\x00'}, 0x58) r2 = accept$alg(r1, 0x0, 0x0) dup3(r0, r2, 0x0) 2018/04/11 12:44:41 executing program 2: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x0, 0x1, 0x0) setsockopt$packet_tx_ring(r0, 0x10f, 0x87, &(0x7f0000b89fe4)=@req={0x772}, 0x10) sendmsg(r0, &(0x7f0000030000)={&(0x7f00004f5000)=@generic={0x10000000001e, "0100000900000000000000000226cc573c080000003724c71e14dd6a739effea1b48006be61ffe0000e103000000f8000004003f010039d8f986ff01000300000004af50d50700000000000000e3ad316a1983000000001d00e0dfcb24281e27800000100076c3979ac40000bd15020078a1dfd300881a8365b1b16d7436"}, 0x80, &(0x7f0000447ff0), 0x0, &(0x7f00006e9c68)}, 0x0) 2018/04/11 12:44:41 executing program 7: syz_emit_ethernet(0x66, &(0x7f0000000000)={@random="cd3997030f00", @empty=[0x0, 0x0, 0x600], [], {@ipv6={0x86dd, {0x0, 0x6, "b40900", 0x30, 0x67, 0x0, @ipv4={[], [0xff, 0xff], @multicast2=0xe0000002}, @mcast2={0xff, 0x2, [], 0x1}, {[], @icmpv6=@time_exceed={0x21, 0x0, 0x0, 0x0, [], {0x0, 0x6, "b680fa", 0x0, 0x0, 0x0, @ipv4={[], [0xff, 0xff], @broadcast=0xffffffff}, @ipv4={[], [0xff, 0xff], @remote={0xac, 0x14, 0xffffffffffffffff, 0xbb}}}}}}}}}, 0x0) 2018/04/11 12:44:41 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000000), 0x216) sendmsg$key(r0, &(0x7f0000000b00)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000001000)={0x2, 0xa, 0x0, 0x0, 0x2}, 0x10}, 0x1}, 0x0) sendmsg$key(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000040)=ANY=[@ANYBLOB="e45c6fe63404000000a763e7f29e33944d231f9d020000000000"], 0xfffffffffffffe03}, 0x1}, 0x3) 2018/04/11 12:44:41 executing program 6: r0 = socket$inet6(0xa, 0x80003, 0xff) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @ipv4={[], [0xff, 0xff], @dev={0xac, 0x14, 0x14, 0x1b}}}, 0x1c) sendmsg(r0, &(0x7f000001b000)={0x0, 0xfffffff5, &(0x7f0000019fa0), 0x12f, &(0x7f000001ef08)}, 0x0) 2018/04/11 12:44:41 executing program 1: r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(0xffffffffffffffff, &(0x7f0000000200)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc-cast5-avx\x00'}, 0x58) r2 = accept$alg(r1, 0x0, 0x0) dup3(r0, r2, 0x0) 2018/04/11 12:44:41 executing program 2: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x0, 0x1, 0x0) setsockopt$packet_tx_ring(r0, 0x10f, 0x87, &(0x7f0000b89fe4)=@req={0x772}, 0x10) sendmsg(r0, &(0x7f0000030000)={&(0x7f00004f5000)=@generic={0x10000000001e, "0100000900000000000000000226cc573c080000003724c71e14dd6a739effea1b48006be61ffe0000e103000000f8000004003f010039d8f986ff01000300000004af50d50700000000000000e3ad316a1983000000001d00e0dfcb24281e27800000100076c3979ac40000bd15020078a1dfd300881a8365b1b16d7436"}, 0x80, &(0x7f0000447ff0), 0x0, &(0x7f00006e9c68)}, 0x0) 2018/04/11 12:44:42 executing program 3: semop(0x0, &(0x7f000001a000)=[{0x0, 0xffffffffffff0001}, {}], 0x2) timer_create(0x0, &(0x7f0000cd0000), &(0x7f0000044000)) timer_settime(0x0, 0x0, &(0x7f00004b1fe0)={{0x0, 0x1c9c380}, {0x0, 0x9}}, &(0x7f0000040000)) r0 = getpgid(0x0) tkill(r0, 0x1000000000016) 2018/04/11 12:44:42 executing program 1: r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000200)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc-cast5-avx\x00'}, 0x58) r2 = accept$alg(0xffffffffffffffff, 0x0, 0x0) dup3(r0, r2, 0x0) 2018/04/11 12:44:42 executing program 6: r0 = socket$inet6(0xa, 0x80003, 0xff) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @ipv4={[], [0xff, 0xff], @dev={0xac, 0x14, 0x14, 0x1b}}}, 0x1c) sendmsg(r0, &(0x7f000001b000)={0x0, 0xfffffff5, &(0x7f0000019fa0), 0x16a, &(0x7f000001ef08)}, 0x0) 2018/04/11 12:44:42 executing program 2: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x0, 0x1, 0x0) setsockopt$packet_tx_ring(r0, 0x10f, 0x87, &(0x7f0000b89fe4)=@req={0x772}, 0x10) sendmsg(r0, &(0x7f0000030000)={&(0x7f00004f5000)=@generic={0x10000000001e, "0100000900000000000000000226cc573c080000003724c71e14dd6a739effea1b48006be61ffe0000e103000000f8000004003f010039d8f986ff01000300000004af50d50700000000000000e3ad316a1983000000001d00e0dfcb24281e27800000100076c3979ac40000bd15020078a1dfd300881a8365b1b16d7436"}, 0x80, &(0x7f0000447ff0), 0x0, &(0x7f00006e9c68)}, 0x0) 2018/04/11 12:44:42 executing program 4: mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x1, 0x32, 0xffffffffffffffff, 0x0) pipe2(&(0x7f0000f61000)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) r2 = userfaultfd(0x0) ioctl$UFFDIO_API(r2, 0xc018aa3f, &(0x7f0000bc8000)={0xaa}) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000d62fe0)={{&(0x7f0000011000/0x4000)=nil, 0x4000}, 0x1}) r3 = request_key(&(0x7f0000000080)='dns_resolver\x00', &(0x7f00000000c0)={0x73, 0x79, 0x7a, 0x1}, &(0x7f0000000100)='\x00', 0xfffffffffffffffb) keyctl$revoke(0x3, r3) write$sndseq(r1, &(0x7f0000011fd2), 0xfffffdaa) read(r0, &(0x7f0000000000)=""/126, 0xfffffeab) ioctl$FIONREAD(r1, 0x541b, &(0x7f0000604ffc)) dup2(r0, r2) 2018/04/11 12:44:42 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$SO_TIMESTAMPING(r0, 0x1, 0x25, &(0x7f0000000000)=0x802, 0x4) r1 = syz_open_dev$binder(&(0x7f0000000100)='/dev/binder#\x00', 0x0, 0x2) ioctl$TIOCSLCKTRMIOS(r1, 0x5457, &(0x7f0000000180)) setsockopt$inet_tcp_int(r0, 0x6, 0x10000000013, &(0x7f000039c000)=0x400000000000001, 0x4) setsockopt$inet_tcp_int(r0, 0x6, 0x14, &(0x7f00000b2000)=0xffffffffffffffff, 0x4) bind$inet(r0, &(0x7f0000b55000)={0x2, 0x4e22}, 0x10) sendto$inet(r0, &(0x7f00005c9000), 0x252, 0x800000020000000, &(0x7f0000303000)={0x2, 0x4e22, @loopback=0x7f000001}, 0x10) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(r0, 0x6, 0x1d, &(0x7f0000965fec)={0x40000004, 0x800000000000852b, 0xffff, 0x10000007fffffff}, 0x14) munlock(&(0x7f0000ffc000/0x4000)=nil, 0x4000) writev(r0, &(0x7f00000002c0)=[{&(0x7f0000000480)="b8", 0x1}], 0x1) r2 = syz_open_dev$midi(&(0x7f0000000040)='/dev/midi#\x00', 0xffffffff, 0x1) ioctl$sock_inet6_udp_SIOCINQ(r2, 0x541b, &(0x7f00000000c0)) sendto$inet(r0, &(0x7f0000000080)="f52f", 0x2, 0x1, &(0x7f0000000140)={0x2, 0x0, @multicast2=0xe0000002}, 0x10) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f000020affc), 0x4) shutdown(r0, 0x1) 2018/04/11 12:44:42 executing program 5: r0 = openat$vcs(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/vcs\x00', 0x0, 0x0) getsockname$unix(r0, &(0x7f0000000300)=@abs, &(0x7f0000000380)=0x6e) r1 = socket$key(0xf, 0x3, 0x2) setsockopt$sock_int(r1, 0x1, 0x8, &(0x7f0000000000), 0x216) sendmsg$key(r1, &(0x7f0000000b00)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000001000)=ANY=[@ANYBLOB="0a237e1a54a7f962353e11402f23373a"], 0x10}, 0x1}, 0x0) ioctl$sock_SIOCOUTQ(r1, 0x5411, &(0x7f0000000180)) r2 = open(&(0x7f0000000100)='./file0\x00', 0x80102, 0x44) ioctl$DRM_IOCTL_IRQ_BUSID(r2, 0xc0106403, &(0x7f00000001c0)={0x2, 0x2, 0x20, 0x87}) accept$packet(r2, &(0x7f0000000200)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @random}, &(0x7f0000000240)=0x14) sendmsg$key(r1, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000040)=ANY=[@ANYBLOB="e3c84d6328c0189702f10000"], 0x10}, 0x1}, 0x0) r3 = syz_open_dev$midi(&(0x7f0000000080)='/dev/midi#\x00', 0x4, 0xc01) ioctl$VT_SETMODE(r3, 0x5602, &(0x7f00000000c0)={0x4, 0x5, 0x1, 0x679b, 0xffffffffffffff43}) 2018/04/11 12:44:42 executing program 7: syz_emit_ethernet(0x66, &(0x7f0000000000)={@random="cd3997030f00", @empty=[0x0, 0x0, 0x5800], [], {@ipv6={0x86dd, {0x0, 0x6, "b40900", 0x30, 0x67, 0x0, @ipv4={[], [0xff, 0xff], @multicast2=0xe0000002}, @mcast2={0xff, 0x2, [], 0x1}, {[], @icmpv6=@time_exceed={0x21, 0x0, 0x0, 0x0, [], {0x0, 0x6, "b680fa", 0x0, 0x0, 0x0, @ipv4={[], [0xff, 0xff], @broadcast=0xffffffff}, @ipv4={[], [0xff, 0xff], @remote={0xac, 0x14, 0xffffffffffffffff, 0xbb}}}}}}}}}, 0x0) 2018/04/11 12:44:42 executing program 7: syz_emit_ethernet(0x66, &(0x7f0000000000)={@random="cd3997030f00", @empty=[0x0, 0x0, 0x6700], [], {@ipv6={0x86dd, {0x0, 0x6, "b40900", 0x30, 0x67, 0x0, @ipv4={[], [0xff, 0xff], @multicast2=0xe0000002}, @mcast2={0xff, 0x2, [], 0x1}, {[], @icmpv6=@time_exceed={0x21, 0x0, 0x0, 0x0, [], {0x0, 0x6, "b680fa", 0x0, 0x0, 0x0, @ipv4={[], [0xff, 0xff], @broadcast=0xffffffff}, @ipv4={[], [0xff, 0xff], @remote={0xac, 0x14, 0xffffffffffffffff, 0xbb}}}}}}}}}, 0x0) 2018/04/11 12:44:42 executing program 6: r0 = socket$inet6(0xa, 0x80003, 0xff) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @ipv4={[], [0xff, 0xff], @dev={0xac, 0x14, 0x14, 0x1b}}}, 0x1c) sendmsg(r0, &(0x7f000001b000)={0x0, 0xfffffff5, &(0x7f0000019fa0), 0x11e, &(0x7f000001ef08)}, 0x0) 2018/04/11 12:44:42 executing program 5: r0 = syz_open_dev$midi(&(0x7f0000000080)='/dev/midi#\x00', 0x7, 0x181000) ioctl$SNDRV_SEQ_IOCTL_SET_CLIENT_POOL(r0, 0x4058534c, &(0x7f0000000400)={0x5, 0x4, 0x0, 0x800, 0x9, 0xe8}) r1 = socket$key(0xf, 0x3, 0x2) ioctl$SNDRV_SEQ_IOCTL_GET_PORT_INFO(r0, 0xc0a85322, &(0x7f00000001c0)) setsockopt$sock_int(r1, 0x1, 0x8, &(0x7f0000000000), 0x216) getsockopt$inet_sctp_SCTP_INITMSG(r0, 0x84, 0x2, &(0x7f0000000340), &(0x7f00000000c0)=0x31f) openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000300)='/dev/qat_adf_ctl\x00', 0x10000, 0x0) accept4$inet(r0, 0x0, &(0x7f0000000280), 0x80800) ioctl$TIOCLINUX4(r0, 0x541c, &(0x7f0000000100)=0x4) sendmsg$key(r1, &(0x7f0000000b00)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000001000)={0x2, 0xa, 0x0, 0x0, 0x2}, 0x10}, 0x1}, 0x0) sendmsg$key(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000040)={0x2, 0x12, 0x0, 0x0, 0x2}, 0x10}, 0x1}, 0x0) 2018/04/11 12:44:42 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$SO_TIMESTAMPING(r0, 0x1, 0x25, &(0x7f0000000000)=0x802, 0x4) setsockopt$inet_tcp_int(r0, 0x6, 0x10000000013, &(0x7f000039c000)=0x400000000000001, 0x4) setsockopt$inet_tcp_int(r0, 0x6, 0x14, &(0x7f00000b2000)=0xffffffffffffffff, 0x4) bind$inet(r0, &(0x7f0000b55000)={0x2, 0x4e22}, 0x10) sendto$inet(r0, &(0x7f00005c9000), 0x252, 0x800000020000000, &(0x7f0000303000)={0x2, 0x4e22, @loopback=0x7f000001}, 0x10) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(r0, 0x6, 0x1d, &(0x7f0000965fec)={0x40000004, 0x800000000000852b, 0xffff, 0x10000007fffffff}, 0x14) writev(r0, &(0x7f00000002c0)=[{&(0x7f0000000480)="b8", 0x1}], 0x1) sendto$inet(r0, &(0x7f0000000080)="f52f", 0x2, 0x1, &(0x7f0000000140)={0x2, 0x0, @multicast2=0xe0000002}, 0x10) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f000020affc), 0x4) shutdown(r0, 0x1) r1 = syz_open_dev$vcsn(&(0x7f0000000100)='/dev/vcs#\x00', 0x1, 0xfffffefffffffffd) ioctl$sock_ipx_SIOCAIPXPRISLT(r1, 0x89e1, &(0x7f00000000c0)=0x4) [ 581.181959] binder: 494:495 ioctl 5457 20000180 returned -22 2018/04/11 12:44:42 executing program 1: r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000200)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc-cast5-avx\x00'}, 0x58) r2 = accept$alg(r1, 0x0, 0x0) dup3(0xffffffffffffffff, r2, 0x0) 2018/04/11 12:44:42 executing program 6: r0 = socket$inet6(0xa, 0x80003, 0xff) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @ipv4={[], [0xff, 0xff], @dev={0xac, 0x14, 0x14, 0x1b}}}, 0x1c) sendmsg(r0, &(0x7f000001b000)={0x0, 0xfffffff5, &(0x7f0000019fa0), 0x4, &(0x7f000001ef08)}, 0x0) 2018/04/11 12:44:42 executing program 2: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x1e, 0x0, 0x0) setsockopt$packet_tx_ring(r0, 0x10f, 0x87, &(0x7f0000b89fe4)=@req={0x772}, 0x10) sendmsg(r0, &(0x7f0000030000)={&(0x7f00004f5000)=@generic={0x10000000001e, "0100000900000000000000000226cc573c080000003724c71e14dd6a739effea1b48006be61ffe0000e103000000f8000004003f010039d8f986ff01000300000004af50d50700000000000000e3ad316a1983000000001d00e0dfcb24281e27800000100076c3979ac40000bd15020078a1dfd300881a8365b1b16d7436"}, 0x80, &(0x7f0000447ff0), 0x0, &(0x7f00006e9c68)}, 0x0) 2018/04/11 12:44:44 executing program 7: syz_emit_ethernet(0x66, &(0x7f0000000000)={@random="cd3997030f00", @empty=[0x0, 0x0, 0x0, 0xffffa888], [], {@ipv6={0x86dd, {0x0, 0x6, "b40900", 0x30, 0x67, 0x0, @ipv4={[], [0xff, 0xff], @multicast2=0xe0000002}, @mcast2={0xff, 0x2, [], 0x1}, {[], @icmpv6=@time_exceed={0x21, 0x0, 0x0, 0x0, [], {0x0, 0x6, "b680fa", 0x0, 0x0, 0x0, @ipv4={[], [0xff, 0xff], @broadcast=0xffffffff}, @ipv4={[], [0xff, 0xff], @remote={0xac, 0x14, 0xffffffffffffffff, 0xbb}}}}}}}}}, 0x0) 2018/04/11 12:44:44 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$SO_TIMESTAMPING(r0, 0x1, 0x25, &(0x7f0000000000)=0x802, 0x4) setsockopt$inet_tcp_int(r0, 0x6, 0x10000000013, &(0x7f000039c000)=0x400000000000001, 0x4) setsockopt$inet_tcp_int(r0, 0x6, 0x14, &(0x7f00000b2000)=0xffffffffffffffff, 0x4) bind$inet(r0, &(0x7f0000b55000)={0x2, 0x4e22}, 0x10) sendto$inet(r0, &(0x7f00005c9000), 0x252, 0x800000020000000, &(0x7f0000303000)={0x2, 0x4e22, @loopback=0x7f000001}, 0x10) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(r0, 0x6, 0x1d, &(0x7f0000965fec)={0x40000004, 0x800000000000852b, 0xffff, 0x10000007fffffff}, 0x14) writev(r0, &(0x7f00000002c0)=[{&(0x7f0000000480)="b8", 0x1}], 0x1) sendto$inet(r0, &(0x7f0000000080)="f52f", 0x2, 0x1, &(0x7f0000000140)={0x2, 0x0, @multicast2=0xe0000002}, 0x10) poll(&(0x7f0000000040)=[{r0, 0x1}, {r0, 0x20}, {r0, 0x440}, {r0, 0x1}, {r0, 0x8001}, {r0, 0x100}], 0x6, 0x0) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f000020affc), 0x4) shutdown(r0, 0x1) 2018/04/11 12:44:44 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) setsockopt$sock_int(r0, 0x1, 0x6, &(0x7f0000000000), 0x4) sendmsg$key(r0, &(0x7f0000000b00)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000001000)={0x2, 0xa, 0x0, 0x0, 0x2}, 0x10}, 0x1}, 0x0) 2018/04/11 12:44:44 executing program 6: r0 = socket$inet6(0xa, 0x80003, 0xff) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @ipv4={[], [0xff, 0xff], @dev={0xac, 0x14, 0x14, 0x1b}}}, 0x1c) sendmsg(r0, &(0x7f000001b000)={0x0, 0xfffffff5, &(0x7f0000019fa0), 0x16e, &(0x7f000001ef08)}, 0x0) 2018/04/11 12:44:44 executing program 1: r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000200)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc-cast5-avx\x00'}, 0x58) r2 = accept$alg(r1, 0x0, 0x0) dup3(r0, 0xffffffffffffffff, 0x0) 2018/04/11 12:44:44 executing program 2: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x1e, 0x0, 0x0) setsockopt$packet_tx_ring(r0, 0x10f, 0x87, &(0x7f0000b89fe4)=@req={0x772}, 0x10) sendmsg(r0, &(0x7f0000030000)={&(0x7f00004f5000)=@generic={0x10000000001e, "0100000900000000000000000226cc573c080000003724c71e14dd6a739effea1b48006be61ffe0000e103000000f8000004003f010039d8f986ff01000300000004af50d50700000000000000e3ad316a1983000000001d00e0dfcb24281e27800000100076c3979ac40000bd15020078a1dfd300881a8365b1b16d7436"}, 0x80, &(0x7f0000447ff0), 0x0, &(0x7f00006e9c68)}, 0x0) 2018/04/11 12:44:44 executing program 3: semop(0x0, &(0x7f000001a000)=[{0x0, 0xffffffffffff0001}, {}], 0x2) timer_create(0x0, &(0x7f0000cd0000), &(0x7f0000044000)) timer_settime(0x0, 0x0, &(0x7f00004b1fe0)={{0x0, 0x1c9c380}, {0x0, 0x9}}, &(0x7f0000040000)) r0 = getpgid(0x0) tkill(r0, 0x1000000000016) 2018/04/11 12:44:44 executing program 4: mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x1, 0x32, 0xffffffffffffffff, 0x0) pipe2(&(0x7f0000f61000)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) r2 = userfaultfd(0x0) ioctl$UFFDIO_API(r2, 0xc018aa3f, &(0x7f0000bc8000)={0xaa}) ioctl$UFFDIO_REGISTER(r2, 0xc020aa00, &(0x7f0000d62fe0)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) setsockopt$inet6_MCAST_JOIN_GROUP(r0, 0x29, 0x2a, &(0x7f0000000080)={0x5, {{0xa, 0x4e23, 0xb1b}}}, 0x88) write$sndseq(r1, &(0x7f0000011fd2), 0xfffffdaa) read(r0, &(0x7f0000000000)=""/126, 0xfffffeab) ioctl$FIONREAD(r1, 0x541b, &(0x7f0000604ffc)) dup2(r0, r2) 2018/04/11 12:44:44 executing program 7: syz_emit_ethernet(0x66, &(0x7f0000000000)={@random="cd3997030f00", @empty=[0x0, 0x0, 0x0, 0x88a8ffff00000000], [], {@ipv6={0x86dd, {0x0, 0x6, "b40900", 0x30, 0x67, 0x0, @ipv4={[], [0xff, 0xff], @multicast2=0xe0000002}, @mcast2={0xff, 0x2, [], 0x1}, {[], @icmpv6=@time_exceed={0x21, 0x0, 0x0, 0x0, [], {0x0, 0x6, "b680fa", 0x0, 0x0, 0x0, @ipv4={[], [0xff, 0xff], @broadcast=0xffffffff}, @ipv4={[], [0xff, 0xff], @remote={0xac, 0x14, 0xffffffffffffffff, 0xbb}}}}}}}}}, 0x0) 2018/04/11 12:44:44 executing program 6: r0 = socket$inet6(0xa, 0x80003, 0xff) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @ipv4={[], [0xff, 0xff], @dev={0xac, 0x14, 0x14, 0x1b}}}, 0x1c) sendmsg(r0, &(0x7f000001b000)={0x0, 0xfffffff5, &(0x7f0000019fa0), 0x23, &(0x7f000001ef08)}, 0x0) 2018/04/11 12:44:44 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000000), 0x216) sendmsg$key(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000080)={0x2, 0x0, 0x1, 0xf, 0xa, 0x0, 0x70bd28, 0x25dfdbfe, [@sadb_x_policy={0x8, 0x12, 0x3, 0x3, 0x0, 0x6e6bbb, 0x5, {0x6, 0xff, 0xbc8c, 0xe356, 0x0, 0x81, 0x0, @in=@dev={0xac, 0x14, 0x14, 0x14}, @in6=@mcast2={0xff, 0x2, [], 0x1}}}]}, 0x50}, 0x1}, 0x0) sendmsg$key(r0, &(0x7f0000000b00)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000001000)={0x2, 0xa, 0x0, 0x0, 0x2}, 0x10}, 0x1}, 0x0) sendmsg$key(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000040)={0x2, 0x12, 0x0, 0x0, 0x2}, 0x10}, 0x1}, 0x8000) 2018/04/11 12:44:44 executing program 2: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x1e, 0x0, 0x0) setsockopt$packet_tx_ring(r0, 0x10f, 0x87, &(0x7f0000b89fe4)=@req={0x772}, 0x10) sendmsg(r0, &(0x7f0000030000)={&(0x7f00004f5000)=@generic={0x10000000001e, "0100000900000000000000000226cc573c080000003724c71e14dd6a739effea1b48006be61ffe0000e103000000f8000004003f010039d8f986ff01000300000004af50d50700000000000000e3ad316a1983000000001d00e0dfcb24281e27800000100076c3979ac40000bd15020078a1dfd300881a8365b1b16d7436"}, 0x80, &(0x7f0000447ff0), 0x0, &(0x7f00006e9c68)}, 0x0) 2018/04/11 12:44:44 executing program 0: r0 = openat$audio(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/audio\x00', 0x200001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x19, &(0x7f0000000100)=0x1f, 0x4) r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$SO_TIMESTAMPING(r1, 0x1, 0x25, &(0x7f0000000000)=0x802, 0x4) setsockopt$inet_tcp_int(r1, 0x6, 0x10000000013, &(0x7f000039c000)=0x400000000000001, 0x4) setsockopt$inet_tcp_int(r1, 0x6, 0x14, &(0x7f00000b2000)=0xffffffffffffffff, 0x4) bind$inet(r1, &(0x7f0000b55000)={0x2, 0x4e22}, 0x10) sendto$inet(r1, &(0x7f00005c9000), 0x252, 0x800000020000000, &(0x7f0000303000)={0x2, 0x4e22, @loopback=0x7f000001}, 0x10) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(r1, 0x6, 0x1d, &(0x7f0000965fec)={0x40000004, 0x800000000000852b, 0xffff, 0x10000007fffffff}, 0x14) writev(r1, &(0x7f00000002c0)=[{&(0x7f0000000480)="b8", 0x1}], 0x1) sendto$inet(r1, &(0x7f0000000080)="f52f", 0x2, 0x1, &(0x7f0000000140)={0x2, 0x0, @multicast2=0xe0000002}, 0x10) setsockopt$sock_int(r1, 0x1, 0x8, &(0x7f000020affc), 0x4) r2 = socket$inet6_sctp(0xa, 0x5, 0x84) setsockopt$inet_sctp6_SCTP_I_WANT_MAPPED_V4_ADDR(r2, 0x84, 0xc, &(0x7f0000000040)=0x5, 0x4) shutdown(r1, 0x1) 2018/04/11 12:44:44 executing program 7: syz_emit_ethernet(0x66, &(0x7f0000000000)={@random="cd3997030f00", @empty=[0x0, 0x0, 0x0, 0x2800000000000000], [], {@ipv6={0x86dd, {0x0, 0x6, "b40900", 0x30, 0x67, 0x0, @ipv4={[], [0xff, 0xff], @multicast2=0xe0000002}, @mcast2={0xff, 0x2, [], 0x1}, {[], @icmpv6=@time_exceed={0x21, 0x0, 0x0, 0x0, [], {0x0, 0x6, "b680fa", 0x0, 0x0, 0x0, @ipv4={[], [0xff, 0xff], @broadcast=0xffffffff}, @ipv4={[], [0xff, 0xff], @remote={0xac, 0x14, 0xffffffffffffffff, 0xbb}}}}}}}}}, 0x0) 2018/04/11 12:44:44 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000000), 0x216) sendmsg$key(r0, &(0x7f0000000b00)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000001000)={0x2, 0xa, 0x0, 0x0, 0x2}, 0x10}, 0x1}, 0x0) sendmsg$key(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000001c0)=ANY=[@ANYBLOB="02120000020000000000dd0000000000d81509c1a2b71f82b019e1fb113b610f66fe972b52c107d7634addcf3f3d19e1a907fa48832f16654e5c6c8f5eef4477087bbe179957d2dba0641a78bd6fa7d378d2aa888801cd8dbf20c5995f43e949a8022c6d3d24f9c0f36e35fd1de08f36ebc65a2798e511c79e32d8098ae1d6bc0259416dfbd911b0ab038b3e8adf1fad8fe1385c74937bdc62b72ebb9b83b8badad19502b6d444babe6265ee459c79d263f31d3d3949134246b877c8687b5178e561722447a66cb1d83b0dc7599a172596b97edd3cb36c3d8dc0ced1de"], 0x10}, 0x1}, 0x0) 2018/04/11 12:44:45 executing program 6: r0 = socket$inet6(0xa, 0x80003, 0xff) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @ipv4={[], [0xff, 0xff], @dev={0xac, 0x14, 0x14, 0x1b}}}, 0x1c) sendmsg(r0, &(0x7f000001b000)={0x0, 0xfffffff5, &(0x7f0000019fa0), 0x1cb, &(0x7f000001ef08)}, 0x0) 2018/04/11 12:44:45 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$SO_TIMESTAMPING(r0, 0x1, 0x25, &(0x7f0000000000)=0x802, 0x4) setsockopt$inet_tcp_int(r0, 0x6, 0x10000000013, &(0x7f000039c000)=0x400000000000001, 0x4) setsockopt$inet_tcp_int(r0, 0x6, 0x14, &(0x7f00000b2000)=0xffffffffffffffff, 0x4) bind$inet(r0, &(0x7f0000b55000)={0x2, 0x4e22}, 0x10) sendto$inet(r0, &(0x7f00005c9000), 0x252, 0x800000020000000, &(0x7f0000303000)={0x2, 0x4e22, @loopback=0x7f000001}, 0x10) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(r0, 0x6, 0x1d, &(0x7f0000965fec)={0x1000, 0x800000000000852b, 0xffff, 0x10000007fffffff, 0x3}, 0x14) writev(r0, &(0x7f00000002c0)=[{&(0x7f0000000480)="b8", 0x1}], 0x1) sendto$inet(r0, &(0x7f0000000080)="f52f", 0x2, 0x1, &(0x7f0000000140)={0x2, 0x0, @multicast2=0xe0000002}, 0x10) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f000020affc), 0x4) shutdown(r0, 0x1) 2018/04/11 12:44:45 executing program 7: syz_emit_ethernet(0x66, &(0x7f0000000000)={@random="cd3997030f00", @empty=[0x0, 0x0, 0x0, 0x5000000], [], {@ipv6={0x86dd, {0x0, 0x6, "b40900", 0x30, 0x67, 0x0, @ipv4={[], [0xff, 0xff], @multicast2=0xe0000002}, @mcast2={0xff, 0x2, [], 0x1}, {[], @icmpv6=@time_exceed={0x21, 0x0, 0x0, 0x0, [], {0x0, 0x6, "b680fa", 0x0, 0x0, 0x0, @ipv4={[], [0xff, 0xff], @broadcast=0xffffffff}, @ipv4={[], [0xff, 0xff], @remote={0xac, 0x14, 0xffffffffffffffff, 0xbb}}}}}}}}}, 0x0) 2018/04/11 12:44:45 executing program 2: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x1e, 0x1, 0x0) setsockopt$packet_tx_ring(0xffffffffffffffff, 0x10f, 0x87, &(0x7f0000b89fe4)=@req={0x772}, 0x10) sendmsg(r0, &(0x7f0000030000)={&(0x7f00004f5000)=@generic={0x10000000001e, "0100000900000000000000000226cc573c080000003724c71e14dd6a739effea1b48006be61ffe0000e103000000f8000004003f010039d8f986ff01000300000004af50d50700000000000000e3ad316a1983000000001d00e0dfcb24281e27800000100076c3979ac40000bd15020078a1dfd300881a8365b1b16d7436"}, 0x80, &(0x7f0000447ff0), 0x0, &(0x7f00006e9c68)}, 0x0) 2018/04/11 12:44:45 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000000), 0x216) sendmsg$key(r0, &(0x7f0000000b00)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000001000)={0x2, 0xa, 0x0, 0x0, 0x2}, 0x10}, 0x1}, 0x0) sendmsg$key(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000040)=ANY=[@ANYBLOB="02120000020000be00000000052996d3"], 0x10}, 0x1}, 0x0) r1 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000080)='/dev/hwrng\x00', 0x80, 0x0) getsockopt$bt_l2cap_L2CAP_OPTIONS(r1, 0x6, 0x1, &(0x7f00000000c0), &(0x7f0000000100)=0xc) ftruncate(r0, 0xc2) ioctl$SNDRV_TIMER_IOCTL_GINFO(r0, 0xc0f85403, &(0x7f00000001c0)={{0x3, 0x3, 0x9, 0x1, 0x3ff}, 0x3, 0x5, 'id0\x00', 'timer1\x00', 0x0, 0x9, 0x8, 0x4887e8a6, 0x80e}) 2018/04/11 12:44:45 executing program 3: semop(0x0, &(0x7f000001a000)=[{0x0, 0xffffffffffff0001}, {}], 0x2) timer_create(0x0, &(0x7f0000cd0000)={0x0, 0x12}, &(0x7f0000044000)) timer_settime(0x0, 0x0, &(0x7f00004b1fe0)={{0x0, 0x1c9c380}, {0x0, 0x9}}, &(0x7f0000040000)) r0 = getpgid(0x0) tkill(0x0, 0x1000000000016) 2018/04/11 12:44:45 executing program 4: mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x1, 0x32, 0xffffffffffffffff, 0x0) pipe2(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x7ffff) r2 = userfaultfd(0x0) ioctl$UFFDIO_API(r2, 0xc018aa3f, &(0x7f0000bc8000)={0xaa}) ioctl$UFFDIO_REGISTER(r2, 0xc020aa00, &(0x7f0000d62fe0)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) write$sndseq(r1, &(0x7f0000011fd2), 0xfffffdaa) read(r0, &(0x7f0000000000)=""/126, 0xfffffeab) ioctl$FIONREAD(r1, 0x541b, &(0x7f0000604ffc)) dup2(r0, r2) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_PORT(r0, 0xc0a85352, &(0x7f0000000140)={{0x1ff}, 'port0\x00', 0x0, 0x80000, 0x7, 0x9, 0xb49, 0x7fc, 0x9, 0x0, 0x4, 0x761}) 2018/04/11 12:44:45 executing program 6: r0 = socket$inet6(0xa, 0x80003, 0xff) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @ipv4={[], [0xff, 0xff], @dev={0xac, 0x14, 0x14, 0x1b}}}, 0x1c) sendmsg(r0, &(0x7f000001b000)={0x0, 0xfffffff5, &(0x7f0000019fa0), 0x1e1, &(0x7f000001ef08)}, 0x0) 2018/04/11 12:44:45 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$SO_TIMESTAMPING(r0, 0x1, 0x25, &(0x7f0000000000)=0x802, 0x4) setsockopt$inet_tcp_int(r0, 0x6, 0x10000000013, &(0x7f000039c000)=0x400000000000001, 0x4) setsockopt$inet_tcp_int(r0, 0x6, 0x14, &(0x7f00000b2000)=0xffffffffffffffff, 0x4) bind$inet(r0, &(0x7f0000b55000)={0x2, 0x4e22}, 0x10) sendto$inet(r0, &(0x7f00005c9000), 0x252, 0x800000020000000, &(0x7f0000303000)={0x2, 0x4e22, @loopback=0x7f000001}, 0x10) ioctl$SNDRV_SEQ_IOCTL_DELETE_PORT(r0, 0x40a85321, &(0x7f0000000180)={{0xfff, 0x1}, 'port1\x00', 0x4b, 0x1010, 0x1ff, 0x71211010, 0x3, 0x75, 0x80000001, 0x0, 0x6, 0xff}) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(r0, 0x6, 0x1d, &(0x7f0000965fec)={0x40000004, 0x800000000000852b, 0xffff, 0x10000007fffffff}, 0x14) writev(r0, &(0x7f00000002c0)=[{&(0x7f0000000480)="b8", 0x1}], 0x1) sendto$inet(r0, &(0x7f0000000080)="f52f", 0x2, 0x1, &(0x7f0000000140)={0x2, 0x0, @multicast2=0xe0000002}, 0x10) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f000020affc), 0x4) shutdown(r0, 0x1) 2018/04/11 12:44:45 executing program 7: syz_emit_ethernet(0x66, &(0x7f0000000000)={@random="cd3997030f00", @empty=[0x0, 0x0, 0x0, 0x88caffff], [], {@ipv6={0x86dd, {0x0, 0x6, "b40900", 0x30, 0x67, 0x0, @ipv4={[], [0xff, 0xff], @multicast2=0xe0000002}, @mcast2={0xff, 0x2, [], 0x1}, {[], @icmpv6=@time_exceed={0x21, 0x0, 0x0, 0x0, [], {0x0, 0x6, "b680fa", 0x0, 0x0, 0x0, @ipv4={[], [0xff, 0xff], @broadcast=0xffffffff}, @ipv4={[], [0xff, 0xff], @remote={0xac, 0x14, 0xffffffffffffffff, 0xbb}}}}}}}}}, 0x0) 2018/04/11 12:44:45 executing program 2: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x1e, 0x1, 0x0) setsockopt$packet_tx_ring(0xffffffffffffffff, 0x10f, 0x87, &(0x7f0000b89fe4)=@req={0x772}, 0x10) sendmsg(r0, &(0x7f0000030000)={&(0x7f00004f5000)=@generic={0x10000000001e, "0100000900000000000000000226cc573c080000003724c71e14dd6a739effea1b48006be61ffe0000e103000000f8000004003f010039d8f986ff01000300000004af50d50700000000000000e3ad316a1983000000001d00e0dfcb24281e27800000100076c3979ac40000bd15020078a1dfd300881a8365b1b16d7436"}, 0x80, &(0x7f0000447ff0), 0x0, &(0x7f00006e9c68)}, 0x0) 2018/04/11 12:44:45 executing program 4: perf_event_open(&(0x7f00000000c0)={0x2, 0x70, 0x3e2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f00000003c0)={&(0x7f0000000400)={0x10}, 0xc, &(0x7f0000000040)={&(0x7f0000000480)={0x14, 0x2, 0x6, 0x301}, 0x14}, 0x1}, 0x0) 2018/04/11 12:44:45 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000000), 0x216) r1 = syz_open_dev$admmidi(&(0x7f00000001c0)='/dev/admmidi#\x00', 0x1d, 0x200) ioctl$KVM_GET_XSAVE(r1, 0x9000aea4, &(0x7f0000000200)) sendmsg$key(r0, &(0x7f0000000b00)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000001000)={0x2, 0xa, 0x0, 0x0, 0x2}, 0x10}, 0x1}, 0x0) socketpair$inet_sctp(0x2, 0x5, 0x84, &(0x7f0000000080)={0xffffffffffffffff}) accept4$inet(r2, &(0x7f00000000c0)={0x0, 0x0, @loopback}, &(0x7f0000000100)=0x10, 0x80000) sendmsg$key(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000040)=ANY=[@ANYBLOB="02120000020000000000000000000004"], 0x10}, 0x1}, 0x0) 2018/04/11 12:44:45 executing program 6: r0 = socket$inet6(0xa, 0x80003, 0xff) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @ipv4={[], [0xff, 0xff], @dev={0xac, 0x14, 0x14, 0x1b}}}, 0x1c) sendmsg(r0, &(0x7f000001b000)={0x0, 0xfffffff5, &(0x7f0000019fa0), 0x16d, &(0x7f000001ef08)}, 0x0) 2018/04/11 12:44:45 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$SO_TIMESTAMPING(r0, 0x1, 0x25, &(0x7f0000000000)=0x802, 0x4) setsockopt$inet_tcp_int(r0, 0x6, 0x10000000013, &(0x7f000039c000)=0x400000000000001, 0x4) setsockopt$inet_tcp_int(r0, 0x6, 0x14, &(0x7f00000b2000)=0xffffffffffffffff, 0x4) bind$inet(r0, &(0x7f0000b55000)={0x2, 0x4e22}, 0x10) sendto$inet(r0, &(0x7f00005c9000), 0x252, 0x800000020000000, &(0x7f0000303000)={0x2, 0x4e22, @loopback=0x7f000001}, 0x10) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(r0, 0x6, 0x1d, &(0x7f0000965fec)={0x40000004, 0x800000000000852b, 0xffff, 0x10000007fffffff}, 0x14) writev(r0, &(0x7f00000002c0)=[{&(0x7f0000000480)="b8", 0x1}], 0x1) sendto$inet(r0, &(0x7f0000000080)="f52f", 0x2, 0x1, &(0x7f0000000140)={0x2, 0x0, @multicast2=0xe0000002}, 0x10) r1 = syz_open_dev$sg(&(0x7f0000000100)='/dev/sg#\x00', 0xfffffffffffffff8, 0x4000) bind$alg(r1, &(0x7f0000000180)={0x26, 'skcipher\x00', 0x0, 0x0, 'pcbc(tea-generic)\x00'}, 0x58) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f000020affc), 0x4) r2 = syz_open_dev$mice(&(0x7f0000000040)='/dev/input/mice\x00', 0x0, 0x40) connect$l2tp(r2, &(0x7f00000000c0)=@pppol2tpv3={0x18, 0x1, {0x0, r0, {0x2, 0x4e21, @broadcast=0xffffffff}, 0x2, 0x4, 0x1}}, 0x2e) shutdown(r0, 0x1) 2018/04/11 12:44:45 executing program 7: syz_emit_ethernet(0x66, &(0x7f0000000000)={@random="cd3997030f00", @empty=[0x0, 0x0, 0x0, 0x543], [], {@ipv6={0x86dd, {0x0, 0x6, "b40900", 0x30, 0x67, 0x0, @ipv4={[], [0xff, 0xff], @multicast2=0xe0000002}, @mcast2={0xff, 0x2, [], 0x1}, {[], @icmpv6=@time_exceed={0x21, 0x0, 0x0, 0x0, [], {0x0, 0x6, "b680fa", 0x0, 0x0, 0x0, @ipv4={[], [0xff, 0xff], @broadcast=0xffffffff}, @ipv4={[], [0xff, 0xff], @remote={0xac, 0x14, 0xffffffffffffffff, 0xbb}}}}}}}}}, 0x0) 2018/04/11 12:44:45 executing program 4: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff7fffffffffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000200)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc-cast5-avx\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00003bcfd0)="d3ab27191a", 0x5) sendmmsg$alg(r1, &(0x7f0000007e40)=[{0x0, 0x0, &(0x7f0000000900)}], 0x1, 0x0) accept(r0, &(0x7f0000000040)=@pppol2tpv3in6, &(0x7f00000000c0)=0x80) 2018/04/11 12:44:45 executing program 5: r0 = syz_open_dev$admmidi(&(0x7f0000000080)='/dev/admmidi#\x00', 0x8001, 0x20000) ioctl$sock_inet_SIOCSIFPFLAGS(r0, 0x8934, &(0x7f00000000c0)={'bridge0\x00', 0xe3}) r1 = socket$key(0xf, 0x3, 0x2) setsockopt$sock_int(r1, 0x1, 0x8, &(0x7f0000000000), 0x216) sendmsg$key(r1, &(0x7f0000000b00)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000100)=ANY=[@ANYBLOB="020a0000020000bd78b1ec1a49ace3ab58ed86ecce6aab7a18000000000000"], 0x10}, 0x1}, 0x0) sendmsg$key(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000040)={0x2, 0x12, 0x0, 0x0, 0x2}, 0x10}, 0x1}, 0x0) 2018/04/11 12:44:46 executing program 2: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x1e, 0x1, 0x0) setsockopt$packet_tx_ring(0xffffffffffffffff, 0x10f, 0x87, &(0x7f0000b89fe4)=@req={0x772}, 0x10) sendmsg(r0, &(0x7f0000030000)={&(0x7f00004f5000)=@generic={0x10000000001e, "0100000900000000000000000226cc573c080000003724c71e14dd6a739effea1b48006be61ffe0000e103000000f8000004003f010039d8f986ff01000300000004af50d50700000000000000e3ad316a1983000000001d00e0dfcb24281e27800000100076c3979ac40000bd15020078a1dfd300881a8365b1b16d7436"}, 0x80, &(0x7f0000447ff0), 0x0, &(0x7f00006e9c68)}, 0x0) 2018/04/11 12:44:46 executing program 6: r0 = socket$inet6(0xa, 0x80003, 0xff) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @ipv4={[], [0xff, 0xff], @dev={0xac, 0x14, 0x14, 0x1b}}}, 0x1c) sendmsg(r0, &(0x7f000001b000)={0x0, 0xfffffff5, &(0x7f0000019fa0), 0x88, &(0x7f000001ef08)}, 0x0) 2018/04/11 12:44:46 executing program 4: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff7fffffffffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000200)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc-cast5-avx\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00003bcfd0)="d3ab27191a", 0x5) sendmmsg$alg(r1, &(0x7f0000007e40)=[{0x0, 0x0, &(0x7f0000000900)}], 0x1, 0x0) accept(r0, &(0x7f0000000040)=@pppol2tpv3in6, &(0x7f00000000c0)=0x80) 2018/04/11 12:44:46 executing program 7: syz_emit_ethernet(0x66, &(0x7f0000000000)={@random="cd3997030f00", @empty=[0x0, 0x0, 0x0, 0x2], [], {@ipv6={0x86dd, {0x0, 0x6, "b40900", 0x30, 0x67, 0x0, @ipv4={[], [0xff, 0xff], @multicast2=0xe0000002}, @mcast2={0xff, 0x2, [], 0x1}, {[], @icmpv6=@time_exceed={0x21, 0x0, 0x0, 0x0, [], {0x0, 0x6, "b680fa", 0x0, 0x0, 0x0, @ipv4={[], [0xff, 0xff], @broadcast=0xffffffff}, @ipv4={[], [0xff, 0xff], @remote={0xac, 0x14, 0xffffffffffffffff, 0xbb}}}}}}}}}, 0x0) 2018/04/11 12:44:46 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$SO_TIMESTAMPING(r0, 0x1, 0x25, &(0x7f0000000000)=0x802, 0x4) setsockopt$inet_tcp_int(r0, 0x6, 0x10000000013, &(0x7f000039c000)=0x400000000000001, 0x4) setsockopt$inet_tcp_int(r0, 0x6, 0x14, &(0x7f00000b2000)=0xffffffffffffffff, 0x4) bind$inet(r0, &(0x7f0000b55000)={0x2, 0x4e22}, 0x10) sendto$inet(r0, &(0x7f00005c9000), 0x252, 0x800000020000000, &(0x7f0000303000)={0x2, 0x4e22, @loopback=0x7f000001}, 0x10) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(r0, 0x6, 0x1d, &(0x7f0000965fec)={0x40000004, 0x800000000000852b, 0xffff, 0x10000007fffffff}, 0x14) writev(r0, &(0x7f00000002c0)=[{&(0x7f0000000480)="b8", 0x1}], 0x1) sendto$inet(r0, &(0x7f0000000080)="f52f", 0x2, 0x1, &(0x7f0000000140)={0x2, 0x0, @multicast2=0xe0000002}, 0x10) r1 = syz_open_dev$audion(&(0x7f0000000040)='/dev/audio#\x00', 0x2, 0x82402) ioctl$EVIOCGABS3F(r1, 0x8018457f, &(0x7f0000000180)=""/147) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f000020affc), 0x4) shutdown(r0, 0x1) 2018/04/11 12:44:46 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) setsockopt$sock_int(r0, 0x1, 0x4, &(0x7f0000000000), 0x4) sendmsg$key(r0, &(0x7f0000000b00)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000001000)={0x2, 0xa, 0x20, 0x0, 0x1ffffffffffffee2}, 0x10}, 0x1}, 0x40c0) sendmsg$key(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000040)=ANY=[@ANYBLOB="02120000ff0000000000000000000000"], 0x10}, 0x1}, 0x0) r1 = request_key(&(0x7f0000000540)='id_le acy\x00', &(0x7f00000005c0)={0x73, 0x79, 0x7a, 0x1}, &(0x7f0000000580)='id_legacy\x00', 0xfffffffffffffffd) sendmsg$key(r0, &(0x7f0000000500)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000200)={0x2, 0x10, 0x6, 0x8, 0x9, 0x0, 0x70bd2d, 0x25dfdbfb, [@sadb_x_nat_t_port={0x1, 0x0, 0x4e22}, @sadb_ident={0x2, 0xb, 0x8, 0x0, 0x7}, @sadb_sa={0x2, 0x1, 0x4d2, 0xffffffff, 0x3, 0xd4, 0x4, 0x1}, @sadb_spirange={0x2, 0x10, 0x4d6, 0x4d5}]}, 0x48}, 0x1}, 0x50) r2 = add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000080)={0x73, 0x79, 0x7a, 0x2}, &(0x7f0000000600)="52b87b3cb089326cf5355ab0bb7c09a2c1d37254ba60b08512fe61a863344a10647050963e4f7911f09b060b4a22e15ef619a89a85edd3f0ad55fa9810321a7661c66049ee24f22ccc5a22b0fba12e032f2d417784c6c9176be3621ef51f379d90e8678461d450f056894558b41934bd4bdd08abcc000000000000", 0x7b, r1) r3 = add_key$user(&(0x7f00000002c0)='user\x00', &(0x7f0000000300)={0x73, 0x79, 0x7a, 0x1}, &(0x7f0000000340)='T', 0x1, 0xfffffffffffffff8) keyctl$dh_compute(0x17, &(0x7f0000000380)={r1, r2, r3}, &(0x7f00000003c0)=""/127, 0x7f, &(0x7f00000004c0)={&(0x7f0000000440)={'sha224-avx\x00'}, &(0x7f0000000480)="ce20f2866515cc317484cd7aa619ae8008ecb5a8fced08deb046f416f52b341f629ebb8b3dccbb38", 0x28}) r4 = syz_open_dev$audion(&(0x7f00000001c0)='/dev/audio#\x00', 0x80000000, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r4, 0x0, 0x10, &(0x7f0000000680)={{{@in=@multicast1, @in6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@broadcast}}}, &(0x7f0000000780)=0xe8) getresuid(&(0x7f00000007c0), &(0x7f0000000800)=0x0, &(0x7f0000000840)) setsockopt$inet6_IPV6_IPSEC_POLICY(r4, 0x29, 0x22, &(0x7f0000000880)={{{@in=@multicast1=0xe0000001, @in6=@dev={0xfe, 0x80, [], 0xf}, 0x4e24, 0x0, 0x4e23, 0x8b, 0x2, 0x80, 0xa0, 0x2c, r5, r6}, {0x6, 0x3, 0x4bcd, 0x200, 0xfffffffffffffffa, 0x0, 0x3, 0x81ee}, {0xffffffffffff7fff, 0x0, 0x3f, 0x8}, 0x5, 0x0, 0x0, 0x1, 0x3, 0x2}, {{@in=@broadcast=0xffffffff, 0x4d2, 0x2b}, 0xa, @in6=@dev={0xfe, 0x80, [], 0x18}, 0x0, 0x7, 0x3, 0x2, 0x2, 0x6, 0xdc81}}, 0xe8) ioctl$VT_ACTIVATE(r4, 0x5606, 0x6c) 2018/04/11 12:44:46 executing program 3: semop(0x0, &(0x7f000001a000)=[{0x0, 0xffffffffffff0001}, {}], 0x2) timer_create(0x0, &(0x7f0000cd0000)={0x0, 0x12}, &(0x7f0000044000)) timer_settime(0x0, 0x0, &(0x7f00004b1fe0)={{0x0, 0x1c9c380}, {0x0, 0x9}}, &(0x7f0000040000)) r0 = getpgid(0x0) tkill(0x0, 0x1000000000016) 2018/04/11 12:44:46 executing program 1: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000300)={&(0x7f00000002c0)={0x10}, 0xc, &(0x7f0000fe8000)={&(0x7f0000000180)=@updsa={0x120, 0x1a, 0xa09, 0x0, 0x0, {{@in=@dev={0xac, 0x14}, @in=@local={0xac, 0x14, 0xffffffffffffffff, 0xaa}}, {@in6=@ipv4={[], [0xff, 0xff], @local={0xac, 0x14, 0xffffffffffffffff, 0xaa}}, 0x0, 0x3c}, @in, {}, {}, {}, 0x0, 0x0, 0x2}, [@replay_esn_val={0x1c, 0x17}, @coaddr={0x14, 0xe, @in=@loopback=0x7f000001}]}, 0x120}, 0x1}, 0x0) 2018/04/11 12:44:46 executing program 1: mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x1, 0x32, 0xffffffffffffffff, 0x0) pipe2(&(0x7f0000f61000)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) r2 = userfaultfd(0x0) ioctl$UFFDIO_API(r2, 0xc018aa3f, &(0x7f0000bc8000)={0xaa}) ioctl$UFFDIO_REGISTER(r2, 0xc020aa00, &(0x7f0000d62fe0)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) write$sndseq(r1, &(0x7f00000001c0)=[{0x3ff, 0x101, 0x8, 0x5, @time, {0x461, 0x66b}, {0x8, 0x3f}, @control={0x80000000, 0x400, 0x800}}, {0xfffffffffffffff8, 0x8, 0xa0, 0x361, @tick=0x8, {0x8, 0x5}, {0x1, 0x3ff}, @time=@tick=0x6}, {0x10, 0xcae, 0x7, 0x2, @tick=0x101, {0xffffffffffffffff}, {0x4079b10f0, 0x1}, @note={0x1, 0x1, 0x800, 0x0, 0xce75}}], 0x90) read(r0, &(0x7f0000000000)=""/126, 0xfffffeab) pipe2(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x1, 0x32, 0xffffffffffffffff, 0x0) r5 = userfaultfd(0x0) ioctl$UFFDIO_API(r5, 0xc018aa3f, &(0x7f0000bc8000)={0xaa}) ioctl$UFFDIO_REGISTER(r5, 0xc020aa00, &(0x7f0000000140)={{&(0x7f0000012000/0x2000)=nil, 0x2000}, 0x1}) write$sndseq(r4, &(0x7f0000011fd2)=[{0x0, 0x0, 0x0, 0x0, @time, {}, {}, @time=@time={0x77359400}}], 0x30) fcntl$setstatus(r3, 0x4, 0x2000) ioctl$int_in(r3, 0x5452, &(0x7f0000000100)=0x2000003) dup2(r3, r5) ioctl$FIONREAD(r1, 0x541b, &(0x7f0000604ffc)) ioctl$DRM_IOCTL_MODESET_CTL(r1, 0x40086408, &(0x7f0000000080)={0x8, 0x4}) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r1, 0x84, 0x8, &(0x7f0000000180)=0x6, 0x4) r6 = dup2(r1, r1) ioctl$FIONREAD(r6, 0x541b, &(0x7f00000000c0)) 2018/04/11 12:44:46 executing program 7: syz_emit_ethernet(0x66, &(0x7f0000000000)={@random="cd3997030f00", @empty=[0x0, 0x0, 0x0, 0x8], [], {@ipv6={0x86dd, {0x0, 0x6, "b40900", 0x30, 0x67, 0x0, @ipv4={[], [0xff, 0xff], @multicast2=0xe0000002}, @mcast2={0xff, 0x2, [], 0x1}, {[], @icmpv6=@time_exceed={0x21, 0x0, 0x0, 0x0, [], {0x0, 0x6, "b680fa", 0x0, 0x0, 0x0, @ipv4={[], [0xff, 0xff], @broadcast=0xffffffff}, @ipv4={[], [0xff, 0xff], @remote={0xac, 0x14, 0xffffffffffffffff, 0xbb}}}}}}}}}, 0x0) 2018/04/11 12:44:46 executing program 6: r0 = socket$inet6(0xa, 0x80003, 0xff) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @ipv4={[], [0xff, 0xff], @dev={0xac, 0x14, 0x14, 0x1b}}}, 0x1c) sendmsg(r0, &(0x7f000001b000)={0x0, 0xfffffff5, &(0x7f0000019fa0), 0x187, &(0x7f000001ef08)}, 0x0) 2018/04/11 12:44:46 executing program 4: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff7fffffffffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000200)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc-cast5-avx\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00003bcfd0)="d3ab27191a", 0x5) sendmmsg$alg(r1, &(0x7f0000007e40)=[{0x0, 0x0, &(0x7f0000000900)}], 0x1, 0x0) accept(r0, &(0x7f0000000040)=@pppol2tpv3in6, &(0x7f00000000c0)=0x80) 2018/04/11 12:44:46 executing program 2: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x1e, 0x1, 0x0) setsockopt$packet_tx_ring(r0, 0x10f, 0x87, &(0x7f0000b89fe4), 0x10) sendmsg(r0, &(0x7f0000030000)={&(0x7f00004f5000)=@generic={0x10000000001e, "0100000900000000000000000226cc573c080000003724c71e14dd6a739effea1b48006be61ffe0000e103000000f8000004003f010039d8f986ff01000300000004af50d50700000000000000e3ad316a1983000000001d00e0dfcb24281e27800000100076c3979ac40000bd15020078a1dfd300881a8365b1b16d7436"}, 0x80, &(0x7f0000447ff0), 0x0, &(0x7f00006e9c68)}, 0x0) 2018/04/11 12:44:46 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$SO_TIMESTAMPING(r0, 0x1, 0x25, &(0x7f0000000000)=0x802, 0x4) setsockopt$inet_tcp_int(r0, 0x6, 0x10000000013, &(0x7f000039c000)=0x400000000000001, 0x4) setsockopt$inet_tcp_int(r0, 0x6, 0x14, &(0x7f00000b2000)=0xffffffffffffffff, 0x4) bind$inet(r0, &(0x7f0000b55000)={0x2, 0x4e22}, 0x10) r1 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vga_arbiter\x00', 0x80, 0x0) ioctl$sock_inet6_tcp_SIOCOUTQNSD(r1, 0x894b, &(0x7f00000000c0)) sendto$inet(r0, &(0x7f0000000300), 0x0, 0x800000020000002, &(0x7f0000303000)={0x2, 0x4e22, @loopback=0x7f000001}, 0x10) getsockopt$inet_mreqsrc(r0, 0x0, 0x25, &(0x7f00000001c0)={@broadcast, @rand_addr, @loopback}, &(0x7f0000000200)=0xc) getsockopt$netlink(r1, 0x10e, 0x9, &(0x7f00000004c0)=""/158, &(0x7f0000000400)=0x9e) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(r0, 0x6, 0x1d, &(0x7f0000965fec)={0x40000004, 0x800000000000852b, 0xffff, 0x10000007fffffff}, 0x14) writev(r0, &(0x7f00000002c0)=[{&(0x7f0000000480)="b8", 0x1}], 0x1) sendto$inet(r0, &(0x7f0000000080)="f52f", 0x2, 0x1, &(0x7f0000000140)={0x2, 0x0, @multicast2=0xe0000002}, 0x10) setsockopt$sock_int(r0, 0x1, 0x200000009, &(0x7f0000000100)=0x4000000000, 0x4) connect$ax25(r1, &(0x7f0000000180)={0x3, {"c5f963f49020b3"}, 0x7}, 0x10) exit_group(0x3ff) setsockopt$packet_fanout(r1, 0x107, 0x12, &(0x7f0000000240)={0x9, 0x2, 0x1000}, 0x4) ioctl$sock_proto_private(r0, 0x89e3, &(0x7f0000000300)="b67021bfacef29016513e499d39b92d79f0775d2a80d039fde0432ddcaaec52c1361dd2f18a18fb20686344c16e77c69ba6bc616f699a8e84c1774766a4917bb098d5bf0810879bedcaad5dbf8e8d2bdb390d5c2ecc139a793591a8d267f0308cb5925dbd04a91b85c592de0b5fb47b60424f5f25be1f6e9f2984b0c59869f6e30ca2cdd31533419a394b36506ef8a695472629b2ce327d5b121219770f87352f915076f12c8477120592370860bfc18a67210fc14f69825959e2641a9a9c7de1a280ca367417ba03ecfdea3") shutdown(r0, 0x1) syz_open_dev$dmmidi(&(0x7f0000000280)='/dev/dmmidi#\x00', 0x7, 0x0) 2018/04/11 12:44:46 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000000), 0x216) ioprio_set$uid(0x3, 0x0, 0x2000) sendmsg$key(r0, &(0x7f0000000b00)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000001000)={0x2, 0xa, 0x0, 0x0, 0x2}, 0x10}, 0x1}, 0x0) sendmsg$key(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000040)={0x2, 0x12, 0x0, 0x0, 0x2}, 0x10}, 0x1}, 0x0) 2018/04/11 12:44:46 executing program 6: r0 = socket$inet6(0xa, 0x80003, 0xff) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @ipv4={[], [0xff, 0xff], @dev={0xac, 0x14, 0x14, 0x1b}}}, 0x1c) sendmsg(r0, &(0x7f000001b000)={0x0, 0xfffffff5, &(0x7f0000019fa0), 0x14d, &(0x7f000001ef08)}, 0x0) 2018/04/11 12:44:46 executing program 7: syz_emit_ethernet(0x66, &(0x7f0000000000)={@random="cd3997030f00", @empty=[0x0, 0x0, 0x0, 0x8035], [], {@ipv6={0x86dd, {0x0, 0x6, "b40900", 0x30, 0x67, 0x0, @ipv4={[], [0xff, 0xff], @multicast2=0xe0000002}, @mcast2={0xff, 0x2, [], 0x1}, {[], @icmpv6=@time_exceed={0x21, 0x0, 0x0, 0x0, [], {0x0, 0x6, "b680fa", 0x0, 0x0, 0x0, @ipv4={[], [0xff, 0xff], @broadcast=0xffffffff}, @ipv4={[], [0xff, 0xff], @remote={0xac, 0x14, 0xffffffffffffffff, 0xbb}}}}}}}}}, 0x0) 2018/04/11 12:44:46 executing program 2: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x1e, 0x1, 0x0) setsockopt$packet_tx_ring(r0, 0x10f, 0x87, &(0x7f0000b89fe4), 0x10) sendmsg(r0, &(0x7f0000030000)={&(0x7f00004f5000)=@generic={0x10000000001e, "0100000900000000000000000226cc573c080000003724c71e14dd6a739effea1b48006be61ffe0000e103000000f8000004003f010039d8f986ff01000300000004af50d50700000000000000e3ad316a1983000000001d00e0dfcb24281e27800000100076c3979ac40000bd15020078a1dfd300881a8365b1b16d7436"}, 0x80, &(0x7f0000447ff0), 0x0, &(0x7f00006e9c68)}, 0x0) 2018/04/11 12:44:46 executing program 4: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff7fffffffffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000200)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc-cast5-avx\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00003bcfd0)="d3ab27191a", 0x5) sendmmsg$alg(r1, &(0x7f0000007e40)=[{0x0, 0x0, &(0x7f0000000900)}], 0x1, 0x0) accept(r0, &(0x7f0000000040)=@pppol2tpv3in6, &(0x7f00000000c0)=0x80) 2018/04/11 12:44:46 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000000b00)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000001000)={0x2, 0xa, 0x0, 0x0, 0x2}, 0x10}, 0x1}, 0x0) sendmsg$key(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000002c0)={0x2, 0x12, 0x0, 0x0, 0x2000000000000191, 0x0, 0x1, 0x0, [@sadb_x_nat_t_port={0x1, 0x15, 0x4e24}, @sadb_spirange={0x2, 0x10, 0x4d2, 0x4d5}, @sadb_ident={0x2, 0xb, 0x4, 0x0, 0x1f}]}, 0x38}, 0x1}, 0x0) 2018/04/11 12:44:46 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$SO_TIMESTAMPING(r0, 0x1, 0x25, &(0x7f0000000000)=0x802, 0x4) setsockopt$inet_tcp_int(r0, 0x6, 0x10000000013, &(0x7f000039c000)=0x400000000000001, 0x4) setsockopt$inet_tcp_int(r0, 0x6, 0x14, &(0x7f00000b2000)=0xffffffffffffffff, 0x4) bind$inet(r0, &(0x7f0000b55000)={0x2, 0x4e22}, 0x10) sendto$inet(r0, &(0x7f00005c9000), 0x252, 0x800000020000000, &(0x7f0000303000)={0x2, 0x4e22, @loopback=0x7f000001}, 0x10) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(r0, 0x6, 0x1d, &(0x7f0000965fec)={0x40000004, 0x800000000000852b, 0xffff, 0x10000007fffffff}, 0x14) writev(r0, &(0x7f00000002c0)=[{&(0x7f0000000480)="b8", 0x1}], 0x1) socketpair$inet6_udp(0xa, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$inet6_MRT6_ADD_MFC_PROXY(r1, 0x29, 0xd2, &(0x7f00000000c0)={{0xa, 0x4e22, 0x3, @local={0xfe, 0x80, [], 0xaa}, 0x9}, {0xa, 0x4e22, 0x6, @mcast2={0xff, 0x2, [], 0x1}, 0x2}, 0x971dc2a, [0xffffffffffff0001, 0x0, 0x200, 0x7, 0x5372, 0x6, 0x1, 0x3b96b7c3]}, 0x5c) sendto$inet(r0, &(0x7f0000000080)="f52f", 0x2, 0x1, &(0x7f0000000140)={0x2, 0x0, @multicast2=0xe0000002}, 0x10) setsockopt$sock_int(r0, 0x1, 0x5, &(0x7f000020affc), 0xfffffffffffffee4) shutdown(r0, 0x1) 2018/04/11 12:44:46 executing program 6: r0 = socket$inet6(0xa, 0x80003, 0xff) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @ipv4={[], [0xff, 0xff], @dev={0xac, 0x14, 0x14, 0x1b}}}, 0x1c) sendmsg(r0, &(0x7f000001b000)={0x0, 0xfffffff5, &(0x7f0000019fa0), 0xf8, &(0x7f000001ef08)}, 0x0) 2018/04/11 12:44:47 executing program 7: syz_emit_ethernet(0x66, &(0x7f0000000000)={@random="cd3997030f00", @empty=[0x0, 0x0, 0x0, 0x300], [], {@ipv6={0x86dd, {0x0, 0x6, "b40900", 0x30, 0x67, 0x0, @ipv4={[], [0xff, 0xff], @multicast2=0xe0000002}, @mcast2={0xff, 0x2, [], 0x1}, {[], @icmpv6=@time_exceed={0x21, 0x0, 0x0, 0x0, [], {0x0, 0x6, "b680fa", 0x0, 0x0, 0x0, @ipv4={[], [0xff, 0xff], @broadcast=0xffffffff}, @ipv4={[], [0xff, 0xff], @remote={0xac, 0x14, 0xffffffffffffffff, 0xbb}}}}}}}}}, 0x0) 2018/04/11 12:44:47 executing program 3: semop(0x0, &(0x7f000001a000)=[{0x0, 0xffffffffffff0001}, {}], 0x2) timer_create(0x0, &(0x7f0000cd0000)={0x0, 0x12}, &(0x7f0000044000)) timer_settime(0x0, 0x0, &(0x7f00004b1fe0)={{0x0, 0x1c9c380}, {0x0, 0x9}}, &(0x7f0000040000)) r0 = getpgid(0x0) tkill(0x0, 0x1000000000016) 2018/04/11 12:44:47 executing program 2: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x1e, 0x1, 0x0) setsockopt$packet_tx_ring(r0, 0x10f, 0x87, &(0x7f0000b89fe4), 0x10) sendmsg(r0, &(0x7f0000030000)={&(0x7f00004f5000)=@generic={0x10000000001e, "0100000900000000000000000226cc573c080000003724c71e14dd6a739effea1b48006be61ffe0000e103000000f8000004003f010039d8f986ff01000300000004af50d50700000000000000e3ad316a1983000000001d00e0dfcb24281e27800000100076c3979ac40000bd15020078a1dfd300881a8365b1b16d7436"}, 0x80, &(0x7f0000447ff0), 0x0, &(0x7f00006e9c68)}, 0x0) 2018/04/11 12:44:47 executing program 6: r0 = socket$inet6(0xa, 0x80003, 0xff) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @ipv4={[], [0xff, 0xff], @dev={0xac, 0x14, 0x14, 0x1b}}}, 0x1c) sendmsg(r0, &(0x7f000001b000)={0x0, 0xfffffff5, &(0x7f0000019fa0), 0xf, &(0x7f000001ef08)}, 0x0) 2018/04/11 12:44:47 executing program 4: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff7fffffffffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000200)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc-cast5-avx\x00'}, 0x58) accept$alg(r0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00003bcfd0)="d3ab27191a", 0x5) accept(r0, &(0x7f0000000040)=@pppol2tpv3in6, &(0x7f00000000c0)=0x80) 2018/04/11 12:44:47 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000380), 0x305) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$key(r0, &(0x7f0000000b00)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000001c0)=ANY=[@ANYBLOB="020a0000020000000000000000000000aea9f23ce6629a9bb23033114bc3b8f96131153d4b5f71fe5a4f5a54b4b51f3da5aaee11a5c4f4d20b5c6fb6c142a4b609dcc8f99bef32135c02405a6bdcc21bc20c2d71daa6bf9fff3e529c338bdf50da2bd7fb090b6500ffac2116876c76fc71558a25c0c81309f3a21f46682199bf06002ae9e7d59c00000000000000806ff8bb5510dd40889bd1e213606990f9d9662b1053d5992752d474c4bd196d19b549ff9a6da6fce22b8488c2985cf758356d93dfb193000265cfd00fd961a007714e635efb98e495286ffcd39419f7eefd93f78488873beaffb651960000000000000000000000000000"], 0x10}, 0x1}, 0x0) sendmsg$key(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000040)={0x2, 0x12, 0x0, 0x0, 0x2}, 0x10}, 0x1}, 0x0) getpeername(r0, &(0x7f00000000c0)=@pptp={0x0, 0x0, {0x0, @multicast2}}, &(0x7f00000002c0)=0x80) poll(&(0x7f0000000300)=[{r2, 0x8000}, {r1, 0x1}, {r2, 0x200}], 0x3, 0x9fdd) 2018/04/11 12:44:47 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$SO_TIMESTAMPING(r0, 0x1, 0x25, &(0x7f0000000000)=0x802, 0x4) setsockopt$inet_tcp_int(r0, 0x6, 0x10000000013, &(0x7f000039c000)=0x400000000000001, 0x4) setsockopt$inet_tcp_int(r0, 0x6, 0x14, &(0x7f00000b2000)=0xffffffffffffffff, 0x4) bind$inet(r0, &(0x7f0000b55000)={0x2, 0x4e22}, 0x10) sendto$inet(r0, &(0x7f00005c9000), 0x252, 0x800000020000000, &(0x7f0000303000)={0x2, 0x4e22, @loopback=0x7f000001}, 0x10) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(r0, 0x6, 0x1d, &(0x7f0000965fec)={0x40000004, 0x800000000000852b, 0xffff, 0x10000007fffffff}, 0x14) writev(r0, &(0x7f00000002c0)=[{&(0x7f0000000480)="b8", 0x1}], 0x1) sendto$inet(r0, &(0x7f0000000080)="f52f", 0x2, 0x1, &(0x7f0000000140)={0x2, 0x0, @multicast2=0xe0000002}, 0x10) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f000020affc), 0x4) shutdown(r0, 0x1) tee(r0, r0, 0x81, 0x2) 2018/04/11 12:44:47 executing program 1: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff7fffffffffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x1e, 0x1, 0x0) sendmsg(r0, &(0x7f0000030000)={&(0x7f00004f5000)=@generic={0x10000000001e, "0100000900000000000000000226cc573c080000003724c71e14dd6a739effea1b48006be61ffe0000e103000000f8000004003f010039d8f986ff01000300000004af50d50700000000000000e3ad316a1983000000001d00e0dfcb24281e27800000100076c3979ac40000bd15020078a1dfd300881a8365b1b16d7436"}, 0x80, &(0x7f0000447ff0), 0x0, &(0x7f00006e9c68)}, 0x0) 2018/04/11 12:44:47 executing program 7: syz_emit_ethernet(0x66, &(0x7f0000000000)={@random="cd3997030f00", @empty=[0x0, 0x0, 0x0, 0x88640000], [], {@ipv6={0x86dd, {0x0, 0x6, "b40900", 0x30, 0x67, 0x0, @ipv4={[], [0xff, 0xff], @multicast2=0xe0000002}, @mcast2={0xff, 0x2, [], 0x1}, {[], @icmpv6=@time_exceed={0x21, 0x0, 0x0, 0x0, [], {0x0, 0x6, "b680fa", 0x0, 0x0, 0x0, @ipv4={[], [0xff, 0xff], @broadcast=0xffffffff}, @ipv4={[], [0xff, 0xff], @remote={0xac, 0x14, 0xffffffffffffffff, 0xbb}}}}}}}}}, 0x0) 2018/04/11 12:44:47 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$SO_TIMESTAMPING(r0, 0x1, 0x25, &(0x7f0000000000)=0x802, 0x4) setsockopt$inet_tcp_int(r0, 0x6, 0x10000000013, &(0x7f000039c000)=0x400000000000001, 0x4) setsockopt$inet_tcp_int(r0, 0x6, 0x14, &(0x7f00000b2000)=0xffffffffffdfffff, 0x4) r1 = dup(r0) ioctl$TCSBRK(r1, 0x5409, 0x200) bind$inet(r0, &(0x7f0000b55000)={0x2, 0x4e22}, 0x10) sendto$inet(r0, &(0x7f00005c9000), 0x252, 0x800000020000000, &(0x7f0000303000)={0x2, 0x4e22, @loopback=0x7f000001}, 0x10) writev(r0, &(0x7f00000002c0)=[{&(0x7f0000000480)="b8", 0x1}], 0x1) ioctl$sock_inet_tcp_SIOCOUTQNSD(r0, 0x894b, &(0x7f0000000040)) sendto$inet(r0, &(0x7f0000000080)="f52f", 0x2, 0x1, &(0x7f0000000140)={0x2, 0x0, @multicast2=0xe0000002}, 0x10) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f000020affc), 0x4) shutdown(r0, 0x1) fcntl$getownex(r1, 0x10, &(0x7f00000000c0)) 2018/04/11 12:44:47 executing program 6: r0 = socket$inet6(0xa, 0x80003, 0xff) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @ipv4={[], [0xff, 0xff], @dev={0xac, 0x14, 0x14, 0x1b}}}, 0x1c) sendmsg(r0, &(0x7f000001b000)={0x0, 0xfffffff5, &(0x7f0000019fa0), 0xca, &(0x7f000001ef08)}, 0x0) 2018/04/11 12:44:47 executing program 4: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff7fffffffffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000200)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc-cast5-avx\x00'}, 0x58) accept$alg(r0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00003bcfd0)="d3ab27191a", 0x5) accept(r0, &(0x7f0000000040)=@pppol2tpv3in6, &(0x7f00000000c0)=0x80) 2018/04/11 12:44:47 executing program 2: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x1e, 0x1, 0x0) setsockopt$packet_tx_ring(r0, 0x10f, 0x87, &(0x7f0000b89fe4)=@req={0x772}, 0x10) sendmsg(0xffffffffffffffff, &(0x7f0000030000)={&(0x7f00004f5000)=@generic={0x10000000001e, "0100000900000000000000000226cc573c080000003724c71e14dd6a739effea1b48006be61ffe0000e103000000f8000004003f010039d8f986ff01000300000004af50d50700000000000000e3ad316a1983000000001d00e0dfcb24281e27800000100076c3979ac40000bd15020078a1dfd300881a8365b1b16d7436"}, 0x80, &(0x7f0000447ff0), 0x0, &(0x7f00006e9c68)}, 0x0) 2018/04/11 12:44:47 executing program 1: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff7fffffffffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x1e, 0x1, 0x0) sendmsg(r0, &(0x7f0000030000)={&(0x7f00004f5000)=@generic={0x10000000001e, "0100000900000000000000000226cc573c080000003724c71e14dd6a739effea1b48006be61ffe0000e103000000f8000004003f010039d8f986ff01000300000004af50d50700000000000000e3ad316a1983000000001d00e0dfcb24281e27800000100076c3979ac40000bd15020078a1dfd300881a8365b1b16d7436"}, 0x80, &(0x7f0000447ff0), 0x0, &(0x7f00006e9c68)}, 0x0) 2018/04/11 12:44:47 executing program 4: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff7fffffffffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000200)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc-cast5-avx\x00'}, 0x58) accept$alg(r0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00003bcfd0)="d3ab27191a", 0x5) accept(r0, &(0x7f0000000040)=@pppol2tpv3in6, &(0x7f00000000c0)=0x80) 2018/04/11 12:44:47 executing program 7: syz_emit_ethernet(0x66, &(0x7f0000000000)={@random="cd3997030f00", @empty=[0x0, 0x0, 0x0, 0x88480000], [], {@ipv6={0x86dd, {0x0, 0x6, "b40900", 0x30, 0x67, 0x0, @ipv4={[], [0xff, 0xff], @multicast2=0xe0000002}, @mcast2={0xff, 0x2, [], 0x1}, {[], @icmpv6=@time_exceed={0x21, 0x0, 0x0, 0x0, [], {0x0, 0x6, "b680fa", 0x0, 0x0, 0x0, @ipv4={[], [0xff, 0xff], @broadcast=0xffffffff}, @ipv4={[], [0xff, 0xff], @remote={0xac, 0x14, 0xffffffffffffffff, 0xbb}}}}}}}}}, 0x0) 2018/04/11 12:44:47 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$SO_TIMESTAMPING(r0, 0x1, 0x25, &(0x7f0000000000)=0x802, 0x4) setsockopt$inet_tcp_int(r0, 0x6, 0x10000000013, &(0x7f000039c000)=0x400000000000001, 0x4) setsockopt$inet_tcp_int(r0, 0x6, 0x14, &(0x7f00000b2000)=0xffffffffffffffff, 0x4) bind$inet(r0, &(0x7f0000b55000)={0x2, 0x4e22}, 0x10) sendto$inet(r0, &(0x7f00005c9000), 0x252, 0x800000020000000, &(0x7f0000303000)={0x2, 0x4e22, @loopback=0x7f000001}, 0x10) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffff9c, 0x89e2, &(0x7f0000000080)={r0}) getsockopt$inet_sctp_SCTP_GET_PEER_ADDRS(r0, 0x84, 0x6c, &(0x7f0000000100)={0x0, 0x7, "b3b3ecad782cf0"}, &(0x7f0000000140)=0xf) setsockopt$inet_sctp_SCTP_RTOINFO(r1, 0x84, 0x0, &(0x7f0000000180)={r2, 0x7e8260b3, 0x3}, 0x10) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(r0, 0x6, 0x1d, &(0x7f0000965fec)={0x40000004, 0x800000000000852b, 0xffff, 0x10000007fffffff}, 0x14) ioctl$sock_SIOCINQ(r1, 0x541b, &(0x7f00000005c0)) writev(r0, &(0x7f00000002c0)=[{&(0x7f0000000480)="b8", 0x1}], 0x1) r3 = openat$dsp(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/dsp\x00', 0x581000, 0x0) setsockopt$l2tp_PPPOL2TP_SO_SENDSEQ(r3, 0x111, 0x3, 0x0, 0x4) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f000020affc), 0x4) clock_getres(0x7, &(0x7f0000000040)) shutdown(r0, 0x1) 2018/04/11 12:44:47 executing program 6: r0 = socket$inet6(0xa, 0x80003, 0xff) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @ipv4={[], [0xff, 0xff], @dev={0xac, 0x14, 0x14, 0x1b}}}, 0x1c) sendmsg(r0, &(0x7f000001b000)={0x0, 0xfffffff5, &(0x7f0000019fa0), 0xa, &(0x7f000001ef08)}, 0x0) 2018/04/11 12:44:48 executing program 3: semop(0x0, &(0x7f000001a000)=[{0x0, 0xffffffffffff0001}, {}], 0x2) timer_create(0x0, &(0x7f0000cd0000)={0x0, 0x12}, &(0x7f0000044000)) timer_settime(0x0, 0x0, &(0x7f00004b1fe0)={{0x0, 0x1c9c380}, {0x0, 0x9}}, &(0x7f0000040000)) r0 = getpgid(0x0) tkill(r0, 0x0) 2018/04/11 12:44:48 executing program 1: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff7fffffffffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x1e, 0x1, 0x0) sendmsg(r0, &(0x7f0000030000)={&(0x7f00004f5000)=@generic={0x10000000001e, "0100000900000000000000000226cc573c080000003724c71e14dd6a739effea1b48006be61ffe0000e103000000f8000004003f010039d8f986ff01000300000004af50d50700000000000000e3ad316a1983000000001d00e0dfcb24281e27800000100076c3979ac40000bd15020078a1dfd300881a8365b1b16d7436"}, 0x80, &(0x7f0000447ff0), 0x0, &(0x7f00006e9c68)}, 0x0) 2018/04/11 12:44:48 executing program 4: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff7fffffffffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000200)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc-cast5-avx\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000007e40)=[{0x0, 0x0, &(0x7f0000000900)}], 0x1, 0x0) accept(r0, &(0x7f0000000040)=@pppol2tpv3in6, &(0x7f00000000c0)=0x80) 2018/04/11 12:44:48 executing program 6: r0 = socket$inet6(0xa, 0x80003, 0xff) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @ipv4={[], [0xff, 0xff], @dev={0xac, 0x14, 0x14, 0x1b}}}, 0x1c) sendmsg(r0, &(0x7f000001b000)={0x0, 0xfffffff5, &(0x7f0000019fa0), 0x51, &(0x7f000001ef08)}, 0x0) 2018/04/11 12:44:48 executing program 7: syz_emit_ethernet(0x66, &(0x7f0000000000)={@random="cd3997030f00", @empty=[0x0, 0x0, 0x0, 0x806], [], {@ipv6={0x86dd, {0x0, 0x6, "b40900", 0x30, 0x67, 0x0, @ipv4={[], [0xff, 0xff], @multicast2=0xe0000002}, @mcast2={0xff, 0x2, [], 0x1}, {[], @icmpv6=@time_exceed={0x21, 0x0, 0x0, 0x0, [], {0x0, 0x6, "b680fa", 0x0, 0x0, 0x0, @ipv4={[], [0xff, 0xff], @broadcast=0xffffffff}, @ipv4={[], [0xff, 0xff], @remote={0xac, 0x14, 0xffffffffffffffff, 0xbb}}}}}}}}}, 0x0) 2018/04/11 12:44:48 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$SO_TIMESTAMPING(r0, 0x1, 0x25, &(0x7f0000000000)=0x802, 0x4) setsockopt$inet_tcp_int(r0, 0x6, 0x10000000013, &(0x7f000039c000)=0x400000000000001, 0x4) setsockopt$inet_tcp_int(r0, 0x6, 0x14, &(0x7f00000b2000)=0xffffffffffffffff, 0x4) bind$inet(r0, &(0x7f0000b55000)={0x2, 0x4e22}, 0x10) sendto$inet(r0, &(0x7f00005c9000), 0x252, 0x800000020000000, &(0x7f0000303000)={0x2, 0x4e22, @loopback=0x7f000001}, 0x10) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(r0, 0x6, 0x1d, &(0x7f0000965fec)={0x40000004, 0x800000000000852b, 0xffff, 0x10000007fffffff}, 0x14) writev(r0, &(0x7f00000002c0)=[{&(0x7f0000000480)="b8", 0x1}], 0x1) sendto$inet(r0, &(0x7f0000000080)="f52f", 0x2, 0x1, &(0x7f0000000140)={0x2, 0x0, @multicast2=0xe0000002}, 0x10) setsockopt$sock_int(r0, 0x1, 0x2f, &(0x7f000020affc)=0xfffffffffffffffc, 0x4) shutdown(r0, 0x1) 2018/04/11 12:44:48 executing program 2: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x1e, 0x1, 0x0) setsockopt$packet_tx_ring(r0, 0x10f, 0x87, &(0x7f0000b89fe4)=@req={0x772}, 0x10) sendmsg(0xffffffffffffffff, &(0x7f0000030000)={&(0x7f00004f5000)=@generic={0x10000000001e, "0100000900000000000000000226cc573c080000003724c71e14dd6a739effea1b48006be61ffe0000e103000000f8000004003f010039d8f986ff01000300000004af50d50700000000000000e3ad316a1983000000001d00e0dfcb24281e27800000100076c3979ac40000bd15020078a1dfd300881a8365b1b16d7436"}, 0x80, &(0x7f0000447ff0), 0x0, &(0x7f00006e9c68)}, 0x0) 2018/04/11 12:44:48 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000000), 0x216) sendmsg$key(r0, &(0x7f0000000b00)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000001000)=ANY=[@ANYBLOB="020a001c020000000000000000000000"], 0x10}, 0x1}, 0x0) sendmsg$key(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000040)={0x2, 0x12, 0x0, 0x0, 0x2}, 0x10}, 0x1}, 0x0) 2018/04/11 12:44:48 executing program 7: syz_emit_ethernet(0x66, &(0x7f0000000000)={@random="cd3997030f00", @empty=[0x0, 0x0, 0x0, 0x8864], [], {@ipv6={0x86dd, {0x0, 0x6, "b40900", 0x30, 0x67, 0x0, @ipv4={[], [0xff, 0xff], @multicast2=0xe0000002}, @mcast2={0xff, 0x2, [], 0x1}, {[], @icmpv6=@time_exceed={0x21, 0x0, 0x0, 0x0, [], {0x0, 0x6, "b680fa", 0x0, 0x0, 0x0, @ipv4={[], [0xff, 0xff], @broadcast=0xffffffff}, @ipv4={[], [0xff, 0xff], @remote={0xac, 0x14, 0xffffffffffffffff, 0xbb}}}}}}}}}, 0x0) 2018/04/11 12:44:48 executing program 6: r0 = socket$inet6(0xa, 0x80003, 0xff) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @ipv4={[], [0xff, 0xff], @dev={0xac, 0x14, 0x14, 0x1b}}}, 0x1c) sendmsg(r0, &(0x7f000001b000)={0x0, 0xfffffff5, &(0x7f0000019fa0), 0x13, &(0x7f000001ef08)}, 0x0) 2018/04/11 12:44:48 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$SO_TIMESTAMPING(r0, 0x1, 0x25, &(0x7f0000000000)=0x802, 0x4) setsockopt$inet_tcp_int(r0, 0x6, 0x10000000013, &(0x7f000039c000)=0x400000000000001, 0x4) setsockopt$inet_tcp_int(r0, 0x6, 0x14, &(0x7f00000b2000)=0xffffffffffffffff, 0x4) bind$inet(r0, &(0x7f0000b55000)={0x2, 0x4e22}, 0x10) sendto$inet(r0, &(0x7f00005c9000), 0xfffffffffffffc57, 0x800000020000000, &(0x7f0000303000)={0x2, 0x4e22, @broadcast=0xffffffff}, 0x10) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(r0, 0x6, 0x1d, &(0x7f0000965fec)={0x40000004, 0x800000000000852b, 0xffff, 0x10000007fffffff}, 0x14) writev(r0, &(0x7f00000002c0)=[{&(0x7f0000000480)="b8", 0x1}], 0x1) sendto$inet(r0, &(0x7f0000000080)="f52f", 0x2, 0x1, &(0x7f0000000140)={0x2, 0x0, @multicast2=0xe0000002}, 0x10) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f000020affc), 0x4) shutdown(r0, 0x0) 2018/04/11 12:44:48 executing program 2: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x1e, 0x1, 0x0) setsockopt$packet_tx_ring(r0, 0x10f, 0x87, &(0x7f0000b89fe4)=@req={0x772}, 0x10) sendmsg(0xffffffffffffffff, &(0x7f0000030000)={&(0x7f00004f5000)=@generic={0x10000000001e, "0100000900000000000000000226cc573c080000003724c71e14dd6a739effea1b48006be61ffe0000e103000000f8000004003f010039d8f986ff01000300000004af50d50700000000000000e3ad316a1983000000001d00e0dfcb24281e27800000100076c3979ac40000bd15020078a1dfd300881a8365b1b16d7436"}, 0x80, &(0x7f0000447ff0), 0x0, &(0x7f00006e9c68)}, 0x0) 2018/04/11 12:44:48 executing program 1: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff7fffffffffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg(0xffffffffffffffff, &(0x7f0000030000)={&(0x7f00004f5000)=@generic={0x10000000001e, "0100000900000000000000000226cc573c080000003724c71e14dd6a739effea1b48006be61ffe0000e103000000f8000004003f010039d8f986ff01000300000004af50d50700000000000000e3ad316a1983000000001d00e0dfcb24281e27800000100076c3979ac40000bd15020078a1dfd300881a8365b1b16d7436"}, 0x80, &(0x7f0000447ff0), 0x0, &(0x7f00006e9c68)}, 0x0) 2018/04/11 12:44:48 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) r1 = syz_open_dev$adsp(&(0x7f0000000080)='/dev/adsp#\x00', 0xb4, 0x282) ioctl$KVM_SET_MP_STATE(r1, 0x4004ae99, &(0x7f00000000c0)=0x7) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000000), 0x216) sendmsg$key(r0, &(0x7f0000000b00)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000001000)={0x2, 0xa, 0x0, 0x0, 0x2}, 0x10}, 0x1}, 0x0) sendmsg$key(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000040)={0x2, 0x12, 0x0, 0x0, 0x200000000000010b}, 0xc}, 0x1}, 0xfffffffffffffffc) 2018/04/11 12:44:48 executing program 4: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff7fffffffffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000200)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc-cast5-avx\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000007e40)=[{0x0, 0x0, &(0x7f0000000900)}], 0x1, 0x0) accept(r0, &(0x7f0000000040)=@pppol2tpv3in6, &(0x7f00000000c0)=0x80) 2018/04/11 12:44:48 executing program 7: syz_emit_ethernet(0x66, &(0x7f0000000000)={@random="cd3997030f00", @empty=[0x0, 0x0, 0x0, 0x5], [], {@ipv6={0x86dd, {0x0, 0x6, "b40900", 0x30, 0x67, 0x0, @ipv4={[], [0xff, 0xff], @multicast2=0xe0000002}, @mcast2={0xff, 0x2, [], 0x1}, {[], @icmpv6=@time_exceed={0x21, 0x0, 0x0, 0x0, [], {0x0, 0x6, "b680fa", 0x0, 0x0, 0x0, @ipv4={[], [0xff, 0xff], @broadcast=0xffffffff}, @ipv4={[], [0xff, 0xff], @remote={0xac, 0x14, 0xffffffffffffffff, 0xbb}}}}}}}}}, 0x0) 2018/04/11 12:44:49 executing program 3: semop(0x0, &(0x7f000001a000)=[{0x0, 0xffffffffffff0001}, {}], 0x2) timer_create(0x0, &(0x7f0000cd0000)={0x0, 0x12}, &(0x7f0000044000)) timer_settime(0x0, 0x0, &(0x7f00004b1fe0)={{0x0, 0x1c9c380}, {0x0, 0x9}}, &(0x7f0000040000)) r0 = getpgid(0x0) tkill(r0, 0x0) 2018/04/11 12:44:49 executing program 6: r0 = socket$inet6(0xa, 0x80003, 0xff) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @ipv4={[], [0xff, 0xff], @dev={0xac, 0x14, 0x14, 0x1b}}}, 0x1c) sendmsg(r0, &(0x7f000001b000)={0x0, 0xfffffff5, &(0x7f0000019fa0), 0xb4, &(0x7f000001ef08)}, 0x0) 2018/04/11 12:44:49 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000000), 0x216) sendmsg$key(r0, &(0x7f0000000b00)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="020a000002000000000000000000000057cb7b052406c0e53c9f637f63f8208067dd391cfd4ff145629e8db693966cfe9711bad8cb7e02eca2dfe6b427921546f3861921840290bef0127ea5f380a94067a674a8ac08761d51a5031c84e15444e49f"], 0x10}, 0x1}, 0x0) sendmsg$key(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000040)=ANY=[@ANYBLOB="02f9cc7ae3d1ceff2962c10000020300"], 0x10}, 0x1}, 0x0) 2018/04/11 12:44:49 executing program 2: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x1e, 0x1, 0x0) setsockopt$packet_tx_ring(r0, 0x10f, 0x87, &(0x7f0000b89fe4)=@req={0x772}, 0x10) sendmsg(r0, &(0x7f0000030000)={&(0x7f00004f5000)=@generic={0x0, "0100000900000000000000000226cc573c080000003724c71e14dd6a739effea1b48006be61ffe0000e103000000f8000004003f010039d8f986ff01000300000004af50d50700000000000000e3ad316a1983000000001d00e0dfcb24281e27800000100076c3979ac40000bd15020078a1dfd300881a8365b1b16d7436"}, 0x80, &(0x7f0000447ff0), 0x0, &(0x7f00006e9c68)}, 0x0) 2018/04/11 12:44:49 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) syz_mount_image$hfs(&(0x7f0000000040)='hfs\x00', &(0x7f00000000c0)='/\x00', 0xfffffffffffffffc, 0x1, &(0x7f0000000100)=[{&(0x7f0000000180)="f87cde8693e6d3509527a1ed07dcfe2144a4c25b9999891e4ac0ca22123cccf8de79c03560d62373b8754597ca0c38602b17a4fca61ce808a378ef2965d26da3deafdaf420130f0cdbada071431f6d21735a8e85f801920f085cadceb64ae0ea58847e19500c4fcdad86315bbfd44c301f2e19f026dbeabc5611a1f9cbef3b98ee81501f403e44cf849868e596be91005c81c88ebe755270771af7414e912f8e9beed402feedd0bc15f932164659631e5523cf61d19d0f2ff02cb8a3bc38ff6336adff9a635abb", 0xc7, 0x6}], 0x8, &(0x7f0000000280)={[{@iocharset={'iocharset', 0x3d, 'iso8859-9'}, 0x2c}]}) setsockopt$SO_TIMESTAMPING(r0, 0x1, 0x25, &(0x7f0000000000)=0x802, 0x4) setsockopt$inet_tcp_int(r0, 0x6, 0x10000000013, &(0x7f000039c000)=0x400000000000001, 0x4) setsockopt$inet_tcp_int(r0, 0x6, 0x14, &(0x7f00000b2000)=0xffffffffffffffff, 0x4) bind$inet(r0, &(0x7f0000b55000)={0x2, 0x4e22}, 0x10) sendto$inet(r0, &(0x7f00005c9000), 0x252, 0x800000020000000, &(0x7f0000303000)={0x2, 0x4e22, @loopback=0x7f000001}, 0x10) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(r0, 0x6, 0x1d, &(0x7f0000965fec)={0x40000004, 0x800000000000852b, 0xffff, 0x10000007fffffff}, 0x14) writev(r0, &(0x7f00000002c0)=[{&(0x7f0000000480)="b8", 0x1}], 0x1) sendto$inet(r0, &(0x7f0000000080)="f52f", 0x2, 0x1, &(0x7f0000000140)={0x2, 0x0, @multicast2=0xe0000002}, 0x10) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f000020affc), 0x4) socket$inet_smc(0x2b, 0x1, 0x0) shutdown(r0, 0x1) r1 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000300)='/dev/vga_arbiter\x00', 0x4002c2, 0x0) sendto$inet6(r1, &(0x7f0000000340)="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", 0xfd, 0x4000, &(0x7f0000000440)={0xa, 0x4e21, 0x2, @mcast1={0xff, 0x1, [], 0x1}, 0xed}, 0x1c) 2018/04/11 12:44:49 executing program 1: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff7fffffffffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg(0xffffffffffffffff, &(0x7f0000030000)={&(0x7f00004f5000)=@generic={0x10000000001e, "0100000900000000000000000226cc573c080000003724c71e14dd6a739effea1b48006be61ffe0000e103000000f8000004003f010039d8f986ff01000300000004af50d50700000000000000e3ad316a1983000000001d00e0dfcb24281e27800000100076c3979ac40000bd15020078a1dfd300881a8365b1b16d7436"}, 0x80, &(0x7f0000447ff0), 0x0, &(0x7f00006e9c68)}, 0x0) 2018/04/11 12:44:49 executing program 7: syz_emit_ethernet(0x66, &(0x7f0000000000)={@random="cd3997030f00", @empty=[0x0, 0x0, 0x0, 0x4], [], {@ipv6={0x86dd, {0x0, 0x6, "b40900", 0x30, 0x67, 0x0, @ipv4={[], [0xff, 0xff], @multicast2=0xe0000002}, @mcast2={0xff, 0x2, [], 0x1}, {[], @icmpv6=@time_exceed={0x21, 0x0, 0x0, 0x0, [], {0x0, 0x6, "b680fa", 0x0, 0x0, 0x0, @ipv4={[], [0xff, 0xff], @broadcast=0xffffffff}, @ipv4={[], [0xff, 0xff], @remote={0xac, 0x14, 0xffffffffffffffff, 0xbb}}}}}}}}}, 0x0) 2018/04/11 12:44:49 executing program 4: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff7fffffffffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000200)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc-cast5-avx\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000007e40)=[{0x0, 0x0, &(0x7f0000000900)}], 0x1, 0x0) accept(r0, &(0x7f0000000040)=@pppol2tpv3in6, &(0x7f00000000c0)=0x80) 2018/04/11 12:44:49 executing program 6: r0 = socket$inet6(0xa, 0x80003, 0xff) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @ipv4={[], [0xff, 0xff], @dev={0xac, 0x14, 0x14, 0x1b}}}, 0x1c) sendmsg(r0, &(0x7f000001b000)={0x0, 0xfffffff5, &(0x7f0000019fa0), 0x183, &(0x7f000001ef08)}, 0x0) 2018/04/11 12:44:49 executing program 7: syz_emit_ethernet(0x66, &(0x7f0000000000)={@random="cd3997030f00", @empty=[0x0, 0x0, 0x0, 0x500000000000000], [], {@ipv6={0x86dd, {0x0, 0x6, "b40900", 0x30, 0x67, 0x0, @ipv4={[], [0xff, 0xff], @multicast2=0xe0000002}, @mcast2={0xff, 0x2, [], 0x1}, {[], @icmpv6=@time_exceed={0x21, 0x0, 0x0, 0x0, [], {0x0, 0x6, "b680fa", 0x0, 0x0, 0x0, @ipv4={[], [0xff, 0xff], @broadcast=0xffffffff}, @ipv4={[], [0xff, 0xff], @remote={0xac, 0x14, 0xffffffffffffffff, 0xbb}}}}}}}}}, 0x0) 2018/04/11 12:44:49 executing program 4: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff7fffffffffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000200)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc-cast5-avx\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00003bcfd0)="d3ab27191a", 0x5) sendmmsg$alg(0xffffffffffffffff, &(0x7f0000007e40)=[{0x0, 0x0, &(0x7f0000000900)}], 0x1, 0x0) accept(r0, &(0x7f0000000040)=@pppol2tpv3in6, &(0x7f00000000c0)=0x80) 2018/04/11 12:44:49 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000000), 0x216) sendmsg$key(r0, &(0x7f0000000b00)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="020a0000092c5fd1000000b1cc1c4796ab756dd9fd2c4f77c746c500"], 0x10}, 0x1}, 0x0) sendmsg$key(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000040)={0x2, 0x12, 0x0, 0x0, 0x2}, 0x10}, 0x1}, 0x0) 2018/04/11 12:44:49 executing program 1: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff7fffffffffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg(0xffffffffffffffff, &(0x7f0000030000)={&(0x7f00004f5000)=@generic={0x10000000001e, "0100000900000000000000000226cc573c080000003724c71e14dd6a739effea1b48006be61ffe0000e103000000f8000004003f010039d8f986ff01000300000004af50d50700000000000000e3ad316a1983000000001d00e0dfcb24281e27800000100076c3979ac40000bd15020078a1dfd300881a8365b1b16d7436"}, 0x80, &(0x7f0000447ff0), 0x0, &(0x7f00006e9c68)}, 0x0) 2018/04/11 12:44:49 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$SO_TIMESTAMPING(r0, 0x1, 0x25, &(0x7f0000000000)=0x802, 0x4) setsockopt$inet_tcp_int(r0, 0x6, 0x10000000013, &(0x7f000039c000)=0x400000000000001, 0x4) setsockopt$inet_tcp_int(r0, 0x6, 0x14, &(0x7f00000b2000)=0xffffffffffffffff, 0x4) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x1, 0x32, 0xffffffffffffffff, 0x0) r1 = userfaultfd(0x0) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000002000)={0xaa}) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000001000)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) clock_nanosleep(0x2, 0x0, &(0x7f0000011000), &(0x7f0000000040)) mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x32, 0xffffffffffffffff, 0x0) r2 = gettid() timer_create(0x0, &(0x7f0000044000)={0x0, 0x12}, &(0x7f0000044000)) timer_settime(0x0, 0x0, &(0x7f0000000000)={{0x0, 0x8}, {0x0, 0x9}}, &(0x7f0000040000)) tkill(r2, 0x15) ioctl$UFFDIO_ZEROPAGE(r1, 0x8010aa02, &(0x7f00000c0ff0)={&(0x7f0000011000/0x3000)=nil, 0x3000}) bind$inet(r0, &(0x7f0000b55000)={0x2, 0x4e22}, 0x10) gettid() sendto$inet(r0, &(0x7f00005c9000), 0x252, 0x800000020000000, &(0x7f0000303000)={0x2, 0x4e22, @loopback=0x7f000001}, 0x10) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(r0, 0x6, 0x1d, &(0x7f0000965fec)={0x40000004, 0x800000000000852b, 0xffff, 0x10000007fffffff}, 0x14) writev(r0, &(0x7f00000002c0)=[{&(0x7f0000000480)="b8", 0x1}], 0x1) sendto$inet(r0, &(0x7f0000000080)="f52f", 0x2, 0x1, &(0x7f0000000140)={0x2, 0x0, @multicast2=0xe0000002}, 0x10) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f000020affc), 0x4) shutdown(r0, 0x1) 2018/04/11 12:44:49 executing program 2: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x1e, 0x1, 0x0) setsockopt$packet_tx_ring(r0, 0x10f, 0x87, &(0x7f0000b89fe4)=@req={0x772}, 0x10) sendmsg(r0, &(0x7f0000030000)={&(0x7f00004f5000)=@generic={0x0, "0100000900000000000000000226cc573c080000003724c71e14dd6a739effea1b48006be61ffe0000e103000000f8000004003f010039d8f986ff01000300000004af50d50700000000000000e3ad316a1983000000001d00e0dfcb24281e27800000100076c3979ac40000bd15020078a1dfd300881a8365b1b16d7436"}, 0x80, &(0x7f0000447ff0), 0x0, &(0x7f00006e9c68)}, 0x0) 2018/04/11 12:44:49 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000000), 0x216) r1 = syz_open_dev$sndpcmp(&(0x7f0000000080)='/dev/snd/pcmC#D#p\x00', 0x0, 0x40000) setsockopt$inet6_tcp_TCP_FASTOPEN_KEY(r1, 0x6, 0x21, &(0x7f00000000c0)="a0f62c76e17cf42fb7ee4961c9d285a8", 0x10) sendmsg$key(r0, &(0x7f0000000b00)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000001000)=ANY=[@ANYBLOB="0203784dcc4f6ade776d000000000000"], 0x10}, 0x1}, 0x0) sendmsg$key(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000040)=ANY=[@ANYBLOB="e694dc105564bf0d7cdcb5be07001f"], 0x10}, 0x1}, 0x0) 2018/04/11 12:44:50 executing program 3: semop(0x0, &(0x7f000001a000)=[{0x0, 0xffffffffffff0001}, {}], 0x2) timer_create(0x0, &(0x7f0000cd0000)={0x0, 0x12}, &(0x7f0000044000)) timer_settime(0x0, 0x0, &(0x7f00004b1fe0)={{0x0, 0x1c9c380}, {0x0, 0x9}}, &(0x7f0000040000)) r0 = getpgid(0x0) tkill(r0, 0x0) 2018/04/11 12:44:50 executing program 6: r0 = socket$inet6(0xa, 0x80003, 0xff) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @ipv4={[], [0xff, 0xff], @dev={0xac, 0x14, 0x14, 0x1b}}}, 0x1c) sendmsg(r0, &(0x7f000001b000)={0x0, 0xfffffff5, &(0x7f0000019fa0), 0x19b, &(0x7f000001ef08)}, 0x0) 2018/04/11 12:44:50 executing program 7: syz_emit_ethernet(0x66, &(0x7f0000000000)={@random="cd3997030f00", @empty=[0x0, 0x0, 0x0, 0x6488], [], {@ipv6={0x86dd, {0x0, 0x6, "b40900", 0x30, 0x67, 0x0, @ipv4={[], [0xff, 0xff], @multicast2=0xe0000002}, @mcast2={0xff, 0x2, [], 0x1}, {[], @icmpv6=@time_exceed={0x21, 0x0, 0x0, 0x0, [], {0x0, 0x6, "b680fa", 0x0, 0x0, 0x0, @ipv4={[], [0xff, 0xff], @broadcast=0xffffffff}, @ipv4={[], [0xff, 0xff], @remote={0xac, 0x14, 0xffffffffffffffff, 0xbb}}}}}}}}}, 0x0) 2018/04/11 12:44:50 executing program 1: r0 = socket(0x1e, 0x1, 0x0) sendmsg(r0, &(0x7f0000030000)={&(0x7f00004f5000)=@generic={0x10000000001e, "0100000900000000000000000226cc573c080000003724c71e14dd6a739effea1b48006be61ffe0000e103000000f8000004003f010039d8f986ff01000300000004af50d50700000000000000e3ad316a1983000000001d00e0dfcb24281e27800000100076c3979ac40000bd15020078a1dfd300881a8365b1b16d7436"}, 0x80, &(0x7f0000447ff0), 0x0, &(0x7f00006e9c68)}, 0x0) 2018/04/11 12:44:50 executing program 4: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff7fffffffffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000200)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc-cast5-avx\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00003bcfd0)="d3ab27191a", 0x5) sendmmsg$alg(0xffffffffffffffff, &(0x7f0000007e40)=[{0x0, 0x0, &(0x7f0000000900)}], 0x1, 0x0) accept(r0, &(0x7f0000000040)=@pppol2tpv3in6, &(0x7f00000000c0)=0x80) 2018/04/11 12:44:50 executing program 2: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x1e, 0x1, 0x0) setsockopt$packet_tx_ring(r0, 0x10f, 0x87, &(0x7f0000b89fe4)=@req={0x772}, 0x10) sendmsg(r0, &(0x7f0000030000)={&(0x7f00004f5000)=@generic={0x0, "0100000900000000000000000226cc573c080000003724c71e14dd6a739effea1b48006be61ffe0000e103000000f8000004003f010039d8f986ff01000300000004af50d50700000000000000e3ad316a1983000000001d00e0dfcb24281e27800000100076c3979ac40000bd15020078a1dfd300881a8365b1b16d7436"}, 0x80, &(0x7f0000447ff0), 0x0, &(0x7f00006e9c68)}, 0x0) 2018/04/11 12:44:50 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000000), 0x216) sendmsg$key(r0, &(0x7f0000000b00)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="020a0000020000f0ff000000000040f458dcee9868e70f6b0000"], 0x10}, 0x1}, 0x0) sendmsg$key(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000040)={0x2, 0x12, 0x0, 0x0, 0x2}, 0x10}, 0x1}, 0x0) 2018/04/11 12:44:50 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$SO_TIMESTAMPING(r0, 0x1, 0x25, &(0x7f0000000000)=0x802, 0x4) setsockopt$inet_tcp_int(r0, 0x6, 0x10000000013, &(0x7f000039c000)=0x400000000000001, 0x4) setsockopt$inet_tcp_int(r0, 0x6, 0x14, &(0x7f00000b2000)=0xffffffffffffffff, 0x4) bind$inet(r0, &(0x7f0000b55000)={0x2, 0x4e22}, 0x10) sendto$inet(r0, &(0x7f00005c9000), 0x252, 0x800000020000000, &(0x7f0000303000)={0x2, 0x4e22, @loopback=0x7f000001}, 0x10) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(r0, 0x6, 0x1d, &(0x7f0000965fec)={0x40000004, 0x800000000000852b, 0xffff, 0x10000007fffffff}, 0x14) r1 = syz_open_dev$mouse(&(0x7f00000000c0)='/dev/input/mouse#\x00', 0x99, 0x400000) ioctl$VT_SETMODE(r1, 0x5602, &(0x7f0000000100)={0x81, 0x200, 0x1, 0x4, 0x10000}) writev(r0, &(0x7f00000002c0)=[{&(0x7f0000000480)="b8", 0x1}], 0x1) sendto$inet(r0, &(0x7f0000000080)="f52f", 0x2, 0x1, &(0x7f0000000140)={0x2, 0x0, @multicast2=0xe0000002}, 0x10) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22, 0x0, @local={0xfe, 0x80, [], 0xaa}, 0x2}, 0x1c) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f000020affc), 0x4) shutdown(r0, 0x1) 2018/04/11 12:44:50 executing program 6: r0 = socket$inet6(0xa, 0x80003, 0xff) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @ipv4={[], [0xff, 0xff], @dev={0xac, 0x14, 0x14, 0x1b}}}, 0x1c) sendmsg(r0, &(0x7f000001b000)={0x0, 0xfffffff5, &(0x7f0000019fa0), 0x180, &(0x7f000001ef08)}, 0x0) 2018/04/11 12:44:50 executing program 7: syz_emit_ethernet(0x66, &(0x7f0000000000)={@random="cd3997030f00", @empty=[0x0, 0x0, 0x0, 0x8847000000000000], [], {@ipv6={0x86dd, {0x0, 0x6, "b40900", 0x30, 0x67, 0x0, @ipv4={[], [0xff, 0xff], @multicast2=0xe0000002}, @mcast2={0xff, 0x2, [], 0x1}, {[], @icmpv6=@time_exceed={0x21, 0x0, 0x0, 0x0, [], {0x0, 0x6, "b680fa", 0x0, 0x0, 0x0, @ipv4={[], [0xff, 0xff], @broadcast=0xffffffff}, @ipv4={[], [0xff, 0xff], @remote={0xac, 0x14, 0xffffffffffffffff, 0xbb}}}}}}}}}, 0x0) 2018/04/11 12:44:50 executing program 4: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff7fffffffffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000200)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc-cast5-avx\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00003bcfd0)="d3ab27191a", 0x5) sendmmsg$alg(0xffffffffffffffff, &(0x7f0000007e40)=[{0x0, 0x0, &(0x7f0000000900)}], 0x1, 0x0) accept(r0, &(0x7f0000000040)=@pppol2tpv3in6, &(0x7f00000000c0)=0x80) 2018/04/11 12:44:50 executing program 1: r0 = socket(0x1e, 0x1, 0x0) sendmsg(r0, &(0x7f0000030000)={&(0x7f00004f5000)=@generic={0x10000000001e, "0100000900000000000000000226cc573c080000003724c71e14dd6a739effea1b48006be61ffe0000e103000000f8000004003f010039d8f986ff01000300000004af50d50700000000000000e3ad316a1983000000001d00e0dfcb24281e27800000100076c3979ac40000bd15020078a1dfd300881a8365b1b16d7436"}, 0x80, &(0x7f0000447ff0), 0x0, &(0x7f00006e9c68)}, 0x0) 2018/04/11 12:44:50 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000000), 0x216) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ppp\x00', 0x80, 0x0) r2 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000100)='/dev/sequencer2\x00', 0x100, 0x0) syz_open_dev$usbmon(&(0x7f0000000200)='/dev/usbmon#\x00', 0x9, 0x2) ioctl$FUSE_DEV_IOC_CLONE(r1, 0x8004e500, &(0x7f00000001c0)=r2) sendmsg$key(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000001000)={0x2, 0x14, 0x0, 0x0, 0x2}, 0x10}, 0x1}, 0x0) sendmsg$key(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000040)={0x2, 0x12, 0x0, 0x0, 0x2}, 0x10}, 0x1}, 0x0) fcntl$F_GET_FILE_RW_HINT(r0, 0x40d, &(0x7f0000000080)) 2018/04/11 12:44:50 executing program 2: mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x1, 0x32, 0xffffffffffffffff, 0x0) r0 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vcs\x00', 0x0, 0x0) ioctl$KVM_SET_XSAVE(r0, 0x5000aea5, &(0x7f00000001c0)={"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"}) socket$vsock_stream(0x28, 0x1, 0x0) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000100)) r1 = syz_open_dev$mouse(&(0x7f0000000180)='/dev/input/mouse#\x00', 0xc1, 0x8000) fcntl$getownex(r1, 0x10, &(0x7f0000000140)={0x0, 0x0}) sched_setattr(r2, &(0x7f00000000c0)={0x30, 0x2, 0x0, 0x15, 0x1, 0x7, 0x2, 0xcb}, 0x0) pipe2(&(0x7f0000f61000)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) r5 = userfaultfd(0x0) ioctl$UFFDIO_API(r5, 0xc018aa3f, &(0x7f0000bc8000)={0xaa}) ioctl$UFFDIO_REGISTER(r5, 0xc020aa00, &(0x7f0000d62fe0)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) write$sndseq(r4, &(0x7f0000011fd2), 0xfffffdaa) read(r3, &(0x7f0000000000)=""/126, 0xfffffeab) ioctl$FIONREAD(r4, 0x541b, &(0x7f0000604ffc)) dup2(r3, r5) 2018/04/11 12:44:50 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$SO_TIMESTAMPING(r0, 0x1, 0x25, &(0x7f0000000000)=0x802, 0x4) setsockopt$inet_tcp_int(r0, 0x6, 0x10000000013, &(0x7f000039c000)=0x400000000000001, 0x4) setsockopt$inet_tcp_int(r0, 0x6, 0x15, &(0x7f0000000040)=0x5, 0x4) r1 = semget$private(0x0, 0x3, 0x24) semctl$GETNCNT(r1, 0x0, 0xe, &(0x7f0000000400)=""/8) bind$inet(r0, &(0x7f0000b55000)={0x2, 0x4e22}, 0x10) sendto$inet(r0, &(0x7f00005c9000), 0x252, 0x800000020000000, &(0x7f0000303000)={0x2, 0x4e22, @loopback=0x7f000001}, 0x10) r2 = syz_open_dev$adsp(&(0x7f00000000c0)='/dev/adsp#\x00', 0x547f1d78, 0x0) setsockopt$inet_sctp6_SCTP_SOCKOPT_BINDX_ADD(r2, 0x84, 0x64, &(0x7f00000003c0)=[@in={0x2, 0x4e22, @multicast2=0xe0000002}, @in={0x2, 0x14000000000, @loopback=0x7f000001}, @in6={0xa, 0x4e21, 0x7f, @remote={0xfe, 0x80, [], 0xbb}, 0x7}], 0x3c) setsockopt$inet_sctp6_SCTP_SOCKOPT_BINDX_ADD(r2, 0x84, 0x64, &(0x7f0000000780)=[@in6={0xa, 0x4e23, 0x8, @dev={0xfe, 0x80, [], 0xe}, 0x2}, @in6={0xa, 0x4e21, 0x200, @ipv4={[], [0xff, 0xff]}, 0x1f}, @in6={0xa, 0x4e23, 0xcc, @local={0xfe, 0x80, [], 0xaa}, 0x6}, @in={0x2, 0x4e22, @broadcast=0xffffffff}, @in6={0xa, 0x4e21, 0x1, @mcast1={0xff, 0x1, [], 0x1}, 0xcf}, @in={0x2, 0x4e21, @multicast2=0xe0000002}, @in6={0xa, 0x4e24, 0x1f, @remote={0xfe, 0x80, [], 0xbb}, 0x1}, @in6={0xa, 0x4e21, 0x800, @dev={0xfe, 0x80, [], 0xc}, 0x101}, @in6={0xa, 0x4e23, 0x1, @remote={0xfe, 0x80, [], 0xbb}, 0x40}, @in6={0xa, 0x4e23, 0x10001, @mcast1={0xff, 0x1, [], 0x1}, 0x7}], 0x100) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(r0, 0x6, 0x1d, &(0x7f0000965fec)={0x40000004, 0x800000000000852b, 0xffff, 0x10000007fffffff}, 0x14) writev(r0, &(0x7f00000002c0)=[{&(0x7f0000000480)="b8", 0x1}], 0x1) r3 = add_key(&(0x7f0000000080)='rxrpc\x00', &(0x7f0000000440)={0x73, 0x79, 0x7a, 0x2}, &(0x7f0000000500)="99e53f3b3c99bd1c03f63549971550e91dae673aa98f46f2290d164c415de80268d980d571211959740cad3018a11964c16b78c3a2856c928970407d511e91505b65afb7e09d26ed808c361d6ab748d92dc9a4d5bc6fdf1ec6934de4520375e8ccb927bbf6eb99f311b298b979c8d229eebd2c518858da666bbb", 0x7a, 0xfffffffffffffffa) getsockopt$inet_sctp_SCTP_DELAYED_SACK(r2, 0x84, 0x10, &(0x7f0000000180)=@assoc_value={0x0, 0xde34}, &(0x7f00000001c0)=0x8) getsockopt$inet_sctp6_SCTP_AUTH_ACTIVE_KEY(r2, 0x84, 0x18, &(0x7f0000000200)={r4, 0xfd18}, &(0x7f0000000240)=0x8) r5 = request_key(&(0x7f0000000580)='.dead\x00', &(0x7f00000005c0)={0x73, 0x79, 0x7a, 0x2}, &(0x7f0000000600)='keyring%GPL\x00', 0xfffffffffffffff9) keyctl$reject(0x13, r3, 0xfffffffffffffffc, 0xff, r5) sendto$inet(r0, &(0x7f0000000980)="f52ff4ccb9b81fa883afca7cc4dadd5eebbd6dc3dcb81a1f10564415ee103da94c055aaa75a4977f0f663970db731763b491b61291889c9842f5f5d54d7024be1465d0d43c96c662ce873b1e8c984a991739540e71611bafb1f16d221b6bf01ee80924b34c88527455abe988e348bcadf4915a2709da4b1a7ba9671be701fcc9591e9130ba7c1adb6799a7618f1c251de445c2804b81616c2d4c72006773528196ef7ec4dcb3927fed6e863c5b89530ddafabc618b713b288d185de85f23a3a6739bdcf34e486699a20f0810386d32238f321524bbf492424de9b94658dbdcacddb0c296f5a6fb00", 0x103d6, 0x4, &(0x7f0000000b40)={0x2, 0x10000000000, @local={0xac, 0x14, 0x14, 0xaa}}, 0x10) getsockopt$inet_sctp6_SCTP_STATUS(r2, 0x84, 0xe, &(0x7f0000000300)={0x0, 0x0, 0x7fff, 0x2, 0x6, 0x44, 0x845, 0x6, {0x0, @in={{0x2, 0x4e23, @multicast1=0xe0000001}}, 0xfffffffffffffff9, 0x9, 0x9, 0x0, 0x2}}, &(0x7f0000000100)=0xb0) setsockopt$SO_VM_SOCKETS_BUFFER_SIZE(r2, 0x28, 0x0, &(0x7f0000000640)=0xfffffffeffffffff, 0x8) setsockopt$inet_sctp6_SCTP_SOCKOPT_BINDX_ADD(r2, 0x84, 0x64, &(0x7f0000000680)=[@in6={0xa, 0x4e22, 0x20be, @local={0xfe, 0x80, [], 0xaa}, 0x5f2}, @in6={0xa, 0x4e23, 0x0, @mcast1={0xff, 0x1, [], 0x1}, 0x200}, @in6={0xa, 0x4e23, 0x2, @loopback={0x0, 0x1}, 0x6}, @in={0x2, 0x4e24, @rand_addr=0xffffffff80000000}, @in6={0xa, 0x4e20, 0x10001, @dev={0xfe, 0x80, [], 0x18}, 0xfffffffffffffff9}, @in6={0xa, 0x4e22, 0x69, @dev={0xfe, 0x80, [], 0x15}}, @in={0x2, 0x5, @broadcast=0xffffffff}, @in6={0xa, 0x4e22, 0x80000001, @local={0xfe, 0x80, [], 0xaa}, 0x5}, @in={0x2, 0x4e22, @multicast2=0xe0000002}, @in={0x2, 0x4e21, @dev={0xac, 0x14, 0x14, 0x16}}], 0xe8) setsockopt$inet_sctp_SCTP_DEFAULT_SNDINFO(r2, 0x84, 0x22, &(0x7f0000000280)={0x40, 0x200, 0x5, 0xb1, r6}, 0x10) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f000020affc), 0x4) shutdown(r0, 0x1) 2018/04/11 12:44:50 executing program 6: r0 = socket$inet6(0xa, 0x80003, 0xff) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @ipv4={[], [0xff, 0xff], @dev={0xac, 0x14, 0x14, 0x1b}}}, 0x1c) sendmsg(r0, &(0x7f000001b000)={0x0, 0xfffffff5, &(0x7f0000019fa0), 0x14c, &(0x7f000001ef08)}, 0x0) 2018/04/11 12:44:51 executing program 2: syz_fuseblk_mount(&(0x7f0000000040)='./file0\x00', &(0x7f0000000000)='./file0\x00', 0x4000, 0x0, 0x0, 0x0, 0x0, 0x0) r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/net/pfkey\x00', 0x40, 0x0) getsockopt$bt_rfcomm_RFCOMM_LM(r0, 0x12, 0x3, &(0x7f00000000c0), &(0x7f0000000100)=0x4) 2018/04/11 12:44:51 executing program 7: syz_emit_ethernet(0x66, &(0x7f0000000000)={@random="cd3997030f00", @empty=[0x0, 0x0, 0x0, 0x8906000000000000], [], {@ipv6={0x86dd, {0x0, 0x6, "b40900", 0x30, 0x67, 0x0, @ipv4={[], [0xff, 0xff], @multicast2=0xe0000002}, @mcast2={0xff, 0x2, [], 0x1}, {[], @icmpv6=@time_exceed={0x21, 0x0, 0x0, 0x0, [], {0x0, 0x6, "b680fa", 0x0, 0x0, 0x0, @ipv4={[], [0xff, 0xff], @broadcast=0xffffffff}, @ipv4={[], [0xff, 0xff], @remote={0xac, 0x14, 0xffffffffffffffff, 0xbb}}}}}}}}}, 0x0) 2018/04/11 12:44:51 executing program 3 (fault-call:0 fault-nth:0): semop(0x0, &(0x7f000001a000)=[{0x0, 0xffffffffffff0001}, {}], 0x2) timer_create(0x0, &(0x7f0000cd0000)={0x0, 0x12}, &(0x7f0000044000)) timer_settime(0x0, 0x0, &(0x7f00004b1fe0)={{0x0, 0x1c9c380}, {0x0, 0x9}}, &(0x7f0000040000)) r0 = getpgid(0x0) tkill(r0, 0x1000000000016) 2018/04/11 12:44:51 executing program 4: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff7fffffffffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) r1 = accept$alg(r0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00003bcfd0)="d3ab27191a", 0x5) sendmmsg$alg(r1, &(0x7f0000007e40)=[{0x0, 0x0, &(0x7f0000000900)}], 0x1, 0x0) accept(r0, &(0x7f0000000040)=@pppol2tpv3in6, &(0x7f00000000c0)=0x80) 2018/04/11 12:44:51 executing program 1: r0 = socket(0x1e, 0x1, 0x0) sendmsg(r0, &(0x7f0000030000)={&(0x7f00004f5000)=@generic={0x10000000001e, "0100000900000000000000000226cc573c080000003724c71e14dd6a739effea1b48006be61ffe0000e103000000f8000004003f010039d8f986ff01000300000004af50d50700000000000000e3ad316a1983000000001d00e0dfcb24281e27800000100076c3979ac40000bd15020078a1dfd300881a8365b1b16d7436"}, 0x80, &(0x7f0000447ff0), 0x0, &(0x7f00006e9c68)}, 0x0) 2018/04/11 12:44:51 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000000), 0x216) sendmsg$key(r0, &(0x7f0000000b00)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="020a00000200000000008e79000000006b97f857a1693b088a2ebc4d07b8395ec60bf7123e73d7e48ac56da96d82bf1a67c741cf09e2b168ad5044dfae4596f1b2bde441e49c84225d9a46e5d40b921c4e55847d15cdc1d17f7217d7104bf571f618634c8cdcc70e4fb407320d08d3f7c902b82f05c0739f1bcebb199b96ce9254ebfb0cbdcb6dfa5c1b6852604bd00f6a47"], 0x10}, 0x1}, 0x0) sendmsg$key(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000001c0)=ANY=[@ANYBLOB="2012000002000000000000bb4c7ba40b33f9d7f8"], 0x10}, 0x1}, 0x0) 2018/04/11 12:44:51 executing program 6: r0 = socket$inet6(0xa, 0x80003, 0xff) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @ipv4={[], [0xff, 0xff], @dev={0xac, 0x14, 0x14, 0x1b}}}, 0x1c) sendmsg(r0, &(0x7f000001b000)={0x0, 0xfffffff5, &(0x7f0000019fa0), 0x1e4, &(0x7f000001ef08)}, 0x0) 2018/04/11 12:44:51 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$SO_TIMESTAMPING(r0, 0x1, 0x25, &(0x7f0000000000)=0x802, 0x4) setsockopt$inet_tcp_int(r0, 0x6, 0x10000000013, &(0x7f000039c000)=0x400000000000001, 0x4) setsockopt$inet_tcp_int(r0, 0x6, 0x14, &(0x7f00000b2000)=0xffffffffffffffff, 0x4) bind$inet(r0, &(0x7f0000b55000)={0x2, 0x4e22}, 0x10) sendto$inet(r0, &(0x7f00005c9000), 0x252, 0x800000020000000, &(0x7f0000303000)={0x2, 0x4e22, @loopback=0x7f000001}, 0x10) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(r0, 0x6, 0x1d, &(0x7f0000965fec)={0x40000004, 0x800000000000852b, 0xffff, 0x10000007fffffff}, 0x14) writev(r0, &(0x7f00000002c0)=[{&(0x7f0000000480)="b8", 0x1}], 0x1) sendto$inet(r0, &(0x7f0000000080)="f52f", 0x2, 0x1, &(0x7f0000000140)={0x2, 0x0, @multicast2=0xe0000002}, 0x10) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f000020affc), 0x4) shutdown(r0, 0x1) r1 = syz_open_dev$usbmon(&(0x7f0000000040)='/dev/usbmon#\x00', 0x0, 0x8000) getresuid(&(0x7f0000000100)=0x0, &(0x7f0000000180), &(0x7f00000001c0)) r3 = getpgrp(0x0) r4 = getuid() getsockopt$bt_BT_POWER(r1, 0x112, 0x9, &(0x7f0000007580), &(0x7f00000075c0)=0x1) fstat(r0, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, 0x0}) r6 = getuid() getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f00000003c0)={0x0, 0x0}, &(0x7f0000000400)=0xc) setsockopt$inet_sctp6_SCTP_INITMSG(r1, 0x84, 0x2, &(0x7f0000007680)={0x3, 0x7, 0x2, 0x6}, 0x8) getsockopt$inet_sctp6_SCTP_RECVNXTINFO(r1, 0x84, 0x21, &(0x7f0000007600), &(0x7f0000007640)=0x4) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000440)=0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000007380)={{{@in6=@mcast1, @in, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@dev}, 0x0, @in6}}, &(0x7f0000007480)=0xe8) r10 = getgid() sendmsg$netlink(r1, &(0x7f0000007540)={&(0x7f00000000c0)=@kern={0x10}, 0xc, &(0x7f0000007300)=[{&(0x7f00000004c0)={0x32bc, 0x1e, 0x102, 0x1, 0x25dfdbfe, "", [@nested={0x140, 0x26, [@generic="db054cd3804ff5ac9edc26322411603687d7bc4246822db5599748506f242a42b148aab42d74fc7d5579d52928073504f3e82b59a67739964d7d543ec5dea0a15c9247d3a45631bb2c0344e2395657dcfbe1f686d8a60b608a0e8bac323c1be345cb156b3b02efe90455f3ca6c6de334258c4377ee31d1a357085a2e6d8f2939daf4e9a06440cc2fe1bd632b3b7d21b2e4db45179f076c8bea613c7e", @typed={0x8, 0x15, @u32}, @typed={0x84, 0x32, @binary="08fb7d652686a7c923e05627254e0758e14315c15e81473652674c8118458438dcb32e55cc9f1aef72d5fd977945b13a30505bff9ac0ed8b44f5517a1931831df19aa9b3753e8bdb19d03e9b2f06e2df2451eb4bd519dd5dc29e09a643f5cd958166af59b68fc61db0229b7326edf907233da3b2b07a2859febca2f1ba19"}, @typed={0x8, 0x57, @uid=r2}, @typed={0x8, 0x8, @u32}, @typed={0x4, 0x7f}]}, @generic="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", @nested={0x2158, 0x2d, [@typed={0x8, 0x64, @fd=r0}, @generic="8a7fea73491c2bdbc8e9efd8c015a451a8c133eb201fcc1410e33d3e5b220b7966d712af8e49e14d9b48b6f7a82debe5212df10351bfa0a384bb20bd", @generic="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", @generic="5079ec942eb201b9af676fa4970336212195b5f5aadcb2b4e92ccd95aab4ac4276a8f22d75d407c6d44b90a9bdce09ec42d3f5a0346dd285c33c78205a2768d6f075beb418c43ec6ceadad54780f8cf24c6eb79a392e2187698b144b88373718c3560da715c89a9f815c93a0f29398f037d51572859baf3a86fbf68da8db1ae77168c84a61ae4eede80378c43b8499af82651cf0f003aa72a48d99a852a7d97ef408a9a0e9ed8732b2332c4c2a5bd114c361a50e42252142c90da4602c75a6b453d63b9f18c39b49c8eb33ae4807817724685470ccfa2fc5f3f8e1021d530c12e57ea4c683f90cad5e1e281f2c646d", @generic="7077c2ef56a324f5acb8aa3c09e5e1e8b6b4ff48e89567", @typed={0x8, 0x64, @pid=r3}, @generic="67074e213229376840ddc3052e84d546641412aca18049d60bdd6fe1f5f97534da5e2f9d42f7d0b1cb9c32bd68d41b4a2c53f60162a9461a6d9a07358d96b8009a5422706ee4f448db985b2a45c972b9867629217d16ddc90bd32dcfe8f6ff5757099d999d554e1ff9368943b3186705168576c6bfc2ee48315ee1b687dc649ab0adde5b13aa87b67fe014bc500fa7a0776288c4f3c3b1566a84ebe99c8946560d4baa830c13701ca134e9cfdbca2ccd945b799e542593e8b087133e1fe8a0ccf4dc4d5c7256222ad30a38fd3d4536e26701090c8dde173508d9ee2cc4cd04a9600f07c5c72dc72747a364e81c6e1e3c6f444c87b3df269df5e42e0b82a0c26f2f279fd49f3c6aea0c91d8a99a11edc7fb37347ec69f58fc2361c8314b7c2d8f45c7b66dcadfe6ceef32b8f044806a74359e1fee1e951f627028ce7b54f81b093a7ccde396915c48d31c0177d9259aee22bce9d86619c0a7fcc5c528c0ef7e1efcfc1e1b4ff3eae490df1ebd79a5c5094499dd923ad2c321a4bc7201640d3fcfdb07fa357ad8862d0f000c8f0a00ecf18cfd1b95f64cd8a93de96b2808d847dfb93ab8956b088b4cf6ebe07f898e1dde474521c0f692ae1f562730e05c84a646b406c342e9b5d3e1d5988a8b035a6d397b7641694c6259cd9d7898d2a58fec0f605b0ab2ad76cb9e67bb0d1b78ee29d6be2471add30952e96910b0094848e3c4f1c31a8827cba2c2e7bdcf61b9caa844e75390f4446b3699afff89b9acb765fadae0b5d944499864aa8280f15177e09af9e0df26e58ccf3c71142765a9eebd745a1687d5a21dde07f7d75af40508ebf24b790b7ff5f292b89d12ffb7bd839001f670dd1c019e820185bfcbf3ad9536e2320ea9c09c98c9f6c100c114b7efdaa06773371f8a0b848ebed77adad67f576b23d1095ddfc1f2f3c717359925c2018646ae6e8a7aeb94b4429814b0f27a92cd55e25c36ab49d2971f23bbc87689e675e8e4dfbe1644b1a755e06be3f8c389bdcc2bcc8204d7fe0440b74e126768f41ee65ad25513d418d9adb135e8e14d306472e81ffd765ecd362253a4a9a5be45372268a77ec04325f31d53e08cd4741678206a616fadbab45349fafcef4a5a979c2035b0024a67960aa4e8fdc6fee299cdfbe3ed43b75b7ea03e98ae45be562140aa00a6a653adb316e0d6fc43d3c72b2cb9a69e3ab5c8bbd3ec26e3dc94c8781a19eb4dabbb5fdc9f4976bc99c9ab4b8b392aefa3bb5a9aa6634df1166fda247caae87c74a08267b8287af1069521640f3e866155b4a96df4b68d53cfd3f18991e8f0b59fee3b09c610c88e0ebfc0b123423086d5a33b92917a07c1d4a070988eca74feab29962d63773ee1356d3b922a0fc5771a91d9665664c8e1cff0389364c4c761475b8b050e054c4759125359801c02efc8a2ec7e55c218da3dc0282ce99f2a7d8b0602aac42203d32e38c29d8c7c43289d106e627c1b4d333c107abbcb7ee3ac4a25809c8aecd386ff49b8941312629efd65a43433833cbaa356ebf2fa2806959ab983f9e65b4cb32734e72ddf651cae79b0a6961d2791e0448cb68c1cf0d42fc606588ba290bc889da73d0c606eaadf9217f2f98c9ed22f68502fa5256cee0333ed53bf4428e43e438e50751e5d890e62006fbfd9cc4fdf9af45296be25c55c047292b165cc118158d7bee4d40bf470aa9281f3a7d80f804c924fc2a7941f4c8873263d175145fb6e6ad753ca9d73359a44f28def633953982447dbf99e46e402251567252ddea2b84f48a4b736cd2440084d7fcc253ae66d1b13da9f2f8a8d69b337a1c0eed6c9cdb753f582ccfb6129d5d999cae7ddcc49b71e3885715c013ee2c216b85c87312b00993787f64b66b1222485dc413be5ed673ed77b6de4b7b2d17d7de1e5b8259cf0864f64e248030cf987ba1c3a00f558e5791e4f480c9a6ebdd59ab470071db4b9a22eac865243dc80baabd49d8dabd2f83ed92d951eac29f9aefd9d759c982e4beafca1085932bb8e6cf4fddcd729fd9aaf911f1f0330620fb4859fafc992b262207f4f65c40011cd2d669e8cb0ed162150d8fdbf599f2c096f203d1d95a849f8dddafbd183c308e20dcca065435c6a488f54fdb31ae7d51dabaab56a543fe9ba88571a80009b99ac930a1eb281ad76aad8da8ca8eb6d137b12148f95b449a52dcc371cd0b65f31a545c81bc7afab693e50e2bff6caa78ac0023c1009c9133a854949474be876921849187a813e57216494fefb4f5892c13d27328a298894f841c1bff37e5cad599e4fd33ff9c0f6e6c41c70ee8f60d40a0ea44bdc1f0d2e2e1b83069b9270aaabdd2052b602a4442e2e746dac90339d695c1d4497a8238cf58b8c51ec90341b12cd2ee180da2f3fee1a3de425a89ef4eb3f8853504a90fe5de5c78ff63bcd7ce008a5d1ac308f0d1f69ee3c7024948a076958d0f65a144d94532eb047a79eecb71f02fcbe0f4dfef9789e0246ead5b7b05ca252f585a386eabbbdadb187c17ce844dc84770449ee343b50477de0dc040e2c5df9d62f33da85348eace581189500946fb9ed9f1500dbf4ef73cb3c1d3ed357e25d1961c31e1541911a7f332b65ec7d4df19f4a5c6137826143e78d2feb9ca87f6e465923f7a66a084b34c973989b0fbcf457c40ff5af0c1b61ee7d0bc660903f0fc216c28dad39ba9e3deaf08aa9e3a76e32baeb56e64d530977f894af8d6df3d8af3d33cf44c865fc64f8f6e5bf8de1f986d28e11f4336208bfd148e6ed8f4b0fc739ffcc307569a1c76dacaaed72f9a58d5040e8e4d70416d702d63b39b6a35a41b34d43c7c2979bc3c268700bc2152c6d8306e746d32d5b456654c8e6651ca0715ba87c49e3753f0ba01c91451d50a02fcdafa1219a4cddccb4b7248c9cc97b344097fc5154bba0ac41e0eed13c92fb85871d4afbd50d8c6c3f20459f6fb4acd782475ff8b9cfea454f002521e02483c25dbd2d66a5958ecd9a1b00829827025cf389461bc0d97bc4e828c9972fb29e20c7079aa17e4494f320368714ad234b890b0db4237b433831a5dd3c6ca6595bd772c12ccbfd1b7a9508927a4bac1fb878fccd25dc30969a54606f27c7d6856e59ed945533d8c6614bbd8ab822e7bf6b230f678653b5f355861c7ea1843c638a09872fe5914de658302742b6b891bed6c49a7f6e0468de9fa948ad81185908595ce6f87b723c2f442bf75fd1cd2807add49110fb72d22519eb7982679514479d7aa19b979686c89ae8a99407d1ce70a0eabfcb0d86e82a42199931972d326d76abc44eb6653f902bc541cbe858290c895699d5b19d298654340a2bd864a26c73bc248041d897bc15d41a06b081c433190866e4a8e9245246158f1703445e1d9f07a5e2bd826c07565ca1ec36f5f42889ce53a18cce2f2b2a150bb5361b836710ea9f0ce9a812ef0f754ee3b0934e0473bd9a90d66e5d189baec16d7ef7989ebf02d45d04a73d737e27844b0bd04744cbc77de43abf3c23fb2bbf5526c7dedb1730320516926f16e2d391e3df32c44c25a0cc15dd1e4bec234320b2ec9a6000f090b0f165bb577155983ef83aee0b32b79690b53c43d838943d22dc1f5faf228d8062a2052fd5dbe4eb34606ff6e0240ed6796dcb0c00288f089454827acb73fdf02aa8b0e48aff0245f0d56b4dd08caf29f9071578fddb54ee2db2d6aa6e567a0d5c801b84ca85ccba88d2123d8043ddcf64a1c9254dd7c7b6f0ac4ccdd26462e6b807054335021ffbcdb3a3a00eda51df9fa233123d0cb4973c8fbe7287f0ad10eb9e9c62dbbb9869365055a6d0303e9232ff05a278fc345e75740591b7d1c6d07bc8f77c03ece635cac1f0171f9bfab28c1b79c581b93766504de33b82e56593ce1785b904d1171b614769d3ea2a65233ee62892d6a74887b1ce4f868c20249762f9e0da3ac6812bd59bfd98b91978ec5dd6ce9552f1c6b60765bf1174798ca52be5e9150a398451c7daff061e1b459de7e9f5ba232a61006ad5e5ac5a6b2d95065eff19f35859b74b4a0c1338a138986f98ac18c22aa84bf271edc55629e99522757a51a842074b4dff7fffb11b2b0b1e58f3eea9e471463cf06826841dbd7f6afc3750ede7bf714af87d1a3e734e22b2c58ded6e771cb92d64e1d50e8486162d560873a369d1f66324e8e77f104647e59d3bc6e92fefa2950fb4f81344ec631374d79c5e8ed14f6426f6c9c5d1da2db423b11ccf4a02764cce064f34bea3a0954a9de5cdd715d8538742d7630cb4b9345be6b5e52ee722d19863ed3afb15052f288f3a81e51d966b62619d8affdebf2838673ef3d575439954939636781c4d4a627e0c09d1194a02133506553f410a8a66a52639056544a7eea2dde2354b77a2fd7c64d105fef3e34908aaf9800cf9aae37d4a05169c7a6a37e46d142931e889d554038a18c2e7432d60f9f80ec0794b5eb9528a3d7f29286d5e2e213e9c8dae2388c8c98ed0a5a6ace7494a92f437ed350837797df053c5cc73498e3b6379cb62aa17ec70bc0c8f99b2b162bdae7f1e43cf064ef757ffa83acf563efa1ea3c80121064bb5ea7875a74c353bf0135104dc9925732644c1fbb0f4c82d27b79235b967e71eee46cf29f06e1529869e4242c85cdaf2816f526811facac8111d9f57d1bec1707d981d73273f331d798d480434cb0737b544930a70f4196e51d059881fb56a2ad90a3f04896bb332312ba868c327ffc541386997e54eb8ecbad20f220f20a9f75020c78b10c18c0848598a5eca8f520c1a8cafc133d095cb1e186ef28bbeb7118742711567d09e878d168fbe576aa7f550ceca4c033ed47384b3eb5f3574c38c0f8f470427747c4967db8377a4deabf32b8e3a7b8b5841b57828fb96ec4efc90d2353b9dd2e0aceac6d3d312777b6d4195bcaf7d7c5f09da4b53d0f4989477485543a5fe2839807269053cfcbbefcbebbdfc2668deced153f8707d4d3c2d870c32978eba79cb323b7c4a6a57c2a7d55e3aa873340bc57c99af9ccc984b3cff44c478d37750f979da0f59033c9298a7f160202e2d281f52780adda0bcdcd12a950805a8b9003ab9eb497e847d3a3b84b42d4f570d0bd9a071d5d1c0f305a9f4d7db1a8cf1dabdb2c5a073076b08c505d8de73f260eefefc871d4e88b3ed0511382ab0f71223d05a94a9dd40a759c9b28d86cadcc6a9fd0716a3db61f13d6374780e9ad1dd820a9413b48f3d52055baec9f1533635a60457b295de7e81f309b0b0f11e7284843652c1c171d2df133754122c4c9f72823ff5d51caf5da9667b0585047dffdcdd7657179bc59f2faeea1fb5c77f6b135c565abe0ef6b45f8583b85abb62a2d34f28196448305db35674a605fc865c5b2dc25a6d9ff515cc01da94461b47370de7bc283a482fbb0f67518af79bc3200d46a73773f9b321045e99e45ddbd896d5795d5a438b5ce17d56014550d9c90059aec968e1a3dbb33ee4215a73fafc79487b200327101714894fe09c76462e829deba485c4e240cad929ca368370fce6199f221b76156552bd7ef53cc77cbdbb68063d3fac6402665f5cc4f48b98c5cf66325c2f38424c4425193c29b5b17832b62b3bf64ee6c4b14d72ae52feeab8df47f7320d9f0b203c48114616ca3da1e0a554190170d92f645d9ecb48db559e62074220c682ecac6eb4140e715554cec9021bb2eadccb8724d4a471762e450f839287d9a0c19a916e593d3077e4e8f5de2e2b91dd918c44c649025205793b38232e3cdaad214173088c476f1c2a02cbc5b46cf097738d182453a4df99e03a41c2"]}, @typed={0x4, 0x7d, @binary}, @typed={0x4, 0x61}, @nested={0xc, 0x95, [@typed={0x8, 0x22, @ipv4=@multicast2=0xe0000002}]}]}, 0x32bc}, {&(0x7f0000003780)={0x260, 0x1d, 0x1, 0x70bd27, 0x25dfdbfc, "", [@generic="5d71d1bc96a39e290f38f29a2553b6222f8fa88a44cc2577bca3bf28882ae97fa09be07921dbf0d3da3fd2ce0509023f4ace0e1305cf3d6a0c73de0097c2ee30b91277873171dc18ce45f4ba2aed94d32a4d227f407a35b30476aeaeaa4e1ad7be275059cfa531640b0549376a5d4d9eab1888877ff026ac4c0dafc69f", @generic="2930523a67827b442997de8c35a019136262ede169025b7a62657e529f035e23da80566531c5dbaaa66e31b0cad09e1c6e084df521a702a7a32ac30832382c48d23dc3946160a5541f9fa18527972e943560ac844004fcd5919dbdaff98311bd009251e40bfe44c4b23d7f4ea4da40da35517a019cdc537c1840363203e27fec17b05046c0240f26ec7bced978483ee9dbf6552e986f3a74a26d9336268135347930d4f8640ecc7e25850ba0cb64de2864c2f553741e54384ffb42fade1d1e8c8f2a6b845a3352db55b0f9a2e2d88dc7598449faf82d58f5b8", @nested={0x1c, 0x54, [@typed={0x8, 0x1c, @fd=r0}, @typed={0x8, 0x52, @uid=r4}, @typed={0x8, 0x8a, @str='\x00'}]}, @generic="feac631c", @generic="8350242062c33b5ca47e9856dd6124a878b71f0ae301ce7b66ee2cce67bcc1a5c932bbd028e2edc735b49c763f53307c79a249ef7105c355159fd3ba5d01ec43b4f2d970e338dcf93f6320b90587d266d7906d36e22b01227b4f3b3d4a5abf5397cb1f432172008ceaa08f17e2cd21a46da40467a107e808d8a9c01c06d290f74a318102e7576db2946f53adf81bdc067bf6889ab1af19ed1ee7ea2f2b53df583e4ce0cd9247a3058af0ccd897550e1f438b6fe24ed94647b6f5bebbcd7d51de4fcc7374d82672bb308ebfc855ea382b40df9e9656682eaa"]}, 0x260}, {&(0x7f0000003a00)={0x19c, 0x42, 0x400, 0x70bd2c, 0x25dfdbfe, "", [@typed={0x14, 0x66, @binary="76632f50b6889bc09b94d669c3"}, @nested={0x18, 0x92, [@typed={0x14, 0x94, @ipv6=@remote={0xfe, 0x80, [], 0xbb}}]}, @typed={0x18, 0x2a, @str='vboxnet0+vboxnet0\x00'}, @nested={0x12c, 0x6b, [@generic="709cbe12721bb40bdc9387313e7e1c7555b50dcfba85750339cc67e9c0474093c9b0449080751a529a6124db16b8c990faedc8e0323cb5712e3451d56f998f4c060f4432ab100ae2ed64d810548cab91275706f70e38bc0681422d7b898abbfa8470424dd69d186bfbed2ce6313c494a2491448423542ecb0cb3cca68820df67c25e671a7c7ab9d73ea7e52ea22510f0829ac5", @typed={0x94, 0x96, @binary="59d84fd80bf8d5c1e1b109f3bc2ca0b5f20edc829f99784d1a35a2642490180b676f5b0c19b84c19631457aa088516ad4a557a6051b9e049586b744d62ed5ab2be58e11bf6f021699ae85fac7f7a27393123b669f378292dd73dbdf2c0d9a7ffeef02d4d84cb9b1db97855b45dccd3aef63cf2b64c74461670c8172732df60b58fa33cd718f16a74381ecbe19b"}]}, @typed={0x8, 0x6a, @ipv4=@broadcast=0xffffffff}, @typed={0x14, 0x84, @ipv6}]}, 0x19c}, {&(0x7f0000003bc0)={0x22f4, 0x3d, 0x8, 0x70bd29, 0x25dfdbfc, "", [@generic="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", @typed={0xc, 0x2c, @u64=0x7f}, @generic="234be4f9a08a6f5f58140148e9e313cfd813e5d729ec6f36f08d57a32b7df79c63d46f0355401a23077d40d1e8f53e81ada85cf59427e898bc0a51da815d7192be152afcbee216e6db7ae5fc289b5149bbd78727de966ef15b60c5ab4604b169960cd0e94fbfa1dcd11b2f00ac8134eee82872e963c12279838a7a326a5f2ca4ef5ccf6c661acbb7e0ee1560ef743171726bf5e6d8fbc9fe4e66d7b962b1c0b8cfd77605337c4e7bf7ddc57586eae606e867d460fa31c6cabeb007186664e052a7016b1f3bc8fff2d8", @typed={0x14, 0x49, @ipv6=@remote={0xfe, 0x80, [], 0xbb}}, @generic="6a981fa9448f9b30cbce042477c3c49d2e996db2938bbc2e2261a86784c02780ee61b77b4f9fdfe2fedabdcf5ec670498b949c5f9ee4500ad5f325861964dec86664ae2be46b7d3826a0d875ddae56170d0917bc", @nested={0x11a4, 0x82, [@typed={0x8, 0x31, @ipv4}, @typed={0x14, 0x6f, @ipv6}, @generic="1e0c6574fc8e2f0d44bad824eae28b2a3b5a30c83d31d3f1ecabfb7b4085e64b40a2517187c590e55af05ba10c60df745101b502c586cf10b0318dccff5afb2e9cd424924fff8c8be3b37e32a51fd390edc6649d3374d5751308569098c8b9bb0ee0c2d5011b747391edbce873b76e60850df27d7c76fbd05a71e9b5b9c36ea2890ff9ebb86e6885d14ac8d2357536693cc0b9f150a167993c8f7d0ae20e448c77a6f618104212", @generic, @generic="67ce86e2b7ed443adec75564112e686f82d3bbb13d7bdf48a9c3eade938566c0700e0b5b083638878fd4e51d54994775c729c9ae8d402531314c1d6ef413add72a9c542f5d7a7f04c261fcf336c31462925d7ed9ec83911446324aed350a0b3a39b0fba0b59bc43e20d91306e444478442f68d73253e44981545b8c816986ab131123eef6c1f490deb99ffe8af3175c514dd20453af7f484722e2c0645587664bc644c081e3196250e15b788a29594198199b98c1561b6e7ee4b5c9df29fc481f3287e6755e4733f9728445de1ac5ec544d29d60318f276c659e6db9bd320c2e3d4de8d5f36f2590a8ca38f13864938915634cc92c35eb62c30d5c80158b460831751b46da57b7d1df19898138dcfd1a5e4493fc68a2d34a22459bb65f42f4322e33dbd418a15c31efab2f091a5b855899061ac196ac89ee92629f461aa804e095716e594abe0bf33556c3e13392414745dc30e0eb8c9de1ac2ae6bc1bb6b275190dad1eb9ce826bd11691105d7f969fd7984edff1bf71b763a6f377e5adabac336ddbf9f05d65e4708b23671f2da574c8edd474e28e3b889fade604c728059a4fdd6ebc762d8b492ca174a9c70d13e0976483596d932e24541b597260c68077a4acd513bddd9ee7bae03807986de049683f6921b9c76c38cf7d8235b882b8bea5b8249f163454ad3b764f9f46893267296beabcfa86bf241d33aeeb706b0ab35ca550122dc9686037392165d6a5230fc1ed83fc08af58d24653ab763e214fb488becaa1efe51e4945f29f0da014fcb7a1d0bceacd0459ca9a757d79d1ec90fa8e0242db7b88fd2a552b9e2ec4248b122522e8145063ce4d06b25b2390d2f9a915ccbee8ce30c67ba8018ef8ea83263548d5bfea9998172c2fbbf42496c33f06aee2f356152947008c49c347112c2273d6fd1c6939158f96308efa187acd05cf111d1d32ef6192feea9ca11cc7db8b97f7cdb75a3f0741d27c768faab3d2484c91920538f431d14efe68223db6a84bc26e321ffb520175b42d73a94ea0021e115ca62fd64002d457d2ce6632662e48cc9bc5fe5e960ab9c7dc677c94f7bdeeefcc767308ee90abcd39d5bc508104848c4d15326673e3b157ab93d613049b2617374054d9e17ceef0fa8ab08c229ce69486261ffc30165283e8b3ac5d40ac43390589a6b05af2950195d367b6de6576a65edacc6e1067eac138b2acb3ba0b2dbd874168c26c0734ae67903493ff8ded57eda8c8278aa17ae9c044b8ed3bdfb6556823a9d88cf5ca06d85ec50f801b1bd80cc8a48a039e17d9622c90ddf0150db7e4445766274509c5edf4702daabc144aab41fe09be8c423f28d059bdd37951a5a5a5ec7029c27312e80d87ec29497220e5df72f6f866e934f4f1e008ea62547f30492b1058b7e6e64050dac87c4576e7ff311a11647c8b7405b8d22d5a6cc897aa0981748b2254e568501143a20b9e865450cfe09c1cb400e892471c17027b29382229ef4412cb6c37e49b6e81e4e58e57a1610ea04db4be6d7dc0680fdb5a8c4daac6353185c38dfa3752f2e672146da4ef46a0361916b23543bfd721e819d34bafecf93879c722fa59178258de1aeeaa0b3d7171c4da7b01120773b44f417516b84ab80da9eac0dc6051580237975826240e76dce6c0657c55d797fc1016a9db4fa4201201c96d05005a54027c2832d9cc58a7c9f693107748180000a46529176a29cc398508eb41b6c84440faae997a6490850841efa3cedd311db0684f2003d83687203f66757db739f2350dd52b7c4cb26426e74e17743a685595811488051c630a73f67a7510a7d59909e604c0656164c17cccf4d05cf8fbc416eb582f195989c4126e6ab3680bd0fec462c4e95b571d7cf0bac7f8e0e0323c719ff541348777a21174a4878cd3af279657a8f6514b095c40ea4c9ff576cc4ab0d562e0e318f83430e1e65087f19341dba57466e87d155fddead173b6d06d1c1d7ff5522efee41eee60b5d405b29f290f9be3c89c36b47bce5f2dd37488bd910546719ce1ccd4696971e85538e30cb6fc72b67484a7beb487fdc2011fb1b414603039b073428ec5aefea4faa1acdb178dedfc53d2e092b46eb46ec92ff9a40323f75016bd243c1c7bd347c70193edb138cb415ce9a7633a263818c9a10d952a0742c5b96fd3b3daa92fac3b0be5681311a9ccc0c904262296b636a3456a64a9135b8ba96551d28e83efdfdddee3e4240d880b3d0f8b50812afca35fa44913bb6019e2f43386677633d7a00749bba8ae81e887f4724f99db1e9ce9aa3f5f010a935fee5200d2bf947f94cfb5f006ba6e554e5bb630b3f99451e5e2cfe3cf0eaa4357cfac89126c5972a9560857523fee00020e4df3900d846ca31e2352c61aae046a273073626be50092ec270ac67ba40419b4168b286c0a827f231d98f8ba2d9e1545022470a1f72e4e20bc5b36340df37a1ee3bbb0b4008a8979a60da81f9067cf63120b1c989f5d59754b298151a63bba4f763acc9b19023b38c31dd92ae9c24f751dac8dc7763befa51ec9fc6298a630749f86c87b7cd13c40248323e569b776d2e32bf2d15fa79ea277590eaea5a4c1f5050ef6d7dbcf7292adbb1000948d5da80e16451370c090712017de3b48c836445e41e6eb8d5e82ee1542b1103e3096708c11d6590cd29911fa5115f80bf0971f54b464933b6073652badebcbd05aae7d7410ba770c03bc984bdbb4ced20d08412a04a78e5d1339a137e98a8eb08ef64443d56a321ef9112aabf601edb105ad60787c7cbfacd04c32e29ed7112b7967fa972e845d9cec69d0ab0f2c3996d3137c2e8039d07fe2ffc2d68dc853528ce8cc4de2a0cfa2613f5e7f58acd12f2b4b97ff49bf9766fe8b2ce9d3e71356ecad5731420f35048aea9071a7298f275b79c4f9c56b424f73fdf1c4d07e11c2c8e0e1e8e1158d2a7b7537e1d15f3b7356b3c9a4c3bda63f141668d270fd12d19df4d8b32a4b1252ae17399440a8c23960cfba91b6797f39a8d95a132ead08438b8eefb332f4c195bd0bbdfafaabc521e7fc56399137f8f0c3083c5764b5bf0c677b4185a686f3172b3f51430e910fd95865eb8dff603ba108a61b3d94ee6f2eebeffc74b16b1dc235b440ebf292380f9815ebb7936e4550bae3bb6a0af80b8010f4ff614b3b103e409f0122e958456679d41d2a4b2819ae82ce39b37b1dd77deda2c00540ed93422839081a28ccb653549b36bfdeef253b458062b045735bd699537b0b62b5a597f9ebb237b04e8b176fa0c4e35aae1ab883ae08296961562e3da07be8696763709e94ba4cfb048b043de7c49c98961617b3f51c448af1f0a243bac5d4c15c5d049889619153c2a44e8cec6a137fc564158de6db566d6a918488d6ec661f7defbb294df824109145af73002d767cae7192d2fe30411ee0147c98badf822c6297a08f657f9665125a63ce5c814f7b7d61c289beec0c530f269d36017401d312d0fc3279c7331bd03738652f4e3e5b9df97c4423ca839d02d068a509a2fd8dec7b17eaccde0c7f0304fc183049b4c5df7771b2a6cbaf0eb4289f14f7492ee5c2341c6a1a1a146749f0e5852fcdc4adcf4ba77bca70f2a4b77d444a99de0b2a100e1f4c6f2b59b233256083facbf887216175e42bce510ec17a047e6938f367b74b0721545a1856a3f72a41b9cffc213ae64570606a47144e5618ed0a35a63d68387757117575f15b201beedbba0f9458c35c8fc4723578661891fbe31eac22b4c9ef001d57827ffd91ecfd4ccfb2d161cd63b81b11c8a221540e8f54e80f8b0ad8ed080ae001a159536b2f625ea340d2a1abb6f738f09378e4f758a60fac9b8ecf10d9c3522db41648876cf0932a7a524c79d68c8df5e02313c3c654e381321c33b687021ec42e6224b864fc42343486dd3e20262342c23f0f6b785ab6ef3bb9f6a3b003eada401e8d81050085498e20633cc28657ae03d778dbd582a37f30cb92805bbcb56284dcc7155a365072796f61c80207d93652beb43655835b1734975fa215e64eb7a95428f4d99c94831b8065cdd55b07d5362d20e5cd01bf0fe9b57c0e7e797a9314cba2abb424ca139663a37df8bac1bbe84c32b96f69e61cc43af0bc4742fb2284037e8832c0c6785b3d6c4d9e0847c1e3d62bce8d7935391934d26bf773670dcc2d2691f653f181a5a1228be2244e6af291fc9625f5371fff9dd63a3418898bb338c671e4c2ba8e71ffa35cf6b51ac097469ad15d5957b2a86a0e76c6ceb09d8725d287c3f4cb602fa4ae05b4b7433ca442debd72447f6f96cb266ca4a0bc89551da2ddc7faa9316c9d7b80619d103ee967bbc4827901585b5f1c96b689b9727e3b10dd0b23c0ff1c2947d6a42640526455456d1ffd34dd5ff5874b95e014593956bacc669f3721f6ab091148e0955c6bd2f43dec23ca79464f9cd0e8ef706f1f2612a5149ac56cdf345cf8d8ee6b1e4a910fed44922ff424a482efed241373ee0eadb6b43a626d3d25afd5e716930ae4fe08fcf26ab32e2fa7448ea1f8219d64db006c885c765673ff7a43cb62ba7c5b2346149c2bfa2fe9de18799d589a40c612adea71e004cc78c2f966fea74d01f2ccc9c254036fdd433aefa37a4e379abd2933981e2c0b291475cec691d89653bfdc3462dcab03566a0791b60f95b9e496f8ad0d1fd1e8bf413877dc64dc9150013a15fa84d7a645bf3bad5543b3cac45432ee28b515a37caba8d8f323437f999692fed632efa5f31b4fe0cfd9c2ea6eb4890daa69623168633c33a872b823d69849c232271c8e73daec4eba1532bbd67af953f93d716c589aaa8c5f563f9e74479702e827b819f63771b5b8b58d50f0fb12a66a239505a964856d85f7c65a6632a244033a0f5296059dc7c4bb35cd3d5e0cf3e29987eeceaf95751aeaa9ce57cb84c0ce6e476c5f0cf00df8bc46f6ce47fdcefa38663f91928c5b11335e13838cf8cc1c5458fcc806697e41a9facad1057055fb821b7ccb1ab0878dacc10f1a71e8f8c0125366255ee7e0c639f9e56381e66d2ab5ce2ca9f78d9374db5effac76938fd30256f1e75c1872abf4ed684489c7abfabd3f6617456398a40b5e73620bee044b820cc84ce7b91e9ec1d4e107bf6819c2cbfd50d497c95595871cfe8fb0934680efe9d1c7348aa9d8482e4179f43a278a2dd04efb10566db0572570a53d36bdd5733fc9c8b7b74042e80fb21db057750e0be8b7361f7f4859def5e0b545417fc6675772649fecd002660b1f94bdec6faba2723048410eaf0fa55092390f524adf056301341e4b655d0a5a18ed7ede29d56834b44b9468e9e6e62765415f57eb138d685a6336157b493547d201913aaf8057b7c53aedb53e66573c05aed00e6d4766354aac735e3e2986cd5f73f67255801d88aada24d82aac29f4754187c7fa0956b0fd1587100630cc759ec5bf237e01b3072269aa567f715242ef5b10528900fd2d1ca952340712f242f8318b3e8722788e36ddc1b680b0775827a1e3f4caf56dcf53bbdc2880652a400194885ea06551d7a81200ab670eb5da7f42b30935ac61d3150e37bdacb16422eac5d82c5e72eb17bc747090aa648668a948afaf2ea7feb0dbd386004e211bc963953e53ebe92899c0d6a0d29442bb8ae2b8dd7f1f96c730e50a3590c8c44261270d32624c875071bc9bdeaaabbb9ca8ce608580c6518d822aecbd49219e743718605306c10fa89212bee8a39a730f8fae05a4d53de990a94dcad7b57afa9c257963bbc3f106cf5503f941e87928d254252bf7b640c4c88ae8b6", @generic="e7f21fc3bc3f56c23370964290a1e3213a8fdff82bbe8b3fd359b0cf28d32897286c1c14f5cb664e0b1c79f93759d9c2b3d4025d6a1983ff9976dfb394c4a17db9a95cbca887501e80c499794a486f9c5bc429ec77281731a3bc42be052b72575cfb1d1e08095e03f3ebc8ea5b71cf61b70fd785f5b3dc78e07fb363a32d8f2e6c38676f68b1c871f9a54e85729ddc95d53d1959142885d4dbd2f960f5614aabdd71fc03d6f304094c67162bf561a24120eab3066443f038bfc71a3974531fed94cb4fc67fb7fa8fd23945b94a6b05a2", @typed={0xc, 0x4e, @u64=0x3}]}]}, 0x22f4}, {&(0x7f0000000200)={0x30, 0x39, 0x300, 0x70bd28, 0x25dfdbfd, "", [@typed={0x8, 0x7c, @fd=r0}, @generic="218ba8f87cd67c1fb3", @generic="576022142a694f9bcafa78a51d2c"]}, 0x30}, {&(0x7f0000000300)={0x98, 0x2f, 0x0, 0x70bd29, 