0xa, 0x0, 0x0, @mcast1={0xff, 0x1, [], 0x1}}}}, 0x48) creat(&(0x7f0000000140)='./file0\x00', 0x8) socketpair(0x3, 0x0, 0xfffffffffffffff7, &(0x7f0000000240)) perf_event_open(&(0x7f000001d000)={0x2, 0x78, 0xe2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$inet6_int(r0, 0x29, 0xc8, &(0x7f00008d6000), 0x4) openat$kvm(0xffffffffffffff9c, &(0x7f0000264ff7)='/dev/kvm\x00', 0x0, 0x0) setsockopt$inet6_int(r0, 0x29, 0xc8, &(0x7f0000ac5000), 0x4) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000000)={@remote, @loopback}, &(0x7f0000000080)=0xc) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000200)=0x0) sigaltstack(&(0x7f0000ffd000/0x1000)=nil, &(0x7f00000003c0)) llistxattr(&(0x7f0000000040)='./file0\x00', &(0x7f0000000180)=""/79, 0x4f) perf_event_open(&(0x7f0000000300)={0x7, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0xc80, 0x0, 0x0, 0x0, 0x401, 0x3a}, r1, 0x8, 0xffffffffffffffff, 0x0) [ 325.027387] kernel msg: ebtables bug: please report to author: entries_size too small 2018/03/30 23:06:16 executing program 3: r0 = socket(0x40000000015, 0x5, 0x0) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000240), 0x4) bind$inet(r0, &(0x7f00008a5ff0)={0x2, 0x4e21, @loopback=0x7f000001}, 0x10) sendto$inet(r0, &(0x7f0000f7db7f)="ba671368d1010000004900000001000000018be49e9301442865319997d0efdb2f54b6a10c7327757482bfce945c2a91fb8dfafc1d3f56bc543ab87321e12cca08a744a2d128b00634bc882151d36809229a96bc3437ef159489384ade077ba295eac2882dbfd3781dd4d4e609c42628dbb709b3eb1fa030009045dd98b9e6d77b6cec9ceb685595d43995e0f04c32260943add79831e661c6a351dedc8b9d220fbf9fb6e44fb6a629ce9a82025124fec9f3ee751f7da0cd7e799be88ddbdac20b48e890ff81d7fa28c2d017d7932f2569038740461accd4582f576e4fdb6150a3399f8266bc19eb943648ad1ad81420ed6c382436e474390c8995e829e4f9df43eed85a60b9ee254e31eb62900857fa134e76cc64880334adbff069a2e5e647d2ed36a96b23834b6f6ca6b8113baf4cf30347fbb7ffc30aea99872cc0dba03b07d3347b2d257edbe2733c26b7337a79962d8ce85469e3bcbe0e4a48a6ae69d13f2d4b5155b390ef67aa714b82b6313ee277cb8986eca5db2e97cb1ae2243bba80274f614ece521baef443394b4c161cb9ae926e21892578b49cfd6efe1cb1572148c10d92218ed73ec116a18de80ac42d2726a4523a764fc6dc356c5fbbf9d2c947ae3bc9a3dc76099f3257c8d5952876151b0326d8cb1d5683ee4ab5ded9a34c00ac1b03f34627ec18a7c2e92c87b7896549cfab5eb55fa85a970994bd4b22b5f0d045e241256d06f485a47b4a55ed389bc1734541232cd41908b5cfa4b8fcfcafce500a0c7ae99767713a98e7927aa69f6ccd7daea62f19ceb82559f41899c9a9aee99113e7e64b5f8b9824be9fdbfa4dd4995673d882bb4daeb64413b334e114965d2ba3cea8051e692508701b9400cb12eae457f8b8549944091b729160939918d8fcae611a48ed665f770db637487a236da1a58ba7566668651a77171fc4fe506496d19059343dbe4f426625d3f2b705f54581372361770bf5a9098a9fafefaf546426b294239ac33e3186e4d58ad2fa995a6ad4dc074e7cca11aead109563b2076c7c6e9f57ec63df960804e2e7f9d8444de9550cca3df7834d864e9777291c2e1f6205de2e43dc995ab8bb1515a365efc2830fa3e7a1dd137f550d6035212bc1f51c3b4ceea430df49ffc9210084ef156ad7e0d219efd6c116693735b44521d389969a3a65617cd2fd6e14060601cee4cd054cf36fe048b57d1d9ee3cad2a73552449926b4a6b03fbe9c0ec68357e1fbe52ed77b67f5870c0aefb7ee8236747e0d67a26725fb515544cbbe8464da94cfd8c0b94bb4e51a263b1749bd0a7cf651931f806d1b928d1f9994f1ad4d50e6a5cd7a8e4e687f8564fdacc864013d095ba9d5709eced3c28eabda476d177a7836400a01e02beed5a6636d4064fdda344967ad8682d14b87c71727cb66be27d1d39191f4223c545b62fb5d60262ba8076a65dbc194cee1df846c584b7bbe9dce6e6895b2cbbb64b03b55548b845cc3de2f939ef918421af9a5e9157e837651245299c03992d0ddee06bd22a31522aca0f309b1feccebc0b1c0ed9d21c19bfd15cd313ff64394fd6a10904890c9f6d646b026f27253e8f584c3ffd20a", 0x46f, 0x0, &(0x7f000069affb)={0x2, 0x4e20, @loopback=0x7f000001}, 0x10) setsockopt$RDS_CONG_MONITOR(r0, 0x114, 0x6, &(0x7f0000000080)=0x1, 0x4) ioctl$int_in(r0, 0x5421, &(0x7f0000000040)=0x56d) sendto$inet(r0, &(0x7f00004b3fff), 0x0, 0x0, &(0x7f00002b4000)={0x2, 0x4e20, @loopback=0x7f000001}, 0x3f6) ioctl$sock_inet_tcp_SIOCOUTQ(r0, 0x5411, &(0x7f0000000000)) 2018/03/30 23:06:16 executing program 6: pipe(&(0x7f0000000940)={0xffffffffffffffff, 0xffffffffffffffff}) accept4$ax25(r0, 0x0, &(0x7f0000000080), 0x80000) r1 = socket$inet(0x2, 0x20000000000003, 0x2) connect$inet(r1, &(0x7f0000000000)={0x2, 0x0, @remote={0xac, 0x14, 0x14, 0xbb}}, 0x10) sendmsg(0xffffffffffffffff, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000140), 0x0, &(0x7f0000000180)=ANY=[]}, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000980)=@broute={'broute\x00', 0x20, 0x3, 0x2d9, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000380], 0x0, &(0x7f00000002c0), &(0x7f0000001000)=ANY=[@ANYBLOB="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"]}, 0x351) setsockopt$inet_int(r1, 0x0, 0x2, &(0x7f00000000c0)=0x7fffffff, 0x4) r2 = socket$rds(0x15, 0x5, 0x0) pipe(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$bt_BT_DEFER_SETUP(r3, 0x112, 0x7, &(0x7f0000000280)=0x100, 0x4) accept$packet(r4, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @remote}, &(0x7f0000000100)=0x14) connect$rds(r2, &(0x7f0000000140)={0x2, 0x4e22, @remote={0xac, 0x14, 0x14, 0xbb}}, 0x10) getsockopt$sock_buf(r2, 0x1, 0x3b, &(0x7f0000000180)=""/83, &(0x7f0000000200)=0x53) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000a00)=@filter={'filter\x00', 0xe, 0x4, 0x5a0, 0xffffffff, 0x0, 0xf0, 0xf0, 0xffffffff, 0xffffffff, 0x4d0, 0x4d0, 0x4d0, 0xffffffff, 0x4, &(0x7f0000000300), {[{{@ipv6={@ipv4={[], [0xff, 0xff], @rand_addr=0x80000001}, @dev={0xfe, 0x80, [], 0x16}, [0x0, 0xffffff00, 0xff, 0xffffffff], [0x0, 0xff000000, 0xffffffff], 'ipddp0\x00', 'ip_vti0\x00', {}, {0xff}, 0x6c, 0x2bf}, 0x0, 0xc8, 0xf0}, @REJECT={0x28, 'REJECT\x00', 0x0, {0x7}}}, {{@ipv6={@remote={0xfe, 0x80, [], 0xbb}, @remote={0xfe, 0x80, [], 0xbb}, [0xff000000, 0xffffffff, 0xffffff00, 0xff], [0xff, 0xffffffff, 0x0, 0xff000000], 'syzkaller1\x00', 'eql\x00', {}, {}, 0x62, 0x0, 0x4, 0x1}, 0x0, 0x120, 0x148, 0x0, {}, [@common=@frag={0x30, 'frag\x00', 0x0, {0x7ff, 0x7, 0x1, 0x2}}, @common=@hl={0x28, 'hl\x00', 0x0, {0x3, 0x7fff}}]}, @REJECT={0x28, 'REJECT\x00', 0x0, {0x7}}}, {{@ipv6={@dev={0xfe, 0x80, [], 0xc}, @loopback={0x0, 0x1}, [0xffffffff, 0xffffffff, 0xff000000, 0xff000000], [0xff, 0x0, 0xff, 0xffffff00], 'irlan0\x00', 'vcan0\x00', {0xff}, {}, 0x3b, 0xffffffffffffab69, 0x2, 0x30}, 0x0, 0x250, 0x298, 0x0, {}, [@common=@srh={0x30, 'srh\x00', 0x0, {0xbb, 0x1, 0x3, 0x6, 0xffffffffffffffc0, 0x80}}, @common=@inet=@policy={0x158, 'policy\x00', 0x0, {[{@ipv4, [0xffffffff, 0xff0000ff, 0xff000000, 0xffffffff], @ipv4=@multicast1=0xe0000001, [0xffffffff, 0xffffffff, 0xff000000, 0xffffff00], 0x4d5, 0x3500, 0x5c, 0x0, 0x10, 0xf}, {@ipv6=@dev={0xfe, 0x80, [], 0x11}, [0x0, 0xff000000, 0xff0000ff, 0xffffff00], @ipv4=@multicast1=0xe0000001, [0xffffffff, 0x0, 0x0, 0xffffffff], 0x4d5, 0x3500, 0x77, 0x1, 0x0, 0x1d}, {@ipv6=@mcast1={0xff, 0x1, [], 0x1}, [0xff000000, 0xffffffff, 0xffffff00, 0xff], @ipv4=@multicast2=0xe0000002, [0xffffffff, 0x0, 0xffffff00, 0xffffffff], 0x4d3, 0x3503, 0x7f, 0x0, 0x1, 0x19}, {@ipv4=@local={0xac, 0x14, 0x14, 0xaa}, [0x0, 0xff, 0x0, 0xff0000ff], @ipv6=@local={0xfe, 0x80, [], 0xaa}, [0xffffffff, 0xffffffff, 0x0, 0xff0000ff], 0x4d4, 0x3505, 0x0, 0x1, 0x1f, 0x10}], 0x0, 0x3}}]}, @common=@unspec=@LED={0x48, 'LED\x00', 0x0, {'syz1\x00', 0x0, 0x8, 0x8}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28, '\x00', 0x0, 0xfffffffffffffffe}}}}, 0x600) socket(0x1, 0xa, 0x7) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_TIMER(r4, 0x40605346, &(0x7f0000000680)={0x1, 0x3, {0x3, 0x0, 0x9, 0x3}}) 2018/03/30 23:06:16 executing program 0 (fault-call:7 fault-nth:22): mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r0 = syz_open_dev$usbmon(&(0x7f0000000400)='/dev/usbmon#\x00', 0x0, 0x0) r1 = perf_event_open(&(0x7f0000223000)={0x2, 0x78, 0xe3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000001980)={{{@in6=@remote, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast2}, 0x0, @in=@multicast2}}, &(0x7f0000001a80)=0xe8) chown(&(0x7f00000004c0)='./file0\x00', r2, 0x0) mount(&(0x7f00000003c0)='./file0\x00', &(0x7f0000000380)='./file0\x00', &(0x7f0000000300)='cgroup2\x00', 0x0, 0x0) r3 = open$dir(&(0x7f000001bff4)='./file0\x00', 0x0, 0x0) mkdirat(r3, &(0x7f0000000280)='./file0\x00', 0x20) getdents64(r3, &(0x7f00000007c0)=""/250, 0x1015a) dup3(r0, r1, 0x80000) r4 = open$dir(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) renameat2(r4, &(0x7f0000000200)='./file1\x00', 0xffffffffffffffff, &(0x7f0000000240)='./file0\x00', 0xfd1092750066ec78) ioctl$KDGKBMODE(0xffffffffffffffff, 0x4b44, &(0x7f0000000140)) 2018/03/30 23:06:16 executing program 5: mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) perf_event_open(&(0x7f0000223000)={0x2, 0x78, 0xe3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000001980)={{{@in6=@remote, @in=@multicast1}}, {{@in=@multicast2}, 0x0, @in=@multicast2}}, &(0x7f0000001a80)=0xe8) mount(&(0x7f00000003c0)='./file0\x00', &(0x7f0000000380)='./file0\x00', &(0x7f0000000300)='cgroup2\x00', 0x0, 0x0) r0 = open$dir(&(0x7f000001bff4)='./file0\x00', 0x0, 0x0) mkdirat(0xffffffffffffffff, &(0x7f0000000280)='./file0\x00', 0x20) syz_mount_image$iso9660(&(0x7f0000000040)='iso9660\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x4, &(0x7f0000000580)=[{&(0x7f0000000100)="1c405f71e9480f101f68d552d86011b8198406636ffb73a4c1859fa95c2440c80921ed053d71f3df1aa3537d9d5a57e522abbeac3bf7804869bd051bbe0f478c9cba2a8fb6bb55bf9e1c640fd58c30ecd4820c22bf7954e93dc05cc1af4dd5b08d84617beb3dc7f82bbccb4d240e9cd3594a6dc0d7cabdafafa0deff312fa4008365f465be91e876d8986293ceefa6d6b0562bfc3e6d17e1ad62f4c6913cbab2435c8bee06553e0f89", 0xa9, 0x7f}, {&(0x7f0000000200)="68e1ae9ab5625bfe659db3871d73345314e6fe7e923b3d8510832010929b5d1f1f44147857ea1cc126621d5a782a5c8aec4a227d4b727c3bb024842c620a7313d40e8108798f55b8fe27862077358e9871fa3c", 0x53}, {&(0x7f0000000400)="c042fd4e745fba458d468d320131609978c1c5830dd1808f28b162837bfc0748e652a1c9a7b914584af71b724576cb6ec80e7a063b83b021ad07a4c7697b51cd6ae6ab9c4dfdd20a6520f3a5adad54b99e888535f05fd576009ab1585af861da0ed4aecef85d9add4d280e07281d8b44977f074d0102afd99f0a38c94f02802b4e443d888694bed803e8da1fd7347e98852087b3e1da8c06614ff1e17eeb07e7c1d1f78681cd7c19927b220dc0cab98fd3350e1b28b4e4c473dc086419aed40f39ea4447e0f7b3c85cbd50f8dc59bb", 0xcf, 0x100000001}, {&(0x7f0000000500)="83fe4b57d91538ef57f15c1245773973be60259b23358892f7605d682e0a57d05346e8b6b1cc7328f411fd4a9af78c63fa1c39e69b50034c2bbff2eced4d9ac554019461224cb26842688e22f1ad6fa3bb88b6016e04d8ab6f85a323042f469bb949fd61c81d714ed6dc7b1a4282701a7b908aa76e1f04a9123cefa80746693d", 0x80, 0x80000001}], 0x2, &(0x7f00000002c0)={[{@gid={'gid', 0x3d, [0x31, 0x0, 0x3f, 0x30, 0x34, 0x37, 0x39, 0x7b, 0x37]}, 0x2c}]}) unlinkat(r0, &(0x7f0000000080)='./file0\x00', 0x200) 2018/03/30 23:06:16 executing program 7: perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f00000000c0)='./control\x00', 0x0) r0 = inotify_init() inotify_add_watch(r0, &(0x7f0000f1eff6)='./control\x00', 0x220000000009) r1 = inotify_init1(0x0) inotify_add_watch(r1, &(0x7f000001eff6)='./control\x00', 0x2000200) rmdir(&(0x7f000075aff6)='./control\x00') [ 325.160568] kernel msg: ebtables bug: please report to author: entries_size too small [ 325.286944] FAULT_INJECTION: forcing a failure. [ 325.286944] name failslab, interval 1, probability 0, space 0, times 0 [ 325.298262] CPU: 1 PID: 25779 Comm: syz-executor0 Not tainted 4.16.0-rc7+ #372 [ 325.305629] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 325.314986] Call Trace: [ 325.317584] dump_stack+0x194/0x24d [ 325.321224] ? arch_local_irq_restore+0x53/0x53 [ 325.325913] should_fail+0x8c0/0xa40 [ 325.329637] ? kstrdup+0x39/0x70 [ 325.333014] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 325.338120] ? cgroup_mkdir+0x553/0xfc0 [ 325.342099] ? vfs_mkdir+0x390/0x600 [ 325.345818] ? SyS_mkdirat+0x22b/0x2b0 [ 325.349705] ? do_syscall_64+0x281/0x940 [ 325.353778] ? entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 325.359152] ? find_held_lock+0x35/0x1d0 [ 325.363229] ? find_held_lock+0x35/0x1d0 [ 325.367307] ? __lock_is_held+0xb6/0x140 [ 325.371392] ? check_same_owner+0x320/0x320 [ 325.375729] ? rcu_note_context_switch+0x710/0x710 [ 325.380669] ? rcu_read_lock_sched_held+0x108/0x120 [ 325.385703] should_failslab+0xec/0x120 [ 325.389680] kmem_cache_alloc+0x47/0x760 [ 325.393737] ? memcpy+0x45/0x50 [ 325.397015] ? kstrdup+0x59/0x70 [ 325.400385] __kernfs_new_node+0xe2/0x570 [ 325.404531] ? kernfs_dop_revalidate+0x380/0x380 [ 325.409294] ? kasan_check_read+0x11/0x20 [ 325.413445] ? read_word_at_a_time+0x12/0x20 [ 325.417859] ? strscpy+0x186/0x500 [ 325.421413] kernfs_new_node+0x80/0xe0 [ 325.425321] __kernfs_create_file+0x4b/0x320 [ 325.429736] cgroup_addrm_files+0x3c5/0xa70 [ 325.434063] ? cgroup_file_write+0x710/0x710 [ 325.438457] ? getrawmonotonic64+0x460/0x460 [ 325.442847] ? kernfs_active+0x92/0x160 [ 325.446800] ? debug_lockdep_rcu_enabled+0x77/0x90 [ 325.451706] ? cgroup_kn_set_ugid+0x2c7/0x370 [ 325.456182] ? cgroup_file_name+0x1d0/0x1d0 [ 325.460486] css_populate_dir+0x340/0x420 [ 325.464613] cgroup_mkdir+0x553/0xfc0 [ 325.468390] ? __lock_is_held+0xb6/0x140 [ 325.472432] ? cgroup_destroy_locked+0x750/0x750 [ 325.477164] ? rcu_read_lock_sched_held+0x108/0x120 [ 325.482155] ? kmem_cache_free+0x258/0x2a0 [ 325.486368] ? set_nlink+0xc1/0x160 [ 325.489970] ? debug_lockdep_rcu_enabled+0x77/0x90 [ 325.494873] ? generic_permission+0x105/0x3c0 [ 325.499347] ? cgroup_destroy_locked+0x750/0x750 [ 325.504079] kernfs_iop_mkdir+0x153/0x1e0 [ 325.508207] vfs_mkdir+0x390/0x600 [ 325.511723] SyS_mkdirat+0x22b/0x2b0 [ 325.515421] ? SyS_mknod+0x480/0x480 [ 325.519110] ? trace_hardirqs_on+0xd/0x10 [ 325.523235] ? do_syscall_64+0xb7/0x940 [ 325.527186] ? SyS_mknod+0x480/0x480 [ 325.530875] do_syscall_64+0x281/0x940 [ 325.534739] ? vmalloc_sync_all+0x30/0x30 [ 325.538862] ? _raw_spin_unlock_irq+0x27/0x70 [ 325.543330] ? finish_task_switch+0x1c1/0x7e0 [ 325.547803] ? syscall_return_slowpath+0x550/0x550 [ 325.552707] ? syscall_return_slowpath+0x2ac/0x550 [ 325.557615] ? prepare_exit_to_usermode+0x350/0x350 [ 325.562611] ? entry_SYSCALL_64_after_hwframe+0x52/0xb7 [ 325.567954] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 325.572778] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 325.577945] RIP: 0033:0x454e79 2018/03/30 23:06:17 executing program 5: mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r0 = perf_event_open(&(0x7f0000223000)={0x2, 0x78, 0xe3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000001980)={{{@in6=@remote, @in=@multicast1}}, {{@in=@multicast2}, 0x0, @in=@multicast2}}, &(0x7f0000000240)=0xe8) mount(&(0x7f00000003c0)='./file0\x00', &(0x7f0000000380)='./file0\x00', &(0x7f0000000300)='cgroup2\x00', 0x0, 0x0) r1 = open$dir(&(0x7f000001bff4)='./file0\x00', 0x0, 0x0) mkdirat(0xffffffffffffffff, &(0x7f0000000280)='./file0\x00', 0x20) getsockopt$inet_sctp6_SCTP_ASSOCINFO(r1, 0x84, 0x1, &(0x7f0000000040)={0x0, 0x2, 0xfffffffffffff801, 0x8, 0x2, 0x5}, &(0x7f00000000c0)=0x14) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDR_INFO(r0, 0x84, 0xf, &(0x7f0000000100)={r2, @in={{0x2, 0x4e21}}, 0x80, 0x8, 0x9, 0xce5d}, &(0x7f0000000200)=0x98) unlinkat(r1, &(0x7f0000000080)='./file0\x00', 0x200) 2018/03/30 23:06:17 executing program 4: mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000140)='/dev/rtc\x00', 0x40000, 0x0) connect$pptp(r0, &(0x7f0000000240)={0x18, 0x2, {0x0, @loopback=0x7f000001}}, 0x1e) mount(&(0x7f000000a000)='./file0\x00', &(0x7f0000026ff8)='./file0\x00', &(0x7f000000c000)='ramfs\x00', 0x0, &(0x7f000000a000)) mkdir(&(0x7f0000000000)='./file1\x00', 0x0) mount(&(0x7f0000000040)='./file0\x00', &(0x7f0000903000)='./file0\x00', &(0x7f0000811ffa)='bdev\x00', 0x100000, &(0x7f00000003c0)="b4654e059fcebd03cc73f9239f6a07ed22ce66385d2337eef2a66d904034c83627a12afc1ecb8d7e1142c51440c631a77475529f58d06474cd08984ca20eda40006f352aef263558961ab3f1ff300b08a5b54aea2a56162623142af3cce1057c8ee9eb15dc98e01846afc544b424ae134364f0ff76c92d9ce550f032a00c5981d459112f5c70789ed3bbb5527400465c6a98b4e0432a1ca8ce37dfdc7619e8b4129ee976c9b944bc6b366dbc5f0dae558fa30da2267dfccc6187d2d6f34d725343470a748007fee97ba3784d030b833463699073719ca14a0e9b6d74a70db8b216256fcd74c66a0faac2ccc16c74a7e13289091a5256dd062edf07ff4d9168e49b0820c6bb9fbabc587b54dacb9834b644eafefc1e0a4dd249c45cac5858364765a08967ed59ac86aefcb7d13e3e9cdf7c7262122bc4cfd718c3fd984395afa896d48a48489f889bd4efac7267dffdff0c686fae") r1 = dup(0xffffffffffffffff) r2 = syz_open_dev$vcsn(&(0x7f00000000c0)='/dev/vcs#\x00', 0x2, 0x20800) renameat(r1, &(0x7f0000000080)='./file1/file0\x00', r2, &(0x7f0000000100)='./file1\x00') mount(&(0x7f0000fb6000)='./file0\x00', &(0x7f0000d78000)='.', &(0x7f0000fdb000)='ubifs\x00', 0x1003, 0x0) mount(&(0x7f00002b9ff8)='./file0\x00', &(0x7f0000cbeff8)='./file0\x00', &(0x7f00005f7ffa)='ramfs\x00', 0x80000, &(0x7f000002f000)) mount(&(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)='./file1\x00', &(0x7f0000000200)='anon_inodefs\x00', 0x2000, &(0x7f0000000240)) mount(&(0x7f0000adcff8)='./file0\x00', &(0x7f0000e08fff)='.', &(0x7f00005e9000)='cifs\x00', 0x2000, &(0x7f0000ad5000)) 2018/03/30 23:06:17 executing program 7: perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f00000000c0)='./control\x00', 0x0) r0 = inotify_init() prctl$setendian(0x14, 0x2) inotify_add_watch(r0, &(0x7f0000f1eff6)='./control\x00', 0x220000000009) r1 = inotify_init1(0x0) r2 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000001c0)='/proc/self/net/pfkey\x00', 0x80100, 0x0) getsockopt$inet_sctp6_SCTP_DEFAULT_SNDINFO(0xffffffffffffffff, 0x84, 0x22, &(0x7f0000000440)={0x1, 0xa, 0x5, 0x8001, 0x0}, &(0x7f0000000480)=0x10) setsockopt$inet_sctp_SCTP_ENABLE_STREAM_RESET(r2, 0x84, 0x76, &(0x7f00000004c0)={r3, 0xffffffff}, 0x8) inotify_add_watch(r1, &(0x7f000001eff6)='./control\x00', 0x2000200) execve(&(0x7f0000000040)='./control\x00', &(0x7f00000002c0)=[&(0x7f0000000100)='-\x00', &(0x7f0000000140)='\x00', &(0x7f0000000180)='\x00', &(0x7f0000000080)='#vboxnet1\x00', &(0x7f0000000200)='}-\x00', &(0x7f0000000240)='\x00', &(0x7f0000000280)="e5642747504c5dd6262c00"], &(0x7f0000000380)=[&(0x7f0000000300)='\x00', &(0x7f0000000340)='@^posix_acl_access\x00']) socketpair$inet6(0xa, 0x80000, 0x4, &(0x7f0000000400)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$inet6_tcp_TCP_FASTOPEN_KEY(r4, 0x6, 0x21, &(0x7f00000003c0)="5fce869db66fa225921ad03d773be4ff", 0x10) rmdir(&(0x7f000075aff6)='./control\x00') 2018/03/30 23:06:17 executing program 6: pipe(&(0x7f0000000940)={0xffffffffffffffff, 0xffffffffffffffff}) accept4$ax25(r0, 0x0, &(0x7f0000000080), 0x80000) r1 = socket$inet(0x2, 0x20000000000003, 0x2) connect$inet(r1, &(0x7f0000000000)={0x2, 0x0, @remote={0xac, 0x14, 0x14, 0xbb}}, 0x10) sendmsg(0xffffffffffffffff, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000140), 0x0, &(0x7f0000000180)=ANY=[]}, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000980)=@broute={'broute\x00', 0x20, 0x3, 0x2d9, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000380], 0x0, &(0x7f00000002c0), &(0x7f0000001000)=ANY=[@ANYBLOB="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"]}, 0x351) setsockopt$inet_int(r1, 0x0, 0x2, &(0x7f00000000c0)=0x7fffffff, 0x4) r2 = socket$rds(0x15, 0x5, 0x0) pipe(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$bt_BT_DEFER_SETUP(r3, 0x112, 0x7, &(0x7f0000000280)=0x100, 0x4) accept$packet(r4, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @remote}, &(0x7f0000000100)=0x14) connect$rds(r2, &(0x7f0000000140)={0x2, 0x4e22, @remote={0xac, 0x14, 0x14, 0xbb}}, 0x10) getsockopt$sock_buf(r2, 0x1, 0x3b, &(0x7f0000000180)=""/83, &(0x7f0000000200)=0x53) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000a00)=@filter={'filter\x00', 0xe, 0x4, 0x5a0, 0xffffffff, 0x0, 0xf0, 0xf0, 0xffffffff, 0xffffffff, 0x4d0, 0x4d0, 0x4d0, 0xffffffff, 0x4, &(0x7f0000000300), {[{{@ipv6={@ipv4={[], [0xff, 0xff], @rand_addr=0x80000001}, @dev={0xfe, 0x80, [], 0x16}, [0x0, 0xffffff00, 0xff, 0xffffffff], [0x0, 0xff000000, 0xffffffff], 'ipddp0\x00', 'ip_vti0\x00', {}, {0xff}, 0x6c, 0x2bf}, 0x0, 0xc8, 0xf0}, @REJECT={0x28, 'REJECT\x00', 0x0, {0x7}}}, {{@ipv6={@remote={0xfe, 0x80, [], 0xbb}, @remote={0xfe, 0x80, [], 0xbb}, [0xff000000, 0xffffffff, 0xffffff00, 0xff], [0xff, 0xffffffff, 0x0, 0xff000000], 'syzkaller1\x00', 'eql\x00', {}, {}, 0x62, 0x0, 0x4, 0x1}, 0x0, 0x120, 0x148, 0x0, {}, [@common=@frag={0x30, 'frag\x00', 0x0, {0x7ff, 0x7, 0x1, 0x2}}, @common=@hl={0x28, 'hl\x00', 0x0, {0x3, 0x7fff}}]}, @REJECT={0x28, 'REJECT\x00', 0x0, {0x7}}}, {{@ipv6={@dev={0xfe, 0x80, [], 0xc}, @loopback={0x0, 0x1}, [0xffffffff, 0xffffffff, 0xff000000, 0xff000000], [0xff, 0x0, 0xff, 0xffffff00], 'irlan0\x00', 'vcan0\x00', {0xff}, {}, 0x3b, 0xffffffffffffab69, 0x2, 0x30}, 0x0, 0x250, 0x298, 0x0, {}, [@common=@srh={0x30, 'srh\x00', 0x0, {0xbb, 0x1, 0x3, 0x6, 0xffffffffffffffc0, 0x80}}, @common=@inet=@policy={0x158, 'policy\x00', 0x0, {[{@ipv4, [0xffffffff, 0xff0000ff, 0xff000000, 0xffffffff], @ipv4=@multicast1=0xe0000001, [0xffffffff, 0xffffffff, 0xff000000, 0xffffff00], 0x4d5, 0x3500, 0x5c, 0x0, 0x10, 0xf}, {@ipv6=@dev={0xfe, 0x80, [], 0x11}, [0x0, 0xff000000, 0xff0000ff, 0xffffff00], @ipv4=@multicast1=0xe0000001, [0xffffffff, 0x0, 0x0, 0xffffffff], 0x4d5, 0x3500, 0x77, 0x1, 0x0, 0x1d}, {@ipv6=@mcast1={0xff, 0x1, [], 0x1}, [0xff000000, 0xffffffff, 0xffffff00, 0xff], @ipv4=@multicast2=0xe0000002, [0xffffffff, 0x0, 0xffffff00, 0xffffffff], 0x4d3, 0x3503, 0x7f, 0x0, 0x1, 0x19}, {@ipv4=@local={0xac, 0x14, 0x14, 0xaa}, [0x0, 0xff, 0x0, 0xff0000ff], @ipv6=@local={0xfe, 0x80, [], 0xaa}, [0xffffffff, 0xffffffff, 0xff], 0x4d4, 0x3505, 0x0, 0x1, 0x1f, 0x10}], 0x0, 0x3}}]}, @common=@unspec=@LED={0x48, 'LED\x00', 0x0, {'syz1\x00', 0x0, 0x8, 0x8}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28, '\x00', 0x0, 0xfffffffffffffffe}}}}, 0x600) socket(0x1, 0xa, 0x7) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_TIMER(r4, 0x40605346, &(0x7f0000000680)={0x1, 0x3, {0x3, 0x0, 0x9, 0x3}}) 2018/03/30 23:06:17 executing program 2: socket$inet_sctp(0x2, 0x0, 0x84) write$rdma_cm(0xffffffffffffffff, &(0x7f00000000c0)=ANY=[@ANYBLOB], 0x0) write$rdma_cm(0xffffffffffffffff, &(0x7f00000003c0)=ANY=[@ANYBLOB="031a4f2f7f000000dde30000000000000000000000000000000000000000000100005dd45591dac827000000ff01000000000000000000000000000000000000"], 0x40) write$rdma_cm(0xffffffffffffffff, &(0x7f0000000440)=@resolve_ip={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x1, [], 0x1}}, {0xa, 0x0, 0x0, @mcast1={0xff, 0x1, [], 0x1}}}}, 0x48) r0 = creat(&(0x7f0000000140)='./file0\x00', 0x8) socketpair(0x3, 0x0, 0xfffffffffffffff7, &(0x7f0000000240)) perf_event_open(&(0x7f000001d000)={0x2, 0x78, 0xe2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$inet6_int(r1, 0x29, 0xc8, &(0x7f00008d6000), 0x4) openat$kvm(0xffffffffffffff9c, &(0x7f0000264ff7)='/dev/kvm\x00', 0x0, 0x0) setsockopt$inet6_int(r1, 0x29, 0xc8, &(0x7f0000ac5000), 0x4) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000000)={@remote, @loopback}, &(0x7f0000000080)=0xc) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000200)=0x0) sigaltstack(&(0x7f0000ffd000/0x1000)=nil, &(0x7f00000003c0)) llistxattr(&(0x7f0000000040)='./file0\x00', &(0x7f0000000180)=""/79, 0x4f) perf_event_open(&(0x7f0000000300)={0x7, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0xc80, 0x0, 0x0, 0x0, 0x401, 0x3a}, r2, 0x8, 0xffffffffffffffff, 0x0) ioctl$KVM_ASSIGN_SET_INTX_MASK(r0, 0x4040aea4, &(0x7f00000000c0)={0xff, 0x0, 0x9b, 0x0, 0x800}) 2018/03/30 23:06:17 executing program 0 (fault-call:7 fault-nth:23): mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r0 = syz_open_dev$usbmon(&(0x7f0000000400)='/dev/usbmon#\x00', 0x0, 0x0) r1 = perf_event_open(&(0x7f0000223000)={0x2, 0x78, 0xe3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000001980)={{{@in6=@remote, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast2}, 0x0, @in=@multicast2}}, &(0x7f0000001a80)=0xe8) chown(&(0x7f00000004c0)='./file0\x00', r2, 0x0) mount(&(0x7f00000003c0)='./file0\x00', &(0x7f0000000380)='./file0\x00', &(0x7f0000000300)='cgroup2\x00', 0x0, 0x0) r3 = open$dir(&(0x7f000001bff4)='./file0\x00', 0x0, 0x0) mkdirat(r3, &(0x7f0000000280)='./file0\x00', 0x20) getdents64(r3, &(0x7f00000007c0)=""/250, 0x1015a) dup3(r0, r1, 0x80000) r4 = open$dir(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) renameat2(r4, &(0x7f0000000200)='./file1\x00', 0xffffffffffffffff, &(0x7f0000000240)='./file0\x00', 0xfd1092750066ec78) ioctl$KDGKBMODE(0xffffffffffffffff, 0x4b44, &(0x7f0000000140)) 2018/03/30 23:06:17 executing program 3: r0 = socket(0x40000000015, 0x5, 0x0) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000240), 0x4) bind$inet(r0, &(0x7f00008a5ff0)={0x2, 0x4e21, @loopback=0x7f000001}, 0x10) sendto$inet(r0, &(0x7f0000f7db7f)="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", 0x46f, 0x0, &(0x7f000069affb)={0x2, 0x4e20, @loopback=0x7f000001}, 0x10) setsockopt$RDS_CONG_MONITOR(r0, 0x114, 0x6, &(0x7f0000000080)=0x1, 0x4) ioctl$int_in(r0, 0x5421, &(0x7f0000000040)=0x56d) sendto$inet(r0, &(0x7f00004b3fff), 0x0, 0x0, &(0x7f00002b4000)={0x2, 0x4e20, @loopback=0x7f000001}, 0x3f6) ioctl$sock_inet_tcp_SIOCOUTQ(r0, 0x5411, &(0x7f0000000000)) 2018/03/30 23:06:17 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x200, 0x0) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000680)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$sock_linger(r2, 0x1, 0xd, &(0x7f00000006c0)={0x400, 0x9}, 0x8) perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x0, 0x0) r3 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) mmap(&(0x7f0000000000/0x9d7000)=nil, 0x9d7000, 0x0, 0x10, 0xffffffffffffffff, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x7) perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r4 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r4, &(0x7f0000e5b000)={0x2, 0x4e20, @multicast1=0xe0000001}, 0x10) syz_open_dev$sg(&(0x7f0000000440)='/dev/sg#\x00', 0x0, 0x0) connect$inet(r4, &(0x7f0000000100)={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x11}}, 0x10) r5 = bpf$PROG_LOAD(0x5, &(0x7f0000eb0fb8)={0x1, 0x3, &(0x7f00009ff000)=@framed={{0x18}, [], {0x95}}, &(0x7f00002bf000)='syzkaller\x00', 0x4, 0xb7, &(0x7f00006ab000)=""/183}, 0x48) setsockopt$inet_tcp_int(r4, 0x6, 0x19, &(0x7f0000000240)=0x8, 0x4) r6 = socket$kcm(0x29, 0x2, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r6, 0x89e0, &(0x7f000031aff8)={r4, r5}) ioctl$sock_kcm_SIOCKCMCLONE(r6, 0x89e2, &(0x7f00000002c0)={0xffffffffffffffff}) sendmsg$nl_xfrm(r7, &(0x7f0000000780)={&(0x7f0000000200)={0x10}, 0xc, &(0x7f0000000740)={&(0x7f0000000480)=@updpolicy={0xb8, 0x19, 0x0, 0x0, 0x0, {{@in=@loopback=0x7f000001, @in6=@mcast1={0xff, 0x1, [], 0x1}}}}, 0xffcb}, 0x1}, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(r7, 0x89e1, &(0x7f0000000040)={r4}) r8 = fcntl$getown(0xffffffffffffffff, 0x9) recvfrom$inet6(r1, &(0x7f0000000140)=""/177, 0xb1, 0x40000000, &(0x7f0000000080)={0xa, 0x4e23, 0x9, @empty, 0xe38}, 0x1c) r9 = accept4$inet(0xffffffffffffff9c, &(0x7f0000000700)={0x0, 0x0, @broadcast}, &(0x7f0000000740)=0x10, 0x80000) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r9, 0x84, 0x64, &(0x7f0000000780)=[@in6={0xa, 0x4e22, 0xfffffffffffff7e1, @mcast2={0xff, 0x2, [], 0x1}, 0x8}, @in={0x2, 0x4e24, @broadcast=0xffffffff}], 0x2c) ptrace$setregset(0x4205, r8, 0x0, &(0x7f00000005c0)={&(0x7f0000000080)}) ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r10 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x1fffd, 0x0) r11 = syz_open_dev$sndtimer(&(0x7f00000000c0)='/dev/snd/timer\x00', 0x0, 0x0) read(r11, &(0x7f0000ec6000)=""/50, 0x32) fcntl$dupfd(r11, 0x0, r10) [ 325.581109] RSP: 002b:00007f016b92fc68 EFLAGS: 00000246 ORIG_RAX: 0000000000000102 [ 325.588795] RAX: ffffffffffffffda RBX: 00007f016b9306d4 RCX: 0000000000454e79 [ 325.596040] RDX: 0000000000000020 RSI: 0000000020000280 RDI: 0000000000000015 [ 325.603284] RBP: 000000000072bea0 R08: 0000000000000000 R09: 0000000000000000 [ 325.610531] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000016 [ 325.617777] R13: 00000000000003eb R14: 00000000006f7ea8 R15: 0000000000000016 [ 325.625227] cgroup: cgroup_addrm_files: failed to add cgroup.max.depth, err=-12 [ 325.686800] kernel msg: ebtables bug: please report to author: entries_size too small 2018/03/30 23:06:17 executing program 6: pipe(&(0x7f0000000940)={0xffffffffffffffff, 0xffffffffffffffff}) accept4$ax25(r0, 0x0, &(0x7f0000000080), 0x80000) r1 = socket$inet(0x2, 0x20000000000003, 0x2) connect$inet(r1, &(0x7f0000000000)={0x2, 0x0, @remote={0xac, 0x14, 0x14, 0xbb}}, 0x10) sendmsg(0xffffffffffffffff, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000140), 0x0, &(0x7f0000000180)=ANY=[]}, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000980)=@broute={'broute\x00', 0x20, 0x3, 0x2d9, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000380], 0x0, &(0x7f00000002c0), &(0x7f0000001000)=ANY=[@ANYBLOB="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"]}, 0x351) setsockopt$inet_int(r1, 0x0, 0x2, &(0x7f00000000c0)=0x7fffffff, 0x4) r2 = socket$rds(0x15, 0x5, 0x0) pipe(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$bt_BT_DEFER_SETUP(r3, 0x112, 0x7, &(0x7f0000000280)=0x100, 0x4) accept$packet(r4, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @remote}, &(0x7f0000000100)=0x14) connect$rds(r2, &(0x7f0000000140)={0x2, 0x4e22, @remote={0xac, 0x14, 0x14, 0xbb}}, 0x10) getsockopt$sock_buf(r2, 0x1, 0x3b, &(0x7f0000000180)=""/83, &(0x7f0000000200)=0x53) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000a00)=@filter={'filter\x00', 0xe, 0x4, 0x5a0, 0xffffffff, 0x0, 0xf0, 0xf0, 0xffffffff, 0xffffffff, 0x4d0, 0x4d0, 0x4d0, 0xffffffff, 0x4, &(0x7f0000000300), {[{{@ipv6={@ipv4={[], [0xff, 0xff], @rand_addr=0x80000001}, @dev={0xfe, 0x80, [], 0x16}, [0x0, 0xffffff00, 0xff, 0xffffffff], [0x0, 0xff000000, 0xffffffff], 'ipddp0\x00', 'ip_vti0\x00', {}, {0xff}, 0x6c, 0x2bf}, 0x0, 0xc8, 0xf0}, @REJECT={0x28, 'REJECT\x00', 0x0, {0x7}}}, {{@ipv6={@remote={0xfe, 0x80, [], 0xbb}, @remote={0xfe, 0x80, [], 0xbb}, [0xff000000, 0xffffffff, 0xffffff00, 0xff], [0xff, 0xffffffff, 0x0, 0xff000000], 'syzkaller1\x00', 'eql\x00', {}, {}, 0x62, 0x0, 0x4, 0x1}, 0x0, 0x120, 0x148, 0x0, {}, [@common=@frag={0x30, 'frag\x00', 0x0, {0x7ff, 0x7, 0x1, 0x2}}, @common=@hl={0x28, 'hl\x00', 0x0, {0x3, 0x7fff}}]}, @REJECT={0x28, 'REJECT\x00', 0x0, {0x7}}}, {{@ipv6={@dev={0xfe, 0x80, [], 0xc}, @loopback={0x0, 0x1}, [0xffffffff, 0xffffffff, 0xff000000, 0xff000000], [0xff, 0x0, 0xff, 0xffffff00], 'irlan0\x00', 'vcan0\x00', {0xff}, {}, 0x3b, 0xffffffffffffab69, 0x2, 0x30}, 0x0, 0x250, 0x298, 0x0, {}, [@common=@srh={0x30, 'srh\x00', 0x0, {0xbb, 0x1, 0x3, 0x6, 0xffffffffffffffc0, 0x80}}, @common=@inet=@policy={0x158, 'policy\x00', 0x0, {[{@ipv4, [0xffffffff, 0xff0000ff, 0xff000000, 0xffffffff], @ipv4=@multicast1=0xe0000001, [0xffffffff, 0xffffffff, 0xff000000, 0xffffff00], 0x4d5, 0x3500, 0x5c, 0x0, 0x10, 0xf}, {@ipv6=@dev={0xfe, 0x80, [], 0x11}, [0x0, 0xff000000, 0xff0000ff, 0xffffff00], @ipv4=@multicast1=0xe0000001, [0xffffffff, 0x0, 0x0, 0xffffffff], 0x4d5, 0x3500, 0x77, 0x1, 0x0, 0x1d}, {@ipv6=@mcast1={0xff, 0x1, [], 0x1}, [0xff000000, 0xffffffff, 0xffffff00, 0xff], @ipv4=@multicast2=0xe0000002, [0xffffffff, 0x0, 0xffffff00, 0xffffffff], 0x4d3, 0x3503, 0x7f, 0x0, 0x1, 0x19}, {@ipv4=@local={0xac, 0x14, 0x14, 0xaa}, [0x0, 0xff, 0x0, 0xff0000ff], @ipv6=@local={0xfe, 0x80, [], 0xaa}, [0xffffffff, 0xffffffff, 0xff], 0x4d4, 0x3505, 0x0, 0x1, 0x1f, 0x10}], 0x0, 0x3}}]}, @common=@unspec=@LED={0x48, 'LED\x00', 0x0, {'syz1\x00', 0x0, 0x8, 0x8}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28, '\x00', 0x0, 0xfffffffffffffffe}}}}, 0x600) socket(0x1, 0xa, 0x7) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_TIMER(r4, 0x40605346, &(0x7f0000000680)={0x1, 0x3, {0x3, 0x0, 0x9, 0x3}}) 2018/03/30 23:06:17 executing program 3: r0 = socket(0x40000000015, 0x5, 0x0) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000240), 0x4) bind$inet(r0, &(0x7f00008a5ff0)={0x2, 0x4e21, @loopback=0x7f000001}, 0x10) sendto$inet(r0, &(0x7f0000f7db7f)="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", 0x478, 0x0, &(0x7f000069affb)={0x2, 0x4e20, @loopback=0x7f000001}, 0x10) setsockopt$RDS_CONG_MONITOR(r0, 0x114, 0x6, &(0x7f0000000080)=0x1, 0x4) ioctl$int_in(r0, 0x5421, &(0x7f0000000040)=0x56d) sendto$inet(r0, &(0x7f00004b3fff), 0x0, 0x0, &(0x7f00002b4000)={0x2, 0x4e20, @loopback=0x7f000001}, 0x3f6) ioctl$sock_inet_tcp_SIOCOUTQ(r0, 0x5411, &(0x7f0000000000)) 2018/03/30 23:06:17 executing program 5: mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r0 = perf_event_open(&(0x7f0000223000)={0x2, 0x78, 0xe3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000001980)={{{@in6=@remote, @in=@multicast1}}, {{@in=@multicast2}, 0x0, @in=@multicast2}}, &(0x7f0000001a80)=0xe8) mount(&(0x7f00000003c0)='./file0\x00', &(0x7f0000000380)='./file0\x00', &(0x7f0000000400)="85874a6dba0a4d4d375ceede050274ea3f89cff4b1066c08000000000000f01ed56f755dfcf250d11ab102007c3941320bd46a553a3d1d7809816a3316660000000000000000000000000000701e375ac1aa5cb5150a1a9900465b7429a26b3563872a6cf2a9a182e72eb5095b5f50dc332eef6b2d919d18752c5c32d97a833d2c95ba38563f1829d0ec9e06a385e108922f1d04e44646ad9e5c9f5cbc14f7c893f59df7d0753ba4ec4d690df9d77e42d422348e0a45b7c8e1da12afede0fcb68314fe074993a87c94f6bd137a2838fd7d3e939acc95f01acbf0b856c15401842d65ca2772", 0x0, 0x0) setsockopt$RDS_GET_MR(r0, 0x114, 0x2, &(0x7f0000000240)={{&(0x7f00000000c0)=""/202, 0xca}, &(0x7f0000000200), 0x1}, 0x20) r1 = open$dir(&(0x7f000001bff4)='./file0\x00', 0x0, 0x0) mkdirat(0xffffffffffffffff, &(0x7f0000000280)='./file0\x00', 0x20) unlinkat(r1, &(0x7f0000000080)='./file0\x00', 0x200) chmod(&(0x7f0000000040)='./file0\x00', 0x80) 2018/03/30 23:06:17 executing program 4: mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount(&(0x7f000000a000)='./file0\x00', &(0x7f0000026ff8)='./file0\x00', &(0x7f000000c000)='ramfs\x00', 0x0, &(0x7f000000a000)) mkdir(&(0x7f0000000000)='./file1\x00', 0x0) mount(&(0x7f0000000040)='./file0\x00', &(0x7f0000903000)='./file0\x00', &(0x7f0000811ffa)='bdev\x00', 0x100000, &(0x7f00000003c0)="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") r0 = dup(0xffffffffffffffff) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0xc) quotactl(0x1, &(0x7f0000000140)='.', r1, &(0x7f00000002c0)="1bb7a26b81c400ddc1fe675335ade1d0adb4f5c4a826907d5d7927b04f1b547f43970f5950de652b119dc6") r2 = syz_open_dev$vcsn(&(0x7f00000000c0)='/dev/vcs#\x00', 0x2, 0x20800) renameat(r0, &(0x7f0000000080)='./file1/file0\x00', r2, &(0x7f0000000100)='./file1\x00') mount(&(0x7f0000fb6000)='./file0\x00', &(0x7f0000d78000)='.', &(0x7f0000fdb000)='ubifs\x00', 0x1003, 0x0) mount(&(0x7f00002b9ff8)='./file0\x00', &(0x7f0000cbeff8)='./file0\x00', &(0x7f00005f7ffa)='ramfs\x00', 0x80000, &(0x7f000002f000)) mount(&(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)='./file1\x00', &(0x7f0000000200)='anon_inodefs\x00', 0x2000, &(0x7f0000000240)) mount(&(0x7f0000adcff8)='./file0\x00', &(0x7f0000e08fff)='.', &(0x7f00005e9000)='cifs\x00', 0x2000, &(0x7f0000ad5000)) [ 325.807628] kernel msg: ebtables bug: please report to author: entries_size too small [ 325.832718] FAULT_INJECTION: forcing a failure. [ 325.832718] name failslab, interval 1, probability 0, space 0, times 0 [ 325.844102] CPU: 0 PID: 25816 Comm: syz-executor0 Not tainted 4.16.0-rc7+ #372 2018/03/30 23:06:17 executing program 7: perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f00000000c0)='./control\x00', 0x0) r0 = inotify_init() inotify_add_watch(r0, &(0x7f0000f1eff6)='./control\x00', 0x220000000009) r1 = inotify_init1(0x0) inotify_add_watch(r1, &(0x7f0000000100)='./control\x00', 0x2000204) setsockopt$inet6_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, &(0x7f0000000080)="5fce869db66fa225921ad03d773be4ff", 0x10) rmdir(&(0x7f0000000180)='./control\x00') [ 325.851473] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 325.860835] Call Trace: [ 325.863437] dump_stack+0x194/0x24d [ 325.867080] ? arch_local_irq_restore+0x53/0x53 [ 325.871776] should_fail+0x8c0/0xa40 [ 325.875506] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 325.880619] ? kernfs_add_one+0x50/0x450 [ 325.884695] ? kernfs_add_one+0x50/0x450 [ 325.888766] ? trace_event_raw_event_lock+0x340/0x340 [ 325.893965] ? trace_hardirqs_off+0x10/0x10 [ 325.898307] ? find_held_lock+0x35/0x1d0 [ 325.902395] ? __lock_is_held+0xb6/0x140 [ 325.906488] ? check_same_owner+0x320/0x320 [ 325.910818] ? lock_downgrade+0x980/0x980 [ 325.914980] ? rcu_note_context_switch+0x710/0x710 [ 325.919934] should_failslab+0xec/0x120 [ 325.923926] __kmalloc_track_caller+0x5f/0x760 [ 325.928521] ? idr_alloc_cyclic+0x1d6/0x320 [ 325.932858] ? kstrdup_const+0x39/0x50 [ 325.936751] ? __mutex_unlock_slowpath+0xe9/0xac0 [ 325.941611] kstrdup+0x39/0x70 [ 325.944816] kstrdup_const+0x39/0x50 [ 325.948535] __kernfs_new_node+0xa2/0x570 [ 325.952697] ? kernfs_dop_revalidate+0x380/0x380 [ 325.957477] ? kasan_check_read+0x11/0x20 [ 325.961634] ? read_word_at_a_time+0x12/0x20 [ 325.966051] ? strscpy+0x186/0x500 [ 325.969621] kernfs_new_node+0x80/0xe0 [ 325.973524] __kernfs_create_file+0x4b/0x320 [ 325.977950] cgroup_addrm_files+0x3c5/0xa70 [ 325.982298] ? cgroup_file_write+0x710/0x710 [ 325.986730] ? getrawmonotonic64+0x460/0x460 [ 325.991152] ? kernfs_active+0x92/0x160 [ 325.995136] ? debug_lockdep_rcu_enabled+0x77/0x90 [ 326.000070] ? cgroup_kn_set_ugid+0x2c7/0x370 [ 326.004571] ? cgroup_file_name+0x1d0/0x1d0 [ 326.008910] css_populate_dir+0x340/0x420 [ 326.013068] cgroup_mkdir+0x553/0xfc0 [ 326.016871] ? __lock_is_held+0xb6/0x140 [ 326.020933] ? cgroup_destroy_locked+0x750/0x750 [ 326.025673] ? rcu_read_lock_sched_held+0x108/0x120 [ 326.030670] ? kmem_cache_free+0x258/0x2a0 [ 326.034901] ? set_nlink+0xc1/0x160 [ 326.038531] ? debug_lockdep_rcu_enabled+0x77/0x90 [ 326.043457] ? generic_permission+0x105/0x3c0 [ 326.047954] ? cgroup_destroy_locked+0x750/0x750 [ 326.052702] kernfs_iop_mkdir+0x153/0x1e0 [ 326.056833] vfs_mkdir+0x390/0x600 [ 326.060356] SyS_mkdirat+0x22b/0x2b0 [ 326.064057] ? SyS_mknod+0x480/0x480 [ 326.067756] ? trace_hardirqs_on+0xd/0x10 [ 326.071895] ? do_syscall_64+0xb7/0x940 [ 326.075847] ? SyS_mknod+0x480/0x480 [ 326.079541] do_syscall_64+0x281/0x940 [ 326.083407] ? vmalloc_sync_all+0x30/0x30 [ 326.087533] ? _raw_spin_unlock_irq+0x27/0x70 [ 326.092012] ? finish_task_switch+0x1c1/0x7e0 [ 326.096492] ? syscall_return_slowpath+0x550/0x550 [ 326.101400] ? syscall_return_slowpath+0x2ac/0x550 [ 326.106310] ? prepare_exit_to_usermode+0x350/0x350 [ 326.111306] ? entry_SYSCALL_64_after_hwframe+0x52/0xb7 [ 326.116659] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 326.121486] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 326.126657] RIP: 0033:0x454e79 [ 326.129824] RSP: 002b:00007f016b92fc68 EFLAGS: 00000246 ORIG_RAX: 0000000000000102 [ 326.137536] RAX: ffffffffffffffda RBX: 00007f016b9306d4 RCX: 0000000000454e79 [ 326.144798] RDX: 0000000000000020 RSI: 0000000020000280 RDI: 0000000000000015 [ 326.152060] RBP: 000000000072bea0 R08: 0000000000000000 R09: 0000000000000000 [ 326.159310] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000016 [ 326.166647] R13: 00000000000003eb R14: 00000000006f7ea8 R15: 0000000000000017 [ 326.174191] cgroup: cgroup_addrm_files: failed to add cgroup.stat, err=-12 2018/03/30 23:06:18 executing program 6: pipe(&(0x7f0000000940)={0xffffffffffffffff, 0xffffffffffffffff}) accept4$ax25(r0, 0x0, &(0x7f0000000080), 0x80000) r1 = socket$inet(0x2, 0x20000000000003, 0x2) connect$inet(r1, &(0x7f0000000000)={0x2, 0x0, @remote={0xac, 0x14, 0x14, 0xbb}}, 0x10) sendmsg(0xffffffffffffffff, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000140), 0x0, &(0x7f0000000180)=ANY=[]}, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000980)=@broute={'broute\x00', 0x20, 0x3, 0x2d9, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000380], 0x0, &(0x7f00000002c0), &(0x7f0000001000)=ANY=[@ANYBLOB="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"]}, 0x351) setsockopt$inet_int(r1, 0x0, 0x2, &(0x7f00000000c0)=0x7fffffff, 0x4) r2 = socket$rds(0x15, 0x5, 0x0) pipe(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$bt_BT_DEFER_SETUP(r3, 0x112, 0x7, &(0x7f0000000280)=0x100, 0x4) accept$packet(r4, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @remote}, &(0x7f0000000100)=0x14) connect$rds(r2, &(0x7f0000000140)={0x2, 0x4e22, @remote={0xac, 0x14, 0x14, 0xbb}}, 0x10) getsockopt$sock_buf(r2, 0x1, 0x3b, &(0x7f0000000180)=""/83, &(0x7f0000000200)=0x53) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000a00)=@filter={'filter\x00', 0xe, 0x4, 0x5a0, 0xffffffff, 0x0, 0xf0, 0xf0, 0xffffffff, 0xffffffff, 0x4d0, 0x4d0, 0x4d0, 0xffffffff, 0x4, &(0x7f0000000300), {[{{@ipv6={@ipv4={[], [0xff, 0xff], @rand_addr=0x80000001}, @dev={0xfe, 0x80, [], 0x16}, [0x0, 0xffffff00, 0xff, 0xffffffff], [0x0, 0xff000000, 0xffffffff], 'ipddp0\x00', 'ip_vti0\x00', {}, {0xff}, 0x6c, 0x2bf}, 0x0, 0xc8, 0xf0}, @REJECT={0x28, 'REJECT\x00', 0x0, {0x7}}}, {{@ipv6={@remote={0xfe, 0x80, [], 0xbb}, @remote={0xfe, 0x80, [], 0xbb}, [0xff000000, 0xffffffff, 0xffffff00, 0xff], [0xff, 0xffffffff, 0x0, 0xff000000], 'syzkaller1\x00', 'eql\x00', {}, {}, 0x62, 0x0, 0x4, 0x1}, 0x0, 0x120, 0x148, 0x0, {}, [@common=@frag={0x30, 'frag\x00', 0x0, {0x7ff, 0x7, 0x1, 0x2}}, @common=@hl={0x28, 'hl\x00', 0x0, {0x3, 0x7fff}}]}, @REJECT={0x28, 'REJECT\x00', 0x0, {0x7}}}, {{@ipv6={@dev={0xfe, 0x80, [], 0xc}, @loopback={0x0, 0x1}, [0xffffffff, 0xffffffff, 0xff000000, 0xff000000], [0xff, 0x0, 0xff, 0xffffff00], 'irlan0\x00', 'vcan0\x00', {0xff}, {}, 0x3b, 0xffffffffffffab69, 0x2, 0x30}, 0x0, 0x250, 0x298, 0x0, {}, [@common=@srh={0x30, 'srh\x00', 0x0, {0xbb, 0x1, 0x3, 0x6, 0xffffffffffffffc0, 0x80}}, @common=@inet=@policy={0x158, 'policy\x00', 0x0, {[{@ipv4, [0xffffffff, 0xff0000ff, 0xff000000, 0xffffffff], @ipv4=@multicast1=0xe0000001, [0xffffffff, 0xffffffff, 0xff000000, 0xffffff00], 0x4d5, 0x3500, 0x5c, 0x0, 0x10, 0xf}, {@ipv6=@dev={0xfe, 0x80, [], 0x11}, [0x0, 0xff000000, 0xff0000ff, 0xffffff00], @ipv4=@multicast1=0xe0000001, [0xffffffff, 0x0, 0x0, 0xffffffff], 0x4d5, 0x3500, 0x77, 0x1, 0x0, 0x1d}, {@ipv6=@mcast1={0xff, 0x1, [], 0x1}, [0xff000000, 0xffffffff, 0xffffff00, 0xff], @ipv4=@multicast2=0xe0000002, [0xffffffff, 0x0, 0xffffff00, 0xffffffff], 0x4d3, 0x3503, 0x7f, 0x0, 0x1, 0x19}, {@ipv4=@local={0xac, 0x14, 0x14, 0xaa}, [0x0, 0xff, 0x0, 0xff0000ff], @ipv6=@local={0xfe, 0x80, [], 0xaa}, [0xffffffff, 0xffffffff, 0xff], 0x4d4, 0x3505, 0x0, 0x1, 0x1f, 0x10}], 0x0, 0x3}}]}, @common=@unspec=@LED={0x48, 'LED\x00', 0x0, {'syz1\x00', 0x0, 0x8, 0x8}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28, '\x00', 0x0, 0xfffffffffffffffe}}}}, 0x600) socket(0x1, 0xa, 0x7) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_TIMER(r4, 0x40605346, &(0x7f0000000680)={0x1, 0x3, {0x3, 0x0, 0x9, 0x3}}) 2018/03/30 23:06:18 executing program 4: mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) socket$can_bcm(0x1d, 0x2, 0x2) r0 = socket$inet(0x2, 0xa, 0x5) setsockopt$inet_tcp_buf(r0, 0x6, 0x1c, &(0x7f0000000240)="b749874d7dff2d998faf553af7f13a361bc47a5ba96ca9172a034fc6368d0845e02d58bab7fc783fce1ae57e80a34b03464ed958dbe51dfd1965746d7cee0aec506f5ec4a63d864c599ff9588c330c5e93773994ad632a4dd40ab95c3349b87d5b1cc9fbb84362505de9051499e11ed791d68470fa0c1c8480c271c1bd2b3975ebf721b506fde8166eacff4b191bc8eac1298b42cf1c9c68a6578f4cd15f2b045bc27498c53548039498e1d36884b2", 0xaf) mount(&(0x7f000000a000)='./file0\x00', &(0x7f0000026ff8)='./file0\x00', &(0x7f000000c000)='ramfs\x00', 0x0, &(0x7f000000a000)) mkdir(&(0x7f0000000000)='./file1\x00', 0x0) mount(&(0x7f0000000040)='./file0\x00', &(0x7f0000903000)='./file0\x00', &(0x7f0000811ffa)='bdev\x00', 0x100000, &(0x7f00000003c0)="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") io_setup(0x2, &(0x7f0000000140)=0x0) r2 = syz_open_dev$mice(&(0x7f0000000300)='/dev/input/mice\x00', 0x0, 0x40000) io_cancel(r1, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x7, 0xaa, r0, &(0x7f0000000540)="29d7f898a5ea79cdb3fc52bd76f44ccac729b232c87dd37e01c9dd268d6fe9050a7847279c6d73fdca3bc52a5ee00516b90c2c5cbfc577afb3efc5729ad1f6670a83a7c1d57d42be07fee1705cd53f91783d78ea96de10e3f941202b15d4dabefbf1c84851ec2def6260f600b451a5529980accc1f91fa4024ce48467a471dde92dc85cff9188ef703883d78117a962a2119fe63334c4655beb280fa8fc5210d4ed5a30ce2ec37c5272d228bb42b5e3d3ddb323ae6eb7833f5f52388ee5b42616c135245a3fb30db922143126a39fdf4fa0c53954e0c", 0xd6, 0x3, 0x0, 0x0, r2}, &(0x7f0000000380)) r3 = dup(0xffffffffffffffff) r4 = syz_open_dev$vcsn(&(0x7f00000000c0)='/dev/vcs#\x00', 0x2, 0x20800) renameat(r3, &(0x7f0000000080)='./file1/file0\x00', r4, &(0x7f0000000100)='./file1\x00') mount(&(0x7f0000fb6000)='./file0\x00', &(0x7f0000d78000)='.', &(0x7f0000fdb000)='ubifs\x00', 0x1003, 0x0) mount(&(0x7f00002b9ff8)='./file0\x00', &(0x7f0000cbeff8)='./file0\x00', &(0x7f00005f7ffa)='ramfs\x00', 0x80000, &(0x7f000002f000)) mount(&(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)='./file1\x00', &(0x7f0000000200)='anon_inodefs\x00', 0x2000, &(0x7f0000000240)) mount(&(0x7f0000adcff8)='./file0\x00', &(0x7f0000e08fff)='.', &(0x7f00005e9000)='cifs\x00', 0x2000, &(0x7f0000ad5000)) 2018/03/30 23:06:18 executing program 3: r0 = socket(0x40000000015, 0x5, 0x0) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000240), 0x4) bind$inet(r0, &(0x7f00008a5ff0)={0x2, 0x4e21, @loopback=0x7f000001}, 0x10) sendto$inet(r0, &(0x7f0000f7db7f)="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", 0x478, 0x0, &(0x7f000069affb)={0x2, 0x4e20, @loopback=0x7f000001}, 0x10) setsockopt$RDS_CONG_MONITOR(r0, 0x114, 0x6, &(0x7f0000000080)=0x1, 0x4) ioctl$int_in(r0, 0x5421, &(0x7f0000000040)=0x56d) sendto$inet(r0, &(0x7f00004b3fff), 0x0, 0x0, &(0x7f00002b4000)={0x2, 0x4e20, @loopback=0x7f000001}, 0x3f6) ioctl$sock_inet_tcp_SIOCOUTQ(r0, 0x5411, &(0x7f0000000000)) 2018/03/30 23:06:18 executing program 7: perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f00000000c0)='./control\x00', 0x0) r0 = inotify_init() inotify_add_watch(r0, &(0x7f0000f1eff6)='./control\x00', 0x220000000009) r1 = inotify_init1(0x0) syz_open_dev$loop(&(0x7f0000000140)='/dev/loop#\x00', 0xfffffffffffff801, 0x408040) inotify_add_watch(r1, &(0x7f000001eff6)='./control\x00', 0x2000200) r2 = syz_open_dev$audion(&(0x7f0000000040)='/dev/audio#\x00', 0xfffffffffffffeff, 0x4c000) ioctl$TUNGETVNETHDRSZ(r2, 0x800454d7, &(0x7f0000000100)) setsockopt$inet6_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, &(0x7f0000000080)="5fce869db66fa225921ad03d773be4ff", 0x10) rmdir(&(0x7f000075aff6)='./control\x00') 2018/03/30 23:06:18 executing program 2: r0 = socket$inet_sctp(0x2, 0x0, 0x84) write$rdma_cm(0xffffffffffffffff, &(0x7f00000004c0)=ANY=[@ANYBLOB="ebf299c39c92b6f77083420d83edf03bf4cca5df65d1b20452f6c3d4bda4e348d7f861cb2238916bb2fad4cf0f1e345174214a5f244dcbac888d3f985431c2e5f8a673e25b8d33a808373dafdfc0e215b925a3ea0401082119f23243152937b7b337c61807a1bd8f286b6afff032c38222f4ec80d646b659b5c9bda9"], 0x0) write$rdma_cm(0xffffffffffffffff, &(0x7f00000003c0)=ANY=[@ANYBLOB="031a4f2f7f000000dde30000000000000000000000000000000000000000000100005dd45591dac827000000ff01000000000000000000000000000000000000"], 0x40) r1 = syz_open_dev$mice(&(0x7f00000000c0)='/dev/input/mice\x00', 0x0, 0x400) ioctl$sock_bt_cmtp_CMTPCONNADD(r1, 0x400443c8, &(0x7f0000000100)={r0, 0x1}) write$rdma_cm(r1, &(0x7f0000000440)=@resolve_ip={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x1, [], 0x1}}, {0xa, 0x0, 0x0, @mcast1={0xff, 0x1, [], 0x1}}}}, 0x19) creat(&(0x7f0000000140)='./file0\x00', 0x8) socketpair(0x3, 0x0, 0xfffffffffffffff7, &(0x7f0000000240)) perf_event_open(&(0x7f000001d000)={0x2, 0x78, 0xe2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$inet6_int(r2, 0x29, 0xc8, &(0x7f00008d6000), 0x4) openat$kvm(0xffffffffffffff9c, &(0x7f0000264ff7)='/dev/kvm\x00', 0x0, 0x0) setsockopt$inet6_int(r2, 0x29, 0xc8, &(0x7f0000ac5000), 0x4) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000000)={@remote, @loopback}, &(0x7f0000000080)=0xc) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000200)=0x0) sigaltstack(&(0x7f0000ffc000/0x4000)=nil, &(0x7f0000000280)) llistxattr(&(0x7f0000000040)='./file0\x00', &(0x7f0000000180)=""/79, 0x4f) perf_event_open(&(0x7f0000000300)={0x7, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0xc80, 0x0, 0x0, 0x0, 0x401, 0x3a}, r3, 0x8, 0xffffffffffffffff, 0x0) 2018/03/30 23:06:18 executing program 0 (fault-call:7 fault-nth:24): mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r0 = syz_open_dev$usbmon(&(0x7f0000000400)='/dev/usbmon#\x00', 0x0, 0x0) r1 = perf_event_open(&(0x7f0000223000)={0x2, 0x78, 0xe3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000001980)={{{@in6=@remote, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast2}, 0x0, @in=@multicast2}}, &(0x7f0000001a80)=0xe8) chown(&(0x7f00000004c0)='./file0\x00', r2, 0x0) mount(&(0x7f00000003c0)='./file0\x00', &(0x7f0000000380)='./file0\x00', &(0x7f0000000300)='cgroup2\x00', 0x0, 0x0) r3 = open$dir(&(0x7f000001bff4)='./file0\x00', 0x0, 0x0) mkdirat(r3, &(0x7f0000000280)='./file0\x00', 0x20) getdents64(r3, &(0x7f00000007c0)=""/250, 0x1015a) dup3(r0, r1, 0x80000) r4 = open$dir(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) renameat2(r4, &(0x7f0000000200)='./file1\x00', 0xffffffffffffffff, &(0x7f0000000240)='./file0\x00', 0xfd1092750066ec78) ioctl$KDGKBMODE(0xffffffffffffffff, 0x4b44, &(0x7f0000000140)) 2018/03/30 23:06:18 executing program 5: mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) perf_event_open(&(0x7f0000223000)={0x2, 0x78, 0xe3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000001980)={{{@in6=@remote, @in=@multicast1}}, {{@in=@multicast2}, 0x0, @in=@multicast2}}, &(0x7f0000001a80)=0xe8) mount(&(0x7f00000003c0)='./file0\x00', &(0x7f0000000380)='./file0\x00', &(0x7f0000000300)='cgroup2\x00', 0x0, 0x0) r0 = open$dir(&(0x7f000001bff4)='./file0\x00', 0x0, 0x0) mkdirat(0xffffffffffffffff, &(0x7f0000000280)='./file0\x00', 0x20) r1 = dup(r0) setsockopt$SO_VM_SOCKETS_BUFFER_MAX_SIZE(r1, 0x28, 0x2, &(0x7f0000000100)=0x10000, 0x8) r2 = syz_open_dev$dspn(&(0x7f0000000040)='/dev/dsp#\x00', 0x5, 0x10000) ioctl$VHOST_GET_FEATURES(r2, 0x8008af00, &(0x7f00000000c0)) unlinkat(r0, &(0x7f0000000080)='./file0\x00', 0x200) 2018/03/30 23:06:18 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x200, 0x0) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000680)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$sock_linger(r2, 0x1, 0xd, &(0x7f00000006c0)={0x400, 0x9}, 0x8) perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x0, 0x0) r3 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) mmap(&(0x7f0000000000/0x9d7000)=nil, 0x9d7000, 0x0, 0x10, 0xffffffffffffffff, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x7) perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r4 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r4, &(0x7f0000e5b000)={0x2, 0x4e20, @multicast1=0xe0000001}, 0x10) syz_open_dev$sg(&(0x7f0000000440)='/dev/sg#\x00', 0x0, 0x0) connect$inet(r4, &(0x7f0000000100)={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x11}}, 0x10) r5 = bpf$PROG_LOAD(0x5, &(0x7f0000eb0fb8)={0x1, 0x3, &(0x7f00009ff000)=@framed={{0x18}, [], {0x95}}, &(0x7f00002bf000)='syzkaller\x00', 0x4, 0xb7, &(0x7f00006ab000)=""/183}, 0x48) setsockopt$inet_tcp_int(r4, 0x6, 0x19, &(0x7f0000000240)=0x8, 0x4) r6 = socket$kcm(0x29, 0x2, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r6, 0x89e0, &(0x7f000031aff8)={r4, r5}) ioctl$sock_kcm_SIOCKCMCLONE(r6, 0x89e2, &(0x7f00000002c0)={0xffffffffffffffff}) sendmsg$nl_xfrm(r7, &(0x7f0000000780)={&(0x7f0000000200)={0x10}, 0xc, &(0x7f0000000740)={&(0x7f0000000480)=@updpolicy={0xb8, 0x19, 0x0, 0x0, 0x0, {{@in=@loopback=0x7f000001, @in6=@mcast1={0xff, 0x1, [], 0x1}}}}, 0xffcb}, 0x1}, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(r7, 0x89e1, &(0x7f0000000040)={r4}) r8 = fcntl$getown(0xffffffffffffffff, 0x9) recvfrom$inet6(r1, &(0x7f0000000140)=""/177, 0xb1, 0x40000000, &(0x7f0000000080)={0xa, 0x4e23, 0x9, @empty, 0xe38}, 0x1c) r9 = accept4$inet(0xffffffffffffff9c, &(0x7f0000000700)={0x0, 0x0, @broadcast}, &(0x7f0000000740)=0x10, 0x80000) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r9, 0x84, 0x64, &(0x7f0000000780)=[@in6={0xa, 0x4e22, 0xfffffffffffff7e1, @mcast2={0xff, 0x2, [], 0x1}, 0x8}, @in={0x2, 0x4e24, @broadcast=0xffffffff}], 0x2c) ptrace$setregset(0x4205, r8, 0x0, &(0x7f00000005c0)={&(0x7f0000000080)}) ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r10 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x1fffd, 0x0) r11 = syz_open_dev$sndtimer(&(0x7f00000000c0)='/dev/snd/timer\x00', 0x0, 0x0) read(r11, &(0x7f0000ec6000)=""/50, 0x32) fcntl$dupfd(r11, 0x0, r10) [ 326.645285] kernel msg: ebtables bug: please report to author: entries_size too small [ 326.688971] FAULT_INJECTION: forcing a failure. [ 326.688971] name failslab, interval 1, probability 0, space 0, times 0 [ 326.700329] CPU: 0 PID: 25870 Comm: syz-executor0 Not tainted 4.16.0-rc7+ #372 [ 326.707702] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 326.717054] Call Trace: [ 326.719635] dump_stack+0x194/0x24d [ 326.723257] ? arch_local_irq_restore+0x53/0x53 [ 326.727926] should_fail+0x8c0/0xa40 [ 326.731627] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 326.736712] ? kernfs_add_one+0x50/0x450 [ 326.740753] ? kernfs_add_one+0x50/0x450 [ 326.744800] ? trace_event_raw_event_lock+0x340/0x340 [ 326.749972] ? trace_hardirqs_off+0x10/0x10 [ 326.754280] ? find_held_lock+0x35/0x1d0 [ 326.758331] ? __lock_is_held+0xb6/0x140 [ 326.762387] ? check_same_owner+0x320/0x320 [ 326.766688] ? lock_downgrade+0x980/0x980 [ 326.770819] ? rcu_note_context_switch+0x710/0x710 [ 326.775738] should_failslab+0xec/0x120 [ 326.779694] __kmalloc_track_caller+0x5f/0x760 [ 326.784258] ? idr_alloc_cyclic+0x1d6/0x320 [ 326.788564] ? kstrdup_const+0x39/0x50 [ 326.792431] ? __mutex_unlock_slowpath+0xe9/0xac0 [ 326.797261] kstrdup+0x39/0x70 [ 326.800435] kstrdup_const+0x39/0x50 [ 326.804132] __kernfs_new_node+0xa2/0x570 [ 326.808266] ? kernfs_dop_revalidate+0x380/0x380 [ 326.813012] ? kasan_check_read+0x11/0x20 [ 326.817145] ? read_word_at_a_time+0x12/0x20 [ 326.821532] ? strscpy+0x186/0x500 [ 326.825063] kernfs_new_node+0x80/0xe0 [ 326.828935] __kernfs_create_file+0x4b/0x320 [ 326.833332] cgroup_addrm_files+0x3c5/0xa70 [ 326.837643] ? cgroup_file_write+0x710/0x710 [ 326.842041] ? getrawmonotonic64+0x460/0x460 [ 326.846960] ? kernfs_active+0x92/0x160 [ 326.850921] ? debug_lockdep_rcu_enabled+0x77/0x90 [ 326.855831] ? cgroup_kn_set_ugid+0x2c7/0x370 [ 326.860310] ? cgroup_file_name+0x1d0/0x1d0 [ 326.864622] css_populate_dir+0x340/0x420 [ 326.868756] cgroup_mkdir+0x553/0xfc0 [ 326.872534] ? __lock_is_held+0xb6/0x140 [ 326.876582] ? cgroup_destroy_locked+0x750/0x750 [ 326.881320] ? rcu_read_lock_sched_held+0x108/0x120 [ 326.886320] ? kmem_cache_free+0x258/0x2a0 [ 326.890537] ? set_nlink+0xc1/0x160 [ 326.894147] ? debug_lockdep_rcu_enabled+0x77/0x90 [ 326.899054] ? generic_permission+0x105/0x3c0 [ 326.903534] ? cgroup_destroy_locked+0x750/0x750 [ 326.908273] kernfs_iop_mkdir+0x153/0x1e0 [ 326.912406] vfs_mkdir+0x390/0x600 [ 326.915930] SyS_mkdirat+0x22b/0x2b0 [ 326.919628] ? SyS_mknod+0x480/0x480 [ 326.923325] ? trace_hardirqs_on+0xd/0x10 [ 326.927453] ? do_syscall_64+0xb7/0x940 [ 326.931408] ? SyS_mknod+0x480/0x480 [ 326.935103] do_syscall_64+0x281/0x940 [ 326.938969] ? vmalloc_sync_all+0x30/0x30 [ 326.943097] ? _raw_spin_unlock_irq+0x27/0x70 [ 326.947571] ? finish_task_switch+0x1c1/0x7e0 [ 326.952050] ? syscall_return_slowpath+0x550/0x550 [ 326.956958] ? syscall_return_slowpath+0x2ac/0x550 [ 326.961867] ? prepare_exit_to_usermode+0x350/0x350 [ 326.966866] ? entry_SYSCALL_64_after_hwframe+0x52/0xb7 [ 326.972215] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 326.977046] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 326.982214] RIP: 0033:0x454e79 2018/03/30 23:06:18 executing program 6: pipe(&(0x7f0000000940)={0xffffffffffffffff, 0xffffffffffffffff}) accept4$ax25(r0, 0x0, &(0x7f0000000080), 0x80000) r1 = socket$inet(0x2, 0x20000000000003, 0x2) connect$inet(r1, &(0x7f0000000000)={0x2, 0x0, @remote={0xac, 0x14, 0x14, 0xbb}}, 0x10) sendmsg(0xffffffffffffffff, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000140), 0x0, &(0x7f0000000180)=ANY=[]}, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000980)=@broute={'broute\x00', 0x20, 0x3, 0x2d9, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000380], 0x0, &(0x7f00000002c0), &(0x7f0000001000)=ANY=[@ANYBLOB="00000000000000000000000000000000000000000000000000000000000000000000000000000000feffffff0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000ffffffff010000000b00000008000000600469666230000000000000000000000000736974300000000000000000000000007663616e300000000000000000000000626f6e643000000000000000000000000180c200000e00ffff00ffffaaaaaaaaaaaaffffff0000ff000008010000d001000048020000706879736465760000000000000000000000000000000000000000000000000070000000000000006e723000000000000000000000000000000000000000000000000000000000000000000000000000000000000000766c616e300000003a9c4ebb9f24dc06a52c000000000000000000000000000000000000000000ff0000000000000000000000000000000101000000000000000000000000000000000000004c45440000000000000000000000000000000000000000000000000000000000280000000000000073797a310000000000000000000000000000000000000000000000004000000000000000000000004e464c4f470000000000000000000000000000000000000000000000000000005000000000000000000000000000000000000000692ef8a72c6779a914df06a44b35b0eafd833141b590148ad8c2d17b06e81aa50bc466307f618025cda16029da79ca01cd7bf2fa8433c6000000004e464c4f470000000000000000000000000000000000000000000000000000005000000000000000000000000000000000000000f7040c3bd532a607b6540847e9980255ac80a05048ee3c578fd00c809822ab1ff7d12707561fdd7b1bcbd7c428bd7449152a676a0e0fc0823ebe89b10758fffe5c92f48f0000000000000000000000000000000000000000000000000000000000000000000000000000000001000000fcffffff"]}, 0x351) setsockopt$inet_int(r1, 0x0, 0x2, &(0x7f00000000c0)=0x7fffffff, 0x4) r2 = socket$rds(0x15, 0x5, 0x0) pipe(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$bt_BT_DEFER_SETUP(r3, 0x112, 0x7, &(0x7f0000000280)=0x100, 0x4) accept$packet(r4, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @remote}, &(0x7f0000000100)=0x14) connect$rds(r2, &(0x7f0000000140)={0x2, 0x4e22, @remote={0xac, 0x14, 0x14, 0xbb}}, 0x10) getsockopt$sock_buf(r2, 0x1, 0x3b, &(0x7f0000000180)=""/83, &(0x7f0000000200)=0x53) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000a00)=@filter={'filter\x00', 0xe, 0x4, 0x5a0, 0xffffffff, 0x0, 0xf0, 0xf0, 0xffffffff, 0xffffffff, 0x4d0, 0x4d0, 0x4d0, 0xffffffff, 0x4, &(0x7f0000000300), {[{{@ipv6={@ipv4={[], [0xff, 0xff], @rand_addr=0x80000001}, @dev={0xfe, 0x80, [], 0x16}, [0x0, 0xffffff00, 0xff, 0xffffffff], [0x0, 0xff000000, 0xffffffff], 'ipddp0\x00', 'ip_vti0\x00', {}, {0xff}, 0x6c, 0x2bf}, 0x0, 0xc8, 0xf0}, @REJECT={0x28, 'REJECT\x00', 0x0, {0x7}}}, {{@ipv6={@remote={0xfe, 0x80, [], 0xbb}, @remote={0xfe, 0x80, [], 0xbb}, [0xff000000, 0xffffffff, 0xffffff00, 0xff], [0xff, 0xffffffff, 0x0, 0xff000000], 'syzkaller1\x00', 'eql\x00', {}, {}, 0x62, 0x0, 0x4, 0x1}, 0x0, 0x120, 0x148, 0x0, {}, [@common=@frag={0x30, 'frag\x00', 0x0, {0x7ff, 0x7, 0x1, 0x2}}, @common=@hl={0x28, 'hl\x00', 0x0, {0x3, 0x7fff}}]}, @REJECT={0x28, 'REJECT\x00', 0x0, {0x7}}}, {{@ipv6={@dev={0xfe, 0x80, [], 0xc}, @loopback={0x0, 0x1}, [0xffffffff, 0xffffffff, 0xff000000, 0xff000000], [0xff, 0x0, 0xff, 0xffffff00], 'irlan0\x00', 'vcan0\x00', {0xff}, {}, 0x3b, 0xffffffffffffab69, 0x2, 0x30}, 0x0, 0x250, 0x298, 0x0, {}, [@common=@srh={0x30, 'srh\x00', 0x0, {0xbb, 0x1, 0x3, 0x6, 0xffffffffffffffc0, 0x80}}, @common=@inet=@policy={0x158, 'policy\x00', 0x0, {[{@ipv4, [0xffffffff, 0xff0000ff, 0xff000000, 0xffffffff], @ipv4=@multicast1=0xe0000001, [0xffffffff, 0xffffffff, 0xff000000, 0xffffff00], 0x4d5, 0x3500, 0x5c, 0x0, 0x10, 0xf}, {@ipv6=@dev={0xfe, 0x80, [], 0x11}, [0x0, 0xff000000, 0xff0000ff, 0xffffff00], @ipv4=@multicast1=0xe0000001, [0xffffffff, 0x0, 0x0, 0xffffffff], 0x4d5, 0x3500, 0x77, 0x1, 0x0, 0x1d}, {@ipv6=@mcast1={0xff, 0x1, [], 0x1}, [0xff000000, 0xffffffff, 0xffffff00, 0xff], @ipv4=@multicast2=0xe0000002, [0xffffffff, 0x0, 0xffffff00, 0xffffffff], 0x4d3, 0x3503, 0x7f, 0x0, 0x1, 0x19}, {@ipv4=@local={0xac, 0x14, 0x14, 0xaa}, [0x0, 0xff, 0x0, 0xff0000ff], @ipv6=@local={0xfe, 0x80, [], 0xaa}, [0xffffffff, 0xffffffff, 0xff, 0xff0000ff], 0x0, 0x3505, 0x0, 0x1, 0x1f, 0x10}], 0x0, 0x3}}]}, @common=@unspec=@LED={0x48, 'LED\x00', 0x0, {'syz1\x00', 0x0, 0x8, 0x8}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28, '\x00', 0x0, 0xfffffffffffffffe}}}}, 0x600) socket(0x1, 0xa, 0x7) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_TIMER(r4, 0x40605346, &(0x7f0000000680)={0x1, 0x3, {0x3, 0x0, 0x9, 0x3}}) 2018/03/30 23:06:18 executing program 3: r0 = socket(0x40000000015, 0x5, 0x0) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000240), 0x4) bind$inet(r0, &(0x7f00008a5ff0)={0x2, 0x4e21, @loopback=0x7f000001}, 0x10) sendto$inet(r0, &(0x7f0000f7db7f)="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", 0x478, 0x0, &(0x7f000069affb)={0x2, 0x4e20, @loopback=0x7f000001}, 0x10) setsockopt$RDS_CONG_MONITOR(r0, 0x114, 0x6, &(0x7f0000000080)=0x1, 0x4) ioctl$int_in(r0, 0x5421, &(0x7f0000000040)=0x56d) sendto$inet(r0, &(0x7f00004b3fff), 0x0, 0x0, &(0x7f00002b4000)={0x2, 0x4e20, @loopback=0x7f000001}, 0x3f6) ioctl$sock_inet_tcp_SIOCOUTQ(r0, 0x5411, &(0x7f0000000000)) 2018/03/30 23:06:18 executing program 7: perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f00000000c0)='./control\x00', 0x0) r0 = socket$inet_sctp(0x2, 0x5, 0x84) r1 = accept(r0, &(0x7f0000000100)=@ethernet={0x0, @link_local}, &(0x7f0000000040)=0x80) openat$audio(0xffffffffffffff9c, &(0x7f0000000200)='/dev/audio\x00', 0x400200, 0x0) getsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(r1, 0x84, 0x8, &(0x7f0000000280), &(0x7f00000002c0)=0x4) r2 = inotify_init() fcntl$dupfd(r2, 0x1, r2) inotify_add_watch(r2, &(0x7f0000f1eff6)='./control\x00', 0x1000000) r3 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/cuse\x00', 0x2040, 0x0) mkdirat$cgroup(r3, &(0x7f00000001c0)='syz0\x00', 0x1ff) inotify_init1(0x0) inotify_add_watch(r3, &(0x7f0000000300)='./control\x00', 0x2000200) setsockopt$inet6_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, &(0x7f0000000080)="5fce869db66fa225921ad03d773be4ff", 0x10) rmdir(&(0x7f000075aff6)='./control\x00') [ 326.985384] RSP: 002b:00007f016b92fc68 EFLAGS: 00000246 ORIG_RAX: 0000000000000102 [ 326.993073] RAX: ffffffffffffffda RBX: 00007f016b9306d4 RCX: 0000000000454e79 [ 327.000324] RDX: 0000000000000020 RSI: 0000000020000280 RDI: 0000000000000015 [ 327.007573] RBP: 000000000072bea0 R08: 0000000000000000 R09: 0000000000000000 [ 327.014822] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000016 [ 327.022076] R13: 00000000000003eb R14: 00000000006f7ea8 R15: 0000000000000018 [ 327.029565] cgroup: cgroup_addrm_files: failed to add cpu.stat, err=-12 [ 327.075536] kernel msg: ebtables bug: please report to author: entries_size too small 2018/03/30 23:06:18 executing program 6: pipe(&(0x7f0000000940)={0xffffffffffffffff, 0xffffffffffffffff}) accept4$ax25(r0, 0x0, &(0x7f0000000080), 0x80000) r1 = socket$inet(0x2, 0x20000000000003, 0x2) connect$inet(r1, &(0x7f0000000000)={0x2, 0x0, @remote={0xac, 0x14, 0x14, 0xbb}}, 0x10) sendmsg(0xffffffffffffffff, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000140), 0x0, &(0x7f0000000180)=ANY=[]}, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000980)=@broute={'broute\x00', 0x20, 0x3, 0x2d9, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000380], 0x0, &(0x7f00000002c0), &(0x7f0000001000)=ANY=[@ANYBLOB="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"]}, 0x351) setsockopt$inet_int(r1, 0x0, 0x2, &(0x7f00000000c0)=0x7fffffff, 0x4) r2 = socket$rds(0x15, 0x5, 0x0) pipe(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$bt_BT_DEFER_SETUP(r3, 0x112, 0x7, &(0x7f0000000280)=0x100, 0x4) accept$packet(r4, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @remote}, &(0x7f0000000100)=0x14) connect$rds(r2, &(0x7f0000000140)={0x2, 0x4e22, @remote={0xac, 0x14, 0x14, 0xbb}}, 0x10) getsockopt$sock_buf(r2, 0x1, 0x3b, &(0x7f0000000180)=""/83, &(0x7f0000000200)=0x53) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000a00)=@filter={'filter\x00', 0xe, 0x4, 0x5a0, 0xffffffff, 0x0, 0xf0, 0xf0, 0xffffffff, 0xffffffff, 0x4d0, 0x4d0, 0x4d0, 0xffffffff, 0x4, &(0x7f0000000300), {[{{@ipv6={@ipv4={[], [0xff, 0xff], @rand_addr=0x80000001}, @dev={0xfe, 0x80, [], 0x16}, [0x0, 0xffffff00, 0xff, 0xffffffff], [0x0, 0xff000000, 0xffffffff], 'ipddp0\x00', 'ip_vti0\x00', {}, {0xff}, 0x6c, 0x2bf}, 0x0, 0xc8, 0xf0}, @REJECT={0x28, 'REJECT\x00', 0x0, {0x7}}}, {{@ipv6={@remote={0xfe, 0x80, [], 0xbb}, @remote={0xfe, 0x80, [], 0xbb}, [0xff000000, 0xffffffff, 0xffffff00, 0xff], [0xff, 0xffffffff, 0x0, 0xff000000], 'syzkaller1\x00', 'eql\x00', {}, {}, 0x62, 0x0, 0x4, 0x1}, 0x0, 0x120, 0x148, 0x0, {}, [@common=@frag={0x30, 'frag\x00', 0x0, {0x7ff, 0x7, 0x1, 0x2}}, @common=@hl={0x28, 'hl\x00', 0x0, {0x3, 0x7fff}}]}, @REJECT={0x28, 'REJECT\x00', 0x0, {0x7}}}, {{@ipv6={@dev={0xfe, 0x80, [], 0xc}, @loopback={0x0, 0x1}, [0xffffffff, 0xffffffff, 0xff000000, 0xff000000], [0xff, 0x0, 0xff, 0xffffff00], 'irlan0\x00', 'vcan0\x00', {0xff}, {}, 0x3b, 0xffffffffffffab69, 0x2, 0x30}, 0x0, 0x250, 0x298, 0x0, {}, [@common=@srh={0x30, 'srh\x00', 0x0, {0xbb, 0x1, 0x3, 0x6, 0xffffffffffffffc0, 0x80}}, @common=@inet=@policy={0x158, 'policy\x00', 0x0, {[{@ipv4, [0xffffffff, 0xff0000ff, 0xff000000, 0xffffffff], @ipv4=@multicast1=0xe0000001, [0xffffffff, 0xffffffff, 0xff000000, 0xffffff00], 0x4d5, 0x3500, 0x5c, 0x0, 0x10, 0xf}, {@ipv6=@dev={0xfe, 0x80, [], 0x11}, [0x0, 0xff000000, 0xff0000ff, 0xffffff00], @ipv4=@multicast1=0xe0000001, [0xffffffff, 0x0, 0x0, 0xffffffff], 0x4d5, 0x3500, 0x77, 0x1, 0x0, 0x1d}, {@ipv6=@mcast1={0xff, 0x1, [], 0x1}, [0xff000000, 0xffffffff, 0xffffff00, 0xff], @ipv4=@multicast2=0xe0000002, [0xffffffff, 0x0, 0xffffff00, 0xffffffff], 0x4d3, 0x3503, 0x7f, 0x0, 0x1, 0x19}, {@ipv4=@local={0xac, 0x14, 0x14, 0xaa}, [0x0, 0xff, 0x0, 0xff0000ff], @ipv6=@local={0xfe, 0x80, [], 0xaa}, [0xffffffff, 0xffffffff, 0xff, 0xff0000ff], 0x0, 0x3505, 0x0, 0x1, 0x1f, 0x10}], 0x0, 0x3}}]}, @common=@unspec=@LED={0x48, 'LED\x00', 0x0, {'syz1\x00', 0x0, 0x8, 0x8}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28, '\x00', 0x0, 0xfffffffffffffffe}}}}, 0x600) socket(0x1, 0xa, 0x7) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_TIMER(r4, 0x40605346, &(0x7f0000000680)={0x1, 0x3, {0x3, 0x0, 0x9, 0x3}}) 2018/03/30 23:06:18 executing program 4: mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount(&(0x7f000000a000)='./file0\x00', &(0x7f0000000140)='./file1/file0\x00', &(0x7f000000c000)='ramfs\x00', 0x0, &(0x7f000000a000)) mkdir(&(0x7f0000000000)='./file1\x00', 0x0) mount(&(0x7f0000000040)='./file0\x00', &(0x7f0000903000)='./file0\x00', &(0x7f0000811ffa)='bdev\x00', 0x100000, &(0x7f00000003c0)="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") r0 = dup(0xffffffffffffffff) r1 = syz_open_dev$vcsn(&(0x7f00000000c0)='/dev/vcs#\x00', 0x2, 0x20800) renameat(r0, &(0x7f0000000080)='./file1/file0\x00', r1, &(0x7f0000000100)='./file1\x00') mount(&(0x7f0000fb6000)='./file0\x00', &(0x7f0000d78000)='.', &(0x7f0000fdb000)='ubifs\x00', 0x1003, 0x0) mount(&(0x7f00002b9ff8)='./file0\x00', &(0x7f0000cbeff8)='./file0\x00', &(0x7f00005f7ffa)='ramfs\x00', 0x80000, &(0x7f000002f000)) mount(&(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)='./file1\x00', &(0x7f0000000200)='anon_inodefs\x00', 0x2000, &(0x7f0000000240)="5d85136687c528e5f36796e0a505f47a0b94aff473598061a4bb3643f887e467fdce722499963e4b318a47a9a71ac98963c78d044ea9af74f7fe1e50c75aaf6e9b2d9f1780d965ae40507b1cc0827c960b983a3c482fe6231bdebe391646bdf2a7efe4d81576a201662cf43f000000000016bb52c3000000") mount(&(0x7f0000adcff8)='./file0\x00', &(0x7f0000e08fff)='.', &(0x7f00005e9000)='cifs\x00', 0x2000, &(0x7f0000ad5000)) 2018/03/30 23:06:18 executing program 3: r0 = socket(0x40000000015, 0x5, 0x0) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000240), 0x4) bind$inet(r0, &(0x7f00008a5ff0)={0x2, 0x4e21, @loopback=0x7f000001}, 0x10) sendto$inet(r0, &(0x7f0000f7db7f)="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", 0x47d, 0x0, &(0x7f000069affb)={0x2, 0x4e20, @loopback=0x7f000001}, 0x10) setsockopt$RDS_CONG_MONITOR(r0, 0x114, 0x6, &(0x7f0000000080)=0x1, 0x4) ioctl$int_in(r0, 0x5421, &(0x7f0000000040)=0x56d) sendto$inet(r0, &(0x7f00004b3fff), 0x0, 0x0, &(0x7f00002b4000)={0x2, 0x4e20, @loopback=0x7f000001}, 0x3f6) ioctl$sock_inet_tcp_SIOCOUTQ(r0, 0x5411, &(0x7f0000000000)) 2018/03/30 23:06:18 executing program 2: socket$inet_sctp(0x2, 0x1, 0x84) write$rdma_cm(0xffffffffffffffff, &(0x7f00000000c0)=ANY=[@ANYBLOB], 0x0) write$rdma_cm(0xffffffffffffffff, &(0x7f00000003c0)=ANY=[@ANYBLOB="031a4f2f7f000000dde30000000000000000000000000000000000000000000100005dd45591dac827000000ff01000000000000000000000000000000000000"], 0x40) write$rdma_cm(0xffffffffffffffff, &(0x7f00000000c0)=ANY=[@ANYBLOB="03000000400000fa0a00000000000000ff01000000000000801467b7036c733300000000000001000000000a00000000000000ff01000000000000000000000000000100000000", @ANYRES32=0xffffffff, @ANYBLOB='\x00\x00\x00\x00'], 0x48) creat(&(0x7f0000000140)='./file0\x00', 0x8) socketpair(0x3, 0x0, 0xfffffffffffffff7, &(0x7f0000000240)) perf_event_open(&(0x7f000001d000)={0x2, 0x78, 0xe2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$inet6_int(r0, 0x29, 0xc8, &(0x7f00008d6000), 0x4) openat$kvm(0xffffffffffffff9c, &(0x7f0000264ff7)='/dev/kvm\x00', 0x0, 0x0) setsockopt$inet6_int(r0, 0x29, 0xc8, &(0x7f0000ac5000), 0x4) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000000)={@remote, @loopback}, &(0x7f0000000080)=0xc) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000200)=0x0) sigaltstack(&(0x7f0000ffd000/0x1000)=nil, &(0x7f00000003c0)) llistxattr(&(0x7f0000000040)='./file0\x00', &(0x7f0000000180)=""/79, 0x4f) perf_event_open(&(0x7f0000000300)={0x7, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0xc80, 0x0, 0x0, 0x0, 0x401, 0x3a}, r1, 0x8, 0xffffffffffffffff, 0x0) 2018/03/30 23:06:18 executing program 0 (fault-call:7 fault-nth:25): mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r0 = syz_open_dev$usbmon(&(0x7f0000000400)='/dev/usbmon#\x00', 0x0, 0x0) r1 = perf_event_open(&(0x7f0000223000)={0x2, 0x78, 0xe3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000001980)={{{@in6=@remote, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast2}, 0x0, @in=@multicast2}}, &(0x7f0000001a80)=0xe8) chown(&(0x7f00000004c0)='./file0\x00', r2, 0x0) mount(&(0x7f00000003c0)='./file0\x00', &(0x7f0000000380)='./file0\x00', &(0x7f0000000300)='cgroup2\x00', 0x0, 0x0) r3 = open$dir(&(0x7f000001bff4)='./file0\x00', 0x0, 0x0) mkdirat(r3, &(0x7f0000000280)='./file0\x00', 0x20) getdents64(r3, &(0x7f00000007c0)=""/250, 0x1015a) dup3(r0, r1, 0x80000) r4 = open$dir(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) renameat2(r4, &(0x7f0000000200)='./file1\x00', 0xffffffffffffffff, &(0x7f0000000240)='./file0\x00', 0xfd1092750066ec78) ioctl$KDGKBMODE(0xffffffffffffffff, 0x4b44, &(0x7f0000000140)) 2018/03/30 23:06:18 executing program 5: mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) perf_event_open(&(0x7f0000223000)={0x2, 0x78, 0xe3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$midi(&(0x7f0000000140)='/dev/midi#\x00', 0x3, 0x2) bind$inet6(r0, &(0x7f0000000180)={0xa, 0x4e21, 0x200, @empty, 0xfffffffffffffffc}, 0x1c) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000001980)={{{@in6=@remote, @in=@multicast1}}, {{@in=@multicast2}, 0x0, @in=@multicast2}}, &(0x7f0000001a80)=0xe8) r1 = openat$audio(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/audio\x00', 0x4000, 0x0) ioctl$KVM_DIRTY_TLB(r1, 0x4010aeaa, &(0x7f0000000100)={0x860d, 0x20}) mount(&(0x7f00000003c0)='./file0\x00', &(0x7f0000000380)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) r2 = open$dir(&(0x7f000001bff4)='./file0\x00', 0x0, 0x0) mkdirat(0xffffffffffffffff, &(0x7f0000000280)='./file0\x00', 0x20) unlinkat(r2, &(0x7f0000000080)='./file0\x00', 0x200) 2018/03/30 23:06:18 executing program 7: perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f00000000c0)='./control\x00', 0x0) r0 = inotify_init() inotify_add_watch(r0, &(0x7f0000f1eff6)='./control\x00', 0x220000000009) r1 = inotify_init1(0x0) inotify_add_watch(r1, &(0x7f000001eff6)='./control\x00', 0x2000200) syz_open_dev$amidi(&(0x7f0000000040)='/dev/amidi#\x00', 0xab2, 0x400c2) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffff9c, 0x89e2, &(0x7f0000000100)={r1}) setsockopt$inet6_tcp_TCP_FASTOPEN_KEY(r2, 0x6, 0x21, &(0x7f0000000180)="5fce869db66fa225921ad03d773be4ff", 0x10) rmdir(&(0x7f000075aff6)='./control\x00') inotify_add_watch(r0, &(0x7f0000000080)='./control\x00', 0x60) [ 327.199347] kernel msg: ebtables bug: please report to author: entries_size too small 2018/03/30 23:06:18 executing program 3: r0 = socket(0x40000000015, 0x5, 0x0) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000240), 0x4) bind$inet(r0, &(0x7f00008a5ff0)={0x2, 0x4e21, @loopback=0x7f000001}, 0x10) sendto$inet(r0, &(0x7f0000f7db7f)="ba671368d1010000004900000001000000018be49e9301442865319997d0efdb2f54b6a10c7327757482bfce945c2a91fb8dfafc1d3f56bc543ab87321e12cca08a744a2d128b00634bc882151d36809229a96bc3437ef159489384ade077ba295eac2882dbfd3781dd4d4e609c42628dbb709b3eb1fa030009045dd98b9e6d77b6cec9ceb685595d43995e0f04c32260943add79831e661c6a351dedc8b9d220fbf9fb6e44fb6a629ce9a82025124fec9f3ee751f7da0cd7e799be88ddbdac20b48e890ff81d7fa28c2d017d7932f2569038740461accd4582f576e4fdb6150a3399f8266bc19eb943648ad1ad81420ed6c382436e474390c8995e829e4f9df43eed85a60b9ee254e31eb62900857fa134e76cc64880334adbff069a2e5e647d2ed36a96b23834b6f6ca6b8113baf4cf30347fbb7ffc30aea99872cc0dba03b07d3347b2d257edbe2733c26b7337a79962d8ce85469e3bcbe0e4a48a6ae69d13f2d4b5155b390ef67aa714b82b6313ee277cb8986eca5db2e97cb1ae2243bba80274f614ece521baef443394b4c161cb9ae926e21892578b49cfd6efe1cb1572148c10d92218ed73ec116a18de80ac42d2726a4523a764fc6dc356c5fbbf9d2c947ae3bc9a3dc76099f3257c8d5952876151b0326d8cb1d5683ee4ab5ded9a34c00ac1b03f34627ec18a7c2e92c87b7896549cfab5eb55fa85a970994bd4b22b5f0d045e241256d06f485a47b4a55ed389bc1734541232cd41908b5cfa4b8fcfcafce500a0c7ae99767713a98e7927aa69f6ccd7daea62f19ceb82559f41899c9a9aee99113e7e64b5f8b9824be9fdbfa4dd4995673d882bb4daeb64413b334e114965d2ba3cea8051e692508701b9400cb12eae457f8b8549944091b729160939918d8fcae611a48ed665f770db637487a236da1a58ba7566668651a77171fc4fe506496d19059343dbe4f426625d3f2b705f54581372361770bf5a9098a9fafefaf546426b294239ac33e3186e4d58ad2fa995a6ad4dc074e7cca11aead109563b2076c7c6e9f57ec63df960804e2e7f9d8444de9550cca3df7834d864e9777291c2e1f6205de2e43dc995ab8bb1515a365efc2830fa3e7a1dd137f550d6035212bc1f51c3b4ceea430df49ffc9210084ef156ad7e0d219efd6c116693735b44521d389969a3a65617cd2fd6e14060601cee4cd054cf36fe048b57d1d9ee3cad2a73552449926b4a6b03fbe9c0ec68357e1fbe52ed77b67f5870c0aefb7ee8236747e0d67a26725fb515544cbbe8464da94cfd8c0b94bb4e51a263b1749bd0a7cf651931f806d1b928d1f9994f1ad4d50e6a5cd7a8e4e687f8564fdacc864013d095ba9d5709eced3c28eabda476d177a7836400a01e02beed5a6636d4064fdda344967ad8682d14b87c71727cb66be27d1d39191f4223c545b62fb5d60262ba8076a65dbc194cee1df846c584b7bbe9dce6e6895b2cbbb64b03b55548b845cc3de2f939ef918421af9a5e9157e837651245299c03992d0ddee06bd22a31522aca0f309b1feccebc0b1c0ed9d21c19bfd15cd313ff64394fd6a10904890c9f6d646b026f27253e8f584c3ffd20ad67e8b62ed7676706d40bc5c80e3", 0x47d, 0x0, &(0x7f000069affb)={0x2, 0x4e20, @loopback=0x7f000001}, 0x10) setsockopt$RDS_CONG_MONITOR(r0, 0x114, 0x6, &(0x7f0000000080)=0x1, 0x4) ioctl$int_in(r0, 0x5421, &(0x7f0000000040)=0x56d) sendto$inet(r0, &(0x7f00004b3fff), 0x0, 0x0, &(0x7f00002b4000)={0x2, 0x4e20, @loopback=0x7f000001}, 0x3f6) ioctl$sock_inet_tcp_SIOCOUTQ(r0, 0x5411, &(0x7f0000000000)) [ 327.402745] FAULT_INJECTION: forcing a failure. [ 327.402745] name failslab, interval 1, probability 0, space 0, times 0 [ 327.414101] CPU: 0 PID: 25921 Comm: syz-executor0 Not tainted 4.16.0-rc7+ #372 [ 327.421470] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 327.430832] Call Trace: [ 327.433438] dump_stack+0x194/0x24d [ 327.437089] ? arch_local_irq_restore+0x53/0x53 [ 327.441770] should_fail+0x8c0/0xa40 [ 327.445472] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 327.450562] ? kernfs_add_one+0x50/0x450 [ 327.454608] ? kernfs_add_one+0x50/0x450 [ 327.458666] ? trace_event_raw_event_lock+0x340/0x340 [ 327.463853] ? trace_hardirqs_off+0x10/0x10 [ 327.468162] ? find_held_lock+0x35/0x1d0 [ 327.472211] ? __lock_is_held+0xb6/0x140 [ 327.476279] ? check_same_owner+0x320/0x320 [ 327.480582] ? lock_downgrade+0x980/0x980 [ 327.484716] ? rcu_note_context_switch+0x710/0x710 [ 327.489634] should_failslab+0xec/0x120 [ 327.493592] __kmalloc_track_caller+0x5f/0x760 [ 327.498171] ? idr_alloc_cyclic+0x1d6/0x320 [ 327.502510] ? kstrdup_const+0x39/0x50 [ 327.506385] ? __mutex_unlock_slowpath+0xe9/0xac0 [ 327.511219] kstrdup+0x39/0x70 [ 327.514411] kstrdup_const+0x39/0x50 [ 327.518110] __kernfs_new_node+0xa2/0x570 [ 327.522244] ? kernfs_dop_revalidate+0x380/0x380 [ 327.526990] ? kasan_check_read+0x11/0x20 [ 327.531124] ? read_word_at_a_time+0x12/0x20 [ 327.535514] ? strscpy+0x186/0x500 [ 327.539069] kernfs_new_node+0x80/0xe0 [ 327.542950] __kernfs_create_file+0x4b/0x320 [ 327.547346] cgroup_addrm_files+0x3c5/0xa70 [ 327.551658] ? cgroup_file_write+0x710/0x710 [ 327.556066] ? getrawmonotonic64+0x460/0x460 [ 327.560472] ? kernfs_active+0x92/0x160 [ 327.564453] ? debug_lockdep_rcu_enabled+0x77/0x90 [ 327.569382] ? cgroup_kn_set_ugid+0x2c7/0x370 [ 327.573883] ? cgroup_file_name+0x1d0/0x1d0 [ 327.578217] css_populate_dir+0x340/0x420 [ 327.582385] cgroup_mkdir+0x553/0xfc0 [ 327.586181] ? __lock_is_held+0xb6/0x140 [ 327.590231] ? cgroup_destroy_locked+0x750/0x750 [ 327.594975] ? rcu_read_lock_sched_held+0x108/0x120 [ 327.599973] ? kmem_cache_free+0x258/0x2a0 [ 327.604193] ? set_nlink+0xc1/0x160 [ 327.607805] ? debug_lockdep_rcu_enabled+0x77/0x90 [ 327.612713] ? generic_permission+0x105/0x3c0 [ 327.617188] ? cgroup_destroy_locked+0x750/0x750 [ 327.621928] kernfs_iop_mkdir+0x153/0x1e0 [ 327.626059] vfs_mkdir+0x390/0x600 [ 327.629585] SyS_mkdirat+0x22b/0x2b0 [ 327.633281] ? SyS_mknod+0x480/0x480 [ 327.636977] ? trace_hardirqs_on+0xd/0x10 [ 327.641108] ? do_syscall_64+0xb7/0x940 [ 327.646542] ? SyS_mknod+0x480/0x480 [ 327.650237] do_syscall_64+0x281/0x940 [ 327.654109] ? vmalloc_sync_all+0x30/0x30 [ 327.658236] ? _raw_spin_unlock_irq+0x27/0x70 [ 327.662714] ? finish_task_switch+0x1c1/0x7e0 [ 327.667189] ? syscall_return_slowpath+0x550/0x550 [ 327.672099] ? syscall_return_slowpath+0x2ac/0x550 [ 327.677020] ? prepare_exit_to_usermode+0x350/0x350 [ 327.682049] ? entry_SYSCALL_64_after_hwframe+0x52/0xb7 [ 327.687401] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 327.692232] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 327.697406] RIP: 0033:0x454e79 2018/03/30 23:06:19 executing program 7: perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f00000000c0)='./control\x00', 0x0) r0 = inotify_init() inotify_add_watch(r0, &(0x7f0000f1eff6)='./control\x00', 0x220000000009) r1 = inotify_init1(0x0) r2 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000200)='/dev/autofs\x00', 0x880, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000002c0)={r2, 0x50, &(0x7f0000000240)}, 0x10) r3 = syz_open_dev$adsp(&(0x7f0000000100)='/dev/adsp#\x00', 0x4, 0x51d080) getsockopt$inet_dccp_buf(r3, 0x21, 0xc0, &(0x7f0000000140)=""/114, &(0x7f00000001c0)=0x72) inotify_add_watch(r1, &(0x7f0000000040)='./control\x00', 0x82000002) setsockopt$inet6_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, &(0x7f0000000080)="5fce869db66fa225921ad03d773be4ff", 0x10) perf_event_open(&(0x7f000001d000)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_bp={&(0x7f0000000000), 0x4}, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair(0x10, 0x2000000000a, 0x4, &(0x7f0000000440)={0xffffffffffffffff}) ioctl$sock_kcm_SIOCKCMCLONE(r4, 0x89e2, &(0x7f0000000340)={r4}) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) socketpair(0x4, 0x1, 0x5, &(0x7f0000000100)) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40042409, 0x0) socketpair(0x6, 0x2, 0x1, &(0x7f0000000400)={0xffffffffffffffff}) perf_event_open(&(0x7f000025c000)={0x0, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) gettid() ioctl$PERF_EVENT_IOC_SET_FILTER(r5, 0x40082406, &(0x7f00000000c0)='user\x00') perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, @perf_bp, 0x8010000200000004, 0x7f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000580)='./file0\x00', 0x181) mkdir(&(0x7f0000000100)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x2, 0x78, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000a7dfff)}, 0xa00000400, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000000)='./file0/file0\x00', &(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='rpc_pipefs\x00', 0x0, &(0x7f0000000080)) mount(&(0x7f0000dba000)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f000015bffc)='nfs\x00', 0x400, &(0x7f000000a000)) ioctl$sock_kcm_SIOCKCMCLONE(r4, 0x89e2, &(0x7f00000003c0)={0xffffffffffffff9c}) recvmsg$kcm(r6, &(0x7f0000004980)={&(0x7f0000003700)=@generic, 0x80, &(0x7f0000004840)=[{&(0x7f0000003780)=""/4096, 0x1000}, {&(0x7f0000004780)=""/131, 0xfffffffffffffefe}], 0x2, &(0x7f0000004880)=""/251, 0xfb, 0x2}, 0x40000140) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000080)) 2018/03/30 23:06:19 executing program 6: pipe(&(0x7f0000000940)={0xffffffffffffffff, 0xffffffffffffffff}) accept4$ax25(r0, 0x0, &(0x7f0000000080), 0x80000) r1 = socket$inet(0x2, 0x20000000000003, 0x2) connect$inet(r1, &(0x7f0000000000)={0x2, 0x0, @remote={0xac, 0x14, 0x14, 0xbb}}, 0x10) sendmsg(0xffffffffffffffff, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000140), 0x0, &(0x7f0000000180)=ANY=[]}, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000980)=@broute={'broute\x00', 0x20, 0x3, 0x2d9, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000380], 0x0, &(0x7f00000002c0), &(0x7f0000001000)=ANY=[@ANYBLOB="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"]}, 0x351) setsockopt$inet_int(r1, 0x0, 0x2, &(0x7f00000000c0)=0x7fffffff, 0x4) r2 = socket$rds(0x15, 0x5, 0x0) pipe(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$bt_BT_DEFER_SETUP(r3, 0x112, 0x7, &(0x7f0000000280)=0x100, 0x4) accept$packet(r4, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @remote}, &(0x7f0000000100)=0x14) connect$rds(r2, &(0x7f0000000140)={0x2, 0x4e22, @remote={0xac, 0x14, 0x14, 0xbb}}, 0x10) getsockopt$sock_buf(r2, 0x1, 0x3b, &(0x7f0000000180)=""/83, &(0x7f0000000200)=0x53) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000a00)=@filter={'filter\x00', 0xe, 0x4, 0x5a0, 0xffffffff, 0x0, 0xf0, 0xf0, 0xffffffff, 0xffffffff, 0x4d0, 0x4d0, 0x4d0, 0xffffffff, 0x4, &(0x7f0000000300), {[{{@ipv6={@ipv4={[], [0xff, 0xff], @rand_addr=0x80000001}, @dev={0xfe, 0x80, [], 0x16}, [0x0, 0xffffff00, 0xff, 0xffffffff], [0x0, 0xff000000, 0xffffffff], 'ipddp0\x00', 'ip_vti0\x00', {}, {0xff}, 0x6c, 0x2bf}, 0x0, 0xc8, 0xf0}, @REJECT={0x28, 'REJECT\x00', 0x0, {0x7}}}, {{@ipv6={@remote={0xfe, 0x80, [], 0xbb}, @remote={0xfe, 0x80, [], 0xbb}, [0xff000000, 0xffffffff, 0xffffff00, 0xff], [0xff, 0xffffffff, 0x0, 0xff000000], 'syzkaller1\x00', 'eql\x00', {}, {}, 0x62, 0x0, 0x4, 0x1}, 0x0, 0x120, 0x148, 0x0, {}, [@common=@frag={0x30, 'frag\x00', 0x0, {0x7ff, 0x7, 0x1, 0x2}}, @common=@hl={0x28, 'hl\x00', 0x0, {0x3, 0x7fff}}]}, @REJECT={0x28, 'REJECT\x00', 0x0, {0x7}}}, {{@ipv6={@dev={0xfe, 0x80, [], 0xc}, @loopback={0x0, 0x1}, [0xffffffff, 0xffffffff, 0xff000000, 0xff000000], [0xff, 0x0, 0xff, 0xffffff00], 'irlan0\x00', 'vcan0\x00', {0xff}, {}, 0x3b, 0xffffffffffffab69, 0x2, 0x30}, 0x0, 0x250, 0x298, 0x0, {}, [@common=@srh={0x30, 'srh\x00', 0x0, {0xbb, 0x1, 0x3, 0x6, 0xffffffffffffffc0, 0x80}}, @common=@inet=@policy={0x158, 'policy\x00', 0x0, {[{@ipv4, [0xffffffff, 0xff0000ff, 0xff000000, 0xffffffff], @ipv4=@multicast1=0xe0000001, [0xffffffff, 0xffffffff, 0xff000000, 0xffffff00], 0x4d5, 0x3500, 0x5c, 0x0, 0x10, 0xf}, {@ipv6=@dev={0xfe, 0x80, [], 0x11}, [0x0, 0xff000000, 0xff0000ff, 0xffffff00], @ipv4=@multicast1=0xe0000001, [0xffffffff, 0x0, 0x0, 0xffffffff], 0x4d5, 0x3500, 0x77, 0x1, 0x0, 0x1d}, {@ipv6=@mcast1={0xff, 0x1, [], 0x1}, [0xff000000, 0xffffffff, 0xffffff00, 0xff], @ipv4=@multicast2=0xe0000002, [0xffffffff, 0x0, 0xffffff00, 0xffffffff], 0x4d3, 0x3503, 0x7f, 0x0, 0x1, 0x19}, {@ipv4=@local={0xac, 0x14, 0x14, 0xaa}, [0x0, 0xff, 0x0, 0xff0000ff], @ipv6=@local={0xfe, 0x80, [], 0xaa}, [0xffffffff, 0xffffffff, 0xff, 0xff0000ff], 0x0, 0x3505, 0x0, 0x1, 0x1f, 0x10}], 0x0, 0x3}}]}, @common=@unspec=@LED={0x48, 'LED\x00', 0x0, {'syz1\x00', 0x0, 0x8, 0x8}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28, '\x00', 0x0, 0xfffffffffffffffe}}}}, 0x600) socket(0x1, 0xa, 0x7) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_TIMER(r4, 0x40605346, &(0x7f0000000680)={0x1, 0x3, {0x3, 0x0, 0x9, 0x3}}) 2018/03/30 23:06:19 executing program 2: socket$inet_sctp(0x2, 0x0, 0x84) write$rdma_cm(0xffffffffffffffff, &(0x7f00000000c0)=ANY=[@ANYBLOB], 0x0) write$rdma_cm(0xffffffffffffffff, &(0x7f00000003c0)=ANY=[@ANYBLOB="031a4f2f7f000000dde30000000000000000000000000000000000000000000100005dd45591dac827000000ff01000000000000000000000000000000000000"], 0x40) write$rdma_cm(0xffffffffffffffff, &(0x7f0000000440)=@resolve_ip={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x1, [], 0x1}}, {0xa, 0x0, 0x0, @mcast1={0xff, 0x1, [], 0x1}}}}, 0x48) r0 = creat(&(0x7f0000000140)='./file0\x00', 0x8) socketpair(0x3, 0x0, 0xfffffffffffffff7, &(0x7f0000000240)) perf_event_open(&(0x7f000001d000)={0x2, 0x78, 0xe2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$inet6_int(r1, 0x29, 0xc8, &(0x7f00008d6000), 0x4) openat$kvm(0xffffffffffffff9c, &(0x7f0000264ff7)='/dev/kvm\x00', 0x0, 0x0) setsockopt$inet6_int(r1, 0x29, 0xc8, &(0x7f0000ac5000), 0x4) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000000)={@remote, @loopback}, &(0x7f0000000080)=0xc) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000200)=0x0) syz_mount_image$btrfs(&(0x7f00000000c0)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x1000000020000, 0xa, &(0x7f0000001980)=[{&(0x7f00000004c0)="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", 0x1000, 0x6}, {&(0x7f0000000280)="b7083291254c03e7c3957b6fa9f149e2e3d99f973c0c8a3d2df96f8200aa727bd05f2bddf62ee2ba0073dac7285a7d11582adf3e480bd0c099af37dc1b286ea37db6d4627c1beb828aa77de960b0b4a00a54b1d55fdf60ccb6c2a6277b7d07", 0x5f, 0x8}, {&(0x7f00000014c0)="3d6331490eb3518131b2cc28112aebd5d544d8812b1e748a833baab3337e48bc866a6bba5d8927d2aaebd1480c92e52c36fee3e19ba37470b59314a63da99b2841e003364ff3a46fc610ede3da2bf59d8014dc5c81cd8244e157ae85ac75ec7359bbe2abfd6f4f8772ad97", 0x6b, 0x800}, {&(0x7f0000001540)="13a38989809d0c7ab8a432277f21447e7ab001d33e05577063413ad7332cfeb365b24df77c3c58e1cf78197e10000eab9044b82895b1ea4e919721ca2d5be6fe97f6cbed731617807044c7092d6fb6db1e20c12d904104bf839ba3cad60dc7cc53ceb93260b69ae0b6d7a281de5070b92008fed1eaad7721ad6a5a995093f8e71012057f11e80fe3305608897db5b7d9b41e91b5feec7d8771bfd34b9d3ab178dd26af399e7a906a578bc66a005091270aded858f5e5328722e90d", 0xbb, 0x7ff}, {&(0x7f0000001600)="180e0b315785a7d44275e9ed4b0228015353252aa70f2b0163288176e45d94eb296e643e721f378813afa4dcd7eb593a115fa77d0914daa11c5a3b931c5c57090f8711570f077993340a184077071915ebb9c8255a820b4aedfa49e00cebce622e8900357699", 0x66, 0x2}, {&(0x7f0000001680)="8ef2e577476ba5a56f74f0dd92f6af00fa1a23637579a6689dc93f3efbf5da6729986129b0fc2fa9645095580d253c2d9e918bd1d26673dbc7ede07897dc0caf6a337bf3827c3f89e2d85c6dbbdd84ca382fc1d20a53250c2e2adffb7fe5547abc7d8c82", 0x64, 0x4}, {&(0x7f0000001700)="d0ee449508f2e5d223a1925f71674de69d9cc97a7ff5b1ebb7edd7931c8ce99536ca0e76d1112bd642baf3806489b03df64c8a2e2449ad41f308c7c9c2ac3cab377c3322d6b6a30da94f7cd05bd7abe0640f6ca08bb2bff311e66d5a213166844a225ee9f47c5d0309cec4959b52313c93235ea2c4a74d79e67fdbba72e39f1b9a5fbf6a09fc2213ab8d86a04dddcb972ba6722fdb4d165bde72d1f599ee1951c4f4d2cc343bc110c067bc28c2532b1be9dc51ecb291acf78972eae827", 0xbd, 0x8}, {&(0x7f00000017c0)="80fc967bcd21eaaa4e09a9610982bcd72f6abba74e935e0fd7bde33e0827b7acc3dac0151d80726fbfd421595bf1da7dbbec305a7ce8e967bc3d749ec64ba929dbcb5312b34979f5c588db3b3785d91cb34be31106945131d46430eae98a", 0x5e, 0xffff}, {&(0x7f0000001840)="ea4e8d2efc42c138b7a85ee68a3233d413a4a0f785361a988f9c1d270b59c0477219afd8a6dc93b3c0fae9d9af6ac19f5e4e684de3486bb3afada7520390e5a24a84e8eb8c89f14ab422af7a1b873bdb61c4aac723741a4aa65c24c65e1d6cdfff8de7ecca6946f0dcd4a95754fe4a14fee1abcbf4edf7998fcef3a5c0aaab4708e136330b0e50dad8a476a80b261b4ad1c764a6cb6705bd05368d7fceee040099fafc3f37", 0xa5, 0x1}, {&(0x7f0000001900)="c0749e95e30ca47273632c6d5370b7200f77a775b0c2e7100d347d3d3d73d70b2769b3fb95c8dd14644495493984d02cbce64a7de05d630e24db3edd05479f0442f5eb73dcf975246fed2bd19093ff59e0e9759cd766b7a5af2b1dcb6221448087ac7fc37328678d1711d59e2ef3952d291fb9f305df", 0x76}], 0x20002, &(0x7f0000001a80)={[{@ssd='ssd', 0x2c}, {@subvol={'subvol', 0x3d, [0x78, 0x7d, 0x38, 0x6f]}, 0x2c}, {@fragment_data='fragment=data', 0x2c}, {@fragment_all='fragment=all', 0x2c}, {@noflushoncommit='noflushoncommit', 0x2c}, {@degraded='degraded', 0x2c}, {@compress_algo={'compress', 0x3d, 'no'}, 0x2c}, {@nodatacow='nodatacow', 0x2c}, {@subvol={'subvol', 0x3d, [0x74, 0x35, 0x36, 0x0, 0x67, 0x3f, 0x75, 0x2d]}, 0x2c}]}) sigaltstack(&(0x7f0000ffd000/0x1000)=nil, &(0x7f00000003c0)) llistxattr(&(0x7f0000000040)='./file0\x00', &(0x7f0000000180)=""/79, 0x4f) ioctl$EVIOCGID(r0, 0x80084502, &(0x7f0000001b00)=""/82) perf_event_open(&(0x7f0000000300)={0x7, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0xc80, 0x0, 0x0, 0x0, 0x401, 0x3a}, r2, 0x8, 0xffffffffffffffff, 0x0) 2018/03/30 23:06:19 executing program 5: mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r0 = perf_event_open(&(0x7f0000223000)={0x2, 0x78, 0xe3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000001980)={{{@in6=@remote, @in=@multicast1}}, {{@in=@multicast2}, 0x0, @in=@multicast2}}, &(0x7f0000001a80)=0xe8) mount(&(0x7f00000003c0)='./file0\x00', &(0x7f0000000380)='./file0\x00', &(0x7f0000000300)='cgroup2\x00', 0x0, 0x0) ioctl$KVM_GET_VCPU_EVENTS(r0, 0x8040ae9f, &(0x7f0000000040)) r1 = open$dir(&(0x7f000001bff4)='./file0\x00', 0x0, 0x0) mkdirat(0xffffffffffffffff, &(0x7f0000000280)='./file0\x00', 0x20) unlinkat(r1, &(0x7f0000000080)='./file0\x00', 0x200) 2018/03/30 23:06:19 executing program 3: r0 = socket(0x40000000015, 0x5, 0x0) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000240), 0x4) bind$inet(r0, &(0x7f00008a5ff0)={0x2, 0x4e21, @loopback=0x7f000001}, 0x10) sendto$inet(r0, &(0x7f0000f7db7f)="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", 0x47d, 0x0, &(0x7f000069affb)={0x2, 0x4e20, @loopback=0x7f000001}, 0x10) setsockopt$RDS_CONG_MONITOR(r0, 0x114, 0x6, &(0x7f0000000080)=0x1, 0x4) ioctl$int_in(r0, 0x5421, &(0x7f0000000040)=0x56d) sendto$inet(r0, &(0x7f00004b3fff), 0x0, 0x0, &(0x7f00002b4000)={0x2, 0x4e20, @loopback=0x7f000001}, 0x3f6) ioctl$sock_inet_tcp_SIOCOUTQ(r0, 0x5411, &(0x7f0000000000)) 2018/03/30 23:06:19 executing program 4: mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount(&(0x7f000000a000)='./file0\x00', &(0x7f0000026ff8)='./file0\x00', &(0x7f000000c000)='ramfs\x00', 0x0, &(0x7f000000a000)) mkdir(&(0x7f0000000000)='./file1\x00', 0x0) mount(&(0x7f0000000040)='./file0\x00', &(0x7f0000000580)='./file0\x00', &(0x7f00000002c0)='bdev\x00', 0x8002, &(0x7f00000003c0)="b4654e059fcebd03cc73f9239f6a07ed22ce66385d2337eef2a66d904034c83627a12afc1ecb8d7e1142c51440c631a77475529f58d06474cd08984ca20eda40006f352aef263558961ab3f1ff300b08a5b54aea2a56162623142af3cce1057c8ee9eb15dc98e01846afc544b424ae134364f0ff76c92d9ce550f032a00c5981d459112f5c70789ed3bbb5527400465c6a98b4e0432a1ca8ce37dfdc7619e8b4129ee976c9b944bc6b366dbc5f0dae558fa30da2267dfccc6187d2d6f34d725343470a748007fee97ba3784d030b833463699073719ca14a0e9b6d74a70db8b216256fcd74c66a0faac2ccc16c74a7e13289091a5256dd062edf07ff4d9168e49b0820c6bb9fbabc587b54dacb9834b644eafefc1e0a4dd249c45cac5858364765a08967ed59ac86aefcb7d13e3e9cdf7c7262122bc4cfd718c3fd984395afa896d48a48489f889bd4efac7267dffdff0c686fae") r0 = dup(0xffffffffffffffff) r1 = syz_open_dev$vcsn(&(0x7f00000000c0)='/dev/vcs#\x00', 0x2, 0x20800) renameat(r0, &(0x7f0000000080)='./file1/file0\x00', r1, &(0x7f0000000100)='./file1\x00') readahead(r0, 0x4, 0x711d4da4) mount(&(0x7f0000fb6000)='./file0\x00', &(0x7f0000d78000)='.', &(0x7f0000fdb000)='ubifs\x00', 0x1003, 0x0) link(&(0x7f0000000380)='./file1/file0\x00', &(0x7f0000000540)='./file1\x00') mount(&(0x7f00002b9ff8)='./file0\x00', &(0x7f0000cbeff8)='./file0\x00', &(0x7f00005f7ffa)='ramfs\x00', 0x80000, &(0x7f000002f000)) ioctl$sock_inet_SIOCGARP(r0, 0x8954, &(0x7f0000000300)={{0x2, 0x4e20, @broadcast=0xffffffff}, {0x307, @local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}}, 0x18, {0x2, 0x4e23, @multicast2=0xe0000002}, 'syz_tun\x00'}) mount(&(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)='./file1\x00', &(0x7f0000000200)='anon_inodefs\x00', 0x2000, &(0x7f0000000240)) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000640)={{{@in6=@mcast2, @in=@multicast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{}, 0x0, @in=@remote}}, &(0x7f0000000740)=0xe8) getresgid(&(0x7f0000000780)=0x0, &(0x7f00000007c0), &(0x7f0000000800)) getsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(r0, 0x84, 0x8, &(0x7f0000000840), &(0x7f0000000880)=0x4) syz_fuseblk_mount(&(0x7f00000005c0)='./file0\x00', &(0x7f0000000600)='.', 0x1, r2, r3, 0x100000001, 0x0, 0x100000) mount(&(0x7f0000adcff8)='./file0\x00', &(0x7f0000e08fff)='.', &(0x7f00005e9000)='cifs\x00', 0x2000, &(0x7f0000ad5000)) link(&(0x7f0000000140)='./file1\x00', &(0x7f0000000240)='./file1\x00') sendmsg$key(r0, &(0x7f0000000a00)={0x0, 0x0, &(0x7f00000009c0)={&(0x7f00000008c0)={0x2, 0x10, 0x20, 0x9, 0x1b, 0x0, 0x70bd2c, 0x25dfdbfb, [@sadb_x_nat_t_type={0x1, 0x14, 0x8}, @sadb_x_kmaddress={0x5, 0x19, 0x0, @in={0x2, 0x4e23, @multicast1=0xe0000001}, @in={0x2, 0x4e23, @loopback=0x7f000001}}, @sadb_ident={0x2, 0x0, 0x1ff, 0x0, 0xfffffffffffffffe}, @sadb_ident={0x2, 0xb, 0x7e, 0x0, 0x1}, @sadb_x_policy={0x8, 0x12, 0x4, 0x0, 0x0, 0x6e6bb2, 0xed, {0x6, 0x37c7d85d1a6750d9, 0x10000, 0x101, 0x0, 0x0, 0x0, @in=@broadcast=0xffffffff, @in6}}, @sadb_x_nat_t_port={0x1, 0x16, 0x4e21}, @sadb_x_nat_t_port={0x1, 0x0, 0x4e22}, @sadb_x_nat_t_port={0x1, 0x16, 0x4e20}, @sadb_spirange={0x2, 0x10, 0x4d6, 0x4d5}, @sadb_x_sa2={0x2, 0x13, 0xffffffffffffff7b, 0x0, 0x0, 0x70bd2a, 0x3506}]}, 0xd8}, 0x1}, 0x20000000) ioctl$SNDRV_CTL_IOCTL_TLV_WRITE(r1, 0xc008551b, &(0x7f0000000280)=ANY=[@ANYBLOB="3f0000002000000001040000bc000000a0d200004d0300000100000003000000010000803e000000"]) ioctl$VT_ACTIVATE(r1, 0x5606, 0x80000001) 2018/03/30 23:06:19 executing program 0 (fault-call:7 fault-nth:26): mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r0 = syz_open_dev$usbmon(&(0x7f0000000400)='/dev/usbmon#\x00', 0x0, 0x0) r1 = perf_event_open(&(0x7f0000223000)={0x2, 0x78, 0xe3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000001980)={{{@in6=@remote, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast2}, 0x0, @in=@multicast2}}, &(0x7f0000001a80)=0xe8) chown(&(0x7f00000004c0)='./file0\x00', r2, 0x0) mount(&(0x7f00000003c0)='./file0\x00', &(0x7f0000000380)='./file0\x00', &(0x7f0000000300)='cgroup2\x00', 0x0, 0x0) r3 = open$dir(&(0x7f000001bff4)='./file0\x00', 0x0, 0x0) mkdirat(r3, &(0x7f0000000280)='./file0\x00', 0x20) getdents64(r3, &(0x7f00000007c0)=""/250, 0x1015a) dup3(r0, r1, 0x80000) r4 = open$dir(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) renameat2(r4, &(0x7f0000000200)='./file1\x00', 0xffffffffffffffff, &(0x7f0000000240)='./file0\x00', 0xfd1092750066ec78) ioctl$KDGKBMODE(0xffffffffffffffff, 0x4b44, &(0x7f0000000140)) 2018/03/30 23:06:19 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x200, 0x0) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000680)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$sock_linger(r2, 0x1, 0xd, &(0x7f00000006c0)={0x400, 0x9}, 0x8) perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x0, 0x0) r3 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) mmap(&(0x7f0000000000/0x9d7000)=nil, 0x9d7000, 0x0, 0x10, 0xffffffffffffffff, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x7) perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r4 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r4, &(0x7f0000e5b000)={0x2, 0x4e20, @multicast1=0xe0000001}, 0x10) syz_open_dev$sg(&(0x7f0000000440)='/dev/sg#\x00', 0x0, 0x0) connect$inet(r4, &(0x7f0000000100)={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x11}}, 0x10) r5 = bpf$PROG_LOAD(0x5, &(0x7f0000eb0fb8)={0x1, 