x11, &(0x7f00000007c0)={0x0, 0x0, 0x0}, &(0x7f0000000540)=0xc) fchown(r4, r7, r8) r9 = syz_open_dev$binder(&(0x7f0000000100)='/dev/binder#\x00', 0xffffffffffffffff, 0x806) ioctl$BINDER_SET_CONTEXT_MGR(r6, 0x40046207, 0x0) mmap$binder(&(0x7f000000c000/0x2000)=nil, 0x2000, 0x0, 0x12, r9, 0x0) ioctl$BINDER_WRITE_READ(r9, 0xc0306201, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000), 0x0, 0x0, &(0x7f0000011f9d)}) getsockopt$inet_sctp6_SCTP_AUTO_ASCONF(0xffffffffffffffff, 0x84, 0x1e, &(0x7f0000000140), &(0x7f0000000180)=0x4) ioctl$BINDER_WRITE_READ(r9, 0xc0306201, &(0x7f0000000340)={0x8, 0x0, &(0x7f0000000440)=ANY=[@ANYRES64=r1], 0x0, 0x0, &(0x7f0000000240)}) write(0xffffffffffffffff, &(0x7f0000000580)="8be25f5790f264f30000000000000000dd7e1c359c9a19afb750a2d25352875d187d4118c99a2d5c6db433c277cc7d345b87a34f1b417033d3676a25633f77aafb17e99c33cb65352c901ae75176f07bb0a4bb5ebff3d87e28f8bec75a70759e96353a20fe1e8b7f2e0847ec80a278c1fa15233e8267d55d72c6573acd1c34ce1f3122e57d57e0d810bec1d9c175ddd9d6fee675701c2a2cc25eb9e274783a7a214517d472f9c8e266126bfcb0f4f041d43d425ff2d87005736d9abf2db011b7040d7c73f291f5bdd7c08e1dc11f82a01df8bec90431afed160331f7ae529216ac77d4ba7fab2420580ee9bf4922208dcf32ae094e4c4f05d0c42c1520d7d56e54532297fab513f791c870d3b4f6daefdf3e40d2efc66a1df833916be34cfe806dfb4e", 0x123) r10 = ioctl$LOOP_CTL_GET_FREE(r4, 0x4c82) ioctl$LOOP_CTL_REMOVE(r6, 0x4c81, r10) openat$cgroup(0xffffffffffffff9c, &(0x7f0000000000)='syz0\x00', 0x200002, 0x0) sched_setaffinity(r2, 0x8, &(0x7f0000000200)=0x7) 2018/03/31 09:15:19 executing program 6: perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f000031f000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) prctl$void(0x0) getpid() r0 = syz_open_dev$vcsn(&(0x7f0000000040)='/dev/vcs#\x00', 0x0, 0x20000) ioctl$GIO_CMAP(r0, 0x4b70, &(0x7f0000000080)) r1 = socket$alg(0x26, 0x5, 0x0) ioctl$sock_SIOCGIFBR(0xffffffffffffffff, 0x8940, &(0x7f0000000040)=@get={0x1, &(0x7f0000000400)=""/242, 0x100000000}) bind$alg(r1, &(0x7f0000000080)={0x26, 'aead\x00', 0x0, 0x0, 'generic-gcm-aesni\x00'}, 0x58) syz_open_dev$sndmidi(&(0x7f0000000100)='/dev/snd/midiC#D#\x00', 0xfd, 0x0) bind(0xffffffffffffffff, &(0x7f0000000140)=@llc={0x1a, 0x33a, 0x7, 0x80, 0x0, 0x4, @remote={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xbb}}, 0x80) r2 = syz_init_net_socket$nfc_llcp(0x27, 0x1, 0x1) setsockopt$nfc_llcp_NFC_LLCP_MIUX(r2, 0x118, 0x15, &(0x7f0000000000), 0x4) r3 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/cuse\x00', 0x103002, 0x0) futimesat(r3, &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)={{0x0, 0x7530}}) r4 = syz_open_dev$vcsa(&(0x7f00000001c0)='/dev/vcsa#\x00', 0x0, 0x0) sendto$inet6(r4, &(0x7f0000000bc0), 0x0, 0x20000000, &(0x7f0000000c40)={0xa, 0x4e20, 0x0, @dev={0xfe, 0x80, [], 0x19}, 0x1f}, 0x1c) accept$alg(r0, 0x0, 0x0) sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f0000000000)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x8}, 0xb4fcd35419244434, &(0x7f00004ca000)={&(0x7f0000000300)=ANY=[], 0x1a1}, 0x1}, 0x0) syz_fuseblk_mount(&(0x7f0000001380)='./file0\x00', &(0x7f00000013c0)='./file0\x00', 0xf000, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0xb21, 0x0) socket(0x1e, 0x3, 0x0) socket(0x1e, 0x0, 0x0) ptrace$PTRACE_SECCOMP_GET_FILTER(0x420c, 0x0, 0x0, &(0x7f0000000380)=""/113) sched_yield() ioctl$TUNGETIFF(r4, 0x800454d2, &(0x7f0000000140)) ioctl$KIOCSOUND(r4, 0x4b2f, 0xfffffffffffffb74) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x20, 0x9b}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000447000)='./file0\x00', &(0x7f00000e1000)='msdos\x00', 0x0, &(0x7f000097bfff)) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000580)='./cgroup/syz0\x00', 0x1ff) [ 312.116365] print_req_error: I/O error, dev loop199, sector 0 [ 312.122499] FAT-fs (loop199): unable to read boot sector [ 312.136374] print_req_error: I/O error, dev loop199, sector 0 [ 312.142659] FAT-fs (loop199): unable to read boot sector [ 312.154541] print_req_error: I/O error, dev loop199, sector 0 2018/03/31 09:15:19 executing program 4: perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f000031f000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) prctl$void(0x1f) getpid() r0 = syz_open_dev$vcsn(&(0x7f0000000040)='/dev/vcs#\x00', 0x0, 0x20000) ioctl$GIO_CMAP(r0, 0x4b70, &(0x7f0000000080)) r1 = socket$alg(0x26, 0x5, 0x0) ioctl$sock_SIOCGIFBR(0xffffffffffffffff, 0x8940, &(0x7f0000000040)=@get={0x1, &(0x7f0000000400)=""/242, 0x100000000}) bind$alg(r1, &(0x7f0000000080)={0x26, 'aead\x00', 0x0, 0x0, 'generic-gcm-aesni\x00'}, 0x58) syz_open_dev$sndmidi(&(0x7f0000000100)='/dev/snd/midiC#D#\x00', 0xfd, 0x0) bind(0xffffffffffffffff, &(0x7f0000000140)=@llc={0x1a, 0x33a, 0x7, 0x80, 0x0, 0x4, @remote={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xbb}}, 0x80) r2 = syz_init_net_socket$nfc_llcp(0x27, 0x1, 0x1) setsockopt$nfc_llcp_NFC_LLCP_MIUX(r2, 0x118, 0x15, &(0x7f0000000000), 0x4) recvfrom$unix(r0, &(0x7f0000000200)=""/234, 0xea, 0x2000, &(0x7f0000000300)=@file={0x1, './file0\x00'}, 0x6e) r3 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/cuse\x00', 0x103002, 0x0) futimesat(r3, &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)={{0x0, 0x7530}}) r4 = syz_open_dev$vcsa(&(0x7f00000001c0)='/dev/vcsa#\x00', 0x2, 0x0) sendto$inet6(r4, &(0x7f0000000bc0), 0x0, 0x20000000, &(0x7f0000000c40)={0xa, 0x4e20, 0x0, @dev={0xfe, 0x80, [], 0x19}, 0x1f}, 0x1c) accept$alg(r0, 0x0, 0x0) sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f0000000000)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x8}, 0xb4fcd35419244434, &(0x7f00004ca000)={&(0x7f0000000300)=ANY=[], 0x1a1}, 0x1}, 0x0) syz_fuseblk_mount(&(0x7f0000001380)='./file0\x00', &(0x7f00000013c0)='./file0\x00', 0xf000, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0xb21, 0x0) socket(0x1e, 0x3, 0x0) socket(0x1e, 0x0, 0x30001) ptrace$PTRACE_SECCOMP_GET_FILTER(0x420c, 0x0, 0x0, &(0x7f0000000380)=""/113) sched_yield() getsockname$unix(r0, &(0x7f0000000500), &(0x7f00000005c0)=0x6e) ioctl$TUNGETIFF(r4, 0x800454d2, &(0x7f0000000140)) ioctl$KIOCSOUND(r4, 0x4b2f, 0xfffffffffffffb74) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x20, 0x9b}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000447000)='./file0\x00', &(0x7f00000e1000)='msdos\x00', 0x0, &(0x7f000097bfff)) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000580)='./cgroup/syz0\x00', 0x1ff) 2018/03/31 09:15:19 executing program 7 (fault-call:24 fault-nth:0): perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f000031f000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getpid() r0 = syz_open_dev$vcsn(&(0x7f0000000040)='/dev/vcs#\x00', 0x0, 0x20000) ioctl$GIO_CMAP(r0, 0x4b70, &(0x7f0000000080)) r1 = socket$alg(0x26, 0x5, 0x0) ioctl$sock_SIOCGIFBR(r1, 0x8940, &(0x7f0000000040)=@get={0x1, &(0x7f0000000400)=""/242, 0x100000000}) bind$alg(r1, &(0x7f0000000080)={0x26, 'aead\x00', 0x0, 0x0, 'generic-gcm-aesni\x00'}, 0x58) syz_open_dev$sndmidi(&(0x7f0000000100)='/dev/snd/midiC#D#\x00', 0xfd, 0x0) bind(0xffffffffffffffff, &(0x7f0000000140)=@llc={0x1a, 0x33a, 0x7, 0x80, 0x5, 0x4, @remote={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xbb}}, 0x80) r2 = syz_init_net_socket$nfc_llcp(0x27, 0x1, 0x1) setsockopt$nfc_llcp_NFC_LLCP_MIUX(r2, 0x118, 0x15, &(0x7f0000000000), 0x4) r3 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/cuse\x00', 0x103002, 0x0) futimesat(r3, &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)={{0x0, 0x7530}}) r4 = syz_open_dev$vcsa(&(0x7f00000001c0)='/dev/vcsa#\x00', 0x2, 0x4020ff) sendto$inet6(r4, &(0x7f0000000bc0)="36251e313e0743fc195a1a198a14434e8a0a00b3f452a3b5644e336ec712a16310c9aecc4e3097bc666a8882128a73c368ce731e9fbf3fe18fa52d00", 0x3c, 0x20000000, &(0x7f0000000c40)={0xa, 0x0, 0x6, @dev={0xfe, 0x80, [], 0x19}, 0x1f}, 0x1c) accept$alg(r0, 0x0, 0x0) sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f0000000000)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x8}, 0xb4fcd35419244434, &(0x7f00004ca000)={&(0x7f0000000300)=ANY=[], 0x1a1}, 0x1}, 0x0) syz_fuseblk_mount(&(0x7f0000001380)='./file0\x00', &(0x7f00000013c0)='./file0\x00', 0xf000, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0xb21, 0x0) socket(0x1e, 0x3, 0x0) socket(0x1e, 0x0, 0x0) ptrace$PTRACE_SECCOMP_GET_FILTER(0x420c, 0x0, 0x0, &(0x7f0000000380)=""/113) sched_yield() ioctl$TUNGETIFF(r4, 0x800454d2, &(0x7f0000000140)) ioctl$KIOCSOUND(r4, 0x4b2f, 0xfffffffffffffb74) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000447000)='./file0\x00', &(0x7f00000e1000)='msdos\x00', 0x0, &(0x7f000097bfff)) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000580)='./cgroup/syz0\x00', 0x1ff) syz_open_dev$audion(&(0x7f0000000280)='/dev/audio#\x00', 0x7be, 0x0) [ 312.162713] FAT-fs (loop199): unable to read boot sector [ 312.182537] print_req_error: I/O error, dev loop199, sector 0 [ 312.188516] FAT-fs (loop199): unable to read boot sector [ 312.213688] binder: 30909:30912 unknown command 20 [ 312.219735] print_req_error: I/O error, dev loop199, sector 0 [ 312.225754] FAT-fs (loop199): unable to read boot sector [ 312.241826] binder: 30909:30912 ioctl c0306201 20000340 returned -22 [ 312.261618] FAULT_INJECTION: forcing a failure. [ 312.261618] name failslab, interval 1, probability 0, space 0, times 0 [ 312.265819] FAT-fs (loop199): unable to read boot sector [ 312.272874] CPU: 1 PID: 30916 Comm: syz-executor7 Not tainted 4.16.0-rc7+ #8 [ 312.272884] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 312.272889] Call Trace: [ 312.272906] dump_stack+0x194/0x24d [ 312.272920] ? arch_local_irq_restore+0x53/0x53 [ 312.272943] should_fail+0x8c0/0xa40 [ 312.309371] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 312.314456] ? lock_downgrade+0x980/0x980 [ 312.318583] ? get_pid_task+0xbc/0x140 [ 312.322448] ? proc_fail_nth_write+0x9b/0x1d0 [ 312.326923] ? map_files_get_link+0x3a0/0x3a0 [ 312.331402] ? find_held_lock+0x35/0x1d0 [ 312.335456] ? check_same_owner+0x320/0x320 [ 312.339755] ? __lock_is_held+0xb6/0x140 [ 312.343797] ? rcu_note_context_switch+0x710/0x710 [ 312.348713] should_failslab+0xec/0x120 [ 312.352668] __kmalloc_track_caller+0x5f/0x760 [ 312.357232] ? strncpy_from_user+0x430/0x430 [ 312.361616] ? strndup_user+0x62/0xb0 [ 312.365401] memdup_user+0x2c/0x90 [ 312.368917] strndup_user+0x62/0xb0 [ 312.372522] SyS_mount+0x3c/0x120 [ 312.375951] ? copy_mnt_ns+0xb30/0xb30 [ 312.379821] do_syscall_64+0x281/0x940 [ 312.383686] ? vmalloc_sync_all+0x30/0x30 [ 312.387813] ? _raw_spin_unlock_irq+0x27/0x70 [ 312.392284] ? finish_task_switch+0x1c1/0x7e0 [ 312.396753] ? syscall_return_slowpath+0x550/0x550 [ 312.401657] ? syscall_return_slowpath+0x2ac/0x550 [ 312.406564] ? prepare_exit_to_usermode+0x350/0x350 [ 312.411558] ? entry_SYSCALL_64_after_hwframe+0x52/0xb7 [ 312.416904] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 312.421726] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 312.426891] RIP: 0033:0x454e79 [ 312.430056] RSP: 002b:00007f37fba8ec68 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 312.437740] RAX: ffffffffffffffda RBX: 00007f37fba8f6d4 RCX: 0000000000454e79 [ 312.444986] RDX: 00000000200e1000 RSI: 0000000020447000 RDI: 0000000020000000 [ 312.452231] RBP: 000000000072bea0 R08: 000000002097bfff R09: 0000000000000000 [ 312.459475] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000019 2018/03/31 09:15:19 executing program 6: perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f000031f000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) prctl$void(0x0) getpid() r0 = syz_open_dev$vcsn(&(0x7f0000000040)='/dev/vcs#\x00', 0x0, 0x20000) ioctl$GIO_CMAP(r0, 0x4b70, &(0x7f0000000080)) r1 = socket$alg(0x26, 0x5, 0x0) ioctl$sock_SIOCGIFBR(0xffffffffffffffff, 0x8940, &(0x7f0000000040)=@get={0x1, &(0x7f0000000400)=""/242, 0x100000000}) bind$alg(r1, &(0x7f0000000080)={0x26, 'aead\x00', 0x0, 0x0, 'generic-gcm-aesni\x00'}, 0x58) syz_open_dev$sndmidi(&(0x7f0000000100)='/dev/snd/midiC#D#\x00', 0xfd, 0x0) bind(0xffffffffffffffff, &(0x7f0000000140)=@llc={0x1a, 0x33a, 0x7, 0x80, 0x0, 0x4, @remote={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xbb}}, 0x80) r2 = syz_init_net_socket$nfc_llcp(0x27, 0x1, 0x1) setsockopt$nfc_llcp_NFC_LLCP_MIUX(r2, 0x118, 0x15, &(0x7f0000000000), 0x4) r3 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/cuse\x00', 0x103002, 0x0) futimesat(r3, &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)={{0x0, 0x7530}}) r4 = syz_open_dev$vcsa(&(0x7f00000001c0)='/dev/vcsa#\x00', 0x2, 0x0) sendto$inet6(0xffffffffffffffff, &(0x7f0000000bc0), 0x0, 0x20000000, &(0x7f0000000c40)={0xa, 0x4e20, 0x0, @dev={0xfe, 0x80, [], 0x19}, 0x1f}, 0x1c) accept$alg(r0, 0x0, 0x0) sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f0000000000)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x8}, 0xb4fcd35419244434, &(0x7f00004ca000)={&(0x7f0000000300)=ANY=[], 0x1a1}, 0x1}, 0x0) syz_fuseblk_mount(&(0x7f0000001380)='./file0\x00', &(0x7f00000013c0)='./file0\x00', 0xf000, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0xb21, 0x0) socket(0x1e, 0x3, 0x0) socket(0x1e, 0x0, 0x0) ptrace$PTRACE_SECCOMP_GET_FILTER(0x420c, 0x0, 0x0, &(0x7f0000000380)=""/113) sched_yield() ioctl$TUNGETIFF(r4, 0x800454d2, &(0x7f0000000140)) ioctl$KIOCSOUND(r4, 0x4b2f, 0xfffffffffffffb74) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x20, 0x9b}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000447000)='./file0\x00', &(0x7f00000e1000)='msdos\x00', 0x0, &(0x7f000097bfff)) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000580)='./cgroup/syz0\x00', 0x1ff) 2018/03/31 09:15:19 executing program 5: r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f000031f000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) prctl$void(0x0) getpid() r1 = syz_open_dev$vcsn(&(0x7f0000000040)='/dev/vcs#\x00', 0x0, 0x20000) ioctl$GIO_CMAP(r1, 0x4b70, &(0x7f0000000080)) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000080)={0x26, 'aead\x00', 0x0, 0x0, 'generic-gcm-aesni\x00'}, 0x58) syz_open_dev$sndmidi(&(0x7f0000000100)='/dev/snd/midiC#D#\x00', 0xfd, 0x0) bind(0xffffffffffffffff, &(0x7f0000000140)=@llc={0x1a, 0x33a, 0x7, 0x80, 0x5, 0x4, @remote={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xbb}}, 0x80) r3 = syz_init_net_socket$nfc_llcp(0x27, 0x1, 0x1) setsockopt$nfc_llcp_NFC_LLCP_MIUX(r3, 0x118, 0x15, &(0x7f0000000000), 0x4) r4 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/cuse\x00', 0x103002, 0x0) futimesat(r4, &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)={{0x0, 0x7530}}) r5 = syz_open_dev$vcsa(&(0x7f00000001c0)='/dev/vcsa#\x00', 0x2, 0x4020ff) io_setup(0x0, &(0x7f0000000200)=0x0) io_cancel(r6, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x7, 0x0, r0, &(0x7f0000000240)="3c59010061d2d9efeea2d9672242e598c495d302cd074f049b", 0x19, 0x101, 0x0, 0x1, r4}, &(0x7f0000000300)) sendto$inet6(0xffffffffffffffff, &(0x7f0000000bc0)="36251e313e0743fc195a1a198a14434e8a0a00b3f452a3b5644e336ec712a16310c9aecc4e3097bc666a8882128a73c368ce731e9fbf3fe18fa52d", 0x3b, 0x20000000, &(0x7f0000000c40)={0xa, 0x4e20, 0x6, @dev={0xfe, 0x80, [], 0x19}, 0x1f}, 0x1c) accept$alg(r1, 0x0, 0x0) sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f0000000000)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x8}, 0xb4fcd35419244434, &(0x7f00004ca000)={&(0x7f0000000300)=ANY=[], 0x1a1}, 0x1}, 0x0) syz_fuseblk_mount(&(0x7f0000001380)='./file0\x00', &(0x7f00000013c0)='./file0\x00', 0xf000, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0xb21, 0x0) socket(0x1e, 0x3, 0x0) socket(0x1e, 0x0, 0x0) ptrace$PTRACE_SECCOMP_GET_FILTER(0x420c, 0x0, 0x0, &(0x7f0000000380)=""/113) sched_yield() ioctl$TUNGETIFF(r5, 0x800454d2, &(0x7f0000000140)) ioctl$KIOCSOUND(r5, 0x4b2f, 0xfffffffffffffb74) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x20, 0x9b}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000447000)='./file0\x00', &(0x7f00000e1000)='msdos\x00', 0x0, &(0x7f000097bfff)) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000580)='./cgroup/syz0\x00', 0x1ff) lseek(r1, 0x0, 0x1) syz_open_dev$audion(&(0x7f0000000280)='/dev/audio#\x00', 0x7be, 0x0) 2018/03/31 09:15:19 executing program 0: perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f000031f000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) prctl$void(0x0) r0 = syz_open_dev$vcsn(&(0x7f0000000040)='/dev/vcs#\x00', 0x0, 0x20000) socket$alg(0x26, 0x5, 0x0) ioctl$sock_SIOCGIFBR(0xffffffffffffffff, 0x8940, &(0x7f0000000040)=@get={0x1, &(0x7f0000000400)=""/242, 0x100000000}) bind$alg(0xffffffffffffffff, &(0x7f0000000080)={0x26, 'aead\x00', 0x0, 0x0, 'generic-gcm-aesni\x00'}, 0x58) syz_open_dev$sndmidi(&(0x7f0000000100)='/dev/snd/midiC#D#\x00', 0xfd, 0x0) bind(0xffffffffffffffff, &(0x7f0000000140)=@llc={0x1a, 0x33a, 0x7, 0x80, 0x0, 0x4, @remote={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xbb}}, 0x80) r1 = syz_init_net_socket$nfc_llcp(0x27, 0x1, 0x1) setsockopt$nfc_llcp_NFC_LLCP_MIUX(r1, 0x118, 0x15, &(0x7f0000000000), 0x4) r2 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/cuse\x00', 0x103002, 0x0) futimesat(r2, &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)={{0x0, 0x7530}}) r3 = syz_open_dev$vcsa(&(0x7f00000001c0)='/dev/vcsa#\x00', 0x2, 0x0) sendto$inet6(r3, &(0x7f0000000bc0)="36251e313e0743fc195a1a198a14434e8a0a00b3f452a3b5644e336ec712a16310c9aecc4e3097bc666a8882128a73c368ce731e9fbf3fe18fa52d00c34ac2e57c1c4569cfbd6a621c6dfbc032121aed", 0x50, 0x20000000, &(0x7f0000000c40)={0xa, 0x4e20, 0x6, @dev={0xfe, 0x80, [], 0x19}, 0x1f}, 0x1c) accept$alg(r0, 0x0, 0x0) sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f0000000000)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x8}, 0xb4fcd35419244434, &(0x7f00004ca000)={&(0x7f0000000300)=ANY=[], 0x1a1}, 0x1}, 0x0) syz_fuseblk_mount(&(0x7f0000001380)='./file0\x00', &(0x7f00000013c0)='./file0\x00', 0xf000, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0xb21, 0x0) r4 = socket(0x1e, 0x3, 0x0) socket(0x1e, 0x0, 0x0) ptrace$PTRACE_SECCOMP_GET_FILTER(0x420c, 0x0, 0x0, &(0x7f0000000380)=""/113) ioctl$TUNGETIFF(r3, 0x800454d2, &(0x7f0000000140)) ioctl$KIOCSOUND(r3, 0x4b2f, 0xfffffffffffffb74) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x23, 0x80000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000447000)='./file0\x00', &(0x7f00000e1000)='msdos\x00', 0x0, &(0x7f000097bfff)) setsockopt$inet_MCAST_MSFILTER(r4, 0x0, 0x30, &(0x7f00000005c0)={0x100, {{0x2, 0x4e23, @multicast2=0xe0000002}}, 0x1, 0x3, [{{0x2, 0x4e23, @loopback=0x7f000001}}, {{0x2, 0x4e20, @local={0xac, 0x14, 0x14, 0xaa}}}, {{0x2, 0x4e23, @rand_addr}}]}, 0x210) openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000200)='/dev/loop-control\x00', 0x100, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000580)='./cgroup/syz0\x00', 0x1ff) 2018/03/31 09:15:19 executing program 1: perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f000031f000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) prctl$void(0x0) r0 = getpid() syz_open_dev$vcsn(&(0x7f0000000040)='/dev/vcs#\x00', 0x400, 0x20000) r1 = socket$alg(0x26, 0x5, 0x0) ioctl$sock_SIOCGIFBR(r1, 0x8940, &(0x7f0000000040)=@get={0x1, &(0x7f0000000400)=""/242, 0x100000000}) bind$alg(r1, &(0x7f0000000080)={0x26, 'aead\x00', 0x0, 0x0, 'generic-gcm-aesni\x00'}, 0x58) r2 = syz_open_dev$sndmidi(&(0x7f0000000100)='/dev/snd/midiC#D#\x00', 0xfd, 0x0) bind(r2, &(0x7f0000000140)=@llc={0x1a, 0x33a, 0x7, 0x80, 0x0, 0x4, @remote={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xbb}}, 0x80) r3 = syz_init_net_socket$nfc_llcp(0x27, 0x1, 0x1) setsockopt$nfc_llcp_NFC_LLCP_MIUX(r3, 0x118, 0x15, &(0x7f0000000000), 0x4) r4 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/cuse\x00', 0x103002, 0x0) futimesat(r4, &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)={{0x0, 0x7530}}) setpgid(r0, r0) r5 = syz_open_dev$vcsa(&(0x7f00000001c0)='/dev/vcsa#\x00', 0x2, 0x4020ff) sendto$inet6(r5, &(0x7f0000000bc0), 0x0, 0x20000000, &(0x7f0000000c40)={0xa, 0x4e20, 0x6, @dev={0xfe, 0x80, [], 0x19}, 0x1f}, 0x1c) sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f0000000000)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x8}, 0xb4fcd35419244434, &(0x7f00004ca000)={&(0x7f0000000300)=ANY=[], 0x1a1}, 0x1}, 0x0) syz_fuseblk_mount(&(0x7f0000001380)='./file0\x00', &(0x7f00000013c0)='./file0\x00', 0xf000, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0xb21, 0x0) socket(0x1e, 0x3, 0x0) ptrace$PTRACE_SECCOMP_GET_FILTER(0x420c, 0x0, 0x0, &(0x7f0000000380)=""/113) sched_yield() ioctl$TUNGETIFF(r5, 0x800454d2, &(0x7f0000000140)) ioctl$KIOCSOUND(r5, 0x4b2f, 0xfffffffffffffb74) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x20, 0x9b}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000447000)='./file0\x00', &(0x7f00000e1000)='msdos\x00', 0x0, &(0x7f000097bfff)) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000580)='./cgroup/syz0\x00', 0x1ff) syz_open_dev$audion(&(0x7f0000000280)='/dev/audio#\x00', 0x7be, 0x0) fcntl$getown(0xffffffffffffffff, 0x9) [ 312.466721] R13: 00000000000003fa R14: 00000000006f8010 R15: 0000000000000000 [ 312.489381] binder: 30909:30918 unknown command 26 [ 312.497081] binder: 30909:30918 ioctl c0306201 20000340 returned -22 2018/03/31 09:15:19 executing program 7 (fault-call:24 fault-nth:1): perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f000031f000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getpid() r0 = syz_open_dev$vcsn(&(0x7f0000000040)='/dev/vcs#\x00', 0x0, 0x20000) ioctl$GIO_CMAP(r0, 0x4b70, &(0x7f0000000080)) r1 = socket$alg(0x26, 0x5, 0x0) ioctl$sock_SIOCGIFBR(r1, 0x8940, &(0x7f0000000040)=@get={0x1, &(0x7f0000000400)=""/242, 0x100000000}) bind$alg(r1, &(0x7f0000000080)={0x26, 'aead\x00', 0x0, 0x0, 'generic-gcm-aesni\x00'}, 0x58) syz_open_dev$sndmidi(&(0x7f0000000100)='/dev/snd/midiC#D#\x00', 0xfd, 0x0) bind(0xffffffffffffffff, &(0x7f0000000140)=@llc={0x1a, 0x33a, 0x7, 0x80, 0x5, 0x4, @remote={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xbb}}, 0x80) r2 = syz_init_net_socket$nfc_llcp(0x27, 0x1, 0x1) setsockopt$nfc_llcp_NFC_LLCP_MIUX(r2, 0x118, 0x15, &(0x7f0000000000), 0x4) r3 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/cuse\x00', 0x103002, 0x0) futimesat(r3, &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)={{0x0, 0x7530}}) r4 = syz_open_dev$vcsa(&(0x7f00000001c0)='/dev/vcsa#\x00', 0x2, 0x4020ff) sendto$inet6(r4, &(0x7f0000000bc0)="36251e313e0743fc195a1a198a14434e8a0a00b3f452a3b5644e336ec712a16310c9aecc4e3097bc666a8882128a73c368ce731e9fbf3fe18fa52d00", 0x3c, 0x20000000, &(0x7f0000000c40)={0xa, 0x0, 0x6, @dev={0xfe, 0x80, [], 0x19}, 0x1f}, 0x1c) accept$alg(r0, 0x0, 0x0) sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f0000000000)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x8}, 0xb4fcd35419244434, &(0x7f00004ca000)={&(0x7f0000000300)=ANY=[], 0x1a1}, 0x1}, 0x0) syz_fuseblk_mount(&(0x7f0000001380)='./file0\x00', &(0x7f00000013c0)='./file0\x00', 0xf000, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0xb21, 0x0) socket(0x1e, 0x3, 0x0) socket(0x1e, 0x0, 0x0) ptrace$PTRACE_SECCOMP_GET_FILTER(0x420c, 0x0, 0x0, &(0x7f0000000380)=""/113) sched_yield() ioctl$TUNGETIFF(r4, 0x800454d2, &(0x7f0000000140)) ioctl$KIOCSOUND(r4, 0x4b2f, 0xfffffffffffffb74) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000447000)='./file0\x00', &(0x7f00000e1000)='msdos\x00', 0x0, &(0x7f000097bfff)) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000580)='./cgroup/syz0\x00', 0x1ff) syz_open_dev$audion(&(0x7f0000000280)='/dev/audio#\x00', 0x7be, 0x0) [ 312.539472] FAT-fs (loop199): unable to read boot sector [ 312.584795] FAT-fs (loop199): unable to read boot sector [ 312.602710] FAT-fs (loop199): unable to read boot sector [ 312.619781] FAT-fs (loop199): unable to read boot sector [ 312.649656] FAULT_INJECTION: forcing a failure. [ 312.649656] name failslab, interval 1, probability 0, space 0, times 0 [ 312.650461] FAT-fs (loop199): unable to read boot sector [ 312.661123] CPU: 0 PID: 30934 Comm: syz-executor7 Not tainted 4.16.0-rc7+ #8 [ 312.673544] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 312.682893] Call Trace: [ 312.685476] dump_stack+0x194/0x24d [ 312.686727] FAT-fs (loop199): unable to read boot sector [ 312.689104] ? arch_local_irq_restore+0x53/0x53 [ 312.689139] should_fail+0x8c0/0xa40 [ 312.702945] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 312.708052] ? kasan_kmalloc+0xad/0xe0 [ 312.711939] ? __kmalloc_track_caller+0x15e/0x760 [ 312.716782] ? memdup_user+0x2c/0x90 [ 312.720498] ? SyS_mount+0x3c/0x120 [ 312.724134] ? proc_fail_nth_write+0x9b/0x1d0 [ 312.727649] FAT-fs (loop199): unable to read boot sector [ 312.728633] ? find_held_lock+0x35/0x1d0 [ 312.728671] ? check_same_owner+0x320/0x320 [ 312.742454] ? rcu_note_context_switch+0x710/0x710 [ 312.747410] ? __check_object_size+0x8b/0x530 [ 312.751907] should_failslab+0xec/0x120 [ 312.755868] __kmalloc_track_caller+0x5f/0x760 [ 312.760439] ? strncpy_from_user+0x430/0x430 [ 312.764829] ? strndup_user+0x62/0xb0 [ 312.768614] ? _copy_from_user+0x99/0x110 [ 312.772743] memdup_user+0x2c/0x90 [ 312.776264] strndup_user+0x62/0xb0 [ 312.779877] SyS_mount+0x6b/0x120 [ 312.783310] ? copy_mnt_ns+0xb30/0xb30 [ 312.787181] do_syscall_64+0x281/0x940 [ 312.791055] ? vmalloc_sync_all+0x30/0x30 [ 312.795187] ? _raw_spin_unlock_irq+0x27/0x70 [ 312.799664] ? finish_task_switch+0x1c1/0x7e0 [ 312.804143] ? syscall_return_slowpath+0x550/0x550 [ 312.809054] ? syscall_return_slowpath+0x2ac/0x550 [ 312.813965] ? prepare_exit_to_usermode+0x350/0x350 [ 312.818964] ? entry_SYSCALL_64_after_hwframe+0x52/0xb7 [ 312.824310] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 312.829141] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 312.834309] RIP: 0033:0x454e79 [ 312.837480] RSP: 002b:00007f37fba8ec68 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 312.845171] RAX: ffffffffffffffda RBX: 00007f37fba8f6d4 RCX: 0000000000454e79 [ 312.852420] RDX: 00000000200e1000 RSI: 0000000020447000 RDI: 0000000020000000 [ 312.859668] RBP: 000000000072bea0 R08: 000000002097bfff R09: 0000000000000000 [ 312.866920] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000019 [ 312.874169] R13: 00000000000003fa R14: 00000000006f8010 R15: 0000000000000001 2018/03/31 09:15:20 executing program 2: syz_open_dev$loop(&(0x7f00000003c0)='/dev/loop#\x00', 0x8, 0x0) r0 = syz_open_dev$sndseq(&(0x7f00000001c0)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r0, 0x4040534e, &(0x7f000019ffe9)={0xc1}) r1 = accept(0xffffffffffffffff, &(0x7f0000000080)=@can, &(0x7f0000000180)=0x80) ioctl$sock_ipx_SIOCAIPXPRISLT(r1, 0x89e1, &(0x7f0000000280)=0x3f) ioctl$sock_inet_SIOCRTMSG(r1, 0x890d, &(0x7f0000000200)={0x80, {0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x19}}, {0x2, 0x4e21, @local={0xac, 0x14, 0x14, 0xaa}}, {0x2, 0x4e23}, 0x0, 0x7, 0x1, 0x0, 0x9, 0x0, 0x0, 0x0, 0xfffffffffffffff7}) getsockopt$inet_sctp_SCTP_PRIMARY_ADDR(0xffffffffffffffff, 0x84, 0x6, &(0x7f0000000ac0)={0x0, @in={{0x2, 0x4e20, @loopback=0x7f000001}}}, &(0x7f00000002c0)=0x84) setsockopt$inet_sctp_SCTP_ENABLE_STREAM_RESET(r1, 0x84, 0x76, &(0x7f0000000300)={r2, 0x1c9}, 0x8) clone(0x2000c100, &(0x7f0000000800)="97bb77038add5df9e9d4f9783b82c55fe59e5c0acdbcfc9bcf92ac0e1f1f3c1959c1d25dfabf3849336c7c85be174d7765b47e113632aea54b87e4d3f2c1db09e6aa4040b43d17308fb7e62e808067da2fff3cfd8e4c038c814bbfc6bc49d8ebc8671d8297e2d34dc61f2d194d2dbb8f59b4c853e0714d3d4bb29d1243fac01c86c8c4dd38daedab3c6ad73a72d3f6dd2684aa82e5285eb82452c9848b7beb8bc513ba8c8973cad0bd5926604846b7f5d0397b", &(0x7f00000008c0), &(0x7f0000000900), &(0x7f0000000940)="ed6c04412e782fe395f084741e3d9fe469aebde09acc8f8d8d84d1f00f5573b09acba487077ebb904cb1f3fed55f59d677ce24bbd2a7506df8e1e0d0fc709cb8c9f4ab2aeeeebc5ef879742c1f7628f1862c88b5b0da89acbf43ef12e4839405b6a3430d296fea06d2f3a8356c57ec991e") ioctl$SNDRV_SEQ_IOCTL_SUBSCRIBE_PORT(r0, 0x40505330, &(0x7f0000ec6fb0)={{}, {0x80}}) getsockopt$netrom_NETROM_T1(r1, 0x103, 0x1, &(0x7f0000000000), &(0x7f0000000380)=0x4) syz_open_dev$adsp(&(0x7f0000000600)='/dev/adsp#\x00', 0x100000000, 0x80000) rt_sigprocmask(0x3d738072cd0f41ac, &(0x7f0000000cc0)={0x7}, &(0x7f0000000d00), 0x8) clone(0x40000000, &(0x7f0000000500)="67cdd9994c47c31d325b069924a7064c157c2ec0b5b5dca2feeb7dabef3b7af0d02d559e293faa759f2b3cb12aea360c2d", &(0x7f0000000580), &(0x7f00000005c0), &(0x7f0000000a00)="29859fdda9a119e54a27f9ec76b4d63a16dc5bbdd38c2fda0e5f4d8f830cd987ec7d3ffc66cf3db8820968fd89a1fba8fe6352a29a27f3b000bcdf238f2c04b358fc831025180e0be313da41de6366c94a1a0f86aaffdf2c039111b55275c054e14819a827fe809225249a01944263a2aec15f64e752e35892b1b8e7ef1e0e9115") ioctl$SNDRV_SEQ_IOCTL_DELETE_PORT(r0, 0x40a85321, &(0x7f0000000b80)={{0x4, 0x8}, 'port0\x00', 0x80, 0x0, 0x10000, 0x6, 0x2, 0x80, 0x8, 0x0, 0x0, 0x3dec00}) getsockopt$inet_sctp_SCTP_SOCKOPT_PEELOFF(0xffffffffffffffff, 0x84, 0x66, &(0x7f0000000c40)={r2, 0x6}, &(0x7f0000000c80)=0x8) clock_settime(0x7, &(0x7f0000000740)={0x77359400}) ioctl$SNDRV_SEQ_IOCTL_CLIENT_ID(r0, 0x80045301, &(0x7f0000000340)) r3 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer2\x00', 0x0, 0x0) openat$sequencer2(0xffffffffffffff9c, &(0x7f00000006c0)='/dev/sequencer2\x00', 0x222081, 0x0) ioctl$RNDADDENTROPY(0xffffffffffffffff, 0x40085203, &(0x7f0000000100)=ANY=[@ANYPTR=&(0x7f0000000680)=ANY=[@ANYPTR64=&(0x7f0000000640)=ANY=[@ANYPTR, @ANYPTR]]]) setsockopt$inet_sctp_SCTP_DEFAULT_SEND_PARAM(r3, 0x84, 0xa, &(0x7f0000000140)={0x5, 0x100000001, 0x0, 0x8, 0x0, 0x7, 0x401, 0x1f, r2}, 0x20) 2018/03/31 09:15:20 executing program 7 (fault-call:24 fault-nth:2): perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f000031f000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getpid() r0 = syz_open_dev$vcsn(&(0x7f0000000040)='/dev/vcs#\x00', 0x0, 0x20000) ioctl$GIO_CMAP(r0, 0x4b70, &(0x7f0000000080)) r1 = socket$alg(0x26, 0x5, 0x0) ioctl$sock_SIOCGIFBR(r1, 0x8940, &(0x7f0000000040)=@get={0x1, &(0x7f0000000400)=""/242, 0x100000000}) bind$alg(r1, &(0x7f0000000080)={0x26, 'aead\x00', 0x0, 0x0, 'generic-gcm-aesni\x00'}, 0x58) syz_open_dev$sndmidi(&(0x7f0000000100)='/dev/snd/midiC#D#\x00', 0xfd, 0x0) bind(0xffffffffffffffff, &(0x7f0000000140)=@llc={0x1a, 0x33a, 0x7, 0x80, 0x5, 0x4, @remote={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xbb}}, 0x80) r2 = syz_init_net_socket$nfc_llcp(0x27, 0x1, 0x1) setsockopt$nfc_llcp_NFC_LLCP_MIUX(r2, 0x118, 0x15, &(0x7f0000000000), 0x4) r3 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/cuse\x00', 0x103002, 0x0) futimesat(r3, &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)={{0x0, 0x7530}}) r4 = syz_open_dev$vcsa(&(0x7f00000001c0)='/dev/vcsa#\x00', 0x2, 0x4020ff) sendto$inet6(r4, &(0x7f0000000bc0)="36251e313e0743fc195a1a198a14434e8a0a00b3f452a3b5644e336ec712a16310c9aecc4e3097bc666a8882128a73c368ce731e9fbf3fe18fa52d00", 0x3c, 0x20000000, &(0x7f0000000c40)={0xa, 0x0, 0x6, @dev={0xfe, 0x80, [], 0x19}, 0x1f}, 0x1c) accept$alg(r0, 0x0, 0x0) sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f0000000000)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x8}, 0xb4fcd35419244434, &(0x7f00004ca000)={&(0x7f0000000300)=ANY=[], 0x1a1}, 0x1}, 0x0) syz_fuseblk_mount(&(0x7f0000001380)='./file0\x00', &(0x7f00000013c0)='./file0\x00', 0xf000, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0xb21, 0x0) socket(0x1e, 0x3, 0x0) socket(0x1e, 0x0, 0x0) ptrace$PTRACE_SECCOMP_GET_FILTER(0x420c, 0x0, 0x0, &(0x7f0000000380)=""/113) sched_yield() ioctl$TUNGETIFF(r4, 0x800454d2, &(0x7f0000000140)) ioctl$KIOCSOUND(r4, 0x4b2f, 0xfffffffffffffb74) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000447000)='./file0\x00', &(0x7f00000e1000)='msdos\x00', 0x0, &(0x7f000097bfff)) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000580)='./cgroup/syz0\x00', 0x1ff) syz_open_dev$audion(&(0x7f0000000280)='/dev/audio#\x00', 0x7be, 0x0) 2018/03/31 09:15:20 executing program 1: perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f000031f000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) prctl$void(0x0) getpid() r0 = syz_open_dev$vcsn(&(0x7f0000000040)='/dev/vcs#\x00', 0x400, 0x20000) r1 = socket$alg(0x26, 0x5, 0x0) ioctl$sock_SIOCGIFBR(r1, 0x8940, &(0x7f0000000040)=@get={0x1, &(0x7f0000000400)=""/242, 0x100000000}) bind$alg(r1, &(0x7f0000000080)={0x26, 'aead\x00', 0x0, 0x0, 'generic-gcm-aesni\x00'}, 0x58) syz_open_dev$audion(&(0x7f00000002c0)='/dev/audio#\x00', 0x400, 0x420000) r2 = syz_open_dev$sndmidi(&(0x7f0000000100)='/dev/snd/midiC#D#\x00', 0xfd, 0x0) bind(r2, &(0x7f0000000140)=@llc={0x1a, 0x33a, 0x7, 0x80, 0x0, 0x4, @remote={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xbb}}, 0x80) r3 = syz_init_net_socket$nfc_llcp(0x27, 0x1, 0x1) setsockopt$nfc_llcp_NFC_LLCP_MIUX(r3, 0x118, 0x15, &(0x7f0000000000), 0x4) r4 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/cuse\x00', 0x103002, 0x0) futimesat(r4, &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)={{0x0, 0x7530}}) r5 = syz_open_dev$vcsa(&(0x7f00000001c0)='/dev/vcsa#\x00', 0x2, 0x4020ff) sendto$inet6(r5, &(0x7f0000000bc0), 0x0, 0x20000000, &(0x7f0000000c40)={0xa, 0x4e20, 0x6, @dev={0xfe, 0x80, [], 0x19}, 0x1f}, 0x1c) sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f0000000000)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x8}, 0xb4fcd35419244434, &(0x7f00004ca000)={&(0x7f0000000300)=ANY=[], 0x1a1}, 0x1}, 0x0) syz_fuseblk_mount(&(0x7f0000001380)='./file0\x00', &(0x7f00000013c0)='./file0\x00', 0xf000, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0xb21, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x40, &(0x7f00000005c0)=@nat={'nat\x00', 0x1b, 0x5, 0x4e8, 0x288, 0x380, 0xffffffff, 0x288, 0x160, 0x450, 0x450, 0xffffffff, 0x450, 0x450, 0x5, &(0x7f0000000200), {[{{@ip={@loopback=0x7f000001, @dev={0xac, 0x14, 0x14, 0xb}, 0xffffff00, 0xff000000, '\x00', 'dummy0\x00', {0xff}, {0xff}, 0x0, 0x1}, 0x0, 0x128, 0x160, 0x0, {}, [@common=@set={0x40, 'set\x00', 0x0, {{0xfffffffffffffffd, [0x8, 0x4, 0x3356, 0x5, 0x37c, 0x8], 0x200, 0xfffffffffffffc01, 0xfffffffffffffe00}}}, @common=@inet=@set4={0x50, 'set\x00', 0x4, {{0x101, 0x1, 0x2}, {0x3, 0xcfc7}, {0x3d66, 0x6}, 0x9}}]}, @REDIRECT={0x38, 'REDIRECT\x00', 0x0, {0x1, {0xd, @rand_addr=0x3ff, @dev={0xac, 0x14, 0x14, 0xb}, @icmp_id=0x66, @icmp_id=0x64}}}}, {{@ip={@empty, @loopback=0x7f000001, 0xff, 0xff, 'bcsh0\x00', 'bcsh0\x00', {0xff}, {0xff}, 0xa, 0x3}, 0x0, 0xf0, 0x128, 0x0, {}, [@common=@inet=@ecn={0x28, 'ecn\x00', 0x0, {0x30, 0x10, 0xffff}}, @common=@ah={0x30, 'ah\x00', 0x0, {0x3, 0x7fffffff, 0x1}}]}, @DNAT0={0x38, 'DNAT\x00', 0x0, {0x1, {0x10, @multicast1=0xe0000001, @multicast1=0xe0000001, @gre_key=0xe000000000000000, @gre_key=0x10000}}}}, {{@uncond, 0x0, 0xc0, 0xf8, 0x0, {}, [@common=@icmp={0x28, 'icmp\x00', 0x0, {0x1f, 0x5, 0x2, 0x1}}]}, @REDIRECT={0x38, 'REDIRECT\x00', 0x0, {0x1, {0x8, @remote={0xac, 0x14, 0x14, 0xbb}, @remote={0xac, 0x14, 0x14, 0xbb}, @gre_key=0x80000000, @port=0x4e24}}}}, {{@uncond, 0x0, 0x98, 0xd0}, @REDIRECT={0x38, 'REDIRECT\x00', 0x0, {0x1, {0x4, @rand_addr=0x1, @remote={0xac, 0x14, 0x14, 0xbb}, @gre_key=0x4, @port=0x4e20}}}}], {{[], 0x0, 0x70, 0x98}, {0x28, '\x00', 0x0, 0xfffffffffffffffe}}}}, 0x548) socket(0x1e, 0x3, 0x0) ptrace$PTRACE_SECCOMP_GET_FILTER(0x420c, 0x0, 0x0, &(0x7f0000000380)=""/113) sched_yield() ioctl$TUNGETIFF(r5, 0x800454d2, &(0x7f0000000140)) ioctl$KIOCSOUND(r5, 0x4b2f, 0xfffffffffffffb74) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x20, 0x9b}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000447000)='./file0\x00', &(0x7f00000e1000)='msdos\x00', 0x0, &(0x7f000097bfff)) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000580)='./cgroup/syz0\x00', 0x1ff) syz_open_dev$audion(&(0x7f0000000280)='/dev/audio#\x00', 0x7be, 0x0) fcntl$getown(0xffffffffffffffff, 0x9) 2018/03/31 09:15:20 executing program 3: r0 = syz_open_dev$random(&(0x7f00000001c0)='/dev/random\x00', 0x0, 0x800) r1 = syz_open_dev$loop(&(0x7f0000308000)='/dev/loop#\x00', 0x0, 0x0) ioctl$LOOP_SET_STATUS(r1, 0xc0481273, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "3900ea631d00000000020000010000009f00000023f7b7d65f90b0e6330ee739b319d8f6aa6bd58d1443474482e85040fb4947ebb55bd19f335b5bffff0001f3", "cfa430745a540dc1c149b7b81579f6a41c51f7d51933223e82ab867dac761faf"}) write(0xffffffffffffffff, &(0x7f00000001c0), 0x0) setsockopt$inet_sctp6_SCTP_RECVNXTINFO(0xffffffffffffffff, 0x84, 0x21, &(0x7f00000003c0)=0x200, 0x4) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f00000000c0)=0x0) getsockopt$netrom_NETROM_T4(0xffffffffffffffff, 0x103, 0x6, &(0x7f0000000300)=0x8, &(0x7f0000000340)=0x4) getpid() sched_setparam(r2, &(0x7f0000000400)=0x401) syz_open_dev$loop(&(0x7f0000ca9ff5)='/dev/loop#\x00', 0x0, 0x82) r3 = memfd_create(&(0x7f0000614000)="74086e750000000000000000008c00", 0x0) pwritev(r3, &(0x7f0000f50f90)=[{&(0x7f0000000040)="aa", 0x1}], 0x1, 0x0) fcntl$getownex(r1, 0x10, &(0x7f0000000240)={0x0, 0x0}) r5 = syz_open_procfs(r4, &(0x7f0000000280)='stat\x00') epoll_ctl$EPOLL_CTL_MOD(r3, 0x3, r0, &(0x7f00000002c0)={0x20000010}) accept4$inet6(r3, &(0x7f0000000100)={0x0, 0x0, 0x0, @mcast1}, &(0x7f0000000140)=0x1c, 0x7fd) getsockopt$inet_IP_IPSEC_POLICY(r3, 0x0, 0x10, &(0x7f0000000940)={{{@in6=@local, @in6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@loopback}, 0x0, @in=@local}}, &(0x7f0000000780)=0xe8) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f00000007c0)={0x0, 0x0, 0x0}, &(0x7f0000000540)=0xc) fchown(r3, r6, r9) r10 = syz_open_dev$binder(&(0x7f0000000100)='/dev/binder#\x00', 0xffffffffffffffff, 0x806) ioctl$BINDER_SET_CONTEXT_MGR(r5, 0x40046207, 0x0) r11 = mmap$binder(&(0x7f000000c000/0x2000)=nil, 0x2000, 0x0, 0x12, r10, 0x0) ioctl$BINDER_WRITE_READ(r10, 0xc0306201, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000), 0x0, 0x0, &(0x7f0000011f9d)}) getsockopt$inet_sctp6_SCTP_AUTO_ASCONF(0xffffffffffffffff, 0x84, 0x1e, &(0x7f0000000140), &(0x7f0000000180)=0x4) ioctl$BINDER_WRITE_READ(r10, 0xc0306201, &(0x7f0000000340)={0x8, 0x0, &(0x7f0000000440)=ANY=[@ANYPTR64=&(0x7f0000000800)=ANY=[@ANYRES32=r10, @ANYBLOB="f158418148f3153a87788eae268a703e0fbf80b927647c0de683f64f515a6668705e48ef27df2ff800b3d051c7f1f5aaf5a64071912e86ba7d1bfed879003f6a1b54ae672b61e84de45279bb012feb45a1caa5e08ec376d7587e7239b12aafb19ceb34e545c7534adf053ef777a3270dd4764290e4181ee589cc065834bbc67608155953feca2062c6136775465b0338d70b6d9047abb2e4aa738621546b061dfbeda75ac7cee16bb894a5f1a03ca4a606d6fb211ba64bc079b68c2798b6a6b06cbc25dcb3bab902b8df0f3cd0cbe2c89278fc5d93dbeae4978005c838bda4e2ad02fd89b9e6d4", @ANYPTR=&(0x7f0000000380)=ANY=[@ANYPTR64], @ANYRES64=r11, @ANYRES32, @ANYPTR64=&(0x7f0000000480)=ANY=[@ANYBLOB, @ANYPTR64], @ANYRES32=r7, @ANYPTR64=&(0x7f00000004c0)=ANY=[@ANYRES64=r0, @ANYRES64, @ANYRES16=r4, @ANYRES64, @ANYRES16=r8]]], 0x0, 0x0, &(0x7f0000000240)}) write(0xffffffffffffffff, &(0x7f0000000300)="8be25f5790f664f32509e40d6f879d5add7e2d359c9a19afb750a2d25352875d187d4118c99a2d5c6db433c277cc7d345b87a34f1b417033d367cb0cfd6a25633f77aafb17e99c33cb65352c901ae75176f07bb0a4bb5ebff3d87e", 0x5b) r12 = ioctl$LOOP_CTL_GET_FREE(r3, 0x4c82) ioctl$LOOP_CTL_REMOVE(r5, 0x4c81, r12) openat$cgroup(0xffffffffffffff9c, &(0x7f0000000000)='syz0\x00', 0x200002, 0x0) sched_setaffinity(r4, 0x6, &(0x7f0000000700)=0x7) 2018/03/31 09:15:20 executing program 4: perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f000031f000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) prctl$void(0x0) getpid() r0 = syz_open_dev$vcsn(&(0x7f0000000040)='/dev/vcs#\x00', 0x0, 0x20000) ioctl$GIO_CMAP(r0, 0x4b70, &(0x7f0000000080)) r1 = socket$alg(0x26, 0x5, 0x0) ioctl$sock_SIOCGIFBR(0xffffffffffffffff, 0x8940, &(0x7f0000000040)=@get={0x1, &(0x7f0000000400)=""/242, 0x100000000}) bind$alg(r1, &(0x7f0000000080)={0x26, 'aead\x00', 0x0, 0x0, 'generic-gcm-aesni\x00'}, 0x58) syz_open_dev$sndmidi(&(0x7f0000000100)='/dev/snd/midiC#D#\x00', 0xfd, 0x0) bind(0xffffffffffffffff, &(0x7f0000000140)=@llc={0x1a, 0x33a, 0x7, 0x80, 0x0, 0x4, @remote={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xbb}}, 0x80) r2 = syz_init_net_socket$nfc_llcp(0x27, 0x1, 0x1) setsockopt$nfc_llcp_NFC_LLCP_MIUX(r2, 0x118, 0x15, &(0x7f0000000000), 0x4) lsetxattr(&(0x7f0000000200)='./file0\x00', &(0x7f0000000240)=@known='system.sockprotoname\x00', &(0x7f0000000280)='generic-gcm-aesni\x00', 0x12, 0x3) r3 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/cuse\x00', 0x103002, 0x0) futimesat(r3, &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)={{0x0, 0x7530}}) r4 = syz_open_dev$vcsa(&(0x7f00000001c0)='/dev/vcsa#\x00', 0x2, 0x0) sendto$inet6(r4, &(0x7f0000000bc0), 0x0, 0x20000000, &(0x7f0000000c40)={0xa, 0x4e20, 0x0, @dev={0xfe, 0x80, [], 0x19}, 0x1f}, 0x1c) accept$alg(r0, 0x0, 0x0) sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f0000000000)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x8}, 0xb4fcd35419244434, &(0x7f00004ca000)={&(0x7f0000000300)=ANY=[], 0x1a1}, 0x1}, 0x0) syz_fuseblk_mount(&(0x7f0000001380)='./file0\x00', &(0x7f00000013c0)='./file0\x00', 0xf000, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0xb21, 0x0) socket(0x1e, 0x3, 0x0) socket(0x1e, 0x0, 0x0) ptrace$PTRACE_SECCOMP_GET_FILTER(0x420c, 0x0, 0x0, &(0x7f0000000380)=""/113) sched_yield() ioctl$TUNGETIFF(r4, 0x800454d2, &(0x7f0000000140)) ioctl$KIOCSOUND(r4, 0x4b2f, 0xfffffffffffffb74) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x20, 0x9b}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000447000)='./file0\x00', &(0x7f00000e1000)='msdos\x00', 0x0, &(0x7f000097bfff)) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000580)='./cgroup/syz0\x00', 0x1ff) 2018/03/31 09:15:20 executing program 6: perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f000031f000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) prctl$void(0x0) getpid() r0 = syz_open_dev$vcsn(&(0x7f0000000040)='/dev/vcs#\x00', 0x0, 0x20000) ioctl$GIO_CMAP(r0, 0x4b70, &(0x7f0000000080)) r1 = socket$alg(0x26, 0x5, 0x0) ioctl$sock_SIOCGIFBR(0xffffffffffffffff, 0x8940, &(0x7f0000000040)=@get={0x1, &(0x7f0000000400)=""/242, 0x100000000}) bind$alg(r1, &(0x7f0000000080)={0x26, 'aead\x00', 0x0, 0x0, 'generic-gcm-aesni\x00'}, 0x58) syz_open_dev$sndmidi(&(0x7f0000000100)='/dev/snd/midiC#D#\x00', 0xfd, 0x0) bind(0xffffffffffffffff, &(0x7f0000000140)=@llc={0x1a, 0x33a, 0x7, 0x80, 0x0, 0x4, @remote={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xbb}}, 0x80) r2 = syz_init_net_socket$nfc_llcp(0x27, 0x1, 0x1) setsockopt$nfc_llcp_NFC_LLCP_MIUX(r2, 0x118, 0x15, &(0x7f0000000000), 0x4) r3 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/cuse\x00', 0x103002, 0x0) futimesat(r3, &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)={{0x0, 0x7530}}) r4 = syz_open_dev$vcsa(&(0x7f00000001c0)='/dev/vcsa#\x00', 0x2, 0x0) sendto$inet6(0xffffffffffffffff, &(0x7f0000000bc0), 0x0, 0x20000000, &(0x7f0000000c40)={0xa, 0x4e20, 0x0, @dev={0xfe, 0x80, [], 0x19}, 0x1f}, 0x1c) accept$alg(r0, 0x0, 0x0) sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f0000000000)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x8}, 0xb4fcd35419244434, &(0x7f00004ca000)={&(0x7f0000000300)=ANY=[], 0x1a1}, 0x1}, 0x0) syz_fuseblk_mount(&(0x7f0000001380)='./file0\x00', &(0x7f00000013c0)='./file0\x00', 0xf000, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0xb21, 0x0) socket(0x1e, 0x3, 0x0) socket(0x1e, 0x0, 0x0) ptrace$PTRACE_SECCOMP_GET_FILTER(0x420c, 0x0, 0x0, &(0x7f0000000380)=""/113) sched_yield() ioctl$TUNGETIFF(r4, 0x800454d2, &(0x7f0000000140)) ioctl$KIOCSOUND(r4, 0x4b2f, 0xfffffffffffffb74) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x20, 0x9b}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000447000)='./file0\x00', &(0x7f00000e1000)='msdos\x00', 0x0, &(0x7f000097bfff)) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000580)='./cgroup/syz0\x00', 0x1ff) 2018/03/31 09:15:20 executing program 0: perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f000031f000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) prctl$void(0x0) r0 = syz_open_dev$vcsn(&(0x7f0000000040)='/dev/vcs#\x00', 0x0, 0x20000) socket$alg(0x26, 0x5, 0x0) ioctl$sock_SIOCGIFBR(0xffffffffffffffff, 0x8940, &(0x7f0000000040)=@get={0x1, &(0x7f0000000400)=""/242, 0x100000000}) bind$alg(0xffffffffffffffff, &(0x7f0000000080)={0x26, 'aead\x00', 0x0, 0x0, 'generic-gcm-aesni\x00'}, 0x58) r1 = syz_open_dev$sndmidi(&(0x7f0000000100)='/dev/snd/midiC#D#\x00', 0xfd, 0x0) syz_open_dev$sg(&(0x7f0000000280)='/dev/sg#\x00', 0x8, 0x1) bind(0xffffffffffffffff, &(0x7f00000002c0)=@llc={0x1a, 0x33a, 0x7, 0x80, 0x0, 0x4, @remote={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xbb}}, 0x80) r2 = syz_init_net_socket$nfc_llcp(0x27, 0x1, 0x1) setsockopt$nfc_llcp_NFC_LLCP_MIUX(r2, 0x118, 0x15, &(0x7f0000000000), 0x4) r3 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/cuse\x00', 0x103002, 0x0) setsockopt$netlink_NETLINK_TX_RING(r1, 0x10e, 0x7, &(0x7f0000000240)={0x3, 0x7, 0x4, 0x9}, 0x10) futimesat(r3, &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)={{0x0, 0x7530}}) r4 = syz_open_dev$vcsa(&(0x7f00000001c0)='/dev/vcsa#\x00', 0x2, 0x0) sendto$inet6(r4, &(0x7f0000000bc0)="36251e313e0743fc195a1a198a14434e8a0a00b3f452a3b5644e336ec712a16310c9aecc4e3097bc666a8882128a73c368ce731e9fbf3fe18fa52d00c34ac2e57c1c4569cfbd6a621c6dfbc032121aed", 0x50, 0x20000000, &(0x7f0000000c40)={0xa, 0x4e20, 0x6, @dev={0xfe, 0x80, [], 0x19}, 0x1f}, 0x1c) unlinkat(0xffffffffffffffff, &(0x7f0000000200)='./file1\x00', 0x200) accept$alg(r0, 0x0, 0x0) sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f0000000000)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x8}, 0xb4fcd35419244434, &(0x7f00004ca000)={&(0x7f0000000300)=ANY=[], 0x1a1}, 0x1}, 0x0) syz_fuseblk_mount(&(0x7f0000001380)='./file0\x00', &(0x7f00000013c0)='./file0\x00', 0xf000, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0xb21, 0x0) socket(0x1e, 0x3, 0x0) socket(0x1e, 0x0, 0x0) ptrace$PTRACE_SECCOMP_GET_FILTER(0x420c, 0x0, 0x20000000000000, &(0x7f0000000380)=""/113) sched_yield() ioctl$TUNGETIFF(r4, 0x800454d2, &(0x7f0000000140)) ioctl$KIOCSOUND(r4, 0x4b2f, 0xfffffffffffffb74) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x20, 0x9b}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000447000)='./file0\x00', &(0x7f00000e1000)='msdos\x00', 0x0, &(0x7f000097bfff)) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000580)='./cgroup/syz0\x00', 0x1ff) 2018/03/31 09:15:20 executing program 5: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f000031f000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) prctl$void(0x0) getpid() r0 = syz_open_dev$vcsn(&(0x7f0000000040)='/dev/vcs#\x00', 0x0, 0x20000) ioctl$GIO_CMAP(r0, 0x4b70, &(0x7f0000000080)) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000080)={0x26, 'aead\x00', 0x0, 0x0, 'generic-gcm-aesni\x00'}, 0x58) getsockopt$inet_sctp6_SCTP_STATUS(r0, 0x84, 0xe, &(0x7f00000002c0)={0x0, 0xc8, 0x10000, 0x0, 0x200, 0x6, 0x2, 0x7, {0x0, @in={{0x2, 0x4e24, @loopback=0x7f000001}}, 0x4, 0x0, 0x5, 0x3ff}}, &(0x7f0000000240)=0xb0) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDRS(r0, 0x84, 0x6c, &(0x7f0000000400)=ANY=[@ANYRES32=r2, @ANYBLOB="d10000009e815c9bdb5e84346983a741c8beef22bd68e5880f2ff656435c443fd00163001c4faee71ca7df0e62e0535abb1c376756106c1357cfa3f3a69ece2d61692a4568daa2550df6d74df9980f196771844b70e9bb5598c3f617d0b4a1cccbb8ff3f4278d1419884090c85f7053b2c4f40f95e413479089f222db8fe6d2f8ca00c2d48234fd35f2f8faf0dcf8c4c6a0d6a859b68440e1df5b3e6eb23385d66b1d6911ae73ca5899d1ec502bb58b289e75a631ed690604e88af3069127daf4bdc31285bc662da846fa1062e9e56e8"], &(0x7f0000000500)=0xd9) syz_open_dev$sndmidi(&(0x7f0000000100)='/dev/snd/midiC#D#\x00', 0xfd, 0x0) bind(0xffffffffffffffff, &(0x7f0000000140)=@llc={0x1a, 0x33a, 0x7, 0x80, 0x5, 0x4, @remote={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xbb}}, 0x80) r3 = syz_init_net_socket$nfc_llcp(0x27, 0x1, 0x1) setsockopt$nfc_llcp_NFC_LLCP_MIUX(r3, 0x118, 0x15, &(0x7f0000000000), 0x4) syz_open_dev$sndmidi(&(0x7f0000000200)='/dev/snd/midiC#D#\x00', 0xfffffffffffffff7, 0x80001) r4 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/cuse\x00', 0x103002, 0x0) futimesat(r4, &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)={{0x0, 0x7530}}) r5 = syz_open_dev$vcsa(&(0x7f00000001c0)='/dev/vcsa#\x00', 0x2, 0x4020ff) sendto$inet6(0xffffffffffffffff, &(0x7f0000000bc0)="36251e313e0743fc195a1a198a14434e8a0a00b3f452a3b5644e336ec712a16310c9aecc4e3097bc666a8882128a73c368ce731e9fbf3fe18fa52d", 0x3b, 0x20000000, &(0x7f0000000c40)={0xa, 0x4e20, 0x6, @dev={0xfe, 0x80, [], 0x19}, 0x1f}, 0x1c) accept$alg(r0, 0x0, 0x0) sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f0000000000)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x8}, 0xb4fcd35419244434, &(0x7f00004ca000)={&(0x7f0000000300)=ANY=[], 0x1a1}, 0x1}, 0x0) syz_fuseblk_mount(&(0x7f0000001380)='./file0\x00', &(0x7f00000013c0)='./file0\x00', 0xf000, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0xb21, 0x0) socket(0x1e, 0x3, 0x0) socket(0x1e, 0x0, 0x0) ptrace$PTRACE_SECCOMP_GET_FILTER(0x420c, 0x0, 0x0, &(0x7f0000000380)=""/113) sched_yield() ioctl$TUNGETIFF(r5, 0x800454d2, &(0x7f0000000140)) ioctl$KIOCSOUND(r5, 0x4b2f, 0xfffffffffffffb74) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x20, 0x9b}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000447000)='./file0\x00', &(0x7f00000e1000)='msdos\x00', 0x0, &(0x7f000097bfff)) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000580)='./cgroup/syz0\x00', 0x1ff) syz_open_dev$audion(&(0x7f0000000280)='/dev/audio#\x00', 0x100000001, 0x4a) [ 313.188597] binder: 30943:30945 unknown command 536872960 [ 313.205713] FAT-fs (loop199): unable to read boot sector [ 313.215913] binder: 30943:30945 ioctl c0306201 20000340 returned -22 [ 313.219645] FAT-fs (loop199): unable to read boot sector [ 313.227419] FAULT_INJECTION: forcing a failure. [ 313.227419] name failslab, interval 1, probability 0, space 0, times 0 [ 313.239529] CPU: 0 PID: 30946 Comm: syz-executor7 Not tainted 4.16.0-rc7+ #8 [ 313.246711] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 313.256054] Call Trace: [ 313.258629] dump_stack+0x194/0x24d [ 313.262246] ? arch_local_irq_restore+0x53/0x53 [ 313.266912] should_fail+0x8c0/0xa40 [ 313.270611] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 313.275700] ? __kmalloc_track_caller+0x15e/0x760 [ 313.280528] ? strndup_user+0x62/0xb0 [ 313.284310] ? SyS_mount+0x6b/0x120 [ 313.287926] ? trace_hardirqs_off+0x10/0x10 [ 313.292233] ? proc_fail_nth_write+0x9b/0x1d0 [ 313.296724] ? find_held_lock+0x35/0x1d0 [ 313.300790] ? check_same_owner+0x320/0x320 [ 313.305096] ? lock_release+0xa40/0xa40 [ 313.309082] ? rcu_note_context_switch+0x710/0x710 [ 313.314018] should_failslab+0xec/0x120 [ 313.317981] kmem_cache_alloc_trace+0x4b/0x740 [ 313.322548] ? kasan_check_write+0x14/0x20 [ 313.326767] ? _copy_from_user+0x99/0x110 [ 313.330901] copy_mount_options+0x5f/0x2e0 [ 313.335124] SyS_mount+0x87/0x120 [ 313.338562] ? copy_mnt_ns+0xb30/0xb30 [ 313.342434] do_syscall_64+0x281/0x940 [ 313.346306] ? vmalloc_sync_all+0x30/0x30 [ 313.350438] ? _raw_spin_unlock_irq+0x27/0x70 [ 313.354918] ? finish_task_switch+0x1c1/0x7e0 [ 313.359395] ? syscall_return_slowpath+0x550/0x550 [ 313.364307] ? syscall_return_slowpath+0x2ac/0x550 [ 313.369222] ? prepare_exit_to_usermode+0x350/0x350 [ 313.374223] ? entry_SYSCALL_64_after_hwframe+0x52/0xb7 [ 313.379574] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 313.384405] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 313.389575] RIP: 0033:0x454e79 [ 313.392747] RSP: 002b:00007f37fba8ec68 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 313.400439] RAX: ffffffffffffffda RBX: 00007f37fba8f6d4 RCX: 0000000000454e79 [ 313.407689] RDX: 00000000200e1000 RSI: 0000000020447000 RDI: 0000000020000000 [ 313.414941] RBP: 000000000072bea0 R08: 000000002097bfff R09: 0000000000000000 [ 313.422190] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000019 [ 313.429444] R13: 00000000000003fa R14: 00000000006f8010 R15: 0000000000000002 2018/03/31 09:15:20 executing program 6: perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f000031f000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) prctl$void(0x0) getpid() r0 = syz_open_dev$vcsn(&(0x7f0000000040)='/dev/vcs#\x00', 0x0, 0x20000) ioctl$GIO_CMAP(r0, 0x4b70, &(0x7f0000000080)) r1 = socket$alg(0x26, 0x5, 0x0) ioctl$sock_SIOCGIFBR(0xffffffffffffffff, 0x8940, &(0x7f0000000040)=@get={0x1, &(0x7f0000000400)=""/242, 0x100000000}) bind$alg(r1, &(0x7f0000000080)={0x26, 'aead\x00', 0x0, 0x0, 'generic-gcm-aesni\x00'}, 0x58) syz_open_dev$sndmidi(&(0x7f0000000100)='/dev/snd/midiC#D#\x00', 0xfd, 0x0) bind(0xffffffffffffffff, &(0x7f0000000140)=@llc={0x1a, 0x33a, 0x7, 0x80, 0x0, 0x4, @remote={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xbb}}, 0x80) r2 = syz_init_net_socket$nfc_llcp(0x27, 0x1, 0x1) setsockopt$nfc_llcp_NFC_LLCP_MIUX(r2, 0x118, 0x15, &(0x7f0000000000), 0x4) r3 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/cuse\x00', 0x103002, 0x0) futimesat(r3, &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)={{0x0, 0x7530}}) r4 = syz_open_dev$vcsa(&(0x7f00000001c0)='/dev/vcsa#\x00', 0x2, 0x0) sendto$inet6(0xffffffffffffffff, &(0x7f0000000bc0), 0x0, 0x20000000, &(0x7f0000000c40)={0xa, 0x4e20, 0x0, @dev={0xfe, 0x80, [], 0x19}, 0x1f}, 0x1c) accept$alg(r0, 0x0, 0x0) sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f0000000000)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x8}, 0xb4fcd35419244434, &(0x7f00004ca000)={&(0x7f0000000300)=ANY=[], 0x1a1}, 0x1}, 0x0) syz_fuseblk_mount(&(0x7f0000001380)='./file0\x00', &(0x7f00000013c0)='./file0\x00', 0xf000, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0xb21, 0x0) socket(0x1e, 0x3, 0x0) socket(0x1e, 0x0, 0x0) ptrace$PTRACE_SECCOMP_GET_FILTER(0x420c, 0x0, 0x0, &(0x7f0000000380)=""/113) sched_yield() ioctl$TUNGETIFF(r4, 0x800454d2, &(0x7f0000000140)) ioctl$KIOCSOUND(r4, 0x4b2f, 0xfffffffffffffb74) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x20, 0x9b}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000447000)='./file0\x00', &(0x7f00000e1000)='msdos\x00', 0x0, &(0x7f000097bfff)) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000580)='./cgroup/syz0\x00', 0x1ff) [ 313.448621] FAT-fs (loop199): unable to read boot sector [ 313.459614] FAT-fs (loop199): unable to read boot sector [ 313.460904] binder: 30943:30960 unknown command 536872960 [ 313.474800] FAT-fs (loop199): unable to read boot sector [ 313.482111] binder: 30943:30960 ioctl c0306201 20000340 returned -22 2018/03/31 09:15:20 executing program 7 (fault-call:24 fault-nth:3): perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f000031f000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getpid() r0 = syz_open_dev$vcsn(&(0x7f0000000040)='/dev/vcs#\x00', 0x0, 0x20000) ioctl$GIO_CMAP(r0, 0x4b70, &(0x7f0000000080)) r1 = socket$alg(0x26, 0x5, 0x0) ioctl$sock_SIOCGIFBR(r1, 0x8940, &(0x7f0000000040)=@get={0x1, &(0x7f0000000400)=""/242, 0x100000000}) bind$alg(r1, &(0x7f0000000080)={0x26, 'aead\x00', 0x0, 0x0, 'generic-gcm-aesni\x00'}, 0x58) syz_open_dev$sndmidi(&(0x7f0000000100)='/dev/snd/midiC#D#\x00', 0xfd, 0x0) bind(0xffffffffffffffff, &(0x7f0000000140)=@llc={0x1a, 0x33a, 0x7, 0x80, 0x5, 0x4, @remote={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xbb}}, 0x80) r2 = syz_init_net_socket$nfc_llcp(0x27, 0x1, 0x1) setsockopt$nfc_llcp_NFC_LLCP_MIUX(r2, 0x118, 0x15, &(0x7f0000000000), 0x4) r3 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/cuse\x00', 0x103002, 0x0) futimesat(r3, &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)={{0x0, 0x7530}}) r4 = syz_open_dev$vcsa(&(0x7f00000001c0)='/dev/vcsa#\x00', 0x2, 0x4020ff) sendto$inet6(r4, &(0x7f0000000bc0)="36251e313e0743fc195a1a198a14434e8a0a00b3f452a3b5644e336ec712a16310c9aecc4e3097bc666a8882128a73c368ce731e9fbf3fe18fa52d00", 0x3c, 0x20000000, &(0x7f0000000c40)={0xa, 0x0, 0x6, @dev={0xfe, 0x80, [], 0x19}, 0x1f}, 0x1c) accept$alg(r0, 0x0, 0x0) sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f0000000000)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x8}, 0xb4fcd35419244434, &(0x7f00004ca000)={&(0x7f0000000300)=ANY=[], 0x1a1}, 0x1}, 0x0) syz_fuseblk_mount(&(0x7f0000001380)='./file0\x00', &(0x7f00000013c0)='./file0\x00', 0xf000, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0xb21, 0x0) socket(0x1e, 0x3, 0x0) socket(0x1e, 0x0, 0x0) ptrace$PTRACE_SECCOMP_GET_FILTER(0x420c, 0x0, 0x0, &(0x7f0000000380)=""/113) sched_yield() ioctl$TUNGETIFF(r4, 0x800454d2, &(0x7f0000000140)) ioctl$KIOCSOUND(r4, 0x4b2f, 0xfffffffffffffb74) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000447000)='./file0\x00', &(0x7f00000e1000)='msdos\x00', 0x0, &(0x7f000097bfff)) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000580)='./cgroup/syz0\x00', 0x1ff) syz_open_dev$audion(&(0x7f0000000280)='/dev/audio#\x00', 0x7be, 0x0) 2018/03/31 09:15:20 executing program 6: perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f000031f000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) prctl$void(0x0) getpid() r0 = syz_open_dev$vcsn(&(0x7f0000000040)='/dev/vcs#\x00', 0x0, 0x20000) ioctl$GIO_CMAP(r0, 0x4b70, &(0x7f0000000080)) r1 = socket$alg(0x26, 0x5, 0x0) ioctl$sock_SIOCGIFBR(0xffffffffffffffff, 0x8940, &(0x7f0000000040)=@get={0x1, &(0x7f0000000400)=""/242, 0x100000000}) bind$alg(r1, &(0x7f0000000080)={0x26, 'aead\x00', 0x0, 0x0, 'generic-gcm-aesni\x00'}, 0x58) syz_open_dev$sndmidi(&(0x7f0000000100)='/dev/snd/midiC#D#\x00', 0xfd, 0x0) bind(0xffffffffffffffff, &(0x7f0000000140)=@llc={0x1a, 0x33a, 0x7, 0x80, 0x0, 0x4, @remote={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xbb}}, 0x80) r2 = syz_init_net_socket$nfc_llcp(0x27, 0x1, 0x1) setsockopt$nfc_llcp_NFC_LLCP_MIUX(r2, 0x118, 0x15, &(0x7f0000000000), 0x4) r3 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/cuse\x00', 0x103002, 0x0) futimesat(r3, &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)={{0x0, 0x7530}}) r4 = syz_open_dev$vcsa(&(0x7f00000001c0)='/dev/vcsa#\x00', 0x2, 0x0) sendto$inet6(r4, &(0x7f0000000bc0), 0x0, 0x0, &(0x7f0000000c40)={0xa, 0x4e20, 0x0, @dev={0xfe, 0x80, [], 0x19}, 0x1f}, 0x1c) accept$alg(r0, 0x0, 0x0) sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f0000000000)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x8}, 0xb4fcd35419244434, &(0x7f00004ca000)={&(0x7f0000000300)=ANY=[], 0x1a1}, 0x1}, 0x0) syz_fuseblk_mount(&(0x7f0000001380)='./file0\x00', &(0x7f00000013c0)='./file0\x00', 0xf000, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0xb21, 0x0) socket(0x1e, 0x3, 0x0) socket(0x1e, 0x0, 0x0) ptrace$PTRACE_SECCOMP_GET_FILTER(0x420c, 0x0, 0x0, &(0x7f0000000380)=""/113) sched_yield() ioctl$TUNGETIFF(r4, 0x800454d2, &(0x7f0000000140)) ioctl$KIOCSOUND(r4, 0x4b2f, 0xfffffffffffffb74) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x20, 0x9b}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000447000)='./file0\x00', &(0x7f00000e1000)='msdos\x00', 0x0, &(0x7f000097bfff)) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000580)='./cgroup/syz0\x00', 0x1ff) 2018/03/31 09:15:20 executing program 5: perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f000031f000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) prctl$void(0x0) getpid() r0 = syz_open_dev$vcsn(&(0x7f0000000040)='/dev/vcs#\x00', 0x0, 0x20000) ioctl$GIO_CMAP(r0, 0x4b70, &(0x7f0000000080)) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000080)={0x26, 'aead\x00', 0x0, 0x0, 'generic-gcm-aesni\x00'}, 0x58) syz_open_dev$sndmidi(&(0x7f0000000100)='/dev/snd/midiC#D#\x00', 0xfd, 0x0) bind(0xffffffffffffffff, &(0x7f0000000140)=@llc={0x1a, 0x33a, 0x7, 0x80, 0x5, 0x4, @remote={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xbb}}, 0x80) r2 = syz_init_net_socket$nfc_llcp(0x27, 0x1, 0x1) setsockopt$nfc_llcp_NFC_LLCP_MIUX(r2, 0x118, 0x15, &(0x7f0000000000), 0x4) r3 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/cuse\x00', 0x103002, 0x0) futimesat(r3, &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)={{0x0, 0x7530}}) r4 = syz_open_dev$vcsa(&(0x7f00000001c0)='/dev/vcsa#\x00', 0x2, 0x4020ff) sendto$inet6(0xffffffffffffffff, &(0x7f0000000bc0)="36251e313e0743fc195a1a198a14434e8a0a00b3f452a3b5644e336ec712a16310c9aecc4e3097bc666a8882128a73c368ce731e9fbf3fe18fa52d", 0x3b, 0x20000000, &(0x7f0000000c40)={0xa, 0x4e20, 0x6, @dev={0xfe, 0x80, [], 0x19}, 0x1f}, 0x1c) accept$alg(r0, 0x0, 0x0) sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f0000000000)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x8}, 0xb4fcd35419244434, &(0x7f00004ca000)={&(0x7f0000000300)=ANY=[], 0x1a1}, 0x1}, 0x0) syz_fuseblk_mount(&(0x7f0000001380)='./file0\x00', &(0x7f00000013c0)='./file0\x00', 0xf000, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0xb21, 0x0) sendmmsg$nfc_llcp(r2, &(0x7f0000003c00)=[{&(0x7f0000000200)={0x27, 0x0, 0x2, 0x7, 0xfffffffffffffff9, 0x6, "f9bfbe59554867d684243279566676f720e26125dd08f201bec70e512fcc24377eabbc212a07e563d088a6af79ee61884fab7ad5c4a01ed939607b4e8c3426", 0x3}, 0x60, &(0x7f0000000340)=[{&(0x7f00000002c0)="99762aef6746988e0338025bbd59135cc14951c0b0f782a5c01c3437d9306c5d37c46454866a6fcbc900bb750143b1fc78c646b556e35acf2c7aa5549c64634159b9e98d2e87f4b79e4ce9ac9d", 0x4d}, {&(0x7f0000000400)="5bf6c233e33ca724db059637f805654f86f3101dd31877494ce8bbc4dedb5c5754356c429433af5f5cde6bb5aff3736f845c5298cafc4dff4ba81c8f1355111bc6434d0fcaf09dfcfe4472fb615927ecdfc79b48236e5d77167e407fbaf9387ba20bb53f6b2838671977fde60d0d9c970712a54335e65604fe2957ab68f2d4583c83", 0x82}, {&(0x7f00000004c0)="24df3d8a41333fe8465b79e345b93fe43f2852463b72d0a6b39032f1d1f4e2c903de5ca25222bd382ef2a1d10092fc1de2e71a0aa0668eff6b15dcfcb58cdceefc3000cba19a892f0797e9a854561f8b863ab997a4d2791b", 0x58}], 0x3, &(0x7f00000005c0)={0x80, 0x1ff, 0x2ce, "511b81132e8bc373d90eb5189edeb102163ad374a02533b724137da007425e26dbdcbf1498c4439f82a84aa79c66965c4e0f4f3b43ad78e429298de40cd5d05fe39f1eb3e4cab563d74eb399d6ba058d5d2f9777c4ccd4db7ec6be24c9e861dec14c3055cbbe16cdce2459"}, 0x80, 0x4}, {&(0x7f0000000640)={0x27, 0x0, 0x1, 0x5, 0x6, 0x2d, "8f5a278ad4a7af7d3a323fe044362c40a334b14c618f9b3b2e82bad4311e89af9c3a0f0940ba6a266df67a5b2b5dd29661488c2ba17ec3b60be1490d0d6ce0", 0x22}, 0x60, &(0x7f0000000540)=[{&(0x7f00000006c0)="cd6584904755521c02d40fdf9125a8aa8c8aeecfa53bd8217a570a31f7dbc1acb7dcec2a0c164a66ec09375ea3bb5d9e99b009a83cb9dd4fa8a5b0d26dc297588061af21684fb0b0fe63086ccb45274b7ffcc59b72829c2610d549bbc54442c57ede759603b986d3b390ca18e7aff32a48590d19815b5b6564693aad103304c958ee721e69ceb6e98005f254c9921c12a7d066dce33ab70e633808663aa8d3ba91036280ff928d6d969f33b32d052becf751971707e245d227b4ed0547daa3a9ab96c34842e1ecadc054d0f4aec8e24ecff39a484707e782c017512d983a73f5b5358a46768e64d6", 0xe8}], 0x1, &(0x7f00000007c0)={0x110, 0x18f, 0x3, "cc96cab72acf83de2f1a1b09787ab6ed90a7856da6a49db794355858e984d9307527b34d69d259e892d3e567b3ebf41705b97f5c77334e92526b6c1e1bdd0a2c30f0e79400f5de1bd7c7a2aa793c4bda6c8a8dcbdd0d282658ec768b1d1edc8c9ffa9309376de0b17b8793af44c6d8bcb1970f03536a17bce12045dc687b4506bb66b9b0b1e52acaf9901b796a9ddd6f94f02cae871ee91d6736a07534a3a12b8aa638aa78dc10bc1aea2f8db7c0f9cba7287ca7e9e3f37b57f79abece0ee1c9b1441718dc57930ff8cc21f6fba600f8b6f16a50dd958d3d80659c50a5727963718d29ab7375860717b855780993373d4d7f2d1ffbbc937e51d0e595e0"}, 0x110, 0x40}, {&(0x7f0000000900)={0x27, 0x0, 0x1, 0x6, 0x4, 0xffffffff, "40c1385703a7d9e47dfccb6298fb1d35259105c3ee7ceb8c2d19b15c9503edfafe58c023a5ca6eadaabeb03d037f646a36ceafb49ea0e13eeb2944a7154ec1", 0x17}, 0x60, &(0x7f0000000ac0)=[{&(0x7f0000000980)="f68bdc7dbee1703bdf60afd9252fe0186d3b695639eb1ce85313bbc806de1517ce98cd4b51f2b2e23110f2c55c6c0f84c37a0338573347ed851545c29a701e77697e175809c5e4549f8e921204f0a0288fb9e086a11054e60aa1f0e342ec2ba8725acc8e9d7855e294597c5cfec8cf81db6906e5a352570c6561f19f7a84e15ee62bf384051f5c5cf96964e1f23e8f882ed87e9439b2c0a19b7655e567c8cf772582b351e5286e419ecf25483f6d85fe66b08acdcc94eb854541a528c62320137100704d305985806195912d06cc8a27b3719613a9a0e39ff53ce3325b28efe04263a3f8d32468c3532b07d705e3b7a5a8c0e3468b3c", 0xf6}, {&(0x7f0000001400)="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", 0x1000}, {&(0x7f0000000a80)="facb48", 0x3}], 0x3, 0x0, 0x0, 0x8000}, {&(0x7f0000000b00)={0x27, 0x1, 0x0, 0x4, 0xffffffff, 0x7, "2aa10ca32a43b4143873472dba827c213a885bc19c60b624664de186e8adc4d1332e0ecfdac4816496120e2c9a162643cae76cb649a38ff454b0118502269a", 0x24}, 0x60, &(0x7f00000011c0)=[{&(0x7f0000000c80)="47365f0b195fcf6266e34d71fd944e17d0589ebc994ea6409a236ec0f7acc248b7e10934a123a52c9ce17cb0b6b8537c7b97c5bde7e76cd78d50b4df3496620e12910ef091caf8c84facd1e2ca06b6f2f2e8b86f58ab1d0292e9f52e1dc5204d0f0aa206f9084611883599c797550218437d852565282ff482610e20420f2fc2898a5d4787c770da27c605ab55d3368274587f387b35efcc85fa3e4d08f1f4df0574d22c5f9704110f209069ac7cab1176b0e3dc9e589eea259c3e9fb87882860b671e1f405ecf1a3d5f68809774faa06dfddd7edd7536634ecb6bc572d50e3347131ad8b9bdd68f1f91a443f7e2898f", 0xf0}, {&(0x7f0000000d80)="9edef672f499da4b562108c889fb42b727c5b28789f1e0ce12bb74ca400952ea3fe7f8ef751672aad11684211dcd1df536becd261a34f202b45a47e5f8d6fd628fa916b9c7d48f088f80342333007c89a8ee929603b5150dc47be7b12cbf183cf5a4faab4ff18c11722501290bcac43c4c248cbce3d8978db11b50a508d49fc68a60115e8ae52a568294a2875b3d7c544dd25924c6457dd1f8d6c6e145b07165d2be39a9f83c9fab1187d940e6", 0xad}, {&(0x7f0000000e40)="f38a7a3ca4f692c29a3381a183cc76bde3f25fda5b3ff8b9e250b116fcca34975d57e3b461b85f3947ce7d7dc3269a6835a44838ef6acdc8eb1bf1df78f399f613c81b359cae9e25d2e968e488d9", 0x4e}, {&(0x7f0000000ec0)="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", 0xfe}, {&(0x7f0000000fc0)="764c4450246833996420f15ad967df7ed0bcb6a5a3091d97a7005b6b80732484b6c3c393779eb89ada3929be754bc744d854135bb3628a13fb6d08b1fac94c775a19f46fa0d95f7c0a93df43856e8d9835d735dc432117e00744ca70a858433c87ea869cb5d5d7dc121dc7a1adbf5b3ed853c1339d1e2a5083219080c739f45e365e40fe79e08060a5f00791d71c5ed15921c50c8d67f080b060958dc0e8eb23455211e54a8a1b2f56273b5c81f77f607d30a4ccbc7b10615aac98de99e8089537244f0ed822fe585b958e05995bf7152e2bef9f09323f152dd319f64e9571a30ac0fc4af206971eafe84d6f62569262ff", 0xf1}, {&(0x7f00000010c0)="e1d329d20cba1d2ef2d25df815f684b5d408e5693ea55570b1ac0f485a7cf088e846b72bcecde6c175264f25c370309611e49bc3ffe858165736b50a82dc9a77254bd7d7006957b7ede40fb4fde8218d02c6812b762fed4c81a493bf603f754e901e3fff32657277671c8f6c1def43762eeaba38ae8ff61a2b1e7d2c2b61c2c4392fb372724e57108c5d8a7a9011d537098051b117c2c020b85f41b68e7530c8b60f2a7f4ecd136643d75c375d4e788e5604dccaf1533f7f5ed74fd1f7b26f124ee2dc4717ee2f4bff7408a90d6e2845d2163fec767d1033c8810ddf", 0xdc}], 0x6, &(0x7f0000001240)={0x60, 0x13e, 0x5, "dd46757f5a0e149e229c862d4563d69b2be40e4c1a9e3644b2d61acd3e26e8354472392bd57434a9a2dc27be04bee78a57e32a9f786a5a0ee74750ced9cb81e401e486f150bd5e16e190cf33e3971e"}, 0x60, 0x90}, {&(0x7f00000012c0)={0x27, 0x0, 0x2, 0x7, 0x7, 0x3f, "5915f90da0b2637b0c8536ac83c673f952d8635257cc51cffc0d3dd9a5e81a370752dfaeea629a9e4202e3ee25553bd7e84e4dac771685d825ce53e52531eb", 0x32}, 0x60, &(0x7f00000028c0)=[{&(0x7f0000000b80)="a86aa0688f6fa689e1ad56ecb164f56d", 0x10}, {&(0x7f0000002400)="55d2781bbcd2361daf28b71a8c58e2390cc724b9b95935b5d1f8bfcf478160305be2f0419070980d90fb01756c15de1d45a1fa9cef9dc8e35d27faa447d97cd3202c8a8d07dea5f9635c14d031926cb01b8f3df14924656145b63bf299a8051900661eed8919b056c62340ebc0d79dba68e60a45a82a6f5a867d5cdc9b1f7badfe2014cf", 0x84}, {&(0x7f00000024c0)="b7b0157b18b8a6db46aaa68bbe16cb79fff740c087ffa66617e17a7a844e94523c966db6c16ca92aff30e93b1a3697ba4f7e525f73c4670127346c0d2a2420a64913cdf3a1f4bf7d6d70b7ccb6fb073b37c5419950a9c5de7e664aa113afe8b7a5", 0x61}, {&(0x7f0000002540)="fa948c22b6757228f76c97819599d24c16ae420cf886f6fbbea78ea10cfc5914737c1e81e4b1abb23f8cb0ca4bc85049cea6e445ee1aa6733b7b972c07b145422e82396059579839db34a2595230b9c6f03cb804e246a7d355cb7aeabcb02f2634843201", 0x64}, {&(0x7f00000025c0)="0b2a2408557e5a1d25583bace6c7e4017ffffd6b84083753b061b9bfe4ff08d14aeb17a50a640629e41f47311f6b9d1dc4d48574021e84f6bf37ccf3db37a9331ad09ba64114483753dcfa8a64d245128b", 0x51}, {&(0x7f0000002640)="a58c54f162353bb3f9b3d41b9ac08456a14352523ac6ed50e161e514840d17308be90f633c337f36e5641424603e16fddc5e08b7c5769614f6727b6dda062835797f12b10c96f6afddb7d1ca7725c2c528accd503289c7d88fc8069ccba7a7f55081908f354c35c7233478b87c4c6af41080f2f364c9aae46f895c5b", 0x7c}, {&(0x7f00000026c0)="c5ea47de8f79352bebe811a8c7341470e24b24c9e4d87ec7cb1a53518c457e8884a5e69a4ede1da3d4489cf5c8ac4ce61063c47204cb69061cd899799f351aa7dda240c527b578cd4e0f55383eaa1e0e4723b724de3eed25a82089076660382c2ddc59357afc13badf20bc9e354abb6366cf21639fe66753e631713ab5b37d53475a28ae1fba419baff0cabcf63ff52d1a9a6eefb0ba53a7eb77", 0x9a}, {&(0x7f0000002780)="5cda349b26a2442b5c02a900ea2e3ca23882ceedf3227534147ebdc3b1dc13808490d15e5e2acdc1bfc068daf2aecc9d4dc1178191e74c44f912a84d567eaf841de8acf29f4713bdff0ae69f40894439f205ccb4e2c12be83ce00d87aba88b8a359fede959941931273c0731bd4cd92e07cacb41677be64e1ac63e77c43b92d687459b5e12f6fa0c81893be3c15fa7750801b7", 0x93}, {&(0x7f0000002840)="f13c6830e8b069b9828aa8ee4fa348a4b8f1657e00257e7998f71b5d51e0cce769520b10f005c19bf4f49b275950914ac2bbe32b8f832f532b59e960bdf97107627eb287abb5d9aa1cd8c1807bf28eb932490c2050168e886b6372d006bfa77850b0a7083de099d65cd691a1f8bef42b851f7727046ab461ab5ca59b2d251f", 0x7f}], 0x9, &(0x7f0000002980)={0xb8, 0x6, 0x10000, "3f5647a372682493b80a3df48fa4b84a2ab7aaa1f9056ce10af61344d47c139ee25f4c74fe3773a0355b47e4005031849fb8a93048418a660f39d1d4f022ea2a4d7713e4e46eaa3a4b78138cbe900d9faf95dd04e636f322e9ecb29d46b4be549ce1d0f476e0fbf9ff265c3527a2f263a0fe6b5d243aa2c85cb31203bb5128ae12d3a95e9bd072cdf76634e530ddb603616a9b0d3cb539e459e3cad062e9225376e7eba6b72f48"}, 0xb8}, {&(0x7f0000002a40)={0x27, 0x1, 0x1, 0x3, 0x5, 0x401, "90a54f89224712a16dcd6202f27ea44dd88a57326621e403a8ebae9c49b815d75c800a2ea92c94153cbf070518e3a9fdb5142913d4eab2c306d35952fc0c01", 0x27}, 0x60, &(0x7f0000000c00)=[{&(0x7f0000002ac0)="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", 0xfa}], 0x1, &(0x7f0000002bc0)={0x1010, 0x11, 0x1, "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"}, 0x1010, 0x8000}], 0x6, 0x20048004) socket(0x1e, 0x3, 0x0) socket(0x1e, 0x0, 0x0) ptrace$PTRACE_SECCOMP_GET_FILTER(0x420c, 0x0, 0x0, &(0x7f0000000380)=""/113) sched_yield() ioctl$TUNGETIFF(r4, 0x800454d2, &(0x7f0000000140)) ioctl$KIOCSOUND(r4, 0x4b2f, 0x5) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x20, 0x9b}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000447000)='./file0\x00', &(0x7f00000e1000)='msdos\x00', 0x0, &(0x7f000097bfff)) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000580)='./cgroup/syz0\x00', 0x1ff) syz_open_dev$audion(&(0x7f0000000280)='/dev/audio#\x00', 0x7be, 0x0) 2018/03/31 09:15:20 executing program 4: perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f000031f000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) prctl$void(0x0) getpid() r0 = syz_open_dev$vcsn(&(0x7f0000000040)='/dev/vcs#\x00', 0x0, 0x20000) ioctl$GIO_CMAP(r0, 0x4b70, &(0x7f0000000080)) r1 = socket$alg(0x26, 0x5, 0x0) ioctl$sock_SIOCGIFBR(0xffffffffffffffff, 0x8940, &(0x7f0000000040)=@get={0x1, &(0x7f0000000400)=""/242, 0x100000000}) bind$alg(r1, &(0x7f0000000080)={0x26, 'aead\x00', 0x0, 0x0, 'generic-gcm-aesni\x00'}, 0x58) syz_open_dev$sndmidi(&(0x7f0000000100)='/dev/snd/midiC#D#\x00', 0xfd, 0x0) bind(0xffffffffffffffff, &(0x7f0000000140)=@llc={0x1a, 0x33a, 0x7, 0x80, 0x0, 0x4, @remote={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xbb}}, 0x80) r2 = syz_init_net_socket$nfc_llcp(0x27, 0x1, 0x1) setsockopt$nfc_llcp_NFC_LLCP_MIUX(r2, 0x118, 0x15, &(0x7f0000000000), 0x4) r3 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/cuse\x00', 0x103002, 0x0) futimesat(r3, &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)={{0x0, 0x7530}}) r4 = syz_open_dev$vcsa(&(0x7f00000001c0)='/dev/vcsa#\x00', 0x2, 0x0) sendto$inet6(r4, &(0x7f0000000bc0), 0x0, 0x20000000, &(0x7f0000000c40)={0xa, 0x4e20, 0x0, @dev={0xfe, 0x80, [], 0x19}, 0x1f}, 0x1c) accept$alg(r0, 0x0, 0x0) sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f0000000000)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x8}, 0xb4fcd35419244434, &(0x7f00004ca000)={&(0x7f0000000300)=ANY=[], 0x1a1}, 0x1}, 0x0) syz_fuseblk_mount(&(0x7f0000001380)='./file0\x00', &(0x7f00000013c0)='./file0\x00', 0xf000, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0xb21, 0x0) socket(0x1e, 0x3, 0x0) socket(0x1e, 0x0, 0x0) ptrace$PTRACE_SECCOMP_GET_FILTER(0x420c, 0x0, 0x0, &(0x7f0000000380)=""/113) sched_yield() ioctl$TUNGETIFF(r4, 0x800454d2, &(0x7f0000000140)) ioctl$KIOCSOUND(r4, 0x4b2f, 0xfffffffffffffb74) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x20, 0x9b}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000240)='./file0\x00', &(0x7f00000e1000)='msdos\x00', 0x0, &(0x7f0000000200)="28f3a14e877010fa544be2b25775172d753788249f7e3f615c5a2e472440363337") mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000580)='./cgroup/syz0\x00', 0x1ff) [ 313.500688] FAT-fs (loop199): unable to read boot sector [ 313.515552] FAT-fs (loop199): unable to read boot sector [ 313.536328] FAT-fs (loop199): unable to read boot sector 2018/03/31 09:15:20 executing program 0: perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f000031f000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) prctl$void(0x0) r0 = syz_open_dev$vcsn(&(0x7f0000000040)='/dev/vcs#\x00', 0x0, 0x20000) socket$alg(0x26, 0x5, 0x0) ioctl$sock_SIOCGIFBR(0xffffffffffffffff, 0x8940, &(0x7f0000000040)=@get={0x1, &(0x7f0000000400)=""/242, 0x100000000}) bind$alg(0xffffffffffffffff, &(0x7f0000000080)={0x26, 'aead\x00', 0x0, 0x0, 'generic-gcm-aesni\x00'}, 0x58) r1 = syz_open_dev$sndmidi(&(0x7f0000000100)='/dev/snd/midiC#D#\x00', 0xfd, 0x0) bind(0xffffffffffffffff, &(0x7f0000000140)=@llc={0x1a, 0x33a, 0x7, 0x80, 0x0, 0x4, @remote={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xbb}}, 0x80) r2 = syz_init_net_socket$nfc_llcp(0x27, 0x1, 0x1) setsockopt$nfc_llcp_NFC_LLCP_MIUX(r2, 0x118, 0x15, &(0x7f0000000000), 0x4) r3 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/cuse\x00', 0x103002, 0x0) futimesat(r3, &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)={{0x0, 0x7530}}) sendto$inet6(0xffffffffffffffff, &(0x7f0000000bc0)="36251e313e0743fc195a1a198a14434e8a0a00b3f452a3b5644e336ec712a16310c9aecc4e3097bc666a8882128a73c368ce731e9fbf3fe18fa52d00c34ac2e57c1c4569cfbd6a621c6dfbc032121aed", 0x50, 0x20000000, &(0x7f0000000c40)={0xa, 0x4e20, 0x6, @dev={0xfe, 0x80, [], 0x19}, 0x1f}, 0x1c) ioctl$DRM_IOCTL_GEM_FLINK(r3, 0xc008640a, &(0x7f00000001c0)={0x0}) ioctl$DRM_IOCTL_GEM_OPEN(0xffffffffffffffff, 0xc010640b, &(0x7f0000000280)={0x0, r4, 0x7ff}) ioctl$DRM_IOCTL_PRIME_FD_TO_HANDLE(r3, 0xc00c642e, &(0x7f00000002c0)={0x0, 0x80000, r0}) ioctl$DRM_IOCTL_GEM_OPEN(0xffffffffffffffff, 0xc010640b, &(0x7f0000000300)={r5, r6, 0x6}) accept$alg(r0, 0x0, 0x0) geteuid() fstat(r3, &(0x7f0000000200)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) fchown(r2, r7, r8) sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f0000000000)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x8}, 0xb4fcd35419244434, &(0x7f00004ca000)={&(0x7f0000000300)=ANY=[], 0x1a1}, 0x1}, 0x0) syz_fuseblk_mount(&(0x7f0000001380)='./file0\x00', &(0x7f00000013c0)='./file0\x00', 0xf000, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0xb21, 0x0) socket(0x1e, 0x3, 0x0) socket(0x1e, 0x0, 0xfffffffffffffffd) ptrace$PTRACE_SECCOMP_GET_FILTER(0x420c, 0x0, 0x0, &(0x7f0000000380)=""/113) sched_yield() ioctl$TUNGETIFF(0xffffffffffffffff, 0x800454d2, &(0x7f0000000140)) ioctl$KIOCSOUND(r1, 0x4b2f, 0x7) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x20, 0x9b}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000540)='./file0\x00', &(0x7f0000000340)='\x00\x00\x00\x00\x00\x00\x00', 0x729fd23fa3cf891, &(0x7f0000000500)) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000580)='./cgroup/syz0\x00', 0x1ff) 2018/03/31 09:15:20 executing program 3: r0 = syz_open_dev$random(&(0x7f00000001c0)='/dev/random\x00', 0x0, 0x800) r1 = syz_open_dev$loop(&(0x7f0000308000)='/dev/loop#\x00', 0x0, 0x0) ioctl$LOOP_SET_STATUS(r1, 0xc0481273, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "3900ea631d00000000020000010000009f00000023f7b7d65f90b0e6330ee739b319d8f6aa6bd58d1443474482e85040fb4947ebb55bd19f335b5bffff0001f3", "cfa430745a540dc1c149b7b81579f6a41c51f7d51933223e82ab867dac761faf"}) write(0xffffffffffffffff, &(0x7f00000001c0), 0x0) setsockopt$inet_sctp6_SCTP_RECVNXTINFO(0xffffffffffffffff, 0x84, 0x21, &(0x7f00000003c0)=0x200, 0x4) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f00000000c0)=0x0) getsockopt$netrom_NETROM_T4(0xffffffffffffffff, 0x103, 0x6, &(0x7f0000000300)=0x8, &(0x7f0000000340)=0x4) r3 = getpid() sched_setparam(r3, &(0x7f0000000400)) syz_open_dev$loop(&(0x7f0000ca9ff5)='/dev/loop#\x00', 0x0, 0x82) r4 = memfd_create(&(0x7f0000614000)="74086e750000000000000000008c00", 0x0) pwritev(r4, &(0x7f0000f50f90)=[{&(0x7f0000000040)="aa", 0x1}], 0x0, 0x0) fcntl$getownex(r1, 0x10, &(0x7f0000000240)={0x0, 0x0}) r6 = syz_open_procfs(r5, &(0x7f0000000280)='stat\x00') epoll_ctl$EPOLL_CTL_MOD(r4, 0x3, r0, &(0x7f00000002c0)={0x20000010}) accept4$inet6(r4, &(0x7f0000000100)={0x0, 0x0, 0x0, @mcast1}, &(0x7f0000000140)=0x1c, 0x7fd) getsockopt$inet_IP_IPSEC_POLICY(r4, 0x0, 0x10, &(0x7f0000000940)={{{@in6=@local, @in6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@loopback}, 0x0, @in=@local}}, &(0x7f0000000780)=0xe8) getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f00000007c0)={0x0, 0x0, 0x0}, &(0x7f0000000540)=0xc) fchown(r4, r7, r8) r9 = syz_open_dev$binder(&(0x7f0000000100)='/dev/binder#\x00', 0xffffffffffffffff, 0x806) ioctl$BINDER_SET_CONTEXT_MGR(r6, 0x40046207, 0x0) mmap$binder(&(0x7f000000c000/0x2000)=nil, 0x2000, 0x0, 0x12, r9, 0x0) ioctl$BINDER_WRITE_READ(r9, 0xc0306201, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000), 0x0, 0x0, &(0x7f0000011f9d)}) getsockopt$inet_sctp6_SCTP_AUTO_ASCONF(0xffffffffffffffff, 0x84, 0x1e, &(0x7f0000000140), &(0x7f0000000180)=0x4) ioctl$BINDER_WRITE_READ(r9, 0xc0306201, &(0x7f0000000340)={0x8, 0x0, &(0x7f0000000440)=ANY=[@ANYRES64=r1], 0x0, 0x0, &(0x7f0000000240)}) write(0xffffffffffffffff, &(0x7f0000000300)="8be25f5790f664f32509e40d6f879d5add7e2d359c9a19afb750a2d25352875d187d4118c99a2d5c6db433c277cc7d345b87a34f1b417033d367cb0cfd6a25633f77aafb17e99c33cb65352c901ae75176f07bb0a4bb5ebff3d87e", 0x5b) r10 = ioctl$LOOP_CTL_GET_FREE(r4, 0x4c82) ioctl$LOOP_CTL_REMOVE(r6, 0x4c81, r10) openat$cgroup(0xffffffffffffff9c, &(0x7f0000000000)='syz0\x00', 0x200002, 0x0) sched_setaffinity(r2, 0x8, &(0x7f0000000200)=0x7) [ 313.612532] FAT-fs (loop199): unable to read boot sector [ 313.620586] FAULT_INJECTION: forcing a failure. [ 313.620586] name failslab, interval 1, probability 0, space 0, times 0 [ 313.631854] CPU: 1 PID: 30972 Comm: syz-executor7 Not tainted 4.16.0-rc7+ #8 [ 313.639034] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 313.646391] binder: 30979:30980 unknown command 20 [ 313.648382] Call Trace: [ 313.648402] dump_stack+0x194/0x24d [ 313.648417] ? arch_local_irq_restore+0x53/0x53 [ 313.648429] ? percpu_ref_put_many+0x132/0x220 [ 313.648439] ? memcg_kmem_charge_memcg+0x74/0x110 [ 313.648455] should_fail+0x8c0/0xa40 [ 313.661271] binder: 30979:30980 ioctl c0306201 20000340 returned -22 [ 313.664181] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 313.664209] ? find_held_lock+0x35/0x1d0 [ 313.664224] ? __lock_is_held+0xb6/0x140 [ 313.664245] ? check_same_owner+0x320/0x320 [ 313.694214] binder: 30979:30981 unknown command 26 [ 313.696947] ? rcu_note_context_switch+0x710/0x710 2018/03/31 09:15:20 executing program 3: r0 = syz_open_dev$random(&(0x7f00000001c0)='/dev/random\x00', 0x0, 0x800) r1 = syz_open_dev$loop(&(0x7f0000308000)='/dev/loop#\x00', 0x0, 0x0) ioctl$LOOP_SET_STATUS(r1, 0xc0481273, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "3900ea631d00000000020000010000009f00000023f7b7d65f90b0e6330ee739b319d8f6aa6bd58d1443474482e85040fb4947ebb55bd19f335b5bffff0001f3", "cfa430745a540dc1c149b7b81579f6a41c51f7d51933223e82ab867dac761faf"}) write(0xffffffffffffffff, &(0x7f00000001c0), 0x0) setsockopt$inet_sctp6_SCTP_RECVNXTINFO(0xffffffffffffffff, 0x84, 0x21, &(0x7f00000003c0)=0x200, 0x4) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f00000000c0)=0x0) getsockopt$netrom_NETROM_T4(0xffffffffffffffff, 0x103, 0x6, &(0x7f0000000300)=0x8, &(0x7f0000000340)=0x4) r3 = getpid() sched_setparam(r3, &(0x7f0000000400)) syz_open_dev$loop(&(0x7f0000ca9ff5)='/dev/loop#\x00', 0x0, 0x82) r4 = memfd_create(&(0x7f0000614000)="74086e750000000000000000008c00", 0x0) pwritev(r4, &(0x7f0000f50f90)=[{&(0x7f0000000040)="aa", 0x1}], 0x1, 0x0) fcntl$getownex(r1, 0x10, &(0x7f0000000200)={0x0, 0x0}) r6 = syz_open_procfs(r5, &(0x7f0000000280)='stat\x00') epoll_ctl$EPOLL_CTL_MOD(r4, 0x3, r0, &(0x7f0000000480)={0x10}) accept4$inet6(r4, &(0x7f0000000100)={0x0, 0x0, 0x0, @mcast1}, &(0x7f0000000140)=0x1c, 0x1000000000007fd) getsockopt$inet_IP_IPSEC_POLICY(r4, 0x0, 0x10, &(0x7f0000000940)={{{@in6=@local, @in6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@loopback}, 0x0, @in=@local}}, &(0x7f0000000780)=0xe8) getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f00000007c0)={0x0, 0x0, 0x0}, &(0x7f0000000540)=0xc) fchown(r4, r7, r8) r9 = syz_open_dev$binder(&(0x7f0000000100)='/dev/binder#\x00', 0xffffffffffffffff, 0x806) ioctl$BINDER_SET_CONTEXT_MGR(r9, 0x40046207, 0x0) mmap$binder(&(0x7f000000c000/0x2000)=nil, 0x2000, 0x0, 0x12, r9, 0x0) ioctl$BINDER_WRITE_READ(r9, 0xc0306201, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000), 0x0, 0x0, &(0x7f0000011f9d)}) getsockopt$inet_sctp6_SCTP_AUTO_ASCONF(0xffffffffffffffff, 0x84, 0x1e, &(0x7f0000000140), &(0x7f0000000180)=0x4) ioctl$BINDER_WRITE_READ(r9, 0xc0306201, &(0x7f0000000340)={0x8, 0x0, &(0x7f0000000440)=ANY=[@ANYRES64=r1], 0x0, 0x0, &(0x7f0000000240)}) write(0xffffffffffffffff, &(0x7f0000000300)="8be25f5790f664f32509e40d6f879d5add7e2d359c9a19afb750a2d25352875d187d4118c99a2d5c6db433c277cc7d345b87a34f1b417033d367cb0cfd6a25633f77aafb17e99c33cb65352c901ae75176f07bb0a4bb5ebff3d87e", 0x5b) r10 = ioctl$LOOP_CTL_GET_FREE(r4, 0x4c82) ioctl$LOOP_CTL_REMOVE(r6, 0x4c81, r10) openat$cgroup(0xffffffffffffff9c, &(0x7f0000000000)='syz0\x00', 0x200002, 0x0) sched_setaffinity(r2, 0x8, &(0x7f0000000380)=0x8000) [ 313.696960] ? __lock_acquire+0x664/0x3e00 [ 313.696977] should_failslab+0xec/0x120 [ 313.696987] kmem_cache_alloc+0x47/0x760 [ 313.703640] binder: 30979:30981 ioctl c0306201 20000340 returned -22 [ 313.706202] ? __lock_acquire+0x664/0x3e00 [ 313.706223] ptlock_alloc+0x24/0x70 [ 313.706235] pte_alloc_one+0x59/0x100 [ 313.706246] do_huge_pmd_anonymous_page+0xb5e/0x19e0 [ 313.706255] ? __lock_acquire+0x664/0x3e00 [ 313.706267] ? __thp_get_unmapped_area+0x130/0x130 [ 313.755645] ? __lock_acquire+0x664/0x3e00 [ 313.759877] ? __lock_acquire+0x664/0x3e00 [ 313.764116] ? debug_check_no_locks_freed+0x3c0/0x3c0 [ 313.769309] ? debug_check_no_locks_freed+0x3c0/0x3c0 [ 313.774496] ? __lock_acquire+0x664/0x3e00 [ 313.778724] ? perf_trace_lock+0x900/0x900 [ 313.782958] ? perf_trace_lock_acquire+0xe3/0x980 [ 313.787798] ? perf_trace_lock_acquire+0xe3/0x980 [ 313.788707] binder: 30983:30984 unknown command 20 [ 313.792637] ? perf_trace_lock_acquire+0xe3/0x980 [ 313.792649] ? perf_trace_lock_acquire+0xe3/0x980 [ 313.792663] ? perf_trace_lock+0x900/0x900 [ 313.792673] ? perf_trace_lock+0x900/0x900 [ 313.792689] __handle_mm_fault+0x178a/0x38c0 [ 313.792701] ? __pmd_alloc+0x4e0/0x4e0 [ 313.808602] binder: 30983:30984 ioctl c0306201 20000340 returned -22 [ 313.811453] ? trace_hardirqs_off+0x10/0x10 [ 313.811469] ? find_held_lock+0x35/0x1d0 [ 313.811486] ? handle_mm_fault+0x35b/0xb10 [ 313.811497] ? lock_downgrade+0x980/0x980 [ 313.811517] ? handle_mm_fault+0x2f8/0xb10 [ 313.838668] binder: BINDER_SET_CONTEXT_MGR already set [ 313.838795] handle_mm_fault+0x44a/0xb10 [ 313.838806] ? check_same_owner+0x320/0x320 [ 313.838817] ? __handle_mm_fault+0x38c0/0x38c0 [ 313.838826] ? vmacache_find+0x5f/0x280 [ 313.843303] binder: 30983:30985 ioctl 40046207 0 returned -16 [ 313.847288] ? vmacache_update+0xfe/0x130 [ 313.847301] ? find_vma+0x30/0x150 [ 313.847316] __do_page_fault+0x560/0xbe0 [ 313.847333] ? mm_fault_error+0x2c0/0x2c0 [ 313.847349] do_page_fault+0xee/0x730 [ 313.847360] ? vmalloc_sync_all+0x30/0x30 [ 313.862988] binder: 30983:30985 unknown command 26 [ 313.865165] ? kmem_cache_alloc_trace+0x4dc/0x740 [ 313.865179] ? lock_downgrade+0x980/0x980 [ 313.865192] ? lock_release+0xa40/0xa40 [ 313.865204] ? check_same_owner+0x320/0x320 [ 313.865212] ? lock_release+0xa40/0xa40 [ 313.865225] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 313.875473] binder: 30983:30985 ioctl c0306201 20000340 returned -22 [ 313.879599] page_fault+0x25/0x50 [ 313.879610] RIP: 0010:copy_mount_options+0x193/0x2e0 [ 313.879616] RSP: 0018:ffff8801841afd90 EFLAGS: 00010246 [ 313.879626] RAX: 0000000000000000 RBX: 000000002097bfff RCX: ffffffff81b9f57b [ 313.879632] RDX: 00000000000000e1 RSI: ffffc900038bd000 RDI: ffff880181797958 [ 313.879638] RBP: ffff8801841afdc8 R08: 0000000000000007 R09: ffff8801841afab0 [ 313.879644] R10: 000000008fc6e2c4 R11: 0000000070e0398f R12: 0000000000001000 [ 313.879648] R13: ffff880186e165c0 R14: ffff880186e165c0 R15: 000000002097cfff [ 313.879661] ? copy_mount_options+0x18b/0x2e0 [ 313.995309] SyS_mount+0x87/0x120 [ 313.998759] ? copy_mnt_ns+0xb30/0xb30 [ 314.002652] do_syscall_64+0x281/0x940 [ 314.006534] ? vmalloc_sync_all+0x30/0x30 [ 314.010676] ? _raw_spin_unlock_irq+0x27/0x70 [ 314.015162] ? finish_task_switch+0x1c1/0x7e0 [ 314.019648] ? syscall_return_slowpath+0x550/0x550 [ 314.024567] ? syscall_return_slowpath+0x2ac/0x550 [ 314.029485] ? prepare_exit_to_usermode+0x350/0x350 [ 314.034491] ? entry_SYSCALL_64_after_hwframe+0x52/0xb7 [ 314.039849] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 314.044685] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 314.049862] RIP: 0033:0x454e79 [ 314.053038] RSP: 002b:00007f37fba8ec68 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 314.060734] RAX: ffffffffffffffda RBX: 00007f37fba8f6d4 RCX: 0000000000454e79 [ 314.067988] RDX: 00000000200e1000 RSI: 0000000020447000 RDI: 0000000020000000 [ 314.075247] RBP: 000000000072bea0 R08: 000000002097bfff R09: 0000000000000000 [ 314.082518] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000019 [ 314.089773] R13: 00000000000003fa R14: 00000000006f8010 R15: 0000000000000003 [ 314.111867] FAT-fs (loop199): Unrecognized mount option "(ó¡N‡púTKâ²Wu-u7ˆ$Ÿ~?a\Z.G$@637" or missing value [ 314.139206] FAT-fs (loop199): unable to read boot sector 2018/03/31 09:15:21 executing program 3: r0 = syz_open_dev$random(&(0x7f00000001c0)='/dev/random\x00', 0x0, 0x800) r1 = syz_open_dev$loop(&(0x7f0000308000)='/dev/loop#\x00', 0x0, 0x0) ioctl$LOOP_SET_STATUS(r1, 0xc0481273, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "3900ea631d00000000020000010000009f00000023f7b7d65f90b0e6330ee739b319d8f6aa6bd58d1443474482e85040fb4947ebb55bd19f335b5bffff0001f3", "cfa430745a540dc1c149b7b81579f6a41c51f7d51933223e82ab867dac761faf"}) write(0xffffffffffffffff, &(0x7f00000001c0), 0x0) setsockopt$inet_sctp6_SCTP_RECVNXTINFO(0xffffffffffffffff, 0x84, 0x21, &(0x7f00000003c0)=0x200, 0x4) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f00000000c0)=0x0) getsockopt$netrom_NETROM_T4(0xffffffffffffffff, 0x103, 0x6, &(0x7f0000000300)=0x8, &(0x7f0000000340)=0x4) r3 = getpid() sched_setparam(r3, &(0x7f0000000400)) r4 = memfd_create(&(0x7f0000614000)="74086e750000000000000000008c00", 0x0) pwritev(r4, &(0x7f0000f50f90)=[{&(0x7f0000000380)="aa", 0x9b3d8ab403ab8109}], 0x6fbc0d301ca26e8, 0x0) fcntl$getownex(r1, 0x10, &(0x7f0000000240)={0x0, 0x0}) r6 = syz_open_procfs(r5, &(0x7f0000000280)='stat\x00') epoll_ctl$EPOLL_CTL_MOD(r4, 0x3, r0, &(0x7f00000002c0)={0x20000010}) accept4$inet6(r4, &(0x7f0000000100)={0x0, 0x0, 0x0, @mcast1}, &(0x7f0000000140)=0x1c, 0x7fd) getsockopt$inet_IP_IPSEC_POLICY(r4, 0x0, 0x10, &(0x7f0000000940)={{{@in6=@local, @in6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@loopback}, 0x0, @in=@local}}, &(0x7f0000000780)=0xe8) getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f00000007c0)={0x0, 0x0, 0x0}, &(0x7f0000000540)=0xc) fchown(r4, r7, r8) r9 = syz_open_dev$binder(&(0x7f0000000100)='/dev/binder#\x00', 0xffffffffffffffff, 0x806) ioctl$BINDER_SET_CONTEXT_MGR(r6, 0x40046207, 0x0) mmap$binder(&(0x7f000000c000/0x2000)=nil, 0x2000, 0x0, 0x12, r9, 0x0) ioctl$BINDER_WRITE_READ(r9, 0xc0306201, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000), 0x0, 0x0, &(0x7f0000011f9d)}) getsockopt$inet_sctp6_SCTP_AUTO_ASCONF(0xffffffffffffffff, 0x84, 0x1e, &(0x7f0000000140), &(0x7f0000000180)=0x4) ioctl$BINDER_WRITE_READ(r9, 0xc0306201, &(0x7f0000000340)={0x8, 0x0, &(0x7f0000000440)=ANY=[@ANYRES64=r1], 0x0, 0x0, &(0x7f0000000240)}) write(0xffffffffffffffff, &(0x7f0000000300)="8be25f5790f664f32509e40d6f879d5add7e2d359c9a19afb750a2d25352875d187d4118c99a2d5c6db433c277cc7d345b87a34f1b417033d367cb0cfd6a25633f77aafb17e99c33cb65352c901ae75176f07bb0a4bb5ebff3d87e", 0x5b) r10 = ioctl$LOOP_CTL_GET_FREE(r4, 0x4c82) ioctl$LOOP_CTL_REMOVE(r6, 0x4c81, r10) openat$cgroup(r6, &(0x7f0000000000)='syz0\x00', 0x200002, 0x0) sched_setaffinity(r2, 0x8, &(0x7f0000000200)=0x7) 2018/03/31 09:15:21 executing program 2: syz_open_dev$loop(&(0x7f00000003c0)='/dev/loop#\x00', 0x8, 0x0) r0 = syz_open_dev$sndseq(&(0x7f00000001c0)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r0, 0x4040534e, &(0x7f000019ffe9)={0xc1}) r1 = accept(0xffffffffffffffff, &(0x7f0000000080)=@can, &(0x7f0000000180)=0x80) ioctl$sock_ipx_SIOCAIPXPRISLT(r1, 0x89e1, &(0x7f0000000280)=0x3f) ioctl$sock_inet_SIOCRTMSG(r1, 0x890d, &(0x7f0000000200)={0x80, {0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x19}}, {0x2, 0x4e21, @local={0xac, 0x14, 0x14, 0xaa}}, {0x2, 0x4e23}, 0x0, 0x7, 0x1, 0x0, 0x9, 0x0, 0x0, 0x0, 0xfffffffffffffff7}) getsockopt$inet_sctp_SCTP_PRIMARY_ADDR(0xffffffffffffffff, 0x84, 0x6, &(0x7f0000000ac0)={0x0, @in={{0x2, 0x4e20, @loopback=0x7f000001}}}, &(0x7f00000002c0)=0x84) setsockopt$inet_sctp_SCTP_ENABLE_STREAM_RESET(r1, 0x84, 0x76, &(0x7f0000000300)={r2, 0x1c9}, 0x8) clone(0x2000c100, &(0x7f0000000800)="97bb77038add5df9e9d4f9783b82c55fe59e5c0acdbcfc9bcf92ac0e1f1f3c1959c1d25dfabf3849336c7c85be174d7765b47e113632aea54b87e4d3f2c1db09e6aa4040b43d17308fb7e62e808067da2fff3cfd8e4c038c814bbfc6bc49d8ebc8671d8297e2d34dc61f2d194d2dbb8f59b4c853e0714d3d4bb29d1243fac01c86c8c4dd38daedab3c6ad73a72d3f6dd2684aa82e5285eb82452c9848b7beb8bc513ba8c8973cad0bd5926604846b7f5d0397b", &(0x7f00000008c0), &(0x7f0000000900), &(0x7f0000000940)="ed6c04412e782fe395f084741e3d9fe469aebde09acc8f8d8d84d1f00f5573b09acba487077ebb904cb1f3fed55f59d677ce24bbd2a7506df8e1e0d0fc709cb8c9f4ab2aeeeebc5ef879742c1f7628f1862c88b5b0da89acbf43ef12e4839405b6a3430d296fea06d2f3a8356c57ec991e") ioctl$SNDRV_SEQ_IOCTL_SUBSCRIBE_PORT(r0, 0x40505330, &(0x7f0000ec6fb0)={{}, {0x80}}) getsockopt$netrom_NETROM_T1(r1, 0x103, 0x1, &(0x7f0000000000), &(0x7f0000000380)=0x4) syz_open_dev$adsp(&(0x7f0000000600)='/dev/adsp#\x00', 0x100000000, 0x80000) rt_sigprocmask(0x3d738072cd0f41ac, &(0x7f0000000cc0)={0x7}, &(0x7f0000000d00), 0x8) clone(0x40000000, &(0x7f0000000500)="67cdd9994c47c31d325b069924a7064c157c2ec0b5b5dca2feeb7dabef3b7af0d02d559e293faa759f2b3cb12aea360c2d", &(0x7f0000000580), &(0x7f00000005c0), &(0x7f0000000a00)="29859fdda9a119e54a27f9ec76b4d63a16dc5bbdd38c2fda0e5f4d8f830cd987ec7d3ffc66cf3db8820968fd89a1fba8fe6352a29a27f3b000bcdf238f2c04b358fc831025180e0be313da41de6366c94a1a0f86aaffdf2c039111b55275c054e14819a827fe809225249a01944263a2aec15f64e752e35892b1b8e7ef1e0e9115") ioctl$SNDRV_SEQ_IOCTL_DELETE_PORT(r0, 0x40a85321, &(0x7f0000000b80)={{0x4, 0x8}, 'port0\x00', 0x80, 0x0, 0x10000, 0x6, 0x2, 0x80, 0x8, 0x0, 0x0, 0x3dec00}) getsockopt$inet_sctp_SCTP_SOCKOPT_PEELOFF(0xffffffffffffffff, 0x84, 0x66, &(0x7f0000000c40)={r2, 0x6}, &(0x7f0000000c80)=0x8) clock_settime(0x7, &(0x7f0000000740)={0x77359400}) ioctl$SNDRV_SEQ_IOCTL_CLIENT_ID(r0, 0x80045301, &(0x7f0000000340)) r3 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer2\x00', 0x0, 0x0) openat$sequencer2(0xffffffffffffff9c, &(0x7f00000006c0)='/dev/sequencer2\x00', 0x222081, 0x0) ioctl$RNDADDENTROPY(0xffffffffffffffff, 0x40085203, &(0x7f0000000100)=ANY=[@ANYPTR=&(0x7f0000000680)=ANY=[@ANYPTR64=&(0x7f0000000640)=ANY=[@ANYPTR, @ANYPTR]]]) setsockopt$inet_sctp_SCTP_DEFAULT_SEND_PARAM(r3, 0x84, 0xa, &(0x7f0000000140)={0x5, 0x100000001, 0x0, 0x8, 0x0, 0x7, 0x401, 0x1f, r2}, 0x20) 2018/03/31 09:15:21 executing program 1: perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f000031f000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) prctl$void(0x0) getpid() syz_open_dev$vcsn(&(0x7f0000000040)='/dev/vcs#\x00', 0x400, 0x20000) r0 = socket$alg(0x26, 0x5, 0x0) ioctl$sock_SIOCGIFBR(r0, 0x8940, &(0x7f0000000040)=@get={0x1, &(0x7f0000000400)=""/242, 0x100000000}) bind$alg(r0, &(0x7f0000000080)={0x26, 'aead\x00', 0x0, 0x0, 'generic-gcm-aesni\x00'}, 0x58) r1 = syz_open_dev$sndmidi(&(0x7f0000000100)='/dev/snd/midiC#D#\x00', 0xfd, 0x0) bind(r1, &(0x7f0000000140)=@llc={0x1a, 0x33a, 0x7, 0x80, 0x0, 0x4, @remote={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xbb}}, 0x80) r2 = syz_init_net_socket$nfc_llcp(0x27, 0x1, 0x1) setsockopt$nfc_llcp_NFC_LLCP_MIUX(r2, 0x118, 0x15, &(0x7f0000000000), 0x4) r3 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/cuse\x00', 0x103002, 0x0) futimesat(r3, &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)={{0x0, 0x7530}}) r4 = syz_open_dev$vcsa(&(0x7f00000001c0)='/dev/vcsa#\x00', 0x2, 0x4020ff) sendto$inet6(r4, &(0x7f0000000bc0), 0x0, 0x20000000, &(0x7f0000000c40)={0xa, 0x4e20, 0x6, @dev={0xfe, 0x80, [], 0x19}, 0x1f}, 0x1c) sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f0000000000)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x8}, 0xb4fcd35419244434, &(0x7f00004ca000)={&(0x7f0000000300)=ANY=[], 0x1a1}, 0x1}, 0x0) r5 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(r5, &(0x7f000070ffe3)={0xa, 0x4e20}, 0x1c) perf_event_open(&(0x7f000001d000)={0x2, 0x78, 0xe2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$inet6_udp(0xa, 0x2, 0x0, &(0x7f0000000080)) setsockopt$sock_int(r5, 0x1, 0xf, &(0x7f0000f59ffc)=0x5, 0x4) syz_emit_ethernet(0x2a, &(0x7f000070aef1)={@broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], @empty=[0x0, 0x0, 0x14], [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x0, 0x11, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff, 0xbb}, @broadcast=0xffffffff}, @udp={0x0, 0x4e20, 0x8}}}}}, 0x0) syz_fuseblk_mount(&(0x7f0000001380)='./file0\x00', &(0x7f00000013c0)='./file0\x00', 0xf000, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0xb21, 0x0) socket(0x1e, 0x3, 0x0) ptrace$PTRACE_SECCOMP_GET_FILTER(0x420c, 0x0, 0x0, &(0x7f0000000380)=""/113) sched_yield() ioctl$TUNGETIFF(r4, 0x800454d2, &(0x7f0000000140)) ioctl$KIOCSOUND(r4, 0x4b2f, 0xfffffffffffffb74) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x20, 0x9b}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000447000)='./file0\x00', &(0x7f00000e1000)='msdos\x00', 0x0, &(0x7f000097bfff)) 2018/03/31 09:15:21 executing program 6: perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f000031f000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) prctl$void(0x0) getpid() r0 = syz_open_dev$vcsn(&(0x7f0000000040)='/dev/vcs#\x00', 0x0, 0x20000) ioctl$GIO_CMAP(r0, 0x4b70, &(0x7f0000000080)) r1 = socket$alg(0x26, 0x5, 0x0) ioctl$sock_SIOCGIFBR(0xffffffffffffffff, 0x8940, &(0x7f0000000040)=@get={0x1, &(0x7f0000000400)=""/242, 0x100000000}) bind$alg(r1, &(0x7f0000000080)={0x26, 'aead\x00', 0x0, 0x0, 'generic-gcm-aesni\x00'}, 0x58) syz_open_dev$sndmidi(&(0x7f0000000100)='/dev/snd/midiC#D#\x00', 0xfd, 0x0) bind(0xffffffffffffffff, &(0x7f0000000140)=@llc={0x1a, 0x33a, 0x7, 0x80, 0x0, 0x4, @remote={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xbb}}, 0x80) r2 = syz_init_net_socket$nfc_llcp(0x27, 0x1, 0x1) setsockopt$nfc_llcp_NFC_LLCP_MIUX(r2, 0x118, 0x15, &(0x7f0000000000), 0x4) r3 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/cuse\x00', 0x103002, 0x0) futimesat(r3, &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)={{0x0, 0x7530}}) r4 = syz_open_dev$vcsa(&(0x7f00000001c0)='/dev/vcsa#\x00', 0x2, 0x0) sendto$inet6(r4, &(0x7f0000000bc0), 0x0, 0x0, &(0x7f0000000c40)={0xa, 0x4e20, 0x0, @dev={0xfe, 0x80, [], 0x19}, 0x1f}, 0x1c) accept$alg(r0, 0x0, 0x0) sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f0000000000)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x8}, 0xb4fcd35419244434, &(0x7f00004ca000)={&(0x7f0000000300)=ANY=[], 0x1a1}, 0x1}, 0x0) syz_fuseblk_mount(&(0x7f0000001380)='./file0\x00', &(0x7f00000013c0)='./file0\x00', 0xf000, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0xb21, 0x0) socket(0x1e, 0x3, 0x0) socket(0x1e, 0x0, 0x0) ptrace$PTRACE_SECCOMP_GET_FILTER(0x420c, 0x0, 0x0, &(0x7f0000000380)=""/113) sched_yield() ioctl$TUNGETIFF(r4, 0x800454d2, &(0x7f0000000140)) ioctl$KIOCSOUND(r4, 0x4b2f, 0xfffffffffffffb74) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x20, 0x9b}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000447000)='./file0\x00', &(0x7f00000e1000)='msdos\x00', 0x0, &(0x7f000097bfff)) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000580)='./cgroup/syz0\x00', 0x1ff) [ 314.158689] FAT-fs (loop199): Unrecognized mount option "(ó¡N‡púTKâ²Wu-u7ˆ$Ÿ~?a\Z.G$@637" or missing value 2018/03/31 09:15:21 executing program 5: perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f000031f000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) prctl$void(0x0) getpid() r0 = syz_open_dev$vcsn(&(0x7f0000000040)='/dev/vcs#\x00', 0x0, 0x20000) ioctl$GIO_CMAP(r0, 0x4b70, &(0x7f0000000080)) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000080)={0x26, 'aead\x00', 0x0, 0x0, 'generic-gcm-aesni\x00'}, 0x58) syz_open_dev$sndmidi(&(0x7f0000000100)='/dev/snd/midiC#D#\x00', 0xfd, 0x0) bind(0xffffffffffffffff, &(0x7f0000000140)=@llc={0x1a, 0x33a, 0x7, 0x80, 0x5, 0x4, @remote={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xbb}}, 0x80) r2 = syz_init_net_socket$nfc_llcp(0x27, 0x1, 0x1) setsockopt$nfc_llcp_NFC_LLCP_MIUX(r2, 0x118, 0x15, &(0x7f0000000000), 0x4) r3 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/cuse\x00', 0x103002, 0x0) futimesat(r3, &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)={{0x0, 0x7530}}) r4 = syz_open_dev$vcsa(&(0x7f00000001c0)='/dev/vcsa#\x00', 0x2, 0x4020ff) sendto$inet6(0xffffffffffffffff, &(0x7f0000000bc0)="36251e313e0743fc195a1a198a14434e8a0a00b3f452a3b5644e336ec712a16310c9aecc4e3097bc666a8882128a73c368ce731e9fbf3fe18fa52d", 0x3b, 0x20000000, &(0x7f0000000c40)={0xa, 0x4e20, 0x6, @dev={0xfe, 0x80, [], 0x19}, 0x1f}, 0x1c) accept$alg(r0, 0x0, 0x0) sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f0000000000)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x8}, 0xb4fcd35419244434, &(0x7f00004ca000)={&(0x7f0000000300)=ANY=[], 0x1a1}, 0x1}, 0x0) syz_fuseblk_mount(&(0x7f0000001380)='./file0\x00', &(0x7f00000013c0)='./file0\x00', 0xf000, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0xb21, 0x0) socket(0x1e, 0x3, 0x0) socket(0x1e, 0x0, 0x0) ptrace$PTRACE_SECCOMP_GET_FILTER(0x420c, 0x0, 0x0, &(0x7f0000000380)=""/113) sched_yield() ioctl$TUNGETIFF(r4, 0x800454d2, &(0x7f0000000200)) ioctl$KIOCSOUND(r4, 0x4b2f, 0xfffffffffffffb74) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x20, 0x9b}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000447000)='./file0\x00', &(0x7f00000e1000)='msdos\x00', 0x0, &(0x7f00000004c0)) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000580)='./cgroup/syz0\x00', 0x1ff) getsockopt$inet_sctp_SCTP_GET_PEER_ADDRS(0xffffffffffffff9c, 0x84, 0x6c, &(0x7f00000002c0)={0x0, 0x91, "2181d65a380fd12a12d046ad7380ff6a9734d88c88f093cecf173bc8479f7d816b9edb27825c92b6645f07c7804c962c5278410ec5ee07c779af1994d234139ab7e2b1ba778e34f029cfb58a3cf4523a24adc636b3ae8434fb2575e5cf8f7a1c0c60716c8155d426296c1c7ae70f95210cda58cefd0d6e56913eccbecb8445637ada29cd958b9b83dc028843cfecf7e5a0"}, &(0x7f0000000240)=0x99) setsockopt$inet_sctp6_SCTP_SET_PEER_PRIMARY_ADDR(r4, 0x84, 0x5, &(0x7f0000000400)={r5, @in={{0x2, 0x4e21, @multicast1=0xe0000001}}}, 0x84) syz_open_dev$audion(&(0x7f0000000280)='/dev/audio#\x00', 0x7be, 0x0) [ 314.224490] FAT-fs (loop199): unable to read boot sector [ 314.225938] binder: 30993:30995 unknown command 20 [ 314.270955] binder: 30993:30995 ioctl c0306201 20000340 returned -22 [ 314.280427] FAT-fs (loop199): unable to read boot sector [ 314.303287] binder: 30993:30995 ioctl c0306201 20000340 returned -14 [ 314.323367] FAT-fs (loop199): unable to read boot sector 2018/03/31 09:15:21 executing program 0: perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f000031f000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) prctl$void(0x0) r0 = syz_open_dev$vcsn(&(0x7f0000000040)='/dev/vcs#\x00', 0x0, 0x20000) socket$alg(0x26, 0x5, 0x0) ioctl$sock_SIOCGIFBR(0xffffffffffffffff, 0x8940, &(0x7f0000000040)=@get={0x1, &(0x7f0000000400)=""/242, 0x100000000}) bind$alg(0xffffffffffffffff, &(0x7f0000000080)={0x26, 'aead\x00', 0x0, 0x0, 'generic-gcm-aesni\x00'}, 0x58) syz_open_dev$sndmidi(&(0x7f0000000100)='/dev/snd/midiC#D#\x00', 0xfd, 0x0) bind(0xffffffffffffffff, &(0x7f0000000140)=@llc={0x1a, 0x33a, 0x7, 0x80, 0x0, 0x4, @remote={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xbb}}, 0x80) r1 = syz_init_net_socket$nfc_llcp(0x27, 0x1, 0x1) setsockopt$nfc_llcp_NFC_LLCP_MIUX(r1, 0x118, 0x15, &(0x7f0000000000), 0x4) openat$ppp(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ppp\x00', 0x100, 0x0) r2 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/cuse\x00', 0x103002, 0x0) futimesat(r2, &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)={{0x0, 0x7530}}) r3 = syz_open_dev$vcsa(&(0x7f00000001c0)='/dev/vcsa#\x00', 0x2, 0x0) sendto$inet6(r3, &(0x7f0000000bc0)="36251e313e0743fc195a1a198a14434e8a0a00b3f452a3b5644e336ec712a16310c9aecc4e3097bc666a8882128a73c368ce731e9fbf3fe18fa52d00c34ac2e57c1c4569cfbd6a621c6dfbc032121aed", 0x50, 0x20000000, &(0x7f0000000c40)={0xa, 0x4e20, 0x6, @dev={0xfe, 0x80, [], 0x19}, 0x1f}, 0x1c) accept$alg(r0, 0x0, 0x0) sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f0000000000)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x8}, 0xb4fcd35419244434, &(0x7f00004ca000)={&(0x7f0000000300)=ANY=[], 0x1a1}, 0x1}, 0x0) syz_fuseblk_mount(&(0x7f0000001380)='./file0\x00', &(0x7f00000013c0)='./file0\x00', 0xf000, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0xb21, 0x0) socket(0x1e, 0x3, 0x0) socket(0x1e, 0x0, 0x0) ptrace$PTRACE_SECCOMP_GET_FILTER(0x420c, 0x0, 0x0, &(0x7f0000000380)=""/113) sched_yield() ioctl$TUNGETIFF(r3, 0x800454d2, &(0x7f0000000140)) ioctl$KIOCSOUND(r3, 0x4b2f, 0xfffffffffffffb74) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x20, 0x9b}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000447000)='./file0\x00', &(0x7f00000e1000)='msdos\x00', 0x0, &(0x7f000097bfff)) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000580)='./cgroup/syz0\x00', 0x1ff) [ 314.506789] IPVS: ftp: loaded support on port[0] = 21 2018/03/31 09:15:21 executing program 4: perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f000031f000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) prctl$void(0x0) r0 = getpid() r1 = syz_open_dev$vcsn(&(0x7f0000000040)='/dev/vcs#\x00', 0x0, 0x20000) ioctl$GIO_CMAP(r1, 0x4b70, &(0x7f0000000080)) r2 = socket$alg(0x26, 0x5, 0x0) ioctl$sock_SIOCGIFBR(0xffffffffffffffff, 0x8940, &(0x7f0000000040)=@get={0x1, &(0x7f0000000400)=""/242, 0x100000000}) bind$alg(r2, &(0x7f0000000080)={0x26, 'aead\x00', 0x0, 0x0, 'generic-gcm-aesni\x00'}, 0x58) syz_open_dev$sndmidi(&(0x7f0000000100)='/dev/snd/midiC#D#\x00', 0xfd, 0x0) bind(0xffffffffffffffff, &(0x7f0000000140)=@llc={0x1a, 0x33a, 0x7, 0x80, 0x0, 0x4, @remote={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xbb}}, 0x80) r3 = syz_init_net_socket$nfc_llcp(0x27, 0x1, 0x1) setsockopt$nfc_llcp_NFC_LLCP_MIUX(r3, 0x118, 0x15, &(0x7f0000000000), 0x4) r4 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/cuse\x00', 0x103002, 0x0) futimesat(r4, &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)={{0x0, 0x7530}}) r5 = syz_open_dev$vcsa(&(0x7f00000001c0)='/dev/vcsa#\x00', 0x2, 0x0) sendto$inet6(r5, &(0x7f0000000bc0), 0x0, 0x20000000, &(0x7f0000000c40)={0xa, 0x4e20, 0x0, @dev={0xfe, 0x80, [], 0x19}, 0x1f}, 0x1c) accept$alg(r1, 0x0, 0x0) sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f0000000000)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x8}, 0xb4fcd35419244434, &(0x7f00004ca000)={&(0x7f0000000300)=ANY=[], 0x1a1}, 0x1}, 0x0) syz_fuseblk_mount(&(0x7f0000001380)='./file0\x00', &(0x7f00000013c0)='./file0\x00', 0xf000, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0xb21, 0x0) socket(0x1e, 0x3, 0x0) socket(0x1e, 0x0, 0x0) ptrace$PTRACE_SECCOMP_GET_FILTER(0x420c, r0, 0x2, &(0x7f00000005c0)=""/113) sched_yield() ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_CLIENT(r5, 0xc0bc5351, &(0x7f0000000200)={0xb4, 0x1, 'client1\x00', 0x4, "995718557d6f0d4e", "c4e950bfd93bf00f28b260710d07ebcd1ec0d4b047223f4d6f89ee3f1a8820eb", 0x1, 0xe20}) ioctl$TUNGETIFF(r5, 0x800454d2, &(0x7f0000000140)) ioctl$KIOCSOUND(r5, 0x4b2f, 0xfffffffffffffb74) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x20, 0x9b}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getpid() mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000447000)='./file0\x00', &(0x7f00000e1000)='msdos\x00', 0x0, &(0x7f000097bfff)) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000580)='./cgroup/syz0\x00', 0x1ff) 2018/03/31 09:15:21 executing program 3: r0 = syz_open_dev$random(&(0x7f00000001c0)='/dev/random\x00', 0x0, 0x800) ioctl$LOOP_SET_STATUS(0xffffffffffffffff, 0xc0481273, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "3900ea631d00000000020000010000009f00000023f7b7d65f90b0e6330ee739b319d8f6aa6bd58d1443474482e85040fb4947ebb55bd19f335b5bffff0001f3", "cfa430745a540dc1c149b7b81579f6a41c51f7d51933223e82ab867dac761faf"}) write(0xffffffffffffffff, &(0x7f00000001c0), 0x0) setsockopt$inet_sctp6_SCTP_RECVNXTINFO(0xffffffffffffffff, 0x84, 0x21, &(0x7f00000003c0)=0x200, 0x4) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f00000000c0)=0x0) getsockopt$netrom_NETROM_T4(0xffffffffffffffff, 0x103, 0x6, &(0x7f0000000300)=0x8, &(0x7f0000000340)=0x4) r2 = getpid() sched_setparam(r2, &(0x7f0000000400)) syz_open_dev$loop(&(0x7f0000ca9ff5)='/dev/loop#\x00', 0x0, 0x82) r3 = memfd_create(&(0x7f0000614000)="74086e750000000000000000008c00", 0x0) pwritev(r3, &(0x7f0000f50f90)=[{&(0x7f0000000040)="aa", 0x1}], 0x1, 0x0) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000240)={0x0, 0x0}) r5 = syz_open_procfs(r4, &(0x7f0000000280)='stat\x00') epoll_ctl$EPOLL_CTL_MOD(r3, 0x3, r0, &(0x7f00000002c0)={0x20000010}) accept4$inet6(r3, &(0x7f0000000100)={0x0, 0x0, 0x0, @mcast1}, &(0x7f0000000140)=0x1c, 0x7fd) getsockopt$inet_IP_IPSEC_POLICY(r3, 0x0, 0x10, &(0x7f0000000940)={{{@in6=@local, @in6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@loopback}, 0x0, @in=@local}}, &(0x7f0000000780)=0xe8) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f00000007c0)={0x0, 0x0, 0x0}, &(0x7f0000000540)=0xc) fchown(r3, r6, r7) r8 = syz_open_dev$binder(&(0x7f0000000100)='/dev/binder#\x00', 0xffffffffffffffff, 0x806) ioctl$BINDER_SET_CONTEXT_MGR(r5, 0x40046207, 0x0) mmap$binder(&(0x7f000000c000/0x2000)=nil, 0x2000, 0x0, 0x12, r8, 0x0) ioctl$BINDER_WRITE_READ(r8, 0xc0306201, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000), 0x0, 0x0, &(0x7f0000011f9d)}) getsockopt$inet_sctp6_SCTP_AUTO_ASCONF(0xffffffffffffffff, 0x84, 0x1e, &(0x7f0000000140), &(0x7f0000000180)=0x4) ioctl$BINDER_WRITE_READ(r8, 0xc0306201, &(0x7f0000000340)={0x8, 0x0, &(0x7f0000000440)=ANY=[@ANYRES64], 0x0, 0x0, &(0x7f0000000240)}) write(0xffffffffffffffff, &(0x7f0000000300)="8be25f5790f664f32509e40d6f879d5add7e2d359c9a19afb750a2d25352875d187d4118c99a2d5c6db433c277cc7d345b87a34f1b417033d367cb0cfd6a25633f77aafb17e99c33cb65352c901ae75176f07bb0a4bb5ebff3d87e", 0x5b) r9 = ioctl$LOOP_CTL_GET_FREE(r3, 0x4c82) ioctl$LOOP_CTL_REMOVE(r5, 0x4c81, r9) openat$cgroup(0xffffffffffffff9c, &(0x7f0000000000)='syz0\x00', 0x200002, 0x0) sched_setaffinity(r1, 0x8, &(0x7f0000000200)=0x7) 2018/03/31 09:15:21 executing program 1: perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f000031f000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) prctl$void(0x0) r0 = getpid() syz_open_dev$vcsn(&(0x7f0000000040)='/dev/vcs#\x00', 0x400, 0x20000) r1 = socket$alg(0x26, 0x5, 0x0) ioctl$sock_SIOCGIFBR(r1, 0x8940, &(0x7f0000000040)=@get={0x1, &(0x7f0000000400)=""/242, 0x100000000}) bind$alg(r1, &(0x7f0000000080)={0x26, 'aead\x00', 0x0, 0x0, 'generic-gcm-aesni\x00'}, 0x58) r2 = syz_open_dev$sndmidi(&(0x7f0000000100)='/dev/snd/midiC#D#\x00', 0xfd, 0x0) bind(r2, &(0x7f0000000140)=@llc={0x1a, 0x33a, 0x7, 0x80, 0x0, 0x4, @remote={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xbb}}, 0x80) r3 = syz_init_net_socket$nfc_llcp(0x27, 0x1, 0x1) setsockopt$nfc_llcp_NFC_LLCP_MIUX(r3, 0x118, 0x15, &(0x7f0000000000), 0x4) r4 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000340)='/dev/cuse\x00', 0x8000000105007, 0x0) futimesat(r4, &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)={{0x0, 0x7530}}) r5 = syz_open_dev$vcsa(&(0x7f00000001c0)='/dev/vcsa#\x00', 0x2, 0x4020ff) sendto$inet6(r5, &(0x7f0000000bc0), 0x0, 0x20000000, &(0x7f0000000c40)={0xa, 0x4e20, 0x6, @dev={0xfe, 0x80, [], 0x19}, 0x1f}, 0x1c) sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f0000000000)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x8}, 0xb4fcd35419244434, &(0x7f00004ca000)={&(0x7f0000000300)=ANY=[], 0x1a1}, 0x1}, 0x0) syz_open_procfs(r0, &(0x7f0000000200)='wchan\x00') syz_fuseblk_mount(&(0x7f0000001380)='./file0\x00', &(0x7f00000013c0)='./file0\x00', 0xf000, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0xb21, 0x0) socket(0x1e, 0x3, 0x0) ptrace$PTRACE_SECCOMP_GET_FILTER(0x420c, 0x0, 0x0, &(0x7f0000000380)=""/113) sched_yield() ioctl$TUNGETIFF(r5, 0x800454d2, &(0x7f0000000140)) ioctl$KIOCSOUND(r5, 0x4b2f, 0xfffffffffffffb74) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x20, 0x9b}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000447000)='./file0\x00', &(0x7f00000e1000)='msdos\x00', 0x0, &(0x7f000097bfff)) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000580)='./cgroup/syz0\x00', 0x1ff) syz_open_dev$audion(&(0x7f0000000280)='/dev/audio#\x00', 0x7be, 0x0) fcntl$getown(0xffffffffffffffff, 0x9) 2018/03/31 09:15:21 executing program 2: syz_open_dev$loop(&(0x7f00000003c0)='/dev/loop#\x00', 0x8, 0x0) r0 = syz_open_dev$sndseq(&(0x7f00000001c0)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r0, 0x4040534e, &(0x7f000019ffe9)={0xc1}) r1 = accept(0xffffffffffffffff, &(0x7f0000000080)=@can, &(0x7f0000000180)=0x80) ioctl$sock_ipx_SIOCAIPXPRISLT(r1, 0x89e1, &(0x7f0000000280)=0x3f) ioctl$sock_inet_SIOCRTMSG(r1, 0x890d, &(0x7f0000000200)={0x80, {0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x19}}, {0x2, 0x4e21, @local={0xac, 0x14, 0x14, 0xaa}}, {0x2, 0x4e23}, 0x0, 0x7, 0x1, 0x0, 0x9, 0x0, 0x0, 0x0, 0xfffffffffffffff7}) getsockopt$inet_sctp_SCTP_PRIMARY_ADDR(0xffffffffffffffff, 0x84, 0x6, &(0x7f0000000ac0)={0x0, @in={{0x2, 0x4e20, @loopback=0x7f000001}}}, &(0x7f00000002c0)=0x84) r3 = syz_open_dev$sg(&(0x7f0000000700)='/dev/sg#\x00', 0xfffffffffffffff7, 0x800) clone(0x2000c100, &(0x7f0000000800)="97bb77038add5df9e9d4f9783b82c55fe59e5c0acdbcfc9bcf92ac0e1f1f3c1959c1d25dfabf3849336c7c85be174d7765b47e113632aea54b87e4d3f2c1db09e6aa4040b43d17308fb7e62e808067da2fff3cfd8e4c038c814bbfc6bc49d8ebc8671d8297e2d34dc61f2d194d2dbb8f59b4c853e0714d3d4bb29d1243fac01c86c8c4dd38daedab3c6ad73a72d3f6dd2684aa82e5285eb82452c9848b7beb8bc513ba8c8973cad0bd5926604846b7f5d0397b", &(0x7f00000008c0), &(0x7f0000000900), &(0x7f0000000940)="ed6c04412e782fe395f084741e3d9fe469aebde09acc8f8d8d84d1f00f5573b09acba487077ebb904cb1f3fed55f59d677ce24bbd2a7506df8e1e0d0fc709cb8c9f4ab2aeeeebc5ef879742c1f7628f1862c88b5b0da89acbf43ef12e4839405b6a3430d296fea06d2f3a8356c57ec991e") ioctl$SNDRV_SEQ_IOCTL_SUBSCRIBE_PORT(r0, 0x40505330, &(0x7f0000ec6fb0)={{}, {0x80}}) getsockopt$netrom_NETROM_T1(r1, 0x103, 0x1, &(0x7f0000000000), &(0x7f0000000380)=0x4) syz_open_dev$adsp(&(0x7f0000000600)='/dev/adsp#\x00', 0x100000000, 0x80000) rt_sigprocmask(0x3d738072cd0f41ac, &(0x7f0000000cc0)={0x7}, &(0x7f0000000d00), 0x8) clone(0x40000000, &(0x7f0000000500)="67cdd9994c47c31d325b069924a7064c157c2ec0b5b5dca2feeb7dabef3b7af0d02d559e293faa759f2b3cb12aea360c2d", &(0x7f0000000580), &(0x7f00000005c0), &(0x7f0000000a00)="29859fdda9a119e54a27f9ec76b4d63a16dc5bbdd38c2fda0e5f4d8f830cd987ec7d3ffc66cf3db8820968fd89a1fba8fe6352a29a27f3b000bcdf238f2c04b358fc831025180e0be313da41de6366c94a1a0f86aaffdf2c039111b55275c054e14819a827fe809225249a01944263a2aec15f64e752e35892b1b8e7ef1e0e9115") ioctl$SNDRV_SEQ_IOCTL_DELETE_PORT(r0, 0x40a85321, &(0x7f0000000b80)={{0x4, 0x8}, 'port0\x00', 0x80, 0x0, 0x10000, 0x6, 0x2, 0x80, 0x8, 0x0, 0x0, 0x3dec00}) getsockopt$inet_sctp_SCTP_SOCKOPT_PEELOFF(r3, 0x84, 0x66, &(0x7f0000000c40)={r2, 0x6}, &(0x7f0000000c80)=0x8) clock_settime(0x7, &(0x7f0000000740)={0x77359400}) ioctl$SNDRV_SEQ_IOCTL_CLIENT_ID(r0, 0x80045301, &(0x7f0000000340)) r4 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer2\x00', 0x0, 0x0) openat$sequencer2(0xffffffffffffff9c, &(0x7f00000006c0)='/dev/sequencer2\x00', 0x222081, 0x0) ioctl$RNDADDENTROPY(0xffffffffffffffff, 0x40085203, &(0x7f0000000100)=ANY=[@ANYPTR=&(0x7f0000000680)=ANY=[@ANYPTR64=&(0x7f0000000640)=ANY=[@ANYPTR, @ANYPTR]]]) setsockopt$inet_sctp_SCTP_DEFAULT_SEND_PARAM(r4, 0x84, 0xa, &(0x7f0000000140)={0x5, 0x100000001, 0x0, 0x8, 0x0, 0x7, 0x401, 0x1f, r2}, 0x20) 2018/03/31 09:15:21 executing program 6: perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f000031f000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) prctl$void(0x0) getpid() r0 = syz_open_dev$vcsn(&(0x7f0000000040)='/dev/vcs#\x00', 0x0, 0x20000) ioctl$GIO_CMAP(r0, 0x4b70, &(0x7f0000000080)) r1 = socket$alg(0x26, 0x5, 0x0) ioctl$sock_SIOCGIFBR(0xffffffffffffffff, 0x8940, &(0x7f0000000040)=@get={0x1, &(0x7f0000000400)=""/242, 0x100000000}) bind$alg(r1, &(0x7f0000000080)={0x26, 'aead\x00', 0x0, 0x0, 'generic-gcm-aesni\x00'}, 0x58) syz_open_dev$sndmidi(&(0x7f0000000100)='/dev/snd/midiC#D#\x00', 0xfd, 0x0) bind(0xffffffffffffffff, &(0x7f0000000140)=@llc={0x1a, 0x33a, 0x7, 0x80, 0x0, 0x4, @remote={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xbb}}, 0x80) r2 = syz_init_net_socket$nfc_llcp(0x27, 0x1, 0x1) setsockopt$nfc_llcp_NFC_LLCP_MIUX(r2, 0x118, 0x15, &(0x7f0000000000), 0x4) r3 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/cuse\x00', 0x103002, 0x0) futimesat(r3, &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)={{0x0, 0x7530}}) r4 = syz_open_dev$vcsa(&(0x7f00000001c0)='/dev/vcsa#\x00', 0x2, 0x0) sendto$inet6(r4, &(0x7f0000000bc0), 0x0, 0x0, &(0x7f0000000c40)={0xa, 0x4e20, 0x0, @dev={0xfe, 0x80, [], 0x19}, 0x1f}, 0x1c) accept$alg(r0, 0x0, 0x0) sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f0000000000)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x8}, 0xb4fcd35419244434, &(0x7f00004ca000)={&(0x7f0000000300)=ANY=[], 0x1a1}, 0x1}, 0x0) syz_fuseblk_mount(&(0x7f0000001380)='./file0\x00', &(0x7f00000013c0)='./file0\x00', 0xf000, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0xb21, 0x0) socket(0x1e, 0x3, 0x0) socket(0x1e, 0x0, 0x0) ptrace$PTRACE_SECCOMP_GET_FILTER(0x420c, 0x0, 0x0, &(0x7f0000000380)=""/113) sched_yield() ioctl$TUNGETIFF(r4, 0x800454d2, &(0x7f0000000140)) ioctl$KIOCSOUND(r4, 0x4b2f, 0xfffffffffffffb74) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x20, 0x9b}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000447000)='./file0\x00', &(0x7f00000e1000)='msdos\x00', 0x0, &(0x7f000097bfff)) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000580)='./cgroup/syz0\x00', 0x1ff) 2018/03/31 09:15:21 executing program 7 (fault-call:24 fault-nth:4): perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f000031f000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getpid() r0 = syz_open_dev$vcsn(&(0x7f0000000040)='/dev/vcs#\x00', 0x0, 0x20000) ioctl$GIO_CMAP(r0, 0x4b70, &(0x7f0000000080)) r1 = socket$alg(0x26, 0x5, 0x0) ioctl$sock_SIOCGIFBR(r1, 0x8940, &(0x7f0000000040)=@get={0x1, &(0x7f0000000400)=""/242, 0x100000000}) bind$alg(r1, &(0x7f0000000080)={0x26, 'aead\x00', 0x0, 0x0, 'generic-gcm-aesni\x00'}, 0x58) syz_open_dev$sndmidi(&(0x7f0000000100)='/dev/snd/midiC#D#\x00', 0xfd, 0x0) bind(0xffffffffffffffff, &(0x7f0000000140)=@llc={0x1a, 0x33a, 0x7, 0x80, 0x5, 0x4, @remote={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xbb}}, 0x80) r2 = syz_init_net_socket$nfc_llcp(0x27, 0x1, 0x1) setsockopt$nfc_llcp_NFC_LLCP_MIUX(r2, 0x118, 0x15, &(0x7f0000000000), 0x4) r3 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/cuse\x00', 0x103002, 