0x25dfdbfd, "", [@generic="347553dc6f041c2220b9d86cee4da6ae1e9e4370825a7531c1af015b4ea068d163efab9ba618e4abdfac695baae4a99eeb782f5b935f002107713c8f78e254f9080810333bfff16eb590245aad3fa5c45f09525c7cbedec9f809629b1d41c0163faee172c9ea25b27a0b61a1c85860b7f13fb6e029b16b1f7d2463b20d53a542d4", @typed={0x4, 0x7a}]}, 0x98}, {&(0x7f0000005ec0)={0x143c, 0x38, 0x6, 0x70bd2a, 0x25dfdbff, "", [@nested={0x64, 0x57, [@generic="cb2720a14b0782723c91eb028df468276d68ccf062e22c514bc724d072192b236893c540528def27b8b329d63912e2ad89e31c3f903ce63067865fa3579c3fd7", @typed={0xc, 0x1e, @u64=0x20}, @typed={0xc, 0x30, @u64=0x8}, @typed={0x8, 0x45, @uid=r5}]}, @nested={0x1120, 0x77, [@typed={0xc, 0x36, @u64=0x3}, @generic="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", @typed={0x5c, 0x8b, @binary="03d4a27c0e594efef29fe134dafdcbc619ce0727b2be2c70e1d24d1ec2b85971bbc4b3fc8281220e567ac8799c1827e290378415d129f664165413a29d7000c10f08160175517c999f483ab37103101dcaaf2a2b8fa33b"}, @generic="424a966cfa88998ccbdeb9d509877d8aadcc91361e7bd889515fc5b3236f337b655b6654e82bc3b60975", @generic="fcf4147e5a5e5fe54d6c9ac9729a03cbdd65dc27270cdf33e24fe9fb7d2b089570a9", @typed={0x8, 0x92, @uid=r6}, @typed={0x8, 0x16, @str='\x00'}, @generic="d97db762f32d9b2d172dd194462c6c86f31b64808da1fe658371639cd9ac5614b041d894470e52a937a1e44f85413183550356a6320a6a197342a35ad676826c8f3b4385ac9ccbf82e6672217ff9d9af22e85a292c"]}, @generic="22449e8c595e07290c355097f092d45f3a7681e1025ed50bbf41bee75716c0f317424317aaaa8dfdd85b8f0798eadd609828179394aa7ea1c84dd4075a99a02d227d5a8f0cd5d27d8eb4f49a46a8aaa3503bbac04d88baee4a42dde63af458f10e635ee01a93825ad1081d322cf0c916", @generic="2135a9d09f44c4416682208264db5fe9119474aff0e6c12ac725c85422cbd3b4cbedc16ea2f7a1e05cef27641b1dd289ce0695997dd7bc231578636be293af3d1f3efba0ff5e187b5b213875e55116debfc289725e9a2b4d80f81e3723bcded7819a3324751fcd74953cdee53dad734d0707855fa48605acacfa652cc6c1322e6c87b20be8780ace1482303d7f6e4b47878b6c763d9e5bbec68c5c45795359c8c23ed88a4d98e23cf24c8c276e973701d655a34ead722083fe1f11db150e641427", @nested={0x110, 0x44, [@typed={0x8, 0x3c, @uid=r7}, @typed={0x8, 0x35, @ipv4=@dev={0xac, 0x14, 0x14, 0xc}}, @typed={0x8, 0x78, @ipv4=@local={0xac, 0x14, 0x14, 0xaa}}, @generic="d18d268a41715217982bfbfe814980046cb4609882303dc0d2159641db06cb5b36d6df6f07db439fdb808afd6730500b9eb837cd3d65798d4d5cccab68da79d430ad53f104a78fe7f9428adf9249f3c9c649e89868e2f505153b1c3b784f35b7cf44b0fb2b2c5d53e5f99df62be5d5455e2f9b11b9d0832ea2a02762e43f00d939f1539502196e03e3f4531d83fe254c7dc79095aeaad008e5662f6cc1411e5d55ad40e08db3f7f3695903dc4b688bc2c9eab6f6a26e94ec3a8e717684", @generic="5e0f7b8786188626a3b1c9c6b5088a2a4f58b1beea9e13f9c9e090b9b4a43e803641bfd16d68701970e30a4bc782bd6a9e19a5aca2"]}, @typed={0x34, 0x2d, @binary="3fe7ea978a511dfcf82fb3bc01fda9d413d13d34ecfe4ff0f3bb02976b26e19c94ccf42d2dafdf891fea9d9b74a7f8"}, @generic="6f7bdcaec12e8f7425440fdaf35bda73f71bc61f68d79039b2e65d326ae3930b340b9829e9b8015fbd0b83130ab95e0b09"]}, 0x143c}], 0x7, &(0x7f00000074c0)=[@cred={0x20, 0x1, 0x2, r8, r9, r10}, @rights={0x18, 0x1, 0x1, [r0, r0]}, @rights={0x30, 0x1, 0x1, [r0, r0, r0, r0, r0, r0, r0]}], 0x68, 0x800}, 0x20000000) 2018/04/11 12:44:51 executing program 6: r0 = socket$inet6(0xa, 0x80003, 0xff) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @ipv4={[], [0xff, 0xff], @dev={0xac, 0x14, 0x14, 0x1b}}}, 0x1c) sendmsg(r0, &(0x7f000001b000)={0x0, 0xfffffff5, &(0x7f0000019fa0), 0x1eb, &(0x7f000001ef08)}, 0x0) 2018/04/11 12:44:51 executing program 1: perf_event_open(&(0x7f000025c000)={0x0, 0x70, 0x3e5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff7fffffffffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x1e, 0x1, 0x0) sendmsg(r0, &(0x7f0000030000)={&(0x7f00004f5000)=@generic={0x10000000001e, "0100000900000000000000000226cc573c080000003724c71e14dd6a739effea1b48006be61ffe0000e103000000f8000004003f010039d8f986ff01000300000004af50d50700000000000000e3ad316a1983000000001d00e0dfcb24281e27800000100076c3979ac40000bd15020078a1dfd300881a8365b1b16d7436"}, 0x80, &(0x7f0000447ff0), 0x0, &(0x7f00006e9c68)}, 0x0) 2018/04/11 12:44:51 executing program 7: syz_emit_ethernet(0x66, &(0x7f0000000000)={@random="cd3997030f00", @empty=[0x0, 0x0, 0x0, 0xd000000], [], {@ipv6={0x86dd, {0x0, 0x6, "b40900", 0x30, 0x67, 0x0, @ipv4={[], [0xff, 0xff], @multicast2=0xe0000002}, @mcast2={0xff, 0x2, [], 0x1}, {[], @icmpv6=@time_exceed={0x21, 0x0, 0x0, 0x0, [], {0x0, 0x6, "b680fa", 0x0, 0x0, 0x0, @ipv4={[], [0xff, 0xff], @broadcast=0xffffffff}, @ipv4={[], [0xff, 0xff], @remote={0xac, 0x14, 0xffffffffffffffff, 0xbb}}}}}}}}}, 0x0) 2018/04/11 12:44:51 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) r1 = add_key(&(0x7f0000000040)='user\x00', &(0x7f0000000080)={0x73, 0x79, 0x7a, 0x3}, 0x0, 0x0, 0x0) keyctl$get_security(0x11, r1, &(0x7f00000000c0)=""/14, 0xe) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000000), 0x216) sendmsg$key(r0, &(0x7f0000000b00)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000001000)={0x2, 0xa, 0x0, 0x0, 0x2}, 0x10}, 0x1}, 0x0) 2018/04/11 12:44:51 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000000040)={0x2, 0x4e20, @local={0xac, 0x14, 0x14, 0xaa}}, 0x10) setsockopt$SO_TIMESTAMPING(r0, 0x1, 0x25, &(0x7f0000000000)=0x802, 0x4) setsockopt$inet_tcp_int(r0, 0x6, 0x10000000013, &(0x7f000039c000)=0x400000000000001, 0x4) setsockopt$inet_tcp_int(r0, 0x6, 0x14, &(0x7f00000b2000)=0xffffffffffffffff, 0x4) ioctl$KVM_CREATE_DEVICE(0xffffffffffffffff, 0xc00caee0, &(0x7f0000000140)={0x6, r0}) getsockopt$inet_sctp6_SCTP_PR_ASSOC_STATUS(0xffffffffffffffff, 0x84, 0x73, &(0x7f0000000200)={0x0, 0x7, 0x20, 0x6, 0x2}, &(0x7f0000000240)=0x18) setsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER(r1, 0x84, 0x7b, &(0x7f0000000280)={r2, 0x100}, 0x8) bind$inet(r0, &(0x7f0000b55000)={0x2, 0x4e22}, 0x10) sendto$inet(r0, &(0x7f00005c9000), 0x252, 0x800000020000000, &(0x7f0000303000)={0x2, 0x4e22, @loopback=0x7f000001}, 0x10) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(r0, 0x6, 0x1d, &(0x7f0000965fec)={0x40000004, 0x800000000000852b, 0xffff, 0x10000007fffffff}, 0x14) r3 = openat$vcs(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vcs\x00', 0x20e441, 0x0) ioctl$PERF_EVENT_IOC_RESET(r3, 0x2403, 0x7f) writev(r0, &(0x7f00000002c0)=[{&(0x7f0000000480)="b8", 0x1}], 0x1) sendto$inet(r0, &(0x7f0000000080)="f52f", 0xfc95, 0x1, &(0x7f0000000100)={0x2, 0x0, @multicast2=0xe0000002}, 0x10) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f000020affc), 0x4) exit_group(0x1) shutdown(r0, 0x1) 2018/04/11 12:44:51 executing program 4: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff7fffffffffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) r1 = accept$alg(r0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00003bcfd0)="d3ab27191a", 0x5) sendmmsg$alg(r1, &(0x7f0000007e40)=[{0x0, 0x0, &(0x7f0000000900)}], 0x1, 0x0) accept(r0, &(0x7f0000000040)=@pppol2tpv3in6, &(0x7f00000000c0)=0x80) 2018/04/11 12:44:52 executing program 2 (fault-call:3 fault-nth:0): perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x1e, 0x1, 0x0) setsockopt$packet_tx_ring(r0, 0x10f, 0x87, &(0x7f0000b89fe4)=@req={0x772}, 0x10) sendmsg(r0, &(0x7f0000030000)={&(0x7f00004f5000)=@generic={0x10000000001e, "0100000900000000000000000226cc573c080000003724c71e14dd6a739effea1b48006be61ffe0000e103000000f8000004003f010039d8f986ff01000300000004af50d50700000000000000e3ad316a1983000000001d00e0dfcb24281e27800000100076c3979ac40000bd15020078a1dfd300881a8365b1b16d7436"}, 0x80, &(0x7f0000447ff0), 0x0, &(0x7f00006e9c68)}, 0x0) 2018/04/11 12:44:52 executing program 6: r0 = socket$inet6(0xa, 0x80003, 0xff) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @ipv4={[], [0xff, 0xff], @dev={0xac, 0x14, 0x14, 0x1b}}}, 0x1c) sendmsg(r0, &(0x7f000001b000)={0x0, 0xfffffff5, &(0x7f0000019fa0), 0xe4, &(0x7f000001ef08)}, 0x0) 2018/04/11 12:44:52 executing program 7: syz_emit_ethernet(0x66, &(0x7f0000000000)={@random="cd3997030f00", @empty=[0x0, 0x0, 0x0, 0x8060000], [], {@ipv6={0x86dd, {0x0, 0x6, "b40900", 0x30, 0x67, 0x0, @ipv4={[], [0xff, 0xff], @multicast2=0xe0000002}, @mcast2={0xff, 0x2, [], 0x1}, {[], @icmpv6=@time_exceed={0x21, 0x0, 0x0, 0x0, [], {0x0, 0x6, "b680fa", 0x0, 0x0, 0x0, @ipv4={[], [0xff, 0xff], @broadcast=0xffffffff}, @ipv4={[], [0xff, 0xff], @remote={0xac, 0x14, 0xffffffffffffffff, 0xbb}}}}}}}}}, 0x0) 2018/04/11 12:44:52 executing program 1: perf_event_open(&(0x7f000025c000)={0x0, 0x70, 0x3e5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff7fffffffffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x1e, 0x1, 0x0) sendmsg(r0, &(0x7f0000030000)={&(0x7f00004f5000)=@generic={0x10000000001e, "0100000900000000000000000226cc573c080000003724c71e14dd6a739effea1b48006be61ffe0000e103000000f8000004003f010039d8f986ff01000300000004af50d50700000000000000e3ad316a1983000000001d00e0dfcb24281e27800000100076c3979ac40000bd15020078a1dfd300881a8365b1b16d7436"}, 0x80, &(0x7f0000447ff0), 0x0, &(0x7f00006e9c68)}, 0x0) 2018/04/11 12:44:52 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$SO_TIMESTAMPING(r0, 0x1, 0x25, &(0x7f0000000000)=0x802, 0x4) setsockopt$inet_tcp_int(r0, 0x6, 0x7, &(0x7f0000000180)=0x8000, 0xfffffffffffffe82) setsockopt$inet_tcp_int(r0, 0x6, 0x14, &(0x7f00000b2000)=0xffffffffffffffff, 0x4) recvfrom$inet(r0, &(0x7f0000002a00)=""/185, 0xb9, 0x3e, &(0x7f00000029c0)={0x2, 0x4e24, @rand_addr=0x8001}, 0x10) bind$inet(r0, &(0x7f0000b55000)={0x2, 0x4e22}, 0x10) r1 = creat(&(0x7f0000000040)='./file0\x00', 0x0) syz_mount_image$xfs(&(0x7f0000000380)='xfs\x00', &(0x7f00000003c0)='./file0\x00', 0x2, 0xa, &(0x7f0000002840)=[{&(0x7f00000004c0)="e2bbef832dddaf67b39fa942ee1ef1a3fbb0ec8d9af6814055008e95a54a9ed2c759a2d86f5f41d2f3d635e33f4e062bc44affcf0857b227ec44ef18ca475239a5aca1b5d0b6974d2d6d24148b0d24bbe9eb5ca4957eb6cc318071bca2e11a114c946d4642e9e79b705f5ab224401be8ece0df1ebba4d5469035c467d57f0918f21437ae8d238b2dc593698f5cd19280465ef83a8706f6", 0x97, 0x624}, {&(0x7f0000000400)="084ea4b17490a7c6a2a3c130c182b8f6493a297b2bb8bcf4ead0342c495803f84fe8ebfb38685bc8deee48df1c2bebdf13e50b8e442dce6b9d5ef1a1f62f042e21ab5bddaf3d7e58d8126538e2ad7f5a6a89744d8f14f555", 0x58, 0xe1e7}, {&(0x7f0000000580)="0d270ecea44c6baee5aff1873eaf41df2dc332d21a9348708e2bcb357bcb82a967b8306bcfa5088bbe86780d3519dcc4f66e45e1919ef1b2e79d24fc8d4005c3da1c4b352b8005fffb2940c316145f4849c5b0932bb6c12e9c7198c698bb37937b075e53164cbcad800eb8f4f970caf585e8b71d8b45a114b7be21c5b347ebc3b98313e1937161952ece85222567c9b429ebaf6f2a18b545528386ea0b9e53cc08d955de907fe6b6cfb754aac0ca97bf1c6955ff2613c57b540930e34e31fed6bc1b6a151687d6be997e2ac9222e77fb16517be21ae4790f4010a48abeb48e74f08ec79e09921d24a55109ae5b04992cfb", 0xf1, 0x21}, {&(0x7f0000000680)="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", 0x1000, 0x28fd}, {&(0x7f0000001680)="9b65d1565093399c04a53bd05a6b5bc85710beb4109ab94f22cc41ccebef081af708", 0x22, 0xffffffff00000001}, {&(0x7f00000016c0)="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", 0x1000, 0x1f65}, {&(0x7f00000026c0)="990e3c1f1f55d54b594c58981b719aef8ad806aff887ad55b1641fae2a4f23961df5ae52739b2b49b270a110fb2b3f4643c0381070c3546bd9cad46d80867e79aedce5d8bdaab2118910f6f4c7511aa268e42ce7dded263731bb0c79dc35910cada55bb24e12e89f349825296dcafe337b9adfe3cc02adc6886b5cfcf0009cafaedad44b5f2f04364e03ecff553be8289ed510c90b55efe713c08570a34062435d", 0xa1, 0x9}, {&(0x7f0000002780)="0653023f3909038b05c0b4433068a301234cf1c501483c36e117a2542ca35092089b718b", 0x24, 0x8}, {&(0x7f00000027c0)='|', 0x1, 0x3ff}, {&(0x7f0000002800)="11964da8800b4b4c4b3a5032217bb1e01c3e", 0x12, 0x1}], 0x2205000, &(0x7f0000002940)=ANY=[@ANYBLOB="6e6f7575ffffffff2c6e0bb4756f74612c6461782c62736467726f7570732c6771756f747ab70e"]) ioctl$DRM_IOCTL_AGP_ALLOC(r0, 0xc0206434, &(0x7f00000000c0)={0x69a6, 0x0, 0x1, 0x3f}) ioctl$DRM_IOCTL_SG_FREE(r1, 0x40106439, &(0x7f0000000100)={0x6, r2}) setsockopt$bt_rfcomm_RFCOMM_LM(r1, 0x12, 0x3, &(0x7f0000002980)=0x8, 0x4) fstat(r0, &(0x7f00000001c0)) ioctl$DRM_IOCTL_GEM_OPEN(r1, 0xc010640b, &(0x7f0000000300)={0x0, 0x0, 0x8001}) ioctl$DRM_IOCTL_PRIME_HANDLE_TO_FD(r1, 0xc00c642d, &(0x7f0000000340)={r3, 0x80000, r1}) sendto$inet(r0, &(0x7f00005c9000), 0x252, 0x800000020000000, &(0x7f0000303000)={0x2, 0x4e22, @loopback=0x7f000001}, 0x10) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(r0, 0x6, 0x1d, &(0x7f0000965fec)={0x40000004, 0x800000000000852b, 0xffff, 0x10000007fffffff}, 0x14) writev(r0, &(0x7f00000002c0)=[{&(0x7f0000000480)="b8", 0x1}], 0x1) sendto$inet(r0, &(0x7f0000000080)="f52f", 0x2, 0x1, &(0x7f0000000140)={0x2, 0x0, @multicast2=0xe0000002}, 0x10) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f000020affc), 0x4) shutdown(r0, 0x1) 2018/04/11 12:44:52 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000000), 0x216) sendmsg$key(r0, &(0x7f0000000b00)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000001000)={0x2, 0xa, 0x0, 0x0, 0x2}, 0x10}, 0x1}, 0x0) r1 = syz_open_dev$sndpcmp(&(0x7f0000000080)='/dev/snd/pcmC#D#p\x00', 0x8, 0x40001) setsockopt$IP6T_SO_SET_ADD_COUNTERS(r1, 0x29, 0x41, &(0x7f00000000c0)={'mangle\x00', 0x2, [{}, {}]}, 0x48) sendmsg$key(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000040)={0x2, 0x12, 0x0, 0x0, 0x2}, 0x10}, 0x1}, 0x0) setsockopt$inet_sctp6_SCTP_AUTH_CHUNK(r1, 0x84, 0x15, &(0x7f00000001c0), 0x1) 2018/04/11 12:44:52 executing program 3: semop(0x0, &(0x7f000001a000)=[{0x0, 0xffffffffffff0001}, {}], 0x2) timer_create(0x0, &(0x7f0000cd0000)={0x0, 0x12}, &(0x7f0000044000)) timer_settime(0x0, 0x0, &(0x7f00004b1fe0)={{0x0, 0x1c9c380}, {0x0, 0x9}}, &(0x7f0000040000)) r0 = getpgid(0x0) tkill(r0, 0x1000000000016) 2018/04/11 12:44:52 executing program 4: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff7fffffffffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) r1 = accept$alg(r0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00003bcfd0)="d3ab27191a", 0x5) sendmmsg$alg(r1, &(0x7f0000007e40)=[{0x0, 0x0, &(0x7f0000000900)}], 0x1, 0x0) accept(r0, &(0x7f0000000040)=@pppol2tpv3in6, &(0x7f00000000c0)=0x80) 2018/04/11 12:44:52 executing program 4: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff7fffffffffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$alg(0xffffffffffffffff, &(0x7f0000000200)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc-cast5-avx\x00'}, 0x58) r0 = accept$alg(0xffffffffffffffff, 0x0, 0x0) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f00003bcfd0)="d3ab27191a", 0x5) sendmmsg$alg(r0, &(0x7f0000007e40)=[{0x0, 0x0, &(0x7f0000000900)}], 0x1, 0x0) accept(0xffffffffffffffff, &(0x7f0000000040)=@pppol2tpv3in6, &(0x7f00000000c0)=0x80) 2018/04/11 12:44:52 executing program 1: perf_event_open(&(0x7f000025c000)={0x0, 0x70, 0x3e5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff7fffffffffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x1e, 0x1, 0x0) sendmsg(r0, &(0x7f0000030000)={&(0x7f00004f5000)=@generic={0x10000000001e, "0100000900000000000000000226cc573c080000003724c71e14dd6a739effea1b48006be61ffe0000e103000000f8000004003f010039d8f986ff01000300000004af50d50700000000000000e3ad316a1983000000001d00e0dfcb24281e27800000100076c3979ac40000bd15020078a1dfd300881a8365b1b16d7436"}, 0x80, &(0x7f0000447ff0), 0x0, &(0x7f00006e9c68)}, 0x0) 2018/04/11 12:44:52 executing program 5: r0 = getpgrp(0xffffffffffffffff) r1 = getpgrp(0xffffffffffffffff) r2 = syz_fuseblk_mount(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000200)='./file0\x00', 0xf001, 0x0, 0xffffffffffffffff, 0x100, 0x1, 0x0) r3 = socket$packet(0x11, 0x3, 0x300) kcmp(r0, r1, 0x0, r2, r3) r4 = socket$key(0xf, 0x3, 0x2) setsockopt$sock_int(r4, 0x1, 0x8, &(0x7f0000000100)=0xb27, 0x4) r5 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer\x00', 0x400000, 0x0) write$binfmt_elf32(r4, &(0x7f0000001040)={{0x7f, 0x45, 0x4c, 0x46, 0x81, 0x1, 0x3, 0x3ff, 0x8, 0x0, 0x6, 0x1, 0x157, 0x38, 0xf8, 0x258, 0x0, 0x20, 0x2, 0x8988a98c0, 0x8, 0x8b4}, [{0x70000004, 0x8, 0x0, 0x9, 0x0, 0x3}, {0x4, 0x0, 0x6, 0x5, 0x401, 0x2, 0x0, 0xcc}], "d54b3f91d346fddec5aa8a630826cd69bdb733b6fbb2e8bb0ab8b067bc902097b2569158f94999aaf8a9d1b604f1c85e1444c3b49e9113e4a0dcb367bfe70b9a1ae469c2c6fb57a922491d82ac35b76f12361a67cc0f170287231609bcab131039e66fdd747c856ddbfe825d38f2b39178b9bf4fda3f7d15c7413fec9f403185bd880b384dedec6be7637b1ee84b2c001009e3d649f145963fed97fad8da916aa8899980", [[], [], [], [], [], [], [], [], [], []]}, 0xb1c) ioctl$DRM_IOCTL_ADD_CTX(r5, 0xc0086420, &(0x7f00000000c0)) sendmsg$key(r4, &(0x7f0000000b00)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000001000)={0x2, 0xa, 0x0, 0x0, 0x2}, 0x10}, 0x1}, 0x0) r6 = socket$alg(0x26, 0x5, 0x0) kcmp(r0, r1, 0x2, r6, r4) sendmsg$key(r4, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000040)={0x2, 0x12, 0x0, 0x0, 0x2}, 0x10}, 0x1}, 0x0) 2018/04/11 12:44:53 executing program 7: syz_emit_ethernet(0x66, &(0x7f0000000000)={@random="cd3997030f00", @empty=[0x0, 0x0, 0x0, 0xffffdd86], [], {@ipv6={0x86dd, {0x0, 0x6, "b40900", 0x30, 0x67, 0x0, @ipv4={[], [0xff, 0xff], @multicast2=0xe0000002}, @mcast2={0xff, 0x2, [], 0x1}, {[], @icmpv6=@time_exceed={0x21, 0x0, 0x0, 0x0, [], {0x0, 0x6, "b680fa", 0x0, 0x0, 0x0, @ipv4={[], [0xff, 0xff], @broadcast=0xffffffff}, @ipv4={[], [0xff, 0xff], @remote={0xac, 0x14, 0xffffffffffffffff, 0xbb}}}}}}}}}, 0x0) 2018/04/11 12:44:53 executing program 6: r0 = socket$inet6(0xa, 0x80003, 0xff) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @ipv4={[], [0xff, 0xff], @dev={0xac, 0x14, 0x14, 0x1b}}}, 0x1c) sendmsg(r0, &(0x7f000001b000)={0x0, 0xfffffff5, &(0x7f0000019fa0), 0x46, &(0x7f000001ef08)}, 0x0) 2018/04/11 12:44:53 executing program 2: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x1e, 0x1, 0x0) setsockopt$packet_tx_ring(r0, 0x10f, 0x87, &(0x7f0000b89fe4)=@req={0x772}, 0x10) sendmsg(r0, &(0x7f0000030000)={&(0x7f00004f5000)=@generic={0x10000000001e, "0100000900000000000000000226cc573c080000003724c71e14dd6a739effea1b48006be61ffe0000e103000000f8000004003f010039d8f986ff01000300000004af50d50700000000000000e3ad316a1983000000001d00e0dfcb24281e27800000100076c3979ac40000bd15020078a1dfd300881a8365b1b16d7436"}, 0x80, &(0x7f0000447ff0), 0x0, &(0x7f00006e9c68)}, 0x0) 2018/04/11 12:44:53 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$SO_TIMESTAMPING(r0, 0x1, 0x25, &(0x7f0000000000)=0x802, 0x4) setsockopt$inet_tcp_int(r0, 0x6, 0x10000000013, &(0x7f000039c000)=0x400000000000001, 0x4) setsockopt$inet_tcp_int(r0, 0x6, 0x14, &(0x7f00000b2000)=0xffffffffffffffff, 0x4) bind$inet(r0, &(0x7f0000b55000)={0x2, 0x4e22}, 0x10) sendto$inet(r0, &(0x7f00005c9000), 0x252, 0x800000020000000, &(0x7f0000303000)={0x2, 0x4e22, @loopback=0x7f000001}, 0x10) r1 = syz_open_dev$admmidi(&(0x7f0000000100)='/dev/admmidi#\x00', 0x0, 0x240440) r2 = syz_genetlink_get_family_id$ipvs(&(0x7f00000001c0)='IPVS\x00') sendmsg$IPVS_CMD_SET_INFO(r1, &(0x7f0000000340)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000300)={&(0x7f0000000200)={0xa8, r2, 0x4, 0x70bd2a, 0x25dfdbfb, {0xe}, [@IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0xb8e}, @IPVS_CMD_ATTR_DAEMON={0x58, 0x3, [@IPVS_DAEMON_ATTR_SYNC_MAXLEN={0x8, 0x4, 0x80}, @IPVS_DAEMON_ATTR_SYNC_MAXLEN={0x8, 0x4, 0x72}, @IPVS_DAEMON_ATTR_SYNC_ID={0x8, 0x3}, @IPVS_DAEMON_ATTR_MCAST_GROUP6={0x14, 0x6}, @IPVS_DAEMON_ATTR_SYNC_ID={0x8, 0x3}, @IPVS_DAEMON_ATTR_STATE={0x8, 0x1, 0x1}, @IPVS_DAEMON_ATTR_SYNC_ID={0x8, 0x3, 0x2}, @IPVS_DAEMON_ATTR_SYNC_ID={0x8, 0x3}, @IPVS_DAEMON_ATTR_MCAST_GROUP={0x8, 0x5, @rand_addr=0x2}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0xf0ee}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x3}, @IPVS_CMD_ATTR_DEST={0x24, 0x2, [@IPVS_DEST_ATTR_PERSIST_CONNS={0x8, 0x9, 0x6e}, @IPVS_DEST_ATTR_L_THRESH={0x8, 0x6, 0xffffffff}, @IPVS_DEST_ATTR_L_THRESH={0x8, 0x6, 0x100000001}, @IPVS_DEST_ATTR_L_THRESH={0x8, 0x6, 0x7}]}]}, 0xa8}, 0x1}, 0x20000000) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(r0, 0x6, 0x1d, &(0x7f0000965fec)={0x40000004, 0x800000000000852b, 0xffff, 0x10000007fffffff}, 0x14) writev(r0, &(0x7f00000002c0)=[{&(0x7f0000000480)="b8", 0x1}], 0x1) sendto$inet(r0, &(0x7f0000000080)="f52f", 0x2, 0x1, &(0x7f0000000140)={0x2, 0x0, @multicast2=0xe0000002}, 0x10) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f000020affc), 0x4) fsetxattr(r0, &(0x7f0000000040)=@random={'security.', 'c\x00'}, &(0x7f00000000c0)='\x00', 0x1, 0x0) shutdown(r0, 0x1) 2018/04/11 12:44:53 executing program 4: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff7fffffffffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$alg(0xffffffffffffffff, &(0x7f0000000200)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc-cast5-avx\x00'}, 0x58) r0 = accept$alg(0xffffffffffffffff, 0x0, 0x0) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f00003bcfd0)="d3ab27191a", 0x5) sendmmsg$alg(r0, &(0x7f0000007e40)=[{0x0, 0x0, &(0x7f0000000900)}], 0x1, 0x0) accept(0xffffffffffffffff, &(0x7f0000000040)=@pppol2tpv3in6, &(0x7f00000000c0)=0x80) 2018/04/11 12:44:53 executing program 1: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff7fffffffffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x1e, 0x1, 0x0) sendmsg(r0, &(0x7f0000030000)={&(0x7f00004f5000)=@generic={0x10000000001e, "0100000900000000000000000226cc573c080000003724c71e14dd6a739effea1b48006be61ffe0000e103000000f8000004003f010039d8f986ff01000300000004af50d50700000000000000e3ad316a1983000000001d00e0dfcb24281e27800000100076c3979ac40000bd15020078a1dfd300881a8365b1b16d7436"}, 0x80, &(0x7f0000447ff0), 0x0, &(0x7f00006e9c68)}, 0x0) 2018/04/11 12:44:53 executing program 3: semop(0x0, &(0x7f000001a000)=[{0x3f00000000000000, 0xffffffffffff0001}, {}], 0x2) timer_create(0x0, &(0x7f0000cd0000)={0x0, 0x12}, &(0x7f0000044000)) timer_settime(0x0, 0x0, &(0x7f00004b1fe0)={{0x0, 0x1c9c380}, {0x0, 0x9}}, &(0x7f0000040000)) r0 = getpgid(0x0) tkill(r0, 0x1000000000016) 2018/04/11 12:44:53 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000000), 0x216) sendmsg$key(r0, &(0x7f0000000b00)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000001c0)=ANY=[@ANYBLOB="020a0000020000040000000000000000ece078df8e2bcdf796dbedd35d9fe23c0e1a93bd919b88df37dbcd27ddc139519d9006dbd59d0320448e073d4fcf8dba87442d7ffeae8f7792c2966c5cceb8031660ebcc04f48e107886b9334d91209ce127a5c0d25a6578c732a8a32a5990f0478b396c5955b014bb4afb2bd99a8e098fc5abb54b40072f86a2d00e3f30bfa780131b99c178da77c7a9f35dd74398ccd4c0be22554dd1427f15b22a5665f929acf79a2282603a8b36898e7913a64f851400000000"], 0x10}, 0x1}, 0x0) pipe2(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}, 0x84800) getpeername$ipx(r2, &(0x7f00000000c0), &(0x7f0000000100)=0x10) sendmsg$key(r1, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000540)={&(0x7f00000005c0)=ANY=[@ANYBLOB="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"], 0x268}, 0x1}, 0x8000) sendmsg$key(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000080)=ANY=[@ANYBLOB="0200000000000000000000bfe05c3e7bbff21df4f7f78200000000003ffa4aede4e18b7bd7aa0f2d"], 0x10}, 0x1}, 0x0) 2018/04/11 12:44:53 executing program 4: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff7fffffffffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$alg(0xffffffffffffffff, &(0x7f0000000200)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc-cast5-avx\x00'}, 0x58) r0 = accept$alg(0xffffffffffffffff, 0x0, 0x0) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f00003bcfd0)="d3ab27191a", 0x5) sendmmsg$alg(r0, &(0x7f0000007e40)=[{0x0, 0x0, &(0x7f0000000900)}], 0x1, 0x0) accept(0xffffffffffffffff, &(0x7f0000000040)=@pppol2tpv3in6, &(0x7f00000000c0)=0x80) 2018/04/11 12:44:53 executing program 6: r0 = socket$inet6(0xa, 0x80003, 0xff) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @ipv4={[], [0xff, 0xff], @dev={0xac, 0x14, 0x14, 0x1b}}}, 0x1c) sendmsg(r0, &(0x7f000001b000)={0x0, 0xfffffff5, &(0x7f0000019fa0), 0xcb, &(0x7f000001ef08)}, 0x0) 2018/04/11 12:44:53 executing program 7: syz_emit_ethernet(0x66, &(0x7f0000000000)={@random="cd3997030f00", @empty=[0x0, 0x0, 0x0, 0xfffffff5], [], {@ipv6={0x86dd, {0x0, 0x6, "b40900", 0x30, 0x67, 0x0, @ipv4={[], [0xff, 0xff], @multicast2=0xe0000002}, @mcast2={0xff, 0x2, [], 0x1}, {[], @icmpv6=@time_exceed={0x21, 0x0, 0x0, 0x0, [], {0x0, 0x6, "b680fa", 0x0, 0x0, 0x0, @ipv4={[], [0xff, 0xff], @broadcast=0xffffffff}, @ipv4={[], [0xff, 0xff], @remote={0xac, 0x14, 0xffffffffffffffff, 0xbb}}}}}}}}}, 0x0) 2018/04/11 12:44:53 executing program 1: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff7fffffffffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x1e, 0x1, 0x0) sendmsg(r0, &(0x7f0000030000)={&(0x7f00004f5000)=@generic={0x10000000001e, "0100000900000000000000000226cc573c080000003724c71e14dd6a739effea1b48006be61ffe0000e103000000f8000004003f010039d8f986ff01000300000004af50d50700000000000000e3ad316a1983000000001d00e0dfcb24281e27800000100076c3979ac40000bd15020078a1dfd300881a8365b1b16d7436"}, 0x80, &(0x7f0000447ff0), 0x0, &(0x7f00006e9c68)}, 0x0) 2018/04/11 12:44:53 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$SO_TIMESTAMPING(r0, 0x1, 0x25, &(0x7f0000000000)=0x802, 0x4) setsockopt$inet_tcp_int(r0, 0x6, 0x10000000013, &(0x7f000039c000)=0x400000000000001, 0x4) setsockopt$inet_tcp_int(r0, 0x6, 0x14, &(0x7f00000b2000)=0xffffffffffffffff, 0x4) bind$inet(r0, &(0x7f0000b55000)={0x2, 0x4e22}, 0x10) sendto$inet(r0, &(0x7f00005c9000), 0x252, 0x800000020000000, &(0x7f0000303000)={0x2, 0x4e22, @loopback=0x7f000001}, 0x10) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(r0, 0x6, 0x1d, &(0x7f0000965fec)={0x40000004, 0x800000000000852b, 0xffff, 0x10000007fffffff}, 0x14) writev(r0, &(0x7f00000002c0)=[{&(0x7f0000000480)="b8", 0x1}], 0x1) sendto$inet(r0, &(0x7f0000000080)="f52f", 0x2, 0x1, &(0x7f0000000140)={0x2, 0x0, @multicast2=0xe0000002}, 0x10) r1 = syz_open_dev$sndpcmc(&(0x7f0000000040)='/dev/snd/pcmC#D#c\x00', 0x0, 0x440) getsockname$llc(r1, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @local}, &(0x7f0000000100)=0x10) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f000020affc), 0x4) shutdown(r0, 0x1) 2018/04/11 12:44:53 executing program 2: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x1e, 0x1, 0x0) setsockopt$packet_tx_ring(r0, 0x10f, 0x87, &(0x7f0000b89fe4)=@req={0x772}, 0x10) sendmsg(r0, &(0x7f0000030000)={&(0x7f00004f5000)=@generic={0x10000000001e, "0200000900000000000000000226cc573c080000003724c71e14dd6a739effea1b48006be61ffe0000e103000000f8000004003f010039d8f986ff01000300000004af50d50700000000000000e3ad316a1983000000001d00e0dfcb24281e27800000100076c3979ac40000bd15020078a1dfd300881a8365b1b16d7436"}, 0x80, &(0x7f0000447ff0), 0x0, &(0x7f00006e9c68)}, 0x0) 2018/04/11 12:44:54 executing program 3: semop(0x0, &(0x7f000001a000)=[{0x5000000, 0xffffffffffff0001}, {}], 0x2) timer_create(0x0, &(0x7f0000cd0000)={0x0, 0x12}, &(0x7f0000044000)) timer_settime(0x0, 0x0, &(0x7f00004b1fe0)={{0x0, 0x1c9c380}, {0x0, 0x9}}, &(0x7f0000040000)) r0 = getpgid(0x0) tkill(r0, 0x1000000000016) 2018/04/11 12:44:54 executing program 6: r0 = socket$inet6(0xa, 0x80003, 0xff) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @ipv4={[], [0xff, 0xff], @dev={0xac, 0x14, 0x14, 0x1b}}}, 0x1c) sendmsg(r0, &(0x7f000001b000)={0x0, 0xfffffff5, &(0x7f0000019fa0), 0x124, &(0x7f000001ef08)}, 0x0) 2018/04/11 12:44:54 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000000), 0x216) sendmsg$key(r0, &(0x7f0000000b00)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="020a0000020000000000008000000000ef9729989516bc23a59fa36c0c56d53955281c15573c414c6f1057cadb4b94f88169549f5573b2cb200b6533045f13f74ba907ad7f672b79947c719db4b057add41ebabd36c60c83e3012d87ec8c5ac6d9a2b0cdaba26efd5ed63a867c15ce4fb8d841abf28a628f6a7a7020746c345a77e33611722b597bdb95449bce0661b936"], 0x10}, 0x1}, 0x0) sendmsg$key(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000040)={0x2, 0x12, 0x0, 0x0, 0x2}, 0x96}, 0x1}, 0x0) socket$key(0xf, 0x3, 0x2) 2018/04/11 12:44:54 executing program 0 (fault-call:4 fault-nth:0): r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000200)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc-cast5-avx\x00'}, 0x58) r2 = accept$alg(r1, 0x0, 0x0) dup3(r0, r2, 0x0) 2018/04/11 12:44:54 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000200)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc-cast5-avx\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00003bcfd0)="d3ab27191a", 0x5) sendmmsg$alg(r1, &(0x7f0000007e40)=[{0x0, 0x0, &(0x7f0000000900)}], 0x1, 0x0) accept(r0, &(0x7f0000000040)=@pppol2tpv3in6, &(0x7f00000000c0)=0x80) 2018/04/11 12:44:54 executing program 1: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff7fffffffffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x1e, 0x1, 0x0) sendmsg(r0, &(0x7f0000030000)={&(0x7f00004f5000)=@generic={0x10000000001e, "0100000900000000000000000226cc573c080000003724c71e14dd6a739effea1b48006be61ffe0000e103000000f8000004003f010039d8f986ff01000300000004af50d50700000000000000e3ad316a1983000000001d00e0dfcb24281e27800000100076c3979ac40000bd15020078a1dfd300881a8365b1b16d7436"}, 0x80, &(0x7f0000447ff0), 0x0, &(0x7f00006e9c68)}, 0x0) 2018/04/11 12:44:54 executing program 7: syz_emit_ethernet(0x66, &(0x7f0000000000)={@random="cd3997030f00", @empty=[0x0, 0x0, 0x0, 0xb], [], {@ipv6={0x86dd, {0x0, 0x6, "b40900", 0x30, 0x67, 0x0, @ipv4={[], [0xff, 0xff], @multicast2=0xe0000002}, @mcast2={0xff, 0x2, [], 0x1}, {[], @icmpv6=@time_exceed={0x21, 0x0, 0x0, 0x0, [], {0x0, 0x6, "b680fa", 0x0, 0x0, 0x0, @ipv4={[], [0xff, 0xff], @broadcast=0xffffffff}, @ipv4={[], [0xff, 0xff], @remote={0xac, 0x14, 0xffffffffffffffff, 0xbb}}}}}}}}}, 0x0) 2018/04/11 12:44:54 executing program 2: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x1e, 0x1, 0x0) setsockopt$packet_tx_ring(r0, 0x10f, 0x87, &(0x7f0000b89fe4)=@req={0x772}, 0x10) sendmsg(r0, &(0x7f0000030000)={&(0x7f00004f5000)=@generic={0x10000000001e, "0014000900000000000000000226cc573c080000003724c71e14dd6a739effea1b48006be61ffe0000e103000000f8000004003f010039d8f986ff01000300000004af50d50700000000000000e3ad316a1983000000001d00e0dfcb24281e27800000100076c3979ac40000bd15020078a1dfd300881a8365b1b16d7436"}, 0x80, &(0x7f0000447ff0), 0x0, &(0x7f00006e9c68)}, 0x0) 2018/04/11 12:44:54 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000200)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc-cast5-avx\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00003bcfd0)="d3ab27191a", 0x5) sendmmsg$alg(r1, &(0x7f0000007e40)=[{0x0, 0x0, &(0x7f0000000900)}], 0x1, 0x0) accept(r0, &(0x7f0000000040)=@pppol2tpv3in6, &(0x7f00000000c0)=0x80) 2018/04/11 12:44:54 executing program 7: syz_emit_ethernet(0x66, &(0x7f0000000000)={@random="cd3997030f00", @empty=[0x0, 0x0, 0x0, 0x3000000], [], {@ipv6={0x86dd, {0x0, 0x6, "b40900", 0x30, 0x67, 0x0, @ipv4={[], [0xff, 0xff], @multicast2=0xe0000002}, @mcast2={0xff, 0x2, [], 0x1}, {[], @icmpv6=@time_exceed={0x21, 0x0, 0x0, 0x0, [], {0x0, 0x6, "b680fa", 0x0, 0x0, 0x0, @ipv4={[], [0xff, 0xff], @broadcast=0xffffffff}, @ipv4={[], [0xff, 0xff], @remote={0xac, 0x14, 0xffffffffffffffff, 0xbb}}}}}}}}}, 0x0) 2018/04/11 12:44:54 executing program 6: r0 = socket$inet6(0xa, 0x80003, 0xff) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @ipv4={[], [0xff, 0xff], @dev={0xac, 0x14, 0x14, 0x1b}}}, 0x1c) sendmsg(r0, &(0x7f000001b000)={0x0, 0xfffffff5, &(0x7f0000019fa0), 0x10, &(0x7f000001ef08)}, 0x0) 2018/04/11 12:44:54 executing program 2: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x1e, 0x1, 0x0) setsockopt$packet_tx_ring(r0, 0x10f, 0x87, &(0x7f0000b89fe4)=@req={0x772}, 0x10) sendmsg(r0, &(0x7f0000030000)={&(0x7f00004f5000)=@generic={0x10000000001e, "0300000900000000000000000226cc573c080000003724c71e14dd6a739effea1b48006be61ffe0000e103000000f8000004003f010039d8f986ff01000300000004af50d50700000000000000e3ad316a1983000000001d00e0dfcb24281e27800000100076c3979ac40000bd15020078a1dfd300881a8365b1b16d7436"}, 0x80, &(0x7f0000447ff0), 0x0, &(0x7f00006e9c68)}, 0x0) 2018/04/11 12:44:54 executing program 1: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x1e, 0x1, 0x0) sendmsg(r0, &(0x7f0000030000)={&(0x7f00004f5000)=@generic={0x10000000001e, "0100000900000000000000000226cc573c080000003724c71e14dd6a739effea1b48006be61ffe0000e103000000f8000004003f010039d8f986ff01000300000004af50d50700000000000000e3ad316a1983000000001d00e0dfcb24281e27800000100076c3979ac40000bd15020078a1dfd300881a8365b1b16d7436"}, 0x80, &(0x7f0000447ff0), 0x0, &(0x7f00006e9c68)}, 0x0) 2018/04/11 12:44:54 executing program 0: r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000200)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc-cast5-avx\x00'}, 0x58) r2 = accept$alg(r1, 0x0, 0x0) dup3(r0, r2, 0x0) 2018/04/11 12:44:54 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000200)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc-cast5-avx\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00003bcfd0)="d3ab27191a", 0x5) sendmmsg$alg(r1, &(0x7f0000007e40)=[{0x0, 0x0, &(0x7f0000000900)}], 0x1, 0x0) accept(r0, &(0x7f0000000040)=@pppol2tpv3in6, &(0x7f00000000c0)=0x80) 2018/04/11 12:44:54 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000080), 0x4) eventfd2(0x8a, 0x80801) sendmsg$key(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000001000)={0x2, 0xa}, 0x10}, 0x1}, 0x20000) sendmsg$key(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000040)=ANY=[@ANYBLOB="fc0000000000000000f3ffffff000000"], 0x10}, 0x1}, 0x0) getsockopt$bt_hci(r0, 0x0, 0x3, &(0x7f0000000100)=""/22, &(0x7f00000001c0)=0x16) r1 = syz_open_dev$mice(&(0x7f0000005600)='/dev/input/mice\x00', 0x0, 0x14a01) ioctl$sock_bt_cmtp_CMTPGETCONNLIST(r1, 0x800443d2, &(0x7f0000005680)={0x3, &(0x7f0000005640)=[{}, {}, {}]}) r2 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000200)='/dev/hwrng\x00', 0x200000000080000, 0x0) r3 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000280)='/dev/autofs\x00', 0x80000, 0x0) getsockopt$inet_sctp6_SCTP_PR_STREAM_STATUS(r3, 0x84, 0x74, &(0x7f00000002c0)=""/75, &(0x7f0000000340)=0x4b) ioctl$sock_netrom_SIOCGSTAMP(r2, 0x8906, &(0x7f0000000240)) 2018/04/11 12:44:54 executing program 7: syz_emit_ethernet(0x66, &(0x7f0000000000)={@random="cd3997030f00", @empty=[0x0, 0x0, 0x0, 0x500], [], {@ipv6={0x86dd, {0x0, 0x6, "b40900", 0x30, 0x67, 0x0, @ipv4={[], [0xff, 0xff], @multicast2=0xe0000002}, @mcast2={0xff, 0x2, [], 0x1}, {[], @icmpv6=@time_exceed={0x21, 0x0, 0x0, 0x0, [], {0x0, 0x6, "b680fa", 0x0, 0x0, 0x0, @ipv4={[], [0xff, 0xff], @broadcast=0xffffffff}, @ipv4={[], [0xff, 0xff], @remote={0xac, 0x14, 0xffffffffffffffff, 0xbb}}}}}}}}}, 0x0) 2018/04/11 12:44:54 executing program 2: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x1e, 0x1, 0x0) setsockopt$packet_tx_ring(r0, 0x10f, 0x87, &(0x7f0000b89fe4)=@req={0x772}, 0x10) sendmsg(r0, &(0x7f0000030000)={&(0x7f00004f5000)=@generic={0x10000000001e, "0102000900000000000000000226cc573c080000003724c71e14dd6a739effea1b48006be61ffe0000e103000000f8000004003f010039d8f986ff01000300000004af50d50700000000000000e3ad316a1983000000001d00e0dfcb24281e27800000100076c3979ac40000bd15020078a1dfd300881a8365b1b16d7436"}, 0x80, &(0x7f0000447ff0), 0x0, &(0x7f00006e9c68)}, 0x0) 2018/04/11 12:44:54 executing program 4: perf_event_open(&(0x7f000025c000)={0x0, 0x70, 0x3e5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff7fffffffffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000200)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc-cast5-avx\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00003bcfd0)="d3ab27191a", 0x5) sendmmsg$alg(r1, &(0x7f0000007e40)=[{0x0, 0x0, &(0x7f0000000900)}], 0x1, 0x0) accept(r0, &(0x7f0000000040)=@pppol2tpv3in6, &(0x7f00000000c0)=0x80) 2018/04/11 12:44:54 executing program 6: r0 = socket$inet6(0xa, 0x80003, 0xff) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @ipv4={[], [0xff, 0xff], @dev={0xac, 0x14, 0x14, 0x1b}}}, 0x1c) sendmsg(r0, &(0x7f000001b000)={0x0, 0xfffffff5, &(0x7f0000019fa0), 0x1e0, &(0x7f000001ef08)}, 0x0) 2018/04/11 12:44:54 executing program 0: r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000200)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc-cast5-avx\x00'}, 0x58) r2 = accept$alg(r1, 0x0, 0x0) dup3(r0, r2, 0x100000000000000) 2018/04/11 12:44:54 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000000), 0x216) sendmsg$key(r0, &(0x7f0000000b00)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000001000)={0x2, 0xa, 0x0, 0x0, 0x2, 0x0, 0x1}, 0xfffffffffffffe7f}, 0x1}, 0x0) utimes(&(0x7f00000003c0)='./file0\x00', &(0x7f0000000400)={{0x0, 0x2710}, {0x0, 0x2710}}) sendmsg$key(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000040)={0x2, 0x12, 0x0, 0x0, 0x2}, 0x10}, 0x1}, 0x0) r1 = accept(r0, &(0x7f00000002c0)=@ipx, &(0x7f0000000340)=0x80) ioctl$sock_ipx_SIOCAIPXPRISLT(r1, 0x89e1, &(0x7f0000000380)=0xba6c) r2 = syz_open_dev$amidi(&(0x7f00000000c0)='/dev/amidi#\x00', 0x6, 0xb90e1df88233238c) name_to_handle_at(r2, &(0x7f0000000100)='./file0\x00', &(0x7f00000001c0)={0xa5, 0x800000000000, "3328e119a7c4153f251cd3d3b6f39063a5129a9daec838443c896d03feef1d71202f8b502474dd5fefa37790e3b1dc69d8e3d6f6278a816f36bf314d25ecea5574529ae2d9d15339ca74537ea111077c73ab2daa8b123432102ce3751cedfb1290ba68cec05e51fc4305d183d6ce440e95e35b8a3fa6c34f7213057d6d389990639565d2479ae7524541713e18cb8fec046baa99593ac530ff4ed942df"}, &(0x7f0000000280), 0x1400) 2018/04/11 12:44:54 executing program 3: semop(0x0, &(0x7f000001a000)=[{0x5, 0xffffffffffff0001}, {}], 0x2) timer_create(0x0, &(0x7f0000cd0000)={0x0, 0x12}, &(0x7f0000044000)) timer_settime(0x0, 0x0, &(0x7f00004b1fe0)={{0x0, 0x1c9c380}, {0x0, 0x9}}, &(0x7f0000040000)) r0 = getpgid(0x0) tkill(r0, 0x1000000000016) 2018/04/11 12:44:54 executing program 1: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x1e, 0x1, 0x0) sendmsg(r0, &(0x7f0000030000)={&(0x7f00004f5000)=@generic={0x10000000001e, "0100000900000000000000000226cc573c080000003724c71e14dd6a739effea1b48006be61ffe0000e103000000f8000004003f010039d8f986ff01000300000004af50d50700000000000000e3ad316a1983000000001d00e0dfcb24281e27800000100076c3979ac40000bd15020078a1dfd300881a8365b1b16d7436"}, 0x80, &(0x7f0000447ff0), 0x0, &(0x7f00006e9c68)}, 0x0) 2018/04/11 12:44:54 executing program 7: syz_emit_ethernet(0x66, &(0x7f0000000000)={@random="cd3997030f00", @empty=[0x0, 0x0, 0x0, 0x8864000000000000], [], {@ipv6={0x86dd, {0x0, 0x6, "b40900", 0x30, 0x67, 0x0, @ipv4={[], [0xff, 0xff], @multicast2=0xe0000002}, @mcast2={0xff, 0x2, [], 0x1}, {[], @icmpv6=@time_exceed={0x21, 0x0, 0x0, 0x0, [], {0x0, 0x6, "b680fa", 0x0, 0x0, 0x0, @ipv4={[], [0xff, 0xff], @broadcast=0xffffffff}, @ipv4={[], [0xff, 0xff], @remote={0xac, 0x14, 0xffffffffffffffff, 0xbb}}}}}}}}}, 0x0) 2018/04/11 12:44:55 executing program 1: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x1e, 0x1, 0x0) sendmsg(r0, &(0x7f0000030000)={&(0x7f00004f5000)=@generic={0x10000000001e, "0100000900000000000000000226cc573c080000003724c71e14dd6a739effea1b48006be61ffe0000e103000000f8000004003f010039d8f986ff01000300000004af50d50700000000000000e3ad316a1983000000001d00e0dfcb24281e27800000100076c3979ac40000bd15020078a1dfd300881a8365b1b16d7436"}, 0x80, &(0x7f0000447ff0), 0x0, &(0x7f00006e9c68)}, 0x0) 2018/04/11 12:44:55 executing program 4: perf_event_open(&(0x7f000025c000)={0x0, 0x70, 0x3e5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff7fffffffffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000200)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc-cast5-avx\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00003bcfd0)="d3ab27191a", 0x5) sendmmsg$alg(r1, &(0x7f0000007e40)=[{0x0, 0x0, &(0x7f0000000900)}], 0x1, 0x0) accept(r0, &(0x7f0000000040)=@pppol2tpv3in6, &(0x7f00000000c0)=0x80) 2018/04/11 12:44:55 executing program 6: r0 = socket$inet6(0xa, 0x80003, 0xff) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @ipv4={[], [0xff, 0xff], @dev={0xac, 0x14, 0x14, 0x1b}}}, 0x1c) sendmsg(r0, &(0x7f000001b000)={0x0, 0xfffffff5, &(0x7f0000019fa0), 0x1ac, &(0x7f000001ef08)}, 0x0) 2018/04/11 12:44:55 executing program 0: r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000200)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc-cast5-avx\x00'}, 0x58) r2 = accept$alg(r1, 0x0, 0x0) dup3(r0, r2, 0x1000000) 2018/04/11 12:44:55 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000000), 0x216) sendmsg$key(r0, &(0x7f0000000b00)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000001000)=ANY=[@ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00'], 0x10}, 0x1}, 0x0) pipe2(&(0x7f0000000040)={0xffffffffffffffff}, 0x800) ioctl$VT_GETMODE(r1, 0x5601, &(0x7f0000000080)) 2018/04/11 12:44:55 executing program 2: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x1e, 0x1, 0x0) setsockopt$packet_tx_ring(r0, 0x10f, 0x87, &(0x7f0000b89fe4)=@req={0x772}, 0x10) sendmsg(r0, &(0x7f0000030000)={&(0x7f00004f5000)=@generic={0x10000000001e, "0104000900000000000000000226cc573c080000003724c71e14dd6a739effea1b48006be61ffe0000e103000000f8000004003f010039d8f986ff01000300000004af50d50700000000000000e3ad316a1983000000001d00e0dfcb24281e27800000100076c3979ac40000bd15020078a1dfd300881a8365b1b16d7436"}, 0x80, &(0x7f0000447ff0), 0x0, &(0x7f00006e9c68)}, 0x0) 2018/04/11 12:44:55 executing program 3: semop(0x0, &(0x7f000001a000)=[{0xe, 0xffffffffffff0001}, {}], 0x2) timer_create(0x0, &(0x7f0000cd0000)={0x0, 0x12}, &(0x7f0000044000)) timer_settime(0x0, 0x0, &(0x7f00004b1fe0)={{0x0, 0x1c9c380}, {0x0, 0x9}}, &(0x7f0000040000)) r0 = getpgid(0x0) tkill(r0, 0x1000000000016) 2018/04/11 12:44:55 executing program 1: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff7fffffffffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x0, 0x1, 0x0) sendmsg(r0, &(0x7f0000030000)={&(0x7f00004f5000)=@generic={0x10000000001e, "0100000900000000000000000226cc573c080000003724c71e14dd6a739effea1b48006be61ffe0000e103000000f8000004003f010039d8f986ff01000300000004af50d50700000000000000e3ad316a1983000000001d00e0dfcb24281e27800000100076c3979ac40000bd15020078a1dfd300881a8365b1b16d7436"}, 0x80, &(0x7f0000447ff0), 0x0, &(0x7f00006e9c68)}, 0x0) 2018/04/11 12:44:55 executing program 7: syz_emit_ethernet(0x66, &(0x7f0000000000)={@random="cd3997030f00", @empty=[0x0, 0x0, 0x0, 0x80350000], [], {@ipv6={0x86dd, {0x0, 0x6, "b40900", 0x30, 0x67, 0x0, @ipv4={[], [0xff, 0xff], @multicast2=0xe0000002}, @mcast2={0xff, 0x2, [], 0x1}, {[], @icmpv6=@time_exceed={0x21, 0x0, 0x0, 0x0, [], {0x0, 0x6, "b680fa", 0x0, 0x0, 0x0, @ipv4={[], [0xff, 0xff], @broadcast=0xffffffff}, @ipv4={[], [0xff, 0xff], @remote={0xac, 0x14, 0xffffffffffffffff, 0xbb}}}}}}}}}, 0x0) 2018/04/11 12:44:55 executing program 2: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x1e, 0x1, 0x0) setsockopt$packet_tx_ring(r0, 0x10f, 0x87, &(0x7f0000b89fe4)=@req={0x772}, 0x10) sendmsg(r0, &(0x7f0000030000)={&(0x7f00004f5000)=@generic={0x10000000001e, "0100020900000000000000000226cc573c080000003724c71e14dd6a739effea1b48006be61ffe0000e103000000f8000004003f010039d8f986ff01000300000004af50d50700000000000000e3ad316a1983000000001d00e0dfcb24281e27800000100076c3979ac40000bd15020078a1dfd300881a8365b1b16d7436"}, 0x80, &(0x7f0000447ff0), 0x0, &(0x7f00006e9c68)}, 0x0) 2018/04/11 12:44:55 executing program 4: perf_event_open(&(0x7f000025c000)={0x0, 0x70, 0x3e5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff7fffffffffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000200)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc-cast5-avx\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00003bcfd0)="d3ab27191a", 0x5) sendmmsg$alg(r1, &(0x7f0000007e40)=[{0x0, 0x0, &(0x7f0000000900)}], 0x1, 0x0) accept(r0, &(0x7f0000000040)=@pppol2tpv3in6, &(0x7f00000000c0)=0x80) 2018/04/11 12:44:55 executing program 6: r0 = socket$inet6(0xa, 0x80003, 0xff) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @ipv4={[], [0xff, 0xff], @dev={0xac, 0x14, 0x14, 0x1b}}}, 0x1c) sendmsg(r0, &(0x7f000001b000)={0x0, 0xfffffff5, &(0x7f0000019fa0), 0x18c, &(0x7f000001ef08)}, 0x0) 2018/04/11 12:44:55 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000000), 0x216) sendmsg$key(r0, &(0x7f0000000b00)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000001000)={0x2, 0xa, 0x0, 0x0, 0x2}, 0x10}, 0x1}, 0x0) sendmsg$key(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000040)=ANY=[@ANYBLOB="0215006b04bb30dd0d00000000000000"], 0x10}, 0x1}, 0x0) 2018/04/11 12:44:55 executing program 3: semop(0x0, &(0x7f000001a000)=[{0x500000000000000, 0xffffffffffff0001}, {}], 0x2) timer_create(0x0, &(0x7f0000cd0000)={0x0, 0x12}, &(0x7f0000044000)) timer_settime(0x0, 0x0, &(0x7f00004b1fe0)={{0x0, 0x1c9c380}, {0x0, 0x9}}, &(0x7f0000040000)) r0 = getpgid(0x0) tkill(r0, 0x1000000000016) 2018/04/11 12:44:55 executing program 0: r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40000, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0xfffffffffffffffe}, 0x0, 0xd, 0xffffffffffffffff, 0x0) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000200)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc-cast5-avx\x00'}, 0x58) r2 = accept$alg(r1, 0x0, 0x0) dup3(r0, r2, 0x0) 2018/04/11 12:44:55 executing program 7: syz_emit_ethernet(0x66, &(0x7f0000000000)={@random="cd3997030f00", @empty=[0x0, 0x0, 0x0, 0x5800], [], {@ipv6={0x86dd, {0x0, 0x6, "b40900", 0x30, 0x67, 0x0, @ipv4={[], [0xff, 0xff], @multicast2=0xe0000002}, @mcast2={0xff, 0x2, [], 0x1}, {[], @icmpv6=@time_exceed={0x21, 0x0, 0x0, 0x0, [], {0x0, 0x6, "b680fa", 0x0, 0x0, 0x0, @ipv4={[], [0xff, 0xff], @broadcast=0xffffffff}, @ipv4={[], [0xff, 0xff], @remote={0xac, 0x14, 0xffffffffffffffff, 0xbb}}}}}}}}}, 0x0) 2018/04/11 12:44:55 executing program 4: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff7fffffffffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000200)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc-cast5-avx\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00003bcfd0)="d3ab27191a", 0x5) sendmmsg$alg(r1, &(0x7f0000007e40)=[{0x0, 0x0, &(0x7f0000000900)}], 0x1, 0x0) accept(r0, &(0x7f0000000040)=@pppol2tpv3in6, &(0x7f00000000c0)=0x80) 2018/04/11 12:44:55 executing program 6: r0 = socket$inet6(0xa, 0x80003, 0xff) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @ipv4={[], [0xff, 0xff], @dev={0xac, 0x14, 0x14, 0x1b}}}, 0x1c) sendmsg(r0, &(0x7f000001b000)={0x0, 0xfffffff5, &(0x7f0000019fa0), 0x145, &(0x7f000001ef08)}, 0x0) 2018/04/11 12:44:55 executing program 0: r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000200)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc-cast5-avx\x00'}, 0x58) r2 = accept$alg(r1, 0x0, 0x0) fcntl$getownex(r1, 0x10, &(0x7f0000000040)={0x0, 0x0}) ioctl$sock_SIOCSPGRP(r1, 0x8902, &(0x7f0000000080)=r3) dup3(r0, r2, 0x0) 2018/04/11 12:44:55 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000000), 0x216) sendmsg$key(r0, &(0x7f0000000b00)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000001000)={0x2, 0xa, 0x0, 0x0, 0x2}, 0x10}, 0x1}, 0x0) sendmsg$key(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000040)={0x2, 0x12, 0x0, 0x0, 0x2}, 0x10}, 0x1}, 0x0) socket$key(0xf, 0x3, 0x2) 2018/04/11 12:44:55 executing program 2: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x1e, 0x1, 0x0) setsockopt$packet_tx_ring(r0, 0x10f, 0x87, &(0x7f0000b89fe4)=@req={0x772}, 0x10) sendmsg(r0, &(0x7f0000030000)={&(0x7f00004f5000)=@generic={0x10000000001e, "0100000902000000000000000226cc573c080000003724c71e14dd6a739effea1b48006be61ffe0000e103000000f8000004003f010039d8f986ff01000300000004af50d50700000000000000e3ad316a1983000000001d00e0dfcb24281e27800000100076c3979ac40000bd15020078a1dfd300881a8365b1b16d7436"}, 0x80, &(0x7f0000447ff0), 0x0, &(0x7f00006e9c68)}, 0x0) 2018/04/11 12:44:55 executing program 1: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff7fffffffffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x0, 0x1, 0x0) sendmsg(r0, &(0x7f0000030000)={&(0x7f00004f5000)=@generic={0x10000000001e, "0100000900000000000000000226cc573c080000003724c71e14dd6a739effea1b48006be61ffe0000e103000000f8000004003f010039d8f986ff01000300000004af50d50700000000000000e3ad316a1983000000001d00e0dfcb24281e27800000100076c3979ac40000bd15020078a1dfd300881a8365b1b16d7436"}, 0x80, &(0x7f0000447ff0), 0x0, &(0x7f00006e9c68)}, 0x0) 2018/04/11 12:44:56 executing program 3: semop(0x0, &(0x7f000001a000)=[{0xe00000000000000, 0xffffffffffff0001}, {}], 0x2) timer_create(0x0, &(0x7f0000cd0000)={0x0, 0x12}, &(0x7f0000044000)) timer_settime(0x0, 0x0, &(0x7f00004b1fe0)={{0x0, 0x1c9c380}, {0x0, 0x9}}, &(0x7f0000040000)) r0 = getpgid(0x0) tkill(r0, 0x1000000000016) 2018/04/11 12:44:56 executing program 6: r0 = socket$inet6(0xa, 0x80003, 0xff) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @ipv4={[], [0xff, 0xff], @dev={0xac, 0x14, 0x14, 0x1b}}}, 0x1c) sendmsg(r0, &(0x7f000001b000)={0x0, 0xfffffff5, &(0x7f0000019fa0), 0x116, &(0x7f000001ef08)}, 0x0) 2018/04/11 12:44:56 executing program 4: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff7fffffffffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000200)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc-cast5-avx\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00003bcfd0)="d3ab27191a", 0x5) sendmmsg$alg(r1, &(0x7f0000007e40)=[{0x0, 0x0, &(0x7f0000000900)}], 0x1, 0x0) accept(r0, &(0x7f0000000040)=@pppol2tpv3in6, &(0x7f00000000c0)=0x80) 2018/04/11 12:44:56 executing program 7: syz_emit_ethernet(0x66, &(0x7f0000000000)={@random="cd3997030f00", @empty=[0x0, 0x0, 0x0, 0xd], [], {@ipv6={0x86dd, {0x0, 0x6, "b40900", 0x30, 0x67, 0x0, @ipv4={[], [0xff, 0xff], @multicast2=0xe0000002}, @mcast2={0xff, 0x2, [], 0x1}, {[], @icmpv6=@time_exceed={0x21, 0x0, 0x0, 0x0, [], {0x0, 0x6, "b680fa", 0x0, 0x0, 0x0, @ipv4={[], [0xff, 0xff], @broadcast=0xffffffff}, @ipv4={[], [0xff, 0xff], @remote={0xac, 0x14, 0xffffffffffffffff, 0xbb}}}}}}}}}, 0x0) 2018/04/11 12:44:56 executing program 2: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x1e, 0x1, 0x0) setsockopt$packet_tx_ring(r0, 0x10f, 0x87, &(0x7f0000b89fe4)=@req={0x772}, 0x10) sendmsg(r0, &(0x7f0000030000)={&(0x7f00004f5000)=@generic={0x10000000001e, "01000009000000007fffffff0226cc573c080000003724c71e14dd6a739effea1b48006be61ffe0000e103000000f8000004003f010039d8f986ff01000300000004af50d50700000000000000e3ad316a1983000000001d00e0dfcb24281e27800000100076c3979ac40000bd15020078a1dfd300881a8365b1b16d7436"}, 0x80, &(0x7f0000447ff0), 0x0, &(0x7f00006e9c68)}, 0x0) 2018/04/11 12:44:56 executing program 0: r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000200)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc-cast5-avx\x00'}, 0x58) r2 = accept$alg(r1, 0x0, 0x0) dup3(r0, r2, 0x0) 2018/04/11 12:44:56 executing program 1: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff7fffffffffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x0, 0x1, 0x0) sendmsg(r0, &(0x7f0000030000)={&(0x7f00004f5000)=@generic={0x10000000001e, "0100000900000000000000000226cc573c080000003724c71e14dd6a739effea1b48006be61ffe0000e103000000f8000004003f010039d8f986ff01000300000004af50d50700000000000000e3ad316a1983000000001d00e0dfcb24281e27800000100076c3979ac40000bd15020078a1dfd300881a8365b1b16d7436"}, 0x80, &(0x7f0000447ff0), 0x0, &(0x7f00006e9c68)}, 0x0) 2018/04/11 12:44:56 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) setsockopt$sock_int(r0, 0x1, 0x27, &(0x7f0000000080), 0xfffffffffffffd6f) sendmsg$key(r0, &(0x7f0000000b00)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000001000)=ANY=[@ANYBLOB="020a213d404b94f076b2000000000000"], 0x10}, 0x1}, 0x0) sendmsg$key(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000040)={0x2, 0x12, 0x0, 0x0, 0x2}, 0x10}, 0x1}, 0x0) r1 = syz_open_dev$audion(&(0x7f00000000c0)='/dev/audio#\x00', 0x1f, 0x10000) setsockopt$inet6_dccp_int(r1, 0x21, 0x15, &(0x7f0000000100)=0x4, 0x4) 2018/04/11 12:44:56 executing program 6: r0 = socket$inet6(0xa, 0x80003, 0xff) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @ipv4={[], [0xff, 0xff], @dev={0xac, 0x14, 0x14, 0x1b}}}, 0x1c) sendmsg(r0, &(0x7f000001b000)={0x0, 0xfffffff5, &(0x7f0000019fa0), 0xc5, &(0x7f000001ef08)}, 0x0) 2018/04/11 12:44:56 executing program 4: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff7fffffffffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000200)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc-cast5-avx\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00003bcfd0)="d3ab27191a", 0x5) sendmmsg$alg(r1, &(0x7f0000007e40)=[{0x0, 0x0, &(0x7f0000000900)}], 0x1, 0x0) accept(r0, &(0x7f0000000040)=@pppol2tpv3in6, &(0x7f00000000c0)=0x80) 2018/04/11 12:44:56 executing program 0: r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$alg(0x26, 0x5, 0x0) r2 = open(&(0x7f0000000300)='./file0\x00', 0x488402, 0xe5) fallocate(r1, 0x3, 0x6, 0x1) ioctl$TUNGETVNETHDRSZ(r2, 0x800454d7, &(0x7f0000000340)) write$binfmt_aout(r0, &(0x7f0000000480)={{0x10b, 0x8, 0x8, 0x1c8, 0xfc, 0x34, 0x3cb, 0x8}, "8c27968293cc7e697191c9ae29bd102359d4a5f9fd93495fb77e54253be5eb051699a59379adddd9304a9deff16dcdafb1995949b121420838758389", [[], [], [], [], [], [], [], [], [], []]}, 0xa5c) r3 = openat$vcs(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/vcs\x00', 0x10000, 0x0) getsockopt$inet6_tcp_buf(r3, 0x6, 0x1e, &(0x7f0000000280)=""/28, &(0x7f00000002c0)=0x1c) bind$alg(r1, &(0x7f0000000200)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc-cast5-avx\x00'}, 0x58) r4 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vcs\x00', 0x2400, 0x0) getsockopt$inet6_tcp_buf(r4, 0x6, 0x1a, &(0x7f0000000080)=""/213, &(0x7f0000000180)=0xd5) r5 = accept$alg(r1, 0x0, 0x0) dup3(r0, r5, 0x0) modify_ldt$read_default(0x2, &(0x7f0000000380)=""/224, 0xe0) 2018/04/11 12:44:56 executing program 7: syz_emit_ethernet(0x66, &(0x7f0000000000)={@random="cd3997030f00", @empty=[0x0, 0x0, 0x0, 0x67], [], {@ipv6={0x86dd, {0x0, 0x6, "b40900", 0x30, 0x67, 0x0, @ipv4={[], [0xff, 0xff], @multicast2=0xe0000002}, @mcast2={0xff, 0x2, [], 0x1}, {[], @icmpv6=@time_exceed={0x21, 0x0, 0x0, 0x0, [], {0x0, 0x6, "b680fa", 0x0, 0x0, 0x0, @ipv4={[], [0xff, 0xff], @broadcast=0xffffffff}, @ipv4={[], [0xff, 0xff], @remote={0xac, 0x14, 0xffffffffffffffff, 0xbb}}}}}}}}}, 0x0) 2018/04/11 12:44:56 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000000), 0x216) sendmsg$key(r0, &(0x7f0000000b00)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000001000)={0x2, 0xa, 0x0, 0x0, 0x2}, 0x10}, 0x1}, 0x0) sendmsg$key(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000040)={0x2, 0x12, 0x0, 0x0, 0x2}, 0x10}, 0x1}, 0x0) ioctl$KVM_GET_SREGS(r0, 0x8138ae83, &(0x7f00000001c0)) 2018/04/11 12:44:56 executing program 1: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff7fffffffffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x1e, 0x0, 0x0) sendmsg(r0, &(0x7f0000030000)={&(0x7f00004f5000)=@generic={0x10000000001e, "0100000900000000000000000226cc573c080000003724c71e14dd6a739effea1b48006be61ffe0000e103000000f8000004003f010039d8f986ff01000300000004af50d50700000000000000e3ad316a1983000000001d00e0dfcb24281e27800000100076c3979ac40000bd15020078a1dfd300881a8365b1b16d7436"}, 0x80, &(0x7f0000447ff0), 0x0, &(0x7f00006e9c68)}, 0x0) 2018/04/11 12:44:56 executing program 2: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x1e, 0x1, 0x0) setsockopt$packet_tx_ring(r0, 0x10f, 0x87, &(0x7f0000b89fe4)=@req={0x772}, 0x10) sendmsg(r0, &(0x7f0000030000)={&(0x7f00004f5000)=@generic={0x10000000001e, "0100000900000000000000020226cc573c080000003724c71e14dd6a739effea1b48006be61ffe0000e103000000f8000004003f010039d8f986ff01000300000004af50d50700000000000000e3ad316a1983000000001d00e0dfcb24281e27800000100076c3979ac40000bd15020078a1dfd300881a8365b1b16d7436"}, 0x80, &(0x7f0000447ff0), 0x0, &(0x7f00006e9c68)}, 0x0) 2018/04/11 12:44:56 executing program 4: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000200)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc-cast5-avx\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00003bcfd0)="d3ab27191a", 0x5) sendmmsg$alg(r1, &(0x7f0000007e40)=[{0x0, 0x0, &(0x7f0000000900)}], 0x1, 0x0) accept(r0, &(0x7f0000000040)=@pppol2tpv3in6, &(0x7f00000000c0)=0x80) 2018/04/11 12:44:57 executing program 3: semop(0x0, &(0x7f000001a000)=[{0x500, 0xffffffffffff0001}, {}], 0x2) timer_create(0x0, &(0x7f0000cd0000)={0x0, 0x12}, &(0x7f0000044000)) timer_settime(0x0, 0x0, &(0x7f00004b1fe0)={{0x0, 0x1c9c380}, {0x0, 0x9}}, &(0x7f0000040000)) r0 = getpgid(0x0) tkill(r0, 0x1000000000016) 2018/04/11 12:44:57 executing program 6: r0 = socket$inet6(0xa, 0x80003, 0xff) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @ipv4={[], [0xff, 0xff], @dev={0xac, 0x14, 0x14, 0x1b}}}, 0x1c) sendmsg(r0, &(0x7f000001b000)={0x0, 0xfffffff5, &(0x7f0000019fa0), 0x168, &(0x7f000001ef08)}, 0x0) 2018/04/11 12:44:57 executing program 2: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x1e, 0x1, 0x0) setsockopt$packet_tx_ring(r0, 0x10f, 0x87, &(0x7f0000b89fe4)=@req={0x772}, 0x10) sendmsg(r0, &(0x7f0000030000)={&(0x7f00004f5000)=@generic={0x10000000001e, "01000009000101d0000000000226cc573c080000003724c71e14dd6a739effea1b48006be61ffe0000e103000000f8000004003f010039d8f986ff01000300000004af50d50700000000000000e3ad316a1983000000001d00e0dfcb24281e27800000100076c3979ac40000bd15020078a1dfd300881a8365b1b16d7436"}, 0x80, &(0x7f0000447ff0), 0x0, &(0x7f00006e9c68)}, 0x0) 2018/04/11 12:44:57 executing program 4: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000200)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc-cast5-avx\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00003bcfd0)="d3ab27191a", 0x5) sendmmsg$alg(r1, &(0x7f0000007e40)=[{0x0, 0x0, &(0x7f0000000900)}], 0x1, 0x0) accept(r0, &(0x7f0000000040)=@pppol2tpv3in6, &(0x7f00000000c0)=0x80) 2018/04/11 12:44:57 executing program 0: r0 = syz_open_dev$mice(&(0x7f0000000040)='/dev/input/mice\x00', 0x0, 0x800) ioctl$sock_inet6_udp_SIOCOUTQ(r0, 0x5411, &(0x7f0000000080)) r1 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bind$alg(r0, &(0x7f00000000c0)={0x26, 'rng\x00', 0x0, 0x0, 'drbg_pr_sha512\x00'}, 0x58) r2 = socket$alg(0x26, 0x5, 0x0) fstatfs(r1, &(0x7f0000000140)=""/118) bind$alg(r2, &(0x7f0000000200)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc-cast5-avx\x00'}, 0x58) r3 = accept$alg(r2, 0x0, 0x0) dup3(r1, r3, 0x0) 2018/04/11 12:44:57 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000000), 0x216) sendmsg$key(r0, &(0x7f0000000b00)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000001000)={0x2, 0xa, 0x0, 0x0, 0x2}, 0x10}, 0x1}, 0x0) sendmsg$key(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000001c0)=ANY=[@ANYBLOB="021200000200000000000000000000001d918a4e0232f50df58cd9b031cede8cf13eb7b50f233ee53ccf77147f18b32e3e0c5012a381e639434fd04ce34cf2501bcf01c55e05579dc0cb21c567febed4aaaa9f10142bfd294a8f853cc6927e7ed40dd414c035561245393dc31218f70ecb8a3365fe9c9165dda585db518f2bdcfde216677412a53db295b4d8cbb7002a0403e8ff1d34d4928019deaebe7509b86ef8257c693239a3de00afedd959c2818195ef864ec3a6e98cf2e43968559a5245d06e59aa2f7f3466c44c98550c1a1df21d5dd3ecc6666e96aebe10eab416740139d29f000000000000000000000000000000000000000000000000000000000000000000000000000000"], 0x10}, 0x1}, 0x0) 2018/04/11 12:44:57 executing program 1: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff7fffffffffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x1e, 0x0, 0x0) sendmsg(r0, &(0x7f0000030000)={&(0x7f00004f5000)=@generic={0x10000000001e, "0100000900000000000000000226cc573c080000003724c71e14dd6a739effea1b48006be61ffe0000e103000000f8000004003f010039d8f986ff01000300000004af50d50700000000000000e3ad316a1983000000001d00e0dfcb24281e27800000100076c3979ac40000bd15020078a1dfd300881a8365b1b16d7436"}, 0x80, &(0x7f0000447ff0), 0x0, &(0x7f00006e9c68)}, 0x0) 2018/04/11 12:44:57 executing program 7: syz_emit_ethernet(0x66, &(0x7f0000000000)={@random="cd3997030f00", @empty=[0x0, 0x0, 0x0, 0x6], [], {@ipv6={0x86dd, {0x0, 0x6, "b40900", 0x30, 0x67, 0x0, @ipv4={[], [0xff, 0xff], @multicast2=0xe0000002}, @mcast2={0xff, 0x2, [], 0x1}, {[], @icmpv6=@time_exceed={0x21, 0x0, 0x0, 0x0, [], {0x0, 0x6, "b680fa", 0x0, 0x0, 0x0, @ipv4={[], [0xff, 0xff], @broadcast=0xffffffff}, @ipv4={[], [0xff, 0xff], @remote={0xac, 0x14, 0xffffffffffffffff, 0xbb}}}}}}}}}, 0x0) 2018/04/11 12:44:57 executing program 6: r0 = socket$inet6(0xa, 0x80003, 0xff) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @ipv4={[], [0xff, 0xff], @dev={0xac, 0x14, 0x14, 0x1b}}}, 0x1c) sendmsg(r0, &(0x7f000001b000)={0x0, 0xfffffff5, &(0x7f0000019fa0), 0xa5, &(0x7f000001ef08)}, 0x0) 2018/04/11 12:44:57 executing program 7: syz_emit_ethernet(0x66, &(0x7f0000000000)={@random="cd3997030f00", @empty=[0x0, 0x0, 0x0, 0x86ddffff], [], {@ipv6={0x86dd, {0x0, 0x6, "b40900", 0x30, 0x67, 0x0, @ipv4={[], [0xff, 0xff], @multicast2=0xe0000002}, @mcast2={0xff, 0x2, [], 0x1}, {[], @icmpv6=@time_exceed={0x21, 0x0, 0x0, 0x0, [], {0x0, 0x6, "b680fa", 0x0, 0x0, 0x0, @ipv4={[], [0xff, 0xff], @broadcast=0xffffffff}, @ipv4={[], [0xff, 0xff], @remote={0xac, 0x14, 0xffffffffffffffff, 0xbb}}}}}}}}}, 0x0) 2018/04/11 12:44:57 executing program 4: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(0xffffffffffffffff, &(0x7f0000000200)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc-cast5-avx\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00003bcfd0)="d3ab27191a", 0x5) sendmmsg$alg(r1, &(0x7f0000007e40)=[{0x0, 0x0, &(0x7f0000000900)}], 0x1, 0x0) accept(r0, &(0x7f0000000040)=@pppol2tpv3in6, &(0x7f00000000c0)=0x80) 2018/04/11 12:44:57 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000000), 0x216) r1 = syz_open_dev$admmidi(&(0x7f0000000100)='/dev/admmidi#\x00', 0x0, 0x101000) r2 = openat$ipvs(0xffffffffffffff9c, &(0x7f00000001c0)='/proc/sys/net/ipv4/vs/expire_quiescent_template\x00', 0x2, 0x0) ioctl$VHOST_SET_VRING_KICK(r1, 0x4008af20, &(0x7f0000000200)={0x3, r2}) sendmsg$key(r0, &(0x7f0000000b00)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000001000)={0x2, 0xa, 0x0, 0x0, 0x2}, 0x10}, 0x1}, 0x0) sendmsg$key(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000040)={0x2, 0x12, 0x0, 0x0, 0x2}, 0x10}, 0x1}, 0x0) r3 = dup3(r0, r0, 0x80000) ioctl$DRM_IOCTL_ADD_CTX(0xffffffffffffffff, 0xc0086420, &(0x7f0000000080)={0x0}) ioctl$DRM_IOCTL_SWITCH_CTX(r3, 0x40086424, &(0x7f00000000c0)={r4, 0x3}) 2018/04/11 12:44:57 executing program 2: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x1e, 0x1, 0x0) setsockopt$packet_tx_ring(r0, 0x10f, 0x87, &(0x7f0000b89fe4)=@req={0x772}, 0x10) sendmsg(r0, &(0x7f0000030000)={&(0x7f00004f5000)=@generic={0x10000000001e, "010000097fffffff000000000226cc573c080000003724c71e14dd6a739effea1b48006be61ffe0000e103000000f8000004003f010039d8f986ff01000300000004af50d50700000000000000e3ad316a1983000000001d00e0dfcb24281e27800000100076c3979ac40000bd15020078a1dfd300881a8365b1b16d7436"}, 0x80, &(0x7f0000447ff0), 0x0, &(0x7f00006e9c68)}, 0x0) 2018/04/11 12:44:57 executing program 1: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff7fffffffffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x1e, 0x0, 0x0) sendmsg(r0, &(0x7f0000030000)={&(0x7f00004f5000)=@generic={0x10000000001e, "0100000900000000000000000226cc573c080000003724c71e14dd6a739effea1b48006be61ffe0000e103000000f8000004003f010039d8f986ff01000300000004af50d50700000000000000e3ad316a1983000000001d00e0dfcb24281e27800000100076c3979ac40000bd15020078a1dfd300881a8365b1b16d7436"}, 0x80, &(0x7f0000447ff0), 0x0, &(0x7f00006e9c68)}, 0x0) 2018/04/11 12:44:57 executing program 0: r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000200)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc-cast5-avx\x00'}, 0x58) r2 = accept$alg(r1, 0x0, 0x0) dup3(r0, r2, 0x0) sched_yield() 2018/04/11 12:44:57 executing program 3: semop(0x0, &(0x7f000001a000)=[{0xe00, 0xffffffffffff0001}, {}], 0x2) timer_create(0x0, &(0x7f0000cd0000)={0x0, 0x12}, &(0x7f0000044000)) timer_settime(0x0, 0x0, &(0x7f00004b1fe0)={{0x0, 0x1c9c380}, {0x0, 0x9}}, &(0x7f0000040000)) r0 = getpgid(0x0) tkill(r0, 0x1000000000016) 2018/04/11 12:44:57 executing program 7: syz_emit_ethernet(0x66, &(0x7f0000000000)={@random="cd3997030f00", @empty=[0x0, 0x0, 0x0, 0x8847], [], {@ipv6={0x86dd, {0x0, 0x6, "b40900", 0x30, 0x67, 0x0, @ipv4={[], [0xff, 0xff], @multicast2=0xe0000002}, @mcast2={0xff, 0x2, [], 0x1}, {[], @icmpv6=@time_exceed={0x21, 0x0, 0x0, 0x0, [], {0x0, 0x6, "b680fa", 0x0, 0x0, 0x0, @ipv4={[], [0xff, 0xff], @broadcast=0xffffffff}, @ipv4={[], [0xff, 0xff], @remote={0xac, 0x14, 0xffffffffffffffff, 0xbb}}}}}}}}}, 0x0) 2018/04/11 12:44:57 executing program 6: r0 = socket$inet6(0xa, 0x80003, 0xff) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @ipv4={[], [0xff, 0xff], @dev={0xac, 0x14, 0x14, 0x1b}}}, 0x1c) sendmsg(r0, &(0x7f000001b000)={0x0, 0xfffffff5, &(0x7f0000019fa0), 0x147, &(0x7f000001ef08)}, 0x0) 2018/04/11 12:44:57 executing program 4: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(0xffffffffffffffff, &(0x7f0000000200)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc-cast5-avx\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00003bcfd0)="d3ab27191a", 0x5) sendmmsg$alg(r1, &(0x7f0000007e40)=[{0x0, 0x0, &(0x7f0000000900)}], 0x1, 0x0) accept(r0, &(0x7f0000000040)=@pppol2tpv3in6, &(0x7f00000000c0)=0x80) 2018/04/11 12:44:57 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000000), 0x216) sendmsg$key(r0, &(0x7f0000000b00)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000001000)={0x2, 0xa, 0x0, 0x0, 0x2}, 0x10}, 0x1}, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000200)='./file0\x00', 0x10000000101000, 0x90) connect$ipx(r1, &(0x7f0000000100)={0x4, 0x200, 0x80000001, "02d9df82fcfe", 0x200}, 0x10) r2 = getuid() fstat(r1, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) fchown(r0, r2, r3) setsockopt$nfc_llcp_NFC_LLCP_RW(r0, 0x118, 0x0, &(0x7f0000000080)=0x1, 0x4) openat$mixer(0xffffffffffffff9c, &(0x7f0000000040)='/dev/mixer\x00', 0x2401, 0x0) sendmsg$key(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000001c0)=ANY=[@ANYBLOB="0212000302000000000ebdff8022e56eb6c6a5bf3eaed100000000000000"], 0x10}, 0x1}, 0x0) 2018/04/11 12:44:57 executing program 0: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000200)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc-cast5-avx\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) dup3(r0, r0, 0x0) ioctl$sock_inet_SIOCSIFDSTADDR(r1, 0x8918, &(0x7f0000000040)={'gre0\x00', {0x2, 0x4e24, @rand_addr=0x101}}) 2018/04/11 12:44:57 executing program 7: syz_emit_ethernet(0x66, &(0x7f0000000000)={@random="cd3997030f00", @empty=[0x0, 0x0, 0x0, 0x8100000000000000], [], {@ipv6={0x86dd, {0x0, 0x6, "b40900", 0x30, 0x67, 0x0, @ipv4={[], [0xff, 0xff], @multicast2=0xe0000002}, @mcast2={0xff, 0x2, [], 0x1}, {[], @icmpv6=@time_exceed={0x21, 0x0, 0x0, 0x0, [], {0x0, 0x6, "b680fa", 0x0, 0x0, 0x0, @ipv4={[], [0xff, 0xff], @broadcast=0xffffffff}, @ipv4={[], [0xff, 0xff], @remote={0xac, 0x14, 0xffffffffffffffff, 0xbb}}}}}}}}}, 0x0) 2018/04/11 12:44:57 executing program 1: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff7fffffffffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x1e, 0x1, 0x0) sendmsg(0xffffffffffffffff, &(0x7f0000030000)={&(0x7f00004f5000)=@generic={0x10000000001e, "0100000900000000000000000226cc573c080000003724c71e14dd6a739effea1b48006be61ffe0000e103000000f8000004003f010039d8f986ff01000300000004af50d50700000000000000e3ad316a1983000000001d00e0dfcb24281e27800000100076c3979ac40000bd15020078a1dfd300881a8365b1b16d7436"}, 0x80, &(0x7f0000447ff0), 0x0, &(0x7f00006e9c68)}, 0x0) 2018/04/11 12:44:57 executing program 6: r0 = socket$inet6(0xa, 0x80003, 0xff) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @ipv4={[], [0xff, 0xff], @dev={0xac, 0x14, 0x14, 0x1b}}}, 0x1c) sendmsg(r0, &(0x7f000001b000)={0x0, 0xfffffff5, &(0x7f0000019fa0), 0x1c3, &(0x7f000001ef08)}, 0x0) 2018/04/11 12:44:57 executing program 3: semop(0x0, &(0x7f000001a000)=[{0x3f00, 0xffffffffffff0001}, {}], 0x2) timer_create(0x0, &(0x7f0000cd0000)={0x0, 0x12}, &(0x7f0000044000)) timer_settime(0x0, 0x0, &(0x7f00004b1fe0)={{0x0, 0x1c9c380}, {0x0, 0x9}}, &(0x7f0000040000)) r0 = getpgid(0x0) tkill(r0, 0x1000000000016) 2018/04/11 12:44:57 executing program 2: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x1e, 0x1, 0x0) setsockopt$packet_tx_ring(r0, 0x10f, 0x87, &(0x7f0000b89fe4)=@req={0x772}, 0x10) sendmsg(r0, &(0x7f0000030000)={&(0x7f00004f5000)=@generic={0x10000000001e, "0100000904000000000000000226cc573c080000003724c71e14dd6a739effea1b48006be61ffe0000e103000000f8000004003f010039d8f986ff01000300000004af50d50700000000000000e3ad316a1983000000001d00e0dfcb24281e27800000100076c3979ac40000bd15020078a1dfd300881a8365b1b16d7436"}, 0x80, &(0x7f0000447ff0), 0x0, &(0x7f00006e9c68)}, 0x0) 2018/04/11 12:44:57 executing program 6: r0 = socket$inet6(0xa, 0x80003, 0xff) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @ipv4={[], [0xff, 0xff], @dev={0xac, 0x14, 0x14, 0x1b}}}, 0x1c) sendmsg(r0, &(0x7f000001b000)={0x0, 0xfffffff5, &(0x7f0000019fa0), 0x1d0, &(0x7f000001ef08)}, 0x0) 2018/04/11 12:44:57 executing program 4: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(0xffffffffffffffff, &(0x7f0000000200)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc-cast5-avx\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00003bcfd0)="d3ab27191a", 0x5) sendmmsg$alg(r1, &(0x7f0000007e40)=[{0x0, 0x0, &(0x7f0000000900)}], 0x1, 0x0) accept(r0, &(0x7f0000000040)=@pppol2tpv3in6, &(0x7f00000000c0)=0x80) 2018/04/11 12:44:57 executing program 2: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x1e, 0x1, 0x0) setsockopt$packet_tx_ring(r0, 0x10f, 0x87, &(0x7f0000b89fe4)=@req={0x772}, 0x10) sendmsg(r0, &(0x7f0000030000)={&(0x7f00004f5000)=@generic={0x10000000001e, "01000009d0010100000000000226cc573c080000003724c71e14dd6a739effea1b48006be61ffe0000e103000000f8000004003f010039d8f986ff01000300000004af50d50700000000000000e3ad316a1983000000001d00e0dfcb24281e27800000100076c3979ac40000bd15020078a1dfd300881a8365b1b16d7436"}, 0x80, &(0x7f0000447ff0), 0x0, &(0x7f00006e9c68)}, 0x0) 2018/04/11 12:44:57 executing program 7: syz_emit_ethernet(0x66, &(0x7f0000000000)={@random="cd3997030f00", @empty=[0x0, 0x0, 0x0, 0x6700000000000000], [], {@ipv6={0x86dd, {0x0, 0x6, "b40900", 0x30, 0x67, 0x0, @ipv4={[], [0xff, 0xff], @multicast2=0xe0000002}, @mcast2={0xff, 0x2, [], 0x1}, {[], @icmpv6=@time_exceed={0x21, 0x0, 0x0, 0x0, [], {0x0, 0x6, "b680fa", 0x0, 0x0, 0x0, @ipv4={[], [0xff, 0xff], @broadcast=0xffffffff}, @ipv4={[], [0xff, 0xff], @remote={0xac, 0x14, 0xffffffffffffffff, 0xbb}}}}}}}}}, 0x0) 2018/04/11 12:44:57 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000000), 0x216) sendmsg$key(r0, &(0x7f0000000b00)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000001000)={0x2, 0xa, 0xffffffffffffffff, 0x0, 0x2}, 0x10}, 0x1}, 0x0) sendmsg$key(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000040)={0x2, 0x12, 0x0, 0x0, 0x2}, 0x10}, 0x1}, 0x0) 2018/04/11 12:44:57 executing program 1: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff7fffffffffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x1e, 0x1, 0x0) sendmsg(0xffffffffffffffff, &(0x7f0000030000)={&(0x7f00004f5000)=@generic={0x10000000001e, "0100000900000000000000000226cc573c080000003724c71e14dd6a739effea1b48006be61ffe0000e103000000f8000004003f010039d8f986ff01000300000004af50d50700000000000000e3ad316a1983000000001d00e0dfcb24281e27800000100076c3979ac40000bd15020078a1dfd300881a8365b1b16d7436"}, 0x80, &(0x7f0000447ff0), 0x0, &(0x7f00006e9c68)}, 0x0) 2018/04/11 12:44:57 executing program 0: r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000200)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc-cast5-avx\x00'}, 0x58) r2 = socket$inet6(0xa, 0x5, 0xfff) getsockname$inet6(r2, &(0x7f0000000040), &(0x7f0000000080)=0x1c) setsockopt$l2tp_PPPOL2TP_SO_DEBUG(r1, 0x111, 0x1, 0x6, 0x4) r3 = accept$alg(r1, 0x0, 0x0) fcntl$F_GET_FILE_RW_HINT(r1, 0x40d, &(0x7f00000000c0)) fchmod(r2, 0xcb) dup3(r0, r3, 0x0) 2018/04/11 12:44:57 executing program 3: semop(0x0, &(0x7f000001a000)=[{0x100000000000000, 0xffffffffffff0001}, {}], 0x2) timer_create(0x0, &(0x7f0000cd0000)={0x0, 0x12}, &(0x7f0000044000)) timer_settime(0x0, 0x0, &(0x7f00004b1fe0)={{0x0, 0x1c9c380}, {0x0, 0x9}}, &(0x7f0000040000)) r0 = getpgid(0x0) tkill(r0, 0x1000000000016) 2018/04/11 12:44:57 executing program 4: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000200)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc-cast5-avx\x00'}, 0x58) r1 = accept$alg(0xffffffffffffffff, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00003bcfd0)="d3ab27191a", 0x5) sendmmsg$alg(r1, &(0x7f0000007e40)=[{0x0, 0x0, &(0x7f0000000900)}], 0x1, 0x0) accept(r0, &(0x7f0000000040)=@pppol2tpv3in6, &(0x7f00000000c0)=0x80) 2018/04/11 12:44:57 executing program 1: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff7fffffffffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x1e, 0x1, 0x0) sendmsg(0xffffffffffffffff, &(0x7f0000030000)={&(0x7f00004f5000)=@generic={0x10000000001e, "0100000900000000000000000226cc573c080000003724c71e14dd6a739effea1b48006be61ffe0000e103000000f8000004003f010039d8f986ff01000300000004af50d50700000000000000e3ad316a1983000000001d00e0dfcb24281e27800000100076c3979ac40000bd15020078a1dfd300881a8365b1b16d7436"}, 0x80, &(0x7f0000447ff0), 0x0, &(0x7f00006e9c68)}, 0x0) 2018/04/11 12:44:58 executing program 6: r0 = socket$inet6(0xa, 0x80003, 0xff) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @ipv4={[], [0xff, 0xff], @dev={0xac, 0x14, 0x14, 0x1b}}}, 0x1c) sendmsg(r0, &(0x7f000001b000)={0x0, 0xfffffff5, &(0x7f0000019fa0), 0x54, &(0x7f000001ef08)}, 0x0) 2018/04/11 12:44:58 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000000), 0x216) sendmsg$key(r0, &(0x7f0000000b00)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000001000)={0x2, 0xa, 0x0, 0x0, 0x2}, 0x10}, 0x1}, 0x0) r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000200)='/proc/self/net/pfkey\x00', 0x82000, 0x0) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000240)={@multicast1, @broadcast, 0x0}, &(0x7f0000000280)=0xc) ioctl$TUNSETIFINDEX(r1, 0x400454da, &(0x7f00000002c0)=r2) sendmsg$key(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000040)={0x2, 0x12, 0x0, 0x0, 0x2}, 0x10}, 0x1}, 0x0) r3 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000080)='net/netstat\x00') recvfrom$ipx(r3, &(0x7f00000000c0)=""/126, 0x7e, 0x1, &(0x7f00000001c0)={0x4, 0x100, 0x401, "c5f4a4c7f19a", 0x3}, 0x10) 2018/04/11 12:44:58 executing program 0: r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x1000000000}, 0x0, 0x0, 0xffffffffffffffff, 0x100000000000000) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000200)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc-cast5-avx\x00'}, 0x58) r2 = accept$alg(r1, 0x0, 0x0) dup3(r0, r2, 0x0) 2018/04/11 12:44:58 executing program 2: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x1e, 0x1, 0x0) setsockopt$packet_tx_ring(r0, 0x10f, 0x87, &(0x7f0000b89fe4)=@req={0x772}, 0x10) sendmsg(r0, &(0x7f0000030000)={&(0x7f00004f5000)=@generic={0x10000000001e, "0100000900000000000101d00226cc573c080000003724c71e14dd6a739effea1b48006be61ffe0000e103000000f8000004003f010039d8f986ff01000300000004af50d50700000000000000e3ad316a1983000000001d00e0dfcb24281e27800000100076c3979ac40000bd15020078a1dfd300881a8365b1b16d7436"}, 0x80, &(0x7f0000447ff0), 0x0, &(0x7f00006e9c68)}, 0x0) 2018/04/11 12:44:58 executing program 7: syz_emit_ethernet(0x66, &(0x7f0000000000)={@random="cd3997030f00", @empty=[0x0, 0x0, 0x0, 0x400000000000000], [], {@ipv6={0x86dd, {0x0, 0x6, "b40900", 0x30, 0x67, 0x0, @ipv4={[], [0xff, 0xff], @multicast2=0xe0000002}, @mcast2={0xff, 0x2, [], 0x1}, {[], @icmpv6=@time_exceed={0x21, 0x0, 0x0, 0x0, [], {0x0, 0x6, "b680fa", 0x0, 0x0, 0x0, @ipv4={[], [0xff, 0xff], @broadcast=0xffffffff}, @ipv4={[], [0xff, 0xff], @remote={0xac, 0x14, 0xffffffffffffffff, 0xbb}}}}}}}}}, 0x0) 2018/04/11 12:44:58 executing program 1: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff7fffffffffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x1e, 0x1, 0x0) sendmsg(r0, &(0x7f0000030000)={&(0x7f00004f5000)=@generic={0x0, "0100000900000000000000000226cc573c080000003724c71e14dd6a739effea1b48006be61ffe0000e103000000f8000004003f010039d8f986ff01000300000004af50d50700000000000000e3ad316a1983000000001d00e0dfcb24281e27800000100076c3979ac40000bd15020078a1dfd300881a8365b1b16d7436"}, 0x80, &(0x7f0000447ff0), 0x0, &(0x7f00006e9c68)}, 0x0) 2018/04/11 12:44:58 executing program 3: semop(0x0, &(0x7f000001a000)=[{0x1000000, 0xffffffffffff0001}, {}], 0x2) timer_create(0x0, &(0x7f0000cd0000)={0x0, 0x12}, &(0x7f0000044000)) timer_settime(0x0, 0x0, &(0x7f00004b1fe0)={{0x0, 0x1c9c380}, {0x0, 0x9}}, &(0x7f0000040000)) r0 = getpgid(0x0) tkill(r0, 0x1000000000016) 2018/04/11 12:44:58 executing program 4: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000200)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc-cast5-avx\x00'}, 0x58) r1 = accept$alg(0xffffffffffffffff, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00003bcfd0)="d3ab27191a", 0x5) sendmmsg$alg(r1, &(0x7f0000007e40)=[{0x0, 0x0, &(0x7f0000000900)}], 0x1, 0x0) accept(r0, &(0x7f0000000040)=@pppol2tpv3in6, &(0x7f00000000c0)=0x80) 2018/04/11 12:44:58 executing program 0: r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000200)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc-cast5-avx\x00'}, 0x58) r2 = accept$alg(r1, 0x0, 0x0) r3 = dup3(r0, r2, 0x0) fgetxattr(r3, &(0x7f0000000040)=@known='user.syz\x00', &(0x7f0000000080)=""/189, 0xbd) socket$bt_hidp(0x1f, 0x3, 0x6) 2018/04/11 12:44:58 executing program 1: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff7fffffffffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x1e, 0x1, 0x0) sendmsg(r0, &(0x7f0000030000)={&(0x7f00004f5000)=@generic={0x0, "0100000900000000000000000226cc573c080000003724c71e14dd6a739effea1b48006be61ffe0000e103000000f8000004003f010039d8f986ff01000300000004af50d50700000000000000e3ad316a1983000000001d00e0dfcb24281e27800000100076c3979ac40000bd15020078a1dfd300881a8365b1b16d7436"}, 0x80, &(0x7f0000447ff0), 0x0, &(0x7f00006e9c68)}, 0x0) 2018/04/11 12:44:58 executing program 6: r0 = socket$inet6(0xa, 0x80003, 0xff) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @ipv4={[], [0xff, 0xff], @dev={0xac, 0x14, 0x14, 0x1b}}}, 0x1c) sendmsg(r0, &(0x7f000001b000)={0x0, 0xfffffff5, &(0x7f0000019fa0), 0xe5, &(0x7f000001ef08)}, 0x0) 2018/04/11 12:44:58 executing program 7: syz_emit_ethernet(0x66, &(0x7f0000000000)={@random="cd3997030f00", @empty=[0x0, 0x0, 0x0, 0xe80], [], {@ipv6={0x86dd, {0x0, 0x6, "b40900", 0x30, 0x67, 0x0, @ipv4={[], [0xff, 0xff], @multicast2=0xe0000002}, @mcast2={0xff, 0x2, [], 0x1}, {[], @icmpv6=@time_exceed={0x21, 0x0, 0x0, 0x0, [], {0x0, 0x6, "b680fa", 0x0, 0x0, 0x0, @ipv4={[], [0xff, 0xff], @broadcast=0xffffffff}, @ipv4={[], [0xff, 0xff], @remote={0xac, 0x14, 0xffffffffffffffff, 0xbb}}}}}}}}}, 0x0) 2018/04/11 12:44:58 executing program 4: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000200)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc-cast5-avx\x00'}, 0x58) r1 = accept$alg(0xffffffffffffffff, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00003bcfd0)="d3ab27191a", 0x5) sendmmsg$alg(r1, &(0x7f0000007e40)=[{0x0, 0x0, &(0x7f0000000900)}], 0x1, 0x0) accept(r0, &(0x7f0000000040)=@pppol2tpv3in6, &(0x7f00000000c0)=0x80) 2018/04/11 12:44:58 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000000), 0x216) sendmsg$key(r0, &(0x7f0000000b00)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000001000)={0x2, 0xa, 0x0, 0x0, 0x2}, 0x10}, 0x1}, 0x0) sendmsg$key(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000000c0)=ANY=[@ANYBLOB="02120000020080000000000000000000ba717c8df618090b622fde56a1d095f58383ffe9b08e7a9475ff022912813a912cd3b84d4dc2cc95792c6e19a2dac5b0f105cccb0b554abe91ba"], 0x10}, 0x1}, 0x0) r1 = semget$private(0x0, 0x5, 0x100) semctl$GETZCNT(r1, 0x3, 0xf, &(0x7f0000000340)=""/149) sync_file_range(r0, 0x0, 0xa1bfac7, 0x2) ioctl$sock_SIOCGPGRP(r0, 0x8904, &(0x7f0000000080)) r2 = openat$rfkill(0xffffffffffffff9c, &(0x7f0000000040)='/dev/rfkill\x00', 0x8000, 0x0) getsockopt$inet_sctp6_SCTP_LOCAL_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1b, &(0x7f00000001c0)=ANY=[@ANYRES32=0x0, @ANYBLOB="b10000007876fb642efa2b19631263826f3ab5ce12dcf5e82914d05697212ed92856e829d410b51d64f52dda0c3a15e1ac8de3ae9daa99d9c62e7766f55c313ade2525efe15e5d777bebb65417d52ca303289bf7a545d50335995a6de945764bfe4a107b8b02a55f043cc0009e15b17be528c029392446dd9737e488c968d34d572811ad5b3fa7f2785aac0cce55676a46e8f5227155598d4dff3de627b4e22cde032ace59ecb8f725b8b6e741a53ab5575ec4931a"], &(0x7f0000000280)=0xb9) getsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(r2, 0x84, 0xa, &(0x7f00000002c0)={0x2, 0x3, 0x0, 0x3f, 0x196, 0x4, 0x7, 0x8, r3}, &(0x7f0000000300)=0x20) 2018/04/11 12:44:58 executing program 2: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x1e, 0x1, 0x0) setsockopt$packet_tx_ring(r0, 0x10f, 0x87, &(0x7f0000b89fe4)=@req={0x772}, 0x10) sendmsg(r0, &(0x7f0000030000)={&(0x7f00004f5000)=@generic={0x10000000001e, "0100000900000000000004000226cc573c080000003724c71e14dd6a739effea1b48006be61ffe0000e103000000f8000004003f010039d8f986ff01000300000004af50d50700000000000000e3ad316a1983000000001d00e0dfcb24281e27800000100076c3979ac40000bd15020078a1dfd300881a8365b1b16d7436"}, 0x80, &(0x7f0000447ff0), 0x0, &(0x7f00006e9c68)}, 0x0) 2018/04/11 12:44:58 executing program 1: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff7fffffffffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x1e, 0x1, 0x0) sendmsg(r0, &(0x7f0000030000)={&(0x7f00004f5000)=@generic={0x0, "0100000900000000000000000226cc573c080000003724c71e14dd6a739effea1b48006be61ffe0000e103000000f8000004003f010039d8f986ff01000300000004af50d50700000000000000e3ad316a1983000000001d00e0dfcb24281e27800000100076c3979ac40000bd15020078a1dfd300881a8365b1b16d7436"}, 0x80, &(0x7f0000447ff0), 0x0, &(0x7f00006e9c68)}, 0x0) 2018/04/11 12:44:58 executing program 6: r0 = socket$inet6(0xa, 0x80003, 0xff) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @ipv4={[], [0xff, 0xff], @dev={0xac, 0x14, 0x14, 0x1b}}}, 0x1c) sendmsg(r0, &(0x7f000001b000)={0x0, 0xfffffff5, &(0x7f0000019fa0), 0x76, &(0x7f000001ef08)}, 0x0) 2018/04/11 12:44:58 executing program 7: syz_emit_ethernet(0x66, &(0x7f0000000000)={@random="cd3997030f00", @empty=[0x0, 0x0, 0x0, 0x200000000000000], [], {@ipv6={0x86dd, {0x0, 0x6, "b40900", 0x30, 0x67, 0x0, @ipv4={[], [0xff, 0xff], @multicast2=0xe0000002}, @mcast2={0xff, 0x2, [], 0x1}, {[], @icmpv6=@time_exceed={0x21, 0x0, 0x0, 0x0, [], {0x0, 0x6, "b680fa", 0x0, 0x0, 0x0, @ipv4={[], [0xff, 0xff], @broadcast=0xffffffff}, @ipv4={[], [0xff, 0xff], @remote={0xac, 0x14, 0xffffffffffffffff, 0xbb}}}}}}}}}, 0x0) 2018/04/11 12:44:58 executing program 0: r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$alg(0x26, 0x5, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='cgroup.events\x00', 0x0, 0x0) r3 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000080)='/proc/sys/net/ipv4/vs/nat_icmp_send\x00', 0x2, 0x0) syz_kvm_setup_cpu$x86(r2, r3, &(0x7f0000fe7000/0x18000)=nil, &(0x7f0000000100)=[@textreal={0x8, &(0x7f00000000c0)="656626f08019de0f01d10f01780e66b9800000c00f326635000100000f3036660f382420ba2100ed6636f20f080f015c002ef30f0666b9f50a00000f32", 0x3d}], 0x1, 0x10, &(0x7f0000000140), 0x0) bind$alg(r1, &(0x7f0000000200)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc-cast5-avx\x00'}, 0x58) r4 = accept$alg(r1, 0x0, 0x0) dup3(r0, r4, 0x0) 2018/04/11 12:44:58 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000000), 0x216) sendmsg$key(r0, &(0x7f0000000b00)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000001000)=ANY=[@ANYBLOB="0700000000f3fffffffffdffff000000"], 0x10}, 0x1}, 0x0) sendmsg$key(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000040)=ANY=[@ANYBLOB="021200000200f8b20000000000000000"], 0x10}, 0x1}, 0x0) r1 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dsp\x00', 0x54800, 0x0) setsockopt$inet6_int(r1, 0x29, 0x0, &(0x7f00000000c0)=0x1, 0x4) 2018/04/11 12:44:58 executing program 4: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000200)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc-cast5-avx\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f00003bcfd0)="d3ab27191a", 0x5) sendmmsg$alg(r1, &(0x7f0000007e40)=[{0x0, 0x0, &(0x7f0000000900)}], 0x1, 0x0) accept(r0, &(0x7f0000000040)=@pppol2tpv3in6, &(0x7f00000000c0)=0x80) 2018/04/11 12:44:58 executing program 1: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x1e, 0x1, 0x0) setsockopt$packet_tx_ring(r0, 0x10f, 0x87, &(0x7f0000b89fe4)=@req={0x772}, 0x10) sendmsg(r0, &(0x7f0000030000)={&(0x7f00004f5000)=@generic={0x10000000001e, "0014000900000000000000000226cc573c080000003724c71e14dd6a739effea1b48006be61ffe0000e103000000f8000004003f010039d8f986ff01000300000004af50d50700000000000000e3ad316a1983000000001d00e0dfcb24281e27800000100076c3979ac40000bd15020078a1dfd300881a8365b1b16d7436"}, 0x80, &(0x7f0000447ff0), 0x0, &(0x7f00006e9c68)}, 0x0) 2018/04/11 12:44:59 executing program 3: semop(0x0, &(0x7f000001a000)=[{0xe000000, 0xffffffffffff0001}, {}], 0x2) timer_create(0x0, &(0x7f0000cd0000)={0x0, 0x12}, &(0x7f0000044000)) timer_settime(0x0, 0x0, &(0x7f00004b1fe0)={{0x0, 0x1c9c380}, {0x0, 0x9}}, &(0x7f0000040000)) r0 = getpgid(0x0) tkill(r0, 0x1000000000016) 2018/04/11 12:44:59 executing program 7: syz_emit_ethernet(0x66, &(0x7f0000000000)={@random="cd3997030f00", @empty=[0x0, 0x0, 0x0, 0x8906], [], {@ipv6={0x86dd, {0x0, 0x6, "b40900", 0x30, 0x67, 0x0, @ipv4={[], [0xff, 0xff], @multicast2=0xe0000002}, @mcast2={0xff, 0x2, [], 0x1}, {[], @icmpv6=@time_exceed={0x21, 0x0, 0x0, 0x0, [], {0x0, 0x6, "b680fa", 0x0, 0x0, 0x0, @ipv4={[], [0xff, 0xff], @broadcast=0xffffffff}, @ipv4={[], [0xff, 0xff], @remote={0xac, 0x14, 0xffffffffffffffff, 0xbb}}}}}}}}}, 0x0) 2018/04/11 12:44:59 executing program 6: r0 = socket$inet6(0xa, 0x80003, 0xff) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @ipv4={[], [0xff, 0xff], @dev={0xac, 0x14, 0x14, 0x1b}}}, 0x1c) sendmsg(r0, &(0x7f000001b000)={0x0, 0xfffffff5, &(0x7f0000019fa0), 0x1c6, &(0x7f000001ef08)}, 0x0) 2018/04/11 12:44:59 executing program 2: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x1e, 0x1, 0x0) setsockopt$packet_tx_ring(r0, 0x10f, 0x87, &(0x7f0000b89fe4)=@req={0x772}, 0x10) sendmsg(r0, &(0x7f0000030000)={&(0x7f00004f5000)=@generic={0x10000000001e, "0100000900000400000000000226cc573c080000003724c71e14dd6a739effea1b48006be61ffe0000e103000000f8000004003f010039d8f986ff01000300000004af50d50700000000000000e3ad316a1983000000001d00e0dfcb24281e27800000100076c3979ac40000bd15020078a1dfd300881a8365b1b16d7436"}, 0x80, &(0x7f0000447ff0), 0x0, &(0x7f00006e9c68)}, 0x0) 2018/04/11 12:44:59 executing program 0: r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000380)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc-cast5-avx\x00'}, 0x58) r2 = syz_open_dev$dspn(&(0x7f00000000c0)='/dev/dsp#\x00', 0xfffffffffffff000, 0x105100) bind$vsock_stream(r2, &(0x7f0000000100)={0x28, 0x0, 0x2711, @my=0x1}, 0x10) r3 = syz_fuseblk_mount(&(0x7f0000000040)='./file0\x00', &(0x7f0000000000)='./file0\x00', 0x4000, 0x0, 0x0, 0x0, 0x0, 0x0) getsockopt$inet_sctp_SCTP_CONTEXT(r2, 0x84, 0x11, &(0x7f0000000140)={0x0, 0x5}, &(0x7f0000000200)=0x8) getsockopt$inet_sctp_SCTP_PEER_AUTH_CHUNKS(r2, 0x84, 0x1a, &(0x7f0000000400)={r4, 0x81, "a277f0f2476bb3b5a9d85c0a520b6cea4ce6a73fe8c99d06bd8be7f85ee718a89a3ba45d1051b0f6bc606d5c51b99c4f86dc156d2978a9cd4a2729e4287ad1dcf44f8dbc967b5f148b03e38680f2aa736b1fc627532e25761a99d05ad2c5e8334ade9bed247a3a409ef9c6f0baa7e1fa76ca0bf5293a602f2d0857dcedc8bdd6d2"}, &(0x7f0000000240)=0x89) r5 = accept$alg(r2, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(r5, 0x89e2, &(0x7f0000000080)={r1}) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(r3, 0x84, 0x1a, &(0x7f00000004c0)=ANY=[@ANYRES32=0x0, @ANYBLOB="8d000000c01d28a675f6975bf98f3b9810f735bc854bb918e1aebb92ba9a11b9b37cf8af44b1e1ab003b27481d19a483029e744f79d49f044ba233de53d2004276a836ad7af5c5a3dc85fcb4dcd3f68142e95957bfa13a01c8de108b6de651fbf46ae624fb3dcedcef57783deb7115ebf9aa155b15c17fc23e55d11ba6450feb4c20bc58ea91dd240de3c33db92a075a46844823458179d6a18b392ed11b579cf273de4f81a74475b38db40e6aba4464fe73828e1b7b2d6c26be1355b5aa37ad1fc7ba8c86fcd67e2a1ae1fbc21c07eb995ad82b02b884cedc31603895db3c8e3d2748afddfb40e0c2a27b8d97987050dc00ba3c91284f37464231e7b2fb73feb61cd6188dfb3a67c94ad489"], &(0x7f0000000180)=0x95) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(r6, 0x84, 0x1a, &(0x7f0000000280)=ANY=[@ANYRES32=r7, @ANYBLOB="ef000000810c8dfbcf9fb595ffee29279e631d6346a525675be077ccffe4a045dff2dfe09ae73048acbdf5241614c061ffef6ae57153c49736cbd45b2b16acc8f3e6d8865dfa0535e7492abed40f43ad9238d913795057449d304bda5b77a3d6e9d7a3f28045ebfc7875ce392f6c9ef3ebd30df99b304ba7b41e3c84429d1a57d705e199764031f286a0eaff80f9361e4f02e2986d0e6ecb024e17a4ebad0b107cffcff13d79c85fac3dcae48dbd68d6b48fd03b9e268a64697631f024e02149788ce356caa43da61ed988133c58e25035f6305e1e4329a350d930b1d5ed8b6cd1edc20baa3cf822c0cf8b8096205a71dc607d"], &(0x7f00000001c0)=0xf7) dup3(r0, r5, 0x0) 2018/04/11 12:44:59 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000000), 0x216) sendmsg$key(r0, &(0x7f0000000b00)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="020a000002fe00000000f9ffffffffff055462b7f0dc771d78f18c917b83adf8441b0a3e36fa03abb7287f61b1dc37bd50e8c9b8364ab7b11ead0fb798fd29196532864c1c8e0608e78fc916168b757d300c5c34af"], 0x10}, 0x1}, 0x0) ioctl$sock_SIOCOUTQ(r0, 0x5411, &(0x7f0000000100)) syz_mount_image$hfsplus(&(0x7f00000001c0)='hfsplus\x00', &(0x7f0000000200)='./file0\x00', 0xc5, 0x4, &(0x7f0000000600)=[{&(0x7f0000000240)="5393d26ca1e094bed60b0220bce25f08d4f337f43638c9f0fb1a2f8a7ccb7a48e8e2481b9d78daffe82c17ee7b095c1ee9fc692f30f801f4d5a545d88323ae835a1e550d5cd0c863b525b648d38d3e18f66f733ae26269d6029d9c6ade025b6092a98f27eafa36756268bdc70fbc4170d273eaa7d7492626aa987bc0c9e3f72769ad6282fd227d96df56a4ca8cb71e08ce9b555126a6f4902f39676d55fc3b10b6044220", 0xa4, 0xfffffffffffffeff}, {&(0x7f0000000300)="21ae165600566de4e1a3b4242dad4165b87b022dcb99cd27ecd37b22948de6522d35881e6d4b672f5ecfb99e28cca9d9725ee7686fc4f3d81d833078614578b069f9c61edb930c944b7b75ae0e3ab7979da8cfe924097f0f18a34c974430e4781ed33d8d98091e6bebf00f4ad9b06224f8a360a6eaa4b2da5ff9f32920610d22b3af021151b69673c589875b28d30966d5b569ec3f63d47519ed24662bfed326836194aa0f0182eb5ffa96bca2ddae6d8c44265a9ca928924127fcf0055b9a7c01945ca9f71840a40e19076739558cc87d", 0xd1, 0x5}, {&(0x7f0000000400)="c9bdc011f9078fa9564332b34d98b2907bcce21fc92841817a2b19177c0754a538c2176459e1ca1d06e9f86b736fd59a7d16b8f0d75401d441f73690465a7ccf7f5bb982dd988586819179dd0c66ca892e50ae7f482bec6354e99ef71184f74b854b13f1ab5fa2a1f95ccc643bca26b5cf503afb2205f3c1fb5e613de12819c90797f633278b45f8078067600634dcbb9dbc275be4956d494aaaa51f5a1b9f1105fab50726d64e2d923054d80fb81634525c3aaf9fc70a9c8f82dc2e64e407dbebf9", 0xc2, 0x1d}, {&(0x7f0000000500)="a80446c84a52dbc90bec7f476e834bf627b4277d7ca263801ed1a2bfc29991cd9518199191e0615c3122172090d765f64a7d3ff213b5b87e0e02337e27d096249bd3c8eba9f4bacbb195b63edf13cd04c68dd2a3a50f60432f98458070150fb9431087f0413707a2981a02f64ba91f61498b140397c094b38c1b58951c10918368090430015418a681641a58584f6978b9e28a6fe8c8acace78ed6ecf5791b72f26c9266d51df279db422b12cdf89d356c83687eeb8cbb497195b8455bc5e3a975b83e3795feaaab4b1b61d4ccabb08383942ca00103a7713849ef727bc0777f33", 0xe1, 0x80}], 0x809, &(0x7f0000000680)={[{@session={'session', 0x3d, [0x31, 0x0, 0x3d, 0x33, 0x34, 0x37, 0x3f, 0x0, 0x2d]}, 0x2c}, {@barrier='barrier', 0x2c}, {@umask={'umask', 0x3d, [0x31, 0x33, 0x30]}, 0x2c}, {@part={'part', 0x3d, [0x37]}, 0x2c}, {@umask={'umask', 0x3d, [0x33, 0x34, 0x35, 0x34, 0x35, 0x33]}, 0x2c}, {@creator={'creator', 0x3d, "ac3119d4"}, 0x2c}]}) sendmsg$key(r0, &(0x7f0000000780)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000040)=ANY=[@ANYPTR=&(0x7f0000000700)=ANY=[@ANYRES64, @ANYPTR, @ANYBLOB="ae21e48d7a4fea84c7f3cb11d8b77b6ba902af929c2c067b3dff64948ecbb1b7176e70a4348a6e74e70b0ee009de3524f52fd3e296a0e0f33e1868a3743949eab9199dbc193abb13bb071559642d28b3e65a4e3d", @ANYRES16=r0]], 0x32d}, 0x1}, 0x0) 2018/04/11 12:44:59 executing program 4: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000200)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc-cast5-avx\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f00003bcfd0)="d3ab27191a", 0x5) sendmmsg$alg(r1, &(0x7f0000007e40)=[{0x0, 0x0, &(0x7f0000000900)}], 0x1, 0x0) accept(r0, &(0x7f0000000040)=@pppol2tpv3in6, &(0x7f00000000c0)=0x80) 2018/04/11 12:44:59 executing program 1: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x1e, 0x1, 0x0) setsockopt$packet_tx_ring(r0, 0x10f, 0x87, &(0x7f0000b89fe4)=@req={0x772}, 0x10) sendmsg(r0, &(0x7f0000030000)={&(0x7f00004f5000)=@generic={0x10000000001e, "0014000900000000000000000226cc573c080000003724c71e14dd6a739effea1b48006be61ffe0000e103000000f8000004003f010039d8f986ff01000300000004af50d50700000000000000e3ad316a1983000000001d00e0dfcb24281e27800000100076c3979ac40000bd15020078a1dfd300881a8365b1b16d7436"}, 0x80, &(0x7f0000447ff0), 0x0, &(0x7f00006e9c68)}, 0x0) 2018/04/11 12:44:59 executing program 7: syz_emit_ethernet(0x66, &(0x7f0000000000)={@random="cd3997030f00", @empty=[0x0, 0x0, 0x0, 0x86ddffff00000000], [], {@ipv6={0x86dd, {0x0, 0x6, "b40900", 0x30, 0x67, 0x0, @ipv4={[], [0xff, 0xff], @multicast2=0xe0000002}, @mcast2={0xff, 0x2, [], 0x1}, {[], @icmpv6=@time_exceed={0x21, 0x0, 0x0, 0x0, [], {0x0, 0x6, "b680fa", 0x0, 0x0, 0x0, @ipv4={[], [0xff, 0xff], @broadcast=0xffffffff}, @ipv4={[], [0xff, 0xff], @remote={0xac, 0x14, 0xffffffffffffffff, 0xbb}}}}}}}}}, 0x0) 2018/04/11 12:44:59 executing program 1: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x1e, 0x1, 0x0) setsockopt$packet_tx_ring(r0, 0x10f, 0x87, &(0x7f0000b89fe4)=@req={0x772}, 0x10) sendmsg(r0, &(0x7f0000030000)={&(0x7f00004f5000)=@generic={0x10000000001e, "0014000900000000000000000226cc573c080000003724c71e14dd6a739effea1b48006be61ffe0000e103000000f8000004003f010039d8f986ff01000300000004af50d50700000000000000e3ad316a1983000000001d00e0dfcb24281e27800000100076c3979ac40000bd15020078a1dfd300881a8365b1b16d7436"}, 0x80, &(0x7f0000447ff0), 0x0, &(0x7f00006e9c68)}, 0x0) 2018/04/11 12:44:59 executing program 4: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000200)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc-cast5-avx\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f00003bcfd0)="d3ab27191a", 0x5) sendmmsg$alg(r1, &(0x7f0000007e40)=[{0x0, 0x0, &(0x7f0000000900)}], 0x1, 0x0) accept(r0, &(0x7f0000000040)=@pppol2tpv3in6, &(0x7f00000000c0)=0x80) 2018/04/11 12:44:59 executing program 2: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x1e, 0x1, 0x0) setsockopt$packet_tx_ring(r0, 0x10f, 0x87, &(0x7f0000b89fe4)=@req={0x772}, 0x10) sendmsg(r0, &(0x7f0000030000)={&(0x7f00004f5000)=@generic={0x10000000001e, "0100000900000002000000000226cc573c080000003724c71e14dd6a739effea1b48006be61ffe0000e103000000f8000004003f010039d8f986ff01000300000004af50d50700000000000000e3ad316a1983000000001d00e0dfcb24281e27800000100076c3979ac40000bd15020078a1dfd300881a8365b1b16d7436"}, 0x80, &(0x7f0000447ff0), 0x0, &(0x7f00006e9c68)}, 0x0) [ 597.701172] hfsplus: invalid session number or type of track [ 597.707095] hfsplus: unable to find HFS+ superblock 2018/04/11 12:44:59 executing program 0: r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$alg(0x26, 0x5, 0x0) io_setup(0x2, &(0x7f0000000040)=0x0) io_destroy(r2) bind$alg(r1, &(0x7f0000000200)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc-cast5-avx\x00'}, 0x58) r3 = accept$alg(r1, 0x0, 0x0) dup3(r0, r3, 0x0) 2018/04/11 12:44:59 executing program 6: r0 = socket$inet6(0xa, 0x80003, 0xff) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @ipv4={[], [0xff, 0xff], @dev={0xac, 0x14, 0x14, 0x1b}}}, 0x1c) sendmsg(r0, &(0x7f000001b000)={0x0, 0xfffffff5, &(0x7f0000019fa0), 0x1be, &(0x7f000001ef08)}, 0x0) 2018/04/11 12:44:59 executing program 7: syz_emit_ethernet(0x66, &(0x7f0000000000)={@random="cd3997030f00", @empty=[0x0, 0x0, 0x0, 0x100000000000000], [], {@ipv6={0x86dd, {0x0, 0x6, "b40900", 0x30, 0x67, 0x0, @ipv4={[], [0xff, 0xff], @multicast2=0xe0000002}, @mcast2={0xff, 0x2, [], 0x1}, {[], @icmpv6=@time_exceed={0x21, 0x0, 0x0, 0x0, [], {0x0, 0x6, "b680fa", 0x0, 0x0, 0x0, @ipv4={[], [0xff, 0xff], @broadcast=0xffffffff}, @ipv4={[], [0xff, 0xff], @remote={0xac, 0x14, 0xffffffffffffffff, 0xbb}}}}}}}}}, 0x0) 2018/04/11 12:44:59 executing program 2: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x1e, 0x1, 0x0) setsockopt$packet_tx_ring(r0, 0x10f, 0x87, &(0x7f0000b89fe4)=@req={0x772}, 0x10) sendmsg(r0, &(0x7f0000030000)={&(0x7f00004f5000)=@generic={0x10000000001e, "0100000900000000020000000226cc573c080000003724c71e14dd6a739effea1b48006be61ffe0000e103000000f8000004003f010039d8f986ff01000300000004af50d50700000000000000e3ad316a1983000000001d00e0dfcb24281e27800000100076c3979ac40000bd15020078a1dfd300881a8365b1b16d7436"}, 0x80, &(0x7f0000447ff0), 0x0, &(0x7f00006e9c68)}, 0x0) [ 597.774272] hfsplus: invalid session number or type of track [ 597.780204] hfsplus: unable to find HFS+ superblock 2018/04/11 12:45:00 executing program 3: semop(0x0, &(0x7f000001a000)=[{0x3f000000, 0xffffffffffff0001}, {}], 0x2) timer_create(0x0, &(0x7f0000cd0000)={0x0, 0x12}, &(0x7f0000044000)) timer_settime(0x0, 0x0, &(0x7f00004b1fe0)={{0x0, 0x1c9c380}, {0x0, 0x9}}, &(0x7f0000040000)) r0 = getpgid(0x0) tkill(r0, 0x1000000000016) 2018/04/11 12:45:00 executing program 4: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000200)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc-cast5-avx\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00003bcfd0), 0x0) sendmmsg$alg(r1, &(0x7f0000007e40)=[{0x0, 0x0, &(0x7f0000000900)}], 0x1, 0x0) accept(r0, &(0x7f0000000040)=@pppol2tpv3in6, &(0x7f00000000c0)=0x80) 2018/04/11 12:45:00 executing program 1: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x1e, 0x1, 0x0) sendmsg(r0, &(0x7f0000030000)={&(0x7f00004f5000)=@generic={0x10000000001e, "0014000900000000000000000226cc573c080000003724c71e14dd6a739effea1b48006be61ffe0000e103000000f8000004003f010039d8f986ff01000300000004af50d50700000000000000e3ad316a1983000000001d00e0dfcb24281e27800000100076c3979ac40000bd15020078a1dfd300881a8365b1b16d7436"}, 0x80, &(0x7f0000447ff0), 0x0, &(0x7f00006e9c68)}, 0x0) 2018/04/11 12:45:00 executing program 7: syz_emit_ethernet(0x66, &(0x7f0000000000)={@random="cd3997030f00", @empty=[0x0, 0x0, 0x0, 0x800000000000000], [], {@ipv6={0x86dd, {0x0, 0x6, "b40900", 0x30, 0x67, 0x0, @ipv4={[], [0xff, 0xff], @multicast2=0xe0000002}, @mcast2={0xff, 0x2, [], 0x1}, {[], @icmpv6=@time_exceed={0x21, 0x0, 0x0, 0x0, [], {0x0, 0x6, "b680fa", 0x0, 0x0, 0x0, @ipv4={[], [0xff, 0xff], @broadcast=0xffffffff}, @ipv4={[], [0xff, 0xff], @remote={0xac, 0x14, 0xffffffffffffffff, 0xbb}}}}}}}}}, 0x0) 2018/04/11 12:45:00 executing program 6: r0 = socket$inet6(0xa, 0x80003, 0xff) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @ipv4={[], [0xff, 0xff], @dev={0xac, 0x14, 0x14, 0x1b}}}, 0x1c) sendmsg(r0, &(0x7f000001b000)={0x0, 0xfffffff5, &(0x7f0000019fa0), 0x127, &(0x7f000001ef08)}, 0x0) 2018/04/11 12:45:00 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000000), 0x21d) sendmsg$key(r0, &(0x7f0000000b00)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)={0x2, 0xa, 0x0, 0x0, 0x20000113, 0x0, 0x0, 0x0, [@sadb_x_nat_t_type={0x0, 0x14, 0x92b}, @sadb_address={0x0, 0x6, 0x33, 0xa0, 0x0, @in6={0xa, 0x4e24, 0x40, @remote={0xfe, 0x80, [], 0xbb}, 0x8}}, @sadb_x_sa2={0x0, 0x13, 0x0, 0x0, 0x0, 0x70bd2d, 0x3500}]}, 0x10}, 0x1}, 0x0) sendmsg$key(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000040)={0x2, 0x12, 0x0, 0x0, 0x2}, 0x10}, 0x1}, 0x0) 2018/04/11 12:45:00 executing program 0: r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$sndmidi(&(0x7f0000000080)='/dev/snd/midiC#D#\x00', 0x7, 0x101200) ioctl$VHOST_SET_VRING_NUM(r1, 0x4008af10, &(0x7f00000000c0)={0x3, 0x6}) times(&(0x7f0000000040)) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000200)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc-cast5-avx\x00'}, 0x58) r3 = accept$alg(r2, 0x0, 0x0) dup3(r0, r3, 0x0) 2018/04/11 12:45:00 executing program 2: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x1e, 0x1, 0x0) setsockopt$packet_tx_ring(r0, 0x10f, 0x87, &(0x7f0000b89fe4)=@req={0x772}, 0x10) sendmsg(r0, &(0x7f0000030000)={&(0x7f00004f5000)=@generic={0x10000000001e, "0100000900000004000000000226cc573c080000003724c71e14dd6a739effea1b48006be61ffe0000e103000000f8000004003f010039d8f986ff01000300000004af50d50700000000000000e3ad316a1983000000001d00e0dfcb24281e27800000100076c3979ac40000bd15020078a1dfd300881a8365b1b16d7436"}, 0x80, &(0x7f0000447ff0), 0x0, &(0x7f00006e9c68)}, 0x0) 2018/04/11 12:45:00 executing program 7: syz_emit_ethernet(0x66, &(0x7f0000000000)={@random="cd3997030f00", @empty=[0x0, 0x0, 0x0, 0x81000000], [], {@ipv6={0x86dd, {0x0, 0x6, "b40900", 0x30, 0x67, 0x0, @ipv4={[], [0xff, 0xff], @multicast2=0xe0000002}, @mcast2={0xff, 0x2, [], 0x1}, {[], @icmpv6=@time_exceed={0x21, 0x0, 0x0, 0x0, [], {0x0, 0x6, "b680fa", 0x0, 0x0, 0x0, @ipv4={[], [0xff, 0xff], @broadcast=0xffffffff}, @ipv4={[], [0xff, 0xff], @remote={0xac, 0x14, 0xffffffffffffffff, 0xbb}}}}}}}}}, 0x0) 2018/04/11 12:45:00 executing program 6: r0 = socket$inet6(0xa, 0x80003, 0xff) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @ipv4={[], [0xff, 0xff], @dev={0xac, 0x14, 0x14, 0x1b}}}, 0x1c) sendmsg(r0, &(0x7f000001b000)={0x0, 0xfffffff5, &(0x7f0000019fa0), 0x149, &(0x7f000001ef08)}, 0x0) 2018/04/11 12:45:00 executing program 1: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x1e, 0x1, 0x0) sendmsg(r0, &(0x7f0000030000)={&(0x7f00004f5000)=@generic={0x10000000001e, "0014000900000000000000000226cc573c080000003724c71e14dd6a739effea1b48006be61ffe0000e103000000f8000004003f010039d8f986ff01000300000004af50d50700000000000000e3ad316a1983000000001d00e0dfcb24281e27800000100076c3979ac40000bd15020078a1dfd300881a8365b1b16d7436"}, 0x80, &(0x7f0000447ff0), 0x0, &(0x7f00006e9c68)}, 0x0) 2018/04/11 12:45:00 executing program 0: r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$alg(0x26, 0x5, 0x0) mknod(&(0x7f0000000180)='./file0\x00', 0x3004, 0x2) r2 = syz_open_dev$adsp(&(0x7f0000000200)='/dev/adsp#\x00', 0x20000000000002, 0x14405) ioctl$PPPIOCSFLAGS(r2, 0x40047459, &(0x7f0000000100)=0x400) getsockopt$inet_sctp_SCTP_I_WANT_MAPPED_V4_ADDR(r2, 0x84, 0xc, &(0x7f0000000080), &(0x7f00000000c0)=0x4) r3 = accept$alg(r1, 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f0000000140)='lo\x00') dup3(r0, r3, 0x0) 2018/04/11 12:45:00 executing program 4: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000200)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc-cast5-avx\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00003bcfd0), 0x0) sendmmsg$alg(r1, &(0x7f0000007e40)=[{0x0, 0x0, &(0x7f0000000900)}], 0x1, 0x0) accept(r0, &(0x7f0000000040)=@pppol2tpv3in6, &(0x7f00000000c0)=0x80) 2018/04/11 12:45:00 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000000), 0x216) sendmsg$key(r0, &(0x7f0000000b00)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000001000)={0x2, 0xa, 0x0, 0x0, 0x2}, 0x10}, 0x1}, 0x0) r1 = syz_open_dev$sndctrl(&(0x7f0000000080)='/dev/snd/controlC#\x00', 0x3, 0x80000) ioctl$SNDRV_CTL_IOCTL_SUBSCRIBE_EVENTS(r1, 0xc0045516, &(0x7f00000000c0)=0xec04) sendmsg$key(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000040)={0x2, 0x12, 0x0, 0x0, 0x2}, 0x10}, 0x1}, 0x0) 2018/04/11 12:45:00 executing program 2: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x1e, 0x1, 0x0) setsockopt$packet_tx_ring(r0, 0x10f, 0x87, &(0x7f0000b89fe4)=@req={0x772}, 0x10) sendmsg(r0, &(0x7f0000030000)={&(0x7f00004f5000)=@generic={0x10000000001e, "0100000900000101d00000000226cc573c080000003724c71e14dd6a739effea1b48006be61ffe0000e103000000f8000004003f010039d8f986ff01000300000004af50d50700000000000000e3ad316a1983000000001d00e0dfcb24281e27800000100076c3979ac40000bd15020078a1dfd300881a8365b1b16d7436"}, 0x80, &(0x7f0000447ff0), 0x0, &(0x7f00006e9c68)}, 0x0) 2018/04/11 12:45:00 executing program 7: syz_emit_ethernet(0x66, &(0x7f0000000000)={@random="cd3997030f00", @empty=[0x0, 0x0, 0x0, 0x4305], [], {@ipv6={0x86dd, {0x0, 0x6, "b40900", 0x30, 0x67, 0x0, @ipv4={[], [0xff, 0xff], @multicast2=0xe0000002}, @mcast2={0xff, 0x2, [], 0x1}, {[], @icmpv6=@time_exceed={0x21, 0x0, 0x0, 0x0, [], {0x0, 0x6, "b680fa", 0x0, 0x0, 0x0, @ipv4={[], [0xff, 0xff], @broadcast=0xffffffff}, @ipv4={[], [0xff, 0xff], @remote={0xac, 0x14, 0xffffffffffffffff, 0xbb}}}}}}}}}, 0x0) 2018/04/11 12:45:01 executing program 3: semop(0x0, &(0x7f000001a000)=[{0x0, 0xffffffffffff0002}, {}], 0x2) timer_create(0x0, &(0x7f0000cd0000)={0x0, 0x12}, &(0x7f0000044000)) timer_settime(0x0, 0x0, &(0x7f00004b1fe0)={{0x0, 0x1c9c380}, {0x0, 0x9}}, &(0x7f0000040000)) r0 = getpgid(0x0) tkill(r0, 0x1000000000016) 2018/04/11 12:45:01 executing program 6: r0 = socket$inet6(0xa, 0x80003, 0xff) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @ipv4={[], [0xff, 0xff], @dev={0xac, 0x14, 0x14, 0x1b}}}, 0x1c) sendmsg(r0, &(0x7f000001b000)={0x0, 0xfffffff5, &(0x7f0000019fa0), 0xb1, &(0x7f000001ef08)}, 0x0) 2018/04/11 12:45:01 executing program 1: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x1e, 0x1, 0x0) sendmsg(r0, &(0x7f0000030000)={&(0x7f00004f5000)=@generic={0x10000000001e, "0014000900000000000000000226cc573c080000003724c71e14dd6a739effea1b48006be61ffe0000e103000000f8000004003f010039d8f986ff01000300000004af50d50700000000000000e3ad316a1983000000001d00e0dfcb24281e27800000100076c3979ac40000bd15020078a1dfd300881a8365b1b16d7436"}, 0x80, &(0x7f0000447ff0), 0x0, &(0x7f00006e9c68)}, 0x0) 2018/04/11 12:45:01 executing program 7: syz_emit_ethernet(0x66, &(0x7f0000000000)={@random="cd3997030f00", @empty=[0x0, 0x0, 0x0, 0x4788], [], {@ipv6={0x86dd, {0x0, 0x6, "b40900", 0x30, 0x67, 0x0, @ipv4={[], [0xff, 0xff], @multicast2=0xe0000002}, @mcast2={0xff, 0x2, [], 0x1}, {[], @icmpv6=@time_exceed={0x21, 0x0, 0x0, 0x0, [], {0x0, 0x6, "b680fa", 0x0, 0x0, 0x0, @ipv4={[], [0xff, 0xff], @broadcast=0xffffffff}, @ipv4={[], [0xff, 0xff], @remote={0xac, 0x14, 0xffffffffffffffff, 0xbb}}}}}}}}}, 0x0) 2018/04/11 12:45:01 executing program 5: r0 = dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$SNDRV_TIMER_IOCTL_CONTINUE(r0, 0x54a2) r1 = socket$key(0xf, 0x3, 0x2) setsockopt$sock_int(r1, 0x1, 0x8, &(0x7f0000000080), 0x4) sendmsg$key(r1, &(0x7f0000000b00)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000001000)={0x2, 0xa, 0x0, 0x0, 0x2}, 0x10}, 0x1}, 0x0) sendmsg$key(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000040)={0x2, 0x12, 0x0, 0x0, 0x2}, 0x10}, 0x1}, 0x0) 2018/04/11 12:45:01 executing program 0: r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$alg(0x26, 0x5, 0x0) r2 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000700)='/dev/vga_arbiter\x00', 0x20601, 0x0) getsockopt$inet_sctp6_SCTP_PR_SUPPORTED(0xffffffffffffff9c, 0x84, 0x71, &(0x7f0000000740)={0x0, 0x80000000}, &(0x7f0000000780)=0x8) setsockopt$inet_sctp_SCTP_RESET_STREAMS(r2, 0x84, 0x77, &(0x7f00000007c0)={r3, 0x2, 0x7, [0x2, 0x3ff, 0xfa33, 0x8, 0x8, 0x0, 0x0]}, 0x16) r4 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ppp\x00', 0x101002, 0x0) getsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(0xffffffffffffffff, 0x84, 0x9, &(0x7f00000002c0)={0x0, @in6={{0xa, 0x4e21, 0x7ff, @dev={0xfe, 0x80, [], 0x10}, 0x4}}, 0x6ae, 0x0, 0x401, 0x9a9}, &(0x7f0000000380)=0x98) setsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER(r4, 0x84, 0x7b, &(0x7f00000003c0)={r5, 0x5}, 0x8) bind$alg(r1, &(0x7f0000000200)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc-cast5-avx\x00'}, 0x58) r6 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000040)='/dev/mixer\x00', 0x80000, 0x0) ioctl$PPPOEIOCSFWD(r6, 0x4008b100, &(0x7f00000006c0)={0x18, 0x0, {0x0, @dev={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0x1b}, 'ip6gre0\x00'}}) ioctl$SNDRV_TIMER_IOCTL_GPARAMS(r6, 0x40485404, &(0x7f0000000400)={{0x3, 0x0, 0xb998, 0x2}, 0x0, 0x7fffffff}) getsockopt$inet_sctp_SCTP_RTOINFO(0xffffffffffffff9c, 0x84, 0x0, &(0x7f0000000080)={0x0, 0xfffffffffffeffff, 0x100, 0x1a}, &(0x7f00000000c0)=0x10) getsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER(r6, 0x84, 0x7b, &(0x7f0000000100)={r7}, &(0x7f0000000140)=0x8) name_to_handle_at(r6, &(0x7f0000000280)='./file0\x00', &(0x7f0000000540)={0x63, 0x7, "9a0b1a794206e0baf90160c9ff981e5b160cfa064906e29ae3d975c69949d9eadf1ad461264ff2bab7499ba0eff93675f5901b0457dcbe03e51ef48326bd9dd3f23589d59ee9cd46e2178be045757d7ab13631a2b5117bf72c0c65"}, &(0x7f00000005c0), 0x1000) r8 = accept$alg(r1, 0x0, 0x0) r9 = semget(0x1, 0x1, 0x29) semctl$SEM_STAT(r9, 0x5, 0x12, &(0x7f0000000600)=""/130) getsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r4, 0x84, 0x9, &(0x7f0000000480)={r5, @in={{0x2, 0x4e22}}, 0x1, 0x2000, 0x9, 0x8}, &(0x7f00000001c0)=0x98) dup3(r0, r8, 0x0) 2018/04/11 12:45:01 executing program 2: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x1e, 0x1, 0x0) setsockopt$packet_tx_ring(r0, 0x10f, 0x87, &(0x7f0000b89fe4)=@req={0x772}, 0x10) sendmsg(r0, &(0x7f0000030000)={&(0x7f00004f5000)=@generic={0x10000000001e, "0100000900040000000000000226cc573c080000003724c71e14dd6a739effea1b48006be61ffe0000e103000000f8000004003f010039d8f986ff01000300000004af50d50700000000000000e3ad316a1983000000001d00e0dfcb24281e27800000100076c3979ac40000bd15020078a1dfd300881a8365b1b16d7436"}, 0x80, &(0x7f0000447ff0), 0x0, &(0x7f00006e9c68)}, 0x0) 2018/04/11 12:45:01 executing program 4: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000200)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc-cast5-avx\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00003bcfd0), 0x0) sendmmsg$alg(r1, &(0x7f0000007e40)=[{0x0, 0x0, &(0x7f0000000900)}], 0x1, 0x0) accept(r0, &(0x7f0000000040)=@pppol2tpv3in6, &(0x7f00000000c0)=0x80) 2018/04/11 12:45:01 executing program 4: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000200)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc-cast5-avx\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00003bcfd0)="d3ab27", 0x3) sendmmsg$alg(r1, &(0x7f0000007e40)=[{0x0, 0x0, &(0x7f0000000900)}], 0x1, 0x0) accept(r0, &(0x7f0000000040)=@pppol2tpv3in6, &(0x7f00000000c0)=0x80) 2018/04/11 12:45:01 executing program 6: r0 = socket$inet6(0xa, 0x80003, 0xff) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @ipv4={[], [0xff, 0xff], @dev={0xac, 0x14, 0x14, 0x1b}}}, 0x1c) sendmsg(r0, &(0x7f000001b000)={0x0, 0xfffffff5, &(0x7f0000019fa0), 0x1db, &(0x7f000001ef08)}, 0x0) 2018/04/11 12:45:01 executing program 1: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$packet_tx_ring(0xffffffffffffffff, 0x10f, 0x87, &(0x7f0000b89fe4)=@req={0x772}, 0x10) sendmsg(0xffffffffffffffff, &(0x7f0000030000)={&(0x7f00004f5000)=@generic={0x10000000001e, "0014000900000000000000000226cc573c080000003724c71e14dd6a739effea1b48006be61ffe0000e103000000f8000004003f010039d8f986ff01000300000004af50d50700000000000000e3ad316a1983000000001d00e0dfcb24281e27800000100076c3979ac40000bd15020078a1dfd300881a8365b1b16d7436"}, 0x80, &(0x7f0000447ff0), 0x0, &(0x7f00006e9c68)}, 0x0) 2018/04/11 12:45:01 executing program 7: syz_emit_ethernet(0x66, &(0x7f0000000000)={@random="cd3997030f00", @empty=[0x0, 0x0, 0x0, 0x300000000000000], [], {@ipv6={0x86dd, {0x0, 0x6, "b40900", 0x30, 0x67, 0x0, @ipv4={[], [0xff, 0xff], @multicast2=0xe0000002}, @mcast2={0xff, 0x2, [], 0x1}, {[], @icmpv6=@time_exceed={0x21, 0x0, 0x0, 0x0, [], {0x0, 0x6, "b680fa", 0x0, 0x0, 0x0, @ipv4={[], [0xff, 0xff], @broadcast=0xffffffff}, @ipv4={[], [0xff, 0xff], @remote={0xac, 0x14, 0xffffffffffffffff, 0xbb}}}}}}}}}, 0x0) 2018/04/11 12:45:01 executing program 4: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000200)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc-cast5-avx\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00003bcfd0)="d3ab27", 0x3) sendmmsg$alg(r1, &(0x7f0000007e40)=[{0x0, 0x0, &(0x7f0000000900)}], 0x1, 0x0) accept(r0, &(0x7f0000000040)=@pppol2tpv3in6, &(0x7f00000000c0)=0x80) 2018/04/11 12:45:01 executing program 0: r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$mouse(&(0x7f0000000040)='/dev/input/mouse#\x00', 0x39, 0x4000) bind$alg(r1, &(0x7f0000000080)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw-camellia-asm\x00'}, 0x58) ioctl$TIOCLINUX4(r1, 0x541c, &(0x7f0000000100)=0x4) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000200)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc-cast5-avx\x00'}, 0x58) r3 = accept$alg(r2, 0x0, 0x0) dup3(r0, r3, 0x0) 2018/04/11 12:45:01 executing program 2: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x1e, 0x1, 0x0) setsockopt$packet_tx_ring(r0, 0x10f, 0x87, &(0x7f0000b89fe4)=@req={0x772}, 0x10) sendmsg(r0, &(0x7f0000030000)={&(0x7f00004f5000)=@generic={0x10000000001e, "0100000900000000000000000126cc573c080000003724c71e14dd6a739effea1b48006be61ffe0000e103000000f8000004003f010039d8f986ff01000300000004af50d50700000000000000e3ad316a1983000000001d00e0dfcb24281e27800000100076c3979ac40000bd15020078a1dfd300881a8365b1b16d7436"}, 0x80, &(0x7f0000447ff0), 0x0, &(0x7f00006e9c68)}, 0x0) 2018/04/11 12:45:01 executing program 6: r0 = socket$inet6(0xa, 0x80003, 0xff) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @ipv4={[], [0xff, 0xff], @dev={0xac, 0x14, 0x14, 0x1b}}}, 0x1c) sendmsg(r0, &(0x7f000001b000)={0x0, 0xfffffff5, &(0x7f0000019fa0), 0xea, &(0x7f000001ef08)}, 0x0) 2018/04/11 12:45:02 executing program 3: semop(0x0, &(0x7f000001a000)=[{0x0, 0xffffffffffff0005}, {}], 0x2) timer_create(0x0, &(0x7f0000cd0000)={0x0, 0x12}, &(0x7f0000044000)) timer_settime(0x0, 0x0, &(0x7f00004b1fe0)={{0x0, 0x1c9c380}, {0x0, 0x9}}, &(0x7f0000040000)) r0 = getpgid(0x0) tkill(r0, 0x1000000000016) 2018/04/11 12:45:02 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000000), 0x216) read(r0, &(0x7f00000001c0)=""/252, 0xfc) sendmsg$key(r0, &(0x7f0000000b00)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000001000)={0x2, 0xa, 0x0, 0x0, 0x2}, 0x10}, 0x1}, 0x0) sendmsg$key(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000040)={0x2, 0x12, 0x0, 0x0, 0x2}, 0x10}, 0x1}, 0x0) 2018/04/11 12:45:02 executing program 4: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000200)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc-cast5-avx\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00003bcfd0)="d3ab27", 0x3) sendmmsg$alg(r1, &(0x7f0000007e40)=[{0x0, 0x0, &(0x7f0000000900)}], 0x1, 0x0) accept(r0, &(0x7f0000000040)=@pppol2tpv3in6, &(0x7f00000000c0)=0x80) 2018/04/11 12:45:02 executing program 6: r0 = socket$inet6(0xa, 0x80003, 0xff) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @ipv4={[], [0xff, 0xff], @dev={0xac, 0x14, 0x14, 0x1b}}}, 0x1c) sendmsg(r0, &(0x7f000001b000)={0x0, 0xfffffff5, &(0x7f0000019fa0), 0x12e, &(0x7f000001ef08)}, 0x0) 2018/04/11 12:45:02 executing program 1: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$packet_tx_ring(0xffffffffffffffff, 0x10f, 0x87, &(0x7f0000b89fe4)=@req={0x772}, 0x10) sendmsg(0xffffffffffffffff, &(0x7f0000030000)={&(0x7f00004f5000)=@generic={0x10000000001e, "0014000900000000000000000226cc573c080000003724c71e14dd6a739effea1b48006be61ffe0000e103000000f8000004003f010039d8f986ff01000300000004af50d50700000000000000e3ad316a1983000000001d00e0dfcb24281e27800000100076c3979ac40000bd15020078a1dfd300881a8365b1b16d7436"}, 0x80, &(0x7f0000447ff0), 0x0, &(0x7f00006e9c68)}, 0x0) 2018/04/11 12:45:02 executing program 7: syz_emit_ethernet(0x66, &(0x7f0000000000)={@random="cd3997030f00", @empty=[0x0, 0x0, 0x0, 0x8848000000000000], [], {@ipv6={0x86dd, {0x0, 0x6, "b40900", 0x30, 0x67, 0x0, @ipv4={[], [0xff, 0xff], @multicast2=0xe0000002}, @mcast2={0xff, 0x2, [], 0x1}, {[], @icmpv6=@time_exceed={0x21, 0x0, 0x0, 0x0, [], {0x0, 