0x3, &(0x7f00009ff000)=@framed={{0x18}, [], {0x95}}, &(0x7f00002bf000)='syzkaller\x00', 0x4, 0xb7, &(0x7f00006ab000)=""/183}, 0x48) setsockopt$inet_tcp_int(r4, 0x6, 0x19, &(0x7f0000000240)=0x8, 0x4) r6 = socket$kcm(0x29, 0x2, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r6, 0x89e0, &(0x7f000031aff8)={r4, r5}) ioctl$sock_kcm_SIOCKCMCLONE(r6, 0x89e2, &(0x7f00000002c0)={0xffffffffffffffff}) sendmsg$nl_xfrm(r7, &(0x7f0000000780)={&(0x7f0000000200)={0x10}, 0xc, &(0x7f0000000740)={&(0x7f0000000480)=@updpolicy={0xb8, 0x19, 0x0, 0x0, 0x0, {{@in=@loopback=0x7f000001, @in6=@mcast1={0xff, 0x1, [], 0x1}}}}, 0xffcb}, 0x1}, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(r7, 0x89e1, &(0x7f0000000040)={r4}) r8 = fcntl$getown(0xffffffffffffffff, 0x9) recvfrom$inet6(r1, &(0x7f0000000140)=""/177, 0xb1, 0x40000000, &(0x7f0000000080)={0xa, 0x4e23, 0x9, @empty, 0xe38}, 0x1c) r9 = accept4$inet(0xffffffffffffff9c, &(0x7f0000000700)={0x0, 0x0, @broadcast}, &(0x7f0000000740)=0x10, 0x80000) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r9, 0x84, 0x64, &(0x7f0000000780)=[@in6={0xa, 0x4e22, 0xfffffffffffff7e1, @mcast2={0xff, 0x2, [], 0x1}, 0x8}, @in={0x2, 0x4e24, @broadcast=0xffffffff}], 0x2c) ptrace$setregset(0x4205, r8, 0x0, &(0x7f00000005c0)={&(0x7f0000000080)}) ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r10 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x1fffd, 0x0) r11 = syz_open_dev$sndtimer(&(0x7f00000000c0)='/dev/snd/timer\x00', 0x0, 0x0) read(r11, &(0x7f0000ec6000)=""/50, 0x32) fcntl$dupfd(r11, 0x0, r10) [ 327.700574] RSP: 002b:00007f016b92fc68 EFLAGS: 00000246 ORIG_RAX: 0000000000000102 [ 327.708265] RAX: ffffffffffffffda RBX: 00007f016b9306d4 RCX: 0000000000454e79 [ 327.715514] RDX: 0000000000000020 RSI: 0000000020000280 RDI: 0000000000000015 [ 327.722764] RBP: 000000000072bea0 R08: 0000000000000000 R09: 0000000000000000 [ 327.730021] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000016 [ 327.737273] R13: 00000000000003eb R14: 00000000006f7ea8 R15: 0000000000000019 [ 327.744757] cgroup: cgroup_addrm_files: failed to add cpu.stat, err=-12 [ 327.801208] kernel msg: ebtables bug: please report to author: entries_size too small 2018/03/30 23:06:19 executing program 3: r0 = socket(0x40000000015, 0x5, 0x0) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000240), 0x4) bind$inet(r0, &(0x7f00008a5ff0)={0x2, 0x4e21, @loopback=0x7f000001}, 0x10) sendto$inet(r0, &(0x7f0000f7db7f)="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", 0x47f, 0x0, &(0x7f000069affb)={0x2, 0x4e20, @loopback=0x7f000001}, 0x10) setsockopt$RDS_CONG_MONITOR(r0, 0x114, 0x6, &(0x7f0000000080)=0x1, 0x4) ioctl$int_in(r0, 0x5421, &(0x7f0000000040)=0x56d) sendto$inet(r0, &(0x7f00004b3fff), 0x0, 0x0, &(0x7f00002b4000)={0x2, 0x4e20, @loopback=0x7f000001}, 0x3f6) ioctl$sock_inet_tcp_SIOCOUTQ(r0, 0x5411, &(0x7f0000000000)) [ 327.888820] FAULT_INJECTION: forcing a failure. [ 327.888820] name failslab, interval 1, probability 0, space 0, times 0 [ 327.897237] rpcbind: RPC call returned error 22 [ 327.900119] CPU: 0 PID: 25949 Comm: syz-executor0 Not tainted 4.16.0-rc7+ #372 [ 327.912120] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 327.921481] Call Trace: [ 327.924084] dump_stack+0x194/0x24d [ 327.927734] ? arch_local_irq_restore+0x53/0x53 [ 327.932431] should_fail+0x8c0/0xa40 2018/03/30 23:06:19 executing program 4: mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount(&(0x7f000000a000)='./file0\x00', &(0x7f0000026ff8)='./file0\x00', &(0x7f000000c000)='ramfs\x00', 0x0, &(0x7f000000a000)) mkdir(&(0x7f0000000000)='./file1\x00', 0x0) mount(&(0x7f0000000040)='./file0\x00', &(0x7f0000903000)='./file0\x00', &(0x7f0000811ffa)='bdev\x00', 0x100000, &(0x7f00000003c0)="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") r0 = dup(0xffffffffffffffff) r1 = syz_open_dev$vcsn(&(0x7f00000000c0)='/dev/vcs#\x00', 0x2, 0x20800) renameat(r0, &(0x7f0000000080)='./file1/file0\x00', r1, &(0x7f0000000100)='./file1\x00') mount(&(0x7f0000fb6000)='./file0\x00', &(0x7f0000d78000)='.', &(0x7f0000fdb000)='ubifs\x00', 0x1003, 0x0) mount(&(0x7f00002b9ff8)='./file0\x00', &(0x7f0000cbeff8)='./file0\x00', &(0x7f00005f7ffa)='ramfs\x00', 0x80000, &(0x7f000002f000)) getpeername(r1, &(0x7f0000000240)=@can, &(0x7f0000000140)=0x80) mount(&(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)='./file1\x00', &(0x7f0000000200)='anon_inodefs\x00', 0x2000, &(0x7f0000000240)) ioctl$DRM_IOCTL_GEM_OPEN(r1, 0xc010640b, &(0x7f00000002c0)={0x0, 0x0, 0x5}) ioctl$DRM_IOCTL_GEM_FLINK(0xffffffffffffffff, 0xc008640a, &(0x7f0000000300)={0x0, 0x0}) ioctl$DRM_IOCTL_GEM_FLINK(r0, 0xc008640a, &(0x7f0000000340)={r2, r3}) mount(&(0x7f0000adcff8)='./file0\x00', &(0x7f0000e08fff)='.', &(0x7f00005e9000)='cifs\x00', 0x2000, &(0x7f00000002c0)) [ 327.936150] ? __mutex_unlock_slowpath+0xe9/0xac0 [ 327.941008] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 327.946127] ? _raw_spin_unlock+0x22/0x30 [ 327.950301] ? kernfs_dop_revalidate+0x380/0x380 [ 327.955072] ? find_held_lock+0x35/0x1d0 [ 327.959145] ? __lock_is_held+0xb6/0x140 [ 327.963241] ? check_same_owner+0x320/0x320 [ 327.967572] ? __kernfs_create_file+0x27f/0x320 [ 327.972256] ? rcu_note_context_switch+0x710/0x710 [ 327.977211] should_failslab+0xec/0x120 [ 327.981203] kmem_cache_alloc+0x47/0x760 [ 327.985283] ? __lock_is_held+0xb6/0x140 [ 327.989369] sched_create_group+0x22/0x70 [ 327.993532] cpu_cgroup_css_alloc+0xe/0x30 [ 327.997780] cgroup_apply_control_enable+0x44d/0xbc0 [ 328.002916] ? cgroup_propagate_control+0x570/0x570 [ 328.007957] ? css_populate_dir+0x289/0x420 [ 328.012292] cgroup_mkdir+0x56f/0xfc0 [ 328.016095] ? __lock_is_held+0xb6/0x140 [ 328.020185] ? cgroup_destroy_locked+0x750/0x750 [ 328.024955] ? rcu_read_lock_sched_held+0x108/0x120 [ 328.029980] ? kmem_cache_free+0x258/0x2a0 [ 328.031575] rpcbind: RPC call returned error 22 [ 328.034219] ? set_nlink+0xc1/0x160 [ 328.034237] ? debug_lockdep_rcu_enabled+0x77/0x90 [ 328.034248] ? generic_permission+0x105/0x3c0 [ 328.034268] ? cgroup_destroy_locked+0x750/0x750 [ 328.056684] kernfs_iop_mkdir+0x153/0x1e0 [ 328.060841] vfs_mkdir+0x390/0x600 [ 328.064395] SyS_mkdirat+0x22b/0x2b0 [ 328.068113] ? SyS_mknod+0x480/0x480 [ 328.071828] ? trace_hardirqs_on+0xd/0x10 [ 328.075983] ? do_syscall_64+0xb7/0x940 [ 328.079966] ? SyS_mknod+0x480/0x480 [ 328.083691] do_syscall_64+0x281/0x940 [ 328.087582] ? vmalloc_sync_all+0x30/0x30 [ 328.091733] ? _raw_spin_unlock_irq+0x27/0x70 [ 328.096240] ? finish_task_switch+0x1c1/0x7e0 [ 328.100743] ? syscall_return_slowpath+0x550/0x550 [ 328.105677] ? syscall_return_slowpath+0x2ac/0x550 [ 328.110601] ? prepare_exit_to_usermode+0x350/0x350 [ 328.115601] ? entry_SYSCALL_64_after_hwframe+0x52/0xb7 [ 328.120950] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 328.125779] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 328.130945] RIP: 0033:0x454e79 [ 328.134114] RSP: 002b:00007f016b92fc68 EFLAGS: 00000246 ORIG_RAX: 0000000000000102 [ 328.141812] RAX: ffffffffffffffda RBX: 00007f016b9306d4 RCX: 0000000000454e79 [ 328.149060] RDX: 0000000000000020 RSI: 0000000020000280 RDI: 0000000000000015 [ 328.156314] RBP: 000000000072bea0 R08: 0000000000000000 R09: 0000000000000000 [ 328.163572] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000016 [ 328.170818] R13: 00000000000003eb R14: 00000000006f7ea8 R15: 000000000000001a 2018/03/30 23:06:20 executing program 3: r0 = socket(0x40000000015, 0x5, 0x0) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000240), 0x4) bind$inet(r0, &(0x7f00008a5ff0)={0x2, 0x4e21, @loopback=0x7f000001}, 0x10) sendto$inet(r0, &(0x7f0000f7db7f)="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", 0x47f, 0x0, &(0x7f000069affb)={0x2, 0x4e20, @loopback=0x7f000001}, 0x10) setsockopt$RDS_CONG_MONITOR(r0, 0x114, 0x6, &(0x7f0000000080)=0x1, 0x4) ioctl$int_in(r0, 0x5421, &(0x7f0000000040)=0x56d) sendto$inet(r0, &(0x7f00004b3fff), 0x0, 0x0, &(0x7f00002b4000)={0x2, 0x4e20, @loopback=0x7f000001}, 0x3f6) ioctl$sock_inet_tcp_SIOCOUTQ(r0, 0x5411, &(0x7f0000000000)) 2018/03/30 23:06:20 executing program 5: mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r0 = open(&(0x7f0000000100)='./file0\x00', 0x80000, 0x40) r1 = perf_event_open(&(0x7f0000223000)={0x2, 0x70, 0xe3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0x0, r0, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000001980)={{{@in6=@remote, @in=@multicast1}}, {{@in=@multicast2}, 0x0, @in=@multicast2}}, &(0x7f0000001a80)=0xe8) ioctl$sock_SIOCOUTQNSD(r1, 0x894b, &(0x7f00000000c0)) mount(&(0x7f00000003c0)='./file0\x00', &(0x7f0000000380)='./file0\x00', &(0x7f0000000300)='cgroup2\x00', 0x0, 0x0) r2 = open$dir(&(0x7f000001bff4)='./file0\x00', 0x0, 0x0) mkdirat(r2, &(0x7f0000000040)='./file0\x00', 0x20) unlinkat(r2, &(0x7f0000000080)='./file0\x00', 0x200) ioctl$TIOCGPGRP(r0, 0x540f, &(0x7f0000000140)) 2018/03/30 23:06:20 executing program 2: socket$inet_sctp(0x2, 0x0, 0x84) write$rdma_cm(0xffffffffffffffff, &(0x7f00000000c0)=ANY=[@ANYBLOB], 0x0) write$rdma_cm(0xffffffffffffffff, &(0x7f00000003c0)=ANY=[@ANYBLOB="031a4f2f7f000000dde30000000000000000000000000000000000000000000100005dd45591dac827000000ff01000000000000000000000000000000000000"], 0x40) write$rdma_cm(0xffffffffffffffff, &(0x7f0000000440)=@resolve_ip={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x1, [], 0x1}}, {0xa, 0x0, 0x0, @mcast1={0xff, 0x1, [], 0x1}}}}, 0x48) creat(&(0x7f0000000140)='./file0\x00', 0x8) socketpair(0x3, 0x0, 0xfffffffffffffff7, &(0x7f0000000240)={0xffffffffffffffff}) perf_event_open(&(0x7f000001d000)={0x2, 0x78, 0xe2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f00000000c0)={'tunl0\x00', 0x0}) sendto$packet(r0, &(0x7f00000004c0)="9a90587338c199f2060e30e90f6663b6d708fb291ca8fb34cd47d583dc536ddfdf53dfe5a06a3372e287492369adf1503ffb5814c69f936e25d385e882b781fe26854232103f0b46e879736352f09f678f5f7f268a7083be69ded3f0ca468b4c312809fc63c79b9abec20c5e86477eced1f7ad8d67c26914883808fbe73e7589ee3445830ee51e419cca0035e2e73cae706cc778acaf815d849ba1dd6d9ca43e4cedfbc03ff24144aa96d25f37bb6d4fb602ea869eaca1e6eec516e0940621efbb84544d7a546c79e584943221070c9db6965a7764b8117ef3d9c6dc9b6fd9ad6a92f9fa03f2fc8cc734e7838f56a2f770bc2a60be0ed85acabc0205e9f91c20cbe28902b3ad825d364b5507169d4e8ff08bda0d95e73cb47a42e992adba2e872bf152a185416f59513927d511c43f37482643bcba49c188712d9c47051579e63e3694e7e3ba455319d11a8ecab8eb8d0c77601ad686e8166d03c3452bb6966bcf951d855c17f051ad6ddf6ceac786c392b7090926da87103853a51903f9bbe2fb3e4a1e4588d1e1bbfee8cae3f84ca9072c72b85a1a0c88f4985fc813f74b8044baa64c49d96c68a7027bff417bc07f7c2af2425f4335362f1e73cbd55c2a5b7b87937d85f78d8b5c8b9c7d973ab64d0d86e77691fbdb18f8a8f8bc99ae1e1e7355c54e0d91e23137e6dea643651d005d80a8106ff48ae015ad76dd6703d16d5b1c3e22b5c1ea97dc591f35c3a8cab8eab1e9062ce04a864c7e1fcfe5b71223b1b047343889a8e2a64338b874d5eea6e89658277606aee3fa62aece9e615768ade9e968ba65a9bceb18c82d164298f0bb903d9a173d61ab06d563d0f0cd20851d65ea98db7079ee259decd3ac8f6d6e73cabe392e574cbd9983f1bcc057a76516719ca973594c6a9781770fc6f449fadd535310bdd8f7f7b441e66a8264f6722f495e82f76560f50167fbb1b9b25edbe0c4e130bccc98d6467bf24645cdc8f1a786275509fadef4f93b7df913542afb522815fa3fef0b15c3648684bb0cc4a581520af55bb03c78e2f9dedba4d55d8f8a3acd71fe8eee66ccd9c44c42e7a469ed5841e803b1383577e70dae98d553877045a3dccf56a8d85df339b33be497853d3fff645b98592f0be0b140d6f254c9b90b28aced4a079bbb6d20d3284e835939e1905b1972937618e1e53d254058c724d749a87693bf7478ed1eb127336363d24492f1489a9a97f65cdc796e3e5c1111f87380801724f3310f309a8dda16985fc66c447a9db19ef7c1580280ff8ff08b592d57f335e2bd9833c97c243fda8731723a36cb032c10c9cecfb0236ef203ea8f643508e07ccdf8c5ac26684f1e2e70fd493d48ac1e464426e8dd0ecb905aa9b1904d30910b16489e5480f2cf36253a9c465a8311d0c613ab2f6a7c07b6cbd1f30a640f6739301042c1f1d2f055a14a3086174b6af7966848d806c803672194e09ba02c39e76753eab3e20ac331ce0f03c328d45ce10463fa70d0eef232a40c24b5905f37b152d8039d4aeff410c81e7e5a353dcf7b3f829a146339454ee1d9e1f2004fa453a9248ebf4d41f7aeb4e463faff69612b9ccd9722e159f1ec4e15bc4abed29220e616152bc23080610ec2592cab0a29facb3669c7a4707c81fe2eb8eee34b2981ab00a590f763d7683dd974c2e8bc9df1cdd66060e0bfbc2f95176e0c52742cae32e52c9fc07d43f30f69d42840a582cfa16be59959b5d5bd91f92f377895956ab8c935e2a835b530a6cc465a04a77cfba298bfae1b743cc913788dad04327a098408fa16b1cf737ae515307502ca705c3a980cf37aa431cc36652b6143e4e3403e115b8f1ed390f50fa7bb36a59b0a2de0a3d0e3c73635be83f724fe0217df72a568ea7e2cddb298b3f7161a10419caf934bb7de41204c849b02ecf058c42c35481846e6574bddaf3c3a1acaf6b188d9ca91313d5722947f1efa873fc956113a888f064b5ec6f176298d1420a6562bc22bc7c75601b4854a1b1aea0519f612c4b539573df0f3f3d5badfbf130756dea0998de6e3b637bc9f8c14221d387c7b116abbf4128714222002daa96055ec0fc4a58fc2a50dffda550507dc55a858ca7500b09b802633cc6e1d586674b1164734617a213762a8c4a5bc00f99d4d39893a94d6623cd25b4fc3fb85b3c478085e8bd253d7ab3a1fc176657479667ee2463d550045325ccac2603c33af69aaf002298464fa399de964eb9ec038086636a621757ff850d6966c5af8203e7e8214e7a686519854fa34947d6aa7017a29787acdc0d50da8b13276eececc89043bc2bbc29e91f04cae5ab2fe431dd5bbf62f99ef2db44513471b53638e22bdb0132638159d83ffd73a51f896834d43a580dd087e9b2f641245f6c44d6899742043e97151464f4ebb773641d5af9cd1c063aca988c4284c3325aee67184f00f21869aa818de02ded56c79007135be256832e80df6dbbaba84d58d61e8175f34885fd15296ac6a7840f0a3b5ca9dd64649bfdb97f334070b189b3910017e31c2e259eb2b5711f43643fb8f8ae4db69920538a5b69171fef297287d13d0e0399cb90c01b1e8a93a999ee8318853596c6a28ff3f5abbf3ba46a36e531a0ab7e41a3cb0e33248ba352d13c5126080d386cd43b0fd1d6cae816749236eae79929b1c04459ad5b565ccc9874ce3feac54f92dcde81f03f9d4fa200f203e50c1a6ff537a56015d7a93fd980c4a7dd9d75ab220c0c7f399dd7e88012cb5eceaab8d996754e71d8c9bc9520ea632927b5f4f5589cce46f1eb96a8d36a50654e57e0fca66c772eb867319f666a456ba2d046b0b2fd97898d431a7e54d3d9c5df02aff4adfcbbf5eab38bda210bc385ad87c0201654e7e729608cf04a86933e47870aa5dea4d9f9e7b31801aebc15058d99d16a14efb5ed5fc95130607be571eb08dbf85cae8f248695b2033a4ff9703d319d8bd8f4512d676b29944bac0d2b4a0a6abbfe01c3e4673bc3614f1a84b33f8d60bb18268753a1ec61e1c71006e14d65b06874a464b0f88f0bf862ca269e4e513ed0c019be78bd82ab6aaff25520f433be00462d7bdeb49885dcf33bef9842aef82de08bab1fc22d3f98b4e6ea3b6d7d2f79830a2d4af9a1f2e16dcfc60496a54528f1491cc61ea4c71d6fbbfd9a881492bd959c58ea032bd4b5bdae400b953299ce5855df70bdbb3275e09aebfa91dbb2629bc43ffb0ae72b4a7bc878f94f4737742f060a8c7dc466822b556b3fda741167621a837f0c3dd581ebf1f9f75b9270c7c1d4dfa4926405acd4e106f36c95d8d25c3d59506eddb97f1dc7337588fe64be4edfcd0ff3e4416dbb8798df8ebea790d45ef17646d231c1284ab63877f3e7cf1099ff7d63aa8c3412d8de25c347707ce93dc53a19130bb555f6d90f9f9b1c5998c83ec02a1f9eeb11e55207db5c54d8ac60d9c997481655049e757db639ca74b2c611718a63c42a472a212138fe1d39c1bb89de445dc08279e14810437ab59c5dbe19ff21b48a19660006a0ec2fdef6f93592ba1174f193a5e47a3d755d64359a641e4929907b76c6afb23507bfa29ef5fdb5e55856fb1c06b542b9981786d47ea8336998d2dfab5d372747940810ddf96d77d3562a69876c9e8e92e5cf7969f42061856aa2e6b8ec3c67485f3c9f173448f3980bc3f36c072a4cb9c3b3569bdff3b6d693795c0e52f78d128828f302bafac5b7b38fce72797f1d46574eeecde5bc461ad6c3d27c47bb88fdcf7299b673fa93d7307bbc3ae027ee6bbf94b1956c9f1b15036a436c314b78b4086b83690817fcc555dc12d93b1b558f3978e82ddd0d8e4134b0dc620101b9cf7810e5c88676aa88bd5dc50344cbdd50aea9a92560591f2bcaa64f97a280d28575f3d32a30c27f028e2dbcfcd38cae54f22b009f10b7be503cccdfa1860b157e61235daa631642d2d1af7d6eb2a637f4d3ffdd931aa11d780287ffa002e0e0b036c79119eeabf33d0b8bc44d7b133bbdfcd9210217163396781d47c9336a2916a7888d0f064d1a64b13f5894572c47fc7af90ae76d03b9b1533e49e406e324ee858625f2500ffeb1cdbeb3d7d6dbe0cc59bfad1208b587337c1a01f9d7d4bee7ca68a650e8793b4258bc45be7e31a2d490304a5b8b43af264b3618811bf72b5af188771dc2b5ff89f2cce9612364c101b26d29d248c527e0a9a749de50c3eae44dd109bc8cce73c5137671f4bcb74a31c35fe0066285f41e233981e7ec22f190a82f2692632593284ec66b958e7b806210925d7bf27f8299221d18ded2258489a15703bd0fea7145985311d4400b78cba83ba800608487dd3695c9c488d3c770f2f139af4e948f51d5d31a79914af1242aec53eed808ab14f195a53a5d71c427edcbd02a47b9d0450b79b0fdbdbd97ae640bbe2773249644052cb61f3409514fbc2d87f0d512e902184e5a40a9499cccf61c6a949a937987949d6a010efe2374c46a8da68f8098dd6de5a16e98566794b733c2aa814a0e95e53f6521ead589f2112f477e948eebaaea4e921fab58a0ff0e58244701798c92f35edb4c58a087493ab57fe4cd0e8cdb607829b35d6e1a32233caeff68c2d95a98f5f2c9b035b509b45d166400f66d3489df74721fca8ea13559b483217e4aa69282229ce1073f88dda40b5583ef34e87534e643ea37b4cdf29974e0ba8e3bb5f674b512e5f9caf0ec9e043e871b0d452b0ba91e805624761aac16aa085dc049f8156abcfa63c077280e1694a1471b2942ae8278c6fbd6b652fe6ae0d1f60a1d01eb2b36f8c33bf8d1b1b6113dc5f767e3828b68b56c0e254f89b092a1e29afb9a07ee5d3199f9c384873649308dc0851368dad5244abc105df57ca4ccb31710fab5aee4d8c16d1f1d4442d8f79bbebfd53dc3cc5e32c1f4eb1c06a4825e303ee9342298f2d0373685244a7456f03b5a41b726a218397cd0f8e7c7789a4441f8f56271f1980c55d49ad98d877894153206eea4610b530a4549feb8a1a7b01ca86a926080693b157039ac77774920f84d638bf35601a218f1e60776442aabdfee8fbf133717c51bf2af0c45f1af2e535f2c787961da303b9e50dca466b48b29307ebce3953181f6cca5413e79cf9b860f0063aaf9387ad5e109857a091433e03d366b7d649e5b85881d66ab6adb534ba26023bf6b32719ed43489c22695c5932e0dbd47043c8cdd01168938ff27213460dea4717f9822be14afe8760e41dba2b21ab8932856f862a9ec3e1fc45e9d08228aaba36ca2606fc12adb6bc5fd8ddfb3dc8b4cf7c5af728e12630cebc77b50488d4374dbe28f9d2d52efc8d507c087dfe7bbc825a03bbe414b869e57093321bfdea6d10a47ff910d186d840ed1773a0a616c009f3685551b64817d4d20935b06e70cb21be91a3a23d85df378f0c5b3fb9c3ec84c0688eb43a755ec3352a7874066a97260a532074f2f4e0bbec48878ec452f3229978f49efeb6730a55d21bfb30ff32ef36fb0333c2659d46ff80a32189133009c0077f3a38504db0df8491c55621cbf679c53198811824765f917093227153695650d727b6238b85941a30ace39a6cbd76a6102f7ad3d33315cf76b3c7639616be368a9e622c68d27555d04e560ad215a242dbeb598471ef1ca68aa1a0db5d2ac2fde693182d0ec998be4f5c33657f40263d3d4c207d305bece6266ea507b90a665dc5321b489390962c8459b38c290ec706c5c0c46c82b5b1a10441c758d8ba9cbb51ebe415b368baa80270f3825285ec2087a40276b35ff9b60d2443b1995b4ec1040bf4812d25", 0x1000, 0x4, &(0x7f0000000100)={0x11, 0x1c, r1, 0x1, 0xfffffffffffffffc, 0x6, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0xe}}, 0x14) r2 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$inet6_int(r2, 0x29, 0xc8, &(0x7f00008d6000), 0x4) openat$kvm(0xffffffffffffff9c, &(0x7f0000264ff7)='/dev/kvm\x00', 0x0, 0x0) setsockopt$inet6_int(r2, 0x29, 0xc8, &(0x7f0000ac5000), 0x4) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000000)={@remote, @loopback}, &(0x7f0000000080)=0xc) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000200)=0x0) sigaltstack(&(0x7f0000ffd000/0x1000)=nil, &(0x7f00000003c0)) llistxattr(&(0x7f0000000040)='./file0\x00', &(0x7f0000000180)=""/79, 0x4f) perf_event_open(&(0x7f0000000300)={0x7, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0xc80, 0x0, 0x0, 0x0, 0x401, 0x3a}, r3, 0x8, 0xffffffffffffffff, 0x0) 2018/03/30 23:06:20 executing program 6: pipe(&(0x7f0000000940)={0xffffffffffffffff, 0xffffffffffffffff}) accept4$ax25(r0, 0x0, &(0x7f0000000080), 0x80000) r1 = socket$inet(0x2, 0x20000000000003, 0x2) connect$inet(r1, &(0x7f0000000000)={0x2, 0x0, @remote={0xac, 0x14, 0x14, 0xbb}}, 0x10) sendmsg(0xffffffffffffffff, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000140), 0x0, &(0x7f0000000180)=ANY=[]}, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000980)=@broute={'broute\x00', 0x20, 0x3, 0x2d9, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000380], 0x0, &(0x7f00000002c0), &(0x7f0000001000)=ANY=[@ANYBLOB="00000000000000000000000000000000000000000000000000000000000000000000000000000000feffffff0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000ffffffff010000000b00000008000000600469666230000000000000000000000000736974300000000000000000000000007663616e300000000000000000000000626f6e643000000000000000000000000180c200000e00ffff00ffffaaaaaaaaaaaaffffff0000ff000008010000d001000048020000706879736465760000000000000000000000000000000000000000000000000070000000000000006e723000000000000000000000000000000000000000000000000000000000000000000000000000000000000000766c616e300000003a9c4ebb9f24dc06a52c000000000000000000000000000000000000000000ff0000000000000000000000000000000101000000000000000000000000000000000000004c45440000000000000000000000000000000000000000000000000000000000280000000000000073797a310000000000000000000000000000000000000000000000004000000000000000000000004e464c4f470000000000000000000000000000000000000000000000000000005000000000000000000000000000000000000000692ef8a72c6779a914df06a44b35b0eafd833141b590148ad8c2d17b06e81aa50bc466307f618025cda16029da79ca01cd7bf2fa8433c6000000004e464c4f470000000000000000000000000000000000000000000000000000005000000000000000000000000000000000000000f7040c3bd532a607b6540847e9980255ac80a05048ee3c578fd00c809822ab1ff7d12707561fdd7b1bcbd7c428bd7449152a676a0e0fc0823ebe89b10758fffe5c92f48f0000000000000000000000000000000000000000000000000000000000000000000000000000000001000000fcffffff"]}, 0x351) setsockopt$inet_int(r1, 0x0, 0x2, &(0x7f00000000c0)=0x7fffffff, 0x4) r2 = socket$rds(0x15, 0x5, 0x0) pipe(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$bt_BT_DEFER_SETUP(r3, 0x112, 0x7, &(0x7f0000000280)=0x100, 0x4) accept$packet(r4, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @remote}, &(0x7f0000000100)=0x14) connect$rds(r2, &(0x7f0000000140)={0x2, 0x4e22, @remote={0xac, 0x14, 0x14, 0xbb}}, 0x10) getsockopt$sock_buf(r2, 0x1, 0x3b, &(0x7f0000000180)=""/83, &(0x7f0000000200)=0x53) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000a00)=@filter={'filter\x00', 0xe, 0x4, 0x5a0, 0xffffffff, 0x0, 0xf0, 0xf0, 0xffffffff, 0xffffffff, 0x4d0, 0x4d0, 0x4d0, 0xffffffff, 0x4, &(0x7f0000000300), {[{{@ipv6={@ipv4={[], [0xff, 0xff], @rand_addr=0x80000001}, @dev={0xfe, 0x80, [], 0x16}, [0x0, 0xffffff00, 0xff, 0xffffffff], [0x0, 0xff000000, 0xffffffff], 'ipddp0\x00', 'ip_vti0\x00', {}, {0xff}, 0x6c, 0x2bf}, 0x0, 0xc8, 0xf0}, @REJECT={0x28, 'REJECT\x00', 0x0, {0x7}}}, {{@ipv6={@remote={0xfe, 0x80, [], 0xbb}, @remote={0xfe, 0x80, [], 0xbb}, [0xff000000, 0xffffffff, 0xffffff00, 0xff], [0xff, 0xffffffff, 0x0, 0xff000000], 'syzkaller1\x00', 'eql\x00', {}, {}, 0x62, 0x0, 0x4, 0x1}, 0x0, 0x120, 0x148, 0x0, {}, [@common=@frag={0x30, 'frag\x00', 0x0, {0x7ff, 0x7, 0x1, 0x2}}, @common=@hl={0x28, 'hl\x00', 0x0, {0x3, 0x7fff}}]}, @REJECT={0x28, 'REJECT\x00', 0x0, {0x7}}}, {{@ipv6={@dev={0xfe, 0x80, [], 0xc}, @loopback={0x0, 0x1}, [0xffffffff, 0xffffffff, 0xff000000, 0xff000000], [0xff, 0x0, 0xff, 0xffffff00], 'irlan0\x00', 'vcan0\x00', {0xff}, {}, 0x3b, 0xffffffffffffab69, 0x2, 0x30}, 0x0, 0x250, 0x298, 0x0, {}, [@common=@srh={0x30, 'srh\x00', 0x0, {0xbb, 0x1, 0x3, 0x6, 0xffffffffffffffc0, 0x80}}, @common=@inet=@policy={0x158, 'policy\x00', 0x0, {[{@ipv4, [0xffffffff, 0xff0000ff, 0xff000000, 0xffffffff], @ipv4=@multicast1=0xe0000001, [0xffffffff, 0xffffffff, 0xff000000, 0xffffff00], 0x4d5, 0x3500, 0x5c, 0x0, 0x10, 0xf}, {@ipv6=@dev={0xfe, 0x80, [], 0x11}, [0x0, 0xff000000, 0xff0000ff, 0xffffff00], @ipv4=@multicast1=0xe0000001, [0xffffffff, 0x0, 0x0, 0xffffffff], 0x4d5, 0x3500, 0x77, 0x1, 0x0, 0x1d}, {@ipv6=@mcast1={0xff, 0x1, [], 0x1}, [0xff000000, 0xffffffff, 0xffffff00, 0xff], @ipv4=@multicast2=0xe0000002, [0xffffffff, 0x0, 0xffffff00, 0xffffffff], 0x4d3, 0x3503, 0x7f, 0x0, 0x1, 0x19}, {@ipv4=@local={0xac, 0x14, 0x14, 0xaa}, [0x0, 0xff, 0x0, 0xff0000ff], @ipv6=@local={0xfe, 0x80, [], 0xaa}, [0xffffffff, 0xffffffff, 0xff, 0xff0000ff], 0x4d4, 0x0, 0x0, 0x1, 0x1f, 0x10}], 0x0, 0x3}}]}, @common=@unspec=@LED={0x48, 'LED\x00', 0x0, {'syz1\x00', 0x0, 0x8, 0x8}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28, '\x00', 0x0, 0xfffffffffffffffe}}}}, 0x600) socket(0x1, 0xa, 0x7) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_TIMER(r4, 0x40605346, &(0x7f0000000680)={0x1, 0x3, {0x3, 0x0, 0x9, 0x3}}) 2018/03/30 23:06:20 executing program 7: perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff7fffffffffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$binder(&(0x7f0000a75ff3)='/dev/binder#\x00', 0x0, 0x0) ioctl$BINDER_SET_CONTEXT_MGR(r0, 0x40046207, 0x0) r1 = syz_open_dev$binder(&(0x7f000000fff3)='/dev/binder#\x00', 0x0, 0x0) ioctl$BINDER_WRITE_READ(r1, 0xc0306201, &(0x7f0000007000)={0x8, 0x0, &(0x7f0000005fd4)=[@acquire={0x40046305}], 0x0, 0x0, &(0x7f0000002000)}) ioctl$BINDER_WRITE_READ(r1, 0xc0306201, &(0x7f0000003fd0)={0x4, 0x0, &(0x7f00000001c0)=ANY=[@ANYBLOB="0e630c40"], 0x0, 0x0, &(0x7f000000bf1f)}) dup2(r1, r0) ioctl$BINDER_WRITE_READ(r1, 0xc0306201, &(0x7f0000fed000)={0x8, 0x0, &(0x7f00006f0f64)=[@release={0x40046306}], 0x0, 0x0, &(0x7f00000e0f29)}) mkdir(&(0x7f00000000c0)='./control\x00', 0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000040)=0x0) r3 = syz_open_procfs(r2, &(0x7f0000000200)='net/route\x00') r4 = inotify_init() inotify_add_watch(r4, &(0x7f0000f1eff6)='./control\x00', 0x220000000009) ioctl$SIOCGIFMTU(r3, 0x8921, &(0x7f00000004c0)) r5 = inotify_init1(0x0) inotify_add_watch(r5, &(0x7f0000000240)='./control\x00', 0x60) fanotify_mark(r3, 0x10, 0x20, r3, &(0x7f0000000480)='./control\x00') setsockopt$inet6_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, &(0x7f0000000080)="5fce869db66fa225921ad03d773be4ff", 0x10) rmdir(&(0x7f000075aff6)='./control\x00') r6 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000280)='IPVS\x00') sendmsg$IPVS_CMD_SET_CONFIG(r3, &(0x7f0000000440)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x844050}, 0xc, &(0x7f0000000400)={&(0x7f00000002c0)={0x12c, r6, 0x200, 0x70bd25, 0x25dfdbfd, {0xc}, [@IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x6}, @IPVS_CMD_ATTR_DAEMON={0x68, 0x3, [@IPVS_DAEMON_ATTR_SYNC_ID={0x8, 0x3, 0x4}, @IPVS_DAEMON_ATTR_MCAST_GROUP6={0x14, 0x6, @local={0xfe, 0x80, [], 0xaa}}, @IPVS_DAEMON_ATTR_MCAST_GROUP={0x8, 0x5, @dev={0xac, 0x14, 0x14, 0xf}}, @IPVS_DAEMON_ATTR_MCAST_TTL={0x8, 0x8, 0x7}, @IPVS_DAEMON_ATTR_MCAST_IFN={0x14, 0x2, 'bond0\x00'}, @IPVS_DAEMON_ATTR_STATE={0x8, 0x1}, @IPVS_DAEMON_ATTR_MCAST_GROUP={0x8, 0x5, @broadcast=0xffffffff}, @IPVS_DAEMON_ATTR_MCAST_IFN={0x14, 0x2, 'tunl0\x00'}]}, @IPVS_CMD_ATTR_SERVICE={0x14, 0x1, [@IPVS_SVC_ATTR_SCHED_NAME={0x8, 0x6, 'wrr\x00'}, @IPVS_SVC_ATTR_PROTOCOL={0x8, 0x2, 0x1}]}, @IPVS_CMD_ATTR_DAEMON={0x74, 0x3, [@IPVS_DAEMON_ATTR_MCAST_IFN={0x14, 0x2, 'eql\x00'}, @IPVS_DAEMON_ATTR_SYNC_MAXLEN={0x8, 0x4}, @IPVS_DAEMON_ATTR_MCAST_GROUP={0x8, 0x5, @loopback=0x7f000001}, @IPVS_DAEMON_ATTR_SYNC_MAXLEN={0x8, 0x4, 0xfffffffffffffffd}, @IPVS_DAEMON_ATTR_MCAST_GROUP6={0x14, 0x6, @ipv4={[], [0xff, 0xff], @loopback=0x7f000001}}, @IPVS_DAEMON_ATTR_MCAST_IFN={0x14, 0x2, 'bpq0\x00'}, @IPVS_DAEMON_ATTR_MCAST_PORT={0x8, 0x7, 0x4e21}, @IPVS_DAEMON_ATTR_MCAST_GROUP6={0x14, 0x6, @loopback={0x0, 0x1}}]}, @IPVS_CMD_ATTR_DAEMON={0x20, 0x3, [@IPVS_DAEMON_ATTR_MCAST_PORT={0x8, 0x7, 0x4e21}, @IPVS_DAEMON_ATTR_MCAST_IFN={0x14, 0x2, 'bond0\x00'}]}]}, 0x12c}, 0x1, 0x0, 0x0, 0x4000000}, 0x4000010) modify_ldt$read_default(0x2, &(0x7f0000000100)=""/145, 0x91) 2018/03/30 23:06:20 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x200, 0x0) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000680)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$sock_linger(r2, 0x1, 0xd, &(0x7f00000006c0)={0x400, 0x9}, 0x8) perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x0, 0x0) r3 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) mmap(&(0x7f0000000000/0x9d7000)=nil, 0x9d7000, 0x0, 0x10, 0xffffffffffffffff, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x7) perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r4 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r4, &(0x7f0000e5b000)={0x2, 0x4e20, @multicast1=0xe0000001}, 0x10) syz_open_dev$sg(&(0x7f0000000440)='/dev/sg#\x00', 0x0, 0x0) connect$inet(r4, &(0x7f0000000100)={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x11}}, 0x10) r5 = bpf$PROG_LOAD(0x5, &(0x7f0000eb0fb8)={0x1, 0x3, &(0x7f00009ff000)=@framed={{0x18}, [], {0x95}}, &(0x7f00002bf000)='syzkaller\x00', 0x4, 0xb7, &(0x7f00006ab000)=""/183}, 0x48) setsockopt$inet_tcp_int(r4, 0x6, 0x19, &(0x7f0000000240)=0x8, 0x4) r6 = socket$kcm(0x29, 0x2, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r6, 0x89e0, &(0x7f000031aff8)={r4, r5}) ioctl$sock_kcm_SIOCKCMCLONE(r6, 0x89e2, &(0x7f00000002c0)={0xffffffffffffffff}) sendmsg$nl_xfrm(r7, &(0x7f0000000780)={&(0x7f0000000200)={0x10}, 0xc, &(0x7f0000000740)={&(0x7f0000000480)=@updpolicy={0xb8, 0x19, 0x0, 0x0, 0x0, {{@in=@loopback=0x7f000001, @in6=@mcast1={0xff, 0x1, [], 0x1}}}}, 0xffcb}, 0x1}, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(r7, 0x89e1, &(0x7f0000000040)={r4}) r8 = fcntl$getown(r3, 0x9) recvfrom$inet6(0xffffffffffffffff, &(0x7f0000000140)=""/177, 0xb1, 0x40000000, &(0x7f0000000080)={0xa, 0x4e23, 0x9, @empty, 0xe38}, 0x1c) r9 = accept4$inet(0xffffffffffffff9c, &(0x7f0000000700)={0x0, 0x0, @broadcast}, &(0x7f0000000740)=0x10, 0x80000) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r9, 0x84, 0x64, &(0x7f0000000780)=[@in6={0xa, 0x4e22, 0xfffffffffffff7e1, @mcast2={0xff, 0x2, [], 0x1}, 0x8}, @in={0x2, 0x4e24, @broadcast=0xffffffff}], 0x2c) ptrace$setregset(0x4205, r8, 0x0, &(0x7f00000005c0)={&(0x7f0000000080)}) ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r10 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x1fffd, 0x0) r11 = syz_open_dev$sndtimer(&(0x7f00000000c0)='/dev/snd/timer\x00', 0x0, 0x0) read(r11, &(0x7f0000ec6000)=""/50, 0x32) fcntl$dupfd(r11, 0x0, r10) 2018/03/30 23:06:20 executing program 0 (fault-call:7 fault-nth:27): mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r0 = syz_open_dev$usbmon(&(0x7f0000000400)='/dev/usbmon#\x00', 0x0, 0x0) r1 = perf_event_open(&(0x7f0000223000)={0x2, 0x78, 0xe3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000001980)={{{@in6=@remote, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast2}, 0x0, @in=@multicast2}}, &(0x7f0000001a80)=0xe8) chown(&(0x7f00000004c0)='./file0\x00', r2, 0x0) mount(&(0x7f00000003c0)='./file0\x00', &(0x7f0000000380)='./file0\x00', &(0x7f0000000300)='cgroup2\x00', 0x0, 0x0) r3 = open$dir(&(0x7f000001bff4)='./file0\x00', 0x0, 0x0) mkdirat(r3, &(0x7f0000000280)='./file0\x00', 0x20) getdents64(r3, &(0x7f00000007c0)=""/250, 0x1015a) dup3(r0, r1, 0x80000) r4 = open$dir(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) renameat2(r4, &(0x7f0000000200)='./file1\x00', 0xffffffffffffffff, &(0x7f0000000240)='./file0\x00', 0xfd1092750066ec78) ioctl$KDGKBMODE(0xffffffffffffffff, 0x4b44, &(0x7f0000000140)) 2018/03/30 23:06:20 executing program 4: mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount(&(0x7f000000a000)='./file0\x00', &(0x7f0000026ff8)='./file0\x00', &(0x7f000000c000)='ramfs\x00', 0x0, &(0x7f000000a000)) mkdir(&(0x7f0000000000)='./file1\x00', 0x0) mount(&(0x7f0000000040)='./file0\x00', &(0x7f0000903000)='./file0\x00', &(0x7f0000811ffa)='bdev\x00', 0x100000, &(0x7f00000003c0)="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") r0 = dup(0xffffffffffffffff) r1 = syz_open_dev$vcsn(&(0x7f00000000c0)='/dev/vcs#\x00', 0x2, 0x20800) renameat(r0, &(0x7f0000000080)='./file1/file0\x00', r1, &(0x7f0000000100)='./file1\x00') mount(&(0x7f0000fb6000)='./file0\x00', &(0x7f0000000380)='./file1/file0\x00', &(0x7f0000000340)='iso9660\x00', 0x1003, 0x0) mount(&(0x7f00002b9ff8)='./file0\x00', &(0x7f0000cbeff8)='./file0\x00', &(0x7f00005f7ffa)='ramfs\x00', 0x80000, &(0x7f000002f000)) mount(&(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)='./file1\x00', &(0x7f0000000200)='anon_inodefs\x00', 0x2000, &(0x7f0000000240)) mount(&(0x7f0000adcff8)='./file0\x00', &(0x7f0000e08fff)='.', &(0x7f00005e9000)='cifs\x00', 0x2000, &(0x7f0000ad5000)) [ 328.762136] kernel msg: ebtables bug: please report to author: entries_size too small [ 328.823283] FAULT_INJECTION: forcing a failure. [ 328.823283] name failslab, interval 1, probability 0, space 0, times 0 [ 328.834636] CPU: 1 PID: 25988 Comm: syz-executor0 Not tainted 4.16.0-rc7+ #372 [ 328.842008] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 328.851359] Call Trace: [ 328.853949] dump_stack+0x194/0x24d [ 328.857586] ? arch_local_irq_restore+0x53/0x53 [ 328.862268] should_fail+0x8c0/0xa40 [ 328.865982] ? __save_stack_trace+0x7e/0xd0 [ 328.870313] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 328.875429] ? save_stack+0xa3/0xd0 [ 328.879061] ? save_stack+0x43/0xd0 [ 328.882694] ? find_held_lock+0x35/0x1d0 [ 328.886778] ? __lock_is_held+0xb6/0x140 [ 328.887593] kernel msg: ebtables bug: please report to author: entries_size too small [ 328.890853] ? check_same_owner+0x320/0x320 [ 328.890873] ? rcu_note_context_switch+0x710/0x710 [ 328.890894] should_failslab+0xec/0x120 [ 328.890906] __kmalloc+0x63/0x760 [ 328.915475] ? sched_create_group+0x22/0x70 [ 328.919798] ? kzalloc+0xf/0x20 [ 328.923086] kzalloc+0xf/0x20 [ 328.926190] alloc_fair_sched_group+0x5e/0x530 [ 328.930770] ? __lock_is_held+0xb6/0x140 [ 328.934837] sched_create_group+0x35/0x70 [ 328.938986] cpu_cgroup_css_alloc+0xe/0x30 [ 328.943221] cgroup_apply_control_enable+0x44d/0xbc0 [ 328.948335] ? cgroup_propagate_control+0x570/0x570 [ 328.953356] ? css_populate_dir+0x289/0x420 [ 328.957680] cgroup_mkdir+0x56f/0xfc0 [ 328.958493] kernel msg: ebtables bug: please report to author: entries_size too small [ 328.961468] ? __lock_is_held+0xb6/0x140 [ 328.961487] ? cgroup_destroy_locked+0x750/0x750 [ 328.961500] ? rcu_read_lock_sched_held+0x108/0x120 [ 328.961513] ? kmem_cache_free+0x258/0x2a0 [ 328.961526] ? set_nlink+0xc1/0x160 [ 328.961537] ? debug_lockdep_rcu_enabled+0x77/0x90 [ 328.996159] ? generic_permission+0x105/0x3c0 [ 329.000667] ? cgroup_destroy_locked+0x750/0x750 [ 329.005432] kernfs_iop_mkdir+0x153/0x1e0 [ 329.009588] vfs_mkdir+0x390/0x600 [ 329.013137] SyS_mkdirat+0x22b/0x2b0 [ 329.016857] ? SyS_mknod+0x480/0x480 2018/03/30 23:06:20 executing program 3: r0 = socket(0x40000000015, 0x5, 0x0) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000240), 0x4) bind$inet(r0, &(0x7f00008a5ff0)={0x2, 0x4e21, @loopback=0x7f000001}, 0x10) sendto$inet(r0, &(0x7f0000f7db7f)="ba671368d1010000004900000001000000018be49e9301442865319997d0efdb2f54b6a10c7327757482bfce945c2a91fb8dfafc1d3f56bc543ab87321e12cca08a744a2d128b00634bc882151d36809229a96bc3437ef159489384ade077ba295eac2882dbfd3781dd4d4e609c42628dbb709b3eb1fa030009045dd98b9e6d77b6cec9ceb685595d43995e0f04c32260943add79831e661c6a351dedc8b9d220fbf9fb6e44fb6a629ce9a82025124fec9f3ee751f7da0cd7e799be88ddbdac20b48e890ff81d7fa28c2d017d7932f2569038740461accd4582f576e4fdb6150a3399f8266bc19eb943648ad1ad81420ed6c382436e474390c8995e829e4f9df43eed85a60b9ee254e31eb62900857fa134e76cc64880334adbff069a2e5e647d2ed36a96b23834b6f6ca6b8113baf4cf30347fbb7ffc30aea99872cc0dba03b07d3347b2d257edbe2733c26b7337a79962d8ce85469e3bcbe0e4a48a6ae69d13f2d4b5155b390ef67aa714b82b6313ee277cb8986eca5db2e97cb1ae2243bba80274f614ece521baef443394b4c161cb9ae926e21892578b49cfd6efe1cb1572148c10d92218ed73ec116a18de80ac42d2726a4523a764fc6dc356c5fbbf9d2c947ae3bc9a3dc76099f3257c8d5952876151b0326d8cb1d5683ee4ab5ded9a34c00ac1b03f34627ec18a7c2e92c87b7896549cfab5eb55fa85a970994bd4b22b5f0d045e241256d06f485a47b4a55ed389bc1734541232cd41908b5cfa4b8fcfcafce500a0c7ae99767713a98e7927aa69f6ccd7daea62f19ceb82559f41899c9a9aee99113e7e64b5f8b9824be9fdbfa4dd4995673d882bb4daeb64413b334e114965d2ba3cea8051e692508701b9400cb12eae457f8b8549944091b729160939918d8fcae611a48ed665f770db637487a236da1a58ba7566668651a77171fc4fe506496d19059343dbe4f426625d3f2b705f54581372361770bf5a9098a9fafefaf546426b294239ac33e3186e4d58ad2fa995a6ad4dc074e7cca11aead109563b2076c7c6e9f57ec63df960804e2e7f9d8444de9550cca3df7834d864e9777291c2e1f6205de2e43dc995ab8bb1515a365efc2830fa3e7a1dd137f550d6035212bc1f51c3b4ceea430df49ffc9210084ef156ad7e0d219efd6c116693735b44521d389969a3a65617cd2fd6e14060601cee4cd054cf36fe048b57d1d9ee3cad2a73552449926b4a6b03fbe9c0ec68357e1fbe52ed77b67f5870c0aefb7ee8236747e0d67a26725fb515544cbbe8464da94cfd8c0b94bb4e51a263b1749bd0a7cf651931f806d1b928d1f9994f1ad4d50e6a5cd7a8e4e687f8564fdacc864013d095ba9d5709eced3c28eabda476d177a7836400a01e02beed5a6636d4064fdda344967ad8682d14b87c71727cb66be27d1d39191f4223c545b62fb5d60262ba8076a65dbc194cee1df846c584b7bbe9dce6e6895b2cbbb64b03b55548b845cc3de2f939ef918421af9a5e9157e837651245299c03992d0ddee06bd22a31522aca0f309b1feccebc0b1c0ed9d21c19bfd15cd313ff64394fd6a10904890c9f6d646b026f27253e8f584c3ffd20ad67e8b62ed7676706d40bc5c80e37698", 0x47f, 0x0, &(0x7f000069affb)={0x2, 0x4e20, @loopback=0x7f000001}, 0x10) setsockopt$RDS_CONG_MONITOR(r0, 0x114, 0x6, &(0x7f0000000080)=0x1, 0x4) ioctl$int_in(r0, 0x5421, &(0x7f0000000040)=0x56d) sendto$inet(r0, &(0x7f00004b3fff), 0x0, 0x0, &(0x7f00002b4000)={0x2, 0x4e20, @loopback=0x7f000001}, 0x3f6) ioctl$sock_inet_tcp_SIOCOUTQ(r0, 0x5411, &(0x7f0000000000)) 2018/03/30 23:06:20 executing program 4: mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount(&(0x7f000000a000)='./file0\x00', &(0x7f0000026ff8)='./file0\x00', &(0x7f000000c000)='ramfs\x00', 0x0, &(0x7f000000a000)) mkdir(&(0x7f0000000000)='./file1\x00', 0x0) mount(&(0x7f0000000040)='./file0\x00', &(0x7f0000903000)='./file0\x00', &(0x7f0000811ffa)='jfs\x00', 0x100000, &(0x7f0000000240)="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") r0 = dup(0xffffffffffffffff) r1 = syz_open_dev$vcsn(&(0x7f00000000c0)='/dev/vcs#\x00', 0x2, 0x20800) renameat(r0, &(0x7f0000000080)='./file1/file0\x00', r1, &(0x7f0000000100)='./file1\x00') mount(&(0x7f0000fb6000)='./file0\x00', &(0x7f0000d78000)='.', &(0x7f0000fdb000)='ubifs\x00', 0x1003, 0x0) mount(&(0x7f00002b9ff8)='./file0\x00', &(0x7f0000cbeff8)='./file0\x00', &(0x7f00005f7ffa)='ramfs\x00', 0x80000, &(0x7f000002f000)) mount(&(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='./file0\x00', &(0x7f0000000200)='jffs2\x00', 0x2000, &(0x7f0000000240)) mount(&(0x7f0000adcff8)='./file0\x00', &(0x7f0000e08fff)='.', &(0x7f00005e9000)='cifs\x00', 0x2000, &(0x7f0000ad5000)) 2018/03/30 23:06:20 executing program 6: pipe(&(0x7f0000000940)={0xffffffffffffffff, 0xffffffffffffffff}) accept4$ax25(r0, 0x0, &(0x7f0000000080), 0x80000) r1 = socket$inet(0x2, 0x20000000000003, 0x2) connect$inet(r1, &(0x7f0000000000)={0x2, 0x0, @remote={0xac, 0x14, 0x14, 0xbb}}, 0x10) sendmsg(0xffffffffffffffff, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000140), 0x0, &(0x7f0000000180)=ANY=[]}, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000980)=@broute={'broute\x00', 0x20, 0x3, 0x2d9, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000380], 0x0, &(0x7f00000002c0), &(0x7f0000001000)=ANY=[@ANYBLOB="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"]}, 0x351) setsockopt$inet_int(r1, 0x0, 0x2, &(0x7f00000000c0)=0x7fffffff, 0x4) r2 = socket$rds(0x15, 0x5, 0x0) pipe(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$bt_BT_DEFER_SETUP(r3, 0x112, 0x7, &(0x7f0000000280)=0x100, 0x4) accept$packet(r4, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @remote}, &(0x7f0000000100)=0x14) connect$rds(r2, &(0x7f0000000140)={0x2, 0x4e22, @remote={0xac, 0x14, 0x14, 0xbb}}, 0x10) getsockopt$sock_buf(r2, 0x1, 0x3b, &(0x7f0000000180)=""/83, &(0x7f0000000200)=0x53) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000a00)=@filter={'filter\x00', 0xe, 0x4, 0x5a0, 0xffffffff, 0x0, 0xf0, 0xf0, 0xffffffff, 0xffffffff, 0x4d0, 0x4d0, 0x4d0, 0xffffffff, 0x4, &(0x7f0000000300), {[{{@ipv6={@ipv4={[], [0xff, 0xff], @rand_addr=0x80000001}, @dev={0xfe, 0x80, [], 0x16}, [0x0, 0xffffff00, 0xff, 0xffffffff], [0x0, 0xff000000, 0xffffffff], 'ipddp0\x00', 'ip_vti0\x00', {}, {0xff}, 0x6c, 0x2bf}, 0x0, 0xc8, 0xf0}, @REJECT={0x28, 'REJECT\x00', 0x0, {0x7}}}, {{@ipv6={@remote={0xfe, 0x80, [], 0xbb}, @remote={0xfe, 0x80, [], 0xbb}, [0xff000000, 0xffffffff, 0xffffff00, 0xff], [0xff, 0xffffffff, 0x0, 0xff000000], 'syzkaller1\x00', 'eql\x00', {}, {}, 0x62, 0x0, 0x4, 0x1}, 0x0, 0x120, 0x148, 0x0, {}, [@common=@frag={0x30, 'frag\x00', 0x0, {0x7ff, 0x7, 0x1, 0x2}}, @common=@hl={0x28, 'hl\x00', 0x0, {0x3, 0x7fff}}]}, @REJECT={0x28, 'REJECT\x00', 0x0, {0x7}}}, {{@ipv6={@dev={0xfe, 0x80, [], 0xc}, @loopback={0x0, 0x1}, [0xffffffff, 0xffffffff, 0xff000000, 0xff000000], [0xff, 0x0, 0xff, 0xffffff00], 'irlan0\x00', 'vcan0\x00', {0xff}, {}, 0x3b, 0xffffffffffffab69, 0x2, 0x30}, 0x0, 0x250, 0x298, 0x0, {}, [@common=@srh={0x30, 'srh\x00', 0x0, {0xbb, 0x1, 0x3, 0x6, 0xffffffffffffffc0, 0x80}}, @common=@inet=@policy={0x158, 'policy\x00', 0x0, {[{@ipv4, [0xffffffff, 0xff0000ff, 0xff000000, 0xffffffff], @ipv4=@multicast1=0xe0000001, [0xffffffff, 0xffffffff, 0xff000000, 0xffffff00], 0x4d5, 0x3500, 0x5c, 0x0, 0x10, 0xf}, {@ipv6=@dev={0xfe, 0x80, [], 0x11}, [0x0, 0xff000000, 0xff0000ff, 0xffffff00], @ipv4=@multicast1=0xe0000001, [0xffffffff, 0x0, 0x0, 0xffffffff], 0x4d5, 0x3500, 0x77, 0x1, 0x0, 0x1d}, {@ipv6=@mcast1={0xff, 0x1, [], 0x1}, [0xff000000, 0xffffffff, 0xffffff00, 0xff], @ipv4=@multicast2=0xe0000002, [0xffffffff, 0x0, 0xffffff00, 0xffffffff], 0x4d3, 0x3503, 0x7f, 0x0, 0x1, 0x19}, {@ipv4=@local={0xac, 0x14, 0x14, 0xaa}, [0x0, 0xff, 0x0, 0xff0000ff], @ipv6=@local={0xfe, 0x80, [], 0xaa}, [0xffffffff, 0xffffffff, 0xff, 0xff0000ff], 0x4d4, 0x0, 0x0, 0x1, 0x1f, 0x10}], 0x0, 0x3}}]}, @common=@unspec=@LED={0x48, 'LED\x00', 0x0, {'syz1\x00', 0x0, 0x8, 0x8}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28, '\x00', 0x0, 0xfffffffffffffffe}}}}, 0x600) socket(0x1, 0xa, 0x7) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_TIMER(r4, 0x40605346, &(0x7f0000000680)={0x1, 0x3, {0x3, 0x0, 0x9, 0x3}}) 2018/03/30 23:06:20 executing program 3: r0 = socket(0x40000000015, 0x5, 0x0) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000240), 0x4) bind$inet(r0, &(0x7f00008a5ff0)={0x2, 0x4e21, @loopback=0x7f000001}, 0x10) sendto$inet(r0, &(0x7f0000f7db7f)="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", 0x480, 0x0, &(0x7f000069affb)={0x2, 0x4e20, @loopback=0x7f000001}, 0x10) setsockopt$RDS_CONG_MONITOR(r0, 0x114, 0x6, &(0x7f0000000080)=0x1, 0x4) ioctl$int_in(r0, 0x5421, &(0x7f0000000040)=0x56d) sendto$inet(r0, &(0x7f00004b3fff), 0x0, 0x0, &(0x7f00002b4000)={0x2, 0x4e20, @loopback=0x7f000001}, 0x3f6) ioctl$sock_inet_tcp_SIOCOUTQ(r0, 0x5411, &(0x7f0000000000)) 2018/03/30 23:06:20 executing program 6: pipe(&(0x7f0000000940)={0xffffffffffffffff, 0xffffffffffffffff}) accept4$ax25(r0, 0x0, &(0x7f0000000080), 0x80000) r1 = socket$inet(0x2, 0x20000000000003, 0x2) connect$inet(r1, &(0x7f0000000000)={0x2, 0x0, @remote={0xac, 0x14, 0x14, 0xbb}}, 0x10) sendmsg(0xffffffffffffffff, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000140), 0x0, &(0x7f0000000180)=ANY=[]}, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000980)=@broute={'broute\x00', 0x20, 0x3, 0x2d9, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000380], 0x0, &(0x7f00000002c0), &(0x7f0000001000)=ANY=[@ANYBLOB="00000000000000000000000000000000000000000000000000000000000000000000000000000000feffffff0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000ffffffff010000000b00000008000000600469666230000000000000000000000000736974300000000000000000000000007663616e300000000000000000000000626f6e643000000000000000000000000180c200000e00ffff00ffffaaaaaaaaaaaaffffff0000ff000008010000d001000048020000706879736465760000000000000000000000000000000000000000000000000070000000000000006e723000000000000000000000000000000000000000000000000000000000000000000000000000000000000000766c616e300000003a9c4ebb9f24dc06a52c000000000000000000000000000000000000000000ff0000000000000000000000000000000101000000000000000000000000000000000000004c45440000000000000000000000000000000000000000000000000000000000280000000000000073797a310000000000000000000000000000000000000000000000004000000000000000000000004e464c4f470000000000000000000000000000000000000000000000000000005000000000000000000000000000000000000000692ef8a72c6779a914df06a44b35b0eafd833141b590148ad8c2d17b06e81aa50bc466307f618025cda16029da79ca01cd7bf2fa8433c6000000004e464c4f470000000000000000000000000000000000000000000000000000005000000000000000000000000000000000000000f7040c3bd532a607b6540847e9980255ac80a05048ee3c578fd00c809822ab1ff7d12707561fdd7b1bcbd7c428bd7449152a676a0e0fc0823ebe89b10758fffe5c92f48f0000000000000000000000000000000000000000000000000000000000000000000000000000000001000000fcffffff"]}, 0x351) setsockopt$inet_int(r1, 0x0, 0x2, &(0x7f00000000c0)=0x7fffffff, 0x4) r2 = socket$rds(0x15, 0x5, 0x0) pipe(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$bt_BT_DEFER_SETUP(r3, 0x112, 0x7, &(0x7f0000000280)=0x100, 0x4) accept$packet(r4, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @remote}, &(0x7f0000000100)=0x14) connect$rds(r2, &(0x7f0000000140)={0x2, 0x4e22, @remote={0xac, 0x14, 0x14, 0xbb}}, 0x10) getsockopt$sock_buf(r2, 0x1, 0x3b, &(0x7f0000000180)=""/83, &(0x7f0000000200)=0x53) [ 329.020578] ? trace_hardirqs_on+0xd/0x10 [ 329.024733] ? do_syscall_64+0xb7/0x940 [ 329.024735] kernel msg: ebtables bug: please report to author: entries_size too small [ 329.036675] ? SyS_mknod+0x480/0x480 [ 329.040410] do_syscall_64+0x281/0x940 [ 329.044304] ? vmalloc_sync_all+0x30/0x30 [ 329.048453] ? _raw_spin_unlock_irq+0x27/0x70 [ 329.052949] ? finish_task_switch+0x1c1/0x7e0 [ 329.057446] ? syscall_return_slowpath+0x550/0x550 [ 329.062373] ? syscall_return_slowpath+0x2ac/0x550 [ 329.067305] ? prepare_exit_to_usermode+0x350/0x350 [ 329.072334] ? entry_SYSCALL_64_after_hwframe+0x52/0xb7 [ 329.077716] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 329.082578] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 329.087768] RIP: 0033:0x454e79 [ 329.090939] RSP: 002b:00007f016b92fc68 EFLAGS: 00000246 ORIG_RAX: 0000000000000102 [ 329.098633] RAX: ffffffffffffffda RBX: 00007f016b9306d4 RCX: 0000000000454e79 [ 329.105886] RDX: 0000000000000020 RSI: 0000000020000280 RDI: 0000000000000015 [ 329.113135] RBP: 000000000072bea0 R08: 0000000000000000 R09: 0000000000000000 setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000a00)=@filter={'filter\x00', 0xe, 0x4, 0x5a0, 0xffffffff, 0x0, 0xf0, 0xf0, 0xffffffff, 0xffffffff, 0x4d0, 0x4d0, 0x4d0, 0xffffffff, 0x4, &(0x7f0000000300), {[{{@ipv6={@ipv4={[], [0xff, 0xff], @rand_addr=0x80000001}, @dev={0xfe, 0x80, [], 0x16}, [0x0, 0xffffff00, 0xff, 0xffffffff], [0x0, 0xff000000, 0xffffffff], 'ipddp0\x00', 'ip_vti0\x00', {}, {0xff}, 0x6c, 0x2bf}, 0x0, 0xc8, 0xf0}, @REJECT={0x28, 'REJECT\x00', 0x0, {0x7}}}, {{@ipv6={@remote={0xfe, 0x80, [], 0xbb}, @remote={0xfe, 0x80, [], 0xbb}, [0xff000000, 0xffffffff, 0xffffff00, 0xff], [0xff, 0xffffffff, 0x0, 0xff000000], 'syzkaller1\x00', 'eql\x00', {}, {}, 0x62, 0x0, 0x4, 0x1}, 0x0, 0x120, 0x148, 0x0, {}, [@common=@frag={0x30, 'frag\x00', 0x0, {0x7ff, 0x7, 0x1, 0x2}}, @common=@hl={0x28, 'hl\x00', 0x0, {0x3, 0x7fff}}]}, @REJECT={0x28, 'REJECT\x00', 0x0, {0x7}}}, {{@ipv6={@dev={0xfe, 0x80, [], 0xc}, @loopback={0x0, 0x1}, [0xffffffff, 0xffffffff, 0xff000000, 0xff000000], [0xff, 0x0, 0xff, 0xffffff00], 'irlan0\x00', 'vcan0\x00', {0xff}, {}, 0x3b, 0xffffffffffffab69, 0x2, 0x30}, 0x0, 0x250, 0x298, 0x0, {}, [@common=@srh={0x30, 'srh\x00', 0x0, {0xbb, 0x1, 0x3, 0x6, 0xffffffffffffffc0, 0x80}}, @common=@inet=@policy={0x158, 'policy\x00', 0x0, {[{@ipv4, [0xffffffff, 0xff0000ff, 0xff000000, 0xffffffff], @ipv4=@multicast1=0xe0000001, [0xffffffff, 0xffffffff, 0xff000000, 0xffffff00], 0x4d5, 0x3500, 0x5c, 0x0, 0x10, 0xf}, {@ipv6=@dev={0xfe, 0x80, [], 0x11}, [0x0, 0xff000000, 0xff0000ff, 0xffffff00], @ipv4=@multicast1=0xe0000001, [0xffffffff, 0x0, 0x0, 0xffffffff], 0x4d5, 0x3500, 0x77, 0x1, 0x0, 0x1d}, {@ipv6=@mcast1={0xff, 0x1, [], 0x1}, [0xff000000, 0xffffffff, 0xffffff00, 0xff], @ipv4=@multicast2=0xe0000002, [0xffffffff, 0x0, 0xffffff00, 0xffffffff], 0x4d3, 0x3503, 0x7f, 0x0, 0x1, 0x19}, {@ipv4=@local={0xac, 0x14, 0x14, 0xaa}, [0x0, 0xff, 0x0, 0xff0000ff], @ipv6=@local={0xfe, 0x80, [], 0xaa}, [0xffffffff, 0xffffffff, 0xff, 0xff0000ff], 0x4d4, 0x0, 0x0, 0x1, 0x1f, 0x10}], 0x0, 0x3}}]}, @common=@unspec=@LED={0x48, 'LED\x00', 0x0, {'syz1\x00', 0x0, 0x8, 0x8}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28, '\x00', 0x0, 0xfffffffffffffffe}}}}, 0x600) socket(0x1, 0xa, 0x7) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_TIMER(r4, 0x40605346, &(0x7f0000000680)={0x1, 0x3, {0x3, 0x0, 0x9, 0x3}}) 2018/03/30 23:06:20 executing program 3: r0 = socket(0x40000000015, 0x5, 0x0) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000240), 0x4) bind$inet(r0, &(0x7f00008a5ff0)={0x2, 0x4e21, @loopback=0x7f000001}, 0x10) sendto$inet(r0, &(0x7f0000f7db7f)="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", 0x480, 0x0, &(0x7f000069affb)={0x2, 0x4e20, @loopback=0x7f000001}, 0x10) setsockopt$RDS_CONG_MONITOR(r0, 0x114, 0x6, &(0x7f0000000080)=0x1, 0x4) ioctl$int_in(r0, 0x5421, &(0x7f0000000040)=0x56d) sendto$inet(r0, &(0x7f00004b3fff), 0x0, 0x0, &(0x7f00002b4000)={0x2, 0x4e20, @loopback=0x7f000001}, 0x3f6) ioctl$sock_inet_tcp_SIOCOUTQ(r0, 0x5411, &(0x7f0000000000)) 2018/03/30 23:06:20 executing program 6: pipe(&(0x7f0000000940)={0xffffffffffffffff, 0xffffffffffffffff}) accept4$ax25(r0, 0x0, &(0x7f0000000080), 0x80000) r1 = socket$inet(0x2, 0x20000000000003, 0x2) connect$inet(r1, &(0x7f0000000000)={0x2, 0x0, @remote={0xac, 0x14, 0x14, 0xbb}}, 0x10) sendmsg(0xffffffffffffffff, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000140), 0x0, &(0x7f0000000180)=ANY=[]}, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000980)=@broute={'broute\x00', 0x20, 0x3, 0x2d9, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000380], 0x0, &(0x7f00000002c0), &(0x7f0000001000)=ANY=[@ANYBLOB="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"]}, 0x351) setsockopt$inet_int(r1, 0x0, 0x2, &(0x7f00000000c0)=0x7fffffff, 0x4) r2 = socket$rds(0x15, 0x5, 0x0) pipe(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$bt_BT_DEFER_SETUP(r3, 0x112, 0x7, &(0x7f0000000280)=0x100, 0x4) accept$packet(r4, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @remote}, &(0x7f0000000100)=0x14) connect$rds(r2, &(0x7f0000000140)={0x2, 0x4e22, @remote={0xac, 0x14, 0x14, 0xbb}}, 0x10) getsockopt$sock_buf(r2, 0x1, 0x3b, &(0x7f0000000180)=""/83, &(0x7f0000000200)=0x53) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000a00)=@filter={'filter\x00', 0xe, 0x4, 0x5a0, 0xffffffff, 0x0, 0xf0, 0xf0, 0xffffffff, 0xffffffff, 0x4d0, 0x4d0, 0x4d0, 0xffffffff, 0x4, &(0x7f0000000300), {[{{@ipv6={@ipv4={[], [0xff, 0xff], @rand_addr=0x80000001}, @dev={0xfe, 0x80, [], 0x16}, [0x0, 0xffffff00, 0xff, 0xffffffff], [0x0, 0xff000000, 0xffffffff], 'ipddp0\x00', 'ip_vti0\x00', {}, {0xff}, 0x6c, 0x2bf}, 0x0, 0xc8, 0xf0}, @REJECT={0x28, 'REJECT\x00', 0x0, {0x7}}}, {{@ipv6={@remote={0xfe, 0x80, [], 0xbb}, @remote={0xfe, 0x80, [], 0xbb}, [0xff000000, 0xffffffff, 0xffffff00, 0xff], [0xff, 0xffffffff, 0x0, 0xff000000], 'syzkaller1\x00', 'eql\x00', {}, {}, 0x62, 0x0, 0x4, 0x1}, 0x0, 0x120, 0x148, 0x0, {}, [@common=@frag={0x30, 'frag\x00', 0x0, {0x7ff, 0x7, 0x1, 0x2}}, @common=@hl={0x28, 'hl\x00', 0x0, {0x3, 0x7fff}}]}, @REJECT={0x28, 'REJECT\x00', 0x0, {0x7}}}, {{@ipv6={@dev={0xfe, 0x80, [], 0xc}, @loopback={0x0, 0x1}, [0xffffffff, 0xffffffff, 0xff000000, 0xff000000], [0xff, 0x0, 0xff, 0xffffff00], 'irlan0\x00', 'vcan0\x00', {0xff}, {}, 0x3b, 0xffffffffffffab69, 0x2, 0x30}, 0x0, 0x250, 0x298, 0x0, {}, [@common=@srh={0x30, 'srh\x00', 0x0, {0xbb, 0x1, 0x3, 0x6, 0xffffffffffffffc0, 0x80}}, @common=@inet=@policy={0x158, 'policy\x00', 0x0, {[{@ipv4, [0xffffffff, 0xff0000ff, 0xff000000, 0xffffffff], @ipv4=@multicast1=0xe0000001, [0xffffffff, 0xffffffff, 0xff000000, 0xffffff00], 0x4d5, 0x3500, 0x5c, 0x0, 0x10, 0xf}, {@ipv6=@dev={0xfe, 0x80, [], 0x11}, [0x0, 0xff000000, 0xff0000ff, 0xffffff00], @ipv4=@multicast1=0xe0000001, [0xffffffff, 0x0, 0x0, 0xffffffff], 0x4d5, 0x3500, 0x77, 0x1, 0x0, 0x1d}, {@ipv6=@mcast1={0xff, 0x1, [], 0x1}, [0xff000000, 0xffffffff, 0xffffff00, 0xff], @ipv4=@multicast2=0xe0000002, [0xffffffff, 0x0, 0xffffff00, 0xffffffff], 0x4d3, 0x3503, 0x7f, 0x0, 0x1, 0x19}, {@ipv4=@local={0xac, 0x14, 0x14, 0xaa}, [0x0, 0xff, 0x0, 0xff0000ff], @ipv6=@local={0xfe, 0x80, [], 0xaa}, [0xffffffff, 0xffffffff, 0xff, 0xff0000ff], 0x4d4, 0x3505, 0x0, 0x0, 0x1f, 0x10}], 0x0, 0x3}}]}, @common=@unspec=@LED={0x48, 'LED\x00', 0x0, {'syz1\x00', 0x0, 0x8, 0x8}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28, '\x00', 0x0, 0xfffffffffffffffe}}}}, 0x600) socket(0x1, 0xa, 0x7) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_TIMER(r4, 0x40605346, &(0x7f0000000680)={0x1, 0x3, {0x3, 0x0, 0x9, 0x3}}) 2018/03/30 23:06:20 executing program 3: r0 = socket(0x40000000015, 0x5, 0x0) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000240), 0x4) bind$inet(r0, &(0x7f00008a5ff0)={0x2, 0x4e21, @loopback=0x7f000001}, 0x10) sendto$inet(r0, &(0x7f0000f7db7f)="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", 0x480, 0x0, &(0x7f000069affb)={0x2, 0x4e20, @loopback=0x7f000001}, 0x10) setsockopt$RDS_CONG_MONITOR(r0, 0x114, 0x6, &(0x7f0000000080)=0x1, 0x4) ioctl$int_in(r0, 0x5421, &(0x7f0000000040)=0x56d) sendto$inet(r0, &(0x7f00004b3fff), 0x0, 0x0, &(0x7f00002b4000)={0x2, 0x4e20, @loopback=0x7f000001}, 0x3f6) ioctl$sock_inet_tcp_SIOCOUTQ(r0, 0x5411, &(0x7f0000000000)) [ 329.120395] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000016 [ 329.127641] R13: 00000000000003eb R14: 00000000006f7ea8 R15: 000000000000001b 2018/03/30 23:06:21 executing program 6: pipe(&(0x7f0000000940)={0xffffffffffffffff, 0xffffffffffffffff}) accept4$ax25(r0, 0x0, &(0x7f0000000080), 0x80000) r1 = socket$inet(0x2, 0x20000000000003, 0x2) connect$inet(r1, &(0x7f0000000000)={0x2, 0x0, @remote={0xac, 0x14, 0x14, 0xbb}}, 0x10) sendmsg(0xffffffffffffffff, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000140), 0x0, &(0x7f0000000180)=ANY=[]}, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000980)=@broute={'broute\x00', 0x20, 0x3, 0x2d9, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000380], 0x0, &(0x7f00000002c0), &(0x7f0000001000)=ANY=[@ANYBLOB="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"]}, 0x351) setsockopt$inet_int(r1, 0x0, 0x2, &(0x7f00000000c0)=0x7fffffff, 0x4) r2 = socket$rds(0x15, 0x5, 0x0) pipe(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$bt_BT_DEFER_SETUP(r3, 0x112, 0x7, &(0x7f0000000280)=0x100, 0x4) accept$packet(r4, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @remote}, &(0x7f0000000100)=0x14) connect$rds(r2, &(0x7f0000000140)={0x2, 0x4e22, @remote={0xac, 0x14, 0x14, 0xbb}}, 0x10) getsockopt$sock_buf(r2, 0x1, 0x3b, &(0x7f0000000180)=""/83, &(0x7f0000000200)=0x53) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000a00)=@filter={'filter\x00', 0xe, 0x4, 0x5a0, 0xffffffff, 0x0, 0xf0, 0xf0, 0xffffffff, 0xffffffff, 0x4d0, 0x4d0, 0x4d0, 0xffffffff, 0x4, &(0x7f0000000300), {[{{@ipv6={@ipv4={[], [0xff, 0xff], @rand_addr=0x80000001}, @dev={0xfe, 0x80, [], 0x16}, [0x0, 0xffffff00, 0xff, 0xffffffff], [0x0, 0xff000000, 0xffffffff], 'ipddp0\x00', 'ip_vti0\x00', {}, {0xff}, 0x6c, 0x2bf}, 0x0, 0xc8, 0xf0}, @REJECT={0x28, 'REJECT\x00', 0x0, {0x7}}}, {{@ipv6={@remote={0xfe, 0x80, [], 0xbb}, @remote={0xfe, 0x80, [], 0xbb}, [0xff000000, 0xffffffff, 0xffffff00, 0xff], [0xff, 0xffffffff, 0x0, 0xff000000], 'syzkaller1\x00', 'eql\x00', {}, {}, 0x62, 0x0, 0x4, 0x1}, 0x0, 0x120, 0x148, 0x0, {}, [@common=@frag={0x30, 'frag\x00', 0x0, {0x7ff, 0x7, 0x1, 0x2}}, @common=@hl={0x28, 'hl\x00', 0x0, {0x3, 0x7fff}}]}, @REJECT={0x28, 'REJECT\x00', 0x0, {0x7}}}, {{@ipv6={@dev={0xfe, 0x80, [], 0xc}, @loopback={0x0, 0x1}, [0xffffffff, 0xffffffff, 0xff000000, 0xff000000], [0xff, 0x0, 0xff, 0xffffff00], 'irlan0\x00', 'vcan0\x00', {0xff}, {}, 0x3b, 0xffffffffffffab69, 0x2, 0x30}, 0x0, 0x250, 0x298, 0x0, {}, [@common=@srh={0x30, 'srh\x00', 0x0, {0xbb, 0x1, 0x3, 0x6, 0xffffffffffffffc0, 0x80}}, @common=@inet=@policy={0x158, 'policy\x00', 0x0, {[{@ipv4, [0xffffffff, 0xff0000ff, 0xff000000, 0xffffffff], @ipv4=@multicast1=0xe0000001, [0xffffffff, 0xffffffff, 0xff000000, 0xffffff00], 0x4d5, 0x3500, 0x5c, 0x0, 0x10, 0xf}, {@ipv6=@dev={0xfe, 0x80, [], 0x11}, [0x0, 0xff000000, 0xff0000ff, 0xffffff00], @ipv4=@multicast1=0xe0000001, [0xffffffff, 0x0, 0x0, 0xffffffff], 0x4d5, 0x3500, 0x77, 0x1, 0x0, 0x1d}, {@ipv6=@mcast1={0xff, 0x1, [], 0x1}, [0xff000000, 0xffffffff, 0xffffff00, 0xff], @ipv4=@multicast2=0xe0000002, [0xffffffff, 0x0, 0xffffff00, 0xffffffff], 0x4d3, 0x3503, 0x7f, 0x0, 0x1, 0x19}, {@ipv4=@local={0xac, 0x14, 0x14, 0xaa}, [0x0, 0xff, 0x0, 0xff0000ff], @ipv6=@local={0xfe, 0x80, [], 0xaa}, [0xffffffff, 0xffffffff, 0xff, 0xff0000ff], 0x4d4, 0x3505, 0x0, 0x0, 0x1f, 0x10}], 0x0, 0x3}}]}, @common=@unspec=@LED={0x48, 'LED\x00', 0x0, {'syz1\x00', 0x0, 0x8, 0x8}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28, '\x00', 0x0, 0xfffffffffffffffe}}}}, 0x600) socket(0x1, 0xa, 0x7) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_TIMER(r4, 0x40605346, &(0x7f0000000680)={0x1, 0x3, {0x3, 0x0, 0x9, 0x3}}) 2018/03/30 23:06:21 executing program 7: perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f00000000c0)='./control\x00', 0x0) inotify_init() r0 = syz_open_dev$sg(&(0x7f000028fff7)='/dev/sg#\x00', 0x0, 0x0) ioctl(r0, 0x4000000000001276, &(0x7f0000000040)) msgget(0x2, 0x0) getsockopt$nfc_llcp(0xffffffffffffffff, 0x118, 0x4, &(0x7f0000000740)=""/223, 0xdf) setsockopt$inet_mreq(r0, 0x0, 0x23, &(0x7f00000002c0)={@empty, @remote={0xac, 0x14, 0x14, 0xbb}}, 0x8) accept4$nfc_llcp(0xffffffffffffffff, &(0x7f0000000940), &(0x7f0000000080)=0x60, 0x800) ioctl$SNDRV_CTL_IOCTL_ELEM_INFO(0xffffffffffffffff, 0xc1105511, &(0x7f0000000100)={{0x0, 0x0, 0x0, 0x0, "386aea20273dc03c3d18dd0dbd4a0ca15f9f580393cc4ec3b8ee256b9aa630224ba64c6ff43ee01d2996c914"}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "eda422cd37591b3a5a7a683380f7e0b9e790c6b72cd0a4f3342f7431c1699a305ca3091bb2320e8df4e298a2cca26637866a68c1426ffbd8a6c7da1d8ea77d9d", &(0x7f00000000c0)='/dev/snd/controlC#\x00', 0x13}) r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000003c0)='/proc/self/net/pfkey\x00', 0x800, 0x0) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) add_key$user(&(0x7f0000000480)='user\x00', &(0x7f00000004c0)={0x73, 0x79, 0x7a, 0x3}, &(0x7f0000000500)="d3238eea76b0470531092a0a77b0b49789a0fc97b8f8b9e23a2a5a5a0c169ed6e83480b4801dbf79db3527904ee3128c05ce2806e210237c36b88ceabe99d8784860e5d0e91fe33d38d0133e056cdd1e2910d57fc5eb1b23db3b60a7077ff33bb6c7445cd258ee25f9187269c22d1ed05acb2b9b599bd285b692257a631754ab9befebd3fdb3167361c24c5c5dcf90e476e052b9d22362c57878cb7205fe361346d6beb77b7844fe94", 0xa9, 0xfffffffffffffffe) ioctl$sock_inet_SIOCSIFADDR(r0, 0x8916, &(0x7f0000000300)={'gretap0\x00', {0x2, 0x4e24, @loopback=0x7f000001}}) keyctl$instantiate_iov(0x14, 0x0, &(0x7f0000000780)=[{&(0x7f0000000840)="edb4a01f68d76905035a4ebdd427d31585a5a650581902b1c077f74ca8f1ce7d3e2f6e1c6760433af9664b3f3bebab3a1a1c4ef86f42c39b758accc1e7637bb18d28248dc7a1719b73388830b162613b17fd02220bd1fe2ad86adb96efcfc672d126ae58f745fba0e7534cdbae947449df767bd76a0c38b5752dcd13f7065edea86dc156c0708e76c2c99a94a95f1e93ff73cb3eb94e06d399cf48aaac7963d13e4b3a6b32bc2b19d5461545dcf3f71bb24442d286421f8d891d77a3c4c1c9435bbdf187682c22ded22b669b7790d05b4894166a2d5f33098cf908a23a2e0671d824e88942fbe0bd1416", 0xea}], 0x1, 0x0) r3 = ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) ioctl$KVM_UNREGISTER_COALESCED_MMIO(r3, 0x4010ae68, &(0x7f0000000000)={0x0, 0x5000}) ioctl$KVM_CREATE_PIT2(r3, 0x4040ae77, &(0x7f0000000440)={0xfffffffffffffff7}) r4 = ioctl$KVM_CREATE_VCPU(r3, 0xae41, 0x0) setsockopt$inet_tcp_TCP_ULP(r1, 0x6, 0x1f, &(0x7f0000000280)='tls\x00', 0x4) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000005fd8)={'vcan0\x00'}) r5 = socket$can_raw(0x1d, 0x3, 0x1) socket$inet6(0xa, 0x0, 0x0) r6 = syz_open_dev$dspn(&(0x7f0000000040)='/dev/dsp#\x00', 0x0, 0x0) connect$vsock_stream(r6, &(0x7f0000000080)={0x28, 0x0, 0xffffffff, @my=0x1}, 0x10) dup2(r2, r4) dup3(r2, r3, 0x0) getsockopt$netrom_NETROM_T1(r5, 0x103, 0x1, &(0x7f0000000640), &(0x7f0000000400)=0x4) execveat(r0, &(0x7f0000000340)='./file0\x00', &(0x7f0000000580)=[&(0x7f0000000500)='proc-\x00', &(0x7f0000000540)='/dev/sg#\x00'], &(0x7f0000000680)=[&(0x7f00000005c0)='/dev/sg#\x00', &(0x7f0000000600)='/dev/sg#\x00'], 0x1d00) 2018/03/30 23:06:21 executing program 3: r0 = socket(0x40000000015, 0x5, 0x0) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000240), 0x4) bind$inet(r0, &(0x7f00008a5ff0)={0x2, 0x4e21, @loopback=0x7f000001}, 0x10) sendto$inet(r0, &(0x7f0000f7db7f)="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", 0x481, 0x0, &(0x7f000069affb)={0x2, 0x0, @loopback=0x7f000001}, 0x10) setsockopt$RDS_CONG_MONITOR(r0, 0x114, 0x6, &(0x7f0000000080)=0x1, 0x4) ioctl$int_in(r0, 0x5421, &(0x7f0000000040)=0x56d) sendto$inet(r0, &(0x7f00004b3fff), 0x0, 0x0, &(0x7f00002b4000)={0x2, 0x4e20, @loopback=0x7f000001}, 0x3f6) ioctl$sock_inet_tcp_SIOCOUTQ(r0, 0x5411, &(0x7f0000000000)) 2018/03/30 23:06:21 executing program 2: r0 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000400)='/dev/sequencer\x00', 0x4c801, 0x0) ioctl$SNDRV_SEQ_IOCTL_UNSUBSCRIBE_PORT(r0, 0x40505331, &(0x7f00000004c0)={{0x8, 0x1}, {0x0, 0xffff}, 0x8, 0x3, 0x9}) r1 = socket$inet_sctp(0x2, 0x0, 0x84) write$rdma_cm(0xffffffffffffffff, &(0x7f00000000c0)=ANY=[@ANYBLOB], 0x0) write$rdma_cm(0xffffffffffffffff, &(0x7f00000000c0)=ANY=[@ANYBLOB="031a4f2f7f000000dde30000000000000000000000000000c91d483d000000000000000100005dd45591dac827000000ff01000000000000000000000000000000000000"], 0x40) write$rdma_cm(0xffffffffffffffff, &(0x7f0000000440)=@resolve_ip={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x1, [], 0x1}}, {0xa, 0x0, 0x0, @mcast1={0xff, 0x1, [], 0x1}}}}, 0x48) creat(&(0x7f0000000140)='./file0\x00', 0x8) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000280)={0x0}, &(0x7f00000002c0)=0xc) wait4(r2, &(0x7f0000000380), 0x0, 0x0) socketpair(0x3, 0x0, 0xfffffffffffffff7, &(0x7f0000000240)) perf_event_open(&(0x7f000001d000)={0x2, 0x78, 0xe2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$inet6_int(r3, 0x29, 0xc8, &(0x7f00008d6000), 0x4) openat$kvm(0xffffffffffffff9c, &(0x7f0000264ff7)='/dev/kvm\x00', 0x0, 0x0) setsockopt$inet6_int(r3, 0x29, 0xc8, &(0x7f0000ac5000), 0x4) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000000)={@remote, @loopback}, &(0x7f0000000080)=0xc) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000200)=0x0) sigaltstack(&(0x7f0000ffd000/0x1000)=nil, &(0x7f00000003c0)) llistxattr(&(0x7f00000005c0)='./file0\x00', &(0x7f0000000540)=""/79, 0x46) perf_event_open(&(0x7f0000000300)={0x7, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0xc80, 0x0, 0x0, 0x0, 0x401, 0x3a}, r4, 0x8, 0xffffffffffffffff, 0x0) 2018/03/30 23:06:21 executing program 5: mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) perf_event_open(&(0x7f0000223000)={0x2, 0x78, 0xe3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000001980)={{{@in6=@remote, @in=@multicast1}}, {{@in=@multicast2}, 0x0, @in=@multicast2}}, &(0x7f0000000100)=0xe8) mount(&(0x7f00000003c0)='./file0\x00', &(0x7f0000000380)='./file0\x00', &(0x7f0000000300)='cgroup2\x00', 0x0, 0x0) r0 = open$dir(&(0x7f000001bff4)='./file0\x00', 0x0, 0x0) mkdirat(0xffffffffffffffff, &(0x7f0000000280)='./file0\x00', 0x20) unlinkat(r0, &(0x7f0000000080)='./file0\x00', 0x200) utimes(&(0x7f0000000040)='./file0\x00', &(0x7f00000000c0)={{0x77359400}}) 2018/03/30 23:06:21 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x200, 0x0) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000680)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$sock_linger(r2, 0x1, 0xd, &(0x7f00000006c0)={0x400, 0x9}, 0x8) perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x0, 0x0) r3 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) mmap(&(0x7f0000000000/0x9d7000)=nil, 0x9d7000, 0x0, 0x10, 0xffffffffffffffff, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x7) perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r4 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r4, &(0x7f0000e5b000)={0x2, 0x4e20, @multicast1=0xe0000001}, 0x10) syz_open_dev$sg(&(0x7f0000000440)='/dev/sg#\x00', 0x0, 0x0) connect$inet(r4, &(0x7f0000000100)={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x11}}, 0x10) r5 = bpf$PROG_LOAD(0x5, &(0x7f0000eb0fb8)={0x1, 0x3, &(0x7f00009ff000)=@framed={{0x18}, [], {0x95}}, &(0x7f00002bf000)='syzkaller\x00', 0x4, 0xb7, &(0x7f00006ab000)=""/183}, 0x48) setsockopt$inet_tcp_int(r4, 0x6, 0x19, &(0x7f0000000240)=0x8, 0x4) r6 = socket$kcm(0x29, 0x2, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r6, 0x89e0, &(0x7f000031aff8)={r4, r5}) ioctl$sock_kcm_SIOCKCMCLONE(r6, 0x89e2, &(0x7f00000002c0)={0xffffffffffffffff}) sendmsg$nl_xfrm(r7, &(0x7f0000000780)={&(0x7f0000000200)={0x10}, 0xc, &(0x7f0000000740)={&(0x7f0000000480)=@updpolicy={0xb8, 0x19, 0x0, 0x0, 0x0, {{@in=@loopback=0x7f000001, @in6=@mcast1={0xff, 0x1, [], 0x1}}}}, 0xffcb}, 0x1}, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(r7, 0x89e1, &(0x7f0000000040)={r4}) r8 = fcntl$getown(r3, 0x9) recvfrom$inet6(0xffffffffffffffff, &(0x7f0000000140)=""/177, 0xb1, 0x40000000, &(0x7f0000000080)={0xa, 0x4e23, 0x9, @empty, 0xe38}, 0x1c) r9 = accept4$inet(0xffffffffffffff9c, &(0x7f0000000700)={0x0, 0x0, @broadcast}, &(0x7f0000000740)=0x10, 0x80000) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r9, 0x84, 0x64, &(0x7f0000000780)=[@in6={0xa, 0x4e22, 0xfffffffffffff7e1, @mcast2={0xff, 0x2, [], 0x1}, 0x8}, @in={0x2, 0x4e24, @broadcast=0xffffffff}], 0x2c) ptrace$setregset(0x4205, r8, 0x0, &(0x7f00000005c0)={&(0x7f0000000080)}) ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r10 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x1fffd, 0x0) r11 = syz_open_dev$sndtimer(&(0x7f00000000c0)='/dev/snd/timer\x00', 0x0, 0x0) read(r11, &(0x7f0000ec6000)=""/50, 0x32) fcntl$dupfd(r11, 0x0, r10) 2018/03/30 23:06:21 executing program 4: mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount(&(0x7f000000a000)='./file0\x00', &(0x7f0000026ff8)='./file0\x00', &(0x7f000000c000)='ramfs\x00', 0x0, &(0x7f000000a000)) truncate(&(0x7f0000000600)='./file1\x00', 0x5) mkdir(&(0x7f0000000000)='./file1\x00', 0x0) mount(&(0x7f0000000040)='./file0\x00', &(0x7f0000903000)='./file0\x00', &(0x7f0000811ffa)='bdev\x00', 0x100000, &(0x7f00000003c0)="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") r0 = dup(0xffffffffffffffff) unlinkat(r0, &(0x7f0000000580)='./file1/file0\x00', 0x200) r1 = syz_open_dev$vcsn(&(0x7f00000000c0)='/dev/vcs#\x00', 0x2, 0x20800) r2 = dup(r1) renameat(r0, &(0x7f0000000080)='./file1/file0\x00', r1, &(0x7f0000000100)='./file1\x00') mount(&(0x7f0000fb6000)='./file0\x00', &(0x7f0000d78000)='.', &(0x7f0000fdb000)='ubifs\x00', 0x1003, 0x0) mount(&(0x7f00002b9ff8)='./file0\x00', &(0x7f0000cbeff8)='./file0\x00', &(0x7f00005f7ffa)='ramfs\x00', 0x80000, &(0x7f000002f000)) getsockopt$inet6_IPV6_IPSEC_POLICY(r2, 0x29, 0x22, &(0x7f0000000280)={{{@in=@dev, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@local}, 0x0, @in=@local}}, &(0x7f0000000380)=0xe8) getgroups(0x7, &(0x7f0000000540)=[0xffffffffffffffff, 0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0]) sendto$ax25(r0, &(0x7f0000000640)="bffc27f2457f113b5a5baab83799b77ba0be58fa76d4dcceebfbd7f9f33e433313a1bb6b6ac8c5c95e5fe98b13948e7749ec2b275a44d3723a9dd3054582c0a0d5e6a08a9103d4601a9f60e384bf03c0aecbac304d37f0e819783596f12ca882302a43aea5b8834bc9db48c2843c4cc42b756a0d8aa3486a5c5eef10f3a7d3cc38338ce83b27854f82af59b91bfec351903b3fadd63fc5d9260c523002363990033625ee14dcb683f0a25f40c156146f8bf2d84349e79f2250c66b6a719e041cf89b", 0xc2, 0x14, &(0x7f0000000740)={0x3, {"24f3585df7e68d"}, 0x8}, 0x10) fchownat(r0, &(0x7f0000000240)='.', r3, r4, 0x1800) mount(&(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)='./file1\x00', &(0x7f0000000200)='anon_inodefs\x00', 0x2000, &(0x7f0000000240)) mount(&(0x7f0000000140)='./file1/file0\x00', &(0x7f0000e08fff)='.', &(0x7f00005e9000)='cifs\x00', 0x2000, &(0x7f0000ad5000)) open$dir(&(0x7f00000005c0)='./file1\x00', 0x101000, 0x140) 2018/03/30 23:06:21 executing program 0 (fault-call:7 fault-nth:28): mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r0 = syz_open_dev$usbmon(&(0x7f0000000400)='/dev/usbmon#\x00', 0x0, 0x0) r1 = perf_event_open(&(0x7f0000223000)={0x2, 0x78, 0xe3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000001980)={{{@in6=@remote, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast2}, 0x0, @in=@multicast2}}, &(0x7f0000001a80)=0xe8) chown(&(0x7f00000004c0)='./file0\x00', r2, 0x0) mount(&(0x7f00000003c0)='./file0\x00', &(0x7f0000000380)='./file0\x00', &(0x7f0000000300)='cgroup2\x00', 0x0, 0x0) r3 = open$dir(&(0x7f000001bff4)='./file0\x00', 0x0, 0x0) mkdirat(r3, &(0x7f0000000280)='./file0\x00', 0x20) getdents64(r3, &(0x7f00000007c0)=""/250, 0x1015a) dup3(r0, r1, 0x80000) r4 = open$dir(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) renameat2(r4, &(0x7f0000000200)='./file1\x00', 0xffffffffffffffff, &(0x7f0000000240)='./file0\x00', 0xfd1092750066ec78) ioctl$KDGKBMODE(0xffffffffffffffff, 0x4b44, &(0x7f0000000140)) [ 329.746595] kernel msg: ebtables bug: please report to author: entries_size too small 2018/03/30 23:06:21 executing program 3: r0 = socket(0x40000000015, 0x5, 0x0) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000240), 0x4) bind$inet(r0, &(0x7f00008a5ff0)={0x2, 0x4e21, @loopback=0x7f000001}, 0x10) sendto$inet(r0, &(0x7f0000f7db7f)="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", 0x481, 0x0, &(0x7f000069affb)={0x2, 0x0, @loopback=0x7f000001}, 0x10) setsockopt$RDS_CONG_MONITOR(r0, 0x114, 0x6, &(0x7f0000000080)=0x1, 0x4) ioctl$int_in(r0, 0x5421, &(0x7f0000000040)=0x56d) sendto$inet(r0, &(0x7f00004b3fff), 0x0, 0x0, &(0x7f00002b4000)={0x2, 0x4e20, @loopback=0x7f000001}, 0x3f6) ioctl$sock_inet_tcp_SIOCOUTQ(r0, 0x5411, &(0x7f0000000000)) 2018/03/30 23:06:21 executing program 6: pipe(&(0x7f0000000940)={0xffffffffffffffff, 0xffffffffffffffff}) accept4$ax25(r0, 0x0, &(0x7f0000000080), 0x80000) r1 = socket$inet(0x2, 0x20000000000003, 0x2) connect$inet(r1, &(0x7f0000000000)={0x2, 0x0, @remote={0xac, 0x14, 0x14, 0xbb}}, 0x10) sendmsg(0xffffffffffffffff, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000140), 0x0, &(0x7f0000000180)=ANY=[]}, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000980)=@broute={'broute\x00', 0x20, 0x3, 0x2d9, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000380], 0x0, &(0x7f00000002c0), &(0x7f0000001000)=ANY=[@ANYBLOB="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"]}, 0x351) setsockopt$inet_int(r1, 0x0, 0x2, &(0x7f00000000c0)=0x7fffffff, 0x4) r2 = socket$rds(0x15, 0x5, 0x0) pipe(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$bt_BT_DEFER_SETUP(r3, 0x112, 0x7, &(0x7f0000000280)=0x100, 0x4) accept$packet(r4, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @remote}, &(0x7f0000000100)=0x14) connect$rds(r2, &(0x7f0000000140)={0x2, 0x4e22, @remote={0xac, 0x14, 0x14, 0xbb}}, 0x10) getsockopt$sock_buf(r2, 0x1, 0x3b, &(0x7f0000000180)=""/83, &(0x7f0000000200)=0x53) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000a00)=@filter={'filter\x00', 0xe, 0x4, 0x5a0, 0xffffffff, 0x0, 0xf0, 0xf0, 0xffffffff, 0xffffffff, 0x4d0, 0x4d0, 0x4d0, 0xffffffff, 0x4, &(0x7f0000000300), {[{{@ipv6={@ipv4={[], [0xff, 0xff], @rand_addr=0x80000001}, @dev={0xfe, 0x80, [], 0x16}, [0x0, 0xffffff00, 0xff, 0xffffffff], [0x0, 0xff000000, 0xffffffff], 'ipddp0\x00', 'ip_vti0\x00', {}, {0xff}, 0x6c, 0x2bf}, 0x0, 0xc8, 0xf0}, @REJECT={0x28, 'REJECT\x00', 0x0, {0x7}}}, {{@ipv6={@remote={0xfe, 0x80, [], 0xbb}, @remote={0xfe, 0x80, [], 0xbb}, [0xff000000, 0xffffffff, 0xffffff00, 0xff], [0xff, 0xffffffff, 0x0, 0xff000000], 'syzkaller1\x00', 'eql\x00', {}, {}, 0x62, 0x0, 0x4, 0x1}, 0x0, 0x120, 0x148, 0x0, {}, [@common=@frag={0x30, 'frag\x00', 0x0, {0x7ff, 0x7, 0x1, 0x2}}, @common=@hl={0x28, 'hl\x00', 0x0, {0x3, 0x7fff}}]}, @REJECT={0x28, 'REJECT\x00', 0x0, {0x7}}}, {{@ipv6={@dev={0xfe, 0x80, [], 0xc}, @loopback={0x0, 0x1}, [0xffffffff, 0xffffffff, 0xff000000, 0xff000000], [0xff, 0x0, 0xff, 0xffffff00], 'irlan0\x00', 'vcan0\x00', {0xff}, {}, 0x3b, 0xffffffffffffab69, 0x2, 0x30}, 0x0, 0x250, 0x298, 0x0, {}, [@common=@srh={0x30, 'srh\x00', 0x0, {0xbb, 0x1, 0x3, 0x6, 0xffffffffffffffc0, 0x80}}, @common=@inet=@policy={0x158, 'policy\x00', 0x0, {[{@ipv4, [0xffffffff, 0xff0000ff, 0xff000000, 0xffffffff], @ipv4=@multicast1=0xe0000001, [0xffffffff, 0xffffffff, 0xff000000, 0xffffff00], 0x4d5, 0x3500, 0x5c, 0x0, 0x10, 0xf}, {@ipv6=@dev={0xfe, 0x80, [], 0x11}, [0x0, 0xff000000, 0xff0000ff, 0xffffff00], @ipv4=@multicast1=0xe0000001, [0xffffffff, 0x0, 0x0, 0xffffffff], 0x4d5, 0x3500, 0x77, 0x1, 0x0, 0x1d}, {@ipv6=@mcast1={0xff, 0x1, [], 0x1}, [0xff000000, 0xffffffff, 0xffffff00, 0xff], @ipv4=@multicast2=0xe0000002, [0xffffffff, 0x0, 0xffffff00, 0xffffffff], 0x4d3, 0x3503, 0x7f, 0x0, 0x1, 0x19}, {@ipv4=@local={0xac, 0x14, 0x14, 0xaa}, [0x0, 0xff, 0x0, 0xff0000ff], @ipv6=@local={0xfe, 0x80, [], 0xaa}, [0xffffffff, 0xffffffff, 0xff, 0xff0000ff], 0x4d4, 0x3505, 0x0, 0x0, 0x1f, 0x10}], 0x0, 0x3}}]}, @common=@unspec=@LED={0x48, 'LED\x00', 0x0, {'syz1\x00', 0x0, 0x8, 0x8}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28, '\x00', 0x0, 0xfffffffffffffffe}}}}, 0x600) socket(0x1, 0xa, 0x7) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_TIMER(r4, 0x40605346, &(0x7f0000000680)={0x1, 0x3, {0x3, 0x0, 0x9, 0x3}}) 2018/03/30 23:06:21 executing program 5: r0 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/sys/net/ipv4/vs/conn_reuse_mode\x00', 0x2, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f00000000c0)={{{@in=@broadcast, @in6=@local}}, {{@in6=@mcast2}, 0x0, @in6=@loopback}}, &(0x7f0000000200)=0xe8) mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) perf_event_open(&(0x7f0000223000)={0x2, 0x78, 0xe3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000001980)={{{@in6=@remote, @in=@multicast1}}, {{@in=@multicast2}, 0x0, @in=@multicast2}}, &(0x7f0000001a80)=0xe8) mount(&(0x7f00000003c0)='./file0\x00', &(0x7f0000000380)='./file0\x00', &(0x7f0000000300)='cgroup2\x00', 0x0, 0x0) r1 = open$dir(&(0x7f000001bff4)='./file0\x00', 0x0, 0x0) mkdirat(0xffffffffffffffff, &(0x7f0000000280)='./file0\x00', 0x20) unlinkat(r1, &(0x7f0000000080)='./file0\x00', 0x200) 2018/03/30 23:06:21 executing program 4: mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount(&(0x7f000000a000)='./file0\x00', &(0x7f0000026ff8)='./file0\x00', &(0x7f000000c000)='ramfs\x00', 0x0, &(0x7f000000a000)) mkdir(&(0x7f0000000000)='./file1\x00', 0x0) r0 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000140)='/dev/dsp\x00', 0x100, 0x0) ioctl$EVIOCSABS3F(r0, 0x401845ff, &(0x7f00000002c0)={0x10000, 0x7f, 0x20, 0x3f00, 0x4, 0xfdd}) mount(&(0x7f0000000040)='./file0\x00', &(0x7f0000903000)='./file0\x00', &(0x7f0000811ffa)='bdev\x00', 0x100000, &(0x7f00000003c0)="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") r1 = dup(0xffffffffffffffff) r2 = syz_open_dev$vcsn(&(0x7f00000000c0)='/dev/vcs#\x00', 0x2, 0x20800) renameat(r1, &(0x7f0000000080)='./file1/file0\x00', r2, &(0x7f0000000100)='./file1\x00') bind$unix(r1, &(0x7f0000000240)=@abs={0x1, 0x0, 0x4e23}, 0x6e) mount(&(0x7f0000fb6000)='./file0\x00', &(0x7f0000d78000)='.', &(0x7f0000fdb000)='ubifs\x00', 0x1003, 0x0) mount(&(0x7f00002b9ff8)='./file0\x00', &(0x7f0000cbeff8)='./file0\x00', &(0x7f00005f7ffa)='ramfs\x00', 0x80000, &(0x7f000002f000)) mount(&(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)='./file1\x00', &(0x7f0000000200)='anon_inodefs\x00', 0x2000, &(0x7f0000000240)) mount(&(0x7f0000adcff8)='./file0\x00', &(0x7f0000e08fff)='.', &(0x7f00005e9000)='cifs\x00', 0x2000, &(0x7f0000ad5000)) [ 329.857769] kernel msg: ebtables bug: please report to author: entries_size too small 2018/03/30 23:06:21 executing program 2: socket$inet_sctp(0x2, 0x0, 0x84) write$rdma_cm(0xffffffffffffffff, &(0x7f00000000c0)=ANY=[@ANYBLOB], 0x0) write$rdma_cm(0xffffffffffffffff, &(0x7f00000000c0)=ANY=[@ANYBLOB="031a4f2f7f000000dde30000000000000000000000000000000000000000000100005dd45591dac827000000ff010000000000000000000000000000000000801fa45060b0a3dbd21051dcea29dcb54f7825f2f02f3808d6c2"], 0x40) write$rdma_cm(0xffffffffffffffff, &(0x7f0000000440)=@resolve_ip={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x1, [], 0x1}}, {0xa, 0x0, 0x0, @mcast1={0xff, 0x1, [], 0x1}}}}, 0x48) creat(&(0x7f0000000140)='./file0\x00', 0x8) socketpair(0x3, 0x0, 0xfffffffffffffff7, &(0x7f0000000240)) perf_event_open(&(0x7f000001d000)={0x2, 0x78, 0xe2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$inet6_int(r0, 0x29, 0xc8, &(0x7f00008d6000), 0x4) openat$kvm(0xffffffffffffff9c, &(0x7f0000264ff7)='/dev/kvm\x00', 0x0, 0x0) setsockopt$inet6_int(r0, 0x29, 0xc8, &(0x7f0000ac5000), 0x4) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000000)={@remote, @loopback}, &(0x7f0000000080)=0xc) openat$vsock(0xffffffffffffff9c, &(0x7f0000000280)='/dev/vhost-vsock\x00', 0x2, 0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000200)=0x0) sigaltstack(&(0x7f0000ffd000/0x1000)=nil, &(0x7f00000003c0)) llistxattr(&(0x7f0000000040)='./file0\x00', &(0x7f0000000180)=""/79, 0x4f) perf_event_open(&(0x7f0000000300)={0x7, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0xc80, 0x0, 0x0, 0x0, 0x401, 0x3a}, r1, 0x8, 0xffffffffffffffff, 0x0) 2018/03/30 23:06:21 executing program 6: pipe(&(0x7f0000000940)={0xffffffffffffffff, 0xffffffffffffffff}) accept4$ax25(r0, 0x0, &(0x7f0000000080), 0x80000) r1 = socket$inet(0x2, 0x20000000000003, 0x2) connect$inet(r1, &(0x7f0000000000)={0x2, 0x0, @remote={0xac, 0x14, 0x14, 0xbb}}, 0x10) sendmsg(0xffffffffffffffff, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000140), 0x0, &(0x7f0000000180)=ANY=[]}, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000980)=@broute={'broute\x00', 0x20, 0x3, 0x2d9, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000380], 0x0, &(0x7f00000002c0), &(0x7f0000001000)=ANY=[@ANYBLOB="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"]}, 0x351) setsockopt$inet_int(r1, 0x0, 0x2, &(0x7f00000000c0)=0x7fffffff, 0x4) r2 = socket$rds(0x15, 0x5, 0x0) pipe(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$bt_BT_DEFER_SETUP(r3, 0x112, 0x7, &(0x7f0000000280)=0x100, 0x4) accept$packet(r4, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @remote}, &(0x7f0000000100)=0x14) connect$rds(r2, &(0x7f0000000140)={0x2, 0x4e22, @remote={0xac, 0x14, 0x14, 0xbb}}, 0x10) getsockopt$sock_buf(r2, 0x1, 0x3b, &(0x7f0000000180)=""/83, &(0x7f0000000200)=0x53) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000a00)=@filter={'filter\x00', 0xe, 0x4, 0x5a0, 0xffffffff, 0x0, 0xf0, 0xf0, 0xffffffff, 0xffffffff, 0x4d0, 0x4d0, 0x4d0, 0xffffffff, 0x4, &(0x7f0000000300), {[{{@ipv6={@ipv4={[], [0xff, 0xff], @rand_addr=0x80000001}, @dev={0xfe, 0x80, [], 0x16}, [0x0, 0xffffff00, 0xff, 0xffffffff], [0x0, 0xff000000, 0xffffffff], 'ipddp0\x00', 'ip_vti0\x00', {}, {0xff}, 0x6c, 0x2bf}, 0x0, 0xc8, 0xf0}, @REJECT={0x28, 'REJECT\x00', 0x0, {0x7}}}, {{@ipv6={@remote={0xfe, 0x80, [], 0xbb}, @remote={0xfe, 0x80, [], 0xbb}, [0xff000000, 0xffffffff, 0xffffff00, 0xff], [0xff, 0xffffffff, 0x0, 0xff000000], 'syzkaller1\x00', 'eql\x00', {}, {}, 0x62, 0x0, 0x4, 0x1}, 0x0, 0x120, 0x148, 0x0, {}, [@common=@frag={0x30, 'frag\x00', 0x0, {0x7ff, 0x7, 0x1, 0x2}}, @common=@hl={0x28, 'hl\x00', 0x0, {0x3, 0x7fff}}]}, @REJECT={0x28, 'REJECT\x00', 0x0, {0x7}}}, {{@ipv6={@dev={0xfe, 0x80, [], 0xc}, @loopback={0x0, 0x1}, [0xffffffff, 0xffffffff, 0xff000000, 0xff000000], [0xff, 0x0, 0xff, 0xffffff00], 'irlan0\x00', 'vcan0\x00', {0xff}, {}, 0x3b, 0xffffffffffffab69, 0x2, 0x30}, 0x0, 0x250, 0x298, 0x0, {}, [@common=@srh={0x30, 'srh\x00', 0x0, {0xbb, 0x1, 0x3, 0x6, 0xffffffffffffffc0, 0x80}}, @common=@inet=@policy={0x158, 'policy\x00', 0x0, {[{@ipv4, [0xffffffff, 0xff0000ff, 0xff000000, 0xffffffff], @ipv4=@multicast1=0xe0000001, [0xffffffff, 0xffffffff, 0xff000000, 0xffffff00], 0x4d5, 0x3500, 0x5c, 0x0, 0x10, 0xf}, {@ipv6=@dev={0xfe, 0x80, [], 0x11}, [0x0, 0xff000000, 0xff0000ff, 0xffffff00], @ipv4=@multicast1=0xe0000001, [0xffffffff, 0x0, 0x0, 0xffffffff], 0x4d5, 0x3500, 0x77, 0x1, 0x0, 0x1d}, {@ipv6=@mcast1={0xff, 0x1, [], 0x1}, [0xff000000, 0xffffffff, 0xffffff00, 0xff], @ipv4=@multicast2=0xe0000002, [0xffffffff, 0x0, 0xffffff00, 0xffffffff], 0x4d3, 0x3503, 0x7f, 0x0, 0x1, 0x19}, {@ipv4=@local={0xac, 0x14, 0x14, 0xaa}, [0x0, 0xff, 0x0, 0xff0000ff], @ipv6=@local={0xfe, 0x80, [], 0xaa}, [0xffffffff, 0xffffffff, 0xff, 0xff0000ff], 0x4d4, 0x3505, 0x0, 0x1, 0x0, 0x10}], 0x0, 0x3}}]}, @common=@unspec=@LED={0x48, 'LED\x00', 0x0, {'syz1\x00', 0x0, 0x8, 0x8}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28, '\x00', 0x0, 0xfffffffffffffffe}}}}, 0x600) socket(0x1, 0xa, 0x7) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_TIMER(r4, 0x40605346, &(0x7f0000000680)={0x1, 0x3, {0x3, 0x0, 0x9, 0x3}}) 2018/03/30 23:06:21 executing program 3: r0 = socket(0x40000000015, 0x5, 0x0) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000240), 0x4) bind$inet(r0, &(0x7f00008a5ff0)={0x2, 0x4e21, @loopback=0x7f000001}, 0x10) sendto$inet(r0, &(0x7f0000f7db7f)="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", 0x481, 0x0, &(0x7f000069affb)={0x2, 0x0, @loopback=0x7f000001}, 0x10) setsockopt$RDS_CONG_MONITOR(r0, 0x114, 0x6, &(0x7f0000000080)=0x1, 0x4) ioctl$int_in(r0, 0x5421, &(0x7f0000000040)=0x56d) sendto$inet(r0, &(0x7f00004b3fff), 0x0, 0x0, &(0x7f00002b4000)={0x2, 0x4e20, @loopback=0x7f000001}, 0x3f6) ioctl$sock_inet_tcp_SIOCOUTQ(r0, 0x5411, &(0x7f0000000000)) 2018/03/30 23:06:21 executing program 5: mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r0 = perf_event_open(&(0x7f0000223000)={0x2, 0x78, 0xe3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000001980)={{{@in6=@remote, @in=@multicast1}}, {{@in=@multicast2}, 0x0, @in=@multicast2}}, &(0x7f0000001a80)=0xe8) mount(&(0x7f00000003c0)='./file0\x00', &(0x7f0000000380)='./file0\x00', &(0x7f0000000300)='cgroup2\x00', 0x0, 0x0) getgid() r1 = syz_genetlink_get_family_id$ipvs(&(0x7f00000000c0)='IPVS\x00') sendmsg$IPVS_CMD_FLUSH(r0, &(0x7f0000000140)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x2800000}, 0xc, &(0x7f0000000100)={&(0x7f00000007c0)=ANY=[@ANYBLOB="0000000025ba889c9ca4dd3a8afefccb9b2943f612089e876c5d91a207aa041590e7e4324f698585ba225e28b042a1e68ff0e207b36ae5b3fab097388c7f489a52532102ac703e5be2d9b9de2006b35ed804772f221e4291ef836d19aec0a0baddf984424f1577bb3997fe3991f6c3499b7b9804c4c776ec6e2e15f124b86f5eb3bf43016fcb36f9bf72df69eb86d0cd853624ec30168b95ddd82f22ac39d9cc3d4229dfe7b559209cb08e13caa9c60f4e6a9ad9019379a49dd7acf592668f044ab04c8c70e1d4a4b0a00c8c73392d5e3cf28717b305f9ff", @ANYRES16=r1, @ANYBLOB="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"], 0xe8}, 0x1, 0x0, 0x0, 0x40000}, 0x0) r2 = dup2(r0, r0) sendmsg$IPVS_CMD_DEL_DAEMON(r2, &(0x7f0000000240)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f0000000200)={&(0x7f0000000400)=ANY=[@ANYBLOB="14110000", @ANYRES16=r1, @ANYBLOB="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"], 0x114}, 0x1, 0x0, 0x0, 0x40000}, 0x0) r3 = open$dir(&(0x7f000001bff4)='./file0\x00', 0x0, 0x0) mkdirat(0xffffffffffffffff, &(0x7f0000000280)='./file0\x00', 0x20) unlinkat(r3, &(0x7f0000000080)='./file0\x00', 0x200) 2018/03/30 23:06:21 executing program 7: perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f00000000c0)='./control\x00', 0x0) r0 = inotify_init() inotify_add_watch(r0, &(0x7f0000f1eff6)='./control\x00', 0x220000000009) pivot_root(&(0x7f0000000040)='./control\x00', &(0x7f0000000100)='./control\x00') r1 = inotify_init1(0x0) inotify_add_watch(r1, &(0x7f000001eff6)='./control\x00', 0x2000200) setsockopt$inet6_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, &(0x7f0000000080)="5fce869db66fa225921ad03d773be4ff", 0x10) rmdir(&(0x7f000075aff6)='./control\x00') [ 330.000618] kernel msg: ebtables bug: please report to author: entries_size too small [ 330.140764] FAULT_INJECTION: forcing a failure. [ 330.140764] name failslab, interval 1, probability 0, space 0, times 0 [ 330.152090] CPU: 1 PID: 26109 Comm: syz-executor0 Not tainted 4.16.0-rc7+ #372 [ 330.159451] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 330.168803] Call Trace: [ 330.171397] dump_stack+0x194/0x24d [ 330.175032] ? arch_local_irq_restore+0x53/0x53 [ 330.179715] should_fail+0x8c0/0xa40 [ 330.183428] ? __save_stack_trace+0x7e/0xd0 [ 330.187755] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 330.192868] ? save_stack+0xa3/0xd0 [ 330.196500] ? save_stack+0x43/0xd0 [ 330.200126] ? find_held_lock+0x35/0x1d0 [ 330.204173] ? __lock_is_held+0xb6/0x140 [ 330.208219] ? check_same_owner+0x320/0x320 [ 330.212525] ? rcu_note_context_switch+0x710/0x710 [ 330.217442] should_failslab+0xec/0x120 [ 330.221395] __kmalloc+0x63/0x760 [ 330.224828] ? sched_create_group+0x22/0x70 [ 330.229128] ? kzalloc+0xf/0x20 [ 330.232382] kzalloc+0xf/0x20 [ 330.235463] alloc_fair_sched_group+0x5e/0x530 [ 330.240031] ? __lock_is_held+0xb6/0x140 [ 330.244075] sched_create_group+0x35/0x70 [ 330.248204] cpu_cgroup_css_alloc+0xe/0x30 [ 330.252417] cgroup_apply_control_enable+0x44d/0xbc0 [ 330.257501] ? cgroup_propagate_control+0x570/0x570 [ 330.262497] ? css_populate_dir+0x289/0x420 [ 330.266801] cgroup_mkdir+0x56f/0xfc0 [ 330.270585] ? __lock_is_held+0xb6/0x140 [ 330.274636] ? cgroup_destroy_locked+0x750/0x750 [ 330.279371] ? rcu_read_lock_sched_held+0x108/0x120 [ 330.284362] ? kmem_cache_free+0x258/0x2a0 [ 330.288585] ? set_nlink+0xc1/0x160 [ 330.292198] ? debug_lockdep_rcu_enabled+0x77/0x90 [ 330.297104] ? generic_permission+0x105/0x3c0 [ 330.301586] ? cgroup_destroy_locked+0x750/0x750 [ 330.306319] kernfs_iop_mkdir+0x153/0x1e0 [ 330.310444] vfs_mkdir+0x390/0x600 [ 330.313963] SyS_mkdirat+0x22b/0x2b0 [ 330.317657] ? SyS_mknod+0x480/0x480 [ 330.321350] ? trace_hardirqs_on+0xd/0x10 [ 330.325473] ? do_syscall_64+0xb7/0x940 [ 330.329432] ? SyS_mknod+0x480/0x480 [ 330.333125] do_syscall_64+0x281/0x940 [ 330.336996] ? vmalloc_sync_all+0x30/0x30 [ 330.341131] ? _raw_spin_unlock_irq+0x27/0x70 [ 330.345603] ? finish_task_switch+0x1c1/0x7e0 [ 330.350075] ? syscall_return_slowpath+0x550/0x550 [ 330.354980] ? syscall_return_slowpath+0x2ac/0x550 [ 330.359895] ? prepare_exit_to_usermode+0x350/0x350 [ 330.364904] ? entry_SYSCALL_64_after_hwframe+0x52/0xb7 [ 330.370254] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 330.375089] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 330.380261] RIP: 0033:0x454e79 [ 330.383426] RSP: 002b:00007f016b92fc68 EFLAGS: 00000246 ORIG_RAX: 0000000000000102 [ 330.391113] RAX: ffffffffffffffda RBX: 00007f016b9306d4 RCX: 0000000000454e79 [ 330.398366] RDX: 0000000000000020 RSI: 0000000020000280 RDI: 0000000000000015 [ 330.405610] RBP: 000000000072bea0 R08: 0000000000000000 R09: 0000000000000000 [ 330.412867] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000016 [ 330.420111] R13: 00000000000003eb R14: 00000000006f7ea8 R15: 000000000000001c 2018/03/30 23:06:22 executing program 3: r0 = socket(0x40000000015, 0x5, 0x0) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000240), 0x4) bind$inet(r0, &(0x7f00008a5ff0)={0x2, 0x4e21, @loopback=0x7f000001}, 0x10) sendto$inet(r0, &(0x7f0000f7db7f)="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", 0x481, 0x0, &(0x7f000069affb)={0x2, 0x4e20, @loopback=0x7f000001}, 0x10) setsockopt$RDS_CONG_MONITOR(0xffffffffffffffff, 0x114, 0x6, &(0x7f0000000080)=0x1, 0x4) ioctl$int_in(r0, 0x5421, &(0x7f0000000040)=0x56d) sendto$inet(r0, &(0x7f00004b3fff), 0x0, 0x0, &(0x7f00002b4000)={0x2, 0x4e20, @loopback=0x7f000001}, 0x3f6) ioctl$sock_inet_tcp_SIOCOUTQ(r0, 0x5411, &(0x7f0000000000)) 2018/03/30 23:06:22 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x200, 0x0) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000680)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$sock_linger(r2, 0x1, 0xd, &(0x7f00000006c0)={0x400, 0x9}, 0x8) perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x0, 0x0) r3 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) mmap(&(0x7f0000000000/0x9d7000)=nil, 0x9d7000, 0x0, 0x10, 0xffffffffffffffff, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x7) perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r4 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r4, &(0x7f0000e5b000)={0x2, 0x4e20, @multicast1=0xe0000001}, 0x10) syz_open_dev$sg(&(0x7f0000000440)='/dev/sg#\x00', 0x0, 0x0) connect$inet(r4, &(0x7f0000000100)={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x11}}, 0x10) r5 = bpf$PROG_LOAD(0x5, &(0x7f0000eb0fb8)={0x1, 0x3, &(0x7f00009ff000)=@framed={{0x18}, [], {0x95}}, &(0x7f00002bf000)='syzkaller\x00', 0x4, 0xb7, &(0x7f00006ab000)=""/183}, 0x48) setsockopt$inet_tcp_int(r4, 0x6, 0x19, &(0x7f0000000240)=0x8, 0x4) r6 = socket$kcm(0x29, 0x2, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r6, 0x89e0, &(0x7f000031aff8)={r4, r5}) ioctl$sock_kcm_SIOCKCMCLONE(r6, 0x89e2, &(0x7f00000002c0)={0xffffffffffffffff}) sendmsg$nl_xfrm(r7, &(0x7f0000000780)={&(0x7f0000000200)={0x10}, 0xc, &(0x7f0000000740)={&(0x7f0000000480)=@updpolicy={0xb8, 0x19, 0x0, 0x0, 0x0, {{@in=@loopback=0x7f000001, @in6=@mcast1={0xff, 0x1, [], 0x1}}}}, 0xffcb}, 0x1}, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(r7, 0x89e1, &(0x7f0000000040)={r4}) r8 = fcntl$getown(r3, 0x9) recvfrom$inet6(0xffffffffffffffff, &(0x7f0000000140)=""/177, 0xb1, 0x40000000, &(0x7f0000000080)={0xa, 0x4e23, 0x9, @empty, 0xe38}, 0x1c) r9 = accept4$inet(0xffffffffffffff9c, &(0x7f0000000700)={0x0, 0x0, @broadcast}, &(0x7f0000000740)=0x10, 0x80000) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r9, 0x84, 0x64, &(0x7f0000000780)=[@in6={0xa, 0x4e22, 0xfffffffffffff7e1, @mcast2={0xff, 0x2, [], 0x1}, 0x8}, @in={0x2, 0x4e24, @broadcast=0xffffffff}], 0x2c) ptrace$setregset(0x4205, r8, 0x0, &(0x7f00000005c0)={&(0x7f0000000080)}) ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r10 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x1fffd, 0x0) r11 = syz_open_dev$sndtimer(&(0x7f00000000c0)='/dev/snd/timer\x00', 0x0, 0x0) read(r11, &(0x7f0000ec6000)=""/50, 0x32) fcntl$dupfd(r11, 0x0, r10) 2018/03/30 23:06:22 executing program 6: pipe(&(0x7f0000000940)={0xffffffffffffffff, 0xffffffffffffffff}) accept4$ax25(r0, 0x0, &(0x7f0000000080), 0x80000) r1 = socket$inet(0x2, 0x20000000000003, 0x2) connect$inet(r1, &(0x7f0000000000)={0x2, 0x0, @remote={0xac, 0x14, 0x14, 0xbb}}, 0x10) sendmsg(0xffffffffffffffff, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000140), 0x0, &(0x7f0000000180)=ANY=[]}, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000980)=@broute={'broute\x00', 0x20, 0x3, 0x2d9, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000380], 0x0, &(0x7f00000002c0), &(0x7f0000001000)=ANY=[@ANYBLOB="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"]}, 0x351) setsockopt$inet_int(r1, 0x0, 0x2, &(0x7f00000000c0)=0x7fffffff, 0x4) r2 = socket$rds(0x15, 0x5, 0x0) pipe(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$bt_BT_DEFER_SETUP(r3, 0x112, 0x7, &(0x7f0000000280)=0x100, 0x4) accept$packet(r4, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @remote}, &(0x7f0000000100)=0x14) connect$rds(r2, &(0x7f0000000140)={0x2, 0x4e22, @remote={0xac, 0x14, 0x14, 0xbb}}, 0x10) getsockopt$sock_buf(r2, 0x1, 0x3b, &(0x7f0000000180)=""/83, &(0x7f0000000200)=0x53) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000a00)=@filter={'filter\x00', 0xe, 0x4, 0x5a0, 0xffffffff, 0x0, 0xf0, 0xf0, 0xffffffff, 0xffffffff, 0x4d0, 0x4d0, 0x4d0, 0xffffffff, 0x4, &(0x7f0000000300), {[{{@ipv6={@ipv4={[], [0xff, 0xff], @rand_addr=0x80000001}, @dev={0xfe, 0x80, [], 0x16}, [0x0, 0xffffff00, 0xff, 0xffffffff], [0x0, 0xff000000, 0xffffffff], 'ipddp0\x00', 'ip_vti0\x00', {}, {0xff}, 0x6c, 0x2bf}, 0x0, 0xc8, 0xf0}, @REJECT={0x28, 'REJECT\x00', 0x0, {0x7}}}, {{@ipv6={@remote={0xfe, 0x80, [], 0xbb}, @remote={0xfe, 0x80, [], 0xbb}, [0xff000000, 0xffffffff, 0xffffff00, 0xff], [0xff, 0xffffffff, 0x0, 0xff000000], 'syzkaller1\x00', 'eql\x00', {}, {}, 0x62, 0x0, 0x4, 0x1}, 0x0, 0x120, 0x148, 0x0, {}, [@common=@frag={0x30, 'frag\x00', 0x0, {0x7ff, 0x7, 0x1, 0x2}}, @common=@hl={0x28, 'hl\x00', 0x0, {0x3, 0x7fff}}]}, @REJECT={0x28, 'REJECT\x00', 0x0, {0x7}}}, {{@ipv6={@dev={0xfe, 0x80, [], 0xc}, @loopback={0x0, 0x1}, [0xffffffff, 0xffffffff, 0xff000000, 0xff000000], [0xff, 0x0, 0xff, 0xffffff00], 'irlan0\x00', 'vcan0\x00', {0xff}, {}, 0x3b, 0xffffffffffffab69, 0x2, 0x30}, 0x0, 0x250, 0x298, 0x0, {}, [@common=@srh={0x30, 'srh\x00', 0x0, {0xbb, 0x1, 0x3, 0x6, 0xffffffffffffffc0, 0x80}}, @common=@inet=@policy={0x158, 'policy\x00', 0x0, {[{@ipv4, [0xffffffff, 0xff0000ff, 0xff000000, 0xffffffff], @ipv4=@multicast1=0xe0000001, [0xffffffff, 0xffffffff, 0xff000000, 0xffffff00], 0x4d5, 0x3500, 0x5c, 0x0, 0x10, 0xf}, {@ipv6=@dev={0xfe, 0x80, [], 0x11}, [0x0, 0xff000000, 0xff0000ff, 0xffffff00], @ipv4=@multicast1=0xe0000001, [0xffffffff, 0x0, 0x0, 0xffffffff], 0x4d5, 0x3500, 0x77, 0x1, 0x0, 0x1d}, {@ipv6=@mcast1={0xff, 0x1, [], 0x1}, [0xff000000, 0xffffffff, 0xffffff00, 0xff], @ipv4=@multicast2=0xe0000002, [0xffffffff, 0x0, 0xffffff00, 0xffffffff], 0x4d3, 0x3503, 0x7f, 0x0, 0x1, 0x19}, {@ipv4=@local={0xac, 0x14, 0x14, 0xaa}, [0x0, 0xff, 0x0, 0xff0000ff], @ipv6=@local={0xfe, 0x80, [], 0xaa}, [0xffffffff, 0xffffffff, 0xff, 0xff0000ff], 0x4d4, 0x3505, 0x0, 0x1, 0x0, 0x10}], 0x0, 0x3}}]}, @common=@unspec=@LED={0x48, 'LED\x00', 0x0, {'syz1\x00', 0x0, 0x8, 0x8}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28, '\x00', 0x0, 0xfffffffffffffffe}}}}, 0x600) socket(0x1, 0xa, 0x7) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_TIMER(r4, 0x40605346, &(0x7f0000000680)={0x1, 0x3, {0x3, 0x0, 0x9, 0x3}}) 2018/03/30 23:06:22 executing program 2: socket$inet_sctp(0x2, 0x0, 0x84) write$rdma_cm(0xffffffffffffffff, &(0x7f00000000c0)=ANY=[@ANYBLOB], 0x0) write$rdma_cm(0xffffffffffffffff, &(0x7f00000003c0)=ANY=[@ANYBLOB="031a4f2f7f000000dde30000000000000000000000000000000000000000000100005dd45591dac827000000ff01000000000000000000000000000000000000"], 0x40) write$rdma_cm(0xffffffffffffffff, &(0x7f0000000440)=@resolve_ip={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x1, [], 0x1}}, {0xa, 0x0, 0x0, @mcast1={0xff, 0x1, [], 0x1}}}}, 0x48) creat(&(0x7f0000000140)='./file0\x00', 0x8) socketpair(0x3, 0x0, 0xfffffffffffffff7, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) perf_event_open(&(0x7f000001d000)={0x2, 0x78, 0xe2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) getsockname$packet(r0, &(0x7f00000000c0)={0x0, 0x0, 0x0}, &(0x7f0000000100)=0x14) connect$can_bcm(r0, &(0x7f0000000280)={0x1d, r2}, 0x10) setsockopt$inet6_int(r1, 0x29, 0xc8, &(0x7f00008d6000), 0x4) openat$kvm(0xffffffffffffff9c, &(0x7f0000264ff7)='/dev/kvm\x00', 0x0, 0x0) setsockopt$inet6_int(r1, 0x29, 0xc8, &(0x7f0000ac5000), 0x4) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000000)={@remote, @loopback}, &(0x7f0000000080)=0xc) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000200)=0x0) sigaltstack(&(0x7f0000ffd000/0x1000)=nil, &(0x7f00000003c0)) llistxattr(&(0x7f0000000040)='./file0\x00', &(0x7f0000000180)=""/79, 0x4f) perf_event_open(&(0x7f0000000300)={0x7, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0xc80, 0x0, 0x0, 0x0, 0x401, 0x3a}, r3, 0x8, 0xffffffffffffffff, 0x0) 2018/03/30 23:06:22 executing program 4: mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount(&(0x7f000000a000)='./file0\x00', &(0x7f0000026ff8)='./file0\x00', &(0x7f000000c000)='ramfs\x00', 0x0, &(0x7f000000a000)) mkdir(&(0x7f0000000000)='./file1\x00', 0x0) mount(&(0x7f0000000040)='./file0\x00', &(0x7f0000903000)='./file0\x00', &(0x7f0000811ffa)='bdev\x00', 0x100000, &(0x7f00000003c0)="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") r0 = dup(0xffffffffffffffff) ioctl$sock_SIOCGPGRP(r0, 0x8904, &(0x7f00000002c0)=0x0) r2 = fcntl$getown(r0, 0x9) rt_tgsigqueueinfo(r1, r2, 0x25, &(0x7f0000000300)={0x3f, 0x1000, 0x8, 0x8}) r3 = syz_open_dev$vcsn(&(0x7f00000000c0)='/dev/vcs#\x00', 0x2, 0x20800) renameat(r0, &(0x7f0000000080)='./file1/file0\x00', r3, &(0x7f0000000100)='./file1\x00') clock_gettime(0x0, &(0x7f0000000240)={0x0, 0x0}) futimesat(r3, &(0x7f0000000140)='./file0\x00', &(0x7f0000000280)={{r4, r5/1000+10000}, {0x0, 0x2710}}) mount(&(0x7f0000fb6000)='./file0\x00', &(0x7f0000d78000)='.', &(0x7f0000fdb000)='ubifs\x00', 0x1003, 0x0) mount(&(0x7f00002b9ff8)='./file0\x00', &(0x7f0000cbeff8)='./file0\x00', &(0x7f00005f7ffa)='ramfs\x00', 0x80000, &(0x7f000002f000)) syz_open_pts(r0, 0x1) mount(&(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)='./file1\x00', &(0x7f0000000200)='anon_inodefs\x00', 0x2000, &(0x7f0000000240)) mount(&(0x7f0000adcff8)='./file0\x00', &(0x7f0000e08fff)='.', &(0x7f00005e9000)='cifs\x00', 0x2000, &(0x7f0000ad5000)) 2018/03/30 23:06:22 executing program 7: perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f00000000c0)='./control\x00', 0x880) mount(&(0x7f0000000040)='./control\x00', &(0x7f00000001c0)='./control\x00', &(0x7f0000000200)='coda\x00', 0x6002, &(0x7f0000000240)="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") syz_open_dev$adsp(&(0x7f0000000100)='/dev/adsp#\x00', 0xf2f4, 0x383000) openat$hwrng(0xffffffffffffff9c, &(0x7f0000001240)='/dev/hwrng\x00', 0x0, 0x0) openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000001280)='/dev/qat_adf_ctl\x00', 0x600800, 0x0) syz_open_dev$sndpcmc(&(0x7f00000012c0)='/dev/snd/pcmC#D#c\x00', 