5, 0xb, 0x4, 0xfffffffffffff001}, {0x8b5, 0x81, 0x4, 0x2}, {0x8, 0xfffffffffffffff8, 0x1, 0x8}, {0x40, 0x4, 0x1, 0x100000001}, {0x9b, 0x5, 0x1, 0xd64c}, {0x100, 0x8, 0x7, 0x3ff}, {0xf11, 0x200, 0x7, 0x2}, {0xac5, 0x0, 0x3, 0x7}, {0x518, 0x1, 0x80}, {0x6, 0x7f, 0x6, 0x7298}, {0x7, 0x1, 0x2, 0x1ec9}, {0x400, 0x2, 0x6, 0x6c3}, {0x100000001, 0x6, 0x5, 0x9}, {0x8, 0x1dae, 0xfffffffffffffff8, 0x101}, {0x2, 0x7, 0x8, 0x3}, {0x0, 0x45b, 0x7, 0x72}, {0x100000001, 0xc00000000000, 0x100000001, 0x8}, {0x100000001, 0x0, 0xfffffffffffffffc, 0x3}, {0x95, 0x90b, 0x0, 0xfffffffffffff565}, {0x0, 0x4, 0x0, 0x2}], 0x40}}}]}}, @common=@IDLETIMER={'IDLETIMER\x00', 0x28, {{0x7f, 'syz0\x00'}}}}]}, {0x0, '\x00', 0x2, 0xfffffffffffffffc}, {0x0, '\x00', 0x2, 0xffffffffffffffff, 0x2, [{{{0x11, 0x40, 0x87df, 'irlan0\x00', 'sit0\x00', 'veth0_to_team\x00', 'ip6gretap0\x00', @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [0xff, 0xff, 0xff, 0xff, 0x0, 0xff], @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [0x0, 0xff, 0x0, 0xff], 0xb0, 0x210, 0x258, [@time={'time\x00', 0x18, {{0x1ff, 0x1, 0xe063, 0xb6c5, 0x2e80, 0x0, 0x2}}}]}, [@common=@redirect={'redirect\x00', 0x8, {{0xffffffffffffffff}}}, @common=@SECMARK={'SECMARK\x00', 0x108, {{0x1, 0x6, 'system_u:object_r:lost_found_t:s0\x00'}}}]}, @common=@ERROR={'ERROR\x00', 0x20, {"4323eed968d7072e70de82f41331fe3aed2aedc8f2fff16e54b1c4e2ad07"}}}, {{{0x5, 0x54, 0x888d, 'ip6gretap0\x00', 'teql0\x00', 'veth1_to_team\x00', 'erspan0\x00', @random="0eae55d5aac5", [0x0, 0xff, 0x0, 0xff, 0xff, 0xff], @empty, [0xff, 0xff, 0xff, 0x0, 0xff, 0xff], 0x70, 0x70, 0xb8}}, @common=@RATEEST={'RATEEST\x00', 0x20, {{'syz0\x00', 0x9, 0x1, 0x4}}}}]}]}, 0x9a0) 2018/05/15 08:24:53 executing program 4: perf_event_open$cgroup(&(0x7f0000000240)={0x7, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x6, 0x0, 0x0, 0x7, 0x5, 0x200, 0x4, 0x2, 0xa813, 0x4, 0x9, 0x1, 0x4, 0xfffffffffffffff9, 0x5, 0x0, 0x5, 0x6, @perf_bp={&(0x7f0000000200), 0x6}, 0x10202, 0x4, 0x4, 0x7, 0xdf, 0x9, 0x3}, 0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x8) 2018/05/15 08:24:53 executing program 0: perf_event_open$cgroup(&(0x7f0000000240)={0x7, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x5, 0x200, 0x4, 0x2, 0xa813, 0x4, 0x9, 0x1, 0x4, 0xfffffffffffffff9, 0x5, 0x0, 0x5, 0x6, @perf_bp={&(0x7f0000000200), 0x6}, 0x10202, 0x4, 0x4, 0x7, 0xdf, 0x9, 0x3}, 0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x8) 2018/05/15 08:24:53 executing program 5 (fault-call:1 fault-nth:2): r0 = syz_open_procfs(0x0, &(0x7f0000000280)='net/ptype\x00') sendfile(r0, r0, &(0x7f0000000000)=0xffffffd, 0x7fffffff) 2018/05/15 08:24:53 executing program 2: syz_emit_ethernet(0x3e, &(0x7f00000001c0)={@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, @dev={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa]}, [], {@ipv6={0x86dd, {0x0, 0x6, "50a09c", 0x8, 0x0, 0x0, @remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x86ddffff00000000], 0xbb}, @local={0xfe, 0x80, [], 0xaa}, {[], @udp={0x0, 0x0, 0x8}}}}}}, &(0x7f0000000040)) 2018/05/15 08:24:53 executing program 3: syz_emit_ethernet(0x3e, &(0x7f00000001c0)={@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, @dev={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa]}, [], {@ipv6={0x86dd, {0x0, 0x6, "50a09c", 0x8, 0xffffff87, 0x0, @remote={0xfe, 0x80, [0x0, 0x0, 0xfffffff5], 0xbb}, @local={0xfe, 0x80, [], 0xaa}, {[], @udp={0x0, 0x0, 0x8}}}}}}, &(0x7f0000000040)) [ 424.599483] FAULT_INJECTION: forcing a failure. [ 424.599483] name failslab, interval 1, probability 0, space 0, times 0 [ 424.610791] CPU: 1 PID: 13897 Comm: syz-executor5 Not tainted 4.17.0-rc5+ #51 [ 424.618069] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 424.627434] Call Trace: [ 424.630035] dump_stack+0x1b9/0x294 [ 424.633673] ? dump_stack_print_info.cold.2+0x52/0x52 [ 424.638875] ? __lock_acquire+0x7f5/0x5140 [ 424.643127] should_fail.cold.4+0xa/0x1a [ 424.647198] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 424.652312] ? debug_check_no_locks_freed+0x310/0x310 [ 424.657510] ? graph_lock+0x170/0x170 [ 424.661319] ? print_usage_bug+0xc0/0xc0 [ 424.665378] ? __lock_acquire+0x7f5/0x5140 [ 424.669604] ? find_held_lock+0x36/0x1c0 [ 424.673652] ? __lock_is_held+0xb5/0x140 [ 424.677723] ? check_same_owner+0x320/0x320 [ 424.682045] ? rcu_note_context_switch+0x710/0x710 [ 424.686961] __should_failslab+0x124/0x180 [ 424.691185] should_failslab+0x9/0x14 [ 424.694976] kmem_cache_alloc_node_trace+0x26f/0x770 [ 424.700063] ? find_held_lock+0x36/0x1c0 [ 424.704113] __kmalloc_node+0x33/0x70 [ 424.707899] kvmalloc_node+0x6b/0x100 [ 424.711697] iov_iter_get_pages_alloc+0x7be/0x14e0 [ 424.716630] ? kasan_check_read+0x11/0x20 [ 424.720762] ? rcu_is_watching+0x85/0x140 [ 424.724896] ? copy_page_to_iter+0xf30/0xf30 [ 424.729289] ? is_bpf_text_address+0xd7/0x170 [ 424.733771] ? kernel_text_address+0x79/0xf0 [ 424.738163] ? __unwind_start+0x166/0x330 [ 424.742300] ? __kernel_text_address+0xd/0x40 [ 424.746781] ? unwind_get_return_address+0x61/0xa0 [ 424.751701] ? __save_stack_trace+0x7e/0xd0 [ 424.756032] ? print_usage_bug+0xc0/0xc0 [ 424.760092] ? save_stack+0xa9/0xd0 [ 424.763710] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 424.768706] ? iov_iter_pipe+0xc2/0x2f0 [ 424.772666] default_file_splice_read+0x1c7/0xad0 [ 424.777491] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 424.782838] ? print_usage_bug+0xc0/0xc0 [ 424.786886] ? do_splice_direct+0x400/0x400 [ 424.791186] ? debug_mutex_init+0x1c/0x60 [ 424.795321] ? trace_hardirqs_on_caller+0x421/0x5c0 [ 424.800325] ? __lockdep_init_map+0x105/0x590 [ 424.804802] ? lockdep_init_map+0x9/0x10 [ 424.808845] ? debug_mutex_init+0x2d/0x60 [ 424.812973] ? __mutex_init+0x1ef/0x280 [ 424.816930] ? __ia32_sys_membarrier+0x150/0x150 [ 424.821665] ? __lockdep_init_map+0x105/0x590 [ 424.826161] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 424.831691] ? fsnotify+0x415/0xfc0 [ 424.835309] ? fsnotify+0xfc0/0xfc0 [ 424.838919] ? fsnotify_first_mark+0x330/0x330 [ 424.843489] ? security_file_permission+0x1c6/0x240 [ 424.848493] ? rw_verify_area+0x118/0x360 [ 424.852621] ? do_splice_direct+0x400/0x400 [ 424.856925] do_splice_to+0x12e/0x190 [ 424.860712] splice_direct_to_actor+0x268/0x8d0 [ 424.865369] ? pipe_to_sendpage+0x3f0/0x3f0 [ 424.869674] ? do_splice_to+0x190/0x190 [ 424.873637] ? rw_verify_area+0x118/0x360 [ 424.877771] do_splice_direct+0x2cc/0x400 [ 424.881914] ? splice_direct_to_actor+0x8d0/0x8d0 [ 424.886746] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 424.892273] ? __sb_start_write+0x17f/0x300 [ 424.896579] do_sendfile+0x60f/0xe00 [ 424.900275] ? do_compat_pwritev64+0x1b0/0x1b0 [ 424.904841] ? __might_sleep+0x95/0x190 [ 424.908800] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 424.914320] ? _copy_from_user+0xdf/0x150 [ 424.918466] __x64_sys_sendfile64+0x155/0x240 [ 424.922963] ? __ia32_sys_sendfile+0x290/0x290 [ 424.927540] ? do_syscall_64+0x92/0x800 [ 424.931511] do_syscall_64+0x1b1/0x800 [ 424.935404] ? finish_task_switch+0x1ca/0x840 [ 424.939903] ? syscall_return_slowpath+0x5c0/0x5c0 [ 424.944830] ? syscall_return_slowpath+0x30f/0x5c0 [ 424.949744] ? entry_SYSCALL_64_after_hwframe+0x59/0xbe [ 424.955095] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 424.959920] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 424.965088] RIP: 0033:0x455a09 [ 424.968266] RSP: 002b:00007ffbeaa32c68 EFLAGS: 00000246 ORIG_RAX: 0000000000000028 [ 424.975956] RAX: ffffffffffffffda RBX: 00007ffbeaa336d4 RCX: 0000000000455a09 [ 424.983209] RDX: 0000000020000000 RSI: 0000000000000013 RDI: 0000000000000013 [ 424.990468] RBP: 000000000072bea0 R08: 0000000000000000 R09: 0000000000000000 2018/05/15 08:24:54 executing program 6: r0 = syz_open_procfs(0x0, &(0x7f0000000280)="6e65742f6970365f7461626c65735f6d61746368657300b6e23bcf6093cb57f8b4d285e9c48608549acee9a66f09d47a011dcc8f5af7870c6c1b6eebe85ebea4ecda4e44def87e8ee568c843daaf2805944012bc0144937e8b04411d09016ca07f7388ded591e346fb612397e79a6fe43e5c6a86bee1565b17b22b8ed5c95b4afbb3a620d1402c50bbaad790d0ffdb7c5a27e60423079f77bf") unlink(&(0x7f0000000080)='./file0\x00') sendfile(r0, r0, &(0x7f00000000c0)=0x10000000, 0x2) ioctl$KDGKBMETA(r0, 0x4b62, &(0x7f0000000100)) getsockopt$inet_sctp_SCTP_PARTIAL_DELIVERY_POINT(r0, 0x84, 0x13, &(0x7f0000000140)={0x0, 0xfffffffffffffffa}, &(0x7f0000000180)=0x8) syslog(0x2, &(0x7f0000000cc0)=""/107, 0x6b) setsockopt$IP_VS_SO_SET_DEL(r0, 0x0, 0x484, &(0x7f0000000200)={0x87, @dev={0xac, 0x14, 0x14, 0x1a}, 0x4e24, 0x2, 'rr\x00', 0x3, 0x2, 0x66}, 0x2c) 2018/05/15 08:24:54 executing program 1: clock_settime(0x6, &(0x7f0000000380)={0x0, 0x1c9c380}) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f00000000c0)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000400), 0x0, &(0x7f0000000600)=ANY=[]) r0 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) fallocate(r0, 0x1, 0x0, 0x10000101) 2018/05/15 08:24:54 executing program 4: perf_event_open$cgroup(&(0x7f0000000240)={0x7, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x7, 0x5, 0x200, 0x4, 0x2, 0xa813, 0x4, 0x9, 0x1, 0x4, 0xfffffffffffffff9, 0x5, 0x0, 0x5, 0x6, @perf_bp={&(0x7f0000000200), 0x6}, 0x10202, 0x4, 0x4, 0x7, 0xdf, 0x9, 0x3}, 0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x8) 2018/05/15 08:24:54 executing program 0: perf_event_open$cgroup(&(0x7f0000000240)={0x7, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x200, 0x4, 0x2, 0xa813, 0x4, 0x9, 0x1, 0x4, 0xfffffffffffffff9, 0x5, 0x0, 0x5, 0x6, @perf_bp={&(0x7f0000000200), 0x6}, 0x10202, 0x4, 0x4, 0x7, 0xdf, 0x9, 0x3}, 0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x8) 2018/05/15 08:24:54 executing program 7: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup(r0) setsockopt$bt_l2cap_L2CAP_LM(r1, 0x6, 0x22, &(0x7f0000000040), 0x4) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000d40)=@broute={'broute\x00', 0x20, 0x4, 0x928, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000400], 0x0, &(0x7f0000000000), &(0x7f0000000400)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x2, [{{{0x5, 0x7, 0x4, 'bcsh0\x00', 'sit0\x00', 'syzkaller1\x00', 'veth0\x00', @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [0xff, 0xff, 0xff, 0xff], @dev={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0x18}, [0xff, 0x0, 0x0, 0x0, 0x0, 0xff], 0x1d8, 0x228, 0x258, [@comment={'comment\x00', 0x100}, @owner={'owner\x00', 0x18, {{0x0, 0x0, 0x0, 0x0, 0x1, 0x1}}}]}, [@common=@LED={'LED\x00', 0x28, {{'syz0\x00', 0x1, 0x0, 0x800}}}]}, @common=@redirect={'redirect\x00', 0x8, {{0xfffffffffffffffe}}}}, {{{0x11, 0x4, 0x88e7, 'veth1_to_bond\x00', 'erspan0\x00', 'bridge_slave_1\x00', 'veth0_to_bridge\x00', @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [0xff, 0xff, 0x0, 0xff, 0x0, 0xff], @random="cfa071dc33d9", [0xff, 0xff, 0xff, 0xff, 0xff, 0xff], 0x2e0, 0x2e0, 0x330, [@mac={'mac\x00', 0x10, {{@remote={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xbb}, 0x1}}}, @bpf0={'bpf\x00', 0x210, {{0x20, [{0x8000, 0x4902, 0x5, 0x3ff}, {0x5, 0x8, 0x2, 0xff}, {0x1000, 0x48000000000, 0x3}, {0xf7, 0x1f, 0xfffffffffffffe00, 0x1}, {0x10000, 0xfc0, 0x1, 0x6}, {0x4, 0x2, 0xcefa, 0x81}, {0x815, 0xc7, 0x8001, 0x6a0}, {0x40, 0x0, 0x9, 0x80000001}, {0xffffffffffffff53, 0x38a, 0x100000000, 0x7}, {0x5, 0x1, 0x1000, 0x10001}, {0x80000000, 0x7, 0x1, 0xf7}, {0x2, 0x9, 0x4c, 0x5}, {0xfffffffffffffff7, 0x0, 0xe74, 0x52a}, {0x1ff, 0x7, 0x3, 0x7}, {0x6, 0x1ff, 0x49, 0x7}, {0x8000, 0x0, 0x7, 0x684}, {0xffe, 0x988, 0x3, 0x1}, {0x7b, 0x5a07, 0x18, 0x7}, {0xfffffffffffffffe, 0xfff, 0x3, 0x178180a0}, {0x2, 0xc0, 0x6, 0x401}, {0x5, 0x3, 0x8, 0x8}, {0xffffffffffff0001, 0x3, 0xfffffffffffffff7, 0x5}, {0x1ff, 0x8001, 0x3}, {0x3, 0x9, 0xffffffff, 0x2}, {0x5, 0x4, 0x574, 0x64c}, {0x5, 0x4, 0x10001, 0x6}, {0x1, 0x5b2c, 0x3ff, 0x7}, {0xff, 0x2, 0x5, 0x62c5fc18}, {0x101, 0x7, 0x2, 0xfffffffffffffffd}, {0x7fff, 0x6, 0x8, 0x4}, {0x9, 0x0, 0x7, 0xff}, {0x4, 0x4, 0x4, 0x10000}, {0x59b0, 0xfff, 0x4, 0x4}, {0x1f, 0xfffffffffffffffd, 0x8001, 0x800}, {0x0, 0xffffffffffffffff, 0x2, 0x65}, {0x1ff, 0x1, 0x2, 0x7ff}, {0x4, 0x5, 0x1, 0x7be}, {0x9e4, 0x0, 0x7, 0x5}, {0x5, 0x8, 0x7f, 0xffffffff}, {0x4, 0x6, 0x5, 0x7ff}, {0x22aaaf52, 0x8f, 0x6, 0x10000}, {0x2, 0x7, 0xffff}, {0x5, 0xfffffffff016eb50, 0x82, 0x7}, {0x38, 0x800, 0x9a2a, 0xfffffffffffffffc}, {0x5, 0xb, 0x4, 0xfffffffffffff001}, {0x8b5, 0x81, 0x4, 0x2}, {0x8, 0xfffffffffffffff8, 0x1, 0x8}, {0x40, 0x4, 0x1, 0x100000001}, {0x9b, 0x5, 0x1, 0xd64c}, {0x100, 0x8, 0x7, 0x3ff}, {0xf11, 0x200, 0x7, 0x2}, {0xac5, 0x0, 0x3, 0x7}, {0x518, 0x1, 0x80}, {0x6, 0x7f, 0x6, 0x7298}, {0x7, 0x1, 0x2, 0x1ec9}, {0x400, 0x2, 0x6, 0x6c3}, {0x100000001, 0x6, 0x5, 0x9}, {0x8, 0x1dae, 0xfffffffffffffff8, 0x101}, {0x2, 0x7, 0x8, 0x3}, {0x0, 0x45b, 0x7, 0x72}, {0x100000001, 0xc00000000000, 0x100000001, 0x8}, {0x100000001, 0x0, 0xfffffffffffffffc, 0x3}, {0x95, 0x90b, 0x0, 0xfffffffffffff565}, {0x0, 0x4, 0x0, 0x2}], 0x40}}}]}}, @common=@IDLETIMER={'IDLETIMER\x00', 0x28, {{0x7f, 'syz0\x00'}}}}]}, {0x0, '\x00', 0x2, 0xfffffffffffffffc}, {0x0, '\x00', 0x2, 0xffffffffffffffff, 0x2, [{{{0x11, 0x40, 0x87df, 'irlan0\x00', 'sit0\x00', 'veth0_to_team\x00', 'ip6gretap0\x00', @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [0xff, 0xff, 0xff, 0xff, 0x0, 0xff], @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [0x0, 0xff, 0x0, 0xff], 0xb0, 0x210, 0x258, [@time={'time\x00', 0x18, {{0x1ff, 0x1, 0xe063, 0xb6c5, 0x2e80, 0x0, 0x2}}}]}, [@common=@redirect={'redirect\x00', 0x8, {{0xffffffffffffffff}}}, @common=@SECMARK={'SECMARK\x00', 0x108, {{0x1, 0x6, 'system_u:object_r:lost_found_t:s0\x00'}}}]}, @common=@ERROR={'ERROR\x00', 0x20, {"4323eed968d7072e70de82f41331fe3aed2aedc8f2fff16e54b1c4e2ad07"}}}, {{{0x5, 0x54, 0x888d, 'ip6gretap0\x00', 'teql0\x00', 'veth1_to_team\x00', 'erspan0\x00', @random="0eae55d5aac5", [0x0, 0xff, 0x0, 0xff, 0xff, 0xff], @empty, [0xff, 0xff, 0xff, 0x0, 0xff, 0xff], 0x70, 0x70, 0xb8}}, @common=@RATEEST={'RATEEST\x00', 0x20, {{'syz0\x00', 0x9, 0x1, 0x4}}}}]}]}, 0x9a0) 2018/05/15 08:24:54 executing program 2: syz_emit_ethernet(0x3e, &(0x7f00000001c0)={@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, @dev={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa]}, [], {@ipv6={0x86dd, {0x0, 0x6, "50a09c", 0x8, 0x0, 0x0, @remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0xfffff000], 0xbb}, @local={0xfe, 0x80, [], 0xaa}, {[], @udp={0x0, 0x0, 0x8}}}}}}, &(0x7f0000000040)) 2018/05/15 08:24:54 executing program 3: syz_emit_ethernet(0x3e, &(0x7f00000001c0)={@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, @dev={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa]}, [], {@ipv6={0x86dd, {0x0, 0x6, "50a09c", 0x8, 0xffffff87, 0x0, @remote={0xfe, 0x80, [0x0, 0x0, 0x4305000000000000], 0xbb}, @local={0xfe, 0x80, [], 0xaa}, {[], @udp={0x0, 0x0, 0x8}}}}}}, &(0x7f0000000040)) 2018/05/15 08:24:54 executing program 5 (fault-call:1 fault-nth:3): r0 = syz_open_procfs(0x0, &(0x7f0000000280)='net/ptype\x00') sendfile(r0, r0, &(0x7f0000000000)=0xffffffd, 0x7fffffff) [ 424.997714] R10: 000000007fffffff R11: 0000000000000246 R12: 0000000000000014 [ 425.004960] R13: 0000000000000579 R14: 00000000006fc3f8 R15: 0000000000000002 [ 425.065435] FAT-fs (loop1): bogus number of reserved sectors [ 425.071357] FAT-fs (loop1): Can't find a valid FAT filesystem [ 425.109559] FAULT_INJECTION: forcing a failure. [ 425.109559] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 425.121670] CPU: 1 PID: 13926 Comm: syz-executor5 Not tainted 4.17.0-rc5+ #51 [ 425.128948] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 425.138297] Call Trace: [ 425.140893] dump_stack+0x1b9/0x294 [ 425.144531] ? dump_stack_print_info.cold.2+0x52/0x52 [ 425.149731] ? find_held_lock+0x36/0x1c0 [ 425.153803] should_fail.cold.4+0xa/0x1a [ 425.157877] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 425.162984] ? graph_lock+0x170/0x170 [ 425.166790] ? kasan_check_read+0x11/0x20 [ 425.170944] ? rcu_bh_force_quiescent_state+0x20/0x20 [ 425.176139] ? find_held_lock+0x36/0x1c0 [ 425.180212] ? __lock_is_held+0xb5/0x140 [ 425.184294] ? check_same_owner+0x320/0x320 [ 425.188627] ? rcu_note_context_switch+0x710/0x710 [ 425.193574] ? __might_sleep+0x95/0x190 [ 425.197561] __alloc_pages_nodemask+0x34e/0xd70 [ 425.202251] ? default_file_splice_read+0x1c7/0xad0 [ 425.207286] ? do_splice_to+0x12e/0x190 [ 425.211263] ? splice_direct_to_actor+0x268/0x8d0 [ 425.216114] ? __alloc_pages_slowpath+0x2db0/0x2db0 [ 425.221134] ? __lock_is_held+0xb5/0x140 [ 425.225213] ? __lock_is_held+0xb5/0x140 [ 425.229294] ? rcu_read_lock_sched_held+0x108/0x120 [ 425.234326] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 425.239879] alloc_pages_current+0x10c/0x210 [ 425.244299] push_pipe+0x400/0x7a0 [ 425.247853] ? __kmalloc_node+0x47/0x70 [ 425.251845] iov_iter_get_pages_alloc+0x84a/0x14e0 [ 425.256787] ? rcu_is_watching+0x85/0x140 [ 425.260944] ? copy_page_to_iter+0xf30/0xf30 [ 425.265363] ? is_bpf_text_address+0xd7/0x170 [ 425.269866] ? kernel_text_address+0x79/0xf0 [ 425.274282] ? __unwind_start+0x166/0x330 [ 425.278441] ? unwind_get_return_address+0x61/0xa0 [ 425.283382] ? __save_stack_trace+0x7e/0xd0 [ 425.287729] ? print_usage_bug+0xc0/0xc0 [ 425.291796] ? save_stack+0xa9/0xd0 [ 425.295444] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 425.300478] ? iov_iter_pipe+0xc2/0x2f0 [ 425.304473] default_file_splice_read+0x1c7/0xad0 [ 425.309315] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 425.314680] ? print_usage_bug+0xc0/0xc0 [ 425.318752] ? do_splice_direct+0x400/0x400 [ 425.323080] ? debug_mutex_init+0x1c/0x60 [ 425.327232] ? trace_hardirqs_on_caller+0x421/0x5c0 [ 425.332261] ? __lockdep_init_map+0x105/0x590 [ 425.336759] ? lockdep_init_map+0x9/0x10 [ 425.340823] ? debug_mutex_init+0x2d/0x60 [ 425.344972] ? __mutex_init+0x1ef/0x280 [ 425.348953] ? __ia32_sys_membarrier+0x150/0x150 [ 425.353708] ? __lockdep_init_map+0x105/0x590 [ 425.358214] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 425.363753] ? fsnotify+0x415/0xfc0 [ 425.367381] ? fsnotify+0xfc0/0xfc0 [ 425.371009] ? fsnotify_first_mark+0x330/0x330 [ 425.375606] ? security_file_permission+0x1c6/0x240 [ 425.380630] ? rw_verify_area+0x118/0x360 [ 425.384782] ? do_splice_direct+0x400/0x400 [ 425.389106] do_splice_to+0x12e/0x190 [ 425.392913] splice_direct_to_actor+0x268/0x8d0 [ 425.397593] ? pipe_to_sendpage+0x3f0/0x3f0 [ 425.401923] ? do_splice_to+0x190/0x190 [ 425.405901] ? rw_verify_area+0x118/0x360 [ 425.410058] do_splice_direct+0x2cc/0x400 [ 425.414229] ? splice_direct_to_actor+0x8d0/0x8d0 [ 425.419083] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 425.424622] ? __sb_start_write+0x17f/0x300 [ 425.428953] do_sendfile+0x60f/0xe00 [ 425.432676] ? do_compat_pwritev64+0x1b0/0x1b0 [ 425.437261] ? __might_sleep+0x95/0x190 [ 425.441249] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 425.446793] ? _copy_from_user+0xdf/0x150 [ 425.450953] __x64_sys_sendfile64+0x155/0x240 [ 425.455454] ? __ia32_sys_sendfile+0x290/0x290 2018/05/15 08:24:54 executing program 2: syz_emit_ethernet(0x3e, &(0x7f00000001c0)={@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, @dev={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa]}, [], {@ipv6={0x86dd, {0x0, 0x6, "50a09c", 0x8, 0x0, 0x0, @remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x4000000], 0xbb}, @local={0xfe, 0x80, [], 0xaa}, {[], @udp={0x0, 0x0, 0x8}}}}}}, &(0x7f0000000040)) 2018/05/15 08:24:54 executing program 3: syz_emit_ethernet(0x3e, &(0x7f00000001c0)={@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, @dev={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa]}, [], {@ipv6={0x86dd, {0x0, 0x6, "50a09c", 0x8, 0xffffff87, 0x0, @remote={0xfe, 0x80, [0x0, 0x0, 0x3f00000000000000], 0xbb}, @local={0xfe, 0x80, [], 0xaa}, {[], @udp={0x0, 0x0, 0x8}}}}}}, &(0x7f0000000040)) 2018/05/15 08:24:54 executing program 2: syz_emit_ethernet(0x3e, &(0x7f00000001c0)={@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, @dev={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa]}, [], {@ipv6={0x86dd, {0x0, 0x6, "50a09c", 0x8, 0x0, 0x0, @remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x806], 0xbb}, @local={0xfe, 0x80, [], 0xaa}, {[], @udp={0x0, 0x0, 0x8}}}}}}, &(0x7f0000000040)) 2018/05/15 08:24:54 executing program 3: syz_emit_ethernet(0x3e, &(0x7f00000001c0)={@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, @dev={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa]}, [], {@ipv6={0x86dd, {0x0, 0x6, "50a09c", 0x8, 0xffffff87, 0x0, @remote={0xfe, 0x80, [0x0, 0x0, 0x2000000], 0xbb}, @local={0xfe, 0x80, [], 0xaa}, {[], @udp={0x0, 0x0, 0x8}}}}}}, &(0x7f0000000040)) 2018/05/15 08:24:54 executing program 2: syz_emit_ethernet(0x3e, &(0x7f00000001c0)={@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, @dev={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa]}, [], {@ipv6={0x86dd, {0x0, 0x6, "50a09c", 0x8, 0x0, 0x0, @remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x2b], 0xbb}, @local={0xfe, 0x80, [], 0xaa}, {[], @udp={0x0, 0x0, 0x8}}}}}}, &(0x7f0000000040)) 2018/05/15 08:24:54 executing program 3: syz_emit_ethernet(0x3e, &(0x7f00000001c0)={@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, @dev={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa]}, [], {@ipv6={0x86dd, {0x0, 0x6, "50a09c", 0x8, 0xffffff87, 0x0, @remote={0xfe, 0x80, [0x0, 0x0, 0x700], 0xbb}, @local={0xfe, 0x80, [], 0xaa}, {[], @udp={0x0, 0x0, 0x8}}}}}}, &(0x7f0000000040)) 2018/05/15 08:24:54 executing program 2: syz_emit_ethernet(0x3e, &(0x7f00000001c0)={@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, @dev={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa]}, [], {@ipv6={0x86dd, {0x0, 0x6, "50a09c", 0x8, 0x0, 0x0, @remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x8100000000000000], 0xbb}, @local={0xfe, 0x80, [], 0xaa}, {[], @udp={0x0, 0x0, 0x8}}}}}}, &(0x7f0000000040)) 2018/05/15 08:24:54 executing program 3: syz_emit_ethernet(0x3e, &(0x7f00000001c0)={@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, @dev={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa]}, [], {@ipv6={0x86dd, {0x0, 0x6, "50a09c", 0x8, 0xffffff87, 0x0, @remote={0xfe, 0x80, [0x0, 0x0, 0x28000000], 0xbb}, @local={0xfe, 0x80, [], 0xaa}, {[], @udp={0x0, 0x0, 0x8}}}}}}, &(0x7f0000000040)) [ 425.460044] ? do_syscall_64+0x92/0x800 [ 425.464027] do_syscall_64+0x1b1/0x800 [ 425.467922] ? finish_task_switch+0x1ca/0x840 [ 425.472425] ? syscall_return_slowpath+0x5c0/0x5c0 [ 425.477360] ? syscall_return_slowpath+0x30f/0x5c0 [ 425.482304] ? entry_SYSCALL_64_after_hwframe+0x59/0xbe [ 425.487678] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 425.492540] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 425.497726] RIP: 0033:0x455a09 [ 425.500914] RSP: 002b:00007ffbeaa32c68 EFLAGS: 00000246 ORIG_RAX: 0000000000000028 [ 425.508628] RAX: ffffffffffffffda RBX: 00007ffbeaa336d4 RCX: 0000000000455a09 [ 425.515897] RDX: 0000000020000000 RSI: 0000000000000013 RDI: 0000000000000013 [ 425.523167] RBP: 000000000072bea0 R08: 0000000000000000 R09: 0000000000000000 [ 425.530430] R10: 000000007fffffff R11: 0000000000000246 R12: 0000000000000014 [ 425.537702] R13: 0000000000000579 R14: 00000000006fc3f8 R15: 0000000000000003 2018/05/15 08:24:54 executing program 6: r0 = syz_open_procfs(0x0, &(0x7f0000000280)="6e65742f6970365f7461626c65735f6d61746368657300b6e23bcf6093cb57f8b4d285e9c48608549acee9a66f09d47a011dcc8f5af7870c6c1b6eebe85ebea4ecda4e44def87e8ee568c843daaf2805944012bc0144937e8b04411d09016ca07f7388ded591e346fb612397e79a6fe43e5c6a86bee1565b17b22b8ed5c95b4afbb3a620d1402c50bbaad790d0ffdb7c5a27e60423079f77bf") unlink(&(0x7f0000000080)='./file0\x00') sendfile(r0, r0, &(0x7f00000000c0)=0x10000000, 0x2) ioctl$KDGKBMETA(r0, 0x4b62, &(0x7f0000000100)) getsockopt$inet_sctp_SCTP_PARTIAL_DELIVERY_POINT(r0, 0x84, 0x13, &(0x7f0000000140)={0x0, 0xfffffffffffffffa}, &(0x7f0000000180)=0x8) syslog(0x2, &(0x7f0000000cc0)=""/107, 0x6b) setsockopt$IP_VS_SO_SET_DEL(r0, 0x0, 0x484, &(0x7f0000000200)={0x87, @dev={0xac, 0x14, 0x14, 0x1a}, 0x4e24, 0x2, 'rr\x00', 0x3, 0x2, 0x66}, 0x2c) 2018/05/15 08:24:54 executing program 7: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup(r0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000d40)=@broute={'broute\x00', 0x20, 0x4, 0x928, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000400], 0x0, &(0x7f0000000000), &(0x7f0000000400)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x2, [{{{0x5, 0x7, 0x4, 'bcsh0\x00', 'sit0\x00', 'syzkaller1\x00', 'veth0\x00', @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [0xff, 0xff, 0xff, 0xff], @dev={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0x18}, [0xff, 0x0, 0x0, 0x0, 0x0, 0xff], 0x1d8, 0x228, 0x258, [@comment={'comment\x00', 0x100}, @owner={'owner\x00', 0x18, {{0x0, 0x0, 0x0, 0x0, 0x1, 0x1}}}]}, [@common=@LED={'LED\x00', 0x28, {{'syz0\x00', 0x1, 0x0, 0x800}}}]}, @common=@redirect={'redirect\x00', 0x8, {{0xfffffffffffffffe}}}}, {{{0x11, 0x4, 0x88e7, 'veth1_to_bond\x00', 'erspan0\x00', 'bridge_slave_1\x00', 'veth0_to_bridge\x00', @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [0xff, 0xff, 0x0, 0xff, 0x0, 0xff], @random="cfa071dc33d9", [0xff, 0xff, 0xff, 0xff, 0xff, 0xff], 0x2e0, 0x2e0, 0x330, [@mac={'mac\x00', 0x10, {{@remote={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xbb}, 0x1}}}, @bpf0={'bpf\x00', 0x210, {{0x20, [{0x8000, 0x4902, 0x5, 0x3ff}, {0x5, 0x8, 0x2, 0xff}, {0x1000, 0x48000000000, 0x3}, {0xf7, 0x1f, 0xfffffffffffffe00, 0x1}, {0x10000, 0xfc0, 0x1, 0x6}, {0x4, 0x2, 0xcefa, 0x81}, {0x815, 0xc7, 0x8001, 0x6a0}, {0x40, 0x0, 0x9, 0x80000001}, {0xffffffffffffff53, 0x38a, 0x100000000, 0x7}, {0x5, 0x1, 0x1000, 0x10001}, {0x80000000, 0x7, 0x1, 0xf7}, {0x2, 0x9, 0x4c, 0x5}, {0xfffffffffffffff7, 0x0, 0xe74, 0x52a}, {0x1ff, 0x7, 0x3, 0x7}, {0x6, 0x1ff, 0x49, 0x7}, {0x8000, 0x0, 0x7, 0x684}, {0xffe, 0x988, 0x3, 0x1}, {0x7b, 0x5a07, 0x18, 0x7}, {0xfffffffffffffffe, 0xfff, 0x3, 0x178180a0}, {0x2, 0xc0, 0x6, 0x401}, {0x5, 0x3, 0x8, 0x8}, {0xffffffffffff0001, 0x3, 0xfffffffffffffff7, 0x5}, {0x1ff, 0x8001, 0x3}, {0x3, 0x9, 0xffffffff, 0x2}, {0x5, 0x4, 0x574, 0x64c}, {0x5, 0x4, 0x10001, 0x6}, {0x1, 0x5b2c, 0x3ff, 0x7}, {0xff, 0x2, 0x5, 0x62c5fc18}, {0x101, 0x7, 0x2, 0xfffffffffffffffd}, {0x7fff, 0x6, 0x8, 0x4}, {0x9, 0x0, 0x7, 0xff}, {0x4, 0x4, 0x4, 0x10000}, {0x59b0, 0xfff, 0x4, 0x4}, {0x1f, 0xfffffffffffffffd, 0x8001, 0x800}, {0x0, 0xffffffffffffffff, 0x2, 0x65}, {0x1ff, 0x1, 0x2, 0x7ff}, {0x4, 0x5, 0x1, 0x7be}, {0x9e4, 0x0, 0x7, 0x5}, {0x5, 0x8, 0x7f, 0xffffffff}, {0x4, 0x6, 0x5, 0x7ff}, {0x22aaaf52, 0x8f, 0x6, 0x10000}, {0x2, 0x7, 0xffff}, {0x5, 0xfffffffff016eb50, 0x82, 0x7}, {0x38, 0x800, 0x9a2a, 0xfffffffffffffffc}, {0x5, 0xb, 0x4, 0xfffffffffffff001}, {0x8b5, 0x81, 0x4, 0x2}, {0x8, 0xfffffffffffffff8, 0x1, 0x8}, {0x40, 0x4, 0x1, 0x100000001}, {0x9b, 0x5, 0x1, 0xd64c}, {0x100, 0x8, 0x7, 0x3ff}, {0xf11, 0x200, 0x7, 0x2}, {0xac5, 0x0, 0x3, 0x7}, {0x518, 0x1, 0x80}, {0x6, 0x7f, 0x6, 0x7298}, {0x7, 0x1, 0x2, 0x1ec9}, {0x400, 0x2, 0x6, 0x6c3}, {0x100000001, 0x6, 0x5, 0x9}, {0x8, 0x1dae, 0xfffffffffffffff8, 0x101}, {0x2, 0x7, 0x8, 0x3}, {0x0, 0x45b, 0x7, 0x72}, {0x100000001, 0xc00000000000, 0x100000001, 0x8}, {0x100000001, 0x0, 0xfffffffffffffffc, 0x3}, {0x95, 0x90b, 0x0, 0xfffffffffffff565}, {0x0, 0x4, 0x0, 0x2}], 0x40}}}]}}, @common=@IDLETIMER={'IDLETIMER\x00', 0x28, {{0x7f, 'syz0\x00'}}}}]}, {0x0, '\x00', 0x2, 0xfffffffffffffffc}, {0x0, '\x00', 0x2, 0xffffffffffffffff, 0x2, [{{{0x11, 0x40, 0x87df, 'irlan0\x00', 'sit0\x00', 'veth0_to_team\x00', 'ip6gretap0\x00', @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [0xff, 0xff, 0xff, 0xff, 0x0, 0xff], @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [0x0, 0xff, 0x0, 0xff], 0xb0, 0x210, 0x258, [@time={'time\x00', 0x18, {{0x1ff, 0x1, 0xe063, 0xb6c5, 0x2e80, 0x0, 0x2}}}]}, [@common=@redirect={'redirect\x00', 0x8, {{0xffffffffffffffff}}}, @common=@SECMARK={'SECMARK\x00', 0x108, {{0x1, 0x6, 'system_u:object_r:lost_found_t:s0\x00'}}}]}, @common=@ERROR={'ERROR\x00', 0x20, {"4323eed968d7072e70de82f41331fe3aed2aedc8f2fff16e54b1c4e2ad07"}}}, {{{0x5, 0x54, 0x888d, 'ip6gretap0\x00', 'teql0\x00', 'veth1_to_team\x00', 'erspan0\x00', @random="0eae55d5aac5", [0x0, 0xff, 0x0, 0xff, 0xff, 0xff], @empty, [0xff, 0xff, 0xff, 0x0, 0xff, 0xff], 0x70, 0x70, 0xb8}}, @common=@RATEEST={'RATEEST\x00', 0x20, {{'syz0\x00', 0x9, 0x1, 0x4}}}}]}]}, 0x9a0) 2018/05/15 08:24:54 executing program 5 (fault-call:1 fault-nth:4): r0 = syz_open_procfs(0x0, &(0x7f0000000280)='net/ptype\x00') sendfile(r0, r0, &(0x7f0000000000)=0xffffffd, 0x7fffffff) 2018/05/15 08:24:54 executing program 1: clock_settime(0x6, &(0x7f0000000380)={0x0, 0x1c9c380}) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f00000000c0)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000400), 0x0, &(0x7f0000000600)=ANY=[]) r0 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) fallocate(r0, 0x1, 0x0, 0x10000101) 2018/05/15 08:24:54 executing program 3: syz_emit_ethernet(0x3e, &(0x7f00000001c0)={@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, @dev={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa]}, [], {@ipv6={0x86dd, {0x0, 0x6, "50a09c", 0x8, 0xffffff87, 0x0, @remote={0xfe, 0x80, [0x0, 0x0, 0x806], 0xbb}, @local={0xfe, 0x80, [], 0xaa}, {[], @udp={0x0, 0x0, 0x8}}}}}}, &(0x7f0000000040)) 2018/05/15 08:24:54 executing program 2: syz_emit_ethernet(0x3e, &(0x7f00000001c0)={@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, @dev={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa]}, [], {@ipv6={0x86dd, {0x0, 0x6, "50a09c", 0x8, 0x0, 0x0, @remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x500000000000000], 0xbb}, @local={0xfe, 0x80, [], 0xaa}, {[], @udp={0x0, 0x0, 0x8}}}}}}, &(0x7f0000000040)) 2018/05/15 08:24:54 executing program 0: perf_event_open$cgroup(&(0x7f0000000240)={0x7, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x200, 0x4, 0x2, 0xa813, 0x4, 0x9, 0x1, 0x4, 0xfffffffffffffff9, 0x5, 0x0, 0x5, 0x6, @perf_bp={&(0x7f0000000200), 0x6}, 0x10202, 0x4, 0x4, 0x7, 0xdf, 0x9, 0x3}, 0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x8) 2018/05/15 08:24:54 executing program 4: perf_event_open$cgroup(&(0x7f0000000240)={0x7, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x5, 0x200, 0x4, 0x2, 0xa813, 0x4, 0x9, 0x1, 0x4, 0xfffffffffffffff9, 0x5, 0x0, 0x5, 0x6, @perf_bp={&(0x7f0000000200), 0x6}, 0x10202, 0x4, 0x4, 0x7, 0xdf, 0x9, 0x3}, 0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x8) [ 425.637794] FAULT_INJECTION: forcing a failure. [ 425.637794] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 425.649695] CPU: 1 PID: 13966 Comm: syz-executor5 Not tainted 4.17.0-rc5+ #51 [ 425.656973] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 425.666880] Call Trace: [ 425.669475] dump_stack+0x1b9/0x294 [ 425.673120] ? dump_stack_print_info.cold.2+0x52/0x52 [ 425.678321] ? find_held_lock+0x36/0x1c0 [ 425.682400] should_fail.cold.4+0xa/0x1a [ 425.686474] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 425.691590] ? graph_lock+0x170/0x170 [ 425.695399] ? kasan_check_read+0x11/0x20 [ 425.699558] ? rcu_bh_force_quiescent_state+0x20/0x20 [ 425.704755] ? find_held_lock+0x36/0x1c0 [ 425.708822] ? __lock_is_held+0xb5/0x140 [ 425.712912] ? check_same_owner+0x320/0x320 [ 425.717247] ? rcu_note_context_switch+0x710/0x710 [ 425.722191] ? __might_sleep+0x95/0x190 [ 425.726171] __alloc_pages_nodemask+0x34e/0xd70 [ 425.730844] ? default_file_splice_read+0x1c7/0xad0 [ 425.735875] ? do_splice_to+0x12e/0x190 [ 425.739857] ? splice_direct_to_actor+0x268/0x8d0 [ 425.744708] ? __alloc_pages_slowpath+0x2db0/0x2db0 [ 425.749729] ? __lock_is_held+0xb5/0x140 [ 425.753813] ? __lock_is_held+0xb5/0x140 [ 425.757890] ? rcu_read_lock_sched_held+0x108/0x120 [ 425.762921] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 425.768473] alloc_pages_current+0x10c/0x210 [ 425.772907] push_pipe+0x400/0x7a0 [ 425.776456] ? __kmalloc_node+0x47/0x70 [ 425.780454] iov_iter_get_pages_alloc+0x84a/0x14e0 [ 425.785401] ? rcu_is_watching+0x85/0x140 [ 425.789562] ? copy_page_to_iter+0xf30/0xf30 [ 425.793988] ? is_bpf_text_address+0xd7/0x170 [ 425.798500] ? kernel_text_address+0x79/0xf0 [ 425.802920] ? __unwind_start+0x166/0x330 [ 425.807077] ? unwind_get_return_address+0x61/0xa0 [ 425.812021] ? __save_stack_trace+0x7e/0xd0 [ 425.816362] ? print_usage_bug+0xc0/0xc0 [ 425.820433] ? save_stack+0xa9/0xd0 [ 425.824064] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 425.829081] ? iov_iter_pipe+0xc2/0x2f0 [ 425.833062] default_file_splice_read+0x1c7/0xad0 [ 425.837909] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 425.843276] ? print_usage_bug+0xc0/0xc0 [ 425.847348] ? do_splice_direct+0x400/0x400 [ 425.851674] ? debug_mutex_init+0x1c/0x60 [ 425.855822] ? trace_hardirqs_on_caller+0x421/0x5c0 [ 425.860840] ? __lockdep_init_map+0x105/0x590 [ 425.865341] ? lockdep_init_map+0x9/0x10 [ 425.869404] ? debug_mutex_init+0x2d/0x60 [ 425.873554] ? __mutex_init+0x1ef/0x280 [ 425.877534] ? __ia32_sys_membarrier+0x150/0x150 [ 425.882290] ? __lockdep_init_map+0x105/0x590 [ 425.886798] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 425.892337] ? fsnotify+0x415/0xfc0 [ 425.895970] ? fsnotify+0xfc0/0xfc0 [ 425.899603] ? fsnotify_first_mark+0x330/0x330 [ 425.904206] ? security_file_permission+0x1c6/0x240 [ 425.909230] ? rw_verify_area+0x118/0x360 [ 425.913382] ? do_splice_direct+0x400/0x400 [ 425.917707] do_splice_to+0x12e/0x190 [ 425.921515] splice_direct_to_actor+0x268/0x8d0 [ 425.926196] ? pipe_to_sendpage+0x3f0/0x3f0 [ 425.930527] ? do_splice_to+0x190/0x190 [ 425.934510] ? rw_verify_area+0x118/0x360 [ 425.938663] do_splice_direct+0x2cc/0x400 [ 425.942821] ? splice_direct_to_actor+0x8d0/0x8d0 [ 425.947677] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 425.953212] ? __sb_start_write+0x17f/0x300 [ 425.957533] do_sendfile+0x60f/0xe00 [ 425.961257] ? do_compat_pwritev64+0x1b0/0x1b0 [ 425.965844] ? __might_sleep+0x95/0x190 [ 425.969827] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 425.975374] ? _copy_from_user+0xdf/0x150 [ 425.979531] __x64_sys_sendfile64+0x155/0x240 [ 425.984029] ? __ia32_sys_sendfile+0x290/0x290 [ 425.988616] ? do_syscall_64+0x92/0x800 [ 425.992595] do_syscall_64+0x1b1/0x800 [ 425.996506] ? finish_task_switch+0x1ca/0x840 [ 426.001009] ? syscall_return_slowpath+0x5c0/0x5c0 [ 426.005945] ? syscall_return_slowpath+0x30f/0x5c0 [ 426.010884] ? entry_SYSCALL_64_after_hwframe+0x59/0xbe [ 426.016256] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 426.021109] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 426.026315] RIP: 0033:0x455a09 [ 426.029502] RSP: 002b:00007ffbeaa32c68 EFLAGS: 00000246 ORIG_RAX: 0000000000000028 2018/05/15 08:24:54 executing program 0: perf_event_open$cgroup(&(0x7f0000000240)={0x7, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x200, 0x4, 0x2, 0xa813, 0x4, 0x9, 0x1, 0x4, 0xfffffffffffffff9, 0x5, 0x0, 0x5, 0x6, @perf_bp={&(0x7f0000000200), 0x6}, 0x10202, 0x4, 0x4, 0x7, 0xdf, 0x9, 0x3}, 0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x8) 2018/05/15 08:24:54 executing program 3: syz_emit_ethernet(0x3e, &(0x7f00000001c0)={@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, @dev={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa]}, [], {@ipv6={0x86dd, {0x0, 0x6, "50a09c", 0x8, 0xffffff87, 0x0, @remote={0xfe, 0x80, [0x0, 0x0, 0x400000000000000], 0xbb}, @local={0xfe, 0x80, [], 0xaa}, {[], @udp={0x0, 0x0, 0x8}}}}}}, &(0x7f0000000040)) 2018/05/15 08:24:55 executing program 7: socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(0xffffffffffffffff, 0x0, 0x80, &(0x7f0000000d40)=@broute={'broute\x00', 0x20, 0x4, 0x928, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000400], 0x0, &(0x7f0000000000), &(0x7f0000000400)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x2, [{{{0x5, 0x7, 0x4, 'bcsh0\x00', 'sit0\x00', 'syzkaller1\x00', 'veth0\x00', @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [0xff, 0xff, 0xff, 0xff], @dev={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0x18}, [0xff, 0x0, 0x0, 0x0, 0x0, 0xff], 0x1d8, 0x228, 0x258, [@comment={'comment\x00', 0x100}, @owner={'owner\x00', 0x18, {{0x0, 0x0, 0x0, 0x0, 0x1, 0x1}}}]}, [@common=@LED={'LED\x00', 0x28, {{'syz0\x00', 0x1, 0x0, 0x800}}}]}, @common=@redirect={'redirect\x00', 0x8, {{0xfffffffffffffffe}}}}, {{{0x11, 0x4, 0x88e7, 'veth1_to_bond\x00', 'erspan0\x00', 'bridge_slave_1\x00', 'veth0_to_bridge\x00', @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [0xff, 0xff, 0x0, 0xff, 0x0, 0xff], @random="cfa071dc33d9", [0xff, 0xff, 0xff, 0xff, 0xff, 0xff], 0x2e0, 0x2e0, 0x330, [@mac={'mac\x00', 0x10, {{@remote={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xbb}, 0x1}}}, @bpf0={'bpf\x00', 0x210, {{0x20, [{0x8000, 0x4902, 0x5, 0x3ff}, {0x5, 0x8, 0x2, 0xff}, {0x1000, 0x48000000000, 0x3}, {0xf7, 0x1f, 0xfffffffffffffe00, 0x1}, {0x10000, 0xfc0, 0x1, 0x6}, {0x4, 0x2, 0xcefa, 0x81}, {0x815, 0xc7, 0x8001, 0x6a0}, {0x40, 0x0, 0x9, 0x80000001}, {0xffffffffffffff53, 0x38a, 0x100000000, 0x7}, {0x5, 0x1, 0x1000, 0x10001}, {0x80000000, 0x7, 0x1, 0xf7}, {0x2, 0x9, 0x4c, 0x5}, {0xfffffffffffffff7, 0x0, 0xe74, 0x52a}, {0x1ff, 0x7, 0x3, 0x7}, {0x6, 0x1ff, 0x49, 0x7}, {0x8000, 0x0, 0x7, 0x684}, {0xffe, 0x988, 0x3, 0x1}, {0x7b, 0x5a07, 0x18, 0x7}, {0xfffffffffffffffe, 0xfff, 0x3, 0x178180a0}, {0x2, 0xc0, 0x6, 0x401}, {0x5, 0x3, 0x8, 0x8}, {0xffffffffffff0001, 0x3, 0xfffffffffffffff7, 0x5}, {0x1ff, 0x8001, 0x3}, {0x3, 0x9, 0xffffffff, 0x2}, {0x5, 0x4, 0x574, 0x64c}, {0x5, 0x4, 0x10001, 0x6}, {0x1, 0x5b2c, 0x3ff, 0x7}, {0xff, 0x2, 0x5, 0x62c5fc18}, {0x101, 0x7, 0x2, 0xfffffffffffffffd}, {0x7fff, 0x6, 0x8, 0x4}, {0x9, 0x0, 0x7, 0xff}, {0x4, 0x4, 0x4, 0x10000}, {0x59b0, 0xfff, 0x4, 0x4}, {0x1f, 0xfffffffffffffffd, 0x8001, 0x800}, {0x0, 0xffffffffffffffff, 0x2, 0x65}, {0x1ff, 0x1, 0x2, 0x7ff}, {0x4, 0x5, 0x1, 0x7be}, {0x9e4, 0x0, 0x7, 0x5}, {0x5, 0x8, 0x7f, 0xffffffff}, {0x4, 0x6, 0x5, 0x7ff}, {0x22aaaf52, 0x8f, 0x6, 0x10000}, {0x2, 0x7, 0xffff}, {0x5, 0xfffffffff016eb50, 0x82, 0x7}, {0x38, 0x800, 0x9a2a, 0xfffffffffffffffc}, {0x5, 0xb, 0x4, 0xfffffffffffff001}, {0x8b5, 0x81, 0x4, 0x2}, {0x8, 0xfffffffffffffff8, 0x1, 0x8}, {0x40, 0x4, 0x1, 0x100000001}, {0x9b, 0x5, 0x1, 0xd64c}, {0x100, 0x8, 0x7, 0x3ff}, {0xf11, 0x200, 0x7, 0x2}, {0xac5, 0x0, 0x3, 0x7}, {0x518, 0x1, 0x80}, {0x6, 0x7f, 0x6, 0x7298}, {0x7, 0x1, 0x2, 0x1ec9}, {0x400, 0x2, 0x6, 0x6c3}, {0x100000001, 0x6, 0x5, 0x9}, {0x8, 0x1dae, 0xfffffffffffffff8, 0x101}, {0x2, 0x7, 0x8, 0x3}, {0x0, 0x45b, 0x7, 0x72}, {0x100000001, 0xc00000000000, 0x100000001, 0x8}, {0x100000001, 0x0, 0xfffffffffffffffc, 0x3}, {0x95, 0x90b, 0x0, 0xfffffffffffff565}, {0x0, 0x4, 0x0, 0x2}], 0x40}}}]}}, @common=@IDLETIMER={'IDLETIMER\x00', 0x28, {{0x7f, 'syz0\x00'}}}}]}, {0x0, '\x00', 0x2, 0xfffffffffffffffc}, {0x0, '\x00', 0x2, 0xffffffffffffffff, 0x2, [{{{0x11, 0x40, 0x87df, 'irlan0\x00', 'sit0\x00', 'veth0_to_team\x00', 'ip6gretap0\x00', @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [0xff, 0xff, 0xff, 0xff, 0x0, 0xff], @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [0x0, 0xff, 0x0, 0xff], 0xb0, 0x210, 0x258, [@time={'time\x00', 0x18, {{0x1ff, 0x1, 0xe063, 0xb6c5, 0x2e80, 0x0, 0x2}}}]}, [@common=@redirect={'redirect\x00', 0x8, {{0xffffffffffffffff}}}, @common=@SECMARK={'SECMARK\x00', 0x108, {{0x1, 0x6, 'system_u:object_r:lost_found_t:s0\x00'}}}]}, @common=@ERROR={'ERROR\x00', 0x20, {"4323eed968d7072e70de82f41331fe3aed2aedc8f2fff16e54b1c4e2ad07"}}}, {{{0x5, 0x54, 0x888d, 'ip6gretap0\x00', 'teql0\x00', 'veth1_to_team\x00', 'erspan0\x00', @random="0eae55d5aac5", [0x0, 0xff, 0x0, 0xff, 0xff, 0xff], @empty, [0xff, 0xff, 0xff, 0x0, 0xff, 0xff], 0x70, 0x70, 0xb8}}, @common=@RATEEST={'RATEEST\x00', 0x20, {{'syz0\x00', 0x9, 0x1, 0x4}}}}]}]}, 0x9a0) 2018/05/15 08:24:55 executing program 0: perf_event_open$cgroup(&(0x7f0000000240)={0x7, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x200, 0x4, 0x2, 0xa813, 0x4, 0x9, 0x1, 0x4, 0xfffffffffffffff9, 0x5, 0x0, 0x5, 0x6, @perf_bp={&(0x7f0000000200), 0x6}, 0x10202, 0x4, 0x4, 0x7, 0xdf, 0x9, 0x3}, 0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x8) 2018/05/15 08:24:55 executing program 3: syz_emit_ethernet(0x3e, &(0x7f00000001c0)={@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, @dev={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa]}, [], {@ipv6={0x86dd, {0x0, 0x6, "50a09c", 0x8, 0xffffff87, 0x0, @remote={0xfe, 0x80, [0x0, 0x0, 0x8100000000000000], 0xbb}, @local={0xfe, 0x80, [], 0xaa}, {[], @udp={0x0, 0x0, 0x8}}}}}}, &(0x7f0000000040)) 2018/05/15 08:24:55 executing program 7: socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(0xffffffffffffffff, 0x0, 0x80, &(0x7f0000000d40)=@broute={'broute\x00', 0x20, 0x4, 0x928, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000400], 0x0, &(0x7f0000000000), &(0x7f0000000400)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x2, [{{{0x5, 0x7, 0x4, 'bcsh0\x00', 'sit0\x00', 'syzkaller1\x00', 'veth0\x00', @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [0xff, 0xff, 0xff, 0xff], @dev={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0x18}, [0xff, 0x0, 0x0, 0x0, 0x0, 0xff], 0x1d8, 0x228, 0x258, [@comment={'comment\x00', 0x100}, @owner={'owner\x00', 0x18, {{0x0, 0x0, 0x0, 0x0, 0x1, 0x1}}}]}, [@common=@LED={'LED\x00', 0x28, {{'syz0\x00', 0x1, 0x0, 0x800}}}]}, @common=@redirect={'redirect\x00', 0x8, {{0xfffffffffffffffe}}}}, {{{0x11, 0x4, 0x88e7, 'veth1_to_bond\x00', 'erspan0\x00', 'bridge_slave_1\x00', 'veth0_to_bridge\x00', @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [0xff, 0xff, 0x0, 0xff, 0x0, 0xff], @random="cfa071dc33d9", [0xff, 0xff, 0xff, 0xff, 0xff, 0xff], 0x2e0, 0x2e0, 0x330, [@mac={'mac\x00', 0x10, {{@remote={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xbb}, 0x1}}}, @bpf0={'bpf\x00', 0x210, {{0x20, [{0x8000, 0x4902, 0x5, 0x3ff}, {0x5, 0x8, 0x2, 0xff}, {0x1000, 0x48000000000, 0x3}, {0xf7, 0x1f, 0xfffffffffffffe00, 0x1}, {0x10000, 0xfc0, 0x1, 0x6}, {0x4, 0x2, 0xcefa, 0x81}, {0x815, 0xc7, 0x8001, 0x6a0}, {0x40, 0x0, 0x9, 0x80000001}, {0xffffffffffffff53, 0x38a, 0x100000000, 0x7}, {0x5, 0x1, 0x1000, 0x10001}, {0x80000000, 0x7, 0x1, 0xf7}, {0x2, 0x9, 0x4c, 0x5}, {0xfffffffffffffff7, 0x0, 0xe74, 0x52a}, {0x1ff, 0x7, 0x3, 0x7}, {0x6, 0x1ff, 0x49, 0x7}, {0x8000, 0x0, 0x7, 0x684}, {0xffe, 0x988, 0x3, 0x1}, {0x7b, 0x5a07, 0x18, 0x7}, {0xfffffffffffffffe, 0xfff, 0x3, 0x178180a0}, {0x2, 0xc0, 0x6, 0x401}, {0x5, 0x3, 0x8, 0x8}, {0xffffffffffff0001, 0x3, 0xfffffffffffffff7, 0x5}, {0x1ff, 0x8001, 0x3}, {0x3, 0x9, 0xffffffff, 0x2}, {0x5, 0x4, 0x574, 0x64c}, {0x5, 0x4, 0x10001, 0x6}, {0x1, 0x5b2c, 0x3ff, 0x7}, {0xff, 0x2, 0x5, 0x62c5fc18}, {0x101, 0x7, 0x2, 0xfffffffffffffffd}, {0x7fff, 0x6, 0x8, 0x4}, {0x9, 0x0, 0x7, 0xff}, {0x4, 0x4, 0x4, 0x10000}, {0x59b0, 0xfff, 0x4, 0x4}, {0x1f, 0xfffffffffffffffd, 0x8001, 0x800}, {0x0, 0xffffffffffffffff, 0x2, 0x65}, {0x1ff, 0x1, 0x2, 0x7ff}, {0x4, 0x5, 0x1, 0x7be}, {0x9e4, 0x0, 0x7, 0x5}, {0x5, 0x8, 0x7f, 0xffffffff}, {0x4, 0x6, 0x5, 0x7ff}, {0x22aaaf52, 0x8f, 0x6, 0x10000}, {0x2, 0x7, 0xffff}, {0x5, 0xfffffffff016eb50, 0x82, 0x7}, {0x38, 0x800, 0x9a2a, 0xfffffffffffffffc}, {0x5, 0xb, 0x4, 0xfffffffffffff001}, {0x8b5, 0x81, 0x4, 0x2}, {0x8, 0xfffffffffffffff8, 0x1, 0x8}, {0x40, 0x4, 0x1, 0x100000001}, {0x9b, 0x5, 0x1, 0xd64c}, {0x100, 0x8, 0x7, 0x3ff}, {0xf11, 0x200, 0x7, 0x2}, {0xac5, 0x0, 0x3, 0x7}, {0x518, 0x1, 0x80}, {0x6, 0x7f, 0x6, 0x7298}, {0x7, 0x1, 0x2, 0x1ec9}, {0x400, 0x2, 0x6, 0x6c3}, {0x100000001, 0x6, 0x5, 0x9}, {0x8, 0x1dae, 0xfffffffffffffff8, 0x101}, {0x2, 0x7, 0x8, 0x3}, {0x0, 0x45b, 0x7, 0x72}, {0x100000001, 0xc00000000000, 0x100000001, 0x8}, {0x100000001, 0x0, 0xfffffffffffffffc, 0x3}, {0x95, 0x90b, 0x0, 0xfffffffffffff565}, {0x0, 0x4, 0x0, 0x2}], 0x40}}}]}}, @common=@IDLETIMER={'IDLETIMER\x00', 0x28, {{0x7f, 'syz0\x00'}}}}]}, {0x0, '\x00', 0x2, 0xfffffffffffffffc}, {0x0, '\x00', 0x2, 0xffffffffffffffff, 0x2, [{{{0x11, 0x40, 0x87df, 'irlan0\x00', 'sit0\x00', 'veth0_to_team\x00', 'ip6gretap0\x00', @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [0xff, 0xff, 0xff, 0xff, 0x0, 0xff], @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [0x0, 0xff, 0x0, 0xff], 0xb0, 0x210, 0x258, [@time={'time\x00', 0x18, {{0x1ff, 0x1, 0xe063, 0xb6c5, 0x2e80, 0x0, 0x2}}}]}, [@common=@redirect={'redirect\x00', 0x8, {{0xffffffffffffffff}}}, @common=@SECMARK={'SECMARK\x00', 0x108, {{0x1, 0x6, 'system_u:object_r:lost_found_t:s0\x00'}}}]}, @common=@ERROR={'ERROR\x00', 0x20, {"4323eed968d7072e70de82f41331fe3aed2aedc8f2fff16e54b1c4e2ad07"}}}, {{{0x5, 0x54, 0x888d, 'ip6gretap0\x00', 'teql0\x00', 'veth1_to_team\x00', 'erspan0\x00', @random="0eae55d5aac5", [0x0, 0xff, 0x0, 0xff, 0xff, 0xff], @empty, [0xff, 0xff, 0xff, 0x0, 0xff, 0xff], 0x70, 0x70, 0xb8}}, @common=@RATEEST={'RATEEST\x00', 0x20, {{'syz0\x00', 0x9, 0x1, 0x4}}}}]}]}, 0x9a0) 2018/05/15 08:24:55 executing program 0: perf_event_open$cgroup(&(0x7f0000000240)={0x7, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x4, 0x2, 0xa813, 0x4, 0x9, 0x1, 0x4, 0xfffffffffffffff9, 0x5, 0x0, 0x5, 0x6, @perf_bp={&(0x7f0000000200), 0x6}, 0x10202, 0x4, 0x4, 0x7, 0xdf, 0x9, 0x3}, 0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x8) 2018/05/15 08:24:55 executing program 3: syz_emit_ethernet(0x3e, &(0x7f00000001c0)={@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, @dev={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa]}, [], {@ipv6={0x86dd, {0x0, 0x6, "50a09c", 0x8, 0xffffff87, 0x0, @remote={0xfe, 0x80, [0x0, 0x0, 0x8000000], 0xbb}, @local={0xfe, 0x80, [], 0xaa}, {[], @udp={0x0, 0x0, 0x8}}}}}}, &(0x7f0000000040)) [ 426.037218] RAX: ffffffffffffffda RBX: 00007ffbeaa336d4 RCX: 0000000000455a09 [ 426.044494] RDX: 0000000020000000 RSI: 0000000000000013 RDI: 0000000000000013 [ 426.051756] RBP: 000000000072bea0 R08: 0000000000000000 R09: 0000000000000000 [ 426.059026] R10: 000000007fffffff R11: 0000000000000246 R12: 0000000000000014 [ 426.066296] R13: 0000000000000579 R14: 00000000006fc3f8 R15: 0000000000000004 [ 426.083593] FAT-fs (loop1): bogus number of reserved sectors [ 426.089448] FAT-fs (loop1): Can't find a valid FAT filesystem 2018/05/15 08:24:55 executing program 3: syz_emit_ethernet(0x3e, &(0x7f00000001c0)={@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, @dev={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa]}, [], {@ipv6={0x86dd, {0x0, 0x6, "50a09c", 0x8, 0xffffff87, 0x0, @remote={0xfe, 0x80, [0x0, 0x0, 0x80350000], 0xbb}, @local={0xfe, 0x80, [], 0xaa}, {[], @udp={0x0, 0x0, 0x8}}}}}}, &(0x7f0000000040)) 2018/05/15 08:24:55 executing program 6: r0 = syz_open_procfs(0x0, &(0x7f0000000280)="6e65742f6970365f7461626c65735f6d61746368657300b6e23bcf6093cb57f8b4d285e9c48608549acee9a66f09d47a011dcc8f5af7870c6c1b6eebe85ebea4ecda4e44def87e8ee568c843daaf2805944012bc0144937e8b04411d09016ca07f7388ded591e346fb612397e79a6fe43e5c6a86bee1565b17b22b8ed5c95b4afbb3a620d1402c50bbaad790d0ffdb7c5a27e60423079f77bf") unlink(&(0x7f0000000080)='./file0\x00') sendfile(r0, r0, &(0x7f00000000c0)=0x10000000, 0x2) ioctl$KDGKBMETA(r0, 0x4b62, &(0x7f0000000100)) getsockopt$inet_sctp_SCTP_PARTIAL_DELIVERY_POINT(r0, 0x84, 0x13, &(0x7f0000000140)={0x0, 0xfffffffffffffffa}, &(0x7f0000000180)=0x8) syslog(0x2, &(0x7f0000000cc0)=""/107, 0x6b) setsockopt$inet_sctp_SCTP_STREAM_SCHEDULER(r0, 0x84, 0x7b, &(0x7f00000001c0)={r1, 0x40ef2843}, 0x8) 2018/05/15 08:24:55 executing program 7: socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(0xffffffffffffffff, 0x0, 0x80, &(0x7f0000000d40)=@broute={'broute\x00', 0x20, 0x4, 0x928, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000400], 0x0, &(0x7f0000000000), &(0x7f0000000400)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x2, [{{{0x5, 0x7, 0x4, 'bcsh0\x00', 'sit0\x00', 'syzkaller1\x00', 'veth0\x00', @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [0xff, 0xff, 0xff, 0xff], @dev={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0x18}, [0xff, 0x0, 0x0, 0x0, 0x0, 0xff], 0x1d8, 0x228, 0x258, [@comment={'comment\x00', 0x100}, @owner={'owner\x00', 0x18, {{0x0, 0x0, 0x0, 0x0, 0x1, 0x1}}}]}, [@common=@LED={'LED\x00', 0x28, {{'syz0\x00', 0x1, 0x0, 0x800}}}]}, @common=@redirect={'redirect\x00', 0x8, {{0xfffffffffffffffe}}}}, {{{0x11, 0x4, 0x88e7, 'veth1_to_bond\x00', 'erspan0\x00', 'bridge_slave_1\x00', 'veth0_to_bridge\x00', @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [0xff, 0xff, 0x0, 0xff, 0x0, 0xff], @random="cfa071dc33d9", [0xff, 0xff, 0xff, 0xff, 0xff, 0xff], 0x2e0, 0x2e0, 0x330, [@mac={'mac\x00', 0x10, {{@remote={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xbb}, 0x1}}}, @bpf0={'bpf\x00', 0x210, {{0x20, [{0x8000, 0x4902, 0x5, 0x3ff}, {0x5, 0x8, 0x2, 0xff}, {0x1000, 0x48000000000, 0x3}, {0xf7, 0x1f, 0xfffffffffffffe00, 0x1}, {0x10000, 0xfc0, 0x1, 0x6}, {0x4, 0x2, 0xcefa, 0x81}, {0x815, 0xc7, 0x8001, 0x6a0}, {0x40, 0x0, 0x9, 0x80000001}, {0xffffffffffffff53, 0x38a, 0x100000000, 0x7}, {0x5, 0x1, 0x1000, 0x10001}, {0x80000000, 0x7, 0x1, 0xf7}, {0x2, 0x9, 0x4c, 0x5}, {0xfffffffffffffff7, 0x0, 0xe74, 0x52a}, {0x1ff, 0x7, 0x3, 0x7}, {0x6, 0x1ff, 0x49, 0x7}, {0x8000, 0x0, 0x7, 0x684}, {0xffe, 0x988, 0x3, 0x1}, {0x7b, 0x5a07, 0x18, 0x7}, {0xfffffffffffffffe, 0xfff, 0x3, 0x178180a0}, {0x2, 0xc0, 0x6, 0x401}, {0x5, 0x3, 0x8, 0x8}, {0xffffffffffff0001, 0x3, 0xfffffffffffffff7, 0x5}, {0x1ff, 0x8001, 0x3}, {0x3, 0x9, 0xffffffff, 0x2}, {0x5, 0x4, 0x574, 0x64c}, {0x5, 0x4, 0x10001, 0x6}, {0x1, 0x5b2c, 0x3ff, 0x7}, {0xff, 0x2, 0x5, 0x62c5fc18}, {0x101, 0x7, 0x2, 0xfffffffffffffffd}, {0x7fff, 0x6, 0x8, 0x4}, {0x9, 0x0, 0x7, 0xff}, {0x4, 0x4, 0x4, 0x10000}, {0x59b0, 0xfff, 0x4, 0x4}, {0x1f, 0xfffffffffffffffd, 0x8001, 0x800}, {0x0, 0xffffffffffffffff, 0x2, 0x65}, {0x1ff, 0x1, 0x2, 0x7ff}, {0x4, 0x5, 0x1, 0x7be}, {0x9e4, 0x0, 0x7, 0x5}, {0x5, 0x8, 0x7f, 0xffffffff}, {0x4, 0x6, 0x5, 0x7ff}, {0x22aaaf52, 0x8f, 0x6, 0x10000}, {0x2, 0x7, 0xffff}, {0x5, 0xfffffffff016eb50, 0x82, 0x7}, {0x38, 0x800, 0x9a2a, 0xfffffffffffffffc}, {0x5, 0xb, 0x4, 0xfffffffffffff001}, {0x8b5, 0x81, 0x4, 0x2}, {0x8, 0xfffffffffffffff8, 0x1, 0x8}, {0x40, 0x4, 0x1, 0x100000001}, {0x9b, 0x5, 0x1, 0xd64c}, {0x100, 0x8, 0x7, 0x3ff}, {0xf11, 0x200, 0x7, 0x2}, {0xac5, 0x0, 0x3, 0x7}, {0x518, 0x1, 0x80}, {0x6, 0x7f, 0x6, 0x7298}, {0x7, 0x1, 0x2, 0x1ec9}, {0x400, 0x2, 0x6, 0x6c3}, {0x100000001, 0x6, 0x5, 0x9}, {0x8, 0x1dae, 0xfffffffffffffff8, 0x101}, {0x2, 0x7, 0x8, 0x3}, {0x0, 0x45b, 0x7, 0x72}, {0x100000001, 0xc00000000000, 0x100000001, 0x8}, {0x100000001, 0x0, 0xfffffffffffffffc, 0x3}, {0x95, 0x90b, 0x0, 0xfffffffffffff565}, {0x0, 0x4, 0x0, 0x2}], 0x40}}}]}}, @common=@IDLETIMER={'IDLETIMER\x00', 0x28, {{0x7f, 'syz0\x00'}}}}]}, {0x0, '\x00', 0x2, 0xfffffffffffffffc}, {0x0, '\x00', 0x2, 0xffffffffffffffff, 0x2, [{{{0x11, 0x40, 0x87df, 'irlan0\x00', 'sit0\x00', 'veth0_to_team\x00', 'ip6gretap0\x00', @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [0xff, 0xff, 0xff, 0xff, 0x0, 0xff], @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [0x0, 0xff, 0x0, 0xff], 0xb0, 0x210, 0x258, [@time={'time\x00', 0x18, {{0x1ff, 0x1, 0xe063, 0xb6c5, 0x2e80, 0x0, 0x2}}}]}, [@common=@redirect={'redirect\x00', 0x8, {{0xffffffffffffffff}}}, @common=@SECMARK={'SECMARK\x00', 0x108, {{0x1, 0x6, 'system_u:object_r:lost_found_t:s0\x00'}}}]}, @common=@ERROR={'ERROR\x00', 0x20, {"4323eed968d7072e70de82f41331fe3aed2aedc8f2fff16e54b1c4e2ad07"}}}, {{{0x5, 0x54, 0x888d, 'ip6gretap0\x00', 'teql0\x00', 'veth1_to_team\x00', 'erspan0\x00', @random="0eae55d5aac5", [0x0, 0xff, 0x0, 0xff, 0xff, 0xff], @empty, [0xff, 0xff, 0xff, 0x0, 0xff, 0xff], 0x70, 0x70, 0xb8}}, @common=@RATEEST={'RATEEST\x00', 0x20, {{'syz0\x00', 0x9, 0x1, 0x4}}}}]}]}, 0x9a0) 2018/05/15 08:24:55 executing program 4: perf_event_open$cgroup(&(0x7f0000000240)={0x7, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x200, 0x4, 0x2, 0xa813, 0x4, 0x9, 0x1, 0x4, 0xfffffffffffffff9, 0x5, 0x0, 0x5, 0x6, @perf_bp={&(0x7f0000000200), 0x6}, 0x10202, 0x4, 0x4, 0x7, 0xdf, 0x9, 0x3}, 0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x8) 2018/05/15 08:24:55 executing program 5 (fault-call:1 fault-nth:5): r0 = syz_open_procfs(0x0, &(0x7f0000000280)='net/ptype\x00') sendfile(r0, r0, &(0x7f0000000000)=0xffffffd, 0x7fffffff) 2018/05/15 08:24:55 executing program 1: clock_settime(0x6, &(0x7f0000000380)={0x0, 0x1c9c380}) perf_event_open(&(0x7f0000000040)={0x1, 0x70}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f00000000c0)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000400), 0x0, &(0x7f0000000600)=ANY=[]) r0 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) fallocate(r0, 0x1, 0x0, 0x10000101) 2018/05/15 08:24:55 executing program 0: perf_event_open$cgroup(&(0x7f0000000240)={0x7, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x2, 0xa813, 0x4, 0x9, 0x1, 0x4, 0xfffffffffffffff9, 0x5, 0x0, 0x5, 0x6, @perf_bp={&(0x7f0000000200), 0x6}, 0x10202, 0x4, 0x4, 0x7, 0xdf, 0x9, 0x3}, 0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x8) 2018/05/15 08:24:55 executing program 2: syz_emit_ethernet(0x3e, &(0x7f00000001c0)={@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, @dev={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa]}, [], {@ipv6={0x86dd, {0x0, 0x6, "50a09c", 0x8, 0x0, 0x0, @remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x8060000], 0xbb}, @local={0xfe, 0x80, [], 0xaa}, {[], @udp={0x0, 0x0, 0x8}}}}}}, &(0x7f0000000040)) [ 426.582000] FAULT_INJECTION: forcing a failure. [ 426.582000] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 426.593967] CPU: 0 PID: 14012 Comm: syz-executor5 Not tainted 4.17.0-rc5+ #51 [ 426.601250] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 426.610603] Call Trace: [ 426.613208] dump_stack+0x1b9/0x294 [ 426.616841] ? dump_stack_print_info.cold.2+0x52/0x52 [ 426.622036] ? find_held_lock+0x36/0x1c0 [ 426.626108] should_fail.cold.4+0xa/0x1a [ 426.630179] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 426.635292] ? graph_lock+0x170/0x170 [ 426.639105] ? kasan_check_read+0x11/0x20 [ 426.643267] ? rcu_bh_force_quiescent_state+0x20/0x20 [ 426.648469] ? find_held_lock+0x36/0x1c0 [ 426.652544] ? __lock_is_held+0xb5/0x140 [ 426.656615] ? check_same_owner+0x320/0x320 [ 426.660949] ? rcu_note_context_switch+0x710/0x710 [ 426.665873] ? __might_sleep+0x95/0x190 [ 426.669842] __alloc_pages_nodemask+0x34e/0xd70 [ 426.674496] ? default_file_splice_read+0x1c7/0xad0 [ 426.679497] ? do_splice_to+0x12e/0x190 [ 426.683459] ? splice_direct_to_actor+0x268/0x8d0 [ 426.688291] ? __alloc_pages_slowpath+0x2db0/0x2db0 [ 426.693292] ? __lock_is_held+0xb5/0x140 [ 426.697347] ? __lock_is_held+0xb5/0x140 [ 426.701397] ? rcu_read_lock_sched_held+0x108/0x120 [ 426.706409] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 426.711934] alloc_pages_current+0x10c/0x210 [ 426.716330] push_pipe+0x400/0x7a0 [ 426.719852] ? __kmalloc_node+0x47/0x70 [ 426.723823] iov_iter_get_pages_alloc+0x84a/0x14e0 [ 426.728739] ? rcu_is_watching+0x85/0x140 [ 426.732875] ? copy_page_to_iter+0xf30/0xf30 [ 426.737276] ? is_bpf_text_address+0xd7/0x170 [ 426.741758] ? kernel_text_address+0x79/0xf0 [ 426.746150] ? __unwind_start+0x166/0x330 [ 426.750285] ? unwind_get_return_address+0x61/0xa0 [ 426.755200] ? __save_stack_trace+0x7e/0xd0 [ 426.759515] ? print_usage_bug+0xc0/0xc0 [ 426.763559] ? save_stack+0xa9/0xd0 [ 426.767170] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 426.772168] ? iov_iter_pipe+0xc2/0x2f0 [ 426.776128] default_file_splice_read+0x1c7/0xad0 [ 426.780957] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 426.786305] ? print_usage_bug+0xc0/0xc0 [ 426.790356] ? do_splice_direct+0x400/0x400 [ 426.794661] ? debug_mutex_init+0x1c/0x60 [ 426.798794] ? trace_hardirqs_on_caller+0x421/0x5c0 [ 426.803796] ? __lockdep_init_map+0x105/0x590 [ 426.808276] ? lockdep_init_map+0x9/0x10 [ 426.812320] ? debug_mutex_init+0x2d/0x60 [ 426.816448] ? __mutex_init+0x1ef/0x280 [ 426.820408] ? __ia32_sys_membarrier+0x150/0x150 [ 426.825145] ? __lockdep_init_map+0x105/0x590 [ 426.829631] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 426.835606] ? fsnotify+0x415/0xfc0 [ 426.839218] ? fsnotify+0xfc0/0xfc0 [ 426.842833] ? fsnotify_first_mark+0x330/0x330 [ 426.847409] ? security_file_permission+0x1c6/0x240 [ 426.852413] ? rw_verify_area+0x118/0x360 [ 426.856543] ? do_splice_direct+0x400/0x400 [ 426.860849] do_splice_to+0x12e/0x190 [ 426.864634] splice_direct_to_actor+0x268/0x8d0 [ 426.869288] ? pipe_to_sendpage+0x3f0/0x3f0 [ 426.873599] ? do_splice_to+0x190/0x190 [ 426.877555] ? rw_verify_area+0x118/0x360 [ 426.881687] do_splice_direct+0x2cc/0x400 [ 426.885828] ? splice_direct_to_actor+0x8d0/0x8d0 [ 426.890671] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 426.896199] ? __sb_start_write+0x17f/0x300 [ 426.900505] do_sendfile+0x60f/0xe00 [ 426.904209] ? do_compat_pwritev64+0x1b0/0x1b0 [ 426.908782] ? __might_sleep+0x95/0x190 [ 426.912746] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 426.918268] ? _copy_from_user+0xdf/0x150 [ 426.922401] __x64_sys_sendfile64+0x155/0x240 [ 426.926889] ? __ia32_sys_sendfile+0x290/0x290 [ 426.931459] ? do_syscall_64+0x92/0x800 [ 426.935422] do_syscall_64+0x1b1/0x800 [ 426.939291] ? finish_task_switch+0x1ca/0x840 [ 426.943773] ? syscall_return_slowpath+0x5c0/0x5c0 [ 426.948686] ? syscall_return_slowpath+0x30f/0x5c0 [ 426.953604] ? entry_SYSCALL_64_after_hwframe+0x59/0xbe [ 426.958956] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 426.963788] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 426.968960] RIP: 0033:0x455a09 [ 426.972133] RSP: 002b:00007ffbeaa32c68 EFLAGS: 00000246 ORIG_RAX: 0000000000000028 [ 426.979834] RAX: ffffffffffffffda RBX: 00007ffbeaa336d4 RCX: 0000000000455a09 [ 426.987087] RDX: 0000000020000000 RSI: 0000000000000013 RDI: 0000000000000013 [ 426.994344] RBP: 000000000072bea0 R08: 0000000000000000 R09: 0000000000000000 [ 427.001606] R10: 000000007fffffff R11: 0000000000000246 R12: 0000000000000014 [ 427.008855] R13: 0000000000000579 R14: 00000000006fc3f8 R15: 0000000000000005 [ 427.041379] FAT-fs (loop1): bogus number of reserved sectors [ 427.047286] FAT-fs (loop1): Can't find a valid FAT filesystem 2018/05/15 08:24:56 executing program 3: syz_emit_ethernet(0x3e, &(0x7f00000001c0)={@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, @dev={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa]}, [], {@ipv6={0x86dd, {0x0, 0x6, "50a09c", 0x8, 0xffffff87, 0x0, @remote={0xfe, 0x80, [0x0, 0x0, 0xf0], 0xbb}, @local={0xfe, 0x80, [], 0xaa}, {[], @udp={0x0, 0x0, 0x8}}}}}}, &(0x7f0000000040)) 2018/05/15 08:24:56 executing program 4: perf_event_open$cgroup(&(0x7f0000000240)={0x7, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x200, 0x4, 0x2, 0xa813, 0x4, 0x9, 0x1, 0x4, 0xfffffffffffffff9, 0x5, 0x0, 0x5, 0x6, @perf_bp={&(0x7f0000000200), 0x6}, 0x10202, 0x4, 0x4, 0x7, 0xdf, 0x9, 0x3}, 0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x8) 2018/05/15 08:24:56 executing program 2: syz_emit_ethernet(0x3e, &(0x7f00000001c0)={@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, @dev={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa]}, [], {@ipv6={0x86dd, {0x0, 0x6, "50a09c", 0x8, 0x0, 0x0, @remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x88470000], 0xbb}, @local={0xfe, 0x80, [], 0xaa}, {[], @udp={0x0, 0x0, 0x8}}}}}}, &(0x7f0000000040)) 2018/05/15 08:24:56 executing program 0: perf_event_open$cgroup(&(0x7f0000000240)={0x7, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0xa813, 0x4, 0x9, 0x1, 0x4, 0xfffffffffffffff9, 0x5, 0x0, 0x5, 0x6, @perf_bp={&(0x7f0000000200), 0x6}, 0x10202, 0x4, 0x4, 0x7, 0xdf, 0x9, 0x3}, 0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x8) 2018/05/15 08:24:56 executing program 6: r0 = syz_open_procfs(0x0, &(0x7f0000000280)="6e65742f6970365f7461626c65735f6d61746368657300b6e23bcf6093cb57f8b4d285e9c48608549acee9a66f09d47a011dcc8f5af7870c6c1b6eebe85ebea4ecda4e44def87e8ee568c843daaf2805944012bc0144937e8b04411d09016ca07f7388ded591e346fb612397e79a6fe43e5c6a86bee1565b17b22b8ed5c95b4afbb3a620d1402c50bbaad790d0ffdb7c5a27e60423079f77bf") unlink(&(0x7f0000000080)='./file0\x00') sendfile(r0, r0, &(0x7f00000000c0)=0x10000000, 0x2) ioctl$KDGKBMETA(r0, 0x4b62, &(0x7f0000000100)) getsockopt$inet_sctp_SCTP_PARTIAL_DELIVERY_POINT(r0, 0x84, 0x13, &(0x7f0000000140)={0x0, 0xfffffffffffffffa}, &(0x7f0000000180)=0x8) syslog(0x2, &(0x7f0000000cc0)=""/107, 0x6b) setsockopt$inet_sctp_SCTP_STREAM_SCHEDULER(r0, 0x84, 0x7b, &(0x7f00000001c0)={r1, 0x40ef2843}, 0x8) 2018/05/15 08:24:56 executing program 7: r0 = dup(0xffffffffffffffff) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000d40)=@broute={'broute\x00', 0x20, 0x4, 0x928, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000400], 0x0, &(0x7f0000000000), &(0x7f0000000400)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x2, [{{{0x5, 0x7, 0x4, 'bcsh0\x00', 'sit0\x00', 'syzkaller1\x00', 'veth0\x00', @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [0xff, 0xff, 0xff, 0xff], @dev={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0x18}, [0xff, 0x0, 0x0, 0x0, 0x0, 0xff], 0x1d8, 0x228, 0x258, [@comment={'comment\x00', 0x100}, @owner={'owner\x00', 0x18, {{0x0, 0x0, 0x0, 0x0, 0x1, 0x1}}}]}, [@common=@LED={'LED\x00', 0x28, {{'syz0\x00', 0x1, 0x0, 0x800}}}]}, @common=@redirect={'redirect\x00', 0x8, {{0xfffffffffffffffe}}}}, {{{0x11, 0x4, 0x88e7, 'veth1_to_bond\x00', 'erspan0\x00', 'bridge_slave_1\x00', 'veth0_to_bridge\x00', @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [0xff, 0xff, 0x0, 0xff, 0x0, 0xff], @random="cfa071dc33d9", [0xff, 0xff, 0xff, 0xff, 0xff, 0xff], 0x2e0, 0x2e0, 0x330, [@mac={'mac\x00', 0x10, {{@remote={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xbb}, 0x1}}}, @bpf0={'bpf\x00', 0x210, {{0x20, [{0x8000, 0x4902, 0x5, 0x3ff}, {0x5, 0x8, 0x2, 0xff}, {0x1000, 0x48000000000, 0x3}, {0xf7, 0x1f, 0xfffffffffffffe00, 0x1}, {0x10000, 0xfc0, 0x1, 0x6}, {0x4, 0x2, 0xcefa, 0x81}, {0x815, 0xc7, 0x8001, 0x6a0}, {0x40, 0x0, 0x9, 0x80000001}, {0xffffffffffffff53, 0x38a, 0x100000000, 0x7}, {0x5, 0x1, 0x1000, 0x10001}, {0x80000000, 0x7, 0x1, 0xf7}, {0x2, 0x9, 0x4c, 0x5}, {0xfffffffffffffff7, 0x0, 0xe74, 0x52a}, {0x1ff, 0x7, 0x3, 0x7}, {0x6, 0x1ff, 0x49, 0x7}, {0x8000, 0x0, 0x7, 0x684}, {0xffe, 0x988, 0x3, 0x1}, {0x7b, 0x5a07, 0x18, 0x7}, {0xfffffffffffffffe, 0xfff, 0x3, 0x178180a0}, {0x2, 0xc0, 0x6, 0x401}, {0x5, 0x3, 0x8, 0x8}, {0xffffffffffff0001, 0x3, 0xfffffffffffffff7, 0x5}, {0x1ff, 0x8001, 0x3}, {0x3, 0x9, 0xffffffff, 0x2}, {0x5, 0x4, 0x574, 0x64c}, {0x5, 0x4, 0x10001, 0x6}, {0x1, 0x5b2c, 0x3ff, 0x7}, {0xff, 0x2, 0x5, 0x62c5fc18}, {0x101, 0x7, 0x2, 0xfffffffffffffffd}, {0x7fff, 0x6, 0x8, 0x4}, {0x9, 0x0, 0x7, 0xff}, {0x4, 0x4, 0x4, 0x10000}, {0x59b0, 0xfff, 0x4, 0x4}, {0x1f, 0xfffffffffffffffd, 0x8001, 0x800}, {0x0, 0xffffffffffffffff, 0x2, 0x65}, {0x1ff, 0x1, 0x2, 0x7ff}, {0x4, 0x5, 0x1, 0x7be}, {0x9e4, 0x0, 0x7, 0x5}, {0x5, 0x8, 0x7f, 0xffffffff}, {0x4, 0x6, 0x5, 0x7ff}, {0x22aaaf52, 0x8f, 0x6, 0x10000}, {0x2, 0x7, 0xffff}, {0x5, 0xfffffffff016eb50, 0x82, 0x7}, {0x38, 0x800, 0x9a2a, 0xfffffffffffffffc}, {0x5, 0xb, 0x4, 0xfffffffffffff001}, {0x8b5, 0x81, 0x4, 0x2}, {0x8, 0xfffffffffffffff8, 0x1, 0x8}, {0x40, 0x4, 0x1, 0x100000001}, {0x9b, 0x5, 0x1, 0xd64c}, {0x100, 0x8, 0x7, 0x3ff}, {0xf11, 0x200, 0x7, 0x2}, {0xac5, 0x0, 0x3, 0x7}, {0x518, 0x1, 0x80}, {0x6, 0x7f, 0x6, 0x7298}, {0x7, 0x1, 0x2, 0x1ec9}, {0x400, 0x2, 0x6, 0x6c3}, {0x100000001, 0x6, 0x5, 0x9}, {0x8, 0x1dae, 0xfffffffffffffff8, 0x101}, {0x2, 0x7, 0x8, 0x3}, {0x0, 0x45b, 0x7, 0x72}, {0x100000001, 0xc00000000000, 0x100000001, 0x8}, {0x100000001, 0x0, 0xfffffffffffffffc, 0x3}, {0x95, 0x90b, 0x0, 0xfffffffffffff565}, {0x0, 0x4, 0x0, 0x2}], 0x40}}}]}}, @common=@IDLETIMER={'IDLETIMER\x00', 0x28, {{0x7f, 'syz0\x00'}}}}]}, {0x0, '\x00', 0x2, 0xfffffffffffffffc}, {0x0, '\x00', 0x2, 0xffffffffffffffff, 0x2, [{{{0x11, 0x40, 0x87df, 'irlan0\x00', 'sit0\x00', 'veth0_to_team\x00', 'ip6gretap0\x00', @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [0xff, 0xff, 0xff, 0xff, 0x0, 0xff], @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [0x0, 0xff, 0x0, 0xff], 0xb0, 0x210, 0x258, [@time={'time\x00', 0x18, {{0x1ff, 0x1, 0xe063, 0xb6c5, 0x2e80, 0x0, 0x2}}}]}, [@common=@redirect={'redirect\x00', 0x8, {{0xffffffffffffffff}}}, @common=@SECMARK={'SECMARK\x00', 0x108, {{0x1, 0x6, 'system_u:object_r:lost_found_t:s0\x00'}}}]}, @common=@ERROR={'ERROR\x00', 0x20, {"4323eed968d7072e70de82f41331fe3aed2aedc8f2fff16e54b1c4e2ad07"}}}, {{{0x5, 0x54, 0x888d, 'ip6gretap0\x00', 'teql0\x00', 'veth1_to_team\x00', 'erspan0\x00', @random="0eae55d5aac5", [0x0, 0xff, 0x0, 0xff, 0xff, 0xff], @empty, [0xff, 0xff, 0xff, 0x0, 0xff, 0xff], 0x70, 0x70, 0xb8}}, @common=@RATEEST={'RATEEST\x00', 0x20, {{'syz0\x00', 0x9, 0x1, 0x4}}}}]}]}, 0x9a0) 2018/05/15 08:24:56 executing program 1: clock_settime(0x6, &(0x7f0000000380)={0x0, 0x1c9c380}) perf_event_open(&(0x7f0000000040)={0x1, 0x70}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f00000000c0)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000400), 0x0, &(0x7f0000000600)=ANY=[]) r0 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) fallocate(r0, 0x1, 0x0, 0x10000101) 2018/05/15 08:24:56 executing program 5 (fault-call:1 fault-nth:6): r0 = syz_open_procfs(0x0, &(0x7f0000000280)='net/ptype\x00') sendfile(r0, r0, &(0x7f0000000000)=0xffffffd, 0x7fffffff) [ 427.140074] FAULT_INJECTION: forcing a failure. [ 427.140074] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 427.152005] CPU: 1 PID: 14041 Comm: syz-executor5 Not tainted 4.17.0-rc5+ #51 [ 427.159286] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 427.168638] Call Trace: [ 427.171236] dump_stack+0x1b9/0x294 [ 427.174885] ? dump_stack_print_info.cold.2+0x52/0x52 [ 427.180085] ? find_held_lock+0x36/0x1c0 [ 427.184159] should_fail.cold.4+0xa/0x1a [ 427.188228] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 427.193349] ? graph_lock+0x170/0x170 [ 427.197182] ? kasan_check_read+0x11/0x20 [ 427.201347] ? rcu_bh_force_quiescent_state+0x20/0x20 [ 427.206548] ? find_held_lock+0x36/0x1c0 [ 427.210617] ? __lock_is_held+0xb5/0x140 [ 427.214699] ? check_same_owner+0x320/0x320 [ 427.219036] ? rcu_note_context_switch+0x710/0x710 [ 427.223976] ? __might_sleep+0x95/0x190 [ 427.227966] __alloc_pages_nodemask+0x34e/0xd70 [ 427.232642] ? default_file_splice_read+0x1c7/0xad0 [ 427.237668] ? do_splice_to+0x12e/0x190 [ 427.241650] ? splice_direct_to_actor+0x268/0x8d0 [ 427.246504] ? __alloc_pages_slowpath+0x2db0/0x2db0 [ 427.251527] ? __lock_is_held+0xb5/0x140 [ 427.255608] ? __lock_is_held+0xb5/0x140 [ 427.259689] ? rcu_read_lock_sched_held+0x108/0x120 [ 427.264716] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 427.270272] alloc_pages_current+0x10c/0x210 [ 427.274692] push_pipe+0x400/0x7a0 [ 427.278244] ? __kmalloc_node+0x47/0x70 [ 427.282241] iov_iter_get_pages_alloc+0x84a/0x14e0 [ 427.287178] ? rcu_is_watching+0x85/0x140 [ 427.291344] ? copy_page_to_iter+0xf30/0xf30 [ 427.295772] ? is_bpf_text_address+0xd7/0x170 [ 427.300280] ? kernel_text_address+0x79/0xf0 [ 427.304697] ? __unwind_start+0x166/0x330 [ 427.308869] ? unwind_get_return_address+0x61/0xa0 [ 427.313821] ? __save_stack_trace+0x7e/0xd0 [ 427.318162] ? print_usage_bug+0xc0/0xc0 [ 427.322228] ? save_stack+0xa9/0xd0 [ 427.325865] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 427.330883] ? iov_iter_pipe+0xc2/0x2f0 [ 427.334871] default_file_splice_read+0x1c7/0xad0 [ 427.339712] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 427.345075] ? print_usage_bug+0xc0/0xc0 [ 427.349236] ? do_splice_direct+0x400/0x400 [ 427.353562] ? debug_mutex_init+0x1c/0x60 [ 427.357713] ? trace_hardirqs_on_caller+0x421/0x5c0 [ 427.362745] ? __lockdep_init_map+0x105/0x590 [ 427.367245] ? lockdep_init_map+0x9/0x10 [ 427.371308] ? debug_mutex_init+0x2d/0x60 [ 427.375478] ? __mutex_init+0x1ef/0x280 [ 427.379465] ? __ia32_sys_membarrier+0x150/0x150 [ 427.384219] ? __lockdep_init_map+0x105/0x590 2018/05/15 08:24:56 executing program 0: perf_event_open$cgroup(&(0x7f0000000240)={0x7, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x9, 0x1, 0x4, 0xfffffffffffffff9, 0x5, 0x0, 0x5, 0x6, @perf_bp={&(0x7f0000000200), 0x6}, 0x10202, 0x4, 0x4, 0x7, 0xdf, 0x9, 0x3}, 0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x8) 2018/05/15 08:24:56 executing program 4: perf_event_open$cgroup(&(0x7f0000000240)={0x7, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x200, 0x4, 0x2, 0xa813, 0x4, 0x9, 0x1, 0x4, 0xfffffffffffffff9, 0x5, 0x0, 0x5, 0x6, @perf_bp={&(0x7f0000000200), 0x6}, 0x10202, 0x4, 0x4, 0x7, 0xdf, 0x9, 0x3}, 0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x8) 2018/05/15 08:24:56 executing program 6: r0 = syz_open_procfs(0x0, &(0x7f0000000280)="6e65742f6970365f7461626c65735f6d61746368657300b6e23bcf6093cb57f8b4d285e9c48608549acee9a66f09d47a011dcc8f5af7870c6c1b6eebe85ebea4ecda4e44def87e8ee568c843daaf2805944012bc0144937e8b04411d09016ca07f7388ded591e346fb612397e79a6fe43e5c6a86bee1565b17b22b8ed5c95b4afbb3a620d1402c50bbaad790d0ffdb7c5a27e60423079f77bf") unlink(&(0x7f0000000080)='./file0\x00') sendfile(r0, r0, &(0x7f00000000c0)=0x10000000, 0x2) ioctl$KDGKBMETA(r0, 0x4b62, &(0x7f0000000100)) syslog(0x2, &(0x7f0000000cc0)=""/107, 0x6b) setsockopt$inet_sctp_SCTP_STREAM_SCHEDULER(r0, 0x84, 0x7b, &(0x7f00000001c0)={0x0, 0x40ef2843}, 0x8) 2018/05/15 08:24:56 executing program 2: syz_emit_ethernet(0x3e, &(0x7f00000001c0)={@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, @dev={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa]}, [], {@ipv6={0x86dd, {0x0, 0x6, "50a09c", 0x8, 0x0, 0x0, @remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x8100], 0xbb}, @local={0xfe, 0x80, [], 0xaa}, {[], @udp={0x0, 0x0, 0x8}}}}}}, &(0x7f0000000040)) [ 427.388728] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 427.394270] ? fsnotify+0x415/0xfc0 [ 427.397903] ? fsnotify+0xfc0/0xfc0 [ 427.401535] ? fsnotify_first_mark+0x330/0x330 [ 427.406128] ? security_file_permission+0x1c6/0x240 [ 427.411151] ? rw_verify_area+0x118/0x360 [ 427.415299] ? do_splice_direct+0x400/0x400 [ 427.419628] do_splice_to+0x12e/0x190 [ 427.423438] splice_direct_to_actor+0x268/0x8d0 [ 427.428112] ? pipe_to_sendpage+0x3f0/0x3f0 [ 427.432438] ? do_splice_to+0x190/0x190 [ 427.436418] ? rw_verify_area+0x118/0x360 [ 427.438299] FAT-fs (loop1): bogus number of reserved sectors [ 427.440572] do_splice_direct+0x2cc/0x400 [ 427.440590] ? splice_direct_to_actor+0x8d0/0x8d0 [ 427.440613] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 427.446434] FAT-fs (loop1): Can't find a valid FAT filesystem [ 427.450524] ? __sb_start_write+0x17f/0x300 [ 427.450541] do_sendfile+0x60f/0xe00 [ 427.450569] ? do_compat_pwritev64+0x1b0/0x1b0 [ 427.479351] ? __might_sleep+0x95/0x190 [ 427.483354] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 427.488897] ? _copy_from_user+0xdf/0x150 [ 427.493056] __x64_sys_sendfile64+0x155/0x240 [ 427.497562] ? __ia32_sys_sendfile+0x290/0x290 [ 427.502154] ? do_syscall_64+0x92/0x800 [ 427.506148] do_syscall_64+0x1b1/0x800 [ 427.510037] ? finish_task_switch+0x1ca/0x840 [ 427.514542] ? syscall_return_slowpath+0x5c0/0x5c0 [ 427.519479] ? syscall_return_slowpath+0x30f/0x5c0 [ 427.524420] ? entry_SYSCALL_64_after_hwframe+0x59/0xbe [ 427.529803] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 427.534659] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 427.539854] RIP: 0033:0x455a09 [ 427.543044] RSP: 002b:00007ffbeaa32c68 EFLAGS: 00000246 ORIG_RAX: 0000000000000028 [ 427.550755] RAX: ffffffffffffffda RBX: 00007ffbeaa336d4 RCX: 0000000000455a09 [ 427.558025] RDX: 0000000020000000 RSI: 0000000000000013 RDI: 0000000000000013 [ 427.565287] RBP: 000000000072bea0 R08: 0000000000000000 R09: 0000000000000000 [ 427.572545] R10: 000000007fffffff R11: 0000000000000246 R12: 0000000000000014 [ 427.579801] R13: 0000000000000579 R14: 00000000006fc3f8 R15: 0000000000000006 2018/05/15 08:24:56 executing program 0: perf_event_open$cgroup(&(0x7f0000000240)={0x7, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x1, 0x4, 0xfffffffffffffff9, 0x5, 0x0, 0x5, 0x6, @perf_bp={&(0x7f0000000200), 0x6}, 0x10202, 0x4, 0x4, 0x7, 0xdf, 0x9, 0x3}, 0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x8) 2018/05/15 08:24:56 executing program 6: r0 = syz_open_procfs(0x0, &(0x7f0000000280)="6e65742f6970365f7461626c65735f6d61746368657300b6e23bcf6093cb57f8b4d285e9c48608549acee9a66f09d47a011dcc8f5af7870c6c1b6eebe85ebea4ecda4e44def87e8ee568c843daaf2805944012bc0144937e8b04411d09016ca07f7388ded591e346fb612397e79a6fe43e5c6a86bee1565b17b22b8ed5c95b4afbb3a620d1402c50bbaad790d0ffdb7c5a27e60423079f77bf") unlink(&(0x7f0000000080)='./file0\x00') sendfile(r0, r0, &(0x7f00000000c0)=0x10000000, 0x2) syslog(0x2, &(0x7f0000000cc0)=""/107, 0x6b) setsockopt$inet_sctp_SCTP_STREAM_SCHEDULER(r0, 0x84, 0x7b, &(0x7f00000001c0)={0x0, 0x40ef2843}, 0x8) 2018/05/15 08:24:56 executing program 1: perf_event_open(&(0x7f0000000040)={0x1, 0x70}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f00000000c0)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000400), 0x0, &(0x7f0000000600)=ANY=[]) r0 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) fallocate(r0, 0x1, 0x0, 0x10000101) 2018/05/15 08:24:56 executing program 5 (fault-call:1 fault-nth:7): r0 = syz_open_procfs(0x0, &(0x7f0000000280)='net/ptype\x00') sendfile(r0, r0, &(0x7f0000000000)=0xffffffd, 0x7fffffff) 2018/05/15 08:24:56 executing program 2: syz_emit_ethernet(0x3e, &(0x7f00000001c0)={@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, @dev={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa]}, [], {@ipv6={0x86dd, {0x0, 0x6, "50a09c", 0x8, 0x0, 0x0, @remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x2900000000000000], 0xbb}, @local={0xfe, 0x80, [], 0xaa}, {[], @udp={0x0, 0x0, 0x8}}}}}}, &(0x7f0000000040)) 2018/05/15 08:24:56 executing program 4: perf_event_open$cgroup(&(0x7f0000000240)={0x7, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x200, 0x4, 0x2, 0xa813, 0x4, 0x9, 0x1, 0x4, 0xfffffffffffffff9, 0x5, 0x0, 0x5, 0x6, @perf_bp={&(0x7f0000000200), 0x6}, 0x10202, 0x4, 0x4, 0x7, 0xdf, 0x9, 0x3}, 0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x8) 2018/05/15 08:24:56 executing program 3: syz_emit_ethernet(0x3e, &(0x7f00000001c0)={@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, @dev={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa]}, [], {@ipv6={0x86dd, {0x0, 0x6, "50a09c", 0x8, 0xffffff87, 0x0, @remote={0xfe, 0x80, [0x0, 0x0, 0x3580], 0xbb}, @local={0xfe, 0x80, [], 0xaa}, {[], @udp={0x0, 0x0, 0x8}}}}}}, &(0x7f0000000040)) [ 427.677964] FAULT_INJECTION: forcing a failure. [ 427.677964] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 427.689866] CPU: 0 PID: 14081 Comm: syz-executor5 Not tainted 4.17.0-rc5+ #51 [ 427.697147] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 427.706504] Call Trace: [ 427.709107] dump_stack+0x1b9/0x294 [ 427.712748] ? dump_stack_print_info.cold.2+0x52/0x52 [ 427.717944] ? find_held_lock+0x36/0x1c0 [ 427.722014] should_fail.cold.4+0xa/0x1a [ 427.726081] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 427.731187] ? graph_lock+0x170/0x170 [ 427.734995] ? kasan_check_read+0x11/0x20 [ 427.739149] ? rcu_bh_force_quiescent_state+0x20/0x20 [ 427.744345] ? find_held_lock+0x36/0x1c0 [ 427.748418] ? __lock_is_held+0xb5/0x140 [ 427.752503] ? check_same_owner+0x320/0x320 [ 427.756842] ? rcu_note_context_switch+0x710/0x710 [ 427.761795] ? __might_sleep+0x95/0x190 [ 427.765794] __alloc_pages_nodemask+0x34e/0xd70 [ 427.770487] ? default_file_splice_read+0x1c7/0xad0 [ 427.775513] ? do_splice_to+0x12e/0x190 [ 427.779499] ? splice_direct_to_actor+0x268/0x8d0 [ 427.784355] ? __alloc_pages_slowpath+0x2db0/0x2db0 [ 427.789376] ? __lock_is_held+0xb5/0x140 [ 427.793457] ? __lock_is_held+0xb5/0x140 [ 427.797540] ? rcu_read_lock_sched_held+0x108/0x120 [ 427.802673] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 427.808233] alloc_pages_current+0x10c/0x210 [ 427.812656] push_pipe+0x400/0x7a0 [ 427.816205] ? __kmalloc_node+0x47/0x70 [ 427.820195] iov_iter_get_pages_alloc+0x84a/0x14e0 [ 427.825136] ? rcu_is_watching+0x85/0x140 [ 427.829302] ? copy_page_to_iter+0xf30/0xf30 [ 427.833725] ? is_bpf_text_address+0xd7/0x170 [ 427.838239] ? kernel_text_address+0x79/0xf0 [ 427.842667] ? __unwind_start+0x166/0x330 [ 427.846836] ? unwind_get_return_address+0x61/0xa0 [ 427.851778] ? __save_stack_trace+0x7e/0xd0 [ 427.856124] ? print_usage_bug+0xc0/0xc0 [ 427.860193] ? save_stack+0xa9/0xd0 [ 427.863836] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 427.868860] ? iov_iter_pipe+0xc2/0x2f0 [ 427.872845] default_file_splice_read+0x1c7/0xad0 [ 427.877692] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 427.883058] ? print_usage_bug+0xc0/0xc0 [ 427.887134] ? do_splice_direct+0x400/0x400 [ 427.891465] ? debug_mutex_init+0x1c/0x60 [ 427.895621] ? trace_hardirqs_on_caller+0x421/0x5c0 [ 427.900647] ? __lockdep_init_map+0x105/0x590 [ 427.905154] ? lockdep_init_map+0x9/0x10 [ 427.909222] ? debug_mutex_init+0x2d/0x60 [ 427.913373] ? __mutex_init+0x1ef/0x280 [ 427.917350] ? __ia32_sys_membarrier+0x150/0x150 [ 427.922103] ? __lockdep_init_map+0x105/0x590 [ 427.926606] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 427.932144] ? fsnotify+0x415/0xfc0 [ 427.935789] ? fsnotify+0xfc0/0xfc0 [ 427.939425] ? fsnotify_first_mark+0x330/0x330 [ 427.944024] ? security_file_permission+0x1c6/0x240 [ 427.949047] ? rw_verify_area+0x118/0x360 [ 427.953202] ? do_splice_direct+0x400/0x400 [ 427.957532] do_splice_to+0x12e/0x190 [ 427.961340] splice_direct_to_actor+0x268/0x8d0 [ 427.966017] ? pipe_to_sendpage+0x3f0/0x3f0 [ 427.970349] ? do_splice_to+0x190/0x190 [ 427.974325] ? rw_verify_area+0x118/0x360 2018/05/15 08:24:56 executing program 7: r0 = dup(0xffffffffffffffff) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000d40)=@broute={'broute\x00', 0x20, 0x4, 0x928, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000400], 0x0, &(0x7f0000000000), &(0x7f0000000400)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x2, [{{{0x5, 0x7, 0x4, 'bcsh0\x00', 'sit0\x00', 'syzkaller1\x00', 'veth0\x00', @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [0xff, 0xff, 0xff, 0xff], @dev={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0x18}, [0xff, 0x0, 0x0, 0x0, 0x0, 0xff], 0x1d8, 0x228, 0x258, [@comment={'comment\x00', 0x100}, @owner={'owner\x00', 0x18, {{0x0, 0x0, 0x0, 0x0, 0x1, 0x1}}}]}, [@common=@LED={'LED\x00', 0x28, {{'syz0\x00', 0x1, 0x0, 0x800}}}]}, @common=@redirect={'redirect\x00', 0x8, {{0xfffffffffffffffe}}}}, {{{0x11, 0x4, 0x88e7, 'veth1_to_bond\x00', 'erspan0\x00', 'bridge_slave_1\x00', 'veth0_to_bridge\x00', @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [0xff, 0xff, 0x0, 0xff, 0x0, 0xff], @random="cfa071dc33d9", [0xff, 0xff, 0xff, 0xff, 0xff, 0xff], 0x2e0, 0x2e0, 0x330, [@mac={'mac\x00', 0x10, {{@remote={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xbb}, 0x1}}}, @bpf0={'bpf\x00', 0x210, {{0x20, [{0x8000, 0x4902, 0x5, 0x3ff}, {0x5, 0x8, 0x2, 0xff}, {0x1000, 0x48000000000, 0x3}, {0xf7, 0x1f, 0xfffffffffffffe00, 0x1}, {0x10000, 0xfc0, 0x1, 0x6}, {0x4, 0x2, 0xcefa, 0x81}, {0x815, 0xc7, 0x8001, 0x6a0}, {0x40, 0x0, 0x9, 0x80000001}, {0xffffffffffffff53, 0x38a, 0x100000000, 0x7}, {0x5, 0x1, 0x1000, 0x10001}, {0x80000000, 0x7, 0x1, 0xf7}, {0x2, 0x9, 0x4c, 0x5}, {0xfffffffffffffff7, 0x0, 0xe74, 0x52a}, {0x1ff, 0x7, 0x3, 0x7}, {0x6, 0x1ff, 0x49, 0x7}, {0x8000, 0x0, 0x7, 0x684}, {0xffe, 0x988, 0x3, 0x1}, {0x7b, 0x5a07, 0x18, 0x7}, {0xfffffffffffffffe, 0xfff, 0x3, 0x178180a0}, {0x2, 0xc0, 0x6, 0x401}, {0x5, 0x3, 0x8, 0x8}, {0xffffffffffff0001, 0x3, 0xfffffffffffffff7, 0x5}, {0x1ff, 0x8001, 0x3}, {0x3, 0x9, 0xffffffff, 0x2}, {0x5, 0x4, 0x574, 0x64c}, {0x5, 0x4, 0x10001, 0x6}, {0x1, 0x5b2c, 0x3ff, 0x7}, {0xff, 0x2, 0x5, 0x62c5fc18}, {0x101, 0x7, 0x2, 0xfffffffffffffffd}, {0x7fff, 0x6, 0x8, 0x4}, {0x9, 0x0, 0x7, 0xff}, {0x4, 0x4, 0x4, 0x10000}, {0x59b0, 0xfff, 0x4, 0x4}, {0x1f, 0xfffffffffffffffd, 0x8001, 0x800}, {0x0, 0xffffffffffffffff, 0x2, 0x65}, {0x1ff, 0x1, 0x2, 0x7ff}, {0x4, 0x5, 0x1, 0x7be}, {0x9e4, 0x0, 0x7, 0x5}, {0x5, 0x8, 0x7f, 0xffffffff}, {0x4, 0x6, 0x5, 0x7ff}, {0x22aaaf52, 0x8f, 0x6, 0x10000}, {0x2, 0x7, 0xffff}, {0x5, 0xfffffffff016eb50, 0x82, 0x7}, {0x38, 0x800, 0x9a2a, 0xfffffffffffffffc}, {0x5, 0xb, 0x4, 0xfffffffffffff001}, {0x8b5, 0x81, 0x4, 0x2}, {0x8, 0xfffffffffffffff8, 0x1, 0x8}, {0x40, 0x4, 0x1, 0x100000001}, {0x9b, 0x5, 0x1, 0xd64c}, {0x100, 0x8, 0x7, 0x3ff}, {0xf11, 0x200, 0x7, 0x2}, {0xac5, 0x0, 0x3, 0x7}, {0x518, 0x1, 0x80}, {0x6, 0x7f, 0x6, 0x7298}, {0x7, 0x1, 0x2, 0x1ec9}, {0x400, 0x2, 0x6, 0x6c3}, {0x100000001, 0x6, 0x5, 0x9}, {0x8, 0x1dae, 0xfffffffffffffff8, 0x101}, {0x2, 0x7, 0x8, 0x3}, {0x0, 0x45b, 0x7, 0x72}, {0x100000001, 0xc00000000000, 0x100000001, 0x8}, {0x100000001, 0x0, 0xfffffffffffffffc, 0x3}, {0x95, 0x90b, 0x0, 0xfffffffffffff565}, {0x0, 0x4, 0x0, 0x2}], 0x40}}}]}}, @common=@IDLETIMER={'IDLETIMER\x00', 0x28, {{0x7f, 'syz0\x00'}}}}]}, {0x0, '\x00', 0x2, 0xfffffffffffffffc}, {0x0, '\x00', 0x2, 0xffffffffffffffff, 0x2, [{{{0x11, 0x40, 0x87df, 'irlan0\x00', 'sit0\x00', 'veth0_to_team\x00', 'ip6gretap0\x00', @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [0xff, 0xff, 0xff, 0xff, 0x0, 0xff], @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [0x0, 0xff, 0x0, 0xff], 0xb0, 0x210, 0x258, [@time={'time\x00', 0x18, {{0x1ff, 0x1, 0xe063, 0xb6c5, 0x2e80, 0x0, 0x2}}}]}, [@common=@redirect={'redirect\x00', 0x8, {{0xffffffffffffffff}}}, @common=@SECMARK={'SECMARK\x00', 0x108, {{0x1, 0x6, 'system_u:object_r:lost_found_t:s0\x00'}}}]}, @common=@ERROR={'ERROR\x00', 0x20, {"4323eed968d7072e70de82f41331fe3aed2aedc8f2fff16e54b1c4e2ad07"}}}, {{{0x5, 0x54, 0x888d, 'ip6gretap0\x00', 'teql0\x00', 'veth1_to_team\x00', 'erspan0\x00', @random="0eae55d5aac5", [0x0, 0xff, 0x0, 0xff, 0xff, 0xff], @empty, [0xff, 0xff, 0xff, 0x0, 0xff, 0xff], 0x70, 0x70, 0xb8}}, @common=@RATEEST={'RATEEST\x00', 0x20, {{'syz0\x00', 0x9, 0x1, 0x4}}}}]}]}, 0x9a0) 2018/05/15 08:24:57 executing program 3: syz_emit_ethernet(0x3e, &(0x7f00000001c0)={@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, @dev={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa]}, [], {@ipv6={0x86dd, {0x0, 0x6, "50a09c", 0x8, 0xffffff87, 0x0, @remote={0xfe, 0x80, [0x0, 0x0, 0x8847000000000000], 0xbb}, @local={0xfe, 0x80, [], 0xaa}, {[], @udp={0x0, 0x0, 0x8}}}}}}, &(0x7f0000000040)) 2018/05/15 08:24:57 executing program 0: perf_event_open$cgroup(&(0x7f0000000240)={0x7, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x4, 0xfffffffffffffff9, 0x5, 0x0, 0x5, 0x6, @perf_bp={&(0x7f0000000200), 0x6}, 0x10202, 0x4, 0x4, 0x7, 0xdf, 0x9, 0x3}, 0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x8) 2018/05/15 08:24:57 executing program 6: r0 = syz_open_procfs(0x0, &(0x7f0000000280)="6e65742f6970365f7461626c65735f6d61746368657300b6e23bcf6093cb57f8b4d285e9c48608549acee9a66f09d47a011dcc8f5af7870c6c1b6eebe85ebea4ecda4e44def87e8ee568c843daaf2805944012bc0144937e8b04411d09016ca07f7388ded591e346fb612397e79a6fe43e5c6a86bee1565b17b22b8ed5c95b4afbb3a620d1402c50bbaad790d0ffdb7c5a27e60423079f77bf") unlink(&(0x7f0000000080)='./file0\x00') syslog(0x2, &(0x7f0000000cc0)=""/107, 0x6b) setsockopt$inet_sctp_SCTP_STREAM_SCHEDULER(r0, 0x84, 0x7b, &(0x7f00000001c0)={0x0, 0x40ef2843}, 0x8) 2018/05/15 08:24:57 executing program 3: syz_emit_ethernet(0x3e, &(0x7f00000001c0)={@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, @dev={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa]}, [], {@ipv6={0x86dd, {0x0, 0x6, "50a09c", 0x8, 0xffffff87, 0x0, @remote={0xfe, 0x80, [0x0, 0x0, 0x88caffff], 0xbb}, @local={0xfe, 0x80, [], 0xaa}, {[], @udp={0x0, 0x0, 0x8}}}}}}, &(0x7f0000000040)) 2018/05/15 08:24:57 executing program 0: perf_event_open$cgroup(&(0x7f0000000240)={0x7, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0xfffffffffffffff9, 0x5, 0x0, 0x5, 0x6, @perf_bp={&(0x7f0000000200), 0x6}, 0x10202, 0x4, 0x4, 0x7, 0xdf, 0x9, 0x3}, 0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x8) 2018/05/15 08:24:57 executing program 6: r0 = syz_open_procfs(0x0, &(0x7f0000000280)="6e65742f6970365f7461626c65735f6d61746368657300b6e23bcf6093cb57f8b4d285e9c48608549acee9a66f09d47a011dcc8f5af7870c6c1b6eebe85ebea4ecda4e44def87e8ee568c843daaf2805944012bc0144937e8b04411d09016ca07f7388ded591e346fb612397e79a6fe43e5c6a86bee1565b17b22b8ed5c95b4afbb3a620d1402c50bbaad790d0ffdb7c5a27e60423079f77bf") syslog(0x2, &(0x7f0000000cc0)=""/107, 0x6b) setsockopt$inet_sctp_SCTP_STREAM_SCHEDULER(r0, 0x84, 0x7b, &(0x7f00000001c0)={0x0, 0x40ef2843}, 0x8) 2018/05/15 08:24:57 executing program 3: syz_emit_ethernet(0x3e, &(0x7f00000001c0)={@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, @dev={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa]}, [], {@ipv6={0x86dd, {0x0, 0x6, "50a09c", 0x8, 0xffffff87, 0x0, @remote={0xfe, 0x80, [0x0, 0x0, 0x4888], 0xbb}, @local={0xfe, 0x80, [], 0xaa}, {[], @udp={0x0, 0x0, 0x8}}}}}}, &(0x7f0000000040)) [ 427.978479] do_splice_direct+0x2cc/0x400 [ 427.982644] ? splice_direct_to_actor+0x8d0/0x8d0 [ 427.987501] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 427.993041] ? __sb_start_write+0x17f/0x300 [ 427.997370] do_sendfile+0x60f/0xe00 [ 428.001098] ? do_compat_pwritev64+0x1b0/0x1b0 [ 428.005694] ? __might_sleep+0x95/0x190 [ 428.009687] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 428.015230] ? _copy_from_user+0xdf/0x150 [ 428.019385] __x64_sys_sendfile64+0x155/0x240 [ 428.023885] ? __ia32_sys_sendfile+0x290/0x290 [ 428.028474] ? do_syscall_64+0x92/0x800 [ 428.032462] do_syscall_64+0x1b1/0x800 [ 428.036354] ? finish_task_switch+0x1ca/0x840 [ 428.040855] ? syscall_return_slowpath+0x5c0/0x5c0 [ 428.045812] ? syscall_return_slowpath+0x30f/0x5c0 [ 428.050752] ? entry_SYSCALL_64_after_hwframe+0x59/0xbe [ 428.056124] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 428.060979] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 428.066166] RIP: 0033:0x455a09 [ 428.069354] RSP: 002b:00007ffbeaa32c68 EFLAGS: 00000246 ORIG_RAX: 0000000000000028 [ 428.077065] RAX: ffffffffffffffda RBX: 00007ffbeaa336d4 RCX: 0000000000455a09 [ 428.084335] RDX: 0000000020000000 RSI: 0000000000000013 RDI: 0000000000000013 [ 428.091604] RBP: 000000000072bea0 R08: 0000000000000000 R09: 0000000000000000 [ 428.098874] R10: 000000007fffffff R11: 0000000000000246 R12: 0000000000000014 [ 428.106146] R13: 0000000000000579 R14: 00000000006fc3f8 R15: 0000000000000007 2018/05/15 08:24:57 executing program 0: perf_event_open$cgroup(&(0x7f0000000240)={0x7, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0xfffffffffffffff9, 0x5, 0x0, 0x5, 0x6, @perf_bp={&(0x7f0000000200), 0x6}, 0x10202, 0x4, 0x4, 0x7, 0xdf, 0x9, 0x3}, 0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x8) 2018/05/15 08:24:57 executing program 6: syslog(0x2, &(0x7f0000000cc0)=""/107, 0x6b) setsockopt$inet_sctp_SCTP_STREAM_SCHEDULER(0xffffffffffffffff, 0x84, 0x7b, &(0x7f00000001c0)={0x0, 0x40ef2843}, 0x8) 2018/05/15 08:24:57 executing program 3: syz_emit_ethernet(0x3e, &(0x7f00000001c0)={@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, @dev={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa]}, [], {@ipv6={0x86dd, {0x0, 0x6, "50a09c", 0x8, 0xffffff87, 0x0, @remote={0xfe, 0x80, [0x0, 0x0, 0x800e0000], 0xbb}, @local={0xfe, 0x80, [], 0xaa}, {[], @udp={0x0, 0x0, 0x8}}}}}}, &(0x7f0000000040)) [ 428.129757] FAT-fs (loop1): bogus number of reserved sectors [ 428.135702] FAT-fs (loop1): Can't find a valid FAT filesystem 2018/05/15 08:24:57 executing program 2: syz_emit_ethernet(0x3e, &(0x7f00000001c0)={@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, @dev={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa]}, [], {@ipv6={0x86dd, {0x0, 0x6, "50a09c", 0x8, 0x0, 0x0, @remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200000000000000], 0xbb}, @local={0xfe, 0x80, [], 0xaa}, {[], @udp={0x0, 0x0, 0x8}}}}}}, &(0x7f0000000040)) 2018/05/15 08:24:57 executing program 4: perf_event_open$cgroup(&(0x7f0000000240)={0x7, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x4, 0x2, 0xa813, 0x4, 0x9, 0x1, 0x4, 0xfffffffffffffff9, 0x5, 0x0, 0x5, 0x6, @perf_bp={&(0x7f0000000200), 0x6}, 0x10202, 0x4, 0x4, 0x7, 0xdf, 0x9, 0x3}, 0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x8) 2018/05/15 08:24:57 executing program 7: r0 = dup(0xffffffffffffffff) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000d40)=@broute={'broute\x00', 0x20, 0x4, 0x928, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000400], 0x0, &(0x7f0000000000), &(0x7f0000000400)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x2, [{{{0x5, 0x7, 0x4, 'bcsh0\x00', 'sit0\x00', 'syzkaller1\x00', 'veth0\x00', @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [0xff, 0xff, 0xff, 0xff], @dev={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0x18}, [0xff, 0x0, 0x0, 0x0, 0x0, 0xff], 0x1d8, 0x228, 0x258, [@comment={'comment\x00', 0x100}, @owner={'owner\x00', 0x18, {{0x0, 0x0, 0x0, 0x0, 0x1, 0x1}}}]}, [@common=@LED={'LED\x00', 0x28, {{'syz0\x00', 0x1, 0x0, 0x800}}}]}, @common=@redirect={'redirect\x00', 0x8, {{0xfffffffffffffffe}}}}, {{{0x11, 0x4, 0x88e7, 'veth1_to_bond\x00', 'erspan0\x00', 'bridge_slave_1\x00', 'veth0_to_bridge\x00', @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [0xff, 0xff, 0x0, 0xff, 0x0, 0xff], @random="cfa071dc33d9", [0xff, 0xff, 0xff, 0xff, 0xff, 0xff], 0x2e0, 0x2e0, 0x330, [@mac={'mac\x00', 0x10, {{@remote={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xbb}, 0x1}}}, @bpf0={'bpf\x00', 0x210, {{0x20, [{0x8000, 0x4902, 0x5, 0x3ff}, {0x5, 0x8, 0x2, 0xff}, {0x1000, 0x48000000000, 0x3}, {0xf7, 0x1f, 0xfffffffffffffe00, 0x1}, {0x10000, 0xfc0, 0x1, 0x6}, {0x4, 0x2, 0xcefa, 0x81}, {0x815, 0xc7, 0x8001, 0x6a0}, {0x40, 0x0, 0x9, 0x80000001}, {0xffffffffffffff53, 0x38a, 0x100000000, 0x7}, {0x5, 0x1, 0x1000, 0x10001}, {0x80000000, 0x7, 0x1, 0xf7}, {0x2, 0x9, 0x4c, 0x5}, {0xfffffffffffffff7, 0x0, 0xe74, 0x52a}, {0x1ff, 0x7, 0x3, 0x7}, {0x6, 0x1ff, 0x49, 0x7}, {0x8000, 0x0, 0x7, 0x684}, {0xffe, 0x988, 0x3, 0x1}, {0x7b, 0x5a07, 0x18, 0x7}, {0xfffffffffffffffe, 0xfff, 0x3, 0x178180a0}, {0x2, 0xc0, 0x6, 0x401}, {0x5, 0x3, 0x8, 0x8}, {0xffffffffffff0001, 0x3, 0xfffffffffffffff7, 0x5}, {0x1ff, 0x8001, 0x3}, {0x3, 0x9, 0xffffffff, 0x2}, {0x5, 0x4, 0x574, 0x64c}, {0x5, 0x4, 0x10001, 0x6}, {0x1, 0x5b2c, 0x3ff, 0x7}, {0xff, 0x2, 0x5, 0x62c5fc18}, {0x101, 0x7, 0x2, 0xfffffffffffffffd}, {0x7fff, 0x6, 0x8, 0x4}, {0x9, 0x0, 0x7, 0xff}, {0x4, 0x4, 0x4, 0x10000}, {0x59b0, 0xfff, 0x4, 0x4}, {0x1f, 0xfffffffffffffffd, 0x8001, 0x800}, {0x0, 0xffffffffffffffff, 0x2, 0x65}, {0x1ff, 0x1, 0x2, 0x7ff}, {0x4, 0x5, 0x1, 0x7be}, {0x9e4, 0x0, 0x7, 0x5}, {0x5, 0x8, 0x7f, 0xffffffff}, {0x4, 0x6, 0x5, 0x7ff}, {0x22aaaf52, 0x8f, 0x6, 0x10000}, {0x2, 0x7, 0xffff}, {0x5, 0xfffffffff016eb50, 0x82, 0x7}, {0x38, 0x800, 0x9a2a, 0xfffffffffffffffc}, {0x5, 0xb, 0x4, 0xfffffffffffff001}, {0x8b5, 0x81, 0x4, 0x2}, {0x8, 0xfffffffffffffff8, 0x1, 0x8}, {0x40, 0x4, 0x1, 0x100000001}, {0x9b, 0x5, 0x1, 0xd64c}, {0x100, 0x8, 0x7, 0x3ff}, {0xf11, 0x200, 0x7, 0x2}, {0xac5, 0x0, 0x3, 0x7}, {0x518, 0x1, 0x80}, {0x6, 0x7f, 0x6, 0x7298}, {0x7, 0x1, 0x2, 0x1ec9}, {0x400, 0x2, 0x6, 0x6c3}, {0x100000001, 0x6, 0x5, 0x9}, {0x8, 0x1dae, 0xfffffffffffffff8, 0x101}, {0x2, 0x7, 0x8, 0x3}, {0x0, 0x45b, 0x7, 0x72}, {0x100000001, 0xc00000000000, 0x100000001, 0x8}, {0x100000001, 0x0, 0xfffffffffffffffc, 0x3}, {0x95, 0x90b, 0x0, 0xfffffffffffff565}, {0x0, 0x4, 0x0, 0x2}], 0x40}}}]}}, @common=@IDLETIMER={'IDLETIMER\x00', 0x28, {{0x7f, 'syz0\x00'}}}}]}, {0x0, '\x00', 0x2, 0xfffffffffffffffc}, {0x0, '\x00', 0x2, 0xffffffffffffffff, 0x2, [{{{0x11, 0x40, 0x87df, 'irlan0\x00', 'sit0\x00', 'veth0_to_team\x00', 'ip6gretap0\x00', @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [0xff, 0xff, 0xff, 0xff, 0x0, 0xff], @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [0x0, 0xff, 0x0, 0xff], 0xb0, 0x210, 0x258, [@time={'time\x00', 0x18, {{0x1ff, 0x1, 0xe063, 0xb6c5, 0x2e80, 0x0, 0x2}}}]}, [@common=@redirect={'redirect\x00', 0x8, {{0xffffffffffffffff}}}, @common=@SECMARK={'SECMARK\x00', 0x108, {{0x1, 0x6, 'system_u:object_r:lost_found_t:s0\x00'}}}]}, @common=@ERROR={'ERROR\x00', 0x20, {"4323eed968d7072e70de82f41331fe3aed2aedc8f2fff16e54b1c4e2ad07"}}}, {{{0x5, 0x54, 0x888d, 'ip6gretap0\x00', 'teql0\x00', 'veth1_to_team\x00', 'erspan0\x00', @random="0eae55d5aac5", [0x0, 0xff, 0x0, 0xff, 0xff, 0xff], @empty, [0xff, 0xff, 0xff, 0x0, 0xff, 0xff], 0x70, 0x70, 0xb8}}, @common=@RATEEST={'RATEEST\x00', 0x20, {{'syz0\x00', 0x9, 0x1, 0x4}}}}]}]}, 0x9a0) 2018/05/15 08:24:57 executing program 1: perf_event_open(&(0x7f0000000040)={0x0, 0x70}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f00000000c0)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000400), 0x0, &(0x7f0000000600)=ANY=[]) r0 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) fallocate(r0, 0x1, 0x0, 0x10000101) 2018/05/15 08:24:57 executing program 5 (fault-call:1 fault-nth:8): r0 = syz_open_procfs(0x0, &(0x7f0000000280)='net/ptype\x00') sendfile(r0, r0, &(0x7f0000000000)=0xffffffd, 0x7fffffff) [ 428.199303] FAULT_INJECTION: forcing a failure. [ 428.199303] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 428.211219] CPU: 0 PID: 14114 Comm: syz-executor5 Not tainted 4.17.0-rc5+ #51 [ 428.218497] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 428.227855] Call Trace: [ 428.230456] dump_stack+0x1b9/0x294 [ 428.234098] ? dump_stack_print_info.cold.2+0x52/0x52 [ 428.239296] ? find_held_lock+0x36/0x1c0 [ 428.243368] should_fail.cold.4+0xa/0x1a [ 428.247448] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 428.252558] ? graph_lock+0x170/0x170 [ 428.256368] ? kasan_check_read+0x11/0x20 [ 428.260525] ? rcu_bh_force_quiescent_state+0x20/0x20 [ 428.265734] ? find_held_lock+0x36/0x1c0 [ 428.269810] ? __lock_is_held+0xb5/0x140 [ 428.273769] FAT-fs (loop1): bogus number of reserved sectors [ 428.273888] ? check_same_owner+0x320/0x320 [ 428.279718] FAT-fs (loop1): Can't find a valid FAT filesystem [ 428.283971] ? rcu_note_context_switch+0x710/0x710 [ 428.283992] ? __might_sleep+0x95/0x190 2018/05/15 08:24:57 executing program 3: syz_emit_ethernet(0x3e, &(0x7f00000001c0)={@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, @dev={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa]}, [], {@ipv6={0x86dd, {0x0, 0x6, "50a09c", 0x8, 0xffffff87, 0x0, @remote={0xfe, 0x80, [0x0, 0x0, 0xf5ffffff], 0xbb}, @local={0xfe, 0x80, [], 0xaa}, {[], @udp={0x0, 0x0, 0x8}}}}}}, &(0x7f0000000040)) 2018/05/15 08:24:57 executing program 2: syz_emit_ethernet(0x3e, &(0x7f00000001c0)={@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, @dev={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa]}, [], {@ipv6={0x86dd, {0x0, 0x6, "50a09c", 0x8, 0x0, 0x0, @remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x806000000000000], 0xbb}, @local={0xfe, 0x80, [], 0xaa}, {[], @udp={0x0, 0x0, 0x8}}}}}}, &(0x7f0000000040)) [ 428.284011] __alloc_pages_nodemask+0x34e/0xd70 [ 428.303413] ? default_file_splice_read+0x1c7/0xad0 [ 428.308435] ? do_splice_to+0x12e/0x190 [ 428.312414] ? splice_direct_to_actor+0x268/0x8d0 [ 428.317266] ? __alloc_pages_slowpath+0x2db0/0x2db0 [ 428.322283] ? __lock_is_held+0xb5/0x140 [ 428.326355] ? __lock_is_held+0xb5/0x140 [ 428.330432] ? rcu_read_lock_sched_held+0x108/0x120 [ 428.335456] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 428.341003] alloc_pages_current+0x10c/0x210 [ 428.345417] push_pipe+0x400/0x7a0 2018/05/15 08:24:57 executing program 4: perf_event_open$cgroup(&(0x7f0000000240)={0x7, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x2, 0xa813, 0x4, 0x9, 0x1, 0x4, 0xfffffffffffffff9, 0x5, 0x0, 0x5, 0x6, @perf_bp={&(0x7f0000000200), 0x6}, 0x10202, 0x4, 0x4, 0x7, 0xdf, 0x9, 0x3}, 0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x8) 2018/05/15 08:24:57 executing program 2: syz_emit_ethernet(0x3e, &(0x7f00000001c0)={@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, @dev={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa]}, [], {@ipv6={0x86dd, {0x0, 0x6, "50a09c", 0x8, 0x0, 0x0, @remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0xc0ffffff00000000], 0xbb}, @local={0xfe, 0x80, [], 0xaa}, {[], @udp={0x0, 0x0, 0x8}}}}}}, &(0x7f0000000040)) [ 428.348958] ? __kmalloc_node+0x47/0x70 [ 428.352945] iov_iter_get_pages_alloc+0x84a/0x14e0 [ 428.357877] ? rcu_is_watching+0x85/0x140 [ 428.362035] ? copy_page_to_iter+0xf30/0xf30 [ 428.366464] ? is_bpf_text_address+0xd7/0x170 [ 428.370962] ? kernel_text_address+0x79/0xf0 [ 428.375373] ? __unwind_start+0x166/0x330 [ 428.379527] ? unwind_get_return_address+0x61/0xa0 [ 428.384462] ? __save_stack_trace+0x7e/0xd0 [ 428.388802] ? print_usage_bug+0xc0/0xc0 [ 428.392862] ? save_stack+0xa9/0xd0 [ 428.396497] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 428.401517] ? iov_iter_pipe+0xc2/0x2f0 [ 428.405500] default_file_splice_read+0x1c7/0xad0 [ 428.410348] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 428.415715] ? print_usage_bug+0xc0/0xc0 [ 428.419799] ? do_splice_direct+0x400/0x400 [ 428.424124] ? debug_mutex_init+0x1c/0x60 [ 428.428281] ? trace_hardirqs_on_caller+0x421/0x5c0 [ 428.433305] ? __lockdep_init_map+0x105/0x590 [ 428.437808] ? lockdep_init_map+0x9/0x10 [ 428.441879] ? debug_mutex_init+0x2d/0x60 [ 428.446032] ? __mutex_init+0x1ef/0x280 2018/05/15 08:24:57 executing program 4: perf_event_open$cgroup(&(0x7f0000000240)={0x7, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0xa813, 0x4, 0x9, 0x1, 0x4, 0xfffffffffffffff9, 0x5, 0x0, 0x5, 0x6, @perf_bp={&(0x7f0000000200), 0x6}, 0x10202, 0x4, 0x4, 0x7, 0xdf, 0x9, 0x3}, 0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x8) 2018/05/15 08:24:57 executing program 2: syz_emit_ethernet(0x3e, &(0x7f00000001c0)={@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, @dev={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa]}, [], {@ipv6={0x86dd, {0x0, 0x6, "50a09c", 0x8, 0x0, 0x0, @remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x5000000], 0xbb}, @local={0xfe, 0x80, [], 0xaa}, {[], @udp={0x0, 0x0, 0x8}}}}}}, &(0x7f0000000040)) [ 428.450013] ? __ia32_sys_membarrier+0x150/0x150 [ 428.454775] ? __lockdep_init_map+0x105/0x590 [ 428.459284] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 428.464826] ? fsnotify+0x415/0xfc0 [ 428.468456] ? fsnotify+0xfc0/0xfc0 [ 428.472087] ? fsnotify_first_mark+0x330/0x330 [ 428.476683] ? security_file_permission+0x1c6/0x240 [ 428.481707] ? rw_verify_area+0x118/0x360 [ 428.485860] ? do_splice_direct+0x400/0x400 [ 428.490190] do_splice_to+0x12e/0x190 [ 428.494001] splice_direct_to_actor+0x268/0x8d0 2018/05/15 08:24:57 executing program 4: perf_event_open$cgroup(&(0x7f0000000240)={0x7, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x9, 0x1, 0x4, 0xfffffffffffffff9, 0x5, 0x0, 0x5, 0x6, @perf_bp={&(0x7f0000000200), 0x6}, 0x10202, 0x4, 0x4, 0x7, 0xdf, 0x9, 0x3}, 0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x8) [ 428.498683] ? pipe_to_sendpage+0x3f0/0x3f0 [ 428.503013] ? do_splice_to+0x190/0x190 [ 428.506995] ? rw_verify_area+0x118/0x360 [ 428.511151] do_splice_direct+0x2cc/0x400 [ 428.515307] ? splice_direct_to_actor+0x8d0/0x8d0 [ 428.520162] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 428.525711] ? __sb_start_write+0x17f/0x300 [ 428.530049] do_sendfile+0x60f/0xe00 [ 428.533776] ? do_compat_pwritev64+0x1b0/0x1b0 [ 428.538361] ? __might_sleep+0x95/0x190 [ 428.542349] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 428.547892] ? _copy_from_user+0xdf/0x150 [ 428.552047] __x64_sys_sendfile64+0x155/0x240 [ 428.556549] ? __ia32_sys_sendfile+0x290/0x290 [ 428.561145] ? do_syscall_64+0x92/0x800 [ 428.565130] do_syscall_64+0x1b1/0x800 [ 428.569028] ? finish_task_switch+0x1ca/0x840 [ 428.573524] ? syscall_return_slowpath+0x5c0/0x5c0 [ 428.578460] ? syscall_return_slowpath+0x30f/0x5c0 [ 428.583400] ? entry_SYSCALL_64_after_hwframe+0x59/0xbe [ 428.588778] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 428.593627] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 428.598814] RIP: 0033:0x455a09 [ 428.602005] RSP: 002b:00007ffbeaa32c68 EFLAGS: 00000246 ORIG_RAX: 0000000000000028 [ 428.609717] RAX: ffffffffffffffda RBX: 00007ffbeaa336d4 RCX: 0000000000455a09 [ 428.616988] RDX: 0000000020000000 RSI: 0000000000000013 RDI: 0000000000000013 [ 428.624258] RBP: 000000000072bea0 R08: 0000000000000000 R09: 0000000000000000 [ 428.631529] R10: 000000007fffffff R11: 0000000000000246 R12: 0000000000000014 [ 428.638804] R13: 0000000000000579 R14: 00000000006fc3f8 R15: 0000000000000008 2018/05/15 08:24:58 executing program 2: syz_emit_ethernet(0x3e, &(0x7f00000001c0)={@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, @dev={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa]}, [], {@ipv6={0x86dd, {0x0, 0x6, "50a09c", 0x8, 0x0, 0x0, @remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x6000000], 0xbb}, @local={0xfe, 0x80, [], 0xaa}, {[], @udp={0x0, 0x0, 0x8}}}}}}, &(0x7f0000000040)) 2018/05/15 08:24:58 executing program 4: perf_event_open$cgroup(&(0x7f0000000240)={0x7, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x1, 0x4, 0xfffffffffffffff9, 0x5, 0x0, 0x5, 0x6, @perf_bp={&(0x7f0000000200), 0x6}, 0x10202, 0x4, 0x4, 0x7, 0xdf, 0x9, 0x3}, 0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x8) 2018/05/15 08:24:58 executing program 7: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup(0xffffffffffffffff) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000d40)=@broute={'broute\x00', 0x20, 0x4, 0x928, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000400], 0x0, &(0x7f0000000000), &(0x7f0000000400)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x2, [{{{0x5, 0x7, 0x4, 'bcsh0\x00', 'sit0\x00', 'syzkaller1\x00', 'veth0\x00', @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [0xff, 0xff, 0xff, 0xff], @dev={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0x18}, [0xff, 0x0, 0x0, 0x0, 0x0, 0xff], 0x1d8, 0x228, 0x258, [@comment={'comment\x00', 0x100}, @owner={'owner\x00', 0x18, {{0x0, 0x0, 0x0, 0x0, 0x1, 0x1}}}]}, [@common=@LED={'LED\x00', 0x28, {{'syz0\x00', 0x1, 0x0, 0x800}}}]}, @common=@redirect={'redirect\x00', 0x8, {{0xfffffffffffffffe}}}}, {{{0x11, 0x4, 0x88e7, 'veth1_to_bond\x00', 'erspan0\x00', 'bridge_slave_1\x00', 'veth0_to_bridge\x00', @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [0xff, 0xff, 0x0, 0xff, 0x0, 0xff], @random="cfa071dc33d9", [0xff, 0xff, 0xff, 0xff, 0xff, 0xff], 0x2e0, 0x2e0, 0x330, [@mac={'mac\x00', 0x10, {{@remote={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xbb}, 0x1}}}, @bpf0={'bpf\x00', 0x210, {{0x20, [{0x8000, 0x4902, 0x5, 0x3ff}, {0x5, 0x8, 0x2, 0xff}, {0x1000, 0x48000000000, 0x3}, {0xf7, 0x1f, 0xfffffffffffffe00, 0x1}, {0x10000, 0xfc0, 0x1, 0x6}, {0x4, 0x2, 0xcefa, 0x81}, {0x815, 0xc7, 0x8001, 0x6a0}, {0x40, 0x0, 0x9, 0x80000001}, {0xffffffffffffff53, 0x38a, 0x100000000, 0x7}, {0x5, 0x1, 0x1000, 0x10001}, {0x80000000, 0x7, 0x1, 0xf7}, {0x2, 0x9, 0x4c, 0x5}, {0xfffffffffffffff7, 0x0, 0xe74, 0x52a}, {0x1ff, 0x7, 0x3, 0x7}, {0x6, 0x1ff, 0x49, 0x7}, {0x8000, 0x0, 0x7, 0x684}, {0xffe, 0x988, 0x3, 0x1}, {0x7b, 0x5a07, 0x18, 0x7}, {0xfffffffffffffffe, 0xfff, 0x3, 0x178180a0}, {0x2, 0xc0, 0x6, 0x401}, {0x5, 0x3, 0x8, 0x8}, {0xffffffffffff0001, 0x3, 0xfffffffffffffff7, 0x5}, {0x1ff, 0x8001, 0x3}, {0x3, 0x9, 0xffffffff, 0x2}, {0x5, 0x4, 0x574, 0x64c}, {0x5, 0x4, 0x10001, 0x6}, {0x1, 0x5b2c, 0x3ff, 0x7}, {0xff, 0x2, 0x5, 0x62c5fc18}, {0x101, 0x7, 0x2, 0xfffffffffffffffd}, {0x7fff, 0x6, 0x8, 0x4}, {0x9, 0x0, 0x7, 0xff}, {0x4, 0x4, 0x4, 0x10000}, {0x59b0, 0xfff, 0x4, 0x4}, {0x1f, 0xfffffffffffffffd, 0x8001, 0x800}, {0x0, 0xffffffffffffffff, 0x2, 0x65}, {0x1ff, 0x1, 0x2, 0x7ff}, {0x4, 0x5, 0x1, 0x7be}, {0x9e4, 0x0, 0x7, 0x5}, {0x5, 0x8, 0x7f, 0xffffffff}, {0x4, 0x6, 0x5, 0x7ff}, {0x22aaaf52, 0x8f, 0x6, 0x10000}, {0x2, 0x7, 0xffff}, {0x5, 0xfffffffff016eb50, 0x82, 0x7}, {0x38, 0x800, 0x9a2a, 0xfffffffffffffffc}, {0x5, 0xb, 0x4, 0xfffffffffffff001}, {0x8b5, 0x81, 0x4, 0x2}, {0x8, 0xfffffffffffffff8, 0x1, 0x8}, {0x40, 0x4, 0x1, 0x100000001}, {0x9b, 0x5, 0x1, 0xd64c}, {0x100, 0x8, 0x7, 0x3ff}, {0xf11, 0x200, 0x7, 0x2}, {0xac5, 0x0, 0x3, 0x7}, {0x518, 0x1, 0x80}, {0x6, 0x7f, 0x6, 0x7298}, {0x7, 0x1, 0x2, 0x1ec9}, {0x400, 0x2, 0x6, 0x6c3}, {0x100000001, 0x6, 0x5, 0x9}, {0x8, 0x1dae, 0xfffffffffffffff8, 0x101}, {0x2, 0x7, 0x8, 0x3}, {0x0, 0x45b, 0x7, 0x72}, {0x100000001, 0xc00000000000, 0x100000001, 0x8}, {0x100000001, 0x0, 0xfffffffffffffffc, 0x3}, {0x95, 0x90b, 0x0, 0xfffffffffffff565}, {0x0, 0x4, 0x0, 0x2}], 0x40}}}]}}, @common=@IDLETIMER={'IDLETIMER\x00', 0x28, {{0x7f, 'syz0\x00'}}}}]}, {0x0, '\x00', 0x2, 0xfffffffffffffffc}, {0x0, '\x00', 0x2, 0xffffffffffffffff, 0x2, [{{{0x11, 0x40, 0x87df, 'irlan0\x00', 'sit0\x00', 'veth0_to_team\x00', 'ip6gretap0\x00', @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [0xff, 0xff, 0xff, 0xff, 0x0, 0xff], @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [0x0, 0xff, 0x0, 0xff], 0xb0, 0x210, 0x258, [@time={'time\x00', 0x18, {{0x1ff, 0x1, 0xe063, 0xb6c5, 0x2e80, 0x0, 0x2}}}]}, [@common=@redirect={'redirect\x00', 0x8, {{0xffffffffffffffff}}}, @common=@SECMARK={'SECMARK\x00', 0x108, {{0x1, 0x6, 'system_u:object_r:lost_found_t:s0\x00'}}}]}, @common=@ERROR={'ERROR\x00', 0x20, {"4323eed968d7072e70de82f41331fe3aed2aedc8f2fff16e54b1c4e2ad07"}}}, {{{0x5, 0x54, 0x888d, 'ip6gretap0\x00', 'teql0\x00', 'veth1_to_team\x00', 