0x0) futimesat(r3, &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)={{0x0, 0x7530}}) r4 = syz_open_dev$vcsa(&(0x7f00000001c0)='/dev/vcsa#\x00', 0x2, 0x4020ff) sendto$inet6(r4, &(0x7f0000000bc0)="36251e313e0743fc195a1a198a14434e8a0a00b3f452a3b5644e336ec712a16310c9aecc4e3097bc666a8882128a73c368ce731e9fbf3fe18fa52d00", 0x3c, 0x20000000, &(0x7f0000000c40)={0xa, 0x0, 0x6, @dev={0xfe, 0x80, [], 0x19}, 0x1f}, 0x1c) accept$alg(r0, 0x0, 0x0) sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f0000000000)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x8}, 0xb4fcd35419244434, &(0x7f00004ca000)={&(0x7f0000000300)=ANY=[], 0x1a1}, 0x1}, 0x0) syz_fuseblk_mount(&(0x7f0000001380)='./file0\x00', &(0x7f00000013c0)='./file0\x00', 0xf000, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0xb21, 0x0) socket(0x1e, 0x3, 0x0) socket(0x1e, 0x0, 0x0) ptrace$PTRACE_SECCOMP_GET_FILTER(0x420c, 0x0, 0x0, &(0x7f0000000380)=""/113) sched_yield() ioctl$TUNGETIFF(r4, 0x800454d2, &(0x7f0000000140)) ioctl$KIOCSOUND(r4, 0x4b2f, 0xfffffffffffffb74) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000447000)='./file0\x00', &(0x7f00000e1000)='msdos\x00', 0x0, &(0x7f000097bfff)) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000580)='./cgroup/syz0\x00', 0x1ff) syz_open_dev$audion(&(0x7f0000000280)='/dev/audio#\x00', 0x7be, 0x0) 2018/03/31 09:15:21 executing program 5: perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f000031f000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) prctl$void(0x0) getpid() r0 = syz_open_dev$vcsn(&(0x7f0000000040)='/dev/vcs#\x00', 0x0, 0x20000) ioctl$GIO_CMAP(r0, 0x4b70, &(0x7f0000000080)) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000080)={0x26, 'aead\x00', 0x0, 0x0, 'generic-gcm-aesni\x00'}, 0x58) r2 = syz_open_dev$sndmidi(&(0x7f0000000100)='/dev/snd/midiC#D#\x00', 0xfd, 0x0) bind(0xffffffffffffffff, &(0x7f0000000140)=@llc={0x1a, 0x33a, 0x7, 0x80, 0x5, 0x4, @remote={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xbb}}, 0x80) r3 = syz_init_net_socket$nfc_llcp(0x27, 0x1, 0x1) setsockopt$nfc_llcp_NFC_LLCP_MIUX(r3, 0x118, 0x15, &(0x7f0000000000), 0x4) r4 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/cuse\x00', 0x103002, 0x0) futimesat(r4, &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)={{0x0, 0x7530}}) r5 = syz_open_dev$vcsa(&(0x7f00000001c0)='/dev/vcsa#\x00', 0x2, 0x4020ff) sendto$inet6(0xffffffffffffffff, &(0x7f0000000bc0)="36251e313e0743fc195a1a198a14434e8a0a00b3f452a3b5644e336ec712a16310c9aecc4e3097bc666a8882128a73c368ce731e9fbf3fe18fa52d", 0x3b, 0x20000000, &(0x7f0000000c40)={0xa, 0x4e20, 0x6, @dev={0xfe, 0x80, [], 0x19}, 0x1f}, 0x1c) accept$alg(r0, 0x0, 0x0) sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f0000000000)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x8}, 0xb4fcd35419244434, &(0x7f00004ca000)={&(0x7f0000000300)=ANY=[], 0x1a1}, 0x1}, 0x0) syz_fuseblk_mount(&(0x7f0000001380)='./file0\x00', &(0x7f00000013c0)='./file0\x00', 0xf000, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0xb21, 0x0) socket(0x1e, 0x3, 0x0) socket(0x1e, 0x0, 0x0) ptrace$PTRACE_SECCOMP_GET_FILTER(0x420c, 0x0, 0x0, &(0x7f0000000380)=""/113) sched_yield() ioctl$TUNGETIFF(r5, 0x800454d2, &(0x7f0000000140)) ioctl$KIOCSOUND(r5, 0x4b2f, 0xfffffffffffffb74) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x20, 0x9b}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000447000)='./file0\x00', &(0x7f00000e1000)='msdos\x00', 0x0, &(0x7f000097bfff)) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000580)='./cgroup/syz0\x00', 0x1ff) ioctl$KVM_GET_EMULATED_CPUID(r2, 0xc008ae09, &(0x7f00000002c0)=""/173) syz_open_dev$audion(&(0x7f0000000280)='/dev/audio#\x00', 0x7be, 0x0) [ 314.575472] binder: 31007:31014 unknown command -1 [ 314.584764] FAT-fs (loop199): unable to read boot sector [ 314.590462] binder: 31007:31014 ioctl c0306201 20000340 returned -22 2018/03/31 09:15:21 executing program 3: r0 = syz_open_dev$random(&(0x7f00000001c0)='/dev/random\x00', 0x0, 0x800) r1 = syz_open_dev$loop(&(0x7f0000308000)='/dev/loop#\x00', 0x0, 0x0) ioctl$LOOP_SET_STATUS(r1, 0xc0481273, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "3900ea631d00000000020000010000009f00000023f7b7d65f90b0e6330ee739b319d8f6aa6bd58d1443474482e85040fb4947ebb55bd19f335b5bffff0001f3", "cfa430745a540dc1c149b7b81579f6a41c51f7d51933223e82ab867dac761faf"}) write(0xffffffffffffffff, &(0x7f00000001c0), 0x0) setsockopt$inet_sctp6_SCTP_RECVNXTINFO(0xffffffffffffffff, 0x84, 0x21, &(0x7f00000003c0)=0x200, 0x4) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f00000000c0)=0x0) getsockopt$netrom_NETROM_T4(0xffffffffffffffff, 0x103, 0x6, &(0x7f0000000300)=0x8, &(0x7f0000000340)=0x4) r3 = getpid() sched_setparam(r3, &(0x7f0000000400)) syz_open_dev$loop(&(0x7f0000ca9ff5)='/dev/loop#\x00', 0x0, 0x82) r4 = memfd_create(&(0x7f0000614000)="74086e750000000000000000008c00", 0x0) pwritev(r4, &(0x7f0000f50f90)=[{&(0x7f0000000040)="aa", 0x1}], 0x1, 0x0) r5 = syz_open_procfs(0x0, &(0x7f0000000280)='stat\x00') epoll_ctl$EPOLL_CTL_MOD(r4, 0x3, r0, &(0x7f00000002c0)={0x20000010}) accept4$inet6(r4, &(0x7f0000000100)={0x0, 0x0, 0x0, @mcast1}, &(0x7f0000000140)=0x1c, 0x7fd) getsockopt$inet_IP_IPSEC_POLICY(r4, 0x0, 0x10, &(0x7f0000000940)={{{@in6=@local, @in6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@loopback}, 0x0, @in=@local}}, &(0x7f0000000780)=0xe8) getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f00000007c0)={0x0, 0x0, 0x0}, &(0x7f0000000540)=0xc) fchown(r4, r6, r7) r8 = syz_open_dev$binder(&(0x7f0000000100)='/dev/binder#\x00', 0xffffffffffffffff, 0x806) ioctl$BINDER_SET_CONTEXT_MGR(r5, 0x40046207, 0x0) mmap$binder(&(0x7f000000c000/0x2000)=nil, 0x2000, 0x0, 0x12, r8, 0x0) ioctl$BINDER_WRITE_READ(r8, 0xc0306201, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000), 0x0, 0x0, &(0x7f0000011f9d)}) getsockopt$inet_sctp6_SCTP_AUTO_ASCONF(0xffffffffffffffff, 0x84, 0x1e, &(0x7f0000000140), &(0x7f0000000180)=0x4) ioctl$BINDER_WRITE_READ(r8, 0xc0306201, &(0x7f0000000340)={0x8, 0x0, &(0x7f0000000440)=ANY=[@ANYRES64=r1], 0x0, 0x0, &(0x7f0000000240)}) write(0xffffffffffffffff, &(0x7f0000000300)="8be25f5790f664f32509e40d6f879d5add7e2d359c9a19afb750a2d25352875d187d4118c99a2d5c6db433c277cc7d345b87a34f1b417033d367cb0cfd6a25633f77aafb17e99c33cb65352c901ae75176f07bb0a4bb5ebff3d87e", 0x5b) r9 = ioctl$LOOP_CTL_GET_FREE(r4, 0x4c82) ioctl$LOOP_CTL_REMOVE(r5, 0x4c81, r9) openat$cgroup(0xffffffffffffff9c, &(0x7f0000000000)='syz0\x00', 0x200002, 0x0) sched_setaffinity(r2, 0x8, &(0x7f0000000200)=0x7) 2018/03/31 09:15:21 executing program 6: perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f000031f000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) prctl$void(0x0) getpid() r0 = syz_open_dev$vcsn(&(0x7f0000000040)='/dev/vcs#\x00', 0x0, 0x20000) ioctl$GIO_CMAP(r0, 0x4b70, &(0x7f0000000080)) r1 = socket$alg(0x26, 0x5, 0x0) ioctl$sock_SIOCGIFBR(0xffffffffffffffff, 0x8940, &(0x7f0000000040)=@get={0x1, &(0x7f0000000400)=""/242, 0x100000000}) bind$alg(r1, &(0x7f0000000080)={0x26, 'aead\x00', 0x0, 0x0, 'generic-gcm-aesni\x00'}, 0x58) syz_open_dev$sndmidi(&(0x7f0000000100)='/dev/snd/midiC#D#\x00', 0xfd, 0x0) bind(0xffffffffffffffff, &(0x7f0000000140)=@llc={0x1a, 0x33a, 0x7, 0x80, 0x0, 0x4, @remote={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xbb}}, 0x80) r2 = syz_init_net_socket$nfc_llcp(0x27, 0x1, 0x1) setsockopt$nfc_llcp_NFC_LLCP_MIUX(r2, 0x118, 0x15, &(0x7f0000000000), 0x4) r3 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/cuse\x00', 0x103002, 0x0) futimesat(r3, &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)={{0x0, 0x7530}}) r4 = syz_open_dev$vcsa(&(0x7f00000001c0)='/dev/vcsa#\x00', 0x2, 0x0) sendto$inet6(r4, &(0x7f0000000bc0), 0x0, 0x20000000, &(0x7f0000000c40)={0xa, 0x0, 0x0, @dev={0xfe, 0x80, [], 0x19}, 0x1f}, 0x1c) accept$alg(r0, 0x0, 0x0) sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f0000000000)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x8}, 0xb4fcd35419244434, &(0x7f00004ca000)={&(0x7f0000000300)=ANY=[], 0x1a1}, 0x1}, 0x0) syz_fuseblk_mount(&(0x7f0000001380)='./file0\x00', &(0x7f00000013c0)='./file0\x00', 0xf000, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0xb21, 0x0) socket(0x1e, 0x3, 0x0) socket(0x1e, 0x0, 0x0) ptrace$PTRACE_SECCOMP_GET_FILTER(0x420c, 0x0, 0x0, &(0x7f0000000380)=""/113) sched_yield() ioctl$TUNGETIFF(r4, 0x800454d2, &(0x7f0000000140)) ioctl$KIOCSOUND(r4, 0x4b2f, 0xfffffffffffffb74) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x20, 0x9b}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000447000)='./file0\x00', &(0x7f00000e1000)='msdos\x00', 0x0, &(0x7f000097bfff)) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000580)='./cgroup/syz0\x00', 0x1ff) 2018/03/31 09:15:21 executing program 5: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x9, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f000031f000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) prctl$void(0x0) getpid() r0 = syz_open_dev$vcsn(&(0x7f0000000040)='/dev/vcs#\x00', 0x0, 0x20000) ioctl$GIO_CMAP(r0, 0x4b70, &(0x7f0000000080)) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000080)={0x26, 'aead\x00', 0x0, 0x0, 'generic-gcm-aesni\x00'}, 0x58) syz_open_dev$sndmidi(&(0x7f0000000100)='/dev/snd/midiC#D#\x00', 0xfd, 0x0) bind(0xffffffffffffffff, &(0x7f0000000140)=@llc={0x1a, 0x33a, 0x7, 0x80, 0x5, 0x4, @remote={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xbb}}, 0x80) r2 = syz_init_net_socket$nfc_llcp(0x27, 0x2, 0x1) setsockopt$nfc_llcp_NFC_LLCP_MIUX(r2, 0x118, 0x15, &(0x7f0000000000), 0x4) r3 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/cuse\x00', 0x103002, 0x0) futimesat(r3, &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)={{0x0, 0x7530}}) r4 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r4, &(0x7f0000f56000)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f0000da9000)=ANY=[@ANYBLOB="020300090e00ee300611b36ffbab000005000600000000000a00000000000000d56fb4de5fbc1fa9e0627f851f04000000000000000000000000000000000000000000000000020001070000000000000002000000000500000000000a00000000000000ff0100000000000000000000"], 0x70}, 0x1}, 0x0) r5 = msgget$private(0x0, 0x1) msgctl$IPC_STAT(r5, 0x2, &(0x7f0000000580)=""/192) r6 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000180)='/dev/rtc\x00', 0x501000, 0x0) stat(&(0x7f0000000100)='./file0\x00', &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, 0x0}) r8 = add_key$keyring(&(0x7f0000000140)='keyring\x00', &(0x7f0000000480)={0x73, 0x79, 0x7a, 0x1}, 0x0, 0x0, 0xfffffffffffffffb) keyctl$get_persistent(0x16, r7, r8) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(0xffffffffffffff9c, 0x84, 0x66, &(0x7f00000001c0)={0x0, 0xffffffffffffffff}, &(0x7f0000000200)=0x8) setsockopt$inet_sctp_SCTP_PEER_ADDR_THLDS(0xffffffffffffffff, 0x84, 0x1f, &(0x7f0000000240)={r9, @in={{0x2, 0x0, @loopback=0x7f000001}}, 0x3, 0x3}, 0x90) getsockopt$inet_IP_XFRM_POLICY(r6, 0x0, 0x11, &(0x7f0000000300)={{{@in6=@loopback, @in6=@dev}}, {{@in=@remote}, 0x0, @in6=@remote}}, &(0x7f00000000c0)=0xe8) syz_open_dev$vcsa(&(0x7f00000001c0)='/dev/vcsa#\x00', 0x2, 0x4002) sendto$inet6(0xffffffffffffffff, &(0x7f0000000bc0)="36251e313e0743fc195a1a198a14434e8a0a00b3f452a3b5644e336ec712a16310c9aecc4e3097bc666a8882128a73c368ce731e9fbf3fe18fa52d", 0x3b, 0x20000000, &(0x7f0000000c40)={0xa, 0x4e20, 0x6, @dev={0xfe, 0x80, [], 0x19}, 0x1f}, 0x1c) accept$alg(r0, 0x0, 0x0) sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f0000000000)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x8}, 0xb4fcd35419244434, &(0x7f00004ca000)={&(0x7f0000000300)=ANY=[], 0x1a1}, 0x1}, 0x0) syz_fuseblk_mount(&(0x7f0000001380)='./file0\x00', &(0x7f00000013c0)='./file0\x00', 0xf000, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0xb21, 0x0) socket(0x1e, 0x3, 0x0) [ 314.592700] FAT-fs (loop199): unable to read boot sector [ 314.613540] binder: 31007:31014 ioctl c0306201 20000340 returned -14 2018/03/31 09:15:21 executing program 7 (fault-call:24 fault-nth:5): perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f000031f000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getpid() r0 = syz_open_dev$vcsn(&(0x7f0000000040)='/dev/vcs#\x00', 0x0, 0x20000) ioctl$GIO_CMAP(r0, 0x4b70, &(0x7f0000000080)) r1 = socket$alg(0x26, 0x5, 0x0) ioctl$sock_SIOCGIFBR(r1, 0x8940, &(0x7f0000000040)=@get={0x1, &(0x7f0000000400)=""/242, 0x100000000}) bind$alg(r1, &(0x7f0000000080)={0x26, 'aead\x00', 0x0, 0x0, 'generic-gcm-aesni\x00'}, 0x58) syz_open_dev$sndmidi(&(0x7f0000000100)='/dev/snd/midiC#D#\x00', 0xfd, 0x0) bind(0xffffffffffffffff, &(0x7f0000000140)=@llc={0x1a, 0x33a, 0x7, 0x80, 0x5, 0x4, @remote={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xbb}}, 0x80) r2 = syz_init_net_socket$nfc_llcp(0x27, 0x1, 0x1) setsockopt$nfc_llcp_NFC_LLCP_MIUX(r2, 0x118, 0x15, &(0x7f0000000000), 0x4) r3 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/cuse\x00', 0x103002, 0x0) futimesat(r3, &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)={{0x0, 0x7530}}) r4 = syz_open_dev$vcsa(&(0x7f00000001c0)='/dev/vcsa#\x00', 0x2, 0x4020ff) sendto$inet6(r4, &(0x7f0000000bc0)="36251e313e0743fc195a1a198a14434e8a0a00b3f452a3b5644e336ec712a16310c9aecc4e3097bc666a8882128a73c368ce731e9fbf3fe18fa52d00", 0x3c, 0x20000000, &(0x7f0000000c40)={0xa, 0x0, 0x6, @dev={0xfe, 0x80, [], 0x19}, 0x1f}, 0x1c) accept$alg(r0, 0x0, 0x0) sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f0000000000)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x8}, 0xb4fcd35419244434, &(0x7f00004ca000)={&(0x7f0000000300)=ANY=[], 0x1a1}, 0x1}, 0x0) syz_fuseblk_mount(&(0x7f0000001380)='./file0\x00', &(0x7f00000013c0)='./file0\x00', 0xf000, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0xb21, 0x0) socket(0x1e, 0x3, 0x0) socket(0x1e, 0x0, 0x0) ptrace$PTRACE_SECCOMP_GET_FILTER(0x420c, 0x0, 0x0, &(0x7f0000000380)=""/113) sched_yield() ioctl$TUNGETIFF(r4, 0x800454d2, &(0x7f0000000140)) ioctl$KIOCSOUND(r4, 0x4b2f, 0xfffffffffffffb74) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000447000)='./file0\x00', &(0x7f00000e1000)='msdos\x00', 0x0, &(0x7f000097bfff)) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000580)='./cgroup/syz0\x00', 0x1ff) syz_open_dev$audion(&(0x7f0000000280)='/dev/audio#\x00', 0x7be, 0x0) [ 314.613795] FAT-fs (loop199): unable to read boot sector [ 314.624780] FAT-fs (loop199): unable to read boot sector 2018/03/31 09:15:21 executing program 6: perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f000031f000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) prctl$void(0x0) getpid() r0 = syz_open_dev$vcsn(&(0x7f0000000040)='/dev/vcs#\x00', 0x0, 0x20000) ioctl$GIO_CMAP(r0, 0x4b70, &(0x7f0000000080)) r1 = socket$alg(0x26, 0x5, 0x0) ioctl$sock_SIOCGIFBR(0xffffffffffffffff, 0x8940, &(0x7f0000000040)=@get={0x1, &(0x7f0000000400)=""/242, 0x100000000}) bind$alg(r1, &(0x7f0000000080)={0x26, 'aead\x00', 0x0, 0x0, 'generic-gcm-aesni\x00'}, 0x58) syz_open_dev$sndmidi(&(0x7f0000000100)='/dev/snd/midiC#D#\x00', 0xfd, 0x0) bind(0xffffffffffffffff, &(0x7f0000000140)=@llc={0x1a, 0x33a, 0x7, 0x80, 0x0, 0x4, @remote={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xbb}}, 0x80) r2 = syz_init_net_socket$nfc_llcp(0x27, 0x1, 0x1) setsockopt$nfc_llcp_NFC_LLCP_MIUX(r2, 0x118, 0x15, &(0x7f0000000000), 0x4) r3 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/cuse\x00', 0x103002, 0x0) futimesat(r3, &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)={{0x0, 0x7530}}) r4 = syz_open_dev$vcsa(&(0x7f00000001c0)='/dev/vcsa#\x00', 0x2, 0x0) sendto$inet6(r4, &(0x7f0000000bc0), 0x0, 0x20000000, &(0x7f0000000c40)={0xa, 0x0, 0x0, @dev={0xfe, 0x80, [], 0x19}, 0x1f}, 0x1c) accept$alg(r0, 0x0, 0x0) sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f0000000000)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x8}, 0xb4fcd35419244434, &(0x7f00004ca000)={&(0x7f0000000300)=ANY=[], 0x1a1}, 0x1}, 0x0) syz_fuseblk_mount(&(0x7f0000001380)='./file0\x00', &(0x7f00000013c0)='./file0\x00', 0xf000, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0xb21, 0x0) socket(0x1e, 0x3, 0x0) socket(0x1e, 0x0, 0x0) ptrace$PTRACE_SECCOMP_GET_FILTER(0x420c, 0x0, 0x0, &(0x7f0000000380)=""/113) sched_yield() ioctl$TUNGETIFF(r4, 0x800454d2, &(0x7f0000000140)) ioctl$KIOCSOUND(r4, 0x4b2f, 0xfffffffffffffb74) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x20, 0x9b}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000447000)='./file0\x00', &(0x7f00000e1000)='msdos\x00', 0x0, &(0x7f000097bfff)) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000580)='./cgroup/syz0\x00', 0x1ff) [ 314.638613] FAT-fs (loop199): unable to read boot sector [ 314.646683] FAULT_INJECTION: forcing a failure. [ 314.646683] name failslab, interval 1, probability 0, space 0, times 0 [ 314.646694] CPU: 1 PID: 31026 Comm: syz-executor7 Not tainted 4.16.0-rc7+ #8 [ 314.646700] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 314.646703] Call Trace: [ 314.646716] dump_stack+0x194/0x24d [ 314.646731] ? arch_local_irq_restore+0x53/0x53 [ 314.646750] ? percpu_ref_put_many+0x132/0x220 [ 314.646761] ? memcg_kmem_charge_memcg+0x74/0x110 [ 314.646782] should_fail+0x8c0/0xa40 [ 314.646797] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 314.646825] ? find_held_lock+0x35/0x1d0 [ 314.646841] ? __lock_is_held+0xb6/0x140 [ 314.646864] ? check_same_owner+0x320/0x320 [ 314.646880] ? rcu_note_context_switch+0x710/0x710 [ 314.646889] ? __lock_acquire+0x664/0x3e00 [ 314.646905] should_failslab+0xec/0x120 [ 314.646916] kmem_cache_alloc+0x47/0x760 [ 314.646927] ? __lock_acquire+0x664/0x3e00 [ 314.646944] ptlock_alloc+0x24/0x70 [ 314.646957] pte_alloc_one+0x59/0x100 [ 314.646972] do_huge_pmd_anonymous_page+0xb5e/0x19e0 [ 314.646983] ? __lock_acquire+0x664/0x3e00 [ 314.646997] ? __thp_get_unmapped_area+0x130/0x130 [ 314.647009] ? __lock_acquire+0x664/0x3e00 [ 314.647022] ? __lock_acquire+0x664/0x3e00 [ 314.647042] ? debug_check_no_locks_freed+0x3c0/0x3c0 [ 314.647053] ? debug_check_no_locks_freed+0x3c0/0x3c0 [ 314.647063] ? __lock_acquire+0x664/0x3e00 [ 314.647072] ? perf_trace_lock+0x900/0x900 [ 314.647084] ? perf_trace_lock_acquire+0xe3/0x980 [ 314.647097] ? perf_trace_lock_acquire+0xe3/0x980 [ 314.647111] ? perf_trace_lock_acquire+0xe3/0x980 [ 314.647120] ? perf_trace_lock_acquire+0xe3/0x980 [ 314.647132] ? perf_trace_lock+0x900/0x900 [ 314.647142] ? perf_trace_lock+0x900/0x900 [ 314.647156] __handle_mm_fault+0x178a/0x38c0 [ 314.647169] ? __pmd_alloc+0x4e0/0x4e0 [ 314.647177] ? trace_hardirqs_off+0x10/0x10 [ 314.647192] ? find_held_lock+0x35/0x1d0 [ 314.647206] ? handle_mm_fault+0x35b/0xb10 [ 314.647222] ? lock_downgrade+0x980/0x980 [ 314.647247] ? handle_mm_fault+0x2f8/0xb10 [ 314.647264] handle_mm_fault+0x44a/0xb10 [ 314.647274] ? check_same_owner+0x320/0x320 [ 314.647289] ? __handle_mm_fault+0x38c0/0x38c0 [ 314.647297] ? vmacache_find+0x5f/0x280 [ 314.647304] ? vmacache_update+0xfe/0x130 [ 314.647315] ? find_vma+0x30/0x150 [ 314.647327] __do_page_fault+0x560/0xbe0 [ 314.647341] ? mm_fault_error+0x2c0/0x2c0 [ 314.647352] ? find_held_lock+0x35/0x1d0 [ 314.647366] do_page_fault+0xee/0x730 [ 314.647375] ? cache_grow_end.part.35+0x84/0x180 [ 314.647384] ? vmalloc_sync_all+0x30/0x30 [ 314.647392] ? lock_downgrade+0x980/0x980 [ 314.647404] ? lock_release+0xa40/0xa40 [ 314.647417] ? do_raw_spin_trylock+0x190/0x190 [ 314.647426] ? check_same_owner+0x320/0x320 [ 314.647434] ? lock_release+0xa40/0xa40 [ 314.647447] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 314.647462] page_fault+0x25/0x50 [ 314.647473] RIP: 0010:copy_mount_options+0x193/0x2e0 [ 314.647480] RSP: 0018:ffff880183cb7d90 EFLAGS: 00010246 [ 314.647491] RAX: 0000000000000000 RBX: 000000002097bfff RCX: ffffffff81b9f57b [ 314.647498] RDX: 00000000000000e7 RSI: ffffc900038bd000 RDI: ffff8801d715b5d8 [ 314.647505] RBP: ffff880183cb7dc8 R08: 0000000000000007 R09: ffff880183cb7ab0 [ 314.647512] R10: 000000008fc6e2c4 R11: 0000000070e0398f R12: 0000000000001000 [ 314.647519] R13: ffff88018267a940 R14: ffff88018267a940 R15: 000000002097cfff [ 314.647534] ? copy_mount_options+0x18b/0x2e0 [ 314.647550] SyS_mount+0x87/0x120 [ 314.647557] ? copy_mnt_ns+0xb30/0xb30 [ 314.647567] do_syscall_64+0x281/0x940 [ 314.647596] ? vmalloc_sync_all+0x30/0x30 [ 314.647609] ? _raw_spin_unlock_irq+0x27/0x70 [ 314.647619] ? finish_task_switch+0x1c1/0x7e0 [ 314.647633] ? syscall_return_slowpath+0x550/0x550 [ 314.647645] ? syscall_return_slowpath+0x2ac/0x550 [ 314.647655] ? prepare_exit_to_usermode+0x350/0x350 [ 314.647666] ? entry_SYSCALL_64_after_hwframe+0x52/0xb7 [ 314.647679] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 314.647694] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 314.647700] RIP: 0033:0x454e79 [ 314.647705] RSP: 002b:00007f37fba8ec68 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 314.647718] RAX: ffffffffffffffda RBX: 00007f37fba8f6d4 RCX: 0000000000454e79 [ 314.647725] RDX: 00000000200e1000 RSI: 0000000020447000 RDI: 0000000020000000 [ 314.647731] RBP: 000000000072bea0 R08: 000000002097bfff R09: 0000000000000000 [ 314.647737] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000019 [ 314.647745] R13: 00000000000003fa R14: 00000000006f8010 R15: 0000000000000004 [ 314.665691] FAT-fs (loop199): unable to read boot sector [ 314.718766] binder: 31030:31033 unknown command 20 [ 314.718777] binder: 31030:31033 ioctl c0306201 20000340 returned -22 [ 314.737848] binder: 31030:31033 ioctl c0306201 20000340 returned -14 [ 314.770983] FAT-fs (loop199): unable to read boot sector [ 314.776250] FAULT_INJECTION: forcing a failure. [ 314.776250] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 315.204387] CPU: 1 PID: 31038 Comm: syz-executor7 Not tainted 4.16.0-rc7+ #8 [ 315.204392] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 315.204395] Call Trace: [ 315.204412] dump_stack+0x194/0x24d 2018/03/31 09:15:22 executing program 6: perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f000031f000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) prctl$void(0x0) getpid() r0 = syz_open_dev$vcsn(&(0x7f0000000040)='/dev/vcs#\x00', 0x0, 0x20000) ioctl$GIO_CMAP(r0, 0x4b70, &(0x7f0000000080)) r1 = socket$alg(0x26, 0x5, 0x0) ioctl$sock_SIOCGIFBR(0xffffffffffffffff, 0x8940, &(0x7f0000000040)=@get={0x1, &(0x7f0000000400)=""/242, 0x100000000}) bind$alg(r1, &(0x7f0000000080)={0x26, 'aead\x00', 0x0, 0x0, 'generic-gcm-aesni\x00'}, 0x58) syz_open_dev$sndmidi(&(0x7f0000000100)='/dev/snd/midiC#D#\x00', 0xfd, 0x0) bind(0xffffffffffffffff, &(0x7f0000000140)=@llc={0x1a, 0x33a, 0x7, 0x80, 0x0, 0x4, @remote={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xbb}}, 0x80) r2 = syz_init_net_socket$nfc_llcp(0x27, 0x1, 0x1) setsockopt$nfc_llcp_NFC_LLCP_MIUX(r2, 0x118, 0x15, &(0x7f0000000000), 0x4) r3 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/cuse\x00', 0x103002, 0x0) futimesat(r3, &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)={{0x0, 0x7530}}) r4 = syz_open_dev$vcsa(&(0x7f00000001c0)='/dev/vcsa#\x00', 0x2, 0x0) sendto$inet6(r4, &(0x7f0000000bc0), 0x0, 0x20000000, &(0x7f0000000c40)={0xa, 0x0, 0x0, @dev={0xfe, 0x80, [], 0x19}, 0x1f}, 0x1c) accept$alg(r0, 0x0, 0x0) sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f0000000000)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x8}, 0xb4fcd35419244434, &(0x7f00004ca000)={&(0x7f0000000300)=ANY=[], 0x1a1}, 0x1}, 0x0) syz_fuseblk_mount(&(0x7f0000001380)='./file0\x00', &(0x7f00000013c0)='./file0\x00', 0xf000, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0xb21, 0x0) socket(0x1e, 0x3, 0x0) socket(0x1e, 0x0, 0x0) ptrace$PTRACE_SECCOMP_GET_FILTER(0x420c, 0x0, 0x0, &(0x7f0000000380)=""/113) sched_yield() ioctl$TUNGETIFF(r4, 0x800454d2, &(0x7f0000000140)) ioctl$KIOCSOUND(r4, 0x4b2f, 0xfffffffffffffb74) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x20, 0x9b}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000447000)='./file0\x00', &(0x7f00000e1000)='msdos\x00', 0x0, &(0x7f000097bfff)) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000580)='./cgroup/syz0\x00', 0x1ff) 2018/03/31 09:15:22 executing program 1: perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f000031f000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) prctl$void(0x0) r0 = getpid() r1 = syz_open_dev$vcsn(&(0x7f0000000040)='/dev/vcs#\x00', 0x400, 0x20000) r2 = socket$alg(0x26, 0x5, 0x0) ioctl$sock_SIOCGIFBR(r2, 0x8940, &(0x7f0000000040)=@get={0x1, &(0x7f0000000400)=""/242, 0x100000000}) bind$alg(r2, &(0x7f0000000080)={0x26, 'aead\x00', 0x0, 0x0, 'generic-gcm-aesni\x00'}, 0x58) r3 = syz_open_dev$sndmidi(&(0x7f0000000100)='/dev/snd/midiC#D#\x00', 0xfd, 0x0) bind(r1, &(0x7f0000000140)=@pppol2tp={0x18, 0x1, {0x0, r2, {0x2, 0x4e21, @dev={0xac, 0x14, 0x14, 0x17}}, 0x4, 0x0, 0x1, 0x1}}, 0x142) r4 = syz_init_net_socket$nfc_llcp(0x27, 0x1, 0x1) kcmp$KCMP_EPOLL_TFD(r0, r0, 0x7, r4, &(0x7f0000000240)={r1, r2, 0x101}) setsockopt$nfc_llcp_NFC_LLCP_MIUX(r4, 0x118, 0x15, &(0x7f0000000000), 0x4) r5 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/cuse\x00', 0x103002, 0x0) futimesat(r5, &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)={{0x0, 0x7530}}) r6 = syz_open_dev$vcsa(&(0x7f00000001c0)='/dev/vcsa#\x00', 0x2, 0x4020ff) sendto$inet6(r6, &(0x7f0000000bc0), 0x0, 0x20000000, &(0x7f0000000c40)={0xa, 0x4e20, 0x6, @dev={0xfe, 0x80, [], 0x19}, 0x1f}, 0x1c) sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f0000000000)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x8}, 0xb4fcd35419244434, &(0x7f00004ca000)={&(0x7f0000000300)=ANY=[], 0x1a1}, 0x1}, 0x0) syz_fuseblk_mount(&(0x7f0000001380)='./file0\x00', &(0x7f00000013c0)='./file0\x00', 0xf000, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0xb21, 0x0) socket(0x1e, 0x3, 0x0) ptrace$PTRACE_SECCOMP_GET_FILTER(0x420c, 0x0, 0x0, &(0x7f0000000380)=""/113) sched_yield() ioctl$TUNGETIFF(r6, 0x800454d2, &(0x7f0000000140)) ioctl$KIOCSOUND(r3, 0x4b2f, 0xfffffffffffffb74) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x20, 0x9b}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000447000)='./file0\x00', &(0x7f00000e1000)='msdos\x00', 0x0, &(0x7f000097bfff)) setsockopt$inet6_mtu(r3, 0x29, 0x17, &(0x7f0000000200), 0x4) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000580)='./cgroup/syz0\x00', 0x1ff) syz_open_dev$audion(&(0x7f0000000280)='/dev/audio#\x00', 0x7be, 0x0) fcntl$getown(0xffffffffffffffff, 0x9) remap_file_pages(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x200000c, 0x36, 0x81000) [ 315.204421] ? arch_local_irq_restore+0x53/0x53 [ 315.204434] should_fail+0x8c0/0xa40 [ 315.204443] ? perf_trace_lock_acquire+0xe3/0x980 [ 315.204451] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 315.204460] ? debug_check_no_locks_freed+0x3c0/0x3c0 [ 315.204468] ? perf_trace_lock_acquire+0xe3/0x980 [ 315.204475] ? perf_trace_lock_acquire+0xe3/0x980 [ 315.204484] ? perf_trace_lock+0x900/0x900 [ 315.204491] ? perf_trace_lock+0x900/0x900 [ 315.204501] ? perf_trace_lock_acquire+0xe3/0x980 [ 315.204512] ? perf_trace_lock+0x900/0x900 [ 315.204518] ? trace_hardirqs_off+0x10/0x10 [ 315.204524] ? should_fail+0x23b/0xa40 [ 315.204529] ? find_held_lock+0x35/0x1d0 [ 315.204542] __alloc_pages_nodemask+0x327/0xdd0 [ 315.204549] ? handle_mm_fault+0x35b/0xb10 [ 315.204558] ? __alloc_pages_slowpath+0x2d10/0x2d10 [ 315.204567] ? find_held_lock+0x35/0x1d0 [ 315.204585] ? check_same_owner+0x320/0x320 [ 315.204597] cache_grow_begin+0x72/0x640 [ 315.204606] kmem_cache_alloc+0x400/0x760 [ 315.204615] ? mm_fault_error+0x2c0/0x2c0 [ 315.204626] getname_flags+0xcb/0x580 [ 315.204632] ? do_page_fault+0xee/0x730 [ 315.204640] user_path_at_empty+0x2d/0x50 [ 315.204648] do_mount+0x15f/0x2bb0 [ 315.204658] ? copy_mount_string+0x40/0x40 [ 315.204665] ? trace_hardirqs_on_caller+0x421/0x5c0 [ 315.204673] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 315.204685] ? retint_kernel+0x10/0x10 [ 315.204694] ? copy_mount_options+0x18b/0x2e0 [ 315.204701] ? copy_mount_options+0x193/0x2e0 [ 315.204707] ? copy_mount_options+0x1f7/0x2e0 [ 315.204715] SyS_mount+0xab/0x120 [ 315.204720] ? copy_mnt_ns+0xb30/0xb30 [ 315.204728] do_syscall_64+0x281/0x940 [ 315.204733] ? vmalloc_sync_all+0x30/0x30 [ 315.204739] ? _raw_spin_unlock_irq+0x27/0x70 [ 315.204745] ? finish_task_switch+0x1c1/0x7e0 [ 315.204752] ? syscall_return_slowpath+0x550/0x550 [ 315.204759] ? syscall_return_slowpath+0x2ac/0x550 [ 315.204766] ? prepare_exit_to_usermode+0x350/0x350 [ 315.204774] ? entry_SYSCALL_64_after_hwframe+0x52/0xb7 [ 315.204783] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 315.204793] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 315.204799] RIP: 0033:0x454e79 [ 315.204803] RSP: 002b:00007f37fba8ec68 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 315.204810] RAX: ffffffffffffffda RBX: 00007f37fba8f6d4 RCX: 0000000000454e79 [ 315.204814] RDX: 00000000200e1000 RSI: 0000000020447000 RDI: 0000000020000000 [ 315.204818] RBP: 000000000072bea0 R08: 000000002097bfff R09: 0000000000000000 [ 315.204821] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000019 [ 315.204825] R13: 00000000000003fa R14: 00000000006f8010 R15: 0000000000000005 [ 315.209399] FAT-fs (loop199): unable to read boot sector [ 315.484422] FAT-fs (loop199): unable to read boot sector [ 315.510739] FAT-fs (loop199): unable to read boot sector [ 315.556304] FAT-fs (loop199): unable to read boot sector 2018/03/31 09:15:22 executing program 3: r0 = syz_open_dev$random(&(0x7f00000001c0)='/dev/random\x00', 0x0, 0x800) r1 = syz_open_dev$loop(&(0x7f0000308000)='/dev/loop#\x00', 0x0, 0x0) ioctl$LOOP_SET_STATUS(r1, 0xc0481273, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "3900ea631d00000000020000010000009f00000023f7b7d65f90b0e6330ee739b319d8f6aa6bd58d1443474482e85040fb4947ebb55bd19f335b5bffff0001f3", "cfa430745a540dc1c149b7b81579f6a41c51f7d51933223e82ab867dac761faf"}) write(0xffffffffffffffff, &(0x7f00000001c0), 0x0) setsockopt$inet_sctp6_SCTP_RECVNXTINFO(0xffffffffffffffff, 0x84, 0x21, &(0x7f00000003c0)=0x200, 0x4) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f00000000c0)=0x0) getsockopt$netrom_NETROM_T4(0xffffffffffffffff, 0x103, 0x6, &(0x7f0000000300)=0x8, &(0x7f0000000340)=0x4) r3 = getpid() sched_setparam(r3, &(0x7f0000000400)) syz_open_dev$loop(&(0x7f0000000380)='/dev/loop#\x00', 0x0, 0x10803) r4 = memfd_create(&(0x7f0000614000)="74086e750000000000000000008c00", 0x0) pwritev(r4, &(0x7f0000f50f90)=[{&(0x7f0000000040)="aa", 0x1}], 0x1, 0x0) fcntl$getownex(r1, 0x10, &(0x7f0000000240)={0x0, 0x0}) r6 = syz_open_procfs(r5, &(0x7f0000000280)='stat\x00') epoll_ctl$EPOLL_CTL_MOD(r4, 0x3, r0, &(0x7f00000002c0)={0x20000010}) accept4$inet6(r4, &(0x7f0000000100)={0x0, 0x0, 0x0, @mcast1}, &(0x7f0000000140)=0x1c, 0x7fd) getsockopt$inet_IP_IPSEC_POLICY(r4, 0x0, 0x10, &(0x7f0000000940)={{{@in6=@local, @in6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@loopback}, 0x0, @in=@local}}, &(0x7f0000000780)=0xe8) getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f00000007c0)={0x0, 0x0, 0x0}, &(0x7f0000000540)=0xc) fchown(r4, r7, r8) r9 = syz_open_dev$binder(&(0x7f0000000100)='/dev/binder#\x00', 0xffffffffffffffff, 0x806) ioctl$BINDER_SET_CONTEXT_MGR(r6, 0x40046207, 0x0) mmap$binder(&(0x7f000000c000/0x2000)=nil, 0x2000, 0x0, 0x12, r9, 0x0) ioctl$BINDER_WRITE_READ(r9, 0xc0306201, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000), 0x0, 0x0, &(0x7f0000011f9d)}) getsockopt$inet_sctp6_SCTP_AUTO_ASCONF(0xffffffffffffffff, 0x84, 0x1e, &(0x7f0000000140), &(0x7f0000000180)=0x4) ioctl$BINDER_WRITE_READ(r9, 0xc0306201, &(0x7f0000000340)={0x8, 0x0, &(0x7f0000000440)=ANY=[@ANYRES64=r1], 0x0, 0x0, &(0x7f0000000240)}) write(0xffffffffffffffff, &(0x7f0000000300)="8be25f5790f664f32509e40d6f879d5add7e2d359c9a19afb750a2d25352875d187d4118c99a2d5c6db433c277cc7d345b87a34f1b417033d367cb0cfd6a25633f77aafb17e99c33cb65352c901ae75176f07bb0a4bb5ebff3d87e", 0x5b) r10 = ioctl$LOOP_CTL_GET_FREE(r4, 0x4c82) ioctl$LOOP_CTL_REMOVE(r6, 0x4c81, r10) openat$cgroup(0xffffffffffffff9c, &(0x7f0000000000)='syz0\x00', 0x200002, 0x0) sched_setaffinity(r2, 0x8, &(0x7f0000000200)=0x7) 2018/03/31 09:15:22 executing program 6: perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f000031f000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) prctl$void(0x0) getpid() r0 = syz_open_dev$vcsn(&(0x7f0000000040)='/dev/vcs#\x00', 0x0, 0x20000) ioctl$GIO_CMAP(r0, 0x4b70, &(0x7f0000000080)) r1 = socket$alg(0x26, 0x5, 0x0) ioctl$sock_SIOCGIFBR(0xffffffffffffffff, 0x8940, &(0x7f0000000040)=@get={0x1, &(0x7f0000000400)=""/242, 0x100000000}) bind$alg(r1, &(0x7f0000000080)={0x26, 'aead\x00', 0x0, 0x0, 'generic-gcm-aesni\x00'}, 0x58) syz_open_dev$sndmidi(&(0x7f0000000100)='/dev/snd/midiC#D#\x00', 0xfd, 0x0) bind(0xffffffffffffffff, &(0x7f0000000140)=@llc={0x1a, 0x33a, 0x7, 0x80, 0x0, 0x4, @remote={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xbb}}, 0x80) r2 = syz_init_net_socket$nfc_llcp(0x27, 0x1, 0x1) setsockopt$nfc_llcp_NFC_LLCP_MIUX(r2, 0x118, 0x15, &(0x7f0000000000), 0x4) r3 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/cuse\x00', 0x103002, 0x0) futimesat(r3, &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)={{0x0, 0x7530}}) r4 = syz_open_dev$vcsa(&(0x7f00000001c0)='/dev/vcsa#\x00', 0x2, 0x0) sendto$inet6(r4, &(0x7f0000000bc0), 0x0, 0x20000000, &(0x7f0000000c40)={0xa, 0x4e20, 0x0, @dev={0xfe, 0x80}, 0x1f}, 0x1c) accept$alg(r0, 0x0, 0x0) sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f0000000000)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x8}, 0xb4fcd35419244434, &(0x7f00004ca000)={&(0x7f0000000300)=ANY=[], 0x1a1}, 0x1}, 0x0) syz_fuseblk_mount(&(0x7f0000001380)='./file0\x00', &(0x7f00000013c0)='./file0\x00', 0xf000, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0xb21, 0x0) socket(0x1e, 0x3, 0x0) socket(0x1e, 0x0, 0x0) ptrace$PTRACE_SECCOMP_GET_FILTER(0x420c, 0x0, 0x0, &(0x7f0000000380)=""/113) sched_yield() ioctl$TUNGETIFF(r4, 0x800454d2, &(0x7f0000000140)) ioctl$KIOCSOUND(r4, 0x4b2f, 0xfffffffffffffb74) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x20, 0x9b}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000447000)='./file0\x00', &(0x7f00000e1000)='msdos\x00', 0x0, &(0x7f000097bfff)) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000580)='./cgroup/syz0\x00', 0x1ff) 2018/03/31 09:15:22 executing program 2: syz_open_dev$loop(&(0x7f00000003c0)='/dev/loop#\x00', 0x8, 0x0) r0 = syz_open_dev$sndseq(&(0x7f00000001c0)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r0, 0x4040534e, &(0x7f000019ffe9)={0xc1}) r1 = accept(0xffffffffffffffff, &(0x7f0000000080)=@can, &(0x7f0000000180)=0x80) ioctl$sock_ipx_SIOCAIPXPRISLT(r1, 0x89e1, &(0x7f0000000280)=0x3f) ioctl$sock_inet_SIOCRTMSG(r1, 0x890d, &(0x7f0000000200)={0x80, {0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x19}}, {0x2, 0x4e21, @local={0xac, 0x14, 0x14, 0xaa}}, {0x2, 0x4e23}, 0x0, 0x7, 0x1, 0x0, 0x9, 0x0, 0x0, 0x0, 0xfffffffffffffff7}) getsockopt$inet_sctp_SCTP_PRIMARY_ADDR(0xffffffffffffffff, 0x84, 0x6, &(0x7f0000000ac0)={0x0, @in={{0x2, 0x4e20, @loopback=0x7f000001}}}, &(0x7f00000002c0)=0x84) r3 = syz_open_dev$sg(&(0x7f0000000700)='/dev/sg#\x00', 0xfffffffffffffff7, 0x800) clone(0x2000c100, &(0x7f0000000800)="97bb77038add5df9e9d4f9783b82c55fe59e5c0acdbcfc9bcf92ac0e1f1f3c1959c1d25dfabf3849336c7c85be174d7765b47e113632aea54b87e4d3f2c1db09e6aa4040b43d17308fb7e62e808067da2fff3cfd8e4c038c814bbfc6bc49d8ebc8671d8297e2d34dc61f2d194d2dbb8f59b4c853e0714d3d4bb29d1243fac01c86c8c4dd38daedab3c6ad73a72d3f6dd2684aa82e5285eb82452c9848b7beb8bc513ba8c8973cad0bd5926604846b7f5d0397b", &(0x7f00000008c0), &(0x7f0000000900), &(0x7f0000000940)="ed6c04412e782fe395f084741e3d9fe469aebde09acc8f8d8d84d1f00f5573b09acba487077ebb904cb1f3fed55f59d677ce24bbd2a7506df8e1e0d0fc709cb8c9f4ab2aeeeebc5ef879742c1f7628f1862c88b5b0da89acbf43ef12e4839405b6a3430d296fea06d2f3a8356c57ec991e") ioctl$SNDRV_SEQ_IOCTL_SUBSCRIBE_PORT(r0, 0x40505330, &(0x7f0000ec6fb0)={{}, {0x80}}) getsockopt$netrom_NETROM_T1(r1, 0x103, 0x1, &(0x7f0000000000), &(0x7f0000000380)=0x4) syz_open_dev$adsp(&(0x7f0000000600)='/dev/adsp#\x00', 0x100000000, 0x80000) rt_sigprocmask(0x3d738072cd0f41ac, &(0x7f0000000cc0)={0x7}, &(0x7f0000000d00), 0x8) clone(0x40000000, &(0x7f0000000500)="67cdd9994c47c31d325b069924a7064c157c2ec0b5b5dca2feeb7dabef3b7af0d02d559e293faa759f2b3cb12aea360c2d", &(0x7f0000000580), &(0x7f00000005c0), &(0x7f0000000a00)="29859fdda9a119e54a27f9ec76b4d63a16dc5bbdd38c2fda0e5f4d8f830cd987ec7d3ffc66cf3db8820968fd89a1fba8fe6352a29a27f3b000bcdf238f2c04b358fc831025180e0be313da41de6366c94a1a0f86aaffdf2c039111b55275c054e14819a827fe809225249a01944263a2aec15f64e752e35892b1b8e7ef1e0e9115") ioctl$SNDRV_SEQ_IOCTL_DELETE_PORT(r0, 0x40a85321, &(0x7f0000000b80)={{0x4, 0x8}, 'port0\x00', 0x80, 0x0, 0x10000, 0x6, 0x2, 0x80, 0x8, 0x0, 0x0, 0x3dec00}) getsockopt$inet_sctp_SCTP_SOCKOPT_PEELOFF(r3, 0x84, 0x66, &(0x7f0000000c40)={r2, 0x6}, &(0x7f0000000c80)=0x8) clock_settime(0x7, &(0x7f0000000740)={0x77359400}) ioctl$SNDRV_SEQ_IOCTL_CLIENT_ID(r0, 0x80045301, &(0x7f0000000340)) r4 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer2\x00', 0x0, 0x0) openat$sequencer2(0xffffffffffffff9c, &(0x7f00000006c0)='/dev/sequencer2\x00', 0x222081, 0x0) ioctl$RNDADDENTROPY(0xffffffffffffffff, 0x40085203, &(0x7f0000000100)=ANY=[@ANYPTR=&(0x7f0000000680)=ANY=[@ANYPTR64=&(0x7f0000000640)=ANY=[@ANYPTR, @ANYPTR]]]) setsockopt$inet_sctp_SCTP_DEFAULT_SEND_PARAM(r4, 0x84, 0xa, &(0x7f0000000140)={0x5, 0x100000001, 0x0, 0x8, 0x0, 0x7, 0x401, 0x1f, r2}, 0x20) 2018/03/31 09:15:22 executing program 5: perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f000031f000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffffff, &(0x7f0000000200)='./file0\x00', 0x40, 0x20) getsockopt$inet_sctp6_SCTP_MAX_BURST(0xffffffffffffff9c, 0x84, 0x14, &(0x7f0000000240)=@assoc_value={0x0}, &(0x7f00000002c0)=0x8) setsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(r0, 0x84, 0x18, &(0x7f0000000300)={r1, 0x1c0000000}, 0x8) prctl$void(0x0) getpid() r2 = syz_open_dev$vcsn(&(0x7f0000000040)='/dev/vcs#\x00', 0x0, 0x20000) ioctl$GIO_CMAP(r2, 0x4b70, &(0x7f0000000080)) bind$alg(0xffffffffffffffff, &(0x7f0000000080)={0x26, 'aead\x00', 0x0, 0x0, 'generic-gcm-aesni\x00'}, 0x58) syz_open_dev$sndmidi(&(0x7f0000000100)='/dev/snd/midiC#D#\x00', 0xfd, 0x0) bind(0xffffffffffffffff, &(0x7f0000000140)=@llc={0x1a, 0x33a, 0x7, 0x80, 0x5, 0x4, @remote={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xbb}}, 0x80) r3 = syz_init_net_socket$nfc_llcp(0x27, 0x1, 0x1) setsockopt$nfc_llcp_NFC_LLCP_MIUX(r3, 0x118, 0x15, &(0x7f0000000000), 0x4) r4 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/cuse\x00', 0x103002, 0x0) futimesat(r4, &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)={{0x0, 0x7530}}) r5 = syz_open_dev$vcsa(&(0x7f00000001c0)='/dev/vcsa#\x00', 0x2, 0x4020ff) sendto$inet6(0xffffffffffffffff, &(0x7f0000000bc0)="36251e313e0743fc195a1a198a14434e8a0a00b3f452a3b5644e336ec712a16310c9aecc4e3097bc666a8882128a73c368ce731e9fbf3fe18fa52d", 0x3b, 0x20000000, &(0x7f0000000c40)={0xa, 0x4e20, 0x6, @dev={0xfe, 0x80, [], 0x19}, 0x1f}, 0x1c) accept$alg(r2, 0x0, 0x0) sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f0000000000)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x8}, 0xb4fcd35419244434, &(0x7f00004ca000)={&(0x7f0000000300)=ANY=[], 0x1a1}, 0x1}, 0x0) syz_fuseblk_mount(&(0x7f0000001380)='./file0\x00', &(0x7f00000013c0)='./file0\x00', 0xf000, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0xb21, 0x0) socket(0x1e, 0x3, 0x0) socket(0x1e, 0x0, 0x0) ptrace$PTRACE_SECCOMP_GET_FILTER(0x420c, 0x0, 0x0, &(0x7f0000000380)=""/113) sched_yield() ioctl$TUNGETIFF(r5, 0x800454d2, &(0x7f0000000140)) ioctl$KIOCSOUND(r5, 0x4b2f, 0xfffffffffffffb74) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x20, 0x9b}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000447000)='./file0\x00', &(0x7f00000e1000)='msdos\x00', 0x0, &(0x7f000097bfff)) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000580)='./cgroup/syz0\x00', 0x1ff) syz_open_dev$audion(&(0x7f0000000280)='/dev/audio#\x00', 0x7c0, 0x0) 2018/03/31 09:15:22 executing program 0: perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f000031f000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) prctl$void(0x0) r0 = syz_open_dev$vcsn(&(0x7f0000000040)='/dev/vcs#\x00', 0x0, 0x20000) socket$alg(0x26, 0x5, 0x0) ioctl$sock_SIOCGIFBR(0xffffffffffffffff, 0x8940, &(0x7f0000000040)=@get={0x1, &(0x7f0000000400)=""/242, 0x100000000}) bind$alg(0xffffffffffffffff, &(0x7f0000000080)={0x26, 'aead\x00', 0x0, 0x0, 'generic-gcm-aesni\x00'}, 0x58) r1 = syz_open_dev$sndmidi(&(0x7f0000000100)='/dev/snd/midiC#D#\x00', 0xfd, 0x0) bind(0xffffffffffffffff, &(0x7f0000000140)=@llc={0x1a, 0x33a, 0x7, 0x80, 0x0, 0x4, @remote={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xbb}}, 0x80) r2 = syz_init_net_socket$nfc_llcp(0x27, 0x1, 0x1) setsockopt$nfc_llcp_NFC_LLCP_MIUX(r2, 0x118, 0x15, &(0x7f0000000000), 0x4) r3 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/cuse\x00', 0x103002, 0x0) futimesat(r3, &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)={{0x0, 0x7530}}) r4 = syz_open_dev$vcsa(&(0x7f00000001c0)='/dev/vcsa#\x00', 0x2, 0x0) sendto$inet6(r4, &(0x7f0000000bc0)="36251e313e0743fc195a1a198a14434e8a0a00b3f452a3b5644e336ec712a16310c9aecc4e3097bc666a8882128a73c368ce731e9fbf3fe18fa52d00c34ac2e57c1c4569cfbd6a621c6dfbc032121aed", 0x50, 0x20000000, &(0x7f0000000c40)={0xa, 0x4e20, 0x6, @dev={0xfe, 0x80, [], 0x19}, 0x1f}, 0x1c) accept$alg(r0, 0x0, 0x0) sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f0000000000)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x8}, 0xb4fcd35419244434, &(0x7f00004ca000)={&(0x7f0000000300)=ANY=[], 0x1a1}, 0x1}, 0x0) syz_fuseblk_mount(&(0x7f0000001380)='./file0\x00', &(0x7f00000013c0)='./file0\x00', 0xf000, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0xb21, 0x0) socket(0x1e, 0x3, 0x0) socket(0x1e, 0x0, 0x0) ptrace$PTRACE_SECCOMP_GET_FILTER(0x420c, 0x0, 0x0, &(0x7f0000000380)=""/113) sched_yield() ioctl$TUNGETIFF(r4, 0x800454d2, &(0x7f0000000140)) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_CLIENT(r1, 0x404c534a, &(0x7f0000000200)={0x8, 0x1000, 0x40}) ioctl$KIOCSOUND(r4, 0x4b2f, 0xfffffffffffffb74) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x20, 0x9b}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000447000)='./file0\x00', &(0x7f00000e1000)='msdos\x00', 0x0, &(0x7f000097bfff)) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000580)='./cgroup/syz0\x00', 0x1ff) 2018/03/31 09:15:22 executing program 1: perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f000031f000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) prctl$void(0x0) getpid() r0 = syz_open_dev$vcsn(&(0x7f0000000040)='/dev/vcs#\x00', 0x400, 0x20000) r1 = socket$alg(0x26, 0x5, 0x0) ioctl$sock_SIOCGIFBR(r1, 0x8940, &(0x7f0000000040)=@get={0x1, &(0x7f0000000400)=""/242, 0x100000000}) bind$alg(r1, &(0x7f0000000080)={0x26, 'aead\x00', 0x0, 0x0, 'generic-gcm-aesni\x00'}, 0x58) r2 = syz_open_dev$sndmidi(&(0x7f0000000100)='/dev/snd/midiC#D#\x00', 0xfd, 0x0) bind(r2, &(0x7f0000000140)=@llc={0x1a, 0x33a, 0x7, 0x80, 0x0, 0x4, @remote={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xbb}}, 0x80) r3 = syz_init_net_socket$nfc_llcp(0x27, 0x1, 0x1) setsockopt$nfc_llcp_NFC_LLCP_MIUX(r3, 0x118, 0x15, &(0x7f0000000000), 0x4) r4 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/cuse\x00', 0x103002, 0x0) futimesat(r4, &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)={{0x0, 0x7530}}) r5 = syz_open_dev$vcsa(&(0x7f00000001c0)='/dev/vcsa#\x00', 0x2, 0x4020ff) sendto$inet6(r5, &(0x7f0000000bc0), 0x0, 0x20000000, &(0x7f0000000c40)={0xa, 0x4e20, 0x6, @dev={0xfe, 0x80, [], 0x19}, 0x1f}, 0x1c) sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f0000000000)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x8}, 0xb4fcd35419244434, &(0x7f00004ca000)={&(0x7f0000000300)=ANY=[], 0x1a1}, 0x1}, 0x0) syz_fuseblk_mount(&(0x7f0000001380)='./file0\x00', &(0x7f00000013c0)='./file0\x00', 0xf000, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0xb21, 0x0) futimesat(r0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000240)={{0x77359400}, {0x0, 0x2710}}) socket(0x1e, 0x3, 0x0) ptrace$PTRACE_SECCOMP_GET_FILTER(0x420c, 0x0, 0x0, &(0x7f0000000380)=""/113) sched_yield() ioctl$TUNGETIFF(r5, 0x800454d2, &(0x7f0000000140)) ioctl$KIOCSOUND(r5, 0x4b2f, 0xfffffffffffffb74) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x20, 0x9b}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000447000)='./file0\x00', &(0x7f00000e1000)='msdos\x00', 0x0, &(0x7f000097bfff)) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000580)='./cgroup/syz0\x00', 0x1ff) syz_open_dev$audion(&(0x7f0000000280)='/dev/audio#\x00', 0x7be, 0x0) fcntl$getown(0xffffffffffffffff, 0x9) 2018/03/31 09:15:22 executing program 4: perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f000031f000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) prctl$void(0x1b) getpid() r0 = syz_open_dev$vcsn(&(0x7f0000000040)='/dev/vcs#\x00', 0x0, 0x20000) ioctl$GIO_CMAP(r0, 0x4b70, &(0x7f0000000080)) r1 = socket$alg(0x26, 0x5, 0x0) ioctl$sock_SIOCGIFBR(0xffffffffffffffff, 0x8940, &(0x7f0000000040)=@get={0x1, &(0x7f0000000400)=""/242, 0x100000000}) bind$alg(r1, &(0x7f0000000080)={0x26, 'aead\x00', 0x0, 0x0, 'generic-gcm-aesni\x00'}, 0x58) r2 = syz_open_dev$sndmidi(&(0x7f0000000100)='/dev/snd/midiC#D#\x00', 0xfd, 0x0) bind(0xffffffffffffffff, &(0x7f0000000140)=@llc={0x1a, 0x33a, 0x7, 0x80, 0x0, 0x4, @remote={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xbb}}, 0x80) r3 = syz_init_net_socket$nfc_llcp(0x27, 0x1, 0x1) setsockopt$nfc_llcp_NFC_LLCP_MIUX(r3, 0x118, 0x15, &(0x7f0000000000), 0x4) getsockname$ax25(r2, &(0x7f0000000240), &(0x7f0000000280)=0x10) r4 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/cuse\x00', 0x103002, 0x0) futimesat(r4, &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)={{0x0, 0x7530}}) r5 = syz_open_dev$vcsa(&(0x7f00000001c0)='/dev/vcsa#\x00', 0x2, 0x0) sendto$inet6(r5, &(0x7f0000000bc0), 0x0, 0x20000000, &(0x7f0000000c40)={0xa, 0x4e20, 0x0, @dev={0xfe, 0x80, [], 0x19}, 0x1f}, 0x1c) accept$alg(r0, 0x0, 0x0) sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f0000000000)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x8}, 0xb4fcd35419244434, &(0x7f00004ca000)={&(0x7f0000000300)=ANY=[], 0x1a1}, 0x1}, 0x0) syz_fuseblk_mount(&(0x7f0000001380)='./file0\x00', &(0x7f00000013c0)='./file0\x00', 0xf000, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0xb21, 0x0) socket(0x1e, 0x3, 0x0) socket(0x1e, 0x0, 0x0) ptrace$PTRACE_SECCOMP_GET_FILTER(0x420c, 0x0, 0x0, &(0x7f0000000380)=""/113) sched_yield() ioctl$TUNGETIFF(r5, 0x800454d2, &(0x7f0000000140)) ioctl$KIOCSOUND(r5, 0x4b2f, 0xfffffffffffffb74) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x20, 0x9b}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(r5, 0x0, 0x48c, &(0x7f0000000200)={0x3, 'ipddp0\x00', 0x1}, 0x18) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000447000)='./file0\x00', &(0x7f00000e1000)='msdos\x00', 0x0, &(0x7f000097bfff)) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000580)='./cgroup/syz0\x00', 0x1ff) 2018/03/31 09:15:22 executing program 7 (fault-call:24 fault-nth:6): perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f000031f000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getpid() r0 = syz_open_dev$vcsn(&(0x7f0000000040)='/dev/vcs#\x00', 0x0, 0x20000) ioctl$GIO_CMAP(r0, 0x4b70, &(0x7f0000000080)) r1 = socket$alg(0x26, 0x5, 0x0) ioctl$sock_SIOCGIFBR(r1, 0x8940, &(0x7f0000000040)=@get={0x1, &(0x7f0000000400)=""/242, 0x100000000}) bind$alg(r1, &(0x7f0000000080)={0x26, 'aead\x00', 0x0, 0x0, 'generic-gcm-aesni\x00'}, 0x58) syz_open_dev$sndmidi(&(0x7f0000000100)='/dev/snd/midiC#D#\x00', 0xfd, 0x0) bind(0xffffffffffffffff, &(0x7f0000000140)=@llc={0x1a, 0x33a, 0x7, 0x80, 0x5, 0x4, @remote={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xbb}}, 0x80) r2 = syz_init_net_socket$nfc_llcp(0x27, 0x1, 0x1) setsockopt$nfc_llcp_NFC_LLCP_MIUX(r2, 0x118, 0x15, &(0x7f0000000000), 0x4) r3 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/cuse\x00', 0x103002, 0x0) futimesat(r3, &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)={{0x0, 0x7530}}) r4 = syz_open_dev$vcsa(&(0x7f00000001c0)='/dev/vcsa#\x00', 0x2, 0x4020ff) sendto$inet6(r4, &(0x7f0000000bc0)="36251e313e0743fc195a1a198a14434e8a0a00b3f452a3b5644e336ec712a16310c9aecc4e3097bc666a8882128a73c368ce731e9fbf3fe18fa52d00", 0x3c, 0x20000000, &(0x7f0000000c40)={0xa, 0x0, 0x6, @dev={0xfe, 0x80, [], 0x19}, 0x1f}, 0x1c) accept$alg(r0, 0x0, 0x0) sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f0000000000)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x8}, 0xb4fcd35419244434, &(0x7f00004ca000)={&(0x7f0000000300)=ANY=[], 0x1a1}, 0x1}, 0x0) syz_fuseblk_mount(&(0x7f0000001380)='./file0\x00', &(0x7f00000013c0)='./file0\x00', 0xf000, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0xb21, 0x0) socket(0x1e, 0x3, 0x0) socket(0x1e, 0x0, 0x0) ptrace$PTRACE_SECCOMP_GET_FILTER(0x420c, 0x0, 0x0, &(0x7f0000000380)=""/113) sched_yield() ioctl$TUNGETIFF(r4, 0x800454d2, &(0x7f0000000140)) ioctl$KIOCSOUND(r4, 0x4b2f, 0xfffffffffffffb74) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000447000)='./file0\x00', &(0x7f00000e1000)='msdos\x00', 0x0, &(0x7f000097bfff)) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000580)='./cgroup/syz0\x00', 0x1ff) syz_open_dev$audion(&(0x7f0000000280)='/dev/audio#\x00', 0x7be, 0x0) [ 315.735347] binder: 31052:31053 unknown command 20 [ 315.754723] binder: 31052:31053 ioctl c0306201 20000340 returned -22 [ 315.769366] FAT-fs (loop199): unable to read boot sector [ 315.776732] FAULT_INJECTION: forcing a failure. [ 315.776732] name failslab, interval 1, probability 0, space 0, times 0 [ 315.788059] CPU: 1 PID: 31065 Comm: syz-executor7 Not tainted 4.16.0-rc7+ #8 [ 315.795240] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 315.804581] Call Trace: [ 315.807170] dump_stack+0x194/0x24d [ 315.810795] ? arch_local_irq_restore+0x53/0x53 [ 315.815465] ? lock_downgrade+0x980/0x980 [ 315.819617] should_fail+0x8c0/0xa40 [ 315.823428] ? trace_hardirqs_off+0x10/0x10 [ 315.827750] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 315.832859] ? is_bpf_text_address+0xa4/0x120 [ 315.837358] ? find_held_lock+0x35/0x1d0 [ 315.838259] binder: 31052:31071 unknown command 25 [ 315.841429] ? check_same_owner+0x320/0x320 [ 315.841439] ? putname+0xee/0x130 [ 315.841450] ? filename_lookup+0x315/0x500 [ 315.855437] binder: 31052:31071 ioctl c0306201 20000340 returned -22 [ 315.858420] ? user_path_at_empty+0x40/0x50 [ 315.858436] ? rcu_note_context_switch+0x710/0x710 [ 315.858449] ? entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 315.858467] should_failslab+0xec/0x120 [ 315.858479] kmem_cache_alloc+0x47/0x760 [ 315.858492] ? perf_trace_lock_acquire+0xe3/0x980 [ 315.858502] ? free_obj_work+0x690/0x690 [ 315.896385] alloc_vfsmnt+0xe0/0x9c0 [ 315.900090] ? path_lookupat+0x238/0xba0 [ 315.904147] ? mnt_free_id.isra.21+0x50/0x50 [ 315.908548] ? trace_hardirqs_off+0x10/0x10 [ 315.912860] ? putname+0xee/0x130 [ 315.916304] ? rcu_read_lock_sched_held+0x108/0x120 [ 315.921311] ? find_held_lock+0x35/0x1d0 [ 315.925366] ? __get_fs_type+0x8a/0xc0 [ 315.929248] ? lock_downgrade+0x980/0x980 [ 315.933384] ? module_unload_free+0x5b0/0x5b0 [ 315.937868] ? lock_release+0xa40/0xa40 [ 315.941831] ? mpi_resize+0x200/0x200 [ 315.945628] vfs_kern_mount.part.26+0x84/0x4a0 [ 315.950203] ? may_umount+0xa0/0xa0 [ 315.953824] ? _raw_read_unlock+0x22/0x30 [ 315.957963] ? __get_fs_type+0x8a/0xc0 [ 315.961846] do_mount+0xea4/0x2bb0 [ 315.965384] ? copy_mount_string+0x40/0x40 [ 315.969609] ? trace_hardirqs_on_caller+0x421/0x5c0 [ 315.974613] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 315.979361] ? retint_kernel+0x10/0x10 [ 315.983240] ? copy_mount_options+0x18b/0x2e0 [ 315.987724] ? copy_mount_options+0x193/0x2e0 [ 315.992208] ? copy_mount_options+0x1f7/0x2e0 [ 315.996694] SyS_mount+0xab/0x120 [ 316.000138] ? copy_mnt_ns+0xb30/0xb30 [ 316.004018] do_syscall_64+0x281/0x940 [ 316.007895] ? vmalloc_sync_all+0x30/0x30 [ 316.012031] ? _raw_spin_unlock_irq+0x27/0x70 [ 316.016518] ? finish_task_switch+0x1c1/0x7e0 [ 316.021000] ? syscall_return_slowpath+0x550/0x550 [ 316.025919] ? syscall_return_slowpath+0x2ac/0x550 [ 316.030836] ? prepare_exit_to_usermode+0x350/0x350 [ 316.035841] ? entry_SYSCALL_64_after_hwframe+0x52/0xb7 [ 316.041197] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 316.046039] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 316.051213] RIP: 0033:0x454e79 [ 316.054391] RSP: 002b:00007f37fba8ec68 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 316.062090] RAX: ffffffffffffffda RBX: 00007f37fba8f6d4 RCX: 0000000000454e79 [ 316.069353] RDX: 00000000200e1000 RSI: 0000000020447000 RDI: 0000000020000000 [ 316.076610] RBP: 000000000072bea0 R08: 000000002097bfff R09: 0000000000000000 2018/03/31 09:15:23 executing program 6: perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f000031f000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) prctl$void(0x0) getpid() r0 = syz_open_dev$vcsn(&(0x7f0000000040)='/dev/vcs#\x00', 0x0, 0x20000) ioctl$GIO_CMAP(r0, 0x4b70, &(0x7f0000000080)) r1 = socket$alg(0x26, 0x5, 0x0) ioctl$sock_SIOCGIFBR(0xffffffffffffffff, 0x8940, &(0x7f0000000040)=@get={0x1, &(0x7f0000000400)=""/242, 0x100000000}) bind$alg(r1, &(0x7f0000000080)={0x26, 'aead\x00', 0x0, 0x0, 'generic-gcm-aesni\x00'}, 0x58) syz_open_dev$sndmidi(&(0x7f0000000100)='/dev/snd/midiC#D#\x00', 0xfd, 0x0) bind(0xffffffffffffffff, &(0x7f0000000140)=@llc={0x1a, 0x33a, 0x7, 0x80, 0x0, 0x4, @remote={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xbb}}, 0x80) r2 = syz_init_net_socket$nfc_llcp(0x27, 0x1, 0x1) setsockopt$nfc_llcp_NFC_LLCP_MIUX(r2, 0x118, 0x15, &(0x7f0000000000), 0x4) r3 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/cuse\x00', 0x103002, 0x0) futimesat(r3, &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)={{0x0, 0x7530}}) r4 = syz_open_dev$vcsa(&(0x7f00000001c0)='/dev/vcsa#\x00', 0x2, 0x0) sendto$inet6(r4, &(0x7f0000000bc0), 0x0, 0x20000000, &(0x7f0000000c40)={0xa, 0x4e20, 0x0, @dev={0xfe, 0x80}, 0x1f}, 0x1c) accept$alg(r0, 0x0, 0x0) sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f0000000000)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x8}, 0xb4fcd35419244434, &(0x7f00004ca000)={&(0x7f0000000300)=ANY=[], 0x1a1}, 0x1}, 0x0) syz_fuseblk_mount(&(0x7f0000001380)='./file0\x00', &(0x7f00000013c0)='./file0\x00', 0xf000, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0xb21, 0x0) socket(0x1e, 0x3, 0x0) socket(0x1e, 0x0, 0x0) ptrace$PTRACE_SECCOMP_GET_FILTER(0x420c, 0x0, 0x0, &(0x7f0000000380)=""/113) sched_yield() ioctl$TUNGETIFF(r4, 0x800454d2, &(0x7f0000000140)) ioctl$KIOCSOUND(r4, 0x4b2f, 0xfffffffffffffb74) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x20, 0x9b}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000447000)='./file0\x00', &(0x7f00000e1000)='msdos\x00', 0x0, &(0x7f000097bfff)) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000580)='./cgroup/syz0\x00', 0x1ff) 2018/03/31 09:15:23 executing program 3: r0 = syz_open_dev$random(&(0x7f00000001c0)='/dev/random\x00', 0x0, 0x800) r1 = syz_open_dev$loop(&(0x7f0000308000)='/dev/loop#\x00', 0x0, 0x0) ioctl$LOOP_SET_STATUS(r1, 0xc0481273, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "3900ea631d00000000020000010000009f00000023f7b7d65f90b0e6330ee739b319d8f6aa6bd58d1443474482e85040fb4947ebb55bd19f335b5bffff0001f3", "cfa430745a540dc1c149b7b81579f6a41c51f7d51933223e82ab867dac761faf"}) write(0xffffffffffffffff, &(0x7f00000001c0), 0x0) setsockopt$inet_sctp6_SCTP_RECVNXTINFO(0xffffffffffffffff, 0x84, 0x21, &(0x7f00000003c0)=0x200, 0x4) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f00000000c0)=0x0) getsockopt$netrom_NETROM_T4(0xffffffffffffffff, 0x103, 0x6, &(0x7f0000000300)=0x8, &(0x7f0000000340)=0x4) r3 = getpid() sched_setparam(r3, &(0x7f0000000400)) syz_open_dev$loop(&(0x7f0000ca9ff5)='/dev/loop#\x00', 0x0, 0x82) r4 = memfd_create(&(0x7f0000614000)="74086e750000000000000000008c00", 0x0) pwritev(r4, &(0x7f0000f50f90)=[{&(0x7f0000000040)="aa", 0x1}], 0x1, 0x0) fcntl$getownex(r1, 0x10, &(0x7f0000000240)={0x0, 0x0}) r6 = syz_open_procfs(r5, &(0x7f0000000280)='stat\x00') epoll_ctl$EPOLL_CTL_MOD(r4, 0x3, r0, &(0x7f00000002c0)={0x20000010}) accept4$inet6(r4, &(0x7f0000000380)={0x0, 0x0, 0x0, @mcast1}, &(0x7f0000000140)=0x1c, 0x7fd) getsockopt$inet_IP_IPSEC_POLICY(r4, 0x0, 0x10, &(0x7f0000000940)={{{@in6=@local, @in6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@loopback}, 0x0, @in=@local}}, &(0x7f0000000780)=0xe8) getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f00000007c0)={0x0, 0x0, 0x0}, &(0x7f0000000540)=0xc) fchown(r4, r7, r8) r9 = syz_open_dev$binder(&(0x7f0000000100)='/dev/binder#\x00', 0xffffffffffffffff, 0x806) mmap$binder(&(0x7f000000c000/0x2000)=nil, 0x2000, 0x0, 0x12, r9, 0x0) ioctl$BINDER_WRITE_READ(r9, 0xc0306201, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000), 0x0, 0x0, &(0x7f0000011f9d)}) getsockopt$inet_sctp6_SCTP_AUTO_ASCONF(0xffffffffffffffff, 0x84, 0x1e, &(0x7f0000000140), &(0x7f0000000180)=0x4) ioctl$BINDER_WRITE_READ(r9, 0xc0306201, &(0x7f0000000340)={0x8, 0x0, &(0x7f0000000440)=ANY=[@ANYRES64=r1], 0x0, 0x0, &(0x7f0000000240)}) write(0xffffffffffffffff, &(0x7f0000000300)="8be25f5790f664f32509e40d6f879d5add7e2d359c9a19afb750a2d25352875d187d4118c99a2d5c6db433c277cc7d345b87a34f1b417033d367cb0cfd6a25633f77aafb17e99c33cb65352c901ae75176f07bb0a4bb5ebff3d87e", 0x5b) r10 = ioctl$LOOP_CTL_GET_FREE(r4, 0x4c82) ioctl$LOOP_CTL_REMOVE(r6, 0x4c81, r10) openat$cgroup(0xffffffffffffff9c, &(0x7f0000000000)='syz0\x00', 0x200002, 0x0) sched_setaffinity(r2, 0x8, &(0x7f0000000200)=0x7) [ 316.083867] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000019 [ 316.091130] R13: 00000000000003fa R14: 00000000006f8010 R15: 0000000000000006 [ 316.107774] FAT-fs (loop199): unable to read boot sector [ 316.128180] FAT-fs (loop199): unable to read boot sector [ 316.134787] FAT-fs (loop199): unable to read boot sector 2018/03/31 09:15:23 executing program 4: perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f000031f000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) prctl$void(0x0) getpid() r0 = syz_open_dev$vcsn(&(0x7f0000000040)='/dev/vcs#\x00', 0x0, 0x20000) ioctl$GIO_CMAP(r0, 0x4b70, &(0x7f0000000080)) r1 = socket$alg(0x26, 0x5, 0x0) ioctl$sock_SIOCGIFBR(0xffffffffffffffff, 0x8940, &(0x7f0000000040)=@get={0x1, &(0x7f0000000400)=""/242, 0x100000000}) bind$alg(r1, &(0x7f0000000080)={0x26, 'aead\x00', 0x0, 0x0, 'generic-gcm-aesni\x00'}, 0x58) r2 = syz_open_dev$sndmidi(&(0x7f0000000100)='/dev/snd/midiC#D#\x00', 0xfd, 0x0) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000240)={r2, 0x28, &(0x7f0000000200)}, 0x10) bind(0xffffffffffffffff, &(0x7f0000000140)=@llc={0x1a, 0x33a, 0x7, 0x80, 0x0, 0x4, @remote={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xbb}}, 0x80) r3 = syz_init_net_socket$nfc_llcp(0x27, 0x1, 0x1) setsockopt$nfc_llcp_NFC_LLCP_MIUX(r3, 0x118, 0x15, &(0x7f0000000000), 0x4) r4 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/cuse\x00', 0x103002, 0x0) futimesat(r4, &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)={{0x0, 0x7530}}) r5 = syz_open_dev$vcsa(&(0x7f00000001c0)='/dev/vcsa#\x00', 0x2, 0x0) sendto$inet6(r5, &(0x7f0000000bc0), 0x0, 0x20000000, &(0x7f0000000c40)={0xa, 0x4e20, 0x0, @dev={0xfe, 0x80, [], 0x19}, 0x1f}, 0x1c) accept$alg(r0, 0x0, 0x0) sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f0000000000)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x8}, 0xb4fcd35419244434, &(0x7f00004ca000)={&(0x7f0000000300)=ANY=[], 0x1a1}, 0x1}, 0x0) syz_fuseblk_mount(&(0x7f0000001380)='./file0\x00', &(0x7f00000013c0)='./file0\x00', 0xf000, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0xb21, 0x0) socket(0x1e, 0x3, 0x0) socket(0x1e, 0x0, 0x0) ptrace$PTRACE_SECCOMP_GET_FILTER(0x420c, 0x0, 0x0, &(0x7f0000000380)=""/113) sched_yield() ioctl$TUNGETIFF(r5, 0x800454d2, &(0x7f0000000140)) ioctl$KIOCSOUND(r5, 0x4b2f, 0xfffffffffffffb74) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x20, 0x9b}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000447000)='./file0\x00', &(0x7f00000e1000)='msdos\x00', 0x0, &(0x7f000097bfff)) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000580)='./cgroup/syz0\x00', 0x1ff) 2018/03/31 09:15:23 executing program 6: perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f000031f000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) prctl$void(0x0) getpid() r0 = syz_open_dev$vcsn(&(0x7f0000000040)='/dev/vcs#\x00', 0x0, 0x20000) ioctl$GIO_CMAP(r0, 0x4b70, &(0x7f0000000080)) r1 = socket$alg(0x26, 0x5, 0x0) ioctl$sock_SIOCGIFBR(0xffffffffffffffff, 0x8940, &(0x7f0000000040)=@get={0x1, &(0x7f0000000400)=""/242, 0x100000000}) bind$alg(r1, &(0x7f0000000080)={0x26, 'aead\x00', 0x0, 0x0, 'generic-gcm-aesni\x00'}, 0x58) syz_open_dev$sndmidi(&(0x7f0000000100)='/dev/snd/midiC#D#\x00', 0xfd, 0x0) bind(0xffffffffffffffff, &(0x7f0000000140)=@llc={0x1a, 0x33a, 0x7, 0x80, 0x0, 0x4, @remote={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xbb}}, 0x80) r2 = syz_init_net_socket$nfc_llcp(0x27, 0x1, 0x1) setsockopt$nfc_llcp_NFC_LLCP_MIUX(r2, 0x118, 0x15, &(0x7f0000000000), 0x4) r3 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/cuse\x00', 0x103002, 0x0) futimesat(r3, &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)={{0x0, 0x7530}}) r4 = syz_open_dev$vcsa(&(0x7f00000001c0)='/dev/vcsa#\x00', 0x2, 0x0) sendto$inet6(r4, &(0x7f0000000bc0), 0x0, 0x20000000, &(0x7f0000000c40)={0xa, 0x4e20, 0x0, @dev={0xfe, 0x80}, 0x1f}, 0x1c) accept$alg(r0, 0x0, 0x0) sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f0000000000)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x8}, 0xb4fcd35419244434, &(0x7f00004ca000)={&(0x7f0000000300)=ANY=[], 0x1a1}, 0x1}, 0x0) syz_fuseblk_mount(&(0x7f0000001380)='./file0\x00', &(0x7f00000013c0)='./file0\x00', 0xf000, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0xb21, 0x0) socket(0x1e, 0x3, 0x0) socket(0x1e, 0x0, 0x0) ptrace$PTRACE_SECCOMP_GET_FILTER(0x420c, 0x0, 0x0, &(0x7f0000000380)=""/113) sched_yield() ioctl$TUNGETIFF(r4, 0x800454d2, &(0x7f0000000140)) ioctl$KIOCSOUND(r4, 0x4b2f, 0xfffffffffffffb74) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x20, 0x9b}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000447000)='./file0\x00', &(0x7f00000e1000)='msdos\x00', 0x0, &(0x7f000097bfff)) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000580)='./cgroup/syz0\x00', 0x1ff) 2018/03/31 09:15:23 executing program 7 (fault-call:24 fault-nth:7): perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f000031f000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getpid() r0 = syz_open_dev$vcsn(&(0x7f0000000040)='/dev/vcs#\x00', 0x0, 0x20000) ioctl$GIO_CMAP(r0, 0x4b70, &(0x7f0000000080)) r1 = socket$alg(0x26, 0x5, 0x0) ioctl$sock_SIOCGIFBR(r1, 0x8940, &(0x7f0000000040)=@get={0x1, &(0x7f0000000400)=""/242, 0x100000000}) bind$alg(r1, &(0x7f0000000080)={0x26, 'aead\x00', 0x0, 0x0, 'generic-gcm-aesni\x00'}, 0x58) syz_open_dev$sndmidi(&(0x7f0000000100)='/dev/snd/midiC#D#\x00', 0xfd, 0x0) bind(0xffffffffffffffff, &(0x7f0000000140)=@llc={0x1a, 0x33a, 0x7, 0x80, 0x5, 0x4, @remote={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xbb}}, 0x80) r2 = syz_init_net_socket$nfc_llcp(0x27, 0x1, 0x1) setsockopt$nfc_llcp_NFC_LLCP_MIUX(r2, 0x118, 0x15, &(0x7f0000000000), 0x4) r3 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/cuse\x00', 0x103002, 0x0) futimesat(r3, &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)={{0x0, 0x7530}}) r4 = syz_open_dev$vcsa(&(0x7f00000001c0)='/dev/vcsa#\x00', 0x2, 0x4020ff) sendto$inet6(r4, &(0x7f0000000bc0)="36251e313e0743fc195a1a198a14434e8a0a00b3f452a3b5644e336ec712a16310c9aecc4e3097bc666a8882128a73c368ce731e9fbf3fe18fa52d00", 0x3c, 0x20000000, &(0x7f0000000c40)={0xa, 0x0, 0x6, @dev={0xfe, 0x80, [], 0x19}, 0x1f}, 0x1c) accept$alg(r0, 0x0, 0x0) sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f0000000000)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x8}, 0xb4fcd35419244434, &(0x7f00004ca000)={&(0x7f0000000300)=ANY=[], 0x1a1}, 0x1}, 0x0) syz_fuseblk_mount(&(0x7f0000001380)='./file0\x00', &(0x7f00000013c0)='./file0\x00', 0xf000, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0xb21, 0x0) socket(0x1e, 0x3, 0x0) socket(0x1e, 0x0, 0x0) ptrace$PTRACE_SECCOMP_GET_FILTER(0x420c, 0x0, 0x0, &(0x7f0000000380)=""/113) sched_yield() ioctl$TUNGETIFF(r4, 0x800454d2, &(0x7f0000000140)) ioctl$KIOCSOUND(r4, 0x4b2f, 0xfffffffffffffb74) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000447000)='./file0\x00', &(0x7f00000e1000)='msdos\x00', 0x0, &(0x7f000097bfff)) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000580)='./cgroup/syz0\x00', 0x1ff) syz_open_dev$audion(&(0x7f0000000280)='/dev/audio#\x00', 0x7be, 0x0) [ 316.160780] FAT-fs (loop199): unable to read boot sector [ 316.185096] FAT-fs (loop199): unable to read boot sector [ 316.193651] binder: 31075:31076 unknown command 20 [ 316.205683] FAT-fs (loop199): unable to read boot sector 2018/03/31 09:15:23 executing program 6: perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f000031f000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) prctl$void(0x0) getpid() r0 = syz_open_dev$vcsn(&(0x7f0000000040)='/dev/vcs#\x00', 0x0, 0x20000) ioctl$GIO_CMAP(r0, 0x4b70, &(0x7f0000000080)) r1 = socket$alg(0x26, 0x5, 0x0) ioctl$sock_SIOCGIFBR(0xffffffffffffffff, 0x8940, &(0x7f0000000040)=@get={0x1, &(0x7f0000000400)=""/242, 0x100000000}) bind$alg(r1, &(0x7f0000000080)={0x26, 'aead\x00', 0x0, 0x0, 'generic-gcm-aesni\x00'}, 0x58) syz_open_dev$sndmidi(&(0x7f0000000100)='/dev/snd/midiC#D#\x00', 0xfd, 0x0) bind(0xffffffffffffffff, &(0x7f0000000140)=@llc={0x1a, 0x33a, 0x7, 0x80, 0x0, 0x4, @remote={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xbb}}, 0x80) r2 = syz_init_net_socket$nfc_llcp(0x27, 0x1, 0x1) setsockopt$nfc_llcp_NFC_LLCP_MIUX(r2, 0x118, 0x15, &(0x7f0000000000), 0x4) r3 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/cuse\x00', 0x103002, 0x0) futimesat(r3, &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)={{0x0, 0x7530}}) r4 = syz_open_dev$vcsa(&(0x7f00000001c0)='/dev/vcsa#\x00', 0x2, 0x0) sendto$inet6(r4, &(0x7f0000000bc0), 0x0, 0x20000000, &(0x7f0000000c40)={0xa, 0x4e20, 0x0, @dev={0xfe, 0x80, [], 0x19}}, 0x1c) accept$alg(r0, 0x0, 0x0) sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f0000000000)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x8}, 0xb4fcd35419244434, &(0x7f00004ca000)={&(0x7f0000000300)=ANY=[], 0x1a1}, 0x1}, 0x0) syz_fuseblk_mount(&(0x7f0000001380)='./file0\x00', &(0x7f00000013c0)='./file0\x00', 0xf000, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0xb21, 0x0) socket(0x1e, 0x3, 0x0) socket(0x1e, 0x0, 0x0) ptrace$PTRACE_SECCOMP_GET_FILTER(0x420c, 0x0, 0x0, &(0x7f0000000380)=""/113) sched_yield() ioctl$TUNGETIFF(r4, 0x800454d2, &(0x7f0000000140)) ioctl$KIOCSOUND(r4, 0x4b2f, 0xfffffffffffffb74) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x20, 0x9b}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000447000)='./file0\x00', &(0x7f00000e1000)='msdos\x00', 0x0, &(0x7f000097bfff)) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000580)='./cgroup/syz0\x00', 0x1ff) 2018/03/31 09:15:23 executing program 5: perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f000031f000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) prctl$void(0x0) getpid() r0 = syz_open_dev$vcsn(&(0x7f0000000040)='/dev/vcs#\x00', 0x0, 0x20000) ioctl$GIO_CMAP(r0, 0x4b70, &(0x7f0000000080)) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000080)={0x26, 'aead\x00', 0x0, 0x0, 'generic-gcm-aesni\x00'}, 0x58) syz_open_dev$sndmidi(&(0x7f0000000100)='/dev/snd/midiC#D#\x00', 0xfd, 0x0) bind(0xffffffffffffffff, &(0x7f0000000140)=@llc={0x1a, 0x33a, 0x7, 0x80, 0x5, 0x4, @remote={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xbb}}, 0x80) r2 = syz_init_net_socket$nfc_llcp(0x27, 0x1, 0x1) setsockopt$nfc_llcp_NFC_LLCP_MIUX(r2, 0x118, 0x15, &(0x7f0000000000), 0x4) r3 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/cuse\x00', 0x103002, 0x0) futimesat(r3, &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)={{0x0, 0x7530}}) r4 = syz_open_dev$vcsa(&(0x7f00000001c0)='/dev/vcsa#\x00', 0x2, 0x4020ff) sendto$inet6(0xffffffffffffffff, &(0x7f0000000bc0)="36251e313e0743fc195a1a198a14434e8a0a00b3f452a3b5644e336ec712a16310c9aecc4e3097bc666a8882128a73c368ce731e9fbf3fe18fa52d", 0x3b, 0x20000000, &(0x7f0000000c40)={0xa, 0x4e20, 0x6, @dev={0xfe, 0x80, [], 0x19}, 0x1f}, 0x1c) accept$alg(r0, 0x0, 0x0) sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f0000000000)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x8}, 0xb4fcd35419244434, &(0x7f00004ca000)={&(0x7f0000000300)=ANY=[], 0x1a1}, 0x1}, 0x0) syz_fuseblk_mount(&(0x7f0000001380)='./file0\x00', &(0x7f00000013c0)='./file0\x00', 0xf000, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0xb21, 0x0) socket(0x1e, 0x3, 0x0) socket(0x1e, 0x0, 0x0) ptrace$PTRACE_SECCOMP_GET_FILTER(0x420c, 0x0, 0x0, &(0x7f0000000380)=""/113) sched_yield() ioctl$TUNGETIFF(r4, 0x800454d2, &(0x7f0000000140)) ioctl$sock_SIOCBRADDBR(r3, 0x89a0, &(0x7f0000000200)='syzkaller0\x00') ioctl$KIOCSOUND(r4, 0x4b2f, 0xfffffffffffffb74) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x20, 0x9b}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000447000)='./file0\x00', &(0x7f00000e1000)='msdos\x00', 0x0, &(0x7f000097bfff)) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000580)='./cgroup/syz0\x00', 0x1ff) syz_open_dev$audion(&(0x7f0000000280)='/dev/audio#\x00', 0x7be, 0x0) [ 316.229145] binder: 31075:31076 ioctl c0306201 20000340 returned -22 [ 316.255633] FAT-fs (loop199): unable to read boot sector [ 316.264646] FAULT_INJECTION: forcing a failure. [ 316.264646] name failslab, interval 1, probability 0, space 0, times 0 [ 316.275937] CPU: 1 PID: 31083 Comm: syz-executor7 Not tainted 4.16.0-rc7+ #8 [ 316.283116] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 316.292457] Call Trace: [ 316.295035] dump_stack+0x194/0x24d [ 316.298658] ? arch_local_irq_restore+0x53/0x53 [ 316.303314] ? __unwind_start+0x169/0x330 [ 316.307452] ? __kernel_text_address+0xd/0x40 [ 316.311945] should_fail+0x8c0/0xa40 [ 316.315650] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 316.320741] ? perf_trace_lock_acquire+0xe3/0x980 [ 316.325572] ? save_stack+0xa3/0xd0 [ 316.329190] ? perf_trace_lock+0x900/0x900 [ 316.333412] ? do_mount+0xea4/0x2bb0 [ 316.337116] ? find_held_lock+0x35/0x1d0 [ 316.341182] ? check_same_owner+0x320/0x320 [ 316.345501] ? rcu_note_context_switch+0x710/0x710 [ 316.350428] should_failslab+0xec/0x120 [ 316.354394] __kmalloc_track_caller+0x5f/0x760 [ 316.358968] ? do_raw_spin_trylock+0x190/0x190 [ 316.363540] ? kstrdup_const+0x39/0x50 [ 316.367420] kstrdup+0x39/0x70 [ 316.370605] kstrdup_const+0x39/0x50 [ 316.374308] alloc_vfsmnt+0x1a5/0x9c0 [ 316.378099] ? path_lookupat+0x238/0xba0 [ 316.382149] ? mnt_free_id.isra.21+0x50/0x50 [ 316.386551] ? trace_hardirqs_off+0x10/0x10 [ 316.390863] ? putname+0xee/0x130 [ 316.394308] ? rcu_read_lock_sched_held+0x108/0x120 [ 316.399318] ? find_held_lock+0x35/0x1d0 [ 316.403372] ? __get_fs_type+0x8a/0xc0 [ 316.407249] ? lock_downgrade+0x980/0x980 [ 316.411387] ? module_unload_free+0x5b0/0x5b0 [ 316.415870] ? lock_release+0xa40/0xa40 [ 316.419832] ? mpi_resize+0x200/0x200 [ 316.423626] vfs_kern_mount.part.26+0x84/0x4a0 [ 316.428202] ? may_umount+0xa0/0xa0 [ 316.431817] ? _raw_read_unlock+0x22/0x30 [ 316.435956] ? __get_fs_type+0x8a/0xc0 [ 316.439836] do_mount+0xea4/0x2bb0 [ 316.443370] ? copy_mount_string+0x40/0x40 [ 316.447593] ? trace_hardirqs_on_caller+0x421/0x5c0 [ 316.452601] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 316.457356] ? retint_kernel+0x10/0x10 [ 316.461234] ? copy_mount_options+0x18b/0x2e0 [ 316.465717] ? copy_mount_options+0x193/0x2e0 [ 316.470201] ? copy_mount_options+0x1f7/0x2e0 [ 316.474691] SyS_mount+0xab/0x120 [ 316.478133] ? copy_mnt_ns+0xb30/0xb30 [ 316.482012] do_syscall_64+0x281/0x940 [ 316.485890] ? vmalloc_sync_all+0x30/0x30 [ 316.490025] ? _raw_spin_unlock_irq+0x27/0x70 [ 316.494508] ? finish_task_switch+0x1c1/0x7e0 [ 316.498990] ? syscall_return_slowpath+0x550/0x550 [ 316.503909] ? syscall_return_slowpath+0x2ac/0x550 [ 316.508826] ? prepare_exit_to_usermode+0x350/0x350 [ 316.513835] ? entry_SYSCALL_64_after_hwframe+0x52/0xb7 [ 316.519192] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 316.524037] entry_SYSCALL_64_after_hwframe+0x42/0xb7 2018/03/31 09:15:23 executing program 0: perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f000031f000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) prctl$void(0x0) r0 = syz_open_dev$vcsn(&(0x7f0000000040)='/dev/vcs#\x00', 0x0, 0x20000) r1 = socket$alg(0x26, 0x5, 0x0) ioctl$sock_SIOCGIFBR(r1, 0x8940, &(0x7f0000000240)=@generic={0x7, 0x8, 0x1000}) bind$alg(0xffffffffffffffff, &(0x7f0000000080)={0x26, 'aead\x00', 0x0, 0x0, 'generic-gcm-aesni\x00'}, 0x58) r2 = syz_open_dev$sndmidi(&(0x7f0000000100)='/dev/snd/midiC#D#\x00', 0xfd, 0x0) bind(0xffffffffffffffff, &(0x7f0000000140)=@llc={0x1a, 0x33a, 0x7, 0x80, 0x0, 0x4, @remote={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xbb}}, 0x80) r3 = syz_init_net_socket$nfc_llcp(0x27, 0x3, 0x1) setsockopt$nfc_llcp_NFC_LLCP_MIUX(r3, 0x118, 0x15, &(0x7f0000000000), 0x4) r4 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/cuse\x00', 0x103002, 0x0) futimesat(r4, &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)={{0x0, 0x7530}}) r5 = syz_open_dev$vcsa(&(0x7f00000001c0)='/dev/vcsa#\x00', 0x2, 0x0) sendto$inet6(r5, &(0x7f0000000bc0)="36251e313e0743fc195a1a198a14434e8a0a00b3f452a3b5644e336ec712a16310c9aecc4e3097bc666a8882128a73c368ce731e9fbf3fe18fa52d00c34ac2e57c1c4569cfbd6a621c6dfbc032121aed", 0x50, 0x20000000, &(0x7f0000000c40)={0xa, 0x4e20, 0x6, @dev={0xfe, 0x80, [], 0x19}, 0x1f}, 0x1c) accept$alg(r0, 0x0, 0x0) ioctl$DRM_IOCTL_GET_CTX(r5, 0xc0086423, &(0x7f0000000280)={0x0, 0x2}) sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f0000000000)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x8}, 0xb4fcd35419244434, &(0x7f00004ca000)={&(0x7f0000000300)=ANY=[], 0x1a1}, 0x1}, 0x0) ioctl$TIOCCONS(r2, 0x541d) syz_fuseblk_mount(&(0x7f0000001380)='./file0\x00', &(0x7f00000013c0)='./file0\x00', 0xf000, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0xb21, 0x0) r6 = socket(0x1e, 0x3, 0x0) socket(0x1e, 0x0, 0x0) ptrace$PTRACE_SECCOMP_GET_FILTER(0x420c, 0x0, 0x0, &(0x7f0000000380)=""/113) sched_yield() ioctl$TUNGETIFF(r5, 0x800454d2, &(0x7f0000000140)) setsockopt$RDS_RECVERR(r6, 0x114, 0x5, &(0x7f00000002c0), 0x4) ioctl$KIOCSOUND(r5, 0x4b2f, 0xfffffffffffffb74) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x20, 0x9b}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000447000)='./file0\x00', &(0x7f00000e1000)='msdos\x00', 0x0, &(0x7f000097bfff)) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000500)='./cgroup/syz1\x00', 0x1ff) 2018/03/31 09:15:23 executing program 1: perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f000031f000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) prctl$void(0x0) getpid() r0 = syz_open_dev$vcsn(&(0x7f0000000040)='/dev/vcs#\x00', 0x400, 0x20000) r1 = socket$alg(0x26, 0x5, 0x0) ioctl$sock_SIOCGIFBR(r1, 0x8940, &(0x7f0000000040)=@get={0x1, &(0x7f0000000400)=""/242, 0x100000000}) bind$alg(r1, &(0x7f0000000080)={0x26, 'aead\x00', 0x0, 0x0, 'generic-gcm-aesni\x00'}, 0x58) r2 = syz_open_dev$sndmidi(&(0x7f0000000100)='/dev/snd/midiC#D#\x00', 0xfd, 0x0) bind(r2, &(0x7f0000000140)=@llc={0x1a, 0x33a, 0x7, 0x80, 0x0, 0x4, @remote={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xbb}}, 0x80) r3 = syz_init_net_socket$nfc_llcp(0x27, 0x1, 0x1) setsockopt$nfc_llcp_NFC_LLCP_MIUX(r3, 0x118, 0x15, &(0x7f0000000000), 0x4) r4 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/cuse\x00', 0x103002, 0x0) futimesat(r4, &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)={{0x0, 0x7530}}) r5 = syz_open_dev$vcsa(&(0x7f00000001c0)='/dev/vcsa#\x00', 0x2, 0x4020ff) sendto$inet6(r5, &(0x7f0000000bc0), 0x0, 0x20000000, &(0x7f0000000c40)={0xa, 0x4e20, 0x6, @dev={0xfe, 0x80, [], 0x19}, 0x1f}, 0x1c) sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f0000000000)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x8}, 0xb4fcd35419244434, &(0x7f00004ca000)={&(0x7f0000000300)=ANY=[], 0x1a1}, 0x1}, 0x0) syz_fuseblk_mount(&(0x7f0000001380)='./file0\x00', &(0x7f00000013c0)='./file0\x00', 0xf000, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0xb21, 0x0) socket(0x1e, 0x3, 0x0) ptrace$PTRACE_SECCOMP_GET_FILTER(0x420c, 0x0, 0x0, &(0x7f0000000380)=""/113) sched_yield() ioctl$TUNGETIFF(r5, 0x800454d2, &(0x7f0000000140)) ioctl$KIOCSOUND(r5, 0x4b2f, 0xfffffffffffffb74) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x20, 0x9b}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$KVM_XEN_HVM_CONFIG(r0, 0x4038ae7a, &(0x7f0000000240)={0x24, 0x303, &(0x7f0000000200)="0ec2ea8cae05df1de951a4a7f1be3a", &(0x7f0000001400)="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", 0xf, 0x1000}) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000447000)='./file0\x00', &(0x7f00000e1000)='msdos\x00', 0x0, &(0x7f000097bfff)) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000580)='./cgroup/syz0\x00', 0x1ff) syz_open_dev$audion(&(0x7f0000000280)='/dev/audio#\x00', 0x7be, 0x0) fcntl$getown(0xffffffffffffffff, 0x9) [ 316.529218] RIP: 0033:0x454e79 [ 316.532394] RSP: 002b:00007f37fba8ec68 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 316.540096] RAX: ffffffffffffffda RBX: 00007f37fba8f6d4 RCX: 0000000000454e79 [ 316.547353] RDX: 00000000200e1000 RSI: 0000000020447000 RDI: 0000000020000000 [ 316.554614] RBP: 000000000072bea0 R08: 000000002097bfff R09: 0000000000000000 [ 316.561874] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000019 [ 316.569131] R13: 00000000000003fa R14: 00000000006f8010 R15: 0000000000000007 [ 316.604699] binder_alloc: binder_alloc_mmap_handler: 31075 2000c000-2000e000 already mapped failed -16 [ 316.617654] FAT-fs (loop199): unable to read boot sector [ 316.629259] binder: 31075:31076 ioctl c0306201 20000340 returned -14 [ 316.648140] FAT-fs (loop199): unable to read boot sector [ 316.674910] FAT-fs (loop199): unable to read boot sector [ 316.692889] FAT-fs (loop199): unable to read boot sector [ 316.734211] FAT-fs (loop199): unable to read boot sector [ 316.742578] FAT-fs (loop199): unable to read boot sector [ 316.764618] FAT-fs (loop199): unable to read boot sector 2018/03/31 09:15:23 executing program 3: r0 = syz_open_dev$random(&(0x7f00000001c0)='/dev/random\x00', 0x0, 0x800) r1 = syz_open_dev$loop(&(0x7f0000308000)='/dev/loop#\x00', 0x0, 0x0) ioctl$LOOP_SET_STATUS(r1, 0xc0481273, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "3900ea631d00000000020000010000009f00000023f7b7d65f90b0e6330ee739b319d8f6aa6bd58d1443474482e85040fb4947ebb55bd19f335b5bffff0001f3", "cfa430745a540dc1c149b7b81579f6a41c51f7d51933223e82ab867dac761faf"}) write(0xffffffffffffffff, &(0x7f00000001c0), 0x0) setsockopt$inet_sctp6_SCTP_RECVNXTINFO(0xffffffffffffffff, 0x84, 0x21, &(0x7f00000003c0)=0x200, 0x4) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f00000000c0)=0x0) getsockopt$netrom_NETROM_T4(0xffffffffffffffff, 0x103, 0x6, &(0x7f0000000300)=0x8, &(0x7f0000000340)=0x4) r3 = getpid() sched_setparam(r3, &(0x7f0000000400)) syz_open_dev$loop(&(0x7f0000ca9ff5)='/dev/loop#\x00', 0x0, 0x82) r4 = memfd_create(&(0x7f0000614000)="74086e750000000000000000008c00", 0x0) pwritev(r4, &(0x7f0000f50f90)=[{&(0x7f0000000040)="aa", 0x1}], 0x1, 0x0) fcntl$getownex(r1, 0x10, &(0x7f0000000240)={0x0, 0x0}) r6 = syz_open_procfs(r5, &(0x7f0000000280)='stat\x00') epoll_ctl$EPOLL_CTL_MOD(r4, 0x3, r0, &(0x7f00000002c0)={0x20000010}) accept4$inet6(r4, &(0x7f0000000100)={0x0, 0x0, 0x0, @mcast1}, &(0x7f0000000140)=0x1c, 0x7fd) getsockopt$inet_IP_IPSEC_POLICY(r4, 0x0, 0x10, &(0x7f0000000940)={{{@in6=@local, @in6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@loopback}, 0x0, @in=@local}}, &(0x7f0000000780)=0xe8) getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f00000007c0)={0x0, 0x0, 0x0}, &(0x7f0000000540)=0xc) fchown(r4, r7, r8) r9 = syz_open_dev$binder(&(0x7f0000000100)='/dev/binder#\x00', 0xffffffffffffffff, 0x806) ioctl$BINDER_SET_CONTEXT_MGR(r6, 0x40046207, 0x0) mmap$binder(&(0x7f000000c000/0x2000)=nil, 0x2000, 0x0, 0x12, r9, 0x0) ioctl$BINDER_WRITE_READ(r9, 0xc0306201, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000), 0x0, 0x0, &(0x7f0000011f9d)}) getsockopt$inet_sctp6_SCTP_AUTO_ASCONF(0xffffffffffffffff, 0x84, 0x1e, &(0x7f0000000140), &(0x7f0000000180)=0x4) ioctl$BINDER_WRITE_READ(r9, 0xc0306201, &(0x7f0000000340)={0x8, 0x0, &(0x7f0000000440)=ANY=[@ANYRES64=r1], 0x0, 0x0, &(0x7f0000000240)}) r10 = ioctl$LOOP_CTL_GET_FREE(r4, 0x4c82) ioctl$LOOP_CTL_REMOVE(r6, 0x4c81, r10) openat$cgroup(0xffffffffffffff9c, &(0x7f0000000000)='syz0\x00', 0x200002, 0x0) sched_setaffinity(r2, 0x8, &(0x7f0000000200)=0x7) 2018/03/31 09:15:23 executing program 0: perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f000031f000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) prctl$void(0x0) r0 = syz_open_dev$vcsn(&(0x7f0000000040)='/dev/vcs#\x00', 0x0, 0x20000) socket$alg(0x26, 0x5, 0x0) ioctl$sock_SIOCGIFBR(0xffffffffffffffff, 0x8940, &(0x7f0000000040)=@get={0x1, &(0x7f0000000400)=""/242, 0x100000000}) bind$alg(0xffffffffffffffff, &(0x7f0000000080)={0x26, 'aead\x00', 0x0, 0x0, 'generic-gcm-aesni\x00'}, 0x58) syz_open_dev$sndmidi(&(0x7f0000000100)='/dev/snd/midiC#D#\x00', 0xfd, 0x0) bind(0xffffffffffffffff, &(0x7f0000000140)=@llc={0x1a, 0x33a, 0x7, 0x80, 0x0, 0x4, @remote={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xbb}}, 0x80) r1 = syz_init_net_socket$nfc_llcp(0x27, 0x1, 0x1) setsockopt$nfc_llcp_NFC_LLCP_MIUX(r1, 0x118, 0x15, &(0x7f0000000000), 0x4) r2 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/cuse\x00', 0x103002, 0x0) renameat(r0, &(0x7f0000000280)='./file0\x00', r2, &(0x7f0000000300)='./file0\x00') futimesat(r2, &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)={{0x0, 0x7530}}) r3 = syz_open_dev$vcsa(&(0x7f00000001c0)='/dev/vcsa#\x00', 0x2, 0x0) sendto$inet6(r3, &(0x7f0000000bc0)="36251e313e0743fc195a1a198a14434e8a0a00b3f452a3b5644e336ec712a16310c9aecc4e3097bc666a8882128a73c368ce731e9fbf3fe18fa52d00c34ac2e57c1c4569cfbd6a621c6dfbc032121aed", 0x50, 0x20000000, &(0x7f0000000c40)={0xa, 0x4e20, 0x6, @dev={0xfe, 0x80, [], 0x19}, 0x1f}, 0x1c) accept$alg(r0, 0x0, 0x0) sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f0000000000)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x8}, 0xb4fcd35419244434, &(0x7f00004ca000)={&(0x7f0000000300)=ANY=[], 0x1a1}, 0x1}, 0x0) syz_fuseblk_mount(&(0x7f0000001380)='./file0\x00', &(0x7f00000013c0)='./file0\x00', 0xf000, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0xb21, 0x0) socket(0x1e, 0x3, 0x0) socket(0x1e, 0x0, 0x0) ptrace$PTRACE_SECCOMP_GET_FILTER(0x420c, 0x0, 0x0, &(0x7f0000000380)=""/113) sched_yield() ioctl$TUNGETIFF(r3, 0x800454d2, &(0x7f0000000140)) ioctl$KIOCSOUND(r3, 0x4b2f, 0xfffffffffffffb74) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x20, 0x9b}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000240)='./file0\x00', &(0x7f0000000200)='iso9660\x00', 0x0, &(0x7f000097bfff)) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000580)='./cgroup/syz0\x00', 0x1ff) 2018/03/31 09:15:23 executing program 4: perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f000031f000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) prctl$void(0x0) r0 = getpid() r1 = syz_open_dev$vcsn(&(0x7f0000000040)='/dev/vcs#\x00', 0x0, 0x20000) ptrace(0xffffffffffffffff, r0) ioctl$GIO_CMAP(r1, 0x4b70, &(0x7f0000000080)) r2 = socket$alg(0x26, 0x5, 0x0) ioctl$sock_SIOCGIFBR(0xffffffffffffffff, 0x8940, &(0x7f0000000040)=@get={0x1, &(0x7f0000000400)=""/242, 0x100000000}) bind$alg(r2, &(0x7f0000000080)={0x26, 'aead\x00', 0x0, 0x0, 'generic-gcm-aesni\x00'}, 0x58) r3 = syz_open_dev$sndmidi(&(0x7f0000000100)='/dev/snd/midiC#D#\x00', 0xfd, 0x0) bind(0xffffffffffffffff, &(0x7f0000000140)=@llc={0x1a, 0x33a, 0x7, 0x80, 0x0, 0x4, @remote={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xbb}}, 0x80) r4 = syz_init_net_socket$nfc_llcp(0x27, 0x1, 0x1) setsockopt$nfc_llcp_NFC_LLCP_MIUX(r4, 0x118, 0x15, &(0x7f0000000000), 0x4) r5 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/cuse\x00', 0x103002, 0x0) futimesat(r5, &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)={{0x0, 0x7530}}) r6 = syz_open_dev$vcsa(&(0x7f00000001c0)='/dev/vcsa#\x00', 0x2, 0x0) sendto$inet6(r6, &(0x7f0000000bc0), 0x0, 0x20000000, &(0x7f0000000c40)={0xa, 0x4e20, 0x0, @dev={0xfe, 0x80, [], 0x19}, 0x1f}, 0x1c) accept$alg(r1, 0x0, 0x0) sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f0000000000)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x8}, 0xb4fcd35419244434, &(0x7f00004ca000)={&(0x7f0000000300)=ANY=[], 0x1a1}, 0x1}, 0x0) syz_fuseblk_mount(&(0x7f0000001380)='./file0\x00', &(0x7f00000013c0)='./file0\x00', 0xf000, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0xb21, 0x0) socket(0x1e, 0x3, 0x0) socket(0x1e, 0x0, 0x0) ptrace$PTRACE_SECCOMP_GET_FILTER(0x420c, 0x0, 0x0, &(0x7f0000000380)=""/113) sched_yield() ioctl$TUNGETIFF(r6, 0x800454d2, &(0x7f0000000140)) ioctl$KIOCSOUND(r3, 0x4b2f, 0x5) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x20, 0x9b}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000447000)='./file0\x00', &(0x7f00000e1000)='msdos\x00', 0x0, &(0x7f000097bfff)) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000580)='./cgroup/syz0\x00', 0x1ff) 2018/03/31 09:15:23 executing program 6: perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f000031f000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) prctl$void(0x0) getpid() r0 = syz_open_dev$vcsn(&(0x7f0000000040)='/dev/vcs#\x00', 0x0, 0x20000) ioctl$GIO_CMAP(r0, 0x4b70, &(0x7f0000000080)) r1 = socket$alg(0x26, 0x5, 0x0) ioctl$sock_SIOCGIFBR(0xffffffffffffffff, 0x8940, &(0x7f0000000040)=@get={0x1, &(0x7f0000000400)=""/242, 0x100000000}) bind$alg(r1, &(0x7f0000000080)={0x26, 'aead\x00', 0x0, 0x0, 'generic-gcm-aesni\x00'}, 0x58) syz_open_dev$sndmidi(&(0x7f0000000100)='/dev/snd/midiC#D#\x00', 0xfd, 0x0) bind(0xffffffffffffffff, &(0x7f0000000140)=@llc={0x1a, 0x33a, 0x7, 0x80, 0x0, 0x4, @remote={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xbb}}, 0x80) r2 = syz_init_net_socket$nfc_llcp(0x27, 0x1, 0x1) setsockopt$nfc_llcp_NFC_LLCP_MIUX(r2, 0x118, 0x15, &(0x7f0000000000), 0x4) r3 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/cuse\x00', 0x103002, 0x0) futimesat(r3, &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)={{0x0, 0x7530}}) r4 = syz_open_dev$vcsa(&(0x7f00000001c0)='/dev/vcsa#\x00', 0x2, 0x0) sendto$inet6(r4, &(0x7f0000000bc0), 0x0, 0x20000000, &(0x7f0000000c40)={0xa, 0x4e20, 0x0, @dev={0xfe, 0x80, [], 0x19}}, 0x1c) accept$alg(r0, 0x0, 0x0) sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f0000000000)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x8}, 0xb4fcd35419244434, &(0x7f00004ca000)={&(0x7f0000000300)=ANY=[], 0x1a1}, 0x1}, 0x0) syz_fuseblk_mount(&(0x7f0000001380)='./file0\x00', &(0x7f00000013c0)='./file0\x00', 0xf000, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0xb21, 0x0) socket(0x1e, 0x3, 0x0) socket(0x1e, 0x0, 0x0) ptrace$PTRACE_SECCOMP_GET_FILTER(0x420c, 0x0, 0x0, &(0x7f0000000380)=""/113) sched_yield() ioctl$TUNGETIFF(r4, 0x800454d2, &(0x7f0000000140)) ioctl$KIOCSOUND(r4, 0x4b2f, 0xfffffffffffffb74) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x20, 0x9b}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000447000)='./file0\x00', &(0x7f00000e1000)='msdos\x00', 0x0, &(0x7f000097bfff)) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000580)='./cgroup/syz0\x00', 0x1ff) 2018/03/31 09:15:23 executing program 7 (fault-call:24 fault-nth:8): perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f000031f000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getpid() r0 = syz_open_dev$vcsn(&(0x7f0000000040)='/dev/vcs#\x00', 0x0, 0x20000) ioctl$GIO_CMAP(r0, 0x4b70, &(0x7f0000000080)) r1 = socket$alg(0x26, 0x5, 0x0) ioctl$sock_SIOCGIFBR(r1, 0x8940, &(0x7f0000000040)=@get={0x1, &(0x7f0000000400)=""/242, 0x100000000}) bind$alg(r1, &(0x7f0000000080)={0x26, 'aead\x00', 0x0, 0x0, 'generic-gcm-aesni\x00'}, 0x58) syz_open_dev$sndmidi(&(0x7f0000000100)='/dev/snd/midiC#D#\x00', 0xfd, 0x0) bind(0xffffffffffffffff, &(0x7f0000000140)=@llc={0x1a, 0x33a, 0x7, 0x80, 0x5, 0x4, @remote={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xbb}}, 0x80) r2 = syz_init_net_socket$nfc_llcp(0x27, 0x1, 0x1) setsockopt$nfc_llcp_NFC_LLCP_MIUX(r2, 0x118, 0x15, &(0x7f0000000000), 0x4) r3 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/cuse\x00', 0x103002, 0x0) futimesat(r3, &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)={{0x0, 0x7530}}) r4 = syz_open_dev$vcsa(&(0x7f00000001c0)='/dev/vcsa#\x00', 0x2, 0x4020ff) sendto$inet6(r4, &(0x7f0000000bc0)="36251e313e0743fc195a1a198a14434e8a0a00b3f452a3b5644e336ec712a16310c9aecc4e3097bc666a8882128a73c368ce731e9fbf3fe18fa52d00", 0x3c, 0x20000000, &(0x7f0000000c40)={0xa, 0x0, 0x6, @dev={0xfe, 0x80, [], 0x19}, 0x1f}, 0x1c) accept$alg(r0, 0x0, 0x0) sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f0000000000)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x8}, 0xb4fcd35419244434, &(0x7f00004ca000)={&(0x7f0000000300)=ANY=[], 0x1a1}, 0x1}, 0x0) syz_fuseblk_mount(&(0x7f0000001380)='./file0\x00', &(0x7f00000013c0)='./file0\x00', 0xf000, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0xb21, 0x0) socket(0x1e, 0x3, 0x0) socket(0x1e, 0x0, 0x0) ptrace$PTRACE_SECCOMP_GET_FILTER(0x420c, 0x0, 0x0, &(0x7f0000000380)=""/113) sched_yield() ioctl$TUNGETIFF(r4, 0x800454d2, &(0x7f0000000140)) ioctl$KIOCSOUND(r4, 0x4b2f, 0xfffffffffffffb74) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000447000)='./file0\x00', &(0x7f00000e1000)='msdos\x00', 0x0, &(0x7f000097bfff)) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000580)='./cgroup/syz0\x00', 0x1ff) syz_open_dev$audion(&(0x7f0000000280)='/dev/audio#\x00', 0x7be, 0x0) 2018/03/31 09:15:23 executing program 5: perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f000031f000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) prctl$void(0x0) getpid() r0 = syz_open_dev$vcsn(&(0x7f0000000040)='/dev/vcs#\x00', 0x0, 0x20000) ioctl$GIO_CMAP(r0, 0x4b70, &(0x7f0000000080)) r1 = socket$alg(0x26, 0x5, 0x0) epoll_wait(r0, &(0x7f0000000200)=[{}, {}, {}, {}, {}, {}, {}, {}], 0x8, 0x0) bind$alg(r1, &(0x7f0000000080)={0x26, 'aead\x00', 0x0, 0x0, 'generic-gcm-aesni\x00'}, 0x58) syz_open_dev$sndmidi(&(0x7f0000000100)='/dev/snd/midiC#D#\x00', 0xfd, 0x0) bind(0xffffffffffffffff, &(0x7f0000000140)=@llc={0x1a, 0x33a, 0x7, 0x80, 0x5, 0x4, @remote={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xbb}}, 0x80) r2 = syz_init_net_socket$nfc_llcp(0x27, 0x1, 0x1) setsockopt$nfc_llcp_NFC_LLCP_MIUX(r2, 0x118, 0x15, &(0x7f0000000000), 0x4) r3 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/cuse\x00', 0x103002, 0x0) futimesat(r3, &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)={{0x0, 0x7530}}) r4 = syz_open_dev$vcsa(&(0x7f00000001c0)='/dev/vcsa#\x00', 0x2, 0x4020ff) sendto$inet6(0xffffffffffffffff, &(0x7f0000000bc0)="36251e313e0743fc195a1a198a14434e8a0a00b3f452a3b5644e336ec712a16310c9aecc4e3097bc666a8882128a73c368ce731e9fbf3fe18fa52d", 0x3b, 0x20000000, &(0x7f0000000c40)={0xa, 0x4e20, 0x6, @dev={0xfe, 0x80, [], 0x19}, 0x1f}, 0x1c) accept$alg(r0, 0x0, 0x0) sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f0000000000)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x8}, 0xb4fcd35419244434, &(0x7f00004ca000)={&(0x7f0000000300)=ANY=[], 0x1a1}, 0x1}, 0x0) syz_fuseblk_mount(&(0x7f0000001380)='./file0\x00', &(0x7f00000013c0)='./file0\x00', 0xf000, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0xb21, 0x0) socket(0x1e, 0x3, 0x0) socket(0x1e, 0x0, 0x0) ptrace$PTRACE_SECCOMP_GET_FILTER(0x420c, 0x0, 0x0, &(0x7f0000000380)=""/113) sched_yield() ioctl$TUNGETIFF(r4, 0x800454d2, &(0x7f0000000140)) ioctl$KIOCSOUND(r4, 0x4b2f, 0xfffffffffffffb74) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x20, 0x9b}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000447000)='./file0\x00', &(0x7f00000e1000)='msdos\x00', 0x0, &(0x7f000097bfff)) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000580)='./cgroup/syz0\x00', 0x1ff) syz_open_dev$audion(&(0x7f0000000280)='/dev/audio#\x00', 0x7be, 0x0) 2018/03/31 09:15:23 executing program 2: syz_open_dev$loop(&(0x7f00000003c0)='/dev/loop#\x00', 0x8, 0x0) r0 = syz_open_dev$sndseq(&(0x7f00000001c0)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r0, 0x4040534e, &(0x7f000019ffe9)={0xc1}) r1 = accept(0xffffffffffffffff, &(0x7f0000000080)=@can, &(0x7f0000000180)=0x80) ioctl$sock_ipx_SIOCAIPXPRISLT(r1, 0x89e1, &(0x7f0000000280)=0x3f) ioctl$sock_inet_SIOCRTMSG(r1, 0x890d, &(0x7f0000000200)={0x80, {0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x19}}, {0x2, 0x4e21, @local={0xac, 0x14, 0x14, 0xaa}}, {0x2, 0x4e23}, 0x0, 0x7, 0x1, 0x0, 0x9, 0x0, 0x0, 0x0, 0xfffffffffffffff7}) getsockopt$inet_sctp_SCTP_PRIMARY_ADDR(0xffffffffffffffff, 0x84, 0x6, &(0x7f0000000ac0)={0x0, @in={{0x2, 0x4e20, @loopback=0x7f000001}}}, &(0x7f00000002c0)=0x84) r3 = syz_open_dev$sg(&(0x7f0000000700)='/dev/sg#\x00', 0xfffffffffffffff7, 0x800) clone(0x2000c100, &(0x7f0000000800)="97bb77038add5df9e9d4f9783b82c55fe59e5c0acdbcfc9bcf92ac0e1f1f3c1959c1d25dfabf3849336c7c85be174d7765b47e113632aea54b87e4d3f2c1db09e6aa4040b43d17308fb7e62e808067da2fff3cfd8e4c038c814bbfc6bc49d8ebc8671d8297e2d34dc61f2d194d2dbb8f59b4c853e0714d3d4bb29d1243fac01c86c8c4dd38daedab3c6ad73a72d3f6dd2684aa82e5285eb82452c9848b7beb8bc513ba8c8973cad0bd5926604846b7f5d0397b", &(0x7f00000008c0), &(0x7f0000000900), &(0x7f0000000940)="ed6c04412e782fe395f084741e3d9fe469aebde09acc8f8d8d84d1f00f5573b09acba487077ebb904cb1f3fed55f59d677ce24bbd2a7506df8e1e0d0fc709cb8c9f4ab2aeeeebc5ef879742c1f7628f1862c88b5b0da89acbf43ef12e4839405b6a3430d296fea06d2f3a8356c57ec991e") ioctl$SNDRV_SEQ_IOCTL_SUBSCRIBE_PORT(r0, 0x40505330, &(0x7f0000ec6fb0)={{}, {0x80}}) getsockopt$netrom_NETROM_T1(r1, 0x103, 0x1, &(0x7f0000000000), &(0x7f0000000380)=0x4) syz_open_dev$adsp(&(0x7f0000000600)='/dev/adsp#\x00', 0x100000000, 0x80000) rt_sigprocmask(0x3d738072cd0f41ac, &(0x7f0000000cc0)={0x7}, &(0x7f0000000d00), 0x8) clone(0x40000000, &(0x7f0000000500)="67cdd9994c47c31d325b069924a7064c157c2ec0b5b5dca2feeb7dabef3b7af0d02d559e293faa759f2b3cb12aea360c2d", &(0x7f0000000580), &(0x7f00000005c0), &(0x7f0000000a00)="29859fdda9a119e54a27f9ec76b4d63a16dc5bbdd38c2fda0e5f4d8f830cd987ec7d3ffc66cf3db8820968fd89a1fba8fe6352a29a27f3b000bcdf238f2c04b358fc831025180e0be313da41de6366c94a1a0f86aaffdf2c039111b55275c054e14819a827fe809225249a01944263a2aec15f64e752e35892b1b8e7ef1e0e9115") ioctl$SNDRV_SEQ_IOCTL_DELETE_PORT(r0, 0x40a85321, &(0x7f0000000b80)={{0x4, 0x8}, 'port0\x00', 0x80, 0x0, 0x10000, 0x6, 0x2, 0x80, 0x8, 0x0, 0x0, 0x3dec00}) getsockopt$inet_sctp_SCTP_SOCKOPT_PEELOFF(r3, 0x84, 0x66, &(0x7f0000000c40)={r2, 0x6}, &(0x7f0000000c80)=0x8) clock_settime(0x7, &(0x7f0000000740)={0x77359400}) ioctl$SNDRV_SEQ_IOCTL_CLIENT_ID(r0, 0x80045301, &(0x7f0000000340)) r4 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer2\x00', 0x0, 0x0) openat$sequencer2(0xffffffffffffff9c, &(0x7f00000006c0)='/dev/sequencer2\x00', 0x222081, 0x0) ioctl$RNDADDENTROPY(0xffffffffffffffff, 0x40085203, &(0x7f0000000100)=ANY=[@ANYPTR=&(0x7f0000000680)=ANY=[@ANYPTR64=&(0x7f0000000640)=ANY=[@ANYPTR, @ANYPTR]]]) setsockopt$inet_sctp_SCTP_DEFAULT_SEND_PARAM(r4, 0x84, 0xa, &(0x7f0000000140)={0x5, 0x100000001, 0x0, 0x8, 0x0, 0x7, 0x401, 0x1f, r2}, 0x20) 2018/03/31 09:15:23 executing program 1: perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f000031f000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) prctl$void(0x0) getpid() syz_open_dev$vcsn(&(0x7f0000000040)='/dev/vcs#\x00', 0x400, 0x20000) r0 = socket$alg(0x26, 0x5, 0x0) ioctl$sock_SIOCGIFBR(r0, 0x8940, &(0x7f0000000040)=@get={0x1, &(0x7f0000000400)=""/242, 0x100000000}) bind$alg(r0, &(0x7f0000000080)={0x26, 'aead\x00', 0x0, 0x0, 'generic-gcm-aesni\x00'}, 0x58) r1 = syz_open_dev$sndmidi(&(0x7f0000000100)='/dev/snd/midiC#D#\x00', 0xfd, 0x0) bind(r1, &(0x7f0000000140)=@llc={0x1a, 0x33a, 0x7, 0x80, 0x0, 0x4, @remote={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xbb}}, 0x80) r2 = syz_init_net_socket$nfc_llcp(0x27, 0x1, 0x1) setsockopt$nfc_llcp_NFC_LLCP_MIUX(r2, 0x118, 0x15, &(0x7f0000000000), 0x4) r3 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/cuse\x00', 0x103002, 0x0) futimesat(r3, &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)={{0x0, 0x7530}}) accept4(r2, 0x0, &(0x7f0000000240), 0x80000) r4 = syz_open_dev$vcsa(&(0x7f00000001c0)='/dev/vcsa#\x00', 0x2, 0x4020ff) sendto$inet6(r4, &(0x7f0000000bc0), 0x0, 0x20000000, &(0x7f0000000c40)={0xa, 0x4e20, 0x6, @dev={0xfe, 0x80, [], 0x19}, 0x1f}, 0x1c) sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f0000000000)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x8}, 0xb4fcd35419244434, &(0x7f00004ca000)={&(0x7f0000000300)=ANY=[], 0x1a1}, 0x1}, 0x0) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_INFO(r3, 0xc08c5335, &(0x7f00000002c0)={0x0, 0x8, 0x9, 'queue1\x00', 0x1}) syz_fuseblk_mount(&(0x7f0000001380)='./file0\x00', &(0x7f00000013c0)='./file0\x00', 0xf000, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0xb21, 0x0) r5 = socket(0x1e, 0x3, 0x0) ptrace$PTRACE_SECCOMP_GET_FILTER(0x420c, 0x0, 0x0, &(0x7f0000000380)=""/113) sched_yield() ioctl$TUNGETIFF(r4, 0x800454d2, &(0x7f0000000140)) setsockopt$netlink_NETLINK_ADD_MEMBERSHIP(r5, 0x10e, 0x1, &(0x7f0000000200)=0x12, 0x4) ioctl$KIOCSOUND(r4, 0x4b2f, 0xfffffffffffffb74) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x0, 0x9, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x20, 0x9b}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000447000)='./file0\x00', &(0x7f00000e1000)='msdos\x00', 0x0, &(0x7f000097bfff)) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000580)='./cgroup/syz0\x00', 0x1ff) syz_open_dev$audion(&(0x7f0000000280)='/dev/audio#\x00', 0x7be, 0x0) fcntl$getown(0xffffffffffffffff, 0x9) [ 316.874675] binder: 31105:31114 unknown command 20 [ 316.879579] FAT-fs (loop199): unable to read boot sector [ 316.882544] FAULT_INJECTION: forcing a failure. [ 316.882544] name failslab, interval 1, probability 0, space 0, times 0 [ 316.896385] CPU: 1 PID: 31115 Comm: syz-executor7 Not tainted 4.16.0-rc7+ #8 [ 316.896393] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 316.896398] Call Trace: [ 316.896412] dump_stack+0x194/0x24d [ 316.896426] ? arch_local_irq_restore+0x53/0x53 [ 316.904866] FAT-fs (loop199): unable to read boot sector [ 316.912952] should_fail+0x8c0/0xa40 [ 316.912969] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 316.912984] ? pcpu_free_area+0xa00/0xa00 [ 316.913007] ? find_held_lock+0x35/0x1d0 [ 316.913034] ? check_same_owner+0x320/0x320 [ 316.913054] ? rcu_note_context_switch+0x710/0x710 [ 316.955387] should_failslab+0xec/0x120 [ 316.959340] kmem_cache_alloc+0x47/0x760 [ 316.963378] ? __alloc_pages_slowpath+0x2d10/0x2d10 [ 316.968374] getname_kernel+0x54/0x340 [ 316.972237] kern_path+0x1e/0x40 [ 316.975579] lookup_bdev+0xec/0x200 [ 316.979184] ? blkdev_open+0x250/0x250 [ 316.983049] ? find_held_lock+0x35/0x1d0 [ 316.987087] blkdev_get_by_path+0x1f/0xa0 [ 316.991214] mount_bdev+0x4d/0x370 [ 316.994731] ? msdos_mount+0x40/0x40 [ 316.998420] msdos_mount+0x34/0x40 [ 317.001937] mount_fs+0x66/0x2d0 [ 317.005282] vfs_kern_mount.part.26+0xc6/0x4a0 [ 317.009841] ? may_umount+0xa0/0xa0 [ 317.013446] ? _raw_read_unlock+0x22/0x30 [ 317.017569] ? __get_fs_type+0x8a/0xc0 [ 317.021434] do_mount+0xea4/0x2bb0 [ 317.024953] ? copy_mount_string+0x40/0x40 [ 317.029166] ? trace_hardirqs_on_caller+0x421/0x5c0 [ 317.034161] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 317.038899] ? retint_kernel+0x10/0x10 [ 317.042765] ? copy_mount_options+0x18b/0x2e0 [ 317.047236] ? copy_mount_options+0x193/0x2e0 [ 317.051705] ? copy_mount_options+0x1f7/0x2e0 [ 317.056176] SyS_mount+0xab/0x120 [ 317.059606] ? copy_mnt_ns+0xb30/0xb30 [ 317.063478] do_syscall_64+0x281/0x940 [ 317.067342] ? vmalloc_sync_all+0x30/0x30 [ 317.071472] ? _raw_spin_unlock_irq+0x27/0x70 [ 317.075943] ? finish_task_switch+0x1c1/0x7e0 [ 317.080414] ? syscall_return_slowpath+0x550/0x550 [ 317.085318] ? syscall_return_slowpath+0x2ac/0x550 [ 317.090223] ? prepare_exit_to_usermode+0x350/0x350 [ 317.095217] ? entry_SYSCALL_64_after_hwframe+0x52/0xb7 [ 317.100561] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 317.105383] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 317.110547] RIP: 0033:0x454e79 [ 317.113711] RSP: 002b:00007f37fba8ec68 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 2018/03/31 09:15:24 executing program 6: perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f000031f000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) prctl$void(0x0) getpid() r0 = syz_open_dev$vcsn(&(0x7f0000000040)='/dev/vcs#\x00', 0x0, 0x20000) ioctl$GIO_CMAP(r0, 0x4b70, &(0x7f0000000080)) r1 = socket$alg(0x26, 0x5, 0x0) ioctl$sock_SIOCGIFBR(0xffffffffffffffff, 0x8940, &(0x7f0000000040)=@get={0x1, &(0x7f0000000400)=""/242, 0x100000000}) bind$alg(r1, &(0x7f0000000080)={0x26, 'aead\x00', 0x0, 0x0, 'generic-gcm-aesni\x00'}, 0x58) syz_open_dev$sndmidi(&(0x7f0000000100)='/dev/snd/midiC#D#\x00', 0xfd, 0x0) bind(0xffffffffffffffff, &(0x7f0000000140)=@llc={0x1a, 0x33a, 0x7, 0x80, 0x0, 0x4, @remote={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xbb}}, 0x80) r2 = syz_init_net_socket$nfc_llcp(0x27, 0x1, 0x1) setsockopt$nfc_llcp_NFC_LLCP_MIUX(r2, 0x118, 0x15, &(0x7f0000000000), 0x4) r3 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/cuse\x00', 0x103002, 0x0) futimesat(r3, &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)={{0x0, 0x7530}}) r4 = syz_open_dev$vcsa(&(0x7f00000001c0)='/dev/vcsa#\x00', 0x2, 0x0) sendto$inet6(r4, &(0x7f0000000bc0), 0x0, 0x20000000, &(0x7f0000000c40)={0xa, 0x4e20, 0x0, @dev={0xfe, 0x80, [], 0x19}}, 0x1c) accept$alg(r0, 0x0, 0x0) sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f0000000000)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x8}, 0xb4fcd35419244434, &(0x7f00004ca000)={&(0x7f0000000300)=ANY=[], 0x1a1}, 0x1}, 0x0) syz_fuseblk_mount(&(0x7f0000001380)='./file0\x00', &(0x7f00000013c0)='./file0\x00', 0xf000, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0xb21, 0x0) socket(0x1e, 0x3, 0x0) socket(0x1e, 0x0, 0x0) ptrace$PTRACE_SECCOMP_GET_FILTER(0x420c, 0x0, 0x0, &(0x7f0000000380)=""/113) sched_yield() ioctl$TUNGETIFF(r4, 0x800454d2, &(0x7f0000000140)) ioctl$KIOCSOUND(r4, 0x4b2f, 0xfffffffffffffb74) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x20, 0x9b}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000447000)='./file0\x00', &(0x7f00000e1000)='msdos\x00', 0x0, &(0x7f000097bfff)) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000580)='./cgroup/syz0\x00', 0x1ff) [ 317.121397] RAX: ffffffffffffffda RBX: 00007f37fba8f6d4 RCX: 0000000000454e79 [ 317.128644] RDX: 00000000200e1000 RSI: 0000000020447000 RDI: 0000000020000000 [ 317.135891] RBP: 000000000072bea0 R08: 000000002097bfff R09: 0000000000000000 [ 317.143136] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000019 [ 317.150378] R13: 00000000000003fa R14: 00000000006f8010 R15: 0000000000000008 [ 317.166905] binder: 31105:31114 ioctl c0306201 20000340 returned -22 [ 317.201682] binder: 31105:31126 unknown command 26 [ 317.208999] binder: 31105:31126 ioctl c0306201 20000340 returned -22 [ 317.225828] print_req_error: 49 callbacks suppressed [ 317.225834] print_req_error: I/O error, dev loop199, sector 64 [ 317.237690] isofs_fill_super: bread failed, dev=loop199, iso_blknum=16, block=32 [ 317.295854] print_req_error: I/O error, dev loop199, sector 0 [ 317.301946] FAT-fs (loop199): unable to read boot sector 2018/03/31 09:15:24 executing program 6: perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f000031f000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) prctl$void(0x0) getpid() r0 = syz_open_dev$vcsn(&(0x7f0000000040)='/dev/vcs#\x00', 0x0, 0x20000) ioctl$GIO_CMAP(r0, 0x4b70, &(0x7f0000000080)) r1 = socket$alg(0x26, 0x5, 0x0) ioctl$sock_SIOCGIFBR(0xffffffffffffffff, 0x8940, &(0x7f0000000040)=@get={0x1, &(0x7f0000000400)=""/242, 0x100000000}) bind$alg(r1, &(0x7f0000000080)={0x26, 'aead\x00', 0x0, 0x0, 'generic-gcm-aesni\x00'}, 0x58) syz_open_dev$sndmidi(&(0x7f0000000100)='/dev/snd/midiC#D#\x00', 0xfd, 0x0) bind(0xffffffffffffffff, &(0x7f0000000140)=@llc={0x1a, 0x33a, 0x7, 0x80, 0x0, 0x4, @remote={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xbb}}, 0x80) r2 = syz_init_net_socket$nfc_llcp(0x27, 0x1, 0x1) setsockopt$nfc_llcp_NFC_LLCP_MIUX(r2, 0x118, 0x15, &(0x7f0000000000), 0x4) r3 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/cuse\x00', 0x103002, 0x0) futimesat(r3, &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)={{0x0, 0x7530}}) r4 = syz_open_dev$vcsa(&(0x7f00000001c0)='/dev/vcsa#\x00', 0x2, 0x0) sendto$inet6(r4, &(0x7f0000000bc0), 0x0, 0x20000000, &(0x7f0000000c40)={0xa, 0x4e20, 0x0, @dev={0xfe, 0x80, [], 0x19}, 0x1f}, 0x1c) accept$alg(0xffffffffffffffff, 0x0, 0x0) sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f0000000000)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x8}, 0xb4fcd35419244434, &(0x7f00004ca000)={&(0x7f0000000300)=ANY=[], 0x1a1}, 0x1}, 0x0) syz_fuseblk_mount(&(0x7f0000001380)='./file0\x00', &(0x7f00000013c0)='./file0\x00', 0xf000, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0xb21, 0x0) socket(0x1e, 0x3, 0x0) socket(0x1e, 0x0, 0x0) ptrace$PTRACE_SECCOMP_GET_FILTER(0x420c, 0x0, 0x0, &(0x7f0000000380)=""/113) sched_yield() ioctl$TUNGETIFF(r4, 0x800454d2, &(0x7f0000000140)) ioctl$KIOCSOUND(r4, 0x4b2f, 0xfffffffffffffb74) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x20, 0x9b}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000447000)='./file0\x00', &(0x7f00000e1000)='msdos\x00', 0x0, &(0x7f000097bfff)) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000580)='./cgroup/syz0\x00', 0x1ff) 2018/03/31 09:15:24 executing program 5: perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f000031f000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) prctl$void(0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='cpu.stat\x00', 0x0, 0x0) ioctl$PPPIOCGMRU(r0, 0x80047453, &(0x7f0000000240)) getpid() r1 = syz_open_dev$vcsn(&(0x7f0000000040)='/dev/vcs#\x00', 0x0, 0x20000) ioctl$GIO_CMAP(r1, 0x4b70, &(0x7f0000000080)) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000080)={0x26, 'aead\x00', 0x0, 0x0, 'generic-gcm-aesni\x00'}, 0x58) syz_open_dev$sndmidi(&(0x7f0000000100)='/dev/snd/midiC#D#\x00', 0xfd, 0x0) bind(0xffffffffffffffff, &(0x7f0000000140)=@llc={0x1a, 0x33a, 0x7, 0x80, 0x5, 0x4, @remote={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xbb}}, 0x80) r3 = syz_init_net_socket$nfc_llcp(0x27, 0x1, 0x1) setsockopt$nfc_llcp_NFC_LLCP_MIUX(r3, 0x118, 0x15, &(0x7f0000000000), 0x4) r4 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/cuse\x00', 0x103002, 0x0) futimesat(r4, &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)={{0x0, 0x7530}}) r5 = syz_open_dev$vcsa(&(0x7f00000001c0)='/dev/vcsa#\x00', 0x2, 0x4020ff) sendto$inet6(0xffffffffffffffff, &(0x7f0000000bc0)="36251e313e0743fc195a1a198a14434e8a0a00b3f452a3b5644e336ec712a16310c9aecc4e3097bc666a8882128a73c368ce731e9fbf3fe18fa52d", 0x3b, 0x20000000, &(0x7f0000000c40)={0xa, 0x4e20, 0x6, @dev={0xfe, 0x80, [], 0x19}, 0x1f}, 0x1c) accept$alg(r1, 0x0, 0x0) sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f0000000000)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x8}, 0xb4fcd35419244434, &(0x7f00004ca000)={&(0x7f0000000300)=ANY=[], 0x1a1}, 0x1}, 0x0) syz_fuseblk_mount(&(0x7f0000001380)='./file0\x00', &(0x7f00000013c0)='./file0\x00', 0xf000, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0xb21, 0x0) socket(0x1e, 0x3, 0x0) socket(0x1e, 0x0, 0x0) ptrace$PTRACE_SECCOMP_GET_FILTER(0x420c, 0x0, 0x0, &(0x7f0000000380)=""/113) sched_yield() ioctl$TUNGETIFF(r5, 0x800454d2, &(0x7f0000000140)) ioctl$KIOCSOUND(r5, 0x4b2f, 0xfffffffffffffb74) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x20, 0x9b}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000447000)='./file0\x00', &(0x7f00000e1000)='msdos\x00', 0x0, &(0x7f000097bfff)) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000580)='./cgroup/syz0\x00', 0x1ff) syz_open_dev$audion(&(0x7f0000000280)='/dev/audio#\x00', 0x7be, 0x0) 2018/03/31 09:15:24 executing program 2: syz_open_dev$loop(&(0x7f00000003c0)='/dev/loop#\x00', 0x8, 0x0) r0 = syz_open_dev$sndseq(&(0x7f00000001c0)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r0, 0x4040534e, &(0x7f000019ffe9)={0xc1}) r1 = accept(0xffffffffffffffff, &(0x7f0000000080)=@can, &(0x7f0000000180)=0x80) ioctl$sock_ipx_SIOCAIPXPRISLT(r1, 0x89e1, &(0x7f0000000280)=0x3f) ioctl$sock_inet_SIOCRTMSG(r1, 0x890d, &(0x7f0000000200)={0x80, {0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x19}}, {0x2, 0x4e21, @local={0xac, 0x14, 0x14, 0xaa}}, {0x2, 0x4e23}, 0x0, 0x7, 0x1, 0x0, 0x9, 0x0, 0x0, 0x0, 0xfffffffffffffff7}) setsockopt$inet_sctp_SCTP_ENABLE_STREAM_RESET(r1, 0x84, 0x76, &(0x7f0000000300)={0x0, 0x1c9}, 0x8) r2 = syz_open_dev$sg(&(0x7f0000000700)='/dev/sg#\x00', 0xfffffffffffffff7, 0x800) clone(0x2000c100, &(0x7f0000000800)="97bb77038add5df9e9d4f9783b82c55fe59e5c0acdbcfc9bcf92ac0e1f1f3c1959c1d25dfabf3849336c7c85be174d7765b47e113632aea54b87e4d3f2c1db09e6aa4040b43d17308fb7e62e808067da2fff3cfd8e4c038c814bbfc6bc49d8ebc8671d8297e2d34dc61f2d194d2dbb8f59b4c853e0714d3d4bb29d1243fac01c86c8c4dd38daedab3c6ad73a72d3f6dd2684aa82e5285eb82452c9848b7beb8bc513ba8c8973cad0bd5926604846b7f5d0397b", &(0x7f00000008c0), &(0x7f0000000900), &(0x7f0000000940)="ed6c04412e782fe395f084741e3d9fe469aebde09acc8f8d8d84d1f00f5573b09acba487077ebb904cb1f3fed55f59d677ce24bbd2a7506df8e1e0d0fc709cb8c9f4ab2aeeeebc5ef879742c1f7628f1862c88b5b0da89acbf43ef12e4839405b6a3430d296fea06d2f3a8356c57ec991e") ioctl$SNDRV_SEQ_IOCTL_SUBSCRIBE_PORT(r0, 0x40505330, &(0x7f0000ec6fb0)={{}, {0x80}}) getsockopt$netrom_NETROM_T1(r1, 0x103, 0x1, &(0x7f0000000000), &(0x7f0000000380)=0x4) syz_open_dev$adsp(&(0x7f0000000600)='/dev/adsp#\x00', 0x100000000, 0x80000) rt_sigprocmask(0x3d738072cd0f41ac, &(0x7f0000000cc0)={0x7}, &(0x7f0000000d00), 0x8) clone(0x40000000, &(0x7f0000000500)="67cdd9994c47c31d325b069924a7064c157c2ec0b5b5dca2feeb7dabef3b7af0d02d559e293faa759f2b3cb12aea360c2d", &(0x7f0000000580), &(0x7f00000005c0), &(0x7f0000000a00)="29859fdda9a119e54a27f9ec76b4d63a16dc5bbdd38c2fda0e5f4d8f830cd987ec7d3ffc66cf3db8820968fd89a1fba8fe6352a29a27f3b000bcdf238f2c04b358fc831025180e0be313da41de6366c94a1a0f86aaffdf2c039111b55275c054e14819a827fe809225249a01944263a2aec15f64e752e35892b1b8e7ef1e0e9115") ioctl$SNDRV_SEQ_IOCTL_DELETE_PORT(r0, 0x40a85321, &(0x7f0000000b80)={{0x4, 0x8}, 'port0\x00', 0x80, 0x0, 0x10000, 0x6, 0x2, 0x80, 0x8, 0x0, 0x0, 0x3dec00}) getsockopt$inet_sctp_SCTP_SOCKOPT_PEELOFF(r2, 0x84, 0x66, &(0x7f0000000c40)={0x0, 0x6}, &(0x7f0000000c80)=0x8) clock_settime(0x7, &(0x7f0000000740)={0x77359400}) ioctl$SNDRV_SEQ_IOCTL_CLIENT_ID(r0, 0x80045301, &(0x7f0000000340)) r3 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer2\x00', 0x0, 0x0) openat$sequencer2(0xffffffffffffff9c, &(0x7f00000006c0)='/dev/sequencer2\x00', 0x222081, 0x0) ioctl$RNDADDENTROPY(0xffffffffffffffff, 0x40085203, &(0x7f0000000100)=ANY=[@ANYPTR=&(0x7f0000000680)=ANY=[@ANYPTR64=&(0x7f0000000640)=ANY=[@ANYPTR, @ANYPTR]]]) setsockopt$inet_sctp_SCTP_DEFAULT_SEND_PARAM(r3, 0x84, 0xa, &(0x7f0000000140)={0x5, 0x100000001, 0x0, 0x8, 0x0, 0x7, 0x401, 0x1f}, 0x20) 2018/03/31 09:15:24 executing program 3: r0 = syz_open_dev$random(&(0x7f00000001c0)='/dev/random\x00', 0x0, 0x800) r1 = syz_open_dev$loop(&(0x7f0000308000)='/dev/loop#\x00', 0x0, 0x0) ioctl$LOOP_SET_STATUS(r1, 0xc0481273, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "3900ea631d00000000020000010000009f00000023f7b7d65f90b0e6330ee739b319d8f6aa6bd58d1443474482e85040fb4947ebb55bd19f335b5bffff0001f3", "cfa430745a540dc1c149b7b81579f6a41c51f7d51933223e82ab867dac761faf"}) write(0xffffffffffffffff, &(0x7f00000001c0), 0x0) setsockopt$inet_sctp6_SCTP_RECVNXTINFO(0xffffffffffffffff, 0x84, 0x21, &(0x7f00000003c0)=0x200, 0x4) openat(0xffffffffffffff9c, &(0x7f0000000500)='./file0\x00', 0x4000, 0x10) r2 = syz_open_dev$adsp(&(0x7f00000005c0)='/dev/adsp#\x00', 0xfffffffffffff446, 0x400800) syz_open_dev$dmmidi(&(0x7f0000000600)='/dev/dmmidi#\x00', 0x1000, 0x4100) r3 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000680)='/dev/mixer\x00', 0x10000, 0x0) ioctl$TIOCGPGRP(r3, 0x540f, &(0x7f00000006c0)=0x0) getsockopt$netrom_NETROM_T4(0xffffffffffffffff, 0x103, 0x6, &(0x7f0000000300)=0x8, &(0x7f0000000340)=0x4) r5 = getpid() sched_setparam(r5, &(0x7f0000000400)) syz_open_dev$loop(&(0x7f0000ca9ff5)='/dev/loop#\x00', 0x0, 0x82) r6 = memfd_create(&(0x7f0000614000)="74086e750000000000000000008c00", 0x0) pwritev(r6, &(0x7f0000f50f90)=[{&(0x7f0000000040)="aa", 0x1}], 0x1, 0x0) fcntl$getownex(r1, 0x10, &(0x7f0000000240)={0x0, 0x0}) r8 = syz_open_procfs(r7, &(0x7f0000000280)='stat\x00') epoll_ctl$EPOLL_CTL_MOD(r6, 0x3, r0, &(0x7f00000002c0)={0x20000010}) accept4$inet6(r6, &(0x7f0000000100)={0x0, 0x0, 0x0, @mcast1}, &(0x7f0000000140)=0x1c, 0x7fd) getsockopt$inet_IP_IPSEC_POLICY(r6, 0x0, 0x10, &(0x7f0000000b40)={{{@in6=@local, @in6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@loopback}, 0x0, @in=@local}}, &(0x7f0000000480)=0xe8) getsockopt$sock_cred(r6, 0x1, 0x11, &(0x7f00000007c0)={0x0, 0x0, 0x0}, &(0x7f0000000540)=0xc) fchown(r6, r9, r10) r11 = syz_open_dev$binder(&(0x7f0000000100)='/dev/binder#\x00', 0xffffffffffffffff, 0x806) ioctl$BINDER_SET_CONTEXT_MGR(r8, 0x40046207, 0x0) mmap$binder(&(0x7f000000d000/0x1000)=nil, 0x1000, 0x0, 0x12, r11, 0x0) ioctl$BINDER_WRITE_READ(r11, 0xc0306201, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000), 0x0, 0x0, &(0x7f0000011f9d)}) getsockopt$inet_sctp6_SCTP_AUTO_ASCONF(0xffffffffffffffff, 0x84, 0x1e, &(0x7f0000000140), &(0x7f0000000180)=0x4) ioctl$BINDER_WRITE_READ(r11, 0xc0306201, &(0x7f0000000340)={0x8, 0x0, &(0x7f0000000440)=ANY=[@ANYRES64=r1], 0x0, 0x0, &(0x7f0000000240)}) write(0xffffffffffffffff, &(0x7f0000000300)="8be25f5790f664f32509e40d6f879d5add7e2d359c9a19afb750a2d25352875d187d4118c99a2d5c6db433c277cc7d345b87a34f1b417033d367cb0cfd6a25633f77aafb17e99c33cb65352c901ae75176f07bb0a4bb5ebff3d87e", 0x5b) r12 = ioctl$LOOP_CTL_GET_FREE(r2, 0x4c82) ioctl$LOOP_CTL_REMOVE(r8, 0x4c81, r12) openat$cgroup(0xffffffffffffff9c, &(0x7f0000000000)='syz0\x00', 0x200002, 0x0) sched_setaffinity(r4, 0x8, &(0x7f0000000200)=0x7) 2018/03/31 09:15:24 executing program 7 (fault-call:24 fault-nth:9): perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f000031f000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getpid() r0 = syz_open_dev$vcsn(&(0x7f0000000040)='/dev/vcs#\x00', 0x0, 0x20000) ioctl$GIO_CMAP(r0, 0x4b70, &(0x7f0000000080)) r1 = socket$alg(0x26, 0x5, 0x0) ioctl$sock_SIOCGIFBR(r1, 0x8940, &(0x7f0000000040)=@get={0x1, &(0x7f0000000400)=""/242, 0x100000000}) bind$alg(r1, &(0x7f0000000080)={0x26, 'aead\x00', 0x0, 0x0, 'generic-gcm-aesni\x00'}, 0x58) syz_open_dev$sndmidi(&(0x7f0000000100)='/dev/snd/midiC#D#\x00', 0xfd, 0x0) bind(0xffffffffffffffff, &(0x7f0000000140)=@llc={0x1a, 0x33a, 0x7, 0x80, 0x5, 0x4, @remote={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xbb}}, 0x80) r2 = syz_init_net_socket$nfc_llcp(0x27, 0x1, 0x1) setsockopt$nfc_llcp_NFC_LLCP_MIUX(r2, 0x118, 0x15, &(0x7f0000000000), 0x4) r3 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/cuse\x00', 0x103002, 0x0) futimesat(r3, &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)={{0x0, 0x7530}}) r4 = syz_open_dev$vcsa(&(0x7f00000001c0)='/dev/vcsa#\x00', 0x2, 0x4020ff) sendto$inet6(r4, &(0x7f0000000bc0)="36251e313e0743fc195a1a198a14434e8a0a00b3f452a3b5644e336ec712a16310c9aecc4e3097bc666a8882128a73c368ce731e9fbf3fe18fa52d00", 0x3c, 0x20000000, &(0x7f0000000c40)={0xa, 0x0, 0x6, @dev={0xfe, 0x80, [], 0x19}, 0x1f}, 0x1c) accept$alg(r0, 0x0, 0x0) sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f0000000000)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x8}, 0xb4fcd35419244434, &(0x7f00004ca000)={&(0x7f0000000300)=ANY=[], 0x1a1}, 0x1}, 0x0) syz_fuseblk_mount(&(0x7f0000001380)='./file0\x00', &(0x7f00000013c0)='./file0\x00', 0xf000, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0xb21, 0x0) socket(0x1e, 0x3, 0x0) socket(0x1e, 0x0, 0x0) ptrace$PTRACE_SECCOMP_GET_FILTER(0x420c, 0x0, 0x0, &(0x7f0000000380)=""/113) sched_yield() ioctl$TUNGETIFF(r4, 0x800454d2, &(0x7f0000000140)) ioctl$KIOCSOUND(r4, 0x4b2f, 0xfffffffffffffb74) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000447000)='./file0\x00', &(0x7f00000e1000)='msdos\x00', 0x0, &(0x7f000097bfff)) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000580)='./cgroup/syz0\x00', 0x1ff) syz_open_dev$audion(&(0x7f0000000280)='/dev/audio#\x00', 0x7be, 0x0) [ 317.467539] IPVS: ftp: loaded support on port[0] = 21 2018/03/31 09:15:24 executing program 1: perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f000031f000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) prctl$void(0x0) getpid() syz_open_dev$vcsn(&(0x7f0000000040)='/dev/vcs#\x00', 0x400, 0x20000) r0 = socket$alg(0x26, 0x5, 0x0) ioctl$sock_SIOCGIFBR(r0, 0x8940, &(0x7f0000000040)=@get={0x1, &(0x7f0000000400)=""/242, 0x100000000}) bind$alg(r0, &(0x7f0000000080)={0x26, 'aead\x00', 0x0, 0x0, 'generic-gcm-aesni\x00'}, 0x58) r1 = syz_open_dev$sndmidi(&(0x7f0000000100)='/dev/snd/midiC#D#\x00', 0xfd, 0x0) bind(r1, &(0x7f0000000140)=@llc={0x1a, 0x33a, 0x7, 0x80, 0x0, 0x4, @remote={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xbb}}, 0x80) r2 = syz_init_net_socket$nfc_llcp(0x27, 0x1, 0x1) setsockopt$nfc_llcp_NFC_LLCP_MIUX(r2, 0x118, 0x15, &(0x7f0000000000), 0x4) r3 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/cuse\x00', 0x103002, 0x0) futimesat(r3, &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)={{0x0, 0x7530}}) r4 = syz_open_dev$vcsa(&(0x7f00000001c0)='/dev/vcsa#\x00', 0x2, 0x4020ff) sendto$inet6(r4, &(0x7f0000000bc0), 0x0, 0x20000000, &(0x7f0000000c40)={0xa, 0x4e20, 0x6, @dev={0xfe, 0x80, [], 0x19}, 0x1f}, 0x1c) sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f0000000000)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x8}, 0xb4fcd35419244434, &(0x7f00004ca000)={&(0x7f0000000300)=ANY=[], 0x1a1}, 0x1}, 0x0) syz_fuseblk_mount(&(0x7f0000001380)='./file0\x00', &(0x7f00000013c0)='./file0\x00', 0xf000, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0xb21, 0x0) r5 = socket(0x1e, 0x3, 0x0) ptrace$PTRACE_SECCOMP_GET_FILTER(0x420c, 0x0, 0x0, &(0x7f0000000380)=""/113) sched_yield() ioctl$TUNGETIFF(r4, 0x800454d2, &(0x7f0000000140)) r6 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000240)='IPVS\x00') sendmsg$IPVS_CMD_NEW_DEST(r5, &(0x7f0000000500)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f0000000340)={&(0x7f00000002c0)={0x78, r6, 0x0, 0x70bd29, 0x25dfdbfb, {0x5}, [@IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0x108}, @IPVS_CMD_ATTR_DAEMON={0x5c, 0x3, [@IPVS_DAEMON_ATTR_MCAST_PORT={0x8, 0x7, 0x4e24}, @IPVS_DAEMON_ATTR_MCAST_TTL={0x8, 0x8, 0x7}, @IPVS_DAEMON_ATTR_SYNC_ID={0x8, 0x3, 0x2}, @IPVS_DAEMON_ATTR_SYNC_MAXLEN={0x8, 0x4, 0x7}, @IPVS_DAEMON_ATTR_MCAST_GROUP6={0x14, 0x6}, @IPVS_DAEMON_ATTR_MCAST_TTL={0x8, 0x8, 0x2}, @IPVS_DAEMON_ATTR_MCAST_GROUP6={0x14, 0x6, @mcast1={0xff, 0x1, [], 0x1}}, @IPVS_DAEMON_ATTR_SYNC_ID={0x8, 0x3, 0x2}]}]}, 0x78}, 0x1, 0x0, 0x0, 0x40}, 0x40) ioctl$KIOCSOUND(r4, 0x4b2f, 0x100000000) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x20, 0x9b}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000447000)='./file0\x00', &(0x7f00000e1000)='msdos\x00', 0x0, &(0x7f000097bfff)) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000580)='./cgroup/syz0\x00', 0x1ff) syz_open_dev$audion(&(0x7f0000000280)='/dev/audio#\x00', 0x7be, 0x0) fcntl$getown(0xffffffffffffffff, 0x9) 2018/03/31 09:15:24 executing program 4: perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f000031f000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) prctl$void(0x0) getpid() r0 = syz_open_dev$vcsn(&(0x7f0000000040)='/dev/vcs#\x00', 0x0, 0x20000) ioctl$GIO_CMAP(r0, 0x4b70, &(0x7f0000000080)) r1 = socket$alg(0x26, 0x5, 0x0) ioctl$sock_SIOCGIFBR(0xffffffffffffffff, 0x8940, &(0x7f0000000040)=@get={0x1, &(0x7f0000000400)=""/242, 0x100000000}) bind$alg(r1, &(0x7f0000000080)={0x26, 'aead\x00', 0x0, 0x0, 'generic-gcm-aesni\x00'}, 0x58) r2 = syz_open_dev$sndmidi(&(0x7f0000000100)='/dev/snd/midiC#D#\x00', 0xfd, 0x0) bind(r2, &(0x7f0000000140)=@llc={0x1a, 0x33a, 0x7, 0x80, 0x0, 0x4, @remote={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xbb}}, 0xfffffd82) r3 = syz_init_net_socket$nfc_llcp(0x27, 0x1, 0x1) setsockopt$nfc_llcp_NFC_LLCP_MIUX(r3, 0x118, 0x15, &(0x7f0000000000), 0x4) r4 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/cuse\x00', 0x103002, 0x0) futimesat(r4, &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)={{0x0, 0x7530}}) r5 = syz_open_dev$vcsa(&(0x7f00000001c0)='/dev/vcsa#\x00', 0x2, 0x0) sendto$inet6(r5, &(0x7f0000000bc0), 0x0, 0x20000000, &(0x7f0000000c40)={0xa, 0x4e20, 0x0, @dev={0xfe, 0x80, [], 0x19}, 0x1f}, 0x1c) accept$alg(r4, 0x0, 0x0) ioctl$TIOCSWINSZ(r2, 0x5414, &(0x7f00000002c0)={0x10000, 0x9, 0x7, 0x1bd6}) sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f0000000000)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x8}, 0xb4fcd35419244434, &(0x7f00004ca000)={&(0x7f0000000300)=ANY=[], 0x1a1}, 0x1}, 0x0) syz_fuseblk_mount(&(0x7f0000001380)='./file0\x00', &(0x7f00000013c0)='./file0\x00', 0xf000, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0xb21, 0x0) sendfile(r0, r1, &(0x7f0000000200), 0x5) socket(0x1e, 0x3, 0x0) socket(0x1e, 0x0, 0x0) ptrace$PTRACE_SECCOMP_GET_FILTER(0x420c, 0x0, 0x0, &(0x7f0000000380)=""/113) sched_yield() ioctl$TUNGETIFF(r5, 0x800454d2, &(0x7f0000000140)) ioctl$KIOCSOUND(r5, 0x4b2f, 0xfffffffffffffb74) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x20, 0x9b}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000447000)='./file0\x00', &(0x7f00000e1000)='msdos\x00', 0x0, &(0x7f000097bfff)) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000580)='./cgroup/syz0\x00', 0x1ff) 2018/03/31 09:15:24 executing program 0: perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f000031f000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) prctl$void(0x0) r0 = syz_open_dev$vcsn(&(0x7f0000000040)='/dev/vcs#\x00', 0x0, 0x20000) socket$alg(0x26, 0x5, 0x0) ioctl$sock_SIOCGIFBR(0xffffffffffffffff, 0x8940, &(0x7f0000000040)=@get={0x1, &(0x7f0000000400)=""/242, 0x100000000}) bind$alg(0xffffffffffffffff, &(0x7f0000000080)={0x26, 'aead\x00', 0x0, 0x0, 'generic-gcm-aesni\x00'}, 0x58) syz_open_dev$sndmidi(&(0x7f0000000100)='/dev/snd/midiC#D#\x00', 0xfd, 0x0) bind(0xffffffffffffffff, &(0x7f0000000140)=@llc={0x1a, 0x33a, 0x7, 0x80, 0x0, 0x4, @remote={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xbb}}, 0x80) r1 = syz_init_net_socket$nfc_llcp(0x27, 0x1, 0x1) setsockopt$nfc_llcp_NFC_LLCP_MIUX(r1, 0x118, 0x15, &(0x7f0000000000), 0x4) r2 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/cuse\x00', 0x103002, 0x0) futimesat(r2, &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)={{0x0, 0x7530}}) r3 = syz_open_dev$vcsa(&(0x7f00000001c0)='/dev/vcsa#\x00', 0x2, 0x0) sendto$inet6(r3, &(0x7f0000000bc0)="36251e313e0743fc195a1a198a14434e8a0a00b3f452a3b5644e336ec712a16310c9aecc4e3097bc666a8882128a73c368ce731e9fbf3fe18fa52d00c34ac2e57c1c4569cfbd6a621c6dfbc032121aed", 0x50, 0x20000000, &(0x7f0000000c40)={0xa, 0x4e20, 0x6, @dev={0xfe, 0x80, [], 0x19}, 0x1f}, 0x1c) accept$alg(r0, 0x0, 0x0) sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f0000000000)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x8}, 0xb4fcd35419244434, &(0x7f00004ca000)={&(0x7f0000000300)=ANY=[], 0x1a1}, 0x1}, 0x0) syz_fuseblk_mount(&(0x7f0000001380)='./file0\x00', &(0x7f00000013c0)='./file0\x00', 0xf000, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0xb21, 0x0) socket(0x40000d, 0x0, 0x1000009) socket(0x1e, 0x0, 0x0) ptrace$PTRACE_SECCOMP_GET_FILTER(0x420c, 0x0, 0x0, &(0x7f0000000380)=""/113) sched_yield() ioctl$TUNGETIFF(r0, 0x800454d2, &(0x7f0000000280)) ioctl$KIOCSOUND(r3, 0x4b2f, 0xfffffffffffffb74) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x20, 0x9b}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000447000)='./file0\x00', &(0x7f00000e1000)='msdos\x00', 0x0, &(0x7f000097bfff)) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000580)='./cgroup/syz0\x00', 0x1ff) [ 317.538852] binder: 31133:31139 unknown command 20 [ 317.545981] print_req_error: I/O error, dev loop199, sector 0 [ 317.552067] FAT-fs (loop199): unable to read boot sector [ 317.557661] binder: 31133:31139 ioctl c0306201 20000340 returned -22 [ 317.567697] print_req_error: I/O error, dev loop199, sector 0 [ 317.575317] FAT-fs (loop199): unable to read boot sector [ 317.576584] FAULT_INJECTION: forcing a failure. 