0x5, 0x100) syz_open_dev$dspn(&(0x7f0000001300)='/dev/dsp#\x00', 0x2b109cb8, 0x800) openat$ipvs(0xffffffffffffff9c, &(0x7f0000001340)='/proc/sys/net/ipv4/vs/sync_version\x00', 0x2, 0x0) creat(&(0x7f0000001380)='./control\x00', 0x80) openat$ipvs(0xffffffffffffff9c, &(0x7f00000013c0)='/proc/sys/net/ipv4/vs/sync_persist_mode\x00', 0x2, 0x0) accept(0xffffffffffffff9c, &(0x7f0000001400)=@ax25, &(0x7f0000001480)=0x80) memfd_create(&(0x7f00000014c0)='/dev/hwrng\x00', 0x0) r0 = syz_open_dev$sndpcmc(&(0x7f0000001500)='/dev/snd/pcmC#D#c\x00', 0x4, 0x100) accept$alg(r0, 0x0, 0x0) r1 = inotify_init() r2 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000180)='/dev/hwrng\x00', 0x2, 0x0) ioctl$DRM_IOCTL_IRQ_BUSID(r2, 0xc0106403, &(0x7f0000000140)={0x8, 0x2, 0x6, 0x72d0}) inotify_add_watch(r2, &(0x7f0000f1eff6)='./control\x00', 0x1) r3 = inotify_init1(0x0) inotify_add_watch(r3, &(0x7f000001eff6)='./control\x00', 0x2000200) setsockopt$inet6_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, &(0x7f0000000080)="5fce86000caa03bdb471a1f1a23be4ff", 0x10) rmdir(&(0x7f000075aff6)='./control\x00') fcntl$addseals(r1, 0x409, 0x1) 2018/03/30 23:06:22 executing program 5: mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) perf_event_open(&(0x7f0000223000)={0x2, 0x78, 0xe3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000001980)={{{@in6=@remote, @in=@multicast1}}, {{@in=@multicast2}, 0x0, @in=@multicast2}}, &(0x7f0000001a80)=0xe8) mount(&(0x7f00000003c0)='./file0\x00', &(0x7f0000000380)='./file0\x00', &(0x7f0000000300)='cgroup2\x00', 0x0, 0x0) r0 = open$dir(&(0x7f000001bff4)='./file0\x00', 0x0, 0x0) mkdirat(0xffffffffffffffff, &(0x7f0000000280)='./file0\x00', 0x20) unlinkat(r0, &(0x7f0000000080)='./file0\x00', 0x200) readahead(r0, 0x6, 0x2) 2018/03/30 23:06:22 executing program 0 (fault-call:7 fault-nth:29): mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r0 = syz_open_dev$usbmon(&(0x7f0000000400)='/dev/usbmon#\x00', 0x0, 0x0) r1 = perf_event_open(&(0x7f0000223000)={0x2, 0x78, 0xe3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000001980)={{{@in6=@remote, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast2}, 0x0, @in=@multicast2}}, &(0x7f0000001a80)=0xe8) chown(&(0x7f00000004c0)='./file0\x00', r2, 0x0) mount(&(0x7f00000003c0)='./file0\x00', &(0x7f0000000380)='./file0\x00', &(0x7f0000000300)='cgroup2\x00', 0x0, 0x0) r3 = open$dir(&(0x7f000001bff4)='./file0\x00', 0x0, 0x0) mkdirat(r3, &(0x7f0000000280)='./file0\x00', 0x20) getdents64(r3, &(0x7f00000007c0)=""/250, 0x1015a) dup3(r0, r1, 0x80000) r4 = open$dir(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) renameat2(r4, &(0x7f0000000200)='./file1\x00', 0xffffffffffffffff, &(0x7f0000000240)='./file0\x00', 0xfd1092750066ec78) ioctl$KDGKBMODE(0xffffffffffffffff, 0x4b44, &(0x7f0000000140)) [ 330.661216] kernel msg: ebtables bug: please report to author: entries_size too small 2018/03/30 23:06:22 executing program 6: pipe(&(0x7f0000000940)={0xffffffffffffffff, 0xffffffffffffffff}) accept4$ax25(r0, 0x0, &(0x7f0000000080), 0x80000) r1 = socket$inet(0x2, 0x20000000000003, 0x2) connect$inet(r1, &(0x7f0000000000)={0x2, 0x0, @remote={0xac, 0x14, 0x14, 0xbb}}, 0x10) sendmsg(0xffffffffffffffff, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000140), 0x0, &(0x7f0000000180)=ANY=[]}, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000980)=@broute={'broute\x00', 0x20, 0x3, 0x2d9, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000380], 0x0, &(0x7f00000002c0), &(0x7f0000001000)=ANY=[@ANYBLOB="00000000000000000000000000000000000000000000000000000000000000000000000000000000feffffff0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000ffffffff010000000b00000008000000600469666230000000000000000000000000736974300000000000000000000000007663616e300000000000000000000000626f6e643000000000000000000000000180c200000e00ffff00ffffaaaaaaaaaaaaffffff0000ff000008010000d001000048020000706879736465760000000000000000000000000000000000000000000000000070000000000000006e723000000000000000000000000000000000000000000000000000000000000000000000000000000000000000766c616e300000003a9c4ebb9f24dc06a52c000000000000000000000000000000000000000000ff0000000000000000000000000000000101000000000000000000000000000000000000004c45440000000000000000000000000000000000000000000000000000000000280000000000000073797a310000000000000000000000000000000000000000000000004000000000000000000000004e464c4f470000000000000000000000000000000000000000000000000000005000000000000000000000000000000000000000692ef8a72c6779a914df06a44b35b0eafd833141b590148ad8c2d17b06e81aa50bc466307f618025cda16029da79ca01cd7bf2fa8433c6000000004e464c4f470000000000000000000000000000000000000000000000000000005000000000000000000000000000000000000000f7040c3bd532a607b6540847e9980255ac80a05048ee3c578fd00c809822ab1ff7d12707561fdd7b1bcbd7c428bd7449152a676a0e0fc0823ebe89b10758fffe5c92f48f0000000000000000000000000000000000000000000000000000000000000000000000000000000001000000fcffffff"]}, 0x351) setsockopt$inet_int(r1, 0x0, 0x2, &(0x7f00000000c0)=0x7fffffff, 0x4) r2 = socket$rds(0x15, 0x5, 0x0) pipe(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$bt_BT_DEFER_SETUP(r3, 0x112, 0x7, &(0x7f0000000280)=0x100, 0x4) accept$packet(r4, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @remote}, &(0x7f0000000100)=0x14) connect$rds(r2, &(0x7f0000000140)={0x2, 0x4e22, @remote={0xac, 0x14, 0x14, 0xbb}}, 0x10) getsockopt$sock_buf(r2, 0x1, 0x3b, &(0x7f0000000180)=""/83, &(0x7f0000000200)=0x53) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000a00)=@filter={'filter\x00', 0xe, 0x4, 0x5a0, 0xffffffff, 0x0, 0xf0, 0xf0, 0xffffffff, 0xffffffff, 0x4d0, 0x4d0, 0x4d0, 0xffffffff, 0x4, &(0x7f0000000300), {[{{@ipv6={@ipv4={[], [0xff, 0xff], @rand_addr=0x80000001}, @dev={0xfe, 0x80, [], 0x16}, [0x0, 0xffffff00, 0xff, 0xffffffff], [0x0, 0xff000000, 0xffffffff], 'ipddp0\x00', 'ip_vti0\x00', {}, {0xff}, 0x6c, 0x2bf}, 0x0, 0xc8, 0xf0}, @REJECT={0x28, 'REJECT\x00', 0x0, {0x7}}}, {{@ipv6={@remote={0xfe, 0x80, [], 0xbb}, @remote={0xfe, 0x80, [], 0xbb}, [0xff000000, 0xffffffff, 0xffffff00, 0xff], [0xff, 0xffffffff, 0x0, 0xff000000], 'syzkaller1\x00', 'eql\x00', {}, {}, 0x62, 0x0, 0x4, 0x1}, 0x0, 0x120, 0x148, 0x0, {}, [@common=@frag={0x30, 'frag\x00', 0x0, {0x7ff, 0x7, 0x1, 0x2}}, @common=@hl={0x28, 'hl\x00', 0x0, {0x3, 0x7fff}}]}, @REJECT={0x28, 'REJECT\x00', 0x0, {0x7}}}, {{@ipv6={@dev={0xfe, 0x80, [], 0xc}, @loopback={0x0, 0x1}, [0xffffffff, 0xffffffff, 0xff000000, 0xff000000], [0xff, 0x0, 0xff, 0xffffff00], 'irlan0\x00', 'vcan0\x00', {0xff}, {}, 0x3b, 0xffffffffffffab69, 0x2, 0x30}, 0x0, 0x250, 0x298, 0x0, {}, [@common=@srh={0x30, 'srh\x00', 0x0, {0xbb, 0x1, 0x3, 0x6, 0xffffffffffffffc0, 0x80}}, @common=@inet=@policy={0x158, 'policy\x00', 0x0, {[{@ipv4, [0xffffffff, 0xff0000ff, 0xff000000, 0xffffffff], @ipv4=@multicast1=0xe0000001, [0xffffffff, 0xffffffff, 0xff000000, 0xffffff00], 0x4d5, 0x3500, 0x5c, 0x0, 0x10, 0xf}, {@ipv6=@dev={0xfe, 0x80, [], 0x11}, [0x0, 0xff000000, 0xff0000ff, 0xffffff00], @ipv4=@multicast1=0xe0000001, [0xffffffff, 0x0, 0x0, 0xffffffff], 0x4d5, 0x3500, 0x77, 0x1, 0x0, 0x1d}, {@ipv6=@mcast1={0xff, 0x1, [], 0x1}, [0xff000000, 0xffffffff, 0xffffff00, 0xff], @ipv4=@multicast2=0xe0000002, [0xffffffff, 0x0, 0xffffff00, 0xffffffff], 0x4d3, 0x3503, 0x7f, 0x0, 0x1, 0x19}, {@ipv4=@local={0xac, 0x14, 0x14, 0xaa}, [0x0, 0xff, 0x0, 0xff0000ff], @ipv6=@local={0xfe, 0x80, [], 0xaa}, [0xffffffff, 0xffffffff, 0xff, 0xff0000ff], 0x4d4, 0x3505, 0x0, 0x1, 0x0, 0x10}], 0x0, 0x3}}]}, @common=@unspec=@LED={0x48, 'LED\x00', 0x0, {'syz1\x00', 0x0, 0x8, 0x8}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28, '\x00', 0x0, 0xfffffffffffffffe}}}}, 0x600) socket(0x1, 0xa, 0x7) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_TIMER(r4, 0x40605346, &(0x7f0000000680)={0x1, 0x3, {0x3, 0x0, 0x9, 0x3}}) 2018/03/30 23:06:22 executing program 3: r0 = socket(0x40000000015, 0x5, 0x0) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000240), 0x4) bind$inet(r0, &(0x7f00008a5ff0)={0x2, 0x4e21, @loopback=0x7f000001}, 0x10) sendto$inet(r0, &(0x7f0000f7db7f)="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", 0x481, 0x0, &(0x7f000069affb)={0x2, 0x4e20, @loopback=0x7f000001}, 0x10) setsockopt$RDS_CONG_MONITOR(0xffffffffffffffff, 0x114, 0x6, &(0x7f0000000080)=0x1, 0x4) ioctl$int_in(r0, 0x5421, &(0x7f0000000040)=0x56d) sendto$inet(r0, &(0x7f00004b3fff), 0x0, 0x0, &(0x7f00002b4000)={0x2, 0x4e20, @loopback=0x7f000001}, 0x3f6) ioctl$sock_inet_tcp_SIOCOUTQ(r0, 0x5411, &(0x7f0000000000)) [ 330.757018] FAULT_INJECTION: forcing a failure. [ 330.757018] name failslab, interval 1, probability 0, space 0, times 0 [ 330.768406] CPU: 0 PID: 26132 Comm: syz-executor0 Not tainted 4.16.0-rc7+ #372 [ 330.775777] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 330.785139] Call Trace: [ 330.787748] dump_stack+0x194/0x24d [ 330.791395] ? arch_local_irq_restore+0x53/0x53 [ 330.796099] should_fail+0x8c0/0xa40 [ 330.799826] ? __save_stack_trace+0x7e/0xd0 2018/03/30 23:06:22 executing program 5: mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) perf_event_open(&(0x7f0000223000)={0x2, 0x70, 0xe3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x10000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x7, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x208}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000001980)={{{@in6=@remote, @in=@multicast1}}, {{@in=@multicast2}, 0x0, @in=@multicast2}}, &(0x7f0000001a80)=0xe8) mount(&(0x7f00000003c0)='./file0\x00', &(0x7f0000000380)='./file0\x00', &(0x7f0000000300)='cgroup2\x00', 0x0, 0x0) r0 = open$dir(&(0x7f000001bff4)='./file0\x00', 0x0, 0x0) mkdirat(0xffffffffffffffff, &(0x7f0000000280)='./file0\x00', 0x20) unlinkat(r0, &(0x7f0000000080)='./file0\x00', 0x200) 2018/03/30 23:06:22 executing program 3: r0 = socket(0x40000000015, 0x5, 0x0) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000240), 0x4) bind$inet(r0, &(0x7f00008a5ff0)={0x2, 0x4e21, @loopback=0x7f000001}, 0x10) sendto$inet(r0, &(0x7f0000f7db7f)="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", 0x481, 0x0, &(0x7f000069affb)={0x2, 0x4e20, @loopback=0x7f000001}, 0x10) setsockopt$RDS_CONG_MONITOR(0xffffffffffffffff, 0x114, 0x6, &(0x7f0000000080)=0x1, 0x4) ioctl$int_in(r0, 0x5421, &(0x7f0000000040)=0x56d) sendto$inet(r0, &(0x7f00004b3fff), 0x0, 0x0, &(0x7f00002b4000)={0x2, 0x4e20, @loopback=0x7f000001}, 0x3f6) ioctl$sock_inet_tcp_SIOCOUTQ(r0, 0x5411, &(0x7f0000000000)) [ 330.804169] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 330.809303] ? save_stack+0xa3/0xd0 [ 330.812947] ? save_stack+0x43/0xd0 [ 330.816591] ? find_held_lock+0x35/0x1d0 [ 330.820669] ? __lock_is_held+0xb6/0x140 [ 330.824766] ? check_same_owner+0x320/0x320 [ 330.829100] ? kmem_cache_alloc+0x4e9/0x760 [ 330.833452] ? rcu_note_context_switch+0x710/0x710 [ 330.838413] should_failslab+0xec/0x120 [ 330.842404] __kmalloc+0x63/0x760 [ 330.846667] ? sched_create_group+0x22/0x70 [ 330.851014] ? kzalloc+0xf/0x20 [ 330.854322] kzalloc+0xf/0x20 2018/03/30 23:06:22 executing program 7: perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f00000000c0)='./control\x00', 0x0) r0 = inotify_init() inotify_add_watch(r0, &(0x7f0000f1eff6)='./control\x00', 0x220000000009) r1 = inotify_init1(0x0) inotify_add_watch(r1, &(0x7f000001eff6)='./control\x00', 0x2000200) setsockopt$inet6_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, &(0x7f0000000080)="5fce869db66fa225921ad03d773be4ff", 0x10) r2 = syz_open_dev$vcsa(&(0x7f0000000040)='/dev/vcsa#\x00', 0xde8e, 0x200000) getpeername$llc(r2, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @broadcast}, &(0x7f0000000140)=0x10) rmdir(&(0x7f000075aff6)='./control\x00') 2018/03/30 23:06:22 executing program 4: mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount(&(0x7f000000a000)='./file0\x00', &(0x7f0000026ff8)='./file0\x00', &(0x7f000000c000)='ramfs\x00', 0x0, &(0x7f000000a000)) mkdir(&(0x7f0000000000)='./file1\x00', 0x0) mount(&(0x7f0000000040)='./file0\x00', &(0x7f0000903000)='./file0\x00', &(0x7f0000811ffa)='bdev\x00', 0x100000, &(0x7f00000003c0)="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") r0 = dup(0xffffffffffffffff) r1 = syz_open_dev$vcsn(&(0x7f00000000c0)='/dev/vcs#\x00', 0x8, 0x20804) renameat(r0, &(0x7f0000000080)='./file1/file0\x00', r1, &(0x7f0000000100)='./file1\x00') mount(&(0x7f0000fb6000)='./file0\x00', &(0x7f0000d78000)='.', &(0x7f0000fdb000)='ubifs\x00', 0x1003, 0x0) mount(&(0x7f00002b9ff8)='./file0\x00', &(0x7f0000cbeff8)='./file0\x00', &(0x7f00005f7ffa)='ramfs\x00', 0x80000, &(0x7f000002f000)) mount(&(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)='./file1\x00', &(0x7f0000000200)='anon_inodefs\x00', 0x2000, &(0x7f0000000240)) mount(&(0x7f0000adcff8)='./file0\x00', &(0x7f0000000140)='./file1/file0\x00', &(0x7f00005e9000)='cifs\x00', 0x1ffc, &(0x7f0000000240)) [ 330.857453] alloc_fair_sched_group+0x5e/0x530 [ 330.862062] sched_create_group+0x35/0x70 [ 330.866230] cpu_cgroup_css_alloc+0xe/0x30 [ 330.870481] cgroup_apply_control_enable+0x44d/0xbc0 [ 330.875622] ? cgroup_propagate_control+0x570/0x570 [ 330.880671] ? css_populate_dir+0x289/0x420 [ 330.885007] cgroup_mkdir+0x56f/0xfc0 [ 330.888804] ? __lock_is_held+0xb6/0x140 [ 330.892865] ? cgroup_destroy_locked+0x750/0x750 [ 330.897611] ? rcu_read_lock_sched_held+0x108/0x120 [ 330.902626] ? kmem_cache_free+0x258/0x2a0 [ 330.906858] ? set_nlink+0xc1/0x160 [ 330.910481] ? debug_lockdep_rcu_enabled+0x77/0x90 [ 330.915405] ? generic_permission+0x105/0x3c0 [ 330.919913] ? cgroup_destroy_locked+0x750/0x750 [ 330.924668] kernfs_iop_mkdir+0x153/0x1e0 [ 330.928807] vfs_mkdir+0x390/0x600 [ 330.932344] SyS_mkdirat+0x22b/0x2b0 [ 330.936050] ? SyS_mknod+0x480/0x480 [ 330.939755] ? trace_hardirqs_on+0xd/0x10 [ 330.943897] ? do_syscall_64+0xb7/0x940 [ 330.947853] ? SyS_mknod+0x480/0x480 [ 330.951551] do_syscall_64+0x281/0x940 [ 330.955423] ? trace_event_raw_event_sys_exit+0x260/0x260 [ 330.960960] ? syscall_return_slowpath+0x550/0x550 [ 330.965890] ? syscall_return_slowpath+0x2ac/0x550 [ 330.970808] ? entry_SYSCALL_64_after_hwframe+0x52/0xb7 [ 330.976163] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 330.981005] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 330.986188] RIP: 0033:0x454e79 [ 330.989356] RSP: 002b:00007f016b92fc68 EFLAGS: 00000246 ORIG_RAX: 0000000000000102 [ 330.997058] RAX: ffffffffffffffda RBX: 00007f016b9306d4 RCX: 0000000000454e79 [ 331.004318] RDX: 0000000000000020 RSI: 0000000020000280 RDI: 0000000000000015 [ 331.011571] RBP: 000000000072bea0 R08: 0000000000000000 R09: 0000000000000000 [ 331.018834] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000016 [ 331.026093] R13: 00000000000003eb R14: 00000000006f7ea8 R15: 000000000000001d [ 331.041591] kernel msg: ebtables bug: please report to author: entries_size too small 2018/03/30 23:06:22 executing program 3: r0 = socket(0x40000000015, 0x5, 0x0) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000240), 0x4) bind$inet(r0, &(0x7f00008a5ff0)={0x2, 0x4e21, @loopback=0x7f000001}, 0x10) sendto$inet(r0, &(0x7f0000f7db7f)="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", 0x481, 0x0, &(0x7f000069affb)={0x2, 0x4e20, @loopback=0x7f000001}, 0x10) setsockopt$RDS_CONG_MONITOR(r0, 0x114, 0x6, &(0x7f0000000080), 0x4) ioctl$int_in(r0, 0x5421, &(0x7f0000000040)=0x56d) sendto$inet(r0, &(0x7f00004b3fff), 0x0, 0x0, &(0x7f00002b4000)={0x2, 0x4e20, @loopback=0x7f000001}, 0x3f6) ioctl$sock_inet_tcp_SIOCOUTQ(r0, 0x5411, &(0x7f0000000000)) 2018/03/30 23:06:22 executing program 5: mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r0 = perf_event_open(&(0x7f0000223000)={0x2, 0x78, 0xe3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000001980)={{{@in6=@remote, @in=@multicast1}}, {{@in=@multicast2}, 0x0, @in=@multicast2}}, &(0x7f0000001a80)=0xe8) mount(&(0x7f00000003c0)='./file0\x00', &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='^group2\x00', 0x4, 0x0) r1 = open$dir(&(0x7f000001bff4)='./file0\x00', 0x0, 0x0) getpeername$netlink(r0, &(0x7f0000000040), &(0x7f0000000140)=0xc) mkdirat(0xffffffffffffffff, &(0x7f0000000280)='./file0\x00', 0x20) unlinkat(r1, &(0x7f0000000080)='./file0\x00', 0x200) 2018/03/30 23:06:22 executing program 6: pipe(&(0x7f0000000940)={0xffffffffffffffff, 0xffffffffffffffff}) accept4$ax25(r0, 0x0, &(0x7f0000000080), 0x80000) r1 = socket$inet(0x2, 0x20000000000003, 0x2) connect$inet(r1, &(0x7f0000000000)={0x2, 0x0, @remote={0xac, 0x14, 0x14, 0xbb}}, 0x10) sendmsg(0xffffffffffffffff, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000140), 0x0, &(0x7f0000000180)=ANY=[]}, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000980)=@broute={'broute\x00', 0x20, 0x3, 0x2d9, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000380], 0x0, &(0x7f00000002c0), &(0x7f0000001000)=ANY=[@ANYBLOB="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"]}, 0x351) setsockopt$inet_int(r1, 0x0, 0x2, &(0x7f00000000c0)=0x7fffffff, 0x4) r2 = socket$rds(0x15, 0x5, 0x0) pipe(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$bt_BT_DEFER_SETUP(r3, 0x112, 0x7, &(0x7f0000000280)=0x100, 0x4) accept$packet(r4, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @remote}, &(0x7f0000000100)=0x14) connect$rds(r2, &(0x7f0000000140)={0x2, 0x4e22, @remote={0xac, 0x14, 0x14, 0xbb}}, 0x10) getsockopt$sock_buf(r2, 0x1, 0x3b, &(0x7f0000000180)=""/83, &(0x7f0000000200)=0x53) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000a00)=@filter={'filter\x00', 0xe, 0x4, 0x5a0, 0xffffffff, 0x0, 0xf0, 0xf0, 0xffffffff, 0xffffffff, 0x4d0, 0x4d0, 0x4d0, 0xffffffff, 0x4, &(0x7f0000000300), {[{{@ipv6={@ipv4={[], [0xff, 0xff], @rand_addr=0x80000001}, @dev={0xfe, 0x80, [], 0x16}, [0x0, 0xffffff00, 0xff, 0xffffffff], [0x0, 0xff000000, 0xffffffff], 'ipddp0\x00', 'ip_vti0\x00', {}, {0xff}, 0x6c, 0x2bf}, 0x0, 0xc8, 0xf0}, @REJECT={0x28, 'REJECT\x00', 0x0, {0x7}}}, {{@ipv6={@remote={0xfe, 0x80, [], 0xbb}, @remote={0xfe, 0x80, [], 0xbb}, [0xff000000, 0xffffffff, 0xffffff00, 0xff], [0xff, 0xffffffff, 0x0, 0xff000000], 'syzkaller1\x00', 'eql\x00', {}, {}, 0x62, 0x0, 0x4, 0x1}, 0x0, 0x120, 0x148, 0x0, {}, [@common=@frag={0x30, 'frag\x00', 0x0, {0x7ff, 0x7, 0x1, 0x2}}, @common=@hl={0x28, 'hl\x00', 0x0, {0x3, 0x7fff}}]}, @REJECT={0x28, 'REJECT\x00', 0x0, {0x7}}}, {{@ipv6={@dev={0xfe, 0x80, [], 0xc}, @loopback={0x0, 0x1}, [0xffffffff, 0xffffffff, 0xff000000, 0xff000000], [0xff, 0x0, 0xff, 0xffffff00], 'irlan0\x00', 'vcan0\x00', {0xff}, {}, 0x3b, 0xffffffffffffab69, 0x2, 0x30}, 0x0, 0x250, 0x298, 0x0, {}, [@common=@srh={0x30, 'srh\x00', 0x0, {0xbb, 0x1, 0x3, 0x6, 0xffffffffffffffc0, 0x80}}, @common=@inet=@policy={0x158, 'policy\x00', 0x0, {[{@ipv4, [0xffffffff, 0xff0000ff, 0xff000000, 0xffffffff], @ipv4=@multicast1=0xe0000001, [0xffffffff, 0xffffffff, 0xff000000, 0xffffff00], 0x4d5, 0x3500, 0x5c, 0x0, 0x10, 0xf}, {@ipv6=@dev={0xfe, 0x80, [], 0x11}, [0x0, 0xff000000, 0xff0000ff, 0xffffff00], @ipv4=@multicast1=0xe0000001, [0xffffffff, 0x0, 0x0, 0xffffffff], 0x4d5, 0x3500, 0x77, 0x1, 0x0, 0x1d}, {@ipv6=@mcast1={0xff, 0x1, [], 0x1}, [0xff000000, 0xffffffff, 0xffffff00, 0xff], @ipv4=@multicast2=0xe0000002, [0xffffffff, 0x0, 0xffffff00, 0xffffffff], 0x4d3, 0x3503, 0x7f, 0x0, 0x1, 0x19}, {@ipv4=@local={0xac, 0x14, 0x14, 0xaa}, [0x0, 0xff, 0x0, 0xff0000ff], @ipv6=@local={0xfe, 0x80, [], 0xaa}, [0xffffffff, 0xffffffff, 0xff, 0xff0000ff], 0x4d4, 0x3505, 0x0, 0x1, 0x1f}], 0x0, 0x3}}]}, @common=@unspec=@LED={0x48, 'LED\x00', 0x0, {'syz1\x00', 0x0, 0x8, 0x8}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28, '\x00', 0x0, 0xfffffffffffffffe}}}}, 0x600) socket(0x1, 0xa, 0x7) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_TIMER(r4, 0x40605346, &(0x7f0000000680)={0x1, 0x3, {0x3, 0x0, 0x9, 0x3}}) [ 331.203719] kernel msg: ebtables bug: please report to author: entries_size too small 2018/03/30 23:06:23 executing program 4: mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount(&(0x7f000000a000)='./file0\x00', &(0x7f0000026ff8)='./file0\x00', &(0x7f000000c000)='ramfs\x00', 0x0, &(0x7f000000a000)) mkdir(&(0x7f0000000000)='./file1\x00', 0x0) mount(&(0x7f0000000040)='./file0\x00', &(0x7f0000903000)='./file0\x00', &(0x7f0000811ffa)='bdev\x00', 0x100000, &(0x7f00000003c0)="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") r0 = dup(0xffffffffffffffff) r1 = syz_open_dev$vcsn(&(0x7f00000000c0)='/dev/vcs#\x00', 0x2, 0x20800) renameat(r0, &(0x7f0000000080)='./file1/file0\x00', r1, &(0x7f0000000100)='./file1\x00') mount(&(0x7f0000fb6000)='./file0\x00', &(0x7f0000d78000)='.', &(0x7f0000fdb000)='ubifs\x00', 0x1003, 0x0) mount(&(0x7f00002b9ff8)='./file0\x00', &(0x7f0000cbeff8)='./file0\x00', &(0x7f00005f7ffa)='ramfs\x00', 0x80000, &(0x7f000002f000)) mount(&(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)='./file1\x00', &(0x7f0000000200)='anon_inodefs\x00', 0x2000, &(0x7f0000000240)) chmod(&(0x7f0000000140)='./file1/file1\x00', 0x2) mount(&(0x7f0000adcff8)='./file0\x00', &(0x7f0000e08fff)='.', &(0x7f00005e9000)='cifs\x00', 0x2000, &(0x7f0000ad5000)) 2018/03/30 23:06:23 executing program 7: perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f00000000c0)='./control\x00', 0x0) r0 = inotify_init() inotify_add_watch(r0, &(0x7f0000f1eff6)='./control\x00', 0x220000000009) chmod(&(0x7f0000000040)='./control\x00', 0x30) r1 = inotify_init1(0x80000) inotify_init() r2 = accept(0xffffffffffffff9c, &(0x7f0000000100)=@sco, &(0x7f0000000180)=0x80) setsockopt$inet_tcp_TCP_FASTOPEN_KEY(r2, 0x6, 0x21, &(0x7f00000001c0)="89bb933009a9d8bbd258b32b770a5b11", 0x10) inotify_add_watch(r1, &(0x7f000001eff6)='./control\x00', 0x2000200) setsockopt$inet6_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, &(0x7f0000000080)="5fce869db66fa225921ad03d773be4ff", 0x10) fcntl$getflags(r1, 0x0) rmdir(&(0x7f000075aff6)='./control\x00') 2018/03/30 23:06:23 executing program 0 (fault-call:7 fault-nth:30): mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r0 = syz_open_dev$usbmon(&(0x7f0000000400)='/dev/usbmon#\x00', 0x0, 0x0) r1 = perf_event_open(&(0x7f0000223000)={0x2, 0x78, 0xe3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000001980)={{{@in6=@remote, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast2}, 0x0, @in=@multicast2}}, &(0x7f0000001a80)=0xe8) chown(&(0x7f00000004c0)='./file0\x00', r2, 0x0) mount(&(0x7f00000003c0)='./file0\x00', &(0x7f0000000380)='./file0\x00', &(0x7f0000000300)='cgroup2\x00', 0x0, 0x0) r3 = open$dir(&(0x7f000001bff4)='./file0\x00', 0x0, 0x0) mkdirat(r3, &(0x7f0000000280)='./file0\x00', 0x20) getdents64(r3, &(0x7f00000007c0)=""/250, 0x1015a) dup3(r0, r1, 0x80000) r4 = open$dir(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) renameat2(r4, &(0x7f0000000200)='./file1\x00', 0xffffffffffffffff, &(0x7f0000000240)='./file0\x00', 0xfd1092750066ec78) ioctl$KDGKBMODE(0xffffffffffffffff, 0x4b44, &(0x7f0000000140)) 2018/03/30 23:06:23 executing program 6: pipe(&(0x7f0000000940)={0xffffffffffffffff, 0xffffffffffffffff}) accept4$ax25(r0, 0x0, &(0x7f0000000080), 0x80000) r1 = socket$inet(0x2, 0x20000000000003, 0x2) connect$inet(r1, &(0x7f0000000000)={0x2, 0x0, @remote={0xac, 0x14, 0x14, 0xbb}}, 0x10) sendmsg(0xffffffffffffffff, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000140), 0x0, &(0x7f0000000180)=ANY=[]}, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000980)=@broute={'broute\x00', 0x20, 0x3, 0x2d9, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000380], 0x0, &(0x7f00000002c0), &(0x7f0000001000)=ANY=[@ANYBLOB="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"]}, 0x351) setsockopt$inet_int(r1, 0x0, 0x2, &(0x7f00000000c0)=0x7fffffff, 0x4) r2 = socket$rds(0x15, 0x5, 0x0) pipe(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$bt_BT_DEFER_SETUP(r3, 0x112, 0x7, &(0x7f0000000280)=0x100, 0x4) accept$packet(r4, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @remote}, &(0x7f0000000100)=0x14) connect$rds(r2, &(0x7f0000000140)={0x2, 0x4e22, @remote={0xac, 0x14, 0x14, 0xbb}}, 0x10) getsockopt$sock_buf(r2, 0x1, 0x3b, &(0x7f0000000180)=""/83, &(0x7f0000000200)=0x53) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000a00)=@filter={'filter\x00', 0xe, 0x4, 0x5a0, 0xffffffff, 0x0, 0xf0, 0xf0, 0xffffffff, 0xffffffff, 0x4d0, 0x4d0, 0x4d0, 0xffffffff, 0x4, &(0x7f0000000300), {[{{@ipv6={@ipv4={[], [0xff, 0xff], @rand_addr=0x80000001}, @dev={0xfe, 0x80, [], 0x16}, [0x0, 0xffffff00, 0xff, 0xffffffff], [0x0, 0xff000000, 0xffffffff], 'ipddp0\x00', 'ip_vti0\x00', {}, {0xff}, 0x6c, 0x2bf}, 0x0, 0xc8, 0xf0}, @REJECT={0x28, 'REJECT\x00', 0x0, {0x7}}}, {{@ipv6={@remote={0xfe, 0x80, [], 0xbb}, @remote={0xfe, 0x80, [], 0xbb}, [0xff000000, 0xffffffff, 0xffffff00, 0xff], [0xff, 0xffffffff, 0x0, 0xff000000], 'syzkaller1\x00', 'eql\x00', {}, {}, 0x62, 0x0, 0x4, 0x1}, 0x0, 0x120, 0x148, 0x0, {}, [@common=@frag={0x30, 'frag\x00', 0x0, {0x7ff, 0x7, 0x1, 0x2}}, @common=@hl={0x28, 'hl\x00', 0x0, {0x3, 0x7fff}}]}, @REJECT={0x28, 'REJECT\x00', 0x0, {0x7}}}, {{@ipv6={@dev={0xfe, 0x80, [], 0xc}, @loopback={0x0, 0x1}, [0xffffffff, 0xffffffff, 0xff000000, 0xff000000], [0xff, 0x0, 0xff, 0xffffff00], 'irlan0\x00', 'vcan0\x00', {0xff}, {}, 0x3b, 0xffffffffffffab69, 0x2, 0x30}, 0x0, 0x250, 0x298, 0x0, {}, [@common=@srh={0x30, 'srh\x00', 0x0, {0xbb, 0x1, 0x3, 0x6, 0xffffffffffffffc0, 0x80}}, @common=@inet=@policy={0x158, 'policy\x00', 0x0, {[{@ipv4, [0xffffffff, 0xff0000ff, 0xff000000, 0xffffffff], @ipv4=@multicast1=0xe0000001, [0xffffffff, 0xffffffff, 0xff000000, 0xffffff00], 0x4d5, 0x3500, 0x5c, 0x0, 0x10, 0xf}, {@ipv6=@dev={0xfe, 0x80, [], 0x11}, [0x0, 0xff000000, 0xff0000ff, 0xffffff00], @ipv4=@multicast1=0xe0000001, [0xffffffff, 0x0, 0x0, 0xffffffff], 0x4d5, 0x3500, 0x77, 0x1, 0x0, 0x1d}, {@ipv6=@mcast1={0xff, 0x1, [], 0x1}, [0xff000000, 0xffffffff, 0xffffff00, 0xff], @ipv4=@multicast2=0xe0000002, [0xffffffff, 0x0, 0xffffff00, 0xffffffff], 0x4d3, 0x3503, 0x7f, 0x0, 0x1, 0x19}, {@ipv4=@local={0xac, 0x14, 0x14, 0xaa}, [0x0, 0xff, 0x0, 0xff0000ff], @ipv6=@local={0xfe, 0x80, [], 0xaa}, [0xffffffff, 0xffffffff, 0xff, 0xff0000ff], 0x4d4, 0x3505, 0x0, 0x1, 0x1f}], 0x0, 0x3}}]}, @common=@unspec=@LED={0x48, 'LED\x00', 0x0, {'syz1\x00', 0x0, 0x8, 0x8}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28, '\x00', 0x0, 0xfffffffffffffffe}}}}, 0x600) socket(0x1, 0xa, 0x7) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_TIMER(r4, 0x40605346, &(0x7f0000000680)={0x1, 0x3, {0x3, 0x0, 0x9, 0x3}}) 2018/03/30 23:06:23 executing program 2: r0 = socket$inet_sctp(0x2, 0x0, 0x84) write$rdma_cm(0xffffffffffffffff, &(0x7f00000000c0)=ANY=[@ANYBLOB], 0x0) write$rdma_cm(0xffffffffffffffff, &(0x7f00000003c0)=ANY=[@ANYBLOB="031a4f2f7f000000dd000000000000000000d200000000000000000100005dd45591dac81c000000ff01001000000000000000000000800000000000"], 0x40) write$rdma_cm(0xffffffffffffffff, &(0x7f0000000500)=ANY=[@ANYBLOB="03000000400000fa0a00000000000000ff010000000000000000000000000001000000000a00000000000000ff01000000000000000000000000000100000000", @ANYRES32=0xffffffff, @ANYBLOB="0000000048f2383e2f30a1df81f1facbbb6eb8cd41bebdb98c6b2e1bd39154be1397bb070b127078c5ca268a908cadc16d1e344fbe3d46cd08fab195d113f973eabad31189e5586e6090933f775068006587f0d38bb54e"], 0x48) creat(&(0x7f0000000380)='./file0\x00', 0x10) socketpair(0x3, 0x0, 0xfffffffffffffff7, &(0x7f0000000240)={0xffffffffffffffff}) perf_event_open(&(0x7f000001d000)={0x2, 0x78, 0xe2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$inet6_int(r2, 0x29, 0xc8, &(0x7f00008d6000)=0x3, 0x4) r3 = openat$kvm(0xffffffffffffff9c, &(0x7f0000264ff7)='/dev/kvm\x00', 0x0, 0x0) setsockopt$inet6_int(r2, 0x29, 0xc8, &(0x7f0000ac5000), 0x4) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000000)={@remote, @loopback}, &(0x7f0000000080)=0xc) getsockopt$inet6_mreq(r0, 0x29, 0x1c, &(0x7f00000000c0)={@mcast1}, &(0x7f0000000100)=0x14) sendfile(r1, r3, &(0x7f0000000280), 0x8001) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000200)=0x0) sigaltstack(&(0x7f0000ffd000/0x1000)=nil, &(0x7f00000003c0)) llistxattr(&(0x7f0000000040)='./file0\x00', &(0x7f0000000180)=""/79, 0x4f) perf_event_open(&(0x7f0000000300)={0x7, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0xc80, 0x0, 0x0, 0x0, 0x401, 0x3a}, r4, 0x8, 0xffffffffffffffff, 0x0) 2018/03/30 23:06:23 executing program 3: r0 = socket(0x40000000015, 0x5, 0x0) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000240), 0x4) bind$inet(r0, &(0x7f00008a5ff0)={0x2, 0x4e21, @loopback=0x7f000001}, 0x10) sendto$inet(r0, &(0x7f0000f7db7f)="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", 0x481, 0x0, &(0x7f000069affb)={0x2, 0x4e20, @loopback=0x7f000001}, 0x10) setsockopt$RDS_CONG_MONITOR(r0, 0x114, 0x6, &(0x7f0000000080), 0x4) ioctl$int_in(r0, 0x5421, &(0x7f0000000040)=0x56d) sendto$inet(r0, &(0x7f00004b3fff), 0x0, 0x0, &(0x7f00002b4000)={0x2, 0x4e20, @loopback=0x7f000001}, 0x3f6) ioctl$sock_inet_tcp_SIOCOUTQ(r0, 0x5411, &(0x7f0000000000)) 2018/03/30 23:06:23 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x200, 0x0) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000680)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$sock_linger(r2, 0x1, 0xd, &(0x7f00000006c0)={0x400, 0x9}, 0x8) perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x0, 0x0) r3 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) mmap(&(0x7f0000000000/0x9d7000)=nil, 0x9d7000, 0x0, 0x10, 0xffffffffffffffff, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x7) perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r4 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r4, &(0x7f0000e5b000)={0x2, 0x4e20, @multicast1=0xe0000001}, 0x10) syz_open_dev$sg(&(0x7f0000000440)='/dev/sg#\x00', 0x0, 0x0) connect$inet(r4, &(0x7f0000000100)={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x11}}, 0x10) r5 = bpf$PROG_LOAD(0x5, &(0x7f0000eb0fb8)={0x1, 0x3, &(0x7f00009ff000)=@framed={{0x18}, [], {0x95}}, &(0x7f00002bf000)='syzkaller\x00', 0x4, 0xb7, &(0x7f00006ab000)=""/183}, 0x48) setsockopt$inet_tcp_int(r4, 0x6, 0x19, &(0x7f0000000240)=0x8, 0x4) r6 = socket$kcm(0x29, 0x2, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r6, 0x89e0, &(0x7f000031aff8)={r4, r5}) ioctl$sock_kcm_SIOCKCMCLONE(r6, 0x89e2, &(0x7f00000002c0)={0xffffffffffffffff}) sendmsg$nl_xfrm(r7, &(0x7f0000000780)={&(0x7f0000000200)={0x10}, 0xc, &(0x7f0000000740)={&(0x7f0000000480)=@updpolicy={0xb8, 0x19, 0x0, 0x0, 0x0, {{@in=@loopback=0x7f000001, @in6=@mcast1={0xff, 0x1, [], 0x1}}}}, 0xffcb}, 0x1}, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(r7, 0x89e1, &(0x7f0000000040)={r4}) r8 = fcntl$getown(r3, 0x9) recvfrom$inet6(r1, &(0x7f0000000140)=""/177, 0xb1, 0x0, &(0x7f0000000080)={0xa, 0x4e23, 0x9, @empty, 0xe38}, 0x1c) r9 = accept4$inet(0xffffffffffffff9c, &(0x7f0000000700)={0x0, 0x0, @broadcast}, &(0x7f0000000740)=0x10, 0x80000) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r9, 0x84, 0x64, &(0x7f0000000780)=[@in6={0xa, 0x4e22, 0xfffffffffffff7e1, @mcast2={0xff, 0x2, [], 0x1}, 0x8}, @in={0x2, 0x4e24, @broadcast=0xffffffff}], 0x2c) ptrace$setregset(0x4205, r8, 0x0, &(0x7f00000005c0)={&(0x7f0000000080)}) ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r10 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x1fffd, 0x0) r11 = syz_open_dev$sndtimer(&(0x7f00000000c0)='/dev/snd/timer\x00', 0x0, 0x0) read(r11, &(0x7f0000ec6000)=""/50, 0x32) fcntl$dupfd(r11, 0x0, r10) 2018/03/30 23:06:23 executing program 5: mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) perf_event_open(&(0x7f0000223000)={0x2, 0x78, 0xe3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000001980)={{{@in6=@remote, @in=@multicast1}}, {{@in=@multicast2}, 0x0, @in=@multicast2}}, &(0x7f0000001a80)=0xe8) mount(&(0x7f00000003c0)='./file0\x00', &(0x7f0000000380)='./file0\x00', &(0x7f0000000300)='cgroup2\x00', 0x0, 0x0) r0 = open$dir(&(0x7f000001bff4)='./file0\x00', 0x0, 0x0) mkdirat(0xffffffffffffffff, &(0x7f0000000280)='./file0\x00', 0x20) unlinkat(r0, &(0x7f0000000080)='./file0\x00', 0x200) syz_mount_image$ntfs(&(0x7f0000000040)='ntfs\x00', &(0x7f00000000c0)='./file0\x00', 0x7ff, 0x3, &(0x7f0000000200)=[{&(0x7f0000000100)="6fbda0383cfe8def55e60e40139f280bf5bb696ec02c84a09d179f65e8738caa04999d06", 0x24, 0x9}, {&(0x7f0000000140)="3c56623ae45d38903a14ff021a32b0bb7ea290067fd1284dbd179dac307345cb2cd293feeb08b41fad72cc37c159577477e06e4e09903371849584f163d2341dcc5546900bdc002e07d65d34", 0x4c, 0x8}, {&(0x7f0000000400)="a9ee7a6ac54b4dbc52e32ae90b02618544907bc37fb34087ecc46a295c65601f80b4bf1b603ca1881da7ee37a299058939c271d61a3998443498df7b878603fbea9b99d0f1de35cf72c350be1c8033e11b3706099349a98b05441afda86d9751399304aeb6df14da81aec1967a9239af835de2ffbd6201810b62b82737e993b427822b554a5ed830d6add185c150e4c9e45b8708228f9bd90919b9885e0064e20a0dc2f6952a6b0708123acf8f", 0xad, 0x3}], 0x2, &(0x7f00000004c0)={[{@case_sensitive_no={'case_sensitive=no', 0x3d, [0x30, 0x31]}, 0x2c}, {@disable_sparse_yes={'disable_sparse=yes', 0x3d, [0x33, 0x78, 0x7a, 0x31, 0x7a, 0x37, 0x36, 0x3d, 0x32, 0x37]}, 0x2c}, {@case_sensitive_no={'case_sensitive=no', 0x3d, [0x78, 0xbae2419c2a1380ca, 0x34, 0x34, 0x3d, 0x35, 0x37, 0x79]}, 0x2c}, {@uid={'uid', 0x3d, [0x7d, 0x3d]}, 0x2c}, {@disable_sparse_yes={'disable_sparse=yes', 0x3d, [0x3f, 0x78, 0x33, 0x35, 0x39]}, 0x2c}]}) [ 331.641816] kernel msg: ebtables bug: please report to author: entries_size too small [ 331.721448] FAULT_INJECTION: forcing a failure. [ 331.721448] name failslab, interval 1, probability 0, space 0, times 0 [ 331.732790] CPU: 1 PID: 26203 Comm: syz-executor0 Not tainted 4.16.0-rc7+ #372 [ 331.740149] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 331.749500] Call Trace: [ 331.752093] dump_stack+0x194/0x24d [ 331.755724] ? arch_local_irq_restore+0x53/0x53 [ 331.760412] should_fail+0x8c0/0xa40 [ 331.764139] ? fault_create_debugfs_attr+0x1f0/0x1f0 2018/03/30 23:06:23 executing program 6: pipe(&(0x7f0000000940)={0xffffffffffffffff, 0xffffffffffffffff}) accept4$ax25(r0, 0x0, &(0x7f0000000080), 0x80000) r1 = socket$inet(0x2, 0x20000000000003, 0x2) connect$inet(r1, &(0x7f0000000000)={0x2, 0x0, @remote={0xac, 0x14, 0x14, 0xbb}}, 0x10) sendmsg(0xffffffffffffffff, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000140), 0x0, &(0x7f0000000180)=ANY=[]}, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000980)=@broute={'broute\x00', 0x20, 0x3, 0x2d9, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000380], 0x0, &(0x7f00000002c0), &(0x7f0000001000)=ANY=[@ANYBLOB="00000000000000000000000000000000000000000000000000000000000000000000000000000000feffffff0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000ffffffff010000000b00000008000000600469666230000000000000000000000000736974300000000000000000000000007663616e300000000000000000000000626f6e643000000000000000000000000180c200000e00ffff00ffffaaaaaaaaaaaaffffff0000ff000008010000d001000048020000706879736465760000000000000000000000000000000000000000000000000070000000000000006e723000000000000000000000000000000000000000000000000000000000000000000000000000000000000000766c616e300000003a9c4ebb9f24dc06a52c000000000000000000000000000000000000000000ff0000000000000000000000000000000101000000000000000000000000000000000000004c45440000000000000000000000000000000000000000000000000000000000280000000000000073797a310000000000000000000000000000000000000000000000004000000000000000000000004e464c4f470000000000000000000000000000000000000000000000000000005000000000000000000000000000000000000000692ef8a72c6779a914df06a44b35b0eafd833141b590148ad8c2d17b06e81aa50bc466307f618025cda16029da79ca01cd7bf2fa8433c6000000004e464c4f470000000000000000000000000000000000000000000000000000005000000000000000000000000000000000000000f7040c3bd532a607b6540847e9980255ac80a05048ee3c578fd00c809822ab1ff7d12707561fdd7b1bcbd7c428bd7449152a676a0e0fc0823ebe89b10758fffe5c92f48f0000000000000000000000000000000000000000000000000000000000000000000000000000000001000000fcffffff"]}, 0x351) setsockopt$inet_int(r1, 0x0, 0x2, &(0x7f00000000c0)=0x7fffffff, 0x4) r2 = socket$rds(0x15, 0x5, 0x0) pipe(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$bt_BT_DEFER_SETUP(r3, 0x112, 0x7, &(0x7f0000000280)=0x100, 0x4) accept$packet(r4, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @remote}, &(0x7f0000000100)=0x14) connect$rds(r2, &(0x7f0000000140)={0x2, 0x4e22, @remote={0xac, 0x14, 0x14, 0xbb}}, 0x10) getsockopt$sock_buf(r2, 0x1, 0x3b, &(0x7f0000000180)=""/83, &(0x7f0000000200)=0x53) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000a00)=@filter={'filter\x00', 0xe, 0x4, 0x5a0, 0xffffffff, 0x0, 0xf0, 0xf0, 0xffffffff, 0xffffffff, 0x4d0, 0x4d0, 0x4d0, 0xffffffff, 0x4, &(0x7f0000000300), {[{{@ipv6={@ipv4={[], [0xff, 0xff], @rand_addr=0x80000001}, @dev={0xfe, 0x80, [], 0x16}, [0x0, 0xffffff00, 0xff, 0xffffffff], [0x0, 0xff000000, 0xffffffff], 'ipddp0\x00', 'ip_vti0\x00', {}, {0xff}, 0x6c, 0x2bf}, 0x0, 0xc8, 0xf0}, @REJECT={0x28, 'REJECT\x00', 0x0, {0x7}}}, {{@ipv6={@remote={0xfe, 0x80, [], 0xbb}, @remote={0xfe, 0x80, [], 0xbb}, [0xff000000, 0xffffffff, 0xffffff00, 0xff], [0xff, 0xffffffff, 0x0, 0xff000000], 'syzkaller1\x00', 'eql\x00', {}, {}, 0x62, 0x0, 0x4, 0x1}, 0x0, 0x120, 0x148, 0x0, {}, [@common=@frag={0x30, 'frag\x00', 0x0, {0x7ff, 0x7, 0x1, 0x2}}, @common=@hl={0x28, 'hl\x00', 0x0, {0x3, 0x7fff}}]}, @REJECT={0x28, 'REJECT\x00', 0x0, {0x7}}}, {{@ipv6={@dev={0xfe, 0x80, [], 0xc}, @loopback={0x0, 0x1}, [0xffffffff, 0xffffffff, 0xff000000, 0xff000000], [0xff, 0x0, 0xff, 0xffffff00], 'irlan0\x00', 'vcan0\x00', {0xff}, {}, 0x3b, 0xffffffffffffab69, 0x2, 0x30}, 0x0, 0x250, 0x298, 0x0, {}, [@common=@srh={0x30, 'srh\x00', 0x0, {0xbb, 0x1, 0x3, 0x6, 0xffffffffffffffc0, 0x80}}, @common=@inet=@policy={0x158, 'policy\x00', 0x0, {[{@ipv4, [0xffffffff, 0xff0000ff, 0xff000000, 0xffffffff], @ipv4=@multicast1=0xe0000001, [0xffffffff, 0xffffffff, 0xff000000, 0xffffff00], 0x4d5, 0x3500, 0x5c, 0x0, 0x10, 0xf}, {@ipv6=@dev={0xfe, 0x80, [], 0x11}, [0x0, 0xff000000, 0xff0000ff, 0xffffff00], @ipv4=@multicast1=0xe0000001, [0xffffffff, 0x0, 0x0, 0xffffffff], 0x4d5, 0x3500, 0x77, 0x1, 0x0, 0x1d}, {@ipv6=@mcast1={0xff, 0x1, [], 0x1}, [0xff000000, 0xffffffff, 0xffffff00, 0xff], @ipv4=@multicast2=0xe0000002, [0xffffffff, 0x0, 0xffffff00, 0xffffffff], 0x4d3, 0x3503, 0x7f, 0x0, 0x1, 0x19}, {@ipv4=@local={0xac, 0x14, 0x14, 0xaa}, [0x0, 0xff, 0x0, 0xff0000ff], @ipv6=@local={0xfe, 0x80, [], 0xaa}, [0xffffffff, 0xffffffff, 0xff, 0xff0000ff], 0x4d4, 0x3505, 0x0, 0x1, 0x1f}], 0x0, 0x3}}]}, @common=@unspec=@LED={0x48, 'LED\x00', 0x0, {'syz1\x00', 0x0, 0x8, 0x8}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28, '\x00', 0x0, 0xfffffffffffffffe}}}}, 0x600) socket(0x1, 0xa, 0x7) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_TIMER(r4, 0x40605346, &(0x7f0000000680)={0x1, 0x3, {0x3, 0x0, 0x9, 0x3}}) 2018/03/30 23:06:23 executing program 5: mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r0 = perf_event_open(&(0x7f0000223000)={0x2, 0x78, 0xe3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r0, 0x2405, r0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000001980)={{{@in6=@remote, @in=@multicast1}}, {{@in=@multicast2}, 0x0, @in=@multicast2}}, &(0x7f0000001a80)=0xe8) mount(&(0x7f00000003c0)='./file0\x00', &(0x7f0000000380)='./file0\x00', &(0x7f0000000300)='cgroup2\x00', 0x0, 0x0) r1 = open$dir(&(0x7f000001bff4)='./file0\x00', 0x0, 0x0) pipe(&(0x7f0000000040)) mkdirat(0xffffffffffffffff, &(0x7f0000000280)='./file0\x00', 0x20) unlinkat(r1, &(0x7f0000000080)='./file0\x00', 0x200) 2018/03/30 23:06:23 executing program 3: r0 = socket(0x40000000015, 0x5, 0x0) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000240), 0x4) bind$inet(r0, &(0x7f00008a5ff0)={0x2, 0x4e21, @loopback=0x7f000001}, 0x10) sendto$inet(r0, &(0x7f0000f7db7f)="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", 0x481, 0x0, &(0x7f000069affb)={0x2, 0x4e20, @loopback=0x7f000001}, 0x10) setsockopt$RDS_CONG_MONITOR(r0, 0x114, 0x6, &(0x7f0000000080), 0x4) ioctl$int_in(r0, 0x5421, &(0x7f0000000040)=0x56d) sendto$inet(r0, &(0x7f00004b3fff), 0x0, 0x0, &(0x7f00002b4000)={0x2, 0x4e20, @loopback=0x7f000001}, 0x3f6) ioctl$sock_inet_tcp_SIOCOUTQ(r0, 0x5411, &(0x7f0000000000)) [ 331.769290] ? trace_hardirqs_off+0x10/0x10 [ 331.769444] kernel msg: ebtables bug: please report to author: entries_size too small [ 331.773607] ? alloc_fair_sched_group+0xd6/0x530 [ 331.773620] ? sched_create_group+0x35/0x70 [ 331.773635] ? cgroup_apply_control_enable+0x44d/0xbc0 [ 331.773647] ? SyS_mkdirat+0x22b/0x2b0 [ 331.773660] ? print_irqtrace_events+0x270/0x270 [ 331.773674] ? find_held_lock+0x35/0x1d0 [ 331.773688] ? __lock_is_held+0xb6/0x140 [ 331.812650] ? check_same_owner+0x320/0x320 [ 331.816982] ? trace_hardirqs_on_caller+0x421/0x5c0 [ 331.821997] ? rcu_note_context_switch+0x710/0x710 [ 331.826923] should_failslab+0xec/0x120 [ 331.830878] kmem_cache_alloc_node_trace+0x5a/0x760 [ 331.835879] ? __refill_cfs_bandwidth_runtime+0x120/0x120 [ 331.841394] ? sched_create_group+0x22/0x70 [ 331.845696] ? find_next_bit+0xcc/0x100 [ 331.849650] alloc_fair_sched_group+0x1f0/0x530 [ 331.854302] sched_create_group+0x35/0x70 [ 331.858434] cpu_cgroup_css_alloc+0xe/0x30 [ 331.862648] cgroup_apply_control_enable+0x44d/0xbc0 [ 331.867734] ? cgroup_propagate_control+0x570/0x570 [ 331.872730] ? css_populate_dir+0x289/0x420 [ 331.877037] cgroup_mkdir+0x56f/0xfc0 [ 331.880815] ? __lock_is_held+0xb6/0x140 [ 331.884859] ? cgroup_destroy_locked+0x750/0x750 [ 331.889589] ? rcu_read_lock_sched_held+0x108/0x120 [ 331.894579] ? kmem_cache_free+0x258/0x2a0 [ 331.898791] ? set_nlink+0xc1/0x160 [ 331.902393] ? debug_lockdep_rcu_enabled+0x77/0x90 [ 331.907298] ? generic_permission+0x105/0x3c0 [ 331.911768] ? cgroup_destroy_locked+0x750/0x750 [ 331.916503] kernfs_iop_mkdir+0x153/0x1e0 [ 331.920629] vfs_mkdir+0x390/0x600 [ 331.924148] SyS_mkdirat+0x22b/0x2b0 [ 331.927839] ? SyS_mknod+0x480/0x480 [ 331.931530] ? trace_hardirqs_on+0xd/0x10 [ 331.935655] ? do_syscall_64+0xb7/0x940 [ 331.939604] ? SyS_mknod+0x480/0x480 [ 331.943297] do_syscall_64+0x281/0x940 [ 331.947159] ? vmalloc_sync_all+0x30/0x30 [ 331.951282] ? trace_event_raw_event_sys_exit+0x260/0x260 [ 331.956797] ? syscall_return_slowpath+0x550/0x550 [ 331.961703] ? syscall_return_slowpath+0x2ac/0x550 [ 331.966611] ? entry_SYSCALL_64_after_hwframe+0x52/0xb7 [ 331.971955] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 331.976778] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 331.981944] RIP: 0033:0x454e79 [ 331.985110] RSP: 002b:00007f016b92fc68 EFLAGS: 00000246 ORIG_RAX: 0000000000000102 [ 331.992793] RAX: ffffffffffffffda RBX: 00007f016b9306d4 RCX: 0000000000454e79 [ 332.000043] RDX: 0000000000000020 RSI: 0000000020000280 RDI: 0000000000000015 [ 332.007290] RBP: 000000000072bea0 R08: 0000000000000000 R09: 0000000000000000 [ 332.014533] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000016 2018/03/30 23:06:23 executing program 6: pipe(&(0x7f0000000940)={0xffffffffffffffff, 0xffffffffffffffff}) accept4$ax25(r0, 0x0, &(0x7f0000000080), 0x80000) r1 = socket$inet(0x2, 0x20000000000003, 0x2) connect$inet(r1, &(0x7f0000000000)={0x2, 0x0, @remote={0xac, 0x14, 0x14, 0xbb}}, 0x10) sendmsg(0xffffffffffffffff, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000140), 0x0, &(0x7f0000000180)=ANY=[]}, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000980)=@broute={'broute\x00', 0x20, 0x3, 0x2d9, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000380], 0x0, &(0x7f00000002c0), &(0x7f0000001000)=ANY=[@ANYBLOB="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"]}, 0x351) setsockopt$inet_int(r1, 0x0, 0x2, &(0x7f00000000c0)=0x7fffffff, 0x4) r2 = socket$rds(0x15, 0x5, 0x0) pipe(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$bt_BT_DEFER_SETUP(r3, 0x112, 0x7, &(0x7f0000000280)=0x100, 0x4) accept$packet(r4, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @remote}, &(0x7f0000000100)=0x14) connect$rds(r2, &(0x7f0000000140)={0x2, 0x4e22, @remote={0xac, 0x14, 0x14, 0xbb}}, 0x10) getsockopt$sock_buf(r2, 0x1, 0x3b, &(0x7f0000000180)=""/83, &(0x7f0000000200)=0x53) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000a00)=@filter={'filter\x00', 0xe, 0x4, 0x5a0, 0xffffffff, 0x0, 0xf0, 0xf0, 0xffffffff, 0xffffffff, 0x4d0, 0x4d0, 0x4d0, 0xffffffff, 0x4, &(0x7f0000000300), {[{{@ipv6={@ipv4={[], [0xff, 0xff], @rand_addr=0x80000001}, @dev={0xfe, 0x80, [], 0x16}, [0x0, 0xffffff00, 0xff, 0xffffffff], [0x0, 0xff000000, 0xffffffff], 'ipddp0\x00', 'ip_vti0\x00', {}, {0xff}, 0x6c, 0x2bf}, 0x0, 0xc8, 0xf0}, @REJECT={0x28, 'REJECT\x00', 0x0, {0x7}}}, {{@ipv6={@remote={0xfe, 0x80, [], 0xbb}, @remote={0xfe, 0x80, [], 0xbb}, [0xff000000, 0xffffffff, 0xffffff00, 0xff], [0xff, 0xffffffff, 0x0, 0xff000000], 'syzkaller1\x00', 'eql\x00', {}, {}, 0x62, 0x0, 0x4, 0x1}, 0x0, 0x120, 0x148, 0x0, {}, [@common=@frag={0x30, 'frag\x00', 0x0, {0x7ff, 0x7, 0x1, 0x2}}, @common=@hl={0x28, 'hl\x00', 0x0, {0x3, 0x7fff}}]}, @REJECT={0x28, 'REJECT\x00', 0x0, {0x7}}}, {{@ipv6={@dev={0xfe, 0x80, [], 0xc}, @loopback={0x0, 0x1}, [0xffffffff, 0xffffffff, 0xff000000, 0xff000000], [0xff, 0x0, 0xff, 0xffffff00], 'irlan0\x00', 'vcan0\x00', {0xff}, {}, 0x3b, 0xffffffffffffab69, 0x2, 0x30}, 0x0, 0x250, 0x298, 0x0, {}, [@common=@srh={0x30, 'srh\x00', 0x0, {0xbb, 0x1, 0x3, 0x6, 0xffffffffffffffc0, 0x80}}, @common=@inet=@policy={0x158, 'policy\x00', 0x0, {[{@ipv4, [0xffffffff, 0xff0000ff, 0xff000000, 0xffffffff], @ipv4=@multicast1=0xe0000001, [0xffffffff, 0xffffffff, 0xff000000, 0xffffff00], 0x4d5, 0x3500, 0x5c, 0x0, 0x10, 0xf}, {@ipv6=@dev={0xfe, 0x80, [], 0x11}, [0x0, 0xff000000, 0xff0000ff, 0xffffff00], @ipv4=@multicast1=0xe0000001, [0xffffffff, 0x0, 0x0, 0xffffffff], 0x4d5, 0x3500, 0x77, 0x1, 0x0, 0x1d}, {@ipv6=@mcast1={0xff, 0x1, [], 0x1}, [0xff000000, 0xffffffff, 0xffffff00, 0xff], @ipv4=@multicast2=0xe0000002, [0xffffffff, 0x0, 0xffffff00, 0xffffffff], 0x4d3, 0x3503, 0x7f, 0x0, 0x1, 0x19}, {@ipv4=@local={0xac, 0x14, 0x14, 0xaa}, [0x0, 0xff, 0x0, 0xff0000ff], @ipv6=@local={0xfe, 0x80, [], 0xaa}, [0xffffffff, 0xffffffff, 0xff, 0xff0000ff], 0x4d4, 0x3505, 0x0, 0x1, 0x1f, 0x10}]}}]}, @common=@unspec=@LED={0x48, 'LED\x00', 0x0, {'syz1\x00', 0x0, 0x8, 0x8}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28, '\x00', 0x0, 0xfffffffffffffffe}}}}, 0x600) socket(0x1, 0xa, 0x7) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_TIMER(r4, 0x40605346, &(0x7f0000000680)={0x1, 0x3, {0x3, 0x0, 0x9, 0x3}}) 2018/03/30 23:06:23 executing program 4: mkdir(&(0x7f0000000140)='.', 0x80) mount(&(0x7f000000a000)='./file0\x00', &(0x7f0000026ff8)='./file0\x00', &(0x7f000000c000)='ramfs\x00', 0x0, &(0x7f000000a000)) mkdir(&(0x7f0000000000)='./file1\x00', 0x0) mount(&(0x7f0000000040)='./file0\x00', &(0x7f0000903000)='./file0\x00', &(0x7f0000811ffa)='bdev\x00', 0x100000, &(0x7f00000003c0)="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") r0 = dup(0xffffffffffffffff) setsockopt$netlink_NETLINK_RX_RING(r0, 0x10e, 0x6, &(0x7f00000000c0)={0xc5, 0x1, 0x7, 0x3}, 0x10) r1 = syz_open_dev$vcsn(&(0x7f0000000240)='/dev/vcs#\x00', 0xcd3, 0x42) renameat(r0, &(0x7f0000000080)='./file1/file0\x00', r1, &(0x7f0000000100)='./file1\x00') mount(&(0x7f0000fb6000)='./file0\x00', &(0x7f0000d78000)='.', &(0x7f0000fdb000)='ubifs\x00', 0x1003, 0x0) mount(&(0x7f00002b9ff8)='./file0\x00', &(0x7f0000cbeff8)='./file0\x00', &(0x7f00005f7ffa)='ramfs\x00', 0x80000, &(0x7f000002f000)) mount(&(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)='./file1\x00', &(0x7f0000000200)='anon_inodefs\x00', 0x2000, &(0x7f0000000240)) mount(&(0x7f0000adcff8)='./file0\x00', &(0x7f0000e08fff)='.', &(0x7f00005e9000)='cifs\x00', 0x2000, &(0x7f0000ad5000)) 2018/03/30 23:06:23 executing program 7: r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f00000000c0)='./control\x00', 0x0) fchmod(r0, 0x10) r1 = inotify_init() inotify_add_watch(r1, &(0x7f0000f1eff6)='./control\x00', 0x220000000009) r2 = inotify_init1(0x0) inotify_add_watch(r2, &(0x7f000001eff6)='./control\x00', 0x2000200) setsockopt$inet6_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, &(0x7f0000000080)="5fce869db66fa225921ad03d773be4ff", 0x10) rmdir(&(0x7f000075aff6)='./control\x00') [ 332.021782] R13: 00000000000003eb R14: 00000000006f7ea8 R15: 000000000000001e [ 332.045467] kernel msg: ebtables bug: please report to author: entries_size too small 2018/03/30 23:06:23 executing program 6: pipe(&(0x7f0000000940)={0xffffffffffffffff, 0xffffffffffffffff}) accept4$ax25(r0, 0x0, &(0x7f0000000080), 0x80000) r1 = socket$inet(0x2, 0x20000000000003, 0x2) connect$inet(r1, &(0x7f0000000000)={0x2, 0x0, @remote={0xac, 0x14, 0x14, 0xbb}}, 0x10) sendmsg(0xffffffffffffffff, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000140), 0x0, &(0x7f0000000180)=ANY=[]}, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000980)=@broute={'broute\x00', 0x20, 0x3, 0x2d9, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000380], 0x0, &(0x7f00000002c0), &(0x7f0000001000)=ANY=[@ANYBLOB="00000000000000000000000000000000000000000000000000000000000000000000000000000000feffffff0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000ffffffff010000000b00000008000000600469666230000000000000000000000000736974300000000000000000000000007663616e300000000000000000000000626f6e643000000000000000000000000180c200000e00ffff00ffffaaaaaaaaaaaaffffff0000ff000008010000d001000048020000706879736465760000000000000000000000000000000000000000000000000070000000000000006e723000000000000000000000000000000000000000000000000000000000000000000000000000000000000000766c616e300000003a9c4ebb9f24dc06a52c000000000000000000000000000000000000000000ff0000000000000000000000000000000101000000000000000000000000000000000000004c45440000000000000000000000000000000000000000000000000000000000280000000000000073797a310000000000000000000000000000000000000000000000004000000000000000000000004e464c4f470000000000000000000000000000000000000000000000000000005000000000000000000000000000000000000000692ef8a72c6779a914df06a44b35b0eafd833141b590148ad8c2d17b06e81aa50bc466307f618025cda16029da79ca01cd7bf2fa8433c6000000004e464c4f470000000000000000000000000000000000000000000000000000005000000000000000000000000000000000000000f7040c3bd532a607b6540847e9980255ac80a05048ee3c578fd00c809822ab1ff7d12707561fdd7b1bcbd7c428bd7449152a676a0e0fc0823ebe89b10758fffe5c92f48f0000000000000000000000000000000000000000000000000000000000000000000000000000000001000000fcffffff"]}, 0x351) setsockopt$inet_int(r1, 0x0, 0x2, &(0x7f00000000c0)=0x7fffffff, 0x4) r2 = socket$rds(0x15, 0x5, 0x0) pipe(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$bt_BT_DEFER_SETUP(r3, 0x112, 0x7, &(0x7f0000000280)=0x100, 0x4) accept$packet(r4, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @remote}, &(0x7f0000000100)=0x14) connect$rds(r2, &(0x7f0000000140)={0x2, 0x4e22, @remote={0xac, 0x14, 0x14, 0xbb}}, 0x10) getsockopt$sock_buf(r2, 0x1, 0x3b, &(0x7f0000000180)=""/83, &(0x7f0000000200)=0x53) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000a00)=@filter={'filter\x00', 0xe, 0x4, 0x5a0, 0xffffffff, 0x0, 0xf0, 0xf0, 0xffffffff, 0xffffffff, 0x4d0, 0x4d0, 0x4d0, 0xffffffff, 0x4, &(0x7f0000000300), {[{{@ipv6={@ipv4={[], [0xff, 0xff], @rand_addr=0x80000001}, @dev={0xfe, 0x80, [], 0x16}, [0x0, 0xffffff00, 0xff, 0xffffffff], [0x0, 0xff000000, 0xffffffff], 'ipddp0\x00', 'ip_vti0\x00', {}, {0xff}, 0x6c, 0x2bf}, 0x0, 0xc8, 0xf0}, @REJECT={0x28, 'REJECT\x00', 0x0, {0x7}}}, {{@ipv6={@remote={0xfe, 0x80, [], 0xbb}, @remote={0xfe, 0x80, [], 0xbb}, [0xff000000, 0xffffffff, 0xffffff00, 0xff], [0xff, 0xffffffff, 0x0, 0xff000000], 'syzkaller1\x00', 'eql\x00', {}, {}, 0x62, 0x0, 0x4, 0x1}, 0x0, 0x120, 0x148, 0x0, {}, [@common=@frag={0x30, 'frag\x00', 0x0, {0x7ff, 0x7, 0x1, 0x2}}, @common=@hl={0x28, 'hl\x00', 0x0, {0x3, 0x7fff}}]}, @REJECT={0x28, 'REJECT\x00', 0x0, {0x7}}}, {{@ipv6={@dev={0xfe, 0x80, [], 0xc}, @loopback={0x0, 0x1}, [0xffffffff, 0xffffffff, 0xff000000, 0xff000000], [0xff, 0x0, 0xff, 0xffffff00], 'irlan0\x00', 'vcan0\x00', {0xff}, {}, 0x3b, 0xffffffffffffab69, 0x2, 0x30}, 0x0, 0x250, 0x298, 0x0, {}, [@common=@srh={0x30, 'srh\x00', 0x0, {0xbb, 0x1, 0x3, 0x6, 0xffffffffffffffc0, 0x80}}, @common=@inet=@policy={0x158, 'policy\x00', 0x0, {[{@ipv4, [0xffffffff, 0xff0000ff, 0xff000000, 0xffffffff], @ipv4=@multicast1=0xe0000001, [0xffffffff, 0xffffffff, 0xff000000, 0xffffff00], 0x4d5, 0x3500, 0x5c, 0x0, 0x10, 0xf}, {@ipv6=@dev={0xfe, 0x80, [], 0x11}, [0x0, 0xff000000, 0xff0000ff, 0xffffff00], @ipv4=@multicast1=0xe0000001, [0xffffffff, 0x0, 0x0, 0xffffffff], 0x4d5, 0x3500, 0x77, 0x1, 0x0, 0x1d}, {@ipv6=@mcast1={0xff, 0x1, [], 0x1}, [0xff000000, 0xffffffff, 0xffffff00, 0xff], @ipv4=@multicast2=0xe0000002, [0xffffffff, 0x0, 0xffffff00, 0xffffffff], 0x4d3, 0x3503, 0x7f, 0x0, 0x1, 0x19}, {@ipv4=@local={0xac, 0x14, 0x14, 0xaa}, [0x0, 0xff, 0x0, 0xff0000ff], @ipv6=@local={0xfe, 0x80, [], 0xaa}, [0xffffffff, 0xffffffff, 0xff, 0xff0000ff], 0x4d4, 0x3505, 0x0, 0x1, 0x1f, 0x10}]}}]}, @common=@unspec=@LED={0x48, 'LED\x00', 0x0, {'syz1\x00', 0x0, 0x8, 0x8}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28, '\x00', 0x0, 0xfffffffffffffffe}}}}, 0x600) socket(0x1, 0xa, 0x7) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_TIMER(r4, 0x40605346, &(0x7f0000000680)={0x1, 0x3, {0x3, 0x0, 0x9, 0x3}}) 2018/03/30 23:06:23 executing program 3: r0 = socket(0x40000000015, 0x5, 0x0) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000240), 0x4) bind$inet(r0, &(0x7f00008a5ff0)={0x2, 0x4e21, @loopback=0x7f000001}, 0x10) sendto$inet(r0, &(0x7f0000f7db7f)="ba671368d1010000004900000001000000018be49e9301442865319997d0efdb2f54b6a10c7327757482bfce945c2a91fb8dfafc1d3f56bc543ab87321e12cca08a744a2d128b00634bc882151d36809229a96bc3437ef159489384ade077ba295eac2882dbfd3781dd4d4e609c42628dbb709b3eb1fa030009045dd98b9e6d77b6cec9ceb685595d43995e0f04c32260943add79831e661c6a351dedc8b9d220fbf9fb6e44fb6a629ce9a82025124fec9f3ee751f7da0cd7e799be88ddbdac20b48e890ff81d7fa28c2d017d7932f2569038740461accd4582f576e4fdb6150a3399f8266bc19eb943648ad1ad81420ed6c382436e474390c8995e829e4f9df43eed85a60b9ee254e31eb62900857fa134e76cc64880334adbff069a2e5e647d2ed36a96b23834b6f6ca6b8113baf4cf30347fbb7ffc30aea99872cc0dba03b07d3347b2d257edbe2733c26b7337a79962d8ce85469e3bcbe0e4a48a6ae69d13f2d4b5155b390ef67aa714b82b6313ee277cb8986eca5db2e97cb1ae2243bba80274f614ece521baef443394b4c161cb9ae926e21892578b49cfd6efe1cb1572148c10d92218ed73ec116a18de80ac42d2726a4523a764fc6dc356c5fbbf9d2c947ae3bc9a3dc76099f3257c8d5952876151b0326d8cb1d5683ee4ab5ded9a34c00ac1b03f34627ec18a7c2e92c87b7896549cfab5eb55fa85a970994bd4b22b5f0d045e241256d06f485a47b4a55ed389bc1734541232cd41908b5cfa4b8fcfcafce500a0c7ae99767713a98e7927aa69f6ccd7daea62f19ceb82559f41899c9a9aee99113e7e64b5f8b9824be9fdbfa4dd4995673d882bb4daeb64413b334e114965d2ba3cea8051e692508701b9400cb12eae457f8b8549944091b729160939918d8fcae611a48ed665f770db637487a236da1a58ba7566668651a77171fc4fe506496d19059343dbe4f426625d3f2b705f54581372361770bf5a9098a9fafefaf546426b294239ac33e3186e4d58ad2fa995a6ad4dc074e7cca11aead109563b2076c7c6e9f57ec63df960804e2e7f9d8444de9550cca3df7834d864e9777291c2e1f6205de2e43dc995ab8bb1515a365efc2830fa3e7a1dd137f550d6035212bc1f51c3b4ceea430df49ffc9210084ef156ad7e0d219efd6c116693735b44521d389969a3a65617cd2fd6e14060601cee4cd054cf36fe048b57d1d9ee3cad2a73552449926b4a6b03fbe9c0ec68357e1fbe52ed77b67f5870c0aefb7ee8236747e0d67a26725fb515544cbbe8464da94cfd8c0b94bb4e51a263b1749bd0a7cf651931f806d1b928d1f9994f1ad4d50e6a5cd7a8e4e687f8564fdacc864013d095ba9d5709eced3c28eabda476d177a7836400a01e02beed5a6636d4064fdda344967ad8682d14b87c71727cb66be27d1d39191f4223c545b62fb5d60262ba8076a65dbc194cee1df846c584b7bbe9dce6e6895b2cbbb64b03b55548b845cc3de2f939ef918421af9a5e9157e837651245299c03992d0ddee06bd22a31522aca0f309b1feccebc0b1c0ed9d21c19bfd15cd313ff64394fd6a10904890c9f6d646b026f27253e8f584c3ffd20ad67e8b62ed7676706d40bc5c80e376980b81", 0x481, 0x0, &(0x7f000069affb)={0x2, 0x4e20, @loopback=0x7f000001}, 0x10) setsockopt$RDS_CONG_MONITOR(r0, 0x114, 0x6, &(0x7f0000000080)=0x1, 0x4) ioctl$int_in(0xffffffffffffffff, 0x5421, &(0x7f0000000040)=0x56d) sendto$inet(r0, &(0x7f00004b3fff), 0x0, 0x0, &(0x7f00002b4000)={0x2, 0x4e20, @loopback=0x7f000001}, 0x3f6) ioctl$sock_inet_tcp_SIOCOUTQ(r0, 0x5411, &(0x7f0000000000)) 2018/03/30 23:06:23 executing program 7: perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000040)='./control\x00', 0x0) r0 = inotify_init() inotify_add_watch(r0, &(0x7f0000f1eff6)='./control\x00', 0x220000000009) r1 = inotify_init1(0x0) inotify_add_watch(r1, &(0x7f000001eff6)='./control\x00', 0x2000200) setsockopt$inet6_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, &(0x7f0000000080)="5fce869db66fa225921ad03d773be4ff", 0x10) rmdir(&(0x7f000075aff6)='./control\x00') 2018/03/30 23:06:23 executing program 2: socket$inet_sctp(0x2, 0x0, 0x84) write$rdma_cm(0xffffffffffffffff, &(0x7f00000000c0)=ANY=[@ANYBLOB], 0x0) write$rdma_cm(0xffffffffffffffff, &(0x7f00000003c0)=ANY=[@ANYBLOB="031a4f2f7f000000dde30000000000000000000000000000000000000000000100005dd45591dac827000000ff01000000000000000000000000000000000000"], 0x40) write$rdma_cm(0xffffffffffffffff, &(0x7f0000000440)=@resolve_ip={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x1, [], 0x1}}, {0xa, 0x0, 0x0, @mcast1={0xff, 0x1, [], 0x1}}}}, 0x48) creat(&(0x7f0000000140)='./file0\x00', 0x8) socketpair(0x3, 0x0, 0xfffffffffffffff7, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) perf_event_open(&(0x7f000001d000)={0x2, 0x78, 0xe2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet_sctp6_SCTP_NODELAY(r0, 0x84, 0x3, &(0x7f00000000c0)=0x7, 0x4) r1 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$inet6_int(r1, 0x29, 0xc8, &(0x7f00008d6000), 0x4) openat$kvm(0xffffffffffffff9c, &(0x7f0000264ff7)='/dev/kvm\x00', 0x0, 0x0) setsockopt$inet6_int(r1, 0x29, 0xc8, &(0x7f0000ac5000), 0x4) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000000)={@remote, @loopback}, &(0x7f0000000080)=0xc) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000200)=0x0) sigaltstack(&(0x7f0000ffd000/0x1000)=nil, &(0x7f00000003c0)) llistxattr(&(0x7f0000000040)='./file0\x00', &(0x7f0000000180)=""/79, 0x4f) perf_event_open(&(0x7f0000000300)={0x7, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0xc80, 0x0, 0x0, 0x0, 0x401, 0x3a}, r2, 0x8, 0xffffffffffffffff, 0x0) [ 332.177628] kernel msg: ebtables bug: please report to author: entries_size too small 2018/03/30 23:06:24 executing program 4: mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount(&(0x7f000000a000)='./file0\x00', &(0x7f0000026ff8)='./file0\x00', &(0x7f000000c000)='ramfs\x00', 0x0, &(0x7f000000a000)) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000280)={{{@in=@dev, @in6=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@dev}}}, &(0x7f0000000380)=0xe8) r1 = getegid() syz_fuseblk_mount(&(0x7f0000000140)='./file1/file0\x00', &(0x7f0000000240)='./file1\x00', 0x4000, r0, r1, 0x9, 0x5, 0x302040) mkdir(&(0x7f0000000000)='./file1\x00', 0x0) mount(&(0x7f0000000040)='./file0\x00', &(0x7f0000903000)='./file0\x00', &(0x7f0000811ffa)='bdev\x00', 0x100000, &(0x7f00000003c0)="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") r2 = dup(0xffffffffffffffff) r3 = syz_open_dev$vcsn(&(0x7f00000000c0)='/dev/vcs#\x00', 0x2, 0x20800) renameat(r2, &(0x7f0000000080)='./file1/file0\x00', r3, &(0x7f0000000100)='./file1\x00') mount(&(0x7f0000fb6000)='./file0\x00', &(0x7f0000d78000)='.', &(0x7f0000fdb000)='ubifs\x00', 0x1003, 0x0) mount(&(0x7f00002b9ff8)='./file0\x00', &(0x7f0000cbeff8)='./file0\x00', &(0x7f00005f7ffa)='ramfs\x00', 0x80000, &(0x7f000002f000)) mount(&(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)='./file1\x00', &(0x7f0000000200)='anon_inodefs\x00', 0x2000, &(0x7f0000000240)) mount(&(0x7f0000adcff8)='./file0\x00', &(0x7f0000e08fff)='.', &(0x7f00005e9000)='cifs\x00', 0x2000, &(0x7f0000ad5000)) 2018/03/30 23:06:24 executing program 5: r0 = syz_open_dev$audion(&(0x7f0000000040)='/dev/audio#\x00', 0x80, 0x4000) setsockopt$inet_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f00000000c0)={@in6={{0xa, 0x4e20, 0x9, @dev={0xfe, 0x80, [], 0xc}, 0x7f}}, 0x463, 0x0, 0x1000, "693ebd93fb67b9ffa89be07590621e2417b1ba5ce22dc7aeaba585900d439b16ab9fb64aa4d865f60cc1e51b06c3d0ae2caa7203d38676634deaa8bc52f9fbe4acc03994c92a9b82ecde3e1d96d779c2"}, 0xd8) r1 = socket$inet6_sctp(0xa, 0x1, 0x84) getsockopt$sock_int(r1, 0x1, 0x1c, &(0x7f0000000000), &(0x7f0000000040)=0x4) mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) perf_event_open(&(0x7f0000223000)={0x2, 0x78, 0xe3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000001980)={{{@in6=@remote, @in=@multicast1}}, {{@in=@multicast2}, 0x0, @in=@multicast2}}, &(0x7f0000001a80)=0xe8) mount(&(0x7f00000003c0)='./file0\x00', &(0x7f0000000380)='./file0\x00', &(0x7f0000000300)='cgroup2\x00', 0x0, 0x0) r2 = open$dir(&(0x7f000001bff4)='./file0\x00', 0x0, 0x0) mkdirat(r2, &(0x7f0000000240)='./file0\x00', 0x20) unlinkat(r2, &(0x7f0000000080)='./file0\x00', 0x200) 2018/03/30 23:06:24 executing program 6: pipe(&(0x7f0000000940)={0xffffffffffffffff, 0xffffffffffffffff}) accept4$ax25(r0, 0x0, &(0x7f0000000080), 0x80000) r1 = socket$inet(0x2, 0x20000000000003, 0x2) connect$inet(r1, &(0x7f0000000000)={0x2, 0x0, @remote={0xac, 0x14, 0x14, 0xbb}}, 0x10) sendmsg(0xffffffffffffffff, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000140), 0x0, &(0x7f0000000180)=ANY=[]}, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000980)=@broute={'broute\x00', 0x20, 0x3, 0x2d9, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000380], 0x0, &(0x7f00000002c0), &(0x7f0000001000)=ANY=[@ANYBLOB="00000000000000000000000000000000000000000000000000000000000000000000000000000000feffffff0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000ffffffff010000000b00000008000000600469666230000000000000000000000000736974300000000000000000000000007663616e300000000000000000000000626f6e643000000000000000000000000180c200000e00ffff00ffffaaaaaaaaaaaaffffff0000ff000008010000d001000048020000706879736465760000000000000000000000000000000000000000000000000070000000000000006e723000000000000000000000000000000000000000000000000000000000000000000000000000000000000000766c616e300000003a9c4ebb9f24dc06a52c000000000000000000000000000000000000000000ff0000000000000000000000000000000101000000000000000000000000000000000000004c45440000000000000000000000000000000000000000000000000000000000280000000000000073797a310000000000000000000000000000000000000000000000004000000000000000000000004e464c4f470000000000000000000000000000000000000000000000000000005000000000000000000000000000000000000000692ef8a72c6779a914df06a44b35b0eafd833141b590148ad8c2d17b06e81aa50bc466307f618025cda16029da79ca01cd7bf2fa8433c6000000004e464c4f470000000000000000000000000000000000000000000000000000005000000000000000000000000000000000000000f7040c3bd532a607b6540847e9980255ac80a05048ee3c578fd00c809822ab1ff7d12707561fdd7b1bcbd7c428bd7449152a676a0e0fc0823ebe89b10758fffe5c92f48f0000000000000000000000000000000000000000000000000000000000000000000000000000000001000000fcffffff"]}, 0x351) setsockopt$inet_int(r1, 0x0, 0x2, &(0x7f00000000c0)=0x7fffffff, 0x4) r2 = socket$rds(0x15, 0x5, 0x0) pipe(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$bt_BT_DEFER_SETUP(r3, 0x112, 0x7, &(0x7f0000000280)=0x100, 0x4) accept$packet(r4, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @remote}, &(0x7f0000000100)=0x14) connect$rds(r2, &(0x7f0000000140)={0x2, 0x4e22, @remote={0xac, 0x14, 0x14, 0xbb}}, 0x10) getsockopt$sock_buf(r2, 0x1, 0x3b, &(0x7f0000000180)=""/83, &(0x7f0000000200)=0x53) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000a00)=@filter={'filter\x00', 0xe, 0x4, 0x5a0, 0xffffffff, 0x0, 0xf0, 0xf0, 0xffffffff, 0xffffffff, 0x4d0, 0x4d0, 0x4d0, 0xffffffff, 0x4, &(0x7f0000000300), {[{{@ipv6={@ipv4={[], [0xff, 0xff], @rand_addr=0x80000001}, @dev={0xfe, 0x80, [], 0x16}, [0x0, 0xffffff00, 0xff, 0xffffffff], [0x0, 0xff000000, 0xffffffff], 'ipddp0\x00', 'ip_vti0\x00', {}, {0xff}, 0x6c, 0x2bf}, 0x0, 0xc8, 0xf0}, @REJECT={0x28, 'REJECT\x00', 0x0, {0x7}}}, {{@ipv6={@remote={0xfe, 0x80, [], 0xbb}, @remote={0xfe, 0x80, [], 0xbb}, [0xff000000, 0xffffffff, 0xffffff00, 0xff], [0xff, 0xffffffff, 0x0, 0xff000000], 'syzkaller1\x00', 'eql\x00', {}, {}, 0x62, 0x0, 0x4, 0x1}, 0x0, 0x120, 0x148, 0x0, {}, [@common=@frag={0x30, 'frag\x00', 0x0, {0x7ff, 0x7, 0x1, 0x2}}, @common=@hl={0x28, 'hl\x00', 0x0, {0x3, 0x7fff}}]}, @REJECT={0x28, 'REJECT\x00', 0x0, {0x7}}}, {{@ipv6={@dev={0xfe, 0x80, [], 0xc}, @loopback={0x0, 0x1}, [0xffffffff, 0xffffffff, 0xff000000, 0xff000000], [0xff, 0x0, 0xff, 0xffffff00], 'irlan0\x00', 'vcan0\x00', {0xff}, {}, 0x3b, 0xffffffffffffab69, 0x2, 0x30}, 0x0, 0x250, 0x298, 0x0, {}, [@common=@srh={0x30, 'srh\x00', 0x0, {0xbb, 0x1, 0x3, 0x6, 0xffffffffffffffc0, 0x80}}, @common=@inet=@policy={0x158, 'policy\x00', 0x0, {[{@ipv4, [0xffffffff, 0xff0000ff, 0xff000000, 0xffffffff], @ipv4=@multicast1=0xe0000001, [0xffffffff, 0xffffffff, 0xff000000, 0xffffff00], 0x4d5, 0x3500, 0x5c, 0x0, 0x10, 0xf}, {@ipv6=@dev={0xfe, 0x80, [], 0x11}, [0x0, 0xff000000, 0xff0000ff, 0xffffff00], @ipv4=@multicast1=0xe0000001, [0xffffffff, 0x0, 0x0, 0xffffffff], 0x4d5, 0x3500, 0x77, 0x1, 0x0, 0x1d}, {@ipv6=@mcast1={0xff, 0x1, [], 0x1}, [0xff000000, 0xffffffff, 0xffffff00, 0xff], @ipv4=@multicast2=0xe0000002, [0xffffffff, 0x0, 0xffffff00, 0xffffffff], 0x4d3, 0x3503, 0x7f, 0x0, 0x1, 0x19}, {@ipv4=@local={0xac, 0x14, 0x14, 0xaa}, [0x0, 0xff, 0x0, 0xff0000ff], @ipv6=@local={0xfe, 0x80, [], 0xaa}, [0xffffffff, 0xffffffff, 0xff, 0xff0000ff], 0x4d4, 0x3505, 0x0, 0x1, 0x1f, 0x10}]}}]}, @common=@unspec=@LED={0x48, 'LED\x00', 0x0, {'syz1\x00', 0x0, 0x8, 0x8}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28, '\x00', 0x0, 0xfffffffffffffffe}}}}, 0x600) socket(0x1, 0xa, 0x7) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_TIMER(r4, 0x40605346, &(0x7f0000000680)={0x1, 0x3, {0x3, 0x0, 0x9, 0x3}}) 2018/03/30 23:06:24 executing program 7: perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x9, 0x80000, 0x20) setsockopt$inet6_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f0000000140)={@in={{0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0xa}}}, 0x120, 0x10000, 0x61f3, "d47d1e2733713343424abcd6a49a4cafc6436a3f5f33e03fbe17bdfbee25de60be561068f1c9bc6c64eea0bb82eaefc80e8e0687d40fd98f15ca55d4e6b108797c7b499462a5e6732f440e4e5cec705e"}, 0xd8) mkdir(&(0x7f00000000c0)='./control\x00', 0x0) r1 = inotify_init() inotify_add_watch(r1, &(0x7f0000f1eff6)='./control\x00', 0x220000000009) r2 = syz_open_dev$midi(&(0x7f0000000040)='/dev/midi#\x00', 0x3, 0x20000) ioctl$KVM_GET_MP_STATE(r2, 0x8004ae98, &(0x7f0000000100)) r3 = inotify_init1(0x0) inotify_add_watch(r3, &(0x7f000001eff6)='./control\x00', 0x2000200) setsockopt$netlink_NETLINK_PKTINFO(r0, 0x10e, 0x3, &(0x7f0000000240)=0x2, 0x4) setsockopt$inet6_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, &(0x7f0000000080)="5fce869db66fa225921ad03d773be4ff", 0x10) rmdir(&(0x7f000075aff6)='./control\x00') 2018/03/30 23:06:24 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x200, 0x0) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000680)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$sock_linger(r2, 0x1, 0xd, &(0x7f00000006c0)={0x400, 0x9}, 0x8) perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x0, 0x0) r3 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) mmap(&(0x7f0000000000/0x9d7000)=nil, 0x9d7000, 0x0, 0x10, 0xffffffffffffffff, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x7) perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r4 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r4, &(0x7f0000e5b000)={0x2, 0x4e20, @multicast1=0xe0000001}, 0x10) syz_open_dev$sg(&(0x7f0000000440)='/dev/sg#\x00', 0x0, 0x0) connect$inet(r4, &(0x7f0000000100)={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x11}}, 0x10) r5 = bpf$PROG_LOAD(0x5, &(0x7f0000eb0fb8)={0x1, 0x3, &(0x7f00009ff000)=@framed={{0x18}, [], {0x95}}, &(0x7f00002bf000)='syzkaller\x00', 0x4, 0xb7, &(0x7f00006ab000)=""/183}, 0x48) setsockopt$inet_tcp_int(r4, 0x6, 0x19, &(0x7f0000000240)=0x8, 0x4) r6 = socket$kcm(0x29, 0x2, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r6, 0x89e0, &(0x7f000031aff8)={r4, r5}) ioctl$sock_kcm_SIOCKCMCLONE(r6, 0x89e2, &(0x7f00000002c0)={0xffffffffffffffff}) sendmsg$nl_xfrm(r7, &(0x7f0000000780)={&(0x7f0000000200)={0x10}, 0xc, &(0x7f0000000740)={&(0x7f0000000480)=@updpolicy={0xb8, 0x19, 0x0, 0x0, 0x0, {{@in=@loopback=0x7f000001, @in6=@mcast1={0xff, 0x1, [], 0x1}}}}, 0xffcb}, 0x1}, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(r7, 0x89e1, &(0x7f0000000040)={r4}) r8 = fcntl$getown(r3, 0x9) recvfrom$inet6(r1, &(0x7f0000000140)=""/177, 0xb1, 0x0, &(0x7f0000000080)={0xa, 0x4e23, 0x9, @empty, 0xe38}, 0x1c) r9 = accept4$inet(0xffffffffffffff9c, &(0x7f0000000700)={0x0, 0x0, @broadcast}, &(0x7f0000000740)=0x10, 0x80000) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r9, 0x84, 0x64, &(0x7f0000000780)=[@in6={0xa, 0x4e22, 0xfffffffffffff7e1, @mcast2={0xff, 0x2, [], 0x1}, 0x8}, @in={0x2, 0x4e24, @broadcast=0xffffffff}], 0x2c) ptrace$setregset(0x4205, r8, 0x0, &(0x7f00000005c0)={&(0x7f0000000080)}) ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r10 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x1fffd, 0x0) r11 = syz_open_dev$sndtimer(&(0x7f00000000c0)='/dev/snd/timer\x00', 0x0, 0x0) read(r11, &(0x7f0000ec6000)=""/50, 0x32) fcntl$dupfd(r11, 0x0, r10) 2018/03/30 23:06:24 executing program 0 (fault-call:7 fault-nth:31): mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r0 = syz_open_dev$usbmon(&(0x7f0000000400)='/dev/usbmon#\x00', 0x0, 0x0) r1 = perf_event_open(&(0x7f0000223000)={0x2, 0x78, 0xe3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000001980)={{{@in6=@remote, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast2}, 0x0, @in=@multicast2}}, &(0x7f0000001a80)=0xe8) chown(&(0x7f00000004c0)='./file0\x00', r2, 0x0) mount(&(0x7f00000003c0)='./file0\x00', &(0x7f0000000380)='./file0\x00', &(0x7f0000000300)='cgroup2\x00', 0x0, 0x0) r3 = open$dir(&(0x7f000001bff4)='./file0\x00', 0x0, 0x0) mkdirat(r3, &(0x7f0000000280)='./file0\x00', 0x20) getdents64(r3, &(0x7f00000007c0)=""/250, 0x1015a) dup3(r0, r1, 0x80000) r4 = open$dir(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) renameat2(r4, &(0x7f0000000200)='./file1\x00', 0xffffffffffffffff, &(0x7f0000000240)='./file0\x00', 0xfd1092750066ec78) ioctl$KDGKBMODE(0xffffffffffffffff, 0x4b44, &(0x7f0000000140)) 2018/03/30 23:06:24 executing program 2: perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f00000000c0)='./control\x00', 0x0) inotify_init() r0 = syz_open_dev$sg(&(0x7f000028fff7)='/dev/sg#\x00', 0x0, 0x0) ioctl(r0, 0x4000000000001276, &(0x7f0000000040)) msgget(0x2, 0x0) getsockopt$nfc_llcp(0xffffffffffffffff, 0x118, 0x4, &(0x7f0000000740)=""/223, 0xdf) setsockopt$inet_mreq(r0, 0x0, 0x23, &(0x7f00000002c0)={@empty, @remote={0xac, 0x14, 0x14, 0xbb}}, 0x8) accept4$nfc_llcp(0xffffffffffffffff, &(0x7f0000000940), &(0x7f0000000080)=0x60, 0x800) ioctl$SNDRV_CTL_IOCTL_ELEM_INFO(0xffffffffffffffff, 0xc1105511, &(0x7f0000000100)={{0x0, 0x0, 0x0, 0x0, "386aea20273dc03c3d18dd0dbd4a0ca15f9f580393cc4ec3b8ee256b9aa630224ba64c6ff43ee01d2996c914"}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "eda422cd37591b3a5a7a683380f7e0b9e790c6b72cd0a4f3342f7431c1699a305ca3091bb2320e8df4e298a2cca26637866a68c1426ffbd8a6c7da1d8ea77d9d", &(0x7f00000000c0)='/dev/snd/controlC#\x00', 0x13}) r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000003c0)='/proc/self/net/pfkey\x00', 0x800, 0x0) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) add_key$user(&(0x7f0000000480)='user\x00', &(0x7f00000004c0)={0x73, 0x79, 0x7a, 0x3}, &(0x7f0000000500)="d3238eea76b0470531092a0a77b0b49789a0fc97b8f8b9e23a2a5a5a0c169ed6e83480b4801dbf79db3527904ee3128c05ce2806e210237c36b88ceabe99d8784860e5d0e91fe33d38d0133e056cdd1e2910d57fc5eb1b23db3b60a7077ff33bb6c7445cd258ee25f9187269c22d1ed05acb2b9b599bd285b692257a631754ab9befebd3fdb3167361c24c5c5dcf90e476e052b9d22362c57878cb7205fe361346d6beb77b7844fe94", 0xa9, 0xfffffffffffffffe) ioctl$sock_inet_SIOCSIFADDR(r0, 0x8916, &(0x7f0000000300)={'gretap0\x00', {0x2, 0x4e24, @loopback=0x7f000001}}) keyctl$instantiate_iov(0x14, 0x0, &(0x7f0000000780)=[{&(0x7f0000000840)="edb4a01f68d76905035a4ebdd427d31585a5a650581902b1c077f74ca8f1ce7d3e2f6e1c6760433af9664b3f3bebab3a1a1c4ef86f42c39b758accc1e7637bb18d28248dc7a1719b73388830b162613b17fd02220bd1fe2ad86adb96efcfc672d126ae58f745fba0e7534cdbae947449df767bd76a0c38b5752dcd13f7065edea86dc156c0708e76c2c99a94a95f1e93ff73cb3eb94e06d399cf48aaac7963d13e4b3a6b32bc2b19d5461545dcf3f71bb24442d286421f8d891d77a3c4c1c9435bbdf187682c22ded22b669b7790d05b4894166a2d5f33098cf908a23a2e0671d824e88942fbe0bd1416", 0xea}], 0x1, 0x0) r3 = ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) ioctl$KVM_UNREGISTER_COALESCED_MMIO(r3, 0x4010ae68, &(0x7f0000000000)={0x0, 0x5000}) ioctl$KVM_CREATE_PIT2(r3, 0x4040ae77, &(0x7f0000000440)={0xfffffffffffffff7}) r4 = ioctl$KVM_CREATE_VCPU(r3, 0xae41, 0x0) setsockopt$inet_tcp_TCP_ULP(r1, 0x6, 0x1f, &(0x7f0000000280)='tls\x00', 0x4) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000005fd8)={'vcan0\x00'}) r5 = socket$can_raw(0x1d, 0x3, 0x1) socket$inet6(0xa, 0x0, 0x0) r6 = syz_open_dev$dspn(&(0x7f0000000040)='/dev/dsp#\x00', 0x0, 0x0) connect$vsock_stream(r6, &(0x7f0000000080)={0x28, 0x0, 0xffffffff, @my=0x1}, 0x10) dup2(r2, r4) dup3(r2, r3, 0x0) getsockopt$netrom_NETROM_T1(r5, 0x103, 0x1, &(0x7f0000000640), &(0x7f0000000400)=0x4) execveat(r0, &(0x7f0000000340)='./file0\x00', &(0x7f0000000580)=[&(0x7f0000000500)='proc-\x00', &(0x7f0000000540)='/dev/sg#\x00'], &(0x7f0000000680)=[&(0x7f00000005c0)='/dev/sg#\x00', &(0x7f0000000600)='/dev/sg#\x00'], 0x1d00) 2018/03/30 23:06:24 executing program 3: r0 = socket(0x40000000015, 0x5, 0x0) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000240), 0x4) bind$inet(r0, &(0x7f00008a5ff0)={0x2, 0x4e21, @loopback=0x7f000001}, 0x10) sendto$inet(r0, &(0x7f0000f7db7f)="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", 0x481, 0x0, &(0x7f000069affb)={0x2, 0x4e20, @loopback=0x7f000001}, 0x10) setsockopt$RDS_CONG_MONITOR(r0, 0x114, 0x6, &(0x7f0000000080)=0x1, 0x4) ioctl$int_in(0xffffffffffffffff, 0x5421, &(0x7f0000000040)=0x56d) sendto$inet(r0, &(0x7f00004b3fff), 0x0, 0x0, &(0x7f00002b4000)={0x2, 0x4e20, @loopback=0x7f000001}, 0x3f6) ioctl$sock_inet_tcp_SIOCOUTQ(r0, 0x5411, &(0x7f0000000000)) [ 332.617127] kernel msg: ebtables bug: please report to author: entries_size too small 2018/03/30 23:06:24 executing program 3: r0 = socket(0x40000000015, 0x5, 0x0) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000240), 0x4) bind$inet(r0, &(0x7f00008a5ff0)={0x2, 0x4e21, @loopback=0x7f000001}, 0x10) sendto$inet(r0, &(0x7f0000f7db7f)="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", 0x481, 0x0, &(0x7f000069affb)={0x2, 0x4e20, @loopback=0x7f000001}, 0x10) setsockopt$RDS_CONG_MONITOR(r0, 0x114, 0x6, &(0x7f0000000080)=0x1, 0x4) ioctl$int_in(0xffffffffffffffff, 0x5421, &(0x7f0000000040)=0x56d) sendto$inet(r0, &(0x7f00004b3fff), 0x0, 0x0, &(0x7f00002b4000)={0x2, 0x4e20, @loopback=0x7f000001}, 0x3f6) ioctl$sock_inet_tcp_SIOCOUTQ(r0, 0x5411, &(0x7f0000000000)) 2018/03/30 23:06:24 executing program 6: pipe(&(0x7f0000000940)={0xffffffffffffffff, 0xffffffffffffffff}) accept4$ax25(r0, 0x0, &(0x7f0000000080), 0x80000) r1 = socket$inet(0x2, 0x20000000000003, 0x2) connect$inet(r1, &(0x7f0000000000)={0x2, 0x0, @remote={0xac, 0x14, 0x14, 0xbb}}, 0x10) sendmsg(0xffffffffffffffff, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000140), 0x0, &(0x7f0000000180)=ANY=[]}, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000980)=@broute={'broute\x00', 0x20, 0x3, 0x2d9, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000380], 0x0, &(0x7f00000002c0), &(0x7f0000001000)=ANY=[@ANYBLOB="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"]}, 0x351) setsockopt$inet_int(r1, 0x0, 0x2, &(0x7f00000000c0)=0x7fffffff, 0x4) r2 = socket$rds(0x15, 0x5, 0x0) pipe(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$bt_BT_DEFER_SETUP(r3, 0x112, 0x7, &(0x7f0000000280)=0x100, 0x4) accept$packet(r4, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @remote}, &(0x7f0000000100)=0x14) connect$rds(r2, &(0x7f0000000140)={0x2, 0x4e22, @remote={0xac, 0x14, 0x14, 0xbb}}, 0x10) getsockopt$sock_buf(r2, 0x1, 0x3b, &(0x7f0000000180)=""/83, &(0x7f0000000200)=0x53) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000a00)=@filter={'filter\x00', 0xe, 0x4, 0x5a0, 0xffffffff, 0x0, 0xf0, 0xf0, 0xffffffff, 0xffffffff, 0x4d0, 0x4d0, 0x4d0, 0xffffffff, 0x4, &(0x7f0000000300), {[{{@ipv6={@ipv4={[], [0xff, 0xff], @rand_addr=0x80000001}, @dev={0xfe, 0x80, [], 0x16}, [0x0, 0xffffff00, 0xff, 0xffffffff], [0x0, 0xff000000, 0xffffffff], 'ipddp0\x00', 'ip_vti0\x00', {}, {0xff}, 0x6c, 0x2bf}, 0x0, 0xc8, 0xf0}, @REJECT={0x28, 'REJECT\x00', 0x0, {0x7}}}, {{@ipv6={@remote={0xfe, 0x80, [], 0xbb}, @remote={0xfe, 0x80, [], 0xbb}, [0xff000000, 0xffffffff, 0xffffff00, 0xff], [0xff, 0xffffffff, 0x0, 0xff000000], 'syzkaller1\x00', 'eql\x00', {}, {}, 0x62, 0x0, 0x4, 0x1}, 0x0, 0x120, 0x148, 0x0, {}, [@common=@frag={0x30, 'frag\x00', 0x0, {0x7ff, 0x7, 0x1, 0x2}}, @common=@hl={0x28, 'hl\x00', 0x0, {0x3, 0x7fff}}]}, @REJECT={0x28, 'REJECT\x00', 0x0, {0x7}}}, {{@ipv6={@dev={0xfe, 0x80, [], 0xc}, @loopback={0x0, 0x1}, [0xffffffff, 0xffffffff, 0xff000000, 0xff000000], [0xff, 0x0, 0xff, 0xffffff00], 'irlan0\x00', 'vcan0\x00', {0xff}, {}, 0x3b, 0xffffffffffffab69, 0x2, 0x30}, 0x0, 0x250, 0x298, 0x0, {}, [@common=@srh={0x30, 'srh\x00', 0x0, {0xbb, 0x1, 0x3, 0x6, 0xffffffffffffffc0, 0x80}}, @common=@inet=@policy={0x158, 'policy\x00', 0x0, {[{@ipv4, [0xffffffff, 0xff0000ff, 0xff000000, 0xffffffff], @ipv4=@multicast1=0xe0000001, [0xffffffff, 0xffffffff, 0xff000000, 0xffffff00], 0x4d5, 0x3500, 0x5c, 0x0, 0x10, 0xf}, {@ipv6=@dev={0xfe, 0x80, [], 0x11}, [0x0, 0xff000000, 0xff0000ff, 0xffffff00], @ipv4=@multicast1=0xe0000001, [0xffffffff, 0x0, 0x0, 0xffffffff], 0x4d5, 0x3500, 0x77, 0x1, 0x0, 0x1d}, {@ipv6=@mcast1={0xff, 0x1, [], 0x1}, [0xff000000, 0xffffffff, 0xffffff00, 0xff], @ipv4=@multicast2=0xe0000002, [0xffffffff, 0x0, 0xffffff00, 0xffffffff], 0x4d3, 0x3503, 0x7f, 0x0, 0x1, 0x19}, {@ipv4=@local={0xac, 0x14, 0x14, 0xaa}, [0x0, 0xff, 0x0, 0xff0000ff], @ipv6=@local={0xfe, 0x80, [], 0xaa}, [0xffffffff, 0xffffffff, 0xff, 0xff0000ff], 0x4d4, 0x3505, 0x0, 0x1, 0x1f, 0x10}], 0x0, 0x3}}]}, @common=@unspec=@LED={0x48, 'LED\x00', 0x0, {'syz1\x00', 0x0, 0x0, 0x8}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28, '\x00', 0x0, 0xfffffffffffffffe}}}}, 0x600) socket(0x1, 0xa, 0x7) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_TIMER(r4, 0x40605346, &(0x7f0000000680)={0x1, 0x3, {0x3, 0x0, 0x9, 0x3}}) [ 332.701403] FAULT_INJECTION: forcing a failure. [ 332.701403] name failslab, interval 1, probability 0, space 0, times 0 [ 332.712813] CPU: 0 PID: 26281 Comm: syz-executor0 Not tainted 4.16.0-rc7+ #372 [ 332.720193] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 332.725205] kernel msg: ebtables bug: please report to author: entries_size too small [ 332.729542] Call Trace: [ 332.729567] dump_stack+0x194/0x24d [ 332.729586] ? arch_local_irq_restore+0x53/0x53 [ 332.729614] should_fail+0x8c0/0xa40 [ 332.752122] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 332.757250] ? kasan_kmalloc+0xad/0xe0 [ 332.761151] ? kmem_cache_alloc_node_trace+0x150/0x760 [ 332.766445] ? alloc_fair_sched_group+0x1f0/0x530 [ 332.771301] ? cpu_cgroup_css_alloc+0xe/0x30 [ 332.775725] ? vfs_mkdir+0x390/0x600 [ 332.779449] ? SyS_mkdirat+0x22b/0x2b0 [ 332.783351] ? do_syscall_64+0x281/0x940 [ 332.787435] ? find_held_lock+0x35/0x1d0 [ 332.791518] ? __lock_is_held+0xb6/0x140 [ 332.795603] ? check_same_owner+0x320/0x320 [ 332.799949] ? rcu_note_context_switch+0x710/0x710 [ 332.801693] kernel msg: ebtables bug: please report to author: entries_size too small [ 332.804894] should_failslab+0xec/0x120 [ 332.804911] kmem_cache_alloc_node_trace+0x5a/0x760 [ 332.804924] ? __refill_cfs_bandwidth_runtime+0x120/0x120 [ 332.804936] ? sched_create_group+0x22/0x70 [ 332.831717] ? find_next_bit+0xcc/0x100 [ 332.835719] alloc_fair_sched_group+0x267/0x530 [ 332.840410] sched_create_group+0x35/0x70 [ 332.845235] cpu_cgroup_css_alloc+0xe/0x30 2018/03/30 23:06:24 executing program 6: pipe(&(0x7f0000000940)={0xffffffffffffffff, 0xffffffffffffffff}) accept4$ax25(r0, 0x0, &(0x7f0000000080), 0x80000) r1 = socket$inet(0x2, 0x20000000000003, 0x2) connect$inet(r1, &(0x7f0000000000)={0x2, 0x0, @remote={0xac, 0x14, 0x14, 0xbb}}, 0x10) sendmsg(0xffffffffffffffff, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000140), 0x0, &(0x7f0000000180)=ANY=[]}, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000980)=@broute={'broute\x00', 0x20, 0x3, 0x2d9, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000380], 0x0, &(0x7f00000002c0), &(0x7f0000001000)=ANY=[@ANYBLOB="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"]}, 0x351) setsockopt$inet_int(r1, 0x0, 0x2, &(0x7f00000000c0)=0x7fffffff, 0x4) r2 = socket$rds(0x15, 0x5, 0x0) pipe(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$bt_BT_DEFER_SETUP(r3, 0x112, 0x7, &(0x7f0000000280)=0x100, 0x4) accept$packet(r4, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @remote}, &(0x7f0000000100)=0x14) connect$rds(r2, &(0x7f0000000140)={0x2, 0x4e22, @remote={0xac, 0x14, 0x14, 0xbb}}, 0x10) getsockopt$sock_buf(r2, 0x1, 0x3b, &(0x7f0000000180)=""/83, &(0x7f0000000200)=0x53) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000a00)=@filter={'filter\x00', 0xe, 0x4, 0x5a0, 0xffffffff, 0x0, 0xf0, 0xf0, 0xffffffff, 0xffffffff, 0x4d0, 0x4d0, 0x4d0, 0xffffffff, 0x4, &(0x7f0000000300), {[{{@ipv6={@ipv4={[], [0xff, 0xff], @rand_addr=0x80000001}, @dev={0xfe, 0x80, [], 0x16}, [0x0, 0xffffff00, 0xff, 0xffffffff], [0x0, 0xff000000, 0xffffffff], 'ipddp0\x00', 'ip_vti0\x00', {}, {0xff}, 0x6c, 0x2bf}, 0x0, 0xc8, 0xf0}, @REJECT={0x28, 'REJECT\x00', 0x0, {0x7}}}, {{@ipv6={@remote={0xfe, 0x80, [], 0xbb}, @remote={0xfe, 0x80, [], 0xbb}, [0xff000000, 0xffffffff, 0xffffff00, 0xff], [0xff, 0xffffffff, 0x0, 0xff000000], 'syzkaller1\x00', 'eql\x00', {}, {}, 0x62, 0x0, 0x4, 0x1}, 0x0, 0x120, 0x148, 0x0, {}, [@common=@frag={0x30, 'frag\x00', 0x0, {0x7ff, 0x7, 0x1, 0x2}}, @common=@hl={0x28, 'hl\x00', 0x0, {0x3, 0x7fff}}]}, @REJECT={0x28, 'REJECT\x00', 0x0, {0x7}}}, {{@ipv6={@dev={0xfe, 0x80, [], 0xc}, @loopback={0x0, 0x1}, [0xffffffff, 0xffffffff, 0xff000000, 0xff000000], [0xff, 0x0, 0xff, 0xffffff00], 'irlan0\x00', 'vcan0\x00', {0xff}, {}, 0x3b, 0xffffffffffffab69, 0x2, 0x30}, 0x0, 0x250, 0x298, 0x0, {}, [@common=@srh={0x30, 'srh\x00', 0x0, {0xbb, 0x1, 0x3, 0x6, 0xffffffffffffffc0, 0x80}}, @common=@inet=@policy={0x158, 'policy\x00', 0x0, {[{@ipv4, [0xffffffff, 0xff0000ff, 0xff000000, 0xffffffff], @ipv4=@multicast1=0xe0000001, [0xffffffff, 0xffffffff, 0xff000000, 0xffffff00], 0x4d5, 0x3500, 0x5c, 0x0, 0x10, 0xf}, {@ipv6=@dev={0xfe, 0x80, [], 0x11}, [0x0, 0xff000000, 0xff0000ff, 0xffffff00], @ipv4=@multicast1=0xe0000001, [0xffffffff, 0x0, 0x0, 0xffffffff], 0x4d5, 0x3500, 0x77, 0x1, 0x0, 0x1d}, {@ipv6=@mcast1={0xff, 0x1, [], 0x1}, [0xff000000, 0xffffffff, 0xffffff00, 0xff], @ipv4=@multicast2=0xe0000002, [0xffffffff, 0x0, 0xffffff00, 0xffffffff], 0x4d3, 0x3503, 0x7f, 0x0, 0x1, 0x19}, {@ipv4=@local={0xac, 0x14, 0x14, 0xaa}, [0x0, 0xff, 0x0, 0xff0000ff], @ipv6=@local={0xfe, 0x80, [], 0xaa}, [0xffffffff, 0xffffffff, 0xff, 0xff0000ff], 0x4d4, 0x3505, 0x0, 0x1, 0x1f, 0x10}], 0x0, 0x3}}]}, @common=@unspec=@LED={0x48, 'LED\x00', 0x0, {'syz1\x00', 0x0, 0x0, 0x8}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28, '\x00', 0x0, 0xfffffffffffffffe}}}}, 0x600) socket(0x1, 0xa, 0x7) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_TIMER(r4, 0x40605346, &(0x7f0000000680)={0x1, 0x3, {0x3, 0x0, 0x9, 0x3}}) 2018/03/30 23:06:24 executing program 3: r0 = socket(0x40000000015, 0x5, 0x0) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000240), 0x4) bind$inet(r0, &(0x7f00008a5ff0)={0x2, 0x4e21, @loopback=0x7f000001}, 0x10) sendto$inet(r0, &(0x7f0000f7db7f)="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", 0x481, 0x0, &(0x7f000069affb)={0x2, 0x4e20, @loopback=0x7f000001}, 0x10) setsockopt$RDS_CONG_MONITOR(r0, 0x114, 0x6, &(0x7f0000000080)=0x1, 0x4) ioctl$int_in(r0, 0x0, &(0x7f0000000040)=0x56d) sendto$inet(r0, &(0x7f00004b3fff), 0x0, 0x0, &(0x7f00002b4000)={0x2, 0x4e20, @loopback=0x7f000001}, 0x3f6) ioctl$sock_inet_tcp_SIOCOUTQ(r0, 0x5411, &(0x7f0000000000)) [ 332.849486] cgroup_apply_control_enable+0x44d/0xbc0 [ 332.854615] ? cgroup_propagate_control+0x570/0x570 [ 332.859654] ? css_populate_dir+0x289/0x420 [ 332.863993] cgroup_mkdir+0x56f/0xfc0 [ 332.867801] ? __lock_is_held+0xb6/0x140 [ 332.871881] ? cgroup_destroy_locked+0x750/0x750 [ 332.876647] ? rcu_read_lock_sched_held+0x108/0x120 [ 332.881676] ? kmem_cache_free+0x258/0x2a0 [ 332.885922] ? set_nlink+0xc1/0x160 [ 332.889561] ? debug_lockdep_rcu_enabled+0x77/0x90 [ 332.894495] ? generic_permission+0x105/0x3c0 [ 332.899001] ? cgroup_destroy_locked+0x750/0x750 [ 332.903767] kernfs_iop_mkdir+0x153/0x1e0 [ 332.907923] vfs_mkdir+0x390/0x600 [ 332.911476] SyS_mkdirat+0x22b/0x2b0 [ 332.915199] ? SyS_mknod+0x480/0x480 [ 332.918913] ? trace_hardirqs_on+0xd/0x10 [ 332.923067] ? do_syscall_64+0xb7/0x940 [ 332.927043] ? SyS_mknod+0x480/0x480 [ 332.930760] do_syscall_64+0x281/0x940 [ 332.934653] ? vmalloc_sync_all+0x30/0x30 [ 332.938806] ? _raw_spin_unlock_irq+0x27/0x70 [ 332.943298] ? finish_task_switch+0x1c1/0x7e0 [ 332.947774] ? syscall_return_slowpath+0x550/0x550 [ 332.952685] ? syscall_return_slowpath+0x2ac/0x550 [ 332.957607] ? prepare_exit_to_usermode+0x350/0x350 [ 332.962615] ? entry_SYSCALL_64_after_hwframe+0x52/0xb7 [ 332.967967] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 332.972797] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 332.977963] RIP: 0033:0x454e79 [ 332.981130] RSP: 002b:00007f016b92fc68 EFLAGS: 00000246 ORIG_RAX: 0000000000000102 [ 332.988837] RAX: ffffffffffffffda RBX: 00007f016b9306d4 RCX: 0000000000454e79 [ 332.996092] RDX: 0000000000000020 RSI: 0000000020000280 RDI: 0000000000000015 [ 333.003341] RBP: 000000000072bea0 R08: 0000000000000000 R09: 0000000000000000 [ 333.010594] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000016 [ 333.017848] R13: 00000000000003eb R14: 00000000006f7ea8 R15: 000000000000001f 2018/03/30 23:06:25 executing program 6: pipe(&(0x7f0000000940)={0xffffffffffffffff, 0xffffffffffffffff}) accept4$ax25(r0, 0x0, &(0x7f0000000080), 0x80000) r1 = socket$inet(0x2, 0x20000000000003, 0x2) connect$inet(r1, &(0x7f0000000000)={0x2, 0x0, @remote={0xac, 0x14, 0x14, 0xbb}}, 0x10) sendmsg(0xffffffffffffffff, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000140), 0x0, &(0x7f0000000180)=ANY=[]}, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000980)=@broute={'broute\x00', 0x20, 0x3, 0x2d9, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000380], 0x0, &(0x7f00000002c0), &(0x7f0000001000)=ANY=[@ANYBLOB="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"]}, 0x351) setsockopt$inet_int(r1, 0x0, 0x2, &(0x7f00000000c0)=0x7fffffff, 0x4) r2 = socket$rds(0x15, 0x5, 0x0) pipe(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$bt_BT_DEFER_SETUP(r3, 0x112, 0x7, &(0x7f0000000280)=0x100, 0x4) accept$packet(r4, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @remote}, &(0x7f0000000100)=0x14) connect$rds(r2, &(0x7f0000000140)={0x2, 0x4e22, @remote={0xac, 0x14, 0x14, 0xbb}}, 0x10) getsockopt$sock_buf(r2, 0x1, 0x3b, &(0x7f0000000180)=""/83, &(0x7f0000000200)=0x53) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000a00)=@filter={'filter\x00', 0xe, 0x4, 0x5a0, 0xffffffff, 0x0, 0xf0, 0xf0, 0xffffffff, 0xffffffff, 0x4d0, 0x4d0, 0x4d0, 0xffffffff, 0x4, &(0x7f0000000300), {[{{@ipv6={@ipv4={[], [0xff, 0xff], @rand_addr=0x80000001}, @dev={0xfe, 0x80, [], 0x16}, [0x0, 0xffffff00, 0xff, 0xffffffff], [0x0, 0xff000000, 0xffffffff], 'ipddp0\x00', 'ip_vti0\x00', {}, {0xff}, 0x6c, 0x2bf}, 0x0, 0xc8, 0xf0}, @REJECT={0x28, 'REJECT\x00', 0x0, {0x7}}}, {{@ipv6={@remote={0xfe, 0x80, [], 0xbb}, @remote={0xfe, 0x80, [], 0xbb}, [0xff000000, 0xffffffff, 0xffffff00, 0xff], [0xff, 0xffffffff, 0x0, 0xff000000], 'syzkaller1\x00', 'eql\x00', {}, {}, 0x62, 0x0, 0x4, 0x1}, 0x0, 0x120, 0x148, 0x0, {}, [@common=@frag={0x30, 'frag\x00', 0x0, {0x7ff, 0x7, 0x1, 0x2}}, @common=@hl={0x28, 'hl\x00', 0x0, {0x3, 0x7fff}}]}, @REJECT={0x28, 'REJECT\x00', 0x0, {0x7}}}, {{@ipv6={@dev={0xfe, 0x80, [], 0xc}, @loopback={0x0, 0x1}, [0xffffffff, 0xffffffff, 0xff000000, 0xff000000], [0xff, 0x0, 0xff, 0xffffff00], 'irlan0\x00', 'vcan0\x00', {0xff}, {}, 0x3b, 0xffffffffffffab69, 0x2, 0x30}, 0x0, 0x250, 0x298, 0x0, {}, [@common=@srh={0x30, 'srh\x00', 0x0, {0xbb, 0x1, 0x3, 0x6, 0xffffffffffffffc0, 0x80}}, @common=@inet=@policy={0x158, 'policy\x00', 0x0, {[{@ipv4, [0xffffffff, 0xff0000ff, 0xff000000, 0xffffffff], @ipv4=@multicast1=0xe0000001, [0xffffffff, 0xffffffff, 0xff000000, 0xffffff00], 0x4d5, 0x3500, 0x5c, 0x0, 0x10, 0xf}, {@ipv6=@dev={0xfe, 0x80, [], 0x11}, [0x0, 0xff000000, 0xff0000ff, 0xffffff00], @ipv4=@multicast1=0xe0000001, [0xffffffff, 0x0, 0x0, 0xffffffff], 0x4d5, 0x3500, 0x77, 0x1, 0x0, 0x1d}, {@ipv6=@mcast1={0xff, 0x1, [], 0x1}, [0xff000000, 0xffffffff, 0xffffff00, 0xff], @ipv4=@multicast2=0xe0000002, [0xffffffff, 0x0, 0xffffff00, 0xffffffff], 0x4d3, 0x3503, 0x7f, 0x0, 0x1, 0x19}, {@ipv4=@local={0xac, 0x14, 0x14, 0xaa}, [0x0, 0xff, 0x0, 0xff0000ff], @ipv6=@local={0xfe, 0x80, [], 0xaa}, [0xffffffff, 0xffffffff, 0xff, 0xff0000ff], 0x4d4, 0x3505, 0x0, 0x1, 0x1f, 0x10}], 0x0, 0x3}}]}, @common=@unspec=@LED={0x48, 'LED\x00', 0x0, {'syz1\x00', 0x0, 0x0, 0x8}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28, '\x00', 0x0, 0xfffffffffffffffe}}}}, 0x600) socket(0x1, 0xa, 0x7) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_TIMER(r4, 0x40605346, &(0x7f0000000680)={0x1, 0x3, {0x3, 0x0, 0x9, 0x3}}) 2018/03/30 23:06:25 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x200, 0x0) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000680)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$sock_linger(r2, 0x1, 0xd, &(0x7f00000006c0)={0x400, 0x9}, 0x8) perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x0, 0x0) r3 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) mmap(&(0x7f0000000000/0x9d7000)=nil, 0x9d7000, 0x0, 0x10, 0xffffffffffffffff, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x7) perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r4 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r4, &(0x7f0000e5b000)={0x2, 0x4e20, @multicast1=0xe0000001}, 0x10) syz_open_dev$sg(&(0x7f0000000440)='/dev/sg#\x00', 0x0, 0x0) connect$inet(r4, &(0x7f0000000100)={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x11}}, 0x10) r5 = bpf$PROG_LOAD(0x5, &(0x7f0000eb0fb8)={0x1, 0x3, &(0x7f00009ff000)=@framed={{0x18}, [], {0x95}}, &(0x7f00002bf000)='syzkaller\x00', 0x4, 0xb7, &(0x7f00006ab000)=""/183}, 0x48) setsockopt$inet_tcp_int(r4, 0x6, 0x19, &(0x7f0000000240)=0x8, 0x4) r6 = socket$kcm(0x29, 0x2, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r6, 0x89e0, &(0x7f000031aff8)={r4, r5}) ioctl$sock_kcm_SIOCKCMCLONE(r6, 0x89e2, &(0x7f00000002c0)={0xffffffffffffffff}) sendmsg$nl_xfrm(r7, &(0x7f0000000780)={&(0x7f0000000200)={0x10}, 0xc, &(0x7f0000000740)={&(0x7f0000000480)=@updpolicy={0xb8, 0x19, 0x0, 0x0, 0x0, {{@in=@loopback=0x7f000001, @in6=@mcast1={0xff, 0x1, [], 0x1}}}}, 0xffcb}, 0x1}, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(r7, 0x89e1, &(0x7f0000000040)={r4}) r8 = fcntl$getown(r3, 0x9) recvfrom$inet6(r1, &(0x7f0000000140)=""/177, 0xb1, 0x0, &(0x7f0000000080)={0xa, 0x4e23, 0x9, @empty, 0xe38}, 0x1c) r9 = accept4$inet(0xffffffffffffff9c, &(0x7f0000000700)={0x0, 0x0, @broadcast}, &(0x7f0000000740)=0x10, 0x80000) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r9, 0x84, 0x64, &(0x7f0000000780)=[@in6={0xa, 0x4e22, 0xfffffffffffff7e1, @mcast2={0xff, 0x2, [], 0x1}, 0x8}, @in={0x2, 0x4e24, @broadcast=0xffffffff}], 0x2c) ptrace$setregset(0x4205, r8, 0x0, &(0x7f00000005c0)={&(0x7f0000000080)}) ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r10 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x1fffd, 0x0) r11 = syz_open_dev$sndtimer(&(0x7f00000000c0)='/dev/snd/timer\x00', 0x0, 0x0) read(r11, &(0x7f0000ec6000)=""/50, 0x32) fcntl$dupfd(r11, 0x0, r10) 2018/03/30 23:06:25 executing program 7: r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f00000000c0)='./control\x00', 0x0) r1 = inotify_init() inotify_add_watch(r1, &(0x7f0000f1eff6)='./control\x00', 0x220000000009) r2 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000100)={&(0x7f0000000040)='./file0\x00', 0x0, 0x18}, 0x10) r3 = openat$rfkill(0xffffffffffffff9c, &(0x7f0000000140)='/dev/rfkill\x00', 0x400000, 0x0) getsockopt$inet_mreqn(0xffffffffffffff9c, 0x0, 0x27, &(0x7f00000002c0)={@local, @multicast1, 0x0}, &(0x7f0000000300)=0xc) bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x3, 0x12, &(0x7f0000000180)=@raw=[@initr0={0x18, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x1000}, @alu={0x7, 0x8, 0xa, 0x1, 0xe, 0x10, 0x4}, @ldst={0x0, 0x2, 0x6, 0xf, 0xe, 0xfffffffc, 0xfffffffffffffff0}, @map={0x18, 0xf, 0x1, 0x0, r0}, @ldst={0x3, 0x2, 0x0, 0xf, 0x5, 0xffffffc0, 0xffffffffffffffff}, @map={0x18, 0x7, 0x1, 0x0, r2}, @jmp={0x5, 0x4, 0x5, 0xa, 0x7, 0x0, 0x8}, @map={0x18, 0x0, 0x1, 0x0, r3}, @jmp={0x5, 0x0, 0x5, 0x0, 0x7, 0xc, 0xfffffffffffffffd}], &(0x7f0000000240)='syzkaller\x00', 0x0, 0x18, &(0x7f0000000280)=""/24, 0x41100, 0x1, [], r4}, 0x48) r5 = inotify_init1(0x0) inotify_add_watch(r5, &(0x7f000001eff6)='./control\x00', 0x2000200) setsockopt$inet6_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, &(0x7f0000000080)="5fce869db66fa225921ad03d773be4ff", 0x10) rmdir(&(0x7f000075aff6)='./control\x00') 2018/03/30 23:06:25 executing program 3: r0 = socket(0x40000000015, 0x5, 0x0) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000240), 0x4) bind$inet(r0, &(0x7f00008a5ff0)={0x2, 0x4e21, @loopback=0x7f000001}, 0x10) sendto$inet(r0, &(0x7f0000f7db7f)="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", 0x481, 0x0, &(0x7f000069affb)={0x2, 0x4e20, @loopback=0x7f000001}, 0x10) setsockopt$RDS_CONG_MONITOR(r0, 0x114, 0x6, &(0x7f0000000080)=0x1, 0x4) ioctl$int_in(r0, 0x0, &(0x7f0000000040)=0x56d) sendto$inet(r0, &(0x7f00004b3fff), 0x0, 0x0, &(0x7f00002b4000)={0x2, 0x4e20, @loopback=0x7f000001}, 0x3f6) ioctl$sock_inet_tcp_SIOCOUTQ(r0, 0x5411, &(0x7f0000000000)) 2018/03/30 23:06:25 executing program 4: mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount(&(0x7f000000a000)='./file0\x00', &(0x7f0000026ff8)='./file0\x00', &(0x7f000000c000)='ramfs\x00', 0x0, &(0x7f000000a000)) mkdir(&(0x7f0000000000)='./file1\x00', 0x0) r0 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000240)='/dev/qat_adf_ctl\x00', 0x8000, 0x0) symlinkat(&(0x7f0000000140)='./file1\x00', r0, &(0x7f0000000280)='.') mount(&(0x7f0000000040)='./file0\x00', &(0x7f0000903000)='./file0\x00', &(0x7f0000811ffa)='bdev\x00', 0x100000, &(0x7f00000003c0)="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") r1 = dup(0xffffffffffffffff) r2 = syz_open_dev$vcsn(&(0x7f00000000c0)='/dev/vcs#\x00', 0x2, 0x20800) renameat(r1, &(0x7f0000000080)='./file1/file0\x00', r2, &(0x7f0000000100)='./file1\x00') mount(&(0x7f0000fb6000)='./file0\x00', &(0x7f0000d78000)='.', &(0x7f0000fdb000)='ubifs\x00', 0x1003, 0x0) mount(&(0x7f00002b9ff8)='./file0\x00', &(0x7f0000cbeff8)='./file0\x00', &(0x7f00005f7ffa)='ramfs\x00', 0x80000, &(0x7f000002f000)) mount(&(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)='./file1\x00', &(0x7f0000000200)='anon_inodefs\x00', 0x2000, &(0x7f0000000240)) mount(&(0x7f0000adcff8)='./file0\x00', &(0x7f0000e08fff)='.', &(0x7f00005e9000)='cifs\x00', 0x2000, &(0x7f0000ad5000)) 2018/03/30 23:06:25 executing program 5: mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) perf_event_open(&(0x7f0000223000)={0x2, 0x78, 0xe3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000001980)={{{@in6=@remote, @in=@multicast1}}, {{@in=@multicast2}, 0x0, @in=@multicast2}}, &(0x7f0000001a80)=0xe8) mount(&(0x7f00000003c0)='./file0\x00', &(0x7f0000000380)='./file0\x00', &(0x7f0000000300)='cgroup2\x00', 0x0, 0x0) r0 = open$dir(&(0x7f000001bff4)='./file0\x00', 0x0, 0x0) mkdirat(0xffffffffffffffff, &(0x7f0000000280)='./file0\x00', 0x20) r1 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040)='/dev/hwrng\x00', 0x400000, 0x0) ioctl$TIOCGSID(r1, 0x5429, &(0x7f00000000c0)) unlinkat(r0, &(0x7f0000000080)='./file0\x00', 0x200) 2018/03/30 23:06:25 executing program 2: perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f00000000c0)='./control\x00', 0x0) inotify_init() r0 = syz_open_dev$sg(&(0x7f000028fff7)='/dev/sg#\x00', 0x0, 0x0) ioctl(r0, 0x4000000000001276, &(0x7f0000000040)) msgget(0x2, 0x0) getsockopt$nfc_llcp(0xffffffffffffffff, 0x118, 0x4, &(0x7f0000000740)=""/223, 0xdf) setsockopt$inet_mreq(r0, 0x0, 0x23, &(0x7f00000002c0)={@empty, @remote={0xac, 0x14, 0x14, 0xbb}}, 0x8) accept4$nfc_llcp(0xffffffffffffffff, &(0x7f0000000940), &(0x7f0000000080)=0x60, 