'erspan0\x00', @random="0eae55d5aac5", [0x0, 0xff, 0x0, 0xff, 0xff, 0xff], @empty, [0xff, 0xff, 0xff, 0x0, 0xff, 0xff], 0x70, 0x70, 0xb8}}, @common=@RATEEST={'RATEEST\x00', 0x20, {{'syz0\x00', 0x9, 0x1, 0x4}}}}]}]}, 0x9a0) 2018/05/15 08:24:58 executing program 5 (fault-call:1 fault-nth:9): r0 = syz_open_procfs(0x0, &(0x7f0000000280)='net/ptype\x00') sendfile(r0, r0, &(0x7f0000000000)=0xffffffd, 0x7fffffff) 2018/05/15 08:24:58 executing program 6: syslog(0x0, &(0x7f0000000cc0)=""/107, 0x6b) setsockopt$inet_sctp_SCTP_STREAM_SCHEDULER(0xffffffffffffffff, 0x84, 0x7b, &(0x7f00000001c0)={0x0, 0x40ef2843}, 0x8) 2018/05/15 08:24:58 executing program 0: perf_event_open$cgroup(&(0x7f0000000240)={0x7, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0xfffffffffffffff9, 0x5, 0x0, 0x5, 0x6, @perf_bp={&(0x7f0000000200), 0x6}, 0x10202, 0x4, 0x4, 0x7, 0xdf, 0x9, 0x3}, 0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x8) 2018/05/15 08:24:58 executing program 1: perf_event_open(&(0x7f0000000040)={0x0, 0x70}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f00000000c0)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000400), 0x0, &(0x7f0000000600)=ANY=[]) r0 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) fallocate(r0, 0x1, 0x0, 0x10000101) 2018/05/15 08:24:58 executing program 3: syz_emit_ethernet(0x3e, &(0x7f00000001c0)={@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, @dev={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa]}, [], {@ipv6={0x86dd, {0x0, 0x6, "50a09c", 0x8, 0xffffff87, 0x0, @remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0xfeffffff00000000], 0xbb}, @local={0xfe, 0x80, [], 0xaa}, {[], @udp={0x0, 0x0, 0x8}}}}}}, &(0x7f0000000040)) [ 428.770659] FAULT_INJECTION: forcing a failure. [ 428.770659] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 428.782680] CPU: 0 PID: 14168 Comm: syz-executor5 Not tainted 4.17.0-rc5+ #51 [ 428.789964] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 428.799326] Call Trace: [ 428.801924] dump_stack+0x1b9/0x294 [ 428.803334] FAT-fs (loop1): bogus number of reserved sectors [ 428.805556] ? dump_stack_print_info.cold.2+0x52/0x52 [ 428.805574] ? find_held_lock+0x36/0x1c0 [ 428.805595] should_fail.cold.4+0xa/0x1a [ 428.805614] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 428.811412] FAT-fs (loop1): Can't find a valid FAT filesystem [ 428.816576] ? graph_lock+0x170/0x170 [ 428.816595] ? kasan_check_read+0x11/0x20 [ 428.816615] ? rcu_bh_force_quiescent_state+0x20/0x20 [ 428.849397] ? find_held_lock+0x36/0x1c0 [ 428.853484] ? __lock_is_held+0xb5/0x140 [ 428.857585] ? check_same_owner+0x320/0x320 [ 428.861917] ? rcu_note_context_switch+0x710/0x710 [ 428.866853] ? __might_sleep+0x95/0x190 [ 428.870834] __alloc_pages_nodemask+0x34e/0xd70 [ 428.875507] ? default_file_splice_read+0x1c7/0xad0 [ 428.880527] ? do_splice_to+0x12e/0x190 [ 428.884496] ? splice_direct_to_actor+0x268/0x8d0 [ 428.889345] ? __alloc_pages_slowpath+0x2db0/0x2db0 [ 428.894361] ? __lock_is_held+0xb5/0x140 [ 428.898439] ? __lock_is_held+0xb5/0x140 [ 428.902515] ? rcu_read_lock_sched_held+0x108/0x120 [ 428.907539] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 428.913087] alloc_pages_current+0x10c/0x210 [ 428.917504] push_pipe+0x400/0x7a0 2018/05/15 08:24:58 executing program 3: syz_emit_ethernet(0x3e, &(0x7f00000001c0)={@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, @dev={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa]}, [], {@ipv6={0x86dd, {0x0, 0x6, "50a09c", 0x8, 0xffffff87, 0x0, @remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x500], 0xbb}, @local={0xfe, 0x80, [], 0xaa}, {[], @udp={0x0, 0x0, 0x8}}}}}}, &(0x7f0000000040)) 2018/05/15 08:24:58 executing program 2: syz_emit_ethernet(0x3e, &(0x7f00000001c0)={@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, @dev={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa]}, [], {@ipv6={0x86dd, {0x0, 0x6, "50a09c", 0x8, 0x0, 0x0, @remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x8906000000000000], 0xbb}, @local={0xfe, 0x80, [], 0xaa}, {[], @udp={0x0, 0x0, 0x8}}}}}}, &(0x7f0000000040)) [ 428.921044] ? __kmalloc_node+0x47/0x70 [ 428.925035] iov_iter_get_pages_alloc+0x84a/0x14e0 [ 428.929975] ? rcu_is_watching+0x85/0x140 [ 428.934130] ? copy_page_to_iter+0xf30/0xf30 [ 428.938550] ? is_bpf_text_address+0xd7/0x170 [ 428.943049] ? kernel_text_address+0x79/0xf0 [ 428.947459] ? __unwind_start+0x166/0x330 [ 428.951615] ? unwind_get_return_address+0x61/0xa0 [ 428.956551] ? __save_stack_trace+0x7e/0xd0 [ 428.960886] ? print_usage_bug+0xc0/0xc0 [ 428.964956] ? save_stack+0xa9/0xd0 2018/05/15 08:24:58 executing program 0: perf_event_open$cgroup(&(0x7f0000000240)={0x7, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0xfffffffffffffff9, 0x5, 0x0, 0x5, 0x6, @perf_bp={&(0x7f0000000200), 0x6}, 0x10202, 0x4, 0x4, 0x7, 0xdf, 0x9, 0x3}, 0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x8) 2018/05/15 08:24:58 executing program 4: perf_event_open$cgroup(&(0x7f0000000240)={0x7, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x4, 0xfffffffffffffff9, 0x5, 0x0, 0x5, 0x6, @perf_bp={&(0x7f0000000200), 0x6}, 0x10202, 0x4, 0x4, 0x7, 0xdf, 0x9, 0x3}, 0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x8) 2018/05/15 08:24:58 executing program 3: syz_emit_ethernet(0x3e, &(0x7f00000001c0)={@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, @dev={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa]}, [], {@ipv6={0x86dd, {0x0, 0x6, "50a09c", 0x8, 0xffffff87, 0x0, @remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x4305000000000000], 0xbb}, @local={0xfe, 0x80, [], 0xaa}, {[], @udp={0x0, 0x0, 0x8}}}}}}, &(0x7f0000000040)) 2018/05/15 08:24:58 executing program 6: syslog(0x0, &(0x7f0000000cc0)=""/107, 0x6b) setsockopt$inet_sctp_SCTP_STREAM_SCHEDULER(0xffffffffffffffff, 0x84, 0x7b, &(0x7f00000001c0)={0x0, 0x40ef2843}, 0x8) [ 428.968593] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 428.973611] ? iov_iter_pipe+0xc2/0x2f0 [ 428.977596] default_file_splice_read+0x1c7/0xad0 [ 428.982439] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 428.987809] ? print_usage_bug+0xc0/0xc0 [ 428.991886] ? do_splice_direct+0x400/0x400 [ 428.996210] ? debug_mutex_init+0x1c/0x60 [ 429.000365] ? trace_hardirqs_on_caller+0x421/0x5c0 [ 429.005387] ? __lockdep_init_map+0x105/0x590 [ 429.009895] ? lockdep_init_map+0x9/0x10 [ 429.013956] ? debug_mutex_init+0x2d/0x60 2018/05/15 08:24:58 executing program 7: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup(0xffffffffffffffff) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000d40)=@broute={'broute\x00', 0x20, 0x4, 0x928, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000400], 0x0, &(0x7f0000000000), &(0x7f0000000400)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x2, [{{{0x5, 0x7, 0x4, 'bcsh0\x00', 'sit0\x00', 'syzkaller1\x00', 'veth0\x00', @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [0xff, 0xff, 0xff, 0xff], @dev={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0x18}, [0xff, 0x0, 0x0, 0x0, 0x0, 0xff], 0x1d8, 0x228, 0x258, [@comment={'comment\x00', 0x100}, @owner={'owner\x00', 0x18, {{0x0, 0x0, 0x0, 0x0, 0x1, 0x1}}}]}, [@common=@LED={'LED\x00', 0x28, {{'syz0\x00', 0x1, 0x0, 0x800}}}]}, @common=@redirect={'redirect\x00', 0x8, {{0xfffffffffffffffe}}}}, {{{0x11, 0x4, 0x88e7, 'veth1_to_bond\x00', 'erspan0\x00', 'bridge_slave_1\x00', 'veth0_to_bridge\x00', @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [0xff, 0xff, 0x0, 0xff, 0x0, 0xff], @random="cfa071dc33d9", [0xff, 0xff, 0xff, 0xff, 0xff, 0xff], 0x2e0, 0x2e0, 0x330, [@mac={'mac\x00', 0x10, {{@remote={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xbb}, 0x1}}}, @bpf0={'bpf\x00', 0x210, {{0x20, [{0x8000, 0x4902, 0x5, 0x3ff}, {0x5, 0x8, 0x2, 0xff}, {0x1000, 0x48000000000, 0x3}, {0xf7, 0x1f, 0xfffffffffffffe00, 0x1}, {0x10000, 0xfc0, 0x1, 0x6}, {0x4, 0x2, 0xcefa, 0x81}, {0x815, 0xc7, 0x8001, 0x6a0}, {0x40, 0x0, 0x9, 0x80000001}, {0xffffffffffffff53, 0x38a, 0x100000000, 0x7}, {0x5, 0x1, 0x1000, 0x10001}, {0x80000000, 0x7, 0x1, 0xf7}, {0x2, 0x9, 0x4c, 0x5}, {0xfffffffffffffff7, 0x0, 0xe74, 0x52a}, {0x1ff, 0x7, 0x3, 0x7}, {0x6, 0x1ff, 0x49, 0x7}, {0x8000, 0x0, 0x7, 0x684}, {0xffe, 0x988, 0x3, 0x1}, {0x7b, 0x5a07, 0x18, 0x7}, {0xfffffffffffffffe, 0xfff, 0x3, 0x178180a0}, {0x2, 0xc0, 0x6, 0x401}, {0x5, 0x3, 0x8, 0x8}, {0xffffffffffff0001, 0x3, 0xfffffffffffffff7, 0x5}, {0x1ff, 0x8001, 0x3}, {0x3, 0x9, 0xffffffff, 0x2}, {0x5, 0x4, 0x574, 0x64c}, {0x5, 0x4, 0x10001, 0x6}, {0x1, 0x5b2c, 0x3ff, 0x7}, {0xff, 0x2, 0x5, 0x62c5fc18}, {0x101, 0x7, 0x2, 0xfffffffffffffffd}, {0x7fff, 0x6, 0x8, 0x4}, {0x9, 0x0, 0x7, 0xff}, {0x4, 0x4, 0x4, 0x10000}, {0x59b0, 0xfff, 0x4, 0x4}, {0x1f, 0xfffffffffffffffd, 0x8001, 0x800}, {0x0, 0xffffffffffffffff, 0x2, 0x65}, {0x1ff, 0x1, 0x2, 0x7ff}, {0x4, 0x5, 0x1, 0x7be}, {0x9e4, 0x0, 0x7, 0x5}, {0x5, 0x8, 0x7f, 0xffffffff}, {0x4, 0x6, 0x5, 0x7ff}, {0x22aaaf52, 0x8f, 0x6, 0x10000}, {0x2, 0x7, 0xffff}, {0x5, 0xfffffffff016eb50, 0x82, 0x7}, {0x38, 0x800, 0x9a2a, 0xfffffffffffffffc}, {0x5, 0xb, 0x4, 0xfffffffffffff001}, {0x8b5, 0x81, 0x4, 0x2}, {0x8, 0xfffffffffffffff8, 0x1, 0x8}, {0x40, 0x4, 0x1, 0x100000001}, {0x9b, 0x5, 0x1, 0xd64c}, {0x100, 0x8, 0x7, 0x3ff}, {0xf11, 0x200, 0x7, 0x2}, {0xac5, 0x0, 0x3, 0x7}, {0x518, 0x1, 0x80}, {0x6, 0x7f, 0x6, 0x7298}, {0x7, 0x1, 0x2, 0x1ec9}, {0x400, 0x2, 0x6, 0x6c3}, {0x100000001, 0x6, 0x5, 0x9}, {0x8, 0x1dae, 0xfffffffffffffff8, 0x101}, {0x2, 0x7, 0x8, 0x3}, {0x0, 0x45b, 0x7, 0x72}, {0x100000001, 0xc00000000000, 0x100000001, 0x8}, {0x100000001, 0x0, 0xfffffffffffffffc, 0x3}, {0x95, 0x90b, 0x0, 0xfffffffffffff565}, {0x0, 0x4, 0x0, 0x2}], 0x40}}}]}}, @common=@IDLETIMER={'IDLETIMER\x00', 0x28, {{0x7f, 'syz0\x00'}}}}]}, {0x0, '\x00', 0x2, 0xfffffffffffffffc}, {0x0, '\x00', 0x2, 0xffffffffffffffff, 0x2, [{{{0x11, 0x40, 0x87df, 'irlan0\x00', 'sit0\x00', 'veth0_to_team\x00', 'ip6gretap0\x00', @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [0xff, 0xff, 0xff, 0xff, 0x0, 0xff], @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [0x0, 0xff, 0x0, 0xff], 0xb0, 0x210, 0x258, [@time={'time\x00', 0x18, {{0x1ff, 0x1, 0xe063, 0xb6c5, 0x2e80, 0x0, 0x2}}}]}, [@common=@redirect={'redirect\x00', 0x8, {{0xffffffffffffffff}}}, @common=@SECMARK={'SECMARK\x00', 0x108, {{0x1, 0x6, 'system_u:object_r:lost_found_t:s0\x00'}}}]}, @common=@ERROR={'ERROR\x00', 0x20, {"4323eed968d7072e70de82f41331fe3aed2aedc8f2fff16e54b1c4e2ad07"}}}, {{{0x5, 0x54, 0x888d, 'ip6gretap0\x00', 'teql0\x00', 'veth1_to_team\x00', 'erspan0\x00', @random="0eae55d5aac5", [0x0, 0xff, 0x0, 0xff, 0xff, 0xff], @empty, [0xff, 0xff, 0xff, 0x0, 0xff, 0xff], 0x70, 0x70, 0xb8}}, @common=@RATEEST={'RATEEST\x00', 0x20, {{'syz0\x00', 0x9, 0x1, 0x4}}}}]}]}, 0x9a0) [ 429.018107] ? __mutex_init+0x1ef/0x280 [ 429.022082] ? __ia32_sys_membarrier+0x150/0x150 [ 429.026845] ? __lockdep_init_map+0x105/0x590 [ 429.031364] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 429.036910] ? fsnotify+0x415/0xfc0 [ 429.040542] ? fsnotify+0xfc0/0xfc0 [ 429.044166] ? fsnotify_first_mark+0x330/0x330 [ 429.048771] ? security_file_permission+0x1c6/0x240 [ 429.053800] ? rw_verify_area+0x118/0x360 [ 429.057957] ? do_splice_direct+0x400/0x400 [ 429.062283] do_splice_to+0x12e/0x190 [ 429.066095] splice_direct_to_actor+0x268/0x8d0 2018/05/15 08:24:58 executing program 0: perf_event_open$cgroup(&(0x7f0000000240)={0x7, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x5, 0x0, 0x5, 0x6, @perf_bp={&(0x7f0000000200), 0x6}, 0x10202, 0x4, 0x4, 0x7, 0xdf, 0x9, 0x3}, 0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x8) 2018/05/15 08:24:58 executing program 6: syslog(0x0, &(0x7f0000000cc0)=""/107, 0x6b) setsockopt$inet_sctp_SCTP_STREAM_SCHEDULER(0xffffffffffffffff, 0x84, 0x7b, &(0x7f00000001c0)={0x0, 0x40ef2843}, 0x8) [ 429.070774] ? pipe_to_sendpage+0x3f0/0x3f0 [ 429.075102] ? do_splice_to+0x190/0x190 [ 429.079080] ? rw_verify_area+0x118/0x360 [ 429.083234] do_splice_direct+0x2cc/0x400 [ 429.087388] ? splice_direct_to_actor+0x8d0/0x8d0 [ 429.092243] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 429.097785] ? __sb_start_write+0x17f/0x300 [ 429.102115] do_sendfile+0x60f/0xe00 [ 429.105838] ? do_compat_pwritev64+0x1b0/0x1b0 [ 429.110421] ? __might_sleep+0x95/0x190 [ 429.114405] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 429.119943] ? _copy_from_user+0xdf/0x150 [ 429.124098] __x64_sys_sendfile64+0x155/0x240 [ 429.128597] ? __ia32_sys_sendfile+0x290/0x290 [ 429.133181] ? do_syscall_64+0x92/0x800 [ 429.137161] do_syscall_64+0x1b1/0x800 [ 429.141055] ? finish_task_switch+0x1ca/0x840 [ 429.145553] ? syscall_return_slowpath+0x5c0/0x5c0 [ 429.150489] ? syscall_return_slowpath+0x30f/0x5c0 [ 429.155426] ? entry_SYSCALL_64_after_hwframe+0x59/0xbe [ 429.160801] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 429.165657] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 429.170849] RIP: 0033:0x455a09 [ 429.174036] RSP: 002b:00007ffbeaa32c68 EFLAGS: 00000246 ORIG_RAX: 0000000000000028 [ 429.181749] RAX: ffffffffffffffda RBX: 00007ffbeaa336d4 RCX: 0000000000455a09 [ 429.189018] RDX: 0000000020000000 RSI: 0000000000000013 RDI: 0000000000000013 [ 429.196289] RBP: 000000000072bea0 R08: 0000000000000000 R09: 0000000000000000 [ 429.203560] R10: 000000007fffffff R11: 0000000000000246 R12: 0000000000000014 [ 429.210829] R13: 0000000000000579 R14: 00000000006fc3f8 R15: 0000000000000009 2018/05/15 08:24:58 executing program 7: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup(0xffffffffffffffff) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000d40)=@broute={'broute\x00', 0x20, 0x4, 0x928, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000400], 0x0, &(0x7f0000000000), &(0x7f0000000400)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x2, [{{{0x5, 0x7, 0x4, 'bcsh0\x00', 'sit0\x00', 'syzkaller1\x00', 'veth0\x00', @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [0xff, 0xff, 0xff, 0xff], @dev={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0x18}, [0xff, 0x0, 0x0, 0x0, 0x0, 0xff], 0x1d8, 0x228, 0x258, [@comment={'comment\x00', 0x100}, @owner={'owner\x00', 0x18, {{0x0, 0x0, 0x0, 0x0, 0x1, 0x1}}}]}, [@common=@LED={'LED\x00', 0x28, {{'syz0\x00', 0x1, 0x0, 0x800}}}]}, @common=@redirect={'redirect\x00', 0x8, {{0xfffffffffffffffe}}}}, {{{0x11, 0x4, 0x88e7, 'veth1_to_bond\x00', 'erspan0\x00', 'bridge_slave_1\x00', 'veth0_to_bridge\x00', @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [0xff, 0xff, 0x0, 0xff, 0x0, 0xff], @random="cfa071dc33d9", [0xff, 0xff, 0xff, 0xff, 0xff, 0xff], 0x2e0, 0x2e0, 0x330, [@mac={'mac\x00', 0x10, {{@remote={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xbb}, 0x1}}}, @bpf0={'bpf\x00', 0x210, {{0x20, [{0x8000, 0x4902, 0x5, 0x3ff}, {0x5, 0x8, 0x2, 0xff}, {0x1000, 0x48000000000, 0x3}, {0xf7, 0x1f, 0xfffffffffffffe00, 0x1}, {0x10000, 0xfc0, 0x1, 0x6}, {0x4, 0x2, 0xcefa, 0x81}, {0x815, 0xc7, 0x8001, 0x6a0}, {0x40, 0x0, 0x9, 0x80000001}, {0xffffffffffffff53, 0x38a, 0x100000000, 0x7}, {0x5, 0x1, 0x1000, 0x10001}, {0x80000000, 0x7, 0x1, 0xf7}, {0x2, 0x9, 0x4c, 0x5}, {0xfffffffffffffff7, 0x0, 0xe74, 0x52a}, {0x1ff, 0x7, 0x3, 0x7}, {0x6, 0x1ff, 0x49, 0x7}, {0x8000, 0x0, 0x7, 0x684}, {0xffe, 0x988, 0x3, 0x1}, {0x7b, 0x5a07, 0x18, 0x7}, {0xfffffffffffffffe, 0xfff, 0x3, 0x178180a0}, {0x2, 0xc0, 0x6, 0x401}, {0x5, 0x3, 0x8, 0x8}, {0xffffffffffff0001, 0x3, 0xfffffffffffffff7, 0x5}, {0x1ff, 0x8001, 0x3}, {0x3, 0x9, 0xffffffff, 0x2}, {0x5, 0x4, 0x574, 0x64c}, {0x5, 0x4, 0x10001, 0x6}, {0x1, 0x5b2c, 0x3ff, 0x7}, {0xff, 0x2, 0x5, 0x62c5fc18}, {0x101, 0x7, 0x2, 0xfffffffffffffffd}, {0x7fff, 0x6, 0x8, 0x4}, {0x9, 0x0, 0x7, 0xff}, {0x4, 0x4, 0x4, 0x10000}, {0x59b0, 0xfff, 0x4, 0x4}, {0x1f, 0xfffffffffffffffd, 0x8001, 0x800}, {0x0, 0xffffffffffffffff, 0x2, 0x65}, {0x1ff, 0x1, 0x2, 0x7ff}, {0x4, 0x5, 0x1, 0x7be}, {0x9e4, 0x0, 0x7, 0x5}, {0x5, 0x8, 0x7f, 0xffffffff}, {0x4, 0x6, 0x5, 0x7ff}, {0x22aaaf52, 0x8f, 0x6, 0x10000}, {0x2, 0x7, 0xffff}, {0x5, 0xfffffffff016eb50, 0x82, 0x7}, {0x38, 0x800, 0x9a2a, 0xfffffffffffffffc}, {0x5, 0xb, 0x4, 0xfffffffffffff001}, {0x8b5, 0x81, 0x4, 0x2}, {0x8, 0xfffffffffffffff8, 0x1, 0x8}, {0x40, 0x4, 0x1, 0x100000001}, {0x9b, 0x5, 0x1, 0xd64c}, {0x100, 0x8, 0x7, 0x3ff}, {0xf11, 0x200, 0x7, 0x2}, {0xac5, 0x0, 0x3, 0x7}, {0x518, 0x1, 0x80}, {0x6, 0x7f, 0x6, 0x7298}, {0x7, 0x1, 0x2, 0x1ec9}, {0x400, 0x2, 0x6, 0x6c3}, {0x100000001, 0x6, 0x5, 0x9}, {0x8, 0x1dae, 0xfffffffffffffff8, 0x101}, {0x2, 0x7, 0x8, 0x3}, {0x0, 0x45b, 0x7, 0x72}, {0x100000001, 0xc00000000000, 0x100000001, 0x8}, {0x100000001, 0x0, 0xfffffffffffffffc, 0x3}, {0x95, 0x90b, 0x0, 0xfffffffffffff565}, {0x0, 0x4, 0x0, 0x2}], 0x40}}}]}}, @common=@IDLETIMER={'IDLETIMER\x00', 0x28, {{0x7f, 'syz0\x00'}}}}]}, {0x0, '\x00', 0x2, 0xfffffffffffffffc}, {0x0, '\x00', 0x2, 0xffffffffffffffff, 0x2, [{{{0x11, 0x40, 0x87df, 'irlan0\x00', 'sit0\x00', 'veth0_to_team\x00', 'ip6gretap0\x00', @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [0xff, 0xff, 0xff, 0xff, 0x0, 0xff], @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [0x0, 0xff, 0x0, 0xff], 0xb0, 0x210, 0x258, [@time={'time\x00', 0x18, {{0x1ff, 0x1, 0xe063, 0xb6c5, 0x2e80, 0x0, 0x2}}}]}, [@common=@redirect={'redirect\x00', 0x8, {{0xffffffffffffffff}}}, @common=@SECMARK={'SECMARK\x00', 0x108, {{0x1, 0x6, 'system_u:object_r:lost_found_t:s0\x00'}}}]}, @common=@ERROR={'ERROR\x00', 0x20, {"4323eed968d7072e70de82f41331fe3aed2aedc8f2fff16e54b1c4e2ad07"}}}, {{{0x5, 0x54, 0x888d, 'ip6gretap0\x00', 'teql0\x00', 'veth1_to_team\x00', 'erspan0\x00', @random="0eae55d5aac5", [0x0, 0xff, 0x0, 0xff, 0xff, 0xff], @empty, [0xff, 0xff, 0xff, 0x0, 0xff, 0xff], 0x70, 0x70, 0xb8}}, @common=@RATEEST={'RATEEST\x00', 0x20, {{'syz0\x00', 0x9, 0x1, 0x4}}}}]}]}, 0x9a0) 2018/05/15 08:24:58 executing program 0: perf_event_open$cgroup(&(0x7f0000000240)={0x7, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x5, 0x6, @perf_bp={&(0x7f0000000200), 0x6}, 0x10202, 0x4, 0x4, 0x7, 0xdf, 0x9, 0x3}, 0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x8) 2018/05/15 08:24:58 executing program 6: syslog(0x2, &(0x7f0000000cc0)=""/107, 0x6b) setsockopt$inet_sctp_SCTP_STREAM_SCHEDULER(0xffffffffffffffff, 0x84, 0x7b, &(0x7f00000001c0), 0x8) 2018/05/15 08:24:58 executing program 4: perf_event_open$cgroup(&(0x7f0000000240)={0x7, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0xfffffffffffffff9, 0x5, 0x0, 0x5, 0x6, @perf_bp={&(0x7f0000000200), 0x6}, 0x10202, 0x4, 0x4, 0x7, 0xdf, 0x9, 0x3}, 0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x8) 2018/05/15 08:24:58 executing program 2: syz_emit_ethernet(0x3e, &(0x7f00000001c0)={@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, @dev={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa]}, [], {@ipv6={0x86dd, {0x0, 0x6, "50a09c", 0x8, 0x0, 0x0, @remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x11000000], 0xbb}, @local={0xfe, 0x80, [], 0xaa}, {[], @udp={0x0, 0x0, 0x8}}}}}}, &(0x7f0000000040)) 2018/05/15 08:24:58 executing program 5 (fault-call:1 fault-nth:10): r0 = syz_open_procfs(0x0, &(0x7f0000000280)='net/ptype\x00') sendfile(r0, r0, &(0x7f0000000000)=0xffffffd, 0x7fffffff) 2018/05/15 08:24:58 executing program 3: syz_emit_ethernet(0x3e, &(0x7f00000001c0)={@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, @dev={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa]}, [], {@ipv6={0x86dd, {0x0, 0x6, "50a09c", 0x8, 0xffffff87, 0x0, @remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x2000000], 0xbb}, @local={0xfe, 0x80, [], 0xaa}, {[], @udp={0x0, 0x0, 0x8}}}}}}, &(0x7f0000000040)) 2018/05/15 08:24:58 executing program 1: perf_event_open(&(0x7f0000000040)={0x0, 0x70}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f00000000c0)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000400), 0x0, &(0x7f0000000600)=ANY=[]) r0 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) fallocate(r0, 0x1, 0x0, 0x10000101) 2018/05/15 08:24:58 executing program 7: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup(r0) setsockopt$EBT_SO_SET_ENTRIES(0xffffffffffffffff, 0x0, 0x80, &(0x7f0000000d40)=@broute={'broute\x00', 0x20, 0x4, 0x928, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000400], 0x0, &(0x7f0000000000), &(0x7f0000000400)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x2, [{{{0x5, 0x7, 0x4, 'bcsh0\x00', 'sit0\x00', 'syzkaller1\x00', 'veth0\x00', @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [0xff, 0xff, 0xff, 0xff], @dev={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0x18}, [0xff, 0x0, 0x0, 0x0, 0x0, 0xff], 0x1d8, 0x228, 0x258, [@comment={'comment\x00', 0x100}, @owner={'owner\x00', 0x18, {{0x0, 0x0, 0x0, 0x0, 0x1, 0x1}}}]}, [@common=@LED={'LED\x00', 0x28, {{'syz0\x00', 0x1, 0x0, 0x800}}}]}, @common=@redirect={'redirect\x00', 0x8, {{0xfffffffffffffffe}}}}, {{{0x11, 0x4, 0x88e7, 'veth1_to_bond\x00', 'erspan0\x00', 'bridge_slave_1\x00', 'veth0_to_bridge\x00', @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [0xff, 0xff, 0x0, 0xff, 0x0, 0xff], @random="cfa071dc33d9", [0xff, 0xff, 0xff, 0xff, 0xff, 0xff], 0x2e0, 0x2e0, 0x330, [@mac={'mac\x00', 0x10, {{@remote={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xbb}, 0x1}}}, @bpf0={'bpf\x00', 0x210, {{0x20, [{0x8000, 0x4902, 0x5, 0x3ff}, {0x5, 0x8, 0x2, 0xff}, {0x1000, 0x48000000000, 0x3}, {0xf7, 0x1f, 0xfffffffffffffe00, 0x1}, {0x10000, 0xfc0, 0x1, 0x6}, {0x4, 0x2, 0xcefa, 0x81}, {0x815, 0xc7, 0x8001, 0x6a0}, {0x40, 0x0, 0x9, 0x80000001}, {0xffffffffffffff53, 0x38a, 0x100000000, 0x7}, {0x5, 0x1, 0x1000, 0x10001}, {0x80000000, 0x7, 0x1, 0xf7}, {0x2, 0x9, 0x4c, 0x5}, {0xfffffffffffffff7, 0x0, 0xe74, 0x52a}, {0x1ff, 0x7, 0x3, 0x7}, {0x6, 0x1ff, 0x49, 0x7}, {0x8000, 0x0, 0x7, 0x684}, {0xffe, 0x988, 0x3, 0x1}, {0x7b, 0x5a07, 0x18, 0x7}, {0xfffffffffffffffe, 0xfff, 0x3, 0x178180a0}, {0x2, 0xc0, 0x6, 0x401}, {0x5, 0x3, 0x8, 0x8}, {0xffffffffffff0001, 0x3, 0xfffffffffffffff7, 0x5}, {0x1ff, 0x8001, 0x3}, {0x3, 0x9, 0xffffffff, 0x2}, {0x5, 0x4, 0x574, 0x64c}, {0x5, 0x4, 0x10001, 0x6}, {0x1, 0x5b2c, 0x3ff, 0x7}, {0xff, 0x2, 0x5, 0x62c5fc18}, {0x101, 0x7, 0x2, 0xfffffffffffffffd}, {0x7fff, 0x6, 0x8, 0x4}, {0x9, 0x0, 0x7, 0xff}, {0x4, 0x4, 0x4, 0x10000}, {0x59b0, 0xfff, 0x4, 0x4}, {0x1f, 0xfffffffffffffffd, 0x8001, 0x800}, {0x0, 0xffffffffffffffff, 0x2, 0x65}, {0x1ff, 0x1, 0x2, 0x7ff}, {0x4, 0x5, 0x1, 0x7be}, {0x9e4, 0x0, 0x7, 0x5}, {0x5, 0x8, 0x7f, 0xffffffff}, {0x4, 0x6, 0x5, 0x7ff}, {0x22aaaf52, 0x8f, 0x6, 0x10000}, {0x2, 0x7, 0xffff}, {0x5, 0xfffffffff016eb50, 0x82, 0x7}, {0x38, 0x800, 0x9a2a, 0xfffffffffffffffc}, {0x5, 0xb, 0x4, 0xfffffffffffff001}, {0x8b5, 0x81, 0x4, 0x2}, {0x8, 0xfffffffffffffff8, 0x1, 0x8}, {0x40, 0x4, 0x1, 0x100000001}, {0x9b, 0x5, 0x1, 0xd64c}, {0x100, 0x8, 0x7, 0x3ff}, {0xf11, 0x200, 0x7, 0x2}, {0xac5, 0x0, 0x3, 0x7}, {0x518, 0x1, 0x80}, {0x6, 0x7f, 0x6, 0x7298}, {0x7, 0x1, 0x2, 0x1ec9}, {0x400, 0x2, 0x6, 0x6c3}, {0x100000001, 0x6, 0x5, 0x9}, {0x8, 0x1dae, 0xfffffffffffffff8, 0x101}, {0x2, 0x7, 0x8, 0x3}, {0x0, 0x45b, 0x7, 0x72}, {0x100000001, 0xc00000000000, 0x100000001, 0x8}, {0x100000001, 0x0, 0xfffffffffffffffc, 0x3}, {0x95, 0x90b, 0x0, 0xfffffffffffff565}, {0x0, 0x4, 0x0, 0x2}], 0x40}}}]}}, @common=@IDLETIMER={'IDLETIMER\x00', 0x28, {{0x7f, 'syz0\x00'}}}}]}, {0x0, '\x00', 0x2, 0xfffffffffffffffc}, {0x0, '\x00', 0x2, 0xffffffffffffffff, 0x2, [{{{0x11, 0x40, 0x87df, 'irlan0\x00', 'sit0\x00', 'veth0_to_team\x00', 'ip6gretap0\x00', @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [0xff, 0xff, 0xff, 0xff, 0x0, 0xff], @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [0x0, 0xff, 0x0, 0xff], 0xb0, 0x210, 0x258, [@time={'time\x00', 0x18, {{0x1ff, 0x1, 0xe063, 0xb6c5, 0x2e80, 0x0, 0x2}}}]}, [@common=@redirect={'redirect\x00', 0x8, {{0xffffffffffffffff}}}, @common=@SECMARK={'SECMARK\x00', 0x108, {{0x1, 0x6, 'system_u:object_r:lost_found_t:s0\x00'}}}]}, @common=@ERROR={'ERROR\x00', 0x20, {"4323eed968d7072e70de82f41331fe3aed2aedc8f2fff16e54b1c4e2ad07"}}}, {{{0x5, 0x54, 0x888d, 'ip6gretap0\x00', 'teql0\x00', 'veth1_to_team\x00', 'erspan0\x00', @random="0eae55d5aac5", [0x0, 0xff, 0x0, 0xff, 0xff, 0xff], @empty, [0xff, 0xff, 0xff, 0x0, 0xff, 0xff], 0x70, 0x70, 0xb8}}, @common=@RATEEST={'RATEEST\x00', 0x20, {{'syz0\x00', 0x9, 0x1, 0x4}}}}]}]}, 0x9a0) [ 429.349509] FAT-fs (loop1): bogus number of reserved sectors [ 429.355496] FAT-fs (loop1): Can't find a valid FAT filesystem 2018/05/15 08:24:58 executing program 0: perf_event_open$cgroup(&(0x7f0000000240)={0x7, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x5, 0x6, @perf_bp={&(0x7f0000000200), 0x6}, 0x10202, 0x4, 0x4, 0x7, 0xdf, 0x9, 0x3}, 0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x8) [ 429.424111] FAULT_INJECTION: forcing a failure. [ 429.424111] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 429.436169] CPU: 1 PID: 14227 Comm: syz-executor5 Not tainted 4.17.0-rc5+ #51 [ 429.443456] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 429.452814] Call Trace: [ 429.455421] dump_stack+0x1b9/0x294 [ 429.459066] ? dump_stack_print_info.cold.2+0x52/0x52 [ 429.464267] ? find_held_lock+0x36/0x1c0 [ 429.468340] should_fail.cold.4+0xa/0x1a 2018/05/15 08:24:58 executing program 2: syz_emit_ethernet(0x3e, &(0x7f00000001c0)={@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, @dev={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa]}, [], {@ipv6={0x86dd, {0x0, 0x6, "50a09c", 0x8, 0x0, 0x0, @remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x43050000], 0xbb}, @local={0xfe, 0x80, [], 0xaa}, {[], @udp={0x0, 0x0, 0x8}}}}}}, &(0x7f0000000040)) 2018/05/15 08:24:58 executing program 4: perf_event_open$cgroup(&(0x7f0000000240)={0x7, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0xfffffffffffffff9, 0x5, 0x0, 0x5, 0x6, @perf_bp={&(0x7f0000000200), 0x6}, 0x10202, 0x4, 0x4, 0x7, 0xdf, 0x9, 0x3}, 0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x8) 2018/05/15 08:24:58 executing program 3: syz_emit_ethernet(0x3e, &(0x7f00000001c0)={@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, @dev={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa]}, [], {@ipv6={0x86dd, {0x0, 0x6, "50a09c", 0x8, 0xffffff87, 0x0, @remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x8035], 0xbb}, @local={0xfe, 0x80, [], 0xaa}, {[], @udp={0x0, 0x0, 0x8}}}}}}, &(0x7f0000000040)) 2018/05/15 08:24:58 executing program 6: syslog(0x2, &(0x7f0000000cc0)=""/107, 0x6b) setsockopt$inet_sctp_SCTP_STREAM_SCHEDULER(0xffffffffffffffff, 0x84, 0x7b, &(0x7f00000001c0), 0x8) [ 429.472413] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 429.477530] ? graph_lock+0x170/0x170 [ 429.481341] ? kasan_check_read+0x11/0x20 [ 429.485501] ? rcu_bh_force_quiescent_state+0x20/0x20 [ 429.490698] ? find_held_lock+0x36/0x1c0 [ 429.494774] ? __lock_is_held+0xb5/0x140 [ 429.498857] ? check_same_owner+0x320/0x320 [ 429.503192] ? rcu_note_context_switch+0x710/0x710 [ 429.508133] ? __might_sleep+0x95/0x190 [ 429.512122] __alloc_pages_nodemask+0x34e/0xd70 [ 429.516804] ? default_file_splice_read+0x1c7/0xad0 [ 429.521828] ? do_splice_to+0x12e/0x190 [ 429.525810] ? splice_direct_to_actor+0x268/0x8d0 [ 429.530669] ? __alloc_pages_slowpath+0x2db0/0x2db0 [ 429.535694] ? __lock_is_held+0xb5/0x140 [ 429.539777] ? __lock_is_held+0xb5/0x140 [ 429.543856] ? rcu_read_lock_sched_held+0x108/0x120 [ 429.548889] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 429.554443] alloc_pages_current+0x10c/0x210 [ 429.558867] push_pipe+0x400/0x7a0 [ 429.562413] ? __kmalloc_node+0x47/0x70 [ 429.566404] iov_iter_get_pages_alloc+0x84a/0x14e0 2018/05/15 08:24:58 executing program 1: perf_event_open(&(0x7f0000000040)={0x1, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f00000000c0)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000400), 0x0, &(0x7f0000000600)=ANY=[]) r0 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) fallocate(r0, 0x1, 0x0, 0x10000101) 2018/05/15 08:24:58 executing program 0: perf_event_open$cgroup(&(0x7f0000000240)={0x7, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x5, 0x6, @perf_bp={&(0x7f0000000200), 0x6}, 0x10202, 0x4, 0x4, 0x7, 0xdf, 0x9, 0x3}, 0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x8) [ 429.571343] ? rcu_is_watching+0x85/0x140 [ 429.575505] ? copy_page_to_iter+0xf30/0xf30 [ 429.579948] ? is_bpf_text_address+0xd7/0x170 [ 429.584452] ? kernel_text_address+0x79/0xf0 [ 429.588871] ? __unwind_start+0x166/0x330 [ 429.593032] ? unwind_get_return_address+0x61/0xa0 [ 429.597972] ? __save_stack_trace+0x7e/0xd0 [ 429.602311] ? print_usage_bug+0xc0/0xc0 [ 429.606377] ? save_stack+0xa9/0xd0 [ 429.610009] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 429.615033] ? iov_iter_pipe+0xc2/0x2f0 [ 429.619017] default_file_splice_read+0x1c7/0xad0 2018/05/15 08:24:58 executing program 3: syz_emit_ethernet(0x3e, &(0x7f00000001c0)={@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, @dev={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa]}, [], {@ipv6={0x86dd, {0x0, 0x6, "50a09c", 0x8, 0xffffff87, 0x0, @remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x1100], 0xbb}, @local={0xfe, 0x80, [], 0xaa}, {[], @udp={0x0, 0x0, 0x8}}}}}}, &(0x7f0000000040)) 2018/05/15 08:24:58 executing program 2: syz_emit_ethernet(0x3e, &(0x7f00000001c0)={@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, @dev={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa]}, [], {@ipv6={0x86dd, {0x0, 0x6, "50a09c", 0x8, 0x0, 0x0, @remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x3c00], 0xbb}, @local={0xfe, 0x80, [], 0xaa}, {[], @udp={0x0, 0x0, 0x8}}}}}}, &(0x7f0000000040)) [ 429.623872] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 429.629240] ? print_usage_bug+0xc0/0xc0 [ 429.633315] ? do_splice_direct+0x400/0x400 [ 429.637640] ? debug_mutex_init+0x1c/0x60 [ 429.641789] ? trace_hardirqs_on_caller+0x421/0x5c0 [ 429.646806] ? __lockdep_init_map+0x105/0x590 [ 429.651311] ? lockdep_init_map+0x9/0x10 [ 429.655384] ? debug_mutex_init+0x2d/0x60 [ 429.659525] ? __mutex_init+0x1ef/0x280 [ 429.664157] ? __ia32_sys_membarrier+0x150/0x150 [ 429.668900] ? __lockdep_init_map+0x105/0x590 [ 429.673392] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 429.678913] ? fsnotify+0x415/0xfc0 [ 429.682526] ? fsnotify+0xfc0/0xfc0 [ 429.686143] ? fsnotify_first_mark+0x330/0x330 [ 429.690718] ? security_file_permission+0x1c6/0x240 [ 429.695721] ? rw_verify_area+0x118/0x360 [ 429.699855] ? do_splice_direct+0x400/0x400 [ 429.704161] do_splice_to+0x12e/0x190 [ 429.707951] splice_direct_to_actor+0x268/0x8d0 [ 429.712627] ? pipe_to_sendpage+0x3f0/0x3f0 [ 429.716939] ? do_splice_to+0x190/0x190 [ 429.720898] ? rw_verify_area+0x118/0x360 [ 429.725037] do_splice_direct+0x2cc/0x400 [ 429.729179] ? splice_direct_to_actor+0x8d0/0x8d0 [ 429.734018] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 429.739540] ? __sb_start_write+0x17f/0x300 [ 429.743848] do_sendfile+0x60f/0xe00 [ 429.747565] ? do_compat_pwritev64+0x1b0/0x1b0 [ 429.752134] ? __might_sleep+0x95/0x190 [ 429.756099] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 429.761620] ? _copy_from_user+0xdf/0x150 [ 429.765753] __x64_sys_sendfile64+0x155/0x240 [ 429.770236] ? __ia32_sys_sendfile+0x290/0x290 [ 429.774802] ? do_syscall_64+0x92/0x800 [ 429.778762] do_syscall_64+0x1b1/0x800 [ 429.782632] ? finish_task_switch+0x1ca/0x840 [ 429.787117] ? syscall_return_slowpath+0x5c0/0x5c0 [ 429.792039] ? syscall_return_slowpath+0x30f/0x5c0 [ 429.797823] ? entry_SYSCALL_64_after_hwframe+0x59/0xbe [ 429.803172] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 429.808000] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 429.813177] RIP: 0033:0x455a09 [ 429.816354] RSP: 002b:00007ffbeaa32c68 EFLAGS: 00000246 ORIG_RAX: 0000000000000028 [ 429.824048] RAX: ffffffffffffffda RBX: 00007ffbeaa336d4 RCX: 0000000000455a09 [ 429.831303] RDX: 0000000020000000 RSI: 0000000000000013 RDI: 0000000000000013 [ 429.838562] RBP: 000000000072bea0 R08: 0000000000000000 R09: 0000000000000000 [ 429.845812] R10: 000000007fffffff R11: 0000000000000246 R12: 0000000000000014 [ 429.853070] R13: 0000000000000579 R14: 00000000006fc3f8 R15: 000000000000000a 2018/05/15 08:24:59 executing program 4: perf_event_open$cgroup(&(0x7f0000000240)={0x7, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0xfffffffffffffff9, 0x5, 0x0, 0x5, 0x6, @perf_bp={&(0x7f0000000200), 0x6}, 0x10202, 0x4, 0x4, 0x7, 0xdf, 0x9, 0x3}, 0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x8) 2018/05/15 08:24:59 executing program 0: perf_event_open$cgroup(&(0x7f0000000240)={0x7, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x5, 0x0, 0x0, 0x6, @perf_bp={&(0x7f0000000200), 0x6}, 0x10202, 0x4, 0x4, 0x7, 0xdf, 0x9, 0x3}, 0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x8) 2018/05/15 08:24:59 executing program 3: syz_emit_ethernet(0x3e, &(0x7f00000001c0)={@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, @dev={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa]}, [], {@ipv6={0x86dd, {0x0, 0x6, "50a09c", 0x8, 0xffffff87, 0x0, @remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x4305], 0xbb}, @local={0xfe, 0x80, [], 0xaa}, {[], @udp={0x0, 0x0, 0x8}}}}}}, &(0x7f0000000040)) [ 429.965254] FAT-fs (loop1): bogus number of reserved sectors [ 429.971171] FAT-fs (loop1): Can't find a valid FAT filesystem 2018/05/15 08:24:59 executing program 5 (fault-call:1 fault-nth:11): r0 = syz_open_procfs(0x0, &(0x7f0000000280)='net/ptype\x00') sendfile(r0, r0, &(0x7f0000000000)=0xffffffd, 0x7fffffff) 2018/05/15 08:24:59 executing program 7: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup(r0) setsockopt$EBT_SO_SET_ENTRIES(0xffffffffffffffff, 0x0, 0x80, &(0x7f0000000d40)=@broute={'broute\x00', 0x20, 0x4, 0x928, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000400], 0x0, &(0x7f0000000000), &(0x7f0000000400)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x2, [{{{0x5, 0x7, 0x4, 'bcsh0\x00', 'sit0\x00', 'syzkaller1\x00', 'veth0\x00', @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [0xff, 0xff, 0xff, 0xff], @dev={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0x18}, [0xff, 0x0, 0x0, 0x0, 0x0, 0xff], 0x1d8, 0x228, 0x258, [@comment={'comment\x00', 0x100}, @owner={'owner\x00', 0x18, {{0x0, 0x0, 0x0, 0x0, 0x1, 0x1}}}]}, [@common=@LED={'LED\x00', 0x28, {{'syz0\x00', 0x1, 0x0, 0x800}}}]}, @common=@redirect={'redirect\x00', 0x8, {{0xfffffffffffffffe}}}}, {{{0x11, 0x4, 0x88e7, 'veth1_to_bond\x00', 'erspan0\x00', 'bridge_slave_1\x00', 'veth0_to_bridge\x00', @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [0xff, 0xff, 0x0, 0xff, 0x0, 0xff], @random="cfa071dc33d9", [0xff, 0xff, 0xff, 0xff, 0xff, 0xff], 0x2e0, 0x2e0, 0x330, [@mac={'mac\x00', 0x10, {{@remote={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xbb}, 0x1}}}, @bpf0={'bpf\x00', 0x210, {{0x20, [{0x8000, 0x4902, 0x5, 0x3ff}, {0x5, 0x8, 0x2, 0xff}, {0x1000, 0x48000000000, 0x3}, {0xf7, 0x1f, 0xfffffffffffffe00, 0x1}, {0x10000, 0xfc0, 0x1, 0x6}, {0x4, 0x2, 0xcefa, 0x81}, {0x815, 0xc7, 0x8001, 0x6a0}, {0x40, 0x0, 0x9, 0x80000001}, {0xffffffffffffff53, 0x38a, 0x100000000, 0x7}, {0x5, 0x1, 0x1000, 0x10001}, {0x80000000, 0x7, 0x1, 0xf7}, {0x2, 0x9, 0x4c, 0x5}, {0xfffffffffffffff7, 0x0, 0xe74, 0x52a}, {0x1ff, 0x7, 0x3, 0x7}, {0x6, 0x1ff, 0x49, 0x7}, {0x8000, 0x0, 0x7, 0x684}, {0xffe, 0x988, 0x3, 0x1}, {0x7b, 0x5a07, 0x18, 0x7}, {0xfffffffffffffffe, 0xfff, 0x3, 0x178180a0}, {0x2, 0xc0, 0x6, 0x401}, {0x5, 0x3, 0x8, 0x8}, {0xffffffffffff0001, 0x3, 0xfffffffffffffff7, 0x5}, {0x1ff, 0x8001, 0x3}, {0x3, 0x9, 0xffffffff, 0x2}, {0x5, 0x4, 0x574, 0x64c}, {0x5, 0x4, 0x10001, 0x6}, {0x1, 0x5b2c, 0x3ff, 0x7}, {0xff, 0x2, 0x5, 0x62c5fc18}, {0x101, 0x7, 0x2, 0xfffffffffffffffd}, {0x7fff, 0x6, 0x8, 0x4}, {0x9, 0x0, 0x7, 0xff}, {0x4, 0x4, 0x4, 0x10000}, {0x59b0, 0xfff, 0x4, 0x4}, {0x1f, 0xfffffffffffffffd, 0x8001, 0x800}, {0x0, 0xffffffffffffffff, 0x2, 0x65}, {0x1ff, 0x1, 0x2, 0x7ff}, {0x4, 0x5, 0x1, 0x7be}, {0x9e4, 0x0, 0x7, 0x5}, {0x5, 0x8, 0x7f, 0xffffffff}, {0x4, 0x6, 0x5, 0x7ff}, {0x22aaaf52, 0x8f, 0x6, 0x10000}, {0x2, 0x7, 0xffff}, {0x5, 0xfffffffff016eb50, 0x82, 0x7}, {0x38, 0x800, 0x9a2a, 0xfffffffffffffffc}, {0x5, 0xb, 0x4, 0xfffffffffffff001}, {0x8b5, 0x81, 0x4, 0x2}, {0x8, 0xfffffffffffffff8, 0x1, 0x8}, {0x40, 0x4, 0x1, 0x100000001}, {0x9b, 0x5, 0x1, 0xd64c}, {0x100, 0x8, 0x7, 0x3ff}, {0xf11, 0x200, 0x7, 0x2}, {0xac5, 0x0, 0x3, 0x7}, {0x518, 0x1, 0x80}, {0x6, 0x7f, 0x6, 0x7298}, {0x7, 0x1, 0x2, 0x1ec9}, {0x400, 0x2, 0x6, 0x6c3}, {0x100000001, 0x6, 0x5, 0x9}, {0x8, 0x1dae, 0xfffffffffffffff8, 0x101}, {0x2, 0x7, 0x8, 0x3}, {0x0, 0x45b, 0x7, 0x72}, {0x100000001, 0xc00000000000, 0x100000001, 0x8}, {0x100000001, 0x0, 0xfffffffffffffffc, 0x3}, {0x95, 0x90b, 0x0, 0xfffffffffffff565}, {0x0, 0x4, 0x0, 0x2}], 0x40}}}]}}, @common=@IDLETIMER={'IDLETIMER\x00', 0x28, {{0x7f, 'syz0\x00'}}}}]}, {0x0, '\x00', 0x2, 0xfffffffffffffffc}, {0x0, '\x00', 0x2, 0xffffffffffffffff, 0x2, [{{{0x11, 0x40, 0x87df, 'irlan0\x00', 'sit0\x00', 'veth0_to_team\x00', 'ip6gretap0\x00', @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [0xff, 0xff, 0xff, 0xff, 0x0, 0xff], @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [0x0, 0xff, 0x0, 0xff], 0xb0, 0x210, 0x258, [@time={'time\x00', 0x18, {{0x1ff, 0x1, 0xe063, 0xb6c5, 0x2e80, 0x0, 0x2}}}]}, [@common=@redirect={'redirect\x00', 0x8, {{0xffffffffffffffff}}}, @common=@SECMARK={'SECMARK\x00', 0x108, {{0x1, 0x6, 'system_u:object_r:lost_found_t:s0\x00'}}}]}, @common=@ERROR={'ERROR\x00', 0x20, {"4323eed968d7072e70de82f41331fe3aed2aedc8f2fff16e54b1c4e2ad07"}}}, {{{0x5, 0x54, 0x888d, 'ip6gretap0\x00', 'teql0\x00', 'veth1_to_team\x00', 'erspan0\x00', @random="0eae55d5aac5", [0x0, 0xff, 0x0, 0xff, 0xff, 0xff], @empty, [0xff, 0xff, 0xff, 0x0, 0xff, 0xff], 0x70, 0x70, 0xb8}}, @common=@RATEEST={'RATEEST\x00', 0x20, {{'syz0\x00', 0x9, 0x1, 0x4}}}}]}]}, 0x9a0) 2018/05/15 08:24:59 executing program 2: syz_emit_ethernet(0x3e, &(0x7f00000001c0)={@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, @dev={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa]}, [], {@ipv6={0x86dd, {0x0, 0x6, "50a09c", 0x8, 0x0, 0x0, @remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0xf0], 0xbb}, @local={0xfe, 0x80, [], 0xaa}, {[], @udp={0x0, 0x0, 0x8}}}}}}, &(0x7f0000000040)) 2018/05/15 08:24:59 executing program 3: syz_emit_ethernet(0x3e, &(0x7f00000001c0)={@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, @dev={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa]}, [], {@ipv6={0x86dd, {0x0, 0x6, "50a09c", 0x8, 0xffffff87, 0x0, @remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x700], 0xbb}, @local={0xfe, 0x80, [], 0xaa}, {[], @udp={0x0, 0x0, 0x8}}}}}}, &(0x7f0000000040)) 2018/05/15 08:24:59 executing program 4: perf_event_open$cgroup(&(0x7f0000000240)={0x7, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0xfffffffffffffff9, 0x5, 0x0, 0x5, 0x6, @perf_bp={&(0x7f0000000200), 0x6}, 0x10202, 0x4, 0x4, 0x7, 0xdf, 0x9, 0x3}, 0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x8) 2018/05/15 08:24:59 executing program 0: perf_event_open$cgroup(&(0x7f0000000240)={0x7, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000200), 0x6}, 0x10202, 0x4, 0x4, 0x7, 0xdf, 0x9, 0x3}, 0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x8) 2018/05/15 08:24:59 executing program 3: syz_emit_ethernet(0x3e, &(0x7f00000001c0)={@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, @dev={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa]}, [], {@ipv6={0x86dd, {0x0, 0x6, "50a09c", 0x8, 0xffffff87, 0x0, @remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0xf5ffffff00000000], 0xbb}, @local={0xfe, 0x80, [], 0xaa}, {[], @udp={0x0, 0x0, 0x8}}}}}}, &(0x7f0000000040)) [ 430.112458] FAULT_INJECTION: forcing a failure. [ 430.112458] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 430.124376] CPU: 1 PID: 14275 Comm: syz-executor5 Not tainted 4.17.0-rc5+ #51 [ 430.131659] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 430.141017] Call Trace: [ 430.143615] dump_stack+0x1b9/0x294 [ 430.147250] ? dump_stack_print_info.cold.2+0x52/0x52 [ 430.152445] ? find_held_lock+0x36/0x1c0 [ 430.156507] should_fail.cold.4+0xa/0x1a 2018/05/15 08:24:59 executing program 2: syz_emit_ethernet(0x3e, &(0x7f00000001c0)={@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, @dev={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa]}, [], {@ipv6={0x86dd, {0x0, 0x6, "50a09c", 0x8, 0x0, 0x0, @remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x88ffffff00000000], 0xbb}, @local={0xfe, 0x80, [], 0xaa}, {[], @udp={0x0, 0x0, 0x8}}}}}}, &(0x7f0000000040)) [ 430.160572] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 430.165687] ? graph_lock+0x170/0x170 [ 430.169502] ? kasan_check_read+0x11/0x20 [ 430.173664] ? rcu_bh_force_quiescent_state+0x20/0x20 [ 430.178862] ? find_held_lock+0x36/0x1c0 [ 430.182938] ? __lock_is_held+0xb5/0x140 [ 430.187023] ? check_same_owner+0x320/0x320 [ 430.191358] ? rcu_note_context_switch+0x710/0x710 [ 430.196300] ? __might_sleep+0x95/0x190 [ 430.200298] __alloc_pages_nodemask+0x34e/0xd70 [ 430.204979] ? default_file_splice_read+0x1c7/0xad0 [ 430.210009] ? do_splice_to+0x12e/0x190 [ 430.213992] ? splice_direct_to_actor+0x268/0x8d0 [ 430.218848] ? __alloc_pages_slowpath+0x2db0/0x2db0 [ 430.223870] ? __lock_is_held+0xb5/0x140 [ 430.227945] ? __lock_is_held+0xb5/0x140 [ 430.232017] ? rcu_read_lock_sched_held+0x108/0x120 [ 430.237046] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 430.242598] alloc_pages_current+0x10c/0x210 [ 430.247020] push_pipe+0x400/0x7a0 [ 430.250577] ? __kmalloc_node+0x47/0x70 [ 430.254581] iov_iter_get_pages_alloc+0x84a/0x14e0 [ 430.259528] ? rcu_is_watching+0x85/0x140 [ 430.263688] ? copy_page_to_iter+0xf30/0xf30 [ 430.268117] ? is_bpf_text_address+0xd7/0x170 [ 430.272628] ? kernel_text_address+0x79/0xf0 [ 430.277046] ? __unwind_start+0x166/0x330 [ 430.281213] ? unwind_get_return_address+0x61/0xa0 [ 430.286159] ? __save_stack_trace+0x7e/0xd0 [ 430.290502] ? print_usage_bug+0xc0/0xc0 [ 430.294573] ? save_stack+0xa9/0xd0 [ 430.298207] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 430.303226] ? iov_iter_pipe+0xc2/0x2f0 [ 430.307207] default_file_splice_read+0x1c7/0xad0 [ 430.312051] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 430.317425] ? print_usage_bug+0xc0/0xc0 [ 430.321500] ? do_splice_direct+0x400/0x400 [ 430.325830] ? debug_mutex_init+0x1c/0x60 [ 430.329985] ? trace_hardirqs_on_caller+0x421/0x5c0 [ 430.335008] ? __lockdep_init_map+0x105/0x590 [ 430.339508] ? lockdep_init_map+0x9/0x10 [ 430.343570] ? debug_mutex_init+0x2d/0x60 [ 430.347722] ? __mutex_init+0x1ef/0x280 [ 430.351698] ? __ia32_sys_membarrier+0x150/0x150 [ 430.356461] ? __lockdep_init_map+0x105/0x590 [ 430.360973] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 430.366513] ? fsnotify+0x415/0xfc0 [ 430.370139] ? fsnotify+0xfc0/0xfc0 [ 430.373765] ? fsnotify_first_mark+0x330/0x330 [ 430.378350] ? security_file_permission+0x1c6/0x240 [ 430.383351] ? rw_verify_area+0x118/0x360 [ 430.387490] ? do_splice_direct+0x400/0x400 [ 430.391797] do_splice_to+0x12e/0x190 [ 430.395586] splice_direct_to_actor+0x268/0x8d0 [ 430.400238] ? pipe_to_sendpage+0x3f0/0x3f0 [ 430.404563] ? do_splice_to+0x190/0x190 [ 430.408534] ? rw_verify_area+0x118/0x360 [ 430.412675] do_splice_direct+0x2cc/0x400 [ 430.416806] ? splice_direct_to_actor+0x8d0/0x8d0 [ 430.421638] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 430.427157] ? __sb_start_write+0x17f/0x300 [ 430.431459] do_sendfile+0x60f/0xe00 [ 430.435159] ? do_compat_pwritev64+0x1b0/0x1b0 [ 430.439722] ? __might_sleep+0x95/0x190 [ 430.443694] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 430.449232] ? _copy_from_user+0xdf/0x150 [ 430.453368] __x64_sys_sendfile64+0x155/0x240 [ 430.457850] ? __ia32_sys_sendfile+0x290/0x290 [ 430.462417] ? do_syscall_64+0x92/0x800 [ 430.466376] do_syscall_64+0x1b1/0x800 [ 430.470245] ? finish_task_switch+0x1ca/0x840 [ 430.474730] ? syscall_return_slowpath+0x5c0/0x5c0 [ 430.479660] ? syscall_return_slowpath+0x30f/0x5c0 [ 430.484579] ? entry_SYSCALL_64_after_hwframe+0x59/0xbe [ 430.489928] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 430.494757] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 430.499926] RIP: 0033:0x455a09 [ 430.503095] RSP: 002b:00007ffbeaa32c68 EFLAGS: 00000246 ORIG_RAX: 0000000000000028 2018/05/15 08:24:59 executing program 6: syslog(0x2, &(0x7f0000000cc0)=""/107, 0x6b) setsockopt$inet_sctp_SCTP_STREAM_SCHEDULER(0xffffffffffffffff, 0x84, 0x7b, &(0x7f00000001c0), 0x8) 2018/05/15 08:24:59 executing program 0: perf_event_open$cgroup(&(0x7f0000000240)={0x7, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000200)}, 0x10202, 0x4, 0x4, 0x7, 0xdf, 0x9, 0x3}, 0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x8) 2018/05/15 08:24:59 executing program 7: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup(r0) setsockopt$EBT_SO_SET_ENTRIES(0xffffffffffffffff, 0x0, 0x80, &(0x7f0000000d40)=@broute={'broute\x00', 0x20, 0x4, 0x928, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000400], 0x0, &(0x7f0000000000), &(0x7f0000000400)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x2, [{{{0x5, 0x7, 0x4, 'bcsh0\x00', 'sit0\x00', 'syzkaller1\x00', 'veth0\x00', @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [0xff, 0xff, 0xff, 0xff], @dev={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0x18}, [0xff, 0x0, 0x0, 0x0, 0x0, 0xff], 0x1d8, 0x228, 0x258, [@comment={'comment\x00', 0x100}, @owner={'owner\x00', 0x18, {{0x0, 0x0, 0x0, 0x0, 0x1, 0x1}}}]}, [@common=@LED={'LED\x00', 0x28, {{'syz0\x00', 0x1, 0x0, 0x800}}}]}, @common=@redirect={'redirect\x00', 0x8, {{0xfffffffffffffffe}}}}, {{{0x11, 0x4, 0x88e7, 'veth1_to_bond\x00', 'erspan0\x00', 'bridge_slave_1\x00', 'veth0_to_bridge\x00', @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [0xff, 0xff, 0x0, 0xff, 0x0, 0xff], @random="cfa071dc33d9", [0xff, 0xff, 0xff, 0xff, 0xff, 0xff], 0x2e0, 0x2e0, 0x330, [@mac={'mac\x00', 0x10, {{@remote={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xbb}, 0x1}}}, @bpf0={'bpf\x00', 0x210, {{0x20, [{0x8000, 0x4902, 0x5, 0x3ff}, {0x5, 0x8, 0x2, 0xff}, {0x1000, 0x48000000000, 0x3}, {0xf7, 0x1f, 0xfffffffffffffe00, 0x1}, {0x10000, 0xfc0, 0x1, 0x6}, {0x4, 0x2, 0xcefa, 0x81}, {0x815, 0xc7, 0x8001, 0x6a0}, {0x40, 0x0, 0x9, 0x80000001}, {0xffffffffffffff53, 0x38a, 0x100000000, 0x7}, {0x5, 0x1, 0x1000, 0x10001}, {0x80000000, 0x7, 0x1, 0xf7}, {0x2, 0x9, 0x4c, 0x5}, {0xfffffffffffffff7, 0x0, 0xe74, 0x52a}, {0x1ff, 0x7, 0x3, 0x7}, {0x6, 0x1ff, 0x49, 0x7}, {0x8000, 0x0, 0x7, 0x684}, {0xffe, 0x988, 0x3, 0x1}, {0x7b, 0x5a07, 0x18, 0x7}, {0xfffffffffffffffe, 0xfff, 0x3, 0x178180a0}, {0x2, 0xc0, 0x6, 0x401}, {0x5, 0x3, 0x8, 0x8}, {0xffffffffffff0001, 0x3, 0xfffffffffffffff7, 0x5}, {0x1ff, 0x8001, 0x3}, {0x3, 0x9, 0xffffffff, 0x2}, {0x5, 0x4, 0x574, 0x64c}, {0x5, 0x4, 0x10001, 0x6}, {0x1, 0x5b2c, 0x3ff, 0x7}, {0xff, 0x2, 0x5, 0x62c5fc18}, {0x101, 0x7, 0x2, 0xfffffffffffffffd}, {0x7fff, 0x6, 0x8, 0x4}, {0x9, 0x0, 0x7, 0xff}, {0x4, 0x4, 0x4, 0x10000}, {0x59b0, 0xfff, 0x4, 0x4}, {0x1f, 0xfffffffffffffffd, 0x8001, 0x800}, {0x0, 0xffffffffffffffff, 0x2, 0x65}, {0x1ff, 0x1, 0x2, 0x7ff}, {0x4, 0x5, 0x1, 0x7be}, {0x9e4, 0x0, 0x7, 0x5}, {0x5, 0x8, 0x7f, 0xffffffff}, {0x4, 0x6, 0x5, 0x7ff}, {0x22aaaf52, 0x8f, 0x6, 0x10000}, {0x2, 0x7, 0xffff}, {0x5, 0xfffffffff016eb50, 0x82, 0x7}, {0x38, 0x800, 0x9a2a, 0xfffffffffffffffc}, {0x5, 0xb, 0x4, 0xfffffffffffff001}, {0x8b5, 0x81, 0x4, 0x2}, {0x8, 0xfffffffffffffff8, 0x1, 0x8}, {0x40, 0x4, 0x1, 0x100000001}, {0x9b, 0x5, 0x1, 0xd64c}, {0x100, 0x8, 0x7, 0x3ff}, {0xf11, 0x200, 0x7, 0x2}, {0xac5, 0x0, 0x3, 0x7}, {0x518, 0x1, 0x80}, {0x6, 0x7f, 0x6, 0x7298}, {0x7, 0x1, 0x2, 0x1ec9}, {0x400, 0x2, 0x6, 0x6c3}, {0x100000001, 0x6, 0x5, 0x9}, {0x8, 0x1dae, 0xfffffffffffffff8, 0x101}, {0x2, 0x7, 0x8, 0x3}, {0x0, 0x45b, 0x7, 0x72}, {0x100000001, 0xc00000000000, 0x100000001, 0x8}, {0x100000001, 0x0, 0xfffffffffffffffc, 0x3}, {0x95, 0x90b, 0x0, 0xfffffffffffff565}, {0x0, 0x4, 0x0, 0x2}], 0x40}}}]}}, @common=@IDLETIMER={'IDLETIMER\x00', 0x28, {{0x7f, 'syz0\x00'}}}}]}, {0x0, '\x00', 0x2, 0xfffffffffffffffc}, {0x0, '\x00', 0x2, 0xffffffffffffffff, 0x2, [{{{0x11, 0x40, 0x87df, 'irlan0\x00', 'sit0\x00', 'veth0_to_team\x00', 'ip6gretap0\x00', @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [0xff, 0xff, 0xff, 0xff, 0x0, 0xff], @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [0x0, 0xff, 0x0, 0xff], 0xb0, 0x210, 0x258, [@time={'time\x00', 0x18, {{0x1ff, 0x1, 0xe063, 0xb6c5, 0x2e80, 0x0, 0x2}}}]}, [@common=@redirect={'redirect\x00', 0x8, {{0xffffffffffffffff}}}, @common=@SECMARK={'SECMARK\x00', 0x108, {{0x1, 0x6, 'system_u:object_r:lost_found_t:s0\x00'}}}]}, @common=@ERROR={'ERROR\x00', 0x20, {"4323eed968d7072e70de82f41331fe3aed2aedc8f2fff16e54b1c4e2ad07"}}}, {{{0x5, 0x54, 0x888d, 'ip6gretap0\x00', 'teql0\x00', 'veth1_to_team\x00', 'erspan0\x00', @random="0eae55d5aac5", [0x0, 0xff, 0x0, 0xff, 0xff, 0xff], @empty, [0xff, 0xff, 0xff, 0x0, 0xff, 0xff], 0x70, 0x70, 0xb8}}, @common=@RATEEST={'RATEEST\x00', 0x20, {{'syz0\x00', 0x9, 0x1, 0x4}}}}]}]}, 0x9a0) 2018/05/15 08:24:59 executing program 1: perf_event_open(&(0x7f0000000040)={0x1, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f00000000c0)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000400), 0x0, &(0x7f0000000600)=ANY=[]) r0 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) fallocate(r0, 0x1, 0x0, 0x10000101) 2018/05/15 08:24:59 executing program 2: syz_emit_ethernet(0x3e, &(0x7f00000001c0)={@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, @dev={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa]}, [], {@ipv6={0x86dd, {0x0, 0x6, "50a09c", 0x8, 0x0, 0x0, @remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0xf000], 0xbb}, @local={0xfe, 0x80, [], 0xaa}, {[], @udp={0x0, 0x0, 0x8}}}}}}, &(0x7f0000000040)) 2018/05/15 08:24:59 executing program 4: perf_event_open$cgroup(&(0x7f0000000240)={0x7, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x5, 0x0, 0x5, 0x6, @perf_bp={&(0x7f0000000200), 0x6}, 0x10202, 0x4, 0x4, 0x7, 0xdf, 0x9, 0x3}, 0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x8) 2018/05/15 08:24:59 executing program 3: syz_emit_ethernet(0x3e, &(0x7f00000001c0)={@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, @dev={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa]}, [], {@ipv6={0x86dd, {0x0, 0x6, "50a09c", 0x8, 0xffffff87, 0x0, @remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x3800000000000000], 0xbb}, @local={0xfe, 0x80, [], 0xaa}, {[], @udp={0x0, 0x0, 0x8}}}}}}, &(0x7f0000000040)) 2018/05/15 08:24:59 executing program 5 (fault-call:1 fault-nth:12): r0 = syz_open_procfs(0x0, &(0x7f0000000280)='net/ptype\x00') sendfile(r0, r0, &(0x7f0000000000)=0xffffffd, 0x7fffffff) [ 430.510785] RAX: ffffffffffffffda RBX: 00007ffbeaa336d4 RCX: 0000000000455a09 [ 430.518040] RDX: 0000000020000000 RSI: 0000000000000013 RDI: 0000000000000013 [ 430.525305] RBP: 000000000072bea0 R08: 0000000000000000 R09: 0000000000000000 [ 430.532564] R10: 000000007fffffff R11: 0000000000000246 R12: 0000000000000014 [ 430.539819] R13: 0000000000000579 R14: 00000000006fc3f8 R15: 000000000000000b [ 430.605962] FAT-fs (loop1): bogus number of reserved sectors [ 430.611894] FAT-fs (loop1): Can't find a valid FAT filesystem [ 430.631791] FAULT_INJECTION: forcing a failure. [ 430.631791] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 430.643689] CPU: 0 PID: 14311 Comm: syz-executor5 Not tainted 4.17.0-rc5+ #51 [ 430.650964] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 430.660319] Call Trace: [ 430.662917] dump_stack+0x1b9/0x294 [ 430.666629] ? dump_stack_print_info.cold.2+0x52/0x52 [ 430.671830] ? find_held_lock+0x36/0x1c0 [ 430.675905] should_fail.cold.4+0xa/0x1a [ 430.679980] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 430.685097] ? graph_lock+0x170/0x170 [ 430.688910] ? kasan_check_read+0x11/0x20 [ 430.693071] ? rcu_bh_force_quiescent_state+0x20/0x20 [ 430.698269] ? find_held_lock+0x36/0x1c0 [ 430.702342] ? __lock_is_held+0xb5/0x140 [ 430.705322] kernel msg: ebtables bug: please report to author: bad policy [ 430.706424] ? check_same_owner+0x320/0x320 [ 430.706447] ? rcu_note_context_switch+0x710/0x710 [ 430.706473] ? __might_sleep+0x95/0x190 [ 430.726582] __alloc_pages_nodemask+0x34e/0xd70 [ 430.731260] ? default_file_splice_read+0x1c7/0xad0 [ 430.736283] ? do_splice_to+0x12e/0x190 [ 430.740268] ? splice_direct_to_actor+0x268/0x8d0 [ 430.745122] ? __alloc_pages_slowpath+0x2db0/0x2db0 [ 430.750146] ? __lock_is_held+0xb5/0x140 [ 430.754227] ? __lock_is_held+0xb5/0x140 [ 430.758302] ? rcu_read_lock_sched_held+0x108/0x120 [ 430.763334] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 430.768884] alloc_pages_current+0x10c/0x210 [ 430.773293] push_pipe+0x400/0x7a0 [ 430.776837] ? __kmalloc_node+0x47/0x70 [ 430.780822] iov_iter_get_pages_alloc+0x84a/0x14e0 [ 430.785754] ? rcu_is_watching+0x85/0x140 [ 430.789908] ? copy_page_to_iter+0xf30/0xf30 [ 430.794319] ? is_bpf_text_address+0xd7/0x170 [ 430.798819] ? kernel_text_address+0x79/0xf0 [ 430.803234] ? __unwind_start+0x166/0x330 [ 430.807393] ? unwind_get_return_address+0x61/0xa0 [ 430.812328] ? __save_stack_trace+0x7e/0xd0 [ 430.816662] ? print_usage_bug+0xc0/0xc0 [ 430.820728] ? save_stack+0xa9/0xd0 [ 430.824361] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 430.829380] ? iov_iter_pipe+0xc2/0x2f0 [ 430.833898] default_file_splice_read+0x1c7/0xad0 [ 430.838745] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 430.844114] ? print_usage_bug+0xc0/0xc0 [ 430.848190] ? do_splice_direct+0x400/0x400 [ 430.852518] ? debug_mutex_init+0x1c/0x60 2018/05/15 08:24:59 executing program 0: perf_event_open$cgroup(&(0x7f0000000240)={0x7, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000200)}, 0x0, 0x4, 0x4, 0x7, 0xdf, 0x9, 0x3}, 0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x8) 2018/05/15 08:24:59 executing program 7: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup(r0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000d40)=@broute={'broute\x00', 0x20, 0x4, 0x928, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000400], 0x0, &(0x7f0000000000), &(0x7f0000000400)=[{0x0, '\x00', 0x0, 0x0, 0x2, [{{{0x5, 0x7, 0x4, 'bcsh0\x00', 'sit0\x00', 'syzkaller1\x00', 'veth0\x00', @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [0xff, 0xff, 0xff, 0xff], @dev={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0x18}, [0xff, 0x0, 0x0, 0x0, 0x0, 0xff], 0x1d8, 0x228, 0x258, [@comment={'comment\x00', 0x100}, @owner={'owner\x00', 0x18, {{0x0, 0x0, 0x0, 0x0, 0x1, 0x1}}}]}, [@common=@LED={'LED\x00', 0x28, {{'syz0\x00', 0x1, 0x0, 0x800}}}]}, @common=@redirect={'redirect\x00', 0x8, {{0xfffffffffffffffe}}}}, {{{0x11, 0x4, 0x88e7, 'veth1_to_bond\x00', 'erspan0\x00', 'bridge_slave_1\x00', 'veth0_to_bridge\x00', @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [0xff, 0xff, 0x0, 0xff, 0x0, 0xff], @random="cfa071dc33d9", [0xff, 0xff, 0xff, 0xff, 0xff, 0xff], 0x2e0, 0x2e0, 0x330, [@mac={'mac\x00', 0x10, {{@remote={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xbb}, 0x1}}}, @bpf0={'bpf\x00', 0x210, {{0x20, [{0x8000, 0x4902, 0x5, 0x3ff}, {0x5, 0x8, 0x2, 0xff}, {0x1000, 0x48000000000, 0x3}, {0xf7, 0x1f, 0xfffffffffffffe00, 0x1}, {0x10000, 0xfc0, 0x1, 0x6}, {0x4, 0x2, 0xcefa, 0x81}, {0x815, 0xc7, 0x8001, 0x6a0}, {0x40, 0x0, 0x9, 0x80000001}, {0xffffffffffffff53, 0x38a, 0x100000000, 0x7}, {0x5, 0x1, 0x1000, 0x10001}, {0x80000000, 0x7, 0x1, 0xf7}, {0x2, 0x9, 0x4c, 0x5}, {0xfffffffffffffff7, 0x0, 0xe74, 0x52a}, {0x1ff, 0x7, 0x3, 0x7}, {0x6, 0x1ff, 0x49, 0x7}, {0x8000, 0x0, 0x7, 0x684}, {0xffe, 0x988, 0x3, 0x1}, {0x7b, 0x5a07, 0x18, 0x7}, {0xfffffffffffffffe, 0xfff, 0x3, 0x178180a0}, {0x2, 0xc0, 0x6, 0x401}, {0x5, 0x3, 0x8, 0x8}, {0xffffffffffff0001, 0x3, 0xfffffffffffffff7, 0x5}, {0x1ff, 0x8001, 0x3}, {0x3, 0x9, 0xffffffff, 0x2}, {0x5, 0x4, 0x574, 0x64c}, {0x5, 0x4, 0x10001, 0x6}, {0x1, 0x5b2c, 0x3ff, 0x7}, {0xff, 0x2, 0x5, 0x62c5fc18}, {0x101, 0x7, 0x2, 0xfffffffffffffffd}, {0x7fff, 0x6, 0x8, 0x4}, {0x9, 0x0, 0x7, 0xff}, {0x4, 0x4, 0x4, 0x10000}, {0x59b0, 0xfff, 0x4, 0x4}, {0x1f, 0xfffffffffffffffd, 0x8001, 0x800}, {0x0, 0xffffffffffffffff, 0x2, 0x65}, {0x1ff, 0x1, 0x2, 0x7ff}, {0x4, 0x5, 0x1, 0x7be}, {0x9e4, 0x0, 0x7, 0x5}, {0x5, 0x8, 0x7f, 0xffffffff}, {0x4, 0x6, 0x5, 0x7ff}, {0x22aaaf52, 0x8f, 0x6, 0x10000}, {0x2, 0x7, 0xffff}, {0x5, 0xfffffffff016eb50, 0x82, 0x7}, {0x38, 0x800, 0x9a2a, 0xfffffffffffffffc}, {0x5, 0xb, 0x4, 0xfffffffffffff001}, {0x8b5, 0x81, 0x4, 0x2}, {0x8, 0xfffffffffffffff8, 0x1, 0x8}, {0x40, 0x4, 0x1, 0x100000001}, {0x9b, 0x5, 0x1, 0xd64c}, {0x100, 0x8, 0x7, 0x3ff}, {0xf11, 0x200, 0x7, 0x2}, {0xac5, 0x0, 0x3, 0x7}, {0x518, 0x1, 0x80}, {0x6, 0x7f, 0x6, 0x7298}, {0x7, 0x1, 0x2, 0x1ec9}, {0x400, 0x2, 0x6, 0x6c3}, {0x100000001, 0x6, 0x5, 0x9}, {0x8, 0x1dae, 0xfffffffffffffff8, 0x101}, {0x2, 0x7, 0x8, 0x3}, {0x0, 0x45b, 0x7, 0x72}, {0x100000001, 0xc00000000000, 0x100000001, 0x8}, {0x100000001, 0x0, 0xfffffffffffffffc, 0x3}, {0x95, 0x90b, 0x0, 0xfffffffffffff565}, {0x0, 0x4, 0x0, 0x2}], 0x40}}}]}}, @common=@IDLETIMER={'IDLETIMER\x00', 0x28, {{0x7f, 'syz0\x00'}}}}]}, {0x0, '\x00', 0x2, 0xfffffffffffffffc}, {0x0, '\x00', 0x2, 0xffffffffffffffff, 0x2, [{{{0x11, 0x40, 0x87df, 'irlan0\x00', 'sit0\x00', 'veth0_to_team\x00', 'ip6gretap0\x00', @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [0xff, 0xff, 0xff, 0xff, 0x0, 0xff], @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [0x0, 0xff, 0x0, 0xff], 0xb0, 0x210, 0x258, [@time={'time\x00', 0x18, {{0x1ff, 0x1, 0xe063, 0xb6c5, 0x2e80, 0x0, 0x2}}}]}, [@common=@redirect={'redirect\x00', 0x8, {{0xffffffffffffffff}}}, @common=@SECMARK={'SECMARK\x00', 0x108, {{0x1, 0x6, 'system_u:object_r:lost_found_t:s0\x00'}}}]}, @common=@ERROR={'ERROR\x00', 0x20, {"4323eed968d7072e70de82f41331fe3aed2aedc8f2fff16e54b1c4e2ad07"}}}, {{{0x5, 0x54, 0x888d, 'ip6gretap0\x00', 'teql0\x00', 'veth1_to_team\x00', 'erspan0\x00', @random="0eae55d5aac5", [0x0, 0xff, 0x0, 0xff, 0xff, 0xff], @empty, [0xff, 0xff, 0xff, 0x0, 0xff, 0xff], 0x70, 0x70, 0xb8}}, @common=@RATEEST={'RATEEST\x00', 0x20, {{'syz0\x00', 0x9, 0x1, 0x4}}}}]}]}, 0x9a0) 2018/05/15 08:25:00 executing program 0: perf_event_open$cgroup(&(0x7f0000000240)={0x7, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000200)}, 0x0, 0x0, 0x4, 0x7, 0xdf, 0x9, 0x3}, 0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x8) [ 430.856676] ? trace_hardirqs_on_caller+0x421/0x5c0 [ 430.861697] ? __lockdep_init_map+0x105/0x590 [ 430.866198] ? lockdep_init_map+0x9/0x10 [ 430.870260] ? debug_mutex_init+0x2d/0x60 [ 430.874403] ? __mutex_init+0x1ef/0x280 [ 430.878361] ? __ia32_sys_membarrier+0x150/0x150 [ 430.883109] ? __lockdep_init_map+0x105/0x590 [ 430.887592] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 430.893112] ? fsnotify+0x415/0xfc0 [ 430.896721] ? fsnotify+0xfc0/0xfc0 [ 430.900336] ? fsnotify_first_mark+0x330/0x330 [ 430.904910] ? security_file_permission+0x1c6/0x240 [ 430.909906] ? rw_verify_area+0x118/0x360 [ 430.914045] ? do_splice_direct+0x400/0x400 [ 430.918350] do_splice_to+0x12e/0x190 [ 430.922137] splice_direct_to_actor+0x268/0x8d0 [ 430.926790] ? pipe_to_sendpage+0x3f0/0x3f0 [ 430.931097] ? do_splice_to+0x190/0x190 [ 430.935060] ? rw_verify_area+0x118/0x360 [ 430.939194] do_splice_direct+0x2cc/0x400 [ 430.943333] ? splice_direct_to_actor+0x8d0/0x8d0 [ 430.948161] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 430.953682] ? __sb_start_write+0x17f/0x300 [ 430.957991] do_sendfile+0x60f/0xe00 [ 430.961698] ? do_compat_pwritev64+0x1b0/0x1b0 [ 430.966263] ? __might_sleep+0x95/0x190 [ 430.970231] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 430.975755] ? _copy_from_user+0xdf/0x150 [ 430.979900] __x64_sys_sendfile64+0x155/0x240 [ 430.984402] ? __ia32_sys_sendfile+0x290/0x290 [ 430.988971] ? do_syscall_64+0x92/0x800 [ 430.992928] do_syscall_64+0x1b1/0x800 [ 430.996800] ? finish_task_switch+0x1ca/0x840 [ 431.001289] ? syscall_return_slowpath+0x5c0/0x5c0 [ 431.006200] ? syscall_return_slowpath+0x30f/0x5c0 [ 431.011116] ? entry_SYSCALL_64_after_hwframe+0x59/0xbe [ 431.016467] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 431.021302] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 431.026474] RIP: 0033:0x455a09 [ 431.029643] RSP: 002b:00007ffbeaa32c68 EFLAGS: 00000246 ORIG_RAX: 0000000000000028 [ 431.037330] RAX: ffffffffffffffda RBX: 00007ffbeaa336d4 RCX: 0000000000455a09 [ 431.044580] RDX: 0000000020000000 RSI: 0000000000000013 RDI: 0000000000000013 2018/05/15 08:25:00 executing program 0: perf_event_open$cgroup(&(0x7f0000000240)={0x7, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000200)}, 0x0, 0x0, 0x0, 0x7, 0xdf, 0x9, 0x3}, 0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x8) 2018/05/15 08:25:00 executing program 7: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup(r0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000d40)=@broute={'broute\x00', 0x20, 0x4, 0x928, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000400], 0x0, &(0x7f0000000000), &(0x7f0000000400)=[{0x0, '\x00', 0x0, 0x0, 0x2, [{{{0x5, 0x7, 0x4, 'bcsh0\x00', 'sit0\x00', 'syzkaller1\x00', 'veth0\x00', @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [0xff, 0xff, 0xff, 0xff], @dev={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0x18}, [0xff, 0x0, 0x0, 0x0, 0x0, 0xff], 0x1d8, 0x228, 0x258, [@comment={'comment\x00', 0x100}, @owner={'owner\x00', 0x18, {{0x0, 0x0, 0x0, 0x0, 0x1, 0x1}}}]}, [@common=@LED={'LED\x00', 0x28, {{'syz0\x00', 0x1, 0x0, 0x800}}}]}, @common=@redirect={'redirect\x00', 0x8, {{0xfffffffffffffffe}}}}, {{{0x11, 0x4, 0x88e7, 'veth1_to_bond\x00', 'erspan0\x00', 'bridge_slave_1\x00', 'veth0_to_bridge\x00', @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [0xff, 0xff, 0x0, 0xff, 0x0, 0xff], @random="cfa071dc33d9", [0xff, 0xff, 0xff, 0xff, 0xff, 0xff], 0x2e0, 0x2e0, 0x330, [@mac={'mac\x00', 0x10, {{@remote={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xbb}, 0x1}}}, @bpf0={'bpf\x00', 0x210, {{0x20, [{0x8000, 0x4902, 0x5, 0x3ff}, {0x5, 0x8, 0x2, 0xff}, {0x1000, 0x48000000000, 0x3}, {0xf7, 0x1f, 0xfffffffffffffe00, 0x1}, {0x10000, 0xfc0, 0x1, 0x6}, {0x4, 0x2, 0xcefa, 0x81}, {0x815, 0xc7, 0x8001, 0x6a0}, {0x40, 0x0, 0x9, 0x80000001}, {0xffffffffffffff53, 0x38a, 0x100000000, 0x7}, {0x5, 0x1, 0x1000, 0x10001}, {0x80000000, 0x7, 0x1, 0xf7}, {0x2, 0x9, 0x4c, 0x5}, {0xfffffffffffffff7, 0x0, 0xe74, 0x52a}, {0x1ff, 0x7, 0x3, 0x7}, {0x6, 0x1ff, 0x49, 0x7}, {0x8000, 0x0, 0x7, 0x684}, {0xffe, 0x988, 0x3, 0x1}, {0x7b, 0x5a07, 0x18, 0x7}, {0xfffffffffffffffe, 0xfff, 0x3, 0x178180a0}, {0x2, 0xc0, 0x6, 0x401}, {0x5, 0x3, 0x8, 0x8}, {0xffffffffffff0001, 0x3, 0xfffffffffffffff7, 0x5}, {0x1ff, 0x8001, 0x3}, {0x3, 0x9, 0xffffffff, 0x2}, {0x5, 0x4, 0x574, 0x64c}, {0x5, 0x4, 0x10001, 0x6}, {0x1, 0x5b2c, 0x3ff, 0x7}, {0xff, 0x2, 0x5, 0x62c5fc18}, {0x101, 0x7, 0x2, 0xfffffffffffffffd}, {0x7fff, 0x6, 0x8, 0x4}, {0x9, 0x0, 0x7, 0xff}, {0x4, 0x4, 0x4, 0x10000}, {0x59b0, 0xfff, 0x4, 0x4}, {0x1f, 0xfffffffffffffffd, 0x8001, 0x800}, {0x0, 0xffffffffffffffff, 0x2, 0x65}, {0x1ff, 0x1, 0x2, 0x7ff}, {0x4, 0x5, 0x1, 0x7be}, {0x9e4, 0x0, 0x7, 0x5}, {0x5, 0x8, 0x7f, 0xffffffff}, {0x4, 0x6, 0x5, 0x7ff}, {0x22aaaf52, 0x8f, 0x6, 0x10000}, {0x2, 0x7, 0xffff}, {0x5, 0xfffffffff016eb50, 0x82, 0x7}, {0x38, 0x800, 0x9a2a, 0xfffffffffffffffc}, {0x5, 0xb, 0x4, 0xfffffffffffff001}, {0x8b5, 0x81, 0x4, 0x2}, {0x8, 0xfffffffffffffff8, 0x1, 0x8}, {0x40, 0x4, 0x1, 0x100000001}, {0x9b, 0x5, 0x1, 0xd64c}, {0x100, 0x8, 0x7, 0x3ff}, {0xf11, 0x200, 0x7, 0x2}, {0xac5, 0x0, 0x3, 0x7}, {0x518, 0x1, 0x80}, {0x6, 0x7f, 0x6, 0x7298}, {0x7, 0x1, 0x2, 0x1ec9}, {0x400, 0x2, 0x6, 0x6c3}, {0x100000001, 0x6, 0x5, 0x9}, {0x8, 0x1dae, 0xfffffffffffffff8, 0x101}, {0x2, 0x7, 0x8, 0x3}, {0x0, 0x45b, 0x7, 0x72}, {0x100000001, 0xc00000000000, 0x100000001, 0x8}, {0x100000001, 0x0, 0xfffffffffffffffc, 0x3}, {0x95, 0x90b, 0x0, 0xfffffffffffff565}, {0x0, 0x4, 0x0, 0x2}], 0x40}}}]}}, @common=@IDLETIMER={'IDLETIMER\x00', 0x28, {{0x7f, 'syz0\x00'}}}}]}, {0x0, '\x00', 0x2, 0xfffffffffffffffc}, {0x0, '\x00', 0x2, 0xffffffffffffffff, 0x2, [{{{0x11, 0x40, 0x87df, 'irlan0\x00', 'sit0\x00', 'veth0_to_team\x00', 'ip6gretap0\x00', @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [0xff, 0xff, 0xff, 0xff, 0x0, 0xff], @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [0x0, 0xff, 0x0, 0xff], 0xb0, 0x210, 0x258, [@time={'time\x00', 0x18, {{0x1ff, 0x1, 0xe063, 0xb6c5, 0x2e80, 0x0, 0x2}}}]}, [@common=@redirect={'redirect\x00', 0x8, {{0xffffffffffffffff}}}, @common=@SECMARK={'SECMARK\x00', 0x108, {{0x1, 0x6, 'system_u:object_r:lost_found_t:s0\x00'}}}]}, @common=@ERROR={'ERROR\x00', 0x20, {"4323eed968d7072e70de82f41331fe3aed2aedc8f2fff16e54b1c4e2ad07"}}}, {{{0x5, 0x54, 0x888d, 'ip6gretap0\x00', 'teql0\x00', 'veth1_to_team\x00', 'erspan0\x00', @random="0eae55d5aac5", [0x0, 0xff, 0x0, 0xff, 0xff, 0xff], @empty, [0xff, 0xff, 0xff, 0x0, 0xff, 0xff], 0x70, 0x70, 0xb8}}, @common=@RATEEST={'RATEEST\x00', 0x20, {{'syz0\x00', 0x9, 0x1, 0x4}}}}]}]}, 0x9a0) 2018/05/15 08:25:00 executing program 1: perf_event_open(&(0x7f0000000040)={0x1, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f00000000c0)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000400), 0x0, &(0x7f0000000600)=ANY=[]) r0 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) fallocate(r0, 0x1, 0x0, 0x10000101) 2018/05/15 08:25:00 executing program 3: syz_emit_ethernet(0x3e, &(0x7f00000001c0)={@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, @dev={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa]}, [], {@ipv6={0x86dd, {0x0, 0x6, "50a09c", 0x8, 0xffffff87, 0x0, @remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0xf5ffffff], 0xbb}, @local={0xfe, 0x80, [], 0xaa}, {[], @udp={0x0, 0x0, 0x8}}}}}}, &(0x7f0000000040)) 2018/05/15 08:25:00 executing program 4: perf_event_open$cgroup(&(0x7f0000000240)={0x7, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x5, 0x6, @perf_bp={&(0x7f0000000200), 0x6}, 0x10202, 0x4, 0x4, 0x7, 0xdf, 0x9, 0x3}, 0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x8) 2018/05/15 08:25:00 executing program 2: syz_emit_ethernet(0x3e, &(0x7f00000001c0)={@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, @dev={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa]}, [], {@ipv6={0x86dd, {0x0, 0x6, "50a09c", 0x8, 0x0, 0x0, @remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0xe80], 0xbb}, @local={0xfe, 0x80, [], 0xaa}, {[], @udp={0x0, 0x0, 0x8}}}}}}, &(0x7f0000000040)) 2018/05/15 08:25:00 executing program 5 (fault-call:1 fault-nth:13): r0 = syz_open_procfs(0x0, &(0x7f0000000280)='net/ptype\x00') sendfile(r0, r0, &(0x7f0000000000)=0xffffffd, 0x7fffffff) 2018/05/15 08:25:00 executing program 6: syslog(0x2, &(0x7f0000000cc0)=""/107, 0x6b) setsockopt$inet_sctp_SCTP_STREAM_SCHEDULER(0xffffffffffffffff, 0x84, 0x7b, &(0x7f00000001c0), 0x8) [ 431.051830] RBP: 000000000072bea0 R08: 0000000000000000 R09: 0000000000000000 [ 431.059077] R10: 000000007fffffff R11: 0000000000000246 R12: 0000000000000014 [ 431.066327] R13: 0000000000000579 R14: 00000000006fc3f8 R15: 000000000000000c [ 431.150188] kernel msg: ebtables bug: please report to author: bad policy [ 431.172744] FAULT_INJECTION: forcing a failure. [ 431.172744] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 431.184688] CPU: 0 PID: 14340 Comm: syz-executor5 Not tainted 4.17.0-rc5+ #51 [ 431.191964] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 431.201321] Call Trace: [ 431.203923] dump_stack+0x1b9/0x294 [ 431.207565] ? dump_stack_print_info.cold.2+0x52/0x52 [ 431.212765] ? find_held_lock+0x36/0x1c0 [ 431.216842] should_fail.cold.4+0xa/0x1a [ 431.220917] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 431.226036] ? graph_lock+0x170/0x170 [ 431.229846] ? kasan_check_read+0x11/0x20 [ 431.234004] ? rcu_bh_force_quiescent_state+0x20/0x20 [ 431.239205] ? find_held_lock+0x36/0x1c0 [ 431.243281] ? __lock_is_held+0xb5/0x140 [ 431.247369] ? check_same_owner+0x320/0x320 [ 431.251700] ? rcu_note_context_switch+0x710/0x710 [ 431.256641] ? __might_sleep+0x95/0x190 [ 431.260618] __alloc_pages_nodemask+0x34e/0xd70 [ 431.265282] ? default_file_splice_read+0x1c7/0xad0 [ 431.270291] ? do_splice_to+0x12e/0x190 [ 431.274255] ? splice_direct_to_actor+0x268/0x8d0 [ 431.279090] ? __alloc_pages_slowpath+0x2db0/0x2db0 [ 431.284092] ? __lock_is_held+0xb5/0x140 [ 431.288146] ? __lock_is_held+0xb5/0x140 [ 431.292198] ? rcu_read_lock_sched_held+0x108/0x120 [ 431.297199] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 431.302729] alloc_pages_current+0x10c/0x210 [ 431.307125] push_pipe+0x400/0x7a0 [ 431.310647] ? __kmalloc_node+0x47/0x70 [ 431.314612] iov_iter_get_pages_alloc+0x84a/0x14e0 [ 431.319537] ? rcu_is_watching+0x85/0x140 [ 431.323673] ? copy_page_to_iter+0xf30/0xf30 [ 431.328070] ? is_bpf_text_address+0xd7/0x170 [ 431.332549] ? kernel_text_address+0x79/0xf0 [ 431.336943] ? __unwind_start+0x166/0x330 [ 431.341086] ? unwind_get_return_address+0x61/0xa0 [ 431.346003] ? __save_stack_trace+0x7e/0xd0 [ 431.350322] ? print_usage_bug+0xc0/0xc0 [ 431.354365] ? save_stack+0xa9/0xd0 [ 431.357979] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 431.362978] ? iov_iter_pipe+0xc2/0x2f0 [ 431.366939] default_file_splice_read+0x1c7/0xad0 [ 431.371764] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 431.377111] ? print_usage_bug+0xc0/0xc0 [ 431.381163] ? do_splice_direct+0x400/0x400 [ 431.385479] ? debug_mutex_init+0x1c/0x60 [ 431.389612] ? trace_hardirqs_on_caller+0x421/0x5c0 [ 431.394613] ? __lockdep_init_map+0x105/0x590 [ 431.399092] ? lockdep_init_map+0x9/0x10 [ 431.403136] ? debug_mutex_init+0x2d/0x60 [ 431.407268] ? __mutex_init+0x1ef/0x280 [ 431.411226] ? __ia32_sys_membarrier+0x150/0x150 [ 431.415964] ? __lockdep_init_map+0x105/0x590 [ 431.420452] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 431.425971] ? fsnotify+0x415/0xfc0 [ 431.429584] ? fsnotify+0xfc0/0xfc0 [ 431.433194] ? fsnotify_first_mark+0x330/0x330 [ 431.437764] ? security_file_permission+0x1c6/0x240 [ 431.442767] ? rw_verify_area+0x118/0x360 [ 431.446907] ? do_splice_direct+0x400/0x400 [ 431.451214] do_splice_to+0x12e/0x190 [ 431.455005] splice_direct_to_actor+0x268/0x8d0 [ 431.459663] ? pipe_to_sendpage+0x3f0/0x3f0 [ 431.463977] ? do_splice_to+0x190/0x190 [ 431.467937] ? rw_verify_area+0x118/0x360 [ 431.472069] do_splice_direct+0x2cc/0x400 [ 431.476204] ? splice_direct_to_actor+0x8d0/0x8d0 [ 431.481037] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 431.486557] ? __sb_start_write+0x17f/0x300 [ 431.490871] do_sendfile+0x60f/0xe00 [ 431.494574] ? do_compat_pwritev64+0x1b0/0x1b0 [ 431.499142] ? __might_sleep+0x95/0x190 [ 431.503103] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 431.508627] ? _copy_from_user+0xdf/0x150 [ 431.512761] __x64_sys_sendfile64+0x155/0x240 [ 431.517243] ? __ia32_sys_sendfile+0x290/0x290 [ 431.521813] ? do_syscall_64+0x92/0x800 [ 431.525774] do_syscall_64+0x1b1/0x800 [ 431.529646] ? finish_task_switch+0x1ca/0x840 [ 431.534128] ? syscall_return_slowpath+0x5c0/0x5c0 [ 431.539044] ? syscall_return_slowpath+0x30f/0x5c0 [ 431.543962] ? entry_SYSCALL_64_after_hwframe+0x59/0xbe [ 431.549311] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 431.554142] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 431.559311] RIP: 0033:0x455a09 [ 431.562490] RSP: 002b:00007ffbeaa32c68 EFLAGS: 00000246 ORIG_RAX: 0000000000000028 [ 431.570181] RAX: ffffffffffffffda RBX: 00007ffbeaa336d4 RCX: 0000000000455a09 [ 431.577435] RDX: 0000000020000000 RSI: 0000000000000013 RDI: 0000000000000013 [ 431.584687] RBP: 000000000072bea0 R08: 0000000000000000 R09: 0000000000000000 [ 431.592200] R10: 000000007fffffff R11: 0000000000000246 R12: 0000000000000014 [ 431.599450] R13: 0000000000000579 R14: 00000000006fc3f8 R15: 000000000000000d 2018/05/15 08:25:00 executing program 2: syz_emit_ethernet(0x3e, &(0x7f00000001c0)={@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, @dev={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa]}, [], {@ipv6={0x86dd, {0x0, 0x6, "50a09c", 0x8, 0x0, 0x0, @remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x2c00000000000000], 0xbb}, @local={0xfe, 0x80, [], 0xaa}, {[], @udp={0x0, 0x0, 0x8}}}}}}, &(0x7f0000000040)) [ 431.647421] FAT-fs (loop1): bogus number of reserved sectors [ 431.653308] FAT-fs (loop1): Can't find a valid FAT filesystem 2018/05/15 08:25:00 executing program 0: perf_event_open$cgroup(&(0x7f0000000240)={0x7, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000200)}, 0x0, 0x0, 0x0, 0x0, 0xdf, 0x9, 0x3}, 0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x8) 2018/05/15 08:25:00 executing program 3: syz_emit_ethernet(0x3e, &(0x7f00000001c0)={@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, @dev={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa]}, [], {@ipv6={0x86dd, {0x0, 0x6, "50a09c", 0x8, 0xffffff87, 0x0, @remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0xfeffffff], 0xbb}, @local={0xfe, 0x80, [], 0xaa}, {[], @udp={0x0, 0x0, 0x8}}}}}}, &(0x7f0000000040)) 2018/05/15 08:25:00 executing program 4: perf_event_open$cgroup(&(0x7f0000000240)={0x7, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x5, 0x6, @perf_bp={&(0x7f0000000200), 0x6}, 0x10202, 0x4, 0x4, 0x7, 0xdf, 0x9, 0x3}, 0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x8) 2018/05/15 08:25:00 executing program 6: syslog(0x2, &(0x7f0000000cc0)=""/107, 0x6b) setsockopt$inet_sctp_SCTP_STREAM_SCHEDULER(0xffffffffffffffff, 0x84, 0x7b, &(0x7f00000001c0), 0x8) 2018/05/15 08:25:00 executing program 7: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup(r0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000d40)=@broute={'broute\x00', 0x20, 0x4, 0x928, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000400], 0x0, &(0x7f0000000000), &(0x7f0000000400)=[{0x0, '\x00', 0x0, 0x0, 0x2, [{{{0x5, 0x7, 0x4, 'bcsh0\x00', 'sit0\x00', 'syzkaller1\x00', 'veth0\x00', @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [0xff, 0xff, 0xff, 0xff], @dev={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0x18}, [0xff, 0x0, 0x0, 0x0, 0x0, 0xff], 0x1d8, 0x228, 0x258, [@comment={'comment\x00', 0x100}, @owner={'owner\x00', 0x18, {{0x0, 0x0, 0x0, 0x0, 0x1, 0x1}}}]}, [@common=@LED={'LED\x00', 0x28, {{'syz0\x00', 0x1, 0x0, 0x800}}}]}, @common=@redirect={'redirect\x00', 0x8, {{0xfffffffffffffffe}}}}, {{{0x11, 0x4, 0x88e7, 'veth1_to_bond\x00', 'erspan0\x00', 'bridge_slave_1\x00', 'veth0_to_bridge\x00', @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [0xff, 0xff, 0x0, 0xff, 0x0, 0xff], @random="cfa071dc33d9", [0xff, 0xff, 0xff, 0xff, 0xff, 0xff], 0x2e0, 0x2e0, 0x330, [@mac={'mac\x00', 0x10, {{@remote={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xbb}, 0x1}}}, @bpf0={'bpf\x00', 0x210, {{0x20, [{0x8000, 0x4902, 0x5, 0x3ff}, {0x5, 0x8, 0x2, 0xff}, {0x1000, 0x48000000000, 0x3}, {0xf7, 0x1f, 0xfffffffffffffe00, 0x1}, {0x10000, 0xfc0, 0x1, 0x6}, {0x4, 0x2, 0xcefa, 0x81}, {0x815, 0xc7, 0x8001, 0x6a0}, {0x40, 0x0, 0x9, 0x80000001}, {0xffffffffffffff53, 0x38a, 0x100000000, 0x7}, {0x5, 0x1, 0x1000, 0x10001}, {0x80000000, 0x7, 0x1, 0xf7}, {0x2, 0x9, 0x4c, 0x5}, {0xfffffffffffffff7, 0x0, 0xe74, 0x52a}, {0x1ff, 0x7, 0x3, 0x7}, {0x6, 0x1ff, 0x49, 0x7}, {0x8000, 0x0, 0x7, 0x684}, {0xffe, 0x988, 0x3, 0x1}, {0x7b, 0x5a07, 0x18, 0x7}, {0xfffffffffffffffe, 0xfff, 0x3, 0x178180a0}, {0x2, 0xc0, 0x6, 0x401}, {0x5, 0x3, 0x8, 0x8}, {0xffffffffffff0001, 0x3, 0xfffffffffffffff7, 0x5}, {0x1ff, 0x8001, 0x3}, {0x3, 0x9, 0xffffffff, 0x2}, {0x5, 0x4, 0x574, 0x64c}, {0x5, 0x4, 0x10001, 0x6}, {0x1, 0x5b2c, 0x3ff, 0x7}, {0xff, 0x2, 0x5, 0x62c5fc18}, {0x101, 0x7, 0x2, 0xfffffffffffffffd}, {0x7fff, 0x6, 0x8, 0x4}, {0x9, 0x0, 0x7, 0xff}, {0x4, 0x4, 0x4, 0x10000}, {0x59b0, 0xfff, 0x4, 0x4}, {0x1f, 0xfffffffffffffffd, 0x8001, 0x800}, {0x0, 0xffffffffffffffff, 0x2, 0x65}, {0x1ff, 0x1, 0x2, 0x7ff}, {0x4, 0x5, 0x1, 0x7be}, {0x9e4, 0x0, 0x7, 0x5}, {0x5, 0x8, 0x7f, 0xffffffff}, {0x4, 0x6, 0x5, 0x7ff}, {0x22aaaf52, 0x8f, 0x6, 0x10000}, {0x2, 0x7, 0xffff}, {0x5, 0xfffffffff016eb50, 0x82, 0x7}, {0x38, 0x800, 0x9a2a, 0xfffffffffffffffc}, {0x5, 0xb, 0x4, 0xfffffffffffff001}, {0x8b5, 0x81, 0x4, 0x2}, {0x8, 0xfffffffffffffff8, 0x1, 0x8}, {0x40, 0x4, 0x1, 0x100000001}, {0x9b, 0x5, 0x1, 0xd64c}, {0x100, 0x8, 0x7, 0x3ff}, {0xf11, 0x200, 0x7, 0x2}, {0xac5, 0x0, 0x3, 0x7}, {0x518, 0x1, 0x80}, {0x6, 0x7f, 0x6, 0x7298}, {0x7, 0x1, 0x2, 0x1ec9}, {0x400, 0x2, 0x6, 0x6c3}, {0x100000001, 0x6, 0x5, 0x9}, {0x8, 0x1dae, 0xfffffffffffffff8, 0x101}, {0x2, 0x7, 0x8, 0x3}, {0x0, 0x45b, 0x7, 0x72}, {0x100000001, 0xc00000000000, 0x100000001, 0x8}, {0x100000001, 0x0, 0xfffffffffffffffc, 0x3}, {0x95, 0x90b, 0x0, 0xfffffffffffff565}, {0x0, 0x4, 0x0, 0x2}], 0x40}}}]}}, @common=@IDLETIMER={'IDLETIMER\x00', 0x28, {{0x7f, 'syz0\x00'}}}}]}, {0x0, '\x00', 0x2, 0xfffffffffffffffc}, {0x0, '\x00', 0x2, 0xffffffffffffffff, 0x2, [{{{0x11, 0x40, 0x87df, 'irlan0\x00', 'sit0\x00', 'veth0_to_team\x00', 'ip6gretap0\x00', @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [0xff, 0xff, 0xff, 0xff, 0x0, 0xff], @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [0x0, 0xff, 0x0, 0xff], 0xb0, 0x210, 0x258, [@time={'time\x00', 0x18, {{0x1ff, 0x1, 0xe063, 0xb6c5, 0x2e80, 0x0, 0x2}}}]}, [@common=@redirect={'redirect\x00', 0x8, {{0xffffffffffffffff}}}, @common=@SECMARK={'SECMARK\x00', 0x108, {{0x1, 0x6, 'system_u:object_r:lost_found_t:s0\x00'}}}]}, @common=@ERROR={'ERROR\x00', 0x20, {"4323eed968d7072e70de82f41331fe3aed2aedc8f2fff16e54b1c4e2ad07"}}}, {{{0x5, 0x54, 0x888d, 'ip6gretap0\x00', 'teql0\x00', 'veth1_to_team\x00', 'erspan0\x00', @random="0eae55d5aac5", [0x0, 0xff, 0x0, 0xff, 0xff, 0xff], @empty, [0xff, 0xff, 0xff, 0x0, 0xff, 0xff], 0x70, 0x70, 0xb8}}, @common=@RATEEST={'RATEEST\x00', 0x20, {{'syz0\x00', 0x9, 0x1, 0x4}}}}]}]}, 0x9a0) 2018/05/15 08:25:00 executing program 1: perf_event_open(&(0x7f0000000040)={0x1, 0x70}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f00000000c0)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000400), 0x0, &(0x7f0000000600)=ANY=[]) r0 = open(&(0x7f0000002000)='./bus\x00', 0x0, 0x0) fallocate(r0, 0x1, 0x0, 0x10000101) 2018/05/15 08:25:00 executing program 5 (fault-call:1 fault-nth:14): r0 = syz_open_procfs(0x0, &(0x7f0000000280)='net/ptype\x00') sendfile(r0, r0, &(0x7f0000000000)=0xffffffd, 0x7fffffff) [ 431.731345] FAULT_INJECTION: forcing a failure. [ 431.731345] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 431.740898] kernel msg: ebtables bug: please report to author: bad policy [ 431.743255] CPU: 1 PID: 14360 Comm: syz-executor5 Not tainted 4.17.0-rc5+ #51 [ 431.757396] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 431.766751] Call Trace: [ 431.769350] dump_stack+0x1b9/0x294 [ 431.772991] ? dump_stack_print_info.cold.2+0x52/0x52 [ 431.778189] ? find_held_lock+0x36/0x1c0 [ 431.782264] should_fail.cold.4+0xa/0x1a [ 431.786334] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 431.791446] ? graph_lock+0x170/0x170 [ 431.795616] ? kasan_check_read+0x11/0x20 [ 431.799770] ? rcu_bh_force_quiescent_state+0x20/0x20 [ 431.805003] ? find_held_lock+0x36/0x1c0 [ 431.809060] ? __lock_is_held+0xb5/0x140 [ 431.813115] ? check_same_owner+0x320/0x320 [ 431.817428] ? rcu_note_context_switch+0x710/0x710 [ 431.822343] ? __might_sleep+0x95/0x190 [ 431.826304] __alloc_pages_nodemask+0x34e/0xd70 [ 431.830973] ? default_file_splice_read+0x1c7/0xad0 [ 431.835974] ? do_splice_to+0x12e/0x190 [ 431.839930] ? splice_direct_to_actor+0x268/0x8d0 [ 431.844765] ? __alloc_pages_slowpath+0x2db0/0x2db0 [ 431.849765] ? __lock_is_held+0xb5/0x140 [ 431.853816] ? __lock_is_held+0xb5/0x140 [ 431.857867] ? rcu_read_lock_sched_held+0x108/0x120 [ 431.862868] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 431.868391] alloc_pages_current+0x10c/0x210 [ 431.872786] push_pipe+0x400/0x7a0 [ 431.876310] ? __kmalloc_node+0x47/0x70 [ 431.880272] iov_iter_get_pages_alloc+0x84a/0x14e0 [ 431.885187] ? rcu_is_watching+0x85/0x140 [ 431.889319] ? copy_page_to_iter+0xf30/0xf30 [ 431.893716] ? is_bpf_text_address+0xd7/0x170 [ 431.898197] ? kernel_text_address+0x79/0xf0 [ 431.902590] ? __unwind_start+0x166/0x330 [ 431.906724] ? unwind_get_return_address+0x61/0xa0 [ 431.911636] ? __save_stack_trace+0x7e/0xd0 [ 431.915950] ? print_usage_bug+0xc0/0xc0 [ 431.919996] ? save_stack+0xa9/0xd0 [ 431.923610] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 431.928609] ? iov_iter_pipe+0xc2/0x2f0 [ 431.932568] default_file_splice_read+0x1c7/0xad0 [ 431.937394] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 431.942749] ? print_usage_bug+0xc0/0xc0 [ 431.946800] ? do_splice_direct+0x400/0x400 [ 431.951104] ? debug_mutex_init+0x1c/0x60 [ 431.955244] ? trace_hardirqs_on_caller+0x421/0x5c0 [ 431.960243] ? __lockdep_init_map+0x105/0x590 [ 431.964721] ? lockdep_init_map+0x9/0x10 [ 431.968764] ? debug_mutex_init+0x2d/0x60 [ 431.972894] ? __mutex_init+0x1ef/0x280 [ 431.976851] ? __ia32_sys_membarrier+0x150/0x150 [ 431.981604] ? __lockdep_init_map+0x105/0x590 [ 431.986088] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 431.991607] ? fsnotify+0x415/0xfc0 [ 431.995218] ? fsnotify+0xfc0/0xfc0 [ 431.998828] ? fsnotify_first_mark+0x330/0x330 [ 432.003402] ? security_file_permission+0x1c6/0x240 [ 432.008410] ? rw_verify_area+0x118/0x360 [ 432.012547] ? do_splice_direct+0x400/0x400 [ 432.016860] do_splice_to+0x12e/0x190 [ 432.020647] splice_direct_to_actor+0x268/0x8d0 [ 432.025298] ? pipe_to_sendpage+0x3f0/0x3f0 [ 432.029615] ? do_splice_to+0x190/0x190 [ 432.033577] ? rw_verify_area+0x118/0x360 [ 432.037709] do_splice_direct+0x2cc/0x400 [ 432.041842] ? splice_direct_to_actor+0x8d0/0x8d0 [ 432.046677] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 432.052199] ? __sb_start_write+0x17f/0x300 [ 432.056505] do_sendfile+0x60f/0xe00 [ 432.060212] ? do_compat_pwritev64+0x1b0/0x1b0 [ 432.064779] ? __might_sleep+0x95/0x190 [ 432.068742] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 432.074265] ? _copy_from_user+0xdf/0x150 [ 432.078401] __x64_sys_sendfile64+0x155/0x240 [ 432.082886] ? __ia32_sys_sendfile+0x290/0x290 [ 432.087452] ? do_syscall_64+0x92/0x800 [ 432.091413] do_syscall_64+0x1b1/0x800 [ 432.095282] ? finish_task_switch+0x1ca/0x840 [ 432.099764] ? syscall_return_slowpath+0x5c0/0x5c0 [ 432.104677] ? syscall_return_slowpath+0x30f/0x5c0 [ 432.109593] ? entry_SYSCALL_64_after_hwframe+0x59/0xbe [ 432.114946] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 432.119776] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 432.124950] RIP: 0033:0x455a09 2018/05/15 08:25:01 executing program 2: syz_emit_ethernet(0x3e, &(0x7f00000001c0)={@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, @dev={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa]}, [], {@ipv6={0x86dd, {0x0, 0x6, "50a09c", 0x8, 0x0, 0x0, @remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x3f00000000000000], 0xbb}, @local={0xfe, 0x80, [], 0xaa}, {[], @udp={0x0, 0x0, 0x8}}}}}}, &(0x7f0000000040)) 2018/05/15 08:25:01 executing program 6: syslog(0x2, &(0x7f0000000cc0)=""/107, 0x6b) setsockopt$inet_sctp_SCTP_STREAM_SCHEDULER(0xffffffffffffffff, 0x84, 0x7b, &(0x7f00000001c0), 0x8) 2018/05/15 08:25:01 executing program 3: syz_emit_ethernet(0x3e, &(0x7f00000001c0)={@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, @dev={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa]}, [], {@ipv6={0x86dd, {0x0, 0x6, "50a09c", 0x8, 0xffffff87, 0x0, @remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0xffffa888], 0xbb}, @local={0xfe, 0x80, [], 0xaa}, {[], @udp={0x0, 0x0, 0x8}}}}}}, &(0x7f0000000040)) 2018/05/15 08:25:01 executing program 7: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup(r0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000d40)=@broute={'broute\x00', 0x20, 0x4, 0x6d0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000400], 0x0, &(0x7f0000000000), &(0x7f0000000400)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x11, 0x4, 0x88e7, 'veth1_to_bond\x00', 'erspan0\x00', 'bridge_slave_1\x00', 'veth0_to_bridge\x00', @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [0xff, 0xff, 0x0, 0xff, 0x0, 0xff], @random="cfa071dc33d9", [0xff, 0xff, 0xff, 0xff, 0xff, 0xff], 0x2e0, 0x2e0, 0x330, [@mac={'mac\x00', 0x10, {{@remote={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xbb}, 0x1}}}, @bpf0={'bpf\x00', 0x210, {{0x20, [{0x8000, 0x4902, 0x5, 0x3ff}, {0x5, 0x8, 0x2, 0xff}, {0x1000, 0x48000000000, 0x3}, {0xf7, 0x1f, 0xfffffffffffffe00, 0x1}, {0x10000, 0xfc0, 0x1, 0x6}, {0x4, 0x2, 0xcefa, 0x81}, {0x815, 0xc7, 0x8001, 0x6a0}, {0x40, 0x0, 0x9, 0x80000001}, {0xffffffffffffff53, 0x38a, 0x100000000, 0x7}, {0x5, 0x1, 0x1000, 0x10001}, {0x80000000, 0x7, 0x1, 0xf7}, {0x2, 0x9, 0x4c, 0x5}, {0xfffffffffffffff7, 0x0, 0xe74, 0x52a}, {0x1ff, 0x7, 0x3, 0x7}, {0x6, 0x1ff, 0x49, 0x7}, {0x8000, 0x0, 0x7, 0x684}, {0xffe, 0x988, 0x3, 0x1}, {0x7b, 0x5a07, 0x18, 0x7}, {0xfffffffffffffffe, 0xfff, 0x3, 0x178180a0}, {0x2, 0xc0, 0x6, 0x401}, {0x5, 0x3, 0x8, 0x8}, {0xffffffffffff0001, 0x3, 0xfffffffffffffff7, 0x5}, {0x1ff, 0x8001, 0x3}, {0x3, 0x9, 0xffffffff, 0x2}, {0x5, 0x4, 0x574, 0x64c}, {0x5, 0x4, 0x10001, 0x6}, {0x1, 0x5b2c, 0x3ff, 0x7}, {0xff, 0x2, 0x5, 0x62c5fc18}, {0x101, 0x7, 0x2, 0xfffffffffffffffd}, {0x7fff, 0x6, 0x8, 0x4}, {0x9, 0x0, 0x7, 0xff}, {0x4, 0x4, 0x4, 0x10000}, {0x59b0, 0xfff, 0x4, 0x4}, {0x1f, 0xfffffffffffffffd, 0x8001, 0x800}, {0x0, 0xffffffffffffffff, 0x2, 0x65}, {0x1ff, 0x1, 0x2, 0x7ff}, {0x4, 0x5, 0x1, 0x7be}, {0x9e4, 0x0, 0x7, 0x5}, {0x5, 0x8, 0x7f, 0xffffffff}, {0x4, 0x6, 0x5, 0x7ff}, {0x22aaaf52, 0x8f, 0x6, 0x10000}, {0x2, 0x7, 0xffff}, {0x5, 0xfffffffff016eb50, 0x82, 0x7}, {0x38, 0x800, 0x9a2a, 0xfffffffffffffffc}, {0x5, 0xb, 0x4, 0xfffffffffffff001}, {0x8b5, 0x81, 0x4, 0x2}, {0x8, 0xfffffffffffffff8, 0x1, 0x8}, {0x40, 0x4, 0x1, 0x100000001}, {0x9b, 0x5, 0x1, 0xd64c}, {0x100, 0x8, 0x7, 0x3ff}, {0xf11, 0x200, 0x7, 0x2}, {0xac5, 0x0, 0x3, 0x7}, {0x518, 0x1, 0x80}, {0x6, 0x7f, 0x6, 0x7298}, {0x7, 0x1, 0x2, 0x1ec9}, {0x400, 0x2, 0x6, 0x6c3}, {0x100000001, 0x6, 0x5, 0x9}, {0x8, 0x1dae, 0xfffffffffffffff8, 0x101}, {0x2, 0x7, 0x8, 0x3}, {0x0, 0x45b, 0x7, 0x72}, {0x100000001, 0xc00000000000, 0x100000001, 0x8}, {0x100000001, 0x0, 0xfffffffffffffffc, 0x3}, {0x95, 0x90b, 0x0, 0xfffffffffffff565}, {0x0, 0x4, 0x0, 0x2}], 0x40}}}]}}, @common=@IDLETIMER={'IDLETIMER\x00', 0x28, {{0x7f, 'syz0\x00'}}}}]}, {0x0, '\x00', 0x2, 0xfffffffffffffffc}, {0x0, '\x00', 0x2, 0xffffffffffffffff, 0x2, [{{{0x11, 0x40, 0x87df, 'irlan0\x00', 'sit0\x00', 'veth0_to_team\x00', 'ip6gretap0\x00', @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [0xff, 0xff, 0xff, 0xff, 0x0, 0xff], @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [0x0, 0xff, 0x0, 0xff], 0xb0, 0x210, 0x258, [@time={'time\x00', 0x18, {{0x1ff, 0x1, 0xe063, 0xb6c5, 0x2e80, 0x0, 0x2}}}]}, [@common=@redirect={'redirect\x00', 0x8, {{0xffffffffffffffff}}}, @common=@SECMARK={'SECMARK\x00', 0x108, {{0x1, 0x6, 'system_u:object_r:lost_found_t:s0\x00'}}}]}, @common=@ERROR={'ERROR\x00', 0x20, {"4323eed968d7072e70de82f41331fe3aed2aedc8f2fff16e54b1c4e2ad07"}}}, {{{0x5, 0x54, 0x888d, 'ip6gretap0\x00', 'teql0\x00', 'veth1_to_team\x00', 'erspan0\x00', @random="0eae55d5aac5", [0x0, 0xff, 0x0, 0xff, 0xff, 0xff], @empty, [0xff, 0xff, 0xff, 0x0, 0xff, 0xff], 0x70, 0x70, 0xb8}}, @common=@RATEEST={'RATEEST\x00', 0x20, {{'syz0\x00', 0x9, 0x1, 0x4}}}}]}]}, 0x9a0) [ 432.128123] RSP: 002b:00007ffbeaa32c68 EFLAGS: 00000246 ORIG_RAX: 0000000000000028 [ 432.135816] RAX: ffffffffffffffda RBX: 00007ffbeaa336d4 RCX: 0000000000455a09 [ 432.143069] RDX: 0000000020000000 RSI: 0000000000000013 RDI: 0000000000000013 [ 432.150319] RBP: 000000000072bea0 R08: 0000000000000000 R09: 0000000000000000 [ 432.157569] R10: 000000007fffffff R11: 0000000000000246 R12: 0000000000000014 [ 432.164819] R13: 0000000000000579 R14: 00000000006fc3f8 R15: 000000000000000e 2018/05/15 08:25:01 executing program 0: perf_event_open$cgroup(&(0x7f0000000240)={0x7, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000200)}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x3}, 0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x8) 2018/05/15 08:25:01 executing program 6: syslog(0x2, &(0x7f0000000cc0)=""/107, 0x6b) setsockopt$inet_sctp_SCTP_STREAM_SCHEDULER(0xffffffffffffffff, 0x84, 0x7b, &(0x7f00000001c0), 0x8) 2018/05/15 08:25:01 executing program 4: perf_event_open$cgroup(&(0x7f0000000240)={0x7, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x5, 0x6, @perf_bp={&(0x7f0000000200), 0x6}, 0x10202, 0x4, 0x4, 0x7, 0xdf, 0x9, 0x3}, 0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x8) 2018/05/15 08:25:01 executing program 3: syz_emit_ethernet(0x3e, &(0x7f00000001c0)={@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, @dev={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa]}, [], {@ipv6={0x86dd, {0x0, 0x6, "50a09c", 0x8, 0xffffff87, 0x0, @remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x8847000000000000], 0xbb}, @local={0xfe, 0x80, [], 0xaa}, {[], @udp={0x0, 0x0, 0x8}}}}}}, &(0x7f0000000040)) [ 432.228131] FAT-fs (loop1): bogus number of reserved sectors [ 432.234082] FAT-fs (loop1): Can't find a valid FAT filesystem [ 432.266398] kernel msg: ebtables bug: please report to author: Wrong len argument 2018/05/15 08:25:01 executing program 0: perf_event_open$cgroup(&(0x7f0000000240)={0x7, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000200)}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x8) 2018/05/15 08:25:01 executing program 1: perf_event_open(&(0x7f0000000040)={0x1, 0x70}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f00000000c0)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000400), 0x0, &(0x7f0000000600)=ANY=[]) r0 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) fallocate(0xffffffffffffffff, 0x1, 0x0, 0x10000101) 2018/05/15 08:25:01 executing program 4: perf_event_open$cgroup(&(0x7f0000000240)={0x7, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x5, 0x0, 0x0, 0x6, @perf_bp={&(0x7f0000000200), 0x6}, 0x10202, 0x4, 0x4, 0x7, 0xdf, 0x9, 0x3}, 0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x8) 2018/05/15 08:25:01 executing program 5 (fault-call:1 fault-nth:15): r0 = syz_open_procfs(0x0, &(0x7f0000000280)='net/ptype\x00') sendfile(r0, r0, &(0x7f0000000000)=0xffffffd, 0x7fffffff) 2018/05/15 08:25:01 executing program 7: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup(r0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000d40)=@broute={'broute\x00', 0x20, 0x4, 0x6d0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000400], 0x0, &(0x7f0000000000), &(0x7f0000000400)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x11, 0x4, 0x88e7, 'veth1_to_bond\x00', 'erspan0\x00', 'bridge_slave_1\x00', 'veth0_to_bridge\x00', @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [0xff, 0xff, 0x0, 0xff, 0x0, 0xff], @random="cfa071dc33d9", [0xff, 0xff, 0xff, 0xff, 0xff, 0xff], 0x2e0, 0x2e0, 0x330, [@mac={'mac\x00', 0x10, {{@remote={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xbb}, 0x1}}}, @bpf0={'bpf\x00', 0x210, {{0x20, [{0x8000, 0x4902, 0x5, 0x3ff}, {0x5, 0x8, 0x2, 0xff}, {0x1000, 0x48000000000, 0x3}, {0xf7, 0x1f, 0xfffffffffffffe00, 0x1}, {0x10000, 0xfc0, 0x1, 0x6}, {0x4, 0x2, 0xcefa, 0x81}, {0x815, 0xc7, 0x8001, 0x6a0}, {0x40, 0x0, 0x9, 0x80000001}, {0xffffffffffffff53, 0x38a, 0x100000000, 0x7}, {0x5, 0x1, 0x1000, 0x10001}, {0x80000000, 0x7, 0x1, 0xf7}, {0x2, 0x9, 0x4c, 0x5}, {0xfffffffffffffff7, 0x0, 0xe74, 0x52a}, {0x1ff, 0x7, 0x3, 0x7}, {0x6, 0x1ff, 0x49, 0x7}, {0x8000, 0x0, 0x7, 0x684}, {0xffe, 0x988, 0x3, 0x1}, {0x7b, 0x5a07, 0x18, 0x7}, {0xfffffffffffffffe, 0xfff, 0x3, 0x178180a0}, {0x2, 0xc0, 0x6, 0x401}, {0x5, 0x3, 0x8, 0x8}, {0xffffffffffff0001, 0x3, 0xfffffffffffffff7, 0x5}, {0x1ff, 0x8001, 0x3}, {0x3, 0x9, 0xffffffff, 0x2}, {0x5, 0x4, 0x574, 0x64c}, {0x5, 0x4, 0x10001, 0x6}, {0x1, 0x5b2c, 0x3ff, 0x7}, {0xff, 0x2, 0x5, 0x62c5fc18}, {0x101, 0x7, 0x2, 0xfffffffffffffffd}, {0x7fff, 0x6, 0x8, 0x4}, {0x9, 0x0, 0x7, 0xff}, {0x4, 0x4, 0x4, 0x10000}, {0x59b0, 0xfff, 0x4, 0x4}, {0x1f, 0xfffffffffffffffd, 0x8001, 0x800}, {0x0, 0xffffffffffffffff, 0x2, 0x65}, {0x1ff, 0x1, 0x2, 0x7ff}, {0x4, 0x5, 0x1, 0x7be}, {0x9e4, 0x0, 0x7, 0x5}, {0x5, 0x8, 0x7f, 0xffffffff}, {0x4, 0x6, 0x5, 0x7ff}, {0x22aaaf52, 0x8f, 0x6, 0x10000}, {0x2, 0x7, 0xffff}, {0x5, 0xfffffffff016eb50, 0x82, 0x7}, {0x38, 0x800, 0x9a2a, 0xfffffffffffffffc}, {0x5, 0xb, 0x4, 0xfffffffffffff001}, {0x8b5, 0x81, 0x4, 0x2}, {0x8, 0xfffffffffffffff8, 0x1, 0x8}, {0x40, 0x4, 0x1, 0x100000001}, {0x9b, 0x5, 0x1, 0xd64c}, {0x100, 0x8, 0x7, 0x3ff}, {0xf11, 0x200, 0x7, 0x2}, {0xac5, 0x0, 0x3, 0x7}, {0x518, 0x1, 0x80}, {0x6, 0x7f, 0x6, 0x7298}, {0x7, 0x1, 0x2, 0x1ec9}, {0x400, 0x2, 0x6, 0x6c3}, {0x100000001, 0x6, 0x5, 0x9}, {0x8, 0x1dae, 0xfffffffffffffff8, 0x101}, {0x2, 0x7, 0x8, 0x3}, {0x0, 0x45b, 0x7, 0x72}, {0x100000001, 0xc00000000000, 0x100000001, 0x8}, {0x100000001, 0x0, 0xfffffffffffffffc, 0x3}, {0x95, 0x90b, 0x0, 0xfffffffffffff565}, {0x0, 0x4, 0x0, 0x2}], 0x40}}}]}}, @common=@IDLETIMER={'IDLETIMER\x00', 0x28, {{0x7f, 'syz0\x00'}}}}]}, {0x0, '\x00', 0x2, 0xfffffffffffffffc}, {0x0, '\x00', 0x2, 0xffffffffffffffff, 0x2, [{{{0x11, 0x40, 0x87df, 'irlan0\x00', 'sit0\x00', 'veth0_to_team\x00', 'ip6gretap0\x00', @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [0xff, 0xff, 0xff, 0xff, 0x0, 0xff], @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [0x0, 0xff, 0x0, 0xff], 0xb0, 0x210, 0x258, [@time={'time\x00', 0x18, {{0x1ff, 0x1, 0xe063, 0xb6c5, 0x2e80, 0x0, 0x2}}}]}, [@common=@redirect={'redirect\x00', 0x8, {{0xffffffffffffffff}}}, @common=@SECMARK={'SECMARK\x00', 0x108, {{0x1, 0x6, 'system_u:object_r:lost_found_t:s0\x00'}}}]}, @common=@ERROR={'ERROR\x00', 0x20, {"4323eed968d7072e70de82f41331fe3aed2aedc8f2fff16e54b1c4e2ad07"}}}, {{{0x5, 0x54, 0x888d, 'ip6gretap0\x00', 'teql0\x00', 'veth1_to_team\x00', 'erspan0\x00', @random="0eae55d5aac5", [0x0, 0xff, 0x0, 0xff, 0xff, 0xff], @empty, [0xff, 0xff, 0xff, 0x0, 0xff, 0xff], 0x70, 0x70, 0xb8}}, @common=@RATEEST={'RATEEST\x00', 0x20, {{'syz0\x00', 0x9, 0x1, 0x4}}}}]}]}, 0x9a0) 2018/05/15 08:25:01 executing program 3: syz_emit_ethernet(0x3e, &(0x7f00000001c0)={@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, @dev={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa]}, [], {@ipv6={0x86dd, {0x0, 0x6, "50a09c", 0x8, 0xffffff87, 0x0, @remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x8060000], 0xbb}, @local={0xfe, 0x80, [], 0xaa}, {[], @udp={0x0, 0x0, 0x8}}}}}}, &(0x7f0000000040)) 2018/05/15 08:25:01 executing program 0: perf_event_open$cgroup(&(0x7f0000000240)={0x7, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000200)}}, 0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x8) [ 432.466840] kernel msg: ebtables bug: please report to author: Wrong len argument 2018/05/15 08:25:01 executing program 4: perf_event_open$cgroup(&(0x7f0000000240)={0x7, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000200), 0x6}, 0x10202, 0x4, 0x4, 0x7, 0xdf, 0x9, 0x3}, 0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x8) [ 432.512825] FAT-fs (loop1): bogus number of reserved sectors [ 432.518828] FAT-fs (loop1): Can't find a valid FAT filesystem [ 432.661339] FAULT_INJECTION: forcing a failure. [ 432.661339] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 432.673307] CPU: 0 PID: 14421 Comm: syz-executor5 Not tainted 4.17.0-rc5+ #51 [ 432.680610] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 432.689963] Call Trace: [ 432.692562] dump_stack+0x1b9/0x294 [ 432.696203] ? dump_stack_print_info.cold.2+0x52/0x52 [ 432.701403] ? find_held_lock+0x36/0x1c0 [ 432.705478] should_fail.cold.4+0xa/0x1a [ 432.709551] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 432.714662] ? graph_lock+0x170/0x170 [ 432.718476] ? kasan_check_read+0x11/0x20 [ 432.722631] ? rcu_bh_force_quiescent_state+0x20/0x20 [ 432.727829] ? find_held_lock+0x36/0x1c0 [ 432.731902] ? __lock_is_held+0xb5/0x140 [ 432.735988] ? check_same_owner+0x320/0x320 [ 432.740320] ? rcu_note_context_switch+0x710/0x710 [ 432.745268] ? __might_sleep+0x95/0x190 [ 432.749254] __alloc_pages_nodemask+0x34e/0xd70 [ 432.753931] ? default_file_splice_read+0x1c7/0xad0 2018/05/15 08:25:01 executing program 2: syz_emit_ethernet(0x3e, &(0x7f00000001c0)={@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, @dev={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa]}, [], {@ipv6={0x86dd, {0x0, 0x6, "50a09c", 0x8, 0x0, 0x0, @remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0xffffdd86], 0xbb}, @local={0xfe, 0x80, [], 0xaa}, {[], @udp={0x0, 0x0, 0x8}}}}}}, &(0x7f0000000040)) 2018/05/15 08:25:01 executing program 7: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup(r0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000d40)=@broute={'broute\x00', 0x20, 0x4, 0x6d0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000400], 0x0, &(0x7f0000000000), &(0x7f0000000400)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x11, 0x4, 0x88e7, 'veth1_to_bond\x00', 'erspan0\x00', 'bridge_slave_1\x00', 'veth0_to_bridge\x00', @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [0xff, 0xff, 0x0, 0xff, 0x0, 0xff], @random="cfa071dc33d9", [0xff, 0xff, 0xff, 0xff, 0xff, 0xff], 0x2e0, 0x2e0, 0x330, [@mac={'mac\x00', 0x10, {{@remote={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xbb}, 0x1}}}, @bpf0={'bpf\x00', 0x210, {{0x20, [{0x8000, 0x4902, 0x5, 0x3ff}, {0x5, 0x8, 0x2, 0xff}, {0x1000, 0x48000000000, 0x3}, {0xf7, 0x1f, 0xfffffffffffffe00, 0x1}, {0x10000, 0xfc0, 0x1, 0x6}, {0x4, 0x2, 0xcefa, 0x81}, {0x815, 0xc7, 0x8001, 0x6a0}, {0x40, 0x0, 0x9, 0x80000001}, {0xffffffffffffff53, 0x38a, 0x100000000, 0x7}, {0x5, 0x1, 0x1000, 0x10001}, {0x80000000, 0x7, 0x1, 0xf7}, {0x2, 0x9, 0x4c, 0x5}, {0xfffffffffffffff7, 0x0, 0xe74, 0x52a}, {0x1ff, 0x7, 0x3, 0x7}, {0x6, 0x1ff, 0x49, 0x7}, {0x8000, 0x0, 0x7, 0x684}, {0xffe, 0x988, 0x3, 0x1}, {0x7b, 0x5a07, 0x18, 0x7}, {0xfffffffffffffffe, 0xfff, 0x3, 0x178180a0}, {0x2, 0xc0, 0x6, 0x401}, {0x5, 0x3, 0x8, 0x8}, {0xffffffffffff0001, 0x3, 0xfffffffffffffff7, 0x5}, {0x1ff, 0x8001, 0x3}, {0x3, 0x9, 0xffffffff, 0x2}, {0x5, 0x4, 0x574, 0x64c}, {0x5, 0x4, 0x10001, 0x6}, {0x1, 0x5b2c, 0x3ff, 0x7}, {0xff, 0x2, 0x5, 0x62c5fc18}, {0x101, 0x7, 0x2, 0xfffffffffffffffd}, {0x7fff, 0x6, 0x8, 0x4}, {0x9, 0x0, 0x7, 0xff}, {0x4, 0x4, 0x4, 0x10000}, {0x59b0, 0xfff, 0x4, 0x4}, {0x1f, 0xfffffffffffffffd, 0x8001, 0x800}, {0x0, 0xffffffffffffffff, 0x2, 0x65}, {0x1ff, 0x1, 0x2, 0x7ff}, {0x4, 0x5, 0x1, 0x7be}, {0x9e4, 0x0, 0x7, 0x5}, {0x5, 0x8, 0x7f, 0xffffffff}, {0x4, 0x6, 0x5, 0x7ff}, {0x22aaaf52, 0x8f, 0x6, 0x10000}, {0x2, 0x7, 0xffff}, {0x5, 0xfffffffff016eb50, 0x82, 0x7}, {0x38, 0x800, 0x9a2a, 0xfffffffffffffffc}, {0x5, 0xb, 0x4, 0xfffffffffffff001}, {0x8b5, 0x81, 0x4, 0x2}, {0x8, 0xfffffffffffffff8, 0x1, 0x8}, {0x40, 0x4, 0x1, 0x100000001}, {0x9b, 0x5, 0x1, 0xd64c}, {0x100, 0x8, 0x7, 0x3ff}, {0xf11, 0x200, 0x7, 0x2}, {0xac5, 0x0, 0x3, 0x7}, {0x518, 0x1, 0x80}, {0x6, 0x7f, 0x6, 0x7298}, {0x7, 0x1, 0x2, 0x1ec9}, {0x400, 0x2, 0x6, 0x6c3}, {0x100000001, 0x6, 0x5, 0x9}, {0x8, 0x1dae, 0xfffffffffffffff8, 0x101}, {0x2, 0x7, 0x8, 0x3}, {0x0, 0x45b, 0x7, 0x72}, {0x100000001, 0xc00000000000, 0x100000001, 0x8}, {0x100000001, 0x0, 0xfffffffffffffffc, 0x3}, {0x95, 0x90b, 0x0, 0xfffffffffffff565}, {0x0, 0x4, 0x0, 0x2}], 0x40}}}]}}, @common=@IDLETIMER={'IDLETIMER\x00', 0x28, {{0x7f, 'syz0\x00'}}}}]}, {0x0, '\x00', 0x2, 0xfffffffffffffffc}, {0x0, '\x00', 0x2, 0xffffffffffffffff, 0x2, [{{{0x11, 0x40, 0x87df, 'irlan0\x00', 'sit0\x00', 'veth0_to_team\x00', 'ip6gretap0\x00', @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [0xff, 0xff, 0xff, 0xff, 0x0, 0xff], @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [0x0, 0xff, 0x0, 0xff], 0xb0, 0x210, 0x258, [@time={'time\x00', 0x18, {{0x1ff, 0x1, 0xe063, 0xb6c5, 0x2e80, 0x0, 0x2}}}]}, [@common=@redirect={'redirect\x00', 0x8, {{0xffffffffffffffff}}}, @common=@SECMARK={'SECMARK\x00', 0x108, {{0x1, 0x6, 'system_u:object_r:lost_found_t:s0\x00'}}}]}, @common=@ERROR={'ERROR\x00', 0x20, {"4323eed968d7072e70de82f41331fe3aed2aedc8f2fff16e54b1c4e2ad07"}}}, {{{0x5, 0x54, 0x888d, 'ip6gretap0\x00', 'teql0\x00', 'veth1_to_team\x00', 'erspan0\x00', @random="0eae55d5aac5", [0x0, 0xff, 0x0, 0xff, 0xff, 0xff], @empty, [0xff, 0xff, 0xff, 0x0, 0xff, 0xff], 0x70, 0x70, 0xb8}}, @common=@RATEEST={'RATEEST\x00', 0x20, {{'syz0\x00', 0x9, 0x1, 0x4}}}}]}]}, 0x9a0) 2018/05/15 08:25:01 executing program 3: syz_emit_ethernet(0x3e, &(0x7f00000001c0)={@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, @dev={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa]}, [], {@ipv6={0x86dd, {0x0, 0x6, "50a09c", 0x8, 0xffffff87, 0x0, @remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x7], 0xbb}, @local={0xfe, 0x80, [], 0xaa}, {[], @udp={0x0, 0x0, 0x8}}}}}}, &(0x7f0000000040)) 2018/05/15 08:25:01 executing program 1: perf_event_open(&(0x7f0000000040)={0x1, 0x70}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f00000000c0)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000400), 0x0, &(0x7f0000000600)=ANY=[]) r0 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) fallocate(r0, 0x0, 0x0, 0x10000101) 2018/05/15 08:25:01 executing program 0: perf_event_open$cgroup(&(0x7f0000000240)={0x7, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000200)}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x8) [ 432.758953] ? do_splice_to+0x12e/0x190 [ 432.762937] ? splice_direct_to_actor+0x268/0x8d0 [ 432.767792] ? __alloc_pages_slowpath+0x2db0/0x2db0 [ 432.772815] ? __lock_is_held+0xb5/0x140 [ 432.776891] ? __lock_is_held+0xb5/0x140 [ 432.780970] ? rcu_read_lock_sched_held+0x108/0x120 [ 432.785998] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 432.791554] alloc_pages_current+0x10c/0x210 [ 432.795973] push_pipe+0x400/0x7a0 [ 432.799522] ? __kmalloc_node+0x47/0x70 [ 432.803509] iov_iter_get_pages_alloc+0x84a/0x14e0 [ 432.808449] ? rcu_is_watching+0x85/0x140 [ 432.812607] ? copy_page_to_iter+0xf30/0xf30 [ 432.817035] ? is_bpf_text_address+0xd7/0x170 [ 432.821543] ? kernel_text_address+0x79/0xf0 [ 432.822383] FAT-fs (loop1): bogus number of reserved sectors [ 432.826011] ? __unwind_start+0x166/0x330 [ 432.826036] ? unwind_get_return_address+0x61/0xa0 [ 432.826055] ? __save_stack_trace+0x7e/0xd0 [ 432.826082] ? print_usage_bug+0xc0/0xc0 [ 432.826096] ? save_stack+0xa9/0xd0 [ 432.826114] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 432.831942] FAT-fs (loop1): Can't find a valid FAT filesystem [ 432.836056] ? iov_iter_pipe+0xc2/0x2f0 [ 432.836075] default_file_splice_read+0x1c7/0xad0 [ 432.836091] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 432.836105] ? print_usage_bug+0xc0/0xc0 [ 432.836126] ? do_splice_direct+0x400/0x400 [ 432.836142] ? debug_mutex_init+0x1c/0x60 [ 432.849074] kernel msg: ebtables bug: please report to author: Wrong len argument [ 432.849414] ? trace_hardirqs_on_caller+0x421/0x5c0 [ 432.903105] ? __lockdep_init_map+0x105/0x590 [ 432.907607] ? lockdep_init_map+0x9/0x10 [ 432.911671] ? debug_mutex_init+0x2d/0x60 [ 432.915833] ? __mutex_init+0x1ef/0x280 [ 432.919814] ? __ia32_sys_membarrier+0x150/0x150 [ 432.924576] ? __lockdep_init_map+0x105/0x590 [ 432.929083] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 432.934622] ? fsnotify+0x415/0xfc0 [ 432.938257] ? fsnotify+0xfc0/0xfc0 [ 432.941871] ? fsnotify_first_mark+0x330/0x330 [ 432.946443] ? security_file_permission+0x1c6/0x240 [ 432.951441] ? rw_verify_area+0x118/0x360 [ 432.955574] ? do_splice_direct+0x400/0x400 [ 432.959878] do_splice_to+0x12e/0x190 [ 432.963664] splice_direct_to_actor+0x268/0x8d0 [ 432.968324] ? pipe_to_sendpage+0x3f0/0x3f0 [ 432.972642] ? do_splice_to+0x190/0x190 [ 432.976598] ? rw_verify_area+0x118/0x360 [ 432.980729] do_splice_direct+0x2cc/0x400 [ 432.984859] ? splice_direct_to_actor+0x8d0/0x8d0 [ 432.989688] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 432.995206] ? __sb_start_write+0x17f/0x300 [ 432.999684] do_sendfile+0x60f/0xe00 [ 433.003387] ? do_compat_pwritev64+0x1b0/0x1b0 [ 433.007966] ? __might_sleep+0x95/0x190 [ 433.011940] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 433.017460] ? _copy_from_user+0xdf/0x150 [ 433.021603] __x64_sys_sendfile64+0x155/0x240 [ 433.026091] ? __ia32_sys_sendfile+0x290/0x290 [ 433.030654] ? do_syscall_64+0x92/0x800 [ 433.034613] do_syscall_64+0x1b1/0x800 [ 433.038479] ? finish_task_switch+0x1ca/0x840 [ 433.042959] ? syscall_return_slowpath+0x5c0/0x5c0 [ 433.047869] ? syscall_return_slowpath+0x30f/0x5c0 [ 433.052789] ? entry_SYSCALL_64_after_hwframe+0x59/0xbe [ 433.058143] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 433.062979] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 433.068149] RIP: 0033:0x455a09 [ 433.071324] RSP: 002b:00007ffbeaa32c68 EFLAGS: 00000246 ORIG_RAX: 0000000000000028 [ 433.079038] RAX: ffffffffffffffda RBX: 00007ffbeaa336d4 RCX: 0000000000455a09 [ 433.086298] RDX: 0000000020000000 RSI: 0000000000000013 RDI: 0000000000000013 [ 433.093547] RBP: 000000000072bea0 R08: 0000000000000000 R09: 0000000000000000 [ 433.100797] R10: 000000007fffffff R11: 0000000000000246 R12: 0000000000000014 [ 433.108051] R13: 0000000000000579 R14: 00000000006fc3f8 R15: 000000000000000f 2018/05/15 08:25:02 executing program 6: syslog(0x2, &(0x7f0000000cc0)=""/107, 0x6b) setsockopt$inet_sctp_SCTP_STREAM_SCHEDULER(0xffffffffffffffff, 0x84, 0x7b, &(0x7f00000001c0), 0x8) 2018/05/15 08:25:02 executing