0x6, "b680fa", 0x0, 0x0, 0x0, @ipv4={[], [0xff, 0xff], @broadcast=0xffffffff}, @ipv4={[], [0xff, 0xff], @remote={0xac, 0x14, 0xffffffffffffffff, 0xbb}}}}}}}}}, 0x0) 2018/04/11 12:45:02 executing program 0: r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$alg(0x26, 0x5, 0x0) r2 = syz_open_dev$dmmidi(&(0x7f0000000040)='/dev/dmmidi#\x00', 0x1, 0x2) setsockopt$bt_BT_VOICE(r2, 0x112, 0xb, &(0x7f0000000080)=0x6afa, 0x2) r3 = accept$alg(r1, 0x0, 0x0) getsockopt$IP6T_SO_GET_REVISION_MATCH(r2, 0x29, 0x44, &(0x7f0000000180)={'HL\x00'}, &(0x7f00000001c0)=0x1e) getpeername$packet(r2, &(0x7f00000000c0)={0x0, 0x0, 0x0}, &(0x7f0000000100)=0x14) setsockopt$packet_buf(r2, 0x107, 0x7, &(0x7f0000000280)="ccdddde8425c74a63dda5c63c08cbe045cc7c90cc631da2ba00e9c3f6bdf44f3091a1373964178ad60281d0c540325ca3a1a1faf18925ba42b01cd51dfd5dae50923237bff675a6a1d98a833c92796062a67fb92a6d11be0c36184882d286de0dab15447032b22a5ad7a26f45ed4300f4af3ff8163a9e97881710eb97f9527bd9b44dddb24a56b590cc093b0dad73a197302491f6d4507f6ee57beb9e93c1800884bf34e4eb3117980c74bfa4a690ce509a03a51c102e636d974789c2327cbb81db9aa9341a962dfffc405aa1767bb66993c44ed01df", 0xd6) bind$can_raw(r2, &(0x7f0000000140)={0x1d, r4}, 0x10) dup3(r0, r3, 0x0) accept4$alg(r1, 0x0, 0x0, 0x80000) 2018/04/11 12:45:02 executing program 2: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x1e, 0x1, 0x0) setsockopt$packet_tx_ring(r0, 0x10f, 0x87, &(0x7f0000b89fe4)=@req={0x772}, 0x10) sendmsg(r0, &(0x7f0000030000)={&(0x7f00004f5000)=@generic={0x10000000001e, "0100000900020000000000000226cc573c080000003724c71e14dd6a739effea1b48006be61ffe0000e103000000f8000004003f010039d8f986ff01000300000004af50d50700000000000000e3ad316a1983000000001d00e0dfcb24281e27800000100076c3979ac40000bd15020078a1dfd300881a8365b1b16d7436"}, 0x80, &(0x7f0000447ff0), 0x0, &(0x7f00006e9c68)}, 0x0) 2018/04/11 12:45:02 executing program 2: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x1e, 0x1, 0x0) setsockopt$packet_tx_ring(r0, 0x10f, 0x87, &(0x7f0000b89fe4)=@req={0x772}, 0x10) sendmsg(r0, &(0x7f0000030000)={&(0x7f00004f5000)=@generic={0x10000000001e, "0100000900d00101000000000226cc573c080000003724c71e14dd6a739effea1b48006be61ffe0000e103000000f8000004003f010039d8f986ff01000300000004af50d50700000000000000e3ad316a1983000000001d00e0dfcb24281e27800000100076c3979ac40000bd15020078a1dfd300881a8365b1b16d7436"}, 0x80, &(0x7f0000447ff0), 0x0, &(0x7f00006e9c68)}, 0x0) 2018/04/11 12:45:02 executing program 1: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$packet_tx_ring(0xffffffffffffffff, 0x10f, 0x87, &(0x7f0000b89fe4)=@req={0x772}, 0x10) sendmsg(0xffffffffffffffff, &(0x7f0000030000)={&(0x7f00004f5000)=@generic={0x10000000001e, "0014000900000000000000000226cc573c080000003724c71e14dd6a739effea1b48006be61ffe0000e103000000f8000004003f010039d8f986ff01000300000004af50d50700000000000000e3ad316a1983000000001d00e0dfcb24281e27800000100076c3979ac40000bd15020078a1dfd300881a8365b1b16d7436"}, 0x80, &(0x7f0000447ff0), 0x0, &(0x7f00006e9c68)}, 0x0) 2018/04/11 12:45:02 executing program 6: r0 = socket$inet6(0xa, 0x80003, 0xff) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @ipv4={[], [0xff, 0xff], @dev={0xac, 0x14, 0x14, 0x1b}}}, 0x1c) sendmsg(r0, &(0x7f000001b000)={0x0, 0xfffffff5, &(0x7f0000019fa0), 0xfe, &(0x7f000001ef08)}, 0x0) 2018/04/11 12:45:02 executing program 7: syz_emit_ethernet(0x66, &(0x7f0000000000)={@random="cd3997030f00", @empty=[0x0, 0x0, 0x0, 0xb00], [], {@ipv6={0x86dd, {0x0, 0x6, "b40900", 0x30, 0x67, 0x0, @ipv4={[], [0xff, 0xff], @multicast2=0xe0000002}, @mcast2={0xff, 0x2, [], 0x1}, {[], @icmpv6=@time_exceed={0x21, 0x0, 0x0, 0x0, [], {0x0, 0x6, "b680fa", 0x0, 0x0, 0x0, @ipv4={[], [0xff, 0xff], @broadcast=0xffffffff}, @ipv4={[], [0xff, 0xff], @remote={0xac, 0x14, 0xffffffffffffffff, 0xbb}}}}}}}}}, 0x0) 2018/04/11 12:45:02 executing program 4: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000200)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc-cast5-avx\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00003bcfd0)="d3ab2719", 0x4) sendmmsg$alg(r1, &(0x7f0000007e40)=[{0x0, 0x0, &(0x7f0000000900)}], 0x1, 0x0) accept(r0, &(0x7f0000000040)=@pppol2tpv3in6, &(0x7f00000000c0)=0x80) 2018/04/11 12:45:02 executing program 0: r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$alg(0x26, 0x5, 0x0) fcntl$getownex(r0, 0x10, &(0x7f0000000040)={0x0, 0x0}) r3 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000300)='/dev/cuse\x00', 0x80, 0x0) ioctl$TCFLSH(r3, 0x540b, 0x8) ptrace$setregset(0x4205, r2, 0x207, &(0x7f0000000140)={&(0x7f0000000080)="d0c3fcdcc682324410cc92ed962aa8d2a3a9e198a7764fa91abfd2710d95566f004720d9c24565f4bc7df6afa74b763e609e83ed41d759e29553cea762bd9acb50117ea9216b13ebc9497f3c4b1b17a6cfc72238f3f13e378cd291b61a0566dd1155f20297394bc60544a19e861e4d0c1772a35f4a7c222f97b0fdfa2d94dbdaf77651e27af6470d145611f040df81907042c84c", 0x94}) mount(&(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)='./file0\x00', &(0x7f0000000280)='cgroup2\x00', 0x1004, &(0x7f00000002c0)="911311fb160ed6cc2a65e93b7e2d8acdc3bf052a17db736724d4105253dbe9219cc017c27c56dd9ae29a6f632cfd71c2349838feee44895be0a3") bind$alg(r1, &(0x7f0000000200)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc-cast5-avx\x00'}, 0x58) accept$alg(r1, 0x0, 0x0) dup3(r0, r0, 0x4) 2018/04/11 12:45:02 executing program 7: syz_emit_ethernet(0x66, &(0x7f0000000000)={@random="cd3997030f00", @empty=[0x0, 0x0, 0x0, 0xffffca88], [], {@ipv6={0x86dd, {0x0, 0x6, "b40900", 0x30, 0x67, 0x0, @ipv4={[], [0xff, 0xff], @multicast2=0xe0000002}, @mcast2={0xff, 0x2, [], 0x1}, {[], @icmpv6=@time_exceed={0x21, 0x0, 0x0, 0x0, [], {0x0, 0x6, "b680fa", 0x0, 0x0, 0x0, @ipv4={[], [0xff, 0xff], @broadcast=0xffffffff}, @ipv4={[], [0xff, 0xff], @remote={0xac, 0x14, 0xffffffffffffffff, 0xbb}}}}}}}}}, 0x0) 2018/04/11 12:45:02 executing program 2: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x1e, 0x1, 0x0) setsockopt$packet_tx_ring(r0, 0x10f, 0x87, &(0x7f0000b89fe4)=@req={0x772}, 0x10) sendmsg(r0, &(0x7f0000030000)={&(0x7f00004f5000)=@generic={0x10000000001e, "01000009007fffffff0000000226cc573c080000003724c71e14dd6a739effea1b48006be61ffe0000e103000000f8000004003f010039d8f986ff01000300000004af50d50700000000000000e3ad316a1983000000001d00e0dfcb24281e27800000100076c3979ac40000bd15020078a1dfd300881a8365b1b16d7436"}, 0x80, &(0x7f0000447ff0), 0x0, &(0x7f00006e9c68)}, 0x0) 2018/04/11 12:45:03 executing program 3: semop(0x0, &(0x7f000001a000)=[{0x0, 0xffffffffffff0001, 0x5000000}, {}], 0x2) timer_create(0x0, &(0x7f0000cd0000)={0x0, 0x12}, &(0x7f0000044000)) timer_settime(0x0, 0x0, &(0x7f00004b1fe0)={{0x0, 0x1c9c380}, {0x0, 0x9}}, &(0x7f0000040000)) r0 = getpgid(0x0) tkill(r0, 0x1000000000016) 2018/04/11 12:45:03 executing program 6: r0 = socket$inet6(0xa, 0x80003, 0xff) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @ipv4={[], [0xff, 0xff], @dev={0xac, 0x14, 0x14, 0x1b}}}, 0x1c) sendmsg(r0, &(0x7f000001b000)={0x0, 0xfffffff5, &(0x7f0000019fa0), 0xb7, &(0x7f000001ef08)}, 0x0) 2018/04/11 12:45:03 executing program 4: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000200)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc-cast5-avx\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00003bcfd0)="d3ab2719", 0x4) sendmmsg$alg(r1, &(0x7f0000007e40)=[{0x0, 0x0, &(0x7f0000000900)}], 0x1, 0x0) accept(r0, &(0x7f0000000040)=@pppol2tpv3in6, &(0x7f00000000c0)=0x80) 2018/04/11 12:45:03 executing program 1: r0 = socket(0x1e, 0x1, 0x0) setsockopt$packet_tx_ring(r0, 0x10f, 0x87, &(0x7f0000b89fe4)=@req={0x772}, 0x10) sendmsg(r0, &(0x7f0000030000)={&(0x7f00004f5000)=@generic={0x10000000001e, "0014000900000000000000000226cc573c080000003724c71e14dd6a739effea1b48006be61ffe0000e103000000f8000004003f010039d8f986ff01000300000004af50d50700000000000000e3ad316a1983000000001d00e0dfcb24281e27800000100076c3979ac40000bd15020078a1dfd300881a8365b1b16d7436"}, 0x80, &(0x7f0000447ff0), 0x0, &(0x7f00006e9c68)}, 0x0) 2018/04/11 12:45:03 executing program 0: r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0xffffffffffffffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000200)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc-cast5-avx\x00'}, 0x58) r2 = accept$alg(r1, 0x0, 0x0) dup3(r0, r2, 0x0) 2018/04/11 12:45:03 executing program 7: syz_emit_ethernet(0x66, &(0x7f0000000000)={@random="cd3997030f00", @empty=[0x0, 0x0, 0x0, 0xf5ffffff00000000], [], {@ipv6={0x86dd, {0x0, 0x6, "b40900", 0x30, 0x67, 0x0, @ipv4={[], [0xff, 0xff], @multicast2=0xe0000002}, @mcast2={0xff, 0x2, [], 0x1}, {[], @icmpv6=@time_exceed={0x21, 0x0, 0x0, 0x0, [], {0x0, 0x6, "b680fa", 0x0, 0x0, 0x0, @ipv4={[], [0xff, 0xff], @broadcast=0xffffffff}, @ipv4={[], [0xff, 0xff], @remote={0xac, 0x14, 0xffffffffffffffff, 0xbb}}}}}}}}}, 0x0) 2018/04/11 12:45:03 executing program 2: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x1e, 0x1, 0x0) setsockopt$packet_tx_ring(r0, 0x10f, 0x87, &(0x7f0000b89fe4)=@req={0x772}, 0x10) sendmsg(r0, &(0x7f0000030000)={&(0x7f00004f5000)=@generic={0x10000000001e, "010000090000d001010000000226cc573c080000003724c71e14dd6a739effea1b48006be61ffe0000e103000000f8000004003f010039d8f986ff01000300000004af50d50700000000000000e3ad316a1983000000001d00e0dfcb24281e27800000100076c3979ac40000bd15020078a1dfd300881a8365b1b16d7436"}, 0x80, &(0x7f0000447ff0), 0x0, &(0x7f00006e9c68)}, 0x0) 2018/04/11 12:45:03 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) setsockopt$sock_int(r0, 0x1, 0xf, &(0x7f00000000c0)=0x101, 0x4) sendmsg$key(r0, &(0x7f0000000b00)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000001000)={0x2, 0xa, 0x0, 0x0, 0x2}, 0x10}, 0x1}, 0x0) sendmsg$key(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000040)={0x2, 0x12, 0x0, 0x0, 0x2}, 0x10}, 0x1}, 0x0) 2018/04/11 12:45:03 executing program 2: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x1e, 0x1, 0x0) setsockopt$packet_tx_ring(r0, 0x10f, 0x87, &(0x7f0000b89fe4)=@req={0x772}, 0x10) sendmsg(r0, &(0x7f0000030000)={&(0x7f00004f5000)=@generic={0x10000000001e, "0100000900000000040000000226cc573c080000003724c71e14dd6a739effea1b48006be61ffe0000e103000000f8000004003f010039d8f986ff01000300000004af50d50700000000000000e3ad316a1983000000001d00e0dfcb24281e27800000100076c3979ac40000bd15020078a1dfd300881a8365b1b16d7436"}, 0x80, &(0x7f0000447ff0), 0x0, &(0x7f00006e9c68)}, 0x0) 2018/04/11 12:45:03 executing program 7: syz_emit_ethernet(0x66, &(0x7f0000000000)={@random="cd3997030f00", @empty=[0x0, 0x0, 0x0, 0xffffffff00000000], [], {@ipv6={0x86dd, {0x0, 0x6, "b40900", 0x30, 0x67, 0x0, @ipv4={[], [0xff, 0xff], @multicast2=0xe0000002}, @mcast2={0xff, 0x2, [], 0x1}, {[], @icmpv6=@time_exceed={0x21, 0x0, 0x0, 0x0, [], {0x0, 0x6, "b680fa", 0x0, 0x0, 0x0, @ipv4={[], [0xff, 0xff], @broadcast=0xffffffff}, @ipv4={[], [0xff, 0xff], @remote={0xac, 0x14, 0xffffffffffffffff, 0xbb}}}}}}}}}, 0x0) 2018/04/11 12:45:03 executing program 6: r0 = socket$inet6(0xa, 0x80003, 0xff) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @ipv4={[], [0xff, 0xff], @dev={0xac, 0x14, 0x14, 0x1b}}}, 0x1c) sendmsg(r0, &(0x7f000001b000)={0x0, 0xfffffff5, &(0x7f0000019fa0), 0x95, &(0x7f000001ef08)}, 0x0) 2018/04/11 12:45:03 executing program 1: r0 = socket(0x0, 0x1, 0x0) setsockopt$packet_tx_ring(r0, 0x10f, 0x87, &(0x7f0000b89fe4)=@req={0x772}, 0x10) sendmsg(r0, &(0x7f0000030000)={&(0x7f00004f5000)=@generic={0x10000000001e, "0014000900000000000000000226cc573c080000003724c71e14dd6a739effea1b48006be61ffe0000e103000000f8000004003f010039d8f986ff01000300000004af50d50700000000000000e3ad316a1983000000001d00e0dfcb24281e27800000100076c3979ac40000bd15020078a1dfd300881a8365b1b16d7436"}, 0x80, &(0x7f0000447ff0), 0x0, &(0x7f00006e9c68)}, 0x0) 2018/04/11 12:45:03 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000000), 0x216) r1 = syz_open_dev$midi(&(0x7f0000000080)='/dev/midi#\x00', 0x101, 0x25a013) getpeername$ipx(r1, &(0x7f00000000c0), &(0x7f0000000100)=0x10) sendmsg$key(r0, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000000440)={0x2, 0xa, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, [@sadb_spirange={0x0, 0x10, 0x4d2, 0x4d6}, @sadb_x_kmaddress={0x0, 0x19, 0x0, @in={0x2, 0x4e23, @multicast1=0xe0000001}, @in={0x2, 0x4e24, @multicast2=0xe0000002}}, @sadb_x_nat_t_port={0x0, 0x17, 0x4e21}]}, 0xfff0}, 0x1}, 0x0) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r1, 0x84, 0x1d, &(0x7f00000002c0)=ANY=[@ANYBLOB="048d77e566df000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0], &(0x7f0000000280)=0x14) sendmsg$key(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000040)=ANY=[@ANYBLOB="0212000002000000000000000000"], 0x10}, 0x1}, 0x0) r2 = socket$bt_hidp(0x1f, 0x3, 0x6) getsockopt$inet_sctp6_SCTP_LOCAL_AUTH_CHUNKS(r0, 0x84, 0x1b, &(0x7f00000004c0)={0x0, 0xde, "ccfb2d6aca2772e59a7fb855a1bddee2f8f4cafcfaea0283b1a30e093e9481cb214d73f0b888ea92875c5c327086e2d51d59be65a8c288f76a3185f698d9e7a17bdfc203f2f371252bda55270891ef76c8fafb418bec60d7168b9b6cc146bbbe8dbe7d34a49635a59e53cb909b73ac4d359fb114c67236a78086130243e24e35653dc0cf27413f138b77adb926d8a7c839462a39815634bcb09035e27359226242f1e7bb906ce3bb8b33d2cb7c228be3fdc29502ded00252beea51c4755c2e1b71c8eceb7ecad82b0d675b22e336a70d31fc537f1291d0f67bf88ee6dc36"}, &(0x7f0000000240)=0xe6) setsockopt$inet_sctp_SCTP_CONTEXT(r1, 0x84, 0x11, &(0x7f0000000300)={r3, 0x1}, 0x8) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f00000001c0), &(0x7f0000000200)=0xc) 2018/04/11 12:45:03 executing program 0: r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000200)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc-cast5-avx\x00'}, 0x58) r2 = accept$alg(r1, 0x0, 0x0) accept4$alg(r1, 0x0, 0x0, 0x800) dup3(r0, r2, 0x0) 2018/04/11 12:45:03 executing program 4: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000200)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc-cast5-avx\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00003bcfd0)="d3ab2719", 0x4) sendmmsg$alg(r1, &(0x7f0000007e40)=[{0x0, 0x0, &(0x7f0000000900)}], 0x1, 0x0) accept(r0, &(0x7f0000000040)=@pppol2tpv3in6, &(0x7f00000000c0)=0x80) 2018/04/11 12:45:03 executing program 2: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x1e, 0x1, 0x0) setsockopt$packet_tx_ring(r0, 0x10f, 0x87, &(0x7f0000b89fe4)=@req={0x772}, 0x10) sendmsg(r0, &(0x7f0000030000)={&(0x7f00004f5000)=@generic={0x10000000001e, "010000090000000101d000000226cc573c080000003724c71e14dd6a739effea1b48006be61ffe0000e103000000f8000004003f010039d8f986ff01000300000004af50d50700000000000000e3ad316a1983000000001d00e0dfcb24281e27800000100076c3979ac40000bd15020078a1dfd300881a8365b1b16d7436"}, 0x80, &(0x7f0000447ff0), 0x0, &(0x7f00006e9c68)}, 0x0) 2018/04/11 12:45:03 executing program 3: semop(0x0, &(0x7f000001a000)=[{0x0, 0xffffffffffff0001, 0xe}, {}], 0x2) timer_create(0x0, &(0x7f0000cd0000)={0x0, 0x12}, &(0x7f0000044000)) timer_settime(0x0, 0x0, &(0x7f00004b1fe0)={{0x0, 0x1c9c380}, {0x0, 0x9}}, &(0x7f0000040000)) r0 = getpgid(0x0) tkill(r0, 0x1000000000016) 2018/04/11 12:45:03 executing program 6: r0 = socket$inet6(0xa, 0x80003, 0xff) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @ipv4={[], [0xff, 0xff], @dev={0xac, 0x14, 0x14, 0x1b}}}, 0x1c) sendmsg(r0, &(0x7f000001b000)={0x0, 0xfffffff5, &(0x7f0000019fa0), 0xad, &(0x7f000001ef08)}, 0x0) 2018/04/11 12:45:03 executing program 7: syz_emit_ethernet(0x66, &(0x7f0000000000)={@random="cd3997030f00", @empty=[0x0, 0x0, 0x0, 0xf0ffff], [], {@ipv6={0x86dd, {0x0, 0x6, "b40900", 0x30, 0x67, 0x0, @ipv4={[], [0xff, 0xff], @multicast2=0xe0000002}, @mcast2={0xff, 0x2, [], 0x1}, {[], @icmpv6=@time_exceed={0x21, 0x0, 0x0, 0x0, [], {0x0, 0x6, "b680fa", 0x0, 0x0, 0x0, @ipv4={[], [0xff, 0xff], @broadcast=0xffffffff}, @ipv4={[], [0xff, 0xff], @remote={0xac, 0x14, 0xffffffffffffffff, 0xbb}}}}}}}}}, 0x0) 2018/04/11 12:45:03 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000000), 0x216) sendmsg$key(r0, &(0x7f0000000b00)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000001000)={0x2, 0xa, 0x0, 0x0, 0x2}, 0x10}, 0x1}, 0x0) sendmsg$key(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000040)={0x2, 0x12, 0x0, 0x0, 0x2}, 0x10}, 0x1}, 0x0) getsockopt$inet_sctp_SCTP_EVENTS(r0, 0x84, 0xb, &(0x7f0000000080), &(0x7f00000000c0)=0xb) r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000100)='/dev/vcs\x00', 0x4000, 0x0) ioctl$TIOCMBIC(r1, 0x5417, &(0x7f00000001c0)=0x7) 2018/04/11 12:45:03 executing program 1: r0 = socket(0x0, 0x1, 0x0) setsockopt$packet_tx_ring(r0, 0x10f, 0x87, &(0x7f0000b89fe4)=@req={0x772}, 0x10) sendmsg(r0, &(0x7f0000030000)={&(0x7f00004f5000)=@generic={0x10000000001e, "0014000900000000000000000226cc573c080000003724c71e14dd6a739effea1b48006be61ffe0000e103000000f8000004003f010039d8f986ff01000300000004af50d50700000000000000e3ad316a1983000000001d00e0dfcb24281e27800000100076c3979ac40000bd15020078a1dfd300881a8365b1b16d7436"}, 0x80, &(0x7f0000447ff0), 0x0, &(0x7f00006e9c68)}, 0x0) 2018/04/11 12:45:03 executing program 0: r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000200)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc-cast5-avx\x00'}, 0x58) r2 = accept$alg(r1, 0x0, 0x0) r3 = accept(r2, &(0x7f0000000040)=@vsock={0x0, 0x0, 0x0, @reserved}, &(0x7f00000000c0)=0x80) getsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(0xffffffffffffff9c, 0x84, 0x9, &(0x7f0000000100)={0x0, @in6={{0xa, 0x4e23, 0x2d42, @mcast2={0xff, 0x2, [], 0x1}, 0x7fffffff}}, 0x6, 0x100000001, 0x10000, 0x10001, 0x4a}, &(0x7f00000001c0)=0x98) setsockopt$inet_sctp_SCTP_STREAM_SCHEDULER(r3, 0x84, 0x7b, &(0x7f0000000280)={r4, 0x4}, 0x8) dup3(r0, r2, 0x0) 2018/04/11 12:45:03 executing program 4: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000200)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc-cast5-avx\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00003bcfd0)="d3ab27191a", 0x5) sendmmsg$alg(0xffffffffffffffff, &(0x7f0000007e40)=[{0x0, 0x0, &(0x7f0000000900)}], 0x1, 0x0) accept(r0, &(0x7f0000000040)=@pppol2tpv3in6, &(0x7f00000000c0)=0x80) 2018/04/11 12:45:03 executing program 2: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x1e, 0x1, 0x0) setsockopt$packet_tx_ring(r0, 0x10f, 0x87, &(0x7f0000b89fe4)=@req={0x772}, 0x10) sendmsg(r0, &(0x7f0000030000)={&(0x7f00004f5000)=@generic={0x10000000001e, "0100000900007fffffff00000226cc573c080000003724c71e14dd6a739effea1b48006be61ffe0000e103000000f8000004003f010039d8f986ff01000300000004af50d50700000000000000e3ad316a1983000000001d00e0dfcb24281e27800000100076c3979ac40000bd15020078a1dfd300881a8365b1b16d7436"}, 0x80, &(0x7f0000447ff0), 0x0, &(0x7f00006e9c68)}, 0x0) 2018/04/11 12:45:03 executing program 7: syz_emit_ethernet(0x66, &(0x7f0000000000)={@random="cd3997030f00", @empty=[0x0, 0x0, 0x0, 0xff00000000000000], [], {@ipv6={0x86dd, {0x0, 0x6, "b40900", 0x30, 0x67, 0x0, @ipv4={[], [0xff, 0xff], @multicast2=0xe0000002}, @mcast2={0xff, 0x2, [], 0x1}, {[], @icmpv6=@time_exceed={0x21, 0x0, 0x0, 0x0, [], {0x0, 0x6, "b680fa", 0x0, 0x0, 0x0, @ipv4={[], [0xff, 0xff], @broadcast=0xffffffff}, @ipv4={[], [0xff, 0xff], @remote={0xac, 0x14, 0xffffffffffffffff, 0xbb}}}}}}}}}, 0x0) 2018/04/11 12:45:04 executing program 4: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000200)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc-cast5-avx\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00003bcfd0)="d3ab27191a", 0x5) sendmmsg$alg(0xffffffffffffffff, &(0x7f0000007e40)=[{0x0, 0x0, &(0x7f0000000900)}], 0x1, 0x0) accept(r0, &(0x7f0000000040)=@pppol2tpv3in6, &(0x7f00000000c0)=0x80) 2018/04/11 12:45:04 executing program 6: r0 = socket$inet6(0xa, 0x80003, 0xff) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @ipv4={[], [0xff, 0xff], @dev={0xac, 0x14, 0x14, 0x1b}}}, 0x1c) sendmsg(r0, &(0x7f000001b000)={0x0, 0xfffffff5, &(0x7f0000019fa0), 0x1a7, &(0x7f000001ef08)}, 0x0) 2018/04/11 12:45:04 executing program 0: r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000040)=0x0) fcntl$setown(r0, 0x8, r1) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000200)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc-cast5-avx\x00'}, 0x58) r3 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000080)='/dev/cuse\x00', 0xa000, 0x0) setsockopt$ARPT_SO_SET_REPLACE(r3, 0x0, 0x60, &(0x7f0000000280)={'filter\x00', 0x7, 0x4, 0x498, 0x0, 0x140, 0x280, 0x3b0, 0x3b0, 0x3b0, 0x4, &(0x7f00000000c0), {[{{@arp={@local={0xac, 0x14, 0x14, 0xaa}, @broadcast=0xffffffff, 0x0, 0xffffffff, @empty, {[0xff, 0xff, 0x0, 0xff, 0x0, 0xff]}, @empty, {[0xff, 0xff, 0xff, 0xff]}, 0x1000, 0x0, 0x8, 0x8, 0x1, 0x0, 'syz_tun\x00', 'gre0\x00', {}, {}, 0x0, 0x80}, 0xf0, 0x140}, @mangle={0x50, 'mangle\x00', 0x0, {@mac=@link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x3}, @empty, @local={0xac, 0x14, 0x14, 0xaa}, @empty, 0xf}}}, {{@uncond, 0xf0, 0x140}, @mangle={0x50, 'mangle\x00', 0x0, {@empty, @empty, @local={0xac, 0x14, 0x14, 0xaa}, @broadcast=0xffffffff, 0x1, 0x1}}}, {{@uncond, 0xf0, 0x130}, @unspec=@ERROR={0x40, 'ERROR\x00', 0x0, "5eae79df3956f1dac240f03a8fba06b0b5cc0d14d13d77cb90f2906fdeef"}}], {{[], 0xc0, 0xe8}, {0x28, '\x00', 0x0, 0xfffffffffffffffe}}}}, 0x4e8) r4 = accept$alg(r2, 0x0, 0x0) dup3(r0, r4, 0x0) 2018/04/11 12:45:04 executing program 2: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x1e, 0x1, 0x0) setsockopt$packet_tx_ring(r0, 0x10f, 0x87, &(0x7f0000b89fe4)=@req={0x772}, 0x10) sendmsg(r0, &(0x7f0000030000)={&(0x7f00004f5000)=@generic={0x10000000001e, "0100000900000000000200000226cc573c080000003724c71e14dd6a739effea1b48006be61ffe0000e103000000f8000004003f010039d8f986ff01000300000004af50d50700000000000000e3ad316a1983000000001d00e0dfcb24281e27800000100076c3979ac40000bd15020078a1dfd300881a8365b1b16d7436"}, 0x80, &(0x7f0000447ff0), 0x0, &(0x7f00006e9c68)}, 0x0) 2018/04/11 12:45:04 executing program 1: r0 = socket(0x0, 0x1, 0x0) setsockopt$packet_tx_ring(r0, 0x10f, 0x87, &(0x7f0000b89fe4)=@req={0x772}, 0x10) sendmsg(r0, &(0x7f0000030000)={&(0x7f00004f5000)=@generic={0x10000000001e, "0014000900000000000000000226cc573c080000003724c71e14dd6a739effea1b48006be61ffe0000e103000000f8000004003f010039d8f986ff01000300000004af50d50700000000000000e3ad316a1983000000001d00e0dfcb24281e27800000100076c3979ac40000bd15020078a1dfd300881a8365b1b16d7436"}, 0x80, &(0x7f0000447ff0), 0x0, &(0x7f00006e9c68)}, 0x0) 2018/04/11 12:45:04 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000000), 0x216) sendmsg$key(r0, &(0x7f0000000b00)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000001000)={0x2, 0xa, 0x0, 0x0, 0x2}, 0x10}, 0x1}, 0x0) clock_getres(0x5, &(0x7f0000000080)) sendmsg$key(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000040)={0x2, 0x12, 0x0, 0x0, 0x2}, 0x10}, 0x1}, 0x0) 2018/04/11 12:45:04 executing program 7: syz_emit_ethernet(0x66, &(0x7f0000000000)={@random="cd3997030f00", @empty=[0x0, 0x0, 0x0, 0x58000000], [], {@ipv6={0x86dd, {0x0, 0x6, "b40900", 0x30, 0x67, 0x0, @ipv4={[], [0xff, 0xff], @multicast2=0xe0000002}, @mcast2={0xff, 0x2, [], 0x1}, {[], @icmpv6=@time_exceed={0x21, 0x0, 0x0, 0x0, [], {0x0, 0x6, "b680fa", 0x0, 0x0, 0x0, @ipv4={[], [0xff, 0xff], @broadcast=0xffffffff}, @ipv4={[], [0xff, 0xff], @remote={0xac, 0x14, 0xffffffffffffffff, 0xbb}}}}}}}}}, 0x0) 2018/04/11 12:45:04 executing program 3: semop(0x0, &(0x7f000001a000)=[{0x0, 0xffffffffffff0001, 0x3f00000000000000}, {}], 0x2) timer_create(0x0, &(0x7f0000cd0000)={0x0, 0x12}, &(0x7f0000044000)) timer_settime(0x0, 0x0, &(0x7f00004b1fe0)={{0x0, 0x1c9c380}, {0x0, 0x9}}, &(0x7f0000040000)) r0 = getpgid(0x0) tkill(r0, 0x1000000000016) 2018/04/11 12:45:04 executing program 4: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000200)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc-cast5-avx\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00003bcfd0)="d3ab27191a", 0x5) sendmmsg$alg(0xffffffffffffffff, &(0x7f0000007e40)=[{0x0, 0x0, &(0x7f0000000900)}], 0x1, 0x0) accept(r0, &(0x7f0000000040)=@pppol2tpv3in6, &(0x7f00000000c0)=0x80) 2018/04/11 12:45:04 executing program 6: r0 = socket$inet6(0xa, 0x80003, 0xff) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @ipv4={[], [0xff, 0xff], @dev={0xac, 0x14, 0x14, 0x1b}}}, 0x1c) sendmsg(r0, &(0x7f000001b000)={0x0, 0xfffffff5, &(0x7f0000019fa0), 0x8e, &(0x7f000001ef08)}, 0x0) 2018/04/11 12:45:04 executing program 2: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x1e, 0x1, 0x0) setsockopt$packet_tx_ring(r0, 0x10f, 0x87, &(0x7f0000b89fe4)=@req={0x772}, 0x10) sendmsg(r0, &(0x7f0000030000)={&(0x7f00004f5000)=@generic={0x10000000001e, "0100000900000400000000000226cc573c080000003724c71e14dd6a739effea1b48006be61ffe0000e103000000f8000004003f010039d8f986ff01000300000004af50d50700000000000000e3ad316a1983000000001d00e0dfcb24281e27800000100076c3979ac40000bd15020078a1dfd300881a8365b1b16d7436"}, 0x80, &(0x7f0000447ff0), 0x0, &(0x7f00006e9c68)}, 0x0) 2018/04/11 12:45:04 executing program 1: r0 = socket(0x1e, 0x0, 0x0) setsockopt$packet_tx_ring(r0, 0x10f, 0x87, &(0x7f0000b89fe4)=@req={0x772}, 0x10) sendmsg(r0, &(0x7f0000030000)={&(0x7f00004f5000)=@generic={0x10000000001e, "0014000900000000000000000226cc573c080000003724c71e14dd6a739effea1b48006be61ffe0000e103000000f8000004003f010039d8f986ff01000300000004af50d50700000000000000e3ad316a1983000000001d00e0dfcb24281e27800000100076c3979ac40000bd15020078a1dfd300881a8365b1b16d7436"}, 0x80, &(0x7f0000447ff0), 0x0, &(0x7f00006e9c68)}, 0x0) 2018/04/11 12:45:04 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000000), 0x216) sendmsg$key(r0, &(0x7f0000000b00)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000001000)={0x2, 0xa, 0x0, 0x0, 0x2}, 0x10}, 0x1}, 0x0) sendmsg$key(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000001c0)=ANY=[@ANYBLOB="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"], 0x10}, 0x1}, 0x0) r1 = dup2(r0, r0) ioctl$LOOP_SET_CAPACITY(r1, 0x4c07) getsockopt$bt_BT_SECURITY(r1, 0x112, 0x4, &(0x7f0000000080), 0x2) 2018/04/11 12:45:04 executing program 0: r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000200)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc-cast5-avx\x00'}, 0x58) mknod(&(0x7f0000000040)='./file0\x00', 0x10, 0x6) r2 = accept$alg(r1, 0x0, 0x0) r3 = dup3(r0, r2, 0x0) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(r3, 0x6, 0x1d, &(0x7f0000000080)={0x7, 0xe2, 0x58e3, 0x0, 0xa34}, 0x14) 2018/04/11 12:45:04 executing program 7: syz_emit_ethernet(0x66, &(0x7f0000000000)={@random="cd3997030f00", @empty=[0x0, 0x0, 0x0, 0x2000000], [], {@ipv6={0x86dd, {0x0, 0x6, "b40900", 0x30, 0x67, 0x0, @ipv4={[], [0xff, 0xff], @multicast2=0xe0000002}, @mcast2={0xff, 0x2, [], 0x1}, {[], @icmpv6=@time_exceed={0x21, 0x0, 0x0, 0x0, [], {0x0, 0x6, "b680fa", 0x0, 0x0, 0x0, @ipv4={[], [0xff, 0xff], @broadcast=0xffffffff}, @ipv4={[], [0xff, 0xff], @remote={0xac, 0x14, 0xffffffffffffffff, 0xbb}}}}}}}}}, 0x0) 2018/04/11 12:45:04 executing program 1: r0 = socket(0x1e, 0x0, 0x0) setsockopt$packet_tx_ring(r0, 0x10f, 0x87, &(0x7f0000b89fe4)=@req={0x772}, 0x10) sendmsg(r0, &(0x7f0000030000)={&(0x7f00004f5000)=@generic={0x10000000001e, "0014000900000000000000000226cc573c080000003724c71e14dd6a739effea1b48006be61ffe0000e103000000f8000004003f010039d8f986ff01000300000004af50d50700000000000000e3ad316a1983000000001d00e0dfcb24281e27800000100076c3979ac40000bd15020078a1dfd300881a8365b1b16d7436"}, 0x80, &(0x7f0000447ff0), 0x0, &(0x7f00006e9c68)}, 0x0) 2018/04/11 12:45:04 executing program 4: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000200)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc-cast5-avx\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00003bcfd0)="d3ab27191a", 0x5) sendmmsg$alg(r1, &(0x7f0000007e40), 0x0, 0x0) accept(r0, &(0x7f0000000040)=@pppol2tpv3in6, &(0x7f00000000c0)=0x80) 2018/04/11 12:45:04 executing program 7: syz_emit_ethernet(0x66, &(0x7f0000000000)={@random="cd3997030f00", @empty=[0x0, 0x0, 0x0, 0xf000], [], {@ipv6={0x86dd, {0x0, 0x6, "b40900", 0x30, 0x67, 0x0, @ipv4={[], [0xff, 0xff], @multicast2=0xe0000002}, @mcast2={0xff, 0x2, [], 0x1}, {[], @icmpv6=@time_exceed={0x21, 0x0, 0x0, 0x0, [], {0x0, 0x6, "b680fa", 0x0, 0x0, 0x0, @ipv4={[], [0xff, 0xff], @broadcast=0xffffffff}, @ipv4={[], [0xff, 0xff], @remote={0xac, 0x14, 0xffffffffffffffff, 0xbb}}}}}}}}}, 0x0) 2018/04/11 12:45:04 executing program 0: r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bind$alg(0xffffffffffffffff, &(0x7f0000000200)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc-cast5-avx\x00'}, 0x58) r1 = openat$cuse(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/cuse\x00', 0x105000, 0x0) r2 = inotify_add_watch(0xffffffffffffffff, &(0x7f0000000080)='./file0\x00', 0x0) inotify_rm_watch(r1, r2) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0x40042408, r1) r3 = accept$alg(0xffffffffffffffff, 0x0, 0x0) dup3(r0, r3, 0x0) 2018/04/11 12:45:04 executing program 6: r0 = socket$inet6(0xa, 0x80003, 0xff) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @ipv4={[], [0xff, 0xff], @dev={0xac, 0x14, 0x14, 0x1b}}}, 0x1c) sendmsg(r0, &(0x7f000001b000)={0x0, 0xfffffff5, &(0x7f0000019fa0), 0x138, &(0x7f000001ef08)}, 0x0) 2018/04/11 12:45:04 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000100)=0x8, 0x4) sendmsg$key(r0, &(0x7f0000000b00)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000001000)=ANY=[@ANYBLOB="020a0000020000230000000000000000"], 0x1e1}, 0x1}, 0x100000000) sync_file_range(r0, 0x508, 0x7, 0x3) sendmsg$key(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000040)=ANY=[@ANYBLOB="02120000020000ffe300000000000002"], 0x10}, 0x1}, 0x10) socketpair(0x1, 0x0, 0x8, &(0x7f0000000540)={0xffffffffffffffff}) ioctl$SIOCSIFMTU(r1, 0x8922, &(0x7f0000000580)={'rose0\x00', 0x9a}) syz_open_dev$mice(&(0x7f0000000080)='/dev/input/mice\x00', 0x0, 0x0) 2018/04/11 12:45:04 executing program 2: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x1e, 0x1, 0x0) setsockopt$packet_tx_ring(r0, 0x10f, 0x87, &(0x7f0000b89fe4)=@req={0x772}, 0x10) sendmsg(r0, &(0x7f0000030000)={&(0x7f00004f5000)=@generic={0x10000000001e, "0100000900000200000000000226cc573c080000003724c71e14dd6a739effea1b48006be61ffe0000e103000000f8000004003f010039d8f986ff01000300000004af50d50700000000000000e3ad316a1983000000001d00e0dfcb24281e27800000100076c3979ac40000bd15020078a1dfd300881a8365b1b16d7436"}, 0x80, &(0x7f0000447ff0), 0x0, &(0x7f00006e9c68)}, 0x0) 2018/04/11 12:45:05 executing program 1: r0 = socket(0x1e, 0x0, 0x0) setsockopt$packet_tx_ring(r0, 0x10f, 0x87, &(0x7f0000b89fe4)=@req={0x772}, 0x10) sendmsg(r0, &(0x7f0000030000)={&(0x7f00004f5000)=@generic={0x10000000001e, "0014000900000000000000000226cc573c080000003724c71e14dd6a739effea1b48006be61ffe0000e103000000f8000004003f010039d8f986ff01000300000004af50d50700000000000000e3ad316a1983000000001d00e0dfcb24281e27800000100076c3979ac40000bd15020078a1dfd300881a8365b1b16d7436"}, 0x80, &(0x7f0000447ff0), 0x0, &(0x7f00006e9c68)}, 0x0) 2018/04/11 12:45:05 executing program 3: semop(0x0, &(0x7f000001a000)=[{0x0, 0xffffffffffff0001, 0x500000000000000}, {}], 0x2) timer_create(0x0, &(0x7f0000cd0000)={0x0, 0x12}, &(0x7f0000044000)) timer_settime(0x0, 0x0, &(0x7f00004b1fe0)={{0x0, 0x1c9c380}, {0x0, 0x9}}, &(0x7f0000040000)) r0 = getpgid(0x0) tkill(r0, 0x1000000000016) 2018/04/11 12:45:05 executing program 4: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000200)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc-cast5-avx\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00003bcfd0)="d3ab27191a", 0x5) sendmmsg$alg(r1, &(0x7f0000007e40), 0x0, 0x0) accept(r0, &(0x7f0000000040)=@pppol2tpv3in6, &(0x7f00000000c0)=0x80) 2018/04/11 12:45:05 executing program 6: r0 = socket$inet6(0xa, 0x80003, 0xff) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @ipv4={[], [0xff, 0xff], @dev={0xac, 0x14, 0x14, 0x1b}}}, 0x1c) sendmsg(r0, &(0x7f000001b000)={0x0, 0xfffffff5, &(0x7f0000019fa0), 0x136, &(0x7f000001ef08)}, 0x0) 2018/04/11 12:45:05 executing program 7: syz_emit_ethernet(0x66, &(0x7f0000000000)={@random="cd3997030f00", @empty=[0x0, 0x0, 0x0, 0xff00], [], {@ipv6={0x86dd, {0x0, 0x6, "b40900", 0x30, 0x67, 0x0, @ipv4={[], [0xff, 0xff], @multicast2=0xe0000002}, @mcast2={0xff, 0x2, [], 0x1}, {[], @icmpv6=@time_exceed={0x21, 0x0, 0x0, 0x0, [], {0x0, 0x6, "b680fa", 0x0, 0x0, 0x0, @ipv4={[], [0xff, 0xff], @broadcast=0xffffffff}, @ipv4={[], [0xff, 0xff], @remote={0xac, 0x14, 0xffffffffffffffff, 0xbb}}}}}}}}}, 0x0) 2018/04/11 12:45:05 executing program 0: r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000200)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc-cast5-avx\x00'}, 0x58) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x23, &(0x7f0000000040)={@multicast1, @remote, 0x0}, &(0x7f0000000280)=0xc) bpf$PROG_LOAD(0x5, &(0x7f00000002c0)={0x2, 0x0, &(0x7f0000000040)=@raw, &(0x7f0000000080)='GPL\x00', 0x6, 0xff, &(0x7f00000000c0)=""/255, 0x41100, 0x1, [], r2}, 0x48) r3 = accept$alg(r1, 0x0, 0x0) dup3(r0, r3, 0x0) 2018/04/11 12:45:05 executing program 1: r0 = socket(0x1e, 0x1, 0x0) setsockopt$packet_tx_ring(0xffffffffffffffff, 0x10f, 0x87, &(0x7f0000b89fe4)=@req={0x772}, 0x10) sendmsg(r0, &(0x7f0000030000)={&(0x7f00004f5000)=@generic={0x10000000001e, "0014000900000000000000000226cc573c080000003724c71e14dd6a739effea1b48006be61ffe0000e103000000f8000004003f010039d8f986ff01000300000004af50d50700000000000000e3ad316a1983000000001d00e0dfcb24281e27800000100076c3979ac40000bd15020078a1dfd300881a8365b1b16d7436"}, 0x80, &(0x7f0000447ff0), 0x0, &(0x7f00006e9c68)}, 0x0) 2018/04/11 12:45:05 executing program 2: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x1e, 0x1, 0x0) setsockopt$packet_tx_ring(r0, 0x10f, 0x87, &(0x7f0000b89fe4)=@req={0x772}, 0x10) sendmsg(r0, &(0x7f0000030000)={&(0x7f00004f5000)=@generic={0x10000000001e, "0100000900000000000002000226cc573c080000003724c71e14dd6a739effea1b48006be61ffe0000e103000000f8000004003f010039d8f986ff01000300000004af50d50700000000000000e3ad316a1983000000001d00e0dfcb24281e27800000100076c3979ac40000bd15020078a1dfd300881a8365b1b16d7436"}, 0x80, &(0x7f0000447ff0), 0x0, &(0x7f00006e9c68)}, 0x0) 2018/04/11 12:45:05 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000000), 0x216) sendmsg$key(r0, &(0x7f0000000b00)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000001000)={0x2, 0xa, 0x0, 0x0, 0x2}, 0x10}, 0x1}, 0x0) r1 = syz_open_dev$adsp(&(0x7f0000000080)='/dev/adsp#\x00', 0xffff, 0x0) ioctl$DRM_IOCTL_ADD_CTX(0xffffffffffffffff, 0xc0086420, &(0x7f00000000c0)={0x0}) ioctl$DRM_IOCTL_UNLOCK(r1, 0x4008642b, &(0x7f0000000100)={r2, 0x10}) sendmsg$key(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000040)={0x2, 0x12, 0x0, 0x0, 0x2}, 0x10}, 0x1}, 0x0) 2018/04/11 12:45:05 executing program 7: syz_emit_ethernet(0x66, &(0x7f0000000000)={@random="cd3997030f00", @empty=[0x0, 0x0, 0x0, 0x2800], [], {@ipv6={0x86dd, {0x0, 0x6, "b40900", 0x30, 0x67, 0x0, @ipv4={[], [0xff, 0xff], @multicast2=0xe0000002}, @mcast2={0xff, 0x2, [], 0x1}, {[], @icmpv6=@time_exceed={0x21, 0x0, 0x0, 0x0, [], {0x0, 0x6, "b680fa", 0x0, 0x0, 0x0, @ipv4={[], [0xff, 0xff], @broadcast=0xffffffff}, @ipv4={[], [0xff, 0xff], @remote={0xac, 0x14, 0xffffffffffffffff, 0xbb}}}}}}}}}, 0x0) 2018/04/11 12:45:05 executing program 4: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000200)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc-cast5-avx\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00003bcfd0)="d3ab27191a", 0x5) sendmmsg$alg(r1, &(0x7f0000007e40), 0x0, 0x0) accept(r0, &(0x7f0000000040)=@pppol2tpv3in6, &(0x7f00000000c0)=0x80) 2018/04/11 12:45:05 executing program 0: r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000040)={0x26, 'aead\x00', 0x0, 0x0, 'gcm_base(ctr(aes-aesni),ghash-generic)\x00'}, 0x58) r2 = accept$alg(r1, 0x0, 0x0) dup3(r0, r2, 0x0) 2018/04/11 12:45:05 executing program 6: r0 = socket$inet6(0xa, 0x80003, 0xff) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @ipv4={[], [0xff, 0xff], @dev={0xac, 0x14, 0x14, 0x1b}}}, 0x1c) sendmsg(r0, &(0x7f000001b000)={0x0, 0xfffffff5, &(0x7f0000019fa0), 0xd8, &(0x7f000001ef08)}, 0x0) 2018/04/11 12:45:05 executing program 1: r0 = socket(0x1e, 0x1, 0x0) setsockopt$packet_tx_ring(0xffffffffffffffff, 0x10f, 0x87, &(0x7f0000b89fe4)=@req={0x772}, 0x10) sendmsg(r0, &(0x7f0000030000)={&(0x7f00004f5000)=@generic={0x10000000001e, "0014000900000000000000000226cc573c080000003724c71e14dd6a739effea1b48006be61ffe0000e103000000f8000004003f010039d8f986ff01000300000004af50d50700000000000000e3ad316a1983000000001d00e0dfcb24281e27800000100076c3979ac40000bd15020078a1dfd300881a8365b1b16d7436"}, 0x80, &(0x7f0000447ff0), 0x0, &(0x7f00006e9c68)}, 0x0) 2018/04/11 12:45:05 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) r1 = socket(0x8, 0xa, 0x932) sendmsg$inet_sctp(r1, &(0x7f00000002c0)={&(0x7f00000000c0)=@in={0x2, 0x4e22, @local={0xac, 0x14, 0x14, 0xaa}}, 0x10, &(0x7f0000000100)=[{&(0x7f00000001c0)="24f513bc5557bb3beeb59f50058d1f91ee1656838a0ba0165ce34ebfa52608c3cec5fab3b5cd3c324b972b66793a06e886ffa42348ec45633fbba295338b7ded12e0657a0854daf2704524555ff4c890c7ab334c2e72af9346d39fdcf23d8c848b01c16cf3c81a5d7e67a3189227e0cd597353b324cbbb1f559196703aa63cd185b28ff666512d6bec17417efdc296aa0bb75aac0fd6d409e6ef10a4f4265a7a208ea27eca00c2ecccdea298db33ff6ef38b76148bebe966646bd606789a0c539b89", 0xc2}], 0x1, 0x0, 0x0, 0x40}, 0x4004080) getsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x11, &(0x7f0000000300)={{{@in6=@dev, @in6=@mcast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@dev}, 0x0, @in6=@local}}, &(0x7f0000000400)=0xe8) ioctl$sock_inet6_SIOCSIFDSTADDR(r1, 0x8918, &(0x7f0000000440)={@mcast2={0xff, 0x2, [], 0x1}, 0x43, r2}) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000000), 0x216) sendmsg$key(r0, &(0x7f0000000b00)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000001000)=ANY=[@ANYBLOB="0003ff0f00000000000000000000"], 0x10}, 0x1}, 0x0) sendmsg$key(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000480)=ANY=[@ANYBLOB="0212000002000000000000e8780000009497bb9d5412c61afe5a2a1371ccddaf29c562d4c949be8e4a55b9834850f49bc2bc3b24ccb7b5aa0ff4ebdba4e5404fdf6de74b0079fa17c88527651d68a00788daf1c230df32741a138219c302eabe9bd6d229936d3134a4be54dd9eac180985e007dc677633fb25b65ec7482cd6995ad6ce56db6cce83750ac254b31fb0"], 0x10}, 0x1}, 0x0) 2018/04/11 12:45:05 executing program 2: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x1e, 0x1, 0x0) setsockopt$packet_tx_ring(r0, 0x10f, 0x87, &(0x7f0000b89fe4)=@req={0x772}, 0x10) sendmsg(r0, &(0x7f0000030000)={&(0x7f00004f5000)=@generic={0x10000000001e, "0100000900000000000400000226cc573c080000003724c71e14dd6a739effea1b48006be61ffe0000e103000000f8000004003f010039d8f986ff01000300000004af50d50700000000000000e3ad316a1983000000001d00e0dfcb24281e27800000100076c3979ac40000bd15020078a1dfd300881a8365b1b16d7436"}, 0x80, &(0x7f0000447ff0), 0x0, &(0x7f00006e9c68)}, 0x0) 2018/04/11 12:45:05 executing program 0: r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000200)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc-cast5-avx\x00'}, 0x58) r2 = accept$alg(r1, 0x0, 0x0) dup3(r0, r2, 0x0) 2018/04/11 12:45:06 executing program 3: semop(0x0, &(0x7f000001a000)=[{0x0, 0xffffffffffff0001, 0x1000000}, {}], 0x2) timer_create(0x0, &(0x7f0000cd0000)={0x0, 0x12}, &(0x7f0000044000)) timer_settime(0x0, 0x0, &(0x7f00004b1fe0)={{0x0, 0x1c9c380}, {0x0, 0x9}}, &(0x7f0000040000)) r0 = getpgid(0x0) tkill(r0, 0x1000000000016) 2018/04/11 12:45:06 executing program 7: syz_emit_ethernet(0x66, &(0x7f0000000000)={@random="cd3997030f00", @empty=[0x0, 0x0, 0x0, 0x600], [], {@ipv6={0x86dd, {0x0, 0x6, "b40900", 0x30, 0x67, 0x0, @ipv4={[], [0xff, 0xff], @multicast2=0xe0000002}, @mcast2={0xff, 0x2, [], 0x1}, {[], @icmpv6=@time_exceed={0x21, 0x0, 0x0, 0x0, [], {0x0, 0x6, "b680fa", 0x0, 0x0, 0x0, @ipv4={[], [0xff, 0xff], @broadcast=0xffffffff}, @ipv4={[], [0xff, 0xff], @remote={0xac, 0x14, 0xffffffffffffffff, 0xbb}}}}}}}}}, 0x0) 2018/04/11 12:45:06 executing program 4: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000200)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc-cast5-avx\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00003bcfd0)="d3ab27191a", 0x5) sendmmsg$alg(r1, &(0x7f0000007e40)=[{0x0, 0x0, &(0x7f0000000900)}], 0x1, 0x0) accept(0xffffffffffffffff, &(0x7f0000000040)=@pppol2tpv3in6, &(0x7f00000000c0)=0x80) 2018/04/11 12:45:06 executing program 1: r0 = socket(0x1e, 0x1, 0x0) setsockopt$packet_tx_ring(0xffffffffffffffff, 0x10f, 0x87, &(0x7f0000b89fe4)=@req={0x772}, 0x10) sendmsg(r0, &(0x7f0000030000)={&(0x7f00004f5000)=@generic={0x10000000001e, "0014000900000000000000000226cc573c080000003724c71e14dd6a739effea1b48006be61ffe0000e103000000f8000004003f010039d8f986ff01000300000004af50d50700000000000000e3ad316a1983000000001d00e0dfcb24281e27800000100076c3979ac40000bd15020078a1dfd300881a8365b1b16d7436"}, 0x80, &(0x7f0000447ff0), 0x0, &(0x7f00006e9c68)}, 0x0) 2018/04/11 12:45:06 executing program 2: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x1e, 0x1, 0x0) setsockopt$packet_tx_ring(r0, 0x10f, 0x87, &(0x7f0000b89fe4)=@req={0x772}, 0x10) sendmsg(r0, &(0x7f0000030000)={&(0x7f00004f5000)=@generic={0x10000000001e, "01000009000000000101d0000226cc573c080000003724c71e14dd6a739effea1b48006be61ffe0000e103000000f8000004003f010039d8f986ff01000300000004af50d50700000000000000e3ad316a1983000000001d00e0dfcb24281e27800000100076c3979ac40000bd15020078a1dfd300881a8365b1b16d7436"}, 0x80, &(0x7f0000447ff0), 0x0, &(0x7f00006e9c68)}, 0x0) 2018/04/11 12:45:06 executing program 6: r0 = socket$inet6(0xa, 0x80003, 0xff) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @ipv4={[], [0xff, 0xff], @dev={0xac, 0x14, 0x14, 0x1b}}}, 0x1c) sendmsg(r0, &(0x7f000001b000)={0x0, 0xfffffff5, &(0x7f0000019fa0), 0x1ba, &(0x7f000001ef08)}, 0x0) 2018/04/11 12:45:06 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000000), 0x216) sendmsg$key(r0, &(0x7f0000000b00)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000001000)={0x2, 0xa, 0x0, 0x0, 0x2}, 0x10}, 0x1}, 0x0) sendmsg$key(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000440)={0x2, 0x12, 0x0, 0x0, 0x4f, 0x0, 0x0, 0x0, [@sadb_x_policy={0x8, 0x12, 0x4, 0x7, 0x0, 0x6e6bc0, 0xfffffffffffffffc, {0x6, 0xff, 0x9, 0x6, 0x0, 0x6df2, 0x0, @in6=@local={0xfe, 0x80, [], 0xaa}}}, @sadb_x_kmaddress={0x5, 0x19, 0x0, @in={0x2, 0x4e22, @multicast2=0xe0000002}, @in={0x2, 0x4e22, @multicast1=0xe0000001}}, @sadb_x_sec_ctx={0x1a, 0x18, 0x1, 0x5, 0xc7, "e9b4802ffbc75e73c01f7d90de06f371c731cb34c84bc38f1953e93cef44aeb3b9a33eac50197ca7b3abe2f7f6545f258d62fe36836d85af3bc32586a77ccaa6070fd61ca9f454f90f5ae089fd670ae3a979e7f113a78c4a11a96ff68cb76d20416353d207f00d16f983b04635b6fe26b39875a650a963c1df95f85868e5ea71fb862936d87f83c0e7f063671b564311fcc10604cf6bcce654bc68bbd2488bcae5b4c5f84406b881d3a83d4a326eb010c0c2bbd3d9905577cea03395dbedcedcbbf6e124f6cbc2"}, @sadb_key={0x1d, 0x9, 0x6f0, 0x0, "ca455e325bc7199652831a610671a2cf5749b7ce7572ab5ac00d8e60836cf5c3cca41779e7f1ca1e2f874c69a0fd6b104668c683a2b8c41abb8466d8a13150dfb34324b04f18ec05013ff97f13ba0672721a915fc33fbadc795682264452e77eb10276da5dd1d1708dd465627bc060bdae917dc4ea7a5dc64d1b20b4ce8d787625d801972151dedf35644c82cd5599aab68674f4dadf1d6ca66ca7aa29836f129e39ed4c78b64c659c88c8b34e9577613410293a256553557a6fc595a8dfb7e7b23ba3f543d71dd29a3bbee4b4a818122b4b2eeda0a74754afd9b4325435"}, @sadb_lifetime={0x4, 0x4, 0x5, 0xfce4, 0x1000, 0x2}, @sadb_lifetime={0x4, 0x7, 0x7, 0x9, 0x1f, 0x4}, @sadb_x_nat_t_type={0x1, 0x14, 0x7}]}, 0x278}, 0x1}, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000040)='cpuacct.usage_all\x00', 0x0, 0x0) lseek(r1, 0x0, 0x4) setsockopt$SO_VM_SOCKETS_CONNECT_TIMEOUT(r1, 0x28, 0x6, &(0x7f0000000080)={0x77359400}, 0x10) 2018/04/11 12:45:06 executing program 0: r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000200)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc-cast5-avx\x00'}, 0x58) r2 = accept$alg(r1, 0x0, 0x0) r3 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vcs\x00', 0x200000, 0x0) getsockopt$inet_sctp_SCTP_LOCAL_AUTH_CHUNKS(0xffffffffffffff9c, 0x84, 0x1b, &(0x7f0000000080)={0x0, 0xc2, "72b339a33f84d99edc60a7e8495ee26038c8a6c603b66b23303bac4c7ece2cade1a54e1f58bfe471441fffc422d967b23e0c45b55907a2e5f21ba29c88534abfd39985403416004f1301bde945f4c61b9506dc1d0614001cef17ff0f772367c4d0105bae0a1b3bddac71785f74b641d28cbc3f05b00b4f4f5de35bc62760f16ebfb4e38b1da0ddccd716534d7839f3cd1a76622aac89732c9eae07b5189445a6e53d287a8015c10cb265324cfdd77af350199ee90ad9a1a0b1a35860b3019da81d88"}, &(0x7f0000000180)=0xca) getsockopt$inet_sctp6_SCTP_MAXSEG(r3, 0x84, 0xd, &(0x7f00000001c0)=@assoc_id=r4, &(0x7f0000000280)=0x4) dup3(r0, r2, 0x0) 2018/04/11 12:45:06 executing program 7: syz_emit_ethernet(0x66, &(0x7f0000000000)={@random="cd3997030f00", @empty=[0x0, 0x0, 0x0, 0x5800000000000000], [], {@ipv6={0x86dd, {0x0, 0x6, "b40900", 0x30, 0x67, 0x0, @ipv4={[], [0xff, 0xff], @multicast2=0xe0000002}, @mcast2={0xff, 0x2, [], 0x1}, {[], @icmpv6=@time_exceed={0x21, 0x0, 0x0, 0x0, [], {0x0, 0x6, "b680fa", 0x0, 0x0, 0x0, @ipv4={[], [0xff, 0xff], @broadcast=0xffffffff}, @ipv4={[], [0xff, 0xff], @remote={0xac, 0x14, 0xffffffffffffffff, 0xbb}}}}}}}}}, 0x0) 2018/04/11 12:45:06 executing program 5: setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x8, &(0x7f0000000000), 0x216) sendmsg$key(0xffffffffffffffff, &(0x7f0000000b00)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000001000)={0x2, 0xa, 0x0, 0x0, 0x2}, 0x10}, 0x1}, 0x0) sendmsg$key(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000040)={0x2, 0x12, 0x0, 0x0, 0x2}, 0x10}, 0x1}, 0x0) 2018/04/11 12:45:06 executing program 2: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x1e, 0x1, 0x0) setsockopt$packet_tx_ring(r0, 0x10f, 0x87, &(0x7f0000b89fe4)=@req={0x772}, 0x10) sendmsg(r0, &(0x7f0000030000)={&(0x7f00004f5000)=@generic={0x10000000001e, "010000090000007fffffff000226cc573c080000003724c71e14dd6a739effea1b48006be61ffe0000e103000000f8000004003f010039d8f986ff01000300000004af50d50700000000000000e3ad316a1983000000001d00e0dfcb24281e27800000100076c3979ac40000bd15020078a1dfd300881a8365b1b16d7436"}, 0x80, &(0x7f0000447ff0), 0x0, &(0x7f00006e9c68)}, 0x0) 2018/04/11 12:45:06 executing program 7: syz_emit_ethernet(0x66, &(0x7f0000000000)={@random="cd3997030f00", @empty=[0x0, 0x0, 0x0, 0x88470000], [], {@ipv6={0x86dd, {0x0, 0x6, "b40900", 0x30, 0x67, 0x0, @ipv4={[], [0xff, 0xff], @multicast2=0xe0000002}, @mcast2={0xff, 0x2, [], 0x1}, {[], @icmpv6=@time_exceed={0x21, 0x0, 0x0, 0x0, [], {0x0, 0x6, "b680fa", 0x0, 0x0, 0x0, @ipv4={[], [0xff, 0xff], @broadcast=0xffffffff}, @ipv4={[], [0xff, 0xff], @remote={0xac, 0x14, 0xffffffffffffffff, 0xbb}}}}}}}}}, 0x0) 2018/04/11 12:45:06 executing program 6: r0 = socket$inet6(0xa, 0x80003, 0xff) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @ipv4={[], [0xff, 0xff], @dev={0xac, 0x14, 0x14, 0x1b}}}, 0x1c) sendmsg(r0, &(0x7f000001b000)={0x0, 0xfffffff5, &(0x7f0000019fa0), 0x1c4, &(0x7f000001ef08)}, 0x0) 2018/04/11 12:45:06 executing program 4: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000200)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc-cast5-avx\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00003bcfd0)="d3ab27191a", 0x5) sendmmsg$alg(r1, &(0x7f0000007e40)=[{0x0, 0x0, &(0x7f0000000900)}], 0x1, 0x0) accept(0xffffffffffffffff, &(0x7f0000000040)=@pppol2tpv3in6, &(0x7f00000000c0)=0x80) 2018/04/11 12:45:06 executing program 1: r0 = socket(0x1e, 0x1, 0x0) setsockopt$packet_tx_ring(r0, 0x10f, 0x87, &(0x7f0000b89fe4), 0x10) sendmsg(r0, &(0x7f0000030000)={&(0x7f00004f5000)=@generic={0x10000000001e, "0014000900000000000000000226cc573c080000003724c71e14dd6a739effea1b48006be61ffe0000e103000000f8000004003f010039d8f986ff01000300000004af50d50700000000000000e3ad316a1983000000001d00e0dfcb24281e27800000100076c3979ac40000bd15020078a1dfd300881a8365b1b16d7436"}, 0x80, &(0x7f0000447ff0), 0x0, &(0x7f00006e9c68)}, 0x0) 2018/04/11 12:45:06 executing program 0: r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000200)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc-cast5-avx\x00'}, 0x58) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/sys/net/ipv4/vs/snat_reroute\x00', 0x2, 0x0) r2 = accept$alg(r1, 0x0, 0x0) dup3(r0, r2, 0x0) 2018/04/11 12:45:07 executing program 3: semop(0x0, &(0x7f000001a000)=[{0x0, 0xffffffffffff0001, 0x3f000000}, {}], 0x2) timer_create(0x0, &(0x7f0000cd0000)={0x0, 0x12}, &(0x7f0000044000)) timer_settime(0x0, 0x0, &(0x7f00004b1fe0)={{0x0, 0x1c9c380}, {0x0, 0x9}}, &(0x7f0000040000)) r0 = getpgid(0x0) tkill(r0, 0x1000000000016) 2018/04/11 12:45:07 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000000), 0x216) sendmsg$key(r0, &(0x7f0000000b00)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000001000)={0x2, 0xa, 0x0, 0x0, 0x2}, 0x10}, 0x1}, 0x0) bpf$OBJ_GET_PROG(0x7, &(0x7f00000000c0)={&(0x7f0000000080)='./file0\x00', 0x0, 0xf46600f30b673adf}, 0x10) sendmsg$key(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000040)={0x2, 0x12, 0x0, 0x0, 0x2}, 0x10}, 0x1}, 0x0) 2018/04/11 12:45:07 executing program 7: syz_emit_ethernet(0x66, &(0x7f0000000000)={@random="cd3997030f00", @empty=[0x0, 0x0, 0x0, 0x89060000], [], {@ipv6={0x86dd, {0x0, 0x6, "b40900", 0x30, 0x67, 0x0, @ipv4={[], [0xff, 0xff], @multicast2=0xe0000002}, @mcast2={0xff, 0x2, [], 0x1}, {[], @icmpv6=@time_exceed={0x21, 0x0, 0x0, 0x0, [], {0x0, 0x6, "b680fa", 0x0, 0x0, 0x0, @ipv4={[], [0xff, 0xff], @broadcast=0xffffffff}, @ipv4={[], [0xff, 0xff], @remote={0xac, 0x14, 0xffffffffffffffff, 0xbb}}}}}}}}}, 0x0) 2018/04/11 12:45:07 executing program 4: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000200)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc-cast5-avx\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00003bcfd0)="d3ab27191a", 0x5) sendmmsg$alg(r1, &(0x7f0000007e40)=[{0x0, 0x0, &(0x7f0000000900)}], 0x1, 0x0) accept(0xffffffffffffffff, &(0x7f0000000040)=@pppol2tpv3in6, &(0x7f00000000c0)=0x80) 2018/04/11 12:45:07 executing program 6: r0 = socket$inet6(0xa, 0x80003, 0xff) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @ipv4={[], [0xff, 0xff], @dev={0xac, 0x14, 0x14, 0x1b}}}, 0x1c) sendmsg(r0, &(0x7f000001b000)={0x0, 0xfffffff5, &(0x7f0000019fa0), 0x106, &(0x7f000001ef08)}, 0x0) 2018/04/11 12:45:07 executing program 1: r0 = socket(0x1e, 0x1, 0x0) setsockopt$packet_tx_ring(r0, 0x10f, 0x87, &(0x7f0000b89fe4), 0x10) sendmsg(r0, &(0x7f0000030000)={&(0x7f00004f5000)=@generic={0x10000000001e, "0014000900000000000000000226cc573c080000003724c71e14dd6a739effea1b48006be61ffe0000e103000000f8000004003f010039d8f986ff01000300000004af50d50700000000000000e3ad316a1983000000001d00e0dfcb24281e27800000100076c3979ac40000bd15020078a1dfd300881a8365b1b16d7436"}, 0x80, &(0x7f0000447ff0), 0x0, &(0x7f00006e9c68)}, 0x0) 2018/04/11 12:45:07 executing program 2: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x1e, 0x1, 0x0) setsockopt$packet_tx_ring(r0, 0x10f, 0x87, &(0x7f0000b89fe4)=@req={0x772}, 0x10) sendmsg(r0, &(0x7f0000030000)={&(0x7f00004f5000)=@generic={0x10000000001e, "0100000900000004000000000226cc573c080000003724c71e14dd6a739effea1b48006be61ffe0000e103000000f8000004003f010039d8f986ff01000300000004af50d50700000000000000e3ad316a1983000000001d00e0dfcb24281e27800000100076c3979ac40000bd15020078a1dfd300881a8365b1b16d7436"}, 0x80, &(0x7f0000447ff0), 0x0, &(0x7f00006e9c68)}, 0x0) 2018/04/11 12:45:07 executing program 0: r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$alg(0x26, 0x5, 0x0) pipe(&(0x7f0000000080)={0xffffffffffffffff}) timerfd_gettime(r2, &(0x7f00000000c0)) bind$alg(r1, &(0x7f0000000200)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc-cast5-avx\x00'}, 0x58) sigaltstack(&(0x7f0000ffb000/0x2000)=nil, &(0x7f0000000040)) r3 = accept$alg(r1, 0x0, 0x0) lremovexattr(&(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)=@known='security.evm\x00') sendto$ipx(r1, &(0x7f0000000100)="62b28379dbca789ea19822d918e811ee94b3dbd4f4e3eec12d3dbc5dbd3c2afe3c726f289c0da7c98b536210b318607ae9d05ba99f4119f175cc915a4011c5fc946fa5eee0c85237fac2637866038ba119eb652c5bacf56583303c2691975ab28407b3c5183ba3e94c47dd9af2657edafd3bdaf2b62acd6c78d29ed40c2743e6f336070b2e6ca39435ee49c72331161385c730ecfc4c905c51b46498645c4bd69a5c0ca875989614441fadeb622f7eeba6bc6fd948038661dceb7cd392604f35f35aaaca83e43ad73b065b4aa20baa9d8a", 0xd1, 0x80, 0x0, 0x0) futimesat(r2, &(0x7f0000000300)='/\x00', &(0x7f0000000340)) r4 = dup3(r0, r3, 0x0) ioctl$KVM_SET_TSC_KHZ(r4, 0xaea2, 0x6fbc) 2018/04/11 12:45:07 executing program 7: syz_emit_ethernet(0x66, &(0x7f0000000000)={@random="cd3997030f00", @empty=[0x0, 0x0, 0x0, 0xf5ffffff], [], {@ipv6={0x86dd, {0x0, 0x6, "b40900", 0x30, 0x67, 0x0, @ipv4={[], [0xff, 0xff], @multicast2=0xe0000002}, @mcast2={0xff, 0x2, [], 0x1}, {[], @icmpv6=@time_exceed={0x21, 0x0, 0x0, 0x0, [], {0x0, 0x6, "b680fa", 0x0, 0x0, 0x0, @ipv4={[], [0xff, 0xff], @broadcast=0xffffffff}, @ipv4={[], [0xff, 0xff], @remote={0xac, 0x14, 0xffffffffffffffff, 0xbb}}}}}}}}}, 0x0) 2018/04/11 12:45:07 executing program 6: r0 = socket$inet6(0xa, 0x80003, 0xff) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @ipv4={[], [0xff, 0xff], @dev={0xac, 0x14, 0x14, 0x1b}}}, 0x1c) sendmsg(r0, &(0x7f000001b000)={0x0, 0xfffffff5, &(0x7f0000019fa0), 0x122, &(0x7f000001ef08)}, 0x0) 2018/04/11 12:45:07 executing program 1: r0 = socket(0x1e, 0x1, 0x0) setsockopt$packet_tx_ring(r0, 0x10f, 0x87, &(0x7f0000b89fe4), 0x10) sendmsg(r0, &(0x7f0000030000)={&(0x7f00004f5000)=@generic={0x10000000001e, "0014000900000000000000000226cc573c080000003724c71e14dd6a739effea1b48006be61ffe0000e103000000f8000004003f010039d8f986ff01000300000004af50d50700000000000000e3ad316a1983000000001d00e0dfcb24281e27800000100076c3979ac40000bd15020078a1dfd300881a8365b1b16d7436"}, 0x80, &(0x7f0000447ff0), 0x0, &(0x7f00006e9c68)}, 0x0) 2018/04/11 12:45:07 executing program 0: r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$alg(0x26, 0x5, 0x0) r2 = dup2(r0, r1) setsockopt$inet6_MRT6_DEL_MFC(r2, 0x29, 0xcd, &(0x7f0000000280)={{0xa, 0x4e20, 0x6, @empty, 0x5}, {0xa, 0x4e24, 0x5, @mcast1={0xff, 0x1, [], 0x1}, 0x401}, 0x400, [0x6, 0x8, 0x1ff, 0x3f, 0xfffffffffffffff8, 0xffffffff, 0x43, 0x4]}, 0x5c) bind$alg(r1, &(0x7f0000000200)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc-cast5-avx\x00'}, 0x58) r3 = accept$alg(r1, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffff9c, 0x89e2, &(0x7f0000000040)={r3}) getsockopt$inet_sctp6_SCTP_MAX_BURST(0xffffffffffffffff, 0x84, 0x14, &(0x7f0000000080)=@assoc_value={0x0}, &(0x7f00000000c0)=0x8) getsockopt$inet_sctp_SCTP_PEER_AUTH_CHUNKS(r4, 0x84, 0x1a, &(0x7f0000000100)={r5, 0x78, "7725d9864da95e3539b4754e58d0cd1136b85858a4e4e6a082389a3eac40a640e94a4720e06e6a5662c8e5ed4fcd041ebfeadd06071db3c5fe9fd3f47e8dbc28f920442045d99fcb31681ca2d1508ce8a2b202fe68d3733ca9d2dcc797365d5aa3ae6f20454d3072c38f56437dd7a94570090125e894e0c0"}, &(0x7f0000000180)=0x80) dup3(r0, r3, 0x0) 2018/04/11 12:45:07 executing program 4: r0 = socket$key(0xf, 0x3, 0x2) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000000), 0x216) read(r0, &(0x7f00000001c0)=""/252, 0xfc) sendmsg$key(r0, &(0x7f0000000b00)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000001000)={0x2, 0xa, 0x0, 0x0, 0x2}, 0x10}, 0x1}, 0x0) sendmsg$key(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000040)={0x2, 0x12, 0x0, 0x0, 0x2}, 0x10}, 0x1}, 0x0) 2018/04/11 12:45:07 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) r1 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000080)='/dev/mixer\x00', 0x0, 0x0) ioctl$KDGKBSENT(r1, 0x4b48, &(0x7f00000000c0)={0x80000001, 0x1, 0x100000001}) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000000), 0x216) sendmsg$key(r0, &(0x7f0000000b00)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000001000)={0x2, 0xa, 0x0, 0x0, 0x2}, 0x10}, 0x1}, 0x0) sendmsg$key(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000040)={0x2, 0x12, 0x0, 0x0, 0x2}, 0x10}, 0x1}, 0x0) 2018/04/11 12:45:07 executing program 2: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x1e, 0x1, 0x0) setsockopt$packet_tx_ring(r0, 0x10f, 0x87, &(0x7f0000b89fe4)=@req={0x772}, 0x10) sendmsg(r0, &(0x7f0000030000)={&(0x7f00004f5000)=@generic={0x10000000001e, "0100000900000002000000000226cc573c080000003724c71e14dd6a739effea1b48006be61ffe0000e103000000f8000004003f010039d8f986ff01000300000004af50d50700000000000000e3ad316a1983000000001d00e0dfcb24281e27800000100076c3979ac40000bd15020078a1dfd300881a8365b1b16d7436"}, 0x80, &(0x7f0000447ff0), 0x0, &(0x7f00006e9c68)}, 0x0) 2018/04/11 12:45:07 executing program 7: syz_emit_ethernet(0x66, &(0x7f0000000000)={@random="cd3997030f00", @empty=[0x0, 0x0, 0x0, 0x6000000], [], {@ipv6={0x86dd, {0x0, 0x6, "b40900", 0x30, 0x67, 0x0, @ipv4={[], [0xff, 0xff], @multicast2=0xe0000002}, @mcast2={0xff, 0x2, [], 0x1}, {[], @icmpv6=@time_exceed={0x21, 0x0, 0x0, 0x0, [], {0x0, 0x6, "b680fa", 0x0, 0x0, 0x0, @ipv4={[], [0xff, 0xff], @broadcast=0xffffffff}, @ipv4={[], [0xff, 0xff], @remote={0xac, 0x14, 0xffffffffffffffff, 0xbb}}}}}}}}}, 0x0) [ 606.743679] Buffer I/O error on dev loop0, logical block 0, async page read 2018/04/11 12:45:08 executing program 3: semop(0x0, &(0x7f000001a000)=[{0x0, 0xffffffffffff0001, 0x500}, {}], 0x2) timer_create(0x0, &(0x7f0000cd0000)={0x0, 0x12}, &(0x7f0000044000)) timer_settime(0x0, 0x0, &(0x7f00004b1fe0)={{0x0, 0x1c9c380}, {0x0, 0x9}}, &(0x7f0000040000)) r0 = getpgid(0x0) tkill(r0, 0x1000000000016) 2018/04/11 12:45:08 executing program 1: r0 = socket(0x1e, 0x1, 0x0) setsockopt$packet_tx_ring(r0, 0x10f, 0x87, &(0x7f0000b89fe4)=@req={0x772}, 0x10) sendmsg(0xffffffffffffffff, &(0x7f0000030000)={&(0x7f00004f5000)=@generic={0x10000000001e, "0014000900000000000000000226cc573c080000003724c71e14dd6a739effea1b48006be61ffe0000e103000000f8000004003f010039d8f986ff01000300000004af50d50700000000000000e3ad316a1983000000001d00e0dfcb24281e27800000100076c3979ac40000bd15020078a1dfd300881a8365b1b16d7436"}, 0x80, &(0x7f0000447ff0), 0x0, &(0x7f00006e9c68)}, 0x0) 2018/04/11 12:45:08 executing program 6: r0 = socket$inet6(0xa, 0x80003, 0xff) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @ipv4={[], [0xff, 0xff], @dev={0xac, 0x14, 0x14, 0x1b}}}, 0x1c) sendmsg(r0, &(0x7f000001b000)={0x0, 0xfffffff5, &(0x7f0000019fa0), 0xed, &(0x7f000001ef08)}, 0x0) 2018/04/11 12:45:08 executing program 5: pipe2(&(0x7f0000000200), 0x80000) r0 = socket$key(0xf, 0x3, 0x2) rmdir(&(0x7f0000000300)='./file0\x00') setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000000), 0x216) sendmsg$key(r0, &(0x7f0000000b00)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000001000)={0x2, 0xa, 0x0, 0x0, 0x2}, 0x10}, 0x1}, 0x0) r1 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vga_arbiter\x00', 0x20000, 0x0) getsockopt$netrom_NETROM_T4(r1, 0x103, 0x6, &(0x7f0000000100)=0x24, &(0x7f00000001c0)=0x4) sendmsg$key(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000040)=ANY=[@ANYBLOB="b300ca1b8748ea1a0008000000000000"], 0x10}, 0x1}, 0x0) 2018/04/11 12:45:08 executing program 0: r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000200)={0x26, 'hash\x00', 0x0, 0x0, 'sha256\x00'}, 0x177) r2 = accept$alg(r1, 0x0, 0x0) r3 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/cuse\x00', 0x2, 0x0) getsockopt$inet_sctp_SCTP_PR_STREAM_STATUS(r3, 0x84, 0x74, &(0x7f0000000280)=""/4096, &(0x7f0000000080)=0x1000) r4 = dup3(r0, r2, 0x0) setsockopt$netlink_NETLINK_LISTEN_ALL_NSID(r4, 0x10e, 0x8, &(0x7f00000000c0)=0x8, 0x4) 2018/04/11 12:45:08 executing program 2: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x1e, 0x1, 0x0) setsockopt$packet_tx_ring(r0, 0x10f, 0x87, &(0x7f0000b89fe4)=@req={0x772}, 0x10) sendmsg(r0, &(0x7f0000030000)={&(0x7f00004f5000)=@generic={0x10000000001e, "01000009000000d0010100000226cc573c080000003724c71e14dd6a739effea1b48006be61ffe0000e103000000f8000004003f010039d8f986ff01000300000004af50d50700000000000000e3ad316a1983000000001d00e0dfcb24281e27800000100076c3979ac40000bd15020078a1dfd300881a8365b1b16d7436"}, 0x80, &(0x7f0000447ff0), 0x0, &(0x7f00006e9c68)}, 0x0) 2018/04/11 12:45:08 executing program 7: syz_emit_ethernet(0x66, &(0x7f0000000000)={@random="cd3997030f00", @empty=[0x0, 0x0, 0x0, 0x3580], [], {@ipv6={0x86dd, {0x0, 0x6, "b40900", 0x30, 0x67, 0x0, @ipv4={[], [0xff, 0xff], @multicast2=0xe0000002}, @mcast2={0xff, 0x2, [], 0x1}, {[], @icmpv6=@time_exceed={0x21, 0x0, 0x0, 0x0, [], {0x0, 0x6, "b680fa", 0x0, 0x0, 0x0, @ipv4={[], [0xff, 0xff], @broadcast=0xffffffff}, @ipv4={[], [0xff, 0xff], @remote={0xac, 0x14, 0xffffffffffffffff, 0xbb}}}}}}}}}, 0x0) 2018/04/11 12:45:08 executing program 4: r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000380)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc-cast5-avx\x00'}, 0x58) r2 = syz_open_dev$dspn(&(0x7f00000000c0)='/dev/dsp#\x00', 0xfffffffffffff000, 0x105100) bind$vsock_stream(r2, &(0x7f0000000100)={0x28, 0x0, 0x2711, @my=0x1}, 0x10) r3 = syz_fuseblk_mount(&(0x7f0000000040)='./file0\x00', &(0x7f0000000000)='./file0\x00', 0x4000, 0x0, 0x0, 0x0, 0x0, 0x0) getsockopt$inet_sctp_SCTP_CONTEXT(r2, 0x84, 0x11, &(0x7f0000000140)={0x0, 0x5}, &(0x7f0000000200)=0x8) getsockopt$inet_sctp_SCTP_PEER_AUTH_CHUNKS(r2, 0x84, 0x1a, &(0x7f0000000400)={r4, 0x81, "a277f0f2476bb3b5a9d85c0a520b6cea4ce6a73fe8c99d06bd8be7f85ee718a89a3ba45d1051b0f6bc606d5c51b99c4f86dc156d2978a9cd4a2729e4287ad1dcf44f8dbc967b5f148b03e38680f2aa736b1fc627532e25761a99d05ad2c5e8334ade9bed247a3a409ef9c6f0baa7e1fa76ca0bf5293a602f2d0857dcedc8bdd6d2"}, &(0x7f0000000240)=0x89) r5 = accept$alg(r2, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(r5, 0x89e2, &(0x7f0000000080)={r1}) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(r3, 0x84, 0x1a, &(0x7f00000004c0)=ANY=[@ANYRES32=0x0, @ANYBLOB="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"], &(0x7f0000000180)=0x95) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(r6, 0x84, 0x1a, &(0x7f0000000280)=ANY=[@ANYRES32=r7, @ANYBLOB="ef000000810c8dfbcf9fb595ffee29279e631d6346a525675be077ccffe4a045dff2dfe09ae73048acbdf5241614c061ffef6ae57153c49736cbd45b2b16acc8f3e6d8865dfa0535e7492abed40f43ad9238d913795057449d304bda5b77a3d6e9d7a3f28045ebfc7875ce392f6c9ef3ebd30df99b304ba7b41e3c84429d1a57d705e199764031f286a0eaff80f9361e4f02e2986d0e6ecb024e17a4ebad0b107cffcff13d79c85fac3dcae48dbd68d6b48fd03b9e268a64697631f024e02149788ce356caa43da61ed988133c58e25035f6305e1e4329a350d930b1d5ed8b6cd1edc20baa3cf822c0cf8b8096205a71dc607d"], &(0x7f00000001c0)=0xf7) dup3(r0, r5, 0x0) 2018/04/11 12:45:08 executing program 6: r0 = socket$inet6(0xa, 0x80003, 0xff) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @ipv4={[], [0xff, 0xff], @dev={0xac, 0x14, 0x14, 0x1b}}}, 0x1c) sendmsg(r0, &(0x7f000001b000)={0x0, 0xfffffff5, &(0x7f0000019fa0), 0xd5, &(0x7f000001ef08)}, 0x0) 2018/04/11 12:45:08 executing program 7: syz_emit_ethernet(0x66, &(0x7f0000000000)={@random="cd3997030f00", @empty=[0x0, 0x0, 0x0, 0x28], [], {@ipv6={0x86dd, {0x0, 0x6, "b40900", 0x30, 0x67, 0x0, @ipv4={[], [0xff, 0xff], @multicast2=0xe0000002}, @mcast2={0xff, 0x2, [], 0x1}, {[], @icmpv6=@time_exceed={0x21, 0x0, 0x0, 0x0, [], {0x0, 0x6, "b680fa", 0x0, 0x0, 0x0, @ipv4={[], [0xff, 0xff], @broadcast=0xffffffff}, @ipv4={[], [0xff, 0xff], @remote={0xac, 0x14, 0xffffffffffffffff, 0xbb}}}}}}}}}, 0x0) 2018/04/11 12:45:08 executing program 1: r0 = socket(0x1e, 0x1, 0x0) setsockopt$packet_tx_ring(r0, 0x10f, 0x87, &(0x7f0000b89fe4)=@req={0x772}, 0x10) sendmsg(0xffffffffffffffff, &(0x7f0000030000)={&(0x7f00004f5000)=@generic={0x10000000001e, "0014000900000000000000000226cc573c080000003724c71e14dd6a739effea1b48006be61ffe0000e103000000f8000004003f010039d8f986ff01000300000004af50d50700000000000000e3ad316a1983000000001d00e0dfcb24281e27800000100076c3979ac40000bd15020078a1dfd300881a8365b1b16d7436"}, 0x80, &(0x7f0000447ff0), 0x0, &(0x7f00006e9c68)}, 0x0) 2018/04/11 12:45:08 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000000), 0x216) sendmsg$key(r0, &(0x7f0000000b00)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000001000)={0x2, 0xa, 0x0, 0x0, 0x2}, 0x10}, 0x1}, 0x0) sendmsg$key(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000040)=ANY=[@ANYBLOB="021200000af9ea5e00000000000000"], 0x10}, 0x1}, 0x0) 2018/04/11 12:45:08 executing program 0: r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000200)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc-cast5-avx\x00'}, 0x58) r2 = accept$alg(r1, 0x0, 0x0) r3 = syz_open_dev$amidi(&(0x7f0000000040)='/dev/amidi#\x00', 0xfffffffffffffffa, 0x60000) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000540)={r3, &(0x7f0000000280)="c60059403d4920272e671b61d9af6d38574e5f30b6cf776c629b6daa5e7d5f1db7220194b1292dda621ab22b3b14c61d895bfb0b1dfbbddc923e4cbbafaee7a3c2fd3d45c31649e51887a5628f0bdd090ada59cda1c38be102bb10e69f117a286e090fb1b2dbb007e834e936f42802a63a05d89188ddcd4cbc86a5df28d240c045a7f8a831f55f8a21fc13a75bee74d00fc6f92264a1eb235e7326f890085727dc66de59875d6c4a73416c55f0f92ccc8c76e0e84bd8e08fc82376b6bf07dc53c865b96d181d9078d5f729e05521d90bd37f40edeb388b638f231cba5c93e86a9ee808a076fb94aa44c238dccb7e55b6763f86065e171c4711", &(0x7f0000000480)=""/129}, 0x18) getsockopt$inet_sctp6_SCTP_GET_ASSOC_STATS(0xffffffffffffffff, 0x84, 0x70, &(0x7f0000000080)={0x0, @in6={{0xa, 0x4e23, 0x4c, @dev={0xfe, 0x80, [], 0x18}, 0x8000}}, [0x5, 0x80000001, 0xffffffffffffffff, 0x977, 0x0, 0xfffffffffffff805, 0x7, 0x2, 0x982, 0x5, 0x0, 0xffffffff, 0x8, 0x304, 0x7]}, &(0x7f0000000180)=0x100) getsockopt$inet_sctp6_SCTP_GET_LOCAL_ADDRS(r3, 0x84, 0x6d, &(0x7f0000000580)=ANY=[@ANYRES32=r4, @ANYBLOB="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"], &(0x7f00000001c0)=0xd4) dup3(r0, r2, 0x0) 2018/04/11 12:45:08 executing program 2: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x1e, 0x1, 0x0) setsockopt$packet_tx_ring(r0, 0x10f, 0x87, &(0x7f0000b89fe4)=@req={0x772}, 0x10) sendmsg(r0, &(0x7f0000030000)={&(0x7f00004f5000)=@generic={0x10000000001e, "0100000900000000020000000226cc573c080000003724c71e14dd6a739effea1b48006be61ffe0000e103000000f8000004003f010039d8f986ff01000300000004af50d50700000000000000e3ad316a1983000000001d00e0dfcb24281e27800000100076c3979ac40000bd15020078a1dfd300881a8365b1b16d7436"}, 0x80, &(0x7f0000447ff0), 0x0, &(0x7f00006e9c68)}, 0x0) 2018/04/11 12:45:08 executing program 6: r0 = socket$inet6(0xa, 0x80003, 0xff) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @ipv4={[], [0xff, 0xff], @dev={0xac, 0x14, 0x14, 0x1b}}}, 0x1c) sendmsg(r0, &(0x7f000001b000)={0x0, 0xfffffff5, &(0x7f0000019fa0), 0x35, &(0x7f000001ef08)}, 0x0) 2018/04/11 12:45:08 executing program 1: r0 = socket(0x1e, 0x1, 0x0) setsockopt$packet_tx_ring(r0, 0x10f, 0x87, &(0x7f0000b89fe4)=@req={0x772}, 0x10) sendmsg(0xffffffffffffffff, &(0x7f0000030000)={&(0x7f00004f5000)=@generic={0x10000000001e, "0014000900000000000000000226cc573c080000003724c71e14dd6a739effea1b48006be61ffe0000e103000000f8000004003f010039d8f986ff01000300000004af50d50700000000000000e3ad316a1983000000001d00e0dfcb24281e27800000100076c3979ac40000bd15020078a1dfd300881a8365b1b16d7436"}, 0x80, &(0x7f0000447ff0), 0x0, &(0x7f00006e9c68)}, 0x0) 2018/04/11 12:45:09 executing program 7: syz_emit_ethernet(0x66, &(0x7f0000000000)={@random="cd3997030f00", @empty=[0x0, 0x0, 0x0, 0x800e000000000000], [], {@ipv6={0x86dd, {0x0, 0x6, "b40900", 0x30, 0x67, 0x0, @ipv4={[], [0xff, 0xff], @multicast2=0xe0000002}, @mcast2={0xff, 0x2, [], 0x1}, {[], @icmpv6=@time_exceed={0x21, 0x0, 0x0, 0x0, [], {0x0, 0x6, "b680fa", 0x0, 0x0, 0x0, @ipv4={[], [0xff, 0xff], @broadcast=0xffffffff}, @ipv4={[], [0xff, 0xff], @remote={0xac, 0x14, 0xffffffffffffffff, 0xbb}}}}}}}}}, 0x0) 2018/04/11 12:45:09 executing program 3: semop(0x0, &(0x7f000001a000)=[{0x0, 0xffffffffffff0001, 0xe00}, {}], 0x2) timer_create(0x0, &(0x7f0000cd0000)={0x0, 0x12}, &(0x7f0000044000)) timer_settime(0x0, 0x0, &(0x7f00004b1fe0)={{0x0, 0x1c9c380}, {0x0, 0x9}}, &(0x7f0000040000)) r0 = getpgid(0x0) tkill(r0, 0x1000000000016) 2018/04/11 12:45:09 executing program 6: r0 = socket$inet6(0xa, 0x80003, 0xff) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @ipv4={[], [0xff, 0xff], @dev={0xac, 0x14, 0x14, 0x1b}}}, 0x1c) sendmsg(r0, &(0x7f000001b000)={0x0, 0xfffffff5, &(0x7f0000019fa0), 0x74, &(0x7f000001ef08)}, 0x0) 2018/04/11 12:45:09 executing program 1: r0 = socket(0x1e, 0x1, 0x0) setsockopt$packet_tx_ring(r0, 0x10f, 0x87, &(0x7f0000b89fe4)=@req={0x772}, 0x10) sendmsg(r0, &(0x7f0000030000)={&(0x7f00004f5000)=@generic={0x0, "0014000900000000000000000226cc573c080000003724c71e14dd6a739effea1b48006be61ffe0000e103000000f8000004003f010039d8f986ff01000300000004af50d50700000000000000e3ad316a1983000000001d00e0dfcb24281e27800000100076c3979ac40000bd15020078a1dfd300881a8365b1b16d7436"}, 0x80, &(0x7f0000447ff0), 0x0, &(0x7f00006e9c68)}, 0x0) 2018/04/11 12:45:09 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000002c0)='hugetlb.2MB.usage_in_bytes\x00', 0x0, 0x0) getsockopt$inet_sctp_SCTP_DEFAULT_SNDINFO(0xffffffffffffff9c, 0x84, 0x22, &(0x7f0000000300)={0x8, 0x8, 0x5, 0x20, 0x0}, &(0x7f0000000340)=0x10) setsockopt$inet_sctp_SCTP_MAXSEG(r1, 0x84, 0xd, &(0x7f0000000380)=@assoc_value={r2, 0xf01f}, 0x8) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000000), 0x216) sendmsg$key(r0, &(0x7f0000000b00)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000001000)={0x2, 0xa, 0x0, 0x0, 0x2}, 0x10}, 0x1}, 0x0) r3 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/vga_arbiter\x00', 0x0, 0x0) ioctl$sock_inet_tcp_SIOCATMARK(r3, 0x8905, &(0x7f0000000240)) r4 = openat(0xffffffffffffffff, &(0x7f0000000080)='./file0\x00', 0x40, 0x4) getsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(r3, 0x84, 0x8, &(0x7f0000000200), &(0x7f0000000280)=0x4) r5 = inotify_add_watch(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x24000000) rt_sigpending(&(0x7f0000000100), 0x8) inotify_rm_watch(r4, r5) sendmsg$key(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000040)={0x2, 0x12, 0x0, 0x0, 0x2}, 0x10}, 0x1}, 0x0) 2018/04/11 12:45:09 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000200)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc-cast5-avx\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) dup3(0xffffffffffffffff, r1, 0x0) ioctl$sock_FIOGETOWN(r1, 0x8903, &(0x7f0000000000)=0x0) ioprio_set$pid(0x3, r2, 0xfffffffffffffff7) 2018/04/11 12:45:09 executing program 2: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x1e, 0x1, 0x0) setsockopt$packet_tx_ring(r0, 0x10f, 0x87, &(0x7f0000b89fe4)=@req={0x772}, 0x10) sendmsg(r0, &(0x7f0000030000)={&(0x7f00004f5000)=@generic={0x10000000001e, "0100000900000000d00101000226cc573c080000003724c71e14dd6a739effea1b48006be61ffe0000e103000000f8000004003f010039d8f986ff01000300000004af50d50700000000000000e3ad316a1983000000001d00e0dfcb24281e27800000100076c3979ac40000bd15020078a1dfd300881a8365b1b16d7436"}, 0x80, &(0x7f0000447ff0), 0x0, &(0x7f00006e9c68)}, 0x0) 2018/04/11 12:45:09 executing program 4: r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000380)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc-cast5-avx\x00'}, 0x58) r2 = syz_open_dev$dspn(&(0x7f00000000c0)='/dev/dsp#\x00', 0xfffffffffffff000, 0x105100) bind$vsock_stream(r2, &(0x7f0000000100)={0x28, 0x0, 0x2711, @my=0x1}, 0x10) r3 = syz_fuseblk_mount(&(0x7f0000000040)='./file0\x00', &(0x7f0000000000)='./file0\x00', 0x4000, 0x0, 0x0, 0x0, 0x0, 0x0) getsockopt$inet_sctp_SCTP_CONTEXT(r2, 0x84, 0x11, &(0x7f0000000140)={0x0, 0x5}, &(0x7f0000000200)=0x8) getsockopt$inet_sctp_SCTP_PEER_AUTH_CHUNKS(r2, 0x84, 0x1a, &(0x7f0000000400)={r4, 0x81, "a277f0f2476bb3b5a9d85c0a520b6cea4ce6a73fe8c99d06bd8be7f85ee718a89a3ba45d1051b0f6bc606d5c51b99c4f86dc156d2978a9cd4a2729e4287ad1dcf44f8dbc967b5f148b03e38680f2aa736b1fc627532e25761a99d05ad2c5e8334ade9bed247a3a409ef9c6f0baa7e1fa76ca0bf5293a602f2d0857dcedc8bdd6d2"}, &(0x7f0000000240)=0x89) r5 = accept$alg(r2, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(r5, 0x89e2, &(0x7f0000000080)={r1}) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(r3, 0x84, 0x1a, &(0x7f00000004c0)=ANY=[@ANYRES32=0x0, @ANYBLOB="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"], &(0x7f0000000180)=0x95) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(r6, 0x84, 0x1a, &(0x7f0000000280)=ANY=[@ANYRES32=r7, @ANYBLOB="ef000000810c8dfbcf9fb595ffee29279e631d6346a525675be077ccffe4a045dff2dfe09ae73048acbdf5241614c061ffef6ae57153c49736cbd45b2b16acc8f3e6d8865dfa0535e7492abed40f43ad9238d913795057449d304bda5b77a3d6e9d7a3f28045ebfc7875ce392f6c9ef3ebd30df99b304ba7b41e3c84429d1a57d705e199764031f286a0eaff80f9361e4f02e2986d0e6ecb024e17a4ebad0b107cffcff13d79c85fac3dcae48dbd68d6b48fd03b9e268a64697631f024e02149788ce356caa43da61ed988133c58e25035f6305e1e4329a350d930b1d5ed8b6cd1edc20baa3cf822c0cf8b8096205a71dc607d"], &(0x7f00000001c0)=0xf7) dup3(r0, r5, 0x0) 2018/04/11 12:45:10 executing program 7: syz_emit_ethernet(0x66, &(0x7f0000000000)={@random="cd3997030f00", @empty=[0x0, 0x0, 0x0, 0x4305000000000000], [], {@ipv6={0x86dd, {0x0, 0x6, "b40900", 0x30, 0x67, 0x0, @ipv4={[], [0xff, 0xff], @multicast2=0xe0000002}, @mcast2={0xff, 0x2, [], 0x1}, {[], @icmpv6=@time_exceed={0x21, 0x0, 0x0, 0x0, [], {0x0, 0x6, "b680fa", 0x0, 0x0, 0x0, @ipv4={[], [0xff, 0xff], @broadcast=0xffffffff}, @ipv4={[], [0xff, 0xff], @remote={0xac, 0x14, 0xffffffffffffffff, 0xbb}}}}}}}}}, 0x0) 2018/04/11 12:45:10 executing program 6: r0 = socket$inet6(0xa, 0x80003, 0xff) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @ipv4={[], [0xff, 0xff], @dev={0xac, 0x14, 0x14, 0x1b}}}, 0x1c) sendmsg(r0, &(0x7f000001b000)={0x0, 0xfffffff5, &(0x7f0000019fa0), 0x10d, &(0x7f000001ef08)}, 0x0) 2018/04/11 12:45:10 executing program 2: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x1e, 0x1, 0x0) setsockopt$packet_tx_ring(r0, 0x10f, 0x87, &(0x7f0000b89fe4)=@req={0x772}, 0x10) sendmsg(r0, &(0x7f0000030000)={&(0x7f00004f5000)=@generic={0x10000000001e, "0100000900000000000000020226cc573c080000003724c71e14dd6a739effea1b48006be61ffe0000e103000000f8000004003f010039d8f986ff01000300000004af50d50700000000000000e3ad316a1983000000001d00e0dfcb24281e27800000100076c3979ac40000bd15020078a1dfd300881a8365b1b16d7436"}, 0x80, &(0x7f0000447ff0), 0x0, &(0x7f00006e9c68)}, 0x0) 2018/04/11 12:45:10 executing program 1: r0 = socket(0x1e, 0x1, 0x0) setsockopt$packet_tx_ring(r0, 0x10f, 0x87, &(0x7f0000b89fe4)=@req={0x772}, 0x10) sendmsg(r0, &(0x7f0000030000)={&(0x7f00004f5000)=@generic={0x0, "0014000900000000000000000226cc573c080000003724c71e14dd6a739effea1b48006be61ffe0000e103000000f8000004003f010039d8f986ff01000300000004af50d50700000000000000e3ad316a1983000000001d00e0dfcb24281e27800000100076c3979ac40000bd15020078a1dfd300881a8365b1b16d7436"}, 0x80, &(0x7f0000447ff0), 0x0, &(0x7f00006e9c68)}, 0x0) 2018/04/11 12:45:10 executing program 0: socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) getsockopt$IPT_SO_GET_REVISION_MATCH(r0, 0x0, 0x42, &(0x7f0000000040)={'icmp6\x00'}, &(0x7f0000000080)=0x1e) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000200)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc-cast5-avx\x00'}, 0x58) r2 = accept$alg(r1, 0x0, 0x0) dup3(0xffffffffffffffff, r2, 0x0) 2018/04/11 12:45:10 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000000), 0x216) sendmsg$key(r0, &(0x7f0000000b00)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000001000)={0x2, 0xa, 0x0, 0x0, 0x2}, 0x10}, 0x1}, 0x0) ioctl$TUNGETFEATURES(r0, 0x800454cf, &(0x7f0000000080)) pipe(&(0x7f0000000200)={0xffffffffffffffff}) epoll_ctl$EPOLL_CTL_MOD(r1, 0x3, r0, &(0x7f0000000240)={0x10000000}) socketpair$inet_udp(0x2, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) accept$inet(r2, &(0x7f0000000100)={0x0, 0x0, @multicast1}, &(0x7f00000001c0)=0x10) sendmsg$key(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000040)={0x2, 0x12, 0x0, 0x0, 0x2}, 0x10}, 0x1}, 0x0) 2018/04/11 12:45:10 executing program 3: semop(0x0, &(0x7f000001a000)=[{0x0, 0xffffffffffff0001, 0x3f00}, {}], 0x2) timer_create(0x0, &(0x7f0000cd0000)={0x0, 0x12}, &(0x7f0000044000)) timer_settime(0x0, 0x0, &(0x7f00004b1fe0)={{0x0, 0x1c9c380}, {0x0, 0x9}}, &(0x7f0000040000)) r0 = getpgid(0x0) tkill(r0, 0x1000000000016) 2018/04/11 12:45:10 executing program 4: r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000380)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc-cast5-avx\x00'}, 0x58) r2 = syz_open_dev$dspn(&(0x7f00000000c0)='/dev/dsp#\x00', 0xfffffffffffff000, 0x105100) bind$vsock_stream(r2, &(0x7f0000000100)={0x28, 0x0, 0x2711, @my=0x1}, 0x10) r3 = syz_fuseblk_mount(&(0x7f0000000040)='./file0\x00', &(0x7f0000000000)='./file0\x00', 0x4000, 0x0, 0x0, 0x0, 0x0, 0x0) getsockopt$inet_sctp_SCTP_CONTEXT(r2, 0x84, 0x11, &(0x7f0000000140)={0x0, 0x5}, &(0x7f0000000200)=0x8) getsockopt$inet_sctp_SCTP_PEER_AUTH_CHUNKS(r2, 0x84, 0x1a, &(0x7f0000000400)={r4, 0x81, "a277f0f2476bb3b5a9d85c0a520b6cea4ce6a73fe8c99d06bd8be7f85ee718a89a3ba45d1051b0f6bc606d5c51b99c4f86dc156d2978a9cd4a2729e4287ad1dcf44f8dbc967b5f148b03e38680f2aa736b1fc627532e25761a99d05ad2c5e8334ade9bed247a3a409ef9c6f0baa7e1fa76ca0bf5293a602f2d0857dcedc8bdd6d2"}, &(0x7f0000000240)=0x89) r5 = accept$alg(r2, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(r5, 0x89e2, &(0x7f0000000080)={r1}) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(r3, 0x84, 0x1a, &(0x7f00000004c0)=ANY=[@ANYRES32=0x0, @ANYBLOB="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"], &(0x7f0000000180)=0x95) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(r6, 0x84, 0x1a, &(0x7f0000000280)=ANY=[@ANYRES32=r7, @ANYBLOB="ef000000810c8dfbcf9fb595ffee29279e631d6346a525675be077ccffe4a045dff2dfe09ae73048acbdf5241614c061ffef6ae57153c49736cbd45b2b16acc8f3e6d8865dfa0535e7492abed40f43ad9238d913795057449d304bda5b77a3d6e9d7a3f28045ebfc7875ce392f6c9ef3ebd30df99b304ba7b41e3c84429d1a57d705e199764031f286a0eaff80f9361e4f02e2986d0e6ecb024e17a4ebad0b107cffcff13d79c85fac3dcae48dbd68d6b48fd03b9e268a64697631f024e02149788ce356caa43da61ed988133c58e25035f6305e1e4329a350d930b1d5ed8b6cd1edc20baa3cf822c0cf8b8096205a71dc607d"], &(0x7f00000001c0)=0xf7) dup3(r0, r5, 0x0) 2018/04/11 12:45:10 executing program 6: r0 = socket$inet6(0xa, 0x80003, 0xff) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @ipv4={[], [0xff, 0xff], @dev={0xac, 0x14, 0x14, 0x1b}}}, 0x1c) sendmsg(r0, &(0x7f000001b000)={0x0, 0xfffffff5, &(0x7f0000019fa0), 0x1d5, &(0x7f000001ef08)}, 0x0) 2018/04/11 12:45:10 executing program 0: r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$alg(0x26, 0x5, 0x0) accept$alg(r1, 0x0, 0x0) bind$alg(r1, &(0x7f0000000200)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc-cast5-avx\x00'}, 0x58) r2 = accept$alg(r1, 0x0, 0x0) dup3(r0, r2, 0x0) 2018/04/11 12:45:10 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000000), 0x216) sendmsg$key(r0, &(0x7f0000000b00)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="020a00000279eb0000004d0000000000b7382c4f625b95943a47a6b635f6033a5d3e1f8807962236ddfcdd791734a5ad0cb3f16404a93fb6777317196d5ee75b079102cf87f2fe615b89a414e1115d61542e0887cdd03bc1ded69628c26cacf336e8ad5b30f28090bebacbee9b51a1298657e6ea80016316"], 0x10}, 0x1}, 0x0) sendmsg$key(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000040)={0x2, 0x12, 0x0, 0x0, 0x2}, 0x10}, 0x1}, 0x0) 2018/04/11 12:45:10 executing program 1: r0 = socket(0x1e, 0x1, 0x0) setsockopt$packet_tx_ring(r0, 0x10f, 0x87, &(0x7f0000b89fe4)=@req={0x772}, 0x10) sendmsg(r0, &(0x7f0000030000)={&(0x7f00004f5000)=@generic={0x0, "0014000900000000000000000226cc573c080000003724c71e14dd6a739effea1b48006be61ffe0000e103000000f8000004003f010039d8f986ff01000300000004af50d50700000000000000e3ad316a1983000000001d00e0dfcb24281e27800000100076c3979ac40000bd15020078a1dfd300881a8365b1b16d7436"}, 0x80, &(0x7f0000447ff0), 0x0, &(0x7f00006e9c68)}, 0x0) 2018/04/11 12:45:10 executing program 7: syz_emit_ethernet(0x66, &(0x7f0000000000)={@random="cd3997030f00", @empty=[0x0, 0x0, 0x0, 0xb00000000000000], [], {@ipv6={0x86dd, {0x0, 0x6, "b40900", 0x30, 0x67, 0x0, @ipv4={[], [0xff, 0xff], @multicast2=0xe0000002}, @mcast2={0xff, 0x2, [], 0x1}, {[], @icmpv6=@time_exceed={0x21, 0x0, 0x0, 0x0, [], {0x0, 0x6, "b680fa", 0x0, 0x0, 0x0, @ipv4={[], [0xff, 0xff], @broadcast=0xffffffff}, @ipv4={[], [0xff, 0xff], @remote={0xac, 0x14, 0xffffffffffffffff, 0xbb}}}}}}}}}, 0x0) 2018/04/11 12:45:10 executing program 4: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000380)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc-cast5-avx\x00'}, 0x58) r1 = syz_open_dev$dspn(&(0x7f00000000c0)='/dev/dsp#\x00', 0xfffffffffffff000, 0x105100) bind$vsock_stream(r1, &(0x7f0000000100)={0x28, 0x0, 0x2711, @my=0x1}, 0x10) r2 = syz_fuseblk_mount(&(0x7f0000000040)='./file0\x00', &(0x7f0000000000)='./file0\x00', 0x4000, 0x0, 0x0, 0x0, 0x0, 0x0) getsockopt$inet_sctp_SCTP_CONTEXT(r1, 0x84, 0x11, &(0x7f0000000140)={0x0, 0x5}, &(0x7f0000000200)=0x8) getsockopt$inet_sctp_SCTP_PEER_AUTH_CHUNKS(r1, 0x84, 0x1a, &(0x7f0000000400)={r3, 0x81, "a277f0f2476bb3b5a9d85c0a520b6cea4ce6a73fe8c99d06bd8be7f85ee718a89a3ba45d1051b0f6bc606d5c51b99c4f86dc156d2978a9cd4a2729e4287ad1dcf44f8dbc967b5f148b03e38680f2aa736b1fc627532e25761a99d05ad2c5e8334ade9bed247a3a409ef9c6f0baa7e1fa76ca0bf5293a602f2d0857dcedc8bdd6d2"}, &(0x7f0000000240)=0x89) r4 = accept$alg(r1, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(r4, 0x89e2, &(0x7f0000000080)={r0}) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(r2, 0x84, 0x1a, &(0x7f00000004c0)=ANY=[@ANYRES32=0x0, @ANYBLOB="8d000000c01d28a675f6975bf98f3b9810f735bc854bb918e1aebb92ba9a11b9b37cf8af44b1e1ab003b27481d19a483029e744f79d49f044ba233de53d2004276a836ad7af5c5a3dc85fcb4dcd3f68142e95957bfa13a01c8de108b6de651fbf46ae624fb3dcedcef57783deb7115ebf9aa155b15c17fc23e55d11ba6450feb4c20bc58ea91dd240de3c33db92a075a46844823458179d6a18b392ed11b579cf273de4f81a74475b38db40e6aba4464fe73828e1b7b2d6c26be1355b5aa37ad1fc7ba8c86fcd67e2a1ae1fbc21c07eb995ad82b02b884cedc31603895db3c8e3d2748afddfb40e0c2a27b8d97987050dc00ba3c91284f37464231e7b2fb73feb61cd6188dfb3a67c94ad489"], &(0x7f0000000180)=0x95) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(r5, 0x84, 0x1a, &(0x7f0000000280)=ANY=[@ANYRES32=r6, @ANYBLOB="ef000000810c8dfbcf9fb595ffee29279e631d6346a525675be077ccffe4a045dff2dfe09ae73048acbdf5241614c061ffef6ae57153c49736cbd45b2b16acc8f3e6d8865dfa0535e7492abed40f43ad9238d913795057449d304bda5b77a3d6e9d7a3f28045ebfc7875ce392f6c9ef3ebd30df99b304ba7b41e3c84429d1a57d705e199764031f286a0eaff80f9361e4f02e2986d0e6ecb024e17a4ebad0b107cffcff13d79c85fac3dcae48dbd68d6b48fd03b9e268a64697631f024e02149788ce356caa43da61ed988133c58e25035f6305e1e4329a350d930b1d5ed8b6cd1edc20baa3cf822c0cf8b8096205a71dc607d"], &(0x7f00000001c0)=0xf7) 2018/04/11 12:45:10 executing program 2: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x1e, 0x1, 0x0) setsockopt$packet_tx_ring(r0, 0x10f, 0x87, &(0x7f0000b89fe4)=@req={0x772}, 0x10) sendmsg(r0, &(0x7f0000030000)={&(0x7f00004f5000)=@generic={0x10000000001e, "0100000900000000000004000226cc573c080000003724c71e14dd6a739effea1b48006be61ffe0000e103000000f8000004003f010039d8f986ff01000300000004af50d50700000000000000e3ad316a1983000000001d00e0dfcb24281e27800000100076c3979ac40000bd15020078a1dfd300881a8365b1b16d7436"}, 0x80, &(0x7f0000447ff0), 0x0, &(0x7f00006e9c68)}, 0x0) 2018/04/11 12:45:11 executing program 6: r0 = socket$inet6(0xa, 0x80003, 0xff) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @ipv4={[], [0xff, 0xff], @dev={0xac, 0x14, 0x14, 0x1b}}}, 0x1c) sendmsg(r0, &(0x7f000001b000)={0x0, 0xfffffff5, &(0x7f0000019fa0), 0xa6, &(0x7f000001ef08)}, 0x0) 2018/04/11 12:45:11 executing program 1 (fault-call:2 fault-nth:0): r0 = socket(0x1e, 0x1, 0x0) setsockopt$packet_tx_ring(r0, 0x10f, 0x87, &(0x7f0000b89fe4)=@req={0x772}, 0x10) sendmsg(r0, &(0x7f0000030000)={&(0x7f00004f5000)=@generic={0x10000000001e, "0014000900000000000000000226cc573c080000003724c71e14dd6a739effea1b48006be61ffe0000e103000000f8000004003f010039d8f986ff01000300000004af50d50700000000000000e3ad316a1983000000001d00e0dfcb24281e27800000100076c3979ac40000bd15020078a1dfd300881a8365b1b16d7436"}, 0x80, &(0x7f0000447ff0), 0x0, &(0x7f00006e9c68)}, 0x0) 2018/04/11 12:45:11 executing program 0: r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000200)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc-cast5-avx\x00'}, 0x58) r2 = creat(&(0x7f0000000040)='./file0\x00', 0x40) getsockopt$inet_sctp_SCTP_ASSOCINFO(0xffffffffffffff9c, 0x84, 0x1, &(0x7f0000000080)={0x0, 0x2, 0x2, 0xa38a, 0x20, 0x3}, &(0x7f00000000c0)=0x14) getsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX3(r2, 0x84, 0x6f, &(0x7f00000001c0)={r3, 0xbc, &(0x7f0000000100)=[@in6={0xa, 0x4e22, 0x5, @local={0xfe, 0x80, [], 0xaa}, 0x8}, @in6={0xa, 0x4e20, 0x1, @remote={0xfe, 0x80, [], 0xbb}, 0x5}, @in6={0xa, 0x4e23, 0xffff, @loopback={0x0, 0x1}, 0x3}, @in6={0xa, 0x4e23, 0x200, @remote={0xfe, 0x80, [], 0xbb}, 0x33}, @in={0x2, 0x4e22, @broadcast=0xffffffff}, @in={0x2, 0x4e24, @local={0xac, 0x14, 0x14, 0xaa}}, @in6={0xa, 0x4e24, 0x8001, @ipv4={[], [0xff, 0xff], @multicast2=0xe0000002}, 0x1}, @in={0x2, 0x4e24, @local={0xac, 0x14, 0x14, 0xaa}}]}, &(0x7f0000000280)=0x10) r4 = accept$alg(r1, 0x0, 0x0) dup3(r0, r4, 0x0) 2018/04/11 12:45:11 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer\x00', 0x8000, 0x0) ioctl$SNDRV_TIMER_IOCTL_GINFO(r1, 0xc0f85403, &(0x7f00000001c0)={{0x3, 0x3, 0xffff, 0x2, 0x7fffffff}, 0xf66, 0x2, 'id0\x00', 'timer1\x00', 0x0, 0x1, 0xffff, 0x7, 0xfffffffffffffffc}) connect$rds(r1, &(0x7f0000000100)={0x2, 0x4e22}, 0x10) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000000), 0x216) sendmsg$key(r0, &(0x7f0000000b00)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000001000)={0x2, 0xa, 0x0, 0x0, 0x2}, 0x10}, 0x1}, 0x0) getpeername$packet(r1, &(0x7f00000006c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @link_local}, &(0x7f0000000700)=0x14) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000740)={'nr0\x00', r2}) readlink(&(0x7f00000000c0)='./file0\x00', &(0x7f00000002c0)=""/122, 0x7a) sendmsg$key(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000040)={0x2, 0x12, 0x0, 0x0, 0x2}, 0x10}, 0x1}, 0x0) 2018/04/11 12:45:11 executing program 7: syz_emit_ethernet(0x66, &(0x7f0000000000)={@random="cd3997030f00", @empty=[0x0, 0x0, 0x0, 0xb000000], [], {@ipv6={0x86dd, {0x0, 0x6, "b40900", 0x30, 0x67, 0x0, @ipv4={[], [0xff, 0xff], @multicast2=0xe0000002}, @mcast2={0xff, 0x2, [], 0x1}, {[], @icmpv6=@time_exceed={0x21, 0x0, 0x0, 0x0, [], {0x0, 0x6, "b680fa", 0x0, 0x0, 0x0, @ipv4={[], [0xff, 0xff], @broadcast=0xffffffff}, @ipv4={[], [0xff, 0xff], @remote={0xac, 0x14, 0xffffffffffffffff, 0xbb}}}}}}}}}, 0x0) 2018/04/11 12:45:11 executing program 2: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x1e, 0x1, 0x0) setsockopt$packet_tx_ring(r0, 0x10f, 0x87, &(0x7f0000b89fe4)=@req={0x772}, 0x10) sendmsg(r0, &(0x7f0000030000)={&(0x7f00004f5000)=@generic={0x10000000001e, "0100000900000000000101d00226cc573c080000003724c71e14dd6a739effea1b48006be61ffe0000e103000000f8000004003f010039d8f986ff01000300000004af50d50700000000000000e3ad316a1983000000001d00e0dfcb24281e27800000100076c3979ac40000bd15020078a1dfd300881a8365b1b16d7436"}, 0x80, &(0x7f0000447ff0), 0x0, &(0x7f00006e9c68)}, 0x0) 2018/04/11 12:45:11 executing program 3: semop(0x0, &(0x7f000001a000)=[{0x0, 0xffffffffffff0001, 0x5}, {}], 0x2) timer_create(0x0, &(0x7f0000cd0000)={0x0, 0x12}, &(0x7f0000044000)) timer_settime(0x0, 0x0, &(0x7f00004b1fe0)={{0x0, 0x1c9c380}, {0x0, 0x9}}, &(0x7f0000040000)) r0 = getpgid(0x0) tkill(r0, 0x1000000000016) 2018/04/11 12:45:11 executing program 4: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000380)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc-cast5-avx\x00'}, 0x58) r1 = syz_open_dev$dspn(&(0x7f00000000c0)='/dev/dsp#\x00', 0xfffffffffffff000, 0x105100) bind$vsock_stream(r1, &(0x7f0000000100)={0x28, 0x0, 0x2711, @my=0x1}, 0x10) r2 = syz_fuseblk_mount(&(0x7f0000000040)='./file0\x00', &(0x7f0000000000)='./file0\x00', 0x4000, 0x0, 0x0, 0x0, 0x0, 0x0) getsockopt$inet_sctp_SCTP_CONTEXT(r1, 0x84, 0x11, &(0x7f0000000140)={0x0, 0x5}, &(0x7f0000000200)=0x8) getsockopt$inet_sctp_SCTP_PEER_AUTH_CHUNKS(r1, 0x84, 0x1a, &(0x7f0000000400)={r3, 0x81, "a277f0f2476bb3b5a9d85c0a520b6cea4ce6a73fe8c99d06bd8be7f85ee718a89a3ba45d1051b0f6bc606d5c51b99c4f86dc156d2978a9cd4a2729e4287ad1dcf44f8dbc967b5f148b03e38680f2aa736b1fc627532e25761a99d05ad2c5e8334ade9bed247a3a409ef9c6f0baa7e1fa76ca0bf5293a602f2d0857dcedc8bdd6d2"}, &(0x7f0000000240)=0x89) r4 = accept$alg(r1, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(r4, 0x89e2, &(0x7f0000000080)={r0}) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(r2, 0x84, 0x1a, &(0x7f00000004c0)=ANY=[@ANYRES32=0x0, @ANYBLOB="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"], &(0x7f0000000180)=0x95) 2018/04/11 12:45:11 executing program 6: r0 = socket$inet6(0xa, 0x80003, 0xff) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @ipv4={[], [0xff, 0xff], @dev={0xac, 0x14, 0x14, 0x1b}}}, 0x1c) sendmsg(r0, &(0x7f000001b000)={0x0, 0xfffffff5, &(0x7f0000019fa0), 0xbe, &(0x7f000001ef08)}, 0x0) 2018/04/11 12:45:11 executing program 7: syz_emit_ethernet(0x66, &(0x7f0000000000)={@random="cd3997030f00", @empty=[0x0, 0x0, 0x0, 0x8100], [], {@ipv6={0x86dd, {0x0, 0x6, "b40900", 0x30, 0x67, 0x0, @ipv4={[], [0xff, 0xff], @multicast2=0xe0000002}, @mcast2={0xff, 0x2, [], 0x1}, {[], @icmpv6=@time_exceed={0x21, 0x0, 0x0, 0x0, [], {0x0, 0x6, "b680fa", 0x0, 0x0, 0x0, @ipv4={[], [0xff, 0xff], @broadcast=0xffffffff}, @ipv4={[], [0xff, 0xff], @remote={0xac, 0x14, 0xffffffffffffffff, 0xbb}}}}}}}}}, 0x0) 2018/04/11 12:45:11 executing program 1: r0 = socket(0x1e, 0x1, 0x0) setsockopt$packet_tx_ring(r0, 0x10f, 0x87, &(0x7f0000b89fe4)=@req={0x772}, 0x10) sendmsg(r0, &(0x7f0000030000)={&(0x7f00004f5000)=@generic={0x10000000001e, "0014000900000000000000000226cc573c080000003724c71e14dd6a739effea1b48006be61ffe0000e103000000f8000004003f010039d8f986ff01000300000004af50d50700000000000000e3ad316a1983000000001d00e0dfcb24281e27800000100076c3979ac40000bd15020078a1dfd300881a8365b1b16d7436"}, 0x80, &(0x7f0000447ff0), 0x0, &(0x7f00006e9c68)}, 0x0) 2018/04/11 12:45:11 executing program 0: r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000200)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc-cast5-avx\x00'}, 0x58) r2 = accept$alg(r1, 0x0, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='cpuacct.usage_all\x00', 0x0, 0x0) getsockopt$netrom_NETROM_IDLE(r3, 0x103, 0x7, &(0x7f0000000080), &(0x7f00000000c0)=0x4) dup3(r0, r2, 0x0) 2018/04/11 12:45:11 executing program 4: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000380)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc-cast5-avx\x00'}, 0x58) r1 = syz_open_dev$dspn(&(0x7f00000000c0)='/dev/dsp#\x00', 0xfffffffffffff000, 0x105100) bind$vsock_stream(r1, &(0x7f0000000100)={0x28, 0x0, 0x2711, @my=0x1}, 0x10) syz_fuseblk_mount(&(0x7f0000000040)='./file0\x00', &(0x7f0000000000)='./file0\x00', 0x4000, 0x0, 0x0, 0x0, 0x0, 0x0) getsockopt$inet_sctp_SCTP_CONTEXT(r1, 0x84, 0x11, &(0x7f0000000140)={0x0, 0x5}, &(0x7f0000000200)=0x8) getsockopt$inet_sctp_SCTP_PEER_AUTH_CHUNKS(r1, 0x84, 0x1a, &(0x7f0000000400)={r2, 0x81, "a277f0f2476bb3b5a9d85c0a520b6cea4ce6a73fe8c99d06bd8be7f85ee718a89a3ba45d1051b0f6bc606d5c51b99c4f86dc156d2978a9cd4a2729e4287ad1dcf44f8dbc967b5f148b03e38680f2aa736b1fc627532e25761a99d05ad2c5e8334ade9bed247a3a409ef9c6f0baa7e1fa76ca0bf5293a602f2d0857dcedc8bdd6d2"}, &(0x7f0000000240)=0x89) r3 = accept$alg(r1, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(r3, 0x89e2, &(0x7f0000000080)={r0}) 2018/04/11 12:45:11 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) setsockopt$sock_int(r0, 0x1, 0x2d, &(0x7f0000000000), 0xc2518e4a732ba834) sendmsg$key(r0, &(0x7f0000000b00)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000001000)={0x2, 0xa, 0x0, 0x0, 0x2}, 0x10}, 0x1}, 0x0) sendmsg$key(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000040)={0x2, 0x12, 0x0, 0x0, 0x2}, 0x10}, 0x1}, 0x0) socketpair(0x2, 0x1, 0x80000000, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$EVIOCSABS2F(r1, 0x401845ef, &(0x7f00000000c0)={0x1, 0x3, 0xf985, 0x1, 0x5, 0x1d}) 2018/04/11 12:45:11 executing program 2: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x1e, 0x1, 0x0) setsockopt$packet_tx_ring(r0, 0x10f, 0x87, &(0x7f0000b89fe4)=@req={0x772}, 0x10) sendmsg(r0, &(0x7f0000030000)={&(0x7f00004f5000)=@generic={0x10000000001e, "01000009000000007fffffff0226cc573c080000003724c71e14dd6a739effea1b48006be61ffe0000e103000000f8000004003f010039d8f986ff01000300000004af50d50700000000000000e3ad316a1983000000001d00e0dfcb24281e27800000100076c3979ac40000bd15020078a1dfd300881a8365b1b16d7436"}, 0x80, &(0x7f0000447ff0), 0x0, &(0x7f00006e9c68)}, 0x0) 2018/04/11 12:45:12 executing program 7: syz_emit_ethernet(0x66, &(0x7f0000000000)={@random="cd3997030f00", @empty=[0x0, 0x0, 0x0, 0x8848], [], {@ipv6={0x86dd, {0x0, 0x6, "b40900", 0x30, 0x67, 0x0, @ipv4={[], [0xff, 0xff], @multicast2=0xe0000002}, @mcast2={0xff, 0x2, [], 0x1}, {[], @icmpv6=@time_exceed={0x21, 0x0, 0x0, 0x0, [], {0x0, 0x6, "b680fa", 0x0, 0x0, 0x0, @ipv4={[], [0xff, 0xff], @broadcast=0xffffffff}, @ipv4={[], [0xff, 0xff], @remote={0xac, 0x14, 0xffffffffffffffff, 0xbb}}}}}}}}}, 0x0) 2018/04/11 12:45:12 executing program 6: r0 = socket$inet6(0xa, 0x80003, 0xff) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @ipv4={[], [0xff, 0xff], @dev={0xac, 0x14, 0x14, 0x1b}}}, 0x1c) sendmsg(r0, &(0x7f000001b000)={0x0, 0xfffffff5, &(0x7f0000019fa0), 0x1a3, &(0x7f000001ef08)}, 0x0) 2018/04/11 12:45:12 executing program 1: r0 = socket(0x1e, 0x1, 0x0) setsockopt$packet_tx_ring(r0, 0x10f, 0x87, &(0x7f0000b89fe4)=@req={0x772}, 0x10) sendmsg(r0, &(0x7f0000030000)={&(0x7f00004f5000)=@generic={0x10000000001e, "0214000900000000000000000226cc573c080000003724c71e14dd6a739effea1b48006be61ffe0000e103000000f8000004003f010039d8f986ff01000300000004af50d50700000000000000e3ad316a1983000000001d00e0dfcb24281e27800000100076c3979ac40000bd15020078a1dfd300881a8365b1b16d7436"}, 0x80, &(0x7f0000447ff0), 0x0, &(0x7f00006e9c68)}, 0x0) 2018/04/11 12:45:12 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x1, 0x4) setsockopt$bt_BT_CHANNEL_POLICY(r0, 0x112, 0xa, &(0x7f0000000080)=0x3, 0x4) r1 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000200)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc-cast5-avx\x00'}, 0x58) r3 = accept$alg(r2, 0x0, 0x0) dup2(r0, r3) dup3(r1, r3, 0x0) 2018/04/11 12:45:12 executing program 4: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000380)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc-cast5-avx\x00'}, 0x58) r1 = syz_open_dev$dspn(&(0x7f00000000c0)='/dev/dsp#\x00', 0xfffffffffffff000, 0x105100) bind$vsock_stream(r1, &(0x7f0000000100)={0x28, 0x0, 0x2711, @my=0x1}, 0x10) syz_fuseblk_mount(&(0x7f0000000040)='./file0\x00', &(0x7f0000000000)='./file0\x00', 0x4000, 0x0, 0x0, 0x0, 0x0, 0x0) getsockopt$inet_sctp_SCTP_CONTEXT(r1, 0x84, 0x11, &(0x7f0000000140)={0x0, 0x5}, &(0x7f0000000200)=0x8) getsockopt$inet_sctp_SCTP_PEER_AUTH_CHUNKS(r1, 0x84, 0x1a, &(0x7f0000000400)={r2, 0x81, "a277f0f2476bb3b5a9d85c0a520b6cea4ce6a73fe8c99d06bd8be7f85ee718a89a3ba45d1051b0f6bc606d5c51b99c4f86dc156d2978a9cd4a2729e4287ad1dcf44f8dbc967b5f148b03e38680f2aa736b1fc627532e25761a99d05ad2c5e8334ade9bed247a3a409ef9c6f0baa7e1fa76ca0bf5293a602f2d0857dcedc8bdd6d2"}, &(0x7f0000000240)=0x89) accept$alg(r1, 0x0, 0x0) 2018/04/11 12:45:12 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000000), 0x216) sendmsg$key(r0, &(0x7f0000000b00)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000001000)={0x2, 0xa, 0x0, 0x0, 0x2}, 0x10}, 0x1}, 0x0) ustat(0x0, &(0x7f00000000c0)) sendmsg$key(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000040)={0x2, 0x12, 0x0, 0x0, 0x2}, 0x10}, 0x1}, 0x0) r1 = dup(r0) bind$vsock_dgram(r1, &(0x7f0000000080)={0x28, 0x0, 0x2710, @reserved=0x1}, 0x10) 2018/04/11 12:45:12 executing program 3: semop(0x0, &(0x7f000001a000)=[{0x0, 0xffffffffffff0001, 0xe00000000000000}, {}], 0x2) timer_create(0x0, &(0x7f0000cd0000)={0x0, 0x12}, &(0x7f0000044000)) timer_settime(0x0, 0x0, &(0x7f00004b1fe0)={{0x0, 0x1c9c380}, {0x0, 0x9}}, &(0x7f0000040000)) r0 = getpgid(0x0) tkill(r0, 0x1000000000016) 2018/04/11 12:45:12 executing program 2: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x1e, 0x1, 0x0) setsockopt$packet_tx_ring(r0, 0x10f, 0x87, &(0x7f0000b89fe4)=@req={0x772}, 0x10) sendmsg(r0, &(0x7f0000030000)={&(0x7f00004f5000)=@generic={0x10000000001e, "0100000900000000040000000226cc573c080000003724c71e14dd6a739effea1b48006be61ffe0000e103000000f8000004003f010039d8f986ff01000300000004af50d50700000000000000e3ad316a1983000000001d00e0dfcb24281e27800000100076c3979ac40000bd15020078a1dfd300881a8365b1b16d7436"}, 0x80, &(0x7f0000447ff0), 0x0, &(0x7f00006e9c68)}, 0x0) 2018/04/11 12:45:12 executing program 6: r0 = socket$inet6(0xa, 0x80003, 0xff) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @ipv4={[], [0xff, 0xff], @dev={0xac, 0x14, 0x14, 0x1b}}}, 0x1c) sendmsg(r0, &(0x7f000001b000)={0x0, 0xfffffff5, &(0x7f0000019fa0), 0xbc, &(0x7f000001ef08)}, 0x0) 2018/04/11 12:45:12 executing program 7: syz_emit_ethernet(0x66, &(0x7f0000000000)={@random="cd3997030f00", @empty=[0x0, 0x0, 0x0, 0x689], [], {@ipv6={0x86dd, {0x0, 0x6, "b40900", 0x30, 0x67, 0x0, @ipv4={[], [0xff, 0xff], @multicast2=0xe0000002}, @mcast2={0xff, 0x2, [], 0x1}, {[], @icmpv6=@time_exceed={0x21, 0x0, 0x0, 0x0, [], {0x0, 0x6, "b680fa", 0x0, 0x0, 0x0, @ipv4={[], [0xff, 0xff], @broadcast=0xffffffff}, @ipv4={[], [0xff, 0xff], @remote={0xac, 0x14, 0xffffffffffffffff, 0xbb}}}}}}}}}, 0x0) 2018/04/11 12:45:12 executing program 4: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000380)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc-cast5-avx\x00'}, 0x58) r1 = syz_open_dev$dspn(&(0x7f00000000c0)='/dev/dsp#\x00', 0xfffffffffffff000, 0x105100) bind$vsock_stream(r1, &(0x7f0000000100)={0x28, 0x0, 0x2711, @my=0x1}, 0x10) syz_fuseblk_mount(&(0x7f0000000040)='./file0\x00', &(0x7f0000000000)='./file0\x00', 0x4000, 0x0, 0x0, 0x0, 0x0, 0x0) getsockopt$inet_sctp_SCTP_CONTEXT(r1, 0x84, 0x11, &(0x7f0000000140)={0x0, 0x5}, &(0x7f0000000200)=0x8) getsockopt$inet_sctp_SCTP_PEER_AUTH_CHUNKS(r1, 0x84, 0x1a, &(0x7f0000000400)={r2, 0x81, "a277f0f2476bb3b5a9d85c0a520b6cea4ce6a73fe8c99d06bd8be7f85ee718a89a3ba45d1051b0f6bc606d5c51b99c4f86dc156d2978a9cd4a2729e4287ad1dcf44f8dbc967b5f148b03e38680f2aa736b1fc627532e25761a99d05ad2c5e8334ade9bed247a3a409ef9c6f0baa7e1fa76ca0bf5293a602f2d0857dcedc8bdd6d2"}, &(0x7f0000000240)=0x89) 2018/04/11 12:45:12 executing program 2: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x1e, 0x1, 0x0) setsockopt$packet_tx_ring(r0, 0x10f, 0x87, &(0x7f0000b89fe4)=@req={0x772}, 0x10) sendmsg(r0, &(0x7f0000030000)={&(0x7f00004f5000)=@generic={0x10000000001e, "0100000900000000000000000126cc573c080000003724c71e14dd6a739effea1b48006be61ffe0000e103000000f8000004003f010039d8f986ff01000300000004af50d50700000000000000e3ad316a1983000000001d00e0dfcb24281e27800000100076c3979ac40000bd15020078a1dfd300881a8365b1b16d7436"}, 0x80, &(0x7f0000447ff0), 0x0, &(0x7f00006e9c68)}, 0x0) 2018/04/11 12:45:12 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) r1 = openat$mixer(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/mixer\x00', 0x400000, 0x0) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r1, 0xc08c5332, &(0x7f00000002c0)={0x8, 0x8, 0x4, 'queue1\x00', 0x5}) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000000), 0x216) sendmsg$key(r0, &(0x7f0000000b00)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000001000)={0x2, 0xa, 0x0, 0x0, 0x2}, 0x10}, 0x1}, 0x0) ioctl$KDMKTONE(r1, 0x4b30, 0x5) r2 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000080)='/dev/mixer\x00', 0x262000, 0x0) setsockopt$inet6_tcp_TCP_MD5SIG(r2, 0x6, 0xe, &(0x7f00000001c0)={@in={{0x2, 0x4e22, @multicast2=0xe0000002}}, 0x9, 0x3, 0x8, "2357ba0484aff419dfbc331bea761bff6edf07d65f87a9cc7bede9daf942bb8cad96e25030b13ed5ff98ee2b081e5b5e7f99ccc41c0b6355029628ebf45a66cec7294617f265fad471acadb422389d78"}, 0xd8) sendmsg$key(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000040)={0x2, 0x12, 0x0, 0x0, 0x2}, 0x10}, 0x1}, 0x0) 2018/04/11 12:45:12 executing program 1: r0 = socket(0x1e, 0x1, 0x0) setsockopt$packet_tx_ring(r0, 0x10f, 0x87, &(0x7f0000b89fe4)=@req={0x772}, 0x10) sendmsg(r0, &(0x7f0000030000)={&(0x7f00004f5000)=@generic={0x10000000001e, "0314000900000000000000000226cc573c080000003724c71e14dd6a739effea1b48006be61ffe0000e103000000f8000004003f010039d8f986ff01000300000004af50d50700000000000000e3ad316a1983000000001d00e0dfcb24281e27800000100076c3979ac40000bd15020078a1dfd300881a8365b1b16d7436"}, 0x80, &(0x7f0000447ff0), 0x0, &(0x7f00006e9c68)}, 0x0) 2018/04/11 12:45:12 executing program 0: r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$alg(0x26, 0x5, 0x0) r2 = syz_open_dev$sg(&(0x7f00000000c0)='/dev/sg#\x00', 0x7ff, 0x20000) ioctl$sock_SIOCSIFBR(r2, 0x8941, &(0x7f0000000140)=@add_del={0x2, &(0x7f0000000100)='bridge0\x00', 0x4}) bind$alg(r1, &(0x7f0000000040)={0x26, 'aead\x00', 0x0, 0x0, 'ccm(des-generic)\x00'}, 0x58) r3 = accept$alg(r1, 0x0, 0x0) write$binfmt_aout(r2, &(0x7f0000000180)={{0x107, 0x7, 0x0, 0x25a, 0xb1, 0x5, 0x33, 0x1}, "dc79bcfafa68be6baf8443a7ba449961e98610e84653942e53fe1df6ed7e90aa9c439b131a60702e9e9a568efa4388a1072f08e92b8eed32c478416c71b2854577cb828d830d496a084eb3825d30e987bd356a2fd2afffd5022bc7a84312027b16cbb4acfa6e7ef3640a66eab12a075eeb47efb19208f224c1bafc3bff06f31762346e60bf"}, 0xa5) dup3(r0, r3, 0x0) 2018/04/11 12:45:12 executing program 6: r0 = socket$inet6(0xa, 0x80003, 0xff) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @ipv4={[], [0xff, 0xff], @dev={0xac, 0x14, 0x14, 0x1b}}}, 0x1c) sendmsg(r0, &(0x7f000001b000)={0x0, 0xfffffff5, &(0x7f0000019fa0), 0x14f, &(0x7f000001ef08)}, 0x0) 2018/04/11 12:45:12 executing program 7: syz_emit_ethernet(0x66, &(0x7f0000000000)={@random="cd3997030f00", @empty=[0x0, 0x0, 0x0, 0x4888], [], {@ipv6={0x86dd, {0x0, 0x6, "b40900", 0x30, 0x67, 0x0, @ipv4={[], [0xff, 0xff], @multicast2=0xe0000002}, @mcast2={0xff, 0x2, [], 0x1}, {[], @icmpv6=@time_exceed={0x21, 0x0, 0x0, 0x0, [], {0x0, 0x6, "b680fa", 0x0, 0x0, 0x0, @ipv4={[], [0xff, 0xff], @broadcast=0xffffffff}, @ipv4={[], [0xff, 0xff], @remote={0xac, 0x14, 0xffffffffffffffff, 0xbb}}}}}}}}}, 0x0) 2018/04/11 12:45:12 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000000), 0x216) sendmsg$key(r0, &(0x7f0000000b00)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000001000)=ANY=[@ANYBLOB="f57065ab"], 0x10}, 0x1}, 0x0) sendmsg$key(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000040)={0x2, 0x12, 0x0, 0x0, 0x2}, 0x10}, 0x1}, 0x0) 2018/04/11 12:45:12 executing program 1: r0 = socket(0x1e, 0x1, 0x0) setsockopt$packet_tx_ring(r0, 0x10f, 0x87, &(0x7f0000b89fe4)=@req={0x772}, 0x10) sendmsg(r0, &(0x7f0000030000)={&(0x7f00004f5000)=@generic={0x10000000001e, "0014020900000000000000000226cc573c080000003724c71e14dd6a739effea1b48006be61ffe0000e103000000f8000004003f010039d8f986ff01000300000004af50d50700000000000000e3ad316a1983000000001d00e0dfcb24281e27800000100076c3979ac40000bd15020078a1dfd300881a8365b1b16d7436"}, 0x80, &(0x7f0000447ff0), 0x0, &(0x7f00006e9c68)}, 0x0) 2018/04/11 12:45:13 executing program 4: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000380)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc-cast5-avx\x00'}, 0x58) r1 = syz_open_dev$dspn(&(0x7f00000000c0)='/dev/dsp#\x00', 0xfffffffffffff000, 0x105100) bind$vsock_stream(r1, &(0x7f0000000100)={0x28, 0x0, 0x2711, @my=0x1}, 0x10) syz_fuseblk_mount(&(0x7f0000000040)='./file0\x00', &(0x7f0000000000)='./file0\x00', 0x4000, 0x0, 0x0, 0x0, 0x0, 0x0) getsockopt$inet_sctp_SCTP_CONTEXT(r1, 0x84, 0x11, &(0x7f0000000140)={0x0, 0x5}, &(0x7f0000000200)=0x8) 2018/04/11 12:45:13 executing program 6: r0 = socket$inet6(0xa, 0x80003, 0xff) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @ipv4={[], [0xff, 0xff], @dev={0xac, 0x14, 0x14, 0x1b}}}, 0x1c) sendmsg(r0, &(0x7f000001b000)={0x0, 0xfffffff5, &(0x7f0000019fa0), 0x112, &(0x7f000001ef08)}, 0x0) 2018/04/11 12:45:13 executing program 2: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x1e, 0x1, 0x0) setsockopt$packet_tx_ring(r0, 0x10f, 0x87, &(0x7f0000b89fe4)=@req={0x772}, 0x10) sendmsg(r0, &(0x7f0000030000)={&(0x7f00004f5000)=@generic={0x10000000001e, "0100000900000000000200000226cc573c080000003724c71e14dd6a739effea1b48006be61ffe0000e103000000f8000004003f010039d8f986ff01000300000004af50d50700000000000000e3ad316a1983000000001d00e0dfcb24281e27800000100076c3979ac40000bd15020078a1dfd300881a8365b1b16d7436"}, 0x80, &(0x7f0000447ff0), 0x0, &(0x7f00006e9c68)}, 0x0) 2018/04/11 12:45:13 executing program 7: syz_emit_ethernet(0x66, &(0x7f0000000000)={@random="cd3997030f00", @empty=[0x0, 0x0, 0x0, 0x3], [], {@ipv6={0x86dd, {0x0, 0x6, "b40900", 0x30, 0x67, 0x0, @ipv4={[], [0xff, 0xff], @multicast2=0xe0000002}, @mcast2={0xff, 0x2, [], 0x1}, {[], @icmpv6=@time_exceed={0x21, 0x0, 0x0, 0x0, [], {0x0, 0x6, "b680fa", 0x0, 0x0, 0x0, @ipv4={[], [0xff, 0xff], @broadcast=0xffffffff}, @ipv4={[], [0xff, 0xff], @remote={0xac, 0x14, 0xffffffffffffffff, 0xbb}}}}}}}}}, 0x0) 2018/04/11 12:45:13 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000000), 0x216) sendmsg$key(r0, &(0x7f0000000b00)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000001000)={0x2, 0xa, 0x0, 0x0, 0x2}, 0x10}, 0x1}, 0x0) r1 = dup(r0) openat$cgroup_procs(r1, &(0x7f0000000080)='cgroup.procs\x00', 0x2, 0x0) sendmsg$key(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000040)={0x2, 0x12, 0x0, 0x0, 0x2}, 0x10}, 0x1}, 0x0) 2018/04/11 12:45:13 executing program 1: r0 = socket(0x1e, 0x1, 0x0) setsockopt$packet_tx_ring(r0, 0x10f, 0x87, &(0x7f0000b89fe4)=@req={0x772}, 0x10) sendmsg(r0, &(0x7f0000030000)={&(0x7f00004f5000)=@generic={0x10000000001e, "0014030900000000000000000226cc573c080000003724c71e14dd6a739effea1b48006be61ffe0000e103000000f8000004003f010039d8f986ff01000300000004af50d50700000000000000e3ad316a1983000000001d00e0dfcb24281e27800000100076c3979ac40000bd15020078a1dfd300881a8365b1b16d7436"}, 0x80, &(0x7f0000447ff0), 0x0, &(0x7f00006e9c68)}, 0x0) 2018/04/11 12:45:13 executing program 3: semop(0x0, &(0x7f000001a000)=[{0x0, 0xffffffffffff0001, 0x100000000000000}, {}], 0x2) timer_create(0x0, &(0x7f0000cd0000)={0x0, 0x12}, &(0x7f0000044000)) timer_settime(0x0, 0x0, &(0x7f00004b1fe0)={{0x0, 0x1c9c380}, {0x0, 0x9}}, &(0x7f0000040000)) r0 = getpgid(0x0) tkill(r0, 0x1000000000016) 2018/04/11 12:45:13 executing program 0: r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg(r1, &(0x7f0000002840)={&(0x7f0000000100)=@generic, 0x80, &(0x7f00000026c0)=[{&(0x7f0000000180)=""/251, 0xfb}, {&(0x7f0000000280)=""/199, 0xc7}, {&(0x7f0000000380)=""/147, 0x93}, {&(0x7f0000000440)=""/78, 0x4e}, {&(0x7f00000004c0)=""/15, 0xf}, {&(0x7f0000000500)=""/4096, 0x1000}, {&(0x7f0000001500)=""/143, 0x8f}, {&(0x7f00000015c0)=""/4096, 0x1000}, {&(0x7f00000025c0)=""/250, 0xfa}], 0x9, &(0x7f0000002780)=""/179, 0xb3, 0x100000000}, 0x12020) r3 = socket$alg(0x26, 0x5, 0x0) syz_open_pts(r2, 0x2000) bind$alg(r3, &(0x7f0000000040)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc-cast5-avx\x00'}, 0x58) ioctl$TIOCSLCKTRMIOS(r1, 0x5457, &(0x7f0000002880)) r4 = accept$alg(r3, 0x0, 0x0) dup3(r0, r4, 0x0) 2018/04/11 12:45:13 executing program 7: syz_emit_ethernet(0x66, &(0x7f0000000000)={@random="cd3997030f00", @empty=[0x0, 0x0, 0x0, 0xfffff000], [], {@ipv6={0x86dd, {0x0, 0x6, "b40900", 0x30, 0x67, 0x0, @ipv4={[], [0xff, 0xff], @multicast2=0xe0000002}, @mcast2={0xff, 0x2, [], 0x1}, {[], @icmpv6=@time_exceed={0x21, 0x0, 0x0, 0x0, [], {0x0, 0x6, "b680fa", 0x0, 0x0, 0x0, @ipv4={[], [0xff, 0xff], @broadcast=0xffffffff}, @ipv4={[], [0xff, 0xff], @remote={0xac, 0x14, 0xffffffffffffffff, 0xbb}}}}}}}}}, 0x0) 2018/04/11 12:45:13 executing program 4: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000380)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc-cast5-avx\x00'}, 0x58) r1 = syz_open_dev$dspn(&(0x7f00000000c0)='/dev/dsp#\x00', 0xfffffffffffff000, 0x105100) bind$vsock_stream(r1, &(0x7f0000000100)={0x28, 0x0, 0x2711, @my=0x1}, 0x10) syz_fuseblk_mount(&(0x7f0000000040)='./file0\x00', &(0x7f0000000000)='./file0\x00', 0x4000, 0x0, 0x0, 0x0, 0x0, 0x0) 2018/04/11 12:45:14 executing program 0: r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$alg(0x26, 0x5, 0x0) fcntl$setsig(r1, 0xa, 0x36) bind$alg(r1, &(0x7f0000000200)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc-cast5-avx\x00'}, 0x58) r2 = accept$alg(r1, 0x0, 0x0) dup3(r0, r2, 0x0) 2018/04/11 12:45:14 executing program 1: r0 = socket(0x1e, 0x1, 0x0) setsockopt$packet_tx_ring(r0, 0x10f, 0x87, &(0x7f0000b89fe4)=@req={0x772}, 0x10) sendmsg(r0, &(0x7f0000030000)={&(0x7f00004f5000)=@generic={0x10000000001e, "0014000900030000000000000226cc573c080000003724c71e14dd6a739effea1b48006be61ffe0000e103000000f8000004003f010039d8f986ff01000300000004af50d50700000000000000e3ad316a1983000000001d00e0dfcb24281e27800000100076c3979ac40000bd15020078a1dfd300881a8365b1b16d7436"}, 0x80, &(0x7f0000447ff0), 0x0, &(0x7f00006e9c68)}, 0x0) 2018/04/11 12:45:14 executing program 6: r0 = socket$inet6(0xa, 0x80003, 0xff) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @ipv4={[], [0xff, 0xff], @dev={0xac, 0x14, 0x14, 0x1b}}}, 0x1c) sendmsg(r0, &(0x7f000001b000)={0x0, 0xfffffff5, &(0x7f0000019fa0), 0x7e, &(0x7f000001ef08)}, 0x0) 2018/04/11 12:45:14 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000000), 0x216) sendmsg$key(r0, &(0x7f0000000b00)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000001000)={0x2, 0xa, 0x0, 0x0, 0x2}, 0x10}, 0x1}, 0x0) getsockopt$sock_buf(r0, 0x1, 0x3f, &(0x7f00000001c0)=""/246, &(0x7f0000000080)=0xf6) sendmsg$key(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000040)={0x2, 0x12, 0x0, 0x0, 0x2}, 0x10}, 0x1}, 0x0) 2018/04/11 12:45:14 executing program 2: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x1e, 0x1, 0x0) setsockopt$packet_tx_ring(r0, 0x10f, 0x87, &(0x7f0000b89fe4)=@req={0x772}, 0x10) sendmsg(r0, &(0x7f0000030000)={&(0x7f00004f5000)=@generic={0x10000000001e, "0100000900000000000400000226cc573c080000003724c71e14dd6a739effea1b48006be61ffe0000e103000000f8000004003f010039d8f986ff01000300000004af50d50700000000000000e3ad316a1983000000001d00e0dfcb24281e27800000100076c3979ac40000bd15020078a1dfd300881a8365b1b16d7436"}, 0x80, &(0x7f0000447ff0), 0x0, &(0x7f00006e9c68)}, 0x0) 2018/04/11 12:45:14 executing program 7: syz_emit_ethernet(0x66, &(0x7f0000000000)={@random="cd3997030f00", @empty=[0x0, 0x0, 0x0, 0x28000000], [], {@ipv6={0x86dd, {0x0, 0x6, "b40900", 0x30, 0x67, 0x0, @ipv4={[], [0xff, 0xff], @multicast2=0xe0000002}, @mcast2={0xff, 0x2, [], 0x1}, {[], @icmpv6=@time_exceed={0x21, 0x0, 0x0, 0x0, [], {0x0, 0x6, "b680fa", 0x0, 0x0, 0x0, @ipv4={[], [0xff, 0xff], @broadcast=0xffffffff}, @ipv4={[], [0xff, 0xff], @remote={0xac, 0x14, 0xffffffffffffffff, 0xbb}}}}}}}}}, 0x0) 2018/04/11 12:45:14 executing program 3: semop(0x0, &(0x7f000001a000)=[{0x0, 0xffffffffffff0001, 0xe000000}, {}], 0x2) timer_create(0x0, &(0x7f0000cd0000)={0x0, 0x12}, &(0x7f0000044000)) timer_settime(0x0, 0x0, &(0x7f00004b1fe0)={{0x0, 0x1c9c380}, {0x0, 0x9}}, &(0x7f0000040000)) r0 = getpgid(0x0) tkill(r0, 0x1000000000016) 2018/04/11 12:45:14 executing program 4: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000380)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc-cast5-avx\x00'}, 0x58) syz_open_dev$dspn(&(0x7f00000000c0)='/dev/dsp#\x00', 0xfffffffffffff000, 0x105100) syz_fuseblk_mount(&(0x7f0000000040)='./file0\x00', &(0x7f0000000000)='./file0\x00', 0x4000, 0x0, 0x0, 0x0, 0x0, 0x0) 2018/04/11 12:45:14 executing program 6: r0 = socket$inet6(0xa, 0x80003, 0xff) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @ipv4={[], [0xff, 0xff], @dev={0xac, 0x14, 0x14, 0x1b}}}, 0x1c) sendmsg(r0, &(0x7f000001b000)={0x0, 0xfffffff5, &(0x7f0000019fa0), 0x118, &(0x7f000001ef08)}, 0x0) 2018/04/11 12:45:14 executing program 0: r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000100)='/dev/rtc\x00', 0x218000, 0x0) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x24, &(0x7f0000000140)={@remote, @empty, 0x0}, &(0x7f0000000180)=0xc) setsockopt$inet6_mreq(r1, 0x29, 0x1f, &(0x7f00000001c0)={@ipv4={[], [0xff, 0xff], @rand_addr=0x3f}, r2}, 0x14) r3 = socket$alg(0x26, 0x5, 0x0) bind$alg(r3, &(0x7f0000000200)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc-cast5-avx\x00'}, 0x58) r4 = syz_open_dev$dmmidi(&(0x7f0000000040)='/dev/dmmidi#\x00', 0x2f, 0x100) ioctl$KVM_GET_DEBUGREGS(r4, 0x8080aea1, &(0x7f0000000080)) r5 = accept$alg(r3, 0x0, 0x0) dup3(r0, r5, 0x0) 2018/04/11 12:45:14 executing program 1: r0 = socket(0x1e, 0x1, 0x0) setsockopt$packet_tx_ring(r0, 0x10f, 0x87, &(0x7f0000b89fe4)=@req={0x772}, 0x10) sendmsg(r0, &(0x7f0000030000)={&(0x7f00004f5000)=@generic={0x10000000001e, "00140009d0010100000000000226cc573c080000003724c71e14dd6a739effea1b48006be61ffe0000e103000000f8000004003f010039d8f986ff01000300000004af50d50700000000000000e3ad316a1983000000001d00e0dfcb24281e27800000100076c3979ac40000bd15020078a1dfd300881a8365b1b16d7436"}, 0x80, &(0x7f0000447ff0), 0x0, &(0x7f00006e9c68)}, 0x0) 2018/04/11 12:45:14 executing program 2: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x1e, 0x1, 0x0) setsockopt$packet_tx_ring(r0, 0x10f, 0x87, &(0x7f0000b89fe4)=@req={0x772}, 0x10) sendmsg(r0, &(0x7f0000030000)={&(0x7f00004f5000)=@generic={0x10000000001e, "0100000900000000000002000226cc573c080000003724c71e14dd6a739effea1b48006be61ffe0000e103000000f8000004003f010039d8f986ff01000300000004af50d50700000000000000e3ad316a1983000000001d00e0dfcb24281e27800000100076c3979ac40000bd15020078a1dfd300881a8365b1b16d7436"}, 0x80, &(0x7f0000447ff0), 0x0, &(0x7f00006e9c68)}, 0x0) 2018/04/11 12:45:14 executing program 7: syz_emit_ethernet(0x66, &(0x7f0000000000)={@random="cd3997030f00", @empty=[0x0, 0x0, 0x0, 0x88a8ffff], [], {@ipv6={0x86dd, {0x0, 0x6, "b40900", 0x30, 0x67, 0x0, @ipv4={[], [0xff, 0xff], @multicast2=0xe0000002}, @mcast2={0xff, 0x2, [], 0x1}, {[], @icmpv6=@time_exceed={0x21, 0x0, 0x0, 0x0, [], {0x0, 0x6, "b680fa", 0x0, 0x0, 0x0, @ipv4={[], [0xff, 0xff], @broadcast=0xffffffff}, @ipv4={[], [0xff, 0xff], @remote={0xac, 0x14, 0xffffffffffffffff, 0xbb}}}}}}}}}, 0x0) 2018/04/11 12:45:14 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000000), 0x216) r1 = syz_open_dev$usbmon(&(0x7f0000000080)='/dev/usbmon#\x00', 0x0, 0x40) ioctl$TIOCGSID(r1, 0x5429, &(0x7f0000000100)) ioctl$SNDRV_TIMER_IOCTL_GINFO(r1, 0xc0f85403, &(0x7f00000001c0)={{0xffffffffffffffff, 0x0, 0xbef, 0x3, 0x9f78}, 0x90, 0x1f, 'id0\x00', 'timer1\x00', 0x0, 0x2, 0x1, 0x400, 0xfffffffffffffffc}) ioctl$DRM_IOCTL_ADD_CTX(r1, 0xc0086420, &(0x7f00000000c0)) sendmsg$key(r0, &(0x7f0000000b00)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000001000)=ANY=[@ANYBLOB="8a48009ef3ffff000000000020000000"], 0x10}, 0x1}, 0x0) sendmsg$key(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000040)={0x2, 0x12, 0x0, 0x0, 0x2}, 0x10}, 0x1}, 0x0) 2018/04/11 12:45:14 executing program 4: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000380)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc-cast5-avx\x00'}, 0x58) syz_fuseblk_mount(&(0x7f0000000040)='./file0\x00', &(0x7f0000000000)='./file0\x00', 0x4000, 0x0, 0x0, 0x0, 0x0, 0x0) 2018/04/11 12:45:14 executing program 6: r0 = socket$inet6(0xa, 0x80003, 0xff) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @ipv4={[], [0xff, 0xff], @dev={0xac, 0x14, 0x14, 0x1b}}}, 0x1c) sendmsg(r0, &(0x7f000001b000)={0x0, 0xfffffff5, &(0x7f0000019fa0), 0x68, &(0x7f000001ef08)}, 0x0) 2018/04/11 12:45:14 executing program 1: r0 = socket(0x1e, 0x1, 0x0) setsockopt$packet_tx_ring(r0, 0x10f, 0x87, &(0x7f0000b89fe4)=@req={0x772}, 0x10) sendmsg(r0, &(0x7f0000030000)={&(0x7f00004f5000)=@generic={0x10000000001e, "0014000900000000000000020226cc573c080000003724c71e14dd6a739effea1b48006be61ffe0000e103000000f8000004003f010039d8f986ff01000300000004af50d50700000000000000e3ad316a1983000000001d00e0dfcb24281e27800000100076c3979ac40000bd15020078a1dfd300881a8365b1b16d7436"}, 0x80, &(0x7f0000447ff0), 0x0, &(0x7f00006e9c68)}, 0x0) 2018/04/11 12:45:14 executing program 0: r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000200)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc-cast5-avx\x00'}, 0x58) r2 = accept$alg(r1, 0x0, 0x0) r3 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0xa0002, 0x0) msgget$private(0x0, 0x1) ioctl$VHOST_GET_VRING_ENDIAN(r3, 0x4008af14, &(0x7f0000000080)={0x1, 0x5}) fcntl$notify(r3, 0x402, 0x20) dup3(r0, r2, 0x0) 2018/04/11 12:45:14 executing program 7: syz_emit_ethernet(0x66, &(0x7f0000000000)={@random="cd3997030f00", @empty=[0x0, 0x0, 0x0, 0xd00], [], {@ipv6={0x86dd, {0x0, 0x6, "b40900", 0x30, 0x67, 0x0, @ipv4={[], [0xff, 0xff], @multicast2=0xe0000002}, @mcast2={0xff, 0x2, [], 0x1}, {[], @icmpv6=@time_exceed={0x21, 0x0, 0x0, 0x0, [], {0x0, 0x6, "b680fa", 0x0, 0x0, 0x0, @ipv4={[], [0xff, 0xff], @broadcast=0xffffffff}, @ipv4={[], [0xff, 0xff], @remote={0xac, 0x14, 0xffffffffffffffff, 0xbb}}}}}}}}}, 0x0) 2018/04/11 12:45:15 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000000), 0x216) statfs(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000b40)=""/4096) sendmsg$key(r0, &(0x7f0000000b00)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000001c0)=ANY=[@ANYBLOB="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"], 0x10}, 0x1}, 0x0) r1 = creat(&(0x7f0000000080)='./file0\x00', 0x4) ioctl$TCSBRK(r1, 0x5409, 0xfffffffffffffffa) sendmsg$key(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000040)={0x2, 0x12, 0x0, 0x0, 0x2}, 0x10}, 0x1}, 0x0) ioctl$EVIOCGBITSW(r1, 0x80404525, &(0x7f0000000300)=""/135) 2018/04/11 12:45:15 executing program 4: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$alg(0x26, 0x5, 0x0) syz_fuseblk_mount(&(0x7f0000000040)='./file0\x00', &(0x7f0000000000)='./file0\x00', 0x4000, 0x0, 0x0, 0x0, 0x0, 0x0) 2018/04/11 12:45:15 executing program 2: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x1e, 0x1, 0x0) setsockopt$packet_tx_ring(r0, 0x10f, 0x87, &(0x7f0000b89fe4)=@req={0x772}, 0x10) sendmsg(r0, &(0x7f0000030000)={&(0x7f00004f5000)=@generic={0x10000000001e, "0100000900000000000004000226cc573c080000003724c71e14dd6a739effea1b48006be61ffe0000e103000000f8000004003f010039d8f986ff01000300000004af50d50700000000000000e3ad316a1983000000001d00e0dfcb24281e27800000100076c3979ac40000bd15020078a1dfd300881a8365b1b16d7436"}, 0x80, &(0x7f0000447ff0), 0x0, &(0x7f00006e9c68)}, 0x0) 2018/04/11 12:45:15 executing program 6: r0 = socket$inet6(0xa, 0x80003, 0xff) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @ipv4={[], [0xff, 0xff], @dev={0xac, 0x14, 0x14, 0x1b}}}, 0x1c) sendmsg(r0, &(0x7f000001b000)={0x0, 0xfffffff5, &(0x7f0000019fa0), 0x6a, &(0x7f000001ef08)}, 0x0) 2018/04/11 12:45:15 executing program 7: syz_emit_ethernet(0x66, &(0x7f0000000000)={@random="cd3997030f00", @empty=[0x0, 0x0, 0x0, 0xfffffffffffff000], [], {@ipv6={0x86dd, {0x0, 0x6, "b40900", 0x30, 0x67, 0x0, @ipv4={[], [0xff, 0xff], @multicast2=0xe0000002}, @mcast2={0xff, 0x2, [], 0x1}, {[], @icmpv6=@time_exceed={0x21, 0x0, 0x0, 0x0, [], {0x0, 0x6, "b680fa", 0x0, 0x0, 0x0, @ipv4={[], [0xff, 0xff], @broadcast=0xffffffff}, @ipv4={[], [0xff, 0xff], @remote={0xac, 0x14, 0xffffffffffffffff, 0xbb}}}}}}}}}, 0x0) 2018/04/11 12:45:15 executing program 1: r0 = socket(0x1e, 0x1, 0x0) setsockopt$packet_tx_ring(r0, 0x10f, 0x87, &(0x7f0000b89fe4)=@req={0x772}, 0x10) sendmsg(r0, &(0x7f0000030000)={&(0x7f00004f5000)=@generic={0x10000000001e, "0014000900000001000000000226cc573c080000003724c71e14dd6a739effea1b48006be61ffe0000e103000000f8000004003f010039d8f986ff01000300000004af50d50700000000000000e3ad316a1983000000001d00e0dfcb24281e27800000100076c3979ac40000bd15020078a1dfd300881a8365b1b16d7436"}, 0x80, &(0x7f0000447ff0), 0x0, &(0x7f00006e9c68)}, 0x0) 2018/04/11 12:45:15 executing program 3: semop(0x0, &(0x7f000001a000)=[{0x0, 0xffffffffffff0001}, {0xe000000}], 0x2) timer_create(0x0, &(0x7f0000cd0000)={0x0, 0x12}, &(0x7f0000044000)) timer_settime(0x0, 0x0, &(0x7f00004b1fe0)={{0x0, 0x1c9c380}, {0x0, 0x9}}, &(0x7f0000040000)) r0 = getpgid(0x0) tkill(r0, 0x1000000000016) 2018/04/11 12:45:15 executing program 0: r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x7}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000200)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc-cast5-avx\x00'}, 0x58) r2 = accept$alg(r1, 0x0, 0x0) r3 = syz_open_dev$sndpcmp(&(0x7f0000000040)='/dev/snd/pcmC#D#p\x00', 0x4, 0x400) bind$nfc_llcp(r3, &(0x7f0000000080)={0x27, 0x1, 0x2, 0x4, 0x5, 0x400, "4a7d37e5e60dcc04277daff5c7d1bf87961481356a3610ccefbe31ff037c3cac482d2732fe370dfa6cced110646a30b1ed6437e0262b2f2515a93e41ef0c9d", 0x4}, 0x60) dup3(r0, r2, 0x0) 2018/04/11 12:45:15 executing program 7: syz_emit_ethernet(0x66, &(0x7f0000000000)={@random="cd3997030f00", @empty=[0x0, 0x0, 0x0, 0x88caffff00000000], [], {@ipv6={0x86dd, {0x0, 0x6, "b40900", 0x30, 0x67, 0x0, @ipv4={[], [0xff, 0xff], @multicast2=0xe0000002}, @mcast2={0xff, 0x2, [], 0x1}, {[], @icmpv6=@time_exceed={0x21, 0x0, 0x0, 0x0, [], {0x0, 0x6, "b680fa", 0x0, 0x0, 0x0, @ipv4={[], [0xff, 0xff], @broadcast=0xffffffff}, @ipv4={[], [0xff, 0xff], @remote={0xac, 0x14, 0xffffffffffffffff, 0xbb}}}}}}}}}, 0x0) 2018/04/11 12:45:15 executing program 1: r0 = socket(0x1e, 0x1, 0x0) setsockopt$packet_tx_ring(r0, 0x10f, 0x87, &(0x7f0000b89fe4)=@req={0x772}, 0x10) sendmsg(r0, &(0x7f0000030000)={&(0x7f00004f5000)=@generic={0x10000000001e, "0014000900000003000000000226cc573c080000003724c71e14dd6a739effea1b48006be61ffe0000e103000000f8000004003f010039d8f986ff01000300000004af50d50700000000000000e3ad316a1983000000001d00e0dfcb24281e27800000100076c3979ac40000bd15020078a1dfd300881a8365b1b16d7436"}, 0x80, &(0x7f0000447ff0), 0x0, &(0x7f00006e9c68)}, 0x0) 2018/04/11 12:45:15 executing program 6: r0 = socket$inet6(0xa, 0x80003, 0xff) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @ipv4={[], [0xff, 0xff], @dev={0xac, 0x14, 0x14, 0x1b}}}, 0x1c) sendmsg(r0, &(0x7f000001b000)={0x0, 0xfffffff5, &(0x7f0000019fa0), 0x152, &(0x7f000001ef08)}, 0x0) 2018/04/11 12:45:15 executing program 2: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x1e, 0x1, 0x0) setsockopt$packet_tx_ring(r0, 0x10f, 0x87, &(0x7f0000b89fe4)=@req={0x772}, 0x10) sendmsg(r0, &(0x7f0000030000)={&(0x7f00004f5000)=@generic={0x10000000001e, "0100000900000000000000020226cc573c080000003724c71e14dd6a739effea1b48006be61ffe0000e103000000f8000004003f010039d8f986ff01000300000004af50d50700000000000000e3ad316a1983000000001d00e0dfcb24281e27800000100076c3979ac40000bd15020078a1dfd300881a8365b1b16d7436"}, 0x80, &(0x7f0000447ff0), 0x0, &(0x7f00006e9c68)}, 0x0) 2018/04/11 12:45:15 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000000), 0x216) sendmsg$key(r0, &(0x7f0000000b00)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000340)=ANY=[@ANYBLOB="020a00000f000000000000005ed6ba8a37b9769d62119e46a700000000010016004e62000005001a00fe8000000000000080000000000000bb000000000000000000000000000000010000041007cf59c1150ae1a29f4054cdade4d1000000000000008102004e227f00000100000000000000000a004e2497800000ff0200000000000000000000000000017f00000000000000e6c372faaa851adb37352a9de178f7ff39d3d27ec5e50bc0aead6c86497366030a922040093ee83a5b34e001a80aac92aaf638dab48529a279861afa673d70cd1af9cdaffc18499872c2594901be8f0a992ca1fad1cc1d67a4a536aecc2346b02183"], 0x78}, 0x1}, 0x800) syz_open_dev$dmmidi(&(0x7f0000000100)='/dev/dmmidi#\x00', 0x9, 0x0) sendmsg$key(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000040)={0x2, 0x12, 0x0, 0x0, 0x2}, 0x10}, 0x1}, 0x0) r1 = openat$audio(0xffffffffffffff9c, &(0x7f0000000080)='/dev/audio\x00', 0x200000, 0x0) ioctl$TUNSETVNETLE(r1, 0x400454dc, &(0x7f00000000c0)=0x1000000000005) 2018/04/11 12:45:15 executing program 0: r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000200)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc-cast5-avx\x00'}, 0x58) r2 = accept$alg(r1, 0x0, 0x0) r3 = dup3(r0, r2, 0x0) ioctl$sock_inet_SIOCGARP(r3, 0x8954, &(0x7f0000000040)={{0x2, 0x4e21, @remote={0xac, 0x14, 0x14, 0xbb}}, {0x307, @dev={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0x16}}, 0x2, {0x2, 0x4e22, @broadcast=0xffffffff}, 'ip6gretap0\x00'}) 2018/04/11 12:45:15 executing program 4: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_fuseblk_mount(&(0x7f0000000040)='./file0\x00', &(0x7f0000000000)='./file0\x00', 0x4000, 0x0, 0x0, 0x0, 0x0, 0x0) 2018/04/11 12:45:16 executing program 6: r0 = socket$inet6(0xa, 0x80003, 0xff) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @ipv4={[], [0xff, 0xff], @dev={0xac, 0x14, 0x14, 0x1b}}}, 0x1c) sendmsg(r0, &(0x7f000001b000)={0x0, 0xfffffff5, &(0x7f0000019fa0), 0x15a, &(0x7f000001ef08)}, 0x0) 2018/04/11 12:45:16 executing program 7: syz_emit_ethernet(0x66, &(0x7f0000000000)={@random="cd3997030f00", @empty=[0x0, 0x0, 0x0, 0xd00000000000000], [], {@ipv6={0x86dd, {0x0, 0x6, "b40900", 0x30, 0x67, 0x0, @ipv4={[], [0xff, 0xff], @multicast2=0xe0000002}, @mcast2={0xff, 0x2, [], 0x1}, {[], @icmpv6=@time_exceed={0x21, 0x0, 0x0, 0x0, [], {0x0, 0x6, "b680fa", 0x0, 0x0, 0x0, @ipv4={[], [0xff, 0xff], @broadcast=0xffffffff}, @ipv4={[], [0xff, 0xff], @remote={0xac, 0x14, 0xffffffffffffffff, 0xbb}}}}}}}}}, 0x0) 2018/04/11 12:45:16 executing program 1: r0 = socket(0x1e, 0x1, 0x0) setsockopt$packet_tx_ring(r0, 0x10f, 0x87, &(0x7f0000b89fe4)=@req={0x772}, 0x10) sendmsg(r0, &(0x7f0000030000)={&(0x7f00004f5000)=@generic={0x10000000001e, "0014000900000000000004000226cc573c080000003724c71e14dd6a739effea1b48006be61ffe0000e103000000f8000004003f010039d8f986ff01000300000004af50d50700000000000000e3ad316a1983000000001d00e0dfcb24281e27800000100076c3979ac40000bd15020078a1dfd300881a8365b1b16d7436"}, 0x80, &(0x7f0000447ff0), 0x0, &(0x7f00006e9c68)}, 0x0) 2018/04/11 12:45:16 executing program 2: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x1e, 0x1, 0x0) setsockopt$packet_tx_ring(r0, 0x10f, 0x87, &(0x7f0000b89fe4)=@req={0x772}, 0x10) sendmsg(r0, &(0x7f0000030000)={&(0x7f00004f5000)=@generic={0x10000000001e, "0100000900000000000000000226cc573c080200003724c71e14dd6a739effea1b48006be61ffe0000e103000000f8000004003f010039d8f986ff01000300000004af50d50700000000000000e3ad316a1983000000001d00e0dfcb24281e27800000100076c3979ac40000bd15020078a1dfd300881a8365b1b16d7436"}, 0x80, &(0x7f0000447ff0), 0x0, &(0x7f00006e9c68)}, 0x0) 2018/04/11 12:45:16 executing program 0: r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$alg(0x26, 0x5, 0x0) sendmsg(r1, &(0x7f0000000300)={&(0x7f00000000c0)=@un=@file={0x1, './file0\x00'}, 0x80, &(0x7f00000002c0)=[{&(0x7f0000000140)="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", 0xfc}, {&(0x7f0000000240)="a63331aaa5d70394ad32844b1bde48fb15166ea6fc0df4063ca81c93315b61a8a623845a4721b17a04b2f397e95d3255b63655b021392d3d83cbc6018c3fa22bbffc90fa38f80a56329275b7dee2135087691ec22db95c8ab77bd13bec6159770e0fc6b0bb322085cf1f178449ee3a44a852f4733202", 0x76}], 0x2, 0x0, 0x0, 0x4000000}, 0x40000) socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000040)={0x26, 'rng\x00', 0x0, 0x0, 'drbg_pr_ctr_aes192\x00'}, 0x58) r2 = accept$alg(r1, 0x0, 0x0) r3 = syz_open_dev$sndpcmp(&(0x7f0000000340)='/dev/snd/pcmC#D#p\x00', 0x4, 0x301200) getsockopt$inet_sctp_SCTP_ENABLE_STREAM_RESET(0xffffffffffffffff, 0x84, 0x76, &(0x7f0000000380)={0x0, 0x1}, &(0x7f00000003c0)=0x8) setsockopt$inet_sctp_SCTP_DEFAULT_SEND_PARAM(r3, 0x84, 0xa, &(0x7f0000000400)={0x5e9f, 0x8001, 0x2, 0x450f5fe1, 0xfffffffffffffff8, 0x221, 0x1, 0x6, r4}, 0x20) r5 = getpgid(0x0) setpriority(0x2, r5, 0x44) dup3(r0, r2, 0x0) 2018/04/11 12:45:16 executing program 5: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000380)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc-cast5-avx\x00'}, 0x58) r1 = syz_open_dev$dspn(&(0x7f00000000c0)='/dev/dsp#\x00', 0xfffffffffffff000, 0x105100) bind$vsock_stream(r1, &(0x7f0000000100)={0x28, 0x0, 0x2711, @my=0x1}, 0x10) r2 = syz_fuseblk_mount(&(0x7f0000000040)='./file0\x00', &(0x7f0000000000)='./file0\x00', 0x4000, 0x0, 0x0, 0x0, 0x0, 0x0) getsockopt$inet_sctp_SCTP_CONTEXT(r1, 0x84, 0x11, &(0x7f0000000140)={0x0, 0x5}, &(0x7f0000000200)=0x8) getsockopt$inet_sctp_SCTP_PEER_AUTH_CHUNKS(r1, 0x84, 0x1a, &(0x7f0000000400)={r3, 0x81, "a277f0f2476bb3b5a9d85c0a520b6cea4ce6a73fe8c99d06bd8be7f85ee718a89a3ba45d1051b0f6bc606d5c51b99c4f86dc156d2978a9cd4a2729e4287ad1dcf44f8dbc967b5f148b03e38680f2aa736b1fc627532e25761a99d05ad2c5e8334ade9bed247a3a409ef9c6f0baa7e1fa76ca0bf5293a602f2d0857dcedc8bdd6d2"}, &(0x7f0000000240)=0x89) r4 = accept$alg(r1, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(r4, 0x89e2, &(0x7f0000000080)={r0}) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(r2, 0x84, 0x1a, &(0x7f00000004c0)=ANY=[@ANYRES32=0x0, @ANYBLOB="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"], &(0x7f0000000180)=0x95) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(r5, 0x84, 0x1a, &(0x7f0000000280)=ANY=[@ANYRES32=r6, @ANYBLOB="ef000000810c8dfbcf9fb595ffee29279e631d6346a525675be077ccffe4a045dff2dfe09ae73048acbdf5241614c061ffef6ae57153c49736cbd45b2b16acc8f3e6d8865dfa0535e7492abed40f43ad9238d913795057449d304bda5b77a3d6e9d7a3f28045ebfc7875ce392f6c9ef3ebd30df99b304ba7b41e3c84429d1a57d705e199764031f286a0eaff80f9361e4f02e2986d0e6ecb024e17a4ebad0b107cffcff13d79c85fac3dcae48dbd68d6b48fd03b9e268a64697631f024e02149788ce356caa43da61ed988133c58e25035f6305e1e4329a350d930b1d5ed8b6cd1edc20baa3cf822c0cf8b8096205a71dc607d"], &(0x7f00000001c0)=0xf7) 2018/04/11 12:45:16 executing program 3: semop(0x0, &(0x7f000001a000)=[{0x0, 0xffffffffffff0001}, {0x3f000000}], 0x2) timer_create(0x0, &(0x7f0000cd0000)={0x0, 0x12}, &(0x7f0000044000)) timer_settime(0x0, 0x0, &(0x7f00004b1fe0)={{0x0, 0x1c9c380}, {0x0, 0x9}}, &(0x7f0000040000)) r0 = getpgid(0x0) tkill(r0, 0x1000000000016) 2018/04/11 12:45:16 executing program 4: syz_fuseblk_mount(&(0x7f0000000040)='./file0\x00', &(0x7f0000000000)='./file0\x00', 0x4000, 0x0, 0x0, 0x0, 0x0, 0x0) 2018/04/11 12:45:16 executing program 7: syz_emit_ethernet(0x66, &(0x7f0000000000)={@random="cd3997030f00", @empty=[0x0, 0x0, 0x0, 0x6700], [], {@ipv6={0x86dd, {0x0, 0x6, "b40900", 0x30, 0x67, 0x0, @ipv4={[], [0xff, 0xff], @multicast2=0xe0000002}, @mcast2={0xff, 0x2, [], 0x1}, {[], @icmpv6=@time_exceed={0x21, 0x0, 0x0, 0x0, [], {0x0, 0x6, "b680fa", 0x0, 0x0, 0x0, @ipv4={[], [0xff, 0xff], @broadcast=0xffffffff}, @ipv4={[], [0xff, 0xff], @remote={0xac, 0x14, 0xffffffffffffffff, 0xbb}}}}}}}}}, 0x0) 2018/04/11 12:45:16 executing program 4: syz_fuseblk_mount(&(0x7f0000000040)='./file0\x00', &(0x7f0000000000)='./file0\x00', 0x4000, 0x0, 0x0, 0x0, 0x0, 0x0) 2018/04/11 12:45:16 executing program 6: r0 = socket$inet6(0xa, 0x80003, 0xff) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @ipv4={[], [0xff, 0xff], @dev={0xac, 0x14, 0x14, 0x1b}}}, 0x1c) sendmsg(r0, &(0x7f000001b000)={0x0, 0xfffffff5, &(0x7f0000019fa0), 0xa1, &(0x7f000001ef08)}, 0x0) 2018/04/11 12:45:16 executing program 1: r0 = socket(0x1e, 0x1, 0x0) setsockopt$packet_tx_ring(r0, 0x10f, 0x87, &(0x7f0000b89fe4)=@req={0x772}, 0x10) sendmsg(r0, &(0x7f0000030000)={&(0x7f00004f5000)=@generic={0x10000000001e, "0014000900000000000101d00226cc573c080000003724c71e14dd6a739effea1b48006be61ffe0000e103000000f8000004003f010039d8f986ff01000300000004af50d50700000000000000e3ad316a1983000000001d00e0dfcb24281e27800000100076c3979ac40000bd15020078a1dfd300881a8365b1b16d7436"}, 0x80, &(0x7f0000447ff0), 0x0, &(0x7f00006e9c68)}, 0x0) 2018/04/11 12:45:16 executing program 2: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x1e, 0x1, 0x0) setsockopt$packet_tx_ring(r0, 0x10f, 0x87, &(0x7f0000b89fe4)=@req={0x772}, 0x10) sendmsg(r0, &(0x7f0000030000)={&(0x7f00004f5000)=@generic={0x10000000001e, "0100000900000000000000000226cc573c080400003724c71e14dd6a739effea1b48006be61ffe0000e103000000f8000004003f010039d8f986ff01000300000004af50d50700000000000000e3ad316a1983000000001d00e0dfcb24281e27800000100076c3979ac40000bd15020078a1dfd300881a8365b1b16d7436"}, 0x80, &(0x7f0000447ff0), 0x0, &(0x7f00006e9c68)}, 0x0) 2018/04/11 12:45:16 executing program 0: r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000200)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc-cast5-avx\x00'}, 0x58) openat$vcs(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vcs\x00', 0x81, 0x0) r2 = accept$alg(r1, 0x0, 0x0) dup3(r0, r2, 0x0) execve(&(0x7f0000000080)='./file0\x00', &(0x7f0000000180)=[&(0x7f00000000c0)='\x00', &(0x7f0000000100)='/dev/vcs\x00', &(0x7f0000000140)='cbc-cast5-avx\x00'], &(0x7f00000002c0)=[&(0x7f00000001c0)='skcipher\x00', &(0x7f0000000280)='.