0x800) ioctl$SNDRV_CTL_IOCTL_ELEM_INFO(0xffffffffffffffff, 0xc1105511, &(0x7f0000000100)={{0x0, 0x0, 0x0, 0x0, "386aea20273dc03c3d18dd0dbd4a0ca15f9f580393cc4ec3b8ee256b9aa630224ba64c6ff43ee01d2996c914"}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "eda422cd37591b3a5a7a683380f7e0b9e790c6b72cd0a4f3342f7431c1699a305ca3091bb2320e8df4e298a2cca26637866a68c1426ffbd8a6c7da1d8ea77d9d", &(0x7f00000000c0)='/dev/snd/controlC#\x00', 0x13}) r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000003c0)='/proc/self/net/pfkey\x00', 0x800, 0x0) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) add_key$user(&(0x7f0000000480)='user\x00', &(0x7f00000004c0)={0x73, 0x79, 0x7a, 0x3}, &(0x7f0000000500)="d3238eea76b0470531092a0a77b0b49789a0fc97b8f8b9e23a2a5a5a0c169ed6e83480b4801dbf79db3527904ee3128c05ce2806e210237c36b88ceabe99d8784860e5d0e91fe33d38d0133e056cdd1e2910d57fc5eb1b23db3b60a7077ff33bb6c7445cd258ee25f9187269c22d1ed05acb2b9b599bd285b692257a631754ab9befebd3fdb3167361c24c5c5dcf90e476e052b9d22362c57878cb7205fe361346d6beb77b7844fe94", 0xa9, 0xfffffffffffffffe) ioctl$sock_inet_SIOCSIFADDR(r0, 0x8916, &(0x7f0000000300)={'gretap0\x00', {0x2, 0x4e24, @loopback=0x7f000001}}) keyctl$instantiate_iov(0x14, 0x0, &(0x7f0000000780)=[{&(0x7f0000000840)="edb4a01f68d76905035a4ebdd427d31585a5a650581902b1c077f74ca8f1ce7d3e2f6e1c6760433af9664b3f3bebab3a1a1c4ef86f42c39b758accc1e7637bb18d28248dc7a1719b73388830b162613b17fd02220bd1fe2ad86adb96efcfc672d126ae58f745fba0e7534cdbae947449df767bd76a0c38b5752dcd13f7065edea86dc156c0708e76c2c99a94a95f1e93ff73cb3eb94e06d399cf48aaac7963d13e4b3a6b32bc2b19d5461545dcf3f71bb24442d286421f8d891d77a3c4c1c9435bbdf187682c22ded22b669b7790d05b4894166a2d5f33098cf908a23a2e0671d824e88942fbe0bd1416", 0xea}], 0x1, 0x0) r3 = ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) ioctl$KVM_UNREGISTER_COALESCED_MMIO(r3, 0x4010ae68, &(0x7f0000000000)={0x0, 0x5000}) ioctl$KVM_CREATE_PIT2(r3, 0x4040ae77, &(0x7f0000000440)={0xfffffffffffffff7}) r4 = ioctl$KVM_CREATE_VCPU(r3, 0xae41, 0x0) setsockopt$inet_tcp_TCP_ULP(r1, 0x6, 0x1f, &(0x7f0000000280)='tls\x00', 0x4) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000005fd8)={'vcan0\x00'}) r5 = socket$can_raw(0x1d, 0x3, 0x1) socket$inet6(0xa, 0x0, 0x0) r6 = syz_open_dev$dspn(&(0x7f0000000040)='/dev/dsp#\x00', 0x0, 0x0) connect$vsock_stream(r6, &(0x7f0000000080)={0x28, 0x0, 0xffffffff, @my=0x1}, 0x10) dup2(r2, r4) dup3(r2, r3, 0x0) getsockopt$netrom_NETROM_T1(r5, 0x103, 0x1, &(0x7f0000000640), &(0x7f0000000400)=0x4) execveat(r0, &(0x7f0000000340)='./file0\x00', &(0x7f0000000580)=[&(0x7f0000000500)='proc-\x00', &(0x7f0000000540)='/dev/sg#\x00'], &(0x7f0000000680)=[&(0x7f00000005c0)='/dev/sg#\x00', &(0x7f0000000600)='/dev/sg#\x00'], 0x1d00) 2018/03/30 23:06:25 executing program 0 (fault-call:7 fault-nth:32): mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r0 = syz_open_dev$usbmon(&(0x7f0000000400)='/dev/usbmon#\x00', 0x0, 0x0) r1 = perf_event_open(&(0x7f0000223000)={0x2, 0x78, 0xe3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000001980)={{{@in6=@remote, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast2}, 0x0, @in=@multicast2}}, &(0x7f0000001a80)=0xe8) chown(&(0x7f00000004c0)='./file0\x00', r2, 0x0) mount(&(0x7f00000003c0)='./file0\x00', &(0x7f0000000380)='./file0\x00', &(0x7f0000000300)='cgroup2\x00', 0x0, 0x0) r3 = open$dir(&(0x7f000001bff4)='./file0\x00', 0x0, 0x0) mkdirat(r3, &(0x7f0000000280)='./file0\x00', 0x20) getdents64(r3, &(0x7f00000007c0)=""/250, 0x1015a) dup3(r0, r1, 0x80000) r4 = open$dir(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) renameat2(r4, &(0x7f0000000200)='./file1\x00', 0xffffffffffffffff, &(0x7f0000000240)='./file0\x00', 0xfd1092750066ec78) ioctl$KDGKBMODE(0xffffffffffffffff, 0x4b44, &(0x7f0000000140)) [ 333.583724] kernel msg: ebtables bug: please report to author: entries_size too small [ 333.667900] FAULT_INJECTION: forcing a failure. [ 333.667900] name failslab, interval 1, probability 0, space 0, times 0 [ 333.679767] CPU: 1 PID: 26323 Comm: syz-executor0 Not tainted 4.16.0-rc7+ #372 [ 333.687121] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 333.696459] Call Trace: [ 333.699042] dump_stack+0x194/0x24d [ 333.702651] ? arch_local_irq_restore+0x53/0x53 [ 333.707298] ? __save_stack_trace+0x7e/0xd0 [ 333.711602] should_fail+0x8c0/0xa40 [ 333.715299] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 333.720383] ? kasan_kmalloc+0xad/0xe0 [ 333.724249] ? kmem_cache_alloc_node_trace+0x150/0x760 [ 333.729501] ? alloc_fair_sched_group+0x267/0x530 [ 333.734322] ? sched_create_group+0x35/0x70 [ 333.738620] ? cpu_cgroup_css_alloc+0xe/0x30 [ 333.743011] ? vfs_mkdir+0x390/0x600 [ 333.746710] ? SyS_mkdirat+0x22b/0x2b0 [ 333.750573] ? do_syscall_64+0x281/0x940 [ 333.754617] ? find_held_lock+0x35/0x1d0 [ 333.758668] ? __lock_is_held+0xb6/0x140 [ 333.762711] ? check_same_owner+0x320/0x320 [ 333.767015] ? rcu_note_context_switch+0x710/0x710 [ 333.771933] should_failslab+0xec/0x120 [ 333.775891] kmem_cache_alloc_node_trace+0x5a/0x760 [ 333.780885] ? unregister_fair_sched_group+0x5e0/0x5e0 [ 333.786234] ? find_next_bit+0xcc/0x100 [ 333.790193] alloc_fair_sched_group+0x1f0/0x530 [ 333.794848] sched_create_group+0x35/0x70 [ 333.798976] cpu_cgroup_css_alloc+0xe/0x30 [ 333.803196] cgroup_apply_control_enable+0x44d/0xbc0 [ 333.808290] ? cgroup_propagate_control+0x570/0x570 [ 333.813293] ? css_populate_dir+0x289/0x420 [ 333.817597] cgroup_mkdir+0x56f/0xfc0 [ 333.821375] ? __lock_is_held+0xb6/0x140 [ 333.825418] ? cgroup_destroy_locked+0x750/0x750 [ 333.830150] ? rcu_read_lock_sched_held+0x108/0x120 [ 333.835144] ? kmem_cache_free+0x258/0x2a0 [ 333.839357] ? set_nlink+0xc1/0x160 [ 333.842960] ? debug_lockdep_rcu_enabled+0x77/0x90 [ 333.847868] ? generic_permission+0x105/0x3c0 [ 333.852340] ? cgroup_destroy_locked+0x750/0x750 [ 333.857074] kernfs_iop_mkdir+0x153/0x1e0 [ 333.861201] vfs_mkdir+0x390/0x600 [ 333.864722] SyS_mkdirat+0x22b/0x2b0 [ 333.868414] ? SyS_mknod+0x480/0x480 [ 333.872104] ? trace_hardirqs_on+0xd/0x10 [ 333.876229] ? do_syscall_64+0xb7/0x940 [ 333.880178] ? SyS_mknod+0x480/0x480 [ 333.883868] do_syscall_64+0x281/0x940 [ 333.887734] ? vmalloc_sync_all+0x30/0x30 [ 333.891861] ? _raw_spin_unlock_irq+0x27/0x70 [ 333.896330] ? finish_task_switch+0x1c1/0x7e0 [ 333.900800] ? syscall_return_slowpath+0x550/0x550 [ 333.905707] ? syscall_return_slowpath+0x2ac/0x550 [ 333.910614] ? prepare_exit_to_usermode+0x350/0x350 [ 333.915607] ? entry_SYSCALL_64_after_hwframe+0x52/0xb7 [ 333.920949] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 333.925775] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 333.930941] RIP: 0033:0x454e79 [ 333.934106] RSP: 002b:00007f016b92fc68 EFLAGS: 00000246 ORIG_RAX: 0000000000000102 [ 333.941791] RAX: ffffffffffffffda RBX: 00007f016b9306d4 RCX: 0000000000454e79 [ 333.949041] RDX: 0000000000000020 RSI: 0000000020000280 RDI: 0000000000000015 [ 333.956286] RBP: 000000000072bea0 R08: 0000000000000000 R09: 0000000000000000 2018/03/30 23:06:25 executing program 7: perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f00000000c0)='./control\x00', 0x0) r0 = inotify_init() inotify_add_watch(r0, &(0x7f0000f1eff6)='./control\x00', 0x220000000009) inotify_init1(0x0) inotify_add_watch(r0, &(0x7f000001eff6)='./control\x00', 0x2000200) setsockopt$inet6_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, &(0x7f0000000080)="5fce869db66fa225921ad03d773be4ff", 0x10) rmdir(&(0x7f000075aff6)='./control\x00') 2018/03/30 23:06:25 executing program 5: mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r0 = perf_event_open(&(0x7f0000223000)={0x2, 0x78, 0xe3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000001980)={{{@in6=@remote, @in=@multicast1}}, {{@in=@multicast2}, 0x0, @in=@multicast2}}, &(0x7f0000001a80)=0xe8) mount(&(0x7f00000003c0)='./file0\x00', &(0x7f0000000380)='./file0\x00', &(0x7f0000000300)='cgroup2\x00', 0x0, 0x0) r1 = open$dir(&(0x7f000001bff4)='./file0\x00', 0x0, 0x0) mkdirat(0xffffffffffffffff, &(0x7f0000000280)='./file0\x00', 0x20) r2 = accept4(0xffffffffffffff9c, 0x0, &(0x7f0000000040), 0x800) getsockopt$inet_sctp6_SCTP_PARTIAL_DELIVERY_POINT(r0, 0x84, 0x13, &(0x7f00000000c0)={0x0, 0x6}, &(0x7f0000000100)=0x8) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r2, 0x84, 0x6f, &(0x7f0000000180)={r3, 0x3c, &(0x7f0000000140)=[@in={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x17}}, @in6={0xa, 0x4e21, 0xa14, @local={0xfe, 0x80, [], 0xaa}, 0xffffffff}, @in={0x2, 0x4e23, @rand_addr=0x1f}]}, &(0x7f0000000200)=0x10) unlinkat(r1, &(0x7f0000000080)='./file0\x00', 0x200) 2018/03/30 23:06:25 executing program 3: r0 = socket(0x40000000015, 0x5, 0x0) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000240), 0x4) bind$inet(r0, &(0x7f00008a5ff0)={0x2, 0x4e21, @loopback=0x7f000001}, 0x10) sendto$inet(r0, &(0x7f0000f7db7f)="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", 0x481, 0x0, &(0x7f000069affb)={0x2, 0x4e20, @loopback=0x7f000001}, 0x10) setsockopt$RDS_CONG_MONITOR(r0, 0x114, 0x6, &(0x7f0000000080)=0x1, 0x4) ioctl$int_in(r0, 0x0, &(0x7f0000000040)=0x56d) sendto$inet(r0, &(0x7f00004b3fff), 0x0, 0x0, &(0x7f00002b4000)={0x2, 0x4e20, @loopback=0x7f000001}, 0x3f6) ioctl$sock_inet_tcp_SIOCOUTQ(r0, 0x5411, &(0x7f0000000000)) 2018/03/30 23:06:25 executing program 6: pipe(&(0x7f0000000940)={0xffffffffffffffff, 0xffffffffffffffff}) accept4$ax25(r0, 0x0, &(0x7f0000000080), 0x80000) r1 = socket$inet(0x2, 0x20000000000003, 0x2) connect$inet(r1, &(0x7f0000000000)={0x2, 0x0, @remote={0xac, 0x14, 0x14, 0xbb}}, 0x10) sendmsg(0xffffffffffffffff, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000140), 0x0, &(0x7f0000000180)=ANY=[]}, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000980)=@broute={'broute\x00', 0x20, 0x3, 0x2d9, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000380], 0x0, &(0x7f00000002c0), &(0x7f0000001000)=ANY=[@ANYBLOB="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"]}, 0x351) setsockopt$inet_int(r1, 0x0, 0x2, &(0x7f00000000c0)=0x7fffffff, 0x4) r2 = socket$rds(0x15, 0x5, 0x0) pipe(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$bt_BT_DEFER_SETUP(r3, 0x112, 0x7, &(0x7f0000000280)=0x100, 0x4) accept$packet(r4, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @remote}, &(0x7f0000000100)=0x14) connect$rds(r2, &(0x7f0000000140)={0x2, 0x4e22, @remote={0xac, 0x14, 0x14, 0xbb}}, 0x10) getsockopt$sock_buf(r2, 0x1, 0x3b, &(0x7f0000000180)=""/83, &(0x7f0000000200)=0x53) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000a00)=@filter={'filter\x00', 0xe, 0x4, 0x5a0, 0xffffffff, 0x0, 0xf0, 0xf0, 0xffffffff, 0xffffffff, 0x4d0, 0x4d0, 0x4d0, 0xffffffff, 0x4, &(0x7f0000000300), {[{{@ipv6={@ipv4={[], [0xff, 0xff], @rand_addr=0x80000001}, @dev={0xfe, 0x80, [], 0x16}, [0x0, 0xffffff00, 0xff, 0xffffffff], [0x0, 0xff000000, 0xffffffff], 'ipddp0\x00', 'ip_vti0\x00', {}, {0xff}, 0x6c, 0x2bf}, 0x0, 0xc8, 0xf0}, @REJECT={0x28, 'REJECT\x00', 0x0, {0x7}}}, {{@ipv6={@remote={0xfe, 0x80, [], 0xbb}, @remote={0xfe, 0x80, [], 0xbb}, [0xff000000, 0xffffffff, 0xffffff00, 0xff], [0xff, 0xffffffff, 0x0, 0xff000000], 'syzkaller1\x00', 'eql\x00', {}, {}, 0x62, 0x0, 0x4, 0x1}, 0x0, 0x120, 0x148, 0x0, {}, [@common=@frag={0x30, 'frag\x00', 0x0, {0x7ff, 0x7, 0x1, 0x2}}, @common=@hl={0x28, 'hl\x00', 0x0, {0x3, 0x7fff}}]}, @REJECT={0x28, 'REJECT\x00', 0x0, {0x7}}}, {{@ipv6={@dev={0xfe, 0x80, [], 0xc}, @loopback={0x0, 0x1}, [0xffffffff, 0xffffffff, 0xff000000, 0xff000000], [0xff, 0x0, 0xff, 0xffffff00], 'irlan0\x00', 'vcan0\x00', {0xff}, {}, 0x3b, 0xffffffffffffab69, 0x2, 0x30}, 0x0, 0x250, 0x298, 0x0, {}, [@common=@srh={0x30, 'srh\x00', 0x0, {0xbb, 0x1, 0x3, 0x6, 0xffffffffffffffc0, 0x80}}, @common=@inet=@policy={0x158, 'policy\x00', 0x0, {[{@ipv4, [0xffffffff, 0xff0000ff, 0xff000000, 0xffffffff], @ipv4=@multicast1=0xe0000001, [0xffffffff, 0xffffffff, 0xff000000, 0xffffff00], 0x4d5, 0x3500, 0x5c, 0x0, 0x10, 0xf}, {@ipv6=@dev={0xfe, 0x80, [], 0x11}, [0x0, 0xff000000, 0xff0000ff, 0xffffff00], @ipv4=@multicast1=0xe0000001, [0xffffffff, 0x0, 0x0, 0xffffffff], 0x4d5, 0x3500, 0x77, 0x1, 0x0, 0x1d}, {@ipv6=@mcast1={0xff, 0x1, [], 0x1}, [0xff000000, 0xffffffff, 0xffffff00, 0xff], @ipv4=@multicast2=0xe0000002, [0xffffffff, 0x0, 0xffffff00, 0xffffffff], 0x4d3, 0x3503, 0x7f, 0x0, 0x1, 0x19}, {@ipv4=@local={0xac, 0x14, 0x14, 0xaa}, [0x0, 0xff, 0x0, 0xff0000ff], @ipv6=@local={0xfe, 0x80, [], 0xaa}, [0xffffffff, 0xffffffff, 0xff, 0xff0000ff], 0x4d4, 0x3505, 0x0, 0x1, 0x1f, 0x10}], 0x0, 0x3}}]}, @common=@unspec=@LED={0x48, 'LED\x00', 0x0, {'syz1\x00', 0x0, 0x8}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28, '\x00', 0x0, 0xfffffffffffffffe}}}}, 0x600) socket(0x1, 0xa, 0x7) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_TIMER(r4, 0x40605346, &(0x7f0000000680)={0x1, 0x3, {0x3, 0x0, 0x9, 0x3}}) 2018/03/30 23:06:25 executing program 4: mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount(&(0x7f000000a000)='./file0\x00', &(0x7f0000000240)='./file0\x00', &(0x7f000000c000)='ramfs\x00', 0x0, &(0x7f0000000140)="85a268c3ccd7e35027942198465872692171ea14d066a61d303338ce2cfd33a117820b15357fe1562fbac3a3cec72bb58cc78c0689f22d22f531734ea9be777d") mkdir(&(0x7f0000000000)='./file1\x00', 0x0) mount(&(0x7f0000000040)='./file0\x00', &(0x7f0000903000)='./file0\x00', &(0x7f0000811ffa)='bdev\x00', 0x100000, &(0x7f00000003c0)="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") r0 = dup(0xffffffffffffffff) r1 = syz_open_dev$vcsn(&(0x7f00000000c0)='/dev/vcs#\x00', 0x2, 0x20800) renameat(r0, &(0x7f0000000080)='./file1/file0\x00', r1, &(0x7f0000000100)='./file1\x00') mount(&(0x7f0000fb6000)='./file0\x00', &(0x7f0000d78000)='.', &(0x7f0000fdb000)='ubifs\x00', 0x1003, 0x0) mount(&(0x7f00002b9ff8)='./file0\x00', &(0x7f0000cbeff8)='./file0\x00', &(0x7f00005f7ffa)='ramfs\x00', 0x80000, &(0x7f000002f000)) mount(&(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)='./file1\x00', &(0x7f0000000200)='anon_inodefs\x00', 0x2000, &(0x7f0000000240)) mount(&(0x7f0000adcff8)='./file0\x00', &(0x7f0000e08fff)='.', &(0x7f00005e9000)='cifs\x00', 0x2000, &(0x7f0000ad5000)) [ 333.963533] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000016 [ 333.970781] R13: 00000000000003eb R14: 00000000006f7ea8 R15: 0000000000000020 2018/03/30 23:06:25 executing program 3: r0 = socket(0x40000000015, 0x5, 0x0) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000240), 0x4) bind$inet(r0, &(0x7f00008a5ff0)={0x2, 0x4e21, @loopback=0x7f000001}, 0x10) sendto$inet(r0, &(0x7f0000f7db7f)="ba671368d1010000004900000001000000018be49e9301442865319997d0efdb2f54b6a10c7327757482bfce945c2a91fb8dfafc1d3f56bc543ab87321e12cca08a744a2d128b00634bc882151d36809229a96bc3437ef159489384ade077ba295eac2882dbfd3781dd4d4e609c42628dbb709b3eb1fa030009045dd98b9e6d77b6cec9ceb685595d43995e0f04c32260943add79831e661c6a351dedc8b9d220fbf9fb6e44fb6a629ce9a82025124fec9f3ee751f7da0cd7e799be88ddbdac20b48e890ff81d7fa28c2d017d7932f2569038740461accd4582f576e4fdb6150a3399f8266bc19eb943648ad1ad81420ed6c382436e474390c8995e829e4f9df43eed85a60b9ee254e31eb62900857fa134e76cc64880334adbff069a2e5e647d2ed36a96b23834b6f6ca6b8113baf4cf30347fbb7ffc30aea99872cc0dba03b07d3347b2d257edbe2733c26b7337a79962d8ce85469e3bcbe0e4a48a6ae69d13f2d4b5155b390ef67aa714b82b6313ee277cb8986eca5db2e97cb1ae2243bba80274f614ece521baef443394b4c161cb9ae926e21892578b49cfd6efe1cb1572148c10d92218ed73ec116a18de80ac42d2726a4523a764fc6dc356c5fbbf9d2c947ae3bc9a3dc76099f3257c8d5952876151b0326d8cb1d5683ee4ab5ded9a34c00ac1b03f34627ec18a7c2e92c87b7896549cfab5eb55fa85a970994bd4b22b5f0d045e241256d06f485a47b4a55ed389bc1734541232cd41908b5cfa4b8fcfcafce500a0c7ae99767713a98e7927aa69f6ccd7daea62f19ceb82559f41899c9a9aee99113e7e64b5f8b9824be9fdbfa4dd4995673d882bb4daeb64413b334e114965d2ba3cea8051e692508701b9400cb12eae457f8b8549944091b729160939918d8fcae611a48ed665f770db637487a236da1a58ba7566668651a77171fc4fe506496d19059343dbe4f426625d3f2b705f54581372361770bf5a9098a9fafefaf546426b294239ac33e3186e4d58ad2fa995a6ad4dc074e7cca11aead109563b2076c7c6e9f57ec63df960804e2e7f9d8444de9550cca3df7834d864e9777291c2e1f6205de2e43dc995ab8bb1515a365efc2830fa3e7a1dd137f550d6035212bc1f51c3b4ceea430df49ffc9210084ef156ad7e0d219efd6c116693735b44521d389969a3a65617cd2fd6e14060601cee4cd054cf36fe048b57d1d9ee3cad2a73552449926b4a6b03fbe9c0ec68357e1fbe52ed77b67f5870c0aefb7ee8236747e0d67a26725fb515544cbbe8464da94cfd8c0b94bb4e51a263b1749bd0a7cf651931f806d1b928d1f9994f1ad4d50e6a5cd7a8e4e687f8564fdacc864013d095ba9d5709eced3c28eabda476d177a7836400a01e02beed5a6636d4064fdda344967ad8682d14b87c71727cb66be27d1d39191f4223c545b62fb5d60262ba8076a65dbc194cee1df846c584b7bbe9dce6e6895b2cbbb64b03b55548b845cc3de2f939ef918421af9a5e9157e837651245299c03992d0ddee06bd22a31522aca0f309b1feccebc0b1c0ed9d21c19bfd15cd313ff64394fd6a10904890c9f6d646b026f27253e8f584c3ffd20ad67e8b62ed7676706d40bc5c80e376980b81", 0x481, 0x0, &(0x7f000069affb)={0x2, 0x4e20, @loopback=0x7f000001}, 0x10) setsockopt$RDS_CONG_MONITOR(r0, 0x114, 0x6, &(0x7f0000000080)=0x1, 0x4) ioctl$int_in(r0, 0x5421, &(0x7f0000000040)) sendto$inet(r0, &(0x7f00004b3fff), 0x0, 0x0, &(0x7f00002b4000)={0x2, 0x4e20, @loopback=0x7f000001}, 0x3f6) ioctl$sock_inet_tcp_SIOCOUTQ(r0, 0x5411, &(0x7f0000000000)) 2018/03/30 23:06:25 executing program 0 (fault-call:7 fault-nth:33): mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r0 = syz_open_dev$usbmon(&(0x7f0000000400)='/dev/usbmon#\x00', 0x0, 0x0) r1 = perf_event_open(&(0x7f0000223000)={0x2, 0x78, 0xe3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000001980)={{{@in6=@remote, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast2}, 0x0, @in=@multicast2}}, &(0x7f0000001a80)=0xe8) chown(&(0x7f00000004c0)='./file0\x00', r2, 0x0) mount(&(0x7f00000003c0)='./file0\x00', &(0x7f0000000380)='./file0\x00', &(0x7f0000000300)='cgroup2\x00', 0x0, 0x0) r3 = open$dir(&(0x7f000001bff4)='./file0\x00', 0x0, 0x0) mkdirat(r3, &(0x7f0000000280)='./file0\x00', 0x20) getdents64(r3, &(0x7f00000007c0)=""/250, 0x1015a) dup3(r0, r1, 0x80000) r4 = open$dir(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) renameat2(r4, &(0x7f0000000200)='./file1\x00', 0xffffffffffffffff, &(0x7f0000000240)='./file0\x00', 0xfd1092750066ec78) ioctl$KDGKBMODE(0xffffffffffffffff, 0x4b44, &(0x7f0000000140)) [ 334.069842] kernel msg: ebtables bug: please report to author: entries_size too small 2018/03/30 23:06:25 executing program 7: perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f00000000c0)='./control\x00', 0x0) socketpair$inet6(0xa, 0x5, 0x6, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$inet6_dccp_int(r0, 0x21, 0x5, &(0x7f0000000100)=0x2, 0x4) syz_mount_image$bfs(&(0x7f0000000140)='bfs\x00', &(0x7f0000000180)='./control\x00', 0x1000, 0x6, &(0x7f0000001540)=[{&(0x7f00000001c0)="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", 0xfb, 0x4ba}, {&(0x7f00000002c0)="9712a004075852e55c946f40164d8660cb8135b39c656a4b9b0f84a2fa7599506aa0409aa65f3040d7462d9a5da24050ea505408fa5cdfe275602c7f17d8859e60c93ba4cb6d29427edc504f91f9565b6d0d21d2f93c3da627cd9a63efcdb8888beac3844ccdf6fc36aab0866e0b262972d3946f3e8fd0d0f8f3e0bd0e54", 0x7e, 0x35cb13ca}, {&(0x7f0000000340)="b347516dfc81fa7456136536449f247a0f1a332cb37ef19e266348e7fca34b78dd25e68fa7ed6a9c9f31929e2ba2cb42647e9cb342ab3388f3175b92ead304078a03a28f1951412a0bf7482fda9172b0b6f2775a3fa9767d", 0x58, 0x33c}, {&(0x7f00000003c0)="bce1eb32c648f16e3fc47e9bce08117841966f14bb58400e6337cec92a191fa57f58886218efa0b7f9a3398518835ee1e6f9317e9b1a428974df3ef1238bfacbd06fdc55354b9894c59e20194ce0c473bf1d283ce6f3846fd027b32a30ae8cec60f42c5c373e1f35381954466fda69cd7bd88426a28dee713871055cb68b8eedb3b1c4a213426dc6", 0x88, 0x4}, {&(0x7f0000000480)="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", 0x1000, 0x1}, {&(0x7f0000001480)="a12c6b8c1ce9240ccf8e6f8ea36823cbbfd0576d751dcde17b3836de9700efcb7f2b8bf7797d6a12cb24b6a6afc8e424e202e0d9acd7057644732f2f169a733d914661648330264f2a6f77c10df9a0a657cda13e54a3c1e79284646cdf76dd642ed3e12dcc5a9cab975d73a94cc6ab3dc64a7f0b9987c19eb7617640c21b8b86b863512a8bf9320b1845198d4dc1314bc1a0666053687fd6bc274e6d0588c1cb01a287d4e6a05ea1b508b15c1646c143371499fe7cc4ba810032ad", 0xbb, 0x100000001}], 0x2000, 0x0) r2 = inotify_init() open_by_handle_at(r0, &(0x7f00000016c0)={0x62, 0x401, "96624880062073208dc243590b3cea004cc782a664e120e49ebba7c7560175da28462e6b993a6870b8ee834e25c62d1d2a43bb634e603b228d750846038b21a5022d446a9619a96445a2670260672b48ecf7ec91c7da43833bee"}, 0x2) r3 = socket$netlink(0x10, 0x3, 0x0) r4 = syz_genetlink_get_family_id$ipvs(&(0x7f0000001880)='IPVS\x00') sendmsg$IPVS_CMD_GET_DAEMON(r2, &(0x7f0000001940)={&(0x7f0000001840)={0x10, 0x0, 0x0, 0x8800000}, 0xc, &(0x7f0000001900)={&(0x7f00000018c0)={0x40, r4, 0x400, 0x70bd26, 0x25dfdbfb, {0xb}, [@IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0x10001}, @IPVS_CMD_ATTR_SERVICE={0x24, 0x1, [@IPVS_SVC_ATTR_PORT={0x8, 0x4, 0x4e23}, @IPVS_SVC_ATTR_PROTOCOL={0x8, 0x2, 0x3c}, @IPVS_SVC_ATTR_PROTOCOL={0x8, 0x2, 0x33}, @IPVS_SVC_ATTR_FWMARK={0x8, 0x5, 0x3}]}]}, 0x40}, 0x1}, 0x20008080) sendmsg$nl_generic(r3, &(0x7f0000009fc8)={&(0x7f0000000000)={0x10}, 0xc, &(0x7f000000d379)={&(0x7f0000001680)=ANY=[@ANYBLOB="148bc71a6a3840fc5997a0509c0000000019000106f104003cb74d5413f83c1dca417b84672a8ba426d1cc013ec89e7f5670dabe"], 0x14}, 0x1}, 0x0) r5 = syz_open_dev$vcsa(&(0x7f0000001740)='/dev/vcsa#\x00', 0x40, 0x20000) ioctl$SNDRV_SEQ_IOCTL_SET_PORT_INFO(r5, 0x40a85323, &(0x7f0000001780)={{0x5, 0x3}, 'port0\x00', 0x40, 0x12, 0x18000, 0x7, 0xab6, 0x4, 0x80, 0x0, 0x1, 0x4}) getsockopt$IP6T_SO_GET_REVISION_MATCH(r1, 0x29, 0x44, &(0x7f0000001600)={'ah\x00'}, &(0x7f0000001640)=0x1e) inotify_add_watch(r2, &(0x7f0000f1eff6)='./control\x00', 0x220000000009) r6 = inotify_init1(0x0) inotify_add_watch(r6, &(0x7f000001eff6)='./control\x00', 0x2000200) socket$nl_generic(0x10, 0x3, 0x10) setsockopt$inet6_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, &(0x7f0000000080)="5fce869db66fa225921ad03d773be4ff", 0x10) rmdir(&(0x7f000075aff6)='./control\x00') 2018/03/30 23:06:25 executing program 6: pipe(&(0x7f0000000940)={0xffffffffffffffff, 0xffffffffffffffff}) accept4$ax25(r0, 0x0, &(0x7f0000000080), 0x80000) r1 = socket$inet(0x2, 0x20000000000003, 0x2) connect$inet(r1, &(0x7f0000000000)={0x2, 0x0, @remote={0xac, 0x14, 0x14, 0xbb}}, 0x10) sendmsg(0xffffffffffffffff, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000140), 0x0, &(0x7f0000000180)=ANY=[]}, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000980)=@broute={'broute\x00', 0x20, 0x3, 0x2d9, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000380], 0x0, &(0x7f00000002c0), &(0x7f0000001000)=ANY=[@ANYBLOB="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"]}, 0x351) setsockopt$inet_int(r1, 0x0, 0x2, &(0x7f00000000c0)=0x7fffffff, 0x4) r2 = socket$rds(0x15, 0x5, 0x0) pipe(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$bt_BT_DEFER_SETUP(r3, 0x112, 0x7, &(0x7f0000000280)=0x100, 0x4) accept$packet(r4, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @remote}, &(0x7f0000000100)=0x14) connect$rds(r2, &(0x7f0000000140)={0x2, 0x4e22, @remote={0xac, 0x14, 0x14, 0xbb}}, 0x10) getsockopt$sock_buf(r2, 0x1, 0x3b, &(0x7f0000000180)=""/83, &(0x7f0000000200)=0x53) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000a00)=@filter={'filter\x00', 0xe, 0x4, 0x5a0, 0xffffffff, 0x0, 0xf0, 0xf0, 0xffffffff, 0xffffffff, 0x4d0, 0x4d0, 0x4d0, 0xffffffff, 0x4, &(0x7f0000000300), {[{{@ipv6={@ipv4={[], [0xff, 0xff], @rand_addr=0x80000001}, @dev={0xfe, 0x80, [], 0x16}, [0x0, 0xffffff00, 0xff, 0xffffffff], [0x0, 0xff000000, 0xffffffff], 'ipddp0\x00', 'ip_vti0\x00', {}, {0xff}, 0x6c, 0x2bf}, 0x0, 0xc8, 0xf0}, @REJECT={0x28, 'REJECT\x00', 0x0, {0x7}}}, {{@ipv6={@remote={0xfe, 0x80, [], 0xbb}, @remote={0xfe, 0x80, [], 0xbb}, [0xff000000, 0xffffffff, 0xffffff00, 0xff], [0xff, 0xffffffff, 0x0, 0xff000000], 'syzkaller1\x00', 'eql\x00', {}, {}, 0x62, 0x0, 0x4, 0x1}, 0x0, 0x120, 0x148, 0x0, {}, [@common=@frag={0x30, 'frag\x00', 0x0, {0x7ff, 0x7, 0x1, 0x2}}, @common=@hl={0x28, 'hl\x00', 0x0, {0x3, 0x7fff}}]}, @REJECT={0x28, 'REJECT\x00', 0x0, {0x7}}}, {{@ipv6={@dev={0xfe, 0x80, [], 0xc}, @loopback={0x0, 0x1}, [0xffffffff, 0xffffffff, 0xff000000, 0xff000000], [0xff, 0x0, 0xff, 0xffffff00], 'irlan0\x00', 'vcan0\x00', {0xff}, {}, 0x3b, 0xffffffffffffab69, 0x2, 0x30}, 0x0, 0x250, 0x298, 0x0, {}, [@common=@srh={0x30, 'srh\x00', 0x0, {0xbb, 0x1, 0x3, 0x6, 0xffffffffffffffc0, 0x80}}, @common=@inet=@policy={0x158, 'policy\x00', 0x0, {[{@ipv4, [0xffffffff, 0xff0000ff, 0xff000000, 0xffffffff], @ipv4=@multicast1=0xe0000001, [0xffffffff, 0xffffffff, 0xff000000, 0xffffff00], 0x4d5, 0x3500, 0x5c, 0x0, 0x10, 0xf}, {@ipv6=@dev={0xfe, 0x80, [], 0x11}, [0x0, 0xff000000, 0xff0000ff, 0xffffff00], @ipv4=@multicast1=0xe0000001, [0xffffffff, 0x0, 0x0, 0xffffffff], 0x4d5, 0x3500, 0x77, 0x1, 0x0, 0x1d}, {@ipv6=@mcast1={0xff, 0x1, [], 0x1}, [0xff000000, 0xffffffff, 0xffffff00, 0xff], @ipv4=@multicast2=0xe0000002, [0xffffffff, 0x0, 0xffffff00, 0xffffffff], 0x4d3, 0x3503, 0x7f, 0x0, 0x1, 0x19}, {@ipv4=@local={0xac, 0x14, 0x14, 0xaa}, [0x0, 0xff, 0x0, 0xff0000ff], @ipv6=@local={0xfe, 0x80, [], 0xaa}, [0xffffffff, 0xffffffff, 0xff, 0xff0000ff], 0x4d4, 0x3505, 0x0, 0x1, 0x1f, 0x10}], 0x0, 0x3}}]}, @common=@unspec=@LED={0x48, 'LED\x00', 0x0, {'syz1\x00', 0x0, 0x8}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28, '\x00', 0x0, 0xfffffffffffffffe}}}}, 0x600) socket(0x1, 0xa, 0x7) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_TIMER(r4, 0x40605346, &(0x7f0000000680)={0x1, 0x3, {0x3, 0x0, 0x9, 0x3}}) [ 334.220855] kernel msg: ebtables bug: please report to author: entries_size too small [ 334.272977] FAULT_INJECTION: forcing a failure. [ 334.272977] name failslab, interval 1, probability 0, space 0, times 0 [ 334.284327] CPU: 0 PID: 26359 Comm: syz-executor0 Not tainted 4.16.0-rc7+ #372 [ 334.291700] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 334.301060] Call Trace: [ 334.303660] dump_stack+0x194/0x24d [ 334.307303] ? arch_local_irq_restore+0x53/0x53 [ 334.312001] should_fail+0x8c0/0xa40 [ 334.315738] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 334.320847] ? kasan_kmalloc+0xad/0xe0 [ 334.324749] ? kmem_cache_alloc_node_trace+0x150/0x760 [ 334.330047] ? alloc_fair_sched_group+0x1f0/0x530 [ 334.330067] ? cpu_cgroup_css_alloc+0xe/0x30 [ 334.330085] ? vfs_mkdir+0x390/0x600 [ 334.330095] ? SyS_mkdirat+0x22b/0x2b0 [ 334.330106] ? do_syscall_64+0x281/0x940 [ 334.330129] ? find_held_lock+0x35/0x1d0 [ 334.330150] ? __lock_is_held+0xb6/0x140 [ 334.330182] ? check_same_owner+0x320/0x320 [ 334.330201] ? rcu_note_context_switch+0x710/0x710 [ 334.330227] should_failslab+0xec/0x120 [ 334.330242] kmem_cache_alloc_node_trace+0x5a/0x760 [ 334.330256] ? unregister_fair_sched_group+0x5e0/0x5e0 [ 334.330272] ? find_next_bit+0xcc/0x100 [ 334.330294] alloc_fair_sched_group+0x267/0x530 [ 334.330319] sched_create_group+0x35/0x70 [ 334.330334] cpu_cgroup_css_alloc+0xe/0x30 [ 334.330348] cgroup_apply_control_enable+0x44d/0xbc0 [ 334.330377] ? cgroup_propagate_control+0x570/0x570 [ 334.330403] ? css_populate_dir+0x289/0x420 [ 334.330424] cgroup_mkdir+0x56f/0xfc0 [ 334.330435] ? __lock_is_held+0xb6/0x140 [ 334.330458] ? cgroup_destroy_locked+0x750/0x750 [ 334.330472] ? rcu_read_lock_sched_held+0x108/0x120 [ 334.330485] ? kmem_cache_free+0x258/0x2a0 [ 334.330502] ? set_nlink+0xc1/0x160 [ 334.330517] ? debug_lockdep_rcu_enabled+0x77/0x90 [ 334.330528] ? generic_permission+0x105/0x3c0 [ 334.330544] ? cgroup_destroy_locked+0x750/0x750 [ 334.330559] kernfs_iop_mkdir+0x153/0x1e0 [ 334.330577] vfs_mkdir+0x390/0x600 [ 334.330597] SyS_mkdirat+0x22b/0x2b0 [ 334.330617] ? SyS_mknod+0x480/0x480 [ 334.330627] ? trace_hardirqs_on+0xd/0x10 [ 334.330642] ? do_syscall_64+0xb7/0x940 [ 334.330657] ? SyS_mknod+0x480/0x480 [ 334.330673] do_syscall_64+0x281/0x940 [ 334.330685] ? vmalloc_sync_all+0x30/0x30 [ 334.330698] ? _raw_spin_unlock_irq+0x27/0x70 [ 334.330710] ? finish_task_switch+0x1c1/0x7e0 [ 334.330724] ? syscall_return_slowpath+0x550/0x550 [ 334.330747] ? syscall_return_slowpath+0x2ac/0x550 [ 334.330768] ? prepare_exit_to_usermode+0x350/0x350 [ 334.330787] ? entry_SYSCALL_64_after_hwframe+0x52/0xb7 [ 334.330811] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 334.330837] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 334.330849] RIP: 0033:0x454e79 [ 334.330857] RSP: 002b:00007f016b92fc68 EFLAGS: 00000246 ORIG_RAX: 0000000000000102 [ 334.330871] RAX: ffffffffffffffda RBX: 00007f016b9306d4 RCX: 0000000000454e79 [ 334.330878] RDX: 0000000000000020 RSI: 0000000020000280 RDI: 0000000000000015 2018/03/30 23:06:26 executing program 0 (fault-call:7 fault-nth:34): mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r0 = syz_open_dev$usbmon(&(0x7f0000000400)='/dev/usbmon#\x00', 0x0, 0x0) r1 = perf_event_open(&(0x7f0000223000)={0x2, 0x78, 0xe3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000001980)={{{@in6=@remote, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast2}, 0x0, @in=@multicast2}}, &(0x7f0000001a80)=0xe8) chown(&(0x7f00000004c0)='./file0\x00', r2, 0x0) mount(&(0x7f00000003c0)='./file0\x00', &(0x7f0000000380)='./file0\x00', &(0x7f0000000300)='cgroup2\x00', 0x0, 0x0) r3 = open$dir(&(0x7f000001bff4)='./file0\x00', 0x0, 0x0) mkdirat(r3, &(0x7f0000000280)='./file0\x00', 0x20) getdents64(r3, &(0x7f00000007c0)=""/250, 0x1015a) dup3(r0, r1, 0x80000) r4 = open$dir(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) renameat2(r4, &(0x7f0000000200)='./file1\x00', 0xffffffffffffffff, &(0x7f0000000240)='./file0\x00', 0xfd1092750066ec78) ioctl$KDGKBMODE(0xffffffffffffffff, 0x4b44, &(0x7f0000000140)) 2018/03/30 23:06:26 executing program 7: perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$vsock_stream(0x28, 0x1, 0x0) mkdir(&(0x7f00000000c0)='./control\x00', 0x0) r0 = inotify_init() inotify_add_watch(r0, &(0x7f0000f1eff6)='./control\x00', 0x220000000009) r1 = inotify_init1(0x0) inotify_add_watch(r1, &(0x7f000001eff6)='./control\x00', 0x2000200) setsockopt$inet6_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, &(0x7f0000000080)="5fce869db66fa225921ad03d773be4ff", 0x10) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000140)={0xffffffffffffff9c}) sendto$unix(r2, &(0x7f0000000180)="f46a4c2643690b2198cf", 0xa, 0x4000040, &(0x7f00000001c0)=@abs={0x0, 0x0, 0x4e21}, 0x6e) r3 = syz_open_dev$sndpcmc(&(0x7f0000000040)='/dev/snd/pcmC#D#c\x00', 0x10000, 0xc00) socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_FASTOPEN_KEY(r3, 0x6, 0x21, &(0x7f0000000100)="f5985486b613374e83f72de166443053", 0x10) rmdir(&(0x7f000075aff6)='./control\x00') 2018/03/30 23:06:26 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x200, 0x0) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000680)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$sock_linger(r2, 0x1, 0xd, &(0x7f00000006c0)={0x400, 0x9}, 0x8) perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x0, 0x0) r3 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) mmap(&(0x7f0000000000/0x9d7000)=nil, 0x9d7000, 0x0, 0x10, 0xffffffffffffffff, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x7) perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r4 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r4, &(0x7f0000e5b000)={0x2, 0x4e20, @multicast1=0xe0000001}, 0x10) syz_open_dev$sg(&(0x7f0000000440)='/dev/sg#\x00', 0x0, 0x0) connect$inet(r4, &(0x7f0000000100)={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x11}}, 0x10) r5 = bpf$PROG_LOAD(0x5, &(0x7f0000eb0fb8)={0x1, 0x3, &(0x7f00009ff000)=@framed={{0x18}, [], {0x95}}, &(0x7f00002bf000)='syzkaller\x00', 0x4, 0xb7, &(0x7f00006ab000)=""/183}, 0x48) setsockopt$inet_tcp_int(r4, 0x6, 0x19, &(0x7f0000000240)=0x8, 0x4) r6 = socket$kcm(0x29, 0x2, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r6, 0x89e0, &(0x7f000031aff8)={r4, r5}) ioctl$sock_kcm_SIOCKCMCLONE(r6, 0x89e2, &(0x7f00000002c0)={0xffffffffffffffff}) sendmsg$nl_xfrm(r7, &(0x7f0000000780)={&(0x7f0000000200)={0x10}, 0xc, &(0x7f0000000740)={&(0x7f0000000480)=@updpolicy={0xb8, 0x19, 0x0, 0x0, 0x0, {{@in=@loopback=0x7f000001, @in6=@mcast1={0xff, 0x1, [], 0x1}}}}, 0xffcb}, 0x1}, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(r7, 0x89e1, &(0x7f0000000040)={r4}) r8 = fcntl$getown(r3, 0x9) recvfrom$inet6(r1, &(0x7f0000000140)=""/177, 0xb1, 0x40000000, &(0x7f0000000080)={0xa, 0x0, 0x9, @empty, 0xe38}, 0x1c) r9 = accept4$inet(0xffffffffffffff9c, &(0x7f0000000700)={0x0, 0x0, @broadcast}, &(0x7f0000000740)=0x10, 0x80000) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r9, 0x84, 0x64, &(0x7f0000000780)=[@in6={0xa, 0x4e22, 0xfffffffffffff7e1, @mcast2={0xff, 0x2, [], 0x1}, 0x8}, @in={0x2, 0x4e24, @broadcast=0xffffffff}], 0x2c) ptrace$setregset(0x4205, r8, 0x0, &(0x7f00000005c0)={&(0x7f0000000080)}) ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r10 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x1fffd, 0x0) r11 = syz_open_dev$sndtimer(&(0x7f00000000c0)='/dev/snd/timer\x00', 0x0, 0x0) read(r11, &(0x7f0000ec6000)=""/50, 0x32) fcntl$dupfd(r11, 0x0, r10) 2018/03/30 23:06:26 executing program 4: mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount(&(0x7f000000a000)='./file0\x00', &(0x7f0000026ff8)='./file0\x00', &(0x7f000000c000)='ramfs\x00', 0x0, &(0x7f000000a000)) mkdir(&(0x7f0000000000)='./file1\x00', 0x0) mount(&(0x7f0000000040)='./file0\x00', &(0x7f0000903000)='./file0\x00', &(0x7f0000811ffa)='bdev\x00', 0x100000, &(0x7f00000003c0)="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") r0 = dup(0xffffffffffffffff) r1 = syz_open_dev$vcsn(&(0x7f00000000c0)='/dev/vcs#\x00', 0x2, 0x20800) renameat(r0, &(0x7f0000000080)='./file1/file0\x00', r1, &(0x7f0000000100)='./file1\x00') mount(&(0x7f0000fb6000)='./file0\x00', &(0x7f0000d78000)='.', &(0x7f0000fdb000)='ubifs\x00', 0x1003, 0x0) ioctl$ASHMEM_GET_NAME(r0, 0x81007702, &(0x7f0000000240)=""/152) mount(&(0x7f00002b9ff8)='./file0\x00', &(0x7f0000cbeff8)='./file0\x00', &(0x7f00005f7ffa)='ramfs\x00', 0x80000, &(0x7f000002f000)) mount(&(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)='./file1\x00', &(0x7f0000000200)='anon_inodefs\x00', 0x2000, &(0x7f0000000240)) mount(&(0x7f0000adcff8)='./file0\x00', &(0x7f0000e08fff)='.', &(0x7f00005e9000)='cifs\x00', 0x2000, &(0x7f0000ad5000)) 2018/03/30 23:06:26 executing program 2: perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f00000000c0)='./control\x00', 0x0) inotify_init() r0 = syz_open_dev$sg(&(0x7f000028fff7)='/dev/sg#\x00', 0x0, 0x0) ioctl(r0, 0x4000000000001276, &(0x7f0000000040)) msgget(0x2, 0x0) getsockopt$nfc_llcp(0xffffffffffffffff, 0x118, 0x4, &(0x7f0000000740)=""/223, 0xdf) setsockopt$inet_mreq(r0, 0x0, 0x23, &(0x7f00000002c0)={@empty, @remote={0xac, 0x14, 0x14, 0xbb}}, 0x8) accept4$nfc_llcp(0xffffffffffffffff, &(0x7f0000000940), &(0x7f0000000080)=0x60, 0x800) ioctl$SNDRV_CTL_IOCTL_ELEM_INFO(0xffffffffffffffff, 0xc1105511, &(0x7f0000000100)={{0x0, 0x0, 0x0, 0x0, "386aea20273dc03c3d18dd0dbd4a0ca15f9f580393cc4ec3b8ee256b9aa630224ba64c6ff43ee01d2996c914"}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "eda422cd37591b3a5a7a683380f7e0b9e790c6b72cd0a4f3342f7431c1699a305ca3091bb2320e8df4e298a2cca26637866a68c1426ffbd8a6c7da1d8ea77d9d", &(0x7f00000000c0)='/dev/snd/controlC#\x00', 0x13}) r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000003c0)='/proc/self/net/pfkey\x00', 0x800, 0x0) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) add_key$user(&(0x7f0000000480)='user\x00', &(0x7f00000004c0)={0x73, 0x79, 0x7a, 0x3}, &(0x7f0000000500)="d3238eea76b0470531092a0a77b0b49789a0fc97b8f8b9e23a2a5a5a0c169ed6e83480b4801dbf79db3527904ee3128c05ce2806e210237c36b88ceabe99d8784860e5d0e91fe33d38d0133e056cdd1e2910d57fc5eb1b23db3b60a7077ff33bb6c7445cd258ee25f9187269c22d1ed05acb2b9b599bd285b692257a631754ab9befebd3fdb3167361c24c5c5dcf90e476e052b9d22362c57878cb7205fe361346d6beb77b7844fe94", 0xa9, 0xfffffffffffffffe) ioctl$sock_inet_SIOCSIFADDR(r0, 0x8916, &(0x7f0000000300)={'gretap0\x00', {0x2, 0x4e24, @loopback=0x7f000001}}) keyctl$instantiate_iov(0x14, 0x0, &(0x7f0000000780)=[{&(0x7f0000000840)="edb4a01f68d76905035a4ebdd427d31585a5a650581902b1c077f74ca8f1ce7d3e2f6e1c6760433af9664b3f3bebab3a1a1c4ef86f42c39b758accc1e7637bb18d28248dc7a1719b73388830b162613b17fd02220bd1fe2ad86adb96efcfc672d126ae58f745fba0e7534cdbae947449df767bd76a0c38b5752dcd13f7065edea86dc156c0708e76c2c99a94a95f1e93ff73cb3eb94e06d399cf48aaac7963d13e4b3a6b32bc2b19d5461545dcf3f71bb24442d286421f8d891d77a3c4c1c9435bbdf187682c22ded22b669b7790d05b4894166a2d5f33098cf908a23a2e0671d824e88942fbe0bd1416", 0xea}], 0x1, 0x0) r3 = ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) ioctl$KVM_UNREGISTER_COALESCED_MMIO(r3, 0x4010ae68, &(0x7f0000000000)={0x0, 0x5000}) ioctl$KVM_CREATE_PIT2(r3, 0x4040ae77, &(0x7f0000000440)={0xfffffffffffffff7}) r4 = ioctl$KVM_CREATE_VCPU(r3, 0xae41, 0x0) setsockopt$inet_tcp_TCP_ULP(r1, 0x6, 0x1f, &(0x7f0000000280)='tls\x00', 0x4) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000005fd8)={'vcan0\x00'}) r5 = socket$can_raw(0x1d, 0x3, 0x1) socket$inet6(0xa, 0x0, 0x0) r6 = syz_open_dev$dspn(&(0x7f0000000040)='/dev/dsp#\x00', 0x0, 0x0) connect$vsock_stream(r6, &(0x7f0000000080)={0x28, 0x0, 0xffffffff, @my=0x1}, 0x10) dup2(r2, r4) dup3(r2, r3, 0x0) getsockopt$netrom_NETROM_T1(r5, 0x103, 0x1, &(0x7f0000000640), &(0x7f0000000400)=0x4) execveat(r0, &(0x7f0000000340)='./file0\x00', &(0x7f0000000580)=[&(0x7f0000000500)='proc-\x00', &(0x7f0000000540)='/dev/sg#\x00'], &(0x7f0000000680)=[&(0x7f00000005c0)='/dev/sg#\x00', &(0x7f0000000600)='/dev/sg#\x00'], 0x1d00) 2018/03/30 23:06:26 executing program 5: sysfs$1(0x1, &(0x7f0000000040)='\x00') mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) perf_event_open(&(0x7f0000223000)={0x2, 0x78, 0xe3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f00000000c0)={{{@in6=@remote, @in=@multicast1}}, {{@in=@multicast2}, 0x0, @in=@multicast2}}, &(0x7f0000001a80)=0xe2) mount(&(0x7f00000003c0)='./file0\x00', &(0x7f0000000380)='./file0\x00', &(0x7f0000000300)='cgroup2\x00', 0x0, 0x0) r0 = open$dir(&(0x7f000001bff4)='./file0\x00', 0x0, 0x0) mkdirat(0xffffffffffffffff, &(0x7f0000000280)='./file0\x00', 0x20) unlinkat(r0, &(0x7f0000000080)='./file0\x00', 0x200) 2018/03/30 23:06:26 executing program 3: r0 = socket(0x40000000015, 0x5, 0x0) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000240), 0x4) bind$inet(r0, &(0x7f00008a5ff0)={0x2, 0x4e21, @loopback=0x7f000001}, 0x10) sendto$inet(r0, &(0x7f0000f7db7f)="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", 0x481, 0x0, &(0x7f000069affb)={0x2, 0x4e20, @loopback=0x7f000001}, 0x10) setsockopt$RDS_CONG_MONITOR(r0, 0x114, 0x6, &(0x7f0000000080)=0x1, 0x4) ioctl$int_in(r0, 0x5421, &(0x7f0000000040)) sendto$inet(r0, &(0x7f00004b3fff), 0x0, 0x0, &(0x7f00002b4000)={0x2, 0x4e20, @loopback=0x7f000001}, 0x3f6) ioctl$sock_inet_tcp_SIOCOUTQ(r0, 0x5411, &(0x7f0000000000)) 2018/03/30 23:06:26 executing program 6: pipe(&(0x7f0000000940)={0xffffffffffffffff, 0xffffffffffffffff}) accept4$ax25(r0, 0x0, &(0x7f0000000080), 0x80000) r1 = socket$inet(0x2, 0x20000000000003, 0x2) connect$inet(r1, &(0x7f0000000000)={0x2, 0x0, @remote={0xac, 0x14, 0x14, 0xbb}}, 0x10) sendmsg(0xffffffffffffffff, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000140), 0x0, &(0x7f0000000180)=ANY=[]}, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000980)=@broute={'broute\x00', 0x20, 0x3, 0x2d9, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000380], 0x0, &(0x7f00000002c0), &(0x7f0000001000)=ANY=[@ANYBLOB="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"]}, 0x351) setsockopt$inet_int(r1, 0x0, 0x2, &(0x7f00000000c0)=0x7fffffff, 0x4) r2 = socket$rds(0x15, 0x5, 0x0) pipe(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$bt_BT_DEFER_SETUP(r3, 0x112, 0x7, &(0x7f0000000280)=0x100, 0x4) accept$packet(r4, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @remote}, &(0x7f0000000100)=0x14) connect$rds(r2, &(0x7f0000000140)={0x2, 0x4e22, @remote={0xac, 0x14, 0x14, 0xbb}}, 0x10) getsockopt$sock_buf(r2, 0x1, 0x3b, &(0x7f0000000180)=""/83, &(0x7f0000000200)=0x53) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000a00)=@filter={'filter\x00', 0xe, 0x4, 0x5a0, 0xffffffff, 0x0, 0xf0, 0xf0, 0xffffffff, 0xffffffff, 0x4d0, 0x4d0, 0x4d0, 0xffffffff, 0x4, &(0x7f0000000300), {[{{@ipv6={@ipv4={[], [0xff, 0xff], @rand_addr=0x80000001}, @dev={0xfe, 0x80, [], 0x16}, [0x0, 0xffffff00, 0xff, 0xffffffff], [0x0, 0xff000000, 0xffffffff], 'ipddp0\x00', 'ip_vti0\x00', {}, {0xff}, 0x6c, 0x2bf}, 0x0, 0xc8, 0xf0}, @REJECT={0x28, 'REJECT\x00', 0x0, {0x7}}}, {{@ipv6={@remote={0xfe, 0x80, [], 0xbb}, @remote={0xfe, 0x80, [], 0xbb}, [0xff000000, 0xffffffff, 0xffffff00, 0xff], [0xff, 0xffffffff, 0x0, 0xff000000], 'syzkaller1\x00', 'eql\x00', {}, {}, 0x62, 0x0, 0x4, 0x1}, 0x0, 0x120, 0x148, 0x0, {}, [@common=@frag={0x30, 'frag\x00', 0x0, {0x7ff, 0x7, 0x1, 0x2}}, @common=@hl={0x28, 'hl\x00', 0x0, {0x3, 0x7fff}}]}, @REJECT={0x28, 'REJECT\x00', 0x0, {0x7}}}, {{@ipv6={@dev={0xfe, 0x80, [], 0xc}, @loopback={0x0, 0x1}, [0xffffffff, 0xffffffff, 0xff000000, 0xff000000], [0xff, 0x0, 0xff, 0xffffff00], 'irlan0\x00', 'vcan0\x00', {0xff}, {}, 0x3b, 0xffffffffffffab69, 0x2, 0x30}, 0x0, 0x250, 0x298, 0x0, {}, [@common=@srh={0x30, 'srh\x00', 0x0, {0xbb, 0x1, 0x3, 0x6, 0xffffffffffffffc0, 0x80}}, @common=@inet=@policy={0x158, 'policy\x00', 0x0, {[{@ipv4, [0xffffffff, 0xff0000ff, 0xff000000, 0xffffffff], @ipv4=@multicast1=0xe0000001, [0xffffffff, 0xffffffff, 0xff000000, 0xffffff00], 0x4d5, 0x3500, 0x5c, 0x0, 0x10, 0xf}, {@ipv6=@dev={0xfe, 0x80, [], 0x11}, [0x0, 0xff000000, 0xff0000ff, 0xffffff00], @ipv4=@multicast1=0xe0000001, [0xffffffff, 0x0, 0x0, 0xffffffff], 0x4d5, 0x3500, 0x77, 0x1, 0x0, 0x1d}, {@ipv6=@mcast1={0xff, 0x1, [], 0x1}, [0xff000000, 0xffffffff, 0xffffff00, 0xff], @ipv4=@multicast2=0xe0000002, [0xffffffff, 0x0, 0xffffff00, 0xffffffff], 0x4d3, 0x3503, 0x7f, 0x0, 0x1, 0x19}, {@ipv4=@local={0xac, 0x14, 0x14, 0xaa}, [0x0, 0xff, 0x0, 0xff0000ff], @ipv6=@local={0xfe, 0x80, [], 0xaa}, [0xffffffff, 0xffffffff, 0xff, 0xff0000ff], 0x4d4, 0x3505, 0x0, 0x1, 0x1f, 0x10}], 0x0, 0x3}}]}, @common=@unspec=@LED={0x48, 'LED\x00', 0x0, {'syz1\x00', 0x0, 0x8}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28, '\x00', 0x0, 0xfffffffffffffffe}}}}, 0x600) socket(0x1, 0xa, 0x7) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_TIMER(r4, 0x40605346, &(0x7f0000000680)={0x1, 0x3, {0x3, 0x0, 0x9, 0x3}}) [ 334.330885] RBP: 000000000072bea0 R08: 0000000000000000 R09: 0000000000000000 [ 334.330893] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000016 [ 334.330900] R13: 00000000000003eb R14: 00000000006f7ea8 R15: 0000000000000021 [ 334.639168] kernel msg: ebtables bug: please report to author: entries_size too small 2018/03/30 23:06:26 executing program 3: r0 = socket(0x40000000015, 0x5, 0x0) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000240), 0x4) bind$inet(r0, &(0x7f00008a5ff0)={0x2, 0x4e21, @loopback=0x7f000001}, 0x10) sendto$inet(r0, &(0x7f0000f7db7f)="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", 0x481, 0x0, &(0x7f000069affb)={0x2, 0x4e20, @loopback=0x7f000001}, 0x10) setsockopt$RDS_CONG_MONITOR(r0, 0x114, 0x6, &(0x7f0000000080)=0x1, 0x4) ioctl$int_in(r0, 0x5421, &(0x7f0000000040)) sendto$inet(r0, &(0x7f00004b3fff), 0x0, 0x0, &(0x7f00002b4000)={0x2, 0x4e20, @loopback=0x7f000001}, 0x3f6) ioctl$sock_inet_tcp_SIOCOUTQ(r0, 0x5411, &(0x7f0000000000)) 2018/03/30 23:06:26 executing program 4: mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount(&(0x7f000000a000)='./file0\x00', &(0x7f0000026ff8)='./file0\x00', &(0x7f000000c000)='ramfs\x00', 0x0, &(0x7f000000a000)) mkdir(&(0x7f0000000000)='./file1\x00', 0x0) mount(&(0x7f0000000040)='./file0\x00', &(0x7f0000903000)='./file0\x00', &(0x7f0000811ffa)='bdev\x00', 0x100000, &(0x7f00000003c0)="b4654e059fcebd03cc73f9239f6a07ed22ce66385d2337eef2a66d904034c83627a12afc1ecb8d7e1142c51440c631a77475529f58d06474cd08984ca20eda40006f352aef263558961ab3f1ff300b08a5b54aea2a56162623142af3cce1057c8ee9eb15dc98e01846afc544b424ae134364f0ff76c92d9ce550f032a00c5981d459112f5c70789ed3bbb5527400465c6a98b4e0432a1ca8ce37dfdc7619e8b4129ee976c9b944bc6b366dbc5f0dae558fa30da2267dfccc6187d2d6f34d725343470a748007fee97ba3784d030b833463699073719ca14a0e9b6d74a70db8b216256fcd74c66a0faac2ccc16c74a7e13289091a5256dd062edf07ff4d9168e49b0820c6bb9fbabc587b54dacb9834b644eafefc1e0a4dd249c45cac5858364765a08967ed59ac86aefcb7d13e3e9cdf7c7262122bc4cfd718c3fd984395afa896d48a48489f889bd4efac7267dffdff0c686fae") r0 = dup(0xffffffffffffffff) openat$sequencer(0xffffffffffffff9c, &(0x7f0000000140)='/dev/sequencer\x00', 0x2080, 0x0) r1 = syz_open_dev$vcsn(&(0x7f00000000c0)='/dev/vcs#\x00', 0x2, 0x20800) renameat(r0, &(0x7f0000000080)='./file1/file0\x00', r1, &(0x7f0000000100)='./file1\x00') mount(&(0x7f0000fb6000)='./file0\x00', &(0x7f0000d78000)='.', &(0x7f0000fdb000)='ubifs\x00', 0x1003, 0x0) mount(&(0x7f00002b9ff8)='./file0\x00', &(0x7f0000cbeff8)='./file0\x00', &(0x7f00005f7ffa)='ramfs\x00', 0x80000, &(0x7f000002f000)) mount(&(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)='./file1\x00', &(0x7f0000000200)='anon_inodefs\x00', 0x2000, &(0x7f0000000240)) mount(&(0x7f0000adcff8)='./file0\x00', &(0x7f0000e08fff)='.', &(0x7f00005e9000)='cifs\x00', 0x2000, &(0x7f0000ad5000)) [ 334.697675] FAULT_INJECTION: forcing a failure. [ 334.697675] name failslab, interval 1, probability 0, space 0, times 0 [ 334.709076] CPU: 0 PID: 26393 Comm: syz-executor0 Not tainted 4.16.0-rc7+ #372 [ 334.716444] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 334.725804] Call Trace: [ 334.728401] dump_stack+0x194/0x24d [ 334.732043] ? arch_local_irq_restore+0x53/0x53 [ 334.736747] should_fail+0x8c0/0xa40 [ 334.740484] ? fault_create_debugfs_attr+0x1f0/0x1f0 2018/03/30 23:06:26 executing program 6: pipe(&(0x7f0000000940)={0xffffffffffffffff, 0xffffffffffffffff}) accept4$ax25(r0, 0x0, &(0x7f0000000080), 0x80000) r1 = socket$inet(0x2, 0x20000000000003, 0x2) connect$inet(r1, &(0x7f0000000000)={0x2, 0x0, @remote={0xac, 0x14, 0x14, 0xbb}}, 0x10) sendmsg(0xffffffffffffffff, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000140), 0x0, &(0x7f0000000180)=ANY=[]}, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000980)=@broute={'broute\x00', 0x20, 0x3, 0x2d9, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000380], 0x0, &(0x7f00000002c0), &(0x7f0000001000)=ANY=[@ANYBLOB="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"]}, 0x351) setsockopt$inet_int(r1, 0x0, 0x2, &(0x7f00000000c0)=0x7fffffff, 0x4) r2 = socket$rds(0x15, 0x5, 0x0) pipe(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$bt_BT_DEFER_SETUP(r3, 0x112, 0x7, &(0x7f0000000280)=0x100, 0x4) accept$packet(r4, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @remote}, &(0x7f0000000100)=0x14) connect$rds(r2, &(0x7f0000000140)={0x2, 0x4e22, @remote={0xac, 0x14, 0x14, 0xbb}}, 0x10) getsockopt$sock_buf(r2, 0x1, 0x3b, &(0x7f0000000180)=""/83, &(0x7f0000000200)=0x53) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000a00)=@filter={'filter\x00', 0xe, 0x4, 0x5a0, 0xffffffff, 0x0, 0xf0, 0xf0, 0xffffffff, 0xffffffff, 0x4d0, 0x4d0, 0x4d0, 0xffffffff, 0x4, &(0x7f0000000300), {[{{@ipv6={@ipv4={[], [0xff, 0xff], @rand_addr=0x80000001}, @dev={0xfe, 0x80, [], 0x16}, [0x0, 0xffffff00, 0xff, 0xffffffff], [0x0, 0xff000000, 0xffffffff], 'ipddp0\x00', 'ip_vti0\x00', {}, {0xff}, 0x6c, 0x2bf}, 0x0, 0xc8, 0xf0}, @REJECT={0x28, 'REJECT\x00', 0x0, {0x7}}}, {{@ipv6={@remote={0xfe, 0x80, [], 0xbb}, @remote={0xfe, 0x80, [], 0xbb}, [0xff000000, 0xffffffff, 0xffffff00, 0xff], [0xff, 0xffffffff, 0x0, 0xff000000], 'syzkaller1\x00', 'eql\x00', {}, {}, 0x62, 0x0, 0x4, 0x1}, 0x0, 0x120, 0x148, 0x0, {}, [@common=@frag={0x30, 'frag\x00', 0x0, {0x7ff, 0x7, 0x1, 0x2}}, @common=@hl={0x28, 'hl\x00', 0x0, {0x3, 0x7fff}}]}, @REJECT={0x28, 'REJECT\x00', 0x0, {0x7}}}, {{@ipv6={@dev={0xfe, 0x80, [], 0xc}, @loopback={0x0, 0x1}, [0xffffffff, 0xffffffff, 0xff000000, 0xff000000], [0xff, 0x0, 0xff, 0xffffff00], 'irlan0\x00', 'vcan0\x00', {0xff}, {}, 0x3b, 0xffffffffffffab69, 0x2, 0x30}, 0x0, 0x250, 0x298, 0x0, {}, [@common=@srh={0x30, 'srh\x00', 0x0, {0xbb, 0x1, 0x3, 0x6, 0xffffffffffffffc0, 0x80}}, @common=@inet=@policy={0x158, 'policy\x00', 0x0, {[{@ipv4, [0xffffffff, 0xff0000ff, 0xff000000, 0xffffffff], @ipv4=@multicast1=0xe0000001, [0xffffffff, 0xffffffff, 0xff000000, 0xffffff00], 0x4d5, 0x3500, 0x5c, 0x0, 0x10, 0xf}, {@ipv6=@dev={0xfe, 0x80, [], 0x11}, [0x0, 0xff000000, 0xff0000ff, 0xffffff00], @ipv4=@multicast1=0xe0000001, [0xffffffff, 0x0, 0x0, 0xffffffff], 0x4d5, 0x3500, 0x77, 0x1, 0x0, 0x1d}, {@ipv6=@mcast1={0xff, 0x1, [], 0x1}, [0xff000000, 0xffffffff, 0xffffff00, 0xff], @ipv4=@multicast2=0xe0000002, [0xffffffff, 0x0, 0xffffff00, 0xffffffff], 0x4d3, 0x3503, 0x7f, 0x0, 0x1, 0x19}, {@ipv4=@local={0xac, 0x14, 0x14, 0xaa}, [0x0, 0xff, 0x0, 0xff0000ff], @ipv6=@local={0xfe, 0x80, [], 0xaa}, [0xffffffff, 0xffffffff, 0xff, 0xff0000ff], 0x4d4, 0x3505, 0x0, 0x1, 0x1f, 0x10}], 0x0, 0x3}}]}, @common=@unspec=@LED={0x48, 'LED\x00', 0x0, {'syz1\x00', 0x0, 0x8, 0x8}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28, '\x00', 0x0, 0xfffffffffffffffe}}}}, 0x600) socket(0x0, 0xa, 0x7) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_TIMER(r4, 0x40605346, &(0x7f0000000680)={0x1, 0x3, {0x3, 0x0, 0x9, 0x3}}) 2018/03/30 23:06:26 executing program 3: r0 = socket(0x40000000015, 0x5, 0x0) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000240), 0x4) bind$inet(r0, &(0x7f00008a5ff0)={0x2, 0x4e21, @loopback=0x7f000001}, 0x10) sendto$inet(r0, &(0x7f0000f7db7f)="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", 0x481, 0x0, &(0x7f000069affb)={0x2, 0x4e20, @loopback=0x7f000001}, 0x10) setsockopt$RDS_CONG_MONITOR(r0, 0x114, 0x6, &(0x7f0000000080)=0x1, 0x4) ioctl$int_in(r0, 0x5421, &(0x7f0000000040)=0x56d) sendto$inet(0xffffffffffffffff, &(0x7f00004b3fff), 0x0, 0x0, &(0x7f00002b4000)={0x2, 0x4e20, @loopback=0x7f000001}, 0x3f6) ioctl$sock_inet_tcp_SIOCOUTQ(r0, 0x5411, &(0x7f0000000000)) [ 334.745625] ? find_held_lock+0x35/0x1d0 [ 334.749711] ? __lock_is_held+0xb6/0x140 [ 334.753805] ? check_same_owner+0x320/0x320 [ 334.758136] ? perf_trace_lock+0xd6/0x900 [ 334.762292] ? rcu_note_context_switch+0x710/0x710 [ 334.767240] should_failslab+0xec/0x120 [ 334.771226] __kmalloc_track_caller+0x5f/0x760 [ 334.775823] ? string+0x180/0x200 [ 334.779280] ? kstrdup_const+0x39/0x50 [ 334.783184] kstrdup+0x39/0x70 [ 334.786390] kstrdup_const+0x39/0x50 [ 334.790120] __kernfs_new_node+0xa2/0x570 2018/03/30 23:06:26 executing program 7: perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000100)='./control\x00', 0x0) r0 = inotify_init() inotify_add_watch(r0, &(0x7f0000f1eff6)='./control\x00', 0x220000000009) r1 = inotify_init1(0x0) inotify_add_watch(r1, &(0x7f000001eff6)='./control\x00', 0x2000200) setsockopt$inet6_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, &(0x7f0000000080)="5fce869db66fa225921ad03d773be4ff", 0x10) rmdir(&(0x7f000075aff6)='./control\x00') [ 334.794283] ? kernfs_dop_revalidate+0x380/0x380 [ 334.799062] ? snprintf+0xc0/0xf0 [ 334.802526] ? vsprintf+0x40/0x40 [ 334.806006] kernfs_new_node+0x80/0xe0 [ 334.809910] __kernfs_create_file+0x4b/0x320 [ 334.814337] cgroup_addrm_files+0x3c5/0xa70 [ 334.818692] ? cgroup_file_write+0x710/0x710 [ 334.823113] ? cpu_cgroup_css_alloc+0x30/0x30 [ 334.827643] ? __lock_is_held+0xb6/0x140 [ 334.831738] ? sched_online_group+0x4e0/0x4e0 [ 334.836251] ? cpu_cgroup_css_online+0x3a/0x50 [ 334.840857] ? online_css+0x224/0x2e0 2018/03/30 23:06:26 executing program 3: r0 = socket(0x40000000015, 0x5, 0x0) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000240), 0x4) bind$inet(r0, &(0x7f00008a5ff0)={0x2, 0x4e21, @loopback=0x7f000001}, 0x10) sendto$inet(r0, &(0x7f0000f7db7f)="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", 0x481, 0x0, &(0x7f000069affb)={0x2, 0x4e20, @loopback=0x7f000001}, 0x10) setsockopt$RDS_CONG_MONITOR(r0, 0x114, 0x6, &(0x7f0000000080)=0x1, 0x4) ioctl$int_in(r0, 0x5421, &(0x7f0000000040)=0x56d) sendto$inet(0xffffffffffffffff, &(0x7f00004b3fff), 0x0, 0x0, &(0x7f00002b4000)={0x2, 0x4e20, @loopback=0x7f000001}, 0x3f6) ioctl$sock_inet_tcp_SIOCOUTQ(r0, 0x5411, &(0x7f0000000000)) 2018/03/30 23:06:26 executing program 7: perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f00000000c0)='./control\x00', 0x0) r0 = inotify_init() inotify_add_watch(r0, &(0x7f0000000040)='./control\x00', 0x220000000009) r1 = inotify_init1(0x0) inotify_add_watch(r1, &(0x7f000001eff6)='./control\x00', 0x2000200) setsockopt$inet6_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, &(0x7f0000000080)="5fce869db66fa225921ad03d773be4ff", 0x10) rmdir(&(0x7f000075aff6)='./control\x00') mount(&(0x7f0000000100)='./control\x00', &(0x7f0000000140)='./control\x00', &(0x7f0000000180)='securityfs\x00', 0x40000, &(0x7f00000001c0)="9e5f") [ 334.845336] css_populate_dir+0x198/0x420 [ 334.849510] cgroup_apply_control_enable+0x390/0xbc0 [ 334.854645] ? cgroup_propagate_control+0x570/0x570 [ 334.859683] ? css_populate_dir+0x289/0x420 [ 334.864031] cgroup_mkdir+0x56f/0xfc0 [ 334.867836] ? __lock_is_held+0xb6/0x140 [ 334.871914] ? cgroup_destroy_locked+0x750/0x750 [ 334.876675] ? rcu_read_lock_sched_held+0x108/0x120 [ 334.881717] ? kmem_cache_free+0x258/0x2a0 [ 334.885958] ? set_nlink+0xc1/0x160 [ 334.889594] ? debug_lockdep_rcu_enabled+0x77/0x90 [ 334.894525] ? generic_permission+0x105/0x3c0 [ 334.899030] ? cgroup_destroy_locked+0x750/0x750 [ 334.903802] kernfs_iop_mkdir+0x153/0x1e0 [ 334.907967] vfs_mkdir+0x390/0x600 [ 334.911530] SyS_mkdirat+0x22b/0x2b0 [ 334.915264] ? SyS_mknod+0x480/0x480 [ 334.918990] ? trace_hardirqs_on+0xd/0x10 [ 334.923149] ? do_syscall_64+0xb7/0x940 [ 334.927135] ? SyS_mknod+0x480/0x480 [ 334.930863] do_syscall_64+0x281/0x940 [ 334.934755] ? vmalloc_sync_all+0x30/0x30 [ 334.938909] ? trace_event_raw_event_sys_exit+0x260/0x260 [ 334.944450] ? syscall_return_slowpath+0x550/0x550 [ 334.949385] ? syscall_return_slowpath+0x2ac/0x550 [ 334.954333] ? entry_SYSCALL_64_after_hwframe+0x52/0xb7 [ 334.959704] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 334.964565] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 334.969763] RIP: 0033:0x454e79 [ 334.972957] RSP: 002b:00007f016b92fc68 EFLAGS: 00000246 ORIG_RAX: 0000000000000102 [ 334.980684] RAX: ffffffffffffffda RBX: 00007f016b9306d4 RCX: 0000000000454e79 [ 334.987959] RDX: 0000000000000020 RSI: 0000000020000280 RDI: 0000000000000015 [ 334.995231] RBP: 000000000072bea0 R08: 0000000000000000 R09: 0000000000000000 [ 335.002492] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000016 [ 335.009750] R13: 00000000000003eb R14: 00000000006f7ea8 R15: 0000000000000022 [ 335.017120] cgroup: cgroup_addrm_files: failed to add weight, err=-12 [ 335.023430] kernel msg: ebtables bug: please report to author: entries_size too small 2018/03/30 23:06:27 executing program 3: r0 = socket(0x40000000015, 0x5, 0x0) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000240), 0x4) bind$inet(r0, &(0x7f00008a5ff0)={0x2, 0x4e21, @loopback=0x7f000001}, 0x10) sendto$inet(r0, &(0x7f0000f7db7f)="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", 0x481, 0x0, &(0x7f000069affb)={0x2, 0x4e20, @loopback=0x7f000001}, 0x10) setsockopt$RDS_CONG_MONITOR(r0, 0x114, 0x6, &(0x7f0000000080)=0x1, 0x4) ioctl$int_in(r0, 0x5421, &(0x7f0000000040)=0x56d) sendto$inet(0xffffffffffffffff, &(0x7f00004b3fff), 0x0, 0x0, &(0x7f00002b4000)={0x2, 0x4e20, @loopback=0x7f000001}, 0x3f6) ioctl$sock_inet_tcp_SIOCOUTQ(r0, 0x5411, &(0x7f0000000000)) 2018/03/30 23:06:27 executing program 4: mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount(&(0x7f000000a000)='./file0\x00', &(0x7f0000026ff8)='./file0\x00', &(0x7f000000c000)='ramfs\x00', 0x0, &(0x7f000000a000)) mkdir(&(0x7f0000000000)='./file1\x00', 0x0) mount(&(0x7f0000000040)='./file0\x00', &(0x7f0000903000)='./file0\x00', &(0x7f0000811ffa)='bdev\x00', 0x100000, &(0x7f00000003c0)="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") openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='cpuacct.stat\x00', 0x0, 0x0) openat$ion(0xffffffffffffff9c, &(0x7f0000000240)='/dev/ion\x00', 0x10400, 0x0) syz_open_dev$usbmon(&(0x7f0000000280)='/dev/usbmon#\x00', 0x2000000, 0x4002) r0 = socket$vsock_dgram(0x28, 0x2, 0x0) r1 = dup(r0) r2 = syz_open_dev$vcsn(&(0x7f00000000c0)='/dev/vcs#\x00', 0x2, 0x20800) renameat(r1, &(0x7f0000000080)='./file1/file0\x00', r2, &(0x7f0000000100)='./file1\x00') ioctl$KDDISABIO(r1, 0x4b37) mount(&(0x7f0000fb6000)='./file0\x00', &(0x7f0000d78000)='.', &(0x7f0000fdb000)='ubifs\x00', 0x1003, 0x0) mount(&(0x7f00002b9ff8)='./file0\x00', &(0x7f0000cbeff8)='./file0\x00', &(0x7f00005f7ffa)='ramfs\x00', 0x80000, &(0x7f000002f000)) mount(&(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)='./file1\x00', &(0x7f0000000200)='anon_inodefs\x00', 0x2000, &(0x7f0000000240)) mount(&(0x7f0000adcff8)='./file0\x00', &(0x7f0000e08fff)='.', &(0x7f00005e9000)='cifs\x00', 0x2000, &(0x7f0000ad5000)) 2018/03/30 23:06:27 executing program 7: r0 = syz_open_procfs(0x0, &(0x7f0000000140)='net/rt6_stats\x00') ioctl$SNDRV_CTL_IOCTL_HWDEP_NEXT_DEVICE(r0, 0xc0045520, &(0x7f0000000180)=0x6) r1 = perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f00000000c0)='./control\x00', 0x0) r2 = inotify_init() read(r2, &(0x7f00000001c0)=""/135, 0x87) inotify_add_watch(r2, &(0x7f0000f1eff6)='./control\x00', 0x220000000009) r3 = inotify_init1(0x0) inotify_add_watch(r2, &(0x7f0000000080)='./control/file0\x00', 0x2000201) mknod(&(0x7f0000000100)='./control/file0\x00', 0x4, 0x3) r4 = fcntl$dupfd(r1, 0x0, r3) setsockopt$inet6_tcp_TCP_FASTOPEN_KEY(r4, 0x6, 0x21, &(0x7f0000000040)="5ff0869db66f458532f1d03d773be4ff", 0x144) rmdir(&(0x7f0000000280)='./control\x00') 2018/03/30 23:06:27 executing program 5: mkdir(&(0x7f00000001c0)='./file0\x00', 0xde) perf_event_open(&(0x7f0000223000)={0x2, 0x78, 0xe3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000001980)={{{@in6=@remote, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast2}, 0x0, @in=@multicast2}}, &(0x7f0000001a80)=0xe8) r1 = syz_open_dev$sndpcmp(&(0x7f0000001600)='/dev/snd/pcmC#D#p\x00', 0x4, 0x400) recvfrom$ipx(r1, &(0x7f0000001640)=""/214, 0xd6, 0x40000000, 0x0, 0x0) syz_open_dev$dmmidi(&(0x7f0000000340)='/dev/dmmidi#\x00', 0x401, 0x301000) mount(&(0x7f00000003c0)='./file0\x00', &(0x7f0000000380)='./file0\x00', &(0x7f0000000300)='cgroup2\x00', 0x0, 0x0) r2 = open$dir(&(0x7f000001bff4)='./file0\x00', 0x10000, 0x0) r3 = socket$can_bcm(0x1d, 0x2, 0x2) r4 = syz_open_dev$audion(&(0x7f0000000040)='/dev/audio#\x00', 0x7, 0x40000) ioctl$sock_inet6_SIOCDIFADDR(r4, 0x8936, &(0x7f0000001580)={@mcast2={0xff, 0x2, [], 0x1}, 0x4c, r0}) sendmsg(r3, &(0x7f00000002c0)={&(0x7f00000000c0)=@pppol2tpv3in6={0x18, 0x1, {0x0, r4, 0x2, 0x4, 0x1, 0x0, {0xa, 0x4e23, 0x3, @empty, 0x1}}}, 0x80, &(0x7f0000000200)=[{&(0x7f0000000140)="c5e757d71e357a27e8d203617d16cfd8d09214b9dd403e8ab9cf3a30d29b", 0x1e}, {&(0x7f0000000180)="722788f1b2dd73eaa8b883d4d54ebb32fd17fb37a6116443", 0x18}, {&(0x7f0000000400)="37942044c415578d306e18563cc52008ebaf35b09ecd4fd01a62510f17923d39d2b1c68768916312ee5e9b895acd5f0118c198dbd51379f75d620e4da141a1049075037b4fd999aa39727dc7d2ce973a8355bfbae5bf3fe75a4c477049f506f8ad957f7f0be7e2c41921ecb267fe21dfdad9e0e0229b0fc57466ea7642902d8ac5e480c7fb58714359a90ae8f43c6f220187671d01ad824bf695ed", 0x9b}, {&(0x7f00000004c0)="a13a3cfd18c2f86d4b5fb330f7997519333c2e11f16e3a04e4ee517c861dc5c8fe6de41a1bac4409d1324eb512541e258b85099ffcd5d1f5c6fe3b77baf5424d2be245b531292cc2755d61a05855f3ebdd4103741395c8a80afd8e2d4cc2610a1d5dab8c094a399ba5daba6af4328abd247c7e656230a230a254752307e8db5d04bbc08f6c55a17928cfcedecb459fa18dd385a2af23d103", 0x98}, {&(0x7f0000000580)="806fcdf46d24f90fb98f2adfbc79955cd208706188dabb73095f899417b3d421e4e5982760e87c4497bed5d84bb62bca5d03785281d8a696494c562dde5481b6acd94333daf2bf62fde35204aa0223192515b3908bb66cfaadc8c5c7afc39aa574a82ba3f57e9577f7766d98e9768e4420cd7662b05045376cce2b4360027f0da3cd705d7a4bff73ec72d7eae969b7377df4a64ded608f2e3381333309961141ec6f68ec9b9770e47aa2a4f8d77a296723cb05c481feb71630a64515d1f0489d92b34417844347ff553018a95dc036d746625b477ca3ecef51d9b6da1f741966304942b07f5233c9119a37b05bc1f68aab4c413d620246d7bf220c83257949bae488bc0c832a5b5d0eb6754b6dea7666937221ab6758ccb2938e65789bee77ad5809ae81c5cbc456ab9d7fce582d0b615153feef632509843047f485771805fbe4bf5588691416df69fa13dd956fb893a50b75cc8da851c07bbf7c2ddabe7b1a7787230032cd58718b23cc4117885d45dee625f376c416cffa4d35277da8b5769f6d15e6aca6563de4024eaa4e48e54426c4b923c5796dde4ec652b70c85797dabe4df1c8f7d8d1af31701fb2f6107549a957951e1d80693e6010ac2f984fd755eb8b8435d2338f41449683e821c4ffcce8a4db930b8807510479f52ad42ae8753cc7f20107a10d1096c86fbe3f1a6681b439e61d50ad83c690d6f08a621c031026542848b8ee48b8cf14b38459bd7ab5b3ddeb0f8606b5fd2214c3df378e70594df3482b584b6783f9cd89e1340c932174c3c393fea4842bb0dce22fefb818084583bd94c68e1c9149d9d96ff9fe8d4d9b005f429f6e79c82191ee4e1d57b390272ffe3f187b80b50a59e38a7701a4d23e7e8abdaed4062d014b7e4f4ebaa412a770d85dbf209ae8ecf2680dea872137917bf97bf533c9f8a3b2f2cffcfff911d6af7941585dc6ac1a0cafdb92f9f9e925e756ad2fc773be3b9dfb1bec9077bfcc6396fcf774ffe09549af33888c81e43d41b6993a25aa5c33f8cc9410129f3c93ee8c7042f2b6ce7e73188bc65792c7bfa196c81a0a943523da09091f53293d7842f3af846ef52df0e064783cf88e3fc072ac48242a51532d2061c288e386a5e9f5462f43f5fc08feacaa9fd2a502e67ef27b025a2740751f577f8132da6f97c5afdbb8c73b459ddf3bd29e3f4852dcdc6969edb923fa0eb2120c20f495acd5c96bd881e8554f653f8648cce583c0eab231d673bbe394b99b61d39271f1d7257d168ae779e43eb0050e21011004dfb95296671abe4773af583559d99e4a457d3ce9f28abd533a69a9d18c59cb763a49d9237853d674657293ecea5bb354a1626b55fa7372b6d035fb0faf63a1b0ee66122b9af34e547494b3f7c189beefe688b58bac80feadf3ea711eada11264550b78362ae41710e79323a9e3e0e36e224105a16a9ea0fba9d5b5438cff29849cd2851d51112fedad654e9d0ffcb8144e69cb54a87e7bb37b95e9a108839788a07f4ab59851a74b570072e3c78ecacb1a4fae60f372b35737d74d8f05be9ba95c23d1abbd3c664b01d664dfc634aa32688920f4a212dc01ecc91375a655de7f4b50b3b46b5e889e426179f355804b65dd0ede0a6d3ecf13678e87255317af05135bf930ba898bfe1fff9ce72e10b9380d254d102b3d98cae8bd79319553c82b87e08d8c2c91f9372b6bfb982fa9a17f166169c75280cf67297fcc8767515d6836dfd0f613a94788d3e171794efe2e45d395d6fa894a13d93d61972c05ac10e01777f4bf0791b4c8a6a7ad73eeaaa10b863baaf1877331ddccf19fd38586eaed4758385c5e9a6624a9e563b06f799f914469461c1a58861fde42aeedd0887949f87bab81ede2a4160faf9ea63518a636c5345dd735db546e09d5739b7f8dd65d92d9e145391d7d479c5bb146882501c4d6d476c54b319b6b78f2c6c947f33d287228fbdd3cd64d3d5509e975482f396525355609d3af5484a7310e249338354e4c4c01591cb7560f9886e5f6a685e21eacd8fbd4f971b4c18bff2b7f756d691c04e98ea6fde46192d99adf856299e974f1514c560e14e7489c5ae24455052d7269c893404b1e746410c4d1a029d943349da3f66bdd9d9d7648e8ffa27a6ef2fe0f262c4e15379197789596f0f5a3e6565d4461f749c4f4ff22407929ddaa20db555f6f13555df7974060ee8a2f48eb8c4fb2be22dfd141465aa4e51314013a8e075694d10f58acfab4823a60679f686fd2be075802ec80a80080be4c57578d0b424d7a88bb4cfc3c012d7f677c62ebf89ea88b4be3ea09272d51af3e35b1a99e975bf1d7d66b2f38d0b79fc6c600078b924d8da45bb899b8d34ebae208efb7e9d47feaee6b8aeaab852a24d5a35df34f8dfabd04cbc01e8de6d605eba5322f4e427e84b9016fccc6a7f0def1a41fafc19535de30c9d9e65e5bfd1075db410924c5a505b7a496b329ba165e37d4907afa7137d2f07f1a31ebf2a7ea24b7d8ee668096e4b0f5599bad75d5c01dc323a700134c36577bae027a54f1d72c44cdcf7e36dac08e9942fc205b1de898d38f29373ccf26c1a424b511071ce845db8ca1126c20a8c1cc175a2537dc1e340132471e13de511e2b2321ea5c4bae401c787f8fe7d77d1ef9c7a5374fae04acf6f8630336ed4ef20bed2ac93da0f104fe57403350d704e9e65a0ea31c81020eb7c542ee07dd680c206c7afd8b7f95705f4f5a0ff73dcf7b86ffce995871e4f00aaf168d2e324720c9bff8f47108c5946389ab96297f4ff6124917aae9982c9e00b6f70612b943dffaacdb35c97eca16e4e14811fa81031b1707074b58357258a514a63e5a1bbee966f92b6a6ac84ae16009eec7367290efb7d519da62d8ae80aaa9e78b4f8c6bee22ba2b27aca145358b2c4fabe9a1f3343bdd40dc15247739b63e32b0cf7330dea3808b987b3d623dadf0f1830fd00f61e02888d5e5e8bd121f2ec14ec6629c766f599da30e277e889304305634401c7655bcbaaa8fe34ca3e3f2dedcc449ceb6d3eeb6c787b8d7e25717d3b862a600944ff3846b2a1c2b204dd9e39ff60ef9d4bb27905947f1a4261fe2534a449cbe7754dd573f8fb5e00d0fc7af2cbe0e85d25817a7cf2a16be3c4787aa58ca98caf26dc5fbfa11f07031f75f824a3eb4cb33d01b70350c88d6624fba459e5214812a3b19e5abfd59359026fc6cea5f78255ec3a0cfda8a13177b386cfe8aae450a1a7451a4a0848f9dfe4f63597cb1f3775cbfc65300a078c453b2d9e83a09d4457d4dff70d3187b92f9552afdd4d1b7d2cd1e122b9cd9259a427acf52f865d53ad56556ba35bec97536ce28eb72cad2d08e7c22048b7dc00d74eb0d9551d5ab1381dffb070388ce4541bc3a0443927aa7881458370f9c570f9161a37105b784c867f9d01f01e56051ab61704f10778977b4b905148b88126206acfefc4fc09ec0c5ec155cd8255625a56856f07728a5aad99a86b7b38b3e05fc857f4786f43b1d7f99fd4ee77d2eb3a534aa9ae146098ac6ef988f399b12f56e994792d311339ea18ddece8cc60e978e2792a85d7bca10b186b617612b82d994df810c64181ee3bc5e923a184c7f03121a5eea1ccce565c3da6d4615b94a240177faf972ec01e999a5c7714c98cd16d50ab9d00ae35da4302a19253a41e29287daad3cf855e4d2e9d4156d83c24b7e3f6720fdbd1414ce91de80b1150df9bae540bce021f55bb2986395fc77542c40b81ed288e4de4199464c0b12b3b4ce03c07dfbe5ede595bed36565344c240380c5cfa4643088e8637be885788a4f479e0f9c53034ee086fb57dd41dafa64353481256e3db2b25d15202f79b86affa3eec8a998ad34b7451c0096552147a6c7e1e9ff545c0bc0c2e1f16e50c4d6a045010acd0862fd97569ddaba7403b955b63343487cd788d21b0849d92e38168e6a34a7708aececea3a41758eedf5a7270b9fd95c8eadca62ade13bd40651642f0abb4aa9c4a7a4b597e7d389c6576806398c2b50fa353837a735b9a5160c7dd57f2f669f5058321f7477ef5a0fc512938772c98447879c608b43969a93fff796e9b6b69c65bb9bf22e3f32e3733145a49be7fa589a29a2257cb8625ec6a69ce028700392070c92b913ced735bcee2b2f47c758eb6bc0c7a5c862ccf590f20d71ce55fb8522acca15c3bdc8c292cb2753b48e6c2887d5ce21c1057779d1cd58ba71aa1f8ecab0136dc5eef51b368d313934f59b02bdec4fbf6ecd3058cd54bd9eb669439d606a0390992aebc18d62aa3701e0727b1c28ea870f0b56dfdf0f8bcbb7bcd03234cc9827a2e0f45f25f65d7ca41f9d0e70f215929513dbfc469170e52cf825589415a1f5802d8b3922edde82e2bffff534a5fdae405ed76c190ff27b0b981562e3cd466bc648c3986392c28c7cfd570937add40c30260ea56170e0a56d1c524a80abafbb5447a228c4ac4c6699fbd1057682888167e209a02998fa9fc8ad5fe5421d05a40f065e39c0033f6a06fd7acd6211ffe05d43e8f06af7201dc1dfa206285426ac78b236e25314b458effdbd1c82dfb0eed4559c5983a7c9211e99cf1918a9cb29d459691d664921750b39c8f217af9e64f70c2af03dea320f3d056386e89bd1e57e3232959d1988c12f7c28f7f1a0f2ec040513714a17b1f1d5018cd58e5b19617256d8a8bac963b10048e24e7ff77ef53cc3007e1780f6015b7cc925bba5a95aae95aa312d8e3838c716f789a4afe674e7719bebfdf99e1393ed7d0868324d444c1b194b6fc255a8ae4ee0923a7c9f61740011f1c07a113cb1147dd1f624980e4da5a4ec9b1897ec454668d0f84b0e4dac901ba88a38db5721e4a595bd1b3810693b7bd00791af241be3fe5a2a8a44bce9c8ab64364dd8be996d8cdb15943164683c9df8c58d8ab7908b53e98dc4c4a1f01f4ccae25aab9e0fa69a12c81ed1df1e17491f9ad95c651908e26942bacf37d236b82fb4033949e50ecbd00eaa58b233de41e7ee691989c695f0df57a0319a484b27c3879a8b47171b014b94cbb6b6a9ccd7a64c616b6680413a04ab5c7cda76f9d0ba760373e56b1fc7ad0e936534d421ee46fb48ca3af6f67f77120b651827defe7785db2ceea21aa457e3b8407fafc333194ea83090040668892142b94c4fa2fae84afb9e1d658e81255ed2943242786f47f82de6c54c5e22eec40bb72d122991fb8e0bfdc4e46a9f0cf69a408e7b27c94e9658bbbe1711e9da4baac9787f30a794dffa0caacc3156e21770e61af5ad511f06f8ca45bbf076c478e990619a66e20f69a632f7c3e2c5e4852d7018f9923811673ec14599e0ac00a5509039c127b772a89569250278fe3486486ede4e30707832f36d30476fcc2df1fe9ab6062cdeacdf0e76eb59689c29237e5caa5c7f3d8ad84be37b44c437842b55aa9b1c46266b5e15927a005f5a52be76765133e00746f397888f1f3411df5cad086c410f221c313d47f7306a7d5802e3e0d34a5a648b911eac4c6acb029608e6a44484b3447d20f0aa05a180dbe6e43aa43ba3284bb5b1bebc9e5647dd012ccdc7c10552e676d8ee2f42420573de947d5655c2cc5acf79c644c4dbebe443bcdd1f27f01713c738247c5f9b941a420c88ff0593888c175735a2baf9bcc3916ea6d26a1b17af118928257b6a29d26ce900f7ee173f537d27f192783e3cc3be3f836b1cb9154ac24a4295e33a4f86692bdd6109654cf7cf0447b9850900c318bedb0558a6e9a4a6b61ba206add43ae1c23352f2f2a415942a69c60766bd4219edf8204cb", 0x1000}], 0x5, &(0x7f0000003c80)=ANY=[@ANYBLOB="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"], 0x2140, 0x1}, 0x800) mkdirat(0xffffffffffffffff, &(0x7f0000000280)='./file0\x00', 0x20) unlinkat(r2, &(0x7f0000000080)='./file0\x00', 0x200) 2018/03/30 23:06:27 executing program 0 (fault-call:7 fault-nth:35): mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r0 = syz_open_dev$usbmon(&(0x7f0000000400)='/dev/usbmon#\x00', 0x0, 0x0) r1 = perf_event_open(&(0x7f0000223000)={0x2, 0x78, 0xe3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000001980)={{{@in6=@remote, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast2}, 0x0, @in=@multicast2}}, &(0x7f0000001a80)=0xe8) chown(&(0x7f00000004c0)='./file0\x00', r2, 0x0) mount(&(0x7f00000003c0)='./file0\x00', &(0x7f0000000380)='./file0\x00', &(0x7f0000000300)='cgroup2\x00', 0x0, 0x0) r3 = open$dir(&(0x7f000001bff4)='./file0\x00', 0x0, 0x0) mkdirat(r3, &(0x7f0000000280)='./file0\x00', 0x20) getdents64(r3, &(0x7f00000007c0)=""/250, 0x1015a) dup3(r0, r1, 0x80000) r4 = open$dir(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) renameat2(r4, &(0x7f0000000200)='./file1\x00', 0xffffffffffffffff, &(0x7f0000000240)='./file0\x00', 0xfd1092750066ec78) ioctl$KDGKBMODE(0xffffffffffffffff, 0x4b44, &(0x7f0000000140)) 2018/03/30 23:06:27 executing program 6: pipe(&(0x7f0000000940)={0xffffffffffffffff, 0xffffffffffffffff}) accept4$ax25(r0, 0x0, &(0x7f0000000080), 0x80000) r1 = socket$inet(0x2, 0x20000000000003, 0x2) connect$inet(r1, &(0x7f0000000000)={0x2, 0x0, @remote={0xac, 0x14, 0x14, 0xbb}}, 0x10) sendmsg(0xffffffffffffffff, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000140), 0x0, &(0x7f0000000180)=ANY=[]}, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000980)=@broute={'broute\x00', 0x20, 0x3, 0x2d9, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000380], 0x0, &(0x7f00000002c0), &(0x7f0000001000)=ANY=[@ANYBLOB="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"]}, 0x351) setsockopt$inet_int(r1, 0x0, 0x2, &(0x7f00000000c0)=0x7fffffff, 0x4) r2 = socket$rds(0x15, 0x5, 0x0) pipe(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$bt_BT_DEFER_SETUP(r3, 0x112, 0x7, &(0x7f0000000280)=0x100, 0x4) accept$packet(r4, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @remote}, &(0x7f0000000100)=0x14) connect$rds(r2, &(0x7f0000000140)={0x2, 0x4e22, @remote={0xac, 0x14, 0x14, 0xbb}}, 0x10) getsockopt$sock_buf(r2, 0x1, 0x3b, &(0x7f0000000180)=""/83, &(0x7f0000000200)=0x53) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000a00)=@filter={'filter\x00', 0xe, 0x4, 0x5a0, 0xffffffff, 0x0, 0xf0, 0xf0, 0xffffffff, 0xffffffff, 0x4d0, 0x4d0, 0x4d0, 0xffffffff, 0x4, &(0x7f0000000300), {[{{@ipv6={@ipv4={[], [0xff, 0xff], @rand_addr=0x80000001}, @dev={0xfe, 0x80, [], 0x16}, [0x0, 0xffffff00, 0xff, 0xffffffff], [0x0, 0xff000000, 0xffffffff], 'ipddp0\x00', 'ip_vti0\x00', {}, {0xff}, 0x6c, 0x2bf}, 0x0, 0xc8, 0xf0}, @REJECT={0x28, 'REJECT\x00', 0x0, {0x7}}}, {{@ipv6={@remote={0xfe, 0x80, [], 0xbb}, @remote={0xfe, 0x80, [], 0xbb}, [0xff000000, 0xffffffff, 0xffffff00, 0xff], [0xff, 0xffffffff, 0x0, 0xff000000], 'syzkaller1\x00', 'eql\x00', {}, {}, 0x62, 0x0, 0x4, 0x1}, 0x0, 0x120, 0x148, 0x0, {}, [@common=@frag={0x30, 'frag\x00', 0x0, {0x7ff, 0x7, 0x1, 0x2}}, @common=@hl={0x28, 'hl\x00', 0x0, {0x3, 0x7fff}}]}, @REJECT={0x28, 'REJECT\x00', 0x0, {0x7}}}, {{@ipv6={@dev={0xfe, 0x80, [], 0xc}, @loopback={0x0, 0x1}, [0xffffffff, 0xffffffff, 0xff000000, 0xff000000], [0xff, 0x0, 0xff, 0xffffff00], 'irlan0\x00', 'vcan0\x00', {0xff}, {}, 0x3b, 0xffffffffffffab69, 0x2, 0x30}, 0x0, 0x250, 0x298, 0x0, {}, [@common=@srh={0x30, 'srh\x00', 0x0, {0xbb, 0x1, 0x3, 0x6, 0xffffffffffffffc0, 0x80}}, @common=@inet=@policy={0x158, 'policy\x00', 0x0, {[{@ipv4, [0xffffffff, 0xff0000ff, 0xff000000, 0xffffffff], @ipv4=@multicast1=0xe0000001, [0xffffffff, 0xffffffff, 0xff000000, 0xffffff00], 0x4d5, 0x3500, 0x5c, 0x0, 0x10, 0xf}, {@ipv6=@dev={0xfe, 0x80, [], 0x11}, [0x0, 0xff000000, 0xff0000ff, 0xffffff00], @ipv4=@multicast1=0xe0000001, [0xffffffff, 0x0, 0x0, 0xffffffff], 0x4d5, 0x3500, 0x77, 0x1, 0x0, 0x1d}, {@ipv6=@mcast1={0xff, 0x1, [], 0x1}, [0xff000000, 0xffffffff, 0xffffff00, 0xff], @ipv4=@multicast2=0xe0000002, [0xffffffff, 0x0, 0xffffff00, 0xffffffff], 0x4d3, 0x3503, 0x7f, 0x0, 0x1, 0x19}, {@ipv4=@local={0xac, 0x14, 0x14, 0xaa}, [0x0, 0xff, 0x0, 0xff0000ff], @ipv6=@local={0xfe, 0x80, [], 0xaa}, [0xffffffff, 0xffffffff, 0xff, 0xff0000ff], 0x4d4, 0x3505, 0x0, 0x1, 0x1f, 0x10}], 0x0, 0x3}}]}, @common=@unspec=@LED={0x48, 'LED\x00', 0x0, {'syz1\x00', 0x0, 0x8, 0x8}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28, '\x00', 0x0, 0xfffffffffffffffe}}}}, 0x600) socket(0x0, 0xa, 0x7) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_TIMER(r4, 0x40605346, &(0x7f0000000680)={0x1, 0x3, {0x3, 0x0, 0x9, 0x3}}) 2018/03/30 23:06:27 executing program 2: perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f00000000c0)='./control\x00', 0x0) inotify_init() r0 = syz_open_dev$sg(&(0x7f000028fff7)='/dev/sg#\x00', 0x0, 0x0) ioctl(r0, 0x4000000000001276, &(0x7f0000000040)) msgget(0x2, 0x0) getsockopt$nfc_llcp(0xffffffffffffffff, 0x118, 0x4, &(0x7f0000000740)=""/223, 0xdf) setsockopt$inet_mreq(r0, 0x0, 0x23, &(0x7f00000002c0)={@empty, @remote={0xac, 0x14, 0x14, 0xbb}}, 0x8) accept4$nfc_llcp(0xffffffffffffffff, &(0x7f0000000940), &(0x7f0000000080)=0x60, 0x800) ioctl$SNDRV_CTL_IOCTL_ELEM_INFO(0xffffffffffffffff, 0xc1105511, &(0x7f0000000100)={{0x0, 0x0, 0x0, 0x0, "386aea20273dc03c3d18dd0dbd4a0ca15f9f580393cc4ec3b8ee256b9aa630224ba64c6ff43ee01d2996c914"}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "eda422cd37591b3a5a7a683380f7e0b9e790c6b72cd0a4f3342f7431c1699a305ca3091bb2320e8df4e298a2cca26637866a68c1426ffbd8a6c7da1d8ea77d9d", &(0x7f00000000c0)='/dev/snd/controlC#\x00', 0x13}) r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000003c0)='/proc/self/net/pfkey\x00', 0x800, 0x0) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) add_key$user(&(0x7f0000000480)='user\x00', &(0x7f00000004c0)={0x73, 0x79, 0x7a, 0x3}, &(0x7f0000000500)="d3238eea76b0470531092a0a77b0b49789a0fc97b8f8b9e23a2a5a5a0c169ed6e83480b4801dbf79db3527904ee3128c05ce2806e210237c36b88ceabe99d8784860e5d0e91fe33d38d0133e056cdd1e2910d57fc5eb1b23db3b60a7077ff33bb6c7445cd258ee25f9187269c22d1ed05acb2b9b599bd285b692257a631754ab9befebd3fdb3167361c24c5c5dcf90e476e052b9d22362c57878cb7205fe361346d6beb77b7844fe94", 0xa9, 0xfffffffffffffffe) ioctl$sock_inet_SIOCSIFADDR(r0, 0x8916, &(0x7f0000000300)={'gretap0\x00', {0x2, 0x4e24, @loopback=0x7f000001}}) keyctl$instantiate_iov(0x14, 0x0, &(0x7f0000000780)=[{&(0x7f0000000840)="edb4a01f68d76905035a4ebdd427d31585a5a650581902b1c077f74ca8f1ce7d3e2f6e1c6760433af9664b3f3bebab3a1a1c4ef86f42c39b758accc1e7637bb18d28248dc7a1719b73388830b162613b17fd02220bd1fe2ad86adb96efcfc672d126ae58f745fba0e7534cdbae947449df767bd76a0c38b5752dcd13f7065edea86dc156c0708e76c2c99a94a95f1e93ff73cb3eb94e06d399cf48aaac7963d13e4b3a6b32bc2b19d5461545dcf3f71bb24442d286421f8d891d77a3c4c1c9435bbdf187682c22ded22b669b7790d05b4894166a2d5f33098cf908a23a2e0671d824e88942fbe0bd1416", 0xea}], 0x1, 0x0) r3 = ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) ioctl$KVM_UNREGISTER_COALESCED_MMIO(r3, 0x4010ae68, &(0x7f0000000000)={0x0, 0x5000}) ioctl$KVM_CREATE_PIT2(r3, 0x4040ae77, &(0x7f0000000440)={0xfffffffffffffff7}) r4 = ioctl$KVM_CREATE_VCPU(r3, 0xae41, 0x0) setsockopt$inet_tcp_TCP_ULP(r1, 0x6, 0x1f, &(0x7f0000000280)='tls\x00', 0x4) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000005fd8)={'vcan0\x00'}) r5 = socket$can_raw(0x1d, 0x3, 0x1) socket$inet6(0xa, 0x0, 0x0) r6 = syz_open_dev$dspn(&(0x7f0000000040)='/dev/dsp#\x00', 0x0, 0x0) connect$vsock_stream(r6, &(0x7f0000000080)={0x28, 0x0, 0xffffffff, @my=0x1}, 0x10) dup2(r2, r4) dup3(r2, r3, 0x0) getsockopt$netrom_NETROM_T1(r5, 0x103, 0x1, &(0x7f0000000640), &(0x7f0000000400)=0x4) 2018/03/30 23:06:27 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x200, 0x0) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000680)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$sock_linger(r2, 0x1, 0xd, &(0x7f00000006c0)={0x400, 0x9}, 0x8) perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x0, 0x0) r3 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) mmap(&(0x7f0000000000/0x9d7000)=nil, 0x9d7000, 0x0, 0x10, 0xffffffffffffffff, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x7) perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r4 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r4, &(0x7f0000e5b000)={0x2, 0x4e20, @multicast1=0xe0000001}, 0x10) syz_open_dev$sg(&(0x7f0000000440)='/dev/sg#\x00', 0x0, 0x0) connect$inet(r4, &(0x7f0000000100)={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x11}}, 0x10) r5 = bpf$PROG_LOAD(0x5, &(0x7f0000eb0fb8)={0x1, 0x3, &(0x7f00009ff000)=@framed={{0x18}, [], {0x95}}, &(0x7f00002bf000)='syzkaller\x00', 0x4, 0xb7, &(0x7f00006ab000)=""/183}, 0x48) setsockopt$inet_tcp_int(r4, 0x6, 0x19, &(0x7f0000000240)=0x8, 0x4) r6 = socket$kcm(0x29, 0x2, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r6, 0x89e0, &(0x7f000031aff8)={r4, r5}) ioctl$sock_kcm_SIOCKCMCLONE(r6, 0x89e2, &(0x7f00000002c0)={0xffffffffffffffff}) sendmsg$nl_xfrm(r7, &(0x7f0000000780)={&(0x7f0000000200)={0x10}, 0xc, &(0x7f0000000740)={&(0x7f0000000480)=@updpolicy={0xb8, 0x19, 0x0, 0x0, 0x0, {{@in=@loopback=0x7f000001, @in6=@mcast1={0xff, 0x1, [], 0x1}}}}, 0xffcb}, 0x1}, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(r7, 0x89e1, &(0x7f0000000040)={r4}) r8 = fcntl$getown(r3, 0x9) recvfrom$inet6(r1, &(0x7f0000000140)=""/177, 0xb1, 0x40000000, &(0x7f0000000080)={0xa, 0x0, 0x9, @empty, 0xe38}, 0x1c) r9 = accept4$inet(0xffffffffffffff9c, &(0x7f0000000700)={0x0, 0x0, @broadcast}, &(0x7f0000000740)=0x10, 0x80000) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r9, 0x84, 0x64, &(0x7f0000000780)=[@in6={0xa, 0x4e22, 0xfffffffffffff7e1, @mcast2={0xff, 0x2, [], 0x1}, 0x8}, @in={0x2, 0x4e24, @broadcast=0xffffffff}], 0x2c) ptrace$setregset(0x4205, r8, 0x0, &(0x7f00000005c0)={&(0x7f0000000080)}) ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r10 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x1fffd, 0x0) r11 = syz_open_dev$sndtimer(&(0x7f00000000c0)='/dev/snd/timer\x00', 0x0, 0x0) read(r11, &(0x7f0000ec6000)=""/50, 0x32) fcntl$dupfd(r11, 0x0, r10) [ 335.590444] kernel msg: ebtables bug: please report to author: entries_size too small [ 335.634084] FAULT_INJECTION: forcing a failure. [ 335.634084] name failslab, interval 1, probability 0, space 0, times 0 [ 335.645453] CPU: 0 PID: 26442 Comm: syz-executor0 Not tainted 4.16.0-rc7+ #372 [ 335.645463] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 335.645469] Call Trace: [ 335.645488] dump_stack+0x194/0x24d [ 335.645506] ? arch_local_irq_restore+0x53/0x53 [ 335.645534] should_fail+0x8c0/0xa40 [ 335.676774] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 335.681889] ? find_held_lock+0x35/0x1d0 [ 335.685938] ? __lock_is_held+0xb6/0x140 [ 335.689999] ? check_same_owner+0x320/0x320 [ 335.694309] ? perf_trace_lock+0xd6/0x900 [ 335.698440] ? rcu_note_context_switch+0x710/0x710 [ 335.703357] should_failslab+0xec/0x120 [ 335.707315] __kmalloc_track_caller+0x5f/0x760 [ 335.711885] ? string+0x180/0x200 [ 335.715318] ? kstrdup_const+0x39/0x50 [ 335.719189] kstrdup+0x39/0x70 [ 335.722364] kstrdup_const+0x39/0x50 [ 335.726061] __kernfs_new_node+0xa2/0x570 [ 335.730193] ? kernfs_dop_revalidate+0x380/0x380 [ 335.734940] ? snprintf+0xc0/0xf0 [ 335.738377] ? vsprintf+0x40/0x40 [ 335.741817] kernfs_new_node+0x80/0xe0 [ 335.745688] __kernfs_create_file+0x4b/0x320 [ 335.750084] cgroup_addrm_files+0x3c5/0xa70 [ 335.754396] ? cgroup_file_write+0x710/0x710 [ 335.758786] ? cpu_cgroup_css_alloc+0x30/0x30 [ 335.763272] ? __lock_is_held+0xb6/0x140 [ 335.767320] ? sched_online_group+0x4e0/0x4e0 [ 335.771793] ? cpu_cgroup_css_online+0x3a/0x50 [ 335.776354] ? online_css+0x224/0x2e0 [ 335.780141] css_populate_dir+0x198/0x420 [ 335.784276] cgroup_apply_control_enable+0x390/0xbc0 [ 335.789369] ? cgroup_propagate_control+0x570/0x570 [ 335.794374] ? css_populate_dir+0x289/0x420 [ 335.798688] cgroup_mkdir+0x56f/0xfc0 [ 335.802467] ? __lock_is_held+0xb6/0x140 [ 335.806517] ? cgroup_destroy_locked+0x750/0x750 [ 335.811252] ? rcu_read_lock_sched_held+0x108/0x120 [ 335.816250] ? kmem_cache_free+0x258/0x2a0 [ 335.820470] ? set_nlink+0xc1/0x160 [ 335.824080] ? debug_lockdep_rcu_enabled+0x77/0x90 [ 335.828986] ? generic_permission+0x105/0x3c0 [ 335.833463] ? cgroup_destroy_locked+0x750/0x750 [ 335.838200] kernfs_iop_mkdir+0x153/0x1e0 [ 335.842330] vfs_mkdir+0x390/0x600 [ 335.845854] SyS_mkdirat+0x22b/0x2b0 [ 335.849552] ? SyS_mknod+0x480/0x480 [ 335.853247] ? trace_hardirqs_on+0xd/0x10 [ 335.857379] ? do_syscall_64+0xb7/0x940 [ 335.861337] ? SyS_mknod+0x480/0x480 [ 335.865032] do_syscall_64+0x281/0x940 [ 335.868900] ? vmalloc_sync_all+0x30/0x30 [ 335.873031] ? _raw_spin_unlock_irq+0x27/0x70 [ 335.877506] ? finish_task_switch+0x1c1/0x7e0 [ 335.881984] ? syscall_return_slowpath+0x550/0x550 [ 335.886894] ? syscall_return_slowpath+0x2ac/0x550 [ 335.891806] ? prepare_exit_to_usermode+0x350/0x350 [ 335.896803] ? entry_SYSCALL_64_after_hwframe+0x52/0xb7 [ 335.902150] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 335.906978] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 335.912146] RIP: 0033:0x454e79 [ 335.915314] RSP: 002b:00007f016b92fc68 EFLAGS: 00000246 ORIG_RAX: 0000000000000102 [ 335.923007] RAX: ffffffffffffffda RBX: 00007f016b9306d4 RCX: 0000000000454e79 2018/03/30 23:06:27 executing program 3: r0 = socket(0x40000000015, 0x5, 0x0) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000240), 0x4) bind$inet(r0, &(0x7f00008a5ff0)={0x2, 0x4e21, @loopback=0x7f000001}, 0x10) sendto$inet(r0, &(0x7f0000f7db7f)="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", 0x481, 0x0, &(0x7f000069affb)={0x2, 0x4e20, @loopback=0x7f000001}, 0x10) setsockopt$RDS_CONG_MONITOR(r0, 0x114, 0x6, &(0x7f0000000080)=0x1, 0x4) ioctl$int_in(r0, 0x5421, &(0x7f0000000040)=0x56d) sendto$inet(r0, &(0x7f00004b3fff), 0x0, 0x0, &(0x7f00002b4000)={0x2, 0x0, @loopback=0x7f000001}, 0x3f6) ioctl$sock_inet_tcp_SIOCOUTQ(r0, 0x5411, &(0x7f0000000000)) 2018/03/30 23:06:27 executing program 6: pipe(&(0x7f0000000940)={0xffffffffffffffff, 0xffffffffffffffff}) accept4$ax25(r0, 0x0, &(0x7f0000000080), 0x80000) r1 = socket$inet(0x2, 0x20000000000003, 0x2) connect$inet(r1, &(0x7f0000000000)={0x2, 0x0, @remote={0xac, 0x14, 0x14, 0xbb}}, 0x10) sendmsg(0xffffffffffffffff, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000140), 0x0, &(0x7f0000000180)=ANY=[]}, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000980)=@broute={'broute\x00', 0x20, 0x3, 0x2d9, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000380], 0x0, &(0x7f00000002c0), &(0x7f0000001000)=ANY=[@ANYBLOB="00000000000000000000000000000000000000000000000000000000000000000000000000000000feffffff0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000ffffffff010000000b00000008000000600469666230000000000000000000000000736974300000000000000000000000007663616e300000000000000000000000626f6e643000000000000000000000000180c200000e00ffff00ffffaaaaaaaaaaaaffffff0000ff000008010000d001000048020000706879736465760000000000000000000000000000000000000000000000000070000000000000006e723000000000000000000000000000000000000000000000000000000000000000000000000000000000000000766c616e300000003a9c4ebb9f24dc06a52c000000000000000000000000000000000000000000ff0000000000000000000000000000000101000000000000000000000000000000000000004c45440000000000000000000000000000000000000000000000000000000000280000000000000073797a310000000000000000000000000000000000000000000000004000000000000000000000004e464c4f470000000000000000000000000000000000000000000000000000005000000000000000000000000000000000000000692ef8a72c6779a914df06a44b35b0eafd833141b590148ad8c2d17b06e81aa50bc466307f618025cda16029da79ca01cd7bf2fa8433c6000000004e464c4f470000000000000000000000000000000000000000000000000000005000000000000000000000000000000000000000f7040c3bd532a607b6540847e9980255ac80a05048ee3c578fd00c809822ab1ff7d12707561fdd7b1bcbd7c428bd7449152a676a0e0fc0823ebe89b10758fffe5c92f48f0000000000000000000000000000000000000000000000000000000000000000000000000000000001000000fcffffff"]}, 0x351) setsockopt$inet_int(r1, 0x0, 0x2, &(0x7f00000000c0)=0x7fffffff, 0x4) r2 = socket$rds(0x15, 0x5, 0x0) pipe(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$bt_BT_DEFER_SETUP(r3, 0x112, 0x7, &(0x7f0000000280)=0x100, 0x4) accept$packet(r4, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @remote}, &(0x7f0000000100)=0x14) connect$rds(r2, &(0x7f0000000140)={0x2, 0x4e22, @remote={0xac, 0x14, 0x14, 0xbb}}, 0x10) getsockopt$sock_buf(r2, 0x1, 0x3b, &(0x7f0000000180)=""/83, &(0x7f0000000200)=0x53) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000a00)=@filter={'filter\x00', 0xe, 0x4, 0x5a0, 0xffffffff, 0x0, 0xf0, 0xf0, 0xffffffff, 0xffffffff, 0x4d0, 0x4d0, 0x4d0, 0xffffffff, 0x4, &(0x7f0000000300), {[{{@ipv6={@ipv4={[], [0xff, 0xff], @rand_addr=0x80000001}, @dev={0xfe, 0x80, [], 0x16}, [0x0, 0xffffff00, 0xff, 0xffffffff], [0x0, 0xff000000, 0xffffffff], 'ipddp0\x00', 'ip_vti0\x00', {}, {0xff}, 0x6c, 0x2bf}, 0x0, 0xc8, 0xf0}, @REJECT={0x28, 'REJECT\x00', 0x0, {0x7}}}, {{@ipv6={@remote={0xfe, 0x80, [], 0xbb}, @remote={0xfe, 0x80, [], 0xbb}, [0xff000000, 0xffffffff, 0xffffff00, 0xff], [0xff, 0xffffffff, 0x0, 0xff000000], 'syzkaller1\x00', 'eql\x00', {}, {}, 0x62, 0x0, 0x4, 0x1}, 0x0, 0x120, 0x148, 0x0, {}, [@common=@frag={0x30, 'frag\x00', 0x0, {0x7ff, 0x7, 0x1, 0x2}}, @common=@hl={0x28, 'hl\x00', 0x0, {0x3, 0x7fff}}]}, @REJECT={0x28, 'REJECT\x00', 0x0, {0x7}}}, {{@ipv6={@dev={0xfe, 0x80, [], 0xc}, @loopback={0x0, 0x1}, [0xffffffff, 0xffffffff, 0xff000000, 0xff000000], [0xff, 0x0, 0xff, 0xffffff00], 'irlan0\x00', 'vcan0\x00', {0xff}, {}, 0x3b, 0xffffffffffffab69, 0x2, 0x30}, 0x0, 0x250, 0x298, 0x0, {}, [@common=@srh={0x30, 'srh\x00', 0x0, {0xbb, 0x1, 0x3, 0x6, 0xffffffffffffffc0, 0x80}}, @common=@inet=@policy={0x158, 'policy\x00', 0x0, {[{@ipv4, [0xffffffff, 0xff0000ff, 0xff000000, 0xffffffff], @ipv4=@multicast1=0xe0000001, [0xffffffff, 0xffffffff, 0xff000000, 0xffffff00], 0x4d5, 0x3500, 0x5c, 0x0, 0x10, 0xf}, {@ipv6=@dev={0xfe, 0x80, [], 0x11}, [0x0, 0xff000000, 0xff0000ff, 0xffffff00], @ipv4=@multicast1=0xe0000001, [0xffffffff, 0x0, 0x0, 0xffffffff], 0x4d5, 0x3500, 0x77, 0x1, 0x0, 0x1d}, {@ipv6=@mcast1={0xff, 0x1, [], 0x1}, [0xff000000, 0xffffffff, 0xffffff00, 0xff], @ipv4=@multicast2=0xe0000002, [0xffffffff, 0x0, 0xffffff00, 0xffffffff], 0x4d3, 0x3503, 0x7f, 0x0, 0x1, 0x19}, {@ipv4=@local={0xac, 0x14, 0x14, 0xaa}, [0x0, 0xff, 0x0, 0xff0000ff], @ipv6=@local={0xfe, 0x80, [], 0xaa}, [0xffffffff, 0xffffffff, 0xff, 0xff0000ff], 0x4d4, 0x3505, 0x0, 0x1, 0x1f, 0x10}], 0x0, 0x3}}]}, @common=@unspec=@LED={0x48, 'LED\x00', 0x0, {'syz1\x00', 0x0, 0x8, 0x8}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28, '\x00', 0x0, 0xfffffffffffffffe}}}}, 0x600) socket(0x0, 0xa, 0x7) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_TIMER(r4, 0x40605346, &(0x7f0000000680)={0x1, 0x3, {0x3, 0x0, 0x9, 0x3}}) [ 335.930260] RDX: 0000000000000020 RSI: 0000000020000280 RDI: 0000000000000015 [ 335.937515] RBP: 000000000072bea0 R08: 0000000000000000 R09: 0000000000000000 [ 335.944769] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000016 [ 335.952024] R13: 00000000000003eb R14: 00000000006f7ea8 R15: 0000000000000023 [ 335.959476] cgroup: cgroup_addrm_files: failed to add weight, err=-12 2018/03/30 23:06:27 executing program 0 (fault-call:7 fault-nth:36): mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r0 = syz_open_dev$usbmon(&(0x7f0000000400)='/dev/usbmon#\x00', 0x0, 0x0) r1 = perf_event_open(&(0x7f0000223000)={0x2, 0x78, 0xe3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000001980)={{{@in6=@remote, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast2}, 0x0, @in=@multicast2}}, &(0x7f0000001a80)=0xe8) chown(&(0x7f00000004c0)='./file0\x00', r2, 0x0) mount(&(0x7f00000003c0)='./file0\x00', &(0x7f0000000380)='./file0\x00', &(0x7f0000000300)='cgroup2\x00', 0x0, 0x0) r3 = open$dir(&(0x7f000001bff4)='./file0\x00', 0x0, 0x0) mkdirat(r3, &(0x7f0000000280)='./file0\x00', 0x20) getdents64(r3, &(0x7f00000007c0)=""/250, 0x1015a) dup3(r0, r1, 0x80000) r4 = open$dir(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) renameat2(r4, &(0x7f0000000200)='./file1\x00', 0xffffffffffffffff, &(0x7f0000000240)='./file0\x00', 0xfd1092750066ec78) ioctl$KDGKBMODE(0xffffffffffffffff, 0x4b44, &(0x7f0000000140)) 2018/03/30 23:06:27 executing program 4: mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount(&(0x7f000000a000)='./file0\x00', &(0x7f0000026ff8)='./file0\x00', &(0x7f000000c000)='ramfs\x00', 0x0, &(0x7f000000a000)) mkdir(&(0x7f0000000000)='./file1\x00', 0x0) mount(&(0x7f0000000040)='./file0\x00', &(0x7f0000903000)='./file1\x00', &(0x7f0000811ffa)='bdev\x00', 0x100000, &(0x7f00000003c0)="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") r0 = dup(0xffffffffffffffff) r1 = syz_open_dev$vcsn(&(0x7f00000000c0)='/dev/vcs#\x00', 0x2, 0x20800) syz_open_dev$mouse(&(0x7f0000000140)='/dev/input/mouse#\x00', 0x5, 0x0) renameat(r0, &(0x7f0000000080)='./file1/file0\x00', r1, &(0x7f0000000100)='./file1\x00') mount(&(0x7f0000fb6000)='./file0\x00', &(0x7f0000d78000)='.', &(0x7f0000fdb000)='ubifs\x00', 0x1003, 0x0) mount(&(0x7f00002b9ff8)='./file0\x00', &(0x7f0000cbeff8)='./file0\x00', &(0x7f00005f7ffa)='ramfs\x00', 0x80000, &(0x7f000002f000)) mount(&(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)='./file1\x00', &(0x7f0000000200)='anon_inodefs\x00', 0x2000, &(0x7f0000000240)) mount(&(0x7f0000adcff8)='./file0\x00', &(0x7f0000e08fff)='.', &(0x7f00005e9000)='cifs\x00', 0x2000, &(0x7f0000ad5000)) 2018/03/30 23:06:27 executing program 2: perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f00000000c0)='./control\x00', 0x0) inotify_init() r0 = syz_open_dev$sg(&(0x7f000028fff7)='/dev/sg#\x00', 0x0, 0x0) ioctl(r0, 0x4000000000001276, &(0x7f0000000040)) msgget(0x2, 0x0) getsockopt$nfc_llcp(0xffffffffffffffff, 0x118, 0x4, &(0x7f0000000740)=""/223, 0xdf) setsockopt$inet_mreq(r0, 0x0, 0x23, &(0x7f00000002c0)={@empty, @remote={0xac, 0x14, 0x14, 0xbb}}, 0x8) accept4$nfc_llcp(0xffffffffffffffff, &(0x7f0000000940), &(0x7f0000000080)=0x60, 0x800) ioctl$SNDRV_CTL_IOCTL_ELEM_INFO(0xffffffffffffffff, 0xc1105511, &(0x7f0000000100)={{0x0, 0x0, 0x0, 0x0, "386aea20273dc03c3d18dd0dbd4a0ca15f9f580393cc4ec3b8ee256b9aa630224ba64c6ff43ee01d2996c914"}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "eda422cd37591b3a5a7a683380f7e0b9e790c6b72cd0a4f3342f7431c1699a305ca3091bb2320e8df4e298a2cca26637866a68c1426ffbd8a6c7da1d8ea77d9d", &(0x7f00000000c0)='/dev/snd/controlC#\x00', 0x13}) r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000003c0)='/proc/self/net/pfkey\x00', 0x800, 0x0) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) add_key$user(&(0x7f0000000480)='user\x00', &(0x7f00000004c0)={0x73, 0x79, 0x7a, 0x3}, &(0x7f0000000500)="d3238eea76b0470531092a0a77b0b49789a0fc97b8f8b9e23a2a5a5a0c169ed6e83480b4801dbf79db3527904ee3128c05ce2806e210237c36b88ceabe99d8784860e5d0e91fe33d38d0133e056cdd1e2910d57fc5eb1b23db3b60a7077ff33bb6c7445cd258ee25f9187269c22d1ed05acb2b9b599bd285b692257a631754ab9befebd3fdb3167361c24c5c5dcf90e476e052b9d22362c57878cb7205fe361346d6beb77b7844fe94", 0xa9, 0xfffffffffffffffe) ioctl$sock_inet_SIOCSIFADDR(r0, 0x8916, &(0x7f0000000300)={'gretap0\x00', {0x2, 0x4e24, @loopback=0x7f000001}}) keyctl$instantiate_iov(0x14, 0x0, &(0x7f0000000780)=[{&(0x7f0000000840)="edb4a01f68d76905035a4ebdd427d31585a5a650581902b1c077f74ca8f1ce7d3e2f6e1c6760433af9664b3f3bebab3a1a1c4ef86f42c39b758accc1e7637bb18d28248dc7a1719b73388830b162613b17fd02220bd1fe2ad86adb96efcfc672d126ae58f745fba0e7534cdbae947449df767bd76a0c38b5752dcd13f7065edea86dc156c0708e76c2c99a94a95f1e93ff73cb3eb94e06d399cf48aaac7963d13e4b3a6b32bc2b19d5461545dcf3f71bb24442d286421f8d891d77a3c4c1c9435bbdf187682c22ded22b669b7790d05b4894166a2d5f33098cf908a23a2e0671d824e88942fbe0bd1416", 0xea}], 0x1, 0x0) r3 = ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) ioctl$KVM_UNREGISTER_COALESCED_MMIO(r3, 0x4010ae68, &(0x7f0000000000)={0x0, 0x5000}) ioctl$KVM_CREATE_PIT2(r3, 0x4040ae77, &(0x7f0000000440)={0xfffffffffffffff7}) r4 = ioctl$KVM_CREATE_VCPU(r3, 0xae41, 0x0) setsockopt$inet_tcp_TCP_ULP(r1, 0x6, 0x1f, &(0x7f0000000280)='tls\x00', 0x4) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000005fd8)={'vcan0\x00'}) r5 = socket$can_raw(0x1d, 0x3, 0x1) socket$inet6(0xa, 0x0, 0x0) r6 = syz_open_dev$dspn(&(0x7f0000000040)='/dev/dsp#\x00', 0x0, 0x0) connect$vsock_stream(r6, &(0x7f0000000080)={0x28, 0x0, 0xffffffff, @my=0x1}, 0x10) dup2(r2, r4) dup3(r2, r3, 0x0) getsockopt$netrom_NETROM_T1(r5, 0x103, 0x1, &(0x7f0000000640), &(0x7f0000000400)=0x4) 2018/03/30 23:06:27 executing program 5: mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) perf_event_open(&(0x7f0000223000)={0x2, 0x78, 0xe3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000001980)={{{@in6=@remote, @in=@multicast1}}, {{@in=@multicast2}, 0x0, @in=@multicast2}}, &(0x7f0000001a80)=0xe8) mount(&(0x7f00000003c0)='./file0\x00', &(0x7f0000000380)='./file0\x00', &(0x7f0000000300)='cgroup2\x00', 0x0, 0x0) r0 = syz_open_dev$vcsn(&(0x7f0000000040)='/dev/vcs#\x00', 0xf689, 0x40000) ioctl$FUSE_DEV_IOC_CLONE(r0, 0x8004e500, &(0x7f0000000200)=r0) r1 = open$dir(&(0x7f000001bff4)='./file0\x00', 0x0, 0x0) mkdirat(0xffffffffffffffff, &(0x7f0000000280)='./file0\x00', 0x20) ioctl(r1, 0x1, &(0x7f00000000c0)="b87573427fd5ab2ae1d7b67a66c4e9880ea59cc0325c01aef0171369109af84b9dd30af1ee26135279977f7ad282b7ae1af52f34a6d1043796f60b855c81401b7e39117f2de6d238c676988f419d75cfda4513703ee2554c2f89089a1bcf15f7f452ca5c75c2792d630221defbb913a6ded84dc910514f7f004c03362c027cc8d4df635804f5eafe83ab363b284897b66ad205273df4ce1f36b7163ad3be75d791691f00ab8ab43e93596ab2fa551a8a24f6d945e8840d8929b3db1e621eef5742ce8501c9d3770fb59ee12631e178b672e874f487251b794b272ac91fefa9a03ba6c9525563") unlinkat(r1, &(0x7f0000000080)='./file0\x00', 0x200) [ 336.053491] kernel msg: ebtables bug: please report to author: entries_size too small 2018/03/30 23:06:27 executing program 3: r0 = socket(0x40000000015, 0x5, 0x0) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000240), 0x4) bind$inet(r0, &(0x7f00008a5ff0)={0x2, 0x4e21, @loopback=0x7f000001}, 0x10) sendto$inet(r0, &(0x7f0000f7db7f)="ba671368d1010000004900000001000000018be49e9301442865319997d0efdb2f54b6a10c7327757482bfce945c2a91fb8dfafc1d3f56bc543ab87321e12cca08a744a2d128b00634bc882151d36809229a96bc3437ef159489384ade077ba295eac2882dbfd3781dd4d4e609c42628dbb709b3eb1fa030009045dd98b9e6d77b6cec9ceb685595d43995e0f04c32260943add79831e661c6a351dedc8b9d220fbf9fb6e44fb6a629ce9a82025124fec9f3ee751f7da0cd7e799be88ddbdac20b48e890ff81d7fa28c2d017d7932f2569038740461accd4582f576e4fdb6150a3399f8266bc19eb943648ad1ad81420ed6c382436e474390c8995e829e4f9df43eed85a60b9ee254e31eb62900857fa134e76cc64880334adbff069a2e5e647d2ed36a96b23834b6f6ca6b8113baf4cf30347fbb7ffc30aea99872cc0dba03b07d3347b2d257edbe2733c26b7337a79962d8ce85469e3bcbe0e4a48a6ae69d13f2d4b5155b390ef67aa714b82b6313ee277cb8986eca5db2e97cb1ae2243bba80274f614ece521baef443394b4c161cb9ae926e21892578b49cfd6efe1cb1572148c10d92218ed73ec116a18de80ac42d2726a4523a764fc6dc356c5fbbf9d2c947ae3bc9a3dc76099f3257c8d5952876151b0326d8cb1d5683ee4ab5ded9a34c00ac1b03f34627ec18a7c2e92c87b7896549cfab5eb55fa85a970994bd4b22b5f0d045e241256d06f485a47b4a55ed389bc1734541232cd41908b5cfa4b8fcfcafce500a0c7ae99767713a98e7927aa69f6ccd7daea62f19ceb82559f41899c9a9aee99113e7e64b5f8b9824be9fdbfa4dd4995673d882bb4daeb64413b334e114965d2ba3cea8051e692508701b9400cb12eae457f8b8549944091b729160939918d8fcae611a48ed665f770db637487a236da1a58ba7566668651a77171fc4fe506496d19059343dbe4f426625d3f2b705f54581372361770bf5a9098a9fafefaf546426b294239ac33e3186e4d58ad2fa995a6ad4dc074e7cca11aead109563b2076c7c6e9f57ec63df960804e2e7f9d8444de9550cca3df7834d864e9777291c2e1f6205de2e43dc995ab8bb1515a365efc2830fa3e7a1dd137f550d6035212bc1f51c3b4ceea430df49ffc9210084ef156ad7e0d219efd6c116693735b44521d389969a3a65617cd2fd6e14060601cee4cd054cf36fe048b57d1d9ee3cad2a73552449926b4a6b03fbe9c0ec68357e1fbe52ed77b67f5870c0aefb7ee8236747e0d67a26725fb515544cbbe8464da94cfd8c0b94bb4e51a263b1749bd0a7cf651931f806d1b928d1f9994f1ad4d50e6a5cd7a8e4e687f8564fdacc864013d095ba9d5709eced3c28eabda476d177a7836400a01e02beed5a6636d4064fdda344967ad8682d14b87c71727cb66be27d1d39191f4223c545b62fb5d60262ba8076a65dbc194cee1df846c584b7bbe9dce6e6895b2cbbb64b03b55548b845cc3de2f939ef918421af9a5e9157e837651245299c03992d0ddee06bd22a31522aca0f309b1feccebc0b1c0ed9d21c19bfd15cd313ff64394fd6a10904890c9f6d646b026f27253e8f584c3ffd20ad67e8b62ed7676706d40bc5c80e376980b81", 0x481, 0x0, &(0x7f000069affb)={0x2, 0x4e20, @loopback=0x7f000001}, 0x10) setsockopt$RDS_CONG_MONITOR(r0, 0x114, 0x6, &(0x7f0000000080)=0x1, 0x4) ioctl$int_in(r0, 0x5421, &(0x7f0000000040)=0x56d) sendto$inet(r0, &(0x7f00004b3fff), 0x0, 0x0, &(0x7f00002b4000)={0x2, 0x0, @loopback=0x7f000001}, 