program 7: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup(r0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000d40)=@broute={'broute\x00', 0x20, 0x4, 0x928, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000400], 0x0, &(0x7f0000000000), &(0x7f0000000400)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x2, [{{{0x0, 0x7, 0x4, 'bcsh0\x00', 'sit0\x00', 'syzkaller1\x00', 'veth0\x00', @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [0xff, 0xff, 0xff, 0xff], @dev={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0x18}, [0xff, 0x0, 0x0, 0x0, 0x0, 0xff], 0x1d8, 0x228, 0x258, [@comment={'comment\x00', 0x100}, @owner={'owner\x00', 0x18, {{0x0, 0x0, 0x0, 0x0, 0x1, 0x1}}}]}, [@common=@LED={'LED\x00', 0x28, {{'syz0\x00', 0x1, 0x0, 0x800}}}]}, @common=@redirect={'redirect\x00', 0x8, {{0xfffffffffffffffe}}}}, {{{0x11, 0x4, 0x88e7, 'veth1_to_bond\x00', 'erspan0\x00', 'bridge_slave_1\x00', 'veth0_to_bridge\x00', @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [0xff, 0xff, 0x0, 0xff, 0x0, 0xff], @random="cfa071dc33d9", [0xff, 0xff, 0xff, 0xff, 0xff, 0xff], 0x2e0, 0x2e0, 0x330, [@mac={'mac\x00', 0x10, {{@remote={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xbb}, 0x1}}}, @bpf0={'bpf\x00', 0x210, {{0x20, [{0x8000, 0x4902, 0x5, 0x3ff}, {0x5, 0x8, 0x2, 0xff}, {0x1000, 0x48000000000, 0x3}, {0xf7, 0x1f, 0xfffffffffffffe00, 0x1}, {0x10000, 0xfc0, 0x1, 0x6}, {0x4, 0x2, 0xcefa, 0x81}, {0x815, 0xc7, 0x8001, 0x6a0}, {0x40, 0x0, 0x9, 0x80000001}, {0xffffffffffffff53, 0x38a, 0x100000000, 0x7}, {0x5, 0x1, 0x1000, 0x10001}, {0x80000000, 0x7, 0x1, 0xf7}, {0x2, 0x9, 0x4c, 0x5}, {0xfffffffffffffff7, 0x0, 0xe74, 0x52a}, {0x1ff, 0x7, 0x3, 0x7}, {0x6, 0x1ff, 0x49, 0x7}, {0x8000, 0x0, 0x7, 0x684}, {0xffe, 0x988, 0x3, 0x1}, {0x7b, 0x5a07, 0x18, 0x7}, {0xfffffffffffffffe, 0xfff, 0x3, 0x178180a0}, {0x2, 0xc0, 0x6, 0x401}, {0x5, 0x3, 0x8, 0x8}, {0xffffffffffff0001, 0x3, 0xfffffffffffffff7, 0x5}, {0x1ff, 0x8001, 0x3}, {0x3, 0x9, 0xffffffff, 0x2}, {0x5, 0x4, 0x574, 0x64c}, {0x5, 0x4, 0x10001, 0x6}, {0x1, 0x5b2c, 0x3ff, 0x7}, {0xff, 0x2, 0x5, 0x62c5fc18}, {0x101, 0x7, 0x2, 0xfffffffffffffffd}, {0x7fff, 0x6, 0x8, 0x4}, {0x9, 0x0, 0x7, 0xff}, {0x4, 0x4, 0x4, 0x10000}, {0x59b0, 0xfff, 0x4, 0x4}, {0x1f, 0xfffffffffffffffd, 0x8001, 0x800}, {0x0, 0xffffffffffffffff, 0x2, 0x65}, {0x1ff, 0x1, 0x2, 0x7ff}, {0x4, 0x5, 0x1, 0x7be}, {0x9e4, 0x0, 0x7, 0x5}, {0x5, 0x8, 0x7f, 0xffffffff}, {0x4, 0x6, 0x5, 0x7ff}, {0x22aaaf52, 0x8f, 0x6, 0x10000}, {0x2, 0x7, 0xffff}, {0x5, 0xfffffffff016eb50, 0x82, 0x7}, {0x38, 0x800, 0x9a2a, 0xfffffffffffffffc}, {0x5, 0xb, 0x4, 0xfffffffffffff001}, {0x8b5, 0x81, 0x4, 0x2}, {0x8, 0xfffffffffffffff8, 0x1, 0x8}, {0x40, 0x4, 0x1, 0x100000001}, {0x9b, 0x5, 0x1, 0xd64c}, {0x100, 0x8, 0x7, 0x3ff}, {0xf11, 0x200, 0x7, 0x2}, {0xac5, 0x0, 0x3, 0x7}, {0x518, 0x1, 0x80}, {0x6, 0x7f, 0x6, 0x7298}, {0x7, 0x1, 0x2, 0x1ec9}, {0x400, 0x2, 0x6, 0x6c3}, {0x100000001, 0x6, 0x5, 0x9}, {0x8, 0x1dae, 0xfffffffffffffff8, 0x101}, {0x2, 0x7, 0x8, 0x3}, {0x0, 0x45b, 0x7, 0x72}, {0x100000001, 0xc00000000000, 0x100000001, 0x8}, {0x100000001, 0x0, 0xfffffffffffffffc, 0x3}, {0x95, 0x90b, 0x0, 0xfffffffffffff565}, {0x0, 0x4, 0x0, 0x2}], 0x40}}}]}}, @common=@IDLETIMER={'IDLETIMER\x00', 0x28, {{0x7f, 'syz0\x00'}}}}]}, {0x0, '\x00', 0x2, 0xfffffffffffffffc}, {0x0, '\x00', 0x2, 0xffffffffffffffff, 0x2, [{{{0x11, 0x40, 0x87df, 'irlan0\x00', 'sit0\x00', 'veth0_to_team\x00', 'ip6gretap0\x00', @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [0xff, 0xff, 0xff, 0xff, 0x0, 0xff], @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [0x0, 0xff, 0x0, 0xff], 0xb0, 0x210, 0x258, [@time={'time\x00', 0x18, {{0x1ff, 0x1, 0xe063, 0xb6c5, 0x2e80, 0x0, 0x2}}}]}, [@common=@redirect={'redirect\x00', 0x8, {{0xffffffffffffffff}}}, @common=@SECMARK={'SECMARK\x00', 0x108, {{0x1, 0x6, 'system_u:object_r:lost_found_t:s0\x00'}}}]}, @common=@ERROR={'ERROR\x00', 0x20, {"4323eed968d7072e70de82f41331fe3aed2aedc8f2fff16e54b1c4e2ad07"}}}, {{{0x5, 0x54, 0x888d, 'ip6gretap0\x00', 'teql0\x00', 'veth1_to_team\x00', 'erspan0\x00', @random="0eae55d5aac5", [0x0, 0xff, 0x0, 0xff, 0xff, 0xff], @empty, [0xff, 0xff, 0xff, 0x0, 0xff, 0xff], 0x70, 0x70, 0xb8}}, @common=@RATEEST={'RATEEST\x00', 0x20, {{'syz0\x00', 0x9, 0x1, 0x4}}}}]}]}, 0x9a0) 2018/05/15 08:25:02 executing program 1: perf_event_open(&(0x7f0000000040)={0x1, 0x70}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f00000000c0)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000400), 0x0, &(0x7f0000000600)=ANY=[]) r0 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) fallocate(r0, 0x0, 0x0, 0x10000101) 2018/05/15 08:25:02 executing program 5 (fault-call:1 fault-nth:16): r0 = syz_open_procfs(0x0, &(0x7f0000000280)='net/ptype\x00') sendfile(r0, r0, &(0x7f0000000000)=0xffffffd, 0x7fffffff) 2018/05/15 08:25:02 executing program 4: perf_event_open$cgroup(&(0x7f0000000240)={0x7, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000200)}, 0x10202, 0x4, 0x4, 0x7, 0xdf, 0x9, 0x3}, 0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x8) 2018/05/15 08:25:02 executing program 2: syz_emit_ethernet(0x3e, &(0x7f00000001c0)={@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, @dev={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa]}, [], {@ipv6={0x86dd, {0x0, 0x6, "50a09c", 0x8, 0x0, 0x0, @remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffc0], 0xbb}, @local={0xfe, 0x80, [], 0xaa}, {[], @udp={0x0, 0x0, 0x8}}}}}}, &(0x7f0000000040)) 2018/05/15 08:25:02 executing program 3: syz_emit_ethernet(0x3e, &(0x7f00000001c0)={@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, @dev={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa]}, [], {@ipv6={0x86dd, {0x0, 0x6, "50a09c", 0x8, 0xffffff87, 0x0, @remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x88caffff00000000], 0xbb}, @local={0xfe, 0x80, [], 0xaa}, {[], @udp={0x0, 0x0, 0x8}}}}}}, &(0x7f0000000040)) 2018/05/15 08:25:02 executing program 0: perf_event_open$cgroup(&(0x7f0000000240)={0x7, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000200)}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 433.182340] kernel msg: ebtables bug: please report to author: EBT_ENTRY_OR_ENTRIES shouldn't be set in distinguisher [ 433.194952] FAULT_INJECTION: forcing a failure. [ 433.194952] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 433.206884] CPU: 0 PID: 14456 Comm: syz-executor5 Not tainted 4.17.0-rc5+ #51 [ 433.214168] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 433.223527] Call Trace: [ 433.226126] dump_stack+0x1b9/0x294 [ 433.228052] FAT-fs (loop1): bogus number of reserved sectors [ 433.229759] ? dump_stack_print_info.cold.2+0x52/0x52 [ 433.229779] ? find_held_lock+0x36/0x1c0 [ 433.229802] should_fail.cold.4+0xa/0x1a [ 433.229824] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 433.235653] FAT-fs (loop1): Can't find a valid FAT filesystem [ 433.240802] ? graph_lock+0x170/0x170 [ 433.240823] ? kasan_check_read+0x11/0x20 [ 433.240851] ? rcu_bh_force_quiescent_state+0x20/0x20 [ 433.272991] ? find_held_lock+0x36/0x1c0 [ 433.277243] ? __lock_is_held+0xb5/0x140 [ 433.281343] ? check_same_owner+0x320/0x320 [ 433.285678] ? rcu_note_context_switch+0x710/0x710 [ 433.290617] ? __might_sleep+0x95/0x190 [ 433.294602] __alloc_pages_nodemask+0x34e/0xd70 [ 433.299303] ? default_file_splice_read+0x1c7/0xad0 [ 433.304354] ? do_splice_to+0x12e/0x190 [ 433.308339] ? splice_direct_to_actor+0x268/0x8d0 [ 433.313191] ? __alloc_pages_slowpath+0x2db0/0x2db0 [ 433.318211] ? __lock_is_held+0xb5/0x140 [ 433.322289] ? __lock_is_held+0xb5/0x140 [ 433.326368] ? rcu_read_lock_sched_held+0x108/0x120 [ 433.331386] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 433.336931] alloc_pages_current+0x10c/0x210 [ 433.341355] push_pipe+0x400/0x7a0 [ 433.344900] ? __kmalloc_node+0x47/0x70 [ 433.348881] iov_iter_get_pages_alloc+0x84a/0x14e0 [ 433.353818] ? rcu_is_watching+0x85/0x140 [ 433.357973] ? copy_page_to_iter+0xf30/0xf30 [ 433.362390] ? is_bpf_text_address+0xd7/0x170 [ 433.366889] ? kernel_text_address+0x79/0xf0 [ 433.371302] ? __unwind_start+0x166/0x330 [ 433.375471] ? unwind_get_return_address+0x61/0xa0 [ 433.380405] ? __save_stack_trace+0x7e/0xd0 [ 433.384738] ? print_usage_bug+0xc0/0xc0 [ 433.388804] ? save_stack+0xa9/0xd0 [ 433.392436] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 433.397453] ? iov_iter_pipe+0xc2/0x2f0 [ 433.401434] default_file_splice_read+0x1c7/0xad0 [ 433.406297] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 433.411674] ? print_usage_bug+0xc0/0xc0 [ 433.415749] ? do_splice_direct+0x400/0x400 [ 433.420076] ? debug_mutex_init+0x1c/0x60 [ 433.424228] ? trace_hardirqs_on_caller+0x421/0x5c0 [ 433.429239] ? __lockdep_init_map+0x105/0x590 [ 433.433716] ? lockdep_init_map+0x9/0x10 [ 433.437756] ? debug_mutex_init+0x2d/0x60 [ 433.441887] ? __mutex_init+0x1ef/0x280 [ 433.445855] ? __ia32_sys_membarrier+0x150/0x150 [ 433.450594] ? __lockdep_init_map+0x105/0x590 [ 433.455089] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 433.460615] ? fsnotify+0x415/0xfc0 [ 433.464225] ? fsnotify+0xfc0/0xfc0 [ 433.467834] ? fsnotify_first_mark+0x330/0x330 [ 433.472420] ? security_file_permission+0x1c6/0x240 [ 433.477422] ? rw_verify_area+0x118/0x360 [ 433.481557] ? do_splice_direct+0x400/0x400 [ 433.485862] do_splice_to+0x12e/0x190 [ 433.489648] splice_direct_to_actor+0x268/0x8d0 [ 433.494324] ? pipe_to_sendpage+0x3f0/0x3f0 [ 433.498638] ? do_splice_to+0x190/0x190 [ 433.502593] ? rw_verify_area+0x118/0x360 [ 433.506723] do_splice_direct+0x2cc/0x400 [ 433.510866] ? splice_direct_to_actor+0x8d0/0x8d0 [ 433.515704] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 433.521225] ? __sb_start_write+0x17f/0x300 [ 433.525531] do_sendfile+0x60f/0xe00 [ 433.529232] ? do_compat_pwritev64+0x1b0/0x1b0 [ 433.533804] ? __might_sleep+0x95/0x190 [ 433.537764] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 433.543287] ? _copy_from_user+0xdf/0x150 [ 433.547423] __x64_sys_sendfile64+0x155/0x240 [ 433.551900] ? __ia32_sys_sendfile+0x290/0x290 [ 433.556465] ? do_syscall_64+0x92/0x800 [ 433.560422] do_syscall_64+0x1b1/0x800 [ 433.564293] ? finish_task_switch+0x1ca/0x840 [ 433.568783] ? syscall_return_slowpath+0x5c0/0x5c0 [ 433.573693] ? syscall_return_slowpath+0x30f/0x5c0 [ 433.578607] ? entry_SYSCALL_64_after_hwframe+0x59/0xbe [ 433.583953] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 433.588780] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 433.593948] RIP: 0033:0x455a09 [ 433.597122] RSP: 002b:00007ffbeaa32c68 EFLAGS: 00000246 ORIG_RAX: 0000000000000028 [ 433.604819] RAX: ffffffffffffffda RBX: 00007ffbeaa336d4 RCX: 0000000000455a09 [ 433.612072] RDX: 0000000020000000 RSI: 0000000000000013 RDI: 0000000000000013 [ 433.619329] RBP: 000000000072bea0 R08: 0000000000000000 R09: 0000000000000000 [ 433.626580] R10: 000000007fffffff R11: 0000000000000246 R12: 0000000000000014 2018/05/15 08:25:02 executing program 6: perf_event_open$cgroup(&(0x7f0000000240)={0x7, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0xfffffffffffffff9, 0x5, 0x0, 0x5, 0x6, @perf_bp={&(0x7f0000000200), 0x6}, 0x10202, 0x4, 0x4, 0x7, 0xdf, 0x9, 0x3}, 0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x8) 2018/05/15 08:25:02 executing program 2: syz_emit_ethernet(0x3e, &(0x7f00000001c0)={@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, @dev={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa]}, [], {@ipv6={0x86dd, {0x0, 0x6, "50a09c", 0x8, 0x0, 0x0, @remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x89ffffff00000000], 0xbb}, @local={0xfe, 0x80, [], 0xaa}, {[], @udp={0x0, 0x0, 0x8}}}}}}, &(0x7f0000000040)) 2018/05/15 08:25:02 executing program 4: perf_event_open$cgroup(&(0x7f0000000240)={0x7, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000200)}, 0x0, 0x4, 0x4, 0x7, 0xdf, 0x9, 0x3}, 0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x8) 2018/05/15 08:25:02 executing program 3: syz_emit_ethernet(0x3e, &(0x7f00000001c0)={@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, @dev={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa]}, [], {@ipv6={0x86dd, {0x0, 0x6, "50a09c", 0x8, 0xffffff87, 0x0, @remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x86ddffff00000000], 0xbb}, @local={0xfe, 0x80, [], 0xaa}, {[], @udp={0x0, 0x0, 0x8}}}}}}, &(0x7f0000000040)) 2018/05/15 08:25:02 executing program 1: perf_event_open(&(0x7f0000000040)={0x1, 0x70}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f00000000c0)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000400), 0x0, &(0x7f0000000600)=ANY=[]) r0 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) fallocate(r0, 0x0, 0x0, 0x10000101) 2018/05/15 08:25:02 executing program 0: perf_event_open(&(0x7f0000000040)={0x0, 0x70}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f00000000c0)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000400), 0x0, &(0x7f0000000600)=ANY=[]) r0 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) fallocate(r0, 0x1, 0x0, 0x10000101) 2018/05/15 08:25:02 executing program 5 (fault-call:1 fault-nth:17): r0 = syz_open_procfs(0x0, &(0x7f0000000280)='net/ptype\x00') sendfile(r0, r0, &(0x7f0000000000)=0xffffffd, 0x7fffffff) 2018/05/15 08:25:02 executing program 7: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup(r0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000d40)=@broute={'broute\x00', 0x20, 0x4, 0x928, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000400], 0x0, &(0x7f0000000000), &(0x7f0000000400)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x2, [{{{0x0, 0x7, 0x4, 'bcsh0\x00', 'sit0\x00', 'syzkaller1\x00', 'veth0\x00', @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [0xff, 0xff, 0xff, 0xff], @dev={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0x18}, [0xff, 0x0, 0x0, 0x0, 0x0, 0xff], 0x1d8, 0x228, 0x258, [@comment={'comment\x00', 0x100}, @owner={'owner\x00', 0x18, {{0x0, 0x0, 0x0, 0x0, 0x1, 0x1}}}]}, [@common=@LED={'LED\x00', 0x28, {{'syz0\x00', 0x1, 0x0, 0x800}}}]}, @common=@redirect={'redirect\x00', 0x8, {{0xfffffffffffffffe}}}}, {{{0x11, 0x4, 0x88e7, 'veth1_to_bond\x00', 'erspan0\x00', 'bridge_slave_1\x00', 'veth0_to_bridge\x00', @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [0xff, 0xff, 0x0, 0xff, 0x0, 0xff], @random="cfa071dc33d9", [0xff, 0xff, 0xff, 0xff, 0xff, 0xff], 0x2e0, 0x2e0, 0x330, [@mac={'mac\x00', 0x10, {{@remote={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xbb}, 0x1}}}, @bpf0={'bpf\x00', 0x210, {{0x20, [{0x8000, 0x4902, 0x5, 0x3ff}, {0x5, 0x8, 0x2, 0xff}, {0x1000, 0x48000000000, 0x3}, {0xf7, 0x1f, 0xfffffffffffffe00, 0x1}, {0x10000, 0xfc0, 0x1, 0x6}, {0x4, 0x2, 0xcefa, 0x81}, {0x815, 0xc7, 0x8001, 0x6a0}, {0x40, 0x0, 0x9, 0x80000001}, {0xffffffffffffff53, 0x38a, 0x100000000, 0x7}, {0x5, 0x1, 0x1000, 0x10001}, {0x80000000, 0x7, 0x1, 0xf7}, {0x2, 0x9, 0x4c, 0x5}, {0xfffffffffffffff7, 0x0, 0xe74, 0x52a}, {0x1ff, 0x7, 0x3, 0x7}, {0x6, 0x1ff, 0x49, 0x7}, {0x8000, 0x0, 0x7, 0x684}, {0xffe, 0x988, 0x3, 0x1}, {0x7b, 0x5a07, 0x18, 0x7}, {0xfffffffffffffffe, 0xfff, 0x3, 0x178180a0}, {0x2, 0xc0, 0x6, 0x401}, {0x5, 0x3, 0x8, 0x8}, {0xffffffffffff0001, 0x3, 0xfffffffffffffff7, 0x5}, {0x1ff, 0x8001, 0x3}, {0x3, 0x9, 0xffffffff, 0x2}, {0x5, 0x4, 0x574, 0x64c}, {0x5, 0x4, 0x10001, 0x6}, {0x1, 0x5b2c, 0x3ff, 0x7}, {0xff, 0x2, 0x5, 0x62c5fc18}, {0x101, 0x7, 0x2, 0xfffffffffffffffd}, {0x7fff, 0x6, 0x8, 0x4}, {0x9, 0x0, 0x7, 0xff}, {0x4, 0x4, 0x4, 0x10000}, {0x59b0, 0xfff, 0x4, 0x4}, {0x1f, 0xfffffffffffffffd, 0x8001, 0x800}, {0x0, 0xffffffffffffffff, 0x2, 0x65}, {0x1ff, 0x1, 0x2, 0x7ff}, {0x4, 0x5, 0x1, 0x7be}, {0x9e4, 0x0, 0x7, 0x5}, {0x5, 0x8, 0x7f, 0xffffffff}, {0x4, 0x6, 0x5, 0x7ff}, {0x22aaaf52, 0x8f, 0x6, 0x10000}, {0x2, 0x7, 0xffff}, {0x5, 0xfffffffff016eb50, 0x82, 0x7}, {0x38, 0x800, 0x9a2a, 0xfffffffffffffffc}, {0x5, 0xb, 0x4, 0xfffffffffffff001}, {0x8b5, 0x81, 0x4, 0x2}, {0x8, 0xfffffffffffffff8, 0x1, 0x8}, {0x40, 0x4, 0x1, 0x100000001}, {0x9b, 0x5, 0x1, 0xd64c}, {0x100, 0x8, 0x7, 0x3ff}, {0xf11, 0x200, 0x7, 0x2}, {0xac5, 0x0, 0x3, 0x7}, {0x518, 0x1, 0x80}, {0x6, 0x7f, 0x6, 0x7298}, {0x7, 0x1, 0x2, 0x1ec9}, {0x400, 0x2, 0x6, 0x6c3}, {0x100000001, 0x6, 0x5, 0x9}, {0x8, 0x1dae, 0xfffffffffffffff8, 0x101}, {0x2, 0x7, 0x8, 0x3}, {0x0, 0x45b, 0x7, 0x72}, {0x100000001, 0xc00000000000, 0x100000001, 0x8}, {0x100000001, 0x0, 0xfffffffffffffffc, 0x3}, {0x95, 0x90b, 0x0, 0xfffffffffffff565}, {0x0, 0x4, 0x0, 0x2}], 0x40}}}]}}, @common=@IDLETIMER={'IDLETIMER\x00', 0x28, {{0x7f, 'syz0\x00'}}}}]}, {0x0, '\x00', 0x2, 0xfffffffffffffffc}, {0x0, '\x00', 0x2, 0xffffffffffffffff, 0x2, [{{{0x11, 0x40, 0x87df, 'irlan0\x00', 'sit0\x00', 'veth0_to_team\x00', 'ip6gretap0\x00', @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [0xff, 0xff, 0xff, 0xff, 0x0, 0xff], @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [0x0, 0xff, 0x0, 0xff], 0xb0, 0x210, 0x258, [@time={'time\x00', 0x18, {{0x1ff, 0x1, 0xe063, 0xb6c5, 0x2e80, 0x0, 0x2}}}]}, [@common=@redirect={'redirect\x00', 0x8, {{0xffffffffffffffff}}}, @common=@SECMARK={'SECMARK\x00', 0x108, {{0x1, 0x6, 'system_u:object_r:lost_found_t:s0\x00'}}}]}, @common=@ERROR={'ERROR\x00', 0x20, {"4323eed968d7072e70de82f41331fe3aed2aedc8f2fff16e54b1c4e2ad07"}}}, {{{0x5, 0x54, 0x888d, 'ip6gretap0\x00', 'teql0\x00', 'veth1_to_team\x00', 'erspan0\x00', @random="0eae55d5aac5", [0x0, 0xff, 0x0, 0xff, 0xff, 0xff], @empty, [0xff, 0xff, 0xff, 0x0, 0xff, 0xff], 0x70, 0x70, 0xb8}}, @common=@RATEEST={'RATEEST\x00', 0x20, {{'syz0\x00', 0x9, 0x1, 0x4}}}}]}]}, 0x9a0) [ 433.633829] R13: 0000000000000579 R14: 00000000006fc3f8 R15: 0000000000000010 [ 433.690225] FAULT_INJECTION: forcing a failure. [ 433.690225] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 433.702200] CPU: 0 PID: 14471 Comm: syz-executor5 Not tainted 4.17.0-rc5+ #51 [ 433.709483] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 433.718842] Call Trace: [ 433.721459] dump_stack+0x1b9/0x294 [ 433.725110] ? dump_stack_print_info.cold.2+0x52/0x52 [ 433.727209] kernel msg: ebtables bug: please report to author: EBT_ENTRY_OR_ENTRIES shouldn't be set in distinguisher [ 433.730317] ? preempt_notifier_register+0x1e0/0x1e0 [ 433.730341] should_fail.cold.4+0xa/0x1a [ 433.730360] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 433.730375] ? graph_lock+0x170/0x170 [ 433.730395] ? kasan_check_read+0x11/0x20 [ 433.756141] FAT-fs (loop1): bogus number of reserved sectors [ 433.759169] ? find_held_lock+0x36/0x1c0 [ 433.759190] ? __lock_is_held+0xb5/0x140 [ 433.759221] ? check_same_owner+0x320/0x320 [ 433.759239] ? rcu_note_context_switch+0x710/0x710 [ 433.759257] ? __might_sleep+0x95/0x190 2018/05/15 08:25:03 executing program 2: syz_emit_ethernet(0x3e, &(0x7f00000001c0)={@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, @dev={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa]}, [], {@ipv6={0x86dd, {0x0, 0x6, "50a09c", 0x8, 0x0, 0x0, @remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x1100000000000000], 0xbb}, @local={0xfe, 0x80, [], 0xaa}, {[], @udp={0x0, 0x0, 0x8}}}}}}, &(0x7f0000000040)) [ 433.759274] __alloc_pages_nodemask+0x34e/0xd70 [ 433.759300] ? default_file_splice_read+0x1c7/0xad0 [ 433.763459] FAT-fs (loop1): Can't find a valid FAT filesystem [ 433.769204] ? do_splice_to+0x12e/0x190 [ 433.769218] ? splice_direct_to_actor+0x268/0x8d0 [ 433.769237] ? __alloc_pages_slowpath+0x2db0/0x2db0 [ 433.769247] ? __lock_is_held+0xb5/0x140 [ 433.769270] ? __lock_is_held+0xb5/0x140 [ 433.769296] ? rcu_read_lock_sched_held+0x108/0x120 [ 433.832961] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 2018/05/15 08:25:03 executing program 7: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup(r0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000d40)=@broute={'broute\x00', 0x20, 0x4, 0x928, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000400], 0x0, &(0x7f0000000000), &(0x7f0000000400)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x2, [{{{0x0, 0x7, 0x4, 'bcsh0\x00', 'sit0\x00', 'syzkaller1\x00', 'veth0\x00', @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [0xff, 0xff, 0xff, 0xff], @dev={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0x18}, [0xff, 0x0, 0x0, 0x0, 0x0, 0xff], 0x1d8, 0x228, 0x258, [@comment={'comment\x00', 0x100}, @owner={'owner\x00', 0x18, {{0x0, 0x0, 0x0, 0x0, 0x1, 0x1}}}]}, [@common=@LED={'LED\x00', 0x28, {{'syz0\x00', 0x1, 0x0, 0x800}}}]}, @common=@redirect={'redirect\x00', 0x8, {{0xfffffffffffffffe}}}}, {{{0x11, 0x4, 0x88e7, 'veth1_to_bond\x00', 'erspan0\x00', 'bridge_slave_1\x00', 'veth0_to_bridge\x00', @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [0xff, 0xff, 0x0, 0xff, 0x0, 0xff], @random="cfa071dc33d9", [0xff, 0xff, 0xff, 0xff, 0xff, 0xff], 0x2e0, 0x2e0, 0x330, [@mac={'mac\x00', 0x10, {{@remote={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xbb}, 0x1}}}, @bpf0={'bpf\x00', 0x210, {{0x20, [{0x8000, 0x4902, 0x5, 0x3ff}, {0x5, 0x8, 0x2, 0xff}, {0x1000, 0x48000000000, 0x3}, {0xf7, 0x1f, 0xfffffffffffffe00, 0x1}, {0x10000, 0xfc0, 0x1, 0x6}, {0x4, 0x2, 0xcefa, 0x81}, {0x815, 0xc7, 0x8001, 0x6a0}, {0x40, 0x0, 0x9, 0x80000001}, {0xffffffffffffff53, 0x38a, 0x100000000, 0x7}, {0x5, 0x1, 0x1000, 0x10001}, {0x80000000, 0x7, 0x1, 0xf7}, {0x2, 0x9, 0x4c, 0x5}, {0xfffffffffffffff7, 0x0, 0xe74, 0x52a}, {0x1ff, 0x7, 0x3, 0x7}, {0x6, 0x1ff, 0x49, 0x7}, {0x8000, 0x0, 0x7, 0x684}, {0xffe, 0x988, 0x3, 0x1}, {0x7b, 0x5a07, 0x18, 0x7}, {0xfffffffffffffffe, 0xfff, 0x3, 0x178180a0}, {0x2, 0xc0, 0x6, 0x401}, {0x5, 0x3, 0x8, 0x8}, {0xffffffffffff0001, 0x3, 0xfffffffffffffff7, 0x5}, {0x1ff, 0x8001, 0x3}, {0x3, 0x9, 0xffffffff, 0x2}, {0x5, 0x4, 0x574, 0x64c}, {0x5, 0x4, 0x10001, 0x6}, {0x1, 0x5b2c, 0x3ff, 0x7}, {0xff, 0x2, 0x5, 0x62c5fc18}, {0x101, 0x7, 0x2, 0xfffffffffffffffd}, {0x7fff, 0x6, 0x8, 0x4}, {0x9, 0x0, 0x7, 0xff}, {0x4, 0x4, 0x4, 0x10000}, {0x59b0, 0xfff, 0x4, 0x4}, {0x1f, 0xfffffffffffffffd, 0x8001, 0x800}, {0x0, 0xffffffffffffffff, 0x2, 0x65}, {0x1ff, 0x1, 0x2, 0x7ff}, {0x4, 0x5, 0x1, 0x7be}, {0x9e4, 0x0, 0x7, 0x5}, {0x5, 0x8, 0x7f, 0xffffffff}, {0x4, 0x6, 0x5, 0x7ff}, {0x22aaaf52, 0x8f, 0x6, 0x10000}, {0x2, 0x7, 0xffff}, {0x5, 0xfffffffff016eb50, 0x82, 0x7}, {0x38, 0x800, 0x9a2a, 0xfffffffffffffffc}, {0x5, 0xb, 0x4, 0xfffffffffffff001}, {0x8b5, 0x81, 0x4, 0x2}, {0x8, 0xfffffffffffffff8, 0x1, 0x8}, {0x40, 0x4, 0x1, 0x100000001}, {0x9b, 0x5, 0x1, 0xd64c}, {0x100, 0x8, 0x7, 0x3ff}, {0xf11, 0x200, 0x7, 0x2}, {0xac5, 0x0, 0x3, 0x7}, {0x518, 0x1, 0x80}, {0x6, 0x7f, 0x6, 0x7298}, {0x7, 0x1, 0x2, 0x1ec9}, {0x400, 0x2, 0x6, 0x6c3}, {0x100000001, 0x6, 0x5, 0x9}, {0x8, 0x1dae, 0xfffffffffffffff8, 0x101}, {0x2, 0x7, 0x8, 0x3}, {0x0, 0x45b, 0x7, 0x72}, {0x100000001, 0xc00000000000, 0x100000001, 0x8}, {0x100000001, 0x0, 0xfffffffffffffffc, 0x3}, {0x95, 0x90b, 0x0, 0xfffffffffffff565}, {0x0, 0x4, 0x0, 0x2}], 0x40}}}]}}, @common=@IDLETIMER={'IDLETIMER\x00', 0x28, {{0x7f, 'syz0\x00'}}}}]}, {0x0, '\x00', 0x2, 0xfffffffffffffffc}, {0x0, '\x00', 0x2, 0xffffffffffffffff, 0x2, [{{{0x11, 0x40, 0x87df, 'irlan0\x00', 'sit0\x00', 'veth0_to_team\x00', 'ip6gretap0\x00', @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [0xff, 0xff, 0xff, 0xff, 0x0, 0xff], @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [0x0, 0xff, 0x0, 0xff], 0xb0, 0x210, 0x258, [@time={'time\x00', 0x18, {{0x1ff, 0x1, 0xe063, 0xb6c5, 0x2e80, 0x0, 0x2}}}]}, [@common=@redirect={'redirect\x00', 0x8, {{0xffffffffffffffff}}}, @common=@SECMARK={'SECMARK\x00', 0x108, {{0x1, 0x6, 'system_u:object_r:lost_found_t:s0\x00'}}}]}, @common=@ERROR={'ERROR\x00', 0x20, {"4323eed968d7072e70de82f41331fe3aed2aedc8f2fff16e54b1c4e2ad07"}}}, {{{0x5, 0x54, 0x888d, 'ip6gretap0\x00', 'teql0\x00', 'veth1_to_team\x00', 'erspan0\x00', @random="0eae55d5aac5", [0x0, 0xff, 0x0, 0xff, 0xff, 0xff], @empty, [0xff, 0xff, 0xff, 0x0, 0xff, 0xff], 0x70, 0x70, 0xb8}}, @common=@RATEEST={'RATEEST\x00', 0x20, {{'syz0\x00', 0x9, 0x1, 0x4}}}}]}]}, 0x9a0) [ 433.838511] alloc_pages_current+0x10c/0x210 [ 433.842932] push_pipe+0x400/0x7a0 [ 433.846478] ? __kmalloc_node+0x47/0x70 [ 433.850462] iov_iter_get_pages_alloc+0x84a/0x14e0 [ 433.855395] ? rcu_is_watching+0x85/0x140 [ 433.859557] ? copy_page_to_iter+0xf30/0xf30 [ 433.863976] ? is_bpf_text_address+0xd7/0x170 [ 433.868476] ? kernel_text_address+0x79/0xf0 [ 433.872888] ? __unwind_start+0x166/0x330 [ 433.877046] ? unwind_get_return_address+0x61/0xa0 [ 433.881982] ? __save_stack_trace+0x7e/0xd0 [ 433.886319] ? print_usage_bug+0xc0/0xc0 [ 433.890388] ? save_stack+0xa9/0xd0 [ 433.894019] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 433.896635] kernel msg: ebtables bug: please report to author: EBT_ENTRY_OR_ENTRIES shouldn't be set in distinguisher [ 433.899038] ? iov_iter_pipe+0xc2/0x2f0 [ 433.899060] default_file_splice_read+0x1c7/0xad0 [ 433.899077] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 433.899093] ? print_usage_bug+0xc0/0xc0 [ 433.899117] ? do_splice_direct+0x400/0x400 [ 433.899132] ? debug_mutex_init+0x1c/0x60 [ 433.899147] ? trace_hardirqs_on_caller+0x421/0x5c0 [ 433.899158] ? __lockdep_init_map+0x105/0x590 [ 433.899176] ? lockdep_init_map+0x9/0x10 [ 433.950051] ? debug_mutex_init+0x2d/0x60 [ 433.954205] ? __mutex_init+0x1ef/0x280 [ 433.958180] ? __ia32_sys_membarrier+0x150/0x150 [ 433.962937] ? __lockdep_init_map+0x105/0x590 [ 433.967443] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 433.972979] ? fsnotify+0x415/0xfc0 [ 433.976610] ? fsnotify+0xfc0/0xfc0 [ 433.980241] ? fsnotify_first_mark+0x330/0x330 [ 433.984841] ? security_file_permission+0x1c6/0x240 [ 433.989862] ? rw_verify_area+0x118/0x360 [ 433.994014] ? do_splice_direct+0x400/0x400 [ 433.998341] do_splice_to+0x12e/0x190 [ 434.002148] splice_direct_to_actor+0x268/0x8d0 [ 434.006824] ? pipe_to_sendpage+0x3f0/0x3f0 [ 434.011152] ? do_splice_to+0x190/0x190 [ 434.015132] ? rw_verify_area+0x118/0x360 [ 434.019290] do_splice_direct+0x2cc/0x400 [ 434.023447] ? splice_direct_to_actor+0x8d0/0x8d0 [ 434.028301] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 434.033843] ? __sb_start_write+0x17f/0x300 [ 434.038176] do_sendfile+0x60f/0xe00 [ 434.041903] ? do_compat_pwritev64+0x1b0/0x1b0 [ 434.046494] ? __might_sleep+0x95/0x190 [ 434.050483] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 434.056024] ? _copy_from_user+0xdf/0x150 [ 434.060166] __x64_sys_sendfile64+0x155/0x240 [ 434.064644] ? __ia32_sys_sendfile+0x290/0x290 [ 434.069214] ? do_syscall_64+0x92/0x800 [ 434.073175] do_syscall_64+0x1b1/0x800 [ 434.077053] ? syscall_slow_exit_work+0x4f0/0x4f0 [ 434.081887] ? syscall_return_slowpath+0x5c0/0x5c0 [ 434.086802] ? syscall_return_slowpath+0x30f/0x5c0 [ 434.091719] ? entry_SYSCALL_64_after_hwframe+0x59/0xbe [ 434.097078] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 434.101911] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 434.107079] RIP: 0033:0x455a09 [ 434.110255] RSP: 002b:00007ffbeaa32c68 EFLAGS: 00000246 ORIG_RAX: 0000000000000028 [ 434.117944] RAX: ffffffffffffffda RBX: 00007ffbeaa336d4 RCX: 0000000000455a09 [ 434.125197] RDX: 0000000020000000 RSI: 0000000000000013 RDI: 0000000000000013 [ 434.132456] RBP: 000000000072bea0 R08: 0000000000000000 R09: 0000000000000000 [ 434.139705] R10: 000000007fffffff R11: 0000000000000246 R12: 0000000000000014 [ 434.146957] R13: 0000000000000579 R14: 00000000006fc3f8 R15: 0000000000000011 2018/05/15 08:25:03 executing program 2: syz_emit_ethernet(0x3e, &(0x7f00000001c0)={@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, @dev={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa]}, [], {@ipv6={0x86dd, {0x0, 0x6, "50a09c", 0x8, 0x0, 0x0, @remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x87ffffff00000000], 0xbb}, @local={0xfe, 0x80, [], 0xaa}, {[], @udp={0x0, 0x0, 0x8}}}}}}, &(0x7f0000000040)) 2018/05/15 08:25:03 executing program 4: perf_event_open$cgroup(&(0x7f0000000240)={0x7, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000200)}, 0x0, 0x0, 0x4, 0x7, 0xdf, 0x9, 0x3}, 0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x8) 2018/05/15 08:25:03 executing program 7: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup(r0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000d40)=@broute={'broute\x00', 0x20, 0x4, 0x928, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000400], 0x0, &(0x7f0000000000), &(0x7f0000000400)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x2, [{{{0x5, 0x0, 0x4, 'bcsh0\x00', 'sit0\x00', 'syzkaller1\x00', 'veth0\x00', @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [0xff, 0xff, 0xff, 0xff], @dev={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0x18}, [0xff, 0x0, 0x0, 0x0, 0x0, 0xff], 0x1d8, 0x228, 0x258, [@comment={'comment\x00', 0x100}, @owner={'owner\x00', 0x18, {{0x0, 0x0, 0x0, 0x0, 0x1, 0x1}}}]}, [@common=@LED={'LED\x00', 0x28, {{'syz0\x00', 0x1, 0x0, 0x800}}}]}, @common=@redirect={'redirect\x00', 0x8, {{0xfffffffffffffffe}}}}, {{{0x11, 0x4, 0x88e7, 'veth1_to_bond\x00', 'erspan0\x00', 'bridge_slave_1\x00', 'veth0_to_bridge\x00', @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [0xff, 0xff, 0x0, 0xff, 0x0, 0xff], @random="cfa071dc33d9", [0xff, 0xff, 0xff, 0xff, 0xff, 0xff], 0x2e0, 0x2e0, 0x330, [@mac={'mac\x00', 0x10, {{@remote={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xbb}, 0x1}}}, @bpf0={'bpf\x00', 0x210, {{0x20, [{0x8000, 0x4902, 0x5, 0x3ff}, {0x5, 0x8, 0x2, 0xff}, {0x1000, 0x48000000000, 0x3}, {0xf7, 0x1f, 0xfffffffffffffe00, 0x1}, {0x10000, 0xfc0, 0x1, 0x6}, {0x4, 0x2, 0xcefa, 0x81}, {0x815, 0xc7, 0x8001, 0x6a0}, {0x40, 0x0, 0x9, 0x80000001}, {0xffffffffffffff53, 0x38a, 0x100000000, 0x7}, {0x5, 0x1, 0x1000, 0x10001}, {0x80000000, 0x7, 0x1, 0xf7}, {0x2, 0x9, 0x4c, 0x5}, {0xfffffffffffffff7, 0x0, 0xe74, 0x52a}, {0x1ff, 0x7, 0x3, 0x7}, {0x6, 0x1ff, 0x49, 0x7}, {0x8000, 0x0, 0x7, 0x684}, {0xffe, 0x988, 0x3, 0x1}, {0x7b, 0x5a07, 0x18, 0x7}, {0xfffffffffffffffe, 0xfff, 0x3, 0x178180a0}, {0x2, 0xc0, 0x6, 0x401}, {0x5, 0x3, 0x8, 0x8}, {0xffffffffffff0001, 0x3, 0xfffffffffffffff7, 0x5}, {0x1ff, 0x8001, 0x3}, {0x3, 0x9, 0xffffffff, 0x2}, {0x5, 0x4, 0x574, 0x64c}, {0x5, 0x4, 0x10001, 0x6}, {0x1, 0x5b2c, 0x3ff, 0x7}, {0xff, 0x2, 0x5, 0x62c5fc18}, {0x101, 0x7, 0x2, 0xfffffffffffffffd}, {0x7fff, 0x6, 0x8, 0x4}, {0x9, 0x0, 0x7, 0xff}, {0x4, 0x4, 0x4, 0x10000}, {0x59b0, 0xfff, 0x4, 0x4}, {0x1f, 0xfffffffffffffffd, 0x8001, 0x800}, {0x0, 0xffffffffffffffff, 0x2, 0x65}, {0x1ff, 0x1, 0x2, 0x7ff}, {0x4, 0x5, 0x1, 0x7be}, {0x9e4, 0x0, 0x7, 0x5}, {0x5, 0x8, 0x7f, 0xffffffff}, {0x4, 0x6, 0x5, 0x7ff}, {0x22aaaf52, 0x8f, 0x6, 0x10000}, {0x2, 0x7, 0xffff}, {0x5, 0xfffffffff016eb50, 0x82, 0x7}, {0x38, 0x800, 0x9a2a, 0xfffffffffffffffc}, {0x5, 0xb, 0x4, 0xfffffffffffff001}, {0x8b5, 0x81, 0x4, 0x2}, {0x8, 0xfffffffffffffff8, 0x1, 0x8}, {0x40, 0x4, 0x1, 0x100000001}, {0x9b, 0x5, 0x1, 0xd64c}, {0x100, 0x8, 0x7, 0x3ff}, {0xf11, 0x200, 0x7, 0x2}, {0xac5, 0x0, 0x3, 0x7}, {0x518, 0x1, 0x80}, {0x6, 0x7f, 0x6, 0x7298}, {0x7, 0x1, 0x2, 0x1ec9}, {0x400, 0x2, 0x6, 0x6c3}, {0x100000001, 0x6, 0x5, 0x9}, {0x8, 0x1dae, 0xfffffffffffffff8, 0x101}, {0x2, 0x7, 0x8, 0x3}, {0x0, 0x45b, 0x7, 0x72}, {0x100000001, 0xc00000000000, 0x100000001, 0x8}, {0x100000001, 0x0, 0xfffffffffffffffc, 0x3}, {0x95, 0x90b, 0x0, 0xfffffffffffff565}, {0x0, 0x4, 0x0, 0x2}], 0x40}}}]}}, @common=@IDLETIMER={'IDLETIMER\x00', 0x28, {{0x7f, 'syz0\x00'}}}}]}, {0x0, '\x00', 0x2, 0xfffffffffffffffc}, {0x0, '\x00', 0x2, 0xffffffffffffffff, 0x2, [{{{0x11, 0x40, 0x87df, 'irlan0\x00', 'sit0\x00', 'veth0_to_team\x00', 'ip6gretap0\x00', @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [0xff, 0xff, 0xff, 0xff, 0x0, 0xff], @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [0x0, 0xff, 0x0, 0xff], 0xb0, 0x210, 0x258, [@time={'time\x00', 0x18, {{0x1ff, 0x1, 0xe063, 0xb6c5, 0x2e80, 0x0, 0x2}}}]}, [@common=@redirect={'redirect\x00', 0x8, {{0xffffffffffffffff}}}, @common=@SECMARK={'SECMARK\x00', 0x108, {{0x1, 0x6, 'system_u:object_r:lost_found_t:s0\x00'}}}]}, @common=@ERROR={'ERROR\x00', 0x20, {"4323eed968d7072e70de82f41331fe3aed2aedc8f2fff16e54b1c4e2ad07"}}}, {{{0x5, 0x54, 0x888d, 'ip6gretap0\x00', 'teql0\x00', 'veth1_to_team\x00', 'erspan0\x00', @random="0eae55d5aac5", [0x0, 0xff, 0x0, 0xff, 0xff, 0xff], @empty, [0xff, 0xff, 0xff, 0x0, 0xff, 0xff], 0x70, 0x70, 0xb8}}, @common=@RATEEST={'RATEEST\x00', 0x20, {{'syz0\x00', 0x9, 0x1, 0x4}}}}]}]}, 0x9a0) 2018/05/15 08:25:03 executing program 6: perf_event_open$cgroup(&(0x7f0000000240)={0x7, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0xfffffffffffffff9, 0x5, 0x0, 0x5, 0x6, @perf_bp={&(0x7f0000000200), 0x6}, 0x10202, 0x4, 0x4, 0x7, 0xdf, 0x9, 0x3}, 0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x8) 2018/05/15 08:25:03 executing program 3: syz_emit_ethernet(0x3e, &(0x7f00000001c0)={@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, @dev={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa]}, [], {@ipv6={0x86dd, {0x0, 0x6, "50a09c", 0x8, 0xffffff87, 0x0, @remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0xfffff000], 0xbb}, @local={0xfe, 0x80, [], 0xaa}, {[], @udp={0x0, 0x0, 0x8}}}}}}, &(0x7f0000000040)) 2018/05/15 08:25:03 executing program 5 (fault-call:1 fault-nth:18): r0 = syz_open_procfs(0x0, &(0x7f0000000280)='net/ptype\x00') sendfile(r0, r0, &(0x7f0000000000)=0xffffffd, 0x7fffffff) 2018/05/15 08:25:03 executing program 0: perf_event_open$cgroup(&(0x7f0000000240)={0x7, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0xfffffffffffffff9, 0x5, 0x0, 0x5, 0x6, @perf_bp={&(0x7f0000000200), 0x6}, 0x10202, 0x4, 0x4, 0x7, 0xdf, 0x9, 0x3}, 0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x8) 2018/05/15 08:25:03 executing program 1: perf_event_open(&(0x7f0000000040)={0x1, 0x70}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f00000000c0)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000400), 0x0, &(0x7f0000000600)=ANY=[]) r0 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) fallocate(r0, 0x1, 0x0, 0x0) [ 434.235679] FAULT_INJECTION: forcing a failure. [ 434.235679] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 434.247569] CPU: 0 PID: 14505 Comm: syz-executor5 Not tainted 4.17.0-rc5+ #51 [ 434.254848] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 434.264207] Call Trace: [ 434.266814] dump_stack+0x1b9/0x294 [ 434.270458] ? dump_stack_print_info.cold.2+0x52/0x52 [ 434.275656] ? find_held_lock+0x36/0x1c0 [ 434.279724] should_fail.cold.4+0xa/0x1a [ 434.283779] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 434.288874] ? graph_lock+0x170/0x170 [ 434.292669] ? kasan_check_read+0x11/0x20 [ 434.296805] ? rcu_bh_force_quiescent_state+0x20/0x20 [ 434.301980] ? find_held_lock+0x36/0x1c0 [ 434.306034] ? __lock_is_held+0xb5/0x140 [ 434.310090] ? check_same_owner+0x320/0x320 [ 434.314399] ? rcu_note_context_switch+0x710/0x710 [ 434.319320] ? __might_sleep+0x95/0x190 [ 434.323281] __alloc_pages_nodemask+0x34e/0xd70 [ 434.327942] ? default_file_splice_read+0x1c7/0xad0 [ 434.332940] ? do_splice_to+0x12e/0x190 [ 434.336896] ? splice_direct_to_actor+0x268/0x8d0 [ 434.341723] ? __alloc_pages_slowpath+0x2db0/0x2db0 [ 434.346734] ? __lock_is_held+0xb5/0x140 [ 434.350791] ? __lock_is_held+0xb5/0x140 [ 434.354841] ? rcu_read_lock_sched_held+0x108/0x120 [ 434.359842] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 434.365367] alloc_pages_current+0x10c/0x210 [ 434.369766] push_pipe+0x400/0x7a0 [ 434.373291] ? __kmalloc_node+0x47/0x70 [ 434.377252] iov_iter_get_pages_alloc+0x84a/0x14e0 [ 434.382168] ? rcu_is_watching+0x85/0x140 [ 434.386304] ? copy_page_to_iter+0xf30/0xf30 [ 434.390696] ? is_bpf_text_address+0xd7/0x170 [ 434.395174] ? kernel_text_address+0x79/0xf0 [ 434.399569] ? __unwind_start+0x166/0x330 [ 434.403701] ? unwind_get_return_address+0x61/0xa0 [ 434.408615] ? __save_stack_trace+0x7e/0xd0 [ 434.412926] ? print_usage_bug+0xc0/0xc0 [ 434.416970] ? save_stack+0xa9/0xd0 [ 434.420585] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 434.425584] ? iov_iter_pipe+0xc2/0x2f0 [ 434.429547] default_file_splice_read+0x1c7/0xad0 [ 434.434373] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 434.439722] ? print_usage_bug+0xc0/0xc0 [ 434.443771] ? do_splice_direct+0x400/0x400 [ 434.448077] ? debug_mutex_init+0x1c/0x60 [ 434.452211] ? trace_hardirqs_on_caller+0x421/0x5c0 [ 434.457215] ? __lockdep_init_map+0x105/0x590 [ 434.461697] ? lockdep_init_map+0x9/0x10 [ 434.465742] ? debug_mutex_init+0x2d/0x60 [ 434.469872] ? __mutex_init+0x1ef/0x280 [ 434.473830] ? __ia32_sys_membarrier+0x150/0x150 [ 434.478567] ? __lockdep_init_map+0x105/0x590 [ 434.483053] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 434.488571] ? fsnotify+0x415/0xfc0 [ 434.492186] ? fsnotify+0xfc0/0xfc0 [ 434.495798] ? fsnotify_first_mark+0x330/0x330 [ 434.500373] ? security_file_permission+0x1c6/0x240 [ 434.505374] ? rw_verify_area+0x118/0x360 [ 434.509505] ? do_splice_direct+0x400/0x400 [ 434.513810] do_splice_to+0x12e/0x190 [ 434.517599] splice_direct_to_actor+0x268/0x8d0 [ 434.522254] ? pipe_to_sendpage+0x3f0/0x3f0 [ 434.526560] ? do_splice_to+0x190/0x190 [ 434.530521] ? rw_verify_area+0x118/0x360 [ 434.534655] do_splice_direct+0x2cc/0x400 [ 434.538789] ? splice_direct_to_actor+0x8d0/0x8d0 [ 434.543618] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 434.549139] ? __sb_start_write+0x17f/0x300 [ 434.553448] do_sendfile+0x60f/0xe00 [ 434.557154] ? do_compat_pwritev64+0x1b0/0x1b0 [ 434.561719] ? __might_sleep+0x95/0x190 [ 434.565679] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 434.571204] ? _copy_from_user+0xdf/0x150 [ 434.575339] __x64_sys_sendfile64+0x155/0x240 [ 434.579822] ? __ia32_sys_sendfile+0x290/0x290 [ 434.584391] ? do_syscall_64+0x92/0x800 [ 434.588351] do_syscall_64+0x1b1/0x800 [ 434.592228] ? finish_task_switch+0x1ca/0x840 [ 434.596708] ? syscall_return_slowpath+0x5c0/0x5c0 [ 434.601640] ? syscall_return_slowpath+0x30f/0x5c0 [ 434.606566] ? entry_SYSCALL_64_after_hwframe+0x59/0xbe [ 434.611924] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 434.616756] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 434.621927] RIP: 0033:0x455a09 [ 434.625105] RSP: 002b:00007ffbeaa32c68 EFLAGS: 00000246 ORIG_RAX: 0000000000000028 2018/05/15 08:25:03 executing program 3: syz_emit_ethernet(0x3e, &(0x7f00000001c0)={@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, @dev={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa]}, [], {@ipv6={0x86dd, {0x0, 0x6, "50a09c", 0x8, 0xffffff87, 0x0, @remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x8847], 0xbb}, @local={0xfe, 0x80, [], 0xaa}, {[], @udp={0x0, 0x0, 0x8}}}}}}, &(0x7f0000000040)) [ 434.632810] RAX: ffffffffffffffda RBX: 00007ffbeaa336d4 RCX: 0000000000455a09 [ 434.640060] RDX: 0000000020000000 RSI: 0000000000000013 RDI: 0000000000000013 [ 434.647312] RBP: 000000000072bea0 R08: 0000000000000000 R09: 0000000000000000 [ 434.654562] R10: 000000007fffffff R11: 0000000000000246 R12: 0000000000000014 [ 434.661816] R13: 0000000000000579 R14: 00000000006fc3f8 R15: 0000000000000012 2018/05/15 08:25:04 executing program 0: perf_event_open$cgroup(&(0x7f0000000240)={0x7, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0xfffffffffffffff9, 0x5, 0x0, 0x5, 0x6, @perf_bp={&(0x7f0000000200), 0x6}, 0x10202, 0x4, 0x4, 0x7, 0xdf, 0x9, 0x3}, 0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x8) 2018/05/15 08:25:04 executing program 3: syz_emit_ethernet(0x3e, &(0x7f00000001c0)={@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, @dev={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa]}, [], {@ipv6={0x86dd, {0x0, 0x6, "50a09c", 0x8, 0xffffff87, 0x0, @remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0xf0], 0xbb}, @local={0xfe, 0x80, [], 0xaa}, {[], @udp={0x0, 0x0, 0x8}}}}}}, &(0x7f0000000040)) 2018/05/15 08:25:04 executing program 4: perf_event_open$cgroup(&(0x7f0000000240)={0x7, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000200)}, 0x0, 0x0, 0x0, 0x7, 0xdf, 0x9, 0x3}, 0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x8) 2018/05/15 08:25:04 executing program 2: syz_emit_ethernet(0x3e, &(0x7f00000001c0)={@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, @dev={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa]}, [], {@ipv6={0x86dd, {0x0, 0x6, "50a09c", 0x8, 0x0, 0x0, @remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x1100], 0xbb}, @local={0xfe, 0x80, [], 0xaa}, {[], @udp={0x0, 0x0, 0x8}}}}}}, &(0x7f0000000040)) 2018/05/15 08:25:04 executing program 6: perf_event_open$cgroup(&(0x7f0000000240)={0x7, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0xfffffffffffffff9, 0x5, 0x0, 0x5, 0x6, @perf_bp={&(0x7f0000000200), 0x6}, 0x10202, 0x4, 0x4, 0x7, 0xdf, 0x9, 0x3}, 0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x8) 2018/05/15 08:25:04 executing program 7: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup(r0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000d40)=@broute={'broute\x00', 0x20, 0x4, 0x928, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000400], 0x0, &(0x7f0000000000), &(0x7f0000000400)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x2, [{{{0x5, 0x0, 0x0, 'bcsh0\x00', 'sit0\x00', 'syzkaller1\x00', 'veth0\x00', @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [0xff, 0xff, 0xff, 0xff], @dev={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0x18}, [0xff, 0x0, 0x0, 0x0, 0x0, 0xff], 0x1d8, 0x228, 0x258, [@comment={'comment\x00', 0x100}, @owner={'owner\x00', 0x18, {{0x0, 0x0, 0x0, 0x0, 0x1, 0x1}}}]}, [@common=@LED={'LED\x00', 0x28, {{'syz0\x00', 0x1, 0x0, 0x800}}}]}, @common=@redirect={'redirect\x00', 0x8, {{0xfffffffffffffffe}}}}, {{{0x11, 0x4, 0x88e7, 'veth1_to_bond\x00', 'erspan0\x00', 'bridge_slave_1\x00', 'veth0_to_bridge\x00', @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [0xff, 0xff, 0x0, 0xff, 0x0, 0xff], @random="cfa071dc33d9", [0xff, 0xff, 0xff, 0xff, 0xff, 0xff], 0x2e0, 0x2e0, 0x330, [@mac={'mac\x00', 0x10, {{@remote={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xbb}, 0x1}}}, @bpf0={'bpf\x00', 0x210, {{0x20, [{0x8000, 0x4902, 0x5, 0x3ff}, {0x5, 0x8, 0x2, 0xff}, {0x1000, 0x48000000000, 0x3}, {0xf7, 0x1f, 0xfffffffffffffe00, 0x1}, {0x10000, 0xfc0, 0x1, 0x6}, {0x4, 0x2, 0xcefa, 0x81}, {0x815, 0xc7, 0x8001, 0x6a0}, {0x40, 0x0, 0x9, 0x80000001}, {0xffffffffffffff53, 0x38a, 0x100000000, 0x7}, {0x5, 0x1, 0x1000, 0x10001}, {0x80000000, 0x7, 0x1, 0xf7}, {0x2, 0x9, 0x4c, 0x5}, {0xfffffffffffffff7, 0x0, 0xe74, 0x52a}, {0x1ff, 0x7, 0x3, 0x7}, {0x6, 0x1ff, 0x49, 0x7}, {0x8000, 0x0, 0x7, 0x684}, {0xffe, 0x988, 0x3, 0x1}, {0x7b, 0x5a07, 0x18, 0x7}, {0xfffffffffffffffe, 0xfff, 0x3, 0x178180a0}, {0x2, 0xc0, 0x6, 0x401}, {0x5, 0x3, 0x8, 0x8}, {0xffffffffffff0001, 0x3, 0xfffffffffffffff7, 0x5}, {0x1ff, 0x8001, 0x3}, {0x3, 0x9, 0xffffffff, 0x2}, {0x5, 0x4, 0x574, 0x64c}, {0x5, 0x4, 0x10001, 0x6}, {0x1, 0x5b2c, 0x3ff, 0x7}, {0xff, 0x2, 0x5, 0x62c5fc18}, {0x101, 0x7, 0x2, 0xfffffffffffffffd}, {0x7fff, 0x6, 0x8, 0x4}, {0x9, 0x0, 0x7, 0xff}, {0x4, 0x4, 0x4, 0x10000}, {0x59b0, 0xfff, 0x4, 0x4}, {0x1f, 0xfffffffffffffffd, 0x8001, 0x800}, {0x0, 0xffffffffffffffff, 0x2, 0x65}, {0x1ff, 0x1, 0x2, 0x7ff}, {0x4, 0x5, 0x1, 0x7be}, {0x9e4, 0x0, 0x7, 0x5}, {0x5, 0x8, 0x7f, 0xffffffff}, {0x4, 0x6, 0x5, 0x7ff}, {0x22aaaf52, 0x8f, 0x6, 0x10000}, {0x2, 0x7, 0xffff}, {0x5, 0xfffffffff016eb50, 0x82, 0x7}, {0x38, 0x800, 0x9a2a, 0xfffffffffffffffc}, {0x5, 0xb, 0x4, 0xfffffffffffff001}, {0x8b5, 0x81, 0x4, 0x2}, {0x8, 0xfffffffffffffff8, 0x1, 0x8}, {0x40, 0x4, 0x1, 0x100000001}, {0x9b, 0x5, 0x1, 0xd64c}, {0x100, 0x8, 0x7, 0x3ff}, {0xf11, 0x200, 0x7, 0x2}, {0xac5, 0x0, 0x3, 0x7}, {0x518, 0x1, 0x80}, {0x6, 0x7f, 0x6, 0x7298}, {0x7, 0x1, 0x2, 0x1ec9}, {0x400, 0x2, 0x6, 0x6c3}, {0x100000001, 0x6, 0x5, 0x9}, {0x8, 0x1dae, 0xfffffffffffffff8, 0x101}, {0x2, 0x7, 0x8, 0x3}, {0x0, 0x45b, 0x7, 0x72}, {0x100000001, 0xc00000000000, 0x100000001, 0x8}, {0x100000001, 0x0, 0xfffffffffffffffc, 0x3}, {0x95, 0x90b, 0x0, 0xfffffffffffff565}, {0x0, 0x4, 0x0, 0x2}], 0x40}}}]}}, @common=@IDLETIMER={'IDLETIMER\x00', 0x28, {{0x7f, 'syz0\x00'}}}}]}, {0x0, '\x00', 0x2, 0xfffffffffffffffc}, {0x0, '\x00', 0x2, 0xffffffffffffffff, 0x2, [{{{0x11, 0x40, 0x87df, 'irlan0\x00', 'sit0\x00', 'veth0_to_team\x00', 'ip6gretap0\x00', @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [0xff, 0xff, 0xff, 0xff, 0x0, 0xff], @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [0x0, 0xff, 0x0, 0xff], 0xb0, 0x210, 0x258, [@time={'time\x00', 0x18, {{0x1ff, 0x1, 0xe063, 0xb6c5, 0x2e80, 0x0, 0x2}}}]}, [@common=@redirect={'redirect\x00', 0x8, {{0xffffffffffffffff}}}, @common=@SECMARK={'SECMARK\x00', 0x108, {{0x1, 0x6, 'system_u:object_r:lost_found_t:s0\x00'}}}]}, @common=@ERROR={'ERROR\x00', 0x20, {"4323eed968d7072e70de82f41331fe3aed2aedc8f2fff16e54b1c4e2ad07"}}}, {{{0x5, 0x54, 0x888d, 'ip6gretap0\x00', 'teql0\x00', 'veth1_to_team\x00', 'erspan0\x00', @random="0eae55d5aac5", [0x0, 0xff, 0x0, 0xff, 0xff, 0xff], @empty, [0xff, 0xff, 0xff, 0x0, 0xff, 0xff], 0x70, 0x70, 0xb8}}, @common=@RATEEST={'RATEEST\x00', 0x20, {{'syz0\x00', 0x9, 0x1, 0x4}}}}]}]}, 0x9a0) 2018/05/15 08:25:04 executing program 0: perf_event_open$cgroup(&(0x7f0000000240)={0x7, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0xfffffffffffffff9, 0x5, 0x0, 0x5, 0x6, @perf_bp={&(0x7f0000000200), 0x6}, 0x10202, 0x4, 0x4, 0x7, 0xdf, 0x9, 0x3}, 0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x8) 2018/05/15 08:25:04 executing program 3: syz_emit_ethernet(0x3e, &(0x7f00000001c0)={@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, @dev={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa]}, [], {@ipv6={0x86dd, {0x0, 0x6, "50a09c", 0x8, 0xffffff87, 0x0, @remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x30], 0xbb}, @local={0xfe, 0x80, [], 0xaa}, {[], @udp={0x0, 0x0, 0x8}}}}}}, &(0x7f0000000040)) 2018/05/15 08:25:04 executing program 6: perf_event_open$cgroup(&(0x7f0000000240)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0xfffffffffffffff9, 0x5, 0x0, 0x5, 0x6, @perf_bp={&(0x7f0000000200), 0x6}, 0x10202, 0x4, 0x4, 0x7, 0xdf, 0x9, 0x3}, 0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x8) 2018/05/15 08:25:04 executing program 4: perf_event_open$cgroup(&(0x7f0000000240)={0x7, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000200)}, 0x0, 0x0, 0x0, 0x0, 0xdf, 0x9, 0x3}, 0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x8) 2018/05/15 08:25:04 executing program 2: syz_emit_ethernet(0x3e, &(0x7f00000001c0)={@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, @dev={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa]}, [], {@ipv6={0x86dd, {0x0, 0x6, "50a09c", 0x8, 0x0, 0x0, @remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x3800000000000000], 0xbb}, @local={0xfe, 0x80, [], 0xaa}, {[], @udp={0x0, 0x0, 0x8}}}}}}, &(0x7f0000000040)) [ 434.962046] FAT-fs (loop1): bogus number of reserved sectors [ 434.967962] FAT-fs (loop1): Can't find a valid FAT filesystem 2018/05/15 08:25:04 executing program 0: perf_event_open$cgroup(&(0x7f0000000240)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0xfffffffffffffff9, 0x5, 0x0, 0x5, 0x6, @perf_bp={&(0x7f0000000200), 0x6}, 0x10202, 0x4, 0x4, 0x7, 0xdf, 0x9, 0x3}, 0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x8) 2018/05/15 08:25:04 executing program 6: perf_event_open$cgroup(&(0x7f0000000240)={0x7, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0xfffffffffffffff9, 0x5, 0x0, 0x5, 0x6, @perf_bp={&(0x7f0000000200), 0x6}, 0x10202, 0x4, 0x4, 0x7, 0xdf, 0x9, 0x3}, 0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x8) 2018/05/15 08:25:04 executing program 4: perf_event_open$cgroup(&(0x7f0000000240)={0x7, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000200)}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x3}, 0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x8) 2018/05/15 08:25:04 executing program 3: syz_emit_ethernet(0x3e, &(0x7f00000001c0)={@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, @dev={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa]}, [], {@ipv6={0x86dd, {0x0, 0x6, "50a09c", 0x8, 0xffffff87, 0x0, @remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x88470000], 0xbb}, @local={0xfe, 0x80, [], 0xaa}, {[], @udp={0x0, 0x0, 0x8}}}}}}, &(0x7f0000000040)) 2018/05/15 08:25:04 executing program 5 (fault-call:1 fault-nth:19): r0 = syz_open_procfs(0x0, &(0x7f0000000280)='net/ptype\x00') sendfile(r0, r0, &(0x7f0000000000)=0xffffffd, 0x7fffffff) 2018/05/15 08:25:04 executing program 2: syz_emit_ethernet(0x3e, &(0x7f00000001c0)={@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, @dev={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa]}, [], {@ipv6={0x86dd, {0x0, 0x6, "50a09c", 0x8, 0x0, 0x0, @remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x1000000], 0xbb}, @local={0xfe, 0x80, [], 0xaa}, {[], @udp={0x0, 0x0, 0x8}}}}}}, &(0x7f0000000040)) 2018/05/15 08:25:04 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f0000000280)="6e65742f6970365f7461626c65735f6d61746368657300b6e23bcf6093cb57f8b4d285e9c48608549acee9a66f09d47a011dcc8f5af7870c6c1b6eebe85ebea4ecda4e44def87e8ee568c843daaf2805944012bc0144937e8b04411d09016ca07f7388ded591e346fb612397e79a6fe43e5c6a86bee1565b17b22b8ed5c95b4afbb3a620d1402c50bbaad790d0ffdb7c5a27e60423079f77bf") unlink(&(0x7f0000000080)='./file0\x00') sendfile(r0, r0, &(0x7f00000000c0)=0x10000000, 0x2) ioctl$KDGKBMETA(r0, 0x4b62, &(0x7f0000000100)) getsockopt$inet_sctp_SCTP_PARTIAL_DELIVERY_POINT(r0, 0x84, 0x13, &(0x7f0000000140)={0x0, 0xfffffffffffffffa}, &(0x7f0000000180)=0x8) syslog(0x2, &(0x7f0000000cc0)=""/107, 0x6b) setsockopt$IP_VS_SO_SET_DEL(r0, 0x0, 0x484, &(0x7f0000000200)={0x87, @dev={0xac, 0x14, 0x14, 0x1a}, 0x4e24, 0x2, 'rr\x00', 0x3, 0x2, 0x66}, 0x2c) [ 435.094773] FAULT_INJECTION: forcing a failure. [ 435.094773] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 435.106719] CPU: 0 PID: 14569 Comm: syz-executor5 Not tainted 4.17.0-rc5+ #51 [ 435.114020] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 435.123377] Call Trace: [ 435.125981] dump_stack+0x1b9/0x294 [ 435.129620] ? dump_stack_print_info.cold.2+0x52/0x52 [ 435.134819] ? find_held_lock+0x36/0x1c0 [ 435.138890] should_fail.cold.4+0xa/0x1a [ 435.142960] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 435.148074] ? graph_lock+0x170/0x170 [ 435.151883] ? kasan_check_read+0x11/0x20 [ 435.156042] ? rcu_bh_force_quiescent_state+0x20/0x20 [ 435.161241] ? find_held_lock+0x36/0x1c0 [ 435.165315] ? __lock_is_held+0xb5/0x140 [ 435.169400] ? check_same_owner+0x320/0x320 [ 435.173738] ? rcu_note_context_switch+0x710/0x710 [ 435.178682] ? __might_sleep+0x95/0x190 [ 435.182665] __alloc_pages_nodemask+0x34e/0xd70 [ 435.187340] ? default_file_splice_read+0x1c7/0xad0 2018/05/15 08:25:04 executing program 7: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup(r0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000d40)=@broute={'broute\x00', 0x20, 0x4, 0x928, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000400], 0x0, &(0x7f0000000000), &(0x7f0000000400)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x2, [{{{0x5, 0x0, 0x0, 'bcsh0\x00', 'sit0\x00', 'syzkaller1\x00', 'veth0\x00', @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [0x0, 0xff, 0xff, 0xff], @dev={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0x18}, [0xff, 0x0, 0x0, 0x0, 0x0, 0xff], 0x1d8, 0x228, 0x258, [@comment={'comment\x00', 0x100}, @owner={'owner\x00', 0x18, {{0x0, 0x0, 0x0, 0x0, 0x1, 0x1}}}]}, [@common=@LED={'LED\x00', 0x28, {{'syz0\x00', 0x1, 0x0, 0x800}}}]}, @common=@redirect={'redirect\x00', 0x8, {{0xfffffffffffffffe}}}}, {{{0x11, 0x4, 0x88e7, 'veth1_to_bond\x00', 'erspan0\x00', 'bridge_slave_1\x00', 'veth0_to_bridge\x00', @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [0xff, 0xff, 0x0, 0xff, 0x0, 0xff], @random="cfa071dc33d9", [0xff, 0xff, 0xff, 0xff, 0xff, 0xff], 0x2e0, 0x2e0, 0x330, [@mac={'mac\x00', 0x10, {{@remote={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xbb}, 0x1}}}, @bpf0={'bpf\x00', 0x210, {{0x20, [{0x8000, 0x4902, 0x5, 0x3ff}, {0x5, 0x8, 0x2, 0xff}, {0x1000, 0x48000000000, 0x3}, {0xf7, 0x1f, 0xfffffffffffffe00, 0x1}, {0x10000, 0xfc0, 0x1, 0x6}, {0x4, 0x2, 0xcefa, 0x81}, {0x815, 0xc7, 0x8001, 0x6a0}, {0x40, 0x0, 0x9, 0x80000001}, {0xffffffffffffff53, 0x38a, 0x100000000, 0x7}, {0x5, 0x1, 0x1000, 0x10001}, {0x80000000, 0x7, 0x1, 0xf7}, {0x2, 0x9, 0x4c, 0x5}, {0xfffffffffffffff7, 0x0, 0xe74, 0x52a}, {0x1ff, 0x7, 0x3, 0x7}, {0x6, 0x1ff, 0x49, 0x7}, {0x8000, 0x0, 0x7, 0x684}, {0xffe, 0x988, 0x3, 0x1}, {0x7b, 0x5a07, 0x18, 0x7}, {0xfffffffffffffffe, 0xfff, 0x3, 0x178180a0}, {0x2, 0xc0, 0x6, 0x401}, {0x5, 0x3, 0x8, 0x8}, {0xffffffffffff0001, 0x3, 0xfffffffffffffff7, 0x5}, {0x1ff, 0x8001, 0x3}, {0x3, 0x9, 0xffffffff, 0x2}, {0x5, 0x4, 0x574, 0x64c}, {0x5, 0x4, 0x10001, 0x6}, {0x1, 0x5b2c, 0x3ff, 0x7}, {0xff, 0x2, 0x5, 0x62c5fc18}, {0x101, 0x7, 0x2, 0xfffffffffffffffd}, {0x7fff, 0x6, 0x8, 0x4}, {0x9, 0x0, 0x7, 0xff}, {0x4, 0x4, 0x4, 0x10000}, {0x59b0, 0xfff, 0x4, 0x4}, {0x1f, 0xfffffffffffffffd, 0x8001, 0x800}, {0x0, 0xffffffffffffffff, 0x2, 0x65}, {0x1ff, 0x1, 0x2, 0x7ff}, {0x4, 0x5, 0x1, 0x7be}, {0x9e4, 0x0, 0x7, 0x5}, {0x5, 0x8, 0x7f, 0xffffffff}, {0x4, 0x6, 0x5, 0x7ff}, {0x22aaaf52, 0x8f, 0x6, 0x10000}, {0x2, 0x7, 0xffff}, {0x5, 0xfffffffff016eb50, 0x82, 0x7}, {0x38, 0x800, 0x9a2a, 0xfffffffffffffffc}, {0x5, 0xb, 0x4, 0xfffffffffffff001}, {0x8b5, 0x81, 0x4, 0x2}, {0x8, 0xfffffffffffffff8, 0x1, 0x8}, {0x40, 0x4, 0x1, 0x100000001}, {0x9b, 0x5, 0x1, 0xd64c}, {0x100, 0x8, 0x7, 0x3ff}, {0xf11, 0x200, 0x7, 0x2}, {0xac5, 0x0, 0x3, 0x7}, {0x518, 0x1, 0x80}, {0x6, 0x7f, 0x6, 0x7298}, {0x7, 0x1, 0x2, 0x1ec9}, {0x400, 0x2, 0x6, 0x6c3}, {0x100000001, 0x6, 0x5, 0x9}, {0x8, 0x1dae, 0xfffffffffffffff8, 0x101}, {0x2, 0x7, 0x8, 0x3}, {0x0, 0x45b, 0x7, 0x72}, {0x100000001, 0xc00000000000, 0x100000001, 0x8}, {0x100000001, 0x0, 0xfffffffffffffffc, 0x3}, {0x95, 0x90b, 0x0, 0xfffffffffffff565}, {0x0, 0x4, 0x0, 0x2}], 0x40}}}]}}, @common=@IDLETIMER={'IDLETIMER\x00', 0x28, {{0x7f, 'syz0\x00'}}}}]}, {0x0, '\x00', 0x2, 0xfffffffffffffffc}, {0x0, '\x00', 0x2, 0xffffffffffffffff, 0x2, [{{{0x11, 0x40, 0x87df, 'irlan0\x00', 'sit0\x00', 'veth0_to_team\x00', 'ip6gretap0\x00', @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [0xff, 0xff, 0xff, 0xff, 0x0, 0xff], @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [0x0, 0xff, 0x0, 0xff], 0xb0, 0x210, 0x258, [@time={'time\x00', 0x18, {{0x1ff, 0x1, 0xe063, 0xb6c5, 0x2e80, 0x0, 0x2}}}]}, [@common=@redirect={'redirect\x00', 0x8, {{0xffffffffffffffff}}}, @common=@SECMARK={'SECMARK\x00', 0x108, {{0x1, 0x6, 'system_u:object_r:lost_found_t:s0\x00'}}}]}, @common=@ERROR={'ERROR\x00', 0x20, {"4323eed968d7072e70de82f41331fe3aed2aedc8f2fff16e54b1c4e2ad07"}}}, {{{0x5, 0x54, 0x888d, 'ip6gretap0\x00', 'teql0\x00', 'veth1_to_team\x00', 'erspan0\x00', @random="0eae55d5aac5", [0x0, 0xff, 0x0, 0xff, 0xff, 0xff], @empty, [0xff, 0xff, 0xff, 0x0, 0xff, 0xff], 0x70, 0x70, 0xb8}}, @common=@RATEEST={'RATEEST\x00', 0x20, {{'syz0\x00', 0x9, 0x1, 0x4}}}}]}]}, 0x9a0) 2018/05/15 08:25:04 executing program 6: perf_event_open$cgroup(&(0x7f0000000240)={0x7, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0xfffffffffffffff9, 0x5, 0x0, 0x5, 0x6, @perf_bp={&(0x7f0000000200), 0x6}, 0x10202, 0x4, 0x4, 0x7, 0xdf, 0x9, 0x3}, 0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x8) 2018/05/15 08:25:04 executing program 0: perf_event_open$cgroup(&(0x7f0000000240)={0x7, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0xfffffffffffffff9, 0x5, 0x0, 0x5, 0x6, @perf_bp={&(0x7f0000000200), 0x6}, 0x10202, 0x4, 0x4, 0x7, 0xdf, 0x9, 0x3}, 0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x8) 2018/05/15 08:25:04 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f0000000280)="6e65742f6970365f7461626c65735f6d61746368657300b6e23bcf6093cb57f8b4d285e9c48608549acee9a66f09d47a011dcc8f5af7870c6c1b6eebe85ebea4ecda4e44def87e8ee568c843daaf2805944012bc0144937e8b04411d09016ca07f7388ded591e346fb612397e79a6fe43e5c6a86bee1565b17b22b8ed5c95b4afbb3a620d1402c50bbaad790d0ffdb7c5a27e60423079f77bf") unlink(&(0x7f0000000080)='./file0\x00') sendfile(r0, r0, &(0x7f00000000c0)=0x10000000, 0x2) ioctl$KDGKBMETA(r0, 0x4b62, &(0x7f0000000100)) getsockopt$inet_sctp_SCTP_PARTIAL_DELIVERY_POINT(r0, 0x84, 0x13, &(0x7f0000000140)={0x0, 0xfffffffffffffffa}, &(0x7f0000000180)=0x8) syslog(0x2, &(0x7f0000000cc0)=""/107, 0x6b) setsockopt$IP_VS_SO_SET_DEL(r0, 0x0, 0x484, &(0x7f0000000200)={0x87, @dev={0xac, 0x14, 0x14, 0x1a}, 0x4e24, 0x2, 'rr\x00', 0x3, 0x2, 0x66}, 0x2c) setsockopt$inet_sctp_SCTP_STREAM_SCHEDULER(r0, 0x84, 0x7b, &(0x7f00000001c0)={r1, 0x40ef2843}, 0x8) setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x40, &(0x7f0000000340)=ANY=[@ANYBLOB="73656375726974790000000000000000000000000000000000000000000000000e00000004000000f8030000fffffffff00000000000000000000000ffffffffffffffff600300006003000060030000ffffffff04000000", @ANYPTR=&(0x7f0000000d40)=ANY=[@ANYBLOB="000000000000000000000000002100ebe70048ca02fec408edfbaf31ba590218fdffffffffffd60000000000000000000000000000000000000000000000000021d13202a6d3d3de0000000000000000000000"], @ANYBLOB="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"], 0x458) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000000)='dctcp\x00', 0x6) [ 435.192369] ? do_splice_to+0x12e/0x190 [ 435.196354] ? splice_direct_to_actor+0x268/0x8d0 [ 435.201209] ? __alloc_pages_slowpath+0x2db0/0x2db0 [ 435.207013] ? __lock_is_held+0xb5/0x140 [ 435.211096] ? __lock_is_held+0xb5/0x140 [ 435.215189] ? rcu_read_lock_sched_held+0x108/0x120 [ 435.220223] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 435.225780] alloc_pages_current+0x10c/0x210 [ 435.230205] push_pipe+0x400/0x7a0 [ 435.233752] ? __kmalloc_node+0x47/0x70 [ 435.237744] iov_iter_get_pages_alloc+0x84a/0x14e0 2018/05/15 08:25:04 executing program 6: perf_event_open$cgroup(&(0x7f0000000240)={0x7, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0xfffffffffffffff9, 0x5, 0x0, 0x5, 0x6, @perf_bp={&(0x7f0000000200), 0x6}, 0x10202, 0x4, 0x4, 0x7, 0xdf, 0x9, 0x3}, 0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x8) [ 435.242697] ? rcu_is_watching+0x85/0x140 [ 435.246873] ? copy_page_to_iter+0xf30/0xf30 [ 435.251296] ? is_bpf_text_address+0xd7/0x170 [ 435.255800] ? kernel_text_address+0x79/0xf0 [ 435.260222] ? __unwind_start+0x166/0x330 [ 435.264386] ? unwind_get_return_address+0x61/0xa0 [ 435.269336] ? __save_stack_trace+0x7e/0xd0 [ 435.273682] ? print_usage_bug+0xc0/0xc0 [ 435.277747] ? save_stack+0xa9/0xd0 [ 435.281378] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 435.286394] ? iov_iter_pipe+0xc2/0x2f0 [ 435.290379] default_file_splice_read+0x1c7/0xad0 2018/05/15 08:25:04 executing program 0: perf_event_open$cgroup(&(0x7f0000000240)={0x7, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0xfffffffffffffff9, 0x5, 0x0, 0x5, 0x6, @perf_bp={&(0x7f0000000200), 0x6}, 0x10202, 0x4, 0x4, 0x7, 0xdf, 0x9, 0x3}, 0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x8) [ 435.295222] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 435.301371] ? print_usage_bug+0xc0/0xc0 [ 435.305447] ? do_splice_direct+0x400/0x400 [ 435.309780] ? debug_mutex_init+0x1c/0x60 [ 435.313935] ? trace_hardirqs_on_caller+0x421/0x5c0 [ 435.318957] ? __lockdep_init_map+0x105/0x590 [ 435.323470] ? lockdep_init_map+0x9/0x10 [ 435.327993] ? debug_mutex_init+0x2d/0x60 [ 435.332152] ? __mutex_init+0x1ef/0x280 [ 435.336134] ? __ia32_sys_membarrier+0x150/0x150 [ 435.340898] ? __lockdep_init_map+0x105/0x590 [ 435.345408] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 435.350974] ? fsnotify+0x415/0xfc0 [ 435.354611] ? fsnotify+0xfc0/0xfc0 [ 435.358246] ? fsnotify_first_mark+0x330/0x330 [ 435.362846] ? security_file_permission+0x1c6/0x240 [ 435.367868] ? rw_verify_area+0x118/0x360 [ 435.372023] ? do_splice_direct+0x400/0x400 [ 435.376354] do_splice_to+0x12e/0x190 [ 435.380172] splice_direct_to_actor+0x268/0x8d0 [ 435.384853] ? pipe_to_sendpage+0x3f0/0x3f0 [ 435.389184] ? do_splice_to+0x190/0x190 [ 435.393171] ? rw_verify_area+0x118/0x360 [ 435.397323] do_splice_direct+0x2cc/0x400 [ 435.401485] ? splice_direct_to_actor+0x8d0/0x8d0 [ 435.406343] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 435.411885] ? __sb_start_write+0x17f/0x300 [ 435.416215] do_sendfile+0x60f/0xe00 [ 435.419940] ? do_compat_pwritev64+0x1b0/0x1b0 [ 435.424530] ? __might_sleep+0x95/0x190 [ 435.428512] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 435.434053] ? _copy_from_user+0xdf/0x150 [ 435.438211] __x64_sys_sendfile64+0x155/0x240 [ 435.442712] ? __ia32_sys_sendfile+0x290/0x290 [ 435.447301] ? do_syscall_64+0x92/0x800 [ 435.451286] do_syscall_64+0x1b1/0x800 [ 435.455180] ? syscall_slow_exit_work+0x4f0/0x4f0 [ 435.460112] ? syscall_return_slowpath+0x5c0/0x5c0 [ 435.465043] ? syscall_return_slowpath+0x30f/0x5c0 [ 435.469974] ? entry_SYSCALL_64_after_hwframe+0x59/0xbe [ 435.475341] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 435.480193] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 435.485385] RIP: 0033:0x455a09 [ 435.488569] RSP: 002b:00007ffbeaa32c68 EFLAGS: 00000246 ORIG_RAX: 0000000000000028 2018/05/15 08:25:04 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f0000000280)="6e65742f6970365f7461626c65735f6d61746368657300b6e23bcf6093cb57f8b4d285e9c48608549acee9a66f09d47a011dcc8f5af7870c6c1b6eebe85ebea4ecda4e44def87e8ee568c843daaf2805944012bc0144937e8b04411d09016ca07f7388ded591e346fb612397e79a6fe43e5c6a86bee1565b17b22b8ed5c95b4afbb3a620d1402c50bbaad790d0ffdb7c5a27e60423079f77bf") unlink(&(0x7f0000000080)='./file0\x00') sendfile(r0, r0, &(0x7f00000000c0)=0x10000000, 0x2) ioctl$KDGKBMETA(r0, 0x4b62, &(0x7f0000000100)) getsockopt$inet_sctp_SCTP_PARTIAL_DELIVERY_POINT(r0, 0x84, 0x13, &(0x7f0000000140)={0x0, 0xfffffffffffffffa}, &(0x7f0000000180)=0x8) syslog(0x2, &(0x7f0000000cc0)=""/107, 0x6b) setsockopt$IP_VS_SO_SET_DEL(r0, 0x0, 0x484, &(0x7f0000000200)={0x87, @dev={0xac, 0x14, 0x14, 0x1a}, 0x4e24, 0x2, 'rr\x00', 0x3, 0x2, 0x66}, 0x2c) setsockopt$inet_sctp_SCTP_STREAM_SCHEDULER(r0, 0x84, 0x7b, &(0x7f00000001c0)={r1, 0x40ef2843}, 0x8) setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x40, &(0x7f0000000340)=ANY=[@ANYBLOB="73656375726974790000000000000000000000000000000000000000000000000e00000004000000f8030000fffffffff00000000000000000000000ffffffffffffffff600300006003000060030000ffffffff04000000", @ANYPTR=&(0x7f0000000d40)=ANY=[@ANYBLOB="000000000000000000000000002100ebe70048ca02fec408edfbaf31ba590218fdffffffffffd60000000000000000000000000000000000000000000000000021d13202a6d3d3de0000000000000000000000"], @ANYBLOB="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"], 0x458) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000000)='dctcp\x00', 0x6) 2018/05/15 08:25:04 executing program 6: perf_event_open$cgroup(&(0x7f0000000240)={0x7, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff9, 0x5, 0x0, 0x5, 0x6, @perf_bp={&(0x7f0000000200), 0x6}, 0x10202, 0x4, 0x4, 0x7, 0xdf, 0x9, 0x3}, 0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x8) 2018/05/15 08:25:04 executing program 0: perf_event_open$cgroup(&(0x7f0000000240)={0x7, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0xfffffffffffffff9, 0x5, 0x0, 0x5, 0x6, @perf_bp={&(0x7f0000000200), 0x6}, 0x10202, 0x4, 0x4, 0x7, 0xdf, 0x9, 0x3}, 0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x8) 2018/05/15 08:25:04 executing program 3: syz_emit_ethernet(0x3e, &(0x7f00000001c0)={@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, @dev={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa]}, [], {@ipv6={0x86dd, {0x0, 0x6, "50a09c", 0x8, 0xffffff87, 0x0, @remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x11000000], 0xbb}, @local={0xfe, 0x80, [], 0xaa}, {[], @udp={0x0, 0x0, 0x8}}}}}}, &(0x7f0000000040)) 2018/05/15 08:25:04 executing program 2: syz_emit_ethernet(0x3e, &(0x7f00000001c0)={@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, @dev={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa]}, [], {@ipv6={0x86dd, {0x0, 0x6, "50a09c", 0x8, 0x0, 0x0, @remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0xdc05], 0xbb}, @local={0xfe, 0x80, [], 0xaa}, {[], @udp={0x0, 0x0, 0x8}}}}}}, &(0x7f0000000040)) 2018/05/15 08:25:04 executing program 4: perf_event_open$cgroup(&(0x7f0000000240)={0x7, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000200)}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x8) 2018/05/15 08:25:04 executing program 5 (fault-call:1 fault-nth:20): r0 = syz_open_procfs(0x0, &(0x7f0000000280)='net/ptype\x00') sendfile(r0, r0, &(0x7f0000000000)=0xffffffd, 0x7fffffff) 2018/05/15 08:25:04 executing program 7: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup(r0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000d40)=@broute={'broute\x00', 0x20, 0x4, 0x928, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000400], 0x0, &(0x7f0000000000), &(0x7f0000000400)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x2, [{{{0x5, 0x0, 0x0, 'bcsh0\x00', 'sit0\x00', 'syzkaller1\x00', 'veth0\x00', @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [0x0, 0x0, 0xff, 0xff], @dev={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0x18}, [0xff, 0x0, 0x0, 0x0, 0x0, 0xff], 0x1d8, 0x228, 0x258, [@comment={'comment\x00', 0x100}, @owner={'owner\x00', 0x18, {{0x0, 0x0, 0x0, 0x0, 0x1, 0x1}}}]}, [@common=@LED={'LED\x00', 0x28, {{'syz0\x00', 0x1, 0x0, 0x800}}}]}, @common=@redirect={'redirect\x00', 0x8, {{0xfffffffffffffffe}}}}, {{{0x11, 0x4, 0x88e7, 'veth1_to_bond\x00', 'erspan0\x00', 'bridge_slave_1\x00', 'veth0_to_bridge\x00', @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [0xff, 0xff, 0x0, 0xff, 0x0, 0xff], @random="cfa071dc33d9", [0xff, 0xff, 0xff, 0xff, 0xff, 0xff], 0x2e0, 0x2e0, 0x330, [@mac={'mac\x00', 0x10, {{@remote={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xbb}, 0x1}}}, @bpf0={'bpf\x00', 0x210, {{0x20, [{0x8000, 0x4902, 0x5, 0x3ff}, {0x5, 0x8, 0x2, 0xff}, {0x1000, 0x48000000000, 0x3}, {0xf7, 0x1f, 0xfffffffffffffe00, 0x1}, {0x10000, 0xfc0, 0x1, 0x6}, {0x4, 0x2, 0xcefa, 0x81}, {0x815, 0xc7, 0x8001, 0x6a0}, {0x40, 0x0, 0x9, 0x80000001}, {0xffffffffffffff53, 0x38a, 0x100000000, 0x7}, {0x5, 0x1, 0x1000, 0x10001}, {0x80000000, 0x7, 0x1, 0xf7}, {0x2, 0x9, 0x4c, 0x5}, {0xfffffffffffffff7, 0x0, 0xe74, 0x52a}, {0x1ff, 0x7, 0x3, 0x7}, {0x6, 0x1ff, 0x49, 0x7}, {0x8000, 0x0, 0x7, 0x684}, {0xffe, 0x988, 0x3, 0x1}, {0x7b, 0x5a07, 0x18, 0x7}, {0xfffffffffffffffe, 0xfff, 0x3, 0x178180a0}, {0x2, 0xc0, 0x6, 0x401}, {0x5, 0x3, 0x8, 0x8}, {0xffffffffffff0001, 0x3, 0xfffffffffffffff7, 0x5}, {0x1ff, 0x8001, 0x3}, {0x3, 0x9, 0xffffffff, 0x2}, {0x5, 0x4, 0x574, 0x64c}, {0x5, 0x4, 0x10001, 0x6}, {0x1, 0x5b2c, 0x3ff, 0x7}, {0xff, 0x2, 0x5, 0x62c5fc18}, {0x101, 0x7, 0x2, 0xfffffffffffffffd}, {0x7fff, 0x6, 0x8, 0x4}, {0x9, 0x0, 0x7, 0xff}, {0x4, 0x4, 0x4, 0x10000}, {0x59b0, 0xfff, 0x4, 0x4}, {0x1f, 0xfffffffffffffffd, 0x8001, 0x800}, {0x0, 0xffffffffffffffff, 0x2, 0x65}, {0x1ff, 0x1, 0x2, 0x7ff}, {0x4, 0x5, 0x1, 0x7be}, {0x9e4, 0x0, 0x7, 0x5}, {0x5, 0x8, 0x7f, 0xffffffff}, {0x4, 0x6, 0x5, 0x7ff}, {0x22aaaf52, 0x8f, 0x6, 0x10000}, {0x2, 0x7, 0xffff}, {0x5, 0xfffffffff016eb50, 0x82, 0x7}, {0x38, 0x800, 0x9a2a, 0xfffffffffffffffc}, {0x5, 0xb, 0x4, 0xfffffffffffff001}, {0x8b5, 0x81, 0x4, 0x2}, {0x8, 0xfffffffffffffff8, 0x1, 0x8}, {0x40, 0x4, 0x1, 0x100000001}, {0x9b, 0x5, 0x1, 0xd64c}, {0x100, 0x8, 0x7, 0x3ff}, {0xf11, 0x200, 0x7, 0x2}, {0xac5, 0x0, 0x3, 0x7}, {0x518, 0x1, 0x80}, {0x6, 0x7f, 0x6, 0x7298}, {0x7, 0x1, 0x2, 0x1ec9}, {0x400, 0x2, 0x6, 0x6c3}, {0x100000001, 0x6, 0x5, 0x9}, {0x8, 0x1dae, 0xfffffffffffffff8, 0x101}, {0x2, 0x7, 0x8, 0x3}, {0x0, 0x45b, 0x7, 0x72}, {0x100000001, 0xc00000000000, 0x100000001, 0x8}, {0x100000001, 0x0, 0xfffffffffffffffc, 0x3}, {0x95, 0x90b, 0x0, 0xfffffffffffff565}, {0x0, 0x4, 0x0, 0x2}], 0x40}}}]}}, @common=@IDLETIMER={'IDLETIMER\x00', 0x28, {{0x7f, 'syz0\x00'}}}}]}, {0x0, '\x00', 0x2, 0xfffffffffffffffc}, {0x0, '\x00', 0x2, 0xffffffffffffffff, 0x2, [{{{0x11, 0x40, 0x87df, 'irlan0\x00', 'sit0\x00', 'veth0_to_team\x00', 'ip6gretap0\x00', @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [0xff, 0xff, 0xff, 0xff, 0x0, 0xff], @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [0x0, 0xff, 0x0, 0xff], 0xb0, 0x210, 0x258, [@time={'time\x00', 0x18, {{0x1ff, 0x1, 0xe063, 0xb6c5, 0x2e80, 0x0, 0x2}}}]}, [@common=@redirect={'redirect\x00', 0x8, {{0xffffffffffffffff}}}, @common=@SECMARK={'SECMARK\x00', 0x108, {{0x1, 0x6, 'system_u:object_r:lost_found_t:s0\x00'}}}]}, @common=@ERROR={'ERROR\x00', 0x20, {"4323eed968d7072e70de82f41331fe3aed2aedc8f2fff16e54b1c4e2ad07"}}}, {{{0x5, 0x54, 0x888d, 'ip6gretap0\x00', 'teql0\x00', 'veth1_to_team\x00', 'erspan0\x00', @random="0eae55d5aac5", [0x0, 0xff, 0x0, 0xff, 0xff, 0xff], @empty, [0xff, 0xff, 0xff, 0x0, 0xff, 0xff], 0x70, 0x70, 0xb8}}, @common=@RATEEST={'RATEEST\x00', 0x20, {{'syz0\x00', 0x9, 0x1, 0x4}}}}]}]}, 0x9a0) [ 435.496283] RAX: ffffffffffffffda RBX: 00007ffbeaa336d4 RCX: 0000000000455a09 [ 435.503552] RDX: 0000000020000000 RSI: 0000000000000013 RDI: 0000000000000013 [ 435.510823] RBP: 000000000072bea0 R08: 0000000000000000 R09: 0000000000000000 [ 435.518096] R10: 000000007fffffff R11: 0000000000000246 R12: 0000000000000014 [ 435.525370] R13: 0000000000000579 R14: 00000000006fc3f8 R15: 0000000000000013 [ 435.604382] FAULT_INJECTION: forcing a failure. [ 435.604382] name failslab, interval 1, probability 0, space 0, times 0 [ 435.615755] CPU: 1 PID: 14621 Comm: syz-executor5 Not tainted 4.17.0-rc5+ #51 [ 435.623041] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 435.632397] Call Trace: [ 435.634991] dump_stack+0x1b9/0x294 [ 435.638636] ? dump_stack_print_info.cold.2+0x52/0x52 [ 435.643825] ? lock_release+0xa10/0xa10 [ 435.647788] should_fail.cold.4+0xa/0x1a [ 435.651836] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 435.656929] ? kasan_check_write+0x14/0x20 [ 435.661150] ? __mutex_lock+0x7d9/0x17f0 [ 435.665984] ? graph_lock+0x170/0x170 [ 435.669771] ? seq_read+0xd5/0x1520 [ 435.673385] ? find_held_lock+0x36/0x1c0 [ 435.677431] ? __lock_is_held+0xb5/0x140 [ 435.681487] ? check_same_owner+0x320/0x320 [ 435.685794] ? rcu_note_context_switch+0x710/0x710 [ 435.690710] __should_failslab+0x124/0x180 [ 435.694934] should_failslab+0x9/0x14 [ 435.698725] kmem_cache_alloc_node_trace+0x26f/0x770 [ 435.703812] ? save_stack+0x43/0xd0 [ 435.707421] ? kasan_kmalloc+0xc4/0xe0 [ 435.711293] ? __kmalloc+0x14e/0x760 [ 435.714987] ? rw_copy_check_uvector+0x31e/0x3a0 [ 435.719731] ? import_iovec+0xc3/0x420 [ 435.723610] __kmalloc_node+0x33/0x70 [ 435.727397] kvmalloc_node+0x6b/0x100 [ 435.731389] traverse+0x4e3/0xa80 [ 435.734834] ? graph_lock+0x170/0x170 [ 435.738626] ? seq_open+0x1c0/0x1c0 [ 435.742242] ? seq_file_path+0x30/0x30 [ 435.746118] seq_read+0xf14/0x1520 [ 435.749647] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 435.755173] ? seq_file_path+0x30/0x30 [ 435.759051] ? fsnotify_first_mark+0x330/0x330 [ 435.763623] ? _copy_from_user+0xdf/0x150 [ 435.767760] ? seq_file_path+0x30/0x30 [ 435.771631] proc_reg_read+0x10a/0x190 [ 435.775506] do_iter_read+0x4a3/0x660 [ 435.779301] vfs_readv+0x14f/0x1a0 [ 435.782827] ? compat_rw_copy_check_uvector+0x420/0x420 [ 435.788173] ? is_bpf_text_address+0xd7/0x170 [ 435.792654] ? kernel_text_address+0x79/0xf0 [ 435.797046] ? __unwind_start+0x166/0x330 [ 435.801181] ? __save_stack_trace+0x7e/0xd0 [ 435.805495] ? print_usage_bug+0xc0/0xc0 [ 435.809541] ? save_stack+0xa9/0xd0 [ 435.813155] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 435.818161] ? iov_iter_pipe+0xc2/0x2f0 [ 435.822122] default_file_splice_read+0x514/0xad0 [ 435.826950] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 435.832297] ? print_usage_bug+0xc0/0xc0 [ 435.836350] ? do_splice_direct+0x400/0x400 [ 435.840656] ? debug_mutex_init+0x1c/0x60 [ 435.844788] ? __lockdep_init_map+0x105/0x590 [ 435.849269] ? lockdep_init_map+0x9/0x10 [ 435.853313] ? debug_mutex_init+0x2d/0x60 [ 435.857451] ? __mutex_init+0x1ef/0x280 [ 435.861412] ? __ia32_sys_membarrier+0x150/0x150 [ 435.866154] ? __lockdep_init_map+0x105/0x590 [ 435.870643] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 435.876165] ? fsnotify+0x415/0xfc0 [ 435.879792] ? rw_verify_area+0x118/0x360 [ 435.883924] ? do_splice_direct+0x400/0x400 [ 435.888406] do_splice_to+0x12e/0x190 [ 435.892196] splice_direct_to_actor+0x268/0x8d0 [ 435.896855] ? pipe_to_sendpage+0x3f0/0x3f0 [ 435.901164] ? do_splice_to+0x190/0x190 [ 435.905125] ? rw_verify_area+0x118/0x360 [ 435.909261] do_splice_direct+0x2cc/0x400 [ 435.913398] ? splice_direct_to_actor+0x8d0/0x8d0 [ 435.918230] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 435.923751] ? __sb_start_write+0x17f/0x300 [ 435.928059] do_sendfile+0x60f/0xe00 [ 435.931769] ? do_compat_pwritev64+0x1b0/0x1b0 [ 435.936337] ? __might_sleep+0x95/0x190 [ 435.940308] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 435.945829] ? _copy_from_user+0xdf/0x150 [ 435.949961] __x64_sys_sendfile64+0x155/0x240 [ 435.954438] ? __ia32_sys_sendfile+0x290/0x290 [ 435.959012] ? do_syscall_64+0x92/0x800 [ 435.962976] do_syscall_64+0x1b1/0x800 [ 435.966845] ? finish_task_switch+0x1ca/0x840 [ 435.971326] ? syscall_return_slowpath+0x5c0/0x5c0 [ 435.976240] ? syscall_return_slowpath+0x30f/0x5c0 [ 435.981159] ? entry_SYSCALL_64_after_hwframe+0x59/0xbe [ 435.986516] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 435.991346] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 435.996518] RIP: 0033:0x455a09 2018/05/15 08:25:05 executing program 2: syz_emit_ethernet(0x3e, &(0x7f00000001c0)={@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, @dev={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa]}, [], {@ipv6={0x86dd, {0x0, 0x6, "50a09c", 0x8, 0x0, 0x0, @remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x300], 0xbb}, @local={0xfe, 0x80, [], 0xaa}, {[], @udp={0x0, 0x0, 0x8}}}}}}, &(0x7f0000000040)) 2018/05/15 08:25:05 executing program 0: perf_event_open$cgroup(&(0x7f0000000240)={0x7, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff9, 0x5, 0x0, 0x5, 0x6, @perf_bp={&(0x7f0000000200), 0x6}, 0x10202, 0x4, 0x4, 0x7, 0xdf, 0x9, 0x3}, 0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x8) 2018/05/15 08:25:05 executing program 6: perf_event_open$cgroup(&(0x7f0000000240)={0x7, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff9, 0x5, 0x0, 0x5, 0x6, @perf_bp={&(0x7f0000000200), 0x6}, 0x10202, 0x4, 0x4, 0x7, 0xdf, 0x9, 0x3}, 0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x8) [ 435.999688] RSP: 002b:00007ffbeaa32c68 EFLAGS: 00000246 ORIG_RAX: 0000000000000028 [ 436.007382] RAX: ffffffffffffffda RBX: 00007ffbeaa336d4 RCX: 0000000000455a09 [ 436.014633] RDX: 0000000020000000 RSI: 0000000000000013 RDI: 0000000000000013 [ 436.021888] RBP: 000000000072bea0 R08: 0000000000000000 R09: 0000000000000000 [ 436.029139] R10: 000000007fffffff R11: 0000000000000246 R12: 0000000000000014 [ 436.036389] R13: 0000000000000579 R14: 00000000006fc3f8 R15: 0000000000000014 2018/05/15 08:25:05 executing program 4: perf_event_open$cgroup(&(0x7f0000000240)={0x7, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000200)}}, 0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x8) 2018/05/15 08:25:05 executing program 7: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup(r0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000d40)=@broute={'broute\x00', 0x20, 0x4, 0x928, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000400], 0x0, &(0x7f0000000000), &(0x7f0000000400)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x2, [{{{0x5, 0x0, 0x0, 'bcsh0\x00', 'sit0\x00', 'syzkaller1\x00', 'veth0\x00', @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [0x0, 0x0, 0x0, 0xff], @dev={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0x18}, [0xff, 0x0, 0x0, 0x0, 0x0, 0xff], 0x1d8, 0x228, 0x258, [@comment={'comment\x00', 0x100}, @owner={'owner\x00', 0x18, {{0x0, 0x0, 0x0, 0x0, 0x1, 0x1}}}]}, [@common=@LED={'LED\x00', 0x28, {{'syz0\x00', 0x1, 0x0, 0x800}}}]}, @common=@redirect={'redirect\x00', 0x8, {{0xfffffffffffffffe}}}}, {{{0x11, 0x4, 0x88e7, 'veth1_to_bond\x00', 'erspan0\x00', 'bridge_slave_1\x00', 'veth0_to_bridge\x00', @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [0xff, 0xff, 0x0, 0xff, 0x0, 0xff], @random="cfa071dc33d9", [0xff, 0xff, 0xff, 0xff, 0xff, 0xff], 0x2e0, 0x2e0, 0x330, [@mac={'mac\x00', 0x10, {{@remote={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xbb}, 0x1}}}, @bpf0={'bpf\x00', 0x210, {{0x20, [{0x8000, 0x4902, 0x5, 0x3ff}, {0x5, 0x8, 0x2, 0xff}, {0x1000, 0x48000000000, 0x3}, {0xf7, 0x1f, 0xfffffffffffffe00, 0x1}, {0x10000, 0xfc0, 0x1, 0x6}, {0x4, 0x2, 0xcefa, 0x81}, {0x815, 0xc7, 0x8001, 0x6a0}, {0x40, 0x0, 0x9, 0x80000001}, {0xffffffffffffff53, 0x38a, 0x100000000, 0x7}, {0x5, 0x1, 0x1000, 0x10001}, {0x80000000, 0x7, 0x1, 0xf7}, {0x2, 0x9, 0x4c, 0x5}, {0xfffffffffffffff7, 0x0, 0xe74, 0x52a}, {0x1ff, 0x7, 0x3, 0x7}, {0x6, 0x1ff, 0x49, 0x7}, {0x8000, 0x0, 0x7, 0x684}, {0xffe, 0x988, 0x3, 0x1}, {0x7b, 0x5a07, 0x18, 0x7}, {0xfffffffffffffffe, 0xfff, 0x3, 0x178180a0}, {0x2, 0xc0, 0x6, 0x401}, {0x5, 0x3, 0x8, 0x8}, {0xffffffffffff0001, 0x3, 0xfffffffffffffff7, 0x5}, {0x1ff, 0x8001, 0x3}, {0x3, 0x9, 0xffffffff, 0x2}, {0x5, 0x4, 0x574, 0x64c}, {0x5, 0x4, 0x10001, 0x6}, {0x1, 0x5b2c, 0x3ff, 0x7}, {0xff, 0x2, 0x5, 0x62c5fc18}, {0x101, 0x7, 0x2, 0xfffffffffffffffd}, {0x7fff, 0x6, 0x8, 0x4}, {0x9, 0x0, 0x7, 0xff}, {0x4, 0x4, 0x4, 0x10000}, {0x59b0, 0xfff, 0x4, 0x4}, {0x1f, 0xfffffffffffffffd, 0x8001, 0x800}, {0x0, 0xffffffffffffffff, 0x2, 0x65}, {0x1ff, 0x1, 0x2, 0x7ff}, {0x4, 0x5, 0x1, 0x7be}, {0x9e4, 0x0, 0x7, 0x5}, {0x5, 0x8, 0x7f, 0xffffffff}, {0x4, 0x6, 0x5, 0x7ff}, {0x22aaaf52, 0x8f, 0x6, 0x10000}, {0x2, 0x7, 0xffff}, {0x5, 0xfffffffff016eb50, 0x82, 0x7}, {0x38, 0x800, 0x9a2a, 0xfffffffffffffffc}, {0x5, 0xb, 0x4, 0xfffffffffffff001}, {0x8b5, 0x81, 0x4, 0x2}, {0x8, 0xfffffffffffffff8, 0x1, 0x8}, {0x40, 0x4, 0x1, 0x100000001}, {0x9b, 0x5, 0x1, 0xd64c}, {0x100, 0x8, 0x7, 0x3ff}, {0xf11, 0x200, 0x7, 0x2}, {0xac5, 0x0, 0x3, 0x7}, {0x518, 0x1, 0x80}, {0x6, 0x7f, 0x6, 0x7298}, {0x7, 0x1, 0x2, 0x1ec9}, {0x400, 0x2, 0x6, 0x6c3}, {0x100000001, 0x6, 0x5, 0x9}, {0x8, 0x1dae, 0xfffffffffffffff8, 0x101}, {0x2, 0x7, 0x8, 0x3}, {0x0, 0x45b, 0x7, 0x72}, {0x100000001, 0xc00000000000, 0x100000001, 0x8}, {0x100000001, 0x0, 0xfffffffffffffffc, 0x3}, {0x95, 0x90b, 0x0, 0xfffffffffffff565}, {0x0, 0x4, 0x0, 0x2}], 0x40}}}]}}, @common=@IDLETIMER={'IDLETIMER\x00', 0x28, {{0x7f, 'syz0\x00'}}}}]}, {0x0, '\x00', 0x2, 0xfffffffffffffffc}, {0x0, '\x00', 0x2, 0xffffffffffffffff, 0x2, [{{{0x11, 0x40, 0x87df, 'irlan0\x00', 'sit0\x00', 'veth0_to_team\x00', 'ip6gretap0\x00', @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [0xff, 0xff, 0xff, 0xff, 0x0, 0xff], @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [0x0, 0xff, 0x0, 0xff], 0xb0, 0x210, 0x258, [@time={'time\x00', 0x18, {{0x1ff, 0x1, 0xe063, 0xb6c5, 0x2e80, 0x0, 0x2}}}]}, [@common=@redirect={'redirect\x00', 0x8, {{0xffffffffffffffff}}}, @common=@SECMARK={'SECMARK\x00', 0x108, {{0x1, 0x6, 'system_u:object_r:lost_found_t:s0\x00'}}}]}, @common=@ERROR={'ERROR\x00', 0x20, {"4323eed968d7072e70de82f41331fe3aed2aedc8f2fff16e54b1c4e2ad07"}}}, {{{0x5, 0x54, 0x888d, 'ip6gretap0\x00', 'teql0\x00', 'veth1_to_team\x00', 'erspan0\x00', @random="0eae55d5aac5", [0x0, 0xff, 0x0, 0xff, 0xff, 0xff], @empty, [0xff, 0xff, 0xff, 0x0, 0xff, 0xff], 0x70, 0x70, 0xb8}}, @common=@RATEEST={'RATEEST\x00', 0x20, {{'syz0\x00', 0x9, 0x1, 0x4}}}}]}]}, 0x9a0) 2018/05/15 08:25:05 executing program 5 (fault-call:1 fault-nth:21): r0 = syz_open_procfs(0x0, &(0x7f0000000280)='net/ptype\x00') sendfile(r0, r0, &(0x7f0000000000)=0xffffffd, 0x7fffffff) 2018/05/15 08:25:05 executing program 3: syz_emit_ethernet(0x3e, &(0x7f00000001c0)={@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, @dev={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa]}, [], {@ipv6={0x86dd, {0x0, 0x6, "50a09c", 0x8, 0xffffff87, 0x0, @remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x43050000], 0xbb}, @local={0xfe, 0x80, [], 0xaa}, {[], @udp={0x0, 0x0, 0x8}}}}}}, &(0x7f0000000040)) 2018/05/15 08:25:05 executing program 0: perf_event_open$cgroup(&(0x7f0000000240)={0x7, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x5, 0x6, @perf_bp={&(0x7f0000000200), 0x6}, 0x10202, 0x4, 0x4, 0x7, 0xdf, 0x9, 0x3}, 0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x8) [ 436.205365] FAULT_INJECTION: forcing a failure. [ 436.205365] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 436.217217] CPU: 0 PID: 14641 Comm: syz-executor5 Not tainted 4.17.0-rc5+ #51 [ 436.224500] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 436.238110] Call Trace: [ 436.240716] dump_stack+0x1b9/0x294 [ 436.244360] ? dump_stack_print_info.cold.2+0x52/0x52 [ 436.249568] ? debug_check_no_locks_freed+0x310/0x310 [ 436.254774] should_fail.cold.4+0xa/0x1a [ 436.258848] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 436.263972] ? find_held_lock+0x36/0x1c0 [ 436.268040] ? graph_lock+0x170/0x170 [ 436.271862] ? lock_acquire+0x1dc/0x520 [ 436.275851] ? lock_downgrade+0x8e0/0x8e0 [ 436.280013] ? find_held_lock+0x36/0x1c0 [ 436.284105] __alloc_pages_nodemask+0x34e/0xd70 [ 436.288788] ? kasan_check_read+0x11/0x20 [ 436.292944] ? __alloc_pages_slowpath+0x2db0/0x2db0 [ 436.297979] ? rcu_read_unlock+0x35/0x70 [ 436.302051] ? __lock_is_held+0xb5/0x140 [ 436.306137] ? check_same_owner+0x320/0x320 [ 436.310474] cache_grow_begin+0x72/0x6c0 [ 436.314552] kmem_cache_alloc_node_trace+0x692/0x770 [ 436.319666] ? save_stack+0x43/0xd0 [ 436.323299] ? __kmalloc+0x14e/0x760 [ 436.327019] ? rw_copy_check_uvector+0x31e/0x3a0 [ 436.331795] __kmalloc_node+0x33/0x70 [ 436.335598] kvmalloc_node+0x6b/0x100 [ 436.339400] traverse+0x4e3/0xa80 [ 436.342949] ? graph_lock+0x170/0x170 [ 436.346760] ? seq_open+0x1c0/0x1c0 [ 436.350409] ? seq_file_path+0x30/0x30 [ 436.354310] seq_read+0xf14/0x1520 [ 436.357868] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 436.363412] ? seq_file_path+0x30/0x30 [ 436.367283] ? fsnotify_first_mark+0x330/0x330 [ 436.371853] ? _copy_from_user+0xdf/0x150 [ 436.375997] ? seq_file_path+0x30/0x30 [ 436.379884] proc_reg_read+0x10a/0x190 [ 436.383754] do_iter_read+0x4a3/0x660 [ 436.387544] vfs_readv+0x14f/0x1a0 [ 436.391072] ? compat_rw_copy_check_uvector+0x420/0x420 [ 436.396417] ? is_bpf_text_address+0xd7/0x170 [ 436.400898] ? kernel_text_address+0x79/0xf0 [ 436.405300] ? __unwind_start+0x166/0x330 [ 436.409433] ? __save_stack_trace+0x7e/0xd0 [ 436.413750] ? print_usage_bug+0xc0/0xc0 [ 436.417794] ? save_stack+0xa9/0xd0 [ 436.421413] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 436.426412] ? iov_iter_pipe+0xc2/0x2f0 [ 436.430369] default_file_splice_read+0x514/0xad0 [ 436.435193] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 436.440540] ? print_usage_bug+0xc0/0xc0 [ 436.444587] ? do_splice_direct+0x400/0x400 [ 436.448899] ? debug_mutex_init+0x1c/0x60 [ 436.453047] ? __lockdep_init_map+0x105/0x590 [ 436.457527] ? lockdep_init_map+0x9/0x10 [ 436.461566] ? debug_mutex_init+0x2d/0x60 [ 436.465692] ? __mutex_init+0x1ef/0x280 [ 436.469647] ? __ia32_sys_membarrier+0x150/0x150 [ 436.474382] ? __lockdep_init_map+0x105/0x590 [ 436.478863] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 436.484380] ? fsnotify+0x415/0xfc0 [ 436.487999] ? rw_verify_area+0x118/0x360 [ 436.492137] ? do_splice_direct+0x400/0x400 [ 436.496450] do_splice_to+0x12e/0x190 [ 436.500242] splice_direct_to_actor+0x268/0x8d0 [ 436.504914] ? pipe_to_sendpage+0x3f0/0x3f0 [ 436.509242] ? do_splice_to+0x190/0x190 [ 436.513212] ? rw_verify_area+0x118/0x360 [ 436.517345] do_splice_direct+0x2cc/0x400 [ 436.521478] ? splice_direct_to_actor+0x8d0/0x8d0 [ 436.526305] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 436.531832] ? __sb_start_write+0x17f/0x300 [ 436.536137] do_sendfile+0x60f/0xe00 [ 436.539834] ? do_compat_pwritev64+0x1b0/0x1b0 [ 436.544396] ? __might_sleep+0x95/0x190 [ 436.548355] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 436.553874] ? _copy_from_user+0xdf/0x150 [ 436.558007] __x64_sys_sendfile64+0x155/0x240 [ 436.562498] ? __ia32_sys_sendfile+0x290/0x290 [ 436.567061] ? do_syscall_64+0x92/0x800 [ 436.571042] do_syscall_64+0x1b1/0x800 [ 436.574910] ? finish_task_switch+0x1ca/0x840 [ 436.579386] ? syscall_return_slowpath+0x5c0/0x5c0 [ 436.584293] ? syscall_return_slowpath+0x30f/0x5c0 [ 436.589203] ? entry_SYSCALL_64_after_hwframe+0x59/0xbe [ 436.594547] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 436.599382] entry_SYSCALL_64_after_hwframe+0x49/0xbe 2018/05/15 08:25:05 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f0000000280)="6e65742f6970365f7461626c65735f6d61746368657300b6e23bcf6093cb57f8b4d285e9c48608549acee9a66f09d47a011dcc8f5af7870c6c1b6eebe85ebea4ecda4e44def87e8ee568c843daaf2805944012bc0144937e8b04411d09016ca07f7388ded591e346fb612397e79a6fe43e5c6a86bee1565b17b22b8ed5c95b4afbb3a620d1402c50bbaad790d0ffdb7c5a27e60423079f77bf") unlink(&(0x7f0000000080)='./file0\x00') sendfile(r0, r0, &(0x7f00000000c0)=0x10000000, 0x2) ioctl$KDGKBMETA(r0, 0x4b62, &(0x7f0000000100)) getsockopt$inet_sctp_SCTP_PARTIAL_DELIVERY_POINT(r0, 0x84, 0x13, &(0x7f0000000140)={0x0, 0xfffffffffffffffa}, &(0x7f0000000180)=0x8) syslog(0x2, &(0x7f0000000cc0)=""/107, 0x6b) setsockopt$IP_VS_SO_SET_DEL(r0, 0x0, 0x484, &(0x7f0000000200)={0x87, @dev={0xac, 0x14, 0x14, 0x1a}, 0x4e24, 0x2, 'rr\x00', 0x3, 0x2, 0x66}, 0x2c) setsockopt$inet_sctp_SCTP_STREAM_SCHEDULER(r0, 0x84, 0x7b, &(0x7f00000001c0)={r1, 0x40ef2843}, 0x8) setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x40, &(0x7f0000000340)=ANY=[@ANYBLOB="73656375726974790000000000000000000000000000000000000000000000000e00000004000000f8030000fffffffff00000000000000000000000ffffffffffffffff600300006003000060030000ffffffff04000000", @ANYPTR=&(0x7f0000000d40)=ANY=[@ANYBLOB="000000000000000000000000002100ebe70048ca02fec408edfbaf31ba590218fdffffffffffd60000000000000000000000000000000000000000000000000021d13202a6d3d3de0000000000000000000000"], @ANYBLOB="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"], 0x458) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000000)='dctcp\x00', 0x6) 2018/05/15 08:25:05 executing program 2: syz_emit_ethernet(0x3e, &(0x7f00000001c0)={@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, @dev={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa]}, [], {@ipv6={0x86dd, {0x0, 0x6, "50a09c", 0x8, 0x0, 0x0, @remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x700], 0xbb}, @local={0xfe, 0x80, [], 0xaa}, {[], @udp={0x0, 0x0, 0x8}}}}}}, &(0x7f0000000040)) 2018/05/15 08:25:05 executing program 0: perf_event_open$cgroup(&(0x7f0000000240)={0x7, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x5, 0x6, @perf_bp={&(0x7f0000000200), 0x6}, 0x10202, 0x4, 0x4, 0x7, 0xdf, 0x9, 0x3}, 0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x8) 2018/05/15 08:25:05 executing program 6: perf_event_open$cgroup(&(0x7f0000000240)={0x7, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x5, 0x6, @perf_bp={&(0x7f0000000200), 0x6}, 0x10202, 0x4, 0x4, 0x7, 0xdf, 0x9, 0x3}, 0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x8) 2018/05/15 08:25:05 executing program 3: syz_emit_ethernet(0x3e, &(0x7f00000001c0)={@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, @dev={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa]}, [], {@ipv6={0x86dd, {0x0, 0x6, "50a09c", 0x8, 0xffffff87, 0x0, @remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x3000], 0xbb}, @local={0xfe, 0x80, [], 0xaa}, {[], @udp={0x0, 0x0, 0x8}}}}}}, &(0x7f0000000040)) 2018/05/15 08:25:05 executing program 4: perf_event_open$cgroup(&(0x7f0000000240)={0x7, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000200)}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x8) 2018/05/15 08:25:05 executing program 7: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup(r0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000d40)=@broute={'broute\x00', 0x20, 0x4, 0x928, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000400], 0x0, &(0x7f0000000000), &(0x7f0000000400)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x2, [{{{0x5, 0x0, 0x0, 'bcsh0\x00', 'sit0\x00', 'syzkaller1\x00', 'veth0\x00', @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [], @dev={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0x18}, [0xff, 0x0, 0x0, 0x0, 0x0, 0xff], 0x1d8, 0x228, 0x258, [@comment={'comment\x00', 0x100}, @owner={'owner\x00', 0x18, {{0x0, 0x0, 0x0, 0x0, 0x1, 0x1}}}]}, [@common=@LED={'LED\x00', 0x28, {{'syz0\x00', 0x1, 0x0, 0x800}}}]}, @common=@redirect={'redirect\x00', 0x8, {{0xfffffffffffffffe}}}}, {{{0x11, 0x4, 0x88e7, 'veth1_to_bond\x00', 'erspan0\x00', 'bridge_slave_1\x00', 'veth0_to_bridge\x00', @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [0xff, 0xff, 0x0, 0xff, 0x0, 0xff], @random="cfa071dc33d9", [0xff, 0xff, 0xff, 0xff, 0xff, 0xff], 0x2e0, 0x2e0, 0x330, [@mac={'mac\x00', 0x10, {{@remote={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xbb}, 0x1}}}, @bpf0={'bpf\x00', 0x210, {{0x20, [{0x8000, 0x4902, 0x5, 0x3ff}, {0x5, 0x8, 0x2, 0xff}, {0x1000, 0x48000000000, 0x3}, {0xf7, 0x1f, 0xfffffffffffffe00, 0x1}, {0x10000, 0xfc0, 0x1, 0x6}, {0x4, 0x2, 0xcefa, 0x81}, {0x815, 0xc7, 0x8001, 0x6a0}, {0x40, 0x0, 0x9, 0x80000001}, {0xffffffffffffff53, 0x38a, 0x100000000, 0x7}, {0x5, 0x1, 0x1000, 0x10001}, {0x80000000, 0x7, 0x1, 0xf7}, {0x2, 0x9, 0x4c, 0x5}, {0xfffffffffffffff7, 0x0, 0xe74, 0x52a}, {0x1ff, 0x7, 0x3, 0x7}, {0x6, 0x1ff, 0x49, 0x7}, {0x8000, 0x0, 0x7, 0x684}, {0xffe, 0x988, 0x3, 0x1}, {0x7b, 0x5a07, 0x18, 0x7}, {0xfffffffffffffffe, 0xfff, 0x3, 0x178180a0}, {0x2, 0xc0, 0x6, 0x401}, {0x5, 0x3, 0x8, 0x8}, {0xffffffffffff0001, 0x3, 0xfffffffffffffff7, 0x5}, {0x1ff, 0x8001, 0x3}, {0x3, 0x9, 0xffffffff, 0x2}, {0x5, 0x4, 0x574, 0x64c}, {0x5, 0x4, 0x10001, 0x6}, {0x1, 0x5b2c, 0x3ff, 0x7}, {0xff, 0x2, 0x5, 0x62c5fc18}, {0x101, 0x7, 0x2, 0xfffffffffffffffd}, {0x7fff, 0x6, 0x8, 0x4}, {0x9, 0x0, 0x7, 0xff}, {0x4, 0x4, 0x4, 0x10000}, {0x59b0, 0xfff, 0x4, 0x4}, {0x1f, 0xfffffffffffffffd, 0x8001, 0x800}, {0x0, 0xffffffffffffffff, 0x2, 0x65}, {0x1ff, 0x1, 0x2, 0x7ff}, {0x4, 0x5, 0x1, 0x7be}, {0x9e4, 0x0, 0x7, 0x5}, {0x5, 0x8, 0x7f, 0xffffffff}, {0x4, 0x6, 0x5, 0x7ff}, {0x22aaaf52, 0x8f, 0x6, 0x10000}, {0x2, 0x7, 0xffff}, {0x5, 0xfffffffff016eb50, 0x82, 0x7}, {0x38, 0x800, 0x9a2a, 0xfffffffffffffffc}, {0x5, 0xb, 0x4, 0xfffffffffffff001}, {0x8b5, 0x81, 0x4, 0x2}, {0x8, 0xfffffffffffffff8, 0x1, 0x8}, {0x40, 0x4, 0x1, 0x100000001}, {0x9b, 0x5, 0x1, 0xd64c}, {0x100, 0x8, 0x7, 0x3ff}, {0xf11, 0x200, 0x7, 0x2}, {0xac5, 0x0, 0x3, 0x7}, {0x518, 0x1, 0x80}, {0x6, 0x7f, 0x6, 0x7298}, {0x7, 0x1, 0x2, 0x1ec9}, {0x400, 0x2, 0x6, 0x6c3}, {0x100000001, 0x6, 0x5, 0x9}, {0x8, 0x1dae, 0xfffffffffffffff8, 0x101}, {0x2, 0x7, 0x8, 0x3}, {0x0, 0x45b, 0x7, 0x72}, {0x100000001, 0xc00000000000, 0x100000001, 0x8}, {0x100000001, 0x0, 0xfffffffffffffffc, 0x3}, {0x95, 0x90b, 0x0, 0xfffffffffffff565}, {0x0, 0x4, 0x0, 0x2}], 0x40}}}]}}, @common=@IDLETIMER={'IDLETIMER\x00', 0x28, {{0x7f, 'syz0\x00'}}}}]}, {0x0, '\x00', 0x2, 0xfffffffffffffffc}, {0x0, '\x00', 0x2, 0xffffffffffffffff, 0x2, [{{{0x11, 0x40, 0x87df, 'irlan0\x00', 'sit0\x00', 'veth0_to_team\x00', 'ip6gretap0\x00', @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [0xff, 0xff, 0xff, 0xff, 0x0, 0xff], @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [0x0, 0xff, 0x0, 0xff], 0xb0, 0x210, 0x258, [@time={'time\x00', 0x18, {{0x1ff, 0x1, 0xe063, 0xb6c5, 0x2e80, 0x0, 0x2}}}]}, [@common=@redirect={'redirect\x00', 0x8, {{0xffffffffffffffff}}}, @common=@SECMARK={'SECMARK\x00', 0x108, {{0x1, 0x6, 'system_u:object_r:lost_found_t:s0\x00'}}}]}, @common=@ERROR={'ERROR\x00', 0x20, {"4323eed968d7072e70de82f41331fe3aed2aedc8f2fff16e54b1c4e2ad07"}}}, {{{0x5, 0x54, 0x888d, 'ip6gretap0\x00', 'teql0\x00', 'veth1_to_team\x00', 'erspan0\x00', @random="0eae55d5aac5", [0x0, 0xff, 0x0, 0xff, 0xff, 0xff], @empty, [0xff, 0xff, 0xff, 0x0, 0xff, 0xff], 0x70, 0x70, 0xb8}}, @common=@RATEEST={'RATEEST\x00', 0x20, {{'syz0\x00', 0x9, 0x1, 0x4}}}}]}]}, 0x9a0) [ 436.604550] RIP: 0033:0x455a09 [ 436.607717] RSP: 002b:00007ffbeaa32c68 EFLAGS: 00000246 ORIG_RAX: 0000000000000028 [ 436.615769] RAX: ffffffffffffffda RBX: 00007ffbeaa336d4 RCX: 0000000000455a09 [ 436.623033] RDX: 0000000020000000 RSI: 0000000000000013 RDI: 0000000000000013 [ 436.630296] RBP: 000000000072bea0 R08: 0000000000000000 R09: 0000000000000000 [ 436.637542] R10: 000000007fffffff R11: 0000000000000246 R12: 0000000000000014 [ 436.644885] R13: 0000000000000579 R14: 00000000006fc3f8 R15: 0000000000000015 2018/05/15 08:25:06 executing program 5 (fault-call:1 fault-nth:22): r0 = syz_open_procfs(0x0, &(0x7f0000000280)='net/ptype\x00') sendfile(r0, r0, &(0x7f0000000000)=0xffffffd, 0x7fffffff) 2018/05/15 08:25:06 executing program 6: perf_event_open$cgroup(&(0x7f0000000240)={0x7, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x5, 0x6, @perf_bp={&(0x7f0000000200), 0x6}, 0x10202, 0x4, 0x4, 0x7, 0xdf, 0x9, 0x3}, 0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x8) 2018/05/15 08:25:06 executing program 2: syz_emit_ethernet(0x3e, &(0x7f00000001c0)={@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, @dev={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa]}, [], {@ipv6={0x86dd, {0x0, 0x6, "50a09c", 0x8, 0x0, 0x0, @remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x800e], 0xbb}, @local={0xfe, 0x80, [], 0xaa}, {[], @udp={0x0, 0x0, 0x8}}}}}}, &(0x7f0000000040)) 2018/05/15 08:25:06 executing program 7: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup(r0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000d40)=@broute={'broute\x00', 0x20, 0x4, 0x928, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000400], 0x0, &(0x7f0000000000), &(0x7f0000000400)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x2, [{{{0x5, 0x0, 0x0, 'bcsh0\x00', 'sit0\x00', 'syzkaller1\x00', 'veth0\x00', @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [], @dev={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa]}, [0xff, 0x0, 0x0, 0x0, 0x0, 0xff], 0x1d8, 0x228, 0x258, [@comment={'comment\x00', 0x100}, @owner={'owner\x00', 0x18, {{0x0, 0x0, 0x0, 0x0, 0x1, 0x1}}}]}, [@common=@LED={'LED\x00', 0x28, {{'syz0\x00', 0x1, 0x0, 0x800}}}]}, @common=@redirect={'redirect\x00', 0x8, {{0xfffffffffffffffe}}}}, {{{0x11, 0x4, 0x88e7, 'veth1_to_bond\x00', 'erspan0\x00', 'bridge_slave_1\x00', 'veth0_to_bridge\x00', @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [0xff, 0xff, 0x0, 0xff, 0x0, 0xff], @random="cfa071dc33d9", [0xff, 0xff, 0xff, 0xff, 0xff, 0xff], 0x2e0, 0x2e0, 0x330, [@mac={'mac\x00', 0x10, {{@remote={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xbb}, 0x1}}}, @bpf0={'bpf\x00', 0x210, {{0x20, [{0x8000, 0x4902, 0x5, 0x3ff}, {0x5, 0x8, 0x2, 0xff}, {0x1000, 0x48000000000, 0x3}, {0xf7, 0x1f, 0xfffffffffffffe00, 0x1}, {0x10000, 0xfc0, 0x1, 0x6}, {0x4, 0x2, 0xcefa, 0x81}, {0x815, 0xc7, 0x8001, 0x6a0}, {0x40, 0x0, 0x9, 0x80000001}, {0xffffffffffffff53, 0x38a, 0x100000000, 0x7}, {0x5, 0x1, 0x1000, 0x10001}, {0x80000000, 0x7, 0x1, 0xf7}, {0x2, 0x9, 0x4c, 0x5}, {0xfffffffffffffff7, 0x0, 0xe74, 0x52a}, {0x1ff, 0x7, 0x3, 0x7}, {0x6, 0x1ff, 0x49, 0x7}, {0x8000, 0x0, 0x7, 0x684}, {0xffe, 0x988, 0x3, 0x1}, {0x7b, 0x5a07, 0x18, 0x7}, {0xfffffffffffffffe, 0xfff, 0x3, 0x178180a0}, {0x2, 0xc0, 0x6, 0x401}, {0x5, 0x3, 0x8, 0x8}, {0xffffffffffff0001, 0x3, 0xfffffffffffffff7, 0x5}, {0x1ff, 0x8001, 0x3}, {0x3, 0x9, 0xffffffff, 0x2}, {0x5, 0x4, 0x574, 0x64c}, {0x5, 0x4, 0x10001, 0x6}, {0x1, 0x5b2c, 0x3ff, 0x7}, {0xff, 0x2, 0x5, 0x62c5fc18}, {0x101, 0x7, 0x2, 0xfffffffffffffffd}, {0x7fff, 0x6, 0x8, 0x4}, {0x9, 0x0, 0x7, 0xff}, {0x4, 0x4, 0x4, 0x10000}, {0x59b0, 0xfff, 0x4, 0x4}, {0x1f, 0xfffffffffffffffd, 0x8001, 0x800}, {0x0, 0xffffffffffffffff, 0x2, 0x65}, {0x1ff, 0x1, 0x2, 0x7ff}, {0x4, 0x5, 0x1, 0x7be}, {0x9e4, 0x0, 0x7, 0x5}, {0x5, 0x8, 0x7f, 0xffffffff}, {0x4, 0x6, 0x5, 0x7ff}, {0x22aaaf52, 0x8f, 0x6, 0x10000}, {0x2, 0x7, 0xffff}, {0x5, 0xfffffffff016eb50, 0x82, 0x7}, {0x38, 0x800, 0x9a2a, 0xfffffffffffffffc}, {0x5, 0xb, 0x4, 0xfffffffffffff001}, {0x8b5, 0x81, 0x4, 0x2}, {0x8, 0xfffffffffffffff8, 0x1, 0x8}, {0x40, 0x4, 0x1, 0x100000001}, {0x9b, 0x5, 0x1, 0xd64c}, {0x100, 0x8, 0x7, 0x3ff}, {0xf11, 0x200, 0x7, 0x2}, {0xac5, 0x0, 0x3, 0x7}, {0x518, 0x1, 0x80}, {0x6, 0x7f, 0x6, 0x7298}, {0x7, 0x1, 0x2, 0x1ec9}, {0x400, 0x2, 0x6, 0x6c3}, {0x100000001, 0x6, 0x5, 0x9}, {0x8, 0x1dae, 0xfffffffffffffff8, 0x101}, {0x2, 0x7, 0x8, 0x3}, {0x0, 0x45b, 0x7, 0x72}, {0x100000001, 0xc00000000000, 0x100000001, 0x8}, {0x100000001, 0x0, 0xfffffffffffffffc, 0x3}, {0x95, 0x90b, 0x0, 0xfffffffffffff565}, {0x0, 0x4, 0x0, 0x2}], 0x40}}}]}}, @common=@IDLETIMER={'IDLETIMER\x00', 0x28, {{0x7f, 'syz0\x00'}}}}]}, {0x0, '\x00', 0x2, 0xfffffffffffffffc}, {0x0, '\x00', 0x2, 0xffffffffffffffff, 0x2, [{{{0x11, 0x40, 0x87df, 'irlan0\x00', 'sit0\x00', 'veth0_to_team\x00', 'ip6gretap0\x00', @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [0xff, 0xff, 0xff, 0xff, 0x0, 0xff], @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [0x0, 0xff, 0x0, 0xff], 0xb0, 0x210, 0x258, [@time={'time\x00', 0x18, {{0x1ff, 0x1, 0xe063, 0xb6c5, 0x2e80, 0x0, 0x2}}}]}, [@common=@redirect={'redirect\x00', 0x8, {{0xffffffffffffffff}}}, @common=@SECMARK={'SECMARK\x00', 0x108, {{0x1, 0x6, 'system_u:object_r:lost_found_t:s0\x00'}}}]}, @common=@ERROR={'ERROR\x00', 0x20, {"4323eed968d7072e70de82f41331fe3aed2aedc8f2fff16e54b1c4e2ad07"}}}, {{{0x5, 0x54, 0x888d, 'ip6gretap0\x00', 'teql0\x00', 'veth1_to_team\x00', 'erspan0\x00', @random="0eae55d5aac5", [0x0, 0xff, 0x0, 0xff, 0xff, 0xff], @empty, [0xff, 0xff, 0xff, 0x0, 0xff, 0xff], 0x70, 0x70, 0xb8}}, @common=@RATEEST={'RATEEST\x00', 0x20, {{'syz0\x00', 0x9, 0x1, 0x4}}}}]}]}, 0x9a0) 2018/05/15 08:25:06 executing program 3: syz_emit_ethernet(0x3e, &(0x7f00000001c0)={@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, @dev={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa]}, [], {@ipv6={0x86dd, {0x0, 0x6, "50a09c", 0x8, 0xffffff87, 0x0, @remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x600], 0xbb}, @local={0xfe, 0x80, [], 0xaa}, {[], @udp={0x0, 0x0, 0x8}}}}}}, &(0x7f0000000040)) 2018/05/15 08:25:06 executing program 0: perf_event_open$cgroup(&(0x7f0000000240)={0x7, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x5, 0x6, @perf_bp={&(0x7f0000000200), 0x6}, 0x10202, 0x4, 0x4, 0x7, 0xdf, 0x9, 0x3}, 0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x8) 2018/05/15 08:25:06 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f0000000280)="6e65742f6970365f7461626c65735f6d61746368657300b6e23bcf6093cb57f8b4d285e9c48608549acee9a66f09d47a011dcc8f5af7870c6c1b6eebe85ebea4ecda4e44def87e8ee568c843daaf2805944012bc0144937e8b04411d09016ca07f7388ded591e346fb612397e79a6fe43e5c6a86bee1565b17b22b8ed5c95b4afbb3a620d1402c50bbaad790d0ffdb7c5a27e60423079f77bf") unlink(&(0x7f0000000080)='./file0\x00') sendfile(r0, r0, &(0x7f00000000c0)=0x10000000, 0x2) ioctl$KDGKBMETA(r0, 0x4b62, &(0x7f0000000100)) getsockopt$inet_sctp_SCTP_PARTIAL_DELIVERY_POINT(r0, 0x84, 0x13, &(0x7f0000000140)={0x0, 0xfffffffffffffffa}, &(0x7f0000000180)=0x8) syslog(0x2, &(0x7f0000000cc0)=""/107, 0x6b) setsockopt$IP_VS_SO_SET_DEL(r0, 0x0, 0x484, &(0x7f0000000200)={0x87, @dev={0xac, 0x14, 0x14, 0x1a}, 0x4e24, 0x2, 'rr\x00', 0x3, 0x2, 0x66}, 0x2c) setsockopt$inet_sctp_SCTP_STREAM_SCHEDULER(r0, 0x84, 0x7b, &(0x7f00000001c0)={r1, 0x40ef2843}, 0x8) setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x40, &(0x7f0000000340)=ANY=[@ANYBLOB="73656375726974790000000000000000000000000000000000000000000000000e00000004000000f8030000fffffffff00000000000000000000000ffffffffffffffff600300006003000060030000ffffffff04000000", @ANYPTR=&(0x7f0000000d40)=ANY=[@ANYBLOB="000000000000000000000000002100ebe70048ca02fec408edfbaf31ba590218fdffffffffffd60000000000000000000000000000000000000000000000000021d13202a6d3d3de0000000000000000000000"], @ANYBLOB="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"], 0x458) 2018/05/15 08:25:06 executing program 4: perf_event_open$cgroup(&(0x7f0000000240)={0x7, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000200)}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 2018/05/15 08:25:06 executing program 6: perf_event_open$cgroup(&(0x7f0000000240)={0x7, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x5, 0x6, @perf_bp={&(0x7f0000000200), 0x6}, 0x10202, 0x4, 0x4, 0x7, 0xdf, 0x9, 0x3}, 0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x8) 2018/05/15 08:25:06 executing program 4: perf_event_open$cgroup(&(0x7f0000000240)={0x7, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000200)}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x3}, 0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x8) 2018/05/15 08:25:06 executing program 3: syz_emit_ethernet(0x3e, &(0x7f00000001c0)={@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, @dev={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa]}, [], {@ipv6={0x86dd, {0x0, 0x6, "50a09c", 0x8, 0xffffff87, 0x0, @remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0xd], 0xbb}, @local={0xfe, 0x80, [], 0xaa}, {[], @udp={0x0, 0x0, 0x8}}}}}}, &(0x7f0000000040)) 2018/05/15 08:25:06 executing program 2: syz_emit_ethernet(0x3e, &(0x7f00000001c0)={@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, @dev={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa]}, [], {@ipv6={0x86dd, {0x0, 0x6, "50a09c", 0x8, 0x0, 0x0, @remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x21000000], 0xbb}, @local={0xfe, 0x80, [], 0xaa}, {[], @udp={0x0, 0x0, 0x8}}}}}}, &(0x7f0000000040)) 2018/05/15 08:25:06 executing program 0: perf_event_open$cgroup(&(0x7f0000000240)={0x7, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff9, 0x0, 0x0, 0x5, 0x6, @perf_bp={&(0x7f0000000200), 0x6}, 0x10202, 0x4, 0x4, 0x7, 0xdf, 0x9, 0x3}, 0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x8) 2018/05/15 08:25:07 executing program 7: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup(r0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000d40)=@broute={'broute\x00', 0x20, 0x4, 0x928, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000400], 0x0, &(0x7f0000000000), &(0x7f0000000400)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x2, [{{{0x5, 0x0, 0x0, 'bcsh0\x00', 'sit0\x00', 'syzkaller1\x00', 'veth0\x00', @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [], @dev={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa]}, [0x0, 0x0, 0x0, 0x0, 0x0, 0xff], 0x1d8, 0x228, 0x258, [@comment={'comment\x00', 0x100}, @owner={'owner\x00', 0x18, {{0x0, 0x0, 0x0, 0x0, 0x1, 0x1}}}]}, [@common=@LED={'LED\x00', 0x28, {{'syz0\x00', 0x1, 0x0, 0x800}}}]}, @common=@redirect={'redirect\x00', 0x8, {{0xfffffffffffffffe}}}}, {{{0x11, 0x4, 0x88e7, 'veth1_to_bond\x00', 'erspan0\x00', 'bridge_slave_1\x00', 'veth0_to_bridge\x00', @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [0xff, 0xff, 0x0, 0xff, 0x0, 0xff], @random="cfa071dc33d9", [0xff, 0xff, 0xff, 0xff, 0xff, 0xff], 0x2e0, 0x2e0, 0x330, [@mac={'mac\x00', 0x10, {{@remote={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xbb}, 0x1}}}, @bpf0={'bpf\x00', 0x210, {{0x20, [{0x8000, 0x4902, 0x5, 0x3ff}, {0x5, 0x8, 0x2, 0xff}, {0x1000, 0x48000000000, 0x3}, {0xf7, 0x1f, 0xfffffffffffffe00, 0x1}, {0x10000, 0xfc0, 0x1, 0x6}, {0x4, 0x2, 0xcefa, 0x81}, {0x815, 0xc7, 0x8001, 0x6a0}, {0x40, 0x0, 0x9, 0x80000001}, {0xffffffffffffff53, 0x38a, 0x100000000, 0x7}, {0x5, 0x1, 0x1000, 0x10001}, {0x80000000, 0x7, 0x1, 0xf7}, {0x2, 0x9, 0x4c, 0x5}, {0xfffffffffffffff7, 0x0, 0xe74, 0x52a}, {0x1ff, 0x7, 0x3, 0x7}, {0x6, 0x1ff, 0x49, 0x7}, {0x8000, 0x0, 0x7, 0x684}, {0xffe, 0x988, 0x3, 0x1}, {0x7b, 0x5a07, 0x18, 0x7}, {0xfffffffffffffffe, 0xfff, 0x3, 0x178180a0}, {0x2, 0xc0, 0x6, 0x401}, {0x5, 0x3, 0x8, 0x8}, {0xffffffffffff0001, 0x3, 0xfffffffffffffff7, 0x5}, {0x1ff, 0x8001, 0x3}, {0x3, 0x9, 0xffffffff, 0x2}, {0x5, 0x4, 0x574, 0x64c}, {0x5, 0x4, 0x10001, 0x6}, {0x1, 0x5b2c, 0x3ff, 0x7}, {0xff, 0x2, 0x5, 0x62c5fc18}, {0x101, 0x7, 0x2, 0xfffffffffffffffd}, {0x7fff, 0x6, 0x8, 0x4}, {0x9, 0x0, 0x7, 0xff}, {0x4, 0x4, 0x4, 0x10000}, {0x59b0, 0xfff, 0x4, 0x4}, {0x1f, 0xfffffffffffffffd, 0x8001, 0x800}, {0x0, 0xffffffffffffffff, 0x2, 0x65}, {0x1ff, 0x1, 0x2, 0x7ff}, {0x4, 0x5, 0x1, 0x7be}, {0x9e4, 0x0, 0x7, 0x5}, {0x5, 0x8, 0x7f, 0xffffffff}, {0x4, 0x6, 0x5, 0x7ff}, {0x22aaaf52, 0x8f, 0x6, 0x10000}, {0x2, 0x7, 0xffff}, {0x5, 0xfffffffff016eb50, 0x82, 0x7}, {0x38, 0x800, 0x9a2a, 0xfffffffffffffffc}, {0x5, 0xb, 0x4, 0xfffffffffffff001}, {0x8b5, 0x81, 0x4, 0x2}, {0x8, 0xfffffffffffffff8, 0x1, 0x8}, {0x40, 0x4, 0x1, 0x100000001}, {0x9b, 0x5, 0x1, 0xd64c}, {0x100, 0x8, 0x7, 0x3ff}, {0xf11, 0x200, 0x7, 0x2}, {0xac5, 0x0, 0x3, 0x7}, {0x518, 0x1, 0x80}, {0x6, 0x7f, 0x6, 0x7298}, {0x7, 0x1, 0x2, 0x1ec9}, {0x400, 0x2, 0x6, 0x6c3}, {0x100000001, 0x6, 0x5, 0x9}, {0x8, 0x1dae, 0xfffffffffffffff8, 0x101}, {0x2, 0x7, 0x8, 0x3}, {0x0, 0x45b, 0x7, 0x72}, {0x100000001, 0xc00000000000, 0x100000001, 0x8}, {0x100000001, 0x0, 0xfffffffffffffffc, 0x3}, {0x95, 0x90b, 0x0, 0xfffffffffffff565}, {0x0, 0x4, 0x0, 0x2}], 0x40}}}]}}, @common=@IDLETIMER={'IDLETIMER\x00', 0x28, {{0x7f, 'syz0\x00'}}}}]}, {0x0, '\x00', 0x2, 0xfffffffffffffffc}, {0x0, '\x00', 0x2, 0xffffffffffffffff, 0x2, [{{{0x11, 0x40, 0x87df, 'irlan0\x00', 'sit0\x00', 'veth0_to_team\x00', 'ip6gretap0\x00', @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [0xff, 0xff, 0xff, 0xff, 0x0, 0xff], @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [0x0, 0xff, 0x0, 0xff], 0xb0, 