2018/03/31 09:15:24 executing program 6: perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f000031f000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) prctl$void(0x0) getpid() r0 = syz_open_dev$vcsn(&(0x7f0000000040)='/dev/vcs#\x00', 0x0, 0x20000) ioctl$GIO_CMAP(r0, 0x4b70, &(0x7f0000000080)) r1 = socket$alg(0x26, 0x5, 0x0) ioctl$sock_SIOCGIFBR(0xffffffffffffffff, 0x8940, &(0x7f0000000040)=@get={0x1, &(0x7f0000000400)=""/242, 0x100000000}) bind$alg(r1, &(0x7f0000000080)={0x26, 'aead\x00', 0x0, 0x0, 'generic-gcm-aesni\x00'}, 0x58) syz_open_dev$sndmidi(&(0x7f0000000100)='/dev/snd/midiC#D#\x00', 0xfd, 0x0) bind(0xffffffffffffffff, &(0x7f0000000140)=@llc={0x1a, 0x33a, 0x7, 0x80, 0x0, 0x4, @remote={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xbb}}, 0x80) r2 = syz_init_net_socket$nfc_llcp(0x27, 0x1, 0x1) setsockopt$nfc_llcp_NFC_LLCP_MIUX(r2, 0x118, 0x15, &(0x7f0000000000), 0x4) r3 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/cuse\x00', 0x103002, 0x0) futimesat(r3, &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)={{0x0, 0x7530}}) r4 = syz_open_dev$vcsa(&(0x7f00000001c0)='/dev/vcsa#\x00', 0x2, 0x0) sendto$inet6(r4, &(0x7f0000000bc0), 0x0, 0x20000000, &(0x7f0000000c40)={0xa, 0x4e20, 0x0, @dev={0xfe, 0x80, [], 0x19}, 0x1f}, 0x1c) accept$alg(0xffffffffffffffff, 0x0, 0x0) sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f0000000000)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x8}, 0xb4fcd35419244434, &(0x7f00004ca000)={&(0x7f0000000300)=ANY=[], 0x1a1}, 0x1}, 0x0) syz_fuseblk_mount(&(0x7f0000001380)='./file0\x00', &(0x7f00000013c0)='./file0\x00', 0xf000, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0xb21, 0x0) socket(0x1e, 0x3, 0x0) socket(0x1e, 0x0, 0x0) ptrace$PTRACE_SECCOMP_GET_FILTER(0x420c, 0x0, 0x0, &(0x7f0000000380)=""/113) sched_yield() ioctl$TUNGETIFF(r4, 0x800454d2, &(0x7f0000000140)) ioctl$KIOCSOUND(r4, 0x4b2f, 0xfffffffffffffb74) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x20, 0x9b}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000447000)='./file0\x00', &(0x7f00000e1000)='msdos\x00', 0x0, &(0x7f000097bfff)) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000580)='./cgroup/syz0\x00', 0x1ff) [ 317.576584] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 317.592558] CPU: 1 PID: 31150 Comm: syz-executor7 Not tainted 4.16.0-rc7+ #8 [ 317.597564] print_req_error: I/O error, dev loop199, sector 0 [ 317.599731] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 317.599736] Call Trace: [ 317.599753] dump_stack+0x194/0x24d [ 317.599767] ? arch_local_irq_restore+0x53/0x53 [ 317.599788] should_fail+0x8c0/0xa40 [ 317.599801] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 317.599817] ? debug_check_no_locks_freed+0x3c0/0x3c0 [ 317.607432] FAT-fs (loop199): unable to read boot sector [ 317.615025] ? wait_for_completion+0x770/0x770 [ 317.615042] ? lock_downgrade+0x980/0x980 [ 317.615065] ? perf_trace_lock_acquire+0xe3/0x980 [ 317.615078] ? perf_trace_lock_acquire+0xe3/0x980 [ 317.615096] ? perf_trace_lock+0x900/0x900 [ 317.628342] print_req_error: I/O error, dev loop199, sector 0 [ 317.629614] ? should_fail+0x23b/0xa40 [ 317.629633] __alloc_pages_nodemask+0x327/0xdd0 [ 317.629643] ? pcpu_free_area+0xa00/0xa00 [ 317.629656] ? __alloc_pages_slowpath+0x2d10/0x2d10 [ 317.629670] ? find_held_lock+0x35/0x1d0 [ 317.634922] FAT-fs (loop199): unable to read boot sector [ 317.639931] ? check_same_owner+0x320/0x320 [ 317.639949] cache_grow_begin+0x72/0x640 [ 317.639964] kmem_cache_alloc+0x400/0x760 [ 317.639976] ? __alloc_pages_slowpath+0x2d10/0x2d10 [ 317.639997] getname_kernel+0x54/0x340 [ 317.640009] kern_path+0x1e/0x40 [ 317.640020] lookup_bdev+0xec/0x200 [ 317.640029] ? blkdev_open+0x250/0x250 [ 317.640038] ? find_held_lock+0x35/0x1d0 [ 317.640051] blkdev_get_by_path+0x1f/0xa0 [ 317.741066] mount_bdev+0x4d/0x370 [ 317.741074] ? msdos_mount+0x40/0x40 [ 317.741082] msdos_mount+0x34/0x40 [ 317.741090] mount_fs+0x66/0x2d0 [ 317.741101] vfs_kern_mount.part.26+0xc6/0x4a0 [ 317.741109] ? may_umount+0xa0/0xa0 [ 317.741117] ? _raw_read_unlock+0x22/0x30 [ 317.741123] ? __get_fs_type+0x8a/0xc0 [ 317.741132] do_mount+0xea4/0x2bb0 [ 317.741142] ? copy_mount_string+0x40/0x40 [ 317.741150] ? trace_hardirqs_on_caller+0x421/0x5c0 [ 317.741159] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 317.741169] ? retint_kernel+0x10/0x10 [ 317.741178] ? copy_mount_options+0x18b/0x2e0 [ 317.741185] ? copy_mount_options+0x193/0x2e0 [ 317.741191] ? copy_mount_options+0x1f7/0x2e0 [ 317.741199] SyS_mount+0xab/0x120 [ 317.741204] ? copy_mnt_ns+0xb30/0xb30 [ 317.741212] do_syscall_64+0x281/0x940 [ 317.741219] ? vmalloc_sync_all+0x30/0x30 [ 317.741225] ? _raw_spin_unlock_irq+0x27/0x70 [ 317.741232] ? finish_task_switch+0x1c1/0x7e0 2018/03/31 09:15:24 executing program 3: r0 = syz_open_dev$random(&(0x7f00000001c0)='/dev/random\x00', 0x0, 0x800) r1 = syz_open_dev$loop(&(0x7f0000308000)='/dev/loop#\x00', 0x0, 0x0) ioctl$LOOP_SET_STATUS(r1, 0xc0481273, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, "3900ea631d00160100020000010000009f00000023f7b7d65f90b0e6330ee739b319d811ab6bd58d1443474482e85025974947ebb55bd19f335b5bdfff0001f3", "cfa430745a540dc1c149b7b81579f6a41c51f7d51908000000ab867dac761faf", [0x4, 0x2]}) write(0xffffffffffffffff, &(0x7f00000001c0), 0x0) setsockopt$inet_sctp6_SCTP_RECVNXTINFO(0xffffffffffffffff, 0x84, 0x21, &(0x7f00000003c0)=0x200, 0x4) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f00000000c0)=0x0) getsockopt$netrom_NETROM_T4(0xffffffffffffffff, 0x103, 0x6, &(0x7f0000000300)=0x8, &(0x7f0000000340)=0x4) r3 = getpid() sched_setparam(r3, &(0x7f0000000400)) syz_open_dev$loop(&(0x7f0000ca9ff5)='/dev/loop#\x00', 0x0, 0x82) r4 = memfd_create(&(0x7f0000614000)="74086e750000000000000000008c00", 0x0) pwritev(r4, &(0x7f0000f50f90)=[{&(0x7f0000000040)="aa", 0x1}], 0x1, 0x0) fcntl$getownex(r1, 0x10, &(0x7f0000000240)={0x0, 0x0}) r6 = syz_open_procfs(r5, &(0x7f0000000280)='stat\x00') epoll_ctl$EPOLL_CTL_MOD(r4, 0x3, r0, &(0x7f00000002c0)={0x20000010}) accept4$inet6(r4, &(0x7f0000000100)={0x0, 0x0, 0x0, @mcast1}, &(0x7f0000000140)=0x1c, 0x7fd) getsockopt$inet_IP_IPSEC_POLICY(r4, 0x0, 0x10, &(0x7f0000000940)={{{@in6=@local, @in6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@loopback}, 0x0, @in=@local}}, &(0x7f0000000780)=0xe8) getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f00000007c0)={0x0, 0x0, 0x0}, &(0x7f0000000540)=0xc) fchown(r4, r7, r8) r9 = syz_open_dev$binder(&(0x7f0000000100)='/dev/binder#\x00', 0xffffffffffffffff, 0x805) ioctl$BINDER_SET_CONTEXT_MGR(r6, 0x40046207, 0x0) mmap$binder(&(0x7f000000c000/0x2000)=nil, 0x2000, 0x0, 0x12, r9, 0x0) ioctl$BINDER_WRITE_READ(r9, 0xc0306201, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000), 0x0, 0x0, &(0x7f0000011f9d)}) getsockopt$inet_sctp6_SCTP_AUTO_ASCONF(0xffffffffffffffff, 0x84, 0x1e, &(0x7f0000000140), &(0x7f0000000180)=0x4) ioctl$BINDER_WRITE_READ(r9, 0xc0306201, &(0x7f0000000340)={0x8, 0x0, &(0x7f0000000440)=ANY=[@ANYRES64=r1], 0x0, 0x0, &(0x7f0000000380)}) write(0xffffffffffffffff, &(0x7f0000000300)="8be25f5790f664f32509e40d6f879d5add7e2d359c9a19afb750a2d25352875d187d4118c99a2d5c6db433c277cc7d345b87a34f1b417033d367cb0cfd6a25633f77aafb17e99c33cb65352c901ae75176f07bb0a4bb5ebff3d87e", 0x5b) r10 = ioctl$LOOP_CTL_GET_FREE(r6, 0x4c82) ioctl$LOOP_CTL_REMOVE(r6, 0x4c81, r10) openat$cgroup(0xffffffffffffff9c, &(0x7f0000000000)='syz0\x00', 0x200002, 0x0) sched_setaffinity(r2, 0x8, &(0x7f0000000200)=0x7) 2018/03/31 09:15:24 executing program 6: perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f000031f000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) prctl$void(0x0) getpid() r0 = syz_open_dev$vcsn(&(0x7f0000000040)='/dev/vcs#\x00', 0x0, 0x20000) ioctl$GIO_CMAP(r0, 0x4b70, &(0x7f0000000080)) r1 = socket$alg(0x26, 0x5, 0x0) ioctl$sock_SIOCGIFBR(0xffffffffffffffff, 0x8940, &(0x7f0000000040)=@get={0x1, &(0x7f0000000400)=""/242, 0x100000000}) bind$alg(r1, &(0x7f0000000080)={0x26, 'aead\x00', 0x0, 0x0, 'generic-gcm-aesni\x00'}, 0x58) syz_open_dev$sndmidi(&(0x7f0000000100)='/dev/snd/midiC#D#\x00', 0xfd, 0x0) bind(0xffffffffffffffff, &(0x7f0000000140)=@llc={0x1a, 0x33a, 0x7, 0x80, 0x0, 0x4, @remote={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xbb}}, 0x80) r2 = syz_init_net_socket$nfc_llcp(0x27, 0x1, 0x1) setsockopt$nfc_llcp_NFC_LLCP_MIUX(r2, 0x118, 0x15, &(0x7f0000000000), 0x4) r3 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/cuse\x00', 0x103002, 0x0) futimesat(r3, &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)={{0x0, 0x7530}}) r4 = syz_open_dev$vcsa(&(0x7f00000001c0)='/dev/vcsa#\x00', 0x2, 0x0) sendto$inet6(r4, &(0x7f0000000bc0), 0x0, 0x20000000, &(0x7f0000000c40)={0xa, 0x4e20, 0x0, @dev={0xfe, 0x80, [], 0x19}, 0x1f}, 0x1c) accept$alg(0xffffffffffffffff, 0x0, 0x0) sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f0000000000)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x8}, 0xb4fcd35419244434, &(0x7f00004ca000)={&(0x7f0000000300)=ANY=[], 0x1a1}, 0x1}, 0x0) syz_fuseblk_mount(&(0x7f0000001380)='./file0\x00', &(0x7f00000013c0)='./file0\x00', 0xf000, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0xb21, 0x0) socket(0x1e, 0x3, 0x0) socket(0x1e, 0x0, 0x0) ptrace$PTRACE_SECCOMP_GET_FILTER(0x420c, 0x0, 0x0, &(0x7f0000000380)=""/113) sched_yield() ioctl$TUNGETIFF(r4, 0x800454d2, &(0x7f0000000140)) ioctl$KIOCSOUND(r4, 0x4b2f, 0xfffffffffffffb74) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x20, 0x9b}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000447000)='./file0\x00', &(0x7f00000e1000)='msdos\x00', 0x0, &(0x7f000097bfff)) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000580)='./cgroup/syz0\x00', 0x1ff) [ 317.741239] ? syscall_return_slowpath+0x550/0x550 [ 317.741246] ? syscall_return_slowpath+0x2ac/0x550 [ 317.741253] ? prepare_exit_to_usermode+0x350/0x350 [ 317.741261] ? entry_SYSCALL_64_after_hwframe+0x52/0xb7 [ 317.741270] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 317.741280] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 317.741286] RIP: 0033:0x454e79 [ 317.741290] RSP: 002b:00007f37fba8ec68 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 317.741297] RAX: ffffffffffffffda RBX: 00007f37fba8f6d4 RCX: 0000000000454e79 2018/03/31 09:15:25 executing program 4: perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f000031f000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) prctl$void(0x0) getpid() r0 = syz_open_dev$vcsn(&(0x7f0000000040)='/dev/vcs#\x00', 0x0, 0x20000) ioctl$GIO_CMAP(r0, 0x4b70, &(0x7f0000000080)) r1 = socket$alg(0x26, 0x5, 0x0) ioctl$sock_SIOCGIFBR(0xffffffffffffffff, 0x8940, &(0x7f0000000040)=@get={0x1, &(0x7f0000000400)=""/242, 0x100000000}) bind$alg(r1, &(0x7f0000000080)={0x26, 'aead\x00', 0x0, 0x0, 'generic-gcm-aesni\x00'}, 0x58) syz_open_dev$sndmidi(&(0x7f0000000100)='/dev/snd/midiC#D#\x00', 0xfd, 0x0) bind(0xffffffffffffffff, &(0x7f0000000140)=@llc={0x1a, 0x33a, 0x7, 0x80, 0x0, 0x4, @remote={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xbb}}, 0x80) syz_init_net_socket$nfc_llcp(0x27, 0x1, 0x1) setsockopt$nfc_llcp_NFC_LLCP_MIUX(r0, 0x118, 0x15, &(0x7f0000000000), 0xfffffccf) r2 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/cuse\x00', 0x103002, 0x0) futimesat(r2, &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)={{0x0, 0x7530}}) r3 = syz_open_dev$vcsa(&(0x7f00000001c0)='/dev/vcsa#\x00', 0x2, 0x202) sendto$inet6(r3, &(0x7f0000000bc0), 0x0, 0x20000000, &(0x7f0000000c40)={0xa, 0x4e20, 0x0, @dev={0xfe, 0x80, [], 0x19}, 0x1f}, 0x1c) accept$alg(r0, 0x0, 0x0) sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f0000000000)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x8}, 0xb4fcd35419244434, &(0x7f00004ca000)={&(0x7f0000000300)=ANY=[], 0x1a1}, 0x1}, 0x0) syz_fuseblk_mount(&(0x7f0000001380)='./file0\x00', &(0x7f00000013c0)='./file0\x00', 0xf000, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0xb21, 0x0) socket(0x1e, 0x3, 0x0) socket(0x1e, 0x0, 0x0) ptrace$PTRACE_SECCOMP_GET_FILTER(0x420c, 0x0, 0x0, &(0x7f0000000380)=""/113) sched_yield() ioctl$TUNGETIFF(r3, 0x800454d2, &(0x7f0000000140)) ioctl$KIOCSOUND(r3, 0x4b2f, 0xfffffffffffffb74) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x20, 0x9b}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp_SCTP_SOCKOPT_PEELOFF(r0, 0x84, 0x66, &(0x7f0000000200)={0x0, 0x3}, &(0x7f0000000240)=0x8) setsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(r0, 0x84, 0xa, &(0x7f0000000280)={0x1, 0x782c, 0x800c, 0x1, 0x83a, 0x6, 0x4, 0xfffffffeffffffff, r4}, 0x20) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000447000)='./file0\x00', &(0x7f00000e1000)='msdos\x00', 0x0, &(0x7f000097bfff)) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000580)='./cgroup/syz0\x00', 0x1ff) 2018/03/31 09:15:25 executing program 6: perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f000031f000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) prctl$void(0x0) getpid() r0 = syz_open_dev$vcsn(&(0x7f0000000040)='/dev/vcs#\x00', 0x0, 0x20000) ioctl$GIO_CMAP(r0, 0x4b70, &(0x7f0000000080)) r1 = socket$alg(0x26, 0x5, 0x0) ioctl$sock_SIOCGIFBR(0xffffffffffffffff, 0x8940, &(0x7f0000000040)=@get={0x1, &(0x7f0000000400)=""/242, 0x100000000}) bind$alg(r1, &(0x7f0000000080)={0x26, 'aead\x00', 0x0, 0x0, 'generic-gcm-aesni\x00'}, 0x58) syz_open_dev$sndmidi(&(0x7f0000000100)='/dev/snd/midiC#D#\x00', 0xfd, 0x0) bind(0xffffffffffffffff, &(0x7f0000000140)=@llc={0x1a, 0x33a, 0x7, 0x80, 0x0, 0x4, @remote={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xbb}}, 0x80) r2 = syz_init_net_socket$nfc_llcp(0x27, 0x1, 0x1) setsockopt$nfc_llcp_NFC_LLCP_MIUX(r2, 0x118, 0x15, &(0x7f0000000000), 0x4) r3 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/cuse\x00', 0x103002, 0x0) futimesat(r3, &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)={{0x0, 0x7530}}) r4 = syz_open_dev$vcsa(&(0x7f00000001c0)='/dev/vcsa#\x00', 0x2, 0x0) sendto$inet6(r4, &(0x7f0000000bc0), 0x0, 0x20000000, &(0x7f0000000c40)={0xa, 0x4e20, 0x0, @dev={0xfe, 0x80, [], 0x19}, 0x1f}, 0x1c) accept$alg(r0, 0x0, 0x0) sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f0000000000)={&(0x7f0000000080)={0x10}, 0xb4fcd35419244434, &(0x7f00004ca000)={&(0x7f0000000300)=ANY=[], 0x1a1}, 0x1}, 0x0) syz_fuseblk_mount(&(0x7f0000001380)='./file0\x00', &(0x7f00000013c0)='./file0\x00', 0xf000, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0xb21, 0x0) socket(0x1e, 0x3, 0x0) socket(0x1e, 0x0, 0x0) ptrace$PTRACE_SECCOMP_GET_FILTER(0x420c, 0x0, 0x0, &(0x7f0000000380)=""/113) sched_yield() ioctl$TUNGETIFF(r4, 0x800454d2, &(0x7f0000000140)) ioctl$KIOCSOUND(r4, 0x4b2f, 0xfffffffffffffb74) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x20, 0x9b}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000447000)='./file0\x00', &(0x7f00000e1000)='msdos\x00', 0x0, &(0x7f000097bfff)) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000580)='./cgroup/syz0\x00', 0x1ff) 2018/03/31 09:15:25 executing program 7 (fault-call:24 fault-nth:10): perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f000031f000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getpid() r0 = syz_open_dev$vcsn(&(0x7f0000000040)='/dev/vcs#\x00', 0x0, 0x20000) ioctl$GIO_CMAP(r0, 0x4b70, &(0x7f0000000080)) r1 = socket$alg(0x26, 0x5, 0x0) ioctl$sock_SIOCGIFBR(r1, 0x8940, &(0x7f0000000040)=@get={0x1, &(0x7f0000000400)=""/242, 0x100000000}) bind$alg(r1, &(0x7f0000000080)={0x26, 'aead\x00', 0x0, 0x0, 'generic-gcm-aesni\x00'}, 0x58) syz_open_dev$sndmidi(&(0x7f0000000100)='/dev/snd/midiC#D#\x00', 0xfd, 0x0) bind(0xffffffffffffffff, &(0x7f0000000140)=@llc={0x1a, 0x33a, 0x7, 0x80, 0x5, 0x4, @remote={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xbb}}, 0x80) r2 = syz_init_net_socket$nfc_llcp(0x27, 0x1, 0x1) setsockopt$nfc_llcp_NFC_LLCP_MIUX(r2, 0x118, 0x15, &(0x7f0000000000), 0x4) r3 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/cuse\x00', 0x103002, 0x0) futimesat(r3, &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)={{0x0, 0x7530}}) r4 = syz_open_dev$vcsa(&(0x7f00000001c0)='/dev/vcsa#\x00', 0x2, 0x4020ff) sendto$inet6(r4, &(0x7f0000000bc0)="36251e313e0743fc195a1a198a14434e8a0a00b3f452a3b5644e336ec712a16310c9aecc4e3097bc666a8882128a73c368ce731e9fbf3fe18fa52d00", 0x3c, 0x20000000, &(0x7f0000000c40)={0xa, 0x0, 0x6, @dev={0xfe, 0x80, [], 0x19}, 0x1f}, 0x1c) accept$alg(r0, 0x0, 0x0) sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f0000000000)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x8}, 0xb4fcd35419244434, &(0x7f00004ca000)={&(0x7f0000000300)=ANY=[], 0x1a1}, 0x1}, 0x0) syz_fuseblk_mount(&(0x7f0000001380)='./file0\x00', &(0x7f00000013c0)='./file0\x00', 0xf000, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0xb21, 0x0) socket(0x1e, 0x3, 0x0) socket(0x1e, 0x0, 0x0) ptrace$PTRACE_SECCOMP_GET_FILTER(0x420c, 0x0, 0x0, &(0x7f0000000380)=""/113) sched_yield() ioctl$TUNGETIFF(r4, 0x800454d2, &(0x7f0000000140)) ioctl$KIOCSOUND(r4, 0x4b2f, 0xfffffffffffffb74) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000447000)='./file0\x00', &(0x7f00000e1000)='msdos\x00', 0x0, &(0x7f000097bfff)) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000580)='./cgroup/syz0\x00', 0x1ff) syz_open_dev$audion(&(0x7f0000000280)='/dev/audio#\x00', 0x7be, 0x0) [ 317.741301] RDX: 00000000200e1000 RSI: 0000000020447000 RDI: 0000000020000000 [ 317.741305] RBP: 000000000072bea0 R08: 000000002097bfff R09: 0000000000000000 [ 317.741309] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000019 [ 317.741313] R13: 00000000000003fa R14: 00000000006f8010 R15: 0000000000000009 [ 317.752877] print_req_error: I/O error, dev loop199, sector 0 [ 317.766649] binder: 31133:31149 unknown command 26 [ 317.770280] FAT-fs (loop199): unable to read boot sector [ 317.774190] binder: 31133:31149 ioctl c0306201 20000340 returned -22 [ 317.782341] print_req_error: I/O error, dev loop199, sector 0 [ 317.843759] binder: 31161:31162 unknown command 20 [ 317.848892] FAT-fs (loop199): unable to read boot sector [ 317.854087] binder: 31161:31162 ioctl c0306201 20000340 returned -22 [ 317.869133] print_req_error: I/O error, dev loop199, sector 0 [ 317.967295] FAT-fs (loop199): unable to read boot sector 2018/03/31 09:15:25 executing program 0: r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f000031f000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) prctl$void(0x0) r1 = syz_open_dev$vcsn(&(0x7f0000000040)='/dev/vcs#\x00', 0x0, 0x20000) socket$alg(0x26, 0x5, 0x0) ioctl$sock_SIOCGIFBR(0xffffffffffffffff, 0x8940, &(0x7f0000000040)=@get={0x1, &(0x7f0000000400)=""/242, 0x100000000}) bind$alg(0xffffffffffffffff, &(0x7f0000000080)={0x26, 'aead\x00', 0x0, 0x0, 'generic-gcm-aesni\x00'}, 0x58) syz_open_dev$sndmidi(&(0x7f0000000100)='/dev/snd/midiC#D#\x00', 0xfd, 0x0) bind(0xffffffffffffffff, &(0x7f0000000140)=@llc={0x1a, 0x33a, 0x7, 0x80, 0x0, 0x4, @remote={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xbb}}, 0x80) r2 = syz_init_net_socket$nfc_llcp(0x27, 0x1, 0x1) setsockopt$nfc_llcp_NFC_LLCP_MIUX(r2, 0x118, 0x15, &(0x7f0000000000), 0x4) r3 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/cuse\x00', 0x103002, 0x0) futimesat(r3, &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)={{0x0, 0x7530}}) r4 = syz_open_dev$vcsa(&(0x7f00000001c0)='/dev/vcsa#\x00', 0x2, 0x0) sendto$inet6(r4, &(0x7f0000000bc0)="36251e313e0743fc195a1a198a14434e8a0a00b3f452a3b5644e336ec712a16310c9aecc4e3097bc666a8882128a73c368ce731e9fbf3fe18fa52d00c34ac2e57c1c4569cfbd6a621c6dfbc032121aed", 0x50, 0x20000000, &(0x7f0000000c40)={0xa, 0x4e20, 0x6, @dev={0xfe, 0x80, [], 0x19}, 0x1f}, 0x1c) accept$alg(r1, 0x0, 0x0) sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f0000000000)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x8}, 0xb4fcd35419244434, &(0x7f00004ca000)={&(0x7f0000000300)=ANY=[], 0x1a1}, 0x1}, 0x0) syz_fuseblk_mount(&(0x7f0000001380)='./file0\x00', &(0x7f00000013c0)='./file0\x00', 0xf000, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0xb21, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000000200)={{{@in=@broadcast, @in6=@local}}, {{@in=@dev}, 0x0, @in=@rand_addr}}, &(0x7f0000000300)=0xe8) socket(0x1e, 0x3, 0x0) socket(0x1e, 0x0, 0x0) ptrace$PTRACE_SECCOMP_GET_FILTER(0x420c, 0x0, 0x0, &(0x7f0000000380)=""/113) sched_yield() ioctl$TUNGETIFF(r4, 0x800454d2, &(0x7f0000000140)) ioctl$KIOCSOUND(r4, 0x4b2f, 0xfffffffffffffb74) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x0, 0x0, 0x0, 0x9, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x20, 0x9b, 0xfffffffffffffffd}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000447000)='./file0\x00', &(0x7f00000e1000)='msdos\x00', 0x0, &(0x7f000097bfff)) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000580)='./cgroup/syz0\x00', 0x1ff) 2018/03/31 09:15:25 executing program 5: perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f000031f000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) prctl$void(0x0) getpid() r0 = syz_open_dev$vcsn(&(0x7f0000000040)='/dev/vcs#\x00', 0x0, 0x20000) ioctl$GIO_CMAP(r0, 0x4b70, &(0x7f0000000080)) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000080)={0x26, 'aead\x00', 0x0, 0x0, 'generic-gcm-aesni\x00'}, 0x58) syz_open_dev$sndmidi(&(0x7f0000000100)='/dev/snd/midiC#D#\x00', 0xfd, 0x0) bind(0xffffffffffffffff, &(0x7f0000000140)=@llc={0x1a, 0x33a, 0x7, 0x80, 0x5, 0x4, @remote={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xbb}}, 0x80) r2 = syz_init_net_socket$nfc_llcp(0x27, 0x1, 0x1) setsockopt$nfc_llcp_NFC_LLCP_MIUX(r2, 0x118, 0x15, &(0x7f0000000000), 0x4) r3 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/cuse\x00', 0x103002, 0x0) futimesat(r3, &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)={{0x0, 0x7530}}) r4 = syz_open_dev$vcsa(&(0x7f00000001c0)='/dev/vcsa#\x00', 0x2, 0x4020ff) sendto$inet6(0xffffffffffffffff, &(0x7f0000000bc0)="36251e313e0743fc195a1a198a14434e8a0a00b3f452a3b5644e336ec712a16310c9aecc4e3097bc666a8882128a73c368ce731e9fbf3fe18fa52d", 0x3b, 0x20000000, &(0x7f0000000c40)={0xa, 0x4e20, 0x6, @dev={0xfe, 0x80, [], 0x19}, 0x1f}, 0x1c) accept$alg(r0, 0x0, 0x0) sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f0000000000)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x8}, 0xb4fcd35419244434, &(0x7f00004ca000)={&(0x7f0000000300)=ANY=[], 0x1a1}, 0x1}, 0x0) syz_fuseblk_mount(&(0x7f0000001380)='./file0\x00', &(0x7f00000013c0)='./file0\x00', 0xf000, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0xb21, 0x0) socket(0x1e, 0x3, 0x0) setsockopt$kcm_KCM_RECV_DISABLE(r3, 0x119, 0x1, &(0x7f0000000200)=0xffffffff80000001, 0x4) socket(0x1e, 0x0, 0x0) ptrace$PTRACE_SECCOMP_GET_FILTER(0x420c, 0x0, 0x0, &(0x7f0000000380)=""/113) sched_yield() ioctl$TUNGETIFF(r4, 0x800454d2, &(0x7f0000000140)) ioctl$KIOCSOUND(r4, 0x4b2f, 0xfffffffffffffb74) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x20, 0x9b}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000447000)='./file0\x00', &(0x7f00000e1000)='msdos\x00', 0x0, &(0x7f000097bfff)) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000580)='./cgroup/syz0\x00', 0x1ff) syz_open_dev$audion(&(0x7f0000000280)='/dev/audio#\x00', 0x7be, 0x0) 2018/03/31 09:15:25 executing program 1: perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f000031f000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) prctl$void(0x7) getpid() r0 = syz_open_dev$vcsn(&(0x7f0000000040)='/dev/vcs#\x00', 0x400, 0x20000) r1 = socket$alg(0x26, 0x5, 0x0) ioctl$sock_SIOCGIFBR(r1, 0x8940, &(0x7f0000000040)=@get={0x1, &(0x7f0000000400)=""/242, 0x100000000}) bind$alg(r1, &(0x7f0000000080)={0x26, 'aead\x00', 0x0, 0x0, 'generic-gcm-aesni\x00'}, 0x58) r2 = syz_open_dev$sndmidi(&(0x7f0000000100)='/dev/snd/midiC#D#\x00', 0xfd, 0x0) bind(r2, &(0x7f0000000140)=@llc={0x1a, 0x33a, 0x7, 0x80, 0x0, 0x4, @remote={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xbb}}, 0x80) r3 = syz_init_net_socket$nfc_llcp(0x27, 0x1, 0x1) setsockopt$nfc_llcp_NFC_LLCP_MIUX(r3, 0x118, 0x15, &(0x7f0000000000), 0x4) r4 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/cuse\x00', 0x103002, 0x0) futimesat(r4, &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)={{0x0, 0x7530}}) r5 = syz_open_dev$vcsa(&(0x7f00000001c0)='/dev/vcsa#\x00', 0x2, 0x4020ff) sendto$inet6(r5, &(0x7f0000000bc0), 0x0, 0x20000000, &(0x7f0000000c40)={0xa, 0x4e20, 0x6, @dev={0xfe, 0x80, [], 0x19}, 0x1f}, 0x1c) sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f0000000000)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x8}, 0xb4fcd35419244434, &(0x7f00004ca000)={&(0x7f0000000300)=ANY=[], 0x1a1}, 0x1}, 0x0) r6 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000240)='IPVS\x00') sendmsg$IPVS_CMD_SET_CONFIG(r0, &(0x7f0000000500)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000340)={&(0x7f00000005c0)=ANY=[@ANYBLOB="44000030e826f79b293f4053342c2d13acb943748ede386fba2418553da56cfc447a6480d98929248e64f4c981d53482a8ea65386ee08fa3", @ANYRES16=r6, @ANYBLOB="02002abd7000fcdbdf250c00000008004500ffff00000005000100000014000100080005000100000008000200670000000c0001000800050003000000"], 0x44}, 0x1, 0x0, 0x0, 0x1}, 0x800) syz_fuseblk_mount(&(0x7f0000001380)='./file0\x00', &(0x7f00000013c0)='./file0\x00', 0xf000, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0xb21, 0x0) socket(0x1e, 0x3, 0x0) ptrace$PTRACE_SECCOMP_GET_FILTER(0x420c, 0x0, 0x0, &(0x7f0000000380)=""/113) sched_yield() ioctl$TUNGETIFF(r5, 0x800454d2, &(0x7f0000000140)) ioctl$KIOCSOUND(r5, 0x4b2f, 0x1000) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x20, 0x9b}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000447000)='./file0\x00', &(0x7f00000e1000)='msdos\x00', 0x0, &(0x7f000097bfff)) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000580)='./cgroup/syz0\x00', 0x1ff) syz_open_dev$audion(&(0x7f0000000280)='/dev/audio#\x00', 0x7be, 0x0) setsockopt$inet_msfilter(r2, 0x0, 0x29, &(0x7f00000002c0)={@multicast2=0xe0000002, @loopback=0x7f000001, 0x1, 0x5, [@dev={0xac, 0x14, 0x14, 0xc}, @remote={0xac, 0x14, 0x14, 0xbb}, @rand_addr=0x2fa, @remote={0xac, 0x14, 0x14, 0xbb}, @empty]}, 0x24) fcntl$getown(0xffffffffffffffff, 0x9) 2018/03/31 09:15:25 executing program 6: perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f000031f000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) prctl$void(0x0) getpid() r0 = syz_open_dev$vcsn(&(0x7f0000000040)='/dev/vcs#\x00', 0x0, 0x20000) ioctl$GIO_CMAP(r0, 0x4b70, &(0x7f0000000080)) r1 = socket$alg(0x26, 0x5, 0x0) ioctl$sock_SIOCGIFBR(0xffffffffffffffff, 0x8940, &(0x7f0000000040)=@get={0x1, &(0x7f0000000400)=""/242, 0x100000000}) bind$alg(r1, &(0x7f0000000080)={0x26, 'aead\x00', 0x0, 0x0, 'generic-gcm-aesni\x00'}, 0x58) syz_open_dev$sndmidi(&(0x7f0000000100)='/dev/snd/midiC#D#\x00', 0xfd, 0x0) bind(0xffffffffffffffff, &(0x7f0000000140)=@llc={0x1a, 0x33a, 0x7, 0x80, 0x0, 0x4, @remote={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xbb}}, 0x80) r2 = syz_init_net_socket$nfc_llcp(0x27, 0x1, 0x1) setsockopt$nfc_llcp_NFC_LLCP_MIUX(r2, 0x118, 0x15, &(0x7f0000000000), 0x4) r3 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/cuse\x00', 0x103002, 0x0) futimesat(r3, &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)={{0x0, 0x7530}}) r4 = syz_open_dev$vcsa(&(0x7f00000001c0)='/dev/vcsa#\x00', 0x2, 0x0) sendto$inet6(r4, &(0x7f0000000bc0), 0x0, 0x20000000, &(0x7f0000000c40)={0xa, 0x4e20, 0x0, @dev={0xfe, 0x80, [], 0x19}, 0x1f}, 0x1c) accept$alg(r0, 0x0, 0x0) sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f0000000000)={&(0x7f0000000080)={0x10}, 0xb4fcd35419244434, &(0x7f00004ca000)={&(0x7f0000000300)=ANY=[], 0x1a1}, 0x1}, 0x0) syz_fuseblk_mount(&(0x7f0000001380)='./file0\x00', &(0x7f00000013c0)='./file0\x00', 0xf000, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0xb21, 0x0) socket(0x1e, 0x3, 0x0) socket(0x1e, 0x0, 0x0) ptrace$PTRACE_SECCOMP_GET_FILTER(0x420c, 0x0, 0x0, &(0x7f0000000380)=""/113) sched_yield() ioctl$TUNGETIFF(r4, 0x800454d2, &(0x7f0000000140)) ioctl$KIOCSOUND(r4, 0x4b2f, 0xfffffffffffffb74) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x20, 0x9b}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000447000)='./file0\x00', &(0x7f00000e1000)='msdos\x00', 0x0, &(0x7f000097bfff)) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000580)='./cgroup/syz0\x00', 0x1ff) [ 317.976009] print_req_error: I/O error, dev loop199, sector 0 [ 317.977656] FAT-fs (loop199): unable to read boot sector [ 317.981501] FAT-fs (loop199): unable to read boot sector [ 317.982872] FAULT_INJECTION: forcing a failure. [ 317.982872] name failslab, interval 1, probability 0, space 0, times 0 [ 317.982887] CPU: 0 PID: 31172 Comm: syz-executor7 Not tainted 4.16.0-rc7+ #8 [ 317.982895] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 317.982900] Call Trace: [ 317.982915] dump_stack+0x194/0x24d [ 317.982933] ? arch_local_irq_restore+0x53/0x53 [ 317.982961] should_fail+0x8c0/0xa40 [ 317.982973] ? trace_hardirqs_off+0x10/0x10 [ 317.982989] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 317.983009] ? __lock_is_held+0xb6/0x140 [ 317.983039] ? find_held_lock+0x35/0x1d0 [ 317.983058] ? __lock_is_held+0xb6/0x140 [ 317.983087] ? check_same_owner+0x320/0x320 [ 317.983096] ? sget_userns+0x27d/0xe40 [ 317.983113] ? rcu_note_context_switch+0x710/0x710 [ 317.983138] should_failslab+0xec/0x120 [ 317.983151] kmem_cache_alloc_trace+0x4b/0x740 [ 317.983160] ? drop_super_exclusive+0x30/0x30 [ 317.983186] sget_userns+0x2a3/0xe40 [ 317.983198] ? kill_litter_super+0x90/0x90 [ 317.983216] ? ns_test_super+0x50/0x50 [ 317.983229] ? destroy_unused_super.part.6+0xd0/0xd0 [ 317.983238] ? do_raw_spin_trylock+0x190/0x190 [ 317.983255] ? kobject_put+0x6b/0x250 [ 317.983275] ? blkdev_get+0x3a1/0xb00 [ 317.983294] ? cap_capable+0x1b5/0x230 [ 317.983306] ? __blkdev_get+0x13b0/0x13b0 [ 317.983322] ? security_capable+0x8e/0xc0 [ 317.983335] ? kill_litter_super+0x90/0x90 [ 317.983347] ? ns_capable_common+0xcf/0x160 [ 317.983360] ? ns_test_super+0x50/0x50 [ 317.983369] ? kill_litter_super+0x90/0x90 [ 317.983379] sget+0xd2/0x120 [ 317.983397] mount_bdev+0x109/0x370 [ 317.983407] ? msdos_mount+0x40/0x40 [ 317.983424] msdos_mount+0x34/0x40 [ 317.983438] mount_fs+0x66/0x2d0 [ 317.983456] vfs_kern_mount.part.26+0xc6/0x4a0 [ 317.983478] ? may_umount+0xa0/0xa0 [ 317.983492] ? _raw_read_unlock+0x22/0x30 [ 317.983504] ? __get_fs_type+0x8a/0xc0 [ 317.983523] do_mount+0xea4/0x2bb0 [ 317.983543] ? copy_mount_string+0x40/0x40 [ 317.983556] ? trace_hardirqs_on_caller+0x421/0x5c0 [ 317.983570] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 317.983591] ? retint_kernel+0x10/0x10 [ 317.983612] ? copy_mount_options+0x18b/0x2e0 [ 317.983625] ? copy_mount_options+0x193/0x2e0 [ 317.983636] ? copy_mount_options+0x1f7/0x2e0 [ 317.983655] SyS_mount+0xab/0x120 [ 317.983668] ? copy_mnt_ns+0xb30/0xb30 [ 317.983682] do_syscall_64+0x281/0x940 [ 317.983695] ? vmalloc_sync_all+0x30/0x30 [ 317.983707] ? _raw_spin_unlock_irq+0x27/0x70 [ 317.983718] ? finish_task_switch+0x1c1/0x7e0 [ 317.983731] ? syscall_return_slowpath+0x550/0x550 [ 317.983744] ? syscall_return_slowpath+0x2ac/0x550 [ 317.983757] ? prepare_exit_to_usermode+0x350/0x350 [ 317.983771] ? entry_SYSCALL_64_after_hwframe+0x52/0xb7 [ 317.983789] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 317.983811] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 317.983820] RIP: 0033:0x454e79 [ 317.983827] RSP: 002b:00007f37fba8ec68 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 317.983842] RAX: ffffffffffffffda RBX: 00007f37fba8f6d4 RCX: 0000000000454e79 [ 317.983850] RDX: 00000000200e1000 RSI: 0000000020447000 RDI: 0000000020000000 [ 317.983859] RBP: 000000000072bea0 R08: 000000002097bfff R09: 0000000000000000 [ 317.983866] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000019 [ 317.983874] R13: 00000000000003fa R14: 00000000006f8010 R15: 000000000000000a [ 317.985198] binder: 31161:31169 unknown command 26 [ 317.985209] binder: 31161:31169 ioctl c0306201 20000340 returned -22 [ 318.097744] FAT-fs (loop199): unable to read boot sector [ 318.145812] FAT-fs (loop199): unable to read boot sector [ 318.438564] FAT-fs (loop199): unable to read boot sector [ 318.452652] FAT-fs (loop199): unable to read boot sector [ 318.458969] FAT-fs (loop199): unable to read boot sector [ 318.483648] FAT-fs (loop199): unable to read boot sector [ 318.489707] FAT-fs (loop199): unable to read boot sector [ 318.496068] FAT-fs (loop199): unable to read boot sector 2018/03/31 09:15:25 executing program 5: perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f000031f000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) prctl$void(0x0) getpid() r0 = syz_open_dev$vcsn(&(0x7f0000000040)='/dev/vcs#\x00', 0x0, 0x20000) ioctl$GIO_CMAP(r0, 0x4b70, &(0x7f0000000080)) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000080)={0x26, 'aead\x00', 0x0, 0x0, 'generic-gcm-aesni\x00'}, 0x58) syz_open_dev$sndmidi(&(0x7f0000000100)='/dev/snd/midiC#D#\x00', 0xfd, 0x0) bind(0xffffffffffffffff, &(0x7f0000000140)=@llc={0x1a, 0x33a, 0x7, 0x80, 0x5, 0x4, @remote={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xbb}}, 0x80) r2 = syz_init_net_socket$nfc_llcp(0x27, 0x1, 0x1) setsockopt$nfc_llcp_NFC_LLCP_MIUX(r2, 0x118, 0x15, &(0x7f0000000000), 0x4) r3 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/cuse\x00', 0x103002, 0x0) futimesat(r3, &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)={{0x0, 0x7530}}) r4 = syz_open_dev$vcsa(&(0x7f00000001c0)='/dev/vcsa#\x00', 0x2, 0x4020ff) sendto$inet6(0xffffffffffffffff, &(0x7f0000000bc0)="36251e313e0743fc195a1a198a14434e8a0a00b3f452a3b5644e336ec712a16310c9aecc4e3097bc666a8882128a73c368ce731e9fbf3fe18fa52d", 0x3b, 0x20000000, &(0x7f0000000c40)={0xa, 0x4e20, 0x6, @dev={0xfe, 0x80, [], 0x19}, 0x1f}, 0x1c) accept$alg(r0, 0x0, 0x0) sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f0000000000)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x8}, 0xb4fcd35419244434, &(0x7f00004ca000)={&(0x7f0000000300)=ANY=[], 0x1a1}, 0x1}, 0x0) syz_fuseblk_mount(&(0x7f0000001380)='./file0\x00', &(0x7f00000013c0)='./file0\x00', 0xf000, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0xb21, 0x0) socket(0x1e, 0x3, 0x0) socket(0x1e, 0x0, 0x0) ptrace$PTRACE_SECCOMP_GET_FILTER(0x420c, 0x0, 0x0, &(0x7f0000000380)=""/113) sched_yield() ioctl$TUNGETIFF(r4, 0x800454d2, &(0x7f0000000140)) ioctl$KIOCSOUND(r4, 0x4b2f, 0xfffffffffffffb74) ioctl$sock_FIOGETOWN(r4, 0x8903, &(0x7f0000000200)) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x20, 0x9b}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000447000)='./file0\x00', &(0x7f00000e1000)='msdos\x00', 0x0, &(0x7f000097bfff)) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000580)='./cgroup/syz0\x00', 0x1ff) syz_open_dev$audion(&(0x7f0000000280)='/dev/audio#\x00', 0x7be, 0x0) 2018/03/31 09:15:25 executing program 4: perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f000031f000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) prctl$void(0x0) getpid() r0 = syz_open_dev$vcsn(&(0x7f0000000040)='/dev/vcs#\x00', 0x0, 0x20000) ioctl$GIO_CMAP(r0, 0x4b70, &(0x7f0000000080)) r1 = socket$alg(0x26, 0x5, 0x0) ioctl$sock_SIOCGIFBR(0xffffffffffffffff, 0x8940, &(0x7f0000000040)=@get={0x1, &(0x7f0000000400)=""/242, 0x100000000}) bind$alg(r1, &(0x7f0000000080)={0x26, 'aead\x00', 0x0, 0x0, 'generic-gcm-aesni\x00'}, 0x58) syz_open_dev$sndmidi(&(0x7f0000000100)='/dev/snd/midiC#D#\x00', 0xfd, 0x0) bind(0xffffffffffffffff, &(0x7f0000000140)=@llc={0x1a, 0x33a, 0x7, 0x80, 0x0, 0x4, @remote={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xbb}}, 0x80) r2 = syz_init_net_socket$nfc_llcp(0x27, 0x1, 0x1) setsockopt$nfc_llcp_NFC_LLCP_MIUX(r2, 0x118, 0x15, &(0x7f0000000000), 0x4) r3 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/cuse\x00', 0x103002, 0x0) futimesat(r3, &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)={{0x0, 0x7530}}) r4 = syz_open_dev$vcsa(&(0x7f00000001c0)='/dev/vcsa#\x00', 0x2, 0x0) sendto$inet6(r4, &(0x7f0000000bc0), 0x0, 0x20000000, &(0x7f0000000c40)={0xa, 0x4e20, 0x0, @dev={0xfe, 0x80, [], 0x19}, 0x1f}, 0x1c) accept$alg(r0, 0x0, 0x0) sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f0000000000)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x8}, 0xb4fcd35419244434, &(0x7f00004ca000)={&(0x7f0000000300)=ANY=[], 0x1a1}, 0x1}, 0x0) syz_fuseblk_mount(&(0x7f0000001380)='./file0\x00', &(0x7f00000013c0)='./file0\x00', 0xf000, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0xb21, 0x0) socket(0x1e, 0x3, 0x0) socket(0x1e, 0x0, 0x0) ptrace$PTRACE_SECCOMP_GET_FILTER(0x420c, 0x0, 0x0, &(0x7f0000000380)=""/113) sched_yield() ioctl$TUNGETIFF(r4, 0x800454d2, &(0x7f0000000140)) setsockopt$sock_linger(r2, 0x1, 0xd, &(0x7f0000000200)={0x0, 0x8}, 0x8) ioctl$KIOCSOUND(r4, 0x4b2f, 0xfffffffffffffb74) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x20, 0x9b}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000447000)='./file0\x00', &(0x7f00000e1000)='msdos\x00', 0x0, &(0x7f000097bfff)) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000580)='./cgroup/syz0\x00', 0x1ff) ioctl$KVM_SET_LAPIC(r0, 0x4400ae8f, &(0x7f00000005c0)={"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"}) 2018/03/31 09:15:25 executing program 2: syz_open_dev$loop(&(0x7f00000003c0)='/dev/loop#\x00', 0x8, 0x0) r0 = syz_open_dev$sndseq(&(0x7f00000001c0)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r0, 0x4040534e, &(0x7f000019ffe9)={0xc1}) r1 = accept(0xffffffffffffffff, &(0x7f0000000080)=@can, &(0x7f0000000180)=0x80) ioctl$sock_ipx_SIOCAIPXPRISLT(r1, 0x89e1, &(0x7f0000000280)=0x3f) ioctl$sock_inet_SIOCRTMSG(r1, 0x890d, &(0x7f0000000200)={0x80, {0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x19}}, {0x2, 0x4e21, @local={0xac, 0x14, 0x14, 0xaa}}, {0x2, 0x4e23}, 0x0, 0x7, 0x1, 0x0, 0x9, 0x0, 0x0, 0x0, 0xfffffffffffffff7}) setsockopt$inet_sctp_SCTP_ENABLE_STREAM_RESET(r1, 0x84, 0x76, &(0x7f0000000300)={0x0, 0x1c9}, 0x8) r2 = syz_open_dev$sg(&(0x7f0000000700)='/dev/sg#\x00', 0xfffffffffffffff7, 0x800) clone(0x2000c100, &(0x7f0000000800)="97bb77038add5df9e9d4f9783b82c55fe59e5c0acdbcfc9bcf92ac0e1f1f3c1959c1d25dfabf3849336c7c85be174d7765b47e113632aea54b87e4d3f2c1db09e6aa4040b43d17308fb7e62e808067da2fff3cfd8e4c038c814bbfc6bc49d8ebc8671d8297e2d34dc61f2d194d2dbb8f59b4c853e0714d3d4bb29d1243fac01c86c8c4dd38daedab3c6ad73a72d3f6dd2684aa82e5285eb82452c9848b7beb8bc513ba8c8973cad0bd5926604846b7f5d0397b", &(0x7f00000008c0), &(0x7f0000000900), &(0x7f0000000940)="ed6c04412e782fe395f084741e3d9fe469aebde09acc8f8d8d84d1f00f5573b09acba487077ebb904cb1f3fed55f59d677ce24bbd2a7506df8e1e0d0fc709cb8c9f4ab2aeeeebc5ef879742c1f7628f1862c88b5b0da89acbf43ef12e4839405b6a3430d296fea06d2f3a8356c57ec991e") ioctl$SNDRV_SEQ_IOCTL_SUBSCRIBE_PORT(r0, 0x40505330, &(0x7f0000ec6fb0)={{}, {0x80}}) getsockopt$netrom_NETROM_T1(r1, 0x103, 0x1, &(0x7f0000000000), &(0x7f0000000380)=0x4) syz_open_dev$adsp(&(0x7f0000000600)='/dev/adsp#\x00', 0x100000000, 0x80000) rt_sigprocmask(0x3d738072cd0f41ac, &(0x7f0000000cc0)={0x7}, &(0x7f0000000d00), 0x8) clone(0x40000000, &(0x7f0000000500)="67cdd9994c47c31d325b069924a7064c157c2ec0b5b5dca2feeb7dabef3b7af0d02d559e293faa759f2b3cb12aea360c2d", &(0x7f0000000580), &(0x7f00000005c0), &(0x7f0000000a00)="29859fdda9a119e54a27f9ec76b4d63a16dc5bbdd38c2fda0e5f4d8f830cd987ec7d3ffc66cf3db8820968fd89a1fba8fe6352a29a27f3b000bcdf238f2c04b358fc831025180e0be313da41de6366c94a1a0f86aaffdf2c039111b55275c054e14819a827fe809225249a01944263a2aec15f64e752e35892b1b8e7ef1e0e9115") ioctl$SNDRV_SEQ_IOCTL_DELETE_PORT(r0, 0x40a85321, &(0x7f0000000b80)={{0x4, 0x8}, 'port0\x00', 0x80, 0x0, 0x10000, 0x6, 0x2, 0x80, 0x8, 0x0, 0x0, 0x3dec00}) getsockopt$inet_sctp_SCTP_SOCKOPT_PEELOFF(r2, 0x84, 0x66, &(0x7f0000000c40)={0x0, 0x6}, &(0x7f0000000c80)=0x8) clock_settime(0x7, &(0x7f0000000740)={0x77359400}) ioctl$SNDRV_SEQ_IOCTL_CLIENT_ID(r0, 0x80045301, &(0x7f0000000340)) r3 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer2\x00', 0x0, 0x0) openat$sequencer2(0xffffffffffffff9c, &(0x7f00000006c0)='/dev/sequencer2\x00', 0x222081, 0x0) ioctl$RNDADDENTROPY(0xffffffffffffffff, 0x40085203, &(0x7f0000000100)=ANY=[@ANYPTR=&(0x7f0000000680)=ANY=[@ANYPTR64=&(0x7f0000000640)=ANY=[@ANYPTR, @ANYPTR]]]) setsockopt$inet_sctp_SCTP_DEFAULT_SEND_PARAM(r3, 0x84, 0xa, &(0x7f0000000140)={0x5, 0x100000001, 0x0, 0x8, 0x0, 0x7, 0x401, 0x1f}, 0x20) 2018/03/31 09:15:25 executing program 0: perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f000031f000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) prctl$void(0x0) r0 = syz_open_dev$vcsn(&(0x7f0000000040)='/dev/vcs#\x00', 0x0, 0x20000) socket$alg(0x26, 0x5, 0x0) ioctl$sock_SIOCGIFBR(0xffffffffffffffff, 0x8940, &(0x7f0000000040)=@get={0x1, &(0x7f0000000400)=""/242, 0x100000000}) bind$alg(0xffffffffffffffff, &(0x7f0000000080)={0x26, 'aead\x00', 0x0, 0x0, 'generic-gcm-aesni\x00'}, 0x58) syz_open_dev$sndmidi(&(0x7f0000000100)='/dev/snd/midiC#D#\x00', 0xfd, 0x0) bind(0xffffffffffffffff, &(0x7f0000000140)=@llc={0x1a, 0x33a, 0x7, 0x80, 0x0, 0x4, @remote={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xbb}}, 0x80) r1 = syz_init_net_socket$nfc_llcp(0x27, 0x1, 0x1) setsockopt$nfc_llcp_NFC_LLCP_MIUX(r1, 0x118, 0x15, &(0x7f0000000000), 0x4) r2 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/cuse\x00', 0x103002, 0x0) futimesat(r2, &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)={{0x0, 0x7530}}) r3 = syz_open_dev$vcsa(&(0x7f00000001c0)='/dev/vcsa#\x00', 0x2, 0x0) sendto$inet6(r3, &(0x7f0000000bc0)="36251e313e0743fc195a1a198a14434e8a0a00b3f452a3b5644e336ec712a16310c9aecc4e3097bc666a8882128a73c368ce731e9fbf3fe18fa52d00c34ac2e57c1c4569cfbd6a621c6dfbc032121aed", 0x50, 0x20000000, &(0x7f0000000c40)={0xa, 0x4e20, 0x6, @dev={0xfe, 0x80, [], 0x19}, 0x1f}, 0x1c) accept$alg(r0, 0x0, 0x0) sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f0000000000)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x8}, 0xb4fcd35419244434, &(0x7f00004ca000)={&(0x7f0000000300)=ANY=[], 0x1a1}, 0x1}, 0x0) syz_fuseblk_mount(&(0x7f0000001380)='./file0\x00', &(0x7f00000013c0)='./file0\x00', 0xf000, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0xb21, 0x0) r4 = socket(0x1e, 0x3, 0x0) socket(0x1e, 0x0, 0x0) pause() ptrace$PTRACE_SECCOMP_GET_FILTER(0x420c, 0x0, 0x0, &(0x7f0000000380)=""/113) sched_yield() ioctl$TUNGETIFF(r3, 0x800454d2, &(0x7f0000000140)) ioctl$KIOCSOUND(r3, 0x4b2f, 0xfffffffffffffb74) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x20, 0x9b}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000447000)='./file0\x00', &(0x7f00000e1000)='msdos\x00', 0x0, &(0x7f000097bfff)) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000580)='./cgroup/syz0\x00', 0x1ff) fcntl$setsig(r4, 0xa, 0x28) 2018/03/31 09:15:25 executing program 1: perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f000031f000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) prctl$void(0x0) getpid() r0 = syz_open_dev$vcsn(&(0x7f0000000040)='/dev/vcs#\x00', 0x400, 0x20000) r1 = socket$alg(0x26, 0x5, 0x0) ioctl$sock_SIOCGIFBR(r1, 0x8940, &(0x7f0000000040)=@get={0x1, &(0x7f0000000400)=""/242, 0x100000000}) setsockopt$bt_l2cap_L2CAP_CONNINFO(r0, 0x6, 0x2, &(0x7f0000000200)={0xb261, 0x401, 0x5, 0x6}, 0x6) bind$alg(r1, &(0x7f0000000080)={0x26, 'aead\x00', 0x0, 0x0, 'generic-gcm-aesni\x00'}, 0x58) r2 = syz_open_dev$sndmidi(&(0x7f0000000100)='/dev/snd/midiC#D#\x00', 0xfd, 0x0) bind(r2, &(0x7f0000000140)=@llc={0x1a, 0x33a, 0x7, 0x80, 0x0, 0x4, @remote={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xbb}}, 0x80) r3 = syz_init_net_socket$nfc_llcp(0x27, 0x1, 0x1) setsockopt$nfc_llcp_NFC_LLCP_MIUX(r3, 0x118, 0x15, &(0x7f0000000000), 0x4) r4 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/cuse\x00', 0x103002, 0x0) futimesat(r4, &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)={{0x0, 0x7530}}) r5 = syz_open_dev$vcsa(&(0x7f00000001c0)='/dev/vcsa#\x00', 0x2, 0x4020ff) sendto$inet6(r5, &(0x7f0000000bc0), 0x0, 0x20000000, &(0x7f0000000c40)={0xa, 0x4e20, 0x6, @dev={0xfe, 0x80, [], 0x19}, 0x1f}, 0x1c) sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f0000000000)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x8}, 0xb4fcd35419244434, &(0x7f00004ca000)={&(0x7f0000000300)=ANY=[], 0x1a1}, 0x1}, 0x0) syz_fuseblk_mount(&(0x7f0000001380)='./file0\x00', &(0x7f00000013c0)='./file0\x00', 0xf000, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0xb21, 0x0) socket(0x1e, 0x3, 0x0) ptrace$PTRACE_SECCOMP_GET_FILTER(0x420c, 0x0, 0x0, &(0x7f0000000380)=""/113) sched_yield() ioctl$TUNGETIFF(r5, 0x800454d2, &(0x7f0000000140)) ioctl$KIOCSOUND(r5, 0x4b2f, 0xfffffffffffffb74) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x20, 0x9b}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bind$alg(r0, &(0x7f0000000240)={0x26, 'aead\x00', 0x0, 0x0, 'rfc4106(rfc4106(gcm(aes)))\x00'}, 0x58) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000447000)='./file0\x00', &(0x7f00000e1000)='msdos\x00', 0x0, &(0x7f000097bfff)) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000580)='./cgroup/syz0\x00', 0x1ff) syz_open_dev$audion(&(0x7f0000000340)='/dev/audio#\x00', 0x7b8, 0x0) fcntl$getown(0xffffffffffffffff, 0x9) 2018/03/31 09:15:25 executing program 3: r0 = syz_open_dev$random(&(0x7f00000001c0)='/dev/random\x00', 0x0, 0x800) r1 = syz_open_dev$loop(&(0x7f0000308000)='/dev/loop#\x00', 0x0, 0x0) ioctl$LOOP_SET_STATUS(r1, 0xc0481273, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "3900ea631d00000000020000010000009f00000023f7b7d65f90b0e6330ee739b319d8f6aa6bd58d1443474482e85040fb4947ebb55bd19f335b5bffff0001f3", "cfa430745a540dc1c149b7b81579f6a41c51f7d51933223e82ab867dac761faf"}) write(0xffffffffffffffff, &(0x7f00000001c0), 0x0) setsockopt$inet_sctp6_SCTP_RECVNXTINFO(0xffffffffffffffff, 0x84, 0x21, &(0x7f00000003c0)=0x200, 0x4) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f00000000c0)=0x0) getsockopt$netrom_NETROM_T4(0xffffffffffffffff, 0x103, 0x6, &(0x7f0000000300)=0x8, &(0x7f0000000340)=0x4) r3 = getpid() sched_setparam(r3, &(0x7f0000000400)) syz_open_dev$loop(&(0x7f0000ca9ff5)='/dev/loop#\x00', 0x0, 0x82) r4 = memfd_create(&(0x7f0000614000)="74086e750000000000000000008c00", 0x0) pwritev(r4, &(0x7f0000000480)=[{&(0x7f00000004c0)="f44379b1", 0x182}], 0x1, 0x0) fcntl$getownex(r1, 0x10, &(0x7f0000000240)={0x0, 0x0}) r6 = syz_open_procfs(r5, &(0x7f0000000280)='stat\x00') epoll_ctl$EPOLL_CTL_MOD(r4, 0x3, r0, &(0x7f00000002c0)={0x20000010}) accept4$inet6(r4, &(0x7f0000000100)={0x0, 0x0, 0x0, @mcast1}, &(0x7f0000000140)=0x1c, 0x7fd) getsockopt$inet_IP_IPSEC_POLICY(r4, 0x0, 0x10, &(0x7f0000000940)={{{@in6=@local, @in6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@loopback}, 0x0, @in=@local}}, &(0x7f0000000780)=0xe8) getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f00000007c0)={0x0, 0x0, 0x0}, &(0x7f0000000540)=0xc) fchown(r4, r7, r8) r9 = syz_open_dev$binder(&(0x7f0000000100)='/dev/binder#\x00', 0xffffffffffffffff, 0x806) ioctl$BINDER_SET_CONTEXT_MGR(r6, 0x40046207, 0x0) mmap$binder(&(0x7f000000c000/0x2000)=nil, 0x2000, 0x0, 0x12, r9, 0x0) ioctl$BINDER_WRITE_READ(r9, 0xc0306201, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000), 0x0, 0x0, &(0x7f0000011f9d)}) getsockopt$inet_sctp6_SCTP_AUTO_ASCONF(0xffffffffffffffff, 0x84, 0x1e, &(0x7f0000000140), &(0x7f0000000180)=0x4) ioctl$BINDER_WRITE_READ(r9, 0xc0306201, &(0x7f0000000340)={0x8, 0x0, &(0x7f0000000440)=ANY=[@ANYRES64=r1], 0x0, 0x0, &(0x7f0000000240)}) write(0xffffffffffffffff, &(0x7f0000000300)="8be25f5790f664f32509e40d6f879d5add7e2d359c9a19afb750a2d25352875d187d4118c99a2d5c6db433c277cc7d345b87a34f1b417033d367cb0cfd6a25633f77aafb17e99c33cb65352c901ae75176f07bb0a4bb5ebff3d87e", 0x5b) r10 = ioctl$LOOP_CTL_GET_FREE(r4, 0x4c82) ioctl$LOOP_CTL_REMOVE(r6, 0x4c81, r10) openat$cgroup(0xffffffffffffff9c, &(0x7f0000000000)='syz0\x00', 0x200002, 0x0) sched_setaffinity(r2, 0x8, &(0x7f0000000200)=0x7) 2018/03/31 09:15:25 executing program 7 (fault-call:24 fault-nth:11): perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f000031f000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getpid() r0 = syz_open_dev$vcsn(&(0x7f0000000040)='/dev/vcs#\x00', 0x0, 0x20000) ioctl$GIO_CMAP(r0, 0x4b70, &(0x7f0000000080)) r1 = socket$alg(0x26, 0x5, 0x0) ioctl$sock_SIOCGIFBR(r1, 0x8940, &(0x7f0000000040)=@get={0x1, &(0x7f0000000400)=""/242, 0x100000000}) bind$alg(r1, &(0x7f0000000080)={0x26, 'aead\x00', 0x0, 0x0, 'generic-gcm-aesni\x00'}, 0x58) syz_open_dev$sndmidi(&(0x7f0000000100)='/dev/snd/midiC#D#\x00', 0xfd, 0x0) bind(0xffffffffffffffff, &(0x7f0000000140)=@llc={0x1a, 0x33a, 0x7, 0x80, 0x5, 0x4, @remote={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xbb}}, 0x80) r2 = syz_init_net_socket$nfc_llcp(0x27, 0x1, 0x1) setsockopt$nfc_llcp_NFC_LLCP_MIUX(r2, 0x118, 0x15, &(0x7f0000000000), 0x4) r3 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/cuse\x00', 0x103002, 0x0) futimesat(r3, &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)={{0x0, 0x7530}}) r4 = syz_open_dev$vcsa(&(0x7f00000001c0)='/dev/vcsa#\x00', 0x2, 0x4020ff) sendto$inet6(r4, &(0x7f0000000bc0)="36251e313e0743fc195a1a198a14434e8a0a00b3f452a3b5644e336ec712a16310c9aecc4e3097bc666a8882128a73c368ce731e9fbf3fe18fa52d00", 0x3c, 0x20000000, &(0x7f0000000c40)={0xa, 0x0, 0x6, @dev={0xfe, 0x80, [], 0x19}, 0x1f}, 0x1c) accept$alg(r0, 0x0, 0x0) sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f0000000000)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x8}, 0xb4fcd35419244434, &(0x7f00004ca000)={&(0x7f0000000300)=ANY=[], 0x1a1}, 0x1}, 0x0) syz_fuseblk_mount(&(0x7f0000001380)='./file0\x00', &(0x7f00000013c0)='./file0\x00', 0xf000, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0xb21, 0x0) socket(0x1e, 0x3, 0x0) socket(0x1e, 0x0, 0x0) ptrace$PTRACE_SECCOMP_GET_FILTER(0x420c, 0x0, 0x0, &(0x7f0000000380)=""/113) sched_yield() ioctl$TUNGETIFF(r4, 0x800454d2, &(0x7f0000000140)) ioctl$KIOCSOUND(r4, 0x4b2f, 0xfffffffffffffb74) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000447000)='./file0\x00', &(0x7f00000e1000)='msdos\x00', 0x0, &(0x7f000097bfff)) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000580)='./cgroup/syz0\x00', 0x1ff) syz_open_dev$audion(&(0x7f0000000280)='/dev/audio#\x00', 0x7be, 0x0) 2018/03/31 09:15:25 executing program 6: perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f000031f000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) prctl$void(0x0) getpid() r0 = syz_open_dev$vcsn(&(0x7f0000000040)='/dev/vcs#\x00', 0x0, 0x20000) ioctl$GIO_CMAP(r0, 0x4b70, &(0x7f0000000080)) r1 = socket$alg(0x26, 0x5, 0x0) ioctl$sock_SIOCGIFBR(0xffffffffffffffff, 0x8940, &(0x7f0000000040)=@get={0x1, &(0x7f0000000400)=""/242, 0x100000000}) bind$alg(r1, &(0x7f0000000080)={0x26, 'aead\x00', 0x0, 0x0, 'generic-gcm-aesni\x00'}, 0x58) syz_open_dev$sndmidi(&(0x7f0000000100)='/dev/snd/midiC#D#\x00', 0xfd, 0x0) bind(0xffffffffffffffff, &(0x7f0000000140)=@llc={0x1a, 0x33a, 0x7, 0x80, 0x0, 0x4, @remote={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xbb}}, 0x80) r2 = syz_init_net_socket$nfc_llcp(0x27, 0x1, 0x1) setsockopt$nfc_llcp_NFC_LLCP_MIUX(r2, 0x118, 0x15, &(0x7f0000000000), 0x4) r3 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/cuse\x00', 0x103002, 0x0) futimesat(r3, &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)={{0x0, 0x7530}}) r4 = syz_open_dev$vcsa(&(0x7f00000001c0)='/dev/vcsa#\x00', 0x2, 0x0) sendto$inet6(r4, &(0x7f0000000bc0), 0x0, 0x20000000, &(0x7f0000000c40)={0xa, 0x4e20, 0x0, @dev={0xfe, 0x80, [], 0x19}, 0x1f}, 0x1c) accept$alg(r0, 0x0, 0x0) sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f0000000000)={&(0x7f0000000080)={0x10}, 0xb4fcd35419244434, &(0x7f00004ca000)={&(0x7f0000000300)=ANY=[], 0x1a1}, 0x1}, 0x0) syz_fuseblk_mount(&(0x7f0000001380)='./file0\x00', &(0x7f00000013c0)='./file0\x00', 0xf000, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0xb21, 0x0) socket(0x1e, 0x3, 0x0) socket(0x1e, 0x0, 0x0) ptrace$PTRACE_SECCOMP_GET_FILTER(0x420c, 0x0, 0x0, &(0x7f0000000380)=""/113) sched_yield() ioctl$TUNGETIFF(r4, 0x800454d2, &(0x7f0000000140)) ioctl$KIOCSOUND(r4, 0x4b2f, 0xfffffffffffffb74) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x20, 0x9b}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000447000)='./file0\x00', &(0x7f00000e1000)='msdos\x00', 0x0, &(0x7f000097bfff)) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000580)='./cgroup/syz0\x00', 0x1ff) [ 318.603860] FAT-fs (loop199): unable to read boot sector [ 318.613893] binder: 31194:31198 unknown command 20 [ 318.622243] FAULT_INJECTION: forcing a failure. [ 318.622243] name failslab, interval 1, probability 0, space 0, times 0 [ 318.633593] CPU: 1 PID: 31196 Comm: syz-executor7 Not tainted 4.16.0-rc7+ #8 [ 318.640775] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 318.650117] Call Trace: 2018/03/31 09:15:25 executing program 6: perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f000031f000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) prctl$void(0x0) getpid() r0 = syz_open_dev$vcsn(&(0x7f0000000040)='/dev/vcs#\x00', 0x0, 0x20000) ioctl$GIO_CMAP(r0, 0x4b70, &(0x7f0000000080)) r1 = socket$alg(0x26, 0x5, 0x0) ioctl$sock_SIOCGIFBR(0xffffffffffffffff, 0x8940, &(0x7f0000000040)=@get={0x1, &(0x7f0000000400)=""/242, 0x100000000}) bind$alg(r1, &(0x7f0000000080)={0x26, 'aead\x00', 0x0, 0x0, 'generic-gcm-aesni\x00'}, 0x58) syz_open_dev$sndmidi(&(0x7f0000000100)='/dev/snd/midiC#D#\x00', 0xfd, 0x0) bind(0xffffffffffffffff, &(0x7f0000000140)=@llc={0x1a, 0x33a, 0x7, 0x80, 0x0, 0x4, @remote={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xbb}}, 0x80) r2 = syz_init_net_socket$nfc_llcp(0x27, 0x1, 0x1) setsockopt$nfc_llcp_NFC_LLCP_MIUX(r2, 0x118, 0x15, &(0x7f0000000000), 0x4) r3 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/cuse\x00', 0x103002, 0x0) futimesat(r3, &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)={{0x0, 0x7530}}) r4 = syz_open_dev$vcsa(&(0x7f00000001c0)='/dev/vcsa#\x00', 0x2, 0x0) sendto$inet6(r4, &(0x7f0000000bc0), 0x0, 0x20000000, &(0x7f0000000c40)={0xa, 0x4e20, 0x0, @dev={0xfe, 0x80, [], 0x19}, 0x1f}, 0x1c) accept$alg(r0, 0x0, 0x0) sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f0000000000)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x8}, 0xb4fcd35419244434, &(0x7f00004ca000)={&(0x7f0000000300)=ANY=[], 0x1a1}, 0x1}, 0x0) syz_fuseblk_mount(&(0x7f0000001380)='./file0\x00', &(0x7f00000013c0)='./file0\x00', 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0xb21, 0x0) socket(0x1e, 0x3, 0x0) socket(0x1e, 0x0, 0x0) ptrace$PTRACE_SECCOMP_GET_FILTER(0x420c, 0x0, 0x0, &(0x7f0000000380)=""/113) sched_yield() ioctl$TUNGETIFF(r4, 0x800454d2, &(0x7f0000000140)) ioctl$KIOCSOUND(r4, 0x4b2f, 0xfffffffffffffb74) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x20, 0x9b}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000447000)='./file0\x00', &(0x7f00000e1000)='msdos\x00', 0x0, &(0x7f000097bfff)) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000580)='./cgroup/syz0\x00', 0x1ff) [ 318.652703] dump_stack+0x194/0x24d [ 318.656329] ? arch_local_irq_restore+0x53/0x53 [ 318.661003] should_fail+0x8c0/0xa40 [ 318.664717] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 318.669812] ? find_next_zero_bit+0xe3/0x110 [ 318.674222] ? trace_hardirqs_off+0x10/0x10 [ 318.678545] ? __lock_is_held+0xb6/0x140 [ 318.682609] ? find_held_lock+0x35/0x1d0 [ 318.686669] ? __lock_is_held+0xb6/0x140 [ 318.690734] ? check_same_owner+0x320/0x320 [ 318.695057] ? rcu_note_context_switch+0x710/0x710 [ 318.699986] ? rcu_note_context_switch+0x710/0x710 [ 318.704925] should_failslab+0xec/0x120 [ 318.708895] __kmalloc+0x63/0x760 [ 318.712348] ? lockdep_init_map+0x9/0x10 [ 318.716406] ? debug_mutex_init+0x2d/0x60 [ 318.720552] ? __list_lru_init+0xcf/0x750 [ 318.724695] __list_lru_init+0xcf/0x750 [ 318.728667] ? memcg_destroy_list_lru_node.isra.7+0x110/0x110 [ 318.734545] ? trace_hardirqs_on_caller+0x421/0x5c0 [ 318.739560] ? __lockdep_init_map+0xe4/0x650 [ 318.743964] ? lockdep_init_map+0x9/0x10 [ 318.748022] sget_userns+0x691/0xe40 2018/03/31 09:15:25 executing program 6: perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f000031f000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) prctl$void(0x0) getpid() r0 = syz_open_dev$vcsn(&(0x7f0000000040)='/dev/vcs#\x00', 0x0, 0x20000) ioctl$GIO_CMAP(r0, 0x4b70, &(0x7f0000000080)) r1 = socket$alg(0x26, 0x5, 0x0) ioctl$sock_SIOCGIFBR(0xffffffffffffffff, 0x8940, &(0x7f0000000040)=@get={0x1, &(0x7f0000000400)=""/242, 0x100000000}) bind$alg(r1, &(0x7f0000000080)={0x26, 'aead\x00', 0x0, 0x0, 'generic-gcm-aesni\x00'}, 0x58) syz_open_dev$sndmidi(&(0x7f0000000100)='/dev/snd/midiC#D#\x00', 0xfd, 0x0) bind(0xffffffffffffffff, &(0x7f0000000140)=@llc={0x1a, 0x33a, 0x7, 0x80, 0x0, 0x4, @remote={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xbb}}, 0x80) r2 = syz_init_net_socket$nfc_llcp(0x27, 0x1, 0x1) setsockopt$nfc_llcp_NFC_LLCP_MIUX(r2, 0x118, 0x15, &(0x7f0000000000), 0x4) r3 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/cuse\x00', 0x103002, 0x0) futimesat(r3, &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)={{0x0, 0x7530}}) r4 = syz_open_dev$vcsa(&(0x7f00000001c0)='/dev/vcsa#\x00', 0x2, 0x0) sendto$inet6(r4, &(0x7f0000000bc0), 0x0, 0x20000000, &(0x7f0000000c40)={0xa, 0x4e20, 0x0, @dev={0xfe, 0x80, [], 0x19}, 0x1f}, 0x1c) accept$alg(r0, 0x0, 0x0) sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f0000000000)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x8}, 0xb4fcd35419244434, &(0x7f00004ca000)={&(0x7f0000000300)=ANY=[], 0x1a1}, 0x1}, 0x0) syz_fuseblk_mount(&(0x7f0000001380)='./file0\x00', &(0x7f00000013c0)='./file0\x00', 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0xb21, 0x0) socket(0x1e, 0x3, 0x0) socket(0x1e, 0x0, 0x0) ptrace$PTRACE_SECCOMP_GET_FILTER(0x420c, 0x0, 0x0, &(0x7f0000000380)=""/113) sched_yield() ioctl$TUNGETIFF(r4, 0x800454d2, &(0x7f0000000140)) ioctl$KIOCSOUND(r4, 0x4b2f, 0xfffffffffffffb74) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x20, 0x9b}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000447000)='./file0\x00', &(0x7f00000e1000)='msdos\x00', 0x0, &(0x7f000097bfff)) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000580)='./cgroup/syz0\x00', 0x1ff) [ 318.751724] ? kill_litter_super+0x90/0x90 [ 318.755952] ? ns_test_super+0x50/0x50 [ 318.757218] binder: 31194:31198 ioctl c0306201 20000340 returned -22 [ 318.759831] ? destroy_unused_super.part.6+0xd0/0xd0 [ 318.759842] ? do_raw_spin_trylock+0x190/0x190 [ 318.759858] ? kobject_put+0x6b/0x250 [ 318.759873] ? blkdev_get+0x3a1/0xb00 [ 318.759888] ? cap_capable+0x1b5/0x230 [ 318.759897] ? __blkdev_get+0x13b0/0x13b0 [ 318.759914] ? security_capable+0x8e/0xc0 [ 318.759924] ? kill_litter_super+0x90/0x90 [ 318.759935] ? ns_capable_common+0xcf/0x160 [ 318.795344] binder: 31194:31210 unknown command 26 [ 318.795730] ? ns_test_super+0x50/0x50 [ 318.802531] binder: 31194:31210 ioctl c0306201 20000340 returned -22 [ 318.804240] ? kill_litter_super+0x90/0x90 [ 318.804249] sget+0xd2/0x120 [ 318.804263] mount_bdev+0x109/0x370 [ 318.804272] ? msdos_mount+0x40/0x40 [ 318.804285] msdos_mount+0x34/0x40 [ 318.804296] mount_fs+0x66/0x2d0 [ 318.804312] vfs_kern_mount.part.26+0xc6/0x4a0 [ 318.804324] ? may_umount+0xa0/0xa0 [ 318.804335] ? _raw_read_unlock+0x22/0x30 2018/03/31 09:15:25 executing program 3: r0 = syz_open_dev$random(&(0x7f00000001c0)='/dev/random\x00', 0x0, 0x800) r1 = syz_open_dev$loop(&(0x7f0000000480)='/dev/loop#\x00', 0x0, 0x101301) ioctl$LOOP_SET_STATUS(r1, 0xc0481273, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "3900ea631d00000000020000010000009f00000023f7b7d65f90b0e6330ee739b319d8f6aa6bd58d1443474482e85040fb4947ebb55bd19f335b5bffff0001f3", "cfa430745a540dc1c149b7b81579f6a41c51f7d51933223e82ab867dac761faf"}) write(0xffffffffffffffff, &(0x7f00000001c0), 0x0) setsockopt$inet_sctp6_SCTP_RECVNXTINFO(0xffffffffffffffff, 0x84, 0x21, &(0x7f00000003c0)=0x200, 0x4) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f00000000c0)=0x0) getsockopt$netrom_NETROM_T4(0xffffffffffffffff, 0x103, 0x6, &(0x7f0000000300)=0x8, &(0x7f0000000340)=0x4) r3 = getpid() sched_setparam(r3, &(0x7f0000000400)) syz_open_dev$loop(&(0x7f0000ca9ff5)='/dev/loop#\x00', 0x0, 0x82) r4 = memfd_create(&(0x7f0000614000)="74086e750000000000000000008c00", 0x0) pwritev(r4, &(0x7f0000f50f90)=[{&(0x7f0000000040)="aa", 0x1}], 0x1, 0x0) fcntl$getownex(r1, 0x10, &(0x7f0000000240)={0x0, 0x0}) r6 = syz_open_procfs(r5, &(0x7f0000000280)='stat\x00') epoll_ctl$EPOLL_CTL_MOD(r4, 0x3, r0, &(0x7f00000002c0)={0x20000010}) accept4$inet6(r4, &(0x7f0000000100)={0x0, 0x0, 0x0, @mcast1}, &(0x7f0000000140)=0x1c, 0x7fd) getsockopt$inet_IP_IPSEC_POLICY(r4, 0x0, 0x10, &(0x7f0000000580)={{{@in6=@local, @in6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@loopback}, 0x0, @in=@local}}, &(0x7f0000000380)=0x19) getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f00000007c0)={0x0, 0x0, 0x0}, &(0x7f0000000540)=0xc) fchown(r4, r7, r8) r9 = syz_open_dev$binder(&(0x7f0000000100)='/dev/binder#\x00', 0xffffffffffffffff, 0x806) ioctl$BINDER_SET_CONTEXT_MGR(r6, 0x40046207, 0x0) mmap$binder(&(0x7f000000c000/0x2000)=nil, 0x2000, 0x0, 0x12, r9, 0x0) ioctl$BINDER_WRITE_READ(r9, 0xc0306201, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000), 0x0, 0x0, &(0x7f0000011f9d)}) getsockopt$inet_sctp6_SCTP_AUTO_ASCONF(0xffffffffffffffff, 0x84, 0x1e, &(0x7f0000000140), &(0x7f0000000180)=0x4) ioctl$BINDER_WRITE_READ(r9, 0xc0306201, &(0x7f0000000340)={0x8, 0x0, &(0x7f0000000440)=ANY=[@ANYRES64=r1], 0x0, 0x0, &(0x7f0000000240)}) write(0xffffffffffffffff, &(0x7f0000000300)="8be25f5790f664f32509e40d6f879d5add7e2d359c9a19afb750a2d25352875d187d4118c99a2d5c6db433c277cc7d345b87a34f1b417033d367cb0cfd6a25633f77aafb17e99c33cb65352c901ae75176f07bb0a4bb5ebff3d87e", 0x5b) r10 = ioctl$LOOP_CTL_GET_FREE(r6, 0x4c82) ioctl$LOOP_CTL_REMOVE(r6, 0x4c81, r10) openat$cgroup(0xffffffffffffff9c, &(0x7f0000000000)='syz0\x00', 0x200002, 0x0) sched_setaffinity(r2, 0x8, &(0x7f0000000200)=0x7) [ 318.804347] ? __get_fs_type+0x8a/0xc0 [ 318.857122] do_mount+0xea4/0x2bb0 [ 318.860658] ? copy_mount_string+0x40/0x40 [ 318.864908] ? trace_hardirqs_on_caller+0x421/0x5c0 [ 318.869927] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 318.874684] ? retint_kernel+0x10/0x10 [ 318.878573] ? copy_mount_options+0x18b/0x2e0 [ 318.883061] ? copy_mount_options+0x193/0x2e0 [ 318.887550] ? copy_mount_options+0x1f7/0x2e0 [ 318.892039] SyS_mount+0xab/0x120 [ 318.895484] ? copy_mnt_ns+0xb30/0xb30 [ 318.899363] do_syscall_64+0x281/0x940 2018/03/31 09:15:26 executing program 6: perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f000031f000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) prctl$void(0x0) getpid() r0 = syz_open_dev$vcsn(&(0x7f0000000040)='/dev/vcs#\x00', 0x0, 0x20000) ioctl$GIO_CMAP(r0, 0x4b70, &(0x7f0000000080)) r1 = socket$alg(0x26, 0x5, 0x0) ioctl$sock_SIOCGIFBR(0xffffffffffffffff, 0x8940, &(0x7f0000000040)=@get={0x1, &(0x7f0000000400)=""/242, 0x100000000}) bind$alg(r1, &(0x7f0000000080)={0x26, 'aead\x00', 0x0, 0x0, 'generic-gcm-aesni\x00'}, 0x58) syz_open_dev$sndmidi(&(0x7f0000000100)='/dev/snd/midiC#D#\x00', 0xfd, 0x0) bind(0xffffffffffffffff, &(0x7f0000000140)=@llc={0x1a, 0x33a, 0x7, 0x80, 0x0, 0x4, @remote={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xbb}}, 0x80) r2 = syz_init_net_socket$nfc_llcp(0x27, 0x1, 0x1) setsockopt$nfc_llcp_NFC_LLCP_MIUX(r2, 0x118, 0x15, &(0x7f0000000000), 0x4) r3 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/cuse\x00', 0x103002, 0x0) futimesat(r3, &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)={{0x0, 0x7530}}) r4 = syz_open_dev$vcsa(&(0x7f00000001c0)='/dev/vcsa#\x00', 0x2, 0x0) sendto$inet6(r4, &(0x7f0000000bc0), 0x0, 0x20000000, &(0x7f0000000c40)={0xa, 0x4e20, 0x0, @dev={0xfe, 0x80, [], 0x19}, 0x1f}, 0x1c) accept$alg(r0, 0x0, 0x0) sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f0000000000)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x8}, 0xb4fcd35419244434, &(0x7f00004ca000)={&(0x7f0000000300)=ANY=[], 0x1a1}, 0x1}, 0x0) syz_fuseblk_mount(&(0x7f0000001380)='./file0\x00', &(0x7f00000013c0)='./file0\x00', 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0xb21, 0x0) socket(0x1e, 0x3, 0x0) socket(0x1e, 0x0, 0x0) ptrace$PTRACE_SECCOMP_GET_FILTER(0x420c, 0x0, 0x0, &(0x7f0000000380)=""/113) sched_yield() ioctl$TUNGETIFF(r4, 0x800454d2, &(0x7f0000000140)) ioctl$KIOCSOUND(r4, 0x4b2f, 0xfffffffffffffb74) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x20, 0x9b}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000447000)='./file0\x00', &(0x7f00000e1000)='msdos\x00', 0x0, &(0x7f000097bfff)) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000580)='./cgroup/syz0\x00', 0x1ff) [ 318.903244] ? vmalloc_sync_all+0x30/0x30 [ 318.907384] ? _raw_spin_unlock_irq+0x27/0x70 [ 318.911873] ? finish_task_switch+0x1c1/0x7e0 [ 318.916362] ? syscall_return_slowpath+0x550/0x550 [ 318.921288] ? syscall_return_slowpath+0x2ac/0x550 [ 318.926215] ? prepare_exit_to_usermode+0x350/0x350 [ 318.931225] ? entry_SYSCALL_64_after_hwframe+0x52/0xb7 [ 318.936587] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 318.941429] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 318.946608] RIP: 0033:0x454e79 [ 318.949785] RSP: 002b:00007f37fba8ec68 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 318.957485] RAX: ffffffffffffffda RBX: 00007f37fba8f6d4 RCX: 0000000000454e79 [ 318.964748] RDX: 00000000200e1000 RSI: 0000000020447000 RDI: 0000000020000000 [ 318.972010] RBP: 000000000072bea0 R08: 000000002097bfff R09: 0000000000000000 [ 318.979270] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000019 [ 318.986528] R13: 00000000000003fa R14: 00000000006f8010 R15: 000000000000000b [ 318.996784] FAT-fs (loop199): unable to read boot sector 2018/03/31 09:15:26 executing program 6: perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f000031f000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) prctl$void(0x0) getpid() r0 = syz_open_dev$vcsn(&(0x7f0000000040)='/dev/vcs#\x00', 0x0, 0x20000) ioctl$GIO_CMAP(r0, 0x4b70, &(0x7f0000000080)) r1 = socket$alg(0x26, 0x5, 0x0) ioctl$sock_SIOCGIFBR(0xffffffffffffffff, 0x8940, &(0x7f0000000040)=@get={0x1, &(0x7f0000000400)=""/242, 0x100000000}) bind$alg(r1, &(0x7f0000000080)={0x26, 'aead\x00', 0x0, 0x0, 'generic-gcm-aesni\x00'}, 0x58) syz_open_dev$sndmidi(&(0x7f0000000100)='/dev/snd/midiC#D#\x00', 0xfd, 0x0) bind(0xffffffffffffffff, &(0x7f0000000140)=@llc={0x1a, 0x33a, 0x7, 0x80, 0x0, 0x4, @remote={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xbb}}, 0x80) r2 = syz_init_net_socket$nfc_llcp(0x27, 0x1, 0x1) setsockopt$nfc_llcp_NFC_LLCP_MIUX(r2, 0x118, 0x15, &(0x7f0000000000), 0x4) r3 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/cuse\x00', 0x103002, 0x0) futimesat(r3, &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)={{0x0, 0x7530}}) r4 = syz_open_dev$vcsa(&(0x7f00000001c0)='/dev/vcsa#\x00', 0x2, 0x0) sendto$inet6(r4, &(0x7f0000000bc0), 0x0, 0x20000000, &(0x7f0000000c40)={0xa, 0x4e20, 0x0, @dev={0xfe, 0x80, [], 0x19}, 0x1f}, 0x1c) accept$alg(r0, 0x0, 0x0) sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f0000000000)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x8}, 0xb4fcd35419244434, &(0x7f00004ca000)={&(0x7f0000000300)=ANY=[], 0x1a1}, 0x1}, 0x0) syz_fuseblk_mount(&(0x7f0000001380)='./file0\x00', &(0x7f00000013c0)='./file0\x00', 0xf000, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0, 0x0) socket(0x1e, 0x3, 0x0) socket(0x1e, 0x0, 0x0) ptrace$PTRACE_SECCOMP_GET_FILTER(0x420c, 0x0, 0x0, &(0x7f0000000380)=""/113) sched_yield() ioctl$TUNGETIFF(r4, 0x800454d2, &(0x7f0000000140)) ioctl$KIOCSOUND(r4, 0x4b2f, 0xfffffffffffffb74) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x20, 0x9b}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000447000)='./file0\x00', &(0x7f00000e1000)='msdos\x00', 0x0, &(0x7f000097bfff)) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000580)='./cgroup/syz0\x00', 0x1ff) [ 319.008086] FAT-fs (loop199): unable to read boot sector [ 319.009868] binder: 31213:31217 unknown command 20 [ 319.026220] binder: 31213:31217 ioctl c0306201 20000340 returned -22 [ 319.033712] FAT-fs (loop199): unable to read boot sector 2018/03/31 09:15:26 executing program 5: perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f000031f000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) prctl$void(0x0) getpid() r0 = syz_open_dev$vcsn(&(0x7f0000000040)='/dev/vcs#\x00', 0x0, 0x20000) ioctl$GIO_CMAP(r0, 0x4b70, &(0x7f0000000080)) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000080)={0x26, 'aead\x00', 0x0, 0x0, 'generic-gcm-aesni\x00'}, 0x58) syz_open_dev$sndmidi(&(0x7f0000000100)='/dev/snd/midiC#D#\x00', 0xfd, 0x0) bind(0xffffffffffffffff, &(0x7f0000000140)=@llc={0x1a, 0x33a, 0x7, 0x80, 0x5, 0x4, @remote={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xbb}}, 0x80) r2 = syz_init_net_socket$nfc_llcp(0x27, 0x1, 0x1) setsockopt$nfc_llcp_NFC_LLCP_MIUX(r2, 0x118, 0x15, &(0x7f0000000000), 0x4) r3 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/cuse\x00', 0x103002, 0x0) futimesat(r3, &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)={{0x0, 0x7530}}) r4 = syz_open_dev$vcsa(&(0x7f00000001c0)='/dev/vcsa#\x00', 0x2, 0x4020ff) sendto$inet6(0xffffffffffffffff, &(0x7f0000000bc0)="36251e313e0743fc195a1a198a14434e8a0a00b3f452a3b5644e336ec712a16310c9aecc4e3097bc666a8882128a73c368ce731e9fbf3fe18fa52d", 0x3b, 0x20000000, &(0x7f00000002c0)={0xa, 0x4e20, 0x6, @dev={0xfe, 0x80, [], 0x19}, 0x400000000001f}, 0x0) accept$alg(r0, 0x0, 0x0) sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f0000000000)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x8}, 0xb4fcd35419244434, &(0x7f00004ca000)={&(0x7f0000000300)=ANY=[], 0x1a1}, 0x1}, 0x0) rt_sigprocmask(0x0, &(0x7f0000000240)={0x3ff}, &(0x7f0000000280), 0x8) syz_fuseblk_mount(&(0x7f0000001380)='./file0\x00', &(0x7f00000013c0)='./file0\x00', 0xeffe, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xb21, 0x0) socket(0x1e, 0x3, 0x0) socket(0x1e, 0x0, 0x0) ptrace$PTRACE_SECCOMP_GET_FILTER(0x420c, 0x0, 0x0, &(0x7f0000000380)=""/113) sched_yield() ioctl$TUNGETIFF(r4, 0x800454d2, &(0x7f0000000140)) ioctl$KIOCSOUND(r4, 0x4b2f, 0xfffffffffffffb74) ioctl(r4, 0x5, &(0x7f0000001400)="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") perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x20, 0x9b}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000447000)='./file0\x00', &(0x7f00000e1000)='msdos\x00', 0x0, &(0x7f000097bfff)) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000580)='./cgroup/syz0\x00', 0x1ff) syz_open_dev$audion(&(0x7f0000000200)='/dev/audio#\x00', 0x7c2, 0x0) 2018/03/31 09:15:26 executing program 7 (fault-call:24 fault-nth:12): perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f000031f000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getpid() r0 = syz_open_dev$vcsn(&(0x7f0000000040)='/dev/vcs#\x00', 0x0, 0x20000) ioctl$GIO_CMAP(r0, 0x4b70, &(0x7f0000000080)) r1 = socket$alg(0x26, 0x5, 0x0) ioctl$sock_SIOCGIFBR(r1, 0x8940, &(0x7f0000000040)=@get={0x1, &(0x7f0000000400)=""/242, 0x100000000}) bind$alg(r1, &(0x7f0000000080)={0x26, 'aead\x00', 0x0, 0x0, 'generic-gcm-aesni\x00'}, 0x58) syz_open_dev$sndmidi(&(0x7f0000000100)='/dev/snd/midiC#D#\x00', 0xfd, 0x0) bind(0xffffffffffffffff, &(0x7f0000000140)=@llc={0x1a, 0x33a, 0x7, 0x80, 0x5, 0x4, @remote={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xbb}}, 0x80) r2 = syz_init_net_socket$nfc_llcp(0x27, 0x1, 0x1) setsockopt$nfc_llcp_NFC_LLCP_MIUX(r2, 0x118, 0x15, &(0x7f0000000000), 0x4) r3 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/cuse\x00', 0x103002, 0x0) futimesat(r3, &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)={{0x0, 0x7530}}) r4 = syz_open_dev$vcsa(&(0x7f00000001c0)='/dev/vcsa#\x00', 0x2, 0x4020ff) sendto$inet6(r4, &(0x7f0000000bc0)="36251e313e0743fc195a1a198a14434e8a0a00b3f452a3b5644e336ec712a16310c9aecc4e3097bc666a8882128a73c368ce731e9fbf3fe18fa52d00", 0x3c, 0x20000000, &(0x7f0000000c40)={0xa, 0x0, 0x6, @dev={0xfe, 0x80, [], 0x19}, 0x1f}, 0x1c) accept$alg(r0, 0x0, 0x0) sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f0000000000)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x8}, 0xb4fcd35419244434, &(0x7f00004ca000)={&(0x7f0000000300)=ANY=[], 0x1a1}, 0x1}, 0x0) syz_fuseblk_mount(&(0x7f0000001380)='./file0\x00', &(0x7f00000013c0)='./file0\x00', 0xf000, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0xb21, 0x0) socket(0x1e, 0x3, 0x0) socket(0x1e, 0x0, 0x0) ptrace$PTRACE_SECCOMP_GET_FILTER(0x420c, 0x0, 0x0, &(0x7f0000000380)=""/113) sched_yield() ioctl$TUNGETIFF(r4, 0x800454d2, &(0x7f0000000140)) ioctl$KIOCSOUND(r4, 0x4b2f, 0xfffffffffffffb74) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000447000)='./file0\x00', &(0x7f00000e1000)='msdos\x00', 0x0, &(0x7f000097bfff)) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000580)='./cgroup/syz0\x00', 0x1ff) syz_open_dev$audion(&(0x7f0000000280)='/dev/audio#\x00', 0x7be, 0x0) 2018/03/31 09:15:26 executing program 4: perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f000031f000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) prctl$void(0x0) getpid() ioctl$GIO_CMAP(0xffffffffffffffff, 0x4b70, &(0x7f0000000080)) r0 = socket$alg(0x26, 0x5, 0x0) ioctl$sock_SIOCGIFBR(0xffffffffffffffff, 0x8940, &(0x7f0000000040)=@get={0x1, &(0x7f0000000400)=""/242, 0x100000000}) bind$alg(r0, &(0x7f0000000080)={0x26, 'aead\x00', 0x0, 0x0, 'generic-gcm-aesni\x00'}, 0x58) r1 = syz_open_dev$sndmidi(&(0x7f0000000100)='/dev/snd/midiC#D#\x00', 0xfd, 0x0) bind(0xffffffffffffffff, &(0x7f0000000140)=@llc={0x1a, 0x33a, 0x7, 0x80, 0x0, 0x4, @remote={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xbb}}, 0x80) syz_init_net_socket$nfc_llcp(0x27, 0x1, 0x1) setsockopt$nfc_llcp_NFC_LLCP_MIUX(r1, 0x118, 0x15, &(0x7f0000000200)=0x4, 0xfffffffffffffec9) r2 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000240)='/dev/cuse\x00', 0x8000, 0x0) futimesat(r2, &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)={{0x0, 0x7530}}) r3 = syz_open_dev$vcsa(&(0x7f00000001c0)='/dev/vcsa#\x00', 0x2, 0x0) sendto$inet6(r3, &(0x7f0000000bc0), 0x0, 0x20000000, &(0x7f0000000c40)={0xa, 0x4e20, 0x0, @dev={0xfe, 0x80, [], 0x19}, 0x1f}, 0x1c) accept$alg(0xffffffffffffffff, 0x0, 0x0) sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f0000000000)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x8}, 0xb4fcd35419244434, &(0x7f00004ca000)={&(0x7f0000000300)=ANY=[], 0x1a1}, 0x1}, 0x0) syz_fuseblk_mount(&(0x7f0000001380)='./file0\x00', &(0x7f00000013c0)='./file0\x00', 0xf000, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0xb21, 0x0) socket(0x1e, 0x3, 0x0) socket(0x1e, 0x0, 0x0) ptrace$PTRACE_SECCOMP_GET_FILTER(0x420c, 0x0, 0x0, &(0x7f0000000380)=""/113) sched_yield() ioctl$TUNGETIFF(r3, 0x800454d2, &(0x7f0000000140)) ioctl$KIOCSOUND(r3, 0x4b2f, 0xfffffffffffffb74) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x20, 0x9b}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r4 = semget(0x2, 0x1, 0x710) semctl$GETNCNT(r4, 0x1, 0xe, &(0x7f00000005c0)=""/246) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000447000)='./file0\x00', &(0x7f00000e1000)='msdos\x00', 0x0, &(0x7f000097bfff)) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000580)='./cgroup/syz0\x00', 0x1ff) 2018/03/31 09:15:26 executing program 6: perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f000031f000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) prctl$void(0x0) getpid() r0 = syz_open_dev$vcsn(&(0x7f0000000040)='/dev/vcs#\x00', 0x0, 0x20000) ioctl$GIO_CMAP(r0, 0x4b70, &(0x7f0000000080)) r1 = socket$alg(0x26, 0x5, 0x0) ioctl$sock_SIOCGIFBR(0xffffffffffffffff, 0x8940, &(0x7f0000000040)=@get={0x1, &(0x7f0000000400)=""/242, 0x100000000}) bind$alg(r1, &(0x7f0000000080)={0x26, 'aead\x00', 0x0, 0x0, 'generic-gcm-aesni\x00'}, 0x58) syz_open_dev$sndmidi(&(0x7f0000000100)='/dev/snd/midiC#D#\x00', 0xfd, 0x0) bind(0xffffffffffffffff, &(0x7f0000000140)=@llc={0x1a, 0x33a, 0x7, 0x80, 0x0, 0x4, @remote={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xbb}}, 0x80) r2 = syz_init_net_socket$nfc_llcp(0x27, 0x1, 0x1) setsockopt$nfc_llcp_NFC_LLCP_MIUX(r2, 0x118, 0x15, &(0x7f0000000000), 0x4) r3 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/cuse\x00', 0x103002, 0x0) futimesat(r3, &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)={{0x0, 0x7530}}) r4 = syz_open_dev$vcsa(&(0x7f00000001c0)='/dev/vcsa#\x00', 0x2, 0x0) sendto$inet6(r4, &(0x7f0000000bc0), 0x0, 0x20000000, &(0x7f0000000c40)={0xa, 0x4e20, 0x0, @dev={0xfe, 0x80, [], 0x19}, 0x1f}, 0x1c) accept$alg(r0, 0x0, 0x0) sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f0000000000)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x8}, 0xb4fcd35419244434, &(0x7f00004ca000)={&(0x7f0000000300)=ANY=[], 0x1a1}, 0x1}, 0x0) syz_fuseblk_mount(&(0x7f0000001380)='./file0\x00', &(0x7f00000013c0)='./file0\x00', 0xf000, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0, 0x0) socket(0x1e, 0x3, 0x0) socket(0x1e, 0x0, 0x0) ptrace$PTRACE_SECCOMP_GET_FILTER(0x420c, 0x0, 0x0, &(0x7f0000000380)=""/113) sched_yield() ioctl$TUNGETIFF(r4, 0x800454d2, &(0x7f0000000140)) ioctl$KIOCSOUND(r4, 0x4b2f, 0xfffffffffffffb74) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x20, 0x9b}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000447000)='./file0\x00', &(0x7f00000e1000)='msdos\x00', 0x0, &(0x7f000097bfff)) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000580)='./cgroup/syz0\x00', 0x1ff) [ 319.054139] FAT-fs (loop199): unable to read boot sector [ 319.066848] FAT-fs (loop199): unable to read boot sector [ 319.076685] binder: 31213:31221 unknown command 26 [ 319.088084] binder: 31213:31221 ioctl c0306201 20000340 returned -22 2018/03/31 09:15:26 executing program 1: perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f000031f000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) prctl$void(0x0) getpid() syz_open_dev$vcsn(&(0x7f0000000040)='/dev/vcs#\x00', 0x400, 0x20000) r0 = socket$alg(0x26, 0x5, 0x0) ioctl$sock_SIOCGIFBR(r0, 0x8940, &(0x7f0000000040)=@get={0x1, &(0x7f0000000400)=""/242, 0x100000000}) bind$alg(r0, &(0x7f0000000080)={0x26, 'aead\x00', 0x0, 0x0, 'generic-gcm-aesni\x00'}, 0x58) r1 = syz_open_dev$sndmidi(&(0x7f0000000100)='/dev/snd/midiC#D#\x00', 0xfd, 0x0) bind(r1, &(0x7f0000000140)=@llc={0x1a, 0x33a, 0x7, 0x80, 0x0, 0x4, @remote={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xbb}}, 0x80) r2 = syz_init_net_socket$nfc_llcp(0x27, 0x1, 0x1) setsockopt$nfc_llcp_NFC_LLCP_MIUX(r2, 0x118, 0x15, &(0x7f0000000000), 0x4) r3 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/cuse\x00', 0x103002, 0x0) futimesat(r3, &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)={{0x0, 0x7530}}) r4 = syz_open_dev$vcsa(&(0x7f00000001c0)='/dev/vcsa#\x00', 0x2, 0x4020ff) sendto$inet6(r4, &(0x7f0000000bc0), 0x0, 0x20000000, &(0x7f0000000c40)={0xa, 0x4e20, 0x6, @dev={0xfe, 0x80, [], 0x19}, 0x1f}, 0x1c) sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f0000000000)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x8}, 0xb4fcd35419244434, &(0x7f00004ca000)={&(0x7f0000000300)=ANY=[], 0x1a1}, 0x1}, 0x0) syz_fuseblk_mount(&(0x7f0000001380)='./file0\x00', &(0x7f00000013c0)='./file0\x00', 0xf000, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0xb21, 0x0) socket(0x1e, 0x3, 0x0) ptrace$PTRACE_SECCOMP_GET_FILTER(0x420c, 0x0, 0x0, &(0x7f0000000380)=""/113) sched_yield() ioctl$TUNGETIFF(r4, 0x800454d2, &(0x7f0000000140)) ioctl$KIOCSOUND(r4, 0x4b2f, 0xfffffffffffffb74) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x20, 0x9b}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000447000)='./file0\x00', &(0x7f00000e1000)='msdos\x00', 0x0, &(0x7f000097bfff)) setsockopt$inet6_MCAST_MSFILTER(r1, 0x29, 0x30, &(0x7f00000005c0)={0x1, {{0xa, 0x4e24, 0x5, @local={0xfe, 0x80, [], 0xaa}, 0x5}}, 0x1, 0x9, [{{0xa, 0x4e20, 0x401, @local={0xfe, 0x80, [], 0xaa}, 0x957}}, {{0xa, 0x4e23, 0xffffffffffff0000, @local={0xfe, 0x80, [], 0xaa}, 0x8}}, {{0xa, 0x4e20, 0xfffffffffffff800, @local={0xfe, 0x80, [], 0xaa}, 0x7}}, {{0xa, 0x4e20, 0x5, @remote={0xfe, 0x80, [], 0xbb}, 0x7}}, {{0xa, 0x4e23, 0x8, @mcast1={0xff, 0x1, [], 0x1}, 0x8}}, {{0xa, 0x4e23, 0x2, @dev={0xfe, 0x80, [], 0xc}, 0x6}}, {{0xa, 0x4e20, 0x0, @mcast2={0xff, 0x2, [], 0x1}, 0x7fff}}, {{0xa, 0x4e20, 0xff, @mcast1={0xff, 0x1, [], 0x1}, 0x401}}, {{0xa, 0x4e21, 0x10001, @remote={0xfe, 0x80, [], 0xbb}, 0x3}}]}, 0x510) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000300)="000000000000b02d2d8f466bd9054c13277c750f5c6e4b8364a93779d25e75dd1f4a40c720b0d7bbc461d11c3b45f146c4621b3d39536b9c8e4eab509f119846b30b2c84714c44b4e89c7d380872b6b67bb6f8c37c4b33a5", 0x1ff) getsockopt$inet_int(r1, 0x0, 0x7, &(0x7f0000000200), &(0x7f0000000240)=0x4) bind$inet(r3, &(0x7f00000002c0)={0x2, 0x4e23}, 0x10) syz_open_dev$audion(&(0x7f0000000280)='/dev/audio#\x00', 0x7be, 0x0) fcntl$getown(0xffffffffffffffff, 0x9) [ 319.169582] FAT-fs (loop199): unable to read boot sector [ 319.187732] FAULT_INJECTION: forcing a failure. [ 319.187732] name failslab, interval 1, probability 0, space 0, times 0 [ 319.199085] CPU: 0 PID: 31228 Comm: syz-executor7 Not tainted 4.16.0-rc7+ #8 [ 319.206265] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 319.215613] Call Trace: [ 319.218199] dump_stack+0x194/0x24d [ 319.221826] ? arch_local_irq_restore+0x53/0x53 [ 319.226505] should_fail+0x8c0/0xa40 [ 319.230220] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 319.235323] ? kasan_kmalloc+0xad/0xe0 [ 319.239207] ? kmem_cache_alloc_trace+0x136/0x740 [ 319.244041] ? __memcg_init_list_lru_node+0x169/0x270 [ 319.249225] ? sget_userns+0x691/0xe40 [ 319.253108] ? mount_fs+0x66/0x2d0 [ 319.256643] ? vfs_kern_mount.part.26+0xc6/0x4a0 [ 319.261390] ? do_mount+0xea4/0x2bb0 [ 319.265097] ? do_syscall_64+0x281/0x940 [ 319.269153] ? entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 319.274520] ? find_held_lock+0x35/0x1d0 [ 319.278582] ? __lock_is_held+0xb6/0x140 [ 319.282655] ? check_same_owner+0x320/0x320 [ 319.286977] ? rcu_note_context_switch+0x710/0x710 [ 319.291916] should_failslab+0xec/0x120 [ 319.295889] kmem_cache_alloc_trace+0x4b/0x740 [ 319.300465] ? __kmalloc_node+0x33/0x70 [ 319.304435] ? __kmalloc_node+0x33/0x70 [ 319.308403] ? rcu_read_lock_sched_held+0x108/0x120 [ 319.313425] __memcg_init_list_lru_node+0x169/0x270 [ 319.318442] ? list_lru_add+0x7c0/0x7c0 [ 319.322416] ? __kmalloc_node+0x47/0x70 [ 319.326396] __list_lru_init+0x544/0x750 [ 319.330460] ? memcg_destroy_list_lru_node.isra.7+0x110/0x110 [ 319.336341] ? trace_hardirqs_on_caller+0x421/0x5c0 [ 319.341363] ? __lockdep_init_map+0xe4/0x650 [ 319.345774] ? lockdep_init_map+0x9/0x10 [ 319.349835] sget_userns+0x691/0xe40 [ 319.353542] ? kill_litter_super+0x90/0x90 [ 319.357775] ? ns_test_super+0x50/0x50 [ 319.361661] ? destroy_unused_super.part.6+0xd0/0xd0 [ 319.366755] ? do_raw_spin_trylock+0x190/0x190 [ 319.371337] ? kobject_put+0x6b/0x250 [ 319.375145] ? blkdev_get+0x3a1/0xb00 [ 319.378951] ? cap_capable+0x1b5/0x230 [ 319.382831] ? __blkdev_get+0x13b0/0x13b0 [ 319.386985] ? security_capable+0x8e/0xc0 [ 319.391130] ? kill_litter_super+0x90/0x90 [ 319.395365] ? ns_capable_common+0xcf/0x160 [ 319.399687] ? ns_test_super+0x50/0x50 [ 319.403573] ? kill_litter_super+0x90/0x90 [ 319.407805] sget+0xd2/0x120 [ 319.410831] mount_bdev+0x109/0x370 [ 319.414455] ? msdos_mount+0x40/0x40 [ 319.418171] msdos_mount+0x34/0x40 [ 319.421708] mount_fs+0x66/0x2d0 [ 319.425078] vfs_kern_mount.part.26+0xc6/0x4a0 [ 319.429659] ? may_umount+0xa0/0xa0 [ 319.433288] ? _raw_read_unlock+0x22/0x30 [ 319.437436] ? __get_fs_type+0x8a/0xc0 [ 319.441325] do_mount+0xea4/0x2bb0 [ 319.444875] ? copy_mount_string+0x40/0x40 [ 319.449109] ? trace_hardirqs_on_caller+0x421/0x5c0 [ 319.454128] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 319.458888] ? retint_kernel+0x10/0x10 [ 319.462783] ? copy_mount_options+0x18b/0x2e0 [ 319.467273] ? copy_mount_options+0x193/0x2e0 [ 319.471767] ? copy_mount_options+0x1f7/0x2e0 [ 319.476266] SyS_mount+0xab/0x120 [ 319.479711] ? copy_mnt_ns+0xb30/0xb30 [ 319.483594] do_syscall_64+0x281/0x940 [ 319.487473] ? vmalloc_sync_all+0x30/0x30 [ 319.491612] ? _raw_spin_unlock_irq+0x27/0x70 [ 319.496102] ? finish_task_switch+0x1c1/0x7e0 [ 319.500592] ? syscall_return_slowpath+0x550/0x550 [ 319.505516] ? syscall_return_slowpath+0x2ac/0x550 [ 319.510440] ? prepare_exit_to_usermode+0x350/0x350 [ 319.515453] ? entry_SYSCALL_64_after_hwframe+0x52/0xb7 [ 319.520820] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 319.525667] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 319.530848] RIP: 0033:0x454e79 [ 319.534029] RSP: 002b:00007f37fba8ec68 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 319.541739] RAX: ffffffffffffffda RBX: 00007f37fba8f6d4 RCX: 0000000000454e79 [ 319.549005] RDX: 00000000200e1000 RSI: 0000000020447000 RDI: 0000000020000000 [ 319.556293] RBP: 000000000072bea0 R08: 000000002097bfff R09: 0000000000000000 [ 319.556302] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000019 2018/03/31 09:15:26 executing program 2: syz_open_dev$loop(&(0x7f00000003c0)='/dev/loop#\x00', 0x8, 0x0) r0 = syz_open_dev$sndseq(&(0x7f00000001c0)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r0, 0x4040534e, &(0x7f000019ffe9)={0xc1}) r1 = accept(0xffffffffffffffff, &(0x7f0000000080)=@can, &(0x7f0000000180)=0x80) ioctl$sock_ipx_SIOCAIPXPRISLT(r1, 0x89e1, &(0x7f0000000280)=0x3f) ioctl$sock_inet_SIOCRTMSG(r1, 0x890d, &(0x7f0000000200)={0x80, {0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x19}}, {0x2, 0x4e21, @local={0xac, 0x14, 0x14, 0xaa}}, {0x2, 0x4e23}, 0x0, 0x7, 0x1, 0x0, 0x9, 0x0, 0x0, 0x0, 0xfffffffffffffff7}) setsockopt$inet_sctp_SCTP_ENABLE_STREAM_RESET(r1, 0x84, 0x76, &(0x7f0000000300)={0x0, 0x1c9}, 0x8) r2 = syz_open_dev$sg(&(0x7f0000000700)='/dev/sg#\x00', 0xfffffffffffffff7, 0x800) clone(0x2000c100, &(0x7f0000000800)="97bb77038add5df9e9d4f9783b82c55fe59e5c0acdbcfc9bcf92ac0e1f1f3c1959c1d25dfabf3849336c7c85be174d7765b47e113632aea54b87e4d3f2c1db09e6aa4040b43d17308fb7e62e808067da2fff3cfd8e4c038c814bbfc6bc49d8ebc8671d8297e2d34dc61f2d194d2dbb8f59b4c853e0714d3d4bb29d1243fac01c86c8c4dd38daedab3c6ad73a72d3f6dd2684aa82e5285eb82452c9848b7beb8bc513ba8c8973cad0bd5926604846b7f5d0397b", &(0x7f00000008c0), &(0x7f0000000900), &(0x7f0000000940)="ed6c04412e782fe395f084741e3d9fe469aebde09acc8f8d8d84d1f00f5573b09acba487077ebb904cb1f3fed55f59d677ce24bbd2a7506df8e1e0d0fc709cb8c9f4ab2aeeeebc5ef879742c1f7628f1862c88b5b0da89acbf43ef12e4839405b6a3430d296fea06d2f3a8356c57ec991e") ioctl$SNDRV_SEQ_IOCTL_SUBSCRIBE_PORT(r0, 0x40505330, &(0x7f0000ec6fb0)={{}, {0x80}}) getsockopt$netrom_NETROM_T1(r1, 0x103, 0x1, &(0x7f0000000000), &(0x7f0000000380)=0x4) syz_open_dev$adsp(&(0x7f0000000600)='/dev/adsp#\x00', 0x100000000, 0x80000) rt_sigprocmask(0x3d738072cd0f41ac, &(0x7f0000000cc0)={0x7}, &(0x7f0000000d00), 0x8) clone(0x40000000, &(0x7f0000000500)="67cdd9994c47c31d325b069924a7064c157c2ec0b5b5dca2feeb7dabef3b7af0d02d559e293faa759f2b3cb12aea360c2d", &(0x7f0000000580), &(0x7f00000005c0), &(0x7f0000000a00)="29859fdda9a119e54a27f9ec76b4d63a16dc5bbdd38c2fda0e5f4d8f830cd987ec7d3ffc66cf3db8820968fd89a1fba8fe6352a29a27f3b000bcdf238f2c04b358fc831025180e0be313da41de6366c94a1a0f86aaffdf2c039111b55275c054e14819a827fe809225249a01944263a2aec15f64e752e35892b1b8e7ef1e0e9115") ioctl$SNDRV_SEQ_IOCTL_DELETE_PORT(r0, 0x40a85321, &(0x7f0000000b80)={{0x4, 0x8}, 'port0\x00', 0x80, 0x0, 0x10000, 0x6, 0x2, 0x80, 0x8, 0x0, 0x0, 0x3dec00}) getsockopt$inet_sctp_SCTP_SOCKOPT_PEELOFF(r2, 0x84, 0x66, &(0x7f0000000c40)={0x0, 0x6}, &(0x7f0000000c80)=0x8) clock_settime(0x7, &(0x7f0000000740)={0x77359400}) ioctl$SNDRV_SEQ_IOCTL_CLIENT_ID(r0, 0x80045301, &(0x7f0000000340)) r3 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer2\x00', 0x0, 0x0) openat$sequencer2(0xffffffffffffff9c, &(0x7f00000006c0)='/dev/sequencer2\x00', 0x222081, 0x0) ioctl$RNDADDENTROPY(0xffffffffffffffff, 0x40085203, &(0x7f0000000100)=ANY=[@ANYPTR=&(0x7f0000000680)=ANY=[@ANYPTR64=&(0x7f0000000640)=ANY=[@ANYPTR, @ANYPTR]]]) setsockopt$inet_sctp_SCTP_DEFAULT_SEND_PARAM(r3, 0x84, 0xa, &(0x7f0000000140)={0x5, 0x100000001, 0x0, 0x8, 0x0, 0x7, 0x401, 0x1f}, 0x20) [ 319.570817] R13: 00000000000003fa R14: 00000000006f8010 R15: 000000000000000c [ 319.578861] FAT-fs (loop199): unable to read boot sector [ 319.594406] FAT-fs (loop199): unable to read boot sector [ 319.606109] FAT-fs (loop199): unable to read boot sector [ 319.624201] FAT-fs (loop199): unable to read boot sector [ 319.631279] FAT-fs (loop199): unable to read boot sector [ 319.645495] FAT-fs (loop199): unable to read boot sector [ 319.664260] FAT-fs (loop199): unable to read boot sector 2018/03/31 09:15:27 executing program 5: perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f000031f000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) prctl$void(0x0) getpid() r0 = syz_open_dev$vcsn(&(0x7f0000000040)='/dev/vcs#\x00', 0x0, 0x20000) ioctl$GIO_CMAP(r0, 0x4b70, &(0x7f0000000080)) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000080)={0x26, 'aead\x00', 0x0, 0x0, 'generic-gcm-aesni\x00'}, 0x58) clock_gettime(0x0, &(0x7f00000002c0)={0x0, 0x0}) mq_timedreceive(r0, &(0x7f0000001400)=""/4096, 0x1000, 0xc7, &(0x7f0000000300)={r2, r3+10000000}) syz_open_dev$sndmidi(&(0x7f0000000100)='/dev/snd/midiC#D#\x00', 0xfd, 0x0) bind(0xffffffffffffffff, &(0x7f0000000140)=@llc={0x1a, 0x33a, 0x7, 0x80, 0x5, 0x4, @remote={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xbb}}, 0x80) r4 = syz_init_net_socket$nfc_llcp(0x27, 0x1, 0x1) setsockopt$nfc_llcp_NFC_LLCP_MIUX(r4, 0x118, 0x15, &(0x7f0000000000), 0x4) r5 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/cuse\x00', 0x103002, 0x0) futimesat(r5, &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)={{0x0, 0x7530}}) r6 = syz_open_dev$vcsa(&(0x7f00000001c0)='/dev/vcsa#\x00', 0x2, 0x4020ff) write$evdev(r5, &(0x7f0000000200)=[{{0x0, 0x7530}, 0x67, 0x5, 0x2}, {{0x77359400}, 0x89, 0x3, 0x5}, {{}, 0x8, 0x80000001, 0xfcb5}, {{}, 0x9, 0x81, 0x8}], 0x60) sendto$inet6(0xffffffffffffffff, &(0x7f0000000bc0)="36251e313e0743fc195a1a198a14434e8a0a00b3f452a3b5644e336ec712a16310c9aecc4e3097bc666a8882128a73c368ce731e9fbf3fe18fa52d", 0x3b, 0x20000000, &(0x7f0000000c40)={0xa, 0x4e20, 0x6, @dev={0xfe, 0x80, [], 0x19}, 0x1f}, 0x1c) accept$alg(r0, 0x0, 0x0) sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f0000000000)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x8}, 0xb4fcd35419244434, &(0x7f00004ca000)={&(0x7f0000000300)=ANY=[], 0x1a1}, 0x1}, 0x0) syz_fuseblk_mount(&(0x7f0000001380)='./file0\x00', &(0x7f00000013c0)='./file0\x00', 0xf000, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0xb21, 0x0) socket(0x1e, 0x3, 0x0) socket(0x1e, 0x0, 0x0) ptrace$PTRACE_SECCOMP_GET_FILTER(0x420c, 0x0, 0x0, &(0x7f0000000380)=""/113) sched_yield() ioctl$TUNGETIFF(r6, 0x800454d2, &(0x7f0000000140)) ioctl$KIOCSOUND(r6, 0x4b2f, 0xfffffffffffffb74) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x20, 0x9b}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000447000)='./file0\x00', &(0x7f00000e1000)='msdos\x00', 0x0, &(0x7f000097bfff)) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000580)='./cgroup/syz0\x00', 0x1ff) syz_open_dev$audion(&(0x7f0000000280)='/dev/audio#\x00', 0x7be, 0x0) 2018/03/31 09:15:27 executing program 4: ioctl$TIOCGSID(0xffffffffffffff9c, 0x5429, &(0x7f0000000180)=0x0) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f000031f000)}}, r0, 0x0, 0xffffffffffffffff, 0x0) prctl$void(0x0) getpid() r1 = syz_open_dev$vcsn(&(0x7f0000000040)='/dev/vcs#\x00', 0x0, 0x20000) ioctl$GIO_CMAP(r1, 0x4b70, &(0x7f0000000080)) r2 = socket$alg(0x26, 0x5, 0x0) ioctl$sock_SIOCGIFBR(0xffffffffffffffff, 0x8940, &(0x7f0000000040)=@get={0x1, &(0x7f0000000400)=""/242, 0x100000000}) bind$alg(r2, &(0x7f0000000080)={0x26, 'aead\x00', 0x0, 0x0, 'generic-gcm-aesni\x00'}, 0x58) r3 = syz_open_dev$sndmidi(&(0x7f0000000100)='/dev/snd/midiC#D#\x00', 0xfd, 0x100000) syz_init_net_socket$nfc_llcp(0x27, 0x1, 0x1) setsockopt$nfc_llcp_NFC_LLCP_MIUX(r1, 0x118, 0x15, &(0x7f0000000000)=0x7, 0xfffffffffffffd91) r4 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/cuse\x00', 0x103002, 0x0) futimesat(r4, &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)={{0x0, 0x7530}}) r5 = syz_open_dev$vcsa(&(0x7f00000001c0)='/dev/vcsa#\x00', 0x2, 0x0) sendto$inet6(r5, &(0x7f0000000bc0), 0x0, 0x20000000, &(0x7f0000000c40)={0xa, 0x4e20, 0x0, @dev={0xfe, 0x80, [], 0x19}, 0x1f}, 0x1c) accept$alg(r1, 0x0, 0x0) sendmsg$nl_netfilter(r3, &(0x7f0000000000)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x8}, 0xfffffffffffffe88, &(0x7f0000000240)={&(0x7f0000000300)=ANY=[]}, 0x1}, 0xffffffffffffffff) r6 = socket$inet6_sctp(0xa, 0x80000000000001, 0x84) setsockopt$inet_sctp6_SCTP_ENABLE_STREAM_RESET(r6, 0x84, 0x76, &(0x7f0000444ff8)={0x0, 0x7}, 0x8) setsockopt$inet_sctp6_SCTP_DEFAULT_SNDINFO(r6, 0x84, 0x22, &(0x7f0000000100)={0x6}, 0x10) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r6, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback={0x0, 0x1}}], 0x1c) setsockopt$inet_sctp6_SCTP_RECONFIG_SUPPORTED(r6, 0x84, 0x75, &(0x7f0000107ff8)={0x0, 0x10040000}, 0x8) connect$inet6(r6, &(0x7f00008c0000)={0xa, 0x4e23, 0x0, @loopback={0x0, 0x1}}, 0x1c) sendmmsg(r6, &(0x7f000060d000)=[{{0x0, 0x0, &(0x7f0000c38ff0)=[{&(0x7f0000000140)='\x00', 0x1}], 0x1, &(0x7f0000000500)=[{0xb0, 0x114, 0x5, "dc10ab0a2d23611572526fb678f55b722e21d17906d562cb4ba825d95c700a2de26db6dfcd7db13f523d6c76dd748f5baf49587726b72761d66112416e741ed827136c3df4868a03f50e0c106a471120f7adbaccb00faec317a617c46aee2222d76cb5452a18ccfae09c13d6d94c560c6b20eda2ecf017e8bfbf9e85a42dc0e8713f01f5853fa429cec1004d3294d8dbcf2d1b1797ed49c649224e"}, {0xc8, 0x29, 0x400, "8aee9cb6d5d927c75fff127bcef41a5382fa20e52a6c6f270298a86a9baac0d75707812a6ebad03459f990ade1fff579a930b417e71da71f60a9b47fded58442dd5a6ded2bb33fb0c23d318673ae6a04dbb72cf8a31ee2d52dbd26a4963a4258631eb24204f49650dd6244a3dfc5155f2d0de08714b30181f5d8788a7cd957800d9ae5f4a78c2dbb75892d853046fced9be9f4e4f56319558fbd277eecbe843fd3b35af4f477c270f1f4c9baf76e1df8342d"}], 0x178}}], 0x1, 0x8000) r7 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rtc\x00', 0x2, 0x0) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(r7, 0x84, 0x6e, &(0x7f0000000080)=[@in6={0xa, 0x4e24, 0x4, @loopback={0x0, 0x1}, 0x7}, @in={0x2, 0x4e23, @rand_addr=0x800}], 0x2c) ioctl$sock_inet6_udp_SIOCINQ(r7, 0x541b, &(0x7f0000000040)) setsockopt$inet_sctp6_SCTP_RESET_STREAMS(r6, 0x84, 0x77, &(0x7f0000000280)=ANY=[@ANYRES32=0x0, @ANYBLOB="0200d5000000308c2df3f21781b0df196922212767ef01cf13ddcfb9f293cf01024afd4cc76bb98824d7d5c3a1c129d6ea5ce02811b610c7d956a75a333ff04fb24d25b2b5add875aea54c05f347ad0856a884b22caae7175ab5efbbb63073a756b60d1be0872223e92394966048eef51ffdeaeaf02121cf9a8398898f67e3fc7bdf9e3c8837a72b5551be97872cb4485b48e3662f838f98705fa6857c00000000a3f1b61389880e352271755b79cdf5e8fa206eacdcfeef8afb156910ec444bc946c5176afd38cf09b1e565"], 0x2de) syz_fuseblk_mount(&(0x7f0000001380)='./file0\x00', &(0x7f00000013c0)='./file0\x00', 0xf000, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0xb21, 0x0) [ 319.912725] IPVS: ftp: loaded support on port[0] = 21 2018/03/31 09:15:27 executing program 0: perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f000031f000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) prctl$void(0x0) r0 = syz_open_dev$vcsn(&(0x7f0000000040)='/dev/vcs#\x00', 0x0, 0x20000) socket$alg(0x26, 0x5, 0x0) ioctl$sock_SIOCGIFBR(0xffffffffffffffff, 0x8940, &(0x7f0000000040)=@get={0x1, &(0x7f0000000400)=""/242, 0x100000000}) bind$alg(0xffffffffffffffff, &(0x7f0000000280)={0x26, 'aead\x00', 0x0, 0x0, 'generic-gcm-aesni\x00'}, 0x9) syz_open_dev$sndmidi(&(0x7f0000000100)='/dev/snd/midiC#D#\x00', 0xfd, 0x0) bind(0xffffffffffffffff, &(0x7f0000000140)=@llc={0x1a, 0x33a, 0x7, 0x80, 0x0, 0x4, @remote={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xbb}}, 0x80) r1 = syz_init_net_socket$nfc_llcp(0x27, 0x1, 0x1) setsockopt$nfc_llcp_NFC_LLCP_MIUX(r1, 0x118, 0x15, &(0x7f0000000000), 0x4) r2 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/cuse\x00', 0x103002, 0x0) futimesat(r2, &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)={{0x0, 0x7530}}) r3 = syz_open_dev$vcsa(&(0x7f00000001c0)='/dev/vcsa#\x00', 0x2, 0x0) sendto$inet6(r3, &(0x7f0000000bc0)="36251e313e0743fc195a1a198a14434e8a0a00b3f452a3b5644e336ec712a16310c9aecc4e3097bc666a8882128a73c368ce731e9fbf3fe18fa52d00c34ac2e57c1c4569cfbd6a621c6dfbc032121aed", 0x50, 0x20000000, &(0x7f0000000c40)={0xa, 0x4e20, 0x6, @dev={0xfe, 0x80, [], 0x19}, 0x1f}, 0x1c) accept$alg(r0, 0x0, 0x0) sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f0000000000)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x8}, 0xb4fcd35419244434, &(0x7f00004ca000)={&(0x7f0000000300)=ANY=[], 0x1a1}, 0x1}, 0x0) syz_fuseblk_mount(&(0x7f0000001380)='./file0\x00', &(0x7f00000013c0)='./file0\x00', 0xf000, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0xb21, 0x0) socket(0x1e, 0x3, 0x0) socket(0x1e, 0x0, 0x0) ptrace$PTRACE_SECCOMP_GET_FILTER(0x420c, 0x0, 0x0, &(0x7f0000000380)=""/113) io_setup(0xc, &(0x7f0000000540)=0x0) io_cancel(r4, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x7, 0x1, r0, &(0x7f00000005c0)="bbb2194c030ef2fac2984abf151f8e66021ecaf9fe123af0b83f2850643db14e19186cc1807e947c64608e35571c096ee997ee767e8a2b9bad03d6cedc04b96a58ae15b948067ca4beb1136384e3bb1e473730ff4c97612bd580cfcc13107daace096ee6579e07ad274f54446107b3c30be9b1307501fcd6516ae5b11d4c35f61620f9c06a683913edce7c7a47a78d2bcca0d66b50d1b448c8fa1fa734249ee73da43789009570fd0f3405a894a6c9", 0xaf, 0x6, 0x0, 0x1, r2}, &(0x7f0000000300)) sched_yield() ioctl$TUNGETIFF(r3, 0x800454d2, &(0x7f0000000140)) ioctl$KIOCSOUND(r0, 0x4b2f, 0xa) ioctl$GIO_FONT(r0, 0x4b60, &(0x7f0000001400)=""/4096) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x20, 0x9b}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000447000)='./file0\x00', &(0x7f00000e1000)='msdos\x00', 0x0, &(0x7f000097bfff)) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000580)='./cgroup/syz0\x00', 0x1ff) 2018/03/31 09:15:27 executing program 7 (fault-call:24 fault-nth:13): perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f000031f000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getpid() r0 = syz_open_dev$vcsn(&(0x7f0000000040)='/dev/vcs#\x00', 0x0, 0x20000) ioctl$GIO_CMAP(r0, 0x4b70, &(0x7f0000000080)) r1 = socket$alg(0x26, 0x5, 0x0) ioctl$sock_SIOCGIFBR(r1, 0x8940, &(0x7f0000000040)=@get={0x1, &(0x7f0000000400)=""/242, 0x100000000}) bind$alg(r1, &(0x7f0000000080)={0x26, 'aead\x00', 0x0, 0x0, 'generic-gcm-aesni\x00'}, 0x58) syz_open_dev$sndmidi(&(0x7f0000000100)='/dev/snd/midiC#D#\x00', 0xfd, 0x0) bind(0xffffffffffffffff, &(0x7f0000000140)=@llc={0x1a, 0x33a, 0x7, 0x80, 0x5, 0x4, @remote={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xbb}}, 0x80) r2 = syz_init_net_socket$nfc_llcp(0x27, 0x1, 0x1) setsockopt$nfc_llcp_NFC_LLCP_MIUX(r2, 0x118, 0x15, &(0x7f0000000000), 0x4) r3 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/cuse\x00', 0x103002, 0x0) futimesat(r3, &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)={{0x0, 0x7530}}) r4 = syz_open_dev$vcsa(&(0x7f00000001c0)='/dev/vcsa#\x00', 0x2, 0x4020ff) sendto$inet6(r4, &(0x7f0000000bc0)="36251e313e0743fc195a1a198a14434e8a0a00b3f452a3b5644e336ec712a16310c9aecc4e3097bc666a8882128a73c368ce731e9fbf3fe18fa52d00", 0x3c, 0x20000000, &(0x7f0000000c40)={0xa, 0x0, 0x6, @dev={0xfe, 0x80, [], 0x19}, 0x1f}, 0x1c) accept$alg(r0, 0x0, 0x0) sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f0000000000)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x8}, 0xb4fcd35419244434, &(0x7f00004ca000)={&(0x7f0000000300)=ANY=[], 0x1a1}, 0x1}, 0x0) syz_fuseblk_mount(&(0x7f0000001380)='./file0\x00', &(0x7f00000013c0)='./file0\x00', 0xf000, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0xb21, 0x0) socket(0x1e, 0x3, 0x0) socket(0x1e, 0x0, 0x0) ptrace$PTRACE_SECCOMP_GET_FILTER(0x420c, 0x0, 0x0, &(0x7f0000000380)=""/113) sched_yield() ioctl$TUNGETIFF(r4, 0x800454d2, &(0x7f0000000140)) ioctl$KIOCSOUND(r4, 0x4b2f, 0xfffffffffffffb74) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000447000)='./file0\x00', &(0x7f00000e1000)='msdos\x00', 0x0, &(0x7f000097bfff)) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000580)='./cgroup/syz0\x00', 0x1ff) syz_open_dev$audion(&(0x7f0000000280)='/dev/audio#\x00', 0x7be, 0x0) 2018/03/31 09:15:27 executing program 1: perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f000031f000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) prctl$void(0x0) getpid() r0 = syz_open_dev$vcsn(&(0x7f0000000040)='/dev/vcs#\x00', 0x400, 0x20000) r1 = socket$alg(0x26, 0x5, 0x0) r2 = add_key(&(0x7f0000000400)='dns_resolver\x00', &(0x7f0000000440)={0x73, 0x79, 0x7a, 0x0}, &(0x7f0000000480)="45706373a2448770616c05fb718231920536c3567e9843522fbfdf6a0fb38a51452d1c32d868", 0x26, 0xfffffffffffffffd) keyctl$restrict_keyring(0x1d, r2, 0x0, 0x0) bind$alg(r1, &(0x7f0000000080)={0x26, 'aead\x00', 0x0, 0x0, 'generic-gcm-aesni\x00'}, 0x58) r3 = syz_open_dev$sndmidi(&(0x7f0000000100)='/dev/snd/midiC#D#\x00', 0xfd, 0x0) bind(r3, &(0x7f0000000140)=@llc={0x1a, 0x33a, 0x7, 0x80, 0x0, 0x4, @remote={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xbb}}, 0x80) r4 = syz_init_net_socket$nfc_llcp(0x27, 0x1, 0x1) setsockopt$nfc_llcp_NFC_LLCP_MIUX(r4, 0x118, 0x15, &(0x7f0000000000), 0x4) r5 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/cuse\x00', 0x103002, 0x0) futimesat(r5, &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)={{0x0, 0x7530}}) r6 = syz_open_dev$vcsa(&(0x7f00000001c0)='/dev/vcsa#\x00', 0x2, 0x4020ff) sendto$inet6(r6, &(0x7f0000000bc0), 0x0, 0x20000000, &(0x7f0000000c40)={0xa, 0x4e20, 0x6, @dev={0xfe, 0x80, [], 0x19}, 0x1f}, 0x1c) sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f0000000000)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x8}, 0xb4fcd35419244434, &(0x7f00004ca000)={&(0x7f0000000300)=ANY=[], 0x1a1}, 0x1}, 0x0) r7 = syz_fuseblk_mount(&(0x7f0000001380)='./file0\x00', &(0x7f00000013c0)='./file0\x00', 0xf000, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0xb21, 0x0) socket(0x1e, 0x3, 0x0) ptrace$PTRACE_SECCOMP_GET_FILTER(0x420c, 0x0, 0x0, &(0x7f0000000380)=""/113) sched_yield() ioctl$TUNGETIFF(r7, 0x800454d2, &(0x7f00000004c0)) ioctl$KIOCSOUND(r6, 0x4b2f, 0xfffffffffffffb74) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x20, 0x9b}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000447000)='./file0\x00', &(0x7f00000e1000)='msdos\x00', 0x0, &(0x7f000097bfff)) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000580)='./cgroup/syz0\x00', 0x1ff) fstat(r5, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0, 0x0}, &(0x7f0000000340)=0xc) syz_fuse_mount(&(0x7f0000000200)='./file0\x00', 0x8000, r8, r9, 0x7fff, 0x2000000) fcntl$getown(0xffffffffffffffff, 0x9) 2018/03/31 09:15:27 executing program 2: syz_open_dev$loop(&(0x7f00000003c0)='/dev/loop#\x00', 0x8, 0x0) r0 = syz_open_dev$sndseq(&(0x7f00000001c0)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r0, 0x4040534e, &(0x7f000019ffe9)={0xc1}) r1 = accept(0xffffffffffffffff, &(0x7f0000000080)=@can, &(0x7f0000000180)=0x80) ioctl$sock_ipx_SIOCAIPXPRISLT(r1, 0x89e1, &(0x7f0000000280)=0x3f) getsockopt$inet_sctp_SCTP_PRIMARY_ADDR(0xffffffffffffffff, 0x84, 0x6, &(0x7f0000000ac0)={0x0, @in={{0x2, 0x4e20, @loopback=0x7f000001}}}, &(0x7f00000002c0)=0x84) setsockopt$inet_sctp_SCTP_ENABLE_STREAM_RESET(r1, 0x84, 0x76, &(0x7f0000000300)={r2, 0x1c9}, 0x8) r3 = syz_open_dev$sg(&(0x7f0000000700)='/dev/sg#\x00', 0xfffffffffffffff7, 0x800) clone(0x2000c100, &(0x7f0000000800)="97bb77038add5df9e9d4f9783b82c55fe59e5c0acdbcfc9bcf92ac0e1f1f3c1959c1d25dfabf3849336c7c85be174d7765b47e113632aea54b87e4d3f2c1db09e6aa4040b43d17308fb7e62e808067da2fff3cfd8e4c038c814bbfc6bc49d8ebc8671d8297e2d34dc61f2d194d2dbb8f59b4c853e0714d3d4bb29d1243fac01c86c8c4dd38daedab3c6ad73a72d3f6dd2684aa82e5285eb82452c9848b7beb8bc513ba8c8973cad0bd5926604846b7f5d0397b", &(0x7f00000008c0), &(0x7f0000000900), &(0x7f0000000940)="ed6c04412e782fe395f084741e3d9fe469aebde09acc8f8d8d84d1f00f5573b09acba487077ebb904cb1f3fed55f59d677ce24bbd2a7506df8e1e0d0fc709cb8c9f4ab2aeeeebc5ef879742c1f7628f1862c88b5b0da89acbf43ef12e4839405b6a3430d296fea06d2f3a8356c57ec991e") ioctl$SNDRV_SEQ_IOCTL_SUBSCRIBE_PORT(r0, 0x40505330, &(0x7f0000ec6fb0)={{}, {0x80}}) getsockopt$netrom_NETROM_T1(r1, 0x103, 0x1, &(0x7f0000000000), &(0x7f0000000380)=0x4) syz_open_dev$adsp(&(0x7f0000000600)='/dev/adsp#\x00', 0x100000000, 0x80000) rt_sigprocmask(0x3d738072cd0f41ac, &(0x7f0000000cc0)={0x7}, &(0x7f0000000d00), 0x8) clone(0x40000000, &(0x7f0000000500)="67cdd9994c47c31d325b069924a7064c157c2ec0b5b5dca2feeb7dabef3b7af0d02d559e293faa759f2b3cb12aea360c2d", &(0x7f0000000580), &(0x7f00000005c0), &(0x7f0000000a00)="29859fdda9a119e54a27f9ec76b4d63a16dc5bbdd38c2fda0e5f4d8f830cd987ec7d3ffc66cf3db8820968fd89a1fba8fe6352a29a27f3b000bcdf238f2c04b358fc831025180e0be313da41de6366c94a1a0f86aaffdf2c039111b55275c054e14819a827fe809225249a01944263a2aec15f64e752e35892b1b8e7ef1e0e9115") ioctl$SNDRV_SEQ_IOCTL_DELETE_PORT(r0, 0x40a85321, &(0x7f0000000b80)={{0x4, 0x8}, 'port0\x00', 0x80, 0x0, 0x10000, 0x6, 0x2, 0x80, 0x8, 0x0, 0x0, 0x3dec00}) getsockopt$inet_sctp_SCTP_SOCKOPT_PEELOFF(r3, 0x84, 0x66, &(0x7f0000000c40)={r2, 0x6}, &(0x7f0000000c80)=0x8) clock_settime(0x7, &(0x7f0000000740)={0x77359400}) ioctl$SNDRV_SEQ_IOCTL_CLIENT_ID(r0, 0x80045301, &(0x7f0000000340)) r4 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer2\x00', 0x0, 0x0) openat$sequencer2(0xffffffffffffff9c, &(0x7f00000006c0)='/dev/sequencer2\x00', 0x222081, 0x0) ioctl$RNDADDENTROPY(0xffffffffffffffff, 0x40085203, &(0x7f0000000100)=ANY=[@ANYPTR=&(0x7f0000000680)=ANY=[@ANYPTR64=&(0x7f0000000640)=ANY=[@ANYPTR, @ANYPTR]]]) setsockopt$inet_sctp_SCTP_DEFAULT_SEND_PARAM(r4, 0x84, 0xa, &(0x7f0000000140)={0x5, 0x100000001, 0x0, 0x8, 0x0, 0x7, 0x401, 0x1f, r2}, 0x20) 2018/03/31 09:15:27 executing program 6: perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f000031f000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) prctl$void(0x0) getpid() r0 = syz_open_dev$vcsn(&(0x7f0000000040)='/dev/vcs#\x00', 0x0, 0x20000) ioctl$GIO_CMAP(r0, 0x4b70, &(0x7f0000000080)) r1 = socket$alg(0x26, 0x5, 0x0) ioctl$sock_SIOCGIFBR(0xffffffffffffffff, 0x8940, &(0x7f0000000040)=@get={0x1, &(0x7f0000000400)=""/242, 0x100000000}) bind$alg(r1, &(0x7f0000000080)={0x26, 'aead\x00', 0x0, 0x0, 'generic-gcm-aesni\x00'}, 0x58) syz_open_dev$sndmidi(&(0x7f0000000100)='/dev/snd/midiC#D#\x00', 0xfd, 0x0) bind(0xffffffffffffffff, &(0x7f0000000140)=@llc={0x1a, 0x33a, 0x7, 0x80, 0x0, 0x4, @remote={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xbb}}, 0x80) r2 = syz_init_net_socket$nfc_llcp(0x27, 0x1, 0x1) setsockopt$nfc_llcp_NFC_LLCP_MIUX(r2, 0x118, 0x15, &(0x7f0000000000), 0x4) r3 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/cuse\x00', 0x103002, 0x0) futimesat(r3, &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)={{0x0, 0x7530}}) r4 = syz_open_dev$vcsa(&(0x7f00000001c0)='/dev/vcsa#\x00', 0x2, 0x0) sendto$inet6(r4, &(0x7f0000000bc0), 0x0, 0x20000000, &(0x7f0000000c40)={0xa, 0x4e20, 0x0, @dev={0xfe, 0x80, [], 0x19}, 0x1f}, 0x1c) accept$alg(r0, 0x0, 0x0) sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f0000000000)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x8}, 0xb4fcd35419244434, &(0x7f00004ca000)={&(0x7f0000000300)=ANY=[], 0x1a1}, 0x1}, 0x0) syz_fuseblk_mount(&(0x7f0000001380)='./file0\x00', &(0x7f00000013c0)='./file0\x00', 0xf000, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0, 0x0) socket(0x1e, 0x3, 0x0) socket(0x1e, 0x0, 0x0) ptrace$PTRACE_SECCOMP_GET_FILTER(0x420c, 0x0, 0x0, &(0x7f0000000380)=""/113) sched_yield() ioctl$TUNGETIFF(r4, 0x800454d2, &(0x7f0000000140)) ioctl$KIOCSOUND(r4, 0x4b2f, 0xfffffffffffffb74) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x20, 0x9b}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000447000)='./file0\x00', &(0x7f00000e1000)='msdos\x00', 0x0, &(0x7f000097bfff)) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000580)='./cgroup/syz0\x00', 0x1ff) 2018/03/31 09:15:27 executing program 3: r0 = syz_open_dev$random(&(0x7f00000001c0)='/dev/random\x00', 0x0, 0x800) r1 = syz_open_dev$loop(&(0x7f0000000380)='/dev/loop#\x00', 0x0, 0x0) ioctl$LOOP_SET_STATUS(r1, 