0x3f6) ioctl$sock_inet_tcp_SIOCOUTQ(r0, 0x5411, &(0x7f0000000000)) [ 336.169833] FAULT_INJECTION: forcing a failure. [ 336.169833] name failslab, interval 1, probability 0, space 0, times 0 [ 336.181169] CPU: 1 PID: 26459 Comm: syz-executor0 Not tainted 4.16.0-rc7+ #372 [ 336.188531] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 336.197877] Call Trace: [ 336.200451] dump_stack+0x194/0x24d [ 336.204059] ? arch_local_irq_restore+0x53/0x53 [ 336.208710] should_fail+0x8c0/0xa40 [ 336.212404] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 336.217489] ? rb_first_postorder+0xa0/0xa0 [ 336.221786] ? __mutex_lock+0x16f/0x1a80 [ 336.225828] ? trace_event_raw_event_lock+0x340/0x340 [ 336.230994] ? trace_hardirqs_off+0x10/0x10 [ 336.235298] ? find_held_lock+0x35/0x1d0 [ 336.239342] ? __lock_is_held+0xb6/0x140 [ 336.243388] ? check_same_owner+0x320/0x320 [ 336.247688] ? lock_downgrade+0x980/0x980 [ 336.251814] ? rcu_note_context_switch+0x710/0x710 [ 336.256728] should_failslab+0xec/0x120 [ 336.260679] __kmalloc_track_caller+0x5f/0x760 [ 336.265243] ? string+0x180/0x200 [ 336.268673] ? kstrdup_const+0x39/0x50 [ 336.272545] kstrdup+0x39/0x70 [ 336.275715] kstrdup_const+0x39/0x50 [ 336.279408] __kernfs_new_node+0xa2/0x570 [ 336.283539] ? kernfs_dop_revalidate+0x380/0x380 [ 336.288282] ? snprintf+0xc0/0xf0 [ 336.291712] ? vsprintf+0x40/0x40 [ 336.295141] ? debug_lockdep_rcu_enabled+0x77/0x90 [ 336.300051] ? cgroup_file_name+0x1d0/0x1d0 [ 336.304354] kernfs_new_node+0x80/0xe0 [ 336.308222] __kernfs_create_file+0x4b/0x320 [ 336.312611] cgroup_addrm_files+0x3c5/0xa70 [ 336.316917] ? cgroup_file_write+0x710/0x710 [ 336.321303] ? cpu_cgroup_css_alloc+0x30/0x30 [ 336.325784] ? __lock_is_held+0xb6/0x140 [ 336.329825] ? sched_online_group+0x4e0/0x4e0 [ 336.334297] ? cpu_cgroup_css_online+0x3a/0x50 [ 336.338854] ? online_css+0x224/0x2e0 [ 336.342631] css_populate_dir+0x198/0x420 [ 336.346758] cgroup_apply_control_enable+0x390/0xbc0 [ 336.351843] ? cgroup_propagate_control+0x570/0x570 [ 336.356842] ? css_populate_dir+0x289/0x420 [ 336.361142] cgroup_mkdir+0x56f/0xfc0 [ 336.364920] ? __lock_is_held+0xb6/0x140 [ 336.368961] ? cgroup_destroy_locked+0x750/0x750 [ 336.373694] ? rcu_read_lock_sched_held+0x108/0x120 [ 336.378684] ? kmem_cache_free+0x258/0x2a0 [ 336.382898] ? set_nlink+0xc1/0x160 [ 336.386502] ? debug_lockdep_rcu_enabled+0x77/0x90 [ 336.391406] ? generic_permission+0x105/0x3c0 [ 336.395876] ? cgroup_destroy_locked+0x750/0x750 [ 336.400611] kernfs_iop_mkdir+0x153/0x1e0 [ 336.404739] vfs_mkdir+0x390/0x600 [ 336.408257] SyS_mkdirat+0x22b/0x2b0 [ 336.411949] ? SyS_mknod+0x480/0x480 [ 336.415637] ? trace_hardirqs_on+0xd/0x10 [ 336.419761] ? do_syscall_64+0xb7/0x940 [ 336.423712] ? SyS_mknod+0x480/0x480 [ 336.427402] do_syscall_64+0x281/0x940 [ 336.431268] ? vmalloc_sync_all+0x30/0x30 [ 336.435392] ? _raw_spin_unlock_irq+0x27/0x70 [ 336.439863] ? finish_task_switch+0x1c1/0x7e0 [ 336.444336] ? syscall_return_slowpath+0x550/0x550 [ 336.449240] ? syscall_return_slowpath+0x2ac/0x550 [ 336.454145] ? prepare_exit_to_usermode+0x350/0x350 [ 336.459137] ? entry_SYSCALL_64_after_hwframe+0x52/0xb7 [ 336.464478] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 336.469300] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 336.474466] RIP: 0033:0x454e79 [ 336.477633] RSP: 002b:00007f016b92fc68 EFLAGS: 00000246 ORIG_RAX: 0000000000000102 [ 336.485317] RAX: ffffffffffffffda RBX: 00007f016b9306d4 RCX: 0000000000454e79 [ 336.492568] RDX: 0000000000000020 RSI: 0000000020000280 RDI: 0000000000000015 [ 336.499812] RBP: 000000000072bea0 R08: 0000000000000000 R09: 0000000000000000 [ 336.507058] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000016 [ 336.514308] R13: 00000000000003eb R14: 00000000006f7ea8 R15: 0000000000000024 2018/03/30 23:06:28 executing program 4: mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount(&(0x7f000000a000)='./file0\x00', &(0x7f0000026ff8)='./file0\x00', &(0x7f000000c000)='ramfs\x00', 0x0, &(0x7f000000a000)) mkdir(&(0x7f0000000000)='./file1\x00', 0x0) mount(&(0x7f0000000040)='./file0\x00', &(0x7f0000903000)='./file0\x00', &(0x7f0000811ffa)='bdev\x00', 0x100000, &(0x7f00000003c0)="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") r0 = dup(0xffffffffffffffff) r1 = syz_open_dev$vcsn(&(0x7f00000000c0)='/dev/vcs#\x00', 0x2, 0x20800) renameat(r0, &(0x7f0000000080)='./file1/file0\x00', r1, &(0x7f0000000100)='./file1\x00') mount(&(0x7f0000fb6000)='./file0\x00', &(0x7f0000d78000)='.', &(0x7f0000fdb000)='ubifs\x00', 0x1003, 0x0) mount(&(0x7f00002b9ff8)='./file0\x00', &(0x7f0000cbeff8)='./file1\x00', &(0x7f00005f7ffa)='ramfs\x00', 0x80000, &(0x7f00000019c0)="0857638d4c8cc974ca1ee7dd5943ed5f2d68ee28b2652a302a0100ee93c1f620f9f4eb69ac00000000000000") mount(&(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)='./file1\x00', &(0x7f0000000200)='anon_inodefs\x00', 0x2000, &(0x7f0000000240)) mount(&(0x7f0000adcff8)='./file0\x00', &(0x7f0000e08fff)='.', &(0x7f00005e9000)='cifs\x00', 0x2000, &(0x7f0000ad5000)) setxattr(&(0x7f0000001a00)='./file1\x00', &(0x7f0000001b00)=@known='security.ima\x00', &(0x7f0000001b40)='\x00', 0x1, 0x3) getsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x11, &(0x7f0000000240)={{{@in6=@local, @in=@broadcast, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@broadcast}, 0x0, @in6}}, &(0x7f0000000340)=0xe8) syz_mount_image$btrfs(&(0x7f0000000380)='btrfs\x00', &(0x7f0000000540)='./file0\x00', 0xee, 0x6, &(0x7f0000001900)=[{&(0x7f0000000580)="cb10eee7fcb047a61c962c6a15a30abb93c9863ea0a4864f3d028b7f99cf8fd2ad8d36ee2763b225def4fb7bc677d40c8df04a7100e12096d4492022", 0x3c, 0x9}, {&(0x7f00000005c0)="bac23cfa8ecec4361e7132943fe2cfe271ff5ec66737b474c08c3da344ff91cfde4c23da43db159849b56f855be4659e88b9da48efcaa734962887615250260451d7600d52604aff9e5a1663b70510f5eada2e5f4095dfcaab8e45396c99476326e495fc646adcd5afaf77b0", 0x6c, 0xca}, {&(0x7f0000000640)="8b09e1b9be567c9840a7022080137deee1cef7bc986ee56310420cd7581f8fb4edbdd3674ce741c5579bd918e0edb63ea7b03cdb6c17402c3c28308edb90683c630ef2f65cd9bbd4032b965d82999744b72f2b7fae4711baf7cc33f6768be5359af4cb8cf904c8cdcef4aad07be6756ff750eff29826da70ce1c4efd6a4a9a942bdb553f0c0cf9fe11d66e536a22a30d2a850c4f59fbb5cabf427fa4c0d237083f99a6423c8cd325d89cfb3d24b13d070ddbe946bd524d9129e76754", 0xbc, 0x1}, {&(0x7f0000000700)="fdaddea227d8a6cccf796eee60f77822037660945c2978d55b3c39d0b8b63c0c24edce6686ccf07f91177edd07515571082e746905c3a7fa33b40b39adefd99ae0dedfd4473dae3ee821fe4565caca2a9303488a57ebedbe1eb0aeaa73f4ddd42962693289d4d889c45c2b2d8a0f351e9e9203e4ff752cfcea1cd94e9f5a722c56504f71e987f68c452a0a63a4f44ebe037e3e309f214e849525180577ac2f07eed48b0c69c34fbe9acfa4cc9888b6d019399d73afafae495d0f9b5cd2bbdc83ab8d48f2f97312f08df98571821cf72c257e97d6368e07d8", 0xd8, 0x20}, {&(0x7f0000000800)="499e70060c30068a526d8bbd837faf5c30d2ac522fdee06b66817bc456c4564add75c65721dc64d7749e43c319e198e0cdf829a519fce534bc19eb6fd0808e4d6c249839580d69784115ff75cb46850042425f01fac6aebf610216dda46f8909e5c8bab10d4ac239c911002e14f1cbef322a934e59a32213dc70dbd88d5495715e2a2cd0ecaa3b14c26f870eb8c55427d3c8bd7f9541d9e97eaf365a8dcaa514e84920491e6b0f746010016f4b04c54e010500c6212902ccdd8cbaca1f30fe3078c2d4bbc8dfc850a4153895f4587b26c38742707079055b96f3ee3380864689376521de38074a88623dfd519b7a6b185e17a4881e359b427f688aeeaee52aea23825853aa39b99d356c6b4fe348479552f8e581c103fc3981c8f971f21d737ae829d77520fed28a3ce167f1344d14453d769ba0c7f0f9b2d4dfe9de5845bded20d90423a32ad35488263c8f7dfa059a9cc6204e03184fe81c02e8367e0be02b437fce3226d362a9fc86b453e4b14a7250a31b084337312a8d65c730a216c9c89d11ccbb27006ff18d4a5f3cd0067799e7bebe88fa64809751fb4040c5f4d27815a22f444c86c16a00fc8d3eabe23cad425cb3260cc66642296b4aaf5f249fa52ce1d94703d067eaeedbd12095e95a9233c14c2ca6b69de60052c0ac8ad22da5892cb9cc444802cab7c1207943b6a4e41c3b4a2153650334a53c8c9dac0da6c269ad898e1015c2e16d89cb2ee3fca42d6961b2f874f9be4ec34e72e3fc134f366add054f4410c29709259592faa8ed8db4859c8625cf472f9ad73e3aad10d1c0d385689513dae087ac5a506bfa4f72e26cb8b03ab1ab03bd2640c6cda8e7cd4f390dcc2c7e0aa2a156a8bf6bb62d6710feefd2fd11073fc82b784a0b183afb28e816fa3de4a80ea5c9d128e1113af796c1c7b6e5b80c342c0b79b930bc5e53e4bd80f7179663ddc1ac50710c874af514bb75a3290afa45226d16d931ae34ec2275fd0ec171cfff3053299a5ea02a13d2cfc02f32eb25e3435bcab45f742a5ab9bc609138d7e2cb605688617871dff9006d46ac4f0e1d31807aee1bad44e8ca8c2e3d85688c62da6345a6abd7a2715ca8c76973abb812e19f6d2753eb5fe12d1cef3e1c7bd83d496264fce4663c773913bdad4e75c94a6b588af8591618403225f2d664d58d7058aa6d9829d9b419292fd7780e86caaf1d60ef3649ff51243a9564c50b5b746a49392a9190a916ef7c20481f8e8d307b44236a4f1ab28929a75039d565f2fce4927baa93697f592c80399e84b7c22ddd5be385b2af8126cf281870c5ea5a0f8b61bd534708362bc2f9f0aaddcefb2fe54bfac49587ef176876389489a8cafd6da442a9216abee3f9a73cc5910551f8a2f98c951b593c756af3b1e49c7b57335b17718ebb068466ebc342777be88c9d57791d5b96c9266d44580fa39c8bf8d6cf88317d072dc78f80960de9e263922ef3a403cf8f560afb41178889a1b1777b20fdd07a3f48e9d4ba7360de3c6ac33175244ab524a86f38691cc33f777992becb14231aaa719dccbc244e603cf7b73a91a5fde6f935d5e75adb93dd61061e9b8d918ae9bb652dfcf551a3f717bd805432b90c889c758cbc6626e6fe4e6fd39df2124d49ffe1145b77b65cd6d65c8ac144132c53e9cd168f2aec54be0619ca9d0e64073ed61ea9d199b295d021009b06134987fd1914b01df81232fd770a4d06d287a1a384003d1c7f7874286687b9d13c35cfbaf42d82f8de218f53c0ceeafa0748c25ebefd6b776d01b4789b813364678722ea47ebc3e2bad081c26f927eef7b19266dcda250716358138446c695f21bf2f5485738dcfb7ba20b0bf7a3d5612d23f82d69eef7350f14e749b9d49c9d5e64589b2e9fbc132f7330c0707541a6fdd67ad3169d1a4e326a8a0aebc788b0f04c8f123657b6859749538ce6a5841a15f4eaa491d0d7474302a2fd510cbf317d2cfeb23da7c50e291241e1139295be9e951e086c03b104f679e4934cc4381d094b9d45a316fa548d9da9333aabeafb19ee81c47cc3812fb959c4cccc8de47aba6e543e88d56fcd0b2e175adb7c75064f4c73198dc32ba09a195b528c053bc94af6f1f1bd368a67c4d0b2498e59839d64b7e062237386af7917bf130a83fbc755ebcd740d3f243aa085727a62f591bfc525db69f37e1686dbaa7a5f916bc2643b76ddbbf5bcbab9e79ced9d2c10c402965d9b16b3151bd5a3b8689c11499c775abab81486a6646129c1f883c51007f7b4d0f213a2b205a8d772ebaba9fc1399201a31119c3d0a5ea6420d2795e39d583821ca9640fde7361ba53335ef78d377be18c37afa9ccc195ecc8c43aec887df2e4ea73efa267b80828af07d4cd7c40be2e94a43b1dc3b1a21b9b85b0dde8204322d6547b740e2b679dcfee62af2e67ba017d47afa52aadc0a4d3725d2eb28710b445710a4b5d1651fae252e175cd1a7c05cd4108e1a8091c78117a9c15fa22edc973ff1d2d291021e21a688a6191bc7b1910ac92f3a03b09ccdd6c62dd520092c5d2aa493b710bdec3656937afefba4084c22f57ea39c0f980ea7f169de7195ebdc1961bc33d839315bc55324e6e2003866178f43360efaf6320b286bfb44a3c01c187712f21dd163de399304f9746f7fd7ba3aff6595bf7859345a3e28eb8eb24688feb3edae6db7bac754ee2bd6b94a2d6a22cf1cf963d927b02bd9c5da019ab7452d68f1d2dc2d451545174b66e54386e9d6ddb73aabf4b24b60f38e7dc1e15dbd61e0cb2a6d85abc3a423968f7351c13f9b9f6dc67a00cd68e48bae0cfb708abb664bd299eedfad4a8831911ca69e0af794b769c4fb77609039c0ad1a6f3dde6441133f1f760bab15646dfa7dac7979dde307cc261f9fc754e134901434b63355878db16abc0a6199a3531150da77809cb27902841cec0390310ff0044bf17c66b0b8aa443728f36133f7a5a7bb8bdccdd798479a9d09e3a553aca88446b819c83b03cae58812b64616ab66c3998f8e9126b7362cbe57d5589c8895b839945a40adb815eb7069f3b8c6c6018c260590027ebb6da69509a457f465b22d6d17e6441d38ebf19c1b41c4c174753c34bc53cbccd3cc53fb9d25c8db551f431bb6359a8b89e35f121ddf5ef45c06279ddc136f599fea29d1af93d35988c0eec7941b587f9987a4e21f3303585d5f26ca133404b60318ebf7ba6bf1f951b9714af44648f1bb33e9478568dedc1084b8fd598821151d4f5a4030c4072343f0feb0d9dec09523ea83a0fc9dae7ed31a0cb44c8aad50d9378e750941876c8f7c835b1fcf9140684b68a4ca1231a88ee197c5a7c58cf4cb383b0bb9409c239399d38353cbcea0a92a49b9beb06c4b6cc77035d7c3e3f876067a8255e97d73ebcb6feff7b93224ddc7f319f4ad68d39a843ac186b64fbf515524837f11e522a4379677031ef2bfb194a7d8f1cef77cda47b266d32e76875446e5e7cf27692fbdb919fc51d4caddbef19db6d9d7b8cdd4ca8ec2f2706f99f11ea2d86b523a9c1d4895dae4651223474d58e18c76e7c1845f7a39f4ff3e279b93ea7d09cf5fdc1d3761c08259616da8d5f4193dd0b10944b79fb4d1de1c26a9f5dfdef9d0c9d16a8e459a5b16e902e148bce0ecf4682ab9d2634f72187a6002e964846d64813a2ddf157c3f08f1f92272256e2353cab8feab222166166449aa2d46e0055b4bf256a851d4a30c07a034eaaf46b7cea40a1d10464cfd31aed66dd049e9811291a0db81fc26692d4a70aae0c285e3ef8cd0853ba5e770946cab2762e3e01d85df78c39fcf2b3dec670869968c4d77e045dcc74cf22254d0f68a064c31b1bc9622a4255e8e6a809c6a79523acff89e163e14958053a98be2fb8114ebb0f58c327341638d03221d321e28afdc8f0ccb2318009ea96e9a6ae7e3cd90eee36185e46a4c74b2cc911f381d76128c2f06bece91d4525a6b1d144e253539fbd1923e06ab062888d255ea6b69a5090807fdbd58c526d8922c22adca7088ed0b1a6c73bf4df1eba799f86bca9814e7a6cb84b870bdde9953aa29b043bef4110e6ae0d9144c1b726ff61768af081f7d9474cb48e4375c760ea5aa5cc52225ef8e2bdf0abef2e7fa1cc0202bbec6d2c1f07046862f9164bbe73649b0177d24a83856ccc66a5b1b4d0897c5b602d4d4f68f07aef24f2e6d595b6477f1cae03340a5a2458d1303d9769ad045ee23719fb55005f06128e18f6c9594652e6394e07fccbc24e11b892ae0056f4a62bd07d9490805a5a2f5050ec69e4e8ad96df2707dd4600e1eb145bd37352171b95ca7956138c6d5307d6045932719a0c096c071bdf874ff2e28fe4e8d6b57bcf2df2be426d7b2aa69f7d47fd0b64ac4c55a055ac4ace1734ff8f5e26e6d6c1187bfedb8d645eca6e35a81d25065e08ef7a9f134a7d224d554174ddb15fa142c8212b167ca0627a8b08a1e91d31124c8f584d5b1155c726e9b11b5a2eabca800c146c8036dac6f17d373e8abb95d6c3238a61ec9bc2675deaa0869bf43d1647551a210a097cea6792090235ac76f2afddb1a4b7f013d6f0c093d418415aa300883f96a151defec5914321e21e9bce6cd769df9de6fff398603f2c9bd1068bbfd9378d43ec14251a0146dec0f6686ece0decf682e3c2de8222a816dc9ad96c98b7641755c070a21d7ee648d0d0a2a577642afe6ade193e9836b522185a42192993c2a1012ab8cf013156c3c94cfe014e29fed6140d0d7cc3edcdd38370cd4d968f7e482b43753b9ac9668f8938cdc08d6f86b8d7ea6baa7718a4ea7f6841df600c6152004c1d7d9e2a4e5eb9f358117297aa847ea629b9965af5c914619a5660e345f2adfba1c5930c661388e3416de56ca31cfb50e8719e2d72164d4535356d7fdd1ba067087aa2d4f68e70313eefa14b9109722ae01ae808d6dac95c9be8792ade339c8147608b8f0419ab793bb558dcea51e5aa448cff6180619183daadc128b3d6fbbcee045c0b6955785a546b16c14119c7c77170f180b70893917fd4ba3e2b3a35fbd43dcda7158eec725120dbb555774b601a94fafebf23d03a7db704599b34f9cfee6834bac4de18d1b3987c0fcd10b8fdf68b1d12f9f961d993f2a779fa6c6aa48d67c6f33e2ebffd55b5fb2d6ea5500889761d85ddc2630c8ad4ec2339f00eeb66d8fd7eeeb933b1d9dbeb7978787ddfc36d6070aa234780b8c3e0908a68d6ec21546035d83dc62fd646a2c6839baee8c9b8fa928bb43a6fca0276615b8eaa6fafa2dfc3d59f3b53934e14e81ef0561d8945dfe449c43fcfe281a7d276a776129d5aa5f0babff7fa6ee867d1783954f2486e4a4caa6e384743bbb16d396a98b061360a26a00b2d376a9dd15b8aa062be144bef0c81f549b5609bb030e25b1334a1d902fa92fca51a942fb26be2d33a59c2d4fe618b2dd0472551a90b4c06d92a6ed0364e1091327c08ea8e7e29391be9b386d873d750bf2f6d6371a39d010cdd23109c53f1baefca3861f094608d402d830f8a6f0a1ac99959fe6d5f44b465c0aaa6f503cebe9305a20249171194de282a0f1fb2a1071385daf36fbe2a79a3369ec49ec7447360458206fddf769e65e458f5322e096bbe937d7cd6210ebedf24246482612214fcf83057720d2a2369060a26bb84be44f78d33035a863a1f3c638b17701e4303c787e165195266e55dafdc23b59bb9df218250dfcbadd42634f6b7eb6aa050235189b53928648a34cb7131ff537c4cfd40526cd80dae773b076b38b710e58af236789501e7413a5476035f99e1e9d55c5", 0x1000, 0x81}, {&(0x7f0000001800)="471ba5e54027b26a70bfc7e2e936d31b11db75e41b6afb2251d19da03424524e609fe0f8231c94fbb138a8424c2cd54c87e4e1491435c854c6faef2a02bdea689246b50b6affdf69d1aba25b3c2d680248055a595a4379ee900cca65bd44c1b64cc905eb9d490b9d8c71e47033ccee37799b1abe788b0b65d04383970e84be142e34c1fe8705cc959044968aa34d65eb7689a31ea6023851177dd1c7aac0d391ecfef07a5aa3de1f6d1591e7cc2feb7ef0fc0fb982a419a84705bc205a3cb3dd17ef43c598dd97fff07d903965f49731efebfb27df6649a831b9c3b9a73e324946b2411c3391b7850e3a071b02c9ecd4890b108ab6aa", 0xf6, 0x1}], 0x1800020, &(0x7f0000001a80)=ANY=[@ANYBLOB="636f6d70726573736b88e840753096041c12dda17263653d7a6c696b7570726f6f742c6e6f61636c2c736b69705f62616c616e63652c6e6f7373642c737562766f6c3d7539346d367476002c000000000000000000000000009a"]) ioctl$KVM_SET_LAPIC(r0, 0x4400ae8f, &(0x7f0000001bc0)={"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"}) ioctl$TCXONC(r1, 0x540a, 0x4) r3 = getegid() setsockopt$inet6_MRT6_ADD_MIF(r1, 0x29, 0xca, &(0x7f0000001b80)={0x3, 0x1, 0x4, 0x2, 0x5}, 0xc) ioctl$TUNSETSNDBUF(r0, 0x400454d4, &(0x7f0000001a40)=0x8001) chown(&(0x7f0000000140)='./file1\x00', r2, r3) 2018/03/30 23:06:28 executing program 6: pipe(&(0x7f0000000940)={0xffffffffffffffff, 0xffffffffffffffff}) accept4$ax25(r0, 0x0, &(0x7f0000000080), 0x80000) r1 = socket$inet(0x2, 0x20000000000003, 0x2) connect$inet(r1, &(0x7f0000000000)={0x2, 0x0, @remote={0xac, 0x14, 0x14, 0xbb}}, 0x10) sendmsg(0xffffffffffffffff, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000140), 0x0, &(0x7f0000000180)=ANY=[]}, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000980)=@broute={'broute\x00', 0x20, 0x3, 0x2d9, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000380], 0x0, &(0x7f00000002c0), &(0x7f0000001000)=ANY=[@ANYBLOB="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"]}, 0x351) setsockopt$inet_int(r1, 0x0, 0x2, &(0x7f00000000c0)=0x7fffffff, 0x4) r2 = socket$rds(0x15, 0x5, 0x0) pipe(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$bt_BT_DEFER_SETUP(r3, 0x112, 0x7, &(0x7f0000000280)=0x100, 0x4) accept$packet(r4, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @remote}, &(0x7f0000000100)=0x14) connect$rds(r2, &(0x7f0000000140)={0x2, 0x4e22, @remote={0xac, 0x14, 0x14, 0xbb}}, 0x10) getsockopt$sock_buf(r2, 0x1, 0x3b, &(0x7f0000000180)=""/83, &(0x7f0000000200)=0x53) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000a00)=@filter={'filter\x00', 0xe, 0x4, 0x5a0, 0xffffffff, 0x0, 0xf0, 0xf0, 0xffffffff, 0xffffffff, 0x4d0, 0x4d0, 0x4d0, 0xffffffff, 0x4, &(0x7f0000000300), {[{{@ipv6={@ipv4={[], [0xff, 0xff], @rand_addr=0x80000001}, @dev={0xfe, 0x80, [], 0x16}, [0x0, 0xffffff00, 0xff, 0xffffffff], [0x0, 0xff000000, 0xffffffff], 'ipddp0\x00', 'ip_vti0\x00', {}, {0xff}, 0x6c, 0x2bf}, 0x0, 0xc8, 0xf0}, @REJECT={0x28, 'REJECT\x00', 0x0, {0x7}}}, {{@ipv6={@remote={0xfe, 0x80, [], 0xbb}, @remote={0xfe, 0x80, [], 0xbb}, [0xff000000, 0xffffffff, 0xffffff00, 0xff], [0xff, 0xffffffff, 0x0, 0xff000000], 'syzkaller1\x00', 'eql\x00', {}, {}, 0x62, 0x0, 0x4, 0x1}, 0x0, 0x120, 0x148, 0x0, {}, [@common=@frag={0x30, 'frag\x00', 0x0, {0x7ff, 0x7, 0x1, 0x2}}, @common=@hl={0x28, 'hl\x00', 0x0, {0x3, 0x7fff}}]}, @REJECT={0x28, 'REJECT\x00', 0x0, {0x7}}}, {{@ipv6={@dev={0xfe, 0x80, [], 0xc}, @loopback={0x0, 0x1}, [0xffffffff, 0xffffffff, 0xff000000, 0xff000000], [0xff, 0x0, 0xff, 0xffffff00], 'irlan0\x00', 'vcan0\x00', {0xff}, {}, 0x3b, 0xffffffffffffab69, 0x2, 0x30}, 0x0, 0x250, 0x298, 0x0, {}, [@common=@srh={0x30, 'srh\x00', 0x0, {0xbb, 0x1, 0x3, 0x6, 0xffffffffffffffc0, 0x80}}, @common=@inet=@policy={0x158, 'policy\x00', 0x0, {[{@ipv4, [0xffffffff, 0xff0000ff, 0xff000000, 0xffffffff], @ipv4=@multicast1=0xe0000001, [0xffffffff, 0xffffffff, 0xff000000, 0xffffff00], 0x4d5, 0x3500, 0x5c, 0x0, 0x10, 0xf}, {@ipv6=@dev={0xfe, 0x80, [], 0x11}, [0x0, 0xff000000, 0xff0000ff, 0xffffff00], @ipv4=@multicast1=0xe0000001, [0xffffffff, 0x0, 0x0, 0xffffffff], 0x4d5, 0x3500, 0x77, 0x1, 0x0, 0x1d}, {@ipv6=@mcast1={0xff, 0x1, [], 0x1}, [0xff000000, 0xffffffff, 0xffffff00, 0xff], @ipv4=@multicast2=0xe0000002, [0xffffffff, 0x0, 0xffffff00, 0xffffffff], 0x4d3, 0x3503, 0x7f, 0x0, 0x1, 0x19}, {@ipv4=@local={0xac, 0x14, 0x14, 0xaa}, [0x0, 0xff, 0x0, 0xff0000ff], @ipv6=@local={0xfe, 0x80, [], 0xaa}, [0xffffffff, 0xffffffff, 0xff, 0xff0000ff], 0x4d4, 0x3505, 0x0, 0x1, 0x1f, 0x10}], 0x0, 0x3}}]}, @common=@unspec=@LED={0x48, 'LED\x00', 0x0, {'syz1\x00', 0x0, 0x8, 0x8}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28, '\x00', 0x0, 0xfffffffffffffffe}}}}, 0x600) socket(0x1, 0x0, 0x7) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_TIMER(r4, 0x40605346, &(0x7f0000000680)={0x1, 0x3, {0x3, 0x0, 0x9, 0x3}}) [ 336.521708] cgroup: cgroup_addrm_files: failed to add weight.nice, err=-12 2018/03/30 23:06:28 executing program 5: mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r0 = perf_event_open(&(0x7f00000000c0)={0x7, 0x70, 0x80, 0x100000001, 0x7f6, 0x5, 0x0, 0x2, 0x2ac00, 0x1, 0x3, 0x2, 0x67, 0x5, 0x7, 0x0, 0x3, 0x40638ae3, 0x4, 0x5, 0x4, 0x400, 0x1349, 0xffffffff00000000, 0xffffffffffffffca, 0x5, 0x2, 0x100000001, 0xd665, 0x3, 0xffffffffffffff86, 0x9, 0xcc2, 0x2, 0x7ff, 0x3f, 0x2, 0xffffffff, 0x0, 0x800, 0x5, @perf_bp={&(0x7f0000000040), 0x8}, 0x20000, 0x81d, 0x2, 0x6, 0x100000001, 0x0, 0x10001}, 0xffffffffffffffff, 0x7, 0xffffffffffffff9c, 0x2) fcntl$setlease(r0, 0x400, 0x3) perf_event_open(&(0x7f0000223000)={0x2, 0x78, 0xe3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000001980)={{{@in6=@remote, @in=@multicast1}}, {{@in=@multicast2}, 0x0, @in=@multicast2}}, &(0x7f0000001a80)=0xe8) mount(&(0x7f00000003c0)='./file0\x00', &(0x7f0000000380)='./file0\x00', &(0x7f0000000300)='cgroup2\x00', 0x0, 0x0) r1 = open$dir(&(0x7f000001bff4)='./file0\x00', 0x0, 0x0) mkdirat(0xffffffffffffffff, &(0x7f0000000280)='./file0\x00', 0x20) pipe(&(0x7f0000000140)={0xffffffffffffffff}) setsockopt$inet_tcp_TCP_FASTOPEN_KEY(r2, 0x6, 0x21, &(0x7f0000000180)="493e18b54a586a407a710919e74c93e5", 0x10) unlinkat(r1, &(0x7f0000000080)='./file0\x00', 0x200) [ 336.578683] kernel msg: ebtables bug: please report to author: entries_size too small 2018/03/30 23:06:28 executing program 3: r0 = socket(0x40000000015, 0x5, 0x0) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000240), 0x4) bind$inet(r0, &(0x7f00008a5ff0)={0x2, 0x4e21, @loopback=0x7f000001}, 0x10) sendto$inet(r0, &(0x7f0000f7db7f)="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", 0x481, 0x0, &(0x7f000069affb)={0x2, 0x4e20, @loopback=0x7f000001}, 0x10) setsockopt$RDS_CONG_MONITOR(r0, 0x114, 0x6, &(0x7f0000000080)=0x1, 0x4) ioctl$int_in(r0, 0x5421, &(0x7f0000000040)=0x56d) sendto$inet(r0, &(0x7f00004b3fff), 0x0, 0x0, &(0x7f00002b4000)={0x2, 0x0, @loopback=0x7f000001}, 0x3f6) ioctl$sock_inet_tcp_SIOCOUTQ(r0, 0x5411, &(0x7f0000000000)) 2018/03/30 23:06:28 executing program 0 (fault-call:7 fault-nth:37): mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r0 = syz_open_dev$usbmon(&(0x7f0000000400)='/dev/usbmon#\x00', 0x0, 0x0) r1 = perf_event_open(&(0x7f0000223000)={0x2, 0x78, 0xe3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000001980)={{{@in6=@remote, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast2}, 0x0, @in=@multicast2}}, &(0x7f0000001a80)=0xe8) chown(&(0x7f00000004c0)='./file0\x00', r2, 0x0) mount(&(0x7f00000003c0)='./file0\x00', &(0x7f0000000380)='./file0\x00', &(0x7f0000000300)='cgroup2\x00', 0x0, 0x0) r3 = open$dir(&(0x7f000001bff4)='./file0\x00', 0x0, 0x0) mkdirat(r3, &(0x7f0000000280)='./file0\x00', 0x20) getdents64(r3, &(0x7f00000007c0)=""/250, 0x1015a) dup3(r0, r1, 0x80000) r4 = open$dir(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) renameat2(r4, &(0x7f0000000200)='./file1\x00', 0xffffffffffffffff, &(0x7f0000000240)='./file0\x00', 0xfd1092750066ec78) ioctl$KDGKBMODE(0xffffffffffffffff, 0x4b44, &(0x7f0000000140)) 2018/03/30 23:06:28 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x200, 0x0) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000680)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$sock_linger(r2, 0x1, 0xd, &(0x7f00000006c0)={0x400, 0x9}, 0x8) perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x0, 0x0) r3 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) mmap(&(0x7f0000000000/0x9d7000)=nil, 0x9d7000, 0x0, 0x10, 0xffffffffffffffff, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x7) perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r4 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r4, &(0x7f0000e5b000)={0x2, 0x4e20, @multicast1=0xe0000001}, 0x10) syz_open_dev$sg(&(0x7f0000000440)='/dev/sg#\x00', 0x0, 0x0) connect$inet(r4, &(0x7f0000000100)={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x11}}, 0x10) r5 = bpf$PROG_LOAD(0x5, &(0x7f0000eb0fb8)={0x1, 0x3, &(0x7f00009ff000)=@framed={{0x18}, [], {0x95}}, &(0x7f00002bf000)='syzkaller\x00', 0x4, 0xb7, &(0x7f00006ab000)=""/183}, 0x48) setsockopt$inet_tcp_int(r4, 0x6, 0x19, &(0x7f0000000240)=0x8, 0x4) r6 = socket$kcm(0x29, 0x2, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r6, 0x89e0, &(0x7f000031aff8)={r4, r5}) ioctl$sock_kcm_SIOCKCMCLONE(r6, 0x89e2, &(0x7f00000002c0)={0xffffffffffffffff}) sendmsg$nl_xfrm(r7, &(0x7f0000000780)={&(0x7f0000000200)={0x10}, 0xc, &(0x7f0000000740)={&(0x7f0000000480)=@updpolicy={0xb8, 0x19, 0x0, 0x0, 0x0, {{@in=@loopback=0x7f000001, @in6=@mcast1={0xff, 0x1, [], 0x1}}}}, 0xffcb}, 0x1}, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(r7, 0x89e1, &(0x7f0000000040)={r4}) r8 = fcntl$getown(r3, 0x9) recvfrom$inet6(r1, &(0x7f0000000140)=""/177, 0xb1, 0x40000000, &(0x7f0000000080)={0xa, 0x0, 0x9, @empty, 0xe38}, 0x1c) r9 = accept4$inet(0xffffffffffffff9c, &(0x7f0000000700)={0x0, 0x0, @broadcast}, &(0x7f0000000740)=0x10, 0x80000) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r9, 0x84, 0x64, &(0x7f0000000780)=[@in6={0xa, 0x4e22, 0xfffffffffffff7e1, @mcast2={0xff, 0x2, [], 0x1}, 0x8}, @in={0x2, 0x4e24, @broadcast=0xffffffff}], 0x2c) ptrace$setregset(0x4205, r8, 0x0, &(0x7f00000005c0)={&(0x7f0000000080)}) ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r10 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x1fffd, 0x0) r11 = syz_open_dev$sndtimer(&(0x7f00000000c0)='/dev/snd/timer\x00', 0x0, 0x0) read(r11, &(0x7f0000ec6000)=""/50, 0x32) fcntl$dupfd(r11, 0x0, r10) 2018/03/30 23:06:28 executing program 4: mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount(&(0x7f000000a000)='./file0\x00', &(0x7f0000026ff8)='./file0\x00', &(0x7f000000c000)='ramfs\x00', 0x0, &(0x7f000000a000)) mkdir(&(0x7f0000000000)='./file1\x00', 0x0) mount(&(0x7f0000000040)='./file0\x00', &(0x7f0000903000)='./file0\x00', &(0x7f0000811ffa)='bdev\x00', 0x100000, &(0x7f00000003c0)="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") r0 = dup(0xffffffffffffffff) r1 = syz_open_dev$vcsn(&(0x7f00000000c0)='/dev/vcs#\x00', 0x2, 0x20800) renameat(r0, &(0x7f0000000080)='./file1/file0\x00', r1, &(0x7f0000000240)='./file0\x00') mount(&(0x7f0000fb6000)='./file0\x00', &(0x7f0000d78000)='.', &(0x7f0000fdb000)='ubifs\x00', 0x1003, 0x0) mount(&(0x7f00002b9ff8)='./file0\x00', &(0x7f0000cbeff8)='./file0\x00', &(0x7f00005f7ffa)='ramfs\x00', 0x80000, &(0x7f000002f000)) mount(&(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)='./file1\x00', &(0x7f0000000200)='anon_inodefs\x00', 0x2000, &(0x7f0000000240)) mount(&(0x7f0000adcff8)='./file0\x00', &(0x7f0000e08fff)='.', &(0x7f00005e9000)='cifs\x00', 0x2000, &(0x7f0000ad5000)) 2018/03/30 23:06:28 executing program 7: r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f00000000c0)='./control\x00', 0x0) r1 = inotify_init() inotify_add_watch(r1, &(0x7f0000f1eff6)='./control\x00', 0x220000000009) r2 = inotify_init1(0x0) inotify_add_watch(r2, &(0x7f000001eff6)='./control\x00', 0x2000200) r3 = fcntl$dupfd(r2, 0x406, r0) getsockopt$inet_mtu(r3, 0x0, 0xa, &(0x7f0000000040), &(0x7f0000000100)=0x4) setsockopt$inet6_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, &(0x7f0000000080)="5fce869db66fa225921ad03d773be4ff", 0x10) rmdir(&(0x7f000075aff6)='./control\x00') inotify_init() 2018/03/30 23:06:28 executing program 2: perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f00000000c0)='./control\x00', 0x0) inotify_init() r0 = syz_open_dev$sg(&(0x7f000028fff7)='/dev/sg#\x00', 0x0, 0x0) ioctl(r0, 0x4000000000001276, &(0x7f0000000040)) msgget(0x2, 0x0) getsockopt$nfc_llcp(0xffffffffffffffff, 0x118, 0x4, &(0x7f0000000740)=""/223, 0xdf) setsockopt$inet_mreq(r0, 0x0, 0x23, &(0x7f00000002c0)={@empty, @remote={0xac, 0x14, 0x14, 0xbb}}, 0x8) accept4$nfc_llcp(0xffffffffffffffff, &(0x7f0000000940), &(0x7f0000000080)=0x60, 0x800) ioctl$SNDRV_CTL_IOCTL_ELEM_INFO(0xffffffffffffffff, 0xc1105511, &(0x7f0000000100)={{0x0, 0x0, 0x0, 0x0, "386aea20273dc03c3d18dd0dbd4a0ca15f9f580393cc4ec3b8ee256b9aa630224ba64c6ff43ee01d2996c914"}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "eda422cd37591b3a5a7a683380f7e0b9e790c6b72cd0a4f3342f7431c1699a305ca3091bb2320e8df4e298a2cca26637866a68c1426ffbd8a6c7da1d8ea77d9d", &(0x7f00000000c0)='/dev/snd/controlC#\x00', 0x13}) r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000003c0)='/proc/self/net/pfkey\x00', 0x800, 0x0) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) add_key$user(&(0x7f0000000480)='user\x00', &(0x7f00000004c0)={0x73, 0x79, 0x7a, 0x3}, &(0x7f0000000500)="d3238eea76b0470531092a0a77b0b49789a0fc97b8f8b9e23a2a5a5a0c169ed6e83480b4801dbf79db3527904ee3128c05ce2806e210237c36b88ceabe99d8784860e5d0e91fe33d38d0133e056cdd1e2910d57fc5eb1b23db3b60a7077ff33bb6c7445cd258ee25f9187269c22d1ed05acb2b9b599bd285b692257a631754ab9befebd3fdb3167361c24c5c5dcf90e476e052b9d22362c57878cb7205fe361346d6beb77b7844fe94", 0xa9, 0xfffffffffffffffe) ioctl$sock_inet_SIOCSIFADDR(r0, 0x8916, &(0x7f0000000300)={'gretap0\x00', {0x2, 0x4e24, @loopback=0x7f000001}}) keyctl$instantiate_iov(0x14, 0x0, &(0x7f0000000780)=[{&(0x7f0000000840)="edb4a01f68d76905035a4ebdd427d31585a5a650581902b1c077f74ca8f1ce7d3e2f6e1c6760433af9664b3f3bebab3a1a1c4ef86f42c39b758accc1e7637bb18d28248dc7a1719b73388830b162613b17fd02220bd1fe2ad86adb96efcfc672d126ae58f745fba0e7534cdbae947449df767bd76a0c38b5752dcd13f7065edea86dc156c0708e76c2c99a94a95f1e93ff73cb3eb94e06d399cf48aaac7963d13e4b3a6b32bc2b19d5461545dcf3f71bb24442d286421f8d891d77a3c4c1c9435bbdf187682c22ded22b669b7790d05b4894166a2d5f33098cf908a23a2e0671d824e88942fbe0bd1416", 0xea}], 0x1, 0x0) r3 = ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) ioctl$KVM_UNREGISTER_COALESCED_MMIO(r3, 0x4010ae68, &(0x7f0000000000)={0x0, 0x5000}) ioctl$KVM_CREATE_PIT2(r3, 0x4040ae77, &(0x7f0000000440)={0xfffffffffffffff7}) r4 = ioctl$KVM_CREATE_VCPU(r3, 0xae41, 0x0) setsockopt$inet_tcp_TCP_ULP(r1, 0x6, 0x1f, &(0x7f0000000280)='tls\x00', 0x4) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000005fd8)={'vcan0\x00'}) socket$can_raw(0x1d, 0x3, 0x1) socket$inet6(0xa, 0x0, 0x0) r5 = syz_open_dev$dspn(&(0x7f0000000040)='/dev/dsp#\x00', 0x0, 0x0) connect$vsock_stream(r5, &(0x7f0000000080)={0x28, 0x0, 0xffffffff, @my=0x1}, 0x10) dup2(r2, r4) dup3(r2, r3, 0x0) 2018/03/30 23:06:28 executing program 5: r0 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/qat_adf_ctl\x00', 0x244002, 0x0) getsockopt$inet_sctp6_SCTP_AUTO_ASCONF(r0, 0x84, 0x1e, &(0x7f00000000c0), &(0x7f0000000100)=0x4) mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) perf_event_open(&(0x7f0000223000)={0x2, 0x78, 0xe3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000001980)={{{@in6=@remote, @in=@multicast1}}, {{@in=@multicast2}, 0x0, @in=@multicast2}}, &(0x7f0000001a80)=0xe8) mount(&(0x7f00000003c0)='./file0\x00', &(0x7f0000000380)='./file0\x00', &(0x7f0000000300)='cgroup2\x00', 0x0, 0x0) r1 = open$dir(&(0x7f000001bff4)='./file0\x00', 0x0, 0x0) mkdirat(0xffffffffffffffff, &(0x7f0000000280)='./file0\x00', 0x20) mkdirat(r0, &(0x7f0000000140)='./file0\x00', 0xaf) unlinkat(r1, &(0x7f0000000080)='./file0\x00', 0x200) 2018/03/30 23:06:28 executing program 6: pipe(&(0x7f0000000940)={0xffffffffffffffff, 0xffffffffffffffff}) accept4$ax25(r0, 0x0, &(0x7f0000000080), 0x80000) r1 = socket$inet(0x2, 0x20000000000003, 0x2) connect$inet(r1, &(0x7f0000000000)={0x2, 0x0, @remote={0xac, 0x14, 0x14, 0xbb}}, 0x10) sendmsg(0xffffffffffffffff, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000140), 0x0, &(0x7f0000000180)=ANY=[]}, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000980)=@broute={'broute\x00', 0x20, 0x3, 0x2d9, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000380], 0x0, &(0x7f00000002c0), &(0x7f0000001000)=ANY=[@ANYBLOB="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"]}, 0x351) setsockopt$inet_int(r1, 0x0, 0x2, &(0x7f00000000c0)=0x7fffffff, 0x4) r2 = socket$rds(0x15, 0x5, 0x0) pipe(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$bt_BT_DEFER_SETUP(r3, 0x112, 0x7, &(0x7f0000000280)=0x100, 0x4) accept$packet(r4, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @remote}, &(0x7f0000000100)=0x14) connect$rds(r2, &(0x7f0000000140)={0x2, 0x4e22, @remote={0xac, 0x14, 0x14, 0xbb}}, 0x10) getsockopt$sock_buf(r2, 0x1, 0x3b, &(0x7f0000000180)=""/83, &(0x7f0000000200)=0x53) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000a00)=@filter={'filter\x00', 0xe, 0x4, 0x5a0, 0xffffffff, 0x0, 0xf0, 0xf0, 0xffffffff, 0xffffffff, 0x4d0, 0x4d0, 0x4d0, 0xffffffff, 0x4, &(0x7f0000000300), {[{{@ipv6={@ipv4={[], [0xff, 0xff], @rand_addr=0x80000001}, @dev={0xfe, 0x80, [], 0x16}, [0x0, 0xffffff00, 0xff, 0xffffffff], [0x0, 0xff000000, 0xffffffff], 'ipddp0\x00', 'ip_vti0\x00', {}, {0xff}, 0x6c, 0x2bf}, 0x0, 0xc8, 0xf0}, @REJECT={0x28, 'REJECT\x00', 0x0, {0x7}}}, {{@ipv6={@remote={0xfe, 0x80, [], 0xbb}, @remote={0xfe, 0x80, [], 0xbb}, [0xff000000, 0xffffffff, 0xffffff00, 0xff], [0xff, 0xffffffff, 0x0, 0xff000000], 'syzkaller1\x00', 'eql\x00', {}, {}, 0x62, 0x0, 0x4, 0x1}, 0x0, 0x120, 0x148, 0x0, {}, [@common=@frag={0x30, 'frag\x00', 0x0, {0x7ff, 0x7, 0x1, 0x2}}, @common=@hl={0x28, 'hl\x00', 0x0, {0x3, 0x7fff}}]}, @REJECT={0x28, 'REJECT\x00', 0x0, {0x7}}}, {{@ipv6={@dev={0xfe, 0x80, [], 0xc}, @loopback={0x0, 0x1}, [0xffffffff, 0xffffffff, 0xff000000, 0xff000000], [0xff, 0x0, 0xff, 0xffffff00], 'irlan0\x00', 'vcan0\x00', {0xff}, {}, 0x3b, 0xffffffffffffab69, 0x2, 0x30}, 0x0, 0x250, 0x298, 0x0, {}, [@common=@srh={0x30, 'srh\x00', 0x0, {0xbb, 0x1, 0x3, 0x6, 0xffffffffffffffc0, 0x80}}, @common=@inet=@policy={0x158, 'policy\x00', 0x0, {[{@ipv4, [0xffffffff, 0xff0000ff, 0xff000000, 0xffffffff], @ipv4=@multicast1=0xe0000001, [0xffffffff, 0xffffffff, 0xff000000, 0xffffff00], 0x4d5, 0x3500, 0x5c, 0x0, 0x10, 0xf}, {@ipv6=@dev={0xfe, 0x80, [], 0x11}, [0x0, 0xff000000, 0xff0000ff, 0xffffff00], @ipv4=@multicast1=0xe0000001, [0xffffffff, 0x0, 0x0, 0xffffffff], 0x4d5, 0x3500, 0x77, 0x1, 0x0, 0x1d}, {@ipv6=@mcast1={0xff, 0x1, [], 0x1}, [0xff000000, 0xffffffff, 0xffffff00, 0xff], @ipv4=@multicast2=0xe0000002, [0xffffffff, 0x0, 0xffffff00, 0xffffffff], 0x4d3, 0x3503, 0x7f, 0x0, 0x1, 0x19}, {@ipv4=@local={0xac, 0x14, 0x14, 0xaa}, [0x0, 0xff, 0x0, 0xff0000ff], @ipv6=@local={0xfe, 0x80, [], 0xaa}, [0xffffffff, 0xffffffff, 0xff, 0xff0000ff], 0x4d4, 0x3505, 0x0, 0x1, 0x1f, 0x10}], 0x0, 0x3}}]}, @common=@unspec=@LED={0x48, 'LED\x00', 0x0, {'syz1\x00', 0x0, 0x8, 0x8}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28, '\x00', 0x0, 0xfffffffffffffffe}}}}, 0x600) socket(0x1, 0x0, 0x7) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_TIMER(r4, 0x40605346, &(0x7f0000000680)={0x1, 0x3, {0x3, 0x0, 0x9, 0x3}}) [ 336.819737] kernel msg: ebtables bug: please report to author: entries_size too small 2018/03/30 23:06:28 executing program 3: r0 = socket(0x40000000015, 0x5, 0x0) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000240), 0x4) bind$inet(r0, &(0x7f00008a5ff0)={0x2, 0x4e21, @loopback=0x7f000001}, 0x10) sendto$inet(r0, &(0x7f0000f7db7f)="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", 0x481, 0x0, &(0x7f000069affb)={0x2, 0x4e20, @loopback=0x7f000001}, 0x10) setsockopt$RDS_CONG_MONITOR(r0, 0x114, 0x6, &(0x7f0000000080)=0x1, 0x4) ioctl$int_in(r0, 0x5421, &(0x7f0000000040)=0x56d) sendto$inet(r0, &(0x7f00004b3fff), 0x0, 0x0, &(0x7f00002b4000)={0x2, 0x4e20, @loopback=0x7f000001}, 0x3f6) ioctl$sock_inet_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000000)) 2018/03/30 23:06:28 executing program 6: pipe(&(0x7f0000000940)={0xffffffffffffffff, 0xffffffffffffffff}) accept4$ax25(r0, 0x0, &(0x7f0000000080), 0x80000) r1 = socket$inet(0x2, 0x20000000000003, 0x2) connect$inet(r1, &(0x7f0000000000)={0x2, 0x0, @remote={0xac, 0x14, 0x14, 0xbb}}, 0x10) sendmsg(0xffffffffffffffff, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000140), 0x0, &(0x7f0000000180)=ANY=[]}, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000980)=@broute={'broute\x00', 0x20, 0x3, 0x2d9, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000380], 0x0, &(0x7f00000002c0), &(0x7f0000001000)=ANY=[@ANYBLOB="00000000000000000000000000000000000000000000000000000000000000000000000000000000feffffff0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000ffffffff010000000b00000008000000600469666230000000000000000000000000736974300000000000000000000000007663616e300000000000000000000000626f6e643000000000000000000000000180c200000e00ffff00ffffaaaaaaaaaaaaffffff0000ff000008010000d001000048020000706879736465760000000000000000000000000000000000000000000000000070000000000000006e723000000000000000000000000000000000000000000000000000000000000000000000000000000000000000766c616e300000003a9c4ebb9f24dc06a52c000000000000000000000000000000000000000000ff0000000000000000000000000000000101000000000000000000000000000000000000004c45440000000000000000000000000000000000000000000000000000000000280000000000000073797a310000000000000000000000000000000000000000000000004000000000000000000000004e464c4f470000000000000000000000000000000000000000000000000000005000000000000000000000000000000000000000692ef8a72c6779a914df06a44b35b0eafd833141b590148ad8c2d17b06e81aa50bc466307f618025cda16029da79ca01cd7bf2fa8433c6000000004e464c4f470000000000000000000000000000000000000000000000000000005000000000000000000000000000000000000000f7040c3bd532a607b6540847e9980255ac80a05048ee3c578fd00c809822ab1ff7d12707561fdd7b1bcbd7c428bd7449152a676a0e0fc0823ebe89b10758fffe5c92f48f0000000000000000000000000000000000000000000000000000000000000000000000000000000001000000fcffffff"]}, 0x351) setsockopt$inet_int(r1, 0x0, 0x2, &(0x7f00000000c0)=0x7fffffff, 0x4) r2 = socket$rds(0x15, 0x5, 0x0) pipe(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$bt_BT_DEFER_SETUP(r3, 0x112, 0x7, &(0x7f0000000280)=0x100, 0x4) accept$packet(r4, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @remote}, &(0x7f0000000100)=0x14) connect$rds(r2, &(0x7f0000000140)={0x2, 0x4e22, @remote={0xac, 0x14, 0x14, 0xbb}}, 0x10) getsockopt$sock_buf(r2, 0x1, 0x3b, &(0x7f0000000180)=""/83, &(0x7f0000000200)=0x53) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000a00)=@filter={'filter\x00', 0xe, 0x4, 0x5a0, 0xffffffff, 0x0, 0xf0, 0xf0, 0xffffffff, 0xffffffff, 0x4d0, 0x4d0, 0x4d0, 0xffffffff, 0x4, &(0x7f0000000300), {[{{@ipv6={@ipv4={[], [0xff, 0xff], @rand_addr=0x80000001}, @dev={0xfe, 0x80, [], 0x16}, [0x0, 0xffffff00, 0xff, 0xffffffff], [0x0, 0xff000000, 0xffffffff], 'ipddp0\x00', 'ip_vti0\x00', {}, {0xff}, 0x6c, 0x2bf}, 0x0, 0xc8, 0xf0}, @REJECT={0x28, 'REJECT\x00', 0x0, {0x7}}}, {{@ipv6={@remote={0xfe, 0x80, [], 0xbb}, @remote={0xfe, 0x80, [], 0xbb}, [0xff000000, 0xffffffff, 0xffffff00, 0xff], [0xff, 0xffffffff, 0x0, 0xff000000], 'syzkaller1\x00', 'eql\x00', {}, {}, 0x62, 0x0, 0x4, 0x1}, 0x0, 0x120, 0x148, 0x0, {}, [@common=@frag={0x30, 'frag\x00', 0x0, {0x7ff, 0x7, 0x1, 0x2}}, @common=@hl={0x28, 'hl\x00', 0x0, {0x3, 0x7fff}}]}, @REJECT={0x28, 'REJECT\x00', 0x0, {0x7}}}, {{@ipv6={@dev={0xfe, 0x80, [], 0xc}, @loopback={0x0, 0x1}, [0xffffffff, 0xffffffff, 0xff000000, 0xff000000], [0xff, 0x0, 0xff, 0xffffff00], 'irlan0\x00', 'vcan0\x00', {0xff}, {}, 0x3b, 0xffffffffffffab69, 0x2, 0x30}, 0x0, 0x250, 0x298, 0x0, {}, [@common=@srh={0x30, 'srh\x00', 0x0, {0xbb, 0x1, 0x3, 0x6, 0xffffffffffffffc0, 0x80}}, @common=@inet=@policy={0x158, 'policy\x00', 0x0, {[{@ipv4, [0xffffffff, 0xff0000ff, 0xff000000, 0xffffffff], @ipv4=@multicast1=0xe0000001, [0xffffffff, 0xffffffff, 0xff000000, 0xffffff00], 0x4d5, 0x3500, 0x5c, 0x0, 0x10, 0xf}, {@ipv6=@dev={0xfe, 0x80, [], 0x11}, [0x0, 0xff000000, 0xff0000ff, 0xffffff00], @ipv4=@multicast1=0xe0000001, [0xffffffff, 0x0, 0x0, 0xffffffff], 0x4d5, 0x3500, 0x77, 0x1, 0x0, 0x1d}, {@ipv6=@mcast1={0xff, 0x1, [], 0x1}, [0xff000000, 0xffffffff, 0xffffff00, 0xff], @ipv4=@multicast2=0xe0000002, [0xffffffff, 0x0, 0xffffff00, 0xffffffff], 0x4d3, 0x3503, 0x7f, 0x0, 0x1, 0x19}, {@ipv4=@local={0xac, 0x14, 0x14, 0xaa}, [0x0, 0xff, 0x0, 0xff0000ff], @ipv6=@local={0xfe, 0x80, [], 0xaa}, [0xffffffff, 0xffffffff, 0xff, 0xff0000ff], 0x4d4, 0x3505, 0x0, 0x1, 0x1f, 0x10}], 0x0, 0x3}}]}, @common=@unspec=@LED={0x48, 'LED\x00', 0x0, {'syz1\x00', 0x0, 0x8, 0x8}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28, '\x00', 0x0, 0xfffffffffffffffe}}}}, 0x600) socket(0x1, 0x0, 0x7) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_TIMER(r4, 0x40605346, &(0x7f0000000680)={0x1, 0x3, {0x3, 0x0, 0x9, 0x3}}) 2018/03/30 23:06:28 executing program 7: perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f00000000c0)='./control\x00', 0x0) r0 = inotify_init() inotify_add_watch(r0, &(0x7f0000f1eff6)='./control\x00', 0x220000000009) r1 = inotify_init1(0x0) inotify_add_watch(r1, &(0x7f000001eff6)='./control\x00', 0x2000200) setsockopt$inet6_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, &(0x7f0000000080)="5fce869db66fa225921ad03d773be4ff", 0x10) creat(&(0x7f0000000040)='./control\x00', 0x40) rmdir(&(0x7f000075aff6)='./control\x00') 2018/03/30 23:06:28 executing program 3: r0 = socket(0x40000000015, 0x5, 0x0) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000240), 0x4) bind$inet(r0, &(0x7f00008a5ff0)={0x2, 0x4e21, @loopback=0x7f000001}, 0x10) sendto$inet(r0, &(0x7f0000f7db7f)="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", 0x481, 0x0, &(0x7f000069affb)={0x2, 0x4e20, @loopback=0x7f000001}, 0x10) setsockopt$RDS_CONG_MONITOR(r0, 0x114, 0x6, &(0x7f0000000080)=0x1, 0x4) ioctl$int_in(r0, 0x5421, &(0x7f0000000040)=0x56d) sendto$inet(r0, &(0x7f00004b3fff), 0x0, 0x0, &(0x7f00002b4000)={0x2, 0x4e20, @loopback=0x7f000001}, 0x3f6) ioctl$sock_inet_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000000)) [ 336.952111] kernel msg: ebtables bug: please report to author: entries_size too small [ 336.958469] FAULT_INJECTION: forcing a failure. [ 336.958469] name failslab, interval 1, probability 0, space 0, times 0 [ 336.971623] CPU: 0 PID: 26519 Comm: syz-executor0 Not tainted 4.16.0-rc7+ #372 [ 336.978989] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 336.988353] Call Trace: [ 336.990960] dump_stack+0x194/0x24d [ 336.994615] ? arch_local_irq_restore+0x53/0x53 [ 336.999316] should_fail+0x8c0/0xa40 [ 337.003041] ? kstrdup+0x39/0x70 [ 337.006428] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 337.011550] ? cgroup_apply_control_enable+0x390/0xbc0 [ 337.016841] ? kernfs_iop_mkdir+0x153/0x1e0 [ 337.021171] ? vfs_mkdir+0x390/0x600 [ 337.024893] ? SyS_mkdirat+0x22b/0x2b0 [ 337.028797] ? entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 337.034181] ? find_held_lock+0x35/0x1d0 [ 337.038265] ? find_held_lock+0x35/0x1d0 [ 337.042343] ? __lock_is_held+0xb6/0x140 [ 337.046437] ? check_same_owner+0x320/0x320 2018/03/30 23:06:28 executing program 7: r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pivot_root(&(0x7f0000000040)='./control\x00', &(0x7f0000000100)='./control\x00') mkdir(&(0x7f00000000c0)='./control\x00', 0x0) r1 = inotify_init() inotify_add_watch(r1, &(0x7f0000f1eff6)='./control\x00', 0x220000000009) inotify_init1(0x0) inotify_add_watch(r0, &(0x7f000001eff6)='./control\x00', 0x2000200) setsockopt$inet6_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, &(0x7f0000000080)="5fce869db66fa225921ad03d773be4ff", 0x10) rmdir(&(0x7f000075aff6)='./control\x00') 2018/03/30 23:06:28 executing program 3: r0 = socket(0x40000000015, 0x5, 0x0) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000240), 0x4) bind$inet(r0, &(0x7f00008a5ff0)={0x2, 0x4e21, @loopback=0x7f000001}, 0x10) sendto$inet(r0, &(0x7f0000f7db7f)="ba671368d1010000004900000001000000018be49e9301442865319997d0efdb2f54b6a10c7327757482bfce945c2a91fb8dfafc1d3f56bc543ab87321e12cca08a744a2d128b00634bc882151d36809229a96bc3437ef159489384ade077ba295eac2882dbfd3781dd4d4e609c42628dbb709b3eb1fa030009045dd98b9e6d77b6cec9ceb685595d43995e0f04c32260943add79831e661c6a351dedc8b9d220fbf9fb6e44fb6a629ce9a82025124fec9f3ee751f7da0cd7e799be88ddbdac20b48e890ff81d7fa28c2d017d7932f2569038740461accd4582f576e4fdb6150a3399f8266bc19eb943648ad1ad81420ed6c382436e474390c8995e829e4f9df43eed85a60b9ee254e31eb62900857fa134e76cc64880334adbff069a2e5e647d2ed36a96b23834b6f6ca6b8113baf4cf30347fbb7ffc30aea99872cc0dba03b07d3347b2d257edbe2733c26b7337a79962d8ce85469e3bcbe0e4a48a6ae69d13f2d4b5155b390ef67aa714b82b6313ee277cb8986eca5db2e97cb1ae2243bba80274f614ece521baef443394b4c161cb9ae926e21892578b49cfd6efe1cb1572148c10d92218ed73ec116a18de80ac42d2726a4523a764fc6dc356c5fbbf9d2c947ae3bc9a3dc76099f3257c8d5952876151b0326d8cb1d5683ee4ab5ded9a34c00ac1b03f34627ec18a7c2e92c87b7896549cfab5eb55fa85a970994bd4b22b5f0d045e241256d06f485a47b4a55ed389bc1734541232cd41908b5cfa4b8fcfcafce500a0c7ae99767713a98e7927aa69f6ccd7daea62f19ceb82559f41899c9a9aee99113e7e64b5f8b9824be9fdbfa4dd4995673d882bb4daeb64413b334e114965d2ba3cea8051e692508701b9400cb12eae457f8b8549944091b729160939918d8fcae611a48ed665f770db637487a236da1a58ba7566668651a77171fc4fe506496d19059343dbe4f426625d3f2b705f54581372361770bf5a9098a9fafefaf546426b294239ac33e3186e4d58ad2fa995a6ad4dc074e7cca11aead109563b2076c7c6e9f57ec63df960804e2e7f9d8444de9550cca3df7834d864e9777291c2e1f6205de2e43dc995ab8bb1515a365efc2830fa3e7a1dd137f550d6035212bc1f51c3b4ceea430df49ffc9210084ef156ad7e0d219efd6c116693735b44521d389969a3a65617cd2fd6e14060601cee4cd054cf36fe048b57d1d9ee3cad2a73552449926b4a6b03fbe9c0ec68357e1fbe52ed77b67f5870c0aefb7ee8236747e0d67a26725fb515544cbbe8464da94cfd8c0b94bb4e51a263b1749bd0a7cf651931f806d1b928d1f9994f1ad4d50e6a5cd7a8e4e687f8564fdacc864013d095ba9d5709eced3c28eabda476d177a7836400a01e02beed5a6636d4064fdda344967ad8682d14b87c71727cb66be27d1d39191f4223c545b62fb5d60262ba8076a65dbc194cee1df846c584b7bbe9dce6e6895b2cbbb64b03b55548b845cc3de2f939ef918421af9a5e9157e837651245299c03992d0ddee06bd22a31522aca0f309b1feccebc0b1c0ed9d21c19bfd15cd313ff64394fd6a10904890c9f6d646b026f27253e8f584c3ffd20ad67e8b62ed7676706d40bc5c80e376980b81", 0x481, 0x0, &(0x7f000069affb)={0x2, 0x4e20, @loopback=0x7f000001}, 0x10) setsockopt$RDS_CONG_MONITOR(r0, 0x114, 0x6, &(0x7f0000000080)=0x1, 0x4) ioctl$int_in(r0, 0x5421, &(0x7f0000000040)=0x56d) sendto$inet(r0, &(0x7f00004b3fff), 0x0, 0x0, &(0x7f00002b4000)={0x2, 0x4e20, @loopback=0x7f000001}, 0x3f6) ioctl$sock_inet_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000000)) [ 337.050774] ? rcu_note_context_switch+0x710/0x710 [ 337.055707] ? rcu_read_lock_sched_held+0x108/0x120 [ 337.060739] should_failslab+0xec/0x120 [ 337.064725] kmem_cache_alloc+0x47/0x760 [ 337.068798] ? memcpy+0x45/0x50 [ 337.072089] ? kstrdup+0x59/0x70 [ 337.075472] __kernfs_new_node+0xe2/0x570 [ 337.079635] ? kernfs_dop_revalidate+0x380/0x380 [ 337.084418] ? snprintf+0xc0/0xf0 [ 337.087892] ? vsprintf+0x40/0x40 [ 337.091354] ? debug_lockdep_rcu_enabled+0x77/0x90 [ 337.096297] ? cgroup_file_name+0x1d0/0x1d0 [ 337.100636] kernfs_new_node+0x80/0xe0 [ 337.104537] __kernfs_create_file+0x4b/0x320 [ 337.108954] cgroup_addrm_files+0x3c5/0xa70 [ 337.113292] ? cgroup_file_write+0x710/0x710 [ 337.117705] ? cpu_cgroup_css_alloc+0x30/0x30 [ 337.122231] ? __lock_is_held+0xb6/0x140 [ 337.126308] ? sched_online_group+0x4e0/0x4e0 [ 337.130808] ? cpu_cgroup_css_online+0x3a/0x50 [ 337.135394] ? online_css+0x224/0x2e0 [ 337.139203] css_populate_dir+0x198/0x420 [ 337.143360] cgroup_apply_control_enable+0x390/0xbc0 [ 337.148479] ? cgroup_propagate_control+0x570/0x570 [ 337.153524] ? css_populate_dir+0x289/0x420 [ 337.157857] cgroup_mkdir+0x56f/0xfc0 [ 337.161661] ? __lock_is_held+0xb6/0x140 [ 337.165731] ? cgroup_destroy_locked+0x750/0x750 [ 337.170495] ? rcu_read_lock_sched_held+0x108/0x120 [ 337.175524] ? kmem_cache_free+0x258/0x2a0 [ 337.179768] ? set_nlink+0xc1/0x160 [ 337.183403] ? debug_lockdep_rcu_enabled+0x77/0x90 [ 337.188339] ? generic_permission+0x105/0x3c0 [ 337.192842] ? cgroup_destroy_locked+0x750/0x750 [ 337.197609] kernfs_iop_mkdir+0x153/0x1e0 [ 337.201765] vfs_mkdir+0x390/0x600 [ 337.205318] SyS_mkdirat+0x22b/0x2b0 [ 337.209042] ? SyS_mknod+0x480/0x480 [ 337.212758] ? trace_hardirqs_on+0xd/0x10 [ 337.216908] ? do_syscall_64+0xb7/0x940 [ 337.220868] ? SyS_mknod+0x480/0x480 [ 337.224572] do_syscall_64+0x281/0x940 [ 337.228454] ? trace_event_raw_event_sys_exit+0x260/0x260 [ 337.233969] ? syscall_return_slowpath+0x550/0x550 [ 337.238891] ? syscall_return_slowpath+0x2ac/0x550 [ 337.243816] ? entry_SYSCALL_64_after_hwframe+0x52/0xb7 [ 337.249161] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 337.253989] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 337.259159] RIP: 0033:0x454e79 [ 337.262326] RSP: 002b:00007f016b92fc68 EFLAGS: 00000246 ORIG_RAX: 0000000000000102 [ 337.270030] RAX: ffffffffffffffda RBX: 00007f016b9306d4 RCX: 0000000000454e79 [ 337.277280] RDX: 0000000000000020 RSI: 0000000020000280 RDI: 0000000000000015 [ 337.284529] RBP: 000000000072bea0 R08: 0000000000000000 R09: 0000000000000000 [ 337.291783] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000016 [ 337.299045] R13: 00000000000003eb R14: 00000000006f7ea8 R15: 0000000000000025 [ 337.306418] cgroup: cgroup_addrm_files: failed to add weight.nice, err=-12 2018/03/30 23:06:29 executing program 3: getpid() socketpair(0xb, 0x0, 0x200000004000002, &(0x7f0000001140)={0xffffffffffffffff}) socketpair$inet(0x2, 0x800, 0x2, &(0x7f0000000000)) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000001100)={r0, &(0x7f0000000080)="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", &(0x7f0000001080)="69d2ee00515123c58f03fede7e451446ac2fa2e6b6852a187132864566d59413a3e9d83e102e3cfdb851882e5a59d217ba58934acc02a8b54a48f6df524cc4f2515ccd797fe856ef0ae3"}, 0x20) bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x10000000002009, 0x0, 0x10000000, 0x0, 0x13, 0x1}, 0x2c) 2018/03/30 23:06:29 executing program 4: mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount(&(0x7f000000a000)='./file0\x00', &(0x7f0000026ff8)='./file0\x00', &(0x7f000000c000)='ramfs\x00', 0x0, &(0x7f000000a000)) mkdir(&(0x7f0000000000)='./file1\x00', 0x0) mount(&(0x7f0000000040)='./file0\x00', &(0x7f0000903000)='./file0\x00', &(0x7f0000811ffa)='bdev\x00', 0x100000, &(0x7f00000003c0)="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") r0 = dup(0xffffffffffffffff) r1 = syz_open_dev$vcsn(&(0x7f00000000c0)='/dev/vcs#\x00', 0x2, 0x20800) renameat(r0, &(0x7f0000000080)='./file1/file0\x00', r1, &(0x7f0000000100)='./file1\x00') mount(&(0x7f0000fb6000)='./file0\x00', &(0x7f0000d78000)='.', &(0x7f0000fdb000)='ubifs\x00', 0x1003, 0x0) mount(&(0x7f00002b9ff8)='./file0\x00', &(0x7f0000cbeff8)='./file0\x00', &(0x7f00005f7ffa)='ramfs\x00', 0x80000, &(0x7f000002f000)) mount(&(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)='./file1\x00', &(0x7f0000000200)='anon_inodefs\x00', 0x2000, &(0x7f0000000240)) mount(&(0x7f0000adcff8)='./file0\x00', &(0x7f0000e08fff)='.', &(0x7f00005e9000)='cifs\x00', 0x2000, &(0x7f0000ad5000)) ioctl$EVIOCGKEYCODE_V2(r1, 0x80284504, &(0x7f0000000240)=""/246) getpeername$unix(r1, &(0x7f0000000680), &(0x7f0000000700)=0x6e) syz_mount_image$btrfs(&(0x7f0000000140)='btrfs\x00', &(0x7f0000000340)='./file1\x00', 0x7ff, 0x2, &(0x7f00000005c0)=[{&(0x7f0000000540)="509f9e5a56bb36f24d49dee56c029de3d2c282b18b85a6c619bc9efbf72a21d5f73caf1f9daf7a362c8c9b5998542c8de7aae0f1fc511a1f0c0896169f9e6d6b267295a408bc115937c67ede8771fdca144fa79bd68e5aa1f0a7a2415e6f22f4656755d75aa8baa14b", 0x69, 0xa47}, {&(0x7f0000000380)="c6983c8eae9879329d4c001c69eceee5f6b7145c36a2e2ac85fe2a49b15df30feda4678cabde0634f2d246fd1ab74a39b0d16c397c0d03cb62b0a70ffd", 0x3d, 0x8001}], 0x888, &(0x7f0000000600)={[{@autodefrag='autodefrag', 0x2c}, {@space_cache='space_cache', 0x2c}, {@check_int_print_mask={'check_int_print_mask', 0x3d, [0x37]}, 0x2c}, {@device={'device', 0x3d, './file0\x00'}, 0x2c}, {@nodatasum='nodatasum', 0x2c}]}) 2018/03/30 23:06:29 executing program 7: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f00000000c0)='./control\x00', 0x0) r0 = inotify_init() mkdir(&(0x7f0000000040)='./control\x00', 0x29) inotify_add_watch(r0, &(0x7f0000f1eff6)='./control\x00', 0x220000000009) r1 = inotify_init1(0x0) inotify_add_watch(r1, &(0x7f000001eff6)='./control\x00', 0x2000200) setsockopt$inet6_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, &(0x7f0000000080)="5fce869db66fa225921ad03d773be4ff", 0x10) rmdir(&(0x7f000075aff6)='./control\x00') 2018/03/30 23:06:29 executing program 2: perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f00000000c0)='./control\x00', 0x0) inotify_init() r0 = syz_open_dev$sg(&(0x7f000028fff7)='/dev/sg#\x00', 0x0, 0x0) ioctl(r0, 0x4000000000001276, &(0x7f0000000040)) msgget(0x2, 0x0) getsockopt$nfc_llcp(0xffffffffffffffff, 0x118, 0x4, &(0x7f0000000740)=""/223, 0xdf) setsockopt$inet_mreq(r0, 0x0, 0x23, &(0x7f00000002c0)={@empty, @remote={0xac, 0x14, 0x14, 0xbb}}, 0x8) accept4$nfc_llcp(0xffffffffffffffff, &(0x7f0000000940), &(0x7f0000000080)=0x60, 0x800) ioctl$SNDRV_CTL_IOCTL_ELEM_INFO(0xffffffffffffffff, 0xc1105511, &(0x7f0000000100)={{0x0, 0x0, 0x0, 0x0, "386aea20273dc03c3d18dd0dbd4a0ca15f9f580393cc4ec3b8ee256b9aa630224ba64c6ff43ee01d2996c914"}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "eda422cd37591b3a5a7a683380f7e0b9e790c6b72cd0a4f3342f7431c1699a305ca3091bb2320e8df4e298a2cca26637866a68c1426ffbd8a6c7da1d8ea77d9d", &(0x7f00000000c0)='/dev/snd/controlC#\x00', 0x13}) r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000003c0)='/proc/self/net/pfkey\x00', 0x800, 0x0) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) add_key$user(&(0x7f0000000480)='user\x00', &(0x7f00000004c0)={0x73, 0x79, 0x7a, 0x3}, &(0x7f0000000500)="d3238eea76b0470531092a0a77b0b49789a0fc97b8f8b9e23a2a5a5a0c169ed6e83480b4801dbf79db3527904ee3128c05ce2806e210237c36b88ceabe99d8784860e5d0e91fe33d38d0133e056cdd1e2910d57fc5eb1b23db3b60a7077ff33bb6c7445cd258ee25f9187269c22d1ed05acb2b9b599bd285b692257a631754ab9befebd3fdb3167361c24c5c5dcf90e476e052b9d22362c57878cb7205fe361346d6beb77b7844fe94", 0xa9, 0xfffffffffffffffe) ioctl$sock_inet_SIOCSIFADDR(r0, 0x8916, &(0x7f0000000300)={'gretap0\x00', {0x2, 0x4e24, @loopback=0x7f000001}}) keyctl$instantiate_iov(0x14, 0x0, &(0x7f0000000780)=[{&(0x7f0000000840)="edb4a01f68d76905035a4ebdd427d31585a5a650581902b1c077f74ca8f1ce7d3e2f6e1c6760433af9664b3f3bebab3a1a1c4ef86f42c39b758accc1e7637bb18d28248dc7a1719b73388830b162613b17fd02220bd1fe2ad86adb96efcfc672d126ae58f745fba0e7534cdbae947449df767bd76a0c38b5752dcd13f7065edea86dc156c0708e76c2c99a94a95f1e93ff73cb3eb94e06d399cf48aaac7963d13e4b3a6b32bc2b19d5461545dcf3f71bb24442d286421f8d891d77a3c4c1c9435bbdf187682c22ded22b669b7790d05b4894166a2d5f33098cf908a23a2e0671d824e88942fbe0bd1416", 0xea}], 0x1, 0x0) r3 = ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) ioctl$KVM_UNREGISTER_COALESCED_MMIO(r3, 0x4010ae68, &(0x7f0000000000)={0x0, 0x5000}) ioctl$KVM_CREATE_PIT2(r3, 0x4040ae77, &(0x7f0000000440)={0xfffffffffffffff7}) r4 = ioctl$KVM_CREATE_VCPU(r3, 0xae41, 0x0) setsockopt$inet_tcp_TCP_ULP(r1, 0x6, 0x1f, &(0x7f0000000280)='tls\x00', 0x4) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000005fd8)={'vcan0\x00'}) socket$can_raw(0x1d, 0x3, 0x1) socket$inet6(0xa, 0x0, 0x0) r5 = syz_open_dev$dspn(&(0x7f0000000040)='/dev/dsp#\x00', 0x0, 0x0) connect$vsock_stream(r5, &(0x7f0000000080)={0x28, 0x0, 0xffffffff, @my=0x1}, 0x10) dup2(r2, r4) 2018/03/30 23:06:29 executing program 6: pipe(&(0x7f0000000940)={0xffffffffffffffff, 0xffffffffffffffff}) accept4$ax25(r0, 0x0, &(0x7f0000000080), 0x80000) r1 = socket$inet(0x2, 0x20000000000003, 0x2) connect$inet(r1, &(0x7f0000000000)={0x2, 0x0, @remote={0xac, 0x14, 0x14, 0xbb}}, 0x10) sendmsg(0xffffffffffffffff, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000140), 0x0, &(0x7f0000000180)=ANY=[]}, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000980)=@broute={'broute\x00', 0x20, 0x3, 0x2d9, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000380], 0x0, &(0x7f00000002c0), &(0x7f0000001000)=ANY=[@ANYBLOB="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"]}, 0x351) setsockopt$inet_int(r1, 0x0, 0x2, &(0x7f00000000c0)=0x7fffffff, 0x4) r2 = socket$rds(0x15, 0x5, 0x0) pipe(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$bt_BT_DEFER_SETUP(r3, 0x112, 0x7, &(0x7f0000000280)=0x100, 0x4) accept$packet(r4, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @remote}, &(0x7f0000000100)=0x14) connect$rds(r2, &(0x7f0000000140)={0x2, 0x4e22, @remote={0xac, 0x14, 0x14, 0xbb}}, 0x10) getsockopt$sock_buf(r2, 0x1, 0x3b, &(0x7f0000000180)=""/83, &(0x7f0000000200)=0x53) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000a00)=@filter={'filter\x00', 0xe, 0x4, 0x5a0, 0xffffffff, 0x0, 0xf0, 0xf0, 0xffffffff, 0xffffffff, 0x4d0, 0x4d0, 0x4d0, 0xffffffff, 0x4, &(0x7f0000000300), {[{{@ipv6={@ipv4={[], [0xff, 0xff], @rand_addr=0x80000001}, @dev={0xfe, 0x80, [], 0x16}, [0x0, 0xffffff00, 0xff, 0xffffffff], [0x0, 0xff000000, 0xffffffff], 'ipddp0\x00', 'ip_vti0\x00', {}, {0xff}, 0x6c, 0x2bf}, 0x0, 0xc8, 0xf0}, @REJECT={0x28, 'REJECT\x00', 0x0, {0x7}}}, {{@ipv6={@remote={0xfe, 0x80, [], 0xbb}, @remote={0xfe, 0x80, [], 0xbb}, [0xff000000, 0xffffffff, 0xffffff00, 0xff], [0xff, 0xffffffff, 0x0, 0xff000000], 'syzkaller1\x00', 'eql\x00', {}, {}, 0x62, 0x0, 0x4, 0x1}, 0x0, 0x120, 0x148, 0x0, {}, [@common=@frag={0x30, 'frag\x00', 0x0, {0x7ff, 0x7, 0x1, 0x2}}, @common=@hl={0x28, 'hl\x00', 0x0, {0x3, 0x7fff}}]}, @REJECT={0x28, 'REJECT\x00', 0x0, {0x7}}}, {{@ipv6={@dev={0xfe, 0x80, [], 0xc}, @loopback={0x0, 0x1}, [0xffffffff, 0xffffffff, 0xff000000, 0xff000000], [0xff, 0x0, 0xff, 0xffffff00], 'irlan0\x00', 'vcan0\x00', {0xff}, {}, 0x3b, 0xffffffffffffab69, 0x2, 0x30}, 0x0, 0x250, 0x298, 0x0, {}, [@common=@srh={0x30, 'srh\x00', 0x0, {0xbb, 0x1, 0x3, 0x6, 0xffffffffffffffc0, 0x80}}, @common=@inet=@policy={0x158, 'policy\x00', 0x0, {[{@ipv4, [0xffffffff, 0xff0000ff, 0xff000000, 0xffffffff], @ipv4=@multicast1=0xe0000001, [0xffffffff, 0xffffffff, 0xff000000, 0xffffff00], 0x4d5, 0x3500, 0x5c, 0x0, 0x10, 0xf}, {@ipv6=@dev={0xfe, 0x80, [], 0x11}, [0x0, 0xff000000, 0xff0000ff, 0xffffff00], @ipv4=@multicast1=0xe0000001, [0xffffffff, 0x0, 0x0, 0xffffffff], 0x4d5, 0x3500, 0x77, 0x1, 0x0, 0x1d}, {@ipv6=@mcast1={0xff, 0x1, [], 0x1}, [0xff000000, 0xffffffff, 0xffffff00, 0xff], @ipv4=@multicast2=0xe0000002, [0xffffffff, 0x0, 0xffffff00, 0xffffffff], 0x4d3, 0x3503, 0x7f, 0x0, 0x1, 0x19}, {@ipv4=@local={0xac, 0x14, 0x14, 0xaa}, [0x0, 0xff, 0x0, 0xff0000ff], @ipv6=@local={0xfe, 0x80, [], 0xaa}, [0xffffffff, 0xffffffff, 0xff, 0xff0000ff], 0x4d4, 0x3505, 0x0, 0x1, 0x1f, 0x10}], 0x0, 0x3}}]}, @common=@unspec=@LED={0x48, 'LED\x00', 0x0, {'syz1\x00', 0x0, 0x8, 0x8}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28, '\x00', 0x0, 0xfffffffffffffffe}}}}, 0x600) socket(0x1, 0xa, 0x0) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_TIMER(r4, 0x40605346, &(0x7f0000000680)={0x1, 0x3, {0x3, 0x0, 0x9, 0x3}}) 2018/03/30 23:06:29 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x200, 0x0) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000680)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$sock_linger(r2, 0x1, 0xd, &(0x7f00000006c0)={0x400, 0x9}, 0x8) perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x0, 0x0) r3 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) mmap(&(0x7f0000000000/0x9d7000)=nil, 0x9d7000, 0x0, 0x10, 0xffffffffffffffff, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x7) perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r4 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r4, &(0x7f0000e5b000)={0x2, 0x4e20, @multicast1=0xe0000001}, 0x10) syz_open_dev$sg(&(0x7f0000000440)='/dev/sg#\x00', 0x0, 0x0) connect$inet(r4, &(0x7f0000000100)={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x11}}, 0x10) r5 = bpf$PROG_LOAD(0x5, &(0x7f0000eb0fb8)={0x1, 0x3, &(0x7f00009ff000)=@framed={{0x18}, [], {0x95}}, &(0x7f00002bf000)='syzkaller\x00', 0x4, 0xb7, &(0x7f00006ab000)=""/183}, 0x48) setsockopt$inet_tcp_int(r4, 0x6, 0x19, &(0x7f0000000240)=0x8, 0x4) r6 = socket$kcm(0x29, 0x2, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r6, 0x89e0, &(0x7f000031aff8)={r4, r5}) ioctl$sock_kcm_SIOCKCMCLONE(r6, 0x89e2, &(0x7f00000002c0)={0xffffffffffffffff}) sendmsg$nl_xfrm(r7, &(0x7f0000000780)={&(0x7f0000000200)={0x10}, 0xc, &(0x7f0000000740)={&(0x7f0000000480)=@updpolicy={0xb8, 0x19, 0x0, 0x0, 0x0, {{@in=@loopback=0x7f000001, @in6=@mcast1={0xff, 0x1, [], 0x1}}}}, 0xffcb}, 0x1}, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(r7, 0x89e1, &(0x7f0000000040)={r4}) r8 = fcntl$getown(r3, 0x9) recvfrom$inet6(r1, &(0x7f0000000140)=""/177, 0xb1, 0x40000000, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @empty, 0xe38}, 0x1c) r9 = accept4$inet(0xffffffffffffff9c, &(0x7f0000000700)={0x0, 0x0, @broadcast}, &(0x7f0000000740)=0x10, 0x80000) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r9, 0x84, 0x64, &(0x7f0000000780)=[@in6={0xa, 0x4e22, 0xfffffffffffff7e1, @mcast2={0xff, 0x2, [], 0x1}, 0x8}, @in={0x2, 0x4e24, @broadcast=0xffffffff}], 0x2c) ptrace$setregset(0x4205, r8, 0x0, &(0x7f00000005c0)={&(0x7f0000000080)}) ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r10 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x1fffd, 0x0) r11 = syz_open_dev$sndtimer(&(0x7f00000000c0)='/dev/snd/timer\x00', 0x0, 0x0) read(r11, &(0x7f0000ec6000)=""/50, 0x32) fcntl$dupfd(r11, 0x0, r10) 2018/03/30 23:06:29 executing program 0 (fault-call:7 fault-nth:38): mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r0 = syz_open_dev$usbmon(&(0x7f0000000400)='/dev/usbmon#\x00', 0x0, 0x0) r1 = perf_event_open(&(0x7f0000223000)={0x2, 0x78, 0xe3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000001980)={{{@in6=@remote, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast2}, 0x0, @in=@multicast2}}, &(0x7f0000001a80)=0xe8) chown(&(0x7f00000004c0)='./file0\x00', r2, 0x0) mount(&(0x7f00000003c0)='./file0\x00', &(0x7f0000000380)='./file0\x00', &(0x7f0000000300)='cgroup2\x00', 0x0, 0x0) r3 = open$dir(&(0x7f000001bff4)='./file0\x00', 0x0, 0x0) mkdirat(r3, &(0x7f0000000280)='./file0\x00', 0x20) getdents64(r3, &(0x7f00000007c0)=""/250, 0x1015a) dup3(r0, r1, 0x80000) r4 = open$dir(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) renameat2(r4, &(0x7f0000000200)='./file1\x00', 0xffffffffffffffff, &(0x7f0000000240)='./file0\x00', 0xfd1092750066ec78) ioctl$KDGKBMODE(0xffffffffffffffff, 0x4b44, &(0x7f0000000140)) 2018/03/30 23:06:29 executing program 5: r0 = fcntl$dupfd(0xffffffffffffff9c, 0x0, 0xffffffffffffffff) bind$unix(r0, &(0x7f0000000200)=@file={0x1, './file0\x00'}, 0x6e) mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) sysfs$1(0x1, &(0x7f0000000180)='cgroup2\x00') r1 = perf_event_open(&(0x7f0000223000)={0x2, 0x78, 0xe3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getsockopt$ax25_buf(r1, 0x101, 0x0, &(0x7f00000000c0)=""/128, &(0x7f0000000040)=0x80) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000001980)={{{@in6=@remote, @in=@multicast1}}, {{@in=@multicast2}, 0x0, @in=@multicast2}}, &(0x7f0000001a80)=0xe8) mount(&(0x7f00000003c0)='./file0\x00', &(0x7f0000000380)='./file0\x00', &(0x7f0000000300)='cgroup2\x00', 0x0, 0x0) r2 = open$dir(&(0x7f000001bff4)='./file0\x00', 0x0, 0x0) mkdirat(r0, &(0x7f0000000280)='./file0\x00', 0x1d) r3 = syz_open_dev$mice(&(0x7f0000000140)='/dev/input/mice\x00', 0x0, 0x4129c0) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r3, 0xc08c5332, &(0x7f0000000400)={0xfffffffffffffeff, 0x7229, 0x5981, 'queue0\x00', 0xfffffffffffffff7}) unlinkat(r2, &(0x7f0000000080)='./file0\x00', 0x200) openat$dir(0xffffffffffffff9c, &(0x7f0000006ec0)='./file0\x00', 0x202000, 0x10) recvmmsg(r3, &(0x7f0000007100)=[{{0x0, 0x0, &(0x7f0000000340)=[{&(0x7f00000004c0)=""/107, 0x6b}, {&(0x7f00000002c0)=""/49, 0x31}, {&(0x7f0000000540)=""/211, 0xd3}], 0x3, &(0x7f0000000640)=""/238, 0xee, 0x6}, 0x3f}, {{0x0, 0x0, &(0x7f0000001dc0)=[{&(0x7f0000000740)=""/163, 0xa3}, {&(0x7f0000000800)=""/4096, 0x1000}, {&(0x7f0000001800)=""/188, 0xbc}, {&(0x7f0000001ac0)=""/212, 0xd4}, {&(0x7f00000018c0)=""/95, 0x5f}, {&(0x7f0000001940)=""/61, 0x3d}, {&(0x7f0000001bc0)=""/228, 0xe4}, {&(0x7f0000001cc0)=""/193, 0xc1}], 0x8, &(0x7f0000001e40)=""/224, 0xe0, 0x1}, 0x9}, {{&(0x7f0000001f40)=@un=@abs, 0x80, &(0x7f0000002580)=[{&(0x7f0000001fc0)=""/18, 0x12}, {&(0x7f0000002000)=""/168, 0xa8}, {&(0x7f00000020c0)=""/174, 0xae}, {&(0x7f0000002180)=""/219, 0xdb}, {&(0x7f0000002280)=""/212, 0xd4}, {&(0x7f0000002380)=""/47, 0x2f}, {&(0x7f00000023c0)=""/148, 0x94}, {&(0x7f0000002480)=""/66, 0x42}, {&(0x7f0000002500)=""/105, 0x69}], 0x9, &(0x7f0000002640)=""/225, 0xe1, 0x1ff}, 0x8000}, {{&(0x7f0000002740)=@pppol2tpv3in6={0x0, 0x0, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, @ipv4={[], [], @rand_addr}}}}, 0x80, &(0x7f0000002a00)=[{&(0x7f00000027c0)=""/215, 0xd7}, {&(0x7f00000028c0)=""/246, 0xf6}, {&(0x7f00000029c0)=""/45, 0x2d}], 0x3, &(0x7f0000002a40)=""/4096, 0x1000, 0xf6c}, 0x5}, {{0x0, 0x0, &(0x7f0000004e40)=[{&(0x7f0000003a40)}, {&(0x7f0000003a80)=""/99, 0x63}, {&(0x7f0000003b00)=""/33, 0x21}, {&(0x7f0000003b40)=""/165, 0xa5}, {&(0x7f0000003c00)=""/4096, 0x1000}, {&(0x7f0000004c00)=""/154, 0x9a}, {&(0x7f0000004cc0)=""/196, 0xc4}, {&(0x7f0000004dc0)=""/82, 0x52}], 0x8, &(0x7f0000004ec0)=""/73, 0x49}, 0x38c}, {{&(0x7f0000004f40)=@vsock={0x0, 0x0, 0x0, @host}, 0x80, &(0x7f00000051c0)=[{&(0x7f0000004fc0)=""/164, 0xa4}, {&(0x7f0000005080)=""/94, 0x5e}, {&(0x7f0000005100)=""/152, 0x98}], 0x3, &(0x7f0000005200)=""/159, 0x9f, 0x6f8}, 0x1}, {{&(0x7f00000052c0)=@nfc_llcp, 0x80, &(0x7f0000005340), 0x0, &(0x7f0000005380)=""/168, 0xa8}, 0xfffffffffffffff8}, {{0x0, 0x0, &(0x7f0000005500)=[{&(0x7f0000005440)=""/162, 0xa2}], 0x1, 0x0, 0x0, 0x8}, 0x3}, {{&(0x7f0000005540)=@can, 0x80, &(0x7f0000006980)=[{&(0x7f00000055c0)=""/152, 0x98}, {&(0x7f0000005680)=""/4096, 0x1000}, {&(0x7f0000006680)=""/154, 0x9a}, {&(0x7f0000006740)=""/212, 0xd4}, {&(0x7f0000006840)=""/205, 0xcd}, {&(0x7f0000006940)=""/39, 0x27}], 0x6, &(0x7f0000006a00)=""/225, 0xe1, 0x1}, 0x1}, {{&(0x7f0000006b00)=@can, 0x80, &(0x7f0000007040)=[{&(0x7f0000006b80)=""/121, 0x79}, {&(0x7f0000006c00)=""/157, 0x9d}, {&(0x7f0000006cc0)=""/240, 0xf0}, {&(0x7f0000006dc0)=""/226, 0xe2}, {&(0x7f0000006ec0)}, {&(0x7f0000006f00)=""/64, 0x40}, {&(0x7f0000006f40)=""/159, 0x9f}, {&(0x7f0000007000)}], 0x8, &(0x7f00000070c0)=""/7, 0x7, 0x8}, 0xfffffffffffff9ff}], 0xa, 0x40, 0x0) getsockopt$inet_sctp6_SCTP_GET_ASSOC_NUMBER(r3, 0x84, 0x1c, &(0x7f0000003a40), &(0x7f0000005340)=0x4) [ 337.755701] kernel msg: ebtables bug: please report to author: entries_size too small [ 337.808922] FAULT_INJECTION: forcing a failure. [ 337.808922] name failslab, interval 1, probability 0, space 0, times 0 [ 337.820272] CPU: 0 PID: 26567 Comm: syz-executor0 Not tainted 4.16.0-rc7+ #372 [ 337.827642] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 337.836988] Call Trace: [ 337.839575] dump_stack+0x194/0x24d [ 337.843193] ? arch_local_irq_restore+0x53/0x53 [ 337.847863] should_fail+0x8c0/0xa40 [ 337.851566] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 337.856655] ? __mutex_lock+0x16f/0x1a80 [ 337.860699] ? trace_event_raw_event_lock+0x340/0x340 [ 337.865868] ? trace_hardirqs_off+0x10/0x10 [ 337.870174] ? find_held_lock+0x35/0x1d0 [ 337.874224] ? __lock_is_held+0xb6/0x140 [ 337.878281] ? check_same_owner+0x320/0x320 [ 337.882582] ? lock_downgrade+0x980/0x980 [ 337.886716] ? rcu_note_context_switch+0x710/0x710 [ 337.891637] should_failslab+0xec/0x120 [ 337.895603] __kmalloc_track_caller+0x5f/0x760 [ 337.900177] ? string+0x180/0x200 [ 337.903613] ? kstrdup_const+0x39/0x50 [ 337.907485] kstrdup+0x39/0x70 [ 337.910662] kstrdup_const+0x39/0x50 [ 337.914364] __kernfs_new_node+0xa2/0x570 [ 337.918498] ? kernfs_dop_revalidate+0x380/0x380 [ 337.923245] ? snprintf+0xc0/0xf0 [ 337.926678] ? vsprintf+0x40/0x40 [ 337.930111] ? debug_lockdep_rcu_enabled+0x77/0x90 [ 337.935034] ? cgroup_file_name+0x1d0/0x1d0 [ 337.939343] kernfs_new_node+0x80/0xe0 [ 337.943214] __kernfs_create_file+0x4b/0x320 [ 337.947611] cgroup_addrm_files+0x3c5/0xa70 [ 337.951922] ? cgroup_file_write+0x710/0x710 [ 337.956316] ? cpu_cgroup_css_alloc+0x30/0x30 [ 337.960804] ? __lock_is_held+0xb6/0x140 [ 337.964853] ? sched_online_group+0x4e0/0x4e0 [ 337.969330] ? cpu_cgroup_css_online+0x3a/0x50 [ 337.973891] ? online_css+0x224/0x2e0 [ 337.977674] css_populate_dir+0x198/0x420 [ 337.981807] cgroup_apply_control_enable+0x390/0xbc0 [ 337.986898] ? cgroup_propagate_control+0x570/0x570 [ 337.991902] ? css_populate_dir+0x289/0x420 [ 337.996211] cgroup_mkdir+0x56f/0xfc0 [ 337.999992] ? __lock_is_held+0xb6/0x140 [ 338.004045] ? cgroup_destroy_locked+0x750/0x750 [ 338.008780] ? rcu_read_lock_sched_held+0x108/0x120 [ 338.013781] ? kmem_cache_free+0x258/0x2a0 [ 338.017998] ? set_nlink+0xc1/0x160 [ 338.021612] ? debug_lockdep_rcu_enabled+0x77/0x90 [ 338.026524] ? generic_permission+0x105/0x3c0 [ 338.031003] ? cgroup_destroy_locked+0x750/0x750 [ 338.035748] kernfs_iop_mkdir+0x153/0x1e0 [ 338.039878] vfs_mkdir+0x390/0x600 [ 338.043404] SyS_mkdirat+0x22b/0x2b0 [ 338.047103] ? SyS_mknod+0x480/0x480 [ 338.050794] ? trace_hardirqs_on+0xd/0x10 [ 338.054926] ? do_syscall_64+0xb7/0x940 [ 338.058881] ? SyS_mknod+0x480/0x480 [ 338.062578] do_syscall_64+0x281/0x940 [ 338.066452] ? vmalloc_sync_all+0x30/0x30 [ 338.070581] ? _raw_spin_unlock_irq+0x27/0x70 [ 338.075057] ? finish_task_switch+0x1c1/0x7e0 [ 338.079533] ? syscall_return_slowpath+0x550/0x550 [ 338.084447] ? syscall_return_slowpath+0x2ac/0x550 [ 338.089360] ? prepare_exit_to_usermode+0x350/0x350 [ 338.094360] ? entry_SYSCALL_64_after_hwframe+0x52/0xb7 [ 338.099708] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 338.104535] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 338.109707] RIP: 0033:0x454e79 [ 338.112874] RSP: 002b:00007f016b92fc68 EFLAGS: 00000246 ORIG_RAX: 0000000000000102 [ 338.120564] RAX: ffffffffffffffda RBX: 00007f016b9306d4 RCX: 0000000000454e79 [ 338.127815] RDX: 0000000000000020 RSI: 0000000020000280 RDI: 0000000000000015 [ 338.135065] RBP: 000000000072bea0 R08: 0000000000000000 R09: 0000000000000000 [ 338.142316] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000016 [ 338.149566] R13: 00000000000003eb R14: 00000000006f7ea8 R15: 0000000000000026 2018/03/30 23:06:29 executing program 6: pipe(&(0x7f0000000940)={0xffffffffffffffff, 0xffffffffffffffff}) accept4$ax25(r0, 0x0, &(0x7f0000000080), 0x80000) r1 = socket$inet(0x2, 0x20000000000003, 0x2) connect$inet(r1, &(0x7f0000000000)={0x2, 0x0, @remote={0xac, 0x14, 0x14, 0xbb}}, 0x10) sendmsg(0xffffffffffffffff, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000140), 0x0, &(0x7f0000000180)=ANY=[]}, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000980)=@broute={'broute\x00', 0x20, 0x3, 0x2d9, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000380], 0x0, &(0x7f00000002c0), &(0x7f0000001000)=ANY=[@ANYBLOB="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"]}, 0x351) setsockopt$inet_int(r1, 0x0, 0x2, &(0x7f00000000c0)=0x7fffffff, 0x4) r2 = socket$rds(0x15, 0x5, 0x0) pipe(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$bt_BT_DEFER_SETUP(r3, 0x112, 0x7, &(0x7f0000000280)=0x100, 0x4) accept$packet(r4, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @remote}, &(0x7f0000000100)=0x14) connect$rds(r2, &(0x7f0000000140)={0x2, 0x4e22, @remote={0xac, 0x14, 0x14, 0xbb}}, 0x10) getsockopt$sock_buf(r2, 0x1, 0x3b, &(0x7f0000000180)=""/83, &(0x7f0000000200)=0x53) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000a00)=@filter={'filter\x00', 0xe, 0x4, 0x5a0, 0xffffffff, 0x0, 0xf0, 0xf0, 0xffffffff, 0xffffffff, 0x4d0, 0x4d0, 0x4d0, 0xffffffff, 0x4, &(0x7f0000000300), {[{{@ipv6={@ipv4={[], [0xff, 0xff], @rand_addr=0x80000001}, @dev={0xfe, 0x80, [], 0x16}, [0x0, 0xffffff00, 0xff, 0xffffffff], [0x0, 0xff000000, 0xffffffff], 'ipddp0\x00', 'ip_vti0\x00', {}, {0xff}, 0x6c, 0x2bf}, 0x0, 0xc8, 0xf0}, @REJECT={0x28, 'REJECT\x00', 0x0, {0x7}}}, {{@ipv6={@remote={0xfe, 0x80, [], 0xbb}, @remote={0xfe, 0x80, [], 0xbb}, [0xff000000, 0xffffffff, 0xffffff00, 0xff], [0xff, 0xffffffff, 0x0, 0xff000000], 'syzkaller1\x00', 'eql\x00', {}, {}, 0x62, 0x0, 0x4, 0x1}, 0x0, 0x120, 0x148, 0x0, {}, [@common=@frag={0x30, 'frag\x00', 0x0, {0x7ff, 0x7, 0x1, 0x2}}, @common=@hl={0x28, 'hl\x00', 0x0, {0x3, 0x7fff}}]}, @REJECT={0x28, 'REJECT\x00', 0x0, {0x7}}}, {{@ipv6={@dev={0xfe, 0x80, [], 0xc}, @loopback={0x0, 0x1}, [0xffffffff, 0xffffffff, 0xff000000, 0xff000000], [0xff, 0x0, 0xff, 0xffffff00], 'irlan0\x00', 'vcan0\x00', {0xff}, {}, 0x3b, 0xffffffffffffab69, 0x2, 0x30}, 0x0, 0x250, 0x298, 0x0, {}, [@common=@srh={0x30, 'srh\x00', 0x0, {0xbb, 0x1, 0x3, 0x6, 0xffffffffffffffc0, 0x80}}, @common=@inet=@policy={0x158, 'policy\x00', 0x0, {[{@ipv4, [0xffffffff, 0xff0000ff, 0xff000000, 0xffffffff], @ipv4=@multicast1=0xe0000001, [0xffffffff, 0xffffffff, 0xff000000, 0xffffff00], 0x4d5, 0x3500, 0x5c, 0x0, 0x10, 0xf}, {@ipv6=@dev={0xfe, 0x80, [], 0x11}, [0x0, 0xff000000, 0xff0000ff, 0xffffff00], @ipv4=@multicast1=0xe0000001, [0xffffffff, 0x0, 0x0, 0xffffffff], 0x4d5, 0x3500, 0x77, 0x1, 0x0, 0x1d}, {@ipv6=@mcast1={0xff, 0x1, [], 0x1}, [0xff000000, 0xffffffff, 0xffffff00, 0xff], @ipv4=@multicast2=0xe0000002, [0xffffffff, 0x0, 0xffffff00, 0xffffffff], 0x4d3, 0x3503, 0x7f, 0x0, 0x1, 0x19}, {@ipv4=@local={0xac, 0x14, 0x14, 0xaa}, [0x0, 0xff, 0x0, 0xff0000ff], @ipv6=@local={0xfe, 0x80, [], 0xaa}, [0xffffffff, 0xffffffff, 0xff, 0xff0000ff], 0x4d4, 0x3505, 0x0, 0x1, 0x1f, 0x10}], 0x0, 0x3}}]}, @common=@unspec=@LED={0x48, 'LED\x00', 0x0, {'syz1\x00', 0x0, 0x8, 0x8}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28, '\x00', 0x0, 0xfffffffffffffffe}}}}, 0x600) socket(0x1, 0xa, 0x0) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_TIMER(r4, 0x40605346, &(0x7f0000000680)={0x1, 0x3, {0x3, 0x0, 0x9, 0x3}}) 2018/03/30 23:06:29 executing program 7: perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f00000000c0)='./control\x00', 0x0) r0 = inotify_init() inotify_add_watch(r0, &(0x7f0000f1eff6)='./control\x00', 0x220000000009) r1 = inotify_init1(0x0) inotify_add_watch(r1, &(0x7f000001eff6)='./control\x00', 0x2000200) r2 = syz_open_dev$adsp(&(0x7f0000000040)='/dev/adsp#\x00', 0xfde, 0x202) setsockopt$SO_RDS_MSG_RXPATH_LATENCY(r2, 0x114, 0xa, &(0x7f0000000100)={0x3, "40d403"}, 0x4) setsockopt$inet6_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, &(0x7f0000000080)="5fce869db66fa225921ad03d773be4ff", 0x10) rmdir(&(0x7f000075aff6)='./control\x00') [ 338.156984] cgroup: cgroup_addrm_files: failed to add max, err=-12 2018/03/30 23:06:29 executing program 4: mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount(&(0x7f000000a000)='./file0\x00', &(0x7f0000026ff8)='./file0\x00', &(0x7f000000c000)='ramfs\x00', 0x0, &(0x7f000000a000)) mkdir(&(0x7f0000000000)='./file1\x00', 0x0) mount(&(0x7f0000000040)='./file0\x00', &(0x7f0000903000)='./file0\x00', &(0x7f0000811ffa)='bdev\x00', 0x100000, &(0x7f00000003c0)="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") r0 = dup(0xffffffffffffffff) r1 = syz_open_dev$vcsn(&(0x7f00000000c0)='/dev/vcs#\x00', 0x2, 0x20800) renameat(r0, &(0x7f0000000080)='./file1/file0\x00', r1, &(0x7f0000000100)='./file1\x00') mount(&(0x7f0000fb6000)='./file0\x00', &(0x7f0000d78000)='.', &(0x7f0000fdb000)='ubifs\x00', 0x1003, 0x0) mount(&(0x7f00002b9ff8)='./file0\x00', &(0x7f0000cbeff8)='./file0\x00', &(0x7f00005f7ffa)='ramfs\x00', 0x80000, &(0x7f000002f000)) mount(&(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)='./file1\x00', &(0x7f0000000200)='anon_inodefs\x00', 0x2000, &(0x7f0000000240)) mount(&(0x7f0000adcff8)='./file0\x00', &(0x7f0000e08fff)='.', &(0x7f00005e9000)='cifs\x00', 0x2000, &(0x7f0000ad5000)) dup(r0) 2018/03/30 23:06:29 executing program 2: perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f00000000c0)='./control\x00', 0x0) inotify_init() r0 = syz_open_dev$sg(&(0x7f000028fff7)='/dev/sg#\x00', 0x0, 0x0) ioctl(r0, 0x4000000000001276, &(0x7f0000000040)) msgget(0x2, 0x0) getsockopt$nfc_llcp(0xffffffffffffffff, 0x118, 0x4, &(0x7f0000000740)=""/223, 0xdf) setsockopt$inet_mreq(r0, 0x0, 0x23, &(0x7f00000002c0)={@empty, @remote={0xac, 0x14, 0x14, 0xbb}}, 0x8) accept4$nfc_llcp(0xffffffffffffffff, &(0x7f0000000940), &(0x7f0000000080)=0x60, 0x800) ioctl$SNDRV_CTL_IOCTL_ELEM_INFO(0xffffffffffffffff, 0xc1105511, &(0x7f0000000100)={{0x0, 0x0, 0x0, 0x0, "386aea20273dc03c3d18dd0dbd4a0ca15f9f580393cc4ec3b8ee256b9aa630224ba64c6ff43ee01d2996c914"}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "eda422cd37591b3a5a7a683380f7e0b9e790c6b72cd0a4f3342f7431c1699a305ca3091bb2320e8df4e298a2cca26637866a68c1426ffbd8a6c7da1d8ea77d9d", &(0x7f00000000c0)='/dev/snd/controlC#\x00', 0x13}) r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000003c0)='/proc/self/net/pfkey\x00', 0x800, 0x0) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) add_key$user(&(0x7f0000000480)='user\x00', &(0x7f00000004c0)={0x73, 0x79, 0x7a, 0x3}, &(0x7f0000000500)="d3238eea76b0470531092a0a77b0b49789a0fc97b8f8b9e23a2a5a5a0c169ed6e83480b4801dbf79db3527904ee3128c05ce2806e210237c36b88ceabe99d8784860e5d0e91fe33d38d0133e056cdd1e2910d57fc5eb1b23db3b60a7077ff33bb6c7445cd258ee25f9187269c22d1ed05acb2b9b599bd285b692257a631754ab9befebd3fdb3167361c24c5c5dcf90e476e052b9d22362c57878cb7205fe361346d6beb77b7844fe94", 0xa9, 0xfffffffffffffffe) ioctl$sock_inet_SIOCSIFADDR(r0, 0x8916, &(0x7f0000000300)={'gretap0\x00', {0x2, 0x4e24, @loopback=0x7f000001}}) keyctl$instantiate_iov(0x14, 0x0, &(0x7f0000000780)=[{&(0x7f0000000840)="edb4a01f68d76905035a4ebdd427d31585a5a650581902b1c077f74ca8f1ce7d3e2f6e1c6760433af9664b3f3bebab3a1a1c4ef86f42c39b758accc1e7637bb18d28248dc7a1719b73388830b162613b17fd02220bd1fe2ad86adb96efcfc672d126ae58f745fba0e7534cdbae947449df767bd76a0c38b5752dcd13f7065edea86dc156c0708e76c2c99a94a95f1e93ff73cb3eb94e06d399cf48aaac7963d13e4b3a6b32bc2b19d5461545dcf3f71bb24442d286421f8d891d77a3c4c1c9435bbdf187682c22ded22b669b7790d05b4894166a2d5f33098cf908a23a2e0671d824e88942fbe0bd1416", 0xea}], 0x1, 0x0) r3 = ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) ioctl$KVM_UNREGISTER_COALESCED_MMIO(r3, 0x4010ae68, &(0x7f0000000000)={0x0, 0x5000}) ioctl$KVM_CREATE_PIT2(r3, 0x4040ae77, &(0x7f0000000440)={0xfffffffffffffff7}) ioctl$KVM_CREATE_VCPU(r3, 0xae41, 0x0) setsockopt$inet_tcp_TCP_ULP(r1, 0x6, 0x1f, &(0x7f0000000280)='tls\x00', 0x4) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000005fd8)={'vcan0\x00'}) socket$can_raw(0x1d, 0x3, 0x1) socket$inet6(0xa, 0x0, 0x0) r4 = syz_open_dev$dspn(&(0x7f0000000040)='/dev/dsp#\x00', 0x0, 0x0) connect$vsock_stream(r4, &(0x7f0000000080)={0x28, 0x0, 0xffffffff, @my=0x1}, 0x10) [ 338.240200] kernel msg: ebtables bug: please report to author: entries_size too small 2018/03/30 23:06:29 executing program 3: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup.cpu\x00', 0x200002, 0x0) r1 = open(&(0x7f0000000040)='./control\x00', 0x0, 0x1) fchdir(r0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000500), &(0x7f0000000540)=0xc) fchown(r0, 0x0, 0x0) membarrier(0x8, 0x0) r2 = socket$nl_xfrm(0x10, 0x3, 0x6) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000080)={'bond0\x00'}) r3 = socket(0xa, 0x2, 0x0) sendmsg$IPVS_CMD_GET_INFO(0xffffffffffffffff, &(0x7f00000009c0)={&(0x7f0000000500)={0x10, 0x0, 0x0, 0x21100000}, 0xc, &(0x7f0000000980)={&(0x7f0000000600)=ANY=[@ANYBLOB="010e28bdba00fedbdf250f0000000800060003000000680000000000000000000000080001000a00000008000bf272697e0008000b0073690001000a0000079f02040007c6752b11623f002000000003010000080006006c630000b025dabd001a08000b007302306e00528d83aa8f23b0c9d515ee84efaa64003587e898db0000b7"], 0x1}, 0x1}, 0x20000884) ioctl$sock_FIOGETOWN(r3, 0x8903, &(0x7f0000000200)) connect$inet6(r3, &(0x7f0000000100)={0xa, 0x0, 0x0, @mcast1={0xff, 0x1, [], 0x1}, 0x100000002}, 0x1c) getsockopt$inet_opts(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000540)=""/99, &(0x7f0000000780)=0x28c77c4c79f525cf) sendto$inet(r3, &(0x7f0000509f92), 0xff77, 0x0, &(0x7f000055fff0)={0x2, 0x4e23, @loopback=0x7f000001}, 0x10) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000b00)='./cgroup.cpu\x00', 0x200002, 0x0) fchdir(0xffffffffffffffff) sendto$inet(0xffffffffffffffff, &(0x7f0000000a40)="45431bc153e49dc3c341afeff8a6a3782b30655dea8638a45a7a369ca5aebbc34e2d0227a019364ef806e574edc574801179b3c34145612db79a5340231421095dba2effc99687206c3416a0afabbea4ab2d17074a574429500a92adb41dfbc9e160349e8bb48b1d26e10c3e2571a99e857df6cdf0eb2dbb45810d2736bc2d", 0x7f, 0x3ffffff, &(0x7f0000000c00)={0x2, 0x0, @loopback=0x7f000001}, 0x10) r4 = creat(&(0x7f0000000100)='./file0\x00', 0x0) fallocate(r4, 0x1, 0x0, 0x20004d2d) sendto$inet(0xffffffffffffffff, &(0x7f0000000000)="1356c1f7a6f170d95ec6cfc03678287eebc2", 0x12, 0x0, &(0x7f0000000080)={0x2, 0x4e24}, 0x10) sendmsg$inet_sctp(r3, &(0x7f000050dfc8)={&(0x7f0000000840)=@in6={0xa, 0x4e24, 0x80000001, @mcast1={0xff, 0x1, [], 0x1}}, 0x1c, &(0x7f00000005c0), 0x0, &(0x7f0000576000)}, 0x0) sendto$inet6(r3, &(0x7f0000000240)="6a14ad6a11c00f9a3e52ea90f0", 0xd, 0x0, &(0x7f0000000280)={0xa, 0x4e23, 0x3, @local={0xfe, 0x80, [], 0xaa}, 0x9}, 0x1c) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000000)={{{@in=@multicast2, @in6=@dev}}, {{@in=@multicast1}, 0x0, @in6=@ipv4={[], [], @remote}}}, &(0x7f0000000140)=0xe8) open(&(0x7f0000022ff6)='./control\x00', 0x0, 0x0) getdents(0xffffffffffffffff, &(0x7f000076cf07)=""/249, 0xf9) syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x80ed, 0x0) 2018/03/30 23:06:29 executing program 6: pipe(&(0x7f0000000940)={0xffffffffffffffff, 0xffffffffffffffff}) accept4$ax25(r0, 0x0, &(0x7f0000000080), 0x80000) r1 = socket$inet(0x2, 0x20000000000003, 0x2) connect$inet(r1, &(0x7f0000000000)={0x2, 0x0, @remote={0xac, 0x14, 0x14, 0xbb}}, 0x10) sendmsg(0xffffffffffffffff, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000140), 0x0, &(0x7f0000000180)=ANY=[]}, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000980)=@broute={'broute\x00', 0x20, 0x3, 0x2d9, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000380], 0x0, &(0x7f00000002c0), &(0x7f0000001000)=ANY=[@ANYBLOB="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"]}, 0x351) setsockopt$inet_int(r1, 0x0, 0x2, &(0x7f00000000c0)=0x7fffffff, 0x4) r2 = socket$rds(0x15, 0x5, 0x0) pipe(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$bt_BT_DEFER_SETUP(r3, 0x112, 0x7, &(0x7f0000000280)=0x100, 0x4) accept$packet(r4, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @remote}, &(0x7f0000000100)=0x14) connect$rds(r2, &(0x7f0000000140)={0x2, 0x4e22, @remote={0xac, 0x14, 0x14, 0xbb}}, 0x10) getsockopt$sock_buf(r2, 0x1, 0x3b, &(0x7f0000000180)=""/83, &(0x7f0000000200)=0x53) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000a00)=@filter={'filter\x00', 0xe, 0x4, 0x5a0, 0xffffffff, 0x0, 0xf0, 0xf0, 0xffffffff, 0xffffffff, 0x4d0, 0x4d0, 0x4d0, 0xffffffff, 0x4, &(0x7f0000000300), {[{{@ipv6={@ipv4={[], [0xff, 0xff], @rand_addr=0x80000001}, @dev={0xfe, 0x80, [], 0x16}, [0x0, 0xffffff00, 0xff, 0xffffffff], [0x0, 0xff000000, 0xffffffff], 'ipddp0\x00', 'ip_vti0\x00', {}, {0xff}, 0x6c, 0x2bf}, 0x0, 0xc8, 0xf0}, @REJECT={0x28, 'REJECT\x00', 0x0, {0x7}}}, {{@ipv6={@remote={0xfe, 0x80, [], 0xbb}, @remote={0xfe, 0x80, [], 0xbb}, [0xff000000, 0xffffffff, 0xffffff00, 0xff], [0xff, 0xffffffff, 0x0, 0xff000000], 'syzkaller1\x00', 'eql\x00', {}, {}, 0x62, 0x0, 0x4, 0x1}, 0x0, 0x120, 0x148, 0x0, {}, [@common=@frag={0x30, 'frag\x00', 0x0, {0x7ff, 0x7, 0x1, 0x2}}, @common=@hl={0x28, 'hl\x00', 0x0, {0x3, 0x7fff}}]}, @REJECT={0x28, 'REJECT\x00', 0x0, {0x7}}}, {{@ipv6={@dev={0xfe, 0x80, [], 0xc}, @loopback={0x0, 0x1}, [0xffffffff, 0xffffffff, 0xff000000, 0xff000000], [0xff, 0x0, 0xff, 0xffffff00], 'irlan0\x00', 'vcan0\x00', {0xff}, {}, 0x3b, 0xffffffffffffab69, 0x2, 0x30}, 0x0, 0x250, 0x298, 0x0, {}, [@common=@srh={0x30, 'srh\x00', 0x0, {0xbb, 0x1, 0x3, 0x6, 0xffffffffffffffc0, 0x80}}, @common=@inet=@policy={0x158, 'policy\x00', 0x0, {[{@ipv4, [0xffffffff, 0xff0000ff, 0xff000000, 0xffffffff], @ipv4=@multicast1=0xe0000001, [0xffffffff, 0xffffffff, 0xff000000, 0xffffff00], 0x4d5, 0x3500, 0x5c, 0x0, 0x10, 0xf}, {@ipv6=@dev={0xfe, 0x80, [], 0x11}, [0x0, 0xff000000, 0xff0000ff, 0xffffff00], @ipv4=@multicast1=0xe0000001, [0xffffffff, 0x0, 0x0, 0xffffffff], 0x4d5, 0x3500, 0x77, 0x1, 0x0, 0x1d}, {@ipv6=@mcast1={0xff, 0x1, [], 0x1}, [0xff000000, 0xffffffff, 0xffffff00, 0xff], @ipv4=@multicast2=0xe0000002, [0xffffffff, 0x0, 0xffffff00, 0xffffffff], 0x4d3, 0x3503, 0x7f, 0x0, 0x1, 0x19}, {@ipv4=@local={0xac, 0x14, 0x14, 0xaa}, [0x0, 0xff, 0x0, 0xff0000ff], @ipv6=@local={0xfe, 0x80, [], 0xaa}, [0xffffffff, 0xffffffff, 0xff, 0xff0000ff], 0x4d4, 0x3505, 0x0, 0x1, 0x1f, 0x10}], 0x0, 0x3}}]}, @common=@unspec=@LED={0x48, 'LED\x00', 0x0, {'syz1\x00', 0x0, 0x8, 0x8}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28, '\x00', 0x0, 0xfffffffffffffffe}}}}, 0x600) socket(0x1, 0xa, 0x0) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_TIMER(r4, 0x40605346, &(0x7f0000000680)={0x1, 0x3, {0x3, 0x0, 0x9, 0x3}}) 2018/03/30 23:06:29 executing program 7: perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f00000000c0)='./control\x00', 0x0) r0 = inotify_init() inotify_add_watch(r0, &(0x7f0000000040)='./control\x00', 0x3) r1 = inotify_init1(0x0) inotify_add_watch(r1, &(0x7f000001eff6)='./control\x00', 0x2000200) inotify_init() setsockopt$inet6_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, &(0x7f0000000080)="5fce869db66fa225921ad03d773be4ff", 0x10) rmdir(&(0x7f000075aff6)='./control\x00') 2018/03/30 23:06:29 executing program 4: mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount(&(0x7f000000a000)='./file0\x00', &(0x7f0000026ff8)='./file0\x00', &(0x7f000000c000)='ramfs\x00', 0x0, &(0x7f000000a000)) mkdir(&(0x7f0000000000)='./file1\x00', 0x0) mount(&(0x7f00000001c0)='.', &(0x7f0000000240)='.', &(0x7f0000000280)='openpromfs\x00', 0x1200048, &(0x7f00000002c0)="98b028ff1724355a709386c800dbe9e8579553d25d90c6b15401160929fbc741021add4922faf71796844f070cbed56a2ccb10d45f32fef5677861ac3aa0760bd89f317200cf42040fb2e9c4b329be43692da8e3f423a63cfe93b307eaea270707d02ce502") mount(&(0x7f0000000040)='./file0\x00', &(0x7f0000903000)='./file0\x00', &(0x7f0000811ffa)='bdev\x00', 0x100000, &(0x7f00000003c0)="b4654e059fcebd03cc73f9239f6a07ed22ce66385d2337eef2a66d904034c83627a12afc1ecb8d7e1142c51440c631a77475529f58d06474cd08984ca20eda40006f352aef263558961ab3f1ff300b08a5b54aea2a56162623142af3cce1057c8ee9eb15dc98e01846afc544b424ae134364f0ff76c92d9ce550f032a00c5981d459112f5c70789ed3bbb5527400465c6a98b4e0432a1ca8ce37dfdc7619e8b4129ee976c9b944bc6b366dbc5f0dae558fa30da2267dfccc6187d2d6f34d725343470a748007fee97ba3784d030b833463699073719ca14a0e9b6d74a70db8b216256fcd74c66a0faac2ccc16c74a7e13289091a5256dd062edf07ff4d9168e49b0820c6bb9fbabc587b54dacb9834b644eafefc1e0a4dd249c45cac5858364765a08967ed59ac86aefcb7d13e3e9cdf7c7262122bc4cfd718c3fd984395afa896d48a48489f889bd4efac7267dffdff0c686fae") r0 = dup(0xffffffffffffffff) r1 = syz_open_dev$vcsn(&(0x7f00000000c0)='/dev/vcs#\x00', 0x2, 0x20800) renameat(r0, &(0x7f0000000080)='./file1/file0\x00', r1, &(0x7f0000000100)='./file1\x00') mount(&(0x7f0000fb6000)='./file0\x00', &(0x7f0000d78000)='.', &(0x7f0000fdb000)='ubifs\x00', 0x1003, 0x0) mount(&(0x7f0000000180)='./file0\x00', &(0x7f0000000140)='.', &(0x7f0000000200)='anon_inodefs\x00', 0x2000, &(0x7f0000000240)) ioctl$TIOCMBIS(r1, 0x5416, &(0x7f0000000340)=0x7) mount(&(0x7f0000adcff8)='./file0\x00', &(0x7f0000e08fff)='.', &(0x7f00005e9000)='cifs\x00', 0x2000, &(0x7f0000ad5000)) [ 338.347494] kernel msg: ebtables bug: please report to author: entries_size too small 2018/03/30 23:06:29 executing program 6: pipe(&(0x7f0000000940)={0xffffffffffffffff, 0xffffffffffffffff}) accept4$ax25(r0, 0x0, &(0x7f0000000080), 0x80000) r1 = socket$inet(0x2, 0x20000000000003, 0x2) connect$inet(r1, &(0x7f0000000000)={0x2, 0x0, @remote={0xac, 0x14, 0x14, 0xbb}}, 0x10) sendmsg(0xffffffffffffffff, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000140), 0x0, &(0x7f0000000180)=ANY=[]}, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000980)=@broute={'broute\x00', 0x20, 0x3, 0x2d9, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000380], 0x0, &(0x7f00000002c0), &(0x7f0000001000)=ANY=[@ANYBLOB="00000000000000000000000000000000000000000000000000000000000000000000000000000000feffffff0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000ffffffff010000000b00000008000000600469666230000000000000000000000000736974300000000000000000000000007663616e300000000000000000000000626f6e643000000000000000000000000180c200000e00ffff00ffffaaaaaaaaaaaaffffff0000ff000008010000d001000048020000706879736465760000000000000000000000000000000000000000000000000070000000000000006e723000000000000000000000000000000000000000000000000000000000000000000000000000000000000000766c616e300000003a9c4ebb9f24dc06a52c000000000000000000000000000000000000000000ff0000000000000000000000000000000101000000000000000000000000000000000000004c45440000000000000000000000000000000000000000000000000000000000280000000000000073797a310000000000000000000000000000000000000000000000004000000000000000000000004e464c4f470000000000000000000000000000000000000000000000000000005000000000000000000000000000000000000000692ef8a72c6779a914df06a44b35b0eafd833141b590148ad8c2d17b06e81aa50bc466307f618025cda16029da79ca01cd7bf2fa8433c6000000004e464c4f470000000000000000000000000000000000000000000000000000005000000000000000000000000000000000000000f7040c3bd532a607b6540847e9980255ac80a05048ee3c578fd00c809822ab1ff7d12707561fdd7b1bcbd7c428bd7449152a676a0e0fc0823ebe89b10758fffe5c92f48f0000000000000000000000000000000000000000000000000000000000000000000000000000000001000000fcffffff"]}, 0x351) setsockopt$inet_int(r1, 0x0, 0x2, &(0x7f00000000c0)=0x7fffffff, 0x4) r2 = socket$rds(0x15, 0x5, 0x0) pipe(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$bt_BT_DEFER_SETUP(r3, 0x112, 0x7, &(0x7f0000000280)=0x100, 0x4) accept$packet(r4, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @remote}, &(0x7f0000000100)=0x14) connect$rds(r2, &(0x7f0000000140)={0x2, 0x4e22, @remote={0xac, 0x14, 0x14, 0xbb}}, 0x10) getsockopt$sock_buf(r2, 0x1, 0x3b, &(0x7f0000000180)=""/83, &(0x7f0000000200)=0x53) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000a00)=@filter={'filter\x00', 0xe, 0x4, 0x5a0, 0xffffffff, 0x0, 0xf0, 0xf0, 0xffffffff, 0xffffffff, 0x4d0, 0x4d0, 0x4d0, 0xffffffff, 0x4, &(0x7f0000000300), {[{{@ipv6={@ipv4={[], [0xff, 0xff], @rand_addr=0x80000001}, @dev={0xfe, 0x80, [], 0x16}, [0x0, 0xffffff00, 0xff, 0xffffffff], [0x0, 0xff000000, 0xffffffff], 'ipddp0\x00', 'ip_vti0\x00', {}, {0xff}, 0x6c, 0x2bf}, 0x0, 0xc8, 0xf0}, @REJECT={0x28, 'REJECT\x00', 0x0, {0x7}}}, {{@ipv6={@remote={0xfe, 0x80, [], 0xbb}, @remote={0xfe, 0x80, [], 0xbb}, [0xff000000, 0xffffffff, 0xffffff00, 0xff], [0xff, 0xffffffff, 0x0, 0xff000000], 'syzkaller1\x00', 'eql\x00', {}, {}, 0x62, 0x0, 0x4, 0x1}, 0x0, 0x120, 0x148, 0x0, {}, [@common=@frag={0x30, 'frag\x00', 0x0, {0x7ff, 0x7, 0x1, 0x2}}, @common=@hl={0x28, 'hl\x00', 0x0, {0x3, 0x7fff}}]}, @REJECT={0x28, 'REJECT\x00', 0x0, {0x7}}}, {{@ipv6={@dev={0xfe, 0x80, [], 0xc}, @loopback={0x0, 0x1}, [0xffffffff, 0xffffffff, 0xff000000, 0xff000000], [0xff, 0x0, 0xff, 0xffffff00], 'irlan0\x00', 'vcan0\x00', {0xff}, {}, 0x3b, 0xffffffffffffab69, 0x2, 0x30}, 0x0, 0x250, 0x298, 0x0, {}, [@common=@srh={0x30, 'srh\x00', 0x0, {0xbb, 0x1, 0x3, 0x6, 0xffffffffffffffc0, 0x80}}, @common=@inet=@policy={0x158, 'policy\x00', 0x0, {[{@ipv4, [0xffffffff, 0xff0000ff, 0xff000000, 0xffffffff], @ipv4=@multicast1=0xe0000001, [0xffffffff, 0xffffffff, 0xff000000, 0xffffff00], 0x4d5, 0x3500, 0x5c, 0x0, 0x10, 0xf}, {@ipv6=@dev={0xfe, 0x80, [], 0x11}, [0x0, 0xff000000, 0xff0000ff, 0xffffff00], @ipv4=@multicast1=0xe0000001, [0xffffffff, 0x0, 0x0, 0xffffffff], 0x4d5, 0x3500, 0x77, 0x1, 0x0, 0x1d}, {@ipv6=@mcast1={0xff, 0x1, [], 0x1}, [0xff000000, 0xffffffff, 0xffffff00, 0xff], @ipv4=@multicast2=0xe0000002, [0xffffffff, 0x0, 0xffffff00, 0xffffffff], 0x4d3, 0x3503, 0x7f, 0x0, 0x1, 0x19}, {@ipv4=@local={0xac, 0x14, 0x14, 0xaa}, [0x0, 0xff, 0x0, 0xff0000ff], @ipv6=@local={0xfe, 0x80, [], 0xaa}, [0xffffffff, 0xffffffff, 0xff, 0xff0000ff], 0x4d4, 0x3505, 0x0, 0x1, 0x1f, 0x10}], 0x0, 0x3}}]}, @common=@unspec=@LED={0x48, 'LED\x00', 0x0, {'syz1\x00', 0x0, 0x8, 0x8}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28, '\x00', 0x0, 0xfffffffffffffffe}}}}, 0x600) socket(0x1, 0xa, 0x7) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_TIMER(0xffffffffffffffff, 0x40605346, &(0x7f0000000680)={0x1, 0x3, {0x3, 0x0, 0x9, 0x3}}) 2018/03/30 23:06:29 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f00000000c0)={'syz_tun\x00', &(0x7f0000000040)=@ethtool_ts_info={0x41}}) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) 2018/03/30 23:06:29 executing program 5: mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) perf_event_open(&(0x7f0000223000)={0x2, 0x78, 0xe3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000001980)={{{@in6=@remote, @in=@multicast1}}, {{@in=@multicast2}, 0x0, @in=@multicast2}}, &(0x7f0000001a80)=0xe8) mount(&(0x7f00000003c0)='./file0\x00', &(0x7f0000000380)='./file0\x00', &(0x7f0000000300)='cgroup2\x00', 0x0, 0x0) r0 = open$dir(&(0x7f000001bff4)='./file0\x00', 0x0, 0x0) mkdirat(0xffffffffffffffff, &(0x7f0000000280)='./file0\x00', 0x20) unlinkat(r0, &(0x7f0000000080)='./file0\x00', 0x200) 2018/03/30 23:06:29 executing program 0 (fault-call:7 fault-nth:39): mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r0 = syz_open_dev$usbmon(&(0x7f0000000400)='/dev/usbmon#\x00', 0x0, 0x0) r1 = perf_event_open(&(0x7f0000223000)={0x2, 0x78, 0xe3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000001980)={{{@in6=@remote, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast2}, 0x0, @in=@multicast2}}, &(0x7f0000001a80)=0xe8) chown(&(0x7f00000004c0)='./file0\x00', r2, 0x0) mount(&(0x7f00000003c0)='./file0\x00', &(0x7f0000000380)='./file0\x00', &(0x7f0000000300)='cgroup2\x00', 0x0, 0x0) r3 = open$dir(&(0x7f000001bff4)='./file0\x00', 0x0, 0x0) mkdirat(r3, &(0x7f0000000280)='./file0\x00', 0x20) getdents64(r3, &(0x7f00000007c0)=""/250, 0x1015a) dup3(r0, r1, 0x80000) r4 = open$dir(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) renameat2(r4, &(0x7f0000000200)='./file1\x00', 0xffffffffffffffff, &(0x7f0000000240)='./file0\x00', 0xfd1092750066ec78) ioctl$KDGKBMODE(0xffffffffffffffff, 0x4b44, &(0x7f0000000140)) [ 338.483723] kernel msg: ebtables bug: please report to author: entries_size too small [ 338.579427] FAULT_INJECTION: forcing a failure. [ 338.579427] name failslab, interval 1, probability 0, space 0, times 0 [ 338.591121] CPU: 0 PID: 26633 Comm: syz-executor0 Not tainted 4.16.0-rc7+ #372 [ 338.598501] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 338.607863] Call Trace: [ 338.610470] dump_stack+0x194/0x24d [ 338.614124] ? arch_local_irq_restore+0x53/0x53 [ 338.618832] should_fail+0x8c0/0xa40 [ 338.622571] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 338.627703] ? trace_hardirqs_off+0x10/0x10 [ 338.632057] ? find_held_lock+0x35/0x1d0 [ 338.636134] ? __lock_is_held+0xb6/0x140 [ 338.640199] ? check_same_owner+0x320/0x320 [ 338.644508] ? rcu_note_context_switch+0x710/0x710 [ 338.649434] should_failslab+0xec/0x120 [ 338.653404] kmem_cache_alloc_trace+0x4b/0x740 [ 338.657982] blkcg_css_alloc+0xc8/0x6b0 [ 338.661951] ? blkcg_deactivate_policy+0x430/0x430 [ 338.666869] ? __lock_is_held+0xb6/0x140 [ 338.670926] cgroup_apply_control_enable+0x44d/0xbc0 [ 338.676042] ? cgroup_propagate_control+0x570/0x570 [ 338.681074] ? css_populate_dir+0x289/0x420 [ 338.685422] cgroup_mkdir+0x56f/0xfc0 [ 338.689218] ? __lock_is_held+0xb6/0x140 [ 338.693282] ? cgroup_destroy_locked+0x750/0x750 [ 338.698039] ? rcu_read_lock_sched_held+0x108/0x120 [ 338.703062] ? kmem_cache_free+0x258/0x2a0 [ 338.707295] ? set_nlink+0xc1/0x160 [ 338.710929] ? debug_lockdep_rcu_enabled+0x77/0x90 [ 338.715853] ? generic_permission+0x105/0x3c0 [ 338.720338] ? cgroup_destroy_locked+0x750/0x750 [ 338.725094] kernfs_iop_mkdir+0x153/0x1e0 [ 338.729244] vfs_mkdir+0x390/0x600 [ 338.732798] SyS_mkdirat+0x22b/0x2b0 [ 338.736525] ? SyS_mknod+0x480/0x480 [ 338.740244] ? trace_hardirqs_on+0xd/0x10 [ 338.744404] ? do_syscall_64+0xb7/0x940 [ 338.748393] ? SyS_mknod+0x480/0x480 [ 338.752112] do_syscall_64+0x281/0x940 [ 338.756003] ? vmalloc_sync_all+0x30/0x30 [ 338.760155] ? _raw_spin_unlock_irq+0x27/0x70 [ 338.764637] ? finish_task_switch+0x1c1/0x7e0 [ 338.769117] ? syscall_return_slowpath+0x550/0x550 [ 338.774037] ? syscall_return_slowpath+0x2ac/0x550 [ 338.778950] ? prepare_exit_to_usermode+0x350/0x350 [ 338.783953] ? entry_SYSCALL_64_after_hwframe+0x52/0xb7 [ 338.789304] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 338.794136] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 338.799308] RIP: 0033:0x454e79 [ 338.802480] RSP: 002b:00007f016b92fc68 EFLAGS: 00000246 ORIG_RAX: 0000000000000102 [ 338.810174] RAX: ffffffffffffffda RBX: 00007f016b9306d4 RCX: 0000000000454e79 [ 338.817424] RDX: 0000000000000020 RSI: 0000000020000280 RDI: 0000000000000015 2018/03/30 23:06:30 executing program 7: mkdir(&(0x7f00000000c0)='./control\x00', 0x0) r0 = inotify_init() inotify_add_watch(r0, &(0x7f0000000000)='./control\x00', 0x220000000009) r1 = inotify_init1(0x0) inotify_add_watch(r1, &(0x7f000001eff6)='./control\x00', 0x2000200) r2 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000800)='/dev/vga_arbiter\x00', 