0x210, 0x258, [@time={'time\x00', 0x18, {{0x1ff, 0x1, 0xe063, 0xb6c5, 0x2e80, 0x0, 0x2}}}]}, [@common=@redirect={'redirect\x00', 0x8, {{0xffffffffffffffff}}}, @common=@SECMARK={'SECMARK\x00', 0x108, {{0x1, 0x6, 'system_u:object_r:lost_found_t:s0\x00'}}}]}, @common=@ERROR={'ERROR\x00', 0x20, {"4323eed968d7072e70de82f41331fe3aed2aedc8f2fff16e54b1c4e2ad07"}}}, {{{0x5, 0x54, 0x888d, 'ip6gretap0\x00', 'teql0\x00', 'veth1_to_team\x00', 'erspan0\x00', @random="0eae55d5aac5", [0x0, 0xff, 0x0, 0xff, 0xff, 0xff], @empty, [0xff, 0xff, 0xff, 0x0, 0xff, 0xff], 0x70, 0x70, 0xb8}}, @common=@RATEEST={'RATEEST\x00', 0x20, {{'syz0\x00', 0x9, 0x1, 0x4}}}}]}]}, 0x9a0) 2018/05/15 08:25:07 executing program 5: r0 = syz_open_procfs(0x0, &(0x7f0000000280)='net/ptype\x00') sendfile(r0, r0, &(0x7f0000000000)=0xffffffd, 0x7fffffff) 2018/05/15 08:25:07 executing program 4: perf_event_open$cgroup(&(0x7f0000000240)={0x7, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0xfffffffffffffff9, 0x5, 0x0, 0x5, 0x6, @perf_bp={&(0x7f0000000200), 0x6}, 0x10202, 0x4, 0x4, 0x7, 0xdf, 0x9, 0x3}, 0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x8) 2018/05/15 08:25:07 executing program 6: perf_event_open$cgroup(&(0x7f0000000240)={0x7, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff9, 0x0, 0x0, 0x5, 0x6, @perf_bp={&(0x7f0000000200), 0x6}, 0x10202, 0x4, 0x4, 0x7, 0xdf, 0x9, 0x3}, 0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x8) 2018/05/15 08:25:07 executing program 0: perf_event_open$cgroup(&(0x7f0000000240)={0x7, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff9, 0x0, 0x0, 0x5, 0x6, @perf_bp={&(0x7f0000000200), 0x6}, 0x10202, 0x4, 0x4, 0x7, 0xdf, 0x9, 0x3}, 0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x8) 2018/05/15 08:25:07 executing program 3: syz_emit_ethernet(0x3e, &(0x7f00000001c0)={@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, @dev={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa]}, [], {@ipv6={0x86dd, {0x0, 0x6, "50a09c", 0x8, 0xffffff87, 0x0, @remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x88480000], 0xbb}, @local={0xfe, 0x80, [], 0xaa}, {[], @udp={0x0, 0x0, 0x8}}}}}}, &(0x7f0000000040)) 2018/05/15 08:25:07 executing program 2: syz_emit_ethernet(0x3e, &(0x7f00000001c0)={@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, @dev={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa]}, [], {@ipv6={0x86dd, {0x0, 0x6, "50a09c", 0x8, 0x0, 0x0, @remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0xffffff89], 0xbb}, @local={0xfe, 0x80, [], 0xaa}, {[], @udp={0x0, 0x0, 0x8}}}}}}, &(0x7f0000000040)) 2018/05/15 08:25:07 executing program 7: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup(r0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000d40)=@broute={'broute\x00', 0x20, 0x4, 0x928, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000400], 0x0, &(0x7f0000000000), &(0x7f0000000400)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x2, [{{{0x5, 0x0, 0x0, 'bcsh0\x00', 'sit0\x00', 'syzkaller1\x00', 'veth0\x00', @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [], @dev={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa]}, [], 0x1d8, 0x228, 0x258, [@comment={'comment\x00', 0x100}, @owner={'owner\x00', 0x18, {{0x0, 0x0, 0x0, 0x0, 0x1, 0x1}}}]}, [@common=@LED={'LED\x00', 0x28, {{'syz0\x00', 0x1, 0x0, 0x800}}}]}, @common=@redirect={'redirect\x00', 0x8, {{0xfffffffffffffffe}}}}, {{{0x11, 0x4, 0x88e7, 'veth1_to_bond\x00', 'erspan0\x00', 'bridge_slave_1\x00', 'veth0_to_bridge\x00', @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [0xff, 0xff, 0x0, 0xff, 0x0, 0xff], @random="cfa071dc33d9", [0xff, 0xff, 0xff, 0xff, 0xff, 0xff], 0x2e0, 0x2e0, 0x330, [@mac={'mac\x00', 0x10, {{@remote={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xbb}, 0x1}}}, @bpf0={'bpf\x00', 0x210, {{0x20, [{0x8000, 0x4902, 0x5, 0x3ff}, {0x5, 0x8, 0x2, 0xff}, {0x1000, 0x48000000000, 0x3}, {0xf7, 0x1f, 0xfffffffffffffe00, 0x1}, {0x10000, 0xfc0, 0x1, 0x6}, {0x4, 0x2, 0xcefa, 0x81}, {0x815, 0xc7, 0x8001, 0x6a0}, {0x40, 0x0, 0x9, 0x80000001}, {0xffffffffffffff53, 0x38a, 0x100000000, 0x7}, {0x5, 0x1, 0x1000, 0x10001}, {0x80000000, 0x7, 0x1, 0xf7}, {0x2, 0x9, 0x4c, 0x5}, {0xfffffffffffffff7, 0x0, 0xe74, 0x52a}, {0x1ff, 0x7, 0x3, 0x7}, {0x6, 0x1ff, 0x49, 0x7}, {0x8000, 0x0, 0x7, 0x684}, {0xffe, 0x988, 0x3, 0x1}, {0x7b, 0x5a07, 0x18, 0x7}, {0xfffffffffffffffe, 0xfff, 0x3, 0x178180a0}, {0x2, 0xc0, 0x6, 0x401}, {0x5, 0x3, 0x8, 0x8}, {0xffffffffffff0001, 0x3, 0xfffffffffffffff7, 0x5}, {0x1ff, 0x8001, 0x3}, {0x3, 0x9, 0xffffffff, 0x2}, {0x5, 0x4, 0x574, 0x64c}, {0x5, 0x4, 0x10001, 0x6}, {0x1, 0x5b2c, 0x3ff, 0x7}, {0xff, 0x2, 0x5, 0x62c5fc18}, {0x101, 0x7, 0x2, 0xfffffffffffffffd}, {0x7fff, 0x6, 0x8, 0x4}, {0x9, 0x0, 0x7, 0xff}, {0x4, 0x4, 0x4, 0x10000}, {0x59b0, 0xfff, 0x4, 0x4}, {0x1f, 0xfffffffffffffffd, 0x8001, 0x800}, {0x0, 0xffffffffffffffff, 0x2, 0x65}, {0x1ff, 0x1, 0x2, 0x7ff}, {0x4, 0x5, 0x1, 0x7be}, {0x9e4, 0x0, 0x7, 0x5}, {0x5, 0x8, 0x7f, 0xffffffff}, {0x4, 0x6, 0x5, 0x7ff}, {0x22aaaf52, 0x8f, 0x6, 0x10000}, {0x2, 0x7, 0xffff}, {0x5, 0xfffffffff016eb50, 0x82, 0x7}, {0x38, 0x800, 0x9a2a, 0xfffffffffffffffc}, {0x5, 0xb, 0x4, 0xfffffffffffff001}, {0x8b5, 0x81, 0x4, 0x2}, {0x8, 0xfffffffffffffff8, 0x1, 0x8}, {0x40, 0x4, 0x1, 0x100000001}, {0x9b, 0x5, 0x1, 0xd64c}, {0x100, 0x8, 0x7, 0x3ff}, {0xf11, 0x200, 0x7, 0x2}, {0xac5, 0x0, 0x3, 0x7}, {0x518, 0x1, 0x80}, {0x6, 0x7f, 0x6, 0x7298}, {0x7, 0x1, 0x2, 0x1ec9}, {0x400, 0x2, 0x6, 0x6c3}, {0x100000001, 0x6, 0x5, 0x9}, {0x8, 0x1dae, 0xfffffffffffffff8, 0x101}, {0x2, 0x7, 0x8, 0x3}, {0x0, 0x45b, 0x7, 0x72}, {0x100000001, 0xc00000000000, 0x100000001, 0x8}, {0x100000001, 0x0, 0xfffffffffffffffc, 0x3}, {0x95, 0x90b, 0x0, 0xfffffffffffff565}, {0x0, 0x4, 0x0, 0x2}], 0x40}}}]}}, @common=@IDLETIMER={'IDLETIMER\x00', 0x28, {{0x7f, 'syz0\x00'}}}}]}, {0x0, '\x00', 0x2, 0xfffffffffffffffc}, {0x0, '\x00', 0x2, 0xffffffffffffffff, 0x2, [{{{0x11, 0x40, 0x87df, 'irlan0\x00', 'sit0\x00', 'veth0_to_team\x00', 'ip6gretap0\x00', @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [0xff, 0xff, 0xff, 0xff, 0x0, 0xff], @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [0x0, 0xff, 0x0, 0xff], 0xb0, 0x210, 0x258, [@time={'time\x00', 0x18, {{0x1ff, 0x1, 0xe063, 0xb6c5, 0x2e80, 0x0, 0x2}}}]}, [@common=@redirect={'redirect\x00', 0x8, {{0xffffffffffffffff}}}, @common=@SECMARK={'SECMARK\x00', 0x108, {{0x1, 0x6, 'system_u:object_r:lost_found_t:s0\x00'}}}]}, @common=@ERROR={'ERROR\x00', 0x20, {"4323eed968d7072e70de82f41331fe3aed2aedc8f2fff16e54b1c4e2ad07"}}}, {{{0x5, 0x54, 0x888d, 'ip6gretap0\x00', 'teql0\x00', 'veth1_to_team\x00', 'erspan0\x00', @random="0eae55d5aac5", [0x0, 0xff, 0x0, 0xff, 0xff, 0xff], @empty, [0xff, 0xff, 0xff, 0x0, 0xff, 0xff], 0x70, 0x70, 0xb8}}, @common=@RATEEST={'RATEEST\x00', 0x20, {{'syz0\x00', 0x9, 0x1, 0x4}}}}]}]}, 0x9a0) 2018/05/15 08:25:07 executing program 4: perf_event_open$cgroup(&(0x7f0000000240)={0x7, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0xfffffffffffffff9, 0x5, 0x0, 0x5, 0x6, @perf_bp={&(0x7f0000000200), 0x6}, 0x10202, 0x4, 0x4, 0x7, 0xdf, 0x9, 0x3}, 0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x8) 2018/05/15 08:25:07 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f0000000280)="6e65742f6970365f7461626c65735f6d61746368657300b6e23bcf6093cb57f8b4d285e9c48608549acee9a66f09d47a011dcc8f5af7870c6c1b6eebe85ebea4ecda4e44def87e8ee568c843daaf2805944012bc0144937e8b04411d09016ca07f7388ded591e346fb612397e79a6fe43e5c6a86bee1565b17b22b8ed5c95b4afbb3a620d1402c50bbaad790d0ffdb7c5a27e60423079f77bf") unlink(&(0x7f0000000080)='./file0\x00') sendfile(r0, r0, &(0x7f00000000c0)=0x10000000, 0x2) ioctl$KDGKBMETA(r0, 0x4b62, &(0x7f0000000100)) getsockopt$inet_sctp_SCTP_PARTIAL_DELIVERY_POINT(r0, 0x84, 0x13, &(0x7f0000000140)={0x0, 0xfffffffffffffffa}, &(0x7f0000000180)=0x8) syslog(0x2, &(0x7f0000000cc0)=""/107, 0x6b) setsockopt$IP_VS_SO_SET_DEL(r0, 0x0, 0x484, &(0x7f0000000200)={0x87, @dev={0xac, 0x14, 0x14, 0x1a}, 0x4e24, 0x2, 'rr\x00', 0x3, 0x2, 0x66}, 0x2c) setsockopt$inet_sctp_SCTP_STREAM_SCHEDULER(r0, 0x84, 0x7b, &(0x7f00000001c0)={r1, 0x40ef2843}, 0x8) setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x40, &(0x7f0000000340)=ANY=[@ANYBLOB="73656375726974790000000000000000000000000000000000000000000000000e00000004000000f8030000fffffffff00000000000000000000000ffffffffffffffff600300006003000060030000ffffffff04000000", @ANYPTR=&(0x7f0000000d40)=ANY=[@ANYBLOB="000000000000000000000000002100ebe70048ca02fec408edfbaf31ba590218fdffffffffffd60000000000000000000000000000000000000000000000000021d13202a6d3d3de0000000000000000000000"], @ANYBLOB="00000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000c800f0000000000000000000000000000000000000000000000000003000616800000000000000000000000000000000000000000000000000000000f9ffffff7f000000010000000000000028005443504d5353000000000000000000000000000000000000000000000000740c0000000000007f000001ac14140dffffff00ffffffff6772653000000000000000000000000069703667726530000000000000000000000000000000000000000000ff0000000000000000000000000000000000000000000000000000000000ff0000000000000000000000000000007f0003010000000000000000000000000000b80018010000000000000000000000000000000000000000000000002000736f636b657400000000000000000000000000000000000000000000000060005345540000000000000000000000000000000000000000000000000000000100000000100000020000000000008e0a000000010400000800000000033f0002000000d4180000ff0700009c0a00001e62000000000000e1020000ff09010000000100ac1414aa000000ffff0000007465616d5f736c6176655f310000000069703667726574617030000000000000000000000000000000000000ff0000000000000000000000000000000000000000000000000000000000ff000000000000000000000000000000670001400000000000000000000000000000280158010000000000000000000000000000000000000000000000004000736574000000000000000000000000000000000000000000000000000000070000000100000008000000090000000000000000000000060000000307050050006f736600000000000000000000000000000000000000000000000000000073797a3100000000000000000000000000000000000000000000000000000000070000000200000002000000000000003000434f4e4e4d41524b00000000000000000000ffffffffffffffe5000000014000000009000000020000000300000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000700098000000000000000000000000000000000000000000280000000000000000000000000000000000000000000000000000000000000800ffffff00000000"], 0x458) 2018/05/15 08:25:07 executing program 6: perf_event_open$cgroup(&(0x7f0000000240)={0x7, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff9, 0x0, 0x0, 0x5, 0x6, @perf_bp={&(0x7f0000000200), 0x6}, 0x10202, 0x4, 0x4, 0x7, 0xdf, 0x9, 0x3}, 0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x8) 2018/05/15 08:25:07 executing program 0: perf_event_open$cgroup(&(0x7f0000000240)={0x7, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff9, 0x0, 0x0, 0x5, 0x6, @perf_bp={&(0x7f0000000200), 0x6}, 0x10202, 0x4, 0x4, 0x7, 0xdf, 0x9, 0x3}, 0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x8) 2018/05/15 08:25:07 executing program 3: syz_emit_ethernet(0x3e, &(0x7f00000001c0)={@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, @dev={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa]}, [], {@ipv6={0x86dd, {0x0, 0x6, "50a09c", 0x8, 0xffffff87, 0x0, @remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x3f000000], 0xbb}, @local={0xfe, 0x80, [], 0xaa}, {[], @udp={0x0, 0x0, 0x8}}}}}}, &(0x7f0000000040)) 2018/05/15 08:25:07 executing program 2: syz_emit_ethernet(0x3e, &(0x7f00000001c0)={@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, @dev={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa]}, [], {@ipv6={0x86dd, {0x0, 0x6, "50a09c", 0x8, 0x0, 0x0, @remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x6488], 0xbb}, @local={0xfe, 0x80, [], 0xaa}, {[], @udp={0x0, 0x0, 0x8}}}}}}, &(0x7f0000000040)) 2018/05/15 08:25:07 executing program 4: perf_event_open$cgroup(&(0x7f0000000240)={0x7, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0xfffffffffffffff9, 0x5, 0x0, 0x5, 0x6, @perf_bp={&(0x7f0000000200), 0x6}, 0x10202, 0x4, 0x4, 0x7, 0xdf, 0x9, 0x3}, 0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x8) 2018/05/15 08:25:07 executing program 5: r0 = syz_open_procfs(0x0, &(0x7f0000000280)='net/ptype\x00') sendfile(r0, r0, &(0x7f0000000000)=0xdc, 0x7fffffff) 2018/05/15 08:25:07 executing program 7: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup(r0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000d40)=@broute={'broute\x00', 0x20, 0x4, 0x800, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000400], 0x0, &(0x7f0000000000), &(0x7f0000000400)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x2, [{{{0x5, 0x0, 0x0, 'bcsh0\x00', 'sit0\x00', 'syzkaller1\x00', 'veth0\x00', @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [], @dev={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa]}, [], 0xb0, 0x100, 0x130, [@owner={'owner\x00', 0x18, {{0x0, 0x0, 0x0, 0x0, 0x1, 0x1}}}]}, [@common=@LED={'LED\x00', 0x28, {{'syz0\x00', 0x1, 0x0, 0x800}}}]}, @common=@redirect={'redirect\x00', 0x8, {{0xfffffffffffffffe}}}}, {{{0x11, 0x4, 0x88e7, 'veth1_to_bond\x00', 'erspan0\x00', 'bridge_slave_1\x00', 'veth0_to_bridge\x00', @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [0xff, 0xff, 0x0, 0xff, 0x0, 0xff], @random="cfa071dc33d9", [0xff, 0xff, 0xff, 0xff, 0xff, 0xff], 0x2e0, 0x2e0, 0x330, [@mac={'mac\x00', 0x10, {{@remote={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xbb}, 0x1}}}, @bpf0={'bpf\x00', 0x210, {{0x20, [{0x8000, 0x4902, 0x5, 0x3ff}, {0x5, 0x8, 0x2, 0xff}, {0x1000, 0x48000000000, 0x3}, {0xf7, 0x1f, 0xfffffffffffffe00, 0x1}, {0x10000, 0xfc0, 0x1, 0x6}, {0x4, 0x2, 0xcefa, 0x81}, {0x815, 0xc7, 0x8001, 0x6a0}, {0x40, 0x0, 0x9, 0x80000001}, {0xffffffffffffff53, 0x38a, 0x100000000, 0x7}, {0x5, 0x1, 0x1000, 0x10001}, {0x80000000, 0x7, 0x1, 0xf7}, {0x2, 0x9, 0x4c, 0x5}, {0xfffffffffffffff7, 0x0, 0xe74, 0x52a}, {0x1ff, 0x7, 0x3, 0x7}, {0x6, 0x1ff, 0x49, 0x7}, {0x8000, 0x0, 0x7, 0x684}, {0xffe, 0x988, 0x3, 0x1}, {0x7b, 0x5a07, 0x18, 0x7}, {0xfffffffffffffffe, 0xfff, 0x3, 0x178180a0}, {0x2, 0xc0, 0x6, 0x401}, {0x5, 0x3, 0x8, 0x8}, {0xffffffffffff0001, 0x3, 0xfffffffffffffff7, 0x5}, {0x1ff, 0x8001, 0x3}, {0x3, 0x9, 0xffffffff, 0x2}, {0x5, 0x4, 0x574, 0x64c}, {0x5, 0x4, 0x10001, 0x6}, {0x1, 0x5b2c, 0x3ff, 0x7}, {0xff, 0x2, 0x5, 0x62c5fc18}, {0x101, 0x7, 0x2, 0xfffffffffffffffd}, {0x7fff, 0x6, 0x8, 0x4}, {0x9, 0x0, 0x7, 0xff}, {0x4, 0x4, 0x4, 0x10000}, {0x59b0, 0xfff, 0x4, 0x4}, {0x1f, 0xfffffffffffffffd, 0x8001, 0x800}, {0x0, 0xffffffffffffffff, 0x2, 0x65}, {0x1ff, 0x1, 0x2, 0x7ff}, {0x4, 0x5, 0x1, 0x7be}, {0x9e4, 0x0, 0x7, 0x5}, {0x5, 0x8, 0x7f, 0xffffffff}, {0x4, 0x6, 0x5, 0x7ff}, {0x22aaaf52, 0x8f, 0x6, 0x10000}, {0x2, 0x7, 0xffff}, {0x5, 0xfffffffff016eb50, 0x82, 0x7}, {0x38, 0x800, 0x9a2a, 0xfffffffffffffffc}, {0x5, 0xb, 0x4, 0xfffffffffffff001}, {0x8b5, 0x81, 0x4, 0x2}, {0x8, 0xfffffffffffffff8, 0x1, 0x8}, {0x40, 0x4, 0x1, 0x100000001}, {0x9b, 0x5, 0x1, 0xd64c}, {0x100, 0x8, 0x7, 0x3ff}, {0xf11, 0x200, 0x7, 0x2}, {0xac5, 0x0, 0x3, 0x7}, {0x518, 0x1, 0x80}, {0x6, 0x7f, 0x6, 0x7298}, {0x7, 0x1, 0x2, 0x1ec9}, {0x400, 0x2, 0x6, 0x6c3}, {0x100000001, 0x6, 0x5, 0x9}, {0x8, 0x1dae, 0xfffffffffffffff8, 0x101}, {0x2, 0x7, 0x8, 0x3}, {0x0, 0x45b, 0x7, 0x72}, {0x100000001, 0xc00000000000, 0x100000001, 0x8}, {0x100000001, 0x0, 0xfffffffffffffffc, 0x3}, {0x95, 0x90b, 0x0, 0xfffffffffffff565}, {0x0, 0x4, 0x0, 0x2}], 0x40}}}]}}, @common=@IDLETIMER={'IDLETIMER\x00', 0x28, {{0x7f, 'syz0\x00'}}}}]}, {0x0, '\x00', 0x2, 0xfffffffffffffffc}, {0x0, '\x00', 0x2, 0xffffffffffffffff, 0x2, [{{{0x11, 0x40, 0x87df, 'irlan0\x00', 'sit0\x00', 'veth0_to_team\x00', 'ip6gretap0\x00', @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [0xff, 0xff, 0xff, 0xff, 0x0, 0xff], @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [0x0, 0xff, 0x0, 0xff], 0xb0, 0x210, 0x258, [@time={'time\x00', 0x18, {{0x1ff, 0x1, 0xe063, 0xb6c5, 0x2e80, 0x0, 0x2}}}]}, [@common=@redirect={'redirect\x00', 0x8, {{0xffffffffffffffff}}}, @common=@SECMARK={'SECMARK\x00', 0x108, {{0x1, 0x6, 'system_u:object_r:lost_found_t:s0\x00'}}}]}, @common=@ERROR={'ERROR\x00', 0x20, {"4323eed968d7072e70de82f41331fe3aed2aedc8f2fff16e54b1c4e2ad07"}}}, {{{0x5, 0x54, 0x888d, 'ip6gretap0\x00', 'teql0\x00', 'veth1_to_team\x00', 'erspan0\x00', @random="0eae55d5aac5", [0x0, 0xff, 0x0, 0xff, 0xff, 0xff], @empty, [0xff, 0xff, 0xff, 0x0, 0xff, 0xff], 0x70, 0x70, 0xb8}}, @common=@RATEEST={'RATEEST\x00', 0x20, {{'syz0\x00', 0x9, 0x1, 0x4}}}}]}]}, 0x9a0) 2018/05/15 08:25:07 executing program 5: r0 = syz_open_procfs(0x0, &(0x7f0000000280)='net/ptype\x00') sendfile(r0, r0, &(0x7f0000000000)=0x2f, 0x7fffffff) 2018/05/15 08:25:07 executing program 0: perf_event_open$cgroup(&(0x7f0000000240)={0x7, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff9, 0x5, 0x0, 0x0, 0x6, @perf_bp={&(0x7f0000000200), 0x6}, 0x10202, 0x4, 0x4, 0x7, 0xdf, 0x9, 0x3}, 0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x8) 2018/05/15 08:25:07 executing program 4: perf_event_open$cgroup(&(0x7f0000000240)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0xfffffffffffffff9, 0x5, 0x0, 0x5, 0x6, @perf_bp={&(0x7f0000000200), 0x6}, 0x10202, 0x4, 0x4, 0x7, 0xdf, 0x9, 0x3}, 0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x8) [ 438.641460] kernel msg: ebtables bug: please report to author: Wrong len argument 2018/05/15 08:25:07 executing program 2: syz_emit_ethernet(0x3e, &(0x7f00000001c0)={@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, @dev={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa]}, [], {@ipv6={0x86dd, {0x0, 0x6, "50a09c", 0x8, 0x0, 0x0, @remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x400000000000000], 0xbb}, @local={0xfe, 0x80, [], 0xaa}, {[], @udp={0x0, 0x0, 0x8}}}}}}, &(0x7f0000000040)) 2018/05/15 08:25:07 executing program 3: syz_emit_ethernet(0x3e, &(0x7f00000001c0)={@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, @dev={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa]}, [], {@ipv6={0x86dd, {0x0, 0x6, "50a09c", 0x8, 0xffffff87, 0x0, @remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x3800], 0xbb}, @local={0xfe, 0x80, [], 0xaa}, {[], @udp={0x0, 0x0, 0x8}}}}}}, &(0x7f0000000040)) 2018/05/15 08:25:07 executing program 6: perf_event_open$cgroup(&(0x7f0000000240)={0x7, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff9, 0x0, 0x0, 0x5, 0x6, @perf_bp={&(0x7f0000000200), 0x6}, 0x10202, 0x4, 0x4, 0x7, 0xdf, 0x9, 0x3}, 0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x8) 2018/05/15 08:25:07 executing program 7: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup(r0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000d40)=@broute={'broute\x00', 0x20, 0x4, 0x800, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000400], 0x0, &(0x7f0000000000), &(0x7f0000000400)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x2, [{{{0x5, 0x0, 0x0, 'bcsh0\x00', 'sit0\x00', 'syzkaller1\x00', 'veth0\x00', @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [], @dev={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa]}, [], 0xb0, 0x100, 0x130, [@owner={'owner\x00', 0x18, {{0x0, 0x0, 0x0, 0x0, 0x1, 0x1}}}]}, [@common=@LED={'LED\x00', 0x28, {{'syz0\x00', 0x1, 0x0, 0x800}}}]}, @common=@redirect={'redirect\x00', 0x8, {{0xfffffffffffffffe}}}}, {{{0x11, 0x4, 0x88e7, 'veth1_to_bond\x00', 'erspan0\x00', 'bridge_slave_1\x00', 'veth0_to_bridge\x00', @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [0xff, 0xff, 0x0, 0xff, 0x0, 0xff], @random="cfa071dc33d9", [0xff, 0xff, 0xff, 0xff, 0xff, 0xff], 0x2e0, 0x2e0, 0x330, [@mac={'mac\x00', 0x10, {{@remote={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xbb}, 0x1}}}, @bpf0={'bpf\x00', 0x210, {{0x20, [{0x8000, 0x4902, 0x5, 0x3ff}, {0x5, 0x8, 0x2, 0xff}, {0x1000, 0x48000000000, 0x3}, {0xf7, 0x1f, 0xfffffffffffffe00, 0x1}, {0x10000, 0xfc0, 0x1, 0x6}, {0x4, 0x2, 0xcefa, 0x81}, {0x815, 0xc7, 0x8001, 0x6a0}, {0x40, 0x0, 0x9, 0x80000001}, {0xffffffffffffff53, 0x38a, 0x100000000, 0x7}, {0x5, 0x1, 0x1000, 0x10001}, {0x80000000, 0x7, 0x1, 0xf7}, {0x2, 0x9, 0x4c, 0x5}, {0xfffffffffffffff7, 0x0, 0xe74, 0x52a}, {0x1ff, 0x7, 0x3, 0x7}, {0x6, 0x1ff, 0x49, 0x7}, {0x8000, 0x0, 0x7, 0x684}, {0xffe, 0x988, 0x3, 0x1}, {0x7b, 0x5a07, 0x18, 0x7}, {0xfffffffffffffffe, 0xfff, 0x3, 0x178180a0}, {0x2, 0xc0, 0x6, 0x401}, {0x5, 0x3, 0x8, 0x8}, {0xffffffffffff0001, 0x3, 0xfffffffffffffff7, 0x5}, {0x1ff, 0x8001, 0x3}, {0x3, 0x9, 0xffffffff, 0x2}, {0x5, 0x4, 0x574, 0x64c}, {0x5, 0x4, 0x10001, 0x6}, {0x1, 0x5b2c, 0x3ff, 0x7}, {0xff, 0x2, 0x5, 0x62c5fc18}, {0x101, 0x7, 0x2, 0xfffffffffffffffd}, {0x7fff, 0x6, 0x8, 0x4}, {0x9, 0x0, 0x7, 0xff}, {0x4, 0x4, 0x4, 0x10000}, {0x59b0, 0xfff, 0x4, 0x4}, {0x1f, 0xfffffffffffffffd, 0x8001, 0x800}, {0x0, 0xffffffffffffffff, 0x2, 0x65}, {0x1ff, 0x1, 0x2, 0x7ff}, {0x4, 0x5, 0x1, 0x7be}, {0x9e4, 0x0, 0x7, 0x5}, {0x5, 0x8, 0x7f, 0xffffffff}, {0x4, 0x6, 0x5, 0x7ff}, {0x22aaaf52, 0x8f, 0x6, 0x10000}, {0x2, 0x7, 0xffff}, {0x5, 0xfffffffff016eb50, 0x82, 0x7}, {0x38, 0x800, 0x9a2a, 0xfffffffffffffffc}, {0x5, 0xb, 0x4, 0xfffffffffffff001}, {0x8b5, 0x81, 0x4, 0x2}, {0x8, 0xfffffffffffffff8, 0x1, 0x8}, {0x40, 0x4, 0x1, 0x100000001}, {0x9b, 0x5, 0x1, 0xd64c}, {0x100, 0x8, 0x7, 0x3ff}, {0xf11, 0x200, 0x7, 0x2}, {0xac5, 0x0, 0x3, 0x7}, {0x518, 0x1, 0x80}, {0x6, 0x7f, 0x6, 0x7298}, {0x7, 0x1, 0x2, 0x1ec9}, {0x400, 0x2, 0x6, 0x6c3}, {0x100000001, 0x6, 0x5, 0x9}, {0x8, 0x1dae, 0xfffffffffffffff8, 0x101}, {0x2, 0x7, 0x8, 0x3}, {0x0, 0x45b, 0x7, 0x72}, {0x100000001, 0xc00000000000, 0x100000001, 0x8}, {0x100000001, 0x0, 0xfffffffffffffffc, 0x3}, {0x95, 0x90b, 0x0, 0xfffffffffffff565}, {0x0, 0x4, 0x0, 0x2}], 0x40}}}]}}, @common=@IDLETIMER={'IDLETIMER\x00', 0x28, {{0x7f, 'syz0\x00'}}}}]}, {0x0, '\x00', 0x2, 0xfffffffffffffffc}, {0x0, '\x00', 0x2, 0xffffffffffffffff, 0x2, [{{{0x11, 0x40, 0x87df, 'irlan0\x00', 'sit0\x00', 'veth0_to_team\x00', 'ip6gretap0\x00', @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [0xff, 0xff, 0xff, 0xff, 0x0, 0xff], @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [0x0, 0xff, 0x0, 0xff], 0xb0, 0x210, 0x258, [@time={'time\x00', 0x18, {{0x1ff, 0x1, 0xe063, 0xb6c5, 0x2e80, 0x0, 0x2}}}]}, [@common=@redirect={'redirect\x00', 0x8, {{0xffffffffffffffff}}}, @common=@SECMARK={'SECMARK\x00', 0x108, {{0x1, 0x6, 'system_u:object_r:lost_found_t:s0\x00'}}}]}, @common=@ERROR={'ERROR\x00', 0x20, {"4323eed968d7072e70de82f41331fe3aed2aedc8f2fff16e54b1c4e2ad07"}}}, {{{0x5, 0x54, 0x888d, 'ip6gretap0\x00', 'teql0\x00', 'veth1_to_team\x00', 'erspan0\x00', @random="0eae55d5aac5", [0x0, 0xff, 0x0, 0xff, 0xff, 0xff], @empty, [0xff, 0xff, 0xff, 0x0, 0xff, 0xff], 0x70, 0x70, 0xb8}}, @common=@RATEEST={'RATEEST\x00', 0x20, {{'syz0\x00', 0x9, 0x1, 0x4}}}}]}]}, 0x9a0) 2018/05/15 08:25:08 executing program 5: r0 = syz_open_procfs(0x0, &(0x7f0000000280)='net/ptype\x00') sendfile(r0, r0, &(0x7f0000000000)=0x1a, 0x7fffffff) [ 438.798211] kernel msg: ebtables bug: please report to author: Wrong len argument 2018/05/15 08:25:08 executing program 5: r0 = syz_open_procfs(0x0, &(0x7f0000000280)='net/ptype\x00') sendfile(r0, r0, &(0x7f0000000000)=0x45, 0x7fffffff) 2018/05/15 08:25:08 executing program 4: perf_event_open$cgroup(&(0x7f0000000240)={0x7, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff9, 0x5, 0x0, 0x5, 0x6, @perf_bp={&(0x7f0000000200), 0x6}, 0x10202, 0x4, 0x4, 0x7, 0xdf, 0x9, 0x3}, 0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x8) 2018/05/15 08:25:08 executing program 2: syz_emit_ethernet(0x3e, &(0x7f00000001c0)={@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, @dev={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa]}, [], {@ipv6={0x86dd, {0x0, 0x6, "50a09c", 0x8, 0x0, 0x0, @remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x8848000000000000], 0xbb}, @local={0xfe, 0x80, [], 0xaa}, {[], @udp={0x0, 0x0, 0x8}}}}}}, &(0x7f0000000040)) 2018/05/15 08:25:08 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f0000000280)="6e65742f6970365f7461626c65735f6d61746368657300b6e23bcf6093cb57f8b4d285e9c48608549acee9a66f09d47a011dcc8f5af7870c6c1b6eebe85ebea4ecda4e44def87e8ee568c843daaf2805944012bc0144937e8b04411d09016ca07f7388ded591e346fb612397e79a6fe43e5c6a86bee1565b17b22b8ed5c95b4afbb3a620d1402c50bbaad790d0ffdb7c5a27e60423079f77bf") unlink(&(0x7f0000000080)='./file0\x00') sendfile(r0, r0, &(0x7f00000000c0)=0x10000000, 0x2) ioctl$KDGKBMETA(r0, 0x4b62, &(0x7f0000000100)) getsockopt$inet_sctp_SCTP_PARTIAL_DELIVERY_POINT(r0, 0x84, 0x13, &(0x7f0000000140)={0x0, 0xfffffffffffffffa}, &(0x7f0000000180)=0x8) syslog(0x2, &(0x7f0000000cc0)=""/107, 0x6b) setsockopt$IP_VS_SO_SET_DEL(r0, 0x0, 0x484, &(0x7f0000000200)={0x87, @dev={0xac, 0x14, 0x14, 0x1a}, 0x4e24, 0x2, 'rr\x00', 0x3, 0x2, 0x66}, 0x2c) setsockopt$inet_sctp_SCTP_STREAM_SCHEDULER(r0, 0x84, 0x7b, &(0x7f00000001c0)={r1, 0x40ef2843}, 0x8) setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x40, &(0x7f0000000340)=ANY=[@ANYBLOB="73656375726974790000000000000000000000000000000000000000000000000e00000004000000f8030000fffffffff00000000000000000000000ffffffffffffffff600300006003000060030000ffffffff04000000", @ANYPTR=&(0x7f0000000d40)=ANY=[@ANYBLOB="000000000000000000000000002100ebe70048ca02fec408edfbaf31ba590218fdffffffffffd60000000000000000000000000000000000000000000000000021d13202a6d3d3de0000000000000000000000"], @ANYBLOB="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"], 0x458) 2018/05/15 08:25:08 executing program 0: perf_event_open$cgroup(&(0x7f0000000240)={0x7, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff9, 0x5, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000200), 0x6}, 0x10202, 0x4, 0x4, 0x7, 0xdf, 0x9, 0x3}, 0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x8) 2018/05/15 08:25:08 executing program 3: syz_emit_ethernet(0x3e, &(0x7f00000001c0)={@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, @dev={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa]}, [], {@ipv6={0x86dd, {0x0, 0x6, "50a09c", 0x8, 0xffffff87, 0x0, @remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0xe00], 0xbb}, @local={0xfe, 0x80, [], 0xaa}, {[], @udp={0x0, 0x0, 0x8}}}}}}, &(0x7f0000000040)) 2018/05/15 08:25:08 executing program 7: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup(r0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000d40)=@broute={'broute\x00', 0x20, 0x4, 0x800, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000400], 0x0, &(0x7f0000000000), &(0x7f0000000400)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x2, [{{{0x5, 0x0, 0x0, 'bcsh0\x00', 'sit0\x00', 'syzkaller1\x00', 'veth0\x00', @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [], @dev={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa]}, [], 0xb0, 0x100, 0x130, [@owner={'owner\x00', 0x18, {{0x0, 0x0, 0x0, 0x0, 0x1, 0x1}}}]}, [@common=@LED={'LED\x00', 0x28, {{'syz0\x00', 0x1, 0x0, 0x800}}}]}, @common=@redirect={'redirect\x00', 0x8, {{0xfffffffffffffffe}}}}, {{{0x11, 0x4, 0x88e7, 'veth1_to_bond\x00', 'erspan0\x00', 'bridge_slave_1\x00', 'veth0_to_bridge\x00', @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [0xff, 0xff, 0x0, 0xff, 0x0, 0xff], @random="cfa071dc33d9", [0xff, 0xff, 0xff, 0xff, 0xff, 0xff], 0x2e0, 0x2e0, 0x330, [@mac={'mac\x00', 0x10, {{@remote={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xbb}, 0x1}}}, @bpf0={'bpf\x00', 0x210, {{0x20, [{0x8000, 0x4902, 0x5, 0x3ff}, {0x5, 0x8, 0x2, 0xff}, {0x1000, 0x48000000000, 0x3}, {0xf7, 0x1f, 0xfffffffffffffe00, 0x1}, {0x10000, 0xfc0, 0x1, 0x6}, {0x4, 0x2, 0xcefa, 0x81}, {0x815, 0xc7, 0x8001, 0x6a0}, {0x40, 0x0, 0x9, 0x80000001}, {0xffffffffffffff53, 0x38a, 0x100000000, 0x7}, {0x5, 0x1, 0x1000, 0x10001}, {0x80000000, 0x7, 0x1, 0xf7}, {0x2, 0x9, 0x4c, 0x5}, {0xfffffffffffffff7, 0x0, 0xe74, 0x52a}, {0x1ff, 0x7, 0x3, 0x7}, {0x6, 0x1ff, 0x49, 0x7}, {0x8000, 0x0, 0x7, 0x684}, {0xffe, 0x988, 0x3, 0x1}, {0x7b, 0x5a07, 0x18, 0x7}, {0xfffffffffffffffe, 0xfff, 0x3, 0x178180a0}, {0x2, 0xc0, 0x6, 0x401}, {0x5, 0x3, 0x8, 0x8}, {0xffffffffffff0001, 0x3, 0xfffffffffffffff7, 0x5}, {0x1ff, 0x8001, 0x3}, {0x3, 0x9, 0xffffffff, 0x2}, {0x5, 0x4, 0x574, 0x64c}, {0x5, 0x4, 0x10001, 0x6}, {0x1, 0x5b2c, 0x3ff, 0x7}, {0xff, 0x2, 0x5, 0x62c5fc18}, {0x101, 0x7, 0x2, 0xfffffffffffffffd}, {0x7fff, 0x6, 0x8, 0x4}, {0x9, 0x0, 0x7, 0xff}, {0x4, 0x4, 0x4, 0x10000}, {0x59b0, 0xfff, 0x4, 0x4}, {0x1f, 0xfffffffffffffffd, 0x8001, 0x800}, {0x0, 0xffffffffffffffff, 0x2, 0x65}, {0x1ff, 0x1, 0x2, 0x7ff}, {0x4, 0x5, 0x1, 0x7be}, {0x9e4, 0x0, 0x7, 0x5}, {0x5, 0x8, 0x7f, 0xffffffff}, {0x4, 0x6, 0x5, 0x7ff}, {0x22aaaf52, 0x8f, 0x6, 0x10000}, {0x2, 0x7, 0xffff}, {0x5, 0xfffffffff016eb50, 0x82, 0x7}, {0x38, 0x800, 0x9a2a, 0xfffffffffffffffc}, {0x5, 0xb, 0x4, 0xfffffffffffff001}, {0x8b5, 0x81, 0x4, 0x2}, {0x8, 0xfffffffffffffff8, 0x1, 0x8}, {0x40, 0x4, 0x1, 0x100000001}, {0x9b, 0x5, 0x1, 0xd64c}, {0x100, 0x8, 0x7, 0x3ff}, {0xf11, 0x200, 0x7, 0x2}, {0xac5, 0x0, 0x3, 0x7}, {0x518, 0x1, 0x80}, {0x6, 0x7f, 0x6, 0x7298}, {0x7, 0x1, 0x2, 0x1ec9}, {0x400, 0x2, 0x6, 0x6c3}, {0x100000001, 0x6, 0x5, 0x9}, {0x8, 0x1dae, 0xfffffffffffffff8, 0x101}, {0x2, 0x7, 0x8, 0x3}, {0x0, 0x45b, 0x7, 0x72}, {0x100000001, 0xc00000000000, 0x100000001, 0x8}, {0x100000001, 0x0, 0xfffffffffffffffc, 0x3}, {0x95, 0x90b, 0x0, 0xfffffffffffff565}, {0x0, 0x4, 0x0, 0x2}], 0x40}}}]}}, @common=@IDLETIMER={'IDLETIMER\x00', 0x28, {{0x7f, 'syz0\x00'}}}}]}, {0x0, '\x00', 0x2, 0xfffffffffffffffc}, {0x0, '\x00', 0x2, 0xffffffffffffffff, 0x2, [{{{0x11, 0x40, 0x87df, 'irlan0\x00', 'sit0\x00', 'veth0_to_team\x00', 'ip6gretap0\x00', @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [0xff, 0xff, 0xff, 0xff, 0x0, 0xff], @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [0x0, 0xff, 0x0, 0xff], 0xb0, 0x210, 0x258, [@time={'time\x00', 0x18, {{0x1ff, 0x1, 0xe063, 0xb6c5, 0x2e80, 0x0, 0x2}}}]}, [@common=@redirect={'redirect\x00', 0x8, {{0xffffffffffffffff}}}, @common=@SECMARK={'SECMARK\x00', 0x108, {{0x1, 0x6, 'system_u:object_r:lost_found_t:s0\x00'}}}]}, @common=@ERROR={'ERROR\x00', 0x20, {"4323eed968d7072e70de82f41331fe3aed2aedc8f2fff16e54b1c4e2ad07"}}}, {{{0x5, 0x54, 0x888d, 'ip6gretap0\x00', 'teql0\x00', 'veth1_to_team\x00', 'erspan0\x00', @random="0eae55d5aac5", [0x0, 0xff, 0x0, 0xff, 0xff, 0xff], @empty, [0xff, 0xff, 0xff, 0x0, 0xff, 0xff], 0x70, 0x70, 0xb8}}, @common=@RATEEST={'RATEEST\x00', 0x20, {{'syz0\x00', 0x9, 0x1, 0x4}}}}]}]}, 0x9a0) 2018/05/15 08:25:08 executing program 6: perf_event_open$cgroup(&(0x7f0000000240)={0x7, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff9, 0x5, 0x0, 0x0, 0x6, @perf_bp={&(0x7f0000000200), 0x6}, 0x10202, 0x4, 0x4, 0x7, 0xdf, 0x9, 0x3}, 0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x8) [ 439.619610] kernel msg: ebtables bug: please report to author: Wrong len argument 2018/05/15 08:25:09 executing program 5: r0 = syz_open_procfs(0x0, &(0x7f0000000280)='net/ptype\x00') sendfile(r0, r0, &(0x7f0000000000)=0x5e, 0x7fffffff) 2018/05/15 08:25:09 executing program 6: perf_event_open$cgroup(&(0x7f0000000240)={0x7, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff9, 0x5, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000200), 0x6}, 0x10202, 0x4, 0x4, 0x7, 0xdf, 0x9, 0x3}, 0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x8) 2018/05/15 08:25:09 executing program 0: perf_event_open$cgroup(&(0x7f0000000240)={0x7, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff9, 0x5, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000200)}, 0x10202, 0x4, 0x4, 0x7, 0xdf, 0x9, 0x3}, 0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x8) 2018/05/15 08:25:09 executing program 3: syz_emit_ethernet(0x3e, &(0x7f00000001c0)={@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, @dev={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa]}, [], {@ipv6={0x86dd, {0x0, 0x6, "50a09c", 0x8, 0xffffff87, 0x0, @remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x8864], 0xbb}, @local={0xfe, 0x80, [], 0xaa}, {[], @udp={0x0, 0x0, 0x8}}}}}}, &(0x7f0000000040)) 2018/05/15 08:25:09 executing program 4: perf_event_open$cgroup(&(0x7f0000000240)={0x7, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x5, 0x6, @perf_bp={&(0x7f0000000200), 0x6}, 0x10202, 0x4, 0x4, 0x7, 0xdf, 0x9, 0x3}, 0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x8) 2018/05/15 08:25:09 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f0000000280)="6e65742f6970365f7461626c65735f6d61746368657300b6e23bcf6093cb57f8b4d285e9c48608549acee9a66f09d47a011dcc8f5af7870c6c1b6eebe85ebea4ecda4e44def87e8ee568c843daaf2805944012bc0144937e8b04411d09016ca07f7388ded591e346fb612397e79a6fe43e5c6a86bee1565b17b22b8ed5c95b4afbb3a620d1402c50bbaad790d0ffdb7c5a27e60423079f77bf") unlink(&(0x7f0000000080)='./file0\x00') sendfile(r0, r0, &(0x7f00000000c0)=0x10000000, 0x2) ioctl$KDGKBMETA(r0, 0x4b62, &(0x7f0000000100)) getsockopt$inet_sctp_SCTP_PARTIAL_DELIVERY_POINT(r0, 0x84, 0x13, &(0x7f0000000140)={0x0, 0xfffffffffffffffa}, &(0x7f0000000180)=0x8) syslog(0x2, &(0x7f0000000cc0)=""/107, 0x6b) setsockopt$IP_VS_SO_SET_DEL(r0, 0x0, 0x484, &(0x7f0000000200)={0x87, @dev={0xac, 0x14, 0x14, 0x1a}, 0x4e24, 0x2, 'rr\x00', 0x3, 0x2, 0x66}, 0x2c) setsockopt$inet_sctp_SCTP_STREAM_SCHEDULER(r0, 0x84, 0x7b, &(0x7f00000001c0)={r1, 0x40ef2843}, 0x8) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000000)='dctcp\x00', 0x6) 2018/05/15 08:25:09 executing program 7: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup(r0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000d40)=@broute={'broute\x00', 0x20, 0x4, 0x8e8, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000400], 0x0, &(0x7f0000000000), &(0x7f0000000400)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x2, [{{{0x5, 0x0, 0x0, 'bcsh0\x00', 'sit0\x00', 'syzkaller1\x00', 'veth0\x00', @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [], @dev={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa]}, [], 0x198, 0x1e8, 0x218, [@comment={'comment\x00', 0x100}]}, [@common=@LED={'LED\x00', 0x28, {{'syz0\x00', 0x1, 0x0, 0x800}}}]}, @common=@redirect={'redirect\x00', 0x8, {{0xfffffffffffffffe}}}}, {{{0x11, 0x4, 0x88e7, 'veth1_to_bond\x00', 'erspan0\x00', 'bridge_slave_1\x00', 'veth0_to_bridge\x00', @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [0xff, 0xff, 0x0, 0xff, 0x0, 0xff], @random="cfa071dc33d9", [0xff, 0xff, 0xff, 0xff, 0xff, 0xff], 0x2e0, 0x2e0, 0x330, [@mac={'mac\x00', 0x10, {{@remote={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xbb}, 0x1}}}, @bpf0={'bpf\x00', 0x210, {{0x20, [{0x8000, 0x4902, 0x5, 0x3ff}, {0x5, 0x8, 0x2, 0xff}, {0x1000, 0x48000000000, 0x3}, {0xf7, 0x1f, 0xfffffffffffffe00, 0x1}, {0x10000, 0xfc0, 0x1, 0x6}, {0x4, 0x2, 0xcefa, 0x81}, {0x815, 0xc7, 0x8001, 0x6a0}, {0x40, 0x0, 0x9, 0x80000001}, {0xffffffffffffff53, 0x38a, 0x100000000, 0x7}, {0x5, 0x1, 0x1000, 0x10001}, {0x80000000, 0x7, 0x1, 0xf7}, {0x2, 0x9, 0x4c, 0x5}, {0xfffffffffffffff7, 0x0, 0xe74, 0x52a}, {0x1ff, 0x7, 0x3, 0x7}, {0x6, 0x1ff, 0x49, 0x7}, {0x8000, 0x0, 0x7, 0x684}, {0xffe, 0x988, 0x3, 0x1}, {0x7b, 0x5a07, 0x18, 0x7}, {0xfffffffffffffffe, 0xfff, 0x3, 0x178180a0}, {0x2, 0xc0, 0x6, 0x401}, {0x5, 0x3, 0x8, 0x8}, {0xffffffffffff0001, 0x3, 0xfffffffffffffff7, 0x5}, {0x1ff, 0x8001, 0x3}, {0x3, 0x9, 0xffffffff, 0x2}, {0x5, 0x4, 0x574, 0x64c}, {0x5, 0x4, 0x10001, 0x6}, {0x1, 0x5b2c, 0x3ff, 0x7}, {0xff, 0x2, 0x5, 0x62c5fc18}, {0x101, 0x7, 0x2, 0xfffffffffffffffd}, {0x7fff, 0x6, 0x8, 0x4}, {0x9, 0x0, 0x7, 0xff}, {0x4, 0x4, 0x4, 0x10000}, {0x59b0, 0xfff, 0x4, 0x4}, {0x1f, 0xfffffffffffffffd, 0x8001, 0x800}, {0x0, 0xffffffffffffffff, 0x2, 0x65}, {0x1ff, 0x1, 0x2, 0x7ff}, {0x4, 0x5, 0x1, 0x7be}, {0x9e4, 0x0, 0x7, 0x5}, {0x5, 0x8, 0x7f, 0xffffffff}, {0x4, 0x6, 0x5, 0x7ff}, {0x22aaaf52, 0x8f, 0x6, 0x10000}, {0x2, 0x7, 0xffff}, {0x5, 0xfffffffff016eb50, 0x82, 0x7}, {0x38, 0x800, 0x9a2a, 0xfffffffffffffffc}, {0x5, 0xb, 0x4, 0xfffffffffffff001}, {0x8b5, 0x81, 0x4, 0x2}, {0x8, 0xfffffffffffffff8, 0x1, 0x8}, {0x40, 0x4, 0x1, 0x100000001}, {0x9b, 0x5, 0x1, 0xd64c}, {0x100, 0x8, 0x7, 0x3ff}, {0xf11, 0x200, 0x7, 0x2}, {0xac5, 0x0, 0x3, 0x7}, {0x518, 0x1, 0x80}, {0x6, 0x7f, 0x6, 0x7298}, {0x7, 0x1, 0x2, 0x1ec9}, {0x400, 0x2, 0x6, 0x6c3}, {0x100000001, 0x6, 0x5, 0x9}, {0x8, 0x1dae, 0xfffffffffffffff8, 0x101}, {0x2, 0x7, 0x8, 0x3}, {0x0, 0x45b, 0x7, 0x72}, {0x100000001, 0xc00000000000, 0x100000001, 0x8}, {0x100000001, 0x0, 0xfffffffffffffffc, 0x3}, {0x95, 0x90b, 0x0, 0xfffffffffffff565}, {0x0, 0x4, 0x0, 0x2}], 0x40}}}]}}, @common=@IDLETIMER={'IDLETIMER\x00', 0x28, {{0x7f, 'syz0\x00'}}}}]}, {0x0, '\x00', 0x2, 0xfffffffffffffffc}, {0x0, '\x00', 0x2, 0xffffffffffffffff, 0x2, [{{{0x11, 0x40, 0x87df, 'irlan0\x00', 'sit0\x00', 'veth0_to_team\x00', 'ip6gretap0\x00', @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [0xff, 0xff, 0xff, 0xff, 0x0, 0xff], @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [0x0, 0xff, 0x0, 0xff], 0xb0, 0x210, 0x258, [@time={'time\x00', 0x18, {{0x1ff, 0x1, 0xe063, 0xb6c5, 0x2e80, 0x0, 0x2}}}]}, [@common=@redirect={'redirect\x00', 0x8, {{0xffffffffffffffff}}}, @common=@SECMARK={'SECMARK\x00', 0x108, {{0x1, 0x6, 'system_u:object_r:lost_found_t:s0\x00'}}}]}, @common=@ERROR={'ERROR\x00', 0x20, {"4323eed968d7072e70de82f41331fe3aed2aedc8f2fff16e54b1c4e2ad07"}}}, {{{0x5, 0x54, 0x888d, 'ip6gretap0\x00', 'teql0\x00', 'veth1_to_team\x00', 'erspan0\x00', @random="0eae55d5aac5", [0x0, 0xff, 0x0, 0xff, 0xff, 0xff], @empty, [0xff, 0xff, 0xff, 0x0, 0xff, 0xff], 0x70, 0x70, 0xb8}}, @common=@RATEEST={'RATEEST\x00', 0x20, {{'syz0\x00', 0x9, 0x1, 0x4}}}}]}]}, 0x9a0) 2018/05/15 08:25:09 executing program 2: syz_emit_ethernet(0x3e, &(0x7f00000001c0)={@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, @dev={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa]}, [], {@ipv6={0x86dd, {0x0, 0x6, "50a09c", 0x8, 0x0, 0x0, @remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x88a8ffff], 0xbb}, @local={0xfe, 0x80, [], 0xaa}, {[], @udp={0x0, 0x0, 0x8}}}}}}, &(0x7f0000000040)) 2018/05/15 08:25:09 executing program 5: r0 = syz_open_procfs(0x0, &(0x7f0000000280)='net/ptype\x00') sendfile(r0, r0, &(0x7f0000000000)=0x10d, 0x7fffffff) 2018/05/15 08:25:09 executing program 4: perf_event_open$cgroup(&(0x7f0000000240)={0x7, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x5, 0x6, @perf_bp={&(0x7f0000000200), 0x6}, 0x10202, 0x4, 0x4, 0x7, 0xdf, 0x9, 0x3}, 0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x8) 2018/05/15 08:25:09 executing program 0: perf_event_open$cgroup(&(0x7f0000000240)={0x7, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff9, 0x5, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000200)}, 0x0, 0x4, 0x4, 0x7, 0xdf, 0x9, 0x3}, 0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x8) 2018/05/15 08:25:09 executing program 2: syz_emit_ethernet(0x3e, &(0x7f00000001c0)={@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, @dev={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa]}, [], {@ipv6={0x86dd, {0x0, 0x6, "50a09c", 0x8, 0x0, 0x0, @remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x2c000000], 0xbb}, @local={0xfe, 0x80, [], 0xaa}, {[], @udp={0x0, 0x0, 0x8}}}}}}, &(0x7f0000000040)) [ 440.611977] kernel msg: ebtables bug: please report to author: Wrong len argument 2018/05/15 08:25:09 executing program 6: perf_event_open$cgroup(&(0x7f0000000240)={0x7, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff9, 0x5, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000200), 0x6}, 0x10202, 0x4, 0x4, 0x7, 0xdf, 0x9, 0x3}, 0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x8) 2018/05/15 08:25:09 executing program 3: syz_emit_ethernet(0x3e, &(0x7f00000001c0)={@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, @dev={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa]}, [], {@ipv6={0x86dd, {0x0, 0x6, "50a09c", 0x8, 0xffffff87, 0x0, @remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x543], 0xbb}, @local={0xfe, 0x80, [], 0xaa}, {[], @udp={0x0, 0x0, 0x8}}}}}}, &(0x7f0000000040)) 2018/05/15 08:25:09 executing program 7: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup(r0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000d40)=@broute={'broute\x00', 0x20, 0x4, 0x8e8, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000400], 0x0, &(0x7f0000000000), &(0x7f0000000400)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x2, [{{{0x5, 0x0, 0x0, 'bcsh0\x00', 'sit0\x00', 'syzkaller1\x00', 'veth0\x00', @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [], @dev={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa]}, [], 0x198, 0x1e8, 0x218, [@comment={'comment\x00', 0x100}]}, [@common=@LED={'LED\x00', 0x28, {{'syz0\x00', 0x1, 0x0, 0x800}}}]}, @common=@redirect={'redirect\x00', 0x8, {{0xfffffffffffffffe}}}}, {{{0x11, 0x4, 0x88e7, 'veth1_to_bond\x00', 'erspan0\x00', 'bridge_slave_1\x00', 'veth0_to_bridge\x00', @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [0xff, 0xff, 0x0, 0xff, 0x0, 0xff], @random="cfa071dc33d9", [0xff, 0xff, 0xff, 0xff, 0xff, 0xff], 0x2e0, 0x2e0, 0x330, [@mac={'mac\x00', 0x10, {{@remote={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xbb}, 0x1}}}, @bpf0={'bpf\x00', 0x210, {{0x20, [{0x8000, 0x4902, 0x5, 0x3ff}, {0x5, 0x8, 0x2, 0xff}, {0x1000, 0x48000000000, 0x3}, {0xf7, 0x1f, 0xfffffffffffffe00, 0x1}, {0x10000, 0xfc0, 0x1, 0x6}, {0x4, 0x2, 0xcefa, 0x81}, {0x815, 0xc7, 0x8001, 0x6a0}, {0x40, 0x0, 0x9, 0x80000001}, {0xffffffffffffff53, 0x38a, 0x100000000, 0x7}, {0x5, 0x1, 0x1000, 0x10001}, {0x80000000, 0x7, 0x1, 0xf7}, {0x2, 0x9, 0x4c, 0x5}, {0xfffffffffffffff7, 0x0, 0xe74, 0x52a}, {0x1ff, 0x7, 0x3, 0x7}, {0x6, 0x1ff, 0x49, 0x7}, {0x8000, 0x0, 0x7, 0x684}, {0xffe, 0x988, 0x3, 0x1}, {0x7b, 0x5a07, 0x18, 0x7}, {0xfffffffffffffffe, 0xfff, 0x3, 0x178180a0}, {0x2, 0xc0, 0x6, 0x401}, {0x5, 0x3, 0x8, 0x8}, {0xffffffffffff0001, 0x3, 0xfffffffffffffff7, 0x5}, {0x1ff, 0x8001, 0x3}, {0x3, 0x9, 0xffffffff, 0x2}, {0x5, 0x4, 0x574, 0x64c}, {0x5, 0x4, 0x10001, 0x6}, {0x1, 0x5b2c, 0x3ff, 0x7}, {0xff, 0x2, 0x5, 0x62c5fc18}, {0x101, 0x7, 0x2, 0xfffffffffffffffd}, {0x7fff, 0x6, 0x8, 0x4}, {0x9, 0x0, 0x7, 0xff}, {0x4, 0x4, 0x4, 0x10000}, {0x59b0, 0xfff, 0x4, 0x4}, {0x1f, 0xfffffffffffffffd, 0x8001, 0x800}, {0x0, 0xffffffffffffffff, 0x2, 0x65}, {0x1ff, 0x1, 0x2, 0x7ff}, {0x4, 0x5, 0x1, 0x7be}, {0x9e4, 0x0, 0x7, 0x5}, {0x5, 0x8, 0x7f, 0xffffffff}, {0x4, 0x6, 0x5, 0x7ff}, {0x22aaaf52, 0x8f, 0x6, 0x10000}, {0x2, 0x7, 0xffff}, {0x5, 0xfffffffff016eb50, 0x82, 0x7}, {0x38, 0x800, 0x9a2a, 0xfffffffffffffffc}, {0x5, 0xb, 0x4, 0xfffffffffffff001}, {0x8b5, 0x81, 0x4, 0x2}, {0x8, 0xfffffffffffffff8, 0x1, 0x8}, {0x40, 0x4, 0x1, 0x100000001}, {0x9b, 0x5, 0x1, 0xd64c}, {0x100, 0x8, 0x7, 0x3ff}, {0xf11, 0x200, 0x7, 0x2}, {0xac5, 0x0, 0x3, 0x7}, {0x518, 0x1, 0x80}, {0x6, 0x7f, 0x6, 0x7298}, {0x7, 0x1, 0x2, 0x1ec9}, {0x400, 0x2, 0x6, 0x6c3}, {0x100000001, 0x6, 0x5, 0x9}, {0x8, 0x1dae, 0xfffffffffffffff8, 0x101}, {0x2, 0x7, 0x8, 0x3}, {0x0, 0x45b, 0x7, 0x72}, {0x100000001, 0xc00000000000, 0x100000001, 0x8}, {0x100000001, 0x0, 0xfffffffffffffffc, 0x3}, {0x95, 0x90b, 0x0, 0xfffffffffffff565}, {0x0, 0x4, 0x0, 0x2}], 0x40}}}]}}, @common=@IDLETIMER={'IDLETIMER\x00', 0x28, {{0x7f, 'syz0\x00'}}}}]}, {0x0, '\x00', 0x2, 0xfffffffffffffffc}, {0x0, '\x00', 0x2, 0xffffffffffffffff, 0x2, [{{{0x11, 0x40, 0x87df, 'irlan0\x00', 'sit0\x00', 'veth0_to_team\x00', 'ip6gretap0\x00', @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [0xff, 0xff, 0xff, 0xff, 0x0, 0xff], @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [0x0, 0xff, 0x0, 0xff], 0xb0, 0x210, 0x258, [@time={'time\x00', 0x18, {{0x1ff, 0x1, 0xe063, 0xb6c5, 0x2e80, 0x0, 0x2}}}]}, [@common=@redirect={'redirect\x00', 0x8, {{0xffffffffffffffff}}}, @common=@SECMARK={'SECMARK\x00', 0x108, {{0x1, 0x6, 'system_u:object_r:lost_found_t:s0\x00'}}}]}, @common=@ERROR={'ERROR\x00', 0x20, {"4323eed968d7072e70de82f41331fe3aed2aedc8f2fff16e54b1c4e2ad07"}}}, {{{0x5, 0x54, 0x888d, 'ip6gretap0\x00', 'teql0\x00', 'veth1_to_team\x00', 'erspan0\x00', @random="0eae55d5aac5", [0x0, 0xff, 0x0, 0xff, 0xff, 0xff], @empty, [0xff, 0xff, 0xff, 0x0, 0xff, 0xff], 0x70, 0x70, 0xb8}}, @common=@RATEEST={'RATEEST\x00', 0x20, {{'syz0\x00', 0x9, 0x1, 0x4}}}}]}]}, 0x9a0) [ 440.774572] kernel msg: ebtables bug: please report to author: Wrong len argument 2018/05/15 08:25:10 executing program 5: r0 = syz_open_procfs(0x0, &(0x7f0000000280)='net/ptype\x00') sendfile(r0, r0, &(0x7f0000000000)=0xa9, 0x7fffffff) 2018/05/15 08:25:10 executing program 4: perf_event_open$cgroup(&(0x7f0000000240)={0x7, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x5, 0x6, @perf_bp={&(0x7f0000000200), 0x6}, 0x10202, 0x4, 0x4, 0x7, 0xdf, 0x9, 0x3}, 0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x8) 2018/05/15 08:25:10 executing program 0: perf_event_open$cgroup(&(0x7f0000000240)={0x7, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff9, 0x5, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000200)}, 0x0, 0x0, 0x4, 0x7, 0xdf, 0x9, 0x3}, 0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x8) 2018/05/15 08:25:10 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f0000000280)="6e65742f6970365f7461626c65735f6d61746368657300b6e23bcf6093cb57f8b4d285e9c48608549acee9a66f09d47a011dcc8f5af7870c6c1b6eebe85ebea4ecda4e44def87e8ee568c843daaf2805944012bc0144937e8b04411d09016ca07f7388ded591e346fb612397e79a6fe43e5c6a86bee1565b17b22b8ed5c95b4afbb3a620d1402c50bbaad790d0ffdb7c5a27e60423079f77bf") unlink(&(0x7f0000000080)='./file0\x00') sendfile(r0, r0, &(0x7f00000000c0)=0x10000000, 0x2) ioctl$KDGKBMETA(r0, 0x4b62, &(0x7f0000000100)) getsockopt$inet_sctp_SCTP_PARTIAL_DELIVERY_POINT(r0, 0x84, 0x13, &(0x7f0000000140)={0x0, 0xfffffffffffffffa}, &(0x7f0000000180)=0x8) syslog(0x2, &(0x7f0000000cc0)=""/107, 0x6b) setsockopt$IP_VS_SO_SET_DEL(r0, 0x0, 0x484, &(0x7f0000000200)={0x87, @dev={0xac, 0x14, 0x14, 0x1a}, 0x4e24, 0x2, 'rr\x00', 0x3, 0x2, 0x66}, 0x2c) setsockopt$inet_sctp_SCTP_STREAM_SCHEDULER(r0, 0x84, 0x7b, &(0x7f00000001c0)={r1, 0x40ef2843}, 0x8) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000000)='dctcp\x00', 0x6) 2018/05/15 08:25:10 executing program 6: perf_event_open$cgroup(&(0x7f0000000240)={0x7, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff9, 0x5, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000200), 0x6}, 0x10202, 0x4, 0x4, 0x7, 0xdf, 0x9, 0x3}, 0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x8) 2018/05/15 08:25:10 executing program 3: syz_emit_ethernet(0x3e, &(0x7f00000001c0)={@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, @dev={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa]}, [], {@ipv6={0x86dd, {0x0, 0x6, "50a09c", 0x8, 0xffffff87, 0x0, @remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x800000000000000], 0xbb}, @local={0xfe, 0x80, [], 0xaa}, {[], @udp={0x0, 0x0, 0x8}}}}}}, &(0x7f0000000040)) 2018/05/15 08:25:10 executing program 7: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup(r0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000d40)=@broute={'broute\x00', 0x20, 0x4, 0x8e8, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000400], 0x0, &(0x7f0000000000), &(0x7f0000000400)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x2, [{{{0x5, 0x0, 0x0, 'bcsh0\x00', 'sit0\x00', 'syzkaller1\x00', 'veth0\x00', @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [], @dev={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa]}, [], 0x198, 0x1e8, 0x218, [@comment={'comment\x00', 0x100}]}, [@common=@LED={'LED\x00', 0x28, {{'syz0\x00', 0x1, 0x0, 0x800}}}]}, @common=@redirect={'redirect\x00', 0x8, {{0xfffffffffffffffe}}}}, {{{0x11, 0x4, 0x88e7, 'veth1_to_bond\x00', 'erspan0\x00', 'bridge_slave_1\x00', 'veth0_to_bridge\x00', @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [0xff, 0xff, 0x0, 0xff, 0x0, 0xff], @random="cfa071dc33d9", [0xff, 0xff, 0xff, 0xff, 0xff, 0xff], 0x2e0, 0x2e0, 0x330, [@mac={'mac\x00', 0x10, {{@remote={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xbb}, 0x1}}}, @bpf0={'bpf\x00', 0x210, {{0x20, [{0x8000, 0x4902, 0x5, 0x3ff}, {0x5, 0x8, 0x2, 0xff}, {0x1000, 0x48000000000, 0x3}, {0xf7, 0x1f, 0xfffffffffffffe00, 0x1}, {0x10000, 0xfc0, 0x1, 0x6}, {0x4, 0x2, 0xcefa, 0x81}, {0x815, 0xc7, 0x8001, 0x6a0}, {0x40, 0x0, 0x9, 0x80000001}, {0xffffffffffffff53, 0x38a, 0x100000000, 0x7}, {0x5, 0x1, 0x1000, 0x10001}, {0x80000000, 0x7, 0x1, 0xf7}, {0x2, 0x9, 0x4c, 0x5}, {0xfffffffffffffff7, 0x0, 0xe74, 0x52a}, {0x1ff, 0x7, 0x3, 0x7}, {0x6, 0x1ff, 0x49, 0x7}, {0x8000, 0x0, 0x7, 0x684}, {0xffe, 0x988, 0x3, 0x1}, {0x7b, 0x5a07, 0x18, 0x7}, {0xfffffffffffffffe, 0xfff, 0x3, 0x178180a0}, {0x2, 0xc0, 0x6, 0x401}, {0x5, 0x3, 0x8, 0x8}, {0xffffffffffff0001, 0x3, 0xfffffffffffffff7, 0x5}, {0x1ff, 0x8001, 0x3}, {0x3, 0x9, 0xffffffff, 0x2}, {0x5, 0x4, 0x574, 0x64c}, {0x5, 0x4, 0x10001, 0x6}, {0x1, 0x5b2c, 0x3ff, 0x7}, {0xff, 0x2, 0x5, 0x62c5fc18}, {0x101, 0x7, 0x2, 0xfffffffffffffffd}, {0x7fff, 0x6, 0x8, 0x4}, {0x9, 0x0, 0x7, 0xff}, {0x4, 0x4, 0x4, 0x10000}, {0x59b0, 0xfff, 0x4, 0x4}, {0x1f, 0xfffffffffffffffd, 0x8001, 0x800}, {0x0, 0xffffffffffffffff, 0x2, 0x65}, {0x1ff, 0x1, 0x2, 0x7ff}, {0x4, 0x5, 0x1, 0x7be}, {0x9e4, 0x0, 0x7, 0x5}, {0x5, 0x8, 0x7f, 0xffffffff}, {0x4, 0x6, 0x5, 0x7ff}, {0x22aaaf52, 0x8f, 0x6, 0x10000}, {0x2, 0x7, 0xffff}, {0x5, 0xfffffffff016eb50, 0x82, 0x7}, {0x38, 0x800, 0x9a2a, 0xfffffffffffffffc}, {0x5, 0xb, 0x4, 0xfffffffffffff001}, {0x8b5, 0x81, 0x4, 0x2}, {0x8, 0xfffffffffffffff8, 0x1, 0x8}, {0x40, 0x4, 0x1, 0x100000001}, {0x9b, 0x5, 0x1, 0xd64c}, {0x100, 0x8, 0x7, 0x3ff}, {0xf11, 0x200, 0x7, 0x2}, {0xac5, 0x0, 0x3, 0x7}, {0x518, 0x1, 0x80}, {0x6, 0x7f, 0x6, 0x7298}, {0x7, 0x1, 0x2, 0x1ec9}, {0x400, 0x2, 0x6, 0x6c3}, {0x100000001, 0x6, 0x5, 0x9}, {0x8, 0x1dae, 0xfffffffffffffff8, 0x101}, {0x2, 0x7, 0x8, 0x3}, {0x0, 0x45b, 0x7, 0x72}, {0x100000001, 0xc00000000000, 0x100000001, 0x8}, {0x100000001, 0x0, 0xfffffffffffffffc, 0x3}, {0x95, 0x90b, 0x0, 0xfffffffffffff565}, {0x0, 0x4, 0x0, 0x2}], 0x40}}}]}}, @common=@IDLETIMER={'IDLETIMER\x00', 0x28, {{0x7f, 'syz0\x00'}}}}]}, {0x0, '\x00', 0x2, 0xfffffffffffffffc}, {0x0, '\x00', 0x2, 0xffffffffffffffff, 0x2, [{{{0x11, 0x40, 0x87df, 'irlan0\x00', 'sit0\x00', 'veth0_to_team\x00', 'ip6gretap0\x00', @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [0xff, 0xff, 0xff, 0xff, 0x0, 0xff], @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [0x0, 0xff, 0x0, 0xff], 0xb0, 0x210, 0x258, [@time={'time\x00', 0x18, {{0x1ff, 0x1, 0xe063, 0xb6c5, 0x2e80, 0x0, 0x2}}}]}, [@common=@redirect={'redirect\x00', 0x8, {{0xffffffffffffffff}}}, @common=@SECMARK={'SECMARK\x00', 0x108, {{0x1, 0x6, 'system_u:object_r:lost_found_t:s0\x00'}}}]}, @common=@ERROR={'ERROR\x00', 0x20, {"4323eed968d7072e70de82f41331fe3aed2aedc8f2fff16e54b1c4e2ad07"}}}, {{{0x5, 0x54, 0x888d, 'ip6gretap0\x00', 'teql0\x00', 'veth1_to_team\x00', 'erspan0\x00', @random="0eae55d5aac5", [0x0, 0xff, 0x0, 0xff, 0xff, 0xff], @empty, [0xff, 0xff, 0xff, 0x0, 0xff, 0xff], 0x70, 0x70, 0xb8}}, @common=@RATEEST={'RATEEST\x00', 0x20, {{'syz0\x00', 0x9, 0x1, 0x4}}}}]}]}, 0x9a0) 2018/05/15 08:25:10 executing program 2: syz_emit_ethernet(0x3e, &(0x7f00000001c0)={@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, @dev={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa]}, [], {@ipv6={0x86dd, {0x0, 0x6, "50a09c", 0x8, 0x0, 0x0, @remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x8035000000000000], 0xbb}, @local={0xfe, 0x80, [], 0xaa}, {[], @udp={0x0, 0x0, 0x8}}}}}}, &(0x7f0000000040)) 2018/05/15 08:25:10 executing program 4: perf_event_open$cgroup(&(0x7f0000000240)={0x7, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff9, 0x0, 0x0, 0x5, 0x6, @perf_bp={&(0x7f0000000200), 0x6}, 0x10202, 0x4, 0x4, 0x7, 0xdf, 0x9, 0x3}, 0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x8) 2018/05/15 08:25:10 executing program 0: perf_event_open$cgroup(&(0x7f0000000240)={0x7, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff9, 0x5, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000200)}, 0x0, 0x0, 0x0, 0x7, 0xdf, 0x9, 0x3}, 0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x8) 2018/05/15 08:25:10 executing program 5: r0 = syz_open_procfs(0x0, &(0x7f0000000280)='net/ptype\x00') sendfile(r0, r0, &(0x7f0000000000)=0x12a, 0x7fffffff) [ 440.935756] kernel msg: ebtables bug: please report to author: Wrong len argument 2018/05/15 08:25:10 executing program 6: perf_event_open$cgroup(&(0x7f0000000240)={0x7, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff9, 0x5, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000200)}, 0x10202, 0x4, 0x4, 0x7, 0xdf, 0x9, 0x3}, 0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x8) 2018/05/15 08:25:10 executing program 2: syz_emit_ethernet(0x3e, &(0x7f00000001c0)={@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, @dev={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa]}, [], {@ipv6={0x86dd, {0x0, 0x6, "50a09c", 0x8, 0x0, 0x0, @remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x2b00000000000000], 0xbb}, @local={0xfe, 0x80, [], 0xaa}, {[], @udp={0x0, 0x0, 0x8}}}}}}, &(0x7f0000000040)) 2018/05/15 08:25:10 executing program 3: syz_emit_ethernet(0x3e, &(0x7f00000001c0)={@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, @dev={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa]}, [], {@ipv6={0x86dd, {0x0, 0x6, "50a09c", 0x8, 0xffffff87, 0x0, @remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0xc0ffffff], 0xbb}, @local={0xfe, 0x80, [], 0xaa}, {[], @udp={0x0, 0x0, 0x8}}}}}}, &(0x7f0000000040)) 2018/05/15 08:25:10 executing program 7: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup(r0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000d40)=@broute={'broute\x00', 0x20, 0x4, 0x928, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000400], 0x0, &(0x7f0000000000), &(0x7f0000000400)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x2, [{{{0x5, 0x0, 0x0, 'bcsh0\x00', 'sit0\x00', 'syzkaller1\x00', 'veth0\x00', @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [], @dev={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa]}, [], 0x1d8, 0x228, 0x258, [@comment={'comment\x00', 0x100}, @owner={'owner\x00', 0x18, {{0x0, 0x0, 0x0, 0x0, 0x0, 0x1}}}]}, [@common=@LED={'LED\x00', 0x28, {{'syz0\x00', 0x1, 0x0, 0x800}}}]}, @common=@redirect={'redirect\x00', 0x8, {{0xfffffffffffffffe}}}}, {{{0x11, 0x4, 0x88e7, 'veth1_to_bond\x00', 'erspan0\x00', 'bridge_slave_1\x00', 'veth0_to_bridge\x00', @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [0xff, 0xff, 0x0, 0xff, 0x0, 0xff], @random="cfa071dc33d9", [0xff, 0xff, 0xff, 0xff, 0xff, 0xff], 0x2e0, 0x2e0, 0x330, [@mac={'mac\x00', 0x10, {{@remote={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xbb}, 0x1}}}, @bpf0={'bpf\x00', 0x210, {{0x20, [{0x8000, 0x4902, 0x5, 0x3ff}, {0x5, 0x8, 0x2, 0xff}, {0x1000, 0x48000000000, 0x3}, {0xf7, 0x1f, 0xfffffffffffffe00, 0x1}, {0x10000, 0xfc0, 0x1, 0x6}, {0x4, 0x2, 0xcefa, 0x81}, {0x815, 0xc7, 0x8001, 0x6a0}, {0x40, 0x0, 0x9, 0x80000001}, {0xffffffffffffff53, 0x38a, 0x100000000, 0x7}, {0x5, 0x1, 0x1000, 0x10001}, {0x80000000, 0x7, 0x1, 0xf7}, {0x2, 0x9, 0x4c, 0x5}, {0xfffffffffffffff7, 0x0, 0xe74, 0x52a}, {0x1ff, 0x7, 0x3, 0x7}, {0x6, 0x1ff, 0x49, 0x7}, {0x8000, 0x0, 0x7, 0x684}, {0xffe, 0x988, 0x3, 0x1}, {0x7b, 0x5a07, 0x18, 0x7}, {0xfffffffffffffffe, 0xfff, 0x3, 0x178180a0}, {0x2, 0xc0, 0x6, 0x401}, {0x5, 0x3, 0x8, 0x8}, {0xffffffffffff0001, 0x3, 0xfffffffffffffff7, 0x5}, {0x1ff, 0x8001, 0x3}, {0x3, 0x9, 0xffffffff, 0x2}, {0x5, 0x4, 0x574, 0x64c}, {0x5, 0x4, 0x10001, 0x6}, {0x1, 0x5b2c, 0x3ff, 0x7}, {0xff, 0x2, 0x5, 0x62c5fc18}, {0x101, 0x7, 0x2, 0xfffffffffffffffd}, {0x7fff, 0x6, 0x8, 0x4}, {0x9, 0x0, 0x7, 0xff}, {0x4, 0x4, 0x4, 0x10000}, {0x59b0, 0xfff, 0x4, 0x4}, {0x1f, 0xfffffffffffffffd, 0x8001, 0x800}, {0x0, 0xffffffffffffffff, 0x2, 0x65}, {0x1ff, 0x1, 0x2, 0x7ff}, {0x4, 0x5, 0x1, 0x7be}, {0x9e4, 0x0, 0x7, 0x5}, {0x5, 0x8, 0x7f, 0xffffffff}, {0x4, 0x6, 0x5, 0x7ff}, {0x22aaaf52, 0x8f, 0x6, 0x10000}, {0x2, 0x7, 0xffff}, {0x5, 0xfffffffff016eb50, 0x82, 0x7}, {0x38, 0x800, 0x9a2a, 0xfffffffffffffffc}, {0x5, 0xb, 0x4, 0xfffffffffffff001}, {0x8b5, 0x81, 0x4, 0x2}, {0x8, 0xfffffffffffffff8, 0x1, 0x8}, {0x40, 0x4, 0x1, 0x100000001}, {0x9b, 0x5, 0x1, 0xd64c}, {0x100, 0x8, 0x7, 0x3ff}, {0xf11, 0x200, 0x7, 0x2}, {0xac5, 0x0, 0x3, 0x7}, {0x518, 0x1, 0x80}, {0x6, 0x7f, 0x6, 0x7298}, {0x7, 0x1, 0x2, 0x1ec9}, {0x400, 0x2, 0x6, 0x6c3}, {0x100000001, 0x6, 0x5, 0x9}, {0x8, 0x1dae, 0xfffffffffffffff8, 0x101}, {0x2, 0x7, 0x8, 0x3}, {0x0, 0x45b, 0x7, 0x72}, {0x100000001, 0xc00000000000, 0x100000001, 0x8}, {0x100000001, 0x0, 0xfffffffffffffffc, 0x3}, {0x95, 0x90b, 0x0, 0xfffffffffffff565}, {0x0, 0x4, 0x0, 0x2}], 0x40}}}]}}, @common=@IDLETIMER={'IDLETIMER\x00', 0x28, {{0x7f, 'syz0\x00'}}}}]}, {0x0, '\x00', 0x2, 0xfffffffffffffffc}, {0x0, '\x00', 0x2, 0xffffffffffffffff, 0x2, [{{{0x11, 0x40, 0x87df, 'irlan0\x00', 'sit0\x00', 'veth0_to_team\x00', 'ip6gretap0\x00', @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [0xff, 0xff, 0xff, 0xff, 0x0, 0xff], @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [0x0, 0xff, 0x0, 0xff], 0xb0, 0x210, 0x258, [@time={'time\x00', 0x18, {{0x1ff, 0x1, 0xe063, 0xb6c5, 0x2e80, 0x0, 0x2}}}]}, [@common=@redirect={'redirect\x00', 0x8, {{0xffffffffffffffff}}}, @common=@SECMARK={'SECMARK\x00', 0x108, {{0x1, 0x6, 'system_u:object_r:lost_found_t:s0\x00'}}}]}, @common=@ERROR={'ERROR\x00', 0x20, {"4323eed968d7072e70de82f41331fe3aed2aedc8f2fff16e54b1c4e2ad07"}}}, {{{0x5, 0x54, 0x888d, 'ip6gretap0\x00', 'teql0\x00', 'veth1_to_team\x00', 'erspan0\x00', @random="0eae55d5aac5", [0x0, 0xff, 0x0, 0xff, 0xff, 0xff], @empty, [0xff, 0xff, 0xff, 0x0, 0xff, 0xff], 0x70, 0x70, 0xb8}}, @common=@RATEEST={'RATEEST\x00', 0x20, {{'syz0\x00', 0x9, 0x1, 0x4}}}}]}]}, 0x9a0) 2018/05/15 08:25:11 executing program 0: perf_event_open$cgroup(&(0x7f0000000240)={0x7, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff9, 0x5, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000200)}, 0x0, 0x0, 0x0, 0x0, 0xdf, 0x9, 0x3}, 0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x8) 2018/05/15 08:25:11 executing program 4: perf_event_open$cgroup(&(0x7f0000000240)={0x7, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff9, 0x0, 0x0, 0x5, 0x6, @perf_bp={&(0x7f0000000200), 0x6}, 0x10202, 0x4, 0x4, 0x7, 0xdf, 0x9, 0x3}, 0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x8) 2018/05/15 08:25:11 executing program 5: r0 = syz_open_procfs(0x0, &(0x7f0000000280)='net/ptype\x00') sendfile(r0, r0, &(0x7f0000000000)=0x16f, 0x7fffffff) 2018/05/15 08:25:11 executing program 6: perf_event_open$cgroup(&(0x7f0000000240)={0x7, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff9, 0x5, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000200)}, 0x0, 0x4, 0x4, 0x7, 0xdf, 0x9, 0x3}, 0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x8) 2018/05/15 08:25:11 executing program 3: syz_emit_ethernet(0x3e, &(0x7f00000001c0)={@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, @dev={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa]}, [], {@ipv6={0x86dd, {0x0, 0x6, "50a09c", 0x8, 0xffffff87, 0x0, @remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x88caffff], 0xbb}, @local={0xfe, 0x80, [], 0xaa}, {[], @udp={0x0, 0x0, 0x8}}}}}}, &(0x7f0000000040)) 2018/05/15 08:25:11 executing program 2: syz_emit_ethernet(0x3e, &(0x7f00000001c0)={@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, @dev={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa]}, [], {@ipv6={0x86dd, {0x0, 0x6, "50a09c", 0x8, 0x0, 0x0, @remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x3c000000], 0xbb}, @local={0xfe, 0x80, [], 0xaa}, {[], @udp={0x0, 0x0, 0x8}}}}}}, &(0x7f0000000040)) 2018/05/15 08:25:11 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f0000000280)="6e65742f6970365f7461626c65735f6d61746368657300b6e23bcf6093cb57f8b4d285e9c48608549acee9a66f09d47a011dcc8f5af7870c6c1b6eebe85ebea4ecda4e44def87e8ee568c843daaf2805944012bc0144937e8b04411d09016ca07f7388ded591e346fb612397e79a6fe43e5c6a86bee1565b17b22b8ed5c95b4afbb3a620d1402c50bbaad790d0ffdb7c5a27e60423079f77bf") unlink(&(0x7f0000000080)='./file0\x00') sendfile(r0, r0, &(0x7f00000000c0)=0x10000000, 0x2) ioctl$KDGKBMETA(r0, 0x4b62, &(0x7f0000000100)) getsockopt$inet_sctp_SCTP_PARTIAL_DELIVERY_POINT(r0, 0x84, 0x13, &(0x7f0000000140)={0x0, 0xfffffffffffffffa}, &(0x7f0000000180)=0x8) syslog(0x2, &(0x7f0000000cc0)=""/107, 0x6b) setsockopt$IP_VS_SO_SET_DEL(r0, 0x0, 0x484, &(0x7f0000000200)={0x87, @dev={0xac, 0x14, 0x14, 0x1a}, 0x4e24, 0x2, 'rr\x00', 0x3, 0x2, 0x66}, 0x2c) setsockopt$inet_sctp_SCTP_STREAM_SCHEDULER(r0, 0x84, 0x7b, &(0x7f00000001c0)={r1, 0x40ef2843}, 0x8) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000000)='dctcp\x00', 0x6) 2018/05/15 08:25:11 executing program 7: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup(r0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000d40)=@broute={'broute\x00', 0x20, 0x4, 0x928, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000400], 0x0, &(0x7f0000000000), &(0x7f0000000400)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x2, [{{{0x5, 0x0, 0x0, 'bcsh0\x00', 'sit0\x00', 'syzkaller1\x00', 'veth0\x00', @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [], @dev={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa]}, [], 0x1d8, 0x228, 0x258, [@comment={'comment\x00', 0x100}, @owner={'owner\x00', 0x18}]}, [@common=@LED={'LED\x00', 0x28, {{'syz0\x00', 0x1, 0x0, 0x800}}}]}, @common=@redirect={'redirect\x00', 0x8, {{0xfffffffffffffffe}}}}, {{{0x11, 0x4, 0x88e7, 'veth1_to_bond\x00', 'erspan0\x00', 'bridge_slave_1\x00', 'veth0_to_bridge\x00', @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [0xff, 0xff, 0x0, 0xff, 0x0, 0xff], @random="cfa071dc33d9", [0xff, 0xff, 0xff, 0xff, 0xff, 0xff], 0x2e0, 0x2e0, 0x330, [@mac={'mac\x00', 0x10, {{@remote={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xbb}, 0x1}}}, @bpf0={'bpf\x00', 0x210, {{0x20, [{0x8000, 0x4902, 0x5, 0x3ff}, {0x5, 0x8, 0x2, 0xff}, {0x1000, 0x48000000000, 0x3}, {0xf7, 0x1f, 0xfffffffffffffe00, 0x1}, {0x10000, 0xfc0, 0x1, 0x6}, {0x4, 0x2, 0xcefa, 0x81}, {0x815, 0xc7, 0x8001, 0x6a0}, {0x40, 0x0, 0x9, 0x80000001}, {0xffffffffffffff53, 0x38a, 0x100000000, 0x7}, {0x5, 0x1, 0x1000, 0x10001}, {0x80000000, 0x7, 0x1, 0xf7}, {0x2, 0x9, 0x4c, 0x5}, {0xfffffffffffffff7, 0x0, 0xe74, 0x52a}, {0x1ff, 0x7, 0x3, 0x7}, {0x6, 0x1ff, 0x49, 0x7}, {0x8000, 0x0, 0x7, 0x684}, {0xffe, 0x988, 0x3, 0x1}, {0x7b, 0x5a07, 0x18, 0x7}, {0xfffffffffffffffe, 0xfff, 0x3, 0x178180a0}, {0x2, 0xc0, 0x6, 0x401}, {0x5, 0x3, 0x8, 0x8}, {0xffffffffffff0001, 0x3, 0xfffffffffffffff7, 0x5}, {0x1ff, 0x8001, 0x3}, {0x3, 0x9, 0xffffffff, 0x2}, {0x5, 0x4, 0x574, 0x64c}, {0x5, 0x4, 0x10001, 0x6}, {0x1, 0x5b2c, 0x3ff, 0x7}, {0xff, 0x2, 0x5, 0x62c5fc18}, {0x101, 0x7, 0x2, 0xfffffffffffffffd}, {0x7fff, 0x6, 0x8, 0x4}, {0x9, 0x0, 0x7, 0xff}, {0x4, 0x4, 0x4, 0x10000}, {0x59b0, 0xfff, 0x4, 0x4}, {0x1f, 0xfffffffffffffffd, 0x8001, 0x800}, {0x0, 0xffffffffffffffff, 0x2, 0x65}, {0x1ff, 0x1, 0x2, 0x7ff}, {0x4, 0x5, 0x1, 0x7be}, {0x9e4, 0x0, 0x7, 0x5}, {0x5, 0x8, 0x7f, 0xffffffff}, {0x4, 0x6, 0x5, 0x7ff}, {0x22aaaf52, 0x8f, 0x6, 0x10000}, {0x2, 0x7, 0xffff}, {0x5, 0xfffffffff016eb50, 0x82, 0x7}, {0x38, 0x800, 0x9a2a, 0xfffffffffffffffc}, {0x5, 0xb, 0x4, 0xfffffffffffff001}, {0x8b5, 0x81, 0x4, 0x2}, {0x8, 0xfffffffffffffff8, 0x1, 0x8}, {0x40, 0x4, 0x1, 0x100000001}, {0x9b, 0x5, 0x1, 0xd64c}, {0x100, 0x8, 0x7, 0x3ff}, {0xf11, 0x200, 0x7, 0x2}, {0xac5, 0x0, 0x3, 0x7}, {0x518, 0x1, 0x80}, {0x6, 0x7f, 0x6, 0x7298}, {0x7, 0x1, 0x2, 0x1ec9}, {0x400, 0x2, 0x6, 0x6c3}, {0x100000001, 0x6, 0x5, 0x9}, {0x8, 0x1dae, 0xfffffffffffffff8, 0x101}, {0x2, 0x7, 0x8, 0x3}, {0x0, 0x45b, 0x7, 0x72}, {0x100000001, 0xc00000000000, 0x100000001, 0x8}, {0x100000001, 0x0, 0xfffffffffffffffc, 0x3}, {0x95, 0x90b, 0x0, 0xfffffffffffff565}, {0x0, 0x4, 0x0, 0x2}], 0x40}}}]}}, @common=@IDLETIMER={'IDLETIMER\x00', 0x28, {{0x7f, 'syz0\x00'}}}}]}, {0x0, '\x00', 0x2, 0xfffffffffffffffc}, {0x0, '\x00', 0x2, 0xffffffffffffffff, 0x2, [{{{0x11, 0x40, 0x87df, 'irlan0\x00', 'sit0\x00', 'veth0_to_team\x00', 'ip6gretap0\x00', @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [0xff, 0xff, 0xff, 0xff, 0x0, 0xff], @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [0x0, 0xff, 0x0, 0xff], 0xb0, 0x210, 0x258, [@time={'time\x00', 0x18, {{0x1ff, 0x1, 0xe063, 0xb6c5, 0x2e80, 0x0, 0x2}}}]}, [@common=@redirect={'redirect\x00', 0x8, {{0xffffffffffffffff}}}, @common=@SECMARK={'SECMARK\x00', 0x108, {{0x1, 0x6, 'system_u:object_r:lost_found_t:s0\x00'}}}]}, @common=@ERROR={'ERROR\x00', 0x20, {"4323eed968d7072e70de82f41331fe3aed2aedc8f2fff16e54b1c4e2ad07"}}}, {{{0x5, 0x54, 0x888d, 'ip6gretap0\x00', 'teql0\x00', 'veth1_to_team\x00', 'erspan0\x00', @random="0eae55d5aac5", [0x0, 0xff, 0x0, 0xff, 0xff, 0xff], @empty, [0xff, 0xff, 0xff, 0x0, 0xff, 0xff], 0x70, 0x70, 0xb8}}, @common=@RATEEST={'RATEEST\x00', 0x20, {{'syz0\x00', 0x9, 0x1, 0x4}}}}]}]}, 0x9a0) 2018/05/15 08:25:11 executing program 4: perf_event_open$cgroup(&(0x7f0000000240)={0x7, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff9, 0x0, 0x0, 0x5, 0x6, @perf_bp={&(0x7f0000000200), 0x6}, 0x10202, 0x4, 0x4, 0x7, 0xdf, 0x9, 0x3}, 0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x8) 2018/05/15 08:25:11 executing program 2: syz_emit_ethernet(0x3e, &(0x7f00000001c0)={@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, @dev={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa]}, [], {@ipv6={0x86dd, {0x0, 0x6, "50a09c", 0x8, 0x0, 0x0, @remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x2c00], 0xbb}, @local={0xfe, 0x80, [], 0xaa}, {[], @udp={0x0, 0x0, 0x8}}}}}}, &(0x7f0000000040)) 2018/05/15 08:25:11 executing program 3: syz_emit_ethernet(0x3e, &(0x7f00000001c0)={@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, @dev={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa]}, [], {@ipv6={0x86dd, {0x0, 0x6, "50a09c", 0x8, 0xffffff87, 0x0, @remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x800e000000000000], 0xbb}, @local={0xfe, 0x80, [], 0xaa}, {[], @udp={0x0, 0x0, 0x8}}}}}}, &(0x7f0000000040)) 2018/05/15 08:25:11 executing program 0: perf_event_open$cgroup(&(0x7f0000000240)={0x7, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff9, 0x5, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000200)}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x3}, 0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x8) 2018/05/15 08:25:11 executing program 6: perf_event_open$cgroup(&(0x7f0000000240)={0x7, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff9, 0x5, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000200)}, 0x0, 0x4, 0x4, 0x7, 0xdf, 0x9, 0x3}, 0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x8) 2018/05/15 08:25:11 executing program 5: r0 = syz_open_procfs(0x0, &(0x7f0000000280)='net/ptype\x00') sendfile(r0, r0, &(0x7f0000000000)=0x158, 0x7fffffff) 2018/05/15 08:25:11 executing program 7: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup(r0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000d40)=@broute={'broute\x00', 0x20, 0x4, 0x8d8, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000400], 0x0, &(0x7f0000000000), &(0x7f0000000400)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x2, [{{{0x5, 0x0, 0x0, 'bcsh0\x00', 'sit0\x00', 'syzkaller1\x00', 'veth0\x00', @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [], @dev={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa]}, [], 0x1d8, 0x1d8, 0x208, [@comment={'comment\x00', 0x100}, @owner={'owner\x00', 0x18}]}}, @common=@redirect={'redirect\x00', 0x8, {{0xfffffffffffffffe}}}}, {{{0x11, 0x4, 0x88e7, 'veth1_to_bond\x00', 'erspan0\x00', 'bridge_slave_1\x00', 'veth0_to_bridge\x00', @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [0xff, 0xff, 0x0, 0xff, 0x0, 0xff], @random="cfa071dc33d9", [0xff, 0xff, 0xff, 0xff, 0xff, 0xff], 0x2e0, 0x2e0, 0x330, [@mac={'mac\x00', 0x10, {{@remote={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xbb}, 0x1}}}, @bpf0={'bpf\x00', 0x210, {{0x20, [{0x8000, 0x4902, 0x5, 0x3ff}, {0x5, 0x8, 0x2, 0xff}, {0x1000, 0x48000000000, 0x3}, {0xf7, 0x1f, 0xfffffffffffffe00, 0x1}, {0x10000, 0xfc0, 0x1, 0x6}, {0x4, 0x2, 0xcefa, 0x81}, {0x815, 0xc7, 0x8001, 0x6a0}, {0x40, 0x0, 0x9, 0x80000001}, {0xffffffffffffff53, 0x38a, 0x100000000, 0x7}, {0x5, 0x1, 0x1000, 0x10001}, {0x80000000, 0x7, 0x1, 0xf7}, {0x2, 0x9, 0x4c, 0x5}, {0xfffffffffffffff7, 0x0, 0xe74, 0x52a}, {0x1ff, 0x7, 0x3, 0x7}, {0x6, 0x1ff, 0x49, 0x7}, {0x8000, 0x0, 0x7, 0x684}, {0xffe, 0x988, 0x3, 0x1}, {0x7b, 0x5a07, 0x18, 0x7}, {0xfffffffffffffffe, 0xfff, 0x3, 0x178180a0}, {0x2, 0xc0, 0x6, 0x401}, {0x5, 0x3, 0x8, 0x8}, {0xffffffffffff0001, 0x3, 0xfffffffffffffff7, 0x5}, {0x1ff, 0x8001, 0x3}, {0x3, 0x9, 0xffffffff, 0x2}, {0x5, 0x4, 0x574, 0x64c}, {0x5, 0x4, 0x10001, 0x6}, {0x1, 0x5b2c, 0x3ff, 0x7}, {0xff, 0x2, 0x5, 0x62c5fc18}, {0x101, 0x7, 0x2, 0xfffffffffffffffd}, {0x7fff, 0x6, 0x8, 0x4}, {0x9, 0x0, 0x7, 0xff}, {0x4, 0x4, 0x4, 0x10000}, {0x59b0, 0xfff, 0x4, 0x4}, {0x1f, 0xfffffffffffffffd, 0x8001, 0x800}, {0x0, 0xffffffffffffffff, 0x2, 0x65}, {0x1ff, 0x1, 0x2, 0x7ff}, {0x4, 0x5, 0x1, 0x7be}, {0x9e4, 0x0, 0x7, 0x5}, {0x5, 0x8, 0x7f, 0xffffffff}, {0x4, 0x6, 0x5, 0x7ff}, {0x22aaaf52, 0x8f, 0x6, 0x10000}, {0x2, 0x7, 0xffff}, {0x5, 0xfffffffff016eb50, 0x82, 0x7}, {0x38, 0x800, 0x9a2a, 0xfffffffffffffffc}, {0x5, 0xb, 0x4, 0xfffffffffffff001}, {0x8b5, 0x81, 0x4, 0x2}, {0x8, 0xfffffffffffffff8, 0x1, 0x8}, {0x40, 0x4, 0x1, 0x100000001}, {0x9b, 0x5, 0x1, 0xd64c}, {0x100, 0x8, 0x7, 0x3ff}, {0xf11, 0x200, 0x7, 0x2}, {0xac5, 0x0, 0x3, 0x7}, {0x518, 0x1, 0x80}, {0x6, 0x7f, 0x6, 0x7298}, {0x7, 0x1, 0x2, 0x1ec9}, {0x400, 0x2, 0x6, 0x6c3}, {0x100000001, 0x6, 0x5, 0x9}, {0x8, 0x1dae, 0xfffffffffffffff8, 0x101}, {0x2, 0x7, 0x8, 0x3}, {0x0, 0x45b, 0x7, 0x72}, {0x100000001, 0xc00000000000, 0x100000001, 0x8}, {0x100000001, 0x0, 0xfffffffffffffffc, 0x3}, {0x95, 0x90b, 0x0, 0xfffffffffffff565}, {0x0, 0x4, 0x0, 0x2}], 0x40}}}]}}, @common=@IDLETIMER={'IDLETIMER\x00', 0x28, {{0x7f, 'syz0\x00'}}}}]}, {0x0, '\x00', 0x2, 0xfffffffffffffffc}, {0x0, '\x00', 0x2, 0xffffffffffffffff, 0x2, [{{{0x11, 0x40, 0x87df, 'irlan0\x00', 'sit0\x00', 'veth0_to_team\x00', 'ip6gretap0\x00', @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [0xff, 0xff, 0xff, 0xff, 0x0, 0xff], @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [0x0, 0xff, 0x0, 0xff], 0xb0, 0x210, 0x258, [@time={'time\x00', 0x18, {{0x1ff, 0x1, 0xe063, 0xb6c5, 0x2e80, 0x0, 0x2}}}]}, [@common=@redirect={'redirect\x00', 0x8, {{0xffffffffffffffff}}}, @common=@SECMARK={'SECMARK\x00', 0x108, {{0x1, 0x6, 'system_u:object_r:lost_found_t:s0\x00'}}}]}, @common=@ERROR={'ERROR\x00', 0x20, {"4323eed968d7072e70de82f41331fe3aed2aedc8f2fff16e54b1c4e2ad07"}}}, {{{0x5, 0x54, 0x888d, 'ip6gretap0\x00', 'teql0\x00', 'veth1_to_team\x00', 'erspan0\x00', @random="0eae55d5aac5", [0x0, 0xff, 0x0, 0xff, 0xff, 0xff], @empty, [0xff, 0xff, 0xff, 0x0, 0xff, 0xff], 0x70, 0x70, 0xb8}}, @common=@RATEEST={'RATEEST\x00', 0x20, {{'syz0\x00', 0x9, 0x1, 0x4}}}}]}]}, 0x9a0) 2018/05/15 08:25:11 executing program 4: perf_event_open$cgroup(&(0x7f0000000240)={0x7, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff9, 0x5, 0x0, 0x0, 0x6, @perf_bp={&(0x7f0000000200), 0x6}, 0x10202, 0x4, 0x4, 0x7, 0xdf, 0x9, 0x3}, 0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x8) 2018/05/15 08:25:11 executing program 2: syz_emit_ethernet(0x3e, &(0x7f00000001c0)={@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, @dev={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa]}, [], {@ipv6={0x86dd, {0x0, 0x6, "50a09c", 0x8, 0x0, 0x0, @remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x3000000], 0xbb}, @local={0xfe, 0x80, [], 0xaa}, {[], @udp={0x0, 0x0, 0x8}}}}}}, &(0x7f0000000040)) 2018/05/15 08:25:11 executing program 0: perf_event_open$cgroup(&(0x7f0000000240)={0x7, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff9, 0x5, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000200)}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x8) [ 442.030678] kernel msg: ebtables bug: please report to author: Wrong len argument 2018/05/15 08:25:11 executing program 3: syz_emit_ethernet(0x3e, &(0x7f00000001c0)={@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, @dev={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa]}, [], {@ipv6={0x86dd, {0x0, 0x6, "50a09c", 0x8, 0xffffff87, 0x0, @remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x89060000], 0xbb}, @local={0xfe, 0x80, [], 0xaa}, {[], @udp={0x0, 0x0, 0x8}}}}}}, &(0x7f0000000040)) 2018/05/15 08:25:11 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f0000000280)="6e65742f6970365f7461626c65735f6d61746368657300b6e23bcf6093cb57f8b4d285e9c48608549acee9a66f09d47a011dcc8f5af7870c6c1b6eebe85ebea4ecda4e44def87e8ee568c843daaf2805944012bc0144937e8b04411d09016ca07f7388ded591e346fb612397e79a6fe43e5c6a86bee1565b17b22b8ed5c95b4afbb3a620d1402c50bbaad790d0ffdb7c5a27e60423079f77bf") unlink(&(0x7f0000000080)='./file0\x00') sendfile(r0, r0, &(0x7f00000000c0)=0x10000000, 0x2) ioctl$KDGKBMETA(r0, 0x4b62, &(0x7f0000000100)) getsockopt$inet_sctp_SCTP_PARTIAL_DELIVERY_POINT(r0, 0x84, 0x13, &(0x7f0000000140)={0x0, 0xfffffffffffffffa}, &(0x7f0000000180)=0x8) syslog(0x2, &(0x7f0000000cc0)=""/107, 0x6b) setsockopt$IP_VS_SO_SET_DEL(r0, 0x0, 0x484, &(0x7f0000000200)={0x87, @dev={0xac, 0x14, 0x14, 0x1a}, 0x4e24, 0x2, 'rr\x00', 0x3, 0x2, 0x66}, 0x2c) setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x40, &(0x7f0000000340)=ANY=[@ANYBLOB="73656375726974790000000000000000000000000000000000000000000000000e00000004000000f8030000fffffffff00000000000000000000000ffffffffffffffff600300006003000060030000ffffffff04000000", @ANYPTR=&(0x7f0000000d40)=ANY=[@ANYBLOB="000000000000000000000000002100ebe70048ca02fec408edfbaf31ba590218fdffffffffffd60000000000000000000000000000000000000000000000000021d13202a6d3d3de0000000000000000000000"], @ANYBLOB="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"], 0x458) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000000)='dctcp\x00', 0x6) 2018/05/15 08:25:11 executing program 6: perf_event_open$cgroup(&(0x7f0000000240)={0x7, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff9, 0x5, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000200)}, 0x0, 0x0, 0x4, 0x7, 0xdf, 0x9, 0x3}, 0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x8) 2018/05/15 08:25:11 executing program 5: r0 = syz_open_procfs(0x0, &(0x7f0000000280)='net/ptype\x00') sendfile(r0, r0, &(0x7f0000000000)=0x7b, 0x7fffffff) 2018/05/15 08:25:11 executing program 7: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup(r0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000d40)=@broute={'broute\x00', 0x20, 0x4, 0x8d8, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000400], 0x0, &(0x7f0000000000), &(0x7f0000000400)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x2, [{{{0x5, 0x0, 0x0, 'bcsh0\x00', 'sit0\x00', 'syzkaller1\x00', 'veth0\x00', @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [], @dev={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa]}, [], 0x1d8, 0x1d8, 0x208, [@comment={'comment\x00', 0x100}, @owner={'owner\x00', 0x18}]}}, @common=@redirect={'redirect\x00', 0x8, {{0xfffffffffffffffe}}}}, {{{0x11, 0x4, 0x88e7, 'veth1_to_bond\x00', 'erspan0\x00', 'bridge_slave_1\x00', 'veth0_to_bridge\x00', @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [0xff, 0xff, 0x0, 0xff, 0x0, 0xff], @random="cfa071dc33d9", [0xff, 0xff, 0xff, 0xff, 0xff, 0xff], 0x2e0, 0x2e0, 0x330, [@mac={'mac\x00', 0x10, {{@remote={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xbb}, 0x1}}}, @bpf0={'bpf\x00', 0x210, {{0x20, [{0x8000, 0x4902, 0x5, 0x3ff}, {0x5, 0x8, 0x2, 0xff}, {0x1000, 0x48000000000, 0x3}, {0xf7, 0x1f, 0xfffffffffffffe00, 0x1}, {0x10000, 0xfc0, 0x1, 0x6}, {0x4, 0x2, 0xcefa, 0x81}, {0x815, 0xc7, 0x8001, 0x6a0}, {0x40, 0x0, 0x9, 0x80000001}, {0xffffffffffffff53, 0x38a, 0x100000000, 0x7}, {0x5, 0x1, 0x1000, 0x10001}, {0x80000000, 0x7, 0x1, 0xf7}, {0x2, 0x9, 0x4c, 0x5}, {0xfffffffffffffff7, 0x0, 0xe74, 0x52a}, {0x1ff, 0x7, 0x3, 0x7}, {0x6, 0x1ff, 0x49, 0x7}, {0x8000, 0x0, 0x7, 0x684}, {0xffe, 0x988, 0x3, 0x1}, {0x7b, 0x5a07, 0x18, 0x7}, {0xfffffffffffffffe, 0xfff, 0x3, 0x178180a0}, {0x2, 0xc0, 0x6, 0x401}, {0x5, 0x3, 0x8, 0x8}, {0xffffffffffff0001, 0x3, 0xfffffffffffffff7, 0x5}, {0x1ff, 0x8001, 0x3}, {0x3, 0x9, 0xffffffff, 0x2}, {0x5, 0x4, 0x574, 0x64c}, {0x5, 0x4, 0x10001, 0x6}, {0x1, 0x5b2c, 0x3ff, 0x7}, {0xff, 0x2, 0x5, 0x62c5fc18}, {0x101, 0x7, 0x2, 0xfffffffffffffffd}, {0x7fff, 0x6, 0x8, 0x4}, {0x9, 0x0, 0x7, 0xff}, {0x4, 0x4, 0x4, 0x10000}, {0x59b0, 0xfff, 0x4, 0x4}, {0x1f, 0xfffffffffffffffd, 0x8001, 0x800}, {0x0, 0xffffffffffffffff, 0x2, 0x65}, {0x1ff, 0x1, 0x2, 0x7ff}, {0x4, 0x5, 0x1, 0x7be}, {0x9e4, 0x0, 0x7, 0x5}, {0x5, 0x8, 0x7f, 0xffffffff}, {0x4, 0x6, 0x5, 0x7ff}, {0x22aaaf52, 0x8f, 0x6, 0x10000}, {0x2, 0x7, 0xffff}, {0x5, 0xfffffffff016eb50, 0x82, 0x7}, {0x38, 0x800, 0x9a2a, 0xfffffffffffffffc}, {0x5, 0xb, 0x4, 0xfffffffffffff001}, {0x8b5, 0x81, 0x4, 0x2}, {0x8, 0xfffffffffffffff8, 0x1, 0x8}, {0x40, 0x4, 0x1, 0x100000001}, {0x9b, 0x5, 0x1, 0xd64c}, {0x100, 0x8, 0x7, 0x3ff}, {0xf11, 0x200, 0x7, 0x2}, {0xac5, 0x0, 0x3, 0x7}, {0x518, 0x1, 0x80}, {0x6, 0x7f, 0x6, 0x7298}, {0x7, 0x1, 0x2, 0x1ec9}, {0x400, 0x2, 0x6, 0x6c3}, {0x100000001, 0x6, 0x5, 0x9}, {0x8, 0x1dae, 0xfffffffffffffff8, 0x101}, {0x2, 0x7, 0x8, 0x3}, {0x0, 0x45b, 0x7, 0x72}, {0x100000001, 0xc00000000000, 0x100000001, 0x8}, {0x100000001, 0x0, 0xfffffffffffffffc, 0x3}, {0x95, 0x90b, 0x0, 0xfffffffffffff565}, {0x0, 0x4, 0x0, 0x2}], 0x40}}}]}}, @common=@IDLETIMER={'IDLETIMER\x00', 0x28, {{0x7f, 'syz0\x00'}}}}]}, {0x0, '\x00', 0x2, 0xfffffffffffffffc}, {0x0, '\x00', 0x2, 0xffffffffffffffff, 0x2, [{{{0x11, 0x40, 0x87df, 'irlan0\x00', 'sit0\x00', 'veth0_to_team\x00', 'ip6gretap0\x00', @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [0xff, 0xff, 0xff, 0xff, 0x0, 0xff], @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [0x0, 0xff, 0x0, 0xff], 0xb0, 0x210, 0x258, [@time={'time\x00', 0x18, {{0x1ff, 0x1, 0xe063, 0xb6c5, 0x2e80, 0x0, 0x2}}}]}, [@common=@redirect={'redirect\x00', 0x8, {{0xffffffffffffffff}}}, @common=@SECMARK={'SECMARK\x00', 0x108, {{0x1, 0x6, 'system_u:object_r:lost_found_t:s0\x00'}}}]}, @common=@ERROR={'ERROR\x00', 0x20, {"4323eed968d7072e70de82f41331fe3aed2aedc8f2fff16e54b1c4e2ad07"}}}, {{{0x5, 0x54, 0x888d, 'ip6gretap0\x00', 'teql0\x00', 'veth1_to_team\x00', 'erspan0\x00', @random="0eae55d5aac5", [0x0, 0xff, 0x0, 0xff, 0xff, 0xff], @empty, [0xff, 0xff, 0xff, 0x0, 0xff, 0xff], 0x70, 0x70, 0xb8}}, @common=@RATEEST={'RATEEST\x00', 0x20, {{'syz0\x00', 0x9, 0x1, 0x4}}}}]}]}, 0x9a0) 2018/05/15 08:25:11 executing program 0: perf_event_open$cgroup(&(0x7f0000000240)={0x7, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff9, 0x5, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000200)}}, 0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x8) 2018/05/15 08:25:11 executing program 4: perf_event_open$cgroup(&(0x7f0000000240)={0x7, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff9, 0x5, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000200), 0x6}, 0x10202, 0x4, 0x4, 0x7, 0xdf, 0x9, 0x3}, 0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x8) 2018/05/15 08:25:11 executing program 2: syz_emit_ethernet(0x3e, &(0x7f00000001c0)={@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, @dev={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa]}, [], {@ipv6={0x86dd, {0x0, 0x6, "50a09c", 0x8, 0x0, 0x0, @remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x3c], 0xbb}, @local={0xfe, 0x80, [], 0xaa}, {[], @udp={0x0, 0x0, 0x8}}}}}}, &(0x7f0000000040)) 2018/05/15 08:25:11 executing program 6: perf_event_open$cgroup(&(0x7f0000000240)={0x7, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff9, 0x5, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000200)}, 0x0, 0x0, 0x0, 0x7, 0xdf, 0x9, 0x3}, 0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x8) [ 442.211367] kernel msg: ebtables bug: please report to author: Wrong len argument 2018/05/15 08:25:11 executing program 7: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup(r0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000d40)=@broute={'broute\x00', 0x20, 0x4, 0x8d8, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000400], 0x0, &(0x7f0000000000), &(0x7f0000000400)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x2, [{{{0x5, 0x0, 0x0, 'bcsh0\x00', 'sit0\x00', 'syzkaller1\x00', 'veth0\x00', @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [], @dev={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa]}, [], 0x1d8, 0x1d8, 0x208, [@comment={'comment\x00', 0x100}, @owner={'owner\x00', 0x18}]}}, @common=@redirect={'redirect\x00', 0x8, {{0xfffffffffffffffe}}}}, {{{0x11, 0x4, 0x88e7, 'veth1_to_bond\x00', 'erspan0\x00', 'bridge_slave_1\x00', 'veth0_to_bridge\x00', @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [0xff, 0xff, 0x0, 0xff, 0x0, 0xff], @random="cfa071dc33d9", [0xff, 0xff, 0xff, 0xff, 0xff, 0xff], 0x2e0, 0x2e0, 0x330, [@mac={'mac\x00', 0x10, {{@remote={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xbb}, 0x1}}}, @bpf0={'bpf\x00', 0x210, {{0x20, [{0x8000, 0x4902, 0x5, 0x3ff}, {0x5, 0x8, 0x2, 0xff}, {0x1000, 0x48000000000, 0x3}, {0xf7, 0x1f, 0xfffffffffffffe00, 0x1}, {0x10000, 0xfc0, 0x1, 0x6}, {0x4, 0x2, 0xcefa, 0x81}, {0x815, 0xc7, 0x8001, 0x6a0}, {0x40, 0x0, 0x9, 0x80000001}, {0xffffffffffffff53, 0x38a, 0x100000000, 0x7}, {0x5, 0x1, 0x1000, 0x10001}, {0x80000000, 0x7, 0x1, 0xf7}, {0x2, 0x9, 0x4c, 0x5}, {0xfffffffffffffff7, 0x0, 0xe74, 0x52a}, {0x1ff, 0x7, 0x3, 0x7}, {0x6, 0x1ff, 0x49, 0x7}, {0x8000, 0x0, 0x7, 0x684}, {0xffe, 0x988, 0x3, 0x1}, {0x7b, 0x5a07, 0x18, 0x7}, {0xfffffffffffffffe, 0xfff, 0x3, 0x178180a0}, {0x2, 0xc0, 0x6, 0x401}, {0x5, 0x3, 0x8, 0x8}, {0xffffffffffff0001, 0x3, 0xfffffffffffffff7, 0x5}, {0x1ff, 0x8001, 0x3}, {0x3, 0x9, 0xffffffff, 0x2}, {0x5, 0x4, 0x574, 0x64c}, {0x5, 0x4, 0x10001, 0x6}, {0x1, 0x5b2c, 0x3ff, 0x7}, {0xff, 0x2, 0x5, 0x62c5fc18}, {0x101, 0x7, 0x2, 0xfffffffffffffffd}, {0x7fff, 0x6, 0x8, 0x4}, {0x9, 0x0, 0x7, 0xff}, {0x4, 0x4, 0x4, 0x10000}, {0x59b0, 0xfff, 0x4, 0x4}, {0x1f, 0xfffffffffffffffd, 0x8001, 0x800}, {0x0, 0xffffffffffffffff, 0x2, 0x65}, {0x1ff, 0x1, 0x2, 0x7ff}, {0x4, 0x5, 0x1, 0x7be}, {0x9e4, 0x0, 0x7, 0x5}, {0x5, 0x8, 0x7f, 0xffffffff}, {0x4, 0x6, 0x5, 0x7ff}, {0x22aaaf52, 0x8f, 0x6, 0x10000}, {0x2, 0x7, 0xffff}, {0x5, 0xfffffffff016eb50, 0x82, 0x7}, {0x38, 0x800, 0x9a2a, 0xfffffffffffffffc}, {0x5, 0xb, 0x4, 0xfffffffffffff001}, {0x8b5, 0x81, 0x4, 0x2}, {0x8, 0xfffffffffffffff8, 0x1, 0x8}, {0x40, 0x4, 0x1, 0x100000001}, {0x9b, 0x5, 0x1, 0xd64c}, {0x100, 0x8, 0x7, 0x3ff}, {0xf11, 0x200, 0x7, 0x2}, {0xac5, 0x0, 0x3, 0x7}, {0x518, 0x1, 0x80}, {0x6, 0x7f, 0x6, 0x7298}, {0x7, 0x1, 0x2, 0x1ec9}, {0x400, 0x2, 0x6, 0x6c3}, {0x100000001, 0x6, 0x5, 0x9}, {0x8, 0x1dae, 0xfffffffffffffff8, 0x101}, {0x2, 0x7, 0x8, 0x3}, {0x0, 0x45b, 0x7, 0x72}, {0x100000001, 0xc00000000000, 0x100000001, 0x8}, {0x100000001, 0x0, 0xfffffffffffffffc, 0x3}, {0x95, 0x90b, 0x0, 0xfffffffffffff565}, {0x0, 0x4, 0x0, 0x2}], 0x40}}}]}}, @common=@IDLETIMER={'IDLETIMER\x00', 0x28, {{0x7f, 'syz0\x00'}}}}]}, {0x0, '\x00', 0x2, 0xfffffffffffffffc}, {0x0, '\x00', 0x2, 0xffffffffffffffff, 0x2, [{{{0x11, 0x40, 0x87df, 'irlan0\x00', 'sit0\x00', 'veth0_to_team\x00', 'ip6gretap0\x00', @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [0xff, 0xff, 0xff, 0xff, 0x0, 0xff], @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [0x0, 0xff, 0x0, 0xff], 0xb0, 0x210, 0x258, [@time={'time\x00', 0x18, {{0x1ff, 0x1, 0xe063, 0xb6c5, 0x2e80, 0x0, 0x2}}}]}, [@common=@redirect={'redirect\x00', 0x8, {{0xffffffffffffffff}}}, @common=@SECMARK={'SECMARK\x00', 0x108, {{0x1, 0x6, 'system_u:object_r:lost_found_t:s0\x00'}}}]}, @common=@ERROR={'ERROR\x00', 0x20, {"4323eed968d7072e70de82f41331fe3aed2aedc8f2fff16e54b1c4e2ad07"}}}, {{{0x5, 0x54, 0x888d, 'ip6gretap0\x00', 'teql0\x00', 'veth1_to_team\x00', 'erspan0\x00', @random="0eae55d5aac5", [0x0, 0xff, 0x0, 0xff, 0xff, 0xff], @empty, [0xff, 0xff, 0xff, 0x0, 0xff, 0xff], 0x70, 0x70, 0xb8}}, @common=@RATEEST={'RATEEST\x00', 0x20, {{'syz0\x00', 0x9, 0x1, 0x4}}}}]}]}, 0x9a0) 2018/05/15 08:25:11 executing program 4: perf_event_open$cgroup(&(0x7f0000000240)={0x7, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff9, 0x5, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000200)}, 0x10202, 0x4, 0x4, 0x7, 0xdf, 0x9, 0x3}, 0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x8) 2018/05/15 08:25:11 executing program 3: syz_emit_ethernet(0x3e, &(0x7f00000001c0)={@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, @dev={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa]}, [], {@ipv6={0x86dd, {0x0, 0x6, "50a09c", 0x8, 0xffffff87, 0x0, @remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x6000000], 0xbb}, @local={0xfe, 0x80, [], 0xaa}, {[], @udp={0x0, 0x0, 0x8}}}}}}, &(0x7f0000000040)) 2018/05/15 08:25:11 executing program 5: r0 = syz_open_procfs(0x0, &(0x7f0000000280)='net/ptype\x00') sendfile(r0, r0, &(0x7f0000000000)=0xbf, 0x7fffffff) 2018/05/15 08:25:11 executing program 0: perf_event_open$cgroup(&(0x7f0000000240)={0x7, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff9, 0x5, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000200)}}, 0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x8) 2018/05/15 08:25:11 executing program 2: syz_emit_ethernet(0x3e, &(0x7f00000001c0)={@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, @dev={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa]}, [], {@ipv6={0x86dd, {0x0, 0x6, "50a09c", 0x8, 0x0, 0x0, @remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x3], 0xbb}, @local={0xfe, 0x80, [], 0xaa}, {[], @udp={0x0, 0x0, 0x8}}}}}}, &(0x7f0000000040)) 2018/05/15 08:25:11 executing program 4: perf_event_open$cgroup(&(0x7f0000000240)={0x7, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff9, 0x5, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000200)}, 0x0, 0x4, 0x4, 0x7, 0xdf, 0x9, 0x3}, 0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x8) [ 442.383460] kernel msg: ebtables bug: please report to author: Wrong len argument 2018/05/15 08:25:11 executing program 6: perf_event_open$cgroup(&(0x7f0000000240)={0x7, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff9, 0x5, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000200)}, 0x0, 0x0, 0x0, 0x0, 0xdf, 0x9, 0x3}, 0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x8) 2018/05/15 08:25:11 executing program 3: syz_emit_ethernet(0x3e, &(0x7f00000001c0)={@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, @dev={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa]}, [], {@ipv6={0x86dd, {0x0, 0x6, "50a09c", 0x8, 0xffffff87, 0x0, @remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0xffffca88], 0xbb}, @local={0xfe, 0x80, [], 0xaa}, {[], @udp={0x0, 0x0, 0x8}}}}}}, &(0x7f0000000040)) 2018/05/15 08:25:11 executing program 0: perf_event_open$cgroup(&(0x7f0000000240)={0x7, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff9, 0x5, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000200)}}, 0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x8) 2018/05/15 08:25:11 executing program 5: r0 = syz_open_procfs(0x0, &(0x7f0000000280)='net/ptype\x00') sendfile(r0, r0, &(0x7f0000000000)=0xf2, 0x7fffffff) 2018/05/15 08:25:11 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f0000000280)="6e65742f6970365f7461626c65735f6d61746368657300b6e23bcf6093cb57f8b4d285e9c48608549acee9a66f09d47a011dcc8f5af7870c6c1b6eebe85ebea4ecda4e44def87e8ee568c843daaf2805944012bc0144937e8b04411d09016ca07f7388ded591e346fb612397e79a6fe43e5c6a86bee1565b17b22b8ed5c95b4afbb3a620d1402c50bbaad790d0ffdb7c5a27e60423079f77bf") unlink(&(0x7f0000000080)='./file0\x00') sendfile(r0, r0, &(0x7f00000000c0)=0x10000000, 0x2) ioctl$KDGKBMETA(r0, 0x4b62, &(0x7f0000000100)) getsockopt$inet_sctp_SCTP_PARTIAL_DELIVERY_POINT(r0, 0x84, 0x13, &(0x7f0000000140)={0x0, 0xfffffffffffffffa}, &(0x7f0000000180)=0x8) syslog(0x2, &(0x7f0000000cc0)=""/107, 0x6b) setsockopt$IP_VS_SO_SET_DEL(r0, 0x0, 0x484, &(0x7f0000000200)={0x87, @dev={0xac, 0x14, 0x14, 0x1a}, 0x4e24, 0x2, 'rr\x00', 0x3, 0x2, 0x66}, 0x2c) setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x40, &(0x7f0000000340)=ANY=[@ANYBLOB="73656375726974790000000000000000000000000000000000000000000000000e00000004000000f8030000fffffffff00000000000000000000000ffffffffffffffff600300006003000060030000ffffffff04000000", @ANYPTR=&(0x7f0000000d40)=ANY=[@ANYBLOB="000000000000000000000000002100ebe70048ca02fec408edfbaf31ba590218fdffffffffffd60000000000000000000000000000000000000000000000000021d13202a6d3d3de0000000000000000000000"], @ANYBLOB="00000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000c800f0000000000000000000000000000000000000000000000000003000616800000000000000000000000000000000000000000000000000000000f9ffffff7f000000010000000000000028005443504d5353000000000000000000000000000000000000000000000000740c0000000000007f000001ac14140dffffff00ffffffff6772653000000000000000000000000069703667726530000000000000000000000000000000000000000000ff0000000000000000000000000000000000000000000000000000000000ff0000000000000000000000000000007f0003010000000000000000000000000000b80018010000000000000000000000000000000000000000000000002000736f636b657400000000000000000000000000000000000000000000000060005345540000000000000000000000000000000000000000000000000000000100000000100000020000000000008e0a000000010400000800000000033f0002000000d4180000ff0700009c0a00001e62000000000000e1020000ff09010000000100ac1414aa000000ffff0000007465616d5f736c6176655f310000000069703667726574617030000000000000000000000000000000000000ff0000000000000000000000000000000000000000000000000000000000ff000000000000000000000000000000670001400000000000000000000000000000280158010000000000000000000000000000000000000000000000004000736574000000000000000000000000000000000000000000000000000000070000000100000008000000090000000000000000000000060000000307050050006f736600000000000000000000000000000000000000000000000000000073797a3100000000000000000000000000000000000000000000000000000000070000000200000002000000000000003000434f4e4e4d41524b00000000000000000000ffffffffffffffe5000000014000000009000000020000000300000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000700098000000000000000000000000000000000000000000280000000000000000000000000000000000000000000000000000000000000800ffffff00000000"], 0x458) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000000)='dctcp\x00', 0x6) 2018/05/15 08:25:11 executing program 2: syz_emit_ethernet(0x3e, &(0x7f00000001c0)={@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, @dev={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa]}, [], {@ipv6={0x86dd, {0x0, 0x6, "50a09c", 0x8, 0x0, 0x0, @remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x4888], 0xbb}, @local={0xfe, 0x80, [], 0xaa}, {[], @udp={0x0, 0x0, 0x8}}}}}}, &(0x7f0000000040)) 2018/05/15 08:25:11 executing program 4: perf_event_open$cgroup(&(0x7f0000000240)={0x7, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff9, 0x5, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000200)}, 0x0, 0x0, 0x4, 0x7, 0xdf, 0x9, 0x3}, 0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x8) 2018/05/15 08:25:11 executing program 7: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup(r0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000d40)=@broute={'broute\x00', 0x20, 0x4, 0x928, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000400], 0x0, &(0x7f0000000000), &(0x7f0000000400)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x2, [{{{0x5, 0x0, 0x0, 'bcsh0\x00', 'sit0\x00', 'syzkaller1\x00', 'veth0\x00', @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [], @dev={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa]}, [], 0x1d8, 0x228, 0x258, [@comment={'comment\x00', 0x100}, @owner={'owner\x00', 0x18}]}, [@common=@LED={'LED\x00', 0x28, {{'syz0\x00', 0x0, 0x0, 0x800}}}]}, @common=@redirect={'redirect\x00', 0x8, {{0xfffffffffffffffe}}}}, {{{0x11, 0x4, 0x88e7, 'veth1_to_bond\x00', 'erspan0\x00', 'bridge_slave_1\x00', 'veth0_to_bridge\x00', @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [0xff, 0xff, 0x0, 0xff, 0x0, 0xff], @random="cfa071dc33d9", [0xff, 0xff, 0xff, 0xff, 0xff, 0xff], 0x2e0, 0x2e0, 0x330, [@mac={'mac\x00', 0x10, {{@remote={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xbb}, 0x1}}}, @bpf0={'bpf\x00', 0x210, {{0x20, [{0x8000, 0x4902, 0x5, 0x3ff}, {0x5, 0x8, 0x2, 0xff}, {0x1000, 0x48000000000, 0x3}, {0xf7, 0x1f, 0xfffffffffffffe00, 0x1}, {0x10000, 0xfc0, 0x1, 0x6}, {0x4, 0x2, 0xcefa, 0x81}, {0x815, 0xc7, 0x8001, 0x6a0}, {0x40, 0x0, 0x9, 0x80000001}, {0xffffffffffffff53, 0x38a, 0x100000000, 0x7}, {0x5, 0x1, 0x1000, 0x10001}, {0x80000000, 0x7, 0x1, 0xf7}, {0x2, 0x9, 0x4c, 0x5}, {0xfffffffffffffff7, 0x0, 0xe74, 0x52a}, {0x1ff, 0x7, 0x3, 0x7}, {0x6, 0x1ff, 0x49, 0x7}, {0x8000, 0x0, 0x7, 0x684}, {0xffe, 0x988, 0x3, 0x1}, {0x7b, 0x5a07, 0x18, 0x7}, {0xfffffffffffffffe, 0xfff, 0x3, 0x178180a0}, {0x2, 0xc0, 0x6, 0x401}, {0x5, 0x3, 0x8, 0x8}, {0xffffffffffff0001, 0x3, 0xfffffffffffffff7, 0x5}, {0x1ff, 0x8001, 0x3}, {0x3, 0x9, 0xffffffff, 0x2}, {0x5, 0x4, 0x574, 0x64c}, {0x5, 0x4, 0x10001, 0x6}, {0x1, 0x5b2c, 0x3ff, 0x7}, {0xff, 0x2, 0x5, 0x62c5fc18}, {0x101, 0x7, 0x2, 0xfffffffffffffffd}, {0x7fff, 0x6, 0x8, 0x4}, {0x9, 0x0, 0x7, 0xff}, {0x4, 0x4, 0x4, 0x10000}, {0x59b0, 0xfff, 0x4, 0x4}, {0x1f, 0xfffffffffffffffd, 0x8001, 0x800}, {0x0, 0xffffffffffffffff, 0x2, 0x65}, {0x1ff, 0x1, 0x2, 0x7ff}, {0x4, 0x5, 0x1, 0x7be}, {0x9e4, 0x0, 0x7, 0x5}, {0x5, 0x8, 0x7f, 0xffffffff}, {0x4, 0x6, 0x5, 0x7ff}, {0x22aaaf52, 0x8f, 0x6, 0x10000}, {0x2, 0x7, 0xffff}, {0x5, 0xfffffffff016eb50, 0x82, 0x7}, {0x38, 0x800, 0x9a2a, 0xfffffffffffffffc}, {0x5, 0xb, 0x4, 0xfffffffffffff001}, {0x8b5, 0x81, 0x4, 0x2}, {0x8, 0xfffffffffffffff8, 0x1, 0x8}, {0x40, 0x4, 0x1, 0x100000001}, {0x9b, 0x5, 0x1, 0xd64c}, {0x100, 0x8, 0x7, 0x3ff}, {0xf11, 0x200, 0x7, 0x2}, {0xac5, 0x0, 0x3, 0x7}, {0x518, 0x1, 0x80}, {0x6, 0x7f, 0x6, 0x7298}, {0x7, 0x1, 0x2, 0x1ec9}, {0x400, 0x2, 0x6, 0x6c3}, {0x100000001, 0x6, 0x5, 0x9}, {0x8, 0x1dae, 0xfffffffffffffff8, 0x101}, {0x2, 0x7, 0x8, 0x3}, {0x0, 0x45b, 0x7, 0x72}, {0x100000001, 0xc00000000000, 0x100000001, 0x8}, {0x100000001, 0x0, 0xfffffffffffffffc, 0x3}, {0x95, 0x90b, 0x0, 0xfffffffffffff565}, {0x0, 0x4, 0x0, 0x2}], 0x40}}}]}}, @common=@IDLETIMER={'IDLETIMER\x00', 0x28, {{0x7f, 'syz0\x00'}}}}]}, {0x0, '\x00', 0x2, 0xfffffffffffffffc}, {0x0, '\x00', 0x2, 0xffffffffffffffff, 0x2, [{{{0x11, 0x40, 0x87df, 'irlan0\x00', 'sit0\x00', 'veth0_to_team\x00', 'ip6gretap0\x00', @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [0xff, 0xff, 0xff, 0xff, 0x0, 0xff], @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [0x0, 0xff, 0x0, 0xff], 0xb0, 0x210, 0x258, [@time={'time\x00', 0x18, {{0x1ff, 0x1, 0xe063, 0xb6c5, 0x2e80, 0x0, 0x2}}}]}, [@common=@redirect={'redirect\x00', 0x8, {{0xffffffffffffffff}}}, @common=@SECMARK={'SECMARK\x00', 0x108, {{0x1, 0x6, 'system_u:object_r:lost_found_t:s0\x00'}}}]}, @common=@ERROR={'ERROR\x00', 0x20, {"4323eed968d7072e70de82f41331fe3aed2aedc8f2fff16e54b1c4e2ad07"}}}, {{{0x5, 0x54, 0x888d, 'ip6gretap0\x00', 'teql0\x00', 'veth1_to_team\x00', 'erspan0\x00', @random="0eae55d5aac5", [0x0, 0xff, 0x0, 0xff, 0xff, 0xff], @empty, [0xff, 0xff, 0xff, 0x0, 0xff, 0xff], 0x70, 0x70, 0xb8}}, @common=@RATEEST={'RATEEST\x00', 0x20, {{'syz0\x00', 0x9, 0x1, 0x4}}}}]}]}, 0x9a0) 2018/05/15 08:25:11 executing program 4: perf_event_open$cgroup(&(0x7f0000000240)={0x7, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff9, 0x5, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000200)}, 0x0, 0x0, 0x0, 0x7, 0xdf, 0x9, 0x3}, 0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x8) 2018/05/15 08:25:11 executing program 5: r0 = syz_open_procfs(0x0, &(0x7f0000000280)='net/ptype\x00') sendfile(r0, r0, &(0x7f0000000000)=0x140, 0x7fffffff) 2018/05/15 08:25:11 executing program 3: syz_emit_ethernet(0x3e, &(0x7f00000001c0)={@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, @dev={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa]}, [], {@ipv6={0x86dd, {0x0, 0x6, "50a09c", 0x8, 0xffffff87, 0x0, @remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0xffffdd86], 0xbb}, @local={0xfe, 0x80, [], 0xaa}, {[], @udp={0x0, 0x0, 0x8}}}}}}, &(0x7f0000000040)) 2018/05/15 08:25:11 executing program 0: perf_event_open$cgroup(&(0x7f0000000240)={0x7, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff9, 0x5, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000200)}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x8) 2018/05/15 08:25:11 executing program 6: perf_event_open$cgroup(&(0x7f0000000240)={0x7, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff9, 0x5, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000200)}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x3}, 0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x8) 2018/05/15 08:25:11 executing program 2: syz_emit_ethernet(0x3e, &(0x7f00000001c0)={@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, @dev={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa]}, [], {@ipv6={0x86dd, {0x0, 0x6, "50a09c", 0x8, 0x0, 0x0, @remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x2100000000000000], 0xbb}, @local={0xfe, 0x80, [], 0xaa}, {[], @udp={0x0, 0x0, 0x8}}}}}}, &(0x7f0000000040)) 2018/05/15 08:25:11 executing program 7: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup(r0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000d40)=@broute={'broute\x00', 0x20, 0x4, 0x928, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000400], 0x0, &(0x7f0000000000), &(0x7f0000000400)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x2, [{{{0x5, 0x0, 0x0, 'bcsh0\x00', 'sit0\x00', 'syzkaller1\x00', 'veth0\x00', @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [], @dev={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa]}, [], 0x1d8, 0x228, 0x258, [@comment={'comment\x00', 0x100}, @owner={'owner\x00', 0x18}]}, [@common=@LED={'LED\x00', 0x28, {{'syz0\x00'}}}]}, @common=@redirect={'redirect\x00', 0x8, {{0xfffffffffffffffe}}}}, {{{0x11, 0x4, 0x88e7, 'veth1_to_bond\x00', 'erspan0\x00', 'bridge_slave_1\x00', 'veth0_to_bridge\x00', @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [0xff, 0xff, 0x0, 0xff, 0x0, 0xff], @random="cfa071dc33d9", [0xff, 0xff, 0xff, 0xff, 0xff, 0xff], 0x2e0, 0x2e0, 0x330, [@mac={'mac\x00', 0x10, {{@remote={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xbb}, 0x1}}}, @bpf0={'bpf\x00', 0x210, {{0x20, [{0x8000, 0x4902, 0x5, 0x3ff}, {0x5, 0x8, 0x2, 0xff}, {0x1000, 0x48000000000, 0x3}, {0xf7, 0x1f, 0xfffffffffffffe00, 0x1}, {0x10000, 0xfc0, 0x1, 0x6}, {0x4, 0x2, 0xcefa, 0x81}, {0x815, 0xc7, 0x8001, 0x6a0}, {0x40, 0x0, 0x9, 0x80000001}, {0xffffffffffffff53, 0x38a, 0x100000000, 0x7}, {0x5, 0x1, 0x1000, 0x10001}, {0x80000000, 0x7, 0x1, 0xf7}, {0x2, 0x9, 0x4c, 0x5}, {0xfffffffffffffff7, 0x0, 0xe74, 0x52a}, {0x1ff, 0x7, 0x3, 0x7}, {0x6, 0x1ff, 0x49, 0x7}, {0x8000, 0x0, 0x7, 0x684}, {0xffe, 0x988, 0x3, 0x1}, {0x7b, 0x5a07, 0x18, 0x7}, {0xfffffffffffffffe, 0xfff, 0x3, 0x178180a0}, {0x2, 0xc0, 0x6, 0x401}, {0x5, 0x3, 0x8, 0x8}, {0xffffffffffff0001, 0x3, 0xfffffffffffffff7, 0x5}, {0x1ff, 0x8001, 0x3}, {0x3, 0x9, 0xffffffff, 0x2}, {0x5, 0x4, 0x574, 0x64c}, {0x5, 0x4, 0x10001, 0x6}, {0x1, 0x5b2c, 0x3ff, 0x7}, {0xff, 0x2, 0x5, 0x62c5fc18}, {0x101, 0x7, 0x2, 0xfffffffffffffffd}, {0x7fff, 0x6, 0x8, 0x4}, {0x9, 0x0, 0x7, 0xff}, {0x4, 0x4, 0x4, 0x10000}, {0x59b0, 0xfff, 0x4, 0x4}, {0x1f, 0xfffffffffffffffd, 0x8001, 0x800}, {0x0, 0xffffffffffffffff, 0x2, 0x65}, {0x1ff, 0x1, 0x2, 0x7ff}, {0x4, 0x5, 0x1, 0x7be}, {0x9e4, 0x0, 0x7, 0x5}, {0x5, 0x8, 0x7f, 0xffffffff}, {0x4, 0x6, 0x5, 0x7ff}, {0x22aaaf52, 0x8f, 0x6, 0x10000}, {0x2, 0x7, 0xffff}, {0x5, 0xfffffffff016eb50, 0x82, 0x7}, {0x38, 0x800, 0x9a2a, 0xfffffffffffffffc}, {0x5, 0xb, 0x4, 0xfffffffffffff001}, {0x8b5, 0x81, 0x4, 0x2}, {0x8, 0xfffffffffffffff8, 0x1, 0x8}, {0x40, 0x4, 0x1, 0x100000001}, {0x9b, 0x5, 0x1, 0xd64c}, {0x100, 0x8, 0x7, 0x3ff}, {0xf11, 0x200, 0x7, 0x2}, {0xac5, 0x0, 0x3, 0x7}, {0x518, 0x1, 0x80}, {0x6, 0x7f, 0x6, 0x7298}, {0x7, 0x1, 0x2, 0x1ec9}, {0x400, 0x2, 0x6, 0x6c3}, {0x100000001, 0x6, 0x5, 0x9}, {0x8, 0x1dae, 0xfffffffffffffff8, 0x101}, {0x2, 0x7, 0x8, 0x3}, {0x0, 0x45b, 0x7, 0x72}, {0x100000001, 0xc00000000000, 0x100000001, 0x8}, {0x100000001, 0x0, 0xfffffffffffffffc, 0x3}, {0x95, 0x90b, 0x0, 0xfffffffffffff565}, {0x0, 0x4, 0x0, 0x2}], 0x40}}}]}}, @common=@IDLETIMER={'IDLETIMER\x00', 0x28, {{0x7f, 'syz0\x00'}}}}]}, {0x0, '\x00', 0x2, 0xfffffffffffffffc}, {0x0, '\x00', 0x2, 0xffffffffffffffff, 0x2, [{{{0x11, 0x40, 0x87df, 'irlan0\x00', 'sit0\x00', 'veth0_to_team\x00', 'ip6gretap0\x00', @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [0xff, 0xff, 0xff, 0xff, 0x0, 0xff], @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [0x0, 0xff, 0x0, 0xff], 0xb0, 0x210, 0x258, [@time={'time\x00', 0x18, {{0x1ff, 0x1, 0xe063, 0xb6c5, 0x2e80, 0x0, 0x2}}}]}, [@common=@redirect={'redirect\x00', 0x8, {{0xffffffffffffffff}}}, @common=@SECMARK={'SECMARK\x00', 0x108, {{0x1, 0x6, 'system_u:object_r:lost_found_t:s0\x00'}}}]}, @common=@ERROR={'ERROR\x00', 0x20, {"4323eed968d7072e70de82f41331fe3aed2aedc8f2fff16e54b1c4e2ad07"}}}, {{{0x5, 0x54, 0x888d, 'ip6gretap0\x00', 'teql0\x00', 'veth1_to_team\x00', 'erspan0\x00', @random="0eae55d5aac5", [0x0, 0xff, 0x0, 0xff, 0xff, 0xff], @empty, [0xff, 0xff, 0xff, 0x0, 0xff, 0xff], 0x70, 0x70, 0xb8}}, @common=@RATEEST={'RATEEST\x00', 0x20, {{'syz0\x00', 0x9, 0x1, 0x4}}}}]}]}, 0x9a0) 2018/05/15 08:25:12 executing program 4: perf_event_open$cgroup(&(0x7f0000000240)={0x7, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff9, 0x5, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000200)}, 0x0, 0x0, 0x0, 0x0, 0xdf, 0x9, 0x3}, 0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x8) 2018/05/15 08:25:12 executing program 5: r0 = syz_open_procfs(0x0, &(0x7f0000000280)='net/ptype\x00') sendfile(r0, r0, &(0x7f0000000000)=0x91, 0x7fffffff) 2018/05/15 08:25:12 executing program 0: perf_event_open$cgroup(&(0x7f0000000240)={0x7, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff9, 0x5, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000200)}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 2018/05/15 08:25:12 executing program 2: syz_emit_ethernet(0x3e, &(0x7f00000001c0)={@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, @dev={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa]}, [], {@ipv6={0x86dd, {0x0, 0x6, "50a09c", 0x8, 0x0, 0x0, @remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x33000000], 0xbb}, @local={0xfe, 0x80, [], 0xaa}, {[], @udp={0x0, 0x0, 0x8}}}}}}, &(0x7f0000000040)) 2018/05/15 08:25:12 executing program 6: perf_event_open$cgroup(&(0x7f0000000240)={0x7, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff9, 0x5, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000200)}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x8) 2018/05/15 08:25:12 executing program 3: syz_emit_ethernet(0x3e, &(0x7f00000001c0)={@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, @dev={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa]}, [], {@ipv6={0x86dd, {0x0, 0x6, "50a09c", 0x8, 0xffffff87, 0x0, @remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x608], 0xbb}, @local={0xfe, 0x80, [], 0xaa}, {[], @udp={0x0, 0x0, 0x8}}}}}}, &(0x7f0000000040)) 2018/05/15 08:25:12 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f0000000280)="6e65742f6970365f7461626c65735f6d61746368657300b6e23bcf6093cb57f8b4d285e9c48608549acee9a66f09d47a011dcc8f5af7870c6c1b6eebe85ebea4ecda4e44def87e8ee568c843daaf2805944012bc0144937e8b04411d09016ca07f7388ded591e346fb612397e79a6fe43e5c6a86bee1565b17b22b8ed5c95b4afbb3a620d1402c50bbaad790d0ffdb7c5a27e60423079f77bf") unlink(&(0x7f0000000080)='./file0\x00') sendfile(r0, r0, &(0x7f00000000c0)=0x10000000, 0x2) ioctl$KDGKBMETA(r0, 0x4b62, &(0x7f0000000100)) getsockopt$inet_sctp_SCTP_PARTIAL_DELIVERY_POINT(r0, 0x84, 0x13, &(0x7f0000000140)={0x0, 0xfffffffffffffffa}, &(0x7f0000000180)=0x8) syslog(0x2, &(0x7f0000000cc0)=""/107, 0x6b) setsockopt$IP_VS_SO_SET_DEL(r0, 0x0, 0x484, &(0x7f0000000200)={0x87, @dev={0xac, 0x14, 0x14, 0x1a}, 0x4e24, 0x2, 'rr\x00', 0x3, 0x2, 0x66}, 0x2c) setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x40, &(0x7f0000000340)=ANY=[@ANYBLOB="73656375726974790000000000000000000000000000000000000000000000000e00000004000000f8030000fffffffff00000000000000000000000ffffffffffffffff600300006003000060030000ffffffff04000000", @ANYPTR=&(0x7f0000000d40)=ANY=[@ANYBLOB="000000000000000000000000002100ebe70048ca02fec408edfbaf31ba590218fdffffffffffd60000000000000000000000000000000000000000000000000021d13202a6d3d3de0000000000000000000000"], @ANYBLOB="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"], 0x458) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000000)='dctcp\x00', 0x6) 2018/05/15 08:25:12 executing program 7: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup(r0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000d40)=@broute={'broute\x00', 0x20, 0x4, 0x928, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000400], 0x0, &(0x7f0000000000), &(0x7f0000000400)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x2, [{{{0x5, 0x0, 0x0, 'bcsh0\x00', 'sit0\x00', 'syzkaller1\x00', 'veth0\x00', @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [], @dev={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa]}, [], 0x1d8, 0x228, 