0xc0481273, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "3900ea631d00000000020000010000009f00000023f7b7d65f90b0e6330ee739b319d8f6aa6bd58d1443474482e85040fb4947ebb55bd19f335b5bffff0001f3", "cfa430745a540dc1c149b7b81579f6a41c51f7d51933223e82ab867dac761faf"}) write(0xffffffffffffffff, &(0x7f00000001c0), 0x0) setsockopt$inet_sctp6_SCTP_RECVNXTINFO(0xffffffffffffffff, 0x84, 0x21, &(0x7f00000003c0)=0x200, 0x4) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f00000000c0)=0x0) getsockopt$netrom_NETROM_T4(0xffffffffffffffff, 0x103, 0x6, &(0x7f0000000300)=0x8, &(0x7f0000000340)=0x4) r3 = getpid() sched_setparam(r3, &(0x7f0000000400)) syz_open_dev$loop(&(0x7f0000000580)='/dev/loop#\x00', 0x3, 0x88400) r4 = memfd_create(&(0x7f0000614000)="74086e750000000000000000008c00", 0x0) pwritev(r4, &(0x7f0000f50f90)=[{&(0x7f0000000040)="aa", 0x1}], 0x1, 0x0) fcntl$getownex(r1, 0x10, &(0x7f0000000240)={0x0, 0x0}) r6 = syz_open_procfs(r5, &(0x7f0000000280)='stat\x00') epoll_ctl$EPOLL_CTL_MOD(r4, 0x3, r0, &(0x7f00000002c0)={0x20000010}) accept4$inet6(r4, &(0x7f0000000100)={0x0, 0x0, 0x0, @mcast1}, &(0x7f0000000140)=0x1c, 0x7fd) getsockopt$inet_IP_IPSEC_POLICY(r4, 0x0, 0x10, &(0x7f0000000940)={{{@in6=@local, @in6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@loopback}, 0x0, @in=@local}}, &(0x7f0000000780)=0xe8) getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f00000007c0)={0x0, 0x0, 0x0}, &(0x7f0000000540)=0xc) fchown(r4, r7, r8) r9 = syz_open_dev$binder(&(0x7f0000000100)='/dev/binder#\x00', 0xffffffffffffffff, 0x806) ioctl$BINDER_SET_CONTEXT_MGR(r6, 0x40046207, 0x0) mmap$binder(&(0x7f000000c000/0x2000)=nil, 0x2000, 0x0, 0x12, r9, 0x0) ioctl$BINDER_WRITE_READ(r9, 0xc0306201, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000), 0x0, 0x0, &(0x7f0000011f9d)}) getsockopt$inet_sctp6_SCTP_AUTO_ASCONF(0xffffffffffffffff, 0x84, 0x1e, &(0x7f0000000140), &(0x7f0000000180)=0x4) ioctl$BINDER_WRITE_READ(r9, 0xc0306201, &(0x7f0000000340)={0x8, 0x0, &(0x7f0000000440)=ANY=[@ANYRES64=r1], 0x0, 0x0, &(0x7f0000000240)}) write(r0, &(0x7f0000000300)="8be25f5790f664f32509e40d6f879d5add7e2d359c9a19afb750a2d25352875d187d4118c99a2d5c6db433c277cc7d345b87a34f1b417033d367cb0cfd6a25633f77aafb17e99c33cb65352c901ae75176f07bb0a4bb5ebff3d87e", 0x208) r10 = ioctl$LOOP_CTL_GET_FREE(r4, 0x4c82) ioctl$LOOP_CTL_REMOVE(r6, 0x4c81, r10) openat$cgroup(0xffffffffffffff9c, &(0x7f0000000000)='syz0\x00', 0x200002, 0x0) sched_setaffinity(r2, 0x8, &(0x7f0000000200)=0x7) [ 319.983842] binder: 31252:31253 unknown command 20 [ 320.008714] FAULT_INJECTION: forcing a failure. [ 320.008714] name failslab, interval 1, probability 0, space 0, times 0 [ 320.009236] binder: 31252:31253 ioctl c0306201 20000340 returned -22 [ 320.020052] CPU: 1 PID: 31251 Comm: syz-executor7 Not tainted 4.16.0-rc7+ #8 [ 320.033634] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 320.042985] Call Trace: [ 320.043002] dump_stack+0x194/0x24d [ 320.043017] ? arch_local_irq_restore+0x53/0x53 [ 320.043037] should_fail+0x8c0/0xa40 [ 320.043046] ? is_bpf_text_address+0xa4/0x120 [ 320.043059] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 320.067154] ? __kernel_text_address+0xd/0x40 [ 320.071648] ? unwind_get_return_address+0x61/0xa0 [ 320.076588] ? find_held_lock+0x35/0x1d0 [ 320.080651] ? __lock_is_held+0xb6/0x140 [ 320.084112] binder: 31252:31265 unknown command 25 [ 320.084715] ? check_same_owner+0x320/0x320 [ 320.084732] ? rcu_note_context_switch+0x710/0x710 [ 320.084752] should_failslab+0xec/0x120 [ 320.092399] binder: 31252:31265 ioctl c0306201 20000340 returned -22 [ 320.093962] kmem_cache_alloc_trace+0x4b/0x740 [ 320.093972] ? __kmalloc_node+0x33/0x70 [ 320.093981] ? __kmalloc_node+0x33/0x70 [ 320.093992] ? rcu_read_lock_sched_held+0x108/0x120 [ 320.094008] __memcg_init_list_lru_node+0x169/0x270 [ 320.094020] ? list_lru_add+0x7c0/0x7c0 [ 320.094030] ? __kmalloc_node+0x47/0x70 [ 320.094045] __list_lru_init+0x544/0x750 [ 320.094059] ? memcg_destroy_list_lru_node.isra.7+0x110/0x110 [ 320.094071] ? trace_hardirqs_on_caller+0x421/0x5c0 [ 320.094082] ? __lockdep_init_map+0xe4/0x650 2018/03/31 09:15:27 executing program 6: perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f000031f000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) prctl$void(0x0) getpid() r0 = syz_open_dev$vcsn(&(0x7f0000000040)='/dev/vcs#\x00', 0x0, 0x20000) ioctl$GIO_CMAP(r0, 0x4b70, &(0x7f0000000080)) r1 = socket$alg(0x26, 0x5, 0x0) ioctl$sock_SIOCGIFBR(0xffffffffffffffff, 0x8940, &(0x7f0000000040)=@get={0x1, &(0x7f0000000400)=""/242, 0x100000000}) bind$alg(r1, &(0x7f0000000080)={0x26, 'aead\x00', 0x0, 0x0, 'generic-gcm-aesni\x00'}, 0x58) syz_open_dev$sndmidi(&(0x7f0000000100)='/dev/snd/midiC#D#\x00', 0xfd, 0x0) bind(0xffffffffffffffff, &(0x7f0000000140)=@llc={0x1a, 0x33a, 0x7, 0x80, 0x0, 0x4, @remote={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xbb}}, 0x80) r2 = syz_init_net_socket$nfc_llcp(0x27, 0x1, 0x1) setsockopt$nfc_llcp_NFC_LLCP_MIUX(r2, 0x118, 0x15, &(0x7f0000000000), 0x4) r3 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/cuse\x00', 0x103002, 0x0) futimesat(r3, &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)={{0x0, 0x7530}}) r4 = syz_open_dev$vcsa(&(0x7f00000001c0)='/dev/vcsa#\x00', 0x2, 0x0) sendto$inet6(r4, &(0x7f0000000bc0), 0x0, 0x20000000, &(0x7f0000000c40)={0xa, 0x4e20, 0x0, @dev={0xfe, 0x80, [], 0x19}, 0x1f}, 0x1c) accept$alg(r0, 0x0, 0x0) sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f0000000000)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x8}, 0xb4fcd35419244434, &(0x7f00004ca000)={&(0x7f0000000300)=ANY=[], 0x1a1}, 0x1}, 0x0) syz_fuseblk_mount(&(0x7f0000001380)='./file0\x00', &(0x7f00000013c0)='./file0\x00', 0xf000, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0xb21, 0x0) socket(0x0, 0x3, 0x0) socket(0x1e, 0x0, 0x0) ptrace$PTRACE_SECCOMP_GET_FILTER(0x420c, 0x0, 0x0, &(0x7f0000000380)=""/113) sched_yield() ioctl$TUNGETIFF(r4, 0x800454d2, &(0x7f0000000140)) ioctl$KIOCSOUND(r4, 0x4b2f, 0xfffffffffffffb74) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x20, 0x9b}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000447000)='./file0\x00', &(0x7f00000e1000)='msdos\x00', 0x0, &(0x7f000097bfff)) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000580)='./cgroup/syz0\x00', 0x1ff) 2018/03/31 09:15:27 executing program 4: perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f000031f000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) prctl$void(0x0) getpid() r0 = syz_open_dev$vcsn(&(0x7f0000000040)='/dev/vcs#\x00', 0x0, 0x20000) ioctl$GIO_CMAP(r0, 0x4b70, &(0x7f0000000080)) r1 = socket$alg(0x26, 0x5, 0x0) ioctl$sock_SIOCGIFBR(0xffffffffffffffff, 0x8940, &(0x7f0000000040)=@get={0x1, &(0x7f0000000400)=""/242, 0x100000000}) bind$alg(r1, &(0x7f0000000080)={0x26, 'aead\x00', 0x0, 0x0, 'generic-gcm-aesni\x00'}, 0x58) syz_open_dev$sndmidi(&(0x7f0000000100)='/dev/snd/midiC#D#\x00', 0xfd, 0x0) bind(0xffffffffffffffff, &(0x7f0000000140)=@llc={0x1a, 0x33a, 0x7, 0x80, 0x0, 0x4, @remote={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xbb}}, 0x80) r2 = syz_init_net_socket$nfc_llcp(0x27, 0x1, 0x1) setsockopt$nfc_llcp_NFC_LLCP_MIUX(r2, 0x118, 0x15, &(0x7f0000000000), 0x4) r3 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/cuse\x00', 0x103002, 0x0) futimesat(r3, &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)={{0x0, 0x7530}}) r4 = syz_open_dev$vcsa(&(0x7f00000001c0)='/dev/vcsa#\x00', 0x2, 0x0) sendto$inet6(r4, &(0x7f0000000bc0), 0x0, 0x20000000, &(0x7f0000000c40)={0xa, 0x4e20, 0x0, @dev={0xfe, 0x80, [], 0x19}, 0x1f}, 0x1c) accept$alg(r0, 0x0, 0x0) sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f0000000000)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x8}, 0xb4fcd35419244434, &(0x7f00004ca000)={&(0x7f0000000300)=ANY=[], 0x1a1}, 0x1}, 0x0) syz_fuseblk_mount(&(0x7f0000001380)='./file0\x00', &(0x7f00000013c0)='./file0\x00', 0xf000, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0xb21, 0x0) socket(0x1e, 0x0, 0x0) ptrace$PTRACE_SECCOMP_GET_FILTER(0x420c, 0x0, 0x0, &(0x7f0000000380)=""/113) sched_yield() ioctl$TUNGETIFF(r4, 0x800454d2, &(0x7f0000000140)) ioctl$KIOCSOUND(r4, 0x4b2f, 0xfffffffffffffb74) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x20, 0x9b}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000447000)='./file0\x00', &(0x7f00000e1000)='msdos\x00', 0x0, &(0x7f000097bfff)) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000240)='./cgroup/syz1\x00', 0x1ff) 2018/03/31 09:15:27 executing program 3: r0 = syz_open_dev$random(&(0x7f00000001c0)='/dev/random\x00', 0x0, 0x800) r1 = syz_open_dev$loop(&(0x7f0000308000)='/dev/loop#\x00', 0x0, 0x0) ioctl$LOOP_SET_STATUS(r1, 0xc0481273, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "3900ea631d00000000020000010000009f00000023f7b7d65f90b0e6330ee739b319d8f6aa6bd58d1443474482e85040fb4947ebb55bd19f335b5bffff0001f3", "cfa430745a540dc1c149b7b81579f6a41c51f7d51933223e82ab867dac761faf"}) write(0xffffffffffffffff, &(0x7f00000001c0), 0x0) setsockopt$inet_sctp6_SCTP_RECVNXTINFO(0xffffffffffffffff, 0x84, 0x21, &(0x7f00000003c0)=0x200, 0x4) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f00000000c0)=0x0) getsockopt$netrom_NETROM_T4(0xffffffffffffffff, 0x103, 0x6, &(0x7f0000000300)=0x8, &(0x7f0000000340)=0x4) r3 = getpid() sched_setparam(r3, &(0x7f0000000400)) syz_open_dev$loop(&(0x7f0000ca9ff5)='/dev/loop#\x00', 0x0, 0x82) r4 = memfd_create(&(0x7f0000614000)="74086e750000000000000000008c00", 0x0) pwritev(r4, &(0x7f0000f50f90)=[{&(0x7f0000000040)="aa", 0x1}], 0x1, 0x0) fcntl$getownex(r1, 0x10, &(0x7f0000000240)={0x0, 0x0}) r6 = syz_open_procfs(r5, &(0x7f0000000280)='stat\x00') epoll_ctl$EPOLL_CTL_MOD(r4, 0x3, r0, &(0x7f00000002c0)={0x20000010}) accept4$inet6(r4, &(0x7f0000000100)={0x0, 0x0, 0x0, @mcast1}, &(0x7f0000000140)=0x1c, 0x7fd) getsockopt$inet_IP_IPSEC_POLICY(r4, 0x0, 0x10, &(0x7f0000000940)={{{@in6=@local, @in6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@loopback}, 0x0, @in=@local}}, &(0x7f0000000780)=0xe8) getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f00000007c0)={0x0, 0x0, 0x0}, &(0x7f0000000540)=0xc) fchown(r4, r7, r8) r9 = syz_open_dev$binder(&(0x7f0000000100)='/dev/binder#\x00', 0xffffffffffffffff, 0x806) ioctl$BINDER_SET_CONTEXT_MGR(r6, 0x40046207, 0x0) mmap$binder(&(0x7f000000c000/0x2000)=nil, 0x2000, 0x0, 0x12, r9, 0x0) ioctl$BINDER_WRITE_READ(r6, 0xc0306201, &(0x7f0000000040)={0xfffffffffffffeb3, 0x0, &(0x7f0000000a40)=[@transaction={0x40406300, {0x0, 0x0, 0x1, 0x0, 0x10, 0x0, 0x0, 0x28, 0x40, &(0x7f0000000480)=[@ptr={0x70742a85, 0x1, &(0x7f0000000380), 0x1, 0x1, 0xa}], &(0x7f00000004c0)=[0x48, 0x78, 0x78, 0x18, 0x20, 0x48, 0x0, 0x30]}}, @register_looper={0x630b}, @reply_sg={0x40486312, {{0x0, 0x0, 0x1, 0x0, 0x11, 0x0, 0x0, 0x40, 0x10, &(0x7f0000000600)=[@fda={0x66646185, 0x2, 0x4, 0x3a}, @fda={0x66646185, 0x9, 0x3, 0x21}], &(0x7f0000000640)=[0x58, 0x38]}, 0x9}}, @exit_looper={0x630d}, @enter_looper={0x630c}, @reply={0x40406301, {0x4, 0x0, 0x1, 0x0, 0x10, 0x0, 0x0, 0x0, 0x8, &(0x7f0000000680), &(0x7f00000006c0)=[0x0]}}], 0x0, 0x0, &(0x7f0000000740)}) getsockopt$inet_sctp6_SCTP_AUTO_ASCONF(0xffffffffffffffff, 0x84, 0x1e, &(0x7f0000000140), &(0x7f0000000180)=0x4) ioctl$BINDER_WRITE_READ(r9, 0xc0306201, &(0x7f0000000340)={0x8, 0x0, &(0x7f0000000440)=ANY=[@ANYRES64=r1], 0x0, 0x0, &(0x7f0000000240)}) write(0xffffffffffffffff, &(0x7f0000000300)="8be25f5790f664f32509e40d6f879d5add7e2d359c9a19afb750a2d25352875d187d4118c99a2d5c6db433c277cc7d345b87a34f1b417033d367cb0cfd6a25633f77aafb17e99c33cb65352c901ae75176f07bb0a4bb5ebff3d87e", 0x5b) r10 = ioctl$LOOP_CTL_GET_FREE(r4, 0x4c82) ioctl$LOOP_CTL_REMOVE(r6, 0x4c81, r10) openat$cgroup(0xffffffffffffff9c, &(0x7f0000000000)='syz0\x00', 0x200002, 0x0) sched_setaffinity(r2, 0x8, &(0x7f0000000200)=0x7) [ 320.094094] ? lockdep_init_map+0x9/0x10 [ 320.162508] binder: 31270:31271 unknown command 20 [ 320.163133] sget_userns+0x691/0xe40 [ 320.163143] ? kill_litter_super+0x90/0x90 [ 320.163156] ? ns_test_super+0x50/0x50 [ 320.163168] ? destroy_unused_super.part.6+0xd0/0xd0 [ 320.163177] ? do_raw_spin_trylock+0x190/0x190 [ 320.163190] ? kobject_put+0x6b/0x250 [ 320.163204] ? blkdev_get+0x3a1/0xb00 [ 320.168451] binder: 31270:31271 ioctl c0306201 20000340 returned -22 [ 320.171816] ? cap_capable+0x1b5/0x230 2018/03/31 09:15:27 executing program 6: perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f000031f000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) prctl$void(0x0) getpid() r0 = syz_open_dev$vcsn(&(0x7f0000000040)='/dev/vcs#\x00', 0x0, 0x20000) ioctl$GIO_CMAP(r0, 0x4b70, &(0x7f0000000080)) r1 = socket$alg(0x26, 0x5, 0x0) ioctl$sock_SIOCGIFBR(0xffffffffffffffff, 0x8940, &(0x7f0000000040)=@get={0x1, &(0x7f0000000400)=""/242, 0x100000000}) bind$alg(r1, &(0x7f0000000080)={0x26, 'aead\x00', 0x0, 0x0, 'generic-gcm-aesni\x00'}, 0x58) syz_open_dev$sndmidi(&(0x7f0000000100)='/dev/snd/midiC#D#\x00', 0xfd, 0x0) bind(0xffffffffffffffff, &(0x7f0000000140)=@llc={0x1a, 0x33a, 0x7, 0x80, 0x0, 0x4, @remote={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xbb}}, 0x80) r2 = syz_init_net_socket$nfc_llcp(0x27, 0x1, 0x1) setsockopt$nfc_llcp_NFC_LLCP_MIUX(r2, 0x118, 0x15, &(0x7f0000000000), 0x4) r3 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/cuse\x00', 0x103002, 0x0) futimesat(r3, &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)={{0x0, 0x7530}}) r4 = syz_open_dev$vcsa(&(0x7f00000001c0)='/dev/vcsa#\x00', 0x2, 0x0) sendto$inet6(r4, &(0x7f0000000bc0), 0x0, 0x20000000, &(0x7f0000000c40)={0xa, 0x4e20, 0x0, @dev={0xfe, 0x80, [], 0x19}, 0x1f}, 0x1c) accept$alg(r0, 0x0, 0x0) sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f0000000000)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x8}, 0xb4fcd35419244434, &(0x7f00004ca000)={&(0x7f0000000300)=ANY=[], 0x1a1}, 0x1}, 0x0) syz_fuseblk_mount(&(0x7f0000001380)='./file0\x00', &(0x7f00000013c0)='./file0\x00', 0xf000, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0xb21, 0x0) socket(0x0, 0x3, 0x0) socket(0x1e, 0x0, 0x0) ptrace$PTRACE_SECCOMP_GET_FILTER(0x420c, 0x0, 0x0, &(0x7f0000000380)=""/113) sched_yield() ioctl$TUNGETIFF(r4, 0x800454d2, &(0x7f0000000140)) ioctl$KIOCSOUND(r4, 0x4b2f, 0xfffffffffffffb74) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x20, 0x9b}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000447000)='./file0\x00', &(0x7f00000e1000)='msdos\x00', 0x0, &(0x7f000097bfff)) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000580)='./cgroup/syz0\x00', 0x1ff) [ 320.171827] ? __blkdev_get+0x13b0/0x13b0 [ 320.171840] ? security_capable+0x8e/0xc0 [ 320.171851] ? kill_litter_super+0x90/0x90 [ 320.171862] ? ns_capable_common+0xcf/0x160 [ 320.171872] ? ns_test_super+0x50/0x50 [ 320.171880] ? kill_litter_super+0x90/0x90 [ 320.171889] sget+0xd2/0x120 [ 320.171902] mount_bdev+0x109/0x370 [ 320.171912] ? msdos_mount+0x40/0x40 [ 320.171925] msdos_mount+0x34/0x40 [ 320.171935] mount_fs+0x66/0x2d0 [ 320.171949] vfs_kern_mount.part.26+0xc6/0x4a0 [ 320.200828] binder: 31270:31272 unknown command 26 [ 320.203718] ? may_umount+0xa0/0xa0 [ 320.203731] ? _raw_read_unlock+0x22/0x30 [ 320.203741] ? __get_fs_type+0x8a/0xc0 [ 320.203755] do_mount+0xea4/0x2bb0 [ 320.203770] ? copy_mount_string+0x40/0x40 [ 320.203780] ? trace_hardirqs_on_caller+0x421/0x5c0 [ 320.203796] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 320.203811] ? retint_kernel+0x10/0x10 [ 320.218837] binder: 31270:31272 ioctl c0306201 20000340 returned -22 [ 320.220160] ? copy_mount_options+0x149/0x2e0 [ 320.220173] ? __sanitizer_cov_trace_pc+0x48/0x50 [ 320.220184] ? copy_mount_options+0x1f7/0x2e0 [ 320.220197] SyS_mount+0xab/0x120 [ 320.220206] ? copy_mnt_ns+0xb30/0xb30 [ 320.220219] do_syscall_64+0x281/0x940 [ 320.220230] ? vmalloc_sync_all+0x30/0x30 [ 320.220241] ? _raw_spin_unlock_irq+0x27/0x70 [ 320.220252] ? finish_task_switch+0x1c1/0x7e0 [ 320.220263] ? syscall_return_slowpath+0x550/0x550 [ 320.220271] ? syscall_return_slowpath+0x2ac/0x550 [ 320.220282] ? prepare_exit_to_usermode+0x350/0x350 [ 320.351482] ? entry_SYSCALL_64_after_hwframe+0x52/0xb7 [ 320.351496] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 320.351512] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 320.366851] RIP: 0033:0x454e79 [ 320.370030] RSP: 002b:00007f37fba8ec68 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 320.377729] RAX: ffffffffffffffda RBX: 00007f37fba8f6d4 RCX: 0000000000454e79 [ 320.384974] RDX: 00000000200e1000 RSI: 0000000020447000 RDI: 0000000020000000 [ 320.392223] RBP: 000000000072bea0 R08: 000000002097bfff R09: 0000000000000000 [ 320.399481] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000019 [ 320.406741] R13: 00000000000003fa R14: 00000000006f8010 R15: 000000000000000d [ 320.415185] FAT-fs (loop199): unable to read boot sector [ 320.423665] FAT-fs (loop199): unable to read boot sector [ 320.429804] FAT-fs (loop199): unable to read boot sector [ 320.436376] FAT-fs (loop199): unable to read boot sector [ 320.470193] FAT-fs (loop199): unable to read boot sector [ 320.476307] FAT-fs (loop199): unable to read boot sector [ 320.483796] FAT-fs (loop199): unable to read boot sector 2018/03/31 09:15:28 executing program 3: r0 = syz_open_dev$random(&(0x7f00000001c0)='/dev/random\x00', 0x0, 0x800) r1 = syz_open_dev$loop(&(0x7f0000308000)='/dev/loop#\x00', 0x0, 0x0) ioctl$LOOP_SET_STATUS(r1, 0xc0481273, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "3900ea631d00000000020000010000009f00000023f7b7d65f90b0e6330ee739b319d8f6aa6bd58d1443474482e85040fb4947ebb55bd19f335b5bffff0001f3", "cfa430745a540dc1c149b7b81579f6a41c51f7d51933223e82ab867dac761faf"}) write(0xffffffffffffffff, &(0x7f00000001c0), 0x0) setsockopt$inet_sctp6_SCTP_RECVNXTINFO(0xffffffffffffffff, 0x84, 0x21, &(0x7f00000003c0)=0x200, 0x4) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f00000000c0)=0x0) getsockopt$netrom_NETROM_T4(0xffffffffffffffff, 0x103, 0x6, &(0x7f0000000300)=0x8, &(0x7f0000000340)=0x4) r3 = getpid() sched_setparam(r3, &(0x7f0000000400)) syz_open_dev$loop(&(0x7f0000ca9ff5)='/dev/loop#\x00', 0x0, 0x82) r4 = memfd_create(&(0x7f0000614000)="74086e750000000000000000008c00", 0x0) pwritev(r4, &(0x7f0000f50f90)=[{&(0x7f0000000040)="aa", 0x1}], 0x1, 0x0) fcntl$getownex(r1, 0x10, &(0x7f0000000240)={0x0, 0x0}) r6 = syz_open_procfs(r5, &(0x7f0000000280)='stat\x00') epoll_ctl$EPOLL_CTL_MOD(r4, 0x3, r0, &(0x7f00000002c0)={0x20000010}) accept4$inet6(r4, &(0x7f0000000100)={0x0, 0x0, 0x0, @mcast1}, &(0x7f0000000140)=0x1c, 0x7fd) getsockopt$inet_IP_IPSEC_POLICY(r4, 0x0, 0x10, &(0x7f0000000940)={{{@in6=@local, @in6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@loopback}, 0x0, @in=@local}}, &(0x7f0000000780)=0xe8) getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f00000007c0)={0x0, 0x0, 0x0}, &(0x7f0000000540)=0xc) fchown(r4, r7, r8) r9 = syz_open_dev$binder(&(0x7f0000000100)='/dev/binder#\x00', 0xffffffffffffffff, 0x806) ioctl$BINDER_SET_CONTEXT_MGR(r6, 0x40046207, 0x0) mmap$binder(&(0x7f000000c000/0x2000)=nil, 0x2000, 0x0, 0x12, r9, 0x0) ioctl$BINDER_WRITE_READ(r9, 0xc0306201, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000), 0x9d, 0x0, &(0x7f0000000480)="f057391514ac851eb5a6a1c89b7dc465dacc5640d91e80a86c4a136ff203e4840e5e0a806afc945d3f397f0c00a2a128903acfaac3c843613d20c52664d59842ade79148964eed175d2282ec9673b6c2d872b4257ebbd3a0dab78c8aa4a88758536b51cb4584d1705048c414271dbc214946be846ea4a786e1d50b68d71e303fe9dbdb93f79c4c9bb6705b258691bd21798550ae889ac8261826d43d40"}) getsockopt$inet_sctp6_SCTP_AUTO_ASCONF(0xffffffffffffffff, 0x84, 0x1e, &(0x7f0000000140), &(0x7f0000000180)=0x4) ioctl$BINDER_WRITE_READ(r9, 0xc0306201, &(0x7f0000000340)={0x364, 0x0, &(0x7f0000000440)=ANY=[@ANYRES64=r1], 0x0, 0x0, &(0x7f0000000240)}) write(0xffffffffffffffff, &(0x7f0000000300)="8be25f5790f664f32509e40d6f879d5add7e2d359c9a19afb750a2d25352875d187d4118c99a2d5c6db433c277cc7d345b87a34f1b417033d367cb0cfd6a25633f77aafb17e99c33cb65352c901ae75176f07bb0a4bb5ebff3d87e", 0x5b) r10 = ioctl$LOOP_CTL_GET_FREE(r4, 0x4c82) ioctl$LOOP_CTL_REMOVE(r6, 0x4c81, r10) openat$cgroup(0xffffffffffffff9c, &(0x7f0000000000)='syz0\x00', 0x200002, 0x0) sched_setaffinity(r2, 0x8, &(0x7f0000000200)=0x7) 2018/03/31 09:15:28 executing program 5: perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f000031f000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) prctl$void(0x0) getpid() r0 = syz_open_dev$vcsn(&(0x7f0000000040)='/dev/vcs#\x00', 0x0, 0x20000) ioctl$GIO_CMAP(r0, 0x4b70, &(0x7f0000000080)) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000080)={0x26, 'aead\x00', 0x0, 0x0, 'generic-gcm-aesni\x00'}, 0x58) r2 = syz_open_dev$sndmidi(&(0x7f0000000100)='/dev/snd/midiC#D#\x00', 0xfd, 0x0) bind(0xffffffffffffffff, &(0x7f0000000140)=@llc={0x1a, 0x33a, 0x7, 0x80, 0x5, 0x4, @remote={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xbb}}, 0x80) r3 = syz_init_net_socket$nfc_llcp(0x27, 0x1, 0x1) getsockopt$inet_sctp6_SCTP_HMAC_IDENT(r2, 0x84, 0x16, &(0x7f00000002c0)=ANY=[@ANYBLOB="b64f38b7d32974a462c00a5bcda05805001e00000006000200ff01d400c74d7546eb92dac71bcd02e81e1b5508b3aa13878575cd2d3608871e42af6c14e6a3daffc4cdcbfa7b5434bcc9686dc41581b43a0c6caff4b9e47a28dfdd4b0c28398a8adbeb7d30bee092236ae92f91d2d38c8a72f0adecdf8e370624176b457a791dc113f6ccb7527033a955a74cb3f9daa6ebe32d0068344dda6e997ae121f6d4eb9893ab9e2ce201e39b1d5217f9955f0c252d08a1f700"], &(0x7f0000000240)=0xe) setsockopt$nfc_llcp_NFC_LLCP_MIUX(r3, 0x118, 0x15, &(0x7f0000000000), 0x4) r4 = openat$cuse(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/cuse\x00', 0x103004, 0x0) futimesat(r4, &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)={{0x0, 0x7530}}) r5 = syz_open_dev$vcsa(&(0x7f00000001c0)='/dev/vcsa#\x00', 0x2, 0x4020ff) sendto$inet6(r2, &(0x7f0000000400)="36251e313e07be0880f53b8055bd0aad43fc195a1a198a14434e8a0a00b3f412a3b5644e336ec712a16310c9aecc4e3097bc666a8882128a73c368ce731e9fbf3fe18fa52d", 0x3b, 0x20008000, &(0x7f0000000200)={0xa, 0x4e23, 0x3, @dev={0xfe, 0x80, [], 0x19}, 0x1f}, 0xd) accept$alg(r0, 0x0, 0x0) sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f0000000000)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x8}, 0xb4fcd35419244434, &(0x7f00004ca000)={&(0x7f0000000300)=ANY=[], 0x1a1}, 0x1}, 0x0) syz_fuseblk_mount(&(0x7f0000001380)='./file0\x00', &(0x7f00000013c0)='./file0\x00', 0xf000, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0xb21, 0x0) socket(0x1e, 0x3, 0x0) socket(0x1e, 0x0, 0x0) ptrace$PTRACE_SECCOMP_GET_FILTER(0x420c, 0x0, 0x0, &(0x7f0000000380)=""/113) sched_yield() ioctl$TUNGETIFF(r5, 0x800454d2, &(0x7f0000000140)) ioctl$KIOCSOUND(r5, 0x4b2f, 0xfffffffffffffb74) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x20, 0x9b}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000447000)='./file0\x00', &(0x7f00000e1000)='msdos\x00', 0x0, &(0x7f000097bfff)) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000580)='./cgroup/syz0\x00', 0x1ff) syz_open_dev$audion(&(0x7f0000000280)='/dev/audio#\x00', 0x7be, 0x0) 2018/03/31 09:15:28 executing program 6: perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f000031f000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) prctl$void(0x0) getpid() r0 = syz_open_dev$vcsn(&(0x7f0000000040)='/dev/vcs#\x00', 0x0, 0x20000) ioctl$GIO_CMAP(r0, 0x4b70, &(0x7f0000000080)) r1 = socket$alg(0x26, 0x5, 0x0) ioctl$sock_SIOCGIFBR(0xffffffffffffffff, 0x8940, &(0x7f0000000040)=@get={0x1, &(0x7f0000000400)=""/242, 0x100000000}) bind$alg(r1, &(0x7f0000000080)={0x26, 'aead\x00', 0x0, 0x0, 'generic-gcm-aesni\x00'}, 0x58) syz_open_dev$sndmidi(&(0x7f0000000100)='/dev/snd/midiC#D#\x00', 0xfd, 0x0) bind(0xffffffffffffffff, &(0x7f0000000140)=@llc={0x1a, 0x33a, 0x7, 0x80, 0x0, 0x4, @remote={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xbb}}, 0x80) r2 = syz_init_net_socket$nfc_llcp(0x27, 0x1, 0x1) setsockopt$nfc_llcp_NFC_LLCP_MIUX(r2, 0x118, 0x15, &(0x7f0000000000), 0x4) r3 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/cuse\x00', 0x103002, 0x0) futimesat(r3, &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)={{0x0, 0x7530}}) r4 = syz_open_dev$vcsa(&(0x7f00000001c0)='/dev/vcsa#\x00', 0x2, 0x0) sendto$inet6(r4, &(0x7f0000000bc0), 0x0, 0x20000000, &(0x7f0000000c40)={0xa, 0x4e20, 0x0, @dev={0xfe, 0x80, [], 0x19}, 0x1f}, 0x1c) accept$alg(r0, 0x0, 0x0) sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f0000000000)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x8}, 0xb4fcd35419244434, &(0x7f00004ca000)={&(0x7f0000000300)=ANY=[], 0x1a1}, 0x1}, 0x0) syz_fuseblk_mount(&(0x7f0000001380)='./file0\x00', &(0x7f00000013c0)='./file0\x00', 0xf000, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0xb21, 0x0) socket(0x0, 0x3, 0x0) socket(0x1e, 0x0, 0x0) ptrace$PTRACE_SECCOMP_GET_FILTER(0x420c, 0x0, 0x0, &(0x7f0000000380)=""/113) sched_yield() ioctl$TUNGETIFF(r4, 0x800454d2, &(0x7f0000000140)) ioctl$KIOCSOUND(r4, 0x4b2f, 0xfffffffffffffb74) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x20, 0x9b}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000447000)='./file0\x00', &(0x7f00000e1000)='msdos\x00', 0x0, &(0x7f000097bfff)) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000580)='./cgroup/syz0\x00', 0x1ff) 2018/03/31 09:15:28 executing program 7 (fault-call:24 fault-nth:14): perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f000031f000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getpid() r0 = syz_open_dev$vcsn(&(0x7f0000000040)='/dev/vcs#\x00', 0x0, 0x20000) ioctl$GIO_CMAP(r0, 0x4b70, &(0x7f0000000080)) r1 = socket$alg(0x26, 0x5, 0x0) ioctl$sock_SIOCGIFBR(r1, 0x8940, &(0x7f0000000040)=@get={0x1, &(0x7f0000000400)=""/242, 0x100000000}) bind$alg(r1, &(0x7f0000000080)={0x26, 'aead\x00', 0x0, 0x0, 'generic-gcm-aesni\x00'}, 0x58) syz_open_dev$sndmidi(&(0x7f0000000100)='/dev/snd/midiC#D#\x00', 0xfd, 0x0) bind(0xffffffffffffffff, &(0x7f0000000140)=@llc={0x1a, 0x33a, 0x7, 0x80, 0x5, 0x4, @remote={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xbb}}, 0x80) r2 = syz_init_net_socket$nfc_llcp(0x27, 0x1, 0x1) setsockopt$nfc_llcp_NFC_LLCP_MIUX(r2, 0x118, 0x15, &(0x7f0000000000), 0x4) r3 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/cuse\x00', 0x103002, 0x0) futimesat(r3, &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)={{0x0, 0x7530}}) r4 = syz_open_dev$vcsa(&(0x7f00000001c0)='/dev/vcsa#\x00', 0x2, 0x4020ff) sendto$inet6(r4, &(0x7f0000000bc0)="36251e313e0743fc195a1a198a14434e8a0a00b3f452a3b5644e336ec712a16310c9aecc4e3097bc666a8882128a73c368ce731e9fbf3fe18fa52d00", 0x3c, 0x20000000, &(0x7f0000000c40)={0xa, 0x0, 0x6, @dev={0xfe, 0x80, [], 0x19}, 0x1f}, 0x1c) accept$alg(r0, 0x0, 0x0) sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f0000000000)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x8}, 0xb4fcd35419244434, &(0x7f00004ca000)={&(0x7f0000000300)=ANY=[], 0x1a1}, 0x1}, 0x0) syz_fuseblk_mount(&(0x7f0000001380)='./file0\x00', &(0x7f00000013c0)='./file0\x00', 0xf000, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0xb21, 0x0) socket(0x1e, 0x3, 0x0) socket(0x1e, 0x0, 0x0) ptrace$PTRACE_SECCOMP_GET_FILTER(0x420c, 0x0, 0x0, &(0x7f0000000380)=""/113) sched_yield() ioctl$TUNGETIFF(r4, 0x800454d2, &(0x7f0000000140)) ioctl$KIOCSOUND(r4, 0x4b2f, 0xfffffffffffffb74) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000447000)='./file0\x00', &(0x7f00000e1000)='msdos\x00', 0x0, &(0x7f000097bfff)) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000580)='./cgroup/syz0\x00', 0x1ff) syz_open_dev$audion(&(0x7f0000000280)='/dev/audio#\x00', 0x7be, 0x0) 2018/03/31 09:15:28 executing program 1: perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f000031f000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) prctl$void(0x0) getpid() r0 = syz_open_dev$vcsn(&(0x7f0000000040)='/dev/vcs#\x00', 0x400, 0x20000) r1 = socket$alg(0x26, 0x5, 0x0) ioctl$sock_SIOCGIFBR(r1, 0x8940, &(0x7f0000000040)=@get={0x1, &(0x7f0000000400)=""/242, 0x100000000}) bind$alg(r1, &(0x7f0000000080)={0x26, 'aead\x00', 0x0, 0x0, 'generic-gcm-aesni\x00'}, 0x58) r2 = syz_open_dev$sndmidi(&(0x7f0000000100)='/dev/snd/midiC#D#\x00', 0xfd, 0x0) bind(r2, &(0x7f0000000140)=@llc={0x1a, 0x33a, 0x7, 0x80, 0x0, 0x4, @remote={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xbb}}, 0x80) r3 = syz_init_net_socket$nfc_llcp(0x27, 0x1, 0x1) setsockopt$nfc_llcp_NFC_LLCP_MIUX(r3, 0x118, 0x15, &(0x7f0000000000), 0x4) r4 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/cuse\x00', 0x103002, 0x0) futimesat(r4, &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)={{0x0, 0x7530}}) r5 = syz_open_dev$vcsa(&(0x7f00000001c0)='/dev/vcsa#\x00', 0x2, 0x4020ff) sendto$inet6(r5, &(0x7f0000000bc0), 0x0, 0x20000000, &(0x7f0000000c40)={0xa, 0x4e20, 0x6, @dev={0xfe, 0x80, [], 0x19}, 0x1f}, 0x1c) sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f0000000000)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x8}, 0xb4fcd35419244434, &(0x7f00004ca000)={&(0x7f0000000300)=ANY=[], 0x1a1}, 0x1}, 0x0) syz_fuseblk_mount(&(0x7f0000001380)='./file0\x00', &(0x7f00000013c0)='./file0\x00', 0xf000, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0xb21, 0x0) r6 = socket(0x1e, 0x3, 0x0) mlock2(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x0) ptrace$PTRACE_SECCOMP_GET_FILTER(0x420c, 0x0, 0x0, &(0x7f0000000380)=""/113) sched_yield() ioctl$TUNGETIFF(r5, 0x800454d2, &(0x7f0000000140)) ioctl$KIOCSOUND(r5, 0x4b2f, 0xfffffffffffffb74) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x20, 0x9b}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000447000)='./file0\x00', &(0x7f00000e1000)='msdos\x00', 0x0, &(0x7f000097bfff)) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000580)='./cgroup/syz0\x00', 0x1ff) syz_open_dev$audion(&(0x7f0000000280)='/dev/audio#\x00', 0x7be, 0x0) getsockopt$inet_sctp6_SCTP_PR_ASSOC_STATUS(r0, 0x84, 0x73, &(0x7f0000000200)={0x0, 0xffffffff, 0x20, 0x400, 0x1}, &(0x7f0000000240)=0x18) getsockopt$inet_sctp_SCTP_PEER_AUTH_CHUNKS(r6, 0x84, 0x1a, &(0x7f00000006c0)=ANY=[@ANYRES32=r7, @ANYBLOB="c1000000cfe8ea85b76ed3d230cf66f51907930219e64475aa71100db54bd1897f93cde011fde9e95173b4c02ee779ec765bdaf3a73687d1e48673ef714efa6c07dcd9e64ac4cdfe7fe1af43fb04db14a1d0829f3dec5dad9eaa62dbc1270fafffb666719fe7144b4a9c5e9e330af5215cce502c5af99f6ff2407fbeab4481a30da9626cee1c59e54d5475c5f155dc4d32365a1afd9aa12bb97869085bb135076f8403fbc0f456f4bcd416a5f6b876b9b814956f52838f00f75da75ecf0c6263a9fb66076e34000000000000000000000000000000"], &(0x7f00000002c0)=0xc9) fcntl$getown(0xffffffffffffffff, 0x9) 2018/03/31 09:15:28 executing program 0: perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f000031f000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) prctl$void(0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000200)='./file0\x00', 0x101000, 0x20) ioctl$VT_RESIZEX(r0, 0x560a, &(0x7f0000000240)={0x7ff, 0xeb, 0x5, 0x0, 0x3, 0x9}) r1 = syz_open_dev$vcsn(&(0x7f0000000040)='/dev/vcs#\x00', 0x0, 0x20000) socket$alg(0x26, 0x5, 0x0) ioctl$sock_SIOCGIFBR(0xffffffffffffffff, 0x8940, &(0x7f0000000040)=@get={0x1, &(0x7f0000000400)=""/242, 0x100000000}) bind$alg(0xffffffffffffffff, &(0x7f0000000080)={0x26, 'aead\x00', 0x0, 0x0, 'generic-gcm-aesni\x00'}, 0x58) syz_open_dev$sndmidi(&(0x7f0000000100)='/dev/snd/midiC#D#\x00', 0xfd, 0x0) bind(0xffffffffffffffff, &(0x7f0000000140)=@llc={0x1a, 0x33a, 0x7, 0x80, 0x0, 0x4, @remote={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xbb}}, 0x80) r2 = syz_init_net_socket$nfc_llcp(0x27, 0x1, 0x1) setsockopt$nfc_llcp_NFC_LLCP_MIUX(r2, 0x118, 0x15, &(0x7f0000000000), 0x4) ioctl$DRM_IOCTL_IRQ_BUSID(r1, 0xc0106403, &(0x7f00000002c0)={0x45d, 0xae8, 0x1a77}) r3 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/cuse\x00', 0x103002, 0x0) futimesat(r3, &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)={{0x0, 0x7530}}) r4 = syz_open_dev$vcsa(&(0x7f00000001c0)='/dev/vcsa#\x00', 0x2, 0x0) sendto$inet6(r4, &(0x7f0000000bc0)="36251e313e0743fc195a1a198a14434e8a0a00b3f452a3b5644e336ec712a16310c9aecc4e3097bc666a8882128a73c368ce731e9fbf3fe18fa52d00c34ac2e57c1c4569cfbd6a621c6dfbc032121aed", 0x50, 0x20000000, &(0x7f0000000300)={0xa, 0x4e20, 0x6, @empty, 0x1f}, 0x1c) accept$alg(r1, 0x0, 0x0) sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f0000000000)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x8}, 0xb4fcd35419244434, &(0x7f00004ca000)={&(0x7f0000000300)=ANY=[], 0x1a1}, 0x1}, 0x0) fstat(r1, &(0x7f0000000500)={0x0, 0x0, 0x0, 0x0, 0x0}) syz_fuseblk_mount(&(0x7f0000001380)='./file0\x00', &(0x7f00000013c0)='./file0\x00', 0xf000, r5, 0xffffffffffffffff, 0x0, 0xb21, 0x0) socket(0x1e, 0x3, 0x0) socket(0x10, 0x0, 0x1) ptrace$PTRACE_SECCOMP_GET_FILTER(0x420c, 0x0, 0x0, &(0x7f0000000380)=""/113) sched_yield() ioctl$TUNGETIFF(r4, 0x800454d2, &(0x7f0000000140)) r6 = socket$inet_sctp(0x2, 0x2000000000000001, 0x84) mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0xfffffffffffffffd, 0x32, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp_SCTP_I_WANT_MAPPED_V4_ADDR(r6, 0x84, 0xc, &(0x7f0000000040), &(0x7f0000000080)=0x4) ioctl$VHOST_SET_VRING_BASE(r0, 0x4008af12, &(0x7f0000000280)={0x3, 0x3}) 2018/03/31 09:15:28 executing program 2: syz_open_dev$loop(&(0x7f00000003c0)='/dev/loop#\x00', 0x8, 0x0) r0 = syz_open_dev$sndseq(&(0x7f00000001c0)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r0, 0x4040534e, &(0x7f000019ffe9)={0xc1}) r1 = accept(0xffffffffffffffff, &(0x7f0000000080)=@can, &(0x7f0000000180)=0x80) ioctl$sock_ipx_SIOCAIPXPRISLT(r1, 0x89e1, &(0x7f0000000280)=0x3f) getsockopt$inet_sctp_SCTP_PRIMARY_ADDR(0xffffffffffffffff, 0x84, 0x6, &(0x7f0000000ac0)={0x0, @in={{0x2, 0x4e20, @loopback=0x7f000001}}}, &(0x7f00000002c0)=0x84) setsockopt$inet_sctp_SCTP_ENABLE_STREAM_RESET(r1, 0x84, 0x76, &(0x7f0000000300)={r2, 0x1c9}, 0x8) r3 = syz_open_dev$sg(&(0x7f0000000700)='/dev/sg#\x00', 0xfffffffffffffff7, 0x800) clone(0x2000c100, &(0x7f0000000800)="97bb77038add5df9e9d4f9783b82c55fe59e5c0acdbcfc9bcf92ac0e1f1f3c1959c1d25dfabf3849336c7c85be174d7765b47e113632aea54b87e4d3f2c1db09e6aa4040b43d17308fb7e62e808067da2fff3cfd8e4c038c814bbfc6bc49d8ebc8671d8297e2d34dc61f2d194d2dbb8f59b4c853e0714d3d4bb29d1243fac01c86c8c4dd38daedab3c6ad73a72d3f6dd2684aa82e5285eb82452c9848b7beb8bc513ba8c8973cad0bd5926604846b7f5d0397b", &(0x7f00000008c0), &(0x7f0000000900), &(0x7f0000000940)="ed6c04412e782fe395f084741e3d9fe469aebde09acc8f8d8d84d1f00f5573b09acba487077ebb904cb1f3fed55f59d677ce24bbd2a7506df8e1e0d0fc709cb8c9f4ab2aeeeebc5ef879742c1f7628f1862c88b5b0da89acbf43ef12e4839405b6a3430d296fea06d2f3a8356c57ec991e") ioctl$SNDRV_SEQ_IOCTL_SUBSCRIBE_PORT(r0, 0x40505330, &(0x7f0000ec6fb0)={{}, {0x80}}) getsockopt$netrom_NETROM_T1(r1, 0x103, 0x1, &(0x7f0000000000), &(0x7f0000000380)=0x4) syz_open_dev$adsp(&(0x7f0000000600)='/dev/adsp#\x00', 0x100000000, 0x80000) rt_sigprocmask(0x3d738072cd0f41ac, &(0x7f0000000cc0)={0x7}, &(0x7f0000000d00), 0x8) clone(0x40000000, &(0x7f0000000500)="67cdd9994c47c31d325b069924a7064c157c2ec0b5b5dca2feeb7dabef3b7af0d02d559e293faa759f2b3cb12aea360c2d", &(0x7f0000000580), &(0x7f00000005c0), &(0x7f0000000a00)="29859fdda9a119e54a27f9ec76b4d63a16dc5bbdd38c2fda0e5f4d8f830cd987ec7d3ffc66cf3db8820968fd89a1fba8fe6352a29a27f3b000bcdf238f2c04b358fc831025180e0be313da41de6366c94a1a0f86aaffdf2c039111b55275c054e14819a827fe809225249a01944263a2aec15f64e752e35892b1b8e7ef1e0e9115") ioctl$SNDRV_SEQ_IOCTL_DELETE_PORT(r0, 0x40a85321, &(0x7f0000000b80)={{0x4, 0x8}, 'port0\x00', 0x80, 0x0, 0x10000, 0x6, 0x2, 0x80, 0x8, 0x0, 0x0, 0x3dec00}) getsockopt$inet_sctp_SCTP_SOCKOPT_PEELOFF(r3, 0x84, 0x66, &(0x7f0000000c40)={r2, 0x6}, &(0x7f0000000c80)=0x8) clock_settime(0x7, &(0x7f0000000740)={0x77359400}) ioctl$SNDRV_SEQ_IOCTL_CLIENT_ID(r0, 0x80045301, &(0x7f0000000340)) r4 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer2\x00', 0x0, 0x0) openat$sequencer2(0xffffffffffffff9c, &(0x7f00000006c0)='/dev/sequencer2\x00', 0x222081, 0x0) ioctl$RNDADDENTROPY(0xffffffffffffffff, 0x40085203, &(0x7f0000000100)=ANY=[@ANYPTR=&(0x7f0000000680)=ANY=[@ANYPTR64=&(0x7f0000000640)=ANY=[@ANYPTR, @ANYPTR]]]) setsockopt$inet_sctp_SCTP_DEFAULT_SEND_PARAM(r4, 0x84, 0xa, &(0x7f0000000140)={0x5, 0x100000001, 0x0, 0x8, 0x0, 0x7, 0x401, 0x1f, r2}, 0x20) 2018/03/31 09:15:28 executing program 4: perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f000031f000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) prctl$void(0x0) getpid() r0 = syz_open_dev$vcsn(&(0x7f0000000040)='/dev/vcs#\x00', 0x0, 0x20000) ioctl$GIO_CMAP(r0, 0x4b70, &(0x7f0000000080)) r1 = socket$alg(0x26, 0x5, 0x0) ioctl$sock_SIOCGIFBR(r0, 0x8940, &(0x7f0000000500)=@add_del={0x2, &(0x7f0000000340)='lo\x00', 0x2}) bind$alg(r1, &(0x7f0000000080)={0x26, 'aead\x00', 0x0, 0x0, 'generic-gcm-aesni\x00'}, 0x58) syz_open_dev$sndmidi(&(0x7f0000000100)='/dev/snd/midiC#D#\x00', 0xfd, 0x0) bind(0xffffffffffffffff, &(0x7f0000000140)=@llc={0x1a, 0x33a, 0x7, 0x80, 0x0, 0x4, @remote={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xbb}}, 0x80) r2 = syz_init_net_socket$nfc_llcp(0x27, 0x1, 0x1) setsockopt$nfc_llcp_NFC_LLCP_MIUX(r2, 0x118, 0x15, &(0x7f0000000000), 0x4) r3 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000300)='/dev/cuse\x00', 0x103002, 0x0) futimesat(r3, &(0x7f0000000080)='./file0\x00', &(0x7f00000002c0)={{0x0, 0x7530}}) r4 = syz_open_dev$vcsa(&(0x7f00000001c0)='/dev/vcsa#\x00', 0x2, 0x0) sendto$inet6(r4, &(0x7f0000000bc0), 0x0, 0x20000000, &(0x7f0000000c40)={0xa, 0x4e20, 0x0, @dev={0xfe, 0x80, [], 0x19}, 0x1f}, 0x1c) accept$alg(r0, 0x0, 0x0) sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f0000000000)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x8}, 0xb4fcd35419244434, &(0x7f00004ca000)={&(0x7f0000000300)=ANY=[], 0x1a1}, 0x1}, 0x0) syz_fuseblk_mount(&(0x7f0000001380)='./file0\x00', &(0x7f00000013c0)='./file0\x00', 0xf000, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0xb21, 0x0) socket(0x1e, 0x800, 0x0) socket(0x1e, 0x0, 0x0) ptrace$PTRACE_SECCOMP_GET_FILTER(0x420c, 0x0, 0x0, &(0x7f0000000380)=""/113) sched_yield() ioctl$TUNGETIFF(r4, 0x800454d2, &(0x7f0000000140)) clock_gettime(0x0, &(0x7f0000000240)={0x0, 0x0}) futimesat(r3, &(0x7f0000000200)='./file0\x00', &(0x7f0000000280)={{r5, r6/1000+10000}}) ioctl$KIOCSOUND(r4, 0x4b2f, 0xfffffffffffffb74) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x20, 0x9b}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000447000)='./file0\x00', &(0x7f00000e1000)='msdos\x00', 0x0, &(0x7f000097bfff)) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000580)='./cgroup/syz0\x00', 0x1ff) [ 320.998547] binder: 31285:31289 unknown command 20 [ 321.009074] FAT-fs (loop199): unable to read boot sector [ 321.027493] FAULT_INJECTION: forcing a failure. [ 321.027493] name failslab, interval 1, probability 0, space 0, times 0 [ 321.028342] binder: 31285:31289 ioctl c0306201 20000340 returned -22 2018/03/31 09:15:28 executing program 0: r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f000031f000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) prctl$void(0x0) r1 = syz_open_dev$vcsn(&(0x7f0000000040)='/dev/vcs#\x00', 0x0, 0x20000) socket$alg(0x26, 0x5, 0x0) ioctl$sock_SIOCGIFBR(0xffffffffffffffff, 0x8940, &(0x7f0000000040)=@get={0x1, &(0x7f0000000400)=""/242, 0x100000000}) bind$alg(0xffffffffffffffff, &(0x7f0000000080)={0x26, 'aead\x00', 0x0, 0x0, 'generic-gcm-aesni\x00'}, 0x58) r2 = syz_open_dev$sndmidi(&(0x7f0000000100)='/dev/snd/midiC#D#\x00', 0xfd, 0x0) bind(0xffffffffffffffff, &(0x7f0000000140)=@llc={0x1a, 0x33a, 0x7, 0x80, 0x0, 0x4, @remote={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xbb}}, 0x80) r3 = syz_init_net_socket$nfc_llcp(0x27, 0x1, 0x1) setsockopt$nfc_llcp_NFC_LLCP_MIUX(r3, 0x118, 0x15, &(0x7f0000000000), 0x4) r4 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/cuse\x00', 0x103002, 0x0) futimesat(r4, &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)={{0x0, 0x7530}}) r5 = syz_open_dev$vcsa(&(0x7f00000001c0)='/dev/vcsa#\x00', 0x2, 0x80000) sendto$inet6(r5, &(0x7f0000000bc0)="36251e313e0743fc195a1a198a14434e8a0a00b3f452a3b5644e336ec712a16310c9aecc4e3097bc666a8882128a73c368ce731e9fbf3fe18fa52d00c34ac2e57c1c4569cfbd6a621c6dfbc032121aed", 0x50, 0x20000000, &(0x7f0000000c40)={0xa, 0x4e20, 0x6, @dev={0xfe, 0x80, [], 0x19}, 0x1f}, 0x1c) accept$alg(r1, 0x0, 0x0) sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f0000000000)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x8}, 0xb4fcd35419244434, &(0x7f00004ca000)={&(0x7f0000000300)=ANY=[], 0x1a1}, 0x1}, 0x0) syz_fuseblk_mount(&(0x7f0000001380)='./file0\x00', &(0x7f00000013c0)='./file0\x00', 0xf000, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0xb21, 0x0) ioctl$KVM_SET_DEBUGREGS(r0, 0x4080aea2, &(0x7f0000000200)={[0xf000, 0x20000000f000, 0x4, 0xd000], 0x800, 0x94, 0x20}) socket(0x1e, 0x3, 0x0) socket(0x1e, 0x0, 0x0) getsockopt$inet_sctp_SCTP_RECVNXTINFO(r1, 0x84, 0x21, &(0x7f0000000280), &(0x7f00000002c0)=0x4) ptrace$PTRACE_SECCOMP_GET_FILTER(0x420c, 0x0, 0x0, &(0x7f0000000380)=""/113) sched_yield() ioctl$TUNGETIFF(r5, 0x800454d2, &(0x7f0000000140)) ioctl$KIOCSOUND(r5, 0x4b2f, 0xfffffffffffffb74) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x20, 0x9b}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000447000)='./file0\x00', &(0x7f00000e1000)='msdos\x00', 0x0, &(0x7f000097bfff)) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000580)='./cgroup/syz0\x00', 0x1ff) getsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(r5, 0x84, 0x18, &(0x7f0000000300)={0x0}, &(0x7f0000000340)=0x8) setsockopt$inet_sctp_SCTP_DEFAULT_SEND_PARAM(r2, 0x84, 0xa, &(0x7f0000000500)={0xffffffffffff7fff, 0xcb2, 0x8000, 0x2, 0x6, 0x38000, 0x401, 0x4, r6}, 0x20) [ 321.038803] CPU: 0 PID: 31296 Comm: syz-executor7 Not tainted 4.16.0-rc7+ #8 [ 321.052427] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 321.061779] Call Trace: [ 321.064368] dump_stack+0x194/0x24d [ 321.068008] ? arch_local_irq_restore+0x53/0x53 [ 321.072700] should_fail+0x8c0/0xa40 [ 321.076776] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 321.076793] ? kasan_kmalloc+0xad/0xe0 [ 321.076804] ? kmem_cache_alloc_trace+0x136/0x740 [ 321.076816] ? __memcg_init_list_lru_node+0x169/0x270 [ 321.076831] ? sget_userns+0x691/0xe40 [ 321.076844] ? mount_fs+0x66/0x2d0 [ 321.076858] ? vfs_kern_mount.part.26+0xc6/0x4a0 [ 321.076867] ? do_mount+0xea4/0x2bb0 [ 321.076879] ? do_syscall_64+0x281/0x940 [ 321.076891] ? entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 321.076913] ? find_held_lock+0x35/0x1d0 [ 321.076933] ? __lock_is_held+0xb6/0x140 [ 321.076964] ? check_same_owner+0x320/0x320 [ 321.076983] ? rcu_note_context_switch+0x710/0x710 [ 321.077005] should_failslab+0xec/0x120 [ 321.077017] kmem_cache_alloc_trace+0x4b/0x740 [ 321.077028] ? __kmalloc_node+0x33/0x70 [ 321.077038] ? __kmalloc_node+0x33/0x70 [ 321.077051] ? rcu_read_lock_sched_held+0x108/0x120 [ 321.077071] __memcg_init_list_lru_node+0x169/0x270 [ 321.077088] ? list_lru_add+0x7c0/0x7c0 [ 321.077101] ? __kmalloc_node+0x47/0x70 [ 321.077122] __list_lru_init+0x544/0x750 [ 321.077140] ? memcg_destroy_list_lru_node.isra.7+0x110/0x110 [ 321.077156] ? trace_hardirqs_on_caller+0x421/0x5c0 [ 321.077170] ? __lockdep_init_map+0xe4/0x650 [ 321.077186] ? lockdep_init_map+0x9/0x10 2018/03/31 09:15:28 executing program 7 (fault-call:24 fault-nth:15): perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f000031f000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getpid() r0 = syz_open_dev$vcsn(&(0x7f0000000040)='/dev/vcs#\x00', 0x0, 0x20000) ioctl$GIO_CMAP(r0, 0x4b70, &(0x7f0000000080)) r1 = socket$alg(0x26, 0x5, 0x0) ioctl$sock_SIOCGIFBR(r1, 0x8940, &(0x7f0000000040)=@get={0x1, &(0x7f0000000400)=""/242, 0x100000000}) bind$alg(r1, &(0x7f0000000080)={0x26, 'aead\x00', 0x0, 0x0, 'generic-gcm-aesni\x00'}, 0x58) syz_open_dev$sndmidi(&(0x7f0000000100)='/dev/snd/midiC#D#\x00', 0xfd, 0x0) bind(0xffffffffffffffff, &(0x7f0000000140)=@llc={0x1a, 0x33a, 0x7, 0x80, 0x5, 0x4, @remote={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xbb}}, 0x80) r2 = syz_init_net_socket$nfc_llcp(0x27, 0x1, 0x1) setsockopt$nfc_llcp_NFC_LLCP_MIUX(r2, 0x118, 0x15, &(0x7f0000000000), 0x4) r3 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/cuse\x00', 0x103002, 0x0) futimesat(r3, &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)={{0x0, 0x7530}}) r4 = syz_open_dev$vcsa(&(0x7f00000001c0)='/dev/vcsa#\x00', 0x2, 0x4020ff) sendto$inet6(r4, &(0x7f0000000bc0)="36251e313e0743fc195a1a198a14434e8a0a00b3f452a3b5644e336ec712a16310c9aecc4e3097bc666a8882128a73c368ce731e9fbf3fe18fa52d00", 0x3c, 0x20000000, &(0x7f0000000c40)={0xa, 0x0, 0x6, @dev={0xfe, 0x80, [], 0x19}, 0x1f}, 0x1c) accept$alg(r0, 0x0, 0x0) sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f0000000000)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x8}, 0xb4fcd35419244434, &(0x7f00004ca000)={&(0x7f0000000300)=ANY=[], 0x1a1}, 0x1}, 0x0) syz_fuseblk_mount(&(0x7f0000001380)='./file0\x00', &(0x7f00000013c0)='./file0\x00', 0xf000, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0xb21, 0x0) socket(0x1e, 0x3, 0x0) socket(0x1e, 0x0, 0x0) ptrace$PTRACE_SECCOMP_GET_FILTER(0x420c, 0x0, 0x0, &(0x7f0000000380)=""/113) sched_yield() ioctl$TUNGETIFF(r4, 0x800454d2, &(0x7f0000000140)) ioctl$KIOCSOUND(r4, 0x4b2f, 0xfffffffffffffb74) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000447000)='./file0\x00', &(0x7f00000e1000)='msdos\x00', 0x0, &(0x7f000097bfff)) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000580)='./cgroup/syz0\x00', 0x1ff) syz_open_dev$audion(&(0x7f0000000280)='/dev/audio#\x00', 0x7be, 0x0) [ 321.077202] sget_userns+0x691/0xe40 [ 321.077212] ? kill_litter_super+0x90/0x90 [ 321.077237] ? ns_test_super+0x50/0x50 [ 321.077253] ? destroy_unused_super.part.6+0xd0/0xd0 [ 321.077264] ? do_raw_spin_trylock+0x190/0x190 [ 321.077283] ? kobject_put+0x6b/0x250 [ 321.077303] ? blkdev_get+0x3a1/0xb00 [ 321.077322] ? cap_capable+0x1b5/0x230 [ 321.077334] ? __blkdev_get+0x13b0/0x13b0 [ 321.077351] ? security_capable+0x8e/0xc0 [ 321.077364] ? kill_litter_super+0x90/0x90 [ 321.077376] ? ns_capable_common+0xcf/0x160 [ 321.077389] ? ns_test_super+0x50/0x50 [ 321.077398] ? kill_litter_super+0x90/0x90 [ 321.077409] sget+0xd2/0x120 [ 321.077427] mount_bdev+0x109/0x370 [ 321.077437] ? msdos_mount+0x40/0x40 [ 321.077454] msdos_mount+0x34/0x40 [ 321.077468] mount_fs+0x66/0x2d0 [ 321.077489] vfs_kern_mount.part.26+0xc6/0x4a0 [ 321.077504] ? may_umount+0xa0/0xa0 [ 321.077514] ? _raw_read_unlock+0x22/0x30 [ 321.077526] ? __get_fs_type+0x8a/0xc0 [ 321.077546] do_mount+0xea4/0x2bb0 [ 321.077567] ? copy_mount_string+0x40/0x40 [ 321.077580] ? trace_hardirqs_on_caller+0x421/0x5c0 [ 321.077593] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 321.077612] ? retint_kernel+0x10/0x10 [ 321.077632] ? copy_mount_options+0x18b/0x2e0 [ 321.077645] ? copy_mount_options+0x193/0x2e0 [ 321.077657] ? copy_mount_options+0x1f7/0x2e0 [ 321.077674] SyS_mount+0xab/0x120 [ 321.077684] ? copy_mnt_ns+0xb30/0xb30 [ 321.077698] do_syscall_64+0x281/0x940 [ 321.077709] ? vmalloc_sync_all+0x30/0x30 [ 321.077720] ? _raw_spin_unlock_irq+0x27/0x70 [ 321.077732] ? finish_task_switch+0x1c1/0x7e0 [ 321.077745] ? syscall_return_slowpath+0x550/0x550 [ 321.077759] ? syscall_return_slowpath+0x2ac/0x550 [ 321.077772] ? prepare_exit_to_usermode+0x350/0x350 [ 321.077786] ? entry_SYSCALL_64_after_hwframe+0x52/0xb7 [ 321.077806] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 321.077828] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 321.077838] RIP: 0033:0x454e79 [ 321.077845] RSP: 002b:00007f37fba8ec68 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 321.077858] RAX: ffffffffffffffda RBX: 00007f37fba8f6d4 RCX: 0000000000454e79 [ 321.077865] RDX: 00000000200e1000 RSI: 0000000020447000 RDI: 0000000020000000 [ 321.077872] RBP: 000000000072bea0 R08: 000000002097bfff R09: 0000000000000000 [ 321.077878] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000019 [ 321.077885] R13: 00000000000003fa R14: 00000000006f8010 R15: 000000000000000e [ 321.078529] FAT-fs (loop199): unable to read boot sector [ 321.158640] binder: 31285:31305 unknown command 26 [ 321.180836] FAT-fs (loop199): unable to read boot sector [ 321.319895] binder: 31285:31305 ioctl c0306201 20000340 returned -22 2018/03/31 09:15:28 executing program 3: r0 = syz_open_dev$random(&(0x7f00000001c0)='/dev/random\x00', 0x0, 0x800) r1 = syz_open_dev$loop(&(0x7f0000308000)='/dev/loop#\x00', 0x0, 0x0) ioctl$LOOP_SET_STATUS(r1, 0xc0481273, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "3900ea631d00000000020000010000009f00000023f7b7d65f90b0e6330ee739b319d8f6aa6bd58d1443474482e85040fb4947ebb55bd19f335b5bffff0001f3", "cfa430745a540dc1c149b7b81579f6a41c51f7d51933223e82ab867dac761faf"}) write(0xffffffffffffffff, &(0x7f0000000bc0)="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", 0x15b) setsockopt$inet_sctp6_SCTP_RECVNXTINFO(0xffffffffffffffff, 0x84, 0x21, &(0x7f00000003c0)=0x200, 0x4) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f00000000c0)=0x0) getsockopt$netrom_NETROM_T4(0xffffffffffffffff, 0x103, 0x6, &(0x7f0000000300)=0x8, &(0x7f0000000340)=0x4) r3 = getpid() sched_setparam(r3, &(0x7f0000000400)) syz_open_dev$loop(&(0x7f0000000380)='/dev/loop#\x00', 0xa9b, 0x80) r4 = memfd_create(&(0x7f0000614000)="74086e750000000000000000008c00", 0x0) pwritev(r4, &(0x7f0000f50f90)=[{&(0x7f0000000040)="aa", 0x1}], 0x1, 0x0) fcntl$getownex(r1, 0x10, &(0x7f0000000240)={0x0, 0x0}) r6 = syz_open_procfs(r5, &(0x7f0000000280)='stat\x00') epoll_ctl$EPOLL_CTL_MOD(r4, 0x3, r0, &(0x7f00000002c0)={0x20000010}) accept4$inet6(r4, &(0x7f0000000100)={0x0, 0x0, 0x0, @mcast1}, &(0x7f0000000140)=0x1c, 0x7fd) getsockopt$inet_IP_IPSEC_POLICY(r4, 0x0, 0x10, &(0x7f0000000940)={{{@in6=@local, @in6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@loopback}, 0x0, @in=@local}}, &(0x7f0000000780)=0xe8) getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f00000007c0)={0x0, 0x0, 0x0}, &(0x7f0000000540)=0xc) fchown(r4, r7, r8) r9 = syz_open_dev$binder(&(0x7f0000000100)='/dev/binder#\x00', 0xffffffffffffffff, 0x806) ioctl$BINDER_SET_CONTEXT_MGR(r6, 0x40046207, 0x0) mmap$binder(&(0x7f000000c000/0x2000)=nil, 0x2000, 0x0, 0x12, r9, 0x0) ioctl$BINDER_WRITE_READ(r9, 0xc0306201, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000), 0x0, 0x0, &(0x7f0000011f9d)}) getsockopt$inet_sctp6_SCTP_AUTO_ASCONF(0xffffffffffffffff, 0x84, 0x1e, &(0x7f0000000140), &(0x7f0000000180)=0x4) ioctl$BINDER_WRITE_READ(r9, 0xc0306201, &(0x7f0000000340)={0x8, 0x0, &(0x7f0000000440)=ANY=[@ANYRES64=r1], 0x0, 0x0, &(0x7f0000000240)}) write(0xffffffffffffffff, &(0x7f0000000300)="8be25f5790f664f32509e40d6f879d5add7e2d359c9a19afb750a2d25352875d187d4118c99a2d5c6db433c277cc7d345b87a34f1b417033d367cb0cfd6a25633f77aafb17e99c33cb65352c901ae75176f07bb0a4bb5ebff3d87e", 0x5b) r10 = ioctl$LOOP_CTL_GET_FREE(r4, 0x4c82) ioctl$LOOP_CTL_REMOVE(r6, 0x4c81, r10) openat$cgroup(0xffffffffffffff9c, &(0x7f0000000000)='syz0\x00', 0x200002, 0x0) sched_setaffinity(r2, 0x8, &(0x7f0000000200)=0x7) [ 321.328725] FAULT_INJECTION: forcing a failure. [ 321.328725] name failslab, interval 1, probability 0, space 0, times 0 [ 321.461438] CPU: 1 PID: 31310 Comm: syz-executor7 Not tainted 4.16.0-rc7+ #8 [ 321.461444] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 321.461448] Call Trace: [ 321.461466] dump_stack+0x194/0x24d [ 321.484145] ? arch_local_irq_restore+0x53/0x53 [ 321.488812] ? __save_stack_trace+0x7e/0xd0 [ 321.493133] should_fail+0x8c0/0xa40 [ 321.496843] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 321.501939] ? kasan_kmalloc+0xad/0xe0 [ 321.505822] ? kmem_cache_alloc_trace+0x136/0x740 [ 321.510656] ? __memcg_init_list_lru_node+0x169/0x270 [ 321.515837] ? __list_lru_init+0x544/0x750 [ 321.519612] binder: 31311:31312 unknown command 20 [ 321.520059] ? sget_userns+0x691/0xe40 [ 321.520070] ? mount_fs+0x66/0x2d0 [ 321.520081] ? vfs_kern_mount.part.26+0xc6/0x4a0 [ 321.520089] ? do_mount+0xea4/0x2bb0 [ 321.520100] ? do_syscall_64+0x281/0x940 [ 321.520111] ? entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 321.520125] ? find_held_lock+0x35/0x1d0 [ 321.546275] binder: 31311:31312 ioctl c0306201 20000340 returned -22 [ 321.550219] ? __lock_is_held+0xb6/0x140 [ 321.550241] ? check_same_owner+0x320/0x320 [ 321.550256] ? rcu_note_context_switch+0x710/0x710 [ 321.550274] should_failslab+0xec/0x120 [ 321.550285] kmem_cache_alloc_trace+0x4b/0x740 [ 321.550294] ? __kmalloc_node+0x33/0x70 [ 321.550304] ? __kmalloc_node+0x33/0x70 [ 321.590473] ? rcu_read_lock_sched_held+0x108/0x120 [ 321.595488] __memcg_init_list_lru_node+0x169/0x270 [ 321.600496] ? list_lru_add+0x7c0/0x7c0 [ 321.604462] ? __kmalloc_node+0x47/0x70 [ 321.608431] __list_lru_init+0x544/0x750 [ 321.612360] binder: 31311:31313 unknown command 25 [ 321.612484] ? memcg_destroy_list_lru_node.isra.7+0x110/0x110 [ 321.623270] ? trace_hardirqs_on_caller+0x421/0x5c0 [ 321.628276] ? __lockdep_init_map+0xe4/0x650 [ 321.628594] binder: 31311:31313 ioctl c0306201 20000340 returned -22 [ 321.632670] ? lockdep_init_map+0x9/0x10 [ 321.632688] sget_userns+0x691/0xe40 [ 321.632697] ? kill_litter_super+0x90/0x90 [ 321.632710] ? ns_test_super+0x50/0x50 [ 321.632721] ? destroy_unused_super.part.6+0xd0/0xd0 [ 321.632730] ? do_raw_spin_trylock+0x190/0x190 [ 321.632743] ? kobject_put+0x6b/0x250 [ 321.632757] ? blkdev_get+0x3a1/0xb00 [ 321.672240] ? cap_capable+0x1b5/0x230 [ 321.676121] ? __blkdev_get+0x13b0/0x13b0 [ 321.680261] ? security_capable+0x8e/0xc0 [ 321.684397] ? kill_litter_super+0x90/0x90 [ 321.688623] ? ns_capable_common+0xcf/0x160 [ 321.692935] ? ns_test_super+0x50/0x50 [ 321.696809] ? kill_litter_super+0x90/0x90 [ 321.701032] sget+0xd2/0x120 [ 321.704047] mount_bdev+0x109/0x370 [ 321.707660] ? msdos_mount+0x40/0x40 [ 321.711370] msdos_mount+0x34/0x40 [ 321.714904] mount_fs+0x66/0x2d0 [ 321.718268] vfs_kern_mount.part.26+0xc6/0x4a0 [ 321.722843] ? may_umount+0xa0/0xa0 [ 321.726460] ? _raw_read_unlock+0x22/0x30 [ 321.730597] ? __get_fs_type+0x8a/0xc0 [ 321.734485] do_mount+0xea4/0x2bb0 [ 321.738027] ? copy_mount_string+0x40/0x40 [ 321.742255] ? trace_hardirqs_on_caller+0x421/0x5c0 2018/03/31 09:15:28 executing program 3: r0 = syz_open_dev$random(&(0x7f0000000380)='/dev/random\x00', 0x0, 0x40000000800) r1 = syz_open_dev$loop(&(0x7f0000308000)='/dev/loop#\x00', 0x0, 0x0) ioctl$LOOP_SET_STATUS(r1, 0xc0481273, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "3900ea631d00000000020000010000009f00000023f7b7d65f90b0e6330ee739b319d8f6aa6bd58d1443474482e85040fb4947ebb55bd19f335b5bffff0001f3", "cfa430745a540dc1c149b7b81579f6a41c51f7d51933223e82ab867dac761faf"}) write(0xffffffffffffffff, &(0x7f00000001c0), 0x0) setsockopt$inet_sctp6_SCTP_RECVNXTINFO(0xffffffffffffffff, 0x84, 0x21, &(0x7f00000003c0)=0x200, 0x4) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f00000000c0)=0x0) ioctl$KVM_CREATE_DEVICE(0xffffffffffffffff, 0xc00caee0, &(0x7f0000000500)={0x7, r1, 0x1}) getsockopt$netrom_NETROM_T4(r3, 0x103, 0x6, &(0x7f00000001c0)=0x8, &(0x7f0000000480)=0x4) r4 = getpid() sched_setparam(r4, &(0x7f0000000400)) r5 = syz_open_dev$loop(&(0x7f0000ca9ff5)='/dev/loop#\x00', 0x0, 0x82) r6 = memfd_create(&(0x7f0000614000)="74086e750000000000000000008c00", 0x0) pwritev(r6, &(0x7f0000f50f90)=[{&(0x7f0000000040)="aa", 0x1}], 0x1, 0x0) fcntl$getownex(r1, 0x10, &(0x7f0000000240)={0x0, 0x0}) r8 = syz_open_procfs(r7, &(0x7f0000000280)='stat\x00') epoll_ctl$EPOLL_CTL_MOD(r8, 0x3, r5, &(0x7f00000002c0)={0x20000010}) r9 = accept4$inet6(r6, &(0x7f0000000100)={0x0, 0x0, 0x0, @mcast1}, &(0x7f0000000140)=0x1c, 0x7fd) getsockopt$inet_IP_IPSEC_POLICY(r6, 0x0, 0x10, &(0x7f0000000940)={{{@in6=@local, @in6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@loopback}, 0x0, @in=@local}}, &(0x7f0000000780)=0xe8) getsockopt$sock_cred(r6, 0x1, 0x11, &(0x7f00000007c0)={0x0, 0x0, 0x0}, &(0x7f0000000540)=0xc) fchown(r6, r10, r11) r12 = syz_open_dev$binder(&(0x7f0000000100)='/dev/binder#\x00', 0xffffffffffffffff, 0x800) ioctl$BINDER_SET_CONTEXT_MGR(r3, 0x40046207, 0x0) mmap$binder(&(0x7f000000c000/0x2000)=nil, 0x2000, 0x0, 0x12, r12, 0x0) ioctl$BINDER_WRITE_READ(r12, 0xc0306201, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000), 0x0, 0x0, &(0x7f0000011f9d)}) getsockopt$inet_sctp6_SCTP_AUTO_ASCONF(r9, 0x84, 0x1e, &(0x7f0000000300), &(0x7f0000000180)=0x4) ioctl$BINDER_WRITE_READ(r12, 0xc0306201, &(0x7f0000000340)={0x8, 0x0, &(0x7f0000000440)=ANY=[@ANYRES64=r1], 0x0, 0x0, &(0x7f0000000240)}) write(r0, &(0x7f0000000580)="8be25f5790f664f32509e40d6f879d5add7e2d359c9a19afb750a2d25352875d187d4118c99a2d5c6db433c277cc7d345b87a34f1b417033d367cb0cfd6a25633f77aafb17e99c33cb65352c901ae75176f07bb0a4bb5ebff3d87e", 0xffffff58) r13 = ioctl$LOOP_CTL_GET_FREE(r6, 0x4c82) ioctl$LOOP_CTL_REMOVE(r8, 0x4c81, r13) openat$cgroup(0xffffffffffffff9c, &(0x7f0000000000)='syz0\x00', 0x200002, 0x0) sched_setaffinity(r2, 0x8, &(0x7f0000000200)=0x7) [ 321.747266] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 321.752024] ? retint_kernel+0x10/0x10 [ 321.755910] ? copy_mount_options+0x18b/0x2e0 [ 321.760403] ? copy_mount_options+0x193/0x2e0 [ 321.764895] ? copy_mount_options+0x1f7/0x2e0 [ 321.769387] SyS_mount+0xab/0x120 [ 321.772830] ? copy_mnt_ns+0xb30/0xb30 [ 321.776714] do_syscall_64+0x281/0x940 [ 321.780599] ? vmalloc_sync_all+0x30/0x30 [ 321.784742] ? _raw_spin_unlock_irq+0x27/0x70 [ 321.789227] ? finish_task_switch+0x1c1/0x7e0 [ 321.793717] ? syscall_return_slowpath+0x550/0x550 [ 321.798644] ? syscall_return_slowpath+0x2ac/0x550 [ 321.803578] ? prepare_exit_to_usermode+0x350/0x350 [ 321.808588] ? entry_SYSCALL_64_after_hwframe+0x52/0xb7 [ 321.809174] binder: 31314:31316 unknown command 20 [ 321.813943] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 321.813961] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 321.813970] RIP: 0033:0x454e79 [ 321.813976] RSP: 002b:00007f37fba8ec68 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 321.813987] RAX: ffffffffffffffda RBX: 00007f37fba8f6d4 RCX: 0000000000454e79 2018/03/31 09:15:28 executing program 4: perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f000031f000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) prctl$void(0x0) getpid() r0 = syz_open_dev$vcsn(&(0x7f0000000040)='/dev/vcs#\x00', 0x0, 0x20000) ioctl$GIO_CMAP(r0, 0x4b70, &(0x7f0000000080)) r1 = socket$alg(0x26, 0x5, 0x0) ioctl$sock_SIOCGIFBR(0xffffffffffffffff, 0x8940, &(0x7f0000000040)=@get={0x1, &(0x7f0000000400)=""/242, 0x100000000}) bind$alg(r1, &(0x7f0000000080)={0x26, 'aead\x00', 0x0, 0x0, 'generic-gcm-aesni\x00'}, 0x58) syz_open_dev$sndmidi(&(0x7f0000000100)='/dev/snd/midiC#D#\x00', 0xfd, 0x0) bind(0xffffffffffffffff, &(0x7f0000000140)=@llc={0x1a, 0x33a, 0x7, 0x80, 0x0, 0x4, @remote={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xbb}}, 0x80) r2 = syz_init_net_socket$nfc_llcp(0x27, 0x1, 0x1) setsockopt$nfc_llcp_NFC_LLCP_MIUX(r2, 0x118, 0x15, &(0x7f0000000000), 0x4) r3 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/cuse\x00', 0x103002, 0x0) futimesat(r3, &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)={{0x0, 0x7530}}) r4 = syz_open_dev$vcsa(&(0x7f00000001c0)='/dev/vcsa#\x00', 0x2, 0x0) sendto$inet6(r4, &(0x7f0000000bc0), 0x0, 0x20000000, &(0x7f0000000c40)={0xa, 0x4e20, 0x0, @dev={0xfe, 0x80, [], 0x19}, 0x1f}, 0x1c) accept$alg(r0, 0x0, 0x0) sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f0000000000)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x8}, 0xb4fcd35419244434, &(0x7f00004ca000)={&(0x7f0000000300)=ANY=[], 0x1a1}, 0x1}, 0x0) syz_fuseblk_mount(&(0x7f0000001380)='./file0\x00', &(0x7f00000013c0)='./file0\x00', 0xf000, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0xb21, 0x0) socket(0x400000000d, 0x2, 0x4) ptrace$PTRACE_SECCOMP_GET_FILTER(0x420c, 0x0, 0x0, &(0x7f0000000380)=""/113) sched_yield() ioctl$TUNGETIFF(r4, 0x800454d2, &(0x7f0000000140)) ioctl$KIOCSOUND(r4, 0x4b2f, 0xfffffffffffffb74) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x20, 0x9b}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000447000)='./file0\x00', &(0x7f00000e1000)='msdos\x00', 0x0, &(0x7f000097bfff)) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000580)='./cgroup/syz0\x00', 0x1ff) [ 321.813993] RDX: 00000000200e1000 RSI: 0000000020447000 RDI: 0000000020000000 [ 321.813999] RBP: 000000000072bea0 R08: 000000002097bfff R09: 0000000000000000 [ 321.814005] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000019 [ 321.814010] R13: 00000000000003fa R14: 00000000006f8010 R15: 000000000000000f [ 321.845842] FAT-fs (loop199): unable to read boot sector [ 321.851139] binder: 31314:31316 ioctl c0306201 20000340 returned -22 2018/03/31 09:15:29 executing program 6: perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f000031f000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) prctl$void(0x0) getpid() r0 = syz_open_dev$vcsn(&(0x7f0000000040)='/dev/vcs#\x00', 0x0, 0x20000) ioctl$GIO_CMAP(r0, 0x4b70, &(0x7f0000000080)) r1 = socket$alg(0x26, 0x5, 0x0) ioctl$sock_SIOCGIFBR(0xffffffffffffffff, 0x8940, &(0x7f0000000040)=@get={0x1, &(0x7f0000000400)=""/242, 0x100000000}) bind$alg(r1, &(0x7f0000000080)={0x26, 'aead\x00', 0x0, 0x0, 'generic-gcm-aesni\x00'}, 0x58) syz_open_dev$sndmidi(&(0x7f0000000100)='/dev/snd/midiC#D#\x00', 0xfd, 0x0) bind(0xffffffffffffffff, &(0x7f0000000140)=@llc={0x1a, 0x33a, 0x7, 0x80, 0x0, 0x4, @remote={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xbb}}, 0x80) r2 = syz_init_net_socket$nfc_llcp(0x27, 0x1, 0x1) setsockopt$nfc_llcp_NFC_LLCP_MIUX(r2, 0x118, 0x15, &(0x7f0000000000), 0x4) r3 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/cuse\x00', 0x103002, 0x0) futimesat(r3, &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)={{0x0, 0x7530}}) r4 = syz_open_dev$vcsa(&(0x7f00000001c0)='/dev/vcsa#\x00', 0x2, 0x0) sendto$inet6(r4, &(0x7f0000000bc0), 0x0, 0x20000000, &(0x7f0000000c40)={0xa, 0x4e20, 0x0, @dev={0xfe, 0x80, [], 0x19}, 0x1f}, 0x1c) accept$alg(r0, 0x0, 0x0) sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f0000000000)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x8}, 0xb4fcd35419244434, &(0x7f00004ca000)={&(0x7f0000000300)=ANY=[], 0x1a1}, 0x1}, 0x0) syz_fuseblk_mount(&(0x7f0000001380)='./file0\x00', &(0x7f00000013c0)='./file0\x00', 0xf000, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0xb21, 0x0) socket(0x1e, 0x0, 0x0) socket(0x1e, 0x0, 0x0) ptrace$PTRACE_SECCOMP_GET_FILTER(0x420c, 0x0, 0x0, &(0x7f0000000380)=""/113) sched_yield() ioctl$TUNGETIFF(r4, 0x800454d2, &(0x7f0000000140)) ioctl$KIOCSOUND(r4, 0x4b2f, 0xfffffffffffffb74) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x20, 0x9b}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000447000)='./file0\x00', &(0x7f00000e1000)='msdos\x00', 0x0, &(0x7f000097bfff)) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000580)='./cgroup/syz0\x00', 0x1ff) 2018/03/31 09:15:29 executing program 7 (fault-call:24 fault-nth:16): perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f000031f000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getpid() r0 = syz_open_dev$vcsn(&(0x7f0000000040)='/dev/vcs#\x00', 0x0, 0x20000) ioctl$GIO_CMAP(r0, 0x4b70, &(0x7f0000000080)) r1 = socket$alg(0x26, 0x5, 0x0) ioctl$sock_SIOCGIFBR(r1, 0x8940, &(0x7f0000000040)=@get={0x1, &(0x7f0000000400)=""/242, 0x100000000}) bind$alg(r1, &(0x7f0000000080)={0x26, 'aead\x00', 0x0, 0x0, 'generic-gcm-aesni\x00'}, 0x58) syz_open_dev$sndmidi(&(0x7f0000000100)='/dev/snd/midiC#D#\x00', 0xfd, 0x0) bind(0xffffffffffffffff, &(0x7f0000000140)=@llc={0x1a, 0x33a, 0x7, 0x80, 0x5, 0x4, @remote={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xbb}}, 0x80) r2 = syz_init_net_socket$nfc_llcp(0x27, 0x1, 0x1) setsockopt$nfc_llcp_NFC_LLCP_MIUX(r2, 0x118, 0x15, &(0x7f0000000000), 0x4) r3 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/cuse\x00', 0x103002, 0x0) futimesat(r3, &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)={{0x0, 0x7530}}) r4 = syz_open_dev$vcsa(&(0x7f00000001c0)='/dev/vcsa#\x00', 0x2, 0x4020ff) sendto$inet6(r4, &(0x7f0000000bc0)="36251e313e0743fc195a1a198a14434e8a0a00b3f452a3b5644e336ec712a16310c9aecc4e3097bc666a8882128a73c368ce731e9fbf3fe18fa52d00", 0x3c, 0x20000000, &(0x7f0000000c40)={0xa, 0x0, 0x6, @dev={0xfe, 0x80, [], 0x19}, 0x1f}, 0x1c) accept$alg(r0, 0x0, 0x0) sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f0000000000)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x8}, 0xb4fcd35419244434, &(0x7f00004ca000)={&(0x7f0000000300)=ANY=[], 0x1a1}, 0x1}, 0x0) syz_fuseblk_mount(&(0x7f0000001380)='./file0\x00', &(0x7f00000013c0)='./file0\x00', 0xf000, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0xb21, 0x0) socket(0x1e, 0x3, 0x0) socket(0x1e, 0x0, 0x0) ptrace$PTRACE_SECCOMP_GET_FILTER(0x420c, 0x0, 0x0, &(0x7f0000000380)=""/113) sched_yield() ioctl$TUNGETIFF(r4, 0x800454d2, &(0x7f0000000140)) ioctl$KIOCSOUND(r4, 0x4b2f, 0xfffffffffffffb74) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000447000)='./file0\x00', &(0x7f00000e1000)='msdos\x00', 0x0, &(0x7f000097bfff)) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000580)='./cgroup/syz0\x00', 0x1ff) syz_open_dev$audion(&(0x7f0000000280)='/dev/audio#\x00', 0x7be, 0x0) [ 321.904502] FAT-fs (loop199): unable to read boot sector [ 321.916390] FAT-fs (loop199): unable to read boot sector [ 321.931766] FAT-fs (loop199): unable to read boot sector 2018/03/31 09:15:29 executing program 5: perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f000031f000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) prctl$void(0x0) getpid() r0 = syz_open_dev$vcsn(&(0x7f0000000040)='/dev/vcs#\x00', 0x0, 0x20000) ioctl$GIO_CMAP(r0, 0x4b70, &(0x7f0000000080)) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000080)={0x26, 'aead\x00', 0x0, 0x0, 'generic-gcm-aesni\x00'}, 0x58) syz_open_dev$sndmidi(&(0x7f0000000100)='/dev/snd/midiC#D#\x00', 0xfd, 0x0) bind(0xffffffffffffffff, &(0x7f0000000140)=@llc={0x1a, 0x33a, 0x7, 0x80, 0x5, 0x4, @remote={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xbb}}, 0xfffffffffffffc4c) r2 = syz_init_net_socket$nfc_llcp(0x27, 0x1, 0x1) setsockopt$nfc_llcp_NFC_LLCP_MIUX(r2, 0x118, 0x15, &(0x7f0000000000), 0x4) r3 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/cuse\x00', 0x103002, 0x0) futimesat(r3, &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)={{0x0, 0x7530}}) r4 = syz_open_dev$vcsa(&(0x7f00000001c0)='/dev/vcsa#\x00', 0x2, 0x4020ff) sendto$inet6(0xffffffffffffffff, &(0x7f0000000bc0)="36251e313e0743fc195a1a198a14434e8a0a00b3f452a3b5644e336ec712a16310c9aecc4e3097bc666a8882128a73c368ce731e9fbf3fe18fa52d", 0x3b, 0x20000000, &(0x7f0000000c40)={0xa, 0x4e23, 0x6, @dev={0xfe, 0x80, [], 0x19}, 0x1f}, 0x1c) accept$alg(r0, 0x0, 0x0) sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f0000000000)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x8}, 0xb4fcd35419244434, &(0x7f00004ca000)={&(0x7f0000000300)=ANY=[], 0x1a1}, 0x1}, 0x0) syz_fuseblk_mount(&(0x7f0000001380)='./file0\x00', &(0x7f00000013c0)='./file0\x00', 0xf000, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0xb21, 0x0) socket(0x1, 0x3, 0x101) socket(0x1e, 0x0, 0x0) ptrace$PTRACE_SECCOMP_GET_FILTER(0x420c, 0x0, 0x0, &(0x7f0000000380)=""/113) sched_yield() ioctl$TUNGETIFF(r4, 0x800454d2, &(0x7f0000000140)) ioctl$KIOCSOUND(r4, 0x4b2f, 0xfffffffffffffb74) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x20, 0x9b}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg$nl_netfilter(r4, &(0x7f0000000340)={&(0x7f0000000200)={0x10}, 0xc, &(0x7f0000000240)={&(0x7f00000002c0)={0x4c, 0x5, 0xf, 0x210, 0x70bd26, 0x25dfdbff, {0x7, 0x0, 0x8}, [@generic="184283ac4f546988e0dee72f6fe4cebf832eb65e169bae12b9dfd2a3400584554e5319d8558911107bdf5c77d2f1ad665e869ef6e70788"]}, 0x4c}, 0x1, 0x0, 0x0, 0x1}, 0x0) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000447000)='./file0\x00', &(0x7f00000e1000)='msdos\x00', 0x0, &(0x7f000097bfff)) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000580)='./cgroup/syz0\x00', 0x1ff) syz_open_dev$audion(&(0x7f0000000280)='/dev/audio#\x00', 0x7be, 0x0) [ 321.958410] FAT-fs (loop199): unable to read boot sector [ 321.977165] binder: 31314:31316 unknown command 26 [ 322.003246] binder: 31314:31316 ioctl c0306201 20000340 returned -22 [ 322.016413] FAULT_INJECTION: forcing a failure. [ 322.016413] name failslab, interval 1, probability 0, space 0, times 0 [ 322.027698] CPU: 1 PID: 31331 Comm: syz-executor7 Not tainted 4.16.0-rc7+ #8 [ 322.034875] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 322.044220] Call Trace: [ 322.046806] dump_stack+0x194/0x24d [ 322.050433] ? arch_local_irq_restore+0x53/0x53 [ 322.055096] ? __save_stack_trace+0x7e/0xd0 [ 322.059422] should_fail+0x8c0/0xa40 [ 322.063137] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 322.068236] ? kasan_kmalloc+0xad/0xe0 [ 322.072121] ? kmem_cache_alloc_trace+0x136/0x740 [ 322.076963] ? __memcg_init_list_lru_node+0x169/0x270 [ 322.082142] ? __list_lru_init+0x544/0x750 [ 322.086363] ? sget_userns+0x691/0xe40 [ 322.090242] ? mount_fs+0x66/0x2d0 [ 322.093773] ? vfs_kern_mount.part.26+0xc6/0x4a0 [ 322.098514] ? do_mount+0xea4/0x2bb0 2018/03/31 09:15:29 executing program 4: perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f000031f000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) prctl$void(0x0) getpid() r0 = syz_open_dev$vcsn(&(0x7f0000000040)='/dev/vcs#\x00', 0x0, 0x20000) ioctl$GIO_CMAP(r0, 0x4b70, &(0x7f0000000080)) r1 = socket$alg(0x26, 0x5, 0x0) ioctl$sock_SIOCGIFBR(0xffffffffffffffff, 0x8940, &(0x7f0000000040)=@get={0x1, &(0x7f0000000400)=""/242, 0x100000000}) bind$alg(r1, &(0x7f0000000080)={0x26, 'aead\x00', 0x0, 0x0, 'generic-gcm-aesni\x00'}, 0x58) r2 = syz_open_dev$sndmidi(&(0x7f0000000100)='/dev/snd/midiC#D#\x00', 0xfd, 0x0) bind(0xffffffffffffffff, &(0x7f0000000140)=@llc={0x1a, 0x33a, 0x7, 0x80, 0x0, 0x4, @remote={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xbb}}, 0x80) r3 = syz_init_net_socket$nfc_llcp(0x27, 0x1, 0x1) setsockopt$nfc_llcp_NFC_LLCP_MIUX(r3, 0x118, 0x15, &(0x7f0000000000), 0x4) r4 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/cuse\x00', 0x103002, 0x0) futimesat(r4, &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)={{0x0, 0x7530}}) r5 = syz_open_dev$vcsa(&(0x7f00000001c0)='/dev/vcsa#\x00', 0x2, 0x0) sendto$inet6(r5, &(0x7f0000000bc0), 0x0, 0x20000000, &(0x7f0000000c40)={0xa, 0x4e20, 0x0, @dev={0xfe, 0x80, [], 0x19}, 0x1f}, 0x1c) accept$alg(r0, 0x0, 0x0) sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f0000000000)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x8}, 0xb4fcd35419244434, &(0x7f00004ca000)={&(0x7f0000000300)=ANY=[], 0x1a1}, 0x1}, 0x0) syz_fuseblk_mount(&(0x7f0000001380)='./file0\x00', &(0x7f00000013c0)='./file0\x00', 0xf000, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0xb21, 0x0) socket(0x1e, 0x3, 0x0) socket(0x1e, 0x0, 0x0) ptrace$PTRACE_SECCOMP_GET_FILTER(0x420c, 0x0, 0x0, &(0x7f0000000380)=""/113) sched_yield() ioctl$TUNGETIFF(r5, 0x800454d2, &(0x7f0000000140)) ioctl$KIOCSOUND(r5, 0x4b2f, 0xfffffffffffffb74) ioctl$DRM_IOCTL_PRIME_HANDLE_TO_FD(r0, 0xc00c642d, &(0x7f0000000200)={0x0, 0x80000, r2}) ioctl$DRM_IOCTL_PRIME_HANDLE_TO_FD(r2, 0xc00c642d, &(0x7f0000000240)={r6, 0x80000, r5}) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x20, 0x9b}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000447000)='./file0\x00', &(0x7f00000e1000)='msdos\x00', 0x0, &(0x7f000097bfff)) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000580)='./cgroup/syz0\x00', 0x1ff) [ 322.102217] ? do_syscall_64+0x281/0x940 [ 322.106266] ? entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 322.111621] ? find_held_lock+0x35/0x1d0 [ 322.115679] ? __lock_is_held+0xb6/0x140 [ 322.119742] ? check_same_owner+0x320/0x320 [ 322.124053] ? rcu_note_context_switch+0x710/0x710 [ 322.128982] should_failslab+0xec/0x120 [ 322.132949] kmem_cache_alloc_trace+0x4b/0x740 [ 322.137523] ? __kmalloc_node+0x33/0x70 [ 322.141489] ? __kmalloc_node+0x33/0x70 [ 322.145462] ? rcu_read_lock_sched_held+0x108/0x120 2018/03/31 09:15:29 executing program 6: perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f000031f000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) prctl$void(0x0) getpid() r0 = syz_open_dev$vcsn(&(0x7f0000000040)='/dev/vcs#\x00', 0x0, 0x20000) ioctl$GIO_CMAP(r0, 0x4b70, &(0x7f0000000080)) r1 = socket$alg(0x26, 0x5, 0x0) ioctl$sock_SIOCGIFBR(0xffffffffffffffff, 0x8940, &(0x7f0000000040)=@get={0x1, &(0x7f0000000400)=""/242, 0x100000000}) bind$alg(r1, &(0x7f0000000080)={0x26, 'aead\x00', 0x0, 0x0, 'generic-gcm-aesni\x00'}, 0x58) syz_open_dev$sndmidi(&(0x7f0000000100)='/dev/snd/midiC#D#\x00', 0xfd, 0x0) bind(0xffffffffffffffff, &(0x7f0000000140)=@llc={0x1a, 0x33a, 0x7, 0x80, 0x0, 0x4, @remote={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xbb}}, 0x80) r2 = syz_init_net_socket$nfc_llcp(0x27, 0x1, 0x1) setsockopt$nfc_llcp_NFC_LLCP_MIUX(r2, 0x118, 0x15, &(0x7f0000000000), 0x4) r3 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/cuse\x00', 0x103002, 0x0) futimesat(r3, &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)={{0x0, 0x7530}}) r4 = syz_open_dev$vcsa(&(0x7f00000001c0)='/dev/vcsa#\x00', 0x2, 0x0) sendto$inet6(r4, &(0x7f0000000bc0), 0x0, 0x20000000, &(0x7f0000000c40)={0xa, 0x4e20, 0x0, @dev={0xfe, 0x80, [], 0x19}, 0x1f}, 0x1c) accept$alg(r0, 0x0, 0x0) sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f0000000000)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x8}, 0xb4fcd35419244434, &(0x7f00004ca000)={&(0x7f0000000300)=ANY=[], 0x1a1}, 0x1}, 0x0) syz_fuseblk_mount(&(0x7f0000001380)='./file0\x00', &(0x7f00000013c0)='./file0\x00', 0xf000, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0xb21, 0x0) socket(0x1e, 0x0, 0x0) socket(0x1e, 0x0, 0x0) ptrace$PTRACE_SECCOMP_GET_FILTER(0x420c, 0x0, 0x0, &(0x7f0000000380)=""/113) sched_yield() ioctl$TUNGETIFF(r4, 0x800454d2, &(0x7f0000000140)) ioctl$KIOCSOUND(r4, 0x4b2f, 0xfffffffffffffb74) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x20, 0x9b}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000447000)='./file0\x00', &(0x7f00000e1000)='msdos\x00', 0x0, &(0x7f000097bfff)) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000580)='./cgroup/syz0\x00', 0x1ff) 2018/03/31 09:15:29 executing program 3: r0 = syz_open_dev$random(&(0x7f00000001c0)='/dev/random\x00', 0x0, 0x800) r1 = syz_open_dev$loop(&(0x7f0000308000)='/dev/loop#\x00', 0x0, 0x0) ioctl$LOOP_SET_STATUS(r1, 0xc0481273, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "3900ea631d00000000020000010000009f00000023f7b7d65f90b0e6330ee739b319d8f6aa6bd58d1443474482e85040fb4947ebb55bd19f335b5bffff0001f3", "cfa430745a540dc1c149b7b81579f6a41c51f7d51933223e82ab867dac761faf"}) write(0xffffffffffffffff, &(0x7f00000001c0), 0x0) setsockopt$inet_sctp6_SCTP_RECVNXTINFO(0xffffffffffffffff, 0x84, 0x21, &(0x7f00000003c0)=0x200, 0x4) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f00000000c0)=0x0) getsockopt$netrom_NETROM_T4(0xffffffffffffffff, 0x103, 0x6, &(0x7f0000000300)=0x8, &(0x7f0000000340)=0x4) r3 = getpid() sched_setparam(r3, &(0x7f0000000400)) syz_open_dev$loop(&(0x7f0000ca9ff5)='/dev/loop#\x00', 0x0, 0x82) r4 = memfd_create(&(0x7f0000614000)="74086e750000000000000000008c00", 0x0) pwritev(r4, &(0x7f0000f50f90)=[{&(0x7f0000000040)="aa", 0x1}], 0x1, 0x0) fcntl$getownex(r0, 0x10, &(0x7f0000000380)={0x0, 0x0}) r6 = syz_open_procfs(r5, &(0x7f0000000280)='stat\x00') epoll_ctl$EPOLL_CTL_MOD(r4, 0x3, r0, &(0x7f00000002c0)={0x20000010}) accept4$inet6(r4, &(0x7f0000000100)={0x0, 0x0, 0x0, @mcast1}, &(0x7f0000000140)=0x1c, 0x7fd) getsockopt$inet_IP_IPSEC_POLICY(r4, 0x0, 0x10, &(0x7f0000000940)={{{@in6=@local, @in6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@loopback}, 0x0, @in=@local}}, &(0x7f0000000780)=0xe8) getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f00000007c0)={0x0, 0x0, 0x0}, &(0x7f0000000540)=0xc) fchown(r4, r7, r8) r9 = syz_open_dev$binder(&(0x7f0000000100)='/dev/binder#\x00', 0xffffffffffffffff, 0x806) ioctl$BINDER_SET_CONTEXT_MGR(r6, 0x40046207, 0x0) mmap$binder(&(0x7f000000c000/0x2000)=nil, 0x2000, 0x0, 0x12, r9, 0x0) ioctl$BINDER_WRITE_READ(r9, 0xc0306201, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000), 0x0, 0x0, &(0x7f0000011f9d)}) getsockopt$inet_sctp6_SCTP_AUTO_ASCONF(0xffffffffffffffff, 0x84, 0x1e, &(0x7f0000000140), &(0x7f0000000180)=0x4) ioctl$BINDER_WRITE_READ(r9, 0xc0306201, &(0x7f0000000340)={0x8, 0x0, &(0x7f0000000440)=ANY=[@ANYRES64=r1], 0x0, 0x0, &(0x7f0000000240)}) write(0xffffffffffffffff, &(0x7f0000000300)="8be25f5790f664f32509e40d6f879d5add7e2d359c9a19afb750a2d25352875d187d4118c99a2d5c6db433c277cc7d345b87a34f1b417033d367cb0cfd6a25633f77aafb17e99c33cb65352c901ae75176f07bb0a4bb5ebff3d87e", 0x5b) r10 = ioctl$LOOP_CTL_GET_FREE(r4, 0x4c82) ioctl$LOOP_CTL_REMOVE(r6, 0x4c81, r10) openat$cgroup(0xffffffffffffff9c, &(0x7f0000000000)='syz0\x00', 0x200002, 0x0) sched_setaffinity(r2, 0x8, &(0x7f0000000200)=0x7) 2018/03/31 09:15:29 executing program 2: syz_open_dev$loop(&(0x7f00000003c0)='/dev/loop#\x00', 0x8, 0x0) r0 = syz_open_dev$sndseq(&(0x7f00000001c0)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r0, 0x4040534e, &(0x7f000019ffe9)={0xc1}) r1 = accept(0xffffffffffffffff, &(0x7f0000000080)=@can, &(0x7f0000000180)=0x80) ioctl$sock_ipx_SIOCAIPXPRISLT(r1, 0x89e1, &(0x7f0000000280)=0x3f) getsockopt$inet_sctp_SCTP_PRIMARY_ADDR(0xffffffffffffffff, 0x84, 0x6, &(0x7f0000000ac0)={0x0, @in={{0x2, 0x4e20, @loopback=0x7f000001}}}, &(0x7f00000002c0)=0x84) setsockopt$inet_sctp_SCTP_ENABLE_STREAM_RESET(r1, 0x84, 0x76, &(0x7f0000000300)={r2, 0x1c9}, 0x8) r3 = syz_open_dev$sg(&(0x7f0000000700)='/dev/sg#\x00', 0xfffffffffffffff7, 0x800) clone(0x2000c100, &(0x7f0000000800)="97bb77038add5df9e9d4f9783b82c55fe59e5c0acdbcfc9bcf92ac0e1f1f3c1959c1d25dfabf3849336c7c85be174d7765b47e113632aea54b87e4d3f2c1db09e6aa4040b43d17308fb7e62e808067da2fff3cfd8e4c038c814bbfc6bc49d8ebc8671d8297e2d34dc61f2d194d2dbb8f59b4c853e0714d3d4bb29d1243fac01c86c8c4dd38daedab3c6ad73a72d3f6dd2684aa82e5285eb82452c9848b7beb8bc513ba8c8973cad0bd5926604846b7f5d0397b", &(0x7f00000008c0), &(0x7f0000000900), &(0x7f0000000940)="ed6c04412e782fe395f084741e3d9fe469aebde09acc8f8d8d84d1f00f5573b09acba487077ebb904cb1f3fed55f59d677ce24bbd2a7506df8e1e0d0fc709cb8c9f4ab2aeeeebc5ef879742c1f7628f1862c88b5b0da89acbf43ef12e4839405b6a3430d296fea06d2f3a8356c57ec991e") ioctl$SNDRV_SEQ_IOCTL_SUBSCRIBE_PORT(r0, 0x40505330, &(0x7f0000ec6fb0)={{}, {0x80}}) getsockopt$netrom_NETROM_T1(r1, 0x103, 0x1, &(0x7f0000000000), &(0x7f0000000380)=0x4) syz_open_dev$adsp(&(0x7f0000000600)='/dev/adsp#\x00', 0x100000000, 0x80000) rt_sigprocmask(0x3d738072cd0f41ac, &(0x7f0000000cc0)={0x7}, &(0x7f0000000d00), 0x8) clone(0x40000000, &(0x7f0000000500)="67cdd9994c47c31d325b069924a7064c157c2ec0b5b5dca2feeb7dabef3b7af0d02d559e293faa759f2b3cb12aea360c2d", &(0x7f0000000580), &(0x7f00000005c0), &(0x7f0000000a00)="29859fdda9a119e54a27f9ec76b4d63a16dc5bbdd38c2fda0e5f4d8f830cd987ec7d3ffc66cf3db8820968fd89a1fba8fe6352a29a27f3b000bcdf238f2c04b358fc831025180e0be313da41de6366c94a1a0f86aaffdf2c039111b55275c054e14819a827fe809225249a01944263a2aec15f64e752e35892b1b8e7ef1e0e9115") ioctl$SNDRV_SEQ_IOCTL_DELETE_PORT(r0, 0x40a85321, &(0x7f0000000b80)={{0x4, 0x8}, 'port0\x00', 0x80, 0x0, 0x10000, 0x6, 0x2, 0x80, 0x8, 0x0, 0x0, 0x3dec00}) getsockopt$inet_sctp_SCTP_SOCKOPT_PEELOFF(r3, 0x84, 0x66, &(0x7f0000000c40)={r2, 0x6}, &(0x7f0000000c80)=0x8) clock_settime(0x7, &(0x7f0000000740)={0x77359400}) ioctl$SNDRV_SEQ_IOCTL_CLIENT_ID(r0, 0x80045301, &(0x7f0000000340)) r4 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer2\x00', 0x0, 0x0) openat$sequencer2(0xffffffffffffff9c, &(0x7f00000006c0)='/dev/sequencer2\x00', 0x222081, 0x0) ioctl$RNDADDENTROPY(0xffffffffffffffff, 0x40085203, &(0x7f0000000100)=ANY=[@ANYPTR=&(0x7f0000000680)=ANY=[@ANYPTR64=&(0x7f0000000640)=ANY=[@ANYPTR, @ANYPTR]]]) setsockopt$inet_sctp_SCTP_DEFAULT_SEND_PARAM(r4, 0x84, 0xa, &(0x7f0000000140)={0x5, 0x100000001, 0x0, 0x8, 0x0, 0x7, 0x401, 0x1f, r2}, 0x20) [ 322.150481] __memcg_init_list_lru_node+0x169/0x270 [ 322.155497] ? list_lru_add+0x7c0/0x7c0 [ 322.159476] ? __kmalloc_node+0x47/0x70 [ 322.163466] __list_lru_init+0x544/0x750 [ 322.163482] ? memcg_destroy_list_lru_node.isra.7+0x110/0x110 [ 322.163496] ? trace_hardirqs_on_caller+0x421/0x5c0 [ 322.163507] ? __lockdep_init_map+0xe4/0x650 [ 322.163521] ? lockdep_init_map+0x9/0x10 [ 322.163537] sget_userns+0x691/0xe40 [ 322.163546] ? kill_litter_super+0x90/0x90 [ 322.163559] ? ns_test_super+0x50/0x50 [ 322.163571] ? destroy_unused_super.part.6+0xd0/0xd0 [ 322.163579] ? do_raw_spin_trylock+0x190/0x190 [ 322.163593] ? kobject_put+0x6b/0x250 [ 322.163608] ? blkdev_get+0x3a1/0xb00 [ 322.163623] ? cap_capable+0x1b5/0x230 [ 322.163632] ? __blkdev_get+0x13b0/0x13b0 [ 322.163651] ? security_capable+0x8e/0xc0 [ 322.163664] ? kill_litter_super+0x90/0x90 [ 322.163675] ? ns_capable_common+0xcf/0x160 [ 322.163687] ? ns_test_super+0x50/0x50 [ 322.163694] ? kill_litter_super+0x90/0x90 [ 322.163702] sget+0xd2/0x120 [ 322.163716] mount_bdev+0x109/0x370 [ 322.163725] ? msdos_mount+0x40/0x40 [ 322.163737] msdos_mount+0x34/0x40 [ 322.163748] mount_fs+0x66/0x2d0 [ 322.261914] vfs_kern_mount.part.26+0xc6/0x4a0 [ 322.266493] ? may_umount+0xa0/0xa0 [ 322.270115] ? _raw_read_unlock+0x22/0x30 [ 322.274258] ? __get_fs_type+0x8a/0xc0 [ 322.278138] do_mount+0xea4/0x2bb0 [ 322.281673] ? copy_mount_string+0x40/0x40 [ 322.285898] ? trace_hardirqs_on_caller+0x421/0x5c0 [ 322.290908] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 322.295667] ? retint_kernel+0x10/0x10 [ 322.299552] ? copy_mount_options+0x18b/0x2e0 [ 322.304037] ? copy_mount_options+0x193/0x2e0 [ 322.308522] ? copy_mount_options+0x1f7/0x2e0 [ 322.313013] SyS_mount+0xab/0x120 [ 322.316456] ? copy_mnt_ns+0xb30/0xb30 [ 322.320336] do_syscall_64+0x281/0x940 [ 322.324218] ? vmalloc_sync_all+0x30/0x30 [ 322.328359] ? _raw_spin_unlock_irq+0x27/0x70 [ 322.332845] ? finish_task_switch+0x1c1/0x7e0 [ 322.337337] ? syscall_return_slowpath+0x550/0x550 [ 322.342255] ? syscall_return_slowpath+0x2ac/0x550 [ 322.347173] ? prepare_exit_to_usermode+0x350/0x350 [ 322.352185] ? entry_SYSCALL_64_after_hwframe+0x52/0xb7 [ 322.357538] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 322.362379] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 322.367557] RIP: 0033:0x454e79 [ 322.370732] RSP: 002b:00007f37fba8ec68 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 322.378432] RAX: ffffffffffffffda RBX: 00007f37fba8f6d4 RCX: 0000000000454e79 [ 322.385689] RDX: 00000000200e1000 RSI: 0000000020447000 RDI: 0000000020000000 [ 322.392948] RBP: 000000000072bea0 R08: 000000002097bfff R09: 0000000000000000 [ 322.400206] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000019 [ 322.407464] R13: 00000000000003fa R14: 00000000006f8010 R15: 0000000000000010 [ 322.416050] print_req_error: 38 callbacks suppressed [ 322.416056] print_req_error: I/O error, dev loop199, sector 0 [ 322.435909] FAT-fs (loop199): unable to read boot sector [ 322.440964] binder: 31339:31343 unknown command 20 [ 322.453258] print_req_error: I/O error, dev loop199, sector 0 [ 322.459254] FAT-fs (loop199): unable to read boot sector [ 322.470110] binder: 31339:31343 ioctl c0306201 20000340 returned -22 [ 322.479910] print_req_error: I/O error, dev loop199, sector 0 [ 322.486212] FAT-fs (loop199): unable to read boot sector [ 322.508222] binder: 31339:31346 unknown command 26 [ 322.513526] binder: 31339:31346 ioctl c0306201 20000340 returned -22 [ 322.520792] print_req_error: I/O error, dev loop199, sector 0 [ 322.526826] FAT-fs (loop199): unable to read boot sector [ 322.762925] IPVS: ftp: loaded support on port[0] = 21 [ 322.887711] bond0 (unregistering): Released all slaves [ 324.333497] IPVS: ftp: loaded support on port[0] = 21 [ 324.681913] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 325.207302] IPv6: ADDRCONF(NETDEV_UP): bond0: link is not ready [ 325.213401] 8021q: adding VLAN 0 to HW filter on device bond0 [ 325.268073] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 325.321699] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 325.348292] print_req_error: I/O error, dev loop199, sector 0 [ 325.354319] FAT-fs (loop199): unable to read boot sector 2018/03/31 09:15:32 executing program 7 (fault-call:24 fault-nth:17): perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f000031f000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getpid() r0 = syz_open_dev$vcsn(&(0x7f0000000040)='/dev/vcs#\x00', 0x0, 0x20000) ioctl$GIO_CMAP(r0, 0x4b70, &(0x7f0000000080)) r1 = socket$alg(0x26, 0x5, 0x0) ioctl$sock_SIOCGIFBR(r1, 0x8940, &(0x7f0000000040)=@get={0x1, &(0x7f0000000400)=""/242, 0x100000000}) bind$alg(r1, &(0x7f0000000080)={0x26, 'aead\x00', 0x0, 0x0, 'generic-gcm-aesni\x00'}, 0x58) syz_open_dev$sndmidi(&(0x7f0000000100)='/dev/snd/midiC#D#\x00', 0xfd, 0x0) bind(0xffffffffffffffff, &(0x7f0000000140)=@llc={0x1a, 0x33a, 0x7, 0x80, 0x5, 0x4, @remote={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xbb}}, 0x80) r2 = syz_init_net_socket$nfc_llcp(0x27, 0x1, 0x1) setsockopt$nfc_llcp_NFC_LLCP_MIUX(r2, 0x118, 0x15, &(0x7f0000000000), 0x4) r3 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/cuse\x00', 0x103002, 0x0) futimesat(r3, &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)={{0x0, 0x7530}}) r4 = syz_open_dev$vcsa(&(0x7f00000001c0)='/dev/vcsa#\x00', 0x2, 0x4020ff) sendto$inet6(r4, &(0x7f0000000bc0)="36251e313e0743fc195a1a198a14434e8a0a00b3f452a3b5644e336ec712a16310c9aecc4e3097bc666a8882128a73c368ce731e9fbf3fe18fa52d00", 0x3c, 0x20000000, &(0x7f0000000c40)={0xa, 0x0, 0x6, @dev={0xfe, 0x80, [], 0x19}, 0x1f}, 0x1c) accept$alg(r0, 0x0, 0x0) sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f0000000000)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x8}, 0xb4fcd35419244434, &(0x7f00004ca000)={&(0x7f0000000300)=ANY=[], 0x1a1}, 0x1}, 0x0) syz_fuseblk_mount(&(0x7f0000001380)='./file0\x00', &(0x7f00000013c0)='./file0\x00', 0xf000, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0xb21, 0x0) socket(0x1e, 0x3, 0x0) socket(0x1e, 0x0, 0x0) ptrace$PTRACE_SECCOMP_GET_FILTER(0x420c, 0x0, 0x0, &(0x7f0000000380)=""/113) sched_yield() ioctl$TUNGETIFF(r4, 0x800454d2, &(0x7f0000000140)) ioctl$KIOCSOUND(r4, 0x4b2f, 0xfffffffffffffb74) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000447000)='./file0\x00', &(0x7f00000e1000)='msdos\x00', 0x0, &(0x7f000097bfff)) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000580)='./cgroup/syz0\x00', 0x1ff) syz_open_dev$audion(&(0x7f0000000280)='/dev/audio#\x00', 0x7be, 0x0) 2018/03/31 09:15:32 executing program 3: r0 = syz_open_dev$random(&(0x7f00000001c0)='/dev/random\x00', 0x0, 0x800) r1 = syz_open_dev$loop(&(0x7f0000308000)='/dev/loop#\x00', 0x0, 0x0) ioctl$LOOP_SET_STATUS(r1, 0xc0481273, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "3900ea631d00000000020000010000009f00000023f7b7d65f90b0e6330ee739b319d8f6aa6bd58d1443474482e85040fb4947ebb55bd19f335b5bffff0001f3", "cfa430745a540dc1c149b7b81579f6a41c51f7d51933223e82ab867dac761faf"}) write(0xffffffffffffffff, &(0x7f00000001c0), 0x0) setsockopt$inet_sctp6_SCTP_RECVNXTINFO(0xffffffffffffffff, 0x84, 0x21, &(0x7f00000003c0)=0x200, 0x4) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f00000000c0)=0x0) getsockopt$netrom_NETROM_T4(0xffffffffffffffff, 0x103, 0x6, &(0x7f0000000300)=0x8, &(0x7f0000000340)=0x4) getpid() sched_setparam(r2, &(0x7f0000000400)) syz_open_dev$loop(&(0x7f0000ca9ff5)='/dev/loop#\x00', 0x0, 0x82) r3 = memfd_create(&(0x7f0000614000)="74086e750000000000000000008c00", 0x0) pwritev(r3, &(0x7f0000f50f90)=[{&(0x7f0000000040)="aa", 0x1}], 0x1, 0x0) fcntl$getownex(r1, 0x10, &(0x7f0000000240)={0x0, 0x0}) r5 = syz_open_procfs(r4, &(0x7f0000000280)='stat\x00') epoll_ctl$EPOLL_CTL_MOD(r3, 0x3, r0, &(0x7f00000002c0)={0x20000010}) accept4$inet6(r3, &(0x7f0000000100)={0x0, 0x0, 0x0, @mcast1}, &(0x7f0000000140)=0x1c, 0x7fd) getsockopt$inet_IP_IPSEC_POLICY(r3, 0x0, 0x10, &(0x7f0000000940)={{{@in6=@local, @in6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@loopback}, 0x0, @in=@local}}, &(0x7f0000000780)=0xe8) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f00000007c0)={0x0, 0x0, 0x0}, &(0x7f0000000540)=0xc) fchown(r3, r6, r7) r8 = syz_open_dev$binder(&(0x7f0000000100)='/dev/binder#\x00', 0xffffffffffffffff, 0x806) ioctl$BINDER_SET_CONTEXT_MGR(r5, 0x40046207, 0x0) mmap$binder(&(0x7f000000c000/0x2000)=nil, 0x2000, 0x0, 0x12, r8, 0x0) ioctl$BINDER_WRITE_READ(r8, 0xc0306201, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000), 0x0, 0x0, &(0x7f0000011f9d)}) getsockopt$inet_sctp6_SCTP_AUTO_ASCONF(0xffffffffffffffff, 0x84, 0x1e, &(0x7f0000000140), &(0x7f0000000180)=0x4) ioctl$BINDER_WRITE_READ(r8, 0xc0306201, &(0x7f0000000340)={0x8, 0x0, &(0x7f0000000440)=ANY=[@ANYRES64=r1], 0x0, 0x0, &(0x7f0000000240)}) write(0xffffffffffffffff, &(0x7f0000000300)="8be25f5790f664f32509e40d6f879d5add7e2d359c9a19afb750a2d25352875d187d4118c99a2d5c6db433c277cc7d345b87a34f1b417033d367cb0cfd6a25633f77aafb17e99c33cb65352c901ae75176f07bb0a4bb5ebff3d87e", 0x5b) r9 = ioctl$LOOP_CTL_GET_FREE(r3, 0x4c82) ioctl$LOOP_CTL_REMOVE(r5, 0x4c81, r9) openat$cgroup(0xffffffffffffff9c, &(0x7f0000000000)='syz0\x00', 0x200002, 0x0) sched_setaffinity(r2, 0x8, &(0x7f0000000200)=0x7) 2018/03/31 09:15:32 executing program 4: perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f000031f000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) prctl$void(0x0) getpid() r0 = syz_open_dev$vcsn(&(0x7f0000000040)='/dev/vcs#\x00', 0x0, 0x20000) ioctl$GIO_CMAP(r0, 0x4b70, &(0x7f0000000080)) r1 = socket$alg(0x26, 0x5, 0x0) ioctl$sock_SIOCGIFBR(0xffffffffffffffff, 0x8940, &(0x7f0000000040)=@get={0x1, &(0x7f0000000400)=""/242, 0x100000000}) bind$alg(r1, &(0x7f0000000080)={0x26, 'aead\x00', 0x0, 0x0, 'generic-gcm-aesni\x00'}, 0x58) r2 = syz_open_dev$sndmidi(&(0x7f0000000100)='/dev/snd/midiC#D#\x00', 0xfd, 0x0) connect$bt_l2cap(r0, &(0x7f0000000200)={0x1f, 0x20c, {0x9, 0x100000001, 0x9, 0x3, 0x1, 0x400}, 0x7, 0x81}, 0xe) bind(0xffffffffffffffff, &(0x7f0000000140)=@llc={0x1a, 0x33a, 0x7, 0x80, 0x0, 0x4, @remote={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xbb}}, 0x80) r3 = syz_init_net_socket$nfc_llcp(0x27, 0x1, 0x1) setsockopt$nfc_llcp_NFC_LLCP_MIUX(r3, 0x118, 0x15, &(0x7f0000000000), 0x4) r4 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/cuse\x00', 0x103002, 0x0) futimesat(r4, &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)={{0x0, 0x7530}}) r5 = syz_open_dev$vcsa(&(0x7f00000001c0)='/dev/vcsa#\x00', 0x2, 0x0) sendto$inet6(r5, &(0x7f0000000bc0), 0x0, 0x20000000, &(0x7f0000000c40)={0xa, 0x4e20, 0x0, @dev={0xfe, 0x80, [], 0x19}, 0x1f}, 0x1c) accept$alg(r0, 0x0, 0x0) sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f0000000000)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x8}, 0xb4fcd35419244434, &(0x7f00004ca000)={&(0x7f0000000300)=ANY=[], 0x1a1}, 0x1}, 0x0) getsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(r5, 0x84, 0x6, &(0x7f0000000240)={0x0, @in6={{0xa, 0x4e24, 0x8, @remote={0xfe, 0x80, [], 0xbb}, 0x3a10}}}, &(0x7f0000000300)=0x84) setsockopt$inet_sctp6_SCTP_RTOINFO(r2, 0x84, 0x0, &(0x7f0000000340)={r6, 0x1, 0x6, 0x31}, 0x10) syz_fuseblk_mount(&(0x7f0000001380)='./file0\x00', &(0x7f00000013c0)='./file0\x00', 0xf000, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0xb21, 0x0) socket(0x1e, 0x3, 0x3) socket(0x1e, 0x0, 0x0) ptrace$PTRACE_SECCOMP_GET_FILTER(0x420c, 0x0, 0x0, &(0x7f0000000380)=""/113) sched_yield() ioctl$TUNGETIFF(r0, 0x800454d2, &(0x7f0000000600)) ioctl$KIOCSOUND(r5, 0x4b2f, 0xfffffffffffffb74) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x20, 0x9b}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000447000)='./file0\x00', &(0x7f00000e1000)='msdos\x00', 0x0, &(0x7f000097bfff)) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000580)='./cgroup/syz0\x00', 0x1ff) 2018/03/31 09:15:32 executing program 5: r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f000031f000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) prctl$void(0x0) r1 = dup(r0) statx(r1, &(0x7f0000000200)='./file0/file0\x00', 0x400, 0x0, &(0x7f0000000400)) getpid() r2 = syz_open_dev$vcsn(&(0x7f0000000040)='/dev/vcs#\x00', 0x0, 0x20000) ioctl$GIO_CMAP(r2, 0x4b70, &(0x7f0000000080)) r3 = socket$alg(0x26, 0x5, 0x0) bind$alg(r3, &(0x7f0000000080)={0x26, 'aead\x00', 0x0, 0x0, 'generic-gcm-aesni\x00'}, 0x58) syz_open_dev$sndmidi(&(0x7f0000000100)='/dev/snd/midiC#D#\x00', 0xfd, 0x0) bind(0xffffffffffffffff, &(0x7f0000000140)=@llc={0x1a, 0x33a, 0x7, 0x80, 0x5, 0x4, @remote={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xbb}}, 0x80) r4 = syz_init_net_socket$nfc_llcp(0x27, 0x1, 0x1) setsockopt$nfc_llcp_NFC_LLCP_MIUX(r4, 0x118, 0x15, &(0x7f0000000000), 0x4) r5 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/cuse\x00', 0x103002, 0x0) futimesat(r5, &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)={{0x0, 0x7530}}) r6 = syz_open_dev$vcsa(&(0x7f00000001c0)='/dev/vcsa#\x00', 0x2, 0x4020ff) sendto$inet6(0xffffffffffffffff, &(0x7f0000000bc0)="36251e313e0743fc195a1a198a14434e8a0a00b3f452a3b5644e336ec712a16310c9aecc4e3097bc666a8882128a73c368ce731e9fbf3fe18fa52d", 0x3b, 0x20000000, &(0x7f0000000c40)={0xa, 0x4e20, 0x6, @dev={0xfe, 0x80, [], 0x19}, 0x1f}, 0x1c) accept$alg(r2, 0x0, 0x0) sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f0000000000)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x8}, 0xb4fcd35419244434, &(0x7f00004ca000)={&(0x7f0000000300)=ANY=[], 0x1a1}, 0x1}, 0x0) syz_fuseblk_mount(&(0x7f0000001380)='./file0\x00', &(0x7f00000013c0)='./file0\x00', 0xf000, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0xb21, 0x0) socket(0x1e, 0x3, 0x0) socket(0x1e, 0x0, 0x0) ptrace$PTRACE_SECCOMP_GET_FILTER(0x420c, 0x0, 0x0, &(0x7f0000000380)=""/113) sched_yield() ioctl$TUNGETIFF(r6, 0x800454d2, &(0x7f0000000140)) ioctl$KIOCSOUND(r6, 0x4b2f, 0xfffffffffffffb74) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x20, 0x9b}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000447000)='./file0\x00', &(0x7f00000e1000)='msdos\x00', 0x0, &(0x7f000097bfff)) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000580)='./cgroup/syz0\x00', 0x1ff) syz_open_dev$audion(&(0x7f0000000280)='/dev/audio#\x00', 0x7be, 0x0) 2018/03/31 09:15:32 executing program 2: syz_open_dev$loop(&(0x7f00000003c0)='/dev/loop#\x00', 0x8, 0x0) r0 = syz_open_dev$sndseq(&(0x7f00000001c0)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r0, 0x4040534e, &(0x7f000019ffe9)={0xc1}) r1 = accept(0xffffffffffffffff, &(0x7f0000000080)=@can, &(0x7f0000000180)=0x80) ioctl$sock_inet_SIOCRTMSG(r1, 0x890d, &(0x7f0000000200)={0x80, {0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x19}}, {0x2, 0x4e21, @local={0xac, 0x14, 0x14, 0xaa}}, {0x2, 0x4e23}, 0x0, 0x7, 0x1, 0x0, 0x9, 0x0, 0x0, 0x0, 0xfffffffffffffff7}) getsockopt$inet_sctp_SCTP_PRIMARY_ADDR(0xffffffffffffffff, 0x84, 0x6, &(0x7f0000000ac0)={0x0, @in={{0x2, 0x4e20, @loopback=0x7f000001}}}, &(0x7f00000002c0)=0x84) setsockopt$inet_sctp_SCTP_ENABLE_STREAM_RESET(r1, 0x84, 0x76, &(0x7f0000000300)={r2, 0x1c9}, 0x8) r3 = syz_open_dev$sg(&(0x7f0000000700)='/dev/sg#\x00', 0xfffffffffffffff7, 0x800) clone(0x2000c100, &(0x7f0000000800)="97bb77038add5df9e9d4f9783b82c55fe59e5c0acdbcfc9bcf92ac0e1f1f3c1959c1d25dfabf3849336c7c85be174d7765b47e113632aea54b87e4d3f2c1db09e6aa4040b43d17308fb7e62e808067da2fff3cfd8e4c038c814bbfc6bc49d8ebc8671d8297e2d34dc61f2d194d2dbb8f59b4c853e0714d3d4bb29d1243fac01c86c8c4dd38daedab3c6ad73a72d3f6dd2684aa82e5285eb82452c9848b7beb8bc513ba8c8973cad0bd5926604846b7f5d0397b", &(0x7f00000008c0), &(0x7f0000000900), &(0x7f0000000940)="ed6c04412e782fe395f084741e3d9fe469aebde09acc8f8d8d84d1f00f5573b09acba487077ebb904cb1f3fed55f59d677ce24bbd2a7506df8e1e0d0fc709cb8c9f4ab2aeeeebc5ef879742c1f7628f1862c88b5b0da89acbf43ef12e4839405b6a3430d296fea06d2f3a8356c57ec991e") ioctl$SNDRV_SEQ_IOCTL_SUBSCRIBE_PORT(r0, 0x40505330, &(0x7f0000ec6fb0)={{}, {0x80}}) getsockopt$netrom_NETROM_T1(r1, 0x103, 0x1, &(0x7f0000000000), &(0x7f0000000380)=0x4) syz_open_dev$adsp(&(0x7f0000000600)='/dev/adsp#\x00', 0x100000000, 0x80000) rt_sigprocmask(0x3d738072cd0f41ac, &(0x7f0000000cc0)={0x7}, &(0x7f0000000d00), 0x8) clone(0x40000000, &(0x7f0000000500)="67cdd9994c47c31d325b069924a7064c157c2ec0b5b5dca2feeb7dabef3b7af0d02d559e293faa759f2b3cb12aea360c2d", &(0x7f0000000580), &(0x7f00000005c0), &(0x7f0000000a00)="29859fdda9a119e54a27f9ec76b4d63a16dc5bbdd38c2fda0e5f4d8f830cd987ec7d3ffc66cf3db8820968fd89a1fba8fe6352a29a27f3b000bcdf238f2c04b358fc831025180e0be313da41de6366c94a1a0f86aaffdf2c039111b55275c054e14819a827fe809225249a01944263a2aec15f64e752e35892b1b8e7ef1e0e9115") ioctl$SNDRV_SEQ_IOCTL_DELETE_PORT(r0, 0x40a85321, &(0x7f0000000b80)={{0x4, 0x8}, 'port0\x00', 0x80, 0x0, 0x10000, 0x6, 0x2, 0x80, 0x8, 0x0, 0x0, 0x3dec00}) getsockopt$inet_sctp_SCTP_SOCKOPT_PEELOFF(r3, 0x84, 0x66, &(0x7f0000000c40)={r2, 0x6}, &(0x7f0000000c80)=0x8) clock_settime(0x7, &(0x7f0000000740)={0x77359400}) ioctl$SNDRV_SEQ_IOCTL_CLIENT_ID(r0, 0x80045301, &(0x7f0000000340)) r4 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer2\x00', 0x0, 0x0) openat$sequencer2(0xffffffffffffff9c, &(0x7f00000006c0)='/dev/sequencer2\x00', 0x222081, 0x0) ioctl$RNDADDENTROPY(0xffffffffffffffff, 0x40085203, &(0x7f0000000100)=ANY=[@ANYPTR=&(0x7f0000000680)=ANY=[@ANYPTR64=&(0x7f0000000640)=ANY=[@ANYPTR, @ANYPTR]]]) setsockopt$inet_sctp_SCTP_DEFAULT_SEND_PARAM(r4, 0x84, 0xa, &(0x7f0000000140)={0x5, 0x100000001, 0x0, 0x8, 0x0, 0x7, 0x401, 0x1f, r2}, 0x20) 2018/03/31 09:15:32 executing program 0: perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f000031f000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) prctl$void(0x0) r0 = syz_open_dev$vcsn(&(0x7f0000000040)='/dev/vcs#\x00', 0x0, 0x20000) socket$alg(0x26, 0x5, 0x0) ioctl$sock_SIOCGIFBR(0xffffffffffffffff, 0x8940, &(0x7f0000000040)=@get={0x1, &(0x7f0000000400)=""/242, 0x100000000}) bind$alg(0xffffffffffffffff, &(0x7f0000000080)={0x26, 'aead\x00', 0x0, 0x0, 'generic-gcm-aesni\x00'}, 0x58) r1 = syz_open_dev$sndmidi(&(0x7f0000000100)='/dev/snd/midiC#D#\x00', 0xfd, 0x0) bind(0xffffffffffffffff, &(0x7f0000000140)=@llc={0x1a, 0x33a, 0x7, 0x80, 0x0, 0x4, @remote={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xbb}}, 0x80) r2 = syz_init_net_socket$nfc_llcp(0x27, 0x1, 0x1) setsockopt$nfc_llcp_NFC_LLCP_MIUX(r2, 0x118, 0x15, &(0x7f0000000000), 0x4) r3 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/cuse\x00', 0x103002, 0x0) futimesat(r3, &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)={{0x0, 0x7530}}) r4 = syz_open_dev$vcsa(&(0x7f00000001c0)='/dev/vcsa#\x00', 0x2, 0x288401) sendto$inet6(r4, &(0x7f0000000bc0)="36251e313e0743fc195a1a198a14434e8a0a00b3f452a3b5644e336ec712a16310c9aecc4e3097bc666a8882128a73c368ce731e9fbf3fe18fa52d00c34ac2e57c1c4569cfbd6a621c6dfbc032121aed", 0x50, 0x20000000, &(0x7f0000000c40)={0xa, 0x4e20, 0x6, @dev={0xfe, 0x80, [], 0x19}, 0x1f}, 0x1c) accept$alg(r0, 0x0, 0x0) sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f0000000000)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x8}, 0xb4fcd35419244434, &(0x7f00004ca000)={&(0x7f0000000300)=ANY=[], 0x1a1}, 0x1}, 0x0) getgroups(0x5, &(0x7f0000000280)=[0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x0]) syz_fuseblk_mount(&(0x7f0000001380)='./file0\x00', &(0x7f00000013c0)='./file0\x00', 0xf000, 0xffffffffffffffff, r5, 0x0, 0xb21, 0x0) ioctl$BINDER_GET_NODE_DEBUG_INFO(r0, 0xc018620b, &(0x7f0000000200)={0x0}) ioctl$BINDER_GET_NODE_DEBUG_INFO(r1, 0xc018620b, &(0x7f0000000240)={r6}) r7 = socket(0x1e, 0x3, 0x0) socket(0x1e, 0x0, 0x0) ptrace$PTRACE_SECCOMP_GET_FILTER(0x420c, 0x0, 0x0, &(0x7f0000000380)=""/113) sched_yield() ioctl$TUNGETIFF(r4, 0x800454d2, &(0x7f0000000140)) ioctl$KIOCSOUND(r4, 0x4b2f, 0xfffffffffffffb74) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x20, 0x9b}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r8 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000300)='IPVS\x00') sendmsg$IPVS_CMD_NEW_DEST(r7, &(0x7f0000000540)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x1004004}, 0xc, &(0x7f0000000500)={&(0x7f0000000340)={0x18, r8, 0x200, 0x70bd2a, 0x25dfdbff, {0x5}, [@IPVS_CMD_ATTR_DEST={0x4, 0x2}]}, 0x18}, 0x1, 0x0, 0x0, 0x1}, 0x4) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000447000)='./file0\x00', &(0x7f00000e1000)='msdos\x00', 0x0, &(0x7f000097bfff)) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000580)='./cgroup/syz0\x00', 0x1ff) 2018/03/31 09:15:32 executing program 6: perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f000031f000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) prctl$void(0x0) getpid() r0 = syz_open_dev$vcsn(&(0x7f0000000040)='/dev/vcs#\x00', 0x0, 0x20000) ioctl$GIO_CMAP(r0, 0x4b70, &(0x7f0000000080)) r1 = socket$alg(0x26, 0x5, 0x0) ioctl$sock_SIOCGIFBR(0xffffffffffffffff, 0x8940, &(0x7f0000000040)=@get={0x1, &(0x7f0000000400)=""/242, 0x100000000}) bind$alg(r1, &(0x7f0000000080)={0x26, 'aead\x00', 0x0, 0x0, 'generic-gcm-aesni\x00'}, 0x58) syz_open_dev$sndmidi(&(0x7f0000000100)='/dev/snd/midiC#D#\x00', 0xfd, 0x0) bind(0xffffffffffffffff, &(0x7f0000000140)=@llc={0x1a, 0x33a, 0x7, 0x80, 0x0, 0x4, @remote={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xbb}}, 0x80) r2 = syz_init_net_socket$nfc_llcp(0x27, 0x1, 0x1) setsockopt$nfc_llcp_NFC_LLCP_MIUX(r2, 0x118, 0x15, &(0x7f0000000000), 0x4) r3 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/cuse\x00', 0x103002, 0x0) futimesat(r3, &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)={{0x0, 0x7530}}) r4 = syz_open_dev$vcsa(&(0x7f00000001c0)='/dev/vcsa#\x00', 0x2, 0x0) sendto$inet6(r4, &(0x7f0000000bc0), 0x0, 0x20000000, &(0x7f0000000c40)={0xa, 0x4e20, 0x0, @dev={0xfe, 0x80, [], 0x19}, 0x1f}, 0x1c) accept$alg(r0, 0x0, 0x0) sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f0000000000)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x8}, 0xb4fcd35419244434, &(0x7f00004ca000)={&(0x7f0000000300)=ANY=[], 0x1a1}, 0x1}, 0x0) syz_fuseblk_mount(&(0x7f0000001380)='./file0\x00', &(0x7f00000013c0)='./file0\x00', 0xf000, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0xb21, 0x0) socket(0x1e, 0x0, 0x0) socket(0x1e, 0x0, 0x0) ptrace$PTRACE_SECCOMP_GET_FILTER(0x420c, 0x0, 0x0, &(0x7f0000000380)=""/113) sched_yield() ioctl$TUNGETIFF(r4, 0x800454d2, &(0x7f0000000140)) ioctl$KIOCSOUND(r4, 0x4b2f, 0xfffffffffffffb74) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x20, 0x9b}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000447000)='./file0\x00', &(0x7f00000e1000)='msdos\x00', 0x0, &(0x7f000097bfff)) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000580)='./cgroup/syz0\x00', 0x1ff) 2018/03/31 09:15:32 executing program 1: r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f000031f000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) prctl$void(0x0) r1 = getpid() syz_open_dev$vcsn(&(0x7f0000000040)='/dev/vcs#\x00', 0x400, 0x20000) r2 = socket$alg(0x26, 0x5, 0x0) ioctl$sock_SIOCGIFBR(r2, 0x8940, &(0x7f0000000040)=@get={0x1, &(0x7f0000000400)=""/242, 0x100000000}) bind$alg(r2, &(0x7f0000000080)={0x26, 'aead\x00', 0x0, 0x0, 'generic-gcm-aesni\x00'}, 0x58) r3 = syz_open_dev$sndmidi(&(0x7f0000000100)='/dev/snd/midiC#D#\x00', 0xfd, 0x0) bind(r3, &(0x7f0000000140)=@llc={0x1a, 0x33a, 0x7, 0x80, 0x0, 0x4, @remote={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xbb}}, 0x80) r4 = syz_init_net_socket$nfc_llcp(0x27, 0x1, 0x1) setsockopt$nfc_llcp_NFC_LLCP_MIUX(r4, 0x118, 0x15, &(0x7f0000000000), 0x4) fcntl$setownex(r0, 0xf, &(0x7f0000000200)={0x1, r1}) r5 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/cuse\x00', 0x103002, 0x0) futimesat(r5, &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)={{0x0, 0x7530}}) r6 = syz_open_dev$vcsa(&(0x7f00000001c0)='/dev/vcsa#\x00', 0x2, 0x4020ff) sendto$inet6(r6, &(0x7f0000000bc0), 0x0, 0x20000000, &(0x7f0000000c40)={0xa, 0x4e20, 0x6, @dev={0xfe, 0x80, [], 0x19}, 0x1f}, 0x1c) sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f0000000000)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x8}, 0xb4fcd35419244434, &(0x7f00004ca000)={&(0x7f0000000300)=ANY=[], 0x1a1}, 0x1}, 0x0) syz_fuseblk_mount(&(0x7f0000001380)='./file0\x00', &(0x7f00000013c0)='./file0\x00', 0xf000, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0xb21, 0x0) socket(0x1e, 0x3, 0x0) ptrace$PTRACE_SECCOMP_GET_FILTER(0x420c, 0x0, 0x0, &(0x7f0000000380)=""/113) sched_yield() ioctl$TUNGETIFF(r6, 0x800454d2, &(0x7f0000000140)) ioctl$KIOCSOUND(r6, 0x4b2f, 0xfffffffffffffb74) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x20, 0x9b}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000447000)='./file0\x00', &(0x7f00000e1000)='msdos\x00', 0x0, &(0x7f000097bfff)) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000580)='./cgroup/syz0\x00', 0x1ff) syz_open_dev$audion(&(0x7f0000000280)='/dev/audio#\x00', 0x7be, 0x0) fcntl$getown(0xffffffffffffffff, 0x9) [ 325.375633] print_req_error: I/O error, dev loop199, sector 0 [ 325.381575] FAT-fs (loop199): unable to read boot sector 2018/03/31 09:15:32 executing program 6: perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f000031f000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) prctl$void(0x0) getpid() r0 = syz_open_dev$vcsn(&(0x7f0000000040)='/dev/vcs#\x00', 0x0, 0x20000) ioctl$GIO_CMAP(r0, 0x4b70, &(0x7f0000000080)) r1 = socket$alg(0x26, 0x5, 0x0) ioctl$sock_SIOCGIFBR(0xffffffffffffffff, 0x8940, &(0x7f0000000040)=@get={0x1, &(0x7f0000000400)=""/242, 0x100000000}) bind$alg(r1, &(0x7f0000000080)={0x26, 'aead\x00', 0x0, 0x0, 'generic-gcm-aesni\x00'}, 0x58) syz_open_dev$sndmidi(&(0x7f0000000100)='/dev/snd/midiC#D#\x00', 0xfd, 0x0) bind(0xffffffffffffffff, &(0x7f0000000140)=@llc={0x1a, 0x33a, 0x7, 0x80, 0x0, 0x4, @remote={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xbb}}, 0x80) r2 = syz_init_net_socket$nfc_llcp(0x27, 0x1, 0x1) setsockopt$nfc_llcp_NFC_LLCP_MIUX(r2, 0x118, 0x15, &(0x7f0000000000), 0x4) r3 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/cuse\x00', 0x103002, 0x0) futimesat(r3, &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)={{0x0, 0x7530}}) r4 = syz_open_dev$vcsa(&(0x7f00000001c0)='/dev/vcsa#\x00', 0x2, 0x0) sendto$inet6(r4, &(0x7f0000000bc0), 0x0, 0x20000000, &(0x7f0000000c40)={0xa, 0x4e20, 0x0, @dev={0xfe, 0x80, [], 0x19}, 0x1f}, 0x1c) accept$alg(r0, 0x0, 0x0) sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f0000000000)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x8}, 0xb4fcd35419244434, &(0x7f00004ca000)={&(0x7f0000000300)=ANY=[], 0x1a1}, 0x1}, 0x0) syz_fuseblk_mount(&(0x7f0000001380)='./file0\x00', &(0x7f00000013c0)='./file0\x00', 0xf000, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0xb21, 0x0) socket(0x1e, 0x3, 0x0) socket(0x0, 0x0, 0x0) ptrace$PTRACE_SECCOMP_GET_FILTER(0x420c, 0x0, 0x0, &(0x7f0000000380)=""/113) sched_yield() ioctl$TUNGETIFF(r4, 0x800454d2, &(0x7f0000000140)) ioctl$KIOCSOUND(r4, 0x4b2f, 0xfffffffffffffb74) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x20, 0x9b}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000447000)='./file0\x00', &(0x7f00000e1000)='msdos\x00', 0x0, &(0x7f000097bfff)) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000580)='./cgroup/syz0\x00', 0x1ff) [ 325.450118] print_req_error: I/O error, dev loop199, sector 0 [ 325.454346] binder: 31514:31519 unknown command 20 [ 325.456151] FAT-fs (loop199): unable to read boot sector [ 325.471129] IPVS: ftp: loaded support on port[0] = 21 [ 325.471792] print_req_error: I/O error, dev loop199, sector 0 [ 325.479048] binder: 31514:31519 ioctl c0306201 20000340 returned -22 [ 325.482706] FAT-fs (loop199): unable to read boot sector [ 325.495720] print_req_error: I/O error, dev loop199, sector 0 [ 325.505009] FAT-fs (loop199): unable to read boot sector [ 325.511826] FAULT_INJECTION: forcing a failure. [ 325.511826] name failslab, interval 1, probability 0, space 0, times 0 [ 325.523133] CPU: 0 PID: 31518 Comm: syz-executor7 Not tainted 4.16.0-rc7+ #8 [ 325.527038] binder: 31514:31531 unknown command 26 [ 325.530316] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 325.530323] Call Trace: 2018/03/31 09:15:32 executing program 6: perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f000031f000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) prctl$void(0x0) getpid() r0 = syz_open_dev$vcsn(&(0x7f0000000040)='/dev/vcs#\x00', 0x0, 0x20000) ioctl$GIO_CMAP(r0, 0x4b70, &(0x7f0000000080)) r1 = socket$alg(0x26, 0x5, 0x0) ioctl$sock_SIOCGIFBR(0xffffffffffffffff, 0x8940, &(0x7f0000000040)=@get={0x1, &(0x7f0000000400)=""/242, 0x100000000}) bind$alg(r1, &(0x7f0000000080)={0x26, 'aead\x00', 0x0, 0x0, 'generic-gcm-aesni\x00'}, 0x58) syz_open_dev$sndmidi(&(0x7f0000000100)='/dev/snd/midiC#D#\x00', 0xfd, 0x0) bind(0xffffffffffffffff, &(0x7f0000000140)=@llc={0x1a, 0x33a, 0x7, 0x80, 0x0, 0x4, @remote={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xbb}}, 0x80) r2 = syz_init_net_socket$nfc_llcp(0x27, 0x1, 0x1) setsockopt$nfc_llcp_NFC_LLCP_MIUX(r2, 0x118, 0x15, &(0x7f0000000000), 0x4) r3 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/cuse\x00', 0x103002, 0x0) futimesat(r3, &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)={{0x0, 0x7530}}) r4 = syz_open_dev$vcsa(&(0x7f00000001c0)='/dev/vcsa#\x00', 0x2, 0x0) sendto$inet6(r4, &(0x7f0000000bc0), 0x0, 0x20000000, &(0x7f0000000c40)={0xa, 0x4e20, 0x0, @dev={0xfe, 0x80, [], 0x19}, 0x1f}, 0x1c) accept$alg(r0, 0x0, 0x0) sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f0000000000)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x8}, 0xb4fcd35419244434, &(0x7f00004ca000)={&(0x7f0000000300)=ANY=[], 0x1a1}, 0x1}, 0x0) syz_fuseblk_mount(&(0x7f0000001380)='./file0\x00', &(0x7f00000013c0)='./file0\x00', 0xf000, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0xb21, 0x0) socket(0x1e, 0x3, 0x0) socket(0x0, 0x0, 0x0) ptrace$PTRACE_SECCOMP_GET_FILTER(0x420c, 0x0, 0x0, &(0x7f0000000380)=""/113) sched_yield() ioctl$TUNGETIFF(r4, 0x800454d2, &(0x7f0000000140)) ioctl$KIOCSOUND(r4, 0x4b2f, 0xfffffffffffffb74) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x20, 0x9b}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000447000)='./file0\x00', &(0x7f00000e1000)='msdos\x00', 0x0, &(0x7f000097bfff)) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000580)='./cgroup/syz0\x00', 0x1ff) [ 325.530345] dump_stack+0x194/0x24d [ 325.530364] ? arch_local_irq_restore+0x53/0x53 [ 325.530391] should_fail+0x8c0/0xa40 [ 325.530406] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 325.546356] binder: 31514:31531 ioctl c0306201 20000340 returned -22 [ 325.547244] ? kasan_kmalloc+0xad/0xe0 [ 325.547257] ? kmem_cache_alloc_trace+0x136/0x740 [ 325.547270] ? __memcg_init_list_lru_node+0x169/0x270 [ 325.584713] ? sget_userns+0x691/0xe40 [ 325.584726] ? mount_fs+0x66/0x2d0 [ 325.592552] ? vfs_kern_mount.part.26+0xc6/0x4a0 [ 325.597307] ? do_mount+0xea4/0x2bb0 2018/03/31 09:15:32 executing program 3: r0 = syz_open_dev$random(&(0x7f00000001c0)='/dev/random\x00', 0x0, 0x800) r1 = syz_open_dev$loop(&(0x7f0000308000)='/dev/loop#\x00', 0x0, 0x0) ioctl$LOOP_SET_STATUS(r1, 0xc0481273, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "3900ea631d00000000020000010000009f00000023f7b7d65f90b0e6330ee739b319d8f6aa6bd58d1443474482e85040fb4947ebb55bd19f335b5bffff0001f3", "cfa430745a540dc1c149b7b81579f6a41c51f7d51933223e82ab867dac761faf"}) write(0xffffffffffffffff, &(0x7f00000001c0), 0x0) setsockopt$inet_sctp6_SCTP_RECVNXTINFO(0xffffffffffffffff, 0x84, 0x21, &(0x7f00000003c0)=0x200, 0x4) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f00000000c0)=0x0) getsockopt$netrom_NETROM_T4(0xffffffffffffffff, 0x103, 0x6, &(0x7f0000000300)=0x8, &(0x7f0000000340)=0x4) r3 = getpid() sched_setparam(r3, &(0x7f0000000400)) syz_open_dev$loop(&(0x7f0000ca9ff5)='/dev/loop#\x00', 0x0, 0x82) r4 = memfd_create(&(0x7f0000614000)="74086e750000000000000000008c00", 0x0) pwritev(r4, &(0x7f0000f50f90)=[{&(0x7f0000000040)="aa", 0x1}], 0x1, 0x0) fcntl$getownex(r1, 0x10, &(0x7f0000000240)) r5 = syz_open_procfs(r2, &(0x7f0000000480)="26c8668e348e01ec6a9342dadb6bbd576c05c9aadd2c532df0f8f3614a547d697a1364211e69bf4e24666b97c8060a1fcda6c3d0ab4d9233ef2ffff17fedfd371c288e542b9060515dbe070000000000000000000000000000") epoll_ctl$EPOLL_CTL_MOD(r4, 0x3, r0, &(0x7f00000002c0)={0x20000010}) accept4$inet6(r4, &(0x7f0000000100)={0x0, 0x0, 0x0, @mcast1}, &(0x7f0000000140)=0x1c, 0x7fd) getsockopt$inet_IP_IPSEC_POLICY(r4, 0x0, 0x10, &(0x7f0000000940)={{{@in6=@local, @in6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@loopback}, 0x0, @in=@local}}, &(0x7f0000000780)=0xe8) getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f00000007c0)={0x0, 0x0, 0x0}, &(0x7f0000000540)=0xc) fchown(r4, r6, r7) r8 = syz_open_dev$binder(&(0x7f0000000100)='/dev/binder#\x00', 0xffffffffffffffff, 0x806) ioctl$BINDER_SET_CONTEXT_MGR(r5, 0x40046207, 0x0) mmap$binder(&(0x7f000000c000/0x2000)=nil, 0x2000, 0x0, 0x12, r8, 0x0) ioctl$BINDER_WRITE_READ(r8, 0xc0306201, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000), 0x0, 0x0, &(0x7f0000011f9d)}) getsockopt$inet_sctp6_SCTP_AUTO_ASCONF(0xffffffffffffffff, 0x84, 0x1e, &(0x7f0000000140), &(0x7f0000000180)=0x4) ioctl$BINDER_WRITE_READ(r8, 0xc0306201, &(0x7f0000000340)={0x8, 0x0, &(0x7f0000000440)=ANY=[@ANYRES64=r1], 0x0, 0x0, &(0x7f0000000240)}) write(0xffffffffffffffff, &(0x7f0000000300)="8be25f5790f664f32509e40d6f879d5add7e2d359c9a19afb750a2d25352875d187d4118c99a2d5c6db433c277cc7d345b87a34f1b417033d367cb0cfd6a25633f77aafb17e99c33cb65352c901ae75176f07bb0a4bb5ebff3d87e", 0x5b) r9 = ioctl$LOOP_CTL_GET_FREE(r4, 0x4c82) ioctl$LOOP_CTL_REMOVE(r5, 0x4c81, r9) openat$cgroup(0xffffffffffffff9c, &(0x7f0000000000)='syz0\x00', 0x200002, 0x0) sched_setaffinity(r2, 0x8, &(0x7f0000000200)=0x7) [ 325.601026] ? do_syscall_64+0x281/0x940 [ 325.605088] ? entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 325.610454] ? find_held_lock+0x35/0x1d0 [ 325.614525] ? __lock_is_held+0xb6/0x140 [ 325.618608] ? check_same_owner+0x320/0x320 [ 325.622933] ? rcu_note_context_switch+0x710/0x710 [ 325.627882] should_failslab+0xec/0x120 [ 325.631864] kmem_cache_alloc_trace+0x4b/0x740 [ 325.636451] ? __kmalloc_node+0x33/0x70 [ 325.640429] ? __kmalloc_node+0x33/0x70 [ 325.644406] ? rcu_read_lock_sched_held+0x108/0x120 2018/03/31 09:15:32 executing program 6: perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f000031f000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) prctl$void(0x0) getpid() r0 = syz_open_dev$vcsn(&(0x7f0000000040)='/dev/vcs#\x00', 0x0, 0x20000) ioctl$GIO_CMAP(r0, 0x4b70, &(0x7f0000000080)) r1 = socket$alg(0x26, 0x5, 0x0) ioctl$sock_SIOCGIFBR(0xffffffffffffffff, 0x8940, &(0x7f0000000040)=@get={0x1, &(0x7f0000000400)=""/242, 0x100000000}) bind$alg(r1, &(0x7f0000000080)={0x26, 'aead\x00', 0x0, 0x0, 'generic-gcm-aesni\x00'}, 0x58) syz_open_dev$sndmidi(&(0x7f0000000100)='/dev/snd/midiC#D#\x00', 0xfd, 0x0) bind(0xffffffffffffffff, &(0x7f0000000140)=@llc={0x1a, 0x33a, 0x7, 0x80, 0x0, 0x4, @remote={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xbb}}, 0x80) r2 = syz_init_net_socket$nfc_llcp(0x27, 0x1, 0x1) setsockopt$nfc_llcp_NFC_LLCP_MIUX(r2, 0x118, 0x15, &(0x7f0000000000), 0x4) r3 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/cuse\x00', 0x103002, 0x0) futimesat(r3, &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)={{0x0, 0x7530}}) r4 = syz_open_dev$vcsa(&(0x7f00000001c0)='/dev/vcsa#\x00', 0x2, 0x0) sendto$inet6(r4, &(0x7f0000000bc0), 0x0, 0x20000000, &(0x7f0000000c40)={0xa, 0x4e20, 0x0, @dev={0xfe, 0x80, [], 0x19}, 0x1f}, 0x1c) accept$alg(r0, 0x0, 0x0) sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f0000000000)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x8}, 0xb4fcd35419244434, &(0x7f00004ca000)={&(0x7f0000000300)=ANY=[], 0x1a1}, 0x1}, 0x0) syz_fuseblk_mount(&(0x7f0000001380)='./file0\x00', &(0x7f00000013c0)='./file0\x00', 0xf000, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0xb21, 0x0) socket(0x1e, 0x3, 0x0) socket(0x0, 0x0, 0x0) ptrace$PTRACE_SECCOMP_GET_FILTER(0x420c, 0x0, 0x0, &(0x7f0000000380)=""/113) sched_yield() ioctl$TUNGETIFF(r4, 0x800454d2, &(0x7f0000000140)) ioctl$KIOCSOUND(r4, 0x4b2f, 0xfffffffffffffb74) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x20, 0x9b}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000447000)='./file0\x00', &(0x7f00000e1000)='msdos\x00', 0x0, &(0x7f000097bfff)) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000580)='./cgroup/syz0\x00', 0x1ff) 2018/03/31 09:15:32 executing program 2: syz_open_dev$loop(&(0x7f00000003c0)='/dev/loop#\x00', 0x8, 0x0) r0 = syz_open_dev$sndseq(&(0x7f00000001c0)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r0, 0x4040534e, &(0x7f000019ffe9)={0xc1}) r1 = accept(0xffffffffffffffff, &(0x7f0000000080)=@can, &(0x7f0000000180)=0x80) ioctl$sock_inet_SIOCRTMSG(r1, 0x890d, &(0x7f0000000200)={0x80, {0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x19}}, {0x2, 0x4e21, @local={0xac, 0x14, 0x14, 0xaa}}, {0x2, 0x4e23}, 0x0, 0x7, 0x1, 0x0, 0x9, 0x0, 0x0, 0x0, 0xfffffffffffffff7}) getsockopt$inet_sctp_SCTP_PRIMARY_ADDR(0xffffffffffffffff, 0x84, 0x6, &(0x7f0000000ac0)={0x0, @in={{0x2, 0x4e20, @loopback=0x7f000001}}}, &(0x7f00000002c0)=0x84) setsockopt$inet_sctp_SCTP_ENABLE_STREAM_RESET(r1, 0x84, 0x76, &(0x7f0000000300)={r2, 0x1c9}, 0x8) r3 = syz_open_dev$sg(&(0x7f0000000700)='/dev/sg#\x00', 0xfffffffffffffff7, 0x800) clone(0x2000c100, &(0x7f0000000800)="97bb77038add5df9e9d4f9783b82c55fe59e5c0acdbcfc9bcf92ac0e1f1f3c1959c1d25dfabf3849336c7c85be174d7765b47e113632aea54b87e4d3f2c1db09e6aa4040b43d17308fb7e62e808067da2fff3cfd8e4c038c814bbfc6bc49d8ebc8671d8297e2d34dc61f2d194d2dbb8f59b4c853e0714d3d4bb29d1243fac01c86c8c4dd38daedab3c6ad73a72d3f6dd2684aa82e5285eb82452c9848b7beb8bc513ba8c8973cad0bd5926604846b7f5d0397b", &(0x7f00000008c0), &(0x7f0000000900), &(0x7f0000000940)="ed6c04412e782fe395f084741e3d9fe469aebde09acc8f8d8d84d1f00f5573b09acba487077ebb904cb1f3fed55f59d677ce24bbd2a7506df8e1e0d0fc709cb8c9f4ab2aeeeebc5ef879742c1f7628f1862c88b5b0da89acbf43ef12e4839405b6a3430d296fea06d2f3a8356c57ec991e") ioctl$SNDRV_SEQ_IOCTL_SUBSCRIBE_PORT(r0, 0x40505330, &(0x7f0000ec6fb0)={{}, {0x80}}) getsockopt$netrom_NETROM_T1(r1, 0x103, 0x1, &(0x7f0000000000), &(0x7f0000000380)=0x4) syz_open_dev$adsp(&(0x7f0000000600)='/dev/adsp#\x00', 0x100000000, 0x80000) rt_sigprocmask(0x3d738072cd0f41ac, &(0x7f0000000cc0)={0x7}, &(0x7f0000000d00), 0x8) clone(0x40000000, &(0x7f0000000500)="67cdd9994c47c31d325b069924a7064c157c2ec0b5b5dca2feeb7dabef3b7af0d02d559e293faa759f2b3cb12aea360c2d", &(0x7f0000000580), &(0x7f00000005c0), &(0x7f0000000a00)="29859fdda9a119e54a27f9ec76b4d63a16dc5bbdd38c2fda0e5f4d8f830cd987ec7d3ffc66cf3db8820968fd89a1fba8fe6352a29a27f3b000bcdf238f2c04b358fc831025180e0be313da41de6366c94a1a0f86aaffdf2c039111b55275c054e14819a827fe809225249a01944263a2aec15f64e752e35892b1b8e7ef1e0e9115") ioctl$SNDRV_SEQ_IOCTL_DELETE_PORT(r0, 0x40a85321, &(0x7f0000000b80)={{0x4, 0x8}, 'port0\x00', 0x80, 0x0, 0x10000, 0x6, 0x2, 0x80, 0x8, 0x0, 0x0, 0x3dec00}) getsockopt$inet_sctp_SCTP_SOCKOPT_PEELOFF(r3, 0x84, 0x66, &(0x7f0000000c40)={r2, 0x6}, &(0x7f0000000c80)=0x8) clock_settime(0x7, &(0x7f0000000740)={0x77359400}) ioctl$SNDRV_SEQ_IOCTL_CLIENT_ID(r0, 0x80045301, &(0x7f0000000340)) r4 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer2\x00', 0x0, 0x0) openat$sequencer2(0xffffffffffffff9c, &(0x7f00000006c0)='/dev/sequencer2\x00', 0x222081, 0x0) ioctl$RNDADDENTROPY(0xffffffffffffffff, 0x40085203, &(0x7f0000000100)=ANY=[@ANYPTR=&(0x7f0000000680)=ANY=[@ANYPTR64=&(0x7f0000000640)=ANY=[@ANYPTR, @ANYPTR]]]) setsockopt$inet_sctp_SCTP_DEFAULT_SEND_PARAM(r4, 0x84, 0xa, &(0x7f0000000140)={0x5, 0x100000001, 0x0, 0x8, 0x0, 0x7, 0x401, 0x1f, r2}, 0x20) [ 325.649432] __memcg_init_list_lru_node+0x169/0x270 [ 325.654460] ? list_lru_add+0x7c0/0x7c0 [ 325.658439] ? __kmalloc_node+0x47/0x70 [ 325.662425] __list_lru_init+0x544/0x750 [ 325.666494] ? memcg_destroy_list_lru_node.isra.7+0x110/0x110 [ 325.672381] ? trace_hardirqs_on_caller+0x421/0x5c0 [ 325.677404] ? __lockdep_init_map+0xe4/0x650 [ 325.680773] binder: 31540:31541 unknown command 20 [ 325.681814] ? lockdep_init_map+0x9/0x10 [ 325.681832] sget_userns+0x691/0xe40 [ 325.681842] ? kill_litter_super+0x90/0x90 [ 325.681860] ? ns_test_super+0x50/0x50 [ 325.681876] ? destroy_unused_super.part.6+0xd0/0xd0 [ 325.702420] binder: 31540:31541 ioctl c0306201 20000340 returned -22 [ 325.702611] ? do_raw_spin_trylock+0x190/0x190 [ 325.718745] ? kobject_put+0x6b/0x250 [ 325.722563] ? blkdev_get+0x3a1/0xb00 [ 325.726369] ? cap_capable+0x1b5/0x230 [ 325.730263] ? __blkdev_get+0x13b0/0x13b0 [ 325.734417] ? security_capable+0x8e/0xc0 [ 325.738573] ? kill_litter_super+0x90/0x90 [ 325.742816] ? ns_capable_common+0xcf/0x160 2018/03/31 09:15:32 executing program 6: perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f000031f000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) prctl$void(0x0) getpid() r0 = syz_open_dev$vcsn(&(0x7f0000000040)='/dev/vcs#\x00', 0x0, 0x20000) ioctl$GIO_CMAP(r0, 0x4b70, &(0x7f0000000080)) r1 = socket$alg(0x26, 0x5, 0x0) ioctl$sock_SIOCGIFBR(0xffffffffffffffff, 0x8940, &(0x7f0000000040)=@get={0x1, &(0x7f0000000400)=""/242, 0x100000000}) bind$alg(r1, &(0x7f0000000080)={0x26, 'aead\x00', 0x0, 0x0, 'generic-gcm-aesni\x00'}, 0x58) syz_open_dev$sndmidi(&(0x7f0000000100)='/dev/snd/midiC#D#\x00', 0xfd, 0x0) bind(0xffffffffffffffff, &(0x7f0000000140)=@llc={0x1a, 0x33a, 0x7, 0x80, 0x0, 0x4, @remote={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xbb}}, 0x80) r2 = syz_init_net_socket$nfc_llcp(0x27, 0x1, 0x1) setsockopt$nfc_llcp_NFC_LLCP_MIUX(r2, 0x118, 0x15, &(0x7f0000000000), 0x4) r3 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/cuse\x00', 0x103002, 0x0) futimesat(r3, &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)={{0x0, 0x7530}}) r4 = syz_open_dev$vcsa(&(0x7f00000001c0)='/dev/vcsa#\x00', 0x2, 0x0) sendto$inet6(r4, &(0x7f0000000bc0), 0x0, 0x20000000, &(0x7f0000000c40)={0xa, 0x4e20, 0x0, @dev={0xfe, 0x80, [], 0x19}, 0x1f}, 0x1c) accept$alg(r0, 0x0, 0x0) sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f0000000000)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x8}, 0xb4fcd35419244434, &(0x7f00004ca000)={&(0x7f0000000300)=ANY=[], 0x1a1}, 0x1}, 0x0) syz_fuseblk_mount(&(0x7f0000001380)='./file0\x00', &(0x7f00000013c0)='./file0\x00', 0xf000, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0xb21, 0x0) socket(0x1e, 0x3, 0x0) socket(0x1e, 0x0, 0x0) ptrace$PTRACE_SECCOMP_GET_FILTER(0x420c, 0x0, 0x0, &(0x7f0000000380)=""/113) sched_yield() ioctl$TUNGETIFF(0xffffffffffffffff, 0x800454d2, &(0x7f0000000140)) ioctl$KIOCSOUND(r4, 0x4b2f, 0xfffffffffffffb74) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x20, 0x9b}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000447000)='./file0\x00', &(0x7f00000e1000)='msdos\x00', 0x0, &(0x7f000097bfff)) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000580)='./cgroup/syz0\x00', 0x1ff) [ 325.746148] binder: 31540:31547 unknown command 25 [ 325.747137] ? ns_test_super+0x50/0x50 [ 325.747147] ? kill_litter_super+0x90/0x90 [ 325.747159] sget+0xd2/0x120 [ 325.747178] mount_bdev+0x109/0x370 [ 325.747189] ? msdos_mount+0x40/0x40 [ 325.747205] msdos_mount+0x34/0x40 [ 325.747220] mount_fs+0x66/0x2d0 [ 325.747242] vfs_kern_mount.part.26+0xc6/0x4a0 [ 325.759490] binder: 31540:31547 ioctl c0306201 20000340 returned -22 [ 325.760249] ? may_umount+0xa0/0xa0 [ 325.760265] ? _raw_read_unlock+0x22/0x30 [ 325.760277] ? __get_fs_type+0x8a/0xc0 [ 325.760298] do_mount+0xea4/0x2bb0 [ 325.760320] ? copy_mount_string+0x40/0x40 [ 325.760334] ? trace_hardirqs_on_caller+0x421/0x5c0 [ 325.760349] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 325.760369] ? retint_kernel+0x10/0x10 [ 325.821561] ? copy_mount_options+0x18b/0x2e0 [ 325.826064] ? copy_mount_options+0x193/0x2e0 [ 325.830560] ? copy_mount_options+0x1f7/0x2e0 [ 325.835065] SyS_mount+0xab/0x120 [ 325.838508] ? copy_mnt_ns+0xb30/0xb30 [ 325.842378] do_syscall_64+0x281/0x940 [ 325.846252] ? vmalloc_sync_all+0x30/0x30 [ 325.850398] ? trace_event_raw_event_sys_exit+0x260/0x260 [ 325.855920] ? syscall_return_slowpath+0x550/0x550 [ 325.860841] ? syscall_return_slowpath+0x2ac/0x550 [ 325.865770] ? entry_SYSCALL_64_after_hwframe+0x52/0xb7 [ 325.871128] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 325.875966] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 325.881138] RIP: 0033:0x454e79 [ 325.884313] RSP: 002b:00007f37fba8ec68 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 325.892016] RAX: ffffffffffffffda RBX: 00007f37fba8f6d4 RCX: 0000000000454e79 [ 325.899274] RDX: 00000000200e1000 RSI: 0000000020447000 RDI: 0000000020000000 [ 325.906521] RBP: 000000000072bea0 R08: 000000002097bfff R09: 0000000000000000 [ 325.913769] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000019 [ 325.921026] R13: 00000000000003fa R14: 00000000006f8010 R15: 0000000000000011 [ 325.930300] print_req_error: I/O error, dev loop199, sector 0 [ 325.937430] FAT-fs (loop199): unable to read boot sector [ 325.944857] FAT-fs (loop199): unable to read boot sector [ 325.951153] FAT-fs (loop199): unable to read boot sector [ 325.964538] FAT-fs (loop199): unable to read boot sector [ 325.992112] FAT-fs (loop199): unable to read boot sector 2018/03/31 09:15:33 executing program 3: r0 = syz_open_dev$random(&(0x7f0000000500)='/dev/random\x00', 0x0, 0x8000) r1 = syz_open_dev$loop(&(0x7f0000308000)='/dev/loop#\x00', 0x0, 0x0) ioctl$LOOP_SET_STATUS(r1, 0xc0481273, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "3900ea631d00000000020000010000009f00000023f7b7d65f90b0e6330ee739b319d8f6aa6bd58d1443474482e85040fb4947ebb55bd19f335b5bffff0001f3", "cfa430745a540dc1c149b7b81579f6a41c51f7d51933223e82ab867dac761faf"}) write(0xffffffffffffffff, &(0x7f00000001c0), 0x0) setsockopt$inet_sctp6_SCTP_RECVNXTINFO(0xffffffffffffffff, 0x84, 0x21, &(0x7f00000003c0)=0x200, 0x4) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f00000000c0)=0x0) getsockopt$netrom_NETROM_T4(0xffffffffffffffff, 0x103, 0x6, &(0x7f0000000300)=0x8, &(0x7f0000000340)=0x4) r3 = getpid() sched_setparam(r3, &(0x7f0000000400)) syz_open_dev$loop(&(0x7f0000ca9ff5)='/dev/loop#\x00', 0x0, 0x82) r4 = memfd_create(&(0x7f0000614000)="74086e750000000000000000008c00", 0x0) pwritev(r4, &(0x7f0000f50f90)=[{&(0x7f0000000040)="aa", 0x1}], 0x1, 0x0) fcntl$getownex(r1, 0x10, &(0x7f0000000240)={0x0, 0x0}) r6 = syz_open_procfs(r5, &(0x7f0000000280)='stat\x00') epoll_ctl$EPOLL_CTL_MOD(r4, 0x3, r0, &(0x7f00000002c0)={0x20000010}) accept4$inet6(r4, &(0x7f0000000100)={0x0, 0x0, 0x0, @mcast1}, &(0x7f0000000140)=0x1c, 0x7fd) getsockopt$inet_IP_IPSEC_POLICY(r4, 0x0, 0x10, &(0x7f0000000940)={{{@in6=@local, @in6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@loopback}, 0x0, @in=@local}}, &(0x7f0000000780)=0xe8) getsockopt$sock_cred(r6, 0x1, 0x11, &(0x7f0000000480)={0x0, 0x0, 0x0}, &(0x7f00000004c0)=0xc) fchown(r4, r7, r8) r9 = syz_open_dev$binder(&(0x7f0000000100)='/dev/binder#\x00', 0xffffffffffffffff, 0x806) ioctl$BINDER_SET_CONTEXT_MGR(r6, 0x40046207, 0x0) mmap$binder(&(0x7f000000c000/0x2000)=nil, 0x2000, 0x0, 0x12, r9, 0x0) ioctl$BINDER_WRITE_READ(r9, 0xc0306201, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000), 0x0, 0x0, &(0x7f0000011f9d)}) getsockopt$inet_sctp6_SCTP_AUTO_ASCONF(0xffffffffffffffff, 0x84, 0x1e, &(0x7f0000000140), &(0x7f0000000180)=0x4) ioctl$BINDER_WRITE_READ(r9, 0xc0306201, &(0x7f0000000340)={0x8, 0x0, &(0x7f0000000440)=ANY=[@ANYRES64=r1], 0x0, 0x0, &(0x7f0000000240)}) write(0xffffffffffffffff, &(0x7f0000000300)="8be25f5790f664f32509e40d6f879d5add7e2d359c9a19afb750a2d25352875d187d4118c99a2d5c6db433c277cc7d345b87a34f1b417033d367cb0cfd6a25633f77aafb17e99c33cb65352c901ae75176f07bb0a4bb5ebff3d87e", 0x5b) r10 = ioctl$LOOP_CTL_GET_FREE(r4, 0x4c82) ioctl$LOOP_CTL_REMOVE(r6, 0x4c81, r10) openat$cgroup(0xffffffffffffff9c, &(0x7f0000000000)='syz0\x00', 0x200002, 0x0) sched_setaffinity(r2, 0x8, &(0x7f0000000200)=0x7) 2018/03/31 09:15:33 executing program 4: perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f000031f000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) prctl$void(0x0) r0 = getpid() r1 = syz_open_dev$vcsn(&(0x7f0000000040)='/dev/vcs#\x00', 0x0, 0x20000) ioctl$GIO_CMAP(r1, 0x4b70, &(0x7f0000000080)) r2 = socket$alg(0x26, 0x5, 0x0) ioctl$sock_SIOCGIFBR(0xffffffffffffffff, 0x8940, &(0x7f0000000040)=@get={0x1, &(0x7f0000000400)=""/242, 0x100000000}) bind$alg(r2, &(0x7f0000000080)={0x26, 'aead\x00', 0x0, 0x0, 'generic-gcm-aesni\x00'}, 0x58) syz_open_dev$sndmidi(&(0x7f0000000100)='/dev/snd/midiC#D#\x00', 0xfd, 0x0) bind(0xffffffffffffffff, &(0x7f0000000140)=@llc={0x1a, 0x33a, 0x7, 0x80, 0x0, 0x4, @remote={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xbb}}, 0x80) recvmsg(0xffffffffffffffff, &(0x7f0000000040)={&(0x7f0000000140)=@ipx, 0x10, &(0x7f0000002000)=[{&(0x7f0000000000)=""/232, 0xe8}, {&(0x7f000000a000)=""/181, 0x17d}], 0x2, &(0x7f000000c000)=""/105, 0x69}, 0x0) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x1, 0x5, &(0x7f0000002000)=@framed={{0x18}, [@jmp={0x5}], {0x95}}, &(0x7f0000003ff6)='syzkaller\x00', 0x3, 0x259, &(0x7f0000386000)=""/195}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000140)={r3, 0x0, 0xe, 0x6e, &(0x7f0000000080)="3447f36cbc3563f8dee5d01dbcef", &(0x7f00000000c0)=""/110}, 0x28) r4 = syz_init_net_socket$nfc_llcp(0x27, 0x1, 0x1) setsockopt$nfc_llcp_NFC_LLCP_MIUX(r4, 0x118, 0x15, &(0x7f0000000000), 0x4) r5 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/cuse\x00', 0x103002, 0x0) futimesat(r5, &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)={{0x0, 0x7530}}) r6 = syz_open_dev$vcsa(&(0x7f00000001c0)='/dev/vcsa#\x00', 0x2, 0x0) sendto$inet6(r6, &(0x7f0000000bc0), 0x0, 0x20000000, &(0x7f0000000c40)={0xa, 0x4e20, 0x0, @dev={0xfe, 0x80, [], 0x19}, 0x1c}, 0x1c) accept$alg(r1, 0x0, 0x0) sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f0000000000)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x8}, 0xb4fcd35419244434, &(0x7f00004ca000)={&(0x7f0000000300)=ANY=[], 0x1a1}, 0x1}, 0x0) r7 = syz_open_procfs(r0, &(0x7f0000000200)='net/rfcomm\x00') ioctl$DRM_IOCTL_ADD_CTX(r7, 0xc0086420, &(0x7f0000000240)) syz_fuseblk_mount(&(0x7f0000001380)='./file0\x00', &(0x7f00000013c0)='./file0\x00', 0xf000, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0xb21, 0x0) socket(0x1e, 0x3, 0x0) socket(0x1e, 0x0, 0x0) ptrace$PTRACE_SECCOMP_GET_FILTER(0x420c, 0x0, 0x0, &(0x7f0000000380)=""/113) sched_yield() ioctl$TUNGETIFF(r6, 0x800454d2, &(0x7f0000000140)) ioctl$KIOCSOUND(r6, 0x4b2f, 0xfffffffffffffb74) 2018/03/31 09:15:33 executing program 6: perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f000031f000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) prctl$void(0x0) getpid() r0 = syz_open_dev$vcsn(&(0x7f0000000040)='/dev/vcs#\x00', 0x0, 0x20000) ioctl$GIO_CMAP(r0, 0x4b70, &(0x7f0000000080)) r1 = socket$alg(0x26, 0x5, 0x0) ioctl$sock_SIOCGIFBR(0xffffffffffffffff, 0x8940, &(0x7f0000000040)=@get={0x1, &(0x7f0000000400)=""/242, 0x100000000}) bind$alg(r1, &(0x7f0000000080)={0x26, 'aead\x00', 0x0, 0x0, 'generic-gcm-aesni\x00'}, 0x58) syz_open_dev$sndmidi(&(0x7f0000000100)='/dev/snd/midiC#D#\x00', 0xfd, 0x0) bind(0xffffffffffffffff, &(0x7f0000000140)=@llc={0x1a, 0x33a, 0x7, 0x80, 0x0, 0x4, @remote={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xbb}}, 0x80) r2 = syz_init_net_socket$nfc_llcp(0x27, 0x1, 0x1) setsockopt$nfc_llcp_NFC_LLCP_MIUX(r2, 0x118, 0x15, &(0x7f0000000000), 0x4) r3 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/cuse\x00', 0x103002, 0x0) futimesat(r3, &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)={{0x0, 0x7530}}) r4 = syz_open_dev$vcsa(&(0x7f00000001c0)='/dev/vcsa#\x00', 0x2, 0x0) sendto$inet6(r4, &(0x7f0000000bc0), 0x0, 0x20000000, &(0x7f0000000c40)={0xa, 0x4e20, 0x0, @dev={0xfe, 0x80, [], 0x19}, 0x1f}, 0x1c) accept$alg(r0, 0x0, 0x0) sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f0000000000)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x8}, 0xb4fcd35419244434, &(0x7f00004ca000)={&(0x7f0000000300)=ANY=[], 0x1a1}, 0x1}, 0x0) syz_fuseblk_mount(&(0x7f0000001380)='./file0\x00', &(0x7f00000013c0)='./file0\x00', 0xf000, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0xb21, 0x0) socket(0x1e, 0x3, 0x0) socket(0x1e, 0x0, 0x0) ptrace$PTRACE_SECCOMP_GET_FILTER(0x420c, 0x0, 0x0, &(0x7f0000000380)=""/113) sched_yield() ioctl$TUNGETIFF(0xffffffffffffffff, 0x800454d2, &(0x7f0000000140)) ioctl$KIOCSOUND(r4, 0x4b2f, 0xfffffffffffffb74) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x20, 0x9b}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000447000)='./file0\x00', &(0x7f00000e1000)='msdos\x00', 0x0, &(0x7f000097bfff)) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000580)='./cgroup/syz0\x00', 0x1ff) 2018/03/31 09:15:33 executing program 7 (fault-call:24 fault-nth:18): perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f000031f000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getpid() r0 = syz_open_dev$vcsn(&(0x7f0000000040)='/dev/vcs#\x00', 0x0, 0x20000) ioctl$GIO_CMAP(r0, 0x4b70, &(0x7f0000000080)) r1 = socket$alg(0x26, 0x5, 0x0) ioctl$sock_SIOCGIFBR(r1, 0x8940, &(0x7f0000000040)=@get={0x1, &(0x7f0000000400)=""/242, 0x100000000}) bind$alg(r1, &(0x7f0000000080)={0x26, 'aead\x00', 0x0, 0x0, 'generic-gcm-aesni\x00'}, 0x58) syz_open_dev$sndmidi(&(0x7f0000000100)='/dev/snd/midiC#D#\x00', 0xfd, 0x0) bind(0xffffffffffffffff, &(0x7f0000000140)=@llc={0x1a, 0x33a, 0x7, 0x80, 0x5, 0x4, @remote={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xbb}}, 0x80) r2 = syz_init_net_socket$nfc_llcp(0x27, 0x1, 0x1) setsockopt$nfc_llcp_NFC_LLCP_MIUX(r2, 0x118, 0x15, &(0x7f0000000000), 0x4) r3 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/cuse\x00', 0x103002, 0x0) futimesat(r3, &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)={{0x0, 0x7530}}) r4 = syz_open_dev$vcsa(&(0x7f00000001c0)='/dev/vcsa#\x00', 0x2, 0x4020ff) sendto$inet6(r4, &(0x7f0000000bc0)="36251e313e0743fc195a1a198a14434e8a0a00b3f452a3b5644e336ec712a16310c9aecc4e3097bc666a8882128a73c368ce731e9fbf3fe18fa52d00", 0x3c, 0x20000000, &(0x7f0000000c40)={0xa, 0x0, 0x6, @dev={0xfe, 0x80, [], 0x19}, 0x1f}, 0x1c) accept$alg(r0, 0x0, 0x0) sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f0000000000)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x8}, 0xb4fcd35419244434, &(0x7f00004ca000)={&(0x7f0000000300)=ANY=[], 0x1a1}, 0x1}, 0x0) syz_fuseblk_mount(&(0x7f0000001380)='./file0\x00', &(0x7f00000013c0)='./file0\x00', 0xf000, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0xb21, 0x0) socket(0x1e, 0x3, 0x0) socket(0x1e, 0x0, 0x0) ptrace$PTRACE_SECCOMP_GET_FILTER(0x420c, 0x0, 0x0, &(0x7f0000000380)=""/113) sched_yield() ioctl$TUNGETIFF(r4, 0x800454d2, &(0x7f0000000140)) ioctl$KIOCSOUND(r4, 0x4b2f, 0xfffffffffffffb74) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000447000)='./file0\x00', &(0x7f00000e1000)='msdos\x00', 0x0, &(0x7f000097bfff)) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000580)='./cgroup/syz0\x00', 0x1ff) syz_open_dev$audion(&(0x7f0000000280)='/dev/audio#\x00', 0x7be, 0x0) 2018/03/31 09:15:33 executing program 1: perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f000031f000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) prctl$void(0x0) getpid() r0 = syz_open_dev$vcsn(&(0x7f0000000040)='/dev/vcs#\x00', 0x400, 0x20000) r1 = socket$alg(0x26, 0x5, 0x0) ioctl$sock_SIOCGIFBR(r1, 0x8940, &(0x7f0000000040)=@get={0x1, &(0x7f0000000400)=""/242, 0x100000000}) bind$alg(r1, &(0x7f0000000080)={0x26, 'aead\x00', 0x0, 0x0, 'generic-gcm-aesni\x00'}, 0x58) r2 = syz_open_dev$sndmidi(&(0x7f0000000100)='/dev/snd/midiC#D#\x00', 0x4000000000100, 0x0) bind(r2, &(0x7f0000000140)=@llc={0x1a, 0x33a, 0x7, 0x80, 0x0, 0x4, @remote={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xbb}}, 0x80) r3 = syz_init_net_socket$nfc_llcp(0x27, 0x1, 0x1) setsockopt$nfc_llcp_NFC_LLCP_MIUX(r3, 0x118, 0x15, &(0x7f0000000000), 0x4) r4 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/cuse\x00', 0x103002, 0x0) futimesat(r4, &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)={{0x0, 0x7530}}) r5 = syz_open_dev$vcsa(&(0x7f00000001c0)='/dev/vcsa#\x00', 0x2, 0x4020ff) sendto$inet6(r5, &(0x7f0000000bc0), 0x0, 0x20000000, &(0x7f0000000c40)={0xa, 0x4e20, 0x6, @dev={0xfe, 0x80, [], 0x19}, 0x1f}, 0x1c) getsockopt$bt_BT_FLUSHABLE(r0, 0x112, 0x8, &(0x7f0000000200)=0x48, &(0x7f0000000240)=0x4) sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f0000000000)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x8}, 0xb4fcd35419244434, &(0x7f00004ca000)={&(0x7f0000000300)=ANY=[], 0x1a1}, 0x1}, 0x0) syz_fuseblk_mount(&(0x7f0000001380)='./file0\x00', &(0x7f00000013c0)='./file0\x00', 0xf000, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0xb21, 0x0) socket(0x1e, 0x3, 0x0) ptrace$PTRACE_SECCOMP_GET_FILTER(0x420c, 0x0, 0x0, &(0x7f0000000380)=""/113) sched_yield() ioctl$TUNGETIFF(r5, 0x800454d2, &(0x7f0000000140)) ioctl$KIOCSOUND(r5, 0x4b2f, 0xfffffffffffffb74) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x20, 0x9b}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000447000)='./file0\x00', &(0x7f00000e1000)='msdos\x00', 0x0, &(0x7f000097bfff)) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000580)='./cgroup/syz0\x00', 0x1ff) syz_open_dev$audion(&(0x7f0000000280)='/dev/audio#\x00', 0x7be, 0x0) fcntl$getown(0xffffffffffffffff, 0x9) 2018/03/31 09:15:33 executing program 0: perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f000031f000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) prctl$void(0x0) r0 = syz_open_dev$vcsn(&(0x7f0000000040)='/dev/vcs#\x00', 0x0, 0x20000) socket$alg(0x26, 0x5, 0x0) ioctl$sock_SIOCGIFBR(0xffffffffffffffff, 0x8940, &(0x7f0000000040)=@get={0x1, &(0x7f0000000400)=""/242, 0x100000000}) bind$alg(0xffffffffffffffff, &(0x7f0000000080)={0x26, 'aead\x00', 0x0, 0x0, 'generic-gcm-aesni\x00'}, 0x58) r1 = syz_open_dev$sndmidi(&(0x7f0000000100)='/dev/snd/midiC#D#\x00', 0xfd, 0x0) bind(0xffffffffffffffff, &(0x7f0000000140)=@llc={0x1a, 0x33a, 0x7, 0x80, 0x0, 0x4, @remote={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xbb}}, 0x80) r2 = syz_init_net_socket$nfc_llcp(0x27, 0x3, 0x1) setsockopt$nfc_llcp_NFC_LLCP_MIUX(r2, 0x118, 0x15, &(0x7f0000000000), 0x4) r3 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/cuse\x00', 0x103002, 0x0) futimesat(r3, &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)={{0x0, 0x7530}}) r4 = syz_open_dev$vcsa(&(0x7f00000001c0)='/dev/vcsa#\x00', 0x2, 0x0) sendto$inet6(r4, &(0x7f0000000bc0)="36251e313e0743fc195a1a198a14434e8a0a00b3f452a3b5644e336ec712a16310c9aecc4e3097bc666a8882128a73c368ce731e9fbf3fe18fa52d00c34ac2e57c1c4569cfbd6a621c6dfbc032121aed", 0x50, 0x20000000, &(0x7f0000000c40)={0xa, 0x4e20, 0x6, @dev={0xfe, 0x80, [], 0x19}, 0x1f}, 0x1c) r5 = accept$alg(r0, 0x0, 0x0) sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f0000000000)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x8}, 0xb4fcd35419244434, &(0x7f00004ca000)={&(0x7f0000000300)=ANY=[], 0x1a1}, 0x1}, 0x0) syz_fuseblk_mount(&(0x7f0000001380)='./file0\x00', &(0x7f00000013c0)='./file0\x00', 0xf000, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0xb21, 0x0) socket(0x1e, 0x3, 0x0) socket(0x1e, 0x0, 0x0) ptrace$PTRACE_SECCOMP_GET_FILTER(0x420c, 0x0, 0x0, &(0x7f0000000380)=""/113) sched_yield() ioctl$TUNGETIFF(r4, 0x800454d2, &(0x7f0000000140)) ioctl$KIOCSOUND(r4, 0x4b2f, 0xfffffffffffffb74) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x20, 0x9b}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000447000)='./file0\x00', &(0x7f00000e1000)='msdos\x00', 0x0, &(0x7f000097bfff)) setsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX_OLD(r1, 0x84, 0x6b, &(0x7f0000000200)=[@in={0x2, 0x4e20, @rand_addr=0x3}, @in={0x2, 0x4e24, @broadcast=0xffffffff}, @in6={0xa, 0x4e22, 0x3, @local={0xfe, 0x80, [], 0xaa}, 0x7fffffff}, @in6={0xa, 0x4e24, 0xffffffff, @remote={0xfe, 0x80, [], 0xbb}, 0xcca}, @in={0x2, 0x4e23, @broadcast=0xffffffff}, @in={0x2, 0x4e24, @multicast2=0xe0000002}, @in={0x2, 0x4e24, @remote={0xac, 0x14, 0x14, 0xbb}}, @in6={0xa, 0x4e20, 0x545cb6cb, @mcast2={0xff, 0x2, [], 0x1}, 0x2}], 0xa4) getsockopt$inet_sctp6_SCTP_AUTOCLOSE(r5, 0x84, 0x4, &(0x7f00000002c0), &(0x7f0000000300)=0x4) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000580)='./cgroup/syz0\x00', 0x1ff) 2018/03/31 09:15:33 executing program 5: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, @perf_bp={&(0x7f000031f000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) prctl$void(0x0) getpid() r0 = syz_open_dev$vcsn(&(0x7f0000000040)='/dev/vcs#\x00', 0x0, 0x20000) ioctl$GIO_CMAP(r0, 0x4b70, &(0x7f0000000080)) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000080)={0x26, 'aead\x00', 0x0, 0x0, 'generic-gcm-aesni\x00'}, 0x58) syz_open_dev$sndmidi(&(0x7f0000000100)='/dev/snd/midiC#D#\x00', 0xfd, 0x0) bind(0xffffffffffffffff, &(0x7f0000000140)=@llc={0x1a, 0x33a, 0x7, 0x80, 0x5, 0x4, @remote={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xbb}}, 0x80) r2 = syz_init_net_socket$nfc_llcp(0x27, 0x1, 0x1) setsockopt$nfc_llcp_NFC_LLCP_MIUX(r2, 0x118, 0x15, &(0x7f0000000000), 0x4) r3 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/cuse\x00', 0x103002, 0x0) futimesat(r3, &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)={{0x0, 0x7530}}) r4 = syz_open_dev$vcsa(&(0x7f00000001c0)='/dev/vcsa#\x00', 0x2, 0x4020ff) sendto$inet6(0xffffffffffffffff, &(0x7f0000000bc0)="36251e313e0743fc195a1a198a14434e8a0a00b3f452a3b5644e336ec712a16310c9aecc4e3097bc666a8882128a73c368ce731e9fbf3fe18fa52d", 0x3b, 0x20000000, &(0x7f0000000c40)={0xa, 0x4e20, 0x6, @dev={0xfe, 0x80, [], 0x19}, 0x1f}, 0x1c) accept$alg(r0, 0x0, 0x0) sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f0000000000)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x8}, 0xb4fcd35419244434, &(0x7f00004ca000)={&(0x7f0000000300)=ANY=[], 0x1a1}, 0x1}, 0x0) syz_fuseblk_mount(&(0x7f0000001380)='./file0\x00', &(0x7f00000013c0)='./file0\x00', 0xf000, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0xb21, 0x0) socket(0x1e, 0x3, 0x0) socket(0x1e, 0x0, 0x0) ptrace$PTRACE_SECCOMP_GET_FILTER(0x420c, 0x0, 0x0, &(0x7f0000000380)=""/113) sched_yield() ioctl$TUNGETIFF(r4, 0x800454d2, &(0x7f0000000140)) ioctl$KIOCSOUND(r4, 0x4b2f, 0xfffffffffffffb74) perf_event_open(&(0x7f000025c000)={0x2, 0x12e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x20, 0x9a}, 0x0, 0xd, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000447000)='./file0\x00', &(0x7f00000002c0), 0x0, &(0x7f0000000300)) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000580)='./cgroup/syz0\x00', 0x1ff) syz_open_dev$audion(&(0x7f0000000280)='/dev/audio#\x00', 0x7be, 0x0) 2018/03/31 09:15:33 executing program 2: syz_open_dev$loop(&(0x7f00000003c0)='/dev/loop#\x00', 0x8, 0x0) r0 = syz_open_dev$sndseq(&(0x7f00000001c0)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r0, 0x4040534e, &(0x7f000019ffe9)={0xc1}) r1 = accept(0xffffffffffffffff, &(0x7f0000000080)=@can, &(0x7f0000000180)=0x80) ioctl$sock_inet_SIOCRTMSG(r1, 0x890d, &(0x7f0000000200)={0x80, {0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x19}}, {0x2, 0x4e21, @local={0xac, 0x14, 0x14, 0xaa}}, {0x2, 0x4e23}, 0x0, 0x7, 0x1, 0x0, 0x9, 0x0, 0x0, 0x0, 0xfffffffffffffff7}) getsockopt$inet_sctp_SCTP_PRIMARY_ADDR(0xffffffffffffffff, 0x84, 0x6, &(0x7f0000000ac0)={0x0, @in={{0x2, 0x4e20, @loopback=0x7f000001}}}, &(0x7f00000002c0)=0x84) setsockopt$inet_sctp_SCTP_ENABLE_STREAM_RESET(r1, 0x84, 0x76, &(0x7f0000000300)={r2, 0x1c9}, 0x8) r3 = syz_open_dev$sg(&(0x7f0000000700)='/dev/sg#\x00', 0xfffffffffffffff7, 0x800) clone(0x2000c100, &(0x7f0000000800)="97bb77038add5df9e9d4f9783b82c55fe59e5c0acdbcfc9bcf92ac0e1f1f3c1959c1d25dfabf3849336c7c85be174d7765b47e113632aea54b87e4d3f2c1db09e6aa4040b43d17308fb7e62e808067da2fff3cfd8e4c038c814bbfc6bc49d8ebc8671d8297e2d34dc61f2d194d2dbb8f59b4c853e0714d3d4bb29d1243fac01c86c8c4dd38daedab3c6ad73a72d3f6dd2684aa82e5285eb82452c9848b7beb8bc513ba8c8973cad0bd5926604846b7f5d0397b", &(0x7f00000008c0), &(0x7f0000000900), &(0x7f0000000940)="ed6c04412e782fe395f084741e3d9fe469aebde09acc8f8d8d84d1f00f5573b09acba487077ebb904cb1f3fed55f59d677ce24bbd2a7506df8e1e0d0fc709cb8c9f4ab2aeeeebc5ef879742c1f7628f1862c88b5b0da89acbf43ef12e4839405b6a3430d296fea06d2f3a8356c57ec991e") ioctl$SNDRV_SEQ_IOCTL_SUBSCRIBE_PORT(r0, 0x40505330, &(0x7f0000ec6fb0)={{}, {0x80}}) getsockopt$netrom_NETROM_T1(r1, 0x103, 0x1, &(0x7f0000000000), &(0x7f0000000380)=0x4) syz_open_dev$adsp(&(0x7f0000000600)='/dev/adsp#\x00', 0x100000000, 0x80000) rt_sigprocmask(0x3d738072cd0f41ac, &(0x7f0000000cc0)={0x7}, &(0x7f0000000d00), 0x8) clone(0x40000000, &(0x7f0000000500)="67cdd9994c47c31d325b069924a7064c157c2ec0b5b5dca2feeb7dabef3b7af0d02d559e293faa759f2b3cb12aea360c2d", &(0x7f0000000580), &(0x7f00000005c0), &(0x7f0000000a00)="29859fdda9a119e54a27f9ec76b4d63a16dc5bbdd38c2fda0e5f4d8f830cd987ec7d3ffc66cf3db8820968fd89a1fba8fe6352a29a27f3b000bcdf238f2c04b358fc831025180e0be313da41de6366c94a1a0f86aaffdf2c039111b55275c054e14819a827fe809225249a01944263a2aec15f64e752e35892b1b8e7ef1e0e9115") ioctl$SNDRV_SEQ_IOCTL_DELETE_PORT(r0, 0x40a85321, &(0x7f0000000b80)={{0x4, 0x8}, 'port0\x00', 0x80, 0x0, 0x10000, 0x6, 0x2, 0x80, 0x8, 0x0, 0x0, 0x3dec00}) getsockopt$inet_sctp_SCTP_SOCKOPT_PEELOFF(r3, 0x84, 0x66, &(0x7f0000000c40)={r2, 0x6}, &(0x7f0000000c80)=0x8) clock_settime(0x7, &(0x7f0000000740)={0x77359400}) ioctl$SNDRV_SEQ_IOCTL_CLIENT_ID(r0, 0x80045301, &(0x7f0000000340)) r4 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer2\x00', 0x0, 0x0) openat$sequencer2(0xffffffffffffff9c, &(0x7f00000006c0)='/dev/sequencer2\x00', 0x222081, 0x0) ioctl$RNDADDENTROPY(0xffffffffffffffff, 0x40085203, &(0x7f0000000100)=ANY=[@ANYPTR=&(0x7f0000000680)=ANY=[@ANYPTR64=&(0x7f0000000640)=ANY=[@ANYPTR, @ANYPTR]]]) setsockopt$inet_sctp_SCTP_DEFAULT_SEND_PARAM(r4, 0x84, 0xa, &(0x7f0000000140)={0x5, 0x100000001, 0x0, 0x8, 0x0, 0x7, 0x401, 0x1f, r2}, 0x20) 2018/03/31 09:15:33 executing program 6: perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f000031f000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) prctl$void(0x0) getpid() r0 = syz_open_dev$vcsn(&(0x7f0000000040)='/dev/vcs#\x00', 0x0, 0x20000) ioctl$GIO_CMAP(r0, 0x4b70, &(0x7f0000000080)) r1 = socket$alg(0x26, 0x5, 0x0) ioctl$sock_SIOCGIFBR(0xffffffffffffffff, 0x8940, &(0x7f0000000040)=@get={0x1, &(0x7f0000000400)=""/242, 0x100000000}) bind$alg(r1, &(0x7f0000000080)={0x26, 'aead\x00', 0x0, 0x0, 'generic-gcm-aesni\x00'}, 0x58) syz_open_dev$sndmidi(&(0x7f0000000100)='/dev/snd/midiC#D#\x00', 0xfd, 0x0) bind(0xffffffffffffffff, &(0x7f0000000140)=@llc={0x1a, 0x33a, 0x7, 0x80, 0x0, 0x4, @remote={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xbb}}, 0x80) r2 = syz_init_net_socket$nfc_llcp(0x27, 0x1, 0x1) setsockopt$nfc_llcp_NFC_LLCP_MIUX(r2, 0x118, 0x15, &(0x7f0000000000), 0x4) r3 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/cuse\x00', 0x103002, 0x0) futimesat(r3, &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)={{0x0, 0x7530}}) r4 = syz_open_dev$vcsa(&(0x7f00000001c0)='/dev/vcsa#\x00', 0x2, 0x0) sendto$inet6(r4, &(0x7f0000000bc0), 0x0, 0x20000000, &(0x7f0000000c40)={0xa, 0x4e20, 0x0, @dev={0xfe, 0x80, [], 0x19}, 0x1f}, 0x1c) accept$alg(r0, 0x0, 0x0) sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f0000000000)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x8}, 0xb4fcd35419244434, &(0x7f00004ca000)={&(0x7f0000000300)=ANY=[], 0x1a1}, 0x1}, 0x0) syz_fuseblk_mount(&(0x7f0000001380)='./file0\x00', &(0x7f00000013c0)='./file0\x00', 0xf000, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0xb21, 0x0) socket(0x1e, 0x3, 0x0) socket(0x1e, 0x0, 0x0) ptrace$PTRACE_SECCOMP_GET_FILTER(0x420c, 0x0, 0x0, &(0x7f0000000380)=""/113) sched_yield() ioctl$TUNGETIFF(0xffffffffffffffff, 0x800454d2, &(0x7f0000000140)) ioctl$KIOCSOUND(r4, 0x4b2f, 0xfffffffffffffb74) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x20, 0x9b}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000447000)='./file0\x00', &(0x7f00000e1000)='msdos\x00', 0x0, &(0x7f000097bfff)) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000580)='./cgroup/syz0\x00', 0x1ff) [ 326.712683] FAT-fs (loop199): unable to read boot sector [ 326.714754] binder: 31561:31569 unknown command 20 [ 326.738208] FAT-fs (loop199): unable to read boot sector [ 326.743078] binder: 31561:31569 ioctl c0306201 20000340 returned -22 2018/03/31 09:15:33 executing program 5: perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f000031f000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) prctl$void(0x0) getpid() r0 = syz_open_dev$vcsn(&(0x7f0000000040)='/dev/vcs#\x00', 0x0, 0x20000) ioctl$GIO_CMAP(r0, 0x4b70, &(0x7f0000000080)) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000080)={0x26, 'aead\x00', 0x0, 0x0, 'generic-gcm-aesni\x00'}, 0x58) syz_open_dev$sndmidi(&(0x7f0000000100)='/dev/snd/midiC#D#\x00', 0xfd, 0x0) bind(0xffffffffffffffff, &(0x7f0000000140)=@llc={0x1a, 0x33a, 0x7, 0x80, 0x5, 0x4, @remote={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xbb}}, 0x80) r2 = syz_init_net_socket$nfc_llcp(0x27, 0x1, 0x1) setsockopt$nfc_llcp_NFC_LLCP_MIUX(r2, 0x118, 0x15, &(0x7f0000000000), 0x4) r3 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/cuse\x00', 0x103002, 0x0) futimesat(r3, &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)={{0x0, 0x7530}}) r4 = syz_open_dev$vcsa(&(0x7f00000001c0)='/dev/vcsa#\x00', 0x2, 0x4020ff) sendto$inet6(0xffffffffffffffff, &(0x7f0000000bc0)="36251e313e0743fc195a1a198a14434e8a0a00b3f452a3b5644e336ec712a16310c9aecc4e3097bc666a8882128a73c368ce731e9fbf3fe18fa52d", 0x3b, 0x20000000, &(0x7f0000000c40)={0xa, 0x4e20, 0x6, @dev={0xfe, 0x80, [], 0x19}, 0x1f}, 0x1c) ioctl$TIOCOUTQ(r4, 0x5411, &(0x7f0000000200)) accept$alg(r0, 0x0, 0x0) sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f0000000000)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x8}, 0xb4fcd35419244434, &(0x7f00004ca000)={&(0x7f0000000300)=ANY=[], 0x1a1}, 0x1}, 0x0) syz_fuseblk_mount(&(0x7f0000001380)='./file0\x00', &(0x7f00000013c0)='./file0\x00', 0xf000, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0xb21, 0x0) socket(0x1e, 0x3, 0x0) r5 = socket(0x1e, 0x0, 0x0) ptrace$PTRACE_SECCOMP_GET_FILTER(0x420c, 0x0, 0x0, &(0x7f0000000380)=""/113) getsockopt$inet_sctp6_SCTP_DEFAULT_SNDINFO(r0, 0x84, 0x22, &(0x7f0000000240)={0x5, 0x8205, 0x100000000, 0x4, 0x0}, &(0x7f00000002c0)=0x10) getsockopt$inet_sctp_SCTP_GET_PEER_ADDRS(r5, 0x84, 0x6c, &(0x7f0000000400)=ANY=[@ANYRES32=r6, @ANYBLOB="010200e14362480ce93b46e0a5486bf77a261986dd6d3cb18ebf5fd3e5e008f350a7286bb7e1bb042a4242a1bcbce499b9bd725bbf8f600eb12708196eab31039c222ad0dd5f"], &(0x7f0000000340)=0x8) sched_yield() ioctl$TUNGETIFF(r4, 0x800454d2, &(0x7f0000000140)) ioctl$KIOCSOUND(r4, 0x4b2f, 0xfffffffffffffb74) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x20, 0x9b}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000447000)='./file0\x00', &(0x7f00000e1000)='msdos\x00', 0x0, &(0x7f000097bfff)) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000580)='./cgroup/syz0\x00', 0x1ff) syz_open_dev$audion(&(0x7f0000000280)='/dev/audio#\x00', 0x7be, 0x0) 2018/03/31 09:15:33 executing program 4: perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f000031f000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) prctl$void(0x0) getpid() r0 = syz_open_dev$vcsn(&(0x7f0000000040)='/dev/vcs#\x00', 0x0, 0x20000) ioctl$GIO_CMAP(r0, 0x4b70, &(0x7f0000000080)) r1 = socket$alg(0x26, 0x5, 0x0) ioctl$sock_SIOCGIFBR(r1, 0x8940, &(0x7f0000000040)=@get={0x1, &(0x7f0000000400)=""/242, 0x100000000}) bind$alg(r0, &(0x7f0000000080)={0x26, 'aead\x00', 0x0, 0x0, 'generic-gcm-aesni\x00'}, 0xfffffffffffffee0) syz_open_dev$sndmidi(&(0x7f0000000100)='/dev/snd/midiC#D#\x00', 0xfd, 0x0) bind(0xffffffffffffffff, &(0x7f0000000140)=@llc={0x1a, 0x33a, 0x7, 0x80, 0x0, 0x4, @remote={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xbb}}, 0x80) r2 = syz_init_net_socket$nfc_llcp(0x27, 0x1, 0x1) setsockopt$nfc_llcp_NFC_LLCP_MIUX(r2, 0x118, 0x15, &(0x7f0000000000)=0x2000002, 0x4) r3 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/cuse\x00', 0x103002, 0x0) futimesat(r3, &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)={{0x0, 0x7530}}) r4 = syz_open_dev$vcsa(&(0x7f00000001c0)='/dev/vcsa#\x00', 0x2, 0x0) sendto$inet6(r4, &(0x7f0000000bc0), 0x0, 0x20000000, &(0x7f0000000c40)={0xa, 0x4e20, 0x0, @dev={0xfe, 0x80, [], 0x19}, 0x1f}, 0x1c) accept$alg(r0, 0x0, 0x0) sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f0000000000)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x8}, 0xb4fcd35419244434, &(0x7f00004ca000)={&(0x7f0000000300)=ANY=[], 0x1a1}, 0x1}, 0x0) syz_fuseblk_mount(&(0x7f0000001380)='./file0\x00', &(0x7f00000013c0)='./file0\x00', 0xf000, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0xb21, 0x0) socket(0x1e, 0x3, 0x0) socket(0x1e, 0x0, 0x0) ptrace$PTRACE_SECCOMP_GET_FILTER(0x420c, 0x0, 0x0, &(0x7f0000000380)=""/113) sched_yield() ioctl$KIOCSOUND(r4, 0x4b2f, 0xfffffffffffffb74) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x20, 0x9b}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000447000)='./file0\x00', &(0x7f00000e1000)='msdos\x00', 0x0, &(0x7f000097bfff)) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000580)='./cgroup/syz0\x00', 0x1ff) [ 326.778750] binder: 31561:31578 unknown command 26 [ 326.788558] FAT-fs (loop199): unable to read boot sector [ 326.804893] binder: 31561:31578 ioctl c0306201 20000340 returned -22 [ 326.813591] FAT-fs (loop199): unable to read boot sector [ 326.856524] FAULT_INJECTION: forcing a failure. [ 326.856524] name failslab, interval 1, probability 0, space 0, times 0 [ 326.867810] CPU: 1 PID: 31584 Comm: syz-executor7 Not tainted 4.16.0-rc7+ #8 [ 326.867817] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 326.867821] Call Trace: [ 326.867838] dump_stack+0x194/0x24d [ 326.867851] ? arch_local_irq_restore+0x53/0x53 [ 326.867864] ? __save_stack_trace+0x7e/0xd0 [ 326.867882] should_fail+0x8c0/0xa40 2018/03/31 09:15:33 executing program 0: perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f000031f000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) prctl$void(0x0) r0 = syz_open_dev$vcsn(&(0x7f0000000040)='/dev/vcs#\x00', 0x0, 0x20000) r1 = socket$alg(0x26, 0x5, 0x0) clock_gettime(0x0, &(0x7f0000000240)={0x0, 0x0}) clock_gettime(0x0, &(0x7f0000000280)={0x0, 0x0}) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f00000005c0)={{{@in=@multicast1, @in=@remote}}, {{@in=@broadcast}, 0x0, @in6=@mcast2}}, &(0x7f0000000540)=0xe8) sendmsg$can_bcm(r1, &(0x7f0000000500)={&(0x7f0000000200)={0x1d}, 0x10, &(0x7f0000000340)={&(0x7f00000006c0)=ANY=[@ANYBLOB="07000000400000000300000000000000", @ANYRES64=r2, @ANYRES64=r3/1000+10000, @ANYRES64=r4, @ANYRES64=r5/1000+10000, @ANYBLOB="0100006001000000000000e026002cfff2acd58e3a36305cc8cf4448bb70fec15f506b0d87f3d4d3ea39e89f2243db8b6a2b13e1b0835bc4f6d7163668e5f72b52fad040040fb54bb9fa5121cc70fb977e9fffaeb67240f2ee705839c2ffafca218fb92d36e09455dc1cf7de83b1736b6febedeb01dae0273021782472f9e282b2491e22d9450679216038acb8388a61440f61b4be8e55374d457b59ecd6314bc128ef2d1ddfa90a73437b1a75428b0e12d55992190af50b54798e6941249db456033360a1d2dbbb31a648f288867d0121afeeb62218f80d9cb5f17b544657cfa5607511000000000000000000"], 0x80}, 0x1, 0x0, 0x0, 0x80}, 0x40) ioctl$sock_SIOCGIFBR(0xffffffffffffffff, 0x8940, &(0x7f0000000040)=@get={0x1, &(0x7f0000000400)=""/242, 0x100000000}) bind$alg(0xffffffffffffffff, &(0x7f0000000080)={0x26, 'aead\x00', 0x0, 0x0, 'generic-gcm-aesni\x00'}, 0x58) r6 = syz_open_dev$sndmidi(&(0x7f0000000100)='/dev/snd/midiC#D#\x00', 0xfd, 0x0) bind(0xffffffffffffffff, &(0x7f0000000140)=@llc={0x1a, 0x33a, 0x7, 0x80, 0x0, 0x4, @remote={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xbb}}, 0x80) r7 = syz_init_net_socket$nfc_llcp(0x27, 0x1, 0x1) setsockopt$nfc_llcp_NFC_LLCP_MIUX(r7, 0x118, 0x15, &(0x7f0000000000), 0x4) r8 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/cuse\x00', 0x103002, 0x0) futimesat(r8, &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)={{0x0, 0x7530}}) r9 = syz_open_dev$vcsa(&(0x7f00000001c0)='/dev/vcsa#\x00', 0x2, 0x0) sendto$inet6(r9, &(0x7f0000000bc0)="36251e313e0743fc195a1a198a14434e8a0a00b3f452a3b5644e336ec712a16310c9aecc4e3097bc666a8882128a73c368ce731e9fbf3fe18fa52d00c34ac2e57c1c4569cfbd6a621c6dfbc032121aed", 0x50, 0x20000000, &(0x7f0000000c40)={0xa, 0x4e20, 0x6, @dev={0xfe, 0x80, [], 0x19}, 0x1f}, 0x1c) accept$alg(r6, 0x0, 0x0) sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f0000000000)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x8}, 0xb4fcd35419244434, &(0x7f00004ca000)={&(0x7f0000000300)=ANY=[], 0x1a1}, 0x1}, 0x0) syz_fuseblk_mount(&(0x7f0000001380)='./file0\x00', &(0x7f00000013c0)='./file0\x00', 0xf000, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0xb21, 0x0) socket(0x1e, 0x3, 0x0) socket(0x1e, 0x0, 0x0) ptrace$PTRACE_SECCOMP_GET_FILTER(0x420c, 0x0, 0x0, &(0x7f0000000380)=""/113) sched_yield() ioctl$TUNGETIFF(r9, 0x800454d2, &(0x7f0000000140)) ioctl$KIOCSOUND(r9, 0x4b2f, 0xfffffffffffffb74) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x20, 0x9b}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000447000)='./file0\x00', &(0x7f00000e1000)='msdos\x00', 0x0, &(0x7f000097bfff)) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000580)='./cgroup/syz0\x00', 0x1ff) 2018/03/31 09:15:34 executing program 1: perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f000031f000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) prctl$void(0x0) getpid() syz_open_dev$vcsn(&(0x7f0000000040)='/dev/vcs#\x00', 0x400, 0x20000) r0 = socket$alg(0x26, 0x5, 0x0) ioctl$sock_SIOCGIFBR(r0, 0x8940, &(0x7f0000000040)=@get={0x1, &(0x7f0000000400)=""/242, 0x100000000}) bind$alg(r0, &(0x7f0000000080)={0x26, 'aead\x00', 0x0, 0x0, 'generic-gcm-aesni\x00'}, 0x58) r1 = syz_open_dev$sndmidi(&(0x7f0000000100)='/dev/snd/midiC#D#\x00', 0xfd, 0x0) bind(r1, &(0x7f0000000140)=@llc={0x1a, 0x33a, 0x7, 0x80, 0x0, 0x4, @remote={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xbb}}, 0x80) r2 = syz_init_net_socket$nfc_llcp(0x27, 0x1, 0x1) setsockopt$nfc_llcp_NFC_LLCP_MIUX(r2, 0x118, 0x15, &(0x7f0000000000), 0x4) r3 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/cuse\x00', 0x103002, 0x0) futimesat(r3, &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)={{0x0, 0x7530}}) r4 = syz_open_dev$vcsa(&(0x7f00000001c0)='/dev/vcsa#\x00', 0x2, 0x4020ff) sendto$inet6(r4, &(0x7f0000000bc0), 0x0, 0x20000000, &(0x7f0000000200)={0xa, 0x4e20, 0x6, @dev={0xfe, 0x80, [], 0x19}, 0x1f}, 0xffffffffffffffa5) sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f0000000000)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x8}, 0xb4fcd35419244434, &(0x7f00004ca000)={&(0x7f0000000300)=ANY=[], 0x1a1}, 0x1}, 0x0) syz_fuseblk_mount(&(0x7f0000001380)='./file0\x00', &(0x7f00000013c0)='./file0\x00', 0xf000, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0xb21, 0x0) ioctl$DRM_IOCTL_DROP_MASTER(r3, 0x641f) socket(0x1e, 0x3, 0x0) ptrace$PTRACE_SECCOMP_GET_FILTER(0x420c, 0x0, 0x0, &(0x7f0000000380)=""/113) sched_yield() ioctl$TUNGETIFF(r4, 0x800454d2, &(0x7f0000000140)) ioctl$KIOCSOUND(r4, 0x4b2f, 0xfffffffffffffb74) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x20, 0x9b}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000447000)='./file0\x00', &(0x7f00000e1000)='msdos\x00', 0x0, &(0x7f000097bfff)) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000580)='./cgroup/syz0\x00', 0x1ff) syz_open_dev$audion(&(0x7f0000000280)='/dev/audio#\x00', 0x7be, 0x0) fcntl$getown(0xffffffffffffffff, 0x9) 2018/03/31 09:15:34 executing program 3: r0 = syz_open_dev$random(&(0x7f00000001c0)='/dev/random\x00', 0x0, 0x800) r1 = syz_open_dev$loop(&(0x7f0000308000)='/dev/loop#\x00', 0x0, 0x0) ioctl$LOOP_SET_STATUS(r1, 0xc0481273, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "3900ea631d00000000020000010000009f00000023f7b7d65f90b0e6330ee739b319d8f6aa6bd58d1443474482e85040fb4947ebb55bd19f335b5bffff0001f3", "cfa430745a540dc1c149b7b81579f6a41c51f7d51933223e82ab867dac761faf"}) write(0xffffffffffffffff, &(0x7f00000001c0), 0x0) setsockopt$inet_sctp6_SCTP_RECVNXTINFO(0xffffffffffffffff, 0x84, 0x21, &(0x7f00000003c0)=0x200, 0x4) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f00000000c0)=0x0) getsockopt$netrom_NETROM_T4(0xffffffffffffffff, 0x103, 0x6, &(0x7f0000000300)=0x8, &(0x7f0000000340)=0x4) r3 = getpid() sched_setparam(r3, &(0x7f0000000400)=0xffffffffffffffff) syz_open_dev$loop(&(0x7f0000ca9ff5)='/dev/loop#\x00', 0x0, 0x82) r4 = memfd_create(&(0x7f0000614000)="74086e750000000000000000008c00", 0x0) pwritev(r4, &(0x7f0000f50f90)=[{&(0x7f0000000040)="aa", 0x1}], 0x1, 0x0) fcntl$getownex(r1, 0x10, &(0x7f0000000240)={0x0, 0x0}) r6 = syz_open_procfs(r5, &(0x7f0000000280)='stat\x00') epoll_ctl$EPOLL_CTL_MOD(r4, 0x3, r0, &(0x7f00000002c0)={0x20000010}) accept4$inet6(r4, &(0x7f0000000100)={0x0, 0x0, 0x0, @mcast1}, &(0x7f0000000140)=0x1c, 0x7fd) getsockopt$inet_IP_IPSEC_POLICY(r4, 0x0, 0x10, &(0x7f0000000940)={{{@in6=@local, @in6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@loopback}, 0x0, @in=@local}}, &(0x7f0000000780)=0xe8) getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f00000007c0)={0x0, 0x0, 0x0}, &(0x7f0000000540)=0xc) fchown(r4, r7, r8) r9 = syz_open_dev$binder(&(0x7f0000000100)='/dev/binder#\x00', 0xffffffffffffffff, 0x806) ioctl$BINDER_SET_CONTEXT_MGR(r6, 0x40046207, 0x0) mmap$binder(&(0x7f000000c000/0x2000)=nil, 0x2000, 0x0, 0x12, r9, 0x0) ioctl$BINDER_WRITE_READ(r9, 0xc0306201, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000), 0x0, 0x0, &(0x7f0000011f9d)}) getsockopt$inet_sctp6_SCTP_AUTO_ASCONF(0xffffffffffffffff, 0x84, 0x1e, &(0x7f0000000140), &(0x7f0000000180)=0x4) ioctl$BINDER_WRITE_READ(r9, 0xc0306201, &(0x7f0000000340)={0x8, 0x0, &(0x7f0000000440)=ANY=[@ANYRES64=r1], 0x0, 0x0, &(0x7f0000000240)}) write(0xffffffffffffffff, &(0x7f0000000300)="8be25f5790f664f32509e40d6f879d5add7e2d359c9a19afb750a2d25352875d187d4118c99a2d5c6db433c277cc7d345b87a34f1b417033d367cb0cfd6a25633f77aafb17e99c33cb65352c901ae75176f07bb0a4bb5ebff3d87e", 0x5b) r10 = ioctl$LOOP_CTL_GET_FREE(r4, 0x4c82) ioctl$LOOP_CTL_REMOVE(r6, 0x4c81, r10) openat$cgroup(0xffffffffffffff9c, &(0x7f0000000000)='syz0\x00', 0x200002, 0x0) sched_setaffinity(r2, 0x8, &(0x7f0000000200)=0x7) [ 326.867896] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 326.867906] ? kasan_kmalloc+0xad/0xe0 [ 326.867914] ? kmem_cache_alloc_trace+0x136/0x740 [ 326.867923] ? __memcg_init_list_lru_node+0x169/0x270 [ 326.867931] ? __list_lru_init+0x544/0x750 [ 326.867940] ? sget_userns+0x691/0xe40 [ 326.867950] ? mount_fs+0x66/0x2d0 [ 326.867959] ? vfs_kern_mount.part.26+0xc6/0x4a0 [ 326.867966] ? do_mount+0xea4/0x2bb0 [ 326.867976] ? do_syscall_64+0x281/0x940 [ 326.867985] ? entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 326.867998] ? find_held_lock+0x35/0x1d0 2018/03/31 09:15:34 executing program 6: perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f000031f000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) prctl$void(0x0) getpid() r0 = syz_open_dev$vcsn(&(0x7f0000000040)='/dev/vcs#\x00', 0x0, 0x20000) ioctl$GIO_CMAP(r0, 0x4b70, &(0x7f0000000080)) r1 = socket$alg(0x26, 0x5, 0x0) ioctl$sock_SIOCGIFBR(0xffffffffffffffff, 0x8940, &(0x7f0000000040)=@get={0x1, &(0x7f0000000400)=""/242, 0x100000000}) bind$alg(r1, &(0x7f0000000080)={0x26, 'aead\x00', 0x0, 0x0, 'generic-gcm-aesni\x00'}, 0x58) syz_open_dev$sndmidi(&(0x7f0000000100)='/dev/snd/midiC#D#\x00', 0xfd, 0x0) bind(0xffffffffffffffff, &(0x7f0000000140)=@llc={0x1a, 0x33a, 0x7, 0x80, 0x0, 0x4, @remote={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xbb}}, 0x80) r2 = syz_init_net_socket$nfc_llcp(0x27, 0x1, 0x1) setsockopt$nfc_llcp_NFC_LLCP_MIUX(r2, 0x118, 0x15, &(0x7f0000000000), 0x4) r3 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/cuse\x00', 0x103002, 0x0) futimesat(r3, &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)={{0x0, 0x7530}}) r4 = syz_open_dev$vcsa(&(0x7f00000001c0)='/dev/vcsa#\x00', 0x2, 0x0) sendto$inet6(r4, &(0x7f0000000bc0), 0x0, 0x20000000, &(0x7f0000000c40)={0xa, 0x4e20, 0x0, @dev={0xfe, 0x80, [], 0x19}, 0x1f}, 0x1c) accept$alg(r0, 0x0, 0x0) sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f0000000000)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x8}, 0xb4fcd35419244434, &(0x7f00004ca000)={&(0x7f0000000300)=ANY=[], 0x1a1}, 0x1}, 0x0) syz_fuseblk_mount(&(0x7f0000001380)='./file0\x00', &(0x7f00000013c0)='./file0\x00', 0xf000, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0xb21, 0x0) socket(0x1e, 0x3, 0x0) socket(0x1e, 0x0, 0x0) ptrace$PTRACE_SECCOMP_GET_FILTER(0x420c, 0x0, 0x0, &(0x7f0000000380)=""/113) sched_yield() ioctl$TUNGETIFF(r4, 0x800454d2, &(0x7f0000000140)) ioctl$KIOCSOUND(0xffffffffffffffff, 0x4b2f, 0xfffffffffffffb74) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x20, 0x9b}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000447000)='./file0\x00', &(0x7f00000e1000)='msdos\x00', 0x0, &(0x7f000097bfff)) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000580)='./cgroup/syz0\x00', 0x1ff) [ 326.930342] binder: 31595:31596 unknown command 20 [ 326.930371] ? __lock_is_held+0xb6/0x140 [ 326.934122] binder: 31595:31596 ioctl c0306201 20000340 returned -22 [ 326.938642] ? check_same_owner+0x320/0x320 [ 326.938658] ? rcu_note_context_switch+0x710/0x710 [ 326.938677] should_failslab+0xec/0x120 [ 326.938688] kmem_cache_alloc_trace+0x4b/0x740 [ 326.938696] ? __kmalloc_node+0x33/0x70 [ 326.938705] ? __kmalloc_node+0x33/0x70 [ 326.972458] binder: 31595:31597 unknown command 26 [ 326.975551] ? rcu_read_lock_sched_held+0x108/0x120 2018/03/31 09:15:34 executing program 6: perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f000031f000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) prctl$void(0x0) getpid() r0 = syz_open_dev$vcsn(&(0x7f0000000040)='/dev/vcs#\x00', 0x0, 0x20000) ioctl$GIO_CMAP(r0, 0x4b70, &(0x7f0000000080)) r1 = socket$alg(0x26, 0x5, 0x0) ioctl$sock_SIOCGIFBR(0xffffffffffffffff, 0x8940, &(0x7f0000000040)=@get={0x1, &(0x7f0000000400)=""/242, 0x100000000}) bind$alg(r1, &(0x7f0000000080)={0x26, 'aead\x00', 0x0, 0x0, 'generic-gcm-aesni\x00'}, 0x58) syz_open_dev$sndmidi(&(0x7f0000000100)='/dev/snd/midiC#D#\x00', 0xfd, 0x0) bind(0xffffffffffffffff, &(0x7f0000000140)=@llc={0x1a, 0x33a, 0x7, 0x80, 0x0, 0x4, @remote={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xbb}}, 0x80) r2 = syz_init_net_socket$nfc_llcp(0x27, 0x1, 0x1) setsockopt$nfc_llcp_NFC_LLCP_MIUX(r2, 0x118, 0x15, &(0x7f0000000000), 0x4) r3 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/cuse\x00', 0x103002, 0x0) futimesat(r3, &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)={{0x0, 0x7530}}) r4 = syz_open_dev$vcsa(&(0x7f00000001c0)='/dev/vcsa#\x00', 0x2, 0x0) sendto$inet6(r4, &(0x7f0000000bc0), 0x0, 0x20000000, &(0x7f0000000c40)={0xa, 0x4e20, 0x0, @dev={0xfe, 0x80, [], 0x19}, 0x1f}, 0x1c) accept$alg(r0, 0x0, 0x0) sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f0000000000)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x8}, 0xb4fcd35419244434, &(0x7f00004ca000)={&(0x7f0000000300)=ANY=[], 0x1a1}, 0x1}, 0x0) syz_fuseblk_mount(&(0x7f0000001380)='./file0\x00', &(0x7f00000013c0)='./file0\x00', 0xf000, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0xb21, 0x0) socket(0x1e, 0x3, 0x0) socket(0x1e, 0x0, 0x0) ptrace$PTRACE_SECCOMP_GET_FILTER(0x420c, 0x0, 0x0, &(0x7f0000000380)=""/113) sched_yield() ioctl$TUNGETIFF(r4, 0x800454d2, &(0x7f0000000140)) ioctl$KIOCSOUND(0xffffffffffffffff, 0x4b2f, 0xfffffffffffffb74) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x20, 0x9b}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000447000)='./file0\x00', &(0x7f00000e1000)='msdos\x00', 0x0, &(0x7f000097bfff)) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000580)='./cgroup/syz0\x00', 0x1ff) [ 326.975567] __memcg_init_list_lru_node+0x169/0x270 [ 326.975579] ? list_lru_add+0x7c0/0x7c0 [ 326.975590] ? __kmalloc_node+0x47/0x70 [ 326.975606] __list_lru_init+0x544/0x750 [ 326.975620] ? memcg_destroy_list_lru_node.isra.7+0x110/0x110 [ 326.975633] ? trace_hardirqs_on_caller+0x421/0x5c0 [ 326.975647] ? __lockdep_init_map+0xe4/0x650 [ 326.996489] binder: 31595:31597 ioctl c0306201 20000340 returned -22 [ 326.996978] ? lockdep_init_map+0x9/0x10 [ 327.049576] sget_userns+0x691/0xe40 [ 327.049588] ? kill_litter_super+0x90/0x90 2018/03/31 09:15:34 executing program 3: r0 = syz_open_dev$random(&(0x7f00000001c0)='/dev/random\x00', 0x0, 0x800) r1 = syz_open_dev$loop(&(0x7f0000308000)='/dev/loop#\x00', 0x0, 0x0) ioctl$LOOP_SET_STATUS(r1, 0xc0481273, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "3900ea631d00000000020000010000009f00000023f7b7d65f90b0e6330ee739b319d8f6aa6bd58d1443474482e85040fb4947ebb55bd19f335b5bffff0001f3", "cfa430745a540dc1c149b7b81579f6a41c51f7d51933223e82ab867dac761faf"}) write(0xffffffffffffffff, &(0x7f00000001c0), 0x0) setsockopt$inet_sctp6_SCTP_RECVNXTINFO(0xffffffffffffffff, 0x84, 0x21, &(0x7f00000003c0)=0x200, 0x4) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f00000000c0)=0x0) getsockopt$netrom_NETROM_T4(0xffffffffffffffff, 0x103, 0x6, &(0x7f0000000300)=0x8, &(0x7f0000000340)=0x4) r3 = getpid() sched_setparam(r3, &(0x7f0000000400)) syz_open_dev$loop(&(0x7f0000ca9ff5)='/dev/loop#\x00', 0x0, 0x82) r4 = memfd_create(&(0x7f0000614000)="74086e750000000000000000008c00", 0x0) pwritev(r4, &(0x7f0000f50f90)=[{&(0x7f0000000040)="aa", 0x1}], 0x1, 0x0) fcntl$getownex(r1, 0x10, &(0x7f0000000240)={0x0, 0x0}) r6 = syz_open_procfs(r5, &(0x7f0000000500)='timers\x00') epoll_ctl$EPOLL_CTL_MOD(r4, 0x3, r0, &(0x7f00000002c0)={0x20000010}) accept4$inet6(r4, &(0x7f0000000100)={0x0, 0x0, 0x0, @mcast1}, &(0x7f0000000140)=0x1c, 0x7fd) getsockopt$inet_IP_IPSEC_POLICY(r4, 0x0, 0x10, &(0x7f0000000940)={{{@in6=@local, @in6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@loopback}, 0x0, @in=@local}}, &(0x7f0000000780)=0xe8) getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f00000007c0)={0x0, 0x0, 0x0}, &(0x7f0000000540)=0xc) fchown(r4, r7, r8) r9 = syz_open_dev$binder(&(0x7f0000000100)='/dev/binder#\x00', 0xffffffffffffffff, 0x806) ioctl$BINDER_SET_CONTEXT_MGR(r6, 0x40046207, 0x0) mmap$binder(&(0x7f000000c000/0x2000)=nil, 0x2000, 0x0, 0x12, r9, 0x0) ioctl$BINDER_WRITE_READ(r9, 0xc0306201, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000), 0x0, 0x0, &(0x7f0000011f9d)}) getsockopt$inet_sctp6_SCTP_AUTO_ASCONF(0xffffffffffffffff, 0x84, 0x1e, &(0x7f0000000140), &(0x7f0000000180)=0x4) ioctl$BINDER_WRITE_READ(r9, 0xc0306201, &(0x7f0000000340)={0x8, 0x0, &(0x7f0000000440)=ANY=[@ANYRES64=r1], 0x0, 0x0, &(0x7f0000000240)}) write(0xffffffffffffffff, &(0x7f0000000300)="8be25f5790f664f32509e40d6f879d5add7e2d359c9a19afb750a2d25352875d187d4118c99a2d5c6db433c277cc7d345b87a34f1b417033d367cb0cfd6a25633f77aafb17e99c33cb65352c901ae75176f07bb0a4bb5ebff3d87e", 0x5b) r10 = ioctl$LOOP_CTL_GET_FREE(r6, 0x4c82) ioctl$LOOP_CTL_REMOVE(r6, 0x4c81, r10) openat$cgroup(0xffffffffffffff9c, &(0x7f0000000000)='syz0\x00', 0x200002, 0x0) sched_setaffinity(r2, 0x8, &(0x7f0000000200)=0x7) [ 327.057527] ? ns_test_super+0x50/0x50 [ 327.057540] ? destroy_unused_super.part.6+0xd0/0xd0 [ 327.057550] ? do_raw_spin_trylock+0x190/0x190 [ 327.057565] ? kobject_put+0x6b/0x250 [ 327.057580] ? blkdev_get+0x3a1/0xb00 [ 327.057595] ? cap_capable+0x1b5/0x230 [ 327.057604] ? __blkdev_get+0x13b0/0x13b0 [ 327.057617] ? security_capable+0x8e/0xc0 [ 327.057628] ? kill_litter_super+0x90/0x90 [ 327.057639] ? ns_capable_common+0xcf/0x160 [ 327.057649] ? ns_test_super+0x50/0x50 [ 327.057656] ? kill_litter_super+0x90/0x90 [ 327.057664] sget+0xd2/0x120 [ 327.057676] mount_bdev+0x109/0x370 [ 327.057687] ? msdos_mount+0x40/0x40 [ 327.117776] msdos_mount+0x34/0x40 [ 327.121318] mount_fs+0x66/0x2d0 [ 327.124688] vfs_kern_mount.part.26+0xc6/0x4a0 [ 327.129278] ? may_umount+0xa0/0xa0 [ 327.132904] ? _raw_read_unlock+0x22/0x30 [ 327.137046] ? __get_fs_type+0x8a/0xc0 [ 327.140931] do_mount+0xea4/0x2bb0 [ 327.144470] ? copy_mount_string+0x40/0x40 [ 327.148700] ? trace_hardirqs_on_caller+0x421/0x5c0 [ 327.149241] binder: 31602:31603 unknown command 20 [ 327.153706] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 327.153725] ? retint_kernel+0x10/0x10 [ 327.153741] ? copy_mount_options+0x18b/0x2e0 [ 327.153751] ? copy_mount_options+0x193/0x2e0 [ 327.153760] ? copy_mount_options+0x1f7/0x2e0 [ 327.153772] SyS_mount+0xab/0x120 [ 327.153780] ? copy_mnt_ns+0xb30/0xb30 [ 327.153791] do_syscall_64+0x281/0x940 [ 327.153803] ? vmalloc_sync_all+0x30/0x30 [ 327.153810] ? _raw_spin_unlock_irq+0x27/0x70 [ 327.153821] ? finish_task_switch+0x1c1/0x7e0 [ 327.205269] ? syscall_return_slowpath+0x550/0x550 [ 327.210178] ? syscall_return_slowpath+0x2ac/0x550 [ 327.215084] ? prepare_exit_to_usermode+0x350/0x350 [ 327.220077] ? entry_SYSCALL_64_after_hwframe+0x52/0xb7 [ 327.225421] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 327.230242] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 327.235411] RIP: 0033:0x454e79 [ 327.238575] RSP: 002b:00007f37fba8ec68 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 327.246265] RAX: ffffffffffffffda RBX: 00007f37fba8f6d4 RCX: 0000000000454e79 [ 327.253513] RDX: 00000000200e1000 RSI: 0000000020447000 RDI: 0000000020000000 [ 327.260767] RBP: 000000000072bea0 R08: 000000002097bfff R09: 0000000000000000 [ 327.268020] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000019 [ 327.275267] R13: 00000000000003fa R14: 00000000006f8010 R15: 0000000000000012 [ 327.288440] IPVS: ftp: loaded support on port[0] = 21 [ 327.298969] FAT-fs (loop199): unable to read boot sector 2018/03/31 09:15:34 executing program 6: perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f000031f000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) prctl$void(0x0) getpid() r0 = syz_open_dev$vcsn(&(0x7f0000000040)='/dev/vcs#\x00', 0x0, 0x20000) ioctl$GIO_CMAP(r0, 0x4b70, &(0x7f0000000080)) r1 = socket$alg(0x26, 0x5, 0x0) ioctl$sock_SIOCGIFBR(0xffffffffffffffff, 0x8940, &(0x7f0000000040)=@get={0x1, &(0x7f0000000400)=""/242, 0x100000000}) bind$alg(r1, &(0x7f0000000080)={0x26, 'aead\x00', 0x0, 0x0, 'generic-gcm-aesni\x00'}, 0x58) syz_open_dev$sndmidi(&(0x7f0000000100)='/dev/snd/midiC#D#\x00', 0xfd, 0x0) bind(0xffffffffffffffff, &(0x7f0000000140)=@llc={0x1a, 0x33a, 0x7, 0x80, 0x0, 0x4, @remote={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xbb}}, 0x80) r2 = syz_init_net_socket$nfc_llcp(0x27, 0x1, 0x1) setsockopt$nfc_llcp_NFC_LLCP_MIUX(r2, 0x118, 0x15, &(0x7f0000000000), 0x4) r3 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/cuse\x00', 0x103002, 0x0) futimesat(r3, &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)={{0x0, 0x7530}}) r4 = syz_open_dev$vcsa(&(0x7f00000001c0)='/dev/vcsa#\x00', 0x2, 0x0) sendto$inet6(r4, &(0x7f0000000bc0), 0x0, 0x20000000, &(0x7f0000000c40)={0xa, 0x4e20, 0x0, @dev={0xfe, 0x80, [], 0x19}, 0x1f}, 0x1c) accept$alg(r0, 0x0, 0x0) sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f0000000000)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x8}, 0xb4fcd35419244434, &(0x7f00004ca000)={&(0x7f0000000300)=ANY=[], 0x1a1}, 0x1}, 0x0) syz_fuseblk_mount(&(0x7f0000001380)='./file0\x00', &(0x7f00000013c0)='./file0\x00', 0xf000, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0xb21, 0x0) socket(0x1e, 0x3, 0x0) socket(0x1e, 0x0, 0x0) ptrace$PTRACE_SECCOMP_GET_FILTER(0x420c, 0x0, 0x0, &(0x7f0000000380)=""/113) sched_yield() ioctl$TUNGETIFF(r4, 0x800454d2, &(0x7f0000000140)) ioctl$KIOCSOUND(0xffffffffffffffff, 0x4b2f, 0xfffffffffffffb74) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x20, 0x9b}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000447000)='./file0\x00', &(0x7f00000e1000)='msdos\x00', 0x0, &(0x7f000097bfff)) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000580)='./cgroup/syz0\x00', 0x1ff) [ 327.311000] FAT-fs (loop199): unable to read boot sector [ 327.318821] FAT-fs (loop199): unable to read boot sector [ 327.328434] FAT-fs (loop199): unable to read boot sector [ 327.328955] binder: 31602:31603 ioctl c0306201 20000340 returned -22 2018/03/31 09:15:34 executing program 2: syz_open_dev$loop(&(0x7f00000003c0)='/dev/loop#\x00', 0x8, 0x0) r0 = syz_open_dev$sndseq(&(0x7f00000001c0)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r0, 0x4040534e, &(0x7f000019ffe9)={0xc1}) ioctl$sock_ipx_SIOCAIPXPRISLT(0xffffffffffffffff, 0x89e1, &(0x7f0000000280)=0x3f) ioctl$sock_inet_SIOCRTMSG(0xffffffffffffffff, 0x890d, &(0x7f0000000200)={0x80, {0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x19}}, {0x2, 0x4e21, @local={0xac, 0x14, 0x14, 0xaa}}, {0x2, 0x4e23}, 0x0, 0x7, 0x1, 0x0, 0x9, 0x0, 0x0, 0x0, 0xfffffffffffffff7}) getsockopt$inet_sctp_SCTP_PRIMARY_ADDR(0xffffffffffffffff, 0x84, 0x6, &(0x7f0000000ac0)={0x0, @in={{0x2, 0x4e20, @loopback=0x7f000001}}}, &(0x7f00000002c0)=0x84) setsockopt$inet_sctp_SCTP_ENABLE_STREAM_RESET(0xffffffffffffffff, 0x84, 0x76, &(0x7f0000000300)={r1, 0x1c9}, 0x8) r2 = syz_open_dev$sg(&(0x7f0000000700)='/dev/sg#\x00', 0xfffffffffffffff7, 0x800) clone(0x2000c100, &(0x7f0000000800)="97bb77038add5df9e9d4f9783b82c55fe59e5c0acdbcfc9bcf92ac0e1f1f3c1959c1d25dfabf3849336c7c85be174d7765b47e113632aea54b87e4d3f2c1db09e6aa4040b43d17308fb7e62e808067da2fff3cfd8e4c038c814bbfc6bc49d8ebc8671d8297e2d34dc61f2d194d2dbb8f59b4c853e0714d3d4bb29d1243fac01c86c8c4dd38daedab3c6ad73a72d3f6dd2684aa82e5285eb82452c9848b7beb8bc513ba8c8973cad0bd5926604846b7f5d0397b", &(0x7f00000008c0), &(0x7f0000000900), &(0x7f0000000940)="ed6c04412e782fe395f084741e3d9fe469aebde09acc8f8d8d84d1f00f5573b09acba487077ebb904cb1f3fed55f59d677ce24bbd2a7506df8e1e0d0fc709cb8c9f4ab2aeeeebc5ef879742c1f7628f1862c88b5b0da89acbf43ef12e4839405b6a3430d296fea06d2f3a8356c57ec991e") ioctl$SNDRV_SEQ_IOCTL_SUBSCRIBE_PORT(r0, 0x40505330, &(0x7f0000ec6fb0)={{}, {0x80}}) getsockopt$netrom_NETROM_T1(0xffffffffffffffff, 0x103, 0x1, &(0x7f0000000000), &(0x7f0000000380)=0x4) syz_open_dev$adsp(&(0x7f0000000600)='/dev/adsp#\x00', 0x100000000, 0x80000) rt_sigprocmask(0x3d738072cd0f41ac, &(0x7f0000000cc0)={0x7}, &(0x7f0000000d00), 0x8) clone(0x40000000, &(0x7f0000000500)="67cdd9994c47c31d325b069924a7064c157c2ec0b5b5dca2feeb7dabef3b7af0d02d559e293faa759f2b3cb12aea360c2d", &(0x7f0000000580), &(0x7f00000005c0), &(0x7f0000000a00)="29859fdda9a119e54a27f9ec76b4d63a16dc5bbdd38c2fda0e5f4d8f830cd987ec7d3ffc66cf3db8820968fd89a1fba8fe6352a29a27f3b000bcdf238f2c04b358fc831025180e0be313da41de6366c94a1a0f86aaffdf2c039111b55275c054e14819a827fe809225249a01944263a2aec15f64e752e35892b1b8e7ef1e0e9115") ioctl$SNDRV_SEQ_IOCTL_DELETE_PORT(r0, 0x40a85321, &(0x7f0000000b80)={{0x4, 0x8}, 'port0\x00', 0x80, 0x0, 0x10000, 0x6, 0x2, 0x80, 0x8, 0x0, 0x0, 0x3dec00}) getsockopt$inet_sctp_SCTP_SOCKOPT_PEELOFF(r2, 0x84, 0x66, &(0x7f0000000c40)={r1, 0x6}, &(0x7f0000000c80)=0x8) clock_settime(0x7, &(0x7f0000000740)={0x77359400}) ioctl$SNDRV_SEQ_IOCTL_CLIENT_ID(r0, 0x80045301, &(0x7f0000000340)) r3 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer2\x00', 0x0, 0x0) openat$sequencer2(0xffffffffffffff9c, &(0x7f00000006c0)='/dev/sequencer2\x00', 0x222081, 0x0) ioctl$RNDADDENTROPY(0xffffffffffffffff, 0x40085203, &(0x7f0000000100)=ANY=[@ANYPTR=&(0x7f0000000680)=ANY=[@ANYPTR64=&(0x7f0000000640)=ANY=[@ANYPTR, @ANYPTR]]]) setsockopt$inet_sctp_SCTP_DEFAULT_SEND_PARAM(r3, 0x84, 0xa, &(0x7f0000000140)={0x5, 0x100000001, 0x0, 0x8, 0x0, 0x7, 0x401, 0x1f, r1}, 0x20) 2018/03/31 09:15:34 executing program 7 (fault-call:24 fault-nth:19): perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f000031f000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getpid() r0 = syz_open_dev$vcsn(&(0x7f0000000040)='/dev/vcs#\x00', 0x0, 0x20000) ioctl$GIO_CMAP(r0, 0x4b70, &(0x7f0000000080)) r1 = socket$alg(0x26, 0x5, 0x0) ioctl$sock_SIOCGIFBR(r1, 0x8940, &(0x7f0000000040)=@get={0x1, &(0x7f0000000400)=""/242, 0x100000000}) bind$alg(r1, &(0x7f0000000080)={0x26, 'aead\x00', 0x0, 0x0, 'generic-gcm-aesni\x00'}, 0x58) syz_open_dev$sndmidi(&(0x7f0000000100)='/dev/snd/midiC#D#\x00', 0xfd, 0x0) bind(0xffffffffffffffff, &(0x7f0000000140)=@llc={0x1a, 0x33a, 0x7, 0x80, 0x5, 0x4, @remote={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xbb}}, 0x80) r2 = syz_init_net_socket$nfc_llcp(0x27, 0x1, 0x1) setsockopt$nfc_llcp_NFC_LLCP_MIUX(r2, 0x118, 0x15, &(0x7f0000000000), 0x4) r3 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/cuse\x00', 0x103002, 0x0) futimesat(r3, &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)={{0x0, 0x7530}}) r4 = syz_open_dev$vcsa(&(0x7f00000001c0)='/dev/vcsa#\x00', 0x2, 0x4020ff) sendto$inet6(r4, &(0x7f0000000bc0)="36251e313e0743fc195a1a198a14434e8a0a00b3f452a3b5644e336ec712a16310c9aecc4e3097bc666a8882128a73c368ce731e9fbf3fe18fa52d00", 0x3c, 0x20000000, &(0x7f0000000c40)={0xa, 0x0, 0x6, @dev={0xfe, 0x80, [], 0x19}, 0x1f}, 0x1c) accept$alg(r0, 0x0, 0x0) sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f0000000000)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x8}, 0xb4fcd35419244434, &(0x7f00004ca000)={&(0x7f0000000300)=ANY=[], 0x1a1}, 0x1}, 0x0) syz_fuseblk_mount(&(0x7f0000001380)='./file0\x00', &(0x7f00000013c0)='./file0\x00', 0xf000, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0xb21, 0x0) socket(0x1e, 0x3, 0x0) socket(0x1e, 0x0, 0x0) ptrace$PTRACE_SECCOMP_GET_FILTER(0x420c, 0x0, 0x0, &(0x7f0000000380)=""/113) sched_yield() ioctl$TUNGETIFF(r4, 0x800454d2, &(0x7f0000000140)) ioctl$KIOCSOUND(r4, 0x4b2f, 0xfffffffffffffb74) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000447000)='./file0\x00', &(0x7f00000e1000)='msdos\x00', 0x0, &(0x7f000097bfff)) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000580)='./cgroup/syz0\x00', 0x1ff) syz_open_dev$audion(&(0x7f0000000280)='/dev/audio#\x00', 0x7be, 0x0) [ 327.373296] FAT-fs (loop199): unable to read boot sector [ 327.383748] binder: 31602:31610 unknown command 26 [ 327.398341] binder: 31602:31610 ioctl c0306201 20000340 returned -22 [ 327.403274] FAT-fs (loop199): unable to read boot sector 2018/03/31 09:15:34 executing program 4: perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f000031f000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) prctl$void(0x0) getpid() r0 = syz_open_dev$vcsn(&(0x7f0000000040)='/dev/vcs#\x00', 0x0, 0x20000) ioctl$GIO_CMAP(r0, 0x4b70, &(0x7f0000000080)) r1 = socket$alg(0x26, 0x5, 0x0) ioctl$sock_SIOCGIFBR(0xffffffffffffffff, 0x8940, &(0x7f0000000040)=@get={0x1, &(0x7f0000000400)=""/242, 0x100000000}) ioctl$TCSETAF(r0, 0x5408, &(0x7f0000000280)={0x3f, 0xeba, 0xfffffffffffffeff, 0x3, 0x7f, 0x1ff, 0xfffffffffffffff8, 0xf2a4, 0x3e2a, 0x8}) bind$alg(r1, &(0x7f0000000080)={0x26, 'aead\x00', 0x0, 0x0, 'generic-gcm-aesni\x00'}, 0x58) syz_open_dev$sndmidi(&(0x7f0000000100)='/dev/snd/midiC#D#\x00', 0xfd, 0x0) bind(0xffffffffffffffff, &(0x7f0000000140)=@llc={0x1a, 0x33a, 0x7, 0x80, 0x0, 0x4, @remote={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xbb}}, 0x80) r2 = syz_init_net_socket$nfc_llcp(0x27, 0x1, 0x1) setsockopt$nfc_llcp_NFC_LLCP_MIUX(r2, 0x118, 0x15, &(0x7f0000000000), 0x4) r3 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/cuse\x00', 0x103002, 0x0) futimesat(r3, &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)={{0x0, 0x7530}}) r4 = syz_open_dev$vcsa(&(0x7f00000001c0)='/dev/vcsa#\x00', 0x2, 0x0) sendto$inet6(r4, &(0x7f0000000bc0), 0x0, 0x20000000, &(0x7f0000000c40)={0xa, 0x4e20, 0x0, @dev={0xfe, 0x80, [], 0x19}, 0x1f}, 0x1c) accept$alg(r0, 0x0, 0x0) sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f0000000000)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x8}, 0xb4fcd35419244434, &(0x7f00004ca000)={&(0x7f0000000300)=ANY=[], 0x1a1}, 0x1}, 0x0) syz_fuseblk_mount(&(0x7f0000001380)='./file0\x00', &(0x7f00000013c0)='./file0\x00', 0xf000, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0xb21, 0x0) r5 = socket(0x1e, 0x3, 0x0) socket(0x1e, 0x0, 0x0) ptrace$PTRACE_SECCOMP_GET_FILTER(0x420c, 0x0, 0x0, &(0x7f0000000380)=""/113) bind$nfc_llcp(r5, &(0x7f0000000200)={0x27, 0x0, 0x0, 0x39d91511eaf911e2, 0x8, 0x401, "09ced246906c58afb3bb76e144dd5e428e2e0865a2fb51b57c65f2a5f1d7dabff2332d1ee89af93b1aff4507691d1a2fe4e2023ffc59d5675e5db50fc4a1da", 0x9}, 0x60) sched_yield() ioctl$TUNGETIFF(r4, 0x800454d2, &(0x7f0000000140)) ioctl$KIOCSOUND(r4, 0x4b2f, 0xfffffffffffffb74) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x20, 0x9b}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000447000)='./file0\x00', &(0x7f00000e1000)='msdos\x00', 0x0, &(0x7f000097bfff)) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000580)='./cgroup/syz0\x00', 0x1ff) [ 327.428735] print_req_error: 14 callbacks suppressed [ 327.428740] print_req_error: I/O error, dev loop199, sector 0 [ 327.439939] FAT-fs (loop199): unable to read boot sector [ 327.447952] print_req_error: I/O error, dev loop199, sector 0 [ 327.454199] FAT-fs (loop199): unable to read boot sector [ 327.485909] FAULT_INJECTION: forcing a failure. [ 327.485909] name failslab, interval 1, probability 0, space 0, times 0 [ 327.497221] CPU: 1 PID: 31620 Comm: syz-executor7 Not tainted 4.16.0-rc7+ #8 [ 327.504416] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 327.513766] Call Trace: [ 327.516365] dump_stack+0x194/0x24d [ 327.520000] ? arch_local_irq_restore+0x53/0x53 [ 327.524673] ? __save_stack_trace+0x7e/0xd0 [ 327.529006] should_fail+0x8c0/0xa40 [ 327.532716] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 327.537816] ? kasan_kmalloc+0xad/0xe0 [ 327.541707] ? kmem_cache_alloc_trace+0x136/0x740 [ 327.546556] ? __memcg_init_list_lru_node+0x169/0x270 [ 327.546564] ? __list_lru_init+0x544/0x750 [ 327.546575] ? sget_userns+0x691/0xe40 [ 327.559833] ? mount_fs+0x66/0x2d0 [ 327.563352] ? vfs_kern_mount.part.26+0xc6/0x4a0 [ 327.568086] ? do_mount+0xea4/0x2bb0 [ 327.571775] ? do_syscall_64+0x281/0x940 [ 327.575811] ? entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 327.581157] ? find_held_lock+0x35/0x1d0 [ 327.585199] ? __lock_is_held+0xb6/0x140 [ 327.589248] ? check_same_owner+0x320/0x320 [ 327.593559] ? rcu_note_context_switch+0x710/0x710 [ 327.598473] should_failslab+0xec/0x120 [ 327.602427] kmem_cache_alloc_trace+0x4b/0x740 [ 327.606991] ? __kmalloc_node+0x33/0x70 [ 327.610946] ? __kmalloc_node+0x33/0x70 [ 327.614896] ? rcu_read_lock_sched_held+0x108/0x120 [ 327.619892] __memcg_init_list_lru_node+0x169/0x270 [ 327.624887] ? list_lru_add+0x7c0/0x7c0 [ 327.628836] ? __kmalloc_node+0x47/0x70 [ 327.632797] __list_lru_init+0x544/0x750 [ 327.636844] ? memcg_destroy_list_lru_node.isra.7+0x110/0x110 [ 327.642713] ? trace_hardirqs_on_caller+0x421/0x5c0 [ 327.647714] ? __lockdep_init_map+0xe4/0x650 [ 327.652111] ? lockdep_init_map+0x9/0x10 [ 327.656160] sget_userns+0x691/0xe40 [ 327.659851] ? kill_litter_super+0x90/0x90 [ 327.664070] ? ns_test_super+0x50/0x50 [ 327.667946] ? destroy_unused_super.part.6+0xd0/0xd0 [ 327.673035] ? do_raw_spin_trylock+0x190/0x190 [ 327.677606] ? kobject_put+0x6b/0x250 [ 327.681384] ? blkdev_get+0x3a1/0xb00 [ 327.685165] ? cap_capable+0x1b5/0x230 [ 327.689032] ? __blkdev_get+0x13b0/0x13b0 [ 327.693161] ? security_capable+0x8e/0xc0 [ 327.697293] ? kill_litter_super+0x90/0x90 [ 327.701511] ? ns_capable_common+0xcf/0x160 [ 327.705805] ? ns_test_super+0x50/0x50 [ 327.709667] ? kill_litter_super+0x90/0x90 [ 327.713880] sget+0xd2/0x120 [ 327.716881] mount_bdev+0x109/0x370 [ 327.720490] ? msdos_mount+0x40/0x40 [ 327.724180] msdos_mount+0x34/0x40 [ 327.727696] mount_fs+0x66/0x2d0 [ 327.731043] vfs_kern_mount.part.26+0xc6/0x4a0 [ 327.735606] ? may_umount+0xa0/0xa0 [ 327.739228] ? _raw_read_unlock+0x22/0x30 [ 327.743355] ? __get_fs_type+0x8a/0xc0 [ 327.747223] do_mount+0xea4/0x2bb0 [ 327.750739] ? copy_mount_string+0x40/0x40 [ 327.754948] ? trace_hardirqs_on_caller+0x421/0x5c0 [ 327.759941] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 327.764677] ? retint_kernel+0x10/0x10 [ 327.768544] ? copy_mount_options+0x18b/0x2e0 [ 327.773022] ? copy_mount_options+0x193/0x2e0 [ 327.777499] ? copy_mount_options+0x1f7/0x2e0 [ 327.781969] SyS_mount+0xab/0x120 [ 327.785401] ? copy_mnt_ns+0xb30/0xb30 [ 327.789275] do_syscall_64+0x281/0x940 [ 327.793144] ? vmalloc_sync_all+0x30/0x30 [ 327.797271] ? _raw_spin_unlock_irq+0x27/0x70 [ 327.801740] ? finish_task_switch+0x1c1/0x7e0 [ 327.806226] ? syscall_return_slowpath+0x550/0x550 [ 327.811145] ? syscall_return_slowpath+0x2ac/0x550 [ 327.816054] ? prepare_exit_to_usermode+0x350/0x350 [ 327.821051] ? entry_SYSCALL_64_after_hwframe+0x52/0xb7 [ 327.826407] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 327.831245] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 327.836412] RIP: 0033:0x454e79 [ 327.839574] RSP: 002b:00007f37fba8ec68 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 327.847257] RAX: ffffffffffffffda RBX: 00007f37fba8f6d4 RCX: 0000000000454e79 [ 327.854516] RDX: 00000000200e1000 RSI: 0000000020447000 RDI: 0000000020000000 [ 327.861760] RBP: 000000000072bea0 R08: 000000002097bfff R09: 0000000000000000 [ 327.869003] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000019 [ 327.876256] R13: 00000000000003fa R14: 00000000006f8010 R15: 0000000000000013 [ 327.889664] print_req_error: I/O error, dev loop199, sector 0 [ 327.898333] FAT-fs (loop199): unable to read boot sector [ 327.927364] print_req_error: I/O error, dev loop199, sector 0 [ 327.933454] FAT-fs (loop199): unable to read boot sector 2018/03/31 09:15:35 executing program 1: perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f000031f000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = creat(&(0x7f0000000200)='./file0\x00', 0x1) ioctl$TIOCLINUX4(r0, 0x541c, &(0x7f0000000240)=0x4) prctl$void(0x0) getpid() syz_open_dev$vcsn(&(0x7f0000000040)='/dev/vcs#\x00', 0x400, 0x20000) r1 = socket$alg(0x26, 0x5, 0x0) ioctl$sock_SIOCGIFBR(r1, 0x8940, &(0x7f0000000040)=@get={0x1, &(0x7f0000000400)=""/242, 0x100000000}) bind$alg(r1, &(0x7f0000000080)={0x26, 'aead\x00', 0x0, 0x0, 'generic-gcm-aesni\x00'}, 0x58) r2 = syz_open_dev$sndmidi(&(0x7f0000000100)='/dev/snd/midiC#D#\x00', 0xfd, 0x0) bind(r2, &(0x7f0000000140)=@llc={0x1a, 0x33a, 0x7, 0x80, 0x0, 0x4, @remote={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xbb}}, 0x80) r3 = syz_init_net_socket$nfc_llcp(0x27, 0x1, 0x1) setsockopt$nfc_llcp_NFC_LLCP_MIUX(r3, 0x118, 0x15, &(0x7f0000000000), 0x4) r4 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/cuse\x00', 0x103002, 0x0) futimesat(r4, &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)={{0x0, 0x7530}}) r5 = syz_open_dev$vcsa(&(0x7f00000001c0)='/dev/vcsa#\x00', 0x2, 0x4020ff) sendto$inet6(r5, &(0x7f0000000bc0), 0x0, 0x20000000, &(0x7f0000000c40)={0xa, 0x4e20, 0x6, @dev={0xfe, 0x80, [], 0x19}, 0x1f}, 0x1c) sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f0000000000)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x8}, 0xb4fcd35419244434, &(0x7f00004ca000)={&(0x7f0000000300)=ANY=[], 0x1a1}, 0x1}, 0x0) syz_fuseblk_mount(&(0x7f0000001380)='./file0\x00', &(0x7f00000013c0)='./file0\x00', 0xf000, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0xb21, 0x0) socket(0x1e, 0x3, 0x0) ptrace$PTRACE_SECCOMP_GET_FILTER(0x420c, 0x0, 0x0, &(0x7f0000000380)=""/113) sched_yield() ioctl$TUNGETIFF(r5, 0x800454d2, &(0x7f0000000140)) ioctl$KIOCSOUND(r5, 0x4b2f, 0xfffffffffffffb74) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x20, 0x9b}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000447000)='./file0\x00', &(0x7f00000e1000)='msdos\x00', 0x0, &(0x7f000097bfff)) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000580)='./cgroup/syz0\x00', 0x1ff) ioctl$KVM_SET_MSRS(r4, 0x4008ae89, &(0x7f00000002c0)=ANY=[@ANYBLOB="06000000000000007f0b0000000000000900000000ff0000771801c000000000fbffffffffffffffdf0a0000000000000180000000000000ff060040000000000101000000000000f00b000000000000ff07000000000000ff090000000000007c09000000000000"]) syz_open_dev$audion(&(0x7f0000000280)='/dev/audio#\x00', 0x7be, 0x0) fcntl$getown(0xffffffffffffffff, 0x9) 2018/03/31 09:15:35 executing program 3: syz_open_dev$random(&(0x7f00000001c0)='/dev/random\x00', 0x0, 0x800) r0 = syz_open_dev$loop(&(0x7f0000308000)='/dev/loop#\x00', 0x0, 0x0) ioctl$LOOP_SET_STATUS(r0, 0xc0481273, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "3900517c3ab500fbff010000010000009f00000023f7b7d65f90b0e6330ee739b319d8f6aa6bd58d1443474482e85040fb4947ebb55bd19f335b5bffff0001f3", "cfa430745a540dc1c149b7b81579f6a41c51f7d51933223e82ab867dac761faf", [0x0, 0x6]}) write(0xffffffffffffffff, &(0x7f00000001c0), 0x0) setsockopt$inet_sctp6_SCTP_RECVNXTINFO(0xffffffffffffffff, 0x84, 0x21, &(0x7f00000003c0)=0x200, 0x4) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f00000000c0)=0x0) getsockopt$netrom_NETROM_T4(0xffffffffffffffff, 0x103, 0x6, &(0x7f0000000300)=0x8, &(0x7f0000000340)=0x4) r2 = getpid() sched_setparam(r2, &(0x7f0000000400)) syz_open_dev$loop(&(0x7f0000ca9ff5)='/dev/loop#\x00', 0x0, 0x82) r3 = memfd_create(&(0x7f0000614000)="74086e750000000000000000008c00", 0x0) pwritev(r3, &(0x7f0000f50f90)=[{&(0x7f0000000040)="aa", 0x1}], 0x1, 0x0) fcntl$getownex(r0, 0x10, &(0x7f0000000240)={0x0, 0x0}) r5 = syz_open_procfs(r4, &(0x7f0000000280)='stat\x00') accept4$inet6(r3, &(0x7f0000000100)={0x0, 0x0, 0x0, @mcast1}, &(0x7f0000000140)=0x1c, 0x7fd) getsockopt$inet_IP_IPSEC_POLICY(r3, 0x0, 0x10, &(0x7f0000000940)={{{@in6=@local, @in6}}, {{@in6=@loopback}, 0x0, @in=@local}}, &(0x7f0000000780)=0xe8) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f00000007c0)={0x0, 0x0, 0x0}, &(0x7f0000000540)=0xc) fchown(r3, r6, r7) r8 = syz_open_dev$binder(&(0x7f0000000100)='/dev/binder#\x00', 0xffffffffffffffff, 0x806) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r5, 0x84, 0x6b, &(0x7f0000000580)=[@in6={0xa, 0x4e22, 0xfffffffffffffffc, @ipv4={[], [0xff, 0xff], @dev={0xac, 0x14, 0x14, 0x18}}, 0x8000}, @in6={0xa, 0x4e21, 0x5, @empty, 0x9}, @in6={0xa, 0x4e21, 0x8d12, @local={0xfe, 0x80, [], 0xaa}, 0x2}, @in6={0xa, 0x4e21, 0xda, @mcast2={0xff, 0x2, [], 0x1}, 0xfa8}, @in6={0xa, 0x1000, 0x4, @mcast1={0xff, 0x1, [], 0x1}, 0x195391b5}, @in={0x2, 0x4e20, @multicast1=0xe0000001}, @in={0x2, 0x4e21, @rand_addr=0x5}, @in6={0xa, 0x4e22, 0x3ff, @empty, 0x2}, @in6={0xa, 0x4e23, 0x80000000, @mcast1={0xff, 0x1, [], 0x1}, 0x9}, @in6={0xa, 0x4e21, 0xfffffffffffff4ab, @remote={0xfe, 0x80, [], 0xbb}, 0x1}], 0x100) ioctl$BINDER_SET_CONTEXT_MGR(r5, 0x40046207, 0x0) mmap$binder(&(0x7f000000c000/0x2000)=nil, 0x2000, 0x0, 0x12, r8, 0x80) ioctl$BINDER_WRITE_READ(r8, 0xc0306201, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000), 0x0, 0x0, &(0x7f0000011f9d)}) getsockopt$inet_sctp6_SCTP_AUTO_ASCONF(0xffffffffffffffff, 0x84, 0x1e, &(0x7f0000000140), &(0x7f0000000180)=0x4) ioctl$BINDER_WRITE_READ(r8, 0xc0306201, &(0x7f0000000340)={0x8, 0x0, &(0x7f0000000440)=ANY=[@ANYRES64=r0], 0x0, 0x0, &(0x7f0000000240)}) write(0xffffffffffffffff, &(0x7f0000000300)="8be25f5790f664f32509e40d6f879d5add7e2d359c9a19afb750a2d25352875d187d4118c99a2d5c6db433c277cc7d345b87a34f1b417033d367cb0cfd6a25633f77aafb17e99c33cb65352c901ae75176f07bb0a4bb5ebff3d87e", 0x5b) r9 = ioctl$LOOP_CTL_GET_FREE(r3, 0x4c82) ioctl$LOOP_CTL_REMOVE(r5, 0x4c81, r9) openat$cgroup(0xffffffffffffff9c, &(0x7f0000000000)='syz0\x00', 0x200002, 0x0) sched_setaffinity(r1, 0x8, &(0x7f0000000200)=0x7) 2018/03/31 09:15:35 executing program 5: perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f000031f000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) prctl$void(0x0) r0 = getpid() r1 = syz_open_dev$vcsn(&(0x7f0000000040)='/dev/vcs#\x00', 0x0, 0x20000) ioctl$GIO_CMAP(r1, 0x4b70, &(0x7f0000000080)) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000400)={0x26, 'aead\x00', 0x0, 0x0, 'generic-gcm-aesni\x00'}, 0x58) r3 = syz_open_dev$sndmidi(&(0x7f0000000100)='/dev/snd/midiC#D#\x00', 0xfd, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r1, 0x0, 0x10, &(0x7f0000000480)={{{@in=@rand_addr, @in=@local}}, {{@in=@multicast2}, 0x0, @in=@local}}, &(0x7f0000000340)=0xe8) ioctl$ifreq_SIOCGIFINDEX_vcan(r3, 0x8933, &(0x7f00000007c0)={'tunl0\x00', 0x0}) bind(r1, &(0x7f0000000140)=@ll={0x11, 0xff, r4, 0x1, 0x7f, 0x6, @random="8bcee340dfed"}, 0xfffffffffffffee9) r5 = syz_init_net_socket$nfc_llcp(0x27, 0x1, 0x1) setsockopt$nfc_llcp_NFC_LLCP_MIUX(r5, 0x118, 0x15, &(0x7f0000000000), 0x4) r6 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/cuse\x00', 0x103002, 0x0) futimesat(r6, &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)={{0x0, 0x7530}}) r7 = syz_open_dev$vcsa(&(0x7f00000001c0)='/dev/vcsa#\x00', 0x2, 0x4020ff) sendto$inet6(0xffffffffffffffff, &(0x7f0000000bc0)="36251e313e0743fc195a1a198a14434e8a0a00b3f452a3b5644e336ec712a16310c9aecc4e3097bc666a8882128a73c368ce731e9fbf3fe18fa52d", 0x3b, 0x20000000, &(0x7f0000000c40)={0xa, 0x4e20, 0x6, @dev={0xfe, 0x80, [], 0x19}, 0x1f}, 0x1c) accept$alg(r1, 0x0, 0x0) sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f0000000000)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x8}, 0xb4fcd35419244434, &(0x7f00004ca000)={&(0x7f0000000300)=ANY=[], 0x1a1}, 0x1}, 0x0) syz_fuseblk_mount(&(0x7f0000001380)='./file0\x00', &(0x7f00000013c0)='./file0\x00', 0xf000, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0xb21, 0x0) socket(0x1e, 0x3, 0x0) socket(0x1e, 0x0, 0x0) ptrace$PTRACE_SECCOMP_GET_FILTER(0x420c, r0, 0x4, &(0x7f0000000380)=""/113) clock_gettime(0x0, &(0x7f0000000200)={0x0, 0x0}) clock_gettime(0x0, &(0x7f0000000240)={0x0, 0x0}) write$evdev(r6, &(0x7f00000002c0)=[{{r8, r9/1000+30000}, 0x3ff, 0x7ff, 0x200}, {{}, 0x2, 0x2, 0x2}, {{r10, r11/1000+10000}, 0x10000, 0x4, 0xa51}], 0x48) sched_yield() ioctl$TUNGETIFF(r7, 0x800454d2, &(0x7f0000000140)) ioctl$KIOCSOUND(r7, 0x4b2f, 0xfffffffffffffb74) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x20, 0x9b}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000447000)='./file0\x00', &(0x7f00000e1000)='msdos\x00', 0x0, &(0x7f000097bfff)) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000580)='./cgroup/syz0\x00', 0x1ff) syz_open_dev$audion(&(0x7f0000000280)='/dev/audio#\x00', 0x7be, 0x0) 2018/03/31 09:15:35 executing program 0: perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f000031f000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) prctl$void(0x0) syz_open_dev$vcsn(&(0x7f0000000040)='/dev/vcs#\x00', 0x0, 0x20000) socket$alg(0x26, 0x5, 0x0) bind$alg(0xffffffffffffffff, &(0x7f0000000080)={0x26, 'aead\x00', 0x0, 0x0, 'generic-gcm-aesni\x00'}, 0x58) r0 = syz_open_dev$sndmidi(&(0x7f0000000100)='/dev/snd/midiC#D#\x00', 0xfd, 0x0) bind(0xffffffffffffffff, &(0x7f0000000140)=@llc={0x1a, 0x33a, 0x7, 0x80, 0x0, 0x4, @remote={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xbb}}, 0x80) r1 = syz_init_net_socket$nfc_llcp(0x27, 0x1, 0x1) setsockopt$nfc_llcp_NFC_LLCP_MIUX(r1, 0x118, 0x15, &(0x7f0000000000), 0x4) r2 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/cuse\x00', 0x103002, 0x0) futimesat(r2, &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)={{0x0, 0x7530}}) getsockopt$inet_sctp_SCTP_MAX_BURST(r0, 0x84, 0x14, &(0x7f0000000400)=@assoc_value={0x0}, &(0x7f0000000440)=0x8) setsockopt$inet_sctp6_SCTP_MAX_BURST(r0, 0x84, 0x14, &(0x7f0000000480)=@assoc_value={r3, 0x1f}, 0x8) shmget$private(0x0, 0x4000, 0x42, &(0x7f0000ff9000/0x4000)=nil) fcntl$setstatus(r1, 0x4, 0x800) setsockopt$inet_tcp_TCP_REPAIR_OPTIONS(r2, 0x6, 0x16, &(0x7f0000000300)=[{0x3, 0xfff}], 0x1) getsockopt$netrom_NETROM_T2(r0, 0x103, 0x2, &(0x7f0000000540)=0x6, &(0x7f00000005c0)=0x4) r4 = syz_open_dev$vcsa(&(0x7f00000001c0)='/dev/vcsa#\x00', 0x2, 0x0) sendto$inet6(r4, &(0x7f0000000bc0)="36251e313e0743fc195a1a198a14434e8a0a00b3f452a3b5644e336ec712a16310c9aecc4e3097bc666a8882128a73c368ce731e9fbf3fe18fa52d00c34ac2e57c1c4569cfbd6a621c6dfbc032121aed", 0x50, 0x20000000, &(0x7f0000000c40)={0xa, 0x4e20, 0x6, @dev={0xfe, 0x80, [], 0x19}, 0x1f}, 0x1c) sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f0000000000)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f00004ca000)={&(0x7f0000000300)=ANY=[]}, 0x1}, 0x0) syz_fuseblk_mount(&(0x7f0000001380)='./file0\x00', &(0x7f00000002c0)='./file0\x00', 0xd000, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0xb21, 0x8000) r5 = socket(0x0, 0x6, 0x80000000000) r6 = socket(0x1e, 0x0, 0x0) ptrace$PTRACE_SECCOMP_GET_FILTER(0x420c, 0x0, 0x0, &(0x7f0000000380)=""/113) setsockopt$inet6_MCAST_JOIN_GROUP(r6, 0x29, 0x2a, &(0x7f0000000200)={0x755e, {{0xa, 0x4e22, 0x9, @loopback={0x0, 0x1}, 0xc819}}}, 0x88) sched_yield() ioctl$TUNGETIFF(r4, 0x800454d2, &(0x7f0000000140)) ioctl$KIOCSOUND(r4, 0x4b2f, 0xfffffffffffffb74) getsockopt$bt_BT_VOICE(r5, 0x112, 0xb, &(0x7f0000000340)=0x9, &(0x7f0000000500)=0x2) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000447000)='./file0\x00', &(0x7f00000e1000)='msdos\x00', 0x0, &(0x7f000097bfff)) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000580)='./cgroup/syz0\x00', 0x1ff) 2018/03/31 09:15:35 executing program 7 (fault-call:24 fault-nth:20): perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f000031f000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getpid() r0 = syz_open_dev$vcsn(&(0x7f0000000040)='/dev/vcs#\x00', 0x0, 0x20000) ioctl$GIO_CMAP(r0, 0x4b70, &(0x7f0000000080)) r1 = socket$alg(0x26, 0x5, 0x0) ioctl$sock_SIOCGIFBR(r1, 0x8940, &(0x7f0000000040)=@get={0x1, &(0x7f0000000400)=""/242, 0x100000000}) bind$alg(r1, &(0x7f0000000080)={0x26, 'aead\x00', 0x0, 0x0, 'generic-gcm-aesni\x00'}, 0x58) syz_open_dev$sndmidi(&(0x7f0000000100)='/dev/snd/midiC#D#\x00', 0xfd, 0x0) bind(0xffffffffffffffff, &(0x7f0000000140)=@llc={0x1a, 0x33a, 0x7, 0x80, 0x5, 0x4, @remote={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xbb}}, 0x80) r2 = syz_init_net_socket$nfc_llcp(0x27, 0x1, 0x1) setsockopt$nfc_llcp_NFC_LLCP_MIUX(r2, 0x118, 0x15, &(0x7f0000000000), 0x4) r3 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/cuse\x00', 0x103002, 0x0) futimesat(r3, &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)={{0x0, 0x7530}}) r4 = syz_open_dev$vcsa(&(0x7f00000001c0)='/dev/vcsa#\x00', 0x2, 0x4020ff) sendto$inet6(r4, &(0x7f0000000bc0)="36251e313e0743fc195a1a198a14434e8a0a00b3f452a3b5644e336ec712a16310c9aecc4e3097bc666a8882128a73c368ce731e9fbf3fe18fa52d00", 0x3c, 0x20000000, &(0x7f0000000c40)={0xa, 0x0, 0x6, @dev={0xfe, 0x80, [], 0x19}, 0x1f}, 0x1c) accept$alg(r0, 0x0, 0x0) sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f0000000000)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x8}, 0xb4fcd35419244434, &(0x7f00004ca000)={&(0x7f0000000300)=ANY=[], 0x1a1}, 0x1}, 0x0) syz_fuseblk_mount(&(0x7f0000001380)='./file0\x00', &(0x7f00000013c0)='./file0\x00', 0xf000, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0xb21, 0x0) socket(0x1e, 0x3, 0x0) socket(0x1e, 0x0, 0x0) ptrace$PTRACE_SECCOMP_GET_FILTER(0x420c, 0x0, 0x0, &(0x7f0000000380)=""/113) sched_yield() ioctl$TUNGETIFF(r4, 0x800454d2, &(0x7f0000000140)) ioctl$KIOCSOUND(r4, 0x4b2f, 0xfffffffffffffb74) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000447000)='./file0\x00', &(0x7f00000e1000)='msdos\x00', 0x0, &(0x7f000097bfff)) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000580)='./cgroup/syz0\x00', 0x1ff) syz_open_dev$audion(&(0x7f0000000280)='/dev/audio#\x00', 0x7be, 0x0) 2018/03/31 09:15:35 executing program 6: perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f000031f000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) prctl$void(0x0) getpid() r0 = syz_open_dev$vcsn(&(0x7f0000000040)='/dev/vcs#\x00', 0x0, 0x20000) ioctl$GIO_CMAP(r0, 0x4b70, &(0x7f0000000080)) r1 = socket$alg(0x26, 0x5, 0x0) ioctl$sock_SIOCGIFBR(0xffffffffffffffff, 0x8940, &(0x7f0000000040)=@get={0x1, &(0x7f0000000400)=""/242, 0x100000000}) bind$alg(r1, &(0x7f0000000080)={0x26, 'aead\x00', 0x0, 0x0, 'generic-gcm-aesni\x00'}, 0x58) syz_open_dev$sndmidi(&(0x7f0000000100)='/dev/snd/midiC#D#\x00', 0xfd, 0x0) bind(0xffffffffffffffff, &(0x7f0000000140)=@llc={0x1a, 0x33a, 0x7, 0x80, 0x0, 0x4, @remote={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xbb}}, 0x80) r2 = syz_init_net_socket$nfc_llcp(0x27, 0x1, 0x1) setsockopt$nfc_llcp_NFC_LLCP_MIUX(r2, 0x118, 0x15, &(0x7f0000000000), 0x4) r3 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/cuse\x00', 0x103002, 0x0) futimesat(r3, &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)={{0x0, 0x7530}}) r4 = syz_open_dev$vcsa(&(0x7f00000001c0)='/dev/vcsa#\x00', 0x2, 0x0) sendto$inet6(r4, &(0x7f0000000bc0), 0x0, 0x20000000, &(0x7f0000000c40)={0xa, 0x4e20, 0x0, @dev={0xfe, 0x80, [], 0x19}, 0x1f}, 0x1c) accept$alg(r0, 0x0, 0x0) sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f0000000000)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x8}, 0xb4fcd35419244434, &(0x7f00004ca000)={&(0x7f0000000300)=ANY=[], 0x1a1}, 0x1}, 0x0) syz_fuseblk_mount(&(0x7f0000001380)='./file0\x00', &(0x7f00000013c0)='./file0\x00', 0xf000, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0xb21, 0x0) socket(0x1e, 0x3, 0x0) socket(0x1e, 0x0, 0x0) ptrace$PTRACE_SECCOMP_GET_FILTER(0x420c, 0x0, 0x0, &(0x7f0000000380)=""/113) sched_yield() ioctl$TUNGETIFF(r4, 0x800454d2, &(0x7f0000000140)) ioctl$KIOCSOUND(r4, 0x4b2f, 0x0) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x20, 0x9b}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000447000)='./file0\x00', &(0x7f00000e1000)='msdos\x00', 0x0, &(0x7f000097bfff)) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000580)='./cgroup/syz0\x00', 0x1ff) 2018/03/31 09:15:35 executing program 2: syz_open_dev$loop(&(0x7f00000003c0)='/dev/loop#\x00', 0x8, 0x0) r0 = syz_open_dev$sndseq(&(0x7f00000001c0)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r0, 0x4040534e, &(0x7f000019ffe9)={0xc1}) ioctl$sock_ipx_SIOCAIPXPRISLT(0xffffffffffffffff, 0x89e1, &(0x7f0000000280)=0x3f) ioctl$sock_inet_SIOCRTMSG(0xffffffffffffffff, 0x890d, &(0x7f0000000200)={0x80, {0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x19}}, {0x2, 0x4e21, @local={0xac, 0x14, 0x14, 0xaa}}, {0x2, 0x4e23}, 0x0, 0x7, 0x1, 0x0, 0x9, 0x0, 0x0, 0x0, 0xfffffffffffffff7}) getsockopt$inet_sctp_SCTP_PRIMARY_ADDR(0xffffffffffffffff, 0x84, 0x6, &(0x7f0000000ac0)={0x0, @in={{0x2, 0x4e20, @loopback=0x7f000001}}}, &(0x7f00000002c0)=0x84) setsockopt$inet_sctp_SCTP_ENABLE_STREAM_RESET(0xffffffffffffffff, 0x84, 0x76, &(0x7f0000000300)={r1, 0x1c9}, 0x8) r2 = syz_open_dev$sg(&(0x7f0000000700)='/dev/sg#\x00', 0xfffffffffffffff7, 0x800) clone(0x2000c100, &(0x7f0000000800)="97bb77038add5df9e9d4f9783b82c55fe59e5c0acdbcfc9bcf92ac0e1f1f3c1959c1d25dfabf3849336c7c85be174d7765b47e113632aea54b87e4d3f2c1db09e6aa4040b43d17308fb7e62e808067da2fff3cfd8e4c038c814bbfc6bc49d8ebc8671d8297e2d34dc61f2d194d2dbb8f59b4c853e0714d3d4bb29d1243fac01c86c8c4dd38daedab3c6ad73a72d3f6dd2684aa82e5285eb82452c9848b7beb8bc513ba8c8973cad0bd5926604846b7f5d0397b", &(0x7f00000008c0), &(0x7f0000000900), &(0x7f0000000940)="ed6c04412e782fe395f084741e3d9fe469aebde09acc8f8d8d84d1f00f5573b09acba487077ebb904cb1f3fed55f59d677ce24bbd2a7506df8e1e0d0fc709cb8c9f4ab2aeeeebc5ef879742c1f7628f1862c88b5b0da89acbf43ef12e4839405b6a3430d296fea06d2f3a8356c57ec991e") ioctl$SNDRV_SEQ_IOCTL_SUBSCRIBE_PORT(r0, 0x40505330, &(0x7f0000ec6fb0)={{}, {0x80}}) getsockopt$netrom_NETROM_T1(0xffffffffffffffff, 0x103, 0x1, &(0x7f0000000000), &(0x7f0000000380)=0x4) syz_open_dev$adsp(&(0x7f0000000600)='/dev/adsp#\x00', 0x100000000, 0x80000) rt_sigprocmask(0x3d738072cd0f41ac, &(0x7f0000000cc0)={0x7}, &(0x7f0000000d00), 0x8) clone(0x40000000, &(0x7f0000000500)="67cdd9994c47c31d325b069924a7064c157c2ec0b5b5dca2feeb7dabef3b7af0d02d559e293faa759f2b3cb12aea360c2d", &(0x7f0000000580), &(0x7f00000005c0), &(0x7f0000000a00)="29859fdda9a119e54a27f9ec76b4d63a16dc5bbdd38c2fda0e5f4d8f830cd987ec7d3ffc66cf3db8820968fd89a1fba8fe6352a29a27f3b000bcdf238f2c04b358fc831025180e0be313da41de6366c94a1a0f86aaffdf2c039111b55275c054e14819a827fe809225249a01944263a2aec15f64e752e35892b1b8e7ef1e0e9115") ioctl$SNDRV_SEQ_IOCTL_DELETE_PORT(r0, 0x40a85321, &(0x7f0000000b80)={{0x4, 0x8}, 'port0\x00', 0x80, 0x0, 0x10000, 0x6, 0x2, 0x80, 0x8, 0x0, 0x0, 0x3dec00}) getsockopt$inet_sctp_SCTP_SOCKOPT_PEELOFF(r2, 0x84, 0x66, &(0x7f0000000c40)={r1, 0x6}, &(0x7f0000000c80)=0x8) clock_settime(0x7, &(0x7f0000000740)={0x77359400}) ioctl$SNDRV_SEQ_IOCTL_CLIENT_ID(r0, 0x80045301, &(0x7f0000000340)) r3 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer2\x00', 0x0, 0x0) openat$sequencer2(0xffffffffffffff9c, &(0x7f00000006c0)='/dev/sequencer2\x00', 0x222081, 0x0) ioctl$RNDADDENTROPY(0xffffffffffffffff, 0x40085203, &(0x7f0000000100)=ANY=[@ANYPTR=&(0x7f0000000680)=ANY=[@ANYPTR64=&(0x7f0000000640)=ANY=[@ANYPTR, @ANYPTR]]]) setsockopt$inet_sctp_SCTP_DEFAULT_SEND_PARAM(r3, 0x84, 0xa, &(0x7f0000000140)={0x5, 0x100000001, 0x0, 0x8, 0x0, 0x7, 0x401, 0x1f, r1}, 0x20) 2018/03/31 09:15:35 executing program 4: perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f000031f000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) prctl$void(0x0) getpid() r0 = syz_open_dev$vcsn(&(0x7f0000000040)='/dev/vcs#\x00', 0x0, 0x20000) ioctl$GIO_CMAP(r0, 0x4b70, &(0x7f0000000080)) r1 = socket$alg(0x26, 0x5, 0x0) ioctl$sock_SIOCGIFBR(0xffffffffffffffff, 0x8940, &(0x7f0000000040)=@get={0x1, &(0x7f0000000400)=""/242, 0x100000000}) bind$alg(r1, &(0x7f0000000080)={0x26, 'aead\x00', 0x0, 0x0, 'generic-gcm-aesni\x00'}, 0x58) syz_open_dev$sndmidi(&(0x7f0000000100)='/dev/snd/midiC#D#\x00', 0xfd, 0x0) bind(0xffffffffffffffff, &(0x7f0000000140)=@llc={0x1a, 0x33a, 0x7, 0x80, 0x0, 0x4, @remote={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xbb}}, 0x80) r2 = syz_init_net_socket$nfc_llcp(0x27, 0x1, 0x1) setsockopt$nfc_llcp_NFC_LLCP_MIUX(r2, 0x118, 0x15, &(0x7f0000000000), 0x4) r3 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/cuse\x00', 0x103002, 0x0) futimesat(r3, &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)={{0x0, 0x7530}}) r4 = syz_open_dev$vcsa(&(0x7f00000001c0)='/dev/vcsa#\x00', 0x2, 0x0) sendto$inet6(r4, &(0x7f0000000bc0), 0x0, 0x20000000, &(0x7f0000000c40)={0xa, 0x4e20, 0x0, @dev={0xfe, 0x80, [], 0x19}, 0x1f}, 0x1c) accept$alg(r0, 0x0, 0x0) sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f0000000000)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x8}, 0xb4fcd35419244434, &(0x7f00004ca000)={&(0x7f0000000300)=ANY=[], 0x1a1}, 0x1}, 0x0) syz_fuseblk_mount(&(0x7f0000001380)='./file0\x00', &(0x7f00000013c0)='./file0\x00', 0xf000, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0xb21, 0x0) socket(0x1e, 0x3, 0x0) socket(0x1e, 0x0, 0x0) ptrace$PTRACE_SECCOMP_GET_FILTER(0x420c, 0x0, 0x0, &(0x7f0000000380)=""/113) socket$alg(0x26, 0x5, 0x0) sched_yield() ioctl$TUNGETIFF(r4, 0x800454d2, &(0x7f0000000140)) ioctl$KIOCSOUND(r4, 0x4b2f, 0xfffffffffffffb74) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x20, 0x9b}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000447000)='./file0\x00', &(0x7f00000e1000)='msdos\x00', 0x0, &(0x7f000097bfff)) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000580)='./cgroup/syz0\x00', 0x1ff) ioctl$SNDRV_SEQ_IOCTL_GET_PORT_INFO(r4, 0xc0a85322, &(0x7f0000000200)) [ 328.404676] binder: 31633:31640 unknown command 20 [ 328.414865] FAULT_INJECTION: forcing a failure. [ 328.414865] name failslab, interval 1, probability 0, space 0, times 0 [ 328.426188] CPU: 1 PID: 31629 Comm: syz-executor7 Not tainted 4.16.0-rc7+ #8 [ 328.426197] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 328.426201] Call Trace: [ 328.426220] dump_stack+0x194/0x24d [ 328.426235] ? arch_local_irq_restore+0x53/0x53 2018/03/31 09:15:35 executing program 1: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f000031f000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) prctl$void(0x0) getpid() r0 = syz_open_dev$vcsn(&(0x7f0000000040)='/dev/vcs#\x00', 0x400, 0x20000) r1 = socket$alg(0x26, 0x5, 0x0) ioctl$sock_SIOCGIFBR(r1, 0x8940, &(0x7f0000000040)=@get={0x1, &(0x7f0000000400)=""/242, 0x100000000}) bind$alg(r1, &(0x7f0000000080)={0x26, 'aead\x00', 0x0, 0x0, 'generic-gcm-aesni\x00'}, 0x58) r2 = syz_open_dev$sndmidi(&(0x7f0000000100)='/dev/snd/midiC#D#\x00', 0xfd, 0x0) ioctl$KVM_XEN_HVM_CONFIG(r0, 0x4038ae7a, &(0x7f00000002c0)={0x9, 0xbfe, &(0x7f00000005c0)="c5b87dd37f7860a8c766f28291abab8dd8847f48049e9162f2993760c43ce0e38e040aef8c6ae13fbdc4fb47df4852e26ad275c4ec9922d8adfda158a7a8ebdafbc344059e81fdcfc3f45130b79f4824f5703939bd5795039c2e22138a21fe9c0a04f3e58191e6582054486e2790436e0cb118e2f3e124751c1720ebe2ec92a831ee28de925e2907c5e9fb1f1a7a206a36925b7c00a1e2b1d88707795e2f75fd1247a7c71d24c5d399dfe8d19833720c1cd9621f82ca913d9ff3ec007d4dd2a17df079f992f718e4aaec4d7dd4fef6a695127c331d00e65aae6689d736a58ac7000528c8d75c2b9bab419bdea3818135c1226c", &(0x7f0000000200)="fd803b49c6dd295f3f3d394db505835cec13a3bc354a84637c6a41a4fabfec578374209d1d5baf56a850a246563d385c990ee3e582992fbd6b9bb0eff168b4eaf37150f4fa507e86aba6e2c407efc85089014029e6e59fd9330f050935894b75b3a061b9ad", 0xf3, 0x65}) bind(r2, &(0x7f0000000140)=@llc={0x1a, 0x33a, 0x7, 0x80, 0x0, 0x4, @remote={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xbb}}, 0x80) r3 = syz_init_net_socket$nfc_llcp(0x27, 0x1, 0x1) setsockopt$nfc_llcp_NFC_LLCP_MIUX(r3, 0x118, 0x15, &(0x7f0000000000), 0x4) r4 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/cuse\x00', 0x103002, 0x0) futimesat(r4, &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)={{0x0, 0x7530}}) r5 = syz_open_dev$vcsa(&(0x7f00000001c0)='/dev/vcsa#\x00', 0x2, 0x4020ff) sendto$inet6(r5, &(0x7f0000000bc0), 0x0, 0x20000000, &(0x7f0000000c40)={0xa, 0x4e20, 0x6, @dev={0xfe, 0x80, [], 0x19}, 0x1f}, 0x1c) sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f0000000000)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x8}, 0xb4fcd35419244434, &(0x7f00004ca000)={&(0x7f0000000300)=ANY=[], 0x1a1}, 0x1}, 0x0) syz_fuseblk_mount(&(0x7f0000001380)='./file0\x00', &(0x7f00000013c0)='./file0\x00', 0xf000, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0xb21, 0x0) socket(0x1e, 0x3, 0x0) ptrace$PTRACE_SECCOMP_GET_FILTER(0x420c, 0x0, 0x0, &(0x7f0000000380)=""/113) sched_yield() ioctl$TUNGETIFF(r5, 0x800454d2, &(0x7f0000000140)) ioctl$KIOCSOUND(r5, 0x4b2f, 0xfffffffffffffb74) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x20, 0x9b}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000447000)='./file0\x00', &(0x7f00000e1000)='msdos\x00', 0x0, &(0x7f000097bfff)) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000580)='./cgroup/syz0\x00', 0x1ff) syz_open_dev$audion(&(0x7f0000000280)='/dev/audio#\x00', 0xfffffffffffffff9, 0x2000) fcntl$getown(0xffffffffffffffff, 0x9) [ 328.426245] ? __save_stack_trace+0x7e/0xd0 [ 328.426263] should_fail+0x8c0/0xa40 [ 328.438345] binder: 31633:31640 ioctl c0306201 20000340 returned -22 [ 328.442799] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 328.442815] ? kasan_kmalloc+0xad/0xe0 [ 328.442825] ? kmem_cache_alloc_trace+0x136/0x740 [ 328.442834] ? __memcg_init_list_lru_node+0x169/0x270 [ 328.442844] ? __list_lru_init+0x544/0x750 [ 328.491298] ? sget_userns+0x691/0xe40 [ 328.495196] ? mount_fs+0x66/0x2d0 [ 328.498735] ? vfs_kern_mount.part.26+0xc6/0x4a0 [ 328.503488] ? do_mount+0xea4/0x2bb0 [ 328.507200] ? do_syscall_64+0x281/0x940 [ 328.511256] ? entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 328.516619] ? find_held_lock+0x35/0x1d0 [ 328.520679] ? __lock_is_held+0xb6/0x140 [ 328.524759] ? check_same_owner+0x320/0x320 [ 328.524774] ? rcu_note_context_switch+0x710/0x710 [ 328.524794] should_failslab+0xec/0x120 [ 328.524805] kmem_cache_alloc_trace+0x4b/0x740 [ 328.524814] ? __kmalloc_node+0x33/0x70 [ 328.524822] ? __kmalloc_node+0x33/0x70 [ 328.524832] ? rcu_read_lock_sched_held+0x108/0x120 [ 328.524847] __memcg_init_list_lru_node+0x169/0x270 [ 328.524859] ? list_lru_add+0x7c0/0x7c0 [ 328.524869] ? __kmalloc_node+0x47/0x70 [ 328.524884] __list_lru_init+0x544/0x750 [ 328.524898] ? memcg_destroy_list_lru_node.isra.7+0x110/0x110 [ 328.524910] ? trace_hardirqs_on_caller+0x421/0x5c0 [ 328.524921] ? __lockdep_init_map+0xe4/0x650 [ 328.524933] ? lockdep_init_map+0x9/0x10 [ 328.524946] sget_userns+0x691/0xe40 [ 328.524954] ? kill_litter_super+0x90/0x90 [ 328.524966] ? ns_test_super+0x50/0x50 [ 328.524977] ? destroy_unused_super.part.6+0xd0/0xd0 [ 328.524986] ? do_raw_spin_trylock+0x190/0x190 [ 328.525001] ? kobject_put+0x6b/0x250 [ 328.525015] ? blkdev_get+0x3a1/0xb00 [ 328.525030] ? cap_capable+0x1b5/0x230 [ 328.525039] ? __blkdev_get+0x13b0/0x13b0 [ 328.525052] ? security_capable+0x8e/0xc0 [ 328.525062] ? kill_litter_super+0x90/0x90 [ 328.525072] ? ns_capable_common+0xcf/0x160 [ 328.525082] ? ns_test_super+0x50/0x50 [ 328.525090] ? kill_litter_super+0x90/0x90 [ 328.525098] sget+0xd2/0x120 [ 328.525111] mount_bdev+0x109/0x370 [ 328.525120] ? msdos_mount+0x40/0x40 [ 328.525133] msdos_mount+0x34/0x40 [ 328.525144] mount_fs+0x66/0x2d0 [ 328.525163] vfs_kern_mount.part.26+0xc6/0x4a0 [ 328.525176] ? may_umount+0xa0/0xa0 [ 328.525187] ? _raw_read_unlock+0x22/0x30 [ 328.525196] ? __get_fs_type+0x8a/0xc0 [ 328.525212] do_mount+0xea4/0x2bb0 [ 328.686512] ? copy_mount_string+0x40/0x40 [ 328.690741] ? trace_hardirqs_on_caller+0x421/0x5c0 [ 328.695753] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 328.700506] ? retint_kernel+0x10/0x10 [ 328.704388] ? copy_mount_options+0x18b/0x2e0 [ 328.708873] ? copy_mount_options+0x193/0x2e0 [ 328.713358] ? copy_mount_options+0x1f7/0x2e0 [ 328.717849] SyS_mount+0xab/0x120 [ 328.721294] ? copy_mnt_ns+0xb30/0xb30 [ 328.725173] do_syscall_64+0x281/0x940 [ 328.729048] ? vmalloc_sync_all+0x30/0x30 [ 328.733186] ? _raw_spin_unlock_irq+0x27/0x70 [ 328.737671] ? finish_task_switch+0x1c1/0x7e0 [ 328.742159] ? syscall_return_slowpath+0x550/0x550 [ 328.747082] ? syscall_return_slowpath+0x2ac/0x550 [ 328.752006] ? prepare_exit_to_usermode+0x350/0x350 [ 328.757015] ? entry_SYSCALL_64_after_hwframe+0x52/0xb7 [ 328.762374] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 328.767213] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 328.772388] RIP: 0033:0x454e79 [ 328.775566] RSP: 002b:00007f37fba8ec68 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 328.783266] RAX: ffffffffffffffda RBX: 00007f37fba8f6d4 RCX: 0000000000454e79 [ 328.790525] RDX: 00000000200e1000 RSI: 0000000020447000 RDI: 0000000020000000 [ 328.797781] RBP: 000000000072bea0 R08: 000000002097bfff R09: 0000000000000000 2018/03/31 09:15:35 executing program 6: perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f000031f000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) prctl$void(0x0) getpid() r0 = syz_open_dev$vcsn(&(0x7f0000000040)='/dev/vcs#\x00', 0x0, 0x20000) ioctl$GIO_CMAP(r0, 0x4b70, &(0x7f0000000080)) r1 = socket$alg(0x26, 0x5, 0x0) ioctl$sock_SIOCGIFBR(0xffffffffffffffff, 0x8940, &(0x7f0000000040)=@get={0x1, &(0x7f0000000400)=""/242, 0x100000000}) bind$alg(r1, &(0x7f0000000080)={0x26, 'aead\x00', 0x0, 0x0, 'generic-gcm-aesni\x00'}, 0x58) syz_open_dev$sndmidi(&(0x7f0000000100)='/dev/snd/midiC#D#\x00', 0xfd, 0x0) bind(0xffffffffffffffff, &(0x7f0000000140)=@llc={0x1a, 0x33a, 0x7, 0x80, 0x0, 0x4, @remote={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xbb}}, 0x80) r2 = syz_init_net_socket$nfc_llcp(0x27, 0x1, 0x1) setsockopt$nfc_llcp_NFC_LLCP_MIUX(r2, 0x118, 0x15, &(0x7f0000000000), 0x4) r3 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/cuse\x00', 0x103002, 0x0) futimesat(r3, &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)={{0x0, 0x7530}}) r4 = syz_open_dev$vcsa(&(0x7f00000001c0)='/dev/vcsa#\x00', 0x2, 0x0) sendto$inet6(r4, &(0x7f0000000bc0), 0x0, 0x20000000, &(0x7f0000000c40)={0xa, 0x4e20, 0x0, @dev={0xfe, 0x80, [], 0x19}, 0x1f}, 0x1c) accept$alg(r0, 0x0, 0x0) sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f0000000000)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x8}, 0xb4fcd35419244434, &(0x7f00004ca000)={&(0x7f0000000300)=ANY=[], 0x1a1}, 0x1}, 0x0) syz_fuseblk_mount(&(0x7f0000001380)='./file0\x00', &(0x7f00000013c0)='./file0\x00', 0xf000, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0xb21, 0x0) socket(0x1e, 0x3, 0x0) socket(0x1e, 0x0, 0x0) ptrace$PTRACE_SECCOMP_GET_FILTER(0x420c, 0x0, 0x0, &(0x7f0000000380)=""/113) sched_yield() ioctl$TUNGETIFF(r4, 0x800454d2, &(0x7f0000000140)) ioctl$KIOCSOUND(r4, 0x4b2f, 0x0) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x20, 0x9b}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000447000)='./file0\x00', &(0x7f00000e1000)='msdos\x00', 0x0, &(0x7f000097bfff)) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000580)='./cgroup/syz0\x00', 0x1ff) [ 328.805038] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000019 [ 328.812298] R13: 00000000000003fa R14: 00000000006f8010 R15: 0000000000000014 [ 328.822656] print_req_error: I/O error, dev loop199, sector 0 [ 328.835672] FAT-fs (loop199): unable to read boot sector [ 328.842455] binder: 31633:31649 unknown command 26 [ 328.847456] binder: 31633:31649 ioctl c0306201 20000340 returned -22 2018/03/31 09:15:35 executing program 7 (fault-call:24 fault-nth:21): perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f000031f000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getpid() r0 = syz_open_dev$vcsn(&(0x7f0000000040)='/dev/vcs#\x00', 0x0, 0x20000) ioctl$GIO_CMAP(r0, 0x4b70, &(0x7f0000000080)) r1 = socket$alg(0x26, 0x5, 0x0) ioctl$sock_SIOCGIFBR(r1, 0x8940, &(0x7f0000000040)=@get={0x1, &(0x7f0000000400)=""/242, 0x100000000}) bind$alg(r1, &(0x7f0000000080)={0x26, 'aead\x00', 0x0, 0x0, 'generic-gcm-aesni\x00'}, 0x58) syz_open_dev$sndmidi(&(0x7f0000000100)='/dev/snd/midiC#D#\x00', 0xfd, 0x0) bind(0xffffffffffffffff, &(0x7f0000000140)=@llc={0x1a, 0x33a, 0x7, 0x80, 0x5, 0x4, @remote={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xbb}}, 0x80) r2 = syz_init_net_socket$nfc_llcp(0x27, 0x1, 0x1) setsockopt$nfc_llcp_NFC_LLCP_MIUX(r2, 0x118, 0x15, &(0x7f0000000000), 0x4) r3 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/cuse\x00', 0x103002, 0x0) futimesat(r3, &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)={{0x0, 0x7530}}) r4 = syz_open_dev$vcsa(&(0x7f00000001c0)='/dev/vcsa#\x00', 0x2, 0x4020ff) sendto$inet6(r4, &(0x7f0000000bc0)="36251e313e0743fc195a1a198a14434e8a0a00b3f452a3b5644e336ec712a16310c9aecc4e3097bc666a8882128a73c368ce731e9fbf3fe18fa52d00", 0x3c, 0x20000000, &(0x7f0000000c40)={0xa, 0x0, 0x6, @dev={0xfe, 0x80, [], 0x19}, 0x1f}, 0x1c) accept$alg(r0, 0x0, 0x0) sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f0000000000)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x8}, 0xb4fcd35419244434, &(0x7f00004ca000)={&(0x7f0000000300)=ANY=[], 0x1a1}, 0x1}, 0x0) syz_fuseblk_mount(&(0x7f0000001380)='./file0\x00', &(0x7f00000013c0)='./file0\x00', 0xf000, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0xb21, 0x0) socket(0x1e, 0x3, 0x0) socket(0x1e, 0x0, 0x0) ptrace$PTRACE_SECCOMP_GET_FILTER(0x420c, 0x0, 0x0, &(0x7f0000000380)=""/113) sched_yield() ioctl$TUNGETIFF(r4, 0x800454d2, &(0x7f0000000140)) ioctl$KIOCSOUND(r4, 0x4b2f, 0xfffffffffffffb74) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000447000)='./file0\x00', &(0x7f00000e1000)='msdos\x00', 0x0, &(0x7f000097bfff)) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000580)='./cgroup/syz0\x00', 0x1ff) syz_open_dev$audion(&(0x7f0000000280)='/dev/audio#\x00', 0x7be, 0x0) [ 328.849939] print_req_error: I/O error, dev loop199, sector 0 [ 328.860338] FAT-fs (loop199): unable to read boot sector [ 328.867564] print_req_error: I/O error, dev loop199, sector 0 [ 328.874251] FAT-fs (loop199): unable to read boot sector 2018/03/31 09:15:36 executing program 6: perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f000031f000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) prctl$void(0x0) getpid() r0 = syz_open_dev$vcsn(&(0x7f0000000040)='/dev/vcs#\x00', 0x0, 0x20000) ioctl$GIO_CMAP(r0, 0x4b70, &(0x7f0000000080)) r1 = socket$alg(0x26, 0x5, 0x0) ioctl$sock_SIOCGIFBR(0xffffffffffffffff, 0x8940, &(0x7f0000000040)=@get={0x1, &(0x7f0000000400)=""/242, 0x100000000}) bind$alg(r1, &(0x7f0000000080)={0x26, 'aead\x00', 0x0, 0x0, 'generic-gcm-aesni\x00'}, 0x58) syz_open_dev$sndmidi(&(0x7f0000000100)='/dev/snd/midiC#D#\x00', 0xfd, 0x0) bind(0xffffffffffffffff, &(0x7f0000000140)=@llc={0x1a, 0x33a, 0x7, 0x80, 0x0, 0x4, @remote={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xbb}}, 0x80) r2 = syz_init_net_socket$nfc_llcp(0x27, 0x1, 0x1) setsockopt$nfc_llcp_NFC_LLCP_MIUX(r2, 0x118, 0x15, &(0x7f0000000000), 0x4) r3 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/cuse\x00', 0x103002, 0x0) futimesat(r3, &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)={{0x0, 0x7530}}) r4 = syz_open_dev$vcsa(&(0x7f00000001c0)='/dev/vcsa#\x00', 0x2, 0x0) sendto$inet6(r4, &(0x7f0000000bc0), 0x0, 0x20000000, &(0x7f0000000c40)={0xa, 0x4e20, 0x0, @dev={0xfe, 0x80, [], 0x19}, 0x1f}, 0x1c) accept$alg(r0, 0x0, 0x0) sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f0000000000)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x8}, 0xb4fcd35419244434, &(0x7f00004ca000)={&(0x7f0000000300)=ANY=[], 0x1a1}, 0x1}, 0x0) syz_fuseblk_mount(&(0x7f0000001380)='./file0\x00', &(0x7f00000013c0)='./file0\x00', 0xf000, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0xb21, 0x0) socket(0x1e, 0x3, 0x0) socket(0x1e, 0x0, 0x0) ptrace$PTRACE_SECCOMP_GET_FILTER(0x420c, 0x0, 0x0, &(0x7f0000000380)=""/113) sched_yield() ioctl$TUNGETIFF(r4, 0x800454d2, &(0x7f0000000140)) ioctl$KIOCSOUND(r4, 0x4b2f, 0x0) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x20, 0x9b}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000447000)='./file0\x00', &(0x7f00000e1000)='msdos\x00', 0x0, &(0x7f000097bfff)) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000580)='./cgroup/syz0\x00', 0x1ff) [ 328.903554] print_req_error: I/O error, dev loop199, sector 0 [ 328.909621] FAT-fs (loop199): unable to read boot sector [ 328.929377] FAULT_INJECTION: forcing a failure. [ 328.929377] name failslab, interval 1, probability 0, space 0, times 0 [ 328.940658] CPU: 1 PID: 31656 Comm: syz-executor7 Not tainted 4.16.0-rc7+ #8 [ 328.947847] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 328.957196] Call Trace: [ 328.959804] dump_stack+0x194/0x24d [ 328.959818] ? arch_local_irq_restore+0x53/0x53 [ 328.968084] ? __save_stack_trace+0x7e/0xd0 [ 328.972416] should_fail+0x8c0/0xa40 [ 328.976137] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 328.981235] ? kasan_kmalloc+0xad/0xe0 [ 328.984396] binder: 31660:31664 unknown command 20 [ 328.985112] ? kmem_cache_alloc_trace+0x136/0x740 [ 328.985129] ? __memcg_init_list_lru_node+0x169/0x270 [ 328.985139] ? __list_lru_init+0x544/0x750 [ 328.985149] ? sget_userns+0x691/0xe40 [ 328.985159] ? mount_fs+0x66/0x2d0 [ 328.985169] ? vfs_kern_mount.part.26+0xc6/0x4a0 [ 328.985177] ? do_mount+0xea4/0x2bb0 [ 328.985187] ? do_syscall_64+0x281/0x940 [ 328.985198] ? entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 328.985213] ? find_held_lock+0x35/0x1d0 [ 329.000819] binder: 31660:31664 ioctl c0306201 20000340 returned -22 [ 329.004360] ? __lock_is_held+0xb6/0x140 [ 329.004385] ? check_same_owner+0x320/0x320 [ 329.004402] ? rcu_note_context_switch+0x710/0x710 [ 329.004422] should_failslab+0xec/0x120 [ 329.004431] kmem_cache_alloc_trace+0x4b/0x740 [ 329.004440] ? __kmalloc_node+0x33/0x70 [ 329.033832] binder: BINDER_SET_CONTEXT_MGR already set [ 329.040145] ? __kmalloc_node+0x33/0x70 [ 329.040159] ? rcu_read_lock_sched_held+0x108/0x120 [ 329.040174] __memcg_init_list_lru_node+0x169/0x270 [ 329.040186] ? list_lru_add+0x7c0/0x7c0 [ 329.040196] ? __kmalloc_node+0x47/0x70 [ 329.040211] __list_lru_init+0x544/0x750 [ 329.040226] ? memcg_destroy_list_lru_node.isra.7+0x110/0x110 2018/03/31 09:15:36 executing program 3: r0 = syz_open_dev$random(&(0x7f00000001c0)='/dev/random\x00', 0x0, 0x800) r1 = syz_open_dev$loop(&(0x7f0000308000)='/dev/loop#\x00', 0x0, 0x0) ioctl$LOOP_SET_STATUS(r1, 0xc0481273, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "3900ea631d00000000020000010000009f00000023f7b7d65f90b0e6330ee739b319d8f6aa6bd58d1443474482e85040fb4947ebb55bd19f335b5bffff0001f3", "cfa430745a540dc1c149b7b81579f6a41c51f7d51933223e82ab867dac761faf"}) write(0xffffffffffffffff, &(0x7f00000001c0), 0x0) setsockopt$inet_sctp6_SCTP_RECVNXTINFO(0xffffffffffffffff, 0x84, 0x21, &(0x7f00000003c0)=0x200, 0x4) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f00000000c0)=0x0) getsockopt$netrom_NETROM_T4(0xffffffffffffffff, 0x103, 0x6, &(0x7f0000000300)=0x8, &(0x7f0000000340)=0x4) r3 = getpid() sched_setparam(r3, &(0x7f0000000400)) syz_open_dev$loop(&(0x7f0000ca9ff5)='/dev/loop#\x00', 0x0, 0x82) r4 = memfd_create(&(0x7f0000614000)="74086e750000000000000000008c00", 0x0) pwritev(r4, &(0x7f0000f50f90)=[{&(0x7f0000000040)="aa", 0x1}], 0x1, 0x0) fcntl$getownex(r1, 0x10, &(0x7f0000000240)={0x0, 0x0}) r6 = syz_open_procfs(r5, &(0x7f0000000280)='stat\x00') epoll_ctl$EPOLL_CTL_MOD(r4, 0x3, r0, &(0x7f00000002c0)={0x20000010}) accept4$inet6(r4, &(0x7f0000000100)={0x0, 0x0, 0x0, @mcast1}, &(0x7f0000000140)=0x1c, 0x7fd) getsockopt$inet_IP_IPSEC_POLICY(r4, 0x0, 0x10, &(0x7f0000000940)={{{@in6=@local, @in6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@loopback}, 0x0, @in=@local}}, &(0x7f0000000780)=0xe8) getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f0000000500)={0x0, 0x0, 0x0}, &(0x7f0000000480)=0x5) fchown(r4, r7, r8) r9 = syz_open_dev$binder(&(0x7f0000000100)='/dev/binder#\x00', 0xffffffffffffffff, 0x806) ioctl$BINDER_SET_CONTEXT_MGR(r9, 0x40046207, 0x0) mmap$binder(&(0x7f000000c000/0x2000)=nil, 0x2000, 0x0, 0x12, r9, 0x0) ioctl$BINDER_WRITE_READ(r9, 0xc0306201, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000), 0x0, 0x0, &(0x7f0000011f9d)}) getsockopt$inet_sctp6_SCTP_AUTO_ASCONF(0xffffffffffffffff, 0x84, 0x1e, &(0x7f0000000140), &(0x7f0000000180)=0x4) ioctl$BINDER_WRITE_READ(r9, 0xc0306201, &(0x7f0000000340)={0x8, 0x0, &(0x7f0000000440)=ANY=[@ANYRES64=r1], 0x0, 0x0, &(0x7f0000000240)}) write(0xffffffffffffffff, &(0x7f0000000300)="8be25f5790f664f32509e40d6f879d5add7e2d359c9a19afb750a2d25352875d187d4118c99a2d5c6db433c277cc7d345b87a34f1b417033d367cb0cfd6a25633f77aafb17e99c33cb65352c901ae75176f07bb0a4bb5ebff3d87e", 0x5b) r10 = ioctl$LOOP_CTL_GET_FREE(r4, 0x4c82) ioctl$LOOP_CTL_REMOVE(r6, 0x4c81, r10) openat$cgroup(0xffffffffffffff9c, &(0x7f0000000000)='syz0\x00', 0x200002, 0x0) sched_setaffinity(r2, 0x8, &(0x7f0000000200)=0x7) 2018/03/31 09:15:36 executing program 3: r0 = syz_open_dev$random(&(0x7f00000001c0)='/dev/random\x00', 0x0, 0x800) syz_open_dev$loop(&(0x7f0000308000)='/dev/loop#\x00', 0x0, 0x0) write(0xffffffffffffffff, &(0x7f00000001c0), 0x0) setsockopt$inet_sctp6_SCTP_RECVNXTINFO(0xffffffffffffffff, 0x84, 0x21, &(0x7f00000003c0)=0x200, 0x4) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f00000000c0)=0x0) pipe2(&(0x7f0000000380)={0xffffffffffffffff}, 0x84000) getsockopt$netrom_NETROM_T4(r2, 0x103, 0x6, &(0x7f0000000300)=0x8, &(0x7f0000000340)=0x2) r3 = getpid() sched_setparam(r3, &(0x7f0000000400)) r4 = syz_open_dev$loop(&(0x7f0000ca9ff5)='/dev/loop#\x00', 0x0, 0x82) r5 = memfd_create(&(0x7f0000614000)="74086e750000000000000000008c00", 0x0) pwritev(r5, &(0x7f0000f50f90)=[{&(0x7f0000000040)="aa", 0x1}], 0x1, 0x0) fcntl$getownex(r4, 0x10, &(0x7f0000000240)={0x0, 0x0}) r7 = syz_open_procfs(r6, &(0x7f0000000280)='stat\x00') epoll_ctl$EPOLL_CTL_MOD(r5, 0x3, r0, &(0x7f00000002c0)={0x20000010}) accept4$inet6(r5, &(0x7f0000000100)={0x0, 0x0, 0x0, @mcast1}, &(0x7f0000000140)=0x1c, 0x7fd) getsockopt$inet_IP_IPSEC_POLICY(r5, 0x0, 0x10, &(0x7f0000000940)={{{@in6=@local, @in6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@loopback}, 0x0, @in=@local}}, &(0x7f0000000780)=0xe8) getsockopt$sock_cred(r5, 0x1, 0x11, &(0x7f00000007c0)={0x0, 0x0, 0x0}, &(0x7f0000000540)=0xc) fchown(r5, r8, r9) r10 = syz_open_dev$binder(&(0x7f0000000100)='/dev/binder#\x00', 0xffffffffffffffff, 0x806) ioctl$BINDER_SET_CONTEXT_MGR(r7, 0x40046207, 0x0) mmap$binder(&(0x7f000000c000/0x2000)=nil, 0x2000, 0x0, 0x12, r10, 0x0) ioctl$BINDER_WRITE_READ(r10, 0xc0306201, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000), 0x0, 0x0, &(0x7f0000000380)}) getsockopt$inet_sctp6_SCTP_AUTO_ASCONF(0xffffffffffffffff, 0x84, 0x1e, &(0x7f0000000140), &(0x7f0000000180)=0x4) ioctl$BINDER_WRITE_READ(r10, 0xc0306201, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000080)=ANY=[], 0x0, 0x0, &(0x7f0000000240)}) write(0xffffffffffffffff, &(0x7f0000000580)="8be25f5790f664f32509e40d6f879d5add7e2d359c9a19afb750a2d2535f22f822e990225dd452875d187d4118c99a2d5c6db433c277cc7d345b87a34f1b417033d367cb29fd6a25633f77aafb17e99c33cb65352c901ae7517df0af7da268cbefad6e21473c4eae85e810965f0562cc705e4c50b65c5afcc62f735f66538db6187c735665192e0ff59af2313fcbc4800a5143d2d857e944662e33761747cef1962037a716ed71f9e6754af54947f734ed76fc01c18d6281bf179016f04bc190aff0e2371dedbec68935d773987966f4cf06a53cfced85c0a926a5d628a1ef8f1b2e968e48428c78675bbd70ace572de03abb9ae9f382b83dbd0b2438e56480e65a423d37a7dfc9c26a8", 0x10a) r11 = ioctl$LOOP_CTL_GET_FREE(r5, 0x4c82) ioctl$LOOP_CTL_REMOVE(r7, 0x4c81, r11) openat$cgroup(0xffffffffffffff9c, &(0x7f0000000000)='syz0\x00', 0x200002, 0x0) sched_setaffinity(r1, 0x8, &(0x7f0000000200)=0x7) [ 329.040238] ? trace_hardirqs_on_caller+0x421/0x5c0 [ 329.040251] ? __lockdep_init_map+0xe4/0x650 [ 329.050972] binder: 31660:31665 ioctl 40046207 0 returned -16 [ 329.053510] ? lockdep_init_map+0x9/0x10 [ 329.053524] sget_userns+0x691/0xe40 [ 329.053533] ? kill_litter_super+0x90/0x90 [ 329.053546] ? ns_test_super+0x50/0x50 [ 329.053557] ? destroy_unused_super.part.6+0xd0/0xd0 [ 329.053566] ? do_raw_spin_trylock+0x190/0x190 [ 329.053581] ? kobject_put+0x6b/0x250 [ 329.053597] ? blkdev_get+0x3a1/0xb00 [ 329.053611] ? cap_capable+0x1b5/0x230 [ 329.069711] binder: 31660:31665 unknown command 26 [ 329.071335] ? __blkdev_get+0x13b0/0x13b0 [ 329.071350] ? security_capable+0x8e/0xc0 [ 329.071362] ? kill_litter_super+0x90/0x90 [ 329.071374] ? ns_capable_common+0xcf/0x160 [ 329.071384] ? ns_test_super+0x50/0x50 [ 329.071392] ? kill_litter_super+0x90/0x90 [ 329.071401] sget+0xd2/0x120 [ 329.071414] mount_bdev+0x109/0x370 [ 329.071423] ? msdos_mount+0x40/0x40 [ 329.071434] msdos_mount+0x34/0x40 2018/03/31 09:15:36 executing program 3: r0 = syz_open_dev$random(&(0x7f00000001c0)='/dev/random\x00', 0x0, 0x800) r1 = syz_open_dev$loop(&(0x7f0000308000)='/dev/loop#\x00', 0x0, 0xa0000) ioctl$LOOP_SET_STATUS(r1, 0xc0481273, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "3900ea631d00000000020000010000009f00000023f7b7d65f90b0e6330ee739b319d8f6aa6bd58d1443474482e85040fb4947ebb55bd19f335b5bffff0001f3", "cfa430745a540dc1c149b7b81579f6a41c51f7d51933223e82ab867dac761faf"}) write(0xffffffffffffffff, &(0x7f00000001c0), 0x0) setsockopt$inet_sctp6_SCTP_RECVNXTINFO(0xffffffffffffffff, 0x84, 0x21, &(0x7f00000003c0)=0x200, 0x4) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f00000000c0)=0x0) getsockopt$netrom_NETROM_T4(0xffffffffffffffff, 0x103, 0x6, &(0x7f0000000300)=0x8, &(0x7f0000000340)=0x4) r3 = getpid() sched_setparam(r3, &(0x7f0000000400)) syz_open_dev$loop(&(0x7f0000ca9ff5)='/dev/loop#\x00', 0x0, 0x82) r4 = memfd_create(&(0x7f0000614000)="74086e750000000000000000008c00", 0x0) pwritev(r4, &(0x7f0000f50f90)=[{&(0x7f0000000380)="54ef9d32", 0x1}], 0xaa, 0x0) fcntl$getownex(r1, 0x10, &(0x7f0000000240)={0x0, 0x0}) r6 = syz_open_procfs(r5, &(0x7f0000000280)='stat\x00') epoll_ctl$EPOLL_CTL_MOD(r4, 0x3, r0, &(0x7f00000002c0)={0x20000010}) accept4$inet6(r4, &(0x7f0000000100)={0x0, 0x0, 0x0, @mcast1}, &(0x7f0000000140)=0x1c, 0x7fd) getsockopt$inet_IP_IPSEC_POLICY(r4, 0x0, 0x10, &(0x7f0000000940)={{{@in6=@local, @in6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@loopback}, 0x0, @in=@local}}, &(0x7f0000000780)=0xe8) getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f00000007c0)={0x0, 0x0, 0x0}, &(0x7f0000000540)=0xc) fchown(r4, r7, r8) r9 = syz_open_dev$binder(&(0x7f0000000100)='/dev/binder#\x00', 0xffffffffffffffff, 0x806) ioctl$BINDER_SET_CONTEXT_MGR(r6, 0x40046207, 0x0) mmap$binder(&(0x7f000000c000/0x2000)=nil, 0x2000, 0x0, 0x12, r9, 0x0) ioctl$BINDER_WRITE_READ(r9, 0xc0306201, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000), 0x0, 0x0, &(0x7f0000011f9d)}) getsockopt$inet_sctp6_SCTP_AUTO_ASCONF(0xffffffffffffffff, 0x84, 0x1e, &(0x7f0000000140), &(0x7f0000000180)=0x4) ioctl$BINDER_WRITE_READ(r9, 0xc0306201, &(0x7f0000000340)={0x8, 0x0, &(0x7f0000000440)=ANY=[@ANYRES64=r1], 0x0, 0x0, &(0x7f0000000240)}) write(0xffffffffffffffff, &(0x7f0000000300)="8be25f5790f664f32509e40d6f879d5add7e2d359c9a19afb750a2d25352875d187d4118c99a2d5c6db433c277cc7d345b87a34f1b417033d367cb0cfd6a25633f77aafb17e99c33cb65352c901ae75176f07bb0a4bb5ebff3d87e", 0x5b) r10 = ioctl$LOOP_CTL_GET_FREE(r4, 0x4c82) ioctl$LOOP_CTL_REMOVE(r6, 0x4c81, r10) openat$cgroup(0xffffffffffffff9c, &(0x7f0000000000)='syz0\x00', 0x200002, 0x0) sched_setaffinity(r2, 0x8, &(0x7f0000000200)=0x7) 2018/03/31 09:15:36 executing program 6: perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f000031f000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) prctl$void(0x0) getpid() r0 = syz_open_dev$vcsn(&(0x7f0000000040)='/dev/vcs#\x00', 0x0, 0x20000) ioctl$GIO_CMAP(r0, 0x4b70, &(0x7f0000000080)) r1 = socket$alg(0x26, 0x5, 0x0) ioctl$sock_SIOCGIFBR(0xffffffffffffffff, 0x8940, &(0x7f0000000040)=@get={0x1, &(0x7f0000000400)=""/242, 0x100000000}) bind$alg(r1, &(0x7f0000000080)={0x26, 'aead\x00', 0x0, 0x0, 'generic-gcm-aesni\x00'}, 0x58) syz_open_dev$sndmidi(&(0x7f0000000100)='/dev/snd/midiC#D#\x00', 0xfd, 0x0) bind(0xffffffffffffffff, &(0x7f0000000140)=@llc={0x1a, 0x33a, 0x7, 0x80, 0x0, 0x4, @remote={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xbb}}, 0x80) r2 = syz_init_net_socket$nfc_llcp(0x27, 0x1, 0x1) setsockopt$nfc_llcp_NFC_LLCP_MIUX(r2, 0x118, 0x15, &(0x7f0000000000), 0x4) r3 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/cuse\x00', 0x103002, 0x0) futimesat(r3, &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)={{0x0, 0x7530}}) r4 = syz_open_dev$vcsa(&(0x7f00000001c0)='/dev/vcsa#\x00', 0x2, 0x0) sendto$inet6(r4, &(0x7f0000000bc0), 0x0, 0x20000000, &(0x7f0000000c40)={0xa, 0x4e20, 0x0, @dev={0xfe, 0x80, [], 0x19}, 0x1f}, 0x1c) accept$alg(r0, 0x0, 0x0) sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f0000000000)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x8}, 0xb4fcd35419244434, &(0x7f00004ca000)={&(0x7f0000000300)=ANY=[], 0x1a1}, 0x1}, 0x0) syz_fuseblk_mount(&(0x7f0000001380)='./file0\x00', &(0x7f00000013c0)='./file0\x00', 0xf000, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0xb21, 0x0) socket(0x1e, 0x3, 0x0) socket(0x1e, 0x0, 0x0) ptrace$PTRACE_SECCOMP_GET_FILTER(0x420c, 0x0, 0x0, &(0x7f0000000380)=""/113) sched_yield() ioctl$TUNGETIFF(r4, 0x800454d2, &(0x7f0000000140)) ioctl$KIOCSOUND(r4, 0x4b2f, 0xfffffffffffffb74) perf_event_open(&(0x7f000025c000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x20, 0x9b}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000447000)='./file0\x00', &(0x7f00000e1000)='msdos\x00', 0x0, &(0x7f000097bfff)) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000580)='./cgroup/syz0\x00', 0x1ff) [ 329.082097] binder: 31660:31665 ioctl c0306201 20000340 returned -22 [ 329.085377] mount_fs+0x66/0x2d0 [ 329.085394] vfs_kern_mount.part.26+0xc6/0x4a0 [ 329.085406] ? may_umount+0xa0/0xa0 [ 329.085418] ? _raw_read_unlock+0x22/0x30 [ 329.085427] ? __get_fs_type+0x8a/0xc0 [ 329.085441] do_mount+0xea4/0x2bb0 [ 329.085456] ? copy_mount_string+0x40/0x40 [ 329.085467] ? trace_hardirqs_on_caller+0x421/0x5c0 [ 329.085478] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 329.241827] binder: 31673:31674 unknown command 20 [ 329.242451] ? retint_kernel+0x10/0x10 2018/03/31 09:15:36 executing program 6: perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f000031f000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) prctl$void(0x0) getpid() r0 = syz_open_dev$vcsn(&(0x7f0000000040)='/dev/vcs#\x00', 0x0, 0x20000) ioctl$GIO_CMAP(r0, 0x4b70, &(0x7f0000000080)) r1 = socket$alg(0x26, 0x5, 0x0) ioctl$sock_SIOCGIFBR(0xffffffffffffffff, 0x8940, &(0x7f0000000040)=@get={0x1, &(0x7f0000000400)=""/242, 0x100000000}) bind$alg(r1, &(0x7f0000000080)={0x26, 'aead\x00', 0x0, 0x0, 'generic-gcm-aesni\x00'}, 0x58) syz_open_dev$sndmidi(&(0x7f0000000100)='/dev/snd/midiC#D#\x00', 0xfd, 0x0) bind(0xffffffffffffffff, &(0x7f0000000140)=@llc={0x1a, 0x33a, 0x7, 0x80, 0x0, 0x4, @remote={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xbb}}, 0x80) r2 = syz_init_net_socket$nfc_llcp(0x27, 0x1, 0x1) setsockopt$nfc_llcp_NFC_LLCP_MIUX(r2, 0x118, 0x15, &(0x7f0000000000), 0x4) r3 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/cuse\x00', 0x103002, 0x0) futimesat(r3, &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)={{0x0, 0x7530}}) r4 = syz_open_dev$vcsa(&(0x7f00000001c0)='/dev/vcsa#\x00', 0x2, 0x0) sendto$inet6(r4, &(0x7f0000000bc0), 0x0, 0x20000000, &(0x7f0000000c40)={0xa, 0x4e20, 0x0, @dev={0xfe, 0x80, [], 0x19}, 0x1f}, 0x1c) accept$alg(r0, 0x0, 0x0) sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f0000000000)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x8}, 0xb4fcd35419244434, &(0x7f00004ca000)={&(0x7f0000000300)=ANY=[], 0x1a1}, 0x1}, 0x0) syz_fuseblk_mount(&(0x7f0000001380)='./file0\x00', &(0x7f00000013c0)='./file0\x00', 0xf000, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0xb21, 0x0) socket(0x1e, 0x3, 0x0) socket(0x1e, 0x0, 0x0) ptrace$PTRACE_SECCOMP_GET_FILTER(0x420c, 0x0, 0x0, &(0x7f0000000380)=""/113) sched_yield() ioctl$TUNGETIFF(r4, 0x800454d2, &(0x7f0000000140)) ioctl$KIOCSOUND(r4, 0x4b2f, 0xfffffffffffffb74) perf_event_open(&(0x7f000025c000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x20, 0x9b}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000447000)='./file0\x00', &(0x7f00000e1000)='msdos\x00', 0x0, &(0x7f000097bfff)) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000580)='./cgroup/syz0\x00', 0x1ff) [ 329.242469] ? copy_mount_options+0x18b/0x2e0 [ 329.242479] ? copy_mount_options+0x193/0x2e0 [ 329.242489] ? copy_mount_options+0x1f7/0x2e0 [ 329.242502] SyS_mount+0xab/0x120 [ 329.242510] ? copy_mnt_ns+0xb30/0xb30 [ 329.242525] do_syscall_64+0x281/0x940 [ 329.255111] binder: 31673:31674 ioctl c0306201 20000340 returned -22 [ 329.255790] ? vmalloc_sync_all+0x30/0x30 [ 329.255804] ? _raw_spin_unlock_irq+0x27/0x70 [ 329.255815] ? finish_task_switch+0x1c1/0x7e0 [ 329.255827] ? syscall_return_slowpath+0x550/0x550 [ 329.255838] ? syscall_return_slowpath+0x2ac/0x550 2018/03/31 09:15:36 executing program 6: perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f000031f000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) prctl$void(0x0) getpid() r0 = syz_open_dev$vcsn(&(0x7f0000000040)='/dev/vcs#\x00', 0x0, 0x20000) ioctl$GIO_CMAP(r0, 0x4b70, &(0x7f0000000080)) r1 = socket$alg(0x26, 0x5, 0x0) ioctl$sock_SIOCGIFBR(0xffffffffffffffff, 0x8940, &(0x7f0000000040)=@get={0x1, &(0x7f0000000400)=""/242, 0x100000000}) bind$alg(r1, &(0x7f0000000080)={0x26, 'aead\x00', 0x0, 0x0, 'generic-gcm-aesni\x00'}, 0x58) syz_open_dev$sndmidi(&(0x7f0000000100)='/dev/snd/midiC#D#\x00', 0xfd, 0x0) bind(0xffffffffffffffff, &(0x7f0000000140)=@llc={0x1a, 0x33a, 0x7, 0x80, 0x0, 0x4, @remote={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xbb}}, 0x80) r2 = syz_init_net_socket$nfc_llcp(0x27, 0x1, 0x1) setsockopt$nfc_llcp_NFC_LLCP_MIUX(r2, 0x118, 0x15, &(0x7f0000000000), 0x4) r3 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/cuse\x00', 0x103002, 0x0) futimesat(r3, &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)={{0x0, 0x7530}}) r4 = syz_open_dev$vcsa(&(0x7f00000001c0)='/dev/vcsa#\x00', 0x2, 0x0) sendto$inet6(r4, &(0x7f0000000bc0), 0x0, 0x20000000, &(0x7f0000000c40)={0xa, 0x4e20, 0x0, @dev={0xfe, 0x80, [], 0x19}, 0x1f}, 0x1c) accept$alg(r0, 0x0, 0x0) sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f0000000000)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x8}, 0xb4fcd35419244434, &(0x7f00004ca000)={&(0x7f0000000300)=ANY=[], 0x1a1}, 0x1}, 0x0) syz_fuseblk_mount(&(0x7f0000001380)='./file0\x00', &(0x7f00000013c0)='./file0\x00', 0xf000, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0xb21, 0x0) socket(0x1e, 0x3, 0x0) socket(0x1e, 0x0, 0x0) ptrace$PTRACE_SECCOMP_GET_FILTER(0x420c, 0x0, 0x0, &(0x7f0000000380)=""/113) sched_yield() ioctl$TUNGETIFF(r4, 0x800454d2, &(0x7f0000000140)) ioctl$KIOCSOUND(r4, 0x4b2f, 0xfffffffffffffb74) perf_event_open(&(0x7f000025c000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x20, 0x9b}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000447000)='./file0\x00', &(0x7f00000e1000)='msdos\x00', 0x0, &(0x7f000097bfff)) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000580)='./cgroup/syz0\x00', 0x1ff) [ 329.255848] ? prepare_exit_to_usermode+0x350/0x350 [ 329.255859] ? entry_SYSCALL_64_after_hwframe+0x52/0xb7 [ 329.255874] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 329.287513] binder: 31673:31677 unknown command 26 [ 329.291081] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 329.291091] RIP: 0033:0x454e79 [ 329.291100] RSP: 002b:00007f37fba8ec68 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 329.291111] RAX: ffffffffffffffda RBX: 00007f37fba8f6d4 RCX: 0000000000454e79 [ 329.291117] RDX: 00000000200e1000 RSI: 0000000020447000 RDI: 0000000020000000 [ 329.291123] RBP: 000000000072bea0 R08: 000000002097bfff R09: 0000000000000000 [ 329.291128] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000019 [ 329.291135] R13: 00000000000003fa R14: 00000000006f8010 R15: 0000000000000015 [ 329.302286] binder: 31673:31677 ioctl c0306201 20000340 returned -22 [ 329.345769] print_req_error: I/O error, dev loop199, sector 0 [ 329.391296] FAT-fs (loop199): unable to read boot sector [ 329.399102] print_req_error: I/O error, dev loop199, sector 0 [ 329.406945] FAT-fs (loop199): unable to read boot sector [ 329.415699] FAT-fs (loop199): unable to read boot sector [ 329.441068] FAT-fs (loop199): unable to read boot sector 2018/03/31 09:15:36 executing program 4: perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f000031f000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) prctl$void(0x0) getpid() r0 = syz_open_dev$vcsn(&(0x7f0000000040)='/dev/vcs#\x00', 0x0, 0x20000) ioctl$GIO_CMAP(r0, 0x4b70, &(0x7f0000000080)) r1 = socket$alg(0x26, 0x5, 0x0) ioctl$sock_SIOCGIFBR(0xffffffffffffffff, 0x8940, &(0x7f0000000040)=@get={0x1, &(0x7f0000000400)=""/242, 0x100000000}) bind$alg(r1, &(0x7f0000000080)={0x26, 'aead\x00', 0x0, 0x0, 'generic-gcm-aesni\x00'}, 0x58) syz_open_dev$sndmidi(&(0x7f0000000100)='/dev/snd/midiC#D#\x00', 0xfd, 0x0) bind(0xffffffffffffffff, &(0x7f0000000140)=@llc={0x1a, 0x33a, 0x7, 0x80, 0x0, 0x4, @remote={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xbb}}, 0x80) r2 = syz_init_net_socket$nfc_llcp(0x27, 0x1, 0x1) setsockopt$nfc_llcp_NFC_LLCP_MIUX(r2, 0x118, 0x15, &(0x7f0000000000), 0x4) r3 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/cuse\x00', 0x103002, 0x0) futimesat(r3, &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)={{0x0, 0x7530}}) r4 = syz_open_dev$vcsa(&(0x7f00000001c0)='/dev/vcsa#\x00', 0x2, 0x0) sendto$inet6(r4, &(0x7f0000000bc0), 0x0, 0x20000000, &(0x7f0000000c40)={0xa, 0x4e20, 0x0, @dev={0xfe, 0x80, [], 0x19}, 0x1f}, 0x1c) accept$alg(r0, 0x0, 0x0) sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f0000000000)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x8}, 0xb4fcd35419244434, &(0x7f00004ca000)={&(0x7f0000000300)=ANY=[], 0x1a1}, 0x1}, 0x0) syz_fuseblk_mount(&(0x7f0000001380)='./file0\x00', &(0x7f00000013c0)='./file0\x00', 0xf000, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0xb21, 0x0) socket(0x1e, 0x3, 0x0) socket(0x1e, 0x0, 0x0) ptrace$PTRACE_SECCOMP_GET_FILTER(0x420c, 0x0, 0x0, &(0x7f0000000380)=""/113) sched_yield() ioctl$TUNGETIFF(r4, 0x800454d2, &(0x7f0000000140)) ioctl$KIOCSOUND(r4, 0x4b2f, 0xfffffffffffffb74) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x20, 0x9b}, 0x0, 0x0, 0xffffffffffffffff, 0x0) memfd_create(&(0x7f0000000200)='h\x00', 0x2) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000447000)='./file0\x00', &(0x7f00000e1000)='msdos\x00', 0x0, &(0x7f000097bfff)) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000580)='./cgroup/syz0\x00', 0x1ff) 2018/03/31 09:15:36 executing program 0: perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f000031f000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) prctl$void(0x0) r0 = syz_open_dev$vcsn(&(0x7f0000000040)='/dev/vcs#\x00', 0x0, 0x20000) socket$alg(0x26, 0x5, 0x0) ioctl$sock_SIOCGIFBR(0xffffffffffffffff, 0x8940, &(0x7f0000000040)=@get={0x1, &(0x7f0000000400)=""/242, 0x100000000}) bind$alg(0xffffffffffffffff, &(0x7f0000000080)={0x26, 'aead\x00', 0x0, 0x0, 'generic-gcm-aesni\x00'}, 0x58) syz_open_dev$sndmidi(&(0x7f0000000100)='/dev/snd/midiC#D#\x00', 0xfd, 0x0) bind(0xffffffffffffffff, &(0x7f0000000140)=@llc={0x1a, 0x33a, 0x7, 0x80, 0x0, 0x4, @remote={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xbb}}, 0x80) r1 = syz_init_net_socket$nfc_llcp(0x27, 0x1, 0x1) setsockopt$nfc_llcp_NFC_LLCP_MIUX(r1, 0x118, 0x15, &(0x7f0000000000), 0x4) r2 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/cuse\x00', 0x103002, 0x0) futimesat(r2, &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)={{0x0, 0x7530}}) r3 = syz_open_dev$vcsa(&(0x7f00000001c0)='/dev/vcsa#\x00', 0x2, 0x0) seccomp(0x8c2bfc39723e142c, 0x1, &(0x7f0000000240)={0x2, &(0x7f0000000200)=[{0x7ff, 0xe6a6, 0xffffffffffffffe1, 0x8}, {0xe3, 0x0, 0x2, 0x5}]}) sendto$inet6(r3, &(0x7f0000000bc0)="36251e313e0743fc195a1a198a14434e8a0a00b3f452a3b5644e336ec712a16310c9aecc4e3097bc666a8882128a73c368ce731e9fbf3fe18fa52d00c34ac2e57c1c4569cfbd6a621c6dfbc032121aed", 0x50, 0x20000000, &(0x7f0000000c40)={0xa, 0x4e20, 0x6, @dev={0xfe, 0x80, [], 0x19}, 0x1f}, 0x1c) accept$alg(r0, 0x0, 0x0) sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f0000000000)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x8}, 0xb4fcd35419244434, &(0x7f00004ca000)={&(0x7f0000000300)=ANY=[], 0x1a1}, 0x1}, 0x0) syz_fuseblk_mount(&(0x7f0000001380)='./file0\x00', &(0x7f00000013c0)='./file0\x00', 0xf000, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0xb21, 0x0) socket(0x1e, 0x3, 0x0) socket(0x1e, 0x0, 0x0) ptrace$PTRACE_SECCOMP_GET_FILTER(0x420c, 0x0, 0x0, &(0x7f0000000380)=""/113) sched_yield() ioctl$TUNGETIFF(r3, 0x800454d2, &(0x7f0000000140)) ioctl$KIOCSOUND(r3, 0x4b2f, 0xfffffffffffffb74) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x20, 0x9b}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000447000)='./file0\x00', &(0x7f00000e1000)='msdos\x00', 0x0, &(0x7f000097bfff)) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000580)='./cgroup/syz0\x00', 0x1ff) 2018/03/31 09:15:36 executing program 5: perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f000031f000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) prctl$void(0x0) getpid() r0 = syz_open_dev$vcsn(&(0x7f0000000040)='/dev/vcs#\x00', 0x0, 0x20000) ioctl$GIO_CMAP(r0, 0x4b70, &(0x7f0000000080)) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000080)={0x26, 'aead\x00', 0x0, 0x0, 'generic-gcm-aesni\x00'}, 0x58) syz_open_dev$sndmidi(&(0x7f0000000100)='/dev/snd/midiC#D#\x00', 0xfd, 0x0) bind(0xffffffffffffffff, &(0x7f0000000140)=@llc={0x1a, 0x33a, 0x7, 0x80, 0x5, 0x4, @remote={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xbb}}, 0x80) r2 = syz_init_net_socket$nfc_llcp(0x27, 0x1, 0x1) setsockopt$nfc_llcp_NFC_LLCP_MIUX(r2, 0x118, 0x15, &(0x7f0000000000), 0xfffffea9) r3 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/cuse\x00', 0x103002, 0x0) futimesat(r3, &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)={{0x0, 0x7530}}) r4 = syz_open_dev$vcsa(&(0x7f00000001c0)='/dev/vcsa#\x00', 0x2, 0x4020ff) sendto$inet6(0xffffffffffffffff, &(0x7f0000000bc0)="36251e313e0743fc195a1a198a14434e8a0a00b3f452a3b5644e336ec712a16310c9aecc4e3097bc666a8882128a73c368ce731e9fbf3fe18fa52d", 0x3b, 0x20000000, &(0x7f0000000c40)={0xa, 0x4e20, 0x6, @dev={0xfe, 0x80, [], 0x19}, 0x1f}, 0x1c) accept$alg(r0, 0x0, 0x0) sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f0000000000)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x8}, 0xb4fcd35419244434, &(0x7f00004ca000)={&(0x7f0000000300)=ANY=[], 0x1a1}, 0x1}, 0x0) syz_fuseblk_mount(&(0x7f0000001380)='./file0\x00', &(0x7f00000013c0)='./file0\x00', 0xf000, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0xb21, 0x0) socket(0x1e, 0x3, 0x0) socket(0x1e, 0x0, 0x0) ptrace$PTRACE_SECCOMP_GET_FILTER(0x420c, 0x0, 0x0, &(0x7f0000000380)=""/113) sched_yield() ioctl$TUNGETIFF(r4, 0x800454d2, &(0x7f0000000140)) ioctl$KIOCSOUND(r4, 0x4b2f, 0xfffffffffffffb74) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x20, 0x9b}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000447000)='./file0\x00', &(0x7f00000e1000)='msdos\x00', 0x0, &(0x7f000097bfff)) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000580)='./cgroup/syz0\x00', 0x1ff) syz_open_dev$audion(&(0x7f0000000280)='/dev/audio#\x00', 0x7be, 0x0) 2018/03/31 09:15:36 executing program 6: perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f000031f000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) prctl$void(0x0) getpid() r0 = syz_open_dev$vcsn(&(0x7f0000000040)='/dev/vcs#\x00', 0x0, 0x20000) ioctl$GIO_CMAP(r0, 0x4b70, &(0x7f0000000080)) r1 = socket$alg(0x26, 0x5, 0x0) ioctl$sock_SIOCGIFBR(0xffffffffffffffff, 0x8940, &(0x7f0000000040)=@get={0x1, &(0x7f0000000400)=""/242, 0x100000000}) bind$alg(r1, &(0x7f0000000080)={0x26, 'aead\x00', 0x0, 0x0, 'generic-gcm-aesni\x00'}, 0x58) syz_open_dev$sndmidi(&(0x7f0000000100)='/dev/snd/midiC#D#\x00', 0xfd, 0x0) bind(0xffffffffffffffff, &(0x7f0000000140)=@llc={0x1a, 0x33a, 0x7, 0x80, 0x0, 0x4, @remote={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xbb}}, 0x80) r2 = syz_init_net_socket$nfc_llcp(0x27, 0x1, 0x1) setsockopt$nfc_llcp_NFC_LLCP_MIUX(r2, 0x118, 0x15, &(0x7f0000000000), 0x4) r3 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/cuse\x00', 0x103002, 0x0) futimesat(r3, &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)={{0x0, 0x7530}}) r4 = syz_open_dev$vcsa(&(0x7f00000001c0)='/dev/vcsa#\x00', 0x2, 0x0) sendto$inet6(r4, &(0x7f0000000bc0), 0x0, 0x20000000, &(0x7f0000000c40)={0xa, 0x4e20, 0x0, @dev={0xfe, 0x80, [], 0x19}, 0x1f}, 0x1c) accept$alg(r0, 0x0, 0x0) sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f0000000000)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x8}, 0xb4fcd35419244434, &(0x7f00004ca000)={&(0x7f0000000300)=ANY=[], 0x1a1}, 0x1}, 0x0) syz_fuseblk_mount(&(0x7f0000001380)='./file0\x00', &(0x7f00000013c0)='./file0\x00', 0xf000, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0xb21, 0x0) socket(0x1e, 0x3, 0x0) socket(0x1e, 0x0, 0x0) ptrace$PTRACE_SECCOMP_GET_FILTER(0x420c, 0x0, 0x0, &(0x7f0000000380)=""/113) sched_yield() ioctl$TUNGETIFF(r4, 0x800454d2, &(0x7f0000000140)) ioctl$KIOCSOUND(r4, 0x4b2f, 0xfffffffffffffb74) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x9b}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000447000)='./file0\x00', &(0x7f00000e1000)='msdos\x00', 0x0, &(0x7f000097bfff)) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000580)='./cgroup/syz0\x00', 0x1ff) 2018/03/31 09:15:36 executing program 7 (fault-call:24 fault-nth:22): perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f000031f000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getpid() r0 = syz_open_dev$vcsn(&(0x7f0000000040)='/dev/vcs#\x00', 0x0, 0x20000) ioctl$GIO_CMAP(r0, 0x4b70, &(0x7f0000000080)) r1 = socket$alg(0x26, 0x5, 0x0) ioctl$sock_SIOCGIFBR(r1, 0x8940, &(0x7f0000000040)=@get={0x1, &(0x7f0000000400)=""/242, 0x100000000}) bind$alg(r1, &(0x7f0000000080)={0x26, 'aead\x00', 0x0, 0x0, 'generic-gcm-aesni\x00'}, 0x58) syz_open_dev$sndmidi(&(0x7f0000000100)='/dev/snd/midiC#D#\x00', 0xfd, 0x0) bind(0xffffffffffffffff, &(0x7f0000000140)=@llc={0x1a, 0x33a, 0x7, 0x80, 0x5, 0x4, @remote={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xbb}}, 0x80) r2 = syz_init_net_socket$nfc_llcp(0x27, 0x1, 0x1) setsockopt$nfc_llcp_NFC_LLCP_MIUX(r2, 0x118, 0x15, &(0x7f0000000000), 0x4) r3 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/cuse\x00', 0x103002, 0x0) futimesat(r3, &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)={{0x0, 0x7530}}) r4 = syz_open_dev$vcsa(&(0x7f00000001c0)='/dev/vcsa#\x00', 0x2, 0x4020ff) sendto$inet6(r4, &(0x7f0000000bc0)="36251e313e0743fc195a1a198a14434e8a0a00b3f452a3b5644e336ec712a16310c9aecc4e3097bc666a8882128a73c368ce731e9fbf3fe18fa52d00", 0x3c, 0x20000000, &(0x7f0000000c40)={0xa, 0x0, 0x6, @dev={0xfe, 0x80, [], 0x19}, 0x1f}, 0x1c) accept$alg(r0, 0x0, 0x0) sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f0000000000)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x8}, 0xb4fcd35419244434, &(0x7f00004ca000)={&(0x7f0000000300)=ANY=[], 0x1a1}, 0x1}, 0x0) syz_fuseblk_mount(&(0x7f0000001380)='./file0\x00', &(0x7f00000013c0)='./file0\x00', 0xf000, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0xb21, 0x0) socket(0x1e, 0x3, 0x0) socket(0x1e, 0x0, 0x0) ptrace$PTRACE_SECCOMP_GET_FILTER(0x420c, 0x0, 0x0, &(0x7f0000000380)=""/113) sched_yield() ioctl$TUNGETIFF(r4, 0x800454d2, &(0x7f0000000140)) ioctl$KIOCSOUND(r4, 0x4b2f, 0xfffffffffffffb74) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000447000)='./file0\x00', &(0x7f00000e1000)='msdos\x00', 0x0, &(0x7f000097bfff)) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000580)='./cgroup/syz0\x00', 0x1ff) syz_open_dev$audion(&(0x7f0000000280)='/dev/audio#\x00', 0x7be, 0x0) 2018/03/31 09:15:36 executing program 1: r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f000031f000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) prctl$void(0x0) getpid() r1 = syz_open_dev$vcsn(&(0x7f0000000040)='/dev/vcs#\x00', 0x400, 0x20000) r2 = socket$alg(0x26, 0x5, 0x0) ioctl$sock_SIOCGIFBR(r2, 0x8940, &(0x7f0000000040)=@get={0x1, &(0x7f0000000400)=""/242, 0x100000000}) bind$alg(r2, &(0x7f0000000080)={0x26, 'aead\x00', 0x0, 0x0, 'generic-gcm-aesni\x00'}, 0x58) r3 = syz_open_dev$sndmidi(&(0x7f0000000100)='/dev/snd/midiC#D#\x00', 0xfd, 0x0) bind(r3, &(0x7f0000000140)=@llc={0x1a, 0x33a, 0x7, 0x80, 0x0, 0x4, @remote={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xbb}}, 0x80) r4 = syz_init_net_socket$nfc_llcp(0x27, 0x1, 0x1) setsockopt$nfc_llcp_NFC_LLCP_MIUX(r4, 0x118, 0x15, &(0x7f0000000000), 0x4) r5 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/cuse\x00', 0x103002, 0x0) dup3(r1, r0, 0x80000) futimesat(r5, &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)={{0x0, 0x7530}}) r6 = syz_open_dev$vcsa(&(0x7f00000001c0)='/dev/vcsa#\x00', 0x2, 0x4020ff) sendto$inet6(r6, &(0x7f0000000bc0), 0x0, 0x20000000, &(0x7f0000000c40)={0xa, 0x4e20, 0x6, @dev={0xfe, 0x80, [], 0x19}, 0x1f}, 0x1c) sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f0000000000)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x8}, 0xb4fcd35419244434, &(0x7f00004ca000)={&(0x7f0000000300)=ANY=[], 0x1a1}, 0x1}, 0x0) syz_fuseblk_mount(&(0x7f0000001380)='./file0\x00', &(0x7f00000013c0)='./file0\x00', 0xf000, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0xb21, 0x0) socket(0x1e, 0x3, 0x0) ptrace$PTRACE_SECCOMP_GET_FILTER(0x420c, 0x0, 0x0, &(0x7f0000000380)=""/113) sched_yield() ioctl$TUNGETIFF(r6, 0x800454d2, &(0x7f0000000140)) ioctl$KIOCSOUND(r6, 0x4b2f, 0xfffffffffffffb74) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x20, 0x9b}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000447000)='./file0\x00', &(0x7f00000e1000)='msdos\x00', 0x0, &(0x7f000097bfff)) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000580)='./cgroup/syz0\x00', 0x1ff) syz_open_dev$audion(&(0x7f0000000280)='/dev/audio#\x00', 0x7be, 0x0) fcntl$getown(0xffffffffffffffff, 0x9) 2018/03/31 09:15:36 executing program 2: syz_open_dev$loop(&(0x7f00000003c0)='/dev/loop#\x00', 0x8, 0x0) r0 = syz_open_dev$sndseq(&(0x7f00000001c0)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r0, 0x4040534e, &(0x7f000019ffe9)={0xc1}) ioctl$sock_ipx_SIOCAIPXPRISLT(0xffffffffffffffff, 0x89e1, &(0x7f0000000280)=0x3f) ioctl$sock_inet_SIOCRTMSG(0xffffffffffffffff, 0x890d, &(0x7f0000000200)={0x80, {0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x19}}, {0x2, 0x4e21, @local={0xac, 0x14, 0x14, 0xaa}}, {0x2, 0x4e23}, 0x0, 0x7, 0x1, 0x0, 0x9, 0x0, 0x0, 0x0, 0xfffffffffffffff7}) getsockopt$inet_sctp_SCTP_PRIMARY_ADDR(0xffffffffffffffff, 0x84, 0x6, &(0x7f0000000ac0)={0x0, @in={{0x2, 0x4e20, @loopback=0x7f000001}}}, &(0x7f00000002c0)=0x84) setsockopt$inet_sctp_SCTP_ENABLE_STREAM_RESET(0xffffffffffffffff, 0x84, 0x76, &(0x7f0000000300)={r1, 0x1c9}, 0x8) r2 = syz_open_dev$sg(&(0x7f0000000700)='/dev/sg#\x00', 0xfffffffffffffff7, 0x800) clone(0x2000c100, &(0x7f0000000800)="97bb77038add5df9e9d4f9783b82c55fe59e5c0acdbcfc9bcf92ac0e1f1f3c1959c1d25dfabf3849336c7c85be174d7765b47e113632aea54b87e4d3f2c1db09e6aa4040b43d17308fb7e62e808067da2fff3cfd8e4c038c814bbfc6bc49d8ebc8671d8297e2d34dc61f2d194d2dbb8f59b4c853e0714d3d4bb29d1243fac01c86c8c4dd38daedab3c6ad73a72d3f6dd2684aa82e5285eb82452c9848b7beb8bc513ba8c8973cad0bd5926604846b7f5d0397b", &(0x7f00000008c0), &(0x7f0000000900), &(0x7f0000000940)="ed6c04412e782fe395f084741e3d9fe469aebde09acc8f8d8d84d1f00f5573b09acba487077ebb904cb1f3fed55f59d677ce24bbd2a7506df8e1e0d0fc709cb8c9f4ab2aeeeebc5ef879742c1f7628f1862c88b5b0da89acbf43ef12e4839405b6a3430d296fea06d2f3a8356c57ec991e") ioctl$SNDRV_SEQ_IOCTL_SUBSCRIBE_PORT(r0, 0x40505330, &(0x7f0000ec6fb0)={{}, {0x80}}) getsockopt$netrom_NETROM_T1(0xffffffffffffffff, 0x103, 0x1, &(0x7f0000000000), &(0x7f0000000380)=0x4) syz_open_dev$adsp(&(0x7f0000000600)='/dev/adsp#\x00', 0x100000000, 0x80000) rt_sigprocmask(0x3d738072cd0f41ac, &(0x7f0000000cc0)={0x7}, &(0x7f0000000d00), 0x8) clone(0x40000000, &(0x7f0000000500)="67cdd9994c47c31d325b069924a7064c157c2ec0b5b5dca2feeb7dabef3b7af0d02d559e293faa759f2b3cb12aea360c2d", &(0x7f0000000580), &(0x7f00000005c0), &(0x7f0000000a00)="29859fdda9a119e54a27f9ec76b4d63a16dc5bbdd38c2fda0e5f4d8f830cd987ec7d3ffc66cf3db8820968fd89a1fba8fe6352a29a27f3b000bcdf238f2c04b358fc831025180e0be313da41de6366c94a1a0f86aaffdf2c039111b55275c054e14819a827fe809225249a01944263a2aec15f64e752e35892b1b8e7ef1e0e9115") ioctl$SNDRV_SEQ_IOCTL_DELETE_PORT(r0, 0x40a85321, &(0x7f0000000b80)={{0x4, 0x8}, 'port0\x00', 0x80, 0x0, 0x10000, 0x6, 0x2, 0x80, 0x8, 0x0, 0x0, 0x3dec00}) getsockopt$inet_sctp_SCTP_SOCKOPT_PEELOFF(r2, 0x84, 0x66, &(0x7f0000000c40)={r1, 0x6}, &(0x7f0000000c80)=0x8) clock_settime(0x7, &(0x7f0000000740)={0x77359400}) ioctl$SNDRV_SEQ_IOCTL_CLIENT_ID(r0, 0x80045301, &(0x7f0000000340)) r3 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer2\x00', 0x0, 0x0) openat$sequencer2(0xffffffffffffff9c, &(0x7f00000006c0)='/dev/sequencer2\x00', 0x222081, 0x0) ioctl$RNDADDENTROPY(0xffffffffffffffff, 0x40085203, &(0x7f0000000100)=ANY=[@ANYPTR=&(0x7f0000000680)=ANY=[@ANYPTR64=&(0x7f0000000640)=ANY=[@ANYPTR, @ANYPTR]]]) setsockopt$inet_sctp_SCTP_DEFAULT_SEND_PARAM(r3, 0x84, 0xa, &(0x7f0000000140)={0x5, 0x100000001, 0x0, 0x8, 0x0, 0x7, 0x401, 0x1f, r1}, 0x20) 2018/03/31 09:15:36 executing program 3: r0 = syz_open_dev$random(&(0x7f00000001c0)='/dev/random\x00', 0x0, 0x800) r1 = syz_open_dev$loop(&(0x7f0000308000)='/dev/loop#\x00', 0x0, 0x0) ioctl$LOOP_SET_STATUS(r1, 0xc0481273, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "3900ea631d00000000020000010000009f00000023f7b7d65f90b0e6330ee739b319d8f6aa6bd58d1443474482e85040fb4947ebb55bd19f335b5bffff0001f3", "cfa430745a540dc1c149b7b81579f6a41c51f7d51933223e82ab867dac761faf"}) write(0xffffffffffffffff, &(0x7f0000000480), 0x2b4) setsockopt$inet_sctp6_SCTP_RECVNXTINFO(0xffffffffffffffff, 0x84, 0x21, &(0x7f00000003c0)=0x200, 0x4) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f00000000c0)=0x0) getsockopt$netrom_NETROM_T4(0xffffffffffffffff, 0x103, 0x6, &(0x7f0000000300)=0x8, &(0x7f0000000340)=0x4) r3 = getpid() sched_setparam(r3, &(0x7f0000000400)) syz_open_dev$loop(&(0x7f0000ca9ff5)='/dev/loop#\x00', 0x0, 0x82) r4 = memfd_create(&(0x7f0000614000)="74086e750000000000000000008c00", 0x1) pwritev(r4, &(0x7f0000f50f90)=[{&(0x7f0000000040)="aa", 0x1}], 0x1, 0x0) fcntl$getownex(r1, 0x10, &(0x7f0000000240)={0x0, 0x0}) r6 = syz_open_procfs(r5, &(0x7f0000000280)='stat\x00') epoll_ctl$EPOLL_CTL_MOD(r4, 0x3, r0, &(0x7f00000002c0)={0x20000010}) accept4$inet6(r4, &(0x7f0000000100)={0x0, 0x0, 0x0, @mcast1}, &(0x7f0000000140)=0x1c, 0x7fd) getsockopt$inet_IP_IPSEC_POLICY(r4, 0x0, 0x10, &(0x7f0000000940)={{{@in6=@local, @in6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@loopback}, 0x0, @in=@local}}, &(0x7f0000000780)=0xe8) getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f00000007c0)={0x0, 0x0, 0x0}, &(0x7f0000000540)=0xc) fchown(r4, r7, r8) r9 = syz_open_dev$binder(&(0x7f0000000100)='/dev/binder#\x00', 0xffffffffffffffff, 0x806) ioctl$BINDER_SET_CONTEXT_MGR(r6, 0x40046207, 0x0) mmap$binder(&(0x7f000000c000/0x2000)=nil, 0x2000, 0x0, 0x12, r9, 0x0) ioctl$BINDER_WRITE_READ(r9, 0xc0306201, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000), 0x0, 0x0, &(0x7f0000011f9d)}) getsockopt$inet_sctp6_SCTP_AUTO_ASCONF(0xffffffffffffffff, 0x84, 0x1e, &(0x7f0000000140), &(0x7f0000000180)=0x4) ioctl$BINDER_WRITE_READ(r9, 0xc0306201, &(0x7f0000000340)={0x8, 0x0, &(0x7f0000000440)=ANY=[@ANYRES64=r1], 0x0, 0x0, &(0x7f0000000240)}) write(0xffffffffffffffff, &(0x7f0000000300)="8be25f5790f664f32509e40d6f879d5add7e2d359c9a19afb750a2d25352875d187d4118c99a2d5c6db433c277cc7d345b87a34f1b417033d367cb0cfd6a25633f77aafb17e99c33cb65352c901ae75176f07bb0a4bb5ebff3d87e", 0x5b) r10 = ioctl$LOOP_CTL_GET_FREE(r4, 0x4c82) ioctl$LOOP_CTL_REMOVE(r6, 0x4c81, r10) openat$cgroup(0xffffffffffffff9c, &(0x7f0000000000)='syz0\x00', 0x200002, 0x0) sched_setaffinity(r2, 0x8, &(0x7f0000000200)=0x7) [ 329.552007] binder: 31686:31687 unknown command 20 [ 329.570197] binder: 31686:31687 ioctl c0306201 20000340 returned -22 [ 329.574231] FAULT_INJECTION: forcing a failure. [ 329.574231] name failslab, interval 1, probability 0, space 0, times 0 [ 329.588012] CPU: 0 PID: 31699 Comm: syz-executor7 Not tainted 4.16.0-rc7+ #8 [ 329.589779] IPVS: ftp: loaded support on port[0] = 21 [ 329.595609] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 329.595616] Call Trace: [ 329.595637] dump_stack+0x194/0x24d [ 329.595656] ? arch_local_irq_restore+0x53/0x53 [ 329.595688] should_fail+0x8c0/0xa40 [ 329.613432] binder: 31686:31701 unknown command 26 [ 329.616396] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 329.616412] ? kasan_kmalloc+0xad/0xe0 [ 329.616426] ? kmem_cache_alloc_trace+0x136/0x740 [ 329.623481] binder: 31686:31701 ioctl c0306201 20000340 returned -22 2018/03/31 09:15:36 executing program 3: r0 = syz_open_dev$random(&(0x7f00000001c0)='/dev/random\x00', 0x0, 0x800) r1 = syz_open_dev$loop(&(0x7f0000308000)='/dev/loop#\x00', 0x0, 0x0) ioctl$LOOP_SET_STATUS(r1, 0xc0481273, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "3900ea631d00000000020000010000009f00000023f7b7d65f90b0e6330ee739b319d8f6aa6bd58d1443474482e85040fb4947ebb55bd19f335b5bffff0001f3", "cfa430745a540dc1c149b7b81579f6a41c51f7d51933223e82ab867dac761faf"}) write(0xffffffffffffffff, &(0x7f00000001c0), 0x0) setsockopt$inet_sctp6_SCTP_RECVNXTINFO(0xffffffffffffffff, 0x84, 0x21, &(0x7f00000003c0)=0x200, 0x4) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f00000000c0)=0x0) getsockopt$netrom_NETROM_T4(0xffffffffffffffff, 0x103, 0x6, &(0x7f0000000300)=0x8, &(0x7f0000000340)=0x4) r3 = getpid() sched_setparam(r3, &(0x7f0000000400)) syz_open_dev$loop(&(0x7f0000ca9ff5)='/dev/loop#\x00', 0x0, 0x82) r4 = memfd_create(&(0x7f0000614000)="74086e750000000000000000008c00", 0x0) pwritev(r4, &(0x7f0000f50f90)=[{&(0x7f0000000040)="aa", 0x1}], 0x1, 0x0) fcntl$getownex(r1, 0x10, &(0x7f0000000240)={0x0, 0x0}) r6 = syz_open_procfs(r5, &(0x7f0000000280)='stat\x00') epoll_ctl$EPOLL_CTL_MOD(r4, 0x3, r0, &(0x7f00000002c0)={0x20000010}) accept4$inet6(r4, &(0x7f0000000100)={0x0, 0x0, 0x0, @mcast1}, &(0x7f0000000140)=0x1c, 0x7fd) getsockopt$inet_IP_IPSEC_POLICY(r4, 0x0, 0x10, &(0x7f0000000940)={{{@in6=@local, @in6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@loopback}, 0x0, @in=@local}}, &(0x7f0000000780)=0xe8) getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f00000007c0)={0x0, 0x0, 0x0}, &(0x7f0000000540)=0xc) fchown(r4, r7, r8) r9 = syz_open_dev$binder(&(0x7f0000000100)='/dev/binder#\x00', 0xffffffffffffffff, 0x806) ioctl$BINDER_SET_CONTEXT_MGR(r6, 0x40046207, 0x0) r10 = mmap$binder(&(0x7f000000c000/0x2000)=nil, 0x2000, 0x0, 0x12, r9, 0x0) ioctl$BINDER_WRITE_READ(r9, 0xc0306201, &(0x7f0000000040)={0xc, 0x0, &(0x7f0000000380)=[@free_buffer={0x40086303, r10}], 0x46, 0x0, &(0x7f0000000480)="78002f8229a15389055ac6058da4c0e3be261e85c97743d179910c9c0f3588a1508d4672da4537cc3a639ee616952970a1ccaaa2010c658ff24952ef7a67c968a6bfd60739f0"}) getsockopt$inet_sctp6_SCTP_AUTO_ASCONF(0xffffffffffffffff, 0x84, 0x1e, &(0x7f0000000140), &(0x7f0000000180)=0x4) ioctl$BINDER_WRITE_READ(r9, 0xc0306201, &(0x7f0000000340)={0x8, 0x0, &(0x7f0000000440)=ANY=[@ANYRES64=r1], 0x0, 0x0, &(0x7f0000000240)}) write(0xffffffffffffffff, &(0x7f0000000300)="8be25f5790f664f32509e40d6f879d5add7e2d359c9a19afb750a2d25352875d187d4118c99a2d5c6db433c277cc7d345b87a34f1b417033d367cb0cfd6a25633f77aafb17e99c33cb65352c901ae75176f07bb0a4bb5ebff3d87e", 0x5b) r11 = ioctl$LOOP_CTL_GET_FREE(r4, 0x4c82) ioctl$LOOP_CTL_REMOVE(r6, 0x4c81, r11) openat$cgroup(0xffffffffffffff9c, &(0x7f0000000000)='syz0\x00', 0x200002, 0x0) sched_setaffinity(r2, 0x8, &(0x7f0000000200)=0x7) 2018/03/31 09:15:36 executing program 6: perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f000031f000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) prctl$void(0x0) getpid() r0 = syz_open_dev$vcsn(&(0x7f0000000040)='/dev/vcs#\x00', 0x0, 0x20000) ioctl$GIO_CMAP(r0, 0x4b70, &(0x7f0000000080)) r1 = socket$alg(0x26, 0x5, 0x0) ioctl$sock_SIOCGIFBR(0xffffffffffffffff, 0x8940, &(0x7f0000000040)=@get={0x1, &(0x7f0000000400)=""/242, 0x100000000}) bind$alg(r1, &(0x7f0000000080)={0x26, 'aead\x00', 0x0, 0x0, 'generic-gcm-aesni\x00'}, 0x58) syz_open_dev$sndmidi(&(0x7f0000000100)='/dev/snd/midiC#D#\x00', 0xfd, 0x0) bind(0xffffffffffffffff, &(0x7f0000000140)=@llc={0x1a, 0x33a, 0x7, 0x80, 0x0, 0x4, @remote={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xbb}}, 0x80) r2 = syz_init_net_socket$nfc_llcp(0x27, 0x1, 0x1) setsockopt$nfc_llcp_NFC_LLCP_MIUX(r2, 0x118, 0x15, &(0x7f0000000000), 0x4) r3 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/cuse\x00', 0x103002, 0x0) futimesat(r3, &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)={{0x0, 0x7530}}) r4 = syz_open_dev$vcsa(&(0x7f00000001c0)='/dev/vcsa#\x00', 0x2, 0x0) sendto$inet6(r4, &(0x7f0000000bc0), 0x0, 0x20000000, &(0x7f0000000c40)={0xa, 0x4e20, 0x0, @dev={0xfe, 0x80, [], 0x19}, 0x1f}, 0x1c) accept$alg(r0, 0x0, 0x0) sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f0000000000)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x8}, 0xb4fcd35419244434, &(0x7f00004ca000)={&(0x7f0000000300)=ANY=[], 0x1a1}, 0x1}, 0x0) syz_fuseblk_mount(&(0x7f0000001380)='./file0\x00', &(0x7f00000013c0)='./file0\x00', 0xf000, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0xb21, 0x0) socket(0x1e, 0x3, 0x0) socket(0x1e, 0x0, 0x0) ptrace$PTRACE_SECCOMP_GET_FILTER(0x420c, 0x0, 0x0, &(0x7f0000000380)=""/113) sched_yield() ioctl$TUNGETIFF(r4, 0x800454d2, &(0x7f0000000140)) ioctl$KIOCSOUND(r4, 0x4b2f, 0xfffffffffffffb74) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x9b}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000447000)='./file0\x00', &(0x7f00000e1000)='msdos\x00', 0x0, &(0x7f000097bfff)) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000580)='./cgroup/syz0\x00', 0x1ff) [ 329.624776] ? __memcg_init_list_lru_node+0x169/0x270 [ 329.624789] ? sget_userns+0x691/0xe40 [ 329.624802] ? mount_fs+0x66/0x2d0 [ 329.624815] ? vfs_kern_mount.part.26+0xc6/0x4a0 [ 329.624824] ? do_mount+0xea4/0x2bb0 [ 329.624835] ? do_syscall_64+0x281/0x940 [ 329.624848] ? entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 329.680421] ? find_held_lock+0x35/0x1d0 [ 329.680437] ? __lock_is_held+0xb6/0x140 [ 329.680458] ? check_same_owner+0x320/0x320 2018/03/31 09:15:36 executing program 7 (fault-call:24 fault-nth:23): perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f000031f000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getpid() r0 = syz_open_dev$vcsn(&(0x7f0000000040)='/dev/vcs#\x00', 0x0, 0x20000) ioctl$GIO_CMAP(r0, 0x4b70, &(0x7f0000000080)) r1 = socket$alg(0x26, 0x5, 0x0) ioctl$sock_SIOCGIFBR(r1, 0x8940, &(0x7f0000000040)=@get={0x1, &(0x7f0000000400)=""/242, 0x100000000}) bind$alg(r1, &(0x7f0000000080)={0x26, 'aead\x00', 0x0, 0x0, 'generic-gcm-aesni\x00'}, 0x58) syz_open_dev$sndmidi(&(0x7f0000000100)='/dev/snd/midiC#D#\x00', 0xfd, 0x0) bind(0xffffffffffffffff, &(0x7f0000000140)=@llc={0x1a, 0x33a, 0x7, 0x80, 0x5, 0x4, @remote={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xbb}}, 0x80) r2 = syz_init_net_socket$nfc_llcp(0x27, 0x1, 0x1) setsockopt$nfc_llcp_NFC_LLCP_MIUX(r2, 0x118, 0x15, &(0x7f0000000000), 0x4) r3 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/cuse\x00', 0x103002, 0x0) futimesat(r3, &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)={{0x0, 0x7530}}) r4 = syz_open_dev$vcsa(&(0x7f00000001c0)='/dev/vcsa#\x00', 0x2, 0x4020ff) sendto$inet6(r4, &(0x7f0000000bc0)="36251e313e0743fc195a1a198a14434e8a0a00b3f452a3b5644e336ec712a16310c9aecc4e3097bc666a8882128a73c368ce731e9fbf3fe18fa52d00", 0x3c, 0x20000000, &(0x7f0000000c40)={0xa, 0x0, 0x6, @dev={0xfe, 0x80, [], 0x19}, 0x1f}, 0x1c) accept$alg(r0, 0x0, 0x0) sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f0000000000)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x8}, 0xb4fcd35419244434, &(0x7f00004ca000)={&(0x7f0000000300)=ANY=[], 0x1a1}, 0x1}, 0x0) syz_fuseblk_mount(&(0x7f0000001380)='./file0\x00', &(0x7f00000013c0)='./file0\x00', 0xf000, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0xb21, 0x0) socket(0x1e, 0x3, 0x0) socket(0x1e, 0x0, 0x0) ptrace$PTRACE_SECCOMP_GET_FILTER(0x420c, 0x0, 0x0, &(0x7f0000000380)=""/113) sched_yield() ioctl$TUNGETIFF(r4, 0x800454d2, &(0x7f0000000140)) ioctl$KIOCSOUND(r4, 0x4b2f, 0xfffffffffffffb74) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000447000)='./file0\x00', &(0x7f00000e1000)='msdos\x00', 0x0, &(0x7f000097bfff)) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000580)='./cgroup/syz0\x00', 0x1ff) syz_open_dev$audion(&(0x7f0000000280)='/dev/audio#\x00', 0x7be, 0x0) [ 329.680471] ? rcu_note_context_switch+0x710/0x710 [ 329.680491] should_failslab+0xec/0x120 [ 329.680500] kmem_cache_alloc_trace+0x4b/0x740 [ 329.680508] ? __kmalloc_node+0x33/0x70 [ 329.680515] ? __kmalloc_node+0x33/0x70 [ 329.680523] ? rcu_read_lock_sched_held+0x108/0x120 [ 329.680537] __memcg_init_list_lru_node+0x169/0x270 [ 329.680548] ? list_lru_add+0x7c0/0x7c0 [ 329.680556] ? __kmalloc_node+0x47/0x70 [ 329.680575] __list_lru_init+0x544/0x750 [ 329.680588] ? memcg_destroy_list_lru_node.isra.7+0x110/0x110 2018/03/31 09:15:36 executing program 6: perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f000031f000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) prctl$void(0x0) getpid() r0 = syz_open_dev$vcsn(&(0x7f0000000040)='/dev/vcs#\x00', 0x0, 0x20000) ioctl$GIO_CMAP(r0, 0x4b70, &(0x7f0000000080)) r1 = socket$alg(0x26, 0x5, 0x0) ioctl$sock_SIOCGIFBR(0xffffffffffffffff, 0x8940, &(0x7f0000000040)=@get={0x1, &(0x7f0000000400)=""/242, 0x100000000}) bind$alg(r1, &(0x7f0000000080)={0x26, 'aead\x00', 0x0, 0x0, 'generic-gcm-aesni\x00'}, 0x58) syz_open_dev$sndmidi(&(0x7f0000000100)='/dev/snd/midiC#D#\x00', 0xfd, 0x0) bind(0xffffffffffffffff, &(0x7f0000000140)=@llc={0x1a, 0x33a, 0x7, 0x80, 0x0, 0x4, @remote={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xbb}}, 0x80) r2 = syz_init_net_socket$nfc_llcp(0x27, 0x1, 0x1) setsockopt$nfc_llcp_NFC_LLCP_MIUX(r2, 0x118, 0x15, &(0x7f0000000000), 0x4) r3 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/cuse\x00', 0x103002, 0x0) futimesat(r3, &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)={{0x0, 0x7530}}) r4 = syz_open_dev$vcsa(&(0x7f00000001c0)='/dev/vcsa#\x00', 0x2, 0x0) sendto$inet6(r4, &(0x7f0000000bc0), 0x0, 0x20000000, &(0x7f0000000c40)={0xa, 0x4e20, 0x0, @dev={0xfe, 0x80, [], 0x19}, 0x1f}, 0x1c) accept$alg(r0, 0x0, 0x0) sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f0000000000)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x8}, 0xb4fcd35419244434, &(0x7f00004ca000)={&(0x7f0000000300)=ANY=[], 0x1a1}, 0x1}, 0x0) syz_fuseblk_mount(&(0x7f0000001380)='./file0\x00', &(0x7f00000013c0)='./file0\x00', 0xf000, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0xb21, 0x0) socket(0x1e, 0x3, 0x0) socket(0x1e, 0x0, 0x0) ptrace$PTRACE_SECCOMP_GET_FILTER(0x420c, 0x0, 0x0, &(0x7f0000000380)=""/113) sched_yield() ioctl$TUNGETIFF(r4, 0x800454d2, &(0x7f0000000140)) ioctl$KIOCSOUND(r4, 0x4b2f, 0xfffffffffffffb74) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x9b}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000447000)='./file0\x00', &(0x7f00000e1000)='msdos\x00', 0x0, &(0x7f000097bfff)) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000580)='./cgroup/syz0\x00', 0x1ff) [ 329.680598] ? trace_hardirqs_on_caller+0x421/0x5c0 [ 329.680608] ? __lockdep_init_map+0xe4/0x650 [ 329.680619] ? lockdep_init_map+0x9/0x10 [ 329.680630] sget_userns+0x691/0xe40 [ 329.680636] ? kill_litter_super+0x90/0x90 [ 329.680648] ? ns_test_super+0x50/0x50 [ 329.680657] ? destroy_unused_super.part.6+0xd0/0xd0 [ 329.680664] ? do_raw_spin_trylock+0x190/0x190 [ 329.680677] ? kobject_put+0x6b/0x250 [ 329.680693] ? blkdev_get+0x3a1/0xb00 [ 329.680707] ? cap_capable+0x1b5/0x230 [ 329.680715] ? __blkdev_get+0x13b0/0x13b0 2018/03/31 09:15:36 executing program 6: perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f000031f000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) prctl$void(0x0) getpid() r0 = syz_open_dev$vcsn(&(0x7f0000000040)='/dev/vcs#\x00', 0x0, 0x20000) ioctl$GIO_CMAP(r0, 0x4b70, &(0x7f0000000080)) r1 = socket$alg(0x26, 0x5, 0x0) ioctl$sock_SIOCGIFBR(0xffffffffffffffff, 0x8940, &(0x7f0000000040)=@get={0x1, &(0x7f0000000400)=""/242, 0x100000000}) bind$alg(r1, &(0x7f0000000080)={0x26, 'aead\x00', 0x0, 0x0, 'generic-gcm-aesni\x00'}, 0x58) syz_open_dev$sndmidi(&(0x7f0000000100)='/dev/snd/midiC#D#\x00', 0xfd, 0x0) bind(0xffffffffffffffff, &(0x7f0000000140)=@llc={0x1a, 0x33a, 0x7, 0x80, 0x0, 0x4, @remote={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xbb}}, 0x80) r2 = syz_init_net_socket$nfc_llcp(0x27, 0x1, 0x1) setsockopt$nfc_llcp_NFC_LLCP_MIUX(r2, 0x118, 0x15, &(0x7f0000000000), 0x4) r3 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/cuse\x00', 0x103002, 0x0) futimesat(r3, &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)={{0x0, 0x7530}}) r4 = syz_open_dev$vcsa(&(0x7f00000001c0)='/dev/vcsa#\x00', 0x2, 0x0) sendto$inet6(r4, &(0x7f0000000bc0), 0x0, 0x20000000, &(0x7f0000000c40)={0xa, 0x4e20, 0x0, @dev={0xfe, 0x80, [], 0x19}, 0x1f}, 0x1c) accept$alg(r0, 0x0, 0x0) sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f0000000000)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x8}, 0xb4fcd35419244434, &(0x7f00004ca000)={&(0x7f0000000300)=ANY=[], 0x1a1}, 0x1}, 0x0) syz_fuseblk_mount(&(0x7f0000001380)='./file0\x00', &(0x7f00000013c0)='./file0\x00', 0xf000, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0xb21, 0x0) socket(0x1e, 0x3, 0x0) socket(0x1e, 0x0, 0x0) ptrace$PTRACE_SECCOMP_GET_FILTER(0x420c, 0x0, 0x0, &(0x7f0000000380)=""/113) sched_yield() ioctl$TUNGETIFF(r4, 0x800454d2, &(0x7f0000000140)) ioctl$KIOCSOUND(r4, 0x4b2f, 0xfffffffffffffb74) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x20}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000447000)='./file0\x00', &(0x7f00000e1000)='msdos\x00', 0x0, &(0x7f000097bfff)) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000580)='./cgroup/syz0\x00', 0x1ff) [ 329.680726] ? security_capable+0x8e/0xc0 [ 329.680735] ? kill_litter_super+0x90/0x90 [ 329.680744] ? ns_capable_common+0xcf/0x160 [ 329.680753] ? ns_test_super+0x50/0x50 [ 329.680759] ? kill_litter_super+0x90/0x90 [ 329.680766] sget+0xd2/0x120 [ 329.680778] mount_bdev+0x109/0x370 [ 329.680786] ? msdos_mount+0x40/0x40 [ 329.680797] msdos_mount+0x34/0x40 [ 329.680807] mount_fs+0x66/0x2d0 [ 329.680821] vfs_kern_mount.part.26+0xc6/0x4a0 [ 329.680832] ? may_umount+0xa0/0xa0 [ 329.680841] ? _raw_read_unlock+0x22/0x30 2018/03/31 09:15:36 executing program 2: syz_open_dev$loop(&(0x7f00000003c0)='/dev/loop#\x00', 0x8, 0x0) r0 = syz_open_dev$sndseq(&(0x7f00000001c0)='/dev/snd/seq\x00', 0x0, 0x0) r1 = accept(0xffffffffffffffff, &(0x7f0000000080)=@can, &(0x7f0000000180)=0x80) ioctl$sock_ipx_SIOCAIPXPRISLT(r1, 0x89e1, &(0x7f0000000280)=0x3f) ioctl$sock_inet_SIOCRTMSG(r1, 0x890d, &(0x7f0000000200)={0x80, {0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x19}}, {0x2, 0x4e21, @local={0xac, 0x14, 0x14, 0xaa}}, {0x2, 0x4e23}, 0x0, 0x7, 0x1, 0x0, 0x9, 0x0, 0x0, 0x0, 0xfffffffffffffff7}) getsockopt$inet_sctp_SCTP_PRIMARY_ADDR(0xffffffffffffffff, 0x84, 0x6, &(0x7f0000000ac0)={0x0, @in={{0x2, 0x4e20, @loopback=0x7f000001}}}, &(0x7f00000002c0)=0x84) setsockopt$inet_sctp_SCTP_ENABLE_STREAM_RESET(r1, 0x84, 0x76, &(0x7f0000000300)={r2, 0x1c9}, 0x8) r3 = syz_open_dev$sg(&(0x7f0000000700)='/dev/sg#\x00', 0xfffffffffffffff7, 0x800) clone(0x2000c100, &(0x7f0000000800)="97bb77038add5df9e9d4f9783b82c55fe59e5c0acdbcfc9bcf92ac0e1f1f3c1959c1d25dfabf3849336c7c85be174d7765b47e113632aea54b87e4d3f2c1db09e6aa4040b43d17308fb7e62e808067da2fff3cfd8e4c038c814bbfc6bc49d8ebc8671d8297e2d34dc61f2d194d2dbb8f59b4c853e0714d3d4bb29d1243fac01c86c8c4dd38daedab3c6ad73a72d3f6dd2684aa82e5285eb82452c9848b7beb8bc513ba8c8973cad0bd5926604846b7f5d0397b", &(0x7f00000008c0), &(0x7f0000000900), &(0x7f0000000940)="ed6c04412e782fe395f084741e3d9fe469aebde09acc8f8d8d84d1f00f5573b09acba487077ebb904cb1f3fed55f59d677ce24bbd2a7506df8e1e0d0fc709cb8c9f4ab2aeeeebc5ef879742c1f7628f1862c88b5b0da89acbf43ef12e4839405b6a3430d296fea06d2f3a8356c57ec991e") ioctl$SNDRV_SEQ_IOCTL_SUBSCRIBE_PORT(r0, 0x40505330, &(0x7f0000ec6fb0)={{}, {0x80}}) getsockopt$netrom_NETROM_T1(r1, 0x103, 0x1, &(0x7f0000000000), &(0x7f0000000380)=0x4) syz_open_dev$adsp(&(0x7f0000000600)='/dev/adsp#\x00', 0x100000000, 0x80000) rt_sigprocmask(0x3d738072cd0f41ac, &(0x7f0000000cc0)={0x7}, &(0x7f0000000d00), 0x8) clone(0x40000000, &(0x7f0000000500)="67cdd9994c47c31d325b069924a7064c157c2ec0b5b5dca2feeb7dabef3b7af0d02d559e293faa759f2b3cb12aea360c2d", &(0x7f0000000580), &(0x7f00000005c0), &(0x7f0000000a00)="29859fdda9a119e54a27f9ec76b4d63a16dc5bbdd38c2fda0e5f4d8f830cd987ec7d3ffc66cf3db8820968fd89a1fba8fe6352a29a27f3b000bcdf238f2c04b358fc831025180e0be313da41de6366c94a1a0f86aaffdf2c039111b55275c054e14819a827fe809225249a01944263a2aec15f64e752e35892b1b8e7ef1e0e9115") ioctl$SNDRV_SEQ_IOCTL_DELETE_PORT(r0, 0x40a85321, &(0x7f0000000b80)={{0x4, 0x8}, 'port0\x00', 0x80, 0x0, 0x10000, 0x6, 0x2, 0x80, 0x8, 0x0, 0x0, 0x3dec00}) getsockopt$inet_sctp_SCTP_SOCKOPT_PEELOFF(r3, 0x84, 0x66, &(0x7f0000000c40)={r2, 0x6}, &(0x7f0000000c80)=0x8) clock_settime(0x7, &(0x7f0000000740)={0x77359400}) ioctl$SNDRV_SEQ_IOCTL_CLIENT_ID(r0, 0x80045301, &(0x7f0000000340)) r4 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer2\x00', 0x0, 0x0) openat$sequencer2(0xffffffffffffff9c, &(0x7f00000006c0)='/dev/sequencer2\x00', 0x222081, 0x0) ioctl$RNDADDENTROPY(0xffffffffffffffff, 0x40085203, &(0x7f0000000100)=ANY=[@ANYPTR=&(0x7f0000000680)=ANY=[@ANYPTR64=&(0x7f0000000640)=ANY=[@ANYPTR, @ANYPTR]]]) setsockopt$inet_sctp_SCTP_DEFAULT_SEND_PARAM(r4, 0x84, 0xa, &(0x7f0000000140)={0x5, 0x100000001, 0x0, 0x8, 0x0, 0x7, 0x401, 0x1f, r2}, 0x20) 2018/03/31 09:15:37 executing program 6: perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f000031f000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) prctl$void(0x0) getpid() r0 = syz_open_dev$vcsn(&(0x7f0000000040)='/dev/vcs#\x00', 0x0, 0x20000) ioctl$GIO_CMAP(r0, 0x4b70, &(0x7f0000000080)) r1 = socket$alg(0x26, 0x5, 0x0) ioctl$sock_SIOCGIFBR(0xffffffffffffffff, 0x8940, &(0x7f0000000040)=@get={0x1, &(0x7f0000000400)=""/242, 0x100000000}) bind$alg(r1, &(0x7f0000000080)={0x26, 'aead\x00', 0x0, 0x0, 'generic-gcm-aesni\x00'}, 0x58) syz_open_dev$sndmidi(&(0x7f0000000100)='/dev/snd/midiC#D#\x00', 0xfd, 0x0) bind(0xffffffffffffffff, &(0x7f0000000140)=@llc={0x1a, 0x33a, 0x7, 0x80, 0x0, 0x4, @remote={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xbb}}, 0x80) r2 = syz_init_net_socket$nfc_llcp(0x27, 0x1, 0x1) setsockopt$nfc_llcp_NFC_LLCP_MIUX(r2, 0x118, 0x15, &(0x7f0000000000), 0x4) r3 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/cuse\x00', 0x103002, 0x0) futimesat(r3, &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)={{0x0, 0x7530}}) r4 = syz_open_dev$vcsa(&(0x7f00000001c0)='/dev/vcsa#\x00', 0x2, 0x0) sendto$inet6(r4, &(0x7f0000000bc0), 0x0, 0x20000000, &(0x7f0000000c40)={0xa, 0x4e20, 0x0, @dev={0xfe, 0x80, [], 0x19}, 0x1f}, 0x1c) accept$alg(r0, 0x0, 0x0) sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f0000000000)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x8}, 0xb4fcd35419244434, &(0x7f00004ca000)={&(0x7f0000000300)=ANY=[], 0x1a1}, 0x1}, 0x0) syz_fuseblk_mount(&(0x7f0000001380)='./file0\x00', &(0x7f00000013c0)='./file0\x00', 0xf000, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0xb21, 0x0) socket(0x1e, 0x3, 0x0) socket(0x1e, 0x0, 0x0) ptrace$PTRACE_SECCOMP_GET_FILTER(0x420c, 0x0, 0x0, &(0x7f0000000380)=""/113) sched_yield() ioctl$TUNGETIFF(r4, 0x800454d2, &(0x7f0000000140)) ioctl$KIOCSOUND(r4, 0x4b2f, 0xfffffffffffffb74) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x20}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000447000)='./file0\x00', &(0x7f00000e1000)='msdos\x00', 0x0, &(0x7f000097bfff)) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000580)='./cgroup/syz0\x00', 0x1ff) [ 329.680849] ? __get_fs_type+0x8a/0xc0 [ 329.680862] do_mount+0xea4/0x2bb0 [ 329.680876] ? copy_mount_string+0x40/0x40 [ 329.680884] ? trace_hardirqs_on_caller+0x421/0x5c0 [ 329.680895] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 329.680909] ? retint_kernel+0x10/0x10 [ 329.680923] ? copy_mount_options+0x18b/0x2e0 [ 329.680932] ? copy_mount_options+0x193/0x2e0 [ 329.680940] ? copy_mount_options+0x1f7/0x2e0 [ 329.680952] SyS_mount+0xab/0x120 [ 329.680959] ? copy_mnt_ns+0xb30/0xb30 [ 329.680968] do_syscall_64+0x281/0x940 [ 329.680977] ? vmalloc_sync_all+0x30/0x30 [ 329.680983] ? _raw_spin_unlock_irq+0x27/0x70 [ 329.680991] ? finish_task_switch+0x1c1/0x7e0 [ 329.681001] ? syscall_return_slowpath+0x550/0x550 [ 329.681014] ? syscall_return_slowpath+0x2ac/0x550 [ 329.681028] ? prepare_exit_to_usermode+0x350/0x350 [ 329.681042] ? entry_SYSCALL_64_after_hwframe+0x52/0xb7 [ 329.681060] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 329.681079] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 329.681087] RIP: 0033:0x454e79 2018/03/31 09:15:37 executing program 5: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800000000, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f000031f000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) prctl$void(0x0) getpid() ioctl$GIO_CMAP(0xffffffffffffffff, 0x4b70, &(0x7f0000000080)) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'aead\x00', 0x0, 0x0, 'generic-gcm-aesni\x00'}, 0x58) r1 = syz_open_dev$sndmidi(&(0x7f0000000100)='/dev/snd/midiC#D#\x00', 0x130d000, 0xfff7fffffffffffe) bind(0xffffffffffffffff, &(0x7f0000000140)=@llc={0x1a, 0x33a, 0x7, 0x80, 0x5, 0x4, @remote={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xbb}}, 0x80) r2 = syz_init_net_socket$nfc_llcp(0x27, 0x1, 0x1) setsockopt$nfc_llcp_NFC_LLCP_MIUX(r2, 0x118, 0x15, &(0x7f0000000000), 0x4) r3 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/cuse\x00', 0x103002, 0x0) futimesat(r3, &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)={{0x0, 0x7530}}) r4 = syz_open_dev$vcsa(&(0x7f00000001c0)='/dev/vcsa#\x00', 0x2, 0x4020ff) sendto$inet6(0xffffffffffffffff, &(0x7f0000000bc0)="36251e313e0743fc195a1a198a14434e8a0a00b3f452a3b5644e336ec712a16310c9aecc4e3097bc666a8882128a73c368ce731e9fbf3fe18fa52d", 0x3b, 0x20000000, &(0x7f0000000c40)={0xa, 0x4e20, 0x6, @dev={0xfe, 0x80, [], 0x19}, 0x1f}, 0x1c) accept$alg(0xffffffffffffffff, 0x0, 0x0) sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f0000000000)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x8}, 0xb4fcd35419244434, &(0x7f00004ca000)={&(0x7f0000000300)=ANY=[], 0x1a1}, 0x1}, 0x0) syz_fuseblk_mount(&(0x7f0000001380)='./file0\x00', &(0x7f00000013c0)='./file0\x00', 0xf000, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0xb21, 0x0) socket(0x1e, 0x3, 0x0) socket(0x1e, 0x0, 0x0) getsockopt$IP_VS_SO_GET_DAEMON(r1, 0x0, 0x487, &(0x7f0000000200), &(0x7f0000000240)=0x30) ptrace$PTRACE_SECCOMP_GET_FILTER(0x420c, 0x0, 0x0, &(0x7f0000000380)=""/113) sched_yield() ioctl$TUNGETIFF(r4, 0x800454d2, &(0x7f0000000140)) ioctl$KIOCSOUND(r4, 0x4b2f, 0xfffffffffffffb74) setsockopt$inet6_opts(r1, 0x29, 0x3f, &(0x7f00000002c0)=@dstopts={0x6f, 0x11, [], [@padn={0x1, 0x1, [0x0]}, @pad1={0x0, 0x1}, @calipso={0x7, 0x30, {0x1ffc0000, 0xa, 0x184, 0x2, [0x2, 0x2, 0x40, 0x8, 0x5]}}, @generic={0x1ff, 0x44, "915592ec79e2cd33a34d40576ef02b0ebbf65b3162481f9dbde78a0e43d5f6a23cc9f55dfa020079bca18f3bac7b5107c031f5ea2dcd4c21bbc59198390be68e72bc88eb"}, @jumbo={0xc2, 0x4, 0x9}, @pad1={0x0, 0x1}, @pad1={0x0, 0x1}]}, 0x98) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x20, 0x9b}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000447000)='./file0\x00', &(0x7f00000e1000)='msdos\x00', 0x0, &(0x7f000097bfff)) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000580)='./cgroup/syz0\x00', 0x1ff) syz_open_dev$audion(&(0x7f0000000280)='/dev/audio#\x00', 0x7be, 0x0) [ 329.681092] RSP: 002b:00007f37fba8ec68 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 329.681105] RAX: ffffffffffffffda RBX: 00007f37fba8f6d4 RCX: 0000000000454e79 [ 329.681112] RDX: 00000000200e1000 RSI: 0000000020447000 RDI: 0000000020000000 [ 329.681120] RBP: 000000000072bea0 R08: 000000002097bfff R09: 0000000000000000 [ 329.681126] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000019 [ 329.681132] R13: 00000000000003fa R14: 00000000006f8010 R15: 0000000000000016 [ 329.692730] FAT-fs (loop199): unable to read boot sector [ 329.693611] FAT-fs (loop199): unable to read boot sector [ 329.697570] FAT-fs (loop199): unable to read boot sector [ 329.836325] binder: 31711:31715 BC_FREE_BUFFER u000000002000c000 no match [ 329.874712] FAT-fs (loop199): unable to read boot sector [ 329.911666] binder: 31711:31715 unknown command 20 [ 329.915140] FAULT_INJECTION: forcing a failure. [ 329.915140] name failslab, interval 1, probability 0, space 0, times 0 [ 329.922944] binder: 31711:31715 ioctl c0306201 20000340 returned -22 [ 329.924846] CPU: 1 PID: 31710 Comm: syz-executor7 Not tainted 4.16.0-rc7+ #8 [ 329.924853] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 329.924858] Call Trace: [ 329.924875] dump_stack+0x194/0x24d [ 329.924890] ? arch_local_irq_restore+0x53/0x53 [ 329.924902] ? __save_stack_trace+0x7e/0xd0 [ 329.924921] should_fail+0x8c0/0xa40 [ 329.955856] binder: 31711:31725 BC_FREE_BUFFER u000000002000c000 no match [ 329.956116] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 329.956129] ? kasan_kmalloc+0xad/0xe0 [ 329.974756] binder: 31711:31725 unknown command 26 [ 329.977890] ? kmem_cache_alloc_trace+0x136/0x740 [ 329.977901] ? __memcg_init_list_lru_node+0x169/0x270 [ 329.977909] ? __list_lru_init+0x544/0x750 [ 329.977918] ? sget_userns+0x691/0xe40 [ 329.977928] ? mount_fs+0x66/0x2d0 [ 329.977939] ? vfs_kern_mount.part.26+0xc6/0x4a0 [ 329.977946] ? do_mount+0xea4/0x2bb0 [ 329.977957] ? do_syscall_64+0x281/0x940 [ 329.977969] ? entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 329.977984] ? find_held_lock+0x35/0x1d0 [ 329.977996] ? __lock_is_held+0xb6/0x140 [ 330.000939] binder: 31711:31725 ioctl c0306201 20000340 returned -22 [ 330.003381] ? check_same_owner+0x320/0x320 [ 330.003397] ? rcu_note_context_switch+0x710/0x710 [ 330.003417] should_failslab+0xec/0x120 [ 330.003427] kmem_cache_alloc_trace+0x4b/0x740 [ 330.003437] ? __kmalloc_node+0x33/0x70 [ 330.003445] ? __kmalloc_node+0x33/0x70 [ 330.003456] ? rcu_read_lock_sched_held+0x108/0x120 [ 330.003471] __memcg_init_list_lru_node+0x169/0x270 [ 330.003485] ? list_lru_add+0x7c0/0x7c0 [ 330.193143] ? __kmalloc_node+0x47/0x70 [ 330.193159] __list_lru_init+0x544/0x750 [ 330.201171] ? memcg_destroy_list_lru_node.isra.7+0x110/0x110 [ 330.201184] ? trace_hardirqs_on_caller+0x421/0x5c0 [ 330.212048] ? __lockdep_init_map+0xe4/0x650 [ 330.216440] ? lockdep_init_map+0x9/0x10 [ 330.220482] sget_userns+0x691/0xe40 [ 330.224179] ? kill_litter_super+0x90/0x90 [ 330.228407] ? ns_test_super+0x50/0x50 [ 330.232278] ? destroy_unused_super.part.6+0xd0/0xd0 [ 330.237357] ? do_raw_spin_trylock+0x190/0x190 [ 330.241927] ? kobject_put+0x6b/0x250 [ 330.245723] ? blkdev_get+0x3a1/0xb00 [ 330.249520] ? cap_capable+0x1b5/0x230 [ 330.253390] ? __blkdev_get+0x13b0/0x13b0 [ 330.257525] ? security_capable+0x8e/0xc0 [ 330.261663] ? kill_litter_super+0x90/0x90 [ 330.265886] ? ns_capable_common+0xcf/0x160 [ 330.270191] ? ns_test_super+0x50/0x50 [ 330.274057] ? kill_litter_super+0x90/0x90 [ 330.278276] sget+0xd2/0x120 [ 330.281282] mount_bdev+0x109/0x370 [ 330.284893] ? msdos_mount+0x40/0x40 [ 330.288592] msdos_mount+0x34/0x40 [ 330.292114] mount_fs+0x66/0x2d0 [ 330.295467] vfs_kern_mount.part.26+0xc6/0x4a0 [ 330.300034] ? may_umount+0xa0/0xa0 [ 330.303645] ? _raw_read_unlock+0x22/0x30 [ 330.307774] ? __get_fs_type+0x8a/0xc0 [ 330.311648] do_mount+0xea4/0x2bb0 [ 330.315173] ? copy_mount_string+0x40/0x40 [ 330.319384] ? trace_hardirqs_on_caller+0x421/0x5c0 [ 330.324378] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 330.329120] ? retint_kernel+0x10/0x10 [ 330.332993] ? copy_mount_options+0x18b/0x2e0 [ 330.337475] ? copy_mount_options+0x193/0x2e0 [ 330.341944] ? copy_mount_options+0x1f7/0x2e0 [ 330.346417] SyS_mount+0xab/0x120 [ 330.349850] ? copy_mnt_ns+0xb30/0xb30 [ 330.353720] do_syscall_64+0x281/0x940 [ 330.357585] ? vmalloc_sync_all+0x30/0x30 [ 330.361715] ? _raw_spin_unlock_irq+0x27/0x70 [ 330.366206] ? finish_task_switch+0x1c1/0x7e0 [ 330.370690] ? syscall_return_slowpath+0x550/0x550 [ 330.375596] ? syscall_return_slowpath+0x2ac/0x550 [ 330.380503] ? prepare_exit_to_usermode+0x350/0x350 [ 330.385517] ? entry_SYSCALL_64_after_hwframe+0x52/0xb7 [ 330.390865] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 330.395685] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 330.400849] RIP: 0033:0x454e79 [ 330.404020] RSP: 002b:00007f37fba8ec68 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 330.411718] RAX: ffffffffffffffda RBX: 00007f37fba8f6d4 RCX: 0000000000454e79 [ 330.418975] RDX: 00000000200e1000 RSI: 0000000020447000 RDI: 0000000020000000 [ 330.426230] RBP: 000000000072bea0 R08: 000000002097bfff R09: 0000000000000000 [ 330.433482] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000019 [ 330.440732] R13: 00000000000003fa R14: 00000000006f8010 R15: 0000000000000017 2018/03/31 09:15:37 executing program 3: r0 = syz_open_dev$random(&(0x7f00000001c0)='/dev/random\x00', 0x0, 0x800) r1 = syz_open_dev$loop(&(0x7f0000308000)='/dev/loop#\x00', 0x0, 0x0) ioctl$LOOP_SET_STATUS(r1, 0xc0481273, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "3900ea631d00000000020000010000009f00000023f7b7d65f90b0e6330ee739b319d8f6aa6bd58d1443474482e85040fb4947ebb55bd19f335b5bffff0001f3", "cfa430745a540dc1c149b7b81579f6a41c51f7d51933223e82ab867dac761faf"}) write(0xffffffffffffffff, &(0x7f00000001c0), 0x0) setsockopt$inet_sctp6_SCTP_RECVNXTINFO(0xffffffffffffffff, 0x84, 0x21, &(0x7f00000003c0)=0x200, 0x4) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f00000000c0)) getsockopt$netrom_NETROM_T4(0xffffffffffffffff, 0x103, 0x6, &(0x7f0000000300)=0x8, &(0x7f0000000340)=0x4) r2 = getpid() sched_setparam(r2, &(0x7f0000000400)) syz_open_dev$loop(&(0x7f0000ca9ff5)='/dev/loop#\x00', 0x0, 0x82) r3 = memfd_create(&(0x7f0000614000)="74086e750000000000000000008c00", 0x1) pwritev(r3, &(0x7f0000f50f90)=[{&(0x7f0000000040)="aa", 0x1}], 0x1, 0x0) fcntl$getownex(r1, 0x10, &(0x7f0000000240)={0x0, 0x0}) r5 = syz_open_procfs(r4, &(0x7f0000000280)='stat\x00') epoll_ctl$EPOLL_CTL_MOD(r3, 0x3, r0, &(0x7f00000002c0)={0x20000010}) accept4$inet6(r3, &(0x7f0000000100)={0x0, 0x0, 0x0, @mcast1}, &(0x7f0000000140)=0x1c, 0x7fd) getsockopt$inet_IP_IPSEC_POLICY(r3, 0x0, 0x10, &(0x7f0000000940)={{{@in6=@local, @in6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@loopback}, 0x0, @in=@local}}, &(0x7f0000000780)=0xe8) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f00000007c0)={0x0, 0x0, 0x0}, &(0x7f0000000540)=0xc) fchown(r3, r6, r7) r8 = syz_open_dev$binder(&(0x7f0000000100)='/dev/binder#\x00', 0xffffffffffffffff, 0x806) ioctl$BINDER_SET_CONTEXT_MGR(r5, 0x40046207, 0x0) mmap$binder(&(0x7f000000c000/0x2000)=nil, 0x2000, 0x0, 0x12, r8, 0x0) ioctl$BINDER_WRITE_READ(r8, 0xc0306201, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000), 0x0, 0x0, &(0x7f0000011f9d)}) getsockopt$inet_sctp6_SCTP_AUTO_ASCONF(0xffffffffffffffff, 0x84, 0x1e, &(0x7f0000000140), &(0x7f0000000180)=0x4) ioctl$BINDER_WRITE_READ(r8, 0xc0306201, &(0x7f0000000340)={0x8, 0x0, &(0x7f0000000440)=ANY=[@ANYRES64=r1], 0x0, 0x0, &(0x7f0000000240)}) write(r5, &(0x7f0000000580)="8bad2e5790f664f32509e40d6f879d0ddd7e0000000019afb7509a2d5c6db426ea77cc7d345b87a35d1b4170339c33cb65352c901ae751767e674898e0d87e00000000000000002af018d0a490ca419c30383d999aaeca82b81f596355d6216c5c34a7938469330465d39ae163daa91166f125ead04030fa0813389ec82fa38a601155bedc34de70ab40fffd3d856a96d43c04a7ecbe238362483abde428fb8c81e036ae8069e56a2acf610783b121117a9576f9a7f9c602014bc536ca66bae6c80e15e4a6d960c1d4981477904611fd4b708472b851dd", 0xffffffffffffff84) r9 = ioctl$LOOP_CTL_GET_FREE(r3, 0x4c82) ioctl$LOOP_CTL_REMOVE(r5, 0x4c81, r9) openat$cgroup(0xffffffffffffff9c, &(0x7f0000000000)='syz0\x00', 0x200002, 0x0) sched_setaffinity(r2, 0xfffffffffffffec4, &(0x7f00000004c0)=0x1fa5) [ 330.453497] FAT-fs (loop199): unable to read boot sector [ 330.461867] FAT-fs (loop199): unable to read boot sector [ 330.471905] FAT-fs (loop199): unable to read boot sector [ 330.481099] FAT-fs (loop199): unable to read boot sector [ 330.511490] binder: 31733:31734 unknown command 20 [ 330.514576] FAT-fs (loop199): unable to read boot sector [ 330.518871] binder: 31733:31734 ioctl c0306201 20000340 returned -22 [ 330.538223] FAT-fs (loop199): unable to read boot sector [ 330.553589] binder: 31733:31736 unknown command 26 [ 330.558951] binder: 31733:31736 ioctl c0306201 20000340 returned -22 2018/03/31 09:15:37 executing program 1: prctl$void(0x0) getpid() syz_open_dev$vcsn(&(0x7f0000000040)='/dev/vcs#\x00', 0x400, 0x20000) r0 = socket$alg(0x26, 0x5, 0x0) ioctl$sock_SIOCGIFBR(r0, 0x8940, &(0x7f0000000040)=@get={0x1, &(0x7f0000000400)=""/242, 0x100000000}) bind$alg(r0, &(0x7f0000000080)={0x26, 'aead\x00', 0x0, 0x0, 'generic-gcm-aesni\x00'}, 0x58) r1 = syz_open_dev$sndmidi(&(0x7f0000000100)='/dev/snd/midiC#D#\x00', 0xfd, 0x0) bind(r1, &(0x7f0000000140)=@llc={0x1a, 0x33a, 0x7, 0x80, 0x0, 0x4, @remote={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xbb}}, 0x80) r2 = syz_init_net_socket$nfc_llcp(0x27, 0x1, 0x1) setsockopt$nfc_llcp_NFC_LLCP_MIUX(r2, 0x118, 0x15, &(0x7f0000000000), 0x4) r3 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/cuse\x00', 0x103002, 0x0) futimesat(r3, &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)={{0x0, 0x7530}}) r4 = syz_open_dev$vcsa(&(0x7f00000001c0)='/dev/vcsa#\x00', 0x2, 0x4020ff) sendto$inet6(r4, &(0x7f0000000bc0), 0x0, 0x20000000, &(0x7f0000000c40)={0xa, 0x4e20, 0x6, @dev={0xfe, 0x80, [], 0x19}, 0x1f}, 0x1c) sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f0000000000)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x8}, 0xb4fcd35419244434, &(0x7f00004ca000)={&(0x7f0000000300)=ANY=[], 0x1a1}, 0x1}, 0x0) syz_fuseblk_mount(&(0x7f0000001380)='./file0\x00', &(0x7f00000013c0)='./file0\x00', 0xf000, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0xb21, 0x0) socket(0x1e, 0x3, 0x0) ptrace$PTRACE_SECCOMP_GET_FILTER(0x420c, 0x0, 0x0, &(0x7f0000000380)=""/113) sched_yield() ioctl$TUNGETIFF(r4, 0x800454d2, &(0x7f0000000140)) getsockopt$netlink(r3, 0x10e, 0xf, &(0x7f0000000200)=""/112, &(0x7f00000002c0)=0x70) ioctl$KIOCSOUND(r4, 0x4b2f, 0xfffffffffffffb74) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x20, 0x9b}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000447000)='./file0\x00', &(0x7f00000e1000)='msdos\x00', 0x0, &(0x7f000097bfff)) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000580)='./cgroup/syz0\x00', 0x1ff) syz_open_dev$audion(&(0x7f0000000280)='/dev/audio#\x00', 0x7be, 0x0) fcntl$getown(0xffffffffffffffff, 0x9) 2018/03/31 09:15:37 executing program 2: syz_open_dev$loop(&(0x7f00000003c0)='/dev/loop#\x00', 0x8, 0x0) r0 = syz_open_dev$sndseq(&(0x7f00000001c0)='/dev/snd/seq\x00', 0x0, 0x0) r1 = accept(0xffffffffffffffff, &(0x7f0000000080)=@can, &(0x7f0000000180)=0x80) ioctl$sock_ipx_SIOCAIPXPRISLT(r1, 0x89e1, &(0x7f0000000280)=0x3f) ioctl$sock_inet_SIOCRTMSG(r1, 0x890d, &(0x7f0000000200)={0x80, {0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x19}}, {0x2, 0x4e21, @local={0xac, 0x14, 0x14, 0xaa}}, {0x2, 0x4e23}, 0x0, 0x7, 0x1, 0x0, 0x9, 0x0, 0x0, 0x0, 0xfffffffffffffff7}) getsockopt$inet_sctp_SCTP_PRIMARY_ADDR(0xffffffffffffffff, 0x84, 0x6, &(0x7f0000000ac0)={0x0, @in={{0x2, 0x4e20, @loopback=0x7f000001}}}, &(0x7f00000002c0)=0x84) setsockopt$inet_sctp_SCTP_ENABLE_STREAM_RESET(r1, 0x84, 0x76, &(0x7f0000000300)={r2, 0x1c9}, 0x8) r3 = syz_open_dev$sg(&(0x7f0000000700)='/dev/sg#\x00', 0xfffffffffffffff7, 0x800) clone(0x2000c100, &(0x7f0000000800)="97bb77038add5df9e9d4f9783b82c55fe59e5c0acdbcfc9bcf92ac0e1f1f3c1959c1d25dfabf3849336c7c85be174d7765b47e113632aea54b87e4d3f2c1db09e6aa4040b43d17308fb7e62e808067da2fff3cfd8e4c038c814bbfc6bc49d8ebc8671d8297e2d34dc61f2d194d2dbb8f59b4c853e0714d3d4bb29d1243fac01c86c8c4dd38daedab3c6ad73a72d3f6dd2684aa82e5285eb82452c9848b7beb8bc513ba8c8973cad0bd5926604846b7f5d0397b", &(0x7f00000008c0), &(0x7f0000000900), &(0x7f0000000940)="ed6c04412e782fe395f084741e3d9fe469aebde09acc8f8d8d84d1f00f5573b09acba487077ebb904cb1f3fed55f59d677ce24bbd2a7506df8e1e0d0fc709cb8c9f4ab2aeeeebc5ef879742c1f7628f1862c88b5b0da89acbf43ef12e4839405b6a3430d296fea06d2f3a8356c57ec991e") ioctl$SNDRV_SEQ_IOCTL_SUBSCRIBE_PORT(r0, 0x40505330, &(0x7f0000ec6fb0)={{}, {0x80}}) getsockopt$netrom_NETROM_T1(r1, 0x103, 0x1, &(0x7f0000000000), &(0x7f0000000380)=0x4) syz_open_dev$adsp(&(0x7f0000000600)='/dev/adsp#\x00', 0x100000000, 0x80000) rt_sigprocmask(0x3d738072cd0f41ac, &(0x7f0000000cc0)={0x7}, &(0x7f0000000d00), 0x8) clone(0x40000000, &(0x7f0000000500)="67cdd9994c47c31d325b069924a7064c157c2ec0b5b5dca2feeb7dabef3b7af0d02d559e293faa759f2b3cb12aea360c2d", &(0x7f0000000580), &(0x7f00000005c0), &(0x7f0000000a00)="29859fdda9a119e54a27f9ec76b4d63a16dc5bbdd38c2fda0e5f4d8f830cd987ec7d3ffc66cf3db8820968fd89a1fba8fe6352a29a27f3b000bcdf238f2c04b358fc831025180e0be313da41de6366c94a1a0f86aaffdf2c039111b55275c054e14819a827fe809225249a01944263a2aec15f64e752e35892b1b8e7ef1e0e9115") ioctl$SNDRV_SEQ_IOCTL_DELETE_PORT(r0, 0x40a85321, &(0x7f0000000b80)={{0x4, 0x8}, 'port0\x00', 0x80, 0x0, 0x10000, 0x6, 0x2, 0x80, 0x8, 0x0, 0x0, 0x3dec00}) getsockopt$inet_sctp_SCTP_SOCKOPT_PEELOFF(r3, 0x84, 0x66, &(0x7f0000000c40)={r2, 0x6}, &(0x7f0000000c80)=0x8) clock_settime(0x7, &(0x7f0000000740)={0x77359400}) ioctl$SNDRV_SEQ_IOCTL_CLIENT_ID(r0, 0x80045301, &(0x7f0000000340)) r4 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer2\x00', 0x0, 0x0) openat$sequencer2(0xffffffffffffff9c, &(0x7f00000006c0)='/dev/sequencer2\x00', 0x222081, 0x0) ioctl$RNDADDENTROPY(0xffffffffffffffff, 0x40085203, &(0x7f0000000100)=ANY=[@ANYPTR=&(0x7f0000000680)=ANY=[@ANYPTR64=&(0x7f0000000640)=ANY=[@ANYPTR, @ANYPTR]]]) setsockopt$inet_sctp_SCTP_DEFAULT_SEND_PARAM(r4, 0x84, 0xa, &(0x7f0000000140)={0x5, 0x100000001, 0x0, 0x8, 0x0, 0x7, 0x401, 0x1f, r2}, 0x20) 2018/03/31 09:15:37 executing program 0: perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f000031f000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) prctl$void(0x0) r0 = syz_open_dev$vcsn(&(0x7f0000000040)='/dev/vcs#\x00', 0x0, 0x20000) socket$alg(0x26, 0x5, 0x0) ioctl$sock_SIOCGIFBR(0xffffffffffffffff, 0x8940, &(0x7f0000000040)=@get={0x1, &(0x7f0000000400)=""/242, 0x100000000}) bind$alg(0xffffffffffffffff, &(0x7f0000000080)={0x26, 'aead\x00', 0x0, 0x0, 'generic-gcm-aesni\x00'}, 0x58) r1 = syz_open_dev$sndmidi(&(0x7f0000000100)='/dev/snd/midiC#D#\x00', 0xfd, 0x0) bind(0xffffffffffffffff, &(0x7f0000000140)=@llc={0x1a, 0x33a, 0x7, 0x80, 0x0, 0x4, @remote={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xbb}}, 0x80) r2 = syz_init_net_socket$nfc_llcp(0x27, 0x1, 0x1) setsockopt$nfc_llcp_NFC_LLCP_MIUX(r2, 0x118, 0x15, &(0x7f0000000000), 0x4) r3 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/cuse\x00', 0x103002, 0x0) futimesat(r3, &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)={{0x0, 0x7530}}) r4 = syz_open_dev$vcsa(&(0x7f00000001c0)='/dev/vcsa#\x00', 0x2, 0x0) r5 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000280)='IPVS\x00') sendmsg$IPVS_CMD_GET_INFO(r0, &(0x7f0000000540)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x142000}, 0xc, &(0x7f0000000500)={&(0x7f00000002c0)={0xb8, r5, 0x400, 0x70bd2c, 0x25dfdbfc, {0xf}, [@IPVS_CMD_ATTR_DEST={0x60, 0x2, [@IPVS_DEST_ATTR_ADDR={0x14, 0x1, @ipv6=@dev={0xfe, 0x80, [], 0xb}}, @IPVS_DEST_ATTR_FWD_METHOD={0x8, 0x3, 0x4}, @IPVS_DEST_ATTR_ADDR={0x14, 0x1, @ipv4=@remote={0xac, 0x14, 0x14, 0xbb}}, @IPVS_DEST_ATTR_L_THRESH={0x8, 0x6, 0x6978}, @IPVS_DEST_ATTR_PORT={0x8, 0x2, 0x4e23}, @IPVS_DEST_ATTR_ADDR={0x14, 0x1, @ipv6=@mcast1={0xff, 0x1, [], 0x1}}, @IPVS_DEST_ATTR_U_THRESH={0x8, 0x5, 0xfffffffffffffffe}]}, @IPVS_CMD_ATTR_DAEMON={0x44, 0x3, [@IPVS_DAEMON_ATTR_MCAST_PORT={0x8, 0x7, 0x4e23}, @IPVS_DAEMON_ATTR_MCAST_GROUP6={0x14, 0x6, @dev={0xfe, 0x80, [], 0xd}}, @IPVS_DAEMON_ATTR_MCAST_GROUP6={0x14, 0x6, @mcast2={0xff, 0x2, [], 0x1}}, @IPVS_DAEMON_ATTR_MCAST_GROUP={0x8, 0x5, @broadcast=0xffffffff}, @IPVS_DAEMON_ATTR_SYNC_ID={0x8, 0x3, 0x4}]}]}, 0xb8}, 0x1, 0x0, 0x0, 0x40000}, 0x1) sendto$inet6(r4, &(0x7f0000000bc0)="36251e313e0743fc195a1a198a14434e8a0a00b3f452a3b5644e336ec712a16310c9aecc4e3097bc666a8882128a73c368ce731e9fbf3fe18fa52d00c34ac2e57c1c4569cfbd6a621c6dfbc032121aed", 0x50, 0x20000000, &(0x7f0000000c40)={0xa, 0x4e20, 0x6, @dev={0xfe, 0x80, [], 0x19}, 0x1f}, 0x1c) sendmsg$nl_netfilter(r0, &(0x7f0000000680)={&(0x7f00000005c0)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f00004ca000)={&(0x7f0000000600)=ANY=[]}, 0x1}, 0x0) syz_fuseblk_mount(&(0x7f0000001380)='./file0\x00', &(0x7f00000013c0)='./file0\x00', 0xf000, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0xb21, 0x0) socket(0x1e, 0x3, 0x0) socket(0x1e, 0x0, 0x0) ptrace$PTRACE_SECCOMP_GET_FILTER(0x420c, 0x0, 0x0, &(0x7f0000000380)=""/113) sched_yield() ioctl$TUNGETIFF(r4, 0x800454d2, &(0x7f0000000140)) ioctl$TCSETSW(r1, 0x5403, &(0x7f0000000600)={0x2, 0x7344, 0x0, 0x6, 0xdc, 0x8000, 0x4, 0xffff, 0x0, 0x7, 0x82f, 0x8}) ioctl$KIOCSOUND(r4, 0x4b2f, 0xfffffffffffffb74) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x20, 0x9b}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$cuse(0xffffffffffffff9c, &(0x7f0000000200)='/dev/cuse\x00', 0x200100, 0x0) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000447000)='./file0\x00', &(0x7f00000e1000)='msdos\x00', 0x0, &(0x7f000097bfff)) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000580)='./cgroup/syz0\x00', 0x1ff) 2018/03/31 09:15:37 executing program 5: perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f000031f000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) prctl$void(0x0) getpid() r0 = syz_open_dev$vcsn(&(0x7f0000000040)='/dev/vcs#\x00', 0x0, 0x20000) ioctl$GIO_CMAP(r0, 0x4b70, &(0x7f0000000080)) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000080)={0x26, 'aead\x00', 0x0, 0x0, 'generic-gcm-aesni\x00'}, 0x58) syz_open_dev$sndmidi(&(0x7f0000000100)='/dev/snd/midiC#D#\x00', 0xfd, 0x0) bind(0xffffffffffffffff, &(0x7f0000000140)=@llc={0x1a, 0x33a, 0x7, 0x80, 0x5, 0x4, @remote={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xbb}}, 0x80) r2 = syz_init_net_socket$nfc_llcp(0x27, 0x1, 0x1) setsockopt$nfc_llcp_NFC_LLCP_MIUX(r2, 0x118, 0x15, &(0x7f0000000000), 0x4) r3 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/cuse\x00', 0x103002, 0x0) futimesat(r3, &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)={{0x0, 0x7530}}) r4 = syz_open_dev$vcsa(&(0x7f00000001c0)='/dev/vcsa#\x00', 0x2, 0x4020ff) sendto$inet6(0xffffffffffffffff, &(0x7f0000000bc0)="36251e313e0743fc195a1a198a14434e8a0a00b3f452a3b5644e336ec712a16310c9aecc4e3097bc666a8882128a73c368ce731e9fbf3fe18fa52d", 0x3b, 0x20000000, &(0x7f0000000c40)={0xa, 0x4e20, 0x6, @dev={0xfe, 0x80, [], 0x19}, 0x1f}, 0x1c) accept$alg(r0, 0x0, 0x0) r5 = request_key(&(0x7f0000000200)='syzkaller\x00', &(0x7f0000000240)={0x73, 0x79, 0x7a, 0x0}, &(0x7f00000002c0)='aead\x00', 0xfffffffffffffff8) keyctl$setperm(0x5, r5, 0x10) sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f0000000000)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x8}, 0xb4fcd35419244434, &(0x7f00004ca000)={&(0x7f0000000300)=ANY=[], 0x1a1}, 0x1}, 0x0) syz_fuseblk_mount(&(0x7f0000001380)='./file0\x00', &(0x7f00000013c0)='./file0\x00', 0xf000, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0xb21, 0x0) socket(0x1e, 0x3, 0x0) socket(0x1e, 0x0, 0x0) ptrace$PTRACE_SECCOMP_GET_FILTER(0x420c, 0x0, 0x0, &(0x7f0000000380)=""/113) sched_yield() ioctl$TUNGETIFF(r4, 0x800454d2, &(0x7f0000000140)) ioctl$KIOCSOUND(r4, 0x4b2f, 0xfffffffffffffb74) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x20, 0x9b}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000447000)='./file0\x00', &(0x7f00000e1000)='msdos\x00', 0x0, &(0x7f000097bfff)) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000580)='./cgroup/syz0\x00', 0x1ff) syz_open_dev$audion(&(0x7f0000000280)='/dev/audio#\x00', 0x7be, 0x0) 2018/03/31 09:15:37 executing program 6: perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f000031f000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) prctl$void(0x0) getpid() r0 = syz_open_dev$vcsn(&(0x7f0000000040)='/dev/vcs#\x00', 0x0, 0x20000) ioctl$GIO_CMAP(r0, 0x4b70, &(0x7f0000000080)) r1 = socket$alg(0x26, 0x5, 0x0) ioctl$sock_SIOCGIFBR(0xffffffffffffffff, 0x8940, &(0x7f0000000040)=@get={0x1, &(0x7f0000000400)=""/242, 0x100000000}) bind$alg(r1, &(0x7f0000000080)={0x26, 'aead\x00', 0x0, 0x0, 'generic-gcm-aesni\x00'}, 0x58) syz_open_dev$sndmidi(&(0x7f0000000100)='/dev/snd/midiC#D#\x00', 0xfd, 0x0) bind(0xffffffffffffffff, &(0x7f0000000140)=@llc={0x1a, 0x33a, 0x7, 0x80, 0x0, 0x4, @remote={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xbb}}, 0x80) r2 = syz_init_net_socket$nfc_llcp(0x27, 0x1, 0x1) setsockopt$nfc_llcp_NFC_LLCP_MIUX(r2, 0x118, 0x15, &(0x7f0000000000), 0x4) r3 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/cuse\x00', 0x103002, 0x0) futimesat(r3, &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)={{0x0, 0x7530}}) r4 = syz_open_dev$vcsa(&(0x7f00000001c0)='/dev/vcsa#\x00', 0x2, 0x0) sendto$inet6(r4, &(0x7f0000000bc0), 0x0, 0x20000000, &(0x7f0000000c40)={0xa, 0x4e20, 0x0, @dev={0xfe, 0x80, [], 0x19}, 0x1f}, 0x1c) accept$alg(r0, 0x0, 0x0) sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f0000000000)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x8}, 0xb4fcd35419244434, &(0x7f00004ca000)={&(0x7f0000000300)=ANY=[], 0x1a1}, 0x1}, 0x0) syz_fuseblk_mount(&(0x7f0000001380)='./file0\x00', &(0x7f00000013c0)='./file0\x00', 0xf000, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0xb21, 0x0) socket(0x1e, 0x3, 0x0) socket(0x1e, 0x0, 0x0) ptrace$PTRACE_SECCOMP_GET_FILTER(0x420c, 0x0, 0x0, &(0x7f0000000380)=""/113) sched_yield() ioctl$TUNGETIFF(r4, 0x800454d2, &(0x7f0000000140)) ioctl$KIOCSOUND(r4, 0x4b2f, 0xfffffffffffffb74) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x20}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000447000)='./file0\x00', &(0x7f00000e1000)='msdos\x00', 0x0, &(0x7f000097bfff)) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000580)='./cgroup/syz0\x00', 0x1ff) 2018/03/31 09:15:37 executing program 3: r0 = syz_open_dev$random(&(0x7f0000000480)='/dev/random\x00', 0x0, 0x800000000800) r1 = syz_open_dev$loop(&(0x7f0000308000)='/dev/loop#\x00', 0x0, 0x0) ioctl$LOOP_SET_STATUS(r1, 0xc0481273, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "3900ea631d00000000020000010000009f00000023f7b7d65f90b0e6330ee739b319d8f6aa6bd58d1443474482e85040fb4947ebb55bd19f335b5bffff0001f3", "cfa430745a540dc1c149b7b81579f6a41c51f7d51933223e82ab867dac761faf"}) write(0xffffffffffffffff, &(0x7f00000001c0), 0x0) setsockopt$inet_sctp6_SCTP_RECVNXTINFO(0xffffffffffffffff, 0x84, 0x21, &(0x7f00000003c0)=0x200, 0x4) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f00000000c0)=0x0) getsockopt$netrom_NETROM_T4(0xffffffffffffffff, 0x103, 0x6, &(0x7f0000000500)=0x8, &(0x7f00000004c0)=0x4) r3 = getpid() sched_setparam(r3, &(0x7f0000000400)) syz_open_dev$loop(&(0x7f0000ca9ff5)='/dev/loop#\x00', 0x0, 0x82) r4 = memfd_create(&(0x7f0000614000)="74086e750000000000000000008c00", 0x0) pwritev(r4, &(0x7f0000f50f90)=[{&(0x7f0000000040)="aa", 0x1}], 0x1, 0x0) fcntl$getownex(r1, 0x10, &(0x7f0000000240)={0x0, 0x0}) r6 = syz_open_procfs(r5, &(0x7f0000000280)='stat\x00') epoll_ctl$EPOLL_CTL_MOD(r4, 0x3, r0, &(0x7f00000002c0)={0x20000010}) accept4$inet6(r4, &(0x7f0000000100)={0x0, 0x0, 0x0, @mcast1}, &(0x7f0000000140)=0x1c, 0x7fd) getsockopt$inet_IP_IPSEC_POLICY(r4, 0x0, 0x10, &(0x7f0000000940)={{{@in6=@local, @in6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@loopback}, 0x0, @in=@local}}, &(0x7f0000000780)=0xe8) getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f00000007c0)={0x0, 0x0, 0x0}, &(0x7f0000000540)=0xc) fchown(r4, r7, r8) r9 = syz_open_dev$binder(&(0x7f0000000380)='/dev/binder#\x00', 0xffffffffffffffff, 0x806) ioctl$BINDER_SET_CONTEXT_MGR(r6, 0x40046207, 0x0) mmap$binder(&(0x7f000000c000/0x2000)=nil, 0x2000, 0x0, 0x12, r9, 0x0) ioctl$BINDER_WRITE_READ(r9, 0xc0306201, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000), 0x0, 0x0, &(0x7f0000011f9d)}) getsockopt$inet_sctp6_SCTP_AUTO_ASCONF(0xffffffffffffffff, 0x84, 0x1e, &(0x7f0000000140), &(0x7f0000000180)=0x4) ioctl$BINDER_WRITE_READ(r9, 0xc0306201, &(0x7f0000000340)={0x8, 0x0, &(0x7f0000000440)=ANY=[@ANYRES64=r1], 0x0, 0x0, &(0x7f0000000240)}) write(0xffffffffffffffff, &(0x7f0000000300)="8be25f5790f664f32509e40d6f879d5add7e2d359c9a19afb750a2d25352875d187d4118c99a2d5c6db433c277cc7d345b87a34f1b417033d367cb0cfd6a25633f77aafb17e99c33cb65352c901ae75176f07bb0a4bb5ebff3d87e", 0x5b) r10 = ioctl$LOOP_CTL_GET_FREE(r4, 0x4c82) ioctl$LOOP_CTL_REMOVE(r6, 0x4c81, r10) openat$cgroup(0xffffffffffffff9c, &(0x7f0000000000)='syz0\x00', 0x200002, 0x0) sched_setaffinity(r2, 0x8, &(0x7f0000000200)=0x7) 2018/03/31 09:15:37 executing program 7 (fault-call:24 fault-nth:24): perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f000031f000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getpid() r0 = syz_open_dev$vcsn(&(0x7f0000000040)='/dev/vcs#\x00', 0x0, 0x20000) ioctl$GIO_CMAP(r0, 0x4b70, &(0x7f0000000080)) r1 = socket$alg(0x26, 0x5, 0x0) ioctl$sock_SIOCGIFBR(r1, 0x8940, &(0x7f0000000040)=@get={0x1, &(0x7f0000000400)=""/242, 0x100000000}) bind$alg(r1, &(0x7f0000000080)={0x26, 'aead\x00', 0x0, 0x0, 'generic-gcm-aesni\x00'}, 0x58) syz_open_dev$sndmidi(&(0x7f0000000100)='/dev/snd/midiC#D#\x00', 0xfd, 0x0) bind(0xffffffffffffffff, &(0x7f0000000140)=@llc={0x1a, 0x33a, 0x7, 0x80, 0x5, 0x4, @remote={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xbb}}, 0x80) r2 = syz_init_net_socket$nfc_llcp(0x27, 0x1, 0x1) setsockopt$nfc_llcp_NFC_LLCP_MIUX(r2, 0x118, 0x15, &(0x7f0000000000), 0x4) r3 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/cuse\x00', 0x103002, 0x0) futimesat(r3, &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)={{0x0, 0x7530}}) r4 = syz_open_dev$vcsa(&(0x7f00000001c0)='/dev/vcsa#\x00', 0x2, 0x4020ff) sendto$inet6(r4, &(0x7f0000000bc0)="36251e313e0743fc195a1a198a14434e8a0a00b3f452a3b5644e336ec712a16310c9aecc4e3097bc666a8882128a73c368ce731e9fbf3fe18fa52d00", 0x3c, 0x20000000, &(0x7f0000000c40)={0xa, 0x0, 0x6, @dev={0xfe, 0x80, [], 0x19}, 0x1f}, 0x1c) accept$alg(r0, 0x0, 0x0) sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f0000000000)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x8}, 0xb4fcd35419244434, &(0x7f00004ca000)={&(0x7f0000000300)=ANY=[], 0x1a1}, 0x1}, 0x0) syz_fuseblk_mount(&(0x7f0000001380)='./file0\x00', &(0x7f00000013c0)='./file0\x00', 0xf000, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0xb21, 0x0) socket(0x1e, 0x3, 0x0) socket(0x1e, 0x0, 0x0) ptrace$PTRACE_SECCOMP_GET_FILTER(0x420c, 0x0, 0x0, &(0x7f0000000380)=""/113) sched_yield() ioctl$TUNGETIFF(r4, 0x800454d2, &(0x7f0000000140)) ioctl$KIOCSOUND(r4, 0x4b2f, 0xfffffffffffffb74) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000447000)='./file0\x00', &(0x7f00000e1000)='msdos\x00', 0x0, &(0x7f000097bfff)) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000580)='./cgroup/syz0\x00', 0x1ff) syz_open_dev$audion(&(0x7f0000000280)='/dev/audio#\x00', 0x7be, 0x0) 2018/03/31 09:15:37 executing program 4: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000000000, 0x0, 0x0, 0x0, 0x800, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x20, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f000031f000)}}, 0x0, 0x3, 0xffffffffffffffff, 0x0) prctl$void(0x0) r0 = getpid() process_vm_readv(r0, &(0x7f00000002c0)=[{&(0x7f0000000280)=""/32, 0x20}, {&(0x7f00000005c0)=""/196, 0xc4}], 0x2, &(0x7f0000000800)=[{&(0x7f0000001400)=""/4096, 0x1000}, {&(0x7f0000000300)=""/123, 0x7b}, {&(0x7f00000006c0)=""/163, 0xa3}, {&(0x7f0000000500)=""/28, 0x1c}, {&(0x7f0000000780)=""/70, 0x46}], 0x5, 0x0) r1 = syz_open_dev$vcsn(&(0x7f0000000400)='/dev/vcs#\x00', 0x4, 0x20001) ioctl$GIO_CMAP(r1, 0x4b70, &(0x7f0000000080)) r2 = socket$alg(0x26, 0x5, 0x0) ioctl$sock_SIOCGIFBR(0xffffffffffffffff, 0x8940, &(0x7f0000000040)=@get={0x1, &(0x7f0000000880)=""/255, 0x15}) bind$alg(r2, &(0x7f0000000080)={0x26, 'aead\x00', 0x0, 0x0, 'generic-gcm-aesni\x00'}, 0x58) syz_open_dev$sndmidi(&(0x7f0000000100)='/dev/snd/midiC#D#\x00', 0xfd, 0x0) bind(0xffffffffffffffff, &(0x7f0000000140)=@llc={0x1a, 0x33a, 0x7, 0x80, 0x0, 0x4, @remote={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xbb}}, 0x80) r3 = syz_init_net_socket$nfc_llcp(0x27, 0x1, 0x1) setsockopt$nfc_llcp_NFC_LLCP_MIUX(r3, 0x118, 0x15, &(0x7f0000000200), 0x4) r4 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/cuse\x00', 0x103002, 0x0) futimesat(r4, &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)={{0x0, 0x7530}}) r5 = syz_open_dev$vcsa(&(0x7f00000001c0)='/dev/vcsa#\x00', 0x2, 0x0) sendto$inet6(r5, &(0x7f0000000bc0), 0x0, 0x20000000, &(0x7f0000000c40)={0xa, 0x4e20, 0x0, @dev={0xfe, 0x80, [], 0x19}, 0x1f}, 0x1c) accept$alg(r1, 0x0, 0x0) sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f0000000000)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x8}, 0xb4fcd35419244434, &(0x7f00004ca000)={&(0x7f0000000300)=ANY=[], 0x1a1}, 0x1}, 0x0) syz_fuseblk_mount(&(0x7f0000001380)='./file0\x00', &(0x7f00000013c0)='./file0\x00', 0xf000, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0xb21, 0x0) r6 = socket(0x1e, 0x3, 0x0) socket(0x1e, 0x0, 0x0) ptrace$PTRACE_SECCOMP_GET_FILTER(0x420c, 0x0, 0x10000000, &(0x7f0000000380)=""/113) sched_yield() ioctl$TUNGETIFF(r5, 0x800454d2, &(0x7f0000000140)) ioctl$KIOCSOUND(r5, 0x4b2f, 0xfffffffffffffb74) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000, 0x5, 0x40000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x20, 0x9b}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000447000)='./file0\x00', &(0x7f00000e1000)='msdos\x00', 0x0, &(0x7f000097bfff)) ioctl$sock_inet_udp_SIOCINQ(r6, 0x541b, &(0x7f0000000240)) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000580)='./cgroup/syz0\x00', 0x1ff) [ 330.882937] FAT-fs (loop199): unable to read boot sector [ 330.887248] binder: 31742:31743 unknown command 20 [ 330.900995] FAT-fs (loop199): unable to read boot sector [ 330.917147] binder: 31742:31743 ioctl c0306201 20000340 returned -22 [ 330.918082] FAULT_INJECTION: forcing a failure. [ 330.918082] name failslab, interval 1, probability 0, space 0, times 0 [ 330.934982] CPU: 1 PID: 31750 Comm: syz-executor7 Not tainted 4.16.0-rc7+ #8 [ 330.942162] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 330.951501] Call Trace: [ 330.954080] dump_stack+0x194/0x24d [ 330.957700] ? arch_local_irq_restore+0x53/0x53 [ 330.962365] ? kernel_text_address+0xd1/0xe0 [ 330.966769] ? __unwind_start+0x169/0x330 [ 330.970917] should_fail+0x8c0/0xa40 [ 330.974633] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 330.979742] ? kasan_kmalloc+0xad/0xe0 [ 330.983619] ? __kmalloc+0x162/0x760 [ 330.987326] ? __list_lru_init+0xcf/0x750 [ 330.991470] ? find_held_lock+0x35/0x1d0 [ 330.994260] binder: 31742:31761 unknown command 26 [ 330.995529] ? __lock_is_held+0xb6/0x140 [ 330.995553] ? check_same_owner+0x320/0x320 [ 330.995571] ? rcu_note_context_switch+0x710/0x710 [ 330.995589] should_failslab+0xec/0x120 [ 330.995599] kmem_cache_alloc_node_trace+0x5a/0x760 [ 331.006109] binder: 31742:31761 ioctl c0306201 20000340 returned -22 [ 331.008853] ? mark_held_locks+0xaf/0x100 [ 331.008864] ? __raw_spin_lock_init+0x1c/0x100 [ 331.008880] __kmalloc_node+0x33/0x70 [ 331.008894] kvmalloc_node+0x99/0xd0 [ 331.008906] __list_lru_init+0x5d5/0x750 [ 331.008919] ? memcg_destroy_list_lru_node.isra.7+0x110/0x110 [ 331.008930] ? trace_hardirqs_on_caller+0x421/0x5c0 [ 331.060324] ? lockdep_init_map+0x9/0x10 [ 331.064378] sget_userns+0x6b1/0xe40 [ 331.068077] ? kill_litter_super+0x90/0x90 [ 331.072303] ? ns_test_super+0x50/0x50 [ 331.076183] ? destroy_unused_super.part.6+0xd0/0xd0 [ 331.081276] ? do_raw_spin_trylock+0x190/0x190 [ 331.085853] ? kobject_put+0x6b/0x250 [ 331.089647] ? blkdev_get+0x3a1/0xb00 [ 331.093442] ? cap_capable+0x1b5/0x230 [ 331.097316] ? __blkdev_get+0x13b0/0x13b0 [ 331.101454] ? security_capable+0x8e/0xc0 [ 331.105594] ? kill_litter_super+0x90/0x90 [ 331.109817] ? ns_capable_common+0xcf/0x160 [ 331.114126] ? ns_test_super+0x50/0x50 [ 331.117999] ? kill_litter_super+0x90/0x90 [ 331.122221] sget+0xd2/0x120 [ 331.125232] mount_bdev+0x109/0x370 [ 331.128846] ? msdos_mount+0x40/0x40 [ 331.132549] msdos_mount+0x34/0x40 [ 331.136080] mount_fs+0x66/0x2d0 [ 331.139439] vfs_kern_mount.part.26+0xc6/0x4a0 [ 331.144012] ? may_umount+0xa0/0xa0 [ 331.147632] ? _raw_read_unlock+0x22/0x30 [ 331.151767] ? __get_fs_type+0x8a/0xc0 [ 331.155646] do_mount+0xea4/0x2bb0 [ 331.159179] ? copy_mount_string+0x40/0x40 [ 331.163403] ? trace_hardirqs_on_caller+0x421/0x5c0 [ 331.168407] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 331.173156] ? retint_kernel+0x10/0x10 [ 331.177040] ? copy_mount_options+0x18b/0x2e0 [ 331.181523] ? copy_mount_options+0x193/0x2e0 [ 331.186006] ? copy_mount_options+0x1f7/0x2e0 [ 331.190490] SyS_mount+0xab/0x120 [ 331.193932] ? copy_mnt_ns+0xb30/0xb30 [ 331.197812] do_syscall_64+0x281/0x940 [ 331.201685] ? vmalloc_sync_all+0x30/0x30 [ 331.205820] ? _raw_spin_unlock_irq+0x27/0x70 [ 331.210302] ? finish_task_switch+0x1c1/0x7e0 [ 331.214788] ? syscall_return_slowpath+0x550/0x550 [ 331.219709] ? syscall_return_slowpath+0x2ac/0x550 [ 331.224628] ? prepare_exit_to_usermode+0x350/0x350 [ 331.229634] ? entry_SYSCALL_64_after_hwframe+0x52/0xb7 [ 331.234988] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 331.239826] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 331.245003] RIP: 0033:0x454e79 [ 331.248181] RSP: 002b:00007f37fba8ec68 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 331.255879] RAX: ffffffffffffffda RBX: 00007f37fba8f6d4 RCX: 0000000000454e79 [ 331.263137] RDX: 00000000200e1000 RSI: 0000000020447000 RDI: 0000000020000000 [ 331.270394] RBP: 000000000072bea0 R08: 000000002097bfff R09: 0000000000000000 [ 331.277653] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000019 [ 331.284908] R13: 00000000000003fa R14: 00000000006f8010 R15: 0000000000000018 [ 331.298412] FAT-fs (loop199): unable to read boot sector [ 331.311407] FAT-fs (loop199): unable to read boot sector [ 331.321085] FAT-fs (loop199): unable to read boot sector [ 331.345119] FAT-fs (loop199): unable to read boot sector [ 331.353483] FAT-fs (loop199): unable to read boot sector [ 331.369189] FAT-fs (loop199): unable to read boot sector 2018/03/31 09:15:38 executing program 7 (fault-call:24 fault-nth:25): perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f000031f000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getpid() r0 = syz_open_dev$vcsn(&(0x7f0000000040)='/dev/vcs#\x00', 0x0, 0x20000) ioctl$GIO_CMAP(r0, 0x4b70, &(0x7f0000000080)) r1 = socket$alg(0x26, 0x5, 0x0) ioctl$sock_SIOCGIFBR(r1, 0x8940, &(0x7f0000000040)=@get={0x1, &(0x7f0000000400)=""/242, 0x100000000}) bind$alg(r1, &(0x7f0000000080)={0x26, 'aead\x00', 0x0, 0x0, 'generic-gcm-aesni\x00'}, 0x58) syz_open_dev$sndmidi(&(0x7f0000000100)='/dev/snd/midiC#D#\x00', 0xfd, 0x0) bind(0xffffffffffffffff, &(0x7f0000000140)=@llc={0x1a, 0x33a, 0x7, 0x80, 0x5, 0x4, @remote={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xbb}}, 0x80) r2 = syz_init_net_socket$nfc_llcp(0x27, 0x1, 0x1) setsockopt$nfc_llcp_NFC_LLCP_MIUX(r2, 0x118, 0x15, &(0x7f0000000000), 0x4) r3 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/cuse\x00', 0x103002, 0x0) futimesat(r3, &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)={{0x0, 0x7530}}) r4 = syz_open_dev$vcsa(&(0x7f00000001c0)='/dev/vcsa#\x00', 0x2, 0x4020ff) sendto$inet6(r4, &(0x7f0000000bc0)="36251e313e0743fc195a1a198a14434e8a0a00b3f452a3b5644e336ec712a16310c9aecc4e3097bc666a8882128a73c368ce731e9fbf3fe18fa52d00", 0x3c, 0x20000000, &(0x7f0000000c40)={0xa, 0x0, 0x6, @dev={0xfe, 0x80, [], 0x19}, 0x1f}, 0x1c) accept$alg(r0, 0x0, 0x0) sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f0000000000)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x8}, 0xb4fcd35419244434, &(0x7f00004ca000)={&(0x7f0000000300)=ANY=[], 0x1a1}, 0x1}, 0x0) syz_fuseblk_mount(&(0x7f0000001380)='./file0\x00', &(0x7f00000013c0)='./file0\x00', 0xf000, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0xb21, 0x0) socket(0x1e, 0x3, 0x0) socket(0x1e, 0x0, 0x0) ptrace$PTRACE_SECCOMP_GET_FILTER(0x420c, 0x0, 0x0, &(0x7f0000000380)=""/113) sched_yield() ioctl$TUNGETIFF(r4, 0x800454d2, &(0x7f0000000140)) ioctl$KIOCSOUND(r4, 0x4b2f, 0xfffffffffffffb74) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000447000)='./file0\x00', &(0x7f00000e1000)='msdos\x00', 0x0, &(0x7f000097bfff)) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000580)='./cgroup/syz0\x00', 0x1ff) syz_open_dev$audion(&(0x7f0000000280)='/dev/audio#\x00', 0x7be, 0x0) [ 331.684575] IPVS: ftp: loaded support on port[0] = 21 2018/03/31 09:15:38 executing program 3: r0 = syz_open_dev$random(&(0x7f00000001c0)='/dev/random\x00', 0x0, 0x800) r1 = syz_open_dev$loop(&(0x7f0000308000)='/dev/loop#\x00', 0x0, 0x0) ioctl$LOOP_SET_STATUS(r1, 0xc0481273, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "3900ea631d00000000020000010000009f00000023f7b7d65f90b0e6330ee739b319d8f6aa6bd58d1443474482e85040fb4947ebb55bd19f335b5bffff0001f3", "cfa430745a540dc1c149b7b81579f6a41c51f7d51933223e82ab867dac761faf"}) write(0xffffffffffffffff, &(0x7f00000001c0), 0x0) setsockopt$inet_sctp6_SCTP_RECVNXTINFO(0xffffffffffffffff, 0x84, 0x21, &(0x7f00000003c0)=0x200, 0x4) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f00000000c0)=0x0) getsockopt$netrom_NETROM_T4(0xffffffffffffffff, 0x103, 0x6, &(0x7f0000000300)=0x8, &(0x7f0000000340)=0x4) r3 = getpid() sched_setparam(r3, &(0x7f0000000400)) syz_open_dev$loop(&(0x7f0000ca9ff5)='/dev/loop#\x00', 0x0, 0x82) r4 = memfd_create(&(0x7f0000614000)="74086e750000000000000000008c00", 0x0) pwritev(r4, &(0x7f0000f50f90)=[{&(0x7f0000000040)="aa", 0x1}], 0x1, 0x0) fcntl$getownex(r1, 0x10, &(0x7f0000000240)={0x0, 0x0}) r6 = syz_open_procfs(r5, &(0x7f0000000280)='stat\x00') epoll_ctl$EPOLL_CTL_MOD(r4, 0x3, r0, &(0x7f00000002c0)={0x20000010}) accept4$inet6(r4, &(0x7f0000000480)={0x0, 0x0, 0x0, @mcast1}, &(0x7f0000000140)=0x1c, 0x7fd) getsockopt$inet_IP_IPSEC_POLICY(r4, 0x0, 0x10, &(0x7f0000000940)={{{@in6=@local, @in6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@loopback}, 0x0, @in=@local}}, &(0x7f0000000780)=0xe8) getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f00000007c0)={0x0, 0x0, 0x0}, &(0x7f0000000540)=0xc) fchown(r4, r7, r8) r9 = syz_open_dev$binder(&(0x7f0000000100)='/dev/binder#\x00', 0xffffffffffffffff, 0x806) ioctl$BINDER_SET_CONTEXT_MGR(r6, 0x40046207, 0x0) mmap$binder(&(0x7f000000c000/0x2000)=nil, 0x2000, 0x0, 0x12, r9, 0x0) ioctl$BINDER_WRITE_READ(r9, 0xc0306201, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000), 0x0, 0x0, &(0x7f0000011f9d)}) getsockopt$inet_sctp6_SCTP_AUTO_ASCONF(0xffffffffffffffff, 0x84, 0x1e, &(0x7f0000000140), &(0x7f0000000180)=0x4) ioctl$BINDER_WRITE_READ(r9, 0xc0306201, &(0x7f0000000340)={0x8, 0x0, &(0x7f0000000440)=ANY=[@ANYRES64=r1], 0x0, 0x0, &(0x7f0000000240)}) write(0xffffffffffffffff, &(0x7f0000000300)="8be25f5790f664f32509e40d6f879d5add7e2d359c9a19afb750a2d25352875d187d4118c99a2d5c6db433c277cc7d345b87a34f1b417033d367cb0cfd6a25633f77aafb17e99c33cb65352c901ae75176f07bb0a4bb5ebff3d87e", 0x5b) r10 = ioctl$LOOP_CTL_GET_FREE(r4, 0x4c82) ioctl$LOOP_CTL_REMOVE(r6, 0x4c81, r10) openat$cgroup(0xffffffffffffff9c, &(0x7f0000000000)='syz0\x00', 0x200002, 0x0) sched_setaffinity(r2, 0x8, &(0x7f0000000200)=0x7) 2018/03/31 09:15:38 executing program 5: perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f000031f000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) prctl$void(0x0) getpid() r0 = syz_open_dev$vcsn(&(0x7f0000000040)='/dev/vcs#\x00', 0x0, 0x20000) ioctl$GIO_CMAP(r0, 0x4b70, &(0x7f0000000080)) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f00000002c0)={0x26, 'hash\x00', 0x0, 0x0, 'rmd128-generic\x00'}, 0x58) r2 = syz_open_dev$sndmidi(&(0x7f0000000100)='/dev/snd/midiC#D#\x00', 0xfd, 0x0) bind(0xffffffffffffffff, &(0x7f0000000140)=@llc={0x1a, 0x33a, 0x7, 0x80, 0x5, 0x4, @remote={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xbb}}, 0x80) r3 = syz_init_net_socket$nfc_llcp(0x27, 0x1, 0x1) setsockopt$nfc_llcp_NFC_LLCP_MIUX(r3, 0x118, 0x15, &(0x7f0000000000), 0x4) r4 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/cuse\x00', 0x103002, 0x0) futimesat(r4, &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)={{0x0, 0x7530}}) r5 = syz_open_dev$vcsa(&(0x7f00000001c0)='/dev/vcsa#\x00', 0x2, 0x4020ff) sendto$inet6(0xffffffffffffffff, &(0x7f0000000bc0)="36251e313e0743fc195a1a198a14434e8a0a00b3f452a3b5644e336ec712a16310c9aecc4e3097bc666a8882128a73c368ce731e9fbf3fe18fa52d", 0x3b, 0x20000000, &(0x7f0000000c40)={0xa, 0x4e20, 0x6, @dev={0xfe, 0x80, [], 0x19}, 0x1f}, 0x1c) accept$alg(r0, 0x0, 0x0) sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f0000000000)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x8}, 0xb4fcd35419244434, &(0x7f00004ca000)={&(0x7f0000000300)=ANY=[], 0x1a1}, 0x1}, 0x0) syz_fuseblk_mount(&(0x7f0000001380)='./file0\x00', &(0x7f00000013c0)='./file0\x00', 0xf000, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0xb21, 0x0) socket(0x1e, 0x3, 0x0) socket(0x1e, 0x0, 0x0) ptrace$PTRACE_SECCOMP_GET_FILTER(0x420c, 0x0, 0x0, &(0x7f0000000380)=""/113) ioctl$TUNGETIFF(r5, 0x800454d2, &(0x7f0000000140)) ioctl$KIOCSOUND(r5, 0x4b2f, 0xfffffffffffffb74) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x20, 0x9b}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000447000)='./file0\x00', &(0x7f00000e1000)='msdos\x00', 0x0, &(0x7f000097bfff)) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000580)='./cgroup/syz0\x00', 0x1ff) syz_open_dev$audion(&(0x7f0000000280)='/dev/audio#\x00', 0x7be, 0x0) openat$sequencer(0xffffffffffffff9c, &(0x7f0000000540)='/dev/sequencer\x00', 0xbb4b13f31e4d7ecc, 0x0) writev(r2, &(0x7f0000000780)=[{&(0x7f0000000200)="ecc991431fe6eeba7c651608c957bbab0fff045b6d46e6335b", 0x19}, {&(0x7f0000000400)="530eba88ab5aff445ccd58466138478da53eaf270f76fbbdaad821989d8ad8210ff2039f51f1a87a41be5f0ce9b0ac7294fb5da2dd0b247f2232db097d6740480dc67ea87a580073a6c3867f876aa8f7714a7dc0c7f8c43513de94c1284b330a8395c07e0dce8c6396dfc1b14f1d2bfb6df11cce61775d561f254d6591985631dcd72615b9b15641d207752cf72315", 0x8f}, {&(0x7f00000004c0)="8c76035d3d451fdee46679f7028a4c5cfe112fe7c32ce293922c733104458ef568fa3bc638bbc48c0d82773e3211ce0440867033b2925c1f688df97768b7e87db233c88a15f1fd9fddf380d8", 0x4c}, {&(0x7f00000005c0)="a0a7487542f283de3669cf563e3c2228a6ed6d035f45be238d7b89f7a405c3f065bd271356fcae3cb97ae91d93cc6a137890cea6fa297009792d7ef0fbcbca8d614193c0d233f8fe06c22d4a9bc67a83e4506707d6817b0473ad1afc26d80cd4d2f8bfe7802bfdbe2a1c75025ef29df6c6dd2a5337386fef2a9bb879ab8f3376ed64f34d3b38861d6be1eb98e93b7266549b89c788979c16b244429dc85e550d16a3c36102aca31aa490497776c76cf546d8b060112e47e72060267d8e", 0xbd}, {&(0x7f0000000680)="701baef6a4fc48ef92d80b58c733ad9a4fcba3caee3d3da2b98814f5db4b11efebd09d393df1de0201b122861082f0fad3a10ab0bcd777f4e387474c36d91a322e4980b6be1956fdd179e80cd95838f54727fd437adaab043ac158394f796991981330c92c5de9b7a16d13ef6de06622e001b5f02abe9fc6d06f69861f535b5009b38113e73ba2c0811228265b126daed64a07a14564c36d73e5e95d05d36208146e43e60e20c34b0d48939308b7a23e22dc9c4f7b93902a011a97635b36ba8f2c4ad497b3fe9238b44cf7f4fedae3d7c11b2c141b5db23344c84403833573149476469e29197a40165771a34f86780ac8a11100", 0xf4}, {&(0x7f0000000240)="0dd1223dd66c53f5dd07b5030d5659db692fbb8de4e7a505f8f5ebe2662cb76bf50d24a6b6a019f07fe0a4d3606349fb0bca055068d6a72a683cea59c2ba08", 0x3f}], 0x6) setsockopt$IP_VS_SO_SET_EDIT(r2, 0x0, 0x483, &(0x7f0000000340)={0x2f, @loopback=0x7f000001, 0x4e21, 0x0, 'none\x00', 0x20, 0x3, 0x38}, 0x2c) 2018/03/31 09:15:38 executing program 4: perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f000031f000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) prctl$void(0x0) getpid() r0 = syz_open_dev$vcsn(&(0x7f0000000040)='/dev/vcs#\x00', 0x0, 0x20000) ioctl$GIO_CMAP(r0, 0x4b70, &(0x7f0000000080)) r1 = socket$alg(0x26, 0x5, 0x0) ioctl$sock_SIOCGIFBR(0xffffffffffffffff, 0x8940, &(0x7f0000000040)=@get={0x1, &(0x7f0000000400)=""/242, 0x100000000}) bind$alg(r1, &(0x7f0000000080)={0x26, 'aead\x00', 0x0, 0x0, 'generic-gcm-aesni\x00'}, 0x58) syz_open_dev$sndmidi(&(0x7f0000000100)='/dev/snd/midiC#D#\x00', 0xfd, 0x0) bind(0xffffffffffffffff, &(0x7f0000000140)=@llc={0x1a, 0x33a, 0x7, 0x80, 0x0, 0x4, @remote={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xbb}}, 0x80) r2 = syz_init_net_socket$nfc_llcp(0x27, 0x1, 0x1) r3 = socket$inet6(0xa, 0x1, 0x0) bind$inet6(r3, &(0x7f000044f000)={0xa, 0x4e20, 0x0, @ipv4={[], [0xff, 0xff]}}, 0x1c) listen(r3, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r3, 0x29, 0x23, &(0x7f0000000340)={{{@in=@local={0xac, 0x14, 0x14, 0xaa}, @in=@multicast1=0xe0000001, 0x0, 0x0, 0x0, 0x0, 0x2}}, {{@in6=@mcast2={0xff, 0x2, [], 0x1}, 0x0, 0x32}, 0x0, @in=@rand_addr}}, 0xe8) syz_emit_ethernet(0x230, &(0x7f0000007000)={@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, @random="cf2bb43c40b8", [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x6, 0x0, @local={0xac, 0x14, 0xffffffffffffffff, 0xaa}, @multicast1=0xe0000001}, @tcp={{0x0, 0x4e20, 0x42424242, 0x42424242, 0x0, 0x0, 0x5}}}}}}, 0x0) setsockopt$nfc_llcp_NFC_LLCP_MIUX(r2, 0x118, 0x15, &(0x7f0000000000), 0x4) r4 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000340)='/dev/cuse\x00', 0x40000000201, 0x0) futimesat(r4, &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)={{0x0, 0x7530}}) ioctl$TIOCSLCKTRMIOS(r0, 0x5457, &(0x7f0000000200)) r5 = syz_open_dev$vcsa(&(0x7f00000001c0)='/dev/vcsa#\x00', 0x2, 0x0) sendto$inet6(r5, &(0x7f0000000bc0), 0x0, 0x20000000, &(0x7f0000000c40)={0xa, 0x4e20, 0x0, @dev={0xfe, 0x80, [], 0x19}, 0x1f}, 0x1c) accept$alg(r0, 0x0, 0x0) sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f0000000000)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x8}, 0xb4fcd35419244434, &(0x7f00004ca000)={&(0x7f0000000300)=ANY=[], 0x1a1}, 0x1}, 0x0) syz_fuseblk_mount(&(0x7f0000001380)='./file0\x00', &(0x7f00000013c0)='./file0\x00', 0xf000, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0xb21, 0x0) socket(0x1e, 0x3, 0x0) socket(0x1e, 0x0, 0x0) ptrace$PTRACE_SECCOMP_GET_FILTER(0x420c, 0x0, 0x0, &(0x7f0000000380)=""/113) sched_yield() ioctl$TUNGETIFF(r5, 0x800454d2, &(0x7f0000000140)) 2018/03/31 09:15:38 executing program 1: perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f000031f000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) prctl$void(0x0) getpid() syz_open_dev$vcsn(&(0x7f0000000040)='/dev/vcs#\x00', 0x400, 0x20000) r0 = socket$alg(0x26, 0x5, 0x0) ioctl$sock_SIOCGIFBR(r0, 0x8940, &(0x7f0000000040)=@get={0x1, &(0x7f0000000400)=""/242, 0x100000000}) bind$alg(r0, &(0x7f0000000080)={0x26, 'aead\x00', 0x0, 0x0, 'generic-gcm-aesni\x00'}, 0x58) r1 = syz_open_dev$sndmidi(&(0x7f0000000100)='/dev/snd/midiC#D#\x00', 0xfd, 0x0) bind(r1, &(0x7f0000000140)=@llc={0x1a, 0x33a, 0x7, 0x80, 0x0, 0x4, @remote={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xbb}}, 0x80) r2 = syz_init_net_socket$nfc_llcp(0x27, 0x2, 0x1) setsockopt$nfc_llcp_NFC_LLCP_MIUX(r2, 0x118, 0x15, &(0x7f0000000000), 0x4) r3 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/cuse\x00', 0x103002, 0x0) futimesat(r3, &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)={{0x0, 0x7530}}) r4 = syz_open_dev$vcsa(&(0x7f00000001c0)='/dev/vcsa#\x00', 0x2, 0x4020ff) sendto$inet6(r4, &(0x7f0000000bc0), 0x0, 0x20000000, &(0x7f0000000c40)={0xa, 0x4e20, 0x6, @dev={0xfe, 0x80, [], 0x19}, 0x1f}, 0x1c) sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f0000000000)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x8}, 0xb4fcd35419244434, &(0x7f00004ca000)={&(0x7f0000000300)=ANY=[], 0x1a1}, 0x1}, 0x0) syz_fuseblk_mount(&(0x7f0000001380)='./file0\x00', &(0x7f00000013c0)='./file0\x00', 0xf000, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0xb21, 0x0) socket(0x1e, 0x3, 0x0) ptrace$PTRACE_SECCOMP_GET_FILTER(0x420c, 0x0, 0x0, &(0x7f0000000380)=""/113) sched_yield() ioctl$TUNGETIFF(r4, 0x800454d2, &(0x7f0000000140)) r5 = geteuid() ioctl$TUNSETOWNER(r3, 0x400454cc, r5) ioctl$KIOCSOUND(r4, 0x4b2f, 0xfffffffffffffb74) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x20, 0x9b}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000447000)='./file0\x00', &(0x7f00000e1000)='msdos\x00', 0x0, &(0x7f000097bfff)) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000580)='./cgroup/syz0\x00', 0x1ff) syz_open_dev$audion(&(0x7f0000000280)='/dev/audio#\x00', 0x7be, 0x0) fcntl$getown(0xffffffffffffffff, 0x9) 2018/03/31 09:15:38 executing program 2: syz_open_dev$loop(&(0x7f00000003c0)='/dev/loop#\x00', 0x8, 0x0) r0 = syz_open_dev$sndseq(&(0x7f00000001c0)='/dev/snd/seq\x00', 0x0, 0x0) r1 = accept(0xffffffffffffffff, &(0x7f0000000080)=@can, &(0x7f0000000180)=0x80) ioctl$sock_ipx_SIOCAIPXPRISLT(r1, 0x89e1, &(0x7f0000000280)=0x3f) ioctl$sock_inet_SIOCRTMSG(r1, 0x890d, &(0x7f0000000200)={0x80, {0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x19}}, {0x2, 0x4e21, @local={0xac, 0x14, 0x14, 0xaa}}, {0x2, 0x4e23}, 0x0, 0x7, 0x1, 0x0, 0x9, 0x0, 0x0, 0x0, 0xfffffffffffffff7}) getsockopt$inet_sctp_SCTP_PRIMARY_ADDR(0xffffffffffffffff, 0x84, 0x6, &(0x7f0000000ac0)={0x0, @in={{0x2, 0x4e20, @loopback=0x7f000001}}}, &(0x7f00000002c0)=0x84) setsockopt$inet_sctp_SCTP_ENABLE_STREAM_RESET(r1, 0x84, 0x76, &(0x7f0000000300)={r2, 0x1c9}, 0x8) r3 = syz_open_dev$sg(&(0x7f0000000700)='/dev/sg#\x00', 0xfffffffffffffff7, 0x800) clone(0x2000c100, &(0x7f0000000800)="97bb77038add5df9e9d4f9783b82c55fe59e5c0acdbcfc9bcf92ac0e1f1f3c1959c1d25dfabf3849336c7c85be174d7765b47e113632aea54b87e4d3f2c1db09e6aa4040b43d17308fb7e62e808067da2fff3cfd8e4c038c814bbfc6bc49d8ebc8671d8297e2d34dc61f2d194d2dbb8f59b4c853e0714d3d4bb29d1243fac01c86c8c4dd38daedab3c6ad73a72d3f6dd2684aa82e5285eb82452c9848b7beb8bc513ba8c8973cad0bd5926604846b7f5d0397b", &(0x7f00000008c0), &(0x7f0000000900), &(0x7f0000000940)="ed6c04412e782fe395f084741e3d9fe469aebde09acc8f8d8d84d1f00f5573b09acba487077ebb904cb1f3fed55f59d677ce24bbd2a7506df8e1e0d0fc709cb8c9f4ab2aeeeebc5ef879742c1f7628f1862c88b5b0da89acbf43ef12e4839405b6a3430d296fea06d2f3a8356c57ec991e") ioctl$SNDRV_SEQ_IOCTL_SUBSCRIBE_PORT(r0, 0x40505330, &(0x7f0000ec6fb0)={{}, {0x80}}) getsockopt$netrom_NETROM_T1(r1, 0x103, 0x1, &(0x7f0000000000), &(0x7f0000000380)=0x4) syz_open_dev$adsp(&(0x7f0000000600)='/dev/adsp#\x00', 0x100000000, 0x80000) rt_sigprocmask(0x3d738072cd0f41ac, &(0x7f0000000cc0)={0x7}, &(0x7f0000000d00), 0x8) clone(0x40000000, &(0x7f0000000500)="67cdd9994c47c31d325b069924a7064c157c2ec0b5b5dca2feeb7dabef3b7af0d02d559e293faa759f2b3cb12aea360c2d", &(0x7f0000000580), &(0x7f00000005c0), &(0x7f0000000a00)="29859fdda9a119e54a27f9ec76b4d63a16dc5bbdd38c2fda0e5f4d8f830cd987ec7d3ffc66cf3db8820968fd89a1fba8fe6352a29a27f3b000bcdf238f2c04b358fc831025180e0be313da41de6366c94a1a0f86aaffdf2c039111b55275c054e14819a827fe809225249a01944263a2aec15f64e752e35892b1b8e7ef1e0e9115") ioctl$SNDRV_SEQ_IOCTL_DELETE_PORT(r0, 0x40a85321, &(0x7f0000000b80)={{0x4, 0x8}, 'port0\x00', 0x80, 0x0, 0x10000, 0x6, 0x2, 0x80, 0x8, 0x0, 0x0, 0x3dec00}) getsockopt$inet_sctp_SCTP_SOCKOPT_PEELOFF(r3, 0x84, 0x66, &(0x7f0000000c40)={r2, 0x6}, &(0x7f0000000c80)=0x8) clock_settime(0x7, &(0x7f0000000740)={0x77359400}) ioctl$SNDRV_SEQ_IOCTL_CLIENT_ID(r0, 0x80045301, &(0x7f0000000340)) r4 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer2\x00', 0x0, 0x0) openat$sequencer2(0xffffffffffffff9c, &(0x7f00000006c0)='/dev/sequencer2\x00', 0x222081, 0x0) ioctl$RNDADDENTROPY(0xffffffffffffffff, 0x40085203, &(0x7f0000000100)=ANY=[@ANYPTR=&(0x7f0000000680)=ANY=[@ANYPTR64=&(0x7f0000000640)=ANY=[@ANYPTR, @ANYPTR]]]) setsockopt$inet_sctp_SCTP_DEFAULT_SEND_PARAM(r4, 0x84, 0xa, &(0x7f0000000140)={0x5, 0x100000001, 0x0, 0x8, 0x0, 0x7, 0x401, 0x1f, r2}, 0x20) 2018/03/31 09:15:38 executing program 0: perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f000031f000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) prctl$void(0x0) r0 = syz_open_dev$vcsn(&(0x7f0000000040)='/dev/vcs#\x00', 0x0, 0x20000) socket$alg(0x26, 0x5, 0x0) ioctl$sock_SIOCGIFBR(r0, 0x8940, &(0x7f0000000340)=@generic={0x7fff, 0x8, 0x401}) bind$alg(0xffffffffffffffff, &(0x7f0000000080)={0x26, 'aead\x00', 0x0, 0x0, 'generic-gcm-aesni\x00'}, 0x58) syz_open_dev$sndmidi(&(0x7f0000000100)='/dev/snd/midiC#D#\x00', 0xfd, 0x0) bind(0xffffffffffffffff, &(0x7f0000000140)=@llc={0x1a, 0x33a, 0x7, 0x80, 0x0, 0x4, @remote={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xbb}}, 0x80) r1 = syz_init_net_socket$nfc_llcp(0x27, 0x1, 0x1) setsockopt$nfc_llcp_NFC_LLCP_MIUX(r1, 0x118, 0x15, &(0x7f0000000000), 0x4) r2 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/cuse\x00', 0x103002, 0x0) futimesat(r2, &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)={{0x0, 0x7530}}) r3 = syz_open_dev$vcsa(&(0x7f00000001c0)='/dev/vcsa#\x00', 0x2, 0x0) sendto$inet6(r3, &(0x7f0000000bc0)="36251e313e0743fc195a1a198a14434e8a0a00b3f452a3b5644e336ec712a16310c9aecc4e3097bc666a8882128a73c368ce731e9fbf3fe18fa52d00c34ac2e57c1c4569cfbd6a621c6dfbc032121aed", 0x50, 0x20000000, &(0x7f0000000c40)={0xa, 0x4e20, 0x6, @dev={0xfe, 0x80, [], 0x19}, 0x1f}, 0x1c) accept$alg(r0, 0x0, 0x0) timerfd_create(0x6, 0xbb1b180d99f738b7) sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f0000000000)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x8}, 0xb4fcd35419244434, &(0x7f00004ca000)={&(0x7f0000000300)=ANY=[], 0x1a1}, 0x1}, 0x0) syz_fuseblk_mount(&(0x7f0000001380)='./file0\x00', &(0x7f00000013c0)='./file0\x00', 0xf000, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0xb21, 0x0) socket(0x1e, 0x3, 0x0) ioctl$TCFLSH(r3, 0x540b, 0x8) socket(0x1e, 0x0, 0x0) ptrace$PTRACE_SECCOMP_GET_FILTER(0x420c, 0x0, 0x0, &(0x7f0000000380)=""/113) sched_yield() sendto$ipx(r3, &(0x7f0000000200)="4e707d32d0a7afc3b8a8f4644c8a647256155b0eeff2ec43f8b4e8c6edf4f4c2c72eb62fa960acb4164397475eb47eca710dccf107550a9ea1caf458cbc5b9e41d1a7df07c3ef6d5387277bb33aeb6e657e805345e4f86883649388f99dc9314417ca239dd0d716fd91263b5174300e245827f24a7dccfaa4dddabf5b29b31f802ef89e5f467dd3d98257f30a84fdb763242a2a323c71467ac855f01b08e08085ae5e3633c614a51b6383d06542c545468e9ce1949dbdc66210b096d13eb2b4a0d44cb882895495b385dca152f405252546f5fb9a386ca83ccdf712e84761887be753bb96972db68a8", 0xe9, 0x20000080, &(0x7f0000000300)={0x4, 0x200, 0x8, "46eda092f4b3", 0x1f}, 0x10) ioctl$TUNGETIFF(r3, 0x800454d2, &(0x7f0000000140)) ioctl$KIOCSOUND(r3, 0x4b2f, 0xfffffffffffffb74) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000447000)='./file0\x00', &(0x7f00000e1000)='msdos\x00', 0x0, &(0x7f000097bfff)) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000580)='./cgroup/syz0\x00', 0x1ff) 2018/03/31 09:15:38 executing program 6: r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_SIOCGPGRP(r0, 0x8904, &(0x7f00000004c0)=0x0) sched_setaffinity(r1, 0x8, &(0x7f0000000500)=0x3e85) bind$inet(r0, &(0x7f000099e000)={0x2, 0x4e20, @multicast1=0xe0000001}, 0x10) sendto$inet(r0, &(0x7f0000de1fff), 0xfffffffffffffd43, 0x20008005, &(0x7f0000db4ff0)={0x2, 0x4e20, @loopback=0x7f000001}, 0x10) clock_gettime(0x0, &(0x7f0000000040)={0x0}) futex(&(0x7f0000000000), 0x1, 0x0, &(0x7f0000000300)={r2}, &(0x7f0000000340), 0x0) syz_open_procfs(r1, &(0x7f0000000640)='net/nfsfs\x00') ptrace$poke(0xffffffffffffffff, 0x0, &(0x7f0000000600), 0x3) mount(&(0x7f0000000200)='./file1\x00', &(0x7f0000000240)='./file1/file0\x00', &(0x7f0000000280)='cgroup2\x00', 0xc0, &(0x7f00000002c0)="83757e53a6d6d6368c682ac46a09c9de0a052142635281ed8f") mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r3 = syz_open_procfs(0x0, &(0x7f0000000380)="2f6578650000000000ff070000ddd9f191be10eebf000ee9ff0700000000000054fa07424adee916d2da75afe70b35a0fd6a1f349572d226d7a075fb35331ce39c5a3568641006d7c0206a74e333265316a175350e730ab2bce682b69d603fc05ead7fb5180de13a74155d8560fe23dfbba10724631067f955b8810f3402053f95a8798b0e3749d9c79cdd5f62547e59ab4352ab0a3827384665fd2c16ea53e5e2a1dc065b53520b9cd4eb30edc0f70cb82149f8ff5b628eabf1a9ab91915a78b5cb259f4a0fbfab4dacbd68f077") syncfs(r3) open(&(0x7f0000000300)='./file0\x00', 0x1, 0x0) mount(&(0x7f0000000340)='./file1\x00', &(0x7f0000015ff8)='./file0\x00', &(0x7f000001fffa)='ramfs\x00', 0x0, &(0x7f000001f000)) dup(0xffffffffffffffff) fgetxattr(0xffffffffffffffff, &(0x7f0000000180)=ANY=[], &(0x7f0000000080)=""/200, 0xc8) mount(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='./file0/file0\x00', &(0x7f0000000140)='afs\x00', 0x0, &(0x7f0000000180)) perf_event_open(&(0x7f0000348f88)={0x2, 0x78, 0x3df}, 0x0, 0x0, 0xffffffffffffffff, 0x0) writev(0xffffffffffffffff, &(0x7f0000001980)=[{&(0x7f0000001900)="5ac08c7d02e953d0690943dd648a71261bb5d21285f2", 0x16}], 0x1) recvmsg(0xffffffffffffffff, &(0x7f0000005180)={&(0x7f0000004ac0)=@can, 0x80, &(0x7f0000000440), 0x0, &(0x7f0000001880)=""/93, 0x5d}, 0x10000) ioctl$SNDRV_SEQ_IOCTL_GET_PORT_INFO(0xffffffffffffffff, 0xc0a85322, &(0x7f0000001a40)) sendmsg(0xffffffffffffffff, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000140), 0x0, &(0x7f0000000180)}, 0x0) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) getsockopt$inet_sctp_SCTP_GET_PEER_ADDRS(0xffffffffffffff9c, 0x84, 0x6c, &(0x7f0000000680)=ANY=[@ANYRES32=0x0, @ANYBLOB="230654730566ac269fde2b2d44c75160473cdabac742d5e3255c494201aafcee2090bfc61a494677ec563378dcb36678c408e314660bf3740ba14fa03091418908bdfe0ea9b78df2bb118460213cee35af93221d7fd562cf24bc580aea0b233469131b1d966fe77b179a48c12dea18020b2ae3fabbb5c4f5c5b0e40a472bcd353c66f8ffd2b5744f2e30401c1bb97e3f7b2f30f1f0290485295fa5b62177d40145ba36121a3c40175e0316a0edf369199cad3c1362e26d0995e8122d3c07c66c3ac9dfd4261bf134904a1c2902a868731dbb05023f5e4c46730774c5d6c14590024bb4981e8b4d"], &(0x7f0000001480)=0x2) getsockopt$inet_sctp6_SCTP_RTOINFO(0xffffffffffffffff, 0x84, 0x0, &(0x7f00000014c0)={0x0, 0x0, 0x401, 0x84b6}, &(0x7f0000001600)=0x10) recvmsg(0xffffffffffffffff, &(0x7f0000001740)={0x0, 0x0, &(0x7f00000015c0)=[{&(0x7f0000001380)=""/229, 0xe5}, {&(0x7f0000000180)=""/15, 0xf}, {&(0x7f0000001500)=""/133, 0x85}], 0x3, &(0x7f0000001640)=""/208, 0xd0, 0x3ff}, 0x0) mount(&(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000080)='./file0\x00', &(0x7f0000001a00)='9p\x00', 0x0, &(0x7f00000019c0)) [ 331.778933] FAULT_INJECTION: forcing a failure. [ 331.778933] name failslab, interval 1, probability 0, space 0, times 0 [ 331.790290] CPU: 0 PID: 31774 Comm: syz-executor7 Not tainted 4.16.0-rc7+ #8 [ 331.795916] binder: 31776:31780 unknown command 20 [ 331.797470] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 331.797477] Call Trace: [ 331.797497] dump_stack+0x194/0x24d [ 331.797518] ? arch_local_irq_restore+0x53/0x53 [ 331.805317] binder: 31776:31780 ioctl c0306201 20000340 returned -22 [ 331.811800] should_fail+0x8c0/0xa40 [ 331.811822] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 331.811849] ? kasan_kmalloc+0xad/0xe0 [ 331.830552] binder: 31776:31788 unknown command 26 [ 331.832854] ? __kmalloc+0x162/0x760 [ 331.832867] ? __list_lru_init+0xcf/0x750 [ 331.832888] ? find_held_lock+0x35/0x1d0 [ 331.832908] ? __lock_is_held+0xb6/0x140 [ 331.832938] ? check_same_owner+0x320/0x320 [ 331.832956] ? rcu_note_context_switch+0x710/0x710 [ 331.832977] should_failslab+0xec/0x120 [ 331.838650] binder: 31776:31788 ioctl c0306201 20000340 returned -22 [ 331.841933] kmem_cache_alloc_node_trace+0x5a/0x760 [ 331.841947] ? mark_held_locks+0xaf/0x100 [ 331.841960] ? __raw_spin_lock_init+0x1c/0x100 [ 331.841982] __kmalloc_node+0x33/0x70 [ 331.842001] kvmalloc_node+0x99/0xd0 [ 331.842017] __list_lru_init+0x5d5/0x750 [ 331.842036] ? memcg_destroy_list_lru_node.isra.7+0x110/0x110 [ 331.842051] ? trace_hardirqs_on_caller+0x421/0x5c0 [ 331.842073] ? lockdep_init_map+0x9/0x10 [ 331.842087] sget_userns+0x6b1/0xe40 2018/03/31 09:15:39 executing program 3: r0 = syz_open_dev$random(&(0x7f00000001c0)='/dev/random\x00', 0x0, 0x800) r1 = syz_open_dev$loop(&(0x7f0000308000)='/dev/loop#\x00', 0x0, 0x0) ioctl$LOOP_SET_STATUS(r1, 0xc0481273, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "3900ea631d00000000020000010000009f00000023f7b7d65f90b0e6330ee739b319d8f6aa6bd58d1443474482e85040fb4947ebb55bd19f335b5bffff0001f3", "cfa430745a540dc1c149b7b81579f6a41c51f7d51933223e82ab867dac761faf"}) write(0xffffffffffffffff, &(0x7f00000001c0), 0x0) setsockopt$inet_sctp6_SCTP_RECVNXTINFO(0xffffffffffffffff, 0x84, 0x21, &(0x7f00000003c0)=0x200, 0x4) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f00000000c0)=0x0) getsockopt$netrom_NETROM_T4(0xffffffffffffffff, 0x103, 0x6, &(0x7f0000000300)=0x8, &(0x7f0000000340)=0x4) r3 = getpid() sched_setparam(r3, &(0x7f0000000400)) syz_open_dev$loop(&(0x7f0000ca9ff5)='/dev/loop#\x00', 0x0, 0x82) r4 = memfd_create(&(0x7f0000614000)="74086e750000000000000000008c00", 0x0) pwritev(r4, &(0x7f0000f50f90)=[{&(0x7f0000000040)="aa", 0x1}], 0x1, 0x0) fcntl$getownex(r1, 0x10, &(0x7f0000000240)={0x0, 0x0}) r6 = syz_open_procfs(r5, &(0x7f0000000280)='stat\x00') epoll_ctl$EPOLL_CTL_MOD(r4, 0x3, r0, &(0x7f0000000380)={0x20000010}) accept4$inet6(r4, &(0x7f0000000100)={0x0, 0x0, 0x0, @mcast1}, &(0x7f0000000140)=0x1c, 0x7fd) getsockopt$inet_IP_IPSEC_POLICY(r4, 0x0, 0x10, &(0x7f0000000940)={{{@in6=@local, @in6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@loopback}, 0x0, @in=@local}}, &(0x7f0000000780)=0xe8) getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f00000007c0)={0x0, 0x0, 0x0}, &(0x7f0000000540)=0xc) fchown(r4, r7, r8) r9 = syz_open_dev$binder(&(0x7f0000000100)='/dev/binder#\x00', 0xffffffffffffffff, 0x806) ioctl$BINDER_SET_CONTEXT_MGR(r6, 0x40046207, 0x0) mmap$binder(&(0x7f000000c000/0x2000)=nil, 0x2000, 0x0, 0x12, r9, 0x0) ioctl$BINDER_WRITE_READ(r9, 0xc0306201, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000), 0x0, 0x0, &(0x7f0000011f9d)}) getsockopt$inet_sctp6_SCTP_AUTO_ASCONF(0xffffffffffffffff, 0x84, 0x1e, &(0x7f0000000140), &(0x7f0000000180)=0x4) ioctl$BINDER_WRITE_READ(r9, 0xc0306201, &(0x7f0000000340)={0x8, 0x0, &(0x7f0000000440)=ANY=[@ANYRES64=r1], 0x0, 0x0, &(0x7f0000000240)}) write(0xffffffffffffffff, &(0x7f0000000300)="8be25f5790f664f32509e40d6f879d5add7e2d359c9a19afb750a2d25352875d187d4118c99a2d5c6db433c277cc7d345b87a34f1b417033d367cb0cfd6a25633f77aafb17e99c33cb65352c901ae75176f07bb0a4bb5ebff3d87e", 0x5b) r10 = ioctl$LOOP_CTL_GET_FREE(r4, 0x4c82) ioctl$LOOP_CTL_REMOVE(r4, 0x4c81, r10) openat$cgroup(0xffffffffffffff9c, &(0x7f0000000000)='syz0\x00', 0x200002, 0x0) sched_setaffinity(r2, 0x8, &(0x7f0000000200)=0x7) [ 331.910412] binder: 31791:31792 unknown command 20 [ 331.913648] ? kill_litter_super+0x90/0x90 [ 331.913668] ? ns_test_super+0x50/0x50 [ 331.913683] ? destroy_unused_super.part.6+0xd0/0xd0 [ 331.913695] ? do_raw_spin_trylock+0x190/0x190 [ 331.913714] ? kobject_put+0x6b/0x250 [ 331.913736] ? blkdev_get+0x3a1/0xb00 [ 331.913757] ? cap_capable+0x1b5/0x230 [ 331.913768] ? __blkdev_get+0x13b0/0x13b0 [ 331.913784] ? security_capable+0x8e/0xc0 [ 331.919608] binder: 31791:31792 ioctl c0306201 20000340 returned -22 [ 331.922837] ? kill_litter_super+0x90/0x90 2018/03/31 09:15:39 executing program 3: r0 = syz_open_dev$random(&(0x7f00000001c0)='/dev/random\x00', 0x0, 0x800) r1 = syz_open_dev$loop(&(0x7f0000308000)='/dev/loop#\x00', 0x0, 0x0) ioctl$LOOP_SET_STATUS(r1, 0xc0481273, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "3900ea631d00000000020000010000009f00000023f7b7d65f90b0e6330ee739b319d8f6aa6bd58d1443474482e85040fb4947ebb55bd19f335b5bffff0001f3", "cfa430745a540dc1c149b7b81579f6a41c51f7d51933223e82ab867dac761faf"}) write(0xffffffffffffffff, &(0x7f00000001c0), 0x0) setsockopt$inet_sctp6_SCTP_RECVNXTINFO(0xffffffffffffffff, 0x84, 0x21, &(0x7f00000003c0)=0x200, 0x4) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f00000000c0)=0x0) getsockopt$netrom_NETROM_T4(0xffffffffffffffff, 0x103, 0x6, &(0x7f0000000300)=0x8, &(0x7f0000000340)=0x4) r3 = getpid() sched_setparam(r3, &(0x7f0000000400)) syz_open_dev$loop(&(0x7f0000ca9ff5)='/dev/loop#\x00', 0x0, 0x82) r4 = memfd_create(&(0x7f0000614000)="74086e750000000000000000008c00", 0x0) pwritev(r4, &(0x7f0000f50f90)=[{&(0x7f0000000040)="aa", 0x1}], 0x1, 0x0) fcntl$getownex(r1, 0x10, &(0x7f0000000240)={0x0, 0x0}) r6 = syz_open_procfs(r5, &(0x7f0000000280)='stat\x00') epoll_ctl$EPOLL_CTL_MOD(r4, 0x3, r0, &(0x7f00000002c0)={0x20000010}) accept4$inet6(r4, &(0x7f0000000100)={0x0, 0x0, 0x0, @mcast1}, &(0x7f0000000140)=0x1c, 0x7fd) getsockopt$inet_IP_IPSEC_POLICY(r4, 0x0, 0x10, &(0x7f0000000940)={{{@in6=@local, @in6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@loopback}, 0x0, @in=@local}}, &(0x7f0000000780)=0xe8) getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f00000007c0)={0x0, 0x0, 0x0}, &(0x7f0000000540)=0xc) fchown(r4, r7, r8) r9 = syz_open_dev$binder(&(0x7f0000000100)='/dev/binder#\x00', 0xffffffffffffffff, 0x806) ioctl$BINDER_SET_CONTEXT_MGR(r6, 0x40046207, 0x0) mmap$binder(&(0x7f000000c000/0x2000)=nil, 0x2000, 0x0, 0x12, r9, 0x0) ioctl$BINDER_WRITE_READ(r9, 0xc0306201, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000), 0x0, 0x0, &(0x7f0000011f9d)}) getsockopt$inet_sctp6_SCTP_AUTO_ASCONF(0xffffffffffffffff, 0x84, 0x1e, &(0x7f0000000140), &(0x7f0000000180)=0x4) ioctl$BINDER_WRITE_READ(r9, 0xc0306201, &(0x7f0000000340)={0x8, 0x0, &(0x7f0000000440)=ANY=[@ANYRES64=r1], 0x5e, 0x0, &(0x7f0000000480)="e7b9473dae6f9d4c531f7e8aa89f2dc9189fd1638d2364778474aa2f2b797380a0c884ab530dd63a82dbfbb4019f87b70d5b670f7e33c8174a74052aee81e42ec0a5ce311a5145ed1f965dd399faeac0636e7883e918e17844971116ec95"}) write(0xffffffffffffffff, &(0x7f0000000300)="8be25f5790f664f32509e40d6f879d5add7e2d359c9a19afb750a2d25352875d187d4118c99a2d5c6db433c277cc7d345b87a34f1b417033d367cb0cfd6a25633f77aafb17e99c33cb65352c901ae75176f07bb0a4bb5ebff3d87e", 0x5b) r10 = ioctl$LOOP_CTL_GET_FREE(r4, 0x4c82) ioctl$LOOP_CTL_REMOVE(r6, 0x4c81, r10) openat$cgroup(0xffffffffffffff9c, &(0x7f0000000000)='syz0\x00', 0x200002, 0x0) sched_setaffinity(r2, 0x8, &(0x7f0000000200)=0x7) [ 331.922852] ? ns_capable_common+0xcf/0x160 [ 331.922865] ? ns_test_super+0x50/0x50 [ 331.922875] ? kill_litter_super+0x90/0x90 [ 331.922886] sget+0xd2/0x120 [ 331.922904] mount_bdev+0x109/0x370 [ 331.922915] ? msdos_mount+0x40/0x40 [ 331.922932] msdos_mount+0x34/0x40 [ 331.922947] mount_fs+0x66/0x2d0 [ 331.922967] vfs_kern_mount.part.26+0xc6/0x4a0 [ 331.922980] ? may_umount+0xa0/0xa0 [ 331.947830] binder: 31791:31793 unknown command 26 [ 331.949329] ? _raw_read_unlock+0x22/0x30 [ 331.949345] ? __get_fs_type+0x8a/0xc0 [ 331.949366] do_mount+0xea4/0x2bb0 [ 331.949388] ? copy_mount_string+0x40/0x40 [ 331.949407] ? trace_hardirqs_on_caller+0x421/0x5c0 [ 331.949422] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 331.949444] ? retint_kernel+0x10/0x10 [ 331.949461] ? copy_mount_options+0x18b/0x2e0 [ 331.953560] binder: 31791:31793 ioctl c0306201 20000340 returned -22 [ 331.957030] ? copy_mount_options+0x193/0x2e0 [ 331.957043] ? copy_mount_options+0x1f7/0x2e0 [ 331.957060] SyS_mount+0xab/0x120 [ 331.957071] ? copy_mnt_ns+0xb30/0xb30 2018/03/31 09:15:39 executing program 7 (fault-call:24 fault-nth:26): perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f000031f000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getpid() r0 = syz_open_dev$vcsn(&(0x7f0000000040)='/dev/vcs#\x00', 0x0, 0x20000) ioctl$GIO_CMAP(r0, 0x4b70, &(0x7f0000000080)) r1 = socket$alg(0x26, 0x5, 0x0) ioctl$sock_SIOCGIFBR(r1, 0x8940, &(0x7f0000000040)=@get={0x1, &(0x7f0000000400)=""/242, 0x100000000}) bind$alg(r1, &(0x7f0000000080)={0x26, 'aead\x00', 0x0, 0x0, 'generic-gcm-aesni\x00'}, 0x58) syz_open_dev$sndmidi(&(0x7f0000000100)='/dev/snd/midiC#D#\x00', 0xfd, 0x0) bind(0xffffffffffffffff, &(0x7f0000000140)=@llc={0x1a, 0x33a, 0x7, 0x80, 0x5, 0x4, @remote={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xbb}}, 0x80) r2 = syz_init_net_socket$nfc_llcp(0x27, 0x1, 0x1) setsockopt$nfc_llcp_NFC_LLCP_MIUX(r2, 0x118, 0x15, &(0x7f0000000000), 0x4) r3 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/cuse\x00', 0x103002, 0x0) futimesat(r3, &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)={{0x0, 0x7530}}) r4 = syz_open_dev$vcsa(&(0x7f00000001c0)='/dev/vcsa#\x00', 0x2, 0x4020ff) sendto$inet6(r4, &(0x7f0000000bc0)="36251e313e0743fc195a1a198a14434e8a0a00b3f452a3b5644e336ec712a16310c9aecc4e3097bc666a8882128a73c368ce731e9fbf3fe18fa52d00", 0x3c, 0x20000000, &(0x7f0000000c40)={0xa, 0x0, 0x6, @dev={0xfe, 0x80, [], 0x19}, 0x1f}, 0x1c) accept$alg(r0, 0x0, 0x0) sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f0000000000)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x8}, 0xb4fcd35419244434, &(0x7f00004ca000)={&(0x7f0000000300)=ANY=[], 0x1a1}, 0x1}, 0x0) syz_fuseblk_mount(&(0x7f0000001380)='./file0\x00', &(0x7f00000013c0)='./file0\x00', 0xf000, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0xb21, 0x0) socket(0x1e, 0x3, 0x0) socket(0x1e, 0x0, 0x0) ptrace$PTRACE_SECCOMP_GET_FILTER(0x420c, 0x0, 0x0, &(0x7f0000000380)=""/113) sched_yield() ioctl$TUNGETIFF(r4, 0x800454d2, &(0x7f0000000140)) ioctl$KIOCSOUND(r4, 0x4b2f, 0xfffffffffffffb74) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000447000)='./file0\x00', &(0x7f00000e1000)='msdos\x00', 0x0, &(0x7f000097bfff)) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000580)='./cgroup/syz0\x00', 0x1ff) syz_open_dev$audion(&(0x7f0000000280)='/dev/audio#\x00', 0x7be, 0x0) [ 331.957087] do_syscall_64+0x281/0x940 [ 331.957099] ? vmalloc_sync_all+0x30/0x30 [ 331.957112] ? _raw_spin_unlock_irq+0x27/0x70 [ 331.957125] ? finish_task_switch+0x1c1/0x7e0 [ 331.957139] ? syscall_return_slowpath+0x550/0x550 [ 331.957152] ? syscall_return_slowpath+0x2ac/0x550 [ 331.957164] ? prepare_exit_to_usermode+0x350/0x350 [ 331.957177] ? entry_SYSCALL_64_after_hwframe+0x52/0xb7 [ 332.010568] binder: 31795:31796 unknown command 20 [ 332.014196] ? trace_hardirqs_off_thunk+0x1a/0x1c 2018/03/31 09:15:39 executing program 3: r0 = syz_open_dev$random(&(0x7f00000001c0)='/dev/random\x00', 0x0, 0x800) r1 = syz_open_dev$loop(&(0x7f0000308000)='/dev/loop#\x00', 0x0, 0x0) ioctl$LOOP_SET_STATUS(r1, 0xc0481273, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "3900ea631d00000000020000010000009f00000023f7b7d65f90b0e6330ee739b319d8f6aa6bd58d1443474482e85040fb4947ebb55bd19f335b5bffff0001f3", "cfa430745a540dc1c149b7b81579f6a41c51f7d51933223e82ab867dac761faf"}) write(0xffffffffffffffff, &(0x7f00000001c0), 0x0) setsockopt$inet_sctp6_SCTP_RECVNXTINFO(0xffffffffffffffff, 0x84, 0x21, &(0x7f00000003c0)=0x200, 0x4) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f00000000c0)=0x0) getsockopt$netrom_NETROM_T4(0xffffffffffffffff, 0x103, 0x6, &(0x7f0000000300)=0x8, &(0x7f0000000340)=0x4) r3 = getpid() sched_setparam(r3, &(0x7f0000000400)) syz_open_dev$loop(&(0x7f0000ca9ff5)='/dev/loop#\x00', 0x0, 0x82) r4 = memfd_create(&(0x7f0000614000)="74086e750000000000000000008c00", 0x0) pwritev(r4, &(0x7f0000f50f90)=[{&(0x7f0000000040)="aa", 0x1}], 0x1, 0x0) fcntl$getownex(r1, 0x10, &(0x7f0000000240)={0x0, 0x0}) r6 = syz_open_procfs(r5, &(0x7f0000000280)='stat\x00') epoll_ctl$EPOLL_CTL_MOD(r4, 0x3, r0, &(0x7f00000002c0)={0x20000010}) accept4$inet6(r4, &(0x7f0000000100)={0x0, 0x0, 0x0, @mcast1}, &(0x7f0000000140)=0x1c, 0x7fd) getsockopt$inet_IP_IPSEC_POLICY(r4, 0x0, 0x10, &(0x7f0000000940)={{{@in6=@local, @in6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@loopback}, 0x0, @in=@local}}, &(0x7f0000000780)=0xe8) getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f00000007c0)={0x0, 0x0, 0x0}, &(0x7f0000000540)=0xc) fchown(r4, r7, r8) r9 = syz_open_dev$binder(&(0x7f0000000100)='/dev/binder#\x00', 0xffffffffffffffff, 0x2) ioctl$BINDER_SET_CONTEXT_MGR(r6, 0x40046207, 0x0) mmap$binder(&(0x7f000000c000/0x2000)=nil, 0x2000, 0x0, 0x12, r9, 0x0) ioctl$BINDER_WRITE_READ(r9, 0xc0306201, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000), 0x0, 0x0, &(0x7f0000011f9d)}) getsockopt$inet_sctp6_SCTP_AUTO_ASCONF(0xffffffffffffffff, 0x84, 0x1e, &(0x7f0000000140), &(0x7f0000000180)=0x4) ioctl$BINDER_WRITE_READ(r9, 0xc0306201, &(0x7f0000000340)={0x8, 0x0, &(0x7f0000000440)=ANY=[@ANYRES64=r1], 0x0, 0x0, &(0x7f0000000240)}) write(0xffffffffffffffff, &(0x7f0000000300)="8be25f5790f664f32509e40d6f879d5add7e2d359c9a19afb750a2d25352875d187d4118c99a2d5c6db433c277cc7d345b87a34f1b417033d367cb0cfd6a25633f77aafb17e99c33cb65352c901ae75176f07bb0a4bb5ebff3d87e", 0x5b) r10 = ioctl$LOOP_CTL_GET_FREE(r4, 0x4c82) ioctl$LOOP_CTL_REMOVE(r6, 0x4c81, r10) openat$cgroup(0xffffffffffffff9c, &(0x7f0000000000)='syz0\x00', 0x200002, 0x0) sched_setaffinity(r2, 0x8, &(0x7f0000000200)=0x7) [ 332.014222] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 332.014233] RIP: 0033:0x454e79 [ 332.014240] RSP: 002b:00007f37fba8ec68 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 332.014255] RAX: ffffffffffffffda RBX: 00007f37fba8f6d4 RCX: 0000000000454e79 [ 332.014262] RDX: 00000000200e1000 RSI: 0000000020447000 RDI: 0000000020000000 [ 332.014269] RBP: 000000000072bea0 R08: 000000002097bfff R09: 0000000000000000 [ 332.014277] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000019 [ 332.014284] R13: 00000000000003fa R14: 00000000006f8010 R15: 0000000000000019 2018/03/31 09:15:39 executing program 5: perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f000031f000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) prctl$void(0x0) getpid() r0 = syz_open_dev$vcsn(&(0x7f0000000040)='/dev/vcs#\x00', 0x0, 0x20000) ioctl$GIO_CMAP(r0, 0x4b70, &(0x7f0000000080)) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000080)={0x26, 'aead\x00', 0x0, 0x0, 'generic-gcm-aesni\x00'}, 0x58) syz_open_dev$sndmidi(&(0x7f0000000100)='/dev/snd/midiC#D#\x00', 0xfd, 0x0) bind(0xffffffffffffffff, &(0x7f0000000140)=@llc={0x1a, 0x33a, 0x7, 0x80, 0x5, 0x4, @remote={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xbb}}, 0x80) r2 = syz_init_net_socket$nfc_llcp(0x27, 0x1, 0x1) setsockopt$nfc_llcp_NFC_LLCP_MIUX(r2, 0x118, 0x15, &(0x7f0000000000), 0x4) r3 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/cuse\x00', 0x103002, 0x0) futimesat(r3, &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)={{0x0, 0x7530}}) r4 = syz_open_dev$vcsa(&(0x7f00000001c0)='/dev/vcsa#\x00', 0x2, 0x4020ff) sendto$inet6(0xffffffffffffffff, &(0x7f0000000bc0)="36251e313e0743fc195a1a198a14434e8a0a00b3f452a3b5644e336ec712a16310c9aecc4e3097bc666a8882128a73c368ce731e9fbf3fe18fa52d", 0x3b, 0x20000000, &(0x7f0000000c40)={0xa, 0x4e20, 0x6, @dev={0xfe, 0x80, [], 0x19}, 0x1f}, 0x1c) accept$alg(r0, 0x0, 0x0) sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f0000000000)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x8}, 0xb4fcd35419244434, &(0x7f00004ca000)={&(0x7f0000000300)=ANY=[], 0x1a1}, 0x1}, 0x0) syz_fuseblk_mount(&(0x7f0000001380)='./file0\x00', &(0x7f00000013c0)='./file0\x00', 0xf000, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0xb21, 0x0) socket(0x2, 0x80000, 0x0) socket(0x1e, 0x0, 0x0) ptrace$PTRACE_SECCOMP_GET_FILTER(0x420c, 0x0, 0x0, &(0x7f0000000380)=""/113) sched_yield() ioctl$TUNGETIFF(r4, 0x800454d2, &(0x7f0000000140)) ioctl$KIOCSOUND(r4, 0x4b2f, 0xfffffffffffffb74) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x20, 0x9b}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000447000)='./file0\x00', &(0x7f00000e1000)='msdos\x00', 0x0, &(0x7f000097bfff)) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000580)='./cgroup/syz0\x00', 0x1ff) syz_open_dev$audion(&(0x7f0000000280)='/dev/audio#\x00', 0x7be, 0x0) [ 332.026415] FAT-fs (loop199): unable to read boot sector [ 332.029593] binder: 31795:31796 ioctl c0306201 20000340 returned -22 [ 332.044721] FAT-fs (loop199): unable to read boot sector [ 332.080556] binder: 31795:31797 unknown command 26 [ 332.085064] FAT-fs (loop199): unable to read boot sector [ 332.095351] binder: 31795:31797 ioctl c0306201 20000340 returned -22 [ 332.098598] FAT-fs (loop199): unable to read boot sector [ 332.169862] binder: 31806:31807 unknown command 20 [ 332.179409] 9pnet_virtio: no channels available for device ./file0/file0 [ 332.183746] binder: 31806:31807 ioctl c0306201 20000340 returned -22 [ 332.198145] FAULT_INJECTION: forcing a failure. [ 332.198145] name failslab, interval 1, probability 0, space 0, times 0 [ 332.250347] CPU: 0 PID: 31801 Comm: syz-executor7 Not tainted 4.16.0-rc7+ #8 [ 332.250356] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 332.250360] Call Trace: [ 332.250396] dump_stack+0x194/0x24d [ 332.273125] ? arch_local_irq_restore+0x53/0x53 [ 332.273152] should_fail+0x8c0/0xa40 2018/03/31 09:15:39 executing program 4: perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f000031f000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) prctl$void(0x0) getpid() r0 = syz_open_dev$vcsn(&(0x7f0000000040)='/dev/vcs#\x00', 0x0, 0x20000) ioctl$GIO_CMAP(r0, 0x4b70, &(0x7f0000000080)) r1 = socket$alg(0x26, 0x5, 0x0) ioctl$sock_SIOCGIFBR(0xffffffffffffffff, 0x8940, &(0x7f0000000040)=@get={0x1, &(0x7f0000000400)=""/242, 0x100000000}) bind$alg(r1, &(0x7f0000000080)={0x26, 'aead\x00', 0x0, 0x0, 'generic-gcm-aesni\x00'}, 0x58) syz_open_dev$sndmidi(&(0x7f0000000100)='/dev/snd/midiC#D#\x00', 0xfd, 0x0) bind(0xffffffffffffffff, &(0x7f0000000140)=@llc={0x1a, 0x33a, 0x7, 0x80, 0x0, 0x4, @remote={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xbb}}, 0x80) r2 = syz_init_net_socket$nfc_llcp(0x27, 0x1, 0x1) setsockopt$nfc_llcp_NFC_LLCP_MIUX(r2, 0x118, 0x15, &(0x7f0000000000), 0x4) r3 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/cuse\x00', 0x103002, 0x0) futimesat(r3, &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)={{0x0, 0x7530}}) r4 = syz_open_dev$vcsa(&(0x7f00000001c0)='/dev/vcsa#\x00', 0x2, 0x0) sendto$inet6(r4, &(0x7f0000000bc0), 0x0, 0x20000000, &(0x7f0000000c40)={0xa, 0x4e20, 0x0, @dev={0xfe, 0x80, [], 0x19}, 0x1f}, 0x1c) accept$alg(r0, 0x0, 0x0) sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f0000000000)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x8}, 0xb4fcd35419244434, &(0x7f00004ca000)={&(0x7f0000000300)=ANY=[], 0x1a1}, 0x1}, 0x0) syz_fuseblk_mount(&(0x7f0000001380)='./file0\x00', &(0x7f00000013c0)='./file0\x00', 0xf000, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0xb21, 0x0) write$evdev(r3, &(0x7f00000002c0)=[{{}, 0x0, 0x3, 0x3}, {{}, 0x9, 0x0, 0x8}], 0xcd) socket(0x1e, 0x3, 0x0) socket(0x1e, 0x0, 0x0) ptrace$PTRACE_SECCOMP_GET_FILTER(0x420c, 0x0, 0x0, &(0x7f0000000380)=""/113) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000200)='lp\x00', 0x3) sched_yield() ioctl$TUNGETIFF(r4, 0x800454d2, &(0x7f0000000140)) ioctl$KIOCSOUND(r4, 0x4b2f, 0xfffffffffffffb74) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x20, 0x9b}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000447000)='./file0\x00', &(0x7f00000e1000)='msdos\x00', 0x0, &(0x7f000097bfff)) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000580)='./cgroup/syz0\x00', 0x1ff) [ 332.279506] binder: 31806:31811 unknown command 26 [ 332.281505] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 332.281521] ? kasan_kmalloc+0xad/0xe0 [ 332.281531] ? kmem_cache_alloc_trace+0x136/0x740 [ 332.281543] ? __memcg_init_list_lru_node+0x169/0x270 [ 332.281554] ? sget_userns+0x6b1/0xe40 [ 332.281567] ? mount_fs+0x66/0x2d0 [ 332.281578] ? vfs_kern_mount.part.26+0xc6/0x4a0 [ 332.281590] ? do_mount+0xea4/0x2bb0 [ 332.289494] binder: 31806:31811 ioctl c0306201 20000340 returned -22 [ 332.291601] ? do_syscall_64+0x281/0x940 2018/03/31 09:15:39 executing program 3: r0 = syz_open_dev$random(&(0x7f00000001c0)='/dev/random\x00', 0x0, 0x800) ioctl$LOOP_SET_STATUS(0xffffffffffffffff, 0xc0481273, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "3900ea631d00000000020000010000009f00000023f7b7d65f90b0e6330ee739b319d8f6aa6bd58d1443474482e85040fb4947ebb55bd19f335b5bffff0001f3", "cfa430745a540dc1c149b7b81579f6a41c51f7d51933223e82ab867dac761faf"}) write(0xffffffffffffffff, &(0x7f00000001c0), 0x0) setsockopt$inet_sctp6_SCTP_RECVNXTINFO(0xffffffffffffffff, 0x84, 0x21, &(0x7f00000003c0)=0x200, 0x4) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f00000000c0)=0x0) getsockopt$netrom_NETROM_T4(0xffffffffffffffff, 0x103, 0x6, &(0x7f0000000300)=0x8, &(0x7f0000000340)=0x4) r2 = getpid() sched_setparam(r2, &(0x7f0000000400)) syz_open_dev$loop(&(0x7f0000ca9ff5)='/dev/loop#\x00', 0x0, 0x82) r3 = memfd_create(&(0x7f0000614000)="74086e750000000000000000008c00", 0x0) pwritev(r3, &(0x7f0000000380)=[{&(0x7f0000000040)='\x00', 0x1}], 0x1, 0x0) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000240)={0x0, 0x0}) r5 = syz_open_procfs(r4, &(0x7f0000000280)='stat\x00') epoll_ctl$EPOLL_CTL_MOD(r3, 0x3, r0, &(0x7f00000002c0)={0x20000010}) accept4$inet6(r3, &(0x7f0000000100)={0x0, 0x0, 0x0, @mcast1}, &(0x7f0000000140)=0x1c, 0x7fd) getsockopt$inet_IP_IPSEC_POLICY(r3, 0x0, 0x10, &(0x7f0000000940)={{{@in6=@local, @in6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@loopback}, 0x0, @in=@local}}, &(0x7f0000000780)=0xe8) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000000500)={0x0, 0x0, 0x0}, &(0x7f0000000540)=0xdb) fchown(r3, r6, r7) r8 = syz_open_dev$binder(&(0x7f0000000100)='/dev/binder#\x00', 0xffffffffffffffff, 0x806) setsockopt$inet_tcp_int(r3, 0x6, 0x1f, &(0x7f0000000580)=0x30f1, 0x4) ioctl$BINDER_SET_CONTEXT_MGR(r5, 0x40046207, 0x0) mmap$binder(&(0x7f000000c000/0x2000)=nil, 0x2000, 0x0, 0x12, r8, 0x0) ioctl$BINDER_WRITE_READ(r8, 0xc0306201, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000), 0x57, 0x0, &(0x7f0000000480)="03e0b230a5e6f426526e3e56b7e67c80a433156b73a2337cc5b7ab30dd8ae168e0deeafa93ceec811dfe64ebe4a9de1dcf2e29fa105b60bb33d911555ae082dd314f451eb6a096754e6e1032f5dba70be09c26354de247"}) getsockopt$inet_sctp6_SCTP_AUTO_ASCONF(0xffffffffffffffff, 0x84, 0x1e, &(0x7f0000000140), &(0x7f0000000180)=0x4) ioctl$BINDER_WRITE_READ(r8, 0xc0306201, &(0x7f0000000340)={0x8, 0x0, &(0x7f0000000440)=ANY=[@ANYRES64], 0x0, 0x0, &(0x7f0000000240)}) write(0xffffffffffffffff, &(0x7f0000000300)="8be25f5790f664f32509e40d6f879d5add7e2d359c9a19afb750a2d25352875d187d4118c99a2d5c6db433c277cc7d345b87a34f1b417033d367cb0cfd6a25633f77aafb17e99c33cb65352c901ae75176f07bb0a4bb5ebff3d87e", 0x5b) r9 = ioctl$LOOP_CTL_GET_FREE(r3, 0x4c82) ioctl$LOOP_CTL_REMOVE(r5, 0x4c81, r9) openat$cgroup(0xffffffffffffff9c, &(0x7f0000000000)='syz0\x00', 0x200002, 0x0) sched_setaffinity(r1, 0x8, &(0x7f0000000200)=0x7) [ 332.291623] ? entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 332.291649] ? find_held_lock+0x35/0x1d0 [ 332.291673] ? __lock_is_held+0xb6/0x140 [ 332.291714] ? check_same_owner+0x320/0x320 [ 332.349778] ? rcu_note_context_switch+0x710/0x710 [ 332.349802] should_failslab+0xec/0x120 [ 332.355790] 9pnet_virtio: no channels available for device ./file0/file0 [ 332.358666] kmem_cache_alloc_trace+0x4b/0x740 [ 332.358680] ? __kmalloc_node+0x33/0x70 [ 332.358690] ? __kmalloc_node+0x33/0x70 [ 332.358705] ? rcu_read_lock_sched_held+0x108/0x120 [ 332.358725] __memcg_init_list_lru_node+0x169/0x270 [ 332.358742] ? list_lru_add+0x7c0/0x7c0 [ 332.358755] ? __kmalloc_node+0x47/0x70 [ 332.358775] __list_lru_init+0x544/0x750 [ 332.358792] ? memcg_destroy_list_lru_node.isra.7+0x110/0x110 [ 332.392800] binder: 31826:31827 unknown command -1 [ 332.396002] ? trace_hardirqs_on_caller+0x421/0x5c0 [ 332.396026] ? lockdep_init_map+0x9/0x10 [ 332.396044] sget_userns+0x6b1/0xe40 [ 332.396054] ? kill_litter_super+0x90/0x90 [ 332.396073] ? ns_test_super+0x50/0x50 2018/03/31 09:15:39 executing program 7 (fault-call:24 fault-nth:27): perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f000031f000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getpid() r0 = syz_open_dev$vcsn(&(0x7f0000000040)='/dev/vcs#\x00', 0x0, 0x20000) ioctl$GIO_CMAP(r0, 0x4b70, &(0x7f0000000080)) r1 = socket$alg(0x26, 0x5, 0x0) ioctl$sock_SIOCGIFBR(r1, 0x8940, &(0x7f0000000040)=@get={0x1, &(0x7f0000000400)=""/242, 0x100000000}) bind$alg(r1, &(0x7f0000000080)={0x26, 'aead\x00', 0x0, 0x0, 'generic-gcm-aesni\x00'}, 0x58) syz_open_dev$sndmidi(&(0x7f0000000100)='/dev/snd/midiC#D#\x00', 0xfd, 0x0) bind(0xffffffffffffffff, &(0x7f0000000140)=@llc={0x1a, 0x33a, 0x7, 0x80, 0x5, 0x4, @remote={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xbb}}, 0x80) r2 = syz_init_net_socket$nfc_llcp(0x27, 0x1, 0x1) setsockopt$nfc_llcp_NFC_LLCP_MIUX(r2, 0x118, 0x15, &(0x7f0000000000), 0x4) r3 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/cuse\x00', 0x103002, 0x0) futimesat(r3, &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)={{0x0, 0x7530}}) r4 = syz_open_dev$vcsa(&(0x7f00000001c0)='/dev/vcsa#\x00', 0x2, 0x4020ff) sendto$inet6(r4, &(0x7f0000000bc0)="36251e313e0743fc195a1a198a14434e8a0a00b3f452a3b5644e336ec712a16310c9aecc4e3097bc666a8882128a73c368ce731e9fbf3fe18fa52d00", 0x3c, 0x20000000, &(0x7f0000000c40)={0xa, 0x0, 0x6, @dev={0xfe, 0x80, [], 0x19}, 0x1f}, 0x1c) accept$alg(r0, 0x0, 0x0) sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f0000000000)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x8}, 0xb4fcd35419244434, &(0x7f00004ca000)={&(0x7f0000000300)=ANY=[], 0x1a1}, 0x1}, 0x0) syz_fuseblk_mount(&(0x7f0000001380)='./file0\x00', &(0x7f00000013c0)='./file0\x00', 0xf000, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0xb21, 0x0) socket(0x1e, 0x3, 0x0) socket(0x1e, 0x0, 0x0) ptrace$PTRACE_SECCOMP_GET_FILTER(0x420c, 0x0, 0x0, &(0x7f0000000380)=""/113) sched_yield() ioctl$TUNGETIFF(r4, 0x800454d2, &(0x7f0000000140)) ioctl$KIOCSOUND(r4, 0x4b2f, 0xfffffffffffffb74) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000447000)='./file0\x00', &(0x7f00000e1000)='msdos\x00', 0x0, &(0x7f000097bfff)) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000580)='./cgroup/syz0\x00', 0x1ff) syz_open_dev$audion(&(0x7f0000000280)='/dev/audio#\x00', 0x7be, 0x0) [ 332.396087] ? destroy_unused_super.part.6+0xd0/0xd0 [ 332.396097] ? do_raw_spin_trylock+0x190/0x190 [ 332.396117] ? kobject_put+0x6b/0x250 [ 332.396139] ? blkdev_get+0x3a1/0xb00 [ 332.396159] ? cap_capable+0x1b5/0x230 [ 332.396172] ? __blkdev_get+0x13b0/0x13b0 [ 332.400519] binder: 31826:31827 ioctl c0306201 20000340 returned -22 [ 332.406093] ? security_capable+0x8e/0xc0 [ 332.406108] ? kill_litter_super+0x90/0x90 [ 332.406121] ? ns_capable_common+0xcf/0x160 [ 332.406135] ? ns_test_super+0x50/0x50 2018/03/31 09:15:39 executing program 3: r0 = syz_open_dev$random(&(0x7f00000001c0)='/dev/random\x00', 0x0, 0x800) r1 = syz_open_dev$loop(&(0x7f0000308000)='/dev/loop#\x00', 0x0, 0x0) ioctl$LOOP_SET_STATUS(r1, 0xc0481273, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "3900ea631d00000000020000010000009f00000023f7b7d65f90b0e6330ee739b319d8f6aa6bd58d1443474482e85040fb4947ebb55bd19f335b5bffff0001f3", "cfa430745a540dc1c149b7b81579f6a41c51f7d51933223e82ab867dac761faf"}) write(0xffffffffffffffff, &(0x7f00000001c0), 0x0) setsockopt$inet_sctp6_SCTP_RECVNXTINFO(0xffffffffffffffff, 0x84, 0x21, &(0x7f00000003c0)=0x200, 0x4) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f00000000c0)=0x0) getsockopt$netrom_NETROM_T4(0xffffffffffffffff, 0x103, 0x6, &(0x7f0000000300)=0x8, &(0x7f0000000340)=0x4) r3 = getpid() sched_setparam(r3, &(0x7f0000000400)) syz_open_dev$loop(&(0x7f0000ca9ff5)='/dev/loop#\x00', 0x0, 0x82) r4 = memfd_create(&(0x7f0000614000)="74086e750000000000000000008c00", 0x0) pwritev(r4, &(0x7f0000f50f90)=[{&(0x7f0000000040)="aa", 0x1}], 0x1, 0x0) fcntl$getownex(r1, 0x10, &(0x7f0000000240)={0x0, 0x0}) r6 = syz_open_procfs(r5, &(0x7f0000000280)='stat\x00') epoll_ctl$EPOLL_CTL_MOD(r6, 0x3, r0, &(0x7f0000000480)={0x20000010}) accept4$inet6(r4, &(0x7f0000000100)={0x0, 0x0, 0x0, @mcast1}, &(0x7f0000000140)=0x1c, 0x7fd) getsockopt$inet_IP_IPSEC_POLICY(r4, 0x0, 0x10, &(0x7f0000000940)={{{@in6=@local, @in6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@loopback}, 0x0, @in=@local}}, &(0x7f0000000780)=0xe8) getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f00000007c0)={0x0, 0x0, 0x0}, &(0x7f0000000540)=0xc) fchown(r4, r7, r8) r9 = syz_open_dev$binder(&(0x7f0000000100)='/dev/binder#\x00', 0xffffffffffffffff, 0x806) ioctl$BINDER_SET_CONTEXT_MGR(r6, 0x40046207, 0x0) mmap$binder(&(0x7f000000c000/0x2000)=nil, 0x2000, 0x0, 0x12, r9, 0x0) ioctl$BINDER_WRITE_READ(r9, 0xc0306201, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000), 0x0, 0x0, &(0x7f0000011f9d)}) getsockopt$inet_sctp6_SCTP_AUTO_ASCONF(0xffffffffffffffff, 0x84, 0x1e, &(0x7f0000000140), &(0x7f0000000180)=0x4) ioctl$BINDER_WRITE_READ(r9, 0xc0306201, &(0x7f0000000340)={0x8, 0x0, &(0x7f0000000440)=ANY=[@ANYRES64=r1], 0x0, 0x0, &(0x7f0000000240)}) write(0xffffffffffffffff, &(0x7f0000000300)="8be25f5790f664f32509e40d6f879d5add7e2d359c9a19afb750a2d25352875d187d4118c99a2d5c6db433c277cc7d345b87a34f1b417033d367cb0cfd6a25633f77aafb17e99c33cb65352c901ae75176f07bb0a4bb5ebff3d87e", 0x5b) r10 = ioctl$LOOP_CTL_GET_FREE(r4, 0x4c82) ioctl$LOOP_CTL_REMOVE(r6, 0x4c81, r10) openat$cgroup(0xffffffffffffff9c, &(0x7f0000000000)='syz0\x00', 0x200002, 0x0) sched_setaffinity(r2, 0x8, &(0x7f0000000200)=0x7) [ 332.406145] ? kill_litter_super+0x90/0x90 [ 332.406156] sget+0xd2/0x120 [ 332.406174] mount_bdev+0x109/0x370 [ 332.406186] ? msdos_mount+0x40/0x40 [ 332.406203] msdos_mount+0x34/0x40 [ 332.406218] mount_fs+0x66/0x2d0 [ 332.406239] vfs_kern_mount.part.26+0xc6/0x4a0 [ 332.406253] ? may_umount+0xa0/0xa0 [ 332.406270] ? _raw_read_unlock+0x22/0x30 [ 332.429570] binder: 31826:31828 unknown command -1 [ 332.432007] ? __get_fs_type+0x8a/0xc0 [ 332.432029] do_mount+0xea4/0x2bb0 [ 332.432052] ? copy_mount_string+0x40/0x40 [ 332.432066] ? trace_hardirqs_on_caller+0x421/0x5c0 [ 332.432081] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 332.432105] ? retint_kernel+0x10/0x10 [ 332.432125] ? copy_mount_options+0x18b/0x2e0 [ 332.432139] ? copy_mount_options+0x193/0x2e0 [ 332.432150] ? copy_mount_options+0x1f7/0x2e0 [ 332.442976] binder: 31826:31828 ioctl c0306201 20000340 returned -22 [ 332.445599] SyS_mount+0xab/0x120 [ 332.445611] ? copy_mnt_ns+0xb30/0xb30 [ 332.445627] do_syscall_64+0x281/0x940 [ 332.445644] ? trace_event_raw_event_sys_exit+0x260/0x260 2018/03/31 09:15:39 executing program 6: r0 = memfd_create(&(0x7f0000000540)='\x00', 0x1) r1 = perf_event_open(&(0x7f00000005c0)={0x7, 0x70, 0x8, 0x9, 0x81f6, 0x8, 0x0, 0xfffffffffffffe01, 0x0, 0x1, 0x0, 0x3, 0x6, 0x9, 0x4, 0x5, 0x100000000, 0x8, 0x6, 0x9, 0x1, 0x8, 0x3, 0x800, 0x74, 0xfff, 0x9, 0xf4ca, 0x7, 0x4, 0x1, 0x800, 0x3ff, 0x0, 0x0, 0x1ff, 0x80000000, 0xffffffff00000001, 0x0, 0x3, 0x2, @perf_bp={&(0x7f0000000580), 0x1}, 0x10000, 0xfd, 0xb6, 0x7, 0x6, 0xf21, 0x976}, 0x0, 0x5, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r0, 0x2405, r1) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f00000001c0)) r2 = epoll_create1(0x80000) mkdir(&(0x7f000082f000)='./control\x00', 0x0) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x1, 0x32, 0xffffffffffffffff, 0x0) userfaultfd(0x0) ioctl$UFFDIO_REGISTER(0xffffffffffffffff, 0xc020aa00, &(0x7f0000000100)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r3 = creat(&(0x7f0000000140)='./control/file0\x00', 0x0) write$sndseq(r3, &(0x7f0000011fd2)=[{0x4000000068, 0x13, 0x2000000000000, 0x0, @time, {}, {}, @time=@time={0x77359400}}], 0x30) unlink(&(0x7f00000000c0)='./control\x00') mount(&(0x7f00000003c0)='./control\x00', &(0x7f0000000400)='./control\x00', &(0x7f0000000440)='tmpfs\x00', 0x0, 0x0) creat(&(0x7f0000000180)='./control/file0\x00', 0x0) close(0xffffffffffffffff) r4 = fcntl$dupfd(r2, 0x0, r2) r5 = epoll_create1(0x0) epoll_ctl$EPOLL_CTL_ADD(r5, 0x1, r4, &(0x7f000086fff4)) r6 = getpgrp(0xffffffffffffffff) r7 = getpid() epoll_ctl$EPOLL_CTL_ADD(r5, 0x1, 0xffffffffffffffff, &(0x7f0000000040)) kcmp$KCMP_EPOLL_TFD(r6, r7, 0x7, r5, &(0x7f0000000000)={r5, r4}) r8 = perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000080)='./file0\x00', 0x0) r9 = perf_event_open(&(0x7f000000a000)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xec5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x8000, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000a7dfff)}, 0xa00000400, 0xffffffffffffffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r10 = syz_open_dev$dspn(&(0x7f0000000040)='/dev/dsp#\x00', 0x4, 0x84000) ioctl$LOOP_CHANGE_FD(r10, 0x4c06, r9) close(r8) mount(&(0x7f00008deff8)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f000015bffc)='nfs\x00', 0x0, &(0x7f000000a000)) 2018/03/31 09:15:39 executing program 0: perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f000031f000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) prctl$void(0x0) r0 = syz_open_dev$vcsn(&(0x7f0000000040)='/dev/vcs#\x00', 0x0, 0x20000) socket$alg(0x26, 0x5, 0x0) ioctl$sock_SIOCGIFBR(0xffffffffffffffff, 0x8940, &(0x7f0000000040)=@get={0x1, &(0x7f0000000400)=""/242, 0x100000000}) bind$alg(0xffffffffffffffff, &(0x7f0000000080)={0x26, 'aead\x00', 0x0, 0x0, 'generic-gcm-aesni\x00'}, 0x58) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$inet6_tcp_int(r1, 0x6, 0x20000000005, &(0x7f0000000080), &(0x7f0000000100)=0x4) syz_open_dev$sndmidi(&(0x7f0000000100)='/dev/snd/midiC#D#\x00', 0xfd, 0x0) fcntl$getflags(r0, 0x1) bind(0xffffffffffffffff, &(0x7f0000000140)=@llc={0x1a, 0x33a, 0x7, 0x80, 0x0, 0x4, @remote={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xbb}}, 0x80) r2 = syz_init_net_socket$nfc_llcp(0x27, 0x1, 0x1) setsockopt$nfc_llcp_NFC_LLCP_MIUX(r2, 0x118, 0x15, &(0x7f0000000200), 0x4) r3 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/cuse\x00', 0x103002, 0x0) futimesat(r3, &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)={{0x0, 0x7530}}) r4 = syz_open_dev$vcsa(&(0x7f00000001c0)='/dev/vcsa#\x00', 0x2, 0x0) sendto$inet6(r4, &(0x7f0000000bc0)="36251e313e0743fc195a1a198a14434e8a0a00b3f452a3b5644e336ec712a16310c9aecc4e3097bc666a8882128a73c368ce731e9fbf3fe18fa52d00c34ac2e57c1c4569cfbd6a621c6dfbc032121aed", 0x50, 0x20000000, &(0x7f0000000c40)={0xa, 0x4e20, 0x6, @dev={0xfe, 0x80, [], 0x19}, 0x1f}, 0x1c) accept$alg(r0, 0x0, 0x0) sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f0000000000)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x8}, 0xb4fcd35419244434, &(0x7f00004ca000)={&(0x7f0000000300)=ANY=[], 0x1a1}, 0x1}, 0x0) syz_fuseblk_mount(&(0x7f0000001380)='./file0\x00', &(0x7f00000013c0)='./file0\x00', 0xf000, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0xb21, 0x0) socket(0x1e, 0x3, 0x0) socket(0x1e, 0x0, 0x0) ptrace$PTRACE_SECCOMP_GET_FILTER(0x420c, 0x0, 0x0, &(0x7f0000000380)=""/113) sched_yield() ioctl$TUNGETIFF(r4, 0x800454d2, &(0x7f0000000140)) ioctl$KIOCSOUND(r4, 0x4b2f, 0xfffffffffffffb74) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x20, 0x9b}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000447000)='./file0\x00', &(0x7f00000e1000)='msdos\x00', 0x0, &(0x7f000097bfff)) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000580)='./cgroup/syz0\x00', 0x1ff) [ 332.445658] ? syscall_return_slowpath+0x550/0x550 [ 332.445671] ? syscall_return_slowpath+0x2ac/0x550 [ 332.445696] ? entry_SYSCALL_64_after_hwframe+0x52/0xb7 [ 332.445715] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 332.445734] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 332.445742] RIP: 0033:0x454e79 [ 332.445748] RSP: 002b:00007f37fba8ec68 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 332.445759] RAX: ffffffffffffffda RBX: 00007f37fba8f6d4 RCX: 0000000000454e79 [ 332.445765] RDX: 00000000200e1000 RSI: 0000000020447000 RDI: 0000000020000000 [ 332.445770] RBP: 000000000072bea0 R08: 000000002097bfff R09: 0000000000000000 [ 332.445776] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000019 [ 332.445782] R13: 00000000000003fa R14: 00000000006f8010 R15: 000000000000001a [ 332.448090] print_req_error: 24 callbacks suppressed [ 332.448095] print_req_error: I/O error, dev loop199, sector 0 [ 332.541580] binder: 31832:31833 unknown command 20 [ 332.570985] FAT-fs (loop199): unable to read boot sector [ 332.575458] binder: 31832:31833 ioctl c0306201 20000340 returned -22 2018/03/31 09:15:39 executing program 3: r0 = syz_open_dev$random(&(0x7f00000001c0)='/dev/random\x00', 0x0, 0x800) r1 = syz_open_dev$loop(&(0x7f0000308000)='/dev/loop#\x00', 0x0, 0x0) ioctl$LOOP_SET_STATUS(r1, 0xc0481273, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "3900ea631d00000000020000010000009f00000023f7b7d65f90b0e6330ee739b319d8f6aa6bd58d1443474482e85040fb4947ebb55bd19f335b5bffff0001f3", "cfa430745a540dc1c149b7b81579f6a41c51f7d51933223e82ab867dac761faf"}) write(r0, &(0x7f0000000480), 0x3a8) setsockopt$inet_sctp6_SCTP_RECVNXTINFO(0xffffffffffffffff, 0x84, 0x21, &(0x7f00000003c0)=0x200, 0x4) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f00000000c0)=0x0) getsockopt$netrom_NETROM_T4(0xffffffffffffffff, 0x103, 0x6, &(0x7f0000000300)=0x8, &(0x7f0000000340)=0x4) r3 = getpid() sched_setparam(r3, &(0x7f0000000400)) syz_open_dev$loop(&(0x7f0000ca9ff5)='/dev/loop#\x00', 0x0, 0x400000000000082) r4 = memfd_create(&(0x7f0000614000)="74086e750000000000000000008c00", 0x0) pwritev(r4, &(0x7f0000f50f90)=[{&(0x7f0000000040)="aa", 0x1}], 0x1, 0x0) fcntl$getownex(r1, 0x10, &(0x7f0000000240)={0x0, 0x0}) r6 = syz_open_procfs(r5, &(0x7f0000000280)='stat\x00') epoll_ctl$EPOLL_CTL_MOD(r4, 0x3, r0, &(0x7f00000002c0)={0x20000010}) accept4$inet6(r4, &(0x7f0000000100)={0x0, 0x0, 0x0, @mcast1}, &(0x7f0000000140)=0x1c, 0x7fd) getsockopt$inet_IP_IPSEC_POLICY(r4, 0x0, 0x10, &(0x7f0000000940)={{{@in6=@local, @in6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@loopback}, 0x0, @in=@local}}, &(0x7f0000000780)=0xe8) getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f00000007c0)={0x0, 0x0, 0x0}, &(0x7f0000000540)=0xc) fchown(r4, r7, r8) r9 = syz_open_dev$binder(&(0x7f0000000100)='/dev/binder#\x00', 0xffffffffffffffff, 0x806) ioctl$BINDER_SET_CONTEXT_MGR(r6, 0x40046207, 0x0) mmap$binder(&(0x7f000000c000/0x2000)=nil, 0x2000, 0x0, 0x12, r9, 0x0) ioctl$BINDER_WRITE_READ(r9, 0xc0306201, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000), 0x0, 0x0, &(0x7f0000011f9d)}) getsockopt$inet_sctp6_SCTP_AUTO_ASCONF(0xffffffffffffffff, 0x84, 0x1e, &(0x7f0000000140), &(0x7f0000000180)=0x4) ioctl$BINDER_WRITE_READ(r9, 0xc0306201, &(0x7f0000000340)={0x8, 0x0, &(0x7f0000000440)=ANY=[@ANYRES64=r1], 0x0, 0x0, &(0x7f0000000240)}) write(0xffffffffffffffff, &(0x7f0000000300)="8be25f5790f664f32509e40d6f879d5add7e2d359c9a19afb750a2d25352875d187d4118c99a2d5c6db433c277cc7d345b87a34f1b417033d367cb0cfd6a25633f77aafb17e99c33cb65352c901ae75176f07bb0a4bb5ebff3d87e", 0x5b) r10 = ioctl$LOOP_CTL_GET_FREE(r4, 0x4c82) ioctl$LOOP_CTL_REMOVE(r6, 0x4c81, r10) openat$cgroup(0xffffffffffffff9c, &(0x7f0000000000)='syz0\x00', 0x200002, 0x0) sched_setaffinity(r2, 0x8, &(0x7f0000000200)=0x7) [ 332.596551] print_req_error: I/O error, dev loop199, sector 0 [ 332.638934] binder: 31832:31837 unknown command 26 [ 332.646359] FAT-fs (loop199): unable to read boot sector [ 332.648687] binder: 31832:31837 ioctl c0306201 20000340 returned -22 [ 332.657040] print_req_error: I/O error, dev loop199, sector 0 [ 332.712274] FAT-fs (loop199): unable to read boot sector 2018/03/31 09:15:39 executing program 1: perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f000031f000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) prctl$void(0x0) getpid() syz_open_dev$vcsn(&(0x7f0000000040)='/dev/vcs#\x00', 0x400, 0x20000) r0 = socket$alg(0x26, 0x5, 0x0) ioctl$sock_SIOCGIFBR(r0, 0x8940, &(0x7f0000000040)=@get={0x1, &(0x7f0000000400)=""/242, 0x100000000}) bind$alg(r0, &(0x7f0000000080)={0x26, 'aead\x00', 0x0, 0x0, 'generic-gcm-aesni\x00'}, 0x58) r1 = syz_open_dev$sndmidi(&(0x7f0000000100)='/dev/snd/midiC#D#\x00', 0xfd, 0x0) bind(r1, &(0x7f0000000140)=@llc={0x1a, 0x33a, 0x7, 0x80, 0x0, 0x4, @remote={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xbb}}, 0x80) r2 = syz_init_net_socket$nfc_llcp(0x27, 0x1, 0x1) setsockopt$nfc_llcp_NFC_LLCP_MIUX(r2, 0x118, 0x15, &(0x7f0000000000), 0x4) r3 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/cuse\x00', 0x103002, 0x0) futimesat(r3, &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)={{0x0, 0x7530}}) r4 = syz_open_dev$vcsa(&(0x7f00000001c0)='/dev/vcsa#\x00', 0x2, 0x4020ff) sendto$inet6(r4, &(0x7f0000000bc0), 0x0, 0x20000000, &(0x7f0000000c40)={0xa, 0x4e20, 0x6, @dev={0xfe, 0x80, [], 0x19}, 0x1f}, 0x1c) sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f0000000000)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x8}, 0xb4fcd35419244434, &(0x7f00004ca000)={&(0x7f0000000300)=ANY=[], 0x1a1}, 0x1}, 0x0) syz_fuseblk_mount(&(0x7f0000001380)='./file0\x00', &(0x7f00000013c0)='./file0\x00', 0xf000, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0xb21, 0x0) socket(0x1e, 0x3, 0x0) ptrace$PTRACE_SECCOMP_GET_FILTER(0x420c, 0x0, 0x0, &(0x7f0000000380)=""/113) sched_yield() ioctl$TUNGETIFF(r4, 0x800454d2, &(0x7f0000000140)) ioctl$KIOCSOUND(r4, 0x4b2f, 0xfffffffffffffb74) write$cgroup_int(r4, &(0x7f0000000200)={[0x3a, 0x0]}, 0x2) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x20, 0x9b}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000447000)='./file0\x00', &(0x7f00000e1000)='msdos\x00', 0x0, &(0x7f000097bfff)) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000580)='./cgroup/syz0\x00', 0x1ff) syz_open_dev$audion(&(0x7f0000000280)='/dev/audio#\x00', 0x7be, 0x0) fcntl$getown(0xffffffffffffffff, 0x9) [ 332.714877] FAULT_INJECTION: forcing a failure. [ 332.714877] name failslab, interval 1, probability 0, space 0, times 0 [ 332.714890] CPU: 1 PID: 31831 Comm: syz-executor7 Not tainted 4.16.0-rc7+ #8 [ 332.714898] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 332.714902] Call Trace: [ 332.714919] dump_stack+0x194/0x24d [ 332.714934] ? arch_local_irq_restore+0x53/0x53 [ 332.714945] ? __save_stack_trace+0x7e/0xd0 [ 332.714967] should_fail+0x8c0/0xa40 [ 332.714980] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 332.714991] ? kasan_kmalloc+0xad/0xe0 [ 332.715000] ? kmem_cache_alloc_trace+0x136/0x740 [ 332.715014] ? __memcg_init_list_lru_node+0x169/0x270 [ 332.715021] ? __list_lru_init+0x544/0x750 [ 332.715030] ? sget_userns+0x6b1/0xe40 [ 332.715039] ? mount_fs+0x66/0x2d0 [ 332.715049] ? vfs_kern_mount.part.26+0xc6/0x4a0 [ 332.715056] ? do_mount+0xea4/0x2bb0 [ 332.715066] ? do_syscall_64+0x281/0x940 [ 332.715077] ? entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 332.715092] ? find_held_lock+0x35/0x1d0 [ 332.715106] ? __lock_is_held+0xb6/0x140 [ 332.715126] ? check_same_owner+0x320/0x320 [ 332.715140] ? rcu_note_context_switch+0x710/0x710 [ 332.715157] should_failslab+0xec/0x120 [ 332.715167] kmem_cache_alloc_trace+0x4b/0x740 [ 332.715177] ? __kmalloc_node+0x33/0x70 [ 332.715184] ? __kmalloc_node+0x33/0x70 [ 332.715195] ? rcu_read_lock_sched_held+0x108/0x120 [ 332.715208] __memcg_init_list_lru_node+0x169/0x270 [ 332.715220] ? list_lru_add+0x7c0/0x7c0 [ 332.715230] ? __kmalloc_node+0x47/0x70 [ 332.715245] __list_lru_init+0x544/0x750 [ 332.715259] ? memcg_destroy_list_lru_node.isra.7+0x110/0x110 [ 332.715271] ? trace_hardirqs_on_caller+0x421/0x5c0 [ 332.715287] ? lockdep_init_map+0x9/0x10 [ 332.715299] sget_userns+0x6b1/0xe40 [ 332.715306] ? kill_litter_super+0x90/0x90 [ 332.715319] ? ns_test_super+0x50/0x50 [ 332.715330] ? destroy_unused_super.part.6+0xd0/0xd0 [ 332.715338] ? do_raw_spin_trylock+0x190/0x190 [ 332.715351] ? kobject_put+0x6b/0x250 [ 332.715366] ? blkdev_get+0x3a1/0xb00 [ 332.715380] ? cap_capable+0x1b5/0x230 [ 332.715389] ? __blkdev_get+0x13b0/0x13b0 [ 332.715402] ? security_capable+0x8e/0xc0 [ 332.715412] ? kill_litter_super+0x90/0x90 [ 332.715423] ? ns_capable_common+0xcf/0x160 [ 332.715432] ? ns_test_super+0x50/0x50 [ 332.715440] ? kill_litter_super+0x90/0x90 [ 332.715448] sget+0xd2/0x120 [ 332.715461] mount_bdev+0x109/0x370 [ 332.715470] ? msdos_mount+0x40/0x40 [ 332.715483] msdos_mount+0x34/0x40 [ 332.715493] mount_fs+0x66/0x2d0 [ 332.715507] vfs_kern_mount.part.26+0xc6/0x4a0 [ 332.715519] ? may_umount+0xa0/0xa0 [ 332.715529] ? _raw_read_unlock+0x22/0x30 [ 332.715539] ? __get_fs_type+0x8a/0xc0 [ 332.715552] do_mount+0xea4/0x2bb0 [ 332.715566] ? copy_mount_string+0x40/0x40 [ 332.715575] ? trace_hardirqs_on_caller+0x421/0x5c0 [ 332.715586] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 332.715601] ? retint_kernel+0x10/0x10 [ 332.715615] ? copy_mount_options+0x149/0x2e0 [ 332.715627] ? __sanitizer_cov_trace_pc+0x3b/0x50 [ 332.715638] ? copy_mount_options+0x1f7/0x2e0 [ 332.715651] SyS_mount+0xab/0x120 [ 332.715659] ? copy_mnt_ns+0xb30/0xb30 [ 332.715669] do_syscall_64+0x281/0x940 [ 332.715679] ? vmalloc_sync_all+0x30/0x30 [ 332.715690] ? trace_event_raw_event_sys_exit+0x260/0x260 [ 332.715701] ? syscall_return_slowpath+0x550/0x550 [ 332.715712] ? syscall_return_slowpath+0x2ac/0x550 [ 332.715726] ? entry_SYSCALL_64_after_hwframe+0x52/0xb7 [ 332.715739] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 332.715756] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 332.715763] RIP: 0033:0x454e79 [ 332.715769] RSP: 002b:00007f37fba8ec68 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 332.715780] RAX: ffffffffffffffda RBX: 00007f37fba8f6d4 RCX: 0000000000454e79 [ 332.715786] RDX: 00000000200e1000 RSI: 0000000020447000 RDI: 0000000020000000 [ 332.715792] RBP: 000000000072bea0 R08: 000000002097bfff R09: 0000000000000000 [ 332.715798] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000019 [ 332.715803] R13: 00000000000003fa R14: 00000000006f8010 R15: 000000000000001b [ 332.732945] binder: 31843:31845 unknown command 20 [ 332.732957] binder: 31843:31845 ioctl c0306201 20000340 returned -22 [ 332.733847] print_req_error: I/O error, dev loop199, sector 0 [ 332.733888] FAT-fs (loop199): unable to read boot sector [ 332.775108] binder: 31843:31846 unknown command 26 [ 332.775122] binder: 31843:31846 ioctl c0306201 20000340 returned -22 [ 332.833689] xprt_adjust_timeout: rq_timeout = 0! [ 332.856211] xprt_adjust_timeout: rq_timeout = 0! [ 332.872878] print_req_error: I/O error, dev loop199, sector 0 [ 333.245127] FAT-fs (loop199): unable to read boot sector [ 333.257799] print_req_error: I/O error, dev loop199, sector 0 [ 333.263908] FAT-fs (loop199): unable to read boot sector [ 333.270071] print_req_error: I/O error, dev loop199, sector 0 [ 333.270127] FAT-fs (loop199): unable to read boot sector [ 333.292396] print_req_error: I/O error, dev loop199, sector 0 [ 333.298641] FAT-fs (loop199): unable to read boot sector [ 333.305435] print_req_error: I/O error, dev loop199, sector 0 [ 333.311431] FAT-fs (loop199): unable to read boot sector [ 333.324481] print_req_error: I/O error, dev loop199, sector 0 [ 333.330575] FAT-fs (loop199): unable to read boot sector 2018/03/31 09:15:40 executing program 3: r0 = syz_open_dev$random(&(0x7f00000001c0)='/dev/random\x00', 0x0, 0x800) r1 = syz_open_dev$loop(&(0x7f0000308000)='/dev/loop#\x00', 0x0, 0x0) ioctl$LOOP_SET_STATUS(r1, 0xc0481273, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "3900ea631d00000000020000010000009f00000023f7b7d65f90b0e6330ee739b319d8f6aa6bd58d1443474482e85040fb4947ebb55bd19f335b5bffff0001f3", "cfa430745a540dc1c149b7b81579f6a41c51f7d51933223e82ab867dac761faf"}) write(0xffffffffffffffff, &(0x7f00000001c0), 0x0) setsockopt$inet_sctp6_SCTP_RECVNXTINFO(0xffffffffffffffff, 0x84, 0x21, &(0x7f00000003c0)=0x200, 0x4) r2 = openat$hwrng(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/hwrng\x00', 0x101000, 0x0) ioctl$TIOCGPGRP(r2, 0x540f, &(0x7f0000000500)=0x0) getsockopt$netrom_NETROM_T4(0xffffffffffffffff, 0x103, 0x6, &(0x7f0000000300)=0x8, &(0x7f0000000340)=0x4) r4 = getpid() sched_setparam(r4, &(0x7f0000000400)) syz_open_dev$loop(&(0x7f0000ca9ff5)='/dev/loop#\x00', 0x0, 0x82) r5 = memfd_create(&(0x7f0000614000)="74086e750000000000000000008c00", 0x0) pwritev(r5, &(0x7f0000f50f90)=[{&(0x7f0000000040)="aa", 0x1}], 0x1, 0x0) fcntl$getownex(r1, 0x10, &(0x7f0000000240)={0x0, 0x0}) r7 = syz_open_procfs(r6, &(0x7f0000000280)='stat\x00') epoll_ctl$EPOLL_CTL_MOD(r5, 0x3, r0, &(0x7f00000002c0)={0x20000010}) accept4$inet6(r5, &(0x7f0000000100)={0x0, 0x0, 0x0, @mcast1}, &(0x7f0000000140)=0x1c, 0x7fd) getsockopt$inet_IP_IPSEC_POLICY(r5, 0x0, 0x10, &(0x7f0000000940)={{{@in6=@local, @in6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@loopback}, 0x0, @in=@local}}, &(0x7f0000000780)=0xe8) getsockopt$sock_cred(r5, 0x1, 0x11, &(0x7f00000007c0)={0x0, 0x0, 0x0}, &(0x7f0000000540)=0xc) fchown(r5, r8, r9) r10 = syz_open_dev$binder(&(0x7f0000000380)='/dev/binder#\x00', 0x0, 0x400000000000800) ioctl$BINDER_SET_CONTEXT_MGR(r7, 0x40046207, 0x0) mmap$binder(&(0x7f000000c000/0x2000)=nil, 0x2000, 0x0, 0x12, r10, 0x0) ioctl$BINDER_WRITE_READ(r10, 0xc0306201, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000), 0x0, 0x0, &(0x7f0000011f9d)}) getsockopt$inet_sctp6_SCTP_AUTO_ASCONF(0xffffffffffffffff, 0x84, 0x1e, &(0x7f0000000140), &(0x7f0000000180)=0x4) ioctl$BINDER_WRITE_READ(r10, 0xc0306201, &(0x7f0000000340)={0x8, 0x0, &(0x7f0000000440)=ANY=[@ANYRES64=r1], 0x0, 0x0, &(0x7f0000000240)}) write(0xffffffffffffffff, &(0x7f0000000300)="8be25f5790f664f32509e40d6f879d5add7e2d359c9a19afb750a2d25352875d187d4118c99a2d5c6db433c277cc7d345b87a34f1b417033d367cb0cfd6a25633f77aafb17e99c33cb65352c901ae75176f07bb0a4bb5ebff3d87e", 0x5b) r11 = ioctl$LOOP_CTL_GET_FREE(r5, 0x4c82) ioctl$LOOP_CTL_REMOVE(r7, 0x4c81, r11) openat$cgroup(0xffffffffffffff9c, &(0x7f0000000000)='syz0\x00', 0x200002, 0x0) sched_setaffinity(r3, 0x8, &(0x7f0000000200)=0x7) 2018/03/31 09:15:40 executing program 2: syz_open_dev$loop(&(0x7f00000003c0)='/dev/loop#\x00', 0x8, 0x0) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(0xffffffffffffffff, 0x4040534e, &(0x7f000019ffe9)={0xc1}) r0 = accept(0xffffffffffffffff, &(0x7f0000000080)=@can, &(0x7f0000000180)=0x80) ioctl$sock_ipx_SIOCAIPXPRISLT(r0, 0x89e1, &(0x7f0000000280)=0x3f) ioctl$sock_inet_SIOCRTMSG(r0, 0x890d, &(0x7f0000000200)={0x80, {0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x19}}, {0x2, 0x4e21, @local={0xac, 0x14, 0x14, 0xaa}}, {0x2, 0x4e23}, 0x0, 0x7, 0x1, 0x0, 0x9, 0x0, 0x0, 0x0, 0xfffffffffffffff7}) getsockopt$inet_sctp_SCTP_PRIMARY_ADDR(0xffffffffffffffff, 0x84, 0x6, &(0x7f0000000ac0)={0x0, @in={{0x2, 0x4e20, @loopback=0x7f000001}}}, &(0x7f00000002c0)=0x84) setsockopt$inet_sctp_SCTP_ENABLE_STREAM_RESET(r0, 0x84, 0x76, &(0x7f0000000300)={r1, 0x1c9}, 0x8) r2 = syz_open_dev$sg(&(0x7f0000000700)='/dev/sg#\x00', 0xfffffffffffffff7, 0x800) clone(0x2000c100, &(0x7f0000000800)="97bb77038add5df9e9d4f9783b82c55fe59e5c0acdbcfc9bcf92ac0e1f1f3c1959c1d25dfabf3849336c7c85be174d7765b47e113632aea54b87e4d3f2c1db09e6aa4040b43d17308fb7e62e808067da2fff3cfd8e4c038c814bbfc6bc49d8ebc8671d8297e2d34dc61f2d194d2dbb8f59b4c853e0714d3d4bb29d1243fac01c86c8c4dd38daedab3c6ad73a72d3f6dd2684aa82e5285eb82452c9848b7beb8bc513ba8c8973cad0bd5926604846b7f5d0397b", &(0x7f00000008c0), &(0x7f0000000900), &(0x7f0000000940)="ed6c04412e782fe395f084741e3d9fe469aebde09acc8f8d8d84d1f00f5573b09acba487077ebb904cb1f3fed55f59d677ce24bbd2a7506df8e1e0d0fc709cb8c9f4ab2aeeeebc5ef879742c1f7628f1862c88b5b0da89acbf43ef12e4839405b6a3430d296fea06d2f3a8356c57ec991e") ioctl$SNDRV_SEQ_IOCTL_SUBSCRIBE_PORT(0xffffffffffffffff, 0x40505330, &(0x7f0000ec6fb0)={{}, {0x80}}) getsockopt$netrom_NETROM_T1(r0, 0x103, 0x1, &(0x7f0000000000), &(0x7f0000000380)=0x4) syz_open_dev$adsp(&(0x7f0000000600)='/dev/adsp#\x00', 0x100000000, 0x80000) rt_sigprocmask(0x3d738072cd0f41ac, &(0x7f0000000cc0)={0x7}, &(0x7f0000000d00), 0x8) clone(0x40000000, &(0x7f0000000500)="67cdd9994c47c31d325b069924a7064c157c2ec0b5b5dca2feeb7dabef3b7af0d02d559e293faa759f2b3cb12aea360c2d", &(0x7f0000000580), &(0x7f00000005c0), &(0x7f0000000a00)="29859fdda9a119e54a27f9ec76b4d63a16dc5bbdd38c2fda0e5f4d8f830cd987ec7d3ffc66cf3db8820968fd89a1fba8fe6352a29a27f3b000bcdf238f2c04b358fc831025180e0be313da41de6366c94a1a0f86aaffdf2c039111b55275c054e14819a827fe809225249a01944263a2aec15f64e752e35892b1b8e7ef1e0e9115") ioctl$SNDRV_SEQ_IOCTL_DELETE_PORT(0xffffffffffffffff, 0x40a85321, &(0x7f0000000b80)={{0x4, 0x8}, 'port0\x00', 0x80, 0x0, 0x10000, 0x6, 0x2, 0x80, 0x8, 0x0, 0x0, 0x3dec00}) getsockopt$inet_sctp_SCTP_SOCKOPT_PEELOFF(r2, 0x84, 0x66, &(0x7f0000000c40)={r1, 0x6}, &(0x7f0000000c80)=0x8) clock_settime(0x7, &(0x7f0000000740)={0x77359400}) ioctl$SNDRV_SEQ_IOCTL_CLIENT_ID(0xffffffffffffffff, 0x80045301, &(0x7f0000000340)) r3 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer2\x00', 0x0, 0x0) openat$sequencer2(0xffffffffffffff9c, &(0x7f00000006c0)='/dev/sequencer2\x00', 0x222081, 0x0) ioctl$RNDADDENTROPY(0xffffffffffffffff, 0x40085203, &(0x7f0000000100)=ANY=[@ANYPTR=&(0x7f0000000680)=ANY=[@ANYPTR64=&(0x7f0000000640)=ANY=[@ANYPTR, @ANYPTR]]]) setsockopt$inet_sctp_SCTP_DEFAULT_SEND_PARAM(r3, 0x84, 0xa, &(0x7f0000000140)={0x5, 0x100000001, 0x0, 0x8, 0x0, 0x7, 0x401, 0x1f, r1}, 0x20) 2018/03/31 09:15:40 executing program 7 (fault-call:24 fault-nth:28): perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f000031f000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getpid() r0 = syz_open_dev$vcsn(&(0x7f0000000040)='/dev/vcs#\x00', 0x0, 0x20000) ioctl$GIO_CMAP(r0, 0x4b70, &(0x7f0000000080)) r1 = socket$alg(0x26, 0x5, 0x0) ioctl$sock_SIOCGIFBR(r1, 0x8940, &(0x7f0000000040)=@get={0x1, &(0x7f0000000400)=""/242, 0x100000000}) bind$alg(r1, &(0x7f0000000080)={0x26, 'aead\x00', 0x0, 0x0, 'generic-gcm-aesni\x00'}, 0x58) syz_open_dev$sndmidi(&(0x7f0000000100)='/dev/snd/midiC#D#\x00', 0xfd, 0x0) bind(0xffffffffffffffff, &(0x7f0000000140)=@llc={0x1a, 0x33a, 0x7, 0x80, 0x5, 0x4, @remote={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xbb}}, 0x80) r2 = syz_init_net_socket$nfc_llcp(0x27, 0x1, 0x1) setsockopt$nfc_llcp_NFC_LLCP_MIUX(r2, 0x118, 0x15, &(0x7f0000000000), 0x4) r3 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/cuse\x00', 0x103002, 0x0) futimesat(r3, &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)={{0x0, 0x7530}}) r4 = syz_open_dev$vcsa(&(0x7f00000001c0)='/dev/vcsa#\x00', 0x2, 0x4020ff) sendto$inet6(r4, &(0x7f0000000bc0)="36251e313e0743fc195a1a198a14434e8a0a00b3f452a3b5644e336ec712a16310c9aecc4e3097bc666a8882128a73c368ce731e9fbf3fe18fa52d00", 0x3c, 0x20000000, &(0x7f0000000c40)={0xa, 0x0, 0x6, @dev={0xfe, 0x80, [], 0x19}, 0x1f}, 0x1c) accept$alg(r0, 0x0, 0x0) sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f0000000000)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x8}, 0xb4fcd35419244434, &(0x7f00004ca000)={&(0x7f0000000300)=ANY=[], 0x1a1}, 0x1}, 0x0) syz_fuseblk_mount(&(0x7f0000001380)='./file0\x00', &(0x7f00000013c0)='./file0\x00', 0xf000, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0xb21, 0x0) socket(0x1e, 0x3, 0x0) socket(0x1e, 0x0, 0x0) ptrace$PTRACE_SECCOMP_GET_FILTER(0x420c, 0x0, 0x0, &(0x7f0000000380)=""/113) sched_yield() ioctl$TUNGETIFF(r4, 0x800454d2, &(0x7f0000000140)) ioctl$KIOCSOUND(r4, 0x4b2f, 0xfffffffffffffb74) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000447000)='./file0\x00', &(0x7f00000e1000)='msdos\x00', 0x0, &(0x7f000097bfff)) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000580)='./cgroup/syz0\x00', 0x1ff) syz_open_dev$audion(&(0x7f0000000280)='/dev/audio#\x00', 0x7be, 0x0) 2018/03/31 09:15:40 executing program 4: perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f000031f000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) prctl$void(0x0) getpid() r0 = syz_open_dev$vcsn(&(0x7f0000000040)='/dev/vcs#\x00', 0x0, 0x20000) ioctl$GIO_CMAP(r0, 0x4b70, &(0x7f0000000080)) r1 = socket$alg(0x26, 0x5, 0x0) ioctl$sock_SIOCGIFBR(0xffffffffffffffff, 0x8940, &(0x7f0000000040)=@get={0x1, &(0x7f0000000400)=""/242, 0x100000000}) bind$alg(r1, &(0x7f0000000080)={0x26, 'aead\x00', 0x0, 0x0, 'generic-gcm-aesni\x00'}, 0x58) syz_open_dev$sndmidi(&(0x7f0000000100)='/dev/snd/midiC#D#\x00', 0xfd, 0x0) bind(0xffffffffffffffff, &(0x7f0000000140)=@llc={0x1a, 0x33a, 0x7, 0x80, 0x0, 0x4, @remote={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xbb}}, 0x80) r2 = syz_init_net_socket$nfc_llcp(0x27, 0x1, 0x1) setsockopt$nfc_llcp_NFC_LLCP_MIUX(r2, 0x118, 0x15, &(0x7f0000000000), 0x4) r3 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/cuse\x00', 0x103002, 0x0) futimesat(r3, &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)={{0x0, 0x7530}}) r4 = syz_open_dev$vcsa(&(0x7f00000001c0)='/dev/vcsa#\x00', 0x2, 0x0) sendto$inet6(r4, &(0x7f0000000bc0), 0x0, 0x20000000, &(0x7f0000000c40)={0xa, 0x4e20, 0x0, @dev={0xfe, 0x80, [], 0x19}, 0x1f}, 0x1c) accept$alg(r0, 0x0, 0x0) sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f0000000000)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x8}, 0xb4fcd35419244434, &(0x7f00004ca000)={&(0x7f0000000300)=ANY=[], 0x1a1}, 0x1}, 0x0) syz_fuseblk_mount(&(0x7f0000001380)='./file0\x00', &(0x7f00000013c0)='./file0\x00', 0xf000, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0xb21, 0x0) r5 = socket(0x1e, 0x3, 0x0) socket(0x1e, 0x0, 0x0) ptrace$PTRACE_SECCOMP_GET_FILTER(0x420c, 0x0, 0x0, &(0x7f0000000380)=""/113) sched_yield() ioctl$TUNGETIFF(r4, 0x800454d2, &(0x7f0000000140)) ioctl$KIOCSOUND(r4, 0x4b2f, 0xfffffffffffffb74) getsockopt$inet_sctp_SCTP_CONTEXT(r4, 0x84, 0x11, &(0x7f0000000200)={0x0, 0x7f}, &(0x7f0000000240)=0x8) getsockopt$inet_sctp_SCTP_PARTIAL_DELIVERY_POINT(r5, 0x84, 0x13, &(0x7f0000000280)={r6, 0x67}, &(0x7f00000002c0)=0x8) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x20, 0x9b}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000447000)='./file0\x00', &(0x7f00000e1000)='msdos\x00', 0x0, &(0x7f000097bfff)) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000580)='./cgroup/syz0\x00', 0x1ff) 2018/03/31 09:15:40 executing program 6: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000fe1000)={0x5, 0x83, 0x80, 0xf}, 0x1c) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000733000)={0x5, 0x1, 0x5, 0x9}, 0x14) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000001c0)={0xc, 0x4, 0x4, 0x100000001, 0x0, r1}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000000)=ANY=[], &(0x7f00000000c0)='GPL\x00', 0x0, 0x22, &(0x7f0000000100)=""/34}, 0x48) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000fed000)={0x7, 0x9, &(0x7f00000000c0)=@framed={{0x18}, [@map={0x18, 0x0, 0x1, 0x0, r0}, @map={0x18, 0x0, 0x1, 0x0, r1}, @map={0x18, 0x0, 0x1, 0x0, r2}], {0x95}}, &(0x7f0000919ff6)='syzkaller\x00', 0x0, 0xe1, &(0x7f0000000000)=""/225, 0x41f00}, 0x13) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000240)={r3, 0x33, &(0x7f0000000140)}, 0x10) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000280)={r3, 0x50, &(0x7f0000000140)}, 0x10) r4 = perf_event_open(&(0x7f0000cccf88)={0x2, 0x78, 0xe12, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r5 = perf_event_open(&(0x7f000025c000)={0x0, 0x78, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000389000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(r4, 0x2402, 0x3) r6 = getpid() perf_event_open(&(0x7f00000000c0)={0x0, 0x70, 0x100, 0x0, 0x6, 0x1ff, 0x0, 0x10000, 0x3500b, 0x200000000008, 0x3, 0x9, 0x2, 0xa, 0x7, 0x40, 0xa9, 0x8, 0x42, 0x400, 0x81, 0x0, 0x3f, 0xffffffffffff494b, 0x0, 0x0, 0x200, 0x0, 0x16b, 0x800, 0x100000, 0x1ff, 0x0, 0x100, 0x200, 0x0, 0x401f, 0x0, 0x0, 0x7, 0x4, @perf_bp={&(0x7f0000000080), 0x4}, 0x29620, 0xfffffffffffff60c, 0x5, 0x6, 0x4, 0x1, 0x7}, r6, 0x1, 0xffffffffffffffff, 0xa) perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000001000)='./file0\x00', 0x80) perf_event_open(&(0x7f000000a000)={0x2, 0x78, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000a7dfff)}, 0xa00000400, 0xffffffffffffffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f00008deff8)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f000015bffc)='nfs\x00', 0x0, &(0x7f000000a000)) close(r4) mount(&(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)='./file0\x00', &(0x7f0000000200)='gfs2\x00', 0x800400, &(0x7f0000000240)="2ae58a34f307b9d9a01b35be38d783586999adc7711c7c339601809e437cbeff0b32e419718a80c9f334603f7ab1c7e8bc2308430599bc787b3c6a11b6311de0eaa5a1e99e24cbd9b2ec972e5a52faff2913405cc8") close(r5) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000500)={&(0x7f00000004c0)='./file0\x00', 0x0, 0x10}, 0x10) ioctl$sock_kcm_SIOCKCMCLONE(r4, 0x89e2, &(0x7f0000000900)={0xffffffffffffff9c}) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000840)={&(0x7f0000000800)='./file0\x00', 0x0, 0x10}, 0x10) socketpair(0x3, 0x1, 0x174f1f0c, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_kcm_SIOCKCMCLONE(r8, 0x89e2, &(0x7f0000000540)={r7}) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r8, 0x40042409, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x89e1, &(0x7f00000002c0)={r7}) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000000140)) socketpair$inet(0x1e, 0x5, 0x0, &(0x7f0000000d40)={0x0, 0x0}) recvmsg(r9, &(0x7f0000000040)={&(0x7f0000006980)=ANY=[@ANYRES32=0x0], 0x1, &(0x7f0000006d00)=[{&(0x7f0000006c40)=""/181, 0xb5}], 0x1, &(0x7f0000006d40)=""/65, 0x41}, 0x0) 2018/03/31 09:15:40 executing program 1: perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f000031f000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) prctl$void(0x0) getpid() syz_open_dev$vcsn(&(0x7f0000000040)='/dev/vcs#\x00', 0x400, 0x20000) r0 = socket$alg(0x26, 0x5, 0x0) ioctl$sock_SIOCGIFBR(r0, 0x8940, &(0x7f0000000040)=@get={0x1, &(0x7f0000000400)=""/242, 0x100000000}) bind$alg(r0, &(0x7f0000000080)={0x26, 'aead\x00', 0x0, 0x0, 'generic-gcm-aesni\x00'}, 0x58) r1 = syz_open_dev$sndmidi(&(0x7f0000000100)='/dev/snd/midiC#D#\x00', 0xfd, 0x0) bind(r1, &(0x7f0000000140)=@llc={0x1a, 0x33a, 0x7, 0x80, 0x0, 0x4, @remote={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xbb}}, 0x80) r2 = syz_init_net_socket$nfc_llcp(0x27, 0x1, 0x1) setsockopt$nfc_llcp_NFC_LLCP_MIUX(r2, 0x118, 0x15, &(0x7f0000000000), 0x4) r3 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/cuse\x00', 0x103002, 0x0) futimesat(r3, &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)={{0x0, 0x7530}}) r4 = syz_open_dev$vcsa(&(0x7f00000001c0)='/dev/vcsa#\x00', 0x2, 0x4020ff) sendto$inet6(r4, &(0x7f0000000bc0), 0x0, 0x20000000, &(0x7f0000000c40)={0xa, 0x4e20, 0x6, @dev={0xfe, 0x80, [], 0x19}, 0x1f}, 0x1c) sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f0000000000)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x8}, 0xb4fcd35419244434, &(0x7f00004ca000)={&(0x7f0000000300)=ANY=[], 0x1a1}, 0x1}, 0x0) syz_fuseblk_mount(&(0x7f0000001380)='./file0\x00', &(0x7f00000013c0)='./file0\x00', 0xf000, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0xb21, 0x0) r5 = socket(0x1e, 0x3, 0x0) ptrace$PTRACE_SECCOMP_GET_FILTER(0x420c, 0x0, 0x0, &(0x7f0000000380)=""/113) ioctl$sock_FIOGETOWN(r5, 0x8903, &(0x7f0000000200)) sched_yield() ioctl$TUNGETIFF(r4, 0x800454d2, &(0x7f0000000140)) ioctl$KIOCSOUND(r4, 0x4b2f, 0xfffffffffffffb74) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x20, 0x9b}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000447000)='./file0\x00', &(0x7f00000e1000)='msdos\x00', 0x0, &(0x7f000097bfff)) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000580)='./cgroup/syz0\x00', 0x1ff) syz_open_dev$audion(&(0x7f0000000280)='/dev/audio#\x00', 0x7be, 0x0) fcntl$getown(0xffffffffffffffff, 0x9) 2018/03/31 09:15:40 executing program 5: perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f000031f000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) prctl$void(0x0) getpid() r0 = syz_open_dev$vcsn(&(0x7f0000000040)='/dev/vcs#\x00', 0x0, 0x20000) ioctl$GIO_CMAP(r0, 0x4b70, &(0x7f0000000080)) r1 = socket$alg(0x26, 0x5, 0x0) getsockopt$IP_VS_SO_GET_SERVICES(r1, 0x0, 0x482, &(0x7f0000000200)=""/125, &(0x7f00000002c0)=0x7d) bind$alg(r1, &(0x7f0000000080)={0x26, 'aead\x00', 0x0, 0x0, 'generic-gcm-aesni\x00'}, 0x53) syz_open_dev$sndmidi(&(0x7f0000000100)='/dev/snd/midiC#D#\x00', 0xfd, 0x0) bind(0xffffffffffffffff, &(0x7f0000000140)=@llc={0x1a, 0x33a, 0x7, 0x80, 0x5, 0x4, @remote={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xbb}}, 0x80) r2 = syz_init_net_socket$nfc_llcp(0x27, 0x1, 0x1) setsockopt$nfc_llcp_NFC_LLCP_MIUX(r2, 0x118, 0x15, &(0x7f0000000000), 0x4) r3 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/cuse\x00', 0x103002, 0x0) futimesat(r3, &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)={{0x0, 0x7530}}) r4 = syz_open_dev$vcsa(&(0x7f00000001c0)='/dev/vcsa#\x00', 0x2, 0x4020ff) sendto$inet6(0xffffffffffffffff, &(0x7f0000000bc0)="36251e313e0743fc195a1a198a14434e8a0a00b3f452a3b5644e336ec712a16310c9aecc4e3097bc666a8882128a73c368ce731e9fbf3fe18fa52d", 0x3b, 0x20000000, &(0x7f0000000c40)={0xa, 0x4e20, 0x6, @dev={0xfe, 0x80, [], 0x19}, 0x1f}, 0x1c) ioctl$sock_FIOGETOWN(r3, 0x8903, &(0x7f0000000300)) accept$alg(r0, 0x0, 0x0) sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f0000000000)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x8}, 0xb4fcd35419244434, &(0x7f00004ca000)={&(0x7f0000000300)=ANY=[], 0x1a1}, 0x1}, 0x0) syz_fuseblk_mount(&(0x7f0000001380)='./file0\x00', &(0x7f00000013c0)='./file0\x00', 0xf000, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0xb21, 0x0) socket(0x1e, 0x3, 0x0) socket(0x1e, 0x0, 0x0) ptrace$PTRACE_SECCOMP_GET_FILTER(0x420c, 0x0, 0x0, &(0x7f0000000380)=""/113) sched_yield() ioctl$TUNGETIFF(r4, 0x800454d2, &(0x7f0000000140)) ioctl$KIOCSOUND(r4, 0x4b2f, 0xfffffffffffffb74) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x20, 0x9b}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000447000)='./file0\x00', &(0x7f00000e1000)='msdos\x00', 0x0, &(0x7f000097bfff)) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000580)='./cgroup/syz0\x00', 0x1ff) syz_open_dev$audion(&(0x7f0000000280)='/dev/audio#\x00', 0x7be, 0x0) 2018/03/31 09:15:40 executing program 0: perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f000031f000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) prctl$void(0x0) r0 = syz_open_dev$vcsn(&(0x7f0000000040)='/dev/vcs#\x00', 0x0, 0x20000) listen(r0, 0x4957) socket$alg(0x26, 0x5, 0x0) ioctl$sock_SIOCGIFBR(0xffffffffffffffff, 0x8940, &(0x7f0000000040)=@get={0x1, &(0x7f0000000400)=""/242, 0x100000000}) bind$alg(0xffffffffffffffff, &(0x7f0000000080)={0x26, 'aead\x00', 0x0, 0x0, 'generic-gcm-aesni\x00'}, 0x58) syz_open_dev$sndmidi(&(0x7f0000000100)='/dev/snd/midiC#D#\x00', 0xfd, 0x0) bind(0xffffffffffffffff, &(0x7f0000000140)=@llc={0x1a, 0x33a, 0x7, 0x80, 0x0, 0x4, @remote={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xbb}}, 0x80) r1 = syz_init_net_socket$nfc_llcp(0x27, 0x1, 0x1) setsockopt$nfc_llcp_NFC_LLCP_MIUX(r1, 0x118, 0x15, &(0x7f0000000000), 0x4) r2 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/cuse\x00', 0x103002, 0x0) futimesat(r2, &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)={{0x0, 0x7530}}) r3 = syz_open_dev$vcsa(&(0x7f00000001c0)='/dev/vcsa#\x00', 0x2, 0x0) sendto$inet6(r3, &(0x7f0000000bc0)="36251e313e0743fc195a1a198a14434e8a0a00b3f452a3b5644e336ec712a16310c9aecc4e3097bc666a8882128a73c368ce731e9fbf3fe18fa52d00c34ac2e57c1c4569cfbd6a621c6dfbc032121aed", 0x50, 0x20000000, &(0x7f0000000c40)={0xa, 0x4e20, 0x6, @dev={0xfe, 0x80, [], 0x19}, 0x1f}, 0x1c) accept$alg(r0, 0x0, 0x0) sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f0000000000)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x8}, 0xb4fcd35419244434, &(0x7f00004ca000)={&(0x7f0000000300)=ANY=[], 0x1a1}, 0x1}, 0x0) syz_fuseblk_mount(&(0x7f0000001380)='./file0\x00', &(0x7f00000013c0)='./file0\x00', 0xf000, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0xb21, 0x0) socket(0x1e, 0x3, 0x0) socket(0x1e, 0x0, 0x0) ptrace$PTRACE_SECCOMP_GET_FILTER(0x420c, 0x0, 0x0, &(0x7f0000000380)=""/113) sched_yield() ioctl$TUNGETIFF(r3, 0x800454d2, &(0x7f0000000140)) ioctl$KIOCSOUND(r3, 0x4b2f, 0xfffffffffffffb74) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x20, 0x9b}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000447000)='./file0\x00', &(0x7f00000e1000)='msdos\x00', 0x0, &(0x7f000097bfff)) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000580)='./cgroup/syz0\x00', 0x1ff) [ 333.430593] FAT-fs (loop199): unable to read boot sector [ 333.433057] binder: 31860:31869 unknown command 20 [ 333.443497] FAT-fs (loop199): unable to read boot sector [ 333.450966] FAULT_INJECTION: forcing a failure. [ 333.450966] name failslab, interval 1, probability 0, space 0, times 0 [ 333.462302] CPU: 0 PID: 31863 Comm: syz-executor7 Not tainted 4.16.0-rc7+ #8 [ 333.462311] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 333.478828] Call Trace: [ 333.481417] dump_stack+0x194/0x24d [ 333.485058] ? arch_local_irq_restore+0x53/0x53 [ 333.489745] should_fail+0x8c0/0xa40 [ 333.493467] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 333.498570] ? kasan_kmalloc+0xad/0xe0 [ 333.502452] ? kmem_cache_alloc_trace+0x136/0x740 [ 333.507306] ? __memcg_init_list_lru_node+0x169/0x270 [ 333.512500] ? sget_userns+0x6b1/0xe40 [ 333.516388] ? mount_fs+0x66/0x2d0 [ 333.519925] ? vfs_kern_mount.part.26+0xc6/0x4a0 [ 333.524676] ? do_mount+0xea4/0x2bb0 [ 333.528387] ? do_syscall_64+0x281/0x940 [ 333.532443] ? entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 333.537809] ? find_held_lock+0x35/0x1d0 [ 333.541871] ? __lock_is_held+0xb6/0x140 [ 333.545945] ? check_same_owner+0x320/0x320 [ 333.550271] ? rcu_note_context_switch+0x710/0x710 [ 333.555207] should_failslab+0xec/0x120 [ 333.559178] kmem_cache_alloc_trace+0x4b/0x740 [ 333.563757] ? __kmalloc_node+0x33/0x70 [ 333.567723] ? __kmalloc_node+0x33/0x70 [ 333.571696] ? rcu_read_lock_sched_held+0x108/0x120 [ 333.576716] __memcg_init_list_lru_node+0x169/0x270 [ 333.581736] ? list_lru_add+0x7c0/0x7c0 [ 333.585703] ? __kmalloc_node+0x47/0x70 [ 333.589683] __list_lru_init+0x544/0x750 [ 333.594202] ? memcg_destroy_list_lru_node.isra.7+0x110/0x110 [ 333.600088] ? trace_hardirqs_on_caller+0x421/0x5c0 [ 333.605112] ? lockdep_init_map+0x9/0x10 [ 333.609172] sget_userns+0x6b1/0xe40 [ 333.612880] ? kill_litter_super+0x90/0x90 [ 333.617114] ? ns_test_super+0x50/0x50 [ 333.620999] ? destroy_unused_super.part.6+0xd0/0xd0 [ 333.626101] ? do_raw_spin_trylock+0x190/0x190 [ 333.630687] ? kobject_put+0x6b/0x250 [ 333.634493] ? blkdev_get+0x3a1/0xb00 [ 333.638297] ? cap_capable+0x1b5/0x230 [ 333.642183] ? __blkdev_get+0x13b0/0x13b0 [ 333.646337] ? security_capable+0x8e/0xc0 [ 333.650485] ? kill_litter_super+0x90/0x90 [ 333.654715] ? ns_capable_common+0xcf/0x160 [ 333.659036] ? ns_test_super+0x50/0x50 [ 333.662916] ? kill_litter_super+0x90/0x90 [ 333.667145] sget+0xd2/0x120 [ 333.670166] mount_bdev+0x109/0x370 [ 333.673787] ? msdos_mount+0x40/0x40 [ 333.677501] msdos_mount+0x34/0x40 [ 333.681040] mount_fs+0x66/0x2d0 [ 333.684409] vfs_kern_mount.part.26+0xc6/0x4a0 [ 333.688993] ? may_umount+0xa0/0xa0 [ 333.692616] ? _raw_read_unlock+0x22/0x30 [ 333.696761] ? __get_fs_type+0x8a/0xc0 [ 333.701519] do_mount+0xea4/0x2bb0 [ 333.705064] ? copy_mount_string+0x40/0x40 [ 333.709296] ? trace_hardirqs_on_caller+0x421/0x5c0 [ 333.714311] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 333.719074] ? retint_kernel+0x10/0x10 [ 333.722969] ? copy_mount_options+0x18b/0x2e0 [ 333.727458] ? copy_mount_options+0x193/0x2e0 [ 333.731947] ? copy_mount_options+0x1f7/0x2e0 [ 333.736442] SyS_mount+0xab/0x120 [ 333.739893] ? copy_mnt_ns+0xb30/0xb30 [ 333.743780] do_syscall_64+0x281/0x940 [ 333.747663] ? vmalloc_sync_all+0x30/0x30 [ 333.751811] ? _raw_spin_unlock_irq+0x27/0x70 [ 333.756309] ? finish_task_switch+0x1c1/0x7e0 [ 333.760806] ? syscall_return_slowpath+0x550/0x550 [ 333.765732] ? syscall_return_slowpath+0x2ac/0x550 [ 333.770657] ? prepare_exit_to_usermode+0x350/0x350 [ 333.775675] ? entry_SYSCALL_64_after_hwframe+0x52/0xb7 [ 333.781040] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 333.785887] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 333.791073] RIP: 0033:0x454e79 [ 333.794264] RSP: 002b:00007f37fba8ec68 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 333.801973] RAX: ffffffffffffffda RBX: 00007f37fba8f6d4 RCX: 0000000000454e79 [ 333.809235] RDX: 00000000200e1000 RSI: 0000000020447000 RDI: 0000000020000000 [ 333.816501] RBP: 000000000072bea0 R08: 000000002097bfff R09: 0000000000000000 [ 333.823767] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000019 [ 333.831029] R13: 00000000000003fa R14: 00000000006f8010 R15: 000000000000001c [ 333.844070] binder: 31860:31869 ioctl c0306201 20000340 returned -22 [ 333.846120] FAT-fs (loop199): unable to read boot sector [ 333.859337] FAT-fs (loop199): unable to read boot sector [ 333.869268] xprt_adjust_timeout: rq_timeout = 0! 2018/03/31 09:15:41 executing program 7 (fault-call:24 fault-nth:29): perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f000031f000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getpid() r0 = syz_open_dev$vcsn(&(0x7f0000000040)='/dev/vcs#\x00', 0x0, 0x20000) ioctl$GIO_CMAP(r0, 0x4b70, &(0x7f0000000080)) r1 = socket$alg(0x26, 0x5, 0x0) ioctl$sock_SIOCGIFBR(r1, 0x8940, &(0x7f0000000040)=@get={0x1, &(0x7f0000000400)=""/242, 0x100000000}) bind$alg(r1, &(0x7f0000000080)={0x26, 'aead\x00', 0x0, 0x0, 'generic-gcm-aesni\x00'}, 0x58) syz_open_dev$sndmidi(&(0x7f0000000100)='/dev/snd/midiC#D#\x00', 0xfd, 0x0) bind(0xffffffffffffffff, &(0x7f0000000140)=@llc={0x1a, 0x33a, 0x7, 0x80, 0x5, 0x4, @remote={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xbb}}, 0x80) r2 = syz_init_net_socket$nfc_llcp(0x27, 0x1, 0x1) setsockopt$nfc_llcp_NFC_LLCP_MIUX(r2, 0x118, 0x15, &(0x7f0000000000), 0x4) r3 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/cuse\x00', 0x103002, 0x0) futimesat(r3, &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)={{0x0, 0x7530}}) r4 = syz_open_dev$vcsa(&(0x7f00000001c0)='/dev/vcsa#\x00', 0x2, 0x4020ff) sendto$inet6(r4, &(0x7f0000000bc0)="36251e313e0743fc195a1a198a14434e8a0a00b3f452a3b5644e336ec712a16310c9aecc4e3097bc666a8882128a73c368ce731e9fbf3fe18fa52d00", 0x3c, 0x20000000, &(0x7f0000000c40)={0xa, 0x0, 0x6, @dev={0xfe, 0x80, [], 0x19}, 0x1f}, 0x1c) accept$alg(r0, 0x0, 0x0) sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f0000000000)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x8}, 0xb4fcd35419244434, &(0x7f00004ca000)={&(0x7f0000000300)=ANY=[], 0x1a1}, 0x1}, 0x0) syz_fuseblk_mount(&(0x7f0000001380)='./file0\x00', &(0x7f00000013c0)='./file0\x00', 0xf000, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0xb21, 0x0) socket(0x1e, 0x3, 0x0) socket(0x1e, 0x0, 0x0) ptrace$PTRACE_SECCOMP_GET_FILTER(0x420c, 0x0, 0x0, &(0x7f0000000380)=""/113) sched_yield() ioctl$TUNGETIFF(r4, 0x800454d2, &(0x7f0000000140)) ioctl$KIOCSOUND(r4, 0x4b2f, 0xfffffffffffffb74) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000447000)='./file0\x00', &(0x7f00000e1000)='msdos\x00', 0x0, &(0x7f000097bfff)) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000580)='./cgroup/syz0\x00', 0x1ff) syz_open_dev$audion(&(0x7f0000000280)='/dev/audio#\x00', 0x7be, 0x0) 2018/03/31 09:15:41 executing program 5: perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f000031f000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) prctl$void(0x0) r0 = getpid() r1 = syz_open_dev$vcsn(&(0x7f0000000040)='/dev/vcs#\x00', 0x0, 0x20000) ioctl$GIO_CMAP(r1, 0x4b70, &(0x7f0000000080)) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000080)={0x26, 'aead\x00', 0x0, 0x0, 'generic-gcm-aesni\x00'}, 0x58) syz_open_dev$sndmidi(&(0x7f00000002c0)='/dev/snd/midiC#D#\x00', 0xfd, 0x0) bind(0xffffffffffffffff, &(0x7f0000000140)=@llc={0x1a, 0x33a, 0x7, 0x80, 0x5, 0x4, @remote={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xbb}}, 0x80) r3 = syz_init_net_socket$nfc_llcp(0x27, 0x1, 0x1) setsockopt$nfc_llcp_NFC_LLCP_MIUX(r3, 0x118, 0x15, &(0x7f0000000000), 0x4) r4 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/cuse\x00', 0x103002, 0x0) futimesat(r4, &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)={{0x0, 0x7530}}) r5 = syz_open_dev$vcsa(&(0x7f00000001c0)='/dev/vcsa#\x00', 0x2, 0x4020ff) sendto$inet6(0xffffffffffffffff, &(0x7f0000000bc0)="36251e313e0743fc195a1a198a14434e8a0a00b3f452a3b5644e336ec712a16310c9aecc4e3097bc666a8882128a73c368ce731e9fbf3fe18fa52d", 0x3b, 0x20000000, &(0x7f0000000c40)={0xa, 0x4e20, 0x6, @dev={0xfe, 0x80, [], 0x19}, 0x1f}, 0x1c) accept$alg(r1, 0x0, 0x0) sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f0000000000)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x8}, 0xb4fcd35419244434, &(0x7f00004ca000)={&(0x7f0000000300)=ANY=[], 0x1a1}, 0x1}, 0x0) syz_fuseblk_mount(&(0x7f0000001380)='./file0\x00', &(0x7f00000013c0)='./file0\x00', 0xf000, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0xb21, 0x0) socket(0x1e, 0x3, 0x0) socket(0x1e, 0x0, 0x0) ptrace$PTRACE_SECCOMP_GET_FILTER(0x420c, 0x0, 0x0, &(0x7f0000000380)=""/113) sched_yield() ioctl$TUNGETIFF(r5, 0x800454d2, &(0x7f0000000140)) ioctl$KIOCSOUND(r5, 0x4b2f, 0xfffffffffffffb74) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x20, 0x9b}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000447000)='./file0\x00', &(0x7f00000e1000)='msdos\x00', 0x0, &(0x7f000097bfff)) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000580)='./cgroup/syz0\x00', 0x1ff) r6 = syz_open_dev$audion(&(0x7f0000000280)='/dev/audio#\x00', 0x7be, 0x0) getsockopt$sock_cred(r6, 0x1, 0x11, &(0x7f0000000500)={0x0, 0x0}, &(0x7f0000000540)=0xc) getresgid(&(0x7f00000005c0), &(0x7f0000000600)=0x0, &(0x7f0000000640)) sendmsg$unix(r4, &(0x7f00000006c0)={&(0x7f0000000200)=@abs={0x1, 0x0, 0x4e24}, 0x6e, &(0x7f0000000340)=[{&(0x7f0000001400)="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", 0x1000}, {&(0x7f00000002c0)}, {&(0x7f0000000300)="f402718535150189d0bdc7572cc93eac584a5208e0e23a503f2f0ca84b488ccd7459eed331e648c40d7b7f9ed5", 0x2d}, {&(0x7f0000000400)="acdc4184710e02cdba04ec77995b9f9f9acefad7c1bd2ebbd60742256f4561ce32e592ace381d3c1bb50653e350563844154bdae6c18321a8a6bc0732c45c452fcaad14436c177eb10fcb55d793fb9cbcbb1c603e9d73a74051bccaf1fcca3bada2fd4c345cc7fac02e5d40206e6d9c9a3508fb829962fb44addba72aaa11964d21e80ec16d64c2c0fdec18f127131f12e3642ecf9dce6ca1ec6021b2fb9735a8c069f883525045491fc28b7991bae8d3c60ec2856f2416e4673d9db55df3af2017d9eee44942917bff759ab4e3c786ea1d759d1cafe", 0xd6}], 0x4, &(0x7f0000000680)=[@cred={0x20, 0x1, 0x2, r0, r7, r8}], 0x20}, 0x40000) 2018/03/31 09:15:41 executing program 4: perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f000031f000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) prctl$void(0x0) getpid() r0 = syz_open_dev$vcsn(&(0x7f0000000040)='/dev/vcs#\x00', 0x0, 0x20000) ioctl$GIO_CMAP(r0, 0x4b70, &(0x7f0000000080)) r1 = socket$alg(0x26, 0x5, 0x0) ioctl$sock_SIOCGIFBR(0xffffffffffffffff, 0x8940, &(0x7f0000000040)=@get={0x1, &(0x7f0000000400)=""/242, 0x100000000}) bind$alg(r1, &(0x7f0000000080)={0x26, 'aead\x00', 0x0, 0x0, 'generic-gcm-aesni\x00'}, 0x58) syz_open_dev$sndmidi(&(0x7f0000000100)='/dev/snd/midiC#D#\x00', 0xfd, 0x0) syz_open_dev$sndseq(&(0x7f0000000200)='/dev/snd/seq\x00', 0x0, 0x1) bind(0xffffffffffffffff, &(0x7f0000000140)=@llc={0x1a, 0x33a, 0x7, 0x80, 0x0, 0x4, @remote={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xbb}}, 0x80) r2 = syz_init_net_socket$nfc_llcp(0x27, 0x1, 0x1) setsockopt$nfc_llcp_NFC_LLCP_MIUX(r2, 0x118, 0x15, &(0x7f0000000000), 0x4) r3 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/cuse\x00', 0x103002, 0x0) futimesat(r3, &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)={{0x0, 0x7530}}) r4 = syz_open_dev$vcsa(&(0x7f00000001c0)='/dev/vcsa#\x00', 0x2, 0x0) sendto$inet6(r4, &(0x7f0000000bc0), 0x0, 0x20000000, &(0x7f0000000c40)={0xa, 0x4e20, 0x0, @dev={0xfe, 0x80, [], 0x19}, 0x1f}, 0x1c) accept$alg(r0, 0x0, 0x0) sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f0000000000)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x8}, 0xb4fcd35419244434, &(0x7f00004ca000)={&(0x7f0000000300)=ANY=[], 0x1a1}, 0x1}, 0x0) syz_fuseblk_mount(&(0x7f0000001380)='./file0\x00', &(0x7f00000013c0)='./file0\x00', 0xf000, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0xb21, 0x0) socket(0x1e, 0x3, 0x0) socket(0x1e, 0x0, 0x0) ptrace$PTRACE_SECCOMP_GET_FILTER(0x420c, 0x0, 0x0, &(0x7f0000000380)=""/113) sched_yield() ioctl$TUNGETIFF(r4, 0x800454d2, &(0x7f0000000140)) ioctl$KIOCSOUND(r4, 0x4b2f, 0xfffffffffffffb74) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x20, 0x9b}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000447000)='./file0\x00', &(0x7f00000e1000)='msdos\x00', 0x0, &(0x7f000097bfff)) ioctl$SNDRV_CTL_IOCTL_HWDEP_NEXT_DEVICE(r2, 0xc0045520, &(0x7f0000000240)=0x2) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000580)='./cgroup/syz0\x00', 0x1ff) [ 333.885929] FAT-fs (loop199): unable to read boot sector [ 333.898947] FAT-fs (loop199): unable to read boot sector [ 333.911145] binder: 31860:31869 ioctl c0306201 20000340 returned -14 [ 333.921687] FAT-fs (loop199): unable to read boot sector 2018/03/31 09:15:41 executing program 0: perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f000031f000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) prctl$void(0x0) r0 = syz_open_dev$vcsn(&(0x7f0000000040)='/dev/vcs#\x00', 0x0, 0x20000) socket$alg(0x26, 0x5, 0x0) ioctl$sock_SIOCGIFBR(0xffffffffffffffff, 0x8940, &(0x7f0000000040)=@get={0x1, &(0x7f0000000400)=""/242, 0x100000000}) bind$alg(0xffffffffffffffff, &(0x7f0000000080)={0x26, 'aead\x00', 0x0, 0x0, 'generic-gcm-aesni\x00'}, 0x58) syz_open_dev$sndmidi(&(0x7f0000000100)='/dev/snd/midiC#D#\x00', 0xfd, 0x0) bind(0xffffffffffffffff, &(0x7f0000000140)=@llc={0x1a, 0x33a, 0x7, 0x80, 0x0, 0x4, @remote={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xbb}}, 0x80) r1 = syz_init_net_socket$nfc_llcp(0x27, 0x1, 0x1) setsockopt$nfc_llcp_NFC_LLCP_MIUX(r1, 0x118, 0x15, &(0x7f0000000000), 0x4) r2 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/cuse\x00', 0x103002, 0x0) futimesat(r2, &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)={{0x0, 0x7530}}) connect(r2, &(0x7f0000000200)=@can={0x1d}, 0x80) r3 = syz_open_dev$vcsa(&(0x7f00000001c0)='/dev/vcsa#\x00', 0x2, 0x0) sendto$inet6(r3, &(0x7f0000000bc0)="36251e313e0743fc195a1a198a14434e8a0a00b3f452a3b5644e336ec712a16310c9aecc4e3097bc666a8882128a73c368ce731e9fbf3fe18fa52d00c34ac2e57c1c4569cfbd6a621c6dfbc032121aed", 0x50, 0x20000000, &(0x7f0000000c40)={0xa, 0x4e20, 0x6, @dev={0xfe, 0x80, [], 0x19}, 0x1f}, 0x1c) accept$alg(r0, 0x0, 0x0) sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f0000000000)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x8}, 0xb4fcd35419244434, &(0x7f00004ca000)={&(0x7f0000000300)=ANY=[], 0x1a1}, 0x1}, 0x0) syz_fuseblk_mount(&(0x7f0000001380)='./file0\x00', &(0x7f00000013c0)='./file0\x00', 0xf000, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0xb21, 0x0) socket(0x1e, 0x3, 0x0) socket(0x1e, 0x0, 0x0) ptrace$PTRACE_SECCOMP_GET_FILTER(0x420c, 0x0, 0x0, &(0x7f0000000380)=""/113) sched_yield() ioctl$TUNGETIFF(r3, 0x800454d2, &(0x7f0000000140)) ioctl$KIOCSOUND(r3, 0x4b2f, 0xfffffffffffffb74) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x20, 0x9b}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000447000)='./file0\x00', &(0x7f00000e1000)='msdos\x00', 0x0, &(0x7f000097bfff)) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000580)='./cgroup/syz0\x00', 0x1ff) 2018/03/31 09:15:41 executing program 3: r0 = syz_open_dev$random(&(0x7f00000001c0)='/dev/random\x00', 0x0, 0x800) r1 = syz_open_dev$loop(&(0x7f0000308000)='/dev/loop#\x00', 0x0, 0x0) ioctl$LOOP_SET_STATUS(r1, 0xc0481273, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800, 0x0, "3900ea631d00000000020000010000009f00000023f7b7d65f90b0e6330ee739b319d8f6aa6bd58d1443474482e85040fb4947ebb55bd19f335b5bffff0001f3", "cfa430745a540dc1c149b7b81579f6a41c51f7d51933223e82ab867dac761faf"}) write(0xffffffffffffffff, &(0x7f0000000600)="5c92cd3850810485b002b61c001167f081b598d3fc57684fcc0ec831e2f3e24b345be6fdfb2fc555bdce6fbb4c4377f8dff033d900ba1c3aa4b84d790ad0b1c297418c235d5bb544400e833a0581a63661c19c0fd35164f52dc9443f1cfd8f46a08b70f3ac875995f2a940fdedd6ea996f570d93f586fa97c774", 0x56) setsockopt$inet_sctp6_SCTP_RECVNXTINFO(0xffffffffffffffff, 0x84, 0x21, &(0x7f00000003c0)=0x200, 0x4) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f00000000c0)=0x0) getsockopt$netrom_NETROM_T4(0xffffffffffffffff, 0x103, 0x6, &(0x7f0000000300)=0x8, &(0x7f0000000340)=0x4) r3 = getpid() sched_setparam(r3, &(0x7f0000000400)) syz_open_dev$loop(&(0x7f0000000380)='/dev/loop#\x00', 0x0, 0x82) r4 = memfd_create(&(0x7f0000614000)="74086e750000000000000000008c00", 0x0) pwritev(r4, &(0x7f0000f50f90)=[{&(0x7f0000000040)="aa", 0x1}], 0x1, 0x0) fcntl$getownex(r1, 0x10, &(0x7f0000000240)={0x0, 0x0}) r6 = syz_open_procfs(r5, &(0x7f0000000280)='stat\x00') epoll_ctl$EPOLL_CTL_MOD(r4, 0x3, r0, &(0x7f00000002c0)={0x20000010}) r7 = accept4$inet6(r4, &(0x7f0000000100)={0x0, 0x0, 0x0, @mcast1}, &(0x7f0000000140)=0x1c, 0x7fd) getsockopt$inet_IP_IPSEC_POLICY(r4, 0x0, 0x10, &(0x7f0000000940)={{{@in6=@local, @in6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@loopback}, 0x0, @in=@local}}, &(0x7f0000000780)=0xe8) getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f00000007c0)={0x0, 0x0, 0x0}, &(0x7f0000000540)=0xc) fchown(r4, r8, r9) r10 = syz_open_dev$binder(&(0x7f0000000100)='/dev/binder#\x00', 0xffffffffffffffff, 0x806) ioctl$BINDER_SET_CONTEXT_MGR(r10, 0x40046207, 0x0) mmap$binder(&(0x7f000000c000/0x2000)=nil, 0x2000, 0x0, 0x12, r10, 0x0) ioctl$BINDER_WRITE_READ(r10, 0xc0306201, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000), 0x0, 0x0, &(0x7f0000011f9d)}) getsockopt$inet_sctp6_SCTP_AUTO_ASCONF(r7, 0x84, 0x1e, &(0x7f0000000580), &(0x7f00000005c0)=0xffffffffffffffe8) ioctl$BINDER_WRITE_READ(r10, 0xc0306201, &(0x7f0000000340)={0x8, 0x0, &(0x7f0000000440)=ANY=[@ANYRES64=r1], 0x0, 0x0, &(0x7f0000000240)}) write(0xffffffffffffffff, &(0x7f0000000300)="8be25f5790f664f32509e40d6f879d5add7e2d359c9a19afb750a2d25352875d187d4118c99a2d5c6db433c277cc7d345b87a34f1b417033d367cb0cfd6a25633f77aafb17e99c33cb65352c901ae75176f07bb0a4bb5ebff3d87e", 0x5b) r11 = ioctl$LOOP_CTL_GET_FREE(r4, 0x4c82) ioctl$LOOP_CTL_REMOVE(r6, 0x4c81, r11) openat$cgroup(0xffffffffffffff9c, &(0x7f0000000000)='syz0\x00', 0x200002, 0x0) sched_setaffinity(r2, 0x8, &(0x7f0000000200)=0x7) [ 333.957275] FAT-fs (loop199): unable to read boot sector [ 333.991094] FAT-fs (loop199): unable to read boot sector [ 334.023566] FAULT_INJECTION: forcing a failure. [ 334.023566] name failslab, interval 1, probability 0, space 0, times 0 [ 334.034953] CPU: 1 PID: 31885 Comm: syz-executor7 Not tainted 4.16.0-rc7+ #8 [ 334.042133] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 334.051475] Call Trace: [ 334.054059] dump_stack+0x194/0x24d [ 334.057678] ? arch_local_irq_restore+0x53/0x53 [ 334.062336] ? __save_stack_trace+0x7e/0xd0 [ 334.066655] should_fail+0x8c0/0xa40 [ 334.070362] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 334.075456] ? kasan_kmalloc+0xad/0xe0 [ 334.079331] ? kmem_cache_alloc_trace+0x136/0x740 [ 334.084858] ? __memcg_init_list_lru_node+0x169/0x270 [ 334.090033] ? __list_lru_init+0x544/0x750 [ 334.094259] ? sget_userns+0x6b1/0xe40 [ 334.098138] ? mount_fs+0x66/0x2d0 [ 334.101672] ? vfs_kern_mount.part.26+0xc6/0x4a0 [ 334.106412] ? do_mount+0xea4/0x2bb0 [ 334.110115] ? do_syscall_64+0x281/0x940 [ 334.114166] ? entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 334.119527] ? find_held_lock+0x35/0x1d0 [ 334.123582] ? __lock_is_held+0xb6/0x140 [ 334.127645] ? check_same_owner+0x320/0x320 [ 334.131956] ? rcu_note_context_switch+0x710/0x710 [ 334.136891] should_failslab+0xec/0x120 [ 334.140871] kmem_cache_alloc_trace+0x4b/0x740 [ 334.145460] ? __kmalloc_node+0x33/0x70 [ 334.145530] binder: 31891:31892 unknown command 20 [ 334.149426] ? __kmalloc_node+0x33/0x70 [ 334.149441] ? rcu_read_lock_sched_held+0x108/0x120 [ 334.149457] __memcg_init_list_lru_node+0x169/0x270 [ 334.149470] ? list_lru_add+0x7c0/0x7c0 [ 334.149481] ? __kmalloc_node+0x47/0x70 [ 334.149497] __list_lru_init+0x544/0x750 [ 334.149514] ? memcg_destroy_list_lru_node.isra.7+0x110/0x110 [ 334.149526] ? trace_hardirqs_on_caller+0x421/0x5c0 [ 334.149540] ? lockdep_init_map+0x9/0x10 [ 334.165426] binder: 31891:31892 ioctl c0306201 20000340 returned -22 [ 334.168396] sget_userns+0x6b1/0xe40 [ 334.168407] ? kill_litter_super+0x90/0x90 [ 334.168420] ? ns_test_super+0x50/0x50 [ 334.168431] ? destroy_unused_super.part.6+0xd0/0xd0 [ 334.168441] ? do_raw_spin_trylock+0x190/0x190 [ 334.168457] ? kobject_put+0x6b/0x250 [ 334.168472] ? blkdev_get+0x3a1/0xb00 [ 334.168490] ? cap_capable+0x1b5/0x230 [ 334.234628] ? __blkdev_get+0x13b0/0x13b0 [ 334.238772] ? security_capable+0x8e/0xc0 [ 334.242904] ? kill_litter_super+0x90/0x90 [ 334.247120] ? ns_capable_common+0xcf/0x160 [ 334.251422] ? ns_test_super+0x50/0x50 [ 334.255285] ? kill_litter_super+0x90/0x90 [ 334.259496] sget+0xd2/0x120 [ 334.262496] mount_bdev+0x109/0x370 [ 334.266100] ? msdos_mount+0x40/0x40 [ 334.269793] msdos_mount+0x34/0x40 [ 334.273311] mount_fs+0x66/0x2d0 [ 334.276658] vfs_kern_mount.part.26+0xc6/0x4a0 [ 334.281222] ? may_umount+0xa0/0xa0 [ 334.284829] ? _raw_read_unlock+0x22/0x30 [ 334.288953] ? __get_fs_type+0x8a/0xc0 [ 334.292820] do_mount+0xea4/0x2bb0 [ 334.296340] ? copy_mount_string+0x40/0x40 [ 334.300553] ? trace_hardirqs_on_caller+0x421/0x5c0 [ 334.305552] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 334.310289] ? retint_kernel+0x10/0x10 [ 334.314155] ? copy_mount_options+0x18b/0x2e0 [ 334.318628] ? copy_mount_options+0x193/0x2e0 [ 334.323097] ? copy_mount_options+0x1f7/0x2e0 [ 334.327571] SyS_mount+0xab/0x120 [ 334.331001] ? copy_mnt_ns+0xb30/0xb30 [ 334.334872] do_syscall_64+0x281/0x940 [ 334.338738] ? vmalloc_sync_all+0x30/0x30 [ 334.342864] ? trace_event_raw_event_sys_exit+0x260/0x260 [ 334.348377] ? syscall_return_slowpath+0x550/0x550 [ 334.353281] ? syscall_return_slowpath+0x2ac/0x550 [ 334.358189] ? entry_SYSCALL_64_after_hwframe+0x52/0xb7 [ 334.363531] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 334.368352] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 334.373521] RIP: 0033:0x454e79 [ 334.376687] RSP: 002b:00007f37fba8ec68 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 334.384375] RAX: ffffffffffffffda RBX: 00007f37fba8f6d4 RCX: 0000000000454e79 [ 334.391622] RDX: 00000000200e1000 RSI: 0000000020447000 RDI: 0000000020000000 [ 334.398869] RBP: 000000000072bea0 R08: 000000002097bfff R09: 0000000000000000 [ 334.406115] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000019 [ 334.413362] R13: 00000000000003fa R14: 00000000006f8010 R15: 000000000000001d [ 334.424712] binder: BINDER_SET_CONTEXT_MGR already set [ 334.439005] binder: 31891:31893 ioctl 40046207 0 returned -16 [ 334.447571] xprt_adjust_timeout: rq_timeout = 0! [ 334.463235] binder: 31891:31893 unknown command 26 [ 334.473432] binder: 31891:31893 ioctl c0306201 20000340 returned -22 [ 334.519148] FAT-fs (loop199): unable to read boot sector [ 334.525827] FAT-fs (loop199): unable to read boot sector [ 334.540898] FAT-fs (loop199): unable to read boot sector [ 334.553952] FAT-fs (loop199): unable to read boot sector [ 334.573317] FAT-fs (loop199): unable to read boot sector 2018/03/31 09:15:41 executing program 1: perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f000031f000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) prctl$void(0x0) getpid() syz_open_dev$vcsn(&(0x7f0000000040)='/dev/vcs#\x00', 0x400, 0x20000) r0 = socket$alg(0x26, 0x5, 0x0) ioctl$sock_SIOCGIFBR(r0, 0x8940, &(0x7f0000000040)=@get={0x1, &(0x7f0000000400)=""/242, 0x100000000}) bind$alg(r0, &(0x7f0000000080)={0x26, 'aead\x00', 0x0, 0x0, 'generic-gcm-aesni\x00'}, 0x58) r1 = syz_open_dev$sndmidi(&(0x7f0000000100)='/dev/snd/midiC#D#\x00', 0xfd, 0x0) bind(r1, &(0x7f0000000140)=@llc={0x1a, 0x33a, 0x7, 0x80, 0x0, 0x4, @remote={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xbb}}, 0x80) r2 = syz_init_net_socket$nfc_llcp(0x27, 0x1, 0x1) setsockopt$nfc_llcp_NFC_LLCP_MIUX(r2, 0x118, 0x15, &(0x7f0000000000), 0x4) r3 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/cuse\x00', 0x103002, 0x0) futimesat(r3, &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)={{0x0, 0x7530}}) r4 = syz_open_dev$vcsa(&(0x7f00000001c0)='/dev/vcsa#\x00', 0x2, 0x4020ff) sendto$inet6(r4, &(0x7f0000000bc0), 0x0, 0x20000000, &(0x7f0000000c40)={0xa, 0x4e20, 0x6, @dev={0xfe, 0x80, [], 0x19}, 0x1f}, 0x1c) sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f0000000000)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x8}, 0xb4fcd35419244434, &(0x7f00004ca000)={&(0x7f0000000300)=ANY=[], 0x1a1}, 0x1}, 0x0) r5 = socket$inet6(0xa, 0x800, 0x9) syz_fuseblk_mount(&(0x7f0000001380)='./file0\x00', &(0x7f00000013c0)='./file0\x00', 0xf000, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0xb21, 0x0) socket(0x1e, 0x3, 0x0) ptrace$PTRACE_SECCOMP_GET_FILTER(0x420c, 0x0, 0x0, &(0x7f0000000380)=""/113) sched_yield() ioctl$TUNGETIFF(r4, 0x800454d2, &(0x7f0000000140)) ioctl$KIOCSOUND(r4, 0x4b2f, 0xfffffffffffffb74) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x20, 0x9b}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000447000)='./file0\x00', &(0x7f00000e1000)='msdos\x00', 0x0, &(0x7f000097bfff)) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000580)='./cgroup/syz0\x00', 0x1ff) syz_open_dev$audion(&(0x7f0000000280)='/dev/audio#\x00', 0x7be, 0x0) fcntl$getown(0xffffffffffffffff, 0x9) ioctl$sock_SIOCGIFBR(r5, 0x8940, &(0x7f0000000200)=@get={0x1, &(0x7f00000005c0)=""/229}) 2018/03/31 09:15:41 executing program 2: syz_open_dev$loop(&(0x7f00000003c0)='/dev/loop#\x00', 0x8, 0x0) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(0xffffffffffffffff, 0x4040534e, &(0x7f000019ffe9)={0xc1}) r0 = accept(0xffffffffffffffff, &(0x7f0000000080)=@can, &(0x7f0000000180)=0x80) ioctl$sock_ipx_SIOCAIPXPRISLT(r0, 0x89e1, &(0x7f0000000280)=0x3f) ioctl$sock_inet_SIOCRTMSG(r0, 0x890d, &(0x7f0000000200)={0x80, {0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x19}}, {0x2, 0x4e21, @local={0xac, 0x14, 0x14, 0xaa}}, {0x2, 0x4e23}, 0x0, 0x7, 0x1, 0x0, 0x9, 0x0, 0x0, 0x0, 0xfffffffffffffff7}) getsockopt$inet_sctp_SCTP_PRIMARY_ADDR(0xffffffffffffffff, 0x84, 0x6, &(0x7f0000000ac0)={0x0, @in={{0x2, 0x4e20, @loopback=0x7f000001}}}, &(0x7f00000002c0)=0x84) setsockopt$inet_sctp_SCTP_ENABLE_STREAM_RESET(r0, 0x84, 0x76, &(0x7f0000000300)={r1, 0x1c9}, 0x8) r2 = syz_open_dev$sg(&(0x7f0000000700)='/dev/sg#\x00', 0xfffffffffffffff7, 0x800) clone(0x2000c100, &(0x7f0000000800)="97bb77038add5df9e9d4f9783b82c55fe59e5c0acdbcfc9bcf92ac0e1f1f3c1959c1d25dfabf3849336c7c85be174d7765b47e113632aea54b87e4d3f2c1db09e6aa4040b43d17308fb7e62e808067da2fff3cfd8e4c038c814bbfc6bc49d8ebc8671d8297e2d34dc61f2d194d2dbb8f59b4c853e0714d3d4bb29d1243fac01c86c8c4dd38daedab3c6ad73a72d3f6dd2684aa82e5285eb82452c9848b7beb8bc513ba8c8973cad0bd5926604846b7f5d0397b", &(0x7f00000008c0), &(0x7f0000000900), &(0x7f0000000940)="ed6c04412e782fe395f084741e3d9fe469aebde09acc8f8d8d84d1f00f5573b09acba487077ebb904cb1f3fed55f59d677ce24bbd2a7506df8e1e0d0fc709cb8c9f4ab2aeeeebc5ef879742c1f7628f1862c88b5b0da89acbf43ef12e4839405b6a3430d296fea06d2f3a8356c57ec991e") ioctl$SNDRV_SEQ_IOCTL_SUBSCRIBE_PORT(0xffffffffffffffff, 0x40505330, &(0x7f0000ec6fb0)={{}, {0x80}}) getsockopt$netrom_NETROM_T1(r0, 0x103, 0x1, &(0x7f0000000000), &(0x7f0000000380)=0x4) syz_open_dev$adsp(&(0x7f0000000600)='/dev/adsp#\x00', 0x100000000, 0x80000) rt_sigprocmask(0x3d738072cd0f41ac, &(0x7f0000000cc0)={0x7}, &(0x7f0000000d00), 0x8) clone(0x40000000, &(0x7f0000000500)="67cdd9994c47c31d325b069924a7064c157c2ec0b5b5dca2feeb7dabef3b7af0d02d559e293faa759f2b3cb12aea360c2d", &(0x7f0000000580), &(0x7f00000005c0), &(0x7f0000000a00)="29859fdda9a119e54a27f9ec76b4d63a16dc5bbdd38c2fda0e5f4d8f830cd987ec7d3ffc66cf3db8820968fd89a1fba8fe6352a29a27f3b000bcdf238f2c04b358fc831025180e0be313da41de6366c94a1a0f86aaffdf2c039111b55275c054e14819a827fe809225249a01944263a2aec15f64e752e35892b1b8e7ef1e0e9115") ioctl$SNDRV_SEQ_IOCTL_DELETE_PORT(0xffffffffffffffff, 0x40a85321, &(0x7f0000000b80)={{0x4, 0x8}, 'port0\x00', 0x80, 0x0, 0x10000, 0x6, 0x2, 0x80, 0x8, 0x0, 0x0, 0x3dec00}) getsockopt$inet_sctp_SCTP_SOCKOPT_PEELOFF(r2, 0x84, 0x66, &(0x7f0000000c40)={r1, 0x6}, &(0x7f0000000c80)=0x8) clock_settime(0x7, &(0x7f0000000740)={0x77359400}) ioctl$SNDRV_SEQ_IOCTL_CLIENT_ID(0xffffffffffffffff, 0x80045301, &(0x7f0000000340)) r3 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer2\x00', 0x0, 0x0) openat$sequencer2(0xffffffffffffff9c, &(0x7f00000006c0)='/dev/sequencer2\x00', 0x222081, 0x0) ioctl$RNDADDENTROPY(0xffffffffffffffff, 0x40085203, &(0x7f0000000100)=ANY=[@ANYPTR=&(0x7f0000000680)=ANY=[@ANYPTR64=&(0x7f0000000640)=ANY=[@ANYPTR, @ANYPTR]]]) setsockopt$inet_sctp_SCTP_DEFAULT_SEND_PARAM(r3, 0x84, 0xa, &(0x7f0000000140)={0x5, 0x100000001, 0x0, 0x8, 0x0, 0x7, 0x401, 0x1f, r1}, 0x20) 2018/03/31 09:15:41 executing program 4: perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f000031f000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) prctl$void(0x0) getpid() r0 = syz_open_dev$vcsn(&(0x7f0000000040)='/dev/vcs#\x00', 0x0, 0x20000) ioctl$GIO_CMAP(r0, 0x4b70, &(0x7f0000000080)) r1 = socket$alg(0x26, 0x5, 0x0) ioctl$sock_SIOCGIFBR(0xffffffffffffffff, 0x8940, &(0x7f0000000040)=@get={0x1, &(0x7f0000000400)=""/242, 0x100000000}) bind$alg(r1, &(0x7f0000000080)={0x26, 'aead\x00', 0x0, 0x0, 'generic-gcm-aesni\x00'}, 0x58) syz_open_dev$sndmidi(&(0x7f0000000100)='/dev/snd/midiC#D#\x00', 0xfd, 0x0) bind(0xffffffffffffffff, &(0x7f0000000140)=@llc={0x1a, 0x33a, 0x7, 0x80, 0x0, 0x4, @remote={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xbb}}, 0x80) r2 = syz_init_net_socket$nfc_llcp(0x27, 0x1, 0x1) setsockopt$nfc_llcp_NFC_LLCP_MIUX(r2, 0x118, 0x15, &(0x7f0000000000), 0x4) r3 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/cuse\x00', 0x103002, 0x0) futimesat(r3, &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)={{0x0, 0x7530}}) r4 = syz_open_dev$vcsa(&(0x7f00000001c0)='/dev/vcsa#\x00', 0x2, 0x0) sendto$inet6(r4, &(0x7f0000000bc0), 0x0, 0x20000000, &(0x7f0000000c40)={0xa, 0x4e20, 0x0, @dev={0xfe, 0x80, [], 0x19}, 0x1f}, 0x1c) accept$alg(r0, 0x0, 0x0) ioctl$ASHMEM_GET_PROT_MASK(r3, 0x7706, &(0x7f0000000240)) sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f0000000000)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x8}, 0xb4fcd35419244434, &(0x7f00004ca000)={&(0x7f0000000300)=ANY=[], 0x1a1}, 0x1}, 0x0) syz_fuseblk_mount(&(0x7f0000001380)='./file0\x00', &(0x7f00000013c0)='./file0\x00', 0xf000, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0xb21, 0x0) socket(0x1e, 0x3, 0x0) socket(0x1e, 0x0, 0x0) ptrace$PTRACE_SECCOMP_GET_FILTER(0x420c, 0x0, 0x0, &(0x7f0000000380)=""/113) sched_yield() ioctl$TUNGETIFF(r4, 0x800454d2, &(0x7f0000000140)) ioctl$KIOCSOUND(r4, 0x4b2f, 0xfffffffffffffb74) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x20, 0x9b}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$dspn(&(0x7f0000000200)='/dev/dsp#\x00', 0x5, 0x800) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000447000)='./file0\x00', &(0x7f00000e1000)='msdos\x00', 0x0, &(0x7f000097bfff)) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000580)='./cgroup/syz0\x00', 0x1ff) 2018/03/31 09:15:41 executing program 6: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000240)={&(0x7f0000000100)={0x10}, 0xc, &(0x7f0000000000)={&(0x7f0000000140)={0x14, 0x27, 0x331, 0x0, 0x0, {0x12}}, 0x14}, 0x1}, 0x0) 2018/03/31 09:15:41 executing program 3: r0 = syz_open_dev$random(&(0x7f00000001c0)='/dev/random\x00', 0x0, 0x800) r1 = syz_open_dev$loop(&(0x7f0000308000)='/dev/loop#\x00', 0x0, 0x0) ioctl$LOOP_SET_STATUS(r1, 0xc0481273, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "3900ea631d00000000020000010000009f00000023f7b7d65f90b0e6330ee739b319d8f6aa6bd58d1443474482e85040fb4947ebb55bd19f335b5bffff0001f3", "cfa430745a540dc1c149b7b81579f6a41c51f7d51933223e82ab867dac761faf"}) write(0xffffffffffffffff, &(0x7f00000001c0), 0x0) setsockopt$inet_sctp6_SCTP_RECVNXTINFO(0xffffffffffffffff, 0x84, 0x21, &(0x7f00000003c0)=0x200, 0x4) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f00000000c0)=0x0) getsockopt$netrom_NETROM_T4(0xffffffffffffffff, 0x103, 0x6, &(0x7f0000000300)=0x8, &(0x7f0000000340)=0x4) getpid() syz_open_dev$loop(&(0x7f0000ca9ff5)='/dev/loop#\x00', 0x0, 0x82) r3 = memfd_create(&(0x7f0000614000)="74086e750000000000000000008c00", 0x0) pwritev(r3, &(0x7f0000f50f90)=[{&(0x7f0000000040)="aa", 0x1}], 0x1, 0x0) fcntl$getownex(r1, 0x10, &(0x7f0000000240)={0x0, 0x0}) r5 = syz_open_procfs(r4, &(0x7f0000000280)='stat\x00') epoll_ctl$EPOLL_CTL_MOD(r3, 0x3, r0, &(0x7f00000002c0)={0x20000010}) accept4$inet6(r3, &(0x7f0000000100)={0x0, 0x0, 0x0, @mcast1}, &(0x7f0000000140)=0x1c, 0x7fd) getsockopt$inet_IP_IPSEC_POLICY(r3, 0x0, 0x10, &(0x7f0000000940)={{{@in6=@local, @in6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@loopback}, 0x0, @in=@local}}, &(0x7f0000000780)=0xe8) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f00000007c0)={0x0, 0x0, 0x0}, &(0x7f0000000540)=0xc) fchown(r3, r6, r7) r8 = syz_open_dev$binder(&(0x7f0000000100)='/dev/binder#\x00', 0xffffffffffffffff, 0x806) ioctl$BINDER_SET_CONTEXT_MGR(r5, 0x40046207, 0x0) mmap$binder(&(0x7f000000c000/0x2000)=nil, 0x2000, 0x0, 0x12, r8, 0x0) ioctl$BINDER_WRITE_READ(r8, 0xc0306201, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000), 0x0, 0x0, &(0x7f0000011f9d)}) getsockopt$inet_sctp6_SCTP_AUTO_ASCONF(0xffffffffffffffff, 0x84, 0x1e, &(0x7f0000000140), &(0x7f0000000180)=0x4) ioctl$BINDER_WRITE_READ(r8, 0xc0306201, &(0x7f0000000340)={0x8, 0x0, &(0x7f0000000440)=ANY=[@ANYRES64=r1], 0x0, 0x0, &(0x7f0000000240)}) write(0xffffffffffffffff, &(0x7f0000000300)="8be25f5790f664f32509e40d6f879d5add7e2d359c9a19afb750a2d25352875d187d4118c99a2d5c6db433c277cc7d345b87a34f1b417033d367cb0cfd6a25633f77aafb17e99c33cb65352c901ae75176f07bb0a4bb5ebff3d87e", 0x5b) r9 = ioctl$LOOP_CTL_GET_FREE(r3, 0x4c82) ioctl$LOOP_CTL_REMOVE(r5, 0x4c81, r9) openat$cgroup(0xffffffffffffff9c, &(0x7f0000000000)='syz0\x00', 0x200002, 0x0) sched_setaffinity(r2, 0x8, &(0x7f0000000200)=0x7) 2018/03/31 09:15:41 executing program 7 (fault-call:24 fault-nth:30): perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f000031f000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getpid() r0 = syz_open_dev$vcsn(&(0x7f0000000040)='/dev/vcs#\x00', 0x0, 0x20000) ioctl$GIO_CMAP(r0, 0x4b70, &(0x7f0000000080)) r1 = socket$alg(0x26, 0x5, 0x0) ioctl$sock_SIOCGIFBR(r1, 0x8940, &(0x7f0000000040)=@get={0x1, &(0x7f0000000400)=""/242, 0x100000000}) bind$alg(r1, &(0x7f0000000080)={0x26, 'aead\x00', 0x0, 0x0, 'generic-gcm-aesni\x00'}, 0x58) syz_open_dev$sndmidi(&(0x7f0000000100)='/dev/snd/midiC#D#\x00', 0xfd, 0x0) bind(0xffffffffffffffff, &(0x7f0000000140)=@llc={0x1a, 0x33a, 0x7, 0x80, 0x5, 0x4, @remote={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xbb}}, 0x80) r2 = syz_init_net_socket$nfc_llcp(0x27, 0x1, 0x1) setsockopt$nfc_llcp_NFC_LLCP_MIUX(r2, 0x118, 0x15, &(0x7f0000000000), 0x4) r3 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/cuse\x00', 0x103002, 0x0) futimesat(r3, &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)={{0x0, 0x7530}}) r4 = syz_open_dev$vcsa(&(0x7f00000001c0)='/dev/vcsa#\x00', 0x2, 0x4020ff) sendto$inet6(r4, &(0x7f0000000bc0)="36251e313e0743fc195a1a198a14434e8a0a00b3f452a3b5644e336ec712a16310c9aecc4e3097bc666a8882128a73c368ce731e9fbf3fe18fa52d00", 0x3c, 0x20000000, &(0x7f0000000c40)={0xa, 0x0, 0x6, @dev={0xfe, 0x80, [], 0x19}, 0x1f}, 0x1c) accept$alg(r0, 0x0, 0x0) sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f0000000000)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x8}, 0xb4fcd35419244434, &(0x7f00004ca000)={&(0x7f0000000300)=ANY=[], 0x1a1}, 0x1}, 0x0) syz_fuseblk_mount(&(0x7f0000001380)='./file0\x00', &(0x7f00000013c0)='./file0\x00', 0xf000, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0xb21, 0x0) socket(0x1e, 0x3, 0x0) socket(0x1e, 0x0, 0x0) ptrace$PTRACE_SECCOMP_GET_FILTER(0x420c, 0x0, 0x0, &(0x7f0000000380)=""/113) sched_yield() ioctl$TUNGETIFF(r4, 0x800454d2, &(0x7f0000000140)) ioctl$KIOCSOUND(r4, 0x4b2f, 0xfffffffffffffb74) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000447000)='./file0\x00', &(0x7f00000e1000)='msdos\x00', 0x0, &(0x7f000097bfff)) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000580)='./cgroup/syz0\x00', 0x1ff) syz_open_dev$audion(&(0x7f0000000280)='/dev/audio#\x00', 0x7be, 0x0) 2018/03/31 09:15:41 executing program 5: perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f000031f000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) prctl$void(0x0) getpid() r0 = syz_open_dev$vcsn(&(0x7f0000000040)='/dev/vcs#\x00', 0x0, 0x20000) ioctl$GIO_CMAP(r0, 0x4b70, &(0x7f0000000080)) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000080)={0x26, 'aead\x00', 0x0, 0x0, 'generic-gcm-aesni\x00'}, 0x58) syz_open_dev$sndmidi(&(0x7f0000000100)='/dev/snd/midiC#D#\x00', 0xfd, 0x0) bind(0xffffffffffffffff, &(0x7f0000000140)=@llc={0x1a, 0x33a, 0x7, 0x80, 0x5, 0x4, @remote={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xbb}}, 0x80) r2 = syz_init_net_socket$nfc_llcp(0x27, 0x1, 0x1) setsockopt$nfc_llcp_NFC_LLCP_MIUX(r2, 0x118, 0x15, &(0x7f0000000000), 0x4) r3 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/cuse\x00', 0x103002, 0x0) futimesat(r3, &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)={{0x0, 0x7530}}) connect$pppoe(r3, &(0x7f0000000200)={0x18, 0x0, {0x0, @local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, 'irlan0\x00'}}, 0x1e) r4 = syz_open_dev$vcsa(&(0x7f00000001c0)='/dev/vcsa#\x00', 0x2, 0x4020ff) sendto$inet6(0xffffffffffffffff, &(0x7f0000000bc0)="36251e313e0743fc195a1a198a14434e8a0a00b3f452a3b5644e336ec712a16310c9aecc4e3097bc666a8882128a73c368ce731e9fbf3fe18fa52d", 0x3b, 0x20000000, &(0x7f0000000c40)={0xa, 0x4e20, 0x6, @dev={0xfe, 0x80, [], 0x19}, 0x1f}, 0x1c) accept$alg(r0, 0x0, 0x0) sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f0000000000)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x8}, 0xb4fcd35419244434, &(0x7f00004ca000)={&(0x7f0000000300)=ANY=[], 0x1a1}, 0x1}, 0x0) syz_fuseblk_mount(&(0x7f0000001380)='./file0\x00', &(0x7f00000013c0)='./file0\x00', 0xf000, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0xb21, 0x0) socket(0x1e, 0x3, 0x0) socket(0x1e, 0x0, 0x0) ptrace$PTRACE_SECCOMP_GET_FILTER(0x420c, 0x0, 0x0, &(0x7f0000000380)=""/113) write$cgroup_pid(r4, &(0x7f0000000240)={[0x39, 0x32, 0x39]}, 0x3) sched_yield() ioctl$TUNGETIFF(r4, 0x800454d2, &(0x7f0000000140)) ioctl$KIOCSOUND(r4, 0x4b2f, 0xfffffffffffffb74) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x20, 0x9b}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000447000)='./file0\x00', &(0x7f00000e1000)='msdos\x00', 0x0, &(0x7f000097bfff)) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f00000002c0)='./cgroup/syz0\x00', 0x1ff) syz_open_dev$audion(&(0x7f0000000280)='/dev/audio#\x00', 0x7be, 0x0) 2018/03/31 09:15:41 executing program 0: perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f000031f000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) prctl$void(0x0) r0 = syz_open_dev$vcsn(&(0x7f0000000040)='/dev/vcs#\x00', 0x0, 0x20000) socket$alg(0x26, 0x5, 0x0) ioctl$sock_SIOCGIFBR(0xffffffffffffffff, 0x8940, &(0x7f0000000040)=@get={0x1, &(0x7f0000000400)=""/242, 0x100000000}) bind$alg(0xffffffffffffffff, &(0x7f0000000080)={0x26, 'aead\x00', 0x0, 0x0, 'generic-gcm-aesni\x00'}, 0x58) r1 = syz_open_dev$sndmidi(&(0x7f0000000100)='/dev/snd/midiC#D#\x00', 0xfd, 0x0) bind(0xffffffffffffffff, &(0x7f0000000140)=@llc={0x1a, 0x33a, 0x7, 0x80, 0x0, 0x4, @remote={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xbb}}, 0x80) r2 = syz_init_net_socket$nfc_llcp(0x27, 0x1, 0x1) setsockopt$nfc_llcp_NFC_LLCP_MIUX(r2, 0x118, 0x15, &(0x7f0000000000), 0x4) r3 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/cuse\x00', 0x103002, 0x0) futimesat(r3, &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)={{0x0, 0x7530}}) r4 = syz_open_dev$vcsa(&(0x7f00000001c0)='/dev/vcsa#\x00', 0x2, 0x0) sendto$ipx(r4, &(0x7f0000000240)="65c57851e53d4042a2f551f493df0505e451ad0be8d65cd880ff8fc543735d84bc741f80ecadb174e0c66610dbdba4374c68948d45ee0b5a42e7eb74f7aab18bade6ae2829d36060a55845680003b034c695b8bb938dc632ab499afc82cb38be1e2bdfa265a56a84a4807c9f312e7132a2e31156f07a5552c08da836757ea947dc3eda8e4d8b7038930678622d5c98f7114c00317a6d1aacc1f09f0765ba7f6e29ea3997aedf96209d67709d2e1a0e3ff19c6fa2fead3875c81a1d2504dd14e675246ae5fffc9bfef136769b7b50edc4ecffdee23ebafd729dbfcec0", 0xdc, 0x8000, 0x0, 0x0) sendto$inet6(r4, &(0x7f0000000bc0)="36251e313e0743fc195a1a198a14434e8a0a00b3f452a3b5644e336ec712a16310c9aecc4e3097bc666a8882128a73c368ce731e9fbf3fe18fa52d00c34ac2e57c1c4569cfbd6a621c6dfbc032121aed", 0x50, 0x20000000, &(0x7f0000000c40)={0xa, 0x4e20, 0x6, @dev={0xfe, 0x80, [], 0x19}, 0x1f}, 0x1c) accept$alg(r0, 0x0, 0x0) sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f0000000000)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x8}, 0xb4fcd35419244434, &(0x7f00004ca000)={&(0x7f0000000300)=ANY=[], 0x1a1}, 0x1}, 0x0) r5 = getegid() ioctl$sock_ipx_SIOCSIFADDR(r4, 0x8916, &(0x7f0000000200)={'syz_tun\x00', {0x4, 0x1, 0xfffffffffffffffb, "6942577be361", 0x2}}) syz_fuseblk_mount(&(0x7f0000001380)='./file0\x00', &(0x7f00000013c0)='./file0\x00', 0xf000, 0xffffffffffffffff, r5, 0x0, 0xb21, 0x0) socket(0x1e, 0x3, 0x0) socket(0x1e, 0x0, 0x0) ptrace$PTRACE_SECCOMP_GET_FILTER(0x420c, 0x0, 0x0, &(0x7f0000000380)=""/113) sched_yield() ioctl$TUNGETIFF(r4, 0x800454d2, &(0x7f0000000140)) getsockopt$inet6_tcp_int(r1, 0x6, 0x7, &(0x7f0000000340), &(0x7f0000000500)=0x4) ioctl$KIOCSOUND(r0, 0x4b2f, 0x5) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x20, 0x9b}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000447000)='./file0\x00', &(0x7f00000e1000)='msdos\x00', 0x0, &(0x7f000097bfff)) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000580)='./cgroup/syz0\x00', 0x1ff) 2018/03/31 09:15:41 executing program 6: r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r0, &(0x7f0000ef8cfd)={0xa, 0x4e23, 0x0, @loopback={0x0, 0x1}}, 0x1c) listen(r0, 0x3) r1 = socket$inet6_sctp(0xa, 0x4000000000000001, 0x84) sendto$inet6(r1, &(0x7f0000000080)='X', 0x1, 0x0, &(0x7f000005ffe4)={0xa, 0x4e23, 0x0, @loopback={0x0, 0x1}}, 0x1c) r2 = accept(r0, 0x0, &(0x7f00000000c0)) getsockopt$inet_sctp_SCTP_SOCKOPT_PEELOFF(r2, 0x84, 0x66, &(0x7f0000000000)={0x0, 0x100}, &(0x7f0000000040)=0x8) setsockopt$inet_sctp6_SCTP_DEFAULT_SNDINFO(r1, 0x84, 0x22, &(0x7f0000000100)={0x6, 0x9, 0xd230, 0xffffffff, r3}, 0x10) fsync(r2) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f00009b2ff0)={0x1, &(0x7f0000a7dff8)=[{0x6, 0x0, 0x0, 0x400000000000003}]}, 0x10) ioctl$sock_SIOCETHTOOL(r1, 0x8946, &(0x7f00000001c0)={'ip6_vti0\x00', &(0x7f0000000140)=@ethtool_gfeatures={0x3a, 0x6, [{0x6, 0x4, 0x9, 0x1}, {0x8, 0x9, 0x5, 0x9}, {0x3, 0x1000, 0x4, 0x7f}, {0x201ca684, 0x3, 0x9, 0x7}, {0x2, 0x101, 0x1f, 0x9}, {0x1f, 0xffff, 0x5}]}}) setsockopt$inet_sctp_SCTP_STREAM_SCHEDULER_VALUE(r2, 0x84, 0x7c, &(0x7f0000000280)={r3, 0xbf8, 0x7}, 0x8) sendmsg$kcm(r2, &(0x7f0000001480)={0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000200)='R', 0x1}], 0x1, &(0x7f0000000280)}, 0x8091) shutdown(r1, 0x2000000002) [ 334.671336] FAT-fs (loop199): unable to read boot sector [ 334.686344] binder: 31915:31918 unknown command 20 [ 334.692107] FAT-fs (loop199): unable to read boot sector [ 334.700514] binder: 31915:31918 ioctl c0306201 20000340 returned -22 [ 334.711864] FAT-fs (loop199): unable to read boot sector [ 334.730774] FAULT_INJECTION: forcing a failure. [ 334.730774] name failslab, interval 1, probability 0, space 0, times 0 [ 334.742153] CPU: 0 PID: 31927 Comm: syz-executor7 Not tainted 4.16.0-rc7+ #8 [ 334.749345] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 334.758692] Call Trace: [ 334.761281] dump_stack+0x194/0x24d [ 334.764912] ? arch_local_irq_restore+0x53/0x53 [ 334.769606] should_fail+0x8c0/0xa40 [ 334.773338] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 334.778449] ? kasan_kmalloc+0xad/0xe0 [ 334.782330] ? kmem_cache_alloc_trace+0x136/0x740 [ 334.787165] ? __memcg_init_list_lru_node+0x169/0x270 [ 334.792353] ? sget_userns+0x6b1/0xe40 [ 334.796236] ? mount_fs+0x66/0x2d0 [ 334.799769] ? vfs_kern_mount.part.26+0xc6/0x4a0 [ 334.804516] ? do_mount+0xea4/0x2bb0 [ 334.808223] ? do_syscall_64+0x281/0x940 [ 334.812281] ? entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 334.817661] ? find_held_lock+0x35/0x1d0 [ 334.821733] ? __lock_is_held+0xb6/0x140 [ 334.825809] ? check_same_owner+0x320/0x320 [ 334.830134] ? rcu_note_context_switch+0x710/0x710 [ 334.835077] should_failslab+0xec/0x120 [ 334.839049] kmem_cache_alloc_trace+0x4b/0x740 [ 334.843627] ? __kmalloc_node+0x33/0x70 [ 334.847598] ? __kmalloc_node+0x33/0x70 [ 334.851596] ? rcu_read_lock_sched_held+0x108/0x120 [ 334.856621] __memcg_init_list_lru_node+0x169/0x270 [ 334.861638] ? list_lru_add+0x7c0/0x7c0 [ 334.865607] ? __kmalloc_node+0x47/0x70 [ 334.869586] __list_lru_init+0x544/0x750 [ 334.873651] ? memcg_destroy_list_lru_node.isra.7+0x110/0x110 [ 334.879537] ? trace_hardirqs_on_caller+0x421/0x5c0 [ 334.884560] ? lockdep_init_map+0x9/0x10 [ 334.888621] sget_userns+0x6b1/0xe40 [ 334.892327] ? kill_litter_super+0x90/0x90 [ 334.896562] ? ns_test_super+0x50/0x50 [ 334.900445] ? destroy_unused_super.part.6+0xd0/0xd0 [ 334.905539] ? do_raw_spin_trylock+0x190/0x190 [ 334.910125] ? kobject_put+0x6b/0x250 [ 334.913930] ? blkdev_get+0x3a1/0xb00 [ 334.917737] ? cap_capable+0x1b5/0x230 [ 334.921618] ? __blkdev_get+0x13b0/0x13b0 [ 334.925765] ? security_capable+0x8e/0xc0 [ 334.929909] ? kill_litter_super+0x90/0x90 [ 334.934139] ? ns_capable_common+0xcf/0x160 [ 334.938462] ? ns_test_super+0x50/0x50 [ 334.942343] ? kill_litter_super+0x90/0x90 [ 334.946570] sget+0xd2/0x120 [ 334.949592] mount_bdev+0x109/0x370 [ 334.953214] ? msdos_mount+0x40/0x40 [ 334.956929] msdos_mount+0x34/0x40 [ 334.960486] mount_fs+0x66/0x2d0 [ 334.963855] vfs_kern_mount.part.26+0xc6/0x4a0 [ 334.968433] ? may_umount+0xa0/0xa0 [ 334.972058] ? _raw_read_unlock+0x22/0x30 [ 334.976204] ? __get_fs_type+0x8a/0xc0 [ 334.980090] do_mount+0xea4/0x2bb0 [ 334.983633] ? copy_mount_string+0x40/0x40 [ 334.986749] binder: 31915:31918 ioctl c0306201 20000340 returned -14 [ 334.987865] ? trace_hardirqs_on_caller+0x421/0x5c0 [ 334.987881] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 334.987905] ? retint_kernel+0x10/0x10 [ 334.987926] ? copy_mount_options+0x18b/0x2e0 [ 334.987939] ? copy_mount_options+0x196/0x2e0 [ 334.987950] ? copy_mount_options+0x1f7/0x2e0 [ 335.021480] SyS_mount+0xab/0x120 [ 335.024937] ? copy_mnt_ns+0xb30/0xb30 2018/03/31 09:15:42 executing program 3: r0 = syz_open_dev$random(&(0x7f00000001c0)='/dev/random\x00', 0x0, 0x800) r1 = syz_open_dev$loop(&(0x7f0000308000)='/dev/loop#\x00', 0x0, 0x0) ioctl$LOOP_SET_STATUS(r1, 0xc0481273, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "3900ea631d00000000020000010000009f00000023f7b7d65f90b0e6330ee739b319d8f6aa6bd58d1443474482e85040fb4947ebb55bd19f335b5bffff0001f3", "cfa430745a540dc1c149b7b81579f6a41c51f7d51933223e82ab867dac761faf"}) write(0xffffffffffffffff, &(0x7f00000001c0), 0x0) setsockopt$inet_sctp6_SCTP_RECVNXTINFO(0xffffffffffffffff, 0x84, 0x21, &(0x7f00000003c0)=0x200, 0x4) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f00000000c0)=0x0) getsockopt$netrom_NETROM_T4(0xffffffffffffffff, 0x103, 0x6, &(0x7f0000000300)=0x8, &(0x7f0000000340)=0x4) r3 = getpid() sched_setparam(r3, &(0x7f0000000400)) syz_open_dev$loop(&(0x7f0000ca9ff5)='/dev/loop#\x00', 0x0, 0x82) r4 = memfd_create(&(0x7f0000614000)="74086e750000000000000000008c00", 0x0) pwritev(r4, &(0x7f0000f50f90)=[{&(0x7f0000000040)="aa", 0x1}], 0x1, 0x0) fcntl$getownex(r1, 0x10, &(0x7f0000000240)={0x0, 0x0}) r6 = syz_open_procfs(r5, &(0x7f0000000280)='stat\x00') epoll_ctl$EPOLL_CTL_MOD(r4, 0x3, r0, &(0x7f00000002c0)={0x20000010}) accept4$inet6(r4, &(0x7f0000000100)={0x0, 0x0, 0x0, @mcast1}, &(0x7f0000000140)=0x1c, 0x7fd) getsockopt$inet_IP_IPSEC_POLICY(r4, 0x0, 0x10, &(0x7f0000000940)={{{@in6=@local, @in6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@loopback}, 0x0, @in=@local}}, &(0x7f0000000780)=0xe8) getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f00000007c0)={0x0, 0x0, 0x0}, &(0x7f0000000540)=0xc) fchown(r4, r7, r8) r9 = syz_open_dev$binder(&(0x7f0000000100)='/dev/binder#\x00', 0xffffffffffffffff, 0x806) ioctl$BINDER_SET_CONTEXT_MGR(r6, 0x40046207, 0x0) mmap$binder(&(0x7f000000c000/0x2000)=nil, 0x2000, 0x0, 0x12, r9, 0x0) ioctl$BINDER_WRITE_READ(r9, 0xc0306201, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000380), 0x0, 0x0, &(0x7f0000011f9d)}) getsockopt$inet_sctp6_SCTP_AUTO_ASCONF(0xffffffffffffffff, 0x84, 0x1e, &(0x7f0000000140), &(0x7f0000000180)=0x4) ioctl$BINDER_WRITE_READ(r9, 0xc0306201, &(0x7f00000004c0)={0xfffffffffffffcc8, 0x0, &(0x7f0000000440)=ANY=[], 0xffda, 0x0, &(0x7f0000000800)="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"}) write(0xffffffffffffffff, &(0x7f0000000300)="8be25f5790f664f32509e40d6f879d5add7e2d359c9a19afb750a2d25352875d187d4118c99a2d5c6db433c277cc7d345b87a34f1b417033d367cb0cfd6a25633f77aafb17e99c33cb65352c901ae75176f07bb0a4bb5ebff3d87e", 0x5b) r10 = ioctl$LOOP_CTL_GET_FREE(r4, 0x4c82) ioctl$LOOP_CTL_REMOVE(r6, 0x4c81, r10) r11 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000440)='/dev/autofs\x00', 0x101000, 0x0) openat$cgroup(r11, &(0x7f0000000380)='syz1\x00', 0x200002, 0x0) sched_setaffinity(r2, 0x8, &(0x7f0000000200)=0x7) [ 335.028828] do_syscall_64+0x281/0x940 [ 335.032726] ? vmalloc_sync_all+0x30/0x30 [ 335.036882] ? _raw_spin_unlock_irq+0x27/0x70 [ 335.038691] binder: 31935:31936 ioctl c0306201 200004c0 returned -11 [ 335.041375] ? finish_task_switch+0x1c1/0x7e0 [ 335.041391] ? syscall_return_slowpath+0x550/0x550 [ 335.041405] ? syscall_return_slowpath+0x2ac/0x550 [ 335.041419] ? prepare_exit_to_usermode+0x350/0x350 [ 335.041435] ? entry_SYSCALL_64_after_hwframe+0x52/0xb7 [ 335.041454] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 335.041475] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 335.041486] RIP: 0033:0x454e79 [ 335.063902] binder: 31935:31937 ioctl c0306201 200004c0 returned -11 [ 335.067248] RSP: 002b:00007f37fba8ec68 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 335.067264] RAX: ffffffffffffffda RBX: 00007f37fba8f6d4 RCX: 0000000000454e79 [ 335.067271] RDX: 00000000200e1000 RSI: 0000000020447000 RDI: 0000000020000000 [ 335.067279] RBP: 000000000072bea0 R08: 000000002097bfff R09: 0000000000000000 [ 335.067286] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000019 2018/03/31 09:15:42 executing program 3: r0 = syz_open_dev$random(&(0x7f00000001c0)='/dev/random\x00', 0x0, 0x800) r1 = syz_open_dev$loop(&(0x7f0000308000)='/dev/loop#\x00', 0x0, 0x0) ioctl$LOOP_SET_STATUS(r1, 0xc0481273, &(0x7f0000000480)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "3b00eae31d00000000020000010000009f00000023f7b7d65f90b0f6330ee739b319d8f6aa6bd58d1443474482e85040fb4947ebb55bd19f335b5bffff2201f3", "cfa430745a540dc1c149b7b81579f6681c0000000033223e82ab867dac761faf", [0x8000]}) write(0xffffffffffffffff, &(0x7f00000001c0), 0x0) setsockopt$inet_sctp6_SCTP_RECVNXTINFO(0xffffffffffffffff, 0x84, 0x21, &(0x7f00000003c0)=0x200, 0x4) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f00000000c0)=0x0) getsockopt$netrom_NETROM_T4(r0, 0x103, 0x6, &(0x7f0000000380)=0x8, &(0x7f0000000340)=0xfe9d) r3 = getpid() sched_setparam(r3, &(0x7f0000000400)) syz_open_dev$loop(&(0x7f0000ca9ff5)='/dev/loop#\x00', 0x0, 0x82) r4 = memfd_create(&(0x7f0000614000)="74086e750000000000000000008c00", 0x0) pwritev(r4, &(0x7f0000f50f90)=[{&(0x7f0000000040)="aa", 0x1}], 0x1, 0x0) fcntl$getownex(r1, 0x10, &(0x7f0000000240)={0x0, 0x0}) r6 = syz_open_procfs(r5, &(0x7f0000000280)='stat\x00') epoll_ctl$EPOLL_CTL_MOD(r4, 0x3, r0, &(0x7f00000002c0)={0x20000010}) accept4$inet6(r4, &(0x7f0000000100)={0x0, 0x0, 0x0, @mcast1}, &(0x7f0000000140)=0x1c, 0x7fd) getsockopt$inet_IP_IPSEC_POLICY(r4, 0x0, 0x10, &(0x7f0000000940)={{{@in6=@local, @in6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@loopback}, 0x0, @in=@local}}, &(0x7f0000000780)=0xe8) getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f00000007c0)={0x0, 0x0, 0x0}, &(0x7f0000000540)=0xc) fchown(r4, r7, r8) r9 = syz_open_dev$binder(&(0x7f0000000100)='/dev/binder#\x00', 0xffffffffffffffff, 0x806) ioctl$BINDER_SET_CONTEXT_MGR(r6, 0x40046207, 0x0) mmap$binder(&(0x7f000000c000/0x2000)=nil, 0x2000, 0x0, 0x12, r9, 0x0) ioctl$BINDER_WRITE_READ(r9, 0xc0306201, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000), 0x0, 0x0, &(0x7f0000011f9d)}) getsockopt$inet_sctp6_SCTP_AUTO_ASCONF(0xffffffffffffffff, 0x84, 0x1e, &(0x7f0000000140), &(0x7f0000000180)=0x4) ioctl$BINDER_WRITE_READ(r9, 0xc0306201, &(0x7f0000000340)={0x8, 0x0, &(0x7f0000000440)=ANY=[@ANYRES64=r1], 0x0, 0x0, &(0x7f0000000240)}) write(0xffffffffffffffff, &(0x7f0000000300)="8be25f5790f664f32509e40d6f879d5add7e2d359c9a19afb750a2d25352875d187d4118c99a2d5c6db433c277cc7d345b87a34f1b417033d367cb0cfd6a25633f77aafb17e99c33cb65352c901ae75176f07bb0a4bb5ebff3d87e", 0x5b) r10 = ioctl$LOOP_CTL_GET_FREE(r4, 0x4c82) ioctl$LOOP_CTL_REMOVE(r6, 0x4c81, r10) openat$cgroup(0xffffffffffffff9c, &(0x7f0000000000)='syz0\x00', 0x200002, 0x0) sched_setaffinity(r2, 0x8, &(0x7f0000000200)=0x7) 2018/03/31 09:15:42 executing program 7 (fault-call:24 fault-nth:31): perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f000031f000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getpid() r0 = syz_open_dev$vcsn(&(0x7f0000000040)='/dev/vcs#\x00', 0x0, 0x20000) ioctl$GIO_CMAP(r0, 0x4b70, &(0x7f0000000080)) r1 = socket$alg(0x26, 0x5, 0x0) ioctl$sock_SIOCGIFBR(r1, 0x8940, &(0x7f0000000040)=@get={0x1, &(0x7f0000000400)=""/242, 0x100000000}) bind$alg(r1, &(0x7f0000000080)={0x26, 'aead\x00', 0x0, 0x0, 'generic-gcm-aesni\x00'}, 0x58) syz_open_dev$sndmidi(&(0x7f0000000100)='/dev/snd/midiC#D#\x00', 0xfd, 0x0) bind(0xffffffffffffffff, &(0x7f0000000140)=@llc={0x1a, 0x33a, 0x7, 0x80, 0x5, 0x4, @remote={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xbb}}, 0x80) r2 = syz_init_net_socket$nfc_llcp(0x27, 0x1, 0x1) setsockopt$nfc_llcp_NFC_LLCP_MIUX(r2, 0x118, 0x15, &(0x7f0000000000), 0x4) r3 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/cuse\x00', 0x103002, 0x0) futimesat(r3, &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)={{0x0, 0x7530}}) r4 = syz_open_dev$vcsa(&(0x7f00000001c0)='/dev/vcsa#\x00', 0x2, 0x4020ff) sendto$inet6(r4, &(0x7f0000000bc0)="36251e313e0743fc195a1a198a14434e8a0a00b3f452a3b5644e336ec712a16310c9aecc4e3097bc666a8882128a73c368ce731e9fbf3fe18fa52d00", 0x3c, 0x20000000, &(0x7f0000000c40)={0xa, 0x0, 0x6, @dev={0xfe, 0x80, [], 0x19}, 0x1f}, 0x1c) accept$alg(r0, 0x0, 0x0) sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f0000000000)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x8}, 0xb4fcd35419244434, &(0x7f00004ca000)={&(0x7f0000000300)=ANY=[], 0x1a1}, 0x1}, 0x0) syz_fuseblk_mount(&(0x7f0000001380)='./file0\x00', &(0x7f00000013c0)='./file0\x00', 0xf000, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0xb21, 0x0) socket(0x1e, 0x3, 0x0) socket(0x1e, 0x0, 0x0) ptrace$PTRACE_SECCOMP_GET_FILTER(0x420c, 0x0, 0x0, &(0x7f0000000380)=""/113) sched_yield() ioctl$TUNGETIFF(r4, 0x800454d2, &(0x7f0000000140)) ioctl$KIOCSOUND(r4, 0x4b2f, 0xfffffffffffffb74) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000447000)='./file0\x00', &(0x7f00000e1000)='msdos\x00', 0x0, &(0x7f000097bfff)) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000580)='./cgroup/syz0\x00', 0x1ff) syz_open_dev$audion(&(0x7f0000000280)='/dev/audio#\x00', 0x7be, 0x0) [ 335.067293] R13: 00000000000003fa R14: 00000000006f8010 R15: 000000000000001e [ 335.084717] FAT-fs (loop199): unable to read boot sector [ 335.130574] binder: 31941:31942 unknown command 20 [ 335.170097] FAT-fs (loop199): unable to read boot sector [ 335.183703] FAT-fs (loop199): unable to read boot sector [ 335.195104] binder: 31941:31942 ioctl c0306201 20000340 returned -22 [ 335.209201] FAT-fs (loop199): unable to read boot sector [ 335.222715] FAULT_INJECTION: forcing a failure. [ 335.222715] name failslab, interval 1, probability 0, space 0, times 0 [ 335.233984] CPU: 0 PID: 31946 Comm: syz-executor7 Not tainted 4.16.0-rc7+ #8 [ 335.241178] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 335.250529] Call Trace: [ 335.253123] dump_stack+0x194/0x24d [ 335.256767] ? arch_local_irq_restore+0x53/0x53 [ 335.261457] should_fail+0x8c0/0xa40 [ 335.265182] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 335.270291] ? kasan_kmalloc+0xad/0xe0 [ 335.274182] ? kmem_cache_alloc_trace+0x136/0x740 [ 335.279028] ? __memcg_init_list_lru_node+0x169/0x270 [ 335.284228] ? sget_userns+0x6b1/0xe40 [ 335.288120] ? mount_fs+0x66/0x2d0 [ 335.291667] ? vfs_kern_mount.part.26+0xc6/0x4a0 [ 335.296423] ? do_mount+0xea4/0x2bb0 [ 335.300146] ? do_syscall_64+0x281/0x940 [ 335.304217] ? entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 335.309602] ? find_held_lock+0x35/0x1d0 [ 335.313675] ? __lock_is_held+0xb6/0x140 [ 335.317763] ? check_same_owner+0x320/0x320 [ 335.322094] ? rcu_note_context_switch+0x710/0x710 [ 335.327042] should_failslab+0xec/0x120 [ 335.331026] kmem_cache_alloc_trace+0x4b/0x740 [ 335.335611] ? __kmalloc_node+0x33/0x70 [ 335.339583] __memcg_init_list_lru_node+0x169/0x270 [ 335.344588] ? list_lru_add+0x7c0/0x7c0 [ 335.348549] ? __kmalloc_node+0x47/0x70 [ 335.352513] __list_lru_init+0x544/0x750 [ 335.356563] ? memcg_destroy_list_lru_node.isra.7+0x110/0x110 [ 335.362437] ? trace_hardirqs_on_caller+0x421/0x5c0 [ 335.367440] ? lockdep_init_map+0x9/0x10 [ 335.371487] sget_userns+0x6b1/0xe40 [ 335.375182] ? kill_litter_super+0x90/0x90 [ 335.379400] ? ns_test_super+0x50/0x50 [ 335.383271] ? destroy_unused_super.part.6+0xd0/0xd0 [ 335.388353] ? do_raw_spin_trylock+0x190/0x190 [ 335.392924] ? kobject_put+0x6b/0x250 [ 335.396712] ? blkdev_get+0x3a1/0xb00 [ 335.400499] ? cap_capable+0x1b5/0x230 [ 335.404365] ? __blkdev_get+0x13b0/0x13b0 [ 335.408496] ? security_capable+0x8e/0xc0 [ 335.412625] ? kill_litter_super+0x90/0x90 [ 335.416843] ? ns_capable_common+0xcf/0x160 [ 335.421151] ? ns_test_super+0x50/0x50 [ 335.425028] ? kill_litter_super+0x90/0x90 [ 335.429243] sget+0xd2/0x120 [ 335.432248] mount_bdev+0x109/0x370 [ 335.435856] ? msdos_mount+0x40/0x40 [ 335.439550] msdos_mount+0x34/0x40 [ 335.443071] mount_fs+0x66/0x2d0 [ 335.446422] vfs_kern_mount.part.26+0xc6/0x4a0 [ 335.450987] ? may_umount+0xa0/0xa0 [ 335.454597] ? _raw_read_unlock+0x22/0x30 [ 335.458724] ? __get_fs_type+0x8a/0xc0 [ 335.462596] do_mount+0xea4/0x2bb0 [ 335.466127] ? copy_mount_string+0x40/0x40 [ 335.470345] ? trace_hardirqs_on_caller+0x421/0x5c0 [ 335.475342] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 335.480083] ? retint_kernel+0x10/0x10 [ 335.483958] ? copy_mount_options+0x18b/0x2e0 [ 335.488433] ? copy_mount_options+0x193/0x2e0 [ 335.492908] ? copy_mount_options+0x1f7/0x2e0 [ 335.497386] SyS_mount+0xab/0x120 [ 335.500818] ? copy_mnt_ns+0xb30/0xb30 [ 335.504686] do_syscall_64+0x281/0x940 [ 335.508555] ? vmalloc_sync_all+0x30/0x30 [ 335.512684] ? _raw_spin_unlock_irq+0x27/0x70 [ 335.517160] ? finish_task_switch+0x1c1/0x7e0 [ 335.521637] ? syscall_return_slowpath+0x550/0x550 [ 335.526550] ? syscall_return_slowpath+0x2ac/0x550 [ 335.531458] ? prepare_exit_to_usermode+0x350/0x350 [ 335.536454] ? entry_SYSCALL_64_after_hwframe+0x52/0xb7 [ 335.541803] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 335.546632] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 335.551802] RIP: 0033:0x454e79 [ 335.554971] RSP: 002b:00007f37fba8ec68 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 335.562662] RAX: ffffffffffffffda RBX: 00007f37fba8f6d4 RCX: 0000000000454e79 [ 335.569912] RDX: 00000000200e1000 RSI: 0000000020447000 RDI: 0000000020000000 [ 335.577161] RBP: 000000000072bea0 R08: 000000002097bfff R09: 0000000000000000 2018/03/31 09:15:42 executing program 6: r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r0, &(0x7f0000ef8cfd)={0xa, 0x4e23, 0x0, @loopback={0x0, 0x1}}, 0x1c) listen(r0, 0x3) r1 = socket$inet6_sctp(0xa, 0x4000000000000001, 0x84) sendto$inet6(r1, &(0x7f0000000080)='X', 0x1, 0x0, &(0x7f000005ffe4)={0xa, 0x4e23, 0x0, @loopback={0x0, 0x1}}, 0x1c) r2 = accept(r0, 0x0, &(0x7f00000000c0)) getsockopt$inet_sctp_SCTP_SOCKOPT_PEELOFF(r2, 0x84, 0x66, &(0x7f0000000000)={0x0, 0x100}, &(0x7f0000000040)=0x8) setsockopt$inet_sctp6_SCTP_DEFAULT_SNDINFO(r1, 0x84, 0x22, &(0x7f0000000100)={0x6, 0x9, 0xd230, 0xffffffff, r3}, 0x10) fsync(r2) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f00009b2ff0)={0x1, &(0x7f0000a7dff8)=[{0x6, 0x0, 0x0, 0x400000000000003}]}, 0x10) ioctl$sock_SIOCETHTOOL(r1, 0x8946, &(0x7f00000001c0)={'ip6_vti0\x00', &(0x7f0000000140)=@ethtool_gfeatures={0x3a, 0x6, [{0x6, 0x4, 0x9, 0x1}, {0x8, 0x9, 0x5, 0x9}, {0x3, 0x1000, 0x4, 0x7f}, {0x201ca684, 0x3, 0x9, 0x7}, {0x2, 0x101, 0x1f, 0x9}, {0x1f, 0xffff, 0x5}]}}) setsockopt$inet_sctp_SCTP_STREAM_SCHEDULER_VALUE(r2, 0x84, 0x7c, &(0x7f0000000280)={r3, 0xbf8, 0x7}, 0x8) sendmsg$kcm(r2, &(0x7f0000001480)={0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000200)='R', 0x1}], 0x1, &(0x7f0000000280)}, 0x8091) shutdown(r1, 0x2000000002) 2018/03/31 09:15:42 executing program 4: perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f000031f000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) prctl$void(0x0) getpid() r0 = syz_open_dev$vcsn(&(0x7f0000000040)='/dev/vcs#\x00', 0x0, 0x20000) ioctl$GIO_CMAP(r0, 0x4b70, &(0x7f0000000080)) r1 = socket$alg(0x26, 0x5, 0x0) ioctl$sock_SIOCGIFBR(0xffffffffffffffff, 0x8940, &(0x7f0000000040)=@get={0x1, &(0x7f0000000400)=""/242, 0x100000000}) bind$alg(r1, &(0x7f0000000080)={0x26, 'aead\x00', 0x0, 0x0, 'generic-gcm-aesni\x00'}, 0x58) syz_open_dev$sndmidi(&(0x7f0000000100)='/dev/snd/midiC#D#\x00', 0xfd, 0x0) bind(0xffffffffffffffff, &(0x7f0000000140)=@llc={0x1a, 0x33a, 0x7, 0x80, 0x0, 0x4, @remote={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xbb}}, 0x80) r2 = syz_init_net_socket$nfc_llcp(0x27, 0x1, 0x1) setsockopt$nfc_llcp_NFC_LLCP_MIUX(r2, 0x118, 0x15, &(0x7f0000000000), 0x4) r3 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/cuse\x00', 0x103002, 0x0) futimesat(r3, &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)={{0x0, 0x7530}}) r4 = syz_open_dev$vcsa(&(0x7f00000001c0)='/dev/vcsa#\x00', 0x2, 0x0) sendto$inet6(r4, &(0x7f0000000bc0), 0x0, 0x20000000, &(0x7f0000000c40)={0xa, 0x4e20, 0x0, @dev={0xfe, 0x80, [], 0x19}, 0x1f}, 0x1c) accept$alg(r0, 0x0, 0x0) sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f0000000000)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x8}, 0xb4fcd35419244434, &(0x7f00004ca000)={&(0x7f0000000300)=ANY=[], 0x1a1}, 0x1}, 0x0) syz_fuseblk_mount(&(0x7f0000001380)='./file0\x00', &(0x7f00000013c0)='./file0\x00', 0xf000, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0xb21, 0x0) socket(0x1e, 0x3, 0x0) socket(0x1e, 0x0, 0x0) ptrace$PTRACE_SECCOMP_GET_FILTER(0x420c, 0x0, 0x0, &(0x7f0000000380)=""/113) sched_yield() ioctl$TUNGETIFF(r4, 0x800454d2, &(0x7f0000000140)) ioctl$KIOCSOUND(r4, 0x4b2f, 0xfffffffffffffb74) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x20, 0x9b}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000447000)='./file0\x00', &(0x7f00000e1000)='msdos\x00', 0x0, &(0x7f000097bfff)) getsockopt$inet_sctp_SCTP_PEER_AUTH_CHUNKS(r4, 0x84, 0x1a, &(0x7f00000005c0)={0x0, 0x8c, "ca48b0133ae18566d718e036032c12404ee4ce1b1a414e158afb9107b23c9d8c1c7c64fadb5c2c63f0b1eca47bf4f8aef2f6c7ce01afe153274eefa769e79ca8441362007595b2b7a46f9101078f267cf7e02e941fea75f16a21f6e4fa091371a066d36adc64e2210e469e85fd9f0fc76cdeed69bd4ba90d114c1526be81720b5d35fcdbc89b7752d7d78622"}, &(0x7f0000000500)=0x94) getsockopt$inet_sctp_SCTP_GET_LOCAL_ADDRS(r3, 0x84, 0x6d, &(0x7f0000000680)={r5, 0x8f, "21888d702feaa9db5268b79ced2480a017ec40a460c68b4ee16fc197bdb6483864ba65b48624e375084563160e08f46dd0949d9cd59e0df1d03f92d2ca68e132bf0238f712d1d9e6dd3e18f061189e34b8bc6f80b9ade1e70ecd53c5d8fd2388f6bf3b514fe2afdbfa8b49fdb3dbb7040f72a5dab81422a6be2f76ed881dc603fbd3b21c5334e43be5f8ecb2f75968"}, &(0x7f0000000540)=0x97) recvfrom$unix(r4, &(0x7f0000000200)=""/249, 0xf9, 0x1, &(0x7f0000000300)=@file={0x1, './file0/file0\x00'}, 0x6e) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000580)='./cgroup/syz0\x00', 0x1ff) 2018/03/31 09:15:42 executing program 0: perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f000031f000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) prctl$void(0x0) r0 = syz_open_dev$vcsn(&(0x7f0000000040)='/dev/vcs#\x00', 0x0, 0x20000) socket$alg(0x26, 0x5, 0x0) ioctl$sock_SIOCGIFBR(0xffffffffffffffff, 0x8940, &(0x7f0000000040)=@get={0x1, &(0x7f0000000400)=""/242, 0x100000000}) bind$alg(0xffffffffffffffff, &(0x7f0000000080)={0x26, 'aead\x00', 0x0, 0x0, 'generic-gcm-aesni\x00'}, 0x58) r1 = syz_open_dev$sndmidi(&(0x7f0000000100)='/dev/snd/midiC#D#\x00', 0xfd, 0x0) bind(0xffffffffffffffff, &(0x7f0000000140)=@llc={0x1a, 0x33a, 0x7, 0x80, 0x0, 0x4, @remote={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xbb}}, 0x80) r2 = syz_init_net_socket$nfc_llcp(0x27, 0x1, 0x1) setsockopt$nfc_llcp_NFC_LLCP_MIUX(r2, 0x118, 0x15, &(0x7f0000000000), 0x4) r3 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/cuse\x00', 0x103002, 0x0) futimesat(r3, &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)={{0x0, 0x7530}, {0x77359400}}) r4 = syz_open_dev$vcsa(&(0x7f00000001c0)='/dev/vcsa#\x00', 0x2, 0x0) sendto$inet6(r4, &(0x7f0000000bc0)="36251e313e0743fc195a1a198a14434e8a0a00b3f452a3b5644e336ec712a16310c9aecc4e3097bc666a8882128a73c368ce731e9fbf3fe18fa52d00c34ac2e57c1c4569cfbd6a621c6dfbc032121aed", 0x50, 0x20000000, &(0x7f0000000c40)={0xa, 0x4e20, 0x6, @dev={0xfe, 0x80, [], 0x19}, 0x1f}, 0x1c) accept$alg(r0, 0x0, 0x0) sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f0000000000)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x8}, 0xb4fcd35419244434, &(0x7f00004ca000)={&(0x7f0000000300)=ANY=[], 0x1a1}, 0x1}, 0x0) getsockopt$bt_BT_SNDMTU(r1, 0x112, 0xc, &(0x7f0000000340)=0x10000, &(0x7f0000000500)=0x2) syz_fuseblk_mount(&(0x7f0000001380)='./file0\x00', &(0x7f00000013c0)='./file0\x00', 0xf000, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0xb21, 0x0) socket(0x1e, 0x3, 0x0) socket(0x1e, 0x0, 0x0) getsockopt$nfc_llcp(r4, 0x118, 0x5, &(0x7f0000000540)=""/39, 0x27) getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f0000000200)={0x0, 0x0}, &(0x7f0000000240)=0x49d562fa498f445e) stat(&(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) fchown(r2, r5, r6) ptrace$PTRACE_SECCOMP_GET_FILTER(0x420c, 0x0, 0x0, &(0x7f0000000380)=""/113) sched_yield() ioctl$KIOCSOUND(r4, 0x4b2f, 0xfffffffffffffb74) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x20, 0x9b}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000447000)='./file0\x00', &(0x7f00000e1000)='msdos\x00', 0x0, &(0x7f000097bfff)) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000580)='./cgroup/syz0\x00', 0x1ff) [ 335.584411] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000019 [ 335.592036] R13: 00000000000003fa R14: 00000000006f8010 R15: 000000000000001f [ 335.611742] FAT-fs (loop199): unable to read boot sector 2018/03/31 09:15:42 executing program 5: perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f000031f000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) prctl$void(0x0) getpid() r0 = syz_open_dev$vcsn(&(0x7f0000000200)='/dev/vcs#\x00', 0x6, 0x200000) ioctl$GIO_CMAP(r0, 0x4b70, &(0x7f0000000080)) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000080)={0x26, 'aead\x00', 0x0, 0x0, 'generic-gcm-aesni\x00'}, 0x58) syz_open_dev$sndmidi(&(0x7f0000000100)='/dev/snd/midiC#D#\x00', 0xfd, 0x0) bind(0xffffffffffffffff, &(0x7f0000000140)=@llc={0x1a, 0x33a, 0x7, 0x80, 0x5, 0x4, @remote={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xbb}}, 0x80) r2 = syz_init_net_socket$nfc_llcp(0x27, 0x1, 0x1) setsockopt$nfc_llcp_NFC_LLCP_MIUX(r2, 0x118, 0x15, &(0x7f0000000000), 0x4) r3 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/cuse\x00', 0x103002, 0x0) futimesat(r3, &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)={{0x0, 0x7530}}) r4 = syz_open_dev$vcsa(&(0x7f00000001c0)='/dev/vcsa#\x00', 0x2, 0x4020ff) sendto$inet6(0xffffffffffffffff, &(0x7f0000000bc0)="36251e313e0743fc195a1a198a14434e8a0a00b3f452a3b5644e336ec712a16310c9aecc4e3097bc666a8882128a73c368ce731e9fbf3fe18fa52d", 0x3b, 0x20000000, &(0x7f0000000c40)={0xa, 0x4e20, 0x6, @dev={0xfe, 0x80, [], 0x19}, 0x1f}, 0x1c) accept$alg(r0, 0x0, 0x0) sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f0000000000)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x8}, 0xb4fcd35419244434, &(0x7f00004ca000)={&(0x7f0000000300)=ANY=[], 0x1a1}, 0x1}, 0x0) syz_fuseblk_mount(&(0x7f0000001380)='./file0\x00', &(0x7f00000013c0)='./file0\x00', 0xf000, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0xb21, 0x0) socket(0x1e, 0x3, 0x0) socket(0x1e, 0x0, 0x0) ptrace$PTRACE_SECCOMP_GET_FILTER(0x420c, 0x0, 0x0, &(0x7f0000000380)=""/113) sched_yield() ioctl$TUNGETIFF(r4, 0x800454d2, &(0x7f0000000140)) ioctl$KIOCSOUND(r4, 0x4b2f, 0xfffffffffffffb74) ioctl$VHOST_SET_FEATURES(r3, 0x4008af00, &(0x7f0000000240)=0x8000000) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x20, 0x9b}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000447000)='./file0\x00', &(0x7f00000e1000)='msdos\x00', 0x0, &(0x7f000097bfff)) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000580)='./cgroup/syz0\x00', 0x1ff) syz_open_dev$audion(&(0x7f0000000280)='/dev/audio#\x00', 0x7be, 0x0) 2018/03/31 09:15:42 executing program 1: perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f000031f000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) prctl$void(0x0) getpid() syz_open_dev$vcsn(&(0x7f0000000040)='/dev/vcs#\x00', 0x400, 0x20000) r0 = socket$alg(0x26, 0x5, 0x0) ioctl$sock_SIOCGIFBR(r0, 0x8940, &(0x7f0000000040)=@get={0x1, &(0x7f0000000400)=""/242, 0x100000000}) bind$alg(r0, &(0x7f0000000080)={0x26, 'aead\x00', 0x0, 0x0, 'generic-gcm-aesni\x00'}, 0x58) r1 = syz_open_dev$sndmidi(&(0x7f0000000100)='/dev/snd/midiC#D#\x00', 0xfd, 0x0) bind(r1, &(0x7f0000000140)=@llc={0x1a, 0x33a, 0x7, 0x80, 0x0, 0x4, @remote={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xbb}}, 0x80) r2 = syz_init_net_socket$nfc_llcp(0x27, 0x1, 0x1) setsockopt$nfc_llcp_NFC_LLCP_MIUX(r2, 0x118, 0x15, &(0x7f0000000000), 0x4) r3 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/cuse\x00', 0x103002, 0x0) futimesat(r3, &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)={{0x0, 0x7530}}) sendto$inet6(0xffffffffffffffff, &(0x7f0000000bc0), 0x0, 0x20000000, &(0x7f0000000c40)={0xa, 0x4e20, 0x6, @dev={0xfe, 0x80, [], 0x19}, 0x1f}, 0x1c) sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f0000000000)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x8}, 0xb4fcd35419244434, &(0x7f00004ca000)={&(0x7f0000000300)=ANY=[], 0x1a1}, 0x1}, 0x0) syz_fuseblk_mount(&(0x7f0000001380)='./file0\x00', &(0x7f00000013c0)='./file0\x00', 0xf000, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0xb21, 0x0) socket(0x1e, 0x3, 0x0) ptrace$PTRACE_SECCOMP_GET_FILTER(0x420c, 0x0, 0x0, &(0x7f0000000380)=""/113) sched_yield() ioctl$TUNGETIFF(0xffffffffffffffff, 0x800454d2, &(0x7f0000000140)) ioctl$KIOCSOUND(0xffffffffffffffff, 0x4b2f, 0xfffffffffffffb74) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x20, 0x9b}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000447000)='./file0\x00', &(0x7f00000e1000)='msdos\x00', 0x0, &(0x7f000097bfff)) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000580)='./cgroup/syz0\x00', 0x1ff) syz_open_dev$audion(&(0x7f0000000280)='/dev/audio#\x00', 0x7be, 0x0) fcntl$getown(0xffffffffffffffff, 0x9) [ 335.636859] binder: 31941:31956 unknown command 26 [ 335.648748] binder: 31941:31956 ioctl c0306201 20000340 returned -22 [ 335.703683] FAT-fs (loop199): unable to read boot sector [ 335.716407] FAT-fs (loop199): unable to read boot sector [ 335.733333] FAT-fs (loop199): unable to read boot sector [ 335.742135] FAT-fs (loop199): unable to read boot sector [ 335.753669] FAT-fs (loop199): unable to read boot sector [ 335.791146] FAT-fs (loop199): unable to read boot sector [ 335.810609] FAT-fs (loop199): unable to read boot sector [ 335.830425] FAT-fs (loop199): unable to read boot sector 2018/03/31 09:15:43 executing program 3: syz_open_dev$random(&(0x7f00000001c0)='/dev/random\x00', 0x0, 0x800) r0 = syz_open_dev$loop(&(0x7f0000308000)='/dev/loop#\x00', 0x0, 0x0) ioctl$LOOP_SET_STATUS(r0, 0xc0481273, &(0x7f0000000480)={0x0, 0x0, 0x0, 0x0, 0x401, 0xffffffffffffffff, 0x0, 0x0, "3900ea631d00000000020000010000009f00000023f7b7d65f90b0e6330ee739b319d8f6aa6bd58d1443474482e85040fb4947ebb55bd19f335b5bffff0001f3", "cfa430745a540dc1c149b7b81579f6a41c51f7d51933223e82ab867dac761faf"}) write(0xffffffffffffffff, &(0x7f00000001c0), 0x0) setsockopt$inet_sctp6_SCTP_RECVNXTINFO(0xffffffffffffffff, 0x84, 0x21, &(0x7f00000003c0)=0x200, 0x4) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f00000000c0)=0x0) getsockopt$netrom_NETROM_T4(0xffffffffffffffff, 0x103, 0x6, &(0x7f0000000300)=0x8, &(0x7f0000000340)=0x4) r2 = getpid() sched_setparam(r2, &(0x7f0000000400)) syz_open_dev$loop(&(0x7f0000ca9ff5)='/dev/loop#\x00', 0x0, 0x82) r3 = memfd_create(&(0x7f0000614000)="74086e750000000000000000008c00", 0x0) pwritev(r3, &(0x7f0000f50f90)=[{&(0x7f0000000380)="ce", 0x1}], 0x1, 0x0) fcntl$getownex(r0, 0x10, &(0x7f0000000240)={0x0, 0x0}) r5 = syz_open_procfs(r4, &(0x7f0000000280)='stat\x00') epoll_ctl$EPOLL_CTL_MOD(r3, 0x3, r5, &(0x7f00000002c0)={0x20000010}) accept4$inet6(r3, &(0x7f0000000100)={0x0, 0x0, 0x0, @mcast1}, &(0x7f0000000140)=0x1c, 0x7fd) getsockopt$inet_IP_IPSEC_POLICY(r3, 0x0, 0x10, &(0x7f0000000940)={{{@in6=@local, @in6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@loopback}, 0x0, @in=@local}}, &(0x7f0000000780)=0xe8) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f00000007c0)={0x0, 0x0, 0x0}, &(0x7f0000000540)=0xc) fchown(r3, r6, r7) r8 = syz_open_dev$binder(&(0x7f0000000100)='/dev/binder#\x00', 0xffffffffffffffff, 0x806) ioctl$BINDER_SET_CONTEXT_MGR(r5, 0x40046207, 0x0) mmap$binder(&(0x7f000000c000/0x2000)=nil, 0x2000, 0x0, 0x12, r8, 0x0) ioctl$BINDER_WRITE_READ(r8, 0xc0306201, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000), 0x0, 0x0, &(0x7f0000011f9d)}) getsockopt$inet_sctp6_SCTP_AUTO_ASCONF(0xffffffffffffffff, 0x84, 0x1e, &(0x7f0000000140), &(0x7f0000000180)=0x4) ioctl$BINDER_WRITE_READ(r8, 0xc0306201, &(0x7f0000000340)={0x8, 0x0, &(0x7f0000000440)=ANY=[@ANYRES64=r0], 0x0, 0x0, &(0x7f0000000240)}) write(0xffffffffffffffff, &(0x7f0000000300)="8be25f5790f664f32509e40d6f879d5add7e2d359c9a19afb750a2d25352875d187d4118c99a2d5c6db433c277cc7d345b87a34f1b417033d367cb0cfd6a25633f77aafb17e99c33cb65352c901ae75176f07bb0a4bb5ebff3d87e", 0x5b) r9 = ioctl$LOOP_CTL_GET_FREE(r3, 0x4c82) ioctl$LOOP_CTL_REMOVE(r5, 0x4c81, r9) openat$cgroup(0xffffffffffffff9c, &(0x7f0000000000)='syz0\x00', 0x200002, 0x0) sched_setaffinity(r1, 0x8, &(0x7f0000000200)=0x7) 2018/03/31 09:15:43 executing program 7 (fault-call:24 fault-nth:32): perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f000031f000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getpid() r0 = syz_open_dev$vcsn(&(0x7f0000000040)='/dev/vcs#\x00', 0x0, 0x20000) ioctl$GIO_CMAP(r0, 0x4b70, &(0x7f0000000080)) r1 = socket$alg(0x26, 0x5, 0x0) ioctl$sock_SIOCGIFBR(r1, 0x8940, &(0x7f0000000040)=@get={0x1, &(0x7f0000000400)=""/242, 0x100000000}) bind$alg(r1, &(0x7f0000000080)={0x26, 'aead\x00', 0x0, 0x0, 'generic-gcm-aesni\x00'}, 0x58) syz_open_dev$sndmidi(&(0x7f0000000100)='/dev/snd/midiC#D#\x00', 0xfd, 0x0) bind(0xffffffffffffffff, &(0x7f0000000140)=@llc={0x1a, 0x33a, 0x7, 0x80, 0x5, 0x4, @remote={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xbb}}, 0x80) r2 = syz_init_net_socket$nfc_llcp(0x27, 0x1, 0x1) setsockopt$nfc_llcp_NFC_LLCP_MIUX(r2, 0x118, 0x15, &(0x7f0000000000), 0x4) r3 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/cuse\x00', 0x103002, 0x0) futimesat(r3, &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)={{0x0, 0x7530}}) r4 = syz_open_dev$vcsa(&(0x7f00000001c0)='/dev/vcsa#\x00', 0x2, 0x4020ff) sendto$inet6(r4, &(0x7f0000000bc0)="36251e313e0743fc195a1a198a14434e8a0a00b3f452a3b5644e336ec712a16310c9aecc4e3097bc666a8882128a73c368ce731e9fbf3fe18fa52d00", 0x3c, 0x20000000, &(0x7f0000000c40)={0xa, 0x0, 0x6, @dev={0xfe, 0x80, [], 0x19}, 0x1f}, 0x1c) accept$alg(r0, 0x0, 0x0) sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f0000000000)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x8}, 0xb4fcd35419244434, &(0x7f00004ca000)={&(0x7f0000000300)=ANY=[], 0x1a1}, 0x1}, 0x0) syz_fuseblk_mount(&(0x7f0000001380)='./file0\x00', &(0x7f00000013c0)='./file0\x00', 0xf000, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0xb21, 0x0) socket(0x1e, 0x3, 0x0) socket(0x1e, 0x0, 0x0) ptrace$PTRACE_SECCOMP_GET_FILTER(0x420c, 0x0, 0x0, &(0x7f0000000380)=""/113) sched_yield() ioctl$TUNGETIFF(r4, 0x800454d2, &(0x7f0000000140)) ioctl$KIOCSOUND(r4, 0x4b2f, 0xfffffffffffffb74) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000447000)='./file0\x00', &(0x7f00000e1000)='msdos\x00', 0x0, &(0x7f000097bfff)) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000580)='./cgroup/syz0\x00', 0x1ff) syz_open_dev$audion(&(0x7f0000000280)='/dev/audio#\x00', 0x7be, 0x0) 2018/03/31 09:15:43 executing program 5: perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f000031f000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) prctl$void(0x0) getpid() r0 = syz_open_dev$vcsn(&(0x7f0000000040)='/dev/vcs#\x00', 0x0, 0x20000) ioctl$GIO_CMAP(r0, 0x4b70, &(0x7f0000000080)) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000080)={0x26, 'aead\x00', 0x0, 0x0, 'generic-gcm-aesni\x00'}, 0x58) syz_open_dev$sndmidi(&(0x7f0000000100)='/dev/snd/midiC#D#\x00', 0xfd, 0x0) bind(0xffffffffffffffff, &(0x7f0000000140)=@llc={0x1a, 0x33a, 0x7, 0x80, 0x5, 0x4, @remote={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xbb}}, 0x80) r2 = syz_init_net_socket$nfc_llcp(0x27, 0x7, 0x1) setsockopt$nfc_llcp_NFC_LLCP_MIUX(r2, 0x118, 0x15, &(0x7f0000000000), 0x4) r3 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/cuse\x00', 0x103002, 0x0) futimesat(r3, &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)={{0x0, 0x7530}}) r4 = syz_open_dev$vcsa(&(0x7f00000001c0)='/dev/vcsa#\x00', 0x2, 0x4020ff) sendto$inet6(0xffffffffffffffff, &(0x7f0000000bc0)="36251e313e0743fc195a1a198a14434e8a0a00b3f452a3b5644e336ec712a16310c9aecc4e3097bc666a8882128a73c368ce731e9fbf3fe18fa52d", 0x3b, 0x20000000, &(0x7f0000000c40)={0xa, 0x4e20, 0x6, @dev={0xfe, 0x80, [], 0x19}, 0x1f}, 0x1c) accept$alg(r0, 0x0, 0x0) sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f0000000000)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x8}, 0xb4fcd35419244434, &(0x7f00004ca000)={&(0x7f0000000300)=ANY=[], 0x1a1}, 0x1}, 0x0) setsockopt$inet_tcp_TCP_FASTOPEN_KEY(r0, 0x6, 0x21, &(0x7f0000000200)="78e137f69095a74b811c3ca14724d1a4", 0x10) syz_fuseblk_mount(&(0x7f0000001380)='./file0\x00', &(0x7f00000013c0)='./file0\x00', 0xf000, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0xb21, 0x0) socket(0x1e, 0x3, 0x0) socket(0x1e, 0x0, 0x0) ptrace$PTRACE_SECCOMP_GET_FILTER(0x420c, 0x0, 0x0, &(0x7f0000000380)=""/113) sched_yield() ioctl$TUNGETIFF(r4, 0x800454d2, &(0x7f0000000140)) ioctl$KIOCSOUND(r4, 0x4b2f, 0xfffffffffffffb74) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x20, 0x9b}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000447000)='./file0\x00', &(0x7f00000e1000)='msdos\x00', 0x0, &(0x7f000097bfff)) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000580)='./cgroup/syz0\x00', 0x1ff) syz_open_dev$audion(&(0x7f0000000280)='/dev/audio#\x00', 0x7be, 0x0) rt_sigsuspend(&(0x7f0000000240)={0x6}, 0x8) 2018/03/31 09:15:43 executing program 0: r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f000031f000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) prctl$void(0x0) r1 = syz_open_dev$vcsn(&(0x7f0000000040)='/dev/vcs#\x00', 0x0, 0x20000) socket$alg(0x26, 0x5, 0x0) ioctl$sock_SIOCGIFBR(0xffffffffffffffff, 0x8940, &(0x7f0000000040)=@get={0x1, &(0x7f0000000400)=""/242, 0x100000000}) bind$alg(0xffffffffffffffff, &(0x7f0000000080)={0x26, 'aead\x00', 0x0, 0x0, 'generic-gcm-aesni\x00'}, 0x58) syz_open_dev$sndmidi(&(0x7f0000000100)='/dev/snd/midiC#D#\x00', 0xfd, 0x0) bind(0xffffffffffffffff, &(0x7f0000000140)=@llc={0x1a, 0x33a, 0x7, 0x80, 0x0, 0x4, @remote={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xbb}}, 0x80) r2 = syz_init_net_socket$nfc_llcp(0x27, 0x1, 0x1) setsockopt$nfc_llcp_NFC_LLCP_MIUX(r2, 0x118, 0x15, &(0x7f0000000000), 0x4) r3 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/cuse\x00', 0x103002, 0x0) accept$packet(r3, &(0x7f0000000540)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @random}, &(0x7f0000000680)=0x14) sendmsg$nl_route(r1, &(0x7f0000000740)={&(0x7f0000000500)={0x10, 0x0, 0x0, 0x40000}, 0xc, &(0x7f0000000700)={&(0x7f00000006c0)=@newlink={0x30, 0x10, 0x228, 0x70bd2a, 0x25dfdbfb, {0x0, 0x0, 0x0, r4, 0x81, 0x20002}, [@IFLA_LINK={0x8, 0x5, 0x3f}, @IFLA_GROUP={0x8, 0x1b, 0x1}]}, 0x30}, 0x1, 0x0, 0x0, 0x4000080}, 0x804) futimesat(r3, &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)={{0x0, 0x7530}}) r5 = syz_open_dev$vcsa(&(0x7f00000001c0)='/dev/vcsa#\x00', 0x2, 0x0) sendto$inet6(r5, &(0x7f0000000bc0)="36251e313e0743fc195a1a198a14434e8a0a00b3f452a3b5644e336ec712a16310c9aecc4e3097bc666a8882128a73c368ce731e9fbf3fe18fa52d00c34ac2e57c1c4569cfbd6a621c6dfbc032121aed", 0x50, 0x20000000, &(0x7f0000000c40)={0xa, 0x4e20, 0x6, @dev={0xfe, 0x80, [], 0x19}, 0x1f}, 0x1c) accept$alg(r1, 0x0, 0x0) sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f0000000000)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x8}, 0xb4fcd35419244434, &(0x7f00004ca000)={&(0x7f0000000300)=ANY=[], 0x1a1}, 0x1}, 0x0) syz_fuseblk_mount(&(0x7f0000001380)='./file0\x00', &(0x7f00000013c0)='./file0\x00', 0xf000, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0xb21, 0x0) socket(0x1e, 0x3, 0x0) socket(0x1e, 0x0, 0x0) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000000780)={0x0}, &(0x7f00000007c0)=0xc) ptrace$PTRACE_SECCOMP_GET_FILTER(0x420c, r6, 0xf42, &(0x7f0000000800)=""/113) sched_yield() ioctl$TUNGETIFF(r5, 0x800454d2, &(0x7f0000000140)) ioctl$KIOCSOUND(r5, 0x4b2f, 0xfffffffffffffb74) readv(r0, &(0x7f0000000340)=[{&(0x7f0000000200)=""/248, 0xf8}, {&(0x7f00000005c0)=""/144, 0x90}, {&(0x7f0000000300)=""/14, 0xe}], 0x3) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x20, 0x9b}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000880)='./file0/file0\x00', &(0x7f0000447000)='./file0\x00', &(0x7f00000003c0)='cgroup2\x00', 0x0, &(0x7f000097bfff)) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000580)='./cgroup/syz0\x00', 0x1ff) 2018/03/31 09:15:43 executing program 1: perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f000031f000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) prctl$void(0x0) getpid() syz_open_dev$vcsn(&(0x7f0000000040)='/dev/vcs#\x00', 0x400, 0x20000) r0 = socket$alg(0x26, 0x5, 0x0) ioctl$sock_SIOCGIFBR(r0, 0x8940, &(0x7f0000000040)=@get={0x1, &(0x7f0000000400)=""/242, 0x100000000}) bind$alg(r0, &(0x7f0000000080)={0x26, 'aead\x00', 0x0, 0x0, 'generic-gcm-aesni\x00'}, 0x58) r1 = syz_open_dev$sndmidi(&(0x7f0000000100)='/dev/snd/midiC#D#\x00', 0xfd, 0x0) bind(r1, &(0x7f0000000140)=@llc={0x1a, 0x33a, 0x7, 0x80, 0x0, 0x4, @remote={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xbb}}, 0x80) r2 = syz_init_net_socket$nfc_llcp(0x27, 0x1, 0x1) setsockopt$nfc_llcp_NFC_LLCP_MIUX(r2, 0x118, 0x15, &(0x7f0000000000), 0x4) r3 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/cuse\x00', 0x103002, 0x0) futimesat(r3, &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)={{0x0, 0x7530}}) r4 = syz_open_dev$vcsa(&(0x7f00000001c0)='/dev/vcsa#\x00', 0x2, 0x4020ff) sendto$inet6(r4, &(0x7f0000000bc0), 0x0, 0x20000000, &(0x7f0000000c40)={0xa, 0x4e20, 0x6, @dev={0xfe, 0x80, [], 0x19}, 0x1f}, 0x1c) sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x8}, 0xb4fcd35419244434, &(0x7f0000000200)={&(0x7f0000000300)=ANY=[], 0xfffffe27}, 0x1}, 0x0) syz_fuseblk_mount(&(0x7f0000001380)='./file0\x00', &(0x7f00000013c0)='./file0\x00', 0xf000, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0xb21, 0x0) socket(0x1e, 0x3, 0x0) ptrace$PTRACE_SECCOMP_GET_FILTER(0x420c, 0x0, 0x0, &(0x7f0000000380)=""/113) sched_yield() ioctl$TUNGETIFF(r4, 0x800454d2, &(0x7f0000000140)) ioctl$KIOCSOUND(r4, 0x4b2f, 0xfffffffffffffb74) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x20, 0x9b}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000447000)='./file0\x00', &(0x7f00000e1000)='msdos\x00', 0x0, &(0x7f000097bfff)) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000580)='./cgroup/syz0\x00', 0x1ff) syz_open_dev$audion(&(0x7f0000000280)='/dev/audio#\x00', 0x7be, 0x0) fcntl$getown(0xffffffffffffffff, 0x9) 2018/03/31 09:15:43 executing program 2: syz_open_dev$loop(&(0x7f00000003c0)='/dev/loop#\x00', 0x8, 0x0) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(0xffffffffffffffff, 0x4040534e, &(0x7f000019ffe9)={0xc1}) r0 = accept(0xffffffffffffffff, &(0x7f0000000080)=@can, &(0x7f0000000180)=0x80) ioctl$sock_ipx_SIOCAIPXPRISLT(r0, 0x89e1, &(0x7f0000000280)=0x3f) ioctl$sock_inet_SIOCRTMSG(r0, 0x890d, &(0x7f0000000200)={0x80, {0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x19}}, {0x2, 0x4e21, @local={0xac, 0x14, 0x14, 0xaa}}, {0x2, 0x4e23}, 0x0, 0x7, 0x1, 0x0, 0x9, 0x0, 0x0, 0x0, 0xfffffffffffffff7}) getsockopt$inet_sctp_SCTP_PRIMARY_ADDR(0xffffffffffffffff, 0x84, 0x6, &(0x7f0000000ac0)={0x0, @in={{0x2, 0x4e20, @loopback=0x7f000001}}}, &(0x7f00000002c0)=0x84) setsockopt$inet_sctp_SCTP_ENABLE_STREAM_RESET(r0, 0x84, 0x76, &(0x7f0000000300)={r1, 0x1c9}, 0x8) r2 = syz_open_dev$sg(&(0x7f0000000700)='/dev/sg#\x00', 0xfffffffffffffff7, 0x800) clone(0x2000c100, &(0x7f0000000800)="97bb77038add5df9e9d4f9783b82c55fe59e5c0acdbcfc9bcf92ac0e1f1f3c1959c1d25dfabf3849336c7c85be174d7765b47e113632aea54b87e4d3f2c1db09e6aa4040b43d17308fb7e62e808067da2fff3cfd8e4c038c814bbfc6bc49d8ebc8671d8297e2d34dc61f2d194d2dbb8f59b4c853e0714d3d4bb29d1243fac01c86c8c4dd38daedab3c6ad73a72d3f6dd2684aa82e5285eb82452c9848b7beb8bc513ba8c8973cad0bd5926604846b7f5d0397b", &(0x7f00000008c0), &(0x7f0000000900), &(0x7f0000000940)="ed6c04412e782fe395f084741e3d9fe469aebde09acc8f8d8d84d1f00f5573b09acba487077ebb904cb1f3fed55f59d677ce24bbd2a7506df8e1e0d0fc709cb8c9f4ab2aeeeebc5ef879742c1f7628f1862c88b5b0da89acbf43ef12e4839405b6a3430d296fea06d2f3a8356c57ec991e") ioctl$SNDRV_SEQ_IOCTL_SUBSCRIBE_PORT(0xffffffffffffffff, 0x40505330, &(0x7f0000ec6fb0)={{}, {0x80}}) getsockopt$netrom_NETROM_T1(r0, 0x103, 0x1, &(0x7f0000000000), &(0x7f0000000380)=0x4) syz_open_dev$adsp(&(0x7f0000000600)='/dev/adsp#\x00', 0x100000000, 0x80000) rt_sigprocmask(0x3d738072cd0f41ac, &(0x7f0000000cc0)={0x7}, &(0x7f0000000d00), 0x8) clone(0x40000000, &(0x7f0000000500)="67cdd9994c47c31d325b069924a7064c157c2ec0b5b5dca2feeb7dabef3b7af0d02d559e293faa759f2b3cb12aea360c2d", &(0x7f0000000580), &(0x7f00000005c0), &(0x7f0000000a00)="29859fdda9a119e54a27f9ec76b4d63a16dc5bbdd38c2fda0e5f4d8f830cd987ec7d3ffc66cf3db8820968fd89a1fba8fe6352a29a27f3b000bcdf238f2c04b358fc831025180e0be313da41de6366c94a1a0f86aaffdf2c039111b55275c054e14819a827fe809225249a01944263a2aec15f64e752e35892b1b8e7ef1e0e9115") ioctl$SNDRV_SEQ_IOCTL_DELETE_PORT(0xffffffffffffffff, 0x40a85321, &(0x7f0000000b80)={{0x4, 0x8}, 'port0\x00', 0x80, 0x0, 0x10000, 0x6, 0x2, 0x80, 0x8, 0x0, 0x0, 0x3dec00}) getsockopt$inet_sctp_SCTP_SOCKOPT_PEELOFF(r2, 0x84, 0x66, &(0x7f0000000c40)={r1, 0x6}, &(0x7f0000000c80)=0x8) clock_settime(0x7, &(0x7f0000000740)={0x77359400}) ioctl$SNDRV_SEQ_IOCTL_CLIENT_ID(0xffffffffffffffff, 0x80045301, &(0x7f0000000340)) r3 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer2\x00', 0x0, 0x0) openat$sequencer2(0xffffffffffffff9c, &(0x7f00000006c0)='/dev/sequencer2\x00', 0x222081, 0x0) ioctl$RNDADDENTROPY(0xffffffffffffffff, 0x40085203, &(0x7f0000000100)=ANY=[@ANYPTR=&(0x7f0000000680)=ANY=[@ANYPTR64=&(0x7f0000000640)=ANY=[@ANYPTR, @ANYPTR]]]) setsockopt$inet_sctp_SCTP_DEFAULT_SEND_PARAM(r3, 0x84, 0xa, &(0x7f0000000140)={0x5, 0x100000001, 0x0, 0x8, 0x0, 0x7, 0x401, 0x1f, r1}, 0x20) 2018/03/31 09:15:43 executing program 4: perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f000031f000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) prctl$void(0x0) getpid() r0 = syz_open_dev$vcsn(&(0x7f0000000040)='/dev/vcs#\x00', 0x0, 0x20000) ioctl$GIO_CMAP(r0, 0x4b70, &(0x7f0000000080)) r1 = socket$alg(0x26, 0x5, 0x0) ioctl$sock_SIOCGIFBR(0xffffffffffffffff, 0x8940, &(0x7f0000000040)=@get={0x1, &(0x7f0000000400)=""/242, 0x100000000}) bind$alg(r1, &(0x7f0000000080)={0x26, 'aead\x00', 0x0, 0x0, 'generic-gcm-aesni\x00'}, 0x58) syz_open_dev$sndmidi(&(0x7f0000000100)='/dev/snd/midiC#D#\x00', 0xfd, 0x0) bind(0xffffffffffffffff, &(0x7f0000000140)=@llc={0x1a, 0x33a, 0x7, 0x80, 0x0, 0x4, @remote={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xbb}}, 0x80) r2 = syz_init_net_socket$nfc_llcp(0x27, 0x1, 0x1) setsockopt$nfc_llcp_NFC_LLCP_MIUX(r2, 0x118, 0x15, &(0x7f0000000000), 0x4) r3 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/cuse\x00', 0x103002, 0x0) futimesat(r3, &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)={{0x0, 0x7530}}) r4 = syz_open_dev$vcsa(&(0x7f00000001c0)='/dev/vcsa#\x00', 0x2, 0x0) sendto$inet6(r4, &(0x7f0000000bc0), 0x0, 0x20000000, &(0x7f0000000c40)={0xa, 0x4e20, 0x0, @dev={0xfe, 0x80, [], 0x19}, 0x1f}, 0x1c) accept$alg(r0, 0x0, 0x0) sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f0000000000)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x8}, 0xb4fcd35419244434, &(0x7f00004ca000)={&(0x7f0000000300)=ANY=[], 0x1a1}, 0x1}, 0x0) syz_fuseblk_mount(&(0x7f0000001380)='./file0\x00', &(0x7f00000013c0)='./file0\x00', 0xf000, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0xb21, 0x0) socket(0x4, 0x2, 0x3) getsockname(r2, &(0x7f0000000280)=@in6={0x0, 0x0, 0x0, @dev}, &(0x7f0000000300)=0x80) socket(0x1e, 0x0, 0x10000000009) ioctl$SNDRV_SEQ_IOCTL_QUERY_SUBS(r0, 0xc058534f, &(0x7f0000000200)={{0x3, 0x226c32d1}, 0x1, 0xe9, 0x9, {0x2ff5, 0x3}, 0x6, 0x4}) ptrace$PTRACE_SECCOMP_GET_FILTER(0x420c, 0x0, 0x0, &(0x7f0000000380)=""/113) sched_yield() ioctl$TUNGETIFF(r4, 0x800454d2, &(0x7f0000000140)) ioctl$KIOCSOUND(r4, 0x4b2f, 0xfffffffffffffb74) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x20, 0x9b, 0x0, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000447000)='./file0\x00', &(0x7f00000e1000)='msdos\x00', 0x0, &(0x7f000097bfff)) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000580)='./cgroup/syz0\x00', 0x1ff) 2018/03/31 09:15:43 executing program 6: r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r0, &(0x7f0000ef8cfd)={0xa, 0x4e23, 0x0, @loopback={0x0, 0x1}}, 0x1c) listen(r0, 0x3) r1 = socket$inet6_sctp(0xa, 0x4000000000000001, 0x84) sendto$inet6(r1, &(0x7f0000000080)='X', 0x1, 0x0, &(0x7f000005ffe4)={0xa, 0x4e23, 0x0, @loopback={0x0, 0x1}}, 0x1c) r2 = accept(r0, 0x0, &(0x7f00000000c0)) getsockopt$inet_sctp_SCTP_SOCKOPT_PEELOFF(r2, 0x84, 0x66, &(0x7f0000000000)={0x0, 0x100}, &(0x7f0000000040)=0x8) setsockopt$inet_sctp6_SCTP_DEFAULT_SNDINFO(r1, 0x84, 0x22, &(0x7f0000000100)={0x6, 0x9, 0xd230, 0xffffffff, r3}, 0x10) fsync(r2) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f00009b2ff0)={0x1, &(0x7f0000a7dff8)=[{0x6, 0x0, 0x0, 0x400000000000003}]}, 0x10) ioctl$sock_SIOCETHTOOL(r1, 0x8946, &(0x7f00000001c0)={'ip6_vti0\x00', &(0x7f0000000140)=@ethtool_gfeatures={0x3a, 0x6, [{0x6, 0x4, 0x9, 0x1}, {0x8, 0x9, 0x5, 0x9}, {0x3, 0x1000, 0x4, 0x7f}, {0x201ca684, 0x3, 0x9, 0x7}, {0x2, 0x101, 0x1f, 0x9}, {0x1f, 0xffff, 0x5}]}}) setsockopt$inet_sctp_SCTP_STREAM_SCHEDULER_VALUE(r2, 0x84, 0x7c, &(0x7f0000000280)={r3, 0xbf8, 0x7}, 0x8) sendmsg$kcm(r2, &(0x7f0000001480)={0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000200)='R', 0x1}], 0x1, &(0x7f0000000280)}, 0x8091) shutdown(r1, 0x2000000002) [ 335.916543] FAULT_INJECTION: forcing a failure. [ 335.916543] name failslab, interval 1, probability 0, space 0, times 0 [ 335.927864] CPU: 1 PID: 31980 Comm: syz-executor7 Not tainted 4.16.0-rc7+ #8 [ 335.927871] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 335.927875] Call Trace: [ 335.927892] dump_stack+0x194/0x24d [ 335.927905] ? arch_local_irq_restore+0x53/0x53 [ 335.927918] ? __save_stack_trace+0x7e/0xd0 [ 335.927935] should_fail+0x8c0/0xa40 [ 335.927948] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 335.927958] ? kasan_kmalloc+0xad/0xe0 [ 335.927965] ? kmem_cache_alloc_trace+0x136/0x740 [ 335.927974] ? __memcg_init_list_lru_node+0x169/0x270 [ 335.927981] ? __list_lru_init+0x544/0x750 [ 335.927989] ? sget_userns+0x6b1/0xe40 [ 335.927999] ? mount_fs+0x66/0x2d0 [ 335.928015] ? vfs_kern_mount.part.26+0xc6/0x4a0 [ 335.928024] ? do_mount+0xea4/0x2bb0 [ 335.928036] ? do_syscall_64+0x281/0x940 [ 335.928048] ? entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 335.928062] ? find_held_lock+0x35/0x1d0 2018/03/31 09:15:43 executing program 3: r0 = syz_open_dev$random(&(0x7f00000001c0)='/dev/random\x00', 0x0, 0x800) r1 = syz_open_dev$loop(&(0x7f0000308000)='/dev/loop#\x00', 0x4001000, 0x0) ioctl$LOOP_SET_STATUS(r1, 0xc0481273, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "3900ea631d00000000020000010000009f00000023f7b7d65f90b0e6330ee739b319d8f6aa6bd58d1443474482e85040fb4947ebb55bd19f335b5bffff0001f3", "cfa430745a540dc1c149b7b81579f6a41c51f7d51933223e82ab867dac761faf"}) write(0xffffffffffffffff, &(0x7f00000001c0), 0x0) setsockopt$inet_sctp6_SCTP_RECVNXTINFO(0xffffffffffffffff, 0x84, 0x21, &(0x7f00000003c0)=0x200, 0x4) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f00000000c0)=0x0) getsockopt$netrom_NETROM_T4(0xffffffffffffffff, 0x103, 0x6, &(0x7f0000000300)=0x8, &(0x7f0000000340)=0x4) getpid() sched_setparam(r2, &(0x7f0000000400)=0x2) syz_open_dev$loop(&(0x7f0000ca9ff5)='/dev/loop#\x00', 0x0, 0x82) r3 = memfd_create(&(0x7f0000000480)='/dev/random\x00', 0x0) pwritev(r3, &(0x7f00000004c0)=[{&(0x7f0000000040)="aa", 0x1}], 0x1, 0x0) fcntl$getownex(r1, 0x10, &(0x7f0000000240)={0x0, 0x0}) r5 = syz_open_procfs(r4, &(0x7f0000000280)='stat\x00') epoll_ctl$EPOLL_CTL_MOD(r3, 0x3, r0, &(0x7f00000002c0)={0x20000010}) accept4$inet6(r3, &(0x7f0000000100)={0x0, 0x0, 0x0, @mcast1}, &(0x7f0000000140)=0x1c, 0x7fd) getsockopt$inet_IP_IPSEC_POLICY(r3, 0x0, 0x10, &(0x7f0000000940)={{{@in6=@local, @in6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@loopback}, 0x0, @in=@local}}, &(0x7f0000000780)=0xe8) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f00000007c0)={0x0, 0x0, 0x0}, &(0x7f0000000540)=0xc) fchown(r3, r6, r7) r8 = syz_open_dev$binder(&(0x7f0000000100)='/dev/binder#\x00', 0xffffffffffffffff, 0x806) ioctl$BINDER_SET_CONTEXT_MGR(r5, 0x40046207, 0x0) mmap$binder(&(0x7f000000c000/0x2000)=nil, 0x2000, 0x0, 0x12, r8, 0x0) ioctl$BINDER_WRITE_READ(r8, 0xc0306201, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000), 0x0, 0x0, &(0x7f0000011f9d)}) getsockopt$inet_sctp6_SCTP_AUTO_ASCONF(0xffffffffffffffff, 0x84, 0x1e, &(0x7f0000000140), &(0x7f0000000180)=0x4) ioctl$BINDER_WRITE_READ(r8, 0xc0306201, &(0x7f0000000340)={0x8, 0x0, &(0x7f0000000440)=ANY=[@ANYRES64=r1], 0x0, 0x0, &(0x7f0000000240)}) write(0xffffffffffffffff, &(0x7f0000000300)="8be25f5790f664f32509e40d6f879d5add7e2d359c9a19afb750a2d25352875d187d4118c99a2d5c6db433c277cc7d345b87a34f1b417033d367cb0cfd6a25633f77aafb17e99c33cb65352c901ae75176f07bb0a4bb5ebff3d87e", 0x5b) r9 = ioctl$LOOP_CTL_GET_FREE(r3, 0x4c82) ioctl$LOOP_CTL_REMOVE(r5, 0x4c81, r9) openat$cgroup(0xffffffffffffff9c, &(0x7f0000000380)='ryz0\x00', 0x200002, 0x0) sched_setaffinity(r2, 0x8, &(0x7f0000000200)=0x7) [ 335.928076] ? __lock_is_held+0xb6/0x140 [ 335.928094] ? check_same_owner+0x320/0x320 [ 335.928109] ? rcu_note_context_switch+0x710/0x710 [ 335.938377] binder: 31986:31988 unknown command 20 [ 335.944650] should_failslab+0xec/0x120 [ 335.944664] kmem_cache_alloc_trace+0x4b/0x740 [ 335.944675] ? __kmalloc_node+0x33/0x70 [ 335.944694] __memcg_init_list_lru_node+0x169/0x270 [ 335.944705] ? list_lru_add+0x7c0/0x7c0 [ 335.953221] binder: 31986:31988 ioctl c0306201 20000340 returned -22 [ 335.955538] ? __kmalloc_node+0x47/0x70 [ 335.955558] __list_lru_init+0x544/0x750 [ 335.955575] ? memcg_destroy_list_lru_node.isra.7+0x110/0x110 [ 335.955610] ? trace_hardirqs_on_caller+0x421/0x5c0 [ 335.955627] ? lockdep_init_map+0x9/0x10 [ 335.955638] sget_userns+0x6b1/0xe40 [ 335.962970] cgroup: cgroup2: unknown option "" [ 335.963646] ? kill_litter_super+0x90/0x90 [ 335.963660] ? ns_test_super+0x50/0x50 [ 335.963672] ? destroy_unused_super.part.6+0xd0/0xd0 [ 335.963682] ? do_raw_spin_trylock+0x190/0x190 [ 335.963698] ? kobject_put+0x6b/0x250 2018/03/31 09:15:43 executing program 2: r0 = syz_open_dev$sndseq(&(0x7f00000001c0)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r0, 0x4040534e, &(0x7f000019ffe9)={0xc1}) r1 = accept(0xffffffffffffffff, &(0x7f0000000080)=@can, &(0x7f0000000180)=0x80) ioctl$sock_ipx_SIOCAIPXPRISLT(r1, 0x89e1, &(0x7f0000000280)=0x3f) ioctl$sock_inet_SIOCRTMSG(r1, 0x890d, &(0x7f0000000200)={0x80, {0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x19}}, {0x2, 0x4e21, @local={0xac, 0x14, 0x14, 0xaa}}, {0x2, 0x4e23}, 0x0, 0x7, 0x1, 0x0, 0x9, 0x0, 0x0, 0x0, 0xfffffffffffffff7}) getsockopt$inet_sctp_SCTP_PRIMARY_ADDR(0xffffffffffffffff, 0x84, 0x6, &(0x7f0000000ac0)={0x0, @in={{0x2, 0x4e20, @loopback=0x7f000001}}}, &(0x7f00000002c0)=0x84) setsockopt$inet_sctp_SCTP_ENABLE_STREAM_RESET(r1, 0x84, 0x76, &(0x7f0000000300)={r2, 0x1c9}, 0x8) r3 = syz_open_dev$sg(&(0x7f0000000700)='/dev/sg#\x00', 0xfffffffffffffff7, 0x800) clone(0x2000c100, &(0x7f0000000800)="97bb77038add5df9e9d4f9783b82c55fe59e5c0acdbcfc9bcf92ac0e1f1f3c1959c1d25dfabf3849336c7c85be174d7765b47e113632aea54b87e4d3f2c1db09e6aa4040b43d17308fb7e62e808067da2fff3cfd8e4c038c814bbfc6bc49d8ebc8671d8297e2d34dc61f2d194d2dbb8f59b4c853e0714d3d4bb29d1243fac01c86c8c4dd38daedab3c6ad73a72d3f6dd2684aa82e5285eb82452c9848b7beb8bc513ba8c8973cad0bd5926604846b7f5d0397b", &(0x7f00000008c0), &(0x7f0000000900), &(0x7f0000000940)="ed6c04412e782fe395f084741e3d9fe469aebde09acc8f8d8d84d1f00f5573b09acba487077ebb904cb1f3fed55f59d677ce24bbd2a7506df8e1e0d0fc709cb8c9f4ab2aeeeebc5ef879742c1f7628f1862c88b5b0da89acbf43ef12e4839405b6a3430d296fea06d2f3a8356c57ec991e") ioctl$SNDRV_SEQ_IOCTL_SUBSCRIBE_PORT(r0, 0x40505330, &(0x7f0000ec6fb0)={{}, {0x80}}) getsockopt$netrom_NETROM_T1(r1, 0x103, 0x1, &(0x7f0000000000), &(0x7f0000000380)=0x4) syz_open_dev$adsp(&(0x7f0000000600)='/dev/adsp#\x00', 0x100000000, 0x80000) rt_sigprocmask(0x3d738072cd0f41ac, &(0x7f0000000cc0)={0x7}, &(0x7f0000000d00), 0x8) clone(0x40000000, &(0x7f0000000500)="67cdd9994c47c31d325b069924a7064c157c2ec0b5b5dca2feeb7dabef3b7af0d02d559e293faa759f2b3cb12aea360c2d", &(0x7f0000000580), &(0x7f00000005c0), &(0x7f0000000a00)="29859fdda9a119e54a27f9ec76b4d63a16dc5bbdd38c2fda0e5f4d8f830cd987ec7d3ffc66cf3db8820968fd89a1fba8fe6352a29a27f3b000bcdf238f2c04b358fc831025180e0be313da41de6366c94a1a0f86aaffdf2c039111b55275c054e14819a827fe809225249a01944263a2aec15f64e752e35892b1b8e7ef1e0e9115") ioctl$SNDRV_SEQ_IOCTL_DELETE_PORT(r0, 0x40a85321, &(0x7f0000000b80)={{0x4, 0x8}, 'port0\x00', 0x80, 0x0, 0x10000, 0x6, 0x2, 0x80, 0x8, 0x0, 0x0, 0x3dec00}) getsockopt$inet_sctp_SCTP_SOCKOPT_PEELOFF(r3, 0x84, 0x66, &(0x7f0000000c40)={r2, 0x6}, &(0x7f0000000c80)=0x8) clock_settime(0x7, &(0x7f0000000740)={0x77359400}) ioctl$SNDRV_SEQ_IOCTL_CLIENT_ID(r0, 0x80045301, &(0x7f0000000340)) r4 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer2\x00', 0x0, 0x0) openat$sequencer2(0xffffffffffffff9c, &(0x7f00000006c0)='/dev/sequencer2\x00', 0x222081, 0x0) ioctl$RNDADDENTROPY(0xffffffffffffffff, 0x40085203, &(0x7f0000000100)=ANY=[@ANYPTR=&(0x7f0000000680)=ANY=[@ANYPTR64=&(0x7f0000000640)=ANY=[@ANYPTR, @ANYPTR]]]) setsockopt$inet_sctp_SCTP_DEFAULT_SEND_PARAM(r4, 0x84, 0xa, &(0x7f0000000140)={0x5, 0x100000001, 0x0, 0x8, 0x0, 0x7, 0x401, 0x1f, r2}, 0x20) [ 335.963714] ? blkdev_get+0x3a1/0xb00 [ 335.963729] ? cap_capable+0x1b5/0x230 [ 335.963741] ? __blkdev_get+0x13b0/0x13b0 [ 335.985855] IPVS: ftp: loaded support on port[0] = 21 [ 335.986911] ? security_capable+0x8e/0xc0 [ 335.986924] ? kill_litter_super+0x90/0x90 [ 335.986936] ? ns_capable_common+0xcf/0x160 [ 335.986947] ? ns_test_super+0x50/0x50 [ 335.986955] ? kill_litter_super+0x90/0x90 [ 335.986963] sget+0xd2/0x120 [ 335.986977] mount_bdev+0x109/0x370 [ 335.986986] ? msdos_mount+0x40/0x40 [ 335.986999] msdos_mount+0x34/0x40 [ 335.998742] binder: 31986:31994 unknown command 26 [ 335.999131] mount_fs+0x66/0x2d0 [ 335.999149] vfs_kern_mount.part.26+0xc6/0x4a0 [ 335.999161] ? may_umount+0xa0/0xa0 [ 335.999173] ? _raw_read_unlock+0x22/0x30 [ 335.999182] ? __get_fs_type+0x8a/0xc0 [ 335.999197] do_mount+0xea4/0x2bb0 [ 336.003133] binder: 31986:31994 ioctl c0306201 20000340 returned -22 [ 336.006938] ? copy_mount_string+0x40/0x40 [ 336.006950] ? trace_hardirqs_on_caller+0x421/0x5c0 [ 336.006963] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 336.006981] ? retint_kernel+0x10/0x10 [ 336.006996] ? copy_mount_options+0x18b/0x2e0 [ 336.007007] ? copy_mount_options+0x193/0x2e0 [ 336.007016] ? copy_mount_options+0x1f7/0x2e0 [ 336.007028] SyS_mount+0xab/0x120 [ 336.007036] ? copy_mnt_ns+0xb30/0xb30 [ 336.007048] do_syscall_64+0x281/0x940 [ 336.114812] binder: 32000:32002 unknown command 20 [ 336.115154] ? vmalloc_sync_all+0x30/0x30 [ 336.115169] ? trace_event_raw_event_sys_exit+0x260/0x260 [ 336.115181] ? syscall_return_slowpath+0x550/0x550 2018/03/31 09:15:43 executing program 7 (fault-call:24 fault-nth:33): perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f000031f000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getpid() r0 = syz_open_dev$vcsn(&(0x7f0000000040)='/dev/vcs#\x00', 0x0, 0x20000) ioctl$GIO_CMAP(r0, 0x4b70, &(0x7f0000000080)) r1 = socket$alg(0x26, 0x5, 0x0) ioctl$sock_SIOCGIFBR(r1, 0x8940, &(0x7f0000000040)=@get={0x1, &(0x7f0000000400)=""/242, 0x100000000}) bind$alg(r1, &(0x7f0000000080)={0x26, 'aead\x00', 0x0, 0x0, 'generic-gcm-aesni\x00'}, 0x58) syz_open_dev$sndmidi(&(0x7f0000000100)='/dev/snd/midiC#D#\x00', 0xfd, 0x0) bind(0xffffffffffffffff, &(0x7f0000000140)=@llc={0x1a, 0x33a, 0x7, 0x80, 0x5, 0x4, @remote={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xbb}}, 0x80) r2 = syz_init_net_socket$nfc_llcp(0x27, 0x1, 0x1) setsockopt$nfc_llcp_NFC_LLCP_MIUX(r2, 0x118, 0x15, &(0x7f0000000000), 0x4) r3 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/cuse\x00', 0x103002, 0x0) futimesat(r3, &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)={{0x0, 0x7530}}) r4 = syz_open_dev$vcsa(&(0x7f00000001c0)='/dev/vcsa#\x00', 0x2, 0x4020ff) sendto$inet6(r4, &(0x7f0000000bc0)="36251e313e0743fc195a1a198a14434e8a0a00b3f452a3b5644e336ec712a16310c9aecc4e3097bc666a8882128a73c368ce731e9fbf3fe18fa52d00", 0x3c, 0x20000000, &(0x7f0000000c40)={0xa, 0x0, 0x6, @dev={0xfe, 0x80, [], 0x19}, 0x1f}, 0x1c) accept$alg(r0, 0x0, 0x0) sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f0000000000)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x8}, 0xb4fcd35419244434, &(0x7f00004ca000)={&(0x7f0000000300)=ANY=[], 0x1a1}, 0x1}, 0x0) syz_fuseblk_mount(&(0x7f0000001380)='./file0\x00', &(0x7f00000013c0)='./file0\x00', 0xf000, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0xb21, 0x0) socket(0x1e, 0x3, 0x0) socket(0x1e, 0x0, 0x0) ptrace$PTRACE_SECCOMP_GET_FILTER(0x420c, 0x0, 0x0, &(0x7f0000000380)=""/113) sched_yield() ioctl$TUNGETIFF(r4, 0x800454d2, &(0x7f0000000140)) ioctl$KIOCSOUND(r4, 0x4b2f, 0xfffffffffffffb74) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000447000)='./file0\x00', &(0x7f00000e1000)='msdos\x00', 0x0, &(0x7f000097bfff)) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000580)='./cgroup/syz0\x00', 0x1ff) syz_open_dev$audion(&(0x7f0000000280)='/dev/audio#\x00', 0x7be, 0x0) 2018/03/31 09:15:43 executing program 6: r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r0, &(0x7f0000ef8cfd)={0xa, 0x4e23, 0x0, @loopback={0x0, 0x1}}, 0x1c) listen(r0, 0x3) r1 = socket$inet6_sctp(0xa, 0x4000000000000001, 0x84) sendto$inet6(r1, &(0x7f0000000080)='X', 0x1, 0x0, &(0x7f000005ffe4)={0xa, 0x4e23, 0x0, @loopback={0x0, 0x1}}, 0x1c) r2 = accept(r0, 0x0, &(0x7f00000000c0)) getsockopt$inet_sctp_SCTP_SOCKOPT_PEELOFF(r2, 0x84, 0x66, &(0x7f0000000000)={0x0, 0x100}, &(0x7f0000000040)=0x8) setsockopt$inet_sctp6_SCTP_DEFAULT_SNDINFO(r1, 0x84, 0x22, &(0x7f0000000100)={0x6, 0x9, 0xd230, 0xffffffff, r3}, 0x10) fsync(r2) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f00009b2ff0)={0x1, &(0x7f0000a7dff8)=[{0x6, 0x0, 0x0, 0x400000000000003}]}, 0x10) ioctl$sock_SIOCETHTOOL(r1, 0x8946, &(0x7f00000001c0)={'ip6_vti0\x00', &(0x7f0000000140)=@ethtool_gfeatures={0x3a, 0x6, [{0x6, 0x4, 0x9, 0x1}, {0x8, 0x9, 0x5, 0x9}, {0x3, 0x1000, 0x4, 0x7f}, {0x201ca684, 0x3, 0x9, 0x7}, {0x2, 0x101, 0x1f, 0x9}, {0x1f, 0xffff, 0x5}]}}) setsockopt$inet_sctp_SCTP_STREAM_SCHEDULER_VALUE(r2, 0x84, 0x7c, &(0x7f0000000280)={r3, 0xbf8, 0x7}, 0x8) sendmsg$kcm(r2, &(0x7f0000001480)={0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000200)='R', 0x1}], 0x1, &(0x7f0000000280)}, 0x8091) shutdown(r1, 0x2000000002) [ 336.115191] ? syscall_return_slowpath+0x2ac/0x550 [ 336.115208] ? entry_SYSCALL_64_after_hwframe+0x52/0xb7 [ 336.115222] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 336.115238] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 336.115246] RIP: 0033:0x454e79 [ 336.115251] RSP: 002b:00007f37fba8ec68 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 336.125615] cgroup: cgroup2: unknown option "" [ 336.127029] RAX: ffffffffffffffda RBX: 00007f37fba8f6d4 RCX: 0000000000454e79 [ 336.127035] RDX: 00000000200e1000 RSI: 0000000020447000 RDI: 0000000020000000 [ 336.127041] RBP: 000000000072bea0 R08: 000000002097bfff R09: 0000000000000000 [ 336.127046] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000019 [ 336.127051] R13: 00000000000003fa R14: 00000000006f8010 R15: 0000000000000020 [ 336.152345] FAT-fs (loop199): unable to read boot sector [ 336.156816] binder: 32000:32002 ioctl c0306201 20000340 returned -22 [ 336.185716] IPVS: ftp: loaded support on port[0] = 21 [ 336.221047] binder: 32000:32006 unknown command 26 [ 336.299653] FAULT_INJECTION: forcing a failure. 2018/03/31 09:15:43 executing program 3: r0 = syz_open_dev$random(&(0x7f00000001c0)='/dev/random\x00', 0x0, 0x800) r1 = syz_open_dev$loop(&(0x7f0000308000)='/dev/loop#\x00', 0x0, 0x0) ioctl$LOOP_SET_STATUS(r1, 0xc0481273, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "3900ea631d00000000020000010000009f00000023f7b7d65f90b0e6330ee739b319d8f6aa6bd58d1443474482e85040fb4947ebb55bd19f335b5bffff0001f3", "cfa430745a540dc1c149b7b81579f6a41c51f7d51933223e82ab867dac761faf"}) write(0xffffffffffffffff, &(0x7f00000001c0), 0x0) setsockopt$inet_sctp6_SCTP_RECVNXTINFO(0xffffffffffffffff, 0x84, 0x21, &(0x7f00000003c0)=0x200, 0x4) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f00000000c0)=0x0) getsockopt$netrom_NETROM_T4(0xffffffffffffffff, 0x103, 0x6, &(0x7f0000000300)=0x8, &(0x7f0000000340)=0x4) r3 = getpid() sched_setparam(r3, &(0x7f0000000400)) syz_open_dev$loop(&(0x7f0000ca9ff5)='/dev/loop#\x00', 0x0, 0x85) r4 = memfd_create(&(0x7f0000614000)="74086e750000000000000000008c00", 0x0) pwritev(r4, &(0x7f0000f50f90)=[{&(0x7f0000000040)="aa", 0x1}], 0x1, 0x0) fcntl$getownex(r1, 0x10, &(0x7f0000000240)={0x0, 0x0}) r6 = syz_open_procfs(r5, &(0x7f0000000280)='stat\x00') epoll_ctl$EPOLL_CTL_MOD(r4, 0x3, r0, &(0x7f00000002c0)={0x20000010}) accept4$inet6(r4, &(0x7f0000000100)={0x0, 0x0, 0x0, @mcast1}, &(0x7f0000000140)=0x1c, 0x7fd) getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f00000007c0)={0x0, 0x0, 0x0}, &(0x7f0000000540)=0xc) fchown(r4, 0x0, r7) r8 = syz_open_dev$binder(&(0x7f0000000580)='/dev/binder#\x00', 0xffffffffffffffff, 0x809) ioctl$BINDER_SET_CONTEXT_MGR(r6, 0x40046207, 0x0) mmap$binder(&(0x7f000000c000/0x2000)=nil, 0x2000, 0x0, 0x12, r8, 0x0) ioctl$BINDER_WRITE_READ(r8, 0xc0306201, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000), 0x0, 0x0, &(0x7f0000011f9d)}) getsockopt$inet_sctp6_SCTP_AUTO_ASCONF(0xffffffffffffffff, 0x84, 0x1e, &(0x7f0000000140), &(0x7f0000000180)=0x4) ioctl$BINDER_WRITE_READ(r8, 0xc0306201, &(0x7f0000000340)={0x8, 0x0, &(0x7f0000000440)=ANY=[@ANYRES64=r1], 0x0, 0x0, &(0x7f0000000240)}) sendfile(r8, r1, &(0x7f0000000380), 0x7) write(0xffffffffffffffff, &(0x7f0000000300)="8be25f5790f664f32509e40d6f879d5add7e2d359c9a19afb750a2d25352875d187d4118c99a2d5c6db433c277cc7d345b87a34f1b417033d367cb0cfd6a25633f77aafb17e99c33cb65352c901ae75176f07bb0a4bb5ebff3d87e", 0x5b) r9 = ioctl$LOOP_CTL_GET_FREE(r4, 0x4c82) ioctl$LOOP_CTL_REMOVE(r6, 0x4c81, r9) openat$cgroup(0xffffffffffffff9c, &(0x7f0000000000)='syz0\x00', 0x200002, 0x0) sched_setaffinity(r2, 0x8, &(0x7f0000000200)=0x7) [ 336.299653] name failslab, interval 1, probability 0, space 0, times 0 [ 336.305251] binder: 32000:32006 ioctl c0306201 20000340 returned -22 [ 336.307930] CPU: 1 PID: 32009 Comm: syz-executor7 Not tainted 4.16.0-rc7+ #8 [ 336.383737] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 336.383742] Call Trace: [ 336.383759] dump_stack+0x194/0x24d [ 336.383773] ? arch_local_irq_restore+0x53/0x53 [ 336.403965] ? __save_stack_trace+0x7e/0xd0 [ 336.403983] should_fail+0x8c0/0xa40 [ 336.412011] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 336.412025] ? kasan_kmalloc+0xad/0xe0 [ 336.412033] ? kmem_cache_alloc_trace+0x136/0x740 [ 336.412043] ? __memcg_init_list_lru_node+0x169/0x270 [ 336.412050] ? __list_lru_init+0x544/0x750 [ 336.412059] ? sget_userns+0x6b1/0xe40 [ 336.412068] ? mount_fs+0x66/0x2d0 [ 336.412079] ? vfs_kern_mount.part.26+0xc6/0x4a0 [ 336.412086] ? do_mount+0xea4/0x2bb0 [ 336.412096] ? do_syscall_64+0x281/0x940 [ 336.412108] ? entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 336.412123] ? find_held_lock+0x35/0x1d0 [ 336.412137] ? __lock_is_held+0xb6/0x140 [ 336.412157] ? check_same_owner+0x320/0x320 [ 336.412170] ? rcu_note_context_switch+0x710/0x710 [ 336.412184] should_failslab+0xec/0x120 [ 336.412195] kmem_cache_alloc_trace+0x4b/0x740 [ 336.430564] binder: 32014:32015 unknown command 20 [ 336.431159] ? __kmalloc_node+0x33/0x70 [ 336.431168] ? __kmalloc_node+0x33/0x70 [ 336.431179] ? rcu_read_lock_sched_held+0x108/0x120 [ 336.431193] __memcg_init_list_lru_node+0x169/0x270 [ 336.431204] ? list_lru_add+0x7c0/0x7c0 [ 336.513049] ? __kmalloc_node+0x47/0x70 [ 336.517011] __list_lru_init+0x544/0x750 [ 336.521056] ? memcg_destroy_list_lru_node.isra.7+0x110/0x110 [ 336.526920] ? trace_hardirqs_on_caller+0x421/0x5c0 [ 336.531915] ? lockdep_init_map+0x9/0x10 [ 336.535955] sget_userns+0x6b1/0xe40 [ 336.539646] ? kill_litter_super+0x90/0x90 [ 336.543858] ? ns_test_super+0x50/0x50 [ 336.547723] ? destroy_unused_super.part.6+0xd0/0xd0 [ 336.552803] ? do_raw_spin_trylock+0x190/0x190 [ 336.557366] ? kobject_put+0x6b/0x250 [ 336.561145] ? blkdev_get+0x3a1/0xb00 [ 336.564927] ? cap_capable+0x1b5/0x230 [ 336.568790] ? __blkdev_get+0x13b0/0x13b0 [ 336.572915] ? security_capable+0x8e/0xc0 [ 336.577040] ? kill_litter_super+0x90/0x90 [ 336.581254] ? ns_capable_common+0xcf/0x160 [ 336.585555] ? ns_test_super+0x50/0x50 [ 336.589418] ? kill_litter_super+0x90/0x90 [ 336.593629] sget+0xd2/0x120 [ 336.596628] mount_bdev+0x109/0x370 [ 336.600229] ? msdos_mount+0x40/0x40 [ 336.603921] msdos_mount+0x34/0x40 [ 336.607438] mount_fs+0x66/0x2d0 [ 336.610786] vfs_kern_mount.part.26+0xc6/0x4a0 [ 336.615346] ? may_umount+0xa0/0xa0 [ 336.618951] ? _raw_read_unlock+0x22/0x30 [ 336.623077] ? __get_fs_type+0x8a/0xc0 [ 336.626943] do_mount+0xea4/0x2bb0 [ 336.630465] ? copy_mount_string+0x40/0x40 [ 336.634678] ? trace_hardirqs_on_caller+0x421/0x5c0 [ 336.639672] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 336.644410] ? retint_kernel+0x10/0x10 [ 336.648277] ? copy_mount_options+0x18b/0x2e0 [ 336.652749] ? copy_mount_options+0x193/0x2e0 [ 336.657223] ? copy_mount_options+0x1f7/0x2e0 [ 336.661697] SyS_mount+0xab/0x120 [ 336.665126] ? copy_mnt_ns+0xb30/0xb30 [ 336.668992] do_syscall_64+0x281/0x940 [ 336.672862] ? vmalloc_sync_all+0x30/0x30 [ 336.676986] ? _raw_spin_unlock_irq+0x27/0x70 [ 336.681460] ? finish_task_switch+0x1c1/0x7e0 [ 336.685931] ? syscall_return_slowpath+0x550/0x550 [ 336.690837] ? syscall_return_slowpath+0x2ac/0x550 [ 336.695742] ? prepare_exit_to_usermode+0x350/0x350 [ 336.700736] ? entry_SYSCALL_64_after_hwframe+0x52/0xb7 [ 336.706078] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 336.710902] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 336.716066] RIP: 0033:0x454e79 [ 336.719233] RSP: 002b:00007f37fba8ec68 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 336.726917] RAX: ffffffffffffffda RBX: 00007f37fba8f6d4 RCX: 0000000000454e79 [ 336.734161] RDX: 00000000200e1000 RSI: 0000000020447000 RDI: 0000000020000000 [ 336.741406] RBP: 000000000072bea0 R08: 000000002097bfff R09: 0000000000000000 [ 336.748650] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000019 [ 336.755894] R13: 00000000000003fa R14: 00000000006f8010 R15: 0000000000000021 [ 336.764769] binder: 32014:32015 ioctl c0306201 20000340 returned -22 [ 336.786403] FAT-fs (loop199): unable to read boot sector [ 336.808081] FAT-fs (loop199): unable to read boot sector [ 336.814800] binder: 32014:32015 unknown command 26 [ 336.823216] FAT-fs (loop199): unable to read boot sector [ 336.829302] binder: 32014:32015 ioctl c0306201 20000340 returned -22 [ 336.847859] FAT-fs (loop199): unable to read boot sector [ 336.875632] FAT-fs (loop199): unable to read boot sector 2018/03/31 09:15:44 executing program 6: r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r0, &(0x7f0000ef8cfd)={0xa, 0x4e23, 0x0, @loopback={0x0, 0x1}}, 0x1c) listen(r0, 0x3) r1 = socket$inet6_sctp(0xa, 0x4000000000000001, 0x84) sendto$inet6(r1, &(0x7f0000000080)='X', 0x1, 0x0, &(0x7f000005ffe4)={0xa, 0x4e23, 0x0, @loopback={0x0, 0x1}}, 0x1c) r2 = accept(r0, 0x0, &(0x7f00000000c0)) getsockopt$inet_sctp_SCTP_SOCKOPT_PEELOFF(r2, 0x84, 0x66, &(0x7f0000000000)={0x0, 0x100}, &(0x7f0000000040)=0x8) setsockopt$inet_sctp6_SCTP_DEFAULT_SNDINFO(r1, 0x84, 0x22, &(0x7f0000000100)={0x6, 0x9, 0xd230, 0xffffffff, r3}, 0x10) fsync(r2) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f00009b2ff0)={0x1, &(0x7f0000a7dff8)=[{0x6, 0x0, 0x0, 0x400000000000003}]}, 0x10) ioctl$sock_SIOCETHTOOL(r1, 0x8946, &(0x7f00000001c0)={'ip6_vti0\x00', &(0x7f0000000140)=@ethtool_gfeatures={0x3a, 0x6, [{0x6, 0x4, 0x9, 0x1}, {0x8, 0x9, 0x5, 0x9}, {0x3, 0x1000, 0x4, 0x7f}, {0x201ca684, 0x3, 0x9, 0x7}, {0x2, 0x101, 0x1f, 0x9}, {0x1f, 0xffff, 0x5}]}}) setsockopt$inet_sctp_SCTP_STREAM_SCHEDULER_VALUE(r2, 0x84, 0x7c, &(0x7f0000000280)={r3, 0xbf8, 0x7}, 0x8) sendmsg$kcm(r2, &(0x7f0000001480)={0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000200)='R', 0x1}], 0x1, &(0x7f0000000280)}, 0x8091) 2018/03/31 09:15:44 executing program 0: perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f000031f000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) prctl$void(0x0) r0 = syz_open_dev$vcsn(&(0x7f0000000040)='/dev/vcs#\x00', 0x0, 0x20000) socket$alg(0x26, 0x5, 0x0) ioctl$sock_SIOCGIFBR(0xffffffffffffffff, 0x8940, &(0x7f0000000040)=@get={0x1, &(0x7f0000000400)=""/242, 0x100000000}) bind$alg(0xffffffffffffffff, &(0x7f0000000080)={0x26, 'aead\x00', 0x0, 0x0, 'generic-gcm-aesni\x00'}, 0x58) syz_open_dev$sndmidi(&(0x7f0000000100)='/dev/snd/midiC#D#\x00', 0xfd, 0x0) bind(0xffffffffffffffff, &(0x7f00000002c0)=@pppol2tpin6={0x18, 0x1, {0x0, r0, 0x1, 0x3, 0x3, 0x1, {0xa, 0x4e23, 0x9, @dev={0xfe, 0x80, [], 0x12}, 0x2}}}, 0x80) r1 = syz_init_net_socket$nfc_llcp(0x27, 0x1, 0x1) setsockopt$nfc_llcp_NFC_LLCP_MIUX(r1, 0x118, 0x15, &(0x7f0000000000), 0x4) r2 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/cuse\x00', 0x103002, 0x0) futimesat(r2, &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)={{0x0, 0x7530}}) r3 = syz_open_dev$vcsa(&(0x7f00000001c0)='/dev/vcsa#\x00', 0x2, 0x0) sendto$inet6(r3, &(0x7f0000000bc0)="36251e313e0743fc195a1a198a14434e8a0a00b3f452a3b5644e336ec712a16310c9aecc4e3097bc666a8882128a73c368ce731e9fbf3fe18fa52d00c34ac2e57c1c4569cfbd6a621c6dfbc032121aed", 0x50, 0x20000000, &(0x7f0000000c40)={0xa, 0x4e20, 0x6, @dev={0xfe, 0x80, [], 0x19}, 0x1f}, 0x1c) accept$alg(r0, 0x0, 0x0) sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f0000000000)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x8}, 0xb4fcd35419244434, &(0x7f00004ca000)={&(0x7f0000000300)=ANY=[], 0x1a1}, 0x1}, 0x0) ioctl$sock_inet_sctp_SIOCINQ(r0, 0x541b, &(0x7f0000000200)) syz_fuseblk_mount(&(0x7f0000001380)='./file0\x00', &(0x7f00000013c0)='./file0\x00', 0xf000, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0xb21, 0x0) socket(0x1e, 0x3, 0x0) socket(0x1e, 0x0, 0x0) ptrace$PTRACE_SECCOMP_GET_FILTER(0x420c, 0x0, 0x0, &(0x7f0000000380)=""/113) sched_yield() ioctl$TUNGETIFF(r3, 0x800454d2, &(0x7f0000000140)) ioctl$KIOCSOUND(r3, 0x4b2f, 0xfffffffffffffb74) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x20, 0x9b}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000447000)='./file0\x00', &(0x7f00000e1000)='msdos\x00', 0x0, &(0x7f000097bfff)) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000580)='./cgroup/syz0\x00', 0x1ff) 2018/03/31 09:15:44 executing program 7 (fault-call:24 fault-nth:34): perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f000031f000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getpid() r0 = syz_open_dev$vcsn(&(0x7f0000000040)='/dev/vcs#\x00', 0x0, 0x20000) ioctl$GIO_CMAP(r0, 0x4b70, &(0x7f0000000080)) r1 = socket$alg(0x26, 0x5, 0x0) ioctl$sock_SIOCGIFBR(r1, 0x8940, &(0x7f0000000040)=@get={0x1, &(0x7f0000000400)=""/242, 0x100000000}) bind$alg(r1, &(0x7f0000000080)={0x26, 'aead\x00', 0x0, 0x0, 'generic-gcm-aesni\x00'}, 0x58) syz_open_dev$sndmidi(&(0x7f0000000100)='/dev/snd/midiC#D#\x00', 0xfd, 0x0) bind(0xffffffffffffffff, &(0x7f0000000140)=@llc={0x1a, 0x33a, 0x7, 0x80, 0x5, 0x4, @remote={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xbb}}, 0x80) r2 = syz_init_net_socket$nfc_llcp(0x27, 0x1, 0x1) setsockopt$nfc_llcp_NFC_LLCP_MIUX(r2, 0x118, 0x15, &(0x7f0000000000), 0x4) r3 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/cuse\x00', 0x103002, 0x0) futimesat(r3, &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)={{0x0, 0x7530}}) r4 = syz_open_dev$vcsa(&(0x7f00000001c0)='/dev/vcsa#\x00', 0x2, 0x4020ff) sendto$inet6(r4, &(0x7f0000000bc0)="36251e313e0743fc195a1a198a14434e8a0a00b3f452a3b5644e336ec712a16310c9aecc4e3097bc666a8882128a73c368ce731e9fbf3fe18fa52d00", 0x3c, 0x20000000, &(0x7f0000000c40)={0xa, 0x0, 0x6, @dev={0xfe, 0x80, [], 0x19}, 0x1f}, 0x1c) accept$alg(r0, 0x0, 0x0) sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f0000000000)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x8}, 0xb4fcd35419244434, &(0x7f00004ca000)={&(0x7f0000000300)=ANY=[], 0x1a1}, 0x1}, 0x0) syz_fuseblk_mount(&(0x7f0000001380)='./file0\x00', &(0x7f00000013c0)='./file0\x00', 0xf000, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0xb21, 0x0) socket(0x1e, 0x3, 0x0) socket(0x1e, 0x0, 0x0) ptrace$PTRACE_SECCOMP_GET_FILTER(0x420c, 0x0, 0x0, &(0x7f0000000380)=""/113) sched_yield() ioctl$TUNGETIFF(r4, 0x800454d2, &(0x7f0000000140)) ioctl$KIOCSOUND(r4, 0x4b2f, 0xfffffffffffffb74) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000447000)='./file0\x00', &(0x7f00000e1000)='msdos\x00', 0x0, &(0x7f000097bfff)) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000580)='./cgroup/syz0\x00', 0x1ff) syz_open_dev$audion(&(0x7f0000000280)='/dev/audio#\x00', 0x7be, 0x0) 2018/03/31 09:15:44 executing program 5: perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f000031f000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) prctl$void(0x0) r0 = getpid() r1 = syz_open_dev$vcsn(&(0x7f0000000040)='/dev/vcs#\x00', 0x0, 0x20000) ioctl$GIO_CMAP(r1, 0x4b70, &(0x7f0000000080)) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000080)={0x26, 'aead\x00', 0x0, 0x0, 'generic-gcm-aesni\x00'}, 0x58) r3 = syz_open_dev$sndmidi(&(0x7f0000000100)='/dev/snd/midiC#D#\x00', 0xfd, 0x0) bind(0xffffffffffffffff, &(0x7f0000000140)=@llc={0x1a, 0x33a, 0x7, 0x80, 0x5, 0x4, @remote={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xbb}}, 0x80) r4 = syz_init_net_socket$nfc_llcp(0x27, 0x1, 0x1) setsockopt$nfc_llcp_NFC_LLCP_MIUX(r4, 0x118, 0x15, &(0x7f0000000000), 0x4) r5 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/cuse\x00', 0x103002, 0x0) futimesat(r5, &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)={{0x0, 0x7530}}) r6 = syz_open_dev$vcsa(&(0x7f00000001c0)='/dev/vcsa#\x00', 0x2, 0x4020ff) sendto$inet6(0xffffffffffffffff, &(0x7f0000000bc0)="36251e313e0743fc195a1a198a14434e8a0a00b3f452a3b5644e336ec712a16310c9aecc4e3097bc666a8882128a73c368ce731e9fbf3fe18fa52d", 0x3b, 0x20000000, &(0x7f0000000c40)={0xa, 0x4e20, 0x6, @dev={0xfe, 0x80, [], 0x19}, 0x1f}, 0x1c) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000000200)={0x0, 0x0}, &(0x7f0000000240)=0xc) fstat(r3, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) setsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000340)={r0, r7, r8}, 0xc) accept$alg(r1, 0x0, 0x0) sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f0000000000)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x8}, 0xb4fcd35419244434, &(0x7f00004ca000)={&(0x7f0000000300)=ANY=[], 0x1a1}, 0x1}, 0x0) syz_fuseblk_mount(&(0x7f0000001380)='./file0\x00', &(0x7f00000013c0)='./file0\x00', 0xf000, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0xb21, 0x0) socket(0x1e, 0x3, 0x0) socket(0x1a, 0x2, 0x0) ptrace$PTRACE_SECCOMP_GET_FILTER(0x420c, 0x0, 0x0, &(0x7f0000000380)=""/113) sched_yield() ioctl$TUNGETIFF(r6, 0x800454d2, &(0x7f0000000140)) ioctl$KIOCSOUND(r6, 0x4b2f, 0xfffffffffffffb74) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x20, 0x9b}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000447000)='./file0\x00', &(0x7f00000e1000)='msdos\x00', 0x0, &(0x7f000097bfff)) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000580)='./cgroup/syz0\x00', 0x1ff) syz_open_dev$audion(&(0x7f0000000280)='/dev/audio#\x00', 0x7be, 0x0) 2018/03/31 09:15:44 executing program 1: perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f000031f000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) prctl$void(0x20000003f) getpid() r0 = syz_open_dev$vcsn(&(0x7f0000000040)='/dev/vcs#\x00', 0x400, 0x20000) r1 = socket$alg(0x26, 0x5, 0x0) ioctl$sock_SIOCGIFBR(r1, 0x8940, &(0x7f0000000040)=@get={0x1, &(0x7f0000000400)=""/242, 0x100000000}) bind$alg(r1, &(0x7f0000000080)={0x26, 'aead\x00', 0x0, 0x0, 'generic-gcm-aesni\x00'}, 0x58) r2 = syz_open_dev$sndmidi(&(0x7f0000000100)='/dev/snd/midiC#D#\x00', 0xfd, 0x0) bind(r2, &(0x7f0000000140)=@llc={0x1a, 0x33a, 0x7, 0x80, 0x0, 0x4, @remote={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xbb}}, 0x80) r3 = syz_init_net_socket$nfc_llcp(0x27, 0x1, 0x1) setsockopt$nfc_llcp_NFC_LLCP_MIUX(r3, 0x118, 0x15, &(0x7f0000000000), 0x4) r4 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/cuse\x00', 0x103002, 0x0) futimesat(r4, &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)={{0x0, 0x7530}}) r5 = syz_open_dev$vcsa(&(0x7f00000001c0)='/dev/vcsa#\x00', 0x2, 0x4020ff) sendto$inet6(r5, &(0x7f0000000bc0), 0x0, 0x20000000, &(0x7f0000000c40)={0xa, 0x4e20, 0x6, @dev={0xfe, 0x80, [], 0x19}, 0x1f}, 0x1c) sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f0000000000)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x8}, 0xb4fcd35419244434, &(0x7f00004ca000)={&(0x7f0000000300)=ANY=[], 0x1a1}, 0x1}, 0x0) syz_fuseblk_mount(&(0x7f0000001380)='./file0\x00', &(0x7f00000013c0)='./file0\x00', 0xf000, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0xb21, 0x0) socket(0x1e, 0x3, 0x0) ptrace$PTRACE_SECCOMP_GET_FILTER(0x420c, 0x0, 0x0, &(0x7f0000000380)=""/113) ioctl$DRM_IOCTL_RES_CTX(r0, 0xc0106426, &(0x7f0000000240)={0x7, &(0x7f0000000200)=[{}, {}, {0x0}, {}, {}, {}, {}]}) ioctl$DRM_IOCTL_RM_CTX(r0, 0xc0086421, &(0x7f00000002c0)={r6, 0x1}) sched_yield() ioctl$TUNGETIFF(r5, 0x800454d2, &(0x7f0000000140)) ioctl$KIOCSOUND(r5, 0x4b2f, 0xfffffffffffffb74) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x20, 0x9b}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000447000)='./file0\x00', &(0x7f00000e1000)='msdos\x00', 0x0, &(0x7f000097bfff)) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000580)='./cgroup/syz0\x00', 0x1ff) syz_open_dev$audion(&(0x7f0000000280)='/dev/audio#\x00', 0x7be, 0x0) fcntl$getown(0xffffffffffffffff, 0x9) 2018/03/31 09:15:44 executing program 4: perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f000031f000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) prctl$void(0x0) getpid() r0 = syz_open_dev$vcsn(&(0x7f0000000040)='/dev/vcs#\x00', 0x0, 0x20000) ioctl$GIO_CMAP(r0, 0x4b70, &(0x7f0000000280)) r1 = socket$alg(0x26, 0x5, 0x0) ioctl$sock_SIOCGIFBR(0xffffffffffffffff, 0x8940, &(0x7f0000000040)=@get={0x1, &(0x7f0000000400)=""/242, 0x100000000}) bind$alg(r1, &(0x7f0000000080)={0x26, 'aead\x00', 0x0, 0x0, 'generic-gcm-aesni\x00'}, 0x58) syz_open_dev$sndmidi(&(0x7f0000000100)='/dev/snd/midiC#D#\x00', 0xfd, 0x0) bind(0xffffffffffffffff, &(0x7f0000000140)=@llc={0x1a, 0x33a, 0x7, 0x80, 0x0, 0x4, @remote={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xbb}}, 0x80) r2 = syz_init_net_socket$nfc_llcp(0x27, 0x1, 0x1) setsockopt$nfc_llcp_NFC_LLCP_MIUX(r2, 0x118, 0x15, &(0x7f0000000000), 0x4) r3 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/cuse\x00', 0x103002, 0x0) futimesat(r3, &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)={{0x0, 0x7530}}) r4 = syz_open_dev$vcsa(&(0x7f00000001c0)='/dev/vcsa#\x00', 0x2, 0x0) sendto$inet6(r4, &(0x7f0000000bc0), 0x0, 0x20000000, &(0x7f0000000c40)={0xa, 0x4e20, 0x0, @dev={0xfe, 0x80, [], 0x19}, 0x1f}, 0x1c) accept$alg(r0, 0x0, 0x0) sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f0000000000)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x8}, 0xb4fcd35419244434, &(0x7f00004ca000)={&(0x7f0000000300)=ANY=[], 0x1a1}, 0x1}, 0x0) syz_fuseblk_mount(&(0x7f0000001380)='./file0\x00', &(0x7f00000013c0)='./file0\x00', 0xf000, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0xb21, 0x0) socket(0x1e, 0x3, 0x0) socket(0x1e, 0x0, 0x0) ptrace$PTRACE_SECCOMP_GET_FILTER(0x420c, 0x0, 0x0, &(0x7f0000000380)=""/113) sched_yield() ioctl$TUNGETIFF(r4, 0x800454d2, &(0x7f0000000140)) ioctl$KIOCSOUND(r4, 0x4b2f, 0xfffffffffffffb74) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x20, 0x9b}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000447000)='./file0\x00', &(0x7f00000e1000)='msdos\x00', 0x0, &(0x7f000097bfff)) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000580)='./cgroup/syz0\x00', 0x1ff) 2018/03/31 09:15:44 executing program 3: r0 = syz_open_dev$random(&(0x7f00000001c0)='/dev/random\x00', 0x0, 0x800) r1 = syz_open_dev$loop(&(0x7f0000308000)='/dev/loop#\x00', 0x0, 0x0) ioctl$LOOP_SET_STATUS(r1, 0xc0481273, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "3900ea631d00000000020000010000009f00000023f7b7d65f90b0e6330ee739b319d8f6aa6bd58d1443474482e85040fb4947ebb55bd19f335b5bffff0001f3", "cfa430745a540dc1c149b7b81579f6a41c51f7d51933223e82ab867dac761faf"}) write(r0, &(0x7f0000000480), 0x0) setsockopt$inet_sctp6_SCTP_RECVNXTINFO(0xffffffffffffffff, 0x84, 0x21, &(0x7f00000003c0)=0x200, 0x4) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f00000000c0)=0x0) getsockopt$netrom_NETROM_T4(0xffffffffffffffff, 0x103, 0x6, &(0x7f0000000300)=0x8, &(0x7f0000000340)=0x4) r3 = getpid() sched_setparam(r3, &(0x7f0000000400)) syz_open_dev$loop(&(0x7f0000ca9ff5)='/dev/loop#\x00', 0x0, 0x82) r4 = memfd_create(&(0x7f0000614000)="74086e750000000000000000008c00", 0x0) pwritev(r4, &(0x7f0000f50f90)=[{&(0x7f0000000040)="aa", 0x1}], 0x1, 0x0) fcntl$getownex(r1, 0x10, &(0x7f0000000240)) epoll_ctl$EPOLL_CTL_MOD(r4, 0x3, r0, &(0x7f00000002c0)={0x20000010}) accept4$inet6(r4, &(0x7f0000000100)={0x0, 0x0, 0x0, @mcast1}, &(0x7f0000000140)=0x1c, 0x7fd) getsockopt$inet_IP_IPSEC_POLICY(r4, 0x0, 0x10, &(0x7f0000000940)={{{@in6=@local, @in6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@loopback}, 0x0, @in=@local}}, &(0x7f0000000780)=0xe8) getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f00000007c0)={0x0, 0x0, 0x0}, &(0x7f0000000540)=0xc) fchown(r4, r5, r6) r7 = syz_open_dev$binder(&(0x7f0000000100)='/dev/binder#\x00', 0xffffffffffffffff, 0x806) ioctl$BINDER_SET_CONTEXT_MGR(0xffffffffffffffff, 0x40046207, 0x0) mmap$binder(&(0x7f000000c000/0x2000)=nil, 0x2000, 0x0, 0x12, r7, 0x0) ioctl$BINDER_WRITE_READ(r7, 0xc0306201, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000), 0x0, 0x0, &(0x7f0000011f9d)}) getsockopt$inet_sctp6_SCTP_AUTO_ASCONF(0xffffffffffffffff, 0x84, 0x1e, &(0x7f0000000140), &(0x7f0000000180)=0x4) ioctl$BINDER_WRITE_READ(r7, 0xc0306201, &(0x7f0000000340)={0x8, 0x0, &(0x7f0000000440)=ANY=[@ANYRES64=r1], 0x0, 0x0, &(0x7f0000000240)}) write(0xffffffffffffffff, &(0x7f0000000300)="8be25f5790f664f32509e40d6f879d5add7e2d359c9a19afb750a2d25352875d187d4118c99a2d5c6db433c277cc7d345b87a34f1b417033d367cb0cfd6a25633f77aafb17e99c33cb65352c901ae75176f07bb0a4bb5ebff3d87e", 0x5b) r8 = ioctl$LOOP_CTL_GET_FREE(r4, 0x4c82) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, r8) openat$cgroup(0xffffffffffffff9c, &(0x7f0000000000)='syz0\x00', 0x200002, 0x0) sched_setaffinity(r2, 0x8, &(0x7f0000000200)=0x7) 2018/03/31 09:15:44 executing program 2: r0 = syz_open_dev$sndseq(&(0x7f00000001c0)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r0, 0x4040534e, &(0x7f000019ffe9)={0xc1}) r1 = accept(0xffffffffffffffff, &(0x7f0000000080)=@can, &(0x7f0000000180)=0x80) ioctl$sock_ipx_SIOCAIPXPRISLT(r1, 0x89e1, &(0x7f0000000280)=0x3f) ioctl$sock_inet_SIOCRTMSG(r1, 0x890d, &(0x7f0000000200)={0x80, {0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x19}}, {0x2, 0x4e21, @local={0xac, 0x14, 0x14, 0xaa}}, {0x2, 0x4e23}, 0x0, 0x7, 0x1, 0x0, 0x9, 0x0, 0x0, 0x0, 0xfffffffffffffff7}) getsockopt$inet_sctp_SCTP_PRIMARY_ADDR(0xffffffffffffffff, 0x84, 0x6, &(0x7f0000000ac0)={0x0, @in={{0x2, 0x4e20, @loopback=0x7f000001}}}, &(0x7f00000002c0)=0x84) setsockopt$inet_sctp_SCTP_ENABLE_STREAM_RESET(r1, 0x84, 0x76, &(0x7f0000000300)={r2, 0x1c9}, 0x8) r3 = syz_open_dev$sg(&(0x7f0000000700)='/dev/sg#\x00', 0xfffffffffffffff7, 0x800) clone(0x2000c100, &(0x7f0000000800)="97bb77038add5df9e9d4f9783b82c55fe59e5c0acdbcfc9bcf92ac0e1f1f3c1959c1d25dfabf3849336c7c85be174d7765b47e113632aea54b87e4d3f2c1db09e6aa4040b43d17308fb7e62e808067da2fff3cfd8e4c038c814bbfc6bc49d8ebc8671d8297e2d34dc61f2d194d2dbb8f59b4c853e0714d3d4bb29d1243fac01c86c8c4dd38daedab3c6ad73a72d3f6dd2684aa82e5285eb82452c9848b7beb8bc513ba8c8973cad0bd5926604846b7f5d0397b", &(0x7f00000008c0), &(0x7f0000000900), &(0x7f0000000940)="ed6c04412e782fe395f084741e3d9fe469aebde09acc8f8d8d84d1f00f5573b09acba487077ebb904cb1f3fed55f59d677ce24bbd2a7506df8e1e0d0fc709cb8c9f4ab2aeeeebc5ef879742c1f7628f1862c88b5b0da89acbf43ef12e4839405b6a3430d296fea06d2f3a8356c57ec991e") ioctl$SNDRV_SEQ_IOCTL_SUBSCRIBE_PORT(r0, 0x40505330, &(0x7f0000ec6fb0)={{}, {0x80}}) getsockopt$netrom_NETROM_T1(r1, 0x103, 0x1, &(0x7f0000000000), &(0x7f0000000380)=0x4) syz_open_dev$adsp(&(0x7f0000000600)='/dev/adsp#\x00', 0x100000000, 0x80000) rt_sigprocmask(0x3d738072cd0f41ac, &(0x7f0000000cc0)={0x7}, &(0x7f0000000d00), 0x8) clone(0x40000000, &(0x7f0000000500)="67cdd9994c47c31d325b069924a7064c157c2ec0b5b5dca2feeb7dabef3b7af0d02d559e293faa759f2b3cb12aea360c2d", &(0x7f0000000580), &(0x7f00000005c0), &(0x7f0000000a00)="29859fdda9a119e54a27f9ec76b4d63a16dc5bbdd38c2fda0e5f4d8f830cd987ec7d3ffc66cf3db8820968fd89a1fba8fe6352a29a27f3b000bcdf238f2c04b358fc831025180e0be313da41de6366c94a1a0f86aaffdf2c039111b55275c054e14819a827fe809225249a01944263a2aec15f64e752e35892b1b8e7ef1e0e9115") ioctl$SNDRV_SEQ_IOCTL_DELETE_PORT(r0, 0x40a85321, &(0x7f0000000b80)={{0x4, 0x8}, 'port0\x00', 0x80, 0x0, 0x10000, 0x6, 0x2, 0x80, 0x8, 0x0, 0x0, 0x3dec00}) getsockopt$inet_sctp_SCTP_SOCKOPT_PEELOFF(r3, 0x84, 0x66, &(0x7f0000000c40)={r2, 0x6}, &(0x7f0000000c80)=0x8) clock_settime(0x7, &(0x7f0000000740)={0x77359400}) ioctl$SNDRV_SEQ_IOCTL_CLIENT_ID(r0, 0x80045301, &(0x7f0000000340)) r4 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer2\x00', 0x0, 0x0) openat$sequencer2(0xffffffffffffff9c, &(0x7f00000006c0)='/dev/sequencer2\x00', 0x222081, 0x0) ioctl$RNDADDENTROPY(0xffffffffffffffff, 0x40085203, &(0x7f0000000100)=ANY=[@ANYPTR=&(0x7f0000000680)=ANY=[@ANYPTR64=&(0x7f0000000640)=ANY=[@ANYPTR, @ANYPTR]]]) setsockopt$inet_sctp_SCTP_DEFAULT_SEND_PARAM(r4, 0x84, 0xa, &(0x7f0000000140)={0x5, 0x100000001, 0x0, 0x8, 0x0, 0x7, 0x401, 0x1f, r2}, 0x20) 2018/03/31 09:15:44 executing program 6: r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r0, &(0x7f0000ef8cfd)={0xa, 0x4e23, 0x0, @loopback={0x0, 0x1}}, 0x1c) listen(r0, 0x3) r1 = socket$inet6_sctp(0xa, 0x4000000000000001, 0x84) sendto$inet6(r1, &(0x7f0000000080)='X', 0x1, 0x0, &(0x7f000005ffe4)={0xa, 0x4e23, 0x0, @loopback={0x0, 0x1}}, 0x1c) r2 = accept(r0, 0x0, &(0x7f00000000c0)) getsockopt$inet_sctp_SCTP_SOCKOPT_PEELOFF(r2, 0x84, 0x66, &(0x7f0000000000)={0x0, 0x100}, &(0x7f0000000040)=0x8) setsockopt$inet_sctp6_SCTP_DEFAULT_SNDINFO(r1, 0x84, 0x22, &(0x7f0000000100)={0x6, 0x9, 0xd230, 0xffffffff, r3}, 0x10) fsync(r2) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f00009b2ff0)={0x1, &(0x7f0000a7dff8)=[{0x6, 0x0, 0x0, 0x400000000000003}]}, 0x10) ioctl$sock_SIOCETHTOOL(r1, 0x8946, &(0x7f00000001c0)={'ip6_vti0\x00', &(0x7f0000000140)=@ethtool_gfeatures={0x3a, 0x6, [{0x6, 0x4, 0x9, 0x1}, {0x8, 0x9, 0x5, 0x9}, {0x3, 0x1000, 0x4, 0x7f}, {0x201ca684, 0x3, 0x9, 0x7}, {0x2, 0x101, 0x1f, 0x9}, {0x1f, 0xffff, 0x5}]}}) setsockopt$inet_sctp_SCTP_STREAM_SCHEDULER_VALUE(r2, 0x84, 0x7c, &(0x7f0000000280)={r3, 0xbf8, 0x7}, 0x8) sendmsg$kcm(r2, &(0x7f0000001480)={0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000200)='R', 0x1}], 0x1, &(0x7f0000000280)}, 0x8091) [ 336.980225] FAT-fs (loop199): unable to read boot sector [ 336.984528] binder: 32036:32037 unknown command 20 [ 336.987243] FAT-fs (loop199): unable to read boot sector [ 337.011508] FAT-fs (loop199): unable to read boot sector [ 337.012540] binder: 32036:32037 ioctl c0306201 20000340 returned -22 [ 337.023480] FAT-fs (loop199): unable to read boot sector [ 337.039995] FAT-fs (loop199): unable to read boot sector [ 337.050200] FAT-fs (loop199): unable to read boot sector [ 337.060460] FAULT_INJECTION: forcing a failure. [ 337.060460] name failslab, interval 1, probability 0, space 0, times 0 [ 337.071769] CPU: 1 PID: 32048 Comm: syz-executor7 Not tainted 4.16.0-rc7+ #8 [ 337.078945] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 2018/03/31 09:15:44 executing program 0: perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f000031f000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) prctl$void(0x0) r0 = syz_open_dev$vcsn(&(0x7f0000000040)='/dev/vcs#\x00', 0x0, 0x20000) socket$alg(0x26, 0x5, 0x0) ioctl$sock_SIOCGIFBR(0xffffffffffffffff, 0x8940, &(0x7f0000000240)=@add_del={0x2, &(0x7f0000000280)='dummy0\x00', 0x3f}) ioctl$VHOST_SET_FEATURES(r0, 0x4008af00, &(0x7f0000000200)=0x200000000) bind$alg(0xffffffffffffffff, &(0x7f0000000080)={0x26, 'aead\x00', 0x0, 0x0, 'generic-gcm-aesni\x00'}, 0x58) syz_open_dev$sndmidi(&(0x7f00000002c0)='/dev/snd/midiC#D#\x00', 0xf8, 0xffffffffffffffff) bind(0xffffffffffffffff, &(0x7f0000000140)=@llc={0x1a, 0x33a, 0x7, 0x80, 0x0, 0x4, @remote={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xbb}}, 0x80) r1 = syz_init_net_socket$nfc_llcp(0x27, 0x1, 0x1) setsockopt$nfc_llcp_NFC_LLCP_MIUX(r1, 0x118, 0x15, &(0x7f0000000000), 0x4) r2 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/cuse\x00', 0x103002, 0x0) futimesat(r2, &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)={{0x0, 0x7530}}) r3 = syz_open_dev$vcsa(&(0x7f00000001c0)='/dev/vcsa#\x00', 0x2, 0x0) sendto$inet6(r3, &(0x7f0000000bc0)="36251e313e0743fc195a1a198a14434e8a0a00b3f452a3b5644e336ec712a16310c9aecc4e3097bc666a8882128a73c368ce731e9fbf3fe18fa52d00c34ac2e57c1c4569cfbd6a621c6dfbc032121aed", 0x50, 0x20000000, &(0x7f0000000c40)={0xa, 0x4e20, 0x6, @dev={0xfe, 0x80, [], 0x19}, 0x1f}, 0x1c) accept$alg(r0, 0x0, 0x0) sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f0000000000)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x8}, 0xb4fcd35419244434, &(0x7f00004ca000)={&(0x7f0000000300)=ANY=[], 0x1a1}, 0x1}, 0x0) syz_fuseblk_mount(&(0x7f0000001380)='./file0\x00', &(0x7f00000013c0)='./file0\x00', 0xf000, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0xb21, 0x0) socket(0x1e, 0x3, 0x0) socket(0x1e, 0x0, 0x0) ptrace$PTRACE_SECCOMP_GET_FILTER(0x420c, 0x0, 0x0, &(0x7f0000000380)=""/113) sched_yield() ioctl$TUNGETIFF(r3, 0x800454d2, &(0x7f0000000140)) ioctl$PIO_FONTRESET(r2, 0x4b6d, 0x0) ioctl$KIOCSOUND(r3, 0x4b2f, 0xfffffffffffffb74) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x20, 0x9b}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000447000)='./file0\x00', &(0x7f00000e1000)='msdos\x00', 0x0, &(0x7f000097bfff)) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000580)='./cgroup/syz0\x00', 0x1ff) [ 337.088289] Call Trace: [ 337.090874] dump_stack+0x194/0x24d [ 337.091539] binder: 32036:32037 ioctl c0306201 20000340 returned -14 [ 337.094523] ? arch_local_irq_restore+0x53/0x53 [ 337.094536] ? __save_stack_trace+0x7e/0xd0 [ 337.094557] should_fail+0x8c0/0xa40 [ 337.094572] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 337.094588] ? kasan_kmalloc+0xad/0xe0 [ 337.122667] ? kmem_cache_alloc_trace+0x136/0x740 [ 337.127513] ? __memcg_init_list_lru_node+0x169/0x270 [ 337.132702] ? __list_lru_init+0x544/0x750 [ 337.136933] ? sget_userns+0x6b1/0xe40 [ 337.140824] ? mount_fs+0x66/0x2d0 [ 337.144362] ? vfs_kern_mount.part.26+0xc6/0x4a0 [ 337.149124] ? do_mount+0xea4/0x2bb0 [ 337.149138] ? do_syscall_64+0x281/0x940 [ 337.149152] ? entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 337.149169] ? find_held_lock+0x35/0x1d0 [ 337.149185] ? __lock_is_held+0xb6/0x140 [ 337.149208] ? check_same_owner+0x320/0x320 [ 337.149223] ? rcu_note_context_switch+0x710/0x710 [ 337.149241] should_failslab+0xec/0x120 [ 337.149252] kmem_cache_alloc_trace+0x4b/0x740 2018/03/31 09:15:44 executing program 3: r0 = syz_open_dev$random(&(0x7f00000001c0)='/dev/random\x00', 0x0, 0x800) r1 = syz_open_dev$loop(&(0x7f0000308000)='/dev/loop#\x00', 0x0, 0x0) ioctl$LOOP_SET_STATUS(r1, 0xc0481273, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "3900ea631d000000000200000100fbff9e00000023f7b7d65f90b0e6320e053ab3192601000000000000004482e85040fb03b99449360064055b5bffff0001f3", "cfa430745a540dc1c149b7b81579f6a41c51f7d51933223e82ab867dac761faf", [0x2]}) write(0xffffffffffffffff, &(0x7f00000001c0), 0x0) setsockopt$inet_sctp6_SCTP_RECVNXTINFO(0xffffffffffffffff, 0x84, 0x21, &(0x7f00000003c0)=0x200, 0x4) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f00000000c0)=0x0) getsockopt$netrom_NETROM_T4(0xffffffffffffffff, 0x103, 0x6, &(0x7f0000000300)=0x8, &(0x7f0000000340)=0x4) r3 = getpid() sched_setparam(r3, &(0x7f0000000400)) syz_open_dev$loop(&(0x7f0000ca9ff5)='/dev/loop#\x00', 0x0, 0x82) r4 = memfd_create(&(0x7f0000000500)="5c433d35bf800000002d5c95e8adb79a9246255a485635e282f1963d33d6", 0x1) pwritev(r4, &(0x7f0000f50f90)=[{&(0x7f0000000040)="aa", 0x1}], 0x1, 0x0) fcntl$getownex(r1, 0x10, &(0x7f0000000240)={0x0, 0x0}) r6 = syz_open_procfs(r5, &(0x7f0000000280)='stat\x00') epoll_ctl$EPOLL_CTL_MOD(r4, 0x3, r0, &(0x7f00000002c0)={0x20000010}) accept4$inet6(r4, &(0x7f0000000100)={0x0, 0x0, 0x0, @mcast1}, &(0x7f0000000140)=0x1c, 0x7fd) getsockopt$inet_IP_IPSEC_POLICY(r6, 0x0, 0x10, &(0x7f0000000680)={{{@in6=@local, @in6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@loopback}, 0x0, @in=@local}}, &(0x7f0000000380)=0xe8) getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f00000007c0)={0x0, 0x0, 0x0}, &(0x7f0000000540)=0xc) fchown(r4, r7, r8) r9 = syz_open_dev$binder(&(0x7f0000000100)='/dev/binder#\x00', 0xffffffffffffffff, 0x806) ioctl$BINDER_SET_CONTEXT_MGR(r6, 0x40046207, 0x0) mmap$binder(&(0x7f000000c000/0x2000)=nil, 0x2000, 0x0, 0x12, r9, 0x0) ioctl$BINDER_WRITE_READ(r9, 0xc0306201, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000), 0x0, 0x0, &(0x7f0000011f9d)}) getsockopt$inet_sctp6_SCTP_AUTO_ASCONF(0xffffffffffffffff, 0x84, 0x1e, &(0x7f0000000140), &(0x7f0000000180)=0x4) ioctl$BINDER_WRITE_READ(r9, 0xc0306201, &(0x7f0000000340)={0xfce7, 0x0, &(0x7f0000000440)=ANY=[@ANYRES64=r1], 0x0, 0x0, &(0x7f0000000240)}) write(0xffffffffffffffff, &(0x7f0000000300)="8be25f5790f664f32509e40d6f879d5add7e2d359c9a19afb750a2d25352875d187d4118c99a2d5c6db433c277cc7d345b87a34f1b417033d367cb0cfd6a25633f77aafb17e99c33cb65352c901ae75176f07bb0a4bb5ebff3d87e", 0x5b) r10 = ioctl$LOOP_CTL_GET_FREE(r6, 0x4c82) ioctl$LOOP_CTL_REMOVE(r6, 0x4c81, r10) openat$cgroup(0xffffffffffffff9c, &(0x7f0000000000)='syz0\x00', 0x200002, 0x0) sched_setaffinity(r2, 0x8, &(0x7f0000000200)=0x7) [ 337.149261] ? __kmalloc_node+0x33/0x70 [ 337.149270] ? __kmalloc_node+0x33/0x70 [ 337.149280] ? rcu_read_lock_sched_held+0x108/0x120 [ 337.149294] __memcg_init_list_lru_node+0x169/0x270 [ 337.149306] ? list_lru_add+0x7c0/0x7c0 [ 337.149316] ? __kmalloc_node+0x47/0x70 [ 337.149331] __list_lru_init+0x544/0x750 [ 337.149345] ? memcg_destroy_list_lru_node.isra.7+0x110/0x110 [ 337.149357] ? trace_hardirqs_on_caller+0x421/0x5c0 [ 337.149374] ? lockdep_init_map+0x9/0x10 [ 337.149386] sget_userns+0x6b1/0xe40 [ 337.149393] ? kill_litter_super+0x90/0x90 [ 337.149406] ? ns_test_super+0x50/0x50 [ 337.149418] ? destroy_unused_super.part.6+0xd0/0xd0 [ 337.149426] ? do_raw_spin_trylock+0x190/0x190 [ 337.149440] ? kobject_put+0x6b/0x250 [ 337.149455] ? blkdev_get+0x3a1/0xb00 [ 337.149470] ? cap_capable+0x1b5/0x230 [ 337.149479] ? __blkdev_get+0x13b0/0x13b0 [ 337.149497] ? security_capable+0x8e/0xc0 [ 337.149507] ? kill_litter_super+0x90/0x90 [ 337.149517] ? ns_capable_common+0xcf/0x160 [ 337.149527] ? ns_test_super+0x50/0x50 [ 337.149535] ? kill_litter_super+0x90/0x90 [ 337.149543] sget+0xd2/0x120 [ 337.149556] mount_bdev+0x109/0x370 [ 337.149566] ? msdos_mount+0x40/0x40 [ 337.149578] msdos_mount+0x34/0x40 [ 337.149590] mount_fs+0x66/0x2d0 [ 337.149604] vfs_kern_mount.part.26+0xc6/0x4a0 [ 337.149616] ? may_umount+0xa0/0xa0 [ 337.149626] ? _raw_read_unlock+0x22/0x30 [ 337.149635] ? __get_fs_type+0x8a/0xc0 [ 337.149649] do_mount+0xea4/0x2bb0 [ 337.149663] ? copy_mount_string+0x40/0x40 [ 337.149674] ? trace_hardirqs_on_caller+0x421/0x5c0 [ 337.149684] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 337.149697] ? retint_kernel+0x10/0x10 [ 337.345411] ? copy_mount_options+0x18b/0x2e0 [ 337.349885] ? copy_mount_options+0x193/0x2e0 [ 337.354355] ? copy_mount_options+0x1f7/0x2e0 [ 337.358830] SyS_mount+0xab/0x120 [ 337.362260] ? copy_mnt_ns+0xb30/0xb30 [ 337.366124] do_syscall_64+0x281/0x940 [ 337.369987] ? vmalloc_sync_all+0x30/0x30 [ 337.374114] ? _raw_spin_unlock_irq+0x27/0x70 [ 337.378587] ? finish_task_switch+0x1c1/0x7e0 [ 337.383060] ? syscall_return_slowpath+0x550/0x550 [ 337.387968] ? syscall_return_slowpath+0x2ac/0x550 [ 337.392877] ? prepare_exit_to_usermode+0x350/0x350 [ 337.397871] ? entry_SYSCALL_64_after_hwframe+0x52/0xb7 [ 337.403211] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 337.408037] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 337.413203] RIP: 0033:0x454e79 [ 337.416370] RSP: 002b:00007f37fba8ec68 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 337.424474] RAX: ffffffffffffffda RBX: 00007f37fba8f6d4 RCX: 0000000000454e79 [ 337.431722] RDX: 00000000200e1000 RSI: 0000000020447000 RDI: 0000000020000000 [ 337.438971] RBP: 000000000072bea0 R08: 000000002097bfff R09: 0000000000000000 [ 337.446218] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000019 [ 337.453466] R13: 00000000000003fa R14: 00000000006f8010 R15: 0000000000000022 [ 337.465445] print_req_error: 42 callbacks suppressed [ 337.465451] print_req_error: I/O error, dev loop199, sector 0 [ 337.476571] FAT-fs (loop199): unable to read boot sector 2018/03/31 09:15:44 executing program 1: perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f000031f000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) prctl$void(0x0) getpid() syz_open_dev$vcsn(&(0x7f0000000040)='/dev/vcs#\x00', 0x400, 0x20000) r0 = socket$alg(0x26, 0x5, 0x0) ioctl$sock_SIOCGIFBR(r0, 0x8940, &(0x7f0000000040)=@get={0x1, &(0x7f0000000400)=""/242, 0x100000000}) bind$alg(r0, &(0x7f0000000080)={0x26, 'aead\x00', 0x0, 0x0, 'generic-gcm-aesni\x00'}, 0x58) r1 = syz_open_dev$sndmidi(&(0x7f0000000100)='/dev/snd/midiC#D#\x00', 0xfd, 0x0) bind(r1, &(0x7f0000000140)=@llc={0x1a, 0x33a, 0x7, 0x80, 0x0, 0x4, @remote={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xbb}}, 0x80) r2 = syz_init_net_socket$nfc_llcp(0x27, 0x1, 0x1) setsockopt$nfc_llcp_NFC_LLCP_MIUX(r2, 0x118, 0x15, &(0x7f0000000000), 0x4) r3 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/cuse\x00', 0x103002, 0x0) futimesat(r3, &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)={{0x0, 0x7530}}) r4 = syz_open_dev$vcsa(&(0x7f00000001c0)='/dev/vcsa#\x00', 0x2, 0x4020ff) sendto$inet6(r4, &(0x7f0000000bc0), 0x0, 0x20000000, &(0x7f0000000c40)={0xa, 0x4e20, 0x6, @dev={0xfe, 0x80, [], 0x19}, 0x1f}, 0x1c) sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f0000000000)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x8}, 0xb4fcd35419244434, &(0x7f00004ca000)={&(0x7f0000000300)=ANY=[], 0x1a1}, 0x1}, 0x0) r5 = syz_fuseblk_mount(&(0x7f0000001380)='./file0\x00', &(0x7f00000013c0)='./file0\x00', 0xf000, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0xb21, 0x0) r6 = socket(0x1e, 0x3, 0x0) ptrace$PTRACE_SECCOMP_GET_FILTER(0x420c, 0x0, 0x0, &(0x7f0000000380)=""/113) sched_yield() ioctl$TUNGETIFF(r4, 0x800454d2, &(0x7f0000000140)) ioctl$KIOCSOUND(r4, 0x4b2f, 0xfffffffffffffb74) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x20, 0x9b}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000447000)='./file0\x00', &(0x7f00000e1000)='msdos\x00', 0x0, &(0x7f000097bfff)) dup3(r6, r5, 0x80000) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000580)='./cgroup/syz0\x00', 0x1ff) sysfs$3(0x3) syz_open_dev$audion(&(0x7f0000000280)='/dev/audio#\x00', 0x7be, 0x0) fcntl$getown(0xffffffffffffffff, 0x9) 2018/03/31 09:15:44 executing program 5: perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f000031f000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) prctl$void(0x0) getpid() r0 = syz_open_dev$vcsn(&(0x7f0000000040)='/dev/vcs#\x00', 0x0, 0x20000) ioctl$GIO_CMAP(r0, 0x4b70, &(0x7f0000000080)) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000080)={0x26, 'aead\x00', 0x0, 0x0, 'generic-gcm-aesni\x00'}, 0x58) syz_open_dev$sndmidi(&(0x7f0000000100)='/dev/snd/midiC#D#\x00', 0xfd, 0x0) r2 = syz_init_net_socket$nfc_llcp(0x27, 0x1, 0x1) setsockopt$nfc_llcp_NFC_LLCP_MIUX(r2, 0x118, 0x15, &(0x7f0000000000), 0x4) r3 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/cuse\x00', 0x103002, 0x0) futimesat(r3, &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)={{0x0, 0x7530}}) r4 = syz_open_dev$vcsa(&(0x7f00000001c0)='/dev/vcsa#\x00', 0x2, 0x4020ff) sendto$inet6(0xffffffffffffffff, &(0x7f0000000bc0)="36251e313e0743fc195a1a198a14434e8a0a00b3f452a3b5644e336ec712a16310c9aecc4e3097bc666a8882128a73c368ce731e9fbf3fe18fa52d", 0x3b, 0x20000000, &(0x7f0000000c40)={0xa, 0x4e20, 0x6, @dev={0xfe, 0x80, [], 0x19}, 0x1f}, 0x1c) accept$alg(r0, 0x0, 0x0) sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f0000000000)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x8}, 0xb4fcd35419244434, &(0x7f00004ca000)={&(0x7f0000000300)=ANY=[], 0x1a1}, 0x1}, 0x0) syz_fuseblk_mount(&(0x7f0000001380)='./file0\x00', &(0x7f00000013c0)='./file0\x00', 0xf000, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0xb21, 0x0) ioctl$KDGETKEYCODE(r3, 0x4b4c, &(0x7f0000000200)={0x5, 0x200000007ff}) socket(0x1e, 0x3, 0x0) socket(0x1e, 0x0, 0x0) ptrace$PTRACE_SECCOMP_GET_FILTER(0x420c, 0x0, 0x0, &(0x7f0000000380)=""/113) sched_yield() ioctl$TUNGETIFF(r4, 0x800454d2, &(0x7f0000000140)) ioctl$KIOCSOUND(r0, 0x4b2f, 0x6) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x20, 0x9b}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000000)='./file1\x00', &(0x7f0000447000)='./file0\x00', &(0x7f00000e1000)='msdos\x00', 0x0, &(0x7f000097bfff)) r5 = shmget$private(0x0, 0x4000, 0x10, &(0x7f0000ffa000/0x4000)=nil) shmctl$IPC_RMID(r5, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000580)='./cgroup/syz0\x00', 0x1ff) syz_open_dev$audion(&(0x7f0000000280)='/dev/audio#\x00', 0x7be, 0x0) 2018/03/31 09:15:44 executing program 7 (fault-call:24 fault-nth:35): perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f000031f000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getpid() r0 = syz_open_dev$vcsn(&(0x7f0000000040)='/dev/vcs#\x00', 0x0, 0x20000) ioctl$GIO_CMAP(r0, 0x4b70, &(0x7f0000000080)) r1 = socket$alg(0x26, 0x5, 0x0) ioctl$sock_SIOCGIFBR(r1, 0x8940, &(0x7f0000000040)=@get={0x1, &(0x7f0000000400)=""/242, 0x100000000}) bind$alg(r1, &(0x7f0000000080)={0x26, 'aead\x00', 0x0, 0x0, 'generic-gcm-aesni\x00'}, 0x58) syz_open_dev$sndmidi(&(0x7f0000000100)='/dev/snd/midiC#D#\x00', 0xfd, 0x0) bind(0xffffffffffffffff, &(0x7f0000000140)=@llc={0x1a, 0x33a, 0x7, 0x80, 0x5, 0x4, @remote={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xbb}}, 0x80) r2 = syz_init_net_socket$nfc_llcp(0x27, 0x1, 0x1) setsockopt$nfc_llcp_NFC_LLCP_MIUX(r2, 0x118, 0x15, &(0x7f0000000000), 0x4) r3 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/cuse\x00', 0x103002, 0x0) futimesat(r3, &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)={{0x0, 0x7530}}) r4 = syz_open_dev$vcsa(&(0x7f00000001c0)='/dev/vcsa#\x00', 0x2, 0x4020ff) sendto$inet6(r4, &(0x7f0000000bc0)="36251e313e0743fc195a1a198a14434e8a0a00b3f452a3b5644e336ec712a16310c9aecc4e3097bc666a8882128a73c368ce731e9fbf3fe18fa52d00", 0x3c, 0x20000000, &(0x7f0000000c40)={0xa, 0x0, 0x6, @dev={0xfe, 0x80, [], 0x19}, 0x1f}, 0x1c) accept$alg(r0, 0x0, 0x0) sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f0000000000)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x8}, 0xb4fcd35419244434, &(0x7f00004ca000)={&(0x7f0000000300)=ANY=[], 0x1a1}, 0x1}, 0x0) syz_fuseblk_mount(&(0x7f0000001380)='./file0\x00', &(0x7f00000013c0)='./file0\x00', 0xf000, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0xb21, 0x0) socket(0x1e, 0x3, 0x0) socket(0x1e, 0x0, 0x0) ptrace$PTRACE_SECCOMP_GET_FILTER(0x420c, 0x0, 0x0, &(0x7f0000000380)=""/113) sched_yield() ioctl$TUNGETIFF(r4, 0x800454d2, &(0x7f0000000140)) ioctl$KIOCSOUND(r4, 0x4b2f, 0xfffffffffffffb74) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000447000)='./file0\x00', &(0x7f00000e1000)='msdos\x00', 0x0, &(0x7f000097bfff)) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000580)='./cgroup/syz0\x00', 0x1ff) syz_open_dev$audion(&(0x7f0000000280)='/dev/audio#\x00', 0x7be, 0x0) [ 337.493528] binder: 32060:32061 unknown command 20 [ 337.499715] print_req_error: I/O error, dev loop199, sector 0 [ 337.506188] FAT-fs (loop199): unable to read boot sector [ 337.513136] print_req_error: I/O error, dev loop199, sector 0 [ 337.518277] binder: 32060:32061 ioctl c0306201 20000340 returned -22 [ 337.519139] FAT-fs (loop199): unable to read boot sector 2018/03/31 09:15:44 executing program 6: r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r0, &(0x7f0000ef8cfd)={0xa, 0x4e23, 0x0, @loopback={0x0, 0x1}}, 0x1c) listen(r0, 0x3) r1 = socket$inet6_sctp(0xa, 0x4000000000000001, 0x84) sendto$inet6(r1, &(0x7f0000000080)='X', 0x1, 0x0, &(0x7f000005ffe4)={0xa, 0x4e23, 0x0, @loopback={0x0, 0x1}}, 0x1c) r2 = accept(r0, 0x0, &(0x7f00000000c0)) getsockopt$inet_sctp_SCTP_SOCKOPT_PEELOFF(r2, 0x84, 0x66, &(0x7f0000000000)={0x0, 0x100}, &(0x7f0000000040)=0x8) setsockopt$inet_sctp6_SCTP_DEFAULT_SNDINFO(r1, 0x84, 0x22, &(0x7f0000000100)={0x6, 0x9, 0xd230, 0xffffffff, r3}, 0x10) fsync(r2) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f00009b2ff0)={0x1, &(0x7f0000a7dff8)=[{0x6, 0x0, 0x0, 0x400000000000003}]}, 0x10) ioctl$sock_SIOCETHTOOL(r1, 0x8946, &(0x7f00000001c0)={'ip6_vti0\x00', &(0x7f0000000140)=@ethtool_gfeatures={0x3a, 0x6, [{0x6, 0x4, 0x9, 0x1}, {0x8, 0x9, 0x5, 0x9}, {0x3, 0x1000, 0x4, 0x7f}, {0x201ca684, 0x3, 0x9, 0x7}, {0x2, 0x101, 0x1f, 0x9}, {0x1f, 0xffff, 0x5}]}}) setsockopt$inet_sctp_SCTP_STREAM_SCHEDULER_VALUE(r2, 0x84, 0x7c, &(0x7f0000000280)={r3, 0xbf8, 0x7}, 0x8) sendmsg$kcm(r2, &(0x7f0000001480)={0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000200)='R', 0x1}], 0x1, &(0x7f0000000280)}, 0x8091) 2018/03/31 09:15:44 executing program 4: perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f000031f000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) prctl$void(0x0) getpid() r0 = syz_open_dev$vcsn(&(0x7f0000000040)='/dev/vcs#\x00', 0x0, 0x20000) ioctl$GIO_CMAP(r0, 0x4b70, &(0x7f0000000080)) r1 = socket$alg(0x26, 0x5, 0x0) ioctl$sock_SIOCGIFBR(0xffffffffffffffff, 0x8940, &(0x7f0000000040)=@get={0x1, &(0x7f0000000400)=""/242, 0x100000000}) bind$alg(r1, &(0x7f0000000080)={0x26, 'aead\x00', 0x0, 0x0, 'generic-gcm-aesni\x00'}, 0x58) syz_open_dev$sndmidi(&(0x7f0000000100)='/dev/snd/midiC#D#\x00', 0xfd, 0x0) bind(0xffffffffffffffff, &(0x7f0000000140)=@llc={0x1a, 0x33a, 0x7, 0x80, 0x0, 0x4, @remote={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xbb}}, 0x80) r2 = syz_init_net_socket$nfc_llcp(0x27, 0x1, 0x1) setsockopt$nfc_llcp_NFC_LLCP_MIUX(r2, 0x118, 0x15, &(0x7f0000000000), 0x4) r3 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/cuse\x00', 0x103002, 0x0) socket(0xd, 0x5, 0x7b) futimesat(r3, &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)={{0x0, 0x7530}}) r4 = syz_open_dev$vcsa(&(0x7f00000001c0)='/dev/vcsa#\x00', 0x2, 0x0) sendto$inet6(r4, &(0x7f0000000bc0), 0x0, 0x20000000, &(0x7f0000000c40)={0xa, 0x4e20, 0x0, @dev={0xfe, 0x80, [], 0x19}, 0x1f}, 0x1c) accept$alg(r0, 0x0, 0x0) sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f0000000000)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x8}, 0xb4fcd35419244434, &(0x7f00004ca000)={&(0x7f0000000300)=ANY=[], 0x1a1}, 0x1}, 0x0) syz_fuseblk_mount(&(0x7f0000001380)='./file0\x00', &(0x7f00000013c0)='./file0\x00', 0xf000, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0xb21, 0x0) socket(0x1e, 0x3, 0x0) socket(0x1e, 0x0, 0x0) ptrace$PTRACE_SECCOMP_GET_FILTER(0x420c, 0x0, 0x0, &(0x7f0000000380)=""/113) r5 = request_key(&(0x7f00000002c0)='id_resolver\x00', &(0x7f0000000300)={0x73, 0x79, 0x7a, 0x2}, &(0x7f0000000340)='\x00', 0xfffffffffffffffe) add_key$user(&(0x7f0000000200)='user\x00', &(0x7f0000000240)={0x73, 0x79, 0x7a, 0x2}, &(0x7f0000000280), 0x0, r5) sched_yield() ioctl$TUNGETIFF(r4, 0x800454d2, &(0x7f0000000140)) ioctl$KIOCSOUND(r4, 0x4b2f, 0xfffffffffffffb74) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x20, 0x9b}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000447000)='./file0\x00', &(0x7f00000e1000)='msdos\x00', 0x0, &(0x7f000097bfff)) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000580)='./cgroup/syz0\x00', 0x1ff) [ 337.571917] print_req_error: I/O error, dev loop199, sector 0 [ 337.577927] FAT-fs (loop199): unable to read boot sector [ 337.600207] binder: 32060:32065 unknown command 26 [ 337.605433] print_req_error: I/O error, dev loop199, sector 0 [ 337.611504] FAT-fs (loop199): unable to read boot sector [ 337.624301] binder: 32060:32065 ioctl c0306201 20000340 returned -22 [ 337.641870] FAULT_INJECTION: forcing a failure. [ 337.641870] name failslab, interval 1, probability 0, space 0, times 0 [ 337.653554] CPU: 0 PID: 32070 Comm: syz-executor7 Not tainted 4.16.0-rc7+ #8 [ 337.660757] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 337.670109] Call Trace: [ 337.672699] dump_stack+0x194/0x24d [ 337.676703] ? arch_local_irq_restore+0x53/0x53 [ 337.676722] ? debug_check_no_locks_freed+0x3c0/0x3c0 [ 337.676746] should_fail+0x8c0/0xa40 [ 337.690271] ? __list_lru_init+0x352/0x750 [ 337.694517] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 337.699639] ? perf_trace_lock_acquire+0x532/0x980 [ 337.704596] ? find_held_lock+0x35/0x1d0 [ 337.705819] binder: 32076:32077 unknown command 20 [ 337.708668] ? __lock_is_held+0xb6/0x140 [ 337.708703] ? check_same_owner+0x320/0x320 [ 337.708719] ? rcu_note_context_switch+0x710/0x710 [ 337.723552] binder: 32076:32077 ioctl c0306201 20000340 returned -22 [ 337.726890] ? find_held_lock+0x35/0x1d0 [ 337.726914] should_failslab+0xec/0x120 [ 337.726927] __kmalloc+0x63/0x760 [ 337.726939] ? lock_downgrade+0x980/0x980 [ 337.748987] ? register_shrinker+0x10e/0x2d0 [ 337.753396] ? trace_event_raw_event_module_request+0x320/0x320 [ 337.759456] register_shrinker+0x10e/0x2d0 [ 337.763691] ? prepare_kswapd_sleep+0x1f0/0x1f0 [ 337.763840] binder: 32076:32078 unknown command 27 [ 337.768356] ? memcpy+0x45/0x50 [ 337.768378] sget_userns+0xbbf/0xe40 [ 337.768388] ? kill_litter_super+0x90/0x90 [ 337.777821] binder: 32076:32078 ioctl c0306201 20000340 returned -22 [ 337.780255] ? ns_test_super+0x50/0x50 [ 337.780271] ? destroy_unused_super.part.6+0xd0/0xd0 [ 337.780283] ? do_raw_spin_trylock+0x190/0x190 [ 337.780303] ? kobject_put+0x6b/0x250 [ 337.808298] ? blkdev_get+0x3a1/0xb00 [ 337.812106] ? cap_capable+0x1b5/0x230 [ 337.815995] ? __blkdev_get+0x13b0/0x13b0 [ 337.820149] ? security_capable+0x8e/0xc0 [ 337.824297] ? kill_litter_super+0x90/0x90 [ 337.828531] ? ns_capable_common+0xcf/0x160 [ 337.832850] ? ns_test_super+0x50/0x50 [ 337.836732] ? kill_litter_super+0x90/0x90 [ 337.840966] sget+0xd2/0x120 [ 337.843991] mount_bdev+0x109/0x370 [ 337.847609] ? msdos_mount+0x40/0x40 [ 337.851321] msdos_mount+0x34/0x40 [ 337.854857] mount_fs+0x66/0x2d0 [ 337.858224] vfs_kern_mount.part.26+0xc6/0x4a0 [ 337.862807] ? may_umount+0xa0/0xa0 [ 337.866431] ? _raw_read_unlock+0x22/0x30 [ 337.870574] ? __get_fs_type+0x8a/0xc0 [ 337.874462] do_mount+0xea4/0x2bb0 [ 337.878009] ? copy_mount_string+0x40/0x40 [ 337.882243] ? trace_hardirqs_on_caller+0x421/0x5c0 [ 337.887255] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 337.892013] ? retint_kernel+0x10/0x10 [ 337.895909] ? copy_mount_options+0x18b/0x2e0 [ 337.900405] ? copy_mount_options+0x193/0x2e0 [ 337.904894] ? copy_mount_options+0x1f7/0x2e0 [ 337.909388] SyS_mount+0xab/0x120 [ 337.912833] ? copy_mnt_ns+0xb30/0xb30 [ 337.916720] do_syscall_64+0x281/0x940 [ 337.920600] ? vmalloc_sync_all+0x30/0x30 [ 337.924741] ? _raw_spin_unlock_irq+0x27/0x70 [ 337.929235] ? finish_task_switch+0x1c1/0x7e0 [ 337.933727] ? syscall_return_slowpath+0x550/0x550 [ 337.938655] ? syscall_return_slowpath+0x2ac/0x550 [ 337.943583] ? prepare_exit_to_usermode+0x350/0x350 [ 337.948596] ? entry_SYSCALL_64_after_hwframe+0x52/0xb7 [ 337.953962] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 337.958813] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 337.963996] RIP: 0033:0x454e79 [ 337.967176] RSP: 002b:00007f37fba8ec68 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 2018/03/31 09:15:44 executing program 3: r0 = syz_open_dev$random(&(0x7f00000001c0)='/dev/random\x00', 0x0, 0x800) r1 = syz_open_dev$loop(&(0x7f0000308000)='/dev/loop#\x00', 0x0, 0x0) ioctl$LOOP_SET_STATUS(r1, 0xc0481273, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "3900ea631d00000000020000010000009f00000023f7b7d65f90b0e6330ee739b319d8f6aa6bd58d1443474482e85040fb4947ebb55bd19f335b5bffff0001f3", "cfa430745a540dc1c149b7b81579f6a41c51f7d51933223e82ab867dac761faf"}) write(0xffffffffffffffff, &(0x7f00000001c0), 0x0) setsockopt$inet_sctp6_SCTP_RECVNXTINFO(0xffffffffffffffff, 0x84, 0x21, &(0x7f00000003c0)=0x200, 0x4) openat$ptmx(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/ptmx\x00', 0x40, 0x0) r2 = syz_open_dev$dmmidi(&(0x7f0000000600)='/dev/dmmidi#\x00', 0x5, 0x800) ioctl$TIOCGPGRP(r2, 0x540f, &(0x7f0000000640)=0x0) getsockopt$netrom_NETROM_T4(0xffffffffffffffff, 0x103, 0x6, &(0x7f0000000300)=0x8, &(0x7f0000000340)=0x4) r4 = getpid() sched_setparam(r4, &(0x7f0000000400)) syz_open_dev$loop(&(0x7f0000ca9ff5)='/dev/loop#\x00', 0x0, 0x82) r5 = memfd_create(&(0x7f0000614000)="74086e750000000000000000008c00", 0x0) pwritev(r5, &(0x7f0000f50f90)=[{&(0x7f0000000040)="aa", 0x1}], 0x1, 0x0) fcntl$getownex(r1, 0x10, &(0x7f0000000240)={0x0, 0x0}) r7 = syz_open_procfs(r6, &(0x7f0000000280)='stat\x00') epoll_ctl$EPOLL_CTL_MOD(r5, 0x3, r0, &(0x7f00000002c0)={0x20000010}) accept4$inet6(r5, &(0x7f0000000100)={0x0, 0x0, 0x0, @mcast1}, &(0x7f0000000140)=0x1c, 0x7fd) getsockopt$inet_IP_IPSEC_POLICY(r5, 0x0, 0x10, &(0x7f0000000940)={{{@in6=@local, @in6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@loopback}, 0x0, @in=@local}}, &(0x7f0000000780)=0xe8) getsockopt$sock_cred(r5, 0x1, 0x11, &(0x7f00000007c0)={0x0, 0x0, 0x0}, &(0x7f0000000540)=0xc) fchown(r5, r8, r9) r10 = syz_open_dev$binder(&(0x7f0000000100)='/dev/binder#\x00', 0xffffffffffffffff, 0x806) ioctl$BINDER_SET_CONTEXT_MGR(r7, 0x40046207, 0x0) mmap$binder(&(0x7f000000c000/0x2000)=nil, 0x2000, 0x0, 0x12, r10, 0x0) ioctl$BINDER_WRITE_READ(r10, 0xc0306201, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000), 0x0, 0x0, &(0x7f0000011f9d)}) getsockopt$inet_sctp6_SCTP_AUTO_ASCONF(0xffffffffffffffff, 0x84, 0x1e, &(0x7f00000000c0), &(0x7f0000000180)=0x4) ioctl$BINDER_WRITE_READ(r10, 0xc0306201, &(0x7f0000000340)={0x8, 0x0, &(0x7f0000000440)=ANY=[@ANYRES64=r1], 0x0, 0x0, &(0x7f0000000240)}) write(0xffffffffffffffff, &(0x7f0000000300)="8be25f5790f664f32509e40d6f879d5add7e2d359c9a19afb750a2d25352875d187d4118c99a2d5c6db433c277cc7d345b87a34f1b417033d367cb0cfd6a25633f77aafb17e99c33cb65352c901ae75176f07bb0a4bb5ebff3d87e", 0x5b) r11 = ioctl$LOOP_CTL_GET_FREE(r5, 0x4c82) ioctl$LOOP_CTL_REMOVE(r7, 0x4c81, r11) openat$cgroup(0xffffffffffffff9c, &(0x7f0000000000)='syz0\x00', 0x200002, 0x0) sched_setaffinity(r3, 0x8, &(0x7f0000000200)=0x7) [ 337.974881] RAX: ffffffffffffffda RBX: 00007f37fba8f6d4 RCX: 0000000000454e79 [ 337.982142] RDX: 00000000200e1000 RSI: 0000000020447000 RDI: 0000000020000000 [ 337.989403] RBP: 000000000072bea0 R08: 000000002097bfff R09: 0000000000000000 [ 337.996664] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000019 [ 338.003930] R13: 00000000000003fa R14: 00000000006f8010 R15: 0000000000000023 [ 338.011440] WARNING: CPU: 0 PID: 32070 at fs/super.c:1148 kill_block_super+0xc9/0xf0 [ 338.019323] Kernel panic - not syncing: panic_on_warn set ... [ 338.019323] [ 338.026689] CPU: 0 PID: 32070 Comm: syz-executor7 Not tainted 4.16.0-rc7+ #8 [ 338.033866] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 338.043204] Call Trace: [ 338.045781] dump_stack+0x194/0x24d [ 338.049394] ? arch_local_irq_restore+0x53/0x53 [ 338.054048] ? vsnprintf+0x1ed/0x1900 [ 338.057896] panic+0x1e4/0x41c [ 338.061071] ? refcount_error_report+0x214/0x214 [ 338.065809] ? show_regs_print_info+0x18/0x18 [ 338.070287] ? lock_downgrade+0x980/0x980 [ 338.074417] ? __warn+0x1c1/0x200 [ 338.077856] ? kill_block_super+0xc9/0xf0 [ 338.081985] __warn+0x1dc/0x200 [ 338.085279] ? kill_block_super+0xc9/0xf0 [ 338.089410] report_bug+0x1f4/0x2b0 [ 338.093029] fixup_bug.part.10+0x37/0x80 [ 338.097074] do_error_trap+0x2d7/0x3e0 [ 338.100944] ? math_error+0x400/0x400 [ 338.104727] ? do_writepages+0x116/0x170 [ 338.108774] ? __filemap_fdatawrite_range+0x280/0x460 [ 338.113946] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 338.118773] do_invalid_op+0x1b/0x20 [ 338.122464] invalid_op+0x1b/0x40 [ 338.125895] RIP: 0010:kill_block_super+0xc9/0xf0 [ 338.130630] RSP: 0018:ffff8801807bf7c8 EFLAGS: 00010246 [ 338.135974] RAX: 0000000000040000 RBX: ffff8801b182ebc0 RCX: ffffffff81b11e79 [ 338.143224] RDX: 0000000000040000 RSI: ffffc900038bd000 RDI: ffff8801cb5d8a60 [ 338.150475] RBP: ffff8801807bf7e0 R08: 0000000000000000 R09: 1ffff100300f7e19 [ 338.157729] R10: ffff8801807bf090 R11: 0000000000000001 R12: ffff8801cb5d86c0 [ 338.164976] R13: 0000000000000000 R14: ffff8801807bfa10 R15: ffff8801b182ebc0 [ 338.172234] ? kill_block_super+0xc9/0xf0 [ 338.176368] ? kill_block_super+0xc9/0xf0 [ 338.180497] deactivate_locked_super+0x88/0xd0 [ 338.185060] sget_userns+0xbda/0xe40 [ 338.188753] ? kill_litter_super+0x90/0x90 [ 338.192970] ? ns_test_super+0x50/0x50 [ 338.196838] ? destroy_unused_super.part.6+0xd0/0xd0 [ 338.201925] ? do_raw_spin_trylock+0x190/0x190 [ 338.206492] ? kobject_put+0x6b/0x250 [ 338.210280] ? blkdev_get+0x3a1/0xb00 [ 338.214065] ? cap_capable+0x1b5/0x230 [ 338.217936] ? __blkdev_get+0x13b0/0x13b0 [ 338.222066] ? security_capable+0x8e/0xc0 [ 338.226198] ? kill_litter_super+0x90/0x90 [ 338.230414] ? ns_capable_common+0xcf/0x160 [ 338.234718] ? ns_test_super+0x50/0x50 [ 338.238583] ? kill_litter_super+0x90/0x90 [ 338.242796] sget+0xd2/0x120 [ 338.245798] mount_bdev+0x109/0x370 [ 338.249405] ? msdos_mount+0x40/0x40 [ 338.253103] msdos_mount+0x34/0x40 [ 338.256624] mount_fs+0x66/0x2d0 [ 338.259975] vfs_kern_mount.part.26+0xc6/0x4a0 [ 338.264540] ? may_umount+0xa0/0xa0 [ 338.268147] ? _raw_read_unlock+0x22/0x30 [ 338.272275] ? __get_fs_type+0x8a/0xc0 [ 338.276145] do_mount+0xea4/0x2bb0 [ 338.279670] ? copy_mount_string+0x40/0x40 [ 338.283886] ? trace_hardirqs_on_caller+0x421/0x5c0 [ 338.288887] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 338.293629] ? retint_kernel+0x10/0x10 [ 338.297504] ? copy_mount_options+0x18b/0x2e0 [ 338.301981] ? copy_mount_options+0x193/0x2e0 [ 338.306459] ? copy_mount_options+0x1f7/0x2e0 [ 338.310936] SyS_mount+0xab/0x120 [ 338.314371] ? copy_mnt_ns+0xb30/0xb30 [ 338.318238] do_syscall_64+0x281/0x940 [ 338.322103] ? vmalloc_sync_all+0x30/0x30 [ 338.326228] ? _raw_spin_unlock_irq+0x27/0x70 [ 338.330704] ? finish_task_switch+0x1c1/0x7e0 [ 338.335180] ? syscall_return_slowpath+0x550/0x550 [ 338.340088] ? syscall_return_slowpath+0x2ac/0x550 [ 338.344996] ? prepare_exit_to_usermode+0x350/0x350 [ 338.349998] ? entry_SYSCALL_64_after_hwframe+0x52/0xb7 [ 338.355352] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 338.360179] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 338.365346] RIP: 0033:0x454e79 [ 338.368513] RSP: 002b:00007f37fba8ec68 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 338.376205] RAX: ffffffffffffffda RBX: 00007f37fba8f6d4 RCX: 0000000000454e79 [ 338.383456] RDX: 00000000200e1000 RSI: 0000000020447000 RDI: 0000000020000000 [ 338.390705] RBP: 000000000072bea0 R08: 000000002097bfff R09: 0000000000000000 [ 338.397952] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000019 [ 338.405201] R13: 00000000000003fa R14: 00000000006f8010 R15: 0000000000000023 [ 338.413269] Dumping ftrace buffer: [ 338.417015] (ftrace buffer empty) [ 338.420704] Kernel Offset: disabled [ 338.424313] Rebooting in 86400 seconds..