0x480000, 0x0) ioctl$SNDRV_CTL_IOCTL_PCM_PREFER_SUBDEVICE(r2, 0x40045532, &(0x7f0000000840)=0x6) setsockopt$inet6_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, &(0x7f0000000080)="a4ce869db66fa2259213d03d773bc4ff", 0xffffffffffffff47) mount(&(0x7f0000000880)='./control\x00', &(0x7f0000000900)='./control\x00', &(0x7f0000000940)='afs\x00', 0x40000, 0x0) rmdir(&(0x7f00000008c0)='./control\x00') r3 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r3, &(0x7f00000007c0)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f0000000780)={&(0x7f0000000100)={0x658, 0x12, 0x7, 0x8, 0x70bd25, 0x25dfdbff, {0x7, 0x0, 0x3}, [@generic="d73ce802922740c7b18d7a6a417777ab296c6425f8782123f5f844634249efb278a0b38e84ef1c30e5c439917df434ca7cee", @nested={0xd4, 0x14, [@generic="2d85da96026dbc8dbe9ff6b0135d06bbd231e62d65162bc2d8d4b4272b9bd3ff986ded8aad9ec70f7eeb1e2fecf2275c978a78dabcf3486e53f48e298bb2cd745cd2ddc229cc05906080ee3f3e70ceac0e709507b7f644c031d6edc9aacd8eb272d99a39c9ca0ae3445af0e8abc626e2af522986835881fdae7cda4c6e9468f073f82090f1e08b0846095cdd244bbe1cd9eda54cebf516a244d3dd690dd2dffdfa333800163515b85b5a6a227fa380941a18225c85876225c2011c35ab0622f2a7fe248fe6e58c6e90cfa2d956"]}, @nested={0x1c0, 0x28, [@generic="2df50ca75a8a46e0e2917597e759b618c0d612cb388c1b44", @typed={0x24, 0x8d, @binary="cc35c0964b53e20dde9fba6d50ee15d2213a5f3572469665b2f5c2bbcaaf"}, @generic="486912674d5c88759f7686374dd64a9468f02546fe2b4318c66c7fbf296379270b608295f539431a279a7c6cf0a0cb3ba1be2f559dbd3904b6880627265a7ef38981a8f6f81198b07b2ed9e471abf03366a84e923deb68095db6ba644b6aeea8b69ad1859797d6af90d9b30e6e6122cf627ba7e4b833bdf2874bdfac6c0c2dfe96b81eb8a29aeaaecb0c3dda4b63258499d0c2c49fbe5a2a0e", @generic="eba896a9acbea8b7e2e81b11db98e0df9ee7a4f513ee12237722e0a9b9746a4f7f51321d6b17dc9c0afae2afe7fe69bf2d5ab64531d82cb093a8143cd2564cb8bce0d7b7124e7acb4a58c65cb48acaf960544a8be190b0d5de88f8a9cb6366c1dbcf87e456a0910dae2f98f8da35896d582a54e911bf143bd4b28180edc1997b3092398cde58a39ee6b1b9c707e29d658363f5f61c3f2afe844853b13fe2136d541fdf04ba6eecb53034bfa6c14447a61ed76ddcf94453d9dc2576aedb3e06ad9899d78c066540bc80c79806d06c35a5837b56", @typed={0x14, 0x45, @ipv6=@remote={0xfe, 0x80, [], 0xbb}}]}, @typed={0x8, 0x62, @ipv4=@multicast2=0xe0000002}, @nested={0x240, 0x3a, [@generic="4daa52e1f38c3e13c7150df3134b429b5ed8882435f259d6c3d4545ccf8f6efbe1686c7492d9465cbaea56385e04620b430814c034c1bb74ac5c757ddb87f0ca4156e5d7c68a423d9c976788242fd360e893be49518ab2a622df607b37a76892eda7dd4dbfd94ccb1696ff50add338aff96e6ede353af33664b4258307d0bc95892a4a6fb3f2627e7aff84df30f2", @generic="6b99db3605826f8dfbcac6a82325f8f942ff79b67b8ea481a22f2bb7b28a7ee19127f36bac32028226401a63efe0334b95e7b5687c0ef690c770b5450caca135649a162461765483e32e3f7d2cac3ee7c4e05f734f2b5e09fda2624151a82795418d7b64746b1d4868d38e93cc2d7537fb7f1312fe3fd3ba199fd41f7539bfa0e65ace0fcc70afbeb848749b61de7f86c7e1e5dbef56a540b27c0af7a1140692b718fc4e46e7b5beddb9b8b406e81b3e01", @typed={0x10, 0x91, @binary="36fa3f93642c05b1e403648e"}, @generic="0158e6f3721f43bdcd5ecd5d9e4fb9880d39df5e4a7b09b8b9e69fb9", @generic="8c133fc0f7b0d1d9172853a08a738796d2909ae46cc6906bda316d1cb190d93045b5b75da2354ec5a76b3183be3e5065b2dc1423ee7050bf9fb3038075eff9cb2d10bb67886906da3af357d26d0ed10a0a97baf4fc8f62e48ec1eaf2ea6620e5b182755a488053b7e588d8bedca7e6bd6f0c9820cb92efa18ce74210b5aec1fef4bfa26c502c70e8f2cc5d78e1bf3c286d8efd80815daaf7a2415859a45daa28f59918724e15e51794350d167a094995454fd9db1e5f471eceb2", @typed={0x14, 0x89, @ipv6=@remote={0xfe, 0x80, [], 0xbb}}]}, @nested={0x4, 0x7c}, @generic="908c80aa979c8af3b2b87409d5cb77274ffd898d3db60df83d22162ca3adb52f4d9b81514aa768f2bfb8a42172a316589ca7da3fb3e77d4b932cfc74d509f3ea17a1cb3ab8e69a4ce90e1436d0fd13ae188baeae1c76", @typed={0x70, 0x89, @binary="e48bbd8bc80d0ff9f6e329e11eb1e0ea837db6db172e0d5e8d504c8b86f81bdae4f41681d875b86f2d4b08d2c2f68d1167778a85baad5341b44d706466a5c4e1741701f9ecec921c8e5a2e6aa2b184182fbd19c5d4ef1a4263d1b53651f129ab722deb31be97dc5e79"}, @generic="e67d42d07eddb4cdf391ac0bbd675035251bde3ba6c514847a802eb997836afeec77d5c27c851a0523277e41027d6e9ed8c3fad59dc55291530563e785679737ed213a4622bd02b7a516af9df1f18c2f2275a0969c88bc297398841dc5aed2d5e5ec2251", @typed={0x8, 0x17, @u32}]}, 0x658}, 0x1, 0x0, 0x0, 0x1}, 0x80) 2018/03/30 23:06:30 executing program 4: mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount(&(0x7f000000a000)='./file0\x00', &(0x7f0000026ff8)='./file0\x00', &(0x7f000000c000)='ramfs\x00', 0x0, &(0x7f000000a000)) mkdir(&(0x7f0000000000)='./file1\x00', 0x0) mount(&(0x7f0000000040)='./file0\x00', &(0x7f0000903000)='./file0\x00', &(0x7f0000811ffa)='bdev\x00', 0x100000, &(0x7f00000003c0)="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") r0 = dup(0xffffffffffffffff) r1 = syz_open_dev$vcsn(&(0x7f00000000c0)='/dev/vcs#\x00', 0x2, 0x20800) renameat(r0, &(0x7f0000000080)='./file1/file0\x00', r1, &(0x7f0000000100)='./file1\x00') mount(&(0x7f0000fb6000)='./file0\x00', &(0x7f0000d78000)='.', &(0x7f0000fdb000)='ubifs\x00', 0x1003, 0x0) mount(&(0x7f00002b9ff8)='./file0\x00', &(0x7f0000cbeff8)='./file0\x00', &(0x7f00005f7ffa)='ramfs\x00', 0x80000, &(0x7f000002f000)) mount(&(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)='./file1\x00', &(0x7f0000000200)='anon_inodefs\x00', 0x2000, &(0x7f0000000240)) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r1, 0x84, 0x6f, &(0x7f0000000240)={0x0, 0x10, &(0x7f0000000140)=[@in={0x2, 0x4e23, @remote={0xac, 0x14, 0x14, 0xbb}}]}, &(0x7f0000000280)=0x10) setsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(r0, 0x84, 0x1f, &(0x7f00000002c0)={r2, @in={{0x2, 0x4e21, @multicast2=0xe0000002}}, 0x6e5, 0x7}, 0x90) mount(&(0x7f0000adcff8)='./file0\x00', &(0x7f0000e08fff)='.', &(0x7f00005e9000)='cifs\x00', 0x2000, &(0x7f0000ad5000)) 2018/03/30 23:06:30 executing program 2: perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f00000000c0)='./control\x00', 0x0) inotify_init() r0 = syz_open_dev$sg(&(0x7f000028fff7)='/dev/sg#\x00', 0x0, 0x0) ioctl(r0, 0x4000000000001276, &(0x7f0000000040)) msgget(0x2, 0x0) getsockopt$nfc_llcp(0xffffffffffffffff, 0x118, 0x4, &(0x7f0000000740)=""/223, 0xdf) setsockopt$inet_mreq(r0, 0x0, 0x23, &(0x7f00000002c0)={@empty, @remote={0xac, 0x14, 0x14, 0xbb}}, 0x8) accept4$nfc_llcp(0xffffffffffffffff, &(0x7f0000000940), &(0x7f0000000080)=0x60, 0x800) ioctl$SNDRV_CTL_IOCTL_ELEM_INFO(0xffffffffffffffff, 0xc1105511, &(0x7f0000000100)={{0x0, 0x0, 0x0, 0x0, "386aea20273dc03c3d18dd0dbd4a0ca15f9f580393cc4ec3b8ee256b9aa630224ba64c6ff43ee01d2996c914"}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "eda422cd37591b3a5a7a683380f7e0b9e790c6b72cd0a4f3342f7431c1699a305ca3091bb2320e8df4e298a2cca26637866a68c1426ffbd8a6c7da1d8ea77d9d", &(0x7f00000000c0)='/dev/snd/controlC#\x00', 0x13}) r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000003c0)='/proc/self/net/pfkey\x00', 0x800, 0x0) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) add_key$user(&(0x7f0000000480)='user\x00', &(0x7f00000004c0)={0x73, 0x79, 0x7a, 0x3}, &(0x7f0000000500)="d3238eea76b0470531092a0a77b0b49789a0fc97b8f8b9e23a2a5a5a0c169ed6e83480b4801dbf79db3527904ee3128c05ce2806e210237c36b88ceabe99d8784860e5d0e91fe33d38d0133e056cdd1e2910d57fc5eb1b23db3b60a7077ff33bb6c7445cd258ee25f9187269c22d1ed05acb2b9b599bd285b692257a631754ab9befebd3fdb3167361c24c5c5dcf90e476e052b9d22362c57878cb7205fe361346d6beb77b7844fe94", 0xa9, 0xfffffffffffffffe) ioctl$sock_inet_SIOCSIFADDR(r0, 0x8916, &(0x7f0000000300)={'gretap0\x00', {0x2, 0x4e24, @loopback=0x7f000001}}) keyctl$instantiate_iov(0x14, 0x0, &(0x7f0000000780)=[{&(0x7f0000000840)="edb4a01f68d76905035a4ebdd427d31585a5a650581902b1c077f74ca8f1ce7d3e2f6e1c6760433af9664b3f3bebab3a1a1c4ef86f42c39b758accc1e7637bb18d28248dc7a1719b73388830b162613b17fd02220bd1fe2ad86adb96efcfc672d126ae58f745fba0e7534cdbae947449df767bd76a0c38b5752dcd13f7065edea86dc156c0708e76c2c99a94a95f1e93ff73cb3eb94e06d399cf48aaac7963d13e4b3a6b32bc2b19d5461545dcf3f71bb24442d286421f8d891d77a3c4c1c9435bbdf187682c22ded22b669b7790d05b4894166a2d5f33098cf908a23a2e0671d824e88942fbe0bd1416", 0xea}], 0x1, 0x0) r3 = ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) ioctl$KVM_UNREGISTER_COALESCED_MMIO(r3, 0x4010ae68, &(0x7f0000000000)={0x0, 0x5000}) ioctl$KVM_CREATE_PIT2(r3, 0x4040ae77, &(0x7f0000000440)={0xfffffffffffffff7}) ioctl$KVM_CREATE_VCPU(r3, 0xae41, 0x0) setsockopt$inet_tcp_TCP_ULP(r1, 0x6, 0x1f, &(0x7f0000000280)='tls\x00', 0x4) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000005fd8)={'vcan0\x00'}) socket$can_raw(0x1d, 0x3, 0x1) socket$inet6(0xa, 0x0, 0x0) syz_open_dev$dspn(&(0x7f0000000040)='/dev/dsp#\x00', 0x0, 0x0) 2018/03/30 23:06:30 executing program 3: r0 = perf_event_open(&(0x7f0000940000)={0x2, 0x78, 0xfffffffffffffffd}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x5, 0x3, &(0x7f0000346fc8)=ANY=[@ANYBLOB="1800000000dd000000000000950000000000000000000000"], &(0x7f00000001c0)='GPL\x00', 0xfffffffffffffffc, 0xfb, &(0x7f0000000080)=""/251}, 0x48) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0x40042408, r1) socketpair(0x1e, 0x5, 0x0, &(0x7f0000000180)) 2018/03/30 23:06:30 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x200, 0x0) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000680)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$sock_linger(r2, 0x1, 0xd, &(0x7f00000006c0)={0x400, 0x9}, 0x8) perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x0, 0x0) r3 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) mmap(&(0x7f0000000000/0x9d7000)=nil, 0x9d7000, 0x0, 0x10, 0xffffffffffffffff, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x7) perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r4 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r4, &(0x7f0000e5b000)={0x2, 0x4e20, @multicast1=0xe0000001}, 0x10) syz_open_dev$sg(&(0x7f0000000440)='/dev/sg#\x00', 0x0, 0x0) connect$inet(r4, &(0x7f0000000100)={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x11}}, 0x10) r5 = bpf$PROG_LOAD(0x5, &(0x7f0000eb0fb8)={0x1, 0x3, &(0x7f00009ff000)=@framed={{0x18}, [], {0x95}}, &(0x7f00002bf000)='syzkaller\x00', 0x4, 0xb7, &(0x7f00006ab000)=""/183}, 0x48) setsockopt$inet_tcp_int(r4, 0x6, 0x19, &(0x7f0000000240)=0x8, 0x4) r6 = socket$kcm(0x29, 0x2, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r6, 0x89e0, &(0x7f000031aff8)={r4, r5}) ioctl$sock_kcm_SIOCKCMCLONE(r6, 0x89e2, &(0x7f00000002c0)={0xffffffffffffffff}) sendmsg$nl_xfrm(r7, &(0x7f0000000780)={&(0x7f0000000200)={0x10}, 0xc, &(0x7f0000000740)={&(0x7f0000000480)=@updpolicy={0xb8, 0x19, 0x0, 0x0, 0x0, {{@in=@loopback=0x7f000001, @in6=@mcast1={0xff, 0x1, [], 0x1}}}}, 0xffcb}, 0x1}, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(r7, 0x89e1, &(0x7f0000000040)={r4}) r8 = fcntl$getown(r3, 0x9) recvfrom$inet6(r1, &(0x7f0000000140)=""/177, 0xb1, 0x40000000, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @empty, 0xe38}, 0x1c) r9 = accept4$inet(0xffffffffffffff9c, &(0x7f0000000700)={0x0, 0x0, @broadcast}, &(0x7f0000000740)=0x10, 0x80000) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r9, 0x84, 0x64, &(0x7f0000000780)=[@in6={0xa, 0x4e22, 0xfffffffffffff7e1, @mcast2={0xff, 0x2, [], 0x1}, 0x8}, @in={0x2, 0x4e24, @broadcast=0xffffffff}], 0x2c) ptrace$setregset(0x4205, r8, 0x0, &(0x7f00000005c0)={&(0x7f0000000080)}) ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r10 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x1fffd, 0x0) r11 = syz_open_dev$sndtimer(&(0x7f00000000c0)='/dev/snd/timer\x00', 0x0, 0x0) read(r11, &(0x7f0000ec6000)=""/50, 0x32) fcntl$dupfd(r11, 0x0, r10) 2018/03/30 23:06:30 executing program 6: pipe(&(0x7f0000000940)={0xffffffffffffffff, 0xffffffffffffffff}) accept4$ax25(r0, 0x0, &(0x7f0000000080), 0x80000) r1 = socket$inet(0x2, 0x20000000000003, 0x2) connect$inet(r1, &(0x7f0000000000)={0x2, 0x0, @remote={0xac, 0x14, 0x14, 0xbb}}, 0x10) sendmsg(0xffffffffffffffff, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000140), 0x0, &(0x7f0000000180)=ANY=[]}, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000980)=@broute={'broute\x00', 0x20, 0x3, 0x2d9, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000380], 0x0, &(0x7f00000002c0), &(0x7f0000001000)=ANY=[@ANYBLOB="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"]}, 0x351) setsockopt$inet_int(r1, 0x0, 0x2, &(0x7f00000000c0)=0x7fffffff, 0x4) r2 = socket$rds(0x15, 0x5, 0x0) pipe(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$bt_BT_DEFER_SETUP(r3, 0x112, 0x7, &(0x7f0000000280)=0x100, 0x4) accept$packet(r4, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @remote}, &(0x7f0000000100)=0x14) connect$rds(r2, &(0x7f0000000140)={0x2, 0x4e22, @remote={0xac, 0x14, 0x14, 0xbb}}, 0x10) getsockopt$sock_buf(r2, 0x1, 0x3b, &(0x7f0000000180)=""/83, &(0x7f0000000200)=0x53) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000a00)=@filter={'filter\x00', 0xe, 0x4, 0x5a0, 0xffffffff, 0x0, 0xf0, 0xf0, 0xffffffff, 0xffffffff, 0x4d0, 0x4d0, 0x4d0, 0xffffffff, 0x4, &(0x7f0000000300), {[{{@ipv6={@ipv4={[], [0xff, 0xff], @rand_addr=0x80000001}, @dev={0xfe, 0x80, [], 0x16}, [0x0, 0xffffff00, 0xff, 0xffffffff], [0x0, 0xff000000, 0xffffffff], 'ipddp0\x00', 'ip_vti0\x00', {}, {0xff}, 0x6c, 0x2bf}, 0x0, 0xc8, 0xf0}, @REJECT={0x28, 'REJECT\x00', 0x0, {0x7}}}, {{@ipv6={@remote={0xfe, 0x80, [], 0xbb}, @remote={0xfe, 0x80, [], 0xbb}, [0xff000000, 0xffffffff, 0xffffff00, 0xff], [0xff, 0xffffffff, 0x0, 0xff000000], 'syzkaller1\x00', 'eql\x00', {}, {}, 0x62, 0x0, 0x4, 0x1}, 0x0, 0x120, 0x148, 0x0, {}, [@common=@frag={0x30, 'frag\x00', 0x0, {0x7ff, 0x7, 0x1, 0x2}}, @common=@hl={0x28, 'hl\x00', 0x0, {0x3, 0x7fff}}]}, @REJECT={0x28, 'REJECT\x00', 0x0, {0x7}}}, {{@ipv6={@dev={0xfe, 0x80, [], 0xc}, @loopback={0x0, 0x1}, [0xffffffff, 0xffffffff, 0xff000000, 0xff000000], [0xff, 0x0, 0xff, 0xffffff00], 'irlan0\x00', 'vcan0\x00', {0xff}, {}, 0x3b, 0xffffffffffffab69, 0x2, 0x30}, 0x0, 0x250, 0x298, 0x0, {}, [@common=@srh={0x30, 'srh\x00', 0x0, {0xbb, 0x1, 0x3, 0x6, 0xffffffffffffffc0, 0x80}}, @common=@inet=@policy={0x158, 'policy\x00', 0x0, {[{@ipv4, [0xffffffff, 0xff0000ff, 0xff000000, 0xffffffff], @ipv4=@multicast1=0xe0000001, [0xffffffff, 0xffffffff, 0xff000000, 0xffffff00], 0x4d5, 0x3500, 0x5c, 0x0, 0x10, 0xf}, {@ipv6=@dev={0xfe, 0x80, [], 0x11}, [0x0, 0xff000000, 0xff0000ff, 0xffffff00], @ipv4=@multicast1=0xe0000001, [0xffffffff, 0x0, 0x0, 0xffffffff], 0x4d5, 0x3500, 0x77, 0x1, 0x0, 0x1d}, {@ipv6=@mcast1={0xff, 0x1, [], 0x1}, [0xff000000, 0xffffffff, 0xffffff00, 0xff], @ipv4=@multicast2=0xe0000002, [0xffffffff, 0x0, 0xffffff00, 0xffffffff], 0x4d3, 0x3503, 0x7f, 0x0, 0x1, 0x19}, {@ipv4=@local={0xac, 0x14, 0x14, 0xaa}, [0x0, 0xff, 0x0, 0xff0000ff], @ipv6=@local={0xfe, 0x80, [], 0xaa}, [0xffffffff, 0xffffffff, 0xff, 0xff0000ff], 0x4d4, 0x3505, 0x0, 0x1, 0x1f, 0x10}], 0x0, 0x3}}]}, @common=@unspec=@LED={0x48, 'LED\x00', 0x0, {'syz1\x00', 0x0, 0x8, 0x8}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28, '\x00', 0x0, 0xfffffffffffffffe}}}}, 0x600) socket(0x1, 0xa, 0x7) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_TIMER(0xffffffffffffffff, 0x40605346, &(0x7f0000000680)={0x1, 0x3, {0x3, 0x0, 0x9, 0x3}}) 2018/03/30 23:06:30 executing program 0 (fault-call:7 fault-nth:40): mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r0 = syz_open_dev$usbmon(&(0x7f0000000400)='/dev/usbmon#\x00', 0x0, 0x0) r1 = perf_event_open(&(0x7f0000223000)={0x2, 0x78, 0xe3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000001980)={{{@in6=@remote, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast2}, 0x0, @in=@multicast2}}, &(0x7f0000001a80)=0xe8) chown(&(0x7f00000004c0)='./file0\x00', r2, 0x0) mount(&(0x7f00000003c0)='./file0\x00', &(0x7f0000000380)='./file0\x00', &(0x7f0000000300)='cgroup2\x00', 0x0, 0x0) r3 = open$dir(&(0x7f000001bff4)='./file0\x00', 0x0, 0x0) mkdirat(r3, &(0x7f0000000280)='./file0\x00', 0x20) getdents64(r3, &(0x7f00000007c0)=""/250, 0x1015a) dup3(r0, r1, 0x80000) r4 = open$dir(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) renameat2(r4, &(0x7f0000000200)='./file1\x00', 0xffffffffffffffff, &(0x7f0000000240)='./file0\x00', 0xfd1092750066ec78) ioctl$KDGKBMODE(0xffffffffffffffff, 0x4b44, &(0x7f0000000140)) 2018/03/30 23:06:30 executing program 5: mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) perf_event_open(&(0x7f0000223000)={0x2, 0x78, 0xe3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000001980)={{{@in6=@remote, @in=@multicast1}}, {{@in=@multicast2}, 0x0, @in=@multicast2}}, &(0x7f0000001a80)=0xe8) mount(&(0x7f00000003c0)='./file0\x00', &(0x7f0000000380)='./file0\x00', &(0x7f0000000300)='cgroup2\x00', 0x0, 0x0) r0 = shmget(0x3, 0x4000, 0x4, &(0x7f0000ffa000/0x4000)=nil) shmctl$SHM_INFO(r0, 0xe, &(0x7f00000000c0)=""/234) r1 = open$dir(&(0x7f000001bff4)='./file0\x00', 0x0, 0x0) mkdirat(0xffffffffffffffff, &(0x7f0000000280)='./file0\x00', 0x20) unlinkat(r1, &(0x7f0000000080)='./file0\x00', 0x200) open(&(0x7f0000000040)='./file0\x00', 0x8000, 0x2) [ 338.824675] RBP: 000000000072bea0 R08: 0000000000000000 R09: 0000000000000000 [ 338.831925] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000016 [ 338.839177] R13: 00000000000003eb R14: 00000000006f7ea8 R15: 0000000000000027 [ 338.894618] kernel msg: ebtables bug: please report to author: entries_size too small 2018/03/30 23:06:30 executing program 7: perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f00000000c0)='./control\x00', 0x0) r0 = open(&(0x7f0000000040)='./control/file0\x00', 0x40, 0x4c) ioctl$RNDADDTOENTCNT(r0, 0x40045201, &(0x7f00000001c0)=0x10000) r1 = inotify_init() inotify_add_watch(r1, &(0x7f0000f1eff6)='./control\x00', 0x220000000009) r2 = inotify_init1(0x0) inotify_add_watch(r2, &(0x7f0000000240)='./control\x00', 0x204) setsockopt$inet_sctp6_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000000140)=[@in6={0xa, 0x4e20, 0xffffffffffffff05, @ipv4={[], [0xff, 0xff], @local={0xac, 0x14, 0x14, 0xaa}}, 0x8000}, @in6={0xa, 0x4e22, 0x3ff, @ipv4={[], [0xff, 0xff], @dev={0xac, 0x14, 0x14, 0xe}}, 0x6}, @in6={0xa, 0x4e24, 0x40, @empty, 0x80000000}, @in={0x2, 0x4e20, @broadcast=0xffffffff}], 0x64) setsockopt$inet6_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, &(0x7f0000000080)="5fce869db66fa225921ad03d773be4ff", 0x10) rmdir(&(0x7f000075aff6)='./control\x00') 2018/03/30 23:06:30 executing program 3: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup\x00', 0x200002, 0x0) fchdir(r0) r1 = creat(&(0x7f0000000080)='./file0\x00', 0x0) r2 = creat(&(0x7f0000000080)='./file0\x00', 0x0) write$cgroup_pid(r2, &(0x7f0000000100)=ANY=[], 0xfffffe15) getpgrp(0x0) getpgid(0x0) syz_mount_image$iso9660(&(0x7f0000000240)='iso9660\x00', &(0x7f0000000280)='./file0\x00', 0x0, 0x1, &(0x7f0000001640)=[{&(0x7f0000000340)}], 0x0, &(0x7f0000001700)={[{@cruft='cruft', 0x2c}, {@nojoliet='nojoliet', 0x2c}, {@check_strict='check=strict', 0x2c}]}) creat(&(0x7f0000000100)='./file0\x00', 0x0) ioctl$TUNSETTXFILTER(0xffffffffffffffff, 0x400454d1, &(0x7f0000000180)={0x0, 0x1, [@dev={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa]}]}) ioctl$fiemap(r1, 0xc020660b, &(0x7f0000000300)={0x0, 0x100, 0x1}) accept4$inet6(r1, &(0x7f00000001c0)={0x0, 0x0, 0x0, @remote}, &(0x7f0000000200)=0x1c, 0x0) 2018/03/30 23:06:30 executing program 4: mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount(&(0x7f000000a000)='./file0\x00', &(0x7f0000026ff8)='./file0\x00', &(0x7f000000c000)='ramfs\x00', 0x0, &(0x7f000000a000)) mkdir(&(0x7f0000000000)='./file1\x00', 0x0) r0 = openat$audio(0xffffffffffffff9c, &(0x7f0000000140)='/dev/audio\x00', 0x0, 0x0) setsockopt$ax25_buf(r0, 0x101, 0x19, &(0x7f0000000240)="5389b8e2ee13fc6e9ca3bbcf5be4e3046ab59c2e5a21a0c899242743584e8ecff36167ef1aa3b4b42117638ebaac613e92a3cf2893", 0x35) bind$unix(r0, &(0x7f00000002c0)=@abs={0x0, 0x0, 0x4e24}, 0x6e) mount(&(0x7f0000000040)='./file0\x00', &(0x7f0000903000)='./file0\x00', &(0x7f0000811ffa)='bdev\x00', 0x100000, &(0x7f00000003c0)="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") r1 = dup(0xffffffffffffffff) r2 = syz_open_dev$vcsn(&(0x7f00000000c0)='/dev/vcs#\x00', 0x2, 0x20800) ioctl$KVM_GET_REG_LIST(r2, 0xc008aeb0, &(0x7f0000000280)={0x2, [0x0, 0x4]}) renameat(r1, &(0x7f0000000080)='./file1/file0\x00', r2, &(0x7f0000000100)='./file1\x00') mount(&(0x7f0000fb6000)='./file0\x00', &(0x7f0000d78000)='.', &(0x7f0000fdb000)='ubifs\x00', 0x1003, 0x0) mount(&(0x7f00002b9ff8)='./file0\x00', &(0x7f0000cbeff8)='./file0\x00', &(0x7f00005f7ffa)='ramfs\x00', 0x80000, &(0x7f000002f000)) mount(&(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)='./file1\x00', &(0x7f0000000200)='anon_inodefs\x00', 0x2000, &(0x7f0000000240)) mount(&(0x7f0000adcff8)='./file0\x00', &(0x7f0000e08fff)='.', &(0x7f00005e9000)='cifs\x00', 0x2000, &(0x7f0000ad5000)) 2018/03/30 23:06:30 executing program 7: perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f00000000c0)='./control\x00', 0x0) r0 = inotify_init() inotify_add_watch(r0, &(0x7f0000f1eff6)='./control\x00', 0x220000000009) r1 = inotify_init1(0x0) syslog(0x9, &(0x7f0000000100)=""/103, 0x67) inotify_add_watch(r1, &(0x7f000001eff6)='./control\x00', 0x2000200) setsockopt$inet6_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, &(0x7f0000000080)="5fce869db66fa225921ad03d773be4ff", 0x10) r2 = openat$rfkill(0xffffffffffffff9c, &(0x7f0000001500)='/dev/rfkill\x00', 0x400000, 0x0) setsockopt$inet_opts(r2, 0x0, 0x9, &(0x7f0000001540)="1b7b20fbba100a3afd24fc67165ccff53d871b24ee8f8d7b429fb4a482599134359b71b8b4058a4d153f07fca1145dce8d4ea6c92db830af3f1217f2f9449792d3306e106347a71d59e5d92a7b6f67c469b87e39b96142fc027c74500127c305c206", 0x62) 2018/03/30 23:06:30 executing program 6: pipe(&(0x7f0000000940)={0xffffffffffffffff, 0xffffffffffffffff}) accept4$ax25(r0, 0x0, &(0x7f0000000080), 0x80000) r1 = socket$inet(0x2, 0x20000000000003, 0x2) connect$inet(r1, &(0x7f0000000000)={0x2, 0x0, @remote={0xac, 0x14, 0x14, 0xbb}}, 0x10) sendmsg(0xffffffffffffffff, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000140), 0x0, &(0x7f0000000180)=ANY=[]}, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000980)=@broute={'broute\x00', 0x20, 0x3, 0x2d9, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000380], 0x0, &(0x7f00000002c0), &(0x7f0000001000)=ANY=[@ANYBLOB="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"]}, 0x351) setsockopt$inet_int(r1, 0x0, 0x2, &(0x7f00000000c0)=0x7fffffff, 0x4) r2 = socket$rds(0x15, 0x5, 0x0) pipe(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$bt_BT_DEFER_SETUP(r3, 0x112, 0x7, &(0x7f0000000280)=0x100, 0x4) accept$packet(r4, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @remote}, &(0x7f0000000100)=0x14) connect$rds(r2, &(0x7f0000000140)={0x2, 0x4e22, @remote={0xac, 0x14, 0x14, 0xbb}}, 0x10) getsockopt$sock_buf(r2, 0x1, 0x3b, &(0x7f0000000180)=""/83, &(0x7f0000000200)=0x53) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000a00)=@filter={'filter\x00', 0xe, 0x4, 0x5a0, 0xffffffff, 0x0, 0xf0, 0xf0, 0xffffffff, 0xffffffff, 0x4d0, 0x4d0, 0x4d0, 0xffffffff, 0x4, &(0x7f0000000300), {[{{@ipv6={@ipv4={[], [0xff, 0xff], @rand_addr=0x80000001}, @dev={0xfe, 0x80, [], 0x16}, [0x0, 0xffffff00, 0xff, 0xffffffff], [0x0, 0xff000000, 0xffffffff], 'ipddp0\x00', 'ip_vti0\x00', {}, {0xff}, 0x6c, 0x2bf}, 0x0, 0xc8, 0xf0}, @REJECT={0x28, 'REJECT\x00', 0x0, {0x7}}}, {{@ipv6={@remote={0xfe, 0x80, [], 0xbb}, @remote={0xfe, 0x80, [], 0xbb}, [0xff000000, 0xffffffff, 0xffffff00, 0xff], [0xff, 0xffffffff, 0x0, 0xff000000], 'syzkaller1\x00', 'eql\x00', {}, {}, 0x62, 0x0, 0x4, 0x1}, 0x0, 0x120, 0x148, 0x0, {}, [@common=@frag={0x30, 'frag\x00', 0x0, {0x7ff, 0x7, 0x1, 0x2}}, @common=@hl={0x28, 'hl\x00', 0x0, {0x3, 0x7fff}}]}, @REJECT={0x28, 'REJECT\x00', 0x0, {0x7}}}, {{@ipv6={@dev={0xfe, 0x80, [], 0xc}, @loopback={0x0, 0x1}, [0xffffffff, 0xffffffff, 0xff000000, 0xff000000], [0xff, 0x0, 0xff, 0xffffff00], 'irlan0\x00', 'vcan0\x00', {0xff}, {}, 0x3b, 0xffffffffffffab69, 0x2, 0x30}, 0x0, 0x250, 0x298, 0x0, {}, [@common=@srh={0x30, 'srh\x00', 0x0, {0xbb, 0x1, 0x3, 0x6, 0xffffffffffffffc0, 0x80}}, @common=@inet=@policy={0x158, 'policy\x00', 0x0, {[{@ipv4, [0xffffffff, 0xff0000ff, 0xff000000, 0xffffffff], @ipv4=@multicast1=0xe0000001, [0xffffffff, 0xffffffff, 0xff000000, 0xffffff00], 0x4d5, 0x3500, 0x5c, 0x0, 0x10, 0xf}, {@ipv6=@dev={0xfe, 0x80, [], 0x11}, [0x0, 0xff000000, 0xff0000ff, 0xffffff00], @ipv4=@multicast1=0xe0000001, [0xffffffff, 0x0, 0x0, 0xffffffff], 0x4d5, 0x3500, 0x77, 0x1, 0x0, 0x1d}, {@ipv6=@mcast1={0xff, 0x1, [], 0x1}, [0xff000000, 0xffffffff, 0xffffff00, 0xff], @ipv4=@multicast2=0xe0000002, [0xffffffff, 0x0, 0xffffff00, 0xffffffff], 0x4d3, 0x3503, 0x7f, 0x0, 0x1, 0x19}, {@ipv4=@local={0xac, 0x14, 0x14, 0xaa}, [0x0, 0xff, 0x0, 0xff0000ff], @ipv6=@local={0xfe, 0x80, [], 0xaa}, [0xffffffff, 0xffffffff, 0xff, 0xff0000ff], 0x4d4, 0x3505, 0x0, 0x1, 0x1f, 0x10}], 0x0, 0x3}}]}, @common=@unspec=@LED={0x48, 'LED\x00', 0x0, {'syz1\x00', 0x0, 0x8, 0x8}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28, '\x00', 0x0, 0xfffffffffffffffe}}}}, 0x600) socket(0x1, 0xa, 0x7) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_TIMER(0xffffffffffffffff, 0x40605346, &(0x7f0000000680)={0x1, 0x3, {0x3, 0x0, 0x9, 0x3}}) [ 339.006231] FAULT_INJECTION: forcing a failure. [ 339.006231] name failslab, interval 1, probability 0, space 0, times 0 [ 339.017636] CPU: 0 PID: 26661 Comm: syz-executor0 Not tainted 4.16.0-rc7+ #372 [ 339.025007] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 339.034378] Call Trace: [ 339.036977] dump_stack+0x194/0x24d [ 339.040614] ? arch_local_irq_restore+0x53/0x53 [ 339.045305] should_fail+0x8c0/0xa40 [ 339.049029] ? kstrdup+0x39/0x70 [ 339.052427] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 339.057546] ? cgroup_apply_control_enable+0x390/0xbc0 [ 339.062834] ? kernfs_iop_mkdir+0x153/0x1e0 [ 339.067161] ? vfs_mkdir+0x390/0x600 [ 339.070878] ? SyS_mkdirat+0x22b/0x2b0 [ 339.074777] ? entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 339.080148] ? find_held_lock+0x35/0x1d0 [ 339.084201] ? find_held_lock+0x35/0x1d0 [ 339.088256] ? __lock_is_held+0xb6/0x140 [ 339.092323] ? check_same_owner+0x320/0x320 [ 339.096635] ? rcu_note_context_switch+0x710/0x710 [ 339.101551] ? rcu_read_lock_sched_held+0x108/0x120 [ 339.106556] should_failslab+0xec/0x120 [ 339.110512] kmem_cache_alloc+0x47/0x760 [ 339.114552] ? memcpy+0x45/0x50 [ 339.117814] ? kstrdup+0x59/0x70 [ 339.121168] __kernfs_new_node+0xe2/0x570 [ 339.125303] ? kernfs_dop_revalidate+0x380/0x380 [ 339.130055] ? snprintf+0xc0/0xf0 [ 339.133488] ? vsprintf+0x40/0x40 [ 339.136921] ? debug_lockdep_rcu_enabled+0x77/0x90 [ 339.141835] ? cgroup_file_name+0x1d0/0x1d0 [ 339.146144] kernfs_new_node+0x80/0xe0 [ 339.150025] __kernfs_create_file+0x4b/0x320 [ 339.154420] cgroup_addrm_files+0x3c5/0xa70 [ 339.158734] ? cgroup_file_write+0x710/0x710 [ 339.163126] ? cpu_cgroup_css_alloc+0x30/0x30 [ 339.167615] ? __lock_is_held+0xb6/0x140 [ 339.171663] ? sched_online_group+0x4e0/0x4e0 [ 339.176137] ? cpu_cgroup_css_online+0x3a/0x50 [ 339.180698] ? online_css+0x224/0x2e0 [ 339.184483] css_populate_dir+0x198/0x420 [ 339.188617] cgroup_apply_control_enable+0x390/0xbc0 [ 339.193712] ? cgroup_propagate_control+0x570/0x570 [ 339.198717] ? css_populate_dir+0x289/0x420 [ 339.203032] cgroup_mkdir+0x56f/0xfc0 [ 339.206814] ? __lock_is_held+0xb6/0x140 [ 339.210863] ? cgroup_destroy_locked+0x750/0x750 [ 339.215598] ? rcu_read_lock_sched_held+0x108/0x120 [ 339.220598] ? kmem_cache_free+0x258/0x2a0 [ 339.224819] ? set_nlink+0xc1/0x160 [ 339.228429] ? debug_lockdep_rcu_enabled+0x77/0x90 [ 339.233341] ? generic_permission+0x105/0x3c0 [ 339.237820] ? cgroup_destroy_locked+0x750/0x750 [ 339.242557] kernfs_iop_mkdir+0x153/0x1e0 [ 339.246688] vfs_mkdir+0x390/0x600 [ 339.250212] SyS_mkdirat+0x22b/0x2b0 [ 339.253909] ? SyS_mknod+0x480/0x480 [ 339.257602] ? trace_hardirqs_on+0xd/0x10 [ 339.261734] ? do_syscall_64+0xb7/0x940 [ 339.265691] ? SyS_mknod+0x480/0x480 [ 339.269389] do_syscall_64+0x281/0x940 [ 339.273260] ? vmalloc_sync_all+0x30/0x30 [ 339.277387] ? _raw_spin_unlock_irq+0x27/0x70 [ 339.281865] ? finish_task_switch+0x1c1/0x7e0 [ 339.286343] ? syscall_return_slowpath+0x550/0x550 [ 339.291257] ? syscall_return_slowpath+0x2ac/0x550 [ 339.296167] ? prepare_exit_to_usermode+0x350/0x350 [ 339.301165] ? entry_SYSCALL_64_after_hwframe+0x52/0xb7 [ 339.306515] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 339.311357] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 339.316528] RIP: 0033:0x454e79 [ 339.319695] RSP: 002b:00007f016b92fc68 EFLAGS: 00000246 ORIG_RAX: 0000000000000102 [ 339.327384] RAX: ffffffffffffffda RBX: 00007f016b9306d4 RCX: 0000000000454e79 [ 339.334632] RDX: 0000000000000020 RSI: 0000000020000280 RDI: 0000000000000015 [ 339.341879] RBP: 000000000072bea0 R08: 0000000000000000 R09: 0000000000000000 [ 339.349126] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000016 [ 339.356377] R13: 00000000000003eb R14: 00000000006f7ea8 R15: 0000000000000028 [ 339.363848] cgroup: cgroup_addrm_files: failed to add max, err=-12 2018/03/30 23:06:30 executing program 2: perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f00000000c0)='./control\x00', 0x0) inotify_init() r0 = syz_open_dev$sg(&(0x7f000028fff7)='/dev/sg#\x00', 0x0, 0x0) ioctl(r0, 0x4000000000001276, &(0x7f0000000040)) msgget(0x2, 0x0) getsockopt$nfc_llcp(0xffffffffffffffff, 0x118, 0x4, &(0x7f0000000740)=""/223, 0xdf) setsockopt$inet_mreq(r0, 0x0, 0x23, &(0x7f00000002c0)={@empty, @remote={0xac, 0x14, 0x14, 0xbb}}, 0x8) accept4$nfc_llcp(0xffffffffffffffff, &(0x7f0000000940), &(0x7f0000000080)=0x60, 0x800) ioctl$SNDRV_CTL_IOCTL_ELEM_INFO(0xffffffffffffffff, 0xc1105511, &(0x7f0000000100)={{0x0, 0x0, 0x0, 0x0, "386aea20273dc03c3d18dd0dbd4a0ca15f9f580393cc4ec3b8ee256b9aa630224ba64c6ff43ee01d2996c914"}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "eda422cd37591b3a5a7a683380f7e0b9e790c6b72cd0a4f3342f7431c1699a305ca3091bb2320e8df4e298a2cca26637866a68c1426ffbd8a6c7da1d8ea77d9d", &(0x7f00000000c0)='/dev/snd/controlC#\x00', 0x13}) r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000003c0)='/proc/self/net/pfkey\x00', 0x800, 0x0) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) add_key$user(&(0x7f0000000480)='user\x00', &(0x7f00000004c0)={0x73, 0x79, 0x7a, 0x3}, &(0x7f0000000500)="d3238eea76b0470531092a0a77b0b49789a0fc97b8f8b9e23a2a5a5a0c169ed6e83480b4801dbf79db3527904ee3128c05ce2806e210237c36b88ceabe99d8784860e5d0e91fe33d38d0133e056cdd1e2910d57fc5eb1b23db3b60a7077ff33bb6c7445cd258ee25f9187269c22d1ed05acb2b9b599bd285b692257a631754ab9befebd3fdb3167361c24c5c5dcf90e476e052b9d22362c57878cb7205fe361346d6beb77b7844fe94", 0xa9, 0xfffffffffffffffe) ioctl$sock_inet_SIOCSIFADDR(r0, 0x8916, &(0x7f0000000300)={'gretap0\x00', {0x2, 0x4e24, @loopback=0x7f000001}}) keyctl$instantiate_iov(0x14, 0x0, &(0x7f0000000780)=[{&(0x7f0000000840)="edb4a01f68d76905035a4ebdd427d31585a5a650581902b1c077f74ca8f1ce7d3e2f6e1c6760433af9664b3f3bebab3a1a1c4ef86f42c39b758accc1e7637bb18d28248dc7a1719b73388830b162613b17fd02220bd1fe2ad86adb96efcfc672d126ae58f745fba0e7534cdbae947449df767bd76a0c38b5752dcd13f7065edea86dc156c0708e76c2c99a94a95f1e93ff73cb3eb94e06d399cf48aaac7963d13e4b3a6b32bc2b19d5461545dcf3f71bb24442d286421f8d891d77a3c4c1c9435bbdf187682c22ded22b669b7790d05b4894166a2d5f33098cf908a23a2e0671d824e88942fbe0bd1416", 0xea}], 0x1, 0x0) r3 = ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) ioctl$KVM_UNREGISTER_COALESCED_MMIO(r3, 0x4010ae68, &(0x7f0000000000)={0x0, 0x5000}) ioctl$KVM_CREATE_PIT2(r3, 0x4040ae77, &(0x7f0000000440)={0xfffffffffffffff7}) ioctl$KVM_CREATE_VCPU(r3, 0xae41, 0x0) setsockopt$inet_tcp_TCP_ULP(r1, 0x6, 0x1f, &(0x7f0000000280)='tls\x00', 0x4) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000005fd8)={'vcan0\x00'}) socket$can_raw(0x1d, 0x3, 0x1) socket$inet6(0xa, 0x0, 0x0) syz_open_dev$dspn(&(0x7f0000000040)='/dev/dsp#\x00', 0x0, 0x0) 2018/03/30 23:06:30 executing program 3: socketpair(0x9, 0x8000a, 0x1, &(0x7f0000000000)={0xffffffffffffffff}) bind$rds(r0, &(0x7f00000000c0)={0x2, 0x4e24, @dev={0xac, 0x14, 0x14, 0xe}}, 0x10) getsockopt$IPT_SO_GET_REVISION_MATCH(r0, 0x0, 0x42, &(0x7f0000000100)={'ah\x00'}, &(0x7f0000000180)=0x1e) r1 = socket$inet_udp(0x2, 0x2, 0x0) r2 = socket$packet(0x11, 0x800000000002, 0x300) setsockopt$packet_fanout(r2, 0x107, 0x12, &(0x7f000095bffc)={0x0, 0x0, 0xfffffffffffffffc}, 0x4) connect$inet(r0, &(0x7f0000000140)={0x2, 0x0, @local={0xac, 0x14, 0x14, 0xaa}}, 0x10) r3 = socket$inet_udp(0x2, 0x2, 0x0) connect$inet(r3, &(0x7f0000000040)={0x2, 0x0, @local={0xac, 0x14, 0x14, 0xaa}}, 0x10) sendto$inet(r3, &(0x7f0000762fff), 0xfdc7, 0x0, &(0x7f000057bff0)={0x2, 0x4e20, @multicast1=0xe0000001}, 0x10) sendto$inet(r1, &(0x7f0000762fff), 0xfdc7, 0x0, &(0x7f000057bff0)={0x2, 0x4e20, @multicast1=0xe0000001}, 0x10) syz_emit_ethernet(0x1, &(0x7f0000000080)=ANY=[@ANYBLOB="aaaa92aaaacba6b30422ab5898d1"], 0x0) 2018/03/30 23:06:30 executing program 5: mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) perf_event_open(&(0x7f0000223000)={0x2, 0x78, 0xe3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000001980)={{{@in6=@remote, @in=@multicast1}}, {{@in=@multicast2}, 0x0, @in=@multicast2}}, &(0x7f0000001a80)=0xe8) mount(&(0x7f00000003c0)='./file0\x00', &(0x7f0000000380)='./file0\x00', &(0x7f0000000300)='cgroup2\x00', 0x0, 0x0) r0 = open$dir(&(0x7f000001bff4)='./file0\x00', 0x0, 0x0) mkdirat(0xffffffffffffffff, &(0x7f0000000280)='./file0\x00', 0x20) getsockopt$kcm_KCM_RECV_DISABLE(r0, 0x119, 0x1, &(0x7f0000000040), 0x4) unlinkat(r0, &(0x7f0000000080)='./file0\x00', 0x200) 2018/03/30 23:06:30 executing program 0 (fault-call:7 fault-nth:41): mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r0 = syz_open_dev$usbmon(&(0x7f0000000400)='/dev/usbmon#\x00', 0x0, 0x0) r1 = perf_event_open(&(0x7f0000223000)={0x2, 0x78, 0xe3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000001980)={{{@in6=@remote, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast2}, 0x0, @in=@multicast2}}, &(0x7f0000001a80)=0xe8) chown(&(0x7f00000004c0)='./file0\x00', r2, 0x0) mount(&(0x7f00000003c0)='./file0\x00', &(0x7f0000000380)='./file0\x00', &(0x7f0000000300)='cgroup2\x00', 0x0, 0x0) r3 = open$dir(&(0x7f000001bff4)='./file0\x00', 0x0, 0x0) mkdirat(r3, &(0x7f0000000280)='./file0\x00', 0x20) getdents64(r3, &(0x7f00000007c0)=""/250, 0x1015a) dup3(r0, r1, 0x80000) r4 = open$dir(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) renameat2(r4, &(0x7f0000000200)='./file1\x00', 0xffffffffffffffff, &(0x7f0000000240)='./file0\x00', 0xfd1092750066ec78) ioctl$KDGKBMODE(0xffffffffffffffff, 0x4b44, &(0x7f0000000140)) [ 339.410335] kernel msg: ebtables bug: please report to author: entries_size too small 2018/03/30 23:06:31 executing program 6: pipe(&(0x7f0000000940)={0xffffffffffffffff, 0xffffffffffffffff}) accept4$ax25(r0, 0x0, &(0x7f0000000080), 0x80000) r1 = socket$inet(0x2, 0x20000000000003, 0x2) connect$inet(r1, &(0x7f0000000000)={0x2, 0x0, @remote={0xac, 0x14, 0x14, 0xbb}}, 0x10) sendmsg(0xffffffffffffffff, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000140), 0x0, &(0x7f0000000180)=ANY=[]}, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000980)=@broute={'broute\x00', 0x20, 0x3, 0x2d9, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000380], 0x0, &(0x7f00000002c0), &(0x7f0000001000)=ANY=[@ANYBLOB="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"]}, 0x351) setsockopt$inet_int(r1, 0x0, 0x2, &(0x7f00000000c0)=0x7fffffff, 0x4) r2 = socket$rds(0x15, 0x5, 0x0) pipe(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$bt_BT_DEFER_SETUP(r3, 0x112, 0x7, &(0x7f0000000280)=0x100, 0x4) accept$packet(r4, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @remote}, &(0x7f0000000100)=0x14) connect$rds(r2, &(0x7f0000000140)={0x2, 0x4e22, @remote={0xac, 0x14, 0x14, 0xbb}}, 0x10) getsockopt$sock_buf(r2, 0x1, 0x3b, &(0x7f0000000180)=""/83, &(0x7f0000000200)=0x53) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000a00)=@filter={'filter\x00', 0xe, 0x4, 0x5a0, 0xffffffff, 0x0, 0xf0, 0xf0, 0xffffffff, 0xffffffff, 0x4d0, 0x4d0, 0x4d0, 0xffffffff, 0x4, &(0x7f0000000300), {[{{@ipv6={@ipv4={[], [0xff, 0xff], @rand_addr=0x80000001}, @dev={0xfe, 0x80, [], 0x16}, [0x0, 0xffffff00, 0xff, 0xffffffff], [0x0, 0xff000000, 0xffffffff], 'ipddp0\x00', 'ip_vti0\x00', {}, {0xff}, 0x6c, 0x2bf}, 0x0, 0xc8, 0xf0}, @REJECT={0x28, 'REJECT\x00', 0x0, {0x7}}}, {{@ipv6={@remote={0xfe, 0x80, [], 0xbb}, @remote={0xfe, 0x80, [], 0xbb}, [0xff000000, 0xffffffff, 0xffffff00, 0xff], [0xff, 0xffffffff, 0x0, 0xff000000], 'syzkaller1\x00', 'eql\x00', {}, {}, 0x62, 0x0, 0x4, 0x1}, 0x0, 0x120, 0x148, 0x0, {}, [@common=@frag={0x30, 'frag\x00', 0x0, {0x7ff, 0x7, 0x1, 0x2}}, @common=@hl={0x28, 'hl\x00', 0x0, {0x3, 0x7fff}}]}, @REJECT={0x28, 'REJECT\x00', 0x0, {0x7}}}, {{@ipv6={@dev={0xfe, 0x80, [], 0xc}, @loopback={0x0, 0x1}, [0xffffffff, 0xffffffff, 0xff000000, 0xff000000], [0xff, 0x0, 0xff, 0xffffff00], 'irlan0\x00', 'vcan0\x00', {0xff}, {}, 0x3b, 0xffffffffffffab69, 0x2, 0x30}, 0x0, 0x250, 0x298, 0x0, {}, [@common=@srh={0x30, 'srh\x00', 0x0, {0xbb, 0x1, 0x3, 0x6, 0xffffffffffffffc0, 0x80}}, @common=@inet=@policy={0x158, 'policy\x00', 0x0, {[{@ipv4, [0xffffffff, 0xff0000ff, 0xff000000, 0xffffffff], @ipv4=@multicast1=0xe0000001, [0xffffffff, 0xffffffff, 0xff000000, 0xffffff00], 0x4d5, 0x3500, 0x5c, 0x0, 0x10, 0xf}, {@ipv6=@dev={0xfe, 0x80, [], 0x11}, [0x0, 0xff000000, 0xff0000ff, 0xffffff00], @ipv4=@multicast1=0xe0000001, [0xffffffff, 0x0, 0x0, 0xffffffff], 0x4d5, 0x3500, 0x77, 0x1, 0x0, 0x1d}, {@ipv6=@mcast1={0xff, 0x1, [], 0x1}, [0xff000000, 0xffffffff, 0xffffff00, 0xff], @ipv4=@multicast2=0xe0000002, [0xffffffff, 0x0, 0xffffff00, 0xffffffff], 0x4d3, 0x3503, 0x7f, 0x0, 0x1, 0x19}, {@ipv4=@local={0xac, 0x14, 0x14, 0xaa}, [0x0, 0xff, 0x0, 0xff0000ff], @ipv6=@local={0xfe, 0x80, [], 0xaa}, [0xffffffff, 0xffffffff, 0xff, 0xff0000ff], 0x4d4, 0x3505, 0x0, 0x1, 0x1f, 0x10}], 0x0, 0x3}}]}, @common=@unspec=@LED={0x48, 'LED\x00', 0x0, {'syz1\x00', 0x0, 0x8, 0x8}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28, '\x00', 0x0, 0xfffffffffffffffe}}}}, 0x600) socket(0x1, 0xa, 0x7) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_TIMER(r4, 0x40605346, &(0x7f0000000680)={0x0, 0x3, {0x3, 0x0, 0x9, 0x3}}) 2018/03/30 23:06:31 executing program 7: perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$inet6_tcp_TCP_REPAIR_WINDOW(r1, 0x6, 0x1d, &(0x7f0000000100)={0x79c, 0x100000001, 0x2, 0x2, 0x9}, 0x14) mkdir(&(0x7f00000000c0)='./control\x00', 0x0) r2 = inotify_init() inotify_add_watch(r2, &(0x7f0000f1eff6)='./control\x00', 0x220000000009) r3 = inotify_init1(0x0) inotify_add_watch(r3, &(0x7f000001eff6)='./control\x00', 0x2000200) ioctl$sock_inet_SIOCDARP(r0, 0x8953, &(0x7f0000000140)={{0x2, 0x4e24, @rand_addr=0x2}, {0x306, @remote={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xbb}}, 0x4, {0x2, 0x4e22, @multicast1=0xe0000001}, 'ip6_vti0\x00'}) setsockopt$inet6_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, &(0x7f0000000080)="5fce869db66fa225921ad03d773be4ff", 0x10) rmdir(&(0x7f000075aff6)='./control\x00') [ 339.554761] kernel msg: ebtables bug: please report to author: entries_size too small [ 339.614227] FAULT_INJECTION: forcing a failure. [ 339.614227] name failslab, interval 1, probability 0, space 0, times 0 [ 339.625731] CPU: 1 PID: 26712 Comm: syz-executor0 Not tainted 4.16.0-rc7+ #372 [ 339.633093] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 339.642443] Call Trace: [ 339.645037] dump_stack+0x194/0x24d [ 339.648675] ? arch_local_irq_restore+0x53/0x53 [ 339.653351] ? unwind_get_return_address+0x61/0xa0 [ 339.658293] should_fail+0x8c0/0xa40 [ 339.662016] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 339.667125] ? save_stack+0x43/0xd0 [ 339.670755] ? kasan_kmalloc+0xad/0xe0 [ 339.674645] ? cgroup_mkdir+0x56f/0xfc0 [ 339.679189] ? kernfs_iop_mkdir+0x153/0x1e0 [ 339.683510] ? vfs_mkdir+0x390/0x600 [ 339.687221] ? do_syscall_64+0x281/0x940 [ 339.691286] ? entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 339.696654] ? find_held_lock+0x35/0x1d0 [ 339.700720] ? __lock_is_held+0xb6/0x140 [ 339.704800] ? check_same_owner+0x320/0x320 [ 339.709137] ? rcu_note_context_switch+0x710/0x710 [ 339.714063] ? __lock_is_held+0xb6/0x140 [ 339.718112] should_failslab+0xec/0x120 [ 339.722072] kmem_cache_alloc_trace+0x4b/0x740 [ 339.726633] ? rcu_read_lock_sched_held+0x108/0x120 [ 339.731626] ? kmem_cache_alloc_trace+0x459/0x740 [ 339.736453] cfq_cpd_alloc+0x54/0x90 [ 339.740148] blkcg_css_alloc+0x165/0x6b0 [ 339.744192] ? cfqg_set_weight_device+0x40/0x40 [ 339.748838] ? blkcg_deactivate_policy+0x430/0x430 [ 339.753747] ? __lock_is_held+0xb6/0x140 [ 339.757796] cgroup_apply_control_enable+0x44d/0xbc0 [ 339.762888] ? cgroup_propagate_control+0x570/0x570 [ 339.767885] ? css_populate_dir+0x289/0x420 [ 339.772188] cgroup_mkdir+0x56f/0xfc0 [ 339.775964] ? __lock_is_held+0xb6/0x140 [ 339.780006] ? cgroup_destroy_locked+0x750/0x750 [ 339.784746] ? rcu_read_lock_sched_held+0x108/0x120 [ 339.789740] ? kmem_cache_free+0x258/0x2a0 [ 339.793956] ? set_nlink+0xc1/0x160 [ 339.797561] ? debug_lockdep_rcu_enabled+0x77/0x90 [ 339.802464] ? generic_permission+0x105/0x3c0 [ 339.806938] ? cgroup_destroy_locked+0x750/0x750 [ 339.811671] kernfs_iop_mkdir+0x153/0x1e0 [ 339.815800] vfs_mkdir+0x390/0x600 [ 339.819326] SyS_mkdirat+0x22b/0x2b0 [ 339.823027] ? SyS_mknod+0x480/0x480 [ 339.826720] ? trace_hardirqs_on+0xd/0x10 [ 339.830847] ? do_syscall_64+0xb7/0x940 [ 339.834797] ? SyS_mknod+0x480/0x480 [ 339.838488] do_syscall_64+0x281/0x940 [ 339.842350] ? vmalloc_sync_all+0x30/0x30 [ 339.846480] ? _raw_spin_unlock_irq+0x27/0x70 [ 339.850950] ? finish_task_switch+0x1c1/0x7e0 [ 339.855420] ? syscall_return_slowpath+0x550/0x550 [ 339.860328] ? syscall_return_slowpath+0x2ac/0x550 [ 339.865232] ? prepare_exit_to_usermode+0x350/0x350 [ 339.870226] ? entry_SYSCALL_64_after_hwframe+0x52/0xb7 [ 339.875568] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 339.880392] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 339.885557] RIP: 0033:0x454e79 [ 339.888721] RSP: 002b:00007f016b92fc68 EFLAGS: 00000246 ORIG_RAX: 0000000000000102 [ 339.896407] RAX: ffffffffffffffda RBX: 00007f016b9306d4 RCX: 0000000000454e79 [ 339.903653] RDX: 0000000000000020 RSI: 0000000020000280 RDI: 0000000000000015 [ 339.910899] RBP: 000000000072bea0 R08: 0000000000000000 R09: 0000000000000000 [ 339.918148] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000016 [ 339.925392] R13: 00000000000003eb R14: 00000000006f7ea8 R15: 0000000000000029 2018/03/30 23:06:31 executing program 4: mkdir(&(0x7f0000fd5ff8)='./file1\x00', 0x0) mount(&(0x7f000000a000)='./file0\x00', &(0x7f0000026ff8)='./file0\x00', &(0x7f000000c000)='ramfs\x00', 0x0, &(0x7f000000a000)) mkdir(&(0x7f0000000000)='./file1\x00', 0x0) mount(&(0x7f0000000040)='./file0\x00', &(0x7f0000903000)='./file0\x00', &(0x7f0000811ffa)='bdev\x00', 0x100000, &(0x7f00000003c0)="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") r0 = dup(0xffffffffffffffff) r1 = syz_open_dev$vcsn(&(0x7f00000000c0)='/dev/vcs#\x00', 0x2, 0x20800) renameat(r0, &(0x7f0000000080)='./file1/file0\x00', r1, &(0x7f0000000100)='./file1\x00') mount(&(0x7f0000fb6000)='./file0\x00', &(0x7f0000d78000)='.', &(0x7f0000fdb000)='ubifs\x00', 0x1003, 0x0) mount(&(0x7f00002b9ff8)='./file0\x00', &(0x7f0000cbeff8)='./file0\x00', &(0x7f00005f7ffa)='ramfs\x00', 0x80000, &(0x7f000002f000)) mount(&(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)='./file1\x00', &(0x7f0000000200)='anon_inodefs\x00', 0x2000, &(0x7f0000000240)) mount(&(0x7f0000adcff8)='./file0\x00', &(0x7f0000e08fff)='.', &(0x7f00005e9000)='cifs\x00', 0x2000, &(0x7f0000ad5000)) 2018/03/30 23:06:31 executing program 6: pipe(&(0x7f0000000940)={0xffffffffffffffff, 0xffffffffffffffff}) accept4$ax25(r0, 0x0, &(0x7f0000000080), 0x80000) r1 = socket$inet(0x2, 0x20000000000003, 0x2) connect$inet(r1, &(0x7f0000000000)={0x2, 0x0, @remote={0xac, 0x14, 0x14, 0xbb}}, 0x10) sendmsg(0xffffffffffffffff, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000140), 0x0, &(0x7f0000000180)=ANY=[]}, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000980)=@broute={'broute\x00', 0x20, 0x3, 0x2d9, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000380], 0x0, &(0x7f00000002c0), &(0x7f0000001000)=ANY=[@ANYBLOB="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"]}, 0x351) setsockopt$inet_int(r1, 0x0, 0x2, &(0x7f00000000c0)=0x7fffffff, 0x4) r2 = socket$rds(0x15, 0x5, 0x0) pipe(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$bt_BT_DEFER_SETUP(r3, 0x112, 0x7, &(0x7f0000000280)=0x100, 0x4) accept$packet(r4, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @remote}, &(0x7f0000000100)=0x14) connect$rds(r2, &(0x7f0000000140)={0x2, 0x4e22, @remote={0xac, 0x14, 0x14, 0xbb}}, 0x10) getsockopt$sock_buf(r2, 0x1, 0x3b, &(0x7f0000000180)=""/83, &(0x7f0000000200)=0x53) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000a00)=@filter={'filter\x00', 0xe, 0x4, 0x5a0, 0xffffffff, 0x0, 0xf0, 0xf0, 0xffffffff, 0xffffffff, 0x4d0, 0x4d0, 0x4d0, 0xffffffff, 0x4, &(0x7f0000000300), {[{{@ipv6={@ipv4={[], [0xff, 0xff], @rand_addr=0x80000001}, @dev={0xfe, 0x80, [], 0x16}, [0x0, 0xffffff00, 0xff, 0xffffffff], [0x0, 0xff000000, 0xffffffff], 'ipddp0\x00', 'ip_vti0\x00', {}, {0xff}, 0x6c, 0x2bf}, 0x0, 0xc8, 0xf0}, @REJECT={0x28, 'REJECT\x00', 0x0, {0x7}}}, {{@ipv6={@remote={0xfe, 0x80, [], 0xbb}, @remote={0xfe, 0x80, [], 0xbb}, [0xff000000, 0xffffffff, 0xffffff00, 0xff], [0xff, 0xffffffff, 0x0, 0xff000000], 'syzkaller1\x00', 'eql\x00', {}, {}, 0x62, 0x0, 0x4, 0x1}, 0x0, 0x120, 0x148, 0x0, {}, [@common=@frag={0x30, 'frag\x00', 0x0, {0x7ff, 0x7, 0x1, 0x2}}, @common=@hl={0x28, 'hl\x00', 0x0, {0x3, 0x7fff}}]}, @REJECT={0x28, 'REJECT\x00', 0x0, {0x7}}}, {{@ipv6={@dev={0xfe, 0x80, [], 0xc}, @loopback={0x0, 0x1}, [0xffffffff, 0xffffffff, 0xff000000, 0xff000000], [0xff, 0x0, 0xff, 0xffffff00], 'irlan0\x00', 'vcan0\x00', {0xff}, {}, 0x3b, 0xffffffffffffab69, 0x2, 0x30}, 0x0, 0x250, 0x298, 0x0, {}, [@common=@srh={0x30, 'srh\x00', 0x0, {0xbb, 0x1, 0x3, 0x6, 0xffffffffffffffc0, 0x80}}, @common=@inet=@policy={0x158, 'policy\x00', 0x0, {[{@ipv4, [0xffffffff, 0xff0000ff, 0xff000000, 0xffffffff], @ipv4=@multicast1=0xe0000001, [0xffffffff, 0xffffffff, 0xff000000, 0xffffff00], 0x4d5, 0x3500, 0x5c, 0x0, 0x10, 0xf}, {@ipv6=@dev={0xfe, 0x80, [], 0x11}, [0x0, 0xff000000, 0xff0000ff, 0xffffff00], @ipv4=@multicast1=0xe0000001, [0xffffffff, 0x0, 0x0, 0xffffffff], 0x4d5, 0x3500, 0x77, 0x1, 0x0, 0x1d}, {@ipv6=@mcast1={0xff, 0x1, [], 0x1}, [0xff000000, 0xffffffff, 0xffffff00, 0xff], @ipv4=@multicast2=0xe0000002, [0xffffffff, 0x0, 0xffffff00, 0xffffffff], 0x4d3, 0x3503, 0x7f, 0x0, 0x1, 0x19}, {@ipv4=@local={0xac, 0x14, 0x14, 0xaa}, [0x0, 0xff, 0x0, 0xff0000ff], @ipv6=@local={0xfe, 0x80, [], 0xaa}, [0xffffffff, 0xffffffff, 0xff, 0xff0000ff], 0x4d4, 0x3505, 0x0, 0x1, 0x1f, 0x10}], 0x0, 0x3}}]}, @common=@unspec=@LED={0x48, 'LED\x00', 0x0, {'syz1\x00', 0x0, 0x8, 0x8}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28, '\x00', 0x0, 0xfffffffffffffffe}}}}, 0x600) socket(0x1, 0xa, 0x7) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_TIMER(r4, 0x40605346, &(0x7f0000000680)={0x0, 0x3, {0x3, 0x0, 0x9, 0x3}}) 2018/03/30 23:06:31 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x200, 0x0) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000680)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$sock_linger(r2, 0x1, 0xd, &(0x7f00000006c0)={0x400, 0x9}, 0x8) perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x0, 0x0) r3 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) mmap(&(0x7f0000000000/0x9d7000)=nil, 0x9d7000, 0x0, 0x10, 0xffffffffffffffff, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x7) perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r4 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r4, &(0x7f0000e5b000)={0x2, 0x4e20, @multicast1=0xe0000001}, 0x10) syz_open_dev$sg(&(0x7f0000000440)='/dev/sg#\x00', 0x0, 0x0) connect$inet(r4, &(0x7f0000000100)={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x11}}, 0x10) r5 = bpf$PROG_LOAD(0x5, &(0x7f0000eb0fb8)={0x1, 0x3, &(0x7f00009ff000)=@framed={{0x18}, [], {0x95}}, &(0x7f00002bf000)='syzkaller\x00', 0x4, 0xb7, &(0x7f00006ab000)=""/183}, 0x48) setsockopt$inet_tcp_int(r4, 0x6, 0x19, &(0x7f0000000240)=0x8, 0x4) r6 = socket$kcm(0x29, 0x2, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r6, 0x89e0, &(0x7f000031aff8)={r4, r5}) ioctl$sock_kcm_SIOCKCMCLONE(r6, 0x89e2, &(0x7f00000002c0)={0xffffffffffffffff}) sendmsg$nl_xfrm(r7, &(0x7f0000000780)={&(0x7f0000000200)={0x10}, 0xc, &(0x7f0000000740)={&(0x7f0000000480)=@updpolicy={0xb8, 0x19, 0x0, 0x0, 0x0, {{@in=@loopback=0x7f000001, @in6=@mcast1={0xff, 0x1, [], 0x1}}}}, 0xffcb}, 0x1}, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(r7, 0x89e1, &(0x7f0000000040)={r4}) r8 = fcntl$getown(r3, 0x9) recvfrom$inet6(r1, &(0x7f0000000140)=""/177, 0xb1, 0x40000000, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @empty, 0xe38}, 0x1c) r9 = accept4$inet(0xffffffffffffff9c, &(0x7f0000000700)={0x0, 0x0, @broadcast}, &(0x7f0000000740)=0x10, 0x80000) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r9, 0x84, 0x64, &(0x7f0000000780)=[@in6={0xa, 0x4e22, 0xfffffffffffff7e1, @mcast2={0xff, 0x2, [], 0x1}, 0x8}, @in={0x2, 0x4e24, @broadcast=0xffffffff}], 0x2c) ptrace$setregset(0x4205, r8, 0x0, &(0x7f00000005c0)={&(0x7f0000000080)}) ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r10 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x1fffd, 0x0) r11 = syz_open_dev$sndtimer(&(0x7f00000000c0)='/dev/snd/timer\x00', 0x0, 0x0) read(r11, &(0x7f0000ec6000)=""/50, 0x32) fcntl$dupfd(r11, 0x0, r10) 2018/03/30 23:06:31 executing program 7: perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f00000000c0)='./control\x00', 0x0) r0 = inotify_init() inotify_add_watch(r0, &(0x7f0000f1eff6)='./control\x00', 0x220000000009) r1 = inotify_init1(0x0) inotify_add_watch(r1, &(0x7f000001eff6)='./control\x00', 0x2000200) setsockopt$inet6_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, &(0x7f0000000080)="5fce869db66fa225921ad03d773be4ff", 0x10) r2 = shmget$private(0x0, 0x2000, 0x100, &(0x7f0000ffc000/0x2000)=nil) shmctl$SHM_LOCK(r2, 0xb) rmdir(&(0x7f000075aff6)='./control\x00') 2018/03/30 23:06:31 executing program 5: mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) perf_event_open(&(0x7f0000223000)={0x2, 0x78, 0xe3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000500)={{{@in6=@remote, @in=@multicast1}}, {{@in=@multicast2}, 0x0, @in=@multicast2}}, &(0x7f0000001a80)=0xe8) mount(&(0x7f00000003c0)='./file0\x00', &(0x7f0000000380)='./file0\x00', &(0x7f0000000300)='cgroup2\x00', 0x0, 0x0) syz_open_dev$sg(&(0x7f0000000040)='/dev/sg#\x00', 0x169, 0x100) r0 = open$dir(&(0x7f000001bff4)='./file0\x00', 0x0, 0x0) mkdirat(0xffffffffffffffff, &(0x7f0000000280)='./file0\x00', 0x20) unlinkat(r0, &(0x7f0000000080)='./file0\x00', 0x200) 2018/03/30 23:06:31 executing program 3: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f0000366000)={0x2, 0x4e23, @broadcast=0xffffffff}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000f5eff5)='lp\x00', 0x4) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f0000000140)={0x1, [0x0]}, &(0x7f0000000340)=0x8) fcntl$getownex(r0, 0x10, &(0x7f00000003c0)={0x0, 0x0}) r3 = syz_open_dev$mice(&(0x7f0000000700)='/dev/input/mice\x00', 0x0, 0x0) ioctl$DRM_IOCTL_AGP_INFO(r3, 0x80386433, &(0x7f0000001240)=""/4096) ptrace$peek(0x2, r2, &(0x7f0000000600)) setsockopt$inet_sctp_SCTP_DEFAULT_SEND_PARAM(r0, 0x84, 0xa, &(0x7f0000000380)={0x6, 0x6, 0x4, 0x0, 0x3, 0x9, 0x8, 0x8, r1}, 0x20) sendto$inet(r0, &(0x7f0000fd0000), 0xfffffffffffffec1, 0x20000801, &(0x7f0000deaff0)={0x2, 0x4e23, @loopback=0x7f000001}, 0x10) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000400)) ptrace$setregset(0x4205, 0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000440)="5bb85e11575616a6e17b8f3820dc8cb112d19d828e1bf1e4490ff47c909ab9ce529e5916bf87620bff4dfe9283191b3eb08523ec711596cad6f39edfcd5218b03ee873e80e0f02", 0x47}) getsockopt$inet_sctp6_SCTP_CONTEXT(0xffffffffffffff9c, 0x84, 0x11, &(0x7f0000000080)={0x0}, &(0x7f0000000100)=0x8) getsockopt$inet_sctp_SCTP_GET_PEER_ADDR_INFO(0xffffffffffffffff, 0x84, 0xf, &(0x7f0000000200)={r4, @in6={{0xa, 0x4e22, 0x6, @mcast1={0xff, 0x1, [], 0x1}, 0xff}}, 0x0, 0x8, 0x9, 0x0, 0x674c}, &(0x7f00000002c0)=0x98) sendmsg(0xffffffffffffffff, &(0x7f00000000c0)={&(0x7f0000000000)=@sco={0x1f}, 0x80, &(0x7f0000000080), 0x0, &(0x7f0000000780)=ANY=[@ANYBLOB="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"], 0x18a}, 0x8001) setsockopt$IP_VS_SO_SET_STARTDAEMON(r0, 0x0, 0x48b, &(0x7f0000000300)={0x0, 'ip6gre0\x00', 0x2}, 0x8) getsockopt$inet_sctp6_SCTP_STATUS(0xffffffffffffffff, 0x84, 0xe, &(0x7f0000003580)={r4, 0x4, 0x0, 0x4, 0x4bf, 0x80000001, 0x9, 0x6, {r5, @in={{0x2, 0x4e20, @remote={0xac, 0x14, 0x14, 0xbb}}}, 0x200, 0xb478, 0xfff, 0x4, 0x9}}, &(0x7f0000003640)=0xb0) setsockopt$IP_VS_SO_SET_STOPDAEMON(r0, 0x0, 0x48c, &(0x7f0000000180)={0x1, "6968646470300000000000000200", 0x1}, 0x18) shutdown(r0, 0x0) modify_ldt$write2(0x11, &(0x7f0000000740)={0xc859, 0x20001800, 0xffffffff, 0x5, 0x200000000, 0x8, 0x8, 0x0, 0x1, 0x2}, 0x10) madvise(&(0x7f0000a93000/0x4000)=nil, 0x4000, 0xe) mremap(&(0x7f0000a96000/0x1000)=nil, 0x1000, 0x800000, 0x3, &(0x7f0000130000/0x800000)=nil) ioctl$sock_ipx_SIOCGIFADDR(0xffffffffffffffff, 0x8915, &(0x7f0000665fe0)={"dbc78fc0a6caa717004720a0a32b5f0d", {0x4, 0x0, 0x0, "e0b618b5a2e0"}}) getsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(0xffffffffffffff9c, 0x84, 0x9, &(0x7f0000001140)={0x0, @in6={{0xa, 0x4e23, 0xf00, @mcast1={0xff, 0x1, [], 0x1}, 0xffffffff}}, 0x0, 0x6, 0x0, 0x80000000}, &(0x7f0000001200)=0x98) clone(0x0, &(0x7f0000000040), &(0x7f0000bb3000), &(0x7f0000000140), &(0x7f00000000c0)="fb7ff023f1fcdf8f779076ee77e7598517fec847115a17c5ce2cf1013f7584b5985d360300000000000000c1b6330f77802d03ca0636cfd3a226cf6b40bd3c0d982c") r6 = syz_open_dev$usbmon(&(0x7f0000000640)='/dev/usbmon#\x00', 0x7, 0x620040) ioctl$SNDRV_SEQ_IOCTL_GET_SUBSCRIPTION(r6, 0xc0505350, &(0x7f0000000680)={{0x6, 0x10001}, {}, 0x6, 0x0, 0xe4}) madvise(&(0x7f0000153000/0x800000)=nil, 0x800000, 0xf) pipe(&(0x7f0000652ff8)) connect$ipx(0xffffffffffffffff, &(0x7f00000001c0)={0x4, 0x2e8, 0x0, "0f7287413567"}, 0x10) 2018/03/30 23:06:31 executing program 0 (fault-call:7 fault-nth:42): mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r0 = syz_open_dev$usbmon(&(0x7f0000000400)='/dev/usbmon#\x00', 0x0, 0x0) r1 = perf_event_open(&(0x7f0000223000)={0x2, 0x78, 0xe3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000001980)={{{@in6=@remote, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast2}, 0x0, @in=@multicast2}}, &(0x7f0000001a80)=0xe8) chown(&(0x7f00000004c0)='./file0\x00', r2, 0x0) mount(&(0x7f00000003c0)='./file0\x00', &(0x7f0000000380)='./file0\x00', &(0x7f0000000300)='cgroup2\x00', 0x0, 0x0) r3 = open$dir(&(0x7f000001bff4)='./file0\x00', 0x0, 0x0) mkdirat(r3, &(0x7f0000000280)='./file0\x00', 0x20) getdents64(r3, &(0x7f00000007c0)=""/250, 0x1015a) dup3(r0, r1, 0x80000) r4 = open$dir(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) renameat2(r4, &(0x7f0000000200)='./file1\x00', 0xffffffffffffffff, &(0x7f0000000240)='./file0\x00', 0xfd1092750066ec78) ioctl$KDGKBMODE(0xffffffffffffffff, 0x4b44, &(0x7f0000000140)) 2018/03/30 23:06:31 executing program 2: perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f00000000c0)='./control\x00', 0x0) inotify_init() r0 = syz_open_dev$sg(&(0x7f000028fff7)='/dev/sg#\x00', 0x0, 0x0) ioctl(r0, 0x4000000000001276, &(0x7f0000000040)) msgget(0x2, 0x0) getsockopt$nfc_llcp(0xffffffffffffffff, 0x118, 0x4, &(0x7f0000000740)=""/223, 0xdf) setsockopt$inet_mreq(r0, 0x0, 0x23, &(0x7f00000002c0)={@empty, @remote={0xac, 0x14, 0x14, 0xbb}}, 0x8) accept4$nfc_llcp(0xffffffffffffffff, &(0x7f0000000940), &(0x7f0000000080)=0x60, 0x800) ioctl$SNDRV_CTL_IOCTL_ELEM_INFO(0xffffffffffffffff, 0xc1105511, &(0x7f0000000100)={{0x0, 0x0, 0x0, 0x0, "386aea20273dc03c3d18dd0dbd4a0ca15f9f580393cc4ec3b8ee256b9aa630224ba64c6ff43ee01d2996c914"}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "eda422cd37591b3a5a7a683380f7e0b9e790c6b72cd0a4f3342f7431c1699a305ca3091bb2320e8df4e298a2cca26637866a68c1426ffbd8a6c7da1d8ea77d9d", &(0x7f00000000c0)='/dev/snd/controlC#\x00', 0x13}) r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000003c0)='/proc/self/net/pfkey\x00', 0x800, 0x0) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) add_key$user(&(0x7f0000000480)='user\x00', &(0x7f00000004c0)={0x73, 0x79, 0x7a, 0x3}, &(0x7f0000000500)="d3238eea76b0470531092a0a77b0b49789a0fc97b8f8b9e23a2a5a5a0c169ed6e83480b4801dbf79db3527904ee3128c05ce2806e210237c36b88ceabe99d8784860e5d0e91fe33d38d0133e056cdd1e2910d57fc5eb1b23db3b60a7077ff33bb6c7445cd258ee25f9187269c22d1ed05acb2b9b599bd285b692257a631754ab9befebd3fdb3167361c24c5c5dcf90e476e052b9d22362c57878cb7205fe361346d6beb77b7844fe94", 0xa9, 0xfffffffffffffffe) ioctl$sock_inet_SIOCSIFADDR(r0, 0x8916, &(0x7f0000000300)={'gretap0\x00', {0x2, 0x4e24, @loopback=0x7f000001}}) keyctl$instantiate_iov(0x14, 0x0, &(0x7f0000000780)=[{&(0x7f0000000840)="edb4a01f68d76905035a4ebdd427d31585a5a650581902b1c077f74ca8f1ce7d3e2f6e1c6760433af9664b3f3bebab3a1a1c4ef86f42c39b758accc1e7637bb18d28248dc7a1719b73388830b162613b17fd02220bd1fe2ad86adb96efcfc672d126ae58f745fba0e7534cdbae947449df767bd76a0c38b5752dcd13f7065edea86dc156c0708e76c2c99a94a95f1e93ff73cb3eb94e06d399cf48aaac7963d13e4b3a6b32bc2b19d5461545dcf3f71bb24442d286421f8d891d77a3c4c1c9435bbdf187682c22ded22b669b7790d05b4894166a2d5f33098cf908a23a2e0671d824e88942fbe0bd1416", 0xea}], 0x1, 0x0) r3 = ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) ioctl$KVM_UNREGISTER_COALESCED_MMIO(r3, 0x4010ae68, &(0x7f0000000000)={0x0, 0x5000}) ioctl$KVM_CREATE_PIT2(r3, 0x4040ae77, &(0x7f0000000440)={0xfffffffffffffff7}) ioctl$KVM_CREATE_VCPU(r3, 0xae41, 0x0) setsockopt$inet_tcp_TCP_ULP(r1, 0x6, 0x1f, &(0x7f0000000280)='tls\x00', 0x4) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000005fd8)={'vcan0\x00'}) socket$can_raw(0x1d, 0x3, 0x1) socket$inet6(0xa, 0x0, 0x0) syz_open_dev$dspn(&(0x7f0000000040)='/dev/dsp#\x00', 0x0, 0x0) [ 340.004684] kernel msg: ebtables bug: please report to author: entries_size too small 2018/03/30 23:06:31 executing program 7: perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f00000000c0)='./control\x00', 0x0) r0 = inotify_init() inotify_add_watch(r0, &(0x7f0000f1eff6)='./control\x00', 0x220000000009) getresuid(&(0x7f0000000100), &(0x7f0000000140), &(0x7f0000000180)=0x0) getgroups(0x7, &(0x7f00000001c0)=[0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0]) chown(&(0x7f0000000040)='./control\x00', r1, r2) r3 = inotify_init1(0x0) r4 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000200)='/dev/autofs\x00', 0x141000, 0x0) write$cgroup_type(r4, &(0x7f0000000240)='threaded\x00', 0x9) ioctl$DRM_IOCTL_PRIME_HANDLE_TO_FD(r4, 0xc00c642d, &(0x7f0000001440)={0x0, 0x80000, r4}) ioctl$DRM_IOCTL_PRIME_HANDLE_TO_FD(r4, 0xc00c642d, &(0x7f0000001480)={r5, 0x80000, r4}) inotify_add_watch(r4, &(0x7f0000000080)='./control\x00', 0x2000200) setsockopt$inet6_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, &(0x7f00000014c0)="ef2c2816909e4a09921ad0bd773be4ff", 0x1e38) rmdir(&(0x7f000075aff6)='./control\x00') recvmsg$kcm(r3, &(0x7f0000001400)={&(0x7f0000000280)=@ethernet={0x0, @broadcast}, 0x80, &(0x7f00000003c0)=[{&(0x7f0000000300)=""/172, 0xac}], 0x1, &(0x7f0000000400)=""/4096, 0x1000, 0x7}, 0x10061) ioctl$KDDISABIO(r4, 0x4b37) 2018/03/30 23:06:31 executing program 6: pipe(&(0x7f0000000940)={0xffffffffffffffff, 0xffffffffffffffff}) accept4$ax25(r0, 0x0, &(0x7f0000000080), 0x80000) r1 = socket$inet(0x2, 0x20000000000003, 0x2) connect$inet(r1, &(0x7f0000000000)={0x2, 0x0, @remote={0xac, 0x14, 0x14, 0xbb}}, 0x10) sendmsg(0xffffffffffffffff, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000140), 0x0, &(0x7f0000000180)=ANY=[]}, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000980)=@broute={'broute\x00', 0x20, 0x3, 0x2d9, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000380], 0x0, &(0x7f00000002c0), &(0x7f0000001000)=ANY=[@ANYBLOB="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"]}, 0x351) setsockopt$inet_int(r1, 0x0, 0x2, &(0x7f00000000c0)=0x7fffffff, 0x4) r2 = socket$rds(0x15, 0x5, 0x0) pipe(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$bt_BT_DEFER_SETUP(r3, 0x112, 0x7, &(0x7f0000000280)=0x100, 0x4) accept$packet(r4, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @remote}, &(0x7f0000000100)=0x14) connect$rds(r2, &(0x7f0000000140)={0x2, 0x4e22, @remote={0xac, 0x14, 0x14, 0xbb}}, 0x10) getsockopt$sock_buf(r2, 0x1, 0x3b, &(0x7f0000000180)=""/83, &(0x7f0000000200)=0x53) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000a00)=@filter={'filter\x00', 0xe, 0x4, 0x5a0, 0xffffffff, 0x0, 0xf0, 0xf0, 0xffffffff, 0xffffffff, 0x4d0, 0x4d0, 0x4d0, 0xffffffff, 0x4, &(0x7f0000000300), {[{{@ipv6={@ipv4={[], [0xff, 0xff], @rand_addr=0x80000001}, @dev={0xfe, 0x80, [], 0x16}, [0x0, 0xffffff00, 0xff, 0xffffffff], [0x0, 0xff000000, 0xffffffff], 'ipddp0\x00', 'ip_vti0\x00', {}, {0xff}, 0x6c, 0x2bf}, 0x0, 0xc8, 0xf0}, @REJECT={0x28, 'REJECT\x00', 0x0, {0x7}}}, {{@ipv6={@remote={0xfe, 0x80, [], 0xbb}, @remote={0xfe, 0x80, [], 0xbb}, [0xff000000, 0xffffffff, 0xffffff00, 0xff], [0xff, 0xffffffff, 0x0, 0xff000000], 'syzkaller1\x00', 'eql\x00', {}, {}, 0x62, 0x0, 0x4, 0x1}, 0x0, 0x120, 0x148, 0x0, {}, [@common=@frag={0x30, 'frag\x00', 0x0, {0x7ff, 0x7, 0x1, 0x2}}, @common=@hl={0x28, 'hl\x00', 0x0, {0x3, 0x7fff}}]}, @REJECT={0x28, 'REJECT\x00', 0x0, {0x7}}}, {{@ipv6={@dev={0xfe, 0x80, [], 0xc}, @loopback={0x0, 0x1}, [0xffffffff, 0xffffffff, 0xff000000, 0xff000000], [0xff, 0x0, 0xff, 0xffffff00], 'irlan0\x00', 'vcan0\x00', {0xff}, {}, 0x3b, 0xffffffffffffab69, 0x2, 0x30}, 0x0, 0x250, 0x298, 0x0, {}, [@common=@srh={0x30, 'srh\x00', 0x0, {0xbb, 0x1, 0x3, 0x6, 0xffffffffffffffc0, 0x80}}, @common=@inet=@policy={0x158, 'policy\x00', 0x0, {[{@ipv4, [0xffffffff, 0xff0000ff, 0xff000000, 0xffffffff], @ipv4=@multicast1=0xe0000001, [0xffffffff, 0xffffffff, 0xff000000, 0xffffff00], 0x4d5, 0x3500, 0x5c, 0x0, 0x10, 0xf}, {@ipv6=@dev={0xfe, 0x80, [], 0x11}, [0x0, 0xff000000, 0xff0000ff, 0xffffff00], @ipv4=@multicast1=0xe0000001, [0xffffffff, 0x0, 0x0, 0xffffffff], 0x4d5, 0x3500, 0x77, 0x1, 0x0, 0x1d}, {@ipv6=@mcast1={0xff, 0x1, [], 0x1}, [0xff000000, 0xffffffff, 0xffffff00, 0xff], @ipv4=@multicast2=0xe0000002, [0xffffffff, 0x0, 0xffffff00, 0xffffffff], 0x4d3, 0x3503, 0x7f, 0x0, 0x1, 0x19}, {@ipv4=@local={0xac, 0x14, 0x14, 0xaa}, [0x0, 0xff, 0x0, 0xff0000ff], @ipv6=@local={0xfe, 0x80, [], 0xaa}, [0xffffffff, 0xffffffff, 0xff, 0xff0000ff], 0x4d4, 0x3505, 0x0, 0x1, 0x1f, 0x10}], 0x0, 0x3}}]}, @common=@unspec=@LED={0x48, 'LED\x00', 0x0, {'syz1\x00', 0x0, 0x8, 0x8}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28, '\x00', 0x0, 0xfffffffffffffffe}}}}, 0x600) socket(0x1, 0xa, 0x7) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_TIMER(r4, 0x40605346, &(0x7f0000000680)={0x0, 0x3, {0x3, 0x0, 0x9, 0x3}}) [ 340.134901] FAULT_INJECTION: forcing a failure. [ 340.134901] name failslab, interval 1, probability 0, space 0, times 0 [ 340.146233] CPU: 1 PID: 26737 Comm: syz-executor0 Not tainted 4.16.0-rc7+ #372 [ 340.153591] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 340.162961] Call Trace: [ 340.165553] dump_stack+0x194/0x24d [ 340.169185] ? arch_local_irq_restore+0x53/0x53 [ 340.173871] should_fail+0x8c0/0xa40 [ 340.177591] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 340.182714] ? find_held_lock+0x35/0x1d0 [ 340.186776] ? __lock_is_held+0xb6/0x140 [ 340.190851] ? check_same_owner+0x320/0x320 [ 340.195180] ? rcu_note_context_switch+0x710/0x710 [ 340.200122] should_failslab+0xec/0x120 [ 340.204100] __kmalloc_track_caller+0x5f/0x760 [ 340.208690] ? string+0x180/0x200 [ 340.212144] ? kstrdup_const+0x39/0x50 [ 340.216035] kstrdup+0x39/0x70 [ 340.219229] kstrdup_const+0x39/0x50 [ 340.222945] __kernfs_new_node+0xa2/0x570 [ 340.227095] ? kernfs_dop_revalidate+0x380/0x380 [ 340.231851] ? delete_node+0x2db/0xbc0 [ 340.235740] ? snprintf+0xc0/0xf0 [ 340.239174] ? vsprintf+0x40/0x40 [ 340.242609] ? trace_event_raw_event_lock+0x340/0x340 [ 340.247783] kernfs_new_node+0x80/0xe0 [ 340.251650] __kernfs_create_file+0x4b/0x320 [ 340.256048] cgroup_addrm_files+0x3c5/0xa70 [ 340.260356] ? cgroup_file_write+0x710/0x710 [ 340.264746] ? cgroup_idr_replace+0x3f/0x50 [ 340.269053] ? __lock_is_held+0xb6/0x140 [ 340.273096] ? __local_bh_enable_ip+0x121/0x230 [ 340.277741] ? online_css+0x224/0x2e0 [ 340.281522] css_populate_dir+0x198/0x420 [ 340.285653] cgroup_apply_control_enable+0x390/0xbc0 [ 340.290740] ? cgroup_propagate_control+0x570/0x570 [ 340.295737] ? css_populate_dir+0x289/0x420 [ 340.300045] cgroup_mkdir+0x56f/0xfc0 [ 340.303823] ? __lock_is_held+0xb6/0x140 [ 340.307865] ? cgroup_destroy_locked+0x750/0x750 [ 340.312598] ? rcu_read_lock_sched_held+0x108/0x120 [ 340.317592] ? kmem_cache_free+0x258/0x2a0 [ 340.321804] ? set_nlink+0xc1/0x160 [ 340.325406] ? debug_lockdep_rcu_enabled+0x77/0x90 [ 340.330315] ? generic_permission+0x105/0x3c0 [ 340.334792] ? cgroup_destroy_locked+0x750/0x750 [ 340.339526] kernfs_iop_mkdir+0x153/0x1e0 [ 340.343652] vfs_mkdir+0x390/0x600 [ 340.347173] SyS_mkdirat+0x22b/0x2b0 [ 340.350864] ? SyS_mknod+0x480/0x480 [ 340.354555] ? trace_hardirqs_on+0xd/0x10 [ 340.358682] ? do_syscall_64+0xb7/0x940 [ 340.362634] ? SyS_mknod+0x480/0x480 [ 340.366325] do_syscall_64+0x281/0x940 [ 340.370189] ? vmalloc_sync_all+0x30/0x30 [ 340.374314] ? _raw_spin_unlock_irq+0x27/0x70 [ 340.378784] ? finish_task_switch+0x1c1/0x7e0 [ 340.383255] ? syscall_return_slowpath+0x550/0x550 [ 340.388160] ? syscall_return_slowpath+0x2ac/0x550 [ 340.393066] ? prepare_exit_to_usermode+0x350/0x350 [ 340.398064] ? entry_SYSCALL_64_after_hwframe+0x52/0xb7 [ 340.403409] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 340.408232] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 340.413398] RIP: 0033:0x454e79 [ 340.416561] RSP: 002b:00007f016b92fc68 EFLAGS: 00000246 ORIG_RAX: 0000000000000102 [ 340.424247] RAX: ffffffffffffffda RBX: 00007f016b9306d4 RCX: 0000000000454e79 2018/03/30 23:06:31 executing program 7: perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f00000000c0)='./control\x00', 0x0) r0 = inotify_init() inotify_add_watch(r0, &(0x7f0000f1eff6)='./control\x00', 0x220000000009) inotify_init1(0x0) inotify_add_watch(r0, &(0x7f000001eff6)='./control\x00', 0x2000200) setsockopt$inet6_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, &(0x7f0000000080)="5fce869db66fa225921ad03d773be4ff", 0x10) inotify_init1(0x80000) rmdir(&(0x7f000075aff6)='./control\x00') 2018/03/30 23:06:31 executing program 4: mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount(&(0x7f000000a000)='./file0\x00', &(0x7f0000026ff8)='./file0\x00', &(0x7f000000c000)='ramfs\x00', 0x0, &(0x7f000000a000)) mkdir(&(0x7f0000000000)='./file1\x00', 0x0) mount(&(0x7f0000000040)='./file0\x00', &(0x7f0000903000)='./file0\x00', &(0x7f0000811ffa)='bdev\x00', 0x100000, &(0x7f00000003c0)="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") r0 = dup(0xffffffffffffffff) r1 = syz_open_dev$vcsn(&(0x7f00000000c0)='/dev/vcs#\x00', 0x2, 0x20800) renameat(r0, &(0x7f0000000080)='./file1/file0\x00', r1, &(0x7f0000000140)='./file1\x00') mount(&(0x7f0000fb6000)='./file0\x00', &(0x7f0000d78000)='.', &(0x7f0000fdb000)='ubifs\x00', 0x1003, 0x0) chdir(&(0x7f00000002c0)='./file1/file0\x00') mount(&(0x7f00002b9ff8)='./file0\x00', &(0x7f0000cbeff8)='./file0\x00', &(0x7f00005f7ffa)='ramfs\x00', 0x80000, &(0x7f000002f000)) mount(&(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)='./file1\x00', &(0x7f0000000200)='anon_inodefs\x00', 0x2000, &(0x7f0000000240)) mount(&(0x7f0000adcff8)='./file0\x00', &(0x7f0000e08fff)='.', &(0x7f00005e9000)='cifs\x00', 0x2000, &(0x7f0000ad5000)) getsockopt$inet_sctp_SCTP_STREAM_SCHEDULER(r0, 0x84, 0x7b, &(0x7f0000000100)={0x0, 0x101}, &(0x7f0000000240)=0x8) setsockopt$inet_sctp_SCTP_ENABLE_STREAM_RESET(r0, 0x84, 0x76, &(0x7f0000000280)={r2, 0x7}, 0x8) rmdir(&(0x7f0000000300)='./file1\x00') 2018/03/30 23:06:31 executing program 5: mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) perf_event_open(&(0x7f0000223000)={0x2, 0x78, 0xe3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$audio(0xffffffffffffff9c, &(0x7f0000000040)='/dev/audio\x00', 0x101000, 0x0) setsockopt$packet_fanout_data(r0, 0x107, 0x16, &(0x7f0000000100)={0x2, &(0x7f00000000c0)=[{0x4, 0x2, 0xffffffff, 0x2}, {0x5, 0x8, 0xff, 0x1f}]}, 0x10) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000001980)={{{@in6=@remote, @in=@multicast1}}, {{@in=@multicast2}, 0x0, @in=@multicast2}}, &(0x7f0000001a80)=0xe8) mount(&(0x7f00000003c0)='./file0\x00', &(0x7f0000000380)='./file0\x00', &(0x7f0000000300)='cgroup2\x00', 0x0, 0x0) r1 = open$dir(&(0x7f000001bff4)='./file0\x00', 0x0, 0x0) mkdirat(0xffffffffffffffff, &(0x7f0000000280)='./file0\x00', 0x20) unlinkat(r1, &(0x7f0000000080)='./file0\x00', 0x200) [ 340.431496] RDX: 0000000000000020 RSI: 0000000020000280 RDI: 0000000000000015 [ 340.438742] RBP: 000000000072bea0 R08: 0000000000000000 R09: 0000000000000000 [ 340.445997] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000016 [ 340.453248] R13: 00000000000003eb R14: 00000000006f7ea8 R15: 000000000000002a [ 340.460910] cgroup: cgroup_addrm_files: failed to add stat, err=-12 [ 340.486550] kernel msg: ebtables bug: please report to author: entries_size too small 2018/03/30 23:06:32 executing program 2: perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f00000000c0)='./control\x00', 0x0) inotify_init() r0 = syz_open_dev$sg(&(0x7f000028fff7)='/dev/sg#\x00', 0x0, 0x0) ioctl(r0, 0x4000000000001276, &(0x7f0000000040)) msgget(0x2, 0x0) getsockopt$nfc_llcp(0xffffffffffffffff, 0x118, 0x4, &(0x7f0000000740)=""/223, 0xdf) setsockopt$inet_mreq(r0, 0x0, 0x23, &(0x7f00000002c0)={@empty, @remote={0xac, 0x14, 0x14, 0xbb}}, 0x8) accept4$nfc_llcp(0xffffffffffffffff, &(0x7f0000000940), &(0x7f0000000080)=0x60, 0x800) ioctl$SNDRV_CTL_IOCTL_ELEM_INFO(0xffffffffffffffff, 0xc1105511, &(0x7f0000000100)={{0x0, 0x0, 0x0, 0x0, "386aea20273dc03c3d18dd0dbd4a0ca15f9f580393cc4ec3b8ee256b9aa630224ba64c6ff43ee01d2996c914"}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "eda422cd37591b3a5a7a683380f7e0b9e790c6b72cd0a4f3342f7431c1699a305ca3091bb2320e8df4e298a2cca26637866a68c1426ffbd8a6c7da1d8ea77d9d", &(0x7f00000000c0)='/dev/snd/controlC#\x00', 0x13}) r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000003c0)='/proc/self/net/pfkey\x00', 0x800, 0x0) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) add_key$user(&(0x7f0000000480)='user\x00', &(0x7f00000004c0)={0x73, 0x79, 0x7a, 0x3}, &(0x7f0000000500)="d3238eea76b0470531092a0a77b0b49789a0fc97b8f8b9e23a2a5a5a0c169ed6e83480b4801dbf79db3527904ee3128c05ce2806e210237c36b88ceabe99d8784860e5d0e91fe33d38d0133e056cdd1e2910d57fc5eb1b23db3b60a7077ff33bb6c7445cd258ee25f9187269c22d1ed05acb2b9b599bd285b692257a631754ab9befebd3fdb3167361c24c5c5dcf90e476e052b9d22362c57878cb7205fe361346d6beb77b7844fe94", 0xa9, 0xfffffffffffffffe) ioctl$sock_inet_SIOCSIFADDR(r0, 0x8916, &(0x7f0000000300)={'gretap0\x00', {0x2, 0x4e24, @loopback=0x7f000001}}) keyctl$instantiate_iov(0x14, 0x0, &(0x7f0000000780)=[{&(0x7f0000000840)="edb4a01f68d76905035a4ebdd427d31585a5a650581902b1c077f74ca8f1ce7d3e2f6e1c6760433af9664b3f3bebab3a1a1c4ef86f42c39b758accc1e7637bb18d28248dc7a1719b73388830b162613b17fd02220bd1fe2ad86adb96efcfc672d126ae58f745fba0e7534cdbae947449df767bd76a0c38b5752dcd13f7065edea86dc156c0708e76c2c99a94a95f1e93ff73cb3eb94e06d399cf48aaac7963d13e4b3a6b32bc2b19d5461545dcf3f71bb24442d286421f8d891d77a3c4c1c9435bbdf187682c22ded22b669b7790d05b4894166a2d5f33098cf908a23a2e0671d824e88942fbe0bd1416", 0xea}], 0x1, 0x0) r3 = ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) ioctl$KVM_UNREGISTER_COALESCED_MMIO(r3, 0x4010ae68, &(0x7f0000000000)={0x0, 0x5000}) ioctl$KVM_CREATE_PIT2(r3, 0x4040ae77, &(0x7f0000000440)={0xfffffffffffffff7}) ioctl$KVM_CREATE_VCPU(r3, 0xae41, 0x0) setsockopt$inet_tcp_TCP_ULP(r1, 0x6, 0x1f, &(0x7f0000000280)='tls\x00', 0x4) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000005fd8)={'vcan0\x00'}) socket$can_raw(0x1d, 0x3, 0x1) socket$inet6(0xa, 0x0, 0x0) connect$vsock_stream(0xffffffffffffffff, &(0x7f0000000080)={0x28, 0x0, 0xffffffff, @my=0x1}, 0x10) 2018/03/30 23:06:32 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x200, 0x0) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000680)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$sock_linger(r2, 0x1, 0xd, &(0x7f00000006c0)={0x400, 0x9}, 0x8) perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x0, 0x0) r3 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) mmap(&(0x7f0000000000/0x9d7000)=nil, 0x9d7000, 0x0, 0x10, 0xffffffffffffffff, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x7) perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r4 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r4, &(0x7f0000e5b000)={0x2, 0x4e20, @multicast1=0xe0000001}, 0x10) syz_open_dev$sg(&(0x7f0000000440)='/dev/sg#\x00', 0x0, 0x0) connect$inet(r4, &(0x7f0000000100)={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x11}}, 0x10) r5 = bpf$PROG_LOAD(0x5, &(0x7f0000eb0fb8)={0x1, 0x3, &(0x7f00009ff000)=@framed={{0x18}, [], {0x95}}, &(0x7f00002bf000)='syzkaller\x00', 0x4, 0xb7, &(0x7f00006ab000)=""/183}, 0x48) setsockopt$inet_tcp_int(r4, 0x6, 0x19, &(0x7f0000000240)=0x8, 0x4) r6 = socket$kcm(0x29, 0x2, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r6, 0x89e0, &(0x7f000031aff8)={r4, r5}) ioctl$sock_kcm_SIOCKCMCLONE(r6, 0x89e2, &(0x7f00000002c0)={0xffffffffffffffff}) sendmsg$nl_xfrm(r7, &(0x7f0000000780)={&(0x7f0000000200)={0x10}, 0xc, &(0x7f0000000740)={&(0x7f0000000480)=@updpolicy={0xb8, 0x19, 0x0, 0x0, 0x0, {{@in=@loopback=0x7f000001, @in6=@mcast1={0xff, 0x1, [], 0x1}}}}, 0xffcb}, 0x1}, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(r7, 0x89e1, &(0x7f0000000040)={r4}) r8 = fcntl$getown(r3, 0x9) recvfrom$inet6(r1, &(0x7f0000000140)=""/177, 0xb1, 0x40000000, &(0x7f0000000080)={0xa, 0x4e23, 0x9}, 0x1c) r9 = accept4$inet(0xffffffffffffff9c, &(0x7f0000000700)={0x0, 0x0, @broadcast}, &(0x7f0000000740)=0x10, 0x80000) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r9, 0x84, 0x64, &(0x7f0000000780)=[@in6={0xa, 0x4e22, 0xfffffffffffff7e1, @mcast2={0xff, 0x2, [], 0x1}, 0x8}, @in={0x2, 0x4e24, @broadcast=0xffffffff}], 0x2c) ptrace$setregset(0x4205, r8, 0x0, &(0x7f00000005c0)={&(0x7f0000000080)}) ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r10 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x1fffd, 0x0) r11 = syz_open_dev$sndtimer(&(0x7f00000000c0)='/dev/snd/timer\x00', 0x0, 0x0) read(r11, &(0x7f0000ec6000)=""/50, 0x32) fcntl$dupfd(r11, 0x0, r10) 2018/03/30 23:06:32 executing program 3: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f0000366000)={0x2, 0x4e23, @broadcast=0xffffffff}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000f5eff5)='lp\x00', 0x4) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f0000000140)={0x1, [0x0]}, &(0x7f0000000340)=0x8) fcntl$getownex(r0, 0x10, &(0x7f00000003c0)={0x0, 0x0}) r3 = syz_open_dev$mice(&(0x7f0000000700)='/dev/input/mice\x00', 0x0, 0x0) ioctl$DRM_IOCTL_AGP_INFO(r3, 0x80386433, &(0x7f0000001240)=""/4096) ptrace$peek(0x2, r2, &(0x7f0000000600)) setsockopt$inet_sctp_SCTP_DEFAULT_SEND_PARAM(r0, 0x84, 0xa, &(0x7f0000000380)={0x6, 0x6, 0x4, 0x0, 0x3, 0x9, 0x8, 0x8, r1}, 0x20) sendto$inet(r0, &(0x7f0000fd0000), 0xfffffffffffffec1, 0x20000801, &(0x7f0000deaff0)={0x2, 0x4e23, @loopback=0x7f000001}, 0x10) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000400)) ptrace$setregset(0x4205, 0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000440)="5bb85e11575616a6e17b8f3820dc8cb112d19d828e1bf1e4490ff47c909ab9ce529e5916bf87620bff4dfe9283191b3eb08523ec711596cad6f39edfcd5218b03ee873e80e0f02", 0x47}) getsockopt$inet_sctp6_SCTP_CONTEXT(0xffffffffffffff9c, 0x84, 0x11, &(0x7f0000000080)={0x0}, &(0x7f0000000100)=0x8) getsockopt$inet_sctp_SCTP_GET_PEER_ADDR_INFO(0xffffffffffffffff, 0x84, 0xf, &(0x7f0000000200)={r4, @in6={{0xa, 0x4e22, 0x6, @mcast1={0xff, 0x1, [], 0x1}, 0xff}}, 0x0, 0x8, 0x9, 0x0, 0x674c}, &(0x7f00000002c0)=0x98) sendmsg(0xffffffffffffffff, &(0x7f00000000c0)={&(0x7f0000000000)=@sco={0x1f}, 0x80, &(0x7f0000000080), 0x0, &(0x7f0000000780)=ANY=[@ANYBLOB="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"], 0x18a}, 0x8001) setsockopt$IP_VS_SO_SET_STARTDAEMON(r0, 0x0, 0x48b, &(0x7f0000000300)={0x0, 'ip6gre0\x00', 0x2}, 0x8) getsockopt$inet_sctp6_SCTP_STATUS(0xffffffffffffffff, 0x84, 0xe, &(0x7f0000003580)={r4, 0x4, 0x0, 0x4, 0x4bf, 0x80000001, 0x9, 0x6, {r5, @in={{0x2, 0x4e20, @remote={0xac, 0x14, 0x14, 0xbb}}}, 0x200, 0xb478, 0xfff, 0x4, 0x9}}, &(0x7f0000003640)=0xb0) setsockopt$IP_VS_SO_SET_STOPDAEMON(r0, 0x0, 0x48c, &(0x7f0000000180)={0x1, "6968646470300000000000000200", 0x1}, 0x18) shutdown(r0, 0x0) modify_ldt$write2(0x11, &(0x7f0000000740)={0xc859, 0x20001800, 0xffffffff, 0x5, 0x200000000, 0x8, 0x8, 0x0, 0x1, 0x2}, 0x10) madvise(&(0x7f0000a93000/0x4000)=nil, 0x4000, 0xe) mremap(&(0x7f0000a96000/0x1000)=nil, 0x1000, 0x800000, 0x3, &(0x7f0000130000/0x800000)=nil) ioctl$sock_ipx_SIOCGIFADDR(0xffffffffffffffff, 0x8915, &(0x7f0000665fe0)={"dbc78fc0a6caa717004720a0a32b5f0d", {0x4, 0x0, 0x0, "e0b618b5a2e0"}}) getsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(0xffffffffffffff9c, 0x84, 0x9, &(0x7f0000001140)={0x0, @in6={{0xa, 0x4e23, 0xf00, @mcast1={0xff, 0x1, [], 0x1}, 0xffffffff}}, 0x0, 0x6, 0x0, 0x80000000}, &(0x7f0000001200)=0x98) r6 = syz_open_dev$usbmon(&(0x7f0000000640)='/dev/usbmon#\x00', 0x7, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_SUBSCRIPTION(r6, 0xc0505350, &(0x7f0000000680)={{0x6, 0x10001}, {0x0, 0x6}, 0x6, 0x4, 0xe4}) madvise(&(0x7f0000153000/0x800000)=nil, 0x800000, 0xf) pipe(&(0x7f0000652ff8)) connect$ipx(0xffffffffffffffff, &(0x7f00000001c0)={0x4, 0x2e8, 0x0, "0f7287413567"}, 0x10) 2018/03/30 23:06:32 executing program 4: mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount(&(0x7f000000a000)='./file0\x00', &(0x7f0000026ff8)='./file0\x00', &(0x7f000000c000)='ramfs\x00', 0x0, &(0x7f000000a000)) mkdir(&(0x7f0000000000)='./file1\x00', 0x0) mount(&(0x7f0000000040)='./file0\x00', &(0x7f0000903000)='./file0\x00', &(0x7f0000811ffa)='bdev\x00', 0x100000, &(0x7f00000003c0)="b4654e059fcebd03cc73f9239f6a07ed22ce66385d2337eef2a66d904034c83627a12afc1ecb8d7e1142c51440c631a77475529f58d06474cd08984ca20eda40006f352aef263558961ab3f1ff300b08a5b54aea2a56162623142af3cce1057c8ee9eb15dc98e01846afc544b424ae134364f0ff76c92d9ce550f032a00c5981d459112f5c70789ed3bbb5527400465c6a98b4e0432a1ca8ce37dfdc7619e8b4129ee976c9b944bc6b366dbc5f0dae558fa30da2267dfccc6187d2d6f34d725343470a748007fee97ba3784d030b833463699073719ca14a0e9b6d74a70db8b216256fcd74c66a0faac2ccc16c74a7e13289091a5256dd062edf07ff4d9168e49b0820c6bb9fbabc587b54dacb9834b644eafefc1e0a4dd249c45cac5858364765a08967ed59ac86aefcb7d13e3e9cdf7c7262122bc4cfd718c3fd984395afa896d48a48489f889bd4efac7267dffdff0c686fae") r0 = dup(0xffffffffffffffff) r1 = syz_open_dev$vcsn(&(0x7f00000000c0)='/dev/vcs#\x00', 0x2, 0x20800) renameat(r0, &(0x7f0000000080)='./file1/file0\x00', r1, &(0x7f0000000100)='./file1\x00') mount(&(0x7f0000fb6000)='./file0\x00', &(0x7f0000d78000)='.', &(0x7f0000fdb000)='ubifs\x00', 0x1003, 0x0) mount(&(0x7f00002b9ff8)='./file0\x00', &(0x7f0000cbeff8)='./file0\x00', &(0x7f00005f7ffa)='ramfs\x00', 0x80000, &(0x7f000002f000)) mount(&(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)='./file1\x00', &(0x7f0000000200)='anon_inodefs\x00', 0x2000, &(0x7f0000000240)) setsockopt$inet_int(r0, 0x0, 0x17, &(0x7f0000000140)=0x7, 0x4) mount(&(0x7f0000adcff8)='./file0\x00', &(0x7f0000e08fff)='.', &(0x7f00005e9000)='cifs\x00', 0x2000, &(0x7f0000ad5000)) 2018/03/30 23:06:32 executing program 7: perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f00000000c0)='./control\x00', 0x0) r0 = inotify_init() inotify_add_watch(r0, &(0x7f0000f1eff6)='./control\x00', 0x220000000009) r1 = inotify_init1(0x0) inotify_add_watch(r1, &(0x7f000001eff6)='./control\x00', 0x2000200) remap_file_pages(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x0, 0x5e, 0x8000) setsockopt$inet6_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, &(0x7f0000000080)="5fce869db66fa225921ad03d773be4ff", 0x10) rmdir(&(0x7f0000000140)='./control\x00') 2018/03/30 23:06:32 executing program 6: pipe(&(0x7f0000000940)={0xffffffffffffffff, 0xffffffffffffffff}) accept4$ax25(r0, 0x0, &(0x7f0000000080), 0x80000) r1 = socket$inet(0x2, 0x20000000000003, 0x2) connect$inet(r1, &(0x7f0000000000)={0x2, 0x0, @remote={0xac, 0x14, 0x14, 0xbb}}, 0x10) sendmsg(0xffffffffffffffff, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000140), 0x0, &(0x7f0000000180)=ANY=[]}, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000980)=@broute={'broute\x00', 0x20, 0x3, 0x2d9, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000380], 0x0, &(0x7f00000002c0), &(0x7f0000001000)=ANY=[@ANYBLOB="00000000000000000000000000000000000000000000000000000000000000000000000000000000feffffff0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000ffffffff010000000b00000008000000600469666230000000000000000000000000736974300000000000000000000000007663616e300000000000000000000000626f6e643000000000000000000000000180c200000e00ffff00ffffaaaaaaaaaaaaffffff0000ff000008010000d001000048020000706879736465760000000000000000000000000000000000000000000000000070000000000000006e723000000000000000000000000000000000000000000000000000000000000000000000000000000000000000766c616e300000003a9c4ebb9f24dc06a52c000000000000000000000000000000000000000000ff0000000000000000000000000000000101000000000000000000000000000000000000004c45440000000000000000000000000000000000000000000000000000000000280000000000000073797a310000000000000000000000000000000000000000000000004000000000000000000000004e464c4f470000000000000000000000000000000000000000000000000000005000000000000000000000000000000000000000692ef8a72c6779a914df06a44b35b0eafd833141b590148ad8c2d17b06e81aa50bc466307f618025cda16029da79ca01cd7bf2fa8433c6000000004e464c4f470000000000000000000000000000000000000000000000000000005000000000000000000000000000000000000000f7040c3bd532a607b6540847e9980255ac80a05048ee3c578fd00c809822ab1ff7d12707561fdd7b1bcbd7c428bd7449152a676a0e0fc0823ebe89b10758fffe5c92f48f0000000000000000000000000000000000000000000000000000000000000000000000000000000001000000fcffffff"]}, 0x351) setsockopt$inet_int(r1, 0x0, 0x2, &(0x7f00000000c0)=0x7fffffff, 0x4) r2 = socket$rds(0x15, 0x5, 0x0) pipe(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$bt_BT_DEFER_SETUP(r3, 0x112, 0x7, &(0x7f0000000280)=0x100, 0x4) accept$packet(r4, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @remote}, &(0x7f0000000100)=0x14) connect$rds(r2, &(0x7f0000000140)={0x2, 0x4e22, @remote={0xac, 0x14, 0x14, 0xbb}}, 0x10) getsockopt$sock_buf(r2, 0x1, 0x3b, &(0x7f0000000180)=""/83, &(0x7f0000000200)=0x53) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000a00)=@filter={'filter\x00', 0xe, 0x4, 0x5a0, 0xffffffff, 0x0, 0xf0, 0xf0, 0xffffffff, 0xffffffff, 0x4d0, 0x4d0, 0x4d0, 0xffffffff, 0x4, &(0x7f0000000300), {[{{@ipv6={@ipv4={[], [0xff, 0xff], @rand_addr=0x80000001}, @dev={0xfe, 0x80, [], 0x16}, [0x0, 0xffffff00, 0xff, 0xffffffff], [0x0, 0xff000000, 0xffffffff], 'ipddp0\x00', 'ip_vti0\x00', {}, {0xff}, 0x6c, 0x2bf}, 0x0, 0xc8, 0xf0}, @REJECT={0x28, 'REJECT\x00', 0x0, {0x7}}}, {{@ipv6={@remote={0xfe, 0x80, [], 0xbb}, @remote={0xfe, 0x80, [], 0xbb}, [0xff000000, 0xffffffff, 0xffffff00, 0xff], [0xff, 0xffffffff, 0x0, 0xff000000], 'syzkaller1\x00', 'eql\x00', {}, {}, 0x62, 0x0, 0x4, 0x1}, 0x0, 0x120, 0x148, 0x0, {}, [@common=@frag={0x30, 'frag\x00', 0x0, {0x7ff, 0x7, 0x1, 0x2}}, @common=@hl={0x28, 'hl\x00', 0x0, {0x3, 0x7fff}}]}, @REJECT={0x28, 'REJECT\x00', 0x0, {0x7}}}, {{@ipv6={@dev={0xfe, 0x80, [], 0xc}, @loopback={0x0, 0x1}, [0xffffffff, 0xffffffff, 0xff000000, 0xff000000], [0xff, 0x0, 0xff, 0xffffff00], 'irlan0\x00', 'vcan0\x00', {0xff}, {}, 0x3b, 0xffffffffffffab69, 0x2, 0x30}, 0x0, 0x250, 0x298, 0x0, {}, [@common=@srh={0x30, 'srh\x00', 0x0, {0xbb, 0x1, 0x3, 0x6, 0xffffffffffffffc0, 0x80}}, @common=@inet=@policy={0x158, 'policy\x00', 0x0, {[{@ipv4, [0xffffffff, 0xff0000ff, 0xff000000, 0xffffffff], @ipv4=@multicast1=0xe0000001, [0xffffffff, 0xffffffff, 0xff000000, 0xffffff00], 0x4d5, 0x3500, 0x5c, 0x0, 0x10, 0xf}, {@ipv6=@dev={0xfe, 0x80, [], 0x11}, [0x0, 0xff000000, 0xff0000ff, 0xffffff00], @ipv4=@multicast1=0xe0000001, [0xffffffff, 0x0, 0x0, 0xffffffff], 0x4d5, 0x3500, 0x77, 0x1, 0x0, 0x1d}, {@ipv6=@mcast1={0xff, 0x1, [], 0x1}, [0xff000000, 0xffffffff, 0xffffff00, 0xff], @ipv4=@multicast2=0xe0000002, [0xffffffff, 0x0, 0xffffff00, 0xffffffff], 0x4d3, 0x3503, 0x7f, 0x0, 0x1, 0x19}, {@ipv4=@local={0xac, 0x14, 0x14, 0xaa}, [0x0, 0xff, 0x0, 0xff0000ff], @ipv6=@local={0xfe, 0x80, [], 0xaa}, [0xffffffff, 0xffffffff, 0xff, 0xff0000ff], 0x4d4, 0x3505, 0x0, 0x1, 0x1f, 0x10}], 0x0, 0x3}}]}, @common=@unspec=@LED={0x48, 'LED\x00', 0x0, {'syz1\x00', 0x0, 0x8, 0x8}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28, '\x00', 0x0, 0xfffffffffffffffe}}}}, 0x600) socket(0x1, 0xa, 0x7) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_TIMER(r4, 0x40605346, &(0x7f0000000680)={0x1, 0x0, {0x3, 0x0, 0x9, 0x3}}) 2018/03/30 23:06:32 executing program 0 (fault-call:7 fault-nth:43): mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r0 = syz_open_dev$usbmon(&(0x7f0000000400)='/dev/usbmon#\x00', 0x0, 0x0) r1 = perf_event_open(&(0x7f0000223000)={0x2, 0x78, 0xe3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000001980)={{{@in6=@remote, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast2}, 0x0, @in=@multicast2}}, &(0x7f0000001a80)=0xe8) chown(&(0x7f00000004c0)='./file0\x00', r2, 0x0) mount(&(0x7f00000003c0)='./file0\x00', &(0x7f0000000380)='./file0\x00', &(0x7f0000000300)='cgroup2\x00', 0x0, 0x0) r3 = open$dir(&(0x7f000001bff4)='./file0\x00', 0x0, 0x0) mkdirat(r3, &(0x7f0000000280)='./file0\x00', 0x20) getdents64(r3, &(0x7f00000007c0)=""/250, 0x1015a) dup3(r0, r1, 0x80000) r4 = open$dir(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) renameat2(r4, &(0x7f0000000200)='./file1\x00', 0xffffffffffffffff, &(0x7f0000000240)='./file0\x00', 0xfd1092750066ec78) ioctl$KDGKBMODE(0xffffffffffffffff, 0x4b44, &(0x7f0000000140)) 2018/03/30 23:06:32 executing program 5: mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r0 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer\x00', 0x200001, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f00000000c0)={'ip6gre0\x00', 0xe00}) perf_event_open(&(0x7f0000223000)={0x2, 0x78, 0xe3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000001980)={{{@in6=@remote, @in=@multicast1}}, {{@in=@multicast2}, 0x0, @in=@multicast2}}, &(0x7f0000001a80)=0xe8) mount(&(0x7f00000003c0)='./file0\x00', &(0x7f0000000380)='./file0\x00', &(0x7f0000000300)='cgroup2\x00', 0x0, 0x0) r1 = open$dir(&(0x7f000001bff4)='./file0\x00', 0x0, 0x0) mkdirat(0xffffffffffffffff, &(0x7f0000000280)='./file0\x00', 0x20) unlinkat(r1, &(0x7f0000000080)='./file0\x00', 0x200) [ 341.001501] kernel msg: ebtables bug: please report to author: entries_size too small [ 341.029131] FAULT_INJECTION: forcing a failure. [ 341.029131] name failslab, interval 1, probability 0, space 0, times 0 [ 341.040466] CPU: 1 PID: 26781 Comm: syz-executor0 Not tainted 4.16.0-rc7+ #372 2018/03/30 23:06:32 executing program 6: pipe(&(0x7f0000000940)={0xffffffffffffffff, 0xffffffffffffffff}) accept4$ax25(r0, 0x0, &(0x7f0000000080), 0x80000) r1 = socket$inet(0x2, 0x20000000000003, 0x2) connect$inet(r1, &(0x7f0000000000)={0x2, 0x0, @remote={0xac, 0x14, 0x14, 0xbb}}, 0x10) sendmsg(0xffffffffffffffff, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000140), 0x0, &(0x7f0000000180)=ANY=[]}, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000980)=@broute={'broute\x00', 0x20, 0x3, 0x2d9, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000380], 0x0, &(0x7f00000002c0), &(0x7f0000001000)=ANY=[@ANYBLOB="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"]}, 0x351) setsockopt$inet_int(r1, 0x0, 0x2, &(0x7f00000000c0)=0x7fffffff, 0x4) r2 = socket$rds(0x15, 0x5, 0x0) pipe(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$bt_BT_DEFER_SETUP(r3, 0x112, 0x7, &(0x7f0000000280)=0x100, 0x4) accept$packet(r4, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @remote}, &(0x7f0000000100)=0x14) connect$rds(r2, &(0x7f0000000140)={0x2, 0x4e22, @remote={0xac, 0x14, 0x14, 0xbb}}, 0x10) getsockopt$sock_buf(r2, 0x1, 0x3b, &(0x7f0000000180)=""/83, &(0x7f0000000200)=0x53) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000a00)=@filter={'filter\x00', 0xe, 0x4, 0x5a0, 0xffffffff, 0x0, 0xf0, 0xf0, 0xffffffff, 0xffffffff, 0x4d0, 0x4d0, 0x4d0, 0xffffffff, 0x4, &(0x7f0000000300), {[{{@ipv6={@ipv4={[], [0xff, 0xff], @rand_addr=0x80000001}, @dev={0xfe, 0x80, [], 0x16}, [0x0, 0xffffff00, 0xff, 0xffffffff], [0x0, 0xff000000, 0xffffffff], 'ipddp0\x00', 'ip_vti0\x00', {}, {0xff}, 0x6c, 0x2bf}, 0x0, 0xc8, 0xf0}, @REJECT={0x28, 'REJECT\x00', 0x0, {0x7}}}, {{@ipv6={@remote={0xfe, 0x80, [], 0xbb}, @remote={0xfe, 0x80, [], 0xbb}, [0xff000000, 0xffffffff, 0xffffff00, 0xff], [0xff, 0xffffffff, 0x0, 0xff000000], 'syzkaller1\x00', 'eql\x00', {}, {}, 0x62, 0x0, 0x4, 0x1}, 0x0, 0x120, 0x148, 0x0, {}, [@common=@frag={0x30, 'frag\x00', 0x0, {0x7ff, 0x7, 0x1, 0x2}}, @common=@hl={0x28, 'hl\x00', 0x0, {0x3, 0x7fff}}]}, @REJECT={0x28, 'REJECT\x00', 0x0, {0x7}}}, {{@ipv6={@dev={0xfe, 0x80, [], 0xc}, @loopback={0x0, 0x1}, [0xffffffff, 0xffffffff, 0xff000000, 0xff000000], [0xff, 0x0, 0xff, 0xffffff00], 'irlan0\x00', 'vcan0\x00', {0xff}, {}, 0x3b, 0xffffffffffffab69, 0x2, 0x30}, 0x0, 0x250, 0x298, 0x0, {}, [@common=@srh={0x30, 'srh\x00', 0x0, {0xbb, 0x1, 0x3, 0x6, 0xffffffffffffffc0, 0x80}}, @common=@inet=@policy={0x158, 'policy\x00', 0x0, {[{@ipv4, [0xffffffff, 0xff0000ff, 0xff000000, 0xffffffff], @ipv4=@multicast1=0xe0000001, [0xffffffff, 0xffffffff, 0xff000000, 0xffffff00], 0x4d5, 0x3500, 0x5c, 0x0, 0x10, 0xf}, {@ipv6=@dev={0xfe, 0x80, [], 0x11}, [0x0, 0xff000000, 0xff0000ff, 0xffffff00], @ipv4=@multicast1=0xe0000001, [0xffffffff, 0x0, 0x0, 0xffffffff], 0x4d5, 0x3500, 0x77, 0x1, 0x0, 0x1d}, {@ipv6=@mcast1={0xff, 0x1, [], 0x1}, [0xff000000, 0xffffffff, 0xffffff00, 0xff], @ipv4=@multicast2=0xe0000002, [0xffffffff, 0x0, 0xffffff00, 0xffffffff], 0x4d3, 0x3503, 0x7f, 0x0, 0x1, 0x19}, {@ipv4=@local={0xac, 0x14, 0x14, 0xaa}, [0x0, 0xff, 0x0, 0xff0000ff], @ipv6=@local={0xfe, 0x80, [], 0xaa}, [0xffffffff, 0xffffffff, 0xff, 0xff0000ff], 0x4d4, 0x3505, 0x0, 0x1, 0x1f, 0x10}], 0x0, 0x3}}]}, @common=@unspec=@LED={0x48, 'LED\x00', 0x0, {'syz1\x00', 0x0, 0x8, 0x8}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28, '\x00', 0x0, 0xfffffffffffffffe}}}}, 0x600) socket(0x1, 0xa, 0x7) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_TIMER(r4, 0x40605346, &(0x7f0000000680)={0x1, 0x0, {0x3, 0x0, 0x9, 0x3}}) [ 341.047818] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 341.057167] Call Trace: [ 341.060237] dump_stack+0x194/0x24d [ 341.060253] ? arch_local_irq_restore+0x53/0x53 [ 341.060277] should_fail+0x8c0/0xa40 2018/03/30 23:06:32 executing program 7: perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f00000000c0)='./control\x00', 0x0) r0 = inotify_init() inotify_add_watch(r0, &(0x7f0000f1eff6)='./control\x00', 0x220000000009) r1 = inotify_init1(0x0) inotify_add_watch(r1, &(0x7f000001eff6)='./control\x00', 0x2000200) setsockopt$inet6_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, &(0x7f0000000080)="5fce869db66fa225921ad03d773be4ff", 0x10) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x40082406, &(0x7f0000000040)='vmnet0em0wlan0/^procwlan0-user!wlan0(\x00') rmdir(&(0x7f0000000140)='./control\x00') [ 341.060292] ? fault_create_debugfs_attr+0x1f0/0x1f0 2018/03/30 23:06:32 executing program 0 (fault-call:7 fault-nth:44): mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r0 = syz_open_dev$usbmon(&(0x7f0000000400)='/dev/usbmon#\x00', 0x0, 0x0) r1 = perf_event_open(&(0x7f0000223000)={0x2, 0x78, 0xe3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000001980)={{{@in6=@remote, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast2}, 0x0, @in=@multicast2}}, &(0x7f0000001a80)=0xe8) chown(&(0x7f00000004c0)='./file0\x00', r2, 0x0) mount(&(0x7f00000003c0)='./file0\x00', &(0x7f0000000380)='./file0\x00', &(0x7f0000000300)='cgroup2\x00', 0x0, 0x0) r3 = open$dir(&(0x7f000001bff4)='./file0\x00', 0x0, 0x0) mkdirat(r3, &(0x7f0000000280)='./file0\x00', 0x20) getdents64(r3, &(0x7f00000007c0)=""/250, 0x1015a) dup3(r0, r1, 0x80000) r4 = open$dir(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) renameat2(r4, &(0x7f0000000200)='./file1\x00', 0xffffffffffffffff, &(0x7f0000000240)='./file0\x00', 0xfd1092750066ec78) ioctl$KDGKBMODE(0xffffffffffffffff, 0x4b44, &(0x7f0000000140)) 2018/03/30 23:06:32 executing program 6: pipe(&(0x7f0000000940)={0xffffffffffffffff, 0xffffffffffffffff}) accept4$ax25(r0, 0x0, &(0x7f0000000080), 0x80000) r1 = socket$inet(0x2, 0x20000000000003, 0x2) connect$inet(r1, &(0x7f0000000000)={0x2, 0x0, @remote={0xac, 0x14, 0x14, 0xbb}}, 0x10) sendmsg(0xffffffffffffffff, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000140), 0x0, &(0x7f0000000180)=ANY=[]}, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000980)=@broute={'broute\x00', 0x20, 0x3, 0x2d9, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000380], 0x0, &(0x7f00000002c0), &(0x7f0000001000)=ANY=[@ANYBLOB="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"]}, 0x351) setsockopt$inet_int(r1, 0x0, 0x2, &(0x7f00000000c0)=0x7fffffff, 0x4) r2 = socket$rds(0x15, 0x5, 0x0) pipe(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$bt_BT_DEFER_SETUP(r3, 0x112, 0x7, &(0x7f0000000280)=0x100, 0x4) accept$packet(r4, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @remote}, &(0x7f0000000100)=0x14) connect$rds(r2, &(0x7f0000000140)={0x2, 0x4e22, @remote={0xac, 0x14, 0x14, 0xbb}}, 0x10) getsockopt$sock_buf(r2, 0x1, 0x3b, &(0x7f0000000180)=""/83, &(0x7f0000000200)=0x53) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000a00)=@filter={'filter\x00', 0xe, 0x4, 0x5a0, 0xffffffff, 0x0, 0xf0, 0xf0, 0xffffffff, 0xffffffff, 0x4d0, 0x4d0, 0x4d0, 0xffffffff, 0x4, &(0x7f0000000300), {[{{@ipv6={@ipv4={[], [0xff, 0xff], @rand_addr=0x80000001}, @dev={0xfe, 0x80, [], 0x16}, [0x0, 0xffffff00, 0xff, 0xffffffff], [0x0, 0xff000000, 0xffffffff], 'ipddp0\x00', 'ip_vti0\x00', {}, {0xff}, 0x6c, 0x2bf}, 0x0, 0xc8, 0xf0}, @REJECT={0x28, 'REJECT\x00', 0x0, {0x7}}}, {{@ipv6={@remote={0xfe, 0x80, [], 0xbb}, @remote={0xfe, 0x80, [], 0xbb}, [0xff000000, 0xffffffff, 0xffffff00, 0xff], [0xff, 0xffffffff, 0x0, 0xff000000], 'syzkaller1\x00', 'eql\x00', {}, {}, 0x62, 0x0, 0x4, 0x1}, 0x0, 0x120, 0x148, 0x0, {}, [@common=@frag={0x30, 'frag\x00', 0x0, {0x7ff, 0x7, 0x1, 0x2}}, @common=@hl={0x28, 'hl\x00', 0x0, {0x3, 0x7fff}}]}, @REJECT={0x28, 'REJECT\x00', 0x0, {0x7}}}, {{@ipv6={@dev={0xfe, 0x80, [], 0xc}, @loopback={0x0, 0x1}, [0xffffffff, 0xffffffff, 0xff000000, 0xff000000], [0xff, 0x0, 0xff, 0xffffff00], 'irlan0\x00', 'vcan0\x00', {0xff}, {}, 0x3b, 0xffffffffffffab69, 0x2, 0x30}, 0x0, 0x250, 0x298, 0x0, {}, [@common=@srh={0x30, 'srh\x00', 0x0, {0xbb, 0x1, 0x3, 0x6, 0xffffffffffffffc0, 0x80}}, @common=@inet=@policy={0x158, 'policy\x00', 0x0, {[{@ipv4, [0xffffffff, 0xff0000ff, 0xff000000, 0xffffffff], @ipv4=@multicast1=0xe0000001, [0xffffffff, 0xffffffff, 0xff000000, 0xffffff00], 0x4d5, 0x3500, 0x5c, 0x0, 0x10, 0xf}, {@ipv6=@dev={0xfe, 0x80, [], 0x11}, [0x0, 0xff000000, 0xff0000ff, 0xffffff00], @ipv4=@multicast1=0xe0000001, [0xffffffff, 0x0, 0x0, 0xffffffff], 0x4d5, 0x3500, 0x77, 0x1, 0x0, 0x1d}, {@ipv6=@mcast1={0xff, 0x1, [], 0x1}, [0xff000000, 0xffffffff, 0xffffff00, 0xff], @ipv4=@multicast2=0xe0000002, [0xffffffff, 0x0, 0xffffff00, 0xffffffff], 0x4d3, 0x3503, 0x7f, 0x0, 0x1, 0x19}, {@ipv4=@local={0xac, 0x14, 0x14, 0xaa}, [0x0, 0xff, 0x0, 0xff0000ff], @ipv6=@local={0xfe, 0x80, [], 0xaa}, [0xffffffff, 0xffffffff, 0xff, 0xff0000ff], 0x4d4, 0x3505, 0x0, 0x1, 0x1f, 0x10}], 0x0, 0x3}}]}, @common=@unspec=@LED={0x48, 'LED\x00', 0x0, {'syz1\x00', 0x0, 0x8, 0x8}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28, '\x00', 0x0, 0xfffffffffffffffe}}}}, 0x600) socket(0x1, 0xa, 0x7) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_TIMER(r4, 0x40605346, &(0x7f0000000680)={0x1, 0x0, {0x3, 0x0, 0x9, 0x3}}) [ 341.060323] ? find_held_lock+0x35/0x1d0 [ 341.060339] ? __lock_is_held+0xb6/0x140 [ 341.060361] ? check_same_owner+0x320/0x320 [ 341.060376] ? rcu_note_context_switch+0x710/0x710 2018/03/30 23:06:32 executing program 5: mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) perf_event_open(&(0x7f0000223000)={0x3, 0x70, 0xe3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x3d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000001980)={{{@in6=@remote, @in=@multicast1}}, {{@in=@multicast2}, 