0x258, [@comment={'comment\x00', 0x100}, @owner={'owner\x00', 0x18}]}, [@common=@LED={'LED\x00', 0x28, {{'syz0\x00'}}}]}, @common=@redirect={'redirect\x00', 0x8}}, {{{0x11, 0x4, 0x88e7, 'veth1_to_bond\x00', 'erspan0\x00', 'bridge_slave_1\x00', 'veth0_to_bridge\x00', @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [0xff, 0xff, 0x0, 0xff, 0x0, 0xff], @random="cfa071dc33d9", [0xff, 0xff, 0xff, 0xff, 0xff, 0xff], 0x2e0, 0x2e0, 0x330, [@mac={'mac\x00', 0x10, {{@remote={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xbb}, 0x1}}}, @bpf0={'bpf\x00', 0x210, {{0x20, [{0x8000, 0x4902, 0x5, 0x3ff}, {0x5, 0x8, 0x2, 0xff}, {0x1000, 0x48000000000, 0x3}, {0xf7, 0x1f, 0xfffffffffffffe00, 0x1}, {0x10000, 0xfc0, 0x1, 0x6}, {0x4, 0x2, 0xcefa, 0x81}, {0x815, 0xc7, 0x8001, 0x6a0}, {0x40, 0x0, 0x9, 0x80000001}, {0xffffffffffffff53, 0x38a, 0x100000000, 0x7}, {0x5, 0x1, 0x1000, 0x10001}, {0x80000000, 0x7, 0x1, 0xf7}, {0x2, 0x9, 0x4c, 0x5}, {0xfffffffffffffff7, 0x0, 0xe74, 0x52a}, {0x1ff, 0x7, 0x3, 0x7}, {0x6, 0x1ff, 0x49, 0x7}, {0x8000, 0x0, 0x7, 0x684}, {0xffe, 0x988, 0x3, 0x1}, {0x7b, 0x5a07, 0x18, 0x7}, {0xfffffffffffffffe, 0xfff, 0x3, 0x178180a0}, {0x2, 0xc0, 0x6, 0x401}, {0x5, 0x3, 0x8, 0x8}, {0xffffffffffff0001, 0x3, 0xfffffffffffffff7, 0x5}, {0x1ff, 0x8001, 0x3}, {0x3, 0x9, 0xffffffff, 0x2}, {0x5, 0x4, 0x574, 0x64c}, {0x5, 0x4, 0x10001, 0x6}, {0x1, 0x5b2c, 0x3ff, 0x7}, {0xff, 0x2, 0x5, 0x62c5fc18}, {0x101, 0x7, 0x2, 0xfffffffffffffffd}, {0x7fff, 0x6, 0x8, 0x4}, {0x9, 0x0, 0x7, 0xff}, {0x4, 0x4, 0x4, 0x10000}, {0x59b0, 0xfff, 0x4, 0x4}, {0x1f, 0xfffffffffffffffd, 0x8001, 0x800}, {0x0, 0xffffffffffffffff, 0x2, 0x65}, {0x1ff, 0x1, 0x2, 0x7ff}, {0x4, 0x5, 0x1, 0x7be}, {0x9e4, 0x0, 0x7, 0x5}, {0x5, 0x8, 0x7f, 0xffffffff}, {0x4, 0x6, 0x5, 0x7ff}, {0x22aaaf52, 0x8f, 0x6, 0x10000}, {0x2, 0x7, 0xffff}, {0x5, 0xfffffffff016eb50, 0x82, 0x7}, {0x38, 0x800, 0x9a2a, 0xfffffffffffffffc}, {0x5, 0xb, 0x4, 0xfffffffffffff001}, {0x8b5, 0x81, 0x4, 0x2}, {0x8, 0xfffffffffffffff8, 0x1, 0x8}, {0x40, 0x4, 0x1, 0x100000001}, {0x9b, 0x5, 0x1, 0xd64c}, {0x100, 0x8, 0x7, 0x3ff}, {0xf11, 0x200, 0x7, 0x2}, {0xac5, 0x0, 0x3, 0x7}, {0x518, 0x1, 0x80}, {0x6, 0x7f, 0x6, 0x7298}, {0x7, 0x1, 0x2, 0x1ec9}, {0x400, 0x2, 0x6, 0x6c3}, {0x100000001, 0x6, 0x5, 0x9}, {0x8, 0x1dae, 0xfffffffffffffff8, 0x101}, {0x2, 0x7, 0x8, 0x3}, {0x0, 0x45b, 0x7, 0x72}, {0x100000001, 0xc00000000000, 0x100000001, 0x8}, {0x100000001, 0x0, 0xfffffffffffffffc, 0x3}, {0x95, 0x90b, 0x0, 0xfffffffffffff565}, {0x0, 0x4, 0x0, 0x2}], 0x40}}}]}}, @common=@IDLETIMER={'IDLETIMER\x00', 0x28, {{0x7f, 'syz0\x00'}}}}]}, {0x0, '\x00', 0x2, 0xfffffffffffffffc}, {0x0, '\x00', 0x2, 0xffffffffffffffff, 0x2, [{{{0x11, 0x40, 0x87df, 'irlan0\x00', 'sit0\x00', 'veth0_to_team\x00', 'ip6gretap0\x00', @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [0xff, 0xff, 0xff, 0xff, 0x0, 0xff], @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [0x0, 0xff, 0x0, 0xff], 0xb0, 0x210, 0x258, [@time={'time\x00', 0x18, {{0x1ff, 0x1, 0xe063, 0xb6c5, 0x2e80, 0x0, 0x2}}}]}, [@common=@redirect={'redirect\x00', 0x8, {{0xffffffffffffffff}}}, @common=@SECMARK={'SECMARK\x00', 0x108, {{0x1, 0x6, 'system_u:object_r:lost_found_t:s0\x00'}}}]}, @common=@ERROR={'ERROR\x00', 0x20, {"4323eed968d7072e70de82f41331fe3aed2aedc8f2fff16e54b1c4e2ad07"}}}, {{{0x5, 0x54, 0x888d, 'ip6gretap0\x00', 'teql0\x00', 'veth1_to_team\x00', 'erspan0\x00', @random="0eae55d5aac5", [0x0, 0xff, 0x0, 0xff, 0xff, 0xff], @empty, [0xff, 0xff, 0xff, 0x0, 0xff, 0xff], 0x70, 0x70, 0xb8}}, @common=@RATEEST={'RATEEST\x00', 0x20, {{'syz0\x00', 0x9, 0x1, 0x4}}}}]}]}, 0x9a0) 2018/05/15 08:25:12 executing program 3: syz_emit_ethernet(0x3e, &(0x7f00000001c0)={@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, @dev={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa]}, [], {@ipv6={0x86dd, {0x0, 0x6, "50a09c", 0x8, 0xffffff87, 0x0, @remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0xe], 0xbb}, @local={0xfe, 0x80, [], 0xaa}, {[], @udp={0x0, 0x0, 0x8}}}}}}, &(0x7f0000000040)) 2018/05/15 08:25:12 executing program 0: perf_event_open$cgroup(&(0x7f0000000240)={0x7, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff9, 0x0, 0x0, 0x5, 0x6, @perf_bp={&(0x7f0000000200), 0x6}, 0x10202, 0x4, 0x4, 0x7, 0xdf, 0x9, 0x3}, 0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x8) 2018/05/15 08:25:12 executing program 6: perf_event_open$cgroup(&(0x7f0000000240)={0x7, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff9, 0x5, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000200)}}, 0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x8) 2018/05/15 08:25:12 executing program 2: syz_emit_ethernet(0x3e, &(0x7f00000001c0)={@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, @dev={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa]}, [], {@ipv6={0x86dd, {0x0, 0x6, "50a09c", 0x8, 0x0, 0x0, @remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x86ddffff], 0xbb}, @local={0xfe, 0x80, [], 0xaa}, {[], @udp={0x0, 0x0, 0x8}}}}}}, &(0x7f0000000040)) 2018/05/15 08:25:12 executing program 5: r0 = syz_open_procfs(0x0, &(0x7f0000000280)='net/ptype\x00') sendfile(r0, r0, &(0x7f0000000000)=0xffffffd, 0xffffffd) 2018/05/15 08:25:12 executing program 4: perf_event_open$cgroup(&(0x7f0000000240)={0x7, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff9, 0x5, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000200)}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x3}, 0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x8) 2018/05/15 08:25:12 executing program 7: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup(r0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000d40)=@broute={'broute\x00', 0x20, 0x4, 0x5f8, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000400], 0x0, &(0x7f0000000000), &(0x7f0000000400)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x5, 0x0, 0x0, 'bcsh0\x00', 'sit0\x00', 'syzkaller1\x00', 'veth0\x00', @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [], @dev={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa]}, [], 0x1d8, 0x228, 0x258, [@comment={'comment\x00', 0x100}, @owner={'owner\x00', 0x18}]}, [@common=@LED={'LED\x00', 0x28, {{'syz0\x00'}}}]}, @common=@redirect={'redirect\x00', 0x8}}]}, {0x0, '\x00', 0x2, 0xfffffffffffffffc}, {0x0, '\x00', 0x2, 0xffffffffffffffff, 0x2, [{{{0x11, 0x40, 0x87df, 'irlan0\x00', 'sit0\x00', 'veth0_to_team\x00', 'ip6gretap0\x00', @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [0xff, 0xff, 0xff, 0xff, 0x0, 0xff], @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [0x0, 0xff, 0x0, 0xff], 0xb0, 0x210, 0x258, [@time={'time\x00', 0x18, {{0x1ff, 0x1, 0xe063, 0xb6c5, 0x2e80, 0x0, 0x2}}}]}, [@common=@redirect={'redirect\x00', 0x8, {{0xffffffffffffffff}}}, @common=@SECMARK={'SECMARK\x00', 0x108, {{0x1, 0x6, 'system_u:object_r:lost_found_t:s0\x00'}}}]}, @common=@ERROR={'ERROR\x00', 0x20, {"4323eed968d7072e70de82f41331fe3aed2aedc8f2fff16e54b1c4e2ad07"}}}, {{{0x5, 0x54, 0x888d, 'ip6gretap0\x00', 'teql0\x00', 'veth1_to_team\x00', 'erspan0\x00', @random="0eae55d5aac5", [0x0, 0xff, 0x0, 0xff, 0xff, 0xff], @empty, [0xff, 0xff, 0xff, 0x0, 0xff, 0xff], 0x70, 0x70, 0xb8}}, @common=@RATEEST={'RATEEST\x00', 0x20, {{'syz0\x00', 0x9, 0x1, 0x4}}}}]}]}, 0x9a0) 2018/05/15 08:25:12 executing program 3: syz_emit_ethernet(0x3e, &(0x7f00000001c0)={@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, @dev={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa]}, [], {@ipv6={0x86dd, {0x0, 0x6, "50a09c", 0x8, 0xffffff87, 0x0, @remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x6488], 0xbb}, @local={0xfe, 0x80, [], 0xaa}, {[], @udp={0x0, 0x0, 0x8}}}}}}, &(0x7f0000000040)) [ 443.677056] kernel msg: ebtables bug: please report to author: Wrong len argument 2018/05/15 08:25:13 executing program 0: r0 = syz_open_procfs(0x0, &(0x7f0000000280)='net/ptype\x00') sendfile(r0, r0, &(0x7f0000000000)=0xdc, 0x7fffffff) 2018/05/15 08:25:13 executing program 6: perf_event_open$cgroup(&(0x7f0000000240)={0x7, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff9, 0x5, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000200)}}, 0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x8) 2018/05/15 08:25:13 executing program 2: syz_emit_ethernet(0x3e, &(0x7f00000001c0)={@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, @dev={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa]}, [], {@ipv6={0x86dd, {0x0, 0x6, "50a09c", 0x8, 0x0, 0x0, @remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x2f00], 0xbb}, @local={0xfe, 0x80, [], 0xaa}, {[], @udp={0x0, 0x0, 0x8}}}}}}, &(0x7f0000000040)) 2018/05/15 08:25:13 executing program 4: perf_event_open$cgroup(&(0x7f0000000240)={0x7, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff9, 0x5, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000200)}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x8) 2018/05/15 08:25:13 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f0000000280)="6e65742f6970365f7461626c65735f6d61746368657300b6e23bcf6093cb57f8b4d285e9c48608549acee9a66f09d47a011dcc8f5af7870c6c1b6eebe85ebea4ecda4e44def87e8ee568c843daaf2805944012bc0144937e8b04411d09016ca07f7388ded591e346fb612397e79a6fe43e5c6a86bee1565b17b22b8ed5c95b4afbb3a620d1402c50bbaad790d0ffdb7c5a27e60423079f77bf") unlink(&(0x7f0000000080)='./file0\x00') sendfile(r0, r0, &(0x7f00000000c0)=0x10000000, 0x2) ioctl$KDGKBMETA(r0, 0x4b62, &(0x7f0000000100)) getsockopt$inet_sctp_SCTP_PARTIAL_DELIVERY_POINT(r0, 0x84, 0x13, &(0x7f0000000140)={0x0, 0xfffffffffffffffa}, &(0x7f0000000180)=0x8) syslog(0x2, &(0x7f0000000cc0)=""/107, 0x6b) setsockopt$inet_sctp_SCTP_STREAM_SCHEDULER(r0, 0x84, 0x7b, &(0x7f00000001c0)={r1, 0x40ef2843}, 0x8) setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x40, &(0x7f0000000340)=ANY=[@ANYBLOB="73656375726974790000000000000000000000000000000000000000000000000e00000004000000f8030000fffffffff00000000000000000000000ffffffffffffffff600300006003000060030000ffffffff04000000", @ANYPTR=&(0x7f0000000d40)=ANY=[@ANYBLOB="000000000000000000000000002100ebe70048ca02fec408edfbaf31ba590218fdffffffffffd60000000000000000000000000000000000000000000000000021d13202a6d3d3de0000000000000000000000"], @ANYBLOB="00000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000c800f0000000000000000000000000000000000000000000000000003000616800000000000000000000000000000000000000000000000000000000f9ffffff7f000000010000000000000028005443504d5353000000000000000000000000000000000000000000000000740c0000000000007f000001ac14140dffffff00ffffffff6772653000000000000000000000000069703667726530000000000000000000000000000000000000000000ff0000000000000000000000000000000000000000000000000000000000ff0000000000000000000000000000007f0003010000000000000000000000000000b80018010000000000000000000000000000000000000000000000002000736f636b657400000000000000000000000000000000000000000000000060005345540000000000000000000000000000000000000000000000000000000100000000100000020000000000008e0a000000010400000800000000033f0002000000d4180000ff0700009c0a00001e62000000000000e1020000ff09010000000100ac1414aa000000ffff0000007465616d5f736c6176655f310000000069703667726574617030000000000000000000000000000000000000ff0000000000000000000000000000000000000000000000000000000000ff000000000000000000000000000000670001400000000000000000000000000000280158010000000000000000000000000000000000000000000000004000736574000000000000000000000000000000000000000000000000000000070000000100000008000000090000000000000000000000060000000307050050006f736600000000000000000000000000000000000000000000000000000073797a3100000000000000000000000000000000000000000000000000000000070000000200000002000000000000003000434f4e4e4d41524b00000000000000000000ffffffffffffffe5000000014000000009000000020000000300000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000700098000000000000000000000000000000000000000000280000000000000000000000000000000000000000000000000000000000000800ffffff00000000"], 0x458) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000000)='dctcp\x00', 0x6) 2018/05/15 08:25:13 executing program 5: r0 = syz_open_procfs(0x0, &(0x7f0000000280)='net/ptype\x00') sendfile(r0, r0, &(0x7f0000000000)=0xffffffd, 0x8fffeffd) 2018/05/15 08:25:13 executing program 3: syz_emit_ethernet(0x3e, &(0x7f00000001c0)={@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, @dev={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa]}, [], {@ipv6={0x86dd, {0x0, 0x6, "50a09c", 0x8, 0xffffff87, 0x0, @remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x3f00000000000000], 0xbb}, @local={0xfe, 0x80, [], 0xaa}, {[], @udp={0x0, 0x0, 0x8}}}}}}, &(0x7f0000000040)) 2018/05/15 08:25:13 executing program 7: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup(r0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000d40)=@broute={'broute\x00', 0x20, 0x4, 0x5f8, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000400], 0x0, &(0x7f0000000000), &(0x7f0000000400)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x5, 0x0, 0x0, 'bcsh0\x00', 'sit0\x00', 'syzkaller1\x00', 'veth0\x00', @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [], @dev={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa]}, [], 0x1d8, 0x228, 0x258, [@comment={'comment\x00', 0x100}, @owner={'owner\x00', 0x18}]}, [@common=@LED={'LED\x00', 0x28, {{'syz0\x00'}}}]}, @common=@redirect={'redirect\x00', 0x8}}]}, {0x0, '\x00', 0x2, 0xfffffffffffffffc}, {0x0, '\x00', 0x2, 0xffffffffffffffff, 0x2, [{{{0x11, 0x40, 0x87df, 'irlan0\x00', 'sit0\x00', 'veth0_to_team\x00', 'ip6gretap0\x00', @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [0xff, 0xff, 0xff, 0xff, 0x0, 0xff], @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [0x0, 0xff, 0x0, 0xff], 0xb0, 0x210, 0x258, [@time={'time\x00', 0x18, {{0x1ff, 0x1, 0xe063, 0xb6c5, 0x2e80, 0x0, 0x2}}}]}, [@common=@redirect={'redirect\x00', 0x8, {{0xffffffffffffffff}}}, @common=@SECMARK={'SECMARK\x00', 0x108, {{0x1, 0x6, 'system_u:object_r:lost_found_t:s0\x00'}}}]}, @common=@ERROR={'ERROR\x00', 0x20, {"4323eed968d7072e70de82f41331fe3aed2aedc8f2fff16e54b1c4e2ad07"}}}, {{{0x5, 0x54, 0x888d, 'ip6gretap0\x00', 'teql0\x00', 'veth1_to_team\x00', 'erspan0\x00', @random="0eae55d5aac5", [0x0, 0xff, 0x0, 0xff, 0xff, 0xff], @empty, [0xff, 0xff, 0xff, 0x0, 0xff, 0xff], 0x70, 0x70, 0xb8}}, @common=@RATEEST={'RATEEST\x00', 0x20, {{'syz0\x00', 0x9, 0x1, 0x4}}}}]}]}, 0x9a0) 2018/05/15 08:25:13 executing program 0: r0 = syz_open_procfs(0x0, &(0x7f0000000280)='net/ptype\x00') sendfile(r0, r0, &(0x7f0000000000)=0xdc, 0x7fffffff) 2018/05/15 08:25:13 executing program 3: syz_emit_ethernet(0x3e, &(0x7f00000001c0)={@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, @dev={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa]}, [], {@ipv6={0x86dd, {0x0, 0x6, "50a09c", 0x8, 0xffffff87, 0x0, @remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x600000000000000], 0xbb}, @local={0xfe, 0x80, [], 0xaa}, {[], @udp={0x0, 0x0, 0x8}}}}}}, &(0x7f0000000040)) [ 443.823695] kernel msg: ebtables bug: please report to author: Wrong len argument 2018/05/15 08:25:13 executing program 6: perf_event_open$cgroup(&(0x7f0000000240)={0x7, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff9, 0x5, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000200)}}, 0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x8) 2018/05/15 08:25:13 executing program 4: perf_event_open$cgroup(&(0x7f0000000240)={0x7, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff9, 0x5, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000200)}}, 0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x8) 2018/05/15 08:25:13 executing program 2: syz_emit_ethernet(0x3e, &(0x7f00000001c0)={@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, @dev={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa]}, [], {@ipv6={0x86dd, {0x0, 0x6, "50a09c", 0x8, 0x0, 0x0, @remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x33], 0xbb}, @local={0xfe, 0x80, [], 0xaa}, {[], @udp={0x0, 0x0, 0x8}}}}}}, &(0x7f0000000040)) 2018/05/15 08:25:13 executing program 5: r0 = syz_open_procfs(0x0, &(0x7f0000000280)='net/ptype\x00') ioctl$TUNSETFILTEREBPF(r0, 0x800454e1, &(0x7f0000000040)=r0) r1 = memfd_create(&(0x7f0000000100)="706f73fa000000000000000000000000000000077d007e4dfb5f6a52dc40a7ca84cca66f106a78ddf38410fbaba66e96a7d39a3616e6b267e11bc7785defda381942bbe290644b08642ed3011e466c80a669de9994ca85", 0x5) lseek(r1, 0x3, 0x1) sendfile(r0, r0, &(0x7f0000000000)=0xffffffd, 0x7fffffff) 2018/05/15 08:25:13 executing program 0: r0 = syz_open_procfs(0x0, &(0x7f0000000280)='net/ptype\x00') sendfile(r0, r0, &(0x7f0000000000)=0xdc, 0x7fffffff) 2018/05/15 08:25:13 executing program 7: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup(r0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000d40)=@broute={'broute\x00', 0x20, 0x4, 0x5f8, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000400], 0x0, &(0x7f0000000000), &(0x7f0000000400)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x5, 0x0, 0x0, 'bcsh0\x00', 'sit0\x00', 'syzkaller1\x00', 'veth0\x00', @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [], @dev={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa]}, [], 0x1d8, 0x228, 0x258, [@comment={'comment\x00', 0x100}, @owner={'owner\x00', 0x18}]}, [@common=@LED={'LED\x00', 0x28, {{'syz0\x00'}}}]}, @common=@redirect={'redirect\x00', 0x8}}]}, {0x0, '\x00', 0x2, 0xfffffffffffffffc}, {0x0, '\x00', 0x2, 0xffffffffffffffff, 0x2, [{{{0x11, 0x40, 0x87df, 'irlan0\x00', 'sit0\x00', 'veth0_to_team\x00', 'ip6gretap0\x00', @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [0xff, 0xff, 0xff, 0xff, 0x0, 0xff], @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [0x0, 0xff, 0x0, 0xff], 0xb0, 0x210, 0x258, [@time={'time\x00', 0x18, {{0x1ff, 0x1, 0xe063, 0xb6c5, 0x2e80, 0x0, 0x2}}}]}, [@common=@redirect={'redirect\x00', 0x8, {{0xffffffffffffffff}}}, @common=@SECMARK={'SECMARK\x00', 0x108, {{0x1, 0x6, 'system_u:object_r:lost_found_t:s0\x00'}}}]}, @common=@ERROR={'ERROR\x00', 0x20, {"4323eed968d7072e70de82f41331fe3aed2aedc8f2fff16e54b1c4e2ad07"}}}, {{{0x5, 0x54, 0x888d, 'ip6gretap0\x00', 'teql0\x00', 'veth1_to_team\x00', 'erspan0\x00', @random="0eae55d5aac5", [0x0, 0xff, 0x0, 0xff, 0xff, 0xff], @empty, [0xff, 0xff, 0xff, 0x0, 0xff, 0xff], 0x70, 0x70, 0xb8}}, @common=@RATEEST={'RATEEST\x00', 0x20, {{'syz0\x00', 0x9, 0x1, 0x4}}}}]}]}, 0x9a0) 2018/05/15 08:25:13 executing program 4: perf_event_open$cgroup(&(0x7f0000000240)={0x7, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff9, 0x5, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000200)}}, 0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x8) 2018/05/15 08:25:13 executing program 6: perf_event_open$cgroup(&(0x7f0000000240)={0x7, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff9, 0x5, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000200)}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x8) 2018/05/15 08:25:13 executing program 2: syz_emit_ethernet(0x3e, &(0x7f00000001c0)={@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, @dev={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa]}, [], {@ipv6={0x86dd, {0x0, 0x6, "50a09c", 0x8, 0x0, 0x0, @remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x5], 0xbb}, @local={0xfe, 0x80, [], 0xaa}, {[], @udp={0x0, 0x0, 0x8}}}}}}, &(0x7f0000000040)) [ 444.101072] kernel msg: ebtables bug: please report to author: Wrong len argument 2018/05/15 08:25:13 executing program 3: syz_emit_ethernet(0x3e, &(0x7f00000001c0)={@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, @dev={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa]}, [], {@ipv6={0x86dd, {0x0, 0x6, "50a09c", 0x8, 0xffffff87, 0x0, @remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0xd00], 0xbb}, @local={0xfe, 0x80, [], 0xaa}, {[], @udp={0x0, 0x0, 0x8}}}}}}, &(0x7f0000000040)) 2018/05/15 08:25:13 executing program 5: r0 = syz_open_procfs(0x0, &(0x7f0000000280)='net/ptype\x00') sendfile(r0, r0, &(0x7f0000000000)=0xffffffd, 0x7) write$cgroup_int(r0, &(0x7f0000000040)={[0x32, 0x3a, 0x0, 0x2d]}, 0x4) 2018/05/15 08:25:13 executing program 0: sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000000)=0xdc, 0x7fffffff) 2018/05/15 08:25:13 executing program 4: perf_event_open$cgroup(&(0x7f0000000240)={0x7, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff9, 0x5, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000200)}}, 0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x8) 2018/05/15 08:25:13 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f0000000280)="6e65742f6970365f7461626c65735f6d61746368657300b6e23bcf6093cb57f8b4d285e9c48608549acee9a66f09d47a011dcc8f5af7870c6c1b6eebe85ebea4ecda4e44def87e8ee568c843daaf2805944012bc0144937e8b04411d09016ca07f7388ded591e346fb612397e79a6fe43e5c6a86bee1565b17b22b8ed5c95b4afbb3a620d1402c50bbaad790d0ffdb7c5a27e60423079f77bf") unlink(&(0x7f0000000080)='./file0\x00') sendfile(r0, r0, &(0x7f00000000c0)=0x10000000, 0x2) ioctl$KDGKBMETA(r0, 0x4b62, &(0x7f0000000100)) getsockopt$inet_sctp_SCTP_PARTIAL_DELIVERY_POINT(r0, 0x84, 0x13, &(0x7f0000000140)={0x0, 0xfffffffffffffffa}, &(0x7f0000000180)=0x8) syslog(0x2, &(0x7f0000000cc0)=""/107, 0x6b) setsockopt$inet_sctp_SCTP_STREAM_SCHEDULER(r0, 0x84, 0x7b, &(0x7f00000001c0)={r1, 0x40ef2843}, 0x8) setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x40, &(0x7f0000000340)=ANY=[@ANYBLOB="73656375726974790000000000000000000000000000000000000000000000000e00000004000000f8030000fffffffff00000000000000000000000ffffffffffffffff600300006003000060030000ffffffff04000000", @ANYPTR=&(0x7f0000000d40)=ANY=[@ANYBLOB="000000000000000000000000002100ebe70048ca02fec408edfbaf31ba590218fdffffffffffd60000000000000000000000000000000000000000000000000021d13202a6d3d3de0000000000000000000000"], @ANYBLOB="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"], 0x458) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000000)='dctcp\x00', 0x6) 2018/05/15 08:25:13 executing program 6: perf_event_open$cgroup(&(0x7f0000000240)={0x7, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff9, 0x5, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000200)}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x8) 2018/05/15 08:25:13 executing program 7: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup(r0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000d40)=@broute={'broute\x00', 0x20, 0x4, 0x928, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000400], 0x0, &(0x7f0000000000), &(0x7f0000000400)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x2, [{{{0x5, 0x0, 0x0, 'bcsh0\x00', 'sit0\x00', 'syzkaller1\x00', 'veth0\x00', @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [], @dev={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa]}, [], 0x1d8, 0x228, 0x258, [@comment={'comment\x00', 0x100}, @owner={'owner\x00', 0x18}]}, [@common=@LED={'LED\x00', 0x28, {{'syz0\x00'}}}]}, @common=@redirect={'redirect\x00', 0x8}}, {{{0x0, 0x4, 0x88e7, 'veth1_to_bond\x00', 'erspan0\x00', 'bridge_slave_1\x00', 'veth0_to_bridge\x00', @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [0xff, 0xff, 0x0, 0xff, 0x0, 0xff], @random="cfa071dc33d9", [0xff, 0xff, 0xff, 0xff, 0xff, 0xff], 0x2e0, 0x2e0, 0x330, [@mac={'mac\x00', 0x10, {{@remote={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xbb}, 0x1}}}, @bpf0={'bpf\x00', 0x210, {{0x20, [{0x8000, 0x4902, 0x5, 0x3ff}, {0x5, 0x8, 0x2, 0xff}, {0x1000, 0x48000000000, 0x3}, {0xf7, 0x1f, 0xfffffffffffffe00, 0x1}, {0x10000, 0xfc0, 0x1, 0x6}, {0x4, 0x2, 0xcefa, 0x81}, {0x815, 0xc7, 0x8001, 0x6a0}, {0x40, 0x0, 0x9, 0x80000001}, {0xffffffffffffff53, 0x38a, 0x100000000, 0x7}, {0x5, 0x1, 0x1000, 0x10001}, {0x80000000, 0x7, 0x1, 0xf7}, {0x2, 0x9, 0x4c, 0x5}, {0xfffffffffffffff7, 0x0, 0xe74, 0x52a}, {0x1ff, 0x7, 0x3, 0x7}, {0x6, 0x1ff, 0x49, 0x7}, {0x8000, 0x0, 0x7, 0x684}, {0xffe, 0x988, 0x3, 0x1}, {0x7b, 0x5a07, 0x18, 0x7}, {0xfffffffffffffffe, 0xfff, 0x3, 0x178180a0}, {0x2, 0xc0, 0x6, 0x401}, {0x5, 0x3, 0x8, 0x8}, {0xffffffffffff0001, 0x3, 0xfffffffffffffff7, 0x5}, {0x1ff, 0x8001, 0x3}, {0x3, 0x9, 0xffffffff, 0x2}, {0x5, 0x4, 0x574, 0x64c}, {0x5, 0x4, 0x10001, 0x6}, {0x1, 0x5b2c, 0x3ff, 0x7}, {0xff, 0x2, 0x5, 0x62c5fc18}, {0x101, 0x7, 0x2, 0xfffffffffffffffd}, {0x7fff, 0x6, 0x8, 0x4}, {0x9, 0x0, 0x7, 0xff}, {0x4, 0x4, 0x4, 0x10000}, {0x59b0, 0xfff, 0x4, 0x4}, {0x1f, 0xfffffffffffffffd, 0x8001, 0x800}, {0x0, 0xffffffffffffffff, 0x2, 0x65}, {0x1ff, 0x1, 0x2, 0x7ff}, {0x4, 0x5, 0x1, 0x7be}, {0x9e4, 0x0, 0x7, 0x5}, {0x5, 0x8, 0x7f, 0xffffffff}, {0x4, 0x6, 0x5, 0x7ff}, {0x22aaaf52, 0x8f, 0x6, 0x10000}, {0x2, 0x7, 0xffff}, {0x5, 0xfffffffff016eb50, 0x82, 0x7}, {0x38, 0x800, 0x9a2a, 0xfffffffffffffffc}, {0x5, 0xb, 0x4, 0xfffffffffffff001}, {0x8b5, 0x81, 0x4, 0x2}, {0x8, 0xfffffffffffffff8, 0x1, 0x8}, {0x40, 0x4, 0x1, 0x100000001}, {0x9b, 0x5, 0x1, 0xd64c}, {0x100, 0x8, 0x7, 0x3ff}, {0xf11, 0x200, 0x7, 0x2}, {0xac5, 0x0, 0x3, 0x7}, {0x518, 0x1, 0x80}, {0x6, 0x7f, 0x6, 0x7298}, {0x7, 0x1, 0x2, 0x1ec9}, {0x400, 0x2, 0x6, 0x6c3}, {0x100000001, 0x6, 0x5, 0x9}, {0x8, 0x1dae, 0xfffffffffffffff8, 0x101}, {0x2, 0x7, 0x8, 0x3}, {0x0, 0x45b, 0x7, 0x72}, {0x100000001, 0xc00000000000, 0x100000001, 0x8}, {0x100000001, 0x0, 0xfffffffffffffffc, 0x3}, {0x95, 0x90b, 0x0, 0xfffffffffffff565}, {0x0, 0x4, 0x0, 0x2}], 0x40}}}]}}, @common=@IDLETIMER={'IDLETIMER\x00', 0x28, {{0x7f, 'syz0\x00'}}}}]}, {0x0, '\x00', 0x2, 0xfffffffffffffffc}, {0x0, '\x00', 0x2, 0xffffffffffffffff, 0x2, [{{{0x11, 0x40, 0x87df, 'irlan0\x00', 'sit0\x00', 'veth0_to_team\x00', 'ip6gretap0\x00', @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [0xff, 0xff, 0xff, 0xff, 0x0, 0xff], @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [0x0, 0xff, 0x0, 0xff], 0xb0, 0x210, 0x258, [@time={'time\x00', 0x18, {{0x1ff, 0x1, 0xe063, 0xb6c5, 0x2e80, 0x0, 0x2}}}]}, [@common=@redirect={'redirect\x00', 0x8, {{0xffffffffffffffff}}}, @common=@SECMARK={'SECMARK\x00', 0x108, {{0x1, 0x6, 'system_u:object_r:lost_found_t:s0\x00'}}}]}, @common=@ERROR={'ERROR\x00', 0x20, {"4323eed968d7072e70de82f41331fe3aed2aedc8f2fff16e54b1c4e2ad07"}}}, {{{0x5, 0x54, 0x888d, 'ip6gretap0\x00', 'teql0\x00', 'veth1_to_team\x00', 'erspan0\x00', @random="0eae55d5aac5", [0x0, 0xff, 0x0, 0xff, 0xff, 0xff], @empty, [0xff, 0xff, 0xff, 0x0, 0xff, 0xff], 0x70, 0x70, 0xb8}}, @common=@RATEEST={'RATEEST\x00', 0x20, {{'syz0\x00', 0x9, 0x1, 0x4}}}}]}]}, 0x9a0) 2018/05/15 08:25:13 executing program 2: syz_emit_ethernet(0x3e, &(0x7f00000001c0)={@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, @dev={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa]}, [], {@ipv6={0x86dd, {0x0, 0x6, "50a09c", 0x8, 0x0, 0x0, @remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0xffffff88], 0xbb}, @local={0xfe, 0x80, [], 0xaa}, {[], @udp={0x0, 0x0, 0x8}}}}}}, &(0x7f0000000040)) 2018/05/15 08:25:13 executing program 6: perf_event_open$cgroup(&(0x7f0000000240)={0x7, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff9, 0x5, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000200)}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 2018/05/15 08:25:13 executing program 0: sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000000)=0xdc, 0x7fffffff) 2018/05/15 08:25:13 executing program 3: syz_emit_ethernet(0x3e, &(0x7f00000001c0)={@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, @dev={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa]}, [], {@ipv6={0x86dd, {0x0, 0x6, "50a09c", 0x8, 0xffffff87, 0x0, @remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x4], 0xbb}, @local={0xfe, 0x80, [], 0xaa}, {[], @udp={0x0, 0x0, 0x8}}}}}}, &(0x7f0000000040)) 2018/05/15 08:25:13 executing program 4: perf_event_open$cgroup(&(0x7f0000000240)={0x7, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff9, 0x5, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000200)}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x8) 2018/05/15 08:25:13 executing program 2: syz_emit_ethernet(0x3e, &(0x7f00000001c0)={@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, @dev={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa]}, [], {@ipv6={0x86dd, {0x0, 0x6, "50a09c", 0x8, 0x0, 0x0, @remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x800e000000000000], 0xbb}, @local={0xfe, 0x80, [], 0xaa}, {[], @udp={0x0, 0x0, 0x8}}}}}}, &(0x7f0000000040)) 2018/05/15 08:25:13 executing program 5: r0 = openat$dsp(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/dsp\x00', 0x80600, 0x0) ioctl$INOTIFY_IOC_SETNEXTWD(r0, 0x40044900, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000280)='net/ptype\x00') fgetxattr(r1, &(0x7f0000000040)=@random={'trusted.', 'cpuset:&.\x00'}, &(0x7f0000000100)=""/234, 0xea) sendfile(r0, r1, &(0x7f0000000000)=0xffffffd, 0x7fffffff) ioctl$BLKZEROOUT(r0, 0x127f, &(0x7f0000000080)={0x4, 0x3974}) ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) [ 444.257704] kernel msg: ebtables bug: please report to author: entries_size too small 2018/05/15 08:25:14 executing program 7: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup(r0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000d40)=@broute={'broute\x00', 0x20, 0x4, 0x928, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000400], 0x0, &(0x7f0000000000), &(0x7f0000000400)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x2, [{{{0x5, 0x0, 0x0, 'bcsh0\x00', 'sit0\x00', 'syzkaller1\x00', 'veth0\x00', @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [], @dev={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa]}, [], 0x1d8, 0x228, 0x258, [@comment={'comment\x00', 0x100}, @owner={'owner\x00', 0x18}]}, [@common=@LED={'LED\x00', 0x28, {{'syz0\x00'}}}]}, @common=@redirect={'redirect\x00', 0x8}}, {{{0x0, 0x4, 0x88e7, 'veth1_to_bond\x00', 'erspan0\x00', 'bridge_slave_1\x00', 'veth0_to_bridge\x00', @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [0xff, 0xff, 0x0, 0xff, 0x0, 0xff], @random="cfa071dc33d9", [0xff, 0xff, 0xff, 0xff, 0xff, 0xff], 0x2e0, 0x2e0, 0x330, [@mac={'mac\x00', 0x10, {{@remote={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xbb}, 0x1}}}, @bpf0={'bpf\x00', 0x210, {{0x20, [{0x8000, 0x4902, 0x5, 0x3ff}, {0x5, 0x8, 0x2, 0xff}, {0x1000, 0x48000000000, 0x3}, {0xf7, 0x1f, 0xfffffffffffffe00, 0x1}, {0x10000, 0xfc0, 0x1, 0x6}, {0x4, 0x2, 0xcefa, 0x81}, {0x815, 0xc7, 0x8001, 0x6a0}, {0x40, 0x0, 0x9, 0x80000001}, {0xffffffffffffff53, 0x38a, 0x100000000, 0x7}, {0x5, 0x1, 0x1000, 0x10001}, {0x80000000, 0x7, 0x1, 0xf7}, {0x2, 0x9, 0x4c, 0x5}, {0xfffffffffffffff7, 0x0, 0xe74, 0x52a}, {0x1ff, 0x7, 0x3, 0x7}, {0x6, 0x1ff, 0x49, 0x7}, {0x8000, 0x0, 0x7, 0x684}, {0xffe, 0x988, 0x3, 0x1}, {0x7b, 0x5a07, 0x18, 0x7}, {0xfffffffffffffffe, 0xfff, 0x3, 0x178180a0}, {0x2, 0xc0, 0x6, 0x401}, {0x5, 0x3, 0x8, 0x8}, {0xffffffffffff0001, 0x3, 0xfffffffffffffff7, 0x5}, {0x1ff, 0x8001, 0x3}, {0x3, 0x9, 0xffffffff, 0x2}, {0x5, 0x4, 0x574, 0x64c}, {0x5, 0x4, 0x10001, 0x6}, {0x1, 0x5b2c, 0x3ff, 0x7}, {0xff, 0x2, 0x5, 0x62c5fc18}, {0x101, 0x7, 0x2, 0xfffffffffffffffd}, {0x7fff, 0x6, 0x8, 0x4}, {0x9, 0x0, 0x7, 0xff}, {0x4, 0x4, 0x4, 0x10000}, {0x59b0, 0xfff, 0x4, 0x4}, {0x1f, 0xfffffffffffffffd, 0x8001, 0x800}, {0x0, 0xffffffffffffffff, 0x2, 0x65}, {0x1ff, 0x1, 0x2, 0x7ff}, {0x4, 0x5, 0x1, 0x7be}, {0x9e4, 0x0, 0x7, 0x5}, {0x5, 0x8, 0x7f, 0xffffffff}, {0x4, 0x6, 0x5, 0x7ff}, {0x22aaaf52, 0x8f, 0x6, 0x10000}, {0x2, 0x7, 0xffff}, {0x5, 0xfffffffff016eb50, 0x82, 0x7}, {0x38, 0x800, 0x9a2a, 0xfffffffffffffffc}, {0x5, 0xb, 0x4, 0xfffffffffffff001}, {0x8b5, 0x81, 0x4, 0x2}, {0x8, 0xfffffffffffffff8, 0x1, 0x8}, {0x40, 0x4, 0x1, 0x100000001}, {0x9b, 0x5, 0x1, 0xd64c}, {0x100, 0x8, 0x7, 0x3ff}, {0xf11, 0x200, 0x7, 0x2}, {0xac5, 0x0, 0x3, 0x7}, {0x518, 0x1, 0x80}, {0x6, 0x7f, 0x6, 0x7298}, {0x7, 0x1, 0x2, 0x1ec9}, {0x400, 0x2, 0x6, 0x6c3}, {0x100000001, 0x6, 0x5, 0x9}, {0x8, 0x1dae, 0xfffffffffffffff8, 0x101}, {0x2, 0x7, 0x8, 0x3}, {0x0, 0x45b, 0x7, 0x72}, {0x100000001, 0xc00000000000, 0x100000001, 0x8}, {0x100000001, 0x0, 0xfffffffffffffffc, 0x3}, {0x95, 0x90b, 0x0, 0xfffffffffffff565}, {0x0, 0x4, 0x0, 0x2}], 0x40}}}]}}, @common=@IDLETIMER={'IDLETIMER\x00', 0x28, {{0x7f, 'syz0\x00'}}}}]}, {0x0, '\x00', 0x2, 0xfffffffffffffffc}, {0x0, '\x00', 0x2, 0xffffffffffffffff, 0x2, [{{{0x11, 0x40, 0x87df, 'irlan0\x00', 'sit0\x00', 'veth0_to_team\x00', 'ip6gretap0\x00', @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [0xff, 0xff, 0xff, 0xff, 0x0, 0xff], @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [0x0, 0xff, 0x0, 0xff], 0xb0, 0x210, 0x258, [@time={'time\x00', 0x18, {{0x1ff, 0x1, 0xe063, 0xb6c5, 0x2e80, 0x0, 0x2}}}]}, [@common=@redirect={'redirect\x00', 0x8, {{0xffffffffffffffff}}}, @common=@SECMARK={'SECMARK\x00', 0x108, {{0x1, 0x6, 'system_u:object_r:lost_found_t:s0\x00'}}}]}, @common=@ERROR={'ERROR\x00', 0x20, {"4323eed968d7072e70de82f41331fe3aed2aedc8f2fff16e54b1c4e2ad07"}}}, {{{0x5, 0x54, 0x888d, 'ip6gretap0\x00', 'teql0\x00', 'veth1_to_team\x00', 'erspan0\x00', @random="0eae55d5aac5", [0x0, 0xff, 0x0, 0xff, 0xff, 0xff], @empty, [0xff, 0xff, 0xff, 0x0, 0xff, 0xff], 0x70, 0x70, 0xb8}}, @common=@RATEEST={'RATEEST\x00', 0x20, {{'syz0\x00', 0x9, 0x1, 0x4}}}}]}]}, 0x9a0) 2018/05/15 08:25:14 executing program 6: perf_event_open$cgroup(&(0x7f0000000240)={0x7, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff9, 0x5, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000200)}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 2018/05/15 08:25:14 executing program 0: sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000000)=0xdc, 0x7fffffff) 2018/05/15 08:25:14 executing program 3: syz_emit_ethernet(0x3e, &(0x7f00000001c0)={@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, @dev={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa]}, [], {@ipv6={0x86dd, {0x0, 0x6, "50a09c", 0x8, 0xffffff87, 0x0, @remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0xfffffffe], 0xbb}, @local={0xfe, 0x80, [], 0xaa}, {[], @udp={0x0, 0x0, 0x8}}}}}}, &(0x7f0000000040)) 2018/05/15 08:25:14 executing program 2: syz_emit_ethernet(0x3e, &(0x7f00000001c0)={@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, @dev={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa]}, [], {@ipv6={0x86dd, {0x0, 0x6, "50a09c", 0x8, 0x0, 0x0, @remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x3a00000000000000], 0xbb}, @local={0xfe, 0x80, [], 0xaa}, {[], @udp={0x0, 0x0, 0x8}}}}}}, &(0x7f0000000040)) 2018/05/15 08:25:14 executing program 4: perf_event_open$cgroup(&(0x7f0000000240)={0x7, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff9, 0x5, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000200)}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 2018/05/15 08:25:14 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f0000000280)="6e65742f6970365f7461626c65735f6d61746368657300b6e23bcf6093cb57f8b4d285e9c48608549acee9a66f09d47a011dcc8f5af7870c6c1b6eebe85ebea4ecda4e44def87e8ee568c843daaf2805944012bc0144937e8b04411d09016ca07f7388ded591e346fb612397e79a6fe43e5c6a86bee1565b17b22b8ed5c95b4afbb3a620d1402c50bbaad790d0ffdb7c5a27e60423079f77bf") unlink(&(0x7f0000000080)='./file0\x00') sendfile(r0, r0, &(0x7f00000000c0)=0x10000000, 0x2) ioctl$KDGKBMETA(r0, 0x4b62, &(0x7f0000000100)) getsockopt$inet_sctp_SCTP_PARTIAL_DELIVERY_POINT(r0, 0x84, 0x13, &(0x7f0000000140)={0x0, 0xfffffffffffffffa}, &(0x7f0000000180)=0x8) syslog(0x2, &(0x7f0000000cc0)=""/107, 0x6b) setsockopt$inet_sctp_SCTP_STREAM_SCHEDULER(r0, 0x84, 0x7b, &(0x7f00000001c0)={r1, 0x40ef2843}, 0x8) setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x40, &(0x7f0000000340)=ANY=[@ANYBLOB="73656375726974790000000000000000000000000000000000000000000000000e00000004000000f8030000fffffffff00000000000000000000000ffffffffffffffff600300006003000060030000ffffffff04000000", @ANYPTR=&(0x7f0000000d40)=ANY=[@ANYBLOB="000000000000000000000000002100ebe70048ca02fec408edfbaf31ba590218fdffffffffffd60000000000000000000000000000000000000000000000000021d13202a6d3d3de0000000000000000000000"], @ANYBLOB="00000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000c800f0000000000000000000000000000000000000000000000000003000616800000000000000000000000000000000000000000000000000000000f9ffffff7f000000010000000000000028005443504d5353000000000000000000000000000000000000000000000000740c0000000000007f000001ac14140dffffff00ffffffff6772653000000000000000000000000069703667726530000000000000000000000000000000000000000000ff0000000000000000000000000000000000000000000000000000000000ff0000000000000000000000000000007f0003010000000000000000000000000000b80018010000000000000000000000000000000000000000000000002000736f636b657400000000000000000000000000000000000000000000000060005345540000000000000000000000000000000000000000000000000000000100000000100000020000000000008e0a000000010400000800000000033f0002000000d4180000ff0700009c0a00001e62000000000000e1020000ff09010000000100ac1414aa000000ffff0000007465616d5f736c6176655f310000000069703667726574617030000000000000000000000000000000000000ff0000000000000000000000000000000000000000000000000000000000ff000000000000000000000000000000670001400000000000000000000000000000280158010000000000000000000000000000000000000000000000004000736574000000000000000000000000000000000000000000000000000000070000000100000008000000090000000000000000000000060000000307050050006f736600000000000000000000000000000000000000000000000000000073797a3100000000000000000000000000000000000000000000000000000000070000000200000002000000000000003000434f4e4e4d41524b00000000000000000000ffffffffffffffe5000000014000000009000000020000000300000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000700098000000000000000000000000000000000000000000280000000000000000000000000000000000000000000000000000000000000800ffffff00000000"], 0x458) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000000)='dctcp\x00', 0x6) 2018/05/15 08:25:14 executing program 5: r0 = syz_open_procfs(0x0, &(0x7f0000000280)='net/ptype\x00') sendfile(r0, r0, &(0x7f0000000000)=0xffffffa, 0x7fffffff) getsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(r0, 0x84, 0xa, &(0x7f0000000040)={0x4, 0x3, 0x1, 0x80, 0x1, 0xd8, 0x1, 0x6, 0x0}, &(0x7f0000000080)=0x20) getsockopt$inet_sctp_SCTP_DEFAULT_PRINFO(r0, 0x84, 0x72, &(0x7f00000000c0)={r1, 0x6, 0x30}, &(0x7f0000000100)=0xc) 2018/05/15 08:25:14 executing program 3: syz_emit_ethernet(0x3e, &(0x7f00000001c0)={@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, @dev={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa]}, [], {@ipv6={0x86dd, {0x0, 0x6, "50a09c", 0x8, 0xffffff87, 0x0, @remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x8], 0xbb}, @local={0xfe, 0x80, [], 0xaa}, {[], @udp={0x0, 0x0, 0x8}}}}}}, &(0x7f0000000040)) 2018/05/15 08:25:14 executing program 4: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_DELAYED_SACK(r0, 0x84, 0x10, &(0x7f0000000140)=@assoc_value, &(0x7f0000000180)=0x8) [ 445.136526] kernel msg: ebtables bug: please report to author: entries_size too small 2018/05/15 08:25:14 executing program 7: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup(r0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000d40)=@broute={'broute\x00', 0x20, 0x4, 0x928, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000400], 0x0, &(0x7f0000000000), &(0x7f0000000400)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x2, [{{{0x5, 0x0, 0x0, 'bcsh0\x00', 'sit0\x00', 'syzkaller1\x00', 'veth0\x00', @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [], @dev={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa]}, [], 0x1d8, 0x228, 0x258, [@comment={'comment\x00', 0x100}, @owner={'owner\x00', 0x18}]}, [@common=@LED={'LED\x00', 0x28, {{'syz0\x00'}}}]}, @common=@redirect={'redirect\x00', 0x8}}, {{{0x0, 0x4, 0x88e7, 'veth1_to_bond\x00', 'erspan0\x00', 'bridge_slave_1\x00', 'veth0_to_bridge\x00', @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [0xff, 0xff, 0x0, 0xff, 0x0, 0xff], @random="cfa071dc33d9", [0xff, 0xff, 0xff, 0xff, 0xff, 0xff], 0x2e0, 0x2e0, 0x330, [@mac={'mac\x00', 0x10, {{@remote={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xbb}, 0x1}}}, @bpf0={'bpf\x00', 0x210, {{0x20, [{0x8000, 0x4902, 0x5, 0x3ff}, {0x5, 0x8, 0x2, 0xff}, {0x1000, 0x48000000000, 0x3}, {0xf7, 0x1f, 0xfffffffffffffe00, 0x1}, {0x10000, 0xfc0, 0x1, 0x6}, {0x4, 0x2, 0xcefa, 0x81}, {0x815, 0xc7, 0x8001, 0x6a0}, {0x40, 0x0, 0x9, 0x80000001}, {0xffffffffffffff53, 0x38a, 0x100000000, 0x7}, {0x5, 0x1, 0x1000, 0x10001}, {0x80000000, 0x7, 0x1, 0xf7}, {0x2, 0x9, 0x4c, 0x5}, {0xfffffffffffffff7, 0x0, 0xe74, 0x52a}, {0x1ff, 0x7, 0x3, 0x7}, {0x6, 0x1ff, 0x49, 0x7}, {0x8000, 0x0, 0x7, 0x684}, {0xffe, 0x988, 0x3, 0x1}, {0x7b, 0x5a07, 0x18, 0x7}, {0xfffffffffffffffe, 0xfff, 0x3, 0x178180a0}, {0x2, 0xc0, 0x6, 0x401}, {0x5, 0x3, 0x8, 0x8}, {0xffffffffffff0001, 0x3, 0xfffffffffffffff7, 0x5}, {0x1ff, 0x8001, 0x3}, {0x3, 0x9, 0xffffffff, 0x2}, {0x5, 0x4, 0x574, 0x64c}, {0x5, 0x4, 0x10001, 0x6}, {0x1, 0x5b2c, 0x3ff, 0x7}, {0xff, 0x2, 0x5, 0x62c5fc18}, {0x101, 0x7, 0x2, 0xfffffffffffffffd}, {0x7fff, 0x6, 0x8, 0x4}, {0x9, 0x0, 0x7, 0xff}, {0x4, 0x4, 0x4, 0x10000}, {0x59b0, 0xfff, 0x4, 0x4}, {0x1f, 0xfffffffffffffffd, 0x8001, 0x800}, {0x0, 0xffffffffffffffff, 0x2, 0x65}, {0x1ff, 0x1, 0x2, 0x7ff}, {0x4, 0x5, 0x1, 0x7be}, {0x9e4, 0x0, 0x7, 0x5}, {0x5, 0x8, 0x7f, 0xffffffff}, {0x4, 0x6, 0x5, 0x7ff}, {0x22aaaf52, 0x8f, 0x6, 0x10000}, {0x2, 0x7, 0xffff}, {0x5, 0xfffffffff016eb50, 0x82, 0x7}, {0x38, 0x800, 0x9a2a, 0xfffffffffffffffc}, {0x5, 0xb, 0x4, 0xfffffffffffff001}, {0x8b5, 0x81, 0x4, 0x2}, {0x8, 0xfffffffffffffff8, 0x1, 0x8}, {0x40, 0x4, 0x1, 0x100000001}, {0x9b, 0x5, 0x1, 0xd64c}, {0x100, 0x8, 0x7, 0x3ff}, {0xf11, 0x200, 0x7, 0x2}, {0xac5, 0x0, 0x3, 0x7}, {0x518, 0x1, 0x80}, {0x6, 0x7f, 0x6, 0x7298}, {0x7, 0x1, 0x2, 0x1ec9}, {0x400, 0x2, 0x6, 0x6c3}, {0x100000001, 0x6, 0x5, 0x9}, {0x8, 0x1dae, 0xfffffffffffffff8, 0x101}, {0x2, 0x7, 0x8, 0x3}, {0x0, 0x45b, 0x7, 0x72}, {0x100000001, 0xc00000000000, 0x100000001, 0x8}, {0x100000001, 0x0, 0xfffffffffffffffc, 0x3}, {0x95, 0x90b, 0x0, 0xfffffffffffff565}, {0x0, 0x4, 0x0, 0x2}], 0x40}}}]}}, @common=@IDLETIMER={'IDLETIMER\x00', 0x28, {{0x7f, 'syz0\x00'}}}}]}, {0x0, '\x00', 0x2, 0xfffffffffffffffc}, {0x0, '\x00', 0x2, 0xffffffffffffffff, 0x2, [{{{0x11, 0x40, 0x87df, 'irlan0\x00', 'sit0\x00', 'veth0_to_team\x00', 'ip6gretap0\x00', @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [0xff, 0xff, 0xff, 0xff, 0x0, 0xff], @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [0x0, 0xff, 0x0, 0xff], 0xb0, 0x210, 0x258, [@time={'time\x00', 0x18, {{0x1ff, 0x1, 0xe063, 0xb6c5, 0x2e80, 0x0, 0x2}}}]}, [@common=@redirect={'redirect\x00', 0x8, {{0xffffffffffffffff}}}, @common=@SECMARK={'SECMARK\x00', 0x108, {{0x1, 0x6, 'system_u:object_r:lost_found_t:s0\x00'}}}]}, @common=@ERROR={'ERROR\x00', 0x20, {"4323eed968d7072e70de82f41331fe3aed2aedc8f2fff16e54b1c4e2ad07"}}}, {{{0x5, 0x54, 0x888d, 'ip6gretap0\x00', 'teql0\x00', 'veth1_to_team\x00', 'erspan0\x00', @random="0eae55d5aac5", [0x0, 0xff, 0x0, 0xff, 0xff, 0xff], @empty, [0xff, 0xff, 0xff, 0x0, 0xff, 0xff], 0x70, 0x70, 0xb8}}, @common=@RATEEST={'RATEEST\x00', 0x20, {{'syz0\x00', 0x9, 0x1, 0x4}}}}]}]}, 0x9a0) 2018/05/15 08:25:14 executing program 0: r0 = syz_open_procfs(0x0, &(0x7f0000000280)='net/ptype\x00') sendfile(0xffffffffffffffff, r0, &(0x7f0000000000)=0xdc, 0x7fffffff) 2018/05/15 08:25:14 executing program 5: r0 = syz_open_procfs(0x0, &(0x7f0000000280)='net/ptype\x00') timer_create(0x5, &(0x7f00000001c0)={0x0, 0x37, 0x4, @thr={&(0x7f0000000040)="35c8db55910d93fec74b0c754188d9e3befdf879eb6b0b83192e18def2c7427039baad88af94a4b3e891b1bf3116a15b71acbce918d3c868eeca886ece4790c373fdbd5133751c8696007c81aa47715ba5bce5bf3e7747a02914ca2e22f7e77edce46c9a68f89f0146a18c92180c955a278bfd53d3fa0d42f93d90cd7fac65b2cf85eade4ebc30b4893137d5526381a037b5ece46a36ac084066af5b63b465789f3c8f4f9190184472ab70c171", &(0x7f0000000100)="52242bb971ae7c529a8126fee880404175b541b8c10453305269d0873fde966a6e09c1e81f6da3a3e88777036d066064e72c2c9b7d1c0f16cb9e8d2febf5a7bb2cd07287d0f164791c3e2bc8e99f59b06e48ca2e9e33b5eb9401c87c2bedf4e2590497bab8e73f246de46816d9856637afed0fd0be63e04b4bbdcaf783238b54421da3166895961ee97ef01f5764afaa4b322af0be0e143bb410d63599f5fab8981a905e02"}}, &(0x7f0000000200)=0x0) timer_getoverrun(r1) sendfile(r0, r0, &(0x7f0000000000)=0xffffffd, 0x7fffffff) timerfd_create(0x0, 0x80800) 2018/05/15 08:25:14 executing program 2: syz_emit_ethernet(0x3e, &(0x7f00000001c0)={@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, @dev={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa]}, [], {@ipv6={0x86dd, {0x0, 0x6, "50a09c", 0x8, 0x0, 0x0, @remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x3000], 0xbb}, @local={0xfe, 0x80, [], 0xaa}, {[], @udp={0x0, 0x0, 0x8}}}}}}, &(0x7f0000000040)) [ 445.239729] sctp: [Deprecated]: syz-executor4 (pid 15221) Use of struct sctp_assoc_value in delayed_ack socket option. [ 445.239729] Use struct sctp_sack_info instead 2018/05/15 08:25:14 executing program 6: perf_event_open$cgroup(&(0x7f0000000240)={0x7, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff9, 0x5, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000200)}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 2018/05/15 08:25:14 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f0000000280)="6e65742f6970365f7461626c65735f6d61746368657300b6e23bcf6093cb57f8b4d285e9c48608549acee9a66f09d47a011dcc8f5af7870c6c1b6eebe85ebea4ecda4e44def87e8ee568c843daaf2805944012bc0144937e8b04411d09016ca07f7388ded591e346fb612397e79a6fe43e5c6a86bee1565b17b22b8ed5c95b4afbb3a620d1402c50bbaad790d0ffdb7c5a27e60423079f77bf") unlink(&(0x7f0000000080)='./file0\x00') sendfile(r0, r0, &(0x7f00000000c0)=0x10000000, 0x2) ioctl$KDGKBMETA(r0, 0x4b62, &(0x7f0000000100)) syslog(0x2, &(0x7f0000000cc0)=""/107, 0x6b) setsockopt$IP_VS_SO_SET_DEL(r0, 0x0, 0x484, &(0x7f0000000200)={0x87, @dev={0xac, 0x14, 0x14, 0x1a}, 0x4e24, 0x2, 'rr\x00', 0x3, 0x2, 0x66}, 0x2c) setsockopt$inet_sctp_SCTP_STREAM_SCHEDULER(r0, 0x84, 0x7b, &(0x7f00000001c0)={0x0, 0x40ef2843}, 0x8) setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x40, &(0x7f0000000340)=ANY=[@ANYBLOB="73656375726974790000000000000000000000000000000000000000000000000e00000004000000f8030000fffffffff00000000000000000000000ffffffffffffffff600300006003000060030000ffffffff04000000", @ANYPTR=&(0x7f0000000d40)=ANY=[@ANYBLOB="000000000000000000000000002100ebe70048ca02fec408edfbaf31ba590218fdffffffffffd60000000000000000000000000000000000000000000000000021d13202a6d3d3de0000000000000000000000"], @ANYBLOB="00000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000c800f0000000000000000000000000000000000000000000000000003000616800000000000000000000000000000000000000000000000000000000f9ffffff7f000000010000000000000028005443504d5353000000000000000000000000000000000000000000000000740c0000000000007f000001ac14140dffffff00ffffffff6772653000000000000000000000000069703667726530000000000000000000000000000000000000000000ff0000000000000000000000000000000000000000000000000000000000ff0000000000000000000000000000007f0003010000000000000000000000000000b80018010000000000000000000000000000000000000000000000002000736f636b657400000000000000000000000000000000000000000000000060005345540000000000000000000000000000000000000000000000000000000100000000100000020000000000008e0a000000010400000800000000033f0002000000d4180000ff0700009c0a00001e62000000000000e1020000ff09010000000100ac1414aa000000ffff0000007465616d5f736c6176655f310000000069703667726574617030000000000000000000000000000000000000ff0000000000000000000000000000000000000000000000000000000000ff000000000000000000000000000000670001400000000000000000000000000000280158010000000000000000000000000000000000000000000000004000736574000000000000000000000000000000000000000000000000000000070000000100000008000000090000000000000000000000060000000307050050006f736600000000000000000000000000000000000000000000000000000073797a3100000000000000000000000000000000000000000000000000000000070000000200000002000000000000003000434f4e4e4d41524b00000000000000000000ffffffffffffffe5000000014000000009000000020000000300000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000700098000000000000000000000000000000000000000000280000000000000000000000000000000000000000000000000000000000000800ffffff00000000"], 0x458) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000000)='dctcp\x00', 0x6) [ 445.283924] kernel msg: ebtables bug: please report to author: entries_size too small 2018/05/15 08:25:14 executing program 2: syz_emit_ethernet(0x3e, &(0x7f00000001c0)={@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, @dev={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa]}, [], {@ipv6={0x86dd, {0x0, 0x6, "50a09c", 0x8, 0x0, 0x0, @remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x3000000000000000], 0xbb}, @local={0xfe, 0x80, [], 0xaa}, {[], @udp={0x0, 0x0, 0x8}}}}}}, &(0x7f0000000040)) 2018/05/15 08:25:14 executing program 0: r0 = syz_open_procfs(0x0, &(0x7f0000000280)='net/ptype\x00') sendfile(0xffffffffffffffff, r0, &(0x7f0000000000)=0xdc, 0x7fffffff) 2018/05/15 08:25:15 executing program 3: syz_emit_ethernet(0x3e, &(0x7f00000001c0)={@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, @dev={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa]}, [], {@ipv6={0x86dd, {0x0, 0x6, "50a09c", 0x8, 0xffffff87, 0x0, @remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x800e], 0xbb}, @local={0xfe, 0x80, [], 0xaa}, {[], @udp={0x0, 0x0, 0x8}}}}}}, &(0x7f0000000040)) 2018/05/15 08:25:15 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f0000000280)="6e65742f6970365f7461626c65735f6d61746368657300b6e23bcf6093cb57f8b4d285e9c48608549acee9a66f09d47a011dcc8f5af7870c6c1b6eebe85ebea4ecda4e44def87e8ee568c843daaf2805944012bc0144937e8b04411d09016ca07f7388ded591e346fb612397e79a6fe43e5c6a86bee1565b17b22b8ed5c95b4afbb3a620d1402c50bbaad790d0ffdb7c5a27e60423079f77bf") unlink(&(0x7f0000000080)='./file0\x00') sendfile(r0, r0, &(0x7f00000000c0)=0x10000000, 0x2) ioctl$KDGKBMETA(r0, 0x4b62, &(0x7f0000000100)) syslog(0x2, &(0x7f0000000cc0)=""/107, 0x6b) setsockopt$IP_VS_SO_SET_DEL(r0, 0x0, 0x484, &(0x7f0000000200)={0x87, @dev={0xac, 0x14, 0x14, 0x1a}, 0x4e24, 0x2, 'rr\x00', 0x3, 0x2, 0x66}, 0x2c) setsockopt$inet_sctp_SCTP_STREAM_SCHEDULER(r0, 0x84, 0x7b, &(0x7f00000001c0)={0x0, 0x40ef2843}, 0x8) setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x40, &(0x7f0000000340)=ANY=[@ANYBLOB="73656375726974790000000000000000000000000000000000000000000000000e00000004000000f8030000fffffffff00000000000000000000000ffffffffffffffff600300006003000060030000ffffffff04000000", @ANYPTR=&(0x7f0000000d40)=ANY=[@ANYBLOB="000000000000000000000000002100ebe70048ca02fec408edfbaf31ba590218fdffffffffffd60000000000000000000000000000000000000000000000000021d13202a6d3d3de0000000000000000000000"], @ANYBLOB="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"], 0x458) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000000)='dctcp\x00', 0x6) 2018/05/15 08:25:15 executing program 6: r0 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000580)='/proc/sys/net/ipv4/vs/sync_qlen_max\x00', 0x2, 0x0) lseek(r0, 0x0, 0x2) 2018/05/15 08:25:15 executing program 5: r0 = syz_open_procfs(0x0, &(0x7f0000000280)='net/ptype\x00') ioctl$GIO_FONTX(r0, 0x4b6b, &(0x7f00000002c0)=""/191) socketpair$ipx(0x4, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) fcntl$getown(r1, 0x9) sendfile(r0, r0, &(0x7f0000000000)=0xffffffd, 0x7fffffff) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000180)="2f702f6e65742f697076342f76732f63616368655f62797061737300000000000000000c97f1d6d1875f2d0f352d7b35d56b5a3168e9d44462db7d1080b1b6093faa2c3df6d024cc7c506ad62559c81bee78e7e1a38bc271113dc3b9e8b8da7cf48f8e93efe29fe50ad3599f72", 0x2, 0x0) 2018/05/15 08:25:15 executing program 0: r0 = syz_open_procfs(0x0, &(0x7f0000000280)='net/ptype\x00') sendfile(0xffffffffffffffff, r0, &(0x7f0000000000)=0xdc, 0x7fffffff) 2018/05/15 08:25:15 executing program 7: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup(r0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000d40)=@broute={'broute\x00', 0x20, 0x4, 0x928, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000400], 0x0, &(0x7f0000000000), &(0x7f0000000400)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x2, [{{{0x5, 0x0, 0x0, 'bcsh0\x00', 'sit0\x00', 'syzkaller1\x00', 'veth0\x00', @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [], @dev={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa]}, [], 0x1d8, 0x228, 0x258, [@comment={'comment\x00', 0x100}, @owner={'owner\x00', 0x18}]}, [@common=@LED={'LED\x00', 0x28, {{'syz0\x00'}}}]}, @common=@redirect={'redirect\x00', 0x8}}, {{{0x11, 0x0, 0x88e7, 'veth1_to_bond\x00', 'erspan0\x00', 'bridge_slave_1\x00', 'veth0_to_bridge\x00', @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [0xff, 0xff, 0x0, 0xff, 0x0, 0xff], @random="cfa071dc33d9", [0xff, 0xff, 0xff, 0xff, 0xff, 0xff], 0x2e0, 0x2e0, 0x330, [@mac={'mac\x00', 0x10, {{@remote={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xbb}, 0x1}}}, @bpf0={'bpf\x00', 0x210, {{0x20, [{0x8000, 0x4902, 0x5, 0x3ff}, {0x5, 0x8, 0x2, 0xff}, {0x1000, 0x48000000000, 0x3}, {0xf7, 0x1f, 0xfffffffffffffe00, 0x1}, {0x10000, 0xfc0, 0x1, 0x6}, {0x4, 0x2, 0xcefa, 0x81}, {0x815, 0xc7, 0x8001, 0x6a0}, {0x40, 0x0, 0x9, 0x80000001}, {0xffffffffffffff53, 0x38a, 0x100000000, 0x7}, {0x5, 0x1, 0x1000, 0x10001}, {0x80000000, 0x7, 0x1, 0xf7}, {0x2, 0x9, 0x4c, 0x5}, {0xfffffffffffffff7, 0x0, 0xe74, 0x52a}, {0x1ff, 0x7, 0x3, 0x7}, {0x6, 0x1ff, 0x49, 0x7}, {0x8000, 0x0, 0x7, 0x684}, {0xffe, 0x988, 0x3, 0x1}, {0x7b, 0x5a07, 0x18, 0x7}, {0xfffffffffffffffe, 0xfff, 0x3, 0x178180a0}, {0x2, 0xc0, 0x6, 0x401}, {0x5, 0x3, 0x8, 0x8}, {0xffffffffffff0001, 0x3, 0xfffffffffffffff7, 0x5}, {0x1ff, 0x8001, 0x3}, {0x3, 0x9, 0xffffffff, 0x2}, {0x5, 0x4, 0x574, 0x64c}, {0x5, 0x4, 0x10001, 0x6}, {0x1, 0x5b2c, 0x3ff, 0x7}, {0xff, 0x2, 0x5, 0x62c5fc18}, {0x101, 0x7, 0x2, 0xfffffffffffffffd}, {0x7fff, 0x6, 0x8, 0x4}, {0x9, 0x0, 0x7, 0xff}, {0x4, 0x4, 0x4, 0x10000}, {0x59b0, 0xfff, 0x4, 0x4}, {0x1f, 0xfffffffffffffffd, 0x8001, 0x800}, {0x0, 0xffffffffffffffff, 0x2, 0x65}, {0x1ff, 0x1, 0x2, 0x7ff}, {0x4, 0x5, 0x1, 0x7be}, {0x9e4, 0x0, 0x7, 0x5}, {0x5, 0x8, 0x7f, 0xffffffff}, {0x4, 0x6, 0x5, 0x7ff}, {0x22aaaf52, 0x8f, 0x6, 0x10000}, {0x2, 0x7, 0xffff}, {0x5, 0xfffffffff016eb50, 0x82, 0x7}, {0x38, 0x800, 0x9a2a, 0xfffffffffffffffc}, {0x5, 0xb, 0x4, 0xfffffffffffff001}, {0x8b5, 0x81, 0x4, 0x2}, {0x8, 0xfffffffffffffff8, 0x1, 0x8}, {0x40, 0x4, 0x1, 0x100000001}, {0x9b, 0x5, 0x1, 0xd64c}, {0x100, 0x8, 0x7, 0x3ff}, {0xf11, 0x200, 0x7, 0x2}, {0xac5, 0x0, 0x3, 0x7}, {0x518, 0x1, 0x80}, {0x6, 0x7f, 0x6, 0x7298}, {0x7, 0x1, 0x2, 0x1ec9}, {0x400, 0x2, 0x6, 0x6c3}, {0x100000001, 0x6, 0x5, 0x9}, {0x8, 0x1dae, 0xfffffffffffffff8, 0x101}, {0x2, 0x7, 0x8, 0x3}, {0x0, 0x45b, 0x7, 0x72}, {0x100000001, 0xc00000000000, 0x100000001, 0x8}, {0x100000001, 0x0, 0xfffffffffffffffc, 0x3}, {0x95, 0x90b, 0x0, 0xfffffffffffff565}, {0x0, 0x4, 0x0, 0x2}], 0x40}}}]}}, @common=@IDLETIMER={'IDLETIMER\x00', 0x28, {{0x7f, 'syz0\x00'}}}}]}, {0x0, '\x00', 0x2, 0xfffffffffffffffc}, {0x0, '\x00', 0x2, 0xffffffffffffffff, 0x2, [{{{0x11, 0x40, 0x87df, 'irlan0\x00', 'sit0\x00', 'veth0_to_team\x00', 'ip6gretap0\x00', @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [0xff, 0xff, 0xff, 0xff, 0x0, 0xff], @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [0x0, 0xff, 0x0, 0xff], 0xb0, 0x210, 0x258, [@time={'time\x00', 0x18, {{0x1ff, 0x1, 0xe063, 0xb6c5, 0x2e80, 0x0, 0x2}}}]}, [@common=@redirect={'redirect\x00', 0x8, {{0xffffffffffffffff}}}, @common=@SECMARK={'SECMARK\x00', 0x108, {{0x1, 0x6, 'system_u:object_r:lost_found_t:s0\x00'}}}]}, @common=@ERROR={'ERROR\x00', 0x20, {"4323eed968d7072e70de82f41331fe3aed2aedc8f2fff16e54b1c4e2ad07"}}}, {{{0x5, 0x54, 0x888d, 'ip6gretap0\x00', 'teql0\x00', 'veth1_to_team\x00', 'erspan0\x00', @random="0eae55d5aac5", [0x0, 0xff, 0x0, 0xff, 0xff, 0xff], @empty, [0xff, 0xff, 0xff, 0x0, 0xff, 0xff], 0x70, 0x70, 0xb8}}, @common=@RATEEST={'RATEEST\x00', 0x20, {{'syz0\x00', 0x9, 0x1, 0x4}}}}]}]}, 0x9a0) 2018/05/15 08:25:15 executing program 2: syz_emit_ethernet(0x3e, &(0x7f00000001c0)={@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, @dev={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa]}, [], {@ipv6={0x86dd, {0x0, 0x6, "50a09c", 0x8, 0x0, 0x0, @remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x88caffff00000000], 0xbb}, @local={0xfe, 0x80, [], 0xaa}, {[], @udp={0x0, 0x0, 0x8}}}}}}, &(0x7f0000000040)) 2018/05/15 08:25:15 executing program 4: r0 = syz_open_dev$evdev(&(0x7f00000009c0)='/dev/input/event#\x00', 0xfffffffffffffffc, 0x5) write$binfmt_elf64(r0, &(0x7f0000000000)=ANY=[@ANYBLOB="7f454c46000000000000000000000000110000e5ffd00509"], 0x18) 2018/05/15 08:25:15 executing program 3: syz_emit_ethernet(0x3e, &(0x7f00000001c0)={@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, @dev={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa]}, [], {@ipv6={0x86dd, {0x0, 0x6, "50a09c", 0x8, 0xffffff87, 0x0, @remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x800e0000], 0xbb}, @local={0xfe, 0x80, [], 0xaa}, {[], @udp={0x0, 0x0, 0x8}}}}}}, &(0x7f0000000040)) 2018/05/15 08:25:15 executing program 0: r0 = syz_open_procfs(0x0, &(0x7f0000000280)='net/ptype\x00') sendfile(r0, 0xffffffffffffffff, &(0x7f0000000000)=0xdc, 0x7fffffff) 2018/05/15 08:25:15 executing program 6: mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='./file0\x00', &(0x7f0000000280)="7379736673002a864f4bc00bce1bdb20637213b1e894d120715f9dc1125b042c7226eb0136d9624ea1d23374a660fe5ac173722fd367ad22e8553025a2e8be0bc5514379af7213d32b8d5d06dc8fbf2c849ed9cdefc74b03dfa9cb5a90b28b4b24d7862c3d66fca53167d5424235435a3dbb76bc7d3c42fc2e9c696114a6f888f0da85277683cfc1c4d2bf71c255a3134d64cc3fed8e97798deb8631cbf7682c9fa2ed031465aa191df922f764297cba22a8499d177f49fba940f55bbc8b723fd374f1fed78c8aeec6811d9b5879487387d56594a14c2588274de84fa27610302b3fb54172a8c910a07e7c76ea465aa68402", 0x0, &(0x7f0000000080)) 2018/05/15 08:25:16 executing program 2: syz_emit_ethernet(0x3e, &(0x7f00000001c0)={@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, @dev={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa]}, [], {@ipv6={0x86dd, {0x0, 0x6, "50a09c", 0x8, 0x0, 0x0, @remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x88480000], 0xbb}, @local={0xfe, 0x80, [], 0xaa}, {[], @udp={0x0, 0x0, 0x8}}}}}}, &(0x7f0000000040)) 2018/05/15 08:25:16 executing program 4: r0 = syz_open_dev$evdev(&(0x7f00000009c0)='/dev/input/event#\x00', 0xfffffffffffffffc, 0x5) write$binfmt_elf64(r0, &(0x7f0000000000)=ANY=[@ANYBLOB="7f454c46000000000000000000000000110000e5ffd00509"], 0x18) 2018/05/15 08:25:16 executing program 5: r0 = syz_open_procfs(0x0, &(0x7f0000000280)='net/ptype\x00') getsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX3(r0, 0x84, 0x6f, &(0x7f0000000080)={0x0, 0x10, &(0x7f0000000180)=[@in={0x2, 0x4e20, @broadcast=0xffffffff}]}, &(0x7f00000000c0)=0x10) getsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(r0, 0x84, 0xa, &(0x7f0000000100)={0x9e, 0x8, 0x8, 0x1, 0x8, 0x4, 0x1000, 0x2, r1}, &(0x7f0000000140)=0x20) sendfile(r0, r0, &(0x7f0000000000)=0xffffffd, 0x7fffffff) 2018/05/15 08:25:16 executing program 7: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup(r0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000d40)=@broute={'broute\x00', 0x20, 0x4, 0x928, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000400], 0x0, &(0x7f0000000000), &(0x7f0000000400)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x2, [{{{0x5, 0x0, 0x0, 'bcsh0\x00', 'sit0\x00', 'syzkaller1\x00', 'veth0\x00', @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [], @dev={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa]}, [], 0x1d8, 0x228, 0x258, [@comment={'comment\x00', 0x100}, @owner={'owner\x00', 0x18}]}, [@common=@LED={'LED\x00', 0x28, {{'syz0\x00'}}}]}, @common=@redirect={'redirect\x00', 0x8}}, {{{0x11, 0x0, 0x0, 'veth1_to_bond\x00', 'erspan0\x00', 'bridge_slave_1\x00', 'veth0_to_bridge\x00', @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [0xff, 0xff, 0x0, 0xff, 0x0, 0xff], @random="cfa071dc33d9", [0xff, 0xff, 0xff, 0xff, 0xff, 0xff], 0x2e0, 0x2e0, 0x330, [@mac={'mac\x00', 0x10, {{@remote={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xbb}, 0x1}}}, @bpf0={'bpf\x00', 0x210, {{0x20, [{0x8000, 0x4902, 0x5, 0x3ff}, {0x5, 0x8, 0x2, 0xff}, {0x1000, 0x48000000000, 0x3}, {0xf7, 0x1f, 0xfffffffffffffe00, 0x1}, {0x10000, 0xfc0, 0x1, 0x6}, {0x4, 0x2, 0xcefa, 0x81}, {0x815, 0xc7, 0x8001, 0x6a0}, {0x40, 0x0, 0x9, 0x80000001}, {0xffffffffffffff53, 0x38a, 0x100000000, 0x7}, {0x5, 0x1, 0x1000, 0x10001}, {0x80000000, 0x7, 0x1, 0xf7}, {0x2, 0x9, 0x4c, 0x5}, {0xfffffffffffffff7, 0x0, 0xe74, 0x52a}, {0x1ff, 0x7, 0x3, 0x7}, {0x6, 0x1ff, 0x49, 0x7}, {0x8000, 0x0, 0x7, 0x684}, {0xffe, 0x988, 0x3, 0x1}, {0x7b, 0x5a07, 0x18, 0x7}, {0xfffffffffffffffe, 0xfff, 0x3, 0x178180a0}, {0x2, 0xc0, 0x6, 0x401}, {0x5, 0x3, 0x8, 0x8}, {0xffffffffffff0001, 0x3, 0xfffffffffffffff7, 0x5}, {0x1ff, 0x8001, 0x3}, {0x3, 0x9, 0xffffffff, 0x2}, {0x5, 0x4, 0x574, 0x64c}, {0x5, 0x4, 0x10001, 0x6}, {0x1, 0x5b2c, 0x3ff, 0x7}, {0xff, 0x2, 0x5, 0x62c5fc18}, {0x101, 0x7, 0x2, 0xfffffffffffffffd}, {0x7fff, 0x6, 0x8, 0x4}, {0x9, 0x0, 0x7, 0xff}, {0x4, 0x4, 0x4, 0x10000}, {0x59b0, 0xfff, 0x4, 0x4}, {0x1f, 0xfffffffffffffffd, 0x8001, 0x800}, {0x0, 0xffffffffffffffff, 0x2, 0x65}, {0x1ff, 0x1, 0x2, 0x7ff}, {0x4, 0x5, 0x1, 0x7be}, {0x9e4, 0x0, 0x7, 0x5}, {0x5, 0x8, 0x7f, 0xffffffff}, {0x4, 0x6, 0x5, 0x7ff}, {0x22aaaf52, 0x8f, 0x6, 0x10000}, {0x2, 0x7, 0xffff}, {0x5, 0xfffffffff016eb50, 0x82, 0x7}, {0x38, 0x800, 0x9a2a, 0xfffffffffffffffc}, {0x5, 0xb, 0x4, 0xfffffffffffff001}, {0x8b5, 0x81, 0x4, 0x2}, {0x8, 0xfffffffffffffff8, 0x1, 0x8}, {0x40, 0x4, 0x1, 0x100000001}, {0x9b, 0x5, 0x1, 0xd64c}, {0x100, 0x8, 0x7, 0x3ff}, {0xf11, 0x200, 0x7, 0x2}, {0xac5, 0x0, 0x3, 0x7}, {0x518, 0x1, 0x80}, {0x6, 0x7f, 0x6, 0x7298}, {0x7, 0x1, 0x2, 0x1ec9}, {0x400, 0x2, 0x6, 0x6c3}, {0x100000001, 0x6, 0x5, 0x9}, {0x8, 0x1dae, 0xfffffffffffffff8, 0x101}, {0x2, 0x7, 0x8, 0x3}, {0x0, 0x45b, 0x7, 0x72}, {0x100000001, 0xc00000000000, 0x100000001, 0x8}, {0x100000001, 0x0, 0xfffffffffffffffc, 0x3}, {0x95, 0x90b, 0x0, 0xfffffffffffff565}, {0x0, 0x4, 0x0, 0x2}], 0x40}}}]}}, @common=@IDLETIMER={'IDLETIMER\x00', 0x28, {{0x7f, 'syz0\x00'}}}}]}, {0x0, '\x00', 0x2, 0xfffffffffffffffc}, {0x0, '\x00', 0x2, 0xffffffffffffffff, 0x2, [{{{0x11, 0x40, 0x87df, 'irlan0\x00', 'sit0\x00', 'veth0_to_team\x00', 'ip6gretap0\x00', @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [0xff, 0xff, 0xff, 0xff, 0x0, 0xff], @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [0x0, 0xff, 0x0, 0xff], 0xb0, 0x210, 0x258, [@time={'time\x00', 0x18, {{0x1ff, 0x1, 0xe063, 0xb6c5, 0x2e80, 0x0, 0x2}}}]}, [@common=@redirect={'redirect\x00', 0x8, {{0xffffffffffffffff}}}, @common=@SECMARK={'SECMARK\x00', 0x108, {{0x1, 0x6, 'system_u:object_r:lost_found_t:s0\x00'}}}]}, @common=@ERROR={'ERROR\x00', 0x20, {"4323eed968d7072e70de82f41331fe3aed2aedc8f2fff16e54b1c4e2ad07"}}}, {{{0x5, 0x54, 0x888d, 'ip6gretap0\x00', 'teql0\x00', 'veth1_to_team\x00', 'erspan0\x00', @random="0eae55d5aac5", [0x0, 0xff, 0x0, 0xff, 0xff, 0xff], @empty, [0xff, 0xff, 0xff, 0x0, 0xff, 0xff], 0x70, 0x70, 0xb8}}, @common=@RATEEST={'RATEEST\x00', 0x20, {{'syz0\x00', 0x9, 0x1, 0x4}}}}]}]}, 0x9a0) 2018/05/15 08:25:16 executing program 0: r0 = syz_open_procfs(0x0, &(0x7f0000000280)='net/ptype\x00') sendfile(r0, 0xffffffffffffffff, &(0x7f0000000000)=0xdc, 0x7fffffff) 2018/05/15 08:25:16 executing program 3: syz_emit_ethernet(0x3e, &(0x7f00000001c0)={@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, @dev={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa]}, [], {@ipv6={0x86dd, {0x0, 0x6, "50a09c", 0x8, 0xffffff87, 0x0, @remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0xfffffff5], 0xbb}, @local={0xfe, 0x80, [], 0xaa}, {[], @udp={0x0, 0x0, 0x8}}}}}}, &(0x7f0000000040)) 2018/05/15 08:25:16 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f0000000280)="6e65742f6970365f7461626c65735f6d61746368657300b6e23bcf6093cb57f8b4d285e9c48608549acee9a66f09d47a011dcc8f5af7870c6c1b6eebe85ebea4ecda4e44def87e8ee568c843daaf2805944012bc0144937e8b04411d09016ca07f7388ded591e346fb612397e79a6fe43e5c6a86bee1565b17b22b8ed5c95b4afbb3a620d1402c50bbaad790d0ffdb7c5a27e60423079f77bf") unlink(&(0x7f0000000080)='./file0\x00') sendfile(r0, r0, &(0x7f00000000c0)=0x10000000, 0x2) ioctl$KDGKBMETA(r0, 0x4b62, &(0x7f0000000100)) syslog(0x2, &(0x7f0000000cc0)=""/107, 0x6b) setsockopt$IP_VS_SO_SET_DEL(r0, 0x0, 0x484, &(0x7f0000000200)={0x87, @dev={0xac, 0x14, 0x14, 0x1a}, 0x4e24, 0x2, 'rr\x00', 0x3, 0x2, 0x66}, 0x2c) setsockopt$inet_sctp_SCTP_STREAM_SCHEDULER(r0, 0x84, 0x7b, &(0x7f00000001c0)={0x0, 0x40ef2843}, 0x8) setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x40, &(0x7f0000000340)=ANY=[@ANYBLOB="73656375726974790000000000000000000000000000000000000000000000000e00000004000000f8030000fffffffff00000000000000000000000ffffffffffffffff600300006003000060030000ffffffff04000000", @ANYPTR=&(0x7f0000000d40)=ANY=[@ANYBLOB="000000000000000000000000002100ebe70048ca02fec408edfbaf31ba590218fdffffffffffd60000000000000000000000000000000000000000000000000021d13202a6d3d3de0000000000000000000000"], @ANYBLOB="00000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000c800f0000000000000000000000000000000000000000000000000003000616800000000000000000000000000000000000000000000000000000000f9ffffff7f000000010000000000000028005443504d5353000000000000000000000000000000000000000000000000740c0000000000007f000001ac14140dffffff00ffffffff6772653000000000000000000000000069703667726530000000000000000000000000000000000000000000ff0000000000000000000000000000000000000000000000000000000000ff0000000000000000000000000000007f0003010000000000000000000000000000b80018010000000000000000000000000000000000000000000000002000736f636b657400000000000000000000000000000000000000000000000060005345540000000000000000000000000000000000000000000000000000000100000000100000020000000000008e0a000000010400000800000000033f0002000000d4180000ff0700009c0a00001e62000000000000e1020000ff09010000000100ac1414aa000000ffff0000007465616d5f736c6176655f310000000069703667726574617030000000000000000000000000000000000000ff0000000000000000000000000000000000000000000000000000000000ff000000000000000000000000000000670001400000000000000000000000000000280158010000000000000000000000000000000000000000000000004000736574000000000000000000000000000000000000000000000000000000070000000100000008000000090000000000000000000000060000000307050050006f736600000000000000000000000000000000000000000000000000000073797a3100000000000000000000000000000000000000000000000000000000070000000200000002000000000000003000434f4e4e4d41524b00000000000000000000ffffffffffffffe5000000014000000009000000020000000300000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000700098000000000000000000000000000000000000000000280000000000000000000000000000000000000000000000000000000000000800ffffff00000000"], 0x458) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000000)='dctcp\x00', 0x6) 2018/05/15 08:25:16 executing program 6: mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='./file0\x00', &(0x7f0000000280)="7379736673002a864f4bc00bce1bdb20637213b1e894d120715f9dc1125b042c7226eb0136d9624ea1d23374a660fe5ac173722fd367ad22e8553025a2e8be0bc5514379af7213d32b8d5d06dc8fbf2c849ed9cdefc74b03dfa9cb5a90b28b4b24d7862c3d66fca53167d5424235435a3dbb76bc7d3c42fc2e9c696114a6f888f0da85277683cfc1c4d2bf71c255a3134d64cc3fed8e97798deb8631cbf7682c9fa2ed031465aa191df922f764297cba22a8499d177f49fba940f55bbc8b723fd374f1fed78c8aeec6811d9b5879487387d56594a14c2588274de84fa27610302b3fb54172a8c910a07e7c76ea465aa68402", 0x0, &(0x7f0000000080)) 2018/05/15 08:25:16 executing program 6: mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='./file0\x00', &(0x7f0000000280)="7379736673002a864f4bc00bce1bdb20637213b1e894d120715f9dc1125b042c7226eb0136d9624ea1d23374a660fe5ac173722fd367ad22e8553025a2e8be0bc5514379af7213d32b8d5d06dc8fbf2c849ed9cdefc74b03dfa9cb5a90b28b4b24d7862c3d66fca53167d5424235435a3dbb76bc7d3c42fc2e9c696114a6f888f0da85277683cfc1c4d2bf71c255a3134d64cc3fed8e97798deb8631cbf7682c9fa2ed031465aa191df922f764297cba22a8499d177f49fba940f55bbc8b723fd374f1fed78c8aeec6811d9b5879487387d56594a14c2588274de84fa27610302b3fb54172a8c910a07e7c76ea465aa68402", 0x0, &(0x7f0000000080)) 2018/05/15 08:25:16 executing program 4: r0 = syz_open_dev$evdev(&(0x7f00000009c0)='/dev/input/event#\x00', 0xfffffffffffffffc, 0x5) write$binfmt_elf64(r0, &(0x7f0000000000)=ANY=[@ANYBLOB="7f454c46000000000000000000000000110000e5ffd00509"], 0x18) 2018/05/15 08:25:16 executing program 0: r0 = syz_open_procfs(0x0, &(0x7f0000000280)='net/ptype\x00') sendfile(r0, 0xffffffffffffffff, &(0x7f0000000000)=0xdc, 0x7fffffff) 2018/05/15 08:25:16 executing program 3: syz_emit_ethernet(0x3e, &(0x7f00000001c0)={@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, @dev={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa]}, [], {@ipv6={0x86dd, {0x0, 0x6, "50a09c", 0x8, 0xffffff87, 0x0, @remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x20480], 0xbb}, @local={0xfe, 0x80, [], 0xaa}, {[], @udp={0x0, 0x0, 0x8}}}}}}, &(0x7f0000000040)) 2018/05/15 08:25:16 executing program 5: r0 = accept$inet(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, @multicast2}, &(0x7f0000000080)=0x10) ioctl$sock_inet_udp_SIOCINQ(r0, 0x541b, &(0x7f00000001c0)) getsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(0xffffffffffffff9c, 0x84, 0x9, &(0x7f00000000c0)={0x0, @in={{0x2, 0x4e22, @multicast2=0xe0000002}}, 0x4, 0x401, 0x5, 0x2, 0x40}, &(0x7f0000000180)=0x98) getsockopt$inet_sctp_SCTP_GET_PEER_ADDRS(r0, 0x84, 0x6c, &(0x7f00000002c0)={r1, 0xc8, "55024a77bcc094c4d6f9d5b863542270dfa76f1a3d5eb66dfb3733faa9c0ccc908772cf90ce9f84e01449ec435e3a037316408d6d83a62b427d38fd6aaa8bea0179528210d4f9563d10fbb188db10fc583aaf0de222f5450b0797e3b301b2607ef343f315f56f3456963da0cc658b0a9e67a4bba63d4819e9a384985bcb9234355115b13816a3142b0b0df0c2074d06d627b9deab58b6d91b1f9cb1312cc59e18e7abedebbf75e9bec33dc03a22b5932d1bb22bbe7cd56831ba0a132fc21f900b703791070534258"}, &(0x7f0000000200)=0xd0) r2 = syz_open_procfs(0x0, &(0x7f0000000280)='net/ptype\x00') sendfile(r2, r2, &(0x7f0000000000)=0xffffffd, 0x7fffffff) setsockopt$inet_MCAST_LEAVE_GROUP(r2, 0x0, 0x2d, &(0x7f0000000480)={0x101, {{0x2, 0x4e22, @local={0xac, 0x14, 0x14, 0xaa}}}}, 0xfffffffffffffd1e) 2018/05/15 08:25:16 executing program 2: syz_emit_ethernet(0x3e, &(0x7f00000001c0)={@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, @dev={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa]}, [], {@ipv6={0x86dd, {0x0, 0x6, "50a09c", 0x8, 0x0, 0x0, @remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0xe000000], 0xbb}, @local={0xfe, 0x80, [], 0xaa}, {[], @udp={0x0, 0x0, 0x8}}}}}}, &(0x7f0000000040)) 2018/05/15 08:25:16 executing program 7: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup(r0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000d40)=@broute={'broute\x00', 0x20, 0x4, 0x928, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000400], 0x0, &(0x7f0000000000), &(0x7f0000000400)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x2, [{{{0x5, 0x0, 0x0, 'bcsh0\x00', 'sit0\x00', 'syzkaller1\x00', 'veth0\x00', @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [], @dev={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa]}, [], 0x1d8, 0x228, 0x258, [@comment={'comment\x00', 0x100}, @owner={'owner\x00', 0x18}]}, [@common=@LED={'LED\x00', 0x28, {{'syz0\x00'}}}]}, @common=@redirect={'redirect\x00', 0x8}}, {{{0x11, 0x0, 0x0, 'veth1_to_bond\x00', 'erspan0\x00', 'bridge_slave_1\x00', 'veth0_to_bridge\x00', @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [0x0, 0xff, 0x0, 0xff, 0x0, 0xff], @random="cfa071dc33d9", [0xff, 0xff, 0xff, 0xff, 0xff, 0xff], 0x2e0, 0x2e0, 0x330, [@mac={'mac\x00', 0x10, {{@remote={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xbb}, 0x1}}}, @bpf0={'bpf\x00', 0x210, {{0x20, [{0x8000, 0x4902, 0x5, 0x3ff}, {0x5, 0x8, 0x2, 0xff}, {0x1000, 0x48000000000, 0x3}, {0xf7, 0x1f, 0xfffffffffffffe00, 0x1}, {0x10000, 0xfc0, 0x1, 0x6}, {0x4, 0x2, 0xcefa, 0x81}, {0x815, 0xc7, 0x8001, 0x6a0}, {0x40, 0x0, 0x9, 0x80000001}, {0xffffffffffffff53, 0x38a, 0x100000000, 0x7}, {0x5, 0x1, 0x1000, 0x10001}, {0x80000000, 0x7, 0x1, 0xf7}, {0x2, 0x9, 0x4c, 0x5}, {0xfffffffffffffff7, 0x0, 0xe74, 0x52a}, {0x1ff, 0x7, 0x3, 0x7}, {0x6, 0x1ff, 0x49, 0x7}, {0x8000, 0x0, 0x7, 0x684}, {0xffe, 0x988, 0x3, 0x1}, {0x7b, 0x5a07, 0x18, 0x7}, {0xfffffffffffffffe, 0xfff, 0x3, 0x178180a0}, {0x2, 0xc0, 0x6, 0x401}, {0x5, 0x3, 0x8, 0x8}, {0xffffffffffff0001, 0x3, 0xfffffffffffffff7, 0x5}, {0x1ff, 0x8001, 0x3}, {0x3, 0x9, 0xffffffff, 0x2}, {0x5, 0x4, 0x574, 0x64c}, {0x5, 0x4, 0x10001, 0x6}, {0x1, 0x5b2c, 0x3ff, 0x7}, {0xff, 0x2, 0x5, 0x62c5fc18}, {0x101, 0x7, 0x2, 0xfffffffffffffffd}, {0x7fff, 0x6, 0x8, 0x4}, {0x9, 0x0, 0x7, 0xff}, {0x4, 0x4, 0x4, 0x10000}, {0x59b0, 0xfff, 0x4, 0x4}, {0x1f, 0xfffffffffffffffd, 0x8001, 0x800}, {0x0, 0xffffffffffffffff, 0x2, 0x65}, {0x1ff, 0x1, 0x2, 0x7ff}, {0x4, 0x5, 0x1, 0x7be}, {0x9e4, 0x0, 0x7, 0x5}, {0x5, 0x8, 0x7f, 0xffffffff}, {0x4, 0x6, 0x5, 0x7ff}, {0x22aaaf52, 0x8f, 0x6, 0x10000}, {0x2, 0x7, 0xffff}, {0x5, 0xfffffffff016eb50, 0x82, 0x7}, {0x38, 0x800, 0x9a2a, 0xfffffffffffffffc}, {0x5, 0xb, 0x4, 0xfffffffffffff001}, {0x8b5, 0x81, 0x4, 0x2}, {0x8, 0xfffffffffffffff8, 0x1, 0x8}, {0x40, 0x4, 0x1, 0x100000001}, {0x9b, 0x5, 0x1, 0xd64c}, {0x100, 0x8, 0x7, 0x3ff}, {0xf11, 0x200, 0x7, 0x2}, {0xac5, 0x0, 0x3, 0x7}, {0x518, 0x1, 0x80}, {0x6, 0x7f, 0x6, 0x7298}, {0x7, 0x1, 0x2, 0x1ec9}, {0x400, 0x2, 0x6, 0x6c3}, {0x100000001, 0x6, 0x5, 0x9}, {0x8, 0x1dae, 0xfffffffffffffff8, 0x101}, {0x2, 0x7, 0x8, 0x3}, {0x0, 0x45b, 0x7, 0x72}, {0x100000001, 0xc00000000000, 0x100000001, 0x8}, {0x100000001, 0x0, 0xfffffffffffffffc, 0x3}, {0x95, 0x90b, 0x0, 0xfffffffffffff565}, {0x0, 0x4, 0x0, 0x2}], 0x40}}}]}}, @common=@IDLETIMER={'IDLETIMER\x00', 0x28, {{0x7f, 'syz0\x00'}}}}]}, {0x0, '\x00', 0x2, 0xfffffffffffffffc}, {0x0, '\x00', 0x2, 0xffffffffffffffff, 0x2, [{{{0x11, 0x40, 0x87df, 'irlan0\x00', 'sit0\x00', 'veth0_to_team\x00', 'ip6gretap0\x00', @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [0xff, 0xff, 0xff, 0xff, 0x0, 0xff], @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [0x0, 0xff, 0x0, 0xff], 0xb0, 0x210, 0x258, [@time={'time\x00', 0x18, {{0x1ff, 0x1, 0xe063, 0xb6c5, 0x2e80, 0x0, 0x2}}}]}, [@common=@redirect={'redirect\x00', 0x8, {{0xffffffffffffffff}}}, @common=@SECMARK={'SECMARK\x00', 0x108, {{0x1, 0x6, 'system_u:object_r:lost_found_t:s0\x00'}}}]}, @common=@ERROR={'ERROR\x00', 0x20, {"4323eed968d7072e70de82f41331fe3aed2aedc8f2fff16e54b1c4e2ad07"}}}, {{{0x5, 0x54, 0x888d, 'ip6gretap0\x00', 'teql0\x00', 'veth1_to_team\x00', 'erspan0\x00', @random="0eae55d5aac5", [0x0, 0xff, 0x0, 0xff, 0xff, 0xff], @empty, [0xff, 0xff, 0xff, 0x0, 0xff, 0xff], 0x70, 0x70, 0xb8}}, @common=@RATEEST={'RATEEST\x00', 0x20, {{'syz0\x00', 0x9, 0x1, 0x4}}}}]}]}, 0x9a0) 2018/05/15 08:25:16 executing program 4: r0 = syz_open_dev$evdev(&(0x7f00000009c0)='/dev/input/event#\x00', 0xfffffffffffffffc, 0x5) write$binfmt_elf64(r0, &(0x7f0000000000)=ANY=[@ANYBLOB="7f454c46000000000000000000000000110000e5ffd00509"], 0x18) 2018/05/15 08:25:16 executing program 0: r0 = syz_open_procfs(0x0, &(0x7f0000000280)='net/ptype\x00') sendfile(r0, r0, &(0x7f0000000000), 0x7fffffff) 2018/05/15 08:25:16 executing program 6: mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='./file0\x00', &(0x7f0000000280)="7379736673002a864f4bc00bce1bdb20637213b1e894d120715f9dc1125b042c7226eb0136d9624ea1d23374a660fe5ac173722fd367ad22e8553025a2e8be0bc5514379af7213d32b8d5d06dc8fbf2c849ed9cdefc74b03dfa9cb5a90b28b4b24d7862c3d66fca53167d5424235435a3dbb76bc7d3c42fc2e9c696114a6f888f0da85277683cfc1c4d2bf71c255a3134d64cc3fed8e97798deb8631cbf7682c9fa2ed031465aa191df922f764297cba22a8499d177f49fba940f55bbc8b723fd374f1fed78c8aeec6811d9b5879487387d56594a14c2588274de84fa27610302b3fb54172a8c910a07e7c76ea465aa68402", 0x0, &(0x7f0000000080)) 2018/05/15 08:25:17 executing program 3: syz_emit_ethernet(0x3e, &(0x7f00000001c0)={@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, @dev={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa]}, [], {@ipv6={0x86dd, {0x0, 0x6, "50a09c", 0x8, 0xffffff87, 0x0, @remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0xfffffffffffff000], 0xbb}, @local={0xfe, 0x80, [], 0xaa}, {[], @udp={0x0, 0x0, 0x8}}}}}}, &(0x7f0000000040)) 2018/05/15 08:25:17 executing program 5: getpgrp(0x0) ioctl$TIOCGPGRP(0xffffffffffffff9c, 0x540f, &(0x7f0000000040)=0x0) r1 = syz_open_procfs(r0, &(0x7f0000000080)='net/sco\x00') sendfile(r1, r1, &(0x7f0000000000)=0xffffffd, 0x7fffffff) 2018/05/15 08:25:17 executing program 2: syz_emit_ethernet(0x3e, &(0x7f00000001c0)={@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, @dev={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa]}, [], {@ipv6={0x86dd, {0x0, 0x6, "50a09c", 0x8, 0x0, 0x0, @remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x2800], 0xbb}, @local={0xfe, 0x80, [], 0xaa}, {[], @udp={0x0, 0x0, 0x8}}}}}}, &(0x7f0000000040)) 2018/05/15 08:25:17 executing program 4: write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000000)=ANY=[@ANYBLOB="7f454c46000000000000000000000000110000e5ffd00509"], 0x18) 2018/05/15 08:25:17 executing program 0: r0 = syz_open_procfs(0x0, &(0x7f0000000280)='net/ptype\x00') sendfile(r0, r0, &(0x7f0000000000), 0x7fffffff) 2018/05/15 08:25:17 executing program 7: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup(r0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000d40)=@broute={'broute\x00', 0x20, 0x4, 0x928, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000400], 0x0, &(0x7f0000000000), &(0x7f0000000400)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x2, [{{{0x5, 0x0, 0x0, 'bcsh0\x00', 'sit0\x00', 'syzkaller1\x00', 'veth0\x00', @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [], @dev={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa]}, [], 0x1d8, 0x228, 0x258, [@comment={'comment\x00', 0x100}, @owner={'owner\x00', 0x18}]}, [@common=@LED={'LED\x00', 0x28, {{'syz0\x00'}}}]}, @common=@redirect={'redirect\x00', 0x8}}, {{{0x11, 0x0, 0x0, 'veth1_to_bond\x00', 'erspan0\x00', 'bridge_slave_1\x00', 'veth0_to_bridge\x00', @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [0x0, 0x0, 0x0, 0xff, 0x0, 0xff], @random="cfa071dc33d9", [0xff, 0xff, 0xff, 0xff, 0xff, 0xff], 0x2e0, 0x2e0, 0x330, [@mac={'mac\x00', 0x10, {{@remote={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xbb}, 0x1}}}, @bpf0={'bpf\x00', 0x210, {{0x20, [{0x8000, 0x4902, 0x5, 0x3ff}, {0x5, 0x8, 0x2, 0xff}, {0x1000, 0x48000000000, 0x3}, {0xf7, 0x1f, 0xfffffffffffffe00, 0x1}, {0x10000, 0xfc0, 0x1, 0x6}, {0x4, 0x2, 0xcefa, 0x81}, {0x815, 0xc7, 0x8001, 0x6a0}, {0x40, 0x0, 0x9, 0x80000001}, {0xffffffffffffff53, 0x38a, 0x100000000, 0x7}, {0x5, 0x1, 0x1000, 0x10001}, {0x80000000, 0x7, 0x1, 0xf7}, {0x2, 0x9, 0x4c, 0x5}, {0xfffffffffffffff7, 0x0, 0xe74, 0x52a}, {0x1ff, 0x7, 0x3, 0x7}, {0x6, 0x1ff, 0x49, 0x7}, {0x8000, 0x0, 0x7, 0x684}, {0xffe, 0x988, 0x3, 0x1}, {0x7b, 0x5a07, 0x18, 0x7}, {0xfffffffffffffffe, 0xfff, 0x3, 0x178180a0}, {0x2, 0xc0, 0x6, 0x401}, {0x5, 0x3, 0x8, 0x8}, {0xffffffffffff0001, 0x3, 0xfffffffffffffff7, 0x5}, {0x1ff, 0x8001, 0x3}, {0x3, 0x9, 0xffffffff, 0x2}, {0x5, 0x4, 0x574, 0x64c}, {0x5, 0x4, 0x10001, 0x6}, {0x1, 0x5b2c, 0x3ff, 0x7}, {0xff, 0x2, 0x5, 0x62c5fc18}, {0x101, 0x7, 0x2, 0xfffffffffffffffd}, {0x7fff, 0x6, 0x8, 0x4}, {0x9, 0x0, 0x7, 0xff}, {0x4, 0x4, 0x4, 0x10000}, {0x59b0, 0xfff, 0x4, 0x4}, {0x1f, 0xfffffffffffffffd, 0x8001, 0x800}, {0x0, 0xffffffffffffffff, 0x2, 0x65}, {0x1ff, 0x1, 0x2, 0x7ff}, {0x4, 0x5, 0x1, 0x7be}, {0x9e4, 0x0, 0x7, 0x5}, {0x5, 0x8, 0x7f, 0xffffffff}, {0x4, 0x6, 0x5, 0x7ff}, {0x22aaaf52, 0x8f, 0x6, 0x10000}, {0x2, 0x7, 0xffff}, {0x5, 0xfffffffff016eb50, 0x82, 0x7}, {0x38, 0x800, 0x9a2a, 0xfffffffffffffffc}, {0x5, 0xb, 0x4, 0xfffffffffffff001}, {0x8b5, 0x81, 0x4, 0x2}, {0x8, 0xfffffffffffffff8, 0x1, 0x8}, {0x40, 0x4, 0x1, 0x100000001}, {0x9b, 0x5, 0x1, 0xd64c}, {0x100, 0x8, 0x7, 0x3ff}, {0xf11, 0x200, 0x7, 0x2}, {0xac5, 0x0, 0x3, 0x7}, {0x518, 0x1, 0x80}, {0x6, 0x7f, 0x6, 0x7298}, {0x7, 0x1, 0x2, 0x1ec9}, {0x400, 0x2, 0x6, 0x6c3}, {0x100000001, 0x6, 0x5, 0x9}, {0x8, 0x1dae, 0xfffffffffffffff8, 0x101}, {0x2, 0x7, 0x8, 0x3}, {0x0, 0x45b, 0x7, 0x72}, {0x100000001, 0xc00000000000, 0x100000001, 0x8}, {0x100000001, 0x0, 0xfffffffffffffffc, 0x3}, {0x95, 0x90b, 0x0, 0xfffffffffffff565}, {0x0, 0x4, 0x0, 0x2}], 0x40}}}]}}, @common=@IDLETIMER={'IDLETIMER\x00', 0x28, {{0x7f, 'syz0\x00'}}}}]}, {0x0, '\x00', 0x2, 0xfffffffffffffffc}, {0x0, '\x00', 0x2, 0xffffffffffffffff, 0x2, [{{{0x11, 0x40, 0x87df, 'irlan0\x00', 'sit0\x00', 'veth0_to_team\x00', 'ip6gretap0\x00', @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [0xff, 0xff, 0xff, 0xff, 0x0, 0xff], @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [0x0, 0xff, 0x0, 0xff], 0xb0, 0x210, 0x258, [@time={'time\x00', 0x18, {{0x1ff, 0x1, 0xe063, 0xb6c5, 0x2e80, 0x0, 0x2}}}]}, [@common=@redirect={'redirect\x00', 0x8, {{0xffffffffffffffff}}}, @common=@SECMARK={'SECMARK\x00', 0x108, {{0x1, 0x6, 'system_u:object_r:lost_found_t:s0\x00'}}}]}, @common=@ERROR={'ERROR\x00', 0x20, {"4323eed968d7072e70de82f41331fe3aed2aedc8f2fff16e54b1c4e2ad07"}}}, {{{0x5, 0x54, 0x888d, 'ip6gretap0\x00', 'teql0\x00', 'veth1_to_team\x00', 'erspan0\x00', @random="0eae55d5aac5", [0x0, 0xff, 0x0, 0xff, 0xff, 0xff], @empty, [0xff, 0xff, 0xff, 0x0, 0xff, 0xff], 0x70, 0x70, 0xb8}}, @common=@RATEEST={'RATEEST\x00', 0x20, {{'syz0\x00', 0x9, 0x1, 0x4}}}}]}]}, 0x9a0) 2018/05/15 08:25:17 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f0000000280)="6e65742f6970365f7461626c65735f6d61746368657300b6e23bcf6093cb57f8b4d285e9c48608549acee9a66f09d47a011dcc8f5af7870c6c1b6eebe85ebea4ecda4e44def87e8ee568c843daaf2805944012bc0144937e8b04411d09016ca07f7388ded591e346fb612397e79a6fe43e5c6a86bee1565b17b22b8ed5c95b4afbb3a620d1402c50bbaad790d0ffdb7c5a27e60423079f77bf") unlink(&(0x7f0000000080)='./file0\x00') sendfile(r0, r0, &(0x7f00000000c0)=0x10000000, 0x2) getsockopt$inet_sctp_SCTP_PARTIAL_DELIVERY_POINT(r0, 0x84, 0x13, &(0x7f0000000140)={0x0, 0xfffffffffffffffa}, &(0x7f0000000180)=0x8) syslog(0x2, &(0x7f0000000cc0)=""/107, 0x6b) setsockopt$IP_VS_SO_SET_DEL(r0, 0x0, 0x484, &(0x7f0000000200)={0x87, @dev={0xac, 0x14, 0x14, 0x1a}, 0x4e24, 0x2, 'rr\x00', 0x3, 0x2, 0x66}, 0x2c) setsockopt$inet_sctp_SCTP_STREAM_SCHEDULER(r0, 0x84, 0x7b, &(0x7f00000001c0)={r1, 0x40ef2843}, 0x8) setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x40, &(0x7f0000000340)=ANY=[@ANYBLOB="73656375726974790000000000000000000000000000000000000000000000000e00000004000000f8030000fffffffff00000000000000000000000ffffffffffffffff600300006003000060030000ffffffff04000000", @ANYPTR=&(0x7f0000000d40)=ANY=[@ANYBLOB="000000000000000000000000002100ebe70048ca02fec408edfbaf31ba590218fdffffffffffd60000000000000000000000000000000000000000000000000021d13202a6d3d3de0000000000000000000000"], @ANYBLOB="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"], 0x458) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000000)='dctcp\x00', 0x6) 2018/05/15 08:25:17 executing program 6: mount(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='./file0\x00', &(0x7f0000000280)="7379736673002a864f4bc00bce1bdb20637213b1e894d120715f9dc1125b042c7226eb0136d9624ea1d23374a660fe5ac173722fd367ad22e8553025a2e8be0bc5514379af7213d32b8d5d06dc8fbf2c849ed9cdefc74b03dfa9cb5a90b28b4b24d7862c3d66fca53167d5424235435a3dbb76bc7d3c42fc2e9c696114a6f888f0da85277683cfc1c4d2bf71c255a3134d64cc3fed8e97798deb8631cbf7682c9fa2ed031465aa191df922f764297cba22a8499d177f49fba940f55bbc8b723fd374f1fed78c8aeec6811d9b5879487387d56594a14c2588274de84fa27610302b3fb54172a8c910a07e7c76ea465aa68402", 0x0, &(0x7f0000000080)) 2018/05/15 08:25:17 executing program 0: r0 = syz_open_procfs(0x0, &(0x7f0000000280)='net/ptype\x00') sendfile(r0, r0, &(0x7f0000000000), 0x7fffffff) 2018/05/15 08:25:17 executing program 4: r0 = syz_open_dev$evdev(&(0x7f00000009c0)='/dev/input/event#\x00', 0x0, 0x5) write$binfmt_elf64(r0, &(0x7f0000000000)=ANY=[@ANYBLOB="7f454c46000000000000000000000000110000e5ffd00509"], 0x18) 2018/05/15 08:25:17 executing program 3: syz_emit_ethernet(0x3e, &(0x7f00000001c0)={@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, @dev={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa]}, [], {@ipv6={0x86dd, {0x0, 0x6, "50a09c", 0x8, 0xffffff87, 0x0, @remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x38000000], 0xbb}, @local={0xfe, 0x80, [], 0xaa}, {[], @udp={0x0, 0x0, 0x8}}}}}}, &(0x7f0000000040)) 2018/05/15 08:25:17 executing program 6: r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCADDRT(r0, 0x890b, &(0x7f0000000240)={0x0, {0x2, 0x0, @remote={0xac, 0x14, 0x14, 0xbb}}, {0x2}, {0x2, 0x0, @remote={0xac, 0x14, 0x14, 0xbb}}, 0x194, 0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)='veth1_to_bridge\x00', 0xffffffffffffffc0, 0x0, 0xfffffffffffff9af}) 2018/05/15 08:25:17 executing program 2: syz_emit_ethernet(0x3e, &(0x7f00000001c0)={@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, @dev={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa]}, [], {@ipv6={0x86dd, {0x0, 0x6, "50a09c", 0x8, 0x0, 0x0, @remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x2b00], 0xbb}, @local={0xfe, 0x80, [], 0xaa}, {[], @udp={0x0, 0x0, 0x8}}}}}}, &(0x7f0000000040)) 2018/05/15 08:25:17 executing program 5: r0 = syz_open_dev$usbmon(&(0x7f0000000640)='/dev/usbmon#\x00', 0x6, 0xf2336188fc62a0d8) setsockopt$inet_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f00000001c0)='tls\x00', 0x4) getsockopt$inet_sctp_SCTP_GET_ASSOC_STATS(r0, 0x84, 0x70, &(0x7f00000002c0)={0x0, @in={{0x2, 0x4e24, @remote={0xac, 0x14, 0x14, 0xbb}}}, [0x5, 0x100000000, 0x5, 0x8e0, 0xf2, 0x100000000, 0xfffffffffffffffb, 0xffffffffffffff81, 0x4, 0x81, 0xfff, 0x1, 0x9, 0x4, 0x5]}, &(0x7f0000000200)=0x100) getsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r0, 0x84, 0x9, &(0x7f00000003c0)={r1, @in6={{0xa, 0x4e22, 0x1, @remote={0xfe, 0x80, [], 0xbb}, 0x7}}, 0x3, 0x2, 0xfffffffffffffff8, 0x3, 0x41}, &(0x7f0000000240)=0x98) r2 = syz_open_dev$usbmon(&(0x7f0000000140)='/dev/usbmon#\x00', 0x22, 0x0) ioctl$SG_GET_TIMEOUT(r2, 0x2202, 0x0) getsockopt$IP_VS_SO_GET_SERVICE(r0, 0x0, 0x483, &(0x7f0000000480), &(0x7f0000000500)=0x68) getpeername$netrom(r2, &(0x7f00000000c0), &(0x7f0000000100)=0x10) r3 = syz_open_procfs(0x0, &(0x7f0000000280)='net/ptype\x00') socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$IP_VS_SO_GET_SERVICES(r2, 0x0, 0x482, &(0x7f0000000540)=""/116, &(0x7f00000005c0)=0x74) sendfile(r3, r3, &(0x7f0000000000)=0xffffffd, 0x7fffffff) ioctl$BLKBSZSET(r3, 0x40081271, &(0x7f0000000080)=0x1000) setsockopt$bt_hci_HCI_TIME_STAMP(r3, 0x0, 0x3, &(0x7f0000000040)=0x5, 0x4) 2018/05/15 08:25:17 executing program 7: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup(r0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000d40)=@broute={'broute\x00', 0x20, 0x4, 0x928, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000400], 0x0, &(0x7f0000000000), &(0x7f0000000400)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x2, [{{{0x5, 0x0, 0x0, 'bcsh0\x00', 'sit0\x00', 'syzkaller1\x00', 'veth0\x00', @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [], @dev={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa]}, [], 0x1d8, 0x228, 0x258, [@comment={'comment\x00', 0x100}, @owner={'owner\x00', 0x18}]}, [@common=@LED={'LED\x00', 0x28, {{'syz0\x00'}}}]}, @common=@redirect={'redirect\x00', 0x8}}, {{{0x11, 0x0, 0x0, 'veth1_to_bond\x00', 'erspan0\x00', 'bridge_slave_1\x00', 'veth0_to_bridge\x00', @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [0x0, 0x0, 0x0, 0x0, 0x0, 0xff], @random="cfa071dc33d9", [0xff, 0xff, 0xff, 0xff, 0xff, 0xff], 0x2e0, 0x2e0, 0x330, [@mac={'mac\x00', 0x10, {{@remote={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xbb}, 0x1}}}, @bpf0={'bpf\x00', 0x210, {{0x20, [{0x8000, 0x4902, 0x5, 0x3ff}, {0x5, 0x8, 0x2, 0xff}, {0x1000, 0x48000000000, 0x3}, {0xf7, 0x1f, 0xfffffffffffffe00, 0x1}, {0x10000, 0xfc0, 0x1, 0x6}, {0x4, 0x2, 0xcefa, 0x81}, {0x815, 0xc7, 0x8001, 0x6a0}, {0x40, 0x0, 0x9, 0x80000001}, {0xffffffffffffff53, 0x38a, 0x100000000, 0x7}, {0x5, 0x1, 0x1000, 0x10001}, {0x80000000, 0x7, 0x1, 0xf7}, {0x2, 0x9, 0x4c, 0x5}, {0xfffffffffffffff7, 0x0, 0xe74, 0x52a}, {0x1ff, 0x7, 0x3, 0x7}, {0x6, 0x1ff, 0x49, 0x7}, {0x8000, 0x0, 0x7, 0x684}, {0xffe, 0x988, 0x3, 0x1}, {0x7b, 0x5a07, 0x18, 0x7}, {0xfffffffffffffffe, 0xfff, 0x3, 0x178180a0}, {0x2, 0xc0, 0x6, 0x401}, {0x5, 0x3, 0x8, 0x8}, {0xffffffffffff0001, 0x3, 0xfffffffffffffff7, 0x5}, {0x1ff, 0x8001, 0x3}, {0x3, 0x9, 0xffffffff, 0x2}, {0x5, 0x4, 0x574, 0x64c}, {0x5, 0x4, 0x10001, 0x6}, {0x1, 0x5b2c, 0x3ff, 0x7}, {0xff, 0x2, 0x5, 0x62c5fc18}, {0x101, 0x7, 0x2, 0xfffffffffffffffd}, {0x7fff, 0x6, 0x8, 0x4}, {0x9, 0x0, 0x7, 0xff}, {0x4, 0x4, 0x4, 0x10000}, {0x59b0, 0xfff, 0x4, 0x4}, {0x1f, 0xfffffffffffffffd, 0x8001, 0x800}, {0x0, 0xffffffffffffffff, 0x2, 0x65}, {0x1ff, 0x1, 0x2, 0x7ff}, {0x4, 0x5, 0x1, 0x7be}, {0x9e4, 0x0, 0x7, 0x5}, {0x5, 0x8, 0x7f, 0xffffffff}, {0x4, 0x6, 0x5, 0x7ff}, {0x22aaaf52, 0x8f, 0x6, 0x10000}, {0x2, 0x7, 0xffff}, {0x5, 0xfffffffff016eb50, 0x82, 0x7}, {0x38, 0x800, 0x9a2a, 0xfffffffffffffffc}, {0x5, 0xb, 0x4, 0xfffffffffffff001}, {0x8b5, 0x81, 0x4, 0x2}, {0x8, 0xfffffffffffffff8, 0x1, 0x8}, {0x40, 0x4, 0x1, 0x100000001}, {0x9b, 0x5, 0x1, 0xd64c}, {0x100, 0x8, 0x7, 0x3ff}, {0xf11, 0x200, 0x7, 0x2}, {0xac5, 0x0, 0x3, 0x7}, {0x518, 0x1, 0x80}, {0x6, 0x7f, 0x6, 0x7298}, {0x7, 0x1, 0x2, 0x1ec9}, {0x400, 0x2, 0x6, 0x6c3}, {0x100000001, 0x6, 0x5, 0x9}, {0x8, 0x1dae, 0xfffffffffffffff8, 0x101}, {0x2, 0x7, 0x8, 0x3}, {0x0, 0x45b, 0x7, 0x72}, {0x100000001, 0xc00000000000, 0x100000001, 0x8}, {0x100000001, 0x0, 0xfffffffffffffffc, 0x3}, {0x95, 0x90b, 0x0, 0xfffffffffffff565}, {0x0, 0x4, 0x0, 0x2}], 0x40}}}]}}, @common=@IDLETIMER={'IDLETIMER\x00', 0x28, {{0x7f, 'syz0\x00'}}}}]}, {0x0, '\x00', 0x2, 0xfffffffffffffffc}, {0x0, '\x00', 0x2, 0xffffffffffffffff, 0x2, [{{{0x11, 0x40, 0x87df, 'irlan0\x00', 'sit0\x00', 'veth0_to_team\x00', 'ip6gretap0\x00', @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [0xff, 0xff, 0xff, 0xff, 0x0, 0xff], @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [0x0, 0xff, 0x0, 0xff], 0xb0, 0x210, 0x258, [@time={'time\x00', 0x18, {{0x1ff, 0x1, 0xe063, 0xb6c5, 0x2e80, 0x0, 0x2}}}]}, [@common=@redirect={'redirect\x00', 0x8, {{0xffffffffffffffff}}}, @common=@SECMARK={'SECMARK\x00', 0x108, {{0x1, 0x6, 'system_u:object_r:lost_found_t:s0\x00'}}}]}, @common=@ERROR={'ERROR\x00', 0x20, {"4323eed968d7072e70de82f41331fe3aed2aedc8f2fff16e54b1c4e2ad07"}}}, {{{0x5, 0x54, 0x888d, 'ip6gretap0\x00', 'teql0\x00', 'veth1_to_team\x00', 'erspan0\x00', @random="0eae55d5aac5", [0x0, 0xff, 0x0, 0xff, 0xff, 0xff], @empty, [0xff, 0xff, 0xff, 0x0, 0xff, 0xff], 0x70, 0x70, 0xb8}}, @common=@RATEEST={'RATEEST\x00', 0x20, {{'syz0\x00', 0x9, 0x1, 0x4}}}}]}]}, 0x9a0) 2018/05/15 08:25:17 executing program 2: syz_emit_ethernet(0x3e, &(0x7f00000001c0)={@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, @dev={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa]}, [], {@ipv6={0x86dd, {0x0, 0x6, "50a09c", 0x8, 0x0, 0x0, @remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x543], 0xbb}, @local={0xfe, 0x80, [], 0xaa}, {[], @udp={0x0, 0x0, 0x8}}}}}}, &(0x7f0000000040)) 2018/05/15 08:25:17 executing program 0: r0 = syz_open_procfs(0x0, &(0x7f0000000280)='net/ptype\x00') sendfile(r0, r0, &(0x7f0000000000)=0xdc, 0x0) 2018/05/15 08:25:17 executing program 6: r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCADDRT(r0, 0x890b, &(0x7f0000000240)={0x0, {0x2, 0x0, @remote={0xac, 0x14, 0x14, 0xbb}}, {0x2}, {0x2, 0x0, @remote={0xac, 0x14, 0x14, 0xbb}}, 0x194, 0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)='veth1_to_bridge\x00', 0xffffffffffffffc0, 0x0, 0xfffffffffffff9af}) 2018/05/15 08:25:17 executing program 5: r0 = syz_open_procfs(0x0, &(0x7f0000000280)='net/ptype\x00') sendfile(r0, r0, &(0x7f0000000000)=0xfff7ffd, 0x6) 2018/05/15 08:25:17 executing program 3: syz_emit_ethernet(0x3e, &(0x7f00000001c0)={@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, @dev={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa]}, [], {@ipv6={0x86dd, {0x0, 0x6, "50a09c", 0x8, 0xffffff87, 0x0, @remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x28], 0xbb}, @local={0xfe, 0x80, [], 0xaa}, {[], @udp={0x0, 0x0, 0x8}}}}}}, &(0x7f0000000040)) 2018/05/15 08:25:18 executing program 4: r0 = syz_open_dev$evdev(&(0x7f00000009c0)='/dev/input/event#\x00', 0x0, 0x5) write$binfmt_elf64(r0, &(0x7f0000000000)=ANY=[@ANYBLOB="7f454c46000000000000000000000000110000e5ffd00509"], 0x18) 2018/05/15 08:25:18 executing program 7: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup(r0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000d40)=@broute={'broute\x00', 0x20, 0x4, 0x928, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000400], 0x0, &(0x7f0000000000), &(0x7f0000000400)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x2, [{{{0x5, 0x0, 0x0, 'bcsh0\x00', 'sit0\x00', 'syzkaller1\x00', 'veth0\x00', @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [], @dev={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa]}, [], 0x1d8, 0x228, 0x258, [@comment={'comment\x00', 0x100}, @owner={'owner\x00', 0x18}]}, [@common=@LED={'LED\x00', 0x28, {{'syz0\x00'}}}]}, @common=@redirect={'redirect\x00', 0x8}}, {{{0x11, 0x0, 0x0, 'veth1_to_bond\x00', 'erspan0\x00', 'bridge_slave_1\x00', 'veth0_to_bridge\x00', @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [], @random="cfa071dc33d9", [0xff, 0xff, 0xff, 0xff, 0xff, 0xff], 0x2e0, 0x2e0, 0x330, [@mac={'mac\x00', 0x10, {{@remote={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xbb}, 0x1}}}, @bpf0={'bpf\x00', 0x210, {{0x20, [{0x8000, 0x4902, 0x5, 0x3ff}, {0x5, 0x8, 0x2, 0xff}, {0x1000, 0x48000000000, 0x3}, {0xf7, 0x1f, 0xfffffffffffffe00, 0x1}, {0x10000, 0xfc0, 0x1, 0x6}, {0x4, 0x2, 0xcefa, 0x81}, {0x815, 0xc7, 0x8001, 0x6a0}, {0x40, 0x0, 0x9, 0x80000001}, {0xffffffffffffff53, 0x38a, 0x100000000, 0x7}, {0x5, 0x1, 0x1000, 0x10001}, {0x80000000, 0x7, 0x1, 0xf7}, {0x2, 0x9, 0x4c, 0x5}, {0xfffffffffffffff7, 0x0, 0xe74, 0x52a}, {0x1ff, 0x7, 0x3, 0x7}, {0x6, 0x1ff, 0x49, 0x7}, {0x8000, 0x0, 0x7, 0x684}, {0xffe, 0x988, 0x3, 0x1}, {0x7b, 0x5a07, 0x18, 0x7}, {0xfffffffffffffffe, 0xfff, 0x3, 0x178180a0}, {0x2, 0xc0, 0x6, 0x401}, {0x5, 0x3, 0x8, 0x8}, {0xffffffffffff0001, 0x3, 0xfffffffffffffff7, 0x5}, {0x1ff, 0x8001, 0x3}, {0x3, 0x9, 0xffffffff, 0x2}, {0x5, 0x4, 0x574, 0x64c}, {0x5, 0x4, 0x10001, 0x6}, {0x1, 0x5b2c, 0x3ff, 0x7}, {0xff, 0x2, 0x5, 0x62c5fc18}, {0x101, 0x7, 0x2, 0xfffffffffffffffd}, {0x7fff, 0x6, 0x8, 0x4}, {0x9, 0x0, 0x7, 0xff}, {0x4, 0x4, 0x4, 0x10000}, {0x59b0, 0xfff, 0x4, 0x4}, {0x1f, 0xfffffffffffffffd, 0x8001, 0x800}, {0x0, 0xffffffffffffffff, 0x2, 0x65}, {0x1ff, 0x1, 0x2, 0x7ff}, {0x4, 0x5, 0x1, 0x7be}, {0x9e4, 0x0, 0x7, 0x5}, {0x5, 0x8, 0x7f, 0xffffffff}, {0x4, 0x6, 0x5, 0x7ff}, {0x22aaaf52, 0x8f, 0x6, 0x10000}, {0x2, 0x7, 0xffff}, {0x5, 0xfffffffff016eb50, 0x82, 0x7}, {0x38, 0x800, 0x9a2a, 0xfffffffffffffffc}, {0x5, 0xb, 0x4, 0xfffffffffffff001}, {0x8b5, 0x81, 0x4, 0x2}, {0x8, 0xfffffffffffffff8, 0x1, 0x8}, {0x40, 0x4, 0x1, 0x100000001}, {0x9b, 0x5, 0x1, 0xd64c}, {0x100, 0x8, 0x7, 0x3ff}, {0xf11, 0x200, 0x7, 0x2}, {0xac5, 0x0, 0x3, 0x7}, {0x518, 0x1, 0x80}, {0x6, 0x7f, 0x6, 0x7298}, {0x7, 0x1, 0x2, 0x1ec9}, {0x400, 0x2, 0x6, 0x6c3}, {0x100000001, 0x6, 0x5, 0x9}, {0x8, 0x1dae, 0xfffffffffffffff8, 0x101}, {0x2, 0x7, 0x8, 0x3}, {0x0, 0x45b, 0x7, 0x72}, {0x100000001, 0xc00000000000, 0x100000001, 0x8}, {0x100000001, 0x0, 0xfffffffffffffffc, 0x3}, {0x95, 0x90b, 0x0, 0xfffffffffffff565}, {0x0, 0x4, 0x0, 0x2}], 0x40}}}]}}, @common=@IDLETIMER={'IDLETIMER\x00', 0x28, {{0x7f, 'syz0\x00'}}}}]}, {0x0, '\x00', 0x2, 0xfffffffffffffffc}, {0x0, '\x00', 0x2, 0xffffffffffffffff, 0x2, [{{{0x11, 0x40, 0x87df, 'irlan0\x00', 'sit0\x00', 'veth0_to_team\x00', 'ip6gretap0\x00', @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [0xff, 0xff, 0xff, 0xff, 0x0, 0xff], @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [0x0, 0xff, 0x0, 0xff], 0xb0, 0x210, 0x258, [@time={'time\x00', 0x18, {{0x1ff, 0x1, 0xe063, 0xb6c5, 0x2e80, 0x0, 0x2}}}]}, [@common=@redirect={'redirect\x00', 0x8, {{0xffffffffffffffff}}}, @common=@SECMARK={'SECMARK\x00', 0x108, {{0x1, 0x6, 'system_u:object_r:lost_found_t:s0\x00'}}}]}, @common=@ERROR={'ERROR\x00', 0x20, {"4323eed968d7072e70de82f41331fe3aed2aedc8f2fff16e54b1c4e2ad07"}}}, {{{0x5, 0x54, 0x888d, 'ip6gretap0\x00', 'teql0\x00', 'veth1_to_team\x00', 'erspan0\x00', @random="0eae55d5aac5", [0x0, 0xff, 0x0, 0xff, 0xff, 0xff], @empty, [0xff, 0xff, 0xff, 0x0, 0xff, 0xff], 0x70, 0x70, 0xb8}}, @common=@RATEEST={'RATEEST\x00', 0x20, {{'syz0\x00', 0x9, 0x1, 0x4}}}}]}]}, 0x9a0) 2018/05/15 08:25:18 executing program 6: r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCADDRT(r0, 0x890b, &(0x7f0000000240)={0x0, {0x2, 0x0, @remote={0xac, 0x14, 0x14, 0xbb}}, {0x2}, {0x2, 0x0, @remote={0xac, 0x14, 0x14, 0xbb}}, 0x194, 0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)='veth1_to_bridge\x00', 0xffffffffffffffc0, 0x0, 0xfffffffffffff9af}) 2018/05/15 08:25:18 executing program 5: r0 = add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000080)={0x73, 0x79, 0x7a}, 0x0, 0x0, 0xfffffffffffffffc) keyctl$chown(0x4, r0, 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000280)='net/ptype\x00') sendfile(r1, r1, &(0x7f0000000000)=0xffffffd, 0x7fffffff) ioctl$KVM_REINJECT_CONTROL(r1, 0xae71, &(0x7f0000000100)={0x900000000000000}) setsockopt$inet_sctp6_SCTP_INITMSG(r1, 0x84, 0x2, &(0x7f0000000080)={0xcf, 0x1, 0x100, 0xfffffffffffffffa}, 0x8) 2018/05/15 08:25:18 executing program 0: r0 = syz_open_procfs(0x0, &(0x7f0000000280)='net/ptype\x00') sendfile(r0, r0, &(0x7f0000000000)=0xdc, 0x0) 2018/05/15 08:25:18 executing program 2: syz_emit_ethernet(0x3e, &(0x7f00000001c0)={@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, @dev={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa]}, [], {@ipv6={0x86dd, {0x0, 0x6, "50a09c", 0x8, 0x0, 0x0, @remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x8847000000000000], 0xbb}, @local={0xfe, 0x80, [], 0xaa}, {[], @udp={0x0, 0x0, 0x8}}}}}}, &(0x7f0000000040)) 2018/05/15 08:25:18 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f0000000280)="6e65742f6970365f7461626c65735f6d61746368657300b6e23bcf6093cb57f8b4d285e9c48608549acee9a66f09d47a011dcc8f5af7870c6c1b6eebe85ebea4ecda4e44def87e8ee568c843daaf2805944012bc0144937e8b04411d09016ca07f7388ded591e346fb612397e79a6fe43e5c6a86bee1565b17b22b8ed5c95b4afbb3a620d1402c50bbaad790d0ffdb7c5a27e60423079f77bf") unlink(&(0x7f0000000080)='./file0\x00') sendfile(r0, r0, &(0x7f00000000c0)=0x10000000, 0x2) getsockopt$inet_sctp_SCTP_PARTIAL_DELIVERY_POINT(r0, 0x84, 0x13, &(0x7f0000000140)={0x0, 0xfffffffffffffffa}, &(0x7f0000000180)=0x8) syslog(0x2, &(0x7f0000000cc0)=""/107, 0x6b) setsockopt$IP_VS_SO_SET_DEL(r0, 0x0, 0x484, &(0x7f0000000200)={0x87, @dev={0xac, 0x14, 0x14, 0x1a}, 0x4e24, 0x2, 'rr\x00', 0x3, 0x2, 0x66}, 0x2c) setsockopt$inet_sctp_SCTP_STREAM_SCHEDULER(r0, 0x84, 0x7b, &(0x7f00000001c0)={r1, 0x40ef2843}, 0x8) setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x40, &(0x7f0000000340)=ANY=[@ANYBLOB="73656375726974790000000000000000000000000000000000000000000000000e00000004000000f8030000fffffffff00000000000000000000000ffffffffffffffff600300006003000060030000ffffffff04000000", @ANYPTR=&(0x7f0000000d40)=ANY=[@ANYBLOB="000000000000000000000000002100ebe70048ca02fec408edfbaf31ba590218fdffffffffffd60000000000000000000000000000000000000000000000000021d13202a6d3d3de0000000000000000000000"], @ANYBLOB="00000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000c800f0000000000000000000000000000000000000000000000000003000616800000000000000000000000000000000000000000000000000000000f9ffffff7f000000010000000000000028005443504d5353000000000000000000000000000000000000000000000000740c0000000000007f000001ac14140dffffff00ffffffff6772653000000000000000000000000069703667726530000000000000000000000000000000000000000000ff0000000000000000000000000000000000000000000000000000000000ff0000000000000000000000000000007f0003010000000000000000000000000000b80018010000000000000000000000000000000000000000000000002000736f636b657400000000000000000000000000000000000000000000000060005345540000000000000000000000000000000000000000000000000000000100000000100000020000000000008e0a000000010400000800000000033f0002000000d4180000ff0700009c0a00001e62000000000000e1020000ff09010000000100ac1414aa000000ffff0000007465616d5f736c6176655f310000000069703667726574617030000000000000000000000000000000000000ff0000000000000000000000000000000000000000000000000000000000ff000000000000000000000000000000670001400000000000000000000000000000280158010000000000000000000000000000000000000000000000004000736574000000000000000000000000000000000000000000000000000000070000000100000008000000090000000000000000000000060000000307050050006f736600000000000000000000000000000000000000000000000000000073797a3100000000000000000000000000000000000000000000000000000000070000000200000002000000000000003000434f4e4e4d41524b00000000000000000000ffffffffffffffe5000000014000000009000000020000000300000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000700098000000000000000000000000000000000000000000280000000000000000000000000000000000000000000000000000000000000800ffffff00000000"], 0x458) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000000)='dctcp\x00', 0x6) 2018/05/15 08:25:18 executing program 3: syz_emit_ethernet(0x3e, &(0x7f00000001c0)={@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, @dev={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa]}, [], {@ipv6={0x86dd, {0x0, 0x6, "50a09c", 0x8, 0xffffff87, 0x0, @remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x28000000], 0xbb}, @local={0xfe, 0x80, [], 0xaa}, {[], @udp={0x0, 0x0, 0x8}}}}}}, &(0x7f0000000040)) 2018/05/15 08:25:19 executing program 2: syz_emit_ethernet(0x3e, &(0x7f00000001c0)={@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, @dev={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa]}, [], {@ipv6={0x86dd, {0x0, 0x6, "50a09c", 0x8, 0x0, 0x0, @remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x84ffffff00000000], 0xbb}, @local={0xfe, 0x80, [], 0xaa}, {[], @udp={0x0, 0x0, 0x8}}}}}}, &(0x7f0000000040)) 2018/05/15 08:25:19 executing program 5: openat$vsock(0xffffffffffffff9c, &(0x7f0000000500)='/dev/vsock\x00', 0x10000, 0x0) r0 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000280)='/dev/vcs\x00', 0x0, 0x0) connect$bt_sco(r0, &(0x7f0000000200)={0x1f, {0x800, 0x8, 0x1, 0x20, 0x0, 0x4}}, 0x8) r1 = syz_open_procfs(0x0, &(0x7f0000000040)='net/sctp\x00') openat$sequencer(0xffffffffffffff9c, &(0x7f0000000140)='/dev/sequencer\x00', 0x10000, 0x0) sendfile(r1, r1, &(0x7f0000000000)=0xffffffd, 0x7fffffff) ioctl$DRM_IOCTL_VERSION(r1, 0xc0406400, &(0x7f0000000440)={0x1f, 0x7ff, 0xfc86, 0x7c, &(0x7f00000002c0)=""/124, 0xc8, &(0x7f0000000340)=""/200, 0x0, &(0x7f0000000140)}) getpeername$inet6(r0, &(0x7f0000000480)={0x0, 0x0, 0x0, @ipv4={[], [], @multicast1}}, &(0x7f00000004c0)=0x1c) r2 = socket(0x10, 0x3, 0x0) ioctl$sock_ifreq(0xffffffffffffffff, 0x0, &(0x7f0000000000)={'si\v0\x00', @ifru_map={0x0, 0x0, 0x0, 0x0, 0x9}}) ioctl$sock_ifreq(r2, 0x89f2, &(0x7f00000002c0)={'ip6_vti0\x00', @ifru_data=&(0x7f0000000000)="b06f31673d3da2b793d4f9a507e3c9133ba7ce8f5e6e538ecf8829b08f7f4aae"}) syz_kvm_setup_cpu$x86(r1, r1, &(0x7f0000fe7000/0x18000)=nil, &(0x7f0000000240)=[@text64={0x40, &(0x7f0000000080)="67260f2223420fe33d02000000420f01c866baf80cb8535c6a82ef66bafc0cec48b801000000000000000f23c80f21f835000060000f23f8c4227918aa2001000066baf80cb8206e888fef66bafc0c66b8000066efc744240000000100c7442402515c0000c7442406000000000f011424b9bd090000b809d90000ba000000000f300f01d1", 0x85}], 0xaaaaaaaaaaaab46, 0x1, &(0x7f0000000280), 0xfffff74) getsockopt$inet_tcp_buf(r1, 0x6, 0x1f, &(0x7f0000000180)=""/31, &(0x7f00000001c0)=0x1f) 2018/05/15 08:25:19 executing program 0: r0 = syz_open_procfs(0x0, &(0x7f0000000280)='net/ptype\x00') sendfile(r0, r0, &(0x7f0000000000)=0xdc, 0x0) 2018/05/15 08:25:19 executing program 3: syz_emit_ethernet(0x3e, &(0x7f00000001c0)={@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, @dev={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa]}, [], {@ipv6={0x86dd, {0x0, 0x6, "50a09c", 0x8, 0xffffff87, 0x0, @remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x8100], 0xbb}, @local={0xfe, 0x80, [], 0xaa}, {[], @udp={0x0, 0x0, 0x8}}}}}}, &(0x7f0000000040)) 2018/05/15 08:25:19 executing program 4: r0 = syz_open_dev$evdev(&(0x7f00000009c0)='/dev/input/event#\x00', 0x0, 0x5) write$binfmt_elf64(r0, &(0x7f0000000000)=ANY=[@ANYBLOB="7f454c46000000000000000000000000110000e5ffd00509"], 0x18) 2018/05/15 08:25:19 executing program 6: r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCADDRT(r0, 0x890b, &(0x7f0000000240)={0x0, {0x2, 0x0, @remote={0xac, 0x14, 0x14, 0xbb}}, {0x2}, {0x2, 0x0, @remote={0xac, 0x14, 0x14, 0xbb}}, 0x194, 0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)='veth1_to_bridge\x00', 0xffffffffffffffc0, 0x0, 0xfffffffffffff9af}) 2018/05/15 08:25:19 