\'wlan0em0\x00']) 2018/04/11 12:45:16 executing program 7: syz_emit_ethernet(0x66, &(0x7f0000000000)={@random="cd3997030f00", @empty=[0x0, 0x0, 0x0, 0x58], [], {@ipv6={0x86dd, {0x0, 0x6, "b40900", 0x30, 0x67, 0x0, @ipv4={[], [0xff, 0xff], @multicast2=0xe0000002}, @mcast2={0xff, 0x2, [], 0x1}, {[], @icmpv6=@time_exceed={0x21, 0x0, 0x0, 0x0, [], {0x0, 0x6, "b680fa", 0x0, 0x0, 0x0, @ipv4={[], [0xff, 0xff], @broadcast=0xffffffff}, @ipv4={[], [0xff, 0xff], @remote={0xac, 0x14, 0xffffffffffffffff, 0xbb}}}}}}}}}, 0x0) 2018/04/11 12:45:16 executing program 6: r0 = socket$inet6(0xa, 0x80003, 0xff) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @ipv4={[], [0xff, 0xff], @dev={0xac, 0x14, 0x14, 0x1b}}}, 0x1c) sendmsg(r0, &(0x7f000001b000)={0x0, 0xfffffff5, &(0x7f0000019fa0), 0x8b, &(0x7f000001ef08)}, 0x0) 2018/04/11 12:45:16 executing program 5: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000380)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc-cast5-avx\x00'}, 0x58) r1 = syz_open_dev$dspn(&(0x7f00000000c0)='/dev/dsp#\x00', 0xfffffffffffff000, 0x105100) bind$vsock_stream(r1, &(0x7f0000000100)={0x28, 0x0, 0x2711, @my=0x1}, 0x10) r2 = syz_fuseblk_mount(&(0x7f0000000040)='./file0\x00', &(0x7f0000000000)='./file0\x00', 0x4000, 0x0, 0x0, 0x0, 0x0, 0x0) getsockopt$inet_sctp_SCTP_CONTEXT(r1, 0x84, 0x11, &(0x7f0000000140)={0x0, 0x5}, &(0x7f0000000200)=0x8) getsockopt$inet_sctp_SCTP_PEER_AUTH_CHUNKS(r1, 0x84, 0x1a, &(0x7f0000000400)={r3, 0x81, "a277f0f2476bb3b5a9d85c0a520b6cea4ce6a73fe8c99d06bd8be7f85ee718a89a3ba45d1051b0f6bc606d5c51b99c4f86dc156d2978a9cd4a2729e4287ad1dcf44f8dbc967b5f148b03e38680f2aa736b1fc627532e25761a99d05ad2c5e8334ade9bed247a3a409ef9c6f0baa7e1fa76ca0bf5293a602f2d0857dcedc8bdd6d2"}, &(0x7f0000000240)=0x89) r4 = accept$alg(r1, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(r4, 0x89e2, &(0x7f0000000080)={r0}) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(r2, 0x84, 0x1a, &(0x7f00000004c0)=ANY=[@ANYRES32=0x0, @ANYBLOB="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"], &(0x7f0000000180)=0x95) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(r5, 0x84, 0x1a, &(0x7f0000000280)=ANY=[@ANYRES32=r6, @ANYBLOB="ef000000810c8dfbcf9fb595ffee29279e631d6346a525675be077ccffe4a045dff2dfe09ae73048acbdf5241614c061ffef6ae57153c49736cbd45b2b16acc8f3e6d8865dfa0535e7492abed40f43ad9238d913795057449d304bda5b77a3d6e9d7a3f28045ebfc7875ce392f6c9ef3ebd30df99b304ba7b41e3c84429d1a57d705e199764031f286a0eaff80f9361e4f02e2986d0e6ecb024e17a4ebad0b107cffcff13d79c85fac3dcae48dbd68d6b48fd03b9e268a64697631f024e02149788ce356caa43da61ed988133c58e25035f6305e1e4329a350d930b1d5ed8b6cd1edc20baa3cf822c0cf8b8096205a71dc607d"], &(0x7f00000001c0)=0xf7) 2018/04/11 12:45:17 executing program 1: r0 = socket(0x1e, 0x1, 0x0) setsockopt$packet_tx_ring(r0, 0x10f, 0x87, &(0x7f0000b89fe4)=@req={0x772}, 0x10) sendmsg(r0, &(0x7f0000030000)={&(0x7f00004f5000)=@generic={0x10000000001e, "0014000900000002000000000226cc573c080000003724c71e14dd6a739effea1b48006be61ffe0000e103000000f8000004003f010039d8f986ff01000300000004af50d50700000000000000e3ad316a1983000000001d00e0dfcb24281e27800000100076c3979ac40000bd15020078a1dfd300881a8365b1b16d7436"}, 0x80, &(0x7f0000447ff0), 0x0, &(0x7f00006e9c68)}, 0x0) 2018/04/11 12:45:17 executing program 4: syz_fuseblk_mount(&(0x7f0000000040)='./file0\x00', &(0x7f0000000000)='./file0\x00', 0x4000, 0x0, 0x0, 0x0, 0x0, 0x0) 2018/04/11 12:45:17 executing program 6: r0 = socket$inet6(0xa, 0x80003, 0xff) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @ipv4={[], [0xff, 0xff], @dev={0xac, 0x14, 0x14, 0x1b}}}, 0x1c) sendmsg(r0, &(0x7f000001b000)={0x0, 0xfffffff5, &(0x7f0000019fa0), 0x1ab, &(0x7f000001ef08)}, 0x0) 2018/04/11 12:45:17 executing program 7: syz_emit_ethernet(0x66, &(0x7f0000000000)={@random="cd3997030f00", @empty=[0x0, 0x0, 0x0, 0x1000000], [], {@ipv6={0x86dd, {0x0, 0x6, "b40900", 0x30, 0x67, 0x0, @ipv4={[], [0xff, 0xff], @multicast2=0xe0000002}, @mcast2={0xff, 0x2, [], 0x1}, {[], @icmpv6=@time_exceed={0x21, 0x0, 0x0, 0x0, [], {0x0, 0x6, "b680fa", 0x0, 0x0, 0x0, @ipv4={[], [0xff, 0xff], @broadcast=0xffffffff}, @ipv4={[], [0xff, 0xff], @remote={0xac, 0x14, 0xffffffffffffffff, 0xbb}}}}}}}}}, 0x0) 2018/04/11 12:45:17 executing program 0: r0 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vcs\x00', 0x20100, 0x0) ioctl$TIOCMGET(r0, 0x5415, &(0x7f00000000c0)) perf_event_open(&(0x7f000025c000)={0x2, 0x48, 0x3e3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000100)={@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x7e, [0x0, 0x6], 0xaa}, @local={0xfe, 0x80, [], 0xaa}, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, &(0x7f00000002c0)) r1 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000200)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc-cast5-avx\x00'}, 0x58) r3 = accept$alg(r2, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ID(r1, 0x80082407, &(0x7f0000000040)) dup3(r1, r3, 0x0) accept$alg(r2, 0x0, 0x0) 2018/04/11 12:45:17 executing program 3: semop(0x0, &(0x7f000001a000)=[{0x0, 0xffffffffffff0001}, {0x1000000}], 0x2) timer_create(0x0, &(0x7f0000cd0000)={0x0, 0x12}, &(0x7f0000044000)) timer_settime(0x0, 0x0, &(0x7f00004b1fe0)={{0x0, 0x1c9c380}, {0x0, 0x9}}, &(0x7f0000040000)) r0 = getpgid(0x0) tkill(r0, 0x1000000000016) 2018/04/11 12:45:17 executing program 2: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x1e, 0x1, 0x0) setsockopt$packet_tx_ring(r0, 0x10f, 0x87, &(0x7f0000b89fe4)=@req={0x772}, 0x10) sendmsg(r0, &(0x7f0000030000)={&(0x7f00004f5000)=@generic={0x10000000001e, "0100000900000000000000000226cc573c080002003724c71e14dd6a739effea1b48006be61ffe0000e103000000f8000004003f010039d8f986ff01000300000004af50d50700000000000000e3ad316a1983000000001d00e0dfcb24281e27800000100076c3979ac40000bd15020078a1dfd300881a8365b1b16d7436"}, 0x80, &(0x7f0000447ff0), 0x0, &(0x7f00006e9c68)}, 0x0) 2018/04/11 12:45:17 executing program 5: syz_fuseblk_mount(&(0x7f0000000040)='./file0\x00', &(0x7f0000000000)='./file0\x00', 0x4000, 0x0, 0x0, 0x0, 0x0, 0x0) 2018/04/11 12:45:17 executing program 7: syz_emit_ethernet(0x66, &(0x7f0000000000)={@random="cd3997030f00", @empty=[0x0, 0x0, 0x0, 0x8000000], [], {@ipv6={0x86dd, {0x0, 0x6, "b40900", 0x30, 0x67, 0x0, @ipv4={[], [0xff, 0xff], @multicast2=0xe0000002}, @mcast2={0xff, 0x2, [], 0x1}, {[], @icmpv6=@time_exceed={0x21, 0x0, 0x0, 0x0, [], {0x0, 0x6, "b680fa", 0x0, 0x0, 0x0, @ipv4={[], [0xff, 0xff], @broadcast=0xffffffff}, @ipv4={[], [0xff, 0xff], @remote={0xac, 0x14, 0xffffffffffffffff, 0xbb}}}}}}}}}, 0x0) 2018/04/11 12:45:17 executing program 4: perf_event_open(&(0x7f000025c000)={0x0, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_fuseblk_mount(&(0x7f0000000040)='./file0\x00', &(0x7f0000000000)='./file0\x00', 0x4000, 0x0, 0x0, 0x0, 0x0, 0x0) 2018/04/11 12:45:17 executing program 5 (fault-call:6 fault-nth:0): perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000200)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc-cast5-avx\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00003bcfd0)="d3ab27191a", 0x5) sendmmsg$alg(r1, &(0x7f0000007e40)=[{0x0, 0x0, &(0x7f0000000900)}], 0x1, 0x0) accept(r0, &(0x7f0000000040)=@pppol2tpv3in6, &(0x7f00000000c0)=0x80) 2018/04/11 12:45:17 executing program 1: r0 = socket(0x1e, 0x1, 0x0) setsockopt$packet_tx_ring(r0, 0x10f, 0x87, &(0x7f0000b89fe4)=@req={0x772}, 0x10) sendmsg(r0, &(0x7f0000030000)={&(0x7f00004f5000)=@generic={0x10000000001e, "0014000903000000000000000226cc573c080000003724c71e14dd6a739effea1b48006be61ffe0000e103000000f8000004003f010039d8f986ff01000300000004af50d50700000000000000e3ad316a1983000000001d00e0dfcb24281e27800000100076c3979ac40000bd15020078a1dfd300881a8365b1b16d7436"}, 0x80, &(0x7f0000447ff0), 0x0, &(0x7f00006e9c68)}, 0x0) 2018/04/11 12:45:17 executing program 6: r0 = socket$inet6(0xa, 0x80003, 0xff) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @ipv4={[], [0xff, 0xff], @dev={0xac, 0x14, 0x14, 0x1b}}}, 0x1c) sendmsg(r0, &(0x7f000001b000)={0x0, 0xfffffff5, &(0x7f0000019fa0), 0x143, &(0x7f000001ef08)}, 0x0) 2018/04/11 12:45:17 executing program 2: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x1e, 0x1, 0x0) setsockopt$packet_tx_ring(r0, 0x10f, 0x87, &(0x7f0000b89fe4)=@req={0x772}, 0x10) sendmsg(r0, &(0x7f0000030000)={&(0x7f00004f5000)=@generic={0x10000000001e, "0100000900000000000000000226cc573c080004003724c71e14dd6a739effea1b48006be61ffe0000e103000000f8000004003f010039d8f986ff01000300000004af50d50700000000000000e3ad316a1983000000001d00e0dfcb24281e27800000100076c3979ac40000bd15020078a1dfd300881a8365b1b16d7436"}, 0x80, &(0x7f0000447ff0), 0x0, &(0x7f00006e9c68)}, 0x0) 2018/04/11 12:45:17 executing program 6: r0 = socket$inet6(0xa, 0x80003, 0xff) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @ipv4={[], [0xff, 0xff], @dev={0xac, 0x14, 0x14, 0x1b}}}, 0x1c) sendmsg(r0, &(0x7f000001b000)={0x0, 0xfffffff5, &(0x7f0000019fa0), 0x160, &(0x7f000001ef08)}, 0x0) 2018/04/11 12:45:17 executing program 7: syz_emit_ethernet(0x66, &(0x7f0000000000)={@random="cd3997030f00", @empty=[0x0, 0x0, 0x0, 0xf0ffffffffffff], [], {@ipv6={0x86dd, {0x0, 0x6, "b40900", 0x30, 0x67, 0x0, @ipv4={[], [0xff, 0xff], @multicast2=0xe0000002}, @mcast2={0xff, 0x2, [], 0x1}, {[], @icmpv6=@time_exceed={0x21, 0x0, 0x0, 0x0, [], {0x0, 0x6, "b680fa", 0x0, 0x0, 0x0, @ipv4={[], [0xff, 0xff], @broadcast=0xffffffff}, @ipv4={[], [0xff, 0xff], @remote={0xac, 0x14, 0xffffffffffffffff, 0xbb}}}}}}}}}, 0x0) 2018/04/11 12:45:17 executing program 1: r0 = socket(0x1e, 0x1, 0x0) setsockopt$packet_tx_ring(r0, 0x10f, 0x87, &(0x7f0000b89fe4)=@req={0x772}, 0x10) sendmsg(r0, &(0x7f0000030000)={&(0x7f00004f5000)=@generic={0x10000000001e, "001400097fffffff000000000226cc573c080000003724c71e14dd6a739effea1b48006be61ffe0000e103000000f8000004003f010039d8f986ff01000300000004af50d50700000000000000e3ad316a1983000000001d00e0dfcb24281e27800000100076c3979ac40000bd15020078a1dfd300881a8365b1b16d7436"}, 0x80, &(0x7f0000447ff0), 0x0, &(0x7f00006e9c68)}, 0x0) [ 615.515339] FAULT_INJECTION: forcing a failure. [ 615.515339] name failslab, interval 1, probability 0, space 0, times 0 [ 615.526635] CPU: 0 PID: 2412 Comm: syz-executor5 Not tainted 4.16.0+ #17 [ 615.533468] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 615.542813] Call Trace: [ 615.545404] dump_stack+0x1b9/0x294 [ 615.549025] ? dump_stack_print_info.cold.2+0x52/0x52 [ 615.554204] ? graph_lock+0x170/0x170 [ 615.558004] should_fail.cold.4+0xa/0x1a 2018/04/11 12:45:17 executing program 7: syz_emit_ethernet(0x66, &(0x7f0000000000)={@random="cd3997030f00", @empty=[0x0, 0x0, 0x0, 0x806000000000000], [], {@ipv6={0x86dd, {0x0, 0x6, "b40900", 0x30, 0x67, 0x0, @ipv4={[], [0xff, 0xff], @multicast2=0xe0000002}, @mcast2={0xff, 0x2, [], 0x1}, {[], @icmpv6=@time_exceed={0x21, 0x0, 0x0, 0x0, [], {0x0, 0x6, "b680fa", 0x0, 0x0, 0x0, @ipv4={[], [0xff, 0xff], @broadcast=0xffffffff}, @ipv4={[], [0xff, 0xff], @remote={0xac, 0x14, 0xffffffffffffffff, 0xbb}}}}}}}}}, 0x0) [ 615.562059] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 615.567162] ? lock_downgrade+0x8e0/0x8e0 [ 615.571300] ? find_held_lock+0x36/0x1c0 [ 615.575371] ? check_same_owner+0x320/0x320 [ 615.579689] ? rcu_note_context_switch+0x710/0x710 [ 615.584619] ? expand_files.part.8+0x9a0/0x9a0 [ 615.589211] __should_failslab+0x124/0x180 [ 615.593446] should_failslab+0x9/0x14 [ 615.597241] kmem_cache_alloc+0x2af/0x760 [ 615.601402] sock_alloc_inode+0x6f/0x300 [ 615.605456] ? sock_destroy_inode+0x70/0x70 [ 615.609771] ? fget_raw+0x20/0x20 2018/04/11 12:45:17 executing program 6: r0 = socket$inet6(0xa, 0x80003, 0xff) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @ipv4={[], [0xff, 0xff], @dev={0xac, 0x14, 0x14, 0x1b}}}, 0x1c) sendmsg(r0, &(0x7f000001b000)={0x0, 0xfffffff5, &(0x7f0000019fa0), 0x1e5, &(0x7f000001ef08)}, 0x0) 2018/04/11 12:45:17 executing program 1: r0 = socket(0x1e, 0x1, 0x0) setsockopt$packet_tx_ring(r0, 0x10f, 0x87, &(0x7f0000b89fe4)=@req={0x772}, 0x10) sendmsg(r0, &(0x7f0000030000)={&(0x7f00004f5000)=@generic={0x10000000001e, "0014000904000000000000000226cc573c080000003724c71e14dd6a739effea1b48006be61ffe0000e103000000f8000004003f010039d8f986ff01000300000004af50d50700000000000000e3ad316a1983000000001d00e0dfcb24281e27800000100076c3979ac40000bd15020078a1dfd300881a8365b1b16d7436"}, 0x80, &(0x7f0000447ff0), 0x0, &(0x7f00006e9c68)}, 0x0) [ 615.613216] ? sock_destroy_inode+0x70/0x70 [ 615.617522] alloc_inode+0x63/0x190 [ 615.621136] new_inode_pseudo+0x69/0x1a0 [ 615.625184] ? prune_icache_sb+0x1a0/0x1a0 [ 615.629405] ? kasan_check_write+0x14/0x20 [ 615.633630] ? __mutex_unlock_slowpath+0x180/0x8a0 [ 615.638568] sock_alloc+0x41/0x270 [ 615.642129] __sys_accept4+0x11c/0x8a0 [ 615.646011] ? SyS_listen+0x30/0x30 [ 615.649638] ? __sb_end_write+0xac/0xe0 [ 615.653611] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 615.659143] ? fput+0x130/0x1a0 [ 615.662415] ? ksys_write+0x1a6/0x250 [ 615.666209] ? SyS_read+0x30/0x30 [ 615.669650] ? mm_fault_error+0x380/0x380 [ 615.673799] SyS_accept+0x26/0x30 [ 615.677250] ? SyS_accept4+0x40/0x40 [ 615.680954] do_syscall_64+0x29e/0x9d0 [ 615.684826] ? vmalloc_sync_all+0x30/0x30 [ 615.688968] ? _raw_spin_unlock_irq+0x27/0x70 [ 615.693455] ? finish_task_switch+0x1ca/0x820 [ 615.697957] ? syscall_return_slowpath+0x5c0/0x5c0 [ 615.702881] ? syscall_return_slowpath+0x30f/0x5c0 [ 615.707804] ? entry_SYSCALL_64_after_hwframe+0x52/0xb7 [ 615.713172] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 615.718012] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 615.723189] RIP: 0033:0x455259 [ 615.726363] RSP: 002b:00007f204b46ac68 EFLAGS: 00000246 ORIG_RAX: 000000000000002b [ 615.734066] RAX: ffffffffffffffda RBX: 00007f204b46b6d4 RCX: 0000000000455259 [ 615.741338] RDX: 00000000200000c0 RSI: 0000000020000040 RDI: 0000000000000014 [ 615.748596] RBP: 000000000072bea0 R08: 0000000000000000 R09: 0000000000000000 [ 615.755853] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000016 2018/04/11 12:45:17 executing program 0: r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$alg(0x26, 0x5, 0x0) accept$alg(r1, 0x0, 0x0) bind$alg(r1, &(0x7f0000000200)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc-cast5-avx\x00'}, 0x58) r2 = accept$alg(r1, 0x0, 0x0) dup3(r0, r2, 0x0) [ 615.763112] R13: 0000000000000000 R14: 00000000006f30a0 R15: 0000000000000000 2018/04/11 12:45:17 executing program 5 (fault-call:6 fault-nth:1): perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000200)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc-cast5-avx\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00003bcfd0)="d3ab27191a", 0x5) sendmmsg$alg(r1, &(0x7f0000007e40)=[{0x0, 0x0, &(0x7f0000000900)}], 0x1, 0x0) accept(r0, &(0x7f0000000040)=@pppol2tpv3in6, &(0x7f00000000c0)=0x80) 2018/04/11 12:45:17 executing program 3: semop(0x0, &(0x7f000001a000)=[{0x0, 0xffffffffffff0001}, {0x500}], 0x2) timer_create(0x0, &(0x7f0000cd0000)={0x0, 0x12}, &(0x7f0000044000)) timer_settime(0x0, 0x0, &(0x7f00004b1fe0)={{0x0, 0x1c9c380}, {0x0, 0x9}}, &(0x7f0000040000)) r0 = getpgid(0x0) tkill(r0, 0x1000000000016) 2018/04/11 12:45:17 executing program 0: r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$alg(0x26, 0x5, 0x0) accept$alg(r1, 0x0, 0x0) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000200)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc-cast5-avx\x00'}, 0x58) r3 = accept$alg(r2, 0x0, 0x0) dup3(r0, r3, 0x0) 2018/04/11 12:45:17 executing program 7: syz_emit_ethernet(0x66, &(0x7f0000000000)={@random="cd3997030f00", @empty=[0x0, 0x0, 0x0, 0x43050000], [], {@ipv6={0x86dd, {0x0, 0x6, "b40900", 0x30, 0x67, 0x0, @ipv4={[], [0xff, 0xff], @multicast2=0xe0000002}, @mcast2={0xff, 0x2, [], 0x1}, {[], @icmpv6=@time_exceed={0x21, 0x0, 0x0, 0x0, [], {0x0, 0x6, "b680fa", 0x0, 0x0, 0x0, @ipv4={[], [0xff, 0xff], @broadcast=0xffffffff}, @ipv4={[], [0xff, 0xff], @remote={0xac, 0x14, 0xffffffffffffffff, 0xbb}}}}}}}}}, 0x0) 2018/04/11 12:45:17 executing program 6: r0 = socket$inet6(0xa, 0x80003, 0xff) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @ipv4={[], [0xff, 0xff], @dev={0xac, 0x14, 0x14, 0x1b}}}, 0x1c) sendmsg(r0, &(0x7f000001b000)={0x0, 0xfffffff5, &(0x7f0000019fa0), 0x125, &(0x7f000001ef08)}, 0x0) 2018/04/11 12:45:17 executing program 2: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x1e, 0x1, 0x0) setsockopt$packet_tx_ring(r0, 0x10f, 0x87, &(0x7f0000b89fe4)=@req={0x772}, 0x10) sendmsg(r0, &(0x7f0000030000)={&(0x7f00004f5000)=@generic={0x10000000001e, "0100000900000000000000000226cc573c080000023724c71e14dd6a739effea1b48006be61ffe0000e103000000f8000004003f010039d8f986ff01000300000004af50d50700000000000000e3ad316a1983000000001d00e0dfcb24281e27800000100076c3979ac40000bd15020078a1dfd300881a8365b1b16d7436"}, 0x80, &(0x7f0000447ff0), 0x0, &(0x7f00006e9c68)}, 0x0) 2018/04/11 12:45:17 executing program 1: r0 = socket(0x1e, 0x1, 0x0) setsockopt$packet_tx_ring(r0, 0x10f, 0x87, &(0x7f0000b89fe4)=@req={0x772}, 0x10) sendmsg(r0, &(0x7f0000030000)={&(0x7f00004f5000)=@generic={0x10000000001e, "00140009000000007fffffff0226cc573c080000003724c71e14dd6a739effea1b48006be61ffe0000e103000000f8000004003f010039d8f986ff01000300000004af50d50700000000000000e3ad316a1983000000001d00e0dfcb24281e27800000100076c3979ac40000bd15020078a1dfd300881a8365b1b16d7436"}, 0x80, &(0x7f0000447ff0), 0x0, &(0x7f00006e9c68)}, 0x0) 2018/04/11 12:45:17 executing program 4: perf_event_open(&(0x7f000025c000)={0x0, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_fuseblk_mount(&(0x7f0000000040)='./file0\x00', &(0x7f0000000000)='./file0\x00', 0x4000, 0x0, 0x0, 0x0, 0x0, 0x0) [ 616.367664] FAULT_INJECTION: forcing a failure. [ 616.367664] name failslab, interval 1, probability 0, space 0, times 0 [ 616.378922] CPU: 1 PID: 2453 Comm: syz-executor5 Not tainted 4.16.0+ #17 [ 616.385742] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 616.395076] Call Trace: [ 616.397651] dump_stack+0x1b9/0x294 [ 616.401259] ? dump_stack_print_info.cold.2+0x52/0x52 [ 616.406441] ? __save_stack_trace+0x7e/0xd0 [ 616.410760] should_fail.cold.4+0xa/0x1a 2018/04/11 12:45:18 executing program 4: perf_event_open(&(0x7f000025c000)={0x0, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_fuseblk_mount(&(0x7f0000000040)='./file0\x00', &(0x7f0000000000)='./file0\x00', 0x4000, 0x0, 0x0, 0x0, 0x0, 0x0) 2018/04/11 12:45:18 executing program 0: r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$alg(0x26, 0x5, 0x0) fcntl$setsig(r1, 0xa, 0x37) bind$alg(r1, &(0x7f0000000200)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc-cast5-avx\x00'}, 0x58) r2 = accept$alg(r1, 0x0, 0x0) syz_open_dev$vcsa(&(0x7f0000000040)='/dev/vcsa#\x00', 0x5, 0x101000) dup3(r0, r2, 0x0) 2018/04/11 12:45:18 executing program 3: semop(0x0, &(0x7f000001a000)=[{0x0, 0xffffffffffff0001}, {0x5000000}], 0x2) timer_create(0x0, &(0x7f0000cd0000)={0x0, 0x12}, &(0x7f0000044000)) timer_settime(0x0, 0x0, &(0x7f00004b1fe0)={{0x0, 0x1c9c380}, {0x0, 0x9}}, &(0x7f0000040000)) r0 = getpgid(0x0) tkill(r0, 0x1000000000016) 2018/04/11 12:45:18 executing program 4: perf_event_open(&(0x7f000025c000)={0x2, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_fuseblk_mount(&(0x7f0000000040)='./file0\x00', &(0x7f0000000000)='./file0\x00', 0x4000, 0x0, 0x0, 0x0, 0x0, 0x0) [ 616.414809] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 616.420154] ? save_stack+0x43/0xd0 [ 616.423757] ? kasan_kmalloc+0xc4/0xe0 [ 616.427631] ? kasan_slab_alloc+0x12/0x20 [ 616.431758] ? kmem_cache_alloc+0x12e/0x760 [ 616.436061] ? sock_alloc_inode+0x6f/0x300 [ 616.440291] ? alloc_inode+0x63/0x190 2018/04/11 12:45:18 executing program 7: syz_emit_ethernet(0x66, &(0x7f0000000000)={@random="cd3997030f00", @empty=[0x0, 0x0, 0x0, 0xff000000], [], {@ipv6={0x86dd, {0x0, 0x6, "b40900", 0x30, 0x67, 0x0, @ipv4={[], [0xff, 0xff], @multicast2=0xe0000002}, @mcast2={0xff, 0x2, [], 0x1}, {[], @icmpv6=@time_exceed={0x21, 0x0, 0x0, 0x0, [], {0x0, 0x6, "b680fa", 0x0, 0x0, 0x0, @ipv4={[], [0xff, 0xff], @broadcast=0xffffffff}, @ipv4={[], [0xff, 0xff], @remote={0xac, 0x14, 0xffffffffffffffff, 0xbb}}}}}}}}}, 0x0) [ 616.440301] ? new_inode_pseudo+0x69/0x1a0 2018/04/11 12:45:18 executing program 6: r0 = socket$inet6(0xa, 0x80003, 0xff) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @ipv4={[], [0xff, 0xff], @dev={0xac, 0x14, 0x14, 0x1b}}}, 0x1c) sendmsg(r0, &(0x7f000001b000)={0x0, 0xfffffff5, &(0x7f0000019fa0), 0x6c, &(0x7f000001ef08)}, 0x0) [ 616.440310] ? __sys_accept4+0x11c/0x8a0 [ 616.440318] ? SyS_accept+0x26/0x30 [ 616.440329] ? entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 616.440343] ? find_held_lock+0x36/0x1c0 [ 616.440367] ? check_same_owner+0x320/0x320 [ 616.440377] ? rcu_is_watching+0x85/0x140 [ 616.440387] ? rcu_note_context_switch+0x710/0x710 [ 616.440399] __should_failslab+0x124/0x180 [ 616.440410] should_failslab+0x9/0x14 [ 616.440418] kmem_cache_alloc_trace+0x2cb/0x780 [ 616.440425] ? kmem_cache_alloc+0x5fa/0x760 [ 616.440444] sock_alloc_inode+0xb3/0x300 [ 616.440453] ? sock_destroy_inode+0x70/0x70 [ 616.440462] ? fget_raw+0x20/0x20 [ 616.440473] ? sock_destroy_inode+0x70/0x70 [ 616.440482] alloc_inode+0x63/0x190 [ 616.440490] new_inode_pseudo+0x69/0x1a0 [ 616.440499] ? prune_icache_sb+0x1a0/0x1a0 [ 616.440507] ? kasan_check_write+0x14/0x20 [ 616.440517] ? __mutex_unlock_slowpath+0x180/0x8a0 [ 616.440529] sock_alloc+0x41/0x270 [ 616.440539] __sys_accept4+0x11c/0x8a0 [ 616.440549] ? SyS_listen+0x30/0x30 [ 616.440561] ? __sb_end_write+0xac/0xe0 [ 616.440573] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 616.440580] ? fput+0x130/0x1a0 [ 616.440591] ? ksys_write+0x1a6/0x250 [ 616.440601] ? SyS_read+0x30/0x30 [ 616.440610] ? mm_fault_error+0x380/0x380 [ 616.440622] SyS_accept+0x26/0x30 [ 616.440629] ? SyS_accept4+0x40/0x40 [ 616.440639] do_syscall_64+0x29e/0x9d0 [ 616.440647] ? vmalloc_sync_all+0x30/0x30 [ 616.440654] ? _raw_spin_unlock_irq+0x27/0x70 [ 616.440663] ? finish_task_switch+0x1ca/0x820 [ 616.440673] ? syscall_return_slowpath+0x5c0/0x5c0 [ 616.440683] ? syscall_return_slowpath+0x30f/0x5c0 [ 616.440694] ? entry_SYSCALL_64_after_hwframe+0x52/0xb7 [ 616.440705] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 616.440717] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 616.440726] RIP: 0033:0x455259 [ 616.440731] RSP: 002b:00007f204b46ac68 EFLAGS: 00000246 ORIG_RAX: 000000000000002b [ 616.440741] RAX: ffffffffffffffda RBX: 00007f204b46b6d4 RCX: 0000000000455259 [ 616.440746] RDX: 00000000200000c0 RSI: 0000000020000040 RDI: 0000000000000014 [ 616.440751] RBP: 000000000072bea0 R08: 0000000000000000 R09: 0000000000000000 [ 616.440756] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000016 [ 616.440761] R13: 0000000000000000 R14: 00000000006f30a0 R15: 0000000000000001 2018/04/11 12:45:19 executing program 2: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x1e, 0x1, 0x0) setsockopt$packet_tx_ring(r0, 0x10f, 0x87, &(0x7f0000b89fe4)=@req={0x772}, 0x10) sendmsg(r0, &(0x7f0000030000)={&(0x7f00004f5000)=@generic={0x10000000001e, "0100000900000000000000000226cc573c080000003724c71e14dd6a739effea1b48026be61ffe0000e103000000f8000004003f010039d8f986ff01000300000004af50d50700000000000000e3ad316a1983000000001d00e0dfcb24281e27800000100076c3979ac40000bd15020078a1dfd300881a8365b1b16d7436"}, 0x80, &(0x7f0000447ff0), 0x0, &(0x7f00006e9c68)}, 0x0) 2018/04/11 12:45:19 executing program 1: r0 = socket(0x1e, 0x1, 0x0) setsockopt$packet_tx_ring(r0, 0x10f, 0x87, &(0x7f0000b89fe4)=@req={0x772}, 0x10) sendmsg(r0, &(0x7f0000030000)={&(0x7f00004f5000)=@generic={0x10000000001e, "0014000900000400000000000226cc573c080000003724c71e14dd6a739effea1b48006be61ffe0000e103000000f8000004003f010039d8f986ff01000300000004af50d50700000000000000e3ad316a1983000000001d00e0dfcb24281e27800000100076c3979ac40000bd15020078a1dfd300881a8365b1b16d7436"}, 0x80, &(0x7f0000447ff0), 0x0, &(0x7f00006e9c68)}, 0x0) 2018/04/11 12:45:19 executing program 5 (fault-call:6 fault-nth:2): perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000200)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc-cast5-avx\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00003bcfd0)="d3ab27191a", 0x5) sendmmsg$alg(r1, &(0x7f0000007e40)=[{0x0, 0x0, &(0x7f0000000900)}], 0x1, 0x0) accept(r0, &(0x7f0000000040)=@pppol2tpv3in6, &(0x7f00000000c0)=0x80) 2018/04/11 12:45:19 executing program 7: syz_emit_ethernet(0x66, &(0x7f0000000000)={@random="cd3997030f00", @empty=[0x0, 0x0, 0x0, 0x67000000], [], {@ipv6={0x86dd, {0x0, 0x6, "b40900", 0x30, 0x67, 0x0, @ipv4={[], [0xff, 0xff], @multicast2=0xe0000002}, @mcast2={0xff, 0x2, [], 0x1}, {[], @icmpv6=@time_exceed={0x21, 0x0, 0x0, 0x0, [], {0x0, 0x6, "b680fa", 0x0, 0x0, 0x0, @ipv4={[], [0xff, 0xff], @broadcast=0xffffffff}, @ipv4={[], [0xff, 0xff], @remote={0xac, 0x14, 0xffffffffffffffff, 0xbb}}}}}}}}}, 0x0) 2018/04/11 12:45:19 executing program 4: perf_event_open(&(0x7f000025c000)={0x2, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_fuseblk_mount(&(0x7f0000000040)='./file0\x00', &(0x7f0000000000)='./file0\x00', 0x4000, 0x0, 0x0, 0x0, 0x0, 0x0) 2018/04/11 12:45:19 executing program 6: r0 = socket$inet6(0xa, 0x80003, 0xff) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @ipv4={[], [0xff, 0xff], @dev={0xac, 0x14, 0x14, 0x1b}}}, 0x1c) sendmsg(r0, &(0x7f000001b000)={0x0, 0xfffffff5, &(0x7f0000019fa0), 0x148, &(0x7f000001ef08)}, 0x0) 2018/04/11 12:45:19 executing program 3: semop(0x0, &(0x7f000001a000)=[{0x0, 0xffffffffffff0001}, {0xe00}], 0x2) timer_create(0x0, &(0x7f0000cd0000)={0x0, 0x12}, &(0x7f0000044000)) timer_settime(0x0, 0x0, &(0x7f00004b1fe0)={{0x0, 0x1c9c380}, {0x0, 0x9}}, &(0x7f0000040000)) r0 = getpgid(0x0) tkill(r0, 0x1000000000016) 2018/04/11 12:45:19 executing program 0: r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$alg(0x26, 0x5, 0x0) r2 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_ENABLE_STREAM_RESET(r2, 0x84, 0x76, &(0x7f0000444ff8)={0x0, 0x7}, 0x8) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r2, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback={0x0, 0x1}}], 0x1c) setsockopt$inet_sctp6_SCTP_RECONFIG_SUPPORTED(r2, 0x84, 0x75, &(0x7f0000107ff8)={0x0, 0x10040000}, 0x8) connect$inet6(r2, &(0x7f00008c0000)={0xa, 0x4e23, 0x0, @loopback={0x0, 0x1}}, 0x1c) setsockopt$inet_sctp6_SCTP_RESET_STREAMS(r2, 0x84, 0x79, &(0x7f00000000c0)=ANY=[@ANYRES32=0x0, @ANYBLOB="00edbc61"], 0x8) r3 = accept$alg(r1, 0x0, 0x0) r4 = dup3(r0, r3, 0x0) accept4$netrom(r4, &(0x7f0000000040)=@full, &(0x7f00000000c0)=0x48, 0x80000) 2018/04/11 12:45:19 executing program 7: syz_emit_ethernet(0x66, &(0x7f0000000000)={@random="cd3997030f00", @empty=[0x0, 0x0, 0x0, 0x4000000], [], {@ipv6={0x86dd, {0x0, 0x6, "b40900", 0x30, 0x67, 0x0, @ipv4={[], [0xff, 0xff], @multicast2=0xe0000002}, @mcast2={0xff, 0x2, [], 0x1}, {[], @icmpv6=@time_exceed={0x21, 0x0, 0x0, 0x0, [], {0x0, 0x6, "b680fa", 0x0, 0x0, 0x0, @ipv4={[], [0xff, 0xff], @broadcast=0xffffffff}, @ipv4={[], [0xff, 0xff], @remote={0xac, 0x14, 0xffffffffffffffff, 0xbb}}}}}}}}}, 0x0) 2018/04/11 12:45:19 executing program 2: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x1e, 0x1, 0x0) setsockopt$packet_tx_ring(r0, 0x10f, 0x87, &(0x7f0000b89fe4)=@req={0x772}, 0x10) sendmsg(r0, &(0x7f0000030000)={&(0x7f00004f5000)=@generic={0x10000000001e, "0100000900000000000000000226cc573c080000003724c71e14dd6a739effea1b48006be61ffe0200e103000000f8000004003f010039d8f986ff01000300000004af50d50700000000000000e3ad316a1983000000001d00e0dfcb24281e27800000100076c3979ac40000bd15020078a1dfd300881a8365b1b16d7436"}, 0x80, &(0x7f0000447ff0), 0x0, &(0x7f00006e9c68)}, 0x0) [ 617.422148] FAULT_INJECTION: forcing a failure. [ 617.422148] name failslab, interval 1, probability 0, space 0, times 0 [ 617.433414] CPU: 0 PID: 2504 Comm: syz-executor5 Not tainted 4.16.0+ #17 [ 617.440240] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 617.449578] Call Trace: [ 617.452157] dump_stack+0x1b9/0x294 [ 617.455776] ? dump_stack_print_info.cold.2+0x52/0x52 [ 617.460974] should_fail.cold.4+0xa/0x1a [ 617.465037] ? fault_create_debugfs_attr+0x1f0/0x1f0 2018/04/11 12:45:19 executing program 2: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x1e, 0x1, 0x0) setsockopt$packet_tx_ring(r0, 0x10f, 0x87, &(0x7f0000b89fe4)=@req={0x772}, 0x10) sendmsg(r0, &(0x7f0000030000)={&(0x7f00004f5000)=@generic={0x10000000001e, "0100000900000000000000000226cc573c080000003724c71e14dd6a739effea1b48006be61ffe0400e103000000f8000004003f010039d8f986ff01000300000004af50d50700000000000000e3ad316a1983000000001d00e0dfcb24281e27800000100076c3979ac40000bd15020078a1dfd300881a8365b1b16d7436"}, 0x80, &(0x7f0000447ff0), 0x0, &(0x7f00006e9c68)}, 0x0) 2018/04/11 12:45:19 executing program 7: syz_emit_ethernet(0x66, &(0x7f0000000000)={@random="cd3997030f00", @empty=[0x0, 0x0, 0x0, 0x800e0000], [], {@ipv6={0x86dd, {0x0, 0x6, "b40900", 0x30, 0x67, 0x0, @ipv4={[], [0xff, 0xff], @multicast2=0xe0000002}, @mcast2={0xff, 0x2, [], 0x1}, {[], @icmpv6=@time_exceed={0x21, 0x0, 0x0, 0x0, [], {0x0, 0x6, "b680fa", 0x0, 0x0, 0x0, @ipv4={[], [0xff, 0xff], @broadcast=0xffffffff}, @ipv4={[], [0xff, 0xff], @remote={0xac, 0x14, 0xffffffffffffffff, 0xbb}}}}}}}}}, 0x0) [ 617.470136] ? perf_trace_lock+0x495/0x900 [ 617.474365] ? find_held_lock+0x36/0x1c0 [ 617.478437] ? check_same_owner+0x320/0x320 [ 617.482745] ? __lockdep_init_map+0x105/0x590 [ 617.487238] ? rcu_note_context_switch+0x710/0x710 [ 617.492167] __should_failslab+0x124/0x180 [ 617.496399] should_failslab+0x9/0x14 [ 617.500195] kmem_cache_alloc+0x2af/0x760 [ 617.504332] ? lock_downgrade+0x8e0/0x8e0 [ 617.508474] __d_alloc+0xc1/0xc00 [ 617.511914] ? do_raw_spin_unlock+0x9e/0x2e0 [ 617.516308] ? do_raw_spin_trylock+0x1b0/0x1b0 2018/04/11 12:45:19 executing program 6: r0 = socket$inet6(0xa, 0x80003, 0xff) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @ipv4={[], [0xff, 0xff], @dev={0xac, 0x14, 0x14, 0x1b}}}, 0x1c) sendmsg(r0, &(0x7f000001b000)={0x0, 0xfffffff5, &(0x7f0000019fa0), 0x155, &(0x7f000001ef08)}, 0x0) 2018/04/11 12:45:19 executing program 2: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x1e, 0x1, 0x0) setsockopt$packet_tx_ring(r0, 0x10f, 0x87, &(0x7f0000b89fe4)=@req={0x772}, 0x10) sendmsg(r0, &(0x7f0000030000)={&(0x7f00004f5000)=@generic={0x10000000001e, "0100000900000000000000000226cc573c080000003724c71e14dd6a739effea1b48006be61ffe0002e103000000f8000004003f010039d8f986ff01000300000004af50d50700000000000000e3ad316a1983000000001d00e0dfcb24281e27800000100076c3979ac40000bd15020078a1dfd300881a8365b1b16d7436"}, 0x80, &(0x7f0000447ff0), 0x0, &(0x7f00006e9c68)}, 0x0) [ 617.520876] ? shrink_dcache_for_umount+0x290/0x290 [ 617.525887] ? _raw_spin_unlock+0x22/0x30 [ 617.530022] ? __alloc_fd+0x544/0x6e0 [ 617.533815] ? exit_files+0xb0/0xb0 [ 617.537445] ? kasan_check_read+0x11/0x20 [ 617.541672] ? do_raw_spin_unlock+0x9e/0x2e0 [ 617.546068] ? do_raw_spin_trylock+0x1b0/0x1b0 [ 617.550642] d_alloc_pseudo+0x1d/0x30 [ 617.554433] sock_alloc_file+0x157/0x4e0 [ 617.558478] ? _raw_spin_unlock+0x22/0x30 [ 617.562612] ? sock_release+0x1b0/0x1b0 [ 617.566570] ? get_unused_fd_flags+0x121/0x190 2018/04/11 12:45:19 executing program 6: r0 = socket$inet6(0xa, 0x80003, 0xff) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @ipv4={[], [0xff, 0xff], @dev={0xac, 0x14, 0x14, 0x1b}}}, 0x1c) sendmsg(r0, &(0x7f000001b000)={0x0, 0xfffffff5, &(0x7f0000019fa0), 0x177, &(0x7f000001ef08)}, 0x0) 2018/04/11 12:45:19 executing program 7: syz_emit_ethernet(0x66, &(0x7f0000000000)={@random="cd3997030f00", @empty=[0x0, 0x0, 0x0, 0x800e], [], {@ipv6={0x86dd, {0x0, 0x6, "b40900", 0x30, 0x67, 0x0, @ipv4={[], [0xff, 0xff], @multicast2=0xe0000002}, @mcast2={0xff, 0x2, [], 0x1}, {[], @icmpv6=@time_exceed={0x21, 0x0, 0x0, 0x0, [], {0x0, 0x6, "b680fa", 0x0, 0x0, 0x0, @ipv4={[], [0xff, 0xff], @broadcast=0xffffffff}, @ipv4={[], [0xff, 0xff], @remote={0xac, 0x14, 0xffffffffffffffff, 0xbb}}}}}}}}}, 0x0) [ 617.571135] ? __alloc_fd+0x6e0/0x6e0 [ 617.574924] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 617.580444] ? get_next_ino+0x8b/0x110 [ 617.584317] ? debug_lockdep_rcu_enabled+0x77/0x90 [ 617.589241] __sys_accept4+0x28d/0x8a0 [ 617.593120] ? SyS_listen+0x30/0x30 [ 617.596738] ? __sb_end_write+0xac/0xe0 [ 617.600702] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 617.606226] ? fput+0x130/0x1a0 [ 617.609495] ? ksys_write+0x1a6/0x250 [ 617.613292] ? SyS_read+0x30/0x30 [ 617.616728] ? mm_fault_error+0x380/0x380 [ 617.620868] SyS_accept+0x26/0x30 [ 617.624302] ? SyS_accept4+0x40/0x40 [ 617.628007] do_syscall_64+0x29e/0x9d0 [ 617.631876] ? vmalloc_sync_all+0x30/0x30 [ 617.636007] ? _raw_spin_unlock_irq+0x27/0x70 [ 617.640487] ? finish_task_switch+0x1ca/0x820 [ 617.644965] ? syscall_return_slowpath+0x5c0/0x5c0 [ 617.649879] ? syscall_return_slowpath+0x30f/0x5c0 [ 617.654798] ? entry_SYSCALL_64_after_hwframe+0x52/0xb7 [ 617.660161] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 617.664995] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 617.670175] RIP: 0033:0x455259 [ 617.673345] RSP: 002b:00007f204b46ac68 EFLAGS: 00000246 ORIG_RAX: 000000000000002b [ 617.681039] RAX: ffffffffffffffda RBX: 00007f204b46b6d4 RCX: 0000000000455259 [ 617.688293] RDX: 00000000200000c0 RSI: 0000000020000040 RDI: 0000000000000014 [ 617.695548] RBP: 000000000072bea0 R08: 0000000000000000 R09: 0000000000000000 [ 617.702800] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000016 [ 617.710062] R13: 0000000000000000 R14: 00000000006f30a0 R15: 0000000000000002 2018/04/11 12:45:19 executing program 0: r0 = syz_open_dev$dmmidi(&(0x7f00000001c0)='/dev/dmmidi#\x00', 0x1000, 0x20100) ioctl$DRM_IOCTL_GEM_OPEN(0xffffffffffffff9c, 0xc010640b, &(0x7f0000000280)={0x0, 0x0, 0x3f}) ioctl$DRM_IOCTL_GEM_CLOSE(r0, 0x40086409, &(0x7f00000002c0)={r1}) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000200)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc-cast5-avx\x00'}, 0x58) r3 = accept$alg(r2, 0x0, 0x0) r4 = dup3(0xffffffffffffffff, r3, 0x0) getsockopt$inet_sctp_SCTP_ASSOCINFO(r3, 0x84, 0x1, &(0x7f0000000000)={0x0, 0x40, 0x8, 0x2d4, 0x5}, &(0x7f0000000040)=0x14) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(r4, 0x84, 0x1a, &(0x7f0000000080)=ANY=[@ANYRES32=r5, @ANYBLOB="c8000000d7e28d89a52fabd72224c78ccd2b73b4a0ad77e2eeeeda1a0a564103a4bac0f1849be301a0824625590434737849899c6fc38099eeb62324a5ccb8b9dcd50b83e11ee6d68c7dad0a3217d09f15c9b08a9cd42da9f20214fb307e5e937b5b6cfad61e2e07c56b3899424ace8a8d54e4e5e77bf635c385e3f0dc5188c8d6ffcac3f75c11ae1b06780e452adb07b8c1985a4ec9ee9d41264ace4505b736b9a83a05412c13abcde20ff7f4504b6a167554d652604ddd78d8352a6671a42cd5c5c3bcde010d8ab6679be7"], &(0x7f0000000180)=0xd0) 2018/04/11 12:45:19 executing program 2: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x1e, 0x1, 0x0) setsockopt$packet_tx_ring(r0, 0x10f, 0x87, &(0x7f0000b89fe4)=@req={0x772}, 0x10) sendmsg(r0, &(0x7f0000030000)={&(0x7f00004f5000)=@generic={0x10000000001e, "0100000900000000000000000226cc573c080000003724c71e14dd6a739effea1b48006be61ffe0000e103020000f8000004003f010039d8f986ff01000300000004af50d50700000000000000e3ad316a1983000000001d00e0dfcb24281e27800000100076c3979ac40000bd15020078a1dfd300881a8365b1b16d7436"}, 0x80, &(0x7f0000447ff0), 0x0, &(0x7f00006e9c68)}, 0x0) 2018/04/11 12:45:19 executing program 6: r0 = socket$inet6(0xa, 0x80003, 0xff) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @ipv4={[], [0xff, 0xff], @dev={0xac, 0x14, 0x14, 0x1b}}}, 0x1c) sendmsg(r0, &(0x7f000001b000)={0x0, 0xfffffff5, &(0x7f0000019fa0), 0x70, &(0x7f000001ef08)}, 0x0) 2018/04/11 12:45:19 executing program 7: syz_emit_ethernet(0x66, &(0x7f0000000000)={@random="cd3997030f00", @empty=[0x0, 0x0, 0x0, 0x608], [], {@ipv6={0x86dd, {0x0, 0x6, "b40900", 0x30, 0x67, 0x0, @ipv4={[], [0xff, 0xff], @multicast2=0xe0000002}, @mcast2={0xff, 0x2, [], 0x1}, {[], @icmpv6=@time_exceed={0x21, 0x0, 0x0, 0x0, [], {0x0, 0x6, "b680fa", 0x0, 0x0, 0x0, @ipv4={[], [0xff, 0xff], @broadcast=0xffffffff}, @ipv4={[], [0xff, 0xff], @remote={0xac, 0x14, 0xffffffffffffffff, 0xbb}}}}}}}}}, 0x0) 2018/04/11 12:45:19 executing program 1: r0 = socket(0x1e, 0x1, 0x0) setsockopt$packet_tx_ring(r0, 0x10f, 0x87, &(0x7f0000b89fe4)=@req={0x772}, 0x10) sendmsg(r0, &(0x7f0000030000)={&(0x7f00004f5000)=@generic={0x10000000001e, "00140009000101d0000000000226cc573c080000003724c71e14dd6a739effea1b48006be61ffe0000e103000000f8000004003f010039d8f986ff01000300000004af50d50700000000000000e3ad316a1983000000001d00e0dfcb24281e27800000100076c3979ac40000bd15020078a1dfd300881a8365b1b16d7436"}, 0x80, &(0x7f0000447ff0), 0x0, &(0x7f00006e9c68)}, 0x0) 2018/04/11 12:45:19 executing program 5 (fault-call:6 fault-nth:3): perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000200)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc-cast5-avx\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00003bcfd0)="d3ab27191a", 0x5) sendmmsg$alg(r1, &(0x7f0000007e40)=[{0x0, 0x0, &(0x7f0000000900)}], 0x1, 0x0) accept(r0, &(0x7f0000000040)=@pppol2tpv3in6, &(0x7f00000000c0)=0x80) 2018/04/11 12:45:19 executing program 3: semop(0x0, &(0x7f000001a000)=[{0x0, 0xffffffffffff0001}, {0x5}], 0x2) timer_create(0x0, &(0x7f0000cd0000)={0x0, 0x12}, &(0x7f0000044000)) timer_settime(0x0, 0x0, &(0x7f00004b1fe0)={{0x0, 0x1c9c380}, {0x0, 0x9}}, &(0x7f0000040000)) r0 = getpgid(0x0) tkill(r0, 0x1000000000016) 2018/04/11 12:45:19 executing program 4: perf_event_open(&(0x7f000025c000)={0x2, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_fuseblk_mount(&(0x7f0000000040)='./file0\x00', &(0x7f0000000000)='./file0\x00', 0x4000, 0x0, 0x0, 0x0, 0x0, 0x0) [ 617.799527] FAULT_INJECTION: forcing a failure. [ 617.799527] name failslab, interval 1, probability 0, space 0, times 0 [ 617.810903] CPU: 1 PID: 2557 Comm: syz-executor5 Not tainted 4.16.0+ #17 [ 617.817726] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 617.827071] Call Trace: [ 617.829648] dump_stack+0x1b9/0x294 [ 617.833261] ? dump_stack_print_info.cold.2+0x52/0x52 [ 617.838444] ? __lock_acquire+0x7f5/0x5130 [ 617.842667] should_fail.cold.4+0xa/0x1a [ 617.846715] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 617.851802] ? graph_lock+0x170/0x170 [ 617.855589] ? find_held_lock+0x36/0x1c0 [ 617.859649] ? check_same_owner+0x320/0x320 [ 617.863955] ? graph_lock+0x170/0x170 [ 617.867739] ? rcu_note_context_switch+0x710/0x710 [ 617.872652] ? kasan_check_read+0x11/0x20 [ 617.876783] ? do_raw_spin_unlock+0x9e/0x2e0 [ 617.881174] __should_failslab+0x124/0x180 [ 617.885394] should_failslab+0x9/0x14 [ 617.889177] kmem_cache_alloc+0x2af/0x760 [ 617.893309] ? find_held_lock+0x36/0x1c0 [ 617.897359] get_empty_filp+0x125/0x520 [ 617.901317] ? proc_nr_files+0x60/0x60 [ 617.905189] ? _raw_spin_unlock+0x22/0x30 [ 617.909327] ? kasan_check_read+0x11/0x20 [ 617.913458] ? do_raw_spin_unlock+0x9e/0x2e0 [ 617.917850] ? do_raw_spin_trylock+0x1b0/0x1b0 [ 617.922418] ? kasan_check_write+0x14/0x20 [ 617.926631] ? do_raw_spin_lock+0xc1/0x200 [ 617.930848] alloc_file+0x24/0x3e0 [ 617.934378] sock_alloc_file+0x1f3/0x4e0 [ 617.938419] ? _raw_spin_unlock+0x22/0x30 [ 617.942552] ? sock_release+0x1b0/0x1b0 [ 617.946519] ? get_unused_fd_flags+0x121/0x190 [ 617.951080] ? __alloc_fd+0x6e0/0x6e0 [ 617.954863] ? get_next_ino+0x8b/0x110 [ 617.958732] ? debug_lockdep_rcu_enabled+0x77/0x90 [ 617.963644] __sys_accept4+0x28d/0x8a0 [ 617.967517] ? SyS_listen+0x30/0x30 [ 617.971140] ? __sb_end_write+0xac/0xe0 [ 617.975099] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 617.980618] ? fput+0x130/0x1a0 [ 617.983884] ? ksys_write+0x1a6/0x250 [ 617.987672] ? SyS_read+0x30/0x30 [ 617.991105] ? mm_fault_error+0x380/0x380 [ 617.995238] SyS_accept+0x26/0x30 2018/04/11 12:45:19 executing program 6: r0 = socket$inet6(0xa, 0x80003, 0xff) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @ipv4={[], [0xff, 0xff], @dev={0xac, 0x14, 0x14, 0x1b}}}, 0x1c) sendmsg(r0, &(0x7f000001b000)={0x0, 0xfffffff5, &(0x7f0000019fa0), 0x7b, &(0x7f000001ef08)}, 0x0) 2018/04/11 12:45:19 executing program 7: syz_emit_ethernet(0x66, &(0x7f0000000000)={@random="cd3997030f00", @empty=[0x0, 0x0, 0x0, 0x600000000000000], [], {@ipv6={0x86dd, {0x0, 0x6, "b40900", 0x30, 0x67, 0x0, @ipv4={[], [0xff, 0xff], @multicast2=0xe0000002}, @mcast2={0xff, 0x2, [], 0x1}, {[], @icmpv6=@time_exceed={0x21, 0x0, 0x0, 0x0, [], {0x0, 0x6, "b680fa", 0x0, 0x0, 0x0, @ipv4={[], [0xff, 0xff], @broadcast=0xffffffff}, @ipv4={[], [0xff, 0xff], @remote={0xac, 0x14, 0xffffffffffffffff, 0xbb}}}}}}}}}, 0x0) 2018/04/11 12:45:19 executing program 0: r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$alg(0x26, 0x5, 0x0) r2 = semget(0x0, 0x4, 0x222) semctl$GETPID(r2, 0x4, 0xb, &(0x7f0000000280)=""/4096) bind$alg(r1, &(0x7f0000000200)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc-cast5-avx\x00'}, 0x58) r3 = memfd_create(&(0x7f0000000040)='cbc-cast5-avx\x00', 0x2) ioctl$PIO_UNIMAP(r3, 0x4b67, &(0x7f00000000c0)={0x5, &(0x7f0000000080)=[{0x1, 0x6}, {0x9, 0x8}, {0x1, 0x5}, {0x400, 0xffffffff}, {0x1, 0x9}]}) r4 = accept$alg(r1, 0x0, 0x0) fcntl$getown(r0, 0x9) dup3(r0, r4, 0x0) 2018/04/11 12:45:19 executing program 1: r0 = socket(0x1e, 0x1, 0x0) setsockopt$packet_tx_ring(r0, 0x10f, 0x87, &(0x7f0000b89fe4)=@req={0x772}, 0x10) sendmsg(r0, &(0x7f0000030000)={&(0x7f00004f5000)=@generic={0x10000000001e, "0014000902000000000000000226cc573c080000003724c71e14dd6a739effea1b48006be61ffe0000e103000000f8000004003f010039d8f986ff01000300000004af50d50700000000000000e3ad316a1983000000001d00e0dfcb24281e27800000100076c3979ac40000bd15020078a1dfd300881a8365b1b16d7436"}, 0x80, &(0x7f0000447ff0), 0x0, &(0x7f00006e9c68)}, 0x0) 2018/04/11 12:45:19 executing program 6: r0 = socket$inet6(0xa, 0x80003, 0xff) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @ipv4={[], [0xff, 0xff], @dev={0xac, 0x14, 0x14, 0x1b}}}, 0x1c) sendmsg(r0, &(0x7f000001b000)={0x0, 0xfffffff5, &(0x7f0000019fa0), 0x13a, &(0x7f000001ef08)}, 0x0) 2018/04/11 12:45:19 executing program 7: syz_emit_ethernet(0x66, &(0x7f0000000000)={@random="cd3997030f00", @empty=[0x0, 0x0, 0x0, 0x8035000000000000], [], {@ipv6={0x86dd, {0x0, 0x6, "b40900", 0x30, 0x67, 0x0, @ipv4={[], [0xff, 0xff], @multicast2=0xe0000002}, @mcast2={0xff, 0x2, [], 0x1}, {[], @icmpv6=@time_exceed={0x21, 0x0, 0x0, 0x0, [], {0x0, 0x6, "b680fa", 0x0, 0x0, 0x0, @ipv4={[], [0xff, 0xff], @broadcast=0xffffffff}, @ipv4={[], [0xff, 0xff], @remote={0xac, 0x14, 0xffffffffffffffff, 0xbb}}}}}}}}}, 0x0) 2018/04/11 12:45:19 executing program 1: r0 = socket(0x1e, 0x1, 0x0) setsockopt$packet_tx_ring(r0, 0x10f, 0x87, &(0x7f0000b89fe4)=@req={0x772}, 0x10) sendmsg(r0, &(0x7f0000030000)={&(0x7f00004f5000)=@generic={0x10000000001e, "0014000900000000000000010226cc573c080000003724c71e14dd6a739effea1b48006be61ffe0000e103000000f8000004003f010039d8f986ff01000300000004af50d50700000000000000e3ad316a1983000000001d00e0dfcb24281e27800000100076c3979ac40000bd15020078a1dfd300881a8365b1b16d7436"}, 0x80, &(0x7f0000447ff0), 0x0, &(0x7f00006e9c68)}, 0x0) 2018/04/11 12:45:19 executing program 6: r0 = socket$inet6(0xa, 0x80003, 0xff) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @ipv4={[], [0xff, 0xff], @dev={0xac, 0x14, 0x14, 0x1b}}}, 0x1c) sendmsg(r0, &(0x7f000001b000)={0x0, 0xfffffff5, &(0x7f0000019fa0), 0x186, &(0x7f000001ef08)}, 0x0) 2018/04/11 12:45:19 executing program 1: r0 = socket(0x1e, 0x1, 0x0) setsockopt$packet_tx_ring(r0, 0x10f, 0x87, &(0x7f0000b89fe4)=@req={0x772}, 0x10) sendmsg(r0, &(0x7f0000030000)={&(0x7f00004f5000)=@generic={0x10000000001e, "0014000900000000000000030226cc573c080000003724c71e14dd6a739effea1b48006be61ffe0000e103000000f8000004003f010039d8f986ff01000300000004af50d50700000000000000e3ad316a1983000000001d00e0dfcb24281e27800000100076c3979ac40000bd15020078a1dfd300881a8365b1b16d7436"}, 0x80, &(0x7f0000447ff0), 0x0, &(0x7f00006e9c68)}, 0x0) [ 617.998672] ? SyS_accept4+0x40/0x40 [ 618.002369] do_syscall_64+0x29e/0x9d0 [ 618.006236] ? vmalloc_sync_all+0x30/0x30 [ 618.010369] ? _raw_spin_unlock_irq+0x27/0x70 [ 618.014860] ? finish_task_switch+0x1ca/0x820 [ 618.019373] ? syscall_return_slowpath+0x5c0/0x5c0 [ 618.024290] ? syscall_return_slowpath+0x30f/0x5c0 [ 618.029207] ? entry_SYSCALL_64_after_hwframe+0x52/0xb7 [ 618.034556] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 618.039386] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 618.044555] RIP: 0033:0x455259 2018/04/11 12:45:19 executing program 2: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x1e, 0x1, 0x0) setsockopt$packet_tx_ring(r0, 0x10f, 0x87, &(0x7f0000b89fe4)=@req={0x772}, 0x10) sendmsg(r0, &(0x7f0000030000)={&(0x7f00004f5000)=@generic={0x10000000001e, "0100000900000000000000000226cc573c080000003724c71e14dd6a739effea1b48006be61ffe0000e103040000f8000004003f010039d8f986ff01000300000004af50d50700000000000000e3ad316a1983000000001d00e0dfcb24281e27800000100076c3979ac40000bd15020078a1dfd300881a8365b1b16d7436"}, 0x80, &(0x7f0000447ff0), 0x0, &(0x7f00006e9c68)}, 0x0) 2018/04/11 12:45:19 executing program 6: r0 = socket$inet6(0xa, 0x80003, 0xff) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @ipv4={[], [0xff, 0xff], @dev={0xac, 0x14, 0x14, 0x1b}}}, 0x1c) sendmsg(r0, &(0x7f000001b000)={0x0, 0xfffffff5, &(0x7f0000019fa0), 0x1d8, &(0x7f000001ef08)}, 0x0) 2018/04/11 12:45:19 executing program 7: syz_emit_ethernet(0x66, &(0x7f0000000000)={@random="cd3997030f00", @empty=[0x0, 0x0, 0x0, 0xf0], [], {@ipv6={0x86dd, {0x0, 0x6, "b40900", 0x30, 0x67, 0x0, @ipv4={[], [0xff, 0xff], @multicast2=0xe0000002}, @mcast2={0xff, 0x2, [], 0x1}, {[], @icmpv6=@time_exceed={0x21, 0x0, 0x0, 0x0, [], {0x0, 0x6, "b680fa", 0x0, 0x0, 0x0, @ipv4={[], [0xff, 0xff], @broadcast=0xffffffff}, @ipv4={[], [0xff, 0xff], @remote={0xac, 0x14, 0xffffffffffffffff, 0xbb}}}}}}}}}, 0x0) 2018/04/11 12:45:19 executing program 3: semop(0x0, &(0x7f000001a000)=[{0x0, 0xffffffffffff0001}, {0xe}], 0x2) timer_create(0x0, &(0x7f0000cd0000)={0x0, 0x12}, &(0x7f0000044000)) timer_settime(0x0, 0x0, &(0x7f00004b1fe0)={{0x0, 0x1c9c380}, {0x0, 0x9}}, &(0x7f0000040000)) r0 = getpgid(0x0) tkill(r0, 0x1000000000016) [ 618.047721] RSP: 002b:00007f204b46ac68 EFLAGS: 00000246 ORIG_RAX: 000000000000002b [ 618.055413] RAX: ffffffffffffffda RBX: 00007f204b46b6d4 RCX: 0000000000455259 [ 618.062672] RDX: 00000000200000c0 RSI: 0000000020000040 RDI: 0000000000000014 [ 618.069924] RBP: 000000000072bea0 R08: 0000000000000000 R09: 0000000000000000 [ 618.077172] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000016 [ 618.084428] R13: 0000000000000000 R14: 00000000006f30a0 R15: 0000000000000003 2018/04/11 12:45:19 executing program 4: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_fuseblk_mount(&(0x7f0000000040)='./file0\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) 2018/04/11 12:45:19 executing program 6: r0 = socket$inet6(0xa, 0x80003, 0xff) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @ipv4={[], [0xff, 0xff], @dev={0xac, 0x14, 0x14, 0x1b}}}, 0x1c) sendmsg(r0, &(0x7f000001b000)={0x0, 0xfffffff5, &(0x7f0000019fa0), 0x1b9, &(0x7f000001ef08)}, 0x0) 2018/04/11 12:45:19 executing program 0: r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$sndmidi(&(0x7f0000000040)='/dev/snd/midiC#D#\x00', 0x1, 0x200) ioctl$SNDRV_CTL_IOCTL_RAWMIDI_INFO(r1, 0xc10c5541, &(0x7f0000000080)={0x800, 0x8, 0x20, 0x0, 0x0, [], [], [], 0xfffffffffffffffe}) bind$alg(0xffffffffffffffff, &(0x7f0000000200)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc-cast5-avx\x00'}, 0x58) r2 = dup2(0xffffffffffffffff, r0) ioctl$BINDER_THREAD_EXIT(r2, 0x40046208, 0x0) syz_open_dev$audion(&(0x7f00000001c0)='/dev/audio#\x00', 0x1, 0x400) fchdir(0xffffffffffffffff) r3 = accept$alg(0xffffffffffffffff, 0x0, 0x0) dup3(r0, r3, 0x0) 2018/04/11 12:45:19 executing program 7: syz_emit_ethernet(0x66, &(0x7f0000000000)={@random="cd3997030f00", @empty=[0x0, 0x0, 0x0, 0x0, 0x88a8ffff], [], {@ipv6={0x86dd, {0x0, 0x6, "b40900", 0x30, 0x67, 0x0, @ipv4={[], [0xff, 0xff], @multicast2=0xe0000002}, @mcast2={0xff, 0x2, [], 0x1}, {[], @icmpv6=@time_exceed={0x21, 0x0, 0x0, 0x0, [], {0x0, 0x6, "b680fa", 0x0, 0x0, 0x0, @ipv4={[], [0xff, 0xff], @broadcast=0xffffffff}, @ipv4={[], [0xff, 0xff], @remote={0xac, 0x14, 0xffffffffffffffff, 0xbb}}}}}}}}}, 0x0) 2018/04/11 12:45:19 executing program 3: semop(0x0, &(0x7f000001a000)=[{0x0, 0xffffffffffff0001}, {0x500000000000000}], 0x2) timer_create(0x0, &(0x7f0000cd0000)={0x0, 0x12}, &(0x7f0000044000)) timer_settime(0x0, 0x0, &(0x7f00004b1fe0)={{0x0, 0x1c9c380}, {0x0, 0x9}}, &(0x7f0000040000)) r0 = getpgid(0x0) tkill(r0, 0x1000000000016) 2018/04/11 12:45:19 executing program 5 (fault-call:6 fault-nth:4): perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000200)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc-cast5-avx\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00003bcfd0)="d3ab27191a", 0x5) sendmmsg$alg(r1, &(0x7f0000007e40)=[{0x0, 0x0, &(0x7f0000000900)}], 0x1, 0x0) accept(r0, &(0x7f0000000040)=@pppol2tpv3in6, &(0x7f00000000c0)=0x80) 2018/04/11 12:45:19 executing program 2: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x1e, 0x1, 0x0) setsockopt$packet_tx_ring(r0, 0x10f, 0x87, &(0x7f0000b89fe4)=@req={0x772}, 0x10) sendmsg(r0, &(0x7f0000030000)={&(0x7f00004f5000)=@generic={0x10000000001e, "0100000900000000000000000226cc573c080000003724c71e14dd6a739effea1b48006be61ffe0000e103000200f8000004003f010039d8f986ff01000300000004af50d50700000000000000e3ad316a1983000000001d00e0dfcb24281e27800000100076c3979ac40000bd15020078a1dfd300881a8365b1b16d7436"}, 0x80, &(0x7f0000447ff0), 0x0, &(0x7f00006e9c68)}, 0x0) 2018/04/11 12:45:19 executing program 1: r0 = socket(0x1e, 0x1, 0x0) setsockopt$packet_tx_ring(r0, 0x10f, 0x87, &(0x7f0000b89fe4)=@req={0x772}, 0x10) sendmsg(r0, &(0x7f0000030000)={&(0x7f00004f5000)=@generic={0x10000000001e, "0014000900000300000000000226cc573c080000003724c71e14dd6a739effea1b48006be61ffe0000e103000000f8000004003f010039d8f986ff01000300000004af50d50700000000000000e3ad316a1983000000001d00e0dfcb24281e27800000100076c3979ac40000bd15020078a1dfd300881a8365b1b16d7436"}, 0x80, &(0x7f0000447ff0), 0x0, &(0x7f00006e9c68)}, 0x0) [ 618.209232] FAULT_INJECTION: forcing a failure. [ 618.209232] name failslab, interval 1, probability 0, space 0, times 0 [ 618.220945] CPU: 1 PID: 2622 Comm: syz-executor5 Not tainted 4.16.0+ #17 [ 618.227786] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 618.237137] Call Trace: [ 618.239714] dump_stack+0x1b9/0x294 [ 618.243332] ? dump_stack_print_info.cold.2+0x52/0x52 [ 618.248512] ? rcu_is_watching+0x85/0x140 [ 618.252648] should_fail.cold.4+0xa/0x1a 2018/04/11 12:45:19 executing program 2: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x1e, 0x1, 0x0) setsockopt$packet_tx_ring(r0, 0x10f, 0x87, &(0x7f0000b89fe4)=@req={0x772}, 0x10) sendmsg(r0, &(0x7f0000030000)={&(0x7f00004f5000)=@generic={0x10000000001e, "0100000900000000000000000226cc573c080000003724c71e14dd6a739effea1b48006be61ffe0000e103000400f8000004003f010039d8f986ff01000300000004af50d50700000000000000e3ad316a1983000000001d00e0dfcb24281e27800000100076c3979ac40000bd15020078a1dfd300881a8365b1b16d7436"}, 0x80, &(0x7f0000447ff0), 0x0, &(0x7f00006e9c68)}, 0x0) 2018/04/11 12:45:19 executing program 7: syz_emit_ethernet(0x66, &(0x7f0000000000)={@random="cd3997030f00", @empty=[0x0, 0x0, 0x0, 0x0, 0x806000000000000], [], {@ipv6={0x86dd, {0x0, 0x6, "b40900", 0x30, 0x67, 0x0, @ipv4={[], [0xff, 0xff], @multicast2=0xe0000002}, @mcast2={0xff, 0x2, [], 0x1}, {[], @icmpv6=@time_exceed={0x21, 0x0, 0x0, 0x0, [], {0x0, 0x6, "b680fa", 0x0, 0x0, 0x0, @ipv4={[], [0xff, 0xff], @broadcast=0xffffffff}, @ipv4={[], [0xff, 0xff], @remote={0xac, 0x14, 0xffffffffffffffff, 0xbb}}}}}}}}}, 0x0) 2018/04/11 12:45:19 executing program 4: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_fuseblk_mount(&(0x7f0000000040)='./file0\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) 2018/04/11 12:45:19 executing program 1: r0 = socket(0x1e, 0x1, 0x0) setsockopt$packet_tx_ring(r0, 0x10f, 0x87, &(0x7f0000b89fe4)=@req={0x772}, 0x10) sendmsg(r0, &(0x7f0000030000)={&(0x7f00004f5000)=@generic={0x10000000001e, "0014000900000000000000000126cc573c080000003724c71e14dd6a739effea1b48006be61ffe0000e103000000f8000004003f010039d8f986ff01000300000004af50d50700000000000000e3ad316a1983000000001d00e0dfcb24281e27800000100076c3979ac40000bd15020078a1dfd300881a8365b1b16d7436"}, 0x80, &(0x7f0000447ff0), 0x0, &(0x7f00006e9c68)}, 0x0) [ 618.256694] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 618.261779] ? kernel_text_address+0x79/0xf0 [ 618.266169] ? __unwind_start+0x166/0x330 [ 618.270301] ? graph_lock+0x170/0x170 [ 618.274085] ? __save_stack_trace+0x7e/0xd0 [ 618.278388] ? find_held_lock+0x36/0x1c0 [ 618.282433] ? __lock_is_held+0xb5/0x140 [ 618.286476] ? __cfg80211_disconnected+0x12a0/0x1eb0 [ 618.291568] ? check_same_owner+0x320/0x320 [ 618.295870] ? rcu_note_context_switch+0x710/0x710 [ 618.300788] __should_failslab+0x124/0x180 [ 618.305007] should_failslab+0x9/0x14 2018/04/11 12:45:19 executing program 6: r0 = socket$inet6(0xa, 0x80003, 0xff) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @ipv4={[], [0xff, 0xff], @dev={0xac, 0x14, 0x14, 0x1b}}}, 0x1c) sendmsg(r0, &(0x7f000001b000)={0x0, 0xfffffff5, &(0x7f0000019fa0), 0x59, &(0x7f000001ef08)}, 0x0) [ 618.308788] __kmalloc+0x2c8/0x760 [ 618.312310] ? perf_trace_lock+0xd6/0x900 [ 618.316443] ? sk_prot_alloc+0x1ae/0x2e0 [ 618.320499] sk_prot_alloc+0x1ae/0x2e0 [ 618.324373] sk_alloc+0x104/0x17b0 [ 618.327894] ? sock_def_error_report+0x710/0x710 [ 618.332632] ? trace_hardirqs_on_caller+0x421/0x5c0 [ 618.337635] ? print_usage_bug+0xc0/0xc0 [ 618.341682] ? find_held_lock+0x36/0x1c0 [ 618.345726] ? lock_acquire+0x1dc/0x520 [ 618.349684] ? af_alg_accept+0x29/0x7d0 [ 618.353644] ? mark_held_locks+0xc9/0x160 2018/04/11 12:45:20 executing program 4: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_fuseblk_mount(&(0x7f0000000040)='./file0\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) 2018/04/11 12:45:20 executing program 2: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x1e, 0x1, 0x0) setsockopt$packet_tx_ring(r0, 0x10f, 0x87, &(0x7f0000b89fe4)=@req={0x772}, 0x10) sendmsg(r0, &(0x7f0000030000)={&(0x7f00004f5000)=@generic={0x10000000001e, "0100000900000000000000000226cc573c080000003724c71e14dd6a739effea1b48006be61ffe0000e103000002f8000004003f010039d8f986ff01000300000004af50d50700000000000000e3ad316a1983000000001d00e0dfcb24281e27800000100076c3979ac40000bd15020078a1dfd300881a8365b1b16d7436"}, 0x80, &(0x7f0000447ff0), 0x0, &(0x7f00006e9c68)}, 0x0) 2018/04/11 12:45:20 executing program 6: r0 = socket$inet6(0xa, 0x80003, 0xff) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @ipv4={[], [0xff, 0xff], @dev={0xac, 0x14, 0x14, 0x1b}}}, 0x1c) sendmsg(r0, &(0x7f000001b000)={0x0, 0xfffffff5, &(0x7f0000019fa0), 0xd6, &(0x7f000001ef08)}, 0x0) [ 618.357776] ? __local_bh_enable_ip+0x161/0x230 [ 618.362428] ? trace_hardirqs_on_caller+0x421/0x5c0 [ 618.367433] ? lock_sock_nested+0x9f/0x120 [ 618.371651] ? trace_hardirqs_on+0xd/0x10 [ 618.375786] ? __local_bh_enable_ip+0x161/0x230 [ 618.380438] ? lock_sock_nested+0xe7/0x120 [ 618.384664] af_alg_accept+0x9d/0x7d0 [ 618.388446] alg_accept+0x46/0x60 [ 618.391882] __sys_accept4+0x3b2/0x8a0 [ 618.395750] ? SyS_listen+0x30/0x30 [ 618.399371] ? __sb_end_write+0xac/0xe0 [ 618.403332] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 2018/04/11 12:45:20 executing program 6: r0 = socket$inet6(0xa, 0x80003, 0xff) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @ipv4={[], [0xff, 0xff], @dev={0xac, 0x14, 0x14, 0x1b}}}, 0x1c) sendmsg(r0, &(0x7f000001b000)={0x0, 0xfffffff5, &(0x7f0000019fa0), 0x1ea, &(0x7f000001ef08)}, 0x0) [ 618.408857] ? fput+0x130/0x1a0 [ 618.412121] ? ksys_write+0x1a6/0x250 [ 618.415910] ? SyS_read+0x30/0x30 [ 618.419346] ? mm_fault_error+0x380/0x380 [ 618.423478] ? syscall_slow_exit_work+0x4f0/0x4f0 [ 618.428317] SyS_accept+0x26/0x30 [ 618.431751] ? SyS_accept4+0x40/0x40 [ 618.435445] do_syscall_64+0x29e/0x9d0 [ 618.439313] ? vmalloc_sync_all+0x30/0x30 [ 618.443441] ? _raw_spin_unlock_irq+0x27/0x70 [ 618.447919] ? finish_task_switch+0x1ca/0x820 [ 618.452395] ? syscall_return_slowpath+0x5c0/0x5c0 2018/04/11 12:45:20 executing program 6: r0 = socket$inet6(0xa, 0x80003, 0xff) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @ipv4={[], [0xff, 0xff], @dev={0xac, 0x14, 0x14, 0x1b}}}, 0x1c) sendmsg(r0, &(0x7f000001b000)={0x0, 0xfffffff5, &(0x7f0000019fa0), 0xd7, &(0x7f000001ef08)}, 0x0) [ 618.457315] ? syscall_return_slowpath+0x30f/0x5c0 [ 618.462227] ? entry_SYSCALL_64_after_hwframe+0x52/0xb7 [ 618.467576] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 618.472405] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 618.477574] RIP: 0033:0x455259 [ 618.480742] RSP: 002b:00007f204b46ac68 EFLAGS: 00000246 ORIG_RAX: 000000000000002b [ 618.488434] RAX: ffffffffffffffda RBX: 00007f204b46b6d4 RCX: 0000000000455259 [ 618.495685] RDX: 00000000200000c0 RSI: 0000000020000040 RDI: 0000000000000014 [ 618.502936] RBP: 000000000072bea0 R08: 0000000000000000 R09: 0000000000000000 [ 618.510189] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000016 [ 618.517439] R13: 0000000000000000 R14: 00000000006f30a0 R15: 0000000000000004 2018/04/11 12:45:20 executing program 0: r0 = perf_event_open(&(0x7f00000000c0)={0x2, 0x70, 0x3e5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe06, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x23}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$adsp(&(0x7f0000000040)='/dev/adsp#\x00', 0x6, 0x408001) r2 = socket$alg(0x26, 0x5, 0x0) ioctl$EVIOCSABS0(r1, 0x401845c0, &(0x7f0000000080)={0x9, 0x9, 0x1, 0xc, 0x4d3, 0x3}) bind$alg(r2, &(0x7f0000000200)={0x26, 'rng\x00', 0x0, 0x0, 'ansi_cprng\x00'}, 0x58) r3 = accept$alg(r2, 0x0, 0x0) dup3(r0, r3, 0x0) 2018/04/11 12:45:20 executing program 3: semop(0x0, &(0x7f000001a000)=[{0x0, 0xffffffffffff0001}, {0xe00000000000000}], 0x2) timer_create(0x0, &(0x7f0000cd0000)={0x0, 0x12}, &(0x7f0000044000)) timer_settime(0x0, 0x0, &(0x7f00004b1fe0)={{0x0, 0x1c9c380}, {0x0, 0x9}}, &(0x7f0000040000)) r0 = getpgid(0x0) tkill(r0, 0x1000000000016) 2018/04/11 12:45:20 executing program 5 (fault-call:6 fault-nth:5): perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000200)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc-cast5-avx\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00003bcfd0)="d3ab27191a", 0x5) sendmmsg$alg(r1, &(0x7f0000007e40)=[{0x0, 0x0, &(0x7f0000000900)}], 0x1, 0x0) accept(r0, &(0x7f0000000040)=@pppol2tpv3in6, &(0x7f00000000c0)=0x80) 2018/04/11 12:45:20 executing program 4: r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$alg(0x26, 0x5, 0x0) fcntl$setsig(r1, 0xa, 0x37) bind$alg(r1, &(0x7f0000000200)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc-cast5-avx\x00'}, 0x58) r2 = accept$alg(r1, 0x0, 0x0) syz_open_dev$vcsa(&(0x7f0000000040)='/dev/vcsa#\x00', 0x5, 0x101000) dup3(r0, r2, 0x0) 2018/04/11 12:45:20 executing program 7: syz_emit_ethernet(0x66, &(0x7f0000000000)={@random="cd3997030f00", @empty=[0x0, 0x0, 0x0, 0x0, 0xf5ffffff00000000], [], {@ipv6={0x86dd, {0x0, 0x6, "b40900", 0x30, 0x67, 0x0, @ipv4={[], [0xff, 0xff], @multicast2=0xe0000002}, @mcast2={0xff, 0x2, [], 0x1}, {[], @icmpv6=@time_exceed={0x21, 0x0, 0x0, 0x0, [], {0x0, 0x6, "b680fa", 0x0, 0x0, 0x0, @ipv4={[], [0xff, 0xff], @broadcast=0xffffffff}, @ipv4={[], [0xff, 0xff], @remote={0xac, 0x14, 0xffffffffffffffff, 0xbb}}}}}}}}}, 0x0) 2018/04/11 12:45:20 executing program 2: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x1e, 0x1, 0x0) setsockopt$packet_tx_ring(r0, 0x10f, 0x87, &(0x7f0000b89fe4)=@req={0x772}, 0x10) sendmsg(r0, &(0x7f0000030000)={&(0x7f00004f5000)=@generic={0x10000000001e, "0100000900000000000000000226cc573c080000003724c71e14dd6a739effea1b48006be61ffe0000e103000000f8020004003f010039d8f986ff01000300000004af50d50700000000000000e3ad316a1983000000001d00e0dfcb24281e27800000100076c3979ac40000bd15020078a1dfd300881a8365b1b16d7436"}, 0x80, &(0x7f0000447ff0), 0x0, &(0x7f00006e9c68)}, 0x0) 2018/04/11 12:45:20 executing program 6: r0 = socket$inet6(0xa, 0x80003, 0xff) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @ipv4={[], [0xff, 0xff], @dev={0xac, 0x14, 0x14, 0x1b}}}, 0x1c) sendmsg(r0, &(0x7f000001b000)={0x0, 0xfffffff5, &(0x7f0000019fa0), 0xd3, &(0x7f000001ef08)}, 0x0) 2018/04/11 12:45:20 executing program 1: r0 = socket(0x1e, 0x1, 0x0) setsockopt$packet_tx_ring(r0, 0x10f, 0x87, &(0x7f0000b89fe4)=@req={0x772}, 0x10) sendmsg(r0, &(0x7f0000030000)={&(0x7f00004f5000)=@generic={0x10000000001e, "0014000900030000000000000226cc573c080000003724c71e14dd6a739effea1b48006be61ffe0000e103000000f8000004003f010039d8f986ff01000300000004af50d50700000000000000e3ad316a1983000000001d00e0dfcb24281e27800000100076c3979ac40000bd15020078a1dfd300881a8365b1b16d7436"}, 0x80, &(0x7f0000447ff0), 0x0, &(0x7f00006e9c68)}, 0x0) [ 619.167825] FAULT_INJECTION: forcing a failure. [ 619.167825] name failslab, interval 1, probability 0, space 0, times 0 [ 619.179101] CPU: 0 PID: 2676 Comm: syz-executor5 Not tainted 4.16.0+ #17 [ 619.185927] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 619.195265] Call Trace: [ 619.197844] dump_stack+0x1b9/0x294 [ 619.201467] ? dump_stack_print_info.cold.2+0x52/0x52 [ 619.206661] should_fail.cold.4+0xa/0x1a [ 619.210717] ? fault_create_debugfs_attr+0x1f0/0x1f0 2018/04/11 12:45:20 executing program 6: r0 = socket$inet6(0xa, 0x80003, 0xff) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @ipv4={[], [0xff, 0xff], @dev={0xac, 0x14, 0x14, 0x1b}}}, 0x1c) sendmsg(r0, &(0x7f000001b000)={0x0, 0xfffffff5, &(0x7f0000019fa0), 0xb8, &(0x7f000001ef08)}, 0x0) [ 619.215815] ? cgroup_sk_alloc+0x1db/0xc10 [ 619.220041] ? graph_lock+0x170/0x170 [ 619.223829] ? debug_object_free+0x5f0/0x5f0 [ 619.228228] ? find_held_lock+0x36/0x1c0 [ 619.232282] ? __lock_is_held+0xb5/0x140 [ 619.236375] ? check_same_owner+0x320/0x320 [ 619.240781] ? rcu_note_context_switch+0x710/0x710 [ 619.245703] ? __lock_is_held+0xb5/0x140 [ 619.249771] __should_failslab+0x124/0x180 [ 619.253997] should_failslab+0x9/0x14 [ 619.257787] __kmalloc+0x2c8/0x760 [ 619.261323] ? mark_held_locks+0xc9/0x160 [ 619.265553] ? sock_kmalloc+0x14e/0x1d0 [ 619.269527] sock_kmalloc+0x14e/0x1d0 [ 619.273326] ? __sk_mem_schedule+0xe0/0xe0 [ 619.277557] ? __lockdep_init_map+0x105/0x590 [ 619.282574] skcipher_accept_parent_nokey+0x94/0x4d0 [ 619.287673] ? skcipher_sock_destruct+0x1a0/0x1a0 [ 619.292512] ? __local_bh_enable_ip+0x161/0x230 [ 619.297169] ? trace_hardirqs_on_caller+0x421/0x5c0 [ 619.302174] ? lock_sock_nested+0x9f/0x120 [ 619.306396] ? __local_bh_enable_ip+0x161/0x230 [ 619.311052] ? skcipher_accept_parent_nokey+0x4d0/0x4d0 [ 619.316401] skcipher_accept_parent+0x5b/0x80 [ 619.320883] af_alg_accept+0x127/0x7d0 [ 619.324762] alg_accept+0x46/0x60 [ 619.328205] __sys_accept4+0x3b2/0x8a0 [ 619.332081] ? SyS_listen+0x30/0x30 [ 619.335720] ? __sb_end_write+0xac/0xe0 [ 619.339690] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 619.345213] ? fput+0x130/0x1a0 [ 619.348481] ? ksys_write+0x1a6/0x250 [ 619.352270] ? SyS_read+0x30/0x30 [ 619.355711] ? mm_fault_error+0x380/0x380 [ 619.359853] SyS_accept+0x26/0x30 [ 619.363288] ? SyS_accept4+0x40/0x40 [ 619.366991] do_syscall_64+0x29e/0x9d0 [ 619.370857] ? vmalloc_sync_all+0x30/0x30 [ 619.374987] ? _raw_spin_unlock_irq+0x27/0x70 [ 619.379468] ? finish_task_switch+0x1ca/0x820 [ 619.383960] ? syscall_return_slowpath+0x5c0/0x5c0 [ 619.388879] ? syscall_return_slowpath+0x30f/0x5c0 [ 619.393797] ? entry_SYSCALL_64_after_hwframe+0x52/0xb7 [ 619.399151] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 619.403995] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 619.409172] RIP: 0033:0x455259 [ 619.412351] RSP: 002b:00007f204b46ac68 EFLAGS: 00000246 ORIG_RAX: 000000000000002b [ 619.420049] RAX: ffffffffffffffda RBX: 00007f204b46b6d4 RCX: 0000000000455259 [ 619.427307] RDX: 00000000200000c0 RSI: 0000000020000040 RDI: 0000000000000014 [ 619.434561] RBP: 000000000072bea0 R08: 0000000000000000 R09: 0000000000000000 [ 619.441811] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000016 [ 619.449064] R13: 0000000000000000 R14: 00000000006f30a0 R15: 0000000000000005 2018/04/11 12:45:21 executing program 0: r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getpeername$packet(r0, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @random}, &(0x7f0000000080)=0x14) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000200)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc-cast5-avx\x00'}, 0x58) r2 = accept$alg(r1, 0x0, 0x0) syz_open_dev$adsp(&(0x7f00000000c0)='/dev/adsp#\x00', 0xfffffffffffffffc, 0x10743) dup3(r0, r2, 0x0) 2018/04/11 12:45:21 executing program 1: r0 = socket(0x1e, 0x1, 0x0) setsockopt$packet_tx_ring(r0, 0x10f, 0x87, &(0x7f0000b89fe4)=@req={0x772}, 0x10) sendmsg(r0, &(0x7f0000030000)={&(0x7f00004f5000)=@generic={0x10000000001e, "0014000900d00101000000000226cc573c080000003724c71e14dd6a739effea1b48006be61ffe0000e103000000f8000004003f010039d8f986ff01000300000004af50d50700000000000000e3ad316a1983000000001d00e0dfcb24281e27800000100076c3979ac40000bd15020078a1dfd300881a8365b1b16d7436"}, 0x80, &(0x7f0000447ff0), 0x0, &(0x7f00006e9c68)}, 0x0) 2018/04/11 12:45:21 executing program 7: syz_emit_ethernet(0x66, &(0x7f0000000000)={@random="cd3997030f00", @empty=[0x0, 0x0, 0x0, 0x0, 0x3000000], [], {@ipv6={0x86dd, {0x0, 0x6, "b40900", 0x30, 0x67, 0x0, @ipv4={[], [0xff, 0xff], @multicast2=0xe0000002}, @mcast2={0xff, 0x2, [], 0x1}, {[], @icmpv6=@time_exceed={0x21, 0x0, 0x0, 0x0, [], {0x0, 0x6, "b680fa", 0x0, 0x0, 0x0, @ipv4={[], [0xff, 0xff], @broadcast=0xffffffff}, @ipv4={[], [0xff, 0xff], @remote={0xac, 0x14, 0xffffffffffffffff, 0xbb}}}}}}}}}, 0x0) 2018/04/11 12:45:21 executing program 6: r0 = socket$inet6(0xa, 0x80003, 0xff) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @ipv4={[], [0xff, 0xff], @dev={0xac, 0x14, 0x14, 0x1b}}}, 0x1c) sendmsg(r0, &(0x7f000001b000)={0x0, 0xfffffff5, &(0x7f0000019fa0), 0xdd, &(0x7f000001ef08)}, 0x0) 2018/04/11 12:45:21 executing program 2: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x1e, 0x1, 0x0) setsockopt$packet_tx_ring(r0, 0x10f, 0x87, &(0x7f0000b89fe4)=@req={0x772}, 0x10) sendmsg(r0, &(0x7f0000030000)={&(0x7f00004f5000)=@generic={0x10000000001e, "0100000900000000000000000226cc573c080000003724c71e14dd6a739effea1b48006be61ffe0000e103000000f8040004003f010039d8f986ff01000300000004af50d50700000000000000e3ad316a1983000000001d00e0dfcb24281e27800000100076c3979ac40000bd15020078a1dfd300881a8365b1b16d7436"}, 0x80, &(0x7f0000447ff0), 0x0, &(0x7f00006e9c68)}, 0x0) 2018/04/11 12:45:21 executing program 4 (fault-call:1 fault-nth:0): perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_fuseblk_mount(&(0x7f0000000040)='./file0\x00', &(0x7f0000000000)='./file0\x00', 0x4000, 0x0, 0x0, 0x0, 0x0, 0x0) 2018/04/11 12:45:21 executing program 3: semop(0x0, &(0x7f000001a000)=[{0x0, 0xffffffffffff0001}, {0x3f00000000000000}], 0x2) timer_create(0x0, &(0x7f0000cd0000)={0x0, 0x12}, &(0x7f0000044000)) timer_settime(0x0, 0x0, &(0x7f00004b1fe0)={{0x0, 0x1c9c380}, {0x0, 0x9}}, &(0x7f0000040000)) r0 = getpgid(0x0) tkill(r0, 0x1000000000016) 2018/04/11 12:45:21 executing program 5 (fault-call:6 fault-nth:6): perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000200)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc-cast5-avx\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00003bcfd0)="d3ab27191a", 0x5) sendmmsg$alg(r1, &(0x7f0000007e40)=[{0x0, 0x0, &(0x7f0000000900)}], 0x1, 0x0) accept(r0, &(0x7f0000000040)=@pppol2tpv3in6, &(0x7f00000000c0)=0x80) 2018/04/11 12:45:21 executing program 6: r0 = socket$inet6(0xa, 0x80003, 0xff) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @ipv4={[], [0xff, 0xff], @dev={0xac, 0x14, 0x14, 0x1b}}}, 0x1c) sendmsg(r0, &(0x7f000001b000)={0x0, 0xfffffff5, &(0x7f0000019fa0), 0x22, &(0x7f000001ef08)}, 0x0) 2018/04/11 12:45:21 executing program 7: syz_emit_ethernet(0x66, &(0x7f0000000000)={@random="cd3997030f00", @empty=[0x0, 0x0, 0x0, 0x0, 0xff000000], [], {@ipv6={0x86dd, {0x0, 0x6, "b40900", 0x30, 0x67, 0x0, @ipv4={[], [0xff, 0xff], @multicast2=0xe0000002}, @mcast2={0xff, 0x2, [], 0x1}, {[], @icmpv6=@time_exceed={0x21, 0x0, 0x0, 0x0, [], {0x0, 0x6, "b680fa", 0x0, 0x0, 0x0, @ipv4={[], [0xff, 0xff], @broadcast=0xffffffff}, @ipv4={[], [0xff, 0xff], @remote={0xac, 0x14, 0xffffffffffffffff, 0xbb}}}}}}}}}, 0x0) [ 620.110160] FAULT_INJECTION: forcing a failure. [ 620.110160] name failslab, interval 1, probability 0, space 0, times 0 [ 620.121572] CPU: 0 PID: 2699 Comm: syz-executor4 Not tainted 4.16.0+ #17 [ 620.128433] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 620.138518] Call Trace: [ 620.141150] dump_stack+0x1b9/0x294 [ 620.144808] ? dump_stack_print_info.cold.2+0x52/0x52 [ 620.150043] should_fail.cold.4+0xa/0x1a [ 620.154138] ? fault_create_debugfs_attr+0x1f0/0x1f0 2018/04/11 12:45:21 executing program 1: r0 = socket(0x1e, 0x1, 0x0) setsockopt$packet_tx_ring(r0, 0x10f, 0x87, &(0x7f0000b89fe4)=@req={0x772}, 0x10) sendmsg(r0, &(0x7f0000030000)={&(0x7f00004f5000)=@generic={0x10000000001e, "0014000900000000030000000226cc573c080000003724c71e14dd6a739effea1b48006be61ffe0000e103000000f8000004003f010039d8f986ff01000300000004af50d50700000000000000e3ad316a1983000000001d00e0dfcb24281e27800000100076c3979ac40000bd15020078a1dfd300881a8365b1b16d7436"}, 0x80, &(0x7f0000447ff0), 0x0, &(0x7f00006e9c68)}, 0x0) [ 620.159269] ? find_held_lock+0x36/0x1c0 [ 620.163371] ? find_held_lock+0x36/0x1c0 [ 620.167489] ? check_same_owner+0x320/0x320 [ 620.171837] ? rcu_note_context_switch+0x710/0x710 [ 620.176789] ? wait_for_completion+0x870/0x870 [ 620.181456] __should_failslab+0x124/0x180 [ 620.185718] should_failslab+0x9/0x14 [ 620.189533] kmem_cache_alloc+0x2af/0x760 [ 620.193714] getname_flags+0xd0/0x5a0 [ 620.197542] getname+0x19/0x20 [ 620.200752] do_sys_open+0x38e/0x770 [ 620.204496] ? filp_open+0x80/0x80 2018/04/11 12:45:21 executing program 6: r0 = socket$inet6(0xa, 0x80003, 0xff) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @ipv4={[], [0xff, 0xff], @dev={0xac, 0x14, 0x14, 0x1b}}}, 0x1c) sendmsg(r0, &(0x7f000001b000)={0x0, 0xfffffff5, &(0x7f0000019fa0), 0x119, &(0x7f000001ef08)}, 0x0) 2018/04/11 12:45:21 executing program 7: syz_emit_ethernet(0x66, &(0x7f0000000000)={@random="cd3997030f00", @empty=[0x0, 0x0, 0x0, 0x0, 0xff00], [], {@ipv6={0x86dd, {0x0, 0x6, "b40900", 0x30, 0x67, 0x0, @ipv4={[], [0xff, 0xff], @multicast2=0xe0000002}, @mcast2={0xff, 0x2, [], 0x1}, {[], @icmpv6=@time_exceed={0x21, 0x0, 0x0, 0x0, [], {0x0, 0x6, "b680fa", 0x0, 0x0, 0x0, @ipv4={[], [0xff, 0xff], @broadcast=0xffffffff}, @ipv4={[], [0xff, 0xff], @remote={0xac, 0x14, 0xffffffffffffffff, 0xbb}}}}}}}}}, 0x0) [ 620.208063] ? mm_fault_error+0x380/0x380 [ 620.212261] ? syscall_slow_exit_work+0x4f0/0x4f0 [ 620.217144] SyS_open+0x2d/0x40 [ 620.220443] ? do_sys_open+0x770/0x770 [ 620.224351] do_syscall_64+0x29e/0x9d0 [ 620.228257] ? vmalloc_sync_all+0x30/0x30 [ 620.232427] ? syscall_slow_exit_work+0x4f0/0x4f0 [ 620.237298] ? syscall_return_slowpath+0x5c0/0x5c0 [ 620.242253] ? syscall_return_slowpath+0x30f/0x5c0 [ 620.247211] ? entry_SYSCALL_64_after_hwframe+0x52/0xb7 [ 620.252603] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 620.257481] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 620.262683] RIP: 0033:0x40f4b1 [ 620.265883] RSP: 002b:00007f95e4cadb00 EFLAGS: 00000293 ORIG_RAX: 0000000000000002 [ 620.273611] RAX: ffffffffffffffda RBX: 00007f95e4cae6d4 RCX: 000000000040f4b1 [ 620.280895] RDX: 0000000000004000 RSI: 0000000000000002 RDI: 00000000004b9b7e [ 620.288175] RBP: 0000000020000000 R08: 0000000000000000 R09: 0000000000000000 [ 620.295460] R10: 0000000020000040 R11: 0000000000000293 R12: 0000000000004000 [ 620.302744] R13: 0000000000000000 R14: 0000000000000000 R15: 0000000000000000 [ 620.312723] FAULT_INJECTION: forcing a failure. [ 620.312723] name failslab, interval 1, probability 0, space 0, times 0 [ 620.324019] CPU: 1 PID: 2697 Comm: syz-executor5 Not tainted 4.16.0+ #17 [ 620.330862] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 620.340215] Call Trace: [ 620.342817] dump_stack+0x1b9/0x294 [ 620.346464] ? dump_stack_print_info.cold.2+0x52/0x52 [ 620.351662] ? __save_stack_trace+0x7e/0xd0 [ 620.355997] should_fail.cold.4+0xa/0x1a [ 620.360074] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 620.365190] ? save_stack+0x43/0xd0 [ 620.368824] ? kasan_kmalloc+0xc4/0xe0 [ 620.372717] ? __kmalloc+0x14e/0x760 [ 620.376441] ? sock_kmalloc+0x14e/0x1d0 [ 620.380429] ? skcipher_accept_parent_nokey+0x94/0x4d0 [ 620.385715] ? skcipher_accept_parent+0x5b/0x80 [ 620.390391] ? graph_lock+0x170/0x170 [ 620.394197] ? do_syscall_64+0x29e/0x9d0 [ 620.398269] ? entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 620.403637] ? debug_object_free+0x5f0/0x5f0 [ 620.408057] ? find_held_lock+0x36/0x1c0 2018/04/11 12:45:22 executing program 6: r0 = socket$inet6(0xa, 0x80003, 0xff) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @ipv4={[], [0xff, 0xff], @dev={0xac, 0x14, 0x14, 0x1b}}}, 0x1c) sendmsg(r0, &(0x7f000001b000)={0x0, 0xfffffff5, &(0x7f0000019fa0), 0xfa, &(0x7f000001ef08)}, 0x0) 2018/04/11 12:45:22 executing program 0: r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$alg(0x26, 0x5, 0x0) r2 = dup2(r0, r0) getsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(0xffffffffffffffff, 0x84, 0xa, &(0x7f0000000040)={0x1, 0x2, 0x20f, 0x3ff, 0x10000, 0x4, 0x9, 0x8, 0x0}, &(0x7f0000000080)=0x20) ioctl$VHOST_SET_VRING_BASE(r2, 0x4008af12, &(0x7f00000001c0)={0x3, 0x1}) getsockopt$inet_sctp_SCTP_PRIMARY_ADDR(r2, 0x84, 0x6, &(0x7f00000000c0)={r3, @in6={{0xa, 0x4e24, 0xfffffffffffffffe, @local={0xfe, 0x80, [], 0xaa}, 0x800}}}, &(0x7f0000000180)=0x84) bind$alg(r1, &(0x7f0000000200)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc-cast5-avx\x00'}, 0x58) r4 = accept$alg(r1, 0x0, 0x0) ioctl$TIOCGPGRP(r2, 0x540f, &(0x7f0000000280)=0x0) ptrace$PTRACE_SECCOMP_GET_FILTER(0x420c, r5, 0xd3, &(0x7f00000002c0)=""/85) dup3(r0, r4, 0x0) 2018/04/11 12:45:22 executing program 1: r0 = socket(0x1e, 0x1, 0x0) setsockopt$packet_tx_ring(r0, 0x10f, 0x87, &(0x7f0000b89fe4)=@req={0x772}, 0x10) sendmsg(r0, &(0x7f0000030000)={&(0x7f00004f5000)=@generic={0x10000000001e, "0014000900000004000000000226cc573c080000003724c71e14dd6a739effea1b48006be61ffe0000e103000000f8000004003f010039d8f986ff01000300000004af50d50700000000000000e3ad316a1983000000001d00e0dfcb24281e27800000100076c3979ac40000bd15020078a1dfd300881a8365b1b16d7436"}, 0x80, &(0x7f0000447ff0), 0x0, &(0x7f00006e9c68)}, 0x0) 2018/04/11 12:45:22 executing program 7: syz_emit_ethernet(0x66, &(0x7f0000000000)={@random="cd3997030f00", @empty=[0x0, 0x0, 0x0, 0x0, 0xb00], [], {@ipv6={0x86dd, {0x0, 0x6, "b40900", 0x30, 0x67, 0x0, @ipv4={[], [0xff, 0xff], @multicast2=0xe0000002}, @mcast2={0xff, 0x2, [], 0x1}, {[], @icmpv6=@time_exceed={0x21, 0x0, 0x0, 0x0, [], {0x0, 0x6, "b680fa", 0x0, 0x0, 0x0, @ipv4={[], [0xff, 0xff], @broadcast=0xffffffff}, @ipv4={[], [0xff, 0xff], @remote={0xac, 0x14, 0xffffffffffffffff, 0xbb}}}}}}}}}, 0x0) [ 620.412131] ? __lock_is_held+0xb5/0x140 [ 620.416215] ? check_same_owner+0x320/0x320 [ 620.420545] ? rcu_note_context_switch+0x710/0x710 [ 620.425497] __should_failslab+0x124/0x180 [ 620.429748] should_failslab+0x9/0x14 [ 620.433554] __kmalloc+0x2c8/0x760 [ 620.437109] ? mark_held_locks+0xc9/0x160 [ 620.441265] ? sock_kmalloc+0x14e/0x1d0 [ 620.445251] sock_kmalloc+0x14e/0x1d0 [ 620.449065] ? __sk_mem_schedule+0xe0/0xe0 [ 620.453309] ? __lockdep_init_map+0x105/0x590 [ 620.457817] skcipher_accept_parent_nokey+0xda/0x4d0 2018/04/11 12:45:22 executing program 4 (fault-call:1 fault-nth:1): perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_fuseblk_mount(&(0x7f0000000040)='./file0\x00', &(0x7f0000000000)='./file0\x00', 0x4000, 0x0, 0x0, 0x0, 0x0, 0x0) [ 620.462928] ? skcipher_sock_destruct+0x1a0/0x1a0 [ 620.467785] ? __local_bh_enable_ip+0x161/0x230 [ 620.472475] ? trace_hardirqs_on_caller+0x421/0x5c0 [ 620.477498] ? lock_sock_nested+0x9f/0x120 [ 620.481744] ? __local_bh_enable_ip+0x161/0x230 [ 620.486426] ? skcipher_accept_parent_nokey+0x4d0/0x4d0 [ 620.491800] skcipher_accept_parent+0x5b/0x80 [ 620.496303] af_alg_accept+0x127/0x7d0 [ 620.500200] alg_accept+0x46/0x60 [ 620.503662] __sys_accept4+0x3b2/0x8a0 [ 620.507570] ? SyS_listen+0x30/0x30 2018/04/11 12:45:22 executing program 6: r0 = socket$inet6(0xa, 0x80003, 0xff) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @ipv4={[], [0xff, 0xff], @dev={0xac, 0x14, 0x14, 0x1b}}}, 0x1c) sendmsg(r0, &(0x7f000001b000)={0x0, 0xfffffff5, &(0x7f0000019fa0), 0x171, &(0x7f000001ef08)}, 0x0) [ 620.511208] ? __sb_end_write+0xac/0xe0 [ 620.515191] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 620.520728] ? fput+0x130/0x1a0 [ 620.524014] ? ksys_write+0x1a6/0x250 [ 620.527826] ? SyS_read+0x30/0x30 [ 620.531308] ? mm_fault_error+0x380/0x380 [ 620.535472] SyS_accept+0x26/0x30 [ 620.538927] ? SyS_accept4+0x40/0x40 [ 620.542651] do_syscall_64+0x29e/0x9d0 [ 620.546541] ? vmalloc_sync_all+0x30/0x30 [ 620.550698] ? _raw_spin_unlock_irq+0x27/0x70 [ 620.555201] ? finish_task_switch+0x1ca/0x820 [ 620.558866] FAULT_INJECTION: forcing a failure. [ 620.558866] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 620.559705] ? syscall_return_slowpath+0x5c0/0x5c0 [ 620.576390] ? syscall_return_slowpath+0x30f/0x5c0 [ 620.581317] ? entry_SYSCALL_64_after_hwframe+0x52/0xb7 [ 620.586672] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 620.591507] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 620.596683] RIP: 0033:0x455259 [ 620.599860] RSP: 002b:00007f204b46ac68 EFLAGS: 00000246 ORIG_RAX: 000000000000002b [ 620.607563] RAX: ffffffffffffffda RBX: 00007f204b46b6d4 RCX: 0000000000455259 [ 620.614822] RDX: 00000000200000c0 RSI: 0000000020000040 RDI: 0000000000000014 [ 620.622080] RBP: 000000000072bea0 R08: 0000000000000000 R09: 0000000000000000 [ 620.629336] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000016 [ 620.636590] R13: 0000000000000000 R14: 00000000006f30a0 R15: 0000000000000006 [ 620.643872] CPU: 0 PID: 2743 Comm: syz-executor4 Not tainted 4.16.0+ #17 [ 620.650731] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 620.660097] Call Trace: [ 620.662706] dump_stack+0x1b9/0x294 [ 620.666360] ? dump_stack_print_info.cold.2+0x52/0x52 [ 620.671594] should_fail.cold.4+0xa/0x1a [ 620.675678] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 620.680806] ? perf_trace_run_bpf_submit+0x23f/0x370 [ 620.685927] ? perf_trace_run_bpf_submit+0x23f/0x370 [ 620.691082] ? perf_tp_event+0xc30/0xc30 [ 620.695163] ? perf_trace_lock+0x495/0x900 [ 620.699415] ? perf_trace_run_bpf_submit+0x23f/0x370 [ 620.704535] ? perf_trace_run_bpf_submit+0x23f/0x370 [ 620.709657] ? memset+0x31/0x40 [ 620.712962] ? find_held_lock+0x36/0x1c0 [ 620.717044] ? zap_class+0x720/0x720 [ 620.720786] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 620.726352] ? should_fail+0x21b/0xbcd [ 620.730270] __alloc_pages_nodemask+0x34e/0xd70 [ 620.734953] ? find_held_lock+0x36/0x1c0 [ 620.739035] ? __alloc_pages_slowpath+0x2dc0/0x2dc0 [ 620.744097] ? find_held_lock+0x36/0x1c0 [ 620.748208] ? check_same_owner+0x320/0x320 [ 620.752554] cache_grow_begin+0x72/0x6c0 [ 620.756643] kmem_cache_alloc+0x689/0x760 [ 620.760820] getname_flags+0xd0/0x5a0 2018/04/11 12:45:22 executing program 7: syz_emit_ethernet(0x66, &(0x7f0000000000)={@random="cd3997030f00", @empty=[0x0, 0x0, 0x0, 0x0, 0x6488], [], {@ipv6={0x86dd, {0x0, 0x6, "b40900", 0x30, 0x67, 0x0, @ipv4={[], [0xff, 0xff], @multicast2=0xe0000002}, @mcast2={0xff, 0x2, [], 0x1}, {[], @icmpv6=@time_exceed={0x21, 0x0, 0x0, 0x0, [], {0x0, 0x6, "b680fa", 0x0, 0x0, 0x0, @ipv4={[], [0xff, 0xff], @broadcast=0xffffffff}, @ipv4={[], [0xff, 0xff], @remote={0xac, 0x14, 0xffffffffffffffff, 0xbb}}}}}}}}}, 0x0) [ 620.764645] getname+0x19/0x20 [ 620.767852] do_sys_open+0x38e/0x770 [ 620.771592] ? filp_open+0x80/0x80 [ 620.775152] ? mm_fault_error+0x380/0x380 [ 620.779327] SyS_open+0x2d/0x40 [ 620.782613] ? do_sys_open+0x770/0x770 [ 620.786497] do_syscall_64+0x29e/0x9d0 [ 620.790371] ? vmalloc_sync_all+0x30/0x30 [ 620.794504] ? _raw_spin_unlock_irq+0x27/0x70 [ 620.798990] ? finish_task_switch+0x1ca/0x820 [ 620.803475] ? syscall_return_slowpath+0x5c0/0x5c0 [ 620.808391] ? syscall_return_slowpath+0x30f/0x5c0 [ 620.813311] ? entry_SYSCALL_64_after_hwframe+0x52/0xb7 [ 620.818665] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 620.823501] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 620.828687] RIP: 0033:0x40f4b1 [ 620.831871] RSP: 002b:00007f95e4cadb00 EFLAGS: 00000293 ORIG_RAX: 0000000000000002 [ 620.839577] RAX: ffffffffffffffda RBX: 00007f95e4cae6d4 RCX: 000000000040f4b1 [ 620.846843] RDX: 0000000000004000 RSI: 0000000000000002 RDI: 00000000004b9b7e [ 620.854097] RBP: 0000000020000000 R08: 0000000000000000 R09: 0000000000000000 2018/04/11 12:45:22 executing program 2: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x1e, 0x1, 0x0) setsockopt$packet_tx_ring(r0, 0x10f, 0x87, &(0x7f0000b89fe4)=@req={0x772}, 0x10) sendmsg(r0, &(0x7f0000030000)={&(0x7f00004f5000)=@generic={0x10000000001e, "0100000900000000000000000226cc573c080000003724c71e14dd6a739effea1b48006be61ffe0000e103000000f8000204003f010039d8f986ff01000300000004af50d50700000000000000e3ad316a1983000000001d00e0dfcb24281e27800000100076c3979ac40000bd15020078a1dfd300881a8365b1b16d7436"}, 0x80, &(0x7f0000447ff0), 0x0, &(0x7f00006e9c68)}, 0x0) 2018/04/11 12:45:22 executing program 6: r0 = socket$inet6(0xa, 0x80003, 0xff) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @ipv4={[], [0xff, 0xff], @dev={0xac, 0x14, 0x14, 0x1b}}}, 0x1c) sendmsg(r0, &(0x7f000001b000)={0x0, 0xfffffff5, &(0x7f0000019fa0), 0x17b, &(0x7f000001ef08)}, 0x0) [ 620.861351] R10: 0000000020000040 R11: 0000000000000293 R12: 0000000000004000 [ 620.868606] R13: 0000000000000000 R14: 0000000000000000 R15: 0000000000000000 2018/04/11 12:45:23 executing program 5 (fault-call:6 fault-nth:7): perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000200)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc-cast5-avx\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00003bcfd0)="d3ab27191a", 0x5) sendmmsg$alg(r1, &(0x7f0000007e40)=[{0x0, 0x0, &(0x7f0000000900)}], 0x1, 0x0) accept(r0, &(0x7f0000000040)=@pppol2tpv3in6, &(0x7f00000000c0)=0x80) 2018/04/11 12:45:23 executing program 3: semop(0x0, &(0x7f000001a000)=[{0x0, 0xffffffffffff0001}, {0x100000000000000}], 0x2) timer_create(0x0, &(0x7f0000cd0000)={0x0, 0x12}, &(0x7f0000044000)) timer_settime(0x0, 0x0, &(0x7f00004b1fe0)={{0x0, 0x1c9c380}, {0x0, 0x9}}, &(0x7f0000040000)) r0 = getpgid(0x0) tkill(r0, 0x1000000000016) 2018/04/11 12:45:23 executing program 4 (fault-call:1 fault-nth:2): perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_fuseblk_mount(&(0x7f0000000040)='./file0\x00', &(0x7f0000000000)='./file0\x00', 0x4000, 0x0, 0x0, 0x0, 0x0, 0x0) 2018/04/11 12:45:23 executing program 0: r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000200)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc-cast5-avx\x00'}, 0xffffffffffffff37) r2 = accept(r1, &(0x7f0000000100)=@in={0x0, 0x0, @remote}, &(0x7f0000000180)=0x80) setsockopt$inet6_tcp_int(r2, 0x6, 0x9, &(0x7f00000001c0)=0x8, 0x4) r3 = syz_open_dev$dspn(&(0x7f0000000080)='/dev/dsp#\x00', 0x5, 0x0) epoll_ctl$EPOLL_CTL_ADD(r3, 0x1, r1, &(0x7f0000000280)={0x20000000}) r4 = accept$alg(r1, 0x0, 0x0) r5 = dup3(r0, r4, 0x0) ioctl$UFFDIO_API(r5, 0xc018aa3f, &(0x7f0000000040)={0xaa, 0x20}) 2018/04/11 12:45:23 executing program 2: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x1e, 0x1, 0x0) setsockopt$packet_tx_ring(r0, 0x10f, 0x87, &(0x7f0000b89fe4)=@req={0x772}, 0x10) sendmsg(r0, &(0x7f0000030000)={&(0x7f00004f5000)=@generic={0x10000000001e, "0100000900000000000000000226cc573c080000003724c71e14dd6a739effea1b48006be61ffe0000e103000000f8000004023f010039d8f986ff01000300000004af50d50700000000000000e3ad316a1983000000001d00e0dfcb24281e27800000100076c3979ac40000bd15020078a1dfd300881a8365b1b16d7436"}, 0x80, &(0x7f0000447ff0), 0x0, &(0x7f00006e9c68)}, 0x0) 2018/04/11 12:45:23 executing program 7: syz_emit_ethernet(0x66, &(0x7f0000000000)={@random="cd3997030f00", @empty=[0x0, 0x0, 0x0, 0x0, 0x3], [], {@ipv6={0x86dd, {0x0, 0x6, "b40900", 0x30, 0x67, 0x0, @ipv4={[], [0xff, 0xff], @multicast2=0xe0000002}, @mcast2={0xff, 0x2, [], 0x1}, {[], @icmpv6=@time_exceed={0x21, 0x0, 0x0, 0x0, [], {0x0, 0x6, "b680fa", 0x0, 0x0, 0x0, @ipv4={[], [0xff, 0xff], @broadcast=0xffffffff}, @ipv4={[], [0xff, 0xff], @remote={0xac, 0x14, 0xffffffffffffffff, 0xbb}}}}}}}}}, 0x0) 2018/04/11 12:45:23 executing program 1: r0 = socket(0x1e, 0x1, 0x0) setsockopt$packet_tx_ring(r0, 0x10f, 0x87, &(0x7f0000b89fe4)=@req={0x772}, 0x10) sendmsg(r0, &(0x7f0000030000)={&(0x7f00004f5000)=@generic={0x10000000001e, "00140009007fffffff0000000226cc573c080000003724c71e14dd6a739effea1b48006be61ffe0000e103000000f8000004003f010039d8f986ff01000300000004af50d50700000000000000e3ad316a1983000000001d00e0dfcb24281e27800000100076c3979ac40000bd15020078a1dfd300881a8365b1b16d7436"}, 0x80, &(0x7f0000447ff0), 0x0, &(0x7f00006e9c68)}, 0x0) 2018/04/11 12:45:23 executing program 6: r0 = socket$inet6(0xa, 0x80003, 0xff) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @ipv4={[], [0xff, 0xff], @dev={0xac, 0x14, 0x14, 0x1b}}}, 0x1c) sendmsg(r0, &(0x7f000001b000)={0x0, 0xfffffff5, &(0x7f0000019fa0), 0x24, &(0x7f000001ef08)}, 0x0) 2018/04/11 12:45:23 executing program 7: syz_emit_ethernet(0x66, &(0x7f0000000000)={@random="cd3997030f00", @empty=[0x0, 0x0, 0x0, 0x0, 0xe80], [], {@ipv6={0x86dd, {0x0, 0x6, "b40900", 0x30, 0x67, 0x0, @ipv4={[], [0xff, 0xff], @multicast2=0xe0000002}, @mcast2={0xff, 0x2, [], 0x1}, {[], @icmpv6=@time_exceed={0x21, 0x0, 0x0, 0x0, [], {0x0, 0x6, "b680fa", 0x0, 0x0, 0x0, @ipv4={[], [0xff, 0xff], @broadcast=0xffffffff}, @ipv4={[], [0xff, 0xff], @remote={0xac, 0x14, 0xffffffffffffffff, 0xbb}}}}}}}}}, 0x0) 2018/04/11 12:45:23 executing program 5: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000200)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc-cast5-avx\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00003bcfd0)="d3ab27191a", 0x5) sendmmsg$alg(r1, &(0x7f0000007e40)=[{0x0, 0x0, &(0x7f0000000900)}], 0x1, 0x0) accept(r0, &(0x7f0000000040)=@pppol2tpv3in6, &(0x7f00000000c0)=0x80) [ 621.683936] FAULT_INJECTION: forcing a failure. [ 621.683936] name failslab, interval 1, probability 0, space 0, times 0 [ 621.695263] CPU: 0 PID: 2777 Comm: syz-executor4 Not tainted 4.16.0+ #17 [ 621.702114] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 621.711478] Call Trace: [ 621.714091] dump_stack+0x1b9/0x294 [ 621.717746] ? dump_stack_print_info.cold.2+0x52/0x52 [ 621.722978] should_fail.cold.4+0xa/0x1a [ 621.727082] ? fault_create_debugfs_attr+0x1f0/0x1f0 2018/04/11 12:45:23 executing program 1: r0 = socket(0x1e, 0x1, 0x0) setsockopt$packet_tx_ring(r0, 0x10f, 0x87, &(0x7f0000b89fe4)=@req={0x772}, 0x10) sendmsg(r0, &(0x7f0000030000)={&(0x7f00004f5000)=@generic={0x10000000001e, "0014000900000000010000000226cc573c080000003724c71e14dd6a739effea1b48006be61ffe0000e103000000f8000004003f010039d8f986ff01000300000004af50d50700000000000000e3ad316a1983000000001d00e0dfcb24281e27800000100076c3979ac40000bd15020078a1dfd300881a8365b1b16d7436"}, 0x80, &(0x7f0000447ff0), 0x0, &(0x7f00006e9c68)}, 0x0) [ 621.732206] ? perf_trace_run_bpf_submit+0x23f/0x370 [ 621.737331] ? perf_trace_run_bpf_submit+0x246/0x370 [ 621.742474] ? perf_tp_event+0xc30/0xc30 [ 621.746569] ? find_held_lock+0x36/0x1c0 [ 621.750704] ? check_same_owner+0x320/0x320 [ 621.755058] ? rcu_note_context_switch+0x710/0x710 [ 621.760027] __should_failslab+0x124/0x180 [ 621.764289] should_failslab+0x9/0x14 [ 621.768110] kmem_cache_alloc+0x2af/0x760 [ 621.772280] ? perf_trace_run_bpf_submit+0x246/0x370 [ 621.777414] get_empty_filp+0x125/0x520 [ 621.781408] ? proc_nr_files+0x60/0x60 [ 621.785323] ? memset+0x31/0x40 [ 621.788632] ? perf_trace_lock+0x495/0x900 [ 621.792908] path_openat+0x116/0x4e20 [ 621.796756] ? unwind_get_return_address+0x61/0xa0 [ 621.801711] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 621.806747] ? path_lookupat.isra.44+0xbd0/0xbd0 [ 621.811527] ? find_held_lock+0x36/0x1c0 [ 621.815631] ? lock_downgrade+0x8e0/0x8e0 [ 621.819798] ? do_sys_open+0x38e/0x770 [ 621.823714] ? kasan_check_read+0x11/0x20 [ 621.827880] ? do_raw_spin_unlock+0x9e/0x2e0 2018/04/11 12:45:23 executing program 6: r0 = socket$inet6(0xa, 0x80003, 0xff) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @ipv4={[], [0xff, 0xff], @dev={0xac, 0x14, 0x14, 0x1b}}}, 0x1c) sendmsg(r0, &(0x7f000001b000)={0x0, 0xfffffff5, &(0x7f0000019fa0), 0x10e, &(0x7f000001ef08)}, 0x0) [ 621.832311] ? do_raw_spin_trylock+0x1b0/0x1b0 [ 621.836909] ? __lock_is_held+0xb5/0x140 [ 621.841001] ? _raw_spin_unlock+0x22/0x30 [ 621.845163] ? __alloc_fd+0x544/0x6e0 [ 621.848981] ? usercopy_warn+0x120/0x120 [ 621.853073] do_filp_open+0x249/0x350 [ 621.856890] ? may_open_dev+0x100/0x100 [ 621.860884] ? strncpy_from_user+0x3b6/0x500 [ 621.865321] ? mpi_free.cold.1+0x19/0x19 [ 621.869407] ? get_unused_fd_flags+0x121/0x190 [ 621.874002] ? getname_flags+0xd0/0x5a0 [ 621.878005] ? getname_flags+0x26e/0x5a0 2018/04/11 12:45:23 executing program 5: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000200)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc-cast5-avx\x00'}, 0x58) r1 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000100)='/dev/rtc\x00', 0x100, 0x0) getsockopt$inet_sctp_SCTP_DEFAULT_PRINFO(0xffffffffffffffff, 0x84, 0x72, &(0x7f0000000140)={0x0, 0x1, 0x20}, &(0x7f0000000180)=0xc) setsockopt$inet_sctp6_SCTP_ENABLE_STREAM_RESET(r1, 0x84, 0x76, &(0x7f00000001c0)={r2, 0x4}, 0x8) r3 = accept$alg(r0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00003bcfd0)="d3ab27191a", 0x5) sendmmsg$alg(r3, &(0x7f0000007e40)=[{0x0, 0x0, &(0x7f0000000900)}], 0x1, 0x0) r4 = accept(r0, &(0x7f0000000040)=@pppol2tpv3in6, &(0x7f00000000c0)=0x80) setsockopt$inet_sctp_SCTP_EVENTS(r4, 0x84, 0xb, &(0x7f0000000280)={0x800, 0x9, 0x0, 0xa0a, 0x3ff, 0x6, 0x1cac, 0x6, 0x7fff, 0xfff, 0x8}, 0xb) fcntl$getownex(r4, 0x10, &(0x7f0000000340)={0x0, 0x0}) perf_event_open(&(0x7f00000002c0)={0x3, 0x70, 0x800, 0x8001, 0x6, 0x8, 0x0, 0x6, 0x10, 0x8, 0x5bf3, 0x3, 0x5, 0x3, 0x6, 0x1654ebe3, 0x3, 0x81, 0x7, 0x7fffffff, 0x9, 0xffffffff, 0x4e164431, 0x7, 0x100000001, 0x4, 0xcb2, 0x7f, 0x0, 0x0, 0x8, 0x9, 0x50c67, 0x7fff, 0x5, 0x9, 0x38c, 0xffffffffffffffe0, 0x0, 0x100000001, 0x0, @perf_config_ext={0x2, 0x1000}, 0x220, 0x401, 0x7, 0x0, 0x9, 0x3, 0x7}, r5, 0xf, r1, 0x1) syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x0) 2018/04/11 12:45:23 executing program 7: syz_emit_ethernet(0x66, &(0x7f0000000000)={@random="cd3997030f00", @empty=[0x0, 0x0, 0x0, 0x0, 0xb00000000000000], [], {@ipv6={0x86dd, {0x0, 0x6, "b40900", 0x30, 0x67, 0x0, @ipv4={[], [0xff, 0xff], @multicast2=0xe0000002}, @mcast2={0xff, 0x2, [], 0x1}, {[], @icmpv6=@time_exceed={0x21, 0x0, 0x0, 0x0, [], {0x0, 0x6, "b680fa", 0x0, 0x0, 0x0, @ipv4={[], [0xff, 0xff], @broadcast=0xffffffff}, @ipv4={[], [0xff, 0xff], @remote={0xac, 0x14, 0xffffffffffffffff, 0xbb}}}}}}}}}, 0x0) 2018/04/11 12:45:23 executing program 1: r0 = socket(0x1e, 0x1, 0x0) setsockopt$packet_tx_ring(r0, 0x10f, 0x87, &(0x7f0000b89fe4)=@req={0x772}, 0x10) sendmsg(r0, &(0x7f0000030000)={&(0x7f00004f5000)=@generic={0x10000000001e, "0014000900040000000000000226cc573c080000003724c71e14dd6a739effea1b48006be61ffe0000e103000000f8000004003f010039d8f986ff01000300000004af50d50700000000000000e3ad316a1983000000001d00e0dfcb24281e27800000100076c3979ac40000bd15020078a1dfd300881a8365b1b16d7436"}, 0x80, &(0x7f0000447ff0), 0x0, &(0x7f00006e9c68)}, 0x0) [ 621.882094] do_sys_open+0x59a/0x770 [ 621.885836] ? filp_open+0x80/0x80 [ 621.889394] ? mm_fault_error+0x380/0x380 [ 621.893571] SyS_open+0x2d/0x40 [ 621.896863] ? do_sys_open+0x770/0x770 [ 621.900763] do_syscall_64+0x29e/0x9d0 [ 621.904668] ? vmalloc_sync_all+0x30/0x30 [ 621.908830] ? _raw_spin_unlock_irq+0x27/0x70 [ 621.913345] ? finish_task_switch+0x1ca/0x820 [ 621.917856] ? syscall_return_slowpath+0x5c0/0x5c0 [ 621.922804] ? syscall_return_slowpath+0x30f/0x5c0 [ 621.927754] ? entry_SYSCALL_64_after_hwframe+0x52/0xb7 2018/04/11 12:45:23 executing program 6: r0 = socket$inet6(0xa, 0x80003, 0xff) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @ipv4={[], [0xff, 0xff], @dev={0xac, 0x14, 0x14, 0x1b}}}, 0x1c) sendmsg(r0, &(0x7f000001b000)={0x0, 0xfffffff5, &(0x7f0000019fa0), 0x15f, &(0x7f000001ef08)}, 0x0) [ 621.933144] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 621.938020] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 621.943221] RIP: 0033:0x40f4b1 [ 621.946419] RSP: 002b:00007f95e4cadb00 EFLAGS: 00000293 ORIG_RAX: 0000000000000002 [ 621.954160] RAX: ffffffffffffffda RBX: 00007f95e4cae6d4 RCX: 000000000040f4b1 [ 621.961448] RDX: 0000000000004000 RSI: 0000000000000002 RDI: 00000000004b9b7e [ 621.968734] RBP: 0000000020000000 R08: 0000000000000000 R09: 0000000000000000 [ 621.976019] R10: 0000000020000040 R11: 0000000000000293 R12: 0000000000004000 2018/04/11 12:45:23 executing program 2: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x1e, 0x1, 0x0) setsockopt$packet_tx_ring(r0, 0x10f, 0x87, &(0x7f0000b89fe4)=@req={0x772}, 0x10) sendmsg(r0, &(0x7f0000030000)={&(0x7f00004f5000)=@generic={0x10000000001e, "0100000900000000000000000226cc573c080000003724c71e14dd6a739effea1b48006be61ffe0000e103000000f8000004003f020039d8f986ff01000300000004af50d50700000000000000e3ad316a1983000000001d00e0dfcb24281e27800000100076c3979ac40000bd15020078a1dfd300881a8365b1b16d7436"}, 0x80, &(0x7f0000447ff0), 0x0, &(0x7f00006e9c68)}, 0x0) [ 621.983298] R13: 0000000000000000 R14: 0000000000000000 R15: 0000000000000000 2018/04/11 12:45:24 executing program 3: semop(0x0, &(0x7f000001a000)=[{0x0, 0xffffffffffff0001}, {0x3f00}], 0x2) timer_create(0x0, &(0x7f0000cd0000)={0x0, 0x12}, &(0x7f0000044000)) timer_settime(0x0, 0x0, &(0x7f00004b1fe0)={{0x0, 0x1c9c380}, {0x0, 0x9}}, &(0x7f0000040000)) r0 = getpgid(0x0) tkill(r0, 0x1000000000016) 2018/04/11 12:45:24 executing program 0: ioctl$DRM_IOCTL_PRIME_HANDLE_TO_FD(0xffffffffffffffff, 0xc00c642d, &(0x7f0000000040)={0x0, 0x80000, 0xffffffffffffff9c}) r1 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) r2 = dup3(r0, r1, 0x80000) r3 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r4 = socket$alg(0x26, 0x5, 0x0) bind$alg(r4, &(0x7f0000000200)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc-cast5-avx\x00'}, 0x58) ioctl$TIOCGLCKTRMIOS(r2, 0x5456, &(0x7f0000000080)={0x800, 0x8, 0x1f, 0xbf82, 0xff, 0x7fff, 0x1, 0xc2ee, 0x9, 0x0, 0xed5, 0x6}) r5 = accept$alg(r4, 0x0, 0x0) dup3(r3, r5, 0x0) 2018/04/11 12:45:24 executing program 7: syz_emit_ethernet(0x66, &(0x7f0000000000)={@random="cd3997030f00", @empty=[0x0, 0x0, 0x0, 0x0, 0x86ddffff00000000], [], {@ipv6={0x86dd, {0x0, 0x6, "b40900", 0x30, 0x67, 0x0, @ipv4={[], [0xff, 0xff], @multicast2=0xe0000002}, @mcast2={0xff, 0x2, [], 0x1}, {[], @icmpv6=@time_exceed={0x21, 0x0, 0x0, 0x0, [], {0x0, 0x6, "b680fa", 0x0, 0x0, 0x0, @ipv4={[], [0xff, 0xff], @broadcast=0xffffffff}, @ipv4={[], [0xff, 0xff], @remote={0xac, 0x14, 0xffffffffffffffff, 0xbb}}}}}}}}}, 0x0) 2018/04/11 12:45:24 executing program 4 (fault-call:1 fault-nth:3): perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_fuseblk_mount(&(0x7f0000000040)='./file0\x00', &(0x7f0000000000)='./file0\x00', 0x4000, 0x0, 0x0, 0x0, 0x0, 0x0) 2018/04/11 12:45:24 executing program 1: r0 = socket(0x1e, 0x1, 0x0) setsockopt$packet_tx_ring(r0, 0x10f, 0x87, &(0x7f0000b89fe4)=@req={0x772}, 0x10) sendmsg(r0, &(0x7f0000030000)={&(0x7f00004f5000)=@generic={0x10000000001e, "0014000900020000000000000226cc573c080000003724c71e14dd6a739effea1b48006be61ffe0000e103000000f8000004003f010039d8f986ff01000300000004af50d50700000000000000e3ad316a1983000000001d00e0dfcb24281e27800000100076c3979ac40000bd15020078a1dfd300881a8365b1b16d7436"}, 0x80, &(0x7f0000447ff0), 0x0, &(0x7f00006e9c68)}, 0x0) 2018/04/11 12:45:24 executing program 5: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000200)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc-cast5-avx\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00003bcfd0)="d3ab27191a", 0x5) sendmmsg$alg(r1, &(0x7f0000007e40)=[{0x0, 0x0, &(0x7f0000000900)}], 0x1, 0x0) r2 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/qat_adf_ctl\x00', 0x800, 0x0) ioctl$DRM_IOCTL_RES_CTX(0xffffffffffffff9c, 0xc0106426, &(0x7f0000000180)={0x4, &(0x7f0000000140)=[{}, {}, {}, {0x0}]}) ioctl$DRM_IOCTL_NEW_CTX(r2, 0x40086425, &(0x7f00000001c0)={r3}) accept(r0, &(0x7f0000000040)=@pppol2tpv3in6, &(0x7f00000000c0)=0x80) 2018/04/11 12:45:24 executing program 6: r0 = socket$inet6(0xa, 0x80003, 0xff) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @ipv4={[], [0xff, 0xff], @dev={0xac, 0x14, 0x14, 0x1b}}}, 0x1c) sendmsg(r0, &(0x7f000001b000)={0x0, 0xfffffff5, &(0x7f0000019fa0), 0xda, &(0x7f000001ef08)}, 0x0) 2018/04/11 12:45:24 executing program 2: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x1e, 0x1, 0x0) setsockopt$packet_tx_ring(r0, 0x10f, 0x87, &(0x7f0000b89fe4)=@req={0x772}, 0x10) sendmsg(r0, &(0x7f0000030000)={&(0x7f00004f5000)=@generic={0x10000000001e, "0100000900000000000000000226cc573c080000003724c71e14dd6a739effea1b48006be61ffe0000e103000000f8000004003f030039d8f986ff01000300000004af50d50700000000000000e3ad316a1983000000001d00e0dfcb24281e27800000100076c3979ac40000bd15020078a1dfd300881a8365b1b16d7436"}, 0x80, &(0x7f0000447ff0), 0x0, &(0x7f00006e9c68)}, 0x0) [ 622.700567] QAT: Invalid ioctl [ 622.703696] FAULT_INJECTION: forcing a failure. [ 622.703696] name failslab, interval 1, probability 0, space 0, times 0 [ 622.715112] CPU: 0 PID: 2828 Comm: syz-executor4 Not tainted 4.16.0+ #17 [ 622.721967] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 622.722805] QAT: Invalid ioctl [ 622.733845] Call Trace: [ 622.733881] dump_stack+0x1b9/0x294 [ 622.733907] ? dump_stack_print_info.cold.2+0x52/0x52 2018/04/11 12:45:24 executing program 7: syz_emit_ethernet(0x66, &(0x7f0000000000)={@random="cd3997030f00", @empty=[0x0, 0x0, 0x0, 0x0, 0x88480000], [], {@ipv6={0x86dd, {0x0, 0x6, "b40900", 0x30, 0x67, 0x0, @ipv4={[], [0xff, 0xff], @multicast2=0xe0000002}, @mcast2={0xff, 0x2, [], 0x1}, {[], @icmpv6=@time_exceed={0x21, 0x0, 0x0, 0x0, [], {0x0, 0x6, "b680fa", 0x0, 0x0, 0x0, @ipv4={[], [0xff, 0xff], @broadcast=0xffffffff}, @ipv4={[], [0xff, 0xff], @remote={0xac, 0x14, 0xffffffffffffffff, 0xbb}}}}}}}}}, 0x0) 2018/04/11 12:45:24 executing program 1: r0 = socket(0x1e, 0x1, 0x0) setsockopt$packet_tx_ring(r0, 0x10f, 0x87, &(0x7f0000b89fe4)=@req={0x772}, 0x10) sendmsg(r0, &(0x7f0000030000)={&(0x7f00004f5000)=@generic={0x10000000001e, "0014000900000101d00000000226cc573c080000003724c71e14dd6a739effea1b48006be61ffe0000e103000000f8000004003f010039d8f986ff01000300000004af50d50700000000000000e3ad316a1983000000001d00e0dfcb24281e27800000100076c3979ac40000bd15020078a1dfd300881a8365b1b16d7436"}, 