0x0, @in=@multicast2}}, &(0x7f0000001a80)=0xe8) mount(&(0x7f00000003c0)='./file0\x00', &(0x7f0000000380)='./file0\x00', &(0x7f0000000300)='cgroup2\x00', 0x0, 0x0) chmod(&(0x7f00000000c0)='./file0\x00', 0xc) r0 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000240)='/dev/vcs\x00', 0x400040, 0x0) r1 = syz_genetlink_get_family_id$fou(&(0x7f0000000340)='fou\x00') sendmsg$FOU_CMD_ADD(r0, &(0x7f0000001540)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x40000010}, 0xc, &(0x7f0000001500)={&(0x7f00000014c0)={0x1c, r1, 0x300, 0x70bd2c, 0x25dfdbfd, {0x1}, [@FOU_ATTR_IPPROTO={0x8, 0x3, 0x3c}]}, 0x1c}, 0x1, 0x0, 0x0, 0x40}, 0x40) r2 = open$dir(&(0x7f000001bff4)='./file0\x00', 0x0, 0x0) syz_open_dev$amidi(&(0x7f0000000040)='/dev/amidi#\x00', 0x40, 0x1) open$dir(&(0x7f0000000200)='./file0\x00', 0x800, 0x8) mkdirat(0xffffffffffffffff, &(0x7f0000000280)='./file0\x00', 0x20) unlinkat(r2, &(0x7f0000000080)='./file0\x00', 0x200) syz_mount_image$minix(&(0x7f0000000100)='minix\x00', &(0x7f0000000140)='./file0\x00', 0x1, 0x2, &(0x7f0000000180)=[{&(0x7f0000000400)="1ea0c7f3faa99ca70f336086a7ecba004185fc526daa9130f73f5d2a4fd050a5135ec2251696c55c22935b204df33398f9e0e59847e7a6cbd5b59666294d8365f3c6f8ee6d78a41fd8068b626be5a8a6d73294b22d260d3bb5d202077457b0fe695ff2d0a03388696cb376498ccb069907fe0ba7b4922e6b41d71340040a2785430ac85c974af07052d8fbf839a550282babad09196ba582d40d56", 0x9b}, {&(0x7f00000004c0)="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", 0x1000, 0x5}], 0x1000000, 0x0) 2018/03/30 23:06:32 executing program 2: perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f00000000c0)='./control\x00', 0x0) inotify_init() r0 = syz_open_dev$sg(&(0x7f000028fff7)='/dev/sg#\x00', 0x0, 0x0) ioctl(r0, 0x4000000000001276, &(0x7f0000000040)) msgget(0x2, 0x0) getsockopt$nfc_llcp(0xffffffffffffffff, 0x118, 0x4, &(0x7f0000000740)=""/223, 0xdf) setsockopt$inet_mreq(r0, 0x0, 0x23, &(0x7f00000002c0)={@empty, @remote={0xac, 0x14, 0x14, 0xbb}}, 0x8) accept4$nfc_llcp(0xffffffffffffffff, &(0x7f0000000940), &(0x7f0000000080)=0x60, 0x800) ioctl$SNDRV_CTL_IOCTL_ELEM_INFO(0xffffffffffffffff, 0xc1105511, &(0x7f0000000100)={{0x0, 0x0, 0x0, 0x0, "386aea20273dc03c3d18dd0dbd4a0ca15f9f580393cc4ec3b8ee256b9aa630224ba64c6ff43ee01d2996c914"}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "eda422cd37591b3a5a7a683380f7e0b9e790c6b72cd0a4f3342f7431c1699a305ca3091bb2320e8df4e298a2cca26637866a68c1426ffbd8a6c7da1d8ea77d9d", &(0x7f00000000c0)='/dev/snd/controlC#\x00', 0x13}) r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000003c0)='/proc/self/net/pfkey\x00', 0x800, 0x0) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) add_key$user(&(0x7f0000000480)='user\x00', &(0x7f00000004c0)={0x73, 0x79, 0x7a, 0x3}, &(0x7f0000000500)="d3238eea76b0470531092a0a77b0b49789a0fc97b8f8b9e23a2a5a5a0c169ed6e83480b4801dbf79db3527904ee3128c05ce2806e210237c36b88ceabe99d8784860e5d0e91fe33d38d0133e056cdd1e2910d57fc5eb1b23db3b60a7077ff33bb6c7445cd258ee25f9187269c22d1ed05acb2b9b599bd285b692257a631754ab9befebd3fdb3167361c24c5c5dcf90e476e052b9d22362c57878cb7205fe361346d6beb77b7844fe94", 0xa9, 0xfffffffffffffffe) ioctl$sock_inet_SIOCSIFADDR(r0, 0x8916, &(0x7f0000000300)={'gretap0\x00', {0x2, 0x4e24, @loopback=0x7f000001}}) keyctl$instantiate_iov(0x14, 0x0, &(0x7f0000000780)=[{&(0x7f0000000840)="edb4a01f68d76905035a4ebdd427d31585a5a650581902b1c077f74ca8f1ce7d3e2f6e1c6760433af9664b3f3bebab3a1a1c4ef86f42c39b758accc1e7637bb18d28248dc7a1719b73388830b162613b17fd02220bd1fe2ad86adb96efcfc672d126ae58f745fba0e7534cdbae947449df767bd76a0c38b5752dcd13f7065edea86dc156c0708e76c2c99a94a95f1e93ff73cb3eb94e06d399cf48aaac7963d13e4b3a6b32bc2b19d5461545dcf3f71bb24442d286421f8d891d77a3c4c1c9435bbdf187682c22ded22b669b7790d05b4894166a2d5f33098cf908a23a2e0671d824e88942fbe0bd1416", 0xea}], 0x1, 0x0) r3 = ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) ioctl$KVM_UNREGISTER_COALESCED_MMIO(r3, 0x4010ae68, &(0x7f0000000000)={0x0, 0x5000}) ioctl$KVM_CREATE_PIT2(r3, 0x4040ae77, &(0x7f0000000440)={0xfffffffffffffff7}) ioctl$KVM_CREATE_VCPU(r3, 0xae41, 0x0) setsockopt$inet_tcp_TCP_ULP(r1, 0x6, 0x1f, &(0x7f0000000280)='tls\x00', 0x4) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000005fd8)={'vcan0\x00'}) socket$can_raw(0x1d, 0x3, 0x1) connect$vsock_stream(0xffffffffffffffff, &(0x7f0000000080)={0x28, 0x0, 0xffffffff, @my=0x1}, 0x10) [ 341.060396] should_failslab+0xec/0x120 [ 341.060407] __kmalloc_track_caller+0x5f/0x760 [ 341.060422] ? string+0x180/0x200 [ 341.060431] ? kstrdup_const+0x39/0x50 2018/03/30 23:06:32 executing program 7: r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f00000000c0)='./control\x00', 0x0) r1 = inotify_init() inotify_add_watch(r1, &(0x7f0000f1eff6)='./control\x00', 0x220000000009) r2 = inotify_init1(0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000040)={0xffffffffffffffff}) setsockopt$inet_buf(r3, 0x0, 0x30, &(0x7f0000000100)="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", 0x1000) chmod(&(0x7f0000001240)='./control\x00', 0x29) inotify_add_watch(r2, &(0x7f000001eff6)='./control\x00', 0x2000200) setsockopt$inet6_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, &(0x7f0000000080)="5fce869db66fa225921ad03df73be4ff", 0xfffd) ioctl$KDMKTONE(r0, 0x4b30, 0x7) rmdir(&(0x7f000075aff6)='./control\x00') inotify_add_watch(r1, &(0x7f0000001280)='./control\x00', 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(r3, 0x29, 0x22, &(0x7f0000001100)={{{@in6=@remote}}, {{@in6=@mcast2}, 0x0, @in=@dev}}, &(0x7f0000001200)=0xe8) 2018/03/30 23:06:32 executing program 6: pipe(&(0x7f0000000940)={0xffffffffffffffff, 0xffffffffffffffff}) accept4$ax25(r0, 0x0, &(0x7f0000000080), 0x80000) r1 = socket$inet(0x2, 0x20000000000003, 0x2) connect$inet(r1, &(0x7f0000000000)={0x2, 0x0, @remote={0xac, 0x14, 0x14, 0xbb}}, 0x10) sendmsg(0xffffffffffffffff, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000140), 0x0, &(0x7f0000000180)=ANY=[]}, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000980)=@broute={'broute\x00', 0x20, 0x3, 0x2d9, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000380], 0x0, &(0x7f00000002c0), &(0x7f0000001000)=ANY=[@ANYBLOB="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"]}, 0x351) setsockopt$inet_int(r1, 0x0, 0x2, &(0x7f00000000c0)=0x7fffffff, 0x4) r2 = socket$rds(0x15, 0x5, 0x0) pipe(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$bt_BT_DEFER_SETUP(r3, 0x112, 0x7, &(0x7f0000000280)=0x100, 0x4) accept$packet(r4, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @remote}, &(0x7f0000000100)=0x14) connect$rds(r2, &(0x7f0000000140)={0x2, 0x4e22, @remote={0xac, 0x14, 0x14, 0xbb}}, 0x10) getsockopt$sock_buf(r2, 0x1, 0x3b, &(0x7f0000000180)=""/83, &(0x7f0000000200)=0x53) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000a00)=@filter={'filter\x00', 0xe, 0x4, 0x5a0, 0xffffffff, 0x0, 0xf0, 0xf0, 0xffffffff, 0xffffffff, 0x4d0, 0x4d0, 0x4d0, 0xffffffff, 0x4, &(0x7f0000000300), {[{{@ipv6={@ipv4={[], [0xff, 0xff], @rand_addr=0x80000001}, @dev={0xfe, 0x80, [], 0x16}, [0x0, 0xffffff00, 0xff, 0xffffffff], [0x0, 0xff000000, 0xffffffff], 'ipddp0\x00', 'ip_vti0\x00', {}, {0xff}, 0x6c, 0x2bf}, 0x0, 0xc8, 0xf0}, @REJECT={0x28, 'REJECT\x00', 0x0, {0x7}}}, {{@ipv6={@remote={0xfe, 0x80, [], 0xbb}, @remote={0xfe, 0x80, [], 0xbb}, [0xff000000, 0xffffffff, 0xffffff00, 0xff], [0xff, 0xffffffff, 0x0, 0xff000000], 'syzkaller1\x00', 'eql\x00', {}, {}, 0x62, 0x0, 0x4, 0x1}, 0x0, 0x120, 0x148, 0x0, {}, [@common=@frag={0x30, 'frag\x00', 0x0, {0x7ff, 0x7, 0x1, 0x2}}, @common=@hl={0x28, 'hl\x00', 0x0, {0x3, 0x7fff}}]}, @REJECT={0x28, 'REJECT\x00', 0x0, {0x7}}}, {{@ipv6={@dev={0xfe, 0x80, [], 0xc}, @loopback={0x0, 0x1}, [0xffffffff, 0xffffffff, 0xff000000, 0xff000000], [0xff, 0x0, 0xff, 0xffffff00], 'irlan0\x00', 'vcan0\x00', {0xff}, {}, 0x3b, 0xffffffffffffab69, 0x2, 0x30}, 0x0, 0x250, 0x298, 0x0, {}, [@common=@srh={0x30, 'srh\x00', 0x0, {0xbb, 0x1, 0x3, 0x6, 0xffffffffffffffc0, 0x80}}, @common=@inet=@policy={0x158, 'policy\x00', 0x0, {[{@ipv4, [0xffffffff, 0xff0000ff, 0xff000000, 0xffffffff], @ipv4=@multicast1=0xe0000001, [0xffffffff, 0xffffffff, 0xff000000, 0xffffff00], 0x4d5, 0x3500, 0x5c, 0x0, 0x10, 0xf}, {@ipv6=@dev={0xfe, 0x80, [], 0x11}, [0x0, 0xff000000, 0xff0000ff, 0xffffff00], @ipv4=@multicast1=0xe0000001, [0xffffffff, 0x0, 0x0, 0xffffffff], 0x4d5, 0x3500, 0x77, 0x1, 0x0, 0x1d}, {@ipv6=@mcast1={0xff, 0x1, [], 0x1}, [0xff000000, 0xffffffff, 0xffffff00, 0xff], @ipv4=@multicast2=0xe0000002, [0xffffffff, 0x0, 0xffffff00, 0xffffffff], 0x4d3, 0x3503, 0x7f, 0x0, 0x1, 0x19}, {@ipv4=@local={0xac, 0x14, 0x14, 0xaa}, [0x0, 0xff, 0x0, 0xff0000ff], @ipv6=@local={0xfe, 0x80, [], 0xaa}, [0xffffffff, 0xffffffff, 0xff, 0xff0000ff], 0x4d4, 0x3505, 0x0, 0x1, 0x1f, 0x10}], 0x0, 0x3}}]}, @common=@unspec=@LED={0x48, 'LED\x00', 0x0, {'syz1\x00', 0x0, 0x8, 0x8}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28, '\x00', 0x0, 0xfffffffffffffffe}}}}, 0x600) socket(0x1, 0xa, 0x7) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_TIMER(r4, 0x40605346, &(0x7f0000000680)={0x1, 0x3, {0x0, 0x0, 0x9, 0x3}}) [ 341.060446] kstrdup+0x39/0x70 [ 341.060458] kstrdup_const+0x39/0x50 [ 341.060470] __kernfs_new_node+0xa2/0x570 [ 341.060483] ? kernfs_dop_revalidate+0x380/0x380 2018/03/30 23:06:32 executing program 7: perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f00000000c0)='./control\x00', 0x0) r0 = inotify_init() inotify_add_watch(r0, &(0x7f0000f1eff6)='./control\x00', 0x220000000009) inotify_add_watch(0xffffffffffffffff, &(0x7f000001eff6)='./control\x00', 0x2000200) setsockopt$inet6_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, &(0x7f0000000080)="5fce869db66fa225921ad03d773be4ff", 0x10) rmdir(&(0x7f000075aff6)='./control\x00') [ 341.060492] ? delete_node+0x2db/0xbc0 [ 341.060510] ? snprintf+0xc0/0xf0 [ 341.060521] ? vsprintf+0x40/0x40 [ 341.060534] ? trace_event_raw_event_lock+0x340/0x340 [ 341.060548] kernfs_new_node+0x80/0xe0 [ 341.060561] __kernfs_create_file+0x4b/0x320 [ 341.060577] cgroup_addrm_files+0x3c5/0xa70 [ 341.060597] ? cgroup_file_write+0x710/0x710 [ 341.060616] ? cgroup_idr_replace+0x3f/0x50 [ 341.060631] ? __lock_is_held+0xb6/0x140 [ 341.060648] ? __local_bh_enable_ip+0x121/0x230 [ 341.060660] ? online_css+0x224/0x2e0 [ 341.060675] css_populate_dir+0x198/0x420 [ 341.060692] cgroup_apply_control_enable+0x390/0xbc0 [ 341.060720] ? cgroup_propagate_control+0x570/0x570 [ 341.060741] ? css_populate_dir+0x289/0x420 [ 341.060758] cgroup_mkdir+0x56f/0xfc0 [ 341.060768] ? __lock_is_held+0xb6/0x140 [ 341.060786] ? cgroup_destroy_locked+0x750/0x750 [ 341.060799] ? rcu_read_lock_sched_held+0x108/0x120 [ 341.060811] ? kmem_cache_free+0x258/0x2a0 [ 341.060823] ? set_nlink+0xc1/0x160 [ 341.060835] ? debug_lockdep_rcu_enabled+0x77/0x90 [ 341.060845] ? generic_permission+0x105/0x3c0 [ 341.060858] ? cgroup_destroy_locked+0x750/0x750 [ 341.060870] kernfs_iop_mkdir+0x153/0x1e0 [ 341.060883] vfs_mkdir+0x390/0x600 [ 341.060898] SyS_mkdirat+0x22b/0x2b0 [ 341.060912] ? SyS_mknod+0x480/0x480 [ 341.060921] ? trace_hardirqs_on+0xd/0x10 [ 341.060933] ? do_syscall_64+0xb7/0x940 [ 341.060945] ? SyS_mknod+0x480/0x480 [ 341.060956] do_syscall_64+0x281/0x940 [ 341.060967] ? vmalloc_sync_all+0x30/0x30 [ 341.060977] ? _raw_spin_unlock_irq+0x27/0x70 [ 341.060987] ? finish_task_switch+0x1c1/0x7e0 [ 341.060999] ? syscall_return_slowpath+0x550/0x550 [ 341.061009] ? syscall_return_slowpath+0x2ac/0x550 [ 341.061020] ? prepare_exit_to_usermode+0x350/0x350 [ 341.061032] ? entry_SYSCALL_64_after_hwframe+0x52/0xb7 [ 341.061048] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 341.061065] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 341.061074] RIP: 0033:0x454e79 [ 341.061080] RSP: 002b:00007f016b92fc68 EFLAGS: 00000246 ORIG_RAX: 0000000000000102 [ 341.061092] RAX: ffffffffffffffda RBX: 00007f016b9306d4 RCX: 0000000000454e79 [ 341.061098] RDX: 0000000000000020 RSI: 0000000020000280 RDI: 0000000000000015 [ 341.061104] RBP: 000000000072bea0 R08: 0000000000000000 R09: 0000000000000000 [ 341.061111] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000016 [ 341.061117] R13: 00000000000003eb R14: 00000000006f7ea8 R15: 000000000000002b [ 341.061244] cgroup: cgroup_addrm_files: failed to add stat, err=-12 [ 341.106534] kernel msg: ebtables bug: please report to author: entries_size too small [ 341.215771] kernel msg: ebtables bug: please report to author: entries_size too small [ 341.305063] kernel msg: ebtables bug: please report to author: entries_size too small [ 341.333641] FAULT_INJECTION: forcing a failure. [ 341.333641] name failslab, interval 1, probability 0, space 0, times 0 [ 341.333656] CPU: 1 PID: 26808 Comm: syz-executor0 Not tainted 4.16.0-rc7+ #372 [ 341.333663] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 341.333667] Call Trace: [ 341.333685] dump_stack+0x194/0x24d [ 341.333706] ? arch_local_irq_restore+0x53/0x53 [ 341.333730] should_fail+0x8c0/0xa40 [ 341.333742] ? kstrdup+0x39/0x70 [ 341.333756] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 341.333769] ? cgroup_apply_control_enable+0x390/0xbc0 [ 341.333780] ? kernfs_iop_mkdir+0x153/0x1e0 [ 341.333789] ? vfs_mkdir+0x390/0x600 [ 341.333797] ? SyS_mkdirat+0x22b/0x2b0 [ 341.333807] ? do_syscall_64+0x281/0x940 [ 341.333818] ? entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 341.333832] ? find_held_lock+0x35/0x1d0 [ 341.333848] ? find_held_lock+0x35/0x1d0 [ 341.333864] ? __lock_is_held+0xb6/0x140 [ 341.333886] ? check_same_owner+0x320/0x320 [ 341.333900] ? rcu_note_context_switch+0x710/0x710 [ 341.333911] ? rcu_read_lock_sched_held+0x108/0x120 [ 341.333928] should_failslab+0xec/0x120 [ 341.333940] kmem_cache_alloc+0x47/0x760 [ 341.333948] ? memcpy+0x45/0x50 [ 341.333959] ? kstrdup+0x59/0x70 [ 341.333974] __kernfs_new_node+0xe2/0x570 [ 341.333987] ? kernfs_dop_revalidate+0x380/0x380 [ 341.333996] ? delete_node+0x2db/0xbc0 [ 341.334018] ? snprintf+0xc0/0xf0 [ 341.334029] ? vsprintf+0x40/0x40 [ 341.334043] ? trace_event_raw_event_lock+0x340/0x340 [ 341.334056] kernfs_new_node+0x80/0xe0 [ 341.334069] __kernfs_create_file+0x4b/0x320 [ 341.334084] cgroup_addrm_files+0x3c5/0xa70 [ 341.334105] ? cgroup_file_write+0x710/0x710 [ 341.334124] ? cgroup_idr_replace+0x3f/0x50 [ 341.334138] ? __lock_is_held+0xb6/0x140 [ 341.334156] ? __local_bh_enable_ip+0x121/0x230 [ 341.334168] ? online_css+0x224/0x2e0 [ 341.334183] css_populate_dir+0x198/0x420 [ 341.334199] cgroup_apply_control_enable+0x390/0xbc0 [ 341.334219] ? cgroup_propagate_control+0x570/0x570 [ 341.334238] ? css_populate_dir+0x289/0x420 [ 341.334253] cgroup_mkdir+0x56f/0xfc0 [ 341.334262] ? __lock_is_held+0xb6/0x140 [ 341.334278] ? cgroup_destroy_locked+0x750/0x750 [ 341.334289] ? rcu_read_lock_sched_held+0x108/0x120 [ 341.334299] ? kmem_cache_free+0x258/0x2a0 [ 341.334311] ? set_nlink+0xc1/0x160 [ 341.334323] ? debug_lockdep_rcu_enabled+0x77/0x90 [ 341.334331] ? generic_permission+0x105/0x3c0 [ 341.334344] ? cgroup_destroy_locked+0x750/0x750 [ 341.334356] kernfs_iop_mkdir+0x153/0x1e0 [ 341.334369] vfs_mkdir+0x390/0x600 [ 341.334383] SyS_mkdirat+0x22b/0x2b0 [ 341.334398] ? SyS_mknod+0x480/0x480 [ 341.334408] ? trace_hardirqs_on+0xd/0x10 [ 341.334419] ? do_syscall_64+0xb7/0x940 [ 341.334431] ? SyS_mknod+0x480/0x480 [ 341.334442] do_syscall_64+0x281/0x940 [ 341.334453] ? vmalloc_sync_all+0x30/0x30 [ 341.334463] ? _raw_spin_unlock_irq+0x27/0x70 [ 341.334472] ? finish_task_switch+0x1c1/0x7e0 [ 341.334484] ? syscall_return_slowpath+0x550/0x550 [ 341.334495] ? syscall_return_slowpath+0x2ac/0x550 [ 341.334507] ? prepare_exit_to_usermode+0x350/0x350 [ 341.334519] ? entry_SYSCALL_64_after_hwframe+0x52/0xb7 [ 341.334535] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 341.334552] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 341.334560] RIP: 0033:0x454e79 [ 341.334566] RSP: 002b:00007f016b92fc68 EFLAGS: 00000246 ORIG_RAX: 0000000000000102 [ 341.334578] RAX: ffffffffffffffda RBX: 00007f016b9306d4 RCX: 0000000000454e79 [ 341.334584] RDX: 0000000000000020 RSI: 0000000020000280 RDI: 0000000000000015 [ 341.334590] RBP: 000000000072bea0 R08: 0000000000000000 R09: 0000000000000000 [ 341.334596] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000016 [ 341.334602] R13: 00000000000003eb R14: 00000000006f7ea8 R15: 000000000000002c 2018/03/30 23:06:33 executing program 0 (fault-call:7 fault-nth:45): mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r0 = syz_open_dev$usbmon(&(0x7f0000000400)='/dev/usbmon#\x00', 0x0, 0x0) r1 = perf_event_open(&(0x7f0000223000)={0x2, 0x78, 0xe3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000001980)={{{@in6=@remote, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast2}, 0x0, @in=@multicast2}}, &(0x7f0000001a80)=0xe8) chown(&(0x7f00000004c0)='./file0\x00', r2, 0x0) mount(&(0x7f00000003c0)='./file0\x00', &(0x7f0000000380)='./file0\x00', &(0x7f0000000300)='cgroup2\x00', 0x0, 0x0) r3 = open$dir(&(0x7f000001bff4)='./file0\x00', 0x0, 0x0) mkdirat(r3, &(0x7f0000000280)='./file0\x00', 0x20) getdents64(r3, &(0x7f00000007c0)=""/250, 0x1015a) dup3(r0, r1, 0x80000) r4 = open$dir(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) renameat2(r4, &(0x7f0000000200)='./file1\x00', 0xffffffffffffffff, &(0x7f0000000240)='./file0\x00', 0xfd1092750066ec78) ioctl$KDGKBMODE(0xffffffffffffffff, 0x4b44, &(0x7f0000000140)) 2018/03/30 23:06:33 executing program 6: pipe(&(0x7f0000000940)={0xffffffffffffffff, 0xffffffffffffffff}) accept4$ax25(r0, 0x0, &(0x7f0000000080), 0x80000) r1 = socket$inet(0x2, 0x20000000000003, 0x2) connect$inet(r1, &(0x7f0000000000)={0x2, 0x0, @remote={0xac, 0x14, 0x14, 0xbb}}, 0x10) sendmsg(0xffffffffffffffff, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000140), 0x0, &(0x7f0000000180)=ANY=[]}, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000980)=@broute={'broute\x00', 0x20, 0x3, 0x2d9, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000380], 0x0, &(0x7f00000002c0), &(0x7f0000001000)=ANY=[@ANYBLOB="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"]}, 0x351) setsockopt$inet_int(r1, 0x0, 0x2, &(0x7f00000000c0)=0x7fffffff, 0x4) r2 = socket$rds(0x15, 0x5, 0x0) pipe(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$bt_BT_DEFER_SETUP(r3, 0x112, 0x7, &(0x7f0000000280)=0x100, 0x4) accept$packet(r4, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @remote}, &(0x7f0000000100)=0x14) connect$rds(r2, &(0x7f0000000140)={0x2, 0x4e22, @remote={0xac, 0x14, 0x14, 0xbb}}, 0x10) getsockopt$sock_buf(r2, 0x1, 0x3b, &(0x7f0000000180)=""/83, &(0x7f0000000200)=0x53) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000a00)=@filter={'filter\x00', 0xe, 0x4, 0x5a0, 0xffffffff, 0x0, 0xf0, 0xf0, 0xffffffff, 0xffffffff, 0x4d0, 0x4d0, 0x4d0, 0xffffffff, 0x4, &(0x7f0000000300), {[{{@ipv6={@ipv4={[], [0xff, 0xff], @rand_addr=0x80000001}, @dev={0xfe, 0x80, [], 0x16}, [0x0, 0xffffff00, 0xff, 0xffffffff], [0x0, 0xff000000, 0xffffffff], 'ipddp0\x00', 'ip_vti0\x00', {}, {0xff}, 0x6c, 0x2bf}, 0x0, 0xc8, 0xf0}, @REJECT={0x28, 'REJECT\x00', 0x0, {0x7}}}, {{@ipv6={@remote={0xfe, 0x80, [], 0xbb}, @remote={0xfe, 0x80, [], 0xbb}, [0xff000000, 0xffffffff, 0xffffff00, 0xff], [0xff, 0xffffffff, 0x0, 0xff000000], 'syzkaller1\x00', 'eql\x00', {}, {}, 0x62, 0x0, 0x4, 0x1}, 0x0, 0x120, 0x148, 0x0, {}, [@common=@frag={0x30, 'frag\x00', 0x0, {0x7ff, 0x7, 0x1, 0x2}}, @common=@hl={0x28, 'hl\x00', 0x0, {0x3, 0x7fff}}]}, @REJECT={0x28, 'REJECT\x00', 0x0, {0x7}}}, {{@ipv6={@dev={0xfe, 0x80, [], 0xc}, @loopback={0x0, 0x1}, [0xffffffff, 0xffffffff, 0xff000000, 0xff000000], [0xff, 0x0, 0xff, 0xffffff00], 'irlan0\x00', 'vcan0\x00', {0xff}, {}, 0x3b, 0xffffffffffffab69, 0x2, 0x30}, 0x0, 0x250, 0x298, 0x0, {}, [@common=@srh={0x30, 'srh\x00', 0x0, {0xbb, 0x1, 0x3, 0x6, 0xffffffffffffffc0, 0x80}}, @common=@inet=@policy={0x158, 'policy\x00', 0x0, {[{@ipv4, [0xffffffff, 0xff0000ff, 0xff000000, 0xffffffff], @ipv4=@multicast1=0xe0000001, [0xffffffff, 0xffffffff, 0xff000000, 0xffffff00], 0x4d5, 0x3500, 0x5c, 0x0, 0x10, 0xf}, {@ipv6=@dev={0xfe, 0x80, [], 0x11}, [0x0, 0xff000000, 0xff0000ff, 0xffffff00], @ipv4=@multicast1=0xe0000001, [0xffffffff, 0x0, 0x0, 0xffffffff], 0x4d5, 0x3500, 0x77, 0x1, 0x0, 0x1d}, {@ipv6=@mcast1={0xff, 0x1, [], 0x1}, [0xff000000, 0xffffffff, 0xffffff00, 0xff], @ipv4=@multicast2=0xe0000002, [0xffffffff, 0x0, 0xffffff00, 0xffffffff], 0x4d3, 0x3503, 0x7f, 0x0, 0x1, 0x19}, {@ipv4=@local={0xac, 0x14, 0x14, 0xaa}, [0x0, 0xff, 0x0, 0xff0000ff], @ipv6=@local={0xfe, 0x80, [], 0xaa}, [0xffffffff, 0xffffffff, 0xff, 0xff0000ff], 0x4d4, 0x3505, 0x0, 0x1, 0x1f, 0x10}], 0x0, 0x3}}]}, @common=@unspec=@LED={0x48, 'LED\x00', 0x0, {'syz1\x00', 0x0, 0x8, 0x8}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28, '\x00', 0x0, 0xfffffffffffffffe}}}}, 0x600) socket(0x1, 0xa, 0x7) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_TIMER(r4, 0x40605346, &(0x7f0000000680)={0x1, 0x3, {0x0, 0x0, 0x9, 0x3}}) 2018/03/30 23:06:33 executing program 4: mkdir(&(0x7f0000fd5ff8)='./file1\x00', 0x89) mount(&(0x7f000000a000)='./file0\x00', &(0x7f0000026ff8)='./file0\x00', &(0x7f000000c000)='ramfs\x00', 0x0, &(0x7f000000a000)) r0 = shmget(0x0, 0x1000, 0xa00, &(0x7f0000fff000/0x1000)=nil) shmctl$IPC_RMID(r0, 0x0) mkdir(&(0x7f0000000000)='./file1\x00', 0x0) mount(&(0x7f0000000040)='./file0\x00', &(0x7f0000903000)='./file0\x00', &(0x7f0000811ffa)='bdev\x00', 0x100000, &(0x7f00000003c0)="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") r1 = dup(0xffffffffffffffff) ioctl$KVM_SET_SREGS(r1, 0x4138ae84, &(0x7f0000000240)={{0x3000, 0xf004, 0xc, 0x51db, 0x9, 0x24e7503a, 0x8, 0xb4, 0x1, 0x800, 0x9, 0x3}, {0x3000, 0x3000, 0x10, 0x1, 0x0, 0x200, 0x0, 0x6, 0x7, 0x200, 0x10000, 0xc1}, {0x6004, 0x10000, 0xd, 0x0, 0x0, 0xffffffff7fffffff, 0x6, 0x9, 0xffffffffffffffff, 0x0, 0x8, 0xfffffffffffffff8}, {0xd000, 0x1f000, 0x4, 0x3, 0x6, 0x0, 0xfffffffffffffffe, 0xbb61, 0x100, 0x3e32, 0x101, 0xff}, {0x7000, 0x5001, 0xe, 0x5ff, 0x376, 0xac, 0x2, 0x3, 0x9, 0x6, 0xf5bd, 0x20}, {0x0, 0x1000, 0x10, 0x4d, 0x7, 0x3, 0x7, 0x8, 0x9, 0x1, 0x20, 0x4000400000000}, {0x10000, 0x0, 0xf, 0xe3, 0x6, 0x7f, 0x8000, 0x6, 0x5, 0x5, 0x2, 0x8}, {0x5000, 0xf000, 0x0, 0x401, 0x2, 0x8, 0x0, 0x1, 0x1f, 0x7, 0x7, 0x8e5}, {0x10000, 0x4000}, {0x0, 0xf000}, 0x20000002, 0x0, 0x2, 0x224, 0xa, 0x0, 0x2000, [0x7f, 0x80, 0xffffffffffffffff, 0x7fff]}) r2 = syz_open_dev$vcsn(&(0x7f0000000540)='/dev/vcs#\x00', 0x4, 0x3a1200) renameat(r1, &(0x7f0000000080)='./file1/file0\x00', r2, &(0x7f0000000100)='./file1\x00') mount(&(0x7f0000fb6000)='./file0\x00', &(0x7f0000d78000)='.', &(0x7f0000fdb000)='ubifs\x00', 0x1003, 0x0) mount(&(0x7f00002b9ff8)='./file0\x00', &(0x7f0000cbeff8)='./file0\x00', &(0x7f00005f7ffa)='ramfs\x00', 0x80000, &(0x7f000002f000)) mount(&(0x7f00000000c0)='./file0\x00', &(0x7f00000001c0)='./file1\x00', &(0x7f0000000200)='anon_inodefs\x00', 0x2000, &(0x7f0000000240)) mount(&(0x7f0000adcff8)='./file0\x00', &(0x7f0000e08fff)='.', &(0x7f00005e9000)='cifs\x00', 0x2000, &(0x7f0000ad5000)) mknodat(r1, &(0x7f0000000140)='./file2\x00', 0x8000, 0x9) 2018/03/30 23:06:33 executing program 5: mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) perf_event_open(&(0x7f0000223000)={0x2, 0x78, 0xe3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000001980)={{{@in6=@remote, @in=@multicast1}}, {{@in=@multicast2}, 0x0, @in=@multicast2}}, &(0x7f0000001a80)=0xe8) mount(&(0x7f00000003c0)='./file0\x00', &(0x7f0000000380)='./file0\x00', &(0x7f0000000300)='cgroup2\x00', 0x0, 0x0) r0 = open$dir(&(0x7f000001bff4)='./file0\x00', 0x0, 0x0) mkdirat(r0, &(0x7f0000000280)='./file0\x00', 0x1d) unlinkat(r0, &(0x7f0000000080)='./file0\x00', 0x200) 2018/03/30 23:06:33 executing program 2: perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f00000000c0)='./control\x00', 0x0) inotify_init() r0 = syz_open_dev$sg(&(0x7f000028fff7)='/dev/sg#\x00', 0x0, 0x0) ioctl(r0, 0x4000000000001276, &(0x7f0000000040)) msgget(0x2, 0x0) getsockopt$nfc_llcp(0xffffffffffffffff, 0x118, 0x4, &(0x7f0000000740)=""/223, 0xdf) setsockopt$inet_mreq(r0, 0x0, 0x23, &(0x7f00000002c0)={@empty, @remote={0xac, 0x14, 0x14, 0xbb}}, 0x8) accept4$nfc_llcp(0xffffffffffffffff, &(0x7f0000000940), &(0x7f0000000080)=0x60, 0x800) ioctl$SNDRV_CTL_IOCTL_ELEM_INFO(0xffffffffffffffff, 0xc1105511, &(0x7f0000000100)={{0x0, 0x0, 0x0, 0x0, "386aea20273dc03c3d18dd0dbd4a0ca15f9f580393cc4ec3b8ee256b9aa630224ba64c6ff43ee01d2996c914"}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "eda422cd37591b3a5a7a683380f7e0b9e790c6b72cd0a4f3342f7431c1699a305ca3091bb2320e8df4e298a2cca26637866a68c1426ffbd8a6c7da1d8ea77d9d", &(0x7f00000000c0)='/dev/snd/controlC#\x00', 0x13}) r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000003c0)='/proc/self/net/pfkey\x00', 0x800, 0x0) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) add_key$user(&(0x7f0000000480)='user\x00', &(0x7f00000004c0)={0x73, 0x79, 0x7a, 0x3}, &(0x7f0000000500)="d3238eea76b0470531092a0a77b0b49789a0fc97b8f8b9e23a2a5a5a0c169ed6e83480b4801dbf79db3527904ee3128c05ce2806e210237c36b88ceabe99d8784860e5d0e91fe33d38d0133e056cdd1e2910d57fc5eb1b23db3b60a7077ff33bb6c7445cd258ee25f9187269c22d1ed05acb2b9b599bd285b692257a631754ab9befebd3fdb3167361c24c5c5dcf90e476e052b9d22362c57878cb7205fe361346d6beb77b7844fe94", 0xa9, 0xfffffffffffffffe) ioctl$sock_inet_SIOCSIFADDR(r0, 0x8916, &(0x7f0000000300)={'gretap0\x00', {0x2, 0x4e24, @loopback=0x7f000001}}) keyctl$instantiate_iov(0x14, 0x0, &(0x7f0000000780)=[{&(0x7f0000000840)="edb4a01f68d76905035a4ebdd427d31585a5a650581902b1c077f74ca8f1ce7d3e2f6e1c6760433af9664b3f3bebab3a1a1c4ef86f42c39b758accc1e7637bb18d28248dc7a1719b73388830b162613b17fd02220bd1fe2ad86adb96efcfc672d126ae58f745fba0e7534cdbae947449df767bd76a0c38b5752dcd13f7065edea86dc156c0708e76c2c99a94a95f1e93ff73cb3eb94e06d399cf48aaac7963d13e4b3a6b32bc2b19d5461545dcf3f71bb24442d286421f8d891d77a3c4c1c9435bbdf187682c22ded22b669b7790d05b4894166a2d5f33098cf908a23a2e0671d824e88942fbe0bd1416", 0xea}], 0x1, 0x0) r3 = ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) ioctl$KVM_UNREGISTER_COALESCED_MMIO(r3, 0x4010ae68, &(0x7f0000000000)={0x0, 0x5000}) ioctl$KVM_CREATE_PIT2(r3, 0x4040ae77, &(0x7f0000000440)={0xfffffffffffffff7}) ioctl$KVM_CREATE_VCPU(r3, 0xae41, 0x0) setsockopt$inet_tcp_TCP_ULP(r1, 0x6, 0x1f, &(0x7f0000000280)='tls\x00', 0x4) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000005fd8)={'vcan0\x00'}) socket$can_raw(0x1d, 0x3, 0x1) connect$vsock_stream(0xffffffffffffffff, &(0x7f0000000080)={0x28, 0x0, 0xffffffff, @my=0x1}, 0x10) 2018/03/30 23:06:33 executing program 7: perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f00000000c0)='./control\x00', 0x0) r0 = inotify_init() r1 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/sys/net/ipv4/vs/conn_reuse_mode\x00', 0x2, 0x0) r2 = syz_open_dev$usbmon(&(0x7f0000000100)='/dev/usbmon#\x00', 0x4, 0x40000) ioctl$ION_IOC_ALLOC(r1, 0xc0184900, &(0x7f0000000140)={0x8, 0x20, 0x1, r2}) inotify_add_watch(r0, &(0x7f0000f1eff6)='./file0\x00', 0x220000000009) r3 = inotify_init1(0x0) inotify_add_watch(r3, &(0x7f000001eff6)='./control\x00', 0x2000200) socketpair$inet_dccp(0x2, 0x6, 0x0, &(0x7f0000000180)) setsockopt$inet6_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, &(0x7f0000000080)="5fce869db66fa225921ad03d773be4ff", 0x10) rmdir(&(0x7f000075aff6)='./control\x00') 2018/03/30 23:06:33 executing program 3: r0 = getpid() r1 = perf_event_open(&(0x7f0000348f88)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, r0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0x0}) recvmsg(r2, &(0x7f0000005180)={&(0x7f0000004ac0)=@can, 0x10, &(0x7f0000005040), 0xd7, &(0x7f0000005100)=""/93, 0x5d}, 0x0) ioctl$PERF_EVENT_IOC_DISABLE(r1, 0x2401, 0x0) 2018/03/30 23:06:33 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x200, 0x0) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000680)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$sock_linger(r2, 0x1, 0xd, &(0x7f00000006c0)={0x400, 0x9}, 0x8) perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x0, 0x0) r3 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) mmap(&(0x7f0000000000/0x9d7000)=nil, 0x9d7000, 0x0, 0x10, 0xffffffffffffffff, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x7) perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r4 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r4, &(0x7f0000e5b000)={0x2, 0x4e20, @multicast1=0xe0000001}, 0x10) syz_open_dev$sg(&(0x7f0000000440)='/dev/sg#\x00', 0x0, 0x0) connect$inet(r4, &(0x7f0000000100)={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x11}}, 0x10) r5 = bpf$PROG_LOAD(0x5, &(0x7f0000eb0fb8)={0x1, 0x3, &(0x7f00009ff000)=@framed={{0x18}, [], {0x95}}, &(0x7f00002bf000)='syzkaller\x00', 0x4, 0xb7, &(0x7f00006ab000)=""/183}, 0x48) setsockopt$inet_tcp_int(r4, 0x6, 0x19, &(0x7f0000000240)=0x8, 0x4) r6 = socket$kcm(0x29, 0x2, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r6, 0x89e0, &(0x7f000031aff8)={r4, r5}) ioctl$sock_kcm_SIOCKCMCLONE(r6, 0x89e2, &(0x7f00000002c0)={0xffffffffffffffff}) sendmsg$nl_xfrm(r7, &(0x7f0000000780)={&(0x7f0000000200)={0x10}, 0xc, &(0x7f0000000740)={&(0x7f0000000480)=@updpolicy={0xb8, 0x19, 0x0, 0x0, 0x0, {{@in=@loopback=0x7f000001, @in6=@mcast1={0xff, 0x1, [], 0x1}}}}, 0xffcb}, 0x1}, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(r7, 0x89e1, &(0x7f0000000040)={r4}) r8 = fcntl$getown(r3, 0x9) recvfrom$inet6(r1, &(0x7f0000000140)=""/177, 0xb1, 0x40000000, &(0x7f0000000080)={0xa, 0x4e23, 0x9}, 0x1c) r9 = accept4$inet(0xffffffffffffff9c, &(0x7f0000000700)={0x0, 0x0, @broadcast}, &(0x7f0000000740)=0x10, 0x80000) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r9, 0x84, 0x64, &(0x7f0000000780)=[@in6={0xa, 0x4e22, 0xfffffffffffff7e1, @mcast2={0xff, 0x2, [], 0x1}, 0x8}, @in={0x2, 0x4e24, @broadcast=0xffffffff}], 0x2c) ptrace$setregset(0x4205, r8, 0x0, &(0x7f00000005c0)={&(0x7f0000000080)}) ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r10 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x1fffd, 0x0) r11 = syz_open_dev$sndtimer(&(0x7f00000000c0)='/dev/snd/timer\x00', 0x0, 0x0) read(r11, &(0x7f0000ec6000)=""/50, 0x32) fcntl$dupfd(r11, 0x0, r10) [ 341.334724] cgroup: cgroup_addrm_files: failed to add stat, err=-12 [ 342.056758] kernel msg: ebtables bug: please report to author: entries_size too small 2018/03/30 23:06:33 executing program 6: pipe(&(0x7f0000000940)={0xffffffffffffffff, 0xffffffffffffffff}) accept4$ax25(r0, 0x0, &(0x7f0000000080), 0x80000) r1 = socket$inet(0x2, 0x20000000000003, 0x2) connect$inet(r1, &(0x7f0000000000)={0x2, 0x0, @remote={0xac, 0x14, 0x14, 0xbb}}, 0x10) sendmsg(0xffffffffffffffff, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000140), 0x0, &(0x7f0000000180)=ANY=[]}, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000980)=@broute={'broute\x00', 0x20, 0x3, 0x2d9, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000380], 0x0, &(0x7f00000002c0), &(0x7f0000001000)=ANY=[@ANYBLOB="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"]}, 0x351) setsockopt$inet_int(r1, 0x0, 0x2, &(0x7f00000000c0)=0x7fffffff, 0x4) r2 = socket$rds(0x15, 0x5, 0x0) pipe(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$bt_BT_DEFER_SETUP(r3, 0x112, 0x7, &(0x7f0000000280)=0x100, 0x4) accept$packet(r4, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @remote}, &(0x7f0000000100)=0x14) connect$rds(r2, &(0x7f0000000140)={0x2, 0x4e22, @remote={0xac, 0x14, 0x14, 0xbb}}, 0x10) getsockopt$sock_buf(r2, 0x1, 0x3b, &(0x7f0000000180)=""/83, &(0x7f0000000200)=0x53) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000a00)=@filter={'filter\x00', 0xe, 0x4, 0x5a0, 0xffffffff, 0x0, 0xf0, 0xf0, 0xffffffff, 0xffffffff, 0x4d0, 0x4d0, 0x4d0, 0xffffffff, 0x4, &(0x7f0000000300), {[{{@ipv6={@ipv4={[], [0xff, 0xff], @rand_addr=0x80000001}, @dev={0xfe, 0x80, [], 0x16}, [0x0, 0xffffff00, 0xff, 0xffffffff], [0x0, 0xff000000, 0xffffffff], 'ipddp0\x00', 'ip_vti0\x00', {}, {0xff}, 0x6c, 0x2bf}, 0x0, 0xc8, 0xf0}, @REJECT={0x28, 'REJECT\x00', 0x0, {0x7}}}, {{@ipv6={@remote={0xfe, 0x80, [], 0xbb}, @remote={0xfe, 0x80, [], 0xbb}, [0xff000000, 0xffffffff, 0xffffff00, 0xff], [0xff, 0xffffffff, 0x0, 0xff000000], 'syzkaller1\x00', 'eql\x00', {}, {}, 0x62, 0x0, 0x4, 0x1}, 0x0, 0x120, 0x148, 0x0, {}, [@common=@frag={0x30, 'frag\x00', 0x0, {0x7ff, 0x7, 0x1, 0x2}}, @common=@hl={0x28, 'hl\x00', 0x0, {0x3, 0x7fff}}]}, @REJECT={0x28, 'REJECT\x00', 0x0, {0x7}}}, {{@ipv6={@dev={0xfe, 0x80, [], 0xc}, @loopback={0x0, 0x1}, [0xffffffff, 0xffffffff, 0xff000000, 0xff000000], [0xff, 0x0, 0xff, 0xffffff00], 'irlan0\x00', 'vcan0\x00', {0xff}, {}, 0x3b, 0xffffffffffffab69, 0x2, 0x30}, 0x0, 0x250, 0x298, 0x0, {}, [@common=@srh={0x30, 'srh\x00', 0x0, {0xbb, 0x1, 0x3, 0x6, 0xffffffffffffffc0, 0x80}}, @common=@inet=@policy={0x158, 'policy\x00', 0x0, {[{@ipv4, [0xffffffff, 0xff0000ff, 0xff000000, 0xffffffff], @ipv4=@multicast1=0xe0000001, [0xffffffff, 0xffffffff, 0xff000000, 0xffffff00], 0x4d5, 0x3500, 0x5c, 0x0, 0x10, 0xf}, {@ipv6=@dev={0xfe, 0x80, [], 0x11}, [0x0, 0xff000000, 0xff0000ff, 0xffffff00], @ipv4=@multicast1=0xe0000001, [0xffffffff, 0x0, 0x0, 0xffffffff], 0x4d5, 0x3500, 0x77, 0x1, 0x0, 0x1d}, {@ipv6=@mcast1={0xff, 0x1, [], 0x1}, [0xff000000, 0xffffffff, 0xffffff00, 0xff], @ipv4=@multicast2=0xe0000002, [0xffffffff, 0x0, 0xffffff00, 0xffffffff], 0x4d3, 0x3503, 0x7f, 0x0, 0x1, 0x19}, {@ipv4=@local={0xac, 0x14, 0x14, 0xaa}, [0x0, 0xff, 0x0, 0xff0000ff], @ipv6=@local={0xfe, 0x80, [], 0xaa}, [0xffffffff, 0xffffffff, 0xff, 0xff0000ff], 0x4d4, 0x3505, 0x0, 0x1, 0x1f, 0x10}], 0x0, 0x3}}]}, @common=@unspec=@LED={0x48, 'LED\x00', 0x0, {'syz1\x00', 0x0, 0x8, 0x8}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28, '\x00', 0x0, 0xfffffffffffffffe}}}}, 0x600) socket(0x1, 0xa, 0x7) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_TIMER(r4, 0x40605346, &(0x7f0000000680)={0x1, 0x3, {0x0, 0x0, 0x9, 0x3}}) 2018/03/30 23:06:33 executing program 5: mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) perf_event_open(&(0x7f0000223000)={0x2, 0x78, 0xe3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000001980)={{{@in6=@remote, @in=@multicast1}}, {{@in=@multicast2}, 0x0, @in=@multicast2}}, &(0x7f0000001a80)=0xe8) pipe2(&(0x7f0000000040)={0xffffffffffffffff}, 0x80000) ioctl$SNDRV_TIMER_IOCTL_PAUSE(r0, 0x54a3) mount(&(0x7f00000003c0)='./file0\x00', &(0x7f0000000380)='./file0\x00', &(0x7f0000000300)='cgroup2\x00', 0x0, 0x0) r1 = open$dir(&(0x7f000001bff4)='./file0\x00', 0x0, 0x0) mkdirat(0xffffffffffffffff, &(0x7f0000000280)='./file0\x00', 0x20) unlinkat(r1, &(0x7f0000000080)='./file0\x00', 0x200) 2018/03/30 23:06:33 executing program 7: perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f00000000c0)='./control\x00', 0x0) r0 = inotify_init() inotify_add_watch(r0, &(0x7f0000f1eff6)='./control\x00', 0x220000000009) r1 = inotify_init1(0x0) inotify_add_watch(r1, &(0x7f000001eff6)='./control\x00', 0x2000200) setsockopt$inet6_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, &(0x7f0000000080)="5fce869db66fa225921ad03d773be4ff", 0x10) rmdir(&(0x7f0000000140)='./control\x00') 2018/03/30 23:06:33 executing program 4: mkdir(&(0x7f0000fd5ff8)='./file1\x00', 0x0) mount(&(0x7f000000a000)='./file0\x00', &(0x7f0000026ff8)='./file0\x00', &(0x7f000000c000)='ramfs\x00', 0x0, &(0x7f000000a000)) mkdir(&(0x7f0000000000)='./file1\x00', 0x0) mount(&(0x7f0000000040)='./file0\x00', &(0x7f0000903000)='./file0\x00', &(0x7f0000811ffa)='bdev\x00', 0x100000, &(0x7f00000003c0)="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") r0 = dup(0xffffffffffffffff) r1 = syz_open_dev$vcsn(&(0x7f00000000c0)='/dev/vcs#\x00', 0x2, 0x20800) setsockopt$inet_sctp6_SCTP_ADAPTATION_LAYER(r0, 0x84, 0x7, &(0x7f0000000380)={0x1}, 0x4) renameat(r0, &(0x7f0000000080)='./file1/file0\x00', r1, &(0x7f0000000100)='./file1\x00') mount(&(0x7f0000fb6000)='./file0\x00', &(0x7f0000d78000)='.', &(0x7f0000fdb000)='ubifs\x00', 0x1003, 0x0) mount(&(0x7f00002b9ff8)='./file0\x00', &(0x7f0000cbeff8)='./file0\x00', &(0x7f00005f7ffa)='ramfs\x00', 0x80000, &(0x7f000002f000)) mount(&(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)='./file1\x00', &(0x7f0000000200)='anon_inodefs\x00', 0x2000, &(0x7f0000000240)) lstat(&(0x7f0000000140)='./file0\x00', &(0x7f0000000240)) fstat(r0, &(0x7f00000002c0)) getgroups(0x0, &(0x7f0000000340)) mount(&(0x7f0000adcff8)='./file0\x00', &(0x7f0000e08fff)='.', &(0x7f00005e9000)='cifs\x00', 0x2000, &(0x7f0000ad5000)) [ 342.171587] kernel msg: ebtables bug: please report to author: entries_size too small [ 342.182770] FAULT_INJECTION: forcing a failure. [ 342.182770] name failslab, interval 1, probability 0, space 0, times 0 [ 342.194140] CPU: 0 PID: 26854 Comm: syz-executor0 Not tainted 4.16.0-rc7+ #372 [ 342.201512] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 342.210862] Call Trace: [ 342.213463] dump_stack+0x194/0x24d [ 342.217126] ? arch_local_irq_restore+0x53/0x53 [ 342.221821] should_fail+0x8c0/0xa40 [ 342.225545] ? kstrdup+0x39/0x70 [ 342.228925] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 342.234032] ? cgroup_apply_control_enable+0x390/0xbc0 [ 342.239293] ? kernfs_iop_mkdir+0x153/0x1e0 [ 342.243595] ? vfs_mkdir+0x390/0x600 [ 342.247285] ? SyS_mkdirat+0x22b/0x2b0 [ 342.251155] ? entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 342.256506] ? find_held_lock+0x35/0x1d0 [ 342.260553] ? find_held_lock+0x35/0x1d0 [ 342.264602] ? __lock_is_held+0xb6/0x140 [ 342.268659] ? check_same_owner+0x320/0x320 [ 342.272968] ? rcu_note_context_switch+0x710/0x710 [ 342.277885] ? rcu_read_lock_sched_held+0x108/0x120 [ 342.282890] should_failslab+0xec/0x120 [ 342.286844] kmem_cache_alloc+0x47/0x760 [ 342.290885] ? memcpy+0x45/0x50 [ 342.294148] ? kstrdup+0x59/0x70 [ 342.297503] __kernfs_new_node+0xe2/0x570 [ 342.301632] ? kernfs_dop_revalidate+0x380/0x380 [ 342.306366] ? delete_node+0x2db/0xbc0 [ 342.310232] ? memset+0x31/0x40 [ 342.313495] ? snprintf+0xc0/0xf0 [ 342.316932] ? vsprintf+0x40/0x40 [ 342.320371] ? trace_event_raw_event_lock+0x340/0x340 [ 342.325546] kernfs_new_node+0x80/0xe0 [ 342.329415] __kernfs_create_file+0x4b/0x320 [ 342.333809] cgroup_addrm_files+0x3c5/0xa70 [ 342.338124] ? cgroup_file_write+0x710/0x710 [ 342.342521] ? cgroup_idr_replace+0x3f/0x50 [ 342.346825] ? __lock_is_held+0xb6/0x140 [ 342.350877] ? __local_bh_enable_ip+0x121/0x230 [ 342.355524] ? online_css+0x224/0x2e0 [ 342.359310] css_populate_dir+0x198/0x420 [ 342.363445] cgroup_apply_control_enable+0x390/0xbc0 [ 342.368537] ? cgroup_propagate_control+0x570/0x570 [ 342.373544] ? css_populate_dir+0x289/0x420 [ 342.377851] cgroup_mkdir+0x56f/0xfc0 [ 342.381639] ? cgroup_destroy_locked+0x750/0x750 [ 342.386375] ? from_kgid+0x4a/0x60 [ 342.389898] ? privileged_wrt_inode_uidgid+0x8e/0xb0 [ 342.394981] ? capable_wrt_inode_uidgid+0x9b/0xc0 [ 342.399805] ? generic_permission+0x105/0x3c0 [ 342.404281] ? cgroup_destroy_locked+0x750/0x750 [ 342.409024] kernfs_iop_mkdir+0x153/0x1e0 [ 342.413153] vfs_mkdir+0x390/0x600 [ 342.416679] SyS_mkdirat+0x22b/0x2b0 [ 342.420377] ? SyS_mknod+0x480/0x480 [ 342.424069] ? trace_hardirqs_on+0xd/0x10 [ 342.428201] ? do_syscall_64+0xb7/0x940 [ 342.432157] ? SyS_mknod+0x480/0x480 [ 342.435852] do_syscall_64+0x281/0x940 [ 342.439721] ? vmalloc_sync_all+0x30/0x30 [ 342.443848] ? _raw_spin_unlock_irq+0x27/0x70 [ 342.448321] ? finish_task_switch+0x1c1/0x7e0 [ 342.452797] ? syscall_return_slowpath+0x550/0x550 [ 342.457708] ? syscall_return_slowpath+0x2ac/0x550 [ 342.462618] ? prepare_exit_to_usermode+0x350/0x350 [ 342.467618] ? entry_SYSCALL_64_after_hwframe+0x52/0xb7 [ 342.472965] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 342.477793] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 342.482964] RIP: 0033:0x454e79 [ 342.486133] RSP: 002b:00007f016b92fc68 EFLAGS: 00000246 ORIG_RAX: 0000000000000102 [ 342.493822] RAX: ffffffffffffffda RBX: 00007f016b9306d4 RCX: 0000000000454e79 [ 342.501070] RDX: 0000000000000020 RSI: 0000000020000280 RDI: 0000000000000015 [ 342.508318] RBP: 000000000072bea0 R08: 0000000000000000 R09: 0000000000000000 [ 342.515564] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000016 2018/03/30 23:06:34 executing program 6: pipe(&(0x7f0000000940)={0xffffffffffffffff, 0xffffffffffffffff}) accept4$ax25(r0, 0x0, &(0x7f0000000080), 0x80000) r1 = socket$inet(0x2, 0x20000000000003, 0x2) connect$inet(r1, &(0x7f0000000000)={0x2, 0x0, @remote={0xac, 0x14, 0x14, 0xbb}}, 0x10) sendmsg(0xffffffffffffffff, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000140), 0x0, &(0x7f0000000180)=ANY=[]}, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000980)=@broute={'broute\x00', 0x20, 0x3, 0x2d9, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000380], 0x0, &(0x7f00000002c0), &(0x7f0000001000)=ANY=[@ANYBLOB="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"]}, 0x351) setsockopt$inet_int(r1, 0x0, 0x2, &(0x7f00000000c0)=0x7fffffff, 0x4) r2 = socket$rds(0x15, 0x5, 0x0) pipe(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$bt_BT_DEFER_SETUP(r3, 0x112, 0x7, &(0x7f0000000280)=0x100, 0x4) accept$packet(r4, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @remote}, &(0x7f0000000100)=0x14) connect$rds(r2, &(0x7f0000000140)={0x2, 0x4e22, @remote={0xac, 0x14, 0x14, 0xbb}}, 0x10) getsockopt$sock_buf(r2, 0x1, 0x3b, &(0x7f0000000180)=""/83, &(0x7f0000000200)=0x53) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000a00)=@filter={'filter\x00', 0xe, 0x4, 0x5a0, 0xffffffff, 0x0, 0xf0, 0xf0, 0xffffffff, 0xffffffff, 0x4d0, 0x4d0, 0x4d0, 0xffffffff, 0x4, &(0x7f0000000300), {[{{@ipv6={@ipv4={[], [0xff, 0xff], @rand_addr=0x80000001}, @dev={0xfe, 0x80, [], 0x16}, [0x0, 0xffffff00, 0xff, 0xffffffff], [0x0, 0xff000000, 0xffffffff], 'ipddp0\x00', 'ip_vti0\x00', {}, {0xff}, 0x6c, 0x2bf}, 0x0, 0xc8, 0xf0}, @REJECT={0x28, 'REJECT\x00', 0x0, {0x7}}}, {{@ipv6={@remote={0xfe, 0x80, [], 0xbb}, @remote={0xfe, 0x80, [], 0xbb}, [0xff000000, 0xffffffff, 0xffffff00, 0xff], [0xff, 0xffffffff, 0x0, 0xff000000], 'syzkaller1\x00', 'eql\x00', {}, {}, 0x62, 0x0, 0x4, 0x1}, 0x0, 0x120, 0x148, 0x0, {}, [@common=@frag={0x30, 'frag\x00', 0x0, {0x7ff, 0x7, 0x1, 0x2}}, @common=@hl={0x28, 'hl\x00', 0x0, {0x3, 0x7fff}}]}, @REJECT={0x28, 'REJECT\x00', 0x0, {0x7}}}, {{@ipv6={@dev={0xfe, 0x80, [], 0xc}, @loopback={0x0, 0x1}, [0xffffffff, 0xffffffff, 0xff000000, 0xff000000], [0xff, 0x0, 0xff, 0xffffff00], 'irlan0\x00', 'vcan0\x00', {0xff}, {}, 0x3b, 0xffffffffffffab69, 0x2, 0x30}, 0x0, 0x250, 0x298, 0x0, {}, [@common=@srh={0x30, 'srh\x00', 0x0, {0xbb, 0x1, 0x3, 0x6, 0xffffffffffffffc0, 0x80}}, @common=@inet=@policy={0x158, 'policy\x00', 0x0, {[{@ipv4, [0xffffffff, 0xff0000ff, 0xff000000, 0xffffffff], @ipv4=@multicast1=0xe0000001, [0xffffffff, 0xffffffff, 0xff000000, 0xffffff00], 0x4d5, 0x3500, 0x5c, 0x0, 0x10, 0xf}, {@ipv6=@dev={0xfe, 0x80, [], 0x11}, [0x0, 0xff000000, 0xff0000ff, 0xffffff00], @ipv4=@multicast1=0xe0000001, [0xffffffff, 0x0, 0x0, 0xffffffff], 0x4d5, 0x3500, 0x77, 0x1, 0x0, 0x1d}, {@ipv6=@mcast1={0xff, 0x1, [], 0x1}, [0xff000000, 0xffffffff, 0xffffff00, 0xff], @ipv4=@multicast2=0xe0000002, [0xffffffff, 0x0, 0xffffff00, 0xffffffff], 0x4d3, 0x3503, 0x7f, 0x0, 0x1, 0x19}, {@ipv4=@local={0xac, 0x14, 0x14, 0xaa}, [0x0, 0xff, 0x0, 0xff0000ff], @ipv6=@local={0xfe, 0x80, [], 0xaa}, [0xffffffff, 0xffffffff, 0xff, 0xff0000ff], 0x4d4, 0x3505, 0x0, 0x1, 0x1f, 0x10}], 0x0, 0x3}}]}, @common=@unspec=@LED={0x48, 'LED\x00', 0x0, {'syz1\x00', 0x0, 0x8, 0x8}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28, '\x00', 0x0, 0xfffffffffffffffe}}}}, 0x600) socket(0x1, 0xa, 0x7) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_TIMER(r4, 0x40605346, &(0x7f0000000680)={0x1, 0x3, {0x3, 0x0, 0x0, 0x3}}) [ 342.522811] R13: 00000000000003eb R14: 00000000006f7ea8 R15: 000000000000002d [ 342.530745] cgroup: cgroup_addrm_files: failed to add stat, err=-12 2018/03/30 23:06:34 executing program 2: perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f00000000c0)='./control\x00', 0x0) inotify_init() r0 = syz_open_dev$sg(&(0x7f000028fff7)='/dev/sg#\x00', 0x0, 0x0) ioctl(r0, 0x4000000000001276, &(0x7f0000000040)) msgget(0x2, 0x0) getsockopt$nfc_llcp(0xffffffffffffffff, 0x118, 0x4, &(0x7f0000000740)=""/223, 0xdf) setsockopt$inet_mreq(r0, 0x0, 0x23, &(0x7f00000002c0)={@empty, @remote={0xac, 0x14, 0x14, 0xbb}}, 0x8) accept4$nfc_llcp(0xffffffffffffffff, &(0x7f0000000940), &(0x7f0000000080)=0x60, 0x800) ioctl$SNDRV_CTL_IOCTL_ELEM_INFO(0xffffffffffffffff, 0xc1105511, &(0x7f0000000100)={{0x0, 0x0, 0x0, 0x0, "386aea20273dc03c3d18dd0dbd4a0ca15f9f580393cc4ec3b8ee256b9aa630224ba64c6ff43ee01d2996c914"}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "eda422cd37591b3a5a7a683380f7e0b9e790c6b72cd0a4f3342f7431c1699a305ca3091bb2320e8df4e298a2cca26637866a68c1426ffbd8a6c7da1d8ea77d9d", &(0x7f00000000c0)='/dev/snd/controlC#\x00', 0x13}) r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000003c0)='/proc/self/net/pfkey\x00', 0x800, 0x0) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) add_key$user(&(0x7f0000000480)='user\x00', &(0x7f00000004c0)={0x73, 0x79, 0x7a, 0x3}, &(0x7f0000000500)="d3238eea76b0470531092a0a77b0b49789a0fc97b8f8b9e23a2a5a5a0c169ed6e83480b4801dbf79db3527904ee3128c05ce2806e210237c36b88ceabe99d8784860e5d0e91fe33d38d0133e056cdd1e2910d57fc5eb1b23db3b60a7077ff33bb6c7445cd258ee25f9187269c22d1ed05acb2b9b599bd285b692257a631754ab9befebd3fdb3167361c24c5c5dcf90e476e052b9d22362c57878cb7205fe361346d6beb77b7844fe94", 0xa9, 0xfffffffffffffffe) ioctl$sock_inet_SIOCSIFADDR(r0, 0x8916, &(0x7f0000000300)={'gretap0\x00', {0x2, 0x4e24, @loopback=0x7f000001}}) keyctl$instantiate_iov(0x14, 0x0, &(0x7f0000000780)=[{&(0x7f0000000840)="edb4a01f68d76905035a4ebdd427d31585a5a650581902b1c077f74ca8f1ce7d3e2f6e1c6760433af9664b3f3bebab3a1a1c4ef86f42c39b758accc1e7637bb18d28248dc7a1719b73388830b162613b17fd02220bd1fe2ad86adb96efcfc672d126ae58f745fba0e7534cdbae947449df767bd76a0c38b5752dcd13f7065edea86dc156c0708e76c2c99a94a95f1e93ff73cb3eb94e06d399cf48aaac7963d13e4b3a6b32bc2b19d5461545dcf3f71bb24442d286421f8d891d77a3c4c1c9435bbdf187682c22ded22b669b7790d05b4894166a2d5f33098cf908a23a2e0671d824e88942fbe0bd1416", 0xea}], 0x1, 0x0) r3 = ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) ioctl$KVM_UNREGISTER_COALESCED_MMIO(r3, 0x4010ae68, &(0x7f0000000000)={0x0, 0x5000}) ioctl$KVM_CREATE_PIT2(r3, 0x4040ae77, &(0x7f0000000440)={0xfffffffffffffff7}) ioctl$KVM_CREATE_VCPU(r3, 0xae41, 0x0) setsockopt$inet_tcp_TCP_ULP(r1, 0x6, 0x1f, &(0x7f0000000280)='tls\x00', 0x4) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000005fd8)={'vcan0\x00'}) connect$vsock_stream(0xffffffffffffffff, &(0x7f0000000080)={0x28, 0x0, 0xffffffff, @my=0x1}, 0x10) 2018/03/30 23:06:34 executing program 4: mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount(&(0x7f000000a000)='./file0\x00', &(0x7f0000026ff8)='./file0\x00', &(0x7f000000c000)='ramfs\x00', 0x0, &(0x7f000000a000)) mkdir(&(0x7f0000000000)='./file1\x00', 0x0) mount(&(0x7f0000000040)='./file0\x00', &(0x7f0000903000)='./file0\x00', &(0x7f0000811ffa)='bdev\x00', 0x100000, &(0x7f00000003c0)="b4654e059fcebd03cc73f9239f6a07ed22ce66385d2337eef2a66d904034c83627a12afc1ecb8d7e1142c51440c631a77475529f58d06474cd08984ca20eda40006f352aef263558961ab3f1ff300b08a5b54aea2a56162623142af3cce1057c8ee9eb15dc98e01846afc544b424ae134364f0ff76c92d9ce550f032a00c5981d459112f5c70789ed3bbb5527400465c6a98b4e0432a1ca8ce37dfdc7619e8b4129ee976c9b944bc6b366dbc5f0dae558fa30da2267dfccc6187d2d6f34d725343470a748007fee97ba3784d030b833463699073719ca14a0e9b6d74a70db8b216256fcd74c66a0faac2ccc16c74a7e13289091a5256dd062edf07ff4d9168e49b0820c6bb9fbabc587b54dacb9834b644eafefc1e0a4dd249c45cac5858364765a08967ed59ac86aefcb7d13e3e9cdf7c7262122bc4cfd718c3fd984395afa896d48a48489f889bd4efac7267dffdff0c686fae") r0 = dup(0xffffffffffffffff) r1 = syz_open_dev$vcsn(&(0x7f0000000140)='/dev/vcs#\x00', 0x8001, 0x101001) renameat(r0, &(0x7f0000000080)='./file1/file0\x00', r1, &(0x7f0000000100)='./file1\x00') mount(&(0x7f0000fb6000)='./file0\x00', &(0x7f0000d78000)='.', &(0x7f0000fdb000)='ubifs\x00', 0x1003, 0x0) mount(&(0x7f00002b9ff8)='./file0\x00', &(0x7f0000cbeff8)='./file0\x00', &(0x7f00005f7ffa)='ramfs\x00', 0x80000, &(0x7f000002f000)) mount(&(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)='./file1\x00', &(0x7f0000000200)='anon_inodefs\x00', 0x2000, &(0x7f0000000240)) mount(&(0x7f0000adcff8)='./file0\x00', &(0x7f0000e08fff)='.', &(0x7f00005e9000)='cifs\x00', 0x2000, &(0x7f0000ad5000)) 2018/03/30 23:06:34 executing program 7: perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f00000000c0)='./control\x00', 0x0) r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000040)='/dev/rtc\x00', 0x200c41, 0x0) r1 = inotify_init() inotify_add_watch(r1, &(0x7f0000f1eff6)='./control\x00', 0x220000000009) r2 = inotify_init1(0x0) r3 = gettid() mq_notify(r0, &(0x7f0000000100)={0x0, 0x2a, 0x1, @tid=r3}) inotify_add_watch(r2, &(0x7f000001eff6)='./control\x00', 0x2000200) setsockopt$inet6_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, &(0x7f0000000080)="5fce869db66fa225921ad03d773be4ff", 0x10) rmdir(&(0x7f000075aff6)='./control\x00') [ 342.611433] kernel msg: ebtables bug: please report to author: entries_size too small 2018/03/30 23:06:34 executing program 0 (fault-call:7 fault-nth:46): mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r0 = syz_open_dev$usbmon(&(0x7f0000000400)='/dev/usbmon#\x00', 0x0, 0x0) r1 = perf_event_open(&(0x7f0000223000)={0x2, 0x78, 0xe3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000001980)={{{@in6=@remote, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast2}, 0x0, @in=@multicast2}}, &(0x7f0000001a80)=0xe8) chown(&(0x7f00000004c0)='./file0\x00', r2, 0x0) mount(&(0x7f00000003c0)='./file0\x00', &(0x7f0000000380)='./file0\x00', &(0x7f0000000300)='cgroup2\x00', 0x0, 0x0) r3 = open$dir(&(0x7f000001bff4)='./file0\x00', 0x0, 0x0) mkdirat(r3, &(0x7f0000000280)='./file0\x00', 0x20) getdents64(r3, &(0x7f00000007c0)=""/250, 0x1015a) dup3(r0, r1, 0x80000) r4 = open$dir(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) renameat2(r4, &(0x7f0000000200)='./file1\x00', 0xffffffffffffffff, &(0x7f0000000240)='./file0\x00', 0xfd1092750066ec78) ioctl$KDGKBMODE(0xffffffffffffffff, 0x4b44, &(0x7f0000000140)) 2018/03/30 23:06:34 executing program 6: pipe(&(0x7f0000000940)={0xffffffffffffffff, 0xffffffffffffffff}) accept4$ax25(r0, 0x0, &(0x7f0000000080), 0x80000) r1 = socket$inet(0x2, 0x20000000000003, 0x2) connect$inet(r1, &(0x7f0000000000)={0x2, 0x0, @remote={0xac, 0x14, 0x14, 0xbb}}, 0x10) sendmsg(0xffffffffffffffff, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000140), 0x0, &(0x7f0000000180)=ANY=[]}, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000980)=@broute={'broute\x00', 0x20, 0x3, 0x2d9, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000380], 0x0, &(0x7f00000002c0), &(0x7f0000001000)=ANY=[@ANYBLOB="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"]}, 0x351) setsockopt$inet_int(r1, 0x0, 0x2, &(0x7f00000000c0)=0x7fffffff, 0x4) r2 = socket$rds(0x15, 0x5, 0x0) pipe(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$bt_BT_DEFER_SETUP(r3, 0x112, 0x7, &(0x7f0000000280)=0x100, 0x4) accept$packet(r4, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @remote}, &(0x7f0000000100)=0x14) connect$rds(r2, &(0x7f0000000140)={0x2, 0x4e22, @remote={0xac, 0x14, 0x14, 0xbb}}, 0x10) getsockopt$sock_buf(r2, 0x1, 0x3b, &(0x7f0000000180)=""/83, &(0x7f0000000200)=0x53) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000a00)=@filter={'filter\x00', 0xe, 0x4, 0x5a0, 0xffffffff, 0x0, 0xf0, 0xf0, 0xffffffff, 0xffffffff, 0x4d0, 0x4d0, 0x4d0, 0xffffffff, 0x4, &(0x7f0000000300), {[{{@ipv6={@ipv4={[], [0xff, 0xff], @rand_addr=0x80000001}, @dev={0xfe, 0x80, [], 0x16}, [0x0, 0xffffff00, 0xff, 0xffffffff], [0x0, 0xff000000, 0xffffffff], 'ipddp0\x00', 'ip_vti0\x00', {}, {0xff}, 0x6c, 0x2bf}, 0x0, 0xc8, 0xf0}, @REJECT={0x28, 'REJECT\x00', 0x0, {0x7}}}, {{@ipv6={@remote={0xfe, 0x80, [], 0xbb}, @remote={0xfe, 0x80, [], 0xbb}, [0xff000000, 0xffffffff, 0xffffff00, 0xff], [0xff, 0xffffffff, 0x0, 0xff000000], 'syzkaller1\x00', 'eql\x00', {}, {}, 0x62, 0x0, 0x4, 0x1}, 0x0, 0x120, 0x148, 0x0, {}, [@common=@frag={0x30, 'frag\x00', 0x0, {0x7ff, 0x7, 0x1, 0x2}}, @common=@hl={0x28, 'hl\x00', 0x0, {0x3, 0x7fff}}]}, @REJECT={0x28, 'REJECT\x00', 0x0, {0x7}}}, {{@ipv6={@dev={0xfe, 0x80, [], 0xc}, @loopback={0x0, 0x1}, [0xffffffff, 0xffffffff, 0xff000000, 0xff000000], [0xff, 0x0, 0xff, 0xffffff00], 'irlan0\x00', 'vcan0\x00', {0xff}, {}, 0x3b, 0xffffffffffffab69, 0x2, 0x30}, 0x0, 0x250, 0x298, 0x0, {}, [@common=@srh={0x30, 'srh\x00', 0x0, {0xbb, 0x1, 0x3, 0x6, 0xffffffffffffffc0, 0x80}}, @common=@inet=@policy={0x158, 'policy\x00', 0x0, {[{@ipv4, [0xffffffff, 0xff0000ff, 0xff000000, 0xffffffff], @ipv4=@multicast1=0xe0000001, [0xffffffff, 0xffffffff, 0xff000000, 0xffffff00], 0x4d5, 0x3500, 0x5c, 0x0, 0x10, 0xf}, {@ipv6=@dev={0xfe, 0x80, [], 0x11}, [0x0, 0xff000000, 0xff0000ff, 0xffffff00], @ipv4=@multicast1=0xe0000001, [0xffffffff, 0x0, 0x0, 0xffffffff], 0x4d5, 0x3500, 0x77, 0x1, 0x0, 0x1d}, {@ipv6=@mcast1={0xff, 0x1, [], 0x1}, [0xff000000, 0xffffffff, 0xffffff00, 0xff], @ipv4=@multicast2=0xe0000002, [0xffffffff, 0x0, 0xffffff00, 0xffffffff], 0x4d3, 0x3503, 0x7f, 0x0, 0x1, 0x19}, {@ipv4=@local={0xac, 0x14, 0x14, 0xaa}, [0x0, 0xff, 0x0, 0xff0000ff], @ipv6=@local={0xfe, 0x80, [], 0xaa}, [0xffffffff, 0xffffffff, 0xff, 0xff0000ff], 0x4d4, 0x3505, 0x0, 0x1, 0x1f, 0x10}], 0x0, 0x3}}]}, @common=@unspec=@LED={0x48, 'LED\x00', 0x0, {'syz1\x00', 0x0, 0x8, 0x8}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28, '\x00', 0x0, 0xfffffffffffffffe}}}}, 0x600) socket(0x1, 0xa, 0x7) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_TIMER(r4, 0x40605346, &(0x7f0000000680)={0x1, 0x3, {0x3, 0x0, 0x0, 0x3}}) 2018/03/30 23:06:34 executing program 4: mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount(&(0x7f000000a000)='./file0\x00', &(0x7f0000026ff8)='./file0\x00', &(0x7f000000c000)='ramfs\x00', 0x0, &(0x7f000000a000)) mkdir(&(0x7f0000000000)='./file1\x00', 0x0) mount(&(0x7f0000000040)='./file0\x00', &(0x7f0000903000)='./file0\x00', &(0x7f0000811ffa)='bdev\x00', 0x100000, &(0x7f00000003c0)="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") r0 = dup(0xffffffffffffffff) r1 = syz_open_dev$vcsn(&(0x7f00000000c0)='/dev/vcs#\x00', 0x2, 0x20800) renameat(r0, &(0x7f0000000080)='./file1/file0\x00', r1, &(0x7f0000000100)='./file1\x00') mount(&(0x7f0000fb6000)='./file0\x00', &(0x7f0000d78000)='.', &(0x7f0000fdb000)='ubifs\x00', 0x1003, 0x0) mount(&(0x7f00002b9ff8)='./file0\x00', &(0x7f0000cbeff8)='./file0\x00', &(0x7f00005f7ffa)='ramfs\x00', 0x80000, &(0x7f000002f000)) syz_mount_image$gfs2(&(0x7f0000000300)='gfs2\x00', &(0x7f0000000340)='./file1\x00', 0x10, 0x9, &(0x7f0000000a80)=[{&(0x7f0000000540)="a8121ab1421b0930ef24aa3f36141a304d3561e2722ace228a81da7b579b4df89623e86b7d4dde1f249b9538a3a46543bf77634dc8fa4dd5ee8b198eb9365a4574d71b18ec2d0b7f69bbd83a17e005f150b46461bf8e35942724fb9d764f565d5928c0a2f39d73268d513fdb37f7f4d5e9789e4cde64d3612b5d78014dc5c9c7857686cd73f87159ee2af272d55b674a5939cdf7cff422d748895cb7ac51832ca36b80f2a8436accb7a56eaa89369a2f2aab8b983b6ab4fda85b385e9332afe4bbf3fa882228a9804a4e2e", 0xcb, 0x8000}, {&(0x7f0000000640)="1ec5c0df71c29b0cc5e64ab25c3344b8587406f42e7733c81225f1bf40a2d3545214395a05fd2e4d506211acd6943d46deca0da67628ad38e6741f1bd9d170d0341d81bd871b9864c9eaec224f55782e3190a3", 0x53, 0xdffe}, {&(0x7f0000000380)="e3d4a88694c1c5be0d23d2da066382b1101f60ff981880dbc0052584e1b9ec8e2634af984eaab412", 0x28, 0x5}, {&(0x7f00000006c0)="7be15a2b1f5016deaa00ef6b239dc54b50a0c39aeac3149bed33ad22c992df5803243cd801013cf857f301d1696965d2889c8f4137cdff779c397d068b623d71eba607b1400b5eb8b4b945dde28900f939849378947c5815871f7d20ebaa4f0576", 0x61, 0x4}, {&(0x7f0000000740)="e71e0669ff534b89bdc3266c397f32a807bf68e0e6cf86ccc994b19b575b58a7eeb574498f9163365a7fe5b9860ee67e1ceffcea31b003d598a97bba55acd1c585fb7d5f77e4ed718ef337c1ee7ec66a8cd0ba", 0x53, 0x1ff}, {&(0x7f00000007c0)="32a9d9301500d3b06a4563d3f8cc5714bf7003b26c99319b99d766a41df95029f851b35ae83de5e3060e3bfc85daf6377dff3f189c02d59e1462ecd9eb818594a040e6f1b358daa336ef9f8090d891c816bb0e927be4013481c9e77a391343e7c3ac066710f2ba11cf425a6c37459bc39b9f26c9fb89cd457e1b5f239fbf18fc74ab5a23fb0bf705f55640a24342633c5b6c13ff9a934c", 0x97, 0x2e532909}, {&(0x7f0000000880)="541a8719cb3c1470bdfb22a143db609fed7ce84526494963e101a0105285499cf306f32b1960ae93d259a4e23314edeb694f2b4dc9c5fdfda6473eb4b98622513979b72ae8e8a7a258dc39396fc7d42645eee83b7982a3d898d577202173af2bbb77a0ee130d1b09334959a63ca773d286c89ef1f472964b770a4a1eaa298a5877c877b960c7a9ce62ea8b95dd39f2fd4da4c7944242e311535f9d0d32b18a74c4de09264278fd4b4d4860f9", 0xac, 0x80000001}, {&(0x7f0000000940)="71e0f53c9bb9896cb228e74145ed9e363e7266b32077f539fa3b27bc6c339a28d5b0c834a21d61d0b9f7ace3fb9fbee17b648d4aa49f40dd8c4d3e312343a8cdaf1d3c653ed2ff03be23bd677abc2ade44943c4801df40a42af81b2d96172e2307ffe936394fdb7aa4681738a0efb8e19c194b", 0x73, 0x6}, {&(0x7f00000009c0)="ef158ad4c0066bc753deb41e359616cdda1b9f2b75ade301830bdadf304837ed3d1a9ae5b6d1cdb20865c88d022b3faf961604302741d05a80eba32ce35e34e347e0e9aaee1fa8ae7bed01d8b915233bee43ca2ede6f8ca768bc25dddb41a49d90e211675e4794a95db2db7e66bf233e58f448aa1f694d8fc0a25af541d02c01697379f38a4895f6fd7cbc5250f48c149e8d00dea28a044722", 0x99, 0x1}], 0x20000, &(0x7f0000000c00)=ANY=[@ANYBLOB="71756f74612c6c6f63616c63616368696e672c6d6574612c7374617466735f7175616e74756d3d3f3f2d2c6c6f63616c666c6f636b732c8bc16220ee7e176e6f72671a706c76622c00"]) mount(&(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)='./file1\x00', &(0x7f0000000200)='anon_inodefs\x00', 0x2000, &(0x7f0000000240)) mount(&(0x7f0000000140)='./file0\x00', &(0x7f0000e08fff)='.', &(0x7f00000002c0)="7f8cc2c2148d9659cac5b7fb7c58d76860e1e351f2e32acb6f2ee26af26f1a8a843b098dd70c72e7046eeb9268d06edfb261a9241e48", 0x2000, &(0x7f0000000240)="0cf06384c2d3c8bcc1473203a3c824176070ca9c8f3fbd58063d66e8c0976e94592d494dd60067d428fb656c43b5b168453ba47c3f8c1f055e55baacb4516b56f7122a2a917687b97d3bc273b7bb7ab37d8c381fe597bf5f9b80574176f0211eff20048829") 2018/03/30 23:06:34 executing program 2: perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f00000000c0)='./control\x00', 0x0) inotify_init() r0 = syz_open_dev$sg(&(0x7f000028fff7)='/dev/sg#\x00', 0x0, 0x0) ioctl(r0, 0x4000000000001276, &(0x7f0000000040)) msgget(0x2, 0x0) getsockopt$nfc_llcp(0xffffffffffffffff, 0x118, 0x4, &(0x7f0000000740)=""/223, 0xdf) setsockopt$inet_mreq(r0, 0x0, 0x23, &(0x7f00000002c0)={@empty, @remote={0xac, 0x14, 0x14, 0xbb}}, 0x8) accept4$nfc_llcp(0xffffffffffffffff, &(0x7f0000000940), &(0x7f0000000080)=0x60, 0x800) ioctl$SNDRV_CTL_IOCTL_ELEM_INFO(0xffffffffffffffff, 0xc1105511, &(0x7f0000000100)={{0x0, 0x0, 0x0, 0x0, "386aea20273dc03c3d18dd0dbd4a0ca15f9f580393cc4ec3b8ee256b9aa630224ba64c6ff43ee01d2996c914"}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "eda422cd37591b3a5a7a683380f7e0b9e790c6b72cd0a4f3342f7431c1699a305ca3091bb2320e8df4e298a2cca26637866a68c1426ffbd8a6c7da1d8ea77d9d", &(0x7f00000000c0)='/dev/snd/controlC#\x00', 0x13}) r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000003c0)='/proc/self/net/pfkey\x00', 0x800, 0x0) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) add_key$user(&(0x7f0000000480)='user\x00', &(0x7f00000004c0)={0x73, 0x79, 0x7a, 0x3}, &(0x7f0000000500)="d3238eea76b0470531092a0a77b0b49789a0fc97b8f8b9e23a2a5a5a0c169ed6e83480b4801dbf79db3527904ee3128c05ce2806e210237c36b88ceabe99d8784860e5d0e91fe33d38d0133e056cdd1e2910d57fc5eb1b23db3b60a7077ff33bb6c7445cd258ee25f9187269c22d1ed05acb2b9b599bd285b692257a631754ab9befebd3fdb3167361c24c5c5dcf90e476e052b9d22362c57878cb7205fe361346d6beb77b7844fe94", 0xa9, 0xfffffffffffffffe) ioctl$sock_inet_SIOCSIFADDR(r0, 0x8916, &(0x7f0000000300)={'gretap0\x00', {0x2, 0x4e24, @loopback=0x7f000001}}) keyctl$instantiate_iov(0x14, 0x0, &(0x7f0000000780)=[{&(0x7f0000000840)="edb4a01f68d76905035a4ebdd427d31585a5a650581902b1c077f74ca8f1ce7d3e2f6e1c6760433af9664b3f3bebab3a1a1c4ef86f42c39b758accc1e7637bb18d28248dc7a1719b73388830b162613b17fd02220bd1fe2ad86adb96efcfc672d126ae58f745fba0e7534cdbae947449df767bd76a0c38b5752dcd13f7065edea86dc156c0708e76c2c99a94a95f1e93ff73cb3eb94e06d399cf48aaac7963d13e4b3a6b32bc2b19d5461545dcf3f71bb24442d286421f8d891d77a3c4c1c9435bbdf187682c22ded22b669b7790d05b4894166a2d5f33098cf908a23a2e0671d824e88942fbe0bd1416", 0xea}], 0x1, 0x0) r3 = ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) ioctl$KVM_UNREGISTER_COALESCED_MMIO(r3, 0x4010ae68, &(0x7f0000000000)={0x0, 0x5000}) ioctl$KVM_CREATE_PIT2(r3, 0x4040ae77, &(0x7f0000000440)={0xfffffffffffffff7}) ioctl$KVM_CREATE_VCPU(r3, 0xae41, 0x0) setsockopt$inet_tcp_TCP_ULP(r1, 0x6, 0x1f, &(0x7f0000000280)='tls\x00', 0x4) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000005fd8)={'vcan0\x00'}) connect$vsock_stream(0xffffffffffffffff, &(0x7f0000000080)={0x28, 0x0, 0xffffffff, @my=0x1}, 0x10) [ 342.744786] kernel msg: ebtables bug: please report to author: entries_size too small [ 342.852548] FAULT_INJECTION: forcing a failure. [ 342.852548] name failslab, interval 1, probability 0, space 0, times 0 [ 342.863922] CPU: 0 PID: 26897 Comm: syz-executor0 Not tainted 4.16.0-rc7+ #372 [ 342.871291] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 342.880637] Call Trace: [ 342.883213] dump_stack+0x194/0x24d [ 342.886834] ? arch_local_irq_restore+0x53/0x53 [ 342.891502] should_fail+0x8c0/0xa40 [ 342.895197] ? kstrdup+0x39/0x70 [ 342.898550] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 342.903642] ? cgroup_apply_control_enable+0x390/0xbc0 [ 342.908909] ? kernfs_iop_mkdir+0x153/0x1e0 [ 342.913211] ? vfs_mkdir+0x390/0x600 [ 342.916913] ? SyS_mkdirat+0x22b/0x2b0 [ 342.920780] ? entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 342.926129] ? find_held_lock+0x35/0x1d0 [ 342.930186] ? find_held_lock+0x35/0x1d0 [ 342.934236] ? __lock_is_held+0xb6/0x140 [ 342.938286] ? check_same_owner+0x320/0x320 [ 342.942590] ? rcu_note_context_switch+0x710/0x710 [ 342.947499] ? rcu_read_lock_sched_held+0x108/0x120 [ 342.952502] should_failslab+0xec/0x120 [ 342.956475] kmem_cache_alloc+0x47/0x760 [ 342.960538] ? memcpy+0x45/0x50 [ 342.963825] ? kstrdup+0x59/0x70 [ 342.967211] __kernfs_new_node+0xe2/0x570 [ 342.971368] ? kernfs_dop_revalidate+0x380/0x380 [ 342.976134] ? memset+0x31/0x40 [ 342.979416] ? snprintf+0xc0/0xf0 [ 342.982853] ? vsprintf+0x40/0x40 [ 342.986294] ? debug_lockdep_rcu_enabled+0x77/0x90 [ 342.991208] ? cgroup_file_name+0x1d0/0x1d0 [ 342.995512] kernfs_new_node+0x80/0xe0 [ 342.999382] __kernfs_create_file+0x4b/0x320 [ 343.003772] cgroup_addrm_files+0x3c5/0xa70 [ 343.008085] ? cgroup_file_write+0x710/0x710 [ 343.012482] ? cgroup_idr_replace+0x3f/0x50 [ 343.016790] ? __lock_is_held+0xb6/0x140 [ 343.020838] ? __local_bh_enable_ip+0x121/0x230 [ 343.025485] ? online_css+0x224/0x2e0 [ 343.029269] css_populate_dir+0x198/0x420 [ 343.033401] cgroup_apply_control_enable+0x390/0xbc0 [ 343.038494] ? cgroup_propagate_control+0x570/0x570 [ 343.043499] ? css_populate_dir+0x289/0x420 [ 343.047803] cgroup_mkdir+0x56f/0xfc0 [ 343.051590] ? cgroup_destroy_locked+0x750/0x750 [ 343.056325] ? from_kgid+0x4a/0x60 [ 343.059849] ? privileged_wrt_inode_uidgid+0x8e/0xb0 [ 343.064930] ? capable_wrt_inode_uidgid+0x9b/0xc0 [ 343.069753] ? generic_permission+0x105/0x3c0 [ 343.074229] ? cgroup_destroy_locked+0x750/0x750 [ 343.078967] kernfs_iop_mkdir+0x153/0x1e0 [ 343.083099] vfs_mkdir+0x390/0x600 [ 343.086621] SyS_mkdirat+0x22b/0x2b0 [ 343.090318] ? SyS_mknod+0x480/0x480 [ 343.094019] ? trace_hardirqs_on+0xd/0x10 [ 343.098153] ? do_syscall_64+0xb7/0x940 [ 343.102107] ? SyS_mknod+0x480/0x480 [ 343.105799] do_syscall_64+0x281/0x940 [ 343.109665] ? vmalloc_sync_all+0x30/0x30 [ 343.113790] ? _raw_spin_unlock_irq+0x27/0x70 [ 343.118267] ? finish_task_switch+0x1c1/0x7e0 [ 343.122741] ? syscall_return_slowpath+0x550/0x550 [ 343.127649] ? syscall_return_slowpath+0x2ac/0x550 [ 343.132558] ? prepare_exit_to_usermode+0x350/0x350 [ 343.137556] ? entry_SYSCALL_64_after_hwframe+0x52/0xb7 [ 343.142905] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 343.147731] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 343.152899] RIP: 0033:0x454e79 [ 343.156065] RSP: 002b:00007f016b92fc68 EFLAGS: 00000246 ORIG_RAX: 0000000000000102 [ 343.163755] RAX: ffffffffffffffda RBX: 00007f016b9306d4 RCX: 0000000000454e79 [ 343.171006] RDX: 0000000000000020 RSI: 0000000020000280 RDI: 0000000000000015 [ 343.178258] RBP: 000000000072bea0 R08: 0000000000000000 R09: 0000000000000000 [ 343.185508] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000016 [ 343.192856] R13: 00000000000003eb R14: 00000000006f7ea8 R15: 000000000000002e [ 343.200297] cgroup: cgroup_addrm_files: failed to add max, err=-12 2018/03/30 23:06:34 executing program 5: mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) perf_event_open(&(0x7f0000223000)={0x2, 0x78, 0xe3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000001980)={{{@in6=@remote, @in=@multicast1}}, {{@in=@multicast2}, 0x0, @in=@multicast2}}, &(0x7f0000001a80)=0xe8) mount(&(0x7f00000003c0)='./file0\x00', &(0x7f0000000380)='./file0\x00', &(0x7f0000000300)='cgroup2\x00', 0x0, 0x0) r0 = open$dir(&(0x7f000001bff4)='./file0\x00', 0x0, 0x0) mkdirat(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0x20) unlinkat(r0, &(0x7f0000000080)='./file0\x00', 0x200) 2018/03/30 23:06:34 executing program 7: r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000100)='./control\x00', 0x4) r1 = inotify_init() inotify_add_watch(r1, &(0x7f0000f1eff6)='./control\x00', 0x220000000009) r2 = inotify_init1(0x0) open_by_handle_at(r0, &(0x7f0000000140)={0x1008, 0x800, "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"}, 0x200) syz_open_dev$random(&(0x7f0000000040)='/dev/random\x00', 0x0, 0x40000) inotify_add_watch(r2, &(0x7f000001eff6)='./control\x00', 0x2000200) setsockopt$inet6_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, &(0x7f0000000080)="5fce869db66fa225921ad03d773be4ff", 0x10) rmdir(&(0x7f000075aff6)='./control\x00') socketpair$inet6_udp(0xa, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r3, 0x29, 0x20, &(0x7f0000001180)={@ipv4={[], [0xff, 0xff], @local={0xac, 0x14, 0x14, 0xaa}}, 0x0, 0x3, 0x3, 0xb, 0x1ff, 0x1, 0x9}, 0x20) 2018/03/30 23:06:34 executing program 6: pipe(&(0x7f0000000940)={0xffffffffffffffff, 0xffffffffffffffff}) accept4$ax25(r0, 0x0, &(0x7f0000000080), 0x80000) r1 = socket$inet(0x2, 0x20000000000003, 0x2) connect$inet(r1, &(0x7f0000000000)={0x2, 0x0, @remote={0xac, 0x14, 0x14, 0xbb}}, 0x10) sendmsg(0xffffffffffffffff, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000140), 0x0, &(0x7f0000000180)=ANY=[]}, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000980)=@broute={'broute\x00', 0x20, 0x3, 0x2d9, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000380], 0x0, &(0x7f00000002c0), &(0x7f0000001000)=ANY=[@ANYBLOB="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"]}, 0x351) setsockopt$inet_int(r1, 0x0, 0x2, &(0x7f00000000c0)=0x7fffffff, 0x4) r2 = socket$rds(0x15, 0x5, 0x0) pipe(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$bt_BT_DEFER_SETUP(r3, 0x112, 0x7, &(0x7f0000000280)=0x100, 0x4) accept$packet(r4, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @remote}, &(0x7f0000000100)=0x14) connect$rds(r2, &(0x7f0000000140)={0x2, 0x4e22, @remote={0xac, 0x14, 0x14, 0xbb}}, 0x10) getsockopt$sock_buf(r2, 0x1, 0x3b, &(0x7f0000000180)=""/83, &(0x7f0000000200)=0x53) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000a00)=@filter={'filter\x00', 0xe, 0x4, 0x5a0, 0xffffffff, 0x0, 0xf0, 0xf0, 0xffffffff, 0xffffffff, 0x4d0, 0x4d0, 0x4d0, 0xffffffff, 0x4, &(0x7f0000000300), {[{{@ipv6={@ipv4={[], [0xff, 0xff], @rand_addr=0x80000001}, @dev={0xfe, 0x80, [], 0x16}, [0x0, 0xffffff00, 0xff, 0xffffffff], [0x0, 0xff000000, 0xffffffff], 'ipddp0\x00', 'ip_vti0\x00', {}, {0xff}, 0x6c, 0x2bf}, 0x0, 0xc8, 0xf0}, @REJECT={0x28, 'REJECT\x00', 0x0, {0x7}}}, {{@ipv6={@remote={0xfe, 0x80, [], 0xbb}, @remote={0xfe, 0x80, [], 0xbb}, [0xff000000, 0xffffffff, 0xffffff00, 0xff], [0xff, 0xffffffff, 0x0, 0xff000000], 'syzkaller1\x00', 'eql\x00', {}, {}, 0x62, 0x0, 0x4, 0x1}, 0x0, 0x120, 0x148, 0x0, {}, [@common=@frag={0x30, 'frag\x00', 0x0, {0x7ff, 0x7, 0x1, 0x2}}, @common=@hl={0x28, 'hl\x00', 0x0, {0x3, 0x7fff}}]}, @REJECT={0x28, 'REJECT\x00', 0x0, {0x7}}}, {{@ipv6={@dev={0xfe, 0x80, [], 0xc}, @loopback={0x0, 0x1}, [0xffffffff, 0xffffffff, 0xff000000, 0xff000000], [0xff, 0x0, 0xff, 0xffffff00], 'irlan0\x00', 'vcan0\x00', {0xff}, {}, 0x3b, 0xffffffffffffab69, 0x2, 0x30}, 0x0, 0x250, 0x298, 0x0, {}, [@common=@srh={0x30, 'srh\x00', 0x0, {0xbb, 0x1, 0x3, 0x6, 0xffffffffffffffc0, 0x80}}, @common=@inet=@policy={0x158, 'policy\x00', 0x0, {[{@ipv4, [0xffffffff, 0xff0000ff, 0xff000000, 0xffffffff], @ipv4=@multicast1=0xe0000001, [0xffffffff, 0xffffffff, 0xff000000, 0xffffff00], 0x4d5, 0x3500, 0x5c, 0x0, 0x10, 0xf}, {@ipv6=@dev={0xfe, 0x80, [], 0x11}, [0x0, 0xff000000, 0xff0000ff, 0xffffff00], @ipv4=@multicast1=0xe0000001, [0xffffffff, 0x0, 0x0, 0xffffffff], 0x4d5, 0x3500, 0x77, 0x1, 0x0, 0x1d}, {@ipv6=@mcast1={0xff, 0x1, [], 0x1}, [0xff000000, 0xffffffff, 0xffffff00, 0xff], @ipv4=@multicast2=0xe0000002, [0xffffffff, 0x0, 0xffffff00, 0xffffffff], 0x4d3, 0x3503, 0x7f, 0x0, 0x1, 0x19}, {@ipv4=@local={0xac, 0x14, 0x14, 0xaa}, [0x0, 0xff, 0x0, 0xff0000ff], @ipv6=@local={0xfe, 0x80, [], 0xaa}, [0xffffffff, 0xffffffff, 0xff, 0xff0000ff], 0x4d4, 0x3505, 0x0, 0x1, 0x1f, 0x10}], 0x0, 0x3}}]}, @common=@unspec=@LED={0x48, 'LED\x00', 0x0, {'syz1\x00', 0x0, 0x8, 0x8}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28, '\x00', 0x0, 0xfffffffffffffffe}}}}, 0x600) socket(0x1, 0xa, 0x7) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_TIMER(r4, 0x40605346, &(0x7f0000000680)={0x1, 0x3, {0x3, 0x0, 0x0, 0x3}}) 2018/03/30 23:06:34 executing program 2: perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f00000000c0)='./control\x00', 0x0) inotify_init() r0 = syz_open_dev$sg(&(0x7f000028fff7)='/dev/sg#\x00', 0x0, 0x0) ioctl(r0, 0x4000000000001276, &(0x7f0000000040)) msgget(0x2, 0x0) getsockopt$nfc_llcp(0xffffffffffffffff, 0x118, 0x4, &(0x7f0000000740)=""/223, 0xdf) setsockopt$inet_mreq(r0, 0x0, 0x23, &(0x7f00000002c0)={@empty, @remote={0xac, 0x14, 0x14, 0xbb}}, 0x8) accept4$nfc_llcp(0xffffffffffffffff, &(0x7f0000000940), &(0x7f0000000080)=0x60, 0x800) ioctl$SNDRV_CTL_IOCTL_ELEM_INFO(0xffffffffffffffff, 0xc1105511, &(0x7f0000000100)={{0x0, 0x0, 0x0, 0x0, "386aea20273dc03c3d18dd0dbd4a0ca15f9f580393cc4ec3b8ee256b9aa630224ba64c6ff43ee01d2996c914"}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "eda422cd37591b3a5a7a683380f7e0b9e790c6b72cd0a4f3342f7431c1699a305ca3091bb2320e8df4e298a2cca26637866a68c1426ffbd8a6c7da1d8ea77d9d", &(0x7f00000000c0)='/dev/snd/controlC#\x00', 0x13}) r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000003c0)='/proc/self/net/pfkey\x00', 0x800, 0x0) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) add_key$user(&(0x7f0000000480)='user\x00', &(0x7f00000004c0)={0x73, 0x79, 0x7a, 0x3}, &(0x7f0000000500)="d3238eea76b0470531092a0a77b0b49789a0fc97b8f8b9e23a2a5a5a0c169ed6e83480b4801dbf79db3527904ee3128c05ce2806e210237c36b88ceabe99d8784860e5d0e91fe33d38d0133e056cdd1e2910d57fc5eb1b23db3b60a7077ff33bb6c7445cd258ee25f9187269c22d1ed05acb2b9b599bd285b692257a631754ab9befebd3fdb3167361c24c5c5dcf90e476e052b9d22362c57878cb7205fe361346d6beb77b7844fe94", 0xa9, 0xfffffffffffffffe) ioctl$sock_inet_SIOCSIFADDR(r0, 0x8916, &(0x7f0000000300)={'gretap0\x00', {0x2, 0x4e24, @loopback=0x7f000001}}) keyctl$instantiate_iov(0x14, 0x0, &(0x7f0000000780)=[{&(0x7f0000000840)="edb4a01f68d76905035a4ebdd427d31585a5a650581902b1c077f74ca8f1ce7d3e2f6e1c6760433af9664b3f3bebab3a1a1c4ef86f42c39b758accc1e7637bb18d28248dc7a1719b73388830b162613b17fd02220bd1fe2ad86adb96efcfc672d126ae58f745fba0e7534cdbae947449df767bd76a0c38b5752dcd13f7065edea86dc156c0708e76c2c99a94a95f1e93ff73cb3eb94e06d399cf48aaac7963d13e4b3a6b32bc2b19d5461545dcf3f71bb24442d286421f8d891d77a3c4c1c9435bbdf187682c22ded22b669b7790d05b4894166a2d5f33098cf908a23a2e0671d824e88942fbe0bd1416", 0xea}], 0x1, 0x0) r3 = ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) ioctl$KVM_UNREGISTER_COALESCED_MMIO(r3, 0x4010ae68, &(0x7f0000000000)={0x0, 0x5000}) ioctl$KVM_CREATE_PIT2(r3, 0x4040ae77, &(0x7f0000000440)={0xfffffffffffffff7}) ioctl$KVM_CREATE_VCPU(r3, 0xae41, 0x0) setsockopt$inet_tcp_TCP_ULP(r1, 0x6, 0x1f, &(0x7f0000000280)='tls\x00', 0x4) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000005fd8)={'vcan0\x00'}) connect$vsock_stream(0xffffffffffffffff, &(0x7f0000000080)={0x28, 0x0, 0xffffffff, @my=0x1}, 0x10) 2018/03/30 23:06:34 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x200, 0x0) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000680)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$sock_linger(r2, 0x1, 0xd, &(0x7f00000006c0)={0x400, 0x9}, 0x8) perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x0, 0x0) r3 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) mmap(&(0x7f0000000000/0x9d7000)=nil, 0x9d7000, 0x0, 0x10, 0xffffffffffffffff, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x7) perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r4 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r4, &(0x7f0000e5b000)={0x2, 0x4e20, @multicast1=0xe0000001}, 0x10) syz_open_dev$sg(&(0x7f0000000440)='/dev/sg#\x00', 0x0, 0x0) connect$inet(r4, &(0x7f0000000100)={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x11}}, 0x10) r5 = bpf$PROG_LOAD(0x5, &(0x7f0000eb0fb8)={0x1, 0x3, &(0x7f00009ff000)=@framed={{0x18}, [], {0x95}}, &(0x7f00002bf000)='syzkaller\x00', 0x4, 0xb7, &(0x7f00006ab000)=""/183}, 0x48) setsockopt$inet_tcp_int(r4, 0x6, 0x19, &(0x7f0000000240)=0x8, 0x4) r6 = socket$kcm(0x29, 0x2, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r6, 0x89e0, &(0x7f000031aff8)={r4, r5}) ioctl$sock_kcm_SIOCKCMCLONE(r6, 0x89e2, &(0x7f00000002c0)={0xffffffffffffffff}) sendmsg$nl_xfrm(r7, &(0x7f0000000780)={&(0x7f0000000200)={0x10}, 0xc, &(0x7f0000000740)={&(0x7f0000000480)=@updpolicy={0xb8, 0x19, 0x0, 0x0, 0x0, {{@in=@loopback=0x7f000001, @in6=@mcast1={0xff, 0x1, [], 0x1}}}}, 0xffcb}, 0x1}, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(r7, 0x89e1, &(0x7f0000000040)={r4}) r8 = fcntl$getown(r3, 0x9) recvfrom$inet6(r1, &(0x7f0000000140)=""/177, 0xb1, 0x40000000, &(0x7f0000000080)={0xa, 0x4e23, 0x9}, 0x1c) r9 = accept4$inet(0xffffffffffffff9c, &(0x7f0000000700)={0x0, 0x0, @broadcast}, &(0x7f0000000740)=0x10, 0x80000) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r9, 0x84, 0x64, &(0x7f0000000780)=[@in6={0xa, 0x4e22, 0xfffffffffffff7e1, @mcast2={0xff, 0x2, [], 0x1}, 0x8}, @in={0x2, 0x4e24, @broadcast=0xffffffff}], 0x2c) ptrace$setregset(0x4205, r8, 0x0, &(0x7f00000005c0)={&(0x7f0000000080)}) ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r10 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x1fffd, 0x0) r11 = syz_open_dev$sndtimer(&(0x7f00000000c0)='/dev/snd/timer\x00', 0x0, 0x0) read(r11, &(0x7f0000ec6000)=""/50, 0x32) fcntl$dupfd(r11, 0x0, r10) 2018/03/30 23:06:34 executing program 4: mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount(&(0x7f000000a000)='./file0\x00', &(0x7f0000026ff8)='./file0\x00', &(0x7f000000c000)='ramfs\x00', 0x0, &(0x7f000000a000)) mkdir(&(0x7f0000000000)='./file1\x00', 0x0) mount(&(0x7f0000000040)='./file0\x00', &(0x7f0000903000)='./file0\x00', &(0x7f0000811ffa)='bdev\x00', 0x100000, &(0x7f00000003c0)="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") r0 = dup(0xffffffffffffffff) mkdirat(r0, &(0x7f0000000240)='./file1/file1\x00', 0x10) r1 = syz_open_dev$vcsn(&(0x7f00000000c0)='/dev/vcs#\x00', 0x2, 0x20800) renameat(r0, &(0x7f0000000080)='./file1/file0\x00', r1, &(0x7f0000000100)='./file1\x00') mount(&(0x7f0000fb6000)='./file0\x00', &(0x7f0000d78000)='.', &(0x7f0000fdb000)='ubifs\x00', 0x1003, 0x0) mount(&(0x7f00002b9ff8)='./file0\x00', &(0x7f0000cbeff8)='./file0\x00', &(0x7f00005f7ffa)='ramfs\x00', 0x80000, &(0x7f000002f000)) mount(&(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)='./file1\x00', &(0x7f0000000200)='anon_inodefs\x00', 0x2000, &(0x7f0000000240)) mount(&(0x7f0000adcff8)='./file0\x00', &(0x7f0000e08fff)='.', &(0x7f00005e9000)='cifs\x00', 0x38ba562b9131e7b2, &(0x7f0000ad5000)) inotify_add_watch(r1, &(0x7f0000000140)='./file2\x00', 0xc2a) 2018/03/30 23:06:34 executing program 3: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f0000366000)={0x2, 0x4e23, @broadcast=0xffffffff}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000f5eff5)='lp\x00', 0x4) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f0000000140)={0x1, [0x0]}, &(0x7f0000000340)=0x8) fcntl$getownex(r0, 0x10, &(0x7f00000003c0)={0x0, 0x0}) r3 = syz_open_dev$mice(&(0x7f0000000700)='/dev/input/mice\x00', 0x0, 0x0) ioctl$DRM_IOCTL_AGP_INFO(r3, 0x80386433, &(0x7f0000001240)=""/4096) ptrace$peek(0x2, r2, &(0x7f0000000600)) setsockopt$inet_sctp_SCTP_DEFAULT_SEND_PARAM(r0, 0x84, 0xa, &(0x7f0000000380)={0x6, 0x6, 0x4, 0x0, 0x3, 0x9, 0x8, 0x8, r1}, 0x20) sendto$inet(r0, &(0x7f0000fd0000), 0xfffffffffffffec1, 0x20000801, &(0x7f0000deaff0)={0x2, 0x4e23, @loopback=0x7f000001}, 0x10) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000400)) ptrace$setregset(0x4205, 0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000440)="5bb85e11575616a6e17b8f3820dc8cb112d19d828e1bf1e4490ff47c909ab9ce529e5916bf87620bff4dfe9283191b3eb08523ec711596cad6f39edfcd5218b03ee873e80e0f02", 0x47}) getsockopt$inet_sctp6_SCTP_CONTEXT(0xffffffffffffff9c, 0x84, 0x11, &(0x7f0000000080)={0x0}, &(0x7f0000000100)=0x8) getsockopt$inet_sctp_SCTP_GET_PEER_ADDR_INFO(0xffffffffffffffff, 0x84, 0xf, &(0x7f0000000200)={r4, @in6={{0xa, 0x4e22, 0x6, @mcast1={0xff, 0x1, [], 0x1}, 0xff}}, 0x0, 0x8, 0x9, 0x0, 0x674c}, &(0x7f00000002c0)=0x98) sendmsg(0xffffffffffffffff, &(0x7f00000000c0)={&(0x7f0000000000)=@sco={0x1f}, 0x80, &(0x7f0000000080), 0x0, &(0x7f0000000780)=ANY=[@ANYBLOB="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"], 0x18a}, 0x8001) setsockopt$IP_VS_SO_SET_STARTDAEMON(r0, 0x0, 0x48b, &(0x7f0000000300)={0x0, 'ip6gre0\x00', 0x2}, 0x8) getsockopt$inet_sctp6_SCTP_STATUS(0xffffffffffffffff, 0x84, 0xe, &(0x7f0000003580)={r4, 0x4, 0x0, 0x4, 0x4bf, 0x80000001, 0x9, 0x6, {r5, @in={{0x2, 0x4e20, @remote={0xac, 0x14, 0x14, 0xbb}}}, 0x200, 0xb478, 0xfff, 0x4, 0x9}}, &(0x7f0000003640)=0xb0) setsockopt$IP_VS_SO_SET_STOPDAEMON(r0, 0x0, 0x48c, &(0x7f0000000180)={0x1, "6968646470300000000000000200", 0x1}, 0x18) shutdown(r0, 0x0) modify_ldt$write2(0x11, &(0x7f0000000740)={0xc859, 0x20001800, 0xffffffff, 0x5, 0x200000000, 0x8, 0x8, 0x0, 0x1, 0x2}, 0x10) madvise(&(0x7f0000a93000/0x4000)=nil, 0x4000, 0xe) mremap(&(0x7f0000a96000/0x1000)=nil, 0x1000, 0x800000, 0x3, &(0x7f0000130000/0x800000)=nil) ioctl$sock_ipx_SIOCGIFADDR(0xffffffffffffffff, 0x8915, &(0x7f0000665fe0)={"dbc78fc0a6caa717004720a0a32b5f0d", {0x4, 0x0, 0x0, "e0b618b5a2e0"}}) getsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(0xffffffffffffff9c, 0x84, 0x9, &(0x7f0000001140)={0x0, @in6={{0xa, 0x4e23, 0xf00, @mcast1={0xff, 0x1, [], 0x1}, 0xffffffff}}, 0x0, 0x6, 0x0, 0x80000000}, &(0x7f0000001200)=0x98) clone(0x0, &(0x7f0000000040), &(0x7f0000bb3000), &(0x7f0000000140), &(0x7f00000000c0)) r6 = syz_open_dev$usbmon(&(0x7f0000000640)='/dev/usbmon#\x00', 0x7, 0x620040) ioctl$SNDRV_SEQ_IOCTL_GET_SUBSCRIPTION(r6, 0xc0505350, &(0x7f0000000680)={{0x6, 0x10001}, {0x0, 0x6}, 0x6, 0x0, 0xe4}) madvise(&(0x7f0000153000/0x800000)=nil, 0x800000, 0xf) pipe(&(0x7f0000652ff8)) connect$ipx(0xffffffffffffffff, &(0x7f00000001c0)={0x4, 0x2e8, 0x0, "0f7287413567"}, 0x10) 2018/03/30 23:06:34 executing program 0 (fault-call:7 fault-nth:47): mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r0 = syz_open_dev$usbmon(&(0x7f0000000400)='/dev/usbmon#\x00', 0x0, 0x0) r1 = perf_event_open(&(0x7f0000223000)={0x2, 0x78, 0xe3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000001980)={{{@in6=@remote, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast2}, 0x0, @in=@multicast2}}, &(0x7f0000001a80)=0xe8) chown(&(0x7f00000004c0)='./file0\x00', r2, 0x0) mount(&(0x7f00000003c0)='./file0\x00', &(0x7f0000000380)='./file0\x00', &(0x7f0000000300)='cgroup2\x00', 0x0, 0x0) r3 = open$dir(&(0x7f000001bff4)='./file0\x00', 0x0, 0x0) mkdirat(r3, &(0x7f0000000280)='./file0\x00', 0x20) getdents64(r3, &(0x7f00000007c0)=""/250, 0x1015a) dup3(r0, r1, 0x80000) r4 = open$dir(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) renameat2(r4, &(0x7f0000000200)='./file1\x00', 0xffffffffffffffff, &(0x7f0000000240)='./file0\x00', 0xfd1092750066ec78) ioctl$KDGKBMODE(0xffffffffffffffff, 0x4b44, &(0x7f0000000140)) [ 343.337129] kernel msg: ebtables bug: please report to author: entries_size too small [ 343.379196] FAULT_INJECTION: forcing a failure. [ 343.379196] name failslab, interval 1, probability 0, space 0, times 0 [ 343.390663] CPU: 0 PID: 26926 Comm: syz-executor0 Not tainted 4.16.0-rc7+ #372 [ 343.398052] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 343.398059] Call Trace: 2018/03/30 23:06:34 executing program 5: mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) perf_event_open(&(0x7f0000223000)={0x2, 0x78, 0xe3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000001980)={{{@in6=@remote, @in=@multicast1}}, {{@in=@multicast2}, 0x0, @in=@multicast2}}, &(0x7f0000001a80)=0xe8) mount(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='cgroup2\x00', 0x2, 0x0) r0 = open$dir(&(0x7f000001bff4)='./file0\x00', 0x0, 0x0) r1 = socket$inet_icmp(0x2, 0x2, 0x1) ioctl$sock_SIOCBRDELBR(r1, 0x89a1, &(0x7f0000000040)='ifb0\x00') mkdirat(0xffffffffffffffff, &(0x7f0000000280)='./file0\x00', 0x20) unlinkat(r0, &(0x7f0000000080)='./file0\x00', 0x200) 2018/03/30 23:06:34 executing program 7: perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f00000000c0)='./control\x00', 0x0) link(&(0x7f00000002c0)='./control\x00', &(0x7f0000000300)='./control\x00') r0 = inotify_init() inotify_add_watch(r0, &(0x7f0000f1eff6)='./control\x00', 0x220000000009) r1 = inotify_init1(0x0) inotify_add_watch(r1, &(0x7f000001eff6)='./control\x00', 0x2000200) r2 = creat(&(0x7f0000000040)='./control\x00', 0xd9) ioctl$TIOCGPGRP(0xffffffffffffff9c, 0x540f, &(0x7f0000000100)=0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_INFO(r2, 0xc1105511, &(0x7f0000000180)={{0x9, 0x7, 0x1, 0xfff, "5679b1f84cccc0d85290fed4a59dd4443ca202948f36f85f76737114e5bd51873231d1fb42a8fff9f35db5d5", 0x1}, 0x0, 0x0, 0x10001, r3, 0x2f, 0x787b, "9caa299ce0d6e31987a3c7d7ca05ff68dbae005d99708a673b711f099bb588511ef2a2adf090e2b6060ff94fc6cc1feb4548a80490c0d3dddc4f9d35b0878580", &(0x7f0000000140)='(\x00', 0x2, [], [0x3ff, 0x0, 0x6, 0xffff]}) setsockopt$inet6_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, &(0x7f0000000080)="5fce869db66fa225921ad03d773be4ff", 0x10) rmdir(&(0x7f000075aff6)='./control\x00') unlinkat(r2, &(0x7f0000000340)='./control\x00', 0x0) 2018/03/30 23:06:34 executing program 6: pipe(&(0x7f0000000940)={0xffffffffffffffff, 0xffffffffffffffff}) accept4$ax25(r0, 0x0, &(0x7f0000000080), 0x80000) r1 = socket$inet(0x2, 0x20000000000003, 0x2) connect$inet(r1, &(0x7f0000000000)={0x2, 0x0, @remote={0xac, 0x14, 0x14, 0xbb}}, 0x10) sendmsg(0xffffffffffffffff, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000140), 0x0, &(0x7f0000000180)=ANY=[]}, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000980)=@broute={'broute\x00', 0x20, 0x3, 0x2d9, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000380], 0x0, &(0x7f00000002c0), &(0x7f0000001000)=ANY=[@ANYBLOB="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"]}, 0x351) setsockopt$inet_int(r1, 0x0, 0x2, &(0x7f00000000c0)=0x7fffffff, 0x4) r2 = socket$rds(0x15, 0x5, 0x0) pipe(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$bt_BT_DEFER_SETUP(r3, 0x112, 0x7, &(0x7f0000000280)=0x100, 0x4) accept$packet(r4, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @remote}, &(0x7f0000000100)=0x14) connect$rds(r2, &(0x7f0000000140)={0x2, 0x4e22, @remote={0xac, 0x14, 0x14, 0xbb}}, 0x10) getsockopt$sock_buf(r2, 0x1, 0x3b, &(0x7f0000000180)=""/83, &(0x7f0000000200)=0x53) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000a00)=@filter={'filter\x00', 0xe, 0x4, 0x5a0, 0xffffffff, 0x0, 0xf0, 0xf0, 0xffffffff, 0xffffffff, 0x4d0, 0x4d0, 0x4d0, 0xffffffff, 0x4, &(0x7f0000000300), {[{{@ipv6={@ipv4={[], [0xff, 0xff], @rand_addr=0x80000001}, @dev={0xfe, 0x80, [], 0x16}, [0x0, 0xffffff00, 0xff, 0xffffffff], [0x0, 0xff000000, 0xffffffff], 'ipddp0\x00', 'ip_vti0\x00', {}, {0xff}, 0x6c, 0x2bf}, 0x0, 0xc8, 0xf0}, @REJECT={0x28, 'REJECT\x00', 0x0, {0x7}}}, {{@ipv6={@remote={0xfe, 0x80, [], 0xbb}, @remote={0xfe, 0x80, [], 0xbb}, [0xff000000, 0xffffffff, 0xffffff00, 0xff], [0xff, 0xffffffff, 0x0, 0xff000000], 'syzkaller1\x00', 'eql\x00', {}, {}, 0x62, 0x0, 0x4, 0x1}, 0x0, 0x120, 0x148, 0x0, {}, [@common=@frag={0x30, 'frag\x00', 0x0, {0x7ff, 0x7, 0x1, 0x2}}, @common=@hl={0x28, 'hl\x00', 0x0, {0x3, 0x7fff}}]}, @REJECT={0x28, 'REJECT\x00', 0x0, {0x7}}}, {{@ipv6={@dev={0xfe, 0x80, [], 0xc}, @loopback={0x0, 0x1}, [0xffffffff, 0xffffffff, 0xff000000, 0xff000000], [0xff, 0x0, 0xff, 0xffffff00], 'irlan0\x00', 'vcan0\x00', {0xff}, {}, 0x3b, 0xffffffffffffab69, 0x2, 0x30}, 0x0, 0x250, 0x298, 0x0, {}, [@common=@srh={0x30, 'srh\x00', 0x0, {0xbb, 0x1, 0x3, 0x6, 0xffffffffffffffc0, 0x80}}, @common=@inet=@policy={0x158, 'policy\x00', 0x0, {[{@ipv4, [0xffffffff, 0xff0000ff, 0xff000000, 0xffffffff], @ipv4=@multicast1=0xe0000001, [0xffffffff, 0xffffffff, 0xff000000, 0xffffff00], 0x4d5, 0x3500, 0x5c, 0x0, 0x10, 0xf}, {@ipv6=@dev={0xfe, 0x80, [], 0x11}, [0x0, 0xff000000, 0xff0000ff, 0xffffff00], @ipv4=@multicast1=0xe0000001, [0xffffffff, 0x0, 0x0, 0xffffffff], 0x4d5, 0x3500, 0x77, 0x1, 0x0, 0x1d}, {@ipv6=@mcast1={0xff, 0x1, [], 0x1}, [0xff000000, 0xffffffff, 0xffffff00, 0xff], @ipv4=@multicast2=0xe0000002, [0xffffffff, 0x0, 0xffffff00, 0xffffffff], 0x4d3, 0x3503, 0x7f, 0x0, 0x1, 0x19}, {@ipv4=@local={0xac, 0x14, 0x14, 0xaa}, [0x0, 0xff, 0x0, 0xff0000ff], @ipv6=@local={0xfe, 0x80, [], 0xaa}, [0xffffffff, 0xffffffff, 0xff, 0xff0000ff], 0x4d4, 0x3505, 0x0, 0x1, 0x1f, 0x10}], 0x0, 0x3}}]}, @common=@unspec=@LED={0x48, 'LED\x00', 0x0, {'syz1\x00', 0x0, 0x8, 0x8}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28, '\x00', 0x0, 0xfffffffffffffffe}}}}, 0x600) socket(0x1, 0xa, 0x7) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_TIMER(r4, 0x40605346, &(0x7f0000000680)={0x1, 0x3, {0x3, 0x0, 0x9}}) [ 343.398076] dump_stack+0x194/0x24d [ 343.398092] ? arch_local_irq_restore+0x53/0x53 [ 343.398116] should_fail+0x8c0/0xa40 [ 343.398125] ? kstrdup+0x39/0x70 [ 343.398137] ? fault_create_debugfs_attr+0x1f0/0x1f0 2018/03/30 23:06:35 executing program 2: perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f00000000c0)='./control\x00', 0x0) inotify_init() r0 = syz_open_dev$sg(&(0x7f000028fff7)='/dev/sg#\x00', 0x0, 0x0) ioctl(r0, 0x4000000000001276, &(0x7f0000000040)) msgget(0x2, 0x0) getsockopt$nfc_llcp(0xffffffffffffffff, 0x118, 0x4, &(0x7f0000000740)=""/223, 0xdf) setsockopt$inet_mreq(r0, 0x0, 0x23, &(0x7f00000002c0)={@empty, @remote={0xac, 0x14, 0x14, 0xbb}}, 0x8) accept4$nfc_llcp(0xffffffffffffffff, &(0x7f0000000940), &(0x7f0000000080)=0x60, 0x800) ioctl$SNDRV_CTL_IOCTL_ELEM_INFO(0xffffffffffffffff, 0xc1105511, &(0x7f0000000100)={{0x0, 0x0, 0x0, 0x0, "386aea20273dc03c3d18dd0dbd4a0ca15f9f580393cc4ec3b8ee256b9aa630224ba64c6ff43ee01d2996c914"}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "eda422cd37591b3a5a7a683380f7e0b9e790c6b72cd0a4f3342f7431c1699a305ca3091bb2320e8df4e298a2cca26637866a68c1426ffbd8a6c7da1d8ea77d9d", &(0x7f00000000c0)='/dev/snd/controlC#\x00', 0x13}) r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000003c0)='/proc/self/net/pfkey\x00', 0x800, 0x0) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) add_key$user(&(0x7f0000000480)='user\x00', &(0x7f00000004c0)={0x73, 0x79, 0x7a, 0x3}, &(0x7f0000000500)="d3238eea76b0470531092a0a77b0b49789a0fc97b8f8b9e23a2a5a5a0c169ed6e83480b4801dbf79db3527904ee3128c05ce2806e210237c36b88ceabe99d8784860e5d0e91fe33d38d0133e056cdd1e2910d57fc5eb1b23db3b60a7077ff33bb6c7445cd258ee25f9187269c22d1ed05acb2b9b599bd285b692257a631754ab9befebd3fdb3167361c24c5c5dcf90e476e052b9d22362c57878cb7205fe361346d6beb77b7844fe94", 0xa9, 0xfffffffffffffffe) ioctl$sock_inet_SIOCSIFADDR(r0, 0x8916, &(0x7f0000000300)={'gretap0\x00', {0x2, 0x4e24, @loopback=0x7f000001}}) keyctl$instantiate_iov(0x14, 0x0, &(0x7f0000000780)=[{&(0x7f0000000840)="edb4a01f68d76905035a4ebdd427d31585a5a650581902b1c077f74ca8f1ce7d3e2f6e1c6760433af9664b3f3bebab3a1a1c4ef86f42c39b758accc1e7637bb18d28248dc7a1719b73388830b162613b17fd02220bd1fe2ad86adb96efcfc672d126ae58f745fba0e7534cdbae947449df767bd76a0c38b5752dcd13f7065edea86dc156c0708e76c2c99a94a95f1e93ff73cb3eb94e06d399cf48aaac7963d13e4b3a6b32bc2b19d5461545dcf3f71bb24442d286421f8d891d77a3c4c1c9435bbdf187682c22ded22b669b7790d05b4894166a2d5f33098cf908a23a2e0671d824e88942fbe0bd1416", 0xea}], 0x1, 0x0) r3 = ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) ioctl$KVM_UNREGISTER_COALESCED_MMIO(r3, 0x4010ae68, &(0x7f0000000000)={0x0, 0x5000}) ioctl$KVM_CREATE_PIT2(r3, 0x4040ae77, &(0x7f0000000440)={0xfffffffffffffff7}) ioctl$KVM_CREATE_VCPU(r3, 0xae41, 0x0) setsockopt$inet_tcp_TCP_ULP(r1, 0x6, 0x1f, &(0x7f0000000280)='tls\x00', 0x4) socket$can_raw(0x1d, 0x3, 0x1) connect$vsock_stream(0xffffffffffffffff, &(0x7f0000000080)={0x28, 0x0, 0xffffffff, @my=0x1}, 0x10) 2018/03/30 23:06:35 executing program 0 (fault-call:7 fault-nth:48): mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r0 = syz_open_dev$usbmon(&(0x7f0000000400)='/dev/usbmon#\x00', 0x0, 0x0) r1 = perf_event_open(&(0x7f0000223000)={0x2, 0x78, 0xe3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000001980)={{{@in6=@remote, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast2}, 0x0, @in=@multicast2}}, &(0x7f0000001a80)=0xe8) chown(&(0x7f00000004c0)='./file0\x00', r2, 0x0) mount(&(0x7f00000003c0)='./file0\x00', &(0x7f0000000380)='./file0\x00', &(0x7f0000000300)='cgroup2\x00', 0x0, 0x0) r3 = open$dir(&(0x7f000001bff4)='./file0\x00', 0x0, 0x0) mkdirat(r3, &(0x7f0000000280)='./file0\x00', 0x20) getdents64(r3, &(0x7f00000007c0)=""/250, 0x1015a) dup3(r0, r1, 0x80000) r4 = open$dir(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) renameat2(r4, &(0x7f0000000200)='./file1\x00', 0xffffffffffffffff, &(0x7f0000000240)='./file0\x00', 0xfd1092750066ec78) ioctl$KDGKBMODE(0xffffffffffffffff, 0x4b44, &(0x7f0000000140)) [ 343.398148] ? cgroup_apply_control_enable+0x390/0xbc0 2018/03/30 23:06:35 executing program 6: pipe(&(0x7f0000000940)={0xffffffffffffffff, 0xffffffffffffffff}) accept4$ax25(r0, 0x0, &(0x7f0000000080), 0x80000) r1 = socket$inet(0x2, 0x20000000000003, 0x2) connect$inet(r1, &(0x7f0000000000)={0x2, 0x0, @remote={0xac, 0x14, 0x14, 0xbb}}, 0x10) sendmsg(0xffffffffffffffff, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000140), 0x0, &(0x7f0000000180)=ANY=[]}, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000980)=@broute={'broute\x00', 0x20, 0x3, 0x2d9, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000380], 0x0, &(0x7f00000002c0), &(0x7f0000001000)=ANY=[@ANYBLOB="00000000000000000000000000000000000000000000000000000000000000000000000000000000feffffff0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000ffffffff010000000b00000008000000600469666230000000000000000000000000736974300000000000000000000000007663616e300000000000000000000000626f6e643000000000000000000000000180c200000e00ffff00ffffaaaaaaaaaaaaffffff0000ff000008010000d001000048020000706879736465760000000000000000000000000000000000000000000000000070000000000000006e723000000000000000000000000000000000000000000000000000000000000000000000000000000000000000766c616e300000003a9c4ebb9f24dc06a52c000000000000000000000000000000000000000000ff0000000000000000000000000000000101000000000000000000000000000000000000004c45440000000000000000000000000000000000000000000000000000000000280000000000000073797a310000000000000000000000000000000000000000000000004000000000000000000000004e464c4f470000000000000000000000000000000000000000000000000000005000000000000000000000000000000000000000692ef8a72c6779a914df06a44b35b0eafd833141b590148ad8c2d17b06e81aa50bc466307f618025cda16029da79ca01cd7bf2fa8433c6000000004e464c4f470000000000000000000000000000000000000000000000000000005000000000000000000000000000000000000000f7040c3bd532a607b6540847e9980255ac80a05048ee3c578fd00c809822ab1ff7d12707561fdd7b1bcbd7c428bd7449152a676a0e0fc0823ebe89b10758fffe5c92f48f0000000000000000000000000000000000000000000000000000000000000000000000000000000001000000fcffffff"]}, 0x351) setsockopt$inet_int(r1, 0x0, 0x2, &(0x7f00000000c0)=0x7fffffff, 0x4) r2 = socket$rds(0x15, 0x5, 0x0) pipe(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$bt_BT_DEFER_SETUP(r3, 0x112, 0x7, &(0x7f0000000280)=0x100, 0x4) accept$packet(r4, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @remote}, &(0x7f0000000100)=0x14) connect$rds(r2, &(0x7f0000000140)={0x2, 0x4e22, @remote={0xac, 0x14, 0x14, 0xbb}}, 0x10) getsockopt$sock_buf(r2, 0x1, 0x3b, &(0x7f0000000180)=""/83, &(0x7f0000000200)=0x53) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000a00)=@filter={'filter\x00', 0xe, 0x4, 0x5a0, 0xffffffff, 0x0, 0xf0, 0xf0, 0xffffffff, 0xffffffff, 0x4d0, 0x4d0, 0x4d0, 0xffffffff, 0x4, &(0x7f0000000300), {[{{@ipv6={@ipv4={[], [0xff, 0xff], @rand_addr=0x80000001}, @dev={0xfe, 0x80, [], 0x16}, [0x0, 0xffffff00, 0xff, 0xffffffff], [0x0, 0xff000000, 0xffffffff], 'ipddp0\x00', 'ip_vti0\x00', {}, {0xff}, 0x6c, 0x2bf}, 0x0, 0xc8, 0xf0}, @REJECT={0x28, 'REJECT\x00', 0x0, {0x7}}}, {{@ipv6={@remote={0xfe, 0x80, [], 0xbb}, @remote={0xfe, 0x80, [], 0xbb}, [0xff000000, 0xffffffff, 0xffffff00, 0xff], [0xff, 0xffffffff, 0x0, 0xff000000], 'syzkaller1\x00', 'eql\x00', {}, {}, 0x62, 0x0, 0x4, 0x1}, 0x0, 0x120, 0x148, 0x0, {}, [@common=@frag={0x30, 'frag\x00', 0x0, {0x7ff, 0x7, 0x1, 0x2}}, @common=@hl={0x28, 'hl\x00', 0x0, {0x3, 0x7fff}}]}, @REJECT={0x28, 'REJECT\x00', 0x0, {0x7}}}, {{@ipv6={@dev={0xfe, 0x80, [], 0xc}, @loopback={0x0, 0x1}, [0xffffffff, 0xffffffff, 0xff000000, 0xff000000], [0xff, 0x0, 0xff, 0xffffff00], 'irlan0\x00', 'vcan0\x00', {0xff}, {}, 0x3b, 0xffffffffffffab69, 0x2, 0x30}, 0x0, 0x250, 0x298, 0x0, {}, [@common=@srh={0x30, 'srh\x00', 0x0, {0xbb, 0x1, 0x3, 0x6, 0xffffffffffffffc0, 0x80}}, @common=@inet=@policy={0x158, 'policy\x00', 0x0, {[{@ipv4, [0xffffffff, 0xff0000ff, 0xff000000, 0xffffffff], @ipv4=@multicast1=0xe0000001, [0xffffffff, 0xffffffff, 0xff000000, 0xffffff00], 0x4d5, 0x3500, 0x5c, 0x0, 0x10, 0xf}, {@ipv6=@dev={0xfe, 0x80, [], 0x11}, [0x0, 0xff000000, 0xff0000ff, 0xffffff00], @ipv4=@multicast1=0xe0000001, [0xffffffff, 0x0, 0x0, 0xffffffff], 0x4d5, 0x3500, 0x77, 0x1, 0x0, 0x1d}, {@ipv6=@mcast1={0xff, 0x1, [], 0x1}, [0xff000000, 0xffffffff, 0xffffff00, 0xff], @ipv4=@multicast2=0xe0000002, [0xffffffff, 0x0, 0xffffff00, 0xffffffff], 0x4d3, 0x3503, 0x7f, 0x0, 0x1, 0x19}, {@ipv4=@local={0xac, 0x14, 0x14, 0xaa}, [0x0, 0xff, 0x0, 0xff0000ff], @ipv6=@local={0xfe, 0x80, [], 0xaa}, [0xffffffff, 0xffffffff, 0xff, 0xff0000ff], 0x4d4, 0x3505, 0x0, 0x1, 0x1f, 0x10}], 0x0, 0x3}}]}, @common=@unspec=@LED={0x48, 'LED\x00', 0x0, {'syz1\x00', 0x0, 0x8, 0x8}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28, '\x00', 0x0, 0xfffffffffffffffe}}}}, 0x600) socket(0x1, 0xa, 0x7) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_TIMER(r4, 0x40605346, &(0x7f0000000680)={0x1, 0x3, {0x3, 0x0, 0x9}}) [ 343.398157] ? kernfs_iop_mkdir+0x153/0x1e0 [ 343.398164] ? vfs_mkdir+0x390/0x600 [ 343.398171] ? SyS_mkdirat+0x22b/0x2b0 [ 343.398181] ? entry_SYSCALL_64_after_hwframe+0x42/0xb7 2018/03/30 23:06:35 executing program 7: r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f00000000c0)='./control\x00', 0x0) r1 = inotify_init() inotify_add_watch(r1, &(0x7f0000f1eff6)='./control\x00', 0x220000000009) sync_file_range(r0, 0x1, 0x380000000000, 0x2) r2 = inotify_init1(0x0) inotify_add_watch(r2, &(0x7f000001eff6)='./control\x00', 0x2000200) r3 = syz_open_dev$vcsa(&(0x7f0000000100)='/dev/vcsa#\x00', 0x2, 0x129000) r4 = openat$rfkill(0xffffffffffffff9c, &(0x7f0000000140)='/dev/rfkill\x00', 0x802, 0x0) ioctl$FUSE_DEV_IOC_CLONE(r3, 0x8004e500, &(0x7f0000000180)=r4) setsockopt$inet6_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, &(0x7f0000000080)="5fce869db66fa225921ad03d773be4ff", 0x10) rmdir(&(0x7f000075aff6)='./control\x00') mkdir(&(0x7f0000000040)='./control\x00', 0x4c) [ 343.398193] ? find_held_lock+0x35/0x1d0 [ 343.398209] ? find_held_lock+0x35/0x1d0 [ 343.398223] ? __lock_is_held+0xb6/0x140 [ 343.398245] ? check_same_owner+0x320/0x320 [ 343.398258] ? rcu_note_context_switch+0x710/0x710 [ 343.398268] ? rcu_read_lock_sched_held+0x108/0x120 [ 343.398284] should_failslab+0xec/0x120 [ 343.398294] kmem_cache_alloc+0x47/0x760 [ 343.398302] ? memcpy+0x45/0x50 [ 343.398312] ? kstrdup+0x59/0x70 [ 343.398325] __kernfs_new_node+0xe2/0x570 [ 343.398337] ? kernfs_dop_revalidate+0x380/0x380 [ 343.398346] ? memset+0x31/0x40 [ 343.398362] ? snprintf+0xc0/0xf0 [ 