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f0000000280)="6e65742f6970365f7461626c65735f6d61746368657300b6e23bcf6093cb57f8b4d285e9c48608549acee9a66f09d47a011dcc8f5af7870c6c1b6eebe85ebea4ecda4e44def87e8ee568c843daaf2805944012bc0144937e8b04411d09016ca07f7388ded591e346fb612397e79a6fe43e5c6a86bee1565b17b22b8ed5c95b4afbb3a620d1402c50bbaad790d0ffdb7c5a27e60423079f77bf") unlink(&(0x7f0000000080)='./file0\x00') sendfile(r0, r0, &(0x7f00000000c0)=0x10000000, 0x2) getsockopt$inet_sctp_SCTP_PARTIAL_DELIVERY_POINT(r0, 0x84, 0x13, &(0x7f0000000140)={0x0, 0xfffffffffffffffa}, &(0x7f0000000180)=0x8) syslog(0x2, &(0x7f0000000cc0)=""/107, 0x6b) setsockopt$IP_VS_SO_SET_DEL(r0, 0x0, 0x484, &(0x7f0000000200)={0x87, @dev={0xac, 0x14, 0x14, 0x1a}, 0x4e24, 0x2, 'rr\x00', 0x3, 0x2, 0x66}, 0x2c) setsockopt$inet_sctp_SCTP_STREAM_SCHEDULER(r0, 0x84, 0x7b, &(0x7f00000001c0)={r1, 0x40ef2843}, 0x8) setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x40, &(0x7f0000000340)=ANY=[@ANYBLOB="73656375726974790000000000000000000000000000000000000000000000000e00000004000000f8030000fffffffff00000000000000000000000ffffffffffffffff600300006003000060030000ffffffff04000000", @ANYPTR=&(0x7f0000000d40)=ANY=[@ANYBLOB="000000000000000000000000002100ebe70048ca02fec408edfbaf31ba590218fdffffffffffd60000000000000000000000000000000000000000000000000021d13202a6d3d3de0000000000000000000000"], @ANYBLOB="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"], 0x458) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000000)='dctcp\x00', 0x6) 2018/05/15 08:25:19 executing program 7: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup(r0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000d40)=@broute={'broute\x00', 0x20, 0x4, 0x928, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000400], 0x0, &(0x7f0000000000), &(0x7f0000000400)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x2, [{{{0x5, 0x0, 0x0, 'bcsh0\x00', 'sit0\x00', 'syzkaller1\x00', 'veth0\x00', @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [], @dev={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa]}, [], 0x1d8, 0x228, 0x258, [@comment={'comment\x00', 0x100}, @owner={'owner\x00', 0x18}]}, [@common=@LED={'LED\x00', 0x28, {{'syz0\x00'}}}]}, @common=@redirect={'redirect\x00', 0x8}}, {{{0x11, 0x0, 0x0, 'veth1_to_bond\x00', 'erspan0\x00', 'bridge_slave_1\x00', 'veth0_to_bridge\x00', @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [], @random="cfa071dc33d9", [0x0, 0xff, 0xff, 0xff, 0xff, 0xff], 0x2e0, 0x2e0, 0x330, [@mac={'mac\x00', 0x10, {{@remote={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xbb}, 0x1}}}, @bpf0={'bpf\x00', 0x210, {{0x20, [{0x8000, 0x4902, 0x5, 0x3ff}, {0x5, 0x8, 0x2, 0xff}, {0x1000, 0x48000000000, 0x3}, {0xf7, 0x1f, 0xfffffffffffffe00, 0x1}, {0x10000, 0xfc0, 0x1, 0x6}, {0x4, 0x2, 0xcefa, 0x81}, {0x815, 0xc7, 0x8001, 0x6a0}, {0x40, 0x0, 0x9, 0x80000001}, {0xffffffffffffff53, 0x38a, 0x100000000, 0x7}, {0x5, 0x1, 0x1000, 0x10001}, {0x80000000, 0x7, 0x1, 0xf7}, {0x2, 0x9, 0x4c, 0x5}, {0xfffffffffffffff7, 0x0, 0xe74, 0x52a}, {0x1ff, 0x7, 0x3, 0x7}, {0x6, 0x1ff, 0x49, 0x7}, {0x8000, 0x0, 0x7, 0x684}, {0xffe, 0x988, 0x3, 0x1}, {0x7b, 0x5a07, 0x18, 0x7}, {0xfffffffffffffffe, 0xfff, 0x3, 0x178180a0}, {0x2, 0xc0, 0x6, 0x401}, {0x5, 0x3, 0x8, 0x8}, {0xffffffffffff0001, 0x3, 0xfffffffffffffff7, 0x5}, {0x1ff, 0x8001, 0x3}, {0x3, 0x9, 0xffffffff, 0x2}, {0x5, 0x4, 0x574, 0x64c}, {0x5, 0x4, 0x10001, 0x6}, {0x1, 0x5b2c, 0x3ff, 0x7}, {0xff, 0x2, 0x5, 0x62c5fc18}, {0x101, 0x7, 0x2, 0xfffffffffffffffd}, {0x7fff, 0x6, 0x8, 0x4}, {0x9, 0x0, 0x7, 0xff}, {0x4, 0x4, 0x4, 0x10000}, {0x59b0, 0xfff, 0x4, 0x4}, {0x1f, 0xfffffffffffffffd, 0x8001, 0x800}, {0x0, 0xffffffffffffffff, 0x2, 0x65}, {0x1ff, 0x1, 0x2, 0x7ff}, {0x4, 0x5, 0x1, 0x7be}, {0x9e4, 0x0, 0x7, 0x5}, {0x5, 0x8, 0x7f, 0xffffffff}, {0x4, 0x6, 0x5, 0x7ff}, {0x22aaaf52, 0x8f, 0x6, 0x10000}, {0x2, 0x7, 0xffff}, {0x5, 0xfffffffff016eb50, 0x82, 0x7}, {0x38, 0x800, 0x9a2a, 0xfffffffffffffffc}, {0x5, 0xb, 0x4, 0xfffffffffffff001}, {0x8b5, 0x81, 0x4, 0x2}, {0x8, 0xfffffffffffffff8, 0x1, 0x8}, {0x40, 0x4, 0x1, 0x100000001}, {0x9b, 0x5, 0x1, 0xd64c}, {0x100, 0x8, 0x7, 0x3ff}, {0xf11, 0x200, 0x7, 0x2}, {0xac5, 0x0, 0x3, 0x7}, {0x518, 0x1, 0x80}, {0x6, 0x7f, 0x6, 0x7298}, {0x7, 0x1, 0x2, 0x1ec9}, {0x400, 0x2, 0x6, 0x6c3}, {0x100000001, 0x6, 0x5, 0x9}, {0x8, 0x1dae, 0xfffffffffffffff8, 0x101}, {0x2, 0x7, 0x8, 0x3}, {0x0, 0x45b, 0x7, 0x72}, {0x100000001, 0xc00000000000, 0x100000001, 0x8}, {0x100000001, 0x0, 0xfffffffffffffffc, 0x3}, {0x95, 0x90b, 0x0, 0xfffffffffffff565}, {0x0, 0x4, 0x0, 0x2}], 0x40}}}]}}, @common=@IDLETIMER={'IDLETIMER\x00', 0x28, {{0x7f, 'syz0\x00'}}}}]}, {0x0, '\x00', 0x2, 0xfffffffffffffffc}, {0x0, '\x00', 0x2, 0xffffffffffffffff, 0x2, [{{{0x11, 0x40, 0x87df, 'irlan0\x00', 'sit0\x00', 'veth0_to_team\x00', 'ip6gretap0\x00', @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [0xff, 0xff, 0xff, 0xff, 0x0, 0xff], @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [0x0, 0xff, 0x0, 0xff], 0xb0, 0x210, 0x258, [@time={'time\x00', 0x18, {{0x1ff, 0x1, 0xe063, 0xb6c5, 0x2e80, 0x0, 0x2}}}]}, [@common=@redirect={'redirect\x00', 0x8, {{0xffffffffffffffff}}}, @common=@SECMARK={'SECMARK\x00', 0x108, {{0x1, 0x6, 'system_u:object_r:lost_found_t:s0\x00'}}}]}, @common=@ERROR={'ERROR\x00', 0x20, {"4323eed968d7072e70de82f41331fe3aed2aedc8f2fff16e54b1c4e2ad07"}}}, {{{0x5, 0x54, 0x888d, 'ip6gretap0\x00', 'teql0\x00', 'veth1_to_team\x00', 'erspan0\x00', @random="0eae55d5aac5", [0x0, 0xff, 0x0, 0xff, 0xff, 0xff], @empty, [0xff, 0xff, 0xff, 0x0, 0xff, 0xff], 0x70, 0x70, 0xb8}}, @common=@RATEEST={'RATEEST\x00', 0x20, {{'syz0\x00', 0x9, 0x1, 0x4}}}}]}]}, 0x9a0) 2018/05/15 08:25:19 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f00000000c0)={'tunl0\x00', &(0x7f0000000180)=ANY=[@ANYBLOB='E']}) 2018/05/15 08:25:19 executing program 2: syz_emit_ethernet(0x3e, &(0x7f00000001c0)={@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, @dev={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa]}, [], {@ipv6={0x86dd, {0x0, 0x6, "50a09c", 0x8, 0x0, 0x0, @remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x29000000], 0xbb}, @local={0xfe, 0x80, [], 0xaa}, {[], @udp={0x0, 0x0, 0x8}}}}}}, &(0x7f0000000040)) 2018/05/15 08:25:19 executing program 5: r0 = syz_open_procfs(0x0, &(0x7f0000000280)='net/ptype\x00') sendfile(r0, r0, &(0x7f0000000040)=0xffffffd, 0x7fffffff) 2018/05/15 08:25:19 executing program 6: r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x0, 0x0, @ipv4={[], [0xff, 0xff], @rand_addr}}, 0x1c) setsockopt$inet6_IPV6_ADDRFORM(r0, 0x29, 0x1, &(0x7f0000000000)=0x2, 0x4) 2018/05/15 08:25:19 executing program 4: r0 = syz_open_dev$evdev(&(0x7f00000009c0)='/dev/input/event#\x00', 0xfffffffffffffffc, 0x0) write$binfmt_elf64(r0, &(0x7f0000000000)=ANY=[@ANYBLOB="7f454c46000000000000000000000000110000e5ffd00509"], 0x18) 2018/05/15 08:25:19 executing program 3: syz_emit_ethernet(0x3e, &(0x7f00000001c0)={@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, @dev={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa]}, [], {@ipv6={0x86dd, {0x0, 0x6, "50a09c", 0x8, 0xffffff87, 0x0, @remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x2800], 0xbb}, @local={0xfe, 0x80, [], 0xaa}, {[], @udp={0x0, 0x0, 0x8}}}}}}, &(0x7f0000000040)) 2018/05/15 08:25:19 executing program 7: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup(r0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000d40)=@broute={'broute\x00', 0x20, 0x4, 0x928, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000400], 0x0, &(0x7f0000000000), &(0x7f0000000400)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x2, [{{{0x5, 0x0, 0x0, 'bcsh0\x00', 'sit0\x00', 'syzkaller1\x00', 'veth0\x00', @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [], @dev={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa]}, [], 0x1d8, 0x228, 0x258, [@comment={'comment\x00', 0x100}, @owner={'owner\x00', 0x18}]}, [@common=@LED={'LED\x00', 0x28, {{'syz0\x00'}}}]}, @common=@redirect={'redirect\x00', 0x8}}, {{{0x11, 0x0, 0x0, 'veth1_to_bond\x00', 'erspan0\x00', 'bridge_slave_1\x00', 'veth0_to_bridge\x00', @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [], @random="cfa071dc33d9", [0x0, 0x0, 0xff, 0xff, 0xff, 0xff], 0x2e0, 0x2e0, 0x330, [@mac={'mac\x00', 0x10, {{@remote={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xbb}, 0x1}}}, @bpf0={'bpf\x00', 0x210, {{0x20, [{0x8000, 0x4902, 0x5, 0x3ff}, {0x5, 0x8, 0x2, 0xff}, {0x1000, 0x48000000000, 0x3}, {0xf7, 0x1f, 0xfffffffffffffe00, 0x1}, {0x10000, 0xfc0, 0x1, 0x6}, {0x4, 0x2, 0xcefa, 0x81}, {0x815, 0xc7, 0x8001, 0x6a0}, {0x40, 0x0, 0x9, 0x80000001}, {0xffffffffffffff53, 0x38a, 0x100000000, 0x7}, {0x5, 0x1, 0x1000, 0x10001}, {0x80000000, 0x7, 0x1, 0xf7}, {0x2, 0x9, 0x4c, 0x5}, {0xfffffffffffffff7, 0x0, 0xe74, 0x52a}, {0x1ff, 0x7, 0x3, 0x7}, {0x6, 0x1ff, 0x49, 0x7}, {0x8000, 0x0, 0x7, 0x684}, {0xffe, 0x988, 0x3, 0x1}, {0x7b, 0x5a07, 0x18, 0x7}, {0xfffffffffffffffe, 0xfff, 0x3, 0x178180a0}, {0x2, 0xc0, 0x6, 0x401}, {0x5, 0x3, 0x8, 0x8}, {0xffffffffffff0001, 0x3, 0xfffffffffffffff7, 0x5}, {0x1ff, 0x8001, 0x3}, {0x3, 0x9, 0xffffffff, 0x2}, {0x5, 0x4, 0x574, 0x64c}, {0x5, 0x4, 0x10001, 0x6}, {0x1, 0x5b2c, 0x3ff, 0x7}, {0xff, 0x2, 0x5, 0x62c5fc18}, {0x101, 0x7, 0x2, 0xfffffffffffffffd}, {0x7fff, 0x6, 0x8, 0x4}, {0x9, 0x0, 0x7, 0xff}, {0x4, 0x4, 0x4, 0x10000}, {0x59b0, 0xfff, 0x4, 0x4}, {0x1f, 0xfffffffffffffffd, 0x8001, 0x800}, {0x0, 0xffffffffffffffff, 0x2, 0x65}, {0x1ff, 0x1, 0x2, 0x7ff}, {0x4, 0x5, 0x1, 0x7be}, {0x9e4, 0x0, 0x7, 0x5}, {0x5, 0x8, 0x7f, 0xffffffff}, {0x4, 0x6, 0x5, 0x7ff}, {0x22aaaf52, 0x8f, 0x6, 0x10000}, {0x2, 0x7, 0xffff}, {0x5, 0xfffffffff016eb50, 0x82, 0x7}, {0x38, 0x800, 0x9a2a, 0xfffffffffffffffc}, {0x5, 0xb, 0x4, 0xfffffffffffff001}, {0x8b5, 0x81, 0x4, 0x2}, {0x8, 0xfffffffffffffff8, 0x1, 0x8}, {0x40, 0x4, 0x1, 0x100000001}, {0x9b, 0x5, 0x1, 0xd64c}, {0x100, 0x8, 0x7, 0x3ff}, {0xf11, 0x200, 0x7, 0x2}, {0xac5, 0x0, 0x3, 0x7}, {0x518, 0x1, 0x80}, {0x6, 0x7f, 0x6, 0x7298}, {0x7, 0x1, 0x2, 0x1ec9}, {0x400, 0x2, 0x6, 0x6c3}, {0x100000001, 0x6, 0x5, 0x9}, {0x8, 0x1dae, 0xfffffffffffffff8, 0x101}, {0x2, 0x7, 0x8, 0x3}, {0x0, 0x45b, 0x7, 0x72}, {0x100000001, 0xc00000000000, 0x100000001, 0x8}, {0x100000001, 0x0, 0xfffffffffffffffc, 0x3}, {0x95, 0x90b, 0x0, 0xfffffffffffff565}, {0x0, 0x4, 0x0, 0x2}], 0x40}}}]}}, @common=@IDLETIMER={'IDLETIMER\x00', 0x28, {{0x7f, 'syz0\x00'}}}}]}, {0x0, '\x00', 0x2, 0xfffffffffffffffc}, {0x0, '\x00', 0x2, 0xffffffffffffffff, 0x2, [{{{0x11, 0x40, 0x87df, 'irlan0\x00', 'sit0\x00', 'veth0_to_team\x00', 'ip6gretap0\x00', @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [0xff, 0xff, 0xff, 0xff, 0x0, 0xff], @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [0x0, 0xff, 0x0, 0xff], 0xb0, 0x210, 0x258, [@time={'time\x00', 0x18, {{0x1ff, 0x1, 0xe063, 0xb6c5, 0x2e80, 0x0, 0x2}}}]}, [@common=@redirect={'redirect\x00', 0x8, {{0xffffffffffffffff}}}, @common=@SECMARK={'SECMARK\x00', 0x108, {{0x1, 0x6, 'system_u:object_r:lost_found_t:s0\x00'}}}]}, @common=@ERROR={'ERROR\x00', 0x20, {"4323eed968d7072e70de82f41331fe3aed2aedc8f2fff16e54b1c4e2ad07"}}}, {{{0x5, 0x54, 0x888d, 'ip6gretap0\x00', 'teql0\x00', 'veth1_to_team\x00', 'erspan0\x00', @random="0eae55d5aac5", [0x0, 0xff, 0x0, 0xff, 0xff, 0xff], @empty, [0xff, 0xff, 0xff, 0x0, 0xff, 0xff], 0x70, 0x70, 0xb8}}, @common=@RATEEST={'RATEEST\x00', 0x20, {{'syz0\x00', 0x9, 0x1, 0x4}}}}]}]}, 0x9a0) 2018/05/15 08:25:19 executing program 0: r0 = syz_open_dev$sndseq(&(0x7f0000000000)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_TIMER(r0, 0x40605346, &(0x7f00000000c0)) 2018/05/15 08:25:19 executing program 5: r0 = syz_open_procfs(0x0, &(0x7f0000000280)='net/ptype\x00') sendfile(r0, r0, &(0x7f0000000000)=0xffffffd, 0x7fffffff) recvmsg$netrom(r0, &(0x7f0000002900)={&(0x7f0000000040)=@ax25={0x3, {"80ebcaeb57c3fc"}, 0xffffffffffffffc1}, 0x10, &(0x7f0000001580)=[{&(0x7f00000002c0)="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", 0x1000}, {&(0x7f0000000080)="086e25750345067a59498b7a7e0872af8a31b8da569a7f0307aefae0c21e7bd40c9f863febc5fb0c70286e550c02f7fba947a9ae46c192adae4c0886c4096c38b16f5ccc75ef731e90942b7332ac6c8edad61171b2ef82650285d51971dd05d832ca8e9d76b97af7c7355f1a60f083313a96940664440c7afa4fc0ee37326f93969590b56eb1dce00ef4c1b097af41cb0a054c5cdfdb478fde5186b17b62269a7cc65fdbcf241dd06acaeadde8e80b0ecefeb4a63a5828335d48dfc926aef27df411c2f68e8785a3a26108604fbf50f3d0a63791227df5cae9fe24be02eb985e5b089bb6bf2ca8daca23de756c9a2296ada1c461af", 0xf5}, {&(0x7f0000000180)="ceac8ea2d93a247f48e04ca3ca84f5d3a3673988bcf1a42c9e8b49dc57bb97044b3d8769a041daffdb36a3034138ea39a999bd19c963fcb1edbb9bb92282882d814719b603a193024b5150c9698b21f53b846f45551ebba20913119a337520986761594c53a2581017a40aa2f1d5ec122453665b34eebec373939fec4f357c8e97069da4267a4e30c9ec838a210790ba13322086", 0x94}, {&(0x7f00000012c0)="d4ec003b7691d32133a6b0341c61ad95d467023e993ca4350f15f922ac3974c3aac4d8dfe74a23ee8c696c34908cea0980478b02a28089555214f55123e175d8cd8a", 0x42}, {&(0x7f0000001340)="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", 0xfc}, {&(0x7f0000001440)="812296a8e4cd62cc0e45111119a7486021d28cb30696b1f383365dd1bc4984792371d516ef07277c6803e2f0993264a20ff76c17c20adcefb7a44168d6e5f0d3c7b8b760b55b2e7aed60fbdf11e52416ff36034ac8cc5f3a6cb2b9c6171170002f61f1d0e2eeac362aa535c7c4856d33e88448fc01d02c696ac4ac2a093f2a7de729fef48892de6855571b8525486f7d876d0b537dbf94268f6602af1ca9b56d3cf4539042357dc7d979198d15a55bf13e", 0xb1}, {&(0x7f0000001500)="9e1de3c4fe89d8ed17a91a04564e6bcc3c616042b3d018767895442abd9b2ad9febdf2d8d5c2d9a590c50697b920ae0acab8285bfcb49091b333ec6a1a074c7b40e1dba6ddc77fd92bb36814", 0x4c}, {&(0x7f0000000240)="968fbeba3e6b0089ce46ba253b0b559d04acb7b07488", 0x16}], 0x8, &(0x7f0000001600)=[{0x1010, 0x109, 0xffffffff00000000, "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"}, {0xe0, 0x0, 0xc0, "794f2d4e3b788bf4c41e0a7f6d2745c06cba60bde8905c2be96dda497c526adcac25a0d869aa987ca64ee5891cf832c7ca9ec4412481d15046a3e8acd257e813a1aee9cd8b26806a841d82d502efd209141562243c8901682b0c25056ace1823023bd1d3d31cd2d576ffaac454da8f7c1fa1905a2fec4fcb80a899d0647e3ab537c89051b096698e962650d4b4449fbbdc71cee39dae680e35797c36852c0e7c8314f48fd00cc80bae300e7a39dc463c302ed8a537e36f7c9ee393d9684f1dd40cbf0d1520231484b180"}, {0x108, 0x13b, 0x6, "991b2ab9faefc275ef6c2da159077c2d25c76ee43778dae8a7d94415a04f638571e4d2f061463640a8a2b02435e3d2758c1853af23ac569ad29e41302beb4f18ad12133e4937501281824bd8b2eec66ccc1d65a5a29fcb79e8275ac1d2d25900b1874035e58152a5b7fdfe9bbea2f6442fc7cc725b5a7587dc6121285474d40dd0d8082e405cd1f3fcd2ba45a9338dd339e21ef71b36bb9db85deeaf121a8f1547856225477b360984428220f15306a9d8b07140d9754d0003b89e1594f3ca65be5090ff9a588079be4cfa4b24e82b48a28d6654cde0a17aa79b21781ad44c0f1951eaec4585c08f33c1867ebaa9718c407d4f32c0"}, {0x28, 0x10e, 0x1, "fca7320e7bbbb4ca1dae61466caf69b3bb"}, {0x30, 0x1ff, 0x1, "800088639aadba5e7047cb8241283442766abd7f44ec0a7d21df1b"}, {0x68, 0x112, 0x5, "d8f3ef28c8231b0858a85f598dce5f73129f97fcf49f87673efdd7953af0bcca588cc0d5e194dc3f90dd4300b1ad0b5fa93363fd76cfd2d14f4e890f341bd203097f2496ebab87c4c354ec16ec737e547bf8"}, {0x40, 0x0, 0x40, "160ed6508b4cfaa341d6940662f56b5560ff18313fb729f0e640782e0614d366953bb37c2f9885e1885e1b8b2a3909"}], 0x12f8, 0x4090}, 0x1) setsockopt$packet_rx_ring(r0, 0x107, 0x5, &(0x7f0000002940)=@req3={0x9, 0x10000, 0x7, 0x8, 0x1000, 0x1, 0x20}, 0x1c) 2018/05/15 08:25:19 executing program 2: syz_emit_ethernet(0x3e, &(0x7f00000001c0)={@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, @dev={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa]}, [], {@ipv6={0x86dd, {0x0, 0x6, "50a09c", 0x8, 0x0, 0x0, @remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x89ffffff], 0xbb}, @local={0xfe, 0x80, [], 0xaa}, {[], @udp={0x0, 0x0, 0x8}}}}}}, &(0x7f0000000040)) 2018/05/15 08:25:19 executing program 4: r0 = syz_open_dev$evdev(&(0x7f00000009c0)='/dev/input/event#\x00', 0xfffffffffffffffc, 0x5) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000000)=ANY=[@ANYBLOB="7f454c46000000000000000000000000110000e5ffd00509"], 0x18) 2018/05/15 08:25:19 executing program 6: r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x0, 0x0, @ipv4={[], [0xff, 0xff], @rand_addr}}, 0x1c) setsockopt$inet6_IPV6_ADDRFORM(r0, 0x29, 0x1, &(0x7f0000000000)=0x2, 0x4) 2018/05/15 08:25:20 executing program 3: syz_emit_ethernet(0x3e, &(0x7f00000001c0)={@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, @dev={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa]}, [], {@ipv6={0x86dd, {0x0, 0x6, "50a09c", 0x8, 0xffffff87, 0x0, @remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0xe80], 0xbb}, @local={0xfe, 0x80, [], 0xaa}, {[], @udp={0x0, 0x0, 0x8}}}}}}, &(0x7f0000000040)) 2018/05/15 08:25:20 executing program 0: unshare(0x400) syz_genetlink_get_family_id$ipvs(&(0x7f0000000140)='IPVS\x00') 2018/05/15 08:25:20 executing program 7: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup(r0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000d40)=@broute={'broute\x00', 0x20, 0x4, 0x928, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000400], 0x0, &(0x7f0000000000), &(0x7f0000000400)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x2, [{{{0x5, 0x0, 0x0, 'bcsh0\x00', 'sit0\x00', 'syzkaller1\x00', 'veth0\x00', @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [], @dev={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa]}, [], 0x1d8, 0x228, 0x258, [@comment={'comment\x00', 0x100}, @owner={'owner\x00', 0x18}]}, [@common=@LED={'LED\x00', 0x28, {{'syz0\x00'}}}]}, @common=@redirect={'redirect\x00', 0x8}}, {{{0x11, 0x0, 0x0, 'veth1_to_bond\x00', 'erspan0\x00', 'bridge_slave_1\x00', 'veth0_to_bridge\x00', @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [], @random="cfa071dc33d9", [0x0, 0x0, 0x0, 0xff, 0xff, 0xff], 0x2e0, 0x2e0, 0x330, [@mac={'mac\x00', 0x10, {{@remote={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xbb}, 0x1}}}, @bpf0={'bpf\x00', 0x210, {{0x20, [{0x8000, 0x4902, 0x5, 0x3ff}, {0x5, 0x8, 0x2, 0xff}, {0x1000, 0x48000000000, 0x3}, {0xf7, 0x1f, 0xfffffffffffffe00, 0x1}, {0x10000, 0xfc0, 0x1, 0x6}, {0x4, 0x2, 0xcefa, 0x81}, {0x815, 0xc7, 0x8001, 0x6a0}, {0x40, 0x0, 0x9, 0x80000001}, {0xffffffffffffff53, 0x38a, 0x100000000, 0x7}, {0x5, 0x1, 0x1000, 0x10001}, {0x80000000, 0x7, 0x1, 0xf7}, {0x2, 0x9, 0x4c, 0x5}, {0xfffffffffffffff7, 0x0, 0xe74, 0x52a}, {0x1ff, 0x7, 0x3, 0x7}, {0x6, 0x1ff, 0x49, 0x7}, {0x8000, 0x0, 0x7, 0x684}, {0xffe, 0x988, 0x3, 0x1}, {0x7b, 0x5a07, 0x18, 0x7}, {0xfffffffffffffffe, 0xfff, 0x3, 0x178180a0}, {0x2, 0xc0, 0x6, 0x401}, {0x5, 0x3, 0x8, 0x8}, {0xffffffffffff0001, 0x3, 0xfffffffffffffff7, 0x5}, {0x1ff, 0x8001, 0x3}, {0x3, 0x9, 0xffffffff, 0x2}, {0x5, 0x4, 0x574, 0x64c}, {0x5, 0x4, 0x10001, 0x6}, {0x1, 0x5b2c, 0x3ff, 0x7}, {0xff, 0x2, 0x5, 0x62c5fc18}, {0x101, 0x7, 0x2, 0xfffffffffffffffd}, {0x7fff, 0x6, 0x8, 0x4}, {0x9, 0x0, 0x7, 0xff}, {0x4, 0x4, 0x4, 0x10000}, {0x59b0, 0xfff, 0x4, 0x4}, {0x1f, 0xfffffffffffffffd, 0x8001, 0x800}, {0x0, 0xffffffffffffffff, 0x2, 0x65}, {0x1ff, 0x1, 0x2, 0x7ff}, {0x4, 0x5, 0x1, 0x7be}, {0x9e4, 0x0, 0x7, 0x5}, {0x5, 0x8, 0x7f, 0xffffffff}, {0x4, 0x6, 0x5, 0x7ff}, {0x22aaaf52, 0x8f, 0x6, 0x10000}, {0x2, 0x7, 0xffff}, {0x5, 0xfffffffff016eb50, 0x82, 0x7}, {0x38, 0x800, 0x9a2a, 0xfffffffffffffffc}, {0x5, 0xb, 0x4, 0xfffffffffffff001}, {0x8b5, 0x81, 0x4, 0x2}, {0x8, 0xfffffffffffffff8, 0x1, 0x8}, {0x40, 0x4, 0x1, 0x100000001}, {0x9b, 0x5, 0x1, 0xd64c}, {0x100, 0x8, 0x7, 0x3ff}, {0xf11, 0x200, 0x7, 0x2}, {0xac5, 0x0, 0x3, 0x7}, {0x518, 0x1, 0x80}, {0x6, 0x7f, 0x6, 0x7298}, {0x7, 0x1, 0x2, 0x1ec9}, {0x400, 0x2, 0x6, 0x6c3}, {0x100000001, 0x6, 0x5, 0x9}, {0x8, 0x1dae, 0xfffffffffffffff8, 0x101}, {0x2, 0x7, 0x8, 0x3}, {0x0, 0x45b, 0x7, 0x72}, {0x100000001, 0xc00000000000, 0x100000001, 0x8}, {0x100000001, 0x0, 0xfffffffffffffffc, 0x3}, {0x95, 0x90b, 0x0, 0xfffffffffffff565}, {0x0, 0x4, 0x0, 0x2}], 0x40}}}]}}, @common=@IDLETIMER={'IDLETIMER\x00', 0x28, {{0x7f, 'syz0\x00'}}}}]}, {0x0, '\x00', 0x2, 0xfffffffffffffffc}, {0x0, '\x00', 0x2, 0xffffffffffffffff, 0x2, [{{{0x11, 0x40, 0x87df, 'irlan0\x00', 'sit0\x00', 'veth0_to_team\x00', 'ip6gretap0\x00', @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [0xff, 0xff, 0xff, 0xff, 0x0, 0xff], @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [0x0, 0xff, 0x0, 0xff], 0xb0, 0x210, 0x258, [@time={'time\x00', 0x18, {{0x1ff, 0x1, 0xe063, 0xb6c5, 0x2e80, 0x0, 0x2}}}]}, [@common=@redirect={'redirect\x00', 0x8, {{0xffffffffffffffff}}}, @common=@SECMARK={'SECMARK\x00', 0x108, {{0x1, 0x6, 'system_u:object_r:lost_found_t:s0\x00'}}}]}, @common=@ERROR={'ERROR\x00', 0x20, {"4323eed968d7072e70de82f41331fe3aed2aedc8f2fff16e54b1c4e2ad07"}}}, {{{0x5, 0x54, 0x888d, 'ip6gretap0\x00', 'teql0\x00', 'veth1_to_team\x00', 'erspan0\x00', @random="0eae55d5aac5", [0x0, 0xff, 0x0, 0xff, 0xff, 0xff], @empty, [0xff, 0xff, 0xff, 0x0, 0xff, 0xff], 0x70, 0x70, 0xb8}}, @common=@RATEEST={'RATEEST\x00', 0x20, {{'syz0\x00', 0x9, 0x1, 0x4}}}}]}]}, 0x9a0) 2018/05/15 08:25:20 executing program 2: syz_emit_ethernet(0x3e, &(0x7f00000001c0)={@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, @dev={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa]}, [], {@ipv6={0x86dd, {0x0, 0x6, "50a09c", 0x8, 0x0, 0x0, @remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x2800000000000000], 0xbb}, @local={0xfe, 0x80, [], 0xaa}, {[], @udp={0x0, 0x0, 0x8}}}}}}, &(0x7f0000000040)) 2018/05/15 08:25:20 executing program 5: r0 = getpgrp(0x0) r1 = openat$rfkill(0xffffffffffffff9c, &(0x7f0000000040)='/dev/rfkill\x00', 0x4200, 0x0) ioctl$BLKRESETZONE(r1, 0x40101283, &(0x7f0000000080)={0x7fffffff, 0x8}) read(r1, &(0x7f00000000c0)=""/176, 0xb0) r2 = syz_open_procfs(r0, &(0x7f0000000280)='net/ptype\x00') getsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER(r2, 0x84, 0x7b, &(0x7f0000000180)={0x0, 0x9}, &(0x7f00000001c0)=0x8) getsockopt$inet_sctp6_SCTP_MAXSEG(r2, 0x84, 0xd, &(0x7f0000000200)=@assoc_id=r3, &(0x7f0000000240)=0x4) sendfile(r2, r2, &(0x7f0000000000)=0xffffffd, 0x7fffffff) 2018/05/15 08:25:20 executing program 6: r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x0, 0x0, @ipv4={[], [0xff, 0xff], @rand_addr}}, 0x1c) setsockopt$inet6_IPV6_ADDRFORM(r0, 0x29, 0x1, &(0x7f0000000000)=0x2, 0x4) 2018/05/15 08:25:20 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f0000000280)="6e65742f6970365f7461626c65735f6d61746368657300b6e23bcf6093cb57f8b4d285e9c48608549acee9a66f09d47a011dcc8f5af7870c6c1b6eebe85ebea4ecda4e44def87e8ee568c843daaf2805944012bc0144937e8b04411d09016ca07f7388ded591e346fb612397e79a6fe43e5c6a86bee1565b17b22b8ed5c95b4afbb3a620d1402c50bbaad790d0ffdb7c5a27e60423079f77bf") unlink(&(0x7f0000000080)='./file0\x00') ioctl$KDGKBMETA(r0, 0x4b62, &(0x7f0000000100)) getsockopt$inet_sctp_SCTP_PARTIAL_DELIVERY_POINT(r0, 0x84, 0x13, &(0x7f0000000140)={0x0, 0xfffffffffffffffa}, &(0x7f0000000180)=0x8) syslog(0x2, &(0x7f0000000cc0)=""/107, 0x6b) setsockopt$IP_VS_SO_SET_DEL(r0, 0x0, 0x484, &(0x7f0000000200)={0x87, @dev={0xac, 0x14, 0x14, 0x1a}, 0x4e24, 0x2, 'rr\x00', 0x3, 0x2, 0x66}, 0x2c) setsockopt$inet_sctp_SCTP_STREAM_SCHEDULER(r0, 0x84, 0x7b, &(0x7f00000001c0)={r1, 0x40ef2843}, 0x8) setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x40, &(0x7f0000000340)=ANY=[@ANYBLOB="73656375726974790000000000000000000000000000000000000000000000000e00000004000000f8030000fffffffff00000000000000000000000ffffffffffffffff600300006003000060030000ffffffff04000000", @ANYPTR=&(0x7f0000000d40)=ANY=[@ANYBLOB="000000000000000000000000002100ebe70048ca02fec408edfbaf31ba590218fdffffffffffd60000000000000000000000000000000000000000000000000021d13202a6d3d3de0000000000000000000000"], @ANYBLOB="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"], 0x458) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000000)='dctcp\x00', 0x6) 2018/05/15 08:25:20 executing program 4: r0 = syz_open_dev$evdev(&(0x7f00000009c0)='/dev/input/event#\x00', 0xfffffffffffffffc, 0x5) write$binfmt_elf64(r0, &(0x7f0000000000)=ANY=[], 0x0) 2018/05/15 08:25:20 executing program 0: r0 = syz_open_dev$tun(&(0x7f0000000100)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000040)={'\x00', 0x103}) userfaultfd(0x0) getpeername$ipx(0xffffffffffffffff, &(0x7f0000000180), &(0x7f00000001c0)=0x10) 2018/05/15 08:25:20 executing program 4: r0 = syz_open_dev$evdev(&(0x7f00000009c0)='/dev/input/event#\x00', 0xfffffffffffffffc, 0x5) write$binfmt_elf64(r0, &(0x7f0000000000)=ANY=[], 0x0) 2018/05/15 08:25:20 executing program 2: syz_emit_ethernet(0x3e, &(0x7f00000001c0)={@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, @dev={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa]}, [], {@ipv6={0x86dd, {0x0, 0x6, "50a09c", 0x8, 0x0, 0x0, @remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x800e0000], 0xbb}, @local={0xfe, 0x80, [], 0xaa}, {[], @udp={0x0, 0x0, 0x8}}}}}}, &(0x7f0000000040)) 2018/05/15 08:25:20 executing program 5: r0 = syz_open_procfs(0x0, &(0x7f0000000280)='net/ptype\x00') syz_open_dev$dmmidi(&(0x7f0000000040)='/dev/dmmidi#\x00', 0x8000, 0x40000) sendfile(r0, r0, &(0x7f0000000000)=0xffffffd, 0x7fffffff) 2018/05/15 08:25:20 executing program 7: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup(r0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000d40)=@broute={'broute\x00', 0x20, 0x4, 0x928, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000400], 0x0, &(0x7f0000000000), &(0x7f0000000400)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x2, [{{{0x5, 0x0, 0x0, 'bcsh0\x00', 'sit0\x00', 'syzkaller1\x00', 'veth0\x00', @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [], @dev={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa]}, [], 0x1d8, 0x228, 0x258, [@comment={'comment\x00', 0x100}, @owner={'owner\x00', 0x18}]}, [@common=@LED={'LED\x00', 0x28, {{'syz0\x00'}}}]}, @common=@redirect={'redirect\x00', 0x8}}, {{{0x11, 0x0, 0x0, 'veth1_to_bond\x00', 'erspan0\x00', 'bridge_slave_1\x00', 'veth0_to_bridge\x00', @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [], @random="cfa071dc33d9", [0x0, 0x0, 0x0, 0x0, 0xff, 0xff], 0x2e0, 0x2e0, 0x330, [@mac={'mac\x00', 0x10, {{@remote={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xbb}, 0x1}}}, @bpf0={'bpf\x00', 0x210, {{0x20, [{0x8000, 0x4902, 0x5, 0x3ff}, {0x5, 0x8, 0x2, 0xff}, {0x1000, 0x48000000000, 0x3}, {0xf7, 0x1f, 0xfffffffffffffe00, 0x1}, {0x10000, 0xfc0, 0x1, 0x6}, {0x4, 0x2, 0xcefa, 0x81}, {0x815, 0xc7, 0x8001, 0x6a0}, {0x40, 0x0, 0x9, 0x80000001}, {0xffffffffffffff53, 0x38a, 0x100000000, 0x7}, {0x5, 0x1, 0x1000, 0x10001}, {0x80000000, 0x7, 0x1, 0xf7}, {0x2, 0x9, 0x4c, 0x5}, {0xfffffffffffffff7, 0x0, 0xe74, 0x52a}, {0x1ff, 0x7, 0x3, 0x7}, {0x6, 0x1ff, 0x49, 0x7}, {0x8000, 0x0, 0x7, 0x684}, {0xffe, 0x988, 0x3, 0x1}, {0x7b, 0x5a07, 0x18, 0x7}, {0xfffffffffffffffe, 0xfff, 0x3, 0x178180a0}, {0x2, 0xc0, 0x6, 0x401}, {0x5, 0x3, 0x8, 0x8}, {0xffffffffffff0001, 0x3, 0xfffffffffffffff7, 0x5}, {0x1ff, 0x8001, 0x3}, {0x3, 0x9, 0xffffffff, 0x2}, {0x5, 0x4, 0x574, 0x64c}, {0x5, 0x4, 0x10001, 0x6}, {0x1, 0x5b2c, 0x3ff, 0x7}, {0xff, 0x2, 0x5, 0x62c5fc18}, {0x101, 0x7, 0x2, 0xfffffffffffffffd}, {0x7fff, 0x6, 0x8, 0x4}, {0x9, 0x0, 0x7, 0xff}, {0x4, 0x4, 0x4, 0x10000}, {0x59b0, 0xfff, 0x4, 0x4}, {0x1f, 0xfffffffffffffffd, 0x8001, 0x800}, {0x0, 0xffffffffffffffff, 0x2, 0x65}, {0x1ff, 0x1, 0x2, 0x7ff}, {0x4, 0x5, 0x1, 0x7be}, {0x9e4, 0x0, 0x7, 0x5}, {0x5, 0x8, 0x7f, 0xffffffff}, {0x4, 0x6, 0x5, 0x7ff}, {0x22aaaf52, 0x8f, 0x6, 0x10000}, {0x2, 0x7, 0xffff}, {0x5, 0xfffffffff016eb50, 0x82, 0x7}, {0x38, 0x800, 0x9a2a, 0xfffffffffffffffc}, {0x5, 0xb, 0x4, 0xfffffffffffff001}, {0x8b5, 0x81, 0x4, 0x2}, {0x8, 0xfffffffffffffff8, 0x1, 0x8}, {0x40, 0x4, 0x1, 0x100000001}, {0x9b, 0x5, 0x1, 0xd64c}, {0x100, 0x8, 0x7, 0x3ff}, {0xf11, 0x200, 0x7, 0x2}, {0xac5, 0x0, 0x3, 0x7}, {0x518, 0x1, 0x80}, {0x6, 0x7f, 0x6, 0x7298}, {0x7, 0x1, 0x2, 0x1ec9}, {0x400, 0x2, 0x6, 0x6c3}, {0x100000001, 0x6, 0x5, 0x9}, {0x8, 0x1dae, 0xfffffffffffffff8, 0x101}, {0x2, 0x7, 0x8, 0x3}, {0x0, 0x45b, 0x7, 0x72}, {0x100000001, 0xc00000000000, 0x100000001, 0x8}, {0x100000001, 0x0, 0xfffffffffffffffc, 0x3}, {0x95, 0x90b, 0x0, 0xfffffffffffff565}, {0x0, 0x4, 0x0, 0x2}], 0x40}}}]}}, @common=@IDLETIMER={'IDLETIMER\x00', 0x28, {{0x7f, 'syz0\x00'}}}}]}, {0x0, '\x00', 0x2, 0xfffffffffffffffc}, {0x0, '\x00', 0x2, 0xffffffffffffffff, 0x2, [{{{0x11, 0x40, 0x87df, 'irlan0\x00', 'sit0\x00', 'veth0_to_team\x00', 'ip6gretap0\x00', @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [0xff, 0xff, 0xff, 0xff, 0x0, 0xff], @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [0x0, 0xff, 0x0, 0xff], 0xb0, 0x210, 0x258, [@time={'time\x00', 0x18, {{0x1ff, 0x1, 0xe063, 0xb6c5, 0x2e80, 0x0, 0x2}}}]}, [@common=@redirect={'redirect\x00', 0x8, {{0xffffffffffffffff}}}, @common=@SECMARK={'SECMARK\x00', 0x108, {{0x1, 0x6, 'system_u:object_r:lost_found_t:s0\x00'}}}]}, @common=@ERROR={'ERROR\x00', 0x20, {"4323eed968d7072e70de82f41331fe3aed2aedc8f2fff16e54b1c4e2ad07"}}}, {{{0x5, 0x54, 0x888d, 'ip6gretap0\x00', 'teql0\x00', 'veth1_to_team\x00', 'erspan0\x00', @random="0eae55d5aac5", [0x0, 0xff, 0x0, 0xff, 0xff, 0xff], @empty, [0xff, 0xff, 0xff, 0x0, 0xff, 0xff], 0x70, 0x70, 0xb8}}, @common=@RATEEST={'RATEEST\x00', 0x20, {{'syz0\x00', 0x9, 0x1, 0x4}}}}]}]}, 0x9a0) 2018/05/15 08:25:20 executing program 6: r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x0, 0x0, @ipv4={[], [0xff, 0xff], @rand_addr}}, 0x1c) setsockopt$inet6_IPV6_ADDRFORM(r0, 0x29, 0x1, &(0x7f0000000000)=0x2, 0x4) 2018/05/15 08:25:20 executing program 3: syz_emit_ethernet(0x3e, &(0x7f00000001c0)={@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, @dev={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa]}, [], {@ipv6={0x86dd, {0x0, 0x6, "50a09c", 0x8, 0xffffff87, 0x0, @remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x8100000000000000], 0xbb}, @local={0xfe, 0x80, [], 0xaa}, {[], @udp={0x0, 0x0, 0x8}}}}}}, &(0x7f0000000040)) 2018/05/15 08:25:21 executing program 4: r0 = syz_open_dev$evdev(&(0x7f00000009c0)='/dev/input/event#\x00', 0xfffffffffffffffc, 0x5) write$binfmt_elf64(r0, &(0x7f0000000000)=ANY=[], 0x0) 2018/05/15 08:25:21 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f0000000280)="6e65742f6970365f7461626c65735f6d61746368657300b6e23bcf6093cb57f8b4d285e9c48608549acee9a66f09d47a011dcc8f5af7870c6c1b6eebe85ebea4ecda4e44def87e8ee568c843daaf2805944012bc0144937e8b04411d09016ca07f7388ded591e346fb612397e79a6fe43e5c6a86bee1565b17b22b8ed5c95b4afbb3a620d1402c50bbaad790d0ffdb7c5a27e60423079f77bf") unlink(&(0x7f0000000080)='./file0\x00') ioctl$KDGKBMETA(r0, 0x4b62, &(0x7f0000000100)) getsockopt$inet_sctp_SCTP_PARTIAL_DELIVERY_POINT(r0, 0x84, 0x13, &(0x7f0000000140)={0x0, 0xfffffffffffffffa}, &(0x7f0000000180)=0x8) syslog(0x2, &(0x7f0000000cc0)=""/107, 0x6b) setsockopt$IP_VS_SO_SET_DEL(r0, 0x0, 0x484, &(0x7f0000000200)={0x87, @dev={0xac, 0x14, 0x14, 0x1a}, 0x4e24, 0x2, 'rr\x00', 0x3, 0x2, 0x66}, 0x2c) setsockopt$inet_sctp_SCTP_STREAM_SCHEDULER(r0, 0x84, 0x7b, &(0x7f00000001c0)={r1, 0x40ef2843}, 0x8) setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x40, &(0x7f0000000340)=ANY=[@ANYBLOB="73656375726974790000000000000000000000000000000000000000000000000e00000004000000f8030000fffffffff00000000000000000000000ffffffffffffffff600300006003000060030000ffffffff04000000", @ANYPTR=&(0x7f0000000d40)=ANY=[@ANYBLOB="000000000000000000000000002100ebe70048ca02fec408edfbaf31ba590218fdffffffffffd60000000000000000000000000000000000000000000000000021d13202a6d3d3de0000000000000000000000"], @ANYBLOB="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"], 0x458) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000000)='dctcp\x00', 0x6) 2018/05/15 08:25:21 executing program 2: syz_emit_ethernet(0x3e, &(0x7f00000001c0)={@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, @dev={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa]}, [], {@ipv6={0x86dd, {0x0, 0x6, "50a09c", 0x8, 0x0, 0x0, @remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0xc0ffffff], 0xbb}, @local={0xfe, 0x80, [], 0xaa}, {[], @udp={0x0, 0x0, 0x8}}}}}}, &(0x7f0000000040)) 2018/05/15 08:25:21 executing program 5: r0 = pkey_alloc(0x0, 0x1) pkey_mprotect(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x9, r0) openat$mixer(0xffffffffffffff9c, &(0x7f0000000080)='/dev/mixer\x00', 0x800003fb, 0x0) syz_mount_image$btrfs(&(0x7f00000000c0)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x7fffffff, 0x1, &(0x7f0000000200)=[{&(0x7f0000000140)="bc6024c83daf60b1a072759dab438cf7752ca1d2765cd96b7b48a1f4e057103b7cac528e7e6ebf467770db62f6e5a4b777708df79604054613d168c2c012a56ad23c7380107e2fc696c51928e243f09b5d423f02a5050d1bf262ff927ab789ed0a0e44e1dd3f6e2020ed764990189f564e455bd3630f2bd27f56115948cc4599ebdf19de1b17c029548763397d4f2d523240a3525a51e53d1437c6c9398aa08614e89d7b9baa267c2f8161a07c2f997176ed8d224cce4154767ae4108fac", 0xbe, 0x7fffffff}], 0x0, &(0x7f00000002c0)={[{@space_cache_v2='space_cache=v2', 0x2c}, {@noflushoncommit='noflushoncommit', 0x2c}, {@treelog='treelog', 0x2c}, {@nospace_cache='nospace_cache', 0x2c}, {@space_cache='space_cache', 0x2c}, {@skip_balance='skip_balance', 0x2c}, {@noautodefrag='noautodefrag', 0x2c}, {@fragment_metadata='fragment=metadata', 0x2c}, {@nodatasum='nodatasum', 0x2c}]}) r1 = syz_open_procfs(0x0, &(0x7f0000000280)='net/ptype\x00') ioctl$EVIOCSKEYCODE(r1, 0x40084504, &(0x7f0000000040)=[0x9, 0x9b9]) sendfile(r1, r1, &(0x7f0000000000)=0xffffffd, 0x7fffffff) 2018/05/15 08:25:21 executing program 6: r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_IPV6_ADDRFORM(r0, 0x29, 0x1, &(0x7f0000000000)=0x2, 0x4) 2018/05/15 08:25:21 executing program 3: syz_emit_ethernet(0x3e, &(0x7f00000001c0)={@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, @dev={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa]}, [], {@ipv6={0x86dd, {0x0, 0x6, "50a09c", 0x8, 0xffffff87, 0x0, @remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x8906], 0xbb}, @local={0xfe, 0x80, [], 0xaa}, {[], @udp={0x0, 0x0, 0x8}}}}}}, &(0x7f0000000040)) 2018/05/15 08:25:21 executing program 0: r0 = syz_open_dev$tun(&(0x7f0000000100)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETQUEUE(r0, 0x400454d9, &(0x7f0000000000)={'syzkaller1\x00', 0x400}) 2018/05/15 08:25:21 executing program 7: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup(r0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000d40)=@broute={'broute\x00', 0x20, 0x4, 0x928, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000400], 0x0, &(0x7f0000000000), &(0x7f0000000400)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x2, [{{{0x5, 0x0, 0x0, 'bcsh0\x00', 'sit0\x00', 'syzkaller1\x00', 'veth0\x00', @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [], @dev={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa]}, [], 0x1d8, 0x228, 0x258, [@comment={'comment\x00', 0x100}, @owner={'owner\x00', 0x18}]}, [@common=@LED={'LED\x00', 0x28, {{'syz0\x00'}}}]}, @common=@redirect={'redirect\x00', 0x8}}, {{{0x11, 0x0, 0x0, 'veth1_to_bond\x00', 'erspan0\x00', 'bridge_slave_1\x00', 'veth0_to_bridge\x00', @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [], @random="cfa071dc33d9", [0x0, 0x0, 0x0, 0x0, 0x0, 0xff], 0x2e0, 0x2e0, 0x330, [@mac={'mac\x00', 0x10, {{@remote={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xbb}, 0x1}}}, @bpf0={'bpf\x00', 0x210, {{0x20, [{0x8000, 0x4902, 0x5, 0x3ff}, {0x5, 0x8, 0x2, 0xff}, {0x1000, 0x48000000000, 0x3}, {0xf7, 0x1f, 0xfffffffffffffe00, 0x1}, {0x10000, 0xfc0, 0x1, 0x6}, {0x4, 0x2, 0xcefa, 0x81}, {0x815, 0xc7, 0x8001, 0x6a0}, {0x40, 0x0, 0x9, 0x80000001}, {0xffffffffffffff53, 0x38a, 0x100000000, 0x7}, {0x5, 0x1, 0x1000, 0x10001}, {0x80000000, 0x7, 0x1, 0xf7}, {0x2, 0x9, 0x4c, 0x5}, {0xfffffffffffffff7, 0x0, 0xe74, 0x52a}, {0x1ff, 0x7, 0x3, 0x7}, {0x6, 0x1ff, 0x49, 0x7}, {0x8000, 0x0, 0x7, 0x684}, {0xffe, 0x988, 0x3, 0x1}, {0x7b, 0x5a07, 0x18, 0x7}, {0xfffffffffffffffe, 0xfff, 0x3, 0x178180a0}, {0x2, 0xc0, 0x6, 0x401}, {0x5, 0x3, 0x8, 0x8}, {0xffffffffffff0001, 0x3, 0xfffffffffffffff7, 0x5}, {0x1ff, 0x8001, 0x3}, {0x3, 0x9, 0xffffffff, 0x2}, {0x5, 0x4, 0x574, 0x64c}, {0x5, 0x4, 0x10001, 0x6}, {0x1, 0x5b2c, 0x3ff, 0x7}, {0xff, 0x2, 0x5, 0x62c5fc18}, {0x101, 0x7, 0x2, 0xfffffffffffffffd}, {0x7fff, 0x6, 0x8, 0x4}, {0x9, 0x0, 0x7, 0xff}, {0x4, 0x4, 0x4, 0x10000}, {0x59b0, 0xfff, 0x4, 0x4}, {0x1f, 0xfffffffffffffffd, 0x8001, 0x800}, {0x0, 0xffffffffffffffff, 0x2, 0x65}, {0x1ff, 0x1, 0x2, 0x7ff}, {0x4, 0x5, 0x1, 0x7be}, {0x9e4, 0x0, 0x7, 0x5}, {0x5, 0x8, 0x7f, 0xffffffff}, {0x4, 0x6, 0x5, 0x7ff}, {0x22aaaf52, 0x8f, 0x6, 0x10000}, {0x2, 0x7, 0xffff}, {0x5, 0xfffffffff016eb50, 0x82, 0x7}, {0x38, 0x800, 0x9a2a, 0xfffffffffffffffc}, {0x5, 0xb, 0x4, 0xfffffffffffff001}, {0x8b5, 0x81, 0x4, 0x2}, {0x8, 0xfffffffffffffff8, 0x1, 0x8}, {0x40, 0x4, 0x1, 0x100000001}, {0x9b, 0x5, 0x1, 0xd64c}, {0x100, 0x8, 0x7, 0x3ff}, {0xf11, 0x200, 0x7, 0x2}, {0xac5, 0x0, 0x3, 0x7}, {0x518, 0x1, 0x80}, {0x6, 0x7f, 0x6, 0x7298}, {0x7, 0x1, 0x2, 0x1ec9}, {0x400, 0x2, 0x6, 0x6c3}, {0x100000001, 0x6, 0x5, 0x9}, {0x8, 0x1dae, 0xfffffffffffffff8, 0x101}, {0x2, 0x7, 0x8, 0x3}, {0x0, 0x45b, 0x7, 0x72}, {0x100000001, 0xc00000000000, 0x100000001, 0x8}, {0x100000001, 0x0, 0xfffffffffffffffc, 0x3}, {0x95, 0x90b, 0x0, 0xfffffffffffff565}, {0x0, 0x4, 0x0, 0x2}], 0x40}}}]}}, @common=@IDLETIMER={'IDLETIMER\x00', 0x28, {{0x7f, 'syz0\x00'}}}}]}, {0x0, '\x00', 0x2, 0xfffffffffffffffc}, {0x0, '\x00', 0x2, 0xffffffffffffffff, 0x2, [{{{0x11, 0x40, 0x87df, 'irlan0\x00', 'sit0\x00', 'veth0_to_team\x00', 'ip6gretap0\x00', @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [0xff, 0xff, 0xff, 0xff, 0x0, 0xff], @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [0x0, 0xff, 0x0, 0xff], 0xb0, 0x210, 0x258, [@time={'time\x00', 0x18, {{0x1ff, 0x1, 0xe063, 0xb6c5, 0x2e80, 0x0, 0x2}}}]}, [@common=@redirect={'redirect\x00', 0x8, {{0xffffffffffffffff}}}, @common=@SECMARK={'SECMARK\x00', 0x108, {{0x1, 0x6, 'system_u:object_r:lost_found_t:s0\x00'}}}]}, @common=@ERROR={'ERROR\x00', 0x20, {"4323eed968d7072e70de82f41331fe3aed2aedc8f2fff16e54b1c4e2ad07"}}}, {{{0x5, 0x54, 0x888d, 'ip6gretap0\x00', 'teql0\x00', 'veth1_to_team\x00', 'erspan0\x00', @random="0eae55d5aac5", [0x0, 0xff, 0x0, 0xff, 0xff, 0xff], @empty, [0xff, 0xff, 0xff, 0x0, 0xff, 0xff], 0x70, 0x70, 0xb8}}, @common=@RATEEST={'RATEEST\x00', 0x20, {{'syz0\x00', 0x9, 0x1, 0x4}}}}]}]}, 0x9a0) 2018/05/15 08:25:21 executing program 6: connect$inet6(0xffffffffffffffff, &(0x7f0000000080)={0xa, 0x0, 0x0, @ipv4={[], [0xff, 0xff], @rand_addr}}, 0x1c) setsockopt$inet6_IPV6_ADDRFORM(0xffffffffffffffff, 0x29, 0x1, &(0x7f0000000000)=0x2, 0x4) 2018/05/15 08:25:21 executing program 2: syz_emit_ethernet(0x3e, &(0x7f00000001c0)={@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, @dev={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa]}, [], {@ipv6={0x86dd, {0x0, 0x6, "50a09c", 0x8, 0x0, 0x0, @remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x8906], 0xbb}, @local={0xfe, 0x80, [], 0xaa}, {[], @udp={0x0, 0x0, 0x8}}}}}}, &(0x7f0000000040)) 2018/05/15 08:25:21 executing program 4: r0 = syz_open_dev$evdev(&(0x7f00000009c0)='/dev/input/event#\x00', 0xfffffffffffffffc, 0x5) write$binfmt_elf64(r0, &(0x7f0000000000)=ANY=[@ANYBLOB], 0x0) 2018/05/15 08:25:21 executing program 3: syz_emit_ethernet(0x3e, &(0x7f00000001c0)={@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, @dev={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa]}, [], {@ipv6={0x86dd, {0x0, 0x6, "50a09c", 0x8, 0xffffff87, 0x0, @remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x5], 0xbb}, @local={0xfe, 0x80, [], 0xaa}, {[], @udp={0x0, 0x0, 0x8}}}}}}, &(0x7f0000000040)) 2018/05/15 08:25:21 executing program 0: r0 = socket$can_raw(0x1d, 0x3, 0x1) r1 = dup(r0) getsockopt$inet_udp_int(r1, 0x11, 0x0, &(0x7f0000000000), &(0x7f0000000040)=0x4) 2018/05/15 08:25:21 executing program 7: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup(r0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000d40)=@broute={'broute\x00', 0x20, 0x4, 0x928, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000400], 0x0, &(0x7f0000000000), &(0x7f0000000400)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x2, [{{{0x5, 0x0, 0x0, 'bcsh0\x00', 'sit0\x00', 'syzkaller1\x00', 'veth0\x00', @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [], @dev={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa]}, [], 0x1d8, 0x228, 0x258, [@comment={'comment\x00', 0x100}, @owner={'owner\x00', 0x18}]}, [@common=@LED={'LED\x00', 0x28, {{'syz0\x00'}}}]}, @common=@redirect={'redirect\x00', 0x8}}, {{{0x11, 0x0, 0x0, 'veth1_to_bond\x00', 'erspan0\x00', 'bridge_slave_1\x00', 'veth0_to_bridge\x00', @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [], @random="cfa071dc33d9", [], 0x2e0, 0x2e0, 0x330, [@mac={'mac\x00', 0x10, {{@remote={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xbb}, 0x1}}}, @bpf0={'bpf\x00', 0x210, {{0x20, [{0x8000, 0x4902, 0x5, 0x3ff}, {0x5, 0x8, 0x2, 0xff}, {0x1000, 0x48000000000, 0x3}, {0xf7, 0x1f, 0xfffffffffffffe00, 0x1}, {0x10000, 0xfc0, 0x1, 0x6}, {0x4, 0x2, 0xcefa, 0x81}, {0x815, 0xc7, 0x8001, 0x6a0}, {0x40, 0x0, 0x9, 0x80000001}, {0xffffffffffffff53, 0x38a, 0x100000000, 0x7}, {0x5, 0x1, 0x1000, 0x10001}, {0x80000000, 0x7, 0x1, 0xf7}, {0x2, 0x9, 0x4c, 0x5}, {0xfffffffffffffff7, 0x0, 0xe74, 0x52a}, {0x1ff, 0x7, 0x3, 0x7}, {0x6, 0x1ff, 0x49, 0x7}, {0x8000, 0x0, 0x7, 0x684}, {0xffe, 0x988, 0x3, 0x1}, {0x7b, 0x5a07, 0x18, 0x7}, {0xfffffffffffffffe, 0xfff, 0x3, 0x178180a0}, {0x2, 0xc0, 0x6, 0x401}, {0x5, 0x3, 0x8, 0x8}, {0xffffffffffff0001, 0x3, 0xfffffffffffffff7, 0x5}, {0x1ff, 0x8001, 0x3}, {0x3, 0x9, 0xffffffff, 0x2}, {0x5, 0x4, 0x574, 0x64c}, {0x5, 0x4, 0x10001, 0x6}, {0x1, 0x5b2c, 0x3ff, 0x7}, {0xff, 0x2, 0x5, 0x62c5fc18}, {0x101, 0x7, 0x2, 0xfffffffffffffffd}, {0x7fff, 0x6, 0x8, 0x4}, {0x9, 0x0, 0x7, 0xff}, {0x4, 0x4, 0x4, 0x10000}, {0x59b0, 0xfff, 0x4, 0x4}, {0x1f, 0xfffffffffffffffd, 0x8001, 0x800}, {0x0, 0xffffffffffffffff, 0x2, 0x65}, {0x1ff, 0x1, 0x2, 0x7ff}, {0x4, 0x5, 0x1, 0x7be}, {0x9e4, 0x0, 0x7, 0x5}, {0x5, 0x8, 0x7f, 0xffffffff}, {0x4, 0x6, 0x5, 0x7ff}, {0x22aaaf52, 0x8f, 0x6, 0x10000}, {0x2, 0x7, 0xffff}, {0x5, 0xfffffffff016eb50, 0x82, 0x7}, {0x38, 0x800, 0x9a2a, 0xfffffffffffffffc}, {0x5, 0xb, 0x4, 0xfffffffffffff001}, {0x8b5, 0x81, 0x4, 0x2}, {0x8, 0xfffffffffffffff8, 0x1, 0x8}, {0x40, 0x4, 0x1, 0x100000001}, {0x9b, 0x5, 0x1, 0xd64c}, {0x100, 0x8, 0x7, 0x3ff}, {0xf11, 0x200, 0x7, 0x2}, {0xac5, 0x0, 0x3, 0x7}, {0x518, 0x1, 0x80}, {0x6, 0x7f, 0x6, 0x7298}, {0x7, 0x1, 0x2, 0x1ec9}, {0x400, 0x2, 0x6, 0x6c3}, {0x100000001, 0x6, 0x5, 0x9}, {0x8, 0x1dae, 0xfffffffffffffff8, 0x101}, {0x2, 0x7, 0x8, 0x3}, {0x0, 0x45b, 0x7, 0x72}, {0x100000001, 0xc00000000000, 0x100000001, 0x8}, {0x100000001, 0x0, 0xfffffffffffffffc, 0x3}, {0x95, 0x90b, 0x0, 0xfffffffffffff565}, {0x0, 0x4, 0x0, 0x2}], 0x40}}}]}}, @common=@IDLETIMER={'IDLETIMER\x00', 0x28, {{0x7f, 'syz0\x00'}}}}]}, {0x0, '\x00', 0x2, 0xfffffffffffffffc}, {0x0, '\x00', 0x2, 0xffffffffffffffff, 0x2, [{{{0x11, 0x40, 0x87df, 'irlan0\x00', 'sit0\x00', 'veth0_to_team\x00', 'ip6gretap0\x00', @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [0xff, 0xff, 0xff, 0xff, 0x0, 0xff], @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [0x0, 0xff, 0x0, 0xff], 0xb0, 0x210, 0x258, [@time={'time\x00', 0x18, {{0x1ff, 0x1, 0xe063, 0xb6c5, 0x2e80, 0x0, 0x2}}}]}, [@common=@redirect={'redirect\x00', 0x8, {{0xffffffffffffffff}}}, @common=@SECMARK={'SECMARK\x00', 0x108, {{0x1, 0x6, 'system_u:object_r:lost_found_t:s0\x00'}}}]}, @common=@ERROR={'ERROR\x00', 0x20, {"4323eed968d7072e70de82f41331fe3aed2aedc8f2fff16e54b1c4e2ad07"}}}, {{{0x5, 0x54, 0x888d, 'ip6gretap0\x00', 'teql0\x00', 'veth1_to_team\x00', 'erspan0\x00', @random="0eae55d5aac5", [0x0, 0xff, 0x0, 0xff, 0xff, 0xff], @empty, [0xff, 0xff, 0xff, 0x0, 0xff, 0xff], 0x70, 0x70, 0xb8}}, @common=@RATEEST={'RATEEST\x00', 0x20, {{'syz0\x00', 0x9, 0x1, 0x4}}}}]}]}, 0x9a0) 2018/05/15 08:25:21 executing program 5: r0 = syz_open_procfs(0x0, &(0x7f0000000280)='net/ptype\x00') sendfile(r0, r0, &(0x7f0000000000)=0x10000001, 0x10005) openat$sequencer(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer\x00', 0xb00, 0x0) ioctl$KDSKBLED(r0, 0x4b65, 0x3ff) 2018/05/15 08:25:21 executing program 6: r0 = socket$inet6(0xa, 0x0, 0x0) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x0, 0x0, @ipv4={[], [0xff, 0xff], @rand_addr}}, 0x1c) setsockopt$inet6_IPV6_ADDRFORM(r0, 0x29, 0x1, &(0x7f0000000000)=0x2, 0x4) 2018/05/15 08:25:21 executing program 2: syz_emit_ethernet(0x3e, &(0x7f00000001c0)={@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, @dev={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa]}, [], {@ipv6={0x86dd, {0x0, 0x6, "50a09c", 0x8, 0x0, 0x0, @remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x4], 0xbb}, @local={0xfe, 0x80, [], 0xaa}, {[], @udp={0x0, 0x0, 0x8}}}}}}, &(0x7f0000000040)) 2018/05/15 08:25:22 executing program 4: r0 = syz_open_dev$evdev(&(0x7f00000009c0)='/dev/input/event#\x00', 0xfffffffffffffffc, 0x5) write$binfmt_elf64(r0, &(0x7f0000000000)=ANY=[@ANYBLOB], 0x0) 2018/05/15 08:25:22 executing program 3: syz_emit_ethernet(0x3e, &(0x7f00000001c0)={@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, @dev={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa]}, [], {@ipv6={0x86dd, {0x0, 0x6, "50a09c", 0x8, 0xffffff87, 0x0, @remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x500000000000000], 0xbb}, @local={0xfe, 0x80, [], 0xaa}, {[], @udp={0x0, 0x0, 0x8}}}}}}, &(0x7f0000000040)) 2018/05/15 08:25:22 executing program 0: r0 = socket$can_raw(0x1d, 0x3, 0x1) r1 = dup(r0) getsockopt$inet_udp_int(r1, 0x11, 0x0, &(0x7f0000000000), &(0x7f0000000040)=0x4) 2018/05/15 08:25:22 executing program 2: syz_emit_ethernet(0x3e, &(0x7f00000001c0)={@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, @dev={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa]}, [], {@ipv6={0x86dd, {0x0, 0x6, "50a09c", 0x8, 0x0, 0x0, @remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x2f000000], 0xbb}, @local={0xfe, 0x80, [], 0xaa}, {[], @udp={0x0, 0x0, 0x8}}}}}}, &(0x7f0000000040)) 2018/05/15 08:25:22 executing program 7: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup(r0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000d40)=@broute={'broute\x00', 0x20, 0x4, 0x8f0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000400], 0x0, &(0x7f0000000000), &(0x7f0000000400)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x2, [{{{0x5, 0x0, 0x0, 'bcsh0\x00', 'sit0\x00', 'syzkaller1\x00', 'veth0\x00', @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [], @dev={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa]}, [], 0x1d8, 0x228, 0x258, [@comment={'comment\x00', 0x100}, @owner={'owner\x00', 0x18}]}, [@common=@LED={'LED\x00', 0x28, {{'syz0\x00'}}}]}, @common=@redirect={'redirect\x00', 0x8}}, {{{0x11, 0x0, 0x0, 'veth1_to_bond\x00', 'erspan0\x00', 'bridge_slave_1\x00', 'veth0_to_bridge\x00', @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [], @random="cfa071dc33d9", [], 0x2a8, 0x2a8, 0x2f8, [@bpf0={'bpf\x00', 0x210, {{0x20, [{0x8000, 0x4902, 0x5, 0x3ff}, {0x5, 0x8, 0x2, 0xff}, {0x1000, 0x48000000000, 0x3}, {0xf7, 0x1f, 0xfffffffffffffe00, 0x1}, {0x10000, 0xfc0, 0x1, 0x6}, {0x4, 0x2, 0xcefa, 0x81}, {0x815, 0xc7, 0x8001, 0x6a0}, {0x40, 0x0, 0x9, 0x80000001}, {0xffffffffffffff53, 0x38a, 0x100000000, 0x7}, {0x5, 0x1, 0x1000, 0x10001}, {0x80000000, 0x7, 0x1, 0xf7}, {0x2, 0x9, 0x4c, 0x5}, {0xfffffffffffffff7, 0x0, 0xe74, 0x52a}, {0x1ff, 0x7, 0x3, 0x7}, {0x6, 0x1ff, 0x49, 0x7}, {0x8000, 0x0, 0x7, 0x684}, {0xffe, 0x988, 0x3, 0x1}, {0x7b, 0x5a07, 0x18, 0x7}, {0xfffffffffffffffe, 0xfff, 0x3, 0x178180a0}, {0x2, 0xc0, 0x6, 0x401}, {0x5, 0x3, 0x8, 0x8}, {0xffffffffffff0001, 0x3, 0xfffffffffffffff7, 0x5}, {0x1ff, 0x8001, 0x3}, {0x3, 0x9, 0xffffffff, 0x2}, {0x5, 0x4, 0x574, 0x64c}, {0x5, 0x4, 0x10001, 0x6}, {0x1, 0x5b2c, 0x3ff, 0x7}, {0xff, 0x2, 0x5, 0x62c5fc18}, {0x101, 0x7, 0x2, 0xfffffffffffffffd}, {0x7fff, 0x6, 0x8, 0x4}, {0x9, 0x0, 0x7, 0xff}, {0x4, 0x4, 0x4, 0x10000}, {0x59b0, 0xfff, 0x4, 0x4}, {0x1f, 0xfffffffffffffffd, 0x8001, 0x800}, {0x0, 0xffffffffffffffff, 0x2, 0x65}, {0x1ff, 0x1, 0x2, 0x7ff}, {0x4, 0x5, 0x1, 0x7be}, {0x9e4, 0x0, 0x7, 0x5}, {0x5, 0x8, 0x7f, 0xffffffff}, {0x4, 0x6, 0x5, 0x7ff}, {0x22aaaf52, 0x8f, 0x6, 0x10000}, {0x2, 0x7, 0xffff}, {0x5, 0xfffffffff016eb50, 0x82, 0x7}, {0x38, 0x800, 0x9a2a, 0xfffffffffffffffc}, {0x5, 0xb, 0x4, 0xfffffffffffff001}, {0x8b5, 0x81, 0x4, 0x2}, {0x8, 0xfffffffffffffff8, 0x1, 0x8}, {0x40, 0x4, 0x1, 0x100000001}, {0x9b, 0x5, 0x1, 0xd64c}, {0x100, 0x8, 0x7, 0x3ff}, {0xf11, 0x200, 0x7, 0x2}, {0xac5, 0x0, 0x3, 0x7}, {0x518, 0x1, 0x80}, {0x6, 0x7f, 0x6, 0x7298}, {0x7, 0x1, 0x2, 0x1ec9}, {0x400, 0x2, 0x6, 0x6c3}, {0x100000001, 0x6, 0x5, 0x9}, {0x8, 0x1dae, 0xfffffffffffffff8, 0x101}, {0x2, 0x7, 0x8, 0x3}, {0x0, 0x45b, 0x7, 0x72}, {0x100000001, 0xc00000000000, 0x100000001, 0x8}, {0x100000001, 0x0, 0xfffffffffffffffc, 0x3}, {0x95, 0x90b, 0x0, 0xfffffffffffff565}, {0x0, 0x4, 0x0, 0x2}], 0x40}}}]}}, @common=@IDLETIMER={'IDLETIMER\x00', 0x28, {{0x7f, 'syz0\x00'}}}}]}, {0x0, '\x00', 0x2, 0xfffffffffffffffc}, {0x0, '\x00', 0x2, 0xffffffffffffffff, 0x2, [{{{0x11, 0x40, 0x87df, 'irlan0\x00', 'sit0\x00', 'veth0_to_team\x00', 'ip6gretap0\x00', @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [0xff, 0xff, 0xff, 0xff, 0x0, 0xff], @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [0x0, 0xff, 0x0, 0xff], 0xb0, 0x210, 0x258, [@time={'time\x00', 0x18, {{0x1ff, 0x1, 0xe063, 0xb6c5, 0x2e80, 0x0, 0x2}}}]}, [@common=@redirect={'redirect\x00', 0x8, {{0xffffffffffffffff}}}, @common=@SECMARK={'SECMARK\x00', 0x108, {{0x1, 0x6, 'system_u:object_r:lost_found_t:s0\x00'}}}]}, @common=@ERROR={'ERROR\x00', 0x20, {"4323eed968d7072e70de82f41331fe3aed2aedc8f2fff16e54b1c4e2ad07"}}}, {{{0x5, 0x54, 0x888d, 'ip6gretap0\x00', 'teql0\x00', 'veth1_to_team\x00', 'erspan0\x00', @random="0eae55d5aac5", [0x0, 0xff, 0x0, 0xff, 0xff, 0xff], @empty, [0xff, 0xff, 0xff, 0x0, 0xff, 0xff], 0x70, 0x70, 0xb8}}, @common=@RATEEST={'RATEEST\x00', 0x20, {{'syz0\x00', 0x9, 0x1, 0x4}}}}]}]}, 0x9a0) 2018/05/15 08:25:22 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f0000000280)="6e65742f6970365f7461626c65735f6d61746368657300b6e23bcf6093cb57f8b4d285e9c48608549acee9a66f09d47a011dcc8f5af7870c6c1b6eebe85ebea4ecda4e44def87e8ee568c843daaf2805944012bc0144937e8b04411d09016ca07f7388ded591e346fb612397e79a6fe43e5c6a86bee1565b17b22b8ed5c95b4afbb3a620d1402c50bbaad790d0ffdb7c5a27e60423079f77bf") unlink(&(0x7f0000000080)='./file0\x00') ioctl$KDGKBMETA(r0, 0x4b62, &(0x7f0000000100)) getsockopt$inet_sctp_SCTP_PARTIAL_DELIVERY_POINT(r0, 0x84, 0x13, &(0x7f0000000140)={0x0, 0xfffffffffffffffa}, &(0x7f0000000180)=0x8) syslog(0x2, &(0x7f0000000cc0)=""/107, 0x6b) setsockopt$IP_VS_SO_SET_DEL(r0, 0x0, 0x484, &(0x7f0000000200)={0x87, @dev={0xac, 0x14, 0x14, 0x1a}, 0x4e24, 0x2, 'rr\x00', 0x3, 0x2, 0x66}, 0x2c) setsockopt$inet_sctp_SCTP_STREAM_SCHEDULER(r0, 0x84, 0x7b, &(0x7f00000001c0)={r1, 0x40ef2843}, 0x8) setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x40, &(0x7f0000000340)=ANY=[@ANYBLOB="73656375726974790000000000000000000000000000000000000000000000000e00000004000000f8030000fffffffff00000000000000000000000ffffffffffffffff600300006003000060030000ffffffff04000000", @ANYPTR=&(0x7f0000000d40)=ANY=[@ANYBLOB="000000000000000000000000002100ebe70048ca02fec408edfbaf31ba590218fdffffffffffd60000000000000000000000000000000000000000000000000021d13202a6d3d3de0000000000000000000000"], @ANYBLOB="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"], 0x458) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000000)='dctcp\x00', 0x6) 2018/05/15 08:25:22 executing program 5: r0 = getpid() r1 = syz_open_procfs(r0, &(0x7f0000000040)='net/ip6_tables_matches\x00') sendfile(r1, r1, &(0x7f0000000000)=0xffffffd, 0x7fffffff) 2018/05/15 08:25:22 executing program 6: r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(0xffffffffffffffff, &(0x7f0000000080)={0xa, 0x0, 0x0, @ipv4={[], [0xff, 0xff], @rand_addr}}, 0x1c) setsockopt$inet6_IPV6_ADDRFORM(r0, 0x29, 0x1, &(0x7f0000000000)=0x2, 0x4) [ 453.082995] kernel msg: ebtables bug: please report to author: Wrong len argument 2018/05/15 08:25:22 executing program 6: r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x0, 0x0, @ipv4={[], [0xff, 0xff], @rand_addr}}, 0x1c) setsockopt$inet6_IPV6_ADDRFORM(0xffffffffffffffff, 0x29, 0x1, &(0x7f0000000000)=0x2, 0x4) 2018/05/15 08:25:22 executing program 5: r0 = syz_open_procfs(0x0, &(0x7f0000000280)='net/ptype\x00') fsync(r0) ioctl$SNDRV_CTL_IOCTL_ELEM_LIST(r0, 0xc0505510, &(0x7f0000000180)={0xdcf, 0x2, 0x1, 0xfffffffeffffffff, &(0x7f0000000100)=[{}, {}]}) ioctl$KVM_GET_EMULATED_CPUID(r0, 0xc008ae09, &(0x7f0000000000)=""/32) sendfile(r0, r0, &(0x7f0000000040)=0xffffffd, 0x7fffffff) ioctl$sock_SIOCGPGRP(r0, 0x8904, &(0x7f0000000080)=0x0) syz_open_procfs(r1, &(0x7f00000000c0)='oom_score_adj\x00') 2018/05/15 08:25:22 executing program 4: r0 = syz_open_dev$evdev(&(0x7f00000009c0)='/dev/input/event#\x00', 0xfffffffffffffffc, 0x5) write$binfmt_elf64(r0, &(0x7f0000000000)=ANY=[@ANYBLOB], 0x0) 2018/05/15 08:25:22 executing program 2: syz_emit_ethernet(0x3e, &(0x7f00000001c0)={@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, @dev={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa]}, [], {@ipv6={0x86dd, {0x0, 0x6, "50a09c", 0x8, 0x0, 0x0, @remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000], 0xbb}, @local={0xfe, 0x80, [], 0xaa}, {[], @udp={0x0, 0x0, 0x8}}}}}}, &(0x7f0000000040)) 2018/05/15 08:25:22 executing program 0: r0 = socket$can_raw(0x1d, 0x3, 0x1) r1 = dup(r0) getsockopt$inet_udp_int(r1, 0x11, 0x0, &(0x7f0000000000), &(0x7f0000000040)=0x4) 2018/05/15 08:25:22 executing program 7: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup(r0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000d40)=@broute={'broute\x00', 0x20, 0x4, 0x8f0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000400], 0x0, &(0x7f0000000000), &(0x7f0000000400)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x2, [{{{0x5, 0x0, 0x0, 'bcsh0\x00', 'sit0\x00', 'syzkaller1\x00', 'veth0\x00', @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [], @dev={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa]}, [], 0x1d8, 0x228, 0x258, [@comment={'comment\x00', 0x100}, @owner={'owner\x00', 0x18}]}, [@common=@LED={'LED\x00', 0x28, {{'syz0\x00'}}}]}, @common=@redirect={'redirect\x00', 0x8}}, {{{0x11, 0x0, 0x0, 'veth1_to_bond\x00', 'erspan0\x00', 'bridge_slave_1\x00', 'veth0_to_bridge\x00', @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [], @random="cfa071dc33d9", [], 0x2a8, 0x2a8, 0x2f8, [@bpf0={'bpf\x00', 0x210, {{0x20, [{0x8000, 0x4902, 0x5, 0x3ff}, {0x5, 0x8, 0x2, 0xff}, {0x1000, 0x48000000000, 0x3}, {0xf7, 0x1f, 0xfffffffffffffe00, 0x1}, {0x10000, 0xfc0, 0x1, 0x6}, {0x4, 0x2, 0xcefa, 0x81}, {0x815, 0xc7, 0x8001, 0x6a0}, {0x40, 0x0, 0x9, 0x80000001}, {0xffffffffffffff53, 0x38a, 0x100000000, 0x7}, {0x5, 0x1, 0x1000, 0x10001}, {0x80000000, 0x7, 0x1, 0xf7}, {0x2, 0x9, 0x4c, 0x5}, {0xfffffffffffffff7, 0x0, 0xe74, 0x52a}, {0x1ff, 0x7, 0x3, 0x7}, {0x6, 0x1ff, 0x49, 0x7}, {0x8000, 0x0, 0x7, 0x684}, {0xffe, 0x988, 0x3, 0x1}, {0x7b, 0x5a07, 0x18, 0x7}, {0xfffffffffffffffe, 0xfff, 0x3, 0x178180a0}, {0x2, 0xc0, 0x6, 0x401}, {0x5, 0x3, 0x8, 0x8}, {0xffffffffffff0001, 0x3, 0xfffffffffffffff7, 0x5}, {0x1ff, 0x8001, 0x3}, {0x3, 0x9, 0xffffffff, 0x2}, {0x5, 0x4, 0x574, 0x64c}, {0x5, 0x4, 0x10001, 0x6}, {0x1, 0x5b2c, 0x3ff, 0x7}, {0xff, 0x2, 0x5, 0x62c5fc18}, {0x101, 0x7, 0x2, 0xfffffffffffffffd}, {0x7fff, 0x6, 0x8, 0x4}, {0x9, 0x0, 0x7, 0xff}, {0x4, 0x4, 0x4, 0x10000}, {0x59b0, 0xfff, 0x4, 0x4}, {0x1f, 0xfffffffffffffffd, 0x8001, 0x800}, {0x0, 0xffffffffffffffff, 0x2, 0x65}, {0x1ff, 0x1, 0x2, 0x7ff}, {0x4, 0x5, 0x1, 0x7be}, {0x9e4, 0x0, 0x7, 0x5}, {0x5, 0x8, 0x7f, 0xffffffff}, {0x4, 0x6, 0x5, 0x7ff}, {0x22aaaf52, 0x8f, 0x6, 0x10000}, {0x2, 0x7, 0xffff}, {0x5, 0xfffffffff016eb50, 0x82, 0x7}, {0x38, 0x800, 0x9a2a, 0xfffffffffffffffc}, {0x5, 0xb, 0x4, 0xfffffffffffff001}, {0x8b5, 0x81, 0x4, 0x2}, {0x8, 0xfffffffffffffff8, 0x1, 0x8}, {0x40, 0x4, 0x1, 0x100000001}, {0x9b, 0x5, 0x1, 0xd64c}, {0x100, 0x8, 0x7, 0x3ff}, {0xf11, 0x200, 0x7, 0x2}, {0xac5, 0x0, 0x3, 0x7}, {0x518, 0x1, 0x80}, {0x6, 0x7f, 0x6, 0x7298}, {0x7, 0x1, 0x2, 0x1ec9}, {0x400, 0x2, 0x6, 0x6c3}, {0x100000001, 0x6, 0x5, 0x9}, {0x8, 0x1dae, 0xfffffffffffffff8, 0x101}, {0x2, 0x7, 0x8, 0x3}, {0x0, 0x45b, 0x7, 0x72}, {0x100000001, 0xc00000000000, 0x100000001, 0x8}, {0x100000001, 0x0, 0xfffffffffffffffc, 0x3}, {0x95, 0x90b, 0x0, 0xfffffffffffff565}, {0x0, 0x4, 0x0, 0x2}], 0x40}}}]}}, @common=@IDLETIMER={'IDLETIMER\x00', 0x28, {{0x7f, 'syz0\x00'}}}}]}, {0x0, '\x00', 0x2, 0xfffffffffffffffc}, {0x0, '\x00', 0x2, 0xffffffffffffffff, 0x2, [{{{0x11, 0x40, 0x87df, 'irlan0\x00', 'sit0\x00', 'veth0_to_team\x00', 'ip6gretap0\x00', @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [0xff, 0xff, 0xff, 0xff, 0x0, 0xff], @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [0x0, 0xff, 0x0, 0xff], 0xb0, 0x210, 0x258, [@time={'time\x00', 0x18, {{0x1ff, 0x1, 0xe063, 0xb6c5, 0x2e80, 0x0, 0x2}}}]}, [@common=@redirect={'redirect\x00', 0x8, {{0xffffffffffffffff}}}, @common=@SECMARK={'SECMARK\x00', 0x108, {{0x1, 0x6, 'system_u:object_r:lost_found_t:s0\x00'}}}]}, @common=@ERROR={'ERROR\x00', 0x20, {"4323eed968d7072e70de82f41331fe3aed2aedc8f2fff16e54b1c4e2ad07"}}}, {{{0x5, 0x54, 0x888d, 'ip6gretap0\x00', 'teql0\x00', 'veth1_to_team\x00', 'erspan0\x00', @random="0eae55d5aac5", [0x0, 0xff, 0x0, 0xff, 0xff, 0xff], @empty, [0xff, 0xff, 0xff, 0x0, 0xff, 0xff], 0x70, 0x70, 0xb8}}, @common=@RATEEST={'RATEEST\x00', 0x20, {{'syz0\x00', 0x9, 0x1, 0x4}}}}]}]}, 0x9a0) 2018/05/15 08:25:22 executing program 3: syz_emit_ethernet(0x3e, &(0x7f00000001c0)={@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, @dev={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa]}, [], {@ipv6={0x86dd, {0x0, 0x6, "50a09c", 0x8, 0xffffff87, 0x0, @remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0xd00000000000000], 0xbb}, @local={0xfe, 0x80, [], 0xaa}, {[], @udp={0x0, 0x0, 0x8}}}}}}, &(0x7f0000000040)) 2018/05/15 08:25:22 executing program 6: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000040)='/dev/zero\x00', 0x0, 0x0) mmap(&(0x7f0000ff9000/0x4000)=nil, 0x4000, 0x0, 0x12, r0, 0x0) 2018/05/15 08:25:22 executing program 2: syz_emit_ethernet(0x3e, &(0x7f00000001c0)={@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, @dev={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa]}, [], {@ipv6={0x86dd, {0x0, 0x6, "50a09c", 0x8, 0x0, 0x0, @remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x3f000000], 0xbb}, @local={0xfe, 0x80, [], 0xaa}, {[], @udp={0x0, 0x0, 0x8}}}}}}, &(0x7f0000000040)) [ 453.255672] kernel msg: ebtables bug: please report to author: Wrong len argument 2018/05/15 08:25:23 executing program 5: syz_open_procfs(0x0, &(0x7f0000000280)='net/ptype\x00') 2018/05/15 08:25:23 executing program 0: r0 = socket$can_raw(0x1d, 0x3, 0x1) r1 = dup(r0) getsockopt$inet_udp_int(r1, 0x11, 0x0, &(0x7f0000000000), &(0x7f0000000040)=0x4) 2018/05/15 08:25:23 executing program 7: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup(r0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000d40)=@broute={'broute\x00', 0x20, 0x4, 0x8f0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000400], 0x0, &(0x7f0000000000), &(0x7f0000000400)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x2, [{{{0x5, 0x0, 0x0, 'bcsh0\x00', 'sit0\x00', 'syzkaller1\x00', 'veth0\x00', @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [], @dev={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa]}, [], 0x1d8, 0x228, 0x258, [@comment={'comment\x00', 0x100}, @owner={'owner\x00', 0x18}]}, [@common=@LED={'LED\x00', 0x28, {{'syz0\x00'}}}]}, @common=@redirect={'redirect\x00', 0x8}}, {{{0x11, 0x0, 0x0, 'veth1_to_bond\x00', 'erspan0\x00', 'bridge_slave_1\x00', 'veth0_to_bridge\x00', @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [], @random="cfa071dc33d9", [], 0x2a8, 0x2a8, 0x2f8, [@bpf0={'bpf\x00', 0x210, {{0x20, [{0x8000, 0x4902, 0x5, 0x3ff}, {0x5, 0x8, 0x2, 0xff}, {0x1000, 0x48000000000, 0x3}, {0xf7, 0x1f, 0xfffffffffffffe00, 0x1}, {0x10000, 0xfc0, 0x1, 0x6}, {0x4, 0x2, 0xcefa, 0x81}, {0x815, 0xc7, 0x8001, 0x6a0}, {0x40, 0x0, 0x9, 0x80000001}, {0xffffffffffffff53, 0x38a, 0x100000000, 0x7}, {0x5, 0x1, 0x1000, 0x10001}, {0x80000000, 0x7, 0x1, 0xf7}, {0x2, 0x9, 0x4c, 0x5}, {0xfffffffffffffff7, 0x0, 0xe74, 0x52a}, {0x1ff, 0x7, 0x3, 0x7}, {0x6, 0x1ff, 0x49, 0x7}, {0x8000, 0x0, 0x7, 0x684}, {0xffe, 0x988, 0x3, 0x1}, {0x7b, 0x5a07, 0x18, 0x7}, {0xfffffffffffffffe, 0xfff, 0x3, 0x178180a0}, {0x2, 0xc0, 0x6, 0x401}, {0x5, 0x3, 0x8, 0x8}, {0xffffffffffff0001, 0x3, 0xfffffffffffffff7, 0x5}, {0x1ff, 0x8001, 0x3}, {0x3, 0x9, 0xffffffff, 0x2}, {0x5, 0x4, 0x574, 0x64c}, {0x5, 0x4, 0x10001, 0x6}, {0x1, 0x5b2c, 0x3ff, 0x7}, {0xff, 0x2, 0x5, 0x62c5fc18}, {0x101, 0x7, 0x2, 0xfffffffffffffffd}, {0x7fff, 0x6, 0x8, 0x4}, {0x9, 0x0, 0x7, 0xff}, {0x4, 0x4, 0x4, 0x10000}, {0x59b0, 0xfff, 0x4, 0x4}, {0x1f, 0xfffffffffffffffd, 0x8001, 0x800}, {0x0, 0xffffffffffffffff, 0x2, 0x65}, {0x1ff, 0x1, 0x2, 0x7ff}, {0x4, 0x5, 0x1, 0x7be}, {0x9e4, 0x0, 0x7, 0x5}, {0x5, 0x8, 0x7f, 0xffffffff}, {0x4, 0x6, 0x5, 0x7ff}, {0x22aaaf52, 0x8f, 0x6, 0x10000}, {0x2, 0x7, 0xffff}, {0x5, 0xfffffffff016eb50, 0x82, 0x7}, {0x38, 0x800, 0x9a2a, 0xfffffffffffffffc}, {0x5, 0xb, 0x4, 0xfffffffffffff001}, {0x8b5, 0x81, 0x4, 0x2}, {0x8, 0xfffffffffffffff8, 0x1, 0x8}, {0x40, 0x4, 0x1, 0x100000001}, {0x9b, 0x5, 0x1, 0xd64c}, {0x100, 0x8, 0x7, 0x3ff}, {0xf11, 0x200, 0x7, 0x2}, {0xac5, 0x0, 0x3, 0x7}, {0x518, 0x1, 0x80}, {0x6, 0x7f, 0x6, 0x7298}, {0x7, 0x1, 0x2, 0x1ec9}, {0x400, 0x2, 0x6, 0x6c3}, {0x100000001, 0x6, 0x5, 0x9}, {0x8, 0x1dae, 0xfffffffffffffff8, 0x101}, {0x2, 0x7, 0x8, 0x3}, {0x0, 0x45b, 0x7, 0x72}, {0x100000001, 0xc00000000000, 0x100000001, 0x8}, {0x100000001, 0x0, 0xfffffffffffffffc, 0x3}, {0x95, 0x90b, 0x0, 0xfffffffffffff565}, {0x0, 0x4, 0x0, 0x2}], 0x40}}}]}}, @common=@IDLETIMER={'IDLETIMER\x00', 0x28, {{0x7f, 'syz0\x00'}}}}]}, {0x0, '\x00', 0x2, 0xfffffffffffffffc}, {0x0, '\x00', 0x2, 0xffffffffffffffff, 0x2, [{{{0x11, 0x40, 0x87df, 'irlan0\x00', 'sit0\x00', 'veth0_to_team\x00', 'ip6gretap0\x00', @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [0xff, 0xff, 0xff, 0xff, 0x0, 0xff], @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [0x0, 0xff, 0x0, 0xff], 0xb0, 0x210, 0x258, [@time={'time\x00', 0x18, {{0x1ff, 0x1, 0xe063, 0xb6c5, 0x2e80, 0x0, 0x2}}}]}, [@common=@redirect={'redirect\x00', 0x8, {{0xffffffffffffffff}}}, @common=@SECMARK={'SECMARK\x00', 0x108, {{0x1, 0x6, 'system_u:object_r:lost_found_t:s0\x00'}}}]}, @common=@ERROR={'ERROR\x00', 0x20, {"4323eed968d7072e70de82f41331fe3aed2aedc8f2fff16e54b1c4e2ad07"}}}, {{{0x5, 0x54, 0x888d, 'ip6gretap0\x00', 'teql0\x00', 'veth1_to_team\x00', 'erspan0\x00', @random="0eae55d5aac5", [0x0, 0xff, 0x0, 0xff, 0xff, 0xff], @empty, [0xff, 0xff, 0xff, 0x0, 0xff, 0xff], 0x70, 0x70, 0xb8}}, @common=@RATEEST={'RATEEST\x00', 0x20, {{'syz0\x00', 0x9, 0x1, 0x4}}}}]}]}, 0x9a0) 2018/05/15 08:25:23 executing program 6: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000040)='/dev/zero\x00', 0x0, 0x0) mmap(&(0x7f0000ff9000/0x4000)=nil, 0x4000, 0x0, 0x12, r0, 0x0) 2018/05/15 08:25:23 executing program 4: r0 = syz_open_dev$evdev(&(0x7f00000009c0)='/dev/input/event#\x00', 0xfffffffffffffffc, 0x5) write$binfmt_elf64(r0, &(0x7f0000000000)=ANY=[@ANYBLOB="7f454c460000000000000000"], 0xc) 2018/05/15 08:25:23 executing program 3: syz_emit_ethernet(0x3e, &(0x7f00000001c0)={@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, @dev={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa]}, [], {@ipv6={0x86dd, {0x0, 0x6, "50a09c", 0x8, 0xffffff87, 0x0, @remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x81000000], 0xbb}, @local={0xfe, 0x80, [], 0xaa}, {[], @udp={0x0, 0x0, 0x8}}}}}}, &(0x7f0000000040)) 2018/05/15 08:25:23 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f0000000280)="6e65742f6970365f7461626c65735f6d61746368657300b6e23bcf6093cb57f8b4d285e9c48608549acee9a66f09d47a011dcc8f5af7870c6c1b6eebe85ebea4ecda4e44def87e8ee568c843daaf2805944012bc0144937e8b04411d09016ca07f7388ded591e346fb612397e79a6fe43e5c6a86bee1565b17b22b8ed5c95b4afbb3a620d1402c50bbaad790d0ffdb7c5a27e60423079f77bf") sendfile(r0, r0, &(0x7f00000000c0)=0x10000000, 0x2) ioctl$KDGKBMETA(r0, 0x4b62, &(0x7f0000000100)) getsockopt$inet_sctp_SCTP_PARTIAL_DELIVERY_POINT(r0, 0x84, 0x13, &(0x7f0000000140)={0x0, 0xfffffffffffffffa}, &(0x7f0000000180)=0x8) syslog(0x2, &(0x7f0000000cc0)=""/107, 0x6b) setsockopt$IP_VS_SO_SET_DEL(r0, 0x0, 0x484, &(0x7f0000000200)={0x87, @dev={0xac, 0x14, 0x14, 0x1a}, 0x4e24, 0x2, 'rr\x00', 0x3, 0x2, 0x66}, 0x2c) setsockopt$inet_sctp_SCTP_STREAM_SCHEDULER(r0, 0x84, 0x7b, &(0x7f00000001c0)={r1, 0x40ef2843}, 0x8) setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x40, &(0x7f0000000340)=ANY=[@ANYBLOB="73656375726974790000000000000000000000000000000000000000000000000e00000004000000f8030000fffffffff00000000000000000000000ffffffffffffffff600300006003000060030000ffffffff04000000", @ANYPTR=&(0x7f0000000d40)=ANY=[@ANYBLOB="000000000000000000000000002100ebe70048ca02fec408edfbaf31ba590218fdffffffffffd60000000000000000000000000000000000000000000000000021d13202a6d3d3de0000000000000000000000"], @ANYBLOB="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"], 0x458) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000000)='dctcp\x00', 0x6) 2018/05/15 08:25:23 executing program 2: syz_emit_ethernet(0x3e, &(0x7f00000001c0)={@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, @dev={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa]}, [], {@ipv6={0x86dd, {0x0, 0x6, "50a09c", 0x8, 0x0, 0x0, @remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x2], 0xbb}, @local={0xfe, 0x80, [], 0xaa}, {[], @udp={0x0, 0x0, 0x8}}}}}}, &(0x7f0000000040)) 2018/05/15 08:25:23 executing program 0: socket$can_raw(0x1d, 0x3, 0x1) getsockopt$inet_udp_int(0xffffffffffffffff, 0x11, 0x0, &(0x7f0000000000), &(0x7f0000000040)=0x4) 2018/05/15 08:25:23 executing program 6: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000040)='/dev/zero\x00', 0x0, 0x0) mmap(&(0x7f0000ff9000/0x4000)=nil, 0x4000, 0x0, 0x12, r0, 0x0) 2018/05/15 08:25:23 executing program 2: syz_emit_ethernet(0x3e, &(0x7f00000001c0)={@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, @dev={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa]}, [], {@ipv6={0x86dd, {0x0, 0x6, "50a09c", 0x8, 0x0, 0x0, @remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x608], 0xbb}, @local={0xfe, 0x80, [], 0xaa}, {[], @udp={0x0, 0x0, 0x8}}}}}}, &(0x7f0000000040)) [ 454.075275] kernel msg: ebtables bug: please report to author: Wrong len argument 2018/05/15 08:25:23 executing program 3: syz_emit_ethernet(0x3e, &(0x7f00000001c0)={@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, @dev={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa]}, [], {@ipv6={0x86dd, {0x0, 0x6, "50a09c", 0x8, 0xffffff87, 0x0, @remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0xc0ffffff00000000], 0xbb}, @local={0xfe, 0x80, [], 0xaa}, {[], @udp={0x0, 0x0, 0x8}}}}}}, &(0x7f0000000040)) 2018/05/15 08:25:23 executing program 4: r0 = syz_open_dev$evdev(&(0x7f00000009c0)='/dev/input/event#\x00', 0xfffffffffffffffc, 0x5) write$binfmt_elf64(r0, &(0x7f0000000000)=ANY=[@ANYBLOB="7f454c460000000000000000000000001100"], 0x12) 2018/05/15 08:25:23 executing program 5: r0 = syz_open_dev$amidi(&(0x7f00000001c0)='/dev/amidi#\x00', 0xab1, 0x80) ioctl$BLKPG(r0, 0x1269, &(0x7f00000002c0)={0x4, 0x9, 0x9f, &(0x7f0000000200)="c9baedf50bc1a71639f832c07e1f30a0804f6b13b326f903d82a1ddd35e8fa86c51152821b84c54136286825292cf52753a102c2b2b52f6f664b5bba726ee7859815d3dd290af1636ec6062e864ca73a4268581961766130881831d4615538d2b17b1e3055fea4b884a8d392108cd8eb801e0332e32046dd1de7a3e3b36089b57cb7ec3822b430dc7899bbf61e88650cd83f6af46f2fd0384556df185f4c05"}) r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vcs\x00', 0x400, 0x0) getsockopt$llc_int(r1, 0x10c, 0x3, &(0x7f0000000140), &(0x7f0000000180)=0x4) r2 = getpid() r3 = creat(&(0x7f0000000040)='./file0\x00', 0x0) ioctl$KVM_SET_VCPU_EVENTS(r3, 0x4040aea0, &(0x7f0000000080)={0x9, 0x77697445, 0x3, 0x0, 0x1f, 0x69, 0xe9ba, 0x1, 0x1ff, 0x3f, 0x7, 0x4, 0x0, 0x6, 0x100000000000, 0x8, 0x7f, 0x7, 0x8}) r4 = syz_open_procfs(r2, &(0x7f0000000100)='net/l2cap\x00') sendfile(r4, r4, &(0x7f00000000c0), 0x7fffffff) 2018/05/15 08:25:23 executing program 6: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000040)='/dev/zero\x00', 0x0, 0x0) mmap(&(0x7f0000ff9000/0x4000)=nil, 0x4000, 0x0, 0x12, r0, 0x0) 2018/05/15 08:25:23 executing program 7: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup(r0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000d40)=@broute={'broute\x00', 0x20, 0x4, 0x928, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000400], 0x0, &(0x7f0000000000), &(0x7f0000000400)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x2, [{{{0x5, 0x0, 0x0, 'bcsh0\x00', 'sit0\x00', 'syzkaller1\x00', 'veth0\x00', @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [], @dev={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa]}, [], 0x1d8, 0x228, 0x258, [@comment={'comment\x00', 0x100}, @owner={'owner\x00', 0x18}]}, [@common=@LED={'LED\x00', 0x28, {{'syz0\x00'}}}]}, @common=@redirect={'redirect\x00', 0x8}}, {{{0x11, 0x0, 0x0, 'veth1_to_bond\x00', 'erspan0\x00', 'bridge_slave_1\x00', 'veth0_to_bridge\x00', @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [], @random="cfa071dc33d9", [], 0x2e0, 0x2e0, 0x330, [@mac={'mac\x00', 0x10, {{@remote={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xbb}}}}, @bpf0={'bpf\x00', 0x210, {{0x20, [{0x8000, 0x4902, 0x5, 0x3ff}, {0x5, 0x8, 0x2, 0xff}, {0x1000, 0x48000000000, 0x3}, {0xf7, 0x1f, 0xfffffffffffffe00, 0x1}, {0x10000, 0xfc0, 0x1, 0x6}, {0x4, 0x2, 0xcefa, 0x81}, {0x815, 0xc7, 0x8001, 0x6a0}, {0x40, 0x0, 0x9, 0x80000001}, {0xffffffffffffff53, 0x38a, 0x100000000, 0x7}, {0x5, 0x1, 0x1000, 0x10001}, {0x80000000, 0x7, 0x1, 0xf7}, {0x2, 0x9, 0x4c, 0x5}, {0xfffffffffffffff7, 0x0, 0xe74, 0x52a}, {0x1ff, 0x7, 0x3, 0x7}, {0x6, 0x1ff, 0x49, 0x7}, {0x8000, 0x0, 0x7, 0x684}, {0xffe, 0x988, 0x3, 0x1}, {0x7b, 0x5a07, 0x18, 0x7}, {0xfffffffffffffffe, 0xfff, 0x3, 0x178180a0}, {0x2, 0xc0, 0x6, 0x401}, {0x5, 0x3, 0x8, 0x8}, {0xffffffffffff0001, 0x3, 0xfffffffffffffff7, 0x5}, {0x1ff, 0x8001, 0x3}, {0x3, 0x9, 0xffffffff, 0x2}, {0x5, 0x4, 0x574, 0x64c}, {0x5, 0x4, 0x10001, 0x6}, {0x1, 0x5b2c, 0x3ff, 0x7}, {0xff, 0x2, 0x5, 0x62c5fc18}, {0x101, 0x7, 0x2, 0xfffffffffffffffd}, {0x7fff, 0x6, 0x8, 0x4}, {0x9, 0x0, 0x7, 0xff}, {0x4, 0x4, 0x4, 0x10000}, {0x59b0, 0xfff, 0x4, 0x4}, {0x1f, 0xfffffffffffffffd, 0x8001, 0x800}, {0x0, 0xffffffffffffffff, 0x2, 0x65}, {0x1ff, 0x1, 0x2, 0x7ff}, {0x4, 0x5, 0x1, 0x7be}, {0x9e4, 0x0, 0x7, 0x5}, {0x5, 0x8, 0x7f, 0xffffffff}, {0x4, 0x6, 0x5, 0x7ff}, {0x22aaaf52, 0x8f, 0x6, 0x10000}, {0x2, 0x7, 0xffff}, {0x5, 0xfffffffff016eb50, 0x82, 0x7}, {0x38, 0x800, 0x9a2a, 0xfffffffffffffffc}, {0x5, 0xb, 0x4, 0xfffffffffffff001}, {0x8b5, 0x81, 0x4, 0x2}, {0x8, 0xfffffffffffffff8, 0x1, 0x8}, {0x40, 0x4, 0x1, 0x100000001}, {0x9b, 0x5, 0x1, 0xd64c}, {0x100, 0x8, 0x7, 0x3ff}, {0xf11, 0x200, 0x7, 0x2}, {0xac5, 0x0, 0x3, 0x7}, {0x518, 0x1, 0x80}, {0x6, 0x7f, 0x6, 0x7298}, {0x7, 0x1, 0x2, 0x1ec9}, {0x400, 0x2, 0x6, 0x6c3}, {0x100000001, 0x6, 0x5, 0x9}, {0x8, 0x1dae, 0xfffffffffffffff8, 0x101}, {0x2, 0x7, 0x8, 0x3}, {0x0, 0x45b, 0x7, 0x72}, {0x100000001, 0xc00000000000, 0x100000001, 0x8}, {0x100000001, 0x0, 0xfffffffffffffffc, 0x3}, {0x95, 0x90b, 0x0, 0xfffffffffffff565}, {0x0, 0x4, 0x0, 0x2}], 0x40}}}]}}, @common=@IDLETIMER={'IDLETIMER\x00', 0x28, {{0x7f, 'syz0\x00'}}}}]}, {0x0, '\x00', 0x2, 0xfffffffffffffffc}, {0x0, '\x00', 0x2, 0xffffffffffffffff, 0x2, [{{{0x11, 0x40, 0x87df, 'irlan0\x00', 'sit0\x00', 'veth0_to_team\x00', 'ip6gretap0\x00', @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [0xff, 0xff, 0xff, 0xff, 0x0, 0xff], @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [0x0, 0xff, 0x0, 0xff], 0xb0, 0x210, 0x258, [@time={'time\x00', 0x18, {{0x1ff, 0x1, 0xe063, 0xb6c5, 0x2e80, 0x0, 0x2}}}]}, [@common=@redirect={'redirect\x00', 0x8, {{0xffffffffffffffff}}}, @common=@SECMARK={'SECMARK\x00', 0x108, {{0x1, 0x6, 'system_u:object_r:lost_found_t:s0\x00'}}}]}, @common=@ERROR={'ERROR\x00', 0x20, {"4323eed968d7072e70de82f41331fe3aed2aedc8f2fff16e54b1c4e2ad07"}}}, {{{0x5, 0x54, 0x888d, 'ip6gretap0\x00', 'teql0\x00', 'veth1_to_team\x00', 'erspan0\x00', @random="0eae55d5aac5", [0x0, 0xff, 0x0, 0xff, 0xff, 0xff], @empty, [0xff, 0xff, 0xff, 0x0, 0xff, 0xff], 0x70, 0x70, 0xb8}}, @common=@RATEEST={'RATEEST\x00', 0x20, {{'syz0\x00', 0x9, 0x1, 0x4}}}}]}]}, 0x9a0) 2018/05/15 08:25:24 executing program 0: socket$can_raw(0x1d, 0x3, 0x1) getsockopt$inet_udp_int(0xffffffffffffffff, 0x11, 0x0, &(0x7f0000000000), &(0x7f0000000040)=0x4) 2018/05/15 08:25:24 executing program 2: syz_emit_ethernet(0x3e, &(0x7f00000001c0)={@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, @dev={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa]}, [], {@ipv6={0x86dd, {0x0, 0x6, "50a09c", 0x8, 0x0, 0x0, @remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x2b000000], 0xbb}, @local={0xfe, 0x80, [], 0xaa}, {[], @udp={0x0, 0x0, 0x8}}}}}}, &(0x7f0000000040)) 2018/05/15 08:25:24 executing program 4: r0 = syz_open_dev$evdev(&(0x7f00000009c0)='/dev/input/event#\x00', 0xfffffffffffffffc, 0x5) write$binfmt_elf64(r0, &(0x7f0000000000)=ANY=[@ANYBLOB="7f454c46000000000000000000000000110000e5ff"], 0x15) 2018/05/15 08:25:24 executing program 3: syz_emit_ethernet(0x3e, &(0x7f00000001c0)={@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, @dev={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa]}, [], {@ipv6={0x86dd, {0x0, 0x6, "50a09c", 0x8, 0xffffff87, 0x0, @remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x200000000000000], 0xbb}, @local={0xfe, 0x80, [], 0xaa}, {[], @udp={0x0, 0x0, 0x8}}}}}}, &(0x7f0000000040)) 2018/05/15 08:25:24 executing program 5: r0 = syz_open_dev$dspn(&(0x7f0000000040)='/dev/dsp#\x00', 0x8000, 0x10001) bind$ipx(r0, &(0x7f0000000080)={0x4, 0x2, 0xdeea, "b57942166d0d", 0x10001}, 0x10) syz_open_dev$dmmidi(&(0x7f0000000100)='/dev/dmmidi#\x00', 0x8, 0x62800) r1 = getpid() capset(&(0x7f0000000140)={0x399f1736, r1}, &(0x7f0000000180)={0x5, 0x1a4, 0xfff, 0x80000000, 0x5, 0x100000001}) r2 = syz_open_procfs(r1, &(0x7f00000000c0)='uid_map\x00') sendfile(r2, r2, &(0x7f0000000000)=0xffffffd, 0x7fffffff) 2018/05/15 08:25:24 executing program 6: mmap(&(0x7f0000ff9000/0x4000)=nil, 0x4000, 0x0, 0x12, 0xffffffffffffffff, 0x0) 2018/05/15 08:25:24 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f0000000280)="6e65742f6970365f7461626c65735f6d61746368657300b6e23bcf6093cb57f8b4d285e9c48608549acee9a66f09d47a011dcc8f5af7870c6c1b6eebe85ebea4ecda4e44def87e8ee568c843daaf2805944012bc0144937e8b04411d09016ca07f7388ded591e346fb612397e79a6fe43e5c6a86bee1565b17b22b8ed5c95b4afbb3a620d1402c50bbaad790d0ffdb7c5a27e60423079f77bf") sendfile(r0, r0, &(0x7f00000000c0)=0x10000000, 0x2) ioctl$KDGKBMETA(r0, 0x4b62, &(0x7f0000000100)) getsockopt$inet_sctp_SCTP_PARTIAL_DELIVERY_POINT(r0, 0x84, 0x13, &(0x7f0000000140)={0x0, 0xfffffffffffffffa}, &(0x7f0000000180)=0x8) syslog(0x2, &(0x7f0000000cc0)=""/107, 0x6b) setsockopt$IP_VS_SO_SET_DEL(r0, 0x0, 0x484, &(0x7f0000000200)={0x87, @dev={0xac, 0x14, 0x14, 0x1a}, 0x4e24, 0x2, 'rr\x00', 0x3, 0x2, 0x66}, 0x2c) setsockopt$inet_sctp_SCTP_STREAM_SCHEDULER(r0, 0x84, 0x7b, &(0x7f00000001c0)={r1, 0x40ef2843}, 0x8) setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x40, &(0x7f0000000340)=ANY=[@ANYBLOB="73656375726974790000000000000000000000000000000000000000000000000e00000004000000f8030000fffffffff00000000000000000000000ffffffffffffffff600300006003000060030000ffffffff04000000", @ANYPTR=&(0x7f0000000d40)=ANY=[@ANYBLOB="000000000000000000000000002100ebe70048ca02fec408edfbaf31ba590218fdffffffffffd60000000000000000000000000000000000000000000000000021d13202a6d3d3de0000000000000000000000"], @ANYBLOB="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"], 0x458) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000000)='dctcp\x00', 0x6) 2018/05/15 08:25:24 executing program 7: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup(r0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000d40)=@broute={'broute\x00', 0x20, 0x4, 0x6f0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000400], 0x0, &(0x7f0000000000), &(0x7f0000000400)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x2, [{{{0x5, 0x0, 0x0, 'bcsh0\x00', 'sit0\x00', 'syzkaller1\x00', 'veth0\x00', @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [], @dev={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa]}, [], 0x1d8, 0x228, 0x258, [@comment={'comment\x00', 0x100}, @owner={'owner\x00', 0x18}]}, [@common=@LED={'LED\x00', 0x28, {{'syz0\x00'}}}]}, @common=@redirect={'redirect\x00', 0x8}}, {{{0x11, 0x0, 0x0, 'veth1_to_bond\x00', 'erspan0\x00', 'bridge_slave_1\x00', 'veth0_to_bridge\x00', @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [], @random="cfa071dc33d9", [], 0xa8, 0xa8, 0xf8, [@mac={'mac\x00', 0x10, {{@remote={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xbb}}}}]}}, @common=@IDLETIMER={'IDLETIMER\x00', 0x28, {{0x7f, 'syz0\x00'}}}}]}, {0x0, '\x00', 0x2, 0xfffffffffffffffc}, {0x0, '\x00', 0x2, 0xffffffffffffffff, 0x2, [{{{0x11, 0x40, 0x87df, 'irlan0\x00', 'sit0\x00', 'veth0_to_team\x00', 'ip6gretap0\x00', @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [0xff, 0xff, 0xff, 0xff, 0x0, 0xff], @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [0x0, 0xff, 0x0, 0xff], 0xb0, 0x210, 0x258, [@time={'time\x00', 0x18, {{0x1ff, 0x1, 0xe063, 0xb6c5, 0x2e80, 0x0, 0x2}}}]}, [@common=@redirect={'redirect\x00', 0x8, {{0xffffffffffffffff}}}, @common=@SECMARK={'SECMARK\x00', 0x108, {{0x1, 0x6, 'system_u:object_r:lost_found_t:s0\x00'}}}]}, @common=@ERROR={'ERROR\x00', 0x20, {"4323eed968d7072e70de82f41331fe3aed2aedc8f2fff16e54b1c4e2ad07"}}}, {{{0x5, 0x54, 0x888d, 'ip6gretap0\x00', 'teql0\x00', 'veth1_to_team\x00', 'erspan0\x00', @random="0eae55d5aac5", [0x0, 0xff, 0x0, 0xff, 0xff, 0xff], @empty, [0xff, 0xff, 0xff, 0x0, 0xff, 0xff], 0x70, 0x70, 0xb8}}, @common=@RATEEST={'RATEEST\x00', 0x20, {{'syz0\x00', 0x9, 0x1, 0x4}}}}]}]}, 0x9a0) 2018/05/15 08:25:24 executing program 0: socket$can_raw(0x1d, 0x3, 0x1) getsockopt$inet_udp_int(0xffffffffffffffff, 0x11, 0x0, &(0x7f0000000000), &(0x7f0000000040)=0x4) 2018/05/15 08:25:24 executing program 2: syz_emit_ethernet(0x3e, &(0x7f00000001c0)={@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, @dev={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa]}, [], {@ipv6={0x86dd, {0x0, 0x6, "50a09c", 0x8, 0x0, 0x0, @remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x8848], 0xbb}, @local={0xfe, 0x80, [], 0xaa}, {[], @udp={0x0, 0x0, 0x8}}}}}}, &(0x7f0000000040)) 2018/05/15 08:25:24 executing program 6: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000040)='/dev/zero\x00', 0x0, 0x0) mmap(&(0x7f0000ff9000/0x4000)=nil, 0x4000, 0x0, 0x0, r0, 0x0) [ 455.007563] kernel msg: ebtables bug: please report to author: Wrong len argument 2018/05/15 08:25:24 executing program 3: syz_emit_ethernet(0x3e, &(0x7f00000001c0)={@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, @dev={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa]}, [], {@ipv6={0x86dd, {0x0, 0x6, "50a09c", 0x8, 0xffffff87, 0x0, @remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x8035000000000000], 0xbb}, @local={0xfe, 0x80, [], 0xaa}, {[], @udp={0x0, 0x0, 0x8}}}}}}, &(0x7f0000000040)) 2018/05/15 08:25:24 executing program 5: r0 = syz_open_procfs(0x0, &(0x7f0000000280)='net/ptype\x00') sendfile(r0, r0, &(0x7f0000000000)=0xffffffd, 0x7fffffff) ioctl$EVIOCGSW(r0, 0x8040451b, &(0x7f0000000040)=""/230) 2018/05/15 08:25:24 executing program 4: r0 = syz_open_dev$evdev(&(0x7f00000009c0)='/dev/input/event#\x00', 0xfffffffffffffffc, 0x5) write$binfmt_elf64(r0, &(0x7f0000000000)=ANY=[@ANYBLOB="7f454c46000000000000000000000000110000e5ffd005"], 0x17) 2018/05/15 08:25:24 executing program 7: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup(r0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000d40)=@broute={'broute\x00', 0x20, 0x4, 0x6f0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000400], 0x0, &(0x7f0000000000), &(0x7f0000000400)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x2, [{{{0x5, 0x0, 0x0, 'bcsh0\x00', 'sit0\x00', 'syzkaller1\x00', 'veth0\x00', @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [], @dev={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa]}, [], 0x1d8, 0x228, 0x258, [@comment={'comment\x00', 0x100}, @owner={'owner\x00', 0x18}]}, [@common=@LED={'LED\x00', 0x28, {{'syz0\x00'}}}]}, @common=@redirect={'redirect\x00', 0x8}}, {{{0x11, 0x0, 0x0, 'veth1_to_bond\x00', 'erspan0\x00', 'bridge_slave_1\x00', 'veth0_to_bridge\x00', @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [], @random="cfa071dc33d9", [], 0xa8, 0xa8, 0xf8, [@mac={'mac\x00', 0x10, {{@remote={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xbb}}}}]}}, @common=@IDLETIMER={'IDLETIMER\x00', 0x28, {{0x7f, 'syz0\x00'}}}}]}, {0x0, '\x00', 0x2, 0xfffffffffffffffc}, {0x0, '\x00', 0x2, 0xffffffffffffffff, 0x2, [{{{0x11, 0x40, 0x87df, 'irlan0\x00', 'sit0\x00', 'veth0_to_team\x00', 'ip6gretap0\x00', @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [0xff, 0xff, 0xff, 0xff, 0x0, 0xff], @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [0x0, 0xff, 0x0, 0xff], 0xb0, 0x210, 0x258, [@time={'time\x00', 0x18, {{0x1ff, 0x1, 0xe063, 0xb6c5, 0x2e80, 0x0, 0x2}}}]}, [@common=@redirect={'redirect\x00', 0x8, {{0xffffffffffffffff}}}, @common=@SECMARK={'SECMARK\x00', 0x108, {{0x1, 0x6, 'system_u:object_r:lost_found_t:s0\x00'}}}]}, @common=@ERROR={'ERROR\x00', 0x20, {"4323eed968d7072e70de82f41331fe3aed2aedc8f2fff16e54b1c4e2ad07"}}}, {{{0x5, 0x54, 0x888d, 'ip6gretap0\x00', 'teql0\x00', 'veth1_to_team\x00', 'erspan0\x00', @random="0eae55d5aac5", [0x0, 0xff, 0x0, 0xff, 0xff, 0xff], @empty, [0xff, 0xff, 0xff, 0x0, 0xff, 0xff], 0x70, 0x70, 0xb8}}, @common=@RATEEST={'RATEEST\x00', 0x20, {{'syz0\x00', 0x9, 0x1, 0x4}}}}]}]}, 0x9a0) 2018/05/15 08:25:24 executing program 6: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000040)='/dev/zero\x00', 0x0, 0x0) mmap(&(0x7f0000ff9000/0x4000)=nil, 0x4000, 0x0, 0x12, 0xffffffffffffffff, 0x0) [ 455.187207] kernel msg: ebtables bug: please report to author: Wrong len argument 2018/05/15 08:25:24 executing program 0: r0 = dup(0xffffffffffffffff) getsockopt$inet_udp_int(r0, 0x11, 0x0, &(0x7f0000000000), &(0x7f0000000040)=0x4) 2018/05/15 08:25:24 executing program 2: syz_emit_ethernet(0x3e, &(0x7f00000001c0)={@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, @dev={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa]}, [], {@ipv6={0x86dd, {0x0, 0x6, "50a09c", 0x8, 0x0, 0x0, @remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0xfeffffff], 0xbb}, @local={0xfe, 0x80, [], 0xaa}, {[], @udp={0x0, 0x0, 0x8}}}}}}, &(0x7f0000000040)) 2018/05/15 08:25:24 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f0000000280)="6e65742f6970365f7461626c65735f6d61746368657300b6e23bcf6093cb57f8b4d285e9c48608549acee9a66f09d47a011dcc8f5af7870c6c1b6eebe85ebea4ecda4e44def87e8ee568c843daaf2805944012bc0144937e8b04411d09016ca07f7388ded591e346fb612397e79a6fe43e5c6a86bee1565b17b22b8ed5c95b4afbb3a620d1402c50bbaad790d0ffdb7c5a27e60423079f77bf") sendfile(r0, r0, &(0x7f00000000c0)=0x10000000, 0x2) ioctl$KDGKBMETA(r0, 0x4b62, &(0x7f0000000100)) getsockopt$inet_sctp_SCTP_PARTIAL_DELIVERY_POINT(r0, 0x84, 0x13, &(0x7f0000000140)={0x0, 0xfffffffffffffffa}, &(0x7f0000000180)=0x8) syslog(0x2, &(0x7f0000000cc0)=""/107, 0x6b) setsockopt$IP_VS_SO_SET_DEL(r0, 0x0, 0x484, &(0x7f0000000200)={0x87, @dev={0xac, 0x14, 0x14, 0x1a}, 0x4e24, 0x2, 'rr\x00', 0x3, 0x2, 0x66}, 0x2c) setsockopt$inet_sctp_SCTP_STREAM_SCHEDULER(r0, 0x84, 0x7b, &(0x7f00000001c0)={r1, 0x40ef2843}, 0x8) setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x40, &(0x7f0000000340)=ANY=[@ANYBLOB="73656375726974790000000000000000000000000000000000000000000000000e00000004000000f8030000fffffffff00000000000000000000000ffffffffffffffff600300006003000060030000ffffffff04000000", @ANYPTR=&(0x7f0000000d40)=ANY=[@ANYBLOB="000000000000000000000000002100ebe70048ca02fec408edfbaf31ba590218fdffffffffffd60000000000000000000000000000000000000000000000000021d13202a6d3d3de0000000000000000000000"], @ANYBLOB="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"], 0x458) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000000)='dctcp\x00', 0x6) 2018/05/15 08:25:24 executing program 5: r0 = syz_open_procfs(0x0, &(0x7f0000000180)="6e65742f6900b7f5b07cdc9552b9d44b03f3d4d6b93a492260bb39574ee7ba7f6d2d6ac9f167479a3563836c8c04e332aa8e86c1216d5d11feb8555be1f8738c050fa17bd0585165921ef38fe8170000") sendfile(r0, r0, &(0x7f0000000000)=0xffffffd, 0x7fffffff) getsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(r0, 0x84, 0x18, &(0x7f0000000040)={0x0, 0x4}, &(0x7f0000000080)=0x8) getsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(r0, 0x84, 0x18, &(0x7f00000000c0)={r1, 0x40}, &(0x7f0000000100)=0x8) acct(&(0x7f0000000140)='./file0\x00') 2018/05/15 08:25:24 executing program 4: syz_emit_ethernet(0x3e, &(0x7f00000001c0)={@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, @dev={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa]}, [], {@ipv6={0x86dd, {0x0, 0x6, "50a09c", 0x7, 0xffffff2c, 0x0, @remote={0xfe, 0x80, [], 0xbb}, @local={0xfe, 0x80, [], 0xaa}, {[], @udp={0x0, 0x0, 0x8}}}}}}, &(0x7f0000000040)) 2018/05/15 08:25:24 executing program 7: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup(r0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000d40)=@broute={'broute\x00', 0x20, 0x4, 0x6f0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000400], 0x0, &(0x7f0000000000), &(0x7f0000000400)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x2, [{{{0x5, 0x0, 0x0, 'bcsh0\x00', 'sit0\x00', 'syzkaller1\x00', 'veth0\x00', @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [], @dev={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa]}, [], 0x1d8, 0x228, 0x258, [@comment={'comment\x00', 0x100}, @owner={'owner\x00', 0x18}]}, [@common=@LED={'LED\x00', 0x28, {{'syz0\x00'}}}]}, @common=@redirect={'redirect\x00', 0x8}}, {{{0x11, 0x0, 0x0, 'veth1_to_bond\x00', 'erspan0\x00', 'bridge_slave_1\x00', 'veth0_to_bridge\x00', @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [], @random="cfa071dc33d9", [], 0xa8, 0xa8, 0xf8, [@mac={'mac\x00', 0x10, {{@remote={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xbb}}}}]}}, @common=@IDLETIMER={'IDLETIMER\x00', 0x28, {{0x7f, 'syz0\x00'}}}}]}, {0x0, '\x00', 0x2, 0xfffffffffffffffc}, {0x0, '\x00', 0x2, 0xffffffffffffffff, 0x2, [{{{0x11, 0x40, 0x87df, 'irlan0\x00', 'sit0\x00', 'veth0_to_team\x00', 'ip6gretap0\x00', @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [0xff, 0xff, 0xff, 0xff, 0x0, 0xff], @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [0x0, 0xff, 0x0, 0xff], 0xb0, 0x210, 0x258, [@time={'time\x00', 0x18, {{0x1ff, 0x1, 0xe063, 0xb6c5, 0x2e80, 0x0, 0x2}}}]}, [@common=@redirect={'redirect\x00', 0x8, {{0xffffffffffffffff}}}, @common=@SECMARK={'SECMARK\x00', 0x108, {{0x1, 0x6, 'system_u:object_r:lost_found_t:s0\x00'}}}]}, @common=@ERROR={'ERROR\x00', 0x20, {"4323eed968d7072e70de82f41331fe3aed2aedc8f2fff16e54b1c4e2ad07"}}}, {{{0x5, 0x54, 0x888d, 'ip6gretap0\x00', 'teql0\x00', 'veth1_to_team\x00', 'erspan0\x00', @random="0eae55d5aac5", [0x0, 0xff, 0x0, 0xff, 0xff, 0xff], @empty, [0xff, 0xff, 0xff, 0x0, 0xff, 0xff], 0x70, 0x70, 0xb8}}, @common=@RATEEST={'RATEEST\x00', 0x20, {{'syz0\x00', 0x9, 0x1, 0x4}}}}]}]}, 0x9a0) 2018/05/15 08:25:24 executing program 3: syz_emit_ethernet(0x3e, &(0x7f00000001c0)={@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, @dev={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa]}, [], {@ipv6={0x86dd, {0x0, 0x6, "50a09c", 0x8, 0xffffff87, 0x0, @remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x80350000], 0xbb}, @local={0xfe, 0x80, [], 0xaa}, {[], @udp={0x0, 0x0, 0x8}}}}}}, &(0x7f0000000040)) 2018/05/15 08:25:24 executing program 6: bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x10, 0x4, 0x4, 0x5, 0x0, 0x1}, 0x2c) bpf$MAP_CREATE(0x2, &(0x7f0000003000)={0x13, 0x0, 0x77fffb, 0x0, 0x730000, 0x0}, 0x2c) 2018/05/15 08:25:24 executing program 4: syz_emit_ethernet(0x3e, &(0x7f00000001c0)={@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, @dev={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa]}, [], {@ipv6={0x86dd, {0x0, 0x6, "50a09c", 0x7, 0xffffff2c, 0x0, @remote={0xfe, 0x80, [], 0xbb}, @local={0xfe, 0x80, [], 0xaa}, {[], @udp={0x0, 0x0, 0x8}}}}}}, &(0x7f0000000040)) 2018/05/15 08:25:24 executing program 6: bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x10, 0x4, 0x4, 0x5, 0x0, 0x1}, 0x2c) bpf$MAP_CREATE(0x2, &(0x7f0000003000)={0x13, 0x0, 0x77fffb, 0x0, 0x730000, 0x0}, 0x2c) 2018/05/15 08:25:24 executing program 5: socketpair$inet6_udp(0xa, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) socket(0x2, 0xa, 0x3ff) r1 = syz_open_dev$loop(&(0x7f0000000140)='/dev/loop#\x00', 0x408, 0x408140) r2 = socket$netlink(0x10, 0x3, 0x9) write(r2, &(0x7f0000000000), 0x0) sendfile(r1, r0, &(0x7f0000000100)=0x59, 0x7ffffffc) 2018/05/15 08:25:24 executing program 0: r0 = dup(0xffffffffffffffff) getsockopt$inet_udp_int(r0, 0x11, 0x0, &(0x7f0000000000), &(0x7f0000000040)=0x4) 2018/05/15 08:25:24 executing program 2: syz_emit_ethernet(0x3e, &(0x7f00000001c0)={@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, @dev={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa]}, [], {@ipv6={0x86dd, {0x0, 0x6, "50a09c", 0x8, 0x0, 0x0, @remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x88640000], 0xbb}, @local={0xfe, 0x80, [], 0xaa}, {[], @udp={0x0, 0x0, 0x8}}}}}}, &(0x7f0000000040)) 2018/05/15 08:25:24 executing program 3: syz_emit_ethernet(0x3e, &(0x7f00000001c0)={@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, @dev={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa]}, [], {@ipv6={0x86dd, {0x0, 0x6, "50a09c", 0x8, 0xffffff87, 0x0, @remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x8906000000000000], 0xbb}, @local={0xfe, 0x80, [], 0xaa}, {[], @udp={0x0, 0x0, 0x8}}}}}}, &(0x7f0000000040)) 2018/05/15 08:25:24 executing program 1: unlink(&(0x7f0000000080)='./file0\x00') sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f00000000c0)=0x10000000, 0x2) ioctl$KDGKBMETA(0xffffffffffffffff, 0x4b62, &(0x7f0000000100)) getsockopt$inet_sctp_SCTP_PARTIAL_DELIVERY_POINT(0xffffffffffffffff, 0x84, 0x13, &(0x7f0000000140)={0x0, 0xfffffffffffffffa}, &(0x7f0000000180)=0x8) syslog(0x2, &(0x7f0000000cc0)=""/107, 0x6b) setsockopt$IP_VS_SO_SET_DEL(0xffffffffffffffff, 0x0, 0x484, &(0x7f0000000200)={0x87, @dev={0xac, 0x14, 0x14, 0x1a}, 0x4e24, 0x2, 'rr\x00', 0x3, 0x2, 0x66}, 0x2c) setsockopt$inet_sctp_SCTP_STREAM_SCHEDULER(0xffffffffffffffff, 0x84, 0x7b, &(0x7f00000001c0)={r0, 0x40ef2843}, 0x8) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x0, 0x40, &(0x7f0000000340)=ANY=[@ANYBLOB="73656375726974790000000000000000000000000000000000000000000000000e00000004000000f8030000fffffffff00000000000000000000000ffffffffffffffff600300006003000060030000ffffffff04000000", @ANYPTR=&(0x7f0000000d40)=ANY=[@ANYBLOB="000000000000000000000000002100ebe70048ca02fec408edfbaf31ba590218fdffffffffffd60000000000000000000000000000000000000000000000000021d13202a6d3d3de0000000000000000000000"], @ANYBLOB="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"], 0x458) setsockopt$inet_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, &(0x7f0000000000)='dctcp\x00', 0x6) [ 455.384277] kernel msg: ebtables bug: please report to author: Wrong len argument 2018/05/15 08:25:24 executing program 6: bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x10, 0x4, 0x4, 0x5, 0x0, 0x1}, 0x2c) bpf$MAP_CREATE(0x2, &(0x7f0000003000)={0x13, 0x0, 0x77fffb, 0x0, 0x730000, 0x0}, 0x2c) 2018/05/15 08:25:24 executing program 2: syz_emit_ethernet(0x3e, &(0x7f00000001c0)={@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, @dev={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa]}, [], {@ipv6={0x86dd, {0x0, 0x6, "50a09c", 0x8, 0x0, 0x0, @remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x29], 0xbb}, @local={0xfe, 0x80, [], 0xaa}, {[], @udp={0x0, 0x0, 0x8}}}}}}, &(0x7f0000000040)) 2018/05/15 08:25:25 executing program 4: syz_emit_ethernet(0x3e, &(0x7f00000001c0)={@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, @dev={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa]}, [], {@ipv6={0x86dd, {0x0, 0x6, "50a09c", 0x7, 0xffffff2c, 0x0, @remote={0xfe, 0x80, [], 0xbb}, @local={0xfe, 0x80, [], 0xaa}, {[], @udp={0x0, 0x0, 0x8}}}}}}, &(0x7f0000000040)) 2018/05/15 08:25:25 executing program 5: r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='net/ptype\x00') mmap(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x0, 0x40010, r0, 0x48) getpeername$netrom(r0, &(0x7f0000000140)=@full, &(0x7f0000000000)=0x48) ioctl$TCSETAW(r0, 0x5407, &(0x7f0000000080)={0x8, 0x9, 0x3ff, 0x3, 0xdcd0, 0x8000, 0x64, 0x6, 0x47, 0x7ff}) ioctl$KVM_GET_VCPU_MMAP_SIZE(r0, 0xae04) sendfile(r0, r0, &(0x7f00000000c0)=0xffffffd, 0x6) ioctl$SG_GET_VERSION_NUM(r0, 0x2282, &(0x7f0000000040)) 2018/05/15 08:25:25 executing program 0: r0 = dup(0xffffffffffffffff) getsockopt$inet_udp_int(r0, 0x11, 0x0, &(0x7f0000000000), &(0x7f0000000040)=0x4) 2018/05/15 08:25:25 executing program 3: syz_emit_ethernet(0x3e, &(0x7f00000001c0)={@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, @dev={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa]}, [], {@ipv6={0x86dd, {0x0, 0x6, "50a09c", 0x8, 0xffffff87, 0x0, @remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x4000000], 0xbb}, @local={0xfe, 0x80, [], 0xaa}, {[], @udp={0x0, 0x0, 0x8}}}}}}, &(0x7f0000000040)) 2018/05/15 08:25:25 executing program 7: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup(r0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000d40)=@broute={'broute\x00', 0x20, 0x4, 0x928, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000400], 0x0, &(0x7f0000000000), &(0x7f0000000400)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x2, [{{{0x5, 0x0, 0x0, 'bcsh0\x00', 'sit0\x00', 'syzkaller1\x00', 'veth0\x00', @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [], @dev={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa]}, [], 0x1d8, 0x228, 0x258, [@comment={'comment\x00', 0x100}, @owner={'owner\x00', 0x18}]}, [@common=@LED={'LED\x00', 0x28, {{'syz0\x00'}}}]}, @common=@redirect={'redirect\x00', 0x8}}, {{{0x11, 0x0, 0x0, 'veth1_to_bond\x00', 'erspan0\x00', 'bridge_slave_1\x00', 'veth0_to_bridge\x00', @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [], @random="cfa071dc33d9", [], 0x2e0, 0x2e0, 0x330, [@mac={'mac\x00', 0x10, {{@remote={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xbb}}}}, @bpf0={'bpf\x00', 0x210, {{0x0, [{0x8000, 0x4902, 0x5, 0x3ff}, {0x5, 0x8, 0x2, 0xff}, {0x1000, 0x48000000000, 0x3}, {0xf7, 0x1f, 0xfffffffffffffe00, 0x1}, {0x10000, 0xfc0, 0x1, 0x6}, {0x4, 0x2, 0xcefa, 0x81}, {0x815, 0xc7, 0x8001, 0x6a0}, {0x40, 0x0, 0x9, 0x80000001}, {0xffffffffffffff53, 0x38a, 0x100000000, 0x7}, {0x5, 0x1, 0x1000, 0x10001}, {0x80000000, 0x7, 0x1, 0xf7}, {0x2, 0x9, 0x4c, 0x5}, {0xfffffffffffffff7, 0x0, 0xe74, 0x52a}, {0x1ff, 0x7, 0x3, 0x7}, {0x6, 0x1ff, 0x49, 0x7}, {0x8000, 0x0, 0x7, 0x684}, {0xffe, 0x988, 0x3, 0x1}, {0x7b, 0x5a07, 0x18, 0x7}, {0xfffffffffffffffe, 0xfff, 0x3, 0x178180a0}, {0x2, 0xc0, 0x6, 0x401}, {0x5, 0x3, 0x8, 0x8}, {0xffffffffffff0001, 0x3, 0xfffffffffffffff7, 0x5}, {0x1ff, 0x8001, 0x3}, {0x3, 0x9, 0xffffffff, 0x2}, {0x5, 0x4, 0x574, 0x64c}, {0x5, 0x4, 0x10001, 0x6}, {0x1, 0x5b2c, 0x3ff, 0x7}, {0xff, 0x2, 0x5, 0x62c5fc18}, {0x101, 0x7, 0x2, 0xfffffffffffffffd}, {0x7fff, 0x6, 0x8, 0x4}, {0x9, 0x0, 0x7, 0xff}, {0x4, 0x4, 0x4, 0x10000}, {0x59b0, 0xfff, 0x4, 0x4}, {0x1f, 0xfffffffffffffffd, 0x8001, 0x800}, {0x0, 0xffffffffffffffff, 0x2, 0x65}, {0x1ff, 0x1, 0x2, 0x7ff}, {0x4, 0x5, 0x1, 0x7be}, {0x9e4, 0x0, 0x7, 0x5}, {0x5, 0x8, 0x7f, 0xffffffff}, {0x4, 0x6, 0x5, 0x7ff}, {0x22aaaf52, 0x8f, 0x6, 0x10000}, {0x2, 0x7, 0xffff}, {0x5, 0xfffffffff016eb50, 0x82, 0x7}, {0x38, 0x800, 0x9a2a, 0xfffffffffffffffc}, {0x5, 0xb, 0x4, 0xfffffffffffff001}, {0x8b5, 0x81, 0x4, 0x2}, {0x8, 0xfffffffffffffff8, 0x1, 0x8}, {0x40, 0x4, 0x1, 0x100000001}, {0x9b, 0x5, 0x1, 0xd64c}, {0x100, 0x8, 0x7, 0x3ff}, {0xf11, 0x200, 0x7, 0x2}, {0xac5, 0x0, 0x3, 0x7}, {0x518, 0x1, 0x80}, {0x6, 0x7f, 0x6, 0x7298}, {0x7, 0x1, 0x2, 0x1ec9}, {0x400, 0x2, 0x6, 0x6c3}, {0x100000001, 0x6, 0x5, 0x9}, {0x8, 0x1dae, 0xfffffffffffffff8, 0x101}, {0x2, 0x7, 0x8, 0x3}, {0x0, 0x45b, 0x7, 0x72}, {0x100000001, 0xc00000000000, 0x100000001, 0x8}, {0x100000001, 0x0, 0xfffffffffffffffc, 0x3}, {0x95, 0x90b, 0x0, 0xfffffffffffff565}, {0x0, 0x4, 0x0, 0x2}], 0x40}}}]}}, @common=@IDLETIMER={'IDLETIMER\x00', 0x28, {{0x7f, 'syz0\x00'}}}}]}, {0x0, '\x00', 0x2, 0xfffffffffffffffc}, {0x0, '\x00', 0x2, 0xffffffffffffffff, 0x2, [{{{0x11, 0x40, 0x87df, 'irlan0\x00', 'sit0\x00', 'veth0_to_team\x00', 'ip6gretap0\x00', @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [0xff, 0xff, 0xff, 0xff, 0x0, 0xff], @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [0x0, 0xff, 0x0, 0xff], 0xb0, 0x210, 0x258, [@time={'time\x00', 0x18, {{0x1ff, 0x1, 0xe063, 0xb6c5, 0x2e80, 0x0, 0x2}}}]}, [@common=@redirect={'redirect\x00', 0x8, {{0xffffffffffffffff}}}, @common=@SECMARK={'SECMARK\x00', 0x108, {{0x1, 0x6, 'system_u:object_r:lost_found_t:s0\x00'}}}]}, @common=@ERROR={'ERROR\x00', 0x20, {"4323eed968d7072e70de82f41331fe3aed2aedc8f2fff16e54b1c4e2ad07"}}}, {{{0x5, 0x54, 0x888d, 'ip6gretap0\x00', 'teql0\x00', 'veth1_to_team\x00', 'erspan0\x00', @random="0eae55d5aac5", [0x0, 0xff, 0x0, 0xff, 0xff, 0xff], @empty, [0xff, 0xff, 0xff, 0x0, 0xff, 0xff], 0x70, 0x70, 0xb8}}, @common=@RATEEST={'RATEEST\x00', 0x20, {{'syz0\x00', 0x9, 0x1, 0x4}}}}]}]}, 0x9a0) 2018/05/15 08:25:25 executing program 6: bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x10, 0x4, 0x4, 0x5, 0x0, 0x1}, 0x2c) bpf$MAP_CREATE(0x2, &(0x7f0000003000)={0x13, 0x0, 0x77fffb, 0x0, 0x730000, 0x0}, 0x2c) 2018/05/15 08:25:25 executing program 1: unlink(&(0x7f0000000080)='./file0\x00') sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f00000000c0)=0x10000000, 0x2) ioctl$KDGKBMETA(0xffffffffffffffff, 0x4b62, &(0x7f0000000100)) getsockopt$inet_sctp_SCTP_PARTIAL_DELIVERY_POINT(0xffffffffffffffff, 0x84, 0x13, &(0x7f0000000140)={0x0, 0xfffffffffffffffa}, &(0x7f0000000180)=0x8) syslog(0x2, &(0x7f0000000cc0)=""/107, 0x6b) setsockopt$IP_VS_SO_SET_DEL(0xffffffffffffffff, 0x0, 0x484, &(0x7f0000000200)={0x87, @dev={0xac, 0x14, 0x14, 0x1a}, 0x4e24, 0x2, 'rr\x00', 0x3, 0x2, 0x66}, 0x2c) setsockopt$inet_sctp_SCTP_STREAM_SCHEDULER(0xffffffffffffffff, 0x84, 0x7b, &(0x7f00000001c0)={r0, 0x40ef2843}, 0x8) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x0, 0x40, &(0x7f0000000340)=ANY=[@ANYBLOB="73656375726974790000000000000000000000000000000000000000000000000e00000004000000f8030000fffffffff00000000000000000000000ffffffffffffffff600300006003000060030000ffffffff04000000", @ANYPTR=&(0x7f0000000d40)=ANY=[@ANYBLOB="000000000000000000000000002100ebe70048ca02fec408edfbaf31ba590218fdffffffffffd60000000000000000000000000000000000000000000000000021d13202a6d3d3de0000000000000000000000"], @ANYBLOB="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"], 0x458) setsockopt$inet_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, &(0x7f0000000000)='dctcp\x00', 0x6) 2018/05/15 08:25:25 executing program 2: syz_emit_ethernet(0x3e, &(0x7f00000001c0)={@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, @dev={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa]}, [], {@ipv6={0x86dd, {0x0, 0x6, "50a09c", 0x8, 0x0, 0x0, @remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x30], 0xbb}, @local={0xfe, 0x80, [], 0xaa}, {[], @udp={0x0, 0x0, 0x8}}}}}}, &(0x7f0000000040)) 2018/05/15 08:25:25 executing program 0: r0 = socket$can_raw(0x1d, 0x3, 0x1) r1 = dup(0xffffffffffffffff) getsockopt$inet_udp_int(r1, 0x11, 0x0, &(0x7f0000000000), &(0x7f0000000040)=0x4) 2018/05/15 08:25:25 executing program 5: r0 = syz_open_dev$vcsn(&(0x7f0000000000)='/dev/vcs#\x00', 0x100000000, 0x100) setsockopt$inet_sctp_SCTP_HMAC_IDENT(r0, 0x84, 0x16, &(0x7f00000000c0)={0xa, [0x7, 0xfe0000000000, 0x2, 0x100, 0x5, 0x80000000, 0x2, 0x200, 0x6, 0x6]}, 0x18) ioctl$TIOCGSID(0xffffffffffffff9c, 0x5429, &(0x7f0000000080)=0x0) r2 = syz_open_procfs(r1, &(0x7f00000002c0)="1d79746b63726561746500e7f23b6d1b9535f84728fac945597569b0108b9ff4ad60d340bf91b0a5b857d9694d883ab2b6f4b6eeb495cc187374095f61f0df0d2ed1b50b3c7684ac994ce000d5e40c554df8416c832e1bd6e546f4553150972380701e1092954d27a0d7cd8cc0ba215e21963cf01ea4bab00c427a01fd7f5e2e186f09c65b4c31f4ceb0aace4be9b78958bed50ad11f28e4d0b03cda7b5cf4d7ac691ab257eb897d02c59968e9e0837880c179a803c07705dab00e57f4f3c246b625") sendfile(r2, r2, &(0x7f0000000040)=0xffffffd, 0x7fffffff) 2018/05/15 08:25:26 executing program 2: syz_emit_ethernet(0x3e, &(0x7f00000001c0)={@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, @dev={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa]}, [], {@ipv6={0x86dd, {0x0, 0x6, "50a09c", 0x8, 0x0, 0x0, @remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x11], 0xbb}, @local={0xfe, 0x80, [], 0xaa}, {[], @udp={0x0, 0x0, 0x8}}}}}}, &(0x7f0000000040)) 2018/05/15 08:25:26 executing program 4: syz_emit_ethernet(0x3e, &(0x7f00000001c0)={@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, @dev={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa]}, [], {@ipv6={0x86dd, {0x0, 0x6, "50a09c", 0x7, 0xffffff2c, 0x0, @remote={0xfe, 0x80, [], 0xbb}, @local={0xfe, 0x80, [], 0xaa}, {[], @udp={0x0, 0x0, 0x8}}}}}}, &(0x7f0000000040)) 2018/05/15 08:25:26 executing program 6: bpf$MAP_CREATE(0x2, &(0x7f0000003000)={0x13, 0x0, 0x77fffb, 0x0, 0x730000, 0x0}, 0x2c) 2018/05/15 08:25:26 executing program 3: syz_emit_ethernet(0x3e, &(0x7f00000001c0)={@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, @dev={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa]}, [], {@ipv6={0x86dd, {0x0, 0x6, "50a09c", 0x8, 0xffffff87, 0x0, @remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0xffffffc0], 0xbb}, @local={0xfe, 0x80, [], 0xaa}, {[], @udp={0x0, 0x0, 0x8}}}}}}, &(0x7f0000000040)) 2018/05/15 08:25:26 executing program 0: r0 = socket$can_raw(0x1d, 0x3, 0x1) r1 = dup(0xffffffffffffffff) getsockopt$inet_udp_int(r1, 0x11, 0x0, &(0x7f0000000000), &(0x7f0000000040)=0x4) 2018/05/15 08:25:26 executing program 7: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup(r0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000d40)=@broute={'broute\x00', 0x20, 0x4, 0x928, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000400], 0x0, &(0x7f0000000000), &(0x7f0000000400)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x2, [{{{0x5, 0x0, 0x0, 'bcsh0\x00', 'sit0\x00', 'syzkaller1\x00', 'veth0\x00', @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [], @dev={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa]}, [], 0x1d8, 0x228, 0x258, [@comment={'comment\x00', 0x100}, @owner={'owner\x00', 0x18}]}, [@common=@LED={'LED\x00', 0x28, {{'syz0\x00'}}}]}, @common=@redirect={'redirect\x00', 0x8}}, {{{0x11, 0x0, 0x0, 'veth1_to_bond\x00', 'erspan0\x00', 'bridge_slave_1\x00', 'veth0_to_bridge\x00', @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [], @random="cfa071dc33d9", [], 0x2e0, 0x2e0, 0x330, [@mac={'mac\x00', 0x10, {{@remote={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xbb}}}}, @bpf0={'bpf\x00', 0x210, {{0x0, [{0x0, 0x4902, 0x5, 0x3ff}, {0x5, 0x8, 0x2, 0xff}, {0x1000, 0x48000000000, 0x3}, {0xf7, 0x1f, 0xfffffffffffffe00, 0x1}, {0x10000, 0xfc0, 0x1, 0x6}, {0x4, 0x2, 0xcefa, 0x81}, {0x815, 0xc7, 0x8001, 0x6a0}, {0x40, 0x0, 0x9, 0x80000001}, {0xffffffffffffff53, 0x38a, 0x100000000, 0x7}, {0x5, 0x1, 0x1000, 0x10001}, {0x80000000, 0x7, 0x1, 0xf7}, {0x2, 0x9, 0x4c, 0x5}, {0xfffffffffffffff7, 0x0, 0xe74, 0x52a}, {0x1ff, 0x7, 0x3, 0x7}, {0x6, 0x1ff, 0x49, 0x7}, {0x8000, 0x0, 0x7, 0x684}, {0xffe, 0x988, 0x3, 0x1}, {0x7b, 0x5a07, 0x18, 0x7}, {0xfffffffffffffffe, 0xfff, 0x3, 0x178180a0}, {0x2, 0xc0, 0x6, 0x401}, {0x5, 0x3, 0x8, 0x8}, {0xffffffffffff0001, 0x3, 0xfffffffffffffff7, 0x5}, {0x1ff, 0x8001, 0x3}, {0x3, 0x9, 0xffffffff, 0x2}, {0x5, 0x4, 0x574, 0x64c}, {0x5, 0x4, 0x10001, 0x6}, {0x1, 0x5b2c, 0x3ff, 0x7}, {0xff, 0x2, 0x5, 0x62c5fc18}, {0x101, 0x7, 0x2, 0xfffffffffffffffd}, {0x7fff, 0x6, 0x8, 0x4}, {0x9, 0x0, 0x7, 0xff}, {0x4, 0x4, 0x4, 0x10000}, {0x59b0, 0xfff, 0x4, 0x4}, {0x1f, 0xfffffffffffffffd, 0x8001, 0x800}, {0x0, 0xffffffffffffffff, 0x2, 0x65}, {0x1ff, 0x1, 0x2, 0x7ff}, {0x4, 0x5, 0x1, 0x7be}, {0x9e4, 0x0, 0x7, 0x5}, {0x5, 0x8, 0x7f, 0xffffffff}, {0x4, 0x6, 0x5, 0x7ff}, {0x22aaaf52, 0x8f, 0x6, 0x10000}, {0x2, 0x7, 0xffff}, {0x5, 0xfffffffff016eb50, 0x82, 0x7}, {0x38, 0x800, 0x9a2a, 0xfffffffffffffffc}, {0x5, 0xb, 0x4, 0xfffffffffffff001}, {0x8b5, 0x81, 0x4, 0x2}, {0x8, 0xfffffffffffffff8, 0x1, 0x8}, {0x40, 0x4, 0x1, 0x100000001}, {0x9b, 0x5, 0x1, 0xd64c}, {0x100, 0x8, 0x7, 0x3ff}, {0xf11, 0x200, 0x7, 0x2}, {0xac5, 0x0, 0x3, 0x7}, {0x518, 0x1, 0x80}, {0x6, 0x7f, 0x6, 0x7298}, {0x7, 0x1, 0x2, 0x1ec9}, {0x400, 0x2, 0x6, 0x6c3}, {0x100000001, 0x6, 0x5, 0x9}, {0x8, 0x1dae, 0xfffffffffffffff8, 0x101}, {0x2, 0x7, 0x8, 0x3}, {0x0, 0x45b, 0x7, 0x72}, {0x100000001, 0xc00000000000, 0x100000001, 