0x80, &(0x7f0000447ff0), 0x0, &(0x7f00006e9c68)}, 0x0) [ 622.733953] should_fail.cold.4+0xa/0x1a [ 622.733977] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 622.757720] ? save_stack+0xa9/0xd0 [ 622.761378] ? find_held_lock+0x36/0x1c0 [ 622.765497] ? check_same_owner+0x320/0x320 [ 622.769838] ? _raw_spin_unlock_irqrestore+0x63/0xc0 [ 622.774973] ? rcu_note_context_switch+0x710/0x710 [ 622.779945] __should_failslab+0x124/0x180 [ 622.784203] should_failslab+0x9/0x14 [ 622.788024] kmem_cache_alloc+0x2af/0x760 [ 622.792191] ? putname+0xf2/0x130 [ 622.795677] getname_flags+0xd0/0x5a0 2018/04/11 12:45:24 executing program 6: r0 = socket$inet6(0xa, 0x80003, 0xff) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @ipv4={[], [0xff, 0xff], @dev={0xac, 0x14, 0x14, 0x1b}}}, 0x1c) sendmsg(r0, &(0x7f000001b000)={0x0, 0xfffffff5, &(0x7f0000019fa0), 0x7d, &(0x7f000001ef08)}, 0x0) 2018/04/11 12:45:24 executing program 5: ioctl$TIOCGSID(0xffffffffffffff9c, 0x5429, &(0x7f00000001c0)=0x0) r1 = dup2(0xffffffffffffff9c, 0xffffffffffffff9c) perf_event_open(&(0x7f0000000140)={0x7, 0x70, 0x2, 0x6e2, 0x3ff, 0x20, 0x0, 0x2, 0x0, 0x0, 0xe07b, 0xffffffff, 0x994f, 0x3, 0x100000001, 0x5, 0x4, 0x80, 0x0, 0x1, 0x40e, 0xffffffff, 0x100000001, 0x0, 0x10000, 0xfff, 0x9, 0x8, 0x0, 0x2, 0x81, 0x2, 0x7fff, 0x0, 0x1, 0x0, 0x8, 0x80000000, 0x0, 0x401, 0x4, @perf_bp={&(0x7f0000000100), 0xd}, 0x0, 0x6730, 0x6, 0x7, 0x9, 0x896, 0x80}, r0, 0x5, r1, 0x1) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000300)={0x26, 'aead\x00', 0x0, 0x0, 'rfc4543(gcm_base(salsa20-asm,speck128-generic))\x00'}, 0xfffffffffffffd32) r3 = accept$alg(r2, 0x0, 0x0) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f00003bcfd0)="d3ab27191a", 0x5) sendmmsg$alg(r3, &(0x7f0000007e40)=[{0x0, 0x0, &(0x7f0000000900)}], 0x1, 0x0) accept(r2, &(0x7f0000000040)=@pppol2tpv3in6, &(0x7f00000000c0)=0x80) [ 622.799504] do_mknodat+0x19a/0x4f0 [ 622.803160] ? do_file_open_root+0x4b0/0x4b0 [ 622.807586] ? filp_open+0x80/0x80 [ 622.811144] ? mm_fault_error+0x380/0x380 [ 622.815319] ? syscall_slow_exit_work+0x4f0/0x4f0 [ 622.820197] SyS_mknodat+0x2d/0x40 [ 622.823757] ? do_mknodat+0x4f0/0x4f0 [ 622.827579] do_syscall_64+0x29e/0x9d0 [ 622.831483] ? vmalloc_sync_all+0x30/0x30 [ 622.835646] ? _raw_spin_unlock_irq+0x27/0x70 [ 622.840160] ? finish_task_switch+0x1ca/0x820 [ 622.844670] ? syscall_return_slowpath+0x5c0/0x5c0 [ 622.849620] ? syscall_return_slowpath+0x30f/0x5c0 [ 622.854579] ? entry_SYSCALL_64_after_hwframe+0x52/0xb7 [ 622.859977] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 622.864843] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 622.870039] RIP: 0033:0x455259 [ 622.873230] RSP: 002b:00007f95e4cadb08 EFLAGS: 00000246 ORIG_RAX: 0000000000000103 [ 622.881054] RAX: ffffffffffffffda RBX: 0000000000000015 RCX: 0000000000455259 [ 622.888336] RDX: 0000000000006000 RSI: 0000000020000000 RDI: 00000000ffffff9c [ 622.895618] RBP: 0000000020000000 R08: 0000000000000000 R09: 0000000000000000 [ 622.902900] R10: 00000000000007c7 R11: 0000000000000246 R12: 0000000000004000 [ 622.910183] R13: 0000000000000000 R14: 0000000000000000 R15: 0000000000000000 2018/04/11 12:45:24 executing program 3: semop(0x0, &(0x7f000001a000)=[{0x0, 0xffffffffffff0001}, {0x0, 0xe00}], 0x2) timer_create(0x0, &(0x7f0000cd0000)={0x0, 0x12}, &(0x7f0000044000)) timer_settime(0x0, 0x0, &(0x7f00004b1fe0)={{0x0, 0x1c9c380}, {0x0, 0x9}}, &(0x7f0000040000)) r0 = getpgid(0x0) tkill(r0, 0x1000000000016) 2018/04/11 12:45:24 executing program 6: r0 = socket$inet6(0xa, 0x80003, 0xff) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @ipv4={[], [0xff, 0xff], @dev={0xac, 0x14, 0x14, 0x1b}}}, 0x1c) sendmsg(r0, &(0x7f000001b000)={0x0, 0xfffffff5, &(0x7f0000019fa0), 0x16f, &(0x7f000001ef08)}, 0x0) 2018/04/11 12:45:24 executing program 2: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x1e, 0x1, 0x0) setsockopt$packet_tx_ring(r0, 0x10f, 0x87, &(0x7f0000b89fe4)=@req={0x772}, 0x10) sendmsg(r0, &(0x7f0000030000)={&(0x7f00004f5000)=@generic={0x10000000001e, "0100000900000000000000000226cc573c080000003724c71e14dd6a739effea1b48006be61ffe0000e103000000f8000004003f001439d8f986ff01000300000004af50d50700000000000000e3ad316a1983000000001d00e0dfcb24281e27800000100076c3979ac40000bd15020078a1dfd300881a8365b1b16d7436"}, 0x80, &(0x7f0000447ff0), 0x0, &(0x7f00006e9c68)}, 0x0) 2018/04/11 12:45:24 executing program 0: r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$alg(0x26, 0x5, 0x0) r2 = syz_open_dev$mouse(&(0x7f0000000040)='/dev/input/mouse#\x00', 0x10000, 0x121340) getsockopt$inet_sctp6_SCTP_MAXSEG(r1, 0x84, 0xd, &(0x7f0000000100)=@assoc_value={0x0, 0x7}, &(0x7f0000000140)=0x8) getsockopt$inet_sctp_SCTP_GET_LOCAL_ADDRS(r2, 0x84, 0x6d, &(0x7f0000000280)={r3, 0xa0, "34c8150fc00561a197ec6dcd70a6589b54d596294e00f0c3521fdb89a0837d8623ce380b6c39e03f49203fd1c574df535caa2bdd6d3690bcf334e2155aa479a0fba51f49e6e69b7115208bece378ad779c11dfead8d1e617783de35e099d812cb3a70479c44b2d4deaef478c964f8de32fb36bdfa6d74e44a832c1bac9c687fccee117b48a05102feedcc4220a4b9c84ec9201c9b60fa975f4bfa9244c9826c5"}, &(0x7f0000000180)=0xa8) bind$alg(r1, &(0x7f0000000200)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc-cast5-avx\x00'}, 0x58) r4 = accept$alg(r1, 0x0, 0x0) bind$vsock_dgram(r2, &(0x7f00000001c0)={0x28, 0x0, 0xffffffff, @host=0x2}, 0x10) r5 = dup3(r0, r4, 0x0) setsockopt$inet_sctp_SCTP_MAX_BURST(r5, 0x84, 0x14, &(0x7f00000000c0)=@assoc_value={r3, 0x681c2a17}, 0x8) 2018/04/11 12:45:24 executing program 7: syz_emit_ethernet(0x66, &(0x7f0000000000)={@random="cd3997030f00", @empty=[0x0, 0x0, 0x0, 0x0, 0xf5ffffff], [], {@ipv6={0x86dd, {0x0, 0x6, "b40900", 0x30, 0x67, 0x0, @ipv4={[], [0xff, 0xff], @multicast2=0xe0000002}, @mcast2={0xff, 0x2, [], 0x1}, {[], @icmpv6=@time_exceed={0x21, 0x0, 0x0, 0x0, [], {0x0, 0x6, "b680fa", 0x0, 0x0, 0x0, @ipv4={[], [0xff, 0xff], @broadcast=0xffffffff}, @ipv4={[], [0xff, 0xff], @remote={0xac, 0x14, 0xffffffffffffffff, 0xbb}}}}}}}}}, 0x0) 2018/04/11 12:45:24 executing program 1: r0 = socket(0x1e, 0x1, 0x0) setsockopt$packet_tx_ring(r0, 0x10f, 0x87, &(0x7f0000b89fe4)=@req={0x772}, 0x10) sendmsg(r0, &(0x7f0000030000)={&(0x7f00004f5000)=@generic={0x10000000001e, "0014000900000000020000000226cc573c080000003724c71e14dd6a739effea1b48006be61ffe0000e103000000f8000004003f010039d8f986ff01000300000004af50d50700000000000000e3ad316a1983000000001d00e0dfcb24281e27800000100076c3979ac40000bd15020078a1dfd300881a8365b1b16d7436"}, 0x80, &(0x7f0000447ff0), 0x0, &(0x7f00006e9c68)}, 0x0) 2018/04/11 12:45:24 executing program 4 (fault-call:1 fault-nth:4): perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_fuseblk_mount(&(0x7f0000000040)='./file0\x00', &(0x7f0000000000)='./file0\x00', 0x4000, 0x0, 0x0, 0x0, 0x0, 0x0) 2018/04/11 12:45:24 executing program 5: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) r1 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/qat_adf_ctl\x00', 0x800, 0x0) ioctl$sock_bt_bnep_BNEPCONNADD(r1, 0x400442c8, &(0x7f0000000400)={r0, 0x2, 0x3, "05742ba576c3065bb801b98496736d433aaaa73ca764d883572451eb44391dd2fbb3ac44ac38787552cb27ce2ff5b94439e79ae6d1bfee2fc08110a917ac9b75d93463dc96"}) bind$alg(r0, &(0x7f0000000200)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc-cast5-avx\x00'}, 0x58) r2 = accept$alg(r0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00003bcfd0)="d3ab27191a", 0x5) sendmmsg$alg(r2, &(0x7f0000007e40)=[{0x0, 0x0, &(0x7f0000000900)}], 0x1, 0x0) syz_mount_image$hfs(&(0x7f0000000100)='hfs\x00', &(0x7f0000000140)='./file0\x00', 0xc6, 0x1, &(0x7f0000000180)=[{&(0x7f0000000280)="52cc8d65c7ec09eaf3b5899317d71991caffedb50a1e8e8cf5f1f26a99976bb23b3259e19f40093303f514bdbbe82f6d1d8e90bb310b7cb635d2c13ab5c462de9f245b78f2b066980de74e824f25f595ba9e8572efa7cd041a048f99dfa52347cb6f48253196307a3502f6069998d4d91011c1980f238dab7d236d67641c0efb774c73efed8b5b149974403e8cec0cc84ad240920c0db498cc0d0db4bdeedf9119e1cb9e019f2eb00ab0cb15abaf2fc2e008da66824c20a1d3f54d3c5ee0d360d810b124ee8dc9567878b01764bbf1a1040a5d599641b4f11671ea9739", 0xdd, 0xfffffffffffffffe}], 0x1000000, &(0x7f0000000380)={[{@file_umask={'file_umask', 0x3d, [0x34, 0x30, 0x31]}, 0x2c}, {@creator={'creator', 0x3d, "e7b8f22f"}, 0x2c}, {@quiet='quiet', 0x2c}, {@file_umask={'file_umask', 0x3d, [0x36, 0x36, 0x34, 0x32, 0x32, 0x34, 0x31]}, 0x2c}, {@codepage={'codepage', 0x3d, 'macgaelic'}, 0x2c}]}) accept(r0, &(0x7f0000000040)=@pppol2tpv3in6, &(0x7f00000000c0)=0x80) [ 623.062504] QAT: Invalid ioctl 2018/04/11 12:45:24 executing program 2: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x1e, 0x1, 0x0) setsockopt$packet_tx_ring(r0, 0x10f, 0x87, &(0x7f0000b89fe4)=@req={0x772}, 0x10) sendmsg(r0, &(0x7f0000030000)={&(0x7f00004f5000)=@generic={0x10000000001e, "0100000900000000000000000226cc573c080000003724c71e14dd6a739effea1b48006be61ffe0000e103000000f8000004003f010239d8f986ff01000300000004af50d50700000000000000e3ad316a1983000000001d00e0dfcb24281e27800000100076c3979ac40000bd15020078a1dfd300881a8365b1b16d7436"}, 0x80, &(0x7f0000447ff0), 0x0, &(0x7f00006e9c68)}, 0x0) 2018/04/11 12:45:24 executing program 0: r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000200)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc-cast5-avx\x00'}, 0xfd35) r2 = accept$alg(r1, 0x0, 0x0) dup3(r0, r2, 0x0) [ 623.102901] FAULT_INJECTION: forcing a failure. [ 623.102901] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 623.114770] CPU: 0 PID: 2885 Comm: syz-executor4 Not tainted 4.16.0+ #17 [ 623.121628] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 623.130991] Call Trace: [ 623.133605] dump_stack+0x1b9/0x294 [ 623.137263] ? dump_stack_print_info.cold.2+0x52/0x52 [ 623.142494] should_fail.cold.4+0xa/0x1a [ 623.146583] ? fault_create_debugfs_attr+0x1f0/0x1f0 2018/04/11 12:45:24 executing program 1: r0 = socket(0x1e, 0x1, 0x0) setsockopt$packet_tx_ring(r0, 0x10f, 0x87, &(0x7f0000b89fe4)=@req={0x772}, 0x10) sendmsg(r0, &(0x7f0000030000)={&(0x7f00004f5000)=@generic={0x10000000001e, "001400090000000101d000000226cc573c080000003724c71e14dd6a739effea1b48006be61ffe0000e103000000f8000004003f010039d8f986ff01000300000004af50d50700000000000000e3ad316a1983000000001d00e0dfcb24281e27800000100076c3979ac40000bd15020078a1dfd300881a8365b1b16d7436"}, 0x80, &(0x7f0000447ff0), 0x0, &(0x7f00006e9c68)}, 0x0) [ 623.151720] ? perf_trace_run_bpf_submit+0x23f/0x370 [ 623.156857] ? perf_tp_event+0xc30/0xc30 [ 623.160961] ? memset+0x31/0x40 [ 623.164289] ? zap_class+0x720/0x720 [ 623.168029] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 623.173584] ? should_fail+0x21b/0xbcd [ 623.177499] __alloc_pages_nodemask+0x34e/0xd70 [ 623.182194] ? __alloc_pages_slowpath+0x2dc0/0x2dc0 [ 623.187240] ? find_held_lock+0x36/0x1c0 [ 623.191360] ? check_same_owner+0x320/0x320 [ 623.195698] ? _raw_spin_unlock_irqrestore+0x63/0xc0 2018/04/11 12:45:24 executing program 3: semop(0x0, &(0x7f000001a000)=[{0x0, 0xffffffffffff0001}, {0x0, 0xe}], 0x2) timer_create(0x0, &(0x7f0000cd0000)={0x0, 0x12}, &(0x7f0000044000)) timer_settime(0x0, 0x0, &(0x7f00004b1fe0)={{0x0, 0x1c9c380}, {0x0, 0x9}}, &(0x7f0000040000)) r0 = getpgid(0x0) tkill(r0, 0x1000000000016) [ 623.200832] cache_grow_begin+0x72/0x6c0 [ 623.204925] kmem_cache_alloc+0x689/0x760 [ 623.209109] getname_flags+0xd0/0x5a0 [ 623.212940] do_mknodat+0x19a/0x4f0 [ 623.216591] ? do_file_open_root+0x4b0/0x4b0 [ 623.221029] ? filp_open+0x80/0x80 [ 623.224587] ? mm_fault_error+0x380/0x380 [ 623.228758] ? syscall_slow_exit_work+0x4f0/0x4f0 [ 623.233626] SyS_mknodat+0x2d/0x40 [ 623.237183] ? do_mknodat+0x4f0/0x4f0 [ 623.241008] do_syscall_64+0x29e/0x9d0 [ 623.244917] ? vmalloc_sync_all+0x30/0x30 [ 623.249156] ? finish_task_switch+0x1ca/0x820 2018/04/11 12:45:24 executing program 2: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x1e, 0x1, 0x0) setsockopt$packet_tx_ring(r0, 0x10f, 0x87, &(0x7f0000b89fe4)=@req={0x772}, 0x10) sendmsg(r0, &(0x7f0000030000)={&(0x7f00004f5000)=@generic={0x10000000001e, "0100000900000000000000000226cc573c080000003724c71e14dd6a739effea1b48006be61ffe0000e103000000f8000004003f010039d8f986ff02000300000004af50d50700000000000000e3ad316a1983000000001d00e0dfcb24281e27800000100076c3979ac40000bd15020078a1dfd300881a8365b1b16d7436"}, 0x80, &(0x7f0000447ff0), 0x0, &(0x7f00006e9c68)}, 0x0) [ 623.253673] ? syscall_return_slowpath+0x5c0/0x5c0 [ 623.258623] ? syscall_return_slowpath+0x30f/0x5c0 [ 623.263576] ? entry_SYSCALL_64_after_hwframe+0x52/0xb7 [ 623.268968] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 623.273841] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 623.279039] RIP: 0033:0x455259 [ 623.282235] RSP: 002b:00007f95e4cadb08 EFLAGS: 00000246 ORIG_RAX: 0000000000000103 [ 623.289960] RAX: ffffffffffffffda RBX: 0000000000000015 RCX: 0000000000455259 [ 623.293850] hfs: can't find a HFS filesystem on dev loop5 [ 623.297229] RDX: 0000000000006000 RSI: 0000000020000000 RDI: 00000000ffffff9c [ 623.297241] RBP: 0000000020000000 R08: 0000000000000000 R09: 0000000000000000 [ 623.297252] R10: 00000000000007c7 R11: 0000000000000246 R12: 0000000000004000 [ 623.297263] R13: 0000000000000000 R14: 0000000000000000 R15: 0000000000000000 [ 623.373098] QAT: Invalid ioctl 2018/04/11 12:45:25 executing program 7: syz_emit_ethernet(0x66, &(0x7f0000000000)={@random="cd3997030f00", @empty=[0x0, 0x0, 0x0, 0x0, 0x80350000], [], {@ipv6={0x86dd, {0x0, 0x6, "b40900", 0x30, 0x67, 0x0, @ipv4={[], [0xff, 0xff], @multicast2=0xe0000002}, @mcast2={0xff, 0x2, [], 0x1}, {[], @icmpv6=@time_exceed={0x21, 0x0, 0x0, 0x0, [], {0x0, 0x6, "b680fa", 0x0, 0x0, 0x0, @ipv4={[], [0xff, 0xff], @broadcast=0xffffffff}, @ipv4={[], [0xff, 0xff], @remote={0xac, 0x14, 0xffffffffffffffff, 0xbb}}}}}}}}}, 0x0) 2018/04/11 12:45:25 executing program 6: r0 = socket$inet6(0xa, 0x80003, 0xff) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @ipv4={[], [0xff, 0xff], @dev={0xac, 0x14, 0x14, 0x1b}}}, 0x1c) sendmsg(r0, &(0x7f000001b000)={0x0, 0xfffffff5, &(0x7f0000019fa0), 0x58, &(0x7f000001ef08)}, 0x0) 2018/04/11 12:45:25 executing program 1: r0 = socket(0x1e, 0x1, 0x0) setsockopt$packet_tx_ring(r0, 0x10f, 0x87, &(0x7f0000b89fe4)=@req={0x772}, 0x10) sendmsg(r0, &(0x7f0000030000)={&(0x7f00004f5000)=@generic={0x10000000001e, "0014000900000000000200000226cc573c080000003724c71e14dd6a739effea1b48006be61ffe0000e103000000f8000004003f010039d8f986ff01000300000004af50d50700000000000000e3ad316a1983000000001d00e0dfcb24281e27800000100076c3979ac40000bd15020078a1dfd300881a8365b1b16d7436"}, 0x80, &(0x7f0000447ff0), 0x0, &(0x7f00006e9c68)}, 0x0) 2018/04/11 12:45:25 executing program 0: r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000200)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc-cast5-avx\x00'}, 0x58) accept$alg(r1, 0x0, 0x0) dup3(r0, r0, 0x0) 2018/04/11 12:45:25 executing program 3: semop(0x0, &(0x7f000001a000)=[{0x0, 0xffffffffffff0001}, {0x0, 0x500000000000000}], 0x2) timer_create(0x0, &(0x7f0000cd0000)={0x0, 0x12}, &(0x7f0000044000)) timer_settime(0x0, 0x0, &(0x7f00004b1fe0)={{0x0, 0x1c9c380}, {0x0, 0x9}}, &(0x7f0000040000)) r0 = getpgid(0x0) tkill(r0, 0x1000000000016) 2018/04/11 12:45:25 executing program 2: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x1e, 0x1, 0x0) setsockopt$packet_tx_ring(r0, 0x10f, 0x87, &(0x7f0000b89fe4)=@req={0x772}, 0x10) sendmsg(r0, &(0x7f0000030000)={&(0x7f00004f5000)=@generic={0x10000000001e, "0100000900000000000000000226cc573c080000003724c71e14dd6a739effea1b48006be61ffe0000e103000000f8000004003f010039d8f986ff03000300000004af50d50700000000000000e3ad316a1983000000001d00e0dfcb24281e27800000100076c3979ac40000bd15020078a1dfd300881a8365b1b16d7436"}, 0x80, &(0x7f0000447ff0), 0x0, &(0x7f00006e9c68)}, 0x0) 2018/04/11 12:45:25 executing program 5: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000200)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc-cast5-avx\x00'}, 0x58) r1 = semget$private(0x0, 0x1, 0x0) semctl$SEM_STAT(r1, 0x3, 0x12, &(0x7f0000000100)=""/172) r2 = accept$alg(r0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00003bcfd0)="d3ab27191a", 0x5) sendmmsg$alg(r2, &(0x7f0000007e40)=[{0x0, 0x0, &(0x7f0000000900)}], 0x1, 0x0) accept(r0, &(0x7f0000000040)=@pppol2tpv3in6, &(0x7f00000000c0)=0x80) 2018/04/11 12:45:25 executing program 4 (fault-call:1 fault-nth:5): perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_fuseblk_mount(&(0x7f0000000040)='./file0\x00', &(0x7f0000000000)='./file0\x00', 0x4000, 0x0, 0x0, 0x0, 0x0, 0x0) [ 623.396487] hfs: can't find a HFS filesystem on dev loop5 2018/04/11 12:45:25 executing program 2: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x1e, 0x1, 0x0) setsockopt$packet_tx_ring(r0, 0x10f, 0x87, &(0x7f0000b89fe4)=@req={0x772}, 0x10) sendmsg(r0, &(0x7f0000030000)={&(0x7f00004f5000)=@generic={0x10000000001e, "0100000900000000000000000226cc573c080000003724c71e14dd6a739effea1b48006be61ffe0000e103000000f8000004003f010039d8f986ff00140300000004af50d50700000000000000e3ad316a1983000000001d00e0dfcb24281e27800000100076c3979ac40000bd15020078a1dfd300881a8365b1b16d7436"}, 0x80, &(0x7f0000447ff0), 0x0, &(0x7f00006e9c68)}, 0x0) [ 623.484434] FAULT_INJECTION: forcing a failure. [ 623.484434] name failslab, interval 1, probability 0, space 0, times 0 [ 623.496370] CPU: 0 PID: 2922 Comm: syz-executor4 Not tainted 4.16.0+ #17 [ 623.503229] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 623.512595] Call Trace: [ 623.515203] dump_stack+0x1b9/0x294 [ 623.518855] ? dump_stack_print_info.cold.2+0x52/0x52 [ 623.524064] ? perf_trace_run_bpf_submit+0x246/0x370 [ 623.529204] should_fail.cold.4+0xa/0x1a 2018/04/11 12:45:25 executing program 5: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000200)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc-cast5-avx\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000280)="c8ffffff1a4b0a2cb7596e1f5f14314d37c9cdb8a4b8d2477ba211c7fdfb3ee580bc9dab090689830caad5ce1be06808bbcb7c83944fa9ad03d0dcc9c27460d48b56e2d130e2ac0fb361aaccb8faa1e9555e10dbe5", 0x55) sendmmsg$alg(r1, &(0x7f0000007e40)=[{0x0, 0x0, &(0x7f0000000900)}], 0x1, 0x0) pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) connect$ipx(r2, &(0x7f0000000140)={0x4, 0x9, 0x5, "0f6d1f2cfaf7", 0x7ff}, 0x10) accept(r0, &(0x7f0000000040)=@pppol2tpv3in6, &(0x7f00000000c0)=0x80) 2018/04/11 12:45:25 executing program 0: r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000200)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc-cast5-avx\x00'}, 0x58) r2 = accept$alg(r1, 0x0, 0x0) dup3(r0, r2, 0x0) syz_open_dev$random(&(0x7f0000000040)='/dev/random\x00', 0x0, 0x200000) [ 623.533300] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 623.538428] ? zap_class+0x720/0x720 [ 623.542161] ? perf_trace_run_bpf_submit+0x246/0x370 [ 623.547284] ? graph_lock+0x170/0x170 [ 623.551107] ? perf_tp_event+0xc30/0xc30 [ 623.555195] ? find_held_lock+0x36/0x1c0 [ 623.559290] ? __lock_is_held+0xb5/0x140 [ 623.563397] ? check_same_owner+0x320/0x320 [ 623.567741] ? rcu_note_context_switch+0x710/0x710 [ 623.572682] ? lock_downgrade+0x8e0/0x8e0 [ 623.576871] __should_failslab+0x124/0x180 [ 623.581130] should_failslab+0x9/0x14 2018/04/11 12:45:25 executing program 7: syz_emit_ethernet(0x66, &(0x7f0000000000)={@random="cd3997030f00", @empty=[0x0, 0x0, 0x0, 0x0, 0x8100], [], {@ipv6={0x86dd, {0x0, 0x6, "b40900", 0x30, 0x67, 0x0, @ipv4={[], [0xff, 0xff], @multicast2=0xe0000002}, @mcast2={0xff, 0x2, [], 0x1}, {[], @icmpv6=@time_exceed={0x21, 0x0, 0x0, 0x0, [], {0x0, 0x6, "b680fa", 0x0, 0x0, 0x0, @ipv4={[], [0xff, 0xff], @broadcast=0xffffffff}, @ipv4={[], [0xff, 0xff], @remote={0xac, 0x14, 0xffffffffffffffff, 0xbb}}}}}}}}}, 0x0) [ 623.584949] kmem_cache_alloc+0x2af/0x760 [ 623.589119] ? rcu_bh_force_quiescent_state+0x20/0x20 [ 623.594342] __d_alloc+0xc1/0xc00 [ 623.597814] ? __d_lookup+0x5b4/0x9c0 [ 623.601640] ? shrink_dcache_for_umount+0x290/0x290 [ 623.606682] ? d_alloc_parallel+0x1e80/0x1e80 [ 623.611203] ? lock_release+0xa10/0xa10 [ 623.615198] ? mark_held_locks+0xc9/0x160 [ 623.619358] ? filename_create+0x1aa/0x5a0 [ 623.623609] ? d_lookup+0x254/0x330 [ 623.627263] ? __sanitizer_cov_trace_cmp4+0x16/0x20 2018/04/11 12:45:25 executing program 6: r0 = socket$inet6(0xa, 0x80003, 0xff) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @ipv4={[], [0xff, 0xff], @dev={0xac, 0x14, 0x14, 0x1b}}}, 0x1c) sendmsg(r0, &(0x7f000001b000)={0x0, 0xfffffff5, &(0x7f0000019fa0), 0x1a8, &(0x7f000001ef08)}, 0x0) 2018/04/11 12:45:25 executing program 2: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x1e, 0x1, 0x0) setsockopt$packet_tx_ring(r0, 0x10f, 0x87, &(0x7f0000b89fe4)=@req={0x772}, 0x10) sendmsg(r0, &(0x7f0000030000)={&(0x7f00004f5000)=@generic={0x10000000001e, "0100000900000000000000000226cc573c080000003724c71e14dd6a739effea1b48006be61ffe0000e103000000f8000004003f010039d8f986ff01020300000004af50d50700000000000000e3ad316a1983000000001d00e0dfcb24281e27800000100076c3979ac40000bd15020078a1dfd300881a8365b1b16d7436"}, 0x80, &(0x7f0000447ff0), 0x0, &(0x7f00006e9c68)}, 0x0) [ 623.632303] ? d_lookup+0x219/0x330 [ 623.635959] d_alloc+0x8e/0x370 [ 623.639251] ? __d_lookup+0x9c0/0x9c0 [ 623.643067] ? __d_alloc+0xc00/0xc00 [ 623.646814] __lookup_hash+0xd9/0x190 [ 623.650633] filename_create+0x1dd/0x5a0 [ 623.654710] ? kern_path_mountpoint+0x40/0x40 [ 623.659229] ? getname_flags+0xd0/0x5a0 [ 623.663229] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 623.668778] ? getname_flags+0x26e/0x5a0 [ 623.672874] do_mknodat+0x1b1/0x4f0 [ 623.676529] ? do_file_open_root+0x4b0/0x4b0 [ 623.680946] ? filp_open+0x80/0x80 2018/04/11 12:45:25 executing program 5: r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000200)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc-cast5-avx\x00'}, 0x58) r2 = accept$alg(r1, 0x0, 0x0) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f00003bcfd0)="d3ab27191a", 0x5) sendmmsg$alg(r2, &(0x7f0000007e40)=[{0x0, 0x0, &(0x7f0000000900)}], 0x1, 0x0) accept(r1, &(0x7f0000000040)=@pppol2tpv3in6, &(0x7f00000000c0)=0x80) sendfile(r0, r2, &(0x7f0000000100), 0x1) [ 623.684515] ? syscall_slow_exit_work+0x4f0/0x4f0 [ 623.689383] SyS_mknodat+0x2d/0x40 [ 623.692932] ? do_mknodat+0x4f0/0x4f0 [ 623.696751] do_syscall_64+0x29e/0x9d0 [ 623.700661] ? syscall_slow_exit_work+0x4f0/0x4f0 [ 623.705521] ? syscall_return_slowpath+0x5c0/0x5c0 [ 623.710470] ? syscall_return_slowpath+0x30f/0x5c0 [ 623.715422] ? entry_SYSCALL_64_after_hwframe+0x52/0xb7 [ 623.720813] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 623.725685] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 623.730889] RIP: 0033:0x455259 2018/04/11 12:45:25 executing program 6: r0 = socket$inet6(0xa, 0x80003, 0xff) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @ipv4={[], [0xff, 0xff], @dev={0xac, 0x14, 0x14, 0x1b}}}, 0x1c) sendmsg(r0, &(0x7f000001b000)={0x0, 0xfffffff5, &(0x7f0000019fa0), 0x1ce, &(0x7f000001ef08)}, 0x0) [ 623.734085] RSP: 002b:00007f95e4cadb08 EFLAGS: 00000246 ORIG_RAX: 0000000000000103 [ 623.741810] RAX: ffffffffffffffda RBX: 0000000000000015 RCX: 0000000000455259 [ 623.749089] RDX: 0000000000006000 RSI: 0000000020000000 RDI: 00000000ffffff9c [ 623.756370] RBP: 0000000020000000 R08: 0000000000000000 R09: 0000000000000000 [ 623.763650] R10: 00000000000007c7 R11: 0000000000000246 R12: 0000000000004000 [ 623.770937] R13: 0000000000000000 R14: 0000000000000000 R15: 0000000000000000 2018/04/11 12:45:25 executing program 0: r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000200)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc-cast5-avx\x00'}, 0x58) socketpair(0x6, 0x7, 0x5, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$inet6_dccp_buf(r2, 0x21, 0xe, &(0x7f00000000c0)="370cbe5292af40151b454905dec6a33fe35cac87d6b8ed43c7d12df9e0487d1c1b0ea522505d15d20cddf8314a9aaa30343331bba3add4c0161b01fc22aa97be272a946e239cef238a2ddefeff3646f33046ab5ea0c0b6c02e6e153343038319df4c3a51aa9f7450ff162f52e14f02", 0x6f) ioctl$SNDRV_TIMER_IOCTL_STOP(r3, 0x54a1) accept$alg(r2, 0x0, 0x0) ioctl$KVM_GET_MSR_INDEX_LIST(r3, 0xc004ae02, &(0x7f0000000080)) dup3(r0, r0, 0x0) 2018/04/11 12:45:25 executing program 1: r0 = socket(0x1e, 0x1, 0x0) setsockopt$packet_tx_ring(r0, 0x10f, 0x87, &(0x7f0000b89fe4)=@req={0x772}, 0x10) sendmsg(r0, &(0x7f0000030000)={&(0x7f00004f5000)=@generic={0x10000000001e, "0014000900000000000300000226cc573c080000003724c71e14dd6a739effea1b48006be61ffe0000e103000000f8000004003f010039d8f986ff01000300000004af50d50700000000000000e3ad316a1983000000001d00e0dfcb24281e27800000100076c3979ac40000bd15020078a1dfd300881a8365b1b16d7436"}, 0x80, &(0x7f0000447ff0), 0x0, &(0x7f00006e9c68)}, 0x0) 2018/04/11 12:45:25 executing program 5: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000200)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc-cast5-avx\x00'}, 0x58) r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/sequencer\x00', 0x0, 0x0) setsockopt$inet_sctp6_SCTP_INITMSG(r1, 0x84, 0x2, &(0x7f0000000280)={0x81, 0x400, 0xf7, 0x1}, 0x8) r2 = accept$alg(r0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00003bcfd0)="d3ab27191a", 0x5) sendmmsg$alg(r2, &(0x7f0000007e40)=[{0x0, 0x0, &(0x7f0000000900)}], 0x1, 0x0) pipe2(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80800) getpeername$llc(r3, &(0x7f0000000140), &(0x7f0000000180)=0x10) accept(r0, &(0x7f0000000040)=@pppol2tpv3in6, &(0x7f00000000c0)=0x80) 2018/04/11 12:45:25 executing program 2: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x1e, 0x1, 0x0) setsockopt$packet_tx_ring(r0, 0x10f, 0x87, &(0x7f0000b89fe4)=@req={0x772}, 0x10) sendmsg(r0, &(0x7f0000030000)={&(0x7f00004f5000)=@generic={0x10000000001e, "0100000900000000000000000226cc573c080000003724c71e14dd6a739effea1b48006be61ffe0000e103000000f8000004003f010039d8f986ff01000302000004af50d50700000000000000e3ad316a1983000000001d00e0dfcb24281e27800000100076c3979ac40000bd15020078a1dfd300881a8365b1b16d7436"}, 0x80, &(0x7f0000447ff0), 0x0, &(0x7f00006e9c68)}, 0x0) 2018/04/11 12:45:26 executing program 4 (fault-call:1 fault-nth:6): perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_fuseblk_mount(&(0x7f0000000040)='./file0\x00', &(0x7f0000000000)='./file0\x00', 0x4000, 0x0, 0x0, 0x0, 0x0, 0x0) 2018/04/11 12:45:26 executing program 6: r0 = socket$inet6(0xa, 0x80003, 0xff) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @ipv4={[], [0xff, 0xff], @dev={0xac, 0x14, 0x14, 0x1b}}}, 0x1c) sendmsg(r0, &(0x7f000001b000)={0x0, 0xfffffff5, &(0x7f0000019fa0), 0x111, &(0x7f000001ef08)}, 0x0) 2018/04/11 12:45:26 executing program 1: r0 = socket(0x1e, 0x1, 0x0) setsockopt$packet_tx_ring(r0, 0x10f, 0x87, &(0x7f0000b89fe4)=@req={0x772}, 0x10) sendmsg(r0, &(0x7f0000030000)={&(0x7f00004f5000)=@generic={0x10000000001e, "0014000900000200000000000226cc573c080000003724c71e14dd6a739effea1b48006be61ffe0000e103000000f8000004003f010039d8f986ff01000300000004af50d50700000000000000e3ad316a1983000000001d00e0dfcb24281e27800000100076c3979ac40000bd15020078a1dfd300881a8365b1b16d7436"}, 0x80, &(0x7f0000447ff0), 0x0, &(0x7f00006e9c68)}, 0x0) 2018/04/11 12:45:26 executing program 5: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000200)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc-cast5-avx\x00'}, 0x58) r1 = dup2(r0, r0) bind$bt_rfcomm(r0, &(0x7f0000000140)={0x1f, {0xfff, 0x3, 0x60000000, 0x80, 0x40, 0xfff}, 0x7fff}, 0x256) r2 = accept$alg(r0, 0x0, 0x0) ioctl$TUNDETACHFILTER(r1, 0x401054d6, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00003bcfd0)="d3ab27191a", 0x5) sendmmsg$alg(r2, &(0x7f0000007e40)=[{0x0, 0x0, &(0x7f0000000900)}], 0x1, 0x0) accept(r0, &(0x7f0000000040)=@pppol2tpv3in6, &(0x7f00000000c0)=0x80) 2018/04/11 12:45:26 executing program 0: r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000200)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc-cast5-avx\x00'}, 0x58) r2 = accept$alg(r1, 0x0, 0x0) r3 = dup3(r0, r2, 0x0) getsockopt$sock_int(r3, 0x1, 0x16, &(0x7f0000000040), &(0x7f0000000080)=0x4) 2018/04/11 12:45:26 executing program 3: semop(0x0, &(0x7f000001a000)=[{0x0, 0xffffffffffff0001}, {0x0, 0x1000000}], 0x2) timer_create(0x0, &(0x7f0000cd0000)={0x0, 0x12}, &(0x7f0000044000)) timer_settime(0x0, 0x0, &(0x7f00004b1fe0)={{0x0, 0x1c9c380}, {0x0, 0x9}}, &(0x7f0000040000)) r0 = getpgid(0x0) tkill(r0, 0x1000000000016) 2018/04/11 12:45:26 executing program 2: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x1e, 0x1, 0x0) setsockopt$packet_tx_ring(r0, 0x10f, 0x87, &(0x7f0000b89fe4)=@req={0x772}, 0x10) sendmsg(r0, &(0x7f0000030000)={&(0x7f00004f5000)=@generic={0x10000000001e, "0100000900000000000000000226cc573c080000003724c71e14dd6a739effea1b48006be61ffe0000e103000000f8000004003f010039d8f986ff01000304000004af50d50700000000000000e3ad316a1983000000001d00e0dfcb24281e27800000100076c3979ac40000bd15020078a1dfd300881a8365b1b16d7436"}, 0x80, &(0x7f0000447ff0), 0x0, &(0x7f00006e9c68)}, 0x0) 2018/04/11 12:45:26 executing program 7: syz_emit_ethernet(0x66, &(0x7f0000000000)={@random="cd3997030f00", @empty=[0x0, 0x0, 0x0, 0x0, 0x58], [], {@ipv6={0x86dd, {0x0, 0x6, "b40900", 0x30, 0x67, 0x0, @ipv4={[], [0xff, 0xff], @multicast2=0xe0000002}, @mcast2={0xff, 0x2, [], 0x1}, {[], @icmpv6=@time_exceed={0x21, 0x0, 0x0, 0x0, [], {0x0, 0x6, "b680fa", 0x0, 0x0, 0x0, @ipv4={[], [0xff, 0xff], @broadcast=0xffffffff}, @ipv4={[], [0xff, 0xff], @remote={0xac, 0x14, 0xffffffffffffffff, 0xbb}}}}}}}}}, 0x0) [ 624.390709] FAULT_INJECTION: forcing a failure. [ 624.390709] name failslab, interval 1, probability 0, space 0, times 0 [ 624.402077] CPU: 0 PID: 2985 Comm: syz-executor4 Not tainted 4.16.0+ #17 [ 624.408932] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 624.418304] Call Trace: [ 624.420914] dump_stack+0x1b9/0x294 [ 624.424569] ? dump_stack_print_info.cold.2+0x52/0x52 [ 624.429813] should_fail.cold.4+0xa/0x1a [ 624.433901] ? fault_create_debugfs_attr+0x1f0/0x1f0 2018/04/11 12:45:26 executing program 6: r0 = socket$inet6(0xa, 0x80003, 0xff) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @ipv4={[], [0xff, 0xff], @dev={0xac, 0x14, 0x14, 0x1b}}}, 0x1c) sendmsg(r0, &(0x7f000001b000)={0x0, 0xfffffff5, &(0x7f0000019fa0), 0xef, &(0x7f000001ef08)}, 0x0) [ 624.439029] ? zap_class+0x720/0x720 [ 624.442764] ? graph_lock+0x170/0x170 [ 624.446591] ? perf_trace_run_bpf_submit+0x23f/0x370 [ 624.451712] ? perf_trace_run_bpf_submit+0x23f/0x370 [ 624.456836] ? perf_trace_run_bpf_submit+0x246/0x370 [ 624.461962] ? perf_tp_event+0xc30/0xc30 [ 624.466051] ? __lock_is_held+0xb5/0x140 [ 624.470160] ? check_same_owner+0x320/0x320 [ 624.474510] ? rcu_note_context_switch+0x710/0x710 [ 624.479453] ? zap_class+0x720/0x720 [ 624.483196] __should_failslab+0x124/0x180 [ 624.487455] should_failslab+0x9/0x14 [ 624.491271] kmem_cache_alloc+0x2af/0x760 [ 624.495462] ext4_alloc_inode+0xc1/0x860 [ 624.499545] ? ratelimit_state_init+0xb0/0xb0 [ 624.504055] ? find_held_lock+0x36/0x1c0 [ 624.508154] ? lock_downgrade+0x8e0/0x8e0 [ 624.512343] ? rcu_is_watching+0x85/0x140 [ 624.516521] ? rcu_bh_force_quiescent_state+0x20/0x20 [ 624.521732] ? graph_lock+0x170/0x170 [ 624.525563] ? ratelimit_state_init+0xb0/0xb0 [ 624.530081] alloc_inode+0x63/0x190 [ 624.533732] new_inode_pseudo+0x69/0x1a0 [ 624.537814] ? prune_icache_sb+0x1a0/0x1a0 [ 624.542090] new_inode+0x1c/0x40 [ 624.545477] __ext4_new_inode+0x443/0x6030 [ 624.549733] ? __lock_acquire+0x7f5/0x5130 [ 624.553999] ? ext4_free_inode+0x1970/0x1970 [ 624.558422] ? perf_trace_run_bpf_submit+0x23f/0x370 [ 624.563535] ? perf_trace_run_bpf_submit+0x246/0x370 [ 624.568660] ? perf_tp_event+0xc30/0xc30 [ 624.572744] ? is_bpf_text_address+0xd7/0x170 [ 624.577252] ? kernel_text_address+0x79/0xf0 [ 624.581674] ? __unwind_start+0x166/0x330 [ 624.585861] ? memset+0x31/0x40 [ 624.589156] ? perf_trace_lock+0x495/0x900 [ 624.593413] ? zap_class+0x720/0x720 [ 624.597127] ? save_stack+0xa9/0xd0 [ 624.600764] ? save_stack+0x43/0xd0 [ 624.604409] ? __kasan_slab_free+0x11a/0x170 [ 624.608831] ? kasan_slab_free+0xe/0x10 [ 624.612827] ? kmem_cache_free+0x86/0x2d0 [ 624.616988] ? putname+0xf2/0x130 [ 624.620452] ? do_mknodat+0x1b1/0x4f0 [ 624.624265] ? SyS_mknodat+0x2d/0x40 [ 624.627995] ? graph_lock+0x170/0x170 [ 624.631834] ? kasan_check_read+0x11/0x20 [ 624.636000] ? do_raw_spin_unlock+0x9e/0x2e0 [ 624.640430] ? print_usage_bug+0xc0/0xc0 [ 624.644507] ? kasan_check_write+0x14/0x20 [ 624.648761] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 624.654320] ? __dquot_initialize+0x615/0xdc0 [ 624.658855] ? dquot_get_next_dqblk+0x180/0x180 [ 624.663557] ? rcu_bh_force_quiescent_state+0x20/0x20 [ 624.668771] ext4_mknod+0x2e6/0x630 [ 624.672437] ? ext4_add_nondir+0x90/0x90 [ 624.676515] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 624.682068] ? security_inode_mknod+0xf0/0x120 [ 624.686645] ? ns_capable_common+0x13f/0x170 [ 624.691053] vfs_mknod+0x447/0x790 [ 624.694610] do_mknodat+0x414/0x4f0 [ 624.698235] ? do_file_open_root+0x4b0/0x4b0 [ 624.702628] ? filp_open+0x80/0x80 [ 624.706160] ? syscall_slow_exit_work+0x4f0/0x4f0 [ 624.711004] SyS_mknodat+0x2d/0x40 [ 624.714544] ? do_mknodat+0x4f0/0x4f0 [ 624.718333] do_syscall_64+0x29e/0x9d0 [ 624.722207] ? vmalloc_sync_all+0x30/0x30 [ 624.726354] ? _raw_spin_unlock_irq+0x27/0x70 [ 624.730845] ? finish_task_switch+0x1ca/0x820 [ 624.735339] ? syscall_return_slowpath+0x5c0/0x5c0 [ 624.740267] ? syscall_return_slowpath+0x30f/0x5c0 [ 624.745205] ? entry_SYSCALL_64_after_hwframe+0x52/0xb7 [ 624.750572] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 624.755416] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 624.760600] RIP: 0033:0x455259 [ 624.763776] RSP: 002b:00007f95e4cadb08 EFLAGS: 00000246 ORIG_RAX: 0000000000000103 [ 624.771500] RAX: ffffffffffffffda RBX: 0000000000000015 RCX: 0000000000455259 [ 624.778761] RDX: 0000000000006000 RSI: 0000000020000000 RDI: 00000000ffffff9c [ 624.786027] RBP: 0000000020000000 R08: 0000000000000000 R09: 0000000000000000 [ 624.793293] R10: 00000000000007c7 R11: 0000000000000246 R12: 0000000000004000 [ 624.800549] R13: 0000000000000000 R14: 0000000000000000 R15: 0000000000000000 2018/04/11 12:45:27 executing program 5: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000200)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc-cast5-avx\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00003bcfd0)="d3ab27191a", 0x5) r2 = openat$ppp(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ppp\x00', 0x400000, 0x0) r3 = accept$inet6(r2, 0x0, &(0x7f0000000180)=0xfffffcb4) setsockopt$inet6_udp_encap(r3, 0x11, 0x64, &(0x7f0000000140)=0x2, 0x4) sendmmsg$alg(r1, &(0x7f0000007e40)=[{0x0, 0x0, &(0x7f0000000900)}], 0x4924924924924a5, 0x0) accept(r0, &(0x7f0000000040)=@pppol2tpv3in6, &(0x7f00000000c0)=0x80) 2018/04/11 12:45:27 executing program 1: r0 = socket(0x1e, 0x1, 0x0) setsockopt$packet_tx_ring(r0, 0x10f, 0x87, &(0x7f0000b89fe4)=@req={0x772}, 0x10) sendmsg(r0, &(0x7f0000030000)={&(0x7f00004f5000)=@generic={0x10000000001e, "001400090000d001010000000226cc573c080000003724c71e14dd6a739effea1b48006be61ffe0000e103000000f8000004003f010039d8f986ff01000300000004af50d50700000000000000e3ad316a1983000000001d00e0dfcb24281e27800000100076c3979ac40000bd15020078a1dfd300881a8365b1b16d7436"}, 0x80, &(0x7f0000447ff0), 0x0, &(0x7f00006e9c68)}, 0x0) 2018/04/11 12:45:27 executing program 6: r0 = socket$inet6(0xa, 0x80003, 0xff) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @ipv4={[], [0xff, 0xff], @dev={0xac, 0x14, 0x14, 0x1b}}}, 0x1c) sendmsg(r0, &(0x7f000001b000)={0x0, 0xfffffff5, &(0x7f0000019fa0), 0x162, &(0x7f000001ef08)}, 0x0) 2018/04/11 12:45:27 executing program 7: syz_emit_ethernet(0x66, &(0x7f0000000000)={@random="cd3997030f00", @empty=[0x0, 0x0, 0x0, 0x0, 0x67], [], {@ipv6={0x86dd, {0x0, 0x6, "b40900", 0x30, 0x67, 0x0, @ipv4={[], [0xff, 0xff], @multicast2=0xe0000002}, @mcast2={0xff, 0x2, [], 0x1}, {[], @icmpv6=@time_exceed={0x21, 0x0, 0x0, 0x0, [], {0x0, 0x6, "b680fa", 0x0, 0x0, 0x0, @ipv4={[], [0xff, 0xff], @broadcast=0xffffffff}, @ipv4={[], [0xff, 0xff], @remote={0xac, 0x14, 0xffffffffffffffff, 0xbb}}}}}}}}}, 0x0) 2018/04/11 12:45:27 executing program 2: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x1e, 0x1, 0x0) setsockopt$packet_tx_ring(r0, 0x10f, 0x87, &(0x7f0000b89fe4)=@req={0x772}, 0x10) sendmsg(r0, &(0x7f0000030000)={&(0x7f00004f5000)=@generic={0x10000000001e, "0100000900000000000000000226cc573c080000003724c71e14dd6a739effea1b48006be61ffe0000e103000000f8000004003f010039d8f986ff01000300020004af50d50700000000000000e3ad316a1983000000001d00e0dfcb24281e27800000100076c3979ac40000bd15020078a1dfd300881a8365b1b16d7436"}, 0x80, &(0x7f0000447ff0), 0x0, &(0x7f00006e9c68)}, 0x0) 2018/04/11 12:45:27 executing program 0: r0 = syz_open_dev$sg(&(0x7f0000000040)='/dev/sg#\x00', 0x101, 0x62800) r1 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000200)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc-cast5-avx\x00'}, 0x58) r3 = accept$alg(r2, 0x0, 0x0) getsockopt$inet6_tcp_int(r0, 0x6, 0x0, &(0x7f0000000080), &(0x7f00000000c0)=0x4) dup3(r1, r3, 0x0) 2018/04/11 12:45:27 executing program 3: semop(0x0, &(0x7f000001a000)=[{0x0, 0xffffffffffff0001}, {0x0, 0x100000000000000}], 0x2) timer_create(0x0, &(0x7f0000cd0000)={0x0, 0x12}, &(0x7f0000044000)) timer_settime(0x0, 0x0, &(0x7f00004b1fe0)={{0x0, 0x1c9c380}, {0x0, 0x9}}, &(0x7f0000040000)) r0 = getpgid(0x0) tkill(r0, 0x1000000000016) 2018/04/11 12:45:27 executing program 4 (fault-call:1 fault-nth:7): perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_fuseblk_mount(&(0x7f0000000040)='./file0\x00', &(0x7f0000000000)='./file0\x00', 0x4000, 0x0, 0x0, 0x0, 0x0, 0x0) [ 625.465604] FAULT_INJECTION: forcing a failure. [ 625.465604] name failslab, interval 1, probability 0, space 0, times 0 [ 625.476977] CPU: 0 PID: 3030 Comm: syz-executor4 Not tainted 4.16.0+ #17 [ 625.483836] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 625.493202] Call Trace: [ 625.495809] dump_stack+0x1b9/0x294 [ 625.499463] ? dump_stack_print_info.cold.2+0x52/0x52 [ 625.504672] ? __lock_is_held+0xb5/0x140 [ 625.508774] should_fail.cold.4+0xa/0x1a [ 625.512866] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 625.517995] ? perf_tp_event+0xc30/0xc30 [ 625.522077] ? rcu_note_context_switch+0x710/0x710 [ 625.527027] ? graph_lock+0x170/0x170 [ 625.530854] ? __might_sleep+0x95/0x190 [ 625.534851] ? _cond_resched+0x14/0x30 [ 625.538771] ? __getblk_gfp+0x102/0xaf0 [ 625.542781] ? perf_trace_lock+0x495/0x900 [ 625.547044] ? __lock_is_held+0xb5/0x140 [ 625.551146] ? check_same_owner+0x320/0x320 [ 625.555477] ? graph_lock+0x170/0x170 [ 625.559300] ? rcu_note_context_switch+0x710/0x710 [ 625.564251] ? __raw_spin_lock_init+0x1c/0x100 [ 625.568861] __should_failslab+0x124/0x180 [ 625.573119] should_failslab+0x9/0x14 [ 625.576932] kmem_cache_alloc+0x2af/0x760 [ 625.581115] jbd2__journal_start+0x1d3/0xa70 [ 625.585555] ? jbd2_write_access_granted.part.8+0x420/0x420 [ 625.591282] ? rcu_note_context_switch+0x710/0x710 [ 625.596240] ? __might_sleep+0x95/0x190 [ 625.600245] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 625.605817] __ext4_journal_start_sb+0x17a/0x5e0 [ 625.610593] ? __ext4_new_inode+0x36c0/0x6030 [ 625.615123] ? ext4_journal_abort_handle.isra.4+0x260/0x260 [ 625.621029] ? find_next_zero_bit+0x111/0x140 [ 625.625557] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 625.630589] ? find_inode_bit.isra.16+0x36f/0x510 [ 625.635457] __ext4_new_inode+0x36c0/0x6030 [ 625.639819] ? ext4_free_inode+0x1970/0x1970 [ 625.644243] ? perf_trace_run_bpf_submit+0x23f/0x370 [ 625.649367] ? perf_trace_run_bpf_submit+0x246/0x370 [ 625.654493] ? perf_tp_event+0xc30/0xc30 [ 625.658583] ? is_bpf_text_address+0xd7/0x170 2018/04/11 12:45:27 executing program 0: r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000200)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc-cast5-avx\x00'}, 0x58) socketpair(0x9, 0x0, 0x5bb2, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) clock_gettime(0x0, &(0x7f00000000c0)={0x0, 0x0}) utimensat(r2, &(0x7f0000000080)='./file0\x00', &(0x7f0000000100)={{r3, r4/1000+10000}, {0x77359400}}, 0x100) r5 = accept$alg(r1, 0x0, 0x0) dup3(r0, r5, 0x0) 2018/04/11 12:45:27 executing program 5: openat$rtc(0xffffffffffffff9c, &(0x7f0000000140)='/dev/rtc\x00', 0x8001, 0x0) r0 = syz_open_dev$mouse(&(0x7f0000000180)='/dev/input/mouse#\x00', 0x2, 0x2600) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, r0, 0x0) getsockopt$netrom_NETROM_T1(r0, 0x103, 0x1, &(0x7f00000001c0), &(0x7f0000000280)=0x4) accept$alg(r0, 0x0, 0x0) socket$inet_dccp(0x2, 0x6, 0x0) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000200)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc-cast5-avx\x00'}, 0x58) r2 = accept$alg(r1, 0x0, 0x0) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f00003bcfd0)="d3ab27191a", 0x5) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) sendmmsg$alg(r2, &(0x7f0000007e40)=[{0x0, 0x0, &(0x7f0000000900)}], 0x1, 0x0) r3 = accept(r1, &(0x7f0000000040)=@pppol2tpv3in6, &(0x7f00000000c0)=0x80) accept$unix(r3, &(0x7f00000002c0)=@abs, &(0x7f0000000340)=0x6e) openat$vcs(0xffffffffffffff9c, &(0x7f0000000100)='/dev/vcs\x00', 0x20000, 0x0) 2018/04/11 12:45:27 executing program 7: syz_emit_ethernet(0x66, &(0x7f0000000000)={@random="cd3997030f00", @empty=[0x0, 0x0, 0x0, 0x0, 0x500000000000000], [], {@ipv6={0x86dd, {0x0, 0x6, "b40900", 0x30, 0x67, 0x0, @ipv4={[], [0xff, 0xff], @multicast2=0xe0000002}, @mcast2={0xff, 0x2, [], 0x1}, {[], @icmpv6=@time_exceed={0x21, 0x0, 0x0, 0x0, [], {0x0, 0x6, "b680fa", 0x0, 0x0, 0x0, @ipv4={[], [0xff, 0xff], @broadcast=0xffffffff}, @ipv4={[], [0xff, 0xff], @remote={0xac, 0x14, 0xffffffffffffffff, 0xbb}}}}}}}}}, 0x0) 2018/04/11 12:45:27 executing program 1: r0 = socket(0x1e, 0x1, 0x0) setsockopt$packet_tx_ring(r0, 0x10f, 0x87, &(0x7f0000b89fe4)=@req={0x772}, 0x10) sendmsg(r0, &(0x7f0000030000)={&(0x7f00004f5000)=@generic={0x10000000001e, "0014000900007fffffff00000226cc573c080000003724c71e14dd6a739effea1b48006be61ffe0000e103000000f8000004003f010039d8f986ff01000300000004af50d50700000000000000e3ad316a1983000000001d00e0dfcb24281e27800000100076c3979ac40000bd15020078a1dfd300881a8365b1b16d7436"}, 0x80, &(0x7f0000447ff0), 0x0, &(0x7f00006e9c68)}, 0x0) 2018/04/11 12:45:27 executing program 6: r0 = socket$inet6(0xa, 0x80003, 0xff) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @ipv4={[], [0xff, 0xff], @dev={0xac, 0x14, 0x14, 0x1b}}}, 0x1c) sendmsg(r0, &(0x7f000001b000)={0x0, 0xfffffff5, &(0x7f0000019fa0), 0x48, &(0x7f000001ef08)}, 0x0) [ 625.663102] ? kernel_text_address+0x79/0xf0 [ 625.668225] ? __unwind_start+0x166/0x330 [ 625.668267] ? memset+0x31/0x40 [ 625.668293] ? perf_trace_lock+0x495/0x900 [ 625.668321] ? zap_class+0x720/0x720 [ 625.668334] ? save_stack+0xa9/0xd0 [ 625.668351] ? save_stack+0x43/0xd0 [ 625.668365] ? __kasan_slab_free+0x11a/0x170 [ 625.668379] ? kasan_slab_free+0xe/0x10 [ 625.668392] ? kmem_cache_free+0x86/0x2d0 [ 625.668406] ? putname+0xf2/0x130 [ 625.668421] ? do_mknodat+0x1b1/0x4f0 [ 625.668435] ? SyS_mknodat+0x2d/0x40 [ 625.668451] ? graph_lock+0x170/0x170 [ 625.668472] ? kasan_check_read+0x11/0x20 [ 625.668489] ? do_raw_spin_unlock+0x9e/0x2e0 [ 625.668510] ? print_usage_bug+0xc0/0xc0 [ 625.668524] ? kasan_check_write+0x14/0x20 [ 625.668551] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 625.668569] ? __dquot_initialize+0x615/0xdc0 [ 625.668602] ? dquot_get_next_dqblk+0x180/0x180 [ 625.668637] ? rcu_bh_force_quiescent_state+0x20/0x20 [ 625.668661] ext4_mknod+0x2e6/0x630 [ 625.668694] ? ext4_add_nondir+0x90/0x90 [ 625.668715] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 625.668783] ? security_inode_mknod+0xf0/0x120 [ 625.668800] ? ns_capable_common+0x13f/0x170 [ 625.668822] vfs_mknod+0x447/0x790 [ 625.668848] do_mknodat+0x414/0x4f0 [ 625.668875] ? do_file_open_root+0x4b0/0x4b0 [ 625.668890] ? filp_open+0x80/0x80 [ 625.668913] ? syscall_slow_exit_work+0x4f0/0x4f0 [ 625.668938] SyS_mknodat+0x2d/0x40 [ 625.668953] ? do_mknodat+0x4f0/0x4f0 [ 625.668971] do_syscall_64+0x29e/0x9d0 [ 625.668986] ? vmalloc_sync_all+0x30/0x30 [ 625.669002] ? _raw_spin_unlock_irq+0x27/0x70 [ 625.669021] ? finish_task_switch+0x1ca/0x820 [ 625.669042] ? syscall_return_slowpath+0x5c0/0x5c0 [ 625.669062] ? syscall_return_slowpath+0x30f/0x5c0 [ 625.669085] ? entry_SYSCALL_64_after_hwframe+0x52/0xb7 [ 625.669111] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 625.669140] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 625.669153] RIP: 0033:0x455259 [ 625.669162] RSP: 002b:00007f95e4cadb08 EFLAGS: 00000246 ORIG_RAX: 0000000000000103 [ 625.669181] RAX: ffffffffffffffda RBX: 0000000000000015 RCX: 0000000000455259 [ 625.669191] RDX: 0000000000006000 RSI: 0000000020000000 RDI: 00000000ffffff9c [ 625.669202] RBP: 0000000020000000 R08: 0000000000000000 R09: 0000000000000000 [ 625.669212] R10: 00000000000007c7 R11: 0000000000000246 R12: 0000000000004000 [ 625.669221] R13: 0000000000000000 R14: 0000000000000000 R15: 0000000000000000 [ 625.669454] EXT4-fs error (device sda1) in __ext4_new_inode:927: Out of memory 2018/04/11 12:45:28 executing program 7: syz_emit_ethernet(0x66, &(0x7f0000000000)={@random="cd3997030f00", @empty=[0x0, 0x0, 0x0, 0x0, 0x300000000000000], [], {@ipv6={0x86dd, {0x0, 0x6, "b40900", 0x30, 0x67, 0x0, @ipv4={[], [0xff, 0xff], @multicast2=0xe0000002}, @mcast2={0xff, 0x2, [], 0x1}, {[], @icmpv6=@time_exceed={0x21, 0x0, 0x0, 0x0, [], {0x0, 0x6, "b680fa", 0x0, 0x0, 0x0, @ipv4={[], [0xff, 0xff], @broadcast=0xffffffff}, @ipv4={[], [0xff, 0xff], @remote={0xac, 0x14, 0xffffffffffffffff, 0xbb}}}}}}}}}, 0x0) 2018/04/11 12:45:28 executing program 2: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x1e, 0x1, 0x0) setsockopt$packet_tx_ring(r0, 0x10f, 0x87, &(0x7f0000b89fe4)=@req={0x772}, 0x10) sendmsg(r0, &(0x7f0000030000)={&(0x7f00004f5000)=@generic={0x10000000001e, "0100000900000000000000000226cc573c080000003724c71e14dd6a739effea1b48006be61ffe0000e103000000f8000004003f010039d8f986ff01000300040004af50d50700000000000000e3ad316a1983000000001d00e0dfcb24281e27800000100076c3979ac40000bd15020078a1dfd300881a8365b1b16d7436"}, 0x80, &(0x7f0000447ff0), 0x0, &(0x7f00006e9c68)}, 0x0) 2018/04/11 12:45:28 executing program 6: r0 = socket$inet6(0xa, 0x80003, 0xff) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @ipv4={[], [0xff, 0xff], @dev={0xac, 0x14, 0x14, 0x1b}}}, 0x1c) sendmsg(r0, &(0x7f000001b000)={0x0, 0xfffffff5, &(0x7f0000019fa0), 0x104, &(0x7f000001ef08)}, 0x0) 2018/04/11 12:45:28 executing program 1: r0 = socket(0x1e, 0x1, 0x0) setsockopt$packet_tx_ring(r0, 0x10f, 0x87, &(0x7f0000b89fe4)=@req={0x772}, 0x10) sendmsg(r0, &(0x7f0000030000)={&(0x7f00004f5000)=@generic={0x10000000001e, "0014000900000000000100000226cc573c080000003724c71e14dd6a739effea1b48006be61ffe0000e103000000f8000004003f010039d8f986ff01000300000004af50d50700000000000000e3ad316a1983000000001d00e0dfcb24281e27800000100076c3979ac40000bd15020078a1dfd300881a8365b1b16d7436"}, 0x80, &(0x7f0000447ff0), 0x0, &(0x7f00006e9c68)}, 0x0) 2018/04/11 12:45:28 executing program 0: r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5, 0x0, 0x10001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x3f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000200)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc-cast5-avx\x00'}, 0x58) r2 = accept$alg(r1, 0x0, 0x0) dup3(r0, r2, 0x0) 2018/04/11 12:45:28 executing program 4 (fault-call:1 fault-nth:8): perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_fuseblk_mount(&(0x7f0000000040)='./file0\x00', &(0x7f0000000000)='./file0\x00', 0x4000, 0x0, 0x0, 0x0, 0x0, 0x0) 2018/04/11 12:45:28 executing program 3: semop(0x0, &(0x7f000001a000)=[{0x0, 0xffffffffffff0001}, {0x0, 0x5000000}], 0x2) timer_create(0x0, &(0x7f0000cd0000)={0x0, 0x12}, &(0x7f0000044000)) timer_settime(0x0, 0x0, &(0x7f00004b1fe0)={{0x0, 0x1c9c380}, {0x0, 0x9}}, &(0x7f0000040000)) r0 = getpgid(0x0) tkill(r0, 0x1000000000016) 2018/04/11 12:45:28 executing program 5: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000200)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc-cast5-avx\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000100), 0x10000028c) sendmmsg$alg(r1, &(0x7f0000007e40)=[{0x0, 0x0, &(0x7f0000000900)}], 0x1, 0x0) accept(r0, &(0x7f0000000040)=@pppol2tpv3in6, &(0x7f00000000c0)=0x80) [ 626.575937] FAULT_INJECTION: forcing a failure. [ 626.575937] name failslab, interval 1, probability 0, space 0, times 0 [ 626.587277] CPU: 0 PID: 3078 Comm: syz-executor4 Not tainted 4.16.0+ #17 [ 626.594134] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 626.603497] Call Trace: [ 626.606111] dump_stack+0x1b9/0x294 [ 626.609764] ? dump_stack_print_info.cold.2+0x52/0x52 [ 626.614992] should_fail.cold.4+0xa/0x1a [ 626.619082] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 626.624222] ? lock_downgrade+0x8e0/0x8e0 [ 626.628392] ? find_held_lock+0x36/0x1c0 [ 626.632511] ? check_same_owner+0x320/0x320 [ 626.636859] ? rcu_note_context_switch+0x710/0x710 [ 626.641826] __should_failslab+0x124/0x180 [ 626.646084] should_failslab+0x9/0x14 [ 626.649899] __kmalloc_track_caller+0x2c4/0x760 [ 626.654596] ? strncpy_from_user+0x500/0x500 [ 626.659026] ? strndup_user+0x77/0xd0 [ 626.662856] memdup_user+0x2c/0xa0 [ 626.666422] strndup_user+0x77/0xd0 [ 626.670068] ksys_mount+0x3c/0x140 2018/04/11 12:45:28 executing program 7: syz_emit_ethernet(0x66, &(0x7f0000000000)={@random="cd3997030f00", @empty=[0x0, 0x0, 0x0, 0x0, 0x8060000], [], {@ipv6={0x86dd, {0x0, 0x6, "b40900", 0x30, 0x67, 0x0, @ipv4={[], [0xff, 0xff], @multicast2=0xe0000002}, @mcast2={0xff, 0x2, [], 0x1}, {[], @icmpv6=@time_exceed={0x21, 0x0, 0x0, 0x0, [], {0x0, 0x6, "b680fa", 0x0, 0x0, 0x0, @ipv4={[], [0xff, 0xff], @broadcast=0xffffffff}, @ipv4={[], [0xff, 0xff], @remote={0xac, 0x14, 0xffffffffffffffff, 0xbb}}}}}}}}}, 0x0) 2018/04/11 12:45:28 executing program 0: r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/cuse\x00', 0x204000, 0x0) ioctl$sock_inet_sctp_SIOCINQ(r1, 0x541b, &(0x7f0000000080)) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000200)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc-cast5-avx\x00'}, 0x58) r3 = accept$alg(r2, 0x0, 0x0) dup3(r0, r3, 0x0) 2018/04/11 12:45:28 executing program 6: r0 = socket$inet6(0xa, 0x80003, 0xff) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @ipv4={[], [0xff, 0xff], @dev={0xac, 0x14, 0x14, 0x1b}}}, 0x1c) sendmsg(r0, &(0x7f000001b000)={0x0, 0xfffffff5, &(0x7f0000019fa0), 0x39, &(0x7f000001ef08)}, 0x0) 2018/04/11 12:45:28 executing program 1: r0 = socket(0x1e, 0x1, 0x0) setsockopt$packet_tx_ring(r0, 0x10f, 0x87, &(0x7f0000b89fe4)=@req={0x772}, 0x10) sendmsg(r0, &(0x7f0000030000)={&(0x7f00004f5000)=@generic={0x10000000001e, "0014000900000000040000000226cc573c080000003724c71e14dd6a739effea1b48006be61ffe0000e103000000f8000004003f010039d8f986ff01000300000004af50d50700000000000000e3ad316a1983000000001d00e0dfcb24281e27800000100076c3979ac40000bd15020078a1dfd300881a8365b1b16d7436"}, 0x80, &(0x7f0000447ff0), 0x0, &(0x7f00006e9c68)}, 0x0) 2018/04/11 12:45:28 executing program 5: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000200)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc-cast5-avx\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) connect$ax25(r1, &(0x7f0000000100)={0x3, {"a5bb1ef9b5ff1d"}, 0x4}, 0x10) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00003bcfd0)="d3ab27191a", 0x5) sendmmsg$alg(r1, &(0x7f0000007e40)=[{0x0, 0x0, &(0x7f0000000900)}], 0x1, 0x0) accept(r0, &(0x7f0000000040)=@pppol2tpv3in6, &(0x7f00000000c0)=0x80) [ 626.673630] SyS_mount+0x35/0x50 [ 626.677016] ? ksys_mount+0x140/0x140 [ 626.680842] do_syscall_64+0x29e/0x9d0 [ 626.684756] ? vmalloc_sync_all+0x30/0x30 [ 626.688919] ? _raw_spin_unlock_irq+0x27/0x70 [ 626.693435] ? finish_task_switch+0x1ca/0x820 [ 626.697952] ? syscall_return_slowpath+0x5c0/0x5c0 [ 626.702904] ? syscall_return_slowpath+0x30f/0x5c0 [ 626.707862] ? entry_SYSCALL_64_after_hwframe+0x52/0xb7 [ 626.713253] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 626.718128] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 626.723328] RIP: 0033:0x455259 2018/04/11 12:45:28 executing program 2: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x1e, 0x1, 0x0) setsockopt$packet_tx_ring(r0, 0x10f, 0x87, &(0x7f0000b89fe4)=@req={0x772}, 0x10) sendmsg(r0, &(0x7f0000030000)={&(0x7f00004f5000)=@generic={0x10000000001e, "0100000900000000000000000226cc573c080000003724c71e14dd6a739effea1b48006be61ffe0000e103000000f8000004003f010039d8f986ff01000300000204af50d50700000000000000e3ad316a1983000000001d00e0dfcb24281e27800000100076c3979ac40000bd15020078a1dfd300881a8365b1b16d7436"}, 0x80, &(0x7f0000447ff0), 0x0, &(0x7f00006e9c68)}, 0x0) [ 626.726552] RSP: 002b:00007f95e4cadb08 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 626.734280] RAX: ffffffffffffffda RBX: 0000000000000015 RCX: 0000000000455259 [ 626.741561] RDX: 00000000004b9bc5 RSI: 0000000020000040 RDI: 0000000020000000 [ 626.748835] RBP: 0000000020000000 R08: 00007f95e4cadb20 R09: 0000000000000000 [ 626.756117] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 626.763398] R13: 0000000000000000 R14: 0000000000000000 R15: 0000000000000000 2018/04/11 12:45:28 executing program 1: r0 = socket(0x1e, 0x1, 0x0) setsockopt$packet_tx_ring(r0, 0x10f, 0x87, &(0x7f0000b89fe4)=@req={0x772}, 0x10) sendmsg(r0, &(0x7f0000030000)={&(0x7f00004f5000)=@generic={0x10000000001e, "0014000900000003000000000226cc573c080000003724c71e14dd6a739effea1b48006be61ffe0000e103000000f8000004003f010039d8f986ff01000300000004af50d50700000000000000e3ad316a1983000000001d00e0dfcb24281e27800000100076c3979ac40000bd15020078a1dfd300881a8365b1b16d7436"}, 0x80, &(0x7f0000447ff0), 0x0, &(0x7f00006e9c68)}, 0x0) 2018/04/11 12:45:28 executing program 0: r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$alg(0x26, 0x5, 0x0) socket$packet(0x11, 0x2, 0x300) bind$alg(r1, &(0x7f0000000200)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc-cast5-avx\x00'}, 0x58) r2 = accept$alg(r1, 0x0, 0x0) dup3(r0, r2, 0x0) 2018/04/11 12:45:28 executing program 5: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000200)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc-cast5-avx\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00003bcfd0)="d3ab27191a", 0x5) sendmmsg$alg(r1, &(0x7f0000000140)=[{0x0, 0x0, &(0x7f0000000100)}], 0x1, 0x0) accept(r0, &(0x7f0000000040)=@pppol2tpv3in6, &(0x7f00000000c0)=0x80) 2018/04/11 12:45:28 executing program 7: syz_emit_ethernet(0x66, &(0x7f0000000000)={@random="cd3997030f00", @empty=[0x0, 0x0, 0x0, 0x0, 0x88470000], [], {@ipv6={0x86dd, {0x0, 0x6, "b40900", 0x30, 0x67, 0x0, @ipv4={[], [0xff, 0xff], @multicast2=0xe0000002}, @mcast2={0xff, 0x2, [], 0x1}, {[], @icmpv6=@time_exceed={0x21, 0x0, 0x0, 0x0, [], {0x0, 0x6, "b680fa", 0x0, 0x0, 0x0, @ipv4={[], [0xff, 0xff], @broadcast=0xffffffff}, @ipv4={[], [0xff, 0xff], @remote={0xac, 0x14, 0xffffffffffffffff, 0xbb}}}}}}}}}, 0x0) 2018/04/11 12:45:28 executing program 6: r0 = socket$inet6(0xa, 0x80003, 0xff) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @ipv4={[], [0xff, 0xff], @dev={0xac, 0x14, 0x14, 0x1b}}}, 0x1c) sendmsg(r0, &(0x7f000001b000)={0x0, 0xfffffff5, &(0x7f0000019fa0), 0x2001a192, &(0x7f000001ef08)}, 0x0) 2018/04/11 12:45:28 executing program 4 (fault-call:1 fault-nth:9): perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_fuseblk_mount(&(0x7f0000000040)='./file0\x00', &(0x7f0000000000)='./file0\x00', 0x4000, 0x0, 0x0, 0x0, 0x0, 0x0) 2018/04/11 12:45:28 executing program 5: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) r1 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000100)='/dev/hwrng\x00', 0x400200, 0x0) ioctl$DRM_IOCTL_PRIME_HANDLE_TO_FD(r1, 0xc00c642d, &(0x7f0000000180)={0x0, 0x80000, r1}) ioctl$DRM_IOCTL_GEM_CLOSE(r1, 0x40086409, &(0x7f00000001c0)={r2}) bind$alg(r0, &(0x7f0000000200)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc-cast5-avx\x00'}, 0x58) r3 = accept$alg(r0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00003bcfd0)="d3ab27191a", 0x5) ioctl$sock_netrom_SIOCGSTAMP(r1, 0x8906, &(0x7f0000000140)) sendmmsg$alg(r3, &(0x7f0000007e40)=[{0x0, 0x0, &(0x7f0000000900)}], 0x1, 0x0) accept(r0, &(0x7f0000000040)=@pppol2tpv3in6, &(0x7f00000000c0)=0x80) 2018/04/11 12:45:28 executing program 6: r0 = socket$inet6(0xa, 0x80003, 0xff) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @ipv4={[], [0xff, 0xff], @dev={0xac, 0x14, 0x14, 0x1b}}}, 0x1c) sendmsg(r0, &(0x7f000001b000)={0x0, 0xfffffff5, &(0x7f0000019fa0), 0x7a, &(0x7f000001ef08)}, 0x0) [ 626.988084] FAULT_INJECTION: forcing a failure. [ 626.988084] name failslab, interval 1, probability 0, space 0, times 0 [ 626.999409] CPU: 0 PID: 3125 Comm: syz-executor4 Not tainted 4.16.0+ #17 [ 627.006266] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 627.015642] Call Trace: [ 627.018261] dump_stack+0x1b9/0x294 [ 627.021921] ? dump_stack_print_info.cold.2+0x52/0x52 [ 627.027154] should_fail.cold.4+0xa/0x1a [ 627.031242] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 627.036369] ? save_stack+0x43/0xd0 [ 627.040014] ? memdup_user+0x2c/0xa0 [ 627.043748] ? strndup_user+0x77/0xd0 [ 627.047567] ? graph_lock+0x170/0x170 [ 627.051386] ? entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 627.056774] ? lock_downgrade+0x8e0/0x8e0 [ 627.060950] ? find_held_lock+0x36/0x1c0 [ 627.065076] ? check_same_owner+0x320/0x320 [ 627.069419] ? lock_release+0xa10/0xa10 [ 627.073418] ? rcu_note_context_switch+0x710/0x710 [ 627.078368] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 627.083404] ? __check_object_size+0x95/0x5d9 [ 627.087932] __should_failslab+0x124/0x180 [ 627.092193] should_failslab+0x9/0x14 [ 627.096011] __kmalloc_track_caller+0x2c4/0x760 [ 627.100707] ? strncpy_from_user+0x500/0x500 [ 627.105132] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 627.110700] ? strndup_user+0x77/0xd0 [ 627.114529] memdup_user+0x2c/0xa0 [ 627.118075] strndup_user+0x77/0xd0 [ 627.121718] ksys_mount+0x73/0x140 [ 627.125281] SyS_mount+0x35/0x50 [ 627.128661] ? ksys_mount+0x140/0x140 [ 627.132484] do_syscall_64+0x29e/0x9d0 [ 627.136388] ? vmalloc_sync_all+0x30/0x30 [ 627.140554] ? _raw_spin_unlock_irq+0x27/0x70 [ 627.145067] ? finish_task_switch+0x1ca/0x820 [ 627.149565] ? syscall_return_slowpath+0x5c0/0x5c0 [ 627.154507] ? syscall_return_slowpath+0x30f/0x5c0 [ 627.159459] ? entry_SYSCALL_64_after_hwframe+0x52/0xb7 [ 627.164830] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 627.169669] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 627.174850] RIP: 0033:0x455259 [ 627.178045] RSP: 002b:00007f95e4cadb08 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 627.185762] RAX: ffffffffffffffda RBX: 0000000000000015 RCX: 0000000000455259 [ 627.193041] RDX: 00000000004b9bc5 RSI: 0000000020000040 RDI: 0000000020000000 [ 627.200304] RBP: 0000000020000000 R08: 00007f95e4cadb20 R09: 0000000000000000 [ 627.207580] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 627.214934] R13: 0000000000000000 R14: 0000000000000000 R15: 0000000000000000 2018/04/11 12:45:29 executing program 2: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x1e, 0x1, 0x0) setsockopt$packet_tx_ring(r0, 0x10f, 0x87, &(0x7f0000b89fe4)=@req={0x772}, 0x10) sendmsg(r0, &(0x7f0000030000)={&(0x7f00004f5000)=@generic={0x10000000001e, "0100000900000000000000000226cc573c080000003724c71e14dd6a739effea1b48006be61ffe0000e103000000f8000004003f010039d8f986ff01000300000004af50d507d0010100000000e3ad316a1983000000001d00e0dfcb24281e27800000100076c3979ac40000bd15020078a1dfd300881a8365b1b16d7436"}, 0x80, &(0x7f0000447ff0), 0x0, &(0x7f00006e9c68)}, 0x0) 2018/04/11 12:45:29 executing program 7: syz_emit_ethernet(0x66, &(0x7f0000000000)={@random="cd3997030f00", @empty=[0x0, 0x0, 0x0, 0x0, 0x8864], [], {@ipv6={0x86dd, {0x0, 0x6, "b40900", 0x30, 0x67, 0x0, @ipv4={[], [0xff, 0xff], @multicast2=0xe0000002}, @mcast2={0xff, 0x2, [], 0x1}, {[], @icmpv6=@time_exceed={0x21, 0x0, 0x0, 0x0, [], {0x0, 0x6, "b680fa", 0x0, 0x0, 0x0, @ipv4={[], [0xff, 0xff], @broadcast=0xffffffff}, @ipv4={[], [0xff, 0xff], @remote={0xac, 0x14, 0xffffffffffffffff, 0xbb}}}}}}}}}, 0x0) 2018/04/11 12:45:29 executing program 6: r0 = socket$inet6(0xa, 0x80003, 0xff) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @ipv4={[], [0xff, 0xff], @dev={0xac, 0x14, 0x14, 0x1b}}}, 0x1c) sendmsg(r0, &(0x7f000001b000)={0x0, 0xfffffff5, &(0x7f0000019fa0), 0x99, &(0x7f000001ef08)}, 0x0) 2018/04/11 12:45:29 executing program 5: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bind$alg(0xffffffffffffffff, &(0x7f0000000200)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc-cast5-avx\x00'}, 0x58) r0 = accept$alg(0xffffffffffffffff, 0x0, 0x0) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f00003bcfd0)="d3ab27191a", 0x5) sendmmsg$alg(r0, &(0x7f0000007e40)=[{0x0, 0x0, &(0x7f0000000900)}], 0x1, 0x0) getsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, &(0x7f0000000100), &(0x7f0000000140)=0x4) accept(0xffffffffffffffff, &(0x7f0000000040)=@pppol2tpv3in6, &(0x7f00000000c0)=0x80) 2018/04/11 12:45:29 executing program 0: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000200)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc-cast5-avx\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) r2 = syz_open_dev$sndpcmc(&(0x7f0000000100)='/dev/snd/pcmC#D#c\x00', 0xffff, 0x101000) fcntl$setflags(r0, 0x2, 0x0) ioctl$SIOCGIFHWADDR(r2, 0x8927, &(0x7f0000000140)) r3 = accept4$ax25(0xffffffffffffff9c, 0x0, &(0x7f0000000040), 0x80800) setsockopt$inet_dccp_buf(r2, 0x21, 0x8c, &(0x7f0000000280)="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", 0x1000) r4 = accept4$ax25(r3, &(0x7f0000000080), &(0x7f00000000c0)=0x10, 0x80800) dup3(r4, r1, 0x400000000000000) 2018/04/11 12:45:29 executing program 3: semop(0x0, &(0x7f000001a000)=[{0x0, 0xffffffffffff0001}, {0x0, 0xe000000}], 0x2) timer_create(0x0, &(0x7f0000cd0000)={0x0, 0x12}, &(0x7f0000044000)) timer_settime(0x0, 0x0, &(0x7f00004b1fe0)={{0x0, 0x1c9c380}, {0x0, 0x9}}, &(0x7f0000040000)) r0 = getpgid(0x0) tkill(r0, 0x1000000000016) 2018/04/11 12:45:29 executing program 4 (fault-call:1 fault-nth:10): perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_fuseblk_mount(&(0x7f0000000040)='./file0\x00', &(0x7f0000000000)='./file0\x00', 0x4000, 0x0, 0x0, 0x0, 0x0, 0x0) 2018/04/11 12:45:29 executing program 1: r0 = socket(0x1e, 0x1, 0x0) setsockopt$packet_tx_ring(r0, 0x10f, 0x87, &(0x7f0000b89fe4)=@req={0x772}, 0x10) sendmsg(r0, &(0x7f0000030000)={&(0x7f00004f5000)=@generic={0x10000000001e, "0014000900000400000000000226cc573c080000003724c71e14dd6a739effea1b48006be61ffe0000e103000000f8000004003f010039d8f986ff01000300000004af50d50700000000000000e3ad316a1983000000001d00e0dfcb24281e27800000100076c3979ac40000bd15020078a1dfd300881a8365b1b16d7436"}, 0x80, &(0x7f0000447ff0), 0x0, &(0x7f00006e9c68)}, 0x0) 2018/04/11 12:45:29 executing program 5: ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000280)=0x0) ptrace$getenv(0x4201, r0, 0x3, &(0x7f00000002c0)) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000200)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc-cast5-avx\x00'}, 0x58) open_by_handle_at(r1, &(0x7f0000000100)=ANY=[@ANYBLOB="110000000800000051292a3634eee3ac4c"], 0x4000) r2 = accept$alg(r1, 0x0, 0x0) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f00003bcfd0)="d3ab27191a", 0x5) sendmmsg$alg(r2, &(0x7f0000007e40), 0x0, 0x0) accept(r1, &(0x7f0000000040)=@pppol2tpv3in6={0x0, 0x0, {0x0, 0xffffffffffffffff}}, &(0x7f00000000c0)=0x80) ioctl$sock_inet_SIOCRTMSG(r3, 0x890d, &(0x7f0000000180)={0x100000000, {0x2, 0x4e21, @broadcast=0xffffffff}, {0x2, 0x4e22, @rand_addr=0x4}, {0x2, 0x4e20, @broadcast=0xffffffff}, 0x2a0, 0x1, 0x40, 0x9, 0x1, &(0x7f0000000140)='ip6gre0\x00', 0xbfcc, 0x0, 0x6}) [ 627.536474] FAULT_INJECTION: forcing a failure. [ 627.536474] name failslab, interval 1, probability 0, space 0, times 0 [ 627.547802] CPU: 0 PID: 3157 Comm: syz-executor4 Not tainted 4.16.0+ #17 [ 627.554660] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 627.564025] Call Trace: [ 627.566640] dump_stack+0x1b9/0x294 [ 627.570293] ? dump_stack_print_info.cold.2+0x52/0x52 [ 627.575525] should_fail.cold.4+0xa/0x1a [ 627.579606] ? zap_class+0x720/0x720 2018/04/11 12:45:29 executing program 0: r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000200)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc-cast5-avx\x00'}, 0x58) r2 = memfd_create(&(0x7f0000000880)='cbc-cast5-avx\x00', 0x0) ioctl$DRM_IOCTL_AGP_ALLOC(0xffffffffffffff9c, 0xc0206434, &(0x7f00000008c0)={0x1, 0x0, 0x10000, 0x1000}) ioctl$DRM_IOCTL_SG_ALLOC(r2, 0xc0106438, &(0x7f0000000940)={0x51ceb807, r3}) r4 = accept$alg(r1, 0x0, 0x0) r5 = dup3(r0, r4, 0x0) sendmsg$alg(r5, &(0x7f0000000900)={0x0, 0x0, &(0x7f00000007c0)=[{&(0x7f0000000040)="b590c12ba1d5bbf031a78b14d1ec52dd2013c3852710028228434e85dba44f123c4581a5b4bf20779185ab11f4ed05388e50b7efbb8de1593513939a8c83fcaeb0cd0023d108cb40364af36f3ae3f7130172496edd6e11903877171e328d34b05f99ae4864347acb00a1a3959e25d2e46c862e53629975ed60404090e1e22b409e9ea0", 0x83}, {&(0x7f0000000100)="85c4f0fda87d2ce1df10b25cf7178cc15e0360cf5cbd3b9a7342fe9764ee2b32879cba8873019520d46c733215bf2b669b08a14e057e8f57e579e0496bfdbec544464f21f98ff80bccceddd32a38a465a9ad29699cf7a27992a3d7498b856f495c01ccf1fbd43076bdff258dc4ca0c9d8fbd5148cdf076573660c5aa73606375b62088abd6", 0x85}, {&(0x7f0000000280)="edef9036cb77a81a95a21cdd497b5aeecd3ff6fab890654ee00ad261c315b2c19e98cdc89cf56d8ab9b724ec316e254483913bcee7fc65c3915fb9492189431cd42cd74b52b3f8f6a86f7b7ab23cc3f98e264c3e788bc7eeea787f0df9d5e6f71794d87c58a975d9ad3cc38893e22f576c9c8d96fd367a7e72086fffd0f181ab2e2dec256ba2fee25e5af035e3cd81489ab99d1ae35d09db5f0e7969a0f085b595e18deb67059dcaf1cb6600c26389f314ab812586f284c5a5bdb05694e433e6ac3a75e928ee72d83aba715f39bbfff6d8cae13d432446eb019d572f38c8f901cc0ddefb977a450b", 0xe8}, {&(0x7f0000000380)="83dea31131abc3053ecadb9011d148540ec7ff175afe25d6f8ac95bfeaa6651bde4f5206cb44bd21a85123833b3b34494eb7b19584f8dfeda8a5557cb166d8a09539eaecfcf5e28547c98a6ab3b9afde4138c74aac3a810956957b3f8f0c39f3fac499ae1b7b6da2af8cdc14de99cc6460ad213e5195e6e0036c513b11effeecfaa851475bc19b67a614c2d94f2999cdb3550e3ff3234572d41be6b526360c5462a513648c0e2f2bdc9df36bc6d0ea2a9b2780d73dbc2c92cd9e8c2dcce74a709eb1e1b80fb742c992ed85164d02ff6c9766a166f82718e690edabb545e65f1aaa1097d4", 0xe4}, {&(0x7f00000001c0)="c8d87a1487c821f75efeaa6e08b7e7e0d6e97d3d35", 0x15}, {&(0x7f0000000480)="074905fd278cf50493740e0c766086a57793af9e0b51a4a6527f307870df9bbc786d51f65ccc7ea7b1e49fb64217927eb0eaac6a0048e2ffd7108bfe7b7c5c28a1e4e272b854a837fe8a82c5f231dbecfac2d96c8634bf1c73b2e1abd48e547750496c2f8a05b8c10370e1cf0009dba204c3597ca59b0797086bfdd87a04852f743ce842aa297c2c1ed4dcdbbbfdb68af1f9d04dbdbd0309f95a6830430a306408e0bebae5c4348477b48141bc184c78", 0xb0}, {&(0x7f0000000540)="c59e832e5681613a07772e50eb626e3f65a44d6343d1cbe278d0452a541bb660c97e9886c7af264b1b46ea96faf0fa3ec3f52b49d1bd65c4a57d8d242634b8efcf1a7b021880a342b5fde6b786aa7f524e348e3c8aff829a7303619b3e351015c36e9e1711ab997502f9747cfe519743fab0616fdb97bafd0055ff63636161351da88a40006453eb5a89df308a6bb96a5c0ba4bc48", 0x95}, {&(0x7f0000000600)="a1f1c9419fc247293f3b11ab804daa030b697e5d6c76e6ffde45b80f97666ae078f0ab87659f26c0a557342fa15fb6e7da698d64c0f382081fa2a9ceac674b5529144ffbfe40c063bd8b9ff33fad740c0c7d823038ae1c62928e0a38aabaf8eb7fa132baaebde914e622f6812f706e05800b16bdfba758b1ab8f8a383249d2ee03ea9453432f852ed2a013c58cb4d9b7abe6e421813c4319a25a71cfdfe2884a8ef23008c4e52489c8f219046a3df403d899c164434a5c410d51742ee08e27afcf1e52f0517d5695a9ed76b46579462c146812908e6726", 0xd7}, {&(0x7f0000000700)="b474505626c9ed6307f07e8aca005104da6052c76703afa18eee01b5a84ac07ce02e3f5fb5152c2b666e10a85181c9b815ca145ba329afc11f2ffe9b50c9912e3c639ea184e11e1217dfdee312ee7aae7d5109b43eb8e910f1618a22211793129bb301ad48109b8691aba4f73fa46cb48aa2f2b1ab3e5ce0278fcb5826e2a54530", 0x81}], 0x9, &(0x7f0000000a80)=ANY=[@ANYBLOB="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"], 0x58, 0x20008000}, 0x20000000) [ 627.583347] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 627.588472] ? kasan_kmalloc+0xc4/0xe0 [ 627.592384] ? strndup_user+0x77/0xd0 [ 627.596202] ? graph_lock+0x170/0x170 [ 627.600023] ? lock_downgrade+0x8e0/0x8e0 [ 627.604198] ? find_held_lock+0x36/0x1c0 [ 627.608316] ? check_same_owner+0x320/0x320 [ 627.612652] ? lock_release+0xa10/0xa10 [ 627.616647] ? check_same_owner+0x320/0x320 [ 627.620992] ? rcu_note_context_switch+0x710/0x710 [ 627.625938] ? __check_object_size+0x95/0x5d9 [ 627.630461] __should_failslab+0x124/0x180 [ 627.634718] should_failslab+0x9/0x14 [ 627.638538] kmem_cache_alloc_trace+0x2cb/0x780 [ 627.643237] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 627.648792] ? _copy_from_user+0xdf/0x150 [ 627.652969] copy_mount_options+0x5f/0x380 [ 627.657231] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 627.662791] ksys_mount+0xd0/0x140 [ 627.666359] SyS_mount+0x35/0x50 [ 627.669747] ? ksys_mount+0x140/0x140 [ 627.673574] do_syscall_64+0x29e/0x9d0 [ 627.677482] ? vmalloc_sync_all+0x30/0x30 [ 627.681645] ? _raw_spin_unlock_irq+0x27/0x70 [ 627.686165] ? finish_task_switch+0x1ca/0x820 [ 627.690690] ? syscall_return_slowpath+0x5c0/0x5c0 [ 627.695643] ? syscall_return_slowpath+0x30f/0x5c0 [ 627.700601] ? entry_SYSCALL_64_after_hwframe+0x52/0xb7 [ 627.705988] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 627.710854] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 627.716048] RIP: 0033:0x455259 [ 627.719244] RSP: 002b:00007f95e4cadb08 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 627.726973] RAX: ffffffffffffffda RBX: 0000000000000015 RCX: 0000000000455259 [ 627.734254] RDX: 00000000004b9bc5 RSI: 0000000020000040 RDI: 0000000020000000 [ 627.741535] RBP: 0000000020000000 R08: 00007f95e4cadb20 R09: 0000000000000000 [ 627.748818] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 627.756094] R13: 0000000000000000 R14: 0000000000000000 R15: 0000000000000000 2018/04/11 12:45:30 executing program 0: r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$alg(0x26, 0x5, 0x0) r2 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/sys/net/ipv4/vs/schedule_icmp\x00', 0x2, 0x0) ioctl$RNDGETENTCNT(r2, 0x80045200, &(0x7f0000000080)) ioctl$DRM_IOCTL_RES_CTX(r2, 0xc0106426, &(0x7f0000000140)={0xa, &(0x7f00000000c0)=[{}, {}, {}, {}, {}, {}, {}, {}, {}, {}]}) bind$alg(r1, &(0x7f0000000200)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc-cast5-avx\x00'}, 0x58) r3 = accept$alg(r1, 0x0, 0x0) dup3(r0, r3, 0x0) 2018/04/11 12:45:30 executing program 1: r0 = socket(0x1e, 0x1, 0x0) setsockopt$packet_tx_ring(r0, 0x10f, 0x87, &(0x7f0000b89fe4)=@req={0x772}, 0x10) sendmsg(r0, &(0x7f0000030000)={&(0x7f00004f5000)=@generic={0x10000000001e, "0014000900000300000000000226cc573c080000003724c71e14dd6a739effea1b48006be61ffe0000e103000000f8000004003f010039d8f986ff01000300000004af50d50700000000000000e3ad316a1983000000001d00e0dfcb24281e27800000100076c3979ac40000bd15020078a1dfd300881a8365b1b16d7436"}, 0x80, &(0x7f0000447ff0), 0x0, &(0x7f00006e9c68)}, 0x0) 2018/04/11 12:45:30 executing program 6: r0 = socket$inet6(0xa, 0x80003, 0xff) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @ipv4={[], [0xff, 0xff], @dev={0xac, 0x14, 0x14, 0x1b}}}, 0x1c) sendmsg(r0, &(0x7f000001b000)={0x0, 0xfffffff5, &(0x7f0000019fa0), 0x37, &(0x7f000001ef08)}, 0x0) 2018/04/11 12:45:30 executing program 7: syz_emit_ethernet(0x66, &(0x7f0000000000)={@random="cd3997030f00", @empty=[0x0, 0x0, 0x0, 0x0, 0xfffffffffffff000], [], {@ipv6={0x86dd, {0x0, 0x6, "b40900", 0x30, 0x67, 0x0, @ipv4={[], [0xff, 0xff], @multicast2=0xe0000002}, @mcast2={0xff, 0x2, [], 0x1}, {[], @icmpv6=@time_exceed={0x21, 0x0, 0x0, 0x0, [], {0x0, 0x6, "b680fa", 0x0, 0x0, 0x0, @ipv4={[], [0xff, 0xff], @broadcast=0xffffffff}, @ipv4={[], [0xff, 0xff], @remote={0xac, 0x14, 0xffffffffffffffff, 0xbb}}}}}}}}}, 0x0) 2018/04/11 12:45:30 executing program 2: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x1e, 0x1, 0x0) setsockopt$packet_tx_ring(r0, 0x10f, 0x87, &(0x7f0000b89fe4)=@req={0x772}, 0x10) sendmsg(r0, &(0x7f0000030000)={&(0x7f00004f5000)=@generic={0x10000000001e, "0100000900000000000000000226cc573c080000003724c71e14dd6a739effea1b48006be61ffe0000e103000000f8000004003f010039d8f986ff01000300000004af50d5077fffffff000000e3ad316a1983000000001d00e0dfcb24281e27800000100076c3979ac40000bd15020078a1dfd300881a8365b1b16d7436"}, 0x80, &(0x7f0000447ff0), 0x0, &(0x7f00006e9c68)}, 0x0) 2018/04/11 12:45:30 executing program 3: semop(0x0, &(0x7f000001a000)=[{0x0, 0xffffffffffff0001}, {0x0, 0x3f000000}], 0x2) timer_create(0x0, &(0x7f0000cd0000)={0x0, 0x12}, &(0x7f0000044000)) timer_settime(0x0, 0x0, &(0x7f00004b1fe0)={{0x0, 0x1c9c380}, {0x0, 0x9}}, &(0x7f0000040000)) r0 = getpgid(0x0) tkill(r0, 0x1000000000016) 2018/04/11 12:45:30 executing program 4 (fault-call:1 fault-nth:11): perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_fuseblk_mount(&(0x7f0000000040)='./file0\x00', &(0x7f0000000000)='./file0\x00', 0x4000, 0x0, 0x0, 0x0, 0x0, 0x0) 2018/04/11 12:45:30 executing program 5: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000200)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc-cast5-avx\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00003bcfd0)="d3ab27191a", 0x5) r2 = open(&(0x7f0000000100)='./file0\x00', 0x20102, 0x102) getsockopt$inet_sctp_SCTP_AUTO_ASCONF(r2, 0x84, 0x1e, &(0x7f0000000140), &(0x7f0000000180)=0x4) sendmmsg$alg(r1, &(0x7f0000007e40)=[{0x0, 0x0, &(0x7f0000000900)}], 0x1, 0x0) accept(r0, &(0x7f0000000040)=@pppol2tpv3in6, &(0x7f00000000c0)=0x80) 2018/04/11 12:45:30 executing program 7: syz_emit_ethernet(0x66, &(0x7f0000000000)={@random="cd3997030f00", @empty=[0x0, 0x0, 0x0, 0x0, 0x88caffff00000000], [], {@ipv6={0x86dd, {0x0, 0x6, "b40900", 0x30, 0x67, 0x0, @ipv4={[], [0xff, 0xff], @multicast2=0xe0000002}, @mcast2={0xff, 0x2, [], 0x1}, {[], @icmpv6=@time_exceed={0x21, 0x0, 0x0, 0x0, [], {0x0, 0x6, "b680fa", 0x0, 0x0, 0x0, @ipv4={[], [0xff, 0xff], @broadcast=0xffffffff}, @ipv4={[], [0xff, 0xff], @remote={0xac, 0x14, 0xffffffffffffffff, 0xbb}}}}}}}}}, 0x0) 2018/04/11 12:45:30 executing program 5: r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='cpuacct.usage_user\x00', 0x0, 0x0) setsockopt$SO_VM_SOCKETS_BUFFER_MAX_SIZE(r1, 0x28, 0x2, &(0x7f0000000180)=0x9, 0x8) setsockopt$SO_VM_SOCKETS_BUFFER_MAX_SIZE(r1, 0x28, 0x2, &(0x7f0000000080)=0x10000, 0x8) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000200)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc-cast5-avx\x00'}, 0x58) accept$alg(r2, 0x0, 0x0) ioctl$sock_inet_SIOCGIFNETMASK(r0, 0x891b, &(0x7f0000000100)={'vlan0\x00', {0x2, 0x4e20, @loopback=0x7f000001}}) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f00003bcfd0)="d3ab27191a", 0x5) connect$netrom(r1, &(0x7f0000000040)=@ax25={0x3, {"49f7cdeee2dce6"}, 0x7}, 0x10) [ 628.485259] FAULT_INJECTION: forcing a failure. [ 628.485259] name failslab, interval 1, probability 0, space 0, times 0 [ 628.496590] CPU: 0 PID: 3184 Comm: syz-executor4 Not tainted 4.16.0+ #17 [ 628.503444] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 628.512815] Call Trace: [ 628.515440] dump_stack+0x1b9/0x294 [ 628.519104] ? dump_stack_print_info.cold.2+0x52/0x52 [ 628.524319] ? finish_task_switch+0x1ca/0x820 [ 628.528840] ? finish_task_switch+0x182/0x820 [ 628.533366] should_fail.cold.4+0xa/0x1a [ 628.537460] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 628.542601] ? __schedule+0x80f/0x1e40 [ 628.546513] ? rcu_bh_force_quiescent_state+0x20/0x20 [ 628.551740] ? __sched_text_start+0x8/0x8 [ 628.555904] ? find_held_lock+0x36/0x1c0 [ 628.560033] ? check_same_owner+0x320/0x320 [ 628.564384] ? save_stack+0xa9/0xd0 [ 628.568043] __should_failslab+0x124/0x180 [ 628.572310] should_failslab+0x9/0x14 [ 628.576126] kmem_cache_alloc+0x2af/0x760 [ 628.580310] getname_flags+0xd0/0x5a0 2018/04/11 12:45:30 executing program 7: syz_emit_ethernet(0x66, &(0x7f0000000000)={@random="cd3997030f00", @empty=[0x0, 0x0, 0x0, 0x0, 0x4000000], [], {@ipv6={0x86dd, {0x0, 0x6, "b40900", 0x30, 0x67, 0x0, @ipv4={[], [0xff, 0xff], @multicast2=0xe0000002}, @mcast2={0xff, 0x2, [], 0x1}, {[], @icmpv6=@time_exceed={0x21, 0x0, 0x0, 0x0, [], {0x0, 0x6, "b680fa", 0x0, 0x0, 0x0, @ipv4={[], [0xff, 0xff], @broadcast=0xffffffff}, @ipv4={[], [0xff, 0xff], @remote={0xac, 0x14, 0xffffffffffffffff, 0xbb}}}}}}}}}, 0x0) [ 628.584125] user_path_at_empty+0x2d/0x50 [ 628.588296] do_mount+0x172/0x3070 [ 628.591866] ? copy_mount_string+0x40/0x40 [ 628.596134] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 628.600921] ? retint_kernel+0x10/0x10 [ 628.604842] ? copy_mount_options+0x1f0/0x380 [ 628.609444] ? __sanitizer_cov_trace_pc+0x48/0x50 [ 628.614313] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 628.619868] ? copy_mount_options+0x285/0x380 [ 628.624387] ksys_mount+0x12d/0x140 [ 628.628034] SyS_mount+0x35/0x50 [ 628.631417] ? ksys_mount+0x140/0x140 2018/04/11 12:45:30 executing program 6: r0 = socket$inet6(0xa, 0x80003, 0xff) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @ipv4={[], [0xff, 0xff], @dev={0xac, 0x14, 0x14, 0x1b}}}, 0x1c) sendmsg(r0, &(0x7f000001b000)={0x0, 0xfffffff5, &(0x7f0000019fa0), 0x1cf, &(0x7f000001ef08)}, 0x0) [ 628.635244] do_syscall_64+0x29e/0x9d0 [ 628.639149] ? vmalloc_sync_all+0x30/0x30 [ 628.643322] ? kasan_check_write+0x14/0x20 [ 628.647579] ? syscall_return_slowpath+0x5c0/0x5c0 [ 628.652535] ? syscall_return_slowpath+0x30f/0x5c0 [ 628.657488] ? entry_SYSCALL_64_after_hwframe+0x52/0xb7 [ 628.662882] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 628.667754] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 628.672956] RIP: 0033:0x455259 [ 628.676158] RSP: 002b:00007f95e4cadb08 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 2018/04/11 12:45:30 executing program 5: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000200)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc-cast5-avx\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00003bcfd0)="d3ab27191a", 0x5) r2 = syz_open_dev$mice(&(0x7f0000000100)='/dev/input/mice\x00', 0x0, 0x103001) recvmsg$netrom(r2, &(0x7f0000003340)={&(0x7f0000000140)=@ax25={0x3, {"5fd844406b0e4a"}, 0x1f}, 0x10, &(0x7f00000022c0)=[{&(0x7f0000000180)="d91b7a56f0aca53ff64144bb87159c3a2282275955e18bf08b9cf50ecbfe8e13c91ac506d5bd324dae808fb446a20a2e8437bd0600de018c51c3b814a168fd195110f9b12f27a1fe5057c182a7f32c0f1f5c8ede051f7c1a70b2daf11f6b52", 0x5f}, {&(0x7f0000000280)="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", 0x1000}, {&(0x7f0000001280)}, {&(0x7f00000012c0)="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", 0x1000}], 0x4, &(0x7f0000002300)=[{0x30, 0x29, 0x7fffffff, "9488aa12cde73098917dde4648426dca23fce5713c6fc9ee8706f192cf9531e0"}, {0x1010, 0x10d, 0x7b7, "ce882744f839da4a22d36189da98114cf2d32a85ea0709f7abdbc25f9191158ff7e76a4401906263007bdc454d509115b49480cec812d465d350408e2170bd5b9fbbed16580a545945f948083c13536700e929a491da0d1ad4e5c17d36af3ce41e39fa91618eeb356406cd605fa9afd4796fdc02980ff804d3ea614f1325071b71894da1f91265a689e34afb1593d4cd97740f918e8a05693934baa6e708b62b9c839fb321efa0d0407380cf2204c878041fe6f1538267464808ad3c7c642d052d10dfbc840b74cc421e60bae4bdf38b267cdf0699cdf3d06572171ed1d3c20d12008a20f692ce0b9aa956e26c9150af17a70e389b2b7b6412197274d2bc08402d83cb967674293def72fe849a77f4a7e599b02e1c3dd1525a85b66a8767df8a496e47eb61b447f821c1cfcf09b02fd85b915e1446a7a95e1ced76a8c635d16a7fb0d4fd1bc6ab4c6c24b2fde8a17e084b62d0231c88dc36c2b241be38d88fcb8998c99f75ee5cf2a599dae54cdf71fe5f1cbeb7e2d5890e11a542cd99769825c22907f30722e0af11924621086d39c71c2b430df60cc33a502a1e976585bd15e8e279c5bebcb09daba1b6dc1da565c0a79002e133dcd0bfb942632d3a32c64653b77f85fbaad18a14c4cfdbe6bbd38f85976fbc5c2a6f47e26991fa587623c4f1d23db45b84b97f1a3901ec929d632a1132eca9c312e5b324c8c1fe580c7341a0c8582864041ff63f722d49847677506df316a83c4b299839f46c78abb58632ef7590153e99aa2d46b03ffb2c5e4a3dabddf7f1fd2e9b7891b33fae1551f39da37f8d43858316734da3f4683a96cb034b10608c43ec66780d185423b2b4cc4c9173a7c85df6d3fe09243b1b564a24819fb31db4a67ee508cd67f86b77626f69e6ca61c0474438898aedeb8f1d2a8c4cb942f7cf06dc87b40051206791c5c8d88209429b184a65093399335aabb8ecbefe11860aa0ccd784836c1fec8b598a84f9a22163701f1134c687a2c2d6e9073fb630ba1795f4afa5757613e200edd74519d33868cec1d0f82a2d64a68d2c44bb380064cb3e61edf3b4d5dfe9f448c9ffadb1e60d9963e22526a598e3022084776086b9acaacc4b68feedafa9adb17ba4604cb09ab4b1186cb69aae51369f40adafce7b29e3326a0f9f5dcf10ceef6b5c3e35feee83cc3a3621e795ac3f65000a44b1b7296f01e7298dbf18c62442d7f98716a7d7006d2956ea0b9cef9aa75cb2e541a2c3052e482d83c08fc38336d46ef0e79e7e68ed7707ca9c37011ca63acafb44dfa767f1a255770195b2c5ee950cfc8e3f1396b128f3d8b24f09090fce133a522d5f23f48128bb75576b323a847556c8b0fcf9fdbe7d1d5d526cccfd58e9a0b85a0338f92e23da09543c396e0ec969bd23c23976a4c037bb971b4f3ab5f3715ce02e7492fc202248c5ca2b4a422c9db2c62388eeff98956ab1fd8f5a09718fb09219ea6a239c688ad2d216c966d82fe00bb5567c575f2ccec895658141003ccf090cc423f8fad5489406c759633180ec83d7ad9db18449a14a62ae321a7d8f2adfc100697f5fffe2e6edb8b3a7a1d39dd91c2e8ef7279cba089c3c9c9344ec9dbfe3222a06624a578448a521d94c277557e05db05b8edec2bbbc21cd737f4be7d89cad046508ba0a4a4c530f44dd498887642a7e64f0f96b69d04890f2e11c5d1a8300fc2a360b2dd601bed55b5f86e21b8a55f6f28a4cf791aeb557bc2429737c567ade058ce515c9c9ce3b663eb30179a1477183b810c5987167c6bbc80c618d2a9fc12aa412582328e1181237fdb4f8f979da9b30ba56a370831808403e24bd67f05f738205b5573d5619de0213b1130338fc9eea230a4ca8bc1d091d08eaf8a1aa0621ccd63fb1c9833cc65bd37438d7ce951c23283aef21330c159c32e4b7c1389a91665a288a3faa7731c82e75387924e28fa50497c6e90e3d2b07278d4983e979f7f6144b64b64eb740f3919d3874943a96bdfdf8a8bae7e5cf891aa39f3a12c7c0fbecaed38aab8d29b1b549d55c68e83a87f04fb68ab2541a888f01b2f66612a8f1af11328e131f8979f7c4341bf129521441a81c70a81a8741a028a520b99e23754adbba14e58ac5ac0bc7f2e544f1e5d0281c17e5700906618392a9e192eac6fab9a6775e60fdd2b8564b7423dcc8b5025761622c37af2b4d8a2b131cedfa0256a611c1d5aa088e5f09ef21b664aedd90df5721233aaf027fbb6eb44cfd662078f377478617cae672da2cac32174ec659886d5b0103383037b8b4a3ad6acbb53f6bed051b6c7538b34ef9073fb0373326d10c261999b3e8c178c18e22e3487ef730d669dcb275155be83343a0ff40d924c4dce0ca378fb77dc39aa9fd988d356c0591fe70144a174f769e7a4cd8c44c099d371081bdc60bb8dc950ad6c5e7483969d73d6f3d59f5ed26681ee0855d3944acb8ad6e2aa6647617b7a85645f78c9c6cc5f0c1928266afb6f70903d1152d02380697dce1580a1194e464a0eaa9faa0da73686af4b5e750ea0bf7d460f7dabf652377c0ee52deee1571cf741f06fec0302d622002930fb22fa6b66813df854f4d37c0772c662cb7d386469b95693bc2a6a821f05fa1edb681340ffcbe801f303e8ce9af4cd293f2d367564cf341f2d8b2ab953d1915702eebb0ad1d8705fb6f950f5d883375b677d70c60f79f24b938dc29497d3278b6fc728cc4c71f8133a2027d7f25f9bb921e45e0d4eda6210caf6376a66306feeb8af1fb727892b4b05da7f5b3327c2ae64a332d5fb2e7692ba7322876baf9ee8e392d140e2fb9548d4cd130c04bad69611c7b70ec075a7d544e8f106efb266b9af5134f2c3c91dbb589951580d7a7610c815255321ccb921019b00b9143690b0abf5b6a40cc892530ebef91fd1abe0f3e76519c025ee608e98ad097b28ae078ccd6b3498cc09e721b3f694d9e0b3b8ad5afdad5c76f063755d02b084ba501f213387fc56b8a8d7b3a63dfbd8d92fa650371482b15a2e6857ad9d7b6ea49ac1e8ae93e488b3214a844493a14d8cdec4463fb59fecc9a178a5ca18157e40791c2d4c066f8c2c4a67cb4988ffd4d842c35f8716a27d9c22e3ffa2619490397f0e02e6d4af212eb3c6d7b941dbf77a99c3735a33f95a9dc4348f41c4bac101fa8b5dd35433b6d10ea1a8ffcb35942106ee2b007fabc37f178384bbd233b0d72c1c3c4494fbe10ec4734a1192b70dba68bdee85d90bd4dc4cac648bb1b94859522bfb0821fcda20ae1179cae50c08d4e0974c4e655664005b4d15e9ac22d013b74b3fc64df707d87bb1f4d95427e06dd3144eee38e5ba0d1b82a0f87055a0e308ea2398ca7e4d8988433398dd6c3e42dfe0b03a71ce3665533881b14d747278247e1b5ed7c40ff7699c144e0fc4e76d99b8a0da05a0ebdaa39126974779d35db61fbf692a10f67e0799dd9a9d942ce116ebd7aa746ac94582ee13f5a41b1eeac251aeb79a67a2497424d7039b302f84f6a84d302d5a13e052d2e462d40b2fc90bf0c652153ecb231e23eb8892ba83544955f2cb441a3330d34a3526b26fdd6758825df2393bf845773abda4e3aa361072e53e1092923abb70d54e3058fd1d4e1a47669da590235df797a24efb0cec602bf0909e4b07f7f89730cbeced6c77b863d98aef2fb6396f95a421d30cb8279aea4d5cf77d4cb77d704106ddca6b1792d48cb390133ba9831ad6eb4a49d8632b6919a248ce2d900a32a954de99868064d3808cb5e125cb0ef7a64730ba5d462e6918558078a7e9ee57e824c1578afd957516861c0e9e7cf5c1d5552d2c115a8706536abd167687f6e17ce6d04b124e7cf0481f6f96db13622d368451e18cf43e812288b34a4bc1c0b1cbd2648ef9d4ca56ef56e114a60d453ad717880411980e9d42208bf1f2086cabb3ee039e010b0c606691f92ad0468da8ae93ce269738102aa8096494b6c81b2966ed2f4973e3a52e85cc12cfc3c0fe72588e901c4067a7119da19a86f03df78286d96709cc0ee6fb89c3e4d201e9069a40309722719d7e969ee9fa9ae32540e31a5ff416bd9f53a71681f1e36e5b7bf0ca629984d8158050c3129cabe807e62f8f529cf38221b5476421d445984e4e2bbc7439ea926b710c2fdef20c4526265c0d9ff3538a710d7998eea377708055a05cb188f947e8c0a9b3f4bef1c89b887872ddd582dd04537139ec252b5400003a1505c44c79652e6db072913ddd3076aaaef7d1c663f518ac9c8160775a432b5cc619d23976676e7307b95c920080b0d6517e6ef1d76f4e2e4cbb4a9cf8700006795e8b97cae221f848011653f415c96bcc9447d93571fa61d96fa3cc46f03c40007a785f6908da4d6bb5e96cd3b413c166cb62ab4c196397e7ffb6d942234c1b7e0f7c218d20483cee55180f1542bc50df66f2f6ffe8e5f0f481132693289c8ba0cf43ae5cce0248d52724942e19dc514efabb86a2263fc7b750b83ccf460f8dc1de5d99eff25db5d7f26cdc3d90e57ee79951a6524adf4a871efeb845a4cbca7de09cab8b255b4ac6906bf02efe00a6a73a8bf400eacd4d6d5417eaab4bb65f63bd17ade5f87d7d2372aa42cb6e32b98ef39f4adcee38befa7663b708ec382cf1dfa23f1c926e31021cfa1851489b038187715d270bdc850913c7eb0ef642862b8eaa805c6e75919909c1c114ef517ced59a99de647e26a17a7a7f17756430ff02e85c4cd63f31cfa8cb9ff9e07a2081264f97234235fc9944cda9f6a28eefae8fecf74434aa6b5b863e1b8d1becf0ff971ad8d2c9980beded78fe84592eb5ae49d8d9a2f00139e0a5925d9febe520368c008c781f1ec9814f7f6f8551c9c24efdf06fbee4937dd7951e7b86ac6c8865738d829a8d6ede779ccd47ec5443b25bf8ecbd333c0e16e3481a9e1dd8697e62a62074a4aeecc61dcb883ca4b9afecb0940cf5409913b806ff9f00ff2816b35b1f0b0a9dfab3fd1aef7b842910989ff2dc8de31b64dfa688dfc72b8ed2f3835cce5333ca01a0bf71fa5847a98b6e8f7c50a70b945e7a59079b8158086877ec56401017794bfefbf8dbe2525c125297682a196230304a5a2eca8e58531fe00e1f7c1f4e9c9e6109fae6b040432b9647811f4ae6fd992a65772e0dedb202b0f407957f0a6e39178f37102f0ea28e1b5486e7519687f5e81c8cff53b740e1f0eb7ef2c66c30c2971ed0dbe256cca3afe528dd11f61c06c4f484e0e54daac78ee02e0428a430551e11fcd202b29eba6d23685d35a6549f113cc3c91dbe9b171950a9ca285bbcc29c1d5ef57b83d0a7a1238a56e1054185d27a199014ca1e427fc3dc5c4c7617a4968f2d12826cf45f20f3d141f9aa0ac2d6117d40bd3f5d3767871988f6f307c858881777ca4b86db8e9a6266990ce51fb64d2878b95b378996d9022510e8194033502e481a2b0dc4ce6d2728baef760122d03223800e08403eeb86a11fc63113bb39019406fee716a2af2c199f1017c281712bca883554cddccf5ff9341c57bb617af7b4adbddd172b13acf13d84d15693301fd32c415c97a6ea2920812ffa051b8997077f6b2da411f0ed664f134270f467c69b7bdb3747c3310c7874343952025e385289dcef38b63d6f1bfc6cd9dbc17a973bed90ce8aab6dbb8335086fecaaff2a3bc7a218c9cdc89a81a4cb4bbdfb7dc3f0521a6eb5c8d7b08ae259245f4e54c999009a1ce805cdc1cdcb0b5bab216d244c8e081860e786665ec3933778a04eae4a87a993a1eac3800546293016de3bd03215e824ef59f14182da3dbad1e6d419b0b55e"}], 0x1040, 0x1}, 0x21) sendmmsg$alg(r1, &(0x7f0000007e40)=[{0x0, 0x0, &(0x7f0000000900)}], 0x1, 0x0) accept(r0, &(0x7f0000000040)=@pppol2tpv3in6, &(0x7f00000000c0)=0x80) 2018/04/11 12:45:30 executing program 0: r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$alg(0x26, 0x5, 0x0) r2 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000040)='/dev/rtc\x00', 0x1, 0x0) getsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER(r1, 0x84, 0x7b, &(0x7f0000000080)={0x0, 0x2}, &(0x7f00000000c0)=0x8) setsockopt$inet_sctp_SCTP_RECONFIG_SUPPORTED(r2, 0x84, 0x75, &(0x7f0000000100)={r3, 0x2}, 0x8) bind$alg(r1, &(0x7f0000000200)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc-cast5-avx\x00'}, 0x58) r4 = accept$alg(r1, 0x0, 0x0) r5 = dup3(r0, r4, 0x0) ioctl$KVM_GET_MSR_INDEX_LIST(r5, 0xc004ae02, &(0x7f0000000140)={0x3, [0x0, 0x0, 0x0]}) 2018/04/11 12:45:30 executing program 1: r0 = socket(0x1e, 0x1, 0x0) setsockopt$packet_tx_ring(r0, 0x10f, 0x87, &(0x7f0000b89fe4)=@req={0x772}, 0x10) sendmsg(r0, &(0x7f0000030000)={&(0x7f00004f5000)=@generic={0x10000000001e, "00140009000000d0010100000226cc573c080000003724c71e14dd6a739effea1b48006be61ffe0000e103000000f8000004003f010039d8f986ff01000300000004af50d50700000000000000e3ad316a1983000000001d00e0dfcb24281e27800000100076c3979ac40000bd15020078a1dfd300881a8365b1b16d7436"}, 0x80, &(0x7f0000447ff0), 0x0, &(0x7f00006e9c68)}, 0x0) [ 628.683885] RAX: ffffffffffffffda RBX: 0000000000000015 RCX: 0000000000455259 [ 628.691250] RDX: 00000000004b9bc5 RSI: 0000000020000040 RDI: 0000000020000000 [ 628.698627] RBP: 0000000020000000 R08: 00007f95e4cadb20 R09: 0000000000000000 [ 628.705920] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 628.713207] R13: 0000000000000000 R14: 0000000000000000 R15: 0000000000000000 2018/04/11 12:45:30 executing program 2: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x1e, 0x1, 0x0) setsockopt$packet_tx_ring(r0, 0x10f, 0x87, &(0x7f0000b89fe4)=@req={0x772}, 0x10) sendmsg(r0, &(0x7f0000030000)={&(0x7f00004f5000)=@generic={0x10000000001e, "0100000900000000000000000226cc573c080000003724c71e14dd6a739effea1b48006be61ffe0000e103000000f8000004003f010039d8f986ff01000300000004af50d50700000002000000e3ad316a1983000000001d00e0dfcb24281e27800000100076c3979ac40000bd15020078a1dfd300881a8365b1b16d7436"}, 0x80, &(0x7f0000447ff0), 0x0, &(0x7f00006e9c68)}, 0x0) 2018/04/11 12:45:30 executing program 6: r0 = socket$inet6(0xa, 0x80003, 0xff) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @ipv4={[], [0xff, 0xff], @dev={0xac, 0x14, 0x14, 0x1b}}}, 0x1c) sendmsg(r0, &(0x7f000001b000)={0x0, 0xfffffff5, &(0x7f0000019fa0), 0xb0, &(0x7f000001ef08)}, 0x0) 2018/04/11 12:45:30 executing program 7: syz_emit_ethernet(0x66, &(0x7f0000000000)={@random="cd3997030f00", @empty=[0x0, 0x0, 0x0, 0x0, 0xffffdd86], [], {@ipv6={0x86dd, {0x0, 0x6, "b40900", 0x30, 0x67, 0x0, @ipv4={[], [0xff, 0xff], @multicast2=0xe0000002}, @mcast2={0xff, 0x2, [], 0x1}, {[], @icmpv6=@time_exceed={0x21, 0x0, 0x0, 0x0, [], {0x0, 0x6, "b680fa", 0x0, 0x0, 0x0, @ipv4={[], [0xff, 0xff], @broadcast=0xffffffff}, @ipv4={[], [0xff, 0xff], @remote={0xac, 0x14, 0xffffffffffffffff, 0xbb}}}}}}}}}, 0x0) 2018/04/11 12:45:30 executing program 4 (fault-call:1 fault-nth:12): perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_fuseblk_mount(&(0x7f0000000040)='./file0\x00', &(0x7f0000000000)='./file0\x00', 0x4000, 0x0, 0x0, 0x0, 0x0, 0x0) [ 628.911164] FAULT_INJECTION: forcing a failure. [ 628.911164] name failslab, interval 1, probability 0, space 0, times 0 [ 628.922542] CPU: 0 PID: 3232 Comm: syz-executor4 Not tainted 4.16.0+ #17 [ 628.929396] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 628.938760] Call Trace: [ 628.941373] dump_stack+0x1b9/0x294 [ 628.945036] ? dump_stack_print_info.cold.2+0x52/0x52 [ 628.950271] should_fail.cold.4+0xa/0x1a [ 628.954364] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 628.959517] ? rcu_bh_force_quiescent_state+0x20/0x20 [ 628.964734] ? rcu_bh_force_quiescent_state+0x20/0x20 [ 628.969954] ? find_held_lock+0x36/0x1c0 [ 628.974082] ? check_same_owner+0x320/0x320 [ 628.978442] ? rcu_note_context_switch+0x710/0x710 [ 628.983391] ? save_stack+0xa9/0xd0 [ 628.987045] __should_failslab+0x124/0x180 [ 628.991306] should_failslab+0x9/0x14 [ 628.995124] kmem_cache_alloc+0x2af/0x760 [ 628.999288] ? find_held_lock+0x36/0x1c0 [ 629.003376] getname_flags+0xd0/0x5a0 [ 629.007174] user_path_at_empty+0x2d/0x50 [ 629.011324] do_mount+0x172/0x3070 [ 629.014872] ? do_raw_spin_unlock+0x9e/0x2e0 [ 629.019275] ? copy_mount_string+0x40/0x40 [ 629.023518] ? trace_hardirqs_on_caller+0x421/0x5c0 [ 629.028536] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 629.033293] ? retint_kernel+0x10/0x10 [ 629.037182] ? copy_mount_options+0x1f0/0x380 [ 629.041665] ? copy_mount_options+0x202/0x380 [ 629.046154] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 629.051680] ? copy_mount_options+0x285/0x380 [ 629.056166] ksys_mount+0x12d/0x140 [ 629.059797] SyS_mount+0x35/0x50 [ 629.063154] ? ksys_mount+0x140/0x140 [ 629.066944] do_syscall_64+0x29e/0x9d0 [ 629.070817] ? vmalloc_sync_all+0x30/0x30 [ 629.074950] ? _raw_spin_unlock_irq+0x27/0x70 [ 629.079435] ? finish_task_switch+0x1ca/0x820 [ 629.083935] ? syscall_return_slowpath+0x5c0/0x5c0 [ 629.088875] ? syscall_return_slowpath+0x30f/0x5c0 [ 629.093798] ? entry_SYSCALL_64_after_hwframe+0x52/0xb7 [ 629.099159] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 629.103997] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 629.109186] RIP: 0033:0x455259 [ 629.112362] RSP: 002b:00007f95e4cadb08 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 629.120061] RAX: ffffffffffffffda RBX: 0000000000000015 RCX: 0000000000455259 [ 629.127318] RDX: 00000000004b9bc5 RSI: 0000000020000040 RDI: 0000000020000000 [ 629.134583] RBP: 0000000020000000 R08: 00007f95e4cadb20 R09: 0000000000000000 [ 629.141854] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 629.149112] R13: 0000000000000000 R14: 0000000000000000 R15: 0000000000000000 2018/04/11 12:45:31 executing program 0: r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000200)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc-cast5-avx\x00'}, 0x58) r2 = accept$alg(r1, 0x0, 0x0) r3 = dup3(r0, r2, 0x0) tee(r1, r3, 0x8, 0x0) 2018/04/11 12:45:31 executing program 5: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000200)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc-cast5-avx\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) getsockopt$bt_l2cap_L2CAP_LM(r0, 0x6, 0x3, &(0x7f0000000100), &(0x7f0000000140)=0x4) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00003bcfd0)="d3ab27191a", 0x5) sendmmsg$alg(r1, &(0x7f0000007e40)=[{0x0, 0x0, &(0x7f0000000900)}], 0x1, 0x0) r2 = accept4$inet(0xffffffffffffffff, &(0x7f0000002940)={0x0, 0x0, @broadcast}, &(0x7f0000002980)=0x10, 0x80800) setsockopt$inet_sctp_SCTP_ADD_STREAMS(r2, 0x84, 0x79, &(0x7f00000029c0)=0x9, 0x4) accept(r0, &(0x7f0000000040)=@pppol2tpv3in6, &(0x7f00000000c0)=0x80) 2018/04/11 12:45:31 executing program 1: r0 = socket(0x1e, 0x1, 0x0) setsockopt$packet_tx_ring(r0, 0x10f, 0x87, &(0x7f0000b89fe4)=@req={0x772}, 0x10) sendmsg(r0, &(0x7f0000030000)={&(0x7f00004f5000)=@generic={0x10000000001e, "00140009000000000101d0000226cc573c080000003724c71e14dd6a739effea1b48006be61ffe0000e103000000f8000004003f010039d8f986ff01000300000004af50d50700000000000000e3ad316a1983000000001d00e0dfcb24281e27800000100076c3979ac40000bd15020078a1dfd300881a8365b1b16d7436"}, 0x80, &(0x7f0000447ff0), 0x0, &(0x7f00006e9c68)}, 0x0) 2018/04/11 12:45:31 executing program 6: r0 = socket$inet6(0xa, 0x80003, 0xff) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @ipv4={[], [0xff, 0xff], @dev={0xac, 0x14, 0x14, 0x1b}}}, 0x1c) sendmsg(r0, &(0x7f000001b000)={0x0, 0xfffffff5, &(0x7f0000019fa0), 0xaf, &(0x7f000001ef08)}, 0x0) 2018/04/11 12:45:31 executing program 2: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x1e, 0x1, 0x0) setsockopt$packet_tx_ring(r0, 0x10f, 0x87, &(0x7f0000b89fe4)=@req={0x772}, 0x10) sendmsg(r0, &(0x7f0000030000)={&(0x7f00004f5000)=@generic={0x10000000001e, "0100000900000000000000000226cc573c080000003724c71e14dd6a739effea1b48006be61ffe0000e103000000f8000004003f010039d8f986ff01000300000004af50d50700000400000000e3ad316a1983000000001d00e0dfcb24281e27800000100076c3979ac40000bd15020078a1dfd300881a8365b1b16d7436"}, 0x80, &(0x7f0000447ff0), 0x0, &(0x7f00006e9c68)}, 0x0) 2018/04/11 12:45:31 executing program 7: syz_emit_ethernet(0x66, &(0x7f0000000000)={@random="cd3997030f00", @empty=[0x0, 0x0, 0x0, 0x0, 0xd], [], {@ipv6={0x86dd, {0x0, 0x6, "b40900", 0x30, 0x67, 0x0, @ipv4={[], [0xff, 0xff], @multicast2=0xe0000002}, @mcast2={0xff, 0x2, [], 0x1}, {[], @icmpv6=@time_exceed={0x21, 0x0, 0x0, 0x0, [], {0x0, 0x6, "b680fa", 0x0, 0x0, 0x0, @ipv4={[], [0xff, 0xff], @broadcast=0xffffffff}, @ipv4={[], [0xff, 0xff], @remote={0xac, 0x14, 0xffffffffffffffff, 0xbb}}}}}}}}}, 0x0) 2018/04/11 12:45:31 executing program 3: semop(0x0, &(0x7f000001a000)=[{0x0, 0xffffffffffff0001}, {0x0, 0x3f00}], 0x2) timer_create(0x0, &(0x7f0000cd0000)={0x0, 0x12}, &(0x7f0000044000)) timer_settime(0x0, 0x0, &(0x7f00004b1fe0)={{0x0, 0x1c9c380}, {0x0, 0x9}}, &(0x7f0000040000)) r0 = getpgid(0x0) tkill(r0, 0x1000000000016) 2018/04/11 12:45:31 executing program 4 (fault-call:1 fault-nth:13): perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_fuseblk_mount(&(0x7f0000000040)='./file0\x00', &(0x7f0000000000)='./file0\x00', 0x4000, 0x0, 0x0, 0x0, 0x0, 0x0) 2018/04/11 12:45:31 executing program 7: syz_emit_ethernet(0x66, &(0x7f0000000000)={@random="cd3997030f00", @empty=[0x0, 0x0, 0x0, 0x0, 0x100000000000000], [], {@ipv6={0x86dd, {0x0, 0x6, "b40900", 0x30, 0x67, 0x0, @ipv4={[], [0xff, 0xff], @multicast2=0xe0000002}, @mcast2={0xff, 0x2, [], 0x1}, {[], @icmpv6=@time_exceed={0x21, 0x0, 0x0, 0x0, [], {0x0, 0x6, "b680fa", 0x0, 0x0, 0x0, @ipv4={[], [0xff, 0xff], @broadcast=0xffffffff}, @ipv4={[], [0xff, 0xff], @remote={0xac, 0x14, 0xffffffffffffffff, 0xbb}}}}}}}}}, 0x0) [ 629.448395] FAULT_INJECTION: forcing a failure. [ 629.448395] name failslab, interval 1, probability 0, space 0, times 0 [ 629.460429] CPU: 0 PID: 3251 Comm: syz-executor4 Not tainted 4.16.0+ #17 [ 629.467301] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 629.476663] Call Trace: [ 629.479273] dump_stack+0x1b9/0x294 [ 629.482936] ? dump_stack_print_info.cold.2+0x52/0x52 [ 629.488168] should_fail.cold.4+0xa/0x1a [ 629.492253] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 629.497379] ? lock_acquire+0x1dc/0x520 [ 629.501372] ? graph_lock+0x170/0x170 [ 629.505202] ? find_held_lock+0x36/0x1c0 [ 629.509897] ? __lock_is_held+0xb5/0x140 [ 629.513999] ? check_same_owner+0x320/0x320 [ 629.518349] ? rcu_note_context_switch+0x710/0x710 [ 629.523313] __should_failslab+0x124/0x180 [ 629.527569] should_failslab+0x9/0x14 [ 629.531385] kmem_cache_alloc_trace+0x2cb/0x780 [ 629.536074] ? kasan_check_write+0x14/0x20 [ 629.540326] ? do_raw_spin_lock+0xc1/0x200 [ 629.544590] sget_userns+0x1c7/0xf20 [ 629.548351] ? kill_litter_super+0x90/0x90 [ 629.552610] ? ns_test_super+0x50/0x50 [ 629.556525] ? destroy_unused_super.part.9+0x100/0x100 [ 629.561820] ? do_raw_spin_trylock+0x1b0/0x1b0 [ 629.566435] ? kasan_check_write+0x14/0x20 [ 629.570781] ? do_raw_spin_lock+0xc1/0x200 [ 629.575048] ? blkdev_get+0xc0/0xb30 [ 629.578790] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 629.584345] ? cap_capable+0x1f9/0x260 [ 629.588268] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 629.593824] ? security_capable+0x99/0xc0 2018/04/11 12:45:31 executing program 7: syz_emit_ethernet(0x66, &(0x7f0000000000)={@random="cd3997030f00", @empty=[0x0, 0x0, 0x0, 0x0, 0x6700000000000000], [], {@ipv6={0x86dd, {0x0, 0x6, "b40900", 0x30, 0x67, 0x0, @ipv4={[], [0xff, 0xff], @multicast2=0xe0000002}, @mcast2={0xff, 0x2, [], 0x1}, {[], @icmpv6=@time_exceed={0x21, 0x0, 0x0, 0x0, [], {0x0, 0x6, "b680fa", 0x0, 0x0, 0x0, @ipv4={[], [0xff, 0xff], @broadcast=0xffffffff}, @ipv4={[], [0xff, 0xff], @remote={0xac, 0x14, 0xffffffffffffffff, 0xbb}}}}}}}}}, 0x0) 2018/04/11 12:45:31 executing program 6: r0 = socket$inet6(0xa, 0x80003, 0xff) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @ipv4={[], [0xff, 0xff], @dev={0xac, 0x14, 0x14, 0x1b}}}, 0x1c) sendmsg(r0, &(0x7f000001b000)={0x0, 0xfffffff5, &(0x7f0000019fa0), 0x1c, &(0x7f000001ef08)}, 0x0) [ 629.598003] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 629.603554] ? ns_capable_common+0x13f/0x170 [ 629.607979] ? kill_litter_super+0x90/0x90 [ 629.612235] sget+0x10b/0x150 [ 629.615352] ? ns_test_super+0x50/0x50 [ 629.619263] mount_bdev+0x111/0x3e0 [ 629.622908] ? fuse_get_root_inode+0x190/0x190 [ 629.627517] fuse_mount_blk+0x34/0x40 [ 629.631336] mount_fs+0xae/0x328 [ 629.634735] vfs_kern_mount.part.34+0xd4/0x4d0 [ 629.639340] ? may_umount+0xb0/0xb0 [ 629.642979] ? _raw_read_unlock+0x22/0x30 [ 629.647143] ? __get_fs_type+0x97/0xc0 [ 629.651054] do_mount+0x564/0x3070 [ 629.654621] ? copy_mount_string+0x40/0x40 [ 629.658871] ? trace_hardirqs_on_caller+0x421/0x5c0 [ 629.663904] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 629.668688] ? retint_kernel+0x10/0x10 [ 629.672604] ? copy_mount_options+0x1a1/0x380 [ 629.677112] ? copy_mount_options+0x1d0/0x380 [ 629.681627] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 629.687181] ? copy_mount_options+0x285/0x380 [ 629.691698] ksys_mount+0x12d/0x140 [ 629.695349] SyS_mount+0x35/0x50 [ 629.698724] ? ksys_mount+0x140/0x140 [ 629.702546] do_syscall_64+0x29e/0x9d0 [ 629.706446] ? vmalloc_sync_all+0x30/0x30 [ 629.710623] ? _raw_spin_unlock_irq+0x27/0x70 [ 629.715133] ? finish_task_switch+0x1ca/0x820 [ 629.719651] ? syscall_return_slowpath+0x5c0/0x5c0 [ 629.724589] ? syscall_return_slowpath+0x30f/0x5c0 [ 629.729514] ? entry_SYSCALL_64_after_hwframe+0x52/0xb7 [ 629.734870] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 629.739707] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 629.744916] RIP: 0033:0x455259 2018/04/11 12:45:31 executing program 6: r0 = socket$inet6(0xa, 0x80003, 0xff) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @ipv4={[], [0xff, 0xff], @dev={0xac, 0x14, 0x14, 0x1b}}}, 0x1c) sendmsg(r0, &(0x7f000001b000)={0x0, 0xfffffff5, &(0x7f0000019fa0), 0x1d2, &(0x7f000001ef08)}, 0x0) 2018/04/11 12:45:31 executing program 1: r0 = socket(0x1e, 0x1, 0x0) setsockopt$packet_tx_ring(r0, 0x10f, 0x87, &(0x7f0000b89fe4)=@req={0x772}, 0x10) sendmsg(r0, &(0x7f0000030000)={&(0x7f00004f5000)=@generic={0x10000000001e, "0014000900000000000002000226cc573c080000003724c71e14dd6a739effea1b48006be61ffe0000e103000000f8000004003f010039d8f986ff01000300000004af50d50700000000000000e3ad316a1983000000001d00e0dfcb24281e27800000100076c3979ac40000bd15020078a1dfd300881a8365b1b16d7436"}, 0x80, &(0x7f0000447ff0), 0x0, &(0x7f00006e9c68)}, 0x0) 2018/04/11 12:45:31 executing program 2: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x1e, 0x1, 0x0) setsockopt$packet_tx_ring(r0, 0x10f, 0x87, &(0x7f0000b89fe4)=@req={0x772}, 0x10) sendmsg(r0, &(0x7f0000030000)={&(0x7f00004f5000)=@generic={0x10000000001e, "0100000900000000000000000226cc573c080000003724c71e14dd6a739effea1b48006be61ffe0000e103000000f8000004003f010039d8f986ff01000300000004af50d507000101d0000000e3ad316a1983000000001d00e0dfcb24281e27800000100076c3979ac40000bd15020078a1dfd300881a8365b1b16d7436"}, 0x80, &(0x7f0000447ff0), 0x0, &(0x7f00006e9c68)}, 0x0) 2018/04/11 12:45:31 executing program 0: r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vga_arbiter\x00', 0x129800, 0x0) mq_getsetattr(r1, &(0x7f0000000080)={0x670, 0x2, 0x20a, 0x7, 0x7fffffff, 0x80000000, 0x100000001, 0x3ff}, &(0x7f00000000c0)) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000200)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc-cast5-avx\x00'}, 0x58) r3 = accept$alg(r2, 0x0, 0x0) r4 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r4, &(0x7f0000b3dfc8)={&(0x7f0000000180)={0x10}, 0xc, &(0x7f00000015c0)={&(0x7f0000001600)={0x1c, 0x22, 0x109, 0x0, 0x0, {0x4}, [@typed={0x8, 0x11, @u32=0x7b2c8dfc}]}, 0x1c}, 0x1}, 0x0) dup3(r0, r3, 0x0) 2018/04/11 12:45:31 executing program 7: syz_emit_ethernet(0x66, &(0x7f0000000000)={@random="cd3997030f00", @empty=[0x0, 0x0, 0x0, 0x0, 0x600000000000000], [], {@ipv6={0x86dd, {0x0, 0x6, "b40900", 0x30, 0x67, 0x0, @ipv4={[], [0xff, 0xff], @multicast2=0xe0000002}, @mcast2={0xff, 0x2, [], 0x1}, {[], @icmpv6=@time_exceed={0x21, 0x0, 0x0, 0x0, [], {0x0, 0x6, "b680fa", 0x0, 0x0, 0x0, @ipv4={[], [0xff, 0xff], @broadcast=0xffffffff}, @ipv4={[], [0xff, 0xff], @remote={0xac, 0x14, 0xffffffffffffffff, 0xbb}}}}}}}}}, 0x0) 2018/04/11 12:45:31 executing program 5: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000200)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc-cast5-avx\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00003bcfd0)="d3ab27191a", 0x5) sendmmsg$alg(r1, &(0x7f0000007e40)=[{0x0, 0x0, &(0x7f0000000900)}], 0x1, 0x0) ioctl$sock_inet_SIOCSIFBRDADDR(r1, 0x891a, &(0x7f0000000100)={'ip_vti0\x00', {0x2, 0x4e21, @multicast2=0xe0000002}}) accept(r0, &(0x7f0000000040)=@pppol2tpv3in6, &(0x7f00000000c0)=0x80) 2018/04/11 12:45:31 executing program 4 (fault-call:1 fault-nth:14): perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_fuseblk_mount(&(0x7f0000000040)='./file0\x00', &(0x7f0000000000)='./file0\x00', 0x4000, 0x0, 0x0, 0x0, 0x0, 0x0) 2018/04/11 12:45:31 executing program 3: semop(0x0, &(0x7f000001a000)=[{0x0, 0xffffffffffff0001}, {0x0, 0x5}], 0x2) timer_create(0x0, &(0x7f0000cd0000)={0x0, 0x12}, &(0x7f0000044000)) timer_settime(0x0, 0x0, &(0x7f00004b1fe0)={{0x0, 0x1c9c380}, {0x0, 0x9}}, &(0x7f0000040000)) r0 = getpgid(0x0) tkill(r0, 0x1000000000016) [ 629.748093] RSP: 002b:00007f95e4cadb08 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 629.755801] RAX: ffffffffffffffda RBX: 0000000000000015 RCX: 0000000000455259 [ 629.763080] RDX: 00000000004b9bc5 RSI: 0000000020000040 RDI: 0000000020000000 [ 629.770358] RBP: 0000000020000000 R08: 00007f95e4cadb20 R09: 0000000000000000 [ 629.777624] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 629.784881] R13: 0000000000000000 R14: 0000000000000000 R15: 0000000000000000 [ 629.881891] FAULT_INJECTION: forcing a failure. [ 629.881891] name failslab, interval 1, probability 0, space 0, times 0 [ 629.893273] CPU: 0 PID: 3293 Comm: syz-executor4 Not tainted 4.16.0+ #17 [ 629.900122] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 629.909479] Call Trace: [ 629.912096] dump_stack+0x1b9/0x294 [ 629.915756] ? dump_stack_print_info.cold.2+0x52/0x52 [ 629.920993] should_fail.cold.4+0xa/0x1a [ 629.925090] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 629.930237] ? is_bpf_text_address+0xd7/0x170 [ 629.935022] ? find_held_lock+0x36/0x1c0 [ 629.939147] ? check_same_owner+0x320/0x320 [ 629.943516] ? kmem_cache_free+0x86/0x2d0 [ 629.947679] ? putname+0xf2/0x130 [ 629.951155] ? rcu_note_context_switch+0x710/0x710 [ 629.956095] ? ksys_mount+0x12d/0x140 [ 629.959917] ? SyS_mount+0x35/0x50 [ 629.963477] ? do_syscall_64+0x29e/0x9d0 [ 629.967583] __should_failslab+0x124/0x180 [ 629.971839] should_failslab+0x9/0x14 [ 629.975652] kmem_cache_alloc+0x2af/0x760 [ 629.979815] ? kasan_check_write+0x14/0x20 [ 629.984069] ? do_raw_spin_lock+0xc1/0x200 [ 629.988340] alloc_vfsmnt+0xe0/0x9d0 [ 629.992074] ? mnt_free_id.isra.27+0x60/0x60 [ 629.996507] ? kasan_check_read+0x11/0x20 [ 630.000675] ? graph_lock+0x170/0x170 [ 630.004493] ? trace_hardirqs_off+0xd/0x10 [ 630.008746] ? putname+0xf2/0x130 [ 630.012226] ? putname+0xf2/0x130 [ 630.015701] ? find_held_lock+0x36/0x1c0 [ 630.019799] ? lock_downgrade+0x8e0/0x8e0 [ 630.023970] ? module_unload_free+0x5b0/0x5b0 [ 630.028480] ? lock_release+0xa10/0xa10 [ 630.032482] ? mpi_free.cold.1+0x19/0x19 [ 630.036555] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 630.042115] vfs_kern_mount.part.34+0x88/0x4d0 [ 630.046722] ? may_umount+0xb0/0xb0 [ 630.050359] ? _raw_read_unlock+0x22/0x30 [ 630.054516] ? __get_fs_type+0x97/0xc0 [ 630.058425] do_mount+0x564/0x3070 [ 630.061988] ? do_raw_spin_unlock+0x9e/0x2e0 [ 630.066419] ? copy_mount_string+0x40/0x40 [ 630.070674] ? rcu_pm_notify+0xc0/0xc0 [ 630.074588] ? copy_mount_options+0x5f/0x380 [ 630.079015] ? rcu_read_lock_sched_held+0x108/0x120 [ 630.084044] ? kmem_cache_alloc_trace+0x616/0x780 [ 630.088910] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 630.094474] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 630.100027] ? copy_mount_options+0x285/0x380 [ 630.104548] ksys_mount+0x12d/0x140 [ 630.108193] SyS_mount+0x35/0x50 [ 630.111569] ? ksys_mount+0x140/0x140 [ 630.115402] do_syscall_64+0x29e/0x9d0 [ 630.119321] ? syscall_slow_exit_work+0x4f0/0x4f0 [ 630.124988] ? syscall_return_slowpath+0x5c0/0x5c0 [ 630.129944] ? syscall_return_slowpath+0x30f/0x5c0 [ 630.134895] ? entry_SYSCALL_64_after_hwframe+0x52/0xb7 [ 630.140290] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 630.145162] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 630.150359] RIP: 0033:0x455259 [ 630.153554] RSP: 002b:00007f95e4cadb08 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 630.161298] RAX: ffffffffffffffda RBX: 0000000000000015 RCX: 0000000000455259 [ 630.168578] RDX: 00000000004b9bc5 RSI: 0000000020000040 RDI: 0000000020000000 [ 630.175854] RBP: 0000000020000000 R08: 00007f95e4cadb20 R09: 0000000000000000 2018/04/11 12:45:31 executing program 1: r0 = socket(0x1e, 0x1, 0x0) setsockopt$packet_tx_ring(r0, 0x10f, 0x87, &(0x7f0000b89fe4)=@req={0x772}, 0x10) sendmsg(r0, &(0x7f0000030000)={&(0x7f00004f5000)=@generic={0x10000000001e, "0014000900000004000000000226cc573c080000003724c71e14dd6a739effea1b48006be61ffe0000e103000000f8000004003f010039d8f986ff01000300000004af50d50700000000000000e3ad316a1983000000001d00e0dfcb24281e27800000100076c3979ac40000bd15020078a1dfd300881a8365b1b16d7436"}, 0x80, &(0x7f0000447ff0), 0x0, &(0x7f00006e9c68)}, 0x0) 2018/04/11 12:45:31 executing program 2: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x1e, 0x1, 0x0) setsockopt$packet_tx_ring(r0, 0x10f, 0x87, &(0x7f0000b89fe4)=@req={0x772}, 0x10) sendmsg(r0, &(0x7f0000030000)={&(0x7f00004f5000)=@generic={0x10000000001e, "0100000900000000000000000226cc573c080000003724c71e14dd6a739effea1b48006be61ffe0000e103000000f8000004003f010039d8f986ff01000300000004af50d50704000000000000e3ad316a1983000000001d00e0dfcb24281e27800000100076c3979ac40000bd15020078a1dfd300881a8365b1b16d7436"}, 0x80, &(0x7f0000447ff0), 0x0, &(0x7f00006e9c68)}, 0x0) 2018/04/11 12:45:31 executing program 1: r0 = socket(0x1e, 0x1, 0x0) setsockopt$packet_tx_ring(r0, 0x10f, 0x87, &(0x7f0000b89fe4)=@req={0x772}, 0x10) sendmsg(r0, &(0x7f0000030000)={&(0x7f00004f5000)=@generic={0x10000000001e, "0014000900000000000003000226cc573c080000003724c71e14dd6a739effea1b48006be61ffe0000e103000000f8000004003f010039d8f986ff01000300000004af50d50700000000000000e3ad316a1983000000001d00e0dfcb24281e27800000100076c3979ac40000bd15020078a1dfd300881a8365b1b16d7436"}, 0x80, &(0x7f0000447ff0), 0x0, &(0x7f00006e9c68)}, 0x0) 2018/04/11 12:45:31 executing program 2: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x1e, 0x1, 0x0) setsockopt$packet_tx_ring(r0, 0x10f, 0x87, &(0x7f0000b89fe4)=@req={0x772}, 0x10) sendmsg(r0, &(0x7f0000030000)={&(0x7f00004f5000)=@generic={0x10000000001e, "0100000900000000000000000226cc573c080000003724c71e14dd6a739effea1b48006be61ffe0000e103000000f8000004003f010039d8f986ff01000300000004af50d50702000000000000e3ad316a1983000000001d00e0dfcb24281e27800000100076c3979ac40000bd15020078a1dfd300881a8365b1b16d7436"}, 0x80, &(0x7f0000447ff0), 0x0, &(0x7f00006e9c68)}, 0x0) 2018/04/11 12:45:31 executing program 1: r0 = socket(0x1e, 0x1, 0x0) setsockopt$packet_tx_ring(r0, 0x10f, 0x87, &(0x7f0000b89fe4)=@req={0x772}, 0x10) sendmsg(r0, &(0x7f0000030000)={&(0x7f00004f5000)=@generic={0x10000000001e, "0014000900000000000400000226cc573c080000003724c71e14dd6a739effea1b48006be61ffe0000e103000000f8000004003f010039d8f986ff01000300000004af50d50700000000000000e3ad316a1983000000001d00e0dfcb24281e27800000100076c3979ac40000bd15020078a1dfd300881a8365b1b16d7436"}, 0x80, &(0x7f0000447ff0), 0x0, &(0x7f00006e9c68)}, 0x0) 2018/04/11 12:45:31 executing program 2: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x1e, 0x1, 0x0) setsockopt$packet_tx_ring(r0, 0x10f, 0x87, &(0x7f0000b89fe4)=@req={0x772}, 0x10) sendmsg(r0, &(0x7f0000030000)={&(0x7f00004f5000)=@generic={0x10000000001e, "0100000900000000000000000226cc573c080000003724c71e14dd6a739effea1b48006be61ffe0000e103000000f8000004003f010039d8f986ff01000300000004af50d50700d00101000000e3ad316a1983000000001d00e0dfcb24281e27800000100076c3979ac40000bd15020078a1dfd300881a8365b1b16d7436"}, 0x80, &(0x7f0000447ff0), 0x0, &(0x7f00006e9c68)}, 0x0) 2018/04/11 12:45:31 executing program 1: r0 = socket(0x1e, 0x1, 0x0) setsockopt$packet_tx_ring(r0, 0x10f, 0x87, &(0x7f0000b89fe4)=@req={0x772}, 0x10) sendmsg(r0, &(0x7f0000030000)={&(0x7f00004f5000)=@generic={0x10000000001e, "0014000900000000030000000226cc573c080000003724c71e14dd6a739effea1b48006be61ffe0000e103000000f8000004003f010039d8f986ff01000300000004af50d50700000000000000e3ad316a1983000000001d00e0dfcb24281e27800000100076c3979ac40000bd15020078a1dfd300881a8365b1b16d7436"}, 0x80, &(0x7f0000447ff0), 0x0, &(0x7f00006e9c68)}, 0x0) 2018/04/11 12:45:31 executing program 2: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x1e, 0x1, 0x0) setsockopt$packet_tx_ring(r0, 0x10f, 0x87, &(0x7f0000b89fe4)=@req={0x772}, 0x10) sendmsg(r0, &(0x7f0000030000)={&(0x7f00004f5000)=@generic={0x10000000001e, "0100000900000000000000000226cc573c080000003724c71e14dd6a739effea1b48006be61ffe0000e103000000f8000004003f010039d8f986ff01000300000004af50d50700000000020000e3ad316a1983000000001d00e0dfcb24281e27800000100076c3979ac40000bd15020078a1dfd300881a8365b1b16d7436"}, 0x80, &(0x7f0000447ff0), 0x0, &(0x7f00006e9c68)}, 0x0) [ 630.183135] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 630.190415] R13: 0000000000000000 R14: 0000000000000000 R15: 0000000000000000 2018/04/11 12:45:31 executing program 2: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x1e, 0x1, 0x0) setsockopt$packet_tx_ring(r0, 0x10f, 0x87, &(0x7f0000b89fe4)=@req={0x772}, 0x10) sendmsg(r0, &(0x7f0000030000)={&(0x7f00004f5000)=@generic={0x10000000001e, "0100000900000000000000000226cc573c080000003724c71e14dd6a739effea1b48006be61ffe0000e103000000f8000004003f010039d8f986ff01000300000004af50d50700000004000000e3ad316a1983000000001d00e0dfcb24281e27800000100076c3979ac40000bd15020078a1dfd300881a8365b1b16d7436"}, 0x80, &(0x7f0000447ff0), 0x0, &(0x7f00006e9c68)}, 0x0) 2018/04/11 12:45:31 executing program 7: syz_emit_ethernet(0x66, &(0x7f0000000000)={@random="cd3997030f00", @empty=[0x0, 0x0, 0x0, 0x0, 0xd000000], [], {@ipv6={0x86dd, {0x0, 0x6, "b40900", 0x30, 0x67, 0x0, @ipv4={[], [0xff, 0xff], @multicast2=0xe0000002}, @mcast2={0xff, 0x2, [], 0x1}, {[], @icmpv6=@time_exceed={0x21, 0x0, 0x0, 0x0, [], {0x0, 0x6, "b680fa", 0x0, 0x0, 0x0, @ipv4={[], [0xff, 0xff], @broadcast=0xffffffff}, @ipv4={[], [0xff, 0xff], @remote={0xac, 0x14, 0xffffffffffffffff, 0xbb}}}}}}}}}, 0x0) 2018/04/11 12:45:31 executing program 6: r0 = socket$inet6(0xa, 0x80003, 0xff) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @ipv4={[], [0xff, 0xff], @dev={0xac, 0x14, 0x14, 0x1b}}}, 0x1c) sendmsg(r0, &(0x7f000001b000)={0x0, 0xfffffff5, &(0x7f0000019fa0), 0x8d, &(0x7f000001ef08)}, 0x0) 2018/04/11 12:45:31 executing program 4 (fault-call:1 fault-nth:15): perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_fuseblk_mount(&(0x7f0000000040)='./file0\x00', &(0x7f0000000000)='./file0\x00', 0x4000, 0x0, 0x0, 0x0, 0x0, 0x0) 2018/04/11 12:45:31 executing program 0: r0 = syz_open_dev$admmidi(&(0x7f0000000880)='/dev/admmidi#\x00', 0x5, 0x200000) setsockopt$IP_VS_SO_SET_DEL(r0, 0x0, 0x484, &(0x7f00000008c0)={0x0, @dev={0xac, 0x14, 0x14, 0xe}, 0x4e20, 0x4, 'none\x00', 0x10, 0x3, 0x55}, 0x2c) r1 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000200)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc-cast5-avx\x00'}, 0x58) r3 = accept$alg(r2, 0x0, 0x0) umount2(&(0x7f0000000040)='./file0\x00', 0x5) r4 = add_key$keyring(&(0x7f0000000140)='keyring\x00', &(0x7f0000000180)={0x73, 0x79, 0x7a, 0x1}, 0x0, 0x0, 0xffffffffffffffff) request_key(&(0x7f0000000080)='rxrpc_s\x00', &(0x7f00000000c0)={0x73, 0x79, 0x7a, 0x3}, &(0x7f0000000100)='\x00', r4) socketpair$inet_icmp(0x2, 0x2, 0x1, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$IPT_SO_SET_REPLACE(r5, 0x0, 0x40, &(0x7f0000000300)=@nat={'nat\x00', 0x1b, 