343.398371] ? vsprintf+0x40/0x40 [ 343.398378] ? debug_lockdep_rcu_enabled+0x77/0x90 [ 343.398389] ? cgroup_file_name+0x1d0/0x1d0 [ 343.398400] kernfs_new_node+0x80/0xe0 [ 343.398413] __kernfs_create_file+0x4b/0x320 [ 343.398425] cgroup_addrm_files+0x3c5/0xa70 [ 343.398445] ? cgroup_file_write+0x710/0x710 [ 343.398462] ? cgroup_idr_replace+0x3f/0x50 [ 343.398476] ? __lock_is_held+0xb6/0x140 [ 343.398492] ? __local_bh_enable_ip+0x121/0x230 [ 343.398502] ? online_css+0x224/0x2e0 [ 343.398516] css_populate_dir+0x198/0x420 [ 343.398531] cgroup_apply_control_enable+0x390/0xbc0 [ 343.398552] ? cgroup_propagate_control+0x570/0x570 [ 343.398570] ? css_populate_dir+0x289/0x420 [ 343.398583] cgroup_mkdir+0x56f/0xfc0 [ 343.398600] ? cgroup_destroy_locked+0x750/0x750 [ 343.398610] ? from_kgid+0x4a/0x60 [ 343.398620] ? privileged_wrt_inode_uidgid+0x8e/0xb0 [ 343.398631] ? capable_wrt_inode_uidgid+0x9b/0xc0 [ 343.398641] ? generic_permission+0x105/0x3c0 [ 343.398653] ? cgroup_destroy_locked+0x750/0x750 [ 343.398663] kernfs_iop_mkdir+0x153/0x1e0 [ 343.398675] vfs_mkdir+0x390/0x600 [ 343.398688] SyS_mkdirat+0x22b/0x2b0 [ 343.398701] ? SyS_mknod+0x480/0x480 [ 343.398708] ? trace_hardirqs_on+0xd/0x10 [ 343.398719] ? do_syscall_64+0xb7/0x940 [ 343.398730] ? SyS_mknod+0x480/0x480 [ 343.398740] do_syscall_64+0x281/0x940 [ 343.398748] ? vmalloc_sync_all+0x30/0x30 [ 343.398756] ? _raw_spin_unlock_irq+0x27/0x70 [ 343.398765] ? finish_task_switch+0x1c1/0x7e0 [ 343.398775] ? syscall_return_slowpath+0x550/0x550 [ 343.398785] ? syscall_return_slowpath+0x2ac/0x550 [ 343.398796] ? prepare_exit_to_usermode+0x350/0x350 [ 343.398807] ? entry_SYSCALL_64_after_hwframe+0x52/0xb7 [ 343.398821] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 343.398837] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 343.398845] RIP: 0033:0x454e79 [ 343.398850] RSP: 002b:00007f016b92fc68 EFLAGS: 00000246 ORIG_RAX: 0000000000000102 [ 343.398860] RAX: ffffffffffffffda RBX: 00007f016b9306d4 RCX: 0000000000454e79 [ 343.398866] RDX: 0000000000000020 RSI: 0000000020000280 RDI: 0000000000000015 [ 343.398871] RBP: 000000000072bea0 R08: 0000000000000000 R09: 0000000000000000 [ 343.398877] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000016 [ 343.398882] R13: 00000000000003eb R14: 00000000006f7ea8 R15: 000000000000002f [ 343.399006] cgroup: cgroup_addrm_files: failed to add weight, err=-12 [ 343.483614] kernel msg: ebtables bug: please report to author: entries_size too small [ 343.585576] FAULT_INJECTION: forcing a failure. [ 343.585576] name failslab, interval 1, probability 0, space 0, times 0 [ 343.727366] kernel msg: ebtables bug: please report to author: entries_size too small [ 343.728827] CPU: 1 PID: 26946 Comm: syz-executor0 Not tainted 4.16.0-rc7+ #372 [ 343.728835] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 343.728841] Call Trace: [ 343.728859] dump_stack+0x194/0x24d [ 343.728874] ? arch_local_irq_restore+0x53/0x53 [ 343.919897] should_fail+0x8c0/0xa40 [ 343.919908] ? kstrdup+0x39/0x70 [ 343.919917] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 343.919927] ? cgroup_apply_control_enable+0x390/0xbc0 [ 343.919937] ? kernfs_iop_mkdir+0x153/0x1e0 [ 343.919944] ? vfs_mkdir+0x390/0x600 [ 343.919949] ? SyS_mkdirat+0x22b/0x2b0 [ 343.919957] ? do_syscall_64+0x281/0x940 [ 343.919967] ? entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 343.919978] ? find_held_lock+0x35/0x1d0 [ 343.919988] ? find_held_lock+0x35/0x1d0 [ 343.919999] ? __lock_is_held+0xb6/0x140 [ 343.920022] ? check_same_owner+0x320/0x320 [ 343.920036] ? rcu_note_context_switch+0x710/0x710 [ 343.920044] ? rcu_read_lock_sched_held+0x108/0x120 [ 343.920056] should_failslab+0xec/0x120 [ 343.920064] kmem_cache_alloc+0x47/0x760 [ 343.920070] ? memcpy+0x45/0x50 [ 343.920078] ? kstrdup+0x59/0x70 [ 343.920087] __kernfs_new_node+0xe2/0x570 [ 343.920095] ? kernfs_dop_revalidate+0x380/0x380 [ 343.920110] ? snprintf+0xc0/0xf0 [ 343.920117] ? vsprintf+0x40/0x40 [ 343.920122] ? debug_lockdep_rcu_enabled+0x77/0x90 [ 343.920130] ? cgroup_file_name+0x1d0/0x1d0 [ 343.920139] kernfs_new_node+0x80/0xe0 [ 343.920148] __kernfs_create_file+0x4b/0x320 [ 343.920157] cgroup_addrm_files+0x3c5/0xa70 [ 343.920170] ? cgroup_file_write+0x710/0x710 [ 343.920182] ? cgroup_idr_replace+0x3f/0x50 [ 343.920191] ? __lock_is_held+0xb6/0x140 [ 343.920204] ? __local_bh_enable_ip+0x121/0x230 [ 343.920211] ? online_css+0x224/0x2e0 [ 343.920221] css_populate_dir+0x198/0x420 [ 343.920232] cgroup_apply_control_enable+0x390/0xbc0 [ 343.920245] ? cgroup_propagate_control+0x570/0x570 [ 343.920257] ? css_populate_dir+0x289/0x420 [ 343.920267] cgroup_mkdir+0x56f/0xfc0 [ 343.920278] ? cgroup_destroy_locked+0x750/0x750 [ 343.920285] ? from_kgid+0x4a/0x60 [ 343.920293] ? privileged_wrt_inode_uidgid+0x8e/0xb0 [ 343.920301] ? capable_wrt_inode_uidgid+0x9b/0xc0 [ 343.920308] ? generic_permission+0x105/0x3c0 [ 343.920317] ? cgroup_destroy_locked+0x750/0x750 [ 343.920324] kernfs_iop_mkdir+0x153/0x1e0 [ 343.920333] vfs_mkdir+0x390/0x600 [ 343.920342] SyS_mkdirat+0x22b/0x2b0 [ 343.920351] ? SyS_mknod+0x480/0x480 [ 343.920357] ? trace_hardirqs_on+0xd/0x10 [ 343.920364] ? do_syscall_64+0xb7/0x940 [ 343.920371] ? SyS_mknod+0x480/0x480 [ 343.920379] do_syscall_64+0x281/0x940 [ 343.920386] ? vmalloc_sync_all+0x30/0x30 [ 343.920392] ? _raw_spin_unlock_irq+0x27/0x70 [ 343.920398] ? finish_task_switch+0x1c1/0x7e0 [ 343.920406] ? syscall_return_slowpath+0x550/0x550 [ 343.920413] ? syscall_return_slowpath+0x2ac/0x550 [ 343.920421] ? prepare_exit_to_usermode+0x350/0x350 [ 343.920429] ? entry_SYSCALL_64_after_hwframe+0x52/0xb7 [ 343.920438] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 343.920450] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 343.920457] RIP: 0033:0x454e79 [ 343.920461] RSP: 002b:00007f016b92fc68 EFLAGS: 00000246 ORIG_RAX: 0000000000000102 [ 343.920469] RAX: ffffffffffffffda RBX: 00007f016b9306d4 RCX: 0000000000454e79 [ 343.920473] RDX: 0000000000000020 RSI: 0000000020000280 RDI: 0000000000000015 [ 343.920477] RBP: 000000000072bea0 R08: 0000000000000000 R09: 0000000000000000 [ 343.920481] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000016 2018/03/30 23:06:35 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000516ff0)={0x2, 0x4e21, @loopback=0x7f000001}, 0x10) sendto$inet(r0, &(0x7f0000588fff), 0xfffffffffffffe98, 0x20020003, &(0x7f0000385ff0)={0x2, 0x4e21, @loopback=0x7f000001}, 0x10) shutdown(r0, 0x1) r1 = socket(0x0, 0x3, 0x0) sendmsg$nl_xfrm(r1, &(0x7f00009d3000)={&(0x7f00000000c0)={0x10}, 0xc, &(0x7f0000000100)={&(0x7f0000000140)=ANY=[@ANYBLOB="4c0000001200db4d0080000000000000000000000000000000000000000000000000002400087293ca53c5b44013c02c4fe267d12064ef891111a0edabf37c1fd9004e9c62b0e9c4efad00000000f1f82a9b24ce6d4dcc88985b1f04"], 0x1}, 0x1}, 0x0) 2018/03/30 23:06:35 executing program 6: pipe(&(0x7f0000000940)={0xffffffffffffffff, 0xffffffffffffffff}) accept4$ax25(r0, 0x0, &(0x7f0000000080), 0x80000) r1 = socket$inet(0x2, 0x20000000000003, 0x2) connect$inet(r1, &(0x7f0000000000)={0x2, 0x0, @remote={0xac, 0x14, 0x14, 0xbb}}, 0x10) sendmsg(0xffffffffffffffff, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000140), 0x0, &(0x7f0000000180)=ANY=[]}, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000980)=@broute={'broute\x00', 0x20, 0x3, 0x2d9, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000380], 0x0, &(0x7f00000002c0), &(0x7f0000001000)=ANY=[@ANYBLOB="00000000000000000000000000000000000000000000000000000000000000000000000000000000feffffff0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000ffffffff010000000b00000008000000600469666230000000000000000000000000736974300000000000000000000000007663616e300000000000000000000000626f6e643000000000000000000000000180c200000e00ffff00ffffaaaaaaaaaaaaffffff0000ff000008010000d001000048020000706879736465760000000000000000000000000000000000000000000000000070000000000000006e723000000000000000000000000000000000000000000000000000000000000000000000000000000000000000766c616e300000003a9c4ebb9f24dc06a52c000000000000000000000000000000000000000000ff0000000000000000000000000000000101000000000000000000000000000000000000004c45440000000000000000000000000000000000000000000000000000000000280000000000000073797a310000000000000000000000000000000000000000000000004000000000000000000000004e464c4f470000000000000000000000000000000000000000000000000000005000000000000000000000000000000000000000692ef8a72c6779a914df06a44b35b0eafd833141b590148ad8c2d17b06e81aa50bc466307f618025cda16029da79ca01cd7bf2fa8433c6000000004e464c4f470000000000000000000000000000000000000000000000000000005000000000000000000000000000000000000000f7040c3bd532a607b6540847e9980255ac80a05048ee3c578fd00c809822ab1ff7d12707561fdd7b1bcbd7c428bd7449152a676a0e0fc0823ebe89b10758fffe5c92f48f0000000000000000000000000000000000000000000000000000000000000000000000000000000001000000fcffffff"]}, 0x351) setsockopt$inet_int(r1, 0x0, 0x2, &(0x7f00000000c0)=0x7fffffff, 0x4) r2 = socket$rds(0x15, 0x5, 0x0) pipe(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$bt_BT_DEFER_SETUP(r3, 0x112, 0x7, &(0x7f0000000280)=0x100, 0x4) accept$packet(r4, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @remote}, &(0x7f0000000100)=0x14) connect$rds(r2, &(0x7f0000000140)={0x2, 0x4e22, @remote={0xac, 0x14, 0x14, 0xbb}}, 0x10) getsockopt$sock_buf(r2, 0x1, 0x3b, &(0x7f0000000180)=""/83, &(0x7f0000000200)=0x53) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000a00)=@filter={'filter\x00', 0xe, 0x4, 0x5a0, 0xffffffff, 0x0, 0xf0, 0xf0, 0xffffffff, 0xffffffff, 0x4d0, 0x4d0, 0x4d0, 0xffffffff, 0x4, &(0x7f0000000300), {[{{@ipv6={@ipv4={[], [0xff, 0xff], @rand_addr=0x80000001}, @dev={0xfe, 0x80, [], 0x16}, [0x0, 0xffffff00, 0xff, 0xffffffff], [0x0, 0xff000000, 0xffffffff], 'ipddp0\x00', 'ip_vti0\x00', {}, {0xff}, 0x6c, 0x2bf}, 0x0, 0xc8, 0xf0}, @REJECT={0x28, 'REJECT\x00', 0x0, {0x7}}}, {{@ipv6={@remote={0xfe, 0x80, [], 0xbb}, @remote={0xfe, 0x80, [], 0xbb}, [0xff000000, 0xffffffff, 0xffffff00, 0xff], [0xff, 0xffffffff, 0x0, 0xff000000], 'syzkaller1\x00', 'eql\x00', {}, {}, 0x62, 0x0, 0x4, 0x1}, 0x0, 0x120, 0x148, 0x0, {}, [@common=@frag={0x30, 'frag\x00', 0x0, {0x7ff, 0x7, 0x1, 0x2}}, @common=@hl={0x28, 'hl\x00', 0x0, {0x3, 0x7fff}}]}, @REJECT={0x28, 'REJECT\x00', 0x0, {0x7}}}, {{@ipv6={@dev={0xfe, 0x80, [], 0xc}, @loopback={0x0, 0x1}, [0xffffffff, 0xffffffff, 0xff000000, 0xff000000], [0xff, 0x0, 0xff, 0xffffff00], 'irlan0\x00', 'vcan0\x00', {0xff}, {}, 0x3b, 0xffffffffffffab69, 0x2, 0x30}, 0x0, 0x250, 0x298, 0x0, {}, [@common=@srh={0x30, 'srh\x00', 0x0, {0xbb, 0x1, 0x3, 0x6, 0xffffffffffffffc0, 0x80}}, @common=@inet=@policy={0x158, 'policy\x00', 0x0, {[{@ipv4, [0xffffffff, 0xff0000ff, 0xff000000, 0xffffffff], @ipv4=@multicast1=0xe0000001, [0xffffffff, 0xffffffff, 0xff000000, 0xffffff00], 0x4d5, 0x3500, 0x5c, 0x0, 0x10, 0xf}, {@ipv6=@dev={0xfe, 0x80, [], 0x11}, [0x0, 0xff000000, 0xff0000ff, 0xffffff00], @ipv4=@multicast1=0xe0000001, [0xffffffff, 0x0, 0x0, 0xffffffff], 0x4d5, 0x3500, 0x77, 0x1, 0x0, 0x1d}, {@ipv6=@mcast1={0xff, 0x1, [], 0x1}, [0xff000000, 0xffffffff, 0xffffff00, 0xff], @ipv4=@multicast2=0xe0000002, [0xffffffff, 0x0, 0xffffff00, 0xffffffff], 0x4d3, 0x3503, 0x7f, 0x0, 0x1, 0x19}, {@ipv4=@local={0xac, 0x14, 0x14, 0xaa}, [0x0, 0xff, 0x0, 0xff0000ff], @ipv6=@local={0xfe, 0x80, [], 0xaa}, [0xffffffff, 0xffffffff, 0xff, 0xff0000ff], 0x4d4, 0x3505, 0x0, 0x1, 0x1f, 0x10}], 0x0, 0x3}}]}, @common=@unspec=@LED={0x48, 'LED\x00', 0x0, {'syz1\x00', 0x0, 0x8, 0x8}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28, '\x00', 0x0, 0xfffffffffffffffe}}}}, 0x600) socket(0x1, 0xa, 0x7) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_TIMER(r4, 0x40605346, &(0x7f0000000680)={0x1, 0x3, {0x3, 0x0, 0x9}}) 2018/03/30 23:06:35 executing program 2: perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f00000000c0)='./control\x00', 0x0) inotify_init() r0 = syz_open_dev$sg(&(0x7f000028fff7)='/dev/sg#\x00', 0x0, 0x0) ioctl(r0, 0x4000000000001276, &(0x7f0000000040)) msgget(0x2, 0x0) getsockopt$nfc_llcp(0xffffffffffffffff, 0x118, 0x4, &(0x7f0000000740)=""/223, 0xdf) setsockopt$inet_mreq(r0, 0x0, 0x23, &(0x7f00000002c0)={@empty, @remote={0xac, 0x14, 0x14, 0xbb}}, 0x8) accept4$nfc_llcp(0xffffffffffffffff, &(0x7f0000000940), &(0x7f0000000080)=0x60, 0x800) ioctl$SNDRV_CTL_IOCTL_ELEM_INFO(0xffffffffffffffff, 0xc1105511, &(0x7f0000000100)={{0x0, 0x0, 0x0, 0x0, "386aea20273dc03c3d18dd0dbd4a0ca15f9f580393cc4ec3b8ee256b9aa630224ba64c6ff43ee01d2996c914"}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "eda422cd37591b3a5a7a683380f7e0b9e790c6b72cd0a4f3342f7431c1699a305ca3091bb2320e8df4e298a2cca26637866a68c1426ffbd8a6c7da1d8ea77d9d", &(0x7f00000000c0)='/dev/snd/controlC#\x00', 0x13}) r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000003c0)='/proc/self/net/pfkey\x00', 0x800, 0x0) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) add_key$user(&(0x7f0000000480)='user\x00', &(0x7f00000004c0)={0x73, 0x79, 0x7a, 0x3}, &(0x7f0000000500)="d3238eea76b0470531092a0a77b0b49789a0fc97b8f8b9e23a2a5a5a0c169ed6e83480b4801dbf79db3527904ee3128c05ce2806e210237c36b88ceabe99d8784860e5d0e91fe33d38d0133e056cdd1e2910d57fc5eb1b23db3b60a7077ff33bb6c7445cd258ee25f9187269c22d1ed05acb2b9b599bd285b692257a631754ab9befebd3fdb3167361c24c5c5dcf90e476e052b9d22362c57878cb7205fe361346d6beb77b7844fe94", 0xa9, 0xfffffffffffffffe) ioctl$sock_inet_SIOCSIFADDR(r0, 0x8916, &(0x7f0000000300)={'gretap0\x00', {0x2, 0x4e24, @loopback=0x7f000001}}) keyctl$instantiate_iov(0x14, 0x0, &(0x7f0000000780)=[{&(0x7f0000000840)="edb4a01f68d76905035a4ebdd427d31585a5a650581902b1c077f74ca8f1ce7d3e2f6e1c6760433af9664b3f3bebab3a1a1c4ef86f42c39b758accc1e7637bb18d28248dc7a1719b73388830b162613b17fd02220bd1fe2ad86adb96efcfc672d126ae58f745fba0e7534cdbae947449df767bd76a0c38b5752dcd13f7065edea86dc156c0708e76c2c99a94a95f1e93ff73cb3eb94e06d399cf48aaac7963d13e4b3a6b32bc2b19d5461545dcf3f71bb24442d286421f8d891d77a3c4c1c9435bbdf187682c22ded22b669b7790d05b4894166a2d5f33098cf908a23a2e0671d824e88942fbe0bd1416", 0xea}], 0x1, 0x0) r3 = ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) ioctl$KVM_UNREGISTER_COALESCED_MMIO(r3, 0x4010ae68, &(0x7f0000000000)={0x0, 0x5000}) ioctl$KVM_CREATE_PIT2(r3, 0x4040ae77, &(0x7f0000000440)={0xfffffffffffffff7}) ioctl$KVM_CREATE_VCPU(r3, 0xae41, 0x0) socket$can_raw(0x1d, 0x3, 0x1) connect$vsock_stream(0xffffffffffffffff, &(0x7f0000000080)={0x28, 0x0, 0xffffffff, @my=0x1}, 0x10) 2018/03/30 23:06:35 executing program 0 (fault-call:7 fault-nth:49): mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r0 = syz_open_dev$usbmon(&(0x7f0000000400)='/dev/usbmon#\x00', 0x0, 0x0) r1 = perf_event_open(&(0x7f0000223000)={0x2, 0x78, 0xe3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000001980)={{{@in6=@remote, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast2}, 0x0, @in=@multicast2}}, &(0x7f0000001a80)=0xe8) chown(&(0x7f00000004c0)='./file0\x00', r2, 0x0) mount(&(0x7f00000003c0)='./file0\x00', &(0x7f0000000380)='./file0\x00', &(0x7f0000000300)='cgroup2\x00', 0x0, 0x0) r3 = open$dir(&(0x7f000001bff4)='./file0\x00', 0x0, 0x0) mkdirat(r3, &(0x7f0000000280)='./file0\x00', 0x20) getdents64(r3, &(0x7f00000007c0)=""/250, 0x1015a) dup3(r0, r1, 0x80000) r4 = open$dir(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) renameat2(r4, &(0x7f0000000200)='./file1\x00', 0xffffffffffffffff, &(0x7f0000000240)='./file0\x00', 0xfd1092750066ec78) ioctl$KDGKBMODE(0xffffffffffffffff, 0x4b44, &(0x7f0000000140)) 2018/03/30 23:06:35 executing program 5: mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) perf_event_open(&(0x7f0000223000)={0x2, 0x78, 0xe3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000001980)={{{@in6=@remote, @in=@multicast1}}, {{@in=@multicast2}, 0x0, @in=@multicast2}}, &(0x7f0000001a80)=0xe8) mount(&(0x7f00000003c0)='./file0\x00', &(0x7f0000000380)='./file0\x00', &(0x7f0000000300)='cgroup2\x00', 0x0, 0x0) r0 = open$dir(&(0x7f000001bff4)='./file0\x00', 0x100, 0x40) mkdirat(0xffffffffffffffff, &(0x7f0000000280)='./file0\x00', 0x20) unlinkat(r0, &(0x7f0000000040)='./file0\x00', 0x202) socketpair(0xa, 0x805, 0x1, &(0x7f0000000080)) 2018/03/30 23:06:35 executing program 7: perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f00000000c0)='./control\x00', 0x0) r0 = inotify_init() inotify_add_watch(r0, &(0x7f0000f1eff6)='./control\x00', 0x220000000009) r1 = inotify_init1(0x0) inotify_add_watch(r1, &(0x7f000001eff6)='./control\x00', 0x2000200) setsockopt$inet6_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, &(0x7f0000000080)="5fce869db66fa225921ad03d773be4ff", 0x10) inotify_init() r2 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$ARPT_SO_SET_ADD_COUNTERS(r2, 0x0, 0x61, &(0x7f0000000100)={'filter\x00', 0x4}, 0x68) mknod$loop(&(0x7f0000000180)='./control/file0\x00', 0xe0a6, 0x1) rmdir(&(0x7f0000000040)='./control/file0\x00') 2018/03/30 23:06:35 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x200, 0x0) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000680)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$sock_linger(r2, 0x1, 0xd, &(0x7f00000006c0)={0x400, 0x9}, 0x8) perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x0, 0x0) r3 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) mmap(&(0x7f0000000000/0x9d7000)=nil, 0x9d7000, 0x0, 0x10, 0xffffffffffffffff, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x7) perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r4 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r4, &(0x7f0000e5b000)={0x2, 0x4e20, @multicast1=0xe0000001}, 0x10) syz_open_dev$sg(&(0x7f0000000440)='/dev/sg#\x00', 0x0, 0x0) connect$inet(r4, &(0x7f0000000100)={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x11}}, 0x10) r5 = bpf$PROG_LOAD(0x5, &(0x7f0000eb0fb8)={0x1, 0x3, &(0x7f00009ff000)=@framed={{0x18}, [], {0x95}}, &(0x7f00002bf000)='syzkaller\x00', 0x4, 0xb7, &(0x7f00006ab000)=""/183}, 0x48) setsockopt$inet_tcp_int(r4, 0x6, 0x19, &(0x7f0000000240)=0x8, 0x4) r6 = socket$kcm(0x29, 0x2, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r6, 0x89e0, &(0x7f000031aff8)={r4, r5}) ioctl$sock_kcm_SIOCKCMCLONE(r6, 0x89e2, &(0x7f00000002c0)={0xffffffffffffffff}) sendmsg$nl_xfrm(r7, &(0x7f0000000780)={&(0x7f0000000200)={0x10}, 0xc, &(0x7f0000000740)={&(0x7f0000000480)=@updpolicy={0xb8, 0x19, 0x0, 0x0, 0x0, {{@in=@loopback=0x7f000001, @in6=@mcast1={0xff, 0x1, [], 0x1}}}}, 0xffcb}, 0x1}, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(r7, 0x89e1, &(0x7f0000000040)={r4}) r8 = fcntl$getown(r3, 0x9) recvfrom$inet6(r1, &(0x7f0000000140)=""/177, 0xb1, 0x40000000, &(0x7f0000000080)={0xa, 0x4e23, 0x9, @empty, 0xe38}, 0x1c) r9 = accept4$inet(0xffffffffffffff9c, &(0x7f0000000700)={0x0, 0x0, @broadcast}, &(0x7f0000000740)=0x10, 0x0) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r9, 0x84, 0x64, &(0x7f0000000780)=[@in6={0xa, 0x4e22, 0xfffffffffffff7e1, @mcast2={0xff, 0x2, [], 0x1}, 0x8}, @in={0x2, 0x4e24, @broadcast=0xffffffff}], 0x2c) ptrace$setregset(0x4205, r8, 0x0, &(0x7f00000005c0)={&(0x7f0000000080)}) ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r10 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x1fffd, 0x0) r11 = syz_open_dev$sndtimer(&(0x7f00000000c0)='/dev/snd/timer\x00', 0x0, 0x0) read(r11, &(0x7f0000ec6000)=""/50, 0x32) fcntl$dupfd(r11, 0x0, r10) 2018/03/30 23:06:35 executing program 3: splice(0xffffffffffffffff, &(0x7f0000000140), 0xffffffffffffffff, &(0x7f0000000180), 0x2, 0x0) fdatasync(0xffffffffffffffff) rmdir(&(0x7f0000000080)='./file0\x00') r0 = open$dir(&(0x7f0000000040)='./file0\x00', 0x0, 0x20000000000000) open_by_handle_at(0xffffffffffffffff, &(0x7f0000001780)=ANY=[@ANYBLOB="a000000007000000d587c655a9adea552fcec38e8cfe60ed3cb3454eb4661d370500c145afd8392326ae45cf0c21d197cd271832a5fa6e57bd52057c8e8ad0a0414766854b9b5e57f33c712c2f4713048098342172b1c37359e2f2576e4000c1fea11e4ba2d60a39cbc81434891975ae362847644b6f88e572db0dd17a205de06f475d71cccb206d19b13f9207e11cf29a643640da6b904735d04640e6b982600a79b624eea23e2ed3f96e6d4183141eb2f861b6f9afd941caf5ca0d5c7069beeac2d11a3e3ce96c791c8441dcd006636f73f79d38"], 0x20800) r1 = open$dir(&(0x7f00000001c0)='./file0\x00', 0x1fffe, 0x0) r2 = open$dir(&(0x7f0000000500)='./file0\x00', 0x2, 0x0) ftruncate(0xffffffffffffffff, 0x3) lseek(0xffffffffffffffff, 0x0, 0x3) write(r2, &(0x7f0000000300)="d88a8d38144e5013d473c0ac2ca61ff3b749a4f5c7e6e9c2ce586e5cfca5d60ffc9a4df71856925b300ab39b1dd592385821faecb039bcdc475ffbacb982187073fc479f1cc6ffa0000af0026e75921d8a8310071ec28e0e6292680755e470aa73f538545ff8b19c257d032f9da1fa51f9", 0x71) tee(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x2) syncfs(r1) pwritev(r1, &(0x7f00000002c0)=[{&(0x7f0000000540)="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", 0xefd}], 0x1, 0x0) splice(r2, &(0x7f0000000000), 0xffffffffffffffff, &(0x7f00000004c0), 0x7, 0x2) sendfile(r2, r1, &(0x7f0000000180), 0x0) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x2800000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="8da4363a00000000000000000000000000000000000000000000000000000000ecf6f2a3299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d050000000000000000104000000000000000020000000000000000000000000000000000000000000000800200000000007000000000000006000000000000000100000000000000001000000010000000100000001000006100000004000000000000000000000000000000000000000000000045010000000000000000000000010000000000000000008002000000000000800000000000001000000010000000100000000000000000000000000000000000000000000000000000000000000000c08de47c70514c95b95e109e96a0b90decf6f2a3299748aeb81e1b00920efd9a000000000000000000000000000000000000000000", 0x140, 0x10000}, {&(0x7f0000010b00)="0000000001000000000000000000000000000000030000000000000000100000000000000000000000000000010000000000000000000000ed41000000000000", 0x40, 0x111920}, {&(0x7f0000011300)="36ecf82700000000000000000000000000000000000000000000000000000000ecf6f2a3299748aeb81e1b00920efd9a00201100000000000000000000000001b43240f8bac948ef9b654f025d3f1737010000000000000002000000000000000c000000000010110000000000a90000000000000000830f0000180000000010110000000000b00100000000000000830f0000000000000020110000000000a900000000000000006b0f0000180000000020110000000000b002000000000000006b0f0000000000000030110000000000a90000000000000000530f0000180000000030110000000000b00300000000000000530f0000000000000040110000000000a900000000000000003b0f0000180000000040110000000000b004000000000000003b0f0000000000000050110000000000a90000000000000000230f0000180000000050110000000000b00500000000000000230f0000000000000060110000000000a900000000000000000b0f0000180000000060110000000000b007000000000000000b0f000000000000000000000000000000000000000000", 0x1a0, 0x112000}, {&(0x7f0000012000)="000000000000000000000004000000000000000001000000000000008040000000000000000000000000000010000000000000000000000000000000000000000000000100000000000000000000000000000000000000000000040000000000", 0x60, 0x401720}, {&(0x7f0000012900)="000000000000000000050000000000000000000000000000000020400000000000000000000000000000100000000000000000000000000000000000000000000001000000000000000000000000000000000000000000000500000000000000", 0x60, 0x401ee0}, {&(0x7f0000013500)="000004000000000000000000000000000000007040000000000000000000000000000010000000000000000000000000000000000000000000000100000000000000000000000000000000000000000000040000000000000000000000000000", 0x60, 0x4058e0}, {&(0x7f0000013f00)="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", 0x1a0, 0x406ec0}], 0x0, &(0x7f0000014300)) syz_mount_image$vfat(&(0x7f0000001640)='vfat\x00', &(0x7f0000001680)='./file0\x00', 0x200, 0x1, &(0x7f0000002900)=[{&(0x7f00000016c0)="cf029ff80a1c57176fcec2ab1bff3e9ffbe0d31231540853608f9da1c7222aad36e440f9ff9e69b8e53ae45dc736ca700022dc4ec4", 0x35, 0x9}], 0x1001, &(0x7f0000002980)) name_to_handle_at(r0, &(0x7f0000002d00)='./file0\x00', &(0x7f0000002e40)=ANY=[@ANYBLOB="9a000000040000001045f2e90b19709a8787351b8b1f8104f97b77fd6c3a99af823eb540a04833cad551a1b11f312b7c6383ecb35894deff6b322523c5f442e2f47d89e3dd5d578407adc92a1934a2bfed7efeec3d2887e585a9ce06c6a6413d4450863856dbbbf2b6ca529d6e9871515828eba9db9dcc7d206eb2e71d9f000468a026b32928818d1bdc2d8c85f833654d49551168a3d6b16f9fea7519cd20f1db205511281c242e973c71e56972f173773e77b9bc269dd0271beeae439aab5305e5dc8832c01367be795e92d21fd0b3c971b34dd3a1d14ba8810000000000000000000000000000"], &(0x7f0000002e00), 0x1400) open$dir(&(0x7f0000001740)='./file0\x00', 0x200, 0x100) lookup_dcookie(0x7, &(0x7f0000001540)=""/249, 0xf9) syz_mount_image$xfs(&(0x7f0000000100)='xfs\x00', &(0x7f00000003c0)='./file0\x00', 0x6, 0x1, &(0x7f0000000480)=[{&(0x7f0000000400)="456655db142b0600750e5c0aff3b50ab1819d59e912310af2c87b1ee984e09e2b6679e58d9b46d9b575949cd9f2122360a1143d054c4933a903b8f291d32564926a69aadeffc1ecc9fbac447", 0x4c, 0x3}], 0x400, &(0x7f0000002700)=ANY=[]) fdatasync(r2) fdatasync(r1) mount(&(0x7f00000000c0)='./file0\x00', &(0x7f0000001440)='./file0\x00', &(0x7f0000001480)='affs\x00', 0x5004, 0x0) pipe(&(0x7f0000002740)) [ 343.920485] R13: 00000000000003eb R14: 00000000006f7ea8 R15: 0000000000000030 [ 343.920576] cgroup: cgroup_addrm_files: failed to add weight, err=-12 [ 344.354444] kernel msg: ebtables bug: please report to author: entries_size too small 2018/03/30 23:06:35 executing program 2: perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f00000000c0)='./control\x00', 0x0) inotify_init() r0 = syz_open_dev$sg(&(0x7f000028fff7)='/dev/sg#\x00', 0x0, 0x0) ioctl(r0, 0x4000000000001276, &(0x7f0000000040)) msgget(0x2, 0x0) getsockopt$nfc_llcp(0xffffffffffffffff, 0x118, 0x4, &(0x7f0000000740)=""/223, 0xdf) setsockopt$inet_mreq(r0, 0x0, 0x23, &(0x7f00000002c0)={@empty, @remote={0xac, 0x14, 0x14, 0xbb}}, 0x8) accept4$nfc_llcp(0xffffffffffffffff, &(0x7f0000000940), &(0x7f0000000080)=0x60, 0x800) ioctl$SNDRV_CTL_IOCTL_ELEM_INFO(0xffffffffffffffff, 0xc1105511, &(0x7f0000000100)={{0x0, 0x0, 0x0, 0x0, "386aea20273dc03c3d18dd0dbd4a0ca15f9f580393cc4ec3b8ee256b9aa630224ba64c6ff43ee01d2996c914"}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "eda422cd37591b3a5a7a683380f7e0b9e790c6b72cd0a4f3342f7431c1699a305ca3091bb2320e8df4e298a2cca26637866a68c1426ffbd8a6c7da1d8ea77d9d", &(0x7f00000000c0)='/dev/snd/controlC#\x00', 0x13}) r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000003c0)='/proc/self/net/pfkey\x00', 0x800, 0x0) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) add_key$user(&(0x7f0000000480)='user\x00', &(0x7f00000004c0)={0x73, 0x79, 0x7a, 0x3}, &(0x7f0000000500)="d3238eea76b0470531092a0a77b0b49789a0fc97b8f8b9e23a2a5a5a0c169ed6e83480b4801dbf79db3527904ee3128c05ce2806e210237c36b88ceabe99d8784860e5d0e91fe33d38d0133e056cdd1e2910d57fc5eb1b23db3b60a7077ff33bb6c7445cd258ee25f9187269c22d1ed05acb2b9b599bd285b692257a631754ab9befebd3fdb3167361c24c5c5dcf90e476e052b9d22362c57878cb7205fe361346d6beb77b7844fe94", 0xa9, 0xfffffffffffffffe) ioctl$sock_inet_SIOCSIFADDR(r0, 0x8916, &(0x7f0000000300)={'gretap0\x00', {0x2, 0x4e24, @loopback=0x7f000001}}) keyctl$instantiate_iov(0x14, 0x0, &(0x7f0000000780)=[{&(0x7f0000000840)="edb4a01f68d76905035a4ebdd427d31585a5a650581902b1c077f74ca8f1ce7d3e2f6e1c6760433af9664b3f3bebab3a1a1c4ef86f42c39b758accc1e7637bb18d28248dc7a1719b73388830b162613b17fd02220bd1fe2ad86adb96efcfc672d126ae58f745fba0e7534cdbae947449df767bd76a0c38b5752dcd13f7065edea86dc156c0708e76c2c99a94a95f1e93ff73cb3eb94e06d399cf48aaac7963d13e4b3a6b32bc2b19d5461545dcf3f71bb24442d286421f8d891d77a3c4c1c9435bbdf187682c22ded22b669b7790d05b4894166a2d5f33098cf908a23a2e0671d824e88942fbe0bd1416", 0xea}], 0x1, 0x0) r3 = ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) ioctl$KVM_UNREGISTER_COALESCED_MMIO(r3, 0x4010ae68, &(0x7f0000000000)={0x0, 0x5000}) ioctl$KVM_CREATE_PIT2(r3, 0x4040ae77, &(0x7f0000000440)={0xfffffffffffffff7}) ioctl$KVM_CREATE_VCPU(r3, 0xae41, 0x0) socket$can_raw(0x1d, 0x3, 0x1) connect$vsock_stream(0xffffffffffffffff, &(0x7f0000000080)={0x28, 0x0, 0xffffffff, @my=0x1}, 0x10) 2018/03/30 23:06:35 executing program 7: setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000001000)={0x0, {{0xa, 0x0, 0x0, @mcast2={0xff, 0x2, [], 0x1}}}, {{0xa, 0x0, 0x0, @dev={0xfe, 0x80}}}}, 0xfffffffffffffe8c) r0 = gettid() sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000500)={&(0x7f0000000400)={0x10}, 0xc, &(0x7f00000004c0)={&(0x7f0000000440)=@getnetconf={0x14, 0x52, 0x400, 0x70bd2b, 0x25dfdbfb}, 0x14}, 0x1}, 0x80) r1 = syz_open_procfs(r0, &(0x7f0000000480)='net/ip6_mr_cache\x00') preadv(r1, &(0x7f0000000000), 0x200000000000022b, 0x10000003) signalfd4(0xffffffffffffffff, &(0x7f0000000540), 0x8, 0x80000) r2 = socket$inet_udp(0x2, 0x2, 0x0) r3 = socket$packet(0x11, 0x0, 0x300) setsockopt$packet_fanout(r3, 0x107, 0x12, &(0x7f000095bffc), 0x4) connect$inet(r2, &(0x7f0000000040)={0x2, 0x0, @local={0xac, 0x14, 0x14, 0xaa}}, 0x10) r4 = socket$inet_udp(0x2, 0x2, 0x0) connect$inet(r4, &(0x7f0000000040)={0x2, 0x0, @local={0xac, 0x14, 0x14, 0xaa}}, 0x10) sendto$inet(r4, &(0x7f0000762fff), 0xfdc7, 0x0, &(0x7f000057bff0)={0x2, 0x4e20, @multicast1=0xe0000001}, 0x10) sendto$inet(r2, &(0x7f0000762fff), 0xfdc7, 0x0, &(0x7f000057bff0)={0x2, 0x4e20, @multicast1=0xe0000001}, 0x10) socketpair$unix(0x1, 0x1000000000003, 0x0, &(0x7f000021bff8)) writev(0xffffffffffffffff, &(0x7f00000000c0)=[{&(0x7f0000000340)}], 0x1) mmap(&(0x7f0000000000/0xb000)=nil, 0xb000, 0x0, 0x2000004004031, 0xffffffffffffffff, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$inet_sctp6_SCTP_PARTIAL_DELIVERY_POINT(0xffffffffffffff9c, 0x84, 0x13, &(0x7f0000000580)={0x0, 0xfffffffffffffff7}, &(0x7f00000005c0)=0x8) getsockopt$inet_sctp_SCTP_PR_SUPPORTED(0xffffffffffffff9c, 0x84, 0x71, &(0x7f0000000600)={0x0, 0x2}, &(0x7f0000000640)=0x8) getsockopt$inet_sctp_SCTP_PEER_ADDR_THLDS(0xffffffffffffffff, 0x84, 0x1f, &(0x7f0000000880)={0x0, @in6={{0xa, 0x4e21, 0x0, @mcast1={0xff, 0x1, [], 0x1}, 0x94}}, 0x10000, 0x1c4}, &(0x7f0000000940)=0x90) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f0000000d00)={0x2, [0x0, 0x0]}, &(0x7f0000000d40)=0xc) getsockopt$inet_sctp6_SCTP_DELAYED_SACK(0xffffffffffffff9c, 0x84, 0x10, &(0x7f0000000ec0)=@assoc_value={0x0, 0x101}, &(0x7f0000000f00)=0x8) getsockopt$inet_sctp_SCTP_PARTIAL_DELIVERY_POINT(0xffffffffffffff9c, 0x84, 0x13, &(0x7f0000000f40), &(0x7f0000000f80)=0x8) getsockopt$inet_sctp6_SCTP_AUTH_ACTIVE_KEY(0xffffffffffffff9c, 0x84, 0x18, &(0x7f0000001040)={0x0, 0x8}, &(0x7f0000001080)=0x8) getsockopt$inet_sctp_SCTP_DEFAULT_SEND_PARAM(0xffffffffffffffff, 0x84, 0xa, &(0x7f0000001540)={0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400}, &(0x7f0000001580)=0x20) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f00000015c0)=ANY=[@ANYBLOB="02cc"], &(0x7f0000001600)=0x1) 2018/03/30 23:06:35 executing program 6: r0 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000180)='/dev/sequencer\x00', 0x42, 0x0) ioctl$sock_inet_SIOCRTMSG(0xffffffffffffffff, 0x890d, &(0x7f0000000100)={0x0, {0x2, 0x0, @dev={0xac, 0x14, 0x14}}, {0x2, 0x0, @broadcast=0xffffffff}, {0x2, 0x0, @remote={0xac, 0x14, 0x14, 0xbb}}, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)='bridge0\x00', 0x3ff, 0x0, 0xff}) r1 = syz_open_procfs(0x0, &(0x7f00000001c0)="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") getsockopt$inet_sctp6_SCTP_MAXSEG(r1, 0x84, 0xd, &(0x7f0000000440), &(0x7f0000000480)=0x4) getsockopt$inet_sctp6_SCTP_CONTEXT(r1, 0x84, 0x11, &(0x7f0000000500)={0x0, 0x8}, &(0x7f00000005c0)=0x8) getsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(r1, 0x84, 0x1f, &(0x7f0000000680)={0x0, @in={{0x2, 0x4e21, @loopback=0x7f000001}}, 0x0, 0x8}, &(0x7f0000000740)=0x90) setsockopt$inet_sctp_SCTP_PR_SUPPORTED(r0, 0x84, 0x71, &(0x7f00000004c0)={r2, 0x8}, 0x8) sendfile(r0, r1, &(0x7f0000000040), 0x100000000081) r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000140)='./cgroup.cpu\x00', 0x200002, 0x0) r4 = syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x0, 0x0) splice(r4, &(0x7f0000000300), r3, &(0x7f00000003c0), 0x812, 0x8) r5 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$netlink_NETLINK_ADD_MEMBERSHIP(0xffffffffffffffff, 0x10e, 0x1, &(0x7f0000000240), 0x4) rmdir(&(0x7f0000000080)='./file0\x00') setsockopt$inet_mreqn(r5, 0x0, 0x20, &(0x7f0000000140)={@multicast1=0xe0000001, @broadcast=0xffffffff}, 0xc) connect$nfc_llcp(0xffffffffffffffff, &(0x7f0000000540)={0x27, 0x0, 0x2, 0x2, 0x7, 0x6, "4021bc5c62a8b600554fd217a152db8c5e202690ff5e106c7c3952d6060c481cf11e7913f883ddd296bfa5479216af340d0d68910e8d8adb388f562a8d6718"}, 0x60) ioctl$sock_inet_SIOCSIFFLAGS(r5, 0x8914, &(0x7f0000000000)={'lo\x00'}) setsockopt$IP_VS_SO_SET_ADD(r5, 0x0, 0x482, &(0x7f0000000340)={0x0, @multicast1=0xe0000001, 0x0, 0x0, 'dh\x00', 0x25}, 0x2c) ioctl$sock_inet_SIOCSIFFLAGS(r5, 0x8914, &(0x7f0000001d40)={'lo\x00', 0xfff}) getsockopt$IPT_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x40, &(0x7f00000000c0)={'security\x00'}, &(0x7f0000000040)=0x54) socket$inet_sctp(0x2, 0x0, 0x84) setsockopt$inet_sctp_SCTP_RECVNXTINFO(0xffffffffffffffff, 0x84, 0x21, &(0x7f0000000180), 0xfe57) socket$inet_sctp(0x2, 0x1, 0x84) sendto$inet(0xffffffffffffffff, &(0x7f0000000000), 0x0, 0x4000, &(0x7f0000000040)={0x2, 0x4e22, @loopback=0x7f000001}, 0x10) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x8, &(0x7f0000cecffc), 0x4) write(0xffffffffffffffff, &(0x7f000095c000), 0x0) r6 = open(&(0x7f0000ac3000)='./control\x00', 0x0, 0x0) openat(0xffffffffffffffff, &(0x7f0000563000)='./file0\x00', 0x0, 0x0) renameat2(r6, &(0x7f000001dff6)='./control\x00', 0xffffffffffffffff, &(0x7f0000e14ff6)='./control\x00', 0x0) 2018/03/30 23:06:35 executing program 3: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup.cpu\x00', 0x200002, 0x0) r1 = open(&(0x7f0000000040)='./control\x00', 0x0, 0x1) fchdir(r0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000500)={0x0, 0x0}, &(0x7f0000000540)=0xc) fchown(r0, r2, 0x0) membarrier(0x8, 0x0) r3 = socket$nl_xfrm(0x10, 0x3, 0x6) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000080)={'bond0\x00'}) r4 = socket(0xa, 0x2, 0x0) sendmsg$IPVS_CMD_GET_INFO(0xffffffffffffffff, &(0x7f00000009c0)={&(0x7f0000000500)={0x10, 0x0, 0x0, 0x21100000}, 0xc, &(0x7f0000000980)={&(0x7f0000000600)=ANY=[@ANYBLOB="010e28bdba00fedbdf250f0000000800060003000000680000000000000000000000080001000a00000008000bf272697e0008000b0073690001000a0000079f02040007c6752b11623f002000000003010000080006006c630000b025dabd001a08000b007302306e00528d83aa8f23b0c9d515ee84efaa64003587e898db0000b7"], 0x1}, 0x1}, 0x20000884) ioctl$sock_FIOGETOWN(r4, 0x8903, &(0x7f0000000200)) connect$inet6(r4, &(0x7f0000000100)={0xa, 0x0, 0x0, @mcast1={0xff, 0x1, [], 0x1}, 0x100000002}, 0x1c) getsockopt$inet_opts(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000540)=""/99, &(0x7f0000000780)=0x28c77c4c79f525cf) sendto$inet(r4, &(0x7f0000509f92), 0xff77, 0x0, &(0x7f000055fff0)={0x2, 0x4e23, @loopback=0x7f000001}, 0x10) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000b00)='./cgroup.cpu\x00', 0x200002, 0x0) fchdir(0xffffffffffffffff) sendto$inet(0xffffffffffffffff, &(0x7f0000000a40)="45431bc153e49dc3c341afeff8a6a3782b30655dea8638a45a7a369ca5aebbc34e2d0227a019364ef806e574edc574801179b3c34145612db79a5340231421095dba2effc99687206c3416a0afabbea4ab2d17074a574429500a92adb41dfbc9e160349e8bb48b1d26e10c3e2571a99e857df6cdf0eb2dbb45810d2736bc2d", 0x7f, 0x3ffffff, &(0x7f0000000c00)={0x2, 0x4e23, @loopback=0x7f000001}, 0x10) r5 = creat(&(0x7f0000000100)='./file0\x00', 0xfffffffffffffffc) fallocate(r5, 0x1, 0x0, 0x20004d2d) ioctl$DRM_IOCTL_SET_VERSION(r5, 0xc0106407, &(0x7f00000000c0)={0x55c, 0x2}) sendto$inet(0xffffffffffffffff, &(0x7f0000000000), 0x0, 0x0, &(0x7f0000000080)={0x2, 0x4e24}, 0x10) sendmsg$inet_sctp(r4, &(0x7f000050dfc8)={&(0x7f0000000840)=@in6={0xa, 0x4e24, 0x80000001, @mcast1={0xff, 0x1, [], 0x1}}, 0x1c, &(0x7f00000005c0), 0x0, &(0x7f0000576000)}, 0x0) sendto$inet6(r4, &(0x7f0000000240)="6a14ad6a11c00f", 0x7, 0x0, &(0x7f0000000280)={0xa, 0x4e23, 0x3, @local={0xfe, 0x80, [], 0xaa}, 0x9}, 0x1c) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000000)={{{@in=@multicast2, @in6=@dev}}, {{@in=@multicast1}, 0x0, @in6=@ipv4={[], [], @remote}}}, &(0x7f0000000140)=0xe8) r6 = open(&(0x7f0000022ff6)='./control\x00', 0x0, 0x0) getdents(r6, &(0x7f000076cf07)=""/249, 0xf9) syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x0) 2018/03/30 23:06:36 executing program 5: r0 = socket(0xa, 0x2, 0x0) flock(r0, 0x6) sendmsg$IPVS_CMD_GET_INFO(r0, &(0x7f00000009c0)={&(0x7f0000000500)={0x10}, 0xc, &(0x7f0000000980)={&(0x7f0000000340)=ANY=[@ANYBLOB="010e28bd7000fedb00f00f0000000810060003000000680001000800050001000000080001000a00000008000bf072697e0008000b00736970000c090000788a8c8fcb984da869c90008c8d96a7f530001000a0000da25c08ec968c3507f62efad1442a6a5079f0404a21c0dedf883e08695c90007c6752b11623f0020000000030100bd001a08370b007369700014000300ffff000000000000753f1e443084836ddea0f0a4a342b7a6bbd9511db0ecc72260e701c8a397000000000000b477e4ca0811f368b76a7134cb9d24bbb7f6d95f807947eb5e9e0da4d79ca2be2f3f5cf17ca623d4a424a0f7e6cd71"], 0x1}, 0x1, 0x0, 0x0, 0x50}, 0x20000884) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000200)) connect$inet6(r0, &(0x7f0000000100)={0xa, 0x0, 0x0, @mcast1={0xff, 0x1, [], 0x1}, 0x1f}, 0x1c) getsockopt$inet_sctp_SCTP_PEER_ADDR_THLDS(r0, 0x84, 0x1f, &(0x7f00000006c0)={0x0, @in6={{0xa, 0x4e20, 0x0, @mcast1={0xff, 0x1, [], 0x1}, 0x401}}, 0x6d}, &(0x7f00000004c0)=0x88) getsockopt$inet_sctp_SCTP_DELAYED_SACK(0xffffffffffffffff, 0x84, 0x10, &(0x7f0000000880)=@assoc_value={0x0, 0x7}, &(0x7f0000000b40)=0x8) getsockopt$inet_opts(r0, 0x0, 0x0, &(0x7f0000000540)=""/99, &(0x7f0000000780)=0x28c77c4c79f525cf) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000b00)='./cgroup.cpu\x00', 0x200002, 0x0) fchdir(r1) sendmsg$IPVS_CMD_NEW_DEST(r0, &(0x7f0000000bc0)={&(0x7f0000000900)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000940)={&(0x7f0000000c40)={0x54, 0x0, 0x400, 0x0, 0x25dfdbfe, {0x5}, [@IPVS_CMD_ATTR_DEST={0xc, 0x2, [@IPVS_DEST_ATTR_FWD_METHOD={0x8, 0x3, 0x3}]}, @IPVS_CMD_ATTR_DEST={0x14, 0x2, [@IPVS_DEST_ATTR_FWD_METHOD={0x8, 0x3, 0x4}, @IPVS_DEST_ATTR_WEIGHT={0x8, 0x4, 0x4}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5}, @IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0x3}, @IPVS_CMD_ATTR_SERVICE={0x4, 0x1}, @IPVS_CMD_ATTR_SERVICE={0xc, 0x1, [@IPVS_SVC_ATTR_PROTOCOL={0x8, 0x2, 0x1d}]}]}, 0x54}, 0x1}, 0x0) r2 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) fallocate(r2, 0x0, 0x8004, 0x0) r3 = open(&(0x7f0000000080)='./bus\x00', 0x141042, 0x8) sendfile(r3, r3, &(0x7f0000000040), 0x80000001) fallocate(r2, 0x1, 0x0, 0x0) sendfile(r3, r2, 0x0, 0xc08f) bind$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @multicast1=0xe0000001}, 0x10) r4 = creat(&(0x7f0000000100)='./file1\x00', 0x0) ioctl$DRM_IOCTL_SET_VERSION(r4, 0xc0106407, &(0x7f00000000c0)={0x55c, 0x2, 0xffffffffffff5165, 0x4c}) sendto$inet(0xffffffffffffffff, &(0x7f0000000000), 0x0, 0x0, &(0x7f0000000080)={0x2}, 0x10) mlockall(0x2) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) remap_file_pages(&(0x7f0000001000/0x3000)=nil, 0x3000, 0x0, 0x2, 0x0) mount(&(0x7f0000000280)='./file0\x00', &(0x7f0000026ff8)='./file0\x00', &(0x7f000000c000)='ramfs\x00', 0x0, &(0x7f00000002c0)) r5 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) ftruncate(r5, 0x7fff) mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) perf_event_open(&(0x7f0000223000)={0x2, 0x78, 0xe3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000001980)={{{@in6=@remote, @in=@multicast1}}, {{@in=@multicast2}, 0x0, @in=@multicast2}}, &(0x7f0000001a80)=0xe8) [ 344.521701] device lo left promiscuous mode [ 344.567860] IPVS: set_ctl: invalid protocol: 0 224.0.0.1:0 dh [ 344.590799] device lo entered promiscuous mode [ 344.594578] FAULT_INJECTION: forcing a failure. [ 344.594578] name failslab, interval 1, probability 0, space 0, times 0 [ 344.606774] CPU: 0 PID: 27009 Comm: syz-executor0 Not tainted 4.16.0-rc7+ #372 [ 344.614144] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 344.623503] Call Trace: [ 344.626105] dump_stack+0x194/0x24d [ 344.629744] ? arch_local_irq_restore+0x53/0x53 [ 344.634427] should_fail+0x8c0/0xa40 [ 344.638132] ? kstrdup+0x39/0x70 [ 344.641484] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 344.646568] ? cgroup_apply_control_enable+0x390/0xbc0 [ 344.651826] ? kernfs_iop_mkdir+0x153/0x1e0 [ 344.656129] ? vfs_mkdir+0x390/0x600 [ 344.659825] ? SyS_mkdirat+0x22b/0x2b0 [ 344.663696] ? entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 344.669051] ? find_held_lock+0x35/0x1d0 [ 344.673105] ? find_held_lock+0x35/0x1d0 [ 344.677155] ? __lock_is_held+0xb6/0x140 [ 344.681210] ? check_same_owner+0x320/0x320 [ 344.685516] ? rcu_note_context_switch+0x710/0x710 [ 344.690425] ? rcu_read_lock_sched_held+0x108/0x120 [ 344.695428] should_failslab+0xec/0x120 [ 344.699385] kmem_cache_alloc+0x47/0x760 [ 344.703425] ? memcpy+0x45/0x50 [ 344.706694] ? kstrdup+0x59/0x70 [ 344.710048] __kernfs_new_node+0xe2/0x570 [ 344.714180] ? kernfs_dop_revalidate+0x380/0x380 [ 344.718920] ? memset+0x31/0x40 [ 344.722194] ? snprintf+0xc0/0xf0 [ 344.725631] ? vsprintf+0x40/0x40 [ 344.729065] ? debug_lockdep_rcu_enabled+0x77/0x90 [ 344.733979] ? cgroup_file_name+0x1d0/0x1d0 [ 344.738284] kernfs_new_node+0x80/0xe0 [ 344.742163] __kernfs_create_file+0x4b/0x320 [ 344.746555] cgroup_addrm_files+0x3c5/0xa70 [ 344.750870] ? cgroup_file_write+0x710/0x710 [ 344.755267] ? cgroup_idr_replace+0x3f/0x50 [ 344.759580] ? __lock_is_held+0xb6/0x140 [ 344.763632] ? __local_bh_enable_ip+0x121/0x230 [ 344.768283] ? online_css+0x224/0x2e0 [ 344.772075] css_populate_dir+0x198/0x420 [ 344.776209] cgroup_apply_control_enable+0x390/0xbc0 [ 344.781313] ? cgroup_propagate_control+0x570/0x570 [ 344.786321] ? css_populate_dir+0x289/0x420 [ 344.790626] cgroup_mkdir+0x56f/0xfc0 [ 344.794414] ? cgroup_destroy_locked+0x750/0x750 [ 344.799153] ? from_kgid+0x4a/0x60 [ 344.802674] ? privileged_wrt_inode_uidgid+0x8e/0xb0 [ 344.807764] ? capable_wrt_inode_uidgid+0x9b/0xc0 [ 344.812588] ? generic_permission+0x105/0x3c0 [ 344.817068] ? cgroup_destroy_locked+0x750/0x750 [ 344.821805] kernfs_iop_mkdir+0x153/0x1e0 [ 344.825941] vfs_mkdir+0x390/0x600 [ 344.829465] SyS_mkdirat+0x22b/0x2b0 [ 344.833162] ? SyS_mknod+0x480/0x480 [ 344.836856] ? trace_hardirqs_on+0xd/0x10 [ 344.840984] ? do_syscall_64+0xb7/0x940 [ 344.845411] ? SyS_mknod+0x480/0x480 [ 344.849109] do_syscall_64+0x281/0x940 [ 344.852976] ? vmalloc_sync_all+0x30/0x30 [ 344.857105] ? _raw_spin_unlock_irq+0x27/0x70 [ 344.861579] ? finish_task_switch+0x1c1/0x7e0 [ 344.866055] ? syscall_return_slowpath+0x550/0x550 [ 344.870965] ? syscall_return_slowpath+0x2ac/0x550 [ 344.875876] ? prepare_exit_to_usermode+0x350/0x350 [ 344.880877] ? entry_SYSCALL_64_after_hwframe+0x52/0xb7 [ 344.886226] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 344.891054] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 344.896224] RIP: 0033:0x454e79 [ 344.899392] RSP: 002b:00007f016b92fc68 EFLAGS: 00000246 ORIG_RAX: 0000000000000102 [ 344.907081] RAX: ffffffffffffffda RBX: 00007f016b9306d4 RCX: 0000000000454e79 2018/03/30 23:06:36 executing program 3: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000200)='./cgroup.cpu\x00', 0x200002, 0x0) memfd_create(&(0x7f00000001c0)='\x00', 0x0) syz_genetlink_get_family_id$ipvs(&(0x7f0000000280)='IPVS\x00') sendmsg$IPVS_CMD_GET_DAEMON(0xffffffffffffffff, &(0x7f0000000480)={&(0x7f0000000240)={0x10}, 0xc, &(0x7f0000000440)={&(0x7f0000000500)=ANY=[@ANYBLOB="980000"], 0x1}, 0x1}, 0x0) fchdir(r0) setxattr(&(0x7f00000003c0)='./file1\x00', &(0x7f0000000400)=@random={'user.', '{/\x00'}, &(0x7f00000004c0)='{\x00', 0x2, 0x0) syslog(0x3, &(0x7f00000000c0)=""/215, 0xd7) pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$UFFDIO_UNREGISTER(0xffffffffffffffff, 0x8010aa01, &(0x7f0000000080)={&(0x7f0000ffc000/0x2000)=nil, 0x2000}) r3 = creat(&(0x7f0000000000)='./file1\x00', 0x0) creat(&(0x7f0000000380)='./file1\x00', 0x8) write$evdev(r3, &(0x7f0000000280), 0xffffffffffffffd4) fsync(r3) mq_timedsend(0xffffffffffffffff, &(0x7f0000000180)="eae331b69e5a59d1482eb0bc2db06f216d624660dd70eee7d0ee86a0442500bb630eefc6d2499834ecfb1841b13806f248c951885757cca684cf0d39f554a64671c42278fc046669e9c677e7f42ec483a2547eb8c0f421081215", 0x5a, 0x0, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x3, 0x31, 0xffffffffffffffff, 0x0) add_key$user(&(0x7f0000000000)='user\x00', &(0x7f0000000040)={0x73, 0x79, 0x7a, 0x3}, &(0x7f0000000080), 0x0, 0x0) keyctl$assume_authority(0x10, 0x0) r4 = socket$l2tp(0x18, 0x1, 0x1) sendmsg$nl_crypto(r1, &(0x7f000037ffc8)={&(0x7f00009dd000)={0x10}, 0xc, &(0x7f00002ceff0)={&(0x7f000097b000)=@delrng={0x10, 0x14, 0x200, 0x1}, 0x10}, 0x1}, 0x81) ioctl$PPPIOCSMRU(r4, 0x40047452, &(0x7f0000000080)=0x1ff) mq_timedsend(0xffffffffffffffff, &(0x7f0000000240)="37e6f77a3795ab4b8e0d35892dea11513cf71c63ac4349d20b0950239d14de892933caa0e1d4ab8b0600b3ff46", 0x2d, 0x0, &(0x7f0000000040)={0x77359400}) request_key(&(0x7f0000000700)='ceph\x00', &(0x7f0000000740)={0x73, 0x79, 0x7a}, &(0x7f0000000780)='^vboxnet0selinuxmd5sumvboxnet0self^cgroup^securitykeyring\x00', 0xfffffffffffffff8) fstat(r2, &(0x7f0000000540)) socket$nl_xfrm(0x10, 0x3, 0x6) keyctl$instantiate_iov(0x14, 0x0, &(0x7f00000006c0)=[{&(0x7f0000000400)="f916b8f72c29a4ed654ec4634d479b3453a0", 0x12}], 0x1, 0x0) shutdown(r4, 0x0) 2018/03/30 23:06:36 executing program 7: r0 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file0\x00', 0x400, 0x80) futimesat(r0, &(0x7f0000000300)='./file0\x00', &(0x7f0000000340)={{0x0, 0x7530}, {0x0, 0x2710}}) perf_event_open(&(0x7f0000757f88)={0x1, 0x70, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mknod(&(0x7f0000f80000)='./file0\x00', 0xab, 0x0) r1 = syz_open_dev$vcsa(&(0x7f0000000140)='/dev/vcsa#\x00', 0x7, 0x101000) getsockopt$inet_sctp_SCTP_LOCAL_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1b, &(0x7f0000000180)={0x0, 0x4d, "8df1fd1eb5a6bca444f21bd42932082d7b24ec3688f956fc0e62e412efb96e39470f4b763af8346a98911011904520fd2dc1cb14c3de150d51057b38b7f0b7c870ce818e976b7ef46330c7739e"}, &(0x7f0000000200)=0x55) getsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(r1, 0x84, 0x18, &(0x7f0000000240)={r2, 0x7ff}, &(0x7f0000000280)=0x8) execve(&(0x7f0000f8aff8)='./file0\x00', &(0x7f00000002c0), &(0x7f00006fcff0)) lgetxattr(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)=@known='security.ima\x00', &(0x7f00000000c0)=""/127, 0x7f) readlinkat(r1, &(0x7f0000000400)='./file0\x00', &(0x7f0000000440)=""/144, 0x90) connect$netrom(r1, &(0x7f0000000380)=@full={{0x3, {"4d4ad276967955"}, 0x8}, [{"805bb6e81ea4b7"}, {"d47b51d8066257"}, {"1a4e99c92a2d47"}, {"59788077d3f255"}, {"3589488b0e72ad"}, {"c72fa1969adb3f"}, {"8c92a5d1b035b1"}, {"8399d1b9ec1bdf"}]}, 0x48) [ 344.914332] RDX: 0000000000000020 RSI: 0000000020000280 RDI: 0000000000000015 [ 344.921579] RBP: 000000000072bea0 R08: 0000000000000000 R09: 0000000000000000 [ 344.928830] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000016 [ 344.936085] R13: 00000000000003eb R14: 00000000006f7ea8 R15: 0000000000000031 [ 344.943677] cgroup: cgroup_addrm_files: failed to add weight, err=-12 2018/03/30 23:06:36 executing program 2: perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f00000000c0)='./control\x00', 0x0) inotify_init() r0 = syz_open_dev$sg(&(0x7f000028fff7)='/dev/sg#\x00', 0x0, 0x0) ioctl(r0, 0x4000000000001276, &(0x7f0000000040)) msgget(0x2, 0x0) getsockopt$nfc_llcp(0xffffffffffffffff, 0x118, 0x4, &(0x7f0000000740)=""/223, 0xdf) setsockopt$inet_mreq(r0, 0x0, 0x23, &(0x7f00000002c0)={@empty, @remote={0xac, 0x14, 0x14, 0xbb}}, 0x8) accept4$nfc_llcp(0xffffffffffffffff, &(0x7f0000000940), &(0x7f0000000080)=0x60, 0x800) ioctl$SNDRV_CTL_IOCTL_ELEM_INFO(0xffffffffffffffff, 0xc1105511, &(0x7f0000000100)={{0x0, 0x0, 0x0, 0x0, "386aea20273dc03c3d18dd0dbd4a0ca15f9f580393cc4ec3b8ee256b9aa630224ba64c6ff43ee01d2996c914"}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "eda422cd37591b3a5a7a683380f7e0b9e790c6b72cd0a4f3342f7431c1699a305ca3091bb2320e8df4e298a2cca26637866a68c1426ffbd8a6c7da1d8ea77d9d", &(0x7f00000000c0)='/dev/snd/controlC#\x00', 0x13}) r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000003c0)='/proc/self/net/pfkey\x00', 0x800, 0x0) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) add_key$user(&(0x7f0000000480)='user\x00', &(0x7f00000004c0)={0x73, 0x79, 0x7a, 0x3}, &(0x7f0000000500)="d3238eea76b0470531092a0a77b0b49789a0fc97b8f8b9e23a2a5a5a0c169ed6e83480b4801dbf79db3527904ee3128c05ce2806e210237c36b88ceabe99d8784860e5d0e91fe33d38d0133e056cdd1e2910d57fc5eb1b23db3b60a7077ff33bb6c7445cd258ee25f9187269c22d1ed05acb2b9b599bd285b692257a631754ab9befebd3fdb3167361c24c5c5dcf90e476e052b9d22362c57878cb7205fe361346d6beb77b7844fe94", 0xa9, 0xfffffffffffffffe) ioctl$sock_inet_SIOCSIFADDR(r0, 0x8916, &(0x7f0000000300)={'gretap0\x00', {0x2, 0x4e24, @loopback=0x7f000001}}) keyctl$instantiate_iov(0x14, 0x0, &(0x7f0000000780)=[{&(0x7f0000000840)="edb4a01f68d76905035a4ebdd427d31585a5a650581902b1c077f74ca8f1ce7d3e2f6e1c6760433af9664b3f3bebab3a1a1c4ef86f42c39b758accc1e7637bb18d28248dc7a1719b73388830b162613b17fd02220bd1fe2ad86adb96efcfc672d126ae58f745fba0e7534cdbae947449df767bd76a0c38b5752dcd13f7065edea86dc156c0708e76c2c99a94a95f1e93ff73cb3eb94e06d399cf48aaac7963d13e4b3a6b32bc2b19d5461545dcf3f71bb24442d286421f8d891d77a3c4c1c9435bbdf187682c22ded22b669b7790d05b4894166a2d5f33098cf908a23a2e0671d824e88942fbe0bd1416", 0xea}], 0x1, 0x0) r3 = ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) ioctl$KVM_UNREGISTER_COALESCED_MMIO(r3, 0x4010ae68, &(0x7f0000000000)={0x0, 0x5000}) ioctl$KVM_CREATE_PIT2(r3, 0x4040ae77, &(0x7f0000000440)={0xfffffffffffffff7}) ioctl$KVM_CREATE_VCPU(r3, 0xae41, 0x0) socket$can_raw(0x1d, 0x3, 0x1) connect$vsock_stream(0xffffffffffffffff, &(0x7f0000000080)={0x28, 0x0, 0xffffffff, @my=0x1}, 0x10) [ 344.997451] device lo left promiscuous mode [ 345.026501] IPVS: set_ctl: invalid protocol: 0 224.0.0.1:0 dh [ 345.035517] device lo entered promiscuous mode 2018/03/30 23:06:36 executing program 4: io_setup(0x9, &(0x7f0000000040)=0x0) io_destroy(r0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)}, {&(0x7f0000011500)="a481000013000000601ebe5a9e1dbe5a9e1dbe5a00000000000001000200000000000000000000001a0000000000000000000000000000000000000000000000", 0x40, 0x1c80}, {&(0x7f0000011d00)="0000000000040000000000000000000000000000000000000000000000000000", 0x20, 0x3800}, {&(0x7f0000012500)='syzkaller\n\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00', 0x20, 0x5c00}], 0x0, &(0x7f0000012a00)) syz_mount_image$iso9660(&(0x7f0000000000)='iso9660\x00', &(0x7f0000000100)='./file0\x00', 0xf000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)}, {&(0x7f0000011200)="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", 0x100, 0xd000}], 0x0, &(0x7f0000011600)) r1 = fcntl$dupfd(0xffffffffffffffff, 0x406, 0xffffffffffffffff) fadvise64(r1, 0x0, 0x2, 0x3) r2 = open$dir(&(0x7f0000000080)='./file0\x00', 0x40000, 0x8) fcntl$setsig(r2, 0xa, 0x27) mremap(&(0x7f0000ffb000/0x3000)=nil, 0x3000, 0x2000, 0x3, &(0x7f0000ffe000/0x2000)=nil) 2018/03/30 23:06:36 executing program 7: 2018/03/30 23:06:36 executing program 0 (fault-call:7 fault-nth:50): mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r0 = syz_open_dev$usbmon(&(0x7f0000000400)='/dev/usbmon#\x00', 0x0, 0x0) r1 = perf_event_open(&(0x7f0000223000)={0x2, 0x78, 0xe3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000001980)={{{@in6=@remote, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast2}, 0x0, @in=@multicast2}}, &(0x7f0000001a80)=0xe8) chown(&(0x7f00000004c0)='./file0\x00', r2, 0x0) mount(&(0x7f00000003c0)='./file0\x00', &(0x7f0000000380)='./file0\x00', &(0x7f0000000300)='cgroup2\x00', 0x0, 0x0) r3 = open$dir(&(0x7f000001bff4)='./file0\x00', 0x0, 0x0) mkdirat(r3, &(0x7f0000000280)='./file0\x00', 0x20) getdents64(r3, &(0x7f00000007c0)=""/250, 0x1015a) dup3(r0, r1, 0x80000) r4 = open$dir(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) renameat2(r4, &(0x7f0000000200)='./file1\x00', 0xffffffffffffffff, &(0x7f0000000240)='./file0\x00', 0xfd1092750066ec78) ioctl$KDGKBMODE(0xffffffffffffffff, 0x4b44, &(0x7f0000000140)) 2018/03/30 23:06:36 executing program 3: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup.cpu\x00', 0x200002, 0x0) r1 = open(&(0x7f0000000040)='./control\x00', 0x0, 0x1) fchdir(r0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000500)={0x0, 0x0}, &(0x7f0000000540)=0xc) fchown(r0, r2, 0x0) membarrier(0x8, 0x0) r3 = socket$nl_xfrm(0x10, 0x3, 0x6) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000080)={'bond0\x00'}) r4 = socket(0xa, 0x2, 0x0) sendmsg$IPVS_CMD_GET_INFO(0xffffffffffffffff, &(0x7f00000009c0)={&(0x7f0000000500)={0x10, 0x0, 0x0, 0x21100000}, 0xc, &(0x7f0000000980)={&(0x7f0000000600)=ANY=[@ANYBLOB="010e28bdba00fedbdf250f0000000800060003000000680000000000000000000000080001000a00000008000bf272697e0008000b0073690001000a0000079f02040007c6752b11623f002000000003010000080006006c630000b025dabd001a08000b007302306e00528d83aa8f23b0c9d515ee84efaa64003587e898db0000b7"], 0x1}, 0x1}, 0x20000884) ioctl$sock_FIOGETOWN(r4, 0x8903, &(0x7f0000000200)) connect$inet6(r4, &(0x7f0000000100)={0xa, 0x0, 0x0, @mcast1={0xff, 0x1, [], 0x1}, 0x100000002}, 0x1c) getsockopt$inet_opts(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000540)=""/99, &(0x7f0000000780)=0x28c77c4c79f525cf) sendto$inet(r4, &(0x7f0000509f92), 0xff77, 0x0, &(0x7f000055fff0)={0x2, 0x4e23, @loopback=0x7f000001}, 0x10) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000b00)='./cgroup.cpu\x00', 0x200002, 0x0) fchdir(0xffffffffffffffff) sendto$inet(0xffffffffffffffff, &(0x7f0000000a40)="45431bc153e49dc3c341afeff8a6a3782b30655dea8638a45a7a369ca5aebbc34e2d0227a019364ef806e574edc574801179b3c34145612db79a5340231421095dba2effc99687206c3416a0afabbea4ab2d17074a574429500a92adb41dfbc9e160349e8bb48b1d26e10c3e2571a99e857df6cdf0eb2dbb45810d2736bc2d", 0x7f, 0x3ffffff, &(0x7f0000000c00)={0x2, 0x4e23, @loopback=0x7f000001}, 0x10) r5 = creat(&(0x7f0000000100)='./file0\x00', 0xfffffffffffffffc) fallocate(r5, 0x1, 0x0, 0x20004d2d) ioctl$DRM_IOCTL_SET_VERSION(r5, 0xc0106407, &(0x7f00000000c0)={0x55c, 0x2}) sendmsg$inet_sctp(r4, &(0x7f000050dfc8)={&(0x7f0000000840)=@in6={0xa, 0x4e24, 0x80000001, @mcast1={0xff, 0x1, [], 0x1}}, 0x1c, &(0x7f00000005c0), 0x0, &(0x7f0000576000)}, 0x0) sendto$inet6(r4, &(0x7f0000000240)="6a14ad6a11c00f", 0x7, 0x0, &(0x7f0000000280)={0xa, 0x4e23, 0x3, @local={0xfe, 0x80, [], 0xaa}, 0x9}, 0x1c) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000000)={{{@in=@multicast2, @in6=@dev}}, {{@in=@multicast1}, 0x0, @in6=@ipv4={[], [], @remote}}}, &(0x7f0000000140)=0xe8) r6 = open(&(0x7f0000022ff6)='./control\x00', 0x0, 0x0) getdents(r6, &(0x7f000076cf07)=""/249, 0xf9) syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x0) 2018/03/30 23:06:36 executing program 6: r0 = accept4(0xffffffffffffffff, 0x0, &(0x7f0000000300), 0x80000) getsockopt$inet_sctp_SCTP_EVENTS(r0, 0x84, 0xb, &(0x7f0000000400), &(0x7f0000000440)=0xb) socketpair(0x1e, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) recvmsg$kcm(r1, &(0x7f0000000200)={&(0x7f0000000040)=@ax25, 0x10, &(0x7f0000000000)=[{&(0x7f0000000080)=""/151, 0xffffff77}], 0x1, &(0x7f00000001c0)=""/17, 0x11}, 0x0) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000000100)={&(0x7f0000000000)=@vsock, 0xfffffffffffffda6, &(0x7f00000000c0)=[{&(0x7f0000000180)=""/154, 0x9a}], 0x1, &(0x7f0000000240)=""/105, 0x69}, 0x0) close(r1) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000380)={r2, 0x28, &(0x7f0000000340)}, 0x10) sendmsg(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000100), 0x28a, &(0x7f0000000000)}, 0x0) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000011fd4)={0x0, 0x3, 0x4, 0x1, 0x0, 0x1}, 0x2c) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000006240)={0x0, 0x5, &(0x7f00000002c0)=ANY=[@ANYBLOB="180000004000000000000000010000000000ffff090000000000000000000000180000000000000000000000"], &(0x7f00000003c0)='GPL\x00', 0x0, 0x75, &(0x7f00000004c0)=""/117, 0x41100, 0x1}, 0x48) bpf$MAP_CREATE(0x0, &(0x7f0000011000)={0xd, 0x101, 0x4, 0x3ff, 0x0, r3, 0x0, [0x115]}, 0x2c) socketpair(0x0, 0x1, 0x0, &(0x7f000000dff8)) close(r4) 2018/03/30 23:06:36 executing program 5: r0 = openat$rfkill(0xffffffffffffff9c, &(0x7f0000001580)='/dev/rfkill\x00', 0x5c000, 0x0) ioctl$TIOCSSOFTCAR(r0, 0x541a, &(0x7f00000015c0)=0x3) mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r1 = perf_event_open(&(0x7f0000223000)={0x2, 0x78, 0xe3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000001980)={{{@in6=@remote, @in=@multicast1}}, {{@in=@multicast2}, 0x0, @in=@multicast2}}, &(0x7f0000001a80)=0xe8) mount(&(0x7f00000003c0)='./file0\x00', &(0x7f0000000380)='./file0\x00', &(0x7f0000000300)='cgroup2\x00', 0x0, 0x0) r2 = open$dir(&(0x7f000001bff4)='./file0\x00', 0x0, 0x0) mkdirat(0xffffffffffffffff, &(0x7f0000000280)='./file0\x00', 0x20) recvmsg(r1, &(0x7f0000000340)={&(0x7f00000000c0)=@pppol2tpv3={0x0, 0x0, {0x0, 0xffffffffffffffff, {0x0, 0x0, @loopback}}}, 0x80, &(0x7f0000001400)=[{&(0x7f0000000040)=""/11, 0xb}, {&(0x7f0000000140)=""/107, 0x6b}, {&(0x7f0000000200)=""/106, 0x6a}, {&(0x7f00000002c0)=""/1, 0x1}, {&(0x7f0000000400)=""/4096, 0x1000}], 0x5, 0x0, 0x0, 0x7}, 0x100) getsockopt$inet_sctp6_SCTP_AUTOCLOSE(r3, 0x84, 0x4, &(0x7f0000001480), &(0x7f00000014c0)=0x4) unlinkat(r2, &(0x7f0000000080)='./file0\x00', 0x200) link(&(0x7f0000001500)='./file0\x00', &(0x7f0000001540)='./file0\x00') [ 345.325610] FAULT_INJECTION: forcing a failure. [ 345.325610] name failslab, interval 1, probability 0, space 0, times 0 [ 345.336938] CPU: 0 PID: 27051 Comm: syz-executor0 Not tainted 4.16.0-rc7+ #372 [ 345.344296] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 345.353645] Call Trace: [ 345.356222] dump_stack+0x194/0x24d [ 345.359849] ? arch_local_irq_restore+0x53/0x53 [ 345.364537] should_fail+0x8c0/0xa40 [ 345.368245] ? kstrdup+0x39/0x70 [ 345.371602] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 345.376698] ? cgroup_apply_control_enable+0x390/0xbc0 [ 345.381959] ? kernfs_iop_mkdir+0x153/0x1e0 [ 345.386259] ? vfs_mkdir+0x390/0x600 [ 345.389962] ? SyS_mkdirat+0x22b/0x2b0 [ 345.393842] ? entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 345.399189] ? find_held_lock+0x35/0x1d0 [ 345.403254] ? find_held_lock+0x35/0x1d0 [ 345.407316] ? __lock_is_held+0xb6/0x140 [ 345.411369] ? check_same_owner+0x320/0x320 [ 345.415674] ? rcu_note_context_switch+0x710/0x710 [ 345.420584] ? rcu_read_lock_sched_held+0x108/0x120 [ 345.425587] should_failslab+0xec/0x120 [ 345.429555] kmem_cache_alloc+0x47/0x760 [ 345.433612] ? memcpy+0x45/0x50 [ 345.436881] ? kstrdup+0x59/0x70 [ 345.440233] __kernfs_new_node+0xe2/0x570 [ 345.444364] ? kernfs_dop_revalidate+0x380/0x380 [ 345.449104] ? memset+0x31/0x40 [ 345.452382] ? snprintf+0xc0/0xf0 [ 345.455831] ? vsprintf+0x40/0x40 [ 345.459268] ? debug_lockdep_rcu_enabled+0x77/0x90 [ 345.464183] ? cgroup_file_name+0x1d0/0x1d0 [ 345.468493] kernfs_new_node+0x80/0xe0 [ 345.472365] __kernfs_create_file+0x4b/0x320 [ 345.476761] cgroup_addrm_files+0x3c5/0xa70 [ 345.481079] ? cgroup_file_write+0x710/0x710 [ 345.485473] ? cgroup_idr_replace+0x3f/0x50 [ 345.489787] ? __lock_is_held+0xb6/0x140 [ 345.493834] ? __local_bh_enable_ip+0x121/0x230 [ 345.498481] ? online_css+0x224/0x2e0 [ 345.502263] css_populate_dir+0x198/0x420 [ 345.506395] cgroup_apply_control_enable+0x390/0xbc0 [ 345.511486] ? cgroup_propagate_control+0x570/0x570 [ 345.516486] ? css_populate_dir+0x289/0x420 [ 345.520789] cgroup_mkdir+0x56f/0xfc0 [ 345.524592] ? cgroup_destroy_locked+0x750/0x750 [ 345.529334] ? from_kgid+0x4a/0x60 [ 345.532852] ? privileged_wrt_inode_uidgid+0x8e/0xb0 [ 345.537955] ? capable_wrt_inode_uidgid+0x9b/0xc0 [ 345.542778] ? generic_permission+0x105/0x3c0 [ 345.547254] ? cgroup_destroy_locked+0x750/0x750 [ 345.551992] kernfs_iop_mkdir+0x153/0x1e0 [ 345.556137] vfs_mkdir+0x390/0x600 [ 345.559668] SyS_mkdirat+0x22b/0x2b0 [ 345.563363] ? SyS_mknod+0x480/0x480 [ 345.567064] ? trace_hardirqs_on+0xd/0x10 [ 345.571201] ? do_syscall_64+0xb7/0x940 [ 345.575165] ? SyS_mknod+0x480/0x480 [ 345.578874] do_syscall_64+0x281/0x940 [ 345.582743] ? vmalloc_sync_all+0x30/0x30 [ 345.586884] ? _raw_spin_unlock_irq+0x27/0x70 [ 345.591362] ? finish_task_switch+0x1c1/0x7e0 [ 345.595837] ? syscall_return_slowpath+0x550/0x550 [ 345.600759] ? syscall_return_slowpath+0x2ac/0x550 [ 345.605680] ? prepare_exit_to_usermode+0x350/0x350 [ 345.610697] ? entry_SYSCALL_64_after_hwframe+0x52/0xb7 [ 345.616063] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 345.620899] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 345.626073] RIP: 0033:0x454e79 [ 345.629243] RSP: 002b:00007f016b92fc68 EFLAGS: 00000246 ORIG_RAX: 0000000000000102 [ 345.636941] RAX: ffffffffffffffda RBX: 00007f016b9306d4 RCX: 0000000000454e79 [ 345.644199] RDX: 0000000000000020 RSI: 0000000020000280 RDI: 0000000000000015 [ 345.651447] RBP: 000000000072bea0 R08: 0000000000000000 R09: 0000000000000000 [ 345.658702] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000016 [ 345.665959] R13: 00000000000003eb R14: 00000000006f7ea8 R15: 0000000000000032 [ 345.673385] cgroup: cgroup_addrm_files: failed to add bfq.weight, err=-12 2018/03/30 23:06:37 executing program 6: mmap(&(0x7f0000000000/0xaa1000)=nil, 0xaa1000, 0x4004, 0x100032, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) getsockopt$inet_sctp6_SCTP_DELAYED_SACK(r0, 0x84, 0x10, &(0x7f00002d7000), &(0x7f0000d42000)=0xc) 2018/03/30 23:06:37 executing program 3: syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='mounts\x00') timerfd_create(0x0, 0x0) perf_event_open(&(0x7f0000271000)={0x2, 0x70, 0x49, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) unshare(0x20000400) pselect6(0x40, &(0x7f00000abfc0)={0x3ffffd}, &(0x7f0000768000)={0x0, 0x0, 0x0, 0x3f}, &(0x7f00007fbfc0), &(0x7f0000349000)={0x0, 0x989680}, &(0x7f0000f14000)={&(0x7f00001da000), 0x8}) 2018/03/30 23:06:37 executing program 4: unshare(0x60000000) r0 = socket$inet_tcp(0x2, 0x1, 0x0) socketpair(0x1, 0x2, 0x9, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$inet_sctp_SCTP_SOCKOPT_PEELOFF(r1, 0x84, 0x66, &(0x7f00000002c0)={0x0}, &(0x7f0000000300)=0x8) getsockopt$inet_sctp_SCTP_RTOINFO(r2, 0x84, 0x0, &(0x7f0000000180)={r3, 0x836a, 0x67e, 0x7fffffff}, &(0x7f00000001c0)=0x10) getsockopt$inet_sctp_SCTP_RECONFIG_SUPPORTED(r1, 0x84, 0x75, &(0x7f0000000200)={r4, 0x1}, &(0x7f0000000240)=0x8) setsockopt$ARPT_SO_SET_ADD_COUNTERS(r0, 0x0, 0x61, &(0x7f0000000080)={'filter\x00', 0x4}, 0x68) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000040), &(0x7f0000000340)=0xc) getsockopt$IPT_SO_GET_INFO(r0, 0x0, 0x40, &(0x7f0000000380)={'nat\x00'}, &(0x7f0000000280)=0x54) getsockopt$llc_int(r2, 0x10c, 0x0, &(0x7f0000000100), &(0x7f0000000140)=0x4) 2018/03/30 23:06:37 executing program 5: mkdir(&(0x7f0000000040)='./file0\x00', 0x88) perf_event_open(&(0x7f0000223000)={0x2, 0x78, 0xe3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000001980)={{{@in6=@remote, @in=@multicast1}}, {{@in=@multicast2}, 0x0, @in=@multicast2}}, &(0x7f0000001a80)=0xe8) mount(&(0x7f00000003c0)='./file0\x00', &(0x7f0000000380)='./file0\x00', &(0x7f0000000300)='cgroup2\x00', 0x0, 0x0) r0 = open$dir(&(0x7f000001bff4)='./file0\x00', 0x0, 0x0) mkdirat(0xffffffffffffffff, &(0x7f0000000280)='./file0\x00', 0x20) unlinkat(r0, &(0x7f0000000080)='./file0\x00', 0x200) 2018/03/30 23:06:37 executing program 0 (fault-call:7 fault-nth:51): mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r0 = syz_open_dev$usbmon(&(0x7f0000000400)='/dev/usbmon#\x00', 0x0, 0x0) r1 = perf_event_open(&(0x7f0000223000)={0x2, 0x78, 0xe3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000001980)={{{@in6=@remote, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast2}, 0x0, @in=@multicast2}}, &(0x7f0000001a80)=0xe8) chown(&(0x7f00000004c0)='./file0\x00', r2, 0x0) mount(&(0x7f00000003c0)='./file0\x00', &(0x7f0000000380)='./file0\x00', &(0x7f0000000300)='cgroup2\x00', 0x0, 0x0) r3 = open$dir(&(0x7f000001bff4)='./file0\x00', 0x0, 0x0) mkdirat(r3, &(0x7f0000000280)='./file0\x00', 0x20) getdents64(r3, &(0x7f00000007c0)=""/250, 0x1015a) dup3(r0, r1, 0x80000) r4 = open$dir(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) renameat2(r4, &(0x7f0000000200)='./file1\x00', 0xffffffffffffffff, &(0x7f0000000240)='./file0\x00', 0xfd1092750066ec78) ioctl$KDGKBMODE(0xffffffffffffffff, 0x4b44, &(0x7f0000000140)) 2018/03/30 23:06:37 executing program 2: perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f00000000c0)='./control\x00', 0x0) inotify_init() r0 = syz_open_dev$sg(&(0x7f000028fff7)='/dev/sg#\x00', 0x0, 0x0) ioctl(r0, 0x4000000000001276, &(0x7f0000000040)) msgget(0x2, 0x0) getsockopt$nfc_llcp(0xffffffffffffffff, 0x118, 0x4, &(0x7f0000000740)=""/223, 0xdf) setsockopt$inet_mreq(r0, 0x0, 0x23, &(0x7f00000002c0)={@empty, @remote={0xac, 0x14, 0x14, 0xbb}}, 0x8) accept4$nfc_llcp(0xffffffffffffffff, &(0x7f0000000940), &(0x7f0000000080)=0x60, 0x800) ioctl$SNDRV_CTL_IOCTL_ELEM_INFO(0xffffffffffffffff, 0xc1105511, &(0x7f0000000100)={{0x0, 0x0, 0x0, 0x0, "386aea20273dc03c3d18dd0dbd4a0ca15f9f580393cc4ec3b8ee256b9aa630224ba64c6ff43ee01d2996c914"}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "eda422cd37591b3a5a7a683380f7e0b9e790c6b72cd0a4f3342f7431c1699a305ca3091bb2320e8df4e298a2cca26637866a68c1426ffbd8a6c7da1d8ea77d9d", &(0x7f00000000c0)='/dev/snd/controlC#\x00', 0x13}) r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000003c0)='/proc/self/net/pfkey\x00', 0x800, 0x0) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) add_key$user(&(0x7f0000000480)='user\x00', &(0x7f00000004c0)={0x73, 0x79, 0x7a, 0x3}, &(0x7f0000000500)="d3238eea76b0470531092a0a77b0b49789a0fc97b8f8b9e23a2a5a5a0c169ed6e83480b4801dbf79db3527904ee3128c05ce2806e210237c36b88ceabe99d8784860e5d0e91fe33d38d0133e056cdd1e2910d57fc5eb1b23db3b60a7077ff33bb6c7445cd258ee25f9187269c22d1ed05acb2b9b599bd285b692257a631754ab9befebd3fdb3167361c24c5c5dcf90e476e052b9d22362c57878cb7205fe361346d6beb77b7844fe94", 0xa9, 0xfffffffffffffffe) ioctl$sock_inet_SIOCSIFADDR(r0, 0x8916, &(0x7f0000000300)={'gretap0\x00', {0x2, 0x4e24, @loopback=0x7f000001}}) keyctl$instantiate_iov(0x14, 0x0, &(0x7f0000000780)=[{&(0x7f0000000840)="edb4a01f68d76905035a4ebdd427d31585a5a650581902b1c077f74ca8f1ce7d3e2f6e1c6760433af9664b3f3bebab3a1a1c4ef86f42c39b758accc1e7637bb18d28248dc7a1719b73388830b162613b17fd02220bd1fe2ad86adb96efcfc672d126ae58f745fba0e7534cdbae947449df767bd76a0c38b5752dcd13f7065edea86dc156c0708e76c2c99a94a95f1e93ff73cb3eb94e06d399cf48aaac7963d13e4b3a6b32bc2b19d5461545dcf3f71bb24442d286421f8d891d77a3c4c1c9435bbdf187682c22ded22b669b7790d05b4894166a2d5f33098cf908a23a2e0671d824e88942fbe0bd1416", 0xea}], 0x1, 0x0) r3 = ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) ioctl$KVM_UNREGISTER_COALESCED_MMIO(r3, 0x4010ae68, &(0x7f0000000000)={0x0, 0x5000}) ioctl$KVM_CREATE_PIT2(r3, 0x4040ae77, &(0x7f0000000440)={0xfffffffffffffff7}) socket$can_raw(0x1d, 0x3, 0x1) connect$vsock_stream(0xffffffffffffffff, &(0x7f0000000080)={0x28, 0x0, 0xffffffff, @my=0x1}, 0x10) 2018/03/30 23:06:37 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x200, 0x0) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000680)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$sock_linger(r2, 0x1, 0xd, &(0x7f00000006c0)={0x400, 0x9}, 0x8) perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x0, 0x0) r3 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) mmap(&(0x7f0000000000/0x9d7000)=nil, 0x9d7000, 0x0, 0x10, 0xffffffffffffffff, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x7) perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r4 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r4, &(0x7f0000e5b000)={0x2, 0x4e20, @multicast1=0xe0000001}, 0x10) syz_open_dev$sg(&(0x7f0000000440)='/dev/sg#\x00', 0x0, 0x0) connect$inet(r4, &(0x7f0000000100)={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x11}}, 0x10) r5 = bpf$PROG_LOAD(0x5, &(0x7f0000eb0fb8)={0x1, 0x3, &(0x7f00009ff000)=@framed={{0x18}, [], {0x95}}, &(0x7f00002bf000)='syzkaller\x00', 0x4, 0xb7, &(0x7f00006ab000)=""/183}, 0x48) setsockopt$inet_tcp_int(r4, 0x6, 0x19, &(0x7f0000000240)=0x8, 0x4) r6 = socket$kcm(0x29, 0x2, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r6, 0x89e0, &(0x7f000031aff8)={r4, r5}) ioctl$sock_kcm_SIOCKCMCLONE(r6, 0x89e2, &(0x7f00000002c0)={0xffffffffffffffff}) sendmsg$nl_xfrm(r7, &(0x7f0000000780)={&(0x7f0000000200)={0x10}, 0xc, &(0x7f0000000740)={&(0x7f0000000480)=@updpolicy={0xb8, 0x19, 0x0, 0x0, 0x0, {{@in=@loopback=0x7f000001, @in6=@mcast1={0xff, 0x1, [], 0x1}}}}, 0xffcb}, 0x1}, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(r7, 0x89e1, &(0x7f0000000040)={r4}) r8 = fcntl$getown(r3, 0x9) recvfrom$inet6(r1, &(0x7f0000000140)=""/177, 0xb1, 0x40000000, &(0x7f0000000080)={0xa, 0x4e23, 0x9, @empty, 0xe38}, 0x1c) r9 = accept4$inet(0xffffffffffffff9c, &(0x7f0000000700)={0x0, 0x0, @broadcast}, &(0x7f0000000740)=0x10, 0x0) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r9, 0x84, 0x64, &(0x7f0000000780)=[@in6={0xa, 0x4e22, 0xfffffffffffff7e1, @mcast2={0xff, 0x2, [], 0x1}, 0x8}, @in={0x2, 0x4e24, @broadcast=0xffffffff}], 0x2c) ptrace$setregset(0x4205, r8, 0x0, &(0x7f00000005c0)={&(0x7f0000000080)}) ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r10 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x1fffd, 0x0) r11 = syz_open_dev$sndtimer(&(0x7f00000000c0)='/dev/snd/timer\x00', 0x0, 0x0) read(r11, &(0x7f0000ec6000)=""/50, 0x32) fcntl$dupfd(r11, 0x0, r10) 2018/03/30 23:06:37 executing program 7: r0 = socket(0xa, 0x2, 0x0) flock(0xffffffffffffffff, 0x6) sendmsg$IPVS_CMD_GET_INFO(r0, &(0x7f00000009c0)={&(0x7f0000000500)={0x10}, 0xc, &(0x7f0000000980)={&(0x7f0000000cc0)=ANY=[]}, 0x1}, 0x0) ioctl$sock_FIOGETOWN(r0, 0x8903, &(0x7f0000000200)) connect$inet6(r0, &(0x7f0000000100)={0xa, 0x0, 0x0, @mcast1={0xff, 0x1, [], 0x1}, 0x100000002}, 0x1c) sendto$inet(r0, &(0x7f0000509f92), 0xff77, 0x0, &(0x7f000055fff0)={0x2, 0x4e23, @loopback=0x7f000001}, 0x10) r1 = openat$rfkill(0xffffffffffffff9c, &(0x7f0000000580)='/dev/rfkill\x00', 0x200, 0x0) ioctl$TIOCLINUX6(r1, 0x541c, &(0x7f00000007c0)={0x6, 0x80000001}) fchdir(r0) fstat(0xffffffffffffffff, &(0x7f0000000180)) setsockopt$inet_MCAST_MSFILTER(r0, 0x0, 0x30, &(0x7f0000002340)=ANY=[@ANYBLOB="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"], 0x1) bind$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x4e21, @multicast1=0xe0000001}, 0x10) getsockopt$inet_sctp_SCTP_GET_PEER_ADDR_INFO(r0, 0x84, 0xf, &(0x7f0000000440)={0x0, @in6={{0xa, 0x4e20, 0xffff, @loopback={0x0, 0x1}, 0x1ff}}, 0x5, 0x9, 0x0, 0x3cab}, &(0x7f0000000280)=0x98) sendto$inet6(r0, &(0x7f00000011c0)="b432656f9a77946eaa0cf603c475f7a8ad97f32c1b83670e9c9ed0c8fb7a67711f865dd581dcd7cacb62891c9195cfcaa11c99bbb3226f7c8020024665fb61b14344e459cf2dd89ae98887d472a6acffccc538e37b8a71a6385408baa28cc1782f5bc9a79c401a7e8f7cbcc0298b0f2fd461ee23c36f6ebd5ef7753ac778c12ed87a4f1a3ba0d4fc07ef0e12cff6dde2ec943b31fb12d16457ab129f26891897bf3f60136515892308f54ea9987e4047731968604daee4871dbcbac22ad7e2e8ab60cc48db0847236858d9e2591455ac0d84f240fa03f531aa08b2c75885d291fd706cf7df5f8083dd7780eee48f24260830c5d5e7036a21800078b903328600000000020000000000000000009663bf26fd6a7466737a2dfb6449196c3ba679959d48e0158d60c181aa2a5858cf7a541f37abb9fec6364c04acebc7b16dc2492f8d746b4ace781d361e39b718ef43ca84ade43fc5e516f6b488ce773197342c78e8ed733b62ccadc39775e7cd53773cca810913adecfd1f6b5572b1b3e4d47c094400b26bdf2d556bab564e4a0d2c4eaf57748be0d7bbc64bd53875ad4e33f000eb66402b2d6755832ba1dbbfb357430f77c52f6b7e1d86ffb7a3aad8c69033dc53a71dfa2a4c3a0e39490bc1ee14319c2070b07a", 0x1d5, 0x0, &(0x7f0000000400)={0xa, 0x4e21, 0x0, @ipv4={[], [0xff, 0xff], @dev={0xac, 0x14, 0x14}}, 0x3}, 0x1c) getsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX3(r0, 0x84, 0x6f, &(0x7f00000005c0)={r2, 0x3c, &(0x7f0000000540)=[@in6={0xa, 0x4e20, 0x0, @remote={0xfe, 0x80, [], 0xbb}, 0xce}, @in={0x2, 0x4e21, @multicast2=0xe0000002}, @in={0x2, 0x4e20, @broadcast=0xffffffff}]}, &(0x7f0000000600)=0xc) fallocate(0xffffffffffffffff, 0x1, 0x0, 0x0) mincore(&(0x7f0000ffc000/0x1000)=nil, 0x1000, &(0x7f0000000a00)=""/129) r3 = socket$inet6_icmp(0xa, 0x2, 0x3a) sendmsg$inet_sctp(r0, &(0x7f000050dfc8)={&(0x7f0000000840)=@in6={0xa, 0x4e24, 0x80000001, @mcast1={0xff, 0x1, [], 0x1}, 0x3}, 0x1c, &(0x7f00000005c0), 0x0, &(0x7f0000576000)}, 0x0) ioctl$EVIOCGPROP(0xffffffffffffffff, 0x80404509, &(0x7f00000003c0)=""/25) ioctl$DRM_IOCTL_MARK_BUFS(r3, 0x40186417, &(0x7f0000000300)={0x0, 0x20, 0x7, 0x1, 0x11, 0x100000001}) getsockopt$inet_sctp6_SCTP_GET_LOCAL_ADDRS(0xffffffffffffffff, 0x84, 0x6d, &(0x7f00000006c0)=ANY=[@ANYRES32=0x0, @ANYBLOB="7b000000147b31a6c8d04526e5f78a8fe27845051f555f6994461af1218603a0f9c18ac908cd55dab3828efe98ab164ba6fc8873a807fa51bb4eab22c5df774cd217b3b2c0af891a34aae4b6aa2b7e16f7b4f55dcc91ee95c14977580183e8963965a1ab5c004a641086e0fbc35582cadd0075864a1d1b58c4036a1ea7b7fddf062b4b66c882ba"], &(0x7f0000000240)=0x2) setsockopt$EBT_SO_SET_ENTRIES(0xffffffffffffffff, 0x0, 0x80, &(0x7f0000000240)=@nat={'nat\x00', 0x19, 0x3, 0x970, [0x200019c0, 0x0, 0x0, 0x200019f0, 0x20002398], 0x0, &(0x7f0000000040), &(0x7f00000019c0)=[{}, {0x0, '\x00', 0x0, 0x0, 0x1, [{{{0x0, 0x0, 0x0, 'vlan0\x00', 'ifb0\x00', 'ip6gre0\x00', 'eql\x00', @dev={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa]}, [], @empty, [], 0x8b0, 0x8b0, 0x8e0, [@among={'among\x00', 0x81c, {{0x0, 0x0, 0x0, {[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0xb105, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x78, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fffffff, 0x0, 0x0, 0x437, 0x0, 0x0, 0xff, 0x7fffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x18, 0x6, 0x0, 0x0, 0x0, 0x0, 0x8001, 0x0, 0x7f, 0x0, 0x6, 0x7ff, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffe1]}, {[0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x1f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1e, 0x0, 0x0, 0x0, 0xcd3, 0x0, 0x0, 0x0, 0x3, 0x0, 0x9, 0x0, 0x0, 0x9, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x4, 0x200, 0x80000001, 0x0, 0x0, 0x3, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0xd1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x1, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0xdf9f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x8000, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa3, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x7, 0x0, 0x5, 0x0, 0x0, 0x1, 0xfffffffffffffff7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x20, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x4, 0x0, 0x0, 0x86, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x100000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2]}}}}]}}, @snat={'snat\x00', 0xc, {{@remote={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xbb}, 0xfffffffffffffffe}}}}]}, {0x0, '\x00', 0x1}]}, 0x9f8) r4 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000100)='/dev/sequencer\x00', 0x2, 0x0) write$sndseq(r4, &(0x7f00000003c0)=[{}], 0xffffff1a) r5 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000140)='./cgroup.net\x00', 0x200002, 0x0) fchdir(r5) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) unlink(&(0x7f0000000080)='./file0/file0\x00') [ 346.119279] IPVS: ftp: loaded support on port[0] = 21 [ 346.158953] FAULT_INJECTION: forcing a failure. [ 346.158953] name failslab, interval 1, probability 0, space 0, times 0 [ 346.170313] CPU: 1 PID: 27093 Comm: syz-executor0 Not tainted 4.16.0-rc7+ #372 [ 346.177671] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 346.187017] Call Trace: [ 346.189606] dump_stack+0x194/0x24d [ 346.193239] ? arch_local_irq_restore+0x53/0x53 [ 346.197919] should_fail+0x8c0/0xa40 [ 346.201639] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 346.206734] ? __might_sleep+0x95/0x190 [ 346.210708] ? rb_first_postorder+0xa0/0xa0 [ 346.215031] ? trace_event_raw_event_lock+0x340/0x340 [ 346.220211] ? trace_hardirqs_off+0x10/0x10 [ 346.224517] ? find_held_lock+0x35/0x1d0 [ 346.228563] ? __lock_is_held+0xb6/0x140 [ 346.232612] ? check_same_owner+0x320/0x320 [ 346.236914] ? lock_downgrade+0x980/0x980 [ 346.241043] ? rcu_note_context_switch+0x710/0x710 [ 346.245954] should_failslab+0xec/0x120 [ 346.249905] __kmalloc+0x63/0x760 [ 346.253340] ? idr_alloc_cyclic+0x1d6/0x320 [ 346.257645] ? mem_cgroup_css_alloc+0x177/0x19c0 [ 346.262377] mem_cgroup_css_alloc+0x177/0x19c0 [ 346.266938] ? setup_cpu_cache+0x1c0/0x1c0 [ 346.271151] ? __kernfs_new_node+0x3f5/0x570 [ 346.275539] ? kernfs_dop_revalidate+0x380/0x380 [ 346.280275] ? trace_hardirqs_off+0x10/0x10 [ 346.284576] ? kernfs_link_sibling+0x27d/0x380 [ 346.289133] ? debug_lockdep_rcu_enabled+0x77/0x90 [ 346.294045] ? cgroup_kn_set_ugid+0x2c7/0x370 [ 346.298515] ? cgroup_file_name+0x1d0/0x1d0 [ 346.302813] ? mutex_unlock+0xd/0x10 [ 346.306505] ? __lock_is_held+0xb6/0x140 [ 346.310550] ? cgroup_addrm_files+0x67f/0xa70 [ 346.315033] ? trace_hardirqs_off+0x10/0x10 [ 346.319330] ? cgroup_file_write+0x710/0x710 [ 346.323719] ? cgroup_idr_replace+0x3f/0x50 [ 346.328022] ? trace_hardirqs_off+0x10/0x10 [ 346.332324] ? __lock_is_held+0xb6/0x140 [ 346.336362] ? __local_bh_enable_ip+0x121/0x230 [ 346.341015] ? __lock_is_held+0xb6/0x140 [ 346.345061] cgroup_apply_control_enable+0x44d/0xbc0 [ 346.350144] ? cgroup_propagate_control+0x570/0x570 [ 346.355140] ? css_populate_dir+0x289/0x420 [ 346.359442] cgroup_mkdir+0x56f/0xfc0 [ 346.363222] ? cgroup_destroy_locked+0x750/0x750 [ 346.367954] ? from_kgid+0x4a/0x60 [ 346.371471] ? privileged_wrt_inode_uidgid+0x8e/0xb0 [ 346.376549] ? capable_wrt_inode_uidgid+0x9b/0xc0 [ 346.381367] ? generic_permission+0x105/0x3c0 [ 346.385841] ? cgroup_destroy_locked+0x750/0x750 [ 346.390575] kernfs_iop_mkdir+0x153/0x1e0 [ 346.394699] vfs_mkdir+0x390/0x600 [ 346.398218] SyS_mkdirat+0x22b/0x2b0 [ 346.401909] ? SyS_mknod+0x480/0x480 [ 346.405599] ? trace_hardirqs_on+0xd/0x10 [ 346.409722] ? do_syscall_64+0xb7/0x940 [ 346.413672] ? SyS_mknod+0x480/0x480 [ 346.417363] do_syscall_64+0x281/0x940 [ 346.421227] ? vmalloc_sync_all+0x30/0x30 [ 346.425354] ? finish_task_switch+0x1c1/0x7e0 [ 346.429826] ? syscall_return_slowpath+0x550/0x550 [ 346.434731] ? syscall_return_slowpath+0x2ac/0x550 [ 346.439636] ? prepare_exit_to_usermode+0x350/0x350 [ 346.444634] ? entry_SYSCALL_64_after_hwframe+0x52/0xb7 [ 346.449975] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 346.454800] entry_SYSCALL_64_after_hwframe+0x42/0xb7 2018/03/30 23:06:38 executing program 2: perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f00000000c0)='./control\x00', 0x0) inotify_init() r0 = syz_open_dev$sg(&(0x7f000028fff7)='/dev/sg#\x00', 0x0, 0x0) ioctl(r0, 0x4000000000001276, &(0x7f0000000040)) msgget(0x2, 0x0) getsockopt$nfc_llcp(0xffffffffffffffff, 0x118, 0x4, &(0x7f0000000740)=""/223, 0xdf) setsockopt$inet_mreq(r0, 0x0, 0x23, &(0x7f00000002c0)={@empty, @remote={0xac, 0x14, 0x14, 0xbb}}, 0x8) accept4$nfc_llcp(0xffffffffffffffff, &(0x7f0000000940), &(0x7f0000000080)=0x60, 0x800) ioctl$SNDRV_CTL_IOCTL_ELEM_INFO(0xffffffffffffffff, 0xc1105511, &(0x7f0000000100)={{0x0, 0x0, 0x0, 0x0, "386aea20273dc03c3d18dd0dbd4a0ca15f9f580393cc4ec3b8ee256b9aa630224ba64c6ff43ee01d2996c914"}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "eda422cd37591b3a5a7a683380f7e0b9e790c6b72cd0a4f3342f7431c1699a305ca3091bb2320e8df4e298a2cca26637866a68c1426ffbd8a6c7da1d8ea77d9d", &(0x7f00000000c0)='/dev/snd/controlC#\x00', 0x13}) r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000003c0)='/proc/self/net/pfkey\x00', 0x800, 0x0) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) add_key$user(&(0x7f0000000480)='user\x00', &(0x7f00000004c0)={0x73, 0x79, 0x7a, 0x3}, &(0x7f0000000500)="d3238eea76b0470531092a0a77b0b49789a0fc97b8f8b9e23a2a5a5a0c169ed6e83480b4801dbf79db3527904ee3128c05ce2806e210237c36b88ceabe99d8784860e5d0e91fe33d38d0133e056cdd1e2910d57fc5eb1b23db3b60a7077ff33bb6c7445cd258ee25f9187269c22d1ed05acb2b9b599bd285b692257a631754ab9befebd3fdb3167361c24c5c5dcf90e476e052b9d22362c57878cb7205fe361346d6beb77b7844fe94", 0xa9, 0xfffffffffffffffe) ioctl$sock_inet_SIOCSIFADDR(r0, 0x8916, &(0x7f0000000300)={'gretap0\x00', {0x2, 0x4e24, @loopback=0x7f000001}}) keyctl$instantiate_iov(0x14, 0x0, &(0x7f0000000780)=[{&(0x7f0000000840)="edb4a01f68d76905035a4ebdd427d31585a5a650581902b1c077f74ca8f1ce7d3e2f6e1c6760433af9664b3f3bebab3a1a1c4ef86f42c39b758accc1e7637bb18d28248dc7a1719b73388830b162613b17fd02220bd1fe2ad86adb96efcfc672d126ae58f745fba0e7534cdbae947449df767bd76a0c38b5752dcd13f7065edea86dc156c0708e76c2c99a94a95f1e93ff73cb3eb94e06d399cf48aaac7963d13e4b3a6b32bc2b19d5461545dcf3f71bb24442d286421f8d891d77a3c4c1c9435bbdf187682c22ded22b669b7790d05b4894166a2d5f33098cf908a23a2e0671d824e88942fbe0bd1416", 0xea}], 0x1, 0x0) r3 = ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) ioctl$KVM_UNREGISTER_COALESCED_MMIO(r3, 0x4010ae68, &(0x7f0000000000)={0x0, 0x5000}) socket$can_raw(0x1d, 0x3, 0x1) connect$vsock_stream(0xffffffffffffffff, &(0x7f0000000080)={0x28, 0x0, 0xffffffff, @my=0x1}, 0x10) 2018/03/30 23:06:38 executing program 3: [ 346.459966] RIP: 0033:0x454e79 [ 346.463131] RSP: 002b:00007f016b92fc68 EFLAGS: 00000246 ORIG_RAX: 0000000000000102 [ 346.470814] RAX: ffffffffffffffda RBX: 00007f016b9306d4 RCX: 0000000000454e79 [ 346.478059] RDX: 0000000000000020 RSI: 0000000020000280 RDI: 0000000000000015 [ 346.485310] RBP: 000000000072bea0 R08: 0000000000000000 R09: 0000000000000000 [ 346.492556] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000016 [ 346.499801] R13: 00000000000003eb R14: 00000000006f7ea8 R15: 0000000000000033 2018/03/30 23:06:38 executing program 6: 2018/03/30 23:06:38 executing program 3: 2018/03/30 23:06:38 executing program 4: 2018/03/30 23:06:38 executing program 0 (fault-call:7 fault-nth:52): mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r0 = syz_open_dev$usbmon(&(0x7f0000000400)='/dev/usbmon#\x00', 0x0, 0x0) r1 = perf_event_open(&(0x7f0000223000)={0x2, 0x78, 0xe3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000001980)={{{@in6=@remote, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast2}, 0x0, @in=@multicast2}}, &(0x7f0000001a80)=0xe8) chown(&(0x7f00000004c0)='./file0\x00', r2, 0x0) mount(&(0x7f00000003c0)='./file0\x00', &(0x7f0000000380)='./file0\x00', &(0x7f0000000300)='cgroup2\x00', 0x0, 0x0) r3 = open$dir(&(0x7f000001bff4)='./file0\x00', 0x0, 0x0) mkdirat(r3, &(0x7f0000000280)='./file0\x00', 0x20) getdents64(r3, &(0x7f00000007c0)=""/250, 0x1015a) dup3(r0, r1, 0x80000) r4 = open$dir(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) renameat2(r4, &(0x7f0000000200)='./file1\x00', 0xffffffffffffffff, &(0x7f0000000240)='./file0\x00', 0xfd1092750066ec78) ioctl$KDGKBMODE(0xffffffffffffffff, 0x4b44, &(0x7f0000000140)) 2018/03/30 23:06:38 executing program 7: 2018/03/30 23:06:38 executing program 5: r0 = getpgrp(0x0) sched_getaffinity(r0, 0x8, &(0x7f0000000040)) mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) perf_event_open(&(0x7f0000223000)={0x2, 0x78, 0xe3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000001980)={{{@in6=@remote, @in=@multicast1}}, {{@in=@multicast2}, 0x0, @in=@multicast2}}, &(0x7f0000001a80)=0xe8) mount(&(0x7f00000003c0)='./file0\x00', &(0x7f0000000380)='./file0\x00', &(0x7f0000000300)='cgroup2\x00', 0x0, 0x0) r1 = syz_open_dev$mice(&(0x7f0000000100)='/dev/input/mice\x00', 0x0, 0x2080) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000140)={&(0x7f00000000c0)='./file0\x00', r1}, 0x10) r2 = open$dir(&(0x7f000001bff4)='./file0\x00', 0x0, 0x0) mkdirat(0xffffffffffffffff, &(0x7f0000000280)='./file0\x00', 0x20) unlinkat(r2, &(0x7f0000000080)='./file0\x00', 0x200) 2018/03/30 23:06:38 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x200, 0x0) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000680)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$sock_linger(r2, 0x1, 0xd, &(0x7f00000006c0)={0x400, 0x9}, 0x8) perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x0, 0x0) r3 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) mmap(&(0x7f0000000000/0x9d7000)=nil, 0x9d7000, 0x0, 0x10, 0xffffffffffffffff, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x7) perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r4 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r4, &(0x7f0000e5b000)={0x2, 0x4e20, @multicast1=0xe0000001}, 0x10) syz_open_dev$sg(&(0x7f0000000440)='/dev/sg#\x00', 0x0, 0x0) connect$inet(r4, &(0x7f0000000100)={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x11}}, 0x10) r5 = bpf$PROG_LOAD(0x5, &(0x7f0000eb0fb8)={0x1, 0x3, &(0x7f00009ff000)=@framed={{0x18}, [], {0x95}}, &(0x7f00002bf000)='syzkaller\x00', 0x4, 0xb7, &(0x7f00006ab000)=""/183}, 0x48) setsockopt$inet_tcp_int(r4, 0x6, 0x19, &(0x7f0000000240)=0x8, 0x4) r6 = socket$kcm(0x29, 0x2, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r6, 0x89e0, &(0x7f000031aff8)={r4, r5}) ioctl$sock_kcm_SIOCKCMCLONE(r6, 0x89e2, &(0x7f00000002c0)={0xffffffffffffffff}) sendmsg$nl_xfrm(r7, &(0x7f0000000780)={&(0x7f0000000200)={0x10}, 0xc, &(0x7f0000000740)={&(0x7f0000000480)=@updpolicy={0xb8, 0x19, 0x0, 0x0, 0x0, {{@in=@loopback=0x7f000001, @in6=@mcast1={0xff, 0x1, [], 0x1}}}}, 0xffcb}, 0x1}, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(r7, 0x89e1, &(0x7f0000000040)={r4}) r8 = fcntl$getown(r3, 0x9) recvfrom$inet6(r1, &(0x7f0000000140)=""/177, 0xb1, 0x40000000, &(0x7f0000000080)={0xa, 0x4e23, 0x9, @empty, 0xe38}, 0x1c) r9 = accept4$inet(0xffffffffffffff9c, &(0x7f0000000700)={0x0, 0x0, @broadcast}, &(0x7f0000000740)=0x10, 0x0) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r9, 0x84, 0x64, &(0x7f0000000780)=[@in6={0xa, 0x4e22, 0xfffffffffffff7e1, @mcast2={0xff, 0x2, [], 0x1}, 0x8}, @in={0x2, 0x4e24, @broadcast=0xffffffff}], 0x2c) ptrace$setregset(0x4205, r8, 0x0, &(0x7f00000005c0)={&(0x7f0000000080)}) ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r10 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x1fffd, 0x0) r11 = syz_open_dev$sndtimer(&(0x7f00000000c0)='/dev/snd/timer\x00', 0x0, 0x0) read(r11, &(0x7f0000ec6000)=""/50, 0x32) fcntl$dupfd(r11, 0x0, r10) 2018/03/30 23:06:38 executing program 2: perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f00000000c0)='./control\x00', 0x0) inotify_init() r0 = syz_open_dev$sg(&(0x7f000028fff7)='/dev/sg#\x00', 0x0, 0x0) ioctl(r0, 0x4000000000001276, &(0x7f0000000040)) msgget(0x2, 0x0) getsockopt$nfc_llcp(0xffffffffffffffff, 0x118, 0x4, &(0x7f0000000740)=""/223, 0xdf) setsockopt$inet_mreq(r0, 0x0, 0x23, &(0x7f00000002c0)={@empty, @remote={0xac, 0x14, 0x14, 0xbb}}, 0x8) accept4$nfc_llcp(0xffffffffffffffff, &(0x7f0000000940), &(0x7f0000000080)=0x60, 0x800) ioctl$SNDRV_CTL_IOCTL_ELEM_INFO(0xffffffffffffffff, 0xc1105511, &(0x7f0000000100)={{0x0, 0x0, 0x0, 0x0, "386aea20273dc03c3d18dd0dbd4a0ca15f9f580393cc4ec3b8ee256b9aa630224ba64c6ff43ee01d2996c914"}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "eda422cd37591b3a5a7a683380f7e0b9e790c6b72cd0a4f3342f7431c1699a305ca3091bb2320e8df4e298a2cca26637866a68c1426ffbd8a6c7da1d8ea77d9d", &(0x7f00000000c0)='/dev/snd/controlC#\x00', 0x13}) r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000003c0)='/proc/self/net/pfkey\x00', 0x800, 0x0) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) add_key$user(&(0x7f0000000480)='user\x00', &(0x7f00000004c0)={0x73, 0x79, 0x7a, 0x3}, &(0x7f0000000500)="d3238eea76b0470531092a0a77b0b49789a0fc97b8f8b9e23a2a5a5a0c169ed6e83480b4801dbf79db3527904ee3128c05ce2806e210237c36b88ceabe99d8784860e5d0e91fe33d38d0133e056cdd1e2910d57fc5eb1b23db3b60a7077ff33bb6c7445cd258ee25f9187269c22d1ed05acb2b9b599bd285b692257a631754ab9befebd3fdb3167361c24c5c5dcf90e476e052b9d22362c57878cb7205fe361346d6beb77b7844fe94", 0xa9, 0xfffffffffffffffe) ioctl$sock_inet_SIOCSIFADDR(r0, 0x8916, &(0x7f0000000300)={'gretap0\x00', {0x2, 0x4e24, @loopback=0x7f000001}}) keyctl$instantiate_iov(0x14, 0x0, &(0x7f0000000780)=[{&(0x7f0000000840)="edb4a01f68d76905035a4ebdd427d31585a5a650581902b1c077f74ca8f1ce7d3e2f6e1c6760433af9664b3f3bebab3a1a1c4ef86f42c39b758accc1e7637bb18d28248dc7a1719b73388830b162613b17fd02220bd1fe2ad86adb96efcfc672d126ae58f745fba0e7534cdbae947449df767bd76a0c38b5752dcd13f7065edea86dc156c0708e76c2c99a94a95f1e93ff73cb3eb94e06d399cf48aaac7963d13e4b3a6b32bc2b19d5461545dcf3f71bb24442d286421f8d891d77a3c4c1c9435bbdf187682c22ded22b669b7790d05b4894166a2d5f33098cf908a23a2e0671d824e88942fbe0bd1416", 0xea}], 0x1, 0x0) r3 = ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) ioctl$KVM_UNREGISTER_COALESCED_MMIO(r3, 0x4010ae68, &(0x7f0000000000)={0x0, 0x5000}) socket$can_raw(0x1d, 0x3, 0x1) connect$vsock_stream(0xffffffffffffffff, &(0x7f0000000080)={0x28, 0x0, 0xffffffff, @my=0x1}, 0x10) 2018/03/30 23:06:38 executing program 6: 2018/03/30 23:06:38 executing program 3: 2018/03/30 23:06:38 executing program 7: [ 347.251827] FAULT_INJECTION: forcing a failure. [ 347.251827] name failslab, interval 1, probability 0, space 0, times 0 [ 347.263185] CPU: 0 PID: 27120 Comm: syz-executor0 Not tainted 4.16.0-rc7+ #372 [ 347.270555] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 347.279935] Call Trace: [ 347.282535] dump_stack+0x194/0x24d [ 347.286177] ? arch_local_irq_restore+0x53/0x53 [ 347.290869] should_fail+0x8c0/0xa40 [ 347.294599] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 347.299714] ? rcu_read_lock_sched_held+0x108/0x120 [ 347.304768] ? find_held_lock+0x35/0x1d0 [ 347.308854] ? __lock_is_held+0xb6/0x140 [ 347.312944] ? check_same_owner+0x320/0x320 [ 347.317279] ? rcu_note_context_switch+0x710/0x710 [ 347.322240] should_failslab+0xec/0x120 [ 347.326216] kmem_cache_alloc_node_trace+0x5a/0x760 [ 347.331221] ? idr_alloc_u32+0x390/0x390 [ 347.335288] mem_cgroup_css_alloc+0x3b6/0x19c0 [ 347.339866] ? setup_cpu_cache+0x1c0/0x1c0 [ 347.344083] ? __kernfs_new_node+0x3f5/0x570 [ 347.348477] ? kernfs_dop_revalidate+0x380/0x380 [ 347.353217] ? memset+0x31/0x40 [ 347.356481] ? trace_hardirqs_off+0x10/0x10 [ 347.360786] ? kernfs_link_sibling+0x27d/0x380 [ 347.365350] ? debug_lockdep_rcu_enabled+0x77/0x90 [ 347.370263] ? cgroup_kn_set_ugid+0x2c7/0x370 [ 347.374747] ? cgroup_file_name+0x1d0/0x1d0 [ 347.379051] ? mutex_unlock+0xd/0x10 [ 347.382753] ? __lock_is_held+0xb6/0x140 [ 347.386804] ? cgroup_addrm_files+0x67f/0xa70 [ 347.391286] ? trace_hardirqs_off+0x10/0x10 [ 347.395588] ? cgroup_file_write+0x710/0x710 [ 347.399989] ? cgroup_idr_replace+0x3f/0x50 [ 347.404296] ? trace_hardirqs_off+0x10/0x10 [ 347.408601] ? __lock_is_held+0xb6/0x140 [ 347.412652] ? __local_bh_enable_ip+0x121/0x230 [ 347.417304] ? __lock_is_held+0xb6/0x140 [ 347.421360] cgroup_apply_control_enable+0x44d/0xbc0 [ 347.426457] ? cgroup_propagate_control+0x570/0x570 [ 347.431463] ? css_populate_dir+0x289/0x420 [ 347.435777] cgroup_mkdir+0x56f/0xfc0 [ 347.439565] ? cgroup_destroy_locked+0x750/0x750 [ 347.444300] ? from_kgid+0x4a/0x60 [ 347.447824] ? privileged_wrt_inode_uidgid+0x8e/0xb0 [ 347.452906] ? capable_wrt_inode_uidgid+0x9b/0xc0 [ 347.457737] ? generic_permission+0x105/0x3c0 [ 347.462213] ? cgroup_destroy_locked+0x750/0x750 [ 347.466950] kernfs_iop_mkdir+0x153/0x1e0 [ 347.471080] vfs_mkdir+0x390/0x600 [ 347.474605] SyS_mkdirat+0x22b/0x2b0 [ 347.478300] ? SyS_mknod+0x480/0x480 [ 347.481995] ? trace_hardirqs_on+0xd/0x10 [ 347.486132] ? do_syscall_64+0xb7/0x940 [ 347.490091] ? SyS_mknod+0x480/0x480 [ 347.493785] do_syscall_64+0x281/0x940 [ 347.497653] ? vmalloc_sync_all+0x30/0x30 [ 347.501780] ? _raw_spin_unlock_irq+0x27/0x70 [ 347.506254] ? finish_task_switch+0x1c1/0x7e0 [ 347.510731] ? syscall_return_slowpath+0x550/0x550 [ 347.515642] ? syscall_return_slowpath+0x2ac/0x550 [ 347.520550] ? prepare_exit_to_usermode+0x350/0x350 [ 347.525551] ? entry_SYSCALL_64_after_hwframe+0x52/0xb7 [ 347.530899] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 347.535743] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 347.540912] RIP: 0033:0x454e79 [ 347.544083] RSP: 002b:00007f016b92fc68 EFLAGS: 00000246 ORIG_RAX: 0000000000000102 [ 347.551774] RAX: ffffffffffffffda RBX: 00007f016b9306d4 RCX: 0000000000454e79 [ 347.559026] RDX: 0000000000000020 RSI: 0000000020000280 RDI: 0000000000000015 [ 347.566273] RBP: 000000000072bea0 R08: 0000000000000000 R09: 0000000000000000 [ 347.573524] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000016 [ 347.580773] R13: 00000000000003eb R14: 00000000006f7ea8 R15: 0000000000000034 [ 347.588304] kasan: CONFIG_KASAN_INLINE enabled [ 347.593282] kasan: GPF could be caused by NULL-ptr deref or user memory access [ 347.600718] general protection fault: 0000 [#1] SMP KASAN [ 347.606257] Dumping ftrace buffer: [ 347.609790] (ftrace buffer empty) [ 347.613496] Modules linked in: [ 347.616703] CPU: 0 PID: 27120 Comm: syz-executor0 Not tainted 4.16.0-rc7+ #372 [ 347.624067] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 347.633437] RIP: 0010:__mem_cgroup_free+0x71/0x110 [ 347.638360] RSP: 0018:ffff880180d8f5a8 EFLAGS: 00010206 [ 347.643764] RAX: 0000000000000011 RBX: 0000000000000000 RCX: ffffffff8310cdfd [ 347.651034] RDX: 0000000000040000 RSI: ffffc90001ea8000 RDI: 0000000000000088 [ 347.658302] RBP: ffff880180d8f5c8 R08: 0000000000000000 R09: ffff880180d8f3a0 [ 347.665567] R10: 0000000000000000 R11: 0000000000000000 R12: 0000000000000000 [ 347.672839] R13: ffff88018121a680 R14: dffffc0000000000 R15: ffff88018121a680 [ 347.680109] FS: 00007f016b930700(0000) GS:ffff8801db000000(0000) knlGS:0000000000000000 [ 347.688337] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 347.694221] CR2: 0000000000a3eab8 CR3: 00000001b0824006 CR4: 00000000001626f0 [ 347.701491] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 347.708759] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 [ 347.716024] Call Trace: [ 347.718612] mem_cgroup_css_alloc+0x403/0x19c0 [ 347.723177] ? setup_cpu_cache+0x1c0/0x1c0 [ 347.727391] ? __kernfs_new_node+0x3f5/0x570 [ 347.731780] ? kernfs_dop_revalidate+0x380/0x380 [ 347.736516] ? memset+0x31/0x40 [ 347.739774] ? trace_hardirqs_off+0x10/0x10 [ 347.744075] ? kernfs_link_sibling+0x27d/0x380 [ 347.748648] ? debug_lockdep_rcu_enabled+0x77/0x90 [ 347.753556] ? cgroup_kn_set_ugid+0x2c7/0x370 [ 347.758031] ? cgroup_file_name+0x1d0/0x1d0 [ 347.762328] ? mutex_unlock+0xd/0x10 [ 347.766023] ? __lock_is_held+0xb6/0x140 [ 347.770073] ? cgroup_addrm_files+0x67f/0xa70 [ 347.774557] ? trace_hardirqs_off+0x10/0x10 [ 347.778857] ? cgroup_file_write+0x710/0x710 [ 347.783250] ? cgroup_idr_replace+0x3f/0x50 [ 347.787551] ? trace_hardirqs_off+0x10/0x10 [ 347.791854] ? __lock_is_held+0xb6/0x140 [ 347.795897] ? __local_bh_enable_ip+0x121/0x230 [ 347.800548] ? __lock_is_held+0xb6/0x140 [ 347.804596] cgroup_apply_control_enable+0x44d/0xbc0 [ 347.809687] ? cgroup_propagate_control+0x570/0x570 [ 347.814697] ? css_populate_dir+0x289/0x420 [ 347.818999] cgroup_mkdir+0x56f/0xfc0 [ 347.822785] ? cgroup_destroy_locked+0x750/0x750 [ 347.827520] ? from_kgid+0x4a/0x60 [ 347.831038] ? privileged_wrt_inode_uidgid+0x8e/0xb0 [ 347.836117] ? capable_wrt_inode_uidgid+0x9b/0xc0 [ 347.840941] ? generic_permission+0x105/0x3c0 [ 347.845417] ? cgroup_destroy_locked+0x750/0x750 [ 347.850152] kernfs_iop_mkdir+0x153/0x1e0 [ 347.854281] vfs_mkdir+0x390/0x600 [ 347.857801] SyS_mkdirat+0x22b/0x2b0 [ 347.861497] ? SyS_mknod+0x480/0x480 [ 347.865198] ? trace_hardirqs_on+0xd/0x10 [ 347.869326] ? do_syscall_64+0xb7/0x940 [ 347.873279] ? SyS_mknod+0x480/0x480 [ 347.876974] do_syscall_64+0x281/0x940 [ 347.880837] ? vmalloc_sync_all+0x30/0x30 [ 347.884962] ? _raw_spin_unlock_irq+0x27/0x70 [ 347.889435] ? finish_task_switch+0x1c1/0x7e0 [ 347.893911] ? syscall_return_slowpath+0x550/0x550 [ 347.898817] ? syscall_return_slowpath+0x2ac/0x550 [ 347.903724] ? prepare_exit_to_usermode+0x350/0x350 [ 347.908720] ? entry_SYSCALL_64_after_hwframe+0x52/0xb7 [ 347.914065] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 347.918893] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 347.924061] RIP: 0033:0x454e79 [ 347.927226] RSP: 002b:00007f016b92fc68 EFLAGS: 00000246 ORIG_RAX: 0000000000000102 [ 347.934914] RAX: ffffffffffffffda RBX: 00007f016b9306d4 RCX: 0000000000454e79 [ 347.942160] RDX: 0000000000000020 RSI: 0000000020000280 RDI: 0000000000000015 [ 347.949410] RBP: 000000000072bea0 R08: 0000000000000000 R09: 0000000000000000 [ 347.956676] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000016 [ 347.963930] R13: 00000000000003eb R14: 00000000006f7ea8 R15: 0000000000000034 [ 347.971191] Code: 00 00 48 89 f8 48 c1 e8 03 42 80 3c 30 00 0f 85 99 00 00 00 4f 8b a4 e5 f0 09 00 00 49 8d bc 24 88 00 00 00 48 89 f8 48 c1 e8 03 <42> 80 3c 30 00 0f 85 88 00 00 00 49 8b bc 24 88 00 00 00 e8 77 [ 347.990469] RIP: __mem_cgroup_free+0x71/0x110 RSP: ffff880180d8f5a8 [ 347.996996] ---[ end trace 6f0e31de8fdf480f ]--- [ 348.001815] Kernel panic - not syncing: Fatal exception [ 348.007606] Dumping ftrace buffer: [ 348.011130] (ftrace buffer empty) [ 348.014811] Kernel Offset: disabled [ 348.018417] Rebooting in 86400 seconds..