0x8}, {0x100000001, 0x0, 0xfffffffffffffffc, 0x3}, {0x95, 0x90b, 0x0, 0xfffffffffffff565}, {0x0, 0x4, 0x0, 0x2}], 0x40}}}]}}, @common=@IDLETIMER={'IDLETIMER\x00', 0x28, {{0x7f, 'syz0\x00'}}}}]}, {0x0, '\x00', 0x2, 0xfffffffffffffffc}, {0x0, '\x00', 0x2, 0xffffffffffffffff, 0x2, [{{{0x11, 0x40, 0x87df, 'irlan0\x00', 'sit0\x00', 'veth0_to_team\x00', 'ip6gretap0\x00', @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [0xff, 0xff, 0xff, 0xff, 0x0, 0xff], @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [0x0, 0xff, 0x0, 0xff], 0xb0, 0x210, 0x258, [@time={'time\x00', 0x18, {{0x1ff, 0x1, 0xe063, 0xb6c5, 0x2e80, 0x0, 0x2}}}]}, [@common=@redirect={'redirect\x00', 0x8, {{0xffffffffffffffff}}}, @common=@SECMARK={'SECMARK\x00', 0x108, {{0x1, 0x6, 'system_u:object_r:lost_found_t:s0\x00'}}}]}, @common=@ERROR={'ERROR\x00', 0x20, {"4323eed968d7072e70de82f41331fe3aed2aedc8f2fff16e54b1c4e2ad07"}}}, {{{0x5, 0x54, 0x888d, 'ip6gretap0\x00', 'teql0\x00', 'veth1_to_team\x00', 'erspan0\x00', @random="0eae55d5aac5", [0x0, 0xff, 0x0, 0xff, 0xff, 0xff], @empty, [0xff, 0xff, 0xff, 0x0, 0xff, 0xff], 0x70, 0x70, 0xb8}}, @common=@RATEEST={'RATEEST\x00', 0x20, {{'syz0\x00', 0x9, 0x1, 0x4}}}}]}]}, 0x9a0) 2018/05/15 08:25:26 executing program 1: unlink(&(0x7f0000000080)='./file0\x00') sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f00000000c0)=0x10000000, 0x2) ioctl$KDGKBMETA(0xffffffffffffffff, 0x4b62, &(0x7f0000000100)) getsockopt$inet_sctp_SCTP_PARTIAL_DELIVERY_POINT(0xffffffffffffffff, 0x84, 0x13, &(0x7f0000000140)={0x0, 0xfffffffffffffffa}, &(0x7f0000000180)=0x8) syslog(0x2, &(0x7f0000000cc0)=""/107, 0x6b) setsockopt$IP_VS_SO_SET_DEL(0xffffffffffffffff, 0x0, 0x484, &(0x7f0000000200)={0x87, @dev={0xac, 0x14, 0x14, 0x1a}, 0x4e24, 0x2, 'rr\x00', 0x3, 0x2, 0x66}, 0x2c) setsockopt$inet_sctp_SCTP_STREAM_SCHEDULER(0xffffffffffffffff, 0x84, 0x7b, &(0x7f00000001c0)={r0, 0x40ef2843}, 0x8) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x0, 0x40, &(0x7f0000000340)=ANY=[@ANYBLOB="73656375726974790000000000000000000000000000000000000000000000000e00000004000000f8030000fffffffff00000000000000000000000ffffffffffffffff600300006003000060030000ffffffff04000000", @ANYPTR=&(0x7f0000000d40)=ANY=[@ANYBLOB="000000000000000000000000002100ebe70048ca02fec408edfbaf31ba590218fdffffffffffd60000000000000000000000000000000000000000000000000021d13202a6d3d3de0000000000000000000000"], @ANYBLOB="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"], 0x458) setsockopt$inet_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, &(0x7f0000000000)='dctcp\x00', 0x6) 2018/05/15 08:25:26 executing program 5: r0 = syz_open_procfs(0x0, &(0x7f0000000280)='net/ptype\x00') ioctl$KVM_SET_BOOT_CPU_ID(r0, 0xae78, &(0x7f0000000040)=0x2) ioctl$sock_inet_SIOCGIFNETMASK(r0, 0x891b, &(0x7f0000000080)={'veth1\x00', {0x2, 0x4e23, @loopback=0x7f000001}}) sendfile(r0, r0, &(0x7f0000000000)=0xffffffd, 0x7fffffff) 2018/05/15 08:25:26 executing program 6: bpf$MAP_CREATE(0x2, &(0x7f0000003000)={0x13, 0x0, 0x77fffb, 0x0, 0x730000, 0x0}, 0x2c) 2018/05/15 08:25:26 executing program 3: syz_emit_ethernet(0x3e, &(0x7f00000001c0)={@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, @dev={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa]}, [], {@ipv6={0x86dd, {0x0, 0x6, "50a09c", 0x8, 0xffffff87, 0x0, @remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x4888], 0xbb}, @local={0xfe, 0x80, [], 0xaa}, {[], @udp={0x0, 0x0, 0x8}}}}}}, &(0x7f0000000040)) 2018/05/15 08:25:26 executing program 4: syz_emit_ethernet(0x3e, &(0x7f00000001c0)={@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, @dev={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa]}, [], {@ipv6={0x86dd, {0x0, 0x6, "50a09c", 0x7, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xbb}, @local={0xfe, 0x80, [], 0xaa}, {[], @udp={0x0, 0x0, 0x8}}}}}}, &(0x7f0000000040)) 2018/05/15 08:25:26 executing program 2: syz_emit_ethernet(0x3e, &(0x7f00000001c0)={@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, @dev={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa]}, [], {@ipv6={0x86dd, {0x0, 0x6, "50a09c", 0x8, 0x0, 0x0, @remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0xd], 0xbb}, @local={0xfe, 0x80, [], 0xaa}, {[], @udp={0x0, 0x0, 0x8}}}}}}, &(0x7f0000000040)) 2018/05/15 08:25:26 executing program 0: r0 = socket$can_raw(0x1d, 0x3, 0x1) r1 = dup(0xffffffffffffffff) getsockopt$inet_udp_int(r1, 0x11, 0x0, &(0x7f0000000000), &(0x7f0000000040)=0x4) 2018/05/15 08:25:26 executing program 5: r0 = syz_open_procfs(0x0, &(0x7f0000000280)='net/ptype\x00') sendfile(r0, r0, &(0x7f0000000000)=0xffffffd, 0x7fffffff) setsockopt$inet6_tcp_TCP_FASTOPEN_KEY(r0, 0x6, 0x21, &(0x7f0000000040)="5cde73421a54457aaa31c5f1a6e87310", 0x10) 2018/05/15 08:25:26 executing program 7: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup(r0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000d40)=@broute={'broute\x00', 0x20, 0x4, 0x928, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000400], 0x0, &(0x7f0000000000), &(0x7f0000000400)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x2, [{{{0x5, 0x0, 0x0, 'bcsh0\x00', 'sit0\x00', 'syzkaller1\x00', 'veth0\x00', @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [], @dev={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa]}, [], 0x1d8, 0x228, 0x258, [@comment={'comment\x00', 0x100}, @owner={'owner\x00', 0x18}]}, [@common=@LED={'LED\x00', 0x28, {{'syz0\x00'}}}]}, @common=@redirect={'redirect\x00', 0x8}}, {{{0x11, 0x0, 0x0, 'veth1_to_bond\x00', 'erspan0\x00', 'bridge_slave_1\x00', 'veth0_to_bridge\x00', @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [], @random="cfa071dc33d9", [], 0x2e0, 0x2e0, 0x330, [@mac={'mac\x00', 0x10, {{@remote={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xbb}}}}, @bpf0={'bpf\x00', 0x210, {{0x0, [{0x0, 0x0, 0x5, 0x3ff}, {0x5, 0x8, 0x2, 0xff}, {0x1000, 0x48000000000, 0x3}, {0xf7, 0x1f, 0xfffffffffffffe00, 0x1}, {0x10000, 0xfc0, 0x1, 0x6}, {0x4, 0x2, 0xcefa, 0x81}, {0x815, 0xc7, 0x8001, 0x6a0}, {0x40, 0x0, 0x9, 0x80000001}, {0xffffffffffffff53, 0x38a, 0x100000000, 0x7}, {0x5, 0x1, 0x1000, 0x10001}, {0x80000000, 0x7, 0x1, 0xf7}, {0x2, 0x9, 0x4c, 0x5}, {0xfffffffffffffff7, 0x0, 0xe74, 0x52a}, {0x1ff, 0x7, 0x3, 0x7}, {0x6, 0x1ff, 0x49, 0x7}, {0x8000, 0x0, 0x7, 0x684}, {0xffe, 0x988, 0x3, 0x1}, {0x7b, 0x5a07, 0x18, 0x7}, {0xfffffffffffffffe, 0xfff, 0x3, 0x178180a0}, {0x2, 0xc0, 0x6, 0x401}, {0x5, 0x3, 0x8, 0x8}, {0xffffffffffff0001, 0x3, 0xfffffffffffffff7, 0x5}, {0x1ff, 0x8001, 0x3}, {0x3, 0x9, 0xffffffff, 0x2}, {0x5, 0x4, 0x574, 0x64c}, {0x5, 0x4, 0x10001, 0x6}, {0x1, 0x5b2c, 0x3ff, 0x7}, {0xff, 0x2, 0x5, 0x62c5fc18}, {0x101, 0x7, 0x2, 0xfffffffffffffffd}, {0x7fff, 0x6, 0x8, 0x4}, {0x9, 0x0, 0x7, 0xff}, {0x4, 0x4, 0x4, 0x10000}, {0x59b0, 0xfff, 0x4, 0x4}, {0x1f, 0xfffffffffffffffd, 0x8001, 0x800}, {0x0, 0xffffffffffffffff, 0x2, 0x65}, {0x1ff, 0x1, 0x2, 0x7ff}, {0x4, 0x5, 0x1, 0x7be}, {0x9e4, 0x0, 0x7, 0x5}, {0x5, 0x8, 0x7f, 0xffffffff}, {0x4, 0x6, 0x5, 0x7ff}, {0x22aaaf52, 0x8f, 0x6, 0x10000}, {0x2, 0x7, 0xffff}, {0x5, 0xfffffffff016eb50, 0x82, 0x7}, {0x38, 0x800, 0x9a2a, 0xfffffffffffffffc}, {0x5, 0xb, 0x4, 0xfffffffffffff001}, {0x8b5, 0x81, 0x4, 0x2}, {0x8, 0xfffffffffffffff8, 0x1, 0x8}, {0x40, 0x4, 0x1, 0x100000001}, {0x9b, 0x5, 0x1, 0xd64c}, {0x100, 0x8, 0x7, 0x3ff}, {0xf11, 0x200, 0x7, 0x2}, {0xac5, 0x0, 0x3, 0x7}, {0x518, 0x1, 0x80}, {0x6, 0x7f, 0x6, 0x7298}, {0x7, 0x1, 0x2, 0x1ec9}, {0x400, 0x2, 0x6, 0x6c3}, {0x100000001, 0x6, 0x5, 0x9}, {0x8, 0x1dae, 0xfffffffffffffff8, 0x101}, {0x2, 0x7, 0x8, 0x3}, {0x0, 0x45b, 0x7, 0x72}, {0x100000001, 0xc00000000000, 0x100000001, 0x8}, {0x100000001, 0x0, 0xfffffffffffffffc, 0x3}, {0x95, 0x90b, 0x0, 0xfffffffffffff565}, {0x0, 0x4, 0x0, 0x2}], 0x40}}}]}}, @common=@IDLETIMER={'IDLETIMER\x00', 0x28, {{0x7f, 'syz0\x00'}}}}]}, {0x0, '\x00', 0x2, 0xfffffffffffffffc}, {0x0, '\x00', 0x2, 0xffffffffffffffff, 0x2, [{{{0x11, 0x40, 0x87df, 'irlan0\x00', 'sit0\x00', 'veth0_to_team\x00', 'ip6gretap0\x00', @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [0xff, 0xff, 0xff, 0xff, 0x0, 0xff], @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [0x0, 0xff, 0x0, 0xff], 0xb0, 0x210, 0x258, [@time={'time\x00', 0x18, {{0x1ff, 0x1, 0xe063, 0xb6c5, 0x2e80, 0x0, 0x2}}}]}, [@common=@redirect={'redirect\x00', 0x8, {{0xffffffffffffffff}}}, @common=@SECMARK={'SECMARK\x00', 0x108, {{0x1, 0x6, 'system_u:object_r:lost_found_t:s0\x00'}}}]}, @common=@ERROR={'ERROR\x00', 0x20, {"4323eed968d7072e70de82f41331fe3aed2aedc8f2fff16e54b1c4e2ad07"}}}, {{{0x5, 0x54, 0x888d, 'ip6gretap0\x00', 'teql0\x00', 'veth1_to_team\x00', 'erspan0\x00', @random="0eae55d5aac5", [0x0, 0xff, 0x0, 0xff, 0xff, 0xff], @empty, [0xff, 0xff, 0xff, 0x0, 0xff, 0xff], 0x70, 0x70, 0xb8}}, @common=@RATEEST={'RATEEST\x00', 0x20, {{'syz0\x00', 0x9, 0x1, 0x4}}}}]}]}, 0x9a0) 2018/05/15 08:25:26 executing program 3: syz_emit_ethernet(0x3e, &(0x7f00000001c0)={@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, @dev={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa]}, [], {@ipv6={0x86dd, {0x0, 0x6, "50a09c", 0x8, 0xffffff87, 0x0, @remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x3000000000000000], 0xbb}, @local={0xfe, 0x80, [], 0xaa}, {[], @udp={0x0, 0x0, 0x8}}}}}}, &(0x7f0000000040)) 2018/05/15 08:25:26 executing program 6: bpf$MAP_CREATE(0x2, &(0x7f0000003000)={0x13, 0x0, 0x77fffb, 0x0, 0x730000, 0x0}, 0x2c) 2018/05/15 08:25:26 executing program 2: syz_emit_ethernet(0x3e, &(0x7f00000001c0)={@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, @dev={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa]}, [], {@ipv6={0x86dd, {0x0, 0x6, "50a09c", 0x8, 0x0, 0x0, @remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x100000000000000], 0xbb}, @local={0xfe, 0x80, [], 0xaa}, {[], @udp={0x0, 0x0, 0x8}}}}}}, &(0x7f0000000040)) 2018/05/15 08:25:27 executing program 5: r0 = syz_open_procfs(0x0, &(0x7f0000000280)='net/ptype\x00') sendfile(r0, r0, &(0x7f00000000c0), 0x80000000) getsockopt$bt_BT_CHANNEL_POLICY(r0, 0x112, 0xa, &(0x7f0000000040)=0x7, &(0x7f0000000080)=0x4) r1 = semget$private(0x0, 0x3, 0x0) semctl$GETALL(r1, 0x0, 0xd, &(0x7f0000000100)=""/250) 2018/05/15 08:25:27 executing program 0: r0 = socket$can_raw(0x1d, 0x3, 0x1) r1 = dup(r0) getsockopt$inet_udp_int(0xffffffffffffffff, 0x11, 0x0, &(0x7f0000000000), &(0x7f0000000040)=0x4) 2018/05/15 08:25:27 executing program 4: syz_emit_ethernet(0x3e, &(0x7f00000001c0)={@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, @dev={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa]}, [], {@ipv6={0x86dd, {0x0, 0x6, "50a09c", 0x7, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xbb}, @local={0xfe, 0x80, [], 0xaa}, {[], @udp={0x0, 0x0, 0x8}}}}}}, &(0x7f0000000040)) 2018/05/15 08:25:27 executing program 6: bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x0, 0x4, 0x4, 0x5, 0x0, 0x1}, 0x2c) bpf$MAP_CREATE(0x2, &(0x7f0000003000)={0x13, 0x0, 0x77fffb, 0x0, 0x730000, 0x0}, 0x2c) 2018/05/15 08:25:27 executing program 2: syz_emit_ethernet(0x3e, &(0x7f00000001c0)={@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, @dev={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa]}, [], {@ipv6={0x86dd, {0x0, 0x6, "50a09c", 0x8, 0x0, 0x0, @remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x88caffff], 0xbb}, @local={0xfe, 0x80, [], 0xaa}, {[], @udp={0x0, 0x0, 0x8}}}}}}, &(0x7f0000000040)) 2018/05/15 08:25:27 executing program 3: syz_emit_ethernet(0x3e, &(0x7f00000001c0)={@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, @dev={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa]}, [], {@ipv6={0x86dd, {0x0, 0x6, "50a09c", 0x8, 0xffffff87, 0x0, @remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x400000000000000], 0xbb}, @local={0xfe, 0x80, [], 0xaa}, {[], @udp={0x0, 0x0, 0x8}}}}}}, &(0x7f0000000040)) 2018/05/15 08:25:27 executing program 7: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup(r0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000d40)=@broute={'broute\x00', 0x20, 0x4, 0x928, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000400], 0x0, &(0x7f0000000000), &(0x7f0000000400)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x2, [{{{0x5, 0x0, 0x0, 'bcsh0\x00', 'sit0\x00', 'syzkaller1\x00', 'veth0\x00', @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [], @dev={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa]}, [], 0x1d8, 0x228, 0x258, [@comment={'comment\x00', 0x100}, @owner={'owner\x00', 0x18}]}, [@common=@LED={'LED\x00', 0x28, {{'syz0\x00'}}}]}, @common=@redirect={'redirect\x00', 0x8}}, {{{0x11, 0x0, 0x0, 'veth1_to_bond\x00', 'erspan0\x00', 'bridge_slave_1\x00', 'veth0_to_bridge\x00', @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [], @random="cfa071dc33d9", [], 0x2e0, 0x2e0, 0x330, [@mac={'mac\x00', 0x10, {{@remote={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xbb}}}}, @bpf0={'bpf\x00', 0x210, {{0x0, [{0x0, 0x0, 0x0, 0x3ff}, {0x5, 0x8, 0x2, 0xff}, {0x1000, 0x48000000000, 0x3}, {0xf7, 0x1f, 0xfffffffffffffe00, 0x1}, {0x10000, 0xfc0, 0x1, 0x6}, {0x4, 0x2, 0xcefa, 0x81}, {0x815, 0xc7, 0x8001, 0x6a0}, {0x40, 0x0, 0x9, 0x80000001}, {0xffffffffffffff53, 0x38a, 0x100000000, 0x7}, {0x5, 0x1, 0x1000, 0x10001}, {0x80000000, 0x7, 0x1, 0xf7}, {0x2, 0x9, 0x4c, 0x5}, {0xfffffffffffffff7, 0x0, 0xe74, 0x52a}, {0x1ff, 0x7, 0x3, 0x7}, {0x6, 0x1ff, 0x49, 0x7}, {0x8000, 0x0, 0x7, 0x684}, {0xffe, 0x988, 0x3, 0x1}, {0x7b, 0x5a07, 0x18, 0x7}, {0xfffffffffffffffe, 0xfff, 0x3, 0x178180a0}, {0x2, 0xc0, 0x6, 0x401}, {0x5, 0x3, 0x8, 0x8}, {0xffffffffffff0001, 0x3, 0xfffffffffffffff7, 0x5}, {0x1ff, 0x8001, 0x3}, {0x3, 0x9, 0xffffffff, 0x2}, {0x5, 0x4, 0x574, 0x64c}, {0x5, 0x4, 0x10001, 0x6}, {0x1, 0x5b2c, 0x3ff, 0x7}, {0xff, 0x2, 0x5, 0x62c5fc18}, {0x101, 0x7, 0x2, 0xfffffffffffffffd}, {0x7fff, 0x6, 0x8, 0x4}, {0x9, 0x0, 0x7, 0xff}, {0x4, 0x4, 0x4, 0x10000}, {0x59b0, 0xfff, 0x4, 0x4}, {0x1f, 0xfffffffffffffffd, 0x8001, 0x800}, {0x0, 0xffffffffffffffff, 0x2, 0x65}, {0x1ff, 0x1, 0x2, 0x7ff}, {0x4, 0x5, 0x1, 0x7be}, {0x9e4, 0x0, 0x7, 0x5}, {0x5, 0x8, 0x7f, 0xffffffff}, {0x4, 0x6, 0x5, 0x7ff}, {0x22aaaf52, 0x8f, 0x6, 0x10000}, {0x2, 0x7, 0xffff}, {0x5, 0xfffffffff016eb50, 0x82, 0x7}, {0x38, 0x800, 0x9a2a, 0xfffffffffffffffc}, {0x5, 0xb, 0x4, 0xfffffffffffff001}, {0x8b5, 0x81, 0x4, 0x2}, {0x8, 0xfffffffffffffff8, 0x1, 0x8}, {0x40, 0x4, 0x1, 0x100000001}, {0x9b, 0x5, 0x1, 0xd64c}, {0x100, 0x8, 0x7, 0x3ff}, {0xf11, 0x200, 0x7, 0x2}, {0xac5, 0x0, 0x3, 0x7}, {0x518, 0x1, 0x80}, {0x6, 0x7f, 0x6, 0x7298}, {0x7, 0x1, 0x2, 0x1ec9}, {0x400, 0x2, 0x6, 0x6c3}, {0x100000001, 0x6, 0x5, 0x9}, {0x8, 0x1dae, 0xfffffffffffffff8, 0x101}, {0x2, 0x7, 0x8, 0x3}, {0x0, 0x45b, 0x7, 0x72}, {0x100000001, 0xc00000000000, 0x100000001, 0x8}, {0x100000001, 0x0, 0xfffffffffffffffc, 0x3}, {0x95, 0x90b, 0x0, 0xfffffffffffff565}, {0x0, 0x4, 0x0, 0x2}], 0x40}}}]}}, @common=@IDLETIMER={'IDLETIMER\x00', 0x28, {{0x7f, 'syz0\x00'}}}}]}, {0x0, '\x00', 0x2, 0xfffffffffffffffc}, {0x0, '\x00', 0x2, 0xffffffffffffffff, 0x2, [{{{0x11, 0x40, 0x87df, 'irlan0\x00', 'sit0\x00', 'veth0_to_team\x00', 'ip6gretap0\x00', @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [0xff, 0xff, 0xff, 0xff, 0x0, 0xff], @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [0x0, 0xff, 0x0, 0xff], 0xb0, 0x210, 0x258, [@time={'time\x00', 0x18, {{0x1ff, 0x1, 0xe063, 0xb6c5, 0x2e80, 0x0, 0x2}}}]}, [@common=@redirect={'redirect\x00', 0x8, {{0xffffffffffffffff}}}, @common=@SECMARK={'SECMARK\x00', 0x108, {{0x1, 0x6, 'system_u:object_r:lost_found_t:s0\x00'}}}]}, @common=@ERROR={'ERROR\x00', 0x20, {"4323eed968d7072e70de82f41331fe3aed2aedc8f2fff16e54b1c4e2ad07"}}}, {{{0x5, 0x54, 0x888d, 'ip6gretap0\x00', 'teql0\x00', 'veth1_to_team\x00', 'erspan0\x00', @random="0eae55d5aac5", [0x0, 0xff, 0x0, 0xff, 0xff, 0xff], @empty, [0xff, 0xff, 0xff, 0x0, 0xff, 0xff], 0x70, 0x70, 0xb8}}, @common=@RATEEST={'RATEEST\x00', 0x20, {{'syz0\x00', 0x9, 0x1, 0x4}}}}]}]}, 0x9a0) 2018/05/15 08:25:27 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f0000000280)="6e65742f6970365f7461626c65735f6d61746368657300b6e23bcf6093cb57f8b4d285e9c48608549acee9a66f09d47a011dcc8f5af7870c6c1b6eebe85ebea4ecda4e44def87e8ee568c843daaf2805944012bc0144937e8b04411d09016ca07f7388ded591e346fb612397e79a6fe43e5c6a86bee1565b17b22b8ed5c95b4afbb3a620d1402c50bbaad790d0ffdb7c5a27e60423079f77bf") unlink(&(0x7f0000000080)='./file0\x00') sendfile(0xffffffffffffffff, r0, &(0x7f00000000c0)=0x10000000, 0x2) ioctl$KDGKBMETA(r0, 0x4b62, &(0x7f0000000100)) getsockopt$inet_sctp_SCTP_PARTIAL_DELIVERY_POINT(r0, 0x84, 0x13, &(0x7f0000000140)={0x0, 0xfffffffffffffffa}, &(0x7f0000000180)=0x8) syslog(0x2, &(0x7f0000000cc0)=""/107, 0x6b) setsockopt$IP_VS_SO_SET_DEL(r0, 0x0, 0x484, &(0x7f0000000200)={0x87, @dev={0xac, 0x14, 0x14, 0x1a}, 0x4e24, 0x2, 'rr\x00', 0x3, 0x2, 0x66}, 0x2c) setsockopt$inet_sctp_SCTP_STREAM_SCHEDULER(r0, 0x84, 0x7b, &(0x7f00000001c0)={r1, 0x40ef2843}, 0x8) setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x40, &(0x7f0000000340)=ANY=[@ANYBLOB="73656375726974790000000000000000000000000000000000000000000000000e00000004000000f8030000fffffffff00000000000000000000000ffffffffffffffff600300006003000060030000ffffffff04000000", @ANYPTR=&(0x7f0000000d40)=ANY=[@ANYBLOB="000000000000000000000000002100ebe70048ca02fec408edfbaf31ba590218fdffffffffffd60000000000000000000000000000000000000000000000000021d13202a6d3d3de0000000000000000000000"], @ANYBLOB="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"], 0x458) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000000)='dctcp\x00', 0x6) 2018/05/15 08:25:27 executing program 4: syz_emit_ethernet(0x3e, &(0x7f00000001c0)={@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, @dev={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa]}, [], {@ipv6={0x86dd, {0x0, 0x6, "50a09c", 0x7, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xbb}, @local={0xfe, 0x80, [], 0xaa}, {[], @udp={0x0, 0x0, 0x8}}}}}}, &(0x7f0000000040)) 2018/05/15 08:25:27 executing program 2: syz_emit_ethernet(0x3e, &(0x7f00000001c0)={@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, @dev={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa]}, [], {@ipv6={0x86dd, {0x0, 0x6, "50a09c", 0x8, 0x0, 0x0, @remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x7000000], 0xbb}, @local={0xfe, 0x80, [], 0xaa}, {[], @udp={0x0, 0x0, 0x8}}}}}}, &(0x7f0000000040)) 2018/05/15 08:25:27 executing program 0: r0 = socket$can_raw(0x1d, 0x3, 0x1) r1 = dup(r0) getsockopt$inet_udp_int(0xffffffffffffffff, 0x11, 0x0, &(0x7f0000000000), &(0x7f0000000040)=0x4) 2018/05/15 08:25:27 executing program 3: syz_emit_ethernet(0x3e, &(0x7f00000001c0)={@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, @dev={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa]}, [], {@ipv6={0x86dd, {0x0, 0x6, "50a09c", 0x8, 0xffffff87, 0x0, @remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x300000000000000], 0xbb}, @local={0xfe, 0x80, [], 0xaa}, {[], @udp={0x0, 0x0, 0x8}}}}}}, &(0x7f0000000040)) 2018/05/15 08:25:27 executing program 6: bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x0, 0x4, 0x4, 0x5, 0x0, 0x1}, 0x2c) bpf$MAP_CREATE(0x2, &(0x7f0000003000)={0x13, 0x0, 0x77fffb, 0x0, 0x730000, 0x0}, 0x2c) 2018/05/15 08:25:27 executing program 5: r0 = openat$rfkill(0xffffffffffffff9c, &(0x7f0000001700)='/dev/rfkill\x00', 0x40, 0x0) getsockopt$inet_sctp6_SCTP_MAX_BURST(r0, 0x84, 0x14, &(0x7f0000001740), &(0x7f0000001780)=0x4) r1 = syz_open_procfs(0x0, &(0x7f0000000280)='net/ptype\x00') sendfile(r1, r1, &(0x7f00000000c0)=0xffffffb, 0x8e9) 2018/05/15 08:25:27 executing program 7: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup(r0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000d40)=@broute={'broute\x00', 0x20, 0x4, 0x928, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000400], 0x0, &(0x7f0000000000), &(0x7f0000000400)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x2, [{{{0x5, 0x0, 0x0, 'bcsh0\x00', 'sit0\x00', 'syzkaller1\x00', 'veth0\x00', @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [], @dev={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa]}, [], 0x1d8, 0x228, 0x258, [@comment={'comment\x00', 0x100}, @owner={'owner\x00', 0x18}]}, [@common=@LED={'LED\x00', 0x28, {{'syz0\x00'}}}]}, @common=@redirect={'redirect\x00', 0x8}}, {{{0x11, 0x0, 0x0, 'veth1_to_bond\x00', 'erspan0\x00', 'bridge_slave_1\x00', 'veth0_to_bridge\x00', @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [], @random="cfa071dc33d9", [], 0x2e0, 0x2e0, 0x330, [@mac={'mac\x00', 0x10, {{@remote={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xbb}}}}, @bpf0={'bpf\x00', 0x210, {{0x0, [{}, {0x5, 0x8, 0x2, 0xff}, {0x1000, 0x48000000000, 0x3}, {0xf7, 0x1f, 0xfffffffffffffe00, 0x1}, {0x10000, 0xfc0, 0x1, 0x6}, {0x4, 0x2, 0xcefa, 0x81}, {0x815, 0xc7, 0x8001, 0x6a0}, {0x40, 0x0, 0x9, 0x80000001}, {0xffffffffffffff53, 0x38a, 0x100000000, 0x7}, {0x5, 0x1, 0x1000, 0x10001}, {0x80000000, 0x7, 0x1, 0xf7}, {0x2, 0x9, 0x4c, 0x5}, {0xfffffffffffffff7, 0x0, 0xe74, 0x52a}, {0x1ff, 0x7, 0x3, 0x7}, {0x6, 0x1ff, 0x49, 0x7}, {0x8000, 0x0, 0x7, 0x684}, {0xffe, 0x988, 0x3, 0x1}, {0x7b, 0x5a07, 0x18, 0x7}, {0xfffffffffffffffe, 0xfff, 0x3, 0x178180a0}, {0x2, 0xc0, 0x6, 0x401}, {0x5, 0x3, 0x8, 0x8}, {0xffffffffffff0001, 0x3, 0xfffffffffffffff7, 0x5}, {0x1ff, 0x8001, 0x3}, {0x3, 0x9, 0xffffffff, 0x2}, {0x5, 0x4, 0x574, 0x64c}, {0x5, 0x4, 0x10001, 0x6}, {0x1, 0x5b2c, 0x3ff, 0x7}, {0xff, 0x2, 0x5, 0x62c5fc18}, {0x101, 0x7, 0x2, 0xfffffffffffffffd}, {0x7fff, 0x6, 0x8, 0x4}, {0x9, 0x0, 0x7, 0xff}, {0x4, 0x4, 0x4, 0x10000}, {0x59b0, 0xfff, 0x4, 0x4}, {0x1f, 0xfffffffffffffffd, 0x8001, 0x800}, {0x0, 0xffffffffffffffff, 0x2, 0x65}, {0x1ff, 0x1, 0x2, 0x7ff}, {0x4, 0x5, 0x1, 0x7be}, {0x9e4, 0x0, 0x7, 0x5}, {0x5, 0x8, 0x7f, 0xffffffff}, {0x4, 0x6, 0x5, 0x7ff}, {0x22aaaf52, 0x8f, 0x6, 0x10000}, {0x2, 0x7, 0xffff}, {0x5, 0xfffffffff016eb50, 0x82, 0x7}, {0x38, 0x800, 0x9a2a, 0xfffffffffffffffc}, {0x5, 0xb, 0x4, 0xfffffffffffff001}, {0x8b5, 0x81, 0x4, 0x2}, {0x8, 0xfffffffffffffff8, 0x1, 0x8}, {0x40, 0x4, 0x1, 0x100000001}, {0x9b, 0x5, 0x1, 0xd64c}, {0x100, 0x8, 0x7, 0x3ff}, {0xf11, 0x200, 0x7, 0x2}, {0xac5, 0x0, 0x3, 0x7}, {0x518, 0x1, 0x80}, {0x6, 0x7f, 0x6, 0x7298}, {0x7, 0x1, 0x2, 0x1ec9}, {0x400, 0x2, 0x6, 0x6c3}, {0x100000001, 0x6, 0x5, 0x9}, {0x8, 0x1dae, 0xfffffffffffffff8, 0x101}, {0x2, 0x7, 0x8, 0x3}, {0x0, 0x45b, 0x7, 0x72}, {0x100000001, 0xc00000000000, 0x100000001, 0x8}, {0x100000001, 0x0, 0xfffffffffffffffc, 0x3}, {0x95, 0x90b, 0x0, 0xfffffffffffff565}, {0x0, 0x4, 0x0, 0x2}], 0x40}}}]}}, @common=@IDLETIMER={'IDLETIMER\x00', 0x28, {{0x7f, 'syz0\x00'}}}}]}, {0x0, '\x00', 0x2, 0xfffffffffffffffc}, {0x0, '\x00', 0x2, 0xffffffffffffffff, 0x2, [{{{0x11, 0x40, 0x87df, 'irlan0\x00', 'sit0\x00', 'veth0_to_team\x00', 'ip6gretap0\x00', @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [0xff, 0xff, 0xff, 0xff, 0x0, 0xff], @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [0x0, 0xff, 0x0, 0xff], 0xb0, 0x210, 0x258, [@time={'time\x00', 0x18, {{0x1ff, 0x1, 0xe063, 0xb6c5, 0x2e80, 0x0, 0x2}}}]}, [@common=@redirect={'redirect\x00', 0x8, {{0xffffffffffffffff}}}, @common=@SECMARK={'SECMARK\x00', 0x108, {{0x1, 0x6, 'system_u:object_r:lost_found_t:s0\x00'}}}]}, @common=@ERROR={'ERROR\x00', 0x20, {"4323eed968d7072e70de82f41331fe3aed2aedc8f2fff16e54b1c4e2ad07"}}}, {{{0x5, 0x54, 0x888d, 'ip6gretap0\x00', 'teql0\x00', 'veth1_to_team\x00', 'erspan0\x00', @random="0eae55d5aac5", [0x0, 0xff, 0x0, 0xff, 0xff, 0xff], @empty, [0xff, 0xff, 0xff, 0x0, 0xff, 0xff], 0x70, 0x70, 0xb8}}, @common=@RATEEST={'RATEEST\x00', 0x20, {{'syz0\x00', 0x9, 0x1, 0x4}}}}]}]}, 0x9a0) 2018/05/15 08:25:27 executing program 4: r0 = socket$kcm(0x29, 0x5, 0x0) recvmsg$kcm(r0, &(0x7f0000019280)={&(0x7f0000019180)=@can, 0x80, &(0x7f0000019200), 0x0, &(0x7f0000019240)=""/54, 0x36}, 0x0) socketpair(0x0, 0x0, 0x0, &(0x7f0000000000)) 2018/05/15 08:25:27 executing program 2: syz_emit_ethernet(0x3e, &(0x7f00000001c0)={@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, @dev={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa]}, [], {@ipv6={0x86dd, {0x0, 0x6, "50a09c", 0x8, 0x0, 0x0, @remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3580], 0xbb}, @local={0xfe, 0x80, [], 0xaa}, {[], @udp={0x0, 0x0, 0x8}}}}}}, &(0x7f0000000040)) 2018/05/15 08:25:27 executing program 6: bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x0, 0x4, 0x4, 0x5, 0x0, 0x1}, 0x2c) bpf$MAP_CREATE(0x2, &(0x7f0000003000)={0x13, 0x0, 0x77fffb, 0x0, 0x730000, 0x0}, 0x2c) 2018/05/15 08:25:27 executing program 0: r0 = socket$can_raw(0x1d, 0x3, 0x1) r1 = dup(r0) getsockopt$inet_udp_int(0xffffffffffffffff, 0x11, 0x0, &(0x7f0000000000), &(0x7f0000000040)=0x4) 2018/05/15 08:25:27 executing program 5: r0 = syz_open_procfs(0x0, &(0x7f0000000280)='net/ptype\x00') sendfile(r0, r0, &(0x7f0000000000)=0xffffffd, 0x7fffffff) syz_open_dev$audion(&(0x7f0000000040)='/dev/audio#\x00', 0x1, 0x0) 2018/05/15 08:25:28 executing program 3: syz_emit_ethernet(0x3e, &(0x7f00000001c0)={@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, @dev={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa]}, [], {@ipv6={0x86dd, {0x0, 0x6, "50a09c", 0x8, 0xffffff87, 0x0, @remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x1100000000000000], 0xbb}, @local={0xfe, 0x80, [], 0xaa}, {[], @udp={0x0, 0x0, 0x8}}}}}}, &(0x7f0000000040)) 2018/05/15 08:25:28 executing program 2: syz_emit_ethernet(0x3e, &(0x7f00000001c0)={@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, @dev={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa]}, [], {@ipv6={0x86dd, {0x0, 0x6, "50a09c", 0x8, 0x0, 0x0, @remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x543], 0xbb}, @local={0xfe, 0x80, [], 0xaa}, {[], @udp={0x0, 0x0, 0x8}}}}}}, &(0x7f0000000040)) 2018/05/15 08:25:28 executing program 7: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup(r0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000d40)=@broute={'broute\x00', 0x20, 0x4, 0x928, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000400], 0x0, &(0x7f0000000000), &(0x7f0000000400)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x2, [{{{0x5, 0x0, 0x0, 'bcsh0\x00', 'sit0\x00', 'syzkaller1\x00', 'veth0\x00', @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [], @dev={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa]}, [], 0x1d8, 0x228, 0x258, [@comment={'comment\x00', 0x100}, @owner={'owner\x00', 0x18}]}, [@common=@LED={'LED\x00', 0x28, {{'syz0\x00'}}}]}, @common=@redirect={'redirect\x00', 0x8}}, {{{0x11, 0x0, 0x0, 'veth1_to_bond\x00', 'erspan0\x00', 'bridge_slave_1\x00', 'veth0_to_bridge\x00', @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [], @random="cfa071dc33d9", [], 0x2e0, 0x2e0, 0x330, [@mac={'mac\x00', 0x10, {{@remote={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xbb}}}}, @bpf0={'bpf\x00', 0x210, {{0x0, [{}, {0x0, 0x8, 0x2, 0xff}, {0x1000, 0x48000000000, 0x3}, {0xf7, 0x1f, 0xfffffffffffffe00, 0x1}, {0x10000, 0xfc0, 0x1, 0x6}, {0x4, 0x2, 0xcefa, 0x81}, {0x815, 0xc7, 0x8001, 0x6a0}, {0x40, 0x0, 0x9, 0x80000001}, {0xffffffffffffff53, 0x38a, 0x100000000, 0x7}, {0x5, 0x1, 0x1000, 0x10001}, {0x80000000, 0x7, 0x1, 0xf7}, {0x2, 0x9, 0x4c, 0x5}, {0xfffffffffffffff7, 0x0, 0xe74, 0x52a}, {0x1ff, 0x7, 0x3, 0x7}, {0x6, 0x1ff, 0x49, 0x7}, {0x8000, 0x0, 0x7, 0x684}, {0xffe, 0x988, 0x3, 0x1}, {0x7b, 0x5a07, 0x18, 0x7}, {0xfffffffffffffffe, 0xfff, 0x3, 0x178180a0}, {0x2, 0xc0, 0x6, 0x401}, {0x5, 0x3, 0x8, 0x8}, {0xffffffffffff0001, 0x3, 0xfffffffffffffff7, 0x5}, {0x1ff, 0x8001, 0x3}, {0x3, 0x9, 0xffffffff, 0x2}, {0x5, 0x4, 0x574, 0x64c}, {0x5, 0x4, 0x10001, 0x6}, {0x1, 0x5b2c, 0x3ff, 0x7}, {0xff, 0x2, 0x5, 0x62c5fc18}, {0x101, 0x7, 0x2, 0xfffffffffffffffd}, {0x7fff, 0x6, 0x8, 0x4}, {0x9, 0x0, 0x7, 0xff}, {0x4, 0x4, 0x4, 0x10000}, {0x59b0, 0xfff, 0x4, 0x4}, {0x1f, 0xfffffffffffffffd, 0x8001, 0x800}, {0x0, 0xffffffffffffffff, 0x2, 0x65}, {0x1ff, 0x1, 0x2, 0x7ff}, {0x4, 0x5, 0x1, 0x7be}, {0x9e4, 0x0, 0x7, 0x5}, {0x5, 0x8, 0x7f, 0xffffffff}, {0x4, 0x6, 0x5, 0x7ff}, {0x22aaaf52, 0x8f, 0x6, 0x10000}, {0x2, 0x7, 0xffff}, {0x5, 0xfffffffff016eb50, 0x82, 0x7}, {0x38, 0x800, 0x9a2a, 0xfffffffffffffffc}, {0x5, 0xb, 0x4, 0xfffffffffffff001}, {0x8b5, 0x81, 0x4, 0x2}, {0x8, 0xfffffffffffffff8, 0x1, 0x8}, {0x40, 0x4, 0x1, 0x100000001}, {0x9b, 0x5, 0x1, 0xd64c}, {0x100, 0x8, 0x7, 0x3ff}, {0xf11, 0x200, 0x7, 0x2}, {0xac5, 0x0, 0x3, 0x7}, {0x518, 0x1, 0x80}, {0x6, 0x7f, 0x6, 0x7298}, {0x7, 0x1, 0x2, 0x1ec9}, {0x400, 0x2, 0x6, 0x6c3}, {0x100000001, 0x6, 0x5, 0x9}, {0x8, 0x1dae, 0xfffffffffffffff8, 0x101}, {0x2, 0x7, 0x8, 0x3}, {0x0, 0x45b, 0x7, 0x72}, {0x100000001, 0xc00000000000, 0x100000001, 0x8}, {0x100000001, 0x0, 0xfffffffffffffffc, 0x3}, {0x95, 0x90b, 0x0, 0xfffffffffffff565}, {0x0, 0x4, 0x0, 0x2}], 0x40}}}]}}, @common=@IDLETIMER={'IDLETIMER\x00', 0x28, {{0x7f, 'syz0\x00'}}}}]}, {0x0, '\x00', 0x2, 0xfffffffffffffffc}, {0x0, '\x00', 0x2, 0xffffffffffffffff, 0x2, [{{{0x11, 0x40, 0x87df, 'irlan0\x00', 'sit0\x00', 'veth0_to_team\x00', 'ip6gretap0\x00', @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [0xff, 0xff, 0xff, 0xff, 0x0, 0xff], @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [0x0, 0xff, 0x0, 0xff], 0xb0, 0x210, 0x258, [@time={'time\x00', 0x18, {{0x1ff, 0x1, 0xe063, 0xb6c5, 0x2e80, 0x0, 0x2}}}]}, [@common=@redirect={'redirect\x00', 0x8, {{0xffffffffffffffff}}}, @common=@SECMARK={'SECMARK\x00', 0x108, {{0x1, 0x6, 'system_u:object_r:lost_found_t:s0\x00'}}}]}, @common=@ERROR={'ERROR\x00', 0x20, {"4323eed968d7072e70de82f41331fe3aed2aedc8f2fff16e54b1c4e2ad07"}}}, {{{0x5, 0x54, 0x888d, 'ip6gretap0\x00', 'teql0\x00', 'veth1_to_team\x00', 'erspan0\x00', @random="0eae55d5aac5", [0x0, 0xff, 0x0, 0xff, 0xff, 0xff], @empty, [0xff, 0xff, 0xff, 0x0, 0xff, 0xff], 0x70, 0x70, 0xb8}}, @common=@RATEEST={'RATEEST\x00', 0x20, {{'syz0\x00', 0x9, 0x1, 0x4}}}}]}]}, 0x9a0) 2018/05/15 08:25:28 executing program 6: bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x10, 0x0, 0x4, 0x5, 0x0, 0x1}, 0x2c) bpf$MAP_CREATE(0x2, &(0x7f0000003000)={0x13, 0x0, 0x77fffb, 0x0, 0x730000, 0x0}, 0x2c) 2018/05/15 08:25:28 executing program 0: r0 = syz_open_procfs(0x0, &(0x7f0000000780)="2f65786500000000000409004bddd9de91be10eebf000ee9a90f798058439ed554fa07424adee901d2da75af1f0200f5ab26d7a071fb35331ce39c5a") ioctl$KVM_IOEVENTFD(r0, 0x40106614, &(0x7f0000000040)) 2018/05/15 08:25:28 executing program 5: r0 = syz_open_procfs(0x0, &(0x7f0000000280)='net/ptype\x00') sendfile(r0, r0, &(0x7f0000000000)=0xffffffd, 0x7fffffff) ioctl$TIOCGSID(r0, 0x5429, &(0x7f0000000080)=0x0) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x4, 0x5, 0x8000, 0x9bac, 0x3a, r0, 0xe7}, 0x2c) open_by_handle_at(r2, &(0x7f0000001480)={0xfb, 0x1, "59c7a70fccd5aab149446a8a0133cc1448fdb64952bf6f51645cd1f8bb28579f83a2517dade5d6a1c6816270cbe49917269e71f5a7182a239ecf28f5d82c98fd9505897bedb070db77b0bfe543c28a646fcb9858e0d5808127b8b8712959e37658e0c014481ea620a604eb92a9868840ec79a171bc07d149d5044c2e856ca5c74b79a62d468d6ece9828dbbfc8efa9007175966a89b6647089a43c021975d3d76b6fd8624fcc10e3bc5b2ffea5867d1779b332cdb1346051bfe89d29ef170b0bd90e5eef0542595d24ddc5b09e831145a40e2921a63f0976e4f78da3137000e3d5bff75e735b01815b0bfbdf00495c5adbb334"}, 0x0) sendmsg$netlink(r0, &(0x7f0000000140)={&(0x7f0000000040)=@proc={0x10, 0x0, 0x25dfdbff, 0x1000}, 0xc, &(0x7f0000000100)=[{&(0x7f00000002c0)={0x1198, 0x24, 0x300, 0x70bd25, 0x25dfdbfb, "", [@generic="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", @typed={0x8, 0x8, @pid=r1}, @nested={0xc4, 0x29, [@typed={0x14, 0x60, @str='trustedvmnet1\x00'}, @generic="32c28c25c5de595d770d763089194343b70290181b637459c1df7ed93c462ae8103b76e8c826c359c0016846623d958ff302251e171cfe2a017c4435a37c6a6ff99e8c85aa138ebf10131c3e884bfeb4297de747eba5d40fabfc25c5a300b091cc720fe6322d8365746645a383df41a79e4e9b48b05a4f00033afc6e3959b170b36391d18439ae925dee871b33172500a416c3e7bae24537e35cdb201ba0d3cc2f8a", @generic="af79a4920e86ee2674"]}, @nested={0xbc, 0x66, [@typed={0x14, 0x5b, @ipv6=@loopback={0x0, 0x1}}, @generic="80b5272e3795bb709be23c845f8ed71f45174acb54eb51d7604047a314dbe37b2f0a9a67ae9d83575db9b0642715c5010ecab6ba960201f87a5cd38ddb515f1a2b8dff019ee58924d276f7bc624ce9d83a134d6592ea83cd8b8a830c722cbfc05f927ae1328058b60f1786dbf64073e505aa8ee4c155ca32f6cc023eceff729abb0114b8d294d2317a096b", @typed={0x10, 0x12, @str='lo//eth1\x00'}, @typed={0x8, 0x96, @ipv4=@broadcast=0xffffffff}]}]}, 0x1198}, {&(0x7f00000000c0)={0x24, 0x14, 0xc20, 0x7, 0x25dfdbfd, "", [@typed={0x8, 0x57, @pid}, @typed={0xc, 0x71, @u64=0x5e66}]}, 0x24}], 0x2, 0x0, 0x0, 0x80}, 0x4000) 2018/05/15 08:25:28 executing program 4: syz_emit_ethernet(0x3e, &(0x7f00000001c0)={@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, @dev={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa]}, [], {@ipv6={0x86dd, {0x0, 0x6, "50a09c", 0x8, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xbb}, @local={0xfe, 0x80, [], 0xaa}, {[], @udp={0x0, 0x0, 0x4c}}}}}}, &(0x7f0000000040)) 2018/05/15 08:25:28 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f0000000280)="6e65742f6970365f7461626c65735f6d61746368657300b6e23bcf6093cb57f8b4d285e9c48608549acee9a66f09d47a011dcc8f5af7870c6c1b6eebe85ebea4ecda4e44def87e8ee568c843daaf2805944012bc0144937e8b04411d09016ca07f7388ded591e346fb612397e79a6fe43e5c6a86bee1565b17b22b8ed5c95b4afbb3a620d1402c50bbaad790d0ffdb7c5a27e60423079f77bf") unlink(&(0x7f0000000080)='./file0\x00') sendfile(0xffffffffffffffff, r0, &(0x7f00000000c0)=0x10000000, 0x2) ioctl$KDGKBMETA(r0, 0x4b62, &(0x7f0000000100)) getsockopt$inet_sctp_SCTP_PARTIAL_DELIVERY_POINT(r0, 0x84, 0x13, &(0x7f0000000140)={0x0, 0xfffffffffffffffa}, &(0x7f0000000180)=0x8) syslog(0x2, &(0x7f0000000cc0)=""/107, 0x6b) setsockopt$IP_VS_SO_SET_DEL(r0, 0x0, 0x484, &(0x7f0000000200)={0x87, @dev={0xac, 0x14, 0x14, 0x1a}, 0x4e24, 0x2, 'rr\x00', 0x3, 0x2, 0x66}, 0x2c) setsockopt$inet_sctp_SCTP_STREAM_SCHEDULER(r0, 0x84, 0x7b, &(0x7f00000001c0)={r1, 0x40ef2843}, 0x8) setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x40, &(0x7f0000000340)=ANY=[@ANYBLOB="73656375726974790000000000000000000000000000000000000000000000000e00000004000000f8030000fffffffff00000000000000000000000ffffffffffffffff600300006003000060030000ffffffff04000000", @ANYPTR=&(0x7f0000000d40)=ANY=[@ANYBLOB="000000000000000000000000002100ebe70048ca02fec408edfbaf31ba590218fdffffffffffd60000000000000000000000000000000000000000000000000021d13202a6d3d3de0000000000000000000000"], @ANYBLOB="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"], 0x458) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000000)='dctcp\x00', 0x6) 2018/05/15 08:25:28 executing program 6: bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x10, 0x0, 0x4, 0x5, 0x0, 0x1}, 0x2c) bpf$MAP_CREATE(0x2, &(0x7f0000003000)={0x13, 0x0, 0x77fffb, 0x0, 0x730000, 0x0}, 0x2c) 2018/05/15 08:25:29 executing program 2: syz_emit_ethernet(0x3e, &(0x7f00000001c0)={@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, @dev={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa]}, [], {@ipv6={0x86dd, {0x0, 0x6, "50a09c", 0x8, 0x0, 0x0, @remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3a000000], 0xbb}, @local={0xfe, 0x80, [], 0xaa}, {[], @udp={0x0, 0x0, 0x8}}}}}}, &(0x7f0000000040)) 2018/05/15 08:25:29 executing program 0: r0 = syz_open_procfs(0x0, &(0x7f0000000780)="2f65786500000000000409004bddd9de91be10eebf000ee9a90f798058439ed554fa07424adee901d2da75af1f0200f5ab26d7a071fb35331ce39c5a") ioctl$KVM_IOEVENTFD(r0, 0x40106614, &(0x7f0000000040)) 2018/05/15 08:25:29 executing program 5: r0 = syz_open_procfs(0x0, &(0x7f0000000280)='net/ptype\x00') sendfile(r0, r0, &(0x7f0000000000)=0xffffffd, 0x7fffffff) getsockopt$inet6_mreq(r0, 0x29, 0x1f, &(0x7f0000000040)={@mcast2, 0x0}, &(0x7f0000000080)=0x14) sendmsg$kcm(r0, &(0x7f0000002980)={&(0x7f00000000c0)=@hci={0x1f, r1, 0x1}, 0x80, &(0x7f00000014c0)=[{&(0x7f0000000140)="512c8f44cfdf3b7c170f06f3ac8bd579b1bdf588ea7caafd917a654c48b4a9f5ceae587c513863d037bf8fe72fff96fe03d7c03d4b2cd6caeb7242c4294af8ef6acfd791e2ce1190f28476be7560dbae4b9ecc2b184d66c54a242368bbc1452fb08842e3c88949e952d9135067", 0x6d}, {&(0x7f00000002c0)="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", 0x1000}, {&(0x7f00000001c0)}, {&(0x7f0000000200)="dfda9e7b55c86280577ef43eb3fa014fca44b1ba2e584b10392958bf7c8c78fcc4ad19d211990d63d5cc9443dbd8ae4c65211b05e5e5e770b8f982cbbdf9d4e13723dd5da0b1def8d955d7cf1c5b2039db50ff7d88a6aae028c4b209533eb82073", 0x61}, {&(0x7f00000012c0)="2b07e088905c3f3a78e0d17a153f2429593729f1a48bebf41e5dbb8ba00503fbea748d4fc8a36e512158d9e22a382372a9a89cb60626ee6f14873d309673af1fa75cf5de73dcaa75b754168fdd80878d618a151b818b16eb87bf4b6fea24184af23084c7f9f37a3de40e2ce00306f135697e7da4045cd8f95d", 0x79}, {&(0x7f0000001340)="67d760c57c1dce3f452e1c4326d66736b67dc713cf1059112f54f92954a2fa8acd644357763a69a3d9d45bf4dc1cc0e1d3860324b5d935cb3751e3893adeb58b1c7bf9e2b5bd39c83e1d5f7382e6dbada14c9cb0f4e0e973ebd63d526db9bcd177fc4c57c7080a9518e4c3b04f0fa6031c2f11fb1dbaf7", 0x77}, {&(0x7f00000013c0)="3f3fc787a07bd3812b64985d917e4ea346e4211f5c0a6583d389e9fee4cacbf84c8758866a5d15a0a69d712ee6a1af3d3c97499c406f16698d5a40ffc7b7c88ff8516765384b71d389730ac76d0959df88a8dbd3bd742138737524a74ea24bcae5a062ced9e6d1114331b33bbb0141bee7628fe1a568f5e72cef75851d1e20f8", 0x80}, {&(0x7f0000001440)="0c1235e43bc24fbdd79e17c049d163f183f0e276c59e3fb0a4f15d6c04c461a7b42eeccbe5feabac181fc35566b7ea8634993a9e73df934f42462f5629edd5b3a22f66e9ba6fb53b1aee329b7ce38dceb4d149fc45d4870d11ffb6e89041a67725b2", 0x62}], 0x8, &(0x7f0000001540)=[{0x90, 0x13b, 0x1a, "b7c2f165a226980b6a3b134a6d9d20e7ced6b00d65fc09b07673835a28d7bd34053a9a7c224c7016538ce9c95fdc703ce19ce982624781a3bb0f7ed72ece191c9c62430b6105c8b97713cc8820f6361a14593a44f8a0b1389d9f7996c1694e283782936babaed972885013b339074c5be527fb2d41ab78ef50af2f2adc"}, {0x20, 0x10a, 0xffffffffffffffb3, "72e5f2e64ad256ad3e61f396"}, {0x80, 0x113, 0x64, "0fc666fb73308046b3774ff8526098781fa65c11eecf4c4d524b77a00b1d6b82025bc27e323979aad971e7420072bb58850d5d04ab993577b31e22e050f1863d93cabd76a671836daf40804065c71258c0631c344c8a2ecdf62ebe5dea9efb19374d10877662197a02c51f"}, {0x20, 0x10f, 0x8, "45d4deed1fc892fd038eb884936920"}, {0x108, 0x10b, 0x6, "12bac6b6f71c2f26d38d5428e7bf50f322bc498acefef87584a48369ae6b2086d55833ba08ad5d8fc282a9e46ce3a68529bb5d5773099ccef29547f9d50130d6c8b25515970f473704069eb7fa1e296cb7ef8c7f01cb9576d41a7a2777637fab4538c34b0785c39642ae21222f7d946f971d55ca81f02d2eb216c33a653a0406ed79dde24fda053a9d89a093fff8d3251e0d99581ad236961eee981d301702d9f65254149ef4326df57aeb975849d1e218244e6d394d7931b75397ac5184ed62266b7956197b4d448943b680a372c356a9881d5ea3ccd93de79bd1ba8f6611188ac7fe35f8bca096266ee0b9afa6d780a5be252c521829c4"}, {0x1010, 0x11c, 0x3, "2839cf830ff1252821487ac033410f009a3d052e2edcbc1d96cf5ee402f3b94f09ee610718661a6f2c27c5e9d848c7bdd6e1a0b8c8cbd5cc16828dcb755cd9c9c2537dba134175f06fd192353510622e786208269ac3eed0fd936a5a0a08a072eec6826e508653f1a9f690801b0d88442451cf3f3aaa0f3642196597a8c9d2614d6a3228cbce2cad84a3b4623b8880e58891294c8e8ab13dda9a4c53b94c193adb0492c186464e19754455f2dd88a2b33b6506503fe0da6dd2e22ba07f217918e45a6938d82c62c08049f3391cce3632e0518cacce8b3dbb0678f5d35ccfc92e7a70919c258b39e6485a9b837d9b8d22c1b42af51a40ffe0c8fcb01893d92bcc8331fdb25e3bf1ba1fac12c3f1fff7b7079edf41077ca165a962ae41d28b01721dcf8a8f5cfcd2eadcf3b9fde01b2a065f9165c4219268e08fcf0e30098a958586bc5eaffe9caac3ecdf148ace03145d5c2b743d44bf7f2f9c7b338a48f0d7192695922efa271816b8bde45e7dc7522b40edbff7f3f509bda0151717567340434cd2af5e01bd54f3a325bfeac064262ad55707001b6115258285d38a2beede967d98d8605194296837f8c4b80aa9d9983ba6990996a0c17690d8c40138164bedbac1289c92ed01fd9c4f769a389c764399d58798ebefef9c26bb4df92696ab1881ba57c74a572bd0bafe4c1af1696922494ca628bb14245716605c757acfefa1c1b6e698ea952c973812ce9231b7279805d1aa2f69b2d29e0ca49a75ea5c794dd183ec24ca4b3322081b2504eb5ba96016eaa9c877f8cd8d794204d287a81a60ff1c32fbea8f73228f35a68ed6c8b0c2d79ee522ee9a997685be49d5eebc4d3c962cae832f69e7a178163c66cc58f171572cc3c00bb645aee517a2e65136175b1aa2f5d75d0e6535e466feef5f1d311724ed8b7729d78a6a7630f13547992de87d53111a42905185f715bb099b8e1c57f885be73233f6527fca252cec1ab1bc85fbe15ea8fe9926a6c2159e00ec05a703f8a006347a123431602e61f630bfec4aecbfe5366179c7340db1e8982a77b33aaab07e552fb95066b065106670ba34426dc0e2d6f092d999c6c533afd1c822b07c7062578c402fe7963b34eb3aacf0cf26f09835bcb7353e7ffdeb644208e599f5e2fbaaf08063a9afeef81d4b58a23d1a887ce53b1de16e714c5816e15cbdc142a114c3cea703b1e404d3968019433f3d550445edf55b92398813bd5e67455db766db5ffd0ce910326580ff2cecb0e41e1bb20bddea021a19f1482027c3d77ed8067166ac6eef404f2960879f5a2b7d4839d8913d39a764a8abbc0385bf78a14f19055d9c1c0ee012a9f04fa72a743ed8bb4b89b3b561ee4e000d09613d65cb61eb509e099a633808338af544f04a742eee801219b95c769d6eda7838a35d41cb5cc19b47c3d1ef913664977613df8cc830b587a7b64cdfe2fbf5caf41a4dfebc0e5a5cd307fbd72606d8b50490a3dec306398137ac19f4deffeebea2aee68e27a07f5724b689a0e35f9044cef391014f6257912dbd8c038e719e1eb3dd7d37077d042e37808f576448940515db68c92fbc2fbe16881a84eedd27ef1909a9a059e04b9f6307e615dbd0e6c974e3445d8c79a380033f2d7ad292b446a9b2ee1f8eaa932188a6b1a63a6729c2b1ddc3d93207c52a6dde87e29ab816dd129b87a55b9a68b24ad4920359360aa7c86988eb6c375c0bfc16338053d916b5cebe4fe6fb14cc06ee0e93b3586c75206ad6ff1ffabf6131745ce8a997e7298cc85662994cd6612d8ab060bf75b0b3440b173b2272ecf0ea905023533b51d01d794b9367e8af62f98e0a2606f51fe8007ca0a049d01aa758e5f9becdfcb417c4cabb94ac7ec93aa3a37bed8a1340e62f7e9ef9c34e0cd6e0d0ebea8752cbf7cacc823e3bb1bdb7875a7e143c78aed80ec8e81fdaf7ea43f4c1011a462c97e875cd489be5399213bc0e466fa0c013b8629c09c8c090e2160856a8466613b74528c26a7d3a308824a40076d8dd59cabfff9f4bf00897fb9fde3f7a1532f2928e0b1f6f9f167a56cb83c161807be77e5e96e655dac4fa6fe046b79666cb8b6cf3590f0db7304247975918e52675e5d4c833927f926e02ad2099f0f028bdb4909c9cf44255c7166c160da0539d37d3087ec8d6e3c3aac32577ae673225096b31b448f383b87a4b884a9d069f40360d3b917747ed7a6c23243926beefe864070219493de27c023530a8a0e35931b6f177a95cb5052fc39b0eeb545d0fe28ae8edb92ec2cbd0b5201fa81eb4b2db8bcdc7636deeac1ef66c77456f3d974e07386e69dc2916e6dbd95247270ccce8305cf55ced0671176eeb73234b58283b3ea0bed26b017297f07110493abed04939b5a40c042c537bcc9c981942519c7a675ee7d963cd0c82f775ac29d75ebec1897b969793e68828cec2aa14e20bebf67f590f6d67a0900624a5460f535e9dbc42ac6236683c435b33b9f5c7aa88366ff908aa1b71f6809f211895dea940a2965314de534e6ac81b87cedb9673dc283627eff9d581645e992f453bd7b272f9357e3f65d97ca28c7f14b1978436a34a2f941f23f1603587d46580ef3b172542a330d07c2284202cf266b196621d0ddbf2c9ae2af461b317ae6ca9fc2c7604cdbf683bac21c435fdfe539210fa387ed80616dd9dd4dca97213f7a5df70c369539e4327106ee68cc950c6f680bb2d20bb8ad4f464ca1798ab1d96282616c6b735a24e8f96de4109fb35e5fd57f11a26a957ac05ad6ed8965a9f3d8a541f73c075d8e30626f6a25bece78ae1c9a0ead87904ee21540c64dc726d6250e65613286b9cb6831161f97169509716bb5e55fba503c009e18af8d2b97d9bbbde99d8116113c9c3b899aacde689271cb8741e2355d598f592e962be09de85de9a5f67e56ca41da63e90cbe74f13838f25829f58e9c4c0eb22cee87a69bcc15c48e09d2bd9b00578e75793efd7f5d712a1792c175e0067d16d1916d675f408d2c79412709b03d5c21ce3db5576c27192219a83a839c71a99efe52547ee7839ebdcbe00d7bf1e13527f152cca23ee372bdf062fb341c7a54530599cc8f8cb85f79f319e7652627c5c9dc17f2cc87ea895137a73c699b09b3c38b5a10ceab065f5a576b5dd02252563691b4d74a5510bb4cfc34d0b1e8d015170032fb932c8b0ed28f0adb7c0b951e37e4112d5f3d148d57421ae3b53aa3d65557c736c1969d1b76ff60d3644dec97415f5b75c4e761a23d520eb648bc862b19d2c66b740ee0ec3368fd2dce4df512f9d36cfeae6c8a13fe38c5b43dbdc0d2d0396315bed63c8d99e78d12d152c7123119afb2bd5ad76b723e378d38bd2c8bf84595e247ef90e7cf15ac9debda1153624bb73dee20dc2d4694b704aa6c2e3cf97ae4839eea607ad69d40d8ceda80680735c97b1c70329d17013515af7532d3753ef4ab4ae996f1656f62b725682981177c489c9bb5f7d1c69bc3f7a791c0097510f7486cb351894c1898f3185f1fc376dfcfbaefb3e4286ffede58de32902b34845c4cf98ad06eb25932ca09951a411b0568fe919f9bf41985611593295adc6ad85e9bdf38a097eec3ad8e3eda229d44396867ea1ff6729a88a2cb68df0e466e2ee9c11fb8c007e4348e1613d7ede99a84f78539edbcfd86421584bd1d2f0a53c021332584919878606a4c6d0825f1e8efd179abc848a8427e4748630e52652be1a7db4a9615945410bf4d9f7459681493f2734bda615b6e10f7e1fb446a6b82f97698dbd77ec5d33c120dceec46922505395875d72353d2ff93ce751ae83394f5bd6f17e886f62c21d3f3b0b0ccc149ee7cf22aa75ac109f831d7972be54053a8e9affbdc42244b07c2cda7e4eee2d8b2c54fb593cc73a3f5531b8f8a09bdc1c9344ea17352a2f3500b5a4abf67b71d8651fe8adcfd8e5e155567e783ea6d47b5d1f78b49fe15e8336cc73cbbef23b882cb2a22c9c2f1ce9600172a478de6299e4a3612f07f50c906e572edba3645d8230633162f730c0318043ffee4ec04e9cd7f8ab1c5fb8f8d911d918f533c66ef64ee81713a11e9db9244208611df7b48b026921048e3bea7a351ab964fa594c586566cc3ac3953e663c70809259f733adbff66812bc795c36b3ec62ff056643feef8240465ea7dfd98f04fcb8ebe17cc881bf72fb164bc3a601264213c2c1a4d44a87bc9ee53f83564af0bb0dd3bc506ded0c4e1ba8f2ad6b5951cb2a97f478b0be6d8d0d70a88b9020b6c3ad621e85dbd36643a150ea211e3ce21f50ff211f38b4450bed41169a32965bbcf7c92dcf612329be721ce63fdc1cc7acf100501ea8f516dac831bc5b0ac2a1459fdc56433b0cb37dd74530f0a678a1877490a04c5f85839eaf718ef4ea85ec3a47ee66ac9346fffbee79d256636e30ed51825080a52cc102a4cb91414eea6b1bbe92fa63f4dffcdb912d1ffad882082faa9ae24b4b01811b206ba7e46496eba8ba49614c2ae47752483b31d88757adae0f60f3af7316038543e294dd7d9f0fce35efba92460221da896fe62dd68e55e58f07fa7069d02c6c07759a73b81a8757374a258fbf41ff212df82a808f4b14e7f0a455059f8511b9e4315fd3ace9790601d15014102a3c1af4e9dddc5cb10da59816846ed9615ab3c5d68e0a2a5b2433bde428706b0fa5b3844cb3d8b761c166c9c3edbcb72045c4342e3d85b2e9964a6b45158aad33e4c49eea867cc7379d1f847e09d17f9ff80cba9e8f6045e821aa28006cccdf946faad3c9a0c3f5902a9830c3504f11b33fadbbb75fc3bbb9dca92c0866cbddb49585a2862a24781b5e36caa0de8280b7822977c04a096ad9f4bc9888fd7c3fee72b02315683842cbc5b75c1e96e37c8e25ea59890b7368db578bfcdfbf90777bc11fe4fcdb6def56b7f4f20c5ea0d12e29457b97fd9f522886c70386cc8572d30120ea336014a8d2d3ec4180868df5161e29e4b33690ccffdbb741f7d7f2b585fd34765d8d9697994c680b78154f03927a8279acb9b76b61bdb68179834cf098e455da01aa341b50ad48068f88fcbae2cc4498c3c00a13a82cdf3a86144b99b37e616d26cb98ef04b4c0e26fcdc6490ab0f235377616ad8dfb4a7192f3d5a4d5d3a95d94cfadad27f78299591f957124904cfbea63e35a415d22615e82b1623b61b1caa1f73bd07366ddb98c170fc0e49f6db75ee124e72950fe0310f4098f4425596ea8b0e0720c61794d38d55d01c38d1231a21a42be3ef61da5c2bb3a3a7c8a14642bef7ed199b8a91e4d5054bd487e65eb864e2a585a627687fc605380de09ba628b92c6216a483151e5c2079703ee218c9217c4bb847b8e35b2cca1727c786665269bbdf86aaddb2835975b18b91b41171b3afb2597578257b60a6b51256cf3e25fda9035b1473cce8be9fd2d1cf4ebdb7485525e92a7d4823c1f484eba13ea4cc3445f5538801d738f9ba3d0bb7d6292cd0a7882580ab6923283edf07515b5dc1313c2d7ab2393610601dd470f99997febaef9f8c16bb566c1d98aa526d82499afc31b451ba816e64f1b39e1a7ffa5eff837aa2566cdd222cf16b443b5a93e583ddba85c8448e56c0cf263a98740eff7ee0906d893a68979ba05a4e1716e50dbd2760fe2e8c726d0f601dced7a1a35cbb3ff9b28be42e4b185192e1942ce10fc05aac635b6813d17667ef10b02f7718aac950da02616d0ca5f61f1f609b40146e4ca6a80814bd79cdc96493f9866c1ef609a04894ff69aaad7c61ec6d9d8f03df2892a51dd9c498eb656eb998a6ad89beff"}, {0xf8, 0x105, 0x6d0, "ddf2f3b992e25328ef96508ca146e5ce408ad7364015f20efd2155b824129ddfff3b01053a201dec0162eb78187706af79f5295ca7f248561b50cf44302662b5573ab1a2fba4a96097244ffce947d617b70e869b9e6b371fae2ad0a9ab4fd50196cccab9116beda27a031f0955fcef4a7ee75ce54792657ceba886fd297397d20ae84c78ba62ed0164fe2994f76d981ce6a4b4fb5c051301b288563b764185f2be4e7c2ffc00e9f8bfc60c884da02a8a0757fdd3a81ef86a4944e1b6ffe35306c661a4b9d071a019f54199fac73b5832be5b351378899869ee19a5806d0b5b9accafdced"}, {0x48, 0x109, 0xfffffffffffffffe, "7453fc4767c1ce184b4542435ff19d7c99334dd643eb6109700fdda308592b860ce5fda61370044b2a0b0b4ac21ba3c80d6b3492f4"}, {0x68, 0x11e, 0x80, "f171efb1b7939695117cc3912e2bced6ee9ff3d35f0307bc23030f6f1701f5b0720e8207c7e5ce26a9bbe64381d4e915bb8342cb90f1f438f6e7238ae7b707ab2ac29c724136eb990c9d2b5de85c4d4ba7"}], 0x1410, 0x4000880}, 0x40000) 2018/05/15 08:25:29 executing program 3: syz_emit_ethernet(0x3e, &(0x7f00000001c0)={@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, @dev={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa]}, [], {@ipv6={0x86dd, {0x0, 0x6, "50a09c", 0x8, 0xffffff87, 0x0, @remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x88640000], 0xbb}, @local={0xfe, 0x80, [], 0xaa}, {[], @udp={0x0, 0x0, 0x8}}}}}}, &(0x7f0000000040)) 2018/05/15 08:25:29 executing program 4: syz_emit_ethernet(0x3e, &(0x7f00000001c0)={@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, @dev={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa]}, [], {@ipv6={0x86dd, {0x0, 0x6, "50a09c", 0x8, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xbb}, @local={0xfe, 0x80, [], 0xaa}, {[], @udp={0x0, 0x0, 0x4c}}}}}}, &(0x7f0000000040)) 2018/05/15 08:25:29 executing program 7: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup(r0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000d40)=@broute={'broute\x00', 0x20, 0x4, 0x928, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000400], 0x0, &(0x7f0000000000), &(0x7f0000000400)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x2, [{{{0x5, 0x0, 0x0, 'bcsh0\x00', 'sit0\x00', 'syzkaller1\x00', 'veth0\x00', @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [], @dev={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa]}, [], 0x1d8, 0x228, 0x258, [@comment={'comment\x00', 0x100}, @owner={'owner\x00', 0x18}]}, [@common=@LED={'LED\x00', 0x28, {{'syz0\x00'}}}]}, @common=@redirect={'redirect\x00', 0x8}}, {{{0x11, 0x0, 0x0, 'veth1_to_bond\x00', 'erspan0\x00', 'bridge_slave_1\x00', 'veth0_to_bridge\x00', @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [], @random="cfa071dc33d9", [], 0x2e0, 0x2e0, 0x330, [@mac={'mac\x00', 0x10, {{@remote={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xbb}}}}, @bpf0={'bpf\x00', 0x210, {{0x0, [{}, {0x0, 0x0, 0x2, 0xff}, {0x1000, 0x48000000000, 0x3}, {0xf7, 0x1f, 0xfffffffffffffe00, 0x1}, {0x10000, 0xfc0, 0x1, 0x6}, {0x4, 0x2, 0xcefa, 0x81}, {0x815, 0xc7, 0x8001, 0x6a0}, {0x40, 0x0, 0x9, 0x80000001}, {0xffffffffffffff53, 0x38a, 0x100000000, 0x7}, {0x5, 0x1, 0x1000, 0x10001}, {0x80000000, 0x7, 0x1, 0xf7}, {0x2, 0x9, 0x4c, 0x5}, {0xfffffffffffffff7, 0x0, 0xe74, 0x52a}, {0x1ff, 0x7, 0x3, 0x7}, {0x6, 0x1ff, 0x49, 0x7}, {0x8000, 0x0, 0x7, 0x684}, {0xffe, 0x988, 0x3, 0x1}, {0x7b, 0x5a07, 0x18, 0x7}, {0xfffffffffffffffe, 0xfff, 0x3, 0x178180a0}, {0x2, 0xc0, 0x6, 0x401}, {0x5, 0x3, 0x8, 0x8}, {0xffffffffffff0001, 0x3, 0xfffffffffffffff7, 0x5}, {0x1ff, 0x8001, 0x3}, {0x3, 0x9, 0xffffffff, 0x2}, {0x5, 0x4, 0x574, 0x64c}, {0x5, 0x4, 0x10001, 0x6}, {0x1, 0x5b2c, 0x3ff, 0x7}, {0xff, 0x2, 0x5, 0x62c5fc18}, {0x101, 0x7, 0x2, 0xfffffffffffffffd}, {0x7fff, 0x6, 0x8, 0x4}, {0x9, 0x0, 0x7, 0xff}, {0x4, 0x4, 0x4, 0x10000}, {0x59b0, 0xfff, 0x4, 0x4}, {0x1f, 0xfffffffffffffffd, 0x8001, 0x800}, {0x0, 0xffffffffffffffff, 0x2, 0x65}, {0x1ff, 0x1, 0x2, 0x7ff}, {0x4, 0x5, 0x1, 0x7be}, {0x9e4, 0x0, 0x7, 0x5}, {0x5, 0x8, 0x7f, 0xffffffff}, {0x4, 0x6, 0x5, 0x7ff}, {0x22aaaf52, 0x8f, 0x6, 0x10000}, {0x2, 0x7, 0xffff}, {0x5, 0xfffffffff016eb50, 0x82, 0x7}, {0x38, 0x800, 0x9a2a, 0xfffffffffffffffc}, {0x5, 0xb, 0x4, 0xfffffffffffff001}, {0x8b5, 0x81, 0x4, 0x2}, {0x8, 0xfffffffffffffff8, 0x1, 0x8}, {0x40, 0x4, 0x1, 0x100000001}, {0x9b, 0x5, 0x1, 0xd64c}, {0x100, 0x8, 0x7, 0x3ff}, {0xf11, 0x200, 0x7, 0x2}, {0xac5, 0x0, 0x3, 0x7}, {0x518, 0x1, 0x80}, {0x6, 0x7f, 0x6, 0x7298}, {0x7, 0x1, 0x2, 0x1ec9}, {0x400, 0x2, 0x6, 0x6c3}, {0x100000001, 0x6, 0x5, 0x9}, {0x8, 0x1dae, 0xfffffffffffffff8, 0x101}, {0x2, 0x7, 0x8, 0x3}, {0x0, 0x45b, 0x7, 0x72}, {0x100000001, 0xc00000000000, 0x100000001, 0x8}, {0x100000001, 0x0, 0xfffffffffffffffc, 0x3}, {0x95, 0x90b, 0x0, 0xfffffffffffff565}, {0x0, 0x4, 0x0, 0x2}], 0x40}}}]}}, @common=@IDLETIMER={'IDLETIMER\x00', 0x28, {{0x7f, 'syz0\x00'}}}}]}, {0x0, '\x00', 0x2, 0xfffffffffffffffc}, {0x0, '\x00', 0x2, 0xffffffffffffffff, 0x2, [{{{0x11, 0x40, 0x87df, 'irlan0\x00', 'sit0\x00', 'veth0_to_team\x00', 'ip6gretap0\x00', @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [0xff, 0xff, 0xff, 0xff, 0x0, 0xff], @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [0x0, 0xff, 0x0, 0xff], 0xb0, 0x210, 0x258, [@time={'time\x00', 0x18, {{0x1ff, 0x1, 0xe063, 0xb6c5, 0x2e80, 0x0, 0x2}}}]}, [@common=@redirect={'redirect\x00', 0x8, {{0xffffffffffffffff}}}, @common=@SECMARK={'SECMARK\x00', 0x108, {{0x1, 0x6, 'system_u:object_r:lost_found_t:s0\x00'}}}]}, @common=@ERROR={'ERROR\x00', 0x20, {"4323eed968d7072e70de82f41331fe3aed2aedc8f2fff16e54b1c4e2ad07"}}}, {{{0x5, 0x54, 0x888d, 'ip6gretap0\x00', 'teql0\x00', 'veth1_to_team\x00', 'erspan0\x00', @random="0eae55d5aac5", [0x0, 0xff, 0x0, 0xff, 0xff, 0xff], @empty, [0xff, 0xff, 0xff, 0x0, 0xff, 0xff], 0x70, 0x70, 0xb8}}, @common=@RATEEST={'RATEEST\x00', 0x20, {{'syz0\x00', 0x9, 0x1, 0x4}}}}]}]}, 0x9a0) 2018/05/15 08:25:29 executing program 6: bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x10, 0x0, 0x4, 0x5, 0x0, 0x1}, 0x2c) bpf$MAP_CREATE(0x2, &(0x7f0000003000)={0x13, 0x0, 0x77fffb, 0x0, 0x730000, 0x0}, 0x2c) 2018/05/15 08:25:29 executing program 0: r0 = syz_open_procfs(0x0, &(0x7f0000000780)="2f65786500000000000409004bddd9de91be10eebf000ee9a90f798058439ed554fa07424adee901d2da75af1f0200f5ab26d7a071fb35331ce39c5a") ioctl$KVM_IOEVENTFD(r0, 0x40106614, &(0x7f0000000040)) 2018/05/15 08:25:29 executing program 2: syz_emit_ethernet(0x3e, &(0x7f00000001c0)={@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, @dev={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa]}, [], {@ipv6={0x86dd, {0x0, 0x6, "50a09c", 0x8, 0x0, 0x0, @remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3], 0xbb}, @local={0xfe, 0x80, [], 0xaa}, {[], @udp={0x0, 0x0, 0x8}}}}}}, &(0x7f0000000040)) 2018/05/15 08:25:29 executing program 4: syz_emit_ethernet(0x3e, &(0x7f00000001c0)={@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, @dev={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa]}, [], {@ipv6={0x86dd, {0x0, 0x6, "50a09c", 0x8, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xbb}, @local={0xfe, 0x80, [], 0xaa}, {[], @udp={0x0, 0x0, 0x4c}}}}}}, &(0x7f0000000040)) 2018/05/15 08:25:29 executing program 5: r0 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000040)='/dev/autofs\x00', 0x101000, 0x0) ioctl$KVM_CREATE_DEVICE(0xffffffffffffff9c, 0xc00caee0, &(0x7f0000000080)={0x6, 0xffffffffffffff9c}) ioctl$LOOP_SET_FD(r0, 0x4c00, r1) r2 = syz_open_procfs(0x0, &(0x7f0000000280)='net/ptype\x00') syncfs(r1) sendfile(r2, r2, &(0x7f0000000000)=0xffffffd, 0x7fffffff) 2018/05/15 08:25:29 executing program 3: syz_emit_ethernet(0x3e, &(0x7f00000001c0)={@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, @dev={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa]}, [], {@ipv6={0x86dd, {0x0, 0x6, "50a09c", 0x8, 0xffffff87, 0x0, @remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x1000000], 0xbb}, @local={0xfe, 0x80, [], 0xaa}, {[], @udp={0x0, 0x0, 0x8}}}}}}, &(0x7f0000000040)) 2018/05/15 08:25:29 executing program 6: bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x10, 0x4, 0x0, 0x5, 0x0, 0x1}, 0x2c) bpf$MAP_CREATE(0x2, &(0x7f0000003000)={0x13, 0x0, 0x77fffb, 0x0, 0x730000, 0x0}, 0x2c) 2018/05/15 08:25:29 executing program 2: syz_emit_ethernet(0x3e, &(0x7f00000001c0)={@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, @dev={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa]}, [], {@ipv6={0x86dd, {0x0, 0x6, "50a09c", 0x8, 0x0, 0x0, @remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x33], 0xbb}, @local={0xfe, 0x80, [], 0xaa}, {[], @udp={0x0, 0x0, 0x8}}}}}}, &(0x7f0000000040)) 2018/05/15 08:25:29 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f0000000280)="6e65742f6970365f7461626c65735f6d61746368657300b6e23bcf6093cb57f8b4d285e9c48608549acee9a66f09d47a011dcc8f5af7870c6c1b6eebe85ebea4ecda4e44def87e8ee568c843daaf2805944012bc0144937e8b04411d09016ca07f7388ded591e346fb612397e79a6fe43e5c6a86bee1565b17b22b8ed5c95b4afbb3a620d1402c50bbaad790d0ffdb7c5a27e60423079f77bf") unlink(&(0x7f0000000080)='./file0\x00') sendfile(0xffffffffffffffff, r0, &(0x7f00000000c0)=0x10000000, 0x2) ioctl$KDGKBMETA(r0, 0x4b62, &(0x7f0000000100)) getsockopt$inet_sctp_SCTP_PARTIAL_DELIVERY_POINT(r0, 0x84, 0x13, &(0x7f0000000140)={0x0, 0xfffffffffffffffa}, &(0x7f0000000180)=0x8) syslog(0x2, &(0x7f0000000cc0)=""/107, 0x6b) setsockopt$IP_VS_SO_SET_DEL(r0, 0x0, 0x484, &(0x7f0000000200)={0x87, @dev={0xac, 0x14, 0x14, 0x1a}, 0x4e24, 0x2, 'rr\x00', 0x3, 0x2, 0x66}, 0x2c) setsockopt$inet_sctp_SCTP_STREAM_SCHEDULER(r0, 0x84, 0x7b, &(0x7f00000001c0)={r1, 0x40ef2843}, 0x8) setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x40, &(0x7f0000000340)=ANY=[@ANYBLOB="73656375726974790000000000000000000000000000000000000000000000000e00000004000000f8030000fffffffff00000000000000000000000ffffffffffffffff600300006003000060030000ffffffff04000000", @ANYPTR=&(0x7f0000000d40)=ANY=[@ANYBLOB="000000000000000000000000002100ebe70048ca02fec408edfbaf31ba590218fdffffffffffd60000000000000000000000000000000000000000000000000021d13202a6d3d3de0000000000000000000000"], @ANYBLOB="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"], 0x458) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000000)='dctcp\x00', 0x6) 2018/05/15 08:25:29 executing program 7: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup(r0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000d40)=@broute={'broute\x00', 0x20, 0x4, 0x928, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000400], 0x0, &(0x7f0000000000), &(0x7f0000000400)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x2, [{{{0x5, 0x0, 0x0, 'bcsh0\x00', 'sit0\x00', 'syzkaller1\x00', 'veth0\x00', @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [], @dev={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa]}, [], 0x1d8, 0x228, 0x258, [@comment={'comment\x00', 0x100}, @owner={'owner\x00', 0x18}]}, [@common=@LED={'LED\x00', 0x28, {{'syz0\x00'}}}]}, @common=@redirect={'redirect\x00', 0x8}}, {{{0x11, 0x0, 0x0, 'veth1_to_bond\x00', 'erspan0\x00', 'bridge_slave_1\x00', 'veth0_to_bridge\x00', @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [], @random="cfa071dc33d9", [], 0x2e0, 0x2e0, 0x330, [@mac={'mac\x00', 0x10, {{@remote={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xbb}}}}, @bpf0={'bpf\x00', 0x210, {{0x0, [{}, {0x0, 0x0, 0x0, 0xff}, {0x1000, 0x48000000000, 0x3}, {0xf7, 0x1f, 0xfffffffffffffe00, 0x1}, {0x10000, 0xfc0, 0x1, 0x6}, {0x4, 0x2, 0xcefa, 0x81}, {0x815, 0xc7, 0x8001, 0x6a0}, {0x40, 0x0, 0x9, 0x80000001}, {0xffffffffffffff53, 0x38a, 0x100000000, 0x7}, {0x5, 0x1, 0x1000, 0x10001}, {0x80000000, 0x7, 0x1, 0xf7}, {0x2, 0x9, 0x4c, 0x5}, {0xfffffffffffffff7, 0x0, 0xe74, 0x52a}, {0x1ff, 0x7, 0x3, 0x7}, {0x6, 0x1ff, 0x49, 0x7}, {0x8000, 0x0, 0x7, 0x684}, {0xffe, 0x988, 0x3, 0x1}, {0x7b, 0x5a07, 0x18, 0x7}, {0xfffffffffffffffe, 0xfff, 0x3, 0x178180a0}, {0x2, 0xc0, 0x6, 0x401}, {0x5, 0x3, 0x8, 0x8}, {0xffffffffffff0001, 0x3, 0xfffffffffffffff7, 0x5}, {0x1ff, 0x8001, 0x3}, {0x3, 0x9, 0xffffffff, 0x2}, {0x5, 0x4, 0x574, 0x64c}, {0x5, 0x4, 0x10001, 0x6}, {0x1, 0x5b2c, 0x3ff, 0x7}, {0xff, 0x2, 0x5, 0x62c5fc18}, {0x101, 0x7, 0x2, 0xfffffffffffffffd}, {0x7fff, 0x6, 0x8, 0x4}, {0x9, 0x0, 0x7, 0xff}, {0x4, 0x4, 0x4, 0x10000}, {0x59b0, 0xfff, 0x4, 0x4}, {0x1f, 0xfffffffffffffffd, 0x8001, 0x800}, {0x0, 0xffffffffffffffff, 0x2, 0x65}, {0x1ff, 0x1, 0x2, 0x7ff}, {0x4, 0x5, 0x1, 0x7be}, {0x9e4, 0x0, 0x7, 0x5}, {0x5, 0x8, 0x7f, 0xffffffff}, {0x4, 0x6, 0x5, 0x7ff}, {0x22aaaf52, 0x8f, 0x6, 0x10000}, {0x2, 0x7, 0xffff}, {0x5, 0xfffffffff016eb50, 0x82, 0x7}, {0x38, 0x800, 0x9a2a, 0xfffffffffffffffc}, {0x5, 0xb, 0x4, 0xfffffffffffff001}, {0x8b5, 0x81, 0x4, 0x2}, {0x8, 0xfffffffffffffff8, 0x1, 0x8}, {0x40, 0x4, 0x1, 0x100000001}, {0x9b, 0x5, 0x1, 0xd64c}, {0x100, 0x8, 0x7, 0x3ff}, {0xf11, 0x200, 0x7, 0x2}, {0xac5, 0x0, 0x3, 0x7}, {0x518, 0x1, 0x80}, {0x6, 0x7f, 0x6, 0x7298}, {0x7, 0x1, 0x2, 0x1ec9}, {0x400, 0x2, 0x6, 0x6c3}, {0x100000001, 0x6, 0x5, 0x9}, {0x8, 0x1dae, 0xfffffffffffffff8, 0x101}, {0x2, 0x7, 0x8, 0x3}, {0x0, 0x45b, 0x7, 0x72}, {0x100000001, 0xc00000000000, 0x100000001, 0x8}, {0x100000001, 0x0, 0xfffffffffffffffc, 0x3}, {0x95, 0x90b, 0x0, 0xfffffffffffff565}, {0x0, 0x4, 0x0, 0x2}], 0x40}}}]}}, @common=@IDLETIMER={'IDLETIMER\x00', 0x28, {{0x7f, 'syz0\x00'}}}}]}, {0x0, '\x00', 0x2, 0xfffffffffffffffc}, {0x0, '\x00', 0x2, 0xffffffffffffffff, 0x2, [{{{0x11, 0x40, 0x87df, 'irlan0\x00', 'sit0\x00', 'veth0_to_team\x00', 'ip6gretap0\x00', @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [0xff, 0xff, 0xff, 0xff, 0x0, 0xff], @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [0x0, 0xff, 0x0, 0xff], 0xb0, 0x210, 0x258, [@time={'time\x00', 0x18, {{0x1ff, 0x1, 0xe063, 0xb6c5, 0x2e80, 0x0, 0x2}}}]}, [@common=@redirect={'redirect\x00', 0x8, {{0xffffffffffffffff}}}, @common=@SECMARK={'SECMARK\x00', 0x108, {{0x1, 0x6, 'system_u:object_r:lost_found_t:s0\x00'}}}]}, @common=@ERROR={'ERROR\x00', 0x20, {"4323eed968d7072e70de82f41331fe3aed2aedc8f2fff16e54b1c4e2ad07"}}}, {{{0x5, 0x54, 0x888d, 'ip6gretap0\x00', 'teql0\x00', 'veth1_to_team\x00', 'erspan0\x00', @random="0eae55d5aac5", [0x0, 0xff, 0x0, 0xff, 0xff, 0xff], @empty, [0xff, 0xff, 0xff, 0x0, 0xff, 0xff], 0x70, 0x70, 0xb8}}, @common=@RATEEST={'RATEEST\x00', 0x20, {{'syz0\x00', 0x9, 0x1, 0x4}}}}]}]}, 0x9a0) 2018/05/15 08:25:29 executing program 4: syz_emit_ethernet(0x3e, &(0x7f00000001c0)={@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, @dev={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa]}, [], {@ipv6={0x86dd, {0x0, 0x6, "50a09c", 0x8, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xbb}, @local={0xfe, 0x80, [], 0xaa}, {[], @udp={0x0, 0x0, 0x4c}}}}}}, &(0x7f0000000040)) 2018/05/15 08:25:29 executing program 0: r0 = syz_open_procfs(0x0, &(0x7f0000000780)="2f65786500000000000409004bddd9de91be10eebf000ee9a90f798058439ed554fa07424adee901d2da75af1f0200f5ab26d7a071fb35331ce39c5a") ioctl$KVM_IOEVENTFD(r0, 0x40106614, &(0x7f0000000040)) 2018/05/15 08:25:29 executing program 3: syz_emit_ethernet(0x3e, &(0x7f00000001c0)={@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, @dev={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa]}, [], {@ipv6={0x86dd, {0x0, 0x6, "50a09c", 0x8, 0xffffff87, 0x0, @remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x3580], 0xbb}, @local={0xfe, 0x80, [], 0xaa}, {[], @udp={0x0, 0x0, 0x8}}}}}}, &(0x7f0000000040)) 2018/05/15 08:25:29 executing program 5: r0 = syz_open_procfs(0x0, &(0x7f0000000280)='net/ptype\x00') sendfile(r0, r0, &(0x7f0000000000)=0xffffffd, 0x7fffffff) getsockopt$EBT_SO_GET_INIT_INFO(r0, 0x0, 0x82, &(0x7f0000000040)={'filter\x00'}, &(0x7f00000000c0)=0x78) 2018/05/15 08:25:29 executing program 6: bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x10, 0x4, 0x0, 0x5, 0x0, 0x1}, 0x2c) bpf$MAP_CREATE(0x2, &(0x7f0000003000)={0x13, 0x0, 0x77fffb, 0x0, 0x730000, 0x0}, 0x2c) 2018/05/15 08:25:29 executing program 2: syz_emit_ethernet(0x3e, &(0x7f00000001c0)={@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, @dev={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa]}, [], {@ipv6={0x86dd, {0x0, 0x6, "50a09c", 0x8, 0x0, 0x0, @remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xdc05000000000000], 0xbb}, @local={0xfe, 0x80, [], 0xaa}, {[], @udp={0x0, 0x0, 0x8}}}}}}, &(0x7f0000000040)) 2018/05/15 08:25:29 executing program 4: r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='net/route\x00') r1 = socket(0x40a, 0x0, 0x0) flock(0xffffffffffffffff, 0x6) setsockopt$inet_sctp_SCTP_STREAM_SCHEDULER(0xffffffffffffffff, 0x84, 0x7b, &(0x7f0000000400), 0xfffffffffffffe98) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000b00)='./cgroup.cpu\x00', 0x200002, 0x0) fchdir(r2) getsockname$netrom(0xffffffffffffffff, &(0x7f0000000480), &(0x7f0000000640)=0x10) r3 = creat(&(0x7f0000000100)='./file1\x00', 0x0) fallocate(r3, 0x1, 0x0, 0x20004d2d) sendmsg$inet_sctp(r1, &(0x7f000050dfc8)={&(0x7f0000000840)=@in6={0xa, 0x0, 0x80000001, @mcast1={0xff, 0x1, [], 0x1}}, 0x1c, &(0x7f00000005c0), 0x0, &(0x7f0000576000)}, 0x0) getpeername$packet(0xffffffffffffffff, &(0x7f00000004c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @remote}, &(0x7f0000000500)=0x14) getsockopt$inet_sctp6_SCTP_GET_LOCAL_ADDRS(0xffffffffffffffff, 0x84, 0x6d, &(0x7f00000002c0)=ANY=[@ANYRES32=0x0], &(0x7f0000000240)=0x1) setsockopt$inet_sctp_SCTP_DEFAULT_PRINFO(0xffffffffffffffff, 0x84, 0x72, &(0x7f0000000380)={r4, 0x0, 0x30}, 0xc) ioctl$TUNSETVNETHDRSZ(0xffffffffffffffff, 0x400454d8, &(0x7f0000000800)) getpeername$packet(0xffffffffffffffff, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @broadcast}, &(0x7f0000000a00)=0x14) setsockopt$inet_buf(0xffffffffffffffff, 0x0, 0x3e, &(0x7f0000000300)="cb11c58e8d0b37445286a9d11ea310cd6e65ee3a611c905a366b8b853351728dd54a033ce73a723dfd0236837b86d39020fe4ecf8b95d94783905976ee69c624332ce0", 0x43) openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer2\x00', 0x4040, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f00000008c0)='/dev/sequencer2\x00') creat(&(0x7f0000000280)='./file1\x00', 0x4e) 2018/05/15 08:25:29 executing program 6: bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x10, 0x4, 0x0, 0x5, 0x0, 0x1}, 0x2c) bpf$MAP_CREATE(0x2, &(0x7f0000003000)={0x13, 0x0, 0x77fffb, 0x0, 0x730000, 0x0}, 0x2c) 2018/05/15 08:25:29 executing program 0: ioctl$KVM_IOEVENTFD(0xffffffffffffffff, 0x40106614, &(0x7f0000000040)) 2018/05/15 08:25:29 executing program 2: syz_emit_ethernet(0x3e, &(0x7f00000001c0)={@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, @dev={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa]}, [], {@ipv6={0x86dd, {0x0, 0x6, "50a09c", 0x8, 0x0, 0x0, @remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000000000000], 0xbb}, @local={0xfe, 0x80, [], 0xaa}, {[], @udp={0x0, 0x0, 0x8}}}}}}, &(0x7f0000000040)) 2018/05/15 08:25:29 executing program 3: syz_emit_ethernet(0x3e, &(0x7f00000001c0)={@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, @dev={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa]}, [], {@ipv6={0x86dd, {0x0, 0x6, "50a09c", 0x8, 0xffffff87, 0x0, @remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x100000000000000], 0xbb}, @local={0xfe, 0x80, [], 0xaa}, {[], @udp={0x0, 0x0, 0x8}}}}}}, &(0x7f0000000040)) 2018/05/15 08:25:29 executing program 5: r0 = syz_open_procfs(0x0, &(0x7f0000000280)='net/ptype\x00') r1 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000040)='/dev/snapshot\x00', 0x1, 0x0) sendfile(r0, r0, &(0x7f0000000000)=0xffffffd, 0x7fffffff) ioctl$KDSETKEYCODE(r1, 0x4b4d, &(0x7f0000000080)={0x2}) 2018/05/15 08:25:30 executing program 7: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup(r0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000d40)=@broute={'broute\x00', 0x20, 0x4, 0x928, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000400], 0x0, &(0x7f0000000000), &(0x7f0000000400)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x2, [{{{0x5, 0x0, 0x0, 'bcsh0\x00', 'sit0\x00', 'syzkaller1\x00', 'veth0\x00', @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [], @dev={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa]}, [], 0x1d8, 0x228, 0x258, [@comment={'comment\x00', 0x100}, @owner={'owner\x00', 0x18}]}, [@common=@LED={'LED\x00', 0x28, {{'syz0\x00'}}}]}, @common=@redirect={'redirect\x00', 0x8}}, {{{0x11, 0x0, 0x0, 'veth1_to_bond\x00', 'erspan0\x00', 'bridge_slave_1\x00', 'veth0_to_bridge\x00', @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [], @random="cfa071dc33d9", [], 0x2e0, 0x2e0, 0x330, [@mac={'mac\x00', 0x10, {{@remote={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xbb}}}}, @bpf0={'bpf\x00', 0x210, {{0x0, [{}, {}, {0x1000, 0x48000000000, 0x3}, {0xf7, 0x1f, 0xfffffffffffffe00, 0x1}, {0x10000, 0xfc0, 0x1, 0x6}, {0x4, 0x2, 0xcefa, 0x81}, {0x815, 0xc7, 0x8001, 0x6a0}, {0x40, 0x0, 0x9, 0x80000001}, {0xffffffffffffff53, 0x38a, 0x100000000, 0x7}, {0x5, 0x1, 0x1000, 0x10001}, {0x80000000, 0x7, 0x1, 0xf7}, {0x2, 0x9, 0x4c, 0x5}, {0xfffffffffffffff7, 0x0, 0xe74, 0x52a}, {0x1ff, 0x7, 0x3, 0x7}, {0x6, 0x1ff, 0x49, 0x7}, {0x8000, 0x0, 0x7, 0x684}, {0xffe, 0x988, 0x3, 0x1}, {0x7b, 0x5a07, 0x18, 0x7}, {0xfffffffffffffffe, 0xfff, 0x3, 0x178180a0}, {0x2, 0xc0, 0x6, 0x401}, {0x5, 0x3, 0x8, 0x8}, {0xffffffffffff0001, 0x3, 0xfffffffffffffff7, 0x5}, {0x1ff, 0x8001, 0x3}, {0x3, 0x9, 0xffffffff, 0x2}, {0x5, 0x4, 0x574, 0x64c}, {0x5, 0x4, 0x10001, 0x6}, {0x1, 0x5b2c, 0x3ff, 0x7}, {0xff, 0x2, 0x5, 0x62c5fc18}, {0x101, 0x7, 0x2, 0xfffffffffffffffd}, {0x7fff, 0x6, 0x8, 0x4}, {0x9, 0x0, 0x7, 0xff}, {0x4, 0x4, 0x4, 0x10000}, {0x59b0, 0xfff, 0x4, 0x4}, {0x1f, 0xfffffffffffffffd, 0x8001, 0x800}, {0x0, 0xffffffffffffffff, 0x2, 0x65}, {0x1ff, 0x1, 0x2, 0x7ff}, {0x4, 0x5, 0x1, 0x7be}, {0x9e4, 0x0, 0x7, 0x5}, {0x5, 0x8, 0x7f, 0xffffffff}, {0x4, 0x6, 0x5, 0x7ff}, {0x22aaaf52, 0x8f, 0x6, 0x10000}, {0x2, 0x7, 0xffff}, {0x5, 0xfffffffff016eb50, 0x82, 0x7}, {0x38, 0x800, 0x9a2a, 0xfffffffffffffffc}, {0x5, 0xb, 0x4, 0xfffffffffffff001}, {0x8b5, 0x81, 0x4, 0x2}, {0x8, 0xfffffffffffffff8, 0x1, 0x8}, {0x40, 0x4, 0x1, 0x100000001}, {0x9b, 0x5, 0x1, 0xd64c}, {0x100, 0x8, 0x7, 0x3ff}, {0xf11, 0x200, 0x7, 0x2}, {0xac5, 0x0, 0x3, 0x7}, {0x518, 0x1, 0x80}, {0x6, 0x7f, 0x6, 0x7298}, {0x7, 0x1, 0x2, 0x1ec9}, {0x400, 0x2, 0x6, 0x6c3}, {0x100000001, 0x6, 0x5, 0x9}, {0x8, 0x1dae, 0xfffffffffffffff8, 0x101}, {0x2, 0x7, 0x8, 0x3}, {0x0, 0x45b, 0x7, 0x72}, {0x100000001, 0xc00000000000, 0x100000001, 0x8}, {0x100000001, 0x0, 0xfffffffffffffffc, 0x3}, {0x95, 0x90b, 0x0, 0xfffffffffffff565}, {0x0, 0x4, 0x0, 0x2}], 0x40}}}]}}, @common=@IDLETIMER={'IDLETIMER\x00', 0x28, {{0x7f, 'syz0\x00'}}}}]}, {0x0, '\x00', 0x2, 0xfffffffffffffffc}, {0x0, '\x00', 0x2, 0xffffffffffffffff, 0x2, [{{{0x11, 0x40, 0x87df, 'irlan0\x00', 'sit0\x00', 'veth0_to_team\x00', 'ip6gretap0\x00', @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [0xff, 0xff, 0xff, 0xff, 0x0, 0xff], @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [0x0, 0xff, 0x0, 0xff], 0xb0, 0x210, 0x258, [@time={'time\x00', 0x18, {{0x1ff, 0x1, 0xe063, 0xb6c5, 0x2e80, 0x0, 0x2}}}]}, [@common=@redirect={'redirect\x00', 0x8, {{0xffffffffffffffff}}}, @common=@SECMARK={'SECMARK\x00', 0x108, {{0x1, 0x6, 'system_u:object_r:lost_found_t:s0\x00'}}}]}, @common=@ERROR={'ERROR\x00', 0x20, {"4323eed968d7072e70de82f41331fe3aed2aedc8f2fff16e54b1c4e2ad07"}}}, {{{0x5, 0x54, 0x888d, 'ip6gretap0\x00', 'teql0\x00', 'veth1_to_team\x00', 'erspan0\x00', @random="0eae55d5aac5", [0x0, 0xff, 0x0, 0xff, 0xff, 0xff], @empty, [0xff, 0xff, 0xff, 0x0, 0xff, 0xff], 0x70, 0x70, 0xb8}}, @common=@RATEEST={'RATEEST\x00', 0x20, {{'syz0\x00', 0x9, 0x1, 0x4}}}}]}]}, 0x9a0) 2018/05/15 08:25:30 executing program 0: ioctl$KVM_IOEVENTFD(0xffffffffffffffff, 0x40106614, &(0x7f0000000040)) 2018/05/15 08:25:30 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f0000000280)="6e65742f6970365f7461626c65735f6d61746368657300b6e23bcf6093cb57f8b4d285e9c48608549acee9a66f09d47a011dcc8f5af7870c6c1b6eebe85ebea4ecda4e44def87e8ee568c843daaf2805944012bc0144937e8b04411d09016ca07f7388ded591e346fb612397e79a6fe43e5c6a86bee1565b17b22b8ed5c95b4afbb3a620d1402c50bbaad790d0ffdb7c5a27e60423079f77bf") unlink(&(0x7f0000000080)='./file0\x00') sendfile(r0, 0xffffffffffffffff, &(0x7f00000000c0)=0x10000000, 0x2) ioctl$KDGKBMETA(r0, 0x4b62, &(0x7f0000000100)) getsockopt$inet_sctp_SCTP_PARTIAL_DELIVERY_POINT(r0, 0x84, 0x13, &(0x7f0000000140)={0x0, 0xfffffffffffffffa}, &(0x7f0000000180)=0x8) syslog(0x2, &(0x7f0000000cc0)=""/107, 0x6b) setsockopt$IP_VS_SO_SET_DEL(r0, 0x0, 0x484, &(0x7f0000000200)={0x87, @dev={0xac, 0x14, 0x14, 0x1a}, 0x4e24, 0x2, 'rr\x00', 0x3, 0x2, 0x66}, 0x2c) setsockopt$inet_sctp_SCTP_STREAM_SCHEDULER(r0, 0x84, 0x7b, &(0x7f00000001c0)={r1, 0x40ef2843}, 0x8) setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x40, &(0x7f0000000340)=ANY=[@ANYBLOB="73656375726974790000000000000000000000000000000000000000000000000e00000004000000f8030000fffffffff00000000000000000000000ffffffffffffffff600300006003000060030000ffffffff04000000", @ANYPTR=&(0x7f0000000d40)=ANY=[@ANYBLOB="000000000000000000000000002100ebe70048ca02fec408edfbaf31ba590218fdffffffffffd60000000000000000000000000000000000000000000000000021d13202a6d3d3de0000000000000000000000"], @ANYBLOB="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"], 0x458) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000000)='dctcp\x00', 0x6) 2018/05/15 08:25:30 executing program 7: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup(r0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000d40)=@broute={'broute\x00', 0x20, 0x4, 0x928, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000400], 0x0, &(0x7f0000000000), &(0x7f0000000400)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x2, [{{{0x5, 0x0, 0x0, 'bcsh0\x00', 'sit0\x00', 'syzkaller1\x00', 'veth0\x00', @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [], @dev={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa]}, [], 0x1d8, 0x228, 0x258, [@comment={'comment\x00', 0x100}, @owner={'owner\x00', 0x18}]}, [@common=@LED={'LED\x00', 0x28, {{'syz0\x00'}}}]}, @common=@redirect={'redirect\x00', 0x8}}, {{{0x11, 0x0, 0x0, 'veth1_to_bond\x00', 'erspan0\x00', 'bridge_slave_1\x00', 'veth0_to_bridge\x00', @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [], @random="cfa071dc33d9", [], 0x2e0, 0x2e0, 0x330, [@mac={'mac\x00', 0x10, {{@remote={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xbb}}}}, @bpf0={'bpf\x00', 0x210, {{0x0, [{}, {}, {0x0, 0x48000000000, 0x3}, {0xf7, 0x1f, 0xfffffffffffffe00, 0x1}, {0x10000, 0xfc0, 0x1, 0x6}, {0x4, 0x2, 0xcefa, 0x81}, {0x815, 0xc7, 0x8001, 0x6a0}, {0x40, 0x0, 0x9, 0x80000001}, {0xffffffffffffff53, 0x38a, 0x100000000, 0x7}, {0x5, 0x1, 0x1000, 0x10001}, {0x80000000, 0x7, 0x1, 0xf7}, {0x2, 0x9, 0x4c, 0x5}, {0xfffffffffffffff7, 0x0, 0xe74, 0x52a}, {0x1ff, 0x7, 0x3, 0x7}, {0x6, 0x1ff, 0x49, 0x7}, {0x8000, 0x0, 0x7, 0x684}, {0xffe, 0x988, 0x3, 0x1}, {0x7b, 0x5a07, 0x18, 0x7}, {0xfffffffffffffffe, 0xfff, 0x3, 0x178180a0}, {0x2, 0xc0, 0x6, 0x401}, {0x5, 0x3, 0x8, 0x8}, {0xffffffffffff0001, 0x3, 0xfffffffffffffff7, 0x5}, {0x1ff, 0x8001, 0x3}, {0x3, 0x9, 0xffffffff, 0x2}, {0x5, 0x4, 0x574, 0x64c}, {0x5, 0x4, 0x10001, 0x6}, {0x1, 0x5b2c, 0x3ff, 0x7}, {0xff, 0x2, 0x5, 0x62c5fc18}, {0x101, 0x7, 0x2, 0xfffffffffffffffd}, {0x7fff, 0x6, 0x8, 0x4}, {0x9, 0x0, 0x7, 0xff}, {0x4, 0x4, 0x4, 0x10000}, {0x59b0, 0xfff, 0x4, 0x4}, {0x1f, 0xfffffffffffffffd, 0x8001, 0x800}, {0x0, 0xffffffffffffffff, 0x2, 0x65}, {0x1ff, 0x1, 0x2, 0x7ff}, {0x4, 0x5, 0x1, 0x7be}, {0x9e4, 0x0, 0x7, 0x5}, {0x5, 0x8, 0x7f, 0xffffffff}, {0x4, 0x6, 0x5, 0x7ff}, {0x22aaaf52, 0x8f, 0x6, 0x10000}, {0x2, 0x7, 0xffff}, {0x5, 0xfffffffff016eb50, 0x82, 0x7}, {0x38, 0x800, 0x9a2a, 0xfffffffffffffffc}, {0x5, 0xb, 0x4, 0xfffffffffffff001}, {0x8b5, 0x81, 0x4, 0x2}, {0x8, 0xfffffffffffffff8, 0x1, 0x8}, {0x40, 0x4, 0x1, 0x100000001}, {0x9b, 0x5, 0x1, 0xd64c}, {0x100, 0x8, 0x7, 0x3ff}, {0xf11, 0x200, 0x7, 0x2}, {0xac5, 0x0, 0x3, 0x7}, {0x518, 0x1, 0x80}, {0x6, 0x7f, 0x6, 0x7298}, {0x7, 0x1, 0x2, 0x1ec9}, {0x400, 0x2, 0x6, 0x6c3}, {0x100000001, 0x6, 0x5, 0x9}, {0x8, 0x1dae, 0xfffffffffffffff8, 0x101}, {0x2, 0x7, 0x8, 0x3}, {0x0, 0x45b, 0x7, 0x72}, {0x100000001, 0xc00000000000, 0x100000001, 0x8}, {0x100000001, 0x0, 0xfffffffffffffffc, 0x3}, {0x95, 0x90b, 0x0, 0xfffffffffffff565}, {0x0, 0x4, 0x0, 0x2}], 0x40}}}]}}, @common=@IDLETIMER={'IDLETIMER\x00', 0x28, {{0x7f, 'syz0\x00'}}}}]}, {0x0, '\x00', 0x2, 0xfffffffffffffffc}, {0x0, '\x00', 0x2, 0xffffffffffffffff, 0x2, [{{{0x11, 0x40, 0x87df, 'irlan0\x00', 'sit0\x00', 'veth0_to_team\x00', 'ip6gretap0\x00', @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [0xff, 0xff, 0xff, 0xff, 0x0, 0xff], @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [0x0, 0xff, 0x0, 0xff], 0xb0, 0x210, 0x258, [@time={'time\x00', 0x18, {{0x1ff, 0x1, 0xe063, 0xb6c5, 0x2e80, 0x0, 0x2}}}]}, [@common=@redirect={'redirect\x00', 0x8, {{0xffffffffffffffff}}}, @common=@SECMARK={'SECMARK\x00', 0x108, {{0x1, 0x6, 'system_u:object_r:lost_found_t:s0\x00'}}}]}, @common=@ERROR={'ERROR\x00', 0x20, {"4323eed968d7072e70de82f41331fe3aed2aedc8f2fff16e54b1c4e2ad07"}}}, {{{0x5, 0x54, 0x888d, 'ip6gretap0\x00', 'teql0\x00', 'veth1_to_team\x00', 'erspan0\x00', @random="0eae55d5aac5", [0x0, 0xff, 0x0, 0xff, 0xff, 0xff], @empty, [0xff, 0xff, 0xff, 0x0, 0xff, 0xff], 0x70, 0x70, 0xb8}}, @common=@RATEEST={'RATEEST\x00', 0x20, {{'syz0\x00', 0x9, 0x1, 0x4}}}}]}]}, 0x9a0) 2018/05/15 08:25:30 executing program 5: r0 = syz_open_procfs(0x0, &(0x7f0000000280)='net/ptype\x00') sendfile(r0, r0, &(0x7f0000000000)=0xffffffd, 0x7fffffff) setsockopt$inet_MCAST_MSFILTER(r0, 0x0, 0x30, &(0x7f00000002c0)={0x7, {{0x2, 0x4e24, @multicast2=0xe0000002}}, 0x1, 0xa, [{{0x2, 0x4e24, @rand_addr=0x1}}, {{0x2, 0x4e22, @loopback=0x7f000001}}, {{0x2, 0x4e22, @multicast2=0xe0000002}}, {{0x2, 0x4e21, @multicast2=0xe0000002}}, {{0x2, 0x4e22}}, {{0x2, 0x4e21, @remote={0xac, 0x14, 0x14, 0xbb}}}, {{0x2, 0x4e22, @multicast2=0xe0000002}}, {{0x2, 0x4e24, @broadcast=0xffffffff}}, {{0x2, 0x4e24, @dev={0xac, 0x14, 0x14, 0x19}}}, {{0x2, 0x4e24, @multicast1=0xe0000001}}]}, 0x590) 2018/05/15 08:25:30 executing program 0: ioctl$KVM_IOEVENTFD(0xffffffffffffffff, 0x40106614, &(0x7f0000000040)) 2018/05/15 08:25:30 executing program 2: syz_emit_ethernet(0x3e, &(0x7f00000001c0)={@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, @dev={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa]}, [], {@ipv6={0x86dd, {0x0, 0x6, "50a09c", 0x8, 0x0, 0x0, @remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x84ffffff], 0xbb}, @local={0xfe, 0x80, [], 0xaa}, {[], @udp={0x0, 0x0, 0x8}}}}}}, &(0x7f0000000040)) 2018/05/15 08:25:30 executing program 3: syz_emit_ethernet(0x3e, &(0x7f00000001c0)={@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, @dev={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa]}, [], {@ipv6={0x86dd, {0x0, 0x6, "50a09c", 0x8, 0xffffff87, 0x0, @remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x88a8ffff], 0xbb}, @local={0xfe, 0x80, [], 0xaa}, {[], @udp={0x0, 0x0, 0x8}}}}}}, &(0x7f0000000040)) 2018/05/15 08:25:30 executing program 6: bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x10, 0x4, 0x4, 0x0, 0x0, 0x1}, 0x2c) bpf$MAP_CREATE(0x2, &(0x7f0000003000)={0x13, 0x0, 0x77fffb, 0x0, 0x730000, 0x0}, 0x2c) 2018/05/15 08:25:30 executing program 4: r0 = syz_open_procfs(0x0, &(0x7f0000000240)='oom_adj\x00') write$cgroup_subtree(r0, &(0x7f0000000040)={[{0x2d, 'memory', 0x20}]}, 0x8) 2018/05/15 08:25:30 executing program 4: clock_gettime(0xfffffffffffffff8, &(0x7f0000000000)) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup.cpu/syz1\x00', 0x1ff) 2018/05/15 08:25:30 executing program 2: syz_emit_ethernet(0x3e, &(0x7f00000001c0)={@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, @dev={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa]}, [], {@ipv6={0x86dd, {0x0, 0x6, "50a09c", 0x8, 0x0, 0x0, @remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8906000000000000], 0xbb}, @local={0xfe, 0x80, [], 0xaa}, {[], @udp={0x0, 0x0, 0x8}}}}}}, &(0x7f0000000040)) 2018/05/15 08:25:30 executing program 6: bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x10, 0x4, 0x4, 0x0, 0x0, 0x1}, 0x2c) bpf$MAP_CREATE(0x2, &(0x7f0000003000)={0x13, 0x0, 0x77fffb, 0x0, 0x730000, 0x0}, 0x2c) 2018/05/15 08:25:30 executing program 3: syz_emit_ethernet(0x3e, &(0x7f00000001c0)={@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, @dev={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa]}, [], {@ipv6={0x86dd, {0x0, 0x6, "50a09c", 0x8, 0xffffff87, 0x0, @remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x5000000], 0xbb}, @local={0xfe, 0x80, [], 0xaa}, {[], @udp={0x0, 0x0, 0x8}}}}}}, &(0x7f0000000040)) 2018/05/15 08:25:30 executing program 0: r0 = syz_open_procfs(0x0, &(0x7f0000000780)="2f65786500000000000409004bddd9de91be10eebf000ee9a90f798058439ed554fa07424adee901d2da75af1f0200f5ab26d7a071fb35331ce39c5a") ioctl$KVM_IOEVENTFD(0xffffffffffffffff, 0x40106614, &(0x7f0000000040)) 2018/05/15 08:25:30 executing program 5: ptrace$setopts(0xffffffffffffffff, 0x0, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000280)='net/ptype\x00') bind$bt_l2cap(r0, &(0x7f0000000080)={0x1f, 0x4e, {0x2, 0x8, 0xfffffffffffffffc, 0x1, 0x9, 0x9}, 0x4, 0x5}, 0xe) sendfile(r0, r0, &(0x7f0000000000)=0xffffffd, 0x5b) ioctl$sock_FIOGETOWN(r0, 0x8903, &(0x7f0000000040)=0x0) ptrace$peek(0x2, r1, &(0x7f00000000c0)) 2018/05/15 08:25:30 executing program 7: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup(r0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000d40)=@broute={'broute\x00', 0x20, 0x4, 0x928, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000400], 0x0, &(0x7f0000000000), &(0x7f0000000400)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x2, [{{{0x5, 0x0, 0x0, 'bcsh0\x00', 'sit0\x00', 'syzkaller1\x00', 'veth0\x00', @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [], @dev={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa]}, [], 0x1d8, 0x228, 0x258, [@comment={'comment\x00', 0x100}, @owner={'owner\x00', 0x18}]}, [@common=@LED={'LED\x00', 0x28, {{'syz0\x00'}}}]}, @common=@redirect={'redirect\x00', 0x8}}, {{{0x11, 0x0, 0x0, 'veth1_to_bond\x00', 'erspan0\x00', 'bridge_slave_1\x00', 'veth0_to_bridge\x00', @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [], @random="cfa071dc33d9", [], 0x2e0, 0x2e0, 0x330, [@mac={'mac\x00', 0x10, {{@remote={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xbb}}}}, @bpf0={'bpf\x00', 0x210, {{0x0, [{}, {}, {0x0, 0x0, 0x3}, {0xf7, 0x1f, 0xfffffffffffffe00, 0x1}, {0x10000, 0xfc0, 0x1, 0x6}, {0x4, 0x2, 0xcefa, 0x81}, {0x815, 0xc7, 0x8001, 0x6a0}, {0x40, 0x0, 0x9, 0x80000001}, {0xffffffffffffff53, 0x38a, 0x100000000, 0x7}, {0x5, 0x1, 0x1000, 0x10001}, {0x80000000, 0x7, 0x1, 0xf7}, {0x2, 0x9, 0x4c, 0x5}, {0xfffffffffffffff7, 0x0, 0xe74, 0x52a}, {0x1ff, 0x7, 0x3, 0x7}, {0x6, 0x1ff, 0x49, 0x7}, {0x8000, 0x0, 0x7, 0x684}, {0xffe, 0x988, 0x3, 0x1}, {0x7b, 0x5a07, 0x18, 0x7}, {0xfffffffffffffffe, 0xfff, 0x3, 0x178180a0}, {0x2, 0xc0, 0x6, 0x401}, {0x5, 0x3, 0x8, 0x8}, {0xffffffffffff0001, 0x3, 0xfffffffffffffff7, 0x5}, {0x1ff, 0x8001, 0x3}, {0x3, 0x9, 0xffffffff, 0x2}, {0x5, 0x4, 0x574, 0x64c}, {0x5, 0x4, 0x10001, 0x6}, {0x1, 0x5b2c, 0x3ff, 0x7}, {0xff, 0x2, 0x5, 0x62c5fc18}, {0x101, 0x7, 0x2, 0xfffffffffffffffd}, {0x7fff, 0x6, 0x8, 0x4}, {0x9, 0x0, 0x7, 0xff}, {0x4, 0x4, 0x4, 0x10000}, {0x59b0, 0xfff, 0x4, 0x4}, {0x1f, 0xfffffffffffffffd, 0x8001, 0x800}, {0x0, 0xffffffffffffffff, 0x2, 0x65}, {0x1ff, 0x1, 0x2, 0x7ff}, {0x4, 0x5, 0x1, 0x7be}, {0x9e4, 0x0, 0x7, 0x5}, {0x5, 0x8, 0x7f, 0xffffffff}, {0x4, 0x6, 0x5, 0x7ff}, {0x22aaaf52, 0x8f, 0x6, 0x10000}, {0x2, 0x7, 0xffff}, {0x5, 0xfffffffff016eb50, 0x82, 0x7}, {0x38, 0x800, 0x9a2a, 0xfffffffffffffffc}, {0x5, 0xb, 0x4, 0xfffffffffffff001}, {0x8b5, 0x81, 0x4, 0x2}, {0x8, 0xfffffffffffffff8, 0x1, 0x8}, {0x40, 0x4, 0x1, 0x100000001}, {0x9b, 0x5, 0x1, 0xd64c}, {0x100, 0x8, 0x7, 0x3ff}, {0xf11, 0x200, 0x7, 0x2}, {0xac5, 0x0, 0x3, 0x7}, {0x518, 0x1, 0x80}, {0x6, 0x7f, 0x6, 0x7298}, {0x7, 0x1, 0x2, 0x1ec9}, {0x400, 0x2, 0x6, 0x6c3}, {0x100000001, 0x6, 0x5, 0x9}, {0x8, 0x1dae, 0xfffffffffffffff8, 0x101}, {0x2, 0x7, 0x8, 0x3}, {0x0, 0x45b, 0x7, 0x72}, {0x100000001, 0xc00000000000, 0x100000001, 0x8}, {0x100000001, 0x0, 0xfffffffffffffffc, 0x3}, {0x95, 0x90b, 0x0, 0xfffffffffffff565}, {0x0, 0x4, 0x0, 0x2}], 0x40}}}]}}, @common=@IDLETIMER={'IDLETIMER\x00', 0x28, {{0x7f, 'syz0\x00'}}}}]}, {0x0, '\x00', 0x2, 0xfffffffffffffffc}, {0x0, '\x00', 0x2, 0xffffffffffffffff, 0x2, [{{{0x11, 0x40, 0x87df, 'irlan0\x00', 'sit0\x00', 'veth0_to_team\x00', 'ip6gretap0\x00', @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [0xff, 0xff, 0xff, 0xff, 0x0, 0xff], @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [0x0, 0xff, 0x0, 0xff], 0xb0, 0x210, 0x258, [@time={'time\x00', 0x18, {{0x1ff, 0x1, 0xe063, 0xb6c5, 0x2e80, 0x0, 0x2}}}]}, [@common=@redirect={'redirect\x00', 0x8, {{0xffffffffffffffff}}}, @common=@SECMARK={'SECMARK\x00', 0x108, {{0x1, 0x6, 'system_u:object_r:lost_found_t:s0\x00'}}}]}, @common=@ERROR={'ERROR\x00', 0x20, {"4323eed968d7072e70de82f41331fe3aed2aedc8f2fff16e54b1c4e2ad07"}}}, {{{0x5, 0x54, 0x888d, 'ip6gretap0\x00', 'teql0\x00', 'veth1_to_team\x00', 'erspan0\x00', @random="0eae55d5aac5", [0x0, 0xff, 0x0, 0xff, 0xff, 0xff], @empty, [0xff, 0xff, 0xff, 0x0, 0xff, 0xff], 0x70, 0x70, 0xb8}}, @common=@RATEEST={'RATEEST\x00', 0x20, {{'syz0\x00', 0x9, 0x1, 0x4}}}}]}]}, 0x9a0) 2018/05/15 08:25:30 executing program 2: syz_emit_ethernet(0x3e, &(0x7f00000001c0)={@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, @dev={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa]}, [], {@ipv6={0x86dd, {0x0, 0x6, "50a09c", 0x8, 0x0, 0x0, @remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe], 0xbb}, @local={0xfe, 0x80, [], 0xaa}, {[], @udp={0x0, 0x0, 0x8}}}}}}, &(0x7f0000000040)) 2018/05/15 08:25:31 executing program 6: bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x10, 0x4, 0x4, 0x0, 0x0, 0x1}, 0x2c) bpf$MAP_CREATE(0x2, &(0x7f0000003000)={0x13, 0x0, 0x77fffb, 0x0, 0x730000, 0x0}, 0x2c) 2018/05/15 08:25:31 executing program 4: clock_gettime(0xfffffffffffffff8, &(0x7f0000000000)) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup.cpu/syz1\x00', 0x1ff) 2018/05/15 08:25:31 executing program 0: r0 = syz_open_procfs(0x0, &(0x7f0000000780)="2f65786500000000000409004bddd9de91be10eebf000ee9a90f798058439ed554fa07424adee901d2da75af1f0200f5ab26d7a071fb35331ce39c5a") ioctl$KVM_IOEVENTFD(0xffffffffffffffff, 0x40106614, &(0x7f0000000040)) 2018/05/15 08:25:31 executing program 5: r0 = syz_open_procfs(0x0, &(0x7f0000000080)="609049321d94caa3f86fab3355547172f0b07005657d601fb57d6264d1bee0a82f7e6c44b1754e012b5981320a371b296619934ec0ca5779fb22c5112c2b4a7abd92679aa21aaf9e8eee80aee4fa1f52a39700ef0efca73071b5e0ad48fee37ab6d6cc6014261a095914ea4f97d3d8bc9426d04ba253c172d4160af841d68878d7dd7f6b29f43569c089456fa2c5fa6634a4fbc293173b64fff2583ac0e5c2d3ef237284aee850ccb3ec50d9f32b1d156bb7ac304520c355e2caa7dd605cbd1ae98db8194d580285f597de6ac2077ab9bd65833d8f5ea04a38ebd9d7e8bad56bed8dd5243cfc60b983d9278d5cba18df0e361482c65587291f6a883e4351954991effe76ae7e56f5e218eab994a455d3b7ff60438bb75ab6b424d7cab06e2ef101aac641b70ffd5b2bc590125abd4c") sendfile(r0, r0, &(0x7f0000000000)=0xffffffd, 0x7fffffff) 2018/05/15 08:25:31 executing program 3: syz_emit_ethernet(0x3e, &(0x7f00000001c0)={@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, @dev={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa]}, [], {@ipv6={0x86dd, {0x0, 0x6, "50a09c", 0x8, 0xffffff87, 0x0, @remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x5dc], 0xbb}, @local={0xfe, 0x80, [], 0xaa}, {[], @udp={0x0, 0x0, 0x8}}}}}}, &(0x7f0000000040)) 2018/05/15 08:25:31 executing program 2: syz_emit_ethernet(0x3e, &(0x7f00000001c0)={@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, @dev={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa]}, [], {@ipv6={0x86dd, {0x0, 0x6, "50a09c", 0x8, 0x0, 0x0, @remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x689], 0xbb}, @local={0xfe, 0x80, [], 0xaa}, {[], @udp={0x0, 0x0, 0x8}}}}}}, &(0x7f0000000040)) 2018/05/15 08:25:31 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f0000000280)="6e65742f6970365f7461626c65735f6d61746368657300b6e23bcf6093cb57f8b4d285e9c48608549acee9a66f09d47a011dcc8f5af7870c6c1b6eebe85ebea4ecda4e44def87e8ee568c843daaf2805944012bc0144937e8b04411d09016ca07f7388ded591e346fb612397e79a6fe43e5c6a86bee1565b17b22b8ed5c95b4afbb3a620d1402c50bbaad790d0ffdb7c5a27e60423079f77bf") unlink(&(0x7f0000000080)='./file0\x00') sendfile(r0, 0xffffffffffffffff, &(0x7f00000000c0)=0x10000000, 0x2) ioctl$KDGKBMETA(r0, 0x4b62, &(0x7f0000000100)) getsockopt$inet_sctp_SCTP_PARTIAL_DELIVERY_POINT(r0, 0x84, 0x13, &(0x7f0000000140)={0x0, 0xfffffffffffffffa}, &(0x7f0000000180)=0x8) syslog(0x2, &(0x7f0000000cc0)=""/107, 0x6b) setsockopt$IP_VS_SO_SET_DEL(r0, 0x0, 0x484, &(0x7f0000000200)={0x87, @dev={0xac, 0x14, 0x14, 0x1a}, 0x4e24, 0x2, 'rr\x00', 0x3, 0x2, 0x66}, 0x2c) setsockopt$inet_sctp_SCTP_STREAM_SCHEDULER(r0, 0x84, 0x7b, &(0x7f00000001c0)={r1, 0x40ef2843}, 0x8) setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x40, &(0x7f0000000340)=ANY=[@ANYBLOB="73656375726974790000000000000000000000000000000000000000000000000e00000004000000f8030000fffffffff00000000000000000000000ffffffffffffffff600300006003000060030000ffffffff04000000", @ANYPTR=&(0x7f0000000d40)=ANY=[@ANYBLOB="000000000000000000000000002100ebe70048ca02fec408edfbaf31ba590218fdffffffffffd60000000000000000000000000000000000000000000000000021d13202a6d3d3de0000000000000000000000"], @ANYBLOB="00000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000c800f0000000000000000000000000000000000000000000000000003000616800000000000000000000000000000000000000000000000000000000f9ffffff7f000000010000000000000028005443504d5353000000000000000000000000000000000000000000000000740c0000000000007f000001ac14140dffffff00ffffffff6772653000000000000000000000000069703667726530000000000000000000000000000000000000000000ff0000000000000000000000000000000000000000000000000000000000ff0000000000000000000000000000007f0003010000000000000000000000000000b80018010000000000000000000000000000000000000000000000002000736f636b657400000000000000000000000000000000000000000000000060005345540000000000000000000000000000000000000000000000000000000100000000100000020000000000008e0a000000010400000800000000033f0002000000d4180000ff0700009c0a00001e62000000000000e1020000ff09010000000100ac1414aa000000ffff0000007465616d5f736c6176655f310000000069703667726574617030000000000000000000000000000000000000ff0000000000000000000000000000000000000000000000000000000000ff000000000000000000000000000000670001400000000000000000000000000000280158010000000000000000000000000000000000000000000000004000736574000000000000000000000000000000000000000000000000000000070000000100000008000000090000000000000000000000060000000307050050006f736600000000000000000000000000000000000000000000000000000073797a3100000000000000000000000000000000000000000000000000000000070000000200000002000000000000003000434f4e4e4d41524b00000000000000000000ffffffffffffffe5000000014000000009000000020000000300000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000700098000000000000000000000000000000000000000000280000000000000000000000000000000000000000000000000000000000000800ffffff00000000"], 0x458) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000000)='dctcp\x00', 0x6) 2018/05/15 08:25:31 executing program 7: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup(r0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000d40)=@broute={'broute\x00', 0x20, 0x4, 0x928, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000400], 0x0, &(0x7f0000000000), &(0x7f0000000400)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x2, [{{{0x5, 0x0, 0x0, 'bcsh0\x00', 'sit0\x00', 'syzkaller1\x00', 'veth0\x00', @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [], @dev={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa]}, [], 0x1d8, 0x228, 0x258, [@comment={'comment\x00', 0x100}, @owner={'owner\x00', 0x18}]}, [@common=@LED={'LED\x00', 0x28, {{'syz0\x00'}}}]}, @common=@redirect={'redirect\x00', 0x8}}, {{{0x11, 0x0, 0x0, 'veth1_to_bond\x00', 'erspan0\x00', 'bridge_slave_1\x00', 'veth0_to_bridge\x00', @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [], @random="cfa071dc33d9", [], 0x2e0, 0x2e0, 0x330, [@mac={'mac\x00', 0x10, {{@remote={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xbb}}}}, @bpf0={'bpf\x00', 0x210, {{0x0, [{}, {}, {}, {0xf7, 0x1f, 0xfffffffffffffe00, 0x1}, {0x10000, 0xfc0, 0x1, 0x6}, {0x4, 0x2, 0xcefa, 0x81}, {0x815, 0xc7, 0x8001, 0x6a0}, {0x40, 0x0, 0x9, 0x80000001}, {0xffffffffffffff53, 0x38a, 0x100000000, 0x7}, {0x5, 0x1, 0x1000, 0x10001}, {0x80000000, 0x7, 0x1, 0xf7}, {0x2, 0x9, 0x4c, 0x5}, {0xfffffffffffffff7, 0x0, 0xe74, 0x52a}, {0x1ff, 0x7, 0x3, 0x7}, {0x6, 0x1ff, 0x49, 0x7}, {0x8000, 0x0, 0x7, 0x684}, {0xffe, 0x988, 0x3, 0x1}, {0x7b, 0x5a07, 0x18, 0x7}, {0xfffffffffffffffe, 0xfff, 0x3, 0x178180a0}, {0x2, 0xc0, 0x6, 0x401}, {0x5, 0x3, 0x8, 0x8}, {0xffffffffffff0001, 0x3, 0xfffffffffffffff7, 0x5}, {0x1ff, 0x8001, 0x3}, {0x3, 0x9, 0xffffffff, 0x2}, {0x5, 0x4, 0x574, 0x64c}, {0x5, 0x4, 0x10001, 0x6}, {0x1, 0x5b2c, 0x3ff, 0x7}, {0xff, 0x2, 0x5, 0x62c5fc18}, {0x101, 0x7, 0x2, 0xfffffffffffffffd}, {0x7fff, 0x6, 0x8, 0x4}, {0x9, 0x0, 0x7, 0xff}, {0x4, 0x4, 0x4, 0x10000}, {0x59b0, 0xfff, 0x4, 0x4}, {0x1f, 0xfffffffffffffffd, 0x8001, 0x800}, {0x0, 0xffffffffffffffff, 0x2, 0x65}, {0x1ff, 0x1, 0x2, 0x7ff}, {0x4, 0x5, 0x1, 0x7be}, {0x9e4, 0x0, 0x7, 0x5}, {0x5, 0x8, 0x7f, 0xffffffff}, {0x4, 0x6, 0x5, 0x7ff}, {0x22aaaf52, 0x8f, 0x6, 0x10000}, {0x2, 0x7, 0xffff}, {0x5, 0xfffffffff016eb50, 0x82, 0x7}, {0x38, 0x800, 0x9a2a, 0xfffffffffffffffc}, {0x5, 0xb, 0x4, 0xfffffffffffff001}, {0x8b5, 0x81, 0x4, 0x2}, {0x8, 0xfffffffffffffff8, 0x1, 0x8}, {0x40, 0x4, 0x1, 0x100000001}, {0x9b, 0x5, 0x1, 0xd64c}, {0x100, 0x8, 0x7, 0x3ff}, {0xf11, 0x200, 0x7, 0x2}, {0xac5, 0x0, 0x3, 0x7}, {0x518, 0x1, 0x80}, {0x6, 0x7f, 0x6, 0x7298}, {0x7, 0x1, 0x2, 0x1ec9}, {0x400, 0x2, 0x6, 0x6c3}, {0x100000001, 0x6, 0x5, 0x9}, {0x8, 0x1dae, 0xfffffffffffffff8, 0x101}, {0x2, 0x7, 0x8, 0x3}, {0x0, 0x45b, 0x7, 0x72}, {0x100000001, 0xc00000000000, 0x100000001, 0x8}, {0x100000001, 0x0, 0xfffffffffffffffc, 0x3}, {0x95, 0x90b, 0x0, 0xfffffffffffff565}, {0x0, 0x4, 0x0, 0x2}], 0x40}}}]}}, @common=@IDLETIMER={'IDLETIMER\x00', 0x28, {{0x7f, 'syz0\x00'}}}}]}, {0x0, '\x00', 0x2, 0xfffffffffffffffc}, {0x0, '\x00', 0x2, 0xffffffffffffffff, 0x2, [{{{0x11, 0x40, 0x87df, 'irlan0\x00', 'sit0\x00', 'veth0_to_team\x00', 'ip6gretap0\x00', @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [0xff, 0xff, 0xff, 0xff, 0x0, 0xff], @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [0x0, 0xff, 0x0, 0xff], 0xb0, 0x210, 0x258, [@time={'time\x00', 0x18, {{0x1ff, 0x1, 0xe063, 0xb6c5, 0x2e80, 0x0, 0x2}}}]}, [@common=@redirect={'redirect\x00', 0x8, {{0xffffffffffffffff}}}, @common=@SECMARK={'SECMARK\x00', 0x108, {{0x1, 0x6, 'system_u:object_r:lost_found_t:s0\x00'}}}]}, @common=@ERROR={'ERROR\x00', 0x20, {"4323eed968d7072e70de82f41331fe3aed2aedc8f2fff16e54b1c4e2ad07"}}}, {{{0x5, 0x54, 0x888d, 'ip6gretap0\x00', 'teql0\x00', 'veth1_to_team\x00', 'erspan0\x00', @random="0eae55d5aac5", [0x0, 0xff, 0x0, 0xff, 0xff, 0xff], @empty, [0xff, 0xff, 0xff, 0x0, 0xff, 0xff], 0x70, 0x70, 0xb8}}, @common=@RATEEST={'RATEEST\x00', 0x20, {{'syz0\x00', 0x9, 0x1, 0x4}}}}]}]}, 0x9a0) 2018/05/15 08:25:31 executing program 5: sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000000)=0xffffffd, 0x7fffffff) 2018/05/15 08:25:32 executing program 6: bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x10, 0x4, 0x4, 0x5, 0x0, 0x1}, 0x2c) bpf$MAP_CREATE(0x2, &(0x7f0000003000)={0x0, 0x0, 0x77fffb, 0x0, 0x730000, 0x0}, 0x2c) 2018/05/15 08:25:32 executing program 0: r0 = syz_open_procfs(0x0, &(0x7f0000000780)="2f65786500000000000409004bddd9de91be10eebf000ee9a90f798058439ed554fa07424adee901d2da75af1f0200f5ab26d7a071fb35331ce39c5a") ioctl$KVM_IOEVENTFD(0xffffffffffffffff, 0x40106614, &(0x7f0000000040)) 2018/05/15 08:25:32 executing program 2: syz_emit_ethernet(0x3e, &(0x7f00000001c0)={@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, @dev={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa]}, [], {@ipv6={0x86dd, {0x0, 0x6, "50a09c", 0x8, 0x0, 0x0, @remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8848], 0xbb}, @local={0xfe, 0x80, [], 0xaa}, {[], @udp={0x0, 0x0, 0x8}}}}}}, &(0x7f0000000040)) 2018/05/15 08:25:32 executing program 3: syz_emit_ethernet(0x3e, &(0x7f00000001c0)={@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, @dev={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa]}, [], {@ipv6={0x86dd, {0x0, 0x6, "50a09c", 0x8, 0xffffff87, 0x0, @remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x8004020000000000], 0xbb}, @local={0xfe, 0x80, [], 0xaa}, {[], @udp={0x0, 0x0, 0x8}}}}}}, &(0x7f0000000040)) 2018/05/15 08:25:32 executing program 4: clock_gettime(0xfffffffffffffff8, &(0x7f0000000000)) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup.cpu/syz1\x00', 0x1ff) 2018/05/15 08:25:32 executing program 7: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup(r0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000d40)=@broute={'broute\x00', 0x20, 0x4, 0x928, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000400], 0x0, &(0x7f0000000000), &(0x7f0000000400)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x2, [{{{0x5, 0x0, 0x0, 'bcsh0\x00', 'sit0\x00', 'syzkaller1\x00', 'veth0\x00', @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [], @dev={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa]}, [], 0x1d8, 0x228, 0x258, [@comment={'comment\x00', 0x100}, @owner={'owner\x00', 0x18}]}, [@common=@LED={'LED\x00', 0x28, {{'syz0\x00'}}}]}, @common=@redirect={'redirect\x00', 0x8}}, {{{0x11, 0x0, 0x0, 'veth1_to_bond\x00', 'erspan0\x00', 'bridge_slave_1\x00', 'veth0_to_bridge\x00', @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [], @random="cfa071dc33d9", [], 0x2e0, 0x2e0, 0x330, [@mac={'mac\x00', 0x10, {{@remote={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xbb}}}}, @bpf0={'bpf\x00', 0x210, {{0x0, [{}, {}, {}, {0x0, 0x1f, 0xfffffffffffffe00, 0x1}, {0x10000, 0xfc0, 0x1, 0x6}, {0x4, 0x2, 0xcefa, 0x81}, {0x815, 0xc7, 0x8001, 0x6a0}, {0x40, 0x0, 0x9, 0x80000001}, {0xffffffffffffff53, 0x38a, 0x100000000, 0x7}, {0x5, 0x1, 0x1000, 0x10001}, {0x80000000, 0x7, 0x1, 0xf7}, {0x2, 0x9, 0x4c, 0x5}, {0xfffffffffffffff7, 0x0, 0xe74, 0x52a}, {0x1ff, 0x7, 0x3, 0x7}, {0x6, 0x1ff, 0x49, 0x7}, {0x8000, 0x0, 0x7, 0x684}, {0xffe, 0x988, 0x3, 0x1}, {0x7b, 0x5a07, 0x18, 0x7}, {0xfffffffffffffffe, 0xfff, 0x3, 0x178180a0}, {0x2, 0xc0, 0x6, 0x401}, {0x5, 0x3, 0x8, 0x8}, {0xffffffffffff0001, 0x3, 0xfffffffffffffff7, 0x5}, {0x1ff, 0x8001, 0x3}, {0x3, 0x9, 0xffffffff, 0x2}, {0x5, 0x4, 0x574, 0x64c}, {0x5, 0x4, 0x10001, 0x6}, {0x1, 0x5b2c, 0x3ff, 0x7}, {0xff, 0x2, 0x5, 0x62c5fc18}, {0x101, 0x7, 0x2, 0xfffffffffffffffd}, {0x7fff, 0x6, 0x8, 0x4}, {0x9, 0x0, 0x7, 0xff}, {0x4, 0x4, 0x4, 0x10000}, {0x59b0, 0xfff, 0x4, 0x4}, {0x1f, 0xfffffffffffffffd, 0x8001, 0x800}, {0x0, 0xffffffffffffffff, 0x2, 0x65}, {0x1ff, 0x1, 0x2, 0x7ff}, {0x4, 0x5, 0x1, 0x7be}, {0x9e4, 0x0, 0x7, 0x5}, {0x5, 0x8, 0x7f, 0xffffffff}, {0x4, 0x6, 0x5, 0x7ff}, {0x22aaaf52, 0x8f, 0x6, 0x10000}, {0x2, 0x7, 0xffff}, {0x5, 0xfffffffff016eb50, 0x82, 0x7}, {0x38, 0x800, 0x9a2a, 0xfffffffffffffffc}, {0x5, 0xb, 0x4, 0xfffffffffffff001}, {0x8b5, 0x81, 0x4, 0x2}, {0x8, 0xfffffffffffffff8, 0x1, 0x8}, {0x40, 0x4, 0x1, 0x100000001}, {0x9b, 0x5, 0x1, 0xd64c}, {0x100, 0x8, 0x7, 0x3ff}, {0xf11, 0x200, 0x7, 0x2}, {0xac5, 0x0, 0x3, 0x7}, {0x518, 0x1, 0x80}, {0x6, 0x7f, 0x6, 0x7298}, {0x7, 0x1, 0x2, 0x1ec9}, {0x400, 0x2, 0x6, 0x6c3}, {0x100000001, 0x6, 0x5, 0x9}, {0x8, 0x1dae, 0xfffffffffffffff8, 0x101}, {0x2, 0x7, 0x8, 0x3}, {0x0, 0x45b, 0x7, 0x72}, {0x100000001, 0xc00000000000, 0x100000001, 0x8}, {0x100000001, 0x0, 0xfffffffffffffffc, 0x3}, {0x95, 0x90b, 0x0, 0xfffffffffffff565}, {0x0, 0x4, 0x0, 0x2}], 0x40}}}]}}, @common=@IDLETIMER={'IDLETIMER\x00', 0x28, {{0x7f, 'syz0\x00'}}}}]}, {0x0, '\x00', 0x2, 0xfffffffffffffffc}, {0x0, '\x00', 0x2, 0xffffffffffffffff, 0x2, [{{{0x11, 0x40, 0x87df, 'irlan0\x00', 'sit0\x00', 'veth0_to_team\x00', 'ip6gretap0\x00', @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [0xff, 0xff, 0xff, 0xff, 0x0, 0xff], @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [0x0, 0xff, 0x0, 0xff], 0xb0, 0x210, 0x258, [@time={'time\x00', 0x18, {{0x1ff, 0x1, 0xe063, 0xb6c5, 0x2e80, 0x0, 0x2}}}]}, [@common=@redirect={'redirect\x00', 0x8, {{0xffffffffffffffff}}}, @common=@SECMARK={'SECMARK\x00', 0x108, {{0x1, 0x6, 'system_u:object_r:lost_found_t:s0\x00'}}}]}, @common=@ERROR={'ERROR\x00', 0x20, {"4323eed968d7072e70de82f41331fe3aed2aedc8f2fff16e54b1c4e2ad07"}}}, {{{0x5, 0x54, 0x888d, 'ip6gretap0\x00', 'teql0\x00', 'veth1_to_team\x00', 'erspan0\x00', @random="0eae55d5aac5", [0x0, 0xff, 0x0, 0xff, 0xff, 0xff], @empty, [0xff, 0xff, 0xff, 0x0, 0xff, 0xff], 0x70, 0x70, 0xb8}}, @common=@RATEEST={'RATEEST\x00', 0x20, {{'syz0\x00', 0x9, 0x1, 0x4}}}}]}]}, 0x9a0) 2018/05/15 08:25:32 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f0000000280)="6e65742f6970365f7461626c65735f6d61746368657300b6e23bcf6093cb57f8b4d285e9c48608549acee9a66f09d47a011dcc8f5af7870c6c1b6eebe85ebea4ecda4e44def87e8ee568c843daaf2805944012bc0144937e8b04411d09016ca07f7388ded591e346fb612397e79a6fe43e5c6a86bee1565b17b22b8ed5c95b4afbb3a620d1402c50bbaad790d0ffdb7c5a27e60423079f77bf") unlink(&(0x7f0000000080)='./file0\x00') sendfile(r0, 0xffffffffffffffff, &(0x7f00000000c0)=0x10000000, 0x2) ioctl$KDGKBMETA(r0, 0x4b62, &(0x7f0000000100)) getsockopt$inet_sctp_SCTP_PARTIAL_DELIVERY_POINT(r0, 0x84, 0x13, &(0x7f0000000140)={0x0, 0xfffffffffffffffa}, &(0x7f0000000180)=0x8) syslog(0x2, &(0x7f0000000cc0)=""/107, 0x6b) setsockopt$IP_VS_SO_SET_DEL(r0, 0x0, 0x484, &(0x7f0000000200)={0x87, @dev={0xac, 0x14, 0x14, 0x1a}, 0x4e24, 0x2, 'rr\x00', 0x3, 0x2, 0x66}, 0x2c) setsockopt$inet_sctp_SCTP_STREAM_SCHEDULER(r0, 0x84, 0x7b, &(0x7f00000001c0)={r1, 0x40ef2843}, 0x8) setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x40, &(0x7f0000000340)=ANY=[@ANYBLOB="73656375726974790000000000000000000000000000000000000000000000000e00000004000000f8030000fffffffff00000000000000000000000ffffffffffffffff600300006003000060030000ffffffff04000000", @ANYPTR=&(0x7f0000000d40)=ANY=[@ANYBLOB="000000000000000000000000002100ebe70048ca02fec408edfbaf31ba590218fdffffffffffd60000000000000000000000000000000000000000000000000021d13202a6d3d3de0000000000000000000000"], @ANYBLOB="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"], 0x458) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000000)='dctcp\x00', 0x6) 2018/05/15 08:25:32 executing program 5: r0 = syz_open_procfs(0x0, &(0x7f0000000280)='net/ptype\x00') r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000980)='/dev/ptmx\x00', 0x1, 0x0) write$binfmt_elf32(r1, &(0x7f0000000080)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x38, 0x0, 0x0, 0x0, 0x20}, [{}], "", [[]]}, 0x158) sendfile(r0, r0, &(0x7f0000000000)=0xffffffd, 0x7fffffff) 2018/05/15 08:25:32 executing program 2: syz_emit_ethernet(0x3e, &(0x7f00000001c0)={@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, @dev={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa]}, [], {@ipv6={0x86dd, {0x0, 0x6, "50a09c", 0x8, 0x0, 0x0, @remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c00], 0xbb}, @local={0xfe, 0x80, [], 0xaa}, {[], @udp={0x0, 0x0, 0x8}}}}}}, &(0x7f0000000040)) 2018/05/15 08:25:32 executing program 6: bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x10, 0x4, 0x4, 0x5, 0x0, 0x1}, 0x2c) bpf$MAP_CREATE(0x2, &(0x7f0000003000)={0x0, 0x0, 0x77fffb, 0x0, 0x730000, 0x0}, 0x2c) 2018/05/15 08:25:32 executing program 0: clock_gettime(0xfffffffffffffff8, &(0x7f0000000000)) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup.cpu/syz1\x00', 0x1ff) 2018/05/15 08:25:32 executing program 3: syz_emit_ethernet(0x3e, &(0x7f00000001c0)={@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, @dev={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa]}, [], {@ipv6={0x86dd, {0x0, 0x6, "50a09c", 0x8, 0xffffff87, 0x0, @remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x3000000], 0xbb}, @local={0xfe, 0x80, [], 0xaa}, {[], @udp={0x0, 0x0, 0x8}}}}}}, &(0x7f0000000040)) 2018/05/15 08:25:33 executing program 5: r0 = syz_open_dev$usbmon(&(0x7f0000000040)='/dev/usbmon#\x00', 0x0, 0x40) rt_sigreturn() setns(r0, 0x0) ftruncate(r0, 0x15b4) setsockopt$bt_BT_SNDMTU(r0, 0x112, 0xc, &(0x7f0000000100)=0x1, 0x2) r1 = syz_open_procfs(0x0, &(0x7f0000000280)='net/ptype\x00') setsockopt$inet6_dccp_int(r1, 0x21, 0xf, &(0x7f0000000080)=0x2, 0x4) ioctl$KVM_IRQ_LINE(r1, 0x4008ae61, &(0x7f0000000000)={0xb, 0x401}) sendfile(r1, r0, &(0x7f00000000c0), 0xffffffffffffffe1) 2018/05/15 08:25:33 executing program 4: clock_gettime(0xfffffffffffffff8, &(0x7f0000000000)) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup.cpu/syz1\x00', 0x1ff) 2018/05/15 08:25:33 executing program 7: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup(r0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000d40)=@broute={'broute\x00', 0x20, 0x4, 0x928, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000400], 0x0, &(0x7f0000000000), &(0x7f0000000400)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x2, [{{{0x5, 0x0, 0x0, 'bcsh0\x00', 'sit0\x00', 'syzkaller1\x00', 'veth0\x00', @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [], @dev={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa]}, [], 0x1d8, 0x228, 0x258, [@comment={'comment\x00', 0x100}, @owner={'owner\x00', 0x18}]}, [@common=@LED={'LED\x00', 0x28, {{'syz0\x00'}}}]}, @common=@redirect={'redirect\x00', 0x8}}, {{{0x11, 0x0, 0x0, 'veth1_to_bond\x00', 'erspan0\x00', 'bridge_slave_1\x00', 'veth0_to_bridge\x00', @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [], @random="cfa071dc33d9", [], 0x2e0, 0x2e0, 0x330, [@mac={'mac\x00', 0x10, {{@remote={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xbb}}}}, @bpf0={'bpf\x00', 0x210, {{0x0, [{}, {}, {}, {0x0, 0x0, 0xfffffffffffffe00, 0x1}, {0x10000, 0xfc0, 0x1, 0x6}, {0x4, 0x2, 0xcefa, 0x81}, {0x815, 0xc7, 0x8001, 0x6a0}, {0x40, 0x0, 0x9, 0x80000001}, {0xffffffffffffff53, 0x38a, 0x100000000, 0x7}, {0x5, 0x1, 0x1000, 0x10001}, {0x80000000, 0x7, 0x1, 0xf7}, {0x2, 0x9, 0x4c, 0x5}, {0xfffffffffffffff7, 0x0, 0xe74, 0x52a}, {0x1ff, 0x7, 0x3, 0x7}, {0x6, 0x1ff, 0x49, 0x7}, {0x8000, 0x0, 0x7, 0x684}, {0xffe, 0x988, 0x3, 0x1}, {0x7b, 0x5a07, 0x18, 0x7}, {0xfffffffffffffffe, 0xfff, 0x3, 0x178180a0}, {0x2, 0xc0, 0x6, 0x401}, {0x5, 0x3, 0x8, 0x8}, {0xffffffffffff0001, 0x3, 0xfffffffffffffff7, 0x5}, {0x1ff, 0x8001, 0x3}, {0x3, 0x9, 0xffffffff, 0x2}, {0x5, 0x4, 0x574, 0x64c}, {0x5, 0x4, 0x10001, 0x6}, {0x1, 0x5b2c, 0x3ff, 0x7}, {0xff, 0x2, 0x5, 0x62c5fc18}, {0x101, 0x7, 0x2, 0xfffffffffffffffd}, {0x7fff, 0x6, 0x8, 0x4}, {0x9, 0x0, 0x7, 0xff}, {0x4, 0x4, 0x4, 0x10000}, {0x59b0, 0xfff, 0x4, 0x4}, {0x1f, 0xfffffffffffffffd, 0x8001, 0x800}, {0x0, 0xffffffffffffffff, 0x2, 0x65}, {0x1ff, 0x1, 0x2, 0x7ff}, {0x4, 0x5, 0x1, 0x7be}, {0x9e4, 0x0, 0x7, 0x5}, {0x5, 0x8, 0x7f, 0xffffffff}, {0x4, 0x6, 0x5, 0x7ff}, {0x22aaaf52, 0x8f, 0x6, 0x10000}, {0x2, 0x7, 0xffff}, {0x5, 0xfffffffff016eb50, 0x82, 0x7}, {0x38, 0x800, 0x9a2a, 0xfffffffffffffffc}, {0x5, 0xb, 0x4, 0xfffffffffffff001}, {0x8b5, 0x81, 0x4, 0x2}, {0x8, 0xfffffffffffffff8, 0x1, 0x8}, {0x40, 0x4, 0x1, 0x100000001}, {0x9b, 0x5, 0x1, 0xd64c}, {0x100, 0x8, 0x7, 0x3ff}, {0xf11, 0x200, 0x7, 0x2}, {0xac5, 0x0, 0x3, 0x7}, {0x518, 0x1, 0x80}, {0x6, 0x7f, 0x6, 0x7298}, {0x7, 0x1, 0x2, 0x1ec9}, {0x400, 0x2, 0x6, 0x6c3}, {0x100000001, 0x6, 0x5, 0x9}, {0x8, 0x1dae, 0xfffffffffffffff8, 0x101}, {0x2, 0x7, 0x8, 0x3}, {0x0, 0x45b, 0x7, 0x72}, {0x100000001, 0xc00000000000, 0x100000001, 0x8}, {0x100000001, 0x0, 0xfffffffffffffffc, 0x3}, {0x95, 0x90b, 0x0, 0xfffffffffffff565}, {0x0, 0x4, 0x0, 0x2}], 0x40}}}]}}, @common=@IDLETIMER={'IDLETIMER\x00', 0x28, {{0x7f, 'syz0\x00'}}}}]}, {0x0, '\x00', 0x2, 0xfffffffffffffffc}, {0x0, '\x00', 0x2, 0xffffffffffffffff, 0x2, [{{{0x11, 0x40, 0x87df, 'irlan0\x00', 'sit0\x00', 'veth0_to_team\x00', 'ip6gretap0\x00', @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [0xff, 0xff, 0xff, 0xff, 0x0, 0xff], @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [0x0, 0xff, 0x0, 0xff], 0xb0, 0x210, 0x258, [@time={'time\x00', 0x18, {{0x1ff, 0x1, 0xe063, 0xb6c5, 0x2e80, 0x0, 0x2}}}]}, [@common=@redirect={'redirect\x00', 0x8, {{0xffffffffffffffff}}}, @common=@SECMARK={'SECMARK\x00', 0x108, {{0x1, 0x6, 'system_u:object_r:lost_found_t:s0\x00'}}}]}, @common=@ERROR={'ERROR\x00', 0x20, {"4323eed968d7072e70de82f41331fe3aed2aedc8f2fff16e54b1c4e2ad07"}}}, {{{0x5, 0x54, 0x888d, 'ip6gretap0\x00', 'teql0\x00', 'veth1_to_team\x00', 'erspan0\x00', @random="0eae55d5aac5", [0x0, 0xff, 0x0, 0xff, 0xff, 0xff], @empty, [0xff, 0xff, 0xff, 0x0, 0xff, 0xff], 0x70, 0x70, 0xb8}}, @common=@RATEEST={'RATEEST\x00', 0x20, {{'syz0\x00', 0x9, 0x1, 0x4}}}}]}]}, 0x9a0) 2018/05/15 08:25:33 executing program 3: syz_emit_ethernet(0x3e, &(0x7f00000001c0)={@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, @dev={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa]}, [], {@ipv6={0x86dd, {0x0, 0x6, "50a09c", 0x8, 0xffffff87, 0x0, @remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x7000000], 0xbb}, @local={0xfe, 0x80, [], 0xaa}, {[], @udp={0x0, 0x0, 0x8}}}}}}, &(0x7f0000000040)) 2018/05/15 08:25:33 executing program 6: bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x10, 0x4, 0x4, 0x5, 0x0, 0x1}, 0x2c) bpf$MAP_CREATE(0x2, &(0x7f0000003000)={0x0, 0x0, 0x77fffb, 0x0, 0x730000, 0x0}, 0x2c) 2018/05/15 08:25:33 executing program 2: syz_emit_ethernet(0x3e, &(0x7f00000001c0)={@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, @dev={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa]}, [], {@ipv6={0x86dd, {0x0, 0x6, "50a09c", 0x8, 0x0, 0x0, @remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffa888], 0xbb}, @local={0xfe, 0x80, [], 0xaa}, {[], @udp={0x0, 0x0, 0x8}}}}}}, &(0x7f0000000040)) 2018/05/15 08:25:33 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f0000000280)="6e65742f6970365f7461626c65735f6d61746368657300b6e23bcf6093cb57f8b4d285e9c48608549acee9a66f09d47a011dcc8f5af7870c6c1b6eebe85ebea4ecda4e44def87e8ee568c843daaf2805944012bc0144937e8b04411d09016ca07f7388ded591e346fb612397e79a6fe43e5c6a86bee1565b17b22b8ed5c95b4afbb3a620d1402c50bbaad790d0ffdb7c5a27e60423079f77bf") unlink(&(0x7f0000000080)='./file0\x00') sendfile(r0, r0, &(0x7f00000000c0), 0x2) ioctl$KDGKBMETA(r0, 0x4b62, &(0x7f0000000100)) getsockopt$inet_sctp_SCTP_PARTIAL_DELIVERY_POINT(r0, 0x84, 0x13, &(0x7f0000000140)={0x0, 0xfffffffffffffffa}, &(0x7f0000000180)=0x8) syslog(0x2, &(0x7f0000000cc0)=""/107, 0x6b) setsockopt$IP_VS_SO_SET_DEL(r0, 0x0, 0x484, &(0x7f0000000200)={0x87, @dev={0xac, 0x14, 0x14, 0x1a}, 0x4e24, 0x2, 'rr\x00', 0x3, 0x2, 0x66}, 0x2c) setsockopt$inet_sctp_SCTP_STREAM_SCHEDULER(r0, 0x84, 0x7b, &(0x7f00000001c0)={r1, 0x40ef2843}, 0x8) setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x40, &(0x7f0000000340)=ANY=[@ANYBLOB="73656375726974790000000000000000000000000000000000000000000000000e00000004000000f8030000fffffffff00000000000000000000000ffffffffffffffff600300006003000060030000ffffffff04000000", @ANYPTR=&(0x7f0000000d40)=ANY=[@ANYBLOB="000000000000000000000000002100ebe70048ca02fec408edfbaf31ba590218fdffffffffffd60000000000000000000000000000000000000000000000000021d13202a6d3d3de0000000000000000000000"], @ANYBLOB="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"], 0x458) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000000)='dctcp\x00', 0x6) 2018/05/15 08:25:33 executing program 0: clock_gettime(0xfffffffffffffff8, &(0x7f0000000000)) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup.cpu/syz1\x00', 0x1ff) 2018/05/15 08:25:33 executing program 3: syz_emit_ethernet(0x3e, &(0x7f00000001c0)={@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, @dev={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa]}, [], {@ipv6={0x86dd, {0x0, 0x6, "50a09c", 0x8, 0xffffff87, 0x0, @remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x4788], 0xbb}, @local={0xfe, 0x80, [], 0xaa}, {[], @udp={0x0, 0x0, 0x8}}}}}}, &(0x7f0000000040)) 2018/05/15 08:25:33 executing program 2: syz_emit_ethernet(0x3e, &(0x7f00000001c0)={@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, @dev={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa]}, [], {@ipv6={0x86dd, {0x0, 0x6, "50a09c", 0x8, 0x0, 0x0, @remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc0ffffff00000000], 0xbb}, @local={0xfe, 0x80, [], 0xaa}, {[], @udp={0x0, 0x0, 0x8}}}}}}, &(0x7f0000000040)) 2018/05/15 08:25:33 executing program 6: bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x10, 0x4, 0x4, 0x5, 0x0, 0x1}, 0x2c) bpf$MAP_CREATE(0x2, &(0x7f0000003000)={0x13, 0x0, 0x0, 0x0, 0x730000, 0x0}, 0x2c) 2018/05/15 08:25:33 executing program 0: clock_gettime(0xfffffffffffffff8, &(0x7f0000000000)) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup.cpu/syz1\x00', 0x1ff) 2018/05/15 08:25:33 executing program 4: perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x5b6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 2018/05/15 08:25:33 executing program 5: r0 = dup3(0xffffffffffffff9c, 0xffffffffffffff9c, 0x80000) ioctl$DRM_IOCTL_PRIME_HANDLE_TO_FD(0xffffffffffffff9c, 0xc00c642d, &(0x7f0000000000)={0x0, 0x80000, 0xffffffffffffff9c}) ioctl$DRM_IOCTL_PRIME_FD_TO_HANDLE(0xffffffffffffff9c, 0xc00c642e, &(0x7f0000000080)={0x0, 0x0, 0xffffffffffffff9c}) ioctl$DRM_IOCTL_PRIME_FD_TO_HANDLE(r0, 0xc00c642e, &(0x7f00000000c0)={r1, 0x80000, r2}) r3 = syz_open_procfs(0x0, &(0x7f0000000280)='net/ptype\x00') sendfile(r3, r3, &(0x7f0000000040), 0x7ffffffd) 2018/05/15 08:25:33 executing program 7: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup(r0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000d40)=@broute={'broute\x00', 0x20, 0x4, 0x928, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000400], 0x0, &(0x7f0000000000), &(0x7f0000000400)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x2, [{{{0x5, 0x0, 0x0, 'bcsh0\x00', 'sit0\x00', 'syzkaller1\x00', 'veth0\x00', @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [], @dev={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa]}, [], 0x1d8, 0x228, 0x258, [@comment={'comment\x00', 0x100}, @owner={'owner\x00', 0x18}]}, [@common=@LED={'LED\x00', 0x28, {{'syz0\x00'}}}]}, @common=@redirect={'redirect\x00', 0x8}}, {{{0x11, 0x0, 0x0, 'veth1_to_bond\x00', 'erspan0\x00', 'bridge_slave_1\x00', 'veth0_to_bridge\x00', @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [], @random="cfa071dc33d9", [], 0x2e0, 0x2e0, 0x330, [@mac={'mac\x00', 0x10, {{@remote={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xbb}}}}, @bpf0={'bpf\x00', 0x210, {{0x0, [{}, {}, {}, {0x0, 0x0, 0x0, 0x1}, {0x10000, 0xfc0, 0x1, 0x6}, {0x4, 0x2, 0xcefa, 0x81}, {0x815, 0xc7, 0x8001, 0x6a0}, {0x40, 0x0, 0x9, 0x80000001}, {0xffffffffffffff53, 0x38a, 0x100000000, 0x7}, {0x5, 0x1, 0x1000, 0x10001}, {0x80000000, 0x7, 0x1, 0xf7}, {0x2, 0x9, 0x4c, 0x5}, {0xfffffffffffffff7, 0x0, 0xe74, 0x52a}, {0x1ff, 0x7, 0x3, 0x7}, {0x6, 0x1ff, 0x49, 0x7}, {0x8000, 0x0, 0x7, 0x684}, {0xffe, 0x988, 0x3, 0x1}, {0x7b, 0x5a07, 0x18, 0x7}, {0xfffffffffffffffe, 0xfff, 0x3, 0x178180a0}, {0x2, 0xc0, 0x6, 0x401}, {0x5, 0x3, 0x8, 0x8}, {0xffffffffffff0001, 0x3, 0xfffffffffffffff7, 0x5}, {0x1ff, 0x8001, 0x3}, {0x3, 0x9, 0xffffffff, 0x2}, {0x5, 0x4, 0x574, 0x64c}, {0x5, 0x4, 0x10001, 0x6}, {0x1, 0x5b2c, 0x3ff, 0x7}, {0xff, 0x2, 0x5, 0x62c5fc18}, {0x101, 0x7, 0x2, 0xfffffffffffffffd}, {0x7fff, 0x6, 0x8, 0x4}, {0x9, 0x0, 0x7, 0xff}, {0x4, 0x4, 0x4, 0x10000}, {0x59b0, 0xfff, 0x4, 0x4}, {0x1f, 0xfffffffffffffffd, 0x8001, 0x800}, {0x0, 0xffffffffffffffff, 0x2, 0x65}, {0x1ff, 0x1, 0x2, 0x7ff}, {0x4, 0x5, 0x1, 0x7be}, {0x9e4, 0x0, 0x7, 0x5}, {0x5, 0x8, 0x7f, 0xffffffff}, {0x4, 0x6, 0x5, 0x7ff}, {0x22aaaf52, 0x8f, 0x6, 0x10000}, {0x2, 0x7, 0xffff}, {0x5, 0xfffffffff016eb50, 0x82, 0x7}, {0x38, 0x800, 0x9a2a, 0xfffffffffffffffc}, {0x5, 0xb, 0x4, 0xfffffffffffff001}, {0x8b5, 0x81, 0x4, 0x2}, {0x8, 0xfffffffffffffff8, 0x1, 0x8}, {0x40, 0x4, 0x1, 0x100000001}, {0x9b, 0x5, 0x1, 0xd64c}, {0x100, 0x8, 0x7, 0x3ff}, {0xf11, 0x200, 0x7, 0x2}, {0xac5, 0x0, 0x3, 0x7}, {0x518, 0x1, 0x80}, {0x6, 0x7f, 0x6, 0x7298}, {0x7, 0x1, 0x2, 0x1ec9}, {0x400, 0x2, 0x6, 0x6c3}, {0x100000001, 0x6, 0x5, 0x9}, {0x8, 0x1dae, 0xfffffffffffffff8, 0x101}, {0x2, 0x7, 0x8, 0x3}, {0x0, 0x45b, 0x7, 0x72}, {0x100000001, 0xc00000000000, 0x100000001, 0x8}, {0x100000001, 0x0, 0xfffffffffffffffc, 0x3}, {0x95, 0x90b, 0x0, 0xfffffffffffff565}, {0x0, 0x4, 0x0, 0x2}], 0x40}}}]}}, @common=@IDLETIMER={'IDLETIMER\x00', 0x28, {{0x7f, 'syz0\x00'}}}}]}, {0x0, '\x00', 0x2, 0xfffffffffffffffc}, {0x0, '\x00', 0x2, 0xffffffffffffffff, 0x2, [{{{0x11, 0x40, 0x87df, 'irlan0\x00', 'sit0\x00', 'veth0_to_team\x00', 'ip6gretap0\x00', @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [0xff, 0xff, 0xff, 0xff, 0x0, 0xff], @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [0x0, 0xff, 0x0, 0xff], 0xb0, 0x210, 0x258, [@time={'time\x00', 0x18, {{0x1ff, 0x1, 0xe063, 0xb6c5, 0x2e80, 0x0, 0x2}}}]}, [@common=@redirect={'redirect\x00', 0x8, {{0xffffffffffffffff}}}, @common=@SECMARK={'SECMARK\x00', 0x108, {{0x1, 0x6, 'system_u:object_r:lost_found_t:s0\x00'}}}]}, @common=@ERROR={'ERROR\x00', 0x20, {"4323eed968d7072e70de82f41331fe3aed2aedc8f2fff16e54b1c4e2ad07"}}}, {{{0x5, 0x54, 0x888d, 'ip6gretap0\x00', 'teql0\x00', 'veth1_to_team\x00', 'erspan0\x00', @random="0eae55d5aac5", [0x0, 0xff, 0x0, 0xff, 0xff, 0xff], @empty, [0xff, 0xff, 0xff, 0x0, 0xff, 0xff], 0x70, 0x70, 0xb8}}, @common=@RATEEST={'RATEEST\x00', 0x20, {{'syz0\x00', 0x9, 0x1, 0x4}}}}]}]}, 0x9a0) 2018/05/15 08:25:33 executing program 3: syz_emit_ethernet(0x3e, &(0x7f00000001c0)={@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, @dev={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa]}, [], {@ipv6={0x86dd, {0x0, 0x6, "50a09c", 0x8, 0xffffff87, 0x0, @remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x8000000], 0xbb}, @local={0xfe, 0x80, [], 0xaa}, {[], @udp={0x0, 0x0, 0x8}}}}}}, &(0x7f0000000040)) 2018/05/15 08:25:34 executing program 0: clock_gettime(0xfffffffffffffff8, &(0x7f0000000000)) 2018/05/15 08:25:34 executing program 6: bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x10, 0x4, 0x4, 0x5, 0x0, 0x1}, 0x2c) bpf$MAP_CREATE(0x2, &(0x7f0000003000)={0x13, 0x0, 0x0, 0x0, 0x730000, 0x0}, 0x2c) 2018/05/15 08:25:34 executing program 2: syz_emit_ethernet(0x3e, &(0x7f00000001c0)={@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, @dev={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa]}, [], {@ipv6={0x86dd, {0x0, 0x6, "50a09c", 0x8, 0x0, 0x0, @remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3300000000000000], 0xbb}, @local={0xfe, 0x80, [], 0xaa}, {[], @udp={0x0, 0x0, 0x8}}}}}}, &(0x7f0000000040)) 2018/05/15 08:25:34 executing program 4: perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x5b6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 2018/05/15 08:25:34 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='.