0x5, 0x4e8, 0x0, 0x110, 0xffffffff, 0x350, 0x220, 0x450, 0x450, 0xffffffff, 0x450, 0x450, 0x5, &(0x7f0000000280), {[{{@ip={@rand_addr=0x9, @remote={0xac, 0x14, 0x14, 0xbb}, 0xff, 0x0, 'vcan0\x00', 'vlan0\x00', {0xff}, {}, 0x5d, 0x3, 0x2c}, 0x0, 0xd8, 0x110, 0x0, {}, [@common=@set={0x40, 'set\x00', 0x0, {{0xeab, [0x8, 0x8f, 0xffffffffffffffe0, 0x400, 0x10001, 0x8], 0x0, 0xfffffffffffffff9, 0x800}}}]}, @MASQUERADE={0x38, 'MASQUERADE\x00', 0x0, {0x1, {0x2, @multicast1=0xe0000001, @empty, @port=0x4e20, @port=0x4e22}}}}, {{@uncond, 0x0, 0xd8, 0x110, 0x0, {}, [@common=@set={0x40, 'set\x00', 0x0, {{0x101, [0x9, 0x2ec6c828, 0x4, 0xb1f3, 0x3ff, 0x6], 0xfff, 0xde0, 0x9}}}]}, @DNAT0={0x38, 'DNAT\x00', 0x0, {0x1, {0x2, @local={0xac, 0x14, 0x14, 0xaa}, @broadcast=0xffffffff, @port=0x4e22, @port=0x4e23}}}}, {{@ip={@multicast1=0xe0000001, @empty, 0x0, 0x0, 'dummy0\x00', 'tunl0\x00', {0xff}, {0xff}, 0x9f, 0x3, 0xc}, 0x0, 0xe8, 0x130, 0x0, {}, [@common=@addrtype={0x30, 'addrtype\x00', 0x0, {0x0, 0x20, 0x0, 0x1}}, @common=@socket0={0x20, 'socket\x00'}]}, @unspec=@DNAT1={0x48, 'DNAT\x00', 0x1, {0x1, @ipv4=@remote={0xac, 0x14, 0x14, 0xbb}, @ipv6=@local={0xfe, 0x80, [], 0xaa}, @icmp_id=0x68, @icmp_id=0x64}}}, {{@ip={@loopback=0x7f000001, @loopback=0x7f000001, 0xffffff00, 0xff000000, 'bpq0\x00', 'bridge0\x00', {}, {0xff}, 0x88, 0x0, 0x1}, 0x0, 0xc8, 0x100, 0x0, {}, [@common=@unspec=@cluster={0x30, 'cluster\x00', 0x0, {0x8, 0x2, 0x1}}]}, @REDIRECT={0x38, 'REDIRECT\x00', 0x0, {0x1, {0x14, @multicast1=0xe0000001, @multicast2=0xe0000002, @gre_key=0x7, @port=0x4e22}}}}], {{[], 0x0, 0x70, 0x98}, {0x28, '\x00', 0x0, 0xfffffffffffffffe}}}}, 0x548) dup3(r1, r3, 0x0) 2018/04/11 12:45:31 executing program 5: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000200)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc-cast5-avx\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00003bcfd0)="d3ab27191a", 0x5) sendmmsg$alg(r1, &(0x7f0000007e40)=[{0x0, 0x0, &(0x7f0000000900)}], 0x1, 0x0) accept(r0, &(0x7f0000000040)=@pppol2tpv3in6, &(0x7f00000000c0)=0x80) r2 = semget(0x2, 0x3, 0x10) semop(r2, &(0x7f0000000100)=[{0x7, 0x0, 0x1800}, {0x3, 0x0, 0x1800}, {0x0, 0x7, 0x800}], 0x3) 2018/04/11 12:45:31 executing program 1: r0 = socket(0x1e, 0x1, 0x0) setsockopt$packet_tx_ring(r0, 0x10f, 0x87, &(0x7f0000b89fe4)=@req={0x772}, 0x10) sendmsg(r0, &(0x7f0000030000)={&(0x7f00004f5000)=@generic={0x10000000001e, "0014000900000002000000000226cc573c080000003724c71e14dd6a739effea1b48006be61ffe0000e103000000f8000004003f010039d8f986ff01000300000004af50d50700000000000000e3ad316a1983000000001d00e0dfcb24281e27800000100076c3979ac40000bd15020078a1dfd300881a8365b1b16d7436"}, 0x80, &(0x7f0000447ff0), 0x0, &(0x7f00006e9c68)}, 0x0) 2018/04/11 12:45:31 executing program 3: semop(0x0, &(0x7f000001a000)=[{0x0, 0xffffffffffff0001}, {0x0, 0xe00000000000000}], 0x2) timer_create(0x0, &(0x7f0000cd0000)={0x0, 0x12}, &(0x7f0000044000)) timer_settime(0x0, 0x0, &(0x7f00004b1fe0)={{0x0, 0x1c9c380}, {0x0, 0x9}}, &(0x7f0000040000)) r0 = getpgid(0x0) tkill(r0, 0x1000000000016) [ 630.290779] FAULT_INJECTION: forcing a failure. [ 630.290779] name failslab, interval 1, probability 0, space 0, times 0 [ 630.302247] CPU: 0 PID: 3325 Comm: syz-executor4 Not tainted 4.16.0+ #17 [ 630.309104] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 630.318480] Call Trace: [ 630.321104] dump_stack+0x1b9/0x294 [ 630.324773] ? dump_stack_print_info.cold.2+0x52/0x52 [ 630.330011] should_fail.cold.4+0xa/0x1a [ 630.334109] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 2018/04/11 12:45:32 executing program 1: r0 = socket(0x1e, 0x1, 0x0) setsockopt$packet_tx_ring(r0, 0x10f, 0x87, &(0x7f0000b89fe4)=@req={0x772}, 0x10) sendmsg(r0, &(0x7f0000030000)={&(0x7f00004f5000)=@generic={0x10000000001e, "0014000900000003000000000226cc573c080000003724c71e14dd6a739effea1b48006be61ffe0000e103000000f8000004003f010039d8f986ff01000300000004af50d50700000000000000e3ad316a1983000000001d00e0dfcb24281e27800000100076c3979ac40000bd15020078a1dfd300881a8365b1b16d7436"}, 0x80, &(0x7f0000447ff0), 0x0, &(0x7f00006e9c68)}, 0x0) 2018/04/11 12:45:32 executing program 2: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x1e, 0x1, 0x0) setsockopt$packet_tx_ring(r0, 0x10f, 0x87, &(0x7f0000b89fe4)=@req={0x772}, 0x10) sendmsg(r0, &(0x7f0000030000)={&(0x7f00004f5000)=@generic={0x10000000001e, "0100000900000000000000000226cc573c080000003724c71e14dd6a739effea1b48006be61ffe0000e103000000f8000004003f010039d8f986ff01000300000004af50d50700000101d00000e3ad316a1983000000001d00e0dfcb24281e27800000100076c3979ac40000bd15020078a1dfd300881a8365b1b16d7436"}, 0x80, &(0x7f0000447ff0), 0x0, &(0x7f00006e9c68)}, 0x0) [ 630.339678] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 630.344835] ? find_held_lock+0x36/0x1c0 [ 630.348956] ? check_same_owner+0x320/0x320 [ 630.353299] ? rcu_note_context_switch+0x710/0x710 [ 630.358260] __should_failslab+0x124/0x180 [ 630.362524] should_failslab+0x9/0x14 [ 630.366347] kmem_cache_alloc+0x2af/0x760 [ 630.370517] ? __alloc_pages_slowpath+0x2dc0/0x2dc0 [ 630.375566] getname_kernel+0x54/0x370 [ 630.379476] kern_path+0x1e/0x40 [ 630.382866] lookup_bdev+0xfa/0x240 [ 630.386514] ? blkdev_open+0x280/0x280 2018/04/11 12:45:32 executing program 1: r0 = socket(0x1e, 0x1, 0x0) setsockopt$packet_tx_ring(r0, 0x10f, 0x87, &(0x7f0000b89fe4)=@req={0x772}, 0x10) sendmsg(r0, &(0x7f0000030000)={&(0x7f00004f5000)=@generic={0x10000000001e, "001400090000007fffffff000226cc573c080000003724c71e14dd6a739effea1b48006be61ffe0000e103000000f8000004003f010039d8f986ff01000300000004af50d50700000000000000e3ad316a1983000000001d00e0dfcb24281e27800000100076c3979ac40000bd15020078a1dfd300881a8365b1b16d7436"}, 0x80, &(0x7f0000447ff0), 0x0, &(0x7f00006e9c68)}, 0x0) 2018/04/11 12:45:32 executing program 2: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x1e, 0x1, 0x0) setsockopt$packet_tx_ring(r0, 0x10f, 0x87, &(0x7f0000b89fe4)=@req={0x772}, 0x10) sendmsg(r0, &(0x7f0000030000)={&(0x7f00004f5000)=@generic={0x10000000001e, "0100000900000000000000000226cc573c080000003724c71e14dd6a739effea1b48006be61ffe0000e103000000f8000004003f010039d8f986ff01000300000004af50d507007fffffff0000e3ad316a1983000000001d00e0dfcb24281e27800000100076c3979ac40000bd15020078a1dfd300881a8365b1b16d7436"}, 0x80, &(0x7f0000447ff0), 0x0, &(0x7f00006e9c68)}, 0x0) [ 630.390470] blkdev_get_by_path+0x1f/0xe0 [ 630.394641] mount_bdev+0x5d/0x3e0 [ 630.398201] ? fuse_get_root_inode+0x190/0x190 [ 630.402812] fuse_mount_blk+0x34/0x40 [ 630.406636] mount_fs+0xae/0x328 [ 630.410029] vfs_kern_mount.part.34+0xd4/0x4d0 [ 630.414634] ? may_umount+0xb0/0xb0 [ 630.418277] ? _raw_read_unlock+0x22/0x30 [ 630.422447] ? __get_fs_type+0x97/0xc0 [ 630.426363] do_mount+0x564/0x3070 [ 630.429936] ? copy_mount_string+0x40/0x40 [ 630.434194] ? trace_hardirqs_on_caller+0x421/0x5c0 2018/04/11 12:45:32 executing program 1: r0 = socket(0x1e, 0x1, 0x0) setsockopt$packet_tx_ring(r0, 0x10f, 0x87, &(0x7f0000b89fe4)=@req={0x772}, 0x10) sendmsg(r0, &(0x7f0000030000)={&(0x7f00004f5000)=@generic={0x10000000001e, "0014000900000000000001000226cc573c080000003724c71e14dd6a739effea1b48006be61ffe0000e103000000f8000004003f010039d8f986ff01000300000004af50d50700000000000000e3ad316a1983000000001d00e0dfcb24281e27800000100076c3979ac40000bd15020078a1dfd300881a8365b1b16d7436"}, 0x80, &(0x7f0000447ff0), 0x0, &(0x7f00006e9c68)}, 0x0) [ 630.439231] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 630.444013] ? retint_kernel+0x10/0x10 [ 630.447933] ? copy_mount_options+0x1f0/0x380 [ 630.452448] ? copy_mount_options+0x1fa/0x380 [ 630.456969] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 630.462518] ? copy_mount_options+0x285/0x380 [ 630.467053] ksys_mount+0x12d/0x140 [ 630.470700] SyS_mount+0x35/0x50 [ 630.474079] ? ksys_mount+0x140/0x140 [ 630.477893] do_syscall_64+0x29e/0x9d0 [ 630.481787] ? vmalloc_sync_all+0x30/0x30 [ 630.485937] ? _raw_spin_unlock_irq+0x27/0x70 2018/04/11 12:45:32 executing program 2: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x1e, 0x1, 0x0) setsockopt$packet_tx_ring(r0, 0x10f, 0x87, &(0x7f0000b89fe4)=@req={0x772}, 0x10) sendmsg(r0, &(0x7f0000030000)={&(0x7f00004f5000)=@generic={0x10000000001e, "0100000900000000000000000226cc573c080000003724c71e14dd6a739effea1b48006be61ffe0000e103000000f8000004003f010039d8f986ff01000300000004af50d50700040000000000e3ad316a1983000000001d00e0dfcb24281e27800000100076c3979ac40000bd15020078a1dfd300881a8365b1b16d7436"}, 0x80, &(0x7f0000447ff0), 0x0, &(0x7f00006e9c68)}, 0x0) [ 630.490618] ? finish_task_switch+0x1ca/0x820 [ 630.495130] ? syscall_return_slowpath+0x5c0/0x5c0 [ 630.500078] ? syscall_return_slowpath+0x30f/0x5c0 [ 630.505024] ? entry_SYSCALL_64_after_hwframe+0x52/0xb7 [ 630.510417] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 630.515292] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 630.520488] RIP: 0033:0x455259 [ 630.523687] RSP: 002b:00007f95e4cadb08 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 630.531429] RAX: ffffffffffffffda RBX: 0000000000000015 RCX: 0000000000455259 2018/04/11 12:45:32 executing program 1: r0 = socket(0x1e, 0x1, 0x0) setsockopt$packet_tx_ring(r0, 0x10f, 0x87, &(0x7f0000b89fe4)=@req={0x772}, 0x10) sendmsg(r0, &(0x7f0000030000)={&(0x7f00004f5000)=@generic={0x10000000001e, "0014000900000000d00101000226cc573c080000003724c71e14dd6a739effea1b48006be61ffe0000e103000000f8000004003f010039d8f986ff01000300000004af50d50700000000000000e3ad316a1983000000001d00e0dfcb24281e27800000100076c3979ac40000bd15020078a1dfd300881a8365b1b16d7436"}, 0x80, &(0x7f0000447ff0), 0x0, &(0x7f00006e9c68)}, 0x0) 2018/04/11 12:45:32 executing program 2: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x1e, 0x1, 0x0) setsockopt$packet_tx_ring(r0, 0x10f, 0x87, &(0x7f0000b89fe4)=@req={0x772}, 0x10) sendmsg(r0, &(0x7f0000030000)={&(0x7f00004f5000)=@generic={0x10000000001e, "0100000900000000000000000226cc573c080000003724c71e14dd6a739effea1b48006be61ffe0000e103000000f8000004003f010039d8f986ff01000300000004af50d50700020000000000e3ad316a1983000000001d00e0dfcb24281e27800000100076c3979ac40000bd15020078a1dfd300881a8365b1b16d7436"}, 0x80, &(0x7f0000447ff0), 0x0, &(0x7f00006e9c68)}, 0x0) [ 630.538710] RDX: 00000000004b9bc5 RSI: 0000000020000040 RDI: 0000000020000000 [ 630.545986] RBP: 0000000020000000 R08: 00007f95e4cadb20 R09: 0000000000000000 [ 630.553265] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 630.560549] R13: 0000000000000000 R14: 0000000000000000 R15: 0000000000000000 2018/04/11 12:45:32 executing program 6: r0 = socket$inet6(0xa, 0x80003, 0xff) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @ipv4={[], [0xff, 0xff], @dev={0xac, 0x14, 0x14, 0x1b}}}, 0x1c) sendmsg(r0, &(0x7f000001b000)={0x0, 0xfffffff5, &(0x7f0000019fa0), 0xee, &(0x7f000001ef08)}, 0x0) 2018/04/11 12:45:32 executing program 7: syz_emit_ethernet(0x66, &(0x7f0000000000)={@random="cd3997030f00", @empty=[0x0, 0x0, 0x0, 0x0, 0x89060000], [], {@ipv6={0x86dd, {0x0, 0x6, "b40900", 0x30, 0x67, 0x0, @ipv4={[], [0xff, 0xff], @multicast2=0xe0000002}, @mcast2={0xff, 0x2, [], 0x1}, {[], @icmpv6=@time_exceed={0x21, 0x0, 0x0, 0x0, [], {0x0, 0x6, "b680fa", 0x0, 0x0, 0x0, @ipv4={[], [0xff, 0xff], @broadcast=0xffffffff}, @ipv4={[], [0xff, 0xff], @remote={0xac, 0x14, 0xffffffffffffffff, 0xbb}}}}}}}}}, 0x0) 2018/04/11 12:45:32 executing program 4 (fault-call:1 fault-nth:16): perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_fuseblk_mount(&(0x7f0000000040)='./file0\x00', &(0x7f0000000000)='./file0\x00', 0x4000, 0x0, 0x0, 0x0, 0x0, 0x0) 2018/04/11 12:45:32 executing program 5: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0xfffffffffffffa73}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000200)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc-cast5-avx\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00003bcfd0)="d3ab27191a", 0x5) sendmmsg$alg(r1, &(0x7f0000007e40)=[{0x0, 0x0, &(0x7f0000000900)}], 0x1, 0x0) accept(r0, &(0x7f0000000040)=@pppol2tpv3in6, &(0x7f00000000c0)=0x80) [ 630.736179] FAULT_INJECTION: forcing a failure. [ 630.736179] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 630.748049] CPU: 0 PID: 3378 Comm: syz-executor4 Not tainted 4.16.0+ #17 [ 630.754916] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 630.764289] Call Trace: [ 630.766907] dump_stack+0x1b9/0x294 [ 630.770572] ? dump_stack_print_info.cold.2+0x52/0x52 [ 630.775809] should_fail.cold.4+0xa/0x1a [ 630.779911] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 630.785049] ? perf_trace_run_bpf_submit+0x23f/0x370 [ 630.790172] ? perf_trace_run_bpf_submit+0x23f/0x370 [ 630.795310] ? perf_tp_event+0xc30/0xc30 [ 630.799485] ? wait_for_completion+0x870/0x870 [ 630.804099] ? memset+0x31/0x40 [ 630.807443] ? zap_class+0x720/0x720 [ 630.811185] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 630.816735] ? should_fail+0x21b/0xbcd [ 630.820615] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 630.826152] __alloc_pages_nodemask+0x34e/0xd70 [ 630.830820] ? __alloc_pages_slowpath+0x2dc0/0x2dc0 [ 630.835838] ? find_held_lock+0x36/0x1c0 [ 630.839941] ? check_same_owner+0x320/0x320 [ 630.844264] cache_grow_begin+0x72/0x6c0 [ 630.848333] kmem_cache_alloc+0x689/0x760 [ 630.852478] ? __alloc_pages_slowpath+0x2dc0/0x2dc0 [ 630.857496] getname_kernel+0x54/0x370 [ 630.861388] kern_path+0x1e/0x40 [ 630.864753] lookup_bdev+0xfa/0x240 [ 630.868370] ? blkdev_open+0x280/0x280 [ 630.872268] blkdev_get_by_path+0x1f/0xe0 [ 630.876409] mount_bdev+0x5d/0x3e0 [ 630.879941] ? fuse_get_root_inode+0x190/0x190 [ 630.884520] fuse_mount_blk+0x34/0x40 [ 630.888316] mount_fs+0xae/0x328 [ 630.891687] vfs_kern_mount.part.34+0xd4/0x4d0 [ 630.896274] ? may_umount+0xb0/0xb0 [ 630.899894] ? _raw_read_unlock+0x22/0x30 [ 630.904036] ? __get_fs_type+0x97/0xc0 [ 630.907920] do_mount+0x564/0x3070 [ 630.911458] ? copy_mount_string+0x40/0x40 [ 630.915684] ? rcu_pm_notify+0xc0/0xc0 [ 630.919573] ? copy_mount_options+0x5f/0x380 [ 630.923969] ? rcu_read_lock_sched_held+0x108/0x120 [ 630.928976] ? kmem_cache_alloc_trace+0x616/0x780 [ 630.933822] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 630.939348] ? copy_mount_options+0x285/0x380 [ 630.943839] ksys_mount+0x12d/0x140 [ 630.947457] SyS_mount+0x35/0x50 [ 630.950813] ? ksys_mount+0x140/0x140 [ 630.954609] do_syscall_64+0x29e/0x9d0 [ 630.958499] ? vmalloc_sync_all+0x30/0x30 [ 630.962637] ? syscall_slow_exit_work+0x4f0/0x4f0 [ 630.967474] ? syscall_return_slowpath+0x5c0/0x5c0 [ 630.972398] ? syscall_return_slowpath+0x30f/0x5c0 [ 630.977324] ? entry_SYSCALL_64_after_hwframe+0x52/0xb7 [ 630.982683] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 630.987521] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 630.992697] RIP: 0033:0x455259 [ 630.995874] RSP: 002b:00007f95e4cadb08 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 631.003576] RAX: ffffffffffffffda RBX: 0000000000000015 RCX: 0000000000455259 [ 631.010836] RDX: 00000000004b9bc5 RSI: 0000000020000040 RDI: 0000000020000000 [ 631.018095] RBP: 0000000020000000 R08: 00007f95e4cadb20 R09: 0000000000000000 [ 631.025350] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 2018/04/11 12:45:32 executing program 7: syz_emit_ethernet(0x66, &(0x7f0000000000)={@random="cd3997030f00", @empty=[0x0, 0x0, 0x0, 0x0, 0x806], [], {@ipv6={0x86dd, {0x0, 0x6, "b40900", 0x30, 0x67, 0x0, @ipv4={[], [0xff, 0xff], @multicast2=0xe0000002}, @mcast2={0xff, 0x2, [], 0x1}, {[], @icmpv6=@time_exceed={0x21, 0x0, 0x0, 0x0, [], {0x0, 0x6, "b680fa", 0x0, 0x0, 0x0, @ipv4={[], [0xff, 0xff], @broadcast=0xffffffff}, @ipv4={[], [0xff, 0xff], @remote={0xac, 0x14, 0xffffffffffffffff, 0xbb}}}}}}}}}, 0x0) 2018/04/11 12:45:32 executing program 5: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000200)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc-cast5-avx\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) accept$alg(r0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00003bcfd0)="d3ab27191a", 0x5) r2 = syz_open_dev$mice(&(0x7f0000000100)='/dev/input/mice\x00', 0x0, 0x111482) setsockopt$inet_sctp6_SCTP_ADAPTATION_LAYER(r2, 0x84, 0x7, &(0x7f0000000140), 0x4) sendmmsg$alg(r1, &(0x7f0000007e40)=[{0x0, 0x0, &(0x7f0000000900)}], 0x1, 0x0) accept(r0, &(0x7f0000000040)=@pppol2tpv3in6, &(0x7f00000000c0)=0x80) 2018/04/11 12:45:32 executing program 0: r0 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dsp\x00', 0x0, 0x0) r1 = inotify_add_watch(0xffffffffffffffff, &(0x7f00000000c0)='./file0\x00', 0x4) inotify_rm_watch(r0, r1) r2 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0x0, r0, 0x0) r3 = socket$alg(0x26, 0x5, 0x0) bind$alg(r3, &(0x7f0000000200)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc-cast5-avx\x00'}, 0x58) r4 = accept$alg(r3, 0x0, 0x0) creat(&(0x7f0000000040)='./file0\x00', 0x41) dup3(r2, r4, 0x0) [ 631.032613] R13: 0000000000000000 R14: 0000000000000000 R15: 0000000000000000 2018/04/11 12:45:32 executing program 2: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x1e, 0x1, 0x0) setsockopt$packet_tx_ring(r0, 0x10f, 0x87, &(0x7f0000b89fe4)=@req={0x772}, 0x10) sendmsg(r0, &(0x7f0000030000)={&(0x7f00004f5000)=@generic={0x10000000001e, "0100000900000000000000000226cc573c080000003724c71e14dd6a739effea1b48006be61ffe0000e103000000f8000004003f010039d8f986ff01000300000004af50d5070000d001010000e3ad316a1983000000001d00e0dfcb24281e27800000100076c3979ac40000bd15020078a1dfd300881a8365b1b16d7436"}, 0x80, &(0x7f0000447ff0), 0x0, &(0x7f00006e9c68)}, 0x0) 2018/04/11 12:45:32 executing program 5: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000280)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc-cast5-avx\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00003bcfd0)="d3ab27191a", 0x5) sendmmsg$alg(r1, &(0x7f0000000080)=[{0x0, 0x0, &(0x7f0000000900), 0x0, 0x0, 0xfffffeb1}], 0x1, 0x0) accept(r0, &(0x7f0000000100)=@pppol2tpv3in6, &(0x7f00000000c0)=0x80) openat$dsp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dsp\x00', 0x84000, 0x0) 2018/04/11 12:45:32 executing program 0: ioctl$KVM_CREATE_DEVICE(0xffffffffffffff9c, 0xc00caee0, &(0x7f0000000080)={0x7, 0xffffffffffffff9c}) r1 = socket(0x400020000000010, 0x2, 0x0) write(r1, &(0x7f00000000c0)="1f00000054000d00000000009059387c07ff1b0702000008000000070001ff", 0x1f) setsockopt$inet_sctp6_SCTP_SOCKOPT_BINDX_REM(r0, 0x84, 0x65, &(0x7f00000000c0)=[@in={0x2, 0x4e23, @multicast2=0xe0000002}, @in={0x2, 0x4e22, @remote={0xac, 0x14, 0x14, 0xbb}}, @in6={0xa, 0x4e22, 0x3, @ipv4={[], [0xff, 0xff], @dev={0xac, 0x14, 0x14, 0x17}}, 0x6}, @in={0x2, 0x4e22, @remote={0xac, 0x14, 0x14, 0xbb}}], 0x4c) socketpair$inet6_sctp(0xa, 0x5, 0x84, &(0x7f0000000040)={0xffffffffffffffff}) sync_file_range(r2, 0x0, 0x4d547348, 0x1) r3 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r4 = socket$alg(0x26, 0x5, 0x0) bind$alg(r4, &(0x7f0000000200)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc-cast5-avx\x00'}, 0x58) r5 = accept$alg(r4, 0x0, 0x0) dup3(r3, r5, 0x0) 2018/04/11 12:45:32 executing program 4 (fault-call:1 fault-nth:17): perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_fuseblk_mount(&(0x7f0000000040)='./file0\x00', &(0x7f0000000000)='./file0\x00', 0x4000, 0x0, 0x0, 0x0, 0x0, 0x0) 2018/04/11 12:45:32 executing program 3: semop(0x0, &(0x7f000001a000)=[{0x0, 0xffffffffffff0001}, {0x0, 0x3f00000000000000}], 0x2) timer_create(0x0, &(0x7f0000cd0000)={0x0, 0x12}, &(0x7f0000044000)) timer_settime(0x0, 0x0, &(0x7f00004b1fe0)={{0x0, 0x1c9c380}, {0x0, 0x9}}, &(0x7f0000040000)) r0 = getpgid(0x0) tkill(r0, 0x1000000000016) 2018/04/11 12:45:32 executing program 7: syz_emit_ethernet(0x66, &(0x7f0000000000)={@random="cd3997030f00", @empty=[0x0, 0x0, 0x0, 0x0, 0x4], [], {@ipv6={0x86dd, {0x0, 0x6, "b40900", 0x30, 0x67, 0x0, @ipv4={[], [0xff, 0xff], @multicast2=0xe0000002}, @mcast2={0xff, 0x2, [], 0x1}, {[], @icmpv6=@time_exceed={0x21, 0x0, 0x0, 0x0, [], {0x0, 0x6, "b680fa", 0x0, 0x0, 0x0, @ipv4={[], [0xff, 0xff], @broadcast=0xffffffff}, @ipv4={[], [0xff, 0xff], @remote={0xac, 0x14, 0xffffffffffffffff, 0xbb}}}}}}}}}, 0x0) 2018/04/11 12:45:32 executing program 1: r0 = socket(0x1e, 0x1, 0x0) setsockopt$packet_tx_ring(r0, 0x10f, 0x87, &(0x7f0000b89fe4)=@req={0x772}, 0x10) sendmsg(r0, &(0x7f0000030000)={&(0x7f00004f5000)=@generic={0x10000000001e, "00140009000000007fffffff0226cc573c080000003724c71e14dd6a739effea1b48006be61ffe0000e103000000f8000004003f010039d8f986ff01000300000004af50d50700000000000000e3ad316a1983000000001d00e0dfcb24281e27800000100076c3979ac40000bd15020078a1dfd300881a8365b1b16d7436"}, 0x80, &(0x7f0000447ff0), 0x0, &(0x7f00006e9c68)}, 0x0) 2018/04/11 12:45:32 executing program 6: r0 = socket$inet6(0xa, 0x80003, 0xff) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @ipv4={[], [0xff, 0xff], @dev={0xac, 0x14, 0x14, 0x1b}}}, 0x1c) sendmsg(r0, &(0x7f000001b000)={0x0, 0xfffffff5, &(0x7f0000019fa0), 0x167, &(0x7f000001ef08)}, 0x0) [ 631.314534] FAULT_INJECTION: forcing a failure. [ 631.314534] name failslab, interval 1, probability 0, space 0, times 0 [ 631.325837] CPU: 0 PID: 3397 Comm: syz-executor4 Not tainted 4.16.0+ #17 [ 631.332693] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 631.342065] Call Trace: [ 631.344678] dump_stack+0x1b9/0x294 [ 631.348338] ? dump_stack_print_info.cold.2+0x52/0x52 [ 631.353582] should_fail.cold.4+0xa/0x1a [ 631.357677] ? fault_create_debugfs_attr+0x1f0/0x1f0 2018/04/11 12:45:33 executing program 6: r0 = socket$inet6(0xa, 0x80003, 0xff) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @ipv4={[], [0xff, 0xff], @dev={0xac, 0x14, 0x14, 0x1b}}}, 0x1c) sendmsg(r0, &(0x7f000001b000)={0x0, 0xfffffff5, &(0x7f0000019fa0), 0xec, &(0x7f000001ef08)}, 0x0) 2018/04/11 12:45:33 executing program 7: syz_emit_ethernet(0x66, &(0x7f0000000000)={@random="cd3997030f00", @empty=[0x0, 0x0, 0x0, 0x0, 0x8864000000000000], [], {@ipv6={0x86dd, {0x0, 0x6, "b40900", 0x30, 0x67, 0x0, @ipv4={[], [0xff, 0xff], @multicast2=0xe0000002}, @mcast2={0xff, 0x2, [], 0x1}, {[], @icmpv6=@time_exceed={0x21, 0x0, 0x0, 0x0, [], {0x0, 0x6, "b680fa", 0x0, 0x0, 0x0, @ipv4={[], [0xff, 0xff], @broadcast=0xffffffff}, @ipv4={[], [0xff, 0xff], @remote={0xac, 0x14, 0xffffffffffffffff, 0xbb}}}}}}}}}, 0x0) 2018/04/11 12:45:33 executing program 5: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) r1 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/qat_adf_ctl\x00', 0x280, 0x0) r2 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000140)='/dev/sequencer2\x00', 0x2201, 0x0) r3 = shmget(0x0, 0x2000, 0x0, &(0x7f0000ffb000/0x2000)=nil) getresuid(&(0x7f00000001c0), &(0x7f0000000280), &(0x7f00000002c0)=0x0) getgroups(0x8, &(0x7f0000000300)=[0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0]) lstat(&(0x7f0000000340)='./file0\x00', &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, 0x0}) lstat(&(0x7f0000000740)='./file0\x00', &(0x7f0000000640)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) r8 = getpid() r9 = getpid() shmctl$IPC_SET(r3, 0x1, &(0x7f00000004c0)={{0x2, r4, r5, r6, r7, 0x51, 0x73}, 0x2, 0x6, 0x1, 0x8, r8, r9}) ioctl$ION_IOC_ALLOC(r1, 0xc0184900, &(0x7f0000000180)={0x8001, 0x4, 0x1, r2}) ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) bind$alg(r0, &(0x7f0000000200)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc-cast5-avx\x00'}, 0x58) r10 = accept$alg(r0, 0x0, 0x0) setpriority(0x0, r8, 0x7f) ioctl$KVM_GET_NR_MMU_PAGES(r2, 0xae45, 0x76e368e) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00003bcfd0)="d3ab27191a", 0x5) sendmmsg$alg(r10, &(0x7f0000007e40)=[{0x0, 0x0, &(0x7f0000000900)}], 0x1, 0x0) accept(r0, &(0x7f0000000040)=@pppol2tpv3in6, &(0x7f00000000c0)=0x80) [ 631.362816] ? lock_acquire+0x1dc/0x520 [ 631.366811] ? graph_lock+0x170/0x170 [ 631.370647] ? find_held_lock+0x36/0x1c0 [ 631.374739] ? __lock_is_held+0xb5/0x140 [ 631.378842] ? check_same_owner+0x320/0x320 [ 631.383190] ? rcu_note_context_switch+0x710/0x710 [ 631.388152] __should_failslab+0x124/0x180 [ 631.392412] should_failslab+0x9/0x14 [ 631.396231] kmem_cache_alloc_trace+0x2cb/0x780 [ 631.400921] ? kasan_check_write+0x14/0x20 [ 631.405179] ? do_raw_spin_lock+0xc1/0x200 [ 631.409440] sget_userns+0x1c7/0xf20 [ 631.413172] ? kill_litter_super+0x90/0x90 [ 631.417430] ? ns_test_super+0x50/0x50 [ 631.421346] ? destroy_unused_super.part.9+0x100/0x100 [ 631.426644] ? do_raw_spin_trylock+0x1b0/0x1b0 [ 631.431251] ? kasan_check_write+0x14/0x20 [ 631.435507] ? do_raw_spin_lock+0xc1/0x200 [ 631.439775] ? blkdev_get+0xc0/0xb30 [ 631.443517] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 631.449076] ? cap_capable+0x1f9/0x260 [ 631.453000] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 631.458558] ? security_capable+0x99/0xc0 [ 631.462736] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 631.468286] ? ns_capable_common+0x13f/0x170 [ 631.472712] ? kill_litter_super+0x90/0x90 [ 631.476958] sget+0x10b/0x150 [ 631.480078] ? ns_test_super+0x50/0x50 [ 631.483986] mount_bdev+0x111/0x3e0 [ 631.487623] ? fuse_get_root_inode+0x190/0x190 [ 631.492231] fuse_mount_blk+0x34/0x40 [ 631.493925] QAT: Invalid ioctl [ 631.496042] mount_fs+0xae/0x328 [ 631.496090] vfs_kern_mount.part.34+0xd4/0x4d0 [ 631.496116] ? may_umount+0xb0/0xb0 [ 631.496133] ? _raw_read_unlock+0x22/0x30 [ 631.496148] ? __get_fs_type+0x97/0xc0 [ 631.496173] do_mount+0x564/0x3070 [ 631.522456] ? copy_mount_string+0x40/0x40 [ 631.526704] ? rcu_pm_notify+0xc0/0xc0 [ 631.530619] ? copy_mount_options+0x5f/0x380 [ 631.532176] QAT: Invalid ioctl [ 631.535035] ? rcu_read_lock_sched_held+0x108/0x120 [ 631.535057] ? kmem_cache_alloc_trace+0x616/0x780 [ 631.535085] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 631.535104] ? _copy_from_user+0xdf/0x150 [ 631.535127] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 631.535146] ? copy_mount_options+0x285/0x380 [ 631.567882] ksys_mount+0x12d/0x140 [ 631.571536] SyS_mount+0x35/0x50 [ 631.574919] ? ksys_mount+0x140/0x140 [ 631.578740] do_syscall_64+0x29e/0x9d0 [ 631.582642] ? vmalloc_sync_all+0x30/0x30 [ 631.586807] ? _raw_spin_unlock_irq+0x27/0x70 [ 631.591322] ? finish_task_switch+0x1ca/0x820 [ 631.595854] ? syscall_return_slowpath+0x5c0/0x5c0 [ 631.600806] ? syscall_return_slowpath+0x30f/0x5c0 [ 631.605755] ? entry_SYSCALL_64_after_hwframe+0x52/0xb7 [ 631.611144] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 631.613171] netlink: 7 bytes leftover after parsing attributes in process `syz-executor0'. [ 631.616008] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 631.616024] RIP: 0033:0x455259 [ 631.616034] RSP: 002b:00007f95e4cadb08 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 631.616063] RAX: ffffffffffffffda RBX: 0000000000000015 RCX: 0000000000455259 [ 631.624490] PF_BRIDGE: br_mdb_parse() with unknown ifindex [ 631.629630] RDX: 00000000004b9bc5 RSI: 0000000020000040 RDI: 0000000020000000 [ 631.629641] RBP: 0000000020000000 R08: 00007f95e4cadb20 R09: 0000000000000000 [ 631.629651] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 631.629661] R13: 0000000000000000 R14: 0000000000000000 R15: 0000000000000000 [ 631.700050] netlink: 7 bytes leftover after parsing attributes in process `syz-executor0'. [ 631.708552] PF_BRIDGE: br_mdb_parse() with unknown ifindex 2018/04/11 12:45:33 executing program 6: r0 = socket$inet6(0xa, 0x80003, 0xff) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @ipv4={[], [0xff, 0xff], @dev={0xac, 0x14, 0x14, 0x1b}}}, 0x1c) sendmsg(r0, &(0x7f000001b000)={0x0, 0xfffffff5, &(0x7f0000019fa0), 0x154, &(0x7f000001ef08)}, 0x0) 2018/04/11 12:45:33 executing program 7: syz_emit_ethernet(0x66, &(0x7f0000000000)={@random="cd3997030f00", @empty=[0x0, 0x0, 0x0, 0x0, 0x86ddffff], [], {@ipv6={0x86dd, {0x0, 0x6, "b40900", 0x30, 0x67, 0x0, @ipv4={[], [0xff, 0xff], @multicast2=0xe0000002}, @mcast2={0xff, 0x2, [], 0x1}, {[], @icmpv6=@time_exceed={0x21, 0x0, 0x0, 0x0, [], {0x0, 0x6, "b680fa", 0x0, 0x0, 0x0, @ipv4={[], [0xff, 0xff], @broadcast=0xffffffff}, @ipv4={[], [0xff, 0xff], @remote={0xac, 0x14, 0xffffffffffffffff, 0xbb}}}}}}}}}, 0x0) 2018/04/11 12:45:33 executing program 5: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000200)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc-cast5-avx\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00003bcfd0)="d3ab27191a", 0x5) sendmmsg$alg(r1, &(0x7f0000007e40)=[{0x0, 0x0, &(0x7f0000000900)}], 0x1, 0x0) r2 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000280)='/dev/ppp\x00', 0x40, 0x0) connect$rds(r2, &(0x7f00000002c0)={0x2, 0x4e23, @rand_addr=0x100}, 0x10) r3 = syz_open_dev$mouse(&(0x7f0000000100)='/dev/input/mouse#\x00', 0x7d7, 0x40000) getsockopt$inet_sctp6_SCTP_AUTH_ACTIVE_KEY(0xffffffffffffff9c, 0x84, 0x18, &(0x7f0000000140)={0x0, 0xffffffff}, &(0x7f0000000180)=0x8) setsockopt$inet_sctp_SCTP_AUTH_DELETE_KEY(r3, 0x84, 0x19, &(0x7f00000001c0)={r4, 0x6}, 0x8) accept(r0, &(0x7f0000000040)=@pppol2tpv3in6, &(0x7f00000000c0)=0x80) 2018/04/11 12:45:33 executing program 4 (fault-call:1 fault-nth:18): perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_fuseblk_mount(&(0x7f0000000040)='./file0\x00', &(0x7f0000000000)='./file0\x00', 0x4000, 0x0, 0x0, 0x0, 0x0, 0x0) 2018/04/11 12:45:33 executing program 1: r0 = socket(0x1e, 0x1, 0x0) setsockopt$packet_tx_ring(r0, 0x10f, 0x87, &(0x7f0000b89fe4)=@req={0x772}, 0x10) sendmsg(r0, &(0x7f0000030000)={&(0x7f00004f5000)=@generic={0x10000000001e, "0014000900000000000000020226cc573c080000003724c71e14dd6a739effea1b48006be61ffe0000e103000000f8000004003f010039d8f986ff01000300000004af50d50700000000000000e3ad316a1983000000001d00e0dfcb24281e27800000100076c3979ac40000bd15020078a1dfd300881a8365b1b16d7436"}, 0x80, &(0x7f0000447ff0), 0x0, &(0x7f00006e9c68)}, 0x0) 2018/04/11 12:45:33 executing program 2: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x1e, 0x1, 0x0) setsockopt$packet_tx_ring(r0, 0x10f, 0x87, &(0x7f0000b89fe4)=@req={0x772}, 0x10) sendmsg(r0, &(0x7f0000030000)={&(0x7f00004f5000)=@generic={0x10000000001e, "0100000900000000000000000226cc573c080000003724c71e14dd6a739effea1b48006be61ffe0000e103000000f8000004003f010039d8f986ff01000300000004af50d50700000200000000e3ad316a1983000000001d00e0dfcb24281e27800000100076c3979ac40000bd15020078a1dfd300881a8365b1b16d7436"}, 0x80, &(0x7f0000447ff0), 0x0, &(0x7f00006e9c68)}, 0x0) 2018/04/11 12:45:33 executing program 3: semop(0x0, &(0x7f000001a000)=[{0x0, 0xffffffffffff0001}, {0x0, 0x500}], 0x2) timer_create(0x0, &(0x7f0000cd0000)={0x0, 0x12}, &(0x7f0000044000)) timer_settime(0x0, 0x0, &(0x7f00004b1fe0)={{0x0, 0x1c9c380}, {0x0, 0x9}}, &(0x7f0000040000)) r0 = getpgid(0x0) tkill(r0, 0x1000000000016) 2018/04/11 12:45:33 executing program 0: r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$alg(0x26, 0x5, 0x0) ioctl$DRM_IOCTL_PRIME_FD_TO_HANDLE(0xffffffffffffffff, 0xc00c642e, &(0x7f0000000040)={0x0, 0x80000, 0xffffffffffffffff}) ioctl$DRM_IOCTL_WAIT_VBLANK(r2, 0xc018643a, &(0x7f0000000080)={0x4400003e, 0x76d, 0x2c}) bind$alg(r1, &(0x7f0000000200)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc-cast5-avx\x00'}, 0x2b9) accept$alg(r1, 0x0, 0x0) dup3(r0, r2, 0x8000000080000) 2018/04/11 12:45:33 executing program 0: r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000200)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc-cast5-avx\x00'}, 0x58) socketpair$inet6_sctp(0xa, 0x5, 0x84, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$inet_sctp_SCTP_STREAM_SCHEDULER_VALUE(0xffffffffffffff9c, 0x84, 0x7c, &(0x7f0000000180)={0x0, 0x7}, &(0x7f00000000c0)=0xfffffffffffffe3e) getsockopt$inet_sctp6_SCTP_AUTH_ACTIVE_KEY(r2, 0x84, 0x18, &(0x7f0000000100)={r3, 0x3}, &(0x7f0000000140)=0x8) r4 = accept$alg(r1, 0x0, 0x0) dup3(r0, r4, 0x0) [ 632.295478] FAULT_INJECTION: forcing a failure. [ 632.295478] name failslab, interval 1, probability 0, space 0, times 0 [ 632.307442] CPU: 0 PID: 3438 Comm: syz-executor4 Not tainted 4.16.0+ #17 [ 632.314299] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 632.323658] Call Trace: [ 632.326268] dump_stack+0x1b9/0x294 [ 632.329927] ? dump_stack_print_info.cold.2+0x52/0x52 [ 632.335158] should_fail.cold.4+0xa/0x1a [ 632.339237] ? kasan_check_write+0x14/0x20 2018/04/11 12:45:33 executing program 6: r0 = socket$inet6(0xa, 0x80003, 0xff) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @ipv4={[], [0xff, 0xff], @dev={0xac, 0x14, 0x14, 0x1b}}}, 0x1c) sendmsg(r0, &(0x7f000001b000)={0x0, 0xfffffff5, &(0x7f0000019fa0), 0x17e, &(0x7f000001ef08)}, 0x0) [ 632.343496] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 632.348617] ? graph_lock+0x170/0x170 [ 632.352435] ? wait_for_completion+0x870/0x870 [ 632.357039] ? graph_lock+0x170/0x170 [ 632.360854] ? find_next_zero_bit+0x111/0x140 [ 632.365377] ? find_held_lock+0x36/0x1c0 [ 632.369464] ? __lock_is_held+0xb5/0x140 [ 632.373566] ? check_same_owner+0x320/0x320 [ 632.377907] ? __might_sleep+0x95/0x190 [ 632.381902] ? rcu_note_context_switch+0x710/0x710 [ 632.386861] __should_failslab+0x124/0x180 [ 632.391121] should_failslab+0x9/0x14 2018/04/11 12:45:34 executing program 0: r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000200)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc-cast5-avx\x00'}, 0x58) r2 = accept$alg(r1, 0x0, 0x0) pipe2(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}, 0x800) ioctl$EVIOCGBITKEY(r3, 0x80404521, &(0x7f0000000280)=""/4096) dup3(r0, r2, 0xfffffffffffffffe) [ 632.394935] __kmalloc+0x2c8/0x760 [ 632.398499] ? trace_hardirqs_on_caller+0x421/0x5c0 [ 632.403533] ? __lockdep_init_map+0x105/0x590 [ 632.408050] ? __list_lru_init+0xdd/0x790 [ 632.412228] __list_lru_init+0xdd/0x790 [ 632.416225] ? list_lru_destroy+0x4c0/0x4c0 [ 632.420568] ? mark_held_locks+0xc9/0x160 [ 632.424738] ? __raw_spin_lock_init+0x1c/0x100 [ 632.429340] ? trace_hardirqs_on_caller+0x421/0x5c0 [ 632.434376] ? __lockdep_init_map+0x105/0x590 [ 632.438892] ? lockdep_init_map+0x9/0x10 [ 632.442977] sget_userns+0x6d9/0xf20 2018/04/11 12:45:34 executing program 6: r0 = socket$inet6(0xa, 0x80003, 0xff) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @ipv4={[], [0xff, 0xff], @dev={0xac, 0x14, 0x14, 0x1b}}}, 0x1c) sendmsg(r0, &(0x7f000001b000)={0x0, 0xfffffff5, &(0x7f0000019fa0), 0x10f, &(0x7f000001ef08)}, 0x0) [ 632.446701] ? kill_litter_super+0x90/0x90 [ 632.450959] ? ns_test_super+0x50/0x50 [ 632.454858] ? destroy_unused_super.part.9+0x100/0x100 [ 632.460143] ? do_raw_spin_trylock+0x1b0/0x1b0 [ 632.464741] ? kasan_check_write+0x14/0x20 [ 632.468992] ? do_raw_spin_lock+0xc1/0x200 [ 632.473253] ? blkdev_get+0xc0/0xb30 [ 632.476991] ? cap_capable+0x1f9/0x260 [ 632.480905] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 632.486463] ? security_capable+0x99/0xc0 [ 632.490631] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 2018/04/11 12:45:34 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000200)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc-cast5-avx\x00'}, 0x58) ioctl$TCSETSF(r0, 0x5404, &(0x7f00000000c0)={0xffffffffffffff00, 0x80000000, 0x409, 0x100000000, 0x4, 0x5, 0x3, 0x800, 0x5, 0x470e, 0x2, 0x10000}) r1 = accept$alg(r0, 0x0, 0x0) mlock2(&(0x7f0000ffe000/0x1000)=nil, 0x1000, 0x1) r2 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dsp\x00', 0x0, 0x0) getsockopt$inet_sctp_SCTP_CONTEXT(0xffffffffffffffff, 0x84, 0x11, &(0x7f0000000140)={0x0, 0x8}, &(0x7f0000000180)=0x8) getsockopt$inet_sctp_SCTP_PRIMARY_ADDR(r2, 0x84, 0x6, &(0x7f0000000280)={r3, @in={{0x2, 0x4e24, @loopback=0x7f000001}}}, &(0x7f00000001c0)=0x84) r4 = dup3(0xffffffffffffffff, r1, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000100)={r4, &(0x7f0000000040)="1beef120f096afd12a69f2397e543bf9248fe2b051eb5285402104a299cd02a6970934090e1bd63ad7acab31f1754c1d632959d2f8c76813649d34317404ee867a93c9421e5bfdd7072c1d6552508e2fefc4566caf7a86bee99fc75aa7da0fe0bb790fb6bc10", &(0x7f00000000c0)}, 0x20) [ 632.496180] ? ns_capable_common+0x13f/0x170 [ 632.500599] ? kill_litter_super+0x90/0x90 [ 632.504847] sget+0x10b/0x150 [ 632.507964] ? ns_test_super+0x50/0x50 [ 632.511871] mount_bdev+0x111/0x3e0 [ 632.515513] ? fuse_get_root_inode+0x190/0x190 [ 632.520119] fuse_mount_blk+0x34/0x40 [ 632.523933] mount_fs+0xae/0x328 [ 632.527326] vfs_kern_mount.part.34+0xd4/0x4d0 [ 632.531928] ? may_umount+0xb0/0xb0 [ 632.535566] ? _raw_read_unlock+0x22/0x30 [ 632.539722] ? __get_fs_type+0x97/0xc0 [ 632.543635] do_mount+0x564/0x3070 2018/04/11 12:45:34 executing program 1: r0 = socket(0x1e, 0x1, 0x0) setsockopt$packet_tx_ring(r0, 0x10f, 0x87, &(0x7f0000b89fe4)=@req={0x772}, 0x10) sendmsg(r0, &(0x7f0000030000)={&(0x7f00004f5000)=@generic={0x10000000001e, "0014000900000000000004000226cc573c080000003724c71e14dd6a739effea1b48006be61ffe0000e103000000f8000004003f010039d8f986ff01000300000004af50d50700000000000000e3ad316a1983000000001d00e0dfcb24281e27800000100076c3979ac40000bd15020078a1dfd300881a8365b1b16d7436"}, 0x80, &(0x7f0000447ff0), 0x0, &(0x7f00006e9c68)}, 0x0) [ 632.547202] ? copy_mount_string+0x40/0x40 [ 632.551453] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 632.556231] ? retint_kernel+0x10/0x10 [ 632.560161] ? __sanitizer_cov_trace_const_cmp2+0x20/0x20 [ 632.565714] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 632.571268] ? copy_mount_options+0x285/0x380 [ 632.575782] ksys_mount+0x12d/0x140 [ 632.579421] SyS_mount+0x35/0x50 [ 632.582798] ? ksys_mount+0x140/0x140 [ 632.586609] do_syscall_64+0x29e/0x9d0 [ 632.590505] ? vmalloc_sync_all+0x30/0x30 2018/04/11 12:45:34 executing program 7: syz_emit_ethernet(0x66, &(0x7f0000000000)={@random="cd3997030f00", @empty=[0x0, 0x0, 0x0, 0x0, 0xfffffff5], [], {@ipv6={0x86dd, {0x0, 0x6, "b40900", 0x30, 0x67, 0x0, @ipv4={[], [0xff, 0xff], @multicast2=0xe0000002}, @mcast2={0xff, 0x2, [], 0x1}, {[], @icmpv6=@time_exceed={0x21, 0x0, 0x0, 0x0, [], {0x0, 0x6, "b680fa", 0x0, 0x0, 0x0, @ipv4={[], [0xff, 0xff], @broadcast=0xffffffff}, @ipv4={[], [0xff, 0xff], @remote={0xac, 0x14, 0xffffffffffffffff, 0xbb}}}}}}}}}, 0x0) 2018/04/11 12:45:34 executing program 2: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x1e, 0x1, 0x0) setsockopt$packet_tx_ring(r0, 0x10f, 0x87, &(0x7f0000b89fe4)=@req={0x772}, 0x10) sendmsg(r0, &(0x7f0000030000)={&(0x7f00004f5000)=@generic={0x10000000001e, "0100000900000000000000000226cc573c080000003724c71e14dd6a739effea1b48006be61ffe0000e103000000f8000004003f010039d8f986ff01000300000004af50d50700000000000200e3ad316a1983000000001d00e0dfcb24281e27800000100076c3979ac40000bd15020078a1dfd300881a8365b1b16d7436"}, 0x80, &(0x7f0000447ff0), 0x0, &(0x7f00006e9c68)}, 0x0) 2018/04/11 12:45:34 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000200)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc-cast5-avx\x00'}, 0x58) pipe2(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}, 0x800) ioctl$EVIOCGKEYCODE_V2(r1, 0x80284504, &(0x7f0000000080)=""/169) ioctl$KVM_X86_SET_MCE(r2, 0x4040ae9e, &(0x7f0000000140)={0xc80000000000000, 0x0, 0x1, 0x4, 0x19}) r3 = accept$alg(r0, 0x0, 0x0) dup3(0xffffffffffffffff, r3, 0x0) [ 632.594664] ? _raw_spin_unlock_irq+0x27/0x70 [ 632.599177] ? finish_task_switch+0x1ca/0x820 [ 632.603693] ? syscall_return_slowpath+0x5c0/0x5c0 [ 632.608637] ? syscall_return_slowpath+0x30f/0x5c0 [ 632.613591] ? entry_SYSCALL_64_after_hwframe+0x52/0xb7 [ 632.618975] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 632.623839] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 632.629034] RIP: 0033:0x455259 [ 632.632232] RSP: 002b:00007f95e4cadb08 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 632.639967] RAX: ffffffffffffffda RBX: 0000000000000015 RCX: 0000000000455259 2018/04/11 12:45:34 executing program 6: r0 = socket$inet6(0xa, 0x80003, 0xff) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @ipv4={[], [0xff, 0xff], @dev={0xac, 0x14, 0x14, 0x1b}}}, 0x1c) sendmsg(r0, &(0x7f000001b000)={0x0, 0xfffffff5, &(0x7f0000019fa0), 0x94, &(0x7f000001ef08)}, 0x0) [ 632.647246] RDX: 00000000004b9bc5 RSI: 0000000020000040 RDI: 0000000020000000 [ 632.654530] RBP: 0000000020000000 R08: 00007f95e4cadb20 R09: 0000000000000000 [ 632.661807] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 632.669084] R13: 0000000000000000 R14: 0000000000000000 R15: 0000000000000000 2018/04/11 12:45:34 executing program 1: r0 = socket(0x1e, 0x1, 0x0) setsockopt$packet_tx_ring(r0, 0x10f, 0x87, &(0x7f0000b89fe4)=@req={0x772}, 0x10) sendmsg(r0, &(0x7f0000030000)={&(0x7f00004f5000)=@generic={0x10000000001e, "0014000900000000040000000226cc573c080000003724c71e14dd6a739effea1b48006be61ffe0000e103000000f8000004003f010039d8f986ff01000300000004af50d50700000000000000e3ad316a1983000000001d00e0dfcb24281e27800000100076c3979ac40000bd15020078a1dfd300881a8365b1b16d7436"}, 0x80, &(0x7f0000447ff0), 0x0, &(0x7f00006e9c68)}, 0x0) 2018/04/11 12:45:34 executing program 5: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000200)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc-cast5-avx\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) llistxattr(&(0x7f0000000100)='./file0\x00', &(0x7f0000000280)=""/197, 0xc5) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00003bcfd0)="d3ab27191a", 0x5) sendmmsg$alg(r1, &(0x7f0000007e40)=[{0x0, 0x0, &(0x7f0000000900)}], 0x1, 0x0) accept(r0, &(0x7f0000000040)=@pppol2tpv3in6, &(0x7f00000000c0)=0x80) 2018/04/11 12:45:34 executing program 6: r0 = socket$inet6(0xa, 0x80003, 0xff) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @ipv4={[], [0xff, 0xff], @dev={0xac, 0x14, 0x14, 0x1b}}}, 0x1c) sendmsg(r0, &(0x7f000001b000)={0x0, 0xfffffff5, &(0x7f0000019fa0), 0x1da, &(0x7f000001ef08)}, 0x0) 2018/04/11 12:45:34 executing program 4 (fault-call:1 fault-nth:19): perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_fuseblk_mount(&(0x7f0000000040)='./file0\x00', &(0x7f0000000000)='./file0\x00', 0x4000, 0x0, 0x0, 0x0, 0x0, 0x0) 2018/04/11 12:45:34 executing program 7: syz_emit_ethernet(0x66, &(0x7f0000000000)={@random="cd3997030f00", @empty=[0x0, 0x0, 0x0, 0x0, 0x8], [], {@ipv6={0x86dd, {0x0, 0x6, "b40900", 0x30, 0x67, 0x0, @ipv4={[], [0xff, 0xff], @multicast2=0xe0000002}, @mcast2={0xff, 0x2, [], 0x1}, {[], @icmpv6=@time_exceed={0x21, 0x0, 0x0, 0x0, [], {0x0, 0x6, "b680fa", 0x0, 0x0, 0x0, @ipv4={[], [0xff, 0xff], @broadcast=0xffffffff}, @ipv4={[], [0xff, 0xff], @remote={0xac, 0x14, 0xffffffffffffffff, 0xbb}}}}}}}}}, 0x0) 2018/04/11 12:45:34 executing program 0: r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000200)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc-cast5-avx\x00'}, 0x58) r2 = accept$alg(r1, 0x0, 0x0) r3 = syz_open_dev$amidi(&(0x7f0000000040)='/dev/amidi#\x00', 0x6, 0x80000) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000080)={0x0}, &(0x7f00000000c0)=0xc) r5 = geteuid() ioctl$DRM_IOCTL_GET_CLIENT(r3, 0xc0286405, &(0x7f0000000100)={0x2, 0x2f, r4, 0x3, r5, 0x3, 0x80000000, 0xe7}) dup3(r0, r2, 0x0) 2018/04/11 12:45:34 executing program 2: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x1e, 0x1, 0x0) setsockopt$packet_tx_ring(r0, 0x10f, 0x87, &(0x7f0000b89fe4)=@req={0x772}, 0x10) sendmsg(r0, &(0x7f0000030000)={&(0x7f00004f5000)=@generic={0x10000000001e, "0100000900000000000000000226cc573c080000003724c71e14dd6a739effea1b48006be61ffe0000e103000000f8000004003f010039d8f986ff01000300000004af50d50700000000040000e3ad316a1983000000001d00e0dfcb24281e27800000100076c3979ac40000bd15020078a1dfd300881a8365b1b16d7436"}, 0x80, &(0x7f0000447ff0), 0x0, &(0x7f00006e9c68)}, 0x0) [ 632.881666] FAULT_INJECTION: forcing a failure. [ 632.881666] name failslab, interval 1, probability 0, space 0, times 0 [ 632.893013] CPU: 0 PID: 3504 Comm: syz-executor4 Not tainted 4.16.0+ #17 [ 632.899871] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 632.909238] Call Trace: [ 632.911853] dump_stack+0x1b9/0x294 [ 632.915505] ? dump_stack_print_info.cold.2+0x52/0x52 [ 632.920740] should_fail.cold.4+0xa/0x1a [ 632.924832] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 632.929957] ? save_stack+0x43/0xd0 [ 632.933597] ? kmem_cache_alloc_trace+0x152/0x780 [ 632.938460] ? __memcg_init_list_lru_node+0x17d/0x2c0 [ 632.943665] ? __list_lru_init+0x456/0x790 [ 632.947908] ? sget_userns+0x6d9/0xf20 [ 632.951811] ? graph_lock+0x170/0x170 [ 632.955628] ? vfs_kern_mount.part.34+0xd4/0x4d0 [ 632.960393] ? do_mount+0x564/0x3070 [ 632.964117] ? ksys_mount+0x12d/0x140 [ 632.967919] ? SyS_mount+0x35/0x50 [ 632.971471] ? do_syscall_64+0x29e/0x9d0 [ 632.975542] ? entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 632.981012] ? find_held_lock+0x36/0x1c0 [ 632.985098] ? __lock_is_held+0xb5/0x140 [ 632.989197] ? check_same_owner+0x320/0x320 [ 632.993627] ? rcu_note_context_switch+0x710/0x710 [ 632.998584] __should_failslab+0x124/0x180 [ 633.002842] should_failslab+0x9/0x14 [ 633.006659] kmem_cache_alloc_trace+0x2cb/0x780 [ 633.011428] ? __kmalloc_node+0x33/0x70 [ 633.015413] ? __kmalloc_node+0x33/0x70 [ 633.019398] ? rcu_read_lock_sched_held+0x108/0x120 [ 633.024441] __memcg_init_list_lru_node+0x17d/0x2c0 [ 633.029477] ? kvfree_rcu+0x20/0x20 [ 633.033113] ? __kmalloc_node+0x47/0x70 [ 633.037200] __list_lru_init+0x456/0x790 [ 633.041280] ? list_lru_destroy+0x4c0/0x4c0 [ 633.045605] ? mark_held_locks+0xc9/0x160 [ 633.049761] ? __raw_spin_lock_init+0x1c/0x100 [ 633.054359] ? trace_hardirqs_on_caller+0x421/0x5c0 [ 633.059384] ? __lockdep_init_map+0x105/0x590 [ 633.063891] ? lockdep_init_map+0x9/0x10 [ 633.067965] sget_userns+0x6d9/0xf20 [ 633.071683] ? kill_litter_super+0x90/0x90 [ 633.075928] ? ns_test_super+0x50/0x50 [ 633.079826] ? destroy_unused_super.part.9+0x100/0x100 [ 633.085111] ? do_raw_spin_trylock+0x1b0/0x1b0 [ 633.089712] ? kasan_check_write+0x14/0x20 [ 633.093955] ? do_raw_spin_lock+0xc1/0x200 [ 633.098207] ? blkdev_get+0xc0/0xb30 [ 633.101940] ? cap_capable+0x1f9/0x260 [ 633.105847] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 633.111387] ? security_capable+0x99/0xc0 [ 633.115551] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 633.121092] ? ns_capable_common+0x13f/0x170 [ 633.125507] ? kill_litter_super+0x90/0x90 [ 633.129742] sget+0x10b/0x150 [ 633.132851] ? ns_test_super+0x50/0x50 [ 633.136746] mount_bdev+0x111/0x3e0 [ 633.140381] ? fuse_get_root_inode+0x190/0x190 [ 633.144994] fuse_mount_blk+0x34/0x40 [ 633.148812] mount_fs+0xae/0x328 [ 633.152206] vfs_kern_mount.part.34+0xd4/0x4d0 [ 633.156814] ? may_umount+0xb0/0xb0 [ 633.160451] ? _raw_read_unlock+0x22/0x30 [ 633.164614] ? __get_fs_type+0x97/0xc0 [ 633.168529] do_mount+0x564/0x3070 [ 633.172092] ? copy_mount_string+0x40/0x40 [ 633.176336] ? rcu_pm_notify+0xc0/0xc0 [ 633.180258] ? copy_mount_options+0x5f/0x380 [ 633.184683] ? rcu_read_lock_sched_held+0x108/0x120 [ 633.189716] ? kmem_cache_alloc_trace+0x616/0x780 [ 633.194579] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 633.200131] ? _copy_from_user+0xdf/0x150 [ 633.204312] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 633.209864] ? copy_mount_options+0x285/0x380 [ 633.214379] ksys_mount+0x12d/0x140 [ 633.218020] SyS_mount+0x35/0x50 [ 633.221396] ? ksys_mount+0x140/0x140 [ 633.225209] do_syscall_64+0x29e/0x9d0 [ 633.229199] ? vmalloc_sync_all+0x30/0x30 [ 633.233421] ? _raw_spin_unlock_irq+0x27/0x70 [ 633.237930] ? finish_task_switch+0x1ca/0x820 [ 633.242436] ? syscall_return_slowpath+0x5c0/0x5c0 [ 633.247377] ? syscall_return_slowpath+0x30f/0x5c0 [ 633.252328] ? entry_SYSCALL_64_after_hwframe+0x52/0xb7 [ 633.257725] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 633.262597] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 633.267791] RIP: 0033:0x455259 [ 633.270986] RSP: 002b:00007f95e4cadb08 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 2018/04/11 12:45:34 executing program 7: syz_emit_ethernet(0x66, &(0x7f0000000000)={@random="cd3997030f00", @empty=[0x0, 0x0, 0x0, 0x0, 0x8035000000000000], [], {@ipv6={0x86dd, {0x0, 0x6, "b40900", 0x30, 0x67, 0x0, @ipv4={[], [0xff, 0xff], @multicast2=0xe0000002}, @mcast2={0xff, 0x2, [], 0x1}, {[], @icmpv6=@time_exceed={0x21, 0x0, 0x0, 0x0, [], {0x0, 0x6, "b680fa", 0x0, 0x0, 0x0, @ipv4={[], [0xff, 0xff], @broadcast=0xffffffff}, @ipv4={[], [0xff, 0xff], @remote={0xac, 0x14, 0xffffffffffffffff, 0xbb}}}}}}}}}, 0x0) 2018/04/11 12:45:34 executing program 6: r0 = socket$inet6(0xa, 0x80003, 0xff) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @ipv4={[], [0xff, 0xff], @dev={0xac, 0x14, 0x14, 0x1b}}}, 0x1c) sendmsg(r0, &(0x7f000001b000)={0x0, 0xfffffff5, &(0x7f0000019fa0), 0x184, &(0x7f000001ef08)}, 0x0) 2018/04/11 12:45:34 executing program 1: r0 = socket(0x1e, 0x1, 0x0) setsockopt$packet_tx_ring(r0, 0x10f, 0x87, &(0x7f0000b89fe4)=@req={0x772}, 0x10) sendmsg(r0, &(0x7f0000030000)={&(0x7f00004f5000)=@generic={0x10000000001e, "0014000900000000020000000226cc573c080000003724c71e14dd6a739effea1b48006be61ffe0000e103000000f8000004003f010039d8f986ff01000300000004af50d50700000000000000e3ad316a1983000000001d00e0dfcb24281e27800000100076c3979ac40000bd15020078a1dfd300881a8365b1b16d7436"}, 0x80, &(0x7f0000447ff0), 0x0, &(0x7f00006e9c68)}, 0x0) 2018/04/11 12:45:34 executing program 3: semop(0x0, &(0x7f000001a000)=[{0x0, 0xffffffffffff0001}, {0x0, 0x0, 0x5}], 0x2) timer_create(0x0, &(0x7f0000cd0000)={0x0, 0x12}, &(0x7f0000044000)) timer_settime(0x0, 0x0, &(0x7f00004b1fe0)={{0x0, 0x1c9c380}, {0x0, 0x9}}, &(0x7f0000040000)) r0 = getpgid(0x0) tkill(r0, 0x1000000000016) 2018/04/11 12:45:34 executing program 5: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000200)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc-cast5-avx\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000100)="4df4c6a0fdc89cc51f0adbd4d365fa697410d5ba287539fd3c421a7f1ba1bdd7b6969f474cecd5a2cc0e15475e93e7f12ca1da32ed0307018f9bb3a39d75a22443374a5285f129db95cfe315c47f10294384da3356916c265b9a34c50972079fd722b0df1bac464b5f6a1f26b6d028ea30985fd8515e04d305d61ef0b4bbb75cff48af99d8065b17d3", 0x89) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00003bcfd0)="d3ab27191a", 0x5) sendmmsg$alg(r1, &(0x7f0000007e40)=[{0x0, 0x0, &(0x7f0000000900)}], 0x1, 0x0) accept(r0, &(0x7f0000000040)=@pppol2tpv3in6, &(0x7f00000000c0)=0x80) 2018/04/11 12:45:34 executing program 7: syz_emit_ethernet(0x66, &(0x7f0000000000)={@random="cd3997030f00", @empty=[0x0, 0x0, 0x0, 0x0, 0xffffffff00000000], [], {@ipv6={0x86dd, {0x0, 0x6, "b40900", 0x30, 0x67, 0x0, @ipv4={[], [0xff, 0xff], @multicast2=0xe0000002}, @mcast2={0xff, 0x2, [], 0x1}, {[], @icmpv6=@time_exceed={0x21, 0x0, 0x0, 0x0, [], {0x0, 0x6, "b680fa", 0x0, 0x0, 0x0, @ipv4={[], [0xff, 0xff], @broadcast=0xffffffff}, @ipv4={[], [0xff, 0xff], @remote={0xac, 0x14, 0xffffffffffffffff, 0xbb}}}}}}}}}, 0x0) [ 633.278707] RAX: ffffffffffffffda RBX: 0000000000000015 RCX: 0000000000455259 [ 633.285985] RDX: 00000000004b9bc5 RSI: 0000000020000040 RDI: 0000000020000000 [ 633.293264] RBP: 0000000020000000 R08: 00007f95e4cadb20 R09: 0000000000000000 [ 633.300543] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 633.307821] R13: 0000000000000000 R14: 0000000000000000 R15: 0000000000000000 2018/04/11 12:45:35 executing program 1: r0 = socket(0x1e, 0x1, 0x0) setsockopt$packet_tx_ring(r0, 0x10f, 0x87, &(0x7f0000b89fe4)=@req={0x772}, 0x10) sendmsg(r0, &(0x7f0000030000)={&(0x7f00004f5000)=@generic={0x10000000001e, "0014000900000000030000000226cc573c080000003724c71e14dd6a739effea1b48006be61ffe0000e103000000f8000004003f010039d8f986ff01000300000004af50d50700000000000000e3ad316a1983000000001d00e0dfcb24281e27800000100076c3979ac40000bd15020078a1dfd300881a8365b1b16d7436"}, 0x80, &(0x7f0000447ff0), 0x0, &(0x7f00006e9c68)}, 0x0) 2018/04/11 12:45:35 executing program 0: r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000200)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc-cast5-avx\x00'}, 0x58) r2 = accept$alg(r1, 0x0, 0x0) dup3(r0, r2, 0x0) socket$alg(0x26, 0x5, 0x0) 2018/04/11 12:45:35 executing program 6: r0 = socket$inet6(0xa, 0x80003, 0xff) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @ipv4={[], [0xff, 0xff], @dev={0xac, 0x14, 0x14, 0x1b}}}, 0x1c) sendmsg(r0, &(0x7f000001b000)={0x0, 0xfffffff5, &(0x7f0000019fa0), 0x1d, &(0x7f000001ef08)}, 0x0) 2018/04/11 12:45:35 executing program 2: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x1e, 0x1, 0x0) setsockopt$packet_tx_ring(r0, 0x10f, 0x87, &(0x7f0000b89fe4)=@req={0x772}, 0x10) sendmsg(r0, &(0x7f0000030000)={&(0x7f00004f5000)=@generic={0x10000000001e, "0100000900000000000000000226cc573c080000003724c71e14dd6a739effea1b48006be61ffe0000e103000000f8000004003f010039d8f986ff01000300000004af50d5070000000101d000e3ad316a1983000000001d00e0dfcb24281e27800000100076c3979ac40000bd15020078a1dfd300881a8365b1b16d7436"}, 0x80, &(0x7f0000447ff0), 0x0, &(0x7f00006e9c68)}, 0x0) 2018/04/11 12:45:35 executing program 5: r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000200)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc-cast5-avx\x00'}, 0x58) r2 = accept$alg(r1, 0x0, 0x0) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f00003bcfd0)="d3ab27191a", 0x5) r3 = dup(r0) getsockopt$inet_int(r3, 0x0, 0x37, &(0x7f0000000100), &(0x7f0000000140)=0x4) sendmmsg$alg(r2, &(0x7f0000007e40)=[{0x0, 0x0, &(0x7f0000000900)}], 0x1, 0x0) accept(r1, &(0x7f0000000040)=@pppol2tpv3in6, &(0x7f00000000c0)=0x80) 2018/04/11 12:45:35 executing program 7: syz_emit_ethernet(0x66, &(0x7f0000000000)={@random="cd3997030f00", @empty=[0x0, 0x0, 0x0, 0x0, 0x28000000], [], {@ipv6={0x86dd, {0x0, 0x6, "b40900", 0x30, 0x67, 0x0, @ipv4={[], [0xff, 0xff], @multicast2=0xe0000002}, @mcast2={0xff, 0x2, [], 0x1}, {[], @icmpv6=@time_exceed={0x21, 0x0, 0x0, 0x0, [], {0x0, 0x6, "b680fa", 0x0, 0x0, 0x0, @ipv4={[], [0xff, 0xff], @broadcast=0xffffffff}, @ipv4={[], [0xff, 0xff], @remote={0xac, 0x14, 0xffffffffffffffff, 0xbb}}}}}}}}}, 0x0) 2018/04/11 12:45:35 executing program 0: r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000200)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc-cast5-avx\x00'}, 0x58) r2 = accept$alg(r1, 0x0, 0x0) r3 = dup3(r0, r2, 0x0) setsockopt$netlink_NETLINK_ADD_MEMBERSHIP(r3, 0x10e, 0x1, &(0x7f0000000040)=0x1b, 0x4) 2018/04/11 12:45:35 executing program 1: r0 = socket(0x1e, 0x1, 0x0) setsockopt$packet_tx_ring(r0, 0x10f, 0x87, &(0x7f0000b89fe4)=@req={0x772}, 0x10) sendmsg(r0, &(0x7f0000030000)={&(0x7f00004f5000)=@generic={0x10000000001e, "0014000900000000000101d00226cc573c080000003724c71e14dd6a739effea1b48006be61ffe0000e103000000f8000004003f010039d8f986ff01000300000004af50d50700000000000000e3ad316a1983000000001d00e0dfcb24281e27800000100076c3979ac40000bd15020078a1dfd300881a8365b1b16d7436"}, 0x80, &(0x7f0000447ff0), 0x0, &(0x7f00006e9c68)}, 0x0) 2018/04/11 12:45:35 executing program 6: r0 = socket$inet6(0xa, 0x80003, 0xff) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @ipv4={[], [0xff, 0xff], @dev={0xac, 0x14, 0x14, 0x1b}}}, 0x1c) sendmsg(r0, &(0x7f000001b000)={0x0, 0xfffffff5, &(0x7f0000019fa0), 0x92, &(0x7f000001ef08)}, 0x0) 2018/04/11 12:45:35 executing program 4 (fault-call:1 fault-nth:20): perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_fuseblk_mount(&(0x7f0000000040)='./file0\x00', &(0x7f0000000000)='./file0\x00', 0x4000, 0x0, 0x0, 0x0, 0x0, 0x0) 2018/04/11 12:45:35 executing program 3: semop(0x0, &(0x7f000001a000)=[{0x0, 0xffffffffffff0001}, {0x0, 0x0, 0xe}], 0x2) timer_create(0x0, &(0x7f0000cd0000)={0x0, 0x12}, &(0x7f0000044000)) timer_settime(0x0, 0x0, &(0x7f00004b1fe0)={{0x0, 0x1c9c380}, {0x0, 0x9}}, &(0x7f0000040000)) r0 = getpgid(0x0) tkill(r0, 0x1000000000016) 2018/04/11 12:45:35 executing program 2: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x1e, 0x1, 0x0) setsockopt$packet_tx_ring(r0, 0x10f, 0x87, &(0x7f0000b89fe4)=@req={0x772}, 0x10) sendmsg(r0, &(0x7f0000030000)={&(0x7f00004f5000)=@generic={0x10000000001e, "0100000900000000000000000226cc573c080000003724c71e14dd6a739effea1b48006be61ffe0000e103000000f8000004003f010039d8f986ff01000300000004af50d50700007fffffff00e3ad316a1983000000001d00e0dfcb24281e27800000100076c3979ac40000bd15020078a1dfd300881a8365b1b16d7436"}, 0x80, &(0x7f0000447ff0), 0x0, &(0x7f00006e9c68)}, 0x0) [ 634.266952] FAULT_INJECTION: forcing a failure. [ 634.266952] name failslab, interval 1, probability 0, space 0, times 0 [ 634.278343] CPU: 0 PID: 3564 Comm: syz-executor4 Not tainted 4.16.0+ #17 [ 634.285196] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 634.294562] Call Trace: [ 634.297194] dump_stack+0x1b9/0x294 [ 634.300855] ? dump_stack_print_info.cold.2+0x52/0x52 [ 634.306092] should_fail.cold.4+0xa/0x1a [ 634.310176] ? is_bpf_text_address+0xd7/0x170 2018/04/11 12:45:35 executing program 6: r0 = socket$inet6(0xa, 0x80003, 0xff) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @ipv4={[], [0xff, 0xff], @dev={0xac, 0x14, 0x14, 0x1b}}}, 0x1c) sendmsg(r0, &(0x7f000001b000)={0x0, 0xfffffff5, &(0x7f0000019fa0), 0x11f, &(0x7f000001ef08)}, 0x0) 2018/04/11 12:45:35 executing program 5: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000200)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc-cast5-avx\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00003bcfd0)="d3ab27191a", 0x5) r2 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000100)='net/ip6_tables_names\x00') ioctl$DRM_IOCTL_RES_CTX(0xffffffffffffffff, 0xc0106426, &(0x7f0000000180)={0x1, &(0x7f0000000140)=[{0x0}]}) ioctl$DRM_IOCTL_UNLOCK(r2, 0x4008642b, &(0x7f00000001c0)={r3, 0x1}) sendmmsg$alg(r1, &(0x7f0000007e40)=[{0x0, 0x0, &(0x7f0000000900)}], 0x1, 0x0) accept(r0, &(0x7f0000000040)=@pppol2tpv3in6, &(0x7f00000000c0)=0x80) 2018/04/11 12:45:35 executing program 7: syz_emit_ethernet(0x66, &(0x7f0000000000)={@random="cd3997030f00", @empty=[0x0, 0x0, 0x0, 0x0, 0x67000000], [], {@ipv6={0x86dd, {0x0, 0x6, "b40900", 0x30, 0x67, 0x0, @ipv4={[], [0xff, 0xff], @multicast2=0xe0000002}, @mcast2={0xff, 0x2, [], 0x1}, {[], @icmpv6=@time_exceed={0x21, 0x0, 0x0, 0x0, [], {0x0, 0x6, "b680fa", 0x0, 0x0, 0x0, @ipv4={[], [0xff, 0xff], @broadcast=0xffffffff}, @ipv4={[], [0xff, 0xff], @remote={0xac, 0x14, 0xffffffffffffffff, 0xbb}}}}}}}}}, 0x0) [ 634.314698] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 634.319830] ? __save_stack_trace+0x7e/0xd0 [ 634.324176] ? graph_lock+0x170/0x170 [ 634.328011] ? find_held_lock+0x36/0x1c0 [ 634.332105] ? __lock_is_held+0xb5/0x140 [ 634.336219] ? check_same_owner+0x320/0x320 [ 634.340568] ? rcu_note_context_switch+0x710/0x710 [ 634.345527] __should_failslab+0x124/0x180 [ 634.349783] should_failslab+0x9/0x14 [ 634.353600] kmem_cache_alloc_trace+0x2cb/0x780 [ 634.358294] ? __kmalloc_node+0x33/0x70 [ 634.362284] ? __kmalloc_node+0x33/0x70 2018/04/11 12:45:36 executing program 1: r0 = socket(0x1e, 0x1, 0x0) setsockopt$packet_tx_ring(r0, 0x10f, 0x87, &(0x7f0000b89fe4)=@req={0x772}, 0x10) sendmsg(r0, &(0x7f0000030000)={&(0x7f00004f5000)=@generic={0x10000000001e, "0014000900000000000300000226cc573c080000003724c71e14dd6a739effea1b48006be61ffe0000e103000000f8000004003f010039d8f986ff01000300000004af50d50700000000000000e3ad316a1983000000001d00e0dfcb24281e27800000100076c3979ac40000bd15020078a1dfd300881a8365b1b16d7436"}, 0x80, &(0x7f0000447ff0), 0x0, &(0x7f00006e9c68)}, 0x0) 2018/04/11 12:45:36 executing program 0: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000200)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc-cast5-avx\x00'}, 0x58) accept$alg(r0, 0x0, 0x0) accept$alg(r0, 0x0, 0x0) r1 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/qat_adf_ctl\x00', 0x100, 0x0) r2 = syz_genetlink_get_family_id$ipvs(&(0x7f00000000c0)='IPVS\x00') sendmsg$IPVS_CMD_SET_CONFIG(r1, &(0x7f00000002c0)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x4}, 0xc, &(0x7f0000000280)={&(0x7f0000000100)={0xf8, r2, 0x0, 0x70bd27, 0x25dfdbfd, {0xc}, [@IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0x7fffffff}, @IPVS_CMD_ATTR_SERVICE={0x18, 0x1, [@IPVS_SVC_ATTR_PORT={0x8, 0x4, 0x4e23}, @IPVS_SVC_ATTR_FLAGS={0xc, 0x7, {0x35}}]}, @IPVS_CMD_ATTR_DAEMON={0x18, 0x3, [@IPVS_DAEMON_ATTR_MCAST_GROUP6={0x14, 0x6, @mcast2={0xff, 0x2, [], 0x1}}]}, @IPVS_CMD_ATTR_DEST={0x14, 0x2, [@IPVS_DEST_ATTR_FWD_METHOD={0x8, 0x3, 0x4}, @IPVS_DEST_ATTR_INACT_CONNS={0x8, 0x8}]}, @IPVS_CMD_ATTR_DAEMON={0x44, 0x3, [@IPVS_DAEMON_ATTR_STATE={0x8, 0x1}, @IPVS_DAEMON_ATTR_MCAST_GROUP6={0x14, 0x6, @local={0xfe, 0x80, [], 0xaa}}, @IPVS_DAEMON_ATTR_STATE={0x8, 0x1}, @IPVS_DAEMON_ATTR_MCAST_GROUP={0x8, 0x5, @dev={0xac, 0x14, 0x14, 0xc}}, @IPVS_DAEMON_ATTR_MCAST_IFN={0x14, 0x2, 'ip_vti0\x00'}]}, @IPVS_CMD_ATTR_DEST={0x54, 0x2, [@IPVS_DEST_ATTR_PORT={0x8, 0x2, 0x4e22}, @IPVS_DEST_ATTR_U_THRESH={0x8, 0x5, 0x1c32}, @IPVS_DEST_ATTR_L_THRESH={0x8, 0x6, 0x10001}, @IPVS_DEST_ATTR_L_THRESH={0x8, 0x6, 0x3ff}, @IPVS_DEST_ATTR_L_THRESH={0x8, 0x6, 0xbcae}, @IPVS_DEST_ATTR_FWD_METHOD={0x8, 0x3, 0x7}, @IPVS_DEST_ATTR_PERSIST_CONNS={0x8, 0x9}, @IPVS_DEST_ATTR_PORT={0x8, 0x2, 0x4e23}, @IPVS_DEST_ATTR_FWD_METHOD={0x8, 0x3, 0x3}, @IPVS_DEST_ATTR_INACT_CONNS={0x8, 0x8, 0x5}]}]}, 0xf8}, 0x1, 0x0, 0x0, 0x24000005}, 0x1) [ 634.366276] ? rcu_read_lock_sched_held+0x108/0x120 [ 634.371328] __memcg_init_list_lru_node+0x17d/0x2c0 [ 634.376368] ? kvfree_rcu+0x20/0x20 [ 634.380124] ? __kmalloc_node+0x47/0x70 [ 634.384139] __list_lru_init+0x456/0x790 [ 634.388260] ? list_lru_destroy+0x4c0/0x4c0 [ 634.392599] ? mark_held_locks+0xc9/0x160 [ 634.396770] ? __raw_spin_lock_init+0x1c/0x100 [ 634.401375] ? trace_hardirqs_on_caller+0x421/0x5c0 [ 634.406408] ? __lockdep_init_map+0x105/0x590 [ 634.410928] ? lockdep_init_map+0x9/0x10 [ 634.415014] sget_userns+0x6d9/0xf20 [ 634.418743] ? kill_litter_super+0x90/0x90 [ 634.423000] ? ns_test_super+0x50/0x50 [ 634.426913] ? destroy_unused_super.part.9+0x100/0x100 [ 634.432211] ? do_raw_spin_trylock+0x1b0/0x1b0 [ 634.436812] ? kasan_check_write+0x14/0x20 [ 634.441061] ? do_raw_spin_lock+0xc1/0x200 [ 634.445321] ? blkdev_get+0xc0/0xb30 [ 634.449060] ? cap_capable+0x1f9/0x260 [ 634.452973] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 2018/04/11 12:45:36 executing program 2: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x1e, 0x1, 0x0) setsockopt$packet_tx_ring(r0, 0x10f, 0x87, &(0x7f0000b89fe4)=@req={0x772}, 0x10) sendmsg(r0, &(0x7f0000030000)={&(0x7f00004f5000)=@generic={0x10000000001e, "0100000900000000000000000226cc573c080000003724c71e14dd6a739effea1b48006be61ffe0000e103000000f8000004003f010039d8f986ff01000300000004af50d50700000400000000e3ad316a1983000000001d00e0dfcb24281e27800000100076c3979ac40000bd15020078a1dfd300881a8365b1b16d7436"}, 0x80, &(0x7f0000447ff0), 0x0, &(0x7f00006e9c68)}, 0x0) [ 634.464870] ? security_capable+0x99/0xc0 [ 634.469043] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 634.474599] ? ns_capable_common+0x13f/0x170 [ 634.479029] ? kill_litter_super+0x90/0x90 [ 634.483275] sget+0x10b/0x150 [ 634.486391] ? ns_test_super+0x50/0x50 [ 634.490302] mount_bdev+0x111/0x3e0 [ 634.493944] ? fuse_get_root_inode+0x190/0x190 [ 634.498541] fuse_mount_blk+0x34/0x40 [ 634.502351] mount_fs+0xae/0x328 [ 634.505749] vfs_kern_mount.part.34+0xd4/0x4d0 [ 634.510351] ? may_umount+0xb0/0xb0 [ 634.513985] ? _raw_read_unlock+0x22/0x30 2018/04/11 12:45:36 executing program 1: r0 = socket(0x1e, 0x1, 0x0) setsockopt$packet_tx_ring(r0, 0x10f, 0x87, &(0x7f0000b89fe4)=@req={0x772}, 0x10) sendmsg(r0, &(0x7f0000030000)={&(0x7f00004f5000)=@generic={0x10000000001e, "0014000900000000000000010226cc573c080000003724c71e14dd6a739effea1b48006be61ffe0000e103000000f8000004003f010039d8f986ff01000300000004af50d50700000000000000e3ad316a1983000000001d00e0dfcb24281e27800000100076c3979ac40000bd15020078a1dfd300881a8365b1b16d7436"}, 0x80, &(0x7f0000447ff0), 0x0, &(0x7f00006e9c68)}, 0x0) [ 634.518151] ? __get_fs_type+0x97/0xc0 [ 634.522064] do_mount+0x564/0x3070 [ 634.525629] ? copy_mount_string+0x40/0x40 [ 634.529881] ? rcu_pm_notify+0xc0/0xc0 [ 634.533802] ? copy_mount_options+0x5f/0x380 [ 634.538225] ? rcu_read_lock_sched_held+0x108/0x120 [ 634.543255] ? kmem_cache_alloc_trace+0x616/0x780 [ 634.548141] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 634.553688] ? copy_mount_options+0x285/0x380 [ 634.558206] ksys_mount+0x12d/0x140 [ 634.561848] SyS_mount+0x35/0x50 [ 634.565227] ? ksys_mount+0x140/0x140 [ 634.569047] do_syscall_64+0x29e/0x9d0 [ 634.572950] ? vmalloc_sync_all+0x30/0x30 [ 634.577107] ? _raw_spin_unlock_irq+0x27/0x70 [ 634.581624] ? finish_task_switch+0x1ca/0x820 [ 634.586153] ? syscall_return_slowpath+0x5c0/0x5c0 [ 634.591108] ? syscall_return_slowpath+0x30f/0x5c0 [ 634.596068] ? entry_SYSCALL_64_after_hwframe+0x52/0xb7 [ 634.601455] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 634.606324] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 634.611526] RIP: 0033:0x455259 2018/04/11 12:45:36 executing program 0: r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000200)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc-cast5-avx\x00'}, 0x58) r2 = accept$alg(r1, 0x0, 0x0) dup3(r0, r2, 0x80001) 2018/04/11 12:45:36 executing program 2: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x1e, 0x1, 0x0) setsockopt$packet_tx_ring(r0, 0x10f, 0x87, &(0x7f0000b89fe4)=@req={0x772}, 0x10) sendmsg(r0, &(0x7f0000030000)={&(0x7f00004f5000)=@generic={0x10000000001e, "0100000900000000000000000226cc573c080000003724c71e14dd6a739effea1b48006be61ffe0000e103000000f8000004003f010039d8f986ff01000300000004af50d507000000000101d0e3ad316a1983000000001d00e0dfcb24281e27800000100076c3979ac40000bd15020078a1dfd300881a8365b1b16d7436"}, 0x80, &(0x7f0000447ff0), 0x0, &(0x7f00006e9c68)}, 0x0) 2018/04/11 12:45:36 executing program 1: r0 = socket(0x1e, 0x1, 0x0) setsockopt$packet_tx_ring(r0, 0x10f, 0x87, &(0x7f0000b89fe4)=@req={0x772}, 0x10) sendmsg(r0, &(0x7f0000030000)={&(0x7f00004f5000)=@generic={0x10000000001e, "0014000900000000000000030226cc573c080000003724c71e14dd6a739effea1b48006be61ffe0000e103000000f8000004003f010039d8f986ff01000300000004af50d50700000000000000e3ad316a1983000000001d00e0dfcb24281e27800000100076c3979ac40000bd15020078a1dfd300881a8365b1b16d7436"}, 0x80, &(0x7f0000447ff0), 0x0, &(0x7f00006e9c68)}, 0x0) [ 634.614722] RSP: 002b:00007f95e4cadb08 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 634.622446] RAX: ffffffffffffffda RBX: 0000000000000015 RCX: 0000000000455259 [ 634.629720] RDX: 00000000004b9bc5 RSI: 0000000020000040 RDI: 0000000020000000 [ 634.636995] RBP: 0000000020000000 R08: 00007f95e4cadb20 R09: 0000000000000000 [ 634.644274] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 634.651553] R13: 0000000000000000 R14: 0000000000000000 R15: 0000000000000000 2018/04/11 12:45:36 executing program 5: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000200)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc-cast5-avx\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00003bcfd0)="d3ab27191a", 0x5) sendmmsg$alg(r1, &(0x7f0000007e40)=[{0x0, 0x0, &(0x7f0000000900)}], 0x1, 0x0) accept(r0, &(0x7f0000000040)=@pppol2tpv3in6, &(0x7f00000000c0)=0x80) r2 = userfaultfd(0x80000) ioctl$UFFDIO_COPY(r2, 0xc028aa03, &(0x7f0000000100)={&(0x7f0000ffc000/0x2000)=nil, 0x2000}) 2018/04/11 12:45:36 executing program 3: semop(0x0, &(0x7f000001a000)=[{0x0, 0xffffffffffff0001}, {0x0, 0x0, 0x500000000000000}], 0x2) timer_create(0x0, &(0x7f0000cd0000)={0x0, 0x12}, &(0x7f0000044000)) timer_settime(0x0, 0x0, &(0x7f00004b1fe0)={{0x0, 0x1c9c380}, {0x0, 0x9}}, &(0x7f0000040000)) r0 = getpgid(0x0) tkill(r0, 0x1000000000016) 2018/04/11 12:45:36 executing program 7: syz_emit_ethernet(0x66, &(0x7f0000000000)={@random="cd3997030f00", @empty=[0x0, 0x0, 0x0, 0x0, 0x8906], [], {@ipv6={0x86dd, {0x0, 0x6, "b40900", 0x30, 0x67, 0x0, @ipv4={[], [0xff, 0xff], @multicast2=0xe0000002}, @mcast2={0xff, 0x2, [], 0x1}, {[], @icmpv6=@time_exceed={0x21, 0x0, 0x0, 0x0, [], {0x0, 0x6, "b680fa", 0x0, 0x0, 0x0, @ipv4={[], [0xff, 0xff], @broadcast=0xffffffff}, @ipv4={[], [0xff, 0xff], @remote={0xac, 0x14, 0xffffffffffffffff, 0xbb}}}}}}}}}, 0x0) 2018/04/11 12:45:36 executing program 0: r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$alg(0x26, 0x5, 0x0) preadv(r1, &(0x7f00000001c0)=[{&(0x7f0000000040)=""/109, 0x6d}, {&(0x7f00000000c0)=""/252, 0xfc}], 0x2, 0x0) bind$alg(r1, &(0x7f0000000200)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc-cast5-avx\x00'}, 0x58) r2 = accept$alg(r1, 0x0, 0x0) dup3(r0, r2, 0x0) 2018/04/11 12:45:36 executing program 1: r0 = socket(0x1e, 0x1, 0x0) setsockopt$packet_tx_ring(r0, 0x10f, 0x87, &(0x7f0000b89fe4)=@req={0x772}, 0x10) sendmsg(r0, &(0x7f0000030000)={&(0x7f00004f5000)=@generic={0x10000000001e, "0014000900000000000000000126cc573c080000003724c71e14dd6a739effea1b48006be61ffe0000e103000000f8000004003f010039d8f986ff01000300000004af50d50700000000000000e3ad316a1983000000001d00e0dfcb24281e27800000100076c3979ac40000bd15020078a1dfd300881a8365b1b16d7436"}, 0x80, &(0x7f0000447ff0), 0x0, &(0x7f00006e9c68)}, 0x0) 2018/04/11 12:45:36 executing program 5: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000200)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc-cast5-avx\x00'}, 0x58) r1 = creat(&(0x7f0000000100)='./file0\x00', 0x10) getsockopt$ax25_int(r1, 0x101, 0x5, &(0x7f0000000140), &(0x7f0000000180)=0x4) r2 = accept$alg(r0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00003bcfd0)="d3ab27191a", 0x5) setsockopt$inet_sctp6_SCTP_RECVNXTINFO(r1, 0x84, 0x21, &(0x7f00000001c0)=0x6, 0x4) sendmmsg$alg(r2, &(0x7f0000007e40)=[{0x0, 0x0, &(0x7f0000000900)}], 0x1, 0x0) accept(r0, &(0x7f0000000040)=@pppol2tpv3in6, &(0x7f00000000c0)=0x80) 2018/04/11 12:45:36 executing program 4 (fault-call:1 fault-nth:21): perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_fuseblk_mount(&(0x7f0000000040)='./file0\x00', &(0x7f0000000000)='./file0\x00', 0x4000, 0x0, 0x0, 0x0, 0x0, 0x0) 2018/04/11 12:45:36 executing program 2: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x1e, 0x1, 0x0) setsockopt$packet_tx_ring(r0, 0x10f, 0x87, &(0x7f0000b89fe4)=@req={0x772}, 0x10) sendmsg(r0, &(0x7f0000030000)={&(0x7f00004f5000)=@generic={0x10000000001e, "0100000900000000000000000226cc573c080000003724c71e14dd6a739effea1b48006be61ffe0000e103000000f8000004003f010039d8f986ff01000300000004af50d5070000007fffffffe3ad316a1983000000001d00e0dfcb24281e27800000100076c3979ac40000bd15020078a1dfd300881a8365b1b16d7436"}, 0x80, &(0x7f0000447ff0), 0x0, &(0x7f00006e9c68)}, 0x0) 2018/04/11 12:45:36 executing program 6: r0 = socket$inet6(0xa, 0x80003, 0xff) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @ipv4={[], [0xff, 0xff], @dev={0xac, 0x14, 0x14, 0x1b}}}, 0x1c) sendmsg(r0, &(0x7f000001b000)={0x0, 0xfffffff5, &(0x7f0000019fa0), 0x19f, &(0x7f000001ef08)}, 0x0) 2018/04/11 12:45:36 executing program 7: syz_emit_ethernet(0x66, &(0x7f0000000000)={@random="cd3997030f00", @empty=[0x0, 0x0, 0x0, 0x0, 0x4888], [], {@ipv6={0x86dd, {0x0, 0x6, "b40900", 0x30, 0x67, 0x0, @ipv4={[], [0xff, 0xff], @multicast2=0xe0000002}, @mcast2={0xff, 0x2, [], 0x1}, {[], @icmpv6=@time_exceed={0x21, 0x0, 0x0, 0x0, [], {0x0, 0x6, "b680fa", 0x0, 0x0, 0x0, @ipv4={[], [0xff, 0xff], @broadcast=0xffffffff}, @ipv4={[], [0xff, 0xff], @remote={0xac, 0x14, 0xffffffffffffffff, 0xbb}}}}}}}}}, 0x0) [ 635.325321] FAULT_INJECTION: forcing a failure. [ 635.325321] name failslab, interval 1, probability 0, space 0, times 0 [ 635.336655] CPU: 0 PID: 3634 Comm: syz-executor4 Not tainted 4.16.0+ #17 [ 635.343510] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 635.352882] Call Trace: [ 635.355495] dump_stack+0x1b9/0x294 [ 635.359197] ? dump_stack_print_info.cold.2+0x52/0x52 [ 635.364429] should_fail.cold.4+0xa/0x1a [ 635.368520] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 635.373641] ? save_stack+0x43/0xd0 [ 635.377290] ? kmem_cache_alloc_trace+0x152/0x780 [ 635.382153] ? __memcg_init_list_lru_node+0x17d/0x2c0 [ 635.387360] ? __list_lru_init+0x456/0x790 [ 635.391609] ? sget_userns+0x6d9/0xf20 [ 635.395513] ? graph_lock+0x170/0x170 [ 635.399333] ? vfs_kern_mount.part.34+0xd4/0x4d0 [ 635.404112] ? do_mount+0x564/0x3070 [ 635.407841] ? ksys_mount+0x12d/0x140 [ 635.411650] ? SyS_mount+0x35/0x50 [ 635.415205] ? do_syscall_64+0x29e/0x9d0 [ 635.419283] ? entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 635.424671] ? find_held_lock+0x36/0x1c0 [ 635.428765] ? __lock_is_held+0xb5/0x140 [ 635.432866] ? check_same_owner+0x320/0x320 [ 635.437214] ? rcu_note_context_switch+0x710/0x710 [ 635.442170] __should_failslab+0x124/0x180 [ 635.446430] should_failslab+0x9/0x14 [ 635.450252] kmem_cache_alloc_trace+0x2cb/0x780 [ 635.454934] ? __kmalloc_node+0x33/0x70 [ 635.458920] ? __kmalloc_node+0x33/0x70 [ 635.462911] ? rcu_read_lock_sched_held+0x108/0x120 [ 635.467963] __memcg_init_list_lru_node+0x17d/0x2c0 [ 635.473004] ? kvfree_rcu+0x20/0x20 [ 635.476645] ? __kmalloc_node+0x47/0x70 [ 635.480648] __list_lru_init+0x456/0x790 [ 635.484818] ? list_lru_destroy+0x4c0/0x4c0 [ 635.489154] ? mark_held_locks+0xc9/0x160 [ 635.493321] ? __raw_spin_lock_init+0x1c/0x100 [ 635.497924] ? trace_hardirqs_on_caller+0x421/0x5c0 [ 635.502957] ? __lockdep_init_map+0x105/0x590 [ 635.507475] ? lockdep_init_map+0x9/0x10 [ 635.511555] sget_userns+0x6d9/0xf20 [ 635.515284] ? kill_litter_super+0x90/0x90 [ 635.519539] ? ns_test_super+0x50/0x50 [ 635.523444] ? destroy_unused_super.part.9+0x100/0x100 [ 635.528819] ? do_raw_spin_trylock+0x1b0/0x1b0 [ 635.533423] ? kasan_check_write+0x14/0x20 [ 635.537672] ? do_raw_spin_lock+0xc1/0x200 [ 635.541934] ? blkdev_get+0xc0/0xb30 [ 635.545669] ? cap_capable+0x1f9/0x260 [ 635.549583] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 635.555125] ? security_capable+0x99/0xc0 [ 635.559262] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 635.564782] ? ns_capable_common+0x13f/0x170 [ 635.569180] ? kill_litter_super+0x90/0x90 [ 635.573401] sget+0x10b/0x150 [ 635.576493] ? ns_test_super+0x50/0x50 [ 635.580371] mount_bdev+0x111/0x3e0 [ 635.583984] ? fuse_get_root_inode+0x190/0x190 [ 635.588558] fuse_mount_blk+0x34/0x40 [ 635.592364] mount_fs+0xae/0x328 [ 635.595734] vfs_kern_mount.part.34+0xd4/0x4d0 [ 635.600304] ? may_umount+0xb0/0xb0 [ 635.603915] ? _raw_read_unlock+0x22/0x30 [ 635.608052] ? __get_fs_type+0x97/0xc0 [ 635.611932] do_mount+0x564/0x3070 [ 635.615477] ? copy_mount_string+0x40/0x40 [ 635.619700] ? rcu_pm_notify+0xc0/0xc0 [ 635.623580] ? copy_mount_options+0x5f/0x380 [ 635.627972] ? rcu_read_lock_sched_held+0x108/0x120 [ 635.632984] ? kmem_cache_alloc_trace+0x616/0x780 [ 635.637827] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 635.643349] ? _copy_from_user+0xdf/0x150 [ 635.647488] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 635.653017] ? copy_mount_options+0x285/0x380 [ 635.657512] ksys_mount+0x12d/0x140 [ 635.661125] SyS_mount+0x35/0x50 [ 635.664473] ? ksys_mount+0x140/0x140 [ 635.668274] do_syscall_64+0x29e/0x9d0 [ 635.672151] ? vmalloc_sync_all+0x30/0x30 [ 635.676282] ? _raw_spin_unlock_irq+0x27/0x70 [ 635.680764] ? finish_task_switch+0x1ca/0x820 [ 635.685246] ? syscall_return_slowpath+0x5c0/0x5c0 [ 635.690162] ? syscall_return_slowpath+0x30f/0x5c0 [ 635.695087] ? entry_SYSCALL_64_after_hwframe+0x52/0xb7 [ 635.700443] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 635.705275] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 635.710445] RIP: 0033:0x455259 [ 635.713618] RSP: 002b:00007f95e4cadb08 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 635.721322] RAX: ffffffffffffffda RBX: 0000000000000015 RCX: 0000000000455259 [ 635.728583] RDX: 00000000004b9bc5 RSI: 0000000020000040 RDI: 0000000020000000 [ 635.735839] RBP: 0000000020000000 R08: 00007f95e4cadb20 R09: 0000000000000000 [ 635.743103] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 635.750379] R13: 0000000000000000 R14: 0000000000000000 R15: 0000000000000000 2018/04/11 12:45:37 executing program 6: r0 = socket$inet6(0xa, 0x80003, 0xff) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @ipv4={[], [0xff, 0xff], @dev={0xac, 0x14, 0x14, 0x1b}}}, 0x1c) sendmsg(r0, &(0x7f000001b000)={0x0, 0xfffffff5, &(0x7f0000019fa0), 0x3e, &(0x7f000001ef08)}, 0x0) 2018/04/11 12:45:37 executing program 0: r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$autofs(0xffffffffffffff9c, &(0x7f0000000080)='/dev/autofs\x00', 0x200701, 0x0) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000200)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc-cast5-avx\x00'}, 0x58) r2 = accept$alg(r1, 0x0, 0x0) r3 = dup3(r0, r2, 0x0) setsockopt$inet_sctp6_SCTP_I_WANT_MAPPED_V4_ADDR(r3, 0x84, 0xc, &(0x7f0000000040)=0x1000, 0x4) 2018/04/11 12:45:37 executing program 7: syz_emit_ethernet(0x66, &(0x7f0000000000)={@random="cd3997030f00", @empty=[0x0, 0x0, 0x0, 0x0, 0xffffa888], [], {@ipv6={0x86dd, {0x0, 0x6, "b40900", 0x30, 0x67, 0x0, @ipv4={[], [0xff, 0xff], @multicast2=0xe0000002}, @mcast2={0xff, 0x2, [], 0x1}, {[], @icmpv6=@time_exceed={0x21, 0x0, 0x0, 0x0, [], {0x0, 0x6, "b680fa", 0x0, 0x0, 0x0, @ipv4={[], [0xff, 0xff], @broadcast=0xffffffff}, @ipv4={[], [0xff, 0xff], @remote={0xac, 0x14, 0xffffffffffffffff, 0xbb}}}}}}}}}, 0x0) 2018/04/11 12:45:37 executing program 1: r0 = socket(0x1e, 0x1, 0x0) setsockopt$packet_tx_ring(r0, 0x10f, 0x87, &(0x7f0000b89fe4)=@req={0x772}, 0x10) sendmsg(r0, &(0x7f0000030000)={&(0x7f00004f5000)=@generic={0x10000000001e, "0014000900000000000300000226cc573c080000003724c71e14dd6a739effea1b48006be61ffe0000e103000000f8000004003f010039d8f986ff01000300000004af50d50700000000000000e3ad316a1983000000001d00e0dfcb24281e27800000100076c3979ac40000bd15020078a1dfd300881a8365b1b16d7436"}, 0x80, &(0x7f0000447ff0), 0x0, &(0x7f00006e9c68)}, 0x0) 2018/04/11 12:45:37 executing program 2: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x1e, 0x1, 0x0) setsockopt$packet_tx_ring(r0, 0x10f, 0x87, &(0x7f0000b89fe4)=@req={0x772}, 0x10) sendmsg(r0, &(0x7f0000030000)={&(0x7f00004f5000)=@generic={0x10000000001e, "0100000900000000000000000226cc573c080000003724c71e14dd6a739effea1b48006be61ffe0000e103000000f8000004003f010039d8f986ff01000300000004af50d50700000004000000e3ad316a1983000000001d00e0dfcb24281e27800000100076c3979ac40000bd15020078a1dfd300881a8365b1b16d7436"}, 0x80, &(0x7f0000447ff0), 0x0, &(0x7f00006e9c68)}, 0x0) 2018/04/11 12:45:37 executing program 5: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x74f368b7}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000200)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc-cast5-avx\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00003bcfd0)="d3ab27191a", 0x5) sendmmsg$alg(r1, &(0x7f0000007e40)=[{0x0, 0x0, &(0x7f0000000900)}], 0x1, 0x0) accept(r0, &(0x7f0000000280)=@pppol2tpv3in6, &(0x7f0000000100)=0x80) 2018/04/11 12:45:37 executing program 3: semop(0x0, &(0x7f000001a000)=[{0x0, 0xffffffffffff0001}, {0x0, 0x0, 0xe000000}], 0x2) timer_create(0x0, &(0x7f0000cd0000)={0x0, 0x12}, &(0x7f0000044000)) timer_settime(0x0, 0x0, &(0x7f00004b1fe0)={{0x0, 0x1c9c380}, {0x0, 0x9}}, &(0x7f0000040000)) r0 = getpgid(0x0) tkill(r0, 0x1000000000016) 2018/04/11 12:45:37 executing program 4 (fault-call:1 fault-nth:22): perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_fuseblk_mount(&(0x7f0000000040)='./file0\x00', &(0x7f0000000000)='./file0\x00', 0x4000, 0x0, 0x0, 0x0, 0x0, 0x0) [ 636.222742] FAULT_INJECTION: forcing a failure. [ 636.222742] name failslab, interval 1, probability 0, space 0, times 0 [ 636.234095] CPU: 0 PID: 3652 Comm: syz-executor4 Not tainted 4.16.0+ #17 [ 636.240955] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 636.250335] Call Trace: [ 636.252952] dump_stack+0x1b9/0x294 [ 636.256610] ? dump_stack_print_info.cold.2+0x52/0x52 [ 636.261842] should_fail.cold.4+0xa/0x1a [ 636.265932] ? fault_create_debugfs_attr+0x1f0/0x1f0 2018/04/11 12:45:37 executing program 5: socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff}) setsockopt$SO_TIMESTAMPING(r0, 0x1, 0x25, &(0x7f0000000140)=0x302, 0x4) r1 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000200)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc-cast5-avx\x00'}, 0x58) r3 = accept$alg(r2, 0x0, 0x0) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f00003bcfd0)="d3ab27191a", 0x5) sendmmsg$alg(r3, &(0x7f0000007e40)=[{0x0, 0x0, &(0x7f0000000900)}], 0x1, 0x0) accept(r2, &(0x7f0000000040)=@pppol2tpv3in6, &(0x7f00000000c0)=0x80) write$cgroup_type(r1, &(0x7f0000000180)='threaded\x00', 0x9) 2018/04/11 12:45:37 executing program 0: r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000040)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc-cast5-avx\x00'}, 0x58) r2 = accept$alg(r1, 0x0, 0x0) r3 = openat$ipvs(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/sys/net/ipv4/vs/lblcr_expiration\x00', 0x2, 0x0) ioctl$SNDRV_TIMER_IOCTL_GINFO(r3, 0xc0f85403, &(0x7f0000000100)={{0x1, 0x3, 0x8, 0x0, 0xff}, 0x0, 0x2, 'id0\x00', 'timer0\x00', 0x0, 0x1, 0x503, 0x7f35, 0x20}) setsockopt$ALG_SET_AEAD_AUTHSIZE(r1, 0x117, 0x5, 0x0, 0x8da8a74) dup3(r0, r2, 0x0) 2018/04/11 12:45:37 executing program 1: r0 = socket(0x1e, 0x1, 0x0) setsockopt$packet_tx_ring(r0, 0x10f, 0x87, &(0x7f0000b89fe4)=@req={0x772}, 0x10) sendmsg(r0, &(0x7f0000030000)={&(0x7f00004f5000)=@generic={0x10000000001e, "0014000900000000000200000226cc573c080000003724c71e14dd6a739effea1b48006be61ffe0000e103000000f8000004003f010039d8f986ff01000300000004af50d50700000000000000e3ad316a1983000000001d00e0dfcb24281e27800000100076c3979ac40000bd15020078a1dfd300881a8365b1b16d7436"}, 0x80, &(0x7f0000447ff0), 0x0, &(0x7f00006e9c68)}, 0x0) [ 636.271058] ? save_stack+0x43/0xd0 [ 636.274698] ? kmem_cache_alloc_trace+0x152/0x780 [ 636.279558] ? __memcg_init_list_lru_node+0x17d/0x2c0 [ 636.284760] ? __list_lru_init+0x456/0x790 [ 636.289007] ? sget_userns+0x6d9/0xf20 [ 636.292913] ? graph_lock+0x170/0x170 [ 636.296728] ? vfs_kern_mount.part.34+0xd4/0x4d0 [ 636.301490] ? do_mount+0x564/0x3070 [ 636.305214] ? ksys_mount+0x12d/0x140 [ 636.309035] ? SyS_mount+0x35/0x50 [ 636.312593] ? do_syscall_64+0x29e/0x9d0 [ 636.316673] ? entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 636.322070] ? find_held_lock+0x36/0x1c0 [ 636.326160] ? __lock_is_held+0xb5/0x140 [ 636.330263] ? check_same_owner+0x320/0x320 [ 636.334612] ? rcu_note_context_switch+0x710/0x710 [ 636.339571] __should_failslab+0x124/0x180 [ 636.343830] should_failslab+0x9/0x14 [ 636.347659] kmem_cache_alloc_trace+0x2cb/0x780 [ 636.352340] ? __kmalloc_node+0x33/0x70 [ 636.356330] ? __kmalloc_node+0x33/0x70 [ 636.360319] ? rcu_read_lock_sched_held+0x108/0x120 [ 636.365367] __memcg_init_list_lru_node+0x17d/0x2c0 2018/04/11 12:45:38 executing program 7: syz_emit_ethernet(0x66, &(0x7f0000000000)={@random="cd3997030f00", @empty=[0x0, 0x0, 0x0, 0x0, 0x800000000000000], [], {@ipv6={0x86dd, {0x0, 0x6, "b40900", 0x30, 0x67, 0x0, @ipv4={[], [0xff, 0xff], @multicast2=0xe0000002}, @mcast2={0xff, 0x2, [], 0x1}, {[], @icmpv6=@time_exceed={0x21, 0x0, 0x0, 0x0, [], {0x0, 0x6, "b680fa", 0x0, 0x0, 0x0, @ipv4={[], [0xff, 0xff], @broadcast=0xffffffff}, @ipv4={[], [0xff, 0xff], @remote={0xac, 0x14, 0xffffffffffffffff, 0xbb}}}}}}}}}, 0x0) [ 636.370408] ? kvfree_rcu+0x20/0x20 [ 636.374057] ? __kmalloc_node+0x47/0x70 [ 636.378110] __list_lru_init+0x456/0x790 [ 636.385242] ? list_lru_destroy+0x4c0/0x4c0 [ 636.389577] ? mark_held_locks+0xc9/0x160 [ 636.393745] ? __raw_spin_lock_init+0x1c/0x100 [ 636.398344] ? trace_hardirqs_on_caller+0x421/0x5c0 [ 636.403373] ? __lockdep_init_map+0x105/0x590 [ 636.407885] ? lockdep_init_map+0x9/0x10 [ 636.411963] sget_userns+0x6d9/0xf20 [ 636.415686] ? kill_litter_super+0x90/0x90 [ 636.419940] ? ns_test_super+0x50/0x50 2018/04/11 12:45:38 executing program 5: r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000200)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc-cast5-avx\x00'}, 0x58) r2 = accept$alg(r1, 0x0, 0x0) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f00003bcfd0)="d3ab27191a", 0x5) sendmmsg$alg(r2, &(0x7f0000007e40)=[{0x0, 0x0, &(0x7f0000000900)}], 0x1, 0x0) epoll_wait(r0, &(0x7f0000000100)=[{}], 0x1, 0x461) accept(r1, &(0x7f00000002c0)=@pppol2tpv3in6, &(0x7f0000000280)=0x80) 2018/04/11 12:45:38 executing program 1: r0 = socket(0x1e, 0x1, 0x0) setsockopt$packet_tx_ring(r0, 0x10f, 0x87, &(0x7f0000b89fe4)=@req={0x772}, 0x10) sendmsg(r0, &(0x7f0000030000)={&(0x7f00004f5000)=@generic={0x10000000001e, "0014000900000000000400000226cc573c080000003724c71e14dd6a739effea1b48006be61ffe0000e103000000f8000004003f010039d8f986ff01000300000004af50d50700000000000000e3ad316a1983000000001d00e0dfcb24281e27800000100076c3979ac40000bd15020078a1dfd300881a8365b1b16d7436"}, 0x80, &(0x7f0000447ff0), 0x0, &(0x7f00006e9c68)}, 0x0) [ 636.423840] ? destroy_unused_super.part.9+0x100/0x100 [ 636.429133] ? do_raw_spin_trylock+0x1b0/0x1b0 [ 636.433737] ? kasan_check_write+0x14/0x20 [ 636.437989] ? do_raw_spin_lock+0xc1/0x200 [ 636.442257] ? blkdev_get+0xc0/0xb30 [ 636.445996] ? cap_capable+0x1f9/0x260 [ 636.449921] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 636.455472] ? security_capable+0x99/0xc0 [ 636.459633] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 636.465188] ? ns_capable_common+0x13f/0x170 [ 636.469616] ? kill_litter_super+0x90/0x90 [ 636.473865] sget+0x10b/0x150 [ 636.476994] ? ns_test_super+0x50/0x50 [ 636.480909] mount_bdev+0x111/0x3e0 [ 636.484549] ? fuse_get_root_inode+0x190/0x190 [ 636.489155] fuse_mount_blk+0x34/0x40 [ 636.492973] mount_fs+0xae/0x328 [ 636.496368] vfs_kern_mount.part.34+0xd4/0x4d0 [ 636.500973] ? may_umount+0xb0/0xb0 [ 636.504617] ? _raw_read_unlock+0x22/0x30 [ 636.508781] ? __get_fs_type+0x97/0xc0 [ 636.512691] do_mount+0x564/0x3070 [ 636.516256] ? copy_mount_string+0x40/0x40 [ 636.520505] ? rcu_pm_notify+0xc0/0xc0 2018/04/11 12:45:38 executing program 7: syz_emit_ethernet(0x66, &(0x7f0000000000)={@random="cd3997030f00", @empty=[0x0, 0x0, 0x0, 0x0, 0x8847], [], {@ipv6={0x86dd, {0x0, 0x6, "b40900", 0x30, 0x67, 0x0, @ipv4={[], [0xff, 0xff], @multicast2=0xe0000002}, @mcast2={0xff, 0x2, [], 0x1}, {[], @icmpv6=@time_exceed={0x21, 0x0, 0x0, 0x0, [], {0x0, 0x6, "b680fa", 0x0, 0x0, 0x0, @ipv4={[], [0xff, 0xff], @broadcast=0xffffffff}, @ipv4={[], [0xff, 0xff], @remote={0xac, 0x14, 0xffffffffffffffff, 0xbb}}}}}}}}}, 0x0) [ 636.524424] ? copy_mount_options+0x5f/0x380 [ 636.528846] ? rcu_read_lock_sched_held+0x108/0x120 [ 636.533873] ? kmem_cache_alloc_trace+0x616/0x780 [ 636.538733] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 636.544287] ? _copy_from_user+0xdf/0x150 [ 636.548455] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 636.554008] ? copy_mount_options+0x285/0x380 [ 636.558526] ksys_mount+0x12d/0x140 [ 636.562168] SyS_mount+0x35/0x50 [ 636.565542] ? ksys_mount+0x140/0x140 [ 636.569364] do_syscall_64+0x29e/0x9d0 2018/04/11 12:45:38 executing program 5: perf_event_open(&(0x7f000025c000)={0x2, 0xfffffffffffffd1c, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000200)={0x26, 'skcipher\x00', 0x0, 0x0, 'ctr-cast6-avx\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00003bcfd0)="d3ab27191a", 0x5) sendmmsg$alg(r1, &(0x7f0000007e40)=[{0x0, 0x0, &(0x7f0000000900)}], 0x1, 0x0) accept4$alg(r0, 0x0, 0x0, 0x0) accept(r0, &(0x7f0000000040)=@pppol2tpv3in6, &(0x7f0000000100)=0xffffff5f) [ 636.573267] ? vmalloc_sync_all+0x30/0x30 [ 636.577430] ? _raw_spin_unlock_irq+0x27/0x70 [ 636.581941] ? finish_task_switch+0x1ca/0x820 [ 636.586450] ? syscall_return_slowpath+0x5c0/0x5c0 [ 636.591399] ? syscall_return_slowpath+0x30f/0x5c0 [ 636.596351] ? entry_SYSCALL_64_after_hwframe+0x52/0xb7 [ 636.601743] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 636.606619] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 636.611820] RIP: 0033:0x455259 [ 636.615021] RSP: 002b:00007f95e4cadb08 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 636.622750] RAX: ffffffffffffffda RBX: 0000000000000015 RCX: 0000000000455259 [ 636.630031] RDX: 00000000004b9bc5 RSI: 0000000020000040 RDI: 0000000020000000 [ 636.637315] RBP: 0000000020000000 R08: 00007f95e4cadb20 R09: 0000000000000000 [ 636.644595] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 636.651878] R13: 0000000000000000 R14: 0000000000000000 R15: 0000000000000000 2018/04/11 12:45:38 executing program 7: syz_emit_ethernet(0x66, &(0x7f0000000000)={@random="cd3997030f00", @empty=[0x0, 0x0, 0x0, 0x0, 0x4305], [], {@ipv6={0x86dd, {0x0, 0x6, "b40900", 0x30, 0x67, 0x0, @ipv4={[], [0xff, 0xff], @multicast2=0xe0000002}, @mcast2={0xff, 0x2, [], 0x1}, {[], @icmpv6=@time_exceed={0x21, 0x0, 0x0, 0x0, [], {0x0, 0x6, "b680fa", 0x0, 0x0, 0x0, @ipv4={[], [0xff, 0xff], @broadcast=0xffffffff}, @ipv4={[], [0xff, 0xff], @remote={0xac, 0x14, 0xffffffffffffffff, 0xbb}}}}}}}}}, 0x0) 2018/04/11 12:45:38 executing program 2: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x1e, 0x1, 0x0) setsockopt$packet_tx_ring(r0, 0x10f, 0x87, &(0x7f0000b89fe4)=@req={0x772}, 0x10) sendmsg(r0, &(0x7f0000030000)={&(0x7f00004f5000)=@generic={0x10000000001e, "0100000900000000000000000226cc573c080000003724c71e14dd6a739effea1b48006be61ffe0000e103000000f8000004003f010039d8f986ff01000300000004af50d50700000002000000e3ad316a1983000000001d00e0dfcb24281e27800000100076c3979ac40000bd15020078a1dfd300881a8365b1b16d7436"}, 0x80, &(0x7f0000447ff0), 0x0, &(0x7f00006e9c68)}, 0x0) 2018/04/11 12:45:38 executing program 6: r0 = socket$inet6(0xa, 0x80003, 0xff) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @ipv4={[], [0xff, 0xff], @dev={0xac, 0x14, 0x14, 0x1b}}}, 0x1c) sendmsg(r0, &(0x7f000001b000)={0x0, 0xfffffff5, &(0x7f0000019fa0), 0xe2, &(0x7f000001ef08)}, 0x0) 2018/04/11 12:45:38 executing program 5: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000200)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc-cast5-avx\x00'}, 0x58) r1 = openat$rfkill(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/rfkill\x00', 0x30100, 0x0) r2 = syz_genetlink_get_family_id$ipvs(&(0x7f00000003c0)='IPVS\x00') sendmsg$IPVS_CMD_GET_DAEMON(r1, &(0x7f00000004c0)={&(0x7f0000000380)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f0000000480)={&(0x7f0000000400)={0x44, r2, 0x300, 0x70bd27, 0x25dfdbfd, {0xb}, [@IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0x3}, @IPVS_CMD_ATTR_SERVICE={0x4, 0x1}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0x52}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x1}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0x8}, @IPVS_CMD_ATTR_DEST={0xc, 0x2, [@IPVS_DEST_ATTR_FWD_METHOD={0x8, 0x3, 0x2}]}]}, 0x44}, 0x1, 0x0, 0x0, 0x800}, 0x20000004) r3 = accept$alg(r0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00003bcfd0)="d3ab27191a", 0x5) sendmmsg$alg(r3, &(0x7f0000007e40)=[{0x0, 0x0, &(0x7f0000000900)}], 0x1, 0x0) accept(r0, &(0x7f0000000040)=@pppol2tpv3in6, &(0x7f00000000c0)=0x80) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='ext4\x00', 0x220000, &(0x7f0000000280)="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") 2018/04/11 12:45:38 executing program 4 (fault-call:1 fault-nth:23): perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_fuseblk_mount(&(0x7f0000000040)='./file0\x00', &(0x7f0000000000)='./file0\x00', 0x4000, 0x0, 0x0, 0x0, 0x0, 0x0) 2018/04/11 12:45:38 executing program 3: semop(0x0, &(0x7f000001a000)=[{0x0, 0xffffffffffff0001}, {0x0, 0x0, 0x3f000000}], 0x2) timer_create(0x0, &(0x7f0000cd0000)={0x0, 0x12}, &(0x7f0000044000)) timer_settime(0x0, 0x0, &(0x7f00004b1fe0)={{0x0, 0x1c9c380}, {0x0, 0x9}}, &(0x7f0000040000)) r0 = getpgid(0x0) tkill(r0, 0x1000000000016) 2018/04/11 12:45:38 executing program 0: r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000040)='/dev/rtc\x00', 0x20800, 0x0) ioctl$SNDRV_TIMER_IOCTL_START(r1, 0x54a0) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000200)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc-cast5-avx\x00'}, 0x58) r3 = accept$alg(r2, 0x0, 0x0) dup3(r0, r3, 0x0) 2018/04/11 12:45:38 executing program 1: r0 = socket(0x1e, 0x1, 0x0) setsockopt$packet_tx_ring(r0, 0x10f, 0x87, &(0x7f0000b89fe4)=@req={0x772}, 0x10) sendmsg(r0, &(0x7f0000030000)={&(0x7f00004f5000)=@generic={0x10000000001e, "0014000900000000000003000226cc573c080000003724c71e14dd6a739effea1b48006be61ffe0000e103000000f8000004003f010039d8f986ff01000300000004af50d50700000000000000e3ad316a1983000000001d00e0dfcb24281e27800000100076c3979ac40000bd15020078a1dfd300881a8365b1b16d7436"}, 0x80, &(0x7f0000447ff0), 0x0, &(0x7f00006e9c68)}, 0x0) [ 637.203248] FAULT_INJECTION: forcing a failure. [ 637.203248] name failslab, interval 1, probability 0, space 0, times 0 [ 637.214612] CPU: 0 PID: 3716 Comm: syz-executor4 Not tainted 4.16.0+ #17 [ 637.221468] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 637.230834] Call Trace: [ 637.233444] dump_stack+0x1b9/0x294 [ 637.237100] ? dump_stack_print_info.cold.2+0x52/0x52 [ 637.242329] should_fail.cold.4+0xa/0x1a [ 637.246418] ? fault_create_debugfs_attr+0x1f0/0x1f0 2018/04/11 12:45:38 executing program 7: syz_emit_ethernet(0x66, &(0x7f0000000000)={@random="cd3997030f00", @empty=[0x0, 0x0, 0x0, 0x0, 0x2800], [], {@ipv6={0x86dd, {0x0, 0x6, "b40900", 0x30, 0x67, 0x0, @ipv4={[], [0xff, 0xff], @multicast2=0xe0000002}, @mcast2={0xff, 0x2, [], 0x1}, {[], @icmpv6=@time_exceed={0x21, 0x0, 0x0, 0x0, [], {0x0, 0x6, "b680fa", 0x0, 0x0, 0x0, @ipv4={[], [0xff, 0xff], @broadcast=0xffffffff}, @ipv4={[], [0xff, 0xff], @remote={0xac, 0x14, 0xffffffffffffffff, 0xbb}}}}}}}}}, 0x0) 2018/04/11 12:45:38 executing program 2: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x1e, 0x1, 0x0) setsockopt$packet_tx_ring(r0, 0x10f, 0x87, &(0x7f0000b89fe4)=@req={0x772}, 0x10) sendmsg(r0, &(0x7f0000030000)={&(0x7f00004f5000)=@generic={0x10000000001e, "0100000900000000000000000226cc573c080000003724c71e14dd6a739effea1b48006be61ffe0000e103000000f8000004003f010039d8f986ff01000300000004af50d507000000d0010100e3ad316a1983000000001d00e0dfcb24281e27800000100076c3979ac40000bd15020078a1dfd300881a8365b1b16d7436"}, 0x80, &(0x7f0000447ff0), 0x0, &(0x7f00006e9c68)}, 0x0) 2018/04/11 12:45:38 executing program 1: r0 = socket(0x1e, 0x1, 0x0) setsockopt$packet_tx_ring(r0, 0x10f, 0x87, &(0x7f0000b89fe4)=@req={0x772}, 0x10) sendmsg(r0, &(0x7f0000030000)={&(0x7f00004f5000)=@generic={0x10000000001e, "0014000900000000000002000226cc573c080000003724c71e14dd6a739effea1b48006be61ffe0000e103000000f8000004003f010039d8f986ff01000300000004af50d50700000000000000e3ad316a1983000000001d00e0dfcb24281e27800000100076c3979ac40000bd15020078a1dfd300881a8365b1b16d7436"}, 0x80, &(0x7f0000447ff0), 0x0, &(0x7f00006e9c68)}, 0x0) [ 637.251544] ? save_stack+0x43/0xd0 [ 637.255190] ? kmem_cache_alloc_trace+0x152/0x780 [ 637.260052] ? __memcg_init_list_lru_node+0x17d/0x2c0 [ 637.265262] ? __list_lru_init+0x456/0x790 [ 637.269514] ? sget_userns+0x6d9/0xf20 [ 637.273422] ? graph_lock+0x170/0x170 [ 637.277237] ? vfs_kern_mount.part.34+0xd4/0x4d0 [ 637.282009] ? do_mount+0x564/0x3070 [ 637.285742] ? ksys_mount+0x12d/0x140 [ 637.289553] ? SyS_mount+0x35/0x50 [ 637.293111] ? do_syscall_64+0x29e/0x9d0 [ 637.297185] ? entry_SYSCALL_64_after_hwframe+0x42/0xb7 2018/04/11 12:45:38 executing program 6: r0 = socket$inet6(0xa, 0x80003, 0xff) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @ipv4={[], [0xff, 0xff], @dev={0xac, 0x14, 0x14, 0x1b}}}, 0x1c) sendmsg(r0, &(0x7f000001b000)={0x0, 0xfffffff5, &(0x7f0000019fa0), 0x1d3, &(0x7f000001ef08)}, 0x0) [ 637.302569] ? find_held_lock+0x36/0x1c0 [ 637.306656] ? __lock_is_held+0xb5/0x140 [ 637.310763] ? check_same_owner+0x320/0x320 [ 637.315115] ? rcu_note_context_switch+0x710/0x710 [ 637.320078] __should_failslab+0x124/0x180 [ 637.324335] should_failslab+0x9/0x14 [ 637.328156] kmem_cache_alloc_trace+0x2cb/0x780 [ 637.332842] ? __kmalloc_node+0x33/0x70 [ 637.336831] ? __kmalloc_node+0x33/0x70 [ 637.340822] ? rcu_read_lock_sched_held+0x108/0x120 [ 637.345870] __memcg_init_list_lru_node+0x17d/0x2c0 2018/04/11 12:45:39 executing program 2: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x1e, 0x1, 0x0) setsockopt$packet_tx_ring(r0, 0x10f, 0x87, &(0x7f0000b89fe4)=@req={0x772}, 0x10) sendmsg(r0, &(0x7f0000030000)={&(0x7f00004f5000)=@generic={0x10000000001e, "0100000900000000000000000226cc573c080000003724c71e14dd6a739effea1b48006be61ffe0000e103000000f8000004003f010039d8f986ff01000300000004af50d50700000000000002e3ad316a1983000000001d00e0dfcb24281e27800000100076c3979ac40000bd15020078a1dfd300881a8365b1b16d7436"}, 0x80, &(0x7f0000447ff0), 0x0, &(0x7f00006e9c68)}, 0x0) [ 637.350913] ? kvfree_rcu+0x20/0x20 [ 637.354579] ? __kmalloc_node+0x47/0x70 [ 637.358579] __list_lru_init+0x456/0x790 [ 637.362666] ? list_lru_destroy+0x4c0/0x4c0 [ 637.367005] ? mark_held_locks+0xc9/0x160 [ 637.371175] ? __raw_spin_lock_init+0x1c/0x100 [ 637.375778] ? trace_hardirqs_on_caller+0x421/0x5c0 [ 637.380810] ? __lockdep_init_map+0x105/0x590 [ 637.385312] ? lockdep_init_map+0x9/0x10 [ 637.389388] sget_userns+0x6d9/0xf20 [ 637.393112] ? kill_litter_super+0x90/0x90 [ 637.397364] ? ns_test_super+0x50/0x50 2018/04/11 12:45:39 executing program 6: r0 = socket$inet6(0xa, 0x80003, 0xff) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @ipv4={[], [0xff, 0xff], @dev={0xac, 0x14, 0x14, 0x1b}}}, 0x1c) sendmsg(r0, &(0x7f000001b000)={0x0, 0xfffffff5, &(0x7f0000019fa0), 0xde, &(0x7f000001ef08)}, 0x0) [ 637.401269] ? destroy_unused_super.part.9+0x100/0x100 [ 637.406560] ? do_raw_spin_trylock+0x1b0/0x1b0 [ 637.411161] ? kasan_check_write+0x14/0x20 [ 637.415406] ? do_raw_spin_lock+0xc1/0x200 [ 637.419666] ? blkdev_get+0xc0/0xb30 [ 637.423404] ? cap_capable+0x1f9/0x260 [ 637.427316] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 637.432866] ? security_capable+0x99/0xc0 [ 637.437034] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 637.442582] ? ns_capable_common+0x13f/0x170 [ 637.447009] ? kill_litter_super+0x90/0x90 [ 637.451256] sget+0x10b/0x150 2018/04/11 12:45:39 executing program 1: r0 = socket(0x1e, 0x1, 0x0) setsockopt$packet_tx_ring(r0, 0x10f, 0x87, &(0x7f0000b89fe4)=@req={0x772}, 0x10) sendmsg(r0, &(0x7f0000030000)={&(0x7f00004f5000)=@generic={0x10000000001e, "0014000900000000000003000226cc573c080000003724c71e14dd6a739effea1b48006be61ffe0000e103000000f8000004003f010039d8f986ff01000300000004af50d50700000000000000e3ad316a1983000000001d00e0dfcb24281e27800000100076c3979ac40000bd15020078a1dfd300881a8365b1b16d7436"}, 0x80, &(0x7f0000447ff0), 0x0, &(0x7f00006e9c68)}, 0x0) 2018/04/11 12:45:39 executing program 2: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x1e, 0x1, 0x0) setsockopt$packet_tx_ring(r0, 0x10f, 0x87, &(0x7f0000b89fe4)=@req={0x772}, 0x10) sendmsg(r0, &(0x7f0000030000)={&(0x7f00004f5000)=@generic={0x10000000001e, "0100000900000000000000000226cc573c080000003724c71e14dd6a739effea1b48006be61ffe0000e103000000f8000004003f010039d8f986ff01000300000004af50d50700000000000400e3ad316a1983000000001d00e0dfcb24281e27800000100076c3979ac40000bd15020078a1dfd300881a8365b1b16d7436"}, 0x80, &(0x7f0000447ff0), 0x0, &(0x7f00006e9c68)}, 0x0) 2018/04/11 12:45:39 executing program 6: r0 = socket$inet6(0xa, 0x80003, 0xff) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @ipv4={[], [0xff, 0xff], @dev={0xac, 0x14, 0x14, 0x1b}}}, 0x1c) sendmsg(r0, &(0x7f000001b000)={0x0, 0xfffffff5, &(0x7f0000019fa0), 0xe9, &(0x7f000001ef08)}, 0x0) [ 637.454375] ? ns_test_super+0x50/0x50 [ 637.458282] mount_bdev+0x111/0x3e0 [ 637.461921] ? fuse_get_root_inode+0x190/0x190 [ 637.466524] fuse_mount_blk+0x34/0x40 [ 637.470343] mount_fs+0xae/0x328 [ 637.473740] vfs_kern_mount.part.34+0xd4/0x4d0 [ 637.478344] ? may_umount+0xb0/0xb0 [ 637.481984] ? _raw_read_unlock+0x22/0x30 [ 637.486147] ? __get_fs_type+0x97/0xc0 [ 637.490234] do_mount+0x564/0x3070 [ 637.493799] ? copy_mount_string+0x40/0x40 [ 637.498735] ? rcu_pm_notify+0xc0/0xc0 [ 637.502645] ? copy_mount_options+0x5f/0x380 [ 637.507071] ? rcu_read_lock_sched_held+0x108/0x120 [ 637.512099] ? kmem_cache_alloc_trace+0x616/0x780 [ 637.516966] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 637.522519] ? _copy_from_user+0xdf/0x150 [ 637.526687] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 637.532236] ? copy_mount_options+0x285/0x380 [ 637.536753] ksys_mount+0x12d/0x140 [ 637.540401] SyS_mount+0x35/0x50 [ 637.543776] ? ksys_mount+0x140/0x140 [ 637.547592] do_syscall_64+0x29e/0x9d0 2018/04/11 12:45:39 executing program 6: r0 = socket$inet6(0xa, 0x80003, 0xff) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @ipv4={[], [0xff, 0xff], @dev={0xac, 0x14, 0x14, 0x1b}}}, 0x1c) sendmsg(r0, &(0x7f000001b000)={0x0, 0xfffffff5, &(0x7f0000019fa0), 0x15b, &(0x7f000001ef08)}, 0x0) [ 637.551492] ? vmalloc_sync_all+0x30/0x30 [ 637.555663] ? _raw_spin_unlock_irq+0x27/0x70 [ 637.560177] ? finish_task_switch+0x1ca/0x820 [ 637.564689] ? syscall_return_slowpath+0x5c0/0x5c0 [ 637.569634] ? syscall_return_slowpath+0x30f/0x5c0 [ 637.574588] ? entry_SYSCALL_64_after_hwframe+0x52/0xb7 [ 637.579979] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 637.584849] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 637.590043] RIP: 0033:0x455259 [ 637.593235] RSP: 002b:00007f95e4cadb08 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 2018/04/11 12:45:39 executing program 2: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x1e, 0x1, 0x0) setsockopt$packet_tx_ring(r0, 0x10f, 0x87, &(0x7f0000b89fe4)=@req={0x772}, 0x10) sendmsg(r0, &(0x7f0000030000)={&(0x7f00004f5000)=@generic={0x10000000001e, "0100000900000000000000000226cc573c080000003724c71e14dd6a739effea1b48006be61ffe0000e103000000f8000004003f010039d8f986ff01000300000004af50d50700000000020000e3ad316a1983000000001d00e0dfcb24281e27800000100076c3979ac40000bd15020078a1dfd300881a8365b1b16d7436"}, 0x80, &(0x7f0000447ff0), 0x0, &(0x7f00006e9c68)}, 0x0) [ 637.600962] RAX: ffffffffffffffda RBX: 0000000000000015 RCX: 0000000000455259 [ 637.608238] RDX: 00000000004b9bc5 RSI: 0000000020000040 RDI: 0000000020000000 [ 637.615513] RBP: 0000000020000000 R08: 00007f95e4cadb20 R09: 0000000000000000 [ 637.622786] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 637.630061] R13: 0000000000000000 R14: 0000000000000000 R15: 0000000000000000 2018/04/11 12:45:39 executing program 3: semop(0x0, &(0x7f000001a000)=[{0x0, 0xffffffffffff0001}, {0x0, 0x0, 0x3f00}], 0x2) timer_create(0x0, &(0x7f0000cd0000)={0x0, 0x12}, &(0x7f0000044000)) timer_settime(0x0, 0x0, &(0x7f00004b1fe0)={{0x0, 0x1c9c380}, {0x0, 0x9}}, &(0x7f0000040000)) r0 = getpgid(0x0) tkill(r0, 0x1000000000016) 2018/04/11 12:45:39 executing program 5: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000200)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc-cast5-avx\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00003bcfd0)="d3ab27191a", 0x5) sendmmsg$alg(r1, &(0x7f0000007e40)=[{0x0, 0x0, &(0x7f0000000900)}], 0x1, 0x0) r2 = accept(r0, &(0x7f0000000040)=@pppol2tpv3in6, &(0x7f00000000c0)=0x80) fcntl$getflags(r2, 0x40a) 2018/04/11 12:45:39 executing program 6: r0 = socket$inet6(0xa, 0x80003, 0xff) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @ipv4={[], [0xff, 0xff], @dev={0xac, 0x14, 0x14, 0x1b}}}, 0x1c) sendmsg(r0, &(0x7f000001b000)={0x0, 0xfffffff5, &(0x7f0000019fa0), 0x1f0, &(0x7f000001ef08)}, 0x0) 2018/04/11 12:45:39 executing program 7: syz_emit_ethernet(0x66, &(0x7f0000000000)={@random="cd3997030f00", @empty=[0x0, 0x0, 0x0, 0x0, 0x600], [], {@ipv6={0x86dd, {0x0, 0x6, "b40900", 0x30, 0x67, 0x0, @ipv4={[], [0xff, 0xff], @multicast2=0xe0000002}, @mcast2={0xff, 0x2, [], 0x1}, {[], @icmpv6=@time_exceed={0x21, 0x0, 0x0, 0x0, [], {0x0, 0x6, "b680fa", 0x0, 0x0, 0x0, @ipv4={[], [0xff, 0xff], @broadcast=0xffffffff}, @ipv4={[], [0xff, 0xff], @remote={0xac, 0x14, 0xffffffffffffffff, 0xbb}}}}}}}}}, 0x0) 2018/04/11 12:45:39 executing program 0: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000100)='/dev/sequencer\x00', 0x1, 0x0) ioctl$KIOCSOUND(r0, 0x4b2f, 0x3ee2) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000200)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(tnepres)\x00'}, 0x58) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000040)='cpuacct.usage_sys\x00', 0x0, 0x0) getsockopt$inet_sctp6_SCTP_RTOINFO(r0, 0x84, 0x0, &(0x7f0000000280)={0x0, 0x8, 0x7, 0x2}, &(0x7f00000002c0)=0x10) getsockopt$inet_sctp6_SCTP_RECONFIG_SUPPORTED(r1, 0x84, 0x75, &(0x7f0000000300)={r3, 0x14514dae}, &(0x7f0000000340)=0x8) ioctl$SNDRV_SEQ_IOCTL_GET_CLIENT_POOL(r2, 0xc058534b, &(0x7f0000000080)={0x100, 0xfff, 0xb99f, 0x1, 0x50, 0x1}) ioctl$DRM_IOCTL_GET_CAP(r0, 0xc010640c, &(0x7f0000000180)={0x10000, 0x1}) accept$alg(r1, 0x0, 0x0) dup3(r0, r0, 0x80000) 2018/04/11 12:45:39 executing program 4 (fault-call:1 fault-nth:24): perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_fuseblk_mount(&(0x7f0000000040)='./file0\x00', &(0x7f0000000000)='./file0\x00', 0x4000, 0x0, 0x0, 0x0, 0x0, 0x0) 2018/04/11 12:45:39 executing program 2: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x1e, 0x1, 0x0) setsockopt$packet_tx_ring(r0, 0x10f, 0x87, &(0x7f0000b89fe4)=@req={0x772}, 0x10) sendmsg(r0, &(0x7f0000030000)={&(0x7f00004f5000)=@generic={0x10000000001e, "0100000900000000000000000226cc573c080000003724c71e14dd6a739effea1b48006be61ffe0000e103000000f8000004003f010039d8f986ff01000300000004af50d50700000000040000e3ad316a1983000000001d00e0dfcb24281e27800000100076c3979ac40000bd15020078a1dfd300881a8365b1b16d7436"}, 0x80, &(0x7f0000447ff0), 0x0, &(0x7f00006e9c68)}, 0x0) 2018/04/11 12:45:39 executing program 1: r0 = socket(0x1e, 0x1, 0x0) setsockopt$packet_tx_ring(r0, 0x10f, 0x87, &(0x7f0000b89fe4)=@req={0x772}, 0x10) sendmsg(r0, &(0x7f0000030000)={&(0x7f00004f5000)=@generic={0x10000000001e, "0014000900000000000000030226cc573c080000003724c71e14dd6a739effea1b48006be61ffe0000e103000000f8000004003f010039d8f986ff01000300000004af50d50700000000000000e3ad316a1983000000001d00e0dfcb24281e27800000100076c3979ac40000bd15020078a1dfd300881a8365b1b16d7436"}, 0x80, &(0x7f0000447ff0), 0x0, &(0x7f00006e9c68)}, 0x0) 2018/04/11 12:45:39 executing program 0: r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000200)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc-cast5-avx\x00'}, 0x58) ioctl$KVM_CREATE_VCPU(r0, 0xae41, 0x1) accept$alg(r1, 0x0, 0x0) r2 = accept$alg(r1, 0x0, 0x0) dup3(r0, r2, 0x0) [ 638.160879] FAULT_INJECTION: forcing a failure. [ 638.160879] name failslab, interval 1, probability 0, space 0, times 0 [ 638.172232] CPU: 0 PID: 3771 Comm: syz-executor4 Not tainted 4.16.0+ #17 [ 638.179083] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 638.188448] Call Trace: [ 638.191102] dump_stack+0x1b9/0x294 [ 638.194758] ? dump_stack_print_info.cold.2+0x52/0x52 [ 638.199992] should_fail.cold.4+0xa/0x1a [ 638.204079] ? fault_create_debugfs_attr+0x1f0/0x1f0 2018/04/11 12:45:39 executing program 6: r0 = socket$inet6(0xa, 0x80003, 0xff) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @ipv4={[], [0xff, 0xff], @dev={0xac, 0x14, 0x14, 0x1b}}}, 0x1c) sendmsg(r0, &(0x7f000001b000)={0x0, 0xfffffff5, &(0x7f0000019fa0), 0x103, &(0x7f000001ef08)}, 0x0) 2018/04/11 12:45:39 executing program 7: syz_emit_ethernet(0x66, &(0x7f0000000000)={@random="cd3997030f00", @empty=[0x0, 0x0, 0x0, 0x0, 0x4788], [], {@ipv6={0x86dd, {0x0, 0x6, "b40900", 0x30, 0x67, 0x0, @ipv4={[], [0xff, 0xff], @multicast2=0xe0000002}, @mcast2={0xff, 0x2, [], 0x1}, {[], @icmpv6=@time_exceed={0x21, 0x0, 0x0, 0x0, [], {0x0, 0x6, "b680fa", 0x0, 0x0, 0x0, @ipv4={[], [0xff, 0xff], @broadcast=0xffffffff}, @ipv4={[], [0xff, 0xff], @remote={0xac, 0x14, 0xffffffffffffffff, 0xbb}}}}}}}}}, 0x0) [ 638.209202] ? save_stack+0x43/0xd0 [ 638.212859] ? kmem_cache_alloc_trace+0x152/0x780 [ 638.217730] ? __memcg_init_list_lru_node+0x17d/0x2c0 [ 638.222939] ? __list_lru_init+0x456/0x790 [ 638.227192] ? sget_userns+0x6d9/0xf20 [ 638.231100] ? graph_lock+0x170/0x170 [ 638.234928] ? vfs_kern_mount.part.34+0xd4/0x4d0 [ 638.239702] ? do_mount+0x564/0x3070 [ 638.243426] ? ksys_mount+0x12d/0x140 [ 638.247237] ? SyS_mount+0x35/0x50 [ 638.250793] ? do_syscall_64+0x29e/0x9d0 [ 638.254872] ? entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 638.260267] ? find_held_lock+0x36/0x1c0 [ 638.264359] ? __lock_is_held+0xb5/0x140 [ 638.268462] ? check_same_owner+0x320/0x320 [ 638.272811] ? rcu_note_context_switch+0x710/0x710 [ 638.277775] __should_failslab+0x124/0x180 [ 638.282034] should_failslab+0x9/0x14 [ 638.285850] kmem_cache_alloc_trace+0x2cb/0x780 [ 638.290549] ? __kmalloc_node+0x33/0x70 [ 638.294542] ? __kmalloc_node+0x33/0x70 [ 638.298532] ? rcu_read_lock_sched_held+0x108/0x120 [ 638.303580] __memcg_init_list_lru_node+0x17d/0x2c0 2018/04/11 12:45:39 executing program 1: r0 = socket(0x1e, 0x1, 0x0) setsockopt$packet_tx_ring(r0, 0x10f, 0x87, &(0x7f0000b89fe4)=@req={0x772}, 0x10) sendmsg(r0, &(0x7f0000030000)={&(0x7f00004f5000)=@generic={0x10000000001e, "0014000900000000000004000226cc573c080000003724c71e14dd6a739effea1b48006be61ffe0000e103000000f8000004003f010039d8f986ff01000300000004af50d50700000000000000e3ad316a1983000000001d00e0dfcb24281e27800000100076c3979ac40000bd15020078a1dfd300881a8365b1b16d7436"}, 0x80, &(0x7f0000447ff0), 0x0, &(0x7f00006e9c68)}, 0x0) 2018/04/11 12:45:40 executing program 0: r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000200)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc-cast5-avx\x00'}, 0x58) r2 = accept$alg(r1, 0x0, 0x0) r3 = dup3(r0, r2, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(r1, 0x8933, &(0x7f00000000c0)={'team0\x00', 0x0}) sendto$packet(r3, &(0x7f0000000040)="e02622b4978a1e669d5ce16d00b647cce66138a4441034956d3d34d4bbd4b7066fa1b111ea93f9d88a33d026566a44d3aa9d552df7e34d88d3134dc3ef0f11473405aa3be31ae4d1a449fa8c9b4429a5848eeb4162eb78b99b282ca3021cba580a3329fde0ad7bdb2fb17af0819357a9b5da", 0x72, 0x804, &(0x7f0000000100)={0x11, 0x12, r4, 0x1, 0x7fff, 0x6, @remote={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xbb}}, 0x14) [ 638.308618] ? kvfree_rcu+0x20/0x20 [ 638.312259] ? __kmalloc_node+0x47/0x70 [ 638.316259] __list_lru_init+0x456/0x790 [ 638.320347] ? list_lru_destroy+0x4c0/0x4c0 [ 638.324677] ? mark_held_locks+0xc9/0x160 [ 638.328837] ? __raw_spin_lock_init+0x1c/0x100 [ 638.333431] ? trace_hardirqs_on_caller+0x421/0x5c0 [ 638.338455] ? __lockdep_init_map+0x105/0x590 [ 638.342971] ? lockdep_init_map+0x9/0x10 [ 638.347050] sget_userns+0x6d9/0xf20 [ 638.350775] ? kill_litter_super+0x90/0x90 [ 638.355029] ? ns_test_super+0x50/0x50 2018/04/11 12:45:40 executing program 2: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x1e, 0x1, 0x0) setsockopt$packet_tx_ring(r0, 0x10f, 0x87, &(0x7f0000b89fe4)=@req={0x772}, 0x10) sendmsg(r0, &(0x7f0000030000)={&(0x7f00004f5000)=@generic={0x10000000001e, "0100000900000000000000000226cc573c080000003724c71e14dd6a739effea1b48006be61ffe0000e103000000f8000004003f010039d8f986ff01000300000004af50d50700000000000200e3ad316a1983000000001d00e0dfcb24281e27800000100076c3979ac40000bd15020078a1dfd300881a8365b1b16d7436"}, 0x80, &(0x7f0000447ff0), 0x0, &(0x7f00006e9c68)}, 0x0) 2018/04/11 12:45:40 executing program 7: syz_emit_ethernet(0x66, &(0x7f0000000000)={@random="cd3997030f00", @empty=[0x0, 0x0, 0x0, 0x0, 0x608], [], {@ipv6={0x86dd, {0x0, 0x6, "b40900", 0x30, 0x67, 0x0, @ipv4={[], [0xff, 0xff], @multicast2=0xe0000002}, @mcast2={0xff, 0x2, [], 0x1}, {[], @icmpv6=@time_exceed={0x21, 0x0, 0x0, 0x0, [], {0x0, 0x6, "b680fa", 0x0, 0x0, 0x0, @ipv4={[], [0xff, 0xff], @broadcast=0xffffffff}, @ipv4={[], [0xff, 0xff], @remote={0xac, 0x14, 0xffffffffffffffff, 0xbb}}}}}}}}}, 0x0) [ 638.358940] ? destroy_unused_super.part.9+0x100/0x100 [ 638.364233] ? do_raw_spin_trylock+0x1b0/0x1b0 [ 638.368834] ? kasan_check_write+0x14/0x20 [ 638.373083] ? do_raw_spin_lock+0xc1/0x200 [ 638.377344] ? blkdev_get+0xc0/0xb30 [ 638.381079] ? cap_capable+0x1f9/0x260 [ 638.384996] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 638.390547] ? security_capable+0x99/0xc0 [ 638.394719] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 638.400268] ? ns_capable_common+0x13f/0x170 [ 638.404696] ? kill_litter_super+0x90/0x90 [ 638.408945] sget+0x10b/0x150 [ 638.412062] ? ns_test_super+0x50/0x50 [ 638.415980] mount_bdev+0x111/0x3e0 [ 638.419622] ? fuse_get_root_inode+0x190/0x190 [ 638.424228] fuse_mount_blk+0x34/0x40 [ 638.428047] mount_fs+0xae/0x328 [ 638.431437] vfs_kern_mount.part.34+0xd4/0x4d0 [ 638.436036] ? may_umount+0xb0/0xb0 [ 638.439673] ? _raw_read_unlock+0x22/0x30 [ 638.443834] ? __get_fs_type+0x97/0xc0 [ 638.447743] do_mount+0x564/0x3070 [ 638.451306] ? copy_mount_string+0x40/0x40 [ 638.455555] ? rcu_pm_notify+0xc0/0xc0 2018/04/11 12:45:40 executing program 6: r0 = socket$inet6(0xa, 0x80003, 0xff) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @ipv4={[], [0xff, 0xff], @dev={0xac, 0x14, 0x14, 0x1b}}}, 0x1c) sendmsg(r0, &(0x7f000001b000)={0x0, 0xfffffff5, &(0x7f0000019fa0), 0x1bf, &(0x7f000001ef08)}, 0x0) [ 638.459465] ? copy_mount_options+0x5f/0x380 [ 638.463887] ? rcu_read_lock_sched_held+0x108/0x120 [ 638.468915] ? kmem_cache_alloc_trace+0x616/0x780 [ 638.473781] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 638.479333] ? _copy_from_user+0xdf/0x150 [ 638.483502] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 638.489057] ? copy_mount_options+0x285/0x380 [ 638.493573] ksys_mount+0x12d/0x140 [ 638.497216] SyS_mount+0x35/0x50 [ 638.500589] ? ksys_mount+0x140/0x140 [ 638.504489] do_syscall_64+0x29e/0x9d0 [ 638.508385] ? vmalloc_sync_all+0x30/0x30 [ 638.512542] ? _raw_spin_unlock_irq+0x27/0x70 [ 638.517051] ? finish_task_switch+0x1ca/0x820 [ 638.521558] ? syscall_return_slowpath+0x5c0/0x5c0 [ 638.526506] ? syscall_return_slowpath+0x30f/0x5c0 [ 638.531458] ? entry_SYSCALL_64_after_hwframe+0x52/0xb7 [ 638.536847] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 638.541721] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 638.546920] RIP: 0033:0x455259 [ 638.550115] RSP: 002b:00007f95e4cadb08 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 638.557840] RAX: ffffffffffffffda RBX: 0000000000000015 RCX: 0000000000455259 [ 638.565126] RDX: 00000000004b9bc5 RSI: 0000000020000040 RDI: 0000000020000000 [ 638.572409] RBP: 0000000020000000 R08: 00007f95e4cadb20 R09: 0000000000000000 [ 638.579686] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 638.586961] R13: 0000000000000000 R14: 0000000000000000 R15: 0000000000000000 2018/04/11 12:45:40 executing program 1: r0 = socket(0x1e, 0x1, 0x0) setsockopt$packet_tx_ring(r0, 0x10f, 0x87, &(0x7f0000b89fe4)=@req={0x772}, 0x10) sendmsg(r0, &(0x7f0000030000)={&(0x7f00004f5000)=@generic={0x10000000001e, "0014000900000000000000020226cc573c080000003724c71e14dd6a739effea1b48006be61ffe0000e103000000f8000004003f010039d8f986ff01000300000004af50d50700000000000000e3ad316a1983000000001d00e0dfcb24281e27800000100076c3979ac40000bd15020078a1dfd300881a8365b1b16d7436"}, 0x80, &(0x7f0000447ff0), 0x0, &(0x7f00006e9c68)}, 0x0) 2018/04/11 12:45:40 executing program 0: socket$netlink(0x10, 0x3, 0x12) r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb40}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000200)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc-cast5-avx\x00'}, 0x58) r2 = accept$alg(r1, 0x0, 0x0) socketpair(0xf, 0x6, 0x8, &(0x7f0000001980)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(r3, 0x6, 0x1d, &(0x7f00000019c0)={0x2ef, 0x6, 0x2, 0x10000, 0x7fffffff}, 0x14) r4 = dup3(r0, r2, 0x0) ioctl$KVM_DEASSIGN_PCI_DEVICE(r4, 0x4040ae72, &(0x7f0000000040)={0x800, 0xfffffffffffff001, 0x0, 0x6, 0x20}) 2018/04/11 12:45:40 executing program 7: syz_emit_ethernet(0x66, &(0x7f0000000000)={@random="cd3997030f00", @empty=[0x0, 0x0, 0x0, 0x0, 0x8906000000000000], [], {@ipv6={0x86dd, {0x0, 0x6, "b40900", 0x30, 0x67, 0x0, @ipv4={[], [0xff, 0xff], @multicast2=0xe0000002}, @mcast2={0xff, 0x2, [], 0x1}, {[], @icmpv6=@time_exceed={0x21, 0x0, 0x0, 0x0, [], {0x0, 0x6, "b680fa", 0x0, 0x0, 0x0, @ipv4={[], [0xff, 0xff], @broadcast=0xffffffff}, @ipv4={[], [0xff, 0xff], @remote={0xac, 0x14, 0xffffffffffffffff, 0xbb}}}}}}}}}, 0x0) 2018/04/11 12:45:40 executing program 3: semop(0x0, &(0x7f000001a000)=[{0x0, 0xffffffffffff0001}, {0x0, 0x0, 0x500}], 0x2) timer_create(0x0, &(0x7f0000cd0000)={0x0, 0x12}, &(0x7f0000044000)) timer_settime(0x0, 0x0, &(0x7f00004b1fe0)={{0x0, 0x1c9c380}, {0x0, 0x9}}, &(0x7f0000040000)) r0 = getpgid(0x0) tkill(r0, 0x1000000000016) 2018/04/11 12:45:40 executing program 2: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x1e, 0x1, 0x0) setsockopt$packet_tx_ring(r0, 0x10f, 0x87, &(0x7f0000b89fe4)=@req={0x772}, 0x10) sendmsg(r0, &(0x7f0000030000)={&(0x7f00004f5000)=@generic={0x10000000001e, "0100000900000000000000000226cc573c080000003724c71e14dd6a739effea1b48006be61ffe0000e103000000f8000004003f010039d8f986ff01000300000004af50d50700000000000400e3ad316a1983000000001d00e0dfcb24281e27800000100076c3979ac40000bd15020078a1dfd300881a8365b1b16d7436"}, 0x80, &(0x7f0000447ff0), 0x0, &(0x7f00006e9c68)}, 0x0) 2018/04/11 12:45:40 executing program 4 (fault-call:1 fault-nth:25): perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_fuseblk_mount(&(0x7f0000000040)='./file0\x00', &(0x7f0000000000)='./file0\x00', 0x4000, 0x0, 0x0, 0x0, 0x0, 0x0) 2018/04/11 12:45:40 executing program 6: r0 = socket$inet6(0xa, 0x80003, 0xff) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @ipv4={[], [0xff, 0xff], @dev={0xac, 0x14, 0x14, 0x1b}}}, 0x1c) sendmsg(r0, &(0x7f000001b000)={0x0, 0xfffffff5, &(0x7f0000019fa0), 0x77, &(0x7f000001ef08)}, 0x0) 2018/04/11 12:45:40 executing program 5: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000200)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc-cast5-avx\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000100)={0x0}, &(0x7f0000000140)=0xc) ptrace$pokeuser(0x6, r2, 0x4, 0x95) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00003bcfd0)="d3ab27191a", 0x5) sendmmsg$alg(r1, &(0x7f0000007e40)=[{0x0, 0x0, &(0x7f0000000900)}], 0x1, 0x0) r3 = accept(r0, &(0x7f0000000040)=@pppol2tpv3in6, &(0x7f00000000c0)=0x80) ioctl$sock_inet_SIOCGARP(r3, 0x8954, &(0x7f0000000180)={{0x2, 0x4e23, @remote={0xac, 0x14, 0x14, 0xbb}}, {0x306, @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff]}, 0x10, {0x2, 0x4e24, @rand_addr=0x4}, 'teql0\x00'}) 2018/04/11 12:45:40 executing program 1: r0 = socket(0x1e, 0x1, 0x0) setsockopt$packet_tx_ring(r0, 0x10f, 0x87, &(0x7f0000b89fe4)=@req={0x772}, 0x10) sendmsg(r0, &(0x7f0000030000)={&(0x7f00004f5000)=@generic={0x10000000001e, "0014000900000000000000030226cc573c080000003724c71e14dd6a739effea1b48006be61ffe0000e103000000f8000004003f010039d8f986ff01000300000004af50d50700000000000000e3ad316a1983000000001d00e0dfcb24281e27800000100076c3979ac40000bd15020078a1dfd300881a8365b1b16d7436"}, 0x80, &(0x7f0000447ff0), 0x0, &(0x7f00006e9c68)}, 0x0) 2018/04/11 12:45:40 executing program 0: r0 = memfd_create(&(0x7f00000005c0)="6465762046a80d01bed3c1e1c85fe2dbef94a677a99248217280a42d688043cc913ddb112187ee23355083fc8a1eed8f3d1a468b405da49550403420a5685e12afb758b1bfcf91d09bfe61b023e1b04f2f8e23a38e1ef575997d875079d8275500cf932de25ff116808e0097e9a30f89ffec73d758337ba4ecfe26e0709dceb3bc100af911f29826293f7e6d4cbbb7fa03189e2fd5b9461150c1f6c46be2eddd2f84ce8136164ee052fdf7c5919654885d693f6c70f42b0eef3f33160056b93855cb84bf62730fd9afe77c1b8d7b0b9dcc2a7566f6067be13c15bbbc440e796acc56b204c7f48fcdfa2e84e52a95", 0x3) write(r0, &(0x7f0000000240)='v', 0x1) sendfile(r0, r0, &(0x7f0000000140), 0x7fffffff) fcntl$addseals(r0, 0x409, 0xc) write(r0, &(0x7f00000000c0)="b6", 0x1) fsetxattr(r0, &(0x7f0000000040)=@known='user.syz\x00', &(0x7f0000000080)='system.sockprotoname\x00', 0x15, 0x0) 2018/04/11 12:45:40 executing program 2: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x1e, 0x1, 0x0) setsockopt$packet_tx_ring(r0, 0x10f, 0x87, &(0x7f0000b89fe4)=@req={0x772}, 0x10) sendmsg(r0, &(0x7f0000030000)={&(0x7f00004f5000)=@generic={0x10000000001e, "0100000900000000000000000226cc573c080000003724c71e14dd6a739effea1b48006be61ffe0000e103000000f8000004003f010039d8f986ff01000300000004af50d50700000000000002e3ad316a1983000000001d00e0dfcb24281e27800000100076c3979ac40000bd15020078a1dfd300881a8365b1b16d7436"}, 0x80, &(0x7f0000447ff0), 0x0, &(0x7f00006e9c68)}, 0x0) [ 638.726922] FAULT_INJECTION: forcing a failure. [ 638.726922] name failslab, interval 1, probability 0, space 0, times 0 [ 638.738316] CPU: 0 PID: 3839 Comm: syz-executor4 Not tainted 4.16.0+ #17 [ 638.745167] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 638.754530] Call Trace: [ 638.757140] dump_stack+0x1b9/0x294 [ 638.760793] ? dump_stack_print_info.cold.2+0x52/0x52 [ 638.766025] should_fail.cold.4+0xa/0x1a [ 638.770114] ? fault_create_debugfs_attr+0x1f0/0x1f0 2018/04/11 12:45:40 executing program 6: r0 = socket$inet6(0xa, 0x80003, 0xff) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @ipv4={[], [0xff, 0xff], @dev={0xac, 0x14, 0x14, 0x1b}}}, 0x1c) sendmsg(r0, &(0x7f000001b000)={0x0, 0xfffffff5, &(0x7f0000019fa0), 0x19e, &(0x7f000001ef08)}, 0x0) [ 638.775235] ? save_stack+0x43/0xd0 [ 638.778889] ? kmem_cache_alloc_trace+0x152/0x780 [ 638.783755] ? __memcg_init_list_lru_node+0x17d/0x2c0 [ 638.788961] ? __list_lru_init+0x456/0x790 [ 638.793209] ? sget_userns+0x6d9/0xf20 [ 638.797109] ? graph_lock+0x170/0x170 [ 638.800928] ? vfs_kern_mount.part.34+0xd4/0x4d0 [ 638.805699] ? do_mount+0x564/0x3070 [ 638.809423] ? ksys_mount+0x12d/0x140 [ 638.813235] ? SyS_mount+0x35/0x50 [ 638.816791] ? do_syscall_64+0x29e/0x9d0 [ 638.820873] ? entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 638.826259] ? find_held_lock+0x36/0x1c0 [ 638.830348] ? __lock_is_held+0xb5/0x140 [ 638.834477] ? check_same_owner+0x320/0x320 [ 638.838825] ? rcu_note_context_switch+0x710/0x710 [ 638.843793] __should_failslab+0x124/0x180 [ 638.848052] should_failslab+0x9/0x14 [ 638.851878] kmem_cache_alloc_trace+0x2cb/0x780 [ 638.856562] ? __kmalloc_node+0x33/0x70 [ 638.860551] ? __kmalloc_node+0x33/0x70 [ 638.864544] ? rcu_read_lock_sched_held+0x108/0x120 [ 638.869596] __memcg_init_list_lru_node+0x17d/0x2c0 2018/04/11 12:45:40 executing program 5: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000200)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc-cast5-avx\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) r2 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00003bcfd0)="d3ab27191a", 0x5) sendmmsg$alg(r1, &(0x7f0000007e40)=[{0x0, 0x0, &(0x7f0000000900)}], 0x1, 0x0) r3 = syz_open_dev$midi(&(0x7f0000000280)='/dev/midi#\x00', 0x7, 0x100) epoll_ctl$EPOLL_CTL_DEL(r3, 0x2, r2) accept(r0, &(0x7f0000000040)=@pppol2tpv3in6, &(0x7f00000000c0)=0x80) r4 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000100)='/dev/dsp\x00', 0x440e03, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_NAMED_QUEUE(r4, 0xc08c5336, &(0x7f0000000140)={0x7, 0x5631, 0x7d44e427, 'queue1\x00'}) [ 638.874648] ? kvfree_rcu+0x20/0x20 [ 638.878279] ? __kmalloc_node+0x47/0x70 [ 638.882279] __list_lru_init+0x456/0x790 [ 638.886364] ? list_lru_destroy+0x4c0/0x4c0 [ 638.890702] ? mark_held_locks+0xc9/0x160 [ 638.894875] ? __raw_spin_lock_init+0x1c/0x100 [ 638.899472] ? trace_hardirqs_on_caller+0x421/0x5c0 [ 638.904500] ? __lockdep_init_map+0x105/0x590 [ 638.909014] ? lockdep_init_map+0x9/0x10 [ 638.913099] sget_userns+0x6d9/0xf20 [ 638.916825] ? kill_litter_super+0x90/0x90 [ 638.921080] ? ns_test_super+0x50/0x50 2018/04/11 12:45:40 executing program 1: r0 = socket(0x1e, 0x1, 0x0) setsockopt$packet_tx_ring(r0, 0x10f, 0x87, &(0x7f0000b89fe4)=@req={0x772}, 0x10) sendmsg(r0, &(0x7f0000030000)={&(0x7f00004f5000)=@generic={0x10000000001e, "0014000900000000000000000226cc573c080003003724c71e14dd6a739effea1b48006be61ffe0000e103000000f8000004003f010039d8f986ff01000300000004af50d50700000000000000e3ad316a1983000000001d00e0dfcb24281e27800000100076c3979ac40000bd15020078a1dfd300881a8365b1b16d7436"}, 0x80, &(0x7f0000447ff0), 0x0, &(0x7f00006e9c68)}, 0x0) [ 638.924984] ? destroy_unused_super.part.9+0x100/0x100 [ 638.930273] ? do_raw_spin_trylock+0x1b0/0x1b0 [ 638.934880] ? kasan_check_write+0x14/0x20 [ 638.939125] ? do_raw_spin_lock+0xc1/0x200 [ 638.943388] ? blkdev_get+0xc0/0xb30 [ 638.947121] ? cap_capable+0x1f9/0x260 [ 638.951032] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 638.956580] ? security_capable+0x99/0xc0 [ 638.960748] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 638.966295] ? ns_capable_common+0x13f/0x170 [ 638.970722] ? kill_litter_super+0x90/0x90 [ 638.974977] sget+0x10b/0x150 2018/04/11 12:45:40 executing program 2: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x1e, 0x1, 0x0) setsockopt$packet_tx_ring(r0, 0x10f, 0x87, &(0x7f0000b89fe4)=@req={0x772}, 0x10) sendmsg(r0, &(0x7f0000030000)={&(0x7f00004f5000)=@generic={0x10000000001e, "0100000900000000000000000226cc573c080000003724c71e14dd6a739effea1b48006be61ffe0000e103000000f8000004003f010039d8f986ff01000300000004af50d50700000000000000e3ad316a1983d00101001d00e0dfcb24281e27800000100076c3979ac40000bd15020078a1dfd300881a8365b1b16d7436"}, 0x80, &(0x7f0000447ff0), 0x0, &(0x7f00006e9c68)}, 0x0) 2018/04/11 12:45:40 executing program 5: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000200)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc-cast5-avx\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00003bcfd0)="d3ab27191a", 0x5) sendmmsg$alg(r1, &(0x7f0000007e40)=[{0x0, 0x0, &(0x7f0000000900)}], 0x1, 0x0) r2 = accept(r1, 0x0, &(0x7f0000000100)) ioctl$sock_bt_hidp_HIDPGETCONNLIST(r2, 0x800448d2, &(0x7f0000000140)={0x3, &(0x7f0000000280)=[{}, {}, {}]}) accept(r0, &(0x7f0000000040)=@pppol2tpv3in6, &(0x7f00000000c0)=0x80) [ 638.978095] ? ns_test_super+0x50/0x50 [ 638.982005] mount_bdev+0x111/0x3e0 [ 638.985645] ? fuse_get_root_inode+0x190/0x190 [ 638.990250] fuse_mount_blk+0x34/0x40 [ 638.994074] mount_fs+0xae/0x328 [ 638.997472] vfs_kern_mount.part.34+0xd4/0x4d0 [ 639.002078] ? may_umount+0xb0/0xb0 [ 639.005713] ? _raw_read_unlock+0x22/0x30 [ 639.009876] ? __get_fs_type+0x97/0xc0 [ 639.013786] do_mount+0x564/0x3070 [ 639.017347] ? copy_mount_string+0x40/0x40 [ 639.021595] ? rcu_pm_notify+0xc0/0xc0 2018/04/11 12:45:40 executing program 7: syz_emit_ethernet(0x66, &(0x7f0000000000)={@random="cd3997030f00", @empty=[0x0, 0x0, 0x0, 0x0, 0x58000000], [], {@ipv6={0x86dd, {0x0, 0x6, "b40900", 0x30, 0x67, 0x0, @ipv4={[], [0xff, 0xff], @multicast2=0xe0000002}, @mcast2={0xff, 0x2, [], 0x1}, {[], @icmpv6=@time_exceed={0x21, 0x0, 0x0, 0x0, [], {0x0, 0x6, "b680fa", 0x0, 0x0, 0x0, @ipv4={[], [0xff, 0xff], @broadcast=0xffffffff}, @ipv4={[], [0xff, 0xff], @remote={0xac, 0x14, 0xffffffffffffffff, 0xbb}}}}}}}}}, 0x0) [ 639.025508] ? copy_mount_options+0x5f/0x380 [ 639.029931] ? rcu_read_lock_sched_held+0x108/0x120 [ 639.034963] ? kmem_cache_alloc_trace+0x616/0x780 [ 639.039830] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 639.045388] ? _copy_from_user+0xdf/0x150 [ 639.049557] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 639.055101] ? copy_mount_options+0x285/0x380 [ 639.059636] ksys_mount+0x12d/0x140 [ 639.063279] SyS_mount+0x35/0x50 [ 639.066661] ? ksys_mount+0x140/0x140 [ 639.070480] do_syscall_64+0x29e/0x9d0 [ 639.074383] ? vmalloc_sync_all+0x30/0x30 [ 639.078542] ? _raw_spin_unlock_irq+0x27/0x70 [ 639.083052] ? finish_task_switch+0x1ca/0x820 [ 639.087565] ? syscall_return_slowpath+0x5c0/0x5c0 [ 639.092505] ? syscall_return_slowpath+0x30f/0x5c0 [ 639.097449] ? entry_SYSCALL_64_after_hwframe+0x52/0xb7 [ 639.102849] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 639.107724] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 639.112925] RIP: 0033:0x455259 [ 639.116123] RSP: 002b:00007f95e4cadb08 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 639.123855] RAX: ffffffffffffffda RBX: 0000000000000015 RCX: 0000000000455259 [ 639.131138] RDX: 00000000004b9bc5 RSI: 0000000020000040 RDI: 0000000020000000 [ 639.138414] RBP: 0000000020000000 R08: 00007f95e4cadb20 R09: 0000000000000000 [ 639.145688] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 639.152961] R13: 0000000000000000 R14: 0000000000000000 R15: 0000000000000000 2018/04/11 12:45:41 executing program 6: r0 = socket$inet6(0xa, 0x80003, 0xff) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @ipv4={[], [0xff, 0xff], @dev={0xac, 0x14, 0x14, 0x1b}}}, 0x1c) sendmsg(r0, &(0x7f000001b000)={0x0, 0xfffffff5, &(0x7f0000019fa0), 0x11, &(0x7f000001ef08)}, 0x0) 2018/04/11 12:45:41 executing program 5: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0xfffffffffffffffe}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000200)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc-cast5-avx\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00003bcfd0)="d3ab27191a", 0x5) sendmmsg$alg(r1, &(0x7f0000007e40)=[{0x0, 0x0, &(0x7f0000000900)}], 0x1, 0x0) accept(r0, &(0x7f0000000040)=@pppol2tpv3in6, &(0x7f00000000c0)=0x80) 2018/04/11 12:45:41 executing program 7: syz_emit_ethernet(0x66, &(0x7f0000000000)={@random="cd3997030f00", @empty=[0x0, 0x0, 0x0, 0x0, 0x88640000], [], {@ipv6={0x86dd, {0x0, 0x6, "b40900", 0x30, 0x67, 0x0, @ipv4={[], [0xff, 0xff], @multicast2=0xe0000002}, @mcast2={0xff, 0x2, [], 0x1}, {[], @icmpv6=@time_exceed={0x21, 0x0, 0x0, 0x0, [], {0x0, 0x6, "b680fa", 0x0, 0x0, 0x0, @ipv4={[], [0xff, 0xff], @broadcast=0xffffffff}, @ipv4={[], [0xff, 0xff], @remote={0xac, 0x14, 0xffffffffffffffff, 0xbb}}}}}}}}}, 0x0) 2018/04/11 12:45:41 executing program 1: r0 = socket(0x1e, 0x1, 0x0) setsockopt$packet_tx_ring(r0, 0x10f, 0x87, &(0x7f0000b89fe4)=@req={0x772}, 0x10) sendmsg(r0, &(0x7f0000030000)={&(0x7f00004f5000)=@generic={0x10000000001e, "0014000900000000000000000226cc573c080400003724c71e14dd6a739effea1b48006be61ffe0000e103000000f8000004003f010039d8f986ff01000300000004af50d50700000000000000e3ad316a1983000000001d00e0dfcb24281e27800000100076c3979ac40000bd15020078a1dfd300881a8365b1b16d7436"}, 0x80, &(0x7f0000447ff0), 0x0, &(0x7f00006e9c68)}, 0x0) 2018/04/11 12:45:41 executing program 4 (fault-call:1 fault-nth:26): perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_fuseblk_mount(&(0x7f0000000040)='./file0\x00', &(0x7f0000000000)='./file0\x00', 0x4000, 0x0, 0x0, 0x0, 0x0, 0x0) 2018/04/11 12:45:41 executing program 2: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x1e, 0x1, 0x0) setsockopt$packet_tx_ring(r0, 0x10f, 0x87, &(0x7f0000b89fe4)=@req={0x772}, 0x10) sendmsg(r0, &(0x7f0000030000)={&(0x7f00004f5000)=@generic={0x10000000001e, "0100000900000000000000000226cc573c080000003724c71e14dd6a739effea1b48006be61ffe0000e103000000f8000004003f010039d8f986ff01000300000004af50d50700000000000000e3ad316a1983020000001d00e0dfcb24281e27800000100076c3979ac40000bd15020078a1dfd300881a8365b1b16d7436"}, 0x80, &(0x7f0000447ff0), 0x0, &(0x7f00006e9c68)}, 0x0) 2018/04/11 12:45:41 executing program 3: semop(0x0, &(0x7f000001a000)=[{0x0, 0xffffffffffff0001}, {0x0, 0x0, 0x3f00000000000000}], 0x2) timer_create(0x0, &(0x7f0000cd0000)={0x0, 0x12}, &(0x7f0000044000)) timer_settime(0x0, 0x0, &(0x7f00004b1fe0)={{0x0, 0x1c9c380}, {0x0, 0x9}}, &(0x7f0000040000)) r0 = getpgid(0x0) tkill(r0, 0x1000000000016) 2018/04/11 12:45:41 executing program 0: r0 = socket$inet6(0xa, 0x2, 0x0) ioctl$sock_ifreq(r0, 0x8922, &(0x7f00000000c0)={'bond0\x00', @ifru_mtu=0xf8c}) 2018/04/11 12:45:41 executing program 7: syz_emit_ethernet(0x66, &(0x7f0000000000)={@random="cd3997030f00", @empty=[0x0, 0x0, 0x0, 0x0, 0xf0ffff], [], {@ipv6={0x86dd, {0x0, 0x6, "b40900", 0x30, 0x67, 0x0, @ipv4={[], [0xff, 0xff], @multicast2=0xe0000002}, @mcast2={0xff, 0x2, [], 0x1}, {[], @icmpv6=@time_exceed={0x21, 0x0, 0x0, 0x0, [], {0x0, 0x6, "b680fa", 0x0, 0x0, 0x0, @ipv4={[], [0xff, 0xff], @broadcast=0xffffffff}, @ipv4={[], [0xff, 0xff], @remote={0xac, 0x14, 0xffffffffffffffff, 0xbb}}}}}}}}}, 0x0) [ 639.881536] FAULT_INJECTION: forcing a failure. [ 639.881536] name failslab, interval 1, probability 0, space 0, times 0 [ 639.893165] CPU: 0 PID: 3882 Comm: syz-executor4 Not tainted 4.16.0+ #17 [ 639.900027] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 639.909390] Call Trace: [ 639.911999] dump_stack+0x1b9/0x294 [ 639.915650] ? dump_stack_print_info.cold.2+0x52/0x52 [ 639.920878] should_fail.cold.4+0xa/0x1a [ 639.924968] ? fault_create_debugfs_attr+0x1f0/0x1f0 2018/04/11 12:45:41 executing program 2: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x1e, 0x1, 0x0) setsockopt$packet_tx_ring(r0, 0x10f, 0x87, &(0x7f0000b89fe4)=@req={0x772}, 0x10) sendmsg(r0, &(0x7f0000030000)={&(0x7f00004f5000)=@generic={0x10000000001e, "0100000900000000000000000226cc573c080000003724c71e14dd6a739effea1b48006be61ffe0000e103000000f8000004003f010039d8f986ff01000300000004af50d50700000000000000e3ad316a1983000000021d00e0dfcb24281e27800000100076c3979ac40000bd15020078a1dfd300881a8365b1b16d7436"}, 0x80, &(0x7f0000447ff0), 0x0, &(0x7f00006e9c68)}, 0x0) 2018/04/11 12:45:41 executing program 6: r0 = socket$inet6(0xa, 0x80003, 0xff) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @ipv4={[], [0xff, 0xff], @dev={0xac, 0x14, 0x14, 0x1b}}}, 0x1c) sendmsg(r0, &(0x7f000001b000)={0x0, 0xfffffff5, &(0x7f0000019fa0), 0x98, &(0x7f000001ef08)}, 0x0) 2018/04/11 12:45:41 executing program 5: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000200)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc-cast5-avx\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00003bcfd0)="d3ab27191a", 0x5) r2 = syz_open_dev$sndmidi(&(0x7f0000000100)='/dev/snd/midiC#D#\x00', 0x4, 0x80000) getsockname$packet(0xffffffffffffff9c, &(0x7f0000000140)={0x0, 0x0, 0x0}, &(0x7f0000000180)=0x14) bind$can_raw(r2, &(0x7f00000001c0)={0x1d, r3}, 0x10) sendmmsg$alg(r1, &(0x7f0000007e40)=[{0x0, 0x0, &(0x7f0000000900)}], 0x1, 0x0) accept(r0, &(0x7f0000000040)=@pppol2tpv3in6, &(0x7f00000000c0)=0x80) [ 639.930091] ? save_stack+0x43/0xd0 [ 639.933735] ? kmem_cache_alloc_trace+0x152/0x780 [ 639.938592] ? __memcg_init_list_lru_node+0x17d/0x2c0 [ 639.943803] ? __list_lru_init+0x456/0x790 [ 639.948054] ? sget_userns+0x6d9/0xf20 [ 639.951957] ? graph_lock+0x170/0x170 [ 639.955781] ? vfs_kern_mount.part.34+0xd4/0x4d0 [ 639.960553] ? do_mount+0x564/0x3070 [ 639.964283] ? ksys_mount+0x12d/0x140 [ 639.968092] ? SyS_mount+0x35/0x50 [ 639.971651] ? do_syscall_64+0x29e/0x9d0 [ 639.975738] ? entry_SYSCALL_64_after_hwframe+0x42/0xb7 2018/04/11 12:45:41 executing program 1: r0 = socket(0x1e, 0x1, 0x0) setsockopt$packet_tx_ring(r0, 0x10f, 0x87, &(0x7f0000b89fe4)=@req={0x772}, 0x10) sendmsg(r0, &(0x7f0000030000)={&(0x7f00004f5000)=@generic={0x10000000001e, "0014000900000000000000000226cc573c080200003724c71e14dd6a739effea1b48006be61ffe0000e103000000f8000004003f010039d8f986ff01000300000004af50d50700000000000000e3ad316a1983000000001d00e0dfcb24281e27800000100076c3979ac40000bd15020078a1dfd300881a8365b1b16d7436"}, 0x80, &(0x7f0000447ff0), 0x0, &(0x7f00006e9c68)}, 0x0) 2018/04/11 12:45:41 executing program 7: syz_emit_ethernet(0x66, &(0x7f0000000000)={@random="cd3997030f00", @empty=[0x0, 0x0, 0x0, 0x0, 0x8035], [], {@ipv6={0x86dd, {0x0, 0x6, "b40900", 0x30, 0x67, 0x0, @ipv4={[], [0xff, 0xff], @multicast2=0xe0000002}, @mcast2={0xff, 0x2, [], 0x1}, {[], @icmpv6=@time_exceed={0x21, 0x0, 0x0, 0x0, [], {0x0, 0x6, "b680fa", 0x0, 0x0, 0x0, @ipv4={[], [0xff, 0xff], @broadcast=0xffffffff}, @ipv4={[], [0xff, 0xff], @remote={0xac, 0x14, 0xffffffffffffffff, 0xbb}}}}}}}}}, 0x0) [ 639.981130] ? find_held_lock+0x36/0x1c0 [ 639.985219] ? __lock_is_held+0xb5/0x140 [ 639.989321] ? check_same_owner+0x320/0x320 [ 639.993671] ? rcu_note_context_switch+0x710/0x710 [ 639.998632] __should_failslab+0x124/0x180 [ 640.002900] should_failslab+0x9/0x14 [ 640.006722] kmem_cache_alloc_trace+0x2cb/0x780 [ 640.011408] ? __kmalloc_node+0x33/0x70 [ 640.015402] ? __kmalloc_node+0x33/0x70 [ 640.019394] ? rcu_read_lock_sched_held+0x108/0x120 [ 640.024442] __memcg_init_list_lru_node+0x17d/0x2c0 2018/04/11 12:45:41 executing program 2: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x1e, 0x1, 0x0) setsockopt$packet_tx_ring(r0, 0x10f, 0x87, &(0x7f0000b89fe4)=@req={0x772}, 0x10) sendmsg(r0, &(0x7f0000030000)={&(0x7f00004f5000)=@generic={0x10000000001e, "0100000900000000000000000226cc573c080000003724c71e14dd6a739effea1b48006be61ffe0000e103000000f8000004003f010039d8f986ff01000300000004af50d50700000000000000e3ad316a1983000004001d00e0dfcb24281e27800000100076c3979ac40000bd15020078a1dfd300881a8365b1b16d7436"}, 0x80, &(0x7f0000447ff0), 0x0, &(0x7f00006e9c68)}, 0x0) [ 640.029491] ? kvfree_rcu+0x20/0x20 [ 640.033137] ? __kmalloc_node+0x47/0x70 [ 640.037140] __list_lru_init+0x456/0x790 [ 640.041226] ? list_lru_destroy+0x4c0/0x4c0 [ 640.045561] ? mark_held_locks+0xc9/0x160 [ 640.049727] ? __raw_spin_lock_init+0x1c/0x100 [ 640.054324] ? trace_hardirqs_on_caller+0x421/0x5c0 [ 640.059352] ? __lockdep_init_map+0x105/0x590 [ 640.063864] ? lockdep_init_map+0x9/0x10 [ 640.067946] sget_userns+0x6d9/0xf20 [ 640.071677] ? kill_litter_super+0x90/0x90 [ 640.075931] ? ns_test_super+0x50/0x50 [ 640.079846] ? destroy_unused_super.part.9+0x100/0x100 [ 640.085136] ? do_raw_spin_trylock+0x1b0/0x1b0 [ 640.089735] ? kasan_check_write+0x14/0x20 [ 640.093982] ? do_raw_spin_lock+0xc1/0x200 [ 640.098243] ? blkdev_get+0xc0/0xb30 [ 640.101979] ? cap_capable+0x1f9/0x260 [ 640.105892] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 640.111445] ? security_capable+0x99/0xc0 [ 640.115611] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 640.121792] ? ns_capable_common+0x13f/0x170 [ 640.126217] ? kill_litter_super+0x90/0x90 [ 640.130467] sget+0x10b/0x150 [ 640.133585] ? ns_test_super+0x50/0x50 [ 640.137495] mount_bdev+0x111/0x3e0 [ 640.141138] ? fuse_get_root_inode+0x190/0x190 [ 640.145740] fuse_mount_blk+0x34/0x40 [ 640.149567] mount_fs+0xae/0x328 [ 640.152952] vfs_kern_mount.part.34+0xd4/0x4d0 [ 640.157560] ? may_umount+0xb0/0xb0 [ 640.161196] ? _raw_read_unlock+0x22/0x30 [ 640.165358] ? __get_fs_type+0x97/0xc0 [ 640.169270] do_mount+0x564/0x3070 [ 640.172829] ? copy_mount_string+0x40/0x40 [ 640.177071] ? trace_hardirqs_on_caller+0x421/0x5c0 [ 640.182107] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 640.186887] ? retint_kernel+0x10/0x10 [ 640.190809] ? copy_mount_options+0x1f0/0x380 [ 640.195318] ? copy_mount_options+0x202/0x380 [ 640.199829] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 640.205377] ? copy_mount_options+0x285/0x380 [ 640.209895] ksys_mount+0x12d/0x140 [ 640.213540] SyS_mount+0x35/0x50 [ 640.216920] ? ksys_mount+0x140/0x140 [ 640.220740] do_syscall_64+0x29e/0x9d0 [ 640.224646] ? syscall_slow_exit_work+0x4f0/0x4f0 [ 640.229502] ? syscall_return_slowpath+0x5c0/0x5c0 [ 640.234455] ? syscall_return_slowpath+0x30f/0x5c0 [ 640.239407] ? entry_SYSCALL_64_after_hwframe+0x52/0xb7 [ 640.244801] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 640.249675] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 640.254877] RIP: 0033:0x455259 [ 640.258074] RSP: 002b:00007f95e4cadb08 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 640.265801] RAX: ffffffffffffffda RBX: 0000000000000015 RCX: 0000000000455259 [ 640.273082] RDX: 00000000004b9bc5 RSI: 0000000020000040 RDI: 0000000020000000 [ 640.280361] RBP: 0000000020000000 R08: 00007f95e4cadb20 R09: 0000000000000000 [ 640.287639] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 640.294915] R13: 0000000000000000 R14: 0000000000000000 R15: 0000000000000000 2018/04/11 12:45:42 executing program 6: r0 = socket$inet6(0xa, 0x80003, 0xff) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @ipv4={[], [0xff, 0xff], @dev={0xac, 0x14, 0x14, 0x1b}}}, 0x1c) sendmsg(r0, &(0x7f000001b000)={0x0, 0xfffffff5, &(0x7f0000019fa0), 0x85, &(0x7f000001ef08)}, 0x0) 2018/04/11 12:45:42 executing program 7: syz_emit_ethernet(0x66, &(0x7f0000000000)={@random="cd3997030f00", @empty=[0x0, 0x0, 0x0, 0x0, 0x500], [], {@ipv6={0x86dd, {0x0, 0x6, "b40900", 0x30, 0x67, 0x0, @ipv4={[], [0xff, 0xff], @multicast2=0xe0000002}, @mcast2={0xff, 0x2, [], 0x1}, {[], @icmpv6=@time_exceed={0x21, 0x0, 0x0, 0x0, [], {0x0, 0x6, "b680fa", 0x0, 0x0, 0x0, @ipv4={[], [0xff, 0xff], @broadcast=0xffffffff}, @ipv4={[], [0xff, 0xff], @remote={0xac, 0x14, 0xffffffffffffffff, 0xbb}}}}}}}}}, 0x0) 2018/04/11 12:45:42 executing program 5: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000200)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc-cast5-avx\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00003bcfd0)="d3ab27191a", 0x5) sendmmsg$alg(r1, &(0x7f0000007e40)=[{0x0, 0x0, &(0x7f0000000040)}], 0x1, 0x0) setsockopt$inet6_MRT6_DEL_MFC(0xffffffffffffffff, 0x29, 0xcd, &(0x7f0000000100)={{0xa, 0x4e23, 0x2, @remote={0xfe, 0x80, [], 0xbb}, 0x6}, {0xa, 0x4e23, 0x472, @ipv4={[], [0xff, 0xff], @loopback=0x7f000001}, 0x612}, 0x0, [0xffffffffffff8f50, 0xa895, 0x2, 0xffffffffffffffc0, 0x800, 0x2, 0xfffffffffffffff9, 0x20000000]}, 0x5c) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$sock_netdev_private(r2, 0x89f9, &(0x7f0000000080)="31e9af0c827c232f882c1a2f9fa167c3325f84f7324ebf17c823ec8cc5d9d83fe71611455adcbe594122e8f46d981868a705f6b6d3ecfa0eb4433910a7c5ad1d6224fd256aadd914b78e08625e3d48d892") openat$rfkill(0xffffffffffffff9c, &(0x7f0000000040)='/dev/rfkill\x00', 0x80, 0x0) 2018/04/11 12:45:42 executing program 1: r0 = socket(0x1e, 0x1, 0x0) setsockopt$packet_tx_ring(r0, 0x10f, 0x87, &(0x7f0000b89fe4)=@req={0x772}, 0x10) sendmsg(r0, &(0x7f0000030000)={&(0x7f00004f5000)=@generic={0x10000000001e, "0014000900000000000000000226cc573c080300003724c71e14dd6a739effea1b48006be61ffe0000e103000000f8000004003f010039d8f986ff01000300000004af50d50700000000000000e3ad316a1983000000001d00e0dfcb24281e27800000100076c3979ac40000bd15020078a1dfd300881a8365b1b16d7436"}, 0x80, &(0x7f0000447ff0), 0x0, &(0x7f00006e9c68)}, 0x0) 2018/04/11 12:45:42 executing program 2: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x1e, 0x1, 0x0) setsockopt$packet_tx_ring(r0, 0x10f, 0x87, &(0x7f0000b89fe4)=@req={0x772}, 0x10) sendmsg(r0, &(0x7f0000030000)={&(0x7f00004f5000)=@generic={0x10000000001e, "0100000900000000000000000226cc573c080000003724c71e14dd6a739effea1b48006be61ffe0000e103000000f8000004003f010039d8f986ff01000300000004af50d50700000000000000e3ad316a1983000101d01d00e0dfcb24281e27800000100076c3979ac40000bd15020078a1dfd300881a8365b1b16d7436"}, 0x80, &(0x7f0000447ff0), 0x0, &(0x7f00006e9c68)}, 0x0) 2018/04/11 12:45:42 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f000029d000)={0x26, 'hash\x00', 0x0, 0x0, 'sha1-generic\x00'}, 0x58) r1 = accept4$alg(r0, 0x0, 0x0, 0x0) sendmsg$IPVS_CMD_GET_SERVICE(r1, &(0x7f00000000c0)={&(0x7f0000000000)={0x10}, 0xc, &(0x7f0000000080)={&(0x7f0000000300)={0xbc, 0x0, 0x0, 0x0, 0x0, {0x4}, [@IPVS_CMD_ATTR_DAEMON={0x28, 0x3, [@IPVS_DAEMON_ATTR_SYNC_ID={0x8, 0x3}, @IPVS_DAEMON_ATTR_MCAST_GROUP6={0x14, 0x6, @mcast1={0xff, 0x1, [], 0x1}}, @IPVS_DAEMON_ATTR_MCAST_TTL={0x8, 0x8}]}, @IPVS_CMD_ATTR_DEST={0x38, 0x2, [@IPVS_DEST_ATTR_WEIGHT={0x8, 0x4}, @IPVS_DEST_ATTR_ACTIVE_CONNS={0x8, 0x7}, @IPVS_DEST_ATTR_ADDR={0x14, 0x1, @ipv6=@mcast2={0xff, 0x2, [], 0x1}}, @IPVS_DEST_ATTR_PERSIST_CONNS={0x8, 0x9}, @IPVS_DEST_ATTR_ACTIVE_CONNS={0x8, 0x7}]}, @IPVS_CMD_ATTR_SERVICE={0x10, 0x1, [@IPVS_SVC_ATTR_FLAGS={0xc, 0x7}]}, @IPVS_CMD_ATTR_SERVICE={0x0, 0x1, [@IPVS_SVC_ATTR_FWMARK={0x0, 0x5}, @IPVS_SVC_ATTR_NETMASK={0x0, 0x9}, @IPVS_SVC_ATTR_PORT={0x0, 0x4}, @IPVS_SVC_ATTR_PROTOCOL={0x0, 0x2}]}, @IPVS_CMD_ATTR_SERVICE={0x30, 0x1, [@IPVS_SVC_ATTR_FLAGS={0xc, 0x7}, @IPVS_SVC_ATTR_AF={0x8, 0x1}, @IPVS_SVC_ATTR_PROTOCOL={0x8, 0x2}, @IPVS_SVC_ATTR_AF={0x8, 0x1}, @IPVS_SVC_ATTR_SCHED_NAME={0x8, 0x6, 'ovf\x00'}]}]}, 0xffffff11}, 0x1}, 0x0) 2018/04/11 12:45:42 executing program 3: semop(0x0, &(0x7f000001a000)=[{0x0, 0xffffffffffff0001}, {0x0, 0x0, 0x100000000000000}], 0x2) timer_create(0x0, &(0x7f0000cd0000)={0x0, 0x12}, &(0x7f0000044000)) timer_settime(0x0, 0x0, &(0x7f00004b1fe0)={{0x0, 0x1c9c380}, {0x0, 0x9}}, &(0x7f0000040000)) r0 = getpgid(0x0) tkill(r0, 0x1000000000016) 2018/04/11 12:45:42 executing program 4 (fault-call:1 fault-nth:27): perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_fuseblk_mount(&(0x7f0000000040)='./file0\x00', &(0x7f0000000000)='./file0\x00', 0x4000, 0x0, 0x0, 0x0, 0x0, 0x0) [ 640.798151] FAULT_INJECTION: forcing a failure. [ 640.798151] name failslab, interval 1, probability 0, space 0, times 0 [ 640.809514] CPU: 0 PID: 3940 Comm: syz-executor4 Not tainted 4.16.0+ #17 [ 640.816365] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 640.825732] Call Trace: [ 640.828336] dump_stack+0x1b9/0x294 [ 640.831993] ? dump_stack_print_info.cold.2+0x52/0x52 [ 640.837226] should_fail.cold.4+0xa/0x1a [ 640.841317] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 640.846440] ? save_stack+0x43/0xd0 [ 640.850088] ? kmem_cache_alloc_trace+0x152/0x780 [ 640.855035] ? __memcg_init_list_lru_node+0x17d/0x2c0 [ 640.860244] ? __list_lru_init+0x456/0x790 [ 640.864501] ? sget_userns+0x6d9/0xf20 [ 640.868405] ? graph_lock+0x170/0x170 [ 640.872223] ? vfs_kern_mount.part.34+0xd4/0x4d0 [ 640.876994] ? do_mount+0x564/0x3070 [ 640.880725] ? ksys_mount+0x12d/0x140 [ 640.884536] ? SyS_mount+0x35/0x50 [ 640.888086] ? do_syscall_64+0x29e/0x9d0 [ 640.892162] ? entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 640.897552] ? find_held_lock+0x36/0x1c0 [ 640.901646] ? __lock_is_held+0xb5/0x140 [ 640.905753] ? check_same_owner+0x320/0x320 [ 640.910093] ? rcu_note_context_switch+0x710/0x710 [ 640.915054] __should_failslab+0x124/0x180 [ 640.919310] should_failslab+0x9/0x14 [ 640.923124] kmem_cache_alloc_trace+0x2cb/0x780 [ 640.927803] ? __kmalloc_node+0x33/0x70 [ 640.931788] ? __kmalloc_node+0x33/0x70 [ 640.935780] ? rcu_read_lock_sched_held+0x108/0x120 [ 640.940828] __memcg_init_list_lru_node+0x17d/0x2c0 2018/04/11 12:45:42 executing program 7: syz_emit_ethernet(0x66, &(0x7f0000000000)={@random="cd3997030f00", @empty=[0x0, 0x0, 0x0, 0x0, 0x6700], [], {@ipv6={0x86dd, {0x0, 0x6, "b40900", 0x30, 0x67, 0x0, @ipv4={[], [0xff, 0xff], @multicast2=0xe0000002}, @mcast2={0xff, 0x2, [], 0x1}, {[], @icmpv6=@time_exceed={0x21, 0x0, 0x0, 0x0, [], {0x0, 0x6, "b680fa", 0x0, 0x0, 0x0, @ipv4={[], [0xff, 0xff], @broadcast=0xffffffff}, @ipv4={[], [0xff, 0xff], @remote={0xac, 0x14, 0xffffffffffffffff, 0xbb}}}}}}}}}, 0x0) 2018/04/11 12:45:42 executing program 6: r0 = socket$inet6(0xa, 0x80003, 0xff) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @ipv4={[], [0xff, 0xff], @dev={0xac, 0x14, 0x14, 0x1b}}}, 0x1c) sendmsg(r0, &(0x7f000001b000)={0x0, 0xfffffff5, &(0x7f0000019fa0), 0x158, &(0x7f000001ef08)}, 0x0) 2018/04/11 12:45:42 executing program 5: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0xfff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x1, 0x40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x7, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000200)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc-cast5-avx\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00003bcfd0)="d3ab27191a", 0x5) sendmmsg$alg(r1, &(0x7f0000007e40)=[{0x0, 0x0, &(0x7f0000000900)}], 0x1, 0x0) accept(r0, &(0x7f0000000040)=@pppol2tpv3in6, &(0x7f00000000c0)=0x80) [ 640.945871] ? kvfree_rcu+0x20/0x20 [ 640.949513] ? __kmalloc_node+0x47/0x70 [ 640.953522] __list_lru_init+0x456/0x790 [ 640.957604] ? list_lru_destroy+0x4c0/0x4c0 [ 640.961945] ? mark_held_locks+0xc9/0x160 [ 640.966112] ? __raw_spin_lock_init+0x1c/0x100 [ 640.970732] ? trace_hardirqs_on_caller+0x421/0x5c0 [ 640.975762] ? __lockdep_init_map+0x105/0x590 [ 640.980277] ? lockdep_init_map+0x9/0x10 [ 640.984359] sget_userns+0x6d9/0xf20 [ 640.988081] ? kill_litter_super+0x90/0x90 [ 640.992337] ? ns_test_super+0x50/0x50 [ 640.996239] ? destroy_unused_super.part.9+0x100/0x100 [ 641.001536] ? do_raw_spin_trylock+0x1b0/0x1b0 [ 641.006132] ? kasan_check_write+0x14/0x20 [ 641.010365] ? do_raw_spin_lock+0xc1/0x200 [ 641.014600] ? blkdev_get+0xc0/0xb30 [ 641.018312] ? cap_capable+0x1f9/0x260 [ 641.022199] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 641.027734] ? security_capable+0x99/0xc0 [ 641.031878] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 641.037401] ? ns_capable_common+0x13f/0x170 [ 641.041800] ? kill_litter_super+0x90/0x90 [ 641.046035] sget+0x10b/0x150 [ 641.049129] ? ns_test_super+0x50/0x50 [ 641.053012] mount_bdev+0x111/0x3e0 [ 641.056637] ? fuse_get_root_inode+0x190/0x190 [ 641.061213] fuse_mount_blk+0x34/0x40 [ 641.065009] mount_fs+0xae/0x328 [ 641.068378] vfs_kern_mount.part.34+0xd4/0x4d0 [ 641.072955] ? may_umount+0xb0/0xb0 [ 641.076573] ? _raw_read_unlock+0x22/0x30 [ 641.080711] ? __get_fs_type+0x97/0xc0 [ 641.084594] do_mount+0x564/0x3070 [ 641.088130] ? copy_mount_string+0x40/0x40 [ 641.092355] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 641.097104] ? retint_kernel+0x10/0x10 [ 641.100992] ? copy_mount_options+0x1a1/0x380 [ 641.105480] ? __sanitizer_cov_trace_pc+0x3f/0x50 [ 641.110314] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 641.115840] ? copy_mount_options+0x285/0x380 [ 641.120328] ksys_mount+0x12d/0x140 [ 641.123950] SyS_mount+0x35/0x50 [ 641.127305] ? ksys_mount+0x140/0x140 [ 641.131100] do_syscall_64+0x29e/0x9d0 [ 641.134977] ? vmalloc_sync_all+0x30/0x30 [ 641.139112] ? _raw_spin_unlock_irq+0x27/0x70 [ 641.143601] ? finish_task_switch+0x1ca/0x820 [ 641.148088] ? syscall_return_slowpath+0x5c0/0x5c0 [ 641.153010] ? syscall_return_slowpath+0x30f/0x5c0 [ 641.157942] ? entry_SYSCALL_64_after_hwframe+0x52/0xb7 [ 641.163303] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 641.168142] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 641.173318] RIP: 0033:0x455259 [ 641.176495] RSP: 002b:00007f95e4cadb08 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 641.184196] RAX: ffffffffffffffda RBX: 0000000000000015 RCX: 0000000000455259 [ 641.191453] RDX: 00000000004b9bc5 RSI: 0000000020000040 RDI: 0000000020000000 [ 641.198715] RBP: 0000000020000000 R08: 00007f95e4cadb20 R09: 0000000000000000 [ 641.205972] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 641.213228] R13: 0000000000000000 R14: 0000000000000000 R15: 0000000000000000 2018/04/11 12:45:42 executing program 7: syz_emit_ethernet(0x66, &(0x7f0000000000)={@random="cd3997030f00", @empty=[0x0, 0x0, 0x0, 0x0, 0x8848], [], {@ipv6={0x86dd, {0x0, 0x6, "b40900", 0x30, 0x67, 0x0, @ipv4={[], [0xff, 0xff], @multicast2=0xe0000002}, @mcast2={0xff, 0x2, [], 0x1}, {[], @icmpv6=@time_exceed={0x21, 0x0, 0x0, 0x0, [], {0x0, 0x6, "b680fa", 0x0, 0x0, 0x0, @ipv4={[], [0xff, 0xff], @broadcast=0xffffffff}, @ipv4={[], [0xff, 0xff], @remote={0xac, 0x14, 0xffffffffffffffff, 0xbb}}}}}}}}}, 0x0) 2018/04/11 12:45:42 executing program 1: r0 = socket(0x1e, 0x1, 0x0) setsockopt$packet_tx_ring(r0, 0x10f, 0x87, &(0x7f0000b89fe4)=@req={0x772}, 0x10) sendmsg(r0, &(0x7f0000030000)={&(0x7f00004f5000)=@generic={0x10000000001e, "0014000900000000000000000226cc573c080000033724c71e14dd6a739effea1b48006be61ffe0000e103000000f8000004003f010039d8f986ff01000300000004af50d50700000000000000e3ad316a1983000000001d00e0dfcb24281e27800000100076c3979ac40000bd15020078a1dfd300881a8365b1b16d7436"}, 0x80, &(0x7f0000447ff0), 0x0, &(0x7f00006e9c68)}, 0x0) 2018/04/11 12:45:42 executing program 6: r0 = socket$inet6(0xa, 0x80003, 0xff) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @ipv4={[], [0xff, 0xff], @dev={0xac, 0x14, 0x14, 0x1b}}}, 0x1c) sendmsg(r0, &(0x7f000001b000)={0x0, 0xfffffff5, &(0x7f0000019fa0), 0x161, &(0x7f000001ef08)}, 0x0) 2018/04/11 12:45:42 executing program 2: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x1e, 0x1, 0x0) setsockopt$packet_tx_ring(r0, 0x10f, 0x87, &(0x7f0000b89fe4)=@req={0x772}, 0x10) sendmsg(r0, &(0x7f0000030000)={&(0x7f00004f5000)=@generic={0x10000000001e, "0100000900000000000000000226cc573c080000003724c71e14dd6a739effea1b48006be61ffe0000e103000000f8000004003f010039d8f986ff01000300000004af50d50700000000000000e3ad316a19837fffffff1d00e0dfcb24281e27800000100076c3979ac40000bd15020078a1dfd300881a8365b1b16d7436"}, 0x80, &(0x7f0000447ff0), 0x0, &(0x7f00006e9c68)}, 0x0) 2018/04/11 12:45:43 executing program 6: r0 = socket$inet6(0xa, 0x80003, 0xff) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @ipv4={[], [0xff, 0xff], @dev={0xac, 0x14, 0x14, 0x1b}}}, 0x1c) sendmsg(r0, &(0x7f000001b000)={0x0, 0xfffffff5, &(0x7f0000019fa0), 0x133, &(0x7f000001ef08)}, 0x0) 2018/04/11 12:45:43 executing program 3: semop(0x0, &(0x7f000001a000)=[{0x0, 0xffffffffffff0001}, {0x0, 0x0, 0xe00000000000000}], 0x2) timer_create(0x0, &(0x7f0000cd0000)={0x0, 0x12}, &(0x7f0000044000)) timer_settime(0x0, 0x0, &(0x7f00004b1fe0)={{0x0, 0x1c9c380}, {0x0, 0x9}}, &(0x7f0000040000)) r0 = getpgid(0x0) tkill(r0, 0x1000000000016) 2018/04/11 12:45:43 executing program 0: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff7fffffffffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_genetlink_get_family_id$ipvs(&(0x7f0000000240)='IPVS\x00') r0 = socket$netlink(0x10, 0x3, 0xc) bind$netlink(r0, &(0x7f0000000040)={0x10, 0x0, 0x0, 0x2ffffffff}, 0xc) 2018/04/11 12:45:43 executing program 7: syz_emit_ethernet(0x66, &(0x7f0000000000)={@random="cd3997030f00", @empty=[0x0, 0x0, 0x0, 0x0, 0x8847000000000000], [], {@ipv6={0x86dd, {0x0, 0x6, "b40900", 0x30, 0x67, 0x0, @ipv4={[], [0xff, 0xff], @multicast2=0xe0000002}, @mcast2={0xff, 0x2, [], 0x1}, {[], @icmpv6=@time_exceed={0x21, 0x0, 0x0, 0x0, [], {0x0, 0x6, "b680fa", 0x0, 0x0, 0x0, @ipv4={[], [0xff, 0xff], @broadcast=0xffffffff}, @ipv4={[], [0xff, 0xff], @remote={0xac, 0x14, 0xffffffffffffffff, 0xbb}}}}}}}}}, 0x0) 2018/04/11 12:45:43 executing program 2: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x1e, 0x1, 0x0) setsockopt$packet_tx_ring(r0, 0x10f, 0x87, &(0x7f0000b89fe4)=@req={0x772}, 0x10) sendmsg(r0, &(0x7f0000030000)={&(0x7f00004f5000)=@generic={0x10000000001e, "0100000900000000000000000226cc573c080000003724c71e14dd6a739effea1b48006be61ffe0000e103000000f8000004003f010039d8f986ff01000300000004af50d50700000000000000e3ad316a1983040000001d00e0dfcb24281e27800000100076c3979ac40000bd15020078a1dfd300881a8365b1b16d7436"}, 0x80, &(0x7f0000447ff0), 0x0, &(0x7f00006e9c68)}, 0x0) 2018/04/11 12:45:43 executing program 5: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000200)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc-cast5-avx\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00003bcfd0)="d3ab27191a", 0x5) sendmmsg$alg(r1, &(0x7f0000007e40)=[{0x0, 0x0, &(0x7f0000000900)}], 0x1, 0x0) accept(r0, &(0x7f0000000140)=@pppol2tpv3in6, &(0x7f0000000100)=0x80) 2018/04/11 12:45:43 executing program 1: r0 = socket(0x1e, 0x1, 0x0) setsockopt$packet_tx_ring(r0, 0x10f, 0x87, &(0x7f0000b89fe4)=@req={0x772}, 0x10) sendmsg(r0, &(0x7f0000030000)={&(0x7f00004f5000)=@generic={0x10000000001e, "0014000900000000000000000226cc573c080004003724c71e14dd6a739effea1b48006be61ffe0000e103000000f8000004003f010039d8f986ff01000300000004af50d50700000000000000e3ad316a1983000000001d00e0dfcb24281e27800000100076c3979ac40000bd15020078a1dfd300881a8365b1b16d7436"}, 0x80, &(0x7f0000447ff0), 0x0, &(0x7f00006e9c68)}, 0x0) 2018/04/11 12:45:43 executing program 4 (fault-call:1 fault-nth:28): perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_fuseblk_mount(&(0x7f0000000040)='./file0\x00', &(0x7f0000000000)='./file0\x00', 0x4000, 0x0, 0x0, 0x0, 0x0, 0x0) 2018/04/11 12:45:43 executing program 6: r0 = socket$inet6(0xa, 0x80003, 0xff) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @ipv4={[], [0xff, 0xff], @dev={0xac, 0x14, 0x14, 0x1b}}}, 0x1c) sendmsg(r0, &(0x7f000001b000)={0x0, 0xfffffff5, &(0x7f0000019fa0), 0x1d9, &(0x7f000001ef08)}, 0x0) [ 642.016228] FAULT_INJECTION: forcing a failure. [ 642.016228] name failslab, interval 1, probability 0, space 0, times 0 [ 642.027654] CPU: 0 PID: 3995 Comm: syz-executor4 Not tainted 4.16.0+ #17 [ 642.034510] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 642.043873] Call Trace: [ 642.046482] dump_stack+0x1b9/0x294 [ 642.050137] ? dump_stack_print_info.cold.2+0x52/0x52 [ 642.055367] should_fail.cold.4+0xa/0x1a [ 642.059445] ? is_bpf_text_address+0xd7/0x170 [ 642.063966] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 642.069097] ? __save_stack_trace+0x7e/0xd0 [ 642.073439] ? graph_lock+0x170/0x170 [ 642.077272] ? find_held_lock+0x36/0x1c0 [ 642.081366] ? __lock_is_held+0xb5/0x140 [ 642.085472] ? check_same_owner+0x320/0x320 [ 642.089816] ? rcu_note_context_switch+0x710/0x710 [ 642.094772] __should_failslab+0x124/0x180 [ 642.099028] should_failslab+0x9/0x14 [ 642.102843] kmem_cache_alloc_trace+0x2cb/0x780 [ 642.107531] ? __kmalloc_node+0x33/0x70 [ 642.111521] ? __kmalloc_node+0x33/0x70 [ 642.115512] ? rcu_read_lock_sched_held+0x108/0x120 [ 642.120555] __memcg_init_list_lru_node+0x17d/0x2c0 [ 642.126139] ? kvfree_rcu+0x20/0x20 [ 642.129784] ? __kmalloc_node+0x47/0x70 [ 642.133795] __list_lru_init+0x456/0x790 [ 642.137883] ? list_lru_destroy+0x4c0/0x4c0 [ 642.142223] ? mark_held_locks+0xc9/0x160 [ 642.146391] ? __raw_spin_lock_init+0x1c/0x100 [ 642.150992] ? trace_hardirqs_on_caller+0x421/0x5c0 [ 642.156033] ? lockdep_init_map+0x9/0x10 [ 642.160114] sget_userns+0x706/0xf20 [ 642.163837] ? kill_litter_super+0x90/0x90 [ 642.168089] ? ns_test_super+0x50/0x50 [ 642.171989] ? destroy_unused_super.part.9+0x100/0x100 [ 642.177280] ? do_raw_spin_trylock+0x1b0/0x1b0 [ 642.181880] ? kasan_check_write+0x14/0x20 [ 642.186128] ? do_raw_spin_lock+0xc1/0x200 [ 642.190389] ? blkdev_get+0xc0/0xb30 [ 642.194125] ? cap_capable+0x1f9/0x260 [ 642.198040] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 642.203588] ? security_capable+0x99/0xc0 [ 642.207755] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 642.213302] ? ns_capable_common+0x13f/0x170 [ 642.217727] ? kill_litter_super+0x90/0x90 [ 642.221975] sget+0x10b/0x150 [ 642.225092] ? ns_test_super+0x50/0x50 [ 642.228995] mount_bdev+0x111/0x3e0 [ 642.232639] ? fuse_get_root_inode+0x190/0x190 [ 642.237243] fuse_mount_blk+0x34/0x40 [ 642.241063] mount_fs+0xae/0x328 [ 642.244461] vfs_kern_mount.part.34+0xd4/0x4d0 [ 642.249063] ? may_umount+0xb0/0xb0 [ 642.252704] ? _raw_read_unlock+0x22/0x30 [ 642.256866] ? __get_fs_type+0x97/0xc0 [ 642.260777] do_mount+0x564/0x3070 2018/04/11 12:45:43 executing program 7: syz_emit_ethernet(0x66, &(0x7f0000000000)={@random="cd3997030f00", @empty=[0x0, 0x0, 0x0, 0x0, 0x5800000000000000], [], {@ipv6={0x86dd, {0x0, 0x6, "b40900", 0x30, 0x67, 0x0, @ipv4={[], [0xff, 0xff], @multicast2=0xe0000002}, @mcast2={0xff, 0x2, [], 0x1}, {[], @icmpv6=@time_exceed={0x21, 0x0, 0x0, 0x0, [], {0x0, 0x6, "b680fa", 0x0, 0x0, 0x0, @ipv4={[], [0xff, 0xff], @broadcast=0xffffffff}, @ipv4={[], [0xff, 0xff], @remote={0xac, 0x14, 0xffffffffffffffff, 0xbb}}}}}}}}}, 0x0) 2018/04/11 12:45:43 executing program 1: r0 = socket(0x1e, 0x1, 0x0) setsockopt$packet_tx_ring(r0, 0x10f, 0x87, &(0x7f0000b89fe4)=@req={0x772}, 0x10) sendmsg(r0, &(0x7f0000030000)={&(0x7f00004f5000)=@generic={0x10000000001e, "0014000900000000000000000226cc573c080003003724c71e14dd6a739effea1b48006be61ffe0000e103000000f8000004003f010039d8f986ff01000300000004af50d50700000000000000e3ad316a1983000000001d00e0dfcb24281e27800000100076c3979ac40000bd15020078a1dfd300881a8365b1b16d7436"}, 0x80, &(0x7f0000447ff0), 0x0, &(0x7f00006e9c68)}, 0x0) 2018/04/11 12:45:43 executing program 2: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x1e, 0x1, 0x0) setsockopt$packet_tx_ring(r0, 0x10f, 0x87, &(0x7f0000b89fe4)=@req={0x772}, 0x10) sendmsg(r0, &(0x7f0000030000)={&(0x7f00004f5000)=@generic={0x10000000001e, "0100000900000000000000000226cc573c080000003724c71e14dd6a739effea1b48006be61ffe0000e103000000f8000004003f010039d8f986ff01000300000004af50d50700000000000000e3ad316a1983000200001d00e0dfcb24281e27800000100076c3979ac40000bd15020078a1dfd300881a8365b1b16d7436"}, 0x80, &(0x7f0000447ff0), 0x0, &(0x7f00006e9c68)}, 0x0) 2018/04/11 12:45:43 executing program 6: r0 = socket$inet6(0xa, 0x80003, 0xff) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @ipv4={[], [0xff, 0xff], @dev={0xac, 0x14, 0x14, 0x1b}}}, 0x1c) sendmsg(r0, &(0x7f000001b000)={0x0, 0xfffffff5, &(0x7f0000019fa0), 0x6e, &(0x7f000001ef08)}, 0x0) 2018/04/11 12:45:43 executing program 5: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000200)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc-cast5-avx\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00003bcfd0)="d3ab27191a", 0x5) sendmmsg$alg(r1, &(0x7f0000007e40)=[{0x0, 0x0, &(0x7f0000000900)}], 0x1, 0x0) r2 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000100)='/dev/vcs\x00', 0x60100, 0x0) getsockopt$inet_sctp_SCTP_LOCAL_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1b, &(0x7f0000000140)={0x0}, &(0x7f0000000180)=0x8) getsockopt$inet_sctp_SCTP_RESET_STREAMS(0xffffffffffffff9c, 0x84, 0x77, &(0x7f00000001c0)={0x0, 0x7ca, 0x9, [0x9, 0x2, 0x3, 0x8, 0x8000, 0x6, 0x80, 0x8000, 0x40]}, &(0x7f0000000280)=0x1a) getsockopt$inet_sctp6_SCTP_STATUS(r2, 0x84, 0xe, &(0x7f00000002c0)={r3, 0x3, 0x9, 0x5, 0x9, 0x3, 0x5, 0x19c1, {r4, @in6={{0xa, 0x4e20, 0x1124, @remote={0xfe, 0x80, [], 0xbb}, 0x9}}, 0x800, 0x0, 0xb3a, 0x8}}, &(0x7f0000000500)=0xb0) getsockname$packet(r0, &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @remote}, &(0x7f00000003c0)=0x14) sendmsg$can_raw(r0, &(0x7f00000004c0)={&(0x7f0000000400)={0x1d, r5}, 0x10, &(0x7f0000000480)={&(0x7f0000000440)=@can={{0x4, 0x1ff, 0x9, 0x7}, 0x8, 0x1, 0x0, 0x0, "1f1e88ff8380be32"}, 0x10}, 0x1, 0x0, 0x0, 0x4048001}, 0x80) accept(r0, &(0x7f0000000040)=@pppol2tpv3in6, &(0x7f00000000c0)=0x80) 2018/04/11 12:45:43 executing program 7: syz_emit_ethernet(0x66, &(0x7f0000000000)={@random="cd3997030f00", @empty=[0x0, 0x0, 0x0, 0x0, 0x2000000], [], {@ipv6={0x86dd, {0x0, 0x6, "b40900", 0x30, 0x67, 0x0, @ipv4={[], [0xff, 0xff], @multicast2=0xe0000002}, @mcast2={0xff, 0x2, [], 0x1}, {[], @icmpv6=@time_exceed={0x21, 0x0, 0x0, 0x0, [], {0x0, 0x6, "b680fa", 0x0, 0x0, 0x0, @ipv4={[], [0xff, 0xff], @broadcast=0xffffffff}, @ipv4={[], [0xff, 0xff], @remote={0xac, 0x14, 0xffffffffffffffff, 0xbb}}}}}}}}}, 0x0) 2018/04/11 12:45:43 executing program 1: r0 = socket(0x1e, 0x1, 0x0) setsockopt$packet_tx_ring(r0, 0x10f, 0x87, &(0x7f0000b89fe4)=@req={0x772}, 0x10) sendmsg(r0, &(0x7f0000030000)={&(0x7f00004f5000)=@generic={0x10000000001e, "0014000900000000000000000226cc573c080002003724c71e14dd6a739effea1b48006be61ffe0000e103000000f8000004003f010039d8f986ff01000300000004af50d50700000000000000e3ad316a1983000000001d00e0dfcb24281e27800000100076c3979ac40000bd15020078a1dfd300881a8365b1b16d7436"}, 0x80, &(0x7f0000447ff0), 0x0, &(0x7f00006e9c68)}, 0x0) [ 642.264340] ? copy_mount_string+0x40/0x40 [ 642.268588] ? trace_hardirqs_on_caller+0x421/0x5c0 [ 642.273632] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 642.278417] ? retint_kernel+0x10/0x10 [ 642.282334] ? copy_mount_options+0x1f0/0x380 [ 642.286840] ? copy_mount_options+0x1fa/0x380 [ 642.291350] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 642.296895] ? copy_mount_options+0x285/0x380 [ 642.301412] ksys_mount+0x12d/0x140 [ 642.305060] SyS_mount+0x35/0x50 [ 642.308438] ? ksys_mount+0x140/0x140 [ 642.312267] do_syscall_64+0x29e/0x9d0 [ 642.316163] ? vmalloc_sync_all+0x30/0x30 [ 642.320319] ? _raw_spin_unlock_irq+0x27/0x70 [ 642.324829] ? finish_task_switch+0x1ca/0x820 [ 642.329360] ? syscall_return_slowpath+0x5c0/0x5c0 [ 642.334309] ? syscall_return_slowpath+0x30f/0x5c0 [ 642.339998] ? entry_SYSCALL_64_after_hwframe+0x52/0xb7 [ 642.345407] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 642.350281] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 642.355478] RIP: 0033:0x455259 [ 642.358675] RSP: 002b:00007f95e4cadb08 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 642.366407] RAX: ffffffffffffffda RBX: 0000000000000015 RCX: 0000000000455259 [ 642.366417] RDX: 00000000004b9bc5 RSI: 0000000020000040 RDI: 0000000020000000 [ 642.366427] RBP: 0000000020000000 R08: 00007f95e4cadb20 R09: 0000000000000000 [ 642.366437] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 642.366446] R13: 0000000000000000 R14: 0000000000000000 R15: 0000000000000000 2018/04/11 12:45:44 executing program 6: r0 = socket$inet6(0xa, 0x80003, 0xff) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @ipv4={[], [0xff, 0xff], @dev={0xac, 0x14, 0x14, 0x1b}}}, 0x1c) sendmsg(r0, &(0x7f000001b000)={0x0, 0xfffffff5, &(0x7f0000019fa0), 0x193, &(0x7f000001ef08)}, 0x0) 2018/04/11 12:45:44 executing program 0: syz_emit_ethernet(0x16, &(0x7f0000000040)={@random="7ebebf23d605", @dev={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa]}, [], {@mpls_mc={0x8848, {[], @llc={@snap={0x0, 0x0, "d1", "c608a9"}}}}}}, &(0x7f0000000140)) 2018/04/11 12:45:44 executing program 1: r0 = socket(0x1e, 0x1, 0x0) setsockopt$packet_tx_ring(r0, 0x10f, 0x87, &(0x7f0000b89fe4)=@req={0x772}, 0x10) sendmsg(r0, &(0x7f0000030000)={&(0x7f00004f5000)=@generic={0x10000000001e, "0014000900000000000000000226cc573c080000023724c71e14dd6a739effea1b48006be61ffe0000e103000000f8000004003f010039d8f986ff01000300000004af50d50700000000000000e3ad316a1983000000001d00e0dfcb24281e27800000100076c3979ac40000bd15020078a1dfd300881a8365b1b16d7436"}, 0x80, &(0x7f0000447ff0), 0x0, &(0x7f00006e9c68)}, 0x0) 2018/04/11 12:45:44 executing program 2: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x1e, 0x1, 0x0) setsockopt$packet_tx_ring(r0, 0x10f, 0x87, &(0x7f0000b89fe4)=@req={0x772}, 0x10) sendmsg(r0, &(0x7f0000030000)={&(0x7f00004f5000)=@generic={0x10000000001e, "0100000900000000000000000226cc573c080000003724c71e14dd6a739effea1b48006be61ffe0000e103000000f8000004003f010039d8f986ff01000300000004af50d50700000000000000e3ad316a1983000400001d00e0dfcb24281e27800000100076c3979ac40000bd15020078a1dfd300881a8365b1b16d7436"}, 0x80, &(0x7f0000447ff0), 0x0, &(0x7f00006e9c68)}, 0x0) 2018/04/11 12:45:44 executing program 7: syz_emit_ethernet(0x66, &(0x7f0000000000)={@random="cd3997030f00", @empty=[0x0, 0x0, 0x0, 0x0, 0x3580], [], {@ipv6={0x86dd, {0x0, 0x6, "b40900", 0x30, 0x67, 0x0, @ipv4={[], [0xff, 0xff], @multicast2=0xe0000002}, @mcast2={0xff, 0x2, [], 0x1}, {[], @icmpv6=@time_exceed={0x21, 0x0, 0x0, 0x0, [], {0x0, 0x6, "b680fa", 0x0, 0x0, 0x0, @ipv4={[], [0xff, 0xff], @broadcast=0xffffffff}, @ipv4={[], [0xff, 0xff], @remote={0xac, 0x14, 0xffffffffffffffff, 0xbb}}}}}}}}}, 0x0) 2018/04/11 12:45:44 executing program 4 (fault-call:1 fault-nth:29): perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_fuseblk_mount(&(0x7f0000000040)='./file0\x00', &(0x7f0000000000)='./file0\x00', 0x4000, 0x0, 0x0, 0x0, 0x0, 0x0) 2018/04/11 12:45:44 executing program 3: semop(0x0, &(0x7f000001a000)=[{0x0, 0xffffffffffff0001}, {0x0, 0x0, 0x5000000}], 0x2) timer_create(0x0, &(0x7f0000cd0000)={0x0, 0x12}, &(0x7f0000044000)) timer_settime(0x0, 0x0, &(0x7f00004b1fe0)={{0x0, 0x1c9c380}, {0x0, 0x9}}, &(0x7f0000040000)) r0 = getpgid(0x0) tkill(r0, 0x1000000000016) 2018/04/11 12:45:44 executing program 5: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) memfd_create(&(0x7f0000000180)='\x00', 0x1) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000200)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc-cast5-avx\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00003bcfd0)="d3ab27191a", 0x5) sendmmsg$alg(r1, &(0x7f0000007e40)=[{0x0, 0x0, &(0x7f0000000900)}], 0x1, 0x0) r2 = syz_open_dev$vcsa(&(0x7f0000000100)='/dev/vcsa#\x00', 0x5, 0x81) ioctl$sock_bt_bnep_BNEPGETCONNINFO(r2, 0x800442d3, &(0x7f0000000140)={0x0, 0xfffffffffffffffa, 0x2, @dev={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0x1b}, 'ip6tnl0\x00'}) accept(r0, &(0x7f0000000040)=@pppol2tpv3in6, &(0x7f00000000c0)=0x80) 2018/04/11 12:45:44 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000000)={'erspan0\x00'}) sendmsg$nl_route(r0, &(0x7f0000000300)={&(0x7f0000000200)={0x10}, 0xc, &(0x7f00000002c0)={&(0x7f0000000240)=ANY=[@ANYBLOB="300000001c00090500000000000000000a000000", @ANYBLOB="0000000014000100000400"], 0x2}, 0x1}, 0x0) [ 642.975284] FAULT_INJECTION: forcing a failure. [ 642.975284] name failslab, interval 1, probability 0, space 0, times 0 [ 642.986619] CPU: 0 PID: 4039 Comm: syz-executor4 Not tainted 4.16.0+ #17 [ 642.993473] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 643.002838] Call Trace: [ 643.005452] dump_stack+0x1b9/0x294 [ 643.009103] ? dump_stack_print_info.cold.2+0x52/0x52 [ 643.014332] should_fail.cold.4+0xa/0x1a [ 643.018420] ? fault_create_debugfs_attr+0x1f0/0x1f0 2018/04/11 12:45:44 executing program 7: syz_emit_ethernet(0x66, &(0x7f0000000000)={@random="cd3997030f00", @empty=[0x0, 0x0, 0x0, 0x0, 0x689], [], {@ipv6={0x86dd, {0x0, 0x6, "b40900", 0x30, 0x67, 0x0, @ipv4={[], [0xff, 0xff], @multicast2=0xe0000002}, @mcast2={0xff, 0x2, [], 0x1}, {[], @icmpv6=@time_exceed={0x21, 0x0, 0x0, 0x0, [], {0x0, 0x6, "b680fa", 0x0, 0x0, 0x0, @ipv4={[], [0xff, 0xff], @broadcast=0xffffffff}, @ipv4={[], [0xff, 0xff], @remote={0xac, 0x14, 0xffffffffffffffff, 0xbb}}}}}}}}}, 0x0) 2018/04/11 12:45:44 executing program 1: r0 = socket(0x1e, 0x1, 0x0) setsockopt$packet_tx_ring(r0, 0x10f, 0x87, &(0x7f0000b89fe4)=@req={0x772}, 0x10) sendmsg(r0, &(0x7f0000030000)={&(0x7f00004f5000)=@generic={0x10000000001e, "0014000900000000000000000226cc573c080000033724c71e14dd6a739effea1b48006be61ffe0000e103000000f8000004003f010039d8f986ff01000300000004af50d50700000000000000e3ad316a1983000000001d00e0dfcb24281e27800000100076c3979ac40000bd15020078a1dfd300881a8365b1b16d7436"}, 0x80, &(0x7f0000447ff0), 0x0, &(0x7f00006e9c68)}, 0x0) [ 643.023541] ? save_stack+0x43/0xd0 [ 643.027212] ? kmem_cache_alloc_trace+0x152/0x780 [ 643.027233] ? __memcg_init_list_lru_node+0x17d/0x2c0 [ 643.027250] ? __list_lru_init+0x456/0x790 [ 643.027263] ? sget_userns+0x6d9/0xf20 [ 643.027278] ? graph_lock+0x170/0x170 [ 643.027296] ? vfs_kern_mount.part.34+0xd4/0x4d0 [ 643.027308] ? do_mount+0x564/0x3070 [ 643.027321] ? ksys_mount+0x12d/0x140 [ 643.027330] ? SyS_mount+0x35/0x50 [ 643.027344] ? do_syscall_64+0x29e/0x9d0 [ 643.027360] ? entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 643.027379] ? find_held_lock+0x36/0x1c0 [ 643.027403] ? __lock_is_held+0xb5/0x140 [ 643.027440] ? check_same_owner+0x320/0x320 [ 643.027463] ? rcu_note_context_switch+0x710/0x710 [ 643.027492] __should_failslab+0x124/0x180 [ 643.027515] should_failslab+0x9/0x14 [ 643.027534] kmem_cache_alloc_trace+0x2cb/0x780 [ 643.027550] ? __kmalloc_node+0x33/0x70 [ 643.027566] ? __kmalloc_node+0x33/0x70 [ 643.027594] ? rcu_read_lock_sched_held+0x108/0x120 [ 643.027625] __memcg_init_list_lru_node+0x17d/0x2c0 2018/04/11 12:45:44 executing program 6: r0 = socket$inet6(0xa, 0x80003, 0xff) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @ipv4={[], [0xff, 0xff], @dev={0xac, 0x14, 0x14, 0x1b}}}, 0x1c) sendmsg(r0, &(0x7f000001b000)={0x0, 0xfffffff5, &(0x7f0000019fa0), 0x176, &(0x7f000001ef08)}, 0x0) 2018/04/11 12:45:44 executing program 2: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x1e, 0x1, 0x0) setsockopt$packet_tx_ring(r0, 0x10f, 0x87, &(0x7f0000b89fe4)=@req={0x772}, 0x10) sendmsg(r0, &(0x7f0000030000)={&(0x7f00004f5000)=@generic={0x10000000001e, "0100000900000000000000000226cc573c080000003724c71e14dd6a739effea1b48006be61ffe0000e103000000f8000004003f010039d8f986ff01000300000004af50d50700000000000000e3ad316a1983000002001d00e0dfcb24281e27800000100076c3979ac40000bd15020078a1dfd300881a8365b1b16d7436"}, 0x80, &(0x7f0000447ff0), 0x0, &(0x7f00006e9c68)}, 0x0) [ 643.027652] ? kvfree_rcu+0x20/0x20 [ 643.027671] ? __kmalloc_node+0x47/0x70 [ 643.027704] __list_lru_init+0x456/0x790 [ 643.027729] ? list_lru_destroy+0x4c0/0x4c0 [ 643.027747] ? mark_held_locks+0xc9/0x160 [ 643.027769] ? __raw_spin_lock_init+0x1c/0x100 [ 643.027790] ? trace_hardirqs_on_caller+0x421/0x5c0 [ 643.027806] ? __lockdep_init_map+0x105/0x590 [ 643.027832] ? lockdep_init_map+0x9/0x10 [ 643.161030] sget_userns+0x6d9/0xf20 [ 643.161045] ? kill_litter_super+0x90/0x90 [ 643.161066] ? ns_test_super+0x50/0x50 2018/04/11 12:45:44 executing program 0: perf_event_open(&(0x7f00000000c0)={0x2, 0x70, 0x3e2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000180)={&(0x7f0000000400)={0x10}, 0xc, &(0x7f0000000040)={&(0x7f0000000080)={0x14, 0x2, 0x2, 0x301}, 0x14}, 0x1}, 0x0) 2018/04/11 12:45:44 executing program 7: syz_emit_ethernet(0x66, &(0x7f0000000000)={@random="cd3997030f00", @empty=[0x0, 0x0, 0x0, 0x0, 0x6], [], {@ipv6={0x86dd, {0x0, 0x6, "b40900", 0x30, 0x67, 0x0, @ipv4={[], [0xff, 0xff], @multicast2=0xe0000002}, @mcast2={0xff, 0x2, [], 0x1}, {[], @icmpv6=@time_exceed={0x21, 0x0, 0x0, 0x0, [], {0x0, 0x6, "b680fa", 0x0, 0x0, 0x0, @ipv4={[], [0xff, 0xff], @broadcast=0xffffffff}, @ipv4={[], [0xff, 0xff], @remote={0xac, 0x14, 0xffffffffffffffff, 0xbb}}}}}}}}}, 0x0) [ 643.161086] ? destroy_unused_super.part.9+0x100/0x100 [ 643.178155] ? do_raw_spin_trylock+0x1b0/0x1b0 [ 643.182757] ? kasan_check_write+0x14/0x20 [ 643.187007] ? do_raw_spin_lock+0xc1/0x200 [ 643.191269] ? blkdev_get+0xc0/0xb30 [ 643.195020] ? cap_capable+0x1f9/0x260 [ 643.198932] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 643.204483] ? security_capable+0x99/0xc0 [ 643.208645] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 643.214193] ? ns_capable_common+0x13f/0x170 [ 643.218617] ? kill_litter_super+0x90/0x90 [ 643.222859] sget+0x10b/0x150 2018/04/11 12:45:44 executing program 5: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000200)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc-cast5-avx\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) r2 = dup2(r0, r0) getsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER_VALUE(0xffffffffffffffff, 0x84, 0x7c, &(0x7f0000000100)={0x0, 0xfffffffffffffffb, 0x100000001}, &(0x7f0000000140)=0x8) getsockopt$inet_sctp_SCTP_PEER_ADDR_THLDS(r2, 0x84, 0x1f, &(0x7f0000000280)={r3, @in={{0x2, 0x4e21, @loopback=0x7f000001}}, 0x8, 0x7}, &(0x7f0000000180)=0x90) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00003bcfd0)="d3ab27191a", 0x5) sendmmsg$alg(r1, &(0x7f0000007e40)=[{0x0, 0x0, &(0x7f0000000900)}], 0x1, 0x0) accept(r0, &(0x7f0000000040)=@pppol2tpv3in6, &(0x7f00000000c0)=0x80) 2018/04/11 12:45:44 executing program 1: r0 = socket(0x1e, 0x1, 0x0) setsockopt$packet_tx_ring(r0, 0x10f, 0x87, &(0x7f0000b89fe4)=@req={0x772}, 0x10) sendmsg(r0, &(0x7f0000030000)={&(0x7f00004f5000)=@generic={0x10000000001e, "0014000900000000000000000226cc573c080000003724c71e14dd6a739effea1b48026be61ffe0000e103000000f8000004003f010039d8f986ff01000300000004af50d50700000000000000e3ad316a1983000000001d00e0dfcb24281e27800000100076c3979ac40000bd15020078a1dfd300881a8365b1b16d7436"}, 0x80, &(0x7f0000447ff0), 0x0, &(0x7f00006e9c68)}, 0x0) [ 643.225974] ? ns_test_super+0x50/0x50 [ 643.229882] mount_bdev+0x111/0x3e0 [ 643.233527] ? fuse_get_root_inode+0x190/0x190 [ 643.238125] fuse_mount_blk+0x34/0x40 [ 643.243502] mount_fs+0xae/0x328 [ 643.246892] vfs_kern_mount.part.34+0xd4/0x4d0 [ 643.251499] ? may_umount+0xb0/0xb0 [ 643.255138] ? _raw_read_unlock+0x22/0x30 [ 643.259301] ? __get_fs_type+0x97/0xc0 [ 643.263208] do_mount+0x564/0x3070 [ 643.266775] ? copy_mount_string+0x40/0x40 [ 643.271026] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 643.275806] ? retint_kernel+0x10/0x10 [ 643.279716] ? copy_mount_options+0x213/0x380 [ 643.284220] ? copy_mount_options+0x1a1/0x380 [ 643.288729] ? __sanitizer_cov_trace_pc+0x20/0x50 [ 643.293589] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 643.299126] ? copy_mount_options+0x285/0x380 [ 643.303621] ksys_mount+0x12d/0x140 [ 643.307241] SyS_mount+0x35/0x50 [ 643.310596] ? ksys_mount+0x140/0x140 [ 643.314394] do_syscall_64+0x29e/0x9d0 [ 643.318271] ? vmalloc_sync_all+0x30/0x30 [ 643.322408] ? _raw_spin_unlock_irq+0x27/0x70 [ 643.326895] ? finish_task_switch+0x1ca/0x820 [ 643.331380] ? syscall_return_slowpath+0x5c0/0x5c0 [ 643.336299] ? syscall_return_slowpath+0x30f/0x5c0 [ 643.341224] ? entry_SYSCALL_64_after_hwframe+0x52/0xb7 [ 643.346584] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 643.351424] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 643.356599] RIP: 0033:0x455259 [ 643.359776] RSP: 002b:00007f95e4cadb08 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 643.367475] RAX: ffffffffffffffda RBX: 0000000000000015 RCX: 0000000000455259 2018/04/11 12:45:45 executing program 6: r0 = socket$inet6(0xa, 0x80003, 0xff) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @ipv4={[], [0xff, 0xff], @dev={0xac, 0x14, 0x14, 0x1b}}}, 0x1c) sendmsg(r0, &(0x7f000001b000)={0x0, 0xfffffff5, &(0x7f0000019fa0), 0x18a, &(0x7f000001ef08)}, 0x0) [ 643.374729] RDX: 00000000004b9bc5 RSI: 0000000020000040 RDI: 0000000020000000 [ 643.381984] RBP: 0000000020000000 R08: 00007f95e4cadb20 R09: 0000000000000000 [ 643.389242] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 643.396499] R13: 0000000000000000 R14: 0000000000000000 R15: 0000000000000000 2018/04/11 12:45:45 executing program 7: syz_emit_ethernet(0x66, &(0x7f0000000000)={@random="cd3997030f00", @empty=[0x0, 0x0, 0x0, 0x0, 0xd00000000000000], [], {@ipv6={0x86dd, {0x0, 0x6, "b40900", 0x30, 0x67, 0x0, @ipv4={[], [0xff, 0xff], @multicast2=0xe0000002}, @mcast2={0xff, 0x2, [], 0x1}, {[], @icmpv6=@time_exceed={0x21, 0x0, 0x0, 0x0, [], {0x0, 0x6, "b680fa", 0x0, 0x0, 0x0, @ipv4={[], [0xff, 0xff], @broadcast=0xffffffff}, @ipv4={[], [0xff, 0xff], @remote={0xac, 0x14, 0xffffffffffffffff, 0xbb}}}}}}}}}, 0x0) 2018/04/11 12:45:45 executing program 1: r0 = socket(0x1e, 0x1, 0x0) setsockopt$packet_tx_ring(r0, 0x10f, 0x87, &(0x7f0000b89fe4)=@req={0x772}, 0x10) sendmsg(r0, &(0x7f0000030000)={&(0x7f00004f5000)=@generic={0x10000000001e, "0014000900000000000000000226cc573c080000003724c71e14dd6a739effea1b48036be61ffe0000e103000000f8000004003f010039d8f986ff01000300000004af50d50700000000000000e3ad316a1983000000001d00e0dfcb24281e27800000100076c3979ac40000bd15020078a1dfd300881a8365b1b16d7436"}, 0x80, &(0x7f0000447ff0), 0x0, &(0x7f00006e9c68)}, 0x0) 2018/04/11 12:45:45 executing program 5: r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000180)='/proc/self/net/pfkey\x00', 0x20080, 0x0) poll(&(0x7f00000001c0)=[{r0, 0x100}], 0x1, 0x318) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000200)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc-cast5-avx\x00'}, 0x58) r2 = accept$alg(r1, 0x0, 0x0) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f00003bcfd0)="d3ab27191a", 0x5) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) sendmmsg$alg(r2, &(0x7f0000007e40)=[{0x0, 0x0, &(0x7f0000000900)}], 0x1, 0x0) accept(r1, &(0x7f0000000040)=@pppol2tpv3in6, &(0x7f00000000c0)=0x80) bind$alg(r1, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw-camellia-aesni\x00'}, 0x58) 2018/04/11 12:45:45 executing program 2: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x1e, 0x1, 0x0) setsockopt$packet_tx_ring(r0, 0x10f, 0x87, &(0x7f0000b89fe4)=@req={0x772}, 0x10) sendmsg(r0, &(0x7f0000030000)={&(0x7f00004f5000)=@generic={0x10000000001e, "0100000900000000000000000226cc573c080000003724c71e14dd6a739effea1b48006be61ffe0000e103000000f8000004003f010039d8f986ff01000300000004af50d50700000000000000e3ad316a1983000004001d00e0dfcb24281e27800000100076c3979ac40000bd15020078a1dfd300881a8365b1b16d7436"}, 0x80, &(0x7f0000447ff0), 0x0, &(0x7f00006e9c68)}, 0x0) 2018/04/11 12:45:45 executing program 4 (fault-call:1 fault-nth:30): perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_fuseblk_mount(&(0x7f0000000040)='./file0\x00', &(0x7f0000000000)='./file0\x00', 0x4000, 0x0, 0x0, 0x0, 0x0, 0x0) 2018/04/11 12:45:45 executing program 6: r0 = socket$inet6(0xa, 0x80003, 0xff) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @ipv4={[], [0xff, 0xff], @dev={0xac, 0x14, 0x14, 0x1b}}}, 0x1c) sendmsg(r0, &(0x7f000001b000)={0x0, 0xfffffff5, &(0x7f0000019fa0), 0x32, &(0x7f000001ef08)}, 0x0) 2018/04/11 12:45:45 executing program 7: syz_emit_ethernet(0x66, &(0x7f0000000000)={@random="cd3997030f00", @empty=[0x0, 0x0, 0x0, 0x0, 0x2800000000000000], [], {@ipv6={0x86dd, {0x0, 0x6, "b40900", 0x30, 0x67, 0x0, @ipv4={[], [0xff, 0xff], @multicast2=0xe0000002}, @mcast2={0xff, 0x2, [], 0x1}, {[], @icmpv6=@time_exceed={0x21, 0x0, 0x0, 0x0, [], {0x0, 0x6, "b680fa", 0x0, 0x0, 0x0, @ipv4={[], [0xff, 0xff], @broadcast=0xffffffff}, @ipv4={[], [0xff, 0xff], @remote={0xac, 0x14, 0xffffffffffffffff, 0xbb}}}}}}}}}, 0x0) 2018/04/11 12:45:45 executing program 1: r0 = socket(0x1e, 0x1, 0x0) setsockopt$packet_tx_ring(r0, 0x10f, 0x87, &(0x7f0000b89fe4)=@req={0x772}, 0x10) sendmsg(r0, &(0x7f0000030000)={&(0x7f00004f5000)=@generic={0x10000000001e, "0014000900000000000000000226cc573c080000003724c71e14dd6a739effea1b48006be61ffe0003e103000000f8000004003f010039d8f986ff01000300000004af50d50700000000000000e3ad316a1983000000001d00e0dfcb24281e27800000100076c3979ac40000bd15020078a1dfd300881a8365b1b16d7436"}, 0x80, &(0x7f0000447ff0), 0x0, &(0x7f00006e9c68)}, 0x0) 2018/04/11 12:45:45 executing program 0: r0 = socket$inet6(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f000044f000)={0xa, 0x4e20}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x3, &(0x7f0000000000)=ANY=[@ANYBLOB="aaaaaaaaaaaaffffffffffff86dd60d8652b02230600fe8000000000000000000000000000aafe8000000000000000000000000000aa00004e20", @ANYRES32=0x41424344, @ANYBLOB="ee3277582429a26755b20795f67001e05de2ac"], &(0x7f00000002c0)) 2018/04/11 12:45:45 executing program 3: semop(0x0, &(0x7f000001a000)=[{0x0, 0xffffffffffff0001}, {0x0, 0x0, 0x1000000}], 0x2) timer_create(0x0, &(0x7f0000cd0000)={0x0, 0x12}, &(0x7f0000044000)) timer_settime(0x0, 0x0, &(0x7f00004b1fe0)={{0x0, 0x1c9c380}, {0x0, 0x9}}, &(0x7f0000040000)) r0 = getpgid(0x0) tkill(r0, 0x1000000000016) 2018/04/11 12:45:45 executing program 5: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x100000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000200)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc-cast5-avx\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00003bcfd0)="d3ab27191a", 0x5) sendmmsg$alg(r1, &(0x7f0000007e40)=[{0x0, 0x0, &(0x7f0000000900)}], 0x1, 0x0) accept(r0, &(0x7f0000000100)=@pppol2tpv3in6, &(0x7f00000000c0)=0xfffffffffffffedf) 2018/04/11 12:45:45 executing program 7: syz_emit_ethernet(0x66, &(0x7f0000000000)={@random="cd3997030f00", @empty=[0x0, 0x0, 0x0, 0x0, 0x8848000000000000], [], {@ipv6={0x86dd, {0x0, 0x6, "b40900", 0x30, 0x67, 0x0, @ipv4={[], [0xff, 0xff], @multicast2=0xe0000002}, @mcast2={0xff, 0x2, [], 0x1}, {[], @icmpv6=@time_exceed={0x21, 0x0, 0x0, 0x0, [], {0x0, 0x6, "b680fa", 0x0, 0x0, 0x0, @ipv4={[], [0xff, 0xff], @broadcast=0xffffffff}, @ipv4={[], [0xff, 0xff], @remote={0xac, 0x14, 0xffffffffffffffff, 0xbb}}}}}}}}}, 0x0) [ 643.933304] FAULT_INJECTION: forcing a failure. [ 643.933304] name failslab, interval 1, probability 0, space 0, times 0 [ 643.944721] CPU: 0 PID: 4110 Comm: syz-executor4 Not tainted 4.16.0+ #17 [ 643.951573] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 643.960935] Call Trace: [ 643.963563] dump_stack+0x1b9/0x294 [ 643.967221] ? dump_stack_print_info.cold.2+0x52/0x52 [ 643.972448] should_fail.cold.4+0xa/0x1a [ 643.976554] ? fault_create_debugfs_attr+0x1f0/0x1f0 2018/04/11 12:45:45 executing program 6: r0 = socket$inet6(0xa, 0x80003, 0xff) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @ipv4={[], [0xff, 0xff], @dev={0xac, 0x14, 0x14, 0x1b}}}, 0x1c) sendmsg(r0, &(0x7f000001b000)={0x0, 0xfffffff5, &(0x7f0000019fa0), 0x1f1, &(0x7f000001ef08)}, 0x0) 2018/04/11 12:45:45 executing program 2: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x1e, 0x1, 0x0) setsockopt$packet_tx_ring(r0, 0x10f, 0x87, &(0x7f0000b89fe4)=@req={0x772}, 0x10) sendmsg(r0, &(0x7f0000030000)={&(0x7f00004f5000)=@generic={0x10000000001e, "0100000900000000000000000226cc573c080000003724c71e14dd6a739effea1b48006be61ffe0000e103000000f8000004003f010039d8f986ff01000300000004af50d50700000000000000e3ad316a1983000000021d00e0dfcb24281e27800000100076c3979ac40000bd15020078a1dfd300881a8365b1b16d7436"}, 0x80, &(0x7f0000447ff0), 0x0, &(0x7f00006e9c68)}, 0x0) [ 643.981676] ? save_stack+0x43/0xd0 [ 643.985406] ? kmem_cache_alloc_trace+0x152/0x780 [ 643.990265] ? __memcg_init_list_lru_node+0x17d/0x2c0 [ 643.995473] ? __list_lru_init+0x456/0x790 [ 643.999726] ? sget_userns+0x6d9/0xf20 [ 644.003632] ? graph_lock+0x170/0x170 [ 644.007451] ? vfs_kern_mount.part.34+0xd4/0x4d0 [ 644.012215] ? do_mount+0x564/0x3070 [ 644.015941] ? ksys_mount+0x12d/0x140 [ 644.019755] ? SyS_mount+0x35/0x50 [ 644.023317] ? do_syscall_64+0x29e/0x9d0 [ 644.027403] ? entry_SYSCALL_64_after_hwframe+0x42/0xb7 2018/04/11 12:45:45 executing program 7: syz_emit_ethernet(0x66, &(0x7f0000000000)={@random="cd3997030f00", @empty=[0x0, 0x0, 0x0, 0x0, 0xb000000], [], {@ipv6={0x86dd, {0x0, 0x6, "b40900", 0x30, 0x67, 0x0, @ipv4={[], [0xff, 0xff], @multicast2=0xe0000002}, @mcast2={0xff, 0x2, [], 0x1}, {[], @icmpv6=@time_exceed={0x21, 0x0, 0x0, 0x0, [], {0x0, 0x6, "b680fa", 0x0, 0x0, 0x0, @ipv4={[], [0xff, 0xff], @broadcast=0xffffffff}, @ipv4={[], [0xff, 0xff], @remote={0xac, 0x14, 0xffffffffffffffff, 0xbb}}}}}}}}}, 0x0) [ 644.032789] ? find_held_lock+0x36/0x1c0 [ 644.036879] ? __lock_is_held+0xb5/0x140 [ 644.040983] ? check_same_owner+0x320/0x320 [ 644.045323] ? rcu_note_context_switch+0x710/0x710 [ 644.050284] __should_failslab+0x124/0x180 [ 644.054549] should_failslab+0x9/0x14 [ 644.058365] kmem_cache_alloc_trace+0x2cb/0x780 [ 644.063048] ? __kmalloc_node+0x33/0x70 [ 644.067038] ? __kmalloc_node+0x33/0x70 [ 644.071032] ? rcu_read_lock_sched_held+0x108/0x120 [ 644.076080] __memcg_init_list_lru_node+0x17d/0x2c0 [ 644.081123] ? kvfree_rcu+0x20/0x20 [ 644.084764] ? __kmalloc_node+0x47/0x70 [ 644.088765] __list_lru_init+0x456/0x790 [ 644.092846] ? list_lru_destroy+0x4c0/0x4c0 [ 644.097179] ? mark_held_locks+0xc9/0x160 [ 644.101346] ? __raw_spin_lock_init+0x1c/0x100 [ 644.105944] ? trace_hardirqs_on_caller+0x421/0x5c0 [ 644.110977] ? __lockdep_init_map+0x105/0x590 [ 644.115496] ? lockdep_init_map+0x9/0x10 [ 644.119582] sget_userns+0x6d9/0xf20 [ 644.123903] ? kill_litter_super+0x90/0x90 [ 644.128164] ? ns_test_super+0x50/0x50 [ 644.132064] ? destroy_unused_super.part.9+0x100/0x100 [ 644.137355] ? do_raw_spin_trylock+0x1b0/0x1b0 [ 644.141959] ? kasan_check_write+0x14/0x20 [ 644.146207] ? do_raw_spin_lock+0xc1/0x200 [ 644.150465] ? blkdev_get+0xc0/0xb30 [ 644.154205] ? cap_capable+0x1f9/0x260 [ 644.158126] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 644.163676] ? security_capable+0x99/0xc0 [ 644.167845] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 644.173393] ? ns_capable_common+0x13f/0x170 [ 644.177821] ? kill_litter_super+0x90/0x90 [ 644.182068] sget+0x10b/0x150 [ 644.185182] ? ns_test_super+0x50/0x50 [ 644.189087] mount_bdev+0x111/0x3e0 [ 644.192732] ? fuse_get_root_inode+0x190/0x190 [ 644.197335] fuse_mount_blk+0x34/0x40 [ 644.201152] mount_fs+0xae/0x328 [ 644.204549] vfs_kern_mount.part.34+0xd4/0x4d0 [ 644.209152] ? may_umount+0xb0/0xb0 [ 644.212792] ? _raw_read_unlock+0x22/0x30 [ 644.216954] ? __get_fs_type+0x97/0xc0 [ 644.220856] do_mount+0x564/0x3070 [ 644.224408] ? do_raw_spin_unlock+0x9e/0x2e0 [ 644.228831] ? interrupt_entry+0xb1/0xf0 [ 644.232916] ? copy_mount_string+0x40/0x40 [ 644.237167] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 644.241944] ? retint_kernel+0x10/0x10 [ 644.245860] ? copy_mount_options+0x213/0x380 [ 644.250372] ? write_comp_data+0x22/0x70 [ 644.254456] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 644.260021] ? copy_mount_options+0x285/0x380 [ 644.264546] ksys_mount+0x12d/0x140 [ 644.268193] SyS_mount+0x35/0x50 [ 644.271560] ? ksys_mount+0x140/0x140 [ 644.275364] do_syscall_64+0x29e/0x9d0 [ 644.279236] ? vmalloc_sync_all+0x30/0x30 [ 644.283369] ? _raw_spin_unlock_irq+0x27/0x70 [ 644.287851] ? finish_task_switch+0x1ca/0x820 [ 644.292335] ? syscall_return_slowpath+0x5c0/0x5c0 [ 644.297256] ? syscall_return_slowpath+0x30f/0x5c0 [ 644.302176] ? entry_SYSCALL_64_after_hwframe+0x52/0xb7 [ 644.307533] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 644.312394] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 644.317574] RIP: 0033:0x455259 [ 644.320746] RSP: 002b:00007f95e4cadb08 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 644.328443] RAX: ffffffffffffffda RBX: 0000000000000015 RCX: 0000000000455259 [ 644.335695] RDX: 00000000004b9bc5 RSI: 0000000020000040 RDI: 0000000020000000 [ 644.342947] RBP: 0000000020000000 R08: 00007f95e4cadb20 R09: 0000000000000000 [ 644.350200] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 644.357469] R13: 0000000000000000 R14: 0000000000000000 R15: 0000000000000000 2018/04/11 12:45:46 executing program 5: perf_event_open(&(0x7f0000000100)={0x2, 0x70, 0x3e5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x4c7, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000200)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc-cast5-avx\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00003bcfd0)="d3ab27191a", 0x5) r2 = accept(r1, &(0x7f0000000180)=@llc={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @broadcast}, &(0x7f0000000280)=0x80) sendmmsg$alg(r1, &(0x7f0000007e40)=[{0x0, 0x0, &(0x7f0000000900)}], 0x1, 0x0) setsockopt$inet_opts(r2, 0x0, 0x0, &(0x7f00000002c0), 0x0) accept(r0, &(0x7f0000000040)=@pppol2tpv3in6, &(0x7f00000000c0)=0x80) setsockopt$ALG_SET_AEAD_AUTHSIZE(r0, 0x117, 0x5, 0x0, 0xffffffff) 2018/04/11 12:45:46 executing program 0: r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000180)='/proc/self/net/pfkey\x00', 0x20080, 0x0) poll(&(0x7f00000001c0)=[{r0, 0x100}], 0x1, 0x318) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000200)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc-cast5-avx\x00'}, 0x58) r2 = accept$alg(r1, 0x0, 0x0) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f00003bcfd0)="d3ab27191a", 0x5) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) sendmmsg$alg(r2, &(0x7f0000007e40)=[{0x0, 0x0, &(0x7f0000000900)}], 0x1, 0x0) accept(r1, &(0x7f0000000040)=@pppol2tpv3in6, &(0x7f00000000c0)=0x80) bind$alg(r1, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw-camellia-aesni\x00'}, 0x58) 2018/04/11 12:45:46 executing program 6: r0 = socket$inet6(0xa, 0x80003, 0xff) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @ipv4={[], [0xff, 0xff], @dev={0xac, 0x14, 0x14, 0x1b}}}, 0x1c) sendmsg(r0, &(0x7f000001b000)={0x0, 0xfffffff5, &(0x7f0000019fa0), 0x11a, &(0x7f000001ef08)}, 0x0) 2018/04/11 12:45:46 executing program 1: r0 = socket(0x1e, 0x1, 0x0) setsockopt$packet_tx_ring(r0, 0x10f, 0x87, &(0x7f0000b89fe4)=@req={0x772}, 0x10) sendmsg(r0, &(0x7f0000030000)={&(0x7f00004f5000)=@generic={0x10000000001e, "0014000900000000000000000226cc573c080000003724c71e14dd6a739effea1b48006be61ffe0400e103000000f8000004003f010039d8f986ff01000300000004af50d50700000000000000e3ad316a1983000000001d00e0dfcb24281e27800000100076c3979ac40000bd15020078a1dfd300881a8365b1b16d7436"}, 0x80, &(0x7f0000447ff0), 0x0, &(0x7f00006e9c68)}, 0x0) 2018/04/11 12:45:46 executing program 7: syz_emit_ethernet(0x66, &(0x7f0000000000)={@random="cd3997030f00", @empty=[0x0, 0x0, 0x0, 0x0, 0x6000000], [], {@ipv6={0x86dd, {0x0, 0x6, "b40900", 0x30, 0x67, 0x0, @ipv4={[], [0xff, 0xff], @multicast2=0xe0000002}, @mcast2={0xff, 0x2, [], 0x1}, {[], @icmpv6=@time_exceed={0x21, 0x0, 0x0, 0x0, [], {0x0, 0x6, "b680fa", 0x0, 0x0, 0x0, @ipv4={[], [0xff, 0xff], @broadcast=0xffffffff}, @ipv4={[], [0xff, 0xff], @remote={0xac, 0x14, 0xffffffffffffffff, 0xbb}}}}}}}}}, 0x0) 2018/04/11 12:45:46 executing program 3: semop(0x0, &(0x7f000001a000)=[{0x0, 0xffffffffffff0001}, {0x0, 0x0, 0xe00}], 0x2) timer_create(0x0, &(0x7f0000cd0000)={0x0, 0x12}, &(0x7f0000044000)) timer_settime(0x0, 0x0, &(0x7f00004b1fe0)={{0x0, 0x1c9c380}, {0x0, 0x9}}, &(0x7f0000040000)) r0 = getpgid(0x0) tkill(r0, 0x1000000000016) 2018/04/11 12:45:46 executing program 2: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x1e, 0x1, 0x0) setsockopt$packet_tx_ring(r0, 0x10f, 0x87, &(0x7f0000b89fe4)=@req={0x772}, 0x10) sendmsg(r0, &(0x7f0000030000)={&(0x7f00004f5000)=@generic={0x10000000001e, "0100000900000000000000000226cc573c080000003724c71e14dd6a739effea1b48006be61ffe0000e103000000f8000004003f010039d8f986ff01000300000004af50d50700000000000000e3ad316a1983000000001d02e0dfcb24281e27800000100076c3979ac40000bd15020078a1dfd300881a8365b1b16d7436"}, 0x80, &(0x7f0000447ff0), 0x0, &(0x7f00006e9c68)}, 0x0) 2018/04/11 12:45:46 executing program 4 (fault-call:1 fault-nth:31): perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_fuseblk_mount(&(0x7f0000000040)='./file0\x00', &(0x7f0000000000)='./file0\x00', 0x4000, 0x0, 0x0, 0x0, 0x0, 0x0) [ 644.983987] FAULT_INJECTION: forcing a failure. [ 644.983987] name failslab, interval 1, probability 0, space 0, times 0 [ 644.995328] CPU: 0 PID: 4149 Comm: syz-executor4 Not tainted 4.16.0+ #17 [ 645.002176] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 645.011539] Call Trace: [ 645.014149] dump_stack+0x1b9/0x294 [ 645.017804] ? dump_stack_print_info.cold.2+0x52/0x52 [ 645.023039] should_fail.cold.4+0xa/0x1a [ 645.027129] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 645.032263] ? graph_lock+0x170/0x170 [ 645.036085] ? save_stack+0x43/0xd0 [ 645.039728] ? kasan_kmalloc+0xc4/0xe0 [ 645.043625] ? __kmalloc+0x14e/0x760 [ 645.047354] ? __list_lru_init+0xdd/0x790 [ 645.051524] ? find_held_lock+0x36/0x1c0 [ 645.055698] ? __lock_is_held+0xb5/0x140 [ 645.059808] ? check_same_owner+0x320/0x320 [ 645.064157] ? rcu_note_context_switch+0x710/0x710 [ 645.069123] __should_failslab+0x124/0x180 [ 645.073379] should_failslab+0x9/0x14 [ 645.077198] kmem_cache_alloc_node_trace+0x26f/0x770 [ 645.082314] ? mark_held_locks+0xc9/0x160 [ 645.086487] ? __raw_spin_lock_init+0x1c/0x100 [ 645.091096] __kmalloc_node+0x33/0x70 [ 645.094922] kvmalloc_node+0x6b/0x100 [ 645.098747] __list_lru_init+0x559/0x790 [ 645.102834] ? list_lru_destroy+0x4c0/0x4c0 [ 645.107172] ? mark_held_locks+0xc9/0x160 [ 645.111346] ? __raw_spin_lock_init+0x1c/0x100 [ 645.115952] ? trace_hardirqs_on_caller+0x421/0x5c0 [ 645.120996] ? lockdep_init_map+0x9/0x10 [ 645.125090] sget_userns+0x706/0xf20 [ 645.128822] ? kill_litter_super+0x90/0x90 [ 645.133077] ? ns_test_super+0x50/0x50 [ 645.136980] ? destroy_unused_super.part.9+0x100/0x100 [ 645.142269] ? do_raw_spin_trylock+0x1b0/0x1b0 [ 645.146871] ? kasan_check_write+0x14/0x20 [ 645.151110] ? do_raw_spin_lock+0xc1/0x200 [ 645.155366] ? blkdev_get+0xc0/0xb30 [ 645.159099] ? cap_capable+0x1f9/0x260 [ 645.163014] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 645.168564] ? security_capable+0x99/0xc0 [ 645.172734] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 645.178290] ? ns_capable_common+0x13f/0x170 2018/04/11 12:45:46 executing program 5: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000200)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc-cast5-avx\x00'}, 0x58) r1 = syz_open_dev$dspn(&(0x7f0000000100)='/dev/dsp#\x00', 0x7fff, 0x220000) ioctl$SNDRV_CTL_IOCTL_RAWMIDI_INFO(r1, 0xc10c5541, &(0x7f0000000280)={0x0, 0xd3, 0x9, 0x0, 0x0, [], [], [], 0x3, 0x200}) r2 = accept$alg(r0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00003bcfd0)="d3ab27191a", 0x5) sendmmsg$alg(r2, &(0x7f0000007e40)=[{0x0, 0x0, &(0x7f0000000900)}], 0x1, 0x0) accept(r0, &(0x7f0000000040)=@pppol2tpv3in6, &(0x7f00000000c0)=0x80) 2018/04/11 12:45:46 executing program 2: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x1e, 0x1, 0x0) setsockopt$packet_tx_ring(r0, 0x10f, 0x87, &(0x7f0000b89fe4)=@req={0x772}, 0x10) sendmsg(r0, &(0x7f0000030000)={&(0x7f00004f5000)=@generic={0x10000000001e, "0100000900000000000000000226cc573c080000003724c71e14dd6a739effea1b48006be61ffe0000e103000000f8000004003f010039d8f986ff01000300000004af50d50700000000000000e3ad316a1983000000001d00e0dfcb24281e270f0000100076c3979ac40000bd15020078a1dfd300881a8365b1b16d7436"}, 0x80, &(0x7f0000447ff0), 0x0, &(0x7f00006e9c68)}, 0x0) 2018/04/11 12:45:46 executing program 6: r0 = socket$inet6(0xa, 0x80003, 0xff) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @ipv4={[], [0xff, 0xff], @dev={0xac, 0x14, 0x14, 0x1b}}}, 0x1c) sendmsg(r0, &(0x7f000001b000)={0x0, 0xfffffff5, &(0x7f0000019fa0), 0x44, &(0x7f000001ef08)}, 0x0) 2018/04/11 12:45:46 executing program 7: syz_emit_ethernet(0x66, &(0x7f0000000000)={@random="cd3997030f00", @empty=[0x0, 0x0, 0x0, 0x0, 0x800e0000], [], {@ipv6={0x86dd, {0x0, 0x6, "b40900", 0x30, 0x67, 0x0, @ipv4={[], [0xff, 0xff], @multicast2=0xe0000002}, @mcast2={0xff, 0x2, [], 0x1}, {[], @icmpv6=@time_exceed={0x21, 0x0, 0x0, 0x0, [], {0x0, 0x6, "b680fa", 0x0, 0x0, 0x0, @ipv4={[], [0xff, 0xff], @broadcast=0xffffffff}, @ipv4={[], [0xff, 0xff], @remote={0xac, 0x14, 0xffffffffffffffff, 0xbb}}}}}}}}}, 0x0) 2018/04/11 12:45:46 executing program 3: semop(0x0, &(0x7f000001a000)=[{0x0, 0xffffffffffff0001}, {}], 0x5) timer_create(0x0, &(0x7f0000cd0000)={0x0, 0x12}, &(0x7f0000044000)) timer_settime(0x0, 0x0, &(0x7f00004b1fe0)={{0x0, 0x1c9c380}, {0x0, 0x9}}, &(0x7f0000040000)) r0 = getpgid(0x0) tkill(r0, 0x1000000000016) 2018/04/11 12:45:46 executing program 0: r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vga_arbiter\x00', 0x129800, 0x0) mq_getsetattr(r1, &(0x7f0000000080)={0x670, 0x2, 0x20a, 0x7, 0x7fffffff, 0x80000000, 0x100000001, 0x3ff}, &(0x7f00000000c0)) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000200)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc-cast5-avx\x00'}, 0x58) r3 = accept$alg(r2, 0x0, 0x0) r4 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r4, &(0x7f0000b3dfc8)={&(0x7f0000000180)={0x10}, 0xc, &(0x7f00000015c0)={&(0x7f0000001600)={0x1c, 0x22, 0x109, 0x0, 0x0, {0x4}, [@typed={0x8, 0x11, @u32=0x7b2c8dfc}]}, 0x1c}, 0x1}, 0x0) dup3(r0, r3, 0x0) [ 645.182720] ? kill_litter_super+0x90/0x90 [ 645.186967] sget+0x10b/0x150 [ 645.190084] ? ns_test_super+0x50/0x50 [ 645.193988] mount_bdev+0x111/0x3e0 [ 645.197627] ? fuse_get_root_inode+0x190/0x190 [ 645.202238] fuse_mount_blk+0x34/0x40 [ 645.206056] mount_fs+0xae/0x328 [ 645.209457] vfs_kern_mount.part.34+0xd4/0x4d0 [ 645.214063] ? may_umount+0xb0/0xb0 [ 645.217703] ? _raw_read_unlock+0x22/0x30 [ 645.221863] ? __get_fs_type+0x97/0xc0 [ 645.225775] do_mount+0x564/0x3070 [ 645.229335] ? copy_mount_string+0x40/0x40 2018/04/11 12:45:46 executing program 1: r0 = socket(0x1e, 0x1, 0x0) setsockopt$packet_tx_ring(r0, 0x10f, 0x87, &(0x7f0000b89fe4)=@req={0x772}, 0x10) sendmsg(r0, &(0x7f0000030000)={&(0x7f00004f5000)=@generic={0x10000000001e, "0014000900000000000000000226cc573c080000003724c71e14dd6a739effea1b48006be61ffe0200e103000000f8000004003f010039d8f986ff01000300000004af50d50700000000000000e3ad316a1983000000001d00e0dfcb24281e27800000100076c3979ac40000bd15020078a1dfd300881a8365b1b16d7436"}, 0x80, &(0x7f0000447ff0), 0x0, &(0x7f00006e9c68)}, 0x0) 2018/04/11 12:45:46 executing program 5: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000200)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc-cast5-avx\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000100)="d3ab27191a", 0x5) sendmmsg$alg(r1, &(0x7f0000007e40)=[{0x0, 0x0, &(0x7f0000000900)}], 0x1, 0x0) accept(r0, &(0x7f0000000040)=@pppol2tpv3in6, &(0x7f00000000c0)=0x80) [ 645.233578] ? rcu_pm_notify+0xc0/0xc0 [ 645.237487] ? copy_mount_options+0x5f/0x380 [ 645.241908] ? rcu_read_lock_sched_held+0x108/0x120 [ 645.246935] ? kmem_cache_alloc_trace+0x616/0x780 [ 645.251798] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 645.257351] ? _copy_from_user+0xdf/0x150 [ 645.261518] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 645.267063] ? copy_mount_options+0x285/0x380 [ 645.271579] ksys_mount+0x12d/0x140 [ 645.275224] SyS_mount+0x35/0x50 [ 645.278601] ? ksys_mount+0x140/0x140 2018/04/11 12:45:46 executing program 6: r0 = socket$inet6(0xa, 0x80003, 0xff) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @ipv4={[], [0xff, 0xff], @dev={0xac, 0x14, 0x14, 0x1b}}}, 0x1c) sendmsg(r0, &(0x7f000001b000)={0x0, 0xfffffff5, &(0x7f0000019fa0), 0x17a, &(0x7f000001ef08)}, 0x0) [ 645.282418] do_syscall_64+0x29e/0x9d0 [ 645.286323] ? vmalloc_sync_all+0x30/0x30 [ 645.290483] ? _raw_spin_unlock_irq+0x27/0x70 [ 645.294997] ? finish_task_switch+0x1ca/0x820 [ 645.299508] ? syscall_return_slowpath+0x5c0/0x5c0 [ 645.304459] ? syscall_return_slowpath+0x30f/0x5c0 [ 645.309414] ? entry_SYSCALL_64_after_hwframe+0x52/0xb7 [ 645.314806] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 645.319683] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 645.324885] RIP: 0033:0x455259 [ 645.328083] RSP: 002b:00007f95e4cadb08 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 645.335813] RAX: ffffffffffffffda RBX: 0000000000000015 RCX: 0000000000455259 [ 645.343093] RDX: 00000000004b9bc5 RSI: 0000000020000040 RDI: 0000000020000000 [ 645.350375] RBP: 0000000020000000 R08: 00007f95e4cadb20 R09: 0000000000000000 [ 645.357656] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 645.364934] R13: 0000000000000000 R14: 0000000000000000 R15: 0000000000000000 2018/04/11 12:45:47 executing program 7: syz_emit_ethernet(0x66, &(0x7f0000000000)={@random="cd3997030f00", @empty=[0x0, 0x0, 0x0, 0x0, 0x88caffff], [], {@ipv6={0x86dd, {0x0, 0x6, "b40900", 0x30, 0x67, 0x0, @ipv4={[], [0xff, 0xff], @multicast2=0xe0000002}, @mcast2={0xff, 0x2, [], 0x1}, {[], @icmpv6=@time_exceed={0x21, 0x0, 0x0, 0x0, [], {0x0, 0x6, "b680fa", 0x0, 0x0, 0x0, @ipv4={[], [0xff, 0xff], @broadcast=0xffffffff}, @ipv4={[], [0xff, 0xff], @remote={0xac, 0x14, 0xffffffffffffffff, 0xbb}}}}}}}}}, 0x0) 2018/04/11 12:45:47 executing program 2: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x1e, 0x1, 0x0) setsockopt$packet_tx_ring(r0, 0x10f, 0x87, &(0x7f0000b89fe4)=@req={0x772}, 0x10) sendmsg(r0, &(0x7f0000030000)={&(0x7f00004f5000)=@generic={0x10000000001e, "0100000900000000000000000226cc573c080000003724c71e14dd6a739effea1b48006be61ffe0000e103000000f8000004003f010039d8f986ff01000300000004af50d50700000000000000e3ad316a1983000000001d00e0dfcb24281e27800200100076c3979ac40000bd15020078a1dfd300881a8365b1b16d7436"}, 0x80, &(0x7f0000447ff0), 0x0, &(0x7f00006e9c68)}, 0x0) 2018/04/11 12:45:47 executing program 5: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$rfkill(0xffffffffffffff9c, &(0x7f0000000140)='/dev/rfkill\x00', 0x1, 0x0) ioctl$UFFDIO_WAKE(r0, 0x8010aa02, &(0x7f0000000180)={&(0x7f0000fff000/0x1000)=nil, 0x1000}) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000200)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc-cast5-avx\x00'}, 0x58) pipe2(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80000) ioctl$KDMKTONE(r2, 0x4b30, 0x3) r4 = accept$alg(r1, 0x0, 0x0) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f00003bcfd0)="d3ab27191a", 0x5) ioctl$KVM_SET_IRQCHIP(r3, 0x8208ae63, &(0x7f0000000280)=@ioapic={0x4000, 0x2, 0x80, 0xfffffffffffffffb, 0x0, [{0x3a, 0xffffffffffff0001, 0x3, [], 0x7fffffff}, {0x3, 0x8001, 0xe3}, {0xdb, 0x9, 0xffffffff, [], 0x783d}, {0x800, 0x9, 0x3, [], 0x6}, {0x2d, 0x7, 0x23e, [], 0x4}, {0xfffffffffffffffa, 0x3f, 0x7, [], 0x1}, {0x1f, 0x1, 0x200, [], 0xa1e}, {0x3, 0x8, 0xc, [], 0xfffffffffffffffc}, {0x5, 0x5, 0x0, [], 0x4}, {0x1f, 0x0, 0x6, [], 0x2}, {0x0, 0x0, 0x7, [], 0x3}, {0x8, 0x100000001, 0x401, [], 0x1}, {0x5, 0x1, 0x3, [], 0x7}, {0x101, 0x1, 0x4b42, [], 0xffffffff80000000}, {0x9, 0x1, 0x2, [], 0x9}, {0xcb, 0x6, 0x4, [], 0x1}, {0x9, 0x1aee00000, 0x3f, [], 0x1}, {0x1ff, 0x401, 0x0, [], 0x81cd}, {0x5a50, 0xfffffffffffffa4f, 0xfffffffffffffff9, [], 0x80000000}, {0x2882, 0x10000, 0x1, [], 0x3}, {0x6, 0xfe, 0x9, [], 0x9}, {0x2, 0x3, 0xffffffffffffffe0, [], 0x731b}, {0x78, 0xfffffffffffff738, 0x8}, {0x9, 0x77, 0x9, [], 0x9}]}) getsockopt$inet_sctp_SCTP_INITMSG(r0, 0x84, 0x2, &(0x7f00000001c0), &(0x7f0000000380)=0x8) sendmmsg$alg(r4, &(0x7f0000007e40)=[{0x0, 0x0, &(0x7f0000000900)}], 0x1, 0x0) accept(r1, &(0x7f0000000040)=@pppol2tpv3in6, &(0x7f00000000c0)=0x80) 2018/04/11 12:45:47 executing program 6: r0 = socket$inet6(0xa, 0x80003, 0xff) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @ipv4={[], [0xff, 0xff], @dev={0xac, 0x14, 0x14, 0x1b}}}, 0x1c) sendmsg(r0, &(0x7f000001b000)={0x0, 0xfffffff5, &(0x7f0000019fa0), 0x2c, &(0x7f000001ef08)}, 0x0) 2018/04/11 12:45:47 executing program 1: r0 = socket(0x1e, 0x1, 0x0) setsockopt$packet_tx_ring(r0, 0x10f, 0x87, &(0x7f0000b89fe4)=@req={0x772}, 0x10) sendmsg(r0, &(0x7f0000030000)={&(0x7f00004f5000)=@generic={0x10000000001e, "0014000900000000000000000226cc573c080000003724c71e14dd6a739effea1b48006be61ffe0300e103000000f8000004003f010039d8f986ff01000300000004af50d50700000000000000e3ad316a1983000000001d00e0dfcb24281e27800000100076c3979ac40000bd15020078a1dfd300881a8365b1b16d7436"}, 0x80, &(0x7f0000447ff0), 0x0, &(0x7f00006e9c68)}, 0x0) 2018/04/11 12:45:47 executing program 4 (fault-call:1 fault-nth:32): perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_fuseblk_mount(&(0x7f0000000040)='./file0\x00', &(0x7f0000000000)='./file0\x00', 0x4000, 0x0, 0x0, 0x0, 0x0, 0x0) 2018/04/11 12:45:47 executing program 3: semop(0x0, &(0x7f000001a000)=[{0x0, 0xffffffffffff0001}, {}], 0x1f4) timer_create(0x0, &(0x7f0000cd0000)={0x0, 0x12}, &(0x7f0000044000)) timer_settime(0x0, 0x0, &(0x7f00004b1fe0)={{0x0, 0x1c9c380}, {0x0, 0x9}}, &(0x7f0000040000)) r0 = getpgid(0x0) tkill(r0, 0x1000000000016) 2018/04/11 12:45:47 executing program 0: r0 = perf_event_open(&(0x7f00000000c0)={0x2, 0x70, 0x3e5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe06, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x23}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$adsp(&(0x7f0000000040)='/dev/adsp#\x00', 0x6, 0x408001) r2 = socket$alg(0x26, 0x5, 0x0) ioctl$EVIOCSABS0(r1, 0x401845c0, &(0x7f0000000080)={0x9, 0x9, 0x1, 0xc, 0x4d3, 0x3}) bind$alg(r2, &(0x7f0000000200)={0x26, 'rng\x00', 0x0, 0x0, 'ansi_cprng\x00'}, 0x58) r3 = accept$alg(r2, 0x0, 0x0) dup3(r0, r3, 0x0) 2018/04/11 12:45:48 executing program 7: syz_emit_ethernet(0x66, &(0x7f0000000000)={@random="cd3997030f00", @empty=[0x0, 0x0, 0x0, 0x0, 0xd00], [], {@ipv6={0x86dd, {0x0, 0x6, "b40900", 0x30, 0x67, 0x0, @ipv4={[], [0xff, 0xff], @multicast2=0xe0000002}, @mcast2={0xff, 0x2, [], 0x1}, {[], @icmpv6=@time_exceed={0x21, 0x0, 0x0, 0x0, [], {0x0, 0x6, "b680fa", 0x0, 0x0, 0x0, @ipv4={[], [0xff, 0xff], @broadcast=0xffffffff}, @ipv4={[], [0xff, 0xff], @remote={0xac, 0x14, 0xffffffffffffffff, 0xbb}}}}}}}}}, 0x0) 2018/04/11 12:45:48 executing program 2: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x1e, 0x1, 0x0) setsockopt$packet_tx_ring(r0, 0x10f, 0x87, &(0x7f0000b89fe4)=@req={0x772}, 0x10) sendmsg(r0, &(0x7f0000030000)={&(0x7f00004f5000)=@generic={0x10000000001e, "0100000900000000000000000226cc573c080000003724c71e14dd6a739effea1b48006be61ffe0000e103000000f8000004003f010039d8f986ff01000300000004af50d50700000000000000e3ad316a1983000000001d00e0dfcb24281e27800400100076c3979ac40000bd15020078a1dfd300881a8365b1b16d7436"}, 0x80, &(0x7f0000447ff0), 0x0, &(0x7f00006e9c68)}, 0x0) [ 646.334171] FAULT_INJECTION: forcing a failure. [ 646.334171] name failslab, interval 1, probability 0, space 0, times 0 [ 646.345562] CPU: 0 PID: 4220 Comm: syz-executor4 Not tainted 4.16.0+ #17 [ 646.352416] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 646.361783] Call Trace: [ 646.364414] dump_stack+0x1b9/0x294 [ 646.368075] ? dump_stack_print_info.cold.2+0x52/0x52 [ 646.373311] should_fail.cold.4+0xa/0x1a [ 646.377397] ? is_bpf_text_address+0xd7/0x170 2018/04/11 12:45:48 executing program 1: r0 = socket(0x1e, 0x1, 0x0) setsockopt$packet_tx_ring(r0, 0x10f, 0x87, &(0x7f0000b89fe4)=@req={0x772}, 0x10) sendmsg(r0, &(0x7f0000030000)={&(0x7f00004f5000)=@generic={0x10000000001e, "0014000900000000000000000226cc573c080000003724c71e14dd6a739effea1b48006be61ffe0003e103000000f8000004003f010039d8f986ff01000300000004af50d50700000000000000e3ad316a1983000000001d00e0dfcb24281e27800000100076c3979ac40000bd15020078a1dfd300881a8365b1b16d7436"}, 0x80, &(0x7f0000447ff0), 0x0, &(0x7f00006e9c68)}, 0x0) 2018/04/11 12:45:48 executing program 6: r0 = socket$inet6(0xa, 0x80003, 0xff) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @ipv4={[], [0xff, 0xff], @dev={0xac, 0x14, 0x14, 0x1b}}}, 0x1c) sendmsg(r0, &(0x7f000001b000)={0x0, 0xfffffff5, &(0x7f0000019fa0), 0x79, &(0x7f000001ef08)}, 0x0) [ 646.381921] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 646.387054] ? __save_stack_trace+0x7e/0xd0 [ 646.391401] ? graph_lock+0x170/0x170 [ 646.395231] ? find_held_lock+0x36/0x1c0 [ 646.399323] ? __lock_is_held+0xb5/0x140 [ 646.403433] ? check_same_owner+0x320/0x320 [ 646.407776] ? rcu_note_context_switch+0x710/0x710 [ 646.412734] __should_failslab+0x124/0x180 [ 646.416991] should_failslab+0x9/0x14 [ 646.420898] kmem_cache_alloc_trace+0x2cb/0x780 [ 646.425584] ? __kmalloc_node+0x33/0x70 [ 646.429572] ? __kmalloc_node+0x33/0x70 2018/04/11 12:45:48 executing program 7: syz_emit_ethernet(0x66, &(0x7f0000000000)={@random="cd3997030f00", @empty=[0x0, 0x0, 0x0, 0x0, 0x543], [], {@ipv6={0x86dd, {0x0, 0x6, "b40900", 0x30, 0x67, 0x0, @ipv4={[], [0xff, 0xff], @multicast2=0xe0000002}, @mcast2={0xff, 0x2, [], 0x1}, {[], @icmpv6=@time_exceed={0x21, 0x0, 0x0, 0x0, [], {0x0, 0x6, "b680fa", 0x0, 0x0, 0x0, @ipv4={[], [0xff, 0xff], @broadcast=0xffffffff}, @ipv4={[], [0xff, 0xff], @remote={0xac, 0x14, 0xffffffffffffffff, 0xbb}}}}}}}}}, 0x0) 2018/04/11 12:45:48 executing program 0 (fault-call:2 fault-nth:0): perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff7fffffffffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x1e, 0x1, 0x0) sendmsg(r0, &(0x7f0000030000)={&(0x7f00004f5000)=@generic={0x10000000001e, "0100000900000000000000000226cc573c080000003724c71e14dd6a739effea1b48006be61ffe0000e103000000f8000004003f010039d8f986ff01000300000004af50d50700000000000000e3ad316a1983000000001d00e0dfcb24281e27800000100076c3979ac40000bd15020078a1dfd300881a8365b1b16d7436"}, 0x80, &(0x7f0000447ff0), 0x0, &(0x7f00006e9c68)}, 0x0) [ 646.433565] ? rcu_read_lock_sched_held+0x108/0x120 [ 646.438617] __memcg_init_list_lru_node+0x17d/0x2c0 [ 646.443664] ? kvfree_rcu+0x20/0x20 [ 646.447317] ? __kmalloc_node+0x47/0x70 [ 646.451333] __list_lru_init+0x456/0x790 [ 646.455424] ? list_lru_destroy+0x4c0/0x4c0 [ 646.459760] ? mark_held_locks+0xc9/0x160 [ 646.463941] ? __raw_spin_lock_init+0x1c/0x100 [ 646.468555] ? trace_hardirqs_on_caller+0x421/0x5c0 [ 646.473609] ? lockdep_init_map+0x9/0x10 [ 646.477696] sget_userns+0x706/0xf20 [ 646.481421] ? kill_litter_super+0x90/0x90 [ 646.485681] ? ns_test_super+0x50/0x50 [ 646.489583] ? destroy_unused_super.part.9+0x100/0x100 [ 646.494876] ? do_raw_spin_trylock+0x1b0/0x1b0 [ 646.499478] ? kasan_check_write+0x14/0x20 [ 646.503725] ? do_raw_spin_lock+0xc1/0x200 [ 646.507982] ? blkdev_get+0xc0/0xb30 [ 646.511713] ? cap_capable+0x1f9/0x260 [ 646.515621] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 646.521173] ? security_capable+0x99/0xc0 [ 646.525352] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 2018/04/11 12:45:48 executing program 6: r0 = socket$inet6(0xa, 0x80003, 0xff) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @ipv4={[], [0xff, 0xff], @dev={0xac, 0x14, 0x14, 0x1b}}}, 0x1c) sendmsg(r0, &(0x7f000001b000)={0x0, 0xfffffff5, &(0x7f0000019fa0), 0x178, &(0x7f000001ef08)}, 0x0) [ 646.530903] ? ns_capable_common+0x13f/0x170 [ 646.535328] ? kill_litter_super+0x90/0x90 [ 646.539588] sget+0x10b/0x150 [ 646.542709] ? ns_test_super+0x50/0x50 [ 646.546620] mount_bdev+0x111/0x3e0 [ 646.550258] ? fuse_get_root_inode+0x190/0x190 [ 646.554863] fuse_mount_blk+0x34/0x40 [ 646.558677] mount_fs+0xae/0x328 [ 646.562066] vfs_kern_mount.part.34+0xd4/0x4d0 [ 646.566662] ? may_umount+0xb0/0xb0 [ 646.570298] ? _raw_read_unlock+0x22/0x30 [ 646.574464] ? __get_fs_type+0x97/0xc0 [ 646.578377] do_mount+0x564/0x3070 [ 646.581940] ? copy_mount_string+0x40/0x40 [ 646.586185] ? rcu_pm_notify+0xc0/0xc0 [ 646.590100] ? copy_mount_options+0x5f/0x380 [ 646.594518] ? rcu_read_lock_sched_held+0x108/0x120 [ 646.599550] ? kmem_cache_alloc_trace+0x616/0x780 [ 646.604407] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 646.609957] ? _copy_from_user+0xdf/0x150 [ 646.614124] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 646.619674] ? copy_mount_options+0x285/0x380 [ 646.624190] ksys_mount+0x12d/0x140 [ 646.627836] SyS_mount+0x35/0x50 [ 646.631210] ? ksys_mount+0x140/0x140 [ 646.635023] do_syscall_64+0x29e/0x9d0 [ 646.638921] ? vmalloc_sync_all+0x30/0x30 [ 646.643081] ? _raw_spin_unlock_irq+0x27/0x70 [ 646.647596] ? finish_task_switch+0x1ca/0x820 [ 646.652106] ? syscall_return_slowpath+0x5c0/0x5c0 [ 646.657051] ? syscall_return_slowpath+0x30f/0x5c0 [ 646.662007] ? entry_SYSCALL_64_after_hwframe+0x52/0xb7 [ 646.667400] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 646.672274] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 646.677476] RIP: 0033:0x455259 [ 646.680675] RSP: 002b:00007f95e4cadb08 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 646.688403] RAX: ffffffffffffffda RBX: 0000000000000015 RCX: 0000000000455259 [ 646.695681] RDX: 00000000004b9bc5 RSI: 0000000020000040 RDI: 0000000020000000 [ 646.702962] RBP: 0000000020000000 R08: 00007f95e4cadb20 R09: 0000000000000000 [ 646.710241] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 646.717522] R13: 0000000000000000 R14: 0000000000000000 R15: 0000000000000000 2018/04/11 12:45:48 executing program 1: r0 = socket(0x1e, 0x1, 0x0) setsockopt$packet_tx_ring(r0, 0x10f, 0x87, &(0x7f0000b89fe4)=@req={0x772}, 0x10) sendmsg(r0, &(0x7f0000030000)={&(0x7f00004f5000)=@generic={0x10000000001e, "0014000900000000000000000226cc573c080000003724c71e14dd6a739effea1b48006be61ffe0002e103000000f8000004003f010039d8f986ff01000300000004af50d50700000000000000e3ad316a1983000000001d00e0dfcb24281e27800000100076c3979ac40000bd15020078a1dfd300881a8365b1b16d7436"}, 0x80, &(0x7f0000447ff0), 0x0, &(0x7f00006e9c68)}, 0x0) 2018/04/11 12:45:48 executing program 0: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff7fffffffffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x1e, 0x1, 0x0) sendmsg(r0, &(0x7f0000030000)={&(0x7f00004f5000)=@generic={0x10000000001e, "0100000900000000000000000226cc573c080000003724c71e14dd6a739effea1b48006be61ffe0000e103000000f8000004003f010039d8f986ff01000300000004af50d50700000000000000e3ad316a1983000000001d00e0dfcb24281e27800000100076c3979ac40000bd15020078a1dfd300881a8365b1b16d7436"}, 0x80, &(0x7f0000447ff0), 0x0, &(0x7f00006e9c68)}, 0x0) 2018/04/11 12:45:48 executing program 2: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x1e, 0x1, 0x0) setsockopt$packet_tx_ring(r0, 0x10f, 0x87, &(0x7f0000b89fe4)=@req={0x772}, 0x10) sendmsg(r0, &(0x7f0000030000)={&(0x7f00004f5000)=@generic={0x10000000001e, "0100000900000000000000000226cc573c080000003724c71e14dd6a739effea1b48006be61ffe0000e103000000f8000004003f010039d8f986ff01000300000004af50d50700000000000000e3ad316a1983000000001d00e0dfcb24281e27800002100076c3979ac40000bd15020078a1dfd300881a8365b1b16d7436"}, 0x80, &(0x7f0000447ff0), 0x0, &(0x7f00006e9c68)}, 0x0) 2018/04/11 12:45:48 executing program 7: syz_emit_ethernet(0x66, &(0x7f0000000000)={@random="cd3997030f00", @empty=[0x0, 0x0, 0x0, 0x0, 0x2], [], {@ipv6={0x86dd, {0x0, 0x6, "b40900", 0x30, 0x67, 0x0, @ipv4={[], [0xff, 0xff], @multicast2=0xe0000002}, @mcast2={0xff, 0x2, [], 0x1}, {[], @icmpv6=@time_exceed={0x21, 0x0, 0x0, 0x0, [], {0x0, 0x6, "b680fa", 0x0, 0x0, 0x0, @ipv4={[], [0xff, 0xff], @broadcast=0xffffffff}, @ipv4={[], [0xff, 0xff], @remote={0xac, 0x14, 0xffffffffffffffff, 0xbb}}}}}}}}}, 0x0) 2018/04/11 12:45:48 executing program 6: r0 = socket$inet6(0xa, 0x80003, 0xff) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @ipv4={[], [0xff, 0xff], @dev={0xac, 0x14, 0x14, 0x1b}}}, 0x1c) sendmsg(r0, &(0x7f000001b000)={0x0, 0xfffffff5, &(0x7f0000019fa0), 0x1df, &(0x7f000001ef08)}, 0x0) 2018/04/11 12:45:48 executing program 5: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000200)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc-cast5-avx\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00003bcfd0)="d3ab27191a", 0x5) sendmmsg$alg(r1, &(0x7f0000007e40)=[{0x0, 0x0, &(0x7f0000000900)}], 0x1, 0x0) r2 = accept(r0, &(0x7f0000000040)=@pppol2tpv3in6, &(0x7f00000000c0)=0x80) accept$alg(r2, 0x0, 0x0) 2018/04/11 12:45:48 executing program 3: r0 = gettid() tkill(r0, 0x3c) semop(0x0, &(0x7f000001a000)=[{0x0, 0xffffffffffff0001}, {}], 0x2) timer_create(0x0, &(0x7f0000cd0000)={0x0, 0x12}, &(0x7f0000044000)) capset(&(0x7f0000000100)={0x399f1736, r0}, &(0x7f0000000140)={0x0, 0xffff, 0x9, 0x101, 0x9, 0x8}) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ppp\x00', 0x2, 0x0) perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x2, 0x80000000, 0x1000000020000, 0xffffffff, 0x0, 0x4, 0x4, 0x8, 0x1f, 0xc81d, 0x0, 0x8, 0x9, 0x3, 0x3, 0x6525870f, 0x8, 0xde0, 0x4, 0x62, 0x3, 0x3, 0x4, 0x8001, 0x9, 0x5, 0x100, 0x0, 0x5, 0x401, 0x100, 0x0, 0x9, 0x7f, 0xe1, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x1}, 0x20206, 0x3f, 0x21a, 0x7, 0xfff, 0x18aa, 0x8}, r0, 0x7, r1, 0x2) timer_settime(0x0, 0x0, &(0x7f00004b1fe0)={{0x0, 0x1c9c380}, {0x0, 0x9}}, &(0x7f0000040000)) r2 = getpgid(0x0) tkill(r2, 0x1000000000016) 2018/04/11 12:45:48 executing program 4 (fault-call:1 fault-nth:33): perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_fuseblk_mount(&(0x7f0000000040)='./file0\x00', &(0x7f0000000000)='./file0\x00', 0x4000, 0x0, 0x0, 0x0, 0x0, 0x0) [ 647.252138] FAULT_INJECTION: forcing a failure. [ 647.252138] name failslab, interval 1, probability 0, space 0, times 0 [ 647.263468] CPU: 0 PID: 4253 Comm: syz-executor4 Not tainted 4.16.0+ #17 [ 647.270337] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 647.279699] Call Trace: [ 647.282325] dump_stack+0x1b9/0x294 [ 647.285982] ? dump_stack_print_info.cold.2+0x52/0x52 [ 647.291218] should_fail.cold.4+0xa/0x1a [ 647.295318] ? fault_create_debugfs_attr+0x1f0/0x1f0 2018/04/11 12:45:48 executing program 7: syz_emit_ethernet(0x66, &(0x7f0000000000)={@random="cd3997030f00", @empty=[0x0, 0x0, 0x0, 0x0, 0xffffca88], [], {@ipv6={0x86dd, {0x0, 0x6, "b40900", 0x30, 0x67, 0x0, @ipv4={[], [0xff, 0xff], @multicast2=0xe0000002}, @mcast2={0xff, 0x2, [], 0x1}, {[], @icmpv6=@time_exceed={0x21, 0x0, 0x0, 0x0, [], {0x0, 0x6, "b680fa", 0x0, 0x0, 0x0, @ipv4={[], [0xff, 0xff], @broadcast=0xffffffff}, @ipv4={[], [0xff, 0xff], @remote={0xac, 0x14, 0xffffffffffffffff, 0xbb}}}}}}}}}, 0x0) 2018/04/11 12:45:48 executing program 1: r0 = socket(0x1e, 0x1, 0x0) setsockopt$packet_tx_ring(r0, 0x10f, 0x87, &(0x7f0000b89fe4)=@req={0x772}, 0x10) sendmsg(r0, &(0x7f0000030000)={&(0x7f00004f5000)=@generic={0x10000000001e, "0014000900000000000000000226cc573c080000003724c71e14dd6a739effea1b48006be61ffe0000e103030000f8000004003f010039d8f986ff01000300000004af50d50700000000000000e3ad316a1983000000001d00e0dfcb24281e27800000100076c3979ac40000bd15020078a1dfd300881a8365b1b16d7436"}, 0x80, &(0x7f0000447ff0), 0x0, &(0x7f00006e9c68)}, 0x0) 2018/04/11 12:45:48 executing program 3: semop(0x0, &(0x7f000001a000)=[{0x0, 0xffffffffffff0001}, {}], 0x2) timer_create(0x0, &(0x7f0000cd0000)={0x0, 0x12}, &(0x7f0000044000)) timer_settime(0x0, 0x0, &(0x7f00004b1fe0)={{0x0, 0x1c9c380}, {0x0, 0x9}}, &(0x7f0000040000)) r0 = getpgid(0x0) tkill(r0, 0x1000000000016) ptrace$PTRACE_SECCOMP_GET_FILTER(0x420c, r0, 0x0, &(0x7f0000000000)=""/168) [ 647.300439] ? save_stack+0x43/0xd0 [ 647.304078] ? kmem_cache_alloc_trace+0x152/0x780 [ 647.308936] ? __memcg_init_list_lru_node+0x17d/0x2c0 [ 647.314145] ? __list_lru_init+0x456/0x790 [ 647.318395] ? sget_userns+0x706/0xf20 [ 647.322312] ? graph_lock+0x170/0x170 [ 647.326132] ? vfs_kern_mount.part.34+0xd4/0x4d0 [ 647.330902] ? do_mount+0x564/0x3070 [ 647.334631] ? ksys_mount+0x12d/0x140 [ 647.338443] ? SyS_mount+0x35/0x50 [ 647.341998] ? do_syscall_64+0x29e/0x9d0 [ 647.346080] ? entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 647.351464] ? find_held_lock+0x36/0x1c0 [ 647.355557] ? __lock_is_held+0xb5/0x140 [ 647.359669] ? check_same_owner+0x320/0x320 [ 647.364023] ? rcu_note_context_switch+0x710/0x710 [ 647.368982] __should_failslab+0x124/0x180 [ 647.373242] should_failslab+0x9/0x14 [ 647.377062] kmem_cache_alloc_trace+0x2cb/0x780 [ 647.381754] ? __kmalloc_node+0x33/0x70 [ 647.385740] ? __kmalloc_node+0x33/0x70 [ 647.389735] ? rcu_read_lock_sched_held+0x108/0x120 [ 647.394782] __memcg_init_list_lru_node+0x17d/0x2c0 2018/04/11 12:45:49 executing program 7: syz_emit_ethernet(0x66, &(0x7f0000000000)={@random="cd3997030f00", @empty=[0x0, 0x0, 0x0, 0x0, 0x8100000000000000], [], {@ipv6={0x86dd, {0x0, 0x6, "b40900", 0x30, 0x67, 0x0, @ipv4={[], [0xff, 0xff], @multicast2=0xe0000002}, @mcast2={0xff, 0x2, [], 0x1}, {[], @icmpv6=@time_exceed={0x21, 0x0, 0x0, 0x0, [], {0x0, 0x6, "b680fa", 0x0, 0x0, 0x0, @ipv4={[], [0xff, 0xff], @broadcast=0xffffffff}, @ipv4={[], [0xff, 0xff], @remote={0xac, 0x14, 0xffffffffffffffff, 0xbb}}}}}}}}}, 0x0) 2018/04/11 12:45:49 executing program 1: r0 = socket(0x1e, 0x1, 0x0) setsockopt$packet_tx_ring(r0, 0x10f, 0x87, &(0x7f0000b89fe4)=@req={0x772}, 0x10) sendmsg(r0, &(0x7f0000030000)={&(0x7f00004f5000)=@generic={0x10000000001e, "0014000900000000000000000226cc573c080000003724c71e14dd6a739effea1b48006be61ffe0000e103020000f8000004003f010039d8f986ff01000300000004af50d50700000000000000e3ad316a1983000000001d00e0dfcb24281e27800000100076c3979ac40000bd15020078a1dfd300881a8365b1b16d7436"}, 0x80, &(0x7f0000447ff0), 0x0, &(0x7f00006e9c68)}, 0x0) [ 647.399820] ? kvfree_rcu+0x20/0x20 [ 647.403465] ? __kmalloc_node+0x47/0x70 [ 647.407463] __list_lru_init+0x456/0x790 [ 647.411548] ? list_lru_destroy+0x4c0/0x4c0 [ 647.415883] ? mark_held_locks+0xc9/0x160 [ 647.420048] ? __raw_spin_lock_init+0x1c/0x100 [ 647.424643] ? trace_hardirqs_on_caller+0x421/0x5c0 [ 647.429687] ? lockdep_init_map+0x9/0x10 [ 647.433769] sget_userns+0x706/0xf20 [ 647.437490] ? kill_litter_super+0x90/0x90 [ 647.441746] ? ns_test_super+0x50/0x50 [ 647.445644] ? destroy_unused_super.part.9+0x100/0x100 [ 647.450930] ? do_raw_spin_trylock+0x1b0/0x1b0 [ 647.455531] ? kasan_check_write+0x14/0x20 [ 647.459781] ? do_raw_spin_lock+0xc1/0x200 [ 647.464040] ? blkdev_get+0xc0/0xb30 [ 647.467773] ? cap_capable+0x1f9/0x260 [ 647.471688] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 647.477240] ? security_capable+0x99/0xc0 [ 647.481424] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 647.486978] ? ns_capable_common+0x13f/0x170 [ 647.491405] ? kill_litter_super+0x90/0x90 [ 647.495656] sget+0x10b/0x150 [ 647.498775] ? ns_test_super+0x50/0x50 [ 647.502686] mount_bdev+0x111/0x3e0 [ 647.506323] ? fuse_get_root_inode+0x190/0x190 [ 647.510923] fuse_mount_blk+0x34/0x40 [ 647.514747] mount_fs+0xae/0x328 [ 647.518142] vfs_kern_mount.part.34+0xd4/0x4d0 [ 647.522742] ? may_umount+0xb0/0xb0 [ 647.526376] ? _raw_read_unlock+0x22/0x30 [ 647.530536] ? __get_fs_type+0x97/0xc0 [ 647.534445] do_mount+0x564/0x3070 [ 647.538008] ? copy_mount_string+0x40/0x40 [ 647.542257] ? rcu_pm_notify+0xc0/0xc0 [ 647.546179] ? copy_mount_options+0x5f/0x380 [ 647.550601] ? rcu_read_lock_sched_held+0x108/0x120 [ 647.555635] ? kmem_cache_alloc_trace+0x616/0x780 [ 647.560496] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 647.566045] ? _copy_from_user+0xdf/0x150 [ 647.570211] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 647.575758] ? copy_mount_options+0x285/0x380 [ 647.580283] ksys_mount+0x12d/0x140 [ 647.583928] SyS_mount+0x35/0x50 [ 647.587307] ? ksys_mount+0x140/0x140 [ 647.591131] do_syscall_64+0x29e/0x9d0 [ 647.595026] ? vmalloc_sync_all+0x30/0x30 [ 647.599185] ? _raw_spin_unlock_irq+0x27/0x70 [ 647.603707] ? finish_task_switch+0x1ca/0x820 [ 647.608225] ? syscall_return_slowpath+0x5c0/0x5c0 [ 647.613175] ? syscall_return_slowpath+0x30f/0x5c0 [ 647.618125] ? entry_SYSCALL_64_after_hwframe+0x52/0xb7 [ 647.623505] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 647.628372] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 647.633567] RIP: 0033:0x455259 [ 647.636766] RSP: 002b:00007f95e4cadb08 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 647.644494] RAX: ffffffffffffffda RBX: 0000000000000015 RCX: 0000000000455259 [ 647.651771] RDX: 00000000004b9bc5 RSI: 0000000020000040 RDI: 0000000020000000 [ 647.659054] RBP: 0000000020000000 R08: 00007f95e4cadb20 R09: 0000000000000000 [ 647.666329] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 647.673607] R13: 0000000000000000 R14: 0000000000000000 R15: 0000000000000000 2018/04/11 12:45:49 executing program 7: syz_emit_ethernet(0x66, &(0x7f0000000000)={@random="cd3997030f00", @empty=[0x0, 0x0, 0x0, 0x0, 0x200000000000000], [], {@ipv6={0x86dd, {0x0, 0x6, "b40900", 0x30, 0x67, 0x0, @ipv4={[], [0xff, 0xff], @multicast2=0xe0000002}, @mcast2={0xff, 0x2, [], 0x1}, {[], @icmpv6=@time_exceed={0x21, 0x0, 0x0, 0x0, [], {0x0, 0x6, "b680fa", 0x0, 0x0, 0x0, @ipv4={[], [0xff, 0xff], @broadcast=0xffffffff}, @ipv4={[], [0xff, 0xff], @remote={0xac, 0x14, 0xffffffffffffffff, 0xbb}}}}}}}}}, 0x0) 2018/04/11 12:45:49 executing program 1: r0 = socket(0x1e, 0x1, 0x0) setsockopt$packet_tx_ring(r0, 0x10f, 0x87, &(0x7f0000b89fe4)=@req={0x772}, 0x10) sendmsg(r0, &(0x7f0000030000)={&(0x7f00004f5000)=@generic={0x10000000001e, "0014000900000000000000000226cc573c080000003724c71e14dd6a739effea1b48006be61ffe0000e103000300f8000004003f010039d8f986ff01000300000004af50d50700000000000000e3ad316a1983000000001d00e0dfcb24281e27800000100076c3979ac40000bd15020078a1dfd300881a8365b1b16d7436"}, 0x80, &(0x7f0000447ff0), 0x0, &(0x7f00006e9c68)}, 0x0) 2018/04/11 12:45:49 executing program 5: r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000200)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc-cast5-avx\x00'}, 0x58) r2 = accept$alg(r1, 0x0, 0x0) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f00003bcfd0)="d3ab27191a", 0x5) sendmmsg$alg(r2, &(0x7f0000007e40)=[{0x0, 0x0, &(0x7f0000000900)}], 0x1, 0x0) accept(r1, &(0x7f0000000040)=@pppol2tpv3in6, &(0x7f00000000c0)=0x80) openat(r0, &(0x7f0000000100)='./file0\x00', 0x2, 0x100) 2018/04/11 12:45:49 executing program 2: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x1e, 0x1, 0x0) setsockopt$packet_tx_ring(r0, 0x10f, 0x87, &(0x7f0000b89fe4)=@req={0x772}, 0x10) sendmsg(r0, &(0x7f0000030000)={&(0x7f00004f5000)=@generic={0x10000000001e, "0100000900000000000000000226cc573c080000003724c71e14dd6a739effea1b48006be61ffe0000e103000000f8000004003f010039d8f986ff01000300000004af50d50700000000000000e3ad316a1983000000001d00e0dfcb24281e27800000100076c3979ac40000bd15020078a1dfd300881a8365b1b16d7436"}, 0xf, &(0x7f0000447ff0), 0x0, &(0x7f00006e9c68)}, 0x0) 2018/04/11 12:45:49 executing program 0: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff7fffffffffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x1e, 0x1, 0x0) sendmsg(r0, &(0x7f0000030000)={&(0x7f00004f5000)=@generic={0x10000000001e, "0200000900000000000000000226cc573c080000003724c71e14dd6a739effea1b48006be61ffe0000e103000000f8000004003f010039d8f986ff01000300000004af50d50700000000000000e3ad316a1983000000001d00e0dfcb24281e27800000100076c3979ac40000bd15020078a1dfd300881a8365b1b16d7436"}, 0x80, &(0x7f0000447ff0), 0x0, &(0x7f00006e9c68)}, 0x0) 2018/04/11 12:45:49 executing program 6: r0 = socket$inet6(0xa, 0x80003, 0xff) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @ipv4={[], [0xff, 0xff], @dev={0xac, 0x14, 0x14, 0x1b}}}, 0x1c) sendmsg(r0, &(0x7f000001b000)={0x0, 0xfffffff5, &(0x7f0000019fa0), 0x14, &(0x7f000001ef08)}, 0x0) 2018/04/11 12:45:49 executing program 3: semop(0x0, &(0x7f000001a000)=[{0x0, 0xffffffffffff0001}, {}], 0x2) timer_create(0x0, &(0x7f0000cd0000)={0x0, 0x12}, &(0x7f0000044000)) timer_settime(0x0, 0x0, &(0x7f00004b1fe0)={{0x0, 0x1c9c380}, {0x0, 0x9}}, &(0x7f0000040000)) r0 = getpgid(0x0) r1 = syz_open_dev$audion(&(0x7f0000000000)='/dev/audio#\x00', 0x11, 0x2800) getsockopt$inet_sctp_SCTP_PR_ASSOC_STATUS(0xffffffffffffff9c, 0x84, 0x73, &(0x7f0000000040)={0x0, 0x40, 0x30, 0x7}, &(0x7f0000000080)=0x18) getsockopt$inet_sctp6_SCTP_LOCAL_AUTH_CHUNKS(r1, 0x84, 0x1b, &(0x7f00000000c0)={r2, 0x26, "29bf801fbe7f6c7ca4d8b210ab0e616a97a98580331b50e0b487f81a7558646643ae414c7222"}, &(0x7f0000000100)=0x2e) tkill(r0, 0x1000000000016) 2018/04/11 12:45:49 executing program 4 (fault-call:1 fault-nth:34): perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_fuseblk_mount(&(0x7f0000000040)='./file0\x00', &(0x7f0000000000)='./file0\x00', 0x4000, 0x0, 0x0, 0x0, 0x0, 0x0) [ 648.335527] FAULT_INJECTION: forcing a failure. [ 648.335527] name failslab, interval 1, probability 0, space 0, times 0 [ 648.346927] CPU: 0 PID: 4295 Comm: syz-executor4 Not tainted 4.16.0+ #17 [ 648.353784] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 648.363151] Call Trace: [ 648.365761] dump_stack+0x1b9/0x294 [ 648.369419] ? dump_stack_print_info.cold.2+0x52/0x52 [ 648.374645] should_fail.cold.4+0xa/0x1a [ 648.378728] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 648.383840] ? save_stack+0x43/0xd0 [ 648.387478] ? kmem_cache_alloc_trace+0x152/0x780 [ 648.392342] ? __memcg_init_list_lru_node+0x17d/0x2c0 [ 648.397549] ? __list_lru_init+0x456/0x790 [ 648.401799] ? sget_userns+0x706/0xf20 [ 648.405705] ? graph_lock+0x170/0x170 [ 648.409523] ? vfs_kern_mount.part.34+0xd4/0x4d0 [ 648.414290] ? do_mount+0x564/0x3070 [ 648.418017] ? ksys_mount+0x12d/0x140 [ 648.421827] ? SyS_mount+0x35/0x50 [ 648.425381] ? do_syscall_64+0x29e/0x9d0 [ 648.429458] ? entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 648.434846] ? find_held_lock+0x36/0x1c0 [ 648.438943] ? __lock_is_held+0xb5/0x140 [ 648.443053] ? check_same_owner+0x320/0x320 [ 648.447400] ? rcu_note_context_switch+0x710/0x710 [ 648.452447] __should_failslab+0x124/0x180 [ 648.456707] should_failslab+0x9/0x14 [ 648.460523] kmem_cache_alloc_trace+0x2cb/0x780 [ 648.465295] ? __kmalloc_node+0x33/0x70 [ 648.469281] ? __kmalloc_node+0x33/0x70 [ 648.473272] ? rcu_read_lock_sched_held+0x108/0x120 [ 648.478325] __memcg_init_list_lru_node+0x17d/0x2c0 2018/04/11 12:45:50 executing program 1: r0 = socket(0x1e, 0x1, 0x0) setsockopt$packet_tx_ring(r0, 0x10f, 0x87, &(0x7f0000b89fe4)=@req={0x772}, 0x10) sendmsg(r0, &(0x7f0000030000)={&(0x7f00004f5000)=@generic={0x10000000001e, "0014000900000000000000000226cc573c080000003724c71e14dd6a739effea1b48006be61ffe0000e103040000f8000004003f010039d8f986ff01000300000004af50d50700000000000000e3ad316a1983000000001d00e0dfcb24281e27800000100076c3979ac40000bd15020078a1dfd300881a8365b1b16d7436"}, 0x80, &(0x7f0000447ff0), 0x0, &(0x7f00006e9c68)}, 0x0) 2018/04/11 12:45:50 executing program 0: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff7fffffffffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x1e, 0x1, 0x0) sendmsg(r0, &(0x7f0000030000)={&(0x7f00004f5000)=@generic={0x10000000001e, "0014000900000000000000000226cc573c080000003724c71e14dd6a739effea1b48006be61ffe0000e103000000f8000004003f010039d8f986ff01000300000004af50d50700000000000000e3ad316a1983000000001d00e0dfcb24281e27800000100076c3979ac40000bd15020078a1dfd300881a8365b1b16d7436"}, 0x80, &(0x7f0000447ff0), 0x0, &(0x7f00006e9c68)}, 0x0) 2018/04/11 12:45:50 executing program 2: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x1e, 0x1, 0x0) setsockopt$packet_tx_ring(r0, 0x10f, 0x87, &(0x7f0000b89fe4)=@req={0x772}, 0x10) sendmsg(r0, &(0x7f0000030000)={&(0x7f00004f5000)=@generic={0x10000000001e, "0100000900000000000000000226cc573c080000003724c71e14dd6a739effea1b48006be61ffe0000e103000000f8000004003f010039d8f986ff01000300000004af50d50700000000000000e3ad316a1983000000001d00e0dfcb24281e27800000100076c3979ac40000bd15020078a1dfd300881a8365b1b16d7436"}, 0x204f5080, &(0x7f0000447ff0), 0x0, &(0x7f00006e9c68)}, 0x0) 2018/04/11 12:45:50 executing program 6: r0 = socket$inet6(0xa, 0x80003, 0xff) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @ipv4={[], [0xff, 0xff], @dev={0xac, 0x14, 0x14, 0x1b}}}, 0x1c) sendmsg(r0, &(0x7f000001b000)={0x0, 0xfffffff5, &(0x7f0000019fa0), 0x13f, &(0x7f000001ef08)}, 0x0) 2018/04/11 12:45:50 executing program 7: syz_emit_ethernet(0x66, &(0x7f0000000000)={@random="cd3997030f00", @empty=[0x0, 0x0, 0x0, 0x0, 0x88a8ffff00000000], [], {@ipv6={0x86dd, {0x0, 0x6, "b40900", 0x30, 0x67, 0x0, @ipv4={[], [0xff, 0xff], @multicast2=0xe0000002}, @mcast2={0xff, 0x2, [], 0x1}, {[], @icmpv6=@time_exceed={0x21, 0x0, 0x0, 0x0, [], {0x0, 0x6, "b680fa", 0x0, 0x0, 0x0, @ipv4={[], [0xff, 0xff], @broadcast=0xffffffff}, @ipv4={[], [0xff, 0xff], @remote={0xac, 0x14, 0xffffffffffffffff, 0xbb}}}}}}}}}, 0x0) 2018/04/11 12:45:50 executing program 5: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000200)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc-cast5-avx\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000100)="d3ab27191a", 0x5) sendmmsg$alg(r1, &(0x7f0000007e40)=[{0x0, 0x0, &(0x7f0000000900)}], 0x1, 0x0) accept$alg(r0, 0x0, 0x0) accept(r0, &(0x7f0000000040)=@pppol2tpv3in6, &(0x7f00000000c0)=0x80) [ 648.483370] ? kvfree_rcu+0x20/0x20 [ 648.487015] ? __kmalloc_node+0x47/0x70 [ 648.491049] __list_lru_init+0x456/0x790 [ 648.495137] ? list_lru_destroy+0x4c0/0x4c0 [ 648.499472] ? mark_held_locks+0xc9/0x160 [ 648.503637] ? __raw_spin_lock_init+0x1c/0x100 [ 648.508259] ? trace_hardirqs_on_caller+0x421/0x5c0 [ 648.513323] ? lockdep_init_map+0x9/0x10 [ 648.517410] sget_userns+0x706/0xf20 [ 648.521127] ? kill_litter_super+0x90/0x90 [ 648.525380] ? ns_test_super+0x50/0x50 [ 648.529286] ? destroy_unused_super.part.9+0x100/0x100 [ 648.534580] ? do_raw_spin_trylock+0x1b0/0x1b0 [ 648.539182] ? kasan_check_write+0x14/0x20 [ 648.543439] ? do_raw_spin_lock+0xc1/0x200 [ 648.547697] ? blkdev_get+0xc0/0xb30 [ 648.551438] ? cap_capable+0x1f9/0x260 [ 648.555354] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 648.560905] ? security_capable+0x99/0xc0 [ 648.565074] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 648.570624] ? ns_capable_common+0x13f/0x170 [ 648.575049] ? kill_litter_super+0x90/0x90 [ 648.579294] sget+0x10b/0x150 [ 648.582409] ? ns_test_super+0x50/0x50 2018/04/11 12:45:50 executing program 6: r0 = socket$inet6(0xa, 0x80003, 0xff) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @ipv4={[], [0xff, 0xff], @dev={0xac, 0x14, 0x14, 0x1b}}}, 0x1c) sendmsg(r0, &(0x7f000001b000)={0x0, 0xfffffff5, &(0x7f0000019fa0), 0x2f, &(0x7f000001ef08)}, 0x0) 2018/04/11 12:45:50 executing program 7: syz_emit_ethernet(0x66, &(0x7f0000000000)={@random="cd3997030f00", @empty=[0x0, 0x0, 0x0, 0x0, 0x5000000], [], {@ipv6={0x86dd, {0x0, 0x6, "b40900", 0x30, 0x67, 0x0, @ipv4={[], [0xff, 0xff], @multicast2=0xe0000002}, @mcast2={0xff, 0x2, [], 0x1}, {[], @icmpv6=@time_exceed={0x21, 0x0, 0x0, 0x0, [], {0x0, 0x6, "b680fa", 0x0, 0x0, 0x0, @ipv4={[], [0xff, 0xff], @broadcast=0xffffffff}, @ipv4={[], [0xff, 0xff], @remote={0xac, 0x14, 0xffffffffffffffff, 0xbb}}}}}}}}}, 0x0) [ 648.586319] mount_bdev+0x111/0x3e0 [ 648.589961] ? fuse_get_root_inode+0x190/0x190 [ 648.594564] fuse_mount_blk+0x34/0x40 [ 648.598386] mount_fs+0xae/0x328 [ 648.601784] vfs_kern_mount.part.34+0xd4/0x4d0 [ 648.606386] ? may_umount+0xb0/0xb0 [ 648.610023] ? _raw_read_unlock+0x22/0x30 [ 648.614180] ? __get_fs_type+0x97/0xc0 [ 648.618094] do_mount+0x564/0x3070 [ 648.621659] ? copy_mount_string+0x40/0x40 [ 648.625912] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 648.630692] ? retint_kernel+0x10/0x10 2018/04/11 12:45:50 executing program 5: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000200)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc-cast5-avx\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) setsockopt$inet_sctp6_SCTP_FRAGMENT_INTERLEAVE(r1, 0x84, 0x12, &(0x7f0000000100)=0x80000001, 0x4) socketpair$packet(0x11, 0x3, 0x300, &(0x7f0000000140)) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00003bcfd0)="d3ab27191a", 0x5) sendmmsg$alg(r1, &(0x7f0000007e40)=[{0x0, 0x0, &(0x7f0000000180)}], 0x0, 0x0) accept(r0, &(0x7f0000000040)=@pppol2tpv3in6, &(0x7f00000000c0)=0x80) [ 648.634609] ? copy_mount_options+0x1a1/0x380 [ 648.639130] ? __sanitizer_cov_trace_pc+0x3b/0x50 [ 648.644000] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 648.649556] ? copy_mount_options+0x285/0x380 [ 648.654075] ksys_mount+0x12d/0x140 [ 648.657725] SyS_mount+0x35/0x50 [ 648.661103] ? ksys_mount+0x140/0x140 [ 648.664917] do_syscall_64+0x29e/0x9d0 [ 648.668810] ? vmalloc_sync_all+0x30/0x30 [ 648.672967] ? _raw_spin_unlock_irq+0x27/0x70 [ 648.677479] ? finish_task_switch+0x1ca/0x820 [ 648.681994] ? syscall_return_slowpath+0x5c0/0x5c0 2018/04/11 12:45:50 executing program 7: syz_emit_ethernet(0x66, &(0x7f0000000000)={@random="cd3997030f00", @empty=[0x0, 0x0, 0x0, 0x0, 0x5800], [], {@ipv6={0x86dd, {0x0, 0x6, "b40900", 0x30, 0x67, 0x0, @ipv4={[], [0xff, 0xff], @multicast2=0xe0000002}, @mcast2={0xff, 0x2, [], 0x1}, {[], @icmpv6=@time_exceed={0x21, 0x0, 0x0, 0x0, [], {0x0, 0x6, "b680fa", 0x0, 0x0, 0x0, @ipv4={[], [0xff, 0xff], @broadcast=0xffffffff}, @ipv4={[], [0xff, 0xff], @remote={0xac, 0x14, 0xffffffffffffffff, 0xbb}}}}}}}}}, 0x0) [ 648.686944] ? syscall_return_slowpath+0x30f/0x5c0 [ 648.691903] ? entry_SYSCALL_64_after_hwframe+0x52/0xb7 [ 648.697294] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 648.702164] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 648.707366] RIP: 0033:0x455259 [ 648.710564] RSP: 002b:00007f95e4cadb08 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 648.718285] RAX: ffffffffffffffda RBX: 0000000000000015 RCX: 0000000000455259 [ 648.725567] RDX: 00000000004b9bc5 RSI: 0000000020000040 RDI: 0000000020000000 [ 648.732851] RBP: 0000000020000000 R08: 00007f95e4cadb20 R09: 0000000000000000 [ 648.740127] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 648.747406] R13: 0000000000000000 R14: 0000000000000000 R15: 0000000000000000 2018/04/11 12:45:50 executing program 6: r0 = socket$inet6(0xa, 0x80003, 0xff) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @ipv4={[], [0xff, 0xff], @dev={0xac, 0x14, 0x14, 0x1b}}}, 0x1c) sendmsg(r0, &(0x7f000001b000)={0x0, 0xfffffff5, &(0x7f0000019fa0), 0x30, &(0x7f000001ef08)}, 0x0) 2018/04/11 12:45:50 executing program 2: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x1e, 0x1, 0x0) setsockopt$packet_tx_ring(r0, 0x10f, 0x87, &(0x7f0000b89fe4)=@req={0x772}, 0x10) sendmsg(r0, &(0x7f0000030000)={&(0x7f00004f5000)=@generic={0x10000000001e, "0100000900000000000000000226cc573c080000003724c71e14dd6a739effea1b48006be61ffe0000e103000000f8000004003f010039d8f986ff01000300000004af50d50700000000000000e3ad316a1983000000001d00e0dfcb24281e27800000100076c3979ac40000bd15020078a1dfd300881a8365b1b16d7436"}, 0x80, &(0x7f0000447ff0), 0x0, &(0x7f00006e9c68)}, 0x0) 2018/04/11 12:45:50 executing program 1: r0 = socket(0x1e, 0x1, 0x0) setsockopt$packet_tx_ring(r0, 0x10f, 0x87, &(0x7f0000b89fe4)=@req={0x772}, 0x10) sendmsg(r0, &(0x7f0000030000)={&(0x7f00004f5000)=@generic={0x10000000001e, "0014000900000000000000000226cc573c080000003724c71e14dd6a739effea1b48006be61ffe0000e103000300f8000004003f010039d8f986ff01000300000004af50d50700000000000000e3ad316a1983000000001d00e0dfcb24281e27800000100076c3979ac40000bd15020078a1dfd300881a8365b1b16d7436"}, 0x80, &(0x7f0000447ff0), 0x0, &(0x7f00006e9c68)}, 0x0) 2018/04/11 12:45:50 executing program 0: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff7fffffffffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x1e, 0x1, 0x0) sendmsg(r0, &(0x7f0000030000)={&(0x7f00004f5000)=@generic={0x10000000001e, "0104000900000000000000000226cc573c080000003724c71e14dd6a739effea1b48006be61ffe0000e103000000f8000004003f010039d8f986ff01000300000004af50d50700000000000000e3ad316a1983000000001d00e0dfcb24281e27800000100076c3979ac40000bd15020078a1dfd300881a8365b1b16d7436"}, 0x80, &(0x7f0000447ff0), 0x0, &(0x7f00006e9c68)}, 0x0) 2018/04/11 12:45:50 executing program 4 (fault-call:1 fault-nth:35): perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_fuseblk_mount(&(0x7f0000000040)='./file0\x00', &(0x7f0000000000)='./file0\x00', 0x4000, 0x0, 0x0, 0x0, 0x0, 0x0) 2018/04/11 12:45:50 executing program 5: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000200)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc-cast5-avx\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00003bcfd0)="d3ab27191a", 0x5) sendmmsg$alg(r1, &(0x7f0000007e40)=[{0x0, 0x0, &(0x7f0000000900)}], 0x1, 0x0) accept(r0, &(0x7f0000000040)=@pppol2tpv3in6, &(0x7f00000000c0)=0x80) 2018/04/11 12:45:50 executing program 3: semop(0x0, &(0x7f000001a000)=[{0x0, 0xffffffffffff0001}, {}], 0x2) timer_create(0x0, &(0x7f0000cd0000)={0x0, 0x12}, &(0x7f0000044000)) timer_settime(0x0, 0x0, &(0x7f00004b1fe0)={{0x0, 0x1c9c380}, {0x0, 0x9}}, &(0x7f0000040000)) r0 = getpid() r1 = getpgid(r0) tkill(r1, 0x1000000000016) 2018/04/11 12:45:50 executing program 7: syz_emit_ethernet(0x66, &(0x7f0000000000)={@random="cd3997030f00", @empty=[0x0, 0x0, 0x0, 0x0, 0xf0], [], {@ipv6={0x86dd, {0x0, 0x6, "b40900", 0x30, 0x67, 0x0, @ipv4={[], [0xff, 0xff], @multicast2=0xe0000002}, @mcast2={0xff, 0x2, [], 0x1}, {[], @icmpv6=@time_exceed={0x21, 0x0, 0x0, 0x0, [], {0x0, 0x6, "b680fa", 0x0, 0x0, 0x0, @ipv4={[], [0xff, 0xff], @broadcast=0xffffffff}, @ipv4={[], [0xff, 0xff], @remote={0xac, 0x14, 0xffffffffffffffff, 0xbb}}}}}}}}}, 0x0) 2018/04/11 12:45:50 executing program 6: r0 = socket$inet6(0xa, 0x80003, 0xff) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @ipv4={[], [0xff, 0xff], @dev={0xac, 0x14, 0x14, 0x1b}}}, 0x1c) sendmsg(r0, &(0x7f000001b000)={0x0, 0xfffffff5, &(0x7f0000019fa0), 0xce, &(0x7f000001ef08)}, 0x0) 2018/04/11 12:45:50 executing program 2: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x1e, 0x1, 0x0) setsockopt$packet_tx_ring(r0, 0x10f, 0x87, &(0x7f0000b89fe4)=@req={0x772}, 0x10) sendmsg(r0, &(0x7f0000030000)={&(0x7f00004f5000)=@generic={0x10000000001e, "0100000900000000000000000226cc573c080000003724c71e14dd6a739effea1b48006be61ffe0000e103000000f8000004003f010039d8f986ff01000300000004af50d50700000000000000e3ad316a1983000000001d00e0dfcb24281e27800000100076c3979ac40000bd15020078a1dfd300881a8365b1b16d7436"}, 0x80, &(0x7f0000447ff0), 0x0, &(0x7f00006e9c68)}, 0x0) [ 649.313560] FAULT_INJECTION: forcing a failure. [ 649.313560] name failslab, interval 1, probability 0, space 0, times 0 [ 649.324885] CPU: 0 PID: 4364 Comm: syz-executor4 Not tainted 4.16.0+ #17 [ 649.331730] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 649.341091] Call Trace: [ 649.343700] dump_stack+0x1b9/0x294 [ 649.347352] ? dump_stack_print_info.cold.2+0x52/0x52 [ 649.352594] should_fail.cold.4+0xa/0x1a [ 649.356689] ? fault_create_debugfs_attr+0x1f0/0x1f0 2018/04/11 12:45:51 executing program 5: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000200)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc-cast5-avx\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000100)="01000038ae428b7d23c4ef281f546ab081d4db75cbb404232a4382be6370", 0xffffff05) sendmmsg$alg(r1, &(0x7f0000007e40)=[{0x0, 0x0, &(0x7f0000000900)}], 0x1, 0x0) r2 = dup(r0) getsockopt$netrom_NETROM_T4(r2, 0x103, 0x6, &(0x7f0000000500)=0xed1, &(0x7f0000000540)=0x4) getsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r2, 0x84, 0x9, &(0x7f0000000140)={0x0, @in6={{0xa, 0x4e21, 0xfffffffffffffffe, @mcast2={0xff, 0x2, [], 0x1}, 0x1}}, 0x5, 0x80, 0x3, 0xcfbf, 0x3}, &(0x7f0000000280)=0x98) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r2, 0x84, 0x6f, &(0x7f0000000300)={r3, 0x1c, &(0x7f00000002c0)=[@in6={0xa, 0x4e23, 0x6, @mcast1={0xff, 0x1, [], 0x1}, 0xffffffffffffffff}]}, &(0x7f0000000340)=0x10) accept(r0, &(0x7f0000000040)=@pppol2tpv3in6, &(0x7f00000000c0)=0x80) 2018/04/11 12:45:51 executing program 7: syz_emit_ethernet(0x66, &(0x7f0000000000)={@random="cd3997030f00", @empty=[0x0, 0x0, 0x0, 0x0, 0xb], [], {@ipv6={0x86dd, {0x0, 0x6, "b40900", 0x30, 0x67, 0x0, @ipv4={[], [0xff, 0xff], @multicast2=0xe0000002}, @mcast2={0xff, 0x2, [], 0x1}, {[], @icmpv6=@time_exceed={0x21, 0x0, 0x0, 0x0, [], {0x0, 0x6, "b680fa", 0x0, 0x0, 0x0, @ipv4={[], [0xff, 0xff], @broadcast=0xffffffff}, @ipv4={[], [0xff, 0xff], @remote={0xac, 0x14, 0xffffffffffffffff, 0xbb}}}}}}}}}, 0x0) [ 649.361809] ? save_stack+0x43/0xd0 [ 649.365448] ? kmem_cache_alloc_trace+0x152/0x780 [ 649.370312] ? __memcg_init_list_lru_node+0x17d/0x2c0 [ 649.375523] ? __list_lru_init+0x456/0x790 [ 649.379770] ? sget_userns+0x706/0xf20 [ 649.383668] ? graph_lock+0x170/0x170 [ 649.387487] ? vfs_kern_mount.part.34+0xd4/0x4d0 [ 649.392252] ? do_mount+0x564/0x3070 [ 649.395976] ? ksys_mount+0x12d/0x140 [ 649.399785] ? SyS_mount+0x35/0x50 [ 649.403340] ? do_syscall_64+0x29e/0x9d0 [ 649.407418] ? entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 649.412803] ? find_held_lock+0x36/0x1c0 [ 649.416892] ? __lock_is_held+0xb5/0x140 [ 649.420998] ? check_same_owner+0x320/0x320 [ 649.425343] ? rcu_note_context_switch+0x710/0x710 [ 649.430304] __should_failslab+0x124/0x180 [ 649.434559] should_failslab+0x9/0x14 [ 649.438375] kmem_cache_alloc_trace+0x2cb/0x780 [ 649.443061] ? __kmalloc_node+0x33/0x70 [ 649.447050] ? __kmalloc_node+0x33/0x70 [ 649.451043] ? rcu_read_lock_sched_held+0x108/0x120 [ 649.456094] __memcg_init_list_lru_node+0x17d/0x2c0 2018/04/11 12:45:51 executing program 0: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff7fffffffffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x1e, 0x1, 0x0) sendmsg(r0, &(0x7f0000030000)={&(0x7f00004f5000)=@generic={0x10000000001e, "01000009000101d0000000000226cc573c080000003724c71e14dd6a739effea1b48006be61ffe0000e103000000f8000004003f010039d8f986ff01000300000004af50d50700000000000000e3ad316a1983000000001d00e0dfcb24281e27800000100076c3979ac40000bd15020078a1dfd300881a8365b1b16d7436"}, 0x80, &(0x7f0000447ff0), 0x0, &(0x7f00006e9c68)}, 0x0) [ 649.461142] ? kvfree_rcu+0x20/0x20 [ 649.464788] ? __kmalloc_node+0x47/0x70 [ 649.468790] __list_lru_init+0x456/0x790 [ 649.472878] ? list_lru_destroy+0x4c0/0x4c0 [ 649.477215] ? mark_held_locks+0xc9/0x160 [ 649.481386] ? __raw_spin_lock_init+0x1c/0x100 [ 649.485987] ? trace_hardirqs_on_caller+0x421/0x5c0 [ 649.491029] ? lockdep_init_map+0x9/0x10 [ 649.495113] sget_userns+0x706/0xf20 [ 649.498843] ? kill_litter_super+0x90/0x90 [ 649.503093] ? ns_test_super+0x50/0x50 [ 649.507005] ? destroy_unused_super.part.9+0x100/0x100 2018/04/11 12:45:51 executing program 7: syz_emit_ethernet(0x66, &(0x7f0000000000)={@random="cd3997030f00", @empty=[0x0, 0x0, 0x0, 0x0, 0x28], [], {@ipv6={0x86dd, {0x0, 0x6, "b40900", 0x30, 0x67, 0x0, @ipv4={[], [0xff, 0xff], @multicast2=0xe0000002}, @mcast2={0xff, 0x2, [], 0x1}, {[], @icmpv6=@time_exceed={0x21, 0x0, 0x0, 0x0, [], {0x0, 0x6, "b680fa", 0x0, 0x0, 0x0, @ipv4={[], [0xff, 0xff], @broadcast=0xffffffff}, @ipv4={[], [0xff, 0xff], @remote={0xac, 0x14, 0xffffffffffffffff, 0xbb}}}}}}}}}, 0x0) 2018/04/11 12:45:51 executing program 6: r0 = socket$inet6(0xa, 0x80003, 0xff) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @ipv4={[], [0xff, 0xff], @dev={0xac, 0x14, 0x14, 0x1b}}}, 0x1c) sendmsg(r0, &(0x7f000001b000)={0x0, 0xfffffff5, &(0x7f0000019fa0), 0x10b, &(0x7f000001ef08)}, 0x0) 2018/04/11 12:45:51 executing program 5: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000200)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc-cast5-avx\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00003bcfd0)="d3ab27191a", 0x5) sendmmsg$alg(r1, &(0x7f0000007e40)=[{0x0, 0x0, &(0x7f0000000900)}], 0x1, 0x0) accept(r0, &(0x7f0000000040)=@pppol2tpv3in6={0x0, 0x0, {0x0, 0xffffffffffffffff}}, &(0x7f00000000c0)=0x80) setsockopt$inet_group_source_req(r2, 0x0, 0x2f, &(0x7f0000000280)={0x2, {{0x2, 0x4e21}}, {{0x2, 0x4e22, @remote={0xac, 0x14, 0x14, 0xbb}}}}, 0x108) recvmsg(r0, &(0x7f0000000780)={0x0, 0x0, &(0x7f0000000680)=[{&(0x7f0000000100)=""/228, 0xe4}, {&(0x7f00000003c0)=""/231, 0xe7}, {&(0x7f00000004c0)=""/170, 0xaa}, {&(0x7f0000000580)=""/148, 0x94}, {&(0x7f0000000640)=""/34, 0x22}], 0x5, &(0x7f0000000700)=""/101, 0x65, 0x5}, 0x10000) [ 649.512396] ? do_raw_spin_trylock+0x1b0/0x1b0 [ 649.516999] ? kasan_check_write+0x14/0x20 [ 649.521246] ? do_raw_spin_lock+0xc1/0x200 [ 649.525508] ? blkdev_get+0xc0/0xb30 [ 649.529242] ? cap_capable+0x1f9/0x260 [ 649.533158] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 649.538708] ? security_capable+0x99/0xc0 [ 649.542875] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 649.548422] ? ns_capable_common+0x13f/0x170 [ 649.552845] ? kill_litter_super+0x90/0x90 [ 649.557086] sget+0x10b/0x150 [ 649.560196] ? ns_test_super+0x50/0x50 [ 649.564099] mount_bdev+0x111/0x3e0 [ 649.567745] ? fuse_get_root_inode+0x190/0x190 [ 649.572349] fuse_mount_blk+0x34/0x40 [ 649.576188] mount_fs+0xae/0x328 [ 649.579584] vfs_kern_mount.part.34+0xd4/0x4d0 [ 649.584203] ? may_umount+0xb0/0xb0 [ 649.587843] ? _raw_read_unlock+0x22/0x30 [ 649.592008] ? __get_fs_type+0x97/0xc0 [ 649.595922] do_mount+0x564/0x3070 [ 649.599487] ? copy_mount_string+0x40/0x40 [ 649.603729] ? rcu_pm_notify+0xc0/0xc0 [ 649.607643] ? copy_mount_options+0x5f/0x380 [ 649.612063] ? rcu_read_lock_sched_held+0x108/0x120 [ 649.617122] ? kmem_cache_alloc_trace+0x616/0x780 [ 649.622019] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 649.627570] ? _copy_from_user+0xdf/0x150 [ 649.631738] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 649.637289] ? copy_mount_options+0x285/0x380 [ 649.641800] ksys_mount+0x12d/0x140 [ 649.645447] SyS_mount+0x35/0x50 [ 649.648816] ? ksys_mount+0x140/0x140 [ 649.652634] do_syscall_64+0x29e/0x9d0 [ 649.656532] ? vmalloc_sync_all+0x30/0x30 [ 649.660698] ? _raw_spin_unlock_irq+0x27/0x70 2018/04/11 12:45:51 executing program 2: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x1e, 0x1, 0x0) setsockopt$packet_tx_ring(r0, 0x10f, 0x87, &(0x7f0000b89fe4)=@req={0x772}, 0x10) sendmsg(r0, &(0x7f0000030000)={&(0x7f00004f5000)=@generic={0x10000000001e, "0100000900000000000000000226cc573c080000003724c71e14dd6a739effea1b48006be61ffe0000e103000000f8000004003f010039d8f986ff01000300000004af50d50700000000000000e3ad316a1983000000001d00e0dfcb24281e27800000100076c3979ac40000bd15020078a1dfd300881a8365b1b16d7436"}, 0x80, &(0x7f0000447ff0), 0x0, &(0x7f00006e9c68)}, 0x0) [ 649.665210] ? finish_task_switch+0x1ca/0x820 [ 649.669718] ? syscall_return_slowpath+0x5c0/0x5c0 [ 649.674664] ? syscall_return_slowpath+0x30f/0x5c0 [ 649.679616] ? entry_SYSCALL_64_after_hwframe+0x52/0xb7 [ 649.685004] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 649.689874] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 649.695070] RIP: 0033:0x455259 [ 649.698264] RSP: 002b:00007f95e4cadb08 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 649.705986] RAX: ffffffffffffffda RBX: 0000000000000015 RCX: 0000000000455259 [ 649.713264] RDX: 00000000004b9bc5 RSI: 0000000020000040 RDI: 0000000020000000 [ 649.720540] RBP: 0000000020000000 R08: 00007f95e4cadb20 R09: 0000000000000000 [ 649.727814] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 649.735095] R13: 0000000000000000 R14: 0000000000000000 R15: 0000000000000000 2018/04/11 12:45:51 executing program 0: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff7fffffffffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x1e, 0x1, 0x0) sendmsg(r0, &(0x7f0000030000)={&(0x7f00004f5000)=@generic={0x10000000001e, "010000097fffffff000000000226cc573c080000003724c71e14dd6a739effea1b48006be61ffe0000e103000000f8000004003f010039d8f986ff01000300000004af50d50700000000000000e3ad316a1983000000001d00e0dfcb24281e27800000100076c3979ac40000bd15020078a1dfd300881a8365b1b16d7436"}, 0x80, &(0x7f0000447ff0), 0x0, &(0x7f00006e9c68)}, 0x0) 2018/04/11 12:45:51 executing program 7: syz_emit_ethernet(0x66, &(0x7f0000000000)={@random="cd3997030f00", @empty=[0x0, 0x0, 0x0, 0x0, 0xff00000000000000], [], {@ipv6={0x86dd, {0x0, 0x6, "b40900", 0x30, 0x67, 0x0, @ipv4={[], [0xff, 0xff], @multicast2=0xe0000002}, @mcast2={0xff, 0x2, [], 0x1}, {[], @icmpv6=@time_exceed={0x21, 0x0, 0x0, 0x0, [], {0x0, 0x6, "b680fa", 0x0, 0x0, 0x0, @ipv4={[], [0xff, 0xff], @broadcast=0xffffffff}, @ipv4={[], [0xff, 0xff], @remote={0xac, 0x14, 0xffffffffffffffff, 0xbb}}}}}}}}}, 0x0) 2018/04/11 12:45:51 executing program 1: r0 = socket(0x1e, 0x1, 0x0) setsockopt$packet_tx_ring(r0, 0x10f, 0x87, &(0x7f0000b89fe4)=@req={0x772}, 0x10) sendmsg(r0, &(0x7f0000030000)={&(0x7f00004f5000)=@generic={0x10000000001e, "0014000900000000000000000226cc573c080000003724c71e14dd6a739effea1b48006be61ffe0000e103000400f8000004003f010039d8f986ff01000300000004af50d50700000000000000e3ad316a1983000000001d00e0dfcb24281e27800000100076c3979ac40000bd15020078a1dfd300881a8365b1b16d7436"}, 0x80, &(0x7f0000447ff0), 0x0, &(0x7f00006e9c68)}, 0x0) 2018/04/11 12:45:51 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000200)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc-cast5-avx\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00003bcfd0)="d3ab27191a", 0x5) sendmmsg$alg(r1, &(0x7f0000007e40)=[{0x0, 0x0, &(0x7f0000000900)}], 0x1, 0x0) accept(r0, &(0x7f0000000040)=@pppol2tpv3in6, &(0x7f00000000c0)=0x80) 2018/04/11 12:45:51 executing program 6: r0 = socket$inet6(0xa, 0x80003, 0xff) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @ipv4={[], [0xff, 0xff], @dev={0xac, 0x14, 0x14, 0x1b}}}, 0x1c) sendmsg(r0, &(0x7f000001b000)={0x0, 0xfffffff5, &(0x7f0000019fa0), 0x120, &(0x7f000001ef08)}, 0x0) 2018/04/11 12:45:51 executing program 4 (fault-call:1 fault-nth:36): perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_fuseblk_mount(&(0x7f0000000040)='./file0\x00', &(0x7f0000000000)='./file0\x00', 0x4000, 0x0, 0x0, 0x0, 0x0, 0x0) 2018/04/11 12:45:51 executing program 3: semop(0x0, &(0x7f000001a000)=[{0x0, 0xffffffffffff0001}, {}], 0x2) timer_create(0x0, &(0x7f0000cd0000)={0x0, 0x12}, &(0x7f0000044000)) r0 = syz_open_dev$sg(&(0x7f0000000000)='/dev/sg#\x00', 0x92b3690000000000, 0x10102) getsockopt$ax25_buf(r0, 0x101, 0x19, &(0x7f0000000040)=""/40, &(0x7f0000000080)=0x28) timer_settime(0x0, 0x0, &(0x7f00004b1fe0)={{0x0, 0x1c9c380}, {0x0, 0x9}}, &(0x7f0000040000)) r1 = getpgid(0x0) tkill(r1, 0x1000000000016) ioctl$KVM_GET_SREGS(r0, 0x8138ae83, &(0x7f00000000c0)) 2018/04/11 12:45:51 executing program 2: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x1e, 0x1, 0x0) setsockopt$packet_tx_ring(r0, 0x10f, 0x87, &(0x7f0000b89fe4)=@req={0x772}, 0x10) sendmsg(r0, &(0x7f0000030000)={&(0x7f00004f5000)=@generic={0x10000000001e, "0100000900000000000000000226cc573c080000003724c71e14dd6a739effea1b48006be61ffe0000e103000000f8000004003f010039d8f986ff01000300000004af50d50700000000000000e3ad316a1983000000001d00e0dfcb24281e27800000100076c3979ac40000bd15020078a1dfd300881a8365b1b16d7436"}, 0x80, &(0x7f0000447ff0), 0x0, &(0x7f00006e9c68)}, 0x0) 2018/04/11 12:45:51 executing program 6: r0 = socket$inet6(0xa, 0x80003, 0xff) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @ipv4={[], [0xff, 0xff], @dev={0xac, 0x14, 0x14, 0x1b}}}, 0x1c) sendmsg(r0, &(0x7f000001b000)={0x0, 0xfffffff5, &(0x7f0000019fa0), 0x105, &(0x7f000001ef08)}, 0x0) [ 650.295725] FAULT_INJECTION: forcing a failure. [ 650.295725] name failslab, interval 1, probability 0, space 0, times 0 [ 650.307206] CPU: 0 PID: 4447 Comm: syz-executor4 Not tainted 4.16.0+ #17 [ 650.314069] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 650.323435] Call Trace: [ 650.326044] dump_stack+0x1b9/0x294 [ 650.329701] ? dump_stack_print_info.cold.2+0x52/0x52 [ 650.334934] should_fail.cold.4+0xa/0x1a [ 650.339030] ? fault_create_debugfs_attr+0x1f0/0x1f0 2018/04/11 12:45:52 executing program 5: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000200)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc-cast5-avx\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00003bcfd0)="d3ab27191a", 0x5) sendmmsg$alg(r1, &(0x7f0000007e40)=[{0x0, 0x0, &(0x7f0000000900)}], 0x1, 0x0) [ 650.344158] ? save_stack+0x43/0xd0 [ 650.347804] ? kmem_cache_alloc_trace+0x152/0x780 [ 650.352667] ? __memcg_init_list_lru_node+0x17d/0x2c0 [ 650.357872] ? __list_lru_init+0x456/0x790 [ 650.362128] ? sget_userns+0x706/0xf20 [ 650.366033] ? graph_lock+0x170/0x170 [ 650.369856] ? vfs_kern_mount.part.34+0xd4/0x4d0 [ 650.374625] ? do_mount+0x564/0x3070 [ 650.378356] ? ksys_mount+0x12d/0x140 [ 650.382174] ? SyS_mount+0x35/0x50 [ 650.385735] ? do_syscall_64+0x29e/0x9d0 [ 650.389816] ? entry_SYSCALL_64_after_hwframe+0x42/0xb7 2018/04/11 12:45:52 executing program 0: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff7fffffffffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x1e, 0x1, 0x0) sendmsg(r0, &(0x7f0000030000)={&(0x7f00004f5000)=@generic={0x10000000001e, "0100000904000000000000000226cc573c080000003724c71e14dd6a739effea1b48006be61ffe0000e103000000f8000004003f010039d8f986ff01000300000004af50d50700000000000000e3ad316a1983000000001d00e0dfcb24281e27800000100076c3979ac40000bd15020078a1dfd300881a8365b1b16d7436"}, 0x80, &(0x7f0000447ff0), 0x0, &(0x7f00006e9c68)}, 0x0) [ 650.395202] ? find_held_lock+0x36/0x1c0 [ 650.399290] ? __lock_is_held+0xb5/0x140 [ 650.403393] ? check_same_owner+0x320/0x320 [ 650.407740] ? rcu_note_context_switch+0x710/0x710 [ 650.412701] __should_failslab+0x124/0x180 [ 650.416960] should_failslab+0x9/0x14 [ 650.420778] kmem_cache_alloc_trace+0x2cb/0x780 [ 650.425461] ? __kmalloc_node+0x33/0x70 [ 650.429443] ? __kmalloc_node+0x33/0x70 [ 650.433436] ? rcu_read_lock_sched_held+0x108/0x120 [ 650.438484] __memcg_init_list_lru_node+0x17d/0x2c0 2018/04/11 12:45:52 executing program 6: r0 = socket$inet6(0xa, 0x80003, 0xff) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @ipv4={[], [0xff, 0xff], @dev={0xac, 0x14, 0x14, 0x1b}}}, 0x1c) sendmsg(r0, &(0x7f000001b000)={0x0, 0xfffffff5, &(0x7f0000019fa0), 0xe6, &(0x7f000001ef08)}, 0x0) 2018/04/11 12:45:52 executing program 5: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000200)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc-cast5-avx\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) bind$nfc_llcp(r0, &(0x7f0000000100)={0x27, 0x1, 0x1, 0x5, 0x200, 0x4, "368ec7af5c973404fbc3e2a27dc179e2f99c2097d777221110aaa8b1f918526c966d435f4f4d18bd2865f9d60c1fa6b33082d7ea14e497966299144cae2cfb", 0x19}, 0x60) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00003bcfd0)="d3ab27191a", 0x5) pipe(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_inet_tcp_SIOCATMARK(r3, 0x8905, &(0x7f00000001c0)) sendmmsg$alg(r1, &(0x7f0000000340)=[{0x0, 0x0, &(0x7f0000000900)}], 0x1, 0x0) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r3, 0x6, 0x16, &(0x7f0000000280)=[{0x4, 0x7fffffff}, {0x8}, {0x3, 0x8c2}, {0x7, 0x7}, {0x3, 0xff}, {0x3, 0x80000001}, {0xa}, {0x4}], 0x8) ioctl$ION_IOC_HEAP_QUERY(r3, 0xc0184908, &(0x7f0000000300)={0x7, 0x1, 0x0, r2}) accept(r0, &(0x7f0000000040)=@pppol2tpv3in6, &(0x7f00000000c0)=0x80) ioctl$EVIOCREVOKE(r3, 0x40044591, &(0x7f00000002c0)=0xbcc) [ 650.443525] ? kvfree_rcu+0x20/0x20 [ 650.447167] ? __kmalloc_node+0x47/0x70 [ 650.451171] __list_lru_init+0x456/0x790 [ 650.455255] ? list_lru_destroy+0x4c0/0x4c0 [ 650.459591] ? mark_held_locks+0xc9/0x160 [ 650.463761] ? __raw_spin_lock_init+0x1c/0x100 [ 650.468360] ? trace_hardirqs_on_caller+0x421/0x5c0 [ 650.473393] ? lockdep_init_map+0x9/0x10 [ 650.477472] sget_userns+0x706/0xf20 [ 650.481192] ? kill_litter_super+0x90/0x90 [ 650.485445] ? ns_test_super+0x50/0x50 [ 650.489350] ? destroy_unused_super.part.9+0x100/0x100 [ 650.494640] ? do_raw_spin_trylock+0x1b0/0x1b0 [ 650.499241] ? kasan_check_write+0x14/0x20 [ 650.503493] ? do_raw_spin_lock+0xc1/0x200 [ 650.507751] ? blkdev_get+0xc0/0xb30 [ 650.511485] ? cap_capable+0x1f9/0x260 [ 650.515401] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 650.520950] ? security_capable+0x99/0xc0 [ 650.525116] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 650.530663] ? ns_capable_common+0x13f/0x170 [ 650.535095] ? kill_litter_super+0x90/0x90 [ 650.539338] sget+0x10b/0x150 [ 650.542458] ? ns_test_super+0x50/0x50 2018/04/11 12:45:52 executing program 2: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x1e, 0x1, 0x0) setsockopt$packet_tx_ring(r0, 0x10f, 0x87, &(0x7f0000b89fe4)=@req={0x772}, 0x10) sendmsg(r0, &(0x7f0000030000)={&(0x7f00004f5000)=@generic={0x10000000001e, "0100000900000000000000000226cc573c080000003724c71e14dd6a739effea1b48006be61ffe0000e103000000f8000004003f010039d8f986ff01000300000004af50d50700000000000000e3ad316a1983000000001d00e0dfcb24281e27800000100076c3979ac40000bd15020078a1dfd300881a8365b1b16d7436"}, 0x80, &(0x7f0000447ff0), 0x0, &(0x7f00006e9c68)}, 0x0) 2018/04/11 12:45:52 executing program 1: r0 = socket(0x1e, 0x1, 0x0) setsockopt$packet_tx_ring(r0, 0x10f, 0x87, &(0x7f0000b89fe4)=@req={0x772}, 0x10) sendmsg(r0, &(0x7f0000030000)={&(0x7f00004f5000)=@generic={0x10000000001e, "0014000900000000000000000226cc573c080000003724c71e14dd6a739effea1b48006be61ffe0000e103000003f8000004003f010039d8f986ff01000300000004af50d50700000000000000e3ad316a1983000000001d00e0dfcb24281e27800000100076c3979ac40000bd15020078a1dfd300881a8365b1b16d7436"}, 0x80, &(0x7f0000447ff0), 0x0, &(0x7f00006e9c68)}, 0x0) 2018/04/11 12:45:52 executing program 7: syz_emit_ethernet(0x66, &(0x7f0000000000)={@random="cd3997030f00", @empty=[0x0, 0x0, 0x0, 0x0, 0xfffff000], [], {@ipv6={0x86dd, {0x0, 0x6, "b40900", 0x30, 0x67, 0x0, @ipv4={[], [0xff, 0xff], @multicast2=0xe0000002}, @mcast2={0xff, 0x2, [], 0x1}, {[], @icmpv6=@time_exceed={0x21, 0x0, 0x0, 0x0, [], {0x0, 0x6, "b680fa", 0x0, 0x0, 0x0, @ipv4={[], [0xff, 0xff], @broadcast=0xffffffff}, @ipv4={[], [0xff, 0xff], @remote={0xac, 0x14, 0xffffffffffffffff, 0xbb}}}}}}}}}, 0x0) [ 650.546370] mount_bdev+0x111/0x3e0 [ 650.550012] ? fuse_get_root_inode+0x190/0x190 [ 650.554617] fuse_mount_blk+0x34/0x40 [ 650.558437] mount_fs+0xae/0x328 [ 650.561825] vfs_kern_mount.part.34+0xd4/0x4d0 [ 650.566424] ? may_umount+0xb0/0xb0 [ 650.570061] ? _raw_read_unlock+0x22/0x30 [ 650.574226] ? __get_fs_type+0x97/0xc0 [ 650.578135] do_mount+0x564/0x3070 [ 650.581700] ? copy_mount_string+0x40/0x40 [ 650.585943] ? trace_hardirqs_on_caller+0x421/0x5c0 [ 650.590971] ? trace_hardirqs_on_thunk+0x1a/0x1c 2018/04/11 12:45:52 executing program 5: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$l2tp(0x18, 0x1, 0x1) getsockopt(r0, 0x3, 0x80000000, &(0x7f0000000280)=""/177, &(0x7f0000000340)=0xb1) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000200)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc-cast5-avx\x00'}, 0x58) r2 = accept$alg(r1, 0x0, 0x0) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f00003bcfd0)="d3ab27191a", 0x5) sendmmsg$alg(r2, &(0x7f0000007e40)=[{0x0, 0x0, &(0x7f0000000900)}], 0x1, 0x0) r3 = syz_open_dev$admmidi(&(0x7f0000000380)='/dev/admmidi#\x00', 0x4, 0x101000) ioctl$TIOCLINUX3(r3, 0x541c, &(0x7f00000003c0)=0x3) accept(r1, &(0x7f0000000040)=@pppol2tpv3in6, &(0x7f00000000c0)=0x80) sendto(r1, &(0x7f0000000100)="97f3e0f42a1450319076e8aed79a65a99315709ea5a461609a27cd9bb6a4e90501d48271ac9e41ff21053d3965eda56da446d44bc9a9e8f3ff422bd57efa7a38f5e698d83d733b955329cf07b365afe621834284e24a728cda64ef3cdc8a06a87f718cf715fceddec782db62eb19cdfd42d56b39e96e36a610f8d3987d1300", 0x7f, 0x0, &(0x7f0000000180)=@nfc={0x27, 0x1, 0x1, 0x3}, 0x80) [ 650.595750] ? retint_kernel+0x10/0x10 [ 650.599670] ? copy_mount_options+0x1f0/0x380 [ 650.604178] ? copy_mount_options+0x202/0x380 [ 650.608689] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 650.614236] ? copy_mount_options+0x285/0x380 [ 650.618753] ksys_mount+0x12d/0x140 [ 650.622399] SyS_mount+0x35/0x50 [ 650.625776] ? ksys_mount+0x140/0x140 [ 650.629597] do_syscall_64+0x29e/0x9d0 [ 650.633493] ? vmalloc_sync_all+0x30/0x30 [ 650.637653] ? _raw_spin_unlock_irq+0x27/0x70 [ 650.642161] ? finish_task_switch+0x1ca/0x820 2018/04/11 12:45:52 executing program 7: syz_emit_ethernet(0x66, &(0x7f0000000000)={@random="cd3997030f00", @empty=[0x0, 0x0, 0x0, 0x0, 0x43050000], [], {@ipv6={0x86dd, {0x0, 0x6, "b40900", 0x30, 0x67, 0x0, @ipv4={[], [0xff, 0xff], @multicast2=0xe0000002}, @mcast2={0xff, 0x2, [], 0x1}, {[], @icmpv6=@time_exceed={0x21, 0x0, 0x0, 0x0, [], {0x0, 0x6, "b680fa", 0x0, 0x0, 0x0, @ipv4={[], [0xff, 0xff], @broadcast=0xffffffff}, @ipv4={[], [0xff, 0xff], @remote={0xac, 0x14, 0xffffffffffffffff, 0xbb}}}}}}}}}, 0x0) [ 650.646677] ? syscall_return_slowpath+0x5c0/0x5c0 [ 650.651629] ? syscall_return_slowpath+0x30f/0x5c0 [ 650.656580] ? entry_SYSCALL_64_after_hwframe+0x52/0xb7 [ 650.661970] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 650.666838] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 650.672038] RIP: 0033:0x455259 [ 650.675238] RSP: 002b:00007f95e4cadb08 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 650.682965] RAX: ffffffffffffffda RBX: 0000000000000015 RCX: 0000000000455259 [ 650.690240] RDX: 00000000004b9bc5 RSI: 0000000020000040 RDI: 0000000020000000 [ 650.697522] RBP: 0000000020000000 R08: 00007f95e4cadb20 R09: 0000000000000000 [ 650.704798] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 650.712079] R13: 0000000000000000 R14: 0000000000000000 R15: 0000000000000000 2018/04/11 12:45:52 executing program 6: r0 = socket$inet6(0xa, 0x80003, 0xff) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @ipv4={[], [0xff, 0xff], @dev={0xac, 0x14, 0x14, 0x1b}}}, 0x1c) sendmsg(r0, &(0x7f000001b000)={0x0, 0xfffffff5, &(0x7f0000019fa0), 0x9, &(0x7f000001ef08)}, 0x0) 2018/04/11 12:45:52 executing program 1: r0 = socket(0x1e, 0x1, 0x0) setsockopt$packet_tx_ring(r0, 0x10f, 0x87, &(0x7f0000b89fe4)=@req={0x772}, 0x10) sendmsg(r0, &(0x7f0000030000)={&(0x7f00004f5000)=@generic={0x10000000001e, "0014000900000000000000000226cc573c080000003724c71e14dd6a739effea1b48006be61ffe0000e103000200f8000004003f010039d8f986ff01000300000004af50d50700000000000000e3ad316a1983000000001d00e0dfcb24281e27800000100076c3979ac40000bd15020078a1dfd300881a8365b1b16d7436"}, 0x80, &(0x7f0000447ff0), 0x0, &(0x7f00006e9c68)}, 0x0) 2018/04/11 12:45:52 executing program 7: syz_emit_ethernet(0x66, &(0x7f0000000000)={@random="cd3997030f00", @empty=[0x0, 0x0, 0x0, 0x0, 0xf000], [], {@ipv6={0x86dd, {0x0, 0x6, "b40900", 0x30, 0x67, 0x0, @ipv4={[], [0xff, 0xff], @multicast2=0xe0000002}, @mcast2={0xff, 0x2, [], 0x1}, {[], @icmpv6=@time_exceed={0x21, 0x0, 0x0, 0x0, [], {0x0, 0x6, "b680fa", 0x0, 0x0, 0x0, @ipv4={[], [0xff, 0xff], @broadcast=0xffffffff}, @ipv4={[], [0xff, 0xff], @remote={0xac, 0x14, 0xffffffffffffffff, 0xbb}}}}}}}}}, 0x0) 2018/04/11 12:45:52 executing program 5: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000200)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc-cast5-avx\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000280)="12cd8b5d0943f811a8067576ad3ffaee5082786d8100000000000000aa94c620fd33de6388757a0000000000", 0x28fa) r2 = syz_open_dev$adsp(&(0x7f0000000100)='/dev/adsp#\x00', 0x140, 0x80600) recvfrom$ax25(r2, &(0x7f00000005c0)=""/38, 0x26, 0x60, &(0x7f0000000180)={0x3, {"39b80cf6d5b0be"}, 0x2}, 0x10) sendmmsg$alg(r1, &(0x7f0000007e40), 0x0, 0x0) accept(r0, &(0x7f0000000040)=@pppol2tpv3in6, &(0x7f00000000c0)=0x80) ioctl$TIOCSBRK(r2, 0x5427) connect$netlink(r2, &(0x7f00000001c0)=@kern={0x10, 0x0, 0x0, 0x10000020}, 0xc) fstatfs(r2, &(0x7f00000002c0)=""/215) syz_mount_image$hfs(&(0x7f00000003c0)='hfs\x00', &(0x7f0000000400)='./file0\x00', 0x8, 0x2, &(0x7f0000000540)=[{&(0x7f0000000440)="6fa7c9276edd5caf067d163bb473d0c4edc8243fcf9bba04152fceb891351984c13db6722af7b7ae959f7cce5e71de76c85f4d540de9bb4bd1ec96142d119271b852d6653d250c59812cbc918f0fdcc7eac2288e2f9919599e03019f88d4c62dd5e04ed5cbee33a1ff19e89a594b589434d49924da7d6053ffac53e0e4a5e32a7503b74c1879e36464d2e24e90508c146e8f413bb90c92b873d2beda7d7cb4c467", 0xa1, 0x3}, {&(0x7f0000000500)="f990", 0x2}], 0x880, &(0x7f0000000580)={[{@uid={'uid', 0x3d, [0x32, 0x0, 0x34]}, 0x2c}]}) 2018/04/11 12:45:52 executing program 0: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff7fffffffffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x1e, 0x1, 0x0) sendmsg(r0, &(0x7f0000030000)={&(0x7f00004f5000)=@generic={0x10000000001e, "01000009d0010100000000000226cc573c080000003724c71e14dd6a739effea1b48006be61ffe0000e103000000f8000004003f010039d8f986ff01000300000004af50d50700000000000000e3ad316a1983000000001d00e0dfcb24281e27800000100076c3979ac40000bd15020078a1dfd300881a8365b1b16d7436"}, 0x80, &(0x7f0000447ff0), 0x0, &(0x7f00006e9c68)}, 0x0) 2018/04/11 12:45:52 executing program 2: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x1e, 0x1, 0x0) setsockopt$packet_tx_ring(r0, 0x10f, 0x87, &(0x7f0000b89fe4)=@req={0x772}, 0x10) sendmsg(r0, &(0x7f0000030000)={&(0x7f00004f5000)=@generic={0x10000000001e, "0100000900000000000000000226cc573c080000003724c71e14dd6a739effea1b48006be61ffe0000e103000000f8000004003f010039d8f986ff01000300000004af50d50700000000000000e3ad316a1983000000001d00e0dfcb24281e27800000100076c3979ac40000bd15020078a1dfd300881a8365b1b16d7436"}, 0x80, &(0x7f0000447ff0), 0x0, &(0x7f00006e9c68)}, 0x0) 2018/04/11 12:45:52 executing program 3: r0 = semget(0x1, 0x4, 0x4) semop(r0, &(0x7f0000000000), 0x0) timer_create(0x0, &(0x7f0000cd0000)={0x0, 0x12}, &(0x7f0000044000)) timer_settime(0x0, 0x0, &(0x7f00004b1fe0)={{0x0, 0x1c9c380}, {0x0, 0x9}}, &(0x7f0000040000)) tkill(0x0, 0x1000000000016) 2018/04/11 12:45:52 executing program 4 (fault-call:1 fault-nth:37): perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_fuseblk_mount(&(0x7f0000000040)='./file0\x00', &(0x7f0000000000)='./file0\x00', 0x4000, 0x0, 0x0, 0x0, 0x0, 0x0) [ 651.240126] FAULT_INJECTION: forcing a failure. [ 651.240126] name failslab, interval 1, probability 0, space 0, times 0 [ 651.242495] hfs: can't find a HFS filesystem on dev loop5 [ 651.251443] CPU: 0 PID: 4518 Comm: syz-executor4 Not tainted 4.16.0+ #17 [ 651.263762] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 651.273122] Call Trace: [ 651.275721] dump_stack+0x1b9/0x294 [ 651.279378] ? dump_stack_print_info.cold.2+0x52/0x52 [ 651.284610] should_fail.cold.4+0xa/0x1a [ 651.288698] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 651.293823] ? save_stack+0x43/0xd0 [ 651.297467] ? kmem_cache_alloc_trace+0x152/0x780 [ 651.302331] ? __memcg_init_list_lru_node+0x17d/0x2c0 [ 651.307533] ? __list_lru_init+0x456/0x790 [ 651.311785] ? sget_userns+0x706/0xf20 [ 651.315689] ? graph_lock+0x170/0x170 [ 651.319507] ? vfs_kern_mount.part.34+0xd4/0x4d0 [ 651.324278] ? do_mount+0x564/0x3070 [ 651.328004] ? ksys_mount+0x12d/0x140 [ 651.331828] ? SyS_mount+0x35/0x50 [ 651.335382] ? do_syscall_64+0x29e/0x9d0 [ 651.339636] ? entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 651.345040] ? find_held_lock+0x36/0x1c0 [ 651.349124] ? __lock_is_held+0xb5/0x140 [ 651.353220] ? check_same_owner+0x320/0x320 [ 651.357564] ? rcu_note_context_switch+0x710/0x710 [ 651.362519] __should_failslab+0x124/0x180 [ 651.366771] should_failslab+0x9/0x14 [ 651.370578] kmem_cache_alloc_trace+0x2cb/0x780 [ 651.375259] ? __kmalloc_node+0x33/0x70 [ 651.379243] ? __kmalloc_node+0x33/0x70 [ 651.383234] ? rcu_read_lock_sched_held+0x108/0x120 2018/04/11 12:45:52 executing program 7: syz_emit_ethernet(0x66, &(0x7f0000000000)={@random="cd3997030f00", @empty=[0x0, 0x0, 0x0, 0x0, 0x800e], [], {@ipv6={0x86dd, {0x0, 0x6, "b40900", 0x30, 0x67, 0x0, @ipv4={[], [0xff, 0xff], @multicast2=0xe0000002}, @mcast2={0xff, 0x2, [], 0x1}, {[], @icmpv6=@time_exceed={0x21, 0x0, 0x0, 0x0, [], {0x0, 0x6, "b680fa", 0x0, 0x0, 0x0, @ipv4={[], [0xff, 0xff], @broadcast=0xffffffff}, @ipv4={[], [0xff, 0xff], @remote={0xac, 0x14, 0xffffffffffffffff, 0xbb}}}}}}}}}, 0x0) 2018/04/11 12:45:52 executing program 1: r0 = socket(0x1e, 0x1, 0x0) setsockopt$packet_tx_ring(r0, 0x10f, 0x87, &(0x7f0000b89fe4)=@req={0x772}, 0x10) sendmsg(r0, &(0x7f0000030000)={&(0x7f00004f5000)=@generic={0x10000000001e, "0014000900000000000000000226cc573c080000003724c71e14dd6a739effea1b48006be61ffe0000e103000002f8000004003f010039d8f986ff01000300000004af50d50700000000000000e3ad316a1983000000001d00e0dfcb24281e27800000100076c3979ac40000bd15020078a1dfd300881a8365b1b16d7436"}, 0x80, &(0x7f0000447ff0), 0x0, &(0x7f00006e9c68)}, 0x0) 2018/04/11 12:45:52 executing program 6: r0 = socket$inet6(0xa, 0x80003, 0xff) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @ipv4={[], [0xff, 0xff], @dev={0xac, 0x14, 0x14, 0x1b}}}, 0x1c) sendmsg(r0, &(0x7f000001b000)={0x0, 0xfffffff5, &(0x7f0000019fa0), 0x11b, &(0x7f000001ef08)}, 0x0) 2018/04/11 12:45:53 executing program 6: r0 = socket$inet6(0xa, 0x80003, 0xff) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @ipv4={[], [0xff, 0xff], @dev={0xac, 0x14, 0x14, 0x1b}}}, 0x1c) sendmsg(r0, &(0x7f000001b000)={0x0, 0xfffffff5, &(0x7f0000019fa0), 0x170, &(0x7f000001ef08)}, 0x0) [ 651.388272] __memcg_init_list_lru_node+0x17d/0x2c0 [ 651.393311] ? kvfree_rcu+0x20/0x20 [ 651.396954] ? __kmalloc_node+0x47/0x70 [ 651.400960] __list_lru_init+0x456/0x790 [ 651.405054] ? list_lru_destroy+0x4c0/0x4c0 [ 651.409390] ? mark_held_locks+0xc9/0x160 [ 651.413555] ? __raw_spin_lock_init+0x1c/0x100 [ 651.418153] ? trace_hardirqs_on_caller+0x421/0x5c0 [ 651.423192] ? lockdep_init_map+0x9/0x10 [ 651.427275] sget_userns+0x706/0xf20 [ 651.430996] ? kill_litter_super+0x90/0x90 [ 651.435263] ? ns_test_super+0x50/0x50 [ 651.439167] ? destroy_unused_super.part.9+0x100/0x100 [ 651.444456] ? do_raw_spin_trylock+0x1b0/0x1b0 [ 651.449059] ? kasan_check_write+0x14/0x20 [ 651.453302] ? do_raw_spin_lock+0xc1/0x200 [ 651.457560] ? blkdev_get+0xc0/0xb30 [ 651.461298] ? cap_capable+0x1f9/0x260 [ 651.465214] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 651.470766] ? security_capable+0x99/0xc0 [ 651.474938] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 651.480489] ? ns_capable_common+0x13f/0x170 [ 651.484915] ? kill_litter_super+0x90/0x90 [ 651.489159] sget+0x10b/0x150 [ 651.492278] ? ns_test_super+0x50/0x50 [ 651.496186] mount_bdev+0x111/0x3e0 [ 651.499828] ? fuse_get_root_inode+0x190/0x190 [ 651.504432] fuse_mount_blk+0x34/0x40 [ 651.508249] mount_fs+0xae/0x328 [ 651.511639] vfs_kern_mount.part.34+0xd4/0x4d0 [ 651.516242] ? may_umount+0xb0/0xb0 [ 651.519880] ? _raw_read_unlock+0x22/0x30 [ 651.524046] ? __get_fs_type+0x97/0xc0 [ 651.527956] do_mount+0x564/0x3070 [ 651.531523] ? copy_mount_string+0x40/0x40 [ 651.535770] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 651.540551] ? retint_kernel+0x10/0x10 [ 651.544478] ? __sanitizer_cov_trace_const_cmp4+0x5/0x20 [ 651.549947] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 651.555493] ? copy_mount_options+0x285/0x380 [ 651.560008] ksys_mount+0x12d/0x140 [ 651.563653] SyS_mount+0x35/0x50 [ 651.567047] ? ksys_mount+0x140/0x140 [ 651.570870] do_syscall_64+0x29e/0x9d0 [ 651.574769] ? vmalloc_sync_all+0x30/0x30 [ 651.578928] ? _raw_spin_unlock_irq+0x27/0x70 [ 651.583438] ? finish_task_switch+0x1ca/0x820 [ 651.587955] ? syscall_return_slowpath+0x5c0/0x5c0 [ 651.592901] ? syscall_return_slowpath+0x30f/0x5c0 [ 651.597836] ? entry_SYSCALL_64_after_hwframe+0x52/0xb7 [ 651.603191] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 651.608040] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 651.613213] RIP: 0033:0x455259 [ 651.616383] RSP: 002b:00007f95e4cadb08 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 651.624084] RAX: ffffffffffffffda RBX: 0000000000000015 RCX: 0000000000455259 [ 651.631336] RDX: 00000000004b9bc5 RSI: 0000000020000040 RDI: 0000000020000000 [ 651.638588] RBP: 0000000020000000 R08: 00007f95e4cadb20 R09: 0000000000000000 [ 651.645842] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 651.653100] R13: 0000000000000000 R14: 0000000000000000 R15: 0000000000000000 2018/04/11 12:45:53 executing program 1: r0 = socket(0x1e, 0x1, 0x0) setsockopt$packet_tx_ring(r0, 0x10f, 0x87, &(0x7f0000b89fe4)=@req={0x772}, 0x10) sendmsg(r0, &(0x7f0000030000)={&(0x7f00004f5000)=@generic={0x10000000001e, "0014000900000000000000000226cc573c080000003724c71e14dd6a739effea1b48006be61ffe0000e103000003f8000004003f010039d8f986ff01000300000004af50d50700000000000000e3ad316a1983000000001d00e0dfcb24281e27800000100076c3979ac40000bd15020078a1dfd300881a8365b1b16d7436"}, 0x80, &(0x7f0000447ff0), 0x0, &(0x7f00006e9c68)}, 0x0) 2018/04/11 12:45:53 executing program 6: r0 = socket$inet6(0xa, 0x80003, 0xff) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @ipv4={[], [0xff, 0xff], @dev={0xac, 0x14, 0x14, 0x1b}}}, 0x1c) sendmsg(r0, &(0x7f000001b000)={0x0, 0xfffffff5, &(0x7f0000019fa0), 0xf1, &(0x7f000001ef08)}, 0x0) 2018/04/11 12:45:53 executing program 2: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x1e, 0x1, 0x0) setsockopt$packet_tx_ring(r0, 0x10f, 0x87, &(0x7f0000b89fe4)=@req={0x772}, 0x10) sendmsg(r0, &(0x7f0000030000)={&(0x7f00004f5000)=@generic={0x10000000001e, "0100000900000000000000000226cc573c080000003724c71e14dd6a739effea1b48006be61ffe0000e103000000f8000004003f010039d8f986ff01000300000004af50d50700000000000000e3ad316a1983000000001d00e0dfcb24281e27800000100076c3979ac40000bd15020078a1dfd300881a8365b1b16d7436"}, 0x80, &(0x7f0000447ff0), 0x0, &(0x7f00006e9c68)}, 0x0) 2018/04/11 12:45:53 executing program 0: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff7fffffffffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x1e, 0x1, 0x0) sendmsg(r0, &(0x7f0000030000)={&(0x7f00004f5000)=@generic={0x10000000001e, "0100000900000000000004000226cc573c080000003724c71e14dd6a739effea1b48006be61ffe0000e103000000f8000004003f010039d8f986ff01000300000004af50d50700000000000000e3ad316a1983000000001d00e0dfcb24281e27800000100076c3979ac40000bd15020078a1dfd300881a8365b1b16d7436"}, 0x80, &(0x7f0000447ff0), 0x0, &(0x7f00006e9c68)}, 0x0) 2018/04/11 12:45:53 executing program 7: syz_emit_ethernet(0x66, &(0x7f0000000000)={@random="cd3997030f00", @empty=[0x0, 0x0, 0x0, 0x0, 0x5], [], {@ipv6={0x86dd, {0x0, 0x6, "b40900", 0x30, 0x67, 0x0, @ipv4={[], [0xff, 0xff], @multicast2=0xe0000002}, @mcast2={0xff, 0x2, [], 0x1}, {[], @icmpv6=@time_exceed={0x21, 0x0, 0x0, 0x0, [], {0x0, 0x6, "b680fa", 0x0, 0x0, 0x0, @ipv4={[], [0xff, 0xff], @broadcast=0xffffffff}, @ipv4={[], [0xff, 0xff], @remote={0xac, 0x14, 0xffffffffffffffff, 0xbb}}}}}}}}}, 0x0) 2018/04/11 12:45:53 executing program 5: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000200)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc-cast5-avx\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00003bcfd0)="d3ab27191a", 0x5) sendmmsg$alg(r1, &(0x7f0000007e40)=[{0x0, 0x0, &(0x7f0000000900)}], 0x1, 0x0) accept(r0, &(0x7f0000000040)=@pppol2tpv3in6, &(0x7f00000000c0)=0x80) keyctl$set_reqkey_keyring(0xe, 0x7) 2018/04/11 12:45:53 executing program 3: semop(0x0, &(0x7f000001a000)=[{0x0, 0xffffffffffff0001}, {}], 0x2) timer_create(0x0, &(0x7f0000cd0000)={0x0, 0x12}, &(0x7f0000044000)) timer_settime(0x0, 0x0, &(0x7f00004b1fe0)={{0x0, 0x1c9c380}, {0x0, 0x9}}, &(0x7f0000040000)) r0 = getpgrp(0xffffffffffffffff) sched_getattr(r0, &(0x7f0000000000), 0x30, 0x0) r1 = getpgid(0x0) tkill(r1, 0x1000000000016) 2018/04/11 12:45:53 executing program 4 (fault-call:1 fault-nth:38): perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_fuseblk_mount(&(0x7f0000000040)='./file0\x00', &(0x7f0000000000)='./file0\x00', 0x4000, 0x0, 0x0, 0x0, 0x0, 0x0) [ 651.683664] hfs: can't find a HFS filesystem on dev loop5 [ 651.764279] FAULT_INJECTION: forcing a failure. [ 651.764279] name failslab, interval 1, probability 0, space 0, times 0 [ 651.775669] CPU: 0 PID: 4550 Comm: syz-executor4 Not tainted 4.16.0+ #17 [ 651.782519] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 651.791879] Call Trace: [ 651.794485] dump_stack+0x1b9/0x294 [ 651.798142] ? dump_stack_print_info.cold.2+0x52/0x52 [ 651.803372] should_fail.cold.4+0xa/0x1a [ 651.807459] ? fault_create_debugfs_attr+0x1f0/0x1f0 2018/04/11 12:45:53 executing program 6: r0 = socket$inet6(0xa, 0x80003, 0xff) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @ipv4={[], [0xff, 0xff], @dev={0xac, 0x14, 0x14, 0x1b}}}, 0x1c) sendmsg(r0, &(0x7f000001b000)={0x0, 0xfffffff5, &(0x7f0000019fa0), 0x2b, &(0x7f000001ef08)}, 0x0) 2018/04/11 12:45:53 executing program 0: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff7fffffffffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x1e, 0x1, 0x0) sendmsg(r0, &(0x7f0000030000)={&(0x7f00004f5000)=@generic={0x10000000001e, "0100000900000000000101d00226cc573c080000003724c71e14dd6a739effea1b48006be61ffe0000e103000000f8000004003f010039d8f986ff01000300000004af50d50700000000000000e3ad316a1983000000001d00e0dfcb24281e27800000100076c3979ac40000bd15020078a1dfd300881a8365b1b16d7436"}, 0x80, &(0x7f0000447ff0), 0x0, &(0x7f00006e9c68)}, 0x0) 2018/04/11 12:45:53 executing program 1: r0 = socket(0x1e, 0x1, 0x0) setsockopt$packet_tx_ring(r0, 0x10f, 0x87, &(0x7f0000b89fe4)=@req={0x772}, 0x10) sendmsg(r0, &(0x7f0000030000)={&(0x7f00004f5000)=@generic={0x10000000001e, "0014000900000000000000000226cc573c080000003724c71e14dd6a739effea1b48006be61ffe0000e103000000f8030004003f010039d8f986ff01000300000004af50d50700000000000000e3ad316a1983000000001d00e0dfcb24281e27800000100076c3979ac40000bd15020078a1dfd300881a8365b1b16d7436"}, 0x80, &(0x7f0000447ff0), 0x0, &(0x7f00006e9c68)}, 0x0) 2018/04/11 12:45:53 executing program 2: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x1e, 0x1, 0x0) setsockopt$packet_tx_ring(r0, 0x10f, 0x87, &(0x7f0000b89fe4)=@req={0x772}, 0x10) sendmsg(r0, &(0x7f0000030000)={&(0x7f00004f5000)=@generic={0x10000000001e, "0100000900000000000000000226cc573c080000003724c71e14dd6a739effea1b48006be61ffe0000e103000000f8000004003f010039d8f986ff01000300000004af50d50700000000000000e3ad316a1983000000001d00e0dfcb24281e27800000100076c3979ac40000bd15020078a1dfd300881a8365b1b16d7436"}, 0x80, &(0x7f0000447ff0), 0x0, &(0x7f00006e9c68)}, 0x0) [ 651.812577] ? save_stack+0x43/0xd0 [ 651.816217] ? kmem_cache_alloc_trace+0x152/0x780 [ 651.821076] ? __memcg_init_list_lru_node+0x17d/0x2c0 [ 651.826279] ? __list_lru_init+0x456/0x790 [ 651.830530] ? sget_userns+0x706/0xf20 [ 651.834436] ? graph_lock+0x170/0x170 [ 651.838256] ? vfs_kern_mount.part.34+0xd4/0x4d0 [ 651.843030] ? do_mount+0x564/0x3070 [ 651.846758] ? ksys_mount+0x12d/0x140 [ 651.850578] ? SyS_mount+0x35/0x50 [ 651.854137] ? do_syscall_64+0x29e/0x9d0 [ 651.858215] ? entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 651.863603] ? find_held_lock+0x36/0x1c0 [ 651.867690] ? __lock_is_held+0xb5/0x140 [ 651.871791] ? check_same_owner+0x320/0x320 [ 651.876138] ? rcu_note_context_switch+0x710/0x710 [ 651.881097] __should_failslab+0x124/0x180 [ 651.885353] should_failslab+0x9/0x14 [ 651.889168] kmem_cache_alloc_trace+0x2cb/0x780 [ 651.893851] ? __kmalloc_node+0x33/0x70 [ 651.897841] ? __kmalloc_node+0x33/0x70 [ 651.901838] ? rcu_read_lock_sched_held+0x108/0x120 [ 651.906885] __memcg_init_list_lru_node+0x17d/0x2c0 2018/04/11 12:45:53 executing program 6: r0 = socket$inet6(0xa, 0x80003, 0xff) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @ipv4={[], [0xff, 0xff], @dev={0xac, 0x14, 0x14, 0x1b}}}, 0x1c) sendmsg(r0, &(0x7f000001b000)={0x0, 0xfffffff5, &(0x7f0000019fa0), 0xdb, &(0x7f000001ef08)}, 0x0) [ 651.911928] ? kvfree_rcu+0x20/0x20 [ 651.915584] ? __kmalloc_node+0x47/0x70 [ 651.919580] __list_lru_init+0x456/0x790 [ 651.923665] ? list_lru_destroy+0x4c0/0x4c0 [ 651.928006] ? mark_held_locks+0xc9/0x160 [ 651.932174] ? __raw_spin_lock_init+0x1c/0x100 [ 651.936770] ? trace_hardirqs_on_caller+0x421/0x5c0 [ 651.941805] ? lockdep_init_map+0x9/0x10 [ 651.945881] sget_userns+0x706/0xf20 [ 651.949607] ? kill_litter_super+0x90/0x90 [ 651.953864] ? ns_test_super+0x50/0x50 [ 651.957772] ? destroy_unused_super.part.9+0x100/0x100 2018/04/11 12:45:53 executing program 0: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff7fffffffffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x1e, 0x1, 0x0) sendmsg(r0, &(0x7f0000030000)={&(0x7f00004f5000)=@generic={0x10000000001e, "01000009000000007fffffff0226cc573c080000003724c71e14dd6a739effea1b48006be61ffe0000e103000000f8000004003f010039d8f986ff01000300000004af50d50700000000000000e3ad316a1983000000001d00e0dfcb24281e27800000100076c3979ac40000bd15020078a1dfd300881a8365b1b16d7436"}, 0x80, &(0x7f0000447ff0), 0x0, &(0x7f00006e9c68)}, 0x0) 2018/04/11 12:45:53 executing program 1: r0 = socket(0x1e, 0x1, 0x0) setsockopt$packet_tx_ring(r0, 0x10f, 0x87, &(0x7f0000b89fe4)=@req={0x772}, 0x10) sendmsg(r0, &(0x7f0000030000)={&(0x7f00004f5000)=@generic={0x10000000001e, "0014000900000000000000000226cc573c080000003724c71e14dd6a739effea1b48006be61ffe0000e103000000f8000304003f010039d8f986ff01000300000004af50d50700000000000000e3ad316a1983000000001d00e0dfcb24281e27800000100076c3979ac40000bd15020078a1dfd300881a8365b1b16d7436"}, 0x80, &(0x7f0000447ff0), 0x0, &(0x7f00006e9c68)}, 0x0) 2018/04/11 12:45:53 executing program 2: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x1e, 0x1, 0x0) setsockopt$packet_tx_ring(r0, 0x10f, 0x87, &(0x7f0000b89fe4)=@req={0x772}, 0x10) sendmsg(r0, &(0x7f0000030000)={&(0x7f00004f5000)=@generic={0x10000000001e, "0100000900000000000000000226cc573c080000003724c71e14dd6a739effea1b48006be61ffe0000e103000000f8000004003f010039d8f986ff01000300000004af50d50700000000000000e3ad316a1983000000001d00e0dfcb24281e27800000100076c3979ac40000bd15020078a1dfd300881a8365b1b16d7436"}, 0x80, &(0x7f0000447ff0), 0x0, &(0x7f00006e9c68)}, 0x0) [ 651.963071] ? do_raw_spin_trylock+0x1b0/0x1b0 [ 651.967674] ? kasan_check_write+0x14/0x20 [ 651.971922] ? do_raw_spin_lock+0xc1/0x200 [ 651.976183] ? blkdev_get+0xc0/0xb30 [ 651.979922] ? cap_capable+0x1f9/0x260 [ 651.983835] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 651.989381] ? security_capable+0x99/0xc0 [ 651.993548] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 651.999097] ? ns_capable_common+0x13f/0x170 [ 652.003524] ? kill_litter_super+0x90/0x90 [ 652.007775] sget+0x10b/0x150 [ 652.010894] ? ns_test_super+0x50/0x50 [ 652.014809] mount_bdev+0x111/0x3e0 [ 652.018452] ? fuse_get_root_inode+0x190/0x190 [ 652.023066] fuse_mount_blk+0x34/0x40 [ 652.026893] mount_fs+0xae/0x328 [ 652.030285] vfs_kern_mount.part.34+0xd4/0x4d0 [ 652.034889] ? may_umount+0xb0/0xb0 [ 652.038532] ? _raw_read_unlock+0x22/0x30 [ 652.042698] ? __get_fs_type+0x97/0xc0 [ 652.046602] do_mount+0x564/0x3070 [ 652.050156] ? copy_mount_string+0x40/0x40 [ 652.054412] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 652.059191] ? retint_kernel+0x10/0x10 2018/04/11 12:45:53 executing program 6: r0 = socket$inet6(0xa, 0x80003, 0xff) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @ipv4={[], [0xff, 0xff], @dev={0xac, 0x14, 0x14, 0x1b}}}, 0x1c) sendmsg(r0, &(0x7f000001b000)={0x0, 0xfffffff5, &(0x7f0000019fa0), 0x12b, &(0x7f000001ef08)}, 0x0) [ 652.063107] ? copy_mount_options+0x1a1/0x380 [ 652.067620] ? __sanitizer_cov_trace_pc+0x48/0x50 [ 652.072483] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 652.078033] ? copy_mount_options+0x285/0x380 [ 652.082552] ksys_mount+0x12d/0x140 [ 652.086197] SyS_mount+0x35/0x50 [ 652.089572] ? ksys_mount+0x140/0x140 [ 652.093389] do_syscall_64+0x29e/0x9d0 [ 652.097286] ? vmalloc_sync_all+0x30/0x30 [ 652.101441] ? _raw_spin_unlock_irq+0x27/0x70 [ 652.106300] ? finish_task_switch+0x1ca/0x820 [ 652.110810] ? syscall_return_slowpath+0x5c0/0x5c0 [ 652.116106] ? syscall_return_slowpath+0x30f/0x5c0 [ 652.121716] ? entry_SYSCALL_64_after_hwframe+0x52/0xb7 [ 652.127102] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 652.131978] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 652.137173] RIP: 0033:0x455259 [ 652.140370] RSP: 002b:00007f95e4cadb08 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 652.148095] RAX: ffffffffffffffda RBX: 0000000000000015 RCX: 0000000000455259 [ 652.155376] RDX: 00000000004b9bc5 RSI: 0000000020000040 RDI: 0000000020000000 [ 652.162653] RBP: 0000000020000000 R08: 00007f95e4cadb20 R09: 0000000000000000 [ 652.169936] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 652.177217] R13: 0000000000000000 R14: 0000000000000000 R15: 0000000000000000 2018/04/11 12:45:54 executing program 0: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff7fffffffffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x1e, 0x1, 0x0) sendmsg(r0, &(0x7f0000030000)={&(0x7f00004f5000)=@generic={0x10000000001e, "0100000900000400000000000226cc573c080000003724c71e14dd6a739effea1b48006be61ffe0000e103000000f8000004003f010039d8f986ff01000300000004af50d50700000000000000e3ad316a1983000000001d00e0dfcb24281e27800000100076c3979ac40000bd15020078a1dfd300881a8365b1b16d7436"}, 0x80, &(0x7f0000447ff0), 0x0, &(0x7f00006e9c68)}, 0x0) 2018/04/11 12:45:54 executing program 1: r0 = socket(0x1e, 0x1, 0x0) setsockopt$packet_tx_ring(r0, 0x10f, 0x87, &(0x7f0000b89fe4)=@req={0x772}, 0x10) sendmsg(r0, &(0x7f0000030000)={&(0x7f00004f5000)=@generic={0x10000000001e, "0014000900000000000000000226cc573c080000003724c71e14dd6a739effea1b48006be61ffe0000e103000000f8040004003f010039d8f986ff01000300000004af50d50700000000000000e3ad316a1983000000001d00e0dfcb24281e27800000100076c3979ac40000bd15020078a1dfd300881a8365b1b16d7436"}, 0x80, &(0x7f0000447ff0), 0x0, &(0x7f00006e9c68)}, 0x0) 2018/04/11 12:45:54 executing program 2: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x1e, 0x1, 0x0) setsockopt$packet_tx_ring(r0, 0x10f, 0x87, &(0x7f0000b89fe4)=@req={0x772}, 0x10) sendmsg(r0, &(0x7f0000030000)={&(0x7f00004f5000)=@generic={0x10000000001e, "0100000900000000000000000226cc573c080000003724c71e14dd6a739effea1b48006be61ffe0000e103000000f8000004003f010039d8f986ff01000300000004af50d50700000000000000e3ad316a1983000000001d00e0dfcb24281e27800000100076c3979ac40000bd15020078a1dfd300881a8365b1b16d7436"}, 0x80, &(0x7f0000447ff0), 0x0, &(0x7f00006e9c68)}, 0x0) 2018/04/11 12:45:54 executing program 6: r0 = socket$inet6(0xa, 0x80003, 0xff) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @ipv4={[], [0xff, 0xff], @dev={0xac, 0x14, 0x14, 0x1b}}}, 0x1c) sendmsg(r0, &(0x7f000001b000)={0x0, 0xfffffff5, &(0x7f0000019fa0), 0xf9, &(0x7f000001ef08)}, 0x0) 2018/04/11 12:45:54 executing program 7: syz_emit_ethernet(0x66, &(0x7f0000000000)={@random="cd3997030f00", @empty=[0x0, 0x0, 0x0, 0x0, 0x4305000000000000], [], {@ipv6={0x86dd, {0x0, 0x6, "b40900", 0x30, 0x67, 0x0, @ipv4={[], [0xff, 0xff], @multicast2=0xe0000002}, @mcast2={0xff, 0x2, [], 0x1}, {[], @icmpv6=@time_exceed={0x21, 0x0, 0x0, 0x0, [], {0x0, 0x6, "b680fa", 0x0, 0x0, 0x0, @ipv4={[], [0xff, 0xff], @broadcast=0xffffffff}, @ipv4={[], [0xff, 0xff], @remote={0xac, 0x14, 0xffffffffffffffff, 0xbb}}}}}}}}}, 0x0) 2018/04/11 12:45:54 executing program 5: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000200)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc-cast5-avx\x00'}, 0x58) r1 = syz_open_procfs(0x0, &(0x7f0000000100)='net/netlink\x00') getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffff9c, 0x84, 0x1a, &(0x7f0000000280)={0x0, 0xe0, "ddd223abcf726c6a2759192f0e2f32dd5124773bffd6c406980d78f23d46adc50021001ba3eea8890961e90f69cccbd027248a4a577ea9f7d6b2f887e02e353feb3e85043cc00caccc0b265335b1ce1e1f5e1897e1ad88e171305a4f329aa7e7d5217283a7aabec22b2ab2e0b55f1133870d4dc70f9c2b0d68b9c95d946c908fc8121c20b3361bac5dbf1647152602179f700165e88a8bee44a2aef1baaaa211b3538f07c68bf2e27113d4fb876ee8bb0953e17c41624a477bcea21e4624223cd74f35b56667156412e9d6b82a97841c626f0ac9ce94bd895f11f491bc3ca062"}, &(0x7f0000000140)=0xe8) getsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER(r1, 0x84, 0x7b, &(0x7f0000000180)={r2, 0x6}, &(0x7f00000001c0)=0x8) r3 = accept$alg(r0, 0x0, 0x0) statx(r1, &(0x7f0000000380)='./file0\x00', 0x6400, 0x804, &(0x7f00000003c0)) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00003bcfd0)="d3ab27191a", 0x5) sendmmsg$alg(r3, &(0x7f0000007e40)=[{0x0, 0x0, &(0x7f0000000900)}], 0x1, 0x0) accept(r0, &(0x7f0000000040)=@pppol2tpv3in6, &(0x7f00000000c0)=0x80) 2018/04/11 12:45:54 executing program 3: r0 = semget(0x2, 0x0, 0x400) semop(r0, &(0x7f000001a000), 0x0) timer_create(0x0, &(0x7f0000cd0000)={0x0, 0x12}, &(0x7f0000044000)) timer_settime(0x0, 0x0, &(0x7f00004b1fe0)={{0x0, 0x1c9c380}, {0x0, 0x9}}, &(0x7f0000040000)) r1 = getpgid(0x0) tkill(r1, 0x1000000000016) 2018/04/11 12:45:54 executing program 4 (fault-call:1 fault-nth:39): perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_fuseblk_mount(&(0x7f0000000040)='./file0\x00', &(0x7f0000000000)='./file0\x00', 0x4000, 0x0, 0x0, 0x0, 0x0, 0x0) 2018/04/11 12:45:54 executing program 7: syz_emit_ethernet(0x66, &(0x7f0000000000)={@random="cd3997030f00", @empty=[0x0, 0x0, 0x0, 0x0, 0x800e000000000000], [], {@ipv6={0x86dd, {0x0, 0x6, "b40900", 0x30, 0x67, 0x0, @ipv4={[], [0xff, 0xff], @multicast2=0xe0000002}, @mcast2={0xff, 0x2, [], 0x1}, {[], @icmpv6=@time_exceed={0x21, 0x0, 0x0, 0x0, [], {0x0, 0x6, "b680fa", 0x0, 0x0, 0x0, @ipv4={[], [0xff, 0xff], @broadcast=0xffffffff}, @ipv4={[], [0xff, 0xff], @remote={0xac, 0x14, 0xffffffffffffffff, 0xbb}}}}}}}}}, 0x0) [ 652.694368] FAULT_INJECTION: forcing a failure. [ 652.694368] name failslab, interval 1, probability 0, space 0, times 0 [ 652.705706] CPU: 0 PID: 4607 Comm: syz-executor4 Not tainted 4.16.0+ #17 [ 652.712554] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 652.721914] Call Trace: [ 652.724522] dump_stack+0x1b9/0x294 [ 652.728178] ? dump_stack_print_info.cold.2+0x52/0x52 [ 652.733407] should_fail.cold.4+0xa/0x1a [ 652.737498] ? fault_create_debugfs_attr+0x1f0/0x1f0 2018/04/11 12:45:54 executing program 1: r0 = socket(0x1e, 0x1, 0x0) setsockopt$packet_tx_ring(r0, 0x10f, 0x87, &(0x7f0000b89fe4)=@req={0x772}, 0x10) sendmsg(r0, &(0x7f0000030000)={&(0x7f00004f5000)=@generic={0x10000000001e, "0014000900000000000000000226cc573c080000003724c71e14dd6a739effea1b48006be61ffe0000e103000000f8020004003f010039d8f986ff01000300000004af50d50700000000000000e3ad316a1983000000001d00e0dfcb24281e27800000100076c3979ac40000bd15020078a1dfd300881a8365b1b16d7436"}, 0x80, &(0x7f0000447ff0), 0x0, &(0x7f00006e9c68)}, 0x0) 2018/04/11 12:45:54 executing program 5: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000200)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc-cast5-avx\x00'}, 0x58) pipe2(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}, 0x800) ioctl$SIOCGIFHWADDR(r2, 0x8927, &(0x7f0000000140)) r3 = accept$alg(r0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00003bcfd0)="d3ab27191a", 0x5) sendmmsg$alg(r3, &(0x7f0000007e40)=[{0x0, 0x0, &(0x7f0000000900)}], 0x1, 0x0) accept(r0, &(0x7f0000000040)=@pppol2tpv3in6, &(0x7f00000000c0)=0x80) ioctl$TTUNGETFILTER(r1, 0x801054db, &(0x7f0000000280)=""/210) [ 652.742623] ? save_stack+0x43/0xd0 [ 652.746263] ? kmem_cache_alloc_trace+0x152/0x780 [ 652.751123] ? __memcg_init_list_lru_node+0x17d/0x2c0 [ 652.756327] ? __list_lru_init+0x456/0x790 [ 652.760579] ? sget_userns+0x706/0xf20 [ 652.764485] ? graph_lock+0x170/0x170 [ 652.768307] ? vfs_kern_mount.part.34+0xd4/0x4d0 [ 652.773072] ? do_mount+0x564/0x3070 [ 652.776801] ? ksys_mount+0x12d/0x140 [ 652.780620] ? SyS_mount+0x35/0x50 [ 652.784182] ? do_syscall_64+0x29e/0x9d0 [ 652.788261] ? entry_SYSCALL_64_after_hwframe+0x42/0xb7 2018/04/11 12:45:54 executing program 7: syz_emit_ethernet(0x66, &(0x7f0000000000)={@random="cd3997030f00", @empty=[0x0, 0x0, 0x0, 0x0, 0x81000000], [], {@ipv6={0x86dd, {0x0, 0x6, "b40900", 0x30, 0x67, 0x0, @ipv4={[], [0xff, 0xff], @multicast2=0xe0000002}, @mcast2={0xff, 0x2, [], 0x1}, {[], @icmpv6=@time_exceed={0x21, 0x0, 0x0, 0x0, [], {0x0, 0x6, "b680fa", 0x0, 0x0, 0x0, @ipv4={[], [0xff, 0xff], @broadcast=0xffffffff}, @ipv4={[], [0xff, 0xff], @remote={0xac, 0x14, 0xffffffffffffffff, 0xbb}}}}}}}}}, 0x0) [ 652.793646] ? find_held_lock+0x36/0x1c0 [ 652.797739] ? __lock_is_held+0xb5/0x140 [ 652.801841] ? check_same_owner+0x320/0x320 [ 652.806188] ? rcu_note_context_switch+0x710/0x710 [ 652.811144] __should_failslab+0x124/0x180 [ 652.815403] should_failslab+0x9/0x14 [ 652.819221] kmem_cache_alloc_trace+0x2cb/0x780 [ 652.823906] ? __kmalloc_node+0x33/0x70 [ 652.827903] ? __kmalloc_node+0x33/0x70 [ 652.831897] ? rcu_read_lock_sched_held+0x108/0x120 [ 652.836950] __memcg_init_list_lru_node+0x17d/0x2c0 2018/04/11 12:45:54 executing program 6: r0 = socket$inet6(0xa, 0x80003, 0xff) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @ipv4={[], [0xff, 0xff], @dev={0xac, 0x14, 0x14, 0x1b}}}, 0x1c) sendmsg(r0, &(0x7f000001b000)={0x0, 0xfffffff5, &(0x7f0000019fa0), 0x146, &(0x7f000001ef08)}, 0x0) [ 652.841990] ? kvfree_rcu+0x20/0x20 [ 652.845628] ? __kmalloc_node+0x47/0x70 [ 652.849635] __list_lru_init+0x456/0x790 [ 652.853716] ? list_lru_destroy+0x4c0/0x4c0 [ 652.858046] ? mark_held_locks+0xc9/0x160 [ 652.862214] ? __raw_spin_lock_init+0x1c/0x100 [ 652.866810] ? trace_hardirqs_on_caller+0x421/0x5c0 [ 652.871848] ? lockdep_init_map+0x9/0x10 [ 652.875925] sget_userns+0x706/0xf20 [ 652.879646] ? kill_litter_super+0x90/0x90 [ 652.883893] ? ns_test_super+0x50/0x50 [ 652.887796] ? destroy_unused_super.part.9+0x100/0x100 2018/04/11 12:45:54 executing program 2: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x1e, 0x1, 0x0) setsockopt$packet_tx_ring(r0, 0x10f, 0x87, &(0x7f0000b89fe4)=@req={0x772}, 0x10) sendmsg(r0, &(0x7f0000030000)={&(0x7f00004f5000)=@generic={0x10000000001e, "0100000900000000000000000226cc573c080000003724c71e14dd6a739effea1b48006be61ffe0000e103000000f8000004003f010039d8f986ff01000300000004af50d50700000000000000e3ad316a1983000000001d00e0dfcb24281e27800000100076c3979ac40000bd15020078a1dfd300881a8365b1b16d7436"}, 0x80, &(0x7f0000447ff0), 0x0, &(0x7f00006e9c68)}, 0x0) [ 652.893094] ? do_raw_spin_trylock+0x1b0/0x1b0 [ 652.897693] ? kasan_check_write+0x14/0x20 [ 652.901990] ? do_raw_spin_lock+0xc1/0x200 [ 652.906255] ? blkdev_get+0xc0/0xb30 [ 652.909996] ? cap_capable+0x1f9/0x260 [ 652.913908] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 652.919467] ? security_capable+0x99/0xc0 [ 652.923639] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 652.929192] ? ns_capable_common+0x13f/0x170 [ 652.933618] ? kill_litter_super+0x90/0x90 [ 652.937865] sget+0x10b/0x150 [ 652.940979] ? ns_test_super+0x50/0x50 2018/04/11 12:45:54 executing program 0: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff7fffffffffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x1e, 0x1, 0x0) sendmsg(r0, &(0x7f0000030000)={&(0x7f00004f5000)=@generic={0x10000000001e, "0100000900000000000000000126cc573c080000003724c71e14dd6a739effea1b48006be61ffe0000e103000000f8000004003f010039d8f986ff01000300000004af50d50700000000000000e3ad316a1983000000001d00e0dfcb24281e27800000100076c3979ac40000bd15020078a1dfd300881a8365b1b16d7436"}, 0x80, &(0x7f0000447ff0), 0x0, &(0x7f00006e9c68)}, 0x0) 2018/04/11 12:45:54 executing program 7: syz_emit_ethernet(0x66, &(0x7f0000000000)={@random="cd3997030f00", @empty=[0x0, 0x0, 0x0, 0x0, 0x8000000], [], {@ipv6={0x86dd, {0x0, 0x6, "b40900", 0x30, 0x67, 0x0, @ipv4={[], [0xff, 0xff], @multicast2=0xe0000002}, @mcast2={0xff, 0x2, [], 0x1}, {[], @icmpv6=@time_exceed={0x21, 0x0, 0x0, 0x0, [], {0x0, 0x6, "b680fa", 0x0, 0x0, 0x0, @ipv4={[], [0xff, 0xff], @broadcast=0xffffffff}, @ipv4={[], [0xff, 0xff], @remote={0xac, 0x14, 0xffffffffffffffff, 0xbb}}}}}}}}}, 0x0) [ 652.944884] mount_bdev+0x111/0x3e0 [ 652.948524] ? fuse_get_root_inode+0x190/0x190 [ 652.953126] fuse_mount_blk+0x34/0x40 [ 652.956945] mount_fs+0xae/0x328 [ 652.960332] vfs_kern_mount.part.34+0xd4/0x4d0 [ 652.964935] ? may_umount+0xb0/0xb0 [ 652.968578] ? _raw_read_unlock+0x22/0x30 [ 652.972740] ? __get_fs_type+0x97/0xc0 [ 652.976645] do_mount+0x564/0x3070 [ 652.980211] ? copy_mount_string+0x40/0x40 [ 652.984466] ? rcu_pm_notify+0xc0/0xc0 [ 652.988380] ? copy_mount_options+0x5f/0x380 2018/04/11 12:45:54 executing program 5: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000200)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc-cast5-avx\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00003bcfd0)="d3ab27191a", 0x5) sendmmsg$alg(r1, &(0x7f0000007e40)=[{0x0, 0x0, &(0x7f0000000900)}], 0x1, 0x0) r2 = accept(r0, &(0x7f0000000040)=@pppol2tpv3in6={0x0, 0x0, {0x0, 0xffffffffffffffff}}, &(0x7f00000000c0)=0x80) getsockopt$inet6_IPV6_XFRM_POLICY(r2, 0x29, 0x23, &(0x7f0000000400)={{{@in6=@dev, @in6=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@remote}, 0x0, @in=@multicast2}}, &(0x7f0000000500)=0xe8) setsockopt$inet_mreqn(r2, 0x0, 0x24, &(0x7f0000000540)={@local={0xac, 0x14, 0x14, 0xaa}, @broadcast=0xffffffff, r4}, 0xc) getsockopt$inet_mreqn(r3, 0x0, 0x20, &(0x7f0000000100)={@broadcast, @multicast2, 0x0}, &(0x7f0000000140)=0xc) connect(r3, &(0x7f0000000180)=@ll={0x11, 0x0, r5, 0x1, 0x0, 0x6, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0xf}}, 0x80) sendmmsg$alg(r1, &(0x7f00000003c0)=[{0x0, 0x0, &(0x7f0000000380)=[{&(0x7f0000000280)="9805a4c49e9f83b712ff75092fa0a2f3122e096cfbeed2de3a5d24c93c9fda721b34faaab59c219449dd44c52a8824a9d870a3569c31f80f0566871260b572778e3f8f7690455453a8f060e43e3b0548a894ac49661b5c538dcf2146f02ba643a6d5933d9b203cb40797b4f766f0275765fa665191ae1ae2dd88a911393d237916ca7d9a6664ea15866dbdd358435b3ddbfbd8a5107adfc84f67608cc3d06fc5998b45fd0e251b9ab3da9f1942d8e03fb8f3403e216e613913f7f70b44542c8997647126839ac2446a7e697380a2fd4ed71eda16ed9ad5bd7dd9f122214a41c34a78d9b58ed0c0174c72fe16938fdf3cd7", 0xf1}], 0x1, 0x0, 0x0, 0xc0}], 0x1, 0x810) 2018/04/11 12:45:54 executing program 1: r0 = socket(0x1e, 0x1, 0x0) setsockopt$packet_tx_ring(r0, 0x10f, 0x87, &(0x7f0000b89fe4)=@req={0x772}, 0x10) sendmsg(r0, &(0x7f0000030000)={&(0x7f00004f5000)=@generic={0x10000000001e, "0014000900000000000000000226cc573c080000003724c71e14dd6a739effea1b48006be61ffe0000e103000000f8000304003f010039d8f986ff01000300000004af50d50700000000000000e3ad316a1983000000001d00e0dfcb24281e27800000100076c3979ac40000bd15020078a1dfd300881a8365b1b16d7436"}, 0x80, &(0x7f0000447ff0), 0x0, &(0x7f00006e9c68)}, 0x0) [ 652.992811] ? rcu_read_lock_sched_held+0x108/0x120 [ 652.997836] ? kmem_cache_alloc_trace+0x616/0x780 [ 653.002694] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 653.008243] ? _copy_from_user+0xdf/0x150 [ 653.012416] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 653.017960] ? copy_mount_options+0x285/0x380 [ 653.022474] ksys_mount+0x12d/0x140 [ 653.026116] SyS_mount+0x35/0x50 [ 653.029488] ? ksys_mount+0x140/0x140 [ 653.033294] do_syscall_64+0x29e/0x9d0 [ 653.037192] ? vmalloc_sync_all+0x30/0x30 [ 653.041359] ? _raw_spin_unlock_irq+0x27/0x70 [ 653.045870] ? finish_task_switch+0x1ca/0x820 [ 653.050389] ? syscall_return_slowpath+0x5c0/0x5c0 [ 653.055331] ? syscall_return_slowpath+0x30f/0x5c0 [ 653.060285] ? entry_SYSCALL_64_after_hwframe+0x52/0xb7 [ 653.065674] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 653.070547] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 653.075749] RIP: 0033:0x455259 [ 653.078944] RSP: 002b:00007f95e4cadb08 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 653.086665] RAX: ffffffffffffffda RBX: 0000000000000015 RCX: 0000000000455259 2018/04/11 12:45:54 executing program 7: syz_emit_ethernet(0x66, &(0x7f0000000000)={@random="cd3997030f00", @empty=[0x0, 0x0, 0x0, 0x0, 0x400000000000000], [], {@ipv6={0x86dd, {0x0, 0x6, "b40900", 0x30, 0x67, 0x0, @ipv4={[], [0xff, 0xff], @multicast2=0xe0000002}, @mcast2={0xff, 0x2, [], 0x1}, {[], @icmpv6=@time_exceed={0x21, 0x0, 0x0, 0x0, [], {0x0, 0x6, "b680fa", 0x0, 0x0, 0x0, @ipv4={[], [0xff, 0xff], @broadcast=0xffffffff}, @ipv4={[], [0xff, 0xff], @remote={0xac, 0x14, 0xffffffffffffffff, 0xbb}}}}}}}}}, 0x0) 2018/04/11 12:45:54 executing program 0: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff7fffffffffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x1e, 0x1, 0x0) sendmsg(r0, &(0x7f0000030000)={&(0x7f00004f5000)=@generic={0x10000000001e, "0100000900d00101000000000226cc573c080000003724c71e14dd6a739effea1b48006be61ffe0000e103000000f8000004003f010039d8f986ff01000300000004af50d50700000000000000e3ad316a1983000000001d00e0dfcb24281e27800000100076c3979ac40000bd15020078a1dfd300881a8365b1b16d7436"}, 0x80, &(0x7f0000447ff0), 0x0, &(0x7f00006e9c68)}, 0x0) 2018/04/11 12:45:54 executing program 3: r0 = openat$dsp(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/dsp\x00', 0x200, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_REMOVE(r0, 0xc0405519, &(0x7f0000000200)={0x7ff, 0x5, 0x0, 0x8, "8917deb6b65d47b59ab3131baeba294818fbe6cdd541fe87f99b4eb211769cf8e0653380edd4636fe0594501", 0x20}) semop(0x0, &(0x7f0000000180)=[{0x0, 0x4}, {}], 0x2) timer_create(0x0, &(0x7f0000cd0000)={0x0, 0x12}, &(0x7f0000044000)) timer_settime(0x0, 0x0, &(0x7f00004b1fe0)={{0x0, 0x1c9c380}, {0x0, 0x9}}, &(0x7f0000040000)) r1 = getpgid(0x0) tkill(r1, 0x1000000000016) r2 = add_key(&(0x7f0000000000)='rxrpc\x00', &(0x7f0000000040)={0x73, 0x79, 0x7a, 0x1}, &(0x7f0000000080)="3547fed42fe52b132b149849fac02f006f752725be6efb4de0b657247b5f6ad1a01ccb20fbf931d6608c239dff4774c6dbc56b8275911332dbb95a380491ae6612009809f7b5e38ef1748d6f74665e34c8289657b9b1092d123a5b7b5803eeabe442a72247466dd8117fdecefd2e100c6d81e139b90578a3fb881c250ad844cbccd425b17a25300ac50d72d14018babf7449b331984c745ed968fb5e810fc04a38a335587a72982955d8bb5f35a4ffe8e8da2f9e", 0xb4, 0xfffffffffffffff8) keyctl$update(0x2, r2, &(0x7f0000000140)="3027a951d8bf594cab", 0x9) [ 653.093940] RDX: 00000000004b9bc5 RSI: 0000000020000040 RDI: 0000000020000000 [ 653.101217] RBP: 0000000020000000 R08: 00007f95e4cadb20 R09: 0000000000000000 [ 653.108495] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 653.115770] R13: 0000000000000000 R14: 0000000000000000 R15: 0000000000000000 2018/04/11 12:45:55 executing program 6: r0 = socket$inet6(0xa, 0x80003, 0xff) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @ipv4={[], [0xff, 0xff], @dev={0xac, 0x14, 0x14, 0x1b}}}, 0x1c) sendmsg(r0, &(0x7f000001b000)={0x0, 0xfffffff5, &(0x7f0000019fa0), 0xdc, &(0x7f000001ef08)}, 0x0) 2018/04/11 12:45:55 executing program 5: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000340)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc-cast5-avx\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00003bcfd0)="d3ab27191a", 0x5) r2 = syz_open_dev$sndpcmp(&(0x7f0000000100)='/dev/snd/pcmC#D#p\x00', 0x4, 0x420000) sendto$unix(r2, &(0x7f0000000140)="df893ec175fa4990f0b2ef6984900fc1a929e6774bb2b8d8fa53ae220f68ede5fd07a6dfd17369236229fa2eafa9f404d813662305ae3c5c673eb3605425066f6c8cfd7ef001b07fcb68149756dbeb1433c06c8f4eb9f4f1db115f9f446b1757c54ae393ae645b5b0ab2b1a70891728d0cbead82d55e5bd0", 0x78, 0x10, &(0x7f0000000280)=@file={0x1, './file0\x00'}, 0x6e) getsockopt$inet_sctp6_SCTP_PR_ASSOC_STATUS(r2, 0x84, 0x73, &(0x7f00000001c0)={0x0, 0x80000000, 0x20, 0x5, 0xffffffff}, &(0x7f0000000300)=0x18) getsockopt$inet_sctp_SCTP_STREAM_SCHEDULER_VALUE(r2, 0x84, 0x7c, &(0x7f00000003c0)={r3, 0x492, 0x7fff}, &(0x7f0000000400)=0x8) sendmmsg$alg(r1, &(0x7f0000007e40)=[{0x0, 0x0, &(0x7f0000000900)}], 0x1, 0x0) accept(r0, &(0x7f0000000040)=@pppol2tpv3in6, &(0x7f00000000c0)=0x80) 2018/04/11 12:45:55 executing program 2: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x1e, 0x1, 0x0) setsockopt$packet_tx_ring(r0, 0x10f, 0x87, &(0x7f0000b89fe4)=@req={0x772}, 0x10) sendmsg(r0, &(0x7f0000030000)={&(0x7f00004f5000)=@generic={0x10000000001e, "0100000900000000000000000226cc573c080000003724c71e14dd6a739effea1b48006be61ffe0000e103000000f8000004003f010039d8f986ff01000300000004af50d50700000000000000e3ad316a1983000000001d00e0dfcb24281e27800000100076c3979ac40000bd15020078a1dfd300881a8365b1b16d7436"}, 0x80, &(0x7f0000447ff0), 0x4, &(0x7f00006e9c68)}, 0x0) 2018/04/11 12:45:55 executing program 1: r0 = socket(0x1e, 0x1, 0x0) setsockopt$packet_tx_ring(r0, 0x10f, 0x87, &(0x7f0000b89fe4)=@req={0x772}, 0x10) sendmsg(r0, &(0x7f0000030000)={&(0x7f00004f5000)=@generic={0x10000000001e, "0014000900000000000000000226cc573c080000003724c71e14dd6a739effea1b48006be61ffe0000e103000000f8000204003f010039d8f986ff01000300000004af50d50700000000000000e3ad316a1983000000001d00e0dfcb24281e27800000100076c3979ac40000bd15020078a1dfd300881a8365b1b16d7436"}, 0x80, &(0x7f0000447ff0), 0x0, &(0x7f00006e9c68)}, 0x0) 2018/04/11 12:45:55 executing program 7: syz_emit_ethernet(0x66, &(0x7f0000000000)={@random="cd3997030f00", @empty=[0x0, 0x0, 0x0, 0x0, 0xf0ffffffffffff], [], {@ipv6={0x86dd, {0x0, 0x6, "b40900", 0x30, 0x67, 0x0, @ipv4={[], [0xff, 0xff], @multicast2=0xe0000002}, @mcast2={0xff, 0x2, [], 0x1}, {[], @icmpv6=@time_exceed={0x21, 0x0, 0x0, 0x0, [], {0x0, 0x6, "b680fa", 0x0, 0x0, 0x0, @ipv4={[], [0xff, 0xff], @broadcast=0xffffffff}, @ipv4={[], [0xff, 0xff], @remote={0xac, 0x14, 0xffffffffffffffff, 0xbb}}}}}}}}}, 0x0) 2018/04/11 12:45:55 executing program 0: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff7fffffffffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x1e, 0x1, 0x0) sendmsg(r0, &(0x7f0000030000)={&(0x7f00004f5000)=@generic={0x10000000001e, "0100000900000004000000000226cc573c080000003724c71e14dd6a739effea1b48006be61ffe0000e103000000f8000004003f010039d8f986ff01000300000004af50d50700000000000000e3ad316a1983000000001d00e0dfcb24281e27800000100076c3979ac40000bd15020078a1dfd300881a8365b1b16d7436"}, 0x80, &(0x7f0000447ff0), 0x0, &(0x7f00006e9c68)}, 0x0) 2018/04/11 12:45:55 executing program 3: semop(0x0, &(0x7f000001a000)=[{0x0, 0xffffffffffff0001}, {}], 0x2) prctl$getreaper(0x1b, &(0x7f00000002c0)) timer_create(0x0, &(0x7f0000cd0000)={0x0, 0x12}, &(0x7f0000044000)) timer_settime(0x0, 0x0, &(0x7f00004b1fe0)={{0x0, 0x1c9c380}, {0x0, 0x9}}, &(0x7f0000040000)) r0 = getpgid(0x0) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) open_by_handle_at(r1, &(0x7f0000000140)={0x9c, 0x441, "4957b74f17e751337d7a1514c16193e2d88699bd620da093c49ea0934c864e8f68699920dc591dc4a3dd48542d4c3002034bec93a51ef6ca08bdd5b98132abb06445f57ccf817801fc57f4dd53c3e8526e8b841557e6810a5a7861b15a5024974d67d270f5852b069a33e28bc8c1eda57e374867352c4c08fd8548973c3dc85412f5eef388e7446901bc00f3218b2e3b550a3a59"}, 0x1c000) getrandom(&(0x7f0000000000)=""/193, 0xc1, 0xebc760488a99abc4) getsockopt$inet_sctp6_SCTP_AUTH_ACTIVE_KEY(0xffffffffffffff9c, 0x84, 0x18, &(0x7f0000000200)={0x0, 0x3}, &(0x7f0000000240)=0x8) setsockopt$inet_sctp6_SCTP_AUTH_DELETE_KEY(r1, 0x84, 0x19, &(0x7f0000000280)={r2, 0x8}, 0x8) tkill(r0, 0x1000000000016) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)) 2018/04/11 12:45:55 executing program 4 (fault-call:1 fault-nth:40): perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_fuseblk_mount(&(0x7f0000000040)='./file0\x00', &(0x7f0000000000)='./file0\x00', 0x4000, 0x0, 0x0, 0x0, 0x0, 0x0) 2018/04/11 12:45:55 executing program 1: r0 = socket(0x1e, 0x1, 0x0) setsockopt$packet_tx_ring(r0, 0x10f, 0x87, &(0x7f0000b89fe4)=@req={0x772}, 0x10) sendmsg(r0, &(0x7f0000030000)={&(0x7f00004f5000)=@generic={0x10000000001e, "0014000900000000000000000226cc573c080000003724c71e14dd6a739effea1b48006be61ffe0000e103000000f8000004033f010039d8f986ff01000300000004af50d50700000000000000e3ad316a1983000000001d00e0dfcb24281e27800000100076c3979ac40000bd15020078a1dfd300881a8365b1b16d7436"}, 0x80, &(0x7f0000447ff0), 0x0, &(0x7f00006e9c68)}, 0x0) 2018/04/11 12:45:55 executing program 6: r0 = socket$inet6(0xa, 0x80003, 0xff) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @ipv4={[], [0xff, 0xff], @dev={0xac, 0x14, 0x14, 0x1b}}}, 0x1c) sendmsg(r0, &(0x7f000001b000)={0x0, 0xfffffff5, &(0x7f0000019fa0), 0x1b2, &(0x7f000001ef08)}, 0x0) 2018/04/11 12:45:55 executing program 2: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x1e, 0x1, 0x0) setsockopt$packet_tx_ring(r0, 0x10f, 0x87, &(0x7f0000b89fe4)=@req={0x772}, 0x10) sendmsg(r0, &(0x7f0000030000)={&(0x7f00004f5000)=@generic={0x10000000001e, "0100000900000000000000000226cc573c080000003724c71e14dd6a739effea1b48006be61ffe0000e103000000f8000004003f010039d8f986ff01000300000004af50d50700000000000000e3ad316a1983000000001d00e0dfcb24281e27800000100076c3979ac40000bd15020078a1dfd300881a8365b1b16d7436"}, 0x80, &(0x7f0000447ff0), 0x2, &(0x7f00006e9c68)}, 0x0) [ 654.157115] FAULT_INJECTION: forcing a failure. [ 654.157115] name failslab, interval 1, probability 0, space 0, times 0 [ 654.168497] CPU: 0 PID: 4683 Comm: syz-executor4 Not tainted 4.16.0+ #17 [ 654.175353] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 654.184722] Call Trace: [ 654.187331] dump_stack+0x1b9/0x294 [ 654.190990] ? dump_stack_print_info.cold.2+0x52/0x52 [ 654.196232] should_fail.cold.4+0xa/0x1a [ 654.200326] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 654.205453] ? save_stack+0x43/0xd0 [ 654.209096] ? kmem_cache_alloc_trace+0x152/0x780 [ 654.213961] ? __memcg_init_list_lru_node+0x17d/0x2c0 [ 654.219169] ? __list_lru_init+0x456/0x790 [ 654.223418] ? sget_userns+0x706/0xf20 [ 654.227329] ? graph_lock+0x170/0x170 [ 654.231155] ? vfs_kern_mount.part.34+0xd4/0x4d0 [ 654.235925] ? do_mount+0x564/0x3070 [ 654.239651] ? ksys_mount+0x12d/0x140 [ 654.243465] ? SyS_mount+0x35/0x50 [ 654.247021] ? do_syscall_64+0x29e/0x9d0 [ 654.251106] ? entry_SYSCALL_64_after_hwframe+0x42/0xb7 2018/04/11 12:45:55 executing program 1: r0 = socket(0x1e, 0x1, 0x0) setsockopt$packet_tx_ring(r0, 0x10f, 0x87, &(0x7f0000b89fe4)=@req={0x772}, 0x10) sendmsg(r0, &(0x7f0000030000)={&(0x7f00004f5000)=@generic={0x10000000001e, "0014000900000000000000000226cc573c080000003724c71e14dd6a739effea1b48006be61ffe0000e103000000f8000004023f010039d8f986ff01000300000004af50d50700000000000000e3ad316a1983000000001d00e0dfcb24281e27800000100076c3979ac40000bd15020078a1dfd300881a8365b1b16d7436"}, 0x80, &(0x7f0000447ff0), 0x0, &(0x7f00006e9c68)}, 0x0) 2018/04/11 12:45:55 executing program 2: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x1e, 0x1, 0x0) setsockopt$packet_tx_ring(r0, 0x10f, 0x87, &(0x7f0000b89fe4)=@req={0x772}, 0x10) sendmsg(r0, &(0x7f0000030000)={&(0x7f00004f5000)=@generic={0x10000000001e, "0100000900000000000000000226cc573c080000003724c71e14dd6a739effea1b48006be61ffe0000e103000000f8000004003f010039d8f986ff01000300000004af50d50700000000000000e3ad316a1983000000001d00e0dfcb24281e27800000100076c3979ac40000bd15020078a1dfd300881a8365b1b16d7436"}, 0x80, &(0x7f0000447ff0), 0x101d0, &(0x7f00006e9c68)}, 0x0) [ 654.256492] ? find_held_lock+0x36/0x1c0 [ 654.260586] ? __lock_is_held+0xb5/0x140 [ 654.264688] ? check_same_owner+0x320/0x320 [ 654.269034] ? rcu_note_context_switch+0x710/0x710 [ 654.273992] __should_failslab+0x124/0x180 [ 654.278245] should_failslab+0x9/0x14 [ 654.282062] kmem_cache_alloc_trace+0x2cb/0x780 [ 654.286740] ? __kmalloc_node+0x33/0x70 [ 654.290722] ? __kmalloc_node+0x33/0x70 [ 654.294712] ? rcu_read_lock_sched_held+0x108/0x120 [ 654.299767] __memcg_init_list_lru_node+0x17d/0x2c0 2018/04/11 12:45:55 executing program 6: r0 = socket$inet6(0xa, 0x80003, 0xff) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @ipv4={[], [0xff, 0xff], @dev={0xac, 0x14, 0x14, 0x1b}}}, 0x1c) sendmsg(r0, &(0x7f000001b000)={0x0, 0xfffffff5, &(0x7f0000019fa0), 0x194, &(0x7f000001ef08)}, 0x0) [ 654.304808] ? kvfree_rcu+0x20/0x20 [ 654.308452] ? __kmalloc_node+0x47/0x70 [ 654.312451] __list_lru_init+0x456/0x790 [ 654.316534] ? list_lru_destroy+0x4c0/0x4c0 [ 654.320885] ? mark_held_locks+0xc9/0x160 [ 654.325051] ? __raw_spin_lock_init+0x1c/0x100 [ 654.329650] ? trace_hardirqs_on_caller+0x421/0x5c0 [ 654.334697] ? lockdep_init_map+0x9/0x10 [ 654.338778] sget_userns+0x706/0xf20 [ 654.342500] ? kill_litter_super+0x90/0x90 [ 654.346752] ? ns_test_super+0x50/0x50 [ 654.350657] ? destroy_unused_super.part.9+0x100/0x100 2018/04/11 12:45:56 executing program 1: r0 = socket(0x1e, 0x1, 0x0) setsockopt$packet_tx_ring(r0, 0x10f, 0x87, &(0x7f0000b89fe4)=@req={0x772}, 0x10) sendmsg(r0, &(0x7f0000030000)={&(0x7f00004f5000)=@generic={0x10000000001e, "0014000900000000000000000226cc573c080000003724c71e14dd6a739effea1b48006be61ffe0000e103000000f8000004003f020039d8f986ff01000300000004af50d50700000000000000e3ad316a1983000000001d00e0dfcb24281e27800000100076c3979ac40000bd15020078a1dfd300881a8365b1b16d7436"}, 0x80, &(0x7f0000447ff0), 0x0, &(0x7f00006e9c68)}, 0x0) 2018/04/11 12:45:56 executing program 2: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x1e, 0x1, 0x0) setsockopt$packet_tx_ring(r0, 0x10f, 0x87, &(0x7f0000b89fe4)=@req={0x772}, 0x10) sendmsg(r0, &(0x7f0000030000)={&(0x7f00004f5000)=@generic={0x10000000001e, "0100000900000000000000000226cc573c080000003724c71e14dd6a739effea1b48006be61ffe0000e103000000f8000004003f010039d8f986ff01000300000004af50d50700000000000000e3ad316a1983000000001d00e0dfcb24281e27800000100076c3979ac40000bd15020078a1dfd300881a8365b1b16d7436"}, 0x80, &(0x7f0000447ff0), 0x200000000000000, &(0x7f00006e9c68)}, 0x0) [ 654.355944] ? do_raw_spin_trylock+0x1b0/0x1b0 [ 654.360550] ? kasan_check_write+0x14/0x20 [ 654.364796] ? do_raw_spin_lock+0xc1/0x200 [ 654.369055] ? blkdev_get+0xc0/0xb30 [ 654.372793] ? cap_capable+0x1f9/0x260 [ 654.376708] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 654.382259] ? security_capable+0x99/0xc0 [ 654.386432] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 654.391976] ? ns_capable_common+0x13f/0x170 [ 654.396401] ? kill_litter_super+0x90/0x90 [ 654.400651] sget+0x10b/0x150 [ 654.403766] ? ns_test_super+0x50/0x50 2018/04/11 12:45:56 executing program 6: r0 = socket$inet6(0xa, 0x80003, 0xff) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @ipv4={[], [0xff, 0xff], @dev={0xac, 0x14, 0x14, 0x1b}}}, 0x1c) sendmsg(r0, &(0x7f000001b000)={0x0, 0xfffffff5, &(0x7f0000019fa0), 0x87, &(0x7f000001ef08)}, 0x0) [ 654.407678] mount_bdev+0x111/0x3e0 [ 654.411315] ? fuse_get_root_inode+0x190/0x190 [ 654.415920] fuse_mount_blk+0x34/0x40 [ 654.419748] mount_fs+0xae/0x328 [ 654.423148] vfs_kern_mount.part.34+0xd4/0x4d0 [ 654.427749] ? may_umount+0xb0/0xb0 [ 654.431390] ? _raw_read_unlock+0x22/0x30 [ 654.435555] ? __get_fs_type+0x97/0xc0 [ 654.439466] do_mount+0x564/0x3070 [ 654.443027] ? copy_mount_string+0x40/0x40 [ 654.447269] ? rcu_pm_notify+0xc0/0xc0 [ 654.451189] ? copy_mount_options+0x5f/0x380 [ 654.455610] ? rcu_read_lock_sched_held+0x108/0x120 [ 654.460640] ? kmem_cache_alloc_trace+0x616/0x780 [ 654.465509] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 654.471058] ? copy_mount_options+0x285/0x380 [ 654.475577] ksys_mount+0x12d/0x140 [ 654.479236] SyS_mount+0x35/0x50 [ 654.482612] ? ksys_mount+0x140/0x140 [ 654.486434] do_syscall_64+0x29e/0x9d0 [ 654.490333] ? vmalloc_sync_all+0x30/0x30 [ 654.494492] ? _raw_spin_unlock_irq+0x27/0x70 [ 654.499002] ? finish_task_switch+0x1ca/0x820 [ 654.503515] ? syscall_return_slowpath+0x5c0/0x5c0 [ 654.508457] ? syscall_return_slowpath+0x30f/0x5c0 [ 654.513405] ? entry_SYSCALL_64_after_hwframe+0x52/0xb7 [ 654.518789] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 654.523660] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 654.528855] RIP: 0033:0x455259 [ 654.532049] RSP: 002b:00007f95e4cadb08 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 654.539777] RAX: ffffffffffffffda RBX: 0000000000000015 RCX: 0000000000455259 [ 654.547059] RDX: 00000000004b9bc5 RSI: 0000000020000040 RDI: 0000000020000000 2018/04/11 12:45:56 executing program 5: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000200)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc-cast5-avx\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00003bcfd0)="d3ab27191a", 0x5) sendmmsg$alg(r1, &(0x7f0000007e40)=[{0x0, 0x0, &(0x7f0000000900)}], 0x1, 0x0) r2 = socket(0x10, 0x4, 0x80000001) bind$llc(r2, &(0x7f0000000100)={0x1a, 0x310, 0x1000, 0x10001, 0xce0, 0x7671, @remote={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xbb}}, 0x10) accept(r0, &(0x7f0000000040)=@pppol2tpv3in6, &(0x7f00000000c0)=0x80) 2018/04/11 12:45:56 executing program 1: r0 = socket(0x1e, 0x1, 0x0) setsockopt$packet_tx_ring(r0, 0x10f, 0x87, &(0x7f0000b89fe4)=@req={0x772}, 0x10) sendmsg(r0, &(0x7f0000030000)={&(0x7f00004f5000)=@generic={0x10000000001e, "0014000900000000000000000226cc573c080000003724c71e14dd6a739effea1b48006be61ffe0000e103000000f8000004003f001339d8f986ff01000300000004af50d50700000000000000e3ad316a1983000000001d00e0dfcb24281e27800000100076c3979ac40000bd15020078a1dfd300881a8365b1b16d7436"}, 0x80, &(0x7f0000447ff0), 0x0, &(0x7f00006e9c68)}, 0x0) 2018/04/11 12:45:56 executing program 2: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x1e, 0x1, 0x0) setsockopt$packet_tx_ring(r0, 0x10f, 0x87, &(0x7f0000b89fe4)=@req={0x772}, 0x10) sendmsg(r0, &(0x7f0000030000)={&(0x7f00004f5000)=@generic={0x10000000001e, "0100000900000000000000000226cc573c080000003724c71e14dd6a739effea1b48006be61ffe0000e103000000f8000004003f010039d8f986ff01000300000004af50d50700000000000000e3ad316a1983000000001d00e0dfcb24281e27800000100076c3979ac40000bd15020078a1dfd300881a8365b1b16d7436"}, 0x80, &(0x7f0000447ff0), 0x4000000000000, &(0x7f00006e9c68)}, 0x0) 2018/04/11 12:45:56 executing program 7: syz_emit_ethernet(0x66, &(0x7f0000000000)={@random="cd3997030f00", @empty=[0x0, 0x0, 0x0, 0x0, 0x1000000], [], {@ipv6={0x86dd, {0x0, 0x6, "b40900", 0x30, 0x67, 0x0, @ipv4={[], [0xff, 0xff], @multicast2=0xe0000002}, @mcast2={0xff, 0x2, [], 0x1}, {[], @icmpv6=@time_exceed={0x21, 0x0, 0x0, 0x0, [], {0x0, 0x6, "b680fa", 0x0, 0x0, 0x0, @ipv4={[], [0xff, 0xff], @broadcast=0xffffffff}, @ipv4={[], [0xff, 0xff], @remote={0xac, 0x14, 0xffffffffffffffff, 0xbb}}}}}}}}}, 0x0) 2018/04/11 12:45:56 executing program 0: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff7fffffffffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x1e, 0x1, 0x0) sendmsg(r0, &(0x7f0000030000)={&(0x7f00004f5000)=@generic={0x10000000001e, "0100000900000101d00000000226cc573c080000003724c71e14dd6a739effea1b48006be61ffe0000e103000000f8000004003f010039d8f986ff01000300000004af50d50700000000000000e3ad316a1983000000001d00e0dfcb24281e27800000100076c3979ac40000bd15020078a1dfd300881a8365b1b16d7436"}, 0x80, &(0x7f0000447ff0), 0x0, &(0x7f00006e9c68)}, 0x0) [ 654.554340] RBP: 0000000020000000 R08: 00007f95e4cadb20 R09: 0000000000000000 [ 654.561620] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 654.568988] R13: 0000000000000000 R14: 0000000000000000 R15: 0000000000000000 2018/04/11 12:45:57 executing program 4 (fault-call:1 fault-nth:41): perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_fuseblk_mount(&(0x7f0000000040)='./file0\x00', &(0x7f0000000000)='./file0\x00', 0x4000, 0x0, 0x0, 0x0, 0x0, 0x0) 2018/04/11 12:45:57 executing program 2: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x1e, 0x1, 0x0) setsockopt$packet_tx_ring(r0, 0x10f, 0x87, &(0x7f0000b89fe4)=@req={0x772}, 0x10) sendmsg(r0, &(0x7f0000030000)={&(0x7f00004f5000)=@generic={0x10000000001e, "0100000900000000000000000226cc573c080000003724c71e14dd6a739effea1b48006be61ffe0000e103000000f8000004003f010039d8f986ff01000300000004af50d50700000000000000e3ad316a1983000000001d00e0dfcb24281e27800000100076c3979ac40000bd15020078a1dfd300881a8365b1b16d7436"}, 0x80, &(0x7f0000447ff0), 0xd001010000000000, &(0x7f00006e9c68)}, 0x0) 2018/04/11 12:45:57 executing program 6: r0 = socket$inet6(0xa, 0x80003, 0xff) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @ipv4={[], [0xff, 0xff], @dev={0xac, 0x14, 0x14, 0x1b}}}, 0x1c) sendmsg(r0, &(0x7f000001b000)={0x0, 0xfffffff5, &(0x7f0000019fa0), 0x9f, &(0x7f000001ef08)}, 0x0) 2018/04/11 12:45:57 executing program 3: semop(0x0, &(0x7f000001a000)=[{0x0, 0xffffffffffff0001}, {}], 0x2) r0 = perf_event_open(&(0x7f0000000040)={0x7, 0x70, 0x8001, 0x8405, 0x400, 0x7, 0x0, 0x2, 0x0, 0xc, 0x7fffffff, 0x7, 0x4, 0x0, 0x100, 0xff, 0xfb2, 0xfffffffffffff95b, 0x400000, 0x80, 0xffff, 0x6, 0x6, 0x7, 0x1, 0x3, 0x6, 0xfffffffffffffe01, 0x81, 0xaf3c, 0x1, 0x8, 0x200, 0x9, 0x7ff, 0xdd, 0xd88, 0x9, 0x0, 0x3, 0x2425edcf551ed435, @perf_bp={&(0x7f0000000000), 0x8}, 0x2000, 0x0, 0x2, 0x7, 0xa78e, 0xde3, 0x8df0}, 0xffffffffffffffff, 0x10, 0xffffffffffffff9c, 0x8) ioctl$PERF_EVENT_IOC_RESET(r0, 0x2403, 0x6) timer_create(0x0, &(0x7f0000cd0000)={0x0, 0x12}, &(0x7f0000044000)) timer_settime(0x0, 0x0, &(0x7f00004b1fe0)={{0x0, 0x1c9c380}, {0x0, 0x9}}, &(0x7f0000040000)) r1 = getpgid(0x0) tkill(r1, 0x1000000000016) 2018/04/11 12:45:57 executing program 1: r0 = socket(0x1e, 0x1, 0x0) setsockopt$packet_tx_ring(r0, 0x10f, 0x87, &(0x7f0000b89fe4)=@req={0x772}, 0x10) sendmsg(r0, &(0x7f0000030000)={&(0x7f00004f5000)=@generic={0x10000000001e, "0014000900000000000000000226cc573c080000003724c71e14dd6a739effea1b48006be61ffe0000e103000000f8000004003f010239d8f986ff01000300000004af50d50700000000000000e3ad316a1983000000001d00e0dfcb24281e27800000100076c3979ac40000bd15020078a1dfd300881a8365b1b16d7436"}, 0x80, &(0x7f0000447ff0), 0x0, &(0x7f00006e9c68)}, 0x0) 2018/04/11 12:45:57 executing program 7: syz_emit_ethernet(0x66, &(0x7f0000000000)={@random="cd3997030f00", @empty=[0x0, 0x0, 0x0, 0x0, 0x300], [], {@ipv6={0x86dd, {0x0, 0x6, "b40900", 0x30, 0x67, 0x0, @ipv4={[], [0xff, 0xff], @multicast2=0xe0000002}, @mcast2={0xff, 0x2, [], 0x1}, {[], @icmpv6=@time_exceed={0x21, 0x0, 0x0, 0x0, [], {0x0, 0x6, "b680fa", 0x0, 0x0, 0x0, @ipv4={[], [0xff, 0xff], @broadcast=0xffffffff}, @ipv4={[], [0xff, 0xff], @remote={0xac, 0x14, 0xffffffffffffffff, 0xbb}}}}}}}}}, 0x0) 2018/04/11 12:45:57 executing program 0: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff7fffffffffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x1e, 0x1, 0x0) sendmsg(r0, &(0x7f0000030000)={&(0x7f00004f5000)=@generic={0x10000000001e, "01000009007fffffff0000000226cc573c080000003724c71e14dd6a739effea1b48006be61ffe0000e103000000f8000004003f010039d8f986ff01000300000004af50d50700000000000000e3ad316a1983000000001d00e0dfcb24281e27800000100076c3979ac40000bd15020078a1dfd300881a8365b1b16d7436"}, 0x80, &(0x7f0000447ff0), 0x0, &(0x7f00006e9c68)}, 0x0) 2018/04/11 12:45:57 executing program 5: r0 = syz_open_dev$mouse(&(0x7f0000000100)='/dev/input/mouse#\x00', 0x800, 0x28000) bind$alg(r0, &(0x7f0000000140)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts-camellia-aesni-avx2\x00'}, 0x58) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000200)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc-cast5-avx\x00'}, 0x58) r2 = accept$alg(r1, 0x0, 0x0) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f00003bcfd0)="d3ab27191a", 0x5) sendmmsg$alg(r2, &(0x7f0000007e40)=[{0x0, 0x0, &(0x7f0000000900)}], 0x1, 0x0) accept(r1, &(0x7f0000000040)=@pppol2tpv3in6, &(0x7f00000000c0)=0x80) [ 655.540274] FAULT_INJECTION: forcing a failure. [ 655.540274] name failslab, interval 1, probability 0, space 0, times 0 [ 655.551612] CPU: 0 PID: 4755 Comm: syz-executor4 Not tainted 4.16.0+ #17 [ 655.558477] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 655.567845] Call Trace: [ 655.570459] dump_stack+0x1b9/0x294 [ 655.574121] ? dump_stack_print_info.cold.2+0x52/0x52 [ 655.579354] should_fail.cold.4+0xa/0x1a [ 655.583444] ? fault_create_debugfs_attr+0x1f0/0x1f0 2018/04/11 12:45:57 executing program 5: r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000200)={0x26, 'rng\x00', 0x0, 0x0, 'drbg_nopr_hmac_sha1\x00'}, 0x1cc) r2 = accept$alg(r1, 0x0, 0x0) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000180)=0x0) perf_event_open(&(0x7f0000000100)={0x0, 0x70, 0x1, 0x80000001, 0x7, 0x200, 0x0, 0x8, 0x40000, 0x6, 0x6ead, 0x9e, 0x6, 0x7ce564fb, 0xffff, 0x9, 0x794, 0xc955, 0x28e7, 0x5, 0x2, 0x9, 0xfff, 0x4, 0x2362, 0x5, 0x7, 0x6, 0x800, 0x5, 0x9, 0x0, 0xff, 0x5f389b9, 0x88, 0x9, 0x5, 0x3, 0x0, 0x4, 0x0, @perf_config_ext={0x0, 0x400}, 0x4000, 0x2, 0x4, 0x2, 0x0, 0x4, 0x9}, r3, 0x3, r0, 0x1) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f00003bcfd0)="d3ab27191a", 0x5) sendmmsg$alg(r2, &(0x7f0000007e40)=[{0x0, 0x0, &(0x7f0000000900)}], 0x1, 0x0) accept(r1, &(0x7f0000000040)=@pppol2tpv3in6, &(0x7f00000000c0)=0x80) [ 655.588569] ? save_stack+0x43/0xd0 [ 655.592208] ? kmem_cache_alloc_trace+0x152/0x780 [ 655.597067] ? __memcg_init_list_lru_node+0x17d/0x2c0 [ 655.602271] ? __list_lru_init+0x456/0x790 [ 655.606519] ? sget_userns+0x706/0xf20 [ 655.610422] ? graph_lock+0x170/0x170 [ 655.614237] ? vfs_kern_mount.part.34+0xd4/0x4d0 [ 655.619007] ? do_mount+0x564/0x3070 [ 655.622740] ? ksys_mount+0x12d/0x140 [ 655.626552] ? SyS_mount+0x35/0x50 [ 655.630109] ? do_syscall_64+0x29e/0x9d0 [ 655.634195] ? entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 655.639585] ? find_held_lock+0x36/0x1c0 [ 655.643675] ? __lock_is_held+0xb5/0x140 [ 655.647794] ? check_same_owner+0x320/0x320 [ 655.652146] ? rcu_note_context_switch+0x710/0x710 [ 655.657111] __should_failslab+0x124/0x180 [ 655.661366] should_failslab+0x9/0x14 [ 655.665191] kmem_cache_alloc_trace+0x2cb/0x780 [ 655.669872] ? __kmalloc_node+0x33/0x70 [ 655.673862] ? __kmalloc_node+0x33/0x70 [ 655.677851] ? rcu_read_lock_sched_held+0x108/0x120 [ 655.682896] __memcg_init_list_lru_node+0x17d/0x2c0 [ 655.687943] ? kvfree_rcu+0x20/0x20 [ 655.691586] ? __kmalloc_node+0x47/0x70 [ 655.695585] __list_lru_init+0x456/0x790 [ 655.699662] ? list_lru_destroy+0x4c0/0x4c0 [ 655.703998] ? mark_held_locks+0xc9/0x160 [ 655.708163] ? __raw_spin_lock_init+0x1c/0x100 [ 655.712771] ? trace_hardirqs_on_caller+0x421/0x5c0 [ 655.717816] ? lockdep_init_map+0x9/0x10 [ 655.721896] sget_userns+0x706/0xf20 [ 655.725626] ? kill_litter_super+0x90/0x90 [ 655.729895] ? ns_test_super+0x50/0x50 [ 655.733797] ? destroy_unused_super.part.9+0x100/0x100 [ 655.739091] ? do_raw_spin_trylock+0x1b0/0x1b0 [ 655.743693] ? kasan_check_write+0x14/0x20 [ 655.747947] ? do_raw_spin_lock+0xc1/0x200 [ 655.752208] ? blkdev_get+0xc0/0xb30 [ 655.755941] ? cap_capable+0x1f9/0x260 [ 655.759851] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 655.765404] ? security_capable+0x99/0xc0 [ 655.769576] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 655.775129] ? ns_capable_common+0x13f/0x170 [ 655.779552] ? kill_litter_super+0x90/0x90 [ 655.783798] sget+0x10b/0x150 [ 655.786911] ? ns_test_super+0x50/0x50 [ 655.790813] mount_bdev+0x111/0x3e0 [ 655.794453] ? fuse_get_root_inode+0x190/0x190 [ 655.799060] fuse_mount_blk+0x34/0x40 [ 655.802875] mount_fs+0xae/0x328 [ 655.806268] vfs_kern_mount.part.34+0xd4/0x4d0 [ 655.810870] ? may_umount+0xb0/0xb0 [ 655.814510] ? _raw_read_unlock+0x22/0x30 [ 655.818669] ? __get_fs_type+0x97/0xc0 [ 655.822553] do_mount+0x564/0x3070 [ 655.826085] ? copy_mount_string+0x40/0x40 [ 655.830305] ? rcu_pm_notify+0xc0/0xc0 [ 655.834185] ? copy_mount_options+0x5f/0x380 [ 655.838578] ? rcu_read_lock_sched_held+0x108/0x120 [ 655.843582] ? kmem_cache_alloc_trace+0x616/0x780 [ 655.848414] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 655.853938] ? _copy_from_user+0xdf/0x150 [ 655.858076] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 655.863599] ? copy_mount_options+0x285/0x380 [ 655.868083] ksys_mount+0x12d/0x140 [ 655.871698] SyS_mount+0x35/0x50 [ 655.875054] ? ksys_mount+0x140/0x140 [ 655.878847] do_syscall_64+0x29e/0x9d0 [ 655.882716] ? vmalloc_sync_all+0x30/0x30 [ 655.886851] ? _raw_spin_unlock_irq+0x27/0x70 [ 655.891337] ? finish_task_switch+0x1ca/0x820 [ 655.895824] ? syscall_return_slowpath+0x5c0/0x5c0 [ 655.900743] ? syscall_return_slowpath+0x30f/0x5c0 [ 655.905660] ? entry_SYSCALL_64_after_hwframe+0x52/0xb7 [ 655.911023] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 655.915871] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 655.921049] RIP: 0033:0x455259 [ 655.924219] RSP: 002b:00007f95e4cadb08 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 655.931916] RAX: ffffffffffffffda RBX: 0000000000000015 RCX: 0000000000455259 [ 655.939169] RDX: 00000000004b9bc5 RSI: 0000000020000040 RDI: 0000000020000000 [ 655.946421] RBP: 0000000020000000 R08: 00007f95e4cadb20 R09: 0000000000000000 [ 655.953675] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 655.960934] R13: 0000000000000000 R14: 0000000000000000 R15: 0000000000000000 2018/04/11 12:45:58 executing program 2: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x1e, 0x1, 0x0) setsockopt$packet_tx_ring(r0, 0x10f, 0x87, &(0x7f0000b89fe4)=@req={0x772}, 0x10) sendmsg(r0, &(0x7f0000030000)={&(0x7f00004f5000)=@generic={0x10000000001e, "0100000900000000000000000226cc573c080000003724c71e14dd6a739effea1b48006be61ffe0000e103000000f8000004003f010039d8f986ff01000300000004af50d50700000000000000e3ad316a1983000000001d00e0dfcb24281e27800000100076c3979ac40000bd15020078a1dfd300881a8365b1b16d7436"}, 0x80, &(0x7f0000447ff0), 0xd0010100, &(0x7f00006e9c68)}, 0x0) 2018/04/11 12:45:58 executing program 7: syz_emit_ethernet(0x66, &(0x7f0000000000)={@random="cd3997030f00", @empty=[0x0, 0x0, 0x0, 0x0, 0x0, 0x2], [], {@ipv6={0x86dd, {0x0, 0x6, "b40900", 0x30, 0x67, 0x0, @ipv4={[], [0xff, 0xff], @multicast2=0xe0000002}, @mcast2={0xff, 0x2, [], 0x1}, {[], @icmpv6=@time_exceed={0x21, 0x0, 0x0, 0x0, [], {0x0, 0x6, "b680fa", 0x0, 0x0, 0x0, @ipv4={[], [0xff, 0xff], @broadcast=0xffffffff}, @ipv4={[], [0xff, 0xff], @remote={0xac, 0x14, 0xffffffffffffffff, 0xbb}}}}}}}}}, 0x0) 2018/04/11 12:45:58 executing program 0: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff7fffffffffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x1e, 0x1, 0x0) sendmsg(r0, &(0x7f0000030000)={&(0x7f00004f5000)=@generic={0x10000000001e, "0100000900040000000000000226cc573c080000003724c71e14dd6a739effea1b48006be61ffe0000e103000000f8000004003f010039d8f986ff01000300000004af50d50700000000000000e3ad316a1983000000001d00e0dfcb24281e27800000100076c3979ac40000bd15020078a1dfd300881a8365b1b16d7436"}, 0x80, &(0x7f0000447ff0), 0x0, &(0x7f00006e9c68)}, 0x0) 2018/04/11 12:45:58 executing program 5: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000200)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc-cast5-avx\x00'}, 0x58) syz_emit_ethernet(0x4a, &(0x7f0000000400)={@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, @remote={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xbb}, [], {@ipv6={0x86dd, {0x0, 0x6, '{T;', 0x14, 0x2f, 0x0, @empty, @remote={0xfe, 0x80, [], 0xbb}, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, &(0x7f0000000080)) r1 = accept$alg(r0, 0x0, 0x0) r2 = syz_open_dev$amidi(&(0x7f0000000100)='/dev/amidi#\x00', 0x1, 0x200001) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000001c0)={r2, 0x50, &(0x7f0000000140)}, 0x10) getsockopt$inet_sctp_SCTP_DELAYED_SACK(r2, 0x84, 0x10, &(0x7f0000000380)=@sack_info={0x0, 0x3ff, 0x18171fd8}, &(0x7f00000003c0)=0xc) setsockopt$inet_sctp_SCTP_CONTEXT(r2, 0x84, 0x11, &(0x7f0000000480)={r3, 0x4}, 0x8) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00003bcfd0)="d3ab27191a", 0x5) r4 = syz_open_dev$midi(&(0x7f00000002c0)='/dev/midi#\x00', 0x1, 0x6800) ioctl$SNDRV_TIMER_IOCTL_PARAMS(r4, 0x40505412, &(0x7f0000000300)={0x4, 0x7f, 0x7, 0x0, 0x3}) sendmmsg$alg(r1, &(0x7f0000007e40)=[{0x0, 0x0, &(0x7f0000000900)}], 0x1, 0x0) accept(r0, &(0x7f0000000040)=@pppol2tpv3in6, &(0x7f00000000c0)=0x80) ioctl$KVM_SET_VCPU_EVENTS(r2, 0x4040aea0, &(0x7f0000000280)={0x6, 0x5a6, 0x1, 0x0, 0x1f, 0x6, 0x6, 0x9, 0x1, 0x4, 0x1, 0x4, 0x0, 0x85, 0x1000, 0x1, 0x20}) 2018/04/11 12:45:58 executing program 1: r0 = socket(0x1e, 0x1, 0x0) setsockopt$packet_tx_ring(r0, 0x10f, 0x87, &(0x7f0000b89fe4)=@req={0x772}, 0x10) sendmsg(r0, &(0x7f0000030000)={&(0x7f00004f5000)=@generic={0x10000000001e, "0014000900000000000000000226cc573c080000003724c71e14dd6a739effea1b48006be61ffe0000e103000000f8000004003f010339d8f986ff01000300000004af50d50700000000000000e3ad316a1983000000001d00e0dfcb24281e27800000100076c3979ac40000bd15020078a1dfd300881a8365b1b16d7436"}, 0x80, &(0x7f0000447ff0), 0x0, &(0x7f00006e9c68)}, 0x0) 2018/04/11 12:45:58 executing program 6: r0 = socket$inet6(0xa, 0x80003, 0xff) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @ipv4={[], [0xff, 0xff], @dev={0xac, 0x14, 0x14, 0x1b}}}, 0x1c) sendmsg(r0, &(0x7f000001b000)={0x0, 0xfffffff5, &(0x7f0000019fa0), 0xc2, &(0x7f000001ef08)}, 0x0) 2018/04/11 12:45:58 executing program 3: semop(0x0, &(0x7f000001a000)=[{0x0, 0xffffffffffff0001}, {}], 0x2) timer_create(0x0, &(0x7f0000cd0000)={0x0, 0x12}, &(0x7f0000044000)) timer_settime(0x0, 0x0, &(0x7f0000000000)={{0x0, 0x1c9c380}, {0x0, 0x9}}, &(0x7f0000040000)) r0 = getpgid(0x0) tkill(r0, 0x1000000000016) 2018/04/11 12:45:58 executing program 4 (fault-call:1 fault-nth:42): perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_fuseblk_mount(&(0x7f0000000040)='./file0\x00', &(0x7f0000000000)='./file0\x00', 0x4000, 0x0, 0x0, 0x0, 0x0, 0x0) [ 656.536462] FAULT_INJECTION: forcing a failure. [ 656.536462] name failslab, interval 1, probability 0, space 0, times 0 [ 656.548416] CPU: 0 PID: 4796 Comm: syz-executor4 Not tainted 4.16.0+ #17 [ 656.555268] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 656.564631] Call Trace: [ 656.567238] dump_stack+0x1b9/0x294 [ 656.570894] ? dump_stack_print_info.cold.2+0x52/0x52 [ 656.576101] ? perf_trace_run_bpf_submit+0x23f/0x370 [ 656.581241] should_fail.cold.4+0xa/0x1a [ 656.585329] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 656.590451] ? memset+0x31/0x40 [ 656.593752] ? graph_lock+0x170/0x170 [ 656.597585] ? find_held_lock+0x36/0x1c0 [ 656.601684] ? __lock_is_held+0xb5/0x140 [ 656.605797] ? check_same_owner+0x320/0x320 [ 656.610140] ? __raw_spin_lock_init+0x1c/0x100 [ 656.614742] ? rcu_note_context_switch+0x710/0x710 [ 656.619694] ? find_held_lock+0x36/0x1c0 [ 656.623784] __should_failslab+0x124/0x180 [ 656.628044] should_failslab+0x9/0x14 [ 656.631857] __kmalloc+0x2c8/0x760 [ 656.635412] ? lock_downgrade+0x8e0/0x8e0 [ 656.639581] ? refcount_add_not_zero+0x320/0x320 [ 656.644356] ? register_shrinker+0x121/0x300 [ 656.648797] register_shrinker+0x121/0x300 [ 656.653050] ? do_raw_spin_trylock+0x1b0/0x1b0 [ 656.657651] ? shrink_slab+0xc0/0xc0 [ 656.661388] ? memcpy+0x45/0x50 [ 656.664754] sget_userns+0xc78/0xf20 [ 656.668485] ? kill_litter_super+0x90/0x90 [ 656.672750] ? ns_test_super+0x50/0x50 [ 656.676661] ? destroy_unused_super.part.9+0x100/0x100 [ 656.681981] ? kasan_check_write+0x14/0x20 2018/04/11 12:45:58 executing program 1: r0 = socket(0x1e, 0x1, 0x0) setsockopt$packet_tx_ring(r0, 0x10f, 0x87, &(0x7f0000b89fe4)=@req={0x772}, 0x10) sendmsg(r0, &(0x7f0000030000)={&(0x7f00004f5000)=@generic={0x10000000001e, "0014000900000000000000000226cc573c080000003724c71e14dd6a739effea1b48006be61ffe0000e103000000f8000004003f010039d8f986ff02000300000004af50d50700000000000000e3ad316a1983000000001d00e0dfcb24281e27800000100076c3979ac40000bd15020078a1dfd300881a8365b1b16d7436"}, 0x80, &(0x7f0000447ff0), 0x0, &(0x7f00006e9c68)}, 0x0) 2018/04/11 12:45:58 executing program 6: r0 = socket$inet6(0xa, 0x80003, 0xff) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @ipv4={[], [0xff, 0xff], @dev={0xac, 0x14, 0x14, 0x1b}}}, 0x1c) sendmsg(r0, &(0x7f000001b000)={0x0, 0xfffffff5, &(0x7f0000019fa0), 0x1ee, &(0x7f000001ef08)}, 0x0) 2018/04/11 12:45:58 executing program 7: syz_emit_ethernet(0x66, &(0x7f0000000000)={@random="cd3997030f00", @empty=[0x0, 0x0, 0x0, 0x0, 0x0, 0x200000000000000], [], {@ipv6={0x86dd, {0x0, 0x6, "b40900", 0x30, 0x67, 0x0, @ipv4={[], [0xff, 0xff], @multicast2=0xe0000002}, @mcast2={0xff, 0x2, [], 0x1}, {[], @icmpv6=@time_exceed={0x21, 0x0, 0x0, 0x0, [], {0x0, 0x6, "b680fa", 0x0, 0x0, 0x0, @ipv4={[], [0xff, 0xff], @broadcast=0xffffffff}, @ipv4={[], [0xff, 0xff], @remote={0xac, 0x14, 0xffffffffffffffff, 0xbb}}}}}}}}}, 0x0) 2018/04/11 12:45:58 executing program 0: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff7fffffffffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x1e, 0x1, 0x0) sendmsg(r0, &(0x7f0000030000)={&(0x7f00004f5000)=@generic={0x10000000001e, "010000090000000101d000000226cc573c080000003724c71e14dd6a739effea1b48006be61ffe0000e103000000f8000004003f010039d8f986ff01000300000004af50d50700000000000000e3ad316a1983000000001d00e0dfcb24281e27800000100076c3979ac40000bd15020078a1dfd300881a8365b1b16d7436"}, 0x80, &(0x7f0000447ff0), 0x0, &(0x7f00006e9c68)}, 0x0) 2018/04/11 12:45:58 executing program 5: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) timer_create(0x0, &(0x7f0000000100)={0x0, 0x30, 0x4, @tid=0xffffffffffffffff}, &(0x7f0000000140)=0x0) timer_delete(r0) r1 = socket$alg(0x26, 0x5, 0x0) r2 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000180)='net/route\x00') ioctl$DRM_IOCTL_GET_MAGIC(r2, 0x80046402, &(0x7f00000001c0)) bind$alg(r1, &(0x7f0000000200)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc-cast5-avx\x00'}, 0x58) r3 = accept$alg(r1, 0x0, 0x0) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f00003bcfd0)="d3ab27191a", 0x5) sendmmsg$alg(r3, &(0x7f0000007e40)=[{0x0, 0x0, &(0x7f0000000900)}], 0x1, 0x0) accept(r1, &(0x7f0000000040)=@pppol2tpv3in6, &(0x7f00000000c0)=0x80) 2018/04/11 12:45:58 executing program 2: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x1e, 0x1, 0x0) setsockopt$packet_tx_ring(r0, 0x10f, 0x87, &(0x7f0000b89fe4)=@req={0x772}, 0x10) sendmsg(r0, &(0x7f0000030000)={&(0x7f00004f5000)=@generic={0x10000000001e, "0100000900000000000000000226cc573c080000003724c71e14dd6a739effea1b48006be61ffe0000e103000000f8000004003f010039d8f986ff01000300000004af50d50700000000000000e3ad316a1983000000001d00e0dfcb24281e27800000100076c3979ac40000bd15020078a1dfd300881a8365b1b16d7436"}, 0x80, &(0x7f0000447ff0), 0xffffff7f, &(0x7f00006e9c68)}, 0x0) 2018/04/11 12:45:58 executing program 7: syz_emit_ethernet(0x66, &(0x7f0000000000)={@random="cd3997030f00", @empty=[0x0, 0x0, 0x0, 0x0, 0x0, 0xb00000000000000], [], {@ipv6={0x86dd, {0x0, 0x6, "b40900", 0x30, 0x67, 0x0, @ipv4={[], [0xff, 0xff], @multicast2=0xe0000002}, @mcast2={0xff, 0x2, [], 0x1}, {[], @icmpv6=@time_exceed={0x21, 0x0, 0x0, 0x0, [], {0x0, 0x6, "b680fa", 0x0, 0x0, 0x0, @ipv4={[], [0xff, 0xff], @broadcast=0xffffffff}, @ipv4={[], [0xff, 0xff], @remote={0xac, 0x14, 0xffffffffffffffff, 0xbb}}}}}}}}}, 0x0) [ 656.686242] ? blkdev_get+0xc0/0xb30 [ 656.689969] ? cap_capable+0x1f9/0x260 [ 656.693880] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 656.699426] ? security_capable+0x99/0xc0 [ 656.703593] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 656.709142] ? ns_capable_common+0x13f/0x170 [ 656.713566] ? kill_litter_super+0x90/0x90 [ 656.717811] sget+0x10b/0x150 [ 656.720923] ? ns_test_super+0x50/0x50 [ 656.724828] mount_bdev+0x111/0x3e0 [ 656.728466] ? fuse_get_root_inode+0x190/0x190 [ 656.733068] fuse_mount_blk+0x34/0x40 [ 656.736882] mount_fs+0xae/0x328 [ 656.740275] vfs_kern_mount.part.34+0xd4/0x4d0 [ 656.744865] ? may_umount+0xb0/0xb0 [ 656.748480] ? _raw_read_unlock+0x22/0x30 [ 656.752615] ? __get_fs_type+0x97/0xc0 [ 656.756493] do_mount+0x564/0x3070 [ 656.760041] ? copy_mount_string+0x40/0x40 [ 656.764275] ? rcu_pm_notify+0xc0/0xc0 [ 656.768158] ? copy_mount_options+0x5f/0x380 [ 656.772550] ? rcu_read_lock_sched_held+0x108/0x120 [ 656.777555] ? kmem_cache_alloc_trace+0x616/0x780 [ 656.782389] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 656.787914] ? _copy_from_user+0xdf/0x150 [ 656.792073] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 656.797602] ? copy_mount_options+0x285/0x380 [ 656.802092] ksys_mount+0x12d/0x140 [ 656.805716] SyS_mount+0x35/0x50 [ 656.809067] ? ksys_mount+0x140/0x140 [ 656.812856] do_syscall_64+0x29e/0x9d0 [ 656.816727] ? vmalloc_sync_all+0x30/0x30 [ 656.820860] ? _raw_spin_unlock_irq+0x27/0x70 [ 656.825341] ? finish_task_switch+0x1ca/0x820 [ 656.829823] ? syscall_return_slowpath+0x5c0/0x5c0 [ 656.834738] ? syscall_return_slowpath+0x30f/0x5c0 [ 656.839676] ? entry_SYSCALL_64_after_hwframe+0x52/0xb7 [ 656.845045] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 656.849882] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 656.855059] RIP: 0033:0x455259 [ 656.858232] RSP: 002b:00007f95e4cadb08 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 656.865928] RAX: ffffffffffffffda RBX: 0000000000000015 RCX: 0000000000455259 [ 656.873181] RDX: 00000000004b9bc5 RSI: 0000000020000040 RDI: 0000000020000000 [ 656.880439] RBP: 0000000020000000 R08: 00007f95e4cadb20 R09: 0000000000000000 [ 656.887694] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 656.894948] R13: 0000000000000000 R14: 0000000000000000 R15: 0000000000000000 [ 656.903183] WARNING: CPU: 0 PID: 4796 at fs/super.c:1148 kill_block_super+0xd9/0x100 [ 656.911085] Kernel panic - not syncing: panic_on_warn set ... [ 656.911085] [ 656.918465] CPU: 0 PID: 4796 Comm: syz-executor4 Not tainted 4.16.0+ #17 [ 656.925310] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 656.934673] Call Trace: [ 656.937281] dump_stack+0x1b9/0x294 [ 656.940929] ? dump_stack_print_info.cold.2+0x52/0x52 [ 656.946146] ? kill_block_super+0x30/0x100 [ 656.950397] panic+0x22f/0x4de [ 656.953604] ? add_taint.cold.5+0x16/0x16 [ 656.957781] ? __warn.cold.8+0x148/0x1b3 [ 656.961859] ? kill_block_super+0xd9/0x100 [ 656.966114] __warn.cold.8+0x163/0x1b3 [ 656.970013] ? kill_block_super+0xd9/0x100 [ 656.974265] report_bug+0x252/0x2d0 [ 656.977911] do_error_trap+0x1de/0x490 [ 656.981835] ? math_error+0x420/0x420 [ 656.985658] ? up_write+0x72/0x210 [ 656.989215] ? up_read+0x110/0x110 [ 656.992790] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 656.997670] do_invalid_op+0x1b/0x20 [ 657.001406] invalid_op+0x1b/0x40 [ 657.004868] RIP: 0010:kill_block_super+0xd9/0x100 [ 657.009712] RSP: 0018:ffff8801c53f7750 EFLAGS: 00010246 [ 657.015089] RAX: 0000000000040000 RBX: 0000000000000000 RCX: ffffc900046bc000 [ 657.022368] RDX: 0000000000040000 RSI: ffffffff81bc68a9 RDI: 0000000000000005 [ 657.029650] RBP: ffff8801c53f7768 R08: ffff8801b3438740 R09: ffffed0038a7eeac [ 657.036927] R10: ffffed0038a7eeac R11: 0000000000000003 R12: ffff8801da806040 [ 657.044202] R13: 0000000000000000 R14: ffff8801b2576a80 R15: dffffc0000000000 [ 657.051505] ? kill_block_super+0xd9/0x100 [ 657.055771] fuse_kill_sb_blk+0x90/0xb0 [ 657.059762] deactivate_locked_super+0x97/0x100 [ 657.064446] sget_userns+0xc9d/0xf20 [ 657.068168] ? kill_litter_super+0x90/0x90 [ 657.072431] ? ns_test_super+0x50/0x50 [ 657.076331] ? destroy_unused_super.part.9+0x100/0x100 [ 657.081627] ? kasan_check_write+0x14/0x20 [ 657.085896] ? blkdev_get+0xc0/0xb30 [ 657.089633] ? cap_capable+0x1f9/0x260 [ 657.093556] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 657.099106] ? security_capable+0x99/0xc0 [ 657.103275] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 657.108818] ? ns_capable_common+0x13f/0x170 [ 657.113239] ? kill_litter_super+0x90/0x90 [ 657.117487] sget+0x10b/0x150 [ 657.120604] ? ns_test_super+0x50/0x50 [ 657.124558] mount_bdev+0x111/0x3e0 [ 657.128196] ? fuse_get_root_inode+0x190/0x190 [ 657.132811] fuse_mount_blk+0x34/0x40 [ 657.136629] mount_fs+0xae/0x328 [ 657.140036] vfs_kern_mount.part.34+0xd4/0x4d0 [ 657.144648] ? may_umount+0xb0/0xb0 [ 657.148287] ? _raw_read_unlock+0x22/0x30 [ 657.152447] ? __get_fs_type+0x97/0xc0 [ 657.156359] do_mount+0x564/0x3070 [ 657.159925] ? copy_mount_string+0x40/0x40 [ 657.164160] ? rcu_pm_notify+0xc0/0xc0 [ 657.168066] ? copy_mount_options+0x5f/0x380 [ 657.172467] ? rcu_read_lock_sched_held+0x108/0x120 [ 657.177485] ? kmem_cache_alloc_trace+0x616/0x780 [ 657.182340] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 657.187861] ? _copy_from_user+0xdf/0x150 [ 657.192012] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 657.197547] ? copy_mount_options+0x285/0x380 [ 657.202049] ksys_mount+0x12d/0x140 [ 657.205664] SyS_mount+0x35/0x50 [ 657.209026] ? ksys_mount+0x140/0x140 [ 657.212823] do_syscall_64+0x29e/0x9d0 [ 657.216694] ? vmalloc_sync_all+0x30/0x30 [ 657.221695] ? _raw_spin_unlock_irq+0x27/0x70 [ 657.226176] ? finish_task_switch+0x1ca/0x820 [ 657.230662] ? syscall_return_slowpath+0x5c0/0x5c0 [ 657.235582] ? syscall_return_slowpath+0x30f/0x5c0 [ 657.240503] ? entry_SYSCALL_64_after_hwframe+0x52/0xb7 [ 657.245860] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 657.250696] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 657.255869] RIP: 0033:0x455259 [ 657.259049] RSP: 002b:00007f95e4cadb08 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 657.266747] RAX: ffffffffffffffda RBX: 0000000000000015 RCX: 0000000000455259 [ 657.274005] RDX: 00000000004b9bc5 RSI: 0000000020000040 RDI: 0000000020000000 [ 657.281268] RBP: 0000000020000000 R08: 00007f95e4cadb20 R09: 0000000000000000 [ 657.288531] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 657.295795] R13: 0000000000000000 R14: 0000000000000000 R15: 0000000000000000 [ 657.303792] Dumping ftrace buffer: [ 657.307606] (ftrace buffer empty) [ 657.311300] Kernel Offset: disabled [ 657.314916] Rebooting in 86400 seconds..