\x00', 0x80, 0x33) getsockopt$inet_sctp_SCTP_GET_PEER_ADDRS(0xffffffffffffffff, 0x84, 0x6c, &(0x7f0000000080)={0x0, 0x90, "49acac3207c07709dd30ee986503d525e6a429d7f5114522cc6737c7633dc2e2ba0bcea82dfe012aaf3d28cedab5a14f0ffdd74c9fd9cebeb93ac41cec76c2456946ca5236c2fa0d91eee9eb7af5d6708822b120cca1b8066071ca3e050952e4354ff14cfad37770040e3ffe686522b2ad76255ffd8b0d8a55d960d69f3a3a83f3aa4f26ff23a902fce01cc6612b490b"}, &(0x7f0000000140)=0x98) getsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(r0, 0x84, 0x1f, &(0x7f0000000180)={r1, @in={{0x2, 0x4e20, @multicast1=0xe0000001}}, 0x100, 0x9a}, &(0x7f0000000240)=0x90) r2 = syz_open_procfs(0x0, &(0x7f0000000280)='net/ptype\x00') sendfile(r2, r2, &(0x7f00000002c0)=0xffffffd, 0x8000000006) 2018/05/15 08:25:34 executing program 3: syz_emit_ethernet(0x3e, &(0x7f00000001c0)={@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, @dev={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa]}, [], {@ipv6={0x86dd, {0x0, 0x6, "50a09c", 0x8, 0xffffff87, 0x0, @remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0xe000000], 0xbb}, @local={0xfe, 0x80, [], 0xaa}, {[], @udp={0x0, 0x0, 0x8}}}}}}, &(0x7f0000000040)) 2018/05/15 08:25:34 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f0000000280)="6e65742f6970365f7461626c65735f6d61746368657300b6e23bcf6093cb57f8b4d285e9c48608549acee9a66f09d47a011dcc8f5af7870c6c1b6eebe85ebea4ecda4e44def87e8ee568c843daaf2805944012bc0144937e8b04411d09016ca07f7388ded591e346fb612397e79a6fe43e5c6a86bee1565b17b22b8ed5c95b4afbb3a620d1402c50bbaad790d0ffdb7c5a27e60423079f77bf") unlink(&(0x7f0000000080)='./file0\x00') sendfile(r0, r0, &(0x7f00000000c0), 0x2) ioctl$KDGKBMETA(r0, 0x4b62, &(0x7f0000000100)) getsockopt$inet_sctp_SCTP_PARTIAL_DELIVERY_POINT(r0, 0x84, 0x13, &(0x7f0000000140)={0x0, 0xfffffffffffffffa}, &(0x7f0000000180)=0x8) syslog(0x2, &(0x7f0000000cc0)=""/107, 0x6b) setsockopt$IP_VS_SO_SET_DEL(r0, 0x0, 0x484, &(0x7f0000000200)={0x87, @dev={0xac, 0x14, 0x14, 0x1a}, 0x4e24, 0x2, 'rr\x00', 0x3, 0x2, 0x66}, 0x2c) setsockopt$inet_sctp_SCTP_STREAM_SCHEDULER(r0, 0x84, 0x7b, &(0x7f00000001c0)={r1, 0x40ef2843}, 0x8) setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x40, &(0x7f0000000340)=ANY=[@ANYBLOB="73656375726974790000000000000000000000000000000000000000000000000e00000004000000f8030000fffffffff00000000000000000000000ffffffffffffffff600300006003000060030000ffffffff04000000", @ANYPTR=&(0x7f0000000d40)=ANY=[@ANYBLOB="000000000000000000000000002100ebe70048ca02fec408edfbaf31ba590218fdffffffffffd60000000000000000000000000000000000000000000000000021d13202a6d3d3de0000000000000000000000"], @ANYBLOB="00000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000c800f0000000000000000000000000000000000000000000000000003000616800000000000000000000000000000000000000000000000000000000f9ffffff7f000000010000000000000028005443504d5353000000000000000000000000000000000000000000000000740c0000000000007f000001ac14140dffffff00ffffffff6772653000000000000000000000000069703667726530000000000000000000000000000000000000000000ff0000000000000000000000000000000000000000000000000000000000ff0000000000000000000000000000007f0003010000000000000000000000000000b80018010000000000000000000000000000000000000000000000002000736f636b657400000000000000000000000000000000000000000000000060005345540000000000000000000000000000000000000000000000000000000100000000100000020000000000008e0a000000010400000800000000033f0002000000d4180000ff0700009c0a00001e62000000000000e1020000ff09010000000100ac1414aa000000ffff0000007465616d5f736c6176655f310000000069703667726574617030000000000000000000000000000000000000ff0000000000000000000000000000000000000000000000000000000000ff000000000000000000000000000000670001400000000000000000000000000000280158010000000000000000000000000000000000000000000000004000736574000000000000000000000000000000000000000000000000000000070000000100000008000000090000000000000000000000060000000307050050006f736600000000000000000000000000000000000000000000000000000073797a3100000000000000000000000000000000000000000000000000000000070000000200000002000000000000003000434f4e4e4d41524b00000000000000000000ffffffffffffffe5000000014000000009000000020000000300000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000700098000000000000000000000000000000000000000000280000000000000000000000000000000000000000000000000000000000000800ffffff00000000"], 0x458) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000000)='dctcp\x00', 0x6) 2018/05/15 08:25:34 executing program 7: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup(r0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000d40)=@broute={'broute\x00', 0x20, 0x4, 0x928, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000400], 0x0, &(0x7f0000000000), &(0x7f0000000400)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x2, [{{{0x5, 0x0, 0x0, 'bcsh0\x00', 'sit0\x00', 'syzkaller1\x00', 'veth0\x00', @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [], @dev={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa]}, [], 0x1d8, 0x228, 0x258, [@comment={'comment\x00', 0x100}, @owner={'owner\x00', 0x18}]}, [@common=@LED={'LED\x00', 0x28, {{'syz0\x00'}}}]}, @common=@redirect={'redirect\x00', 0x8}}, {{{0x11, 0x0, 0x0, 'veth1_to_bond\x00', 'erspan0\x00', 'bridge_slave_1\x00', 'veth0_to_bridge\x00', @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [], @random="cfa071dc33d9", [], 0x2e0, 0x2e0, 0x330, [@mac={'mac\x00', 0x10, {{@remote={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xbb}}}}, @bpf0={'bpf\x00', 0x210, {{0x0, [{}, {}, {}, {}, {0x10000, 0xfc0, 0x1, 0x6}, {0x4, 0x2, 0xcefa, 0x81}, {0x815, 0xc7, 0x8001, 0x6a0}, {0x40, 0x0, 0x9, 0x80000001}, {0xffffffffffffff53, 0x38a, 0x100000000, 0x7}, {0x5, 0x1, 0x1000, 0x10001}, {0x80000000, 0x7, 0x1, 0xf7}, {0x2, 0x9, 0x4c, 0x5}, {0xfffffffffffffff7, 0x0, 0xe74, 0x52a}, {0x1ff, 0x7, 0x3, 0x7}, {0x6, 0x1ff, 0x49, 0x7}, {0x8000, 0x0, 0x7, 0x684}, {0xffe, 0x988, 0x3, 0x1}, {0x7b, 0x5a07, 0x18, 0x7}, {0xfffffffffffffffe, 0xfff, 0x3, 0x178180a0}, {0x2, 0xc0, 0x6, 0x401}, {0x5, 0x3, 0x8, 0x8}, {0xffffffffffff0001, 0x3, 0xfffffffffffffff7, 0x5}, {0x1ff, 0x8001, 0x3}, {0x3, 0x9, 0xffffffff, 0x2}, {0x5, 0x4, 0x574, 0x64c}, {0x5, 0x4, 0x10001, 0x6}, {0x1, 0x5b2c, 0x3ff, 0x7}, {0xff, 0x2, 0x5, 0x62c5fc18}, {0x101, 0x7, 0x2, 0xfffffffffffffffd}, {0x7fff, 0x6, 0x8, 0x4}, {0x9, 0x0, 0x7, 0xff}, {0x4, 0x4, 0x4, 0x10000}, {0x59b0, 0xfff, 0x4, 0x4}, {0x1f, 0xfffffffffffffffd, 0x8001, 0x800}, {0x0, 0xffffffffffffffff, 0x2, 0x65}, {0x1ff, 0x1, 0x2, 0x7ff}, {0x4, 0x5, 0x1, 0x7be}, {0x9e4, 0x0, 0x7, 0x5}, {0x5, 0x8, 0x7f, 0xffffffff}, {0x4, 0x6, 0x5, 0x7ff}, {0x22aaaf52, 0x8f, 0x6, 0x10000}, {0x2, 0x7, 0xffff}, {0x5, 0xfffffffff016eb50, 0x82, 0x7}, {0x38, 0x800, 0x9a2a, 0xfffffffffffffffc}, {0x5, 0xb, 0x4, 0xfffffffffffff001}, {0x8b5, 0x81, 0x4, 0x2}, {0x8, 0xfffffffffffffff8, 0x1, 0x8}, {0x40, 0x4, 0x1, 0x100000001}, {0x9b, 0x5, 0x1, 0xd64c}, {0x100, 0x8, 0x7, 0x3ff}, {0xf11, 0x200, 0x7, 0x2}, {0xac5, 0x0, 0x3, 0x7}, {0x518, 0x1, 0x80}, {0x6, 0x7f, 0x6, 0x7298}, {0x7, 0x1, 0x2, 0x1ec9}, {0x400, 0x2, 0x6, 0x6c3}, {0x100000001, 0x6, 0x5, 0x9}, {0x8, 0x1dae, 0xfffffffffffffff8, 0x101}, {0x2, 0x7, 0x8, 0x3}, {0x0, 0x45b, 0x7, 0x72}, {0x100000001, 0xc00000000000, 0x100000001, 0x8}, {0x100000001, 0x0, 0xfffffffffffffffc, 0x3}, {0x95, 0x90b, 0x0, 0xfffffffffffff565}, {0x0, 0x4, 0x0, 0x2}], 0x40}}}]}}, @common=@IDLETIMER={'IDLETIMER\x00', 0x28, {{0x7f, 'syz0\x00'}}}}]}, {0x0, '\x00', 0x2, 0xfffffffffffffffc}, {0x0, '\x00', 0x2, 0xffffffffffffffff, 0x2, [{{{0x11, 0x40, 0x87df, 'irlan0\x00', 'sit0\x00', 'veth0_to_team\x00', 'ip6gretap0\x00', @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [0xff, 0xff, 0xff, 0xff, 0x0, 0xff], @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [0x0, 0xff, 0x0, 0xff], 0xb0, 0x210, 0x258, [@time={'time\x00', 0x18, {{0x1ff, 0x1, 0xe063, 0xb6c5, 0x2e80, 0x0, 0x2}}}]}, [@common=@redirect={'redirect\x00', 0x8, {{0xffffffffffffffff}}}, @common=@SECMARK={'SECMARK\x00', 0x108, {{0x1, 0x6, 'system_u:object_r:lost_found_t:s0\x00'}}}]}, @common=@ERROR={'ERROR\x00', 0x20, {"4323eed968d7072e70de82f41331fe3aed2aedc8f2fff16e54b1c4e2ad07"}}}, {{{0x5, 0x54, 0x888d, 'ip6gretap0\x00', 'teql0\x00', 'veth1_to_team\x00', 'erspan0\x00', @random="0eae55d5aac5", [0x0, 0xff, 0x0, 0xff, 0xff, 0xff], @empty, [0xff, 0xff, 0xff, 0x0, 0xff, 0xff], 0x70, 0x70, 0xb8}}, @common=@RATEEST={'RATEEST\x00', 0x20, {{'syz0\x00', 0x9, 0x1, 0x4}}}}]}]}, 0x9a0) 2018/05/15 08:25:34 executing program 2: syz_emit_ethernet(0x3e, &(0x7f00000001c0)={@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, @dev={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa]}, [], {@ipv6={0x86dd, {0x0, 0x6, "50a09c", 0x8, 0x0, 0x0, @remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x33000000], 0xbb}, @local={0xfe, 0x80, [], 0xaa}, {[], @udp={0x0, 0x0, 0x8}}}}}}, &(0x7f0000000040)) 2018/05/15 08:25:34 executing program 4: perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x5b6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 2018/05/15 08:25:34 executing program 6: bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x10, 0x4, 0x4, 0x5, 0x0, 0x1}, 0x2c) bpf$MAP_CREATE(0x2, &(0x7f0000003000)={0x13, 0x0, 0x0, 0x0, 0x730000, 0x0}, 0x2c) 2018/05/15 08:25:34 executing program 0: clock_gettime(0x0, &(0x7f0000000000)) 2018/05/15 08:25:34 executing program 5: r0 = syz_open_procfs(0x0, &(0x7f0000000180)="6e65742f70f468706500") sysfs$1(0x1, &(0x7f0000000100)='.systemposix_acl_access(securityselinux\x00') socket$rds(0x15, 0x5, 0x0) r1 = fcntl$getown(r0, 0x9) sched_setscheduler(r1, 0x6, &(0x7f0000000140)) sendfile(r0, r0, &(0x7f0000000000)=0xffffffd, 0x7fffffff) getpeername$llc(r0, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @dev}, &(0x7f0000000080)=0x2b1c0f77e8d28b44) getsockopt$kcm_KCM_RECV_DISABLE(r0, 0x119, 0x1, &(0x7f00000000c0), 0x4) 2018/05/15 08:25:34 executing program 3: syz_emit_ethernet(0x3e, &(0x7f00000001c0)={@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, @dev={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa]}, [], {@ipv6={0x86dd, {0x0, 0x6, "50a09c", 0x8, 0xffffff87, 0x0, @remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x2], 0xbb}, @local={0xfe, 0x80, [], 0xaa}, {[], @udp={0x0, 0x0, 0x8}}}}}}, &(0x7f0000000040)) 2018/05/15 08:25:34 executing program 7: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup(r0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000d40)=@broute={'broute\x00', 0x20, 0x4, 0x928, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000400], 0x0, &(0x7f0000000000), &(0x7f0000000400)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x2, [{{{0x5, 0x0, 0x0, 'bcsh0\x00', 'sit0\x00', 'syzkaller1\x00', 'veth0\x00', @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [], @dev={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa]}, [], 0x1d8, 0x228, 0x258, [@comment={'comment\x00', 0x100}, @owner={'owner\x00', 0x18}]}, [@common=@LED={'LED\x00', 0x28, {{'syz0\x00'}}}]}, @common=@redirect={'redirect\x00', 0x8}}, {{{0x11, 0x0, 0x0, 'veth1_to_bond\x00', 'erspan0\x00', 'bridge_slave_1\x00', 'veth0_to_bridge\x00', @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [], @random="cfa071dc33d9", [], 0x2e0, 0x2e0, 0x330, [@mac={'mac\x00', 0x10, {{@remote={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xbb}}}}, @bpf0={'bpf\x00', 0x210, {{0x0, [{}, {}, {}, {}, {0x0, 0xfc0, 0x1, 0x6}, {0x4, 0x2, 0xcefa, 0x81}, {0x815, 0xc7, 0x8001, 0x6a0}, {0x40, 0x0, 0x9, 0x80000001}, {0xffffffffffffff53, 0x38a, 0x100000000, 0x7}, {0x5, 0x1, 0x1000, 0x10001}, {0x80000000, 0x7, 0x1, 0xf7}, {0x2, 0x9, 0x4c, 0x5}, {0xfffffffffffffff7, 0x0, 0xe74, 0x52a}, {0x1ff, 0x7, 0x3, 0x7}, {0x6, 0x1ff, 0x49, 0x7}, {0x8000, 0x0, 0x7, 0x684}, {0xffe, 0x988, 0x3, 0x1}, {0x7b, 0x5a07, 0x18, 0x7}, {0xfffffffffffffffe, 0xfff, 0x3, 0x178180a0}, {0x2, 0xc0, 0x6, 0x401}, {0x5, 0x3, 0x8, 0x8}, {0xffffffffffff0001, 0x3, 0xfffffffffffffff7, 0x5}, {0x1ff, 0x8001, 0x3}, {0x3, 0x9, 0xffffffff, 0x2}, {0x5, 0x4, 0x574, 0x64c}, {0x5, 0x4, 0x10001, 0x6}, {0x1, 0x5b2c, 0x3ff, 0x7}, {0xff, 0x2, 0x5, 0x62c5fc18}, {0x101, 0x7, 0x2, 0xfffffffffffffffd}, {0x7fff, 0x6, 0x8, 0x4}, {0x9, 0x0, 0x7, 0xff}, {0x4, 0x4, 0x4, 0x10000}, {0x59b0, 0xfff, 0x4, 0x4}, {0x1f, 0xfffffffffffffffd, 0x8001, 0x800}, {0x0, 0xffffffffffffffff, 0x2, 0x65}, {0x1ff, 0x1, 0x2, 0x7ff}, {0x4, 0x5, 0x1, 0x7be}, {0x9e4, 0x0, 0x7, 0x5}, {0x5, 0x8, 0x7f, 0xffffffff}, {0x4, 0x6, 0x5, 0x7ff}, {0x22aaaf52, 0x8f, 0x6, 0x10000}, {0x2, 0x7, 0xffff}, {0x5, 0xfffffffff016eb50, 0x82, 0x7}, {0x38, 0x800, 0x9a2a, 0xfffffffffffffffc}, {0x5, 0xb, 0x4, 0xfffffffffffff001}, {0x8b5, 0x81, 0x4, 0x2}, {0x8, 0xfffffffffffffff8, 0x1, 0x8}, {0x40, 0x4, 0x1, 0x100000001}, {0x9b, 0x5, 0x1, 0xd64c}, {0x100, 0x8, 0x7, 0x3ff}, {0xf11, 0x200, 0x7, 0x2}, {0xac5, 0x0, 0x3, 0x7}, {0x518, 0x1, 0x80}, {0x6, 0x7f, 0x6, 0x7298}, {0x7, 0x1, 0x2, 0x1ec9}, {0x400, 0x2, 0x6, 0x6c3}, {0x100000001, 0x6, 0x5, 0x9}, {0x8, 0x1dae, 0xfffffffffffffff8, 0x101}, {0x2, 0x7, 0x8, 0x3}, {0x0, 0x45b, 0x7, 0x72}, {0x100000001, 0xc00000000000, 0x100000001, 0x8}, {0x100000001, 0x0, 0xfffffffffffffffc, 0x3}, {0x95, 0x90b, 0x0, 0xfffffffffffff565}, {0x0, 0x4, 0x0, 0x2}], 0x40}}}]}}, @common=@IDLETIMER={'IDLETIMER\x00', 0x28, {{0x7f, 'syz0\x00'}}}}]}, {0x0, '\x00', 0x2, 0xfffffffffffffffc}, {0x0, '\x00', 0x2, 0xffffffffffffffff, 0x2, [{{{0x11, 0x40, 0x87df, 'irlan0\x00', 'sit0\x00', 'veth0_to_team\x00', 'ip6gretap0\x00', @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [0xff, 0xff, 0xff, 0xff, 0x0, 0xff], @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [0x0, 0xff, 0x0, 0xff], 0xb0, 0x210, 0x258, [@time={'time\x00', 0x18, {{0x1ff, 0x1, 0xe063, 0xb6c5, 0x2e80, 0x0, 0x2}}}]}, [@common=@redirect={'redirect\x00', 0x8, {{0xffffffffffffffff}}}, @common=@SECMARK={'SECMARK\x00', 0x108, {{0x1, 0x6, 'system_u:object_r:lost_found_t:s0\x00'}}}]}, @common=@ERROR={'ERROR\x00', 0x20, {"4323eed968d7072e70de82f41331fe3aed2aedc8f2fff16e54b1c4e2ad07"}}}, {{{0x5, 0x54, 0x888d, 'ip6gretap0\x00', 'teql0\x00', 'veth1_to_team\x00', 'erspan0\x00', @random="0eae55d5aac5", [0x0, 0xff, 0x0, 0xff, 0xff, 0xff], @empty, [0xff, 0xff, 0xff, 0x0, 0xff, 0xff], 0x70, 0x70, 0xb8}}, @common=@RATEEST={'RATEEST\x00', 0x20, {{'syz0\x00', 0x9, 0x1, 0x4}}}}]}]}, 0x9a0) 2018/05/15 08:25:34 executing program 2: syz_emit_ethernet(0x3e, &(0x7f00000001c0)={@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, @dev={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa]}, [], {@ipv6={0x86dd, {0x0, 0x6, "50a09c", 0x8, 0x0, 0x0, @remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8100], 0xbb}, @local={0xfe, 0x80, [], 0xaa}, {[], @udp={0x0, 0x0, 0x8}}}}}}, &(0x7f0000000040)) 2018/05/15 08:25:34 executing program 6: bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x10, 0x4, 0x4, 0x5, 0x0, 0x1}, 0x2c) bpf$MAP_CREATE(0x2, &(0x7f0000003000)={0x13, 0x0, 0x77fffb, 0x0, 0x0, 0x0}, 0x2c) 2018/05/15 08:25:34 executing program 4: perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x5b6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 2018/05/15 08:25:35 executing program 0: clock_gettime(0x0, &(0x7f0000000000)) 2018/05/15 08:25:35 executing program 3: syz_emit_ethernet(0x3e, &(0x7f00000001c0)={@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, @dev={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa]}, [], {@ipv6={0x86dd, {0x0, 0x6, "50a09c", 0x8, 0xffffff87, 0x0, @remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x38], 0xbb}, @local={0xfe, 0x80, [], 0xaa}, {[], @udp={0x0, 0x0, 0x8}}}}}}, &(0x7f0000000040)) 2018/05/15 08:25:35 executing program 5: r0 = syz_open_procfs(0x0, &(0x7f0000000280)='cpuset\x00') sendfile(r0, r0, &(0x7f0000000000)=0xffffffd, 0x7fffffff) mq_getsetattr(r0, &(0x7f0000000040)={0x7, 0x6, 0x20, 0x3, 0x5, 0x200, 0xbb5a, 0x6}, &(0x7f0000000080)) 2018/05/15 08:25:35 executing program 7: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup(r0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000d40)=@broute={'broute\x00', 0x20, 0x4, 0x928, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000400], 0x0, &(0x7f0000000000), &(0x7f0000000400)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x2, [{{{0x5, 0x0, 0x0, 'bcsh0\x00', 'sit0\x00', 'syzkaller1\x00', 'veth0\x00', @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [], @dev={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa]}, [], 0x1d8, 0x228, 0x258, [@comment={'comment\x00', 0x100}, @owner={'owner\x00', 0x18}]}, [@common=@LED={'LED\x00', 0x28, {{'syz0\x00'}}}]}, @common=@redirect={'redirect\x00', 0x8}}, {{{0x11, 0x0, 0x0, 'veth1_to_bond\x00', 'erspan0\x00', 'bridge_slave_1\x00', 'veth0_to_bridge\x00', @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [], @random="cfa071dc33d9", [], 0x2e0, 0x2e0, 0x330, [@mac={'mac\x00', 0x10, {{@remote={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xbb}}}}, @bpf0={'bpf\x00', 0x210, {{0x0, [{}, {}, {}, {}, {0x0, 0x0, 0x1, 0x6}, {0x4, 0x2, 0xcefa, 0x81}, {0x815, 0xc7, 0x8001, 0x6a0}, {0x40, 0x0, 0x9, 0x80000001}, {0xffffffffffffff53, 0x38a, 0x100000000, 0x7}, {0x5, 0x1, 0x1000, 0x10001}, {0x80000000, 0x7, 0x1, 0xf7}, {0x2, 0x9, 0x4c, 0x5}, {0xfffffffffffffff7, 0x0, 0xe74, 0x52a}, {0x1ff, 0x7, 0x3, 0x7}, {0x6, 0x1ff, 0x49, 0x7}, {0x8000, 0x0, 0x7, 0x684}, {0xffe, 0x988, 0x3, 0x1}, {0x7b, 0x5a07, 0x18, 0x7}, {0xfffffffffffffffe, 0xfff, 0x3, 0x178180a0}, {0x2, 0xc0, 0x6, 0x401}, {0x5, 0x3, 0x8, 0x8}, {0xffffffffffff0001, 0x3, 0xfffffffffffffff7, 0x5}, {0x1ff, 0x8001, 0x3}, {0x3, 0x9, 0xffffffff, 0x2}, {0x5, 0x4, 0x574, 0x64c}, {0x5, 0x4, 0x10001, 0x6}, {0x1, 0x5b2c, 0x3ff, 0x7}, {0xff, 0x2, 0x5, 0x62c5fc18}, {0x101, 0x7, 0x2, 0xfffffffffffffffd}, {0x7fff, 0x6, 0x8, 0x4}, {0x9, 0x0, 0x7, 0xff}, {0x4, 0x4, 0x4, 0x10000}, {0x59b0, 0xfff, 0x4, 0x4}, {0x1f, 0xfffffffffffffffd, 0x8001, 0x800}, {0x0, 0xffffffffffffffff, 0x2, 0x65}, {0x1ff, 0x1, 0x2, 0x7ff}, {0x4, 0x5, 0x1, 0x7be}, {0x9e4, 0x0, 0x7, 0x5}, {0x5, 0x8, 0x7f, 0xffffffff}, {0x4, 0x6, 0x5, 0x7ff}, {0x22aaaf52, 0x8f, 0x6, 0x10000}, {0x2, 0x7, 0xffff}, {0x5, 0xfffffffff016eb50, 0x82, 0x7}, {0x38, 0x800, 0x9a2a, 0xfffffffffffffffc}, {0x5, 0xb, 0x4, 0xfffffffffffff001}, {0x8b5, 0x81, 0x4, 0x2}, {0x8, 0xfffffffffffffff8, 0x1, 0x8}, {0x40, 0x4, 0x1, 0x100000001}, {0x9b, 0x5, 0x1, 0xd64c}, {0x100, 0x8, 0x7, 0x3ff}, {0xf11, 0x200, 0x7, 0x2}, {0xac5, 0x0, 0x3, 0x7}, {0x518, 0x1, 0x80}, {0x6, 0x7f, 0x6, 0x7298}, {0x7, 0x1, 0x2, 0x1ec9}, {0x400, 0x2, 0x6, 0x6c3}, {0x100000001, 0x6, 0x5, 0x9}, {0x8, 0x1dae, 0xfffffffffffffff8, 0x101}, {0x2, 0x7, 0x8, 0x3}, {0x0, 0x45b, 0x7, 0x72}, {0x100000001, 0xc00000000000, 0x100000001, 0x8}, {0x100000001, 0x0, 0xfffffffffffffffc, 0x3}, {0x95, 0x90b, 0x0, 0xfffffffffffff565}, {0x0, 0x4, 0x0, 0x2}], 0x40}}}]}}, @common=@IDLETIMER={'IDLETIMER\x00', 0x28, {{0x7f, 'syz0\x00'}}}}]}, {0x0, '\x00', 0x2, 0xfffffffffffffffc}, {0x0, '\x00', 0x2, 0xffffffffffffffff, 0x2, [{{{0x11, 0x40, 0x87df, 'irlan0\x00', 'sit0\x00', 'veth0_to_team\x00', 'ip6gretap0\x00', @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [0xff, 0xff, 0xff, 0xff, 0x0, 0xff], @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [0x0, 0xff, 0x0, 0xff], 0xb0, 0x210, 0x258, [@time={'time\x00', 0x18, {{0x1ff, 0x1, 0xe063, 0xb6c5, 0x2e80, 0x0, 0x2}}}]}, [@common=@redirect={'redirect\x00', 0x8, {{0xffffffffffffffff}}}, @common=@SECMARK={'SECMARK\x00', 0x108, {{0x1, 0x6, 'system_u:object_r:lost_found_t:s0\x00'}}}]}, @common=@ERROR={'ERROR\x00', 0x20, {"4323eed968d7072e70de82f41331fe3aed2aedc8f2fff16e54b1c4e2ad07"}}}, {{{0x5, 0x54, 0x888d, 'ip6gretap0\x00', 'teql0\x00', 'veth1_to_team\x00', 'erspan0\x00', @random="0eae55d5aac5", [0x0, 0xff, 0x0, 0xff, 0xff, 0xff], @empty, [0xff, 0xff, 0xff, 0x0, 0xff, 0xff], 0x70, 0x70, 0xb8}}, @common=@RATEEST={'RATEEST\x00', 0x20, {{'syz0\x00', 0x9, 0x1, 0x4}}}}]}]}, 0x9a0) 2018/05/15 08:25:35 executing program 4: perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x5b6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 2018/05/15 08:25:35 executing program 6: bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x10, 0x4, 0x4, 0x5, 0x0, 0x1}, 0x2c) bpf$MAP_CREATE(0x2, &(0x7f0000003000)={0x13, 0x0, 0x77fffb, 0x0, 0x0, 0x0}, 0x2c) 2018/05/15 08:25:35 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f0000000280)="6e65742f6970365f7461626c65735f6d61746368657300b6e23bcf6093cb57f8b4d285e9c48608549acee9a66f09d47a011dcc8f5af7870c6c1b6eebe85ebea4ecda4e44def87e8ee568c843daaf2805944012bc0144937e8b04411d09016ca07f7388ded591e346fb612397e79a6fe43e5c6a86bee1565b17b22b8ed5c95b4afbb3a620d1402c50bbaad790d0ffdb7c5a27e60423079f77bf") unlink(&(0x7f0000000080)='./file0\x00') sendfile(r0, r0, &(0x7f00000000c0), 0x2) ioctl$KDGKBMETA(r0, 0x4b62, &(0x7f0000000100)) getsockopt$inet_sctp_SCTP_PARTIAL_DELIVERY_POINT(r0, 0x84, 0x13, &(0x7f0000000140)={0x0, 0xfffffffffffffffa}, &(0x7f0000000180)=0x8) syslog(0x2, &(0x7f0000000cc0)=""/107, 0x6b) setsockopt$IP_VS_SO_SET_DEL(r0, 0x0, 0x484, &(0x7f0000000200)={0x87, @dev={0xac, 0x14, 0x14, 0x1a}, 0x4e24, 0x2, 'rr\x00', 0x3, 0x2, 0x66}, 0x2c) setsockopt$inet_sctp_SCTP_STREAM_SCHEDULER(r0, 0x84, 0x7b, &(0x7f00000001c0)={r1, 0x40ef2843}, 0x8) setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x40, &(0x7f0000000340)=ANY=[@ANYBLOB="73656375726974790000000000000000000000000000000000000000000000000e00000004000000f8030000fffffffff00000000000000000000000ffffffffffffffff600300006003000060030000ffffffff04000000", @ANYPTR=&(0x7f0000000d40)=ANY=[@ANYBLOB="000000000000000000000000002100ebe70048ca02fec408edfbaf31ba590218fdffffffffffd60000000000000000000000000000000000000000000000000021d13202a6d3d3de0000000000000000000000"], @ANYBLOB="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"], 0x458) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000000)='dctcp\x00', 0x6) 2018/05/15 08:25:35 executing program 2: syz_emit_ethernet(0x3e, &(0x7f00000001c0)={@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, @dev={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa]}, [], {@ipv6={0x86dd, {0x0, 0x6, "50a09c", 0x8, 0x0, 0x0, @remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x11], 0xbb}, @local={0xfe, 0x80, [], 0xaa}, {[], @udp={0x0, 0x0, 0x8}}}}}}, &(0x7f0000000040)) 2018/05/15 08:25:35 executing program 4: perf_event_open(&(0x7f000001d000)={0x2, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 2018/05/15 08:25:35 executing program 2: syz_emit_ethernet(0x3e, &(0x7f00000001c0)={@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, @dev={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa]}, [], {@ipv6={0x86dd, {0x0, 0x6, "50a09c", 0x8, 0x0, 0x0, @remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6488], 0xbb}, @local={0xfe, 0x80, [], 0xaa}, {[], @udp={0x0, 0x0, 0x8}}}}}}, &(0x7f0000000040)) 2018/05/15 08:25:35 executing program 0: clock_gettime(0x0, &(0x7f0000000000)) 2018/05/15 08:25:35 executing program 3: syz_emit_ethernet(0x3e, &(0x7f00000001c0)={@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, @dev={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa]}, [], {@ipv6={0x86dd, {0x0, 0x6, "50a09c", 0x8, 0xffffff87, 0x0, @remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x80040200], 0xbb}, @local={0xfe, 0x80, [], 0xaa}, {[], @udp={0x0, 0x0, 0x8}}}}}}, &(0x7f0000000040)) 2018/05/15 08:25:35 executing program 6: bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x10, 0x4, 0x4, 0x5, 0x0, 0x1}, 0x2c) bpf$MAP_CREATE(0x2, &(0x7f0000003000)={0x13, 0x0, 0x77fffb, 0x0, 0x0, 0x0}, 0x2c) 2018/05/15 08:25:35 executing program 5: r0 = syz_open_procfs(0x0, &(0x7f0000000280)='net/ptype\x00') ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x2400, 0x6) sendfile(r0, r0, &(0x7f0000000000)=0xffffffd, 0x7fffffff) 2018/05/15 08:25:35 executing program 7: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup(r0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000d40)=@broute={'broute\x00', 0x20, 0x4, 0x928, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000400], 0x0, &(0x7f0000000000), &(0x7f0000000400)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x2, [{{{0x5, 0x0, 0x0, 'bcsh0\x00', 'sit0\x00', 'syzkaller1\x00', 'veth0\x00', @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [], @dev={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa]}, [], 0x1d8, 0x228, 0x258, [@comment={'comment\x00', 0x100}, @owner={'owner\x00', 0x18}]}, [@common=@LED={'LED\x00', 0x28, {{'syz0\x00'}}}]}, @common=@redirect={'redirect\x00', 0x8}}, {{{0x11, 0x0, 0x0, 'veth1_to_bond\x00', 'erspan0\x00', 'bridge_slave_1\x00', 'veth0_to_bridge\x00', @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [], @random="cfa071dc33d9", [], 0x2e0, 0x2e0, 0x330, [@mac={'mac\x00', 0x10, {{@remote={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xbb}}}}, @bpf0={'bpf\x00', 0x210, {{0x0, [{}, {}, {}, {}, {0x0, 0x0, 0x0, 0x6}, {0x4, 0x2, 0xcefa, 0x81}, {0x815, 0xc7, 0x8001, 0x6a0}, {0x40, 0x0, 0x9, 0x80000001}, {0xffffffffffffff53, 0x38a, 0x100000000, 0x7}, {0x5, 0x1, 0x1000, 0x10001}, {0x80000000, 0x7, 0x1, 0xf7}, {0x2, 0x9, 0x4c, 0x5}, {0xfffffffffffffff7, 0x0, 0xe74, 0x52a}, {0x1ff, 0x7, 0x3, 0x7}, {0x6, 0x1ff, 0x49, 0x7}, {0x8000, 0x0, 0x7, 0x684}, {0xffe, 0x988, 0x3, 0x1}, {0x7b, 0x5a07, 0x18, 0x7}, {0xfffffffffffffffe, 0xfff, 0x3, 0x178180a0}, {0x2, 0xc0, 0x6, 0x401}, {0x5, 0x3, 0x8, 0x8}, {0xffffffffffff0001, 0x3, 0xfffffffffffffff7, 0x5}, {0x1ff, 0x8001, 0x3}, {0x3, 0x9, 0xffffffff, 0x2}, {0x5, 0x4, 0x574, 0x64c}, {0x5, 0x4, 0x10001, 0x6}, {0x1, 0x5b2c, 0x3ff, 0x7}, {0xff, 0x2, 0x5, 0x62c5fc18}, {0x101, 0x7, 0x2, 0xfffffffffffffffd}, {0x7fff, 0x6, 0x8, 0x4}, {0x9, 0x0, 0x7, 0xff}, {0x4, 0x4, 0x4, 0x10000}, {0x59b0, 0xfff, 0x4, 0x4}, {0x1f, 0xfffffffffffffffd, 0x8001, 0x800}, {0x0, 0xffffffffffffffff, 0x2, 0x65}, {0x1ff, 0x1, 0x2, 0x7ff}, {0x4, 0x5, 0x1, 0x7be}, {0x9e4, 0x0, 0x7, 0x5}, {0x5, 0x8, 0x7f, 0xffffffff}, {0x4, 0x6, 0x5, 0x7ff}, {0x22aaaf52, 0x8f, 0x6, 0x10000}, {0x2, 0x7, 0xffff}, {0x5, 0xfffffffff016eb50, 0x82, 0x7}, {0x38, 0x800, 0x9a2a, 0xfffffffffffffffc}, {0x5, 0xb, 0x4, 0xfffffffffffff001}, {0x8b5, 0x81, 0x4, 0x2}, {0x8, 0xfffffffffffffff8, 0x1, 0x8}, {0x40, 0x4, 0x1, 0x100000001}, {0x9b, 0x5, 0x1, 0xd64c}, {0x100, 0x8, 0x7, 0x3ff}, {0xf11, 0x200, 0x7, 0x2}, {0xac5, 0x0, 0x3, 0x7}, {0x518, 0x1, 0x80}, {0x6, 0x7f, 0x6, 0x7298}, {0x7, 0x1, 0x2, 0x1ec9}, {0x400, 0x2, 0x6, 0x6c3}, {0x100000001, 0x6, 0x5, 0x9}, {0x8, 0x1dae, 0xfffffffffffffff8, 0x101}, {0x2, 0x7, 0x8, 0x3}, {0x0, 0x45b, 0x7, 0x72}, {0x100000001, 0xc00000000000, 0x100000001, 0x8}, {0x100000001, 0x0, 0xfffffffffffffffc, 0x3}, {0x95, 0x90b, 0x0, 0xfffffffffffff565}, {0x0, 0x4, 0x0, 0x2}], 0x40}}}]}}, @common=@IDLETIMER={'IDLETIMER\x00', 0x28, {{0x7f, 'syz0\x00'}}}}]}, {0x0, '\x00', 0x2, 0xfffffffffffffffc}, {0x0, '\x00', 0x2, 0xffffffffffffffff, 0x2, [{{{0x11, 0x40, 0x87df, 'irlan0\x00', 'sit0\x00', 'veth0_to_team\x00', 'ip6gretap0\x00', @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [0xff, 0xff, 0xff, 0xff, 0x0, 0xff], @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [0x0, 0xff, 0x0, 0xff], 0xb0, 0x210, 0x258, [@time={'time\x00', 0x18, {{0x1ff, 0x1, 0xe063, 0xb6c5, 0x2e80, 0x0, 0x2}}}]}, [@common=@redirect={'redirect\x00', 0x8, {{0xffffffffffffffff}}}, @common=@SECMARK={'SECMARK\x00', 0x108, {{0x1, 0x6, 'system_u:object_r:lost_found_t:s0\x00'}}}]}, @common=@ERROR={'ERROR\x00', 0x20, {"4323eed968d7072e70de82f41331fe3aed2aedc8f2fff16e54b1c4e2ad07"}}}, {{{0x5, 0x54, 0x888d, 'ip6gretap0\x00', 'teql0\x00', 'veth1_to_team\x00', 'erspan0\x00', @random="0eae55d5aac5", [0x0, 0xff, 0x0, 0xff, 0xff, 0xff], @empty, [0xff, 0xff, 0xff, 0x0, 0xff, 0xff], 0x70, 0x70, 0xb8}}, @common=@RATEEST={'RATEEST\x00', 0x20, {{'syz0\x00', 0x9, 0x1, 0x4}}}}]}]}, 0x9a0) 2018/05/15 08:25:36 executing program 2: syz_emit_ethernet(0x3e, &(0x7f00000001c0)={@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, @dev={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa]}, [], {@ipv6={0x86dd, {0x0, 0x6, "50a09c", 0x8, 0x0, 0x0, @remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfeffffff], 0xbb}, @local={0xfe, 0x80, [], 0xaa}, {[], @udp={0x0, 0x0, 0x8}}}}}}, &(0x7f0000000040)) 2018/05/15 08:25:36 executing program 5: r0 = syz_open_procfs(0x0, &(0x7f0000000280)='net/ptype\x00') sendfile(r0, r0, &(0x7f0000000000)=0xffffffd, 0x7fffffff) ioctl$UFFDIO_COPY(r0, 0xc028aa03, &(0x7f0000000040)={&(0x7f0000ffa000/0x3000)=nil, 0x3000}) ioctl$VHOST_GET_VRING_BASE(r0, 0xc008af12, &(0x7f0000000100)) getsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(r0, 0x84, 0x72, &(0x7f0000000080)={0x0, 0xa1, 0x10}, &(0x7f00000000c0)=0xc) setsockopt$inet_sctp_SCTP_AUTH_DEACTIVATE_KEY(r0, 0x84, 0x23, &(0x7f0000000140)={r1, 0x7ff}, 0x8) 2018/05/15 08:25:36 executing program 6: pipe(&(0x7f0000000100)={0xffffffffffffffff}) vmsplice(r0, &(0x7f00000000c0)=[{&(0x7f0000000140)="af", 0x1}], 0x1, 0x2) 2018/05/15 08:25:36 executing program 4: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) setsockopt$inet_sctp6_SCTP_MAXSEG(r0, 0x84, 0xd, &(0x7f0000000080)=@assoc_value={0x0, 0x1bc}, 0x8) getsockopt$inet_sctp6_SCTP_MAXSEG(r0, 0x84, 0xd, &(0x7f0000000000)=@assoc_id=0x0, &(0x7f0000000040)=0x4) getsockopt$inet_sctp6_SCTP_GET_LOCAL_ADDRS(r0, 0x84, 0x6d, &(0x7f0000007780)={r1}, &(0x7f00000077c0)=0x8) 2018/05/15 08:25:36 executing program 0: pselect6(0x6, &(0x7f0000000000), &(0x7f0000000040), &(0x7f0000000200)={0x6}, &(0x7f0000000100)={0x0, 0x989680}, &(0x7f0000000180)={&(0x7f0000000140), 0x8}) 2018/05/15 08:25:36 executing program 3: syz_emit_ethernet(0x3e, &(0x7f00000001c0)={@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, @dev={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa]}, [], {@ipv6={0x86dd, {0x0, 0x6, "50a09c", 0x8, 0xffffff87, 0x0, @remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x30000000], 0xbb}, @local={0xfe, 0x80, [], 0xaa}, {[], @udp={0x0, 0x0, 0x8}}}}}}, &(0x7f0000000040)) 2018/05/15 08:25:36 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f0000000280)="6e65742f6970365f7461626c65735f6d61746368657300b6e23bcf6093cb57f8b4d285e9c48608549acee9a66f09d47a011dcc8f5af7870c6c1b6eebe85ebea4ecda4e44def87e8ee568c843daaf2805944012bc0144937e8b04411d09016ca07f7388ded591e346fb612397e79a6fe43e5c6a86bee1565b17b22b8ed5c95b4afbb3a620d1402c50bbaad790d0ffdb7c5a27e60423079f77bf") unlink(&(0x7f0000000080)='./file0\x00') sendfile(r0, r0, &(0x7f00000000c0)=0x10000000, 0x0) ioctl$KDGKBMETA(r0, 0x4b62, &(0x7f0000000100)) getsockopt$inet_sctp_SCTP_PARTIAL_DELIVERY_POINT(r0, 0x84, 0x13, &(0x7f0000000140)={0x0, 0xfffffffffffffffa}, &(0x7f0000000180)=0x8) syslog(0x2, &(0x7f0000000cc0)=""/107, 0x6b) setsockopt$IP_VS_SO_SET_DEL(r0, 0x0, 0x484, &(0x7f0000000200)={0x87, @dev={0xac, 0x14, 0x14, 0x1a}, 0x4e24, 0x2, 'rr\x00', 0x3, 0x2, 0x66}, 0x2c) setsockopt$inet_sctp_SCTP_STREAM_SCHEDULER(r0, 0x84, 0x7b, &(0x7f00000001c0)={r1, 0x40ef2843}, 0x8) setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x40, &(0x7f0000000340)=ANY=[@ANYBLOB="73656375726974790000000000000000000000000000000000000000000000000e00000004000000f8030000fffffffff00000000000000000000000ffffffffffffffff600300006003000060030000ffffffff04000000", @ANYPTR=&(0x7f0000000d40)=ANY=[@ANYBLOB="000000000000000000000000002100ebe70048ca02fec408edfbaf31ba590218fdffffffffffd60000000000000000000000000000000000000000000000000021d13202a6d3d3de0000000000000000000000"], @ANYBLOB="00000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000c800f0000000000000000000000000000000000000000000000000003000616800000000000000000000000000000000000000000000000000000000f9ffffff7f000000010000000000000028005443504d5353000000000000000000000000000000000000000000000000740c0000000000007f000001ac14140dffffff00ffffffff6772653000000000000000000000000069703667726530000000000000000000000000000000000000000000ff0000000000000000000000000000000000000000000000000000000000ff0000000000000000000000000000007f0003010000000000000000000000000000b80018010000000000000000000000000000000000000000000000002000736f636b657400000000000000000000000000000000000000000000000060005345540000000000000000000000000000000000000000000000000000000100000000100000020000000000008e0a000000010400000800000000033f0002000000d4180000ff0700009c0a00001e62000000000000e1020000ff09010000000100ac1414aa000000ffff0000007465616d5f736c6176655f310000000069703667726574617030000000000000000000000000000000000000ff0000000000000000000000000000000000000000000000000000000000ff000000000000000000000000000000670001400000000000000000000000000000280158010000000000000000000000000000000000000000000000004000736574000000000000000000000000000000000000000000000000000000070000000100000008000000090000000000000000000000060000000307050050006f736600000000000000000000000000000000000000000000000000000073797a3100000000000000000000000000000000000000000000000000000000070000000200000002000000000000003000434f4e4e4d41524b00000000000000000000ffffffffffffffe5000000014000000009000000020000000300000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000700098000000000000000000000000000000000000000000280000000000000000000000000000000000000000000000000000000000000800ffffff00000000"], 0x458) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000000)='dctcp\x00', 0x6) 2018/05/15 08:25:36 executing program 7: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup(r0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000d40)=@broute={'broute\x00', 0x20, 0x4, 0x928, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000400], 0x0, &(0x7f0000000000), &(0x7f0000000400)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x2, [{{{0x5, 0x0, 0x0, 'bcsh0\x00', 'sit0\x00', 'syzkaller1\x00', 'veth0\x00', @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [], @dev={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa]}, [], 0x1d8, 0x228, 0x258, [@comment={'comment\x00', 0x100}, @owner={'owner\x00', 0x18}]}, [@common=@LED={'LED\x00', 0x28, {{'syz0\x00'}}}]}, @common=@redirect={'redirect\x00', 0x8}}, {{{0x11, 0x0, 0x0, 'veth1_to_bond\x00', 'erspan0\x00', 'bridge_slave_1\x00', 'veth0_to_bridge\x00', @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [], @random="cfa071dc33d9", [], 0x2e0, 0x2e0, 0x330, [@mac={'mac\x00', 0x10, {{@remote={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xbb}}}}, @bpf0={'bpf\x00', 0x210, {{0x0, [{}, {}, {}, {}, {}, {0x4, 0x2, 0xcefa, 0x81}, {0x815, 0xc7, 0x8001, 0x6a0}, {0x40, 0x0, 0x9, 0x80000001}, {0xffffffffffffff53, 0x38a, 0x100000000, 0x7}, {0x5, 0x1, 0x1000, 0x10001}, {0x80000000, 0x7, 0x1, 0xf7}, {0x2, 0x9, 0x4c, 0x5}, {0xfffffffffffffff7, 0x0, 0xe74, 0x52a}, {0x1ff, 0x7, 0x3, 0x7}, {0x6, 0x1ff, 0x49, 0x7}, {0x8000, 0x0, 0x7, 0x684}, {0xffe, 0x988, 0x3, 0x1}, {0x7b, 0x5a07, 0x18, 0x7}, {0xfffffffffffffffe, 0xfff, 0x3, 0x178180a0}, {0x2, 0xc0, 0x6, 0x401}, {0x5, 0x3, 0x8, 0x8}, {0xffffffffffff0001, 0x3, 0xfffffffffffffff7, 0x5}, {0x1ff, 0x8001, 0x3}, {0x3, 0x9, 0xffffffff, 0x2}, {0x5, 0x4, 0x574, 0x64c}, {0x5, 0x4, 0x10001, 0x6}, {0x1, 0x5b2c, 0x3ff, 0x7}, {0xff, 0x2, 0x5, 0x62c5fc18}, {0x101, 0x7, 0x2, 0xfffffffffffffffd}, {0x7fff, 0x6, 0x8, 0x4}, {0x9, 0x0, 0x7, 0xff}, {0x4, 0x4, 0x4, 0x10000}, {0x59b0, 0xfff, 0x4, 0x4}, {0x1f, 0xfffffffffffffffd, 0x8001, 0x800}, {0x0, 0xffffffffffffffff, 0x2, 0x65}, {0x1ff, 0x1, 0x2, 0x7ff}, {0x4, 0x5, 0x1, 0x7be}, {0x9e4, 0x0, 0x7, 0x5}, {0x5, 0x8, 0x7f, 0xffffffff}, {0x4, 0x6, 0x5, 0x7ff}, {0x22aaaf52, 0x8f, 0x6, 0x10000}, {0x2, 0x7, 0xffff}, {0x5, 0xfffffffff016eb50, 0x82, 0x7}, {0x38, 0x800, 0x9a2a, 0xfffffffffffffffc}, {0x5, 0xb, 0x4, 0xfffffffffffff001}, {0x8b5, 0x81, 0x4, 0x2}, {0x8, 0xfffffffffffffff8, 0x1, 0x8}, {0x40, 0x4, 0x1, 0x100000001}, {0x9b, 0x5, 0x1, 0xd64c}, {0x100, 0x8, 0x7, 0x3ff}, {0xf11, 0x200, 0x7, 0x2}, {0xac5, 0x0, 0x3, 0x7}, {0x518, 0x1, 0x80}, {0x6, 0x7f, 0x6, 0x7298}, {0x7, 0x1, 0x2, 0x1ec9}, {0x400, 0x2, 0x6, 0x6c3}, {0x100000001, 0x6, 0x5, 0x9}, {0x8, 0x1dae, 0xfffffffffffffff8, 0x101}, {0x2, 0x7, 0x8, 0x3}, {0x0, 0x45b, 0x7, 0x72}, {0x100000001, 0xc00000000000, 0x100000001, 0x8}, {0x100000001, 0x0, 0xfffffffffffffffc, 0x3}, {0x95, 0x90b, 0x0, 0xfffffffffffff565}, {0x0, 0x4, 0x0, 0x2}], 0x40}}}]}}, @common=@IDLETIMER={'IDLETIMER\x00', 0x28, {{0x7f, 'syz0\x00'}}}}]}, {0x0, '\x00', 0x2, 0xfffffffffffffffc}, {0x0, '\x00', 0x2, 0xffffffffffffffff, 0x2, [{{{0x11, 0x40, 0x87df, 'irlan0\x00', 'sit0\x00', 'veth0_to_team\x00', 'ip6gretap0\x00', @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [0xff, 0xff, 0xff, 0xff, 0x0, 0xff], @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [0x0, 0xff, 0x0, 0xff], 0xb0, 0x210, 0x258, [@time={'time\x00', 0x18, {{0x1ff, 0x1, 0xe063, 0xb6c5, 0x2e80, 0x0, 0x2}}}]}, [@common=@redirect={'redirect\x00', 0x8, {{0xffffffffffffffff}}}, @common=@SECMARK={'SECMARK\x00', 0x108, {{0x1, 0x6, 'system_u:object_r:lost_found_t:s0\x00'}}}]}, @common=@ERROR={'ERROR\x00', 0x20, {"4323eed968d7072e70de82f41331fe3aed2aedc8f2fff16e54b1c4e2ad07"}}}, {{{0x5, 0x54, 0x888d, 'ip6gretap0\x00', 'teql0\x00', 'veth1_to_team\x00', 'erspan0\x00', @random="0eae55d5aac5", [0x0, 0xff, 0x0, 0xff, 0xff, 0xff], @empty, [0xff, 0xff, 0xff, 0x0, 0xff, 0xff], 0x70, 0x70, 0xb8}}, @common=@RATEEST={'RATEEST\x00', 0x20, {{'syz0\x00', 0x9, 0x1, 0x4}}}}]}]}, 0x9a0) 2018/05/15 08:25:36 executing program 2: syz_emit_ethernet(0x3e, &(0x7f00000001c0)={@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, @dev={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa]}, [], {@ipv6={0x86dd, {0x0, 0x6, "50a09c", 0x8, 0x0, 0x0, @remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x88ffffff], 0xbb}, @local={0xfe, 0x80, [], 0xaa}, {[], @udp={0x0, 0x0, 0x8}}}}}}, &(0x7f0000000040)) [ 466.755470] sctp: [Deprecated]: syz-executor4 (pid 16393) Use of int in maxseg socket option. [ 466.755470] Use struct sctp_assoc_value instead 2018/05/15 08:25:36 executing program 6: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) setsockopt$inet_sctp6_SCTP_MAXSEG(r0, 0x84, 0xd, &(0x7f0000000080)=@assoc_value={0x0, 0x1bc}, 0x8) getsockopt$inet_sctp6_SCTP_MAXSEG(r0, 0x84, 0xd, &(0x7f0000000000)=@assoc_id=0x0, &(0x7f0000000040)=0x4) getsockopt$inet_sctp6_SCTP_RTOINFO(r0, 0x84, 0x0, &(0x7f00000000c0)={r1}, &(0x7f0000000100)=0x10) 2018/05/15 08:25:36 executing program 3: syz_emit_ethernet(0x3e, &(0x7f00000001c0)={@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, @dev={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa]}, [], {@ipv6={0x86dd, {0x0, 0x6, "50a09c", 0x8, 0xffffff87, 0x0, @remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x3], 0xbb}, @local={0xfe, 0x80, [], 0xaa}, {[], @udp={0x0, 0x0, 0x8}}}}}}, &(0x7f0000000040)) 2018/05/15 08:25:36 executing program 5: r0 = syz_open_procfs(0x0, &(0x7f0000000040)='net/netfilter\x00') sendfile(r0, r0, &(0x7f0000000080), 0x7ffffffb) 2018/05/15 08:25:36 executing program 7: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup(r0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000d40)=@broute={'broute\x00', 0x20, 0x4, 0x928, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000400], 0x0, &(0x7f0000000000), &(0x7f0000000400)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x2, [{{{0x5, 0x0, 0x0, 'bcsh0\x00', 'sit0\x00', 'syzkaller1\x00', 'veth0\x00', @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [], @dev={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa]}, [], 0x1d8, 0x228, 0x258, [@comment={'comment\x00', 0x100}, @owner={'owner\x00', 0x18}]}, [@common=@LED={'LED\x00', 0x28, {{'syz0\x00'}}}]}, @common=@redirect={'redirect\x00', 0x8}}, {{{0x11, 0x0, 0x0, 'veth1_to_bond\x00', 'erspan0\x00', 'bridge_slave_1\x00', 'veth0_to_bridge\x00', @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [], @random="cfa071dc33d9", [], 0x2e0, 0x2e0, 0x330, [@mac={'mac\x00', 0x10, {{@remote={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xbb}}}}, @bpf0={'bpf\x00', 0x210, {{0x0, [{}, {}, {}, {}, {}, {0x0, 0x2, 0xcefa, 0x81}, {0x815, 0xc7, 0x8001, 0x6a0}, {0x40, 0x0, 0x9, 0x80000001}, {0xffffffffffffff53, 0x38a, 0x100000000, 0x7}, {0x5, 0x1, 0x1000, 0x10001}, {0x80000000, 0x7, 0x1, 0xf7}, {0x2, 0x9, 0x4c, 0x5}, {0xfffffffffffffff7, 0x0, 0xe74, 0x52a}, {0x1ff, 0x7, 0x3, 0x7}, {0x6, 0x1ff, 0x49, 0x7}, {0x8000, 0x0, 0x7, 0x684}, {0xffe, 0x988, 0x3, 0x1}, {0x7b, 0x5a07, 0x18, 0x7}, {0xfffffffffffffffe, 0xfff, 0x3, 0x178180a0}, {0x2, 0xc0, 0x6, 0x401}, {0x5, 0x3, 0x8, 0x8}, {0xffffffffffff0001, 0x3, 0xfffffffffffffff7, 0x5}, {0x1ff, 0x8001, 0x3}, {0x3, 0x9, 0xffffffff, 0x2}, {0x5, 0x4, 0x574, 0x64c}, {0x5, 0x4, 0x10001, 0x6}, {0x1, 0x5b2c, 0x3ff, 0x7}, {0xff, 0x2, 0x5, 0x62c5fc18}, {0x101, 0x7, 0x2, 0xfffffffffffffffd}, {0x7fff, 0x6, 0x8, 0x4}, {0x9, 0x0, 0x7, 0xff}, {0x4, 0x4, 0x4, 0x10000}, {0x59b0, 0xfff, 0x4, 0x4}, {0x1f, 0xfffffffffffffffd, 0x8001, 0x800}, {0x0, 0xffffffffffffffff, 0x2, 0x65}, {0x1ff, 0x1, 0x2, 0x7ff}, {0x4, 0x5, 0x1, 0x7be}, {0x9e4, 0x0, 0x7, 0x5}, {0x5, 0x8, 0x7f, 0xffffffff}, {0x4, 0x6, 0x5, 0x7ff}, {0x22aaaf52, 0x8f, 0x6, 0x10000}, {0x2, 0x7, 0xffff}, {0x5, 0xfffffffff016eb50, 0x82, 0x7}, {0x38, 0x800, 0x9a2a, 0xfffffffffffffffc}, {0x5, 0xb, 0x4, 0xfffffffffffff001}, {0x8b5, 0x81, 0x4, 0x2}, {0x8, 0xfffffffffffffff8, 0x1, 0x8}, {0x40, 0x4, 0x1, 0x100000001}, {0x9b, 0x5, 0x1, 0xd64c}, {0x100, 0x8, 0x7, 0x3ff}, {0xf11, 0x200, 0x7, 0x2}, {0xac5, 0x0, 0x3, 0x7}, {0x518, 0x1, 0x80}, {0x6, 0x7f, 0x6, 0x7298}, {0x7, 0x1, 0x2, 0x1ec9}, {0x400, 0x2, 0x6, 0x6c3}, {0x100000001, 0x6, 0x5, 0x9}, {0x8, 0x1dae, 0xfffffffffffffff8, 0x101}, {0x2, 0x7, 0x8, 0x3}, {0x0, 0x45b, 0x7, 0x72}, {0x100000001, 0xc00000000000, 0x100000001, 0x8}, {0x100000001, 0x0, 0xfffffffffffffffc, 0x3}, {0x95, 0x90b, 0x0, 0xfffffffffffff565}, {0x0, 0x4, 0x0, 0x2}], 0x40}}}]}}, @common=@IDLETIMER={'IDLETIMER\x00', 0x28, {{0x7f, 'syz0\x00'}}}}]}, {0x0, '\x00', 0x2, 0xfffffffffffffffc}, {0x0, '\x00', 0x2, 0xffffffffffffffff, 0x2, [{{{0x11, 0x40, 0x87df, 'irlan0\x00', 'sit0\x00', 'veth0_to_team\x00', 'ip6gretap0\x00', @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [0xff, 0xff, 0xff, 0xff, 0x0, 0xff], @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [0x0, 0xff, 0x0, 0xff], 0xb0, 0x210, 0x258, [@time={'time\x00', 0x18, {{0x1ff, 0x1, 0xe063, 0xb6c5, 0x2e80, 0x0, 0x2}}}]}, [@common=@redirect={'redirect\x00', 0x8, {{0xffffffffffffffff}}}, @common=@SECMARK={'SECMARK\x00', 0x108, {{0x1, 0x6, 'system_u:object_r:lost_found_t:s0\x00'}}}]}, @common=@ERROR={'ERROR\x00', 0x20, {"4323eed968d7072e70de82f41331fe3aed2aedc8f2fff16e54b1c4e2ad07"}}}, {{{0x5, 0x54, 0x888d, 'ip6gretap0\x00', 'teql0\x00', 'veth1_to_team\x00', 'erspan0\x00', @random="0eae55d5aac5", [0x0, 0xff, 0x0, 0xff, 0xff, 0xff], @empty, [0xff, 0xff, 0xff, 0x0, 0xff, 0xff], 0x70, 0x70, 0xb8}}, @common=@RATEEST={'RATEEST\x00', 0x20, {{'syz0\x00', 0x9, 0x1, 0x4}}}}]}]}, 0x9a0) [ 466.816514] sctp: [Deprecated]: syz-executor4 (pid 16411) Use of int in maxseg socket option. [ 466.816514] Use struct sctp_assoc_value instead 2018/05/15 08:25:36 executing program 0: pselect6(0x6, &(0x7f0000000000), &(0x7f0000000040), &(0x7f0000000200)={0x6}, &(0x7f0000000100)={0x0, 0x989680}, &(0x7f0000000180)={&(0x7f0000000140), 0x8}) 2018/05/15 08:25:36 executing program 2: syz_emit_ethernet(0x3e, &(0x7f00000001c0)={@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, @dev={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa]}, [], {@ipv6={0x86dd, {0x0, 0x6, "50a09c", 0x8, 0x0, 0x0, @remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2100], 0xbb}, @local={0xfe, 0x80, [], 0xaa}, {[], @udp={0x0, 0x0, 0x8}}}}}}, &(0x7f0000000040)) [ 466.875564] sctp: [Deprecated]: syz-executor6 (pid 16417) Use of int in maxseg socket option. [ 466.875564] Use struct sctp_assoc_value instead 2018/05/15 08:25:36 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f0000000280)="6e65742f6970365f7461626c65735f6d61746368657300b6e23bcf6093cb57f8b4d285e9c48608549acee9a66f09d47a011dcc8f5af7870c6c1b6eebe85ebea4ecda4e44def87e8ee568c843daaf2805944012bc0144937e8b04411d09016ca07f7388ded591e346fb612397e79a6fe43e5c6a86bee1565b17b22b8ed5c95b4afbb3a620d1402c50bbaad790d0ffdb7c5a27e60423079f77bf") unlink(&(0x7f0000000080)='./file0\x00') sendfile(r0, r0, &(0x7f00000000c0)=0x10000000, 0x0) ioctl$KDGKBMETA(r0, 0x4b62, &(0x7f0000000100)) getsockopt$inet_sctp_SCTP_PARTIAL_DELIVERY_POINT(r0, 0x84, 0x13, &(0x7f0000000140)={0x0, 0xfffffffffffffffa}, &(0x7f0000000180)=0x8) syslog(0x2, &(0x7f0000000cc0)=""/107, 0x6b) setsockopt$IP_VS_SO_SET_DEL(r0, 0x0, 0x484, &(0x7f0000000200)={0x87, @dev={0xac, 0x14, 0x14, 0x1a}, 0x4e24, 0x2, 'rr\x00', 0x3, 0x2, 0x66}, 0x2c) setsockopt$inet_sctp_SCTP_STREAM_SCHEDULER(r0, 0x84, 0x7b, &(0x7f00000001c0)={r1, 0x40ef2843}, 0x8) setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x40, &(0x7f0000000340)=ANY=[@ANYBLOB="73656375726974790000000000000000000000000000000000000000000000000e00000004000000f8030000fffffffff00000000000000000000000ffffffffffffffff600300006003000060030000ffffffff04000000", @ANYPTR=&(0x7f0000000d40)=ANY=[@ANYBLOB="000000000000000000000000002100ebe70048ca02fec408edfbaf31ba590218fdffffffffffd60000000000000000000000000000000000000000000000000021d13202a6d3d3de0000000000000000000000"], @ANYBLOB="00000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000c800f0000000000000000000000000000000000000000000000000003000616800000000000000000000000000000000000000000000000000000000f9ffffff7f000000010000000000000028005443504d5353000000000000000000000000000000000000000000000000740c0000000000007f000001ac14140dffffff00ffffffff6772653000000000000000000000000069703667726530000000000000000000000000000000000000000000ff0000000000000000000000000000000000000000000000000000000000ff0000000000000000000000000000007f0003010000000000000000000000000000b80018010000000000000000000000000000000000000000000000002000736f636b657400000000000000000000000000000000000000000000000060005345540000000000000000000000000000000000000000000000000000000100000000100000020000000000008e0a000000010400000800000000033f0002000000d4180000ff0700009c0a00001e62000000000000e1020000ff09010000000100ac1414aa000000ffff0000007465616d5f736c6176655f310000000069703667726574617030000000000000000000000000000000000000ff0000000000000000000000000000000000000000000000000000000000ff000000000000000000000000000000670001400000000000000000000000000000280158010000000000000000000000000000000000000000000000004000736574000000000000000000000000000000000000000000000000000000070000000100000008000000090000000000000000000000060000000307050050006f736600000000000000000000000000000000000000000000000000000073797a3100000000000000000000000000000000000000000000000000000000070000000200000002000000000000003000434f4e4e4d41524b00000000000000000000ffffffffffffffe5000000014000000009000000020000000300000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000700098000000000000000000000000000000000000000000280000000000000000000000000000000000000000000000000000000000000800ffffff00000000"], 0x458) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000000)='dctcp\x00', 0x6) 2018/05/15 08:25:36 executing program 4: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) setsockopt$inet_sctp6_SCTP_MAXSEG(r0, 0x84, 0xd, &(0x7f0000000080)=@assoc_value={0x0, 0x1bc}, 0x8) getsockopt$inet_sctp6_SCTP_MAXSEG(r0, 0x84, 0xd, &(0x7f0000000000)=@assoc_id=0x0, &(0x7f0000000040)=0x4) getsockopt$inet_sctp6_SCTP_GET_LOCAL_ADDRS(r0, 0x84, 0x6d, &(0x7f0000007780)={r1}, &(0x7f00000077c0)=0x8) 2018/05/15 08:25:36 executing program 5: r0 = getpid() r1 = syz_open_procfs(r0, &(0x7f0000000280)="6e020000000000000000") sendfile(r1, r1, &(0x7f0000000000)=0xffffffd, 0x7fffffff) ioctl$KVM_GET_CPUID2(r1, 0xc008ae91, &(0x7f0000000140)={0x4, 0x0, [{}, {}, {}, {}]}) r2 = fcntl$getown(r1, 0x9) waitid(0x2, r2, &(0x7f0000000040), 0x20000000, &(0x7f0000000080)) 2018/05/15 08:25:36 executing program 7: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup(r0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000d40)=@broute={'broute\x00', 0x20, 0x4, 0x928, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000400], 0x0, &(0x7f0000000000), &(0x7f0000000400)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x2, [{{{0x5, 0x0, 0x0, 'bcsh0\x00', 'sit0\x00', 'syzkaller1\x00', 'veth0\x00', @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [], @dev={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa]}, [], 0x1d8, 0x228, 0x258, [@comment={'comment\x00', 0x100}, @owner={'owner\x00', 0x18}]}, [@common=@LED={'LED\x00', 0x28, {{'syz0\x00'}}}]}, @common=@redirect={'redirect\x00', 0x8}}, {{{0x11, 0x0, 0x0, 'veth1_to_bond\x00', 'erspan0\x00', 'bridge_slave_1\x00', 'veth0_to_bridge\x00', @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [], @random="cfa071dc33d9", [], 0x2e0, 0x2e0, 0x330, [@mac={'mac\x00', 0x10, {{@remote={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xbb}}}}, @bpf0={'bpf\x00', 0x210, {{0x0, [{}, {}, {}, {}, {}, {0x0, 0x0, 0xcefa, 0x81}, {0x815, 0xc7, 0x8001, 0x6a0}, {0x40, 0x0, 0x9, 0x80000001}, {0xffffffffffffff53, 0x38a, 0x100000000, 0x7}, {0x5, 0x1, 0x1000, 0x10001}, {0x80000000, 0x7, 0x1, 0xf7}, {0x2, 0x9, 0x4c, 0x5}, {0xfffffffffffffff7, 0x0, 0xe74, 0x52a}, {0x1ff, 0x7, 0x3, 0x7}, {0x6, 0x1ff, 0x49, 0x7}, {0x8000, 0x0, 0x7, 0x684}, {0xffe, 0x988, 0x3, 0x1}, {0x7b, 0x5a07, 0x18, 0x7}, {0xfffffffffffffffe, 0xfff, 0x3, 0x178180a0}, {0x2, 0xc0, 0x6, 0x401}, {0x5, 0x3, 0x8, 0x8}, {0xffffffffffff0001, 0x3, 0xfffffffffffffff7, 0x5}, {0x1ff, 0x8001, 0x3}, {0x3, 0x9, 0xffffffff, 0x2}, {0x5, 0x4, 0x574, 0x64c}, {0x5, 0x4, 0x10001, 0x6}, {0x1, 0x5b2c, 0x3ff, 0x7}, {0xff, 0x2, 0x5, 0x62c5fc18}, {0x101, 0x7, 0x2, 0xfffffffffffffffd}, {0x7fff, 0x6, 0x8, 0x4}, {0x9, 0x0, 0x7, 0xff}, {0x4, 0x4, 0x4, 0x10000}, {0x59b0, 0xfff, 0x4, 0x4}, {0x1f, 0xfffffffffffffffd, 0x8001, 0x800}, {0x0, 0xffffffffffffffff, 0x2, 0x65}, {0x1ff, 0x1, 0x2, 0x7ff}, {0x4, 0x5, 0x1, 0x7be}, {0x9e4, 0x0, 0x7, 0x5}, {0x5, 0x8, 0x7f, 0xffffffff}, {0x4, 0x6, 0x5, 0x7ff}, {0x22aaaf52, 0x8f, 0x6, 0x10000}, {0x2, 0x7, 0xffff}, {0x5, 0xfffffffff016eb50, 0x82, 0x7}, {0x38, 0x800, 0x9a2a, 0xfffffffffffffffc}, {0x5, 0xb, 0x4, 0xfffffffffffff001}, {0x8b5, 0x81, 0x4, 0x2}, {0x8, 0xfffffffffffffff8, 0x1, 0x8}, {0x40, 0x4, 0x1, 0x100000001}, {0x9b, 0x5, 0x1, 0xd64c}, {0x100, 0x8, 0x7, 0x3ff}, {0xf11, 0x200, 0x7, 0x2}, {0xac5, 0x0, 0x3, 0x7}, {0x518, 0x1, 0x80}, {0x6, 0x7f, 0x6, 0x7298}, {0x7, 0x1, 0x2, 0x1ec9}, {0x400, 0x2, 0x6, 0x6c3}, {0x100000001, 0x6, 0x5, 0x9}, {0x8, 0x1dae, 0xfffffffffffffff8, 0x101}, {0x2, 0x7, 0x8, 0x3}, {0x0, 0x45b, 0x7, 0x72}, {0x100000001, 0xc00000000000, 0x100000001, 0x8}, {0x100000001, 0x0, 0xfffffffffffffffc, 0x3}, {0x95, 0x90b, 0x0, 0xfffffffffffff565}, {0x0, 0x4, 0x0, 0x2}], 0x40}}}]}}, @common=@IDLETIMER={'IDLETIMER\x00', 0x28, {{0x7f, 'syz0\x00'}}}}]}, {0x0, '\x00', 0x2, 0xfffffffffffffffc}, {0x0, '\x00', 0x2, 0xffffffffffffffff, 0x2, [{{{0x11, 0x40, 0x87df, 'irlan0\x00', 'sit0\x00', 'veth0_to_team\x00', 'ip6gretap0\x00', @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [0xff, 0xff, 0xff, 0xff, 0x0, 0xff], @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [0x0, 0xff, 0x0, 0xff], 0xb0, 0x210, 0x258, [@time={'time\x00', 0x18, {{0x1ff, 0x1, 0xe063, 0xb6c5, 0x2e80, 0x0, 0x2}}}]}, [@common=@redirect={'redirect\x00', 0x8, {{0xffffffffffffffff}}}, @common=@SECMARK={'SECMARK\x00', 0x108, {{0x1, 0x6, 'system_u:object_r:lost_found_t:s0\x00'}}}]}, @common=@ERROR={'ERROR\x00', 0x20, {"4323eed968d7072e70de82f41331fe3aed2aedc8f2fff16e54b1c4e2ad07"}}}, {{{0x5, 0x54, 0x888d, 'ip6gretap0\x00', 'teql0\x00', 'veth1_to_team\x00', 'erspan0\x00', @random="0eae55d5aac5", [0x0, 0xff, 0x0, 0xff, 0xff, 0xff], @empty, [0xff, 0xff, 0xff, 0x0, 0xff, 0xff], 0x70, 0x70, 0xb8}}, @common=@RATEEST={'RATEEST\x00', 0x20, {{'syz0\x00', 0x9, 0x1, 0x4}}}}]}]}, 0x9a0) 2018/05/15 08:25:36 executing program 0: pselect6(0x6, &(0x7f0000000000), &(0x7f0000000040), &(0x7f0000000200)={0x6}, &(0x7f0000000100)={0x0, 0x989680}, &(0x7f0000000180)={&(0x7f0000000140), 0x8}) [ 467.003520] sctp: [Deprecated]: syz-executor6 (pid 16439) Use of int in maxseg socket option. [ 467.003520] Use struct sctp_assoc_value instead [ 467.014396] sctp: [Deprecated]: syz-executor4 (pid 16440) Use of int in maxseg socket option. [ 467.014396] Use struct sctp_assoc_value instead 2018/05/15 08:25:37 executing program 3: syz_emit_ethernet(0x3e, &(0x7f00000001c0)={@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, @dev={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa]}, [], {@ipv6={0x86dd, {0x0, 0x6, "50a09c", 0x8, 0xffffff87, 0x0, @remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0xe00000000000000], 0xbb}, @local={0xfe, 0x80, [], 0xaa}, {[], @udp={0x0, 0x0, 0x8}}}}}}, &(0x7f0000000040)) 2018/05/15 08:25:37 executing program 4: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) setsockopt$inet_sctp6_SCTP_MAXSEG(r0, 0x84, 0xd, &(0x7f0000000080)=@assoc_value={0x0, 0x1bc}, 0x8) getsockopt$inet_sctp6_SCTP_MAXSEG(r0, 0x84, 0xd, &(0x7f0000000000)=@assoc_id=0x0, &(0x7f0000000040)=0x4) getsockopt$inet_sctp6_SCTP_GET_LOCAL_ADDRS(r0, 0x84, 0x6d, &(0x7f0000007780)={r1}, &(0x7f00000077c0)=0x8) 2018/05/15 08:25:37 executing program 6: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) setsockopt$inet_sctp6_SCTP_MAXSEG(r0, 0x84, 0xd, &(0x7f0000000080)=@assoc_value={0x0, 0x1bc}, 0x8) getsockopt$inet_sctp6_SCTP_MAXSEG(r0, 0x84, 0xd, &(0x7f0000000000)=@assoc_id=0x0, &(0x7f0000000040)=0x4) getsockopt$inet_sctp6_SCTP_RTOINFO(r0, 0x84, 0x0, &(0x7f00000000c0)={r1}, &(0x7f0000000100)=0x10) 2018/05/15 08:25:37 executing program 2: syz_emit_ethernet(0x3e, &(0x7f00000001c0)={@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, @dev={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa]}, [], {@ipv6={0x86dd, {0x0, 0x6, "50a09c", 0x8, 0x0, 0x0, @remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd00000000000000], 0xbb}, @local={0xfe, 0x80, [], 0xaa}, {[], @udp={0x0, 0x0, 0x8}}}}}}, &(0x7f0000000040)) 2018/05/15 08:25:37 executing program 5: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='attr/keycreate\x00') ioctl$KVM_X86_SETUP_MCE(r0, 0x4008ae9c, &(0x7f0000000040)={0x17, 0x6, 0x4}) ioctl$KVM_S390_UCAS_MAP(r0, 0x4018ae50, &(0x7f00000000c0)={0x3, 0x1, 0x7}) sendfile(r0, r0, &(0x7f0000000000)=0xffffffd, 0x7fffffff) 2018/05/15 08:25:37 executing program 0: pselect6(0x6, &(0x7f0000000000), &(0x7f0000000040), &(0x7f0000000200)={0x6}, &(0x7f0000000100)={0x0, 0x989680}, &(0x7f0000000180)={&(0x7f0000000140), 0x8}) 2018/05/15 08:25:37 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f0000000280)="6e65742f6970365f7461626c65735f6d61746368657300b6e23bcf6093cb57f8b4d285e9c48608549acee9a66f09d47a011dcc8f5af7870c6c1b6eebe85ebea4ecda4e44def87e8ee568c843daaf2805944012bc0144937e8b04411d09016ca07f7388ded591e346fb612397e79a6fe43e5c6a86bee1565b17b22b8ed5c95b4afbb3a620d1402c50bbaad790d0ffdb7c5a27e60423079f77bf") unlink(&(0x7f0000000080)='./file0\x00') sendfile(r0, r0, &(0x7f00000000c0)=0x10000000, 0x0) ioctl$KDGKBMETA(r0, 0x4b62, &(0x7f0000000100)) getsockopt$inet_sctp_SCTP_PARTIAL_DELIVERY_POINT(r0, 0x84, 0x13, &(0x7f0000000140)={0x0, 0xfffffffffffffffa}, &(0x7f0000000180)=0x8) syslog(0x2, &(0x7f0000000cc0)=""/107, 0x6b) setsockopt$IP_VS_SO_SET_DEL(r0, 0x0, 0x484, &(0x7f0000000200)={0x87, @dev={0xac, 0x14, 0x14, 0x1a}, 0x4e24, 0x2, 'rr\x00', 0x3, 0x2, 0x66}, 0x2c) setsockopt$inet_sctp_SCTP_STREAM_SCHEDULER(r0, 0x84, 0x7b, &(0x7f00000001c0)={r1, 0x40ef2843}, 0x8) setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x40, &(0x7f0000000340)=ANY=[@ANYBLOB="73656375726974790000000000000000000000000000000000000000000000000e00000004000000f8030000fffffffff00000000000000000000000ffffffffffffffff600300006003000060030000ffffffff04000000", @ANYPTR=&(0x7f0000000d40)=ANY=[@ANYBLOB="000000000000000000000000002100ebe70048ca02fec408edfbaf31ba590218fdffffffffffd60000000000000000000000000000000000000000000000000021d13202a6d3d3de0000000000000000000000"], @ANYBLOB="00000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000c800f0000000000000000000000000000000000000000000000000003000616800000000000000000000000000000000000000000000000000000000f9ffffff7f000000010000000000000028005443504d5353000000000000000000000000000000000000000000000000740c0000000000007f000001ac14140dffffff00ffffffff6772653000000000000000000000000069703667726530000000000000000000000000000000000000000000ff0000000000000000000000000000000000000000000000000000000000ff0000000000000000000000000000007f0003010000000000000000000000000000b80018010000000000000000000000000000000000000000000000002000736f636b657400000000000000000000000000000000000000000000000060005345540000000000000000000000000000000000000000000000000000000100000000100000020000000000008e0a000000010400000800000000033f0002000000d4180000ff0700009c0a00001e62000000000000e1020000ff09010000000100ac1414aa000000ffff0000007465616d5f736c6176655f310000000069703667726574617030000000000000000000000000000000000000ff0000000000000000000000000000000000000000000000000000000000ff000000000000000000000000000000670001400000000000000000000000000000280158010000000000000000000000000000000000000000000000004000736574000000000000000000000000000000000000000000000000000000070000000100000008000000090000000000000000000000060000000307050050006f736600000000000000000000000000000000000000000000000000000073797a3100000000000000000000000000000000000000000000000000000000070000000200000002000000000000003000434f4e4e4d41524b00000000000000000000ffffffffffffffe5000000014000000009000000020000000300000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000700098000000000000000000000000000000000000000000280000000000000000000000000000000000000000000000000000000000000800ffffff00000000"], 0x458) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000000)='dctcp\x00', 0x6) 2018/05/15 08:25:37 executing program 7: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup(r0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000d40)=@broute={'broute\x00', 0x20, 0x4, 0x928, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000400], 0x0, &(0x7f0000000000), &(0x7f0000000400)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x2, [{{{0x5, 0x0, 0x0, 'bcsh0\x00', 'sit0\x00', 'syzkaller1\x00', 'veth0\x00', @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [], @dev={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa]}, [], 0x1d8, 0x228, 0x258, [@comment={'comment\x00', 0x100}, @owner={'owner\x00', 0x18}]}, [@common=@LED={'LED\x00', 0x28, {{'syz0\x00'}}}]}, @common=@redirect={'redirect\x00', 0x8}}, {{{0x11, 0x0, 0x0, 'veth1_to_bond\x00', 'erspan0\x00', 'bridge_slave_1\x00', 'veth0_to_bridge\x00', @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [], @random="cfa071dc33d9", [], 0x2e0, 0x2e0, 0x330, [@mac={'mac\x00', 0x10, {{@remote={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xbb}}}}, @bpf0={'bpf\x00', 0x210, {{0x0, [{}, {}, {}, {}, {}, {0x0, 0x0, 0x0, 0x81}, {0x815, 0xc7, 0x8001, 0x6a0}, {0x40, 0x0, 0x9, 0x80000001}, {0xffffffffffffff53, 0x38a, 0x100000000, 0x7}, {0x5, 0x1, 0x1000, 0x10001}, {0x80000000, 0x7, 0x1, 0xf7}, {0x2, 0x9, 0x4c, 0x5}, {0xfffffffffffffff7, 0x0, 0xe74, 0x52a}, {0x1ff, 0x7, 0x3, 0x7}, {0x6, 0x1ff, 0x49, 0x7}, {0x8000, 0x0, 0x7, 0x684}, {0xffe, 0x988, 0x3, 0x1}, {0x7b, 0x5a07, 0x18, 0x7}, {0xfffffffffffffffe, 0xfff, 0x3, 0x178180a0}, {0x2, 0xc0, 0x6, 0x401}, {0x5, 0x3, 0x8, 0x8}, {0xffffffffffff0001, 0x3, 0xfffffffffffffff7, 0x5}, {0x1ff, 0x8001, 0x3}, {0x3, 0x9, 0xffffffff, 0x2}, {0x5, 0x4, 0x574, 0x64c}, {0x5, 0x4, 0x10001, 0x6}, {0x1, 0x5b2c, 0x3ff, 0x7}, {0xff, 0x2, 0x5, 0x62c5fc18}, {0x101, 0x7, 0x2, 0xfffffffffffffffd}, {0x7fff, 0x6, 0x8, 0x4}, {0x9, 0x0, 0x7, 0xff}, {0x4, 0x4, 0x4, 0x10000}, {0x59b0, 0xfff, 0x4, 0x4}, {0x1f, 0xfffffffffffffffd, 0x8001, 0x800}, {0x0, 0xffffffffffffffff, 0x2, 0x65}, {0x1ff, 0x1, 0x2, 0x7ff}, {0x4, 0x5, 0x1, 0x7be}, {0x9e4, 0x0, 0x7, 0x5}, {0x5, 0x8, 0x7f, 0xffffffff}, {0x4, 0x6, 0x5, 0x7ff}, {0x22aaaf52, 0x8f, 0x6, 0x10000}, {0x2, 0x7, 0xffff}, {0x5, 0xfffffffff016eb50, 0x82, 0x7}, {0x38, 0x800, 0x9a2a, 0xfffffffffffffffc}, {0x5, 0xb, 0x4, 0xfffffffffffff001}, {0x8b5, 0x81, 0x4, 0x2}, {0x8, 0xfffffffffffffff8, 0x1, 0x8}, {0x40, 0x4, 0x1, 0x100000001}, {0x9b, 0x5, 0x1, 0xd64c}, {0x100, 0x8, 0x7, 0x3ff}, {0xf11, 0x200, 0x7, 0x2}, {0xac5, 0x0, 0x3, 0x7}, {0x518, 0x1, 0x80}, {0x6, 0x7f, 0x6, 0x7298}, {0x7, 0x1, 0x2, 0x1ec9}, {0x400, 0x2, 0x6, 0x6c3}, {0x100000001, 0x6, 0x5, 0x9}, {0x8, 0x1dae, 0xfffffffffffffff8, 0x101}, {0x2, 0x7, 0x8, 0x3}, {0x0, 0x45b, 0x7, 0x72}, {0x100000001, 0xc00000000000, 0x100000001, 0x8}, {0x100000001, 0x0, 0xfffffffffffffffc, 0x3}, {0x95, 0x90b, 0x0, 0xfffffffffffff565}, {0x0, 0x4, 0x0, 0x2}], 0x40}}}]}}, @common=@IDLETIMER={'IDLETIMER\x00', 0x28, {{0x7f, 'syz0\x00'}}}}]}, {0x0, '\x00', 0x2, 0xfffffffffffffffc}, {0x0, '\x00', 0x2, 0xffffffffffffffff, 0x2, [{{{0x11, 0x40, 0x87df, 'irlan0\x00', 'sit0\x00', 'veth0_to_team\x00', 'ip6gretap0\x00', @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [0xff, 0xff, 0xff, 0xff, 0x0, 0xff], @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [0x0, 0xff, 0x0, 0xff], 0xb0, 0x210, 0x258, [@time={'time\x00', 0x18, {{0x1ff, 0x1, 0xe063, 0xb6c5, 0x2e80, 0x0, 0x2}}}]}, [@common=@redirect={'redirect\x00', 0x8, {{0xffffffffffffffff}}}, @common=@SECMARK={'SECMARK\x00', 0x108, {{0x1, 0x6, 'system_u:object_r:lost_found_t:s0\x00'}}}]}, @common=@ERROR={'ERROR\x00', 0x20, {"4323eed968d7072e70de82f41331fe3aed2aedc8f2fff16e54b1c4e2ad07"}}}, {{{0x5, 0x54, 0x888d, 'ip6gretap0\x00', 'teql0\x00', 'veth1_to_team\x00', 'erspan0\x00', @random="0eae55d5aac5", [0x0, 0xff, 0x0, 0xff, 0xff, 0xff], @empty, [0xff, 0xff, 0xff, 0x0, 0xff, 0xff], 0x70, 0x70, 0xb8}}, @common=@RATEEST={'RATEEST\x00', 0x20, {{'syz0\x00', 0x9, 0x1, 0x4}}}}]}]}, 0x9a0) 2018/05/15 08:25:37 executing program 3: syz_emit_ethernet(0x3e, &(0x7f00000001c0)={@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, @dev={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa]}, [], {@ipv6={0x86dd, {0x0, 0x6, "50a09c", 0x8, 0xffffff87, 0x0, @remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x3f00], 0xbb}, @local={0xfe, 0x80, [], 0xaa}, {[], @udp={0x0, 0x0, 0x8}}}}}}, &(0x7f0000000040)) 2018/05/15 08:25:37 executing program 0: pselect6(0x6, &(0x7f0000000000), &(0x7f0000000040), &(0x7f0000000200), &(0x7f0000000100)={0x0, 0x989680}, &(0x7f0000000180)={&(0x7f0000000140), 0x8}) 2018/05/15 08:25:37 executing program 2: syz_emit_ethernet(0x3e, &(0x7f00000001c0)={@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, @dev={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa]}, [], {@ipv6={0x86dd, {0x0, 0x6, "50a09c", 0x8, 0x0, 0x0, @remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x806000000000000], 0xbb}, @local={0xfe, 0x80, [], 0xaa}, {[], @udp={0x0, 0x0, 0x8}}}}}}, &(0x7f0000000040)) 2018/05/15 08:25:37 executing program 5: r0 = syz_open_procfs(0x0, &(0x7f0000000280)='net/ptype\x00') sendfile(r0, r0, &(0x7f0000000040)=0x10000001, 0x7fffffff) [ 467.948987] sctp: [Deprecated]: syz-executor4 (pid 16472) Use of int in maxseg socket option. [ 467.948987] Use struct sctp_assoc_value instead [ 467.969207] sctp: [Deprecated]: syz-executor6 (pid 16471) Use of int in maxseg socket option. [ 467.969207] Use struct sctp_assoc_value instead 2018/05/15 08:25:37 executing program 7: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup(r0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000d40)=@broute={'broute\x00', 0x20, 0x4, 0x928, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000400], 0x0, &(0x7f0000000000), &(0x7f0000000400)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x2, [{{{0x5, 0x0, 0x0, 'bcsh0\x00', 'sit0\x00', 'syzkaller1\x00', 'veth0\x00', @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [], @dev={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa]}, [], 0x1d8, 0x228, 0x258, [@comment={'comment\x00', 0x100}, @owner={'owner\x00', 0x18}]}, [@common=@LED={'LED\x00', 0x28, {{'syz0\x00'}}}]}, @common=@redirect={'redirect\x00', 0x8}}, {{{0x11, 0x0, 0x0, 'veth1_to_bond\x00', 'erspan0\x00', 'bridge_slave_1\x00', 'veth0_to_bridge\x00', @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [], @random="cfa071dc33d9", [], 0x2e0, 0x2e0, 0x330, [@mac={'mac\x00', 0x10, {{@remote={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xbb}}}}, @bpf0={'bpf\x00', 0x210, {{0x0, [{}, {}, {}, {}, {}, {}, {0x815, 0xc7, 0x8001, 0x6a0}, {0x40, 0x0, 0x9, 0x80000001}, {0xffffffffffffff53, 0x38a, 0x100000000, 0x7}, {0x5, 0x1, 0x1000, 0x10001}, {0x80000000, 0x7, 0x1, 0xf7}, {0x2, 0x9, 0x4c, 0x5}, {0xfffffffffffffff7, 0x0, 0xe74, 0x52a}, {0x1ff, 0x7, 0x3, 0x7}, {0x6, 0x1ff, 0x49, 0x7}, {0x8000, 0x0, 0x7, 0x684}, {0xffe, 0x988, 0x3, 0x1}, {0x7b, 0x5a07, 0x18, 0x7}, {0xfffffffffffffffe, 0xfff, 0x3, 0x178180a0}, {0x2, 0xc0, 0x6, 0x401}, {0x5, 0x3, 0x8, 0x8}, {0xffffffffffff0001, 0x3, 0xfffffffffffffff7, 0x5}, {0x1ff, 0x8001, 0x3}, {0x3, 0x9, 0xffffffff, 0x2}, {0x5, 0x4, 0x574, 0x64c}, {0x5, 0x4, 0x10001, 0x6}, {0x1, 0x5b2c, 0x3ff, 0x7}, {0xff, 0x2, 0x5, 0x62c5fc18}, {0x101, 0x7, 0x2, 0xfffffffffffffffd}, {0x7fff, 0x6, 0x8, 0x4}, {0x9, 0x0, 0x7, 0xff}, {0x4, 0x4, 0x4, 0x10000}, {0x59b0, 0xfff, 0x4, 0x4}, {0x1f, 0xfffffffffffffffd, 0x8001, 0x800}, {0x0, 0xffffffffffffffff, 0x2, 0x65}, {0x1ff, 0x1, 0x2, 0x7ff}, {0x4, 0x5, 0x1, 0x7be}, {0x9e4, 0x0, 0x7, 0x5}, {0x5, 0x8, 0x7f, 0xffffffff}, {0x4, 0x6, 0x5, 0x7ff}, {0x22aaaf52, 0x8f, 0x6, 0x10000}, {0x2, 0x7, 0xffff}, {0x5, 0xfffffffff016eb50, 0x82, 0x7}, {0x38, 0x800, 0x9a2a, 0xfffffffffffffffc}, {0x5, 0xb, 0x4, 0xfffffffffffff001}, {0x8b5, 0x81, 0x4, 0x2}, {0x8, 0xfffffffffffffff8, 0x1, 0x8}, {0x40, 0x4, 0x1, 0x100000001}, {0x9b, 0x5, 0x1, 0xd64c}, {0x100, 0x8, 0x7, 0x3ff}, {0xf11, 0x200, 0x7, 0x2}, {0xac5, 0x0, 0x3, 0x7}, {0x518, 0x1, 0x80}, {0x6, 0x7f, 0x6, 0x7298}, {0x7, 0x1, 0x2, 0x1ec9}, {0x400, 0x2, 0x6, 0x6c3}, {0x100000001, 0x6, 0x5, 0x9}, {0x8, 0x1dae, 0xfffffffffffffff8, 0x101}, {0x2, 0x7, 0x8, 0x3}, {0x0, 0x45b, 0x7, 0x72}, {0x100000001, 0xc00000000000, 0x100000001, 0x8}, {0x100000001, 0x0, 0xfffffffffffffffc, 0x3}, {0x95, 0x90b, 0x0, 0xfffffffffffff565}, {0x0, 0x4, 0x0, 0x2}], 0x40}}}]}}, @common=@IDLETIMER={'IDLETIMER\x00', 0x28, {{0x7f, 'syz0\x00'}}}}]}, {0x0, '\x00', 0x2, 0xfffffffffffffffc}, {0x0, '\x00', 0x2, 0xffffffffffffffff, 0x2, [{{{0x11, 0x40, 0x87df, 'irlan0\x00', 'sit0\x00', 'veth0_to_team\x00', 'ip6gretap0\x00', @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [0xff, 0xff, 0xff, 0xff, 0x0, 0xff], @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [0x0, 0xff, 0x0, 0xff], 0xb0, 0x210, 0x258, [@time={'time\x00', 0x18, {{0x1ff, 0x1, 0xe063, 0xb6c5, 0x2e80, 0x0, 0x2}}}]}, [@common=@redirect={'redirect\x00', 0x8, {{0xffffffffffffffff}}}, @common=@SECMARK={'SECMARK\x00', 0x108, {{0x1, 0x6, 'system_u:object_r:lost_found_t:s0\x00'}}}]}, @common=@ERROR={'ERROR\x00', 0x20, {"4323eed968d7072e70de82f41331fe3aed2aedc8f2fff16e54b1c4e2ad07"}}}, {{{0x5, 0x54, 0x888d, 'ip6gretap0\x00', 'teql0\x00', 'veth1_to_team\x00', 'erspan0\x00', @random="0eae55d5aac5", [0x0, 0xff, 0x0, 0xff, 0xff, 0xff], @empty, [0xff, 0xff, 0xff, 0x0, 0xff, 0xff], 0x70, 0x70, 0xb8}}, @common=@RATEEST={'RATEEST\x00', 0x20, {{'syz0\x00', 0x9, 0x1, 0x4}}}}]}]}, 0x9a0) 2018/05/15 08:25:37 executing program 4: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) setsockopt$inet_sctp6_SCTP_MAXSEG(r0, 0x84, 0xd, &(0x7f0000000080)=@assoc_value={0x0, 0x1bc}, 0x8) getsockopt$inet_sctp6_SCTP_MAXSEG(r0, 0x84, 0xd, &(0x7f0000000000)=@assoc_id=0x0, &(0x7f0000000040)=0x4) getsockopt$inet_sctp6_SCTP_GET_LOCAL_ADDRS(r0, 0x84, 0x6d, &(0x7f0000007780)={r1}, &(0x7f00000077c0)=0x8) 2018/05/15 08:25:37 executing program 0: pselect6(0x6, &(0x7f0000000000), &(0x7f0000000040), &(0x7f0000000200), &(0x7f0000000100)={0x0, 0x989680}, &(0x7f0000000180)={&(0x7f0000000140), 0x8}) 2018/05/15 08:25:37 executing program 6: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) setsockopt$inet_sctp6_SCTP_MAXSEG(r0, 0x84, 0xd, &(0x7f0000000080)=@assoc_value={0x0, 0x1bc}, 0x8) getsockopt$inet_sctp6_SCTP_MAXSEG(r0, 0x84, 0xd, &(0x7f0000000000)=@assoc_id=0x0, &(0x7f0000000040)=0x4) getsockopt$inet_sctp6_SCTP_RTOINFO(r0, 0x84, 0x0, &(0x7f00000000c0)={r1}, &(0x7f0000000100)=0x10) 2018/05/15 08:25:37 executing program 5: r0 = syz_open_procfs(0x0, &(0x7f0000000280)='net/ptype\x00') sendfile(r0, r0, &(0x7f0000000000)=0xffffffd, 0x7fffffff) r1 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vga_arbiter\x00', 0x2001, 0x0) setsockopt$inet_sctp_SCTP_RECVNXTINFO(r1, 0x84, 0x21, &(0x7f0000000040)=0xffffffffffffff76, 0x4) 2018/05/15 08:25:37 executing program 3: syz_emit_ethernet(0x3e, &(0x7f00000001c0)={@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, @dev={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa]}, [], {@ipv6={0x86dd, {0x0, 0x6, "50a09c", 0x8, 0xffffff87, 0x0, @remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0xf000], 0xbb}, @local={0xfe, 0x80, [], 0xaa}, {[], @udp={0x0, 0x0, 0x8}}}}}}, &(0x7f0000000040)) 2018/05/15 08:25:37 executing program 2: syz_emit_ethernet(0x3e, &(0x7f00000001c0)={@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, @dev={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa]}, [], {@ipv6={0x86dd, {0x0, 0x6, "50a09c", 0x8, 0x0, 0x0, @remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3a00000000000000], 0xbb}, @local={0xfe, 0x80, [], 0xaa}, {[], @udp={0x0, 0x0, 0x8}}}}}}, &(0x7f0000000040)) [ 468.145204] sctp: [Deprecated]: syz-executor4 (pid 16494) Use of int in maxseg socket option. [ 468.145204] Use struct sctp_assoc_value instead 2018/05/15 08:25:37 executing program 0: pselect6(0x6, &(0x7f0000000000), &(0x7f0000000040), &(0x7f0000000200), &(0x7f0000000100)={0x0, 0x989680}, &(0x7f0000000180)={&(0x7f0000000140), 0x8}) [ 468.199049] sctp: [Deprecated]: syz-executor6 (pid 16507) Use of int in maxseg socket option. [ 468.199049] Use struct sctp_assoc_value instead 2018/05/15 08:25:37 executing program 2: syz_emit_ethernet(0x3e, &(0x7f00000001c0)={@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, @dev={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa]}, [], {@ipv6={0x86dd, {0x0, 0x6, "50a09c", 0x8, 0x0, 0x0, @remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2900000000000000], 0xbb}, @local={0xfe, 0x80, [], 0xaa}, {[], @udp={0x0, 0x0, 0x8}}}}}}, &(0x7f0000000040)) 2018/05/15 08:25:37 executing program 3: syz_emit_ethernet(0x3e, &(0x7f00000001c0)={@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, @dev={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa]}, [], {@ipv6={0x86dd, {0x0, 0x6, "50a09c", 0x8, 0xffffff87, 0x0, @remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x806], 0xbb}, @local={0xfe, 0x80, [], 0xaa}, {[], @udp={0x0, 0x0, 0x8}}}}}}, &(0x7f0000000040)) 2018/05/15 08:25:37 executing program 3: syz_emit_ethernet(0x3e, &(0x7f00000001c0)={@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, @dev={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa]}, [], {@ipv6={0x86dd, {0x0, 0x6, "50a09c", 0x8, 0xffffff87, 0x0, @remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0xf0ffffffffffff], 0xbb}, @local={0xfe, 0x80, [], 0xaa}, {[], @udp={0x0, 0x0, 0x8}}}}}}, &(0x7f0000000040)) 2018/05/15 08:25:37 executing program 4: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) setsockopt$inet_sctp6_SCTP_MAXSEG(r0, 0x84, 0xd, &(0x7f0000000080)=@assoc_value={0x0, 0x1bc}, 0x8) getsockopt$inet_sctp6_SCTP_GET_LOCAL_ADDRS(r0, 0x84, 0x6d, &(0x7f0000007780), &(0x7f00000077c0)=0x8) 2018/05/15 08:25:37 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) sendmsg(r0, &(0x7f0000000740)={&(0x7f0000000140)=@sco={0x1f}, 0x80, &(0x7f0000000480), 0x0, &(0x7f0000000500)=[{0xf}], 0x10}, 0x0) 2018/05/15 08:25:37 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f0000000280)="6e65742f6970365f7461626c65735f6d61746368657300b6e23bcf6093cb57f8b4d285e9c48608549acee9a66f09d47a011dcc8f5af7870c6c1b6eebe85ebea4ecda4e44def87e8ee568c843daaf2805944012bc0144937e8b04411d09016ca07f7388ded591e346fb612397e79a6fe43e5c6a86bee1565b17b22b8ed5c95b4afbb3a620d1402c50bbaad790d0ffdb7c5a27e60423079f77bf") unlink(&(0x7f0000000080)='./file0\x00') sendfile(r0, r0, &(0x7f00000000c0)=0x10000000, 0x2) ioctl$KDGKBMETA(0xffffffffffffffff, 0x4b62, &(0x7f0000000100)) getsockopt$inet_sctp_SCTP_PARTIAL_DELIVERY_POINT(r0, 0x84, 0x13, &(0x7f0000000140)={0x0, 0xfffffffffffffffa}, &(0x7f0000000180)=0x8) syslog(0x2, &(0x7f0000000cc0)=""/107, 0x6b) setsockopt$IP_VS_SO_SET_DEL(r0, 0x0, 0x484, &(0x7f0000000200)={0x87, @dev={0xac, 0x14, 0x14, 0x1a}, 0x4e24, 0x2, 'rr\x00', 0x3, 0x2, 0x66}, 0x2c) setsockopt$inet_sctp_SCTP_STREAM_SCHEDULER(r0, 0x84, 0x7b, &(0x7f00000001c0)={r1, 0x40ef2843}, 0x8) setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x40, &(0x7f0000000340)=ANY=[@ANYBLOB="73656375726974790000000000000000000000000000000000000000000000000e00000004000000f8030000fffffffff00000000000000000000000ffffffffffffffff600300006003000060030000ffffffff04000000", @ANYPTR=&(0x7f0000000d40)=ANY=[@ANYBLOB="000000000000000000000000002100ebe70048ca02fec408edfbaf31ba590218fdffffffffffd60000000000000000000000000000000000000000000000000021d13202a6d3d3de0000000000000000000000"], @ANYBLOB="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"], 0x458) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000000)='dctcp\x00', 0x6) 2018/05/15 08:25:37 executing program 6: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) setsockopt$inet_sctp6_SCTP_MAXSEG(r0, 0x84, 0xd, &(0x7f0000000080)=@assoc_value={0x0, 0x1bc}, 0x8) getsockopt$inet_sctp6_SCTP_MAXSEG(r0, 0x84, 0xd, &(0x7f0000000000)=@assoc_id=0x0, &(0x7f0000000040)=0x4) getsockopt$inet_sctp6_SCTP_RTOINFO(r0, 0x84, 0x0, &(0x7f00000000c0)={r1}, &(0x7f0000000100)=0x10) 2018/05/15 08:25:37 executing program 2: syz_emit_ethernet(0x3e, &(0x7f00000001c0)={@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, @dev={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa]}, [], {@ipv6={0x86dd, {0x0, 0x6, "50a09c", 0x8, 0x0, 0x0, @remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf0ffff], 0xbb}, @local={0xfe, 0x80, [], 0xaa}, {[], @udp={0x0, 0x0, 0x8}}}}}}, &(0x7f0000000040)) 2018/05/15 08:25:37 executing program 5: r0 = syz_open_procfs(0x0, &(0x7f0000000280)='net/ptype\x00') clock_gettime(0x0, &(0x7f0000000080)={0x0, 0x0}) futimesat(r0, &(0x7f0000000040)='./file0\x00', &(0x7f00000000c0)={{0x0, 0x2710}, {r1, r2/1000+10000}}) write$binfmt_elf64(r0, &(0x7f00000002c0)={{0x7f, 0x45, 0x4c, 0x46, 0x7ff, 0x0, 0x6, 0x1338, 0xcb01, 0x3, 0x6, 0x9ef, 0xf9, 0x40, 0x3f, 0x5, 0x100000001, 0x38, 0x2, 0xfffffffffffffff7, 0x3ff, 0x7}, [{0x60000004, 0x2, 0x7, 0x7ff, 0x2de46764, 0x3, 0xfffffffffffffffb, 0x7f}], "7fd17648e47aa89c999668b2b7407fc2cde30676c3e5bf91b48e54f1acb2d8f5ff9b3d523a4b32e1def52d8e5cc8574377b63f8fba5db480804577ee2e9193fce29760c92f40acad4c21612fd921adf481aaf76d8a9516d1e47a7ca8c97c5e6fd558a3be41c10485f16304c4196310f2f0cfe9c83026966d00c7a56226f1931809842eeb2c2ec25b036d08dd873c6df94bf61453a3d62df87b357b68a96feb110b1add103808942033c06ca635a8a418c2f2f6bc33f1aef8ac0c304985a2dee83e0f469d12", [[], []]}, 0x33d) sendfile(r0, r0, &(0x7f0000000100)=0xffffffd, 0x40007fffffff) 2018/05/15 08:25:37 executing program 7: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup(r0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000d40)=@broute={'broute\x00', 0x20, 0x4, 0x928, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000400], 0x0, &(0x7f0000000000), &(0x7f0000000400)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x2, [{{{0x5, 0x0, 0x0, 'bcsh0\x00', 'sit0\x00', 'syzkaller1\x00', 'veth0\x00', @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [], @dev={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa]}, [], 0x1d8, 0x228, 0x258, [@comment={'comment\x00', 0x100}, @owner={'owner\x00', 0x18}]}, [@common=@LED={'LED\x00', 0x28, {{'syz0\x00'}}}]}, @common=@redirect={'redirect\x00', 0x8}}, {{{0x11, 0x0, 0x0, 'veth1_to_bond\x00', 'erspan0\x00', 'bridge_slave_1\x00', 'veth0_to_bridge\x00', @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [], @random="cfa071dc33d9", [], 0x2e0, 0x2e0, 0x330, [@mac={'mac\x00', 0x10, {{@remote={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xbb}}}}, @bpf0={'bpf\x00', 0x210, {{0x0, [{}, {}, {}, {}, {}, {}, {0x0, 0xc7, 0x8001, 0x6a0}, {0x40, 0x0, 0x9, 0x80000001}, {0xffffffffffffff53, 0x38a, 0x100000000, 0x7}, {0x5, 0x1, 0x1000, 0x10001}, {0x80000000, 0x7, 0x1, 0xf7}, {0x2, 0x9, 0x4c, 0x5}, {0xfffffffffffffff7, 0x0, 0xe74, 0x52a}, {0x1ff, 0x7, 0x3, 0x7}, {0x6, 0x1ff, 0x49, 0x7}, {0x8000, 0x0, 0x7, 0x684}, {0xffe, 0x988, 0x3, 0x1}, {0x7b, 0x5a07, 0x18, 0x7}, {0xfffffffffffffffe, 0xfff, 0x3, 0x178180a0}, {0x2, 0xc0, 0x6, 0x401}, {0x5, 0x3, 0x8, 0x8}, {0xffffffffffff0001, 0x3, 0xfffffffffffffff7, 0x5}, {0x1ff, 0x8001, 0x3}, {0x3, 0x9, 0xffffffff, 0x2}, {0x5, 0x4, 0x574, 0x64c}, {0x5, 0x4, 0x10001, 0x6}, {0x1, 0x5b2c, 0x3ff, 0x7}, {0xff, 0x2, 0x5, 0x62c5fc18}, {0x101, 0x7, 0x2, 0xfffffffffffffffd}, {0x7fff, 0x6, 0x8, 0x4}, {0x9, 0x0, 0x7, 0xff}, {0x4, 0x4, 0x4, 0x10000}, {0x59b0, 0xfff, 0x4, 0x4}, {0x1f, 0xfffffffffffffffd, 0x8001, 0x800}, {0x0, 0xffffffffffffffff, 0x2, 0x65}, {0x1ff, 0x1, 0x2, 0x7ff}, {0x4, 0x5, 0x1, 0x7be}, {0x9e4, 0x0, 0x7, 0x5}, {0x5, 0x8, 0x7f, 0xffffffff}, {0x4, 0x6, 0x5, 0x7ff}, {0x22aaaf52, 0x8f, 0x6, 0x10000}, {0x2, 0x7, 0xffff}, {0x5, 0xfffffffff016eb50, 0x82, 0x7}, {0x38, 0x800, 0x9a2a, 0xfffffffffffffffc}, {0x5, 0xb, 0x4, 0xfffffffffffff001}, {0x8b5, 0x81, 0x4, 0x2}, {0x8, 0xfffffffffffffff8, 0x1, 0x8}, {0x40, 0x4, 0x1, 0x100000001}, {0x9b, 0x5, 0x1, 0xd64c}, {0x100, 0x8, 0x7, 0x3ff}, {0xf11, 0x200, 0x7, 0x2}, {0xac5, 0x0, 0x3, 0x7}, {0x518, 0x1, 0x80}, {0x6, 0x7f, 0x6, 0x7298}, {0x7, 0x1, 0x2, 0x1ec9}, {0x400, 0x2, 0x6, 0x6c3}, {0x100000001, 0x6, 0x5, 0x9}, {0x8, 0x1dae, 0xfffffffffffffff8, 0x101}, {0x2, 0x7, 0x8, 0x3}, {0x0, 0x45b, 0x7, 0x72}, {0x100000001, 0xc00000000000, 0x100000001, 0x8}, {0x100000001, 0x0, 0xfffffffffffffffc, 0x3}, {0x95, 0x90b, 0x0, 0xfffffffffffff565}, {0x0, 0x4, 0x0, 0x2}], 0x40}}}]}}, @common=@IDLETIMER={'IDLETIMER\x00', 0x28, {{0x7f, 'syz0\x00'}}}}]}, {0x0, '\x00', 0x2, 0xfffffffffffffffc}, {0x0, '\x00', 0x2, 0xffffffffffffffff, 0x2, [{{{0x11, 0x40, 0x87df, 'irlan0\x00', 'sit0\x00', 'veth0_to_team\x00', 'ip6gretap0\x00', @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [0xff, 0xff, 0xff, 0xff, 0x0, 0xff], @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [0x0, 0xff, 0x0, 0xff], 0xb0, 0x210, 0x258, [@time={'time\x00', 0x18, {{0x1ff, 0x1, 0xe063, 0xb6c5, 0x2e80, 0x0, 0x2}}}]}, [@common=@redirect={'redirect\x00', 0x8, {{0xffffffffffffffff}}}, @common=@SECMARK={'SECMARK\x00', 0x108, {{0x1, 0x6, 'system_u:object_r:lost_found_t:s0\x00'}}}]}, @common=@ERROR={'ERROR\x00', 0x20, {"4323eed968d7072e70de82f41331fe3aed2aedc8f2fff16e54b1c4e2ad07"}}}, {{{0x5, 0x54, 0x888d, 'ip6gretap0\x00', 'teql0\x00', 'veth1_to_team\x00', 'erspan0\x00', @random="0eae55d5aac5", [0x0, 0xff, 0x0, 0xff, 0xff, 0xff], @empty, [0xff, 0xff, 0xff, 0x0, 0xff, 0xff], 0x70, 0x70, 0xb8}}, @common=@RATEEST={'RATEEST\x00', 0x20, {{'syz0\x00', 0x9, 0x1, 0x4}}}}]}]}, 0x9a0) 2018/05/15 08:25:37 executing program 4: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) setsockopt$inet_sctp6_SCTP_MAXSEG(r0, 0x84, 0xd, &(0x7f0000000080)=@assoc_value={0x0, 0x1bc}, 0x8) getsockopt$inet_sctp6_SCTP_GET_LOCAL_ADDRS(r0, 0x84, 0x6d, &(0x7f0000007780), &(0x7f00000077c0)=0x8) 2018/05/15 08:25:37 executing program 0: r0 = socket$inet6_udp(0xa, 0x2, 0x0) bind$inet6(r0, &(0x7f0000000240)={0xa, 0x0, 0x0, @ipv4={[], [0xff, 0xff], @broadcast=0xffffffff}}, 0x1c) sendto$inet6(r0, &(0x7f0000000000), 0x3000, 0x0, &(0x7f0000000300)={0xa, 0x4e22, 0x0, @ipv4={[], [0xff, 0xff], @dev={0xac, 0x14, 0x14}}}, 0x1c) [ 468.408662] sctp: [Deprecated]: syz-executor6 (pid 16528) Use of int in maxseg socket option. [ 468.408662] Use struct sctp_assoc_value instead 2018/05/15 08:25:37 executing program 2: syz_emit_ethernet(0x3e, &(0x7f00000001c0)={@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, @dev={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa]}, [], {@ipv6={0x86dd, {0x0, 0x6, "50a09c", 0x8, 0x0, 0x0, @remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x28000000], 0xbb}, @local={0xfe, 0x80, [], 0xaa}, {[], @udp={0x0, 0x0, 0x8}}}}}}, &(0x7f0000000040)) 2018/05/15 08:25:38 executing program 3: syz_emit_ethernet(0x3e, &(0x7f00000001c0)={@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, @dev={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa]}, [], {@ipv6={0x86dd, {0x0, 0x6, "50a09c", 0x8, 0xffffff87, 0x0, @remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x806000000000000], 0xbb}, @local={0xfe, 0x80, [], 0xaa}, {[], @udp={0x0, 0x0, 0x8}}}}}}, &(0x7f0000000040)) 2018/05/15 08:25:38 executing program 5: r0 = timerfd_create(0x7, 0x0) timerfd_settime(r0, 0x0, &(0x7f0000007000)={{0x0, 0x4}, {0x0, 0x5}}, &(0x7f0000005fe0)) read(r0, &(0x7f0000000040)=""/244, 0xf4) r1 = syz_open_procfs(0x0, &(0x7f0000000280)='net/ptype\x00') sendfile(r1, r1, &(0x7f0000000000)=0xffffffd, 0x7fffffff) 2018/05/15 08:25:38 executing program 7: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup(r0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000d40)=@broute={'broute\x00', 0x20, 0x4, 0x928, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000400], 0x0, &(0x7f0000000000), &(0x7f0000000400)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x2, [{{{0x5, 0x0, 0x0, 'bcsh0\x00', 'sit0\x00', 'syzkaller1\x00', 'veth0\x00', @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [], @dev={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa]}, [], 0x1d8, 0x228, 0x258, [@comment={'comment\x00', 0x100}, @owner={'owner\x00', 0x18}]}, [@common=@LED={'LED\x00', 0x28, {{'syz0\x00'}}}]}, @common=@redirect={'redirect\x00', 0x8}}, {{{0x11, 0x0, 0x0, 'veth1_to_bond\x00', 'erspan0\x00', 'bridge_slave_1\x00', 'veth0_to_bridge\x00', @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [], @random="cfa071dc33d9", [], 0x2e0, 0x2e0, 0x330, [@mac={'mac\x00', 0x10, {{@remote={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xbb}}}}, @bpf0={'bpf\x00', 0x210, {{0x0, [{}, {}, {}, {}, {}, {}, {0x0, 0x0, 0x8001, 0x6a0}, {0x40, 0x0, 0x9, 0x80000001}, {0xffffffffffffff53, 0x38a, 0x100000000, 0x7}, {0x5, 0x1, 0x1000, 0x10001}, {0x80000000, 0x7, 0x1, 0xf7}, {0x2, 0x9, 0x4c, 0x5}, {0xfffffffffffffff7, 0x0, 0xe74, 0x52a}, {0x1ff, 0x7, 0x3, 0x7}, {0x6, 0x1ff, 0x49, 0x7}, {0x8000, 0x0, 0x7, 0x684}, {0xffe, 0x988, 0x3, 0x1}, {0x7b, 0x5a07, 0x18, 0x7}, {0xfffffffffffffffe, 0xfff, 0x3, 0x178180a0}, {0x2, 0xc0, 0x6, 0x401}, {0x5, 0x3, 0x8, 0x8}, {0xffffffffffff0001, 0x3, 0xfffffffffffffff7, 0x5}, {0x1ff, 0x8001, 0x3}, {0x3, 0x9, 0xffffffff, 0x2}, {0x5, 0x4, 0x574, 0x64c}, {0x5, 0x4, 0x10001, 0x6}, {0x1, 0x5b2c, 0x3ff, 0x7}, {0xff, 0x2, 0x5, 0x62c5fc18}, {0x101, 0x7, 0x2, 0xfffffffffffffffd}, {0x7fff, 0x6, 0x8, 0x4}, {0x9, 0x0, 0x7, 0xff}, {0x4, 0x4, 0x4, 0x10000}, {0x59b0, 0xfff, 0x4, 0x4}, {0x1f, 0xfffffffffffffffd, 0x8001, 0x800}, {0x0, 0xffffffffffffffff, 0x2, 0x65}, {0x1ff, 0x1, 0x2, 0x7ff}, {0x4, 0x5, 0x1, 0x7be}, {0x9e4, 0x0, 0x7, 0x5}, {0x5, 0x8, 0x7f, 0xffffffff}, {0x4, 0x6, 0x5, 0x7ff}, {0x22aaaf52, 0x8f, 0x6, 0x10000}, {0x2, 0x7, 0xffff}, {0x5, 0xfffffffff016eb50, 0x82, 0x7}, {0x38, 0x800, 0x9a2a, 0xfffffffffffffffc}, {0x5, 0xb, 0x4, 0xfffffffffffff001}, {0x8b5, 0x81, 0x4, 0x2}, {0x8, 0xfffffffffffffff8, 0x1, 0x8}, {0x40, 0x4, 0x1, 0x100000001}, {0x9b, 0x5, 0x1, 0xd64c}, {0x100, 0x8, 0x7, 0x3ff}, {0xf11, 0x200, 0x7, 0x2}, {0xac5, 0x0, 0x3, 0x7}, {0x518, 0x1, 0x80}, {0x6, 0x7f, 0x6, 0x7298}, {0x7, 0x1, 0x2, 0x1ec9}, {0x400, 0x2, 0x6, 0x6c3}, {0x100000001, 0x6, 0x5, 0x9}, {0x8, 0x1dae, 0xfffffffffffffff8, 0x101}, {0x2, 0x7, 0x8, 0x3}, {0x0, 0x45b, 0x7, 0x72}, {0x100000001, 0xc00000000000, 0x100000001, 0x8}, {0x100000001, 0x0, 0xfffffffffffffffc, 0x3}, {0x95, 0x90b, 0x0, 0xfffffffffffff565}, {0x0, 0x4, 0x0, 0x2}], 0x40}}}]}}, @common=@IDLETIMER={'IDLETIMER\x00', 0x28, {{0x7f, 'syz0\x00'}}}}]}, {0x0, '\x00', 0x2, 0xfffffffffffffffc}, {0x0, '\x00', 0x2, 0xffffffffffffffff, 0x2, [{{{0x11, 0x40, 0x87df, 'irlan0\x00', 'sit0\x00', 'veth0_to_team\x00', 'ip6gretap0\x00', @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [0xff, 0xff, 0xff, 0xff, 0x0, 0xff], @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [0x0, 0xff, 0x0, 0xff], 0xb0, 0x210, 0x258, [@time={'time\x00', 0x18, {{0x1ff, 0x1, 0xe063, 0xb6c5, 0x2e80, 0x0, 0x2}}}]}, [@common=@redirect={'redirect\x00', 0x8, {{0xffffffffffffffff}}}, @common=@SECMARK={'SECMARK\x00', 0x108, {{0x1, 0x6, 'system_u:object_r:lost_found_t:s0\x00'}}}]}, @common=@ERROR={'ERROR\x00', 0x20, {"4323eed968d7072e70de82f41331fe3aed2aedc8f2fff16e54b1c4e2ad07"}}}, {{{0x5, 0x54, 0x888d, 'ip6gretap0\x00', 'teql0\x00', 'veth1_to_team\x00', 'erspan0\x00', @random="0eae55d5aac5", [0x0, 0xff, 0x0, 0xff, 0xff, 0xff], @empty, [0xff, 0xff, 0xff, 0x0, 0xff, 0xff], 0x70, 0x70, 0xb8}}, @common=@RATEEST={'RATEEST\x00', 0x20, {{'syz0\x00', 0x9, 0x1, 0x4}}}}]}]}, 0x9a0) 2018/05/15 08:25:38 executing program 0: r0 = syz_open_procfs(0x0, &(0x7f0000000780)="2f65786500000000000409004bddd9de91be10eebf000ee9a90f798058439ed554fa07424adee901d2da75af1f0200f5ab26d7a071fb35331ce39c5a") ioctl$KVM_IOEVENTFD(r0, 0x8004587d, &(0x7f0000000040)) 2018/05/15 08:25:38 executing program 6: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) setsockopt$inet_sctp6_SCTP_MAXSEG(r0, 0x84, 0xd, &(0x7f0000000080)=@assoc_value={0x0, 0x1bc}, 0x8) getsockopt$inet_sctp6_SCTP_RTOINFO(r0, 0x84, 0x0, &(0x7f00000000c0), &(0x7f0000000100)=0x10) 2018/05/15 08:25:38 executing program 4: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) setsockopt$inet_sctp6_SCTP_MAXSEG(r0, 0x84, 0xd, &(0x7f0000000080)=@assoc_value={0x0, 0x1bc}, 0x8) getsockopt$inet_sctp6_SCTP_GET_LOCAL_ADDRS(r0, 0x84, 0x6d, &(0x7f0000007780), &(0x7f00000077c0)=0x8) 2018/05/15 08:25:38 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f0000000280)="6e65742f6970365f7461626c65735f6d61746368657300b6e23bcf6093cb57f8b4d285e9c48608549acee9a66f09d47a011dcc8f5af7870c6c1b6eebe85ebea4ecda4e44def87e8ee568c843daaf2805944012bc0144937e8b04411d09016ca07f7388ded591e346fb612397e79a6fe43e5c6a86bee1565b17b22b8ed5c95b4afbb3a620d1402c50bbaad790d0ffdb7c5a27e60423079f77bf") unlink(&(0x7f0000000080)='./file0\x00') sendfile(r0, r0, &(0x7f00000000c0)=0x10000000, 0x2) ioctl$KDGKBMETA(0xffffffffffffffff, 0x4b62, &(0x7f0000000100)) getsockopt$inet_sctp_SCTP_PARTIAL_DELIVERY_POINT(r0, 0x84, 0x13, &(0x7f0000000140)={0x0, 0xfffffffffffffffa}, &(0x7f0000000180)=0x8) syslog(0x2, &(0x7f0000000cc0)=""/107, 0x6b) setsockopt$IP_VS_SO_SET_DEL(r0, 0x0, 0x484, &(0x7f0000000200)={0x87, @dev={0xac, 0x14, 0x14, 0x1a}, 0x4e24, 0x2, 'rr\x00', 0x3, 0x2, 0x66}, 0x2c) setsockopt$inet_sctp_SCTP_STREAM_SCHEDULER(r0, 0x84, 0x7b, &(0x7f00000001c0)={r1, 0x40ef2843}, 0x8) setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x40, &(0x7f0000000340)=ANY=[@ANYBLOB="73656375726974790000000000000000000000000000000000000000000000000e00000004000000f8030000fffffffff00000000000000000000000ffffffffffffffff600300006003000060030000ffffffff04000000", @ANYPTR=&(0x7f0000000d40)=ANY=[@ANYBLOB="000000000000000000000000002100ebe70048ca02fec408edfbaf31ba590218fdffffffffffd60000000000000000000000000000000000000000000000000021d13202a6d3d3de0000000000000000000000"], @ANYBLOB="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"], 0x458) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000000)='dctcp\x00', 0x6) 2018/05/15 08:25:38 executing program 2: syz_emit_ethernet(0x3e, &(0x7f00000001c0)={@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, @dev={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa]}, [], {@ipv6={0x86dd, {0x0, 0x6, "50a09c", 0x8, 0x0, 0x0, @remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xdc05], 0xbb}, @local={0xfe, 0x80, [], 0xaa}, {[], @udp={0x0, 0x0, 0x8}}}}}}, &(0x7f0000000040)) [ 469.351784] EXT4-fs (sda1): shut down requested (0) 2018/05/15 08:25:38 executing program 6: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) setsockopt$inet_sctp6_SCTP_MAXSEG(r0, 0x84, 0xd, &(0x7f0000000080)=@assoc_value={0x0, 0x1bc}, 0x8) getsockopt$inet_sctp6_SCTP_RTOINFO(r0, 0x84, 0x0, &(0x7f00000000c0), &(0x7f0000000100)=0x10) [ 469.430338] ------------[ cut here ]------------ [ 469.435157] DEBUG_LOCKS_WARN_ON(sem->owner != get_current()) [ 469.435244] WARNING: CPU: 1 PID: 16576 at kernel/locking/rwsem.c:133 up_write+0x1c6/0x210 [ 469.449313] Kernel panic - not syncing: panic_on_warn set ... [ 469.449313] [ 469.456675] CPU: 1 PID: 16576 Comm: syz-executor0 Not tainted 4.17.0-rc5+ #51 [ 469.463924] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 469.473252] Call Trace: [ 469.475824] dump_stack+0x1b9/0x294 [ 469.479444] ? dump_stack_print_info.cold.2+0x52/0x52 [ 469.484616] ? up_write+0x1a0/0x210 [ 469.488233] panic+0x22f/0x4de [ 469.491411] ? add_taint.cold.5+0x16/0x16 [ 469.495542] ? __warn.cold.8+0x148/0x1b3 [ 469.499584] ? up_write+0x1c6/0x210 [ 469.503189] __warn.cold.8+0x163/0x1b3 [ 469.507057] ? up_write+0x1c6/0x210 [ 469.510669] report_bug+0x252/0x2d0 [ 469.514274] do_error_trap+0x1de/0x490 [ 469.518143] ? blk_start_plug+0xc4/0x360 [ 469.522193] ? math_error+0x420/0x420 [ 469.525981] ? vprintk_default+0x28/0x30 [ 469.530033] ? vprintk_func+0x81/0xe7 [ 469.533816] ? printk+0x9e/0xba [ 469.537099] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 469.541920] do_invalid_op+0x1b/0x20 [ 469.545610] invalid_op+0x14/0x20 [ 469.549047] RIP: 0010:up_write+0x1c6/0x210 [ 469.553255] RSP: 0018:ffff8801c8d0f680 EFLAGS: 00010286 [ 469.558606] RAX: 0000000000000030 RBX: ffff8801cc526b00 RCX: ffffc90001ec8000 [ 469.565870] RDX: 0000000000012e6c RSI: ffffffff81610711 RDI: 0000000000000001 [ 469.573126] RBP: ffff8801c8d0f708 R08: ffff88019a7e0280 R09: fffffbfff11b0994 [ 469.580380] R10: fffffbfff11b0994 R11: ffffffff88d84ca3 R12: 1ffff100391a1ed0 [ 469.587636] R13: dffffc0000000000 R14: ffff8801c8d0f6e0 R15: ffff8801cc526b58 [ 469.594893] ? vprintk_func+0x81/0xe7 [ 469.598675] ? up_read+0x110/0x110 [ 469.602200] ? wait_for_completion+0x870/0x870 [ 469.606768] ? lock_release+0xa10/0xa10 [ 469.610725] ? thaw_super_locked+0x109/0x260 [ 469.615139] percpu_up_write+0xcd/0x110 [ 469.619108] ? __percpu_up_read+0x50/0x50 [ 469.623237] ? down_write+0x87/0x120 [ 469.626929] ? thaw_super+0x16/0x30 [ 469.630538] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 469.636057] thaw_super_locked+0x1f5/0x260 [ 469.640282] thaw_super+0x1e/0x30 [ 469.643718] thaw_bdev+0x162/0x1a0 [ 469.647242] ext4_ioctl+0x180e/0x4210 [ 469.651032] ? lock_downgrade+0x8e0/0x8e0 [ 469.655163] ? ext4_ioctl_group_add+0x560/0x560 [ 469.659816] ? do_futex+0x249/0x27d0 [ 469.663515] ? rcu_is_watching+0x85/0x140 [ 469.668362] ? graph_lock+0x170/0x170 [ 469.672154] ? rcu_bh_force_quiescent_state+0x20/0x20 [ 469.677333] ? rcu_bh_force_quiescent_state+0x20/0x20 [ 469.682505] ? exit_robust_list+0x290/0x290 [ 469.686807] ? find_held_lock+0x36/0x1c0 [ 469.690849] ? lock_downgrade+0x8e0/0x8e0 [ 469.694979] ? kasan_check_read+0x11/0x20 [ 469.699115] ? rcu_is_watching+0x85/0x140 [ 469.703248] ? rcu_bh_force_quiescent_state+0x20/0x20 [ 469.708422] ? __fget+0x40c/0x650 [ 469.711858] ? expand_files.part.8+0x9a0/0x9a0 [ 469.716421] ? trace_hardirqs_off+0xd/0x10 [ 469.720635] ? _raw_spin_unlock_irqrestore+0x63/0xc0 [ 469.725719] ? debug_check_no_obj_freed+0x2ff/0x584 [ 469.730719] ? ext4_ioctl_group_add+0x560/0x560 [ 469.735378] do_vfs_ioctl+0x1cf/0x16a0 [ 469.739253] ? rcu_pm_notify+0xc0/0xc0 [ 469.743123] ? ioctl_preallocate+0x2e0/0x2e0 [ 469.747514] ? fget_raw+0x20/0x20 [ 469.750947] ? putname+0xf2/0x130 [ 469.754389] ? rcu_read_lock_sched_held+0x108/0x120 [ 469.759384] ? kmem_cache_free+0x25c/0x2d0 [ 469.763606] ? __x64_sys_futex+0x477/0x680 [ 469.767825] ? do_futex+0x27d0/0x27d0 [ 469.771609] ? security_file_ioctl+0x94/0xc0 [ 469.776002] ksys_ioctl+0xa9/0xd0 [ 469.779446] __x64_sys_ioctl+0x73/0xb0 [ 469.783313] do_syscall_64+0x1b1/0x800 [ 469.787188] ? finish_task_switch+0x1ca/0x840 [ 469.791665] ? syscall_return_slowpath+0x5c0/0x5c0 [ 469.796575] ? syscall_return_slowpath+0x30f/0x5c0 [ 469.801498] ? entry_SYSCALL_64_after_hwframe+0x59/0xbe [ 469.806843] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 469.811671] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 469.816836] RIP: 0033:0x455a09 [ 469.820005] RSP: 002b:00007f29797edc68 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 469.827700] RAX: ffffffffffffffda RBX: 00007f29797ee6d4 RCX: 0000000000455a09 [ 469.834947] RDX: 0000000020000040 RSI: 000000008004587d RDI: 0000000000000013 [ 469.842196] RBP: 000000000072bea0 R08: 0000000000000000 R09: 0000000000000000 [ 469.849443] R10: 0000000000000000 R11: 0000000000000246 R12: 00000000ffffffff [ 469.856692] R13: 0000000000000273 R14: 00000000006f7b68 R15: 0000000000000000 [ 469.864363] Dumping ftrace buffer: [ 469.867878] (ftrace buffer empty) [ 469.871562] Kernel Offset: disabled